FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1977
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP80S01268A000500040008-7
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
88
Document Creation Date:
December 19, 2016
Document Release Date:
September 20, 2005
Sequence Number:
8
Case Number:
Publication Date:
November 22, 1977
Content Type:
OPEN
File:
Attachment | Size |
---|---|
![]() | 6.93 MB |
Body:
App~~)Meae 2005/1/nl~jA-RDP80S1268AOOROOQ0008-7
18t Session- 604 Part 2
Mr. ABOUREZrs (for Mr. KENNEDY), from the Committee on
the Judiciary, submitted the following
REPORT
PART II-APPENDIX TO THE MINORITY VIEWS OF
SENATOR JAMES AP,OURZEP
[To accompany S. 15661
The Committee on the Judiciary, to which was referred the bill
(S. 1566) to amend title 18, United States Code, to authorize applica-
tions for a court order approving the use of electronic surveillance to
obtain foreign intelligence information, having considered the same,
reports favorably thereon with amendments and recommends that the
bill (as amended) do pass.
Due to an oversight, the appendix to the minority views of Senator
James Abourezk, referred to in footnote 3 on page 83 of Senate Re-
port 95-604, was not printed.
The appendix consists of six hypothetical cases, supplied by the
Justice Department, to, support the claimed need for a "noncriminal
standard" in S. 1566, along with an analysis of each case done by the
Washington office of the American Civil Liberties Union.
The appendix is as follows :
AiPENDIx.-TIII". JUSTICE DEPARTMENT HYPOTIIETICALS
In response to questions posed by Senator James Abourezk, Attorney
General Griffin Bell sent a letter to the Senate Judiciary Committee
wherein he outlined six hypothetical cases which Justice Department
officials contend warrant a departure from a criminal standard in the
Foreign Intelligence Surveillance Act of 1977. According to the Jus-
tice Department, these cases could not be reached under current espi-
onage laws. After studying the cases, it is our contention that in three
of the cases outlined, a judge would issue a warrant under current
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
.9J
espionage laws and that in the remaining three cases, a judge would
not issue a warrant even under S. 1566 as currently drafted. In sum,
the administration has not made a case for departing from the crimi-
nal standard in this act.
Case No. 1
"A Spinelli-qualified 1 informant reports that A has, pursuant to a
foreign intelligence service's direction, collected and transmitted sen-
sitive economic information concerning IBM trade secrets and ad-
vanced technological research which ultimately would have a variety
of uses including possible use in a sophisticated weapons system, but
which is not done pursuant to a Government contract. A is placed
under physical surveillance and is seen to fill dead drops which are
cleared by a member of a Communist Bloc embassy suspected of being
an agent of its foreign intelligence service."
Comment.-This case turns on whether commercial information such
as an IBM trade secret which might be used in a sophisticated weapons
system constitutes "national defense" information or information "re-
lating" to the national defense under 18 U.S.C. 794. The Justice De-
partment contends that it may not. However, the Supreme Court, in
Gorin v. U.S., 312 U.S. 19 (1941), stated: "National defense . . . is
a `generic concept of broad connotations, referring to the military and
naval establishments and the related activities of military and naval
establishments and the related activities of national preparedness.' We
agree that the words `national defense' in the espionage, act carry that
meaning." Id. at 28. Thus, if a court found that a person fit all of the
other criteria of 2521(b) (2) (B) and that the information being
gathered was from an industrial source, it still would have no diffi-
culty finding that there was probable cause to believe that 18 U.S.C.
794 was being violated.
Case No. 2
"Pursuant to the physical surveillance of a known foreign intelli-
gen.ee ollicer, B is seen to clear dead drops filled by that officer. On the
second 'Tuesday of every month B drives by the officer's residence, after
engaging in driving maneuvers intended to shake any surveillance.
Within 1 block of the officer's residence B always sends a coded citi-
zen's band radio transmission. B is discovered to have cultivated a close
relationship with a State Department employee of the opposite sex
specializing on matters dealing with the country of the intelligence
agent."
Comment.-First it is not clear who the Government wants to place
under electronic surveillance. Unless the vague "conspiracy" section,
2521 (b) (2) (iii) remains in the bill, the State Department employee
could not be wiretapped. Of course, the conspiracy section should be
stricken from the bill. The Justice Department does believe it has
probable cause to tap B under S. 1566. However, it would also have the
authority to seek a warrant if 18 U.S.C. 794 were the standard.
The Justice Department seems to assume that it is necessary to
know precisely what the content of the information is to establish
i Spinelli v. United States, 393 U.S. 410 (1969), states the requirements by which the
reliability of an informant and his information must be tested for purposes of obtaining a
search warrant.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/233,: CIA-RDP80SO1268A000500040008-7
what law is being violated, if any, iii order to secure a warrant. How-
ever, the fact that the information is being passed to a "known foreign
intelligence officer" should be sufficient to establish probable cause
under 794. Moreover, 2521(b) (2) (B) (i) does not appear to require
that the court find that a particular statute will be violated but only
that the activities "involve or will involve a violation of the criminal
statutes of the United States." And given the very broad interpreta-
tion of the phrase "national defense" by. the Supreme Court, it is
doubtful that any court would pause to inquire into the contents of
the material before issuing a warrant. Certainly since all other ele-
ments required by S. 1566 have been met, a court would have probable
cause to believe that a conspiracy to violate 18 U.S.C. 794 was
underway.
Case No. 3
"C, using highly sophisticated equipment developed in a hostile
foreign country, taps and data transmissions lines of several elec-
tronies corporations. These lines do not carry communications which
can be aurally acquired, nor do they carry classified information, but
the information carried, which is not available to the public, when
put together, can give valuable information concerning components
which are used in U.S. weapons systems."
Comment.-This case, like case No. 1, turns on the meaning of "na-
tional defense" and "related" information in current espionage laws.
Nothing in section 793 of title 18 limits such information to data that is
classified or developed pursuant to contract. Again, given the Court's
broad reading in Gorin, the "valuable information concerning com-
ponents which are used in U.S. weapons systems" would be covered
under 18 U.S.C. 794. Since all the other element under 2521(b) (2) (B)
have been met, there would be probable cause to find that a conspiracy
to violate section 794 of title 18 existed.
