FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1978

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP80S01268A000400010002-7
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
96
Document Creation Date: 
December 19, 2016
Document Release Date: 
September 14, 2005
Sequence Number: 
2
Case Number: 
Publication Date: 
March 14, 1978
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP80S01268A000400010002-7.pdf7.06 MB
Body: 
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Calendar No. 643 95TH CONaRESfioj SENATE REroRT 2D SESSION No. 95-701 FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1978 MARCH 14, (legislative day, FEBRUARY 6), 1978.-Ordered to be printed Mr. BAYH, from the Select Committee on Intelligence, submitted the following REPORT together with ADDITIONAL VIEWS [To accompany S. 1566] The Select Committee on Intelligence, to which was referred the bill (S. 1566) to amend title 18, United States Code, to authorize applica- tions fora court order approving .the use of electronic surveillance to obtain foreign intelligence information, having considered the same, reports favorably thereon with amendments and recommends that the bill, as amended, do pass. AMENDMENTS On page 1, line 4, strike "1977", and insert in lieu thereof "1978". 1 On page 3, strike out all after line 5 through the end of line 19, and insert in lieu thereof the following: (A) any person, other than a United States person, who- (i) acts in the United States as an officer or employee of a foreign power; or hi (ii) acts for or on behalf of a forein.power wch en- the in clandestine intelligence activities contrary to the interests of the United States, when the circumstances of such person's presence in the United tates indicate that such person may engage inn 8 activities in the United States, or when such person knowingly aids or abets any person in the conduct of such activities or conspires with any person knowing that such person is engaged in such activities; Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 2 On page 3, strike out all after line 19 through line 23 on page 4, and insert in lieu thereof the following : (B) any person who- (i) knowingly engages in clandestine intelligence gathering activities for or on behalf of a foreign'power, which activities involve or may involve n violation of the criminal statutes of the United States; (ii) pursuant to the direction of an intelligence service or network of a foreign power, knowingly engages in any other clandestine intelligence activities for or on behalf of such foreign power, which activities involve or are about to involve a violation of the criminal statutes of the United States; (iii) knowingly engages in sabotage or terrorism, or activities which are or may be in preparation therefor, for or on behalf of a foreign power; (iv) knowingly aids or abets any person in the conduct of activities described in subparagraph (B) (i) through (iii) above, or conspires with any person knowing that such person is engaged in activities described in subpara- graph (B) (i) through (iii) above: Provided, That no United States person may be considered an agent of a foreign power solely upon the basis of activities protected by the First Amendment to the Constitution of the United States. On page 5, strike out all after line 14 through line 15 on page 6, and insert in lieu thereof : (A) information which relates to, and if concerning a United States person is necessary to, the ability of the United States to protect itself against actual or potential attack or other grave hostile acts of a foreign power or an agent,of a foreign power; (B) information with respect to a foreign power or foreign territory which relates to, and if concerning a United States person is necessary to- (i) the national defense or the security of the Nation; or (ii) the successful conduct of the foreign affairs of the United States; or (C) information which relates to, and if concerning a United States person is necessary to, the ability of the United States to protect against- ' (i) sabotage or terrorism by a foreign power or an agent of a foreign power, or (ii) the clandestine intelligence activities of an intelli- gence service or network of a foreign power or an agent of a foreign power. On page 8, line 8, strike the first comma and insert in lieu thereof the word "and". Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 3 On page 9, strike out all after line 2 through line 22, and insert in lieu thereof the following: and which are reasonably designed to insure that informa- tion which relates solely to the ability of the United States to provide for the national defense or security,of the Nation and to provid4 for the conduct' of the foreign affairs of the United States, under subparagraphs (B) and (C) above, shall not be disseminated in a manner which identifies any United States person, without such person's consent, unless such person's identity is necessary to understand or assess the importance of information with respect to a foreign power or foreign terri- tory or such information is otherwise publicly available. On page 10, line 6, after the word "powers", insert the following : "as defined in section 2521 (b) (1) (A)-(E)." On page 10, line 25, strike the words "each of whom," and insert in lieu thereof the following : "who shall constitute a special court, each member of which". On page 12, insert after line 8 a new subsection as follows : e designated under this section shall so Each jud d g ( ) serve for a maximum of seven years and shall not be eligible for redesignation, provided that the judges first designated under subsection (a) shall be designated for terms of from one to seven years so that one term expires each year, and that judges first designated under subsection (b) shall be designated for terms of three, five, and seven years. On page 12, strike lines 23 and 24, and insert in lieu thereof the following : (A) that the certifying official deems the information sought to be foreign intelligence information; On page 17, line 6, after the letter "(E) ", insert the following: "and any other information furnished under section 2524(c) ". On page 20, line 2, after the word "cause.", insert the following new sentence: "At the end of the period of time for which an elec- tronic surveillance is approved by an order or an extension issued under this section, the judge may assess compliance with the minimi- 2,ation procedures required by this chapter." On page 21, line 13, after the word "thereof", insert the following : and no information concerning any United States person acquired from such surveillance shall subsequently be used or disclosed in any other manner by Federal officers or employ- ees without the consent of such person, except with the ap- proval of the Attorney General where the information indicates a threat of death or serious bodily harm to any person. On page 21, line 22, after the letter "(F)", insert the following: "and in accordance with the minimization procedures required by this chapter,". Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 4 On page 22, line 12, after the word "Government," insert the fol- lowing : "of the United States, of a State, or of a political subdivision thereof". On page 26, insert after line 14 a new subsection as follows: (g) In circumstances involving the unintentional acquisi- tion, by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circum- stances in which a person has a reasonable expectation of pri- vacy and a warrant would be required for law enforcement purposes, and where both the sender and all intended re- cipients are located within the United States, such contents shall be destroyed upon recognition, except with the approval of the Attorney General where the contents indicate a threat of death or serious bodily harm to any person. On page 26, insert after line 24 a new section as follows : 252$. Congressional Oversight. (a) On a semiannual basis the Attorney General shall fully inform the House Permanent Select Committee on Intelli- gence and the Senate Select Committee on Intelligance con- cerning all electronic surveillance under this chapter. Nothing in this chapter shall be deemed to limit the authority and responsibility of those committees to obtain such additional information as they may need to carry out their respective functions and duties. (b) On or before one year after the effective date of this chapter, and on the same day each year thereafter, the Select Committee on Intelligance of the United States Senate shall report to the Senate concerning the implementation of this chapter. Said reports shall include but not be limited to an analysis and recommendations concerning whether this chap- ter should be (1) amended, (2) repealed, or (3) permitted to continue in effect without amendment. (c) In the event the Select Committee on Intelligence of the United States Senate shall report that this chapter should be amended or repealed, it shall report out legislation em- bodying its recommendations within thirty calendar days, unless the Senate shall otherwise determine by yeas and nays. (d) Any legislation so reported shall become the pending business of the Senate with time for debate equally divided between the proponents and opponents and shall be voted on within thirty calendar days thereafter, unless the Senate shall otherwise determine by yeas and nays. (e) Such legislation passed by the Senate shall be referred to the appropriate committee of the other House and shall be reported out by such committee together with its recommenda- tions within thirty calendar days and shall thereupon become the pending business of such House and shall' be voted upon within three calendar days, unless such House shall other- wise determine by yeas and nays. (f) In the case of any disagreement between the two Houses of Congress with respect to such legislation passed Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 5 by both Houses, conferees shall make and file a report with respect to such legislation within seven calendar days after the legislation is referred to the committee of conference. Notwithstanding any rule in either House concerning the printing of conference reports in the record or concerning any delay in the consideration of such reports, such reports shall be acted on by both Houses not later than seven calendar days after the conference report is filed. In the event the conferees are unable to agree;within three calendar days they shall report to their respective Houses in disagreement. On page 29, line 17, after the number "2520.", insert the following new sentence: No communication .common carrier of officer, employee or agent thereof shall disclose the existence of any interception under this chapter or electronic surveillance, as defined in chapter 120, with respect to which the common carrier has been furnished either an order or certification under this sub- paragraph, except as may otherwise be lawfully ordered. On page 30, line 8, after the word "duty," insert the following : "under procedures approved by the Attorney General". On page 31, line 2, after the word "provided," insert the following : that no particular United States person shall be intentionally tar- geted for such purposes without his consent,". On page.31, line 13, after the word "international," insert the words "or foreign". PURPOSE OF AMENDMENTS The Committee on the Judiciary adopted several amendments to S. 1566 designed to clarify and make more explicit the statutory intent, to provide further safeguards for individuals subjected to electronic surveillance pursuant to this new chapter, and to provide a detailed procedure for challenging such surveillance, and any evidence derived therefrom, during the course of a formal proceeding. The purpose of the amendments adopted by the Select Committee on Intelligence has been to clarify further the legislative intent and to provide additional safeguards for persons who may be subjected to electronic surveillance, including a criminal standard for surveillance of U.S. citizens and resident aliens. Judicial procedures for issuing court orders for foreign intelligence surveillance, as well as for mon- itoring compliance with such orders, are described in greater detail. An effort has also been made to strengthen protection against abuses involving dissemination and use of information received through such surveillance. Specific provisions requiring regular congressional over- sight have been added. Finally, the reported bill adds amendments to chapter 119 of title 18, United States Code (title III of the Omnibus Crime Control and Safe Streets Act of 1968, Public Law 90--351, seetipn 802). These amendments are technical and conforming in nature and are designed to integrate certain provisions of chapters 119 and 120. A more detailed explanation of the individual amendments is contained in the section- by-section analysis of this report. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 6 HISTORY OF THE BILL. The Foreign Intelligence Surveillance Act of 1977, S. 1566, was in- troduced by Senator Kennedy on May 18, 1977 to provide a statutory procedure to authorize applications for a court order approving the use of electronic surveillance within the United States to obtain for- eign intelligence information. The bill, cosponsored by seven other Senators (Mr. Bayh, Mr. Eastland, Mr. Inouye, Mr. McClellan, Mr. Mathias, Mr. Nelson, and Mr. Thurmond), was referred to and con- sidered by the Committee on the Judiciary. That committee reported the bill favorably on November 15, 1977; and it was referred to the Select Committee on Intelligence. S. 1566 has its origin in S. 3197, The Foreign Intelligence Surveil- lance Act of 1976, 94th Congress, second session (1976). That legisla- tion, also introduced by senator Kennedy, had the same broad, bi- partisan support, including that of the Ford administration, as S. 1566 and was the subject of Senate hearings by both the Subcommittee on Criminal Laws and Procedures of the Committee on the Judiciary and the Select Committee on Intelligence, S. 3197 was reported favorably by both Senate committees by a combined vote of 24 ayes and 2 nays, but the session ended before the full Senate could act on the legisla- tion. S. 1566 picks up where S. 3197 left off. Hearings were held by the Subcommittee on Criminal Laws and Procedures, chaired by Senator Kennedy at the request of Senator McClellan. Hearings were also held by the Subcommittee on Intelligence and the Rights of Americans, chaired by Senator Bayh, and included executive session hearings to consider classified information bearing upon the bill. Among those testifying before one or both of these subcommittees were Attorney General Griffin B. Bell; Director of the FBI Clarence M. Kelley; Director of Central Intelligence Stansfield Turner; Secretary of De- fense Harold Brown; John Shattuck and Jerry Berman of the Amer- ican Civil Liberties Union ; Morton H. Halperin of the Center for National Security Studies; Steven Rosenfeld of the Committee on Federal Legislation of the Association of the Bar of the city of New York; and David Watters of the American Privacy Foundation. Broad-'based support was voiced for S. 1566 throughout the hear- ings, with the administration indicating its support of the bill. 'S. 1566 as reported has been amended in several respects to respond to the constructive criticisms and suggestions elicited in the hearings. As amended, the bill was approved by the Select Committee on Intelli- gence, 15-0, with a recommendation for favorable action. The administration has supported the enactment of S. 1566 and sup- ports its swift passage by the Senate. As Attorney General Bell. stated in testifying in favor of the bill : I believe this bill is remarkable not only in the way it has been developed, but also in the fact that for the first time in our society the clandestine intelligence activities of our Gov- ernment shall be subject to the regulation and receive the posi- Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 1411 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 7 tive authority of a public law for all to inspect. President Carter stated it very well 1n announcing this bill when he said that "one of the most difficult tasks in a free society like our own is the correlation between adequate intelligence to guar- antee our Nation's security on the one hand, and the preser- vation of basic human rights on the other." It isa very delicate balance to strike, but one which is necessary in our society, and a balance which cannot be achieved by sacrificing either our Nation's security or our civil liberties. In my view this bill strikes the balance, sacrifices neither our security nor our civil liberties, and assures that the abuses of the past will remain in the past and that the, dedicated and patriotic men and women who serve this country in intelligence positions, often under substantial hardships and even danger, will have the affirmation of Congress that their activities are proper and necessary.1 1. SUMMARY OF THE LEGISLATION S. 1566 amends title 18, United States Code, by adding after chapter 119 a new chapter 120 entitled "Electronic Surveillance Within the United States for Foreign Intelligence Purposes." The bill requires a court order for electronic surveillance as defined therein conducted for foreign intelligence purposes within the United States or targeted against 'the international comunications of particular U.S. persons who are in the United States. The bill establishes the exclusive means by which such surveillance may be conducted. 'S. 1566 does not require a court order for electronic surveillance abroad, and the bill does not address the question whether the President has any constitutional power to conduct electronic surveillance of a U.S. person abroad without a court order to acquire foreign intelligence information, if such power exists? Under S. 1566 the Attorney General, upon the general authorization of the President for the conduct of electronic surveillance within the United States for foreign intelligence purposes, may authorize appli- cations'to members of a special court for orders to conduct such surveil- lance. Applications are to be, made to one of seven district judges pub- licly designated by the Chief Justice of the United States to serve stag- gered 7-year terms on a special court. Denials of such applications may be appealed to a special three-judge court of review and ultimately to the Supreme Court. Approval of an application under the bill would require a finding by the court that the target of the surveillance is a "foreign power" or an "agent of a foreign power" and that the facilities or place at which the 1 Hearing before the Subcommittee on Criminal Laws and Procedures of the Senate Committee on the Judiciary, Foreign Intelligence Surveillance At of 1977, 95th Cong., 1st sess.. p. 13 (1977), 2 Further legislation may be needed to protect the rights of Americans abroad from improper electronic surveillance by their Government. Such legislation should he considered separately because the issues are different than those posed by electronic sur- veillance within the United States. S. 2525, the National Intelligence Reorganization and Reform Act of 1978. has been introduced by members of the Select Committee on Intelligence to fill this gap. Title III of that bill would establish procedures for electronic surveillance of Americans abroad. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 CIA-RDP80S01268A000400010002-7 S surveillance is to be directed are being used or are about to be used by a foreign power or an agent of a foreign power. A "foreign power" may include a foreign government, a faction of a foreign government, a foreign-based terrorist group, a foreign-based political organization, or an entity directed and controlled by a foreign government. An "agent of a foreign power" includes non-resident aliens who act as officers or employees of foreign powers or who act on behalf of foreign powers which engage in clandestine intelligence activities contrary to the interests of this country. U.S. persons meet the "agent of a foreign power" criteria if they engage in certain activities on behalf of a foreign power which involve or may involve criminal acts. The court would also be required to find that procedures proposed in the application adequately minimize the acquisition and retention, and prohibit the dissemination, of information concerning U.S. persons which does not relate to national defense, foreign affairs, or the ter- rorist, sabotage, or clandestine, intelligence activities of a foreign power. Additional limits are placed on the dissemination of informa- tion relating solely to national defense or foreign affairs. Finally, a certification or certifications must be made by the As- sistant to the President for National Security Affairs or an executive branch official or officials designated by the President from among those executive officers with responsibilities for national security or de- fense who are appointed by the President with the advice and consent of the Senate. Those officials would be required to certify that any information sought by the surveillance relates to, and if concern- ing a U.S. person is necessary to, the national defense or the successful conduct of foreign affairs of the United States or the ability of the United States to protect against grave hostile acts or the terrorist, sabotage, or clandestine intelligence activities of a foreign power. The court would be required to review each certification for surveillance of a U.S. person and to determine that the certification is not clearly erroneous. The court could approve electronic surveillance for foreign intel- ligence purposes for a period of 90 days or, in the case of surveillance of It foreign government, faction, or entity openly controlled by a foreign government, for a period of up to 1 year. Any extension of the surveil- lance beyond that period would require a reapplication to the court and new findings as required for the original order. Emergency surveillance without a court order would be permitted in limited circumstances, but a court order must be obtained within 24 hours of the initiation of the surveillance. S. 1566 requires annual reports to the Administrative Office of the U.S. Courts and to the Congress of statistics regarding applications and orders for electronic surveillance. The Attorney General is also re- quired, on a semiannual basis, to inform fully the House Permanent Select Committee on Intelligence and, the Senate Select Committee on Intelligence concerning all electronic surveillance under the bill ; and nothing in the bill'restricts the authority of those committees to obtain further information related to their congressional oversight respon- sibilities. The Senate committee is required to report annually to the Senate on the implementation of the bill. Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 9 The purpose of the Foreign Intelligence Surveillance Act is to pro- vide legislative authorization and regulation for all electronic surveil- lance conducted within the United States for foreign intelligence purposes. It has long been recognized that foreign intelligence elec- tronic surveillance, exempted from the warrant provisions of the Omnibus Crime Control Act of 1968, could be subject to abuse. The re- port of the Senate Select Committee to Study Governmental Opera- tions With Respect to Intelligence Activities, issued in 1976, provided firm evidence that foreign intelligence electronic surveillances in- volved abuses and that checks upon the exercise of these clandestine methods were clearly necessary. The basic premise of the bill is that a court order for foreign intel- ligence electronic surveillances. can be devised that is consistent with the "reasonable search" requirements of the fourth amendment. The Supreme Court has not ruled on the question of Fourth Amendment standards for electronic surveillance of foreign powers and their agents within the United States, although the Court in the Keith case required a judicial warrant for domestic security surveillances not in- volving foreign powers.3 Therefore, S. 1566 clarifies and advances the development of the law on a subject where uncertainty now exists. The electronic surveillance authorized and regulated by this bill is designed to satisfy two broad types of intelligence requirements. First, it provides a means for the collection of "positive" foreign in- telligence to enable the Government to understand and assess the capa- bilities, intentions, and activities of foreign powers. Second, it supplies a technique for use in foreign counterintelligence investigations to protect against clandestine intelligence activities, sabotage, and ter- rorism by or on behalf of foreign powers. The standards and proce- dures for electronic surveillance differ according to whether the pri- mary purpose is collecting foreign intelligence or assisting foreign counterintelligence and counterterrorism investigations. A. Foreign intelligence The primary targets for electronic surveillance to collect foreign intelligence are "official" foreign powers: (1) foreign governments or their components; (2) factions of foreign nations, not substantially composed of U.S. persons; (3) entities which are openly acknowledged by foreign governments to be under their direction and control. In- formation acquired from the communications of these targets will typ- ically relate to the national defense or security of the Nation, to the successful conduct of the foreign affairs of the United States, or to the ability of the United States to protect itself against actual or po- tential attack or other grave hostile acts of a foreign power or its agents. For these types of surveillance the bill requires that a court deter- mine only whether the target is an "official" foreign power. The court does not review the basis for the executive certification that the sur- 3 United States v. United States District Coart, 407 U.S. 297 (1972). But see United States v. Butenko, 494 F. 2d 593 (3d Cir. 1974). United states V. Brown, 484 F. 2d 418 (5th Cir. 1973) ; and Twetbon v. Mitchell, 516 F. 2d 594 (D.C. Cir. 1975). Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 10 veillance is needed to acquire foreign intelligence information, nor is it given a detailed description of the nature of the information sought or the means of surveillance to be used. The surveillance may last as long as a year before a new court order is required. Even though the surveillance targets are not U.S. persons, substan- tial information about Americans may be acquired from surveillance of foreign powers. The primary role for the court in these circum- stances is to ensure compliance with the requirement for minimiza- tion procedures governing incidentally acquired information concern- ing U.S. persons. Procedures are required to insure that, if the infor- mation relates solely to national security or foreign affairs interests, it is not disseminated in a manner that identifies a U.S. person unless the person's identity is needed to understand or assess information about a foreign power or unless the information is otherwise publicly available. The i~ourt may monitor compliance with these procedures. Surveillance of certain foreign persons and certain foreign organi- zations, other than "official" foreign powers, may be conducted to ob- tain foreign intelligence. In such cases the judge is fully informed of (but does not review) the basis for the certification and is given a detailed description of the nature of the information sought and a statement of the means of surveillance to be used. Such surveillance may last only 90 days before a new court order is required. Foreign persons acting in the United States as officers or employees of foreign powers may be targeted for surveillance to collect foreign intelli- gence; but these requirements ensure that the information sought fulfills proper intelligence objectives and that the surveillance does not intrude unnecessarily into the personal privacy of the individual. U.S. citizens, resident aliens, and foreign visitors to the United States may not be targeted for surveillance to collect foreign intelli- gence unless they also meet the separate foreign counterintelligence standards regarding terrorism, sabotage, or clandestine intelligence activities, discussed below. In the case of a U.S. person, the court would review the certification that the information sought is neces- sary for national security or foreign affairs purposes. Such judicial review of the Executive Branch certification, based on a "clearly erroneous" standard, occurs only if the surveillance target is a U.S. person. In summary, the authority for surveillance to collect positive for- eign intelligence varies according to the nature of the target and the type of information sought. Because the judicial role is very limited, it is the responsibility of the Attorney General and the certifying offi- cials designated by the President to make determinations that take into account the characteristics of the foreign power, the risks involved, and the relevance of the information sought to the fulfillment of proper foreign intelligence objectives. Regular reporting to the Intelligence Committees of the House and Senate is also required to help insure that these surveillances are consistent with U.S. foreign policy, na- tional defense needs, and appropriate standards of international conduct. R. Foreign counterintelligence investigations Electronic surveillance, for foreign counterintelligence and counter- terrorism purposes requires different standards and procedures. U.S. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 CIA-RDP80SO1268A000400010002-7 persons may be authorized targets, and the surveillance is part of an investigative process often designed to protect against the commis- sion of serious crimes such as espionage, sabotage, assassination, kid- naping, and terrorist acts committed by or on behalf of -foreign powers. Intelligence and criminal law enforcement tend to merge in this area.4 The targeting of U.S. persons and the overlap with crimi- nal law enforcement require close attention to traditional fourth amendment principles. S. 1566 departs from ordinary criminal law enforcement procedures in several ways. A judicial warrant is normally granted upon probable cause that a crime has been or is about to be committed. By contrast, in some cases the bill allows issuance of a court order upon probable cause that a person's activities "may involve" a criminal violation. Unlike the provisions of the Omnibus Crime Control Act of :1968 governing surveillance in regular criminal investigations, there,is no listing of specific Federal criminal laws. Moreover, acts of sabotage and terrorism need not be violations of the criminal statutes of the United States, so long as they "would be criminal" under the laws of the United States or (in the case of terrorism) of any `State if committed within this country. No showing of criminal activity is required where the target is a foreign person who acts on behalf of a foreign power which engages in clandestine intelligence activities contrary to the interests of the United States. Additionally, surveillances conducted under S. 1566 need not stop once conclusive evidence of a crime is obtained, but instead may be extended longer where protective measures other than arrest and prosecution are more appropriate. The requirement of subsequent notice to the surveillance target is eliminated, unless the fruits are to be used against him in legal proceedings. In camera procedures are adopted for subsequent challenges to the legality of the surveil- lance. The question is whether departures from traditional Fourth Amend- ment criminal procedures "are reasonable both in relation to the legiti- mate need of Government for intelligence information and the pro- tected rights of our citizens," as required by the Supreme Court's lead- in decision decision in this field, United States V. United States District Court, 907 U.S. 297, 323 (1972). One approach to balancing these interests is the adoption of certain safeguards which are more stringent than conventional criminal pro- cedures. S. 1566 does this in two ways. First, it requires the judge to review the certification that surveillance of a U.S. person is necessary for foreign counterintelligence purposes. Because the probable cause standards are more flexible under the bill, the judge must also deter- mine that the executive branch certification of necessity is not "clearly erroneous." g Second, the bill provides for close and continuing com- ' Surveillance to collect positive foreign intelligence may result in the incidental acqui- sition of information about crimes ; but that is not its objective. By contrast, foreign counterintelligence surveillance frequently seeks information needed to detect or anticipate the commission of crimes "clea here Whehan thenprobableerroneous" cause standard standard, whichrt takes adminisati law Is meaning from the more criminal suitable law. The judge is required to review an administrative determination that, in the pursuit of a particular type of investigation, surveillance is justified to acquire necessary information. The judge may request additional information in order to understand fully how and why the surveillance is expected to contribute to the investigation. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 12 munication with the congressional committees having jurisdiction over foreign intelligence activities. Such communication is inappropriate in conventional criminal cases where the objective is primarily prose- cution and subsequent notice is served on the surveillance targets. But in the absence of notice or frequent judicial review in subsequent prosecution, as with criminal cases, congressional oversight supplies a compensating check. Even with these added safeguards, the main issue is whether the investigative process in foreign counterintelligence cases requires spe- cific departures from normal Fourth Amendment procedures. Based on its study of both electronic surveillance and foreign counterintelli- gence investigations, the Select Committee on Intelligence has con- cluded that such departures are reasonable. The need to preserve secrecy for sensitive counterintelligence sources and methods justifies elimination of the notice requirement, consolidation of judicial au- thority in a special court, and in camera procedures allowing per- sons to challenge illegal surveillance without endangering the security of legitimate surveillances. The international character of foreign terrorist activities fully supports the more flexible probable cause standard allowing sur- veillance where foreign-based terrorist activities abroad "would" violate Federal or State laws if committed here. The United States has a duty to advise other nations if foreign agents within this coun- try are mounting serious acts of violence to be committed outside our borders. We expect other countries to warn us when they learn of plans to commit serious violence in the United States; and this obli- gation should be reciprocal. The Federal Government also has an obligation to the States whose law enforcement agencies lack the capability of detecting foreign-based terrorist activities. The absence of a list. of specific Federal statutes furnishing the basis for surveillance, as in Title III, raises other considerations. With respect to terrorism, there is a limitation to violent acts on be- half of a foreign-based group which appear intended to intimidate or coerce the civilian population, to influence Government policy by in- timidation or coercion, or to affect the conduct of government by assassination or kidnaping. There is no similar definition of the terms "clandestine intelligence-gathering activities" and "any other clandestine intelligence activities." The imprecision of these terms reflects an assessment of the nature and difficulty of foreign counter- intelligence investigations. The essential point is that, if electronic surveillance is to make an effective- contribution to foreign counterintelligence, it must be avail- able for use when necessary for the investigative process. The criminal laws are enacted to establish standards for arrest and conviction; and they supply guidance for investigations conducted to collect evidence for prosecution. Foreign counterintelligence investigations have dif- ferent objectives. They succeed when the United States can insure that an intelligence network is not obtaining vital information, that a suspected agent's future access to such information is controlled effec- tively, and that security precautions are strengthened in areas of top priority for the foreign intelligance service. Prosecution is a useful deterrent, but only where the advantages outweigh the sacrifice of Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 13 other interests. Therefore, procedures appropriate in regular criminal investigations need modification to fit the counterintelligence context. S. 1566 adopts probable cause standards that allow surveillance at an early stage in the investigative process by not requiring that a crime be imminent or that the elements of a specific offense exist. Sur- veillance of clandestine intelligence gathering activities that "may involve" a criminal violation, and of persons engaged, in. activities that "may be" in preparation for sabotage or terrorism, makes it possible to discover whether a person is,likely to commit an offense in the foreseeable future. On the other hand, because of the danger to activities protected by the first amendment, the standard for "clandestine intelligence activities" other than intelligence gathering requires probable cause that such activities are pursuant to the direction of a foreign intelli- gence service and that they "involve or are about to involve" a Federal crime. The bill also provides that no U.S. person may be considered an "agent of a foreign power" solely upon the basis of activities pro- tected by the first amendment to the Constitution. Finally, foreign counterintelligence surveillance of unofficial -foreign visitors to the United States must meet. the same probable cause stand- ard as surveillance of U.S. persons. unless they act on behalf of par- ticular foreign governments which engage in clandestine intelligence activities contrary to U.S. interests. Such surveillance is limited to persons who. on the basis of past experience with a particular foreign government, are reasonably believed to have clandestine intelligence assignments from the foreign government. It is intended to apply to visitors acting for foreign governments such as the Soviet Union which have used such visitors to the United States for clandestine intelligence purposes. This provision is tailored .to demonstrated for- eign counterintelligence requirements. To summarize, the select committee's review of U.S. foreign counter- intelligence requirements confirms the current relevance of the state- ment made 20 years ago in a study by the Fund for the Republic : The problems of crime detection in combating espionage are not ordinary ones. Espionage is a crime which succeeds only by secrecy. Moreover, spies work not for themselves or pri- vately organized crime "syndicates," but as agents of national states. Their activities are therefore likely to be carefully planned, highly organized, and carried on by techniques skillfully designed to prevent detection.? The response of, the United States to such threats must be equally sophisticated, and S. 1566 provides techniques to satisfy this need. C. Foreign intelligence surveillance and the fourth amendment S. 1566 embodies a legislative judgment that court orders and other procedural' safeguards are necessary to insure that' electronic sur- veillance by the U.S. Government within this country conforms to the fundamental principles of the fourth amendment. The bill has been designed carefully to accommodate the two basic subdivisions of 6 Fund for the Republic, Digest of the Public Record of Communism in the United States' (New York, 1955), p. O. Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 14 United States intelligence requirements-collection of positive foreign intelligence and of information needed for foreign counterintelligence and counterterroism investigations. In the first instance, surveillance solely to collect foreign intel- ligence is not targeted against U.S. citizens or resident aliens and dis- tinctions are made among "official" foreign powers, other types of foreign organizations, and foreign persons who act as officers or em- ployees of foreign powers. Because the purpose is unrelated to law en- forcement and the targets are foreign powers or their officials, the fourth amendment may allow wider latitude in conducting reason- able research or surveillance operations designed to serve important national defense and foreign affairs interests. As former Attorney General Levi stated : "[A] central concern of the fourth amendment was with intrusions to obtain evidence to incriminate the victim of the search. This concern has been reflected. in Supreme Court decisions which have traditionally treated intrusions to gather incriminatory evidence differently from intrusions for neutral or benign purposes.... Where the purpose or ef- fect is noncriminal, the search and seizure is perceived as less troublesome and there is a readiness to find reasonable- ness even in the absence of a judicial warrant. By contrast, where the purpose of the intrusion is to gather incriminatory evidence, and hence hostile, or when the consequence of the intrusion is the sanction of the criminal law, greater protec- tions may be given.? Although foreign persons are protected by the fourth amendment when they are in the United States," the noncriminal purpose, the limitation: to officers or employees acting as such in the United States and the certification requirements satisfy the "reasonable search" standard of the Fourth Amendment as it may apply to surveillance conducted solely for the collection of foreign intelligence. Court or- ders simply ensure that the targets fit the categories and that minimi- zation procedures limit the acquisition, retention, and dissemination of incidentally acquired information about U.S. persons. Congressional review supplies an added check. Foreign counterintelligence surveillance may target U.S. persons and' may involve detection of crimes, even though criminal prosecu- tion may not result. The departures here from conventional Fourth Amendment doctrine have, therefore, been given close scrutiny to ea1- sure that the procedures established in S. 1566 are reasonable in rela- tion tolegitimate foreign counterintelligence requirements and the protected rights of individuals. Their reasonableness depends, in part, upon an assessment of the 'difficulties of investigating activities plan- ned, directed, and supported from abroad by foreign intelligence serv- ices and foreign-based terrorist groups. The differences between ordi- nary criminal investigations to gather evidence of specific crimes and foreign counterintelligence investigations to uncover and monitor clandestine activities have been taken into account. Other factors in- z Church Committee Hearings, Vol. 5, pp. 75-76. See Camara v. Municipal Court, 387 U.S. 523 (1967) ; Almeida-Sanchez v. United States, 413 U.S. 266 (1973). B Abel v. United States, 362 U.S. 217 (1960). Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 15 elude the international responsibilities of the United States, the duties of the Federal Government to the States in matters involving foreign terrorism, and the need to maintain the secrecy of lawful counter- intelligence sources and methods. An effort has been made to balance the need for surveillance at earlier stages of the investigative process and the protection afforded by the Fourth Amendment's requirement that searches for normal criminal law enforcement purposes be conducted only where a crime has been or is about to be committed. Because of the wider latitude granted by the bill, judicial review of the necessity for surveillance of U.S. persons and regular congressional oversight are required to en- sure the proper exercise of administrative discretion. That these departures from traditional Fourth Amendment crimi- nal law enforcement standards are constitutional is supported by the Supreme Court's opinion in the Keith case. Although considering do- mestic security surveillance, the principles apply with even greater force to foreign counterintelligence surveillance. Justice Powell's Opinion for the court states : [W]e do not hold that the same type of standards and procedures prescribed by title III are necessarily. applicable to this case. We recognize that domestic security surveillance may involve different policy and practical considerations from the surveillance of "ordinary crime." The gathering of security intelligence is often long range and involves the interrelation of various sources and types of information. The exact targets of such surveillance may be more difficult to identify than in surveillance operations against many types of crime specified in title III. Often, too, the emphasis of domestic intelligence gathering is on the prevention of unlawful activity or the enhancement of the Government's preparedness for some possible future crisis or emergency. Thus, the focus of domestic surveillance may be less precise than that directed against more conventional types of crime. Given these potential distinctions between title III criminal surveillances and those involving the domestic "security, Con- gress may wish to consider protective standards for the latter which differ from those already prescribed for specified crimes in title III. Different standards may be compatible with the fourth amendment if they are reasonable both in relation to the legitimate need of Government for intelli- gence information and the protected rights of our citizens. For the warrant application may vary according to the gov- ernment interest to be enforced and the nature of citizen rights deserving protection ... It may be that Congress, for example, would judge that the application and affidavit show- ing probable cause need not follow the exact requirements of section 2518 [of title 18] but should allege other circumstances more appropriate to domestic security cases; that the request for prior court authorization could, in sensitive cases, be made to any member of a specially designated court ... ; and that the time and reporting requirements need not be so strict, as those in section 2518. Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 16 The above paragraph does not, of course, attempt to guide the congressional judgment but rather to delineate the pres- ent scope of our own opinion.... We do hold, however, that prior judicial=approval is required for the type of domestic security surveillance involved in this case and that such ap- proval may be made in accordance with such reasonable,. standards as the Congress may prescribe. United States v. United States District Court, 407 U.S. 297, 322-324 (1972). Far more than in domestic security matters, foreign counterintel- ligence investigations are "long range" and involve "the interrela- tion of various sources and types of information." Targets are often "difficult to identify," and the emphasis is primarily "on the preven- tion of unlawful activity." Where foreign governments and foreign- based organizations are the source of the danger, the Government clearly must prepare for a "possible future crisis or emergency." When clandestine intelligence and terrorist activities are planned, directed, and supported from abroad, rather than within the United States,.the investigative task is extraordinarily difficult. Therefore, the focus of. surveillance of suspected foreign agents must "be less precise" if the United States is to maintain adequate security. The Select Committee on Intelligence believes the standards and procedures of S. 1566 reconcile national intelligence and counterin- telligence needs with constitutional principles in a way that is con- sistent with both national security and individual rights. S. 1566 would allow electronic surveillance in circumstances where, because of uncertainty about the legal requirements, the Government may other- wise be reluctant to use this technique for detecting dangerous foreign intelligence and terrorist activities by foreign powers in this country. At the same time it provides safeguards that have not existed before and that may reasonably be expected to prevent any recurrence of the abuses of the past. SECTION-BY-SECTION ANALYSIS Section 1 of the bill provides that the act may be cited as the "Foreign Intelligence Surveillance Act of 1978". Section 2 of the bill amends title 18, United States Code by adding a new chapter 120 composed of sections 2521-2528 as follows : Section 2601 Subsection (a) provides that, except for those terms specifically defined in this section, the definitions of chapter 119 relating to the interception of wire and oral communications apply to this chapter as well. A. "Foreign power" Subsection (b) (1) defines "foreign power" in six separate ways: (1) "A foreign government or any component thereof, whether or not recognized by the United States." This category would include foreign embassies and consulates and similar official foreign govern- ment establishments that are located in the United States. (2) "A faction of a foreign nation or nations, not substantially composed of permanent resident aliens or citizens of the United States. '? Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 17 This category is intended to include factions of a foreign nation or nations which are in 'a contest for power over, or control of the territory of, a foreign nation or nations. The faction must be foreign-based and controlled from abroad. Specifically excluded from this category is any faction of a foreign government or governments which is substantially composed of permanent resident aliens or citizens of the United States. The word "substantially" means a significant proportion, but less than a majority. (3) "An entity, which is openly acknowledged by a foreign govern- ment or governments to be directed and controlled by -such foreign government or governments." This category is specifically delineated in order to treat entities of this type in the same manlier as the gov- ernment they serve by including them within those "official" foreign powers subject to court-ordered surveillance under a less stringent standard. That standard permits less information to be given to the judge and allows the surveillance to be continued for a longer period of time before reauthorization. Only entities "openly acknowledged" by a foreign government to be directed and controlled by it are sub- ject to the extended court orders granted on a lesser showing. Those entities which are clearly arms of a government or govern- meats and not privately controlled meet this definition. This category would permit surveillance, for example. of a legitimate commercial establishment which is directed and controlled by a foreign govern- ment and which, because of the nature of its operations, constitutes a source of foreign intelligence information otherwise unavailable to the U.S. Government. The committee is concerned about the possibility that many innocent U.S. persons might be employed by such entities, and that their offices and telephones could be subject to surveillance. The committee would have preferred that only entities not substantially composed of U.S. persons could be subject to surveillance as "foreign powers." If such, this requirement had been included in the bill, however, those entities could have hired a substantial number of Americans'in order to avoid surveillance. To provide adequate protection for Americans, the Com- mittee strengthened the "minimization" requirements to limit strictly the dissemination of information about U.S. persons where such infor- mation relates solely to national security or foreign affairs interests. See section 2521(b) (8), infra. A law firm, public relations firm, or other legitimate concern that merely represents a foreign government or its interests is not an entity in this category. The question whether a group, commercial enterprise, or organization comes within 'the scope of this definition is one for the court to answer on the basis of a probable cause standard. (4) "A foreign-based terrorist group." This category refers to a foreign-based group engaged in "terrorism," as defined. The committee recognizes that international terrorist groups may have members from various nations and may not have any clearly definable "base." Under this definition the group must be "foreign-based"; that is, it may not bbased in the United States. It is the committee's belief that a domestic terrorist group should not be subjected to electronic surveil- lance pursuant to this chapter. Where a group is not domestically based, but derives strength and refuge by organizing, planning; and Approved2 y,RP glepse 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 1S preparing its terrorist activities or training its members outside the United States, then that group is a legitimate target for intelligence surveillance under this bill no matter what the citizenship of its members. The committee does not intend to authorize electronic surveillance under any circumstances for the class of groups included by the Supreme Court within the scope of the Keith, decision requiring ju- dicial warrants for alleged threats to security of a purely domestic nature. The rare case might arise where a foreign-based terrorist group is substantially composed of U.S. persons. The judge must examine the circumstances carefully in order to determine whether the orga- nization is a foreign-based terrorist group and not a domestic group with some foreign aspects to it. If there is significant doubt whether it terrorist group substantially composed of U.S. persons is foreign- based, the committee intends that this bill not apply. Instead, the Government may rely upon the domestic law enforcement surveillance procedures of title III of the Omnibus Crime Control Act of 1968, contained in chapter 119, United States Code. (5) "A foreign-based political organization, not substantially com- posed of permanent resident aliens or citizens of the United States." This category is intended to include, for example, foreign political parties that are mere instrumentalities of a foreign government and that are not substantially composed of Americans. This category clearly does not include organizations comprised of Americans of Greek, Irish, Jewish, Chinese, or other extraction who have joined to- gether out of interest in or concern for the country of their ethnic origin. (6) "An entity, which is directed and controlled by a foreign gov- ernment or governments." This category is similar to category (3) above, except that the entity need not be openly acknowledged to be directed and controlled by a foreign government or governments. Such an entity must be acting as arm of the government with respect to the activities that are of foreign intelligence or counterintelligence sig- nificance. An example would be an entity which appears to be a legiti- mate commercial establishment, but which is being utilized by a foreign government as a cover for espionage activities. The concerns set forth with respect to openly controlled entities apply to this category as well. There is an added danger that electronic surveillance of a covertly controlled entity, substantially composed of U.S. persons, would offer a means for evading the requirements for surveillance of individual U.S. persons. Therefore, it is important to emphasize that the judge must persons. probable cause that the entity is both "directed" and "controlled" by a foreign government or governments. Merely following the directions of a foreign government which wants a group to lobby or speak out publicly on behalf of the government's interests, is not it itself sufficient to place the group in this category. A revised definition of "United States person" insures that, where the entity is substantially composed of American citizens or perma- ment resident aliens, minimization procedures will apply, and the judge will review, applying a "clearly erroneous" standard, the cer- tification that surveillance of the entity is needed to acquire foreign intelligence information. See section 2521(b) (9), infra. Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 19 B. "Agent of a foreign power" Subsection (b) (2) defines an "a ent of a foreign power" in two separate ways. Subparagraph (A)1) includes persons who are not U.S. persons and who act in the United States as officers or employees of a foreign power. The definition is framed in this way because it is presumed that nonresident aliens who act in the United States as officers or employees of a foreign power are likely sources of foreign intelligence or counterintelligence information. The definition ex- cludes persons who serve as officers or employees of a foreign power in their home country, but do not act in that capacity in the United States. The reference to employees of a foreign power is meant to include those persons who have a normal employee-employer relation- ship. The subparagraph is otherwise not intended to encompass such foreign visitors as professors, lecturers, exchange students, performers, or athletes, even if they are receiving remuneration or expenses from their home government in such capacity. Given the tenuous relationship of such officers and employees with the United States and their close relationship with a foreign power, this standard is considered to be reasonable in light of the Govern- ment's legitimate need for foreign intelligence and counterintelligence information and the nature of the interests upon which the search would intrude. There are several other limitations on such surveillance. An executive official must certify that the information sought from sur- veillance of an officer or employee of a foreign power relates to the national defense or security or to the successful conduct of foreign affairs, or that such information relates to the ability of the United States to protect against grave hostile acts, sabotage, terrorism, or clandestine intelligence activities. The committee does not intend that there should be indiscriminate surveillance of officers or employees of foreign powers within the United States. The judge will be in- formed of the type of information sought and the means by which the surveillance. will be effected; and the surveillance may last no longer than 90 days before reauthorization. The judge will not, how- ever, review the Executive Branch certification of need for the sur- veillance. Subparagraphs (A) (ii) and (B) (i)-(iv) of subsection (b) (2) comprise the second definition of "agent of a foreign power." They define an agent in terms of the activities in which he is or may be engaged, or may engage, for or on behalf of a foreign power. 1. Foreign visitors Subparagraph (A) (ii) defines an agent of a foreign power as a person who is not a U.S. person and who- * * * acts for or on behalf of a foreign power which engages in clandestine intelligence activities contrary to the interests of the United States, when the circumstances of such person's presence in the. United States indicate that such person may engage in such activities in the United States, or when such person knowingly aids or abets any person in the conduct of such activities or conspires with any person knowing that such person is engaged in such activities. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 20 This category could potentially include any foreign visitor to the United States, but only if such visitor is acting for or on behalf of certain foreign powers. There is no specific requirement to show that the person may engage in activities which violate Federal criminal statutes. This separate noncriminal standard for foreigners acting for or on behalf of certain foreign powers is a significant change from S. 3197, reported favorably by the committee during the 94th Congress, which treated foreign visitors the same as United States persons. It also dif- fers from the foreign visitor standard proposed in S. 1566, as reported by the Judiciary Committee, which did not distinguish among the foreign powers for or on behalf of which a foreign visitor might act. Concern has been expressed that, because the fourth amendment to the Constitution speaks in terms of protecting all "persons"-not just U.S. citizens and permanent resident aliens-the bill should not estab- lish a different standard for foreign visitors. The committee has taken this concern into account in developing a standard that would satisfy compelling foreign counterintelligence requirements without subject- ing foreign visitors to unequal treatment simply on the basis of their status as nonresident aliens. Where there are compelling considerations of national security, alienage distinctions are lawful.? Those distinctions must, however, he carefully tailored to the demonstrated need and not be overly broad in their effects. That need has been established only with respect to for- eign visitors who act for or on behalf of certain foreign powers. For example, the Senate Select Committee to Study Governmental Opera- tions with Respect to Intelligence Activities (the Church committee) pointed out that one quarter of the Soviet exchange students coming to the United States in a 10-year period were found by the FBI to be in- telligence officers. '? There is substantial information that each Soviet visitor to the West is approved by the Soviet security services, which control their passports and other aspects of their activities. It is rea- sonable to presume that certain Soviet visitors are either intelligence agents or "cooptees" who cooperate with Soviet intelligence. To the extent that other nations engage in similar practices, a comparable need arises. If the Government can show, from experience, that a particular foreign power uses a certain class of visitors to this country for carry- ing out secret intelligence assignments, it is not necessary to show that a visitor who falls into this class actually has an intelligence assignment. As a practical matter in such circumstances, less intrusive investiga- tive techniques may not enable the Government to obtain sufficient information about persons visiting the United States only for a limited time. Therefore, the additional showing required for U.S. persons may simply not be possible. What is required instead is a judicial finding of probable cause to.believe that the person is acting for or on behalf of a foreign power which engages in clandestine intelligence activities con- trary to the interests of the United States. The term "interests" refers to important and long-term goals of the United States, including inter- - see, e.g., Hampton v. 3iow Sun Wong, 426 U.S. 88, 116 (1976). x0 Ftnat Report, book I, p. 164. Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 21 ests embodied in law. The Committee does not intend to include foreign governments whose clandestine intelligence activities are merely con- trary to U.S. policy, rather than contrary to the law or other national interests. Once the requisite facts with regard to the country are estab- lished, the question is whether the circumstances of the person's presence in the United States indicate that the person may engage in such activities. The answer to this question will vary according to what we know about the intelilgence operations of the particular foreign power. Among the factors that might be taken into account are whether the foreign visitor is in the United States under the auspices of the foreign power and whether he engages in activities with respect to which there is evidence that other visitors who engage in similar activi- ties are officers or agents of the intelligence service of that foreign power or a cooperating foreign power. The standard "may engage in such activities" means that surveil- lance can be conducted to anticipate clandestine intelligence activi- ties by'such persons, rather than waiting until after they have taken place. The additional standards for aiding or abetting, and conspiracy, require probable cause that the foreign visitor is knowingly assisting persons who are already engaged in harmful clandestine intelligence activities. The "knowingly" requirements are the same as in the aiding or abettin and conspiracy standard for U.S. persons. See section 2521 (b) (2) (B-11, (iv), infra. This provision does not treat nationals of certain countries dif- ferently from others solely on the basis of their nationality. Instead, coverage of the nationals of other countries depends on the activities of the governments of those countries and whether the individual is acting on behalf of the government. 2. Clandestine intelligence gathering Subparagraph (B) (i) allows surveillance of any person, includ- ing a U.S. person, who is knowingly engaged in clandestine intelli- gence gathering activities for or on behalf of a foreign power, which activities involve. or may involve a violation of the criminal statutes of the United States. Under this standard the person to be under surveilance must be shown to have a knowing and substantial connec- tion with the foreign power for which he, is working. There must be a relationship under which the alleged agent has undertaken to pro- vide services for the foreign power. The Committee wishes to stress that this bill is not intended to authorize electronic surveillance under any circumstances for the class of individuals who pose alleged threats to security of a purely domestic nature for which the Supreme Court required a warrant in the Keith case. The agent must also be knowingly engaged in "clandestine intelli- gence gathering activities" that involve or may involve violations of Federal criminal law. It is anticipated that most of the persons under surveillance under this subparagraph will be violating the criminal espionage laws which appear in title 18, United States Code, sections 792-799, 951; title 42, United States Code, sections 2272-2278b ; and title 50; United States Code, section 855. The term "clandestine intel- ligence gathering activities" includes collection or transmission of in- Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 22 formation or material that is not generally -available to the public, or covert contacts with an intelligence service or network by means of "drops" or other methods characteristic of foreign intelligence op- erations. In addition to activities that fall within the substantive stat- utory definition of spying are activities directly related to spying that may constitute violations of laws proscribing the aiding and abetting of spying, such as maintaining a "safehouse" for secret meetings, serv- icing "letter drops" to facilitate covert transmission of instructions or information, recruiting new agents, or infiltrating and exfiltrating agents under deep cover to and from the United 'States. Apart from the types of activities specifically proscribed by the espionage laws, this subparagraph is also intended to permit the sur- veillance of foreign intelligence agents who are collecting industrial or technological information which, if disclosed to a hostile foreign power, might present a threat to the security of the Nation. In such a case, the Government would have to establish that the agent was col- lecting or transmitting such information in a manner which might involve a violation of some other Federal statute, such as title 18, United States Code, section 2514, which proscribes the interstate trans- portation of, stolen property. In some cases the knowing transfer of technological information to a foreign country without a license from the Federal Government might be unlawful under the "Export Ad- ministration Act," title 50, United States Code, sections 2021-2032 or the International Traffic in Arms Regulations (22 CFR 121 et seq.). Otherwise, clandestine collection of information regarding the un- classified business plans or trade secrets of an American company which merely might provide a competitive advantage to private foreign firms, for example, in bidding on a contract with a third country, would not be "clandestine intelligence gathering activity." Moreover, the gathering of information which is done in a con- fidential manner as part of lawful political activity-such as gather- ing "intelligence" about the political strength and plans of proponents or opponents of a particular policy-would not constitute "clandes- tine intelligence gathering activity" under this subparagraph, where such information gathering is a normal ancillary part of lobbying, organizing political protest, and other political activity protected by the first amendment. In the case of an organization whose leaders are engaged in clan- destine intelligence gathering activities, such activity cannot be at- tributed to every member of the group. There must be probable cause that a particular member is himself engaged in such activity before electronic surveillance targeted against him may be'authorized under this subparagraph. Whatever the nature of the information or material gathered or transmitted by the foreign agent, there must be a clandestine aspect. The bill requires that the alleged foreign agent not only be working for or on behalf of a foreign power, but also, as a separate require- ment, that he be engaged in clandestine intelligence gathering 'activity. There must also be an effort to obtain information which is being kept secret or is not otherwise generally available to the public, or not available to the general public. Therefore, the collection, for whatever purpose, of information within the public domain such as that con- Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/233 CIA-RDP80S01268A000400010002-7 tained in books, magazines, scientific journals, or newspapers would not constitute "clandestine intelligence gathering activity" under this subparagraph. The words "may involve" as used in this subparagraph are not intended to encompass individuals whose activities clearly do not vio- late Federal law. They are intended to encompass individuals engaged in clandestine intelligence gathering activities which may, as an in- tegral part of those activities, involve a violation of Federal law. They cover the situation where the Government cannot establish probable cause that the foreign agent's activities involve a specific criminal act, but where there are sufficient specific and articulable facts to indi- cate that a crime may be involved. This "may involve" standard replaces the previous noncriminal standard which appeared in S. 3157, as reported favorably by the committee during the 94th Congress, and in S. 1566 as reported by the Judiciary Committee. Both the former provision, and the "may in- volve" standard, address the same problem. The committee has con- cluded that it is necessary in order to permit the Government to investigate adequately in cases such as those where Federal agents have witnessed "meets" or "drops" between a hostile foreign intelli- gence officer and a citizen who might have access to highly classified or similarly sensitive information; information is being passed, but the Federal agents have been unable to determine precisely what infor- mation is being transmitted. Such a lack of knowledge would of course disable the Government from establishing that a crime was involved or what specific crime was being committed. Nevertheless, the Commit- tee- believes that the circumstances might be such as to indicate that the activity may involve a crime. The crime involved might be one of several violations depending, for example, upon the nature of the information being gathered. In applying this standard, the judge is expected to take all the known circumstances into account-who the person is, where he is employed, whether he has access to classified or other sensitive informa- tion, the nature of the clandestine meetings, the method of transmission, and whether there are any other reasonable explanations for the behav- ior. It is intended, moreover, that the circumstances must not merely be suspicious, but must be of such a nature as to lead a reasonable man to conclude that there is probable cause to believe the activity may involve a Federal criminal violation. The term "may involve" not only requires less information regard- ing the crime involved, but also permits electronic surveillance at some point prior to the time when a crime sought to be prevented, for exam- ple transfer of classified documents, actually occurs. There does not have to be a current or imminent violation if there is probable cause that criminal acts may be committed. The committee recognizes that an argument can be made. that a person could be surveilled for an inordinate period of time. That is clearly not the intention. Indeed, even upon an assertion by the Government that an informant has claimed that someone has been instructed by a foreign power to go into "deep cover" for several years before actually commencing his espio- nage activities, such facts would not necessarily be encompassed by the phrase "may involve." Under the extension provisions of section Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 4CIA-RDP80SO1268A000400010002-7 2525(c), discussed infra, the judge can insist on examining the fruits of any earlier surveillance when it is necessary to determine whether there is probable cause to believe that the individual is engaged in clandestine intelligence gathering activities that "may involve" a Fed- eral criminal violation. Surveillance cannot be justified unless there is probable cause to believe that the person is, currently, engaged in such activities, even though the relationship of those activities to a specific law violation may be more uncertain or remote in time. Finally, it is necessary that the person be aware lie is acting for or on behalf of a foreign power. A person might be secretly collecting in- formation about important technology, for example, and have been misled into the belief that he was acting for a research institute or a multinational corporation. Surveillance of such person would not meet the standard of this subparagraph. It also follows, of course, that evidence of efforts of a foreign power to recruit a person as an agent would not suffice to establish probable cause to believe the person has agreed to do the foreign power's bidding and is engaged on its behalf. Before electronic surveillance could be directed against such person, the court would have to find probable cause that he has been acting for that power's intelligence network. 3. Other clandestine intelligence activities Subparagraph (B) (ii) allows surveillance of any person, includ- ing a U.S. person, who pursuant to the direction of an intelligence service or network of a foreign power knowingly engages in any other clandestine intelligence activities for or on behalf of such foreign power, which activities involve or are about to involve a violation of the criminal statutes of the United States. Under this standard the person must not only have a knowing and substantial connection with the foreign power, but he also must be acting pursuant to the direction of a foreign intelligence service or network. The words "involve or are about to involve" are intended to re- quire that a Federal crime must have already been committed, or must be about to occur, before surveillance is justified under this subpara- graph. These more stringent requirements are necessary because of the nebulous character of the term "any other clandestine intelligence activities," which can border upon the exercise of rights protected by the first amendment. Such intelligence activities may include covert actions designed by an intelligence service of a foreign power to influence events in this country. However, only if such covert polit- ical action involves a present or imminent violation of federal crimi- nal law, such as title 18, United States Code, section 2&1 (bribery of public officials) and is undertaken pursuant to the direction of an intelligence service of a foreign power, would it be encompassed by this subparagraph. It does not authorize electronic surveillance under any circumstances for the class of individuals who pose alleged threats to security of a domestic nature for which the Supreme Court re- quired a judicial warrant in the Keith case. It is the intent of this requirement that even if there is some sub- stantial contact between domestic groups or individual citizens and a Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 25 foreign power, as defined in this bill, no electronic surveillance under this subparagraph may be authorized unless the American is acting under the direction of an intelligence service of a foreign power. Ex- cluded, for example, are Americans of Greek, Jewish, Irish, or Chinese extraction who legitimately seek to influence U.S. policy toward the country of their ethnic origin. In the process, such Americans are likely to be in communication with representatives of the governments of those countries in order to learn about particular situations or problems. If an American formulates lobbying efforts in part on the basis of such advice or suggestions he could, in one sense, be said to be following the direction of a foreign power. But this subparagraph requires that the agent act pursuant to the "direction of an intelligence service or network of a foreign power." Thus, such direction from per- sons who are not connected with an intelligence service or network would not be a basis for electronic surveillance under this subpara- graph. There would have to be information specifically indicating the Americans had undertaken to do the bidding of an intelligence service or network, or its agents, rather than merely acting because of an affinity for the same concerns as that foreign power. Mutual goals or common concerns are not sufficient. Another example of Americans having contact with foreign powers is the case of Americans who were active in the protest against U.S. involvement in Vietnam. Some of them may have attended interna- tional conferences at which there were representatives of foreign powers, as defined in the bill, or may have been directly in communica- tion with foreign governments concerning this issue. There may have been an exchange of information about activities protesting the Viet- nam war. But if there merely was evidence that an American was coordinating the dates of planned peace demonstrations in the United States to coincide with similar activities abroad in order to maximum worldwide public attention, that would not suffice to find probable cause that the American was acting under the direction of a foreign intelligence service as required by this subparagraph. Additional evidence would have been required indicating that the American had undertaken to follow the instruction of a foreign in- telligence service or network, rather than simply trying to coordinate his independent effort with related activities abroad. For both of these illustrations, it should be emphasized that even if there was probable cause to believe an American was acting pursuant to the direction of a foreign intelligence service, the court would also have to find probable cause to believe that the American had com- mitted or was about to commit a Federal crime. This is a separate and distinct requirement. Further, an organization substantially composed of Americans, whether residing in the United States or abroad, would not come within the definition of acting pursuant to the direction of a foreign intelligence service merely because it was part of a worldwide con- federation of national organizations. Even if a domestic organization were found to be acting through its leaders at the direction of a foreign intelligence service, an individual's mere membership in that organization, without more information about his own undertaking to do so, would not constitute probable cause to believe that that par- Approveq_ pX-Feel?ase 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 26 titular member was acting pursuant to the direction of a foreign in- telligence service for purposes of this subparagraph. It is necessary that the person be aware he is acting on behalf of a foreign power. It would not suffice to establish probable cause that the American is engaged in a covert activity at the direction of a foreign power; the government must establish probable cause that the Ameri- can knows his efforts are on behalf of a foreign power. 4. Sabotage or terrorism Subparagraph (B) (iii) allows surveillance of any person, includ- ing a U.S. person, who knowingly engages in sabotage or terrorism, or activities which are or may be in preparation therefor, for or on be- half of a foreign power. This standard differs from S. 3197, as reported favorably by the committee in the 94th Congress, which covered any person who "knowingly engages in or knowingly acts in furtherance of," sabotage or terrorism for or on behalf of a foreign power. It also differs from S. 1566, as reported by the Judiciary Committee, which adopted the standard "knowingly engages in activities that involve or will involve sabotage or terrorism for or on behalf of a foreign power." The committee has'modified these earlier standards in order to accommodate the need to anticipate serious terrorist crimes. The words "will involve" in the bill as reported by the Judiciary Com- mittee require too high a degree of certainty that terrorism will take place, especially compared to the "may involve" standard for spying in subparagraph (B) (i) . The terms "sabotage" and "terrorism" are defined separately and require a showing of criminal activity. Again, in no event is mere sympathy for, identity of interest with, or vocal support for the goals of a foreign group, even a foreign-based terrorist group, suf- ficient to justify surveillance under this subparagraph. The term "ac- tivities which are or may be in preparation" for sabotage or terrorism is intended to encompass activities supportive of acts of serious violence-for example, purchase or surreptitious importation into the United States of explosives, planning for assassinations, or financing of or training for such activities. The term "preparation" does not require evidence of preparation for one specific terrorist act, because the definition of "terrorism" speaks of "violent acts" and means a range of acts, not just a single act. "Prepara- tion" normally means preparation for a specific crime, which might be too strict a standard for surveillance under this bill. However, the term "preparation" would not have its normal meaning because of the special definition of "terrorism." It could reasonably be interpreted to cover, for example, providing the personnel, training, funding, or other means for the commission of acts of terrorism, rather than one partic- ular bombing. The "preparation" provision is also adopted in order to permit electronic surveillance at some point before the danger sought to be prevented-for example, a kidnaping, bombing, or hijacking, ac- tually occurs. This standard is in no way intended to dilute the re- quirement of knowledge, or the requisite connection with a foreign power. Concern has been expressed that this subparagraph could permit surveillance solely on the basis of information that someone might com- Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 CIA-RDP80S01268A000400010002-7 27 mit acts of terrorism or sabotage in the distant future. This is clearly not the intent of the committee. There must be a showing of ac- tivities which may be in preparation for the commission of such acts. The committee has concluded, however, that surveillance is justified on the basis of somewhat less information regarding the nature of this activity than would be required in the absence of the words "may be." Under the extension provisions of section 2525 (c), discussed infra, the judge can insist on examining the fruits of any earlier sur- veillance when it is necessary to determine whether there is still prob- able cause to believe that the individual may be preparing.for sabotage or terrorism. This subparagraph would allow surveillance where the Government cannot establish probable cause that an individual has knowingly en- gaged in. preparation for sabotage or terrorism, but where there are sufficient specific and articulable facts to indicate that the individual's activities may be in preparation for sabotage or terrorism. As with the "may involve" standard of subparagraph (B) (i), the judge is expected to take all the known circumstances into account. The circumstances must be such as would lead a reasonable man to conclude that there is probable cause to believe the person is knowingly engaged in activities which may be in preparation for sabotage or terrorism. Finally, any person targeted for surveillance under this subpara- graph must be shown to have a knowing and substantial connection with the foreign power for whom lie is working. In the case of ter- rorism, it is anticipated that in most cases this connection will be shown to exist with a foreign-based terrorist group. The person must be clearly and knowingly acting for or on behalf of the foreign power itself. As elsewhere in this bill, the committee-does not intend to au- thorize electronic surveillance under any circumstances in which a warrant would be required by the Supreme Court decision in the Keith case. The rare case might arise where a U.S. person is acting for or on behalf of a foreign-based terrorist group that is substantially com- posed of U.S. persons. In such a case, the judge must examine the cir- cumstances carefully in order to determine whether the organization is, a foreign-based terrorist group and not a domestic group with some foreign aspects to it. Where there is significant doubt as to whether a terrorist group substantially composed of U.S. persons is foreign-based, the committee intends that the provisions of this bill should not apply to a person acting for or on behalf of such group. In- stead, the Government may rely on the domestic law enforcement sur- veillance procedures of title III of the Omnibus Crime.Control Act of 1968, contained in chapter 119, of title 18, United States Code. 5. Aiding or abetting and conspiracy Subparagraph (B) (iv) allows surveillance of any person, includ- ing a U.S. person, who knowingly aids or abets any person in the con- duct of activities described in subparagraphs (B) (i) - (iii) above, or conspires with any person knowing that such person is engaged in such activities. The knowledge requirement is applicable to both the status of the person being aided by the proposed subject of the sur- Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 28 veillance and the nature of the activity being promoted. This stand- ard requires the Government to establish probable cause that the prospective target knows both that the person with whom he is con- spiring or whom he is aiding or abetting is engaged in the described activities as an. agent of a foreign power and that his own conduct is assisting or furthering such activities. The innocent dupe who unwit- tingly aids a foreign intelligence officer cannot be targeted under this provision. In the case of a person alleged to be knowingly aiding or abetting those engaged in terrorist activities on behalf of a foreign power, such a person might be assisting a group engaged in both law- ful political activity and unlawful terrorist acts. In such a case, it would be necessary to establish probable cause that the individual was aware of the terrorist activities undertaken by the group and was knowingly furthering them, and not merely that he was aware of and furthering the group's lawful activity. An illustration of the "knowing" requirement is provided by the case of Dr. Martin Luther King. Dr. King was subjected to electronic surveillance on "national security grounds" when he continued to associate with two advisers whom the Government had apprised him were suspected of being American Communist Party members and, by implication, agents of a foreign power. Dr. King's mere continued association and consultation with those advisers, despite the Govern- ment's warnings, would clearly not have been a sufficient basis under this bill to target Dr. King as the subject of electronic surveillance. Indeed, even if there had been probable cause to believe that the advisers alleged to be Communists were engaged in criminal clandes- tine intelligence activity for a foreign power within the meaning of this section, and even if there were probable cause to believe Dr. King was aware they were acting for a foreign power, it would also have been necessary under this bill to establish probable cause that Dr. King was knowingly engaged in furthering his advisers' criminal clandes- tine intelligence activities. Absent one or more of these required show- ings, Dr. King could not have been found to be one who knowlingly aids or abets a foreign agent. 6. First amendment proviso Subparagraph (B)(iv) concludes with a proviso which applies to all the foregoing standards for surveillance of U.S. persons. It pro- vides that no U.S. person may be considered an agent of a foreign power solely upon the basis of activities protected by the first amend- ment to the Constitution of the United States. This provision is intended to reinforce the intent of the committee, stated earlier, that lawful political activities should never be the sole basis for a finding of probable cause to believe that a U.S. person is an agent of a foreign power. For example, the advocacy of violence falling short of incitement is protected by the first amendment, under the Supreme Court's decision in Brandenburg v. Ohio, 395 U.S. 444 (1969). Therefore, the pure advocacy of the commission of terrorist acts would not, in and of itself, be sufficient to estabilsh probable cause that an individual may be preparing for the commission of such acts. Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/2x: CIA-RDP80SO1268A000400010002-7 The committee does not intend that information concerning pure advocacy of violence should be completely excluded from considera- tion by the judge in making such a probable cause finding, if facts regarding other activities not protected by the first amendment, such as the purchase of a weapon, are present. Activities not protected by the first amendment, however, must be the primary basis for the prob- able cause finding. The bill is not intended to authorize electronic surveillance when a United States person's activities, even though secret and conducted for a foreign power, consist entirely of lawful acts such _as lobbying or the use of confidential contacts to influence public officials, directly or indirectly, through the dissemination of information. Individuals exercising their right to lobby public officials or to engage in political dissent from official policy may well be in contact with representatives of foreign governments and groups when the issues concern foreign affairs or international economic matters. They must continue to be free to communicate about such issues and to obtain information or exchange views with representatives of foreign governments or with foreign groups, free from any fear that such contact might be the basis for probable cause to believe they are acting at the direction of a foreign power thus triggering the Gov- ernment's power to conduct electronic surveillance. The intent of the bill is to exclude from the definition of "clandestine intelligence activ- ities" any activity which consists solely of the lawful exercise of first amendment rights of speech, petition, assembly, and association. In no event may lawful political activity within the ambit of the protections afforded by the first amendment be the basis for finding that any United States person is engaged in "clandestine intelligence activities." Lobbying Congress or seeking to influence public opinion on matters relating to the national defense or foreign affairs does not become clandestine intelligence activity merely because the agent has failed to comply fully with the Foreign Agents Registration Act (22 U.S.C. 611, et. seq.). If, however, foreign intelligence services hide behind the cover of some person or organization in order to influence Ameri- can political events and deceive Americans into believing that the opinions or influence are of domestic origin and initiative and such deception is willfully maintained in violation of the Foreign Agents Registration Act, then electronic surveillance might be justified under subsection (B) (ii) if all the other criteria of S. 1566 were met. The committee does not intend that the conspiracy provision of sub- section (B) (iv) should be interpreted to permit surveillance based solely upon the combination of ambiguous public statements express- ing a general intent to violate the law and an unambiguous public statement of such intent, in the absence of facts regarding any other specific acts taken to carry out such intent." Mere membership in a political group directed and controlled by a foreign power is not sufficient under this bill to establish probable cause that a person is aiding or abetting or conspiring with someone for or on behalf of a foreign power or engaged in clandestine intelli- gence activities. Moreover, even if additional information established Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : 310A-RDP80SO1268A000400010002-7 probable cause to believe some members of the group were aiding or abetting or conspiring with persons acting for or on behalf of a for- eign power, neither efforts to collect information about the plans and program of the civil rights movement or other political protests, nor efforts to stimulate or shape them would constitute clandestine intelli- gence activity within this section. Gathering information about the movement would be neither criminal espionage nor the kind of eco- nomic or technical information relating to the national security whose collection might involve the violation of any other Federal law. Simi- larly, since the civil rights movement itself involved constitutionally protected rights of association, speech and petition for redress of grievances, efforts by a foreign power to involve itself in such a move- ment are intended to be specifically excluded from the clandestine intelligence activity standard for targeting U.S. persons. C. "Terrorism," and "sabotage" Subsection (b) (3) defines "terrorism" as acts which are violent or dangerous to h uman life and which would be criminal under the laws of the United States or of any State if committed within its juris- diction. The words "would be" are used here, and in the definition of "sabotage," to indicate that the acts need not, in fact, be violations of Federal or State law, so long as they would constitute such violations if committed within the jurisdiction of the United States or of any State. The committee intends that terrorists and saboteurs acting for foreign powers should be subject to surveillance under this bill when they are in the United States, even if the target of their violent acts is within a foreign country and therefore outside actual Federal or State jurisdiction. This departure from a strict criminal standard is justified by the international responsibility of government to pre- vent its territory from being used as a base for launching terrorist attacks against other countries. We demand that other countries live up to this responsibility and it is important that in our legislation we demonstrate a will to do so ourselves. - The purpose of the terrorist activities -must be either the intimida- tion of the civilian population, the intimidation of national leaders in order to force a significant change in government policy, or the affect- ing of government conduct by assassination or kidnapping. Examples of such activities would be the detonation of bombs in a metropolitan area, the kidnapping of a high-ranking government official, the hi- jacking of an airplane in a deliberate and articulated effort to force the government to release a certain class of prisoners or to suspend aid to a particular country, the deliberate assassination of persons to strike fear into others to deter them from exercising their rights, or the destruction of vital governmental facilities. Subsection (b) (4) defines sabotage as activities which would con- stitute crimes under chapter 105 of title 18, United States Code, if conducted against the United States. In S. 3197 only actual violations of chapter 105 were included in the definition of sabotage. But by its terms, chapter 105 makes criminal only acts of sabotage against U.S. Government facilities. S. 1566 has expanded the definition of sabotage to include similar acts when committed against a State or another nation's facilities and materials relating to defense. Thus, sabotage Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/233,1C1A-RDP80S01268A000400010002-7 directed against State and local police facilities and equipment, or against the defense facilities of foreign nations, would constitute sabotage under this definition.12 Of course, electronic surveillance under this chapter could be undertaken only if such sabotage was knowingly conducted for or on behalf of a foreign power and the information sought constitued foreign intelligence as defined. Where persons are knowingly engaged in sabotage of State or foreign facili- ties for or on behalf of a foreign power, such persons should be subjected to foreign intelligence electronic surveillance in this country even in the absence of probable cause to believe that they will engage in sabotage against Federal facilities. D. Foreign intelligence information Subsection (b) (5) defines foreign intelligence information accord- ing to whether or not the information concerns a U.S. person. The comparable provision in S. 1566, as reported by the Judiciary Com- mittee, is modified in order to apply the more stringent requirements solely to information about U.S. persons. The committee has dropped the distinction between "necessary" and "essential" in the standard. The difference between the two terms is marginal, and using a single term has advantages of clarity and con- sistency. The committee has also deleted the word "deemed" ; instead, an Executive Branch official will be required to certify that the information sought from each surveillance is deemed to be foreign :intelligence information. See section 2524 (a) (7) (A); infra. Where the term "necessary" is used, the committee intends to require more than a showing that the information would be useful or con- venient. The committee intends to require a showing that the informa- tion is both important and required. The use of this standard is intended to mandate that a significant need be demonstrated by those seeking the surveillance. For example, it is often contended that a counterintelligence officer or intelligence analyst, if not the policy- maker himself, must have every possible bit of information about a subject because it might prove an important piece of the larger picture. In that sense, any information relating to the specified purposes might be called "necessary" but such a reading is clearly not intended. Information concerning U.S. persons is foreign intelligence infor- mation if it is necessary to the national defense or security, to the successful conduct of foreign affairs, or to the ability of the United States to protect against grave hostile acts, sabotage, terrorism, or clandestine intelligence activities by or on behalf of foreign powers. Information concerning foreign powers and foreign persons is foreign intelligence information if it relates to those interests. Subparagraph (A) of this subsection defines foreign intelligence information as information which relates to, and if concerning a U.S. person is necessary to, the ability of the United States to protect itself against actual or potential attack or other grave hostile acts of a for- eign power or its agents. This category is intended to encompass in- formation which relates to foreign military capabilities and intentions, 12 Under 18 U.S.C. 9m6, it is a Federal crime for persons within the United States to conspire to injure or destroy property located in a foreign country and owned by a foreign government. Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 ~~IA-RDP8OS01268AO00400010002-7 as well as acts of force or aggression which would have serious adverse consequences to the national security of the United States. The term "hostile acts" must be read in the context of the subparagraph which is keyed to actual or potential attack on the United States. Thus, only grave types of hostile acts would be envisioned as falling within this provision.- Subparagraph (B) of this subsection includes information which relates to, and if concerning a U.S. person is necessary to, (i) the national defense or the security of the Nation or (ii) the successful conduct of the foreign affairs of the United States. This subparagraph also requires that the information sought involve information with respect to foreign powers or territories, and would therefore not in- clude information solely about the views or planned statements or activities of Members of Congress, executive branch officials, or private citizens concerning the foreign affairs of the United States. It is anticipated that the types of "foreign intelligence information" defined in subparagraphs (A) and (B) will be the types most often sought when an electronic surveillance is instituted against a foreign power as defined in section 2521(b) (1) (A), (B), (C), and (E), or against most foreign agents as defined in Section 2521(b) (2) (A) (i). Consideration was given to a standard of "important, rather than "relates to," for information concerning foreign powers and foreign persons collected to serve these more nebulous national defense, na- tional security, and foreign affairs interests. However, the committee did not wish to impose a standard under which responsible executive branch officials could not honestly certify that entirely proper and appropriate activities were conducted to produce "foreign intelli- gence information," as defined here. Certain other limitations are present. The information must pertain to a foreign power or foreign territory; and thus it cannot simply be information about a citizen of a foreign country who is visiting the United States unless the information would contribute to meeting intelligence requirements with respect to a foreign power or territory. The term "national defense or the security of the Nation" is intended to mean military and defense concerns. It is not a catchall term "national security" to be used to mean anything the Executive Branch wants it to mean. With these limitations, the committee believes that the adoption of a "relates to" standard would not authorize improper treatment of foreign persons who come to the United States. In this regard, of course, the committee's oversight authority is another valuable check. is In testifying in 1976 at the House hearings on S. 3197, Attorney General Levi confirmed this interpretation "Mr. KASTENMEI ,n. How do you understand the term other hostile acts of a foreign power? Is there enough precedent or other language so that we under- stand precisely what the hostile acts constitute, whether a criticism of our par- ticipation In thr Vietnam war would be a hostile act? Or attempting to board an American ship on the high seas is a more classical case. How broad is the hostile acts? "Attorney General LEVI. I certainly wouldn't think that hostile acts involved criticism. I would assume-I don't know that we can get abetter definition. But it does after all say, 'against actual or potential attack or other hostile acts.' So that it is the actual Or potential attack which really gives the flavor to what is meant. "Mr. KASTENMETER. In other words, it must be seen in a broader context, and therefore be much more limited ? Attorney General LEVI. I would think so." (1976 House hearings 10-11.) Approved For Release 2005/11/23 : CIA-RDP80SO1268AO00400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 33 Subparagraph (C) (i) of this subsection includes information which relates to, and if concerning a U.S. person is necessary to, the ability of the United States to protect against sabotage or terrorism by a foreign power or foreign agent. It is anticipated that the type of information described in this subparagraph will be the type sought when an elec- tronic surveillance is instituted against the type of foreign power de- fined in section 2521(b) (1) (D), or against the type of foreign agent defined in section 2521(b) (2) (B) (iii). Subparagraph (C) (ii) of this subsection includes information which relates to, and if concerning it U.S. person is necessary to, the ability of the United States to protect against the clandestine intelligence ac- tivities of an intelligence service or network of a foreign power or a foreign agent. This subparagraph encompasses classic counterintelli- gence information; that is, information deemed necessary to the Na- tion's ability to discover and protect against the clandestine intelligence activities of foreign powers or their agents in the United States. This subsection is not intended to encompass information sought about political activity by U.S. citizens allegedly "necessary" to determine the nature and extent of any possible involvement in those activities by the intelligence services of foreign powers. Such a dragnet ap- proach to counterintelligence has been the basis for improper investi- gations of citizens in the past and is not intended to be a permissible avenue of "foreign intelligence" collection under this subparagraph. Nor does this subparagraph include efforts to prevent "news leaks" or to prevent publication of such leaked information in the American press, unless there is reason to believe that such leaking or publication is itself being done by an agent of a foreign intelligence service and that such publication would harm the national security. Information about a U.S. person's private affairs is not intended to be included in the meaning of "foreign intelligence information" un- less it relates to his activities on behalf of a foreign power. This is achieved by including in each subsection of the foreign intelligence definition the requirement that the information sought actually "re- lates to" the type of information that is necessary. For example, the Government could not seek purely personal information about a U.S. citizen or permanent resident alien, who is a suspected spy, upon a theory that it might learn something that would be "compromising." The bill makes clear that only information about U.S. citizens or per- manent resident aliens that is necessary to the ability of the United States to protect against clandestine intelligence activities may be sought. This restriction might now always be fully applicable to agents of foreign powers as defined in section 2521(b) (2) (A) (i) or (ii), because information about their private lives may itself be foreign in- telligence information. For example, such information might identify their true status or reveal the intentions or activities of the foreign power of which they are officers or employees. E. Electronic surveillance Subsection (b) (6) defines electronic surveillance to include four separate types of activities. Subparagraph (A) protects U.S. persons who are located in the United States from being targeted in their domestic or international Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 communications without a court order no matter where the surveil- lance is being carried out. Under S. 3197 as reported by the commit- tee in the 94th Congress, such targeting did not fall within the con- fines of the bill; this provision is, therefore, a significant extension of the protections afforded U.S. citizens and resident aliens. The sub- paragraph covers the acquisition of the contents of a wire or radio communication of a U.S. person by intentionally targeting that par- ticular, known U.S. citizen or resident alien, provided that the per- son is located within the United States. Thus, for example, the watch- listing activities of the National. Security Agency, if directed against the international communications of particular U.S. persons who are in the United States, would require a court order under this provision.14 Only acquisition of the contents of those wire or radio communica- tions made with a reasonable expectation of privacy where a warrant would be required for law enforcement purposes is covered by sub- paragraph (,A-). It is the committee's intent that acquisition of the contents of a, wire communication, without the consent of any party thereto, would clearly be included; the definition of "wire communi- cation" under 18 U.S.C. 2510(1) covers any communication "made in whole or part" through wire facilities. Excluded would be, for ex- ample, commercial broadcasts, as well as ham radio and citizen band radio broadcasts [cf. 47 U.S.C. 605; United States v. Hall, 488 F. 2d 193 (9th Cir. 1973)]. The term "intentionally targeting" a particular, known U.S. person who is in the I Tnited States includes the deliberate use of a surveillance device to monitor a specific channel of communication which would not be surveilled but for the purpose of acquiring information about a party who is a particular, named U.S. person located within the United States." It also includes the deliberate use of surveillance techniques which can monitor numerous channels of communication among num- erous parties, where the techniques are designed to select out from among those communications the communications to which a particular U.S. person located in the United States is a party, and where the com- munications are selected either by name or by other information which would identify the particular person and would select out his communications. This subparagraph does not apply to the acquisition of the contents of international or foreign communications, where the contents are not acquired by intentionally targeting a particular known U.S. person who is in the United States. Therefore, this bill does not afford protec- tions to U.S. persons who are abroad. Nor does it regulate the acqui- sition of the contents of international communications of U.S. persons who are in the United States, where the contents are acquired uninten- tionally. The committee is concerned about the need to provide statu- tory protections and regulations in this area, but does not believe that "'See Church committee hearings, vol. 5, esp. pp. 5-24; Church Committee Report, book II, pp. 58-60. 108 and 308-311, and book III, pp. 733-783, for careful documenta- tion of the nature of such National Security Agency activities undertaken on behalf of the FBI, CIA, Army intelligence, and the Bureau of Narcotics and Dangerous Drugs, and the technological problems associated with authorized NSA signals intelligence activities. 16 This would include wiretapping a foreign official when the intent and purpose of the wire tap is to hear the conversations of a particular U.S. person with that foreign official, if the foreign official would not otherwise have been wire tapped for different purposes. Such a case-has occurred in the past. See Church Committee Report, book 11, p. 228. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 35 S. 1566 is the appropriate vehicle for doing so. The standards and pro- cedures for overseas surveillance may have to be different than those provided in S. 1566 for electronic surveillance within the United States or targeted against U.S. persons who are in the United States. Instead, members of the committee have introduced as part of S. 2525, the National Intelligence Reorganization and .Reform Act of 1978, separate legislation to achieve this objective. The fact that S. 1566 does not bring the overseas surveillance activi- ties of the U.S. intelligence community within its purview, however, should not be viewed as congressional authorization of such activities as they affect the privacy interests of Americans. The committee merely recognizes at this point that such overseas surveillance activi- ties are not covered by this bill. In any case, the requirements of the fourth amendment would, of course, continue to apply to this type of communications intelligence activity.16 Subparagraph (B) includes the acquisition, by an electronic, me- chanical, or other surveillance device, of the contents of a wire com- :munication to or from a person in the United States without the consent of any party thereto when such acquisition occurs in the United States while the communication is being transmitted by wire. As this subdefinition makes clear, one party to the wire communication may be outside the United States if the acquisi- tion occurs within the United States. Thus, either a wholly do- mestic telephone call or an international telephone call can be the subject of electronic surveillance under this subdefinition if the acqui- sition of the content of the call takes place in this country and if such acquisition occurs "while the communication is being transmitted by wire." This second qualifier is necessary because the definition of "wire communication" under 18 U.S.C. 2510(l) includes any communica- tion "made in whole or in part" through wire facilities. Because most telephonic and telegraphic communications are transmitted at least in part by microwave radio transmissions, subdefinition (B) is meant to apply only to those surveillance practices which are effected by tapping into the wire over which the communication is being trans- mitted. The interception of the microwave. radio transmission is meant to be covered by subdefinition (C) if the sender and all intended re- cipients are located within the United States, or by subdefinition (A) if it is done through the targeting of a U.S. person who is in the United States. The surveillance covered by subparagraph (B) is not limited to the acquisition of the oral, or verbal contents of a wire communication. It includes the acquisition of any other contents of the communication, for example, where computerized data is transmitted by wire. There- fore, it includes any form of "pen register" or "touch-tone decoder" device which is used to acquire, from the contents of a wire communi- cation, the identities or locations of the parties to the communication. Examination of telephone billing records in documentary form is not 19 The committee notes with approval that electronic surveillance of American citizens while abroad has been limited in part both by the President's Executive Order applicable to the U.S. Intelligence community and by procedures approved by the Attorney General. See Executive Order 12036, Jan. 24, 1978 ; testimony of Attorney General Edward H. Levi, Church committee hearings. vol. 2, p. 66 if. Thus, the surveillance of journalists, such as in the Joseph Kraft case, would be prohibited. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 36 covered. The committee is concerned about the need to protect the privacy of such confidential records of the provision of telecommuni- cations services, but does not believe that S. 1566 is the appropriate measure in which to do so. As introduced, S. 2525, the National Intelligence Reorganization and Reform Act of 1978, provides certain statutory safeguards in this area. Subparagraph (C) includes the intentional acquisition by an elec- tronic, mechanical, or other surveillance device of the contents of a totally domestic radio communication, without the consent of any party thereto, made with a reasonable expectation of privacy and under circumstances where a warrant would be required for law en- forcement purposes, where both the sender and all intended recipients are located within the United States. This part of the definition would reach not only the acquisition of communications made wholly by radio but also the acquisition of "wire communications" by means of inter- cepting the radio transmitted portion of those communications within the United States. The territorial limits of this subdefinition are not dependent on the point of acquisition, as is the case with subdefinition (B), but on the locations of the sender and intended recipients. Thus, the acquisition of radio communications outside the territorial limits of the United States would be covered if all of the parties were located within the United States. Only acquisition of those domestic radio communications made with a reasonable expectation of privacy where a warrant would be required for law enforcement purposes would be included in the term "electronic surveillance." This would exclude, for example, commercial broadcasts, as well as ham radio and citizen band radio broadcasts (cf. 47 U.S.C. section 605) ; United States v. Hall, 488 F. 2d 193 (9th Cir. 1973). It is the committee's intent that the intentional acquisition of the contents of a wire communication being transmitted by radio micro- wave, without the consent of any party thereto and where all parties to the communication are located in the United States, would clearly be included here. The intentional acquisition of such contents is not limited to the. intentional acquisition of oral or verbal contents. It in- cludes the intentional acquisition of any other contents, as described with respect to subparagraph (B). Only "intentional" acquisitions of private domestic radio communi- cations are within this subdefinition because, by their very nature, radio transmissions may be intercepted anywhere in the world, even though the sender and all intended recipients are in the United States. Thus, intelligence collection may be targeted against foreign or inter- national communications but accidentally and unintentionally acquire the contents of communications intended to be totally domestic. As amended by this committee, S. 1566 would require the destruction of such contents in almost all circumstances. See Sec. 2526(gg), infra. The effect of this amendment, in combination with subparagraphs (A), (B), and (C) of this subsection, is to apply either a destruction requirement or a court order requirement for the nonconsensual acqui- sition of all domestic radio communications made with a reasonable expectation of privacy, the nonconsensual acquisition within the United States of all wire communications, as defined in section 2510 (1), title 18, United States Code, and the targeting of particular Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 37 United States persons located in the United States in order to acquire domestic or international communications made with a reasonable ex. pectation of privacy. Subparagraph (D) brings within the definition of "electronic sur- veillance" the acquisition of information, not transmitted as a wire communication or radio communication, by the installation or use of an electronic, mechanical, or other surveillance device for moni- toring in the United States under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes. This is intended to include the ac- quisition of oral communications made by a person exhibiting an expectation that such utterances are not subject to acquisition, under circumstances justifying such expectation. In addition, it is meant to include the installation of "beepers" and "transponders," if a warrant would be required in the ordinary criminal context. United States v. Holmes, 537 F.2d 227 (5th Cir. 1976). It could also include miniaturized television cameras and other sophisticated devices not aimed merely at communications. This part of the definition is meant to be broadly inclusive, be- cause the effect of including a particular means of surveillance is not to prohibit it but to subject it to judicial review. It is not meant to include, however, the acquisition of those international radio trans- missions or international wire communications, when acquired by intercepting radio transmissions, which are not acquired by targeting a particular U.S. person in the United States. Nor, as earlier indicated, is it meant to require a court order in any case where a search warrant would not be required in an ordinary criminal context. It has been held, for example, that fourth amendment protections do not extend to activities undertaken in the open where a partici- pant could reasonably anticipate that his activities might be ob- served.17 But two persons in a public park, far from any stranger, would not reasonably anticipate that their conversations could be overheard from afar through a directional microphone, and so would retain their right of privacy. The definition of "electronic surveillance" applying to wire com- munications has an explicit exception where any party has consented to the interception. This is intended to perpetuate the existing law regarding consensual interceptions found in 18 U.S.C. section 2511 (2) (c) and in the case law interpreting 47 U.S.C. section 605.18 Whether consent may be inferred in a particular case will depend on the facts and circumstances. The other parts of the definition of "electronic surveillance" require that the acquisition of information be under circumstances in which a person has a constitutionally protected right of privacy. There may be no such right in situations where the acquisition is consented to by at least one party to the communication or conversation. For instance, a body microphone placed on an informer with his consent is an installation of a device to acquire information, but a person speaking to the informer may "'Air Pollution Vakance Board v. Western Alfa ZJQE Corp., 41U 1U nit 861 (n 745 U.S. 197 18 Lopez V. United Staten, 373 U.S. 427 (1963) ; (1957). Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268AO00400010002-7 38 have no justifiable expectation that the informer will not repeat, record, or even transmit by a miniature transmitter what the person voluntarily tells the informer.19 The committee does not intend the term "surveillance device" as used in subparagraph (D) to include devices which are used inci- dentally as part of a physical search, or the opening of mail, but which do not constitute a device for monitoring. Lock picks, still cameras, and similar devices can be used to acquire information, or to assist in the acquisition of information, by means of physical search. So-called chamfering devices can be used to open mail. This bill does not bring these activities within its purview. Although it is desirable to develop legislative controls over physical search techniques, the committee has concluded that these practices are sufficiently different from electronic surveillance as to require separate consideration by the Congress. S. 2525, the National Intelligence Reorganization ana Reform Act of 1978, addresses the problem of physical searches within the United States or directed against U.S. persons abroad for intelligence pur- poses. The fact that S. 1566 does not cover physical searches for in- telligence purposes should not be viewed as congressional authoriza- tion for such activities. In any case, the requirements of the fourth amendment would, of course, continue to apply to this type of activity.20 Except for the use of a? surveillance device as an incident to physical search or mail opening, the term "device for monitoring" would apply in any circumstances where a warrant would be required for law enforcement purposes. The provisions that "a warrant would be required for law enforce- ment purposes" do not mean that a court must, previously, have required a warrant for the particular type of surveillance activity carried out under subparagraph (A), (C), or (D). The techniques involved may not have been used for law enforcement purposes, or if so used, may not have come before a court for a determination as to whether a warrant is required. Nevertheless, the surveillance activity is intended to be covered if a warrant would be required for law enforcement purposes, as determined on the basis of an assessment of the similarity with other surveillance activities which the courts have ruled upon and the reasonableness of the expectation of privacy that a U.S. person has with respect to such activity. The committee expects that.. if an agency wishes to use a related new surveillance technique, it will. seek a ruling from the Attorney General as to whether the tech- nique requires a court order. The intelligence committees should be advised of such rulings under the provisions of section 2528. Law enforcement officials may, if they wish, continue to obtain an ordinary search warrant or chapter 119 court order if the facts and circumstances justify it. F. "Attorney general" Paragraph (7) defines "Attorney General" to mean the Attorney General of the United States, the Acting Attorney General, or the 19 United States V. White, 401 U.S. 745 (1971) ; but see the dissenting opinion of Mr. Justice Harlan for a contrary view. B0 It should be noted that Executive Order 12036, Jan. 24, 1978, places limits on physical searches and the opening of mail. Approved For Release 2005/11/23 : CIA-RDP80SO1268AO00400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 39 Deputy Attorney General. Under S. 3197 as reported in the 94th Congress, only the Attorney General or the Acting Attorney General could approve an application for an electronic surveillance order. S. 1566 as originally introduced permitted a specially designated Assist- ant Attorney General to approve such applications. The administra- tion saw a need to lessen the administrative burden on the Attorney General which would be perpetuated even after this bill has estab- lished the safeguards of a court order procedure. With the assurance of Attorney General Bell in his testimony be- fore the Judiciary Committee on S. 156G that he would personally continue to approve applications under the bill until standards of review have been well established, that 'committee adopted a modified version of the administration's proposal. It provides authority for the Attorney General (or the Acting Attorney General) or the Deputy Attorney General-rather than a specially designated Assistant At- torney General-to. approve applications for an electronic surveillance order under this chapter. This committee endorses that approach. The Deputy Attorney General is appropriate because, as the second-rank- ing official in the Justice Department, he would most often be the Act- ing Attorney General in the Attorney General's absence. G. "Minimization procedures" The minimization procedures of the bill provide vital safeguards because they regulate the acquisition, retention, and dissemination of information about U.S. persons, including persons who are not the au- thorized targets of surveillance. For example, an entirely innocent American might use a telephone that is tapped to target someone else. Or an American might talk on the phone to a foreign official who is under surveillance for purposes unrelated to the particular conversa- tion. The procedures also protect Americans who are not parties to a communication, but who are referred to in the communication; such information has in the past been disseminated for improper purposes. Paragraph (8) defines "minimization procedures" as procedures reasonably designed to minimize the acquisition and retention, and prohibit the dissemination, except as provided in subsections 2526 (a) and (b), of any information concerning U.S. persons not related to certain purposes. Specifically, information concerning Americans must be related to the ability of the United States to protect itself against actual or potential attack or other grave hostile acts of a foreign power or agent of a foreign power, to provide for the national defense or se- curity of the Nation, to provide for the conduct of the foreign affairs of the United States, to protect against terrorism or sabotage by for- eign powers or their agents, or to protect against the clandestine in- telligence activities of a foreign intelligence service or an agent of a foreign power. The minimization requirement of this paragraph is meant generally to parallel the minimization provision in existing law. (18 U.S.C. 2518 (5) ): As the courts have noted in construing that section, "It is ... obvious that no electronic surveillance can be so conducted that innocent conversations can be totally eliminated." 21 In assessing the minimization effort, the court's role is to determine whether "on the 21 United States v. Bynum, 455 F. 2d 490, 500 (2nd Cir. 1973), cert. denied 423 U.S. 1005 (1975). Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 40 whole, the agents have shown a high regard for the right of privacy and have done all they reasonably could to avoid unnecessary intru- sion ." 22 Absent a charge that the minimization procedures have been disregarded completely, the test of compliance is "whether a good faith effort to minimize was attempted." 23 Among the factors to be considered in evaluating the reasonable- ness of the agents' conduct will be the scope of the enterprise under investigation, the location and operation of the subject telephone (or microphone), the Government's expectations of the character of and parties to the calls, and the length or brevity of the monitored conver- sations.- Minimization procedures may differ depending on the nature of the relationship to a foreign power, the individuals using the facil- ities or place to be surveilled, the type of foreign intelligence informa- tion sought, and other similar factors. Minimization procedures might, also include restrictions on the use of surveillance to times when foreign intelligence information is likely to be obtained, directions that the surveillance cease if it does not produce results of the specified type, requirements that conversations not involving the named target be deleted from the records at an appropriate time, and other require- ments. For example, if a citizen or permanent resident alien were using facilities of a foreign agent, that were the target of the sur- veillance, the Government would be reouired to minimize the acquisi- sition and retention of any information that did not relate to foreign intelligence purposes. The definition of minimization speaks in terms of acquisition, reten- tion and dissemination. By minimizing acquisition the committee envisions, for example, that in a given case, where A is the target of a wiretap, after deter- mining that A's wife is not engaged with him in clandestine intelli- gence activities, the interception of her calls on the tapped phone, to which A was not a party, would be discontinued as soon as it was real- ized that she rather than A was the party. In other cases, however, pri- marily for technological reasons, it may not be possible to avoid ac- quiring all conversations. In these situations minimizing retention and dissemination becomes most important. By minimizing retention, the committee intends that information acquired, which does. not relate to the approved purposes in the minimization procedures, be destroyed. For example, after determining that A's wife is not engaged with her husband in clandestine intelligence activities, her communications, ac- quired and retained in order to make this determination, would be destroyed. Indeed, even A's communications which are clearly not rele- vant to his clandestine intelligence activities should be destroyed. In certain cases destruction would take place almost immediately while in other cases the information might be retained for a reasonable period in order to determine whether it did indeed relate to one of the ap- proved purposes. Procedures governing minimization-particularly how long information should be retained and how it should be de- stroyed once it is deemed irrelevant-are to be approved by the court and are, of course, subject to judicial supervision. 22 United States V. Tortoretio, 480 F. 2d 764 (2nd Cir.), cert. denied 414 U.S. 886 (1973). United States v. Armecida, 515 F. 2d 29. 44 (3d Cir. 1975). 24 United States v. Armoetda, supra; United States v. James, 494 F. 2d 1007 (D.C. Cir. 1974), cert. denied 419 U.S. 1020 (1975) ; United States v. Bynum, supra. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 41 A Judiciary Committee amendment to the minimization definition makes explicit the intent that information not related to an approved purpose not be disseminated. The only exceptions to this prohibition recognized.by the bill are for one of the purposes authorized in sec- tion 2521(b) (8), or for the enforcement of the criminal law under the provisions of section 2526 (a) and (b). Under the dissemination phrase, information being held to determine relevancy would not be disseminated until the determination was made (or would only be dis- seminated to those who could determine its relevancy). It should also mean that, even with respect to information relevant to an approved purpose, dissemination would be restricted to those officials with a need for such information. And, again, the judge, in approving the minimization procedures, could require specific restrictions on the retrieval of such information. In short, the committee believes that the definition of minimization procedures authorizes and requires that information concerning Amer- ican citizens and resident aliens be handled in such a way as to assure that it is used only for the purposes specified in the definition and not for any other purpose. Some have suggested that the statutory definition is too general. The committee recognizes, however, that minimization requirements which are appropriate for some types of surveillances would be inappropriate for others. A certain flexibility in the statute is, therefore, necessary with careful judicial scrutiny of a particular application constituting the best protection against abuse. But the definition does not give carte blanche to the judge. It requires that the procedures be designed to limit the acquisition, reten- tion, and dissemination of information concerning American citi- zens and lawful resident aliens to that information which is related to one of the approved purposes; in addition, the procedures must provide that the information obtained by the surveillance will not be used for an unrelated purpose (other than for enforcement of the criminal law, see section 2526(a), infra). Of course, minimization applies only to information known to con- cern U.S. persons. Where communications are encoded or otherwise not processed so the contents of a communication are not known, it would not be possible to minimize the acquisition, retention, and dis- semination of information concerning U.S. persons. Nevertheless, the minimization procedures can be structured to apply to other agencies of the Government, so that if an agency different from the intercept- ing agency decodes or processes the communication, it could be re- quired to minimize the retention and prohibit the dissemination of information therein concerning U.S. persons. It should be noted that this provision contains one significant change from the minimization provisions in chapter 119. Section 2518(a) requires that all interceptions be recorded, if possible, and that the tapes not be edited or destroyed for 10 years. In a criminal context the maintenance of such tapes and files under court seal insures that the. interceptions will be retained in their original state so that when'criminal prosecutions are undertaken it is clear that the evidence is intact and has not been tampered with. Although there may be cases in which information acquired from a foreign intelligence surveillance will be used as evidence of a crime, these cases are expected to be relatively few in number, unlike chapter 119 interceptions the very Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 42 purpose of which is to obtain evidence of criminal activity. The com- mittee believes that in light of the relatively few cases in which infor- mation acquired under this chapter may be used as evidence, the better practice is to allow the destruction of information that is not foreign intelligence information or evidence of criminal activity. This course will safeguard the privacy of individuals more effectively, insuring that irrelevant information will not be filed. The committee believes that existing criminal statutes relating to obstruction of justice will deter any efforts to tamper with evidence acquired under this chapter. Such destruction should occur, of course, only pursuant to procedures approved by the court. Destruction insures that the information can- not be used to "taint" a civil or criminal proceeding; accordingly, there is no requirement to index, for purposes of 18 U.S.C. section 3504, interceptions which are destroyed. The committee is concerned that the surveillance authorized under this chapter not result in the retention or dissemination of informa- tion which would adversely affect the exercise of first amendment rights. Such abuses occurred with distressing frequency in the past. In- formation relating solely to the lawful political activity of American citizens or resident aliens may not be retained or disseminated under the provisions of this legislation. In a hypothetical case, for example, an ambassador from an im- portant neutral nation, speaking to a U.S. Senator, tells the Senator that his country has been approached secretly by a foreign nation concerning a planned attack on the United States. Assuming that the surveillance was initiated against, the ambassador and approved in accordance with the procedures of this chapter, there should be no doubt that the information could be retained and used because of its importance and relationship "to the ability of the United States to protect itself against actual or potential attack." At the same time, however, the constitutional rights of speech, association, and privacy of the Senator are implicated. He is plainly not the target of the surveillance, nor could he be, since he is not the "agent of a foreign power." Still he is overheard. The functioning of democratic govern- ment can be impaired if its representatives are deterred from discuss- ing important issues with representatives of other countries for fear that their conversations will be overheard and retained. There is no perfect solution to the problem. As long as the surveil- lance was instituted lawfully, the Senator's conversation may be over- heard. Given the subject matter of the conversation, it should not be excluded by minimization procedures. If the subject matter relates to foreign intelligence purposes, the information should be retained. The alternative--a blanket rule depriving the Government of the right to retain foreign intelligence, regardless of its importance, be- cause an American citizen was incidentally overheard-is unaccept- able. Similarly, it would not be advisable to obligate the Government to render the conversation senseless by deleting all portions of the statements in the conversation made by the Senator. The committee believes, however, that every effort should be made to minimize the "chilling effect" that retention of such conversations of Americans will have. Therefore, the definition of minimization procedures places additional restrictions on the dissemination of infor- Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 43 ination, where abuses are most likely to occur. These restrictions focus on those types of information which are the hardest to pin down concretely, that is, information which relates solely to the national defense or security and the conduct of foreign affairs. The bill requires procedures which are reasonably designed to insure that such informa- tion is not disseminated in a manner which identifies a U.S. person, without that person's consent, unless the person's identify is neces- sary to understand or assess the importance of information with re- spect to a foreign power of foreign territory or the information is otherwise publicly available. The phrase "with respect to a foreign power or foreign territory" comes from the definition of "foreign intelligence information." It requires that the information must contribute to the fulfillment of the Government's requirements for foreign intelligence regarding foreign powers and territories. The first part of this dissemination standard allows dissemi- nation where a U.S. person's identity is "necessary to understand" in- formation with respect to a foreign power or territory. The person's identity must be needed to make the information fully intelligible. If the information can be understood without identifying the person, it should be disseminated that way. However, sometimes it might be difficult or impossible to make sense out of the information without a U.S. person's identity. To take one obvious case, if the message says a foreign government official is arriving in this country at a particular time and place, it would be necessary to identify the airline he is arriv- ing on. The airline company would fall in the definition of "United States person" if it is a U7.S. corporation and not a foreign power. Another example would be the identity of a person who is the in- cumbent of an office of the executive branch of the U.S. Government having significant responsibility for the conduct of U.S. defense or foreign policy, such as the Secretary of State or the State Department country desk officer. The identities of such persons would frequently satisfy the "necessary to understand' requirement, especially when such person is referred to in the communications of foreign officials. This example does not mean, however, that all the conversations of a particular executive branch official with foreign officials who are under surveillance should he automatically or routinely reported to the U.S. official's superior without his knowledge or consent. The second part of the special dissemination standard allows dis- semination where a U.S. person's identity is necessary to "assess the importance" of information with respect to a foreign power or terri- tory. The word "importance" means important in terms of the inter- ests set out in the definition of foreign intelligence information. For example, if a foreign government is negotiating with an American business firm to purchase nuclear materials, it might be important to the national defense or security-in a military sense-or to the success- ful conduct of the Government's nonproliferation policy, to know the identity of the business firm involved. That might be the only way the State Department could determine whether a deal is likely to be made. On the other hand, the information may turn out not to be important. The question under the bill is whether the identity of the person or entity is needed to asses that importance. Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 44 The third part of the special dissemination standard allows dissemi- nation where the information identifying a U.S. person is otherwise publicly available. An example is a foreign official's discussion of the contents of a newspaper article referring to U.S. persons. Of course, none of these are hard-and-fast lines. What the bill requires is careful deliberation by responsible officials in the executive branch. The court is also authorized to monitor compliance with the minimization procedures, including the special dissemination proce- dures, in order to deter abuses. There will inevitably be close judgment calls, both in devising detailed procedures and in applying them to particular circumstances. Therefore, the bill does not attempt to im- pose absolute rules, but rather says that the procedures must be rea- sonably designed" to achieve their objectives. S. 1566 as reported by the Judiciary Committee included different procedural requirements which had been added by this committee to S. 3197 in the 94th Congress. The committee has determined on the basis of further study that these procedures, dealing with the manner of retention of information and with surveillance of certain foreign- controlled entities, may be too complex to administer. Therefore, they have been deleted from the bill. The committee looks with favor, however, upon efforts by the Execu- tive Branch to devise and submit to the court . more restrictive proce- dures than the minimum standards required by the terms of the bill itself. The Attorney General has already promulgated procedures gov- erning certain surveillance activities which would be covered by S. 1566; and this committee has examined those procedures in the course of discharging its responsibilities. The committee does not in- tend that passage of S. 1566, which by its terms might be interpreted as permitting relaxation of current restrictions, should automatically have this effect. In some instances the surveillance technology available to the Gov- ernment requires more rigorous procedures than those prescribed by S. 1566, in order to safeguard privacy interests adequately. Such pro- cedures cannot be spelled out by law, or otherwise disclosed publicly, without revealing sensitive sources and methods of foreign intelli- gence collection. Nevertheless, the committee intends that the Attor- ney General should continue the efforts already underway to establish procedures whicli will most effectively reconcile privacy interests with advancing technology, and that the court should take such considera- tions into account in approving the procedures that are proposed by the Attorney General. It is also anticipated that this committee will continue to review such procedures. Existing policies governing the dissemination of information ob- tained through conventional electronic surveillance techniques, such as wiretapping, should be revised if they conflict with any requirement of the bill.25 For example, information about the suitability or credi- bility of U.S. persons who are sources or contacts of an agency in the intelligence community, or who are reasonably believed to be potential sources or contacts, might be disseminated on specific request by name from the particular agency. It is questionable whether all such dis- 25 C.F., letter from Attorney General Griffin B. Bell to Hon. Birch Bayh, chairman, Senate Select Committee on Intelligence, Feb. 28, 1978. Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23: CIA-RDP80S01268A000400010002-7 45 semination, without the person's consent, would be permitted as a rou- tine matter under the minimization procedures of S. 1566. However, if the consent of the person is obtained for the conduct of an inquiry regarding his suitability or credibility as a source or contact, S. 1566 would allow such dissemination in the course of the inquiry. The per- son should be advised that consent for the inquiry means consent for the retrieval and dissemination of information in the possession of the agencies in the Intelligence Community by means, for example, of a "national agencies name check." Information may not, of course, be retained for such dissemination unless it otherwise satisfies the statu- tory requirements for retention. Similarly, information might be disseminated where it raises a ques- tion about the trustworthiness of a current Federal employee, a former employee of an agency in the intelligence community, a person holding a security clearance or having access to sensitive information or facili- ties, or a person who held a security clearance for or was otherwise granted access to information classified as "Secret" or a higher classifi- cation. Such information might be disseminated to the Government employer or former employer, the agency which granted the clearance or access, or another Federal agency having responsibility to investi- gate the trustworthiness of the individual. Such dissemination might also occur where the information raises a question about the trust- worthiness of individuals who are applicants or prospective Govern- rnent employees, if the disseminating agency verified the employer's official interest in the individual concerned. Once again, it is question- able whether all such dissemination, without the person's consent, would be permitted as a routine matter; and information may not be retained for such dissemination unless it otherwise satisfies the re- quirements for retention. The committee wishes to emphasize that dissemination without the person's consent requires a determination that, the information relates to the ability of the United States to protect against grave hostile acts of a foreign power or foreign agent, sabotage or terrorism by a foreign power or foreign agent, or the clandestine intelligence activities of a foreign intelligence service or foreign agent; or that the information relates to national defense or security or foreign affairs and is neces- sary to understand or assess the importance of information with re- spect to a foreign power or territory or is otherwise publicly available. A reasonable case can be made that information about the suitability or credibility of intelligence sources or contacts, and information about the trustworthiness of persons who hold, have held, or are. ex- pected to hold positions giving them access to sensitive information or facilities, would relate to the. ability of the United States to protect against clandestine intelligence activities of a foreign power or for- eign agent. The case is less compelling, 'however, where the informa- tion is not counterintelligence information but merely concerns the trustworthiness of a person who is a Government employee not having or having had access to sensitive information or facilities, or an appli- cant or prospective applicant for such a position. Additionally, the provisions of S. 1566 permitting dissemination and use for law enforcement purposes of information that is evidence of a crime would not permit dissemination of information when nec- Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 46 essary to the conduct of any investigation that may be within the juris- diction of a law enforcement agency. Such investigations must be criminal investigations, rather than civil, background, or other types of investigations. If provision is made for dissemination in exceptional circumstances that are not otherwise provided for in more detailed minimization procedures, for example, with the prior approval of the Attorney Gen- eral, such a provision must be approved by the judge to whom the procedures are presented in an application for an electronic surveil- lance order; and such a provision may be approved and applied only, in conformity with the minimization requirements of S. 1566 itself. These considerations should be taken into account by the court and by the executive branch, especially the Attorney General, in applying the minimization requirements of S. 1566 to the dissemination of in- formation obtained through conventional electronic surveillance. H. "United States person" and "United States" Section 2521(b) (9) defines a "United States person" to include a citizen of the United States, an alien lawfully admitted for permanent residence, an unincorporated association of which a substantial num- ber of members are citizens of the United States or permanent resident aliens, and a corporation incorporated in the United States, but not including corporations or associations which are "foreign powers" as defined in section 2521(b) (1) (A)-(E). The term "United States person" was not defined in S. 3197, as re- ported in the 94th Congress, because S. 3197 made no distinction in its provisions between different types of "persons." S. 1566 does not, for example, afford to nonresident aliens the protections of the "minimiza- tion procedures" or the court's review of the certification that sur- veillance of the person is required to obtain information "necessary" for certain purposes. However, such protections either did not exist or were less stringent in S. 3197. Their application to nonresident aliens would impose undue burdens upon the court and the agencies conducting electronic surveillance. The term "members" with respect to unincorporated associations is not intended, of course, to be limited to formal, card-carrying mem- bers. For instance, an unincorporated commercial establishment's em- ployees would be, members under this definition. The committee in- tends the reference to "a substantial number of members" to be equiva- lent to the term "substantially composed of" used in parts (B) and (E) of the definition of "foreign power." In both contexts the words "substantial" or "substantially" require that there be a significant pro- portion, but less than a majority. The judge is expected to take all the known circumstances into account in determining whether an asso- ciation is a "United States person." S. 1566 as reported by the Judiciary Committee excluded from "United States person" any corporation or association which is a for- eign power. This exception has been modified to exclude only those foreign powers which fall into parts (A)-(E) of the "foreign power" definition. A corporation incorporated in the United States, or an un- incorporated association of which a substantial number of members Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/4273 : CIA-RDP80SO1268A000400010002-7 are American citizens or resident aliens, retains its "United States person" status if it is alleged to be directed and controlled by a for- eign government, but where such direction and control is not openly acknowledged. This provides safeguards needed because of the possi- bility that such an entity could be placed under surveillance without meeting the requirements for surveillance of an individual U.S. per- son. See section 2521(b) (1) (E), supra. Section 2521 (b) (10) offers a new definition of "United States" for geographic purposes. Evidence publicized last year of CIA activities in Micronesia led the administration to propose this change which makes explicit that S. 1566 covers electronic surveillance in all areas under the territorial sovereignty of the United States (the United States and its territories) as well as the Canal Zone and Micronesia. The term "territorial sovereignty" does not include U.S. Embassies, military bases, and other installations abroad. The Commonwealth of the Northern Marianas is intended to be covered by this definition after its severance from the Trust Territory of the Pacific Islands. The re- mainder of the Trust Territory of the Pacific Islands is intended to be covered so long as the trust is in effect and thereafter only if the poli- tical status agreements with the United States provide for territorial sovereignty of the United States in a manner similar to that of the Northern Mariana Islands, Puerto Rico, or Guam. Section 2522 Section 2522 authorizes the submission of applications to a judge for a court order approving the use of electronic surveillance under this chapter. Applications may be, submitted only if the President has, by prior written authorization, empowered the Attorney General to ap- prove the submission. This section does not require the President to authorize each specific application ; he may authorize the Attorney General generally to seek applications under this chapter or upon such terms and conditions as the President wishes so long as the terms and conditions are consistent with this chapter. The reference to Presi- dential authorization does not mean that the President has inde- pendent, or "inherent," authority to authorize electronic surveillance in any way contrary to the provisions of S. 1566. The procedures of this bill are "the exclusive means" by which electronic surveillance, as de- fined in section 2521 (b) (6), maybe conducted. See conforming amend- ment section. (f) to section 2511(2), chapter 119, United States Code, infra. This bill will establish the exclusive United States law governing electronic surveillance in the United States for foreign intelligence purposes. Therefore, an application ~f for a 1 urt order h meets the standards of this bill should be granted, g any law, treaty, or international agreement. Section 2523 Subsection (a) provides for public designation by the Chief Justice of seven U.S. district court judges to sit on a special court, each member of whch may hear applications and grant. orders under this chapter. The court shall have nationwide jurisdiction, and the com- mittee contemplates that there will be some geographic dispersion among the judges designated. The provision for the judges to serve as members of a special court has been added upon the recommenda- Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 48 tion of the General Counsel of the Administrative Office of the U.S. Courts.2s The committee intends that the special court should sit continuously in the District of Columbia. The subsection provides that none of the designated judges shall have jurisdiction to hear an application for electronic surveillance if that same application has been previously denied by another of the designated district judges. This provision is intended to make clear that if the Government desires to pursue an application after a denial, it must seek review in the special court of review established in sub- section (b) ; it cannot apply to another district judge. Obviously, where one judge has asked for additional information before approving an application, and that judge is unavailable when the Government comes forward with such additional information, the Government may seek approval from another judge. It would, however, have to inform the second judge about the first application. See section 2524 (a) (9), infra. Similarly, where an application is made and then withdrawn, perhaps because a change in circumstances makes the electronic sur- veillance no longer technically feasible, the Government may seek approval from another judge if the application is subsequently rein- stated. The committee does not intend, however, that the Government be allowed to seek approval from another judge if the original with- drawal was occasioned by indications that the first judge intended to deny or modify the order requested by the Government. The subsection further provides that a designated district judge who denies an application for electronic surveillance shall provide a complete written statement of the reasons for the denial, and, if the Government seeks review of the decision, forward that statement and other documents comprising the record to the special court of review. This insures that the special court of review will have the full record of the proceedings of the district, court in reviewing the case. Subsection (b) provides for the public designation by the Chief Justice of three judges from the Federal courts of appeals or district courts who shall sit together as a special court of review having juris- diction to review denials of applications made to the individual judges designated in subsection (a). One of the three is to be designated publicly as the presiding judge. If the special court of review deter- mines that an application was properly denied, it shall provide a wrtten statement of the reasons for its decision and, on petition of the (government for a writ of certiorari, forward the complete record to the Supreme Court, which will have jurisdiction to review the decision. Subsection (c) provides for the expeditious handling of all pro- ceedings under this chapter and also states that the Chief Justice, in consultation with the Attorney General and the Director of Central Intelligence, shall establish security measures under which applica- tions made and orders granted shall be maintained. The committee contemplates that the record of applications made, information pro- vided, and orders granted by the several judges designated under this chapter shall be maintained in such a way that the judges designated h20 the Subcoof Carl H. mmittee onImlay, gisGeneral Couns, lation of the Administrative ce of the U.S. PermanentSel ct Committee Ton Intelligence, Jan. 10, 1978. Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : C4IIA-RDP80S01268A000400010002-7 under this chapter shall have access when necessary to the records of actions taken by the other judges similarly designated. Subsection (d) has been added to S. 1566, as reported by the Ju- diciary Committee, for the purpose of providing fixed, staggered terms for the judges, also as recommended by the General Counsel of the Administrative Office of the U.S. Courts. Each judge designated under this section shall so serve for a maximum of OF years and shall not be eligible for redesignation. The judges first designated under sub- section (a) shall be designated for terms of from 1 to 7 years so that one term expires each year. The judges first designated under sub- section (b) shall be designated for terms of 3, 5, and 7 years. Section 2524 This section is patterned after 18 U.S.C. section 2518 (1) and (2), and specifies what information must be included in the application. Applications must' be made by a Federal officer in writing and under oath or affirmation. If the officer making the application is unable to verify the accuracy of the information or representations upon which the application is based, the application should include affidavits by other officers who are able to provide such personal verification. Thus, for example, if the applicant was an attorney in the Department of Justice who had not personally gathered the information contained in the application, it would be necessary that the application also con- tain an affidavit by the investigating officer personally attesting to the status and reliability of any informants or other covert sources of information. By this means the source of all information contained in the application and its accuracy will have been sworn to by a named official of the U.S. Government and a, chain of responsibility established for judicial review. Each application must be approved by the Attorney General, who may grant such approval if he finds that the appropriate procedure:; have been followed. The Attorney General's written approval mast indicate his belief that the facts and circumstances relied upon for the application would justify a judicial finding of probable cause that the target is an agent of a foreign power and that the facilities or place at which the electronic surveillance is directed are being used, or about to be used, by an agent of a foreign power, and that all other statu- tory criteria have been met. In addition, the, Attorney General must personally be satisfied that the certification has been made pursuant to statutory requirements. Paragraph (1 ) of subsection (a) requires that the application iden- tify the Federal officer making the application; that is, the name of the person who actually presents the application to the judge. Paragraph (2) requires that the application contain evidence of the authority of the applicant to make this application. This would consist of the Presidential authorization to the Attorney General and the Attorney General's approval. of the particular application. Paragraph (3) requires the identity or description of the person who is the target of the electronic surveillance. The word "person" is used in its juridical sense to mean the individual or entity that is the target of the surveillance. However, care must be taken in framing the order authorizing such surveillance-and minimization procedures--- Approved For Release 2005/11/23 CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 50 that surveillance against one individual does not lead to the acquisi- tion, retention, and dissemination of communications of an entire group or organization of U.S. citizens, thus violating constitutional rights of association and privacy. Paragraph (4) requires a statement of the facts and circumstances justifying the applicant's belief that the target of the electronic sur- veillance is a foreign power or an agent of a foreign power and that the facilities or place at which the surveillance is directed are being used or are about to be used. by that power or agent. These require- ments parallel existing law on surveillances for law enforcement pur- poses (18 U.S.C. 251.8(1) (b) (ii) and (iv) ). Paragraph (5) requires a statement of the proposed minimization procedures. The statement of procedures required under this para- graph should be fuIl and complete and subject to close judicial review. These procedures may differ from case to case, depending on the. type of foreign agent involved, the individuals using the facilities or place to be surveilled, the type of foreign intelligence information sought, and other similar factors. Minimization procedures should where pos- sible, include such elements as methods to avoid the acquisition of irrelevant information at the time of intercept, restrictions on the use of surveillance to times when foreign intelligence information is likely to be obtained, and requirements for deletion of information obtained which does not relate to foreign intelligence purposes. For example, steps should be taken to prevent unnecessary invasion of the privacy of a target's family caused by a 24-hour tap on the family phone when it is known that the target is out of town or at the office. Similarly, conversations unrelated to foreign intelligence should not be retained or, of course, disseminated. It is the intention of the committee that minimization procedures be as uniform as possible for similar surveillances. The committee recognizes that certain types of surveillance operations may involve essentially indentical concerns with respect to protecting U.S. per- sons' rights. This is so regardless of the specific targets involved and makes possible the adoption of uniform minimization procedures for essentially identical surveillance operations. The application of uni- form procedures to identical surveillances will result in a more con- sistent implementation of the procedures, will result in an improved capability to assure compliance with the procedures, and ultimately means a higher level of protection for the rights of U.S. persons. Paragraph (6) calls for a factual description of the nature of the information sought by the electronic surveillance, except where the surveillance is of a foreign power as defined in section 2521 (b) (1) (A), (B), or (C). The description should be as specific as possible and suf- ficiently detailed so as to state clearly what the Government seeks. A simple designation of which subdefinition of "foreign intelligence in- formation" is involved will not suffice. Such a description is not re- quired where a target is one of the "official" foreign powers defined in section 2521 (b) (1) (A), (B), or (C). Where these types of powers are the targets, a designation of a particular subcategory of the de- finition of "foreign intelligence information," as required by sub- paragraph (7) (D), will suffice. The reason for this distinction is that, with respect to such "official" targets, the sensitivity of the surveillance Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 51 is greatly multiplied while the risk of a fruitless surveillance which will not obtain any foreign intelligence information is greatly re- duced. Therefore the administration maintains that such applications should not require as much detailed information to be presented as in cases involving American citizens or other individual targets. Paragraph (7) requires a certification or certifications by the As- sistant to the President for National Security Affairs or by an ap- propriate executive official appointed by the President with the advice and consent of the Senate. The certification would be made by an of- ficial having responsibility for the collection of the information- normally the Assistant to the President for National Security Affairs, the Director of Central Intelligence, the Director of the Federal Bureau of Investigation, or the Secretary of Defense-or such other officer, appointed with the advice and consent of the Senate, who has full knowledge of the case. The possibility of additional certifications is provided to insure that a detailed and complete certification is presented to the judge. The judge may, of course, require the applicant to furnish further information regarding the basis for the certifica- tion. See subsection (c) and section 2525 (a) (5), infra. The certification shall state that the certifying official deems the in- formation sought to be foreign intelligence information, that the pur- pose of the surveillance is to obtain foreign intelligence information, and that such information cannot feasibly be obtained by normal in- vestigative techniques. It shall include a designation of what type of foreign intelligence information is sought and, where the target is not a foreign power as defined in section 2521(b) (1) (A), (B), or (C), a reasoned statement of the basis for certifying that the information sought is foreign intelligence information and that such information cannot feasibly be obtained by other investigative techniques. The requirement that the information sought be deemed "foreign intelligence information" is designed to insure that a high-level of- ficial with responsibility in the area of national security will review and, where the target is not a foreign power as defined in section 2521 (b) (1) (A), (B), or (C), explain the executive branch determination that the information sought is in fact foreign intelligence information. The requirement that this judgment be explained is to insure that those making certifications consider carefully the cases before them and avoid the temptation simply to sign off on certifications that consist largely of boilerplate language. The committee does not intend that the certification be vague generalizations or standardized assertions. The designated official must similarly explain that the purpose of the surveillance is to obtain the described foreign intelligence information. This requirement is designed to prevent the practice of targeting one individual for electronic surveillance when the true purpose of the surveillance is to gather information about another individual. It is also designed to make explicit that the sole purpose of such surveillance is to secure foreign intelligence information and not to obtain infor- mation for any other purpose. The designated official must similarly explain in his affidavit why the information cannot be obtained through less intrusive techniques. This requirement is particularly important in those cases when U.S. citizens or resident aliens are the target of the surveillance. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 52 Finally, where the target of the surveillance is one of the special class of "official" foreign powers (defined in sections 2521(b) (1) (A), (B), or (Q), the certification shall include a statement of the period of time for which the surveillance is required. With respect to sur- veillances of this special class of foreign powers, this statement is placed in the certification because the reviewing court does not have the power to control the length of the surveillance as is the case within the 90-day period otherwise applicable in the bill. Paragraph (8) requires the application to contain a statement of the means by which the surveillance will be effected where the target is other than the special class of foreign powers. Where the target is one of the special classes of foreign powers listed in section 2521(b) (1) (A), (B), or (C), only a designation of the type of surveillance according to the categories of the definition of electronic surveillance is required. It will be sufficient in such cases if the application merely indicates whether the information will be acquired by means of a wire- tap, amicrophone installation, the interception of ~a radio signal, or some other means. Less specificity in describing the means of the sur- veillance is required for the special class of foreign powers because of the extreme importance and sensitivity of the information sought. If such a surveillance requires physical entry (whether forcible or not) of the property of a nonconsenting person, a statement to that effect is required. Paragraph (9) parallels 18 U.S.C. 2518 (1) (e) and requires a state- ment concerning all previous applications dealing with the same persons, facilities, or places, and the disposition of each such previous application. Paragraph (10) parallels 18 U.S.C. 2518(1) (d) and requires a statement as to the period of time for which the surveillance is neces- sary in those cases where the special class of foreign powers is not the target. If the surveillance order is not to terminate automatically when the particular information sought has been obtained, the ap- plicant must provide facts supporting his belief that additional in- formation of the same type will be obtained thereafter. Subsection (b) allows the Attorney General to require other execu- tive officers to provide information to support the application. Subsection (c) enables the judge to require the applicant to furnish further information as may be necessary to make the required deter- minations. It parallels existing law, 18 U.S.C. 2518(2). Such addi- tional proffers would, of course, be made part of the record and would be subject to the security safeguards applied to the application and order. ES'ertion 2525 i Subsection (a) of this section is patterned after 18 U.S.C. 2518(3) and specifies the findings the judge must make before he grants an order approving the use of electronic surveillance for foreign intel- ligence purposes. While the issuance of an order is mandatory if the judge finds that all of the requirements of this section are met, the Judge has the discretionary power to modify the order sought, such as with regard to the period of authorization (except where the spe- cial class of foreign powers is the target) or the minimization proce- Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 53 dures to be followed. Modifications in the minimization procedures should take into account the impact of inconsistent procedures on successful implementation. Paragraph (1) of this subsection requires the judge to find that the President has authorized the Attorney General to approve such appli- cations. Paragraph (2) requires the judge to find that the Attorney General has approved the application being submitted and that the application has been made by a Federal officer. Paragraph (3) requires a finding that there is "probable cause" to believe that the target of the electronic surveillance is a foreign power or an agent of a foreign power and that the facilities or place at which the surveillance is directed are being used or are about to be used by that power or agent. In determining whether probable cause exists under this section, the court must consider the same requisite elements which govern such determinations in the traditional criminal context. Such elements in- clude, for example, the issue of any informant's reliability, the cir- cumstances under which the informant was able to learn about the alleged. activity of the individual who is the subject of the warrant, the length of time which has passed since the information relied upon was acquired, and the degree to which information corroborating an informant must relate to the essential conduct on which the applica- tion is premised and not merely to incidental details. In addition, in order to find "probable cause" to believe the subject of the surveillace is an "agent of a foreign power" under subsection 2521 (b) (2), the judge must, of course, find that each and every ele- ment of that status exists. For example, if a U.S. citizen or resident alien is alleged to be acting on behalf of a foreign entity, the judge must, first find probable cause to believe that the entity is a "foreign power" as defined in section 2521(b) (1). There must also be probable cause to believe the person is acting for on behalf of that foreign power and probable cause to believe that the efforts undertaken by the person on behalf of the foreign power constitute sabotage, terrorism, or other proscribed activities as defined in section 2521(b) (2) (B). Similar findings of probable cause are required for each element necessary to establish that a U.S. citizen is conspiring with or aiding and abetting someone engaged in sabotage, terrorism, or clandestine intelligence activities at, the direction of a foreign power. Paragraph (4) requires the judge to find that the procedures de- scribed in the application to minimize the acquisition, retention, and dissemination of certain information or communications relating to U.S. citizens or lawful resident alien fit the definition of minimization procedures. The comm:itteo contemplates that the court would give these procedures most careful consideration. If it is not convinced that they will be effective, the application should be denied or the proce- dures modified. The committee realizes that total minimization may not be, possible. Therefore, the bill's requirement is phrased in terms of minimization procedures being "reasonably designed." Thus, or example, where irrelevant information cannot be erased from part of a tape, minimization procedures should restrict dissemination of the tape. In addition, where it cannot be determined immediately whether Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 54 a certain piece of information is irrelevant, minimization procedures should require that within a specified time such a determination be made and the irrelevant matter expunged. Paragraph (5) requires that the judges find that the application contains the description and certification or certifications specified in section 2524 (a) (7). If the application meets the requirements of those sections, the court is not permitted to substitute its judgment for that of the executive branch officials, except where a U.S. person is the tar- get of a surveillance. In such a case, the judge must review the cer- tifications to determine whether they are clearly erroneous. This au- thority of the court to "look behind" the certification for surveillances of Americans and reject them if "clearly erroneous" is recognized by the committee as a major improvement over S. 3197 (which did not provide for any judicial review of the certifications). The "clearly erroneous" standard of review is not, of course, comparable to a prob- able cause finding by the judge. Nevertheless, S. 1566 does provide a workable procedure for judicial review (and possible rejection) of executive branch certifications for surveillances of United States persons. S. 1566 as reported by the Judiciary Committee has been amended to clarify the point that the judge may base his review of the certifica- tion regarding U.S. persons not only on the statement initially sub- mitted to him but also on any other information required by the judge to be furnished as necessary for him to determine whether or not the certification is clearly erroneous, see section 2524(c) supra. The judge must find that the determination by the certifying official that the information sought concerning a U.S. person is "foreign intelligence information" was not a clearly erroneous determination. Despite the fact that the court is not allowed to "look behind" the certification in cases not involving U.S. persons there are several checks against the possibility of arbitrary executive action. First, the court, not the executive branch, makes the finding of whether probable cause exists that the target of surveillance is a foreign power or its agent. Second, the certification procedure assures written ac- countability within the executive branch for the decision made to engage in such surveillance. This constitutes an internal check on executive branch arbitrariness. Moreover, it should be noted that if the description and certification do not comply fully with section 2524 (a) (7), they can and must be rejected by the court. Thus, the court could invalidate the certifica- tion if it were not properly signed by the President's designee, did not designate the type of information sought, or did not state that the information sought is deemed to be foreign intelligence informa- tion that the purpose of the surveillance is to obtain foreign intelli- gence information, and that such information cannot feasibly be obtained by normal investigative techniques. Further, if the certifica- tion did not present an explanation of why the information sought is foreign intelligence information which cannot be obtained through normal investigative techniques, the judge could (if surveillance was not targeted against the special class of foreign powers) reject the application or defer approval until an adequate certification was supplied. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 55 Subsection (b) specifies what the order approving the electronic surveillance must contain. It must include the identity or a description of the person or persons targeted by the electronic surveillance. The order must specify the place or facilities against which the surveillance is directed. The order must also specify the type of information sought, or where the special class of foreign powers is the target, the specific category of "foreign intelligence information." These requirements are designed to satisfy the fourth amendment's requirements that warrants describe with particularity and specificity the person, place, and ob- jects to be searched or seized. The order must, in addition to the fourth amendment's requirements, specify the means by which the surveil- lance will be effected (where the target is one of the special class of foreign powers, however, only the specific category of "electronic sur- veillance" is required). In addition, the order must specify the period of time during which the surveillance is approved. The order shall direct that minimization procedures will be fol- lowed. It is intended that the court shall monitor compliance with the minimization procedures in much the same way as has been done pursuant to chapter 119. Willful failure to abid by the minimization procedures may be treated as contempt of court. The order may also direct that a common carrier, landlord, cus- todian, contractor or other specified person furnish information, facili- ties or technical assistance necessary to accomplish the electronic sur- veillance successfully and with a minimum of interference to the serv- ices provided by such person to the target of the surveillance. If this is done, the court shall direct that the person rendering the assistance maintain under security procedures approved by the Attorney General and the Director of the Central Intelligence Agency any records con- cerning surveillance which the person wishes to retain. If the judge directs such assistance, he shall also direct that the applicant com- pensate the person for such assistance. These provisions generally parallel 18 U.S.C. 2518 (4). This directive provision must be read in conjunction with the bill's conforming amendment to 18 U.S.C. 2511(2) (a) (ii), contained in sec- tion 4(b) of this bill. That amendment requires that before a com- munication common carrier or its agent provides such information, facilities or technical assistance to an investigative or law enforcement officer, that officer is required to furnish to the carrier either an order signed by the authorized judge certifying that a court order directing such assistance has been issued or, in the case of surveillance under- taken under chapter 119 or 120 in which a prior order is not required, such as an emergency surveillance, a certification under oath by the officer requesting the assistance that the applicable statutory require- ments have been met. Subsection (c) allows an order approving electronic surveillance under this chapter against any person or entity other than a special foreign power as defined in section 2521(b) (1) (A), (B), or (C) to be effective for the period necessary to achieve its purposes or for 90 days, whichever is less. In the committee's view 90 days is the maximum length of time during which a surveillance of these persons or entities for foreign intelligence purposes should continue without renewed judicial sQrutiny. This period of time is not as long as some have wished Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 56 but longer than others desired. It is considered to be a reasonable con- dition in the foreign intelligence context. 27 When the special class of "official" foreign powers is targeted, how- ever, the surveillance may last as long as one year. Moreover, the ex- ecutive determines the necessary length of the surveillance of these special foreign powers (not to exceed 1 year without reauthorization), and this determination is not subject to the court's review or approval. As already indicated, this is a substantial change from S. 3197 as re- ported in the 94th Congress. There are, however, considerable argu- ments for the change : First, the determination that an entity is within the definition of section 2521 (b) (1) (A), (B), or (C) is not likely to be erroneous. Unlike a person suspected of being a foreign agent, whether an entity fits one of the three special classes of foreign powers-such as a foreign embassy or consulate-will usually be self- evident. Second, the likelihood of obtaining valuable foreign intelli- gence information from these entities is very high. Third, surveillance against such official powers, because of their continuing presence in the United States, is likely to be required for much longer periods of time. Although such surveillance could be accomplished by successive 90- day court renewals, the generation of four times the amount of re- quired paperwork with the attendant increased possibility of a com- promise as well as the administrative burden which would result, are reasons for exempting these foreign powers from the 90-day limita- tion. Given these considerations and the unique status of the targets in- volved, the committee believes that 1 year is not an excessive period of time. In coming to this conclusion, however, the committee emphasizes that, in order for U.S. citizens to be protected adequately in such cases, this provision must not be interpreted to bar judicial review of the effectiveness of the minimization procedures. U.S. citizens may be overheard talking to employees of such an "official" foreign power or may be referred to by such employees. As already indicated, the court has the power to review minimization during the course of the sur- veillance as it does now under chapter 119. This applies regardless of the type of target and remains an important protection. As under chapter 119, extensions of an order may be sought and granted on the same basis as the original order. A new application, including a new certification pursuant to section 2524(a) (7), would therefore be required, updating the information provided previously. Before the extension should be granted, however, the court would again have to find probable cause that the target is a foreign power or its agent. To aid the judge in making this determination anew, it is ex- pected that the court would evaluate the success or failure of any pre- vious surveillances and the facts and circumstances surrounding such surveillance. The court, however, in considering a renewal involving a foreign power as defined in section 2521 (b) (1) (A), (B), or (C), cannot order the Government to submit any information actually ob- tained as a result of the original surveillance or previous extension. This change from S. 3197 reflects concern with the sensitive nature of the information obtained from special foreign powers. 27 United States v. United States District Court, 407 U.S. 297 at 323 (1972). Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 57 In order to make clear the judge's authority to review compliance with the minimization procedures, a provision has been added at the end of subsection (c). It provides that at the end of the period of time for which an electronic surveillance is ap- proved by an order or an extension issued under this section, the judge may assess compliance with the minimization procedures re- quired by this chapter. This provision is not intended to require the judge to assess such compliance, nor is it intended to limit such assess- ments to any particular intervals. The committee believes, however, that it is useful to spell out the judge's authority explicitly so that there will be no doubt that a judge may review the manner in which infor- mation about U.S. persons is being handled. This specifically includes information about U.S. persons acquired from electronic surveillance of a foreign power, as defined in section 2521(b) (1) (A), (B), or (C). Subsection (d) authorizes the Attorney General to approve an emergency electronic surveillance prior to judicial authorization un- der certain limited circumstances. First, the Attorney General must determine that an emergency situation exists which requires the em- ployment of electronic surveillance before an order authorizing such surveillance can with due diligence be obtained. In addition, the fac- tual basis for the issuance of an order under this chapter must be present. The procedures under which such an emergency surveillance is au- thorized are considerably stricter than those of the comparable pro- vision in chanter 119, 18 U.S.C. 2518(7). First, only the Attorney General-as defined-may authorize such emergency surveillance, whereas in 18 TT.S.C. 2518(7) the Attorney General may designate any investigative or law enforcement officer to authorize emergency inter- ceptions under that subsection. Second. the Attorney General or his designee must contemporaneously notify one of the designated judges that an emergency surveillance has been authorized. There is no com- parable requirement- in 18 U.S.C. 2518(7). Third, an application for an order approving the surveillance must be made to that judge within 24 hours, 18 U.S.C. 2518 (7) requires the. application to be made within 48 hours. Fourth, the emergency surveillance cannot continue beyond 24 hours without the issuance of an order; under 18 U.S.C. 2,518 (7) the emergency surveillance may continue indefinitely until the judge denies the application. Fifth, the Attorney General must order that minimization procedures required by this chanter for the issuance of a judicial order be followed during the period of the emergency sur- veillance. There is no comparable provision under 18 U.S.C. 2,518 (7). This last provision is designed to insure that, as much as possible be done to eliminate the acquisition, retention, and dissemination of :in- formation which does not relate to foreign intelligence purposes. The committee's intent, is to place the Attorney General in the role of the court during the 24-hour emergency period. He must examine the min- imization procedures as the court could normally do under paragraph (a) (4) of this section, and ensure that the appropriate procedures are followed. The committee wishes to emphasize that the application must be made for judicial approval even if the surveillance is terminated within the 24-hour period and regardless of whether the information Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 58 sought is obtained. This requirement insures that all emergency sur- veillance initialed pursuant to this chapter will receive judicial review and that judicial approval or denial will be forthcoming nunc pro tune. Thus, the termination of an emergency surveillance before the expiration of the 24-hour period shall not be a basis for the court fail- ing to enter an order approving or disapproving the subsequent appli- cation. It is necessary for both the Department of Justice and con- gressional intelligence committees to have available a complete record both of the bases for such emergency surveillance authorization and of the judicial determinations of their legality under the statutory standard. This provision for emergency authorization of surveillance by the Attorney General may not be utilized pending an appeal under sec- tion 2.523, following the denial of an application for a judicial order. Under such circumstances, the Attorney General could not reasonably determine that the factual basis for the issuance of an order under this chapter to approve such surveillance exists, as required by this subsection. If the application is subsequently denied, or if the surveillance is terminated without an order eventually being sought-which, as al- ready indicated, would constitute an unlawful act under this subsec- tion-no information obtained or evidence derived from the surveil- lance shall be received, used or disclosed by the Government in any trial. hearing or other proceeding before any court, grand jury, depart- ment, office, agency, regulatory body, legislative committee, or other Federal, State, or local authority. This exclusionary provision is de- signed to be absolute. S. 1566 as reported by the Judiciary Committee did not cover the use of information acquired from such disapproved emergency surveil- lance for other purposes. Further restrictions are needed so that there is less incentive to use questionable emergency surveillances. The addi- tional provision requires that no information concerning any U.S. person accmired from a disapproved emergency surveillance shall sub- sequently be used or disclosed in any other manner by Federal officers or employees without the consent of such person, except with the ap- proval of the Attorney General where the information indicates a threat of death or serious bodily harm. The fact that an emergency surveillance was conducted improperly should not disable the Gov- ernment from using the information to protect the life or physical safety of a person. A denial of the application may be reviewed in the same manner as a denial of an original application under section 2523. Neetaon 2520' This section sets forth the permissible uses which may be made of information acquired by means of electronic surveillance conducted pursuant to this chapter. The fact that effective minimization with regard to acquisition and retention may be. more difficult in the foreign intelligence area than. in the more traditional criminal area, and that this chapter contains certain less restrictive procedures than does chapter 119-for example, 90 days or 1 year of surveillance per order rather than 30 da vs--mandates that the uses to be made of the in- formation acgnire(l by means of this chapter be carefully restricted. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 This section, therefore, places more stringent restrictions on dissemina- tion and. use than does the corresponding provision of title III, 18 U.S.C. 2517. The extent to which the Government should be required to surrender to the parties in a criminal trial the underlying documen- tation used to justify electronic surveillance raises delicate problems and competing interests. On the one hand, broad rights of access to the documentation and subsequent intelligence information can threaten the secrecy necessary to effective intelligence practices. However, the defendant's constitutional guarantee of a fair trial could be seriously undercut if he is denied the materials needed to present a proper defense. The comrnittee believes that a just, effective balance has been struck in this section. Subsection (a) requires that information concerning U.S. persons acquired from electronic surveillance conducted pursuant to this chap- ter may be used by Federal officers and employees only for purposes relating to the ability of the United States to protect itself against actual or potential attack or other grave hostile acts of a foreign power or foreign agent, to provide for the national defense or security of the Nation, to provide for the conduct of foreign affairs, to protect against terrorism or sabotage by or on behalf of a foreign power or an agent of a foreign power ; to protect against the clandestine intelligence activities of an intelligence service or network of a foreign power or an agent of a foreign power; or for the enforcement of the criminal law. Thus the lawful uses of foreign intelligence information con- cerning V.S. citizens and resident aliens gathered pursuant to this chanter are restricted carefully to actual foreign intelligence purposes and the enforcement of the criminal law. In order to 'make clear that this provision is linked directly to the required minimization procedures, one addition has been made to S. 1566 as reported by the Judiciary Committee. Information must not only be used or disclosed for the specified purposes, but it must also be used and disclosed in accordance with the minimization proce- dures required by this chapter. A major change from S. 3197 has been made in this section at the insistence of the administration. Whereas in S. 3197 this section ap- plied to all persons, regardless of whether they were Americans. S. 1566 limits the protections of section 2526(a) to U.S. persons. Information concerning non-U.S. persons--who indeed may be foreigners not even in the United States-is not subject to the same restrictions as infor- mation concerning U.S. persons. For example, the information obtained might be used to deport an illegal alien even though such use of the information is not for foreign intelligence purposes and is not for the purpose of enforcing the criminal law. This differentiation between U.S. persons and other persons was sufficiently troublesome to result in an important Judiciary Commit- tee amendment to section 2526(a). By limiting the subsection to U.S. persons, the possibility existed that information obtained by surveil- lance could be used in a variety of illegal ways against, for example, foreign visitors and students. The Judiciary Committee amended this subsection to make clear that no information acquired pursuant to this chapter may be used or disclosed for other than lawful purposes. The bill does not permit information gathered about the lawful activi- Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 60 ties or private life of a foreign visitor to be used to illegally blackmail him into becoming an agent against his country. S. 1566, as amended, now requires that in those cases where the Government wishes to use foreign intelligence information against non-U.S. persons beyond the specific purposes listed in section 2526 (a), it do so in a lawful manner and for lawful purposes. There is no specific restriction in the bill regarding to whom Fed- eral officers may disclose information concerning U.S. persons ac- quired pursuant to this chapter-although specific minimization pro- cedures might require specific restrictions in particular cases. First, the committee believes that dissemination should be permitted to State and local law enforcement officials. If Federal agents monitoring a foreign intelligence surveillance authorized under this chapter were to overhear information relating to a violation of State criminal law, such as homicide, the, agents could hardly be expected to conceal such information from the appropriate local officials. Second, the commit- tee can conceive of situations where disclosure should be made outside of Government channels. For example, Federal agents may learn of a terrorist plot to kidnap a business executive. Certainly in such cases they should be permitted to disclose such information to the executive and his company in order to provide for the executive's security. Finally, the committee believes that foreign intelligence information relating to crimes, espionage activities, or the acts and intentions of foreign powers may, in some circumstances, be appropriately dissemi- nated to cooperating intelligence services of other nations. So long as all the procedures of this chapter are followed by the Federal offi- cers, including minimization and the limitations on dissemination, this cooperative relationship should not be terminated by a blanket prohibition on dissemination to foreign intelligence services. The committee wishes to stress, however, that any such dissemination be reviewed carefully to ensure that there is a sufficient reason why dis- closure of information to foreign intelligence services is in the inter- ests of the United States. Disclosure, in compelling circumstances, to local.officials for the purpose of enforcing the criminal law, to the targets of clandestine intelligence activity or planned violence, and to foreign intelligence services under the circumstances described above are generally the only exceptions to the rule that dissemination should be limited to Federal officials. It is recognized that these strict requirements only apply to infor- mation known to concern U.S. persons. Where the information in the communication is encoded or otherwise not known to concern U.S. persons, only the requirement that the information be disclosed for lawful purposes applies. There is no requirement that before disclosure can be made information be decoded or otherwise processed to deter- mine whether information concerning U.S. persons is indeed present. Of course, the rest rictions on use and disclosure still apply, so that if any Government agency received coded information from the inter- cepting agency, were it to break the code, the limitations on use and disclosure would apply to it. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 61 Section 2526(a) also states that foreign intelligence information obtained may be used to enforce the criminal law if its use outweighs the possible harm to the, national security. This new language, which did not appear in S. 3197, states the obvious. The Department of Justice always has the option of deciding whether to proceed with a criminal prosecution or forego it in the interests of national security. For example, the Department of Justice may decline to prosecute rather than disclose the names of important witnesses and key inform- ants. Whether to go forward with a criminal prosecution remains in the exclusive hands of the executive branch and nothing in section 2526 (a) changes that fact. This provision should under no circum- stances be interpreted to deny the Attorney General the opportunity to perform his important role in this weighing of interests. This subsection also notes that no otherwise privileged communi- cation obtained in accordance with or in violation of this chapter shall lose its privileged character. This provision is identical to 18 U.S.C. 2517 (4) and is designed, like its title III predecessor, to change exist- ing law as to the scope and existence of privileged communications only to the extent that it provides that otherwise privileged communica- tions do not lose their privileged character because they are inter- cepted by a person not a party to the conversation. Subsection (b) must be read in conjunction with the minimization requirements of section 2521(b) (8) and with the preceding subsec- tion (a). As previously noted, the minimization procedures mandated by the court are designed to restrict the acquisition of information obtained by means of electronic surveillance to information .related to foreign intelligence. However, even the most thorough minimization efforts may result in the acquisition of some information which is not foreign intelligence information. This subsection states that the mini- mization procedures required by this chapter do not preclude the retention and dissemination of any information which is evidence of a crime. Such disclosure would, of course, be restricted by the provisions of subsection (a). The implication that such criminal evidence be acquired incidentally logically connotes that it must be acquired lawfully. This requires that there be a good faith effort to mrnimize.28 Thus for example, if monitoring agents choose to disregard the minimization standards and thereby acquire evidence of a crime, against an overheard party whose conversation properly should not have been acquired, that evidence would be acquired in violation of this chapter and would properly be suppressed if offered at, any official proceeding. See subsection (e), infra. Disclosure for law enforcement purposes must be accompanied by a statement that such evidence, or any information derived therefrom, may be used in a criminal proceeding only with the advance authori- zation of the Attorney Genera].. This provision is designed to elimi- nate circumstances in which a local prosecutor has no knowledge that evidence was obtained through foreign intelligence electronic surveil- lance. In granting approval of the use of the evidence the Attorney General would alert the prosecutor to the surveillance and he, in turn, would alert the court in accordance with subsection (c). za United States v. Armocida, 515 F. 2d 29 (3d Mr. 1975). Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Subsections (c), (d), and (e) set forth the procedures under which information acquired by means of electronic surveillance may be re- ceived in evidence or otherwise used or disclosed in any trial, hearing or other Federal or State proceeding. Although the primary purpose of electronic surveillance conducted pursuant to this chapter will not be the gathering of criminal evidence, it is contemplated that such evi- dence will be acquired and these subsections establish the procedural mechanisms by which such information may be used in formal pro- ceedings. At the outset the committee recognizes that nothing in subsection (c) abrogates the rights afforded a criminal defendant under Brady v. Maryland, 211 and the Jencks Act.30 These legal principles inhere in any such proceeding and are wholly consistent with the procedures detailed here. Furthermore, nothing contained in this section is in- tended to alter the traditional principle that the Government cannot use material at trial against it criminal defendant, and then withhold from him such material at trial.- Subsection (c) states that no information acquired pursuant to this chapter may be used unless, prior to the trial, hearing, or other pro- ceeding, or at a reasonable time prior to an effort to disclose the in- formation or submit it in evidence, the Government notifies the court that such information was acquired by means of electronic surveil- lance conducted pursuant to this chapter. This provision has been broadened in S. 1506 over its counterpart in S. 3197 by including non- judicial proceedings. In instances in which the Government intends to disclose surveillance information in such a nonjudicial forum, sub- section (c) would require that the U.S. district court in the district in which the disclosure is to take place be notified of the proposed dis- closure or use. Subsection (d) parallels 18 U.S.C. 2518(10) (a) and provides a sepa- rate statutory vehicle by which a person who has been a subject of elec- tronic surveillance and against whom evidence derived therefrom is to be or has been introduced or otherwise used or disclosed in any trial, hearing or proceeding may move to suppress the contents of any com- munication acquired by, or evidence derived from, such electronic surveillance. The grounds for such a motion would be that (a) the com- munication was unlawfully acquired, or (b) the surveillance was not made in conformity with the order of authorization or approval. The "subject" of electronic surveillance means an individual who was a party to a communication !acquired by electronic surveillance or was a person against whom the surveillance was directed. Thus the word would include an "aggrieved person" as defined in 'section 2510 of title ITT .32 One situation in which such motion might be presented would be that in which the court orders disclosed to the party the court order and accompanying application under subsection (e) prior to ruling on the legality of the surveillance. Such motion would also be appro- priate, however, even after the court's finding of legality if, in sub- 20 373 U.S. 83 (1963). ao 1 ft U.a.C. 31,00 et seq at United States V. Andoisehek. 142 F. 2d 503 (2nd Or. 1944). az See also, Alderman v. (Jnited States, 394 U.S. 165 (1967). Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 63 sequent trial testimony, a Government witness provides evidence that the electronic surveillance may have been authorized or conducted in violation of the court order. The most common circumstance in which such a motion might be appropriate would be a situation in which a defendant queries the Government under 18 U.S.C. 3504 and dis- covers that he has been intercepted by electronic surveillance even before the Government has decided whether evidence derived from that surveillance will be used in the presentation of its case. In this instance, under the appropriate factual circumstances, the defendant might move to suppress ch evidence under this subsection even without having seen any ofsuthe underlying documentation. A motion under this subsection shall be made before the trial, hearing, or proceeding unless there was no opportunity to make such motion or the movant was not aware of the grounds for the motion. The only change in subsection (d) from S. 3197 is to remove as a sepa- rate, independent basis for suppression the fact that the order was in- sufficient on its face. This is not a substantive change, however, since communications acquired pursuant to an order insufficient on its face would be unlawfully acquired and therefore subject to suppression under paragraph (1). Subsection (e) states in detail the procedure the court shall follow when it receives a. notification under subsection (c) or a suppression motion is 'filed under subsection (d). This procedure applies, for example, whenever an individual makes a motion pursuant to sub- section (d) or 18 U.S.C. 3504, or any other statute or rule of the United States to discover, obtain or suppress evidence or information obtained or derived from electronic surveillance conducted pursuant to this chapter (for example, Rule 12 of the Federal Rules of Criminal Procedure). Although a number of different procedures might be used to attack the legality of the surveillance, it is this procedure "notwithstanding any other law" that must be used to resolve the question. The committee wishes to make very clear that the procedures set out in subsection (e) apply whatever the underlying rule or statute refered to in the motion. This is necessary to prevent the carefully drawn procedures in subsection (e) from being bypassed by the in- ventive litigant using a new statute, rule or judicial construction. The special procedures in subsection (e) cannot be invoked until they are triggered by a Government affidavit that disclosure or an adversary hearing would harm the national security of the United States. If no such assertion is made, the committee envisions that mandatory disclosure of the application and order, and discretionary disclosure of other surveillance materials, would be available to the defendant, as is required under title III. When the procedure is so triggered, however, the Government must make available to the court a copy of the court order and accompanying application upon which the surveillance was based. The court must then conduct an ex parte, in camera inspection of these materials as well as any other documents relation to the surveil- lance which the Government may be ordered to provide, to determine whether the surveillance was authorized and conducted in a manner which did not violate any constitutional or statutory right of the per- son against whom the evidence is sought to be introduced. The sub- Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 64 section further provides that in making such a determination, the court may order disclosed to the person against whom the evidence is to be introduced the court order or accompanying application, or por- tions thereof, or other materials relating to the surveillance, only if it finds that such disclosure is necessary to make an accurate determi- nation of the legality of the surveillance. The question of how to determine the legality of an electronic sur- veillance conducted for foreign intelligence purposes has never been decided by the Supreme Court. As Justice Stewart noted in his con- curring opinion in Giordano v. United States: Moreover, we did not in Alderman, Butenko or Ivanov, and we do not today, specify the procedure that the district courts are to follow in making this preliminary determina- tion [of legally.] 394 U.S. 310, 314 (1968) ; see also, Taglianetti v. United States, 394 U.S. 316 (1968). The committee views the procedures set forth in this subsection as striking a reasonable balance between an entirely in camera proceeding which might adversely affect the defendant's ability to defend himself, and mandatory disclosure, which might occasionally result in the wholesale revelation of sensitive foreign in- telligence information. The decision whether it is necessary to order disclosure to a person is for the Court to make after reviewing the underlying documentation and determining its volume, scope, and complexity. The committee has noted the reasoned discussion of these matters in the opinion of the Court in United States v. Butenko, supra. There, the Court, faced with the difficult problem of determining what standard to follow in bal- ancing national security interests with the right to a fair trial, stated : The distinguished district court judge reviewed in camera the records of the wiretaps at issue here before holding the surveillance to be legal * * *. Since the question confronting the district court as to the second set of interceptions was the legality of the taps, not the existence of tainted evidence, it was within his discretion to grant or to deny Ivanov's request for disclosure and a hearing. The exercise of this discretion is to be guided by an evaluation of the complexity of the fac- tors to be considered by the court and by the likelihood that adversary presentation would substantially promote a more accurate decision. (494 F. 2d at 607.) Thus, in some cases, the Court will likely be able to determine the legality of the surveillance without any disclosure to the defendant. In other cases, however, the question may be more complex because of, for example, indications of possible misrepresentation of fact, vague identification of the persons to be surveilled, or surveillance records which include a significant amount of nonforeign intelligence informa: tion, calling into question compliance with the minimization standards contained in the rder. In such cases, the committee contemplates that the court will likely decide to order disclosure to the defendant, in whole or in part, since, such disclosure "is necessary to make an accu- rate determination of the legality of the surveillance." 33 S4 Cf. Alderman v. United States, 394 U.S. 165, 182 n. 14 (1968) ; Tagllanetti v. United States, supra at 317. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/2 CIA-RDP80S01268A000400010002-7 Cases may arise, of course, where the Court believes that disclosure is necessary to make an accurate determination of legality, but the Gov- ernment argues that to do so, even 'i ven the Court's broad discretion- ary power to exercise certain sensitive portions, would damage the national security. In such situations the Government must choose- either disclose the material or forgo the use of the surveillance-based evidence. Indeed, if the Government objects to the disclosure, thus pre- venting a proper adjudication of legality, the prosecution would prob- ably have to be dismissed, and, where the Court determines that the surveillance was lawfully authorized or conducted, the court would, "in accordance with the requirements of law," suppress that evidence which was unlawfully obtained. The committee has chosen the general phrase "in accordance with the requirements of law" to deal with the problem of what procedures are to be. followed in those cases where the trial court determines that the surveillance was unlawfully authorized or conducted. The evidence obtained would not, of course, be admissible during the trial. But beyond this, in the case of an illegal. surveillance, the Govern- ment is constitutionally mandated to surrender to the defendant all the records of the surveillance in its possession in order for the de- fendant to make an intelligent motion on the question of taint. The Supreme Court in Alderman v. United States, supra, held that,. once a defendant claiming evidence against him was the fruit of uncon- stitutional electronic surveillance has established the illegality of such surveillance (and his "standing" to object), he must be given confi- dential materials in the Government's files to assist him in establish- ing the existence of "taint.'' The Court rejected the Government's contention that the trial court could be permitted to screen the files in camera and give the defendant only material which was "arguably relevant" to his claim, saying such screening would be sufficiently subject to error to interfere with the effectiveness of adversary litiga- tion of the question of "taint." The Supreme Court has refused to re- consider the Alderman rule and, in fact reasserted its validity in its Keith, decision. (United States v. U.S. District Court, supra, at 393.) Where the court determines that the surveillance was lawfully authorized and conducted, it would, of course, deny any motion to suppress. In addition, once a judicial determination is made that the surveillance was lawful, a motion for discovery of evidence must be denied unless disclosure or discovery is required by due process. Subsection (f) provides for notice to be served on U.S. citizens and permanent resident aliens who were targets of an emergency surveillance and, in the judge's discretion, on. other citizens and resi- dent aliens who are incidentally overheard, where a judge denies an application for an order approving an emergency electronic surveil- lance. Such notice shall be limited to the fact that an application was made, the period of the emergency surveillance, and the fact that during the period information was or was not obtained. This notice may be postponed for a period of up to 90 days upon a showing of good cause to the judge. Thereafter the judge may forgo the require- ment of notice upon a second showing of good cause. The fact which triggers the notice requirement-the failure to obtain approval of an emergency surveillance-need not be based on Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : 6CIA-RDP80SO1268A000400010002-7 a determination by the court that the target is not an agent of a foreign power engaged in clandestine intelligence activities, sabotage, or terrorist activities or a person aiding such agent. Failure to secure a court order could be based on a number of other factors, such as an improper certification.. A requirement of notice in all cases would have the potential of compromising the fact that the Government had focused an investigation on the target. Even where the target is not, in fact, an agent of a foreign power, giving notice to the person may result in compromising an ongoing foreign intelligence investigation because of the logical inferences a foreign intelligence service might draw from the targeting of the individual. For these reasons, the Gov- ernment is given the opportunity to present its case to the judge for initially postponing notice. After 90 days, during which time the Gov- ernment may be able to gather more facts, the Government may seek the elimination of the notice requirement altogether. It is the intent of the committee that if the Government can initially show that there is a reason to believe that notice might compromise an ongoing investigation, or confidential sources or methods, notice should be postponed. Thereafter, if the Government can show a likeli- hood that notice would compromise an ongoing investigation, or con- fidential sources or methods, notice should not be given. A new subsection (g) has been added to S. 1566 as reported by the Judiciary Committee, for the purpose of restricting the use of unin- tentionally acquired private domestic radio communications. The new subsection is needed because "electronic surveillance" as defined in section 2521 (b) (6) (C) covers only the intentional acquisition of the contents of private domestic radio communications. Such communi- cations may include telephone calls and other wire communications transmitted by radio microwaves. Concern has been expressed that, unless the use of such unintentionally acquired communications is re- stricted, there would be a potential for abuse if the Government acquired those kinds of domestic communications, even without in- tentionally targeting any particular communication. The amendment forecloses this possibility by restricting the use of any information acquired in this manner. In circumstances involving the unintentional acquisition, by an electronic, mechanical, or other surveillance device of the contents of any radio communication, where a person has a reasonable expecta- tion of privacy and a warrant would be required for law enforcement purposes, and where both the sender and all intended recipients are located within the United States, the contents must be destroyed upon recognition. The only exception is with the approval of the Attorney General where the contents indicate a threat of death or serious bodily harm to any person. This restriction is not intended to prevent the Government from maintaining a record of the radio frequency of the communication for later collection avoidance purposes. Section 2527 Section 2527 requires the submission of annual reports to both the Congress and the Administrative Office of the U.S. courts containing statistical information relating to electronic surveillance under this chapter. The reports must include the total number of applications Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/2 , CIA-RDP80S01268A000400010002-7 made for orders and extensions and the total number of orders or ex- tensions granted, modified, and denied. The statistics in these reports should present a quantitative indication of the extent to which sur- veillance under this chapter is used. The requirements in. S. 31,911 for the public reporting of certain addi- tional statistics have been altered due to the introduction in S. 1566 of two different types of warrant (creating a 90-day warrant for one class of target, and a 1-year warrant for official foreign powers). The reporting requirements in S. 31.97, if reenacted verbatim in S. 1566, would obviously give foreign intelligence networks significant infor- mation concerning the number and duration of surveillances of official foreign powers. Changes have been made, therefore, in the public re- porting requirements of S. 3197 so as to avoid the compromising of sensitive information. The statistics reported pursuant to this section may be made public. Section 2528 Congressional oversight is particularly important in monitoring the operation of this statute. By its very nature foreign intelligence sur- veillance must be conducted in secret. The bill reflects the need for such secrecy: judicial review is limited to a select panel and routine notice to the target is avoided. In addition, unlike the statutory provisions of title. III of the Omnibus Crime Control Act of 1968, it is not con- templated that most electronic surveillance conducted pursuant to this chapter will result in criminal prosecution. For these reasons, the committee has added a new section to the bill dealing with the. information to be furnished to the appropriate congressional committees. Section 2528 requires the Attorney Gen- eral to inform fully the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence con- cerning all electronic surveillance under this chapter. Ile must do so at least semiannually. The use of the word "fully" in this provision has the meaning used in Senate Resolution 400, 94th Congress, 2nd session, which expresses the sense of the Senate that the head of each department and agency of the United States should keep the Select Committee on Intelligence "fully and currently informed with respect to in- telligence activities, including any significant anticipated activities, which are the responsibility of or engaged in by such department or agency." A similar provision appears in Executive Order 12036, Jan- uary 24, 1978. This requirement does not constitute a condition prece- dent to the implementation of any such anticipated intelligence ac- tivity. As interpreted by the committee, the "fully" requirement means that the committee must be given enough information to under- stand the activities, but does not mean that the Attorney General must set forth each and every detailed item of information relating to all electronic surveillances. For example, the committee would not ordinarily wish to know the identities,of particular individuals. To preserve the' committee's right to seek further information, when necessary, section 2528 adopts language similar to that contained in S. 3197 as reported in the 94th Congress. It makes clear that nothing in this,chapter shall be deemed to limit the authority and responsibil- Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 68 ity of those committees to obtain such additional information as they may need to carry out their respective functions and duties. In the case of the Senate Select Committee on Intelligence, that authority and responsibility is set forth in Senate Resolution 400, 94th Congress, 2d session. Section 2528 also incorporates a provision contained in S. 3197 re- quiring the Senate Select Committee on Intelligence to report each year to the Senate concerning the implementation of this chapter. It also provides that any amendments to this chapter proposed by the committee shall be considered and acted upon promptly. In the exercise of their respective functions, the Senate Select Committee on Intelligence and the Senate Committee on the Ju- diciary shall consult with members of the Department of Justice and the intelligence community concerning the proper implementa- tion of the act. Section 3 Section 3 delays the effective date of. the act until 90 days following the designation of the first judge pursuant to section 2523 -of this chapter. The purpose of this delay is to allow time for the development of the applications required under this bill and of security measures governing the submission of these applications to the courts. The 90-day delay will also prevent the situation where one judge will be forced to handle all of the applications. CONFORMING AMENDMENTS Section 4 serves the important purpose of integrating the new chapter 120 with the current electronic surveillance law found in chapter 119 of title 18, United States Code. Various provisions of chapter 119 are, applicable to the electronic surveillance engaged in under the new bill and the conforming amendments in this section of S. 1566 are designed to make changes reflecting this fact. In addition, where certain provisions of chapter 119 should not encompass the surveillance procedures in S. 1566, conforming amendments so limit such sections : (a) (1) and (2). These amendments are designed to establish the same criminal penalties for violations of this chapter as apply to vio- lations of chapter 119. As amended, these sections will make it a crimi- nal offense to engage in electronic surveillance except as otherwise specifically provided in chapters 119 and 120. This amendment also provides, however, that "with respect to techniques used by law en- forcement officers" which do not involve the actual interception of wire or oral communications, yet do fall within,the literal definition of elec- tronic surveillance in chapter 120-such as the use of a pen register- the procedures of chapter 120 do not apply. In such cases criminal penalties will not attach simply because the Government fails to follow the procedures in chapter 120 (such penalties may, of course, attach if the surveillance is commenced without a search warrant or in viola- tion of a court order). In all cases involving electronic surveillance for the purpose of obtaining foreign intelligence information, however, the prohibitions of 18 U.S.C. 2511 would apply. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 CIA-RDP80SO1268A000400010002-7 (a) (3), (4), (5), and (6). These amendments make clear that the prohibitions in chapter 119 concerning disclosure and use of informa- tion, obtained through the interception of wire or oral communications in sections 2511 (1) (c) and (d), also apply to disclosure and use of information obtained through electronic surveillance as defined in chapter 120. The statute calls for a fine of not more than $10,000 or imprisonment for not more than 5 years, or both, for each violation. (b) (1). This amendment adds radio communication to wire com- munication and extends the meaning of intercept to include "or other- wise acquire" in section 2511(2) (a) (i), which permits communication common carriers to engage in certain activities. (b) (2). This amendment, when read in conjunction with section 2525(b) (2) (B), makes explicit the fact that a court order obtained under chapter 120 may direct an officer, employee or agent of a com- munication common carrier to provide certain assistance to -the Gov- ernment agents implementing the order. The nature and scope of such assistance is intended to be identical to that which may be directed under section 2518(4) (e) of chapter 119. The amendment further pro- vides that before the carrier may provide such information or assist- ance, whether under chapter 119 or 120, the Government agent must furnish the carrier with an order signed by the court (but not neces- sarily the same order as authorizes the actual surveillance) if an order has been acquired, or a sworn statement by the agent, that all statutory requirements have been met if the surveillance is being conducted pur- suant to the provisions of section 2518(7) of chapter 119 or section 2525 (d) of chapter 120. The document so furnished must also set forth the period of time for which the surveillance is authorized and a de- scription of the facilities from which the communication is to be inter- cepted. And violation of this subsection by a carrier or its representa- tive will render the carrier liable for the civil dailiages provided for in section 2520, subject, of course, to the good faith reliance defense con- tained therein. At the request of the administration, the committee has added a provision to regulate the practice of any telephone company to in- form customers who request a line check whether or not there is a wiretap on their line. It provides that no communication common carrier or officer, employee, or agent thereof shall disclose the existence of any interception under chapter 119 or any electronic surveillance, as defined in chapter 120, with respec` to which the common carrier has been furnished either an order or certification under this subpar- agraph, except as may otherwise be lawfully authorized. The ban upon disclosure is intended to include disclosure of the existence of the electronic, mechanical, or other device. used to accomplish any such interception or surveillance. This provision is not intended to bar disclosure to another officer, employee, or agent of a common carrier, where properly authorized by that common carrier. (c) (1). This amendment makes explicit that an employee of the Federal Communications Commission. may engage in electronic sur- veillance as well as intercept a wire or oral communication in the dis- charge of monitoring responsibilities exercised by the Commission. (c) (2). This amendment makes clear that it is legal to engage in Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 70 electronic surveillance, as well as intercept a wire or oral communica- tion, if a party consents. (c) (3). This amendment: (1) provides statutory authorization for the Government to conduct tests of equipment which may result in electronic surveillance as defined in section 2521 (b) (6) ; (2) author- izes the conduct of "sweeps" to discover illegal taps and bugs, which "sweeps" may result in "electronic surveillance" as defined in section 2521(b) (6) ; and (3), makes explicit that chapters 119 and 120 are "exclusive means by which electronic surveillance, as defined in sec- tion 2521(b) ((;) of chapter 120, and the interception of domestic wire and oral communications may be conducted." An additional provision has been inserted to require that all such testing and defensive "sweeps" be conducted under procedures ap- proved by the Attorney General. Such a requirement has already been established by the President for activities conducted by any agency of the intelligence community, Executive Order 12036, January 24, 1978. All tests conducted pursuant to this provision must be in the normal course of official business by the Government agent conducting the test and must be designed solely for determining the capability of equipment used for foreign intelligence gathering purposes. In addi- tion, the test period shall be limited to that necessary to determine such capability and shall in no instance exceed 90 days without the express approval of the Attorney General. The contents of any communica- tion acquired as a result of the test shall be disclosed only to those officials conducting the test and shall be used and retained by them only for the purpose of the test. At the completion of the testing period, the contents so acquired shall be destroyed. No particular U.S. person may be intentionally targeted for testing purposes without his consent. The committee contemplates that in all cases such testing will be approved by a senior official prior to the commencement of the testing period. "Sweeps" to discover the existence and capability of electronic sur- veillance equipment in violation of 18 U.S.C. 2511 or 47 U.S.C. 605 do not have a specific time limit, but are limited in time to that "nec- essary to determine the existence and capability of such equipment." The Department of Defense, in a letter'to the Judiciary Committee, has characterized these activities as follows : These activities, commonly called technical surveillance countermeasures surveys, are for the purpose of determining if a particular sensitive area has been penetrated by electronic surveillance devices installed by a foreign power or other hos- tile forces. In some cases, these surveys are conducted on a continuous basis. Since these activities are strictly defensive in nature and are for the sole purpose of detecting and neu- tralizing the illegal efforts of hostile powers, a time limit does not seem appropriate. Information acquired pursuant to such "sweeps" may be used only to enforce chapter 119 or section 605 of the Communications Act of 1934, or to protect information from being subject to unlawful electronic surveillance. The provision is not an authorization to target Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23: CIA-RDP80S01268A000400010002-7 71 a person known to be, or suspected of, engaging in unlawful electronic surveillance, even where the purpose is to determine the existence and capability of that person's electronic surveillance equipment. If the per- son engaged in the unlawful electronic surveillance is an agent of a foreign power, he should be targeted under the applicable provisions of chapter 120. This provision is designed to confer statutory authority on the Government's effort to locate and analyze unlawful electronic surveillance activity. A new paragraph (f) is added to section 2511 (2) by this conforming amendment, which must be read in conjunction with the conformin amendment contained in paragraph (d) which repeals section 2511(3 of title 18, United States Code, the so-called national security dis- claimer of title III of the 1968 Omnibus Crime Control and Safe Streets Act. The effect of these. two conforming amendments is to es- tablish chapter 120 as the exclusive congressional statement on the question of the Executive's power to order electronic surveillance. This now paragraph states that nothing in chapter 119 or section 605 of the Communications Act of 1934 shall be deemed to affect the ac- (1Uisition of foreign intelligence information from international or foreign communications by a means other than electronic surveillance, as defined in chapter 120. The purpose of this prefactory phrase is twofold. First, it sets forth the sections of the United States Code which regulate .the procedures by which electronic surveillance may be conducted within the United states and the statutory controls for the use and dissemination of information so acquired. If enacted, this chapter will constitute the sole and exclusive statutory authority under which electronic surveillance of a foreign power or its agent to obtain foreign intelligence information may be conducted within the United States. It will complement chapter 119, which deals with electronic surveillance for law enforcement purposes, and section 605 of the Communications Act of 1934, as amended, which restricts the dissem- ination of certain information transmitted by wire or radio. Second, the language of this amendment exempts from section 605 and chap- ter 119 foreign intelligence gathering from international or foreign communications by means of an electronic, mechanical, or other sur- veillance device if the acquisition does not come within the definition of "electronic surveillance." contained in section 2521(b) (6). Specifi- cally, this provision is designed to make clear that the legislation does not deal with international signals intelligence activities as currently engaged in by the National Security Agency and electronic surveil- lance conducted outside the United States. As to methods of acquisition which come within the definition of "electronic surveillance" in this bill, the Congress has declared that this statute, not any claimed Presidential power, controls. Paragraph (f) continues by stating that with respect to electronic surveillance, as defined in section 2521(b) (6),'and the interception of domestic wire and oral communications, the procedures of chapters 119 and 120 shall be the "exclusive mean-, by which electronic surveil- lance * * * and be * * * conducted." This statement puts to rest the notion that. Congress recognizes an inherent Presidential power to con- duct such surveillances in the United States outside of the procedures contained in chapters 119 and 120. Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 72 Article I, section 8, of the Constitution states : The Congress shall have Power * * * To make all laws which shall be necesary and proper for carrying into Execu- tion the foregoing power, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof. It is clear that the Supreme Court has recognized that Congress may legislate in areas, where, absent such legislation, a constitutional power of the executive may be found to exist (You?igstown Sheet and Tube v. Sawyer, 343 U.S. 579 (1952) ). In that landmark case, the Supreme Court rejected President Truman "s argument that he had inherent con- stitutional authority to seize the steel mills to prevent strikes and insure continued steel production needed for the war effort. The decision was influenced in large measure by the fact that Congress, by passing the Taft-Hartley Act, had explicitly rejected seizure of the steel mills and enacted a legislative alternative to curb labor unrest. In his concurring opinion, Justice Jackson wrote : When a President takes measures incompatible with the express or implied will of Congress, his power is at the lowest ebb, for then he can rely only upon his own constitutional power minus any constitutional power of Congress over the matter. Courts can sustain exclusive presidential control in such a case only by disabling the Congress from acting upon the subject.. (343 U.S. at 637.) (d) This amendment repeals section 2511(3) of chapter 119, thereby eliminating any congressional recognition or suggestion of inherent Presidential power with respect to electronic surveillance. (e) This amendment brings any electronic surveillance as defined in chapter 120 under the same statutory exclusionary rule as applies to chapter 119. This section imposes an evidentiary sanction for failure to comply with the provisions of the chapter. It makes explicit that not only is the communication itself excluded but also any information obtained from electronic surveillance. (f) This amendment makes explicit that the requirements for an application enumerated in subsection 2518(1) apply only to surveil- lance conducted pursuant to chapter 119, since chapter 120 contains its own requirements. (g) This amendment makes explicit that the necessary elements of an order set forth in subsection 2518(4) apply only to surveillance conducted pursuant to chapter 119, since chapter 120 contains its own requirements. (h) This amendment makes explicit that the procedures for dis- closure of the application and accompanying application under this subsection apply only to surveillance conducted pursuant to chapter 119, since chapter 120 contains its own requirements. (i) This amendment makes explicit that the provision for a statu- tory suppression motion contained in this subsection applies only to surveillances conducted pursuant to chapter 119, since chapter 120 contains its own requirements. (j) This amendment makes explicit that the reporting requirements of the Administrative Office of the U.S. courts contained in this sub- Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/2133; CIA-RDP80SO1268A000400010002-7 section apply only to surveillances conducted pursuant to chapter 119 since chapter 120 contains its own requirements. (k) 'These amendments are designed to authorize the recovery of civil damages for violations of chapter 120 in the same manner and amounts as already provided for violations of c "apter 119. The only category of individuals who would be exempted from the provisions of this section are foreign powers and agents of a foreign power as defined in section 2521(b) (1) and (b) (2) (A) of chapter 120. CONGRESSIONAL BUDGET OFFICE, U.S. CONGRESS, Washington, D.C., March 14, 1978. IIon. BIRCH BAYH, Chairman, Select Committee on Intclligcnec, U.S. Senate, Washington; D.C. DEAR MR. CHAIRMAN : Pursuant to section 403 of the Congressional Budget Act of 1974, the Congressional Budget Office has reviewed S. 1566, the Foreign Intel- ligence Surveillance Act of 1977, as ordered reported by the Senate Select Com- mittee on Intelligence, February 27, 1978. Based on this review, it appears that no additional cost to the Govermmnt would be incurred as a result of enactment of this bill. Sincerely, ALICE M. RIVLIN, Director. CHANGES IN EXISTING LAW In compliance with subsection (4) of rule XXIX of the Standing Rules of the Senate, changes in existing law made by the bill, as re- ported, are shown as follows (existing law proposed to be omitted is enclosed in black brackets, new matter is printed in italic, and existing law in which no change is proposed is shown in roman) : UNITED STATES CODE TITLE 18.-CRIMES AND CRIMINAL PROCEDURE * * * * * * * Chapter 119-WIRE INTERCEPTION OR INTERCEPTION OF ORAL COMMUNICATIONS See. 2510. Definitions. 2511. Interception and disclosure of wire or oral communications prohibited. 2512. Manufacture, distribution, possession, and advertisement of wire or oral communication intercepting devices prohibited. 2513. Confiscation of wire or oral communication intercepting devices. 2515. Prohibition of use as evidence of intercepted wire or oral communications. 2516. Authorization for interception of wire or oral communications. 2517. Authorization for disclosure and use of intercepted wire or oral communications. 2518. Procedure for interception of wire or oral communications. 2519. Reports concerning intercepted wire or oral communications. 2520. Recovery of civil damages authorized. ? 2510. Definitions As used in this chapter- (1) "wire communication" means any communication made in whole or in part through the use of facilities for the transmission Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 74 of communications by the aid of wire, cable, or other like connec- tion between the point of origin and the point of reception fur- nished or operated by any person engaged as a common carrier in providing or operating such facilities for the transmission of in- terstate or foreign communications; (2) "oral communication" means any oral communication uttered by a person exhibiting an expectation that such communi- cation is not subject to interception under circumstances justifying such expectation; (3) "State" means any State of the United States, the District of Columbia, the Commonwealth of Puerto Rico, and any terri- tor or possession of the United States; (4) "intercept" means the aural acquisition of the contents of any wire or oral communication through the use of any elec- tronic, mechanical, or other device ; (5) "electronic, mechanical, or other device" means any device or apparatus which can be used to intercept a wire or oral com- munication other than- (a) any telephone or telegraph instrument, equipment or facility, or any component thereof, (i) furnished to the sub- scriber or user by a communications common carrier in the ordinary course of its business and being used 'by the sub- scriber or user in the ordinary course of its business; or (ii) being used by a communications common carrier in the ordi- nary course of its ' business, or by an investigation or law enforcement officer in the ordinary course of his duties; (b) a hearing aid or similar device being used to correct subnormal hearing to not better than normal; (6) "person" means any employee, or agent of the United States or any State or political subdivision thereof, and any in- dividual, partnership, association, joint stock company, trust, or corporation; (7) "Investigative or law enforcement officer" means any officer of the United States or of a State or political subdivision thereof, who is empowered by law to conduct investigations of or to make arrests for offenses enumerated in this chapter, and any attorney authorized by law to prosecute or participate in the prosecution of such offenses; (8) "contents", which used with respect to any wire or oral communication, includes any information concerning the identity of the parties to such communication or the existence, substance, purport, or meaning of that communication; (9) "Judge of competent jurisdiction" means- (a) a judge of a United States district court or a United States court of appeals; and (b) a judge, of any court of general criminal jurisdiction of a State who is authorized by a statute of that State to enter orders authorizing interceptions of wire or oral com- munications ; (10) "communication common carrier" shall have the same meaning which is given the term "common carrier" by section 153(b) of title 47 of the United States Code; and Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/~R : CIA-RDP80S01268A000400010002-7 (11) "aggrieved person" means a person who was a party to any intercepted wire or oral communication or a person against whom the interception was directed. ? 2511. Interception and disclosure of wire or oral communications prohibited (1) Except as otherwise specifically provided in this chapter or chapter 120 or with, respect to techniques used by law enforcement o ficers not involving the- interception of wire or oral communications as otherwise authorized by a search warrant or order of a court of com- petent jurisdiction, any person who- (a) willfully intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire or oral communication or, under color of law, willfully engages in any form of electronic surveillance as defined in chapter 100; _ (b) willfully uses, endeavors to use, or procures any other person to use or endeavor to use any electronic, mechanical, or other device to intercept any oral communication when- (i) such device, is affixed to, or otherwise transmits a signal through, a wire, cable, or other like connection used in wire communication ; or (ii) such device transmits communications by radio, or interferes with the transmission of such communication ; or (iii) such person knows, or has reason to know, that such device or any component thereof has been sent through the mail or transported in interstate or foreign commerce, or (iv) such use or endeavor to use (A) takes place on the premises of any business or other commercial establishment the operations of which affect interstate or foreign commerce; or (B) obtains or is for the purpose of obtaining information relating to the operations of any business or other commercial establishment the operations of which affect interstate or for- eign commerce ; or (v) such person acts in the District of Columbia, the Com- nionwealth of Puerto Rico, or any territory or possession of the United States ; (c) willfully discloses, or endeavors to disclose, to any other person the contents of any wire or oral communication or infor- mation obtained under color of law by any other form of electronic surveillance as defined in chapter 120, knowing or having reason to know that the information was obtained through the intercep- tion of a wire or oral communication or any other form of elec- tronic surveillance, as defined in chapter 120, in violation of this subsection; or (d) willfully uses, or endeavors to use, the contents of any wire or oral communication or information obtained under color of law by any other form of electronic surveillance as defined in chapter 120, knowing or having reason to know that the informa- tion was obtained through the interception of a wire or oral com- munication or any other form- of electronic surveillance, as de f ned in chapter 1 ~0, in violation of this subsection; era (2) (a) M It shall no~Tb~n unblWf officer,lemp oyee,sor agent fof any con under chapter tor of a switchboard, Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 76 munication common carrier, whose facilities are used in the trans- mission of a wire communication or radio communication, to inter- cept or other wise acquire, disclose, or use that communication in the normal course of his employment while engaged in any activity which is a necessary incident to the rendition of his service or to the protec- tion of the rights or property of the carrier of such communication : Provided, That said communication common carriers shall not utilize service observing or random monitoring except for mechanical or service quality control checks. (ii) It shall not be unlawful under this chapter for an officer, employee, or agent of any communication common carrier to pro- vide information, facilities, or technical assistance to an investigative or law enforcement officer who, pursuant to this chapter, or chapter 120, is authorized to intercept a wire or oral [communication.] com- m/unication, or engage in electronic surveillance, as defined in chapter 120: Provided, however, That before the information, facilities, or technical assistance may be provided, the investigative or law enforce- ment officer shall furnish to the officer, employee, or agent of the carrier either-- - (1) an order signed by the authorizing judge certifying that a court order directing such assistance has been issued; or (2) in the case of an emergency interception or electronic sur- veillance as provided for in section 2518(7) of this chapter or section 2525(d) of chapter 120, a certification under oath by inves- tigative or law enforcement officer that the applicable statutory requirements have been met, any setting forth the period of time for which the electronic surveil- lance is authorized and describing the facilities from which the com- munication is to be acquired. Any violation of this subsection by a commianaication conmwn carrier or an officer, employee, or agency thereof, shall render the carrier liable for the civil damages provided for in section 9520. No communication common carrier or officer, em- ployee, or agent thereof shall disclose the existence of any interception under this chapter or electronic surveillance, as defined in chapter 120, with respect to which the common carrier has been furnished either an order or certification under this subparagraph, except as may otherwise be lawfully ordered." (b) It shall not be unlawful under this chapter for an officer, employee, or agent of the Federal Communications Commission, in' the normal course of his employment and in discharge of the monitor- ing responsibilities exercised by the Commission in the enforcement of chapter 5 of title 47 of the United States Code, to intercept a wire communication, or oral communication transmitted by radio or other- wise engaged in electronic surveillance, as defined in chapter 120, or to disclose or use the information thereby' obtained. (c) It shall not be unlawful under this chapter for a person acting under color of law to intercept a wire or oral communication or engage in electronic surveillance, as defined in chapter 120, where such person is a party to the communication or one of the parties to the communication has given prior consent to such interception or such surveillance. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/247 CIA-RDP80S01268A000400010002-7 .(d) It shall not be unlawful under this chapter for a person not acting under color of law to intercept a wire or oral communication where such person is a party to the communication or where one of the parties to the communication has given prior consent to such interception unless such communication is intercepted for the purpose of committing any criminal or tortious act in violation of the Con- stitution or laws of the United States or of any State or for the purpose of committing any other injurious act. (e) Notwithstanding any other provision of this title or sections 605 or 606 of the Communications Act of 1934, it shall not be unlawful for an officer, employee, or agent of the United States in the normal course of his official duty under procedures approved by the Attorney General to conduct electronic surveillance as defined in section 2521 (b) (6) of chapter 120 without a court order for the sole purpose of: (i) testing the capability of electronic equipment, provided that no particular United States person shall be intentionally tar- geted for testing purposes without his consent, the test period shall be limited in event and duration to that necessary to deter- mine the capability of the equipment, that the content of any communication acquired under this paragraph shall be retained and used only for the purpose of determiing the capability of such equipment, shall be disclosed only to the persons conducting the test, and shall be destroyed upon completion of the testing, and that the test may exceed ninety days only with the prior approval of the Attorney General; or (ii) determining the existence and capability of electronic sur- veillance equipment being used unlawfully, provided that no particular United States person shall be intentionally targeted for such purposes without his consent, that such electronic surveil- lance shall be limited in extent and duration to that necessary to determine the existence and capability of such equipment, and that any information acquired by such surveillance shall be used only to enforce this chapter or section 605 of the Communications Act of 1934 or to protect information from unlawful surveillance. (f) Nothing contained in this chapter, or section 605 of the Com- munications Act of 19,34 (47 U.S.C,. 605) shall be deemed to affect the acquisition by the United States Government of foreign intelligence information from international or foreign comunications by a means other than electronic surveillance as defined in section 2521(b) (6) of this title; and the procedures in this chapter and chapter 120 of this title, shall be the exclusive means by which electronic surveillance, as defined in section 2521(b) (6) of chapter 120, and the interception of domestic wire and oral communications may be conducted. [(3) Nothing contained in this chapter or in section 605 of the Communications Act of 1934 (48 Stat. 1143, 47 U.S.C. 605) Shall limit the constitutional power of the, President to take such measures he deems necessary to protect the Nation agains ac- as tual or potential attack or other hostile acts of a po es, deemed , utiai to the obtain foreign inniteaentatesfor otp of ct nat onal se urity in- security of the U Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 78 formation against foreign intelligence activities. Nor shall any- thing contained in this chapter be deemed to limit the constitu- tional power of the President to take such measures as he deems necessary to protect the United States against the overthrow of the Government by force or other unlawful means, or against any other clear and present danger to the structure or existence of the Government. The contents of any wire or oral communication in- tercepted by authority of the President in the exercise of the foregoing powers may be received in evidence in any trial, hear- ing, or other proceeding only where such interception was reason- able, and shall not be otherwise used or disclosed except as is nec- essary to implement that power.] ? 2515. Prohibition of use as evidence of intercepted wire or oral communications Whenever any wire or oral communication has been intercepted or electronic surveillance, as defined in chapter, 120, has been con- ducted, no part of the contents of such communication or other in- formation obtained from electronic surveillance, as defined in chapter 120, and no evidence derived therefrom may be received in evidence in any trial, hearing, or other proceeding in or before any court, grand jury, department, officer, agency, regulatory body, legislative commit- tee, or other authority of the United States, a State, or a political subdivision thereof if the disclosure of that information would be in violation of this chapter or chapter MO. * * * * * * * ? 2518. Procedure for interception of wire or oral communications (1) Each application for an order authorizing or approving the interception of a wire or oral communication under this chapter shall be made in writing upon oath or affirmation to a judge of competent jurisdiction and shall state the applicant's authority to make such application. Each application shall include the following information : * * * * * * * (4) Each order authorizing or approving the interception of any wire or oral communication under this chapter shall specify- An order authorizing the interception of a wire or oral communica- tion under this chapter shall, upon request of the applicant, direct that a communication common carrier, landlord, custodian or other person shall furnish the applicant forthwith all information, facilities, and technical assistance necessary to accomplish the interception unob- trusively and with a minimum of interference with the services that such carrier, landlord, custodian, or person is according the person whose communications are to be intercepted. Any communication com- mon carrier, landlord, custodian or other person furnishing such fa- cilities or technical assistance shall be compensated therefor by the applicant at the prevailing rates. * Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/33: CIA-RDP80SO1268A000400010002-7 7 (9) The contents of any [intercepted] wire or oral communication intercepted pursuant to this chapter or evidence derived therefrom shall not be received in evidence or otherwise disclosed in any trial, hearing, or other proceeding in a Federal or State court unless each party, not less than ten days before the trial, hearing, or proceeding, has been furnished with a copy of the court order, and accompanying application, under which the interception was authorized or approved. ? 2519. Reports concerning intercepted wire or oral communica- tions * * * * * * (3) In April of each year the Director of the Administrative Office of the United States Courts shall transmit to the Congress a full and complete report concerning the number of applications for orders authorizing or approving the interception of wire or oral communica- tions pursuant to this chapter and the number of orders and extensions granted or denied pursuant to this chapter during the preceding cal- endar year. ? 2520. Recovery of civil damages authorized [Any person whose wire or oral communication is intercepted, disclosed, or used in violation of this chapter shall (1) have a civil cause of action against any person who intercepts, discloses, or uses, or procures any other person to intercept, disclose, or use such com- munications and] Any person other than a foreign power or an agent of a foreign power as defined in sections 2521(b) (1) and 2521(b) (2) (A) of chapter 120, who has been subject to electronic surveillance, as defined in chapter 120, or whose wire or oral convmmnication- has been intercepted, or about whom information has been disclosed or used, in violation of this chapter, shall (1) have a civil cause of action against any person who so acted in violation of this chapter and (2) be entitled to recover from any such person- (a) actual damages but not less than liquidated damages com- puted at the rate of $100 a day for each day of violation or $1,000, whichever is higher ; (b) punitive damages; and (c) a reasonable attorney's fee and other litigation costs rea- sonably incurred. A good faith reliance on a court order or legislative authorization shall constitute a complete defense to any civil or criminal action brought under this chapter or under any other law. Chapter 120. ELECTRONIC SURVEILLANCE WITHIN THE UNITED STATES FOR FOREIGN INTELLIGENCE PUR- POSES Sec. 2521. Definitions. 2522. Authorization for electronic surveillance of foreign intelligence purposes. 2523. Designation of judges authorized to grant orders for electronic surveil- lance. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 80 Sec. 2524. Application for an order. 2525. Issuance of an order. 2526. Use of information. 2527. Report of electronic surveillance. 2528. Congressional oversight. ? 2521. Definitions (a) Except as otherwise provided in this section the definitions of section 2510 of this title shall apply to this chapter. (b) As used in this chapter- (1) "Foreign power" means- (A) a foreign government or any component thereof, whether or not recognized by the United States; (B) a faction of a foreign nation or nations, not substan- tially composed of United States persons; (C) an entity, which is openly acknowledged by a foreign government or governments to be directed and controlled by such foreign government or governments; (D) a foreign-based terrorist group; (E) a foreign-based political organization, not substan- tially composed of United States persons; or (F) an entity which is directed and controlled by a foreign government or governments. (2) "Agent of a foreign power" -means- (A) any person, other than a United States person, who- (i) acts in the United States as an o icer or employee of a foreign power; or (ii) acts for or on behalf of a foreign power which engages in clandestine intelligence activities contrary to the interests of the United States, when the circum- stances of such person's presence in the United States indicate that such person may engage in such activities in the United States, or when such person knowingly aids or abets any person in the conduct of such activities or conspires with any person knowing that such person is engaged in such activities; (B) any person who-- (i) knowingly engages in clandestine intelligence gathering activities for or on behalf of a foreign power, which activities involve or may involve a violation of the criminal statutes of the United States; (ii) pursuant to the direction of an intelligence serv- ice or network of a foreign power, knowingly engages in any other clandestine intelligence activities for or on behalf of such foreign power, which activities involve or are about to involve a violation, of the criminal statutes of the United States; (iii) knowingly engages in sabotage or terrorism, or activities which are of may be in preparation therefor, for or on behalf of a foreign power; (iv) knowingly aids or abets any person in the con- duct of activities described in subparagraph (B) (i) - (iii) above, or conspires with any person knowing that Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/2381CIA-RDP80SO1268A000400010002-7 such person is engaged in activities described in subpara- graph (B) (i)-(iii) above: Provided, That no United States person may be considered an agent of a foreign power solely upon the basis of activities protected by the First Amendment to the Constitution of the United States. (3) "Terrorism" means activities which- (A) are violent acts or acts dangerous to human life which would be criminal under the laws of the United States or Of any State if committed within its jurisdiction; and (B) appear to be intended--- (i) to intimidate or coerce the civilian population, (ii) to influence the policy of a government by intimi- dation or coercion, or (iii) to affect the conduct of a government by assassi- nation or kidnapping. (L,) "Sabotage" means activities which would be prohibited by title 18, United States Code, chapter 105, if committed against the United States. (5) "Foreign intelligence information" means- (A) information which relates to, and if concerning a United States person is necessary to, the ability of the United States to protect itself against, actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power; (B) information with respect to a foreign power or foreign territory which relates to, and if concerning a United States person is necessary to- (i) the national defense or the security of the Nation; or (ii) the successful conduct of the foreign affairs of the United States; or (C) information which relates to, and if concerning a United States person is necessary to, the ability of the United States to protect against- (i) sabotage or terrorism by a foreign power or an agent of a foreign power, or (ii) the clandestine intelligence activities of an intel- ligence service or network of a foreign power or an agent of a, foreign power. (6) "Electronic surveillance" means- (A) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio com- ?nvanication sent by or intended to be received by a particular, known United States person who is in the United States, where the contents are acquired by intentionally taraeting that United States person, under circumstances in which a person has a reasonable expectation o f privacy and a warrant would be required for law enforcement purposes; (B) the acquisition by an electronic, mechanical, or other surveillance device, of the contents of any wire communica- tion to or from a person in the United States, without the Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 82 consent of any party thereto, where such, acquisition occurs in the United States while the commmnieation is being trans- mitted by wire; (C) the intentional acquisition, by an electronic, mechan- ical, or other surveillance device, of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and where both the sender and all intended recipients are located within the United States; or (D) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitor- ing to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes. (7) "Attorney General" means the Attorney General of the United States (or Acting Attorney General) or the Deputy Attor- ney General. (8) "Minimization procedures" means procedures which are reasonably designed to minimize the acquisition and retention, and prohibit the dissemination, except as provided for in subsections 2526 (a) and (b), of any information concerning United States persons without their consent that does not relate to the ability of the United States- (A) to protect itself against actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power; (B) to provide for the national defense or security of the Nation; (C) to provide for the conduct of the foreign affairs of the United States; (D) to protect against terrorism by a foreign power or an agent of a foreign power; (E) to protect against sabotage by a foreign power or an agent of a foreign power; or (F) to protect against the clandestine intelligence activi- ties of an intelligence service or network of a foreign power or an agent of a foreign power; and which are reasonably designed to insure that information which relates solely to the ability of the United States to provide for the national de- fense or security of the Nation and to provide for the conduct of the foreign affairs of the United States, under subpara- graph (B) and (C) above, shall not be disseminated in a manner which identifies any United States person, without such person's consent, unless such person's identity is neces- sary to understand or assess the importance of information with respect to a foreign power or foreign territory or such information is otherwise publicly available. (9) "United States person" means a citizen of the United States, an alien lawfully admitted for permanent residence (as defined in section 101(a) (20) of the Immigration and Nationality Act), Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 83 an unincorporated association a substantial number of members of which are citizens of the United States or aliens lawfully admitted for permanent residence or a corporation which is incor- porated in the United States, but not including corporations or associations which are foreign powers as defined in section 0521 (b) (1) (A)-(E). (10) "United States" when used in a geographic sense means all areas under the territorial sovereignty of the United States, the Trust Territory of the Pacific Islands, and the Canal Zone. ? 2522. Authorization for electronic surveillance for foreign intelligence purposes Applications for a court order under this chapter are authorized if the President has, by written authorization, empowered the Attorney General to approve applications to Federal judges having jurisdiction under section 25,03 of this chapter, and a. judge to whom an application is made may grant an order, in conformity with section 2,625 of this chapter, approving electronic surveillance of a foreign power or an agent of a foreign power for the purpose of obtaining foreign intel- ligence information. 2523. Designation of judges authorized to grant orders for electronic surveillance (a) The Chief Justice of the Tinted States shall publicly designate seven district court judges who shall constitute a special court, each member of which shall have jurisdiction to hear applications for and grant orders approving electronic surveillance anywhere within the United States under the procedures set forth in this Chapter, except that no judge designated under this subsection shall have jurisdiction of the same application for electronic surveillance under this chapter which has been denied previously by another judge designated under this subsection. If any judge so designated denies an application for an order authorizing electronic surveillance under this chapter, such judge shall provide immediately for the record a written statement of each reason for his decision and, on motion. of the United States, the record shall be transmitted, under seal, to the special court of review established in subsection (b). (b) The Chief Justice shall publicly designate three judges, one of whom shall be publicly designated as the presiding judge, from the United States district courts or courts of appeals who together shall comprise a special court of review which shall have jurisdiction to review the denial of any application made under this chapter. If such special court determines that the application was properly denied, the special court shall immediately provide for the record a written state- ment of each reason for its decision and, on petition of the United States for a writ of certiorari.. the record shall be transmitted under seal to the Supreme Court, which shall have jurisdiction to review such decision. (c) Proceedinas under this chapter shall be conducted as expedi- tiously as possible. The record of proceedings under this chapter, in- eluding applications made and orders granted, shall be sealed and maintained under security measures established by the Chief Justice in consultation with the Attorney General and the Director of Central Intelligence. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 84 (d) Each udge designated under this section shall so serve for a maximum ofl seven years and shall not be eligible for redesignation, provided that the judges first designated under subsection (a) shall be designated for terms o f _from one to seven years so that one term expires each year, and that judges first designated under subsection (b) shall be designated for terms of three, five, and seven years. ? 