Case No. 4
"D, a headwaiter in a fashionable Washington, D.C. restaurant,
acts as a bookmaker and procurer for several well known and highly
placed customers. A Spinelli-qualified informant reports that D has
been instructed by a foreign intelligence service to relay all embarrass-
ing and personally damaging information about these customers to a
resident agent of the foreign intelligence service in Washington. The
informant reports that at least one customer has been blackmailed in
his job as a Government executive into taking positions favorable to
the nation for which the resident agent works."
Comment.-No warrant could be issued either under section 794
of title 1S or under S. 1566. D is not collecting or transmitting infor-
mation of the kind referred to by S. 1566 or section 794 of title 18.
If the Justice Department's argument is that by getting one kind
of information, I) could trade it for another, then the Justice Depart-
ment is interpreting S. 1566 in a way which eliminates the safeguards
built into it. Moreover, one should also ask if it is necessary to tap
this person. For example, his contact at the embassy could be tapped
under the "foreign power" provision of S. 1566 and D could be
surveilled by less intrusive means. Those who come into contact with
1) could be warned.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
4
Case No. 5
"A Spinelli-qualified informant reports that E has, pursuant to
the direction of a foreign intelligencc service, engaged in various
burglaries in the New York area of homes of U.S. employees of the
United Nations to obtain information concerning U.S. positions in
the United Nations."
Comment.-First of all, U.S. employees at the United Nations do
not have advance information on U.S. positions at the United Na-
tions. In any case, this situation is trivial. Such information should
not be in an employee's home and E could be arrested for burglary.
Or is the Justice Department assuming that E discusses his burglary
1 argets on the phone?
Case No. 6
"A telephone tap of a foreign, intelligence officer in the United
States reveals that F, acting pursuant to the officer's direction, has
infiltrated several refugee organizations in the United States. His
instructions are to recruit members of these organizations under the
guise that he is an agent of a refugee terrorist leader and then to
target these recruited persons against the FBI, the Dade County
Police, and the CIA, the ultimate goal being to infiltrate these agen-
ies. F is to keep the intelligence officer informed as to his progress
in this regard but his reports are to be made by mail, because the
U.S. Government cannot open the mail unless a crime is being
committed.
Comment.-As in case No. 4, no tap would be periiii.tted under
S. 1566. This is not the kind of information contemplated under
the act. A tap would not be permitted under section 794 of title 18
as well. If F is to report in "by mail" is F going to do his recruit-
ment by telephone? Does the Government plan to read S. 1566 to
permit the refugee organizations to be wiretapped to find out if they
are infiltrated? These are dangerous readings of S. 1566. The proper
ar?tion is to allow the FBI, having this much information, to foil
F's scheme.
In sum, the Justice. Department is "reaching" for the exceptional
case to establish the need for a deviation from the, criminal standard.
Contrary to all experience with judicial warrants in the wiretapping
area, the Department presumes "strict construction" by judges will
Hamper legitimate intelligence. The Justice Department, should be
reminded that only seven judges, picked by the Chief Justice of the
U.S. Supreme Court, will review these warrant requests. Of course,
this does not give the Justice Department any certainty that all appli-
cations will be approved. But the criminal standard does not appre-
ciably make the process more risky for the Government. On the other
hand, the noncriminal standard is a dangerous precedent for abuse.
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
95TII CONGRESS SENATE I REPORT
.1st Session No. 95-604
FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1977
Mr. KENNEDY, from the Committee on the Judiciary,
submitted the following
REPORT
together with
MINORITY VIEWS
[To accompany S. 1566]
The Committee on the Judiciary, to which was referred the bill
(S. 1566) to amend title 18, United States Code, to authorize appli-
cations for a court order approving the use of electronic surveillance
to obtain foreign intelligence information, having considered the same,
reports favorably thereon with amendments and recommends that the
bill, as amended, do pass.
AMENDMENTS
On page 3, line 17, strike out the word "knowingly".
On page 3, line 18, strike the word "a" and insert in lieu thereof
the word "any"; and after the word "person" insert the words "know-
ing that such person is engaged in activities".
On page 4, line 20, strike out the word "knowingly".
On page 4, line 21, after the word "person" insert the words "know-
ing that such person is".
On page 4, line 22, strike the word "or" and insert in lieu thereof a
dash, "-"
On page 8, strike lines 3 and 4 and insert in lieu thereof "or the
Deputy Attorney General."
On page 8, line 7, insert. the words "prohibit the" before the word
"dissemination", and following the word "dissemination" insert
except as provided for in subsections 2526 (a) and (b).".
On page 9, line 24, before the word "which", insert the words "or
associations".
On page 14, line 21, strike the semicolon at the end of the line and
insert in lieu thereof : "and a statement whether physical entry is
required to effect the surveillance :".
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-FDP80S01268A000500040008-7
On page 17, line 7, before the word "the" insert the following : "when
the target of the surveillance is not a foreign power as defined in
section 2521(b) (1) (A), (B), or (C),".
On page 17, line 8, strike the semicolon and insert in lieu thereof the
following : "and when the target is a foreign power as defined in sec-
tion 2521(b) (1) (A), (B), or (C), the designation of the type of for-
eign intelligence information under section 2521(b) (5) sought to be
acquired;".
On page 17, line 16, strike the semicolon and insert in lieu thereof
the following : "and whether physical entry will be used to effect the
surveillance ;".
On page 21, line 11, insert the following sentence after the period :
"No information acquired from an electronic surveillance conducted
pursuant to this chapter may be used or disclosed by federal officers
or employees except for lawful purposes.".
On page 21, line 22, after the word "States,", insert the following :
"a State, or a political subdivision thereof,".
On page 22, line 7, after the word "information.", strike the re-
mainder of the subsection through line 6 on page 23 and insert in lieu
thereof the following new subsections :
"(d) Any person who has been a subject of electronic surveillance
and against whom evidence derived from such electronic surveillance
is to he, or has been, introduced or otherwise used or disclosed in. any
trial, hearing, or proceeding in or before any court. department officer,
agency, regulatory body, or other authority of the United States, a
State, or a political subdivision thereof, may move to suppress the con-
tents of any communication acquired by electronic surveillance, or
evidence derived therefrom, on the grounds that-
"(I) the communication was unlawfully acquired ; or
"(2) the surveillance was not made in conformity with the
order of authorization or approval.
Such motion shall be made before the trial, hearing, or proceeding un-
less there. was no opportunity to make such motion or the person was
not aware of the grounds of the motion.
"(e) Whenever any court is notified in accordance with subsec-
tion (c), or whenever a motion is made by an aggrieved person pursu-
ant to subsection (d), to suppress evidence on the grounds that it was
obtained or derived from an unlawful electronic, surveillance, or when-
ever any motion or request is made by an aggrieved person pursuant
to section 3rO4 of this title or any other statute or rule of the United
States, to discover, obtain or suppress evidence or information ob-
tained or derived from electronic surveillance, the Federal court, or
where the motion is made before another authority, a federal court
in the same district as the authority, shall, notwithstanding any other
law, if the Government by affidavit asserts that disclosure or an ad-
versary hearing would harm the nation] security of the United States,
review in camera and ex parte the application, order and other mate-
rials relating to the surveillance as may be, necessary to determine
whether the surveillance was authorized and conducted in a manner
that did not violate any right afforded by the Constitution and statutes
of the United States to the aggrieved person.
In making this determination, the court shall disclose to the ag-
grieved person portions of the application, order, or other materials
relating to the surveillance only where such disclosure is necessary to
make an accurate determination of the legality of the surveillance. If
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/11/3 : CIA-RDP80S01268A000500040008-7
the court determines that the electronic surveillance of the aggrieved
person was not lawfully authorized or conducted, the court shall in
accordance with the requirements of law suppress the information
obtained or evidence derived from the unlawful electronic surveillance.
If the Court determines that the surveillance was lawfully authorized
and conducted, the court shall deny any motion for disclosure or dis-
covery unless required by due process."
On page 23, line 7, renumber subsection "(b)" as "(f)".
On page 26, line 16, insert the word, "the" before the word, "investi-
gative."
On page 29, insert after line 13 a new subsection as follows :
(i) Section 2518(10) is amended by striking the word
"intercepted" and inserting the words "intercepted pursuant
to this chapter" after the first appearance of the word
"communication".
On page 29, line 14, strike "(i)" and substitute in lieu thereof "(j) ".
On page 29, line 17, strike "(j)" and substitute in lieu thereof,
"(k)"
On page 30, line 2, following the words "provided that" insert "no
particular United States person shall be intentionally targeted for
testing purposes without his consent."
PURPOSE OF AMENDMENTS
The amendments to S. 1566 are designed to clarify and make more
explicit the statutory intent, as well as to provide further safeguards
for individuals subjected to electronic surveillance pursuant to this
new chapter. Certain amendments are also designed to provide a de-
tailed procedure for challenging such surveillance, and any evidence
derived therefrom, during the course of a formal proceeding.
Finally, the reported bill adds an amendment to Chapter 119 of
title 18, United States Code (Title III of the Omnibus Crime Control
and Safe Streets Act of 1968, Public Law 90-351, section 802). This
latter amendment is technical and conforming in nature and is de-
signed to integrate certain provisions of Chapters 119 and 120. A
more detailed explanation of the individual amendments is contained
in the section-by-section analysis of this report.
IIISTORY OF TIIE BILL
The "Foreign Intelligence Surveillance Act of 1977", S. 1566, was
introduced by Senator Kennedy on May 18, 1977 to provide a statutory
procedure for the authorization of applications for a court order ap-
proving the use of electronic surveillance to obtain foreign intelligence
information. The bill, cosponsored by seven other Senators (Mr.
13ayh, Mr. Eastland, Mr. Inouye, Mr. McClellan, Mr. Mathias, Mr.
Nelson and Mr. Thurmond), was referred to and considered by the
Committee on the Judiciary.
S. 1566 has its origin in S. 3197, "The Foreign Intelligence Sur-
veillance Act of 1976", 94th Cong. 2d Sess. (1976). That legislation,
also introduced by Senator Kennedy with broad, bipartisan support,
including that of the Ford Administration, was the subject of Senate
hearings by both the Subcommittee on Criminal Laws and Procedures
of the Committee on the Judiciary and the Select Committee on In-
telligence. S. 3197 was reported favorably by both Senate Committees
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
4
by a combined vote of 24 ayes to 2 nays, but the Session ended before
the full Senate could act on the legislation.
S. 1566 picks up where S. 3197 left off. Following the introduction
of the measure, two days of hearings were held by the Subcommittee
on Criminal Laws and Procedures, chaired by Senator Kennedy at
the request of Senator McClellan. Eight witnesses testified, and a
number of other individuals submitted statements for the hearing
record. Among those testifying were Attorney General Griffin B. Bell;
Director of the FBI, Clarence Kelley; Director of the Central Intelli-
gence Agency, Stansfield Turner; Secretary of Defense Harold
Brown; John Shattuck of the American Civil Liberties Union; and
Morton Ti. Halperin of the Center for National Security Studies.
Broad-based support was voiced for 5.1566 throughout the hearing,
with the Administration indicating its support of the bill.
S. 1566 as reported, however, has been amended in relative minor
respects to respond to the constructive criticisms and suggestions elic-
ited in the hearings. As amended, the bill was approved by the Sub-
committee on Criminal Laws and Procedures with a unanimous rec-
ommendation for favorable action.