2524. Application for an order (a) Each application for an order approving electronic surveillance under this chapter shall be made by a Federal officer in writing upon oath or affirmation to a judge having jurisdiction under section 2523 of this chapter. Each application shall require the approval of the Attorney General based upon his finding that it satisfies the criteria and requirements of such application as set forth in this chapter. It shall include the following information- (1) the identity of the Federal officer making the application; (2) the authority conferred on the Attorney General by the President of the United States and the approval of the Attorney General to make the application; (3) the identity or a description of the target of the electronic surveillance; (4) a statement of the facts and circumstances relied upon by the applicant to justify his belief that- (A) the target of the electronic surveillance is a foreign power or an agent of a foreign power; and (B) the facilities or the place at which the electronic sur- veillance is directed are being used, or are about to be used, by a foreign power or an agent of a foreign power; (5) a statement of the proposed minimization procedures; (6) when the target of the surveillance is not a foreiqn power as defined in section 2521(b) (1) (A), (B), or (C), a detailed description of the nature of the information sought; (7) a certification or certifications by the Assistant to the President for National Security Affairs or an executive branch official or officials designated by the President from among those executive officers employed in the area of national security or de- fense and appointed by the President with the advice and consent of the Senate- (A) that the certifying official deems the information sought to be foreign intelligence information; (B) that the purpose of the surveillance is to obtain for- eign intelliq~nce information; (C) that such information cannot reasonably be obtained by normal investigative techniques; (D) including a designation of the type of foreign intelli- gence information being sought according to the categories described in section 2521(b) (5) ; (E) when the target of the surveillance is not a foreign power, as defined in section 2521(b) (1) (A), (B), or (C), including a statement of the basis for the certification that- (i) the information sought is the type of foreign in- telligence information designated; and Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 85 (ii) such information cannot reasonably be obtained by normal investigative techniques; (F) when the target of the surveillance is a foreign power, as defined in section 2521(b) (1) (A), (B), or (C), stating the period of time for which the surveillance is required to be maintained; (8) when the target of the surveillance is not a foreign power, as defined in section 2521(b) (1) (A), (B), or (C), a statement of the means by which the surveillance will be effected, and when the target is a foreign power, as defined in section 2521(b) (1) (A), (B), or (C), a designation of the type of electronic surveillance to be used according to the categories described in section 2521 (b) (g) and a statement whether physical entry is required to effect the surveillance; (9) a statement of the facts concerning all previous applications that have been made to any judge under this chapter involving any of the persons, facilities, or places specified in the application, and the action taken on each previous application; and (10) when the target of the surveillance is not a foreign power. as defined in section 2521(b) (1) (A), (B), or (C), a statement of the period of time for which the electronic surveillance is required to be maintained. If the nature of the intelligence gathering is such that the approval of the use of electronic surveillance under this chapter should not automatically terminate when the de- scribed type of information has first been obtained, a description of facts supporting the belief that additional information of the same type will be obtained thereafter. (b) The Attorney General may require any other affidavit or certifi- cation from any other officer in connection with the application. (c) The judge may require the applicant to furnish such other in for- mation as may be necessary to make the determinations required by section 2525 of this chapter- ? 2525. Issuance of an order (a) Upon an application, made pursuant to section 2524 of this title, the judge shall enter an ex paste order as requested or as modified approving the electronic surveillance if he finds that- (1) the President has authorized the Attorney General to ap- prove applications for electronic surveillance for foreign intel- ligence information; (2) the application has been made by a Federal officer and approved by the Attorney General; (3) on the basis of the facts submitted by the applicant there is probable cause to believe that- (A) the target of the electronic surveillance is a foreign power or an agent of a foreign power; and (B) the facilities orr place at which the electronic surveil- lance is directed are being used, or are about to be used, by a foreign power or an agent of a foreign power; (4) the proposed minimization procedures meet the definition of minimization procedures under section 2521(b) (8) of this title; (5) the application which has been filed contains the descrip- Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 86 tion and certification or certifications, specified in section 2524 (a) (7) and, if the target is a United States person., the certification or certifications are not clearly erroneous on the basis of the state- ment made under section 2524(a) (7) (E) and any other informa- tion furnished under section 2524(c). (b) An order approving an electronic surveillance under this section shall- (1) specify- (A) the identity or a description of the target of the elec- tronic surveillance; (B) the nature and location of the facilities or the place at which the electronic surveillance willl be directed; (C) when the target of the surveillance is not a foreign power as defined in section 2521(b) (1) (A), (B), or (C), the type of information sought to be acquired and when the target is a foreign power defined in section 2521(b) (1) (A), (B), or (C), the designation of the type of foreign intelligence in- formation under section 2521(b) (5) sought to be acquired; (D) when the target of the surveillance is not a foreign power, as defined in section 2521 (b) (1) (A), (B), or (C), the means by which the electronic surveillance will be effected, and when the target is a foreign power, as defined in section 2521(b) (1) (A), (B), or (C), a designation of the type of electronic surveillance to be used according to the categories described in section 2521 (b) (6) and whether physical entry will be used to effect the surveillance; (E) the period of time during which the electronic sur- veillance is approved; and (2) direct- (A) that the minimization procedures be followed; (B) that, upon the request of the applicant, a specified com- munication or other common carrier, landlord, custodian, contractor, or other specified person furnish the applicant forthwith any and all information, facilities, or technical assistance, necessary to accomplish the electronic surveillance in such manner as will protect its secrecy and produce a mini- mum o f interference with the services that such carrier, land- lord, custodian, contractor, or other person is providing that target of electronic surveillance; (C) that such carrier, landlord, custodian, or other person, maintain under security procedures approved by the Attorney General and the Director of Central Intelligence any -records concerning the surveillance or the aid furnished which such person wishes to retain; (D) that the applicant compensate, at the prevailing rate, such carrier, landlord, custodian, or other person for furnish- ing such aid. (c) An order issued under this section may approve an electronic surveillance not targeted against a foreign power, as defined in section 2521 (b) (1) (A), (B), or (C), for the period necessary to achieve its purpose, or for ninety days, whichever is less; an order under this section shall approve an electronic surveillance targeted against a for- eign power, as defined in section 2521(b) (1) (A), (B), or (C) for the Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 87 period specified in the certification required in section 2524 (a) (7) (F), or for one year, whichever is less. Extensions o f an order issued under this chapter may be granted on the same basis as an original order upon an application for an extension made in the same manner as required for an original application and after new findings required by subsection (a) of this section. In connection with applications for extensions where the target is not a foreign power, as defined in section 2521(b) (1) (A), (B), or (C), the judge may require the applicant to submit information, obtained pursuant to the original order or to any previous extensions, as may be necessary to make new findings of probable cause. At the end of the period of time for which an electronic surveillance is approved by an order or an extension issued under this section, the judge may assess compliance with the minimization proce- dures required by this chapter. (d) Notwithstanding any other provision of this chapter when the Attorney General reasonably determines that- (1) an emergency situation exists with respect to the employ- menteof electronic surveillance to obtain foreign intelligence in- formation before an order authorizing such surveillance can with due diligence be obtained, and (2) the factual basis for issuance of an order under this chap- ter to approve such surveillance exists, he may authorize the emer- gency employment of electronic surveillance if a judge designated pursuant to section P2523 of this chapter is informed by the Attor- ney General or his designate at the time of such authorization that the decision has been made to employ emergency electronic sur- veillance and if an application in accordance with this chapter is made to that judge as soon as practicable, but not more than twenty-four hours of ter the Attorney General authorizes such ac- quisition. If the Attorney General authorizes such emergency employment of electronic surveillance, he shall require that the minimization procedures required by this chapter for the issu- ance of a judicial order be followed. In. the absence of a judicial order approving such electronic surveillance, the surveillance shall terminate when the information sought is obtained, when the ap- plication for the order is denied, or after the expiration of twenty- four hours from the time of authorization by the Attorney Gen- eral, whichever is earliest. In the event that such application for approval is denied, or in any other case where the electronic sur- veillance is terminated without an order having been issued, no information obtained or evidence derived from such surveillance shall be received in evidence or otherwise disclosed in any trial, hearing or other proceeding in or before any court, grand jury, department, office, agency, regulatory body, legislative committee or other authority of the United States, a State or political sub- division thereof; and no information concerning any United States person acquired from such surveillance shall subsequently be used or disclosed in any other manner by Federal officers or employees without the consent of such person, except with the approval of the Attorney General iv here the information indicates a threat o f death or serious bodily harm to any person. A denial of the application made under this subsection may be reviewed as provided in section 2523. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 88 ? 2526. Use of information (a) Information concerning United States persons acquired from an electronic surveillance conducted pursuant to this chapter may be used and disclosed by Federal officers and employees without the con- sent of the United States person only for purposes specified in sec- tion 2521(b) (8) (A) through (F), and in accordance with the min- imization procedures required by this chapter, or for the enforcement of the criminal law if its use outweighs the possible harm to the na- tional security. No otherwise privileged communication obtained in accordance with, or in violation of, the. provisions of this chapter shall lose its privileged character. No information acquired from an elec- tronic surveillance conducted pursuant to this chapter may be used or disclosed by federal officers or employees except for lawful purposes. (b) The minimization procedures required under this chapter shall not preclude. the retention and disclosure, for law enforcement pur- poses, of any information which constitutes evidence of a crime if such disclosure is accompanied by a statement that such evidence, or any information derived therefrom, may only be used in a criminal pro- ceeding with the advance authorization of the Attorney General. (c) Whenever the Government of the United States, Of a State, or of a political subdivision thereof intends to enter into evience or other- wise use or disclose in any trial, hearing, or other proceeding in or before any court, department, officer, agency, or other authority of the United States, a State, or a political subdivision thereof, any in- formation obtained or derived from an electronic surveillance, the Government shall prior to the trial, hearing, or other proceeding or at a reasonable time prior to an effort to so disclose or so use the informa- tion or submit it in evidence notify the court in which the informa- tion is to be disclosed or used or, if the information is to be disclosed or used in or before another authority, shall notify a court in the dis- trict wherein the information is to be so disclosed or so used that the Government intends to so disclose or so use such information. (d) Any person who has been a subject of electronic surveillance. and against whom evidence derived from such electronic surveillance is to be, or has been, introduced or otherwise used or disclosed in any trial, hearing, or proceeding in or before any court, department officer, agency, regulatory body, or other authority of the. United States, a State, or a political subdivision thereof, may move to suppress the con- tents of any communication acquired by electronic surveillance, or evidence derived therefrom, on the grounds that- (1) the communication was unlawfully acquired; or (2) the surveillance was not made in conformity with the order of authorization approval. Such motion shall be made before the trial, hearing, or proceeding unless there was no opportunity to make such motion or the person was not aware of the grounds of the motion. (e) Whenever any court is notified in accordance with subsection (c), or whenever a motion is made by an aggrieved person pursuant to Subsection (d), to suppress evidence on the grounds that it was ob- tained or derived from an unlawful electronic surveillance, or when- ever any motion or request is made by an aggrieved person pursuant to section 3504 of this title or any other statute or rule of the United Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23: CIA-RDP80S01268A000400010002-7 89 States, to discover, obtain or suppress evidence or information ob- tained or derived from electronic surveillance, the federal court, or where the motion is made before another authority, a federal court in the same district as the authority, shall, notwithstanding any other law, if the Government by affidavit asserts that disclosure or an ad- versary hearing would harm the national security of the United States, review in camera and ex parte the application, order, and other ma- terials relating to the surveillance as may be necessary to determine whether the surveillance -was authorized and conducted in a manner that did not violate any right afforded by the Constitution and statutes of the United States to the aggrieved person. In making this determi- nation, the court shall disclose to the aggrieved person portions of the application, order, or other materials relating to the surveillance only where such disclosure is necessary to make an accurate determination of the legality of the surveillance. If the court determines that the elec- tronic surveillance of the aggrieved person was not lawfully author- ized or conducted, the court shall in accordance with the requirements of law suppress the information obtained or evidence derived from the unlawful electronic surveillance. If the court determines that the surveillance was lawfully authorized and conducted, the court shall deny any motion for disclosure or discovery unless required by due process. (f) If an emergency employment of the electronic surveillance is authorized under section 2.525(d) and a subsequent order approving the suveillance is not obtained, the judge shall cause to be served on any United States person named in the application and on such other United States persons subject to electronic surveillance as the judge may determine in his discretion it is in the interest of justice to serve, notice of- (1) the fact of the application; (2) the period of the surveillance; and (3) the fact that during the period information was or was not obtained. On an ex parte showing of good cause to the judge the serving of the notice required by this subsection may be postponed or suspended for a period not to exceed ninety days. Thereafter, on a further ex parte showing of good cause, the court shall forego ordering the serving of the notice required under this subsection. (g) In circumstances involving the unintentional acquisition, by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and where both the sender and all intended recipients are located within the United States, such con- tents shall be destroyed upon recognition, except with the approval of the Attorney General where the contents indicate a threat of death or serious bodily harm to any person. ? 2527. Report of electronic surveillance In April of each year, the Attorney General shall report to the Ad- ministrative Office of the United States Courts and shall transmit to Congress with respect to the preceding calendar year- Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 90 (1) the total number of applications made for orders and ex- tensions of orders approving electronic surveillance; and (2) the total number of such orders and extensions either granted, modified, or denied. ? 2528. Congressional Oversight (a) On a semiannual basis the Attorney General shall fully inform the House Permanent Select Committee on Intelligence and the Sen- ate Select Committee on Intelligence concerning all electronic sur- veillance under this chapter. Nothing in this chapter shall be deemed to limit the authority and responsibility of those committees to ob- tain such additional information as they may need to carry out their respective functions and duties. (b) On or before one year after the effective date of this chapter, and on the same day each year thereafter, the Select Committee on Intelligence of the United States Senate shall report to the Senate concerning the implementation of this chapter. Said reports shall in- clude but not be limited to an analysis and recommendations con- cerning whether this chapter should be (1) amended, (2) repealed, or (3) permitted to continue in effect without amendment. (c) In the event the Select Committee on Intelligence of the United States Senate shall report that this chapter should be amended or re- pealed, it shall report out legislation embodying its recommendations within thirty calendar days, unless the Senate shall otherwise deter- mine by yeas and nays. (d) Any legislation so reported shall become the pending business of the Senate with time for debate equally divided between the pro- ponents and opponents and shall be voted on within thirty calendar days thereafter, unless the Senate shall otherwise determine by yeas and nays. (e) Such legislation passed by the Senate shall be referred to the appropriate committee of the other House and shall be reported out by such committee together with its recommendations within thirty calendar days and shall thereupon become the pending business of such House and shall be voted upon within three calendar days, unless such House shall otherwise determine by yeas and nays. (f) In the case of any disagreement between the two Houses of Con- gress with respect to such legislation passed by both Houses, conferees shall be promptly appointed and the committee of conference shall make and file a report with respect to such legislation within seven calendar days a f ter the legislation is referred to the committee of con- ference. Nothwithstanding any rule in either House concerning the printing of conference reports in the record or concerning any delay in the consideration of such reports, such reports shall be acted on by both Houses not later than seven calendar days after the conference report is filed. In the event the conferees are unable to agree within three calendar days they shall report to their respective Houses in disagreement. Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 ADDITIONAI. VIEWS OF SENATOR MALCOLM WALLOP This bill fills an important need. Title III of the Omnibus Crime Act of 1.968 did not regulate the executive branch's authority to con- duct electronic surveillance for purposes of national security. In 1972 the Supreme Court's Keith decision brought electronic surveillance conducted for purposes of national security into the scope of the fourth amendment, and strongly suggested that Congress regulate such surveillance. Since that time, the executive agencies which nor- mally carry out such surveillance have been under massive but con- flicting political pressures to surveil and not to surveil. In the case of FBI Special Agent John Kearney, for example, we see a conflict be- tween the need to catch the group which, among other things, bombed the Capitol on the one hand, and some interpretations of the crime bill of 1968 and the Keith decision on the other. We also see standards in this field evolving rapidly and perhaps being applied retroactively. The executive agencies have reacted as one might expect. Earlier this year the Attorney General told us that, with one exception, no Ameri- can citizen was then the target of electronic surveillance. It would be comforting to think this means no American citizens are involved in activities which merit surveillance. Instead it seems that those who normally should be surveilling are afraid to act without firm legal mandate. Their position is entirely understandable. Without fixed standards we cannot expect them to stick their necks out in order to protect the country. This bill provides such standards in limited cir- cumstiances. Were there to be a choice between this bill and the cur- rent state of things I should certainly choose the bill. The bill does give firm legal basis for action to agencies too disheartened to act with- out it. More important, it represents a genuine attempt-perhaps the first attempt by Congress-to think through and to balance the citizen's competing claims to security from foreign powers, their agents and international terrorists, and to security from electronic surveillance by his own Government. The bill's premises are altogether reasonable. The power to conduct electronic surveillance for the purpose of gaining foreign intelligence and foreign counterintelligence is ancillary to the President's consti- tutional power to command the Armed Forces and to direct the Na- tion's foreign affairs. In order to be lawful however, the power of electronic surveillance, like all other powers, (must be exercised only for the purpose for which it was intended. Each exercise of power must be, reasonably and proportionally related to the end for which the power exists. The bill therefore was written in order to allow the executive branch to conduct such electronic, surveillance-but only such electronic surveillance--as is necessary to gather the intelligence and counterintelligence information truly needed by the country. (91) Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 92 Hence the bill attempts to define the persons who may be surveilled, and the circumstances under which they may be surveilled, as well as the nature of the information to be sought. In addition the bill sets forth standards for the use to which information so gained may be put. The bill presents the Congress with issues of two different kinds. One is the appropriateness of the definitions of persons, circumstances and information. I will argue below that these should be somewhat different than they are. The second, more important, has to do with the role-which the bill assigns to the Judiciary. The jud'iciary'8 role In answer to concerns that the Judiciary is being made to rule on the substance of decisions affecting defense and foreign affairs, the argument has been made that the Judiciary's role in the bill is mini- mal. The burden of developing the case for surveillance is to rest on the executive branch. The executive branch will have to apply the bill's definitions. The judge, so goes the argument, will merely receive the certification and, when the persons to be surveilled are not U.S. persons will automatically allow the executive branch to proceed. The judge will not have to decide the merits of the cases, nor will he personally decide whether there is "probable cause" for looking at the case as the executive does. He will merely make sure that the executive branch has adhered to the standards set forth by the bill and its accompanying report in determining whether the person(s) in question may be surveilled. The judge will, however, have to con- trol how the information is used. In the first instance the judge's role is merely a clerical one. It could be performed by OMB, by the GAO, or by the staff of any congressional committee. In the second instance the judge's task is managerial. In neither instance is it judi- cial. Why then confide it to judges? The answer seems to be that judges add an aura of legality to the process. The judicial branch however may not consent to provide rubber stamps and low-level man- agers for the executive branch. Thus where the judiciary's role is small it is both superfluous and, above all, nonjudicial. Where U.S. persons are or may be concerned, however, the judici- ary's role is undeniably larger. In such case the bill requires the judge to decide whether the executive branch's application of the criteria is or is not "clearly erroneous." Because this places the judge in the position of deciding on the propriety of the executive branch's deci- sion, it raises a number of constitutional questions. Heretofore the judicial branch has resisted temptations to declare itself competent in foreign affairs and defense. In the case of Chicago Southern v. Waterman Steamship Co. (333 U.S. 103, 111, 1948), the Supreme Court acknowledged the court's incompetence in matters of foreign intelligence. The substance of such matters, said the courts "are delicate, complex, and involve large elements of prophecy. They are and should be undertaken only by those directly responsible to the people whose welfare they advance or imperil." Such decisions are in "the domain of political power, not subject to judicial intrusion or inquiry." Clearly, defense and foreign relations are political tasks. That ;s to say, they are to be conducted subject to the people's power to elect. Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 93 The power to surveil for purposes of defense and foreign affairs be- longs to that branch of government empowered by the Constitution to command the armed forces and conduct foreign affairs. There are no judicial criteria for interpreting whether this or that foreign visitor i or is not an agent of a foreign power, whether this or that Ameri- can's connection with persons who may have some relation with the intelligence services of a foreign power has sufficient connections to warrant surveillance. There are legitimate questions regarding the proper role of the Judiciary in society involved here. In the past we have seen legisla- tion which has directed the courts to check the procedural regularity of the executive branch's actions. All too often we have seen the courts follow the valid logic: that one cannot make judgments on procedure without reaching substance, and assume the authority for substantive review. The most recent instance is that of environmental law. Some judges are quite ready to move into foreign affairs in an equally substantive way. Judge Wright has written in the Zweibon case (516 F2nd 594 DC Circuit Court, 1975) that judges possess the "analytical ability or sensitivity of foreign affairs necessary to evalu- ate recommendations" for electronic surveillance. Furthermore, ac- cording to Judge Wright, "a Federal judge has lifetime tenure and could presumably develop an expertise in the field of foreign affairs if consistently presented to for authorizations for foreign security wiretaps." No doubt, a judge could; the large question is whether a judge should. The above mentioned logic would operate swiftly in the areas cov- ered by the bill. Is this information, a judge will have to decide, really necessary to protect the United States against grave hostile. acts? Just how hostile is that country toward the United States? Will his information really contribute to the successful conduct of our rela- tions with that country? And what, after all, is success with regard to that country ? We must ask whether it would be wise, never mind constitutional, to place judgments on foreign affairs and defense into the hands of people who are not democratically responsible. Has the country so benefited from judicial activism in domestic affairs that it wishes to give judges responsibilities for foreign affairs and defense as well? And if, under the bill, one wished to minimize the amount of substantive judgment exercised by judges, how could he go about. excluding from the special court people who think as Judge Wright does? The judges would be put in an impossible position. They would have to become either the executive's rubber-stamps or the executive's competitors. The role assigned to the judiciary by the bill also appears some- what alien to the old Anglo-American tradition that the Judicial power may deal only with concrete adversary situations. Unlike European judges, ours until very recently have not issued advisory opinions on administrative proceedings. The judgment of "not clearly er- roneous" envisaged by the bill looks like an advisory opinion be- cause the procedure for the warrant is entirely ex parte and because in nearly all cases the warrant procedure will be the entirety of the legal proceeding. The cases which would come before the special court would not, and would not be expected to, go beyond the procedure for Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 94 the warrant. Only incidentally some would result in real trials. But trials are precisely the concrete adversary proceedings which make judgments issued in ex parte proceedings something other than ad- visory opinions. Ex parte proceedings which do not normally result in trials are also questionable from the standpoint of individual rights. Unless there is ultimately a trial, the individual affected will never have an opportunity to contest the government's case. Indeed, a body of case law is likely to grow without benefit of arguments contrary to the Government. If the judicial proceedings envisaged by the bill are to be final ones --that is, if they are not to end in trials-then there should at least be a kind of public defender or devil's advocate to argue against the executive branch's position. In the end we must decide whether these are to be real judicial proceedings or not. The secrecy of the entire proceedings is itself quite foreign to our legal and constitutional system. Can our legal system stand a body of secret case law? It is not altogether clear that all the judges would be privy to the records of all the cases. If they were not, what good could dissenting opinions do? In the end, the only real means available to a dissenting judge or Justice of the Supreme Court, if he deemed a Government act of surveillance grossly abusive, would be to break secrecy and make the case public. It is far from clear that any action short of impeachment could be taken against such a judge. The bill, in short, raises the possibility of a constitutional clash. In a sense the bill succeeds too well. Under it, each and every act of electronic surveillance authorized by the special court would be ipso facto legal. That is not an unmixed blessing, for it would curtail drastically Congress' ability to question the appropriateness of any such act. Under the bill, the. intelligence committees of Congress may indeed have access to all information regarding requests for surveil- lance and their disposition. But what could any Congressman or Sen- ator do about any act of surveillance he considered unjust or inappro- priate? That act would have been not only requested under congres- sional standards, but certified as meeting those standards by a Fed- eral judge. For all practical purposes the Congressman or Senator would face a res adjudicate. His chances of righting what he con- sidered a wrong would be small-especially if he belonged to the minority party, and if the act of surveillance tended to favor the persons or policies of the majority party. Past abuses of the Presi- dent's power of electronic surveillance for purposes of national se- curity were not stopped by the judiciary, but by the only agency with the political power to do it: Congress. The judiciary's role in this bill would reduce Congress' latitude for action in this area. The bill, however, gives the unfortunate appearance of trying to turn political questions into legal ones resolvable by judges not sub- ject to-election. It is doubtful whether this can be done in this case. Is it possible tinder our Constitution for ordinary legislation to take away the. President's power to do what he deems necessary to success- fully command this country's defense forces and to successfully run our foreign relations? Let there be no mistake that the bill tries to do this when it stipulates that before exercising a power that is acknowl- edged to be his, he must receive authorization from a judge. The Approved For Release 2005/11/23 : CIA-RDP80S01268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 95 principle that would be established here is that any given action of the executive which may affect the constitutional rights of citizens must be judicially deemed reasonable or "not clearly erroneous" before .the fact. A moment's reflection is enough to conjure up any number of absurd situations which would be created by the application of this principle. None of this is to say that there can be no check upon the exercise of presidential powers, but rather to indicate that such checks should be political. and must be after the, fact. The bill could achieve its worthy intended purpose, and yet avoid all the above mentioned difficulties if only two changes were made: (1) the review of the executive's certification that a particular act of electronic surveillance conforms to the bill's standards should occur after rather than before the fact, and (2) the reviewing body ought not to be a special court but two subcommittees of the intelligence committees of the Congress. Standards The shortcomings in the bill's standards proceed from three princi- pal causes. First and foremost the bill confuses surveillance conducted for the purpose of gaining information necessary to the defense and foreign affairs of the United States with surveillance for the purpose of enforcing criminal law. Second, in. several places the bill leaves to the judge the task of deciding questions on which its authors could not agree. Third, the standards are unduly complex. The judge may not approve surveillance of U.S. persons unless the Government can show that he or she "knowingly engaged in clandes- tine intelligence activities which involve or ma.y involve a violation of the criminal statutes of the United States" or knowingly commits, prepares to commit, or aids in the preparation or commission of, acts of sabotage or terrorism. In other words, in order to make himself eligible for surveillance someone not only has to have done something which could land him in jail, but he has to have done it knowingly. The latter, of course, is hard enough to show in a trial, never mind a hearing. Then there is the fact that most clandestine intelligence activ- ities do not break the law, as shown by the recent case of the East, German agent James Sattler. Such activities-secret, communications and interviews with Government officials-inay include violations of law. But who could blame a judge for deciding that an activity which does not violate the law does not in fact involve a. violation of law? Indeed, the report states that activity protected by the Constitution of the United States may form no part of the basis for a finding that a person should be surveiled. But even if these, standards were made permissive enough to ex- plicitly permit the surveillance of persons such as Mr. Sattler, or evert of thoroughly innocent, dupes, they would still divert the bill from its national purpose : surveillance of persons not for law enforcement but for the very sake of the information to be obtained. In cases where, the defense or foreign relations of the United States are concerned, the subject's culpability or responsibility is arguably beside the point. The information gained by surveil] ing him may not relate to hum at all, but may save countless lives. Consider the case of someone with knowl- edge of a band of nuclear terrorists, hiding in one of a thousand Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7 96 apartments in a huge complex. It would be both reasonable and easy to tap every telephone in the complex, discard all intercepts but the correct one, and gain the vital information. But that would involve 999 violations of this bill. Consider also the cases of thoroughly in- nocent persons used as couriers by foreign agents. By surveilling them we could uncover other parts of a dangerous network. The bill does not allow us to. Consider, finally, the case of a thoroughly innocent American who may have knowledge which, unbeknownst to him, would shed light on foreign military or intelligence plans, and who would be placed in danger if contacted. Under this bill this American could not be surveilled. Whether or not to intrude. upon the privacy of the abovementioned Americans would involve decisions of foreign and defense policy, not criminal law. The unwarranted confusion of the two serves neither well. In some places the bill's standards-as elucidated in the report- are all too explicit. An example is the report's detailed discussion of why, under the standards of the bill, the surveillance of persons who worked to defeat the U.S. effort in Vietnam would be unlawful. The Judiciary Committee report states that during the Vietnam War some activists had coordinated their anti-U.S. efforts with North Vietnam and other Communist powers, but that since they operated autono- mously rather than at the behest of Communist regimes, they would have been immune from surveillance under this bill. This kind of ex post facto exoneration of one side of a controversy and indictment of the other is, at best, gratuitous. These descriptions set forth distinctions where I doubt the Ameri- can people would find difference. For example, the report says : * * * direction from personnel of a foreign power which are not connected with an intelligence service or a network would not be a basis for electronic surveillance . . . Leaving aside the enormous practical difficulty of probing for the connections between the several component parts of foreign powers, especially given the state of our intelligence, one cannot escape the question of how many "cutouts" are enough to exempt an American acting on behalf of or in conjunction with a Communist regime. from lawful electronic surveillance? Most Americans would probably agree that in such cases it would be better to err on the side of caution and tell the intelligence agencies to survey anyone working with such regimes. The bill ought to reflect this. Finally, the very complexity of the standards must be judged a drawback. Even if they provided the Nation sufficient protection in peacetime, they would surely be too cumbersome to do so in time of war. In time of war, then, a new bill would have to be hastily enacted to provide for emergency powers. But emergency legislation is gener- ally bad legislation. While we have the time we ought to enact a bill workable in bad times as well as in good times. MALCOLM WALLOP. 0 Approved For Release 2005/11/23 : CIA-RDP80SO1268A000400010002-7