POSITION OF TIM, ADMINISTRATION
The Administration supports the enactment of S. 1566 and has
supported its swift passage. As Attorney General Bell stated in
testifying in favor of the bill :
I believe this bill is remarkable not only in the way it has
been developed, but also in the fact that for the first time in
our society the clandestine intelligence activities of our gov-
ernment shall be subject to the regulation and receive the
positive authority of a public law for all to inspect. President
Carter stated it very well in announcing this bill when he said
that "one of the most difficult tasks in a free society like our
own is the correlation between adequate intelligence to guar-
antee our nation's security on the one hand, and the preserva-
tion of basic human rights on the other." It is a very delicate
balance to strike, but one which is necessary in our society,
and a balance which cannot be achieved by sacrificing either
our nation's security or our civil liberties. In my view this
bill strikes the balance, sacrifices neither our security nor our
civil liberties, and assures that the abuses of the past will
remain in the past and that the dedicated and patriotic men
and women who serve this country in intelligence positions,
often under substantial hardships and even danger, will
have the affirmation of Congress that their activities are
proper and necessary.'
GENERAL STATEMENT
The bill reported by the Judiciary Committee amends title 18,
United States Code, by adding a new chapter after chapter 119, en-
'Hearing before the Subcommittee on Criminal Laws and Procedures of the Senate
o m the T` fb&aWo n' W i'Uft10040008-'7
Approve aritt ee~eeh J tea
Approved For Release 2005/11/16 : CIA-RDP80S01268A000500040008-7
titled "Electronic Surveillance Within the United States for Foreign
Intelligence Purposes." The purpose of the bill is to provide a pro-
cedure under which the Attorney General can obtain a Judicial war-
rant authorizing the use of electronic surveillance in the United States
for foreign intelligence purposes. If enacted, this legislation would re-
quire a judicial warrant authorizing the following for foreign intelli-
gence purposes :
(a) The acquisition of a wire or radio communication sent to or
from the United States by intentionally targeting a known United
States person in the United States under circumstances in which
the person has a reasonable expectation of privacy and a warrant
would be required for law enforcement purposes.
(b) A wiretap in the United States to intercept a wire com-
munication, such as a telephone or telegram communication;
(c) The acquisition of a private radio transmission in which all
of the communicants are located within the United States; or
(d) The use in the United States of any electronic, mechanical
or other surveillance device to acquire information other than a
wire communication or radio communication under circumstances
in which the person has a reasonable expectation of privacy
and a warrant would be required for law enforcement purposes.
S. 1566 authorizes the Chief Justice of the United States to designate
seven district court judges, any one of whom may hear applications for
and grant orders approving electronic surveillance for foreign intelli-
gence purposes. The bill further provides that the Chief Justice shall
designate three judges from the United States district courts or courts
of appeals to sit as a special Court of Appeals to hear appeals by the
United States from denials of applications made by any one of the
seven district court judges. The United States may further appeal
from this special court to the Supreme Court.
Under S. 1566, a judge may issue a warrant authorizing electronic
surveillance within the United States only if he finds that: the Presi-
dent has authorized the Attorney General to approve applications for
such electronic surveillance; the application has been approved by the
Attorney General; on the basis of the facts submitted to the court,
there is probable cause to believe that the target of the surveillance
is a foreign power or an agent of a foreign power; the place at which
the surveillance is directed is being used or about to be used by that
foreign power or agent; minimization procedures to be followed are
reasonably designed to minimize the acquisition and retention of
information relating to Americans that is not foreign intelligence
information ; Executive certification that the information sought is
foreign intelligence information which cannot reasonably be obtained
by normal investigative techniques; and, if the target of the surveil-
lance is a United States person, such certification is not clearly errone-
ous. The order may approve the electronic surveillance for no longer
than 90 days with respect to all natural persons and some foreign
powers, but extensions of up to 90 days may be granted upon an appli-
cation and after the same findings as required for the original order.
With respect to official "foreign powers", as defined in the legislation,
the approval may be for as long as one year.
In the event that an emergency arises and resort to a court is not
possible, the Attorney General is authorized to approve electronic
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
surveillance. Such an emergency surveillance cannot continue for more
than 24 hours without a judge's approval; a judge must be immedi-
ately notified of the emergency surveillance; and an application must
be made to the judge within 24 hours of approval of that emergency
surveillance.
The bill would limit the use of information concerning United
States citizens and lawful resident aliens acquired from electronic
surveillances to matters properly related to foreign intelligence and
the enforcement of criminal law. No information obtained from an
electronic surveillance could be used or disclosed against any person
except for lawful purposes. A judge may order the notification of a
person under electronic surveillance if an emergency surveillance was
authorized but subsequently disapproved by a judge.
S. 1566 provides for annual reports by the Attorney General to the
Congress and the Administrative Office of the United States Courts
containing statistical information relating to surveillances during the
preceding year.
The bill does not provide statutory authorization for the use of any
technique other than electronic surveillance, and, combined with chap-
ter 1.19 of title 18, it constitutes the exclusive means by which elec-
tronic surveillance, as defined, and the interception of domestic wire
and oral communications may be conducted; the bill recognizes no
inherent power of the President in this area.
In three major respects S. 1566 increases the protections for United
States citizens and lawful resident aliens over those contained in S.
3197. First, the definition of electronic surveillance has been expanded
to include the targeting of United States persons in their international
communications. This is specifically aimed at eliminating one of the
abuses identified by the Senate Select Committee to Study Govern-
mental Operations With Respect to Intelligence Activities and largely
implements one of that Committee's recommendations. (Book IT, In-
telligence Activities and the Rights of Americans, S. Rept. 94-755,
94th Cong., 2d Sess. 309 (1976).) Second, when a United States citizen
or lawful resident alien is the target of an electronic surveillance, the
judge is required to review the Executive Branch certification to deter-
mine if it is clearly erroneous. No review of the certification was al-
lowed in S. 3197. Finally, S. 1566 spells out that the Executive cannot
engage in electronic surveillance within the United States without a
prior judicial warrant. This is accomplished by repealing the so-called
executive "inherent power" disclaimer clause currently found in sec-
tion 2511(3) of Title 18. United States Code. S. 1566 provides instead
that its statutory procedures (and those found in chapter 119 of title
18) "shall be the exclusive means" for conducting electronic surveil-
lance, as defined in the legislation, in the United States. The highly con-
troversial disclaimer has often been cited as evidence of a congressional
ratification of the President's inherent constitutional power to engage
in electronic surveillance in order to obtain foreign intelligence in-
formation essential to the national security. Despite the admonition of
the Supremo Court that the language of the disclaimer was "neutral"
and did not reflect any such congressional recognition of inherent
power, the section has been a major source of controversy. By repeal-
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/,1/23 : CIA-RDP80SO1268A000500040008-7
i.ng section 2511 (3) and expressly stating that the statutory warrant
procedures spelled out in the law must be followed in conducting elec-
tronic surveillance in the United States, this legislation ends the eight-
year debate over the meaning and scope of the inherent, power
disclaimer clause.
II. STATEMENT OF NEED
The Federal Government has never enacted legislation to remu-
late the use of electronic surveillance within the United States for for-
eign intelligence purposes. Although efforts have been made in recent
years by Senator Kennedy, Senator Nelson, Senator Mathias, and
former Senator Philip A. IIart to circumscribe the power of the execu-
tive branch to engage in such surveillance, and the Senate came very
close to enacting such legislation during the 94th Congress, the fact
remains that such efforts have never been successful.2 The hearings held
this year on S. 1566 were the sixth set of hearings on warrantless wire-
tapping in as many years., The Committee believes that S. 1566 is a
measure which can successfully break this impasse and provide effec-
tive, reasonable safeguards to ensure accountability and prevent im-
proper surveillance. S. 1566 goes a long way in striking a fair and just
balance between protection of national security and protection of per-
sonal liberties. It is a recognition by both the Executive Branch and
the Congress that the statutory rule of law must prevail in the area of
foreign intelligence surveillance.
The need for such statutory safeguards has become apparent in re-
cent years. This legislation is in large measure a response to the reve-
lations that warrantless electronic surveillance in the name of national
security has been seriously abused. These abuses were initially illumi-
nated in 1973 during the investigation of the Watergate break-in.
Since that time, however, the Senate Select Committee to Study Gov-
ernment Operations with Respect to Intelligence Activities, chaired
by Senator Church (hereafter referred to as the Church Committee),
has concluded that every President since Franklin D. Roosevelt as-
sorted the authority to authorize warrantless electronic surveillance
and exercised that authority. While the number of illegal or improper
national security taps and bugs conducted during the Nixon adminis-
tration may have exceeded those in previous administrations, the sur-
veillances were regrettably by no means atypical. In summarizing its
a See, e.g., S. 3197, Foreign Intelligence Surveillance Act of 1976, 94th Cong., 2d sess.
(1976) ; S. 743, National Security Surveillance Act of 1975, 94th Cong., 1st sess. (1975)
S. 2820, Surveillance Practices and Procedures Act of 1973, 93rd Cong.. 1st sess. (1973)
S. 4062, Freedom from Surveillance Act of 1974, 93rd Cong., 2d sess. 1974).
a See, e.g., Hearings before the Subcommittee on Crimtnal Laws and Procedures of the
Senate Committee on the Judiciary, Foreign Intelligence Surveillance Act of 1976, 94th Senate
Intel Ceill nceActsof 1976, 94th Cog., 2d sess. (1976) ; Subcommit't eoonZ rntelurveillligencece of stl the
Senate Committee on Foreign Relations and the Subcommittee on Administrative Practice
and Procedure of the Senate Committee on the Judiciary, Warrantless Wiretaping and
Electronic Surveillance, 94th Cong., 1st sess. (1975) ; Joint Hearings before the Subcom-
mittee on Administrative Practice and Procedure and the Subcommittee on Constitutional
Rights of the Senate Committee on the Judiciary, Warrantless Wiretapping and Electronic
Surveillance, 93d Cong., 2d sess. (1974) ; Hearings before the Subcommittee on Adminis-
trative Practice and Procedure of the Senate Committee on the Judiciary, Warrantless
Wiretapping, 92d Cong., 2d sess. (19712). In the joint report of the Subcommittees on Sur-
veillance and Administrative Practice and Procedure Issued in 1975, findings were made
that "there are not adequate written standards or criteria within the executive branch to
govern the warrantless electronic surveillance of either Americans or foreigners. There is a
gap In wiretaps the or bugs by executive branch agencies s for t alleged `national security' purposes."ntless
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
8
conclusion that surveillance was "often conducted by illegal or im-
proper means," the Church committee wrote :
Since the 1930's, intelligence agencies have frequently wire-
tapped and bugged American citizens without the benefit of
judicial warrant.... [P]ast subjects of these surveillances
have included a United States Congressman, Congressional
staff member, journalists and newsmen, and numerous indi-
viduals and groups who engaged in no criminal activity and
who posed no genuine threat to the national security, such as
two White House domestic affairs advisers and an anti-Viet-
nam War protest group. (vol. 2, p. 12)
The application of vague and elastic standards for wire-
tapping and bugging has resulted in electronic surveil-
lances which, by any objective measure, were improper and
seriously infringed the Fourth Amendment Rights of both
the targets and those with whom the targets communicated.
The inherently intrusive nature of electronic surveillance.
moreover, has enabled the Government to generate vast
amounts of information-unrelated to any legitimate gov-
ernment interest-about the personal and political lives of
American citizens. The collection of this type of information
has, in turn, raised the danger of its use for partisan politi-
cal and other improper ends by senior administration offi-
cials. (vol. 3, p. 32.)
Also formidable-although incalculable-is the "chilling effect"
which warrantless electronic surveillance may have on the constitu-
tional rights of those who were not targets of the surveillance, but who
perceived themselves, whether reasonably or unreasonably, as poten-
tial targets. Our Bill of Rights is concerned not only with direct
infringements on constitutional rights, but also with government
activities which effectively inhibit the exercise of these rights. The
exercise of political freedom depends in large measure on citizens'
understanding that they will be able to be publicly active and dissent
from official policy, within lawful limits, without having to sacrifice
the expectation of privacy that they rightfully hold. Arbitrary or
uncontrolled use of warrantless electronic surveillance can violate that
understanding and impair that public confidence so necessary to an
uninhibited political life.
S. 1566 is designed, therefore, to curb the practice by which the
Executive Branch may conduct warrantless electronic surveillance
on its own unilateral determination that national security justifies it.
At the same time, however, this legislation does not prohibit the legiti-
mate use of electronic surveillance to obtain foreign intelligence
information. As the Church committee pointed out :
Electronic surveillance techniques have understandably
enabled these agencies to obtain valuable information relevant
to their legitimate intelligence missions. Use of these tech-
niques has provided the Government with vital intelligence,
which would be difficult to acquire through other means, about
the activities and intentions of foreign powers and has
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/1143 : CIA-RDP80SO1268A000500040008-7
provided important leads in counterespionage cases. (vol. 2,
p.274)
Safeguarding national security against the intelligence activities of
foreign agents remains a vitally important Government purpose. Few
would dispute the fact that we live in a dangerous world in which
hostile intelligence activities in this country are still carried on to our
detriment.
Striking a sound balance between the need for such surveillance and
the protection of civil liberties lies at the heart of S. 1566. As Senator
Kennedy stated in introducing S. 1566:
The complexity of the problem must not be underestimated.
Electronic surveillance can be a useful too]. for the Govern-
ment's gathering of certain kinds of information; yet, if
abused, it can also constitute a particularly indiscriminate
and penetrating invasion of the privacy of our citizens. My
objective over the past six years has been to reach some kind
of fair balance that will protect the security of the United
States without infringing on our citizens' human liberties and
rights .4
The committee believes that the Executive Branch of Government
should have, under proper circumstances and with appropriate safe-
guards, authority to acquire important foreign intelligence informa-
tion by means of electronic surveillance. The committee also believes
that the past record and the state of the law in the area make it desir-
able that the Executive Branch not be the sole or final arbiter of when
such proper circumstances exist. S. 1566 is designed to permit the Gov-
ernment to gather necessary foreign intelligence :information by means
of electronic surveillance but under limitations and according to
procedural guidelines which will better safeguard the rights of
individuals.
The bipartisan congressional support for S. 1566 and the construc-
tive cooperation of the Executive Branch toward the legislation signi-
fies a constructive change in the ongoing debate over electronic sur-
veillance. That debate has centered around the power of the President
to acquire information necessary for the national security and the
constitutionality of warrantless electronic surveillance. This is not
surprising since the United States Supreme Court has never expressly
decided the issue of whether the President has constitutional authority
to authorize warrantless electronic surveillance in cases concerning
foreign intelligence. Whether the President has so-called "inherent
power" to engage in or authorize warrantless electronic surveillance
and, if such power exists, what limitations, if any, restrict the scope
of that power, are issues which have troubled constitutional scholars
for decades.
The history of warrantless electronic surveillance offers support to
both proponents and critics of the concept of "inherent power" and
clearly highlights the need for passage of S. 1566.
In 1928, the Supreme Court in Olmstead v. United States 6 held that
wiretapping was not within the coverage of the Fourth Amendment.
4 123 Cong. Rec. 57857 (daily ed., May 18, 1977).
277 U.S. 468.
S. Rept. 604,95-1-2
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIAIlDP80S01268A000500040008-7
Three years later, Attorney General William D. Mitchell authorized
telephone wiretapping, upon the personal approval of bureau chiefs, of
syndicated bootleggers and in "exceptional cases where the crimes are
substantial and serious, and the necessity is great and [the bureau chief
and the Assistant Attorney General] are satisfied that the persons
whose wires are to be tapped are of the criminal type." These general
guidelines governed the Department's practice through the thirties
and telephone wiretapping was considered to be an important law en-
forcement tool."
Congress placed the first restrictions on wiretapping in the Federal
Communications Act of 1934, which made it a crime for any person "to
intercept and divulge or publish the contents of wire and radio coin-
munications." 4 The Supreme Court construed this section to apply
to Federal agents and held that evidence obtained from the intercep-
tion of wire and radio communications, and the fruits of that evidence,
were inadmissible in court." )however, the Justice Department did not
interpret the Federal Communications Act or the Nardone decision
as prohibiting the interception of wire communications per se; rather
only the interception and divulgence of their contents outside the Fed-
eral establishment was considered to be unlawful. Thus, the Justice
Department found continued authority for its national security wire-
taps.
In 1940, President Roosevelt issued a memorandum to the Attorney
General stating his view that electronic surveillance would be proper
under the Constitution where "grave matters involving defense of the
nation" were involved. The President authorized and directed the
Attorney General "to secure information by listening devices [directed
at] the conversation or other communications of persons suspected of
subversive activities against the Government of the United States.
including suspected spies." The Attorney General was requested "to
limit these investigations so conducted to a minimum and to limit
them insofar as possible as to aliens." 0
This practice was continued in successive administrations. In 1946,
Attorney General Tom C. Clark sent President Truman a letter in-
forlning him of President Roosevelt's directive. Clark's memorandum,
however, omitted the portion of President Roosevelt's directive limit-
ing wiretaps "insofar as posible to aliens." Instead, he recommended
that the directive "be continued in force" in view of the "increase in
subversive activities" and "a very substantial increase in crime." Pres-
dent Truman approved.10
6 The history of the practice of the Department of Justice which follows in this Report
is derived from Attorney General Edward H. Levi's testimony before the Church commit-
tee on Novmher 6, 1975 and the final report of that committee. The relevant portions of
the report include Book I, Foreign and Military Intelligence, chapter IX, "Counterintelli-
gence;" Book IT, Intelligence Activities and the Rights of Americans, chapter II, "The
Growth of Domestic Intelligence," finding C, "Excessive Use of Intrusive Techniques,"
and finding E, "Political Abuse of Intelligence Information" ; Book III, Supplementary
Detailed Staff Reports on Intelligence Activities and the Rights of Americans, "Dr. Martin
Luther Ding, Jr., Case Study," "Warrantless FBI Electronic Surveillance," warrantless
Surreptitious Entries," "Domestic CIA and FBI Mail Opening." National Security Agency
Surveillance Affecting Americans," and "National Security, Civil Liberties. and the Col-
lection of Intelligence : A Report on the Huston Plan" ; Book IV, Supplementary Detailed
Staff Reports on Foreign and Military Intelligence, "Intelligence and Technology."
747 U.S.C. 605 (1964 ed.), 48 Stat. 1103.
6 Nardone v. United States, 302 U.S. 379 (1937) ; 308 U.S. 338 (1939).
B III Church committee 297.
11 II Church committee 60. In 1950, aides to President Truman discovered Clark's
incomplete quotation, and the President considered returning to the terms of the original
1940 authorization. However, the 1940 directive was never rescinded.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
In the early fifties, however, Attorney General J. Howard McGrath
took the position that he would not approve or authorize the installa-
tion of microphone surveillances by means of trespass. This policy was
quickly reversed by Attorney General Herbert Brownell in 1954 in a
sweeping memorandum to FBI Director Hoover instructing him that
the Bureau was indeed authorized to conduct such trespassory sur-
veillances regardless of the fact of surreptitious entry, and without the
need to first acquire the Attorney General's authorization. Such sur-
veillance was simply authorized whenever the Bureau concluded that
the "national interest" so required. The Brownell memorandum is
instructive :
It is my opinion that the department should adopt that
interpretation which will permit microphone coverage by the
FBI in a manner most. conducive to our national interest. I
recognize that for the FBI to fulfill its important intelligence
function, considerations of internal security and the national
interest are paramount; and, therefore, may compel the un-
restricted use of this technique in the national interest.11
From the relatively limited authorization of warrantless electronic
surveillance under President Roosevelt, then, the mandate for the FBI
was quickly expanded to the point where the only criterion was the
FBI's subjective judgment that the "national. interest" required the
electronic surveillance.
The practice of the Bureau during the fifties was also described in
a memorandum from Director Hoover to the Deputy Attorney General
on May 4, 1961:
[T] n the internal security field, we are utilizing microphone
surveillances on a restricted basis even though trespass is nec-
essary to assist in uncovering the activities of Soviet intelli-
gence agents and Communist party leaders. In the interests
of national safety, microphone surveillances are also utilized
on a restricted basis, even though trespass is necessary, in
uncovering major criminal activities. We are using such cov-
erage in connection with our investigations of the clandestine
activities of top hoodlums and organized crime. From an in-
telligence standpoint, this investigative technique has pro-
duced results unobtainable through other means. The infor-
mation so obtained is treated in the same manner as
information obtained from wiretaps, that is, not from the
standpoint of evidentiary value but ,for intelligence
purposes.12
The policy of the Department of Justice was stated publicly in 1966
by the Solicitor General in a supplemental brief to the Supreme Court
in Black v. United States. 13 Referring to the general delegation of au-
thority by Attorneys General to the Director of the Bureau, the Solici-
tor stated :
An exception to the general delegation of authority has
been prescribed, since 1940, for the interception of wire corn-
11 III Church committee 297.
12 III Church committee M.
- 385 U.S. 26 (1966).
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
munications, which (in. addition to being limited to matters
involving national security or danger to human life) has re-
quired the specific authorization of the Attorney General
in each instance. No similar procedure existed until 1965 with
respect to the use of devices such as those involved in the in-
stant case, although records of oral and written communica-
tions within the Department of Justice reflect concern by
Attorneys General and the Director of the Federal Bureau
of Investigation that the use of listening devices by agents
of the Government should be confined to a strictly limited
category of situations.
Under departmental practice in effect for a period of years
prior to 1963, and continuing until 1965, the Director of the
Federal Bureau of Investigation was given authority to
approve the installation of devices such as that in question
for intelligence (and not evidentiary) purposes which re-
quired in the interests of internal. security or national safety,
including organized crime, kidnappings and matters wherein
human life might be at stake... .
Present departmental practice, adopted in July 1,965 in
conformity with the policies declared by the President on
,Time 30, 1965, for the entire Federal establishment, prohibits
the use of such listening devices (.as well as the interception
of telephone and other wire communications) in all instances
other than those involving the collection of intelligence affect-
ing the national security. The specific authorization of the
Attorney General must be obtained in each instance when
this exception is invoked.
In Katz v. United States, 389 U.S. 347 (1967), the Supreme Court
finally discarded the Olmstea' doctrine and held that the Fourth
Amendment's warrant provision did apply to electronic surveillance.
The Court explicitly declined, however, to extend its holding to cases
"involving the national security." 389 U.S. at 358, n. 23. The next year,
Congress followed suit : responding to the Katz case, Congress enacted
the Omnibus Crime Control and Safe Streets Act (18 U.S.C. sections
2510-2520).Y4 Title III of that. Act established a procedure for the
judicial authorization of electronic surveillance for the investigation
and prevention of specified types of serious crimes and the use of the
product of such surveillance in court proceedings. It prohibited wire-
tapping and electronic surveillance by persons other than duly author-
ized law enforcement officers, personnel of the Federal Communica-
tions Commission, or communication common carriers monitoring
communications in the normal course of their employment.
Title III, however, disclaimed any intention of legislating in the
national security area. The Act contained a proviso in section 2511(3)
stating :
Nothing contained in this chapter or in section 605 of the
Communications Act of 1934 (48 Stat. 1143; 47 U.S.C. 605)
shall limit the constitutional power of the President to take
such measures as he deems necessary to protect the Nation
14 See also, S. Rept. 1097. Renate Committee on the Judiciary, Omnibus Crime Control
and Safe Streets Act of 1967; 90th Cong., 2d sess. (1968).
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/243 CIA-RDP80SO1268A000500040008-7
against actual or potential attack or other hostile acts of a
foreign power, to obtain foreign intelligence information
deemed essential to the security of the United States, or to
protect national security information against foreign intel-
ligence activities. Nor shall anything contained in this chap-
ter be deemed to limit the constitutional power of the Presi-
dent to take such measures as he deems necessary to protect
the United States against the overthrow of the Government
by force or other clear and present danger to the structure
or existence of the Government.
Against this background the Supreme Court decided the Keith
case in 1972. While the issue was narrowly drawn-"the delicate ques-
tion of the President's power, acting through the Attorney General,
to authorize electronic surveillance in internal security matters with-
out prior judicial approval" (407 U.S. at 301)-the court's opinion
inevitably shed some light on the deeper problem of balancing con-
flicting interests in national security cases (407 U.S., at 320-321) :
1. The Court took notice of the long-standing Justice Department
policy of warrantless electronic surveillance. It also recognized the
"elementary truth" that "unless Government safeguards its own ca-
pacity to function and to preserve the security of its people, society it-
self could become so disordered that all rights and liberties would be
endangered." 1e
2. In balancing the constitutional rights involved against the gov-
ernmental objectives, the Court noted the "convergence of First and
Fourth amendment values not ordinarily present in cases of "ordinary"
crime." 17 The Court went on to pose the issue : "If the legitimate need
of the Government to safeguard domestic security requires the use of
electronic surveillance the question is whether the needs of citizens for
privacy and free expression may not be better protected by requiring
a warrant before such surveillance is undertaken. We must also ask
whether a warrant requirement would unduly frustrate the efforts of
Government to protect itself from acts of subversion and overthrow
directed against it." 18
3. In concluding that a warrant was required in domestic security
surveillance cases, the Court emphasized the traditional reasons for
requiring a warrant : 18
These fourth amendment freedoms cannot properly be guaranteed if
domestic security surveillances may be conducted solely within the
discretion of the Executive Branch. The Fourth Amendment does not
contemplate the executive officers of Government as neutral and dis-
interested magistrates. Their duty and responsibility are to enforce
the laws, to investigate, and to prosecute. * * * But those charged
with this investigative and prosecutorial duty should not be the sale
judges of when to utilize constitutionally sensitive means in pursuing
their tasks. The historical judgment, which the Fourth Amendment
accepts, is that unreviewed executive discretion may yield too readily
to pressures to obtain incriminating evidence and overlook :potential
invasions of privacy and protected speech.
L5 United States Y. United States District Court, 407 U.S. 297 (1972):.
19 407 U.S., at 312.
17407U.S.,at513.
1P 407 U.S., at 315.
19 407 U.S., at 316-317.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 :15IA-RDP80S01268A000500040008-7
4. The Court then went on to consider and reject the Government's
argument that the disclosure of information in a warrant application
posed the serious danger of leaks and the Government's argument that
"internal security matters are too subtle and compex for judicial
evaluation." 20 The Court observed that "[c]ourts regularly deal with
the, most difficult issues of our society. There is no reason to believe that
Federal judges will be insensitive to or uncomprehending of the issne,
involved in domestic security cases." 21 As to the secrecy claim, the
Court observed the "[t]he investigation of criminal activity has long
involved imparting sensitive information to judicial officers who have
respected the confidentialities involved." 22
5. Finally, the Court rejected the distinction, stressed by the Gov-
ernment, between surveillance for law enforcement purposes and sur-
veilla.nce designed to obtain intelligence relating to domestic threats to
national security. The Court responded that official surveillance,
whether its purpose is criminal investigation or ongoing intelligence
gathering, risks infringement of constitutionally protected privacy
and speech.
However, the Court emphasized that, "this case involves only the
domestic aspects of national security. We have not addressed, and
expressed no opinion as to, the issues which may be involved with
respect to activities of foreign powers or their agents." 23
And, in construing the effect of the title III. presidential disclainier
the court wrote : 24
Section 2511 (3) certainly confers no power, as the language
is wholly inappropriate for such a purpose. It merely provides
that the Act shall not be interpreted to limit or disturb such
power as the President may have under the Constitution. In
short, Congress simply left presidential powers where it
found them. . . [W]e therefore think the conclusion ines-
capable that Congress only intended to make clear that the
Act simply did not legislate with respect to national security
surveillances.
Since the Keith case, three circuit courts of appeals have addressed
the question the Supreme Court reserved. The Fifth Circuit in l's tt!:d
States v. Brown, 484 F.2d 418 (5th Cir. 1973), cert. denied, 415 U.S.
960 (1974), upheld the legality of a surveillance in which the defend-
ant, an American citizen, was incidentally overheard as a result of a
warrantless wiretap authorized by the Attorney General for foreign
intelligence purposes. The court found that on the basis of "the Presi-
dent's constitutional duty to act for the United States in the field of
foreign affairs, and his inherent power to protect national security in
the conduct of foreign affairs . . . the President may constitutionally
authorize warrantless wiretaps for the purpose of gathering foreign
intelligence." 25
In United States v. Butenko, 494 F.2d 593 (3d Cir. 1974) (en bane),
cert. denied sub nom,. Ivanov v. United States, 419 U.S. 881 (1974), the
Third Circuit similarly held that electronic surveillance conducted
20 407 U.S., at 320.
2t 407 U.S., at 320.
22 407 U.S., at 320-321.
407 TT.S., at 321-322.
24 407 U.S., at 303, 306.
25 484 F. 2d at 426.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/ V: CIA-RDP80SO1268A000500040008-7
without a warrant wouldbe lawful so long as the primary purpose was
to obtain foreign intelligence information. The court found that such
surveillance would be reasonable under the Fourth Amendment with-
out a warrant even though it might involve the overhearing of
conversations.
However, in Zweibon v. Mitchell, 516 F.2d 594 (D.C. Cir. 1975),
cert. denied, 425 U.S. 944 (1976), the Circuit Court of Appeals for
the District of Columbia, in the course of an opinion requiring that
a warrant must, be obtained before a wiretap is installed on a domestic
organization that is neither the agent of, nor acting in collaboration
with, a foreign power, questioned whether any national security excep-
tion to the warrant requirement would be constitutionally permissible.
Although the holding of Zweibon was limited to the case of a domes-
tic organization without ties to a foreign power, the plurality opinion
of the court-:in legal analysis closely patterned on Keith-concluded
"that an analysis of the policies implicated by foreign security surveil-
lance indicates that, absent exigent circumstances, all warrantless elec-
tronic surveillance is unreasonable and therefore unconstitutional." 26
Thus, after almost 50 years of case law dealing with the subject of
warrantless electronic surveillance, and despite the practice of war-
rantless foreign intelligence surveillance sanctioned and engaged in
by nine administrations, constitutional limits on the President's powers
to order such surveillances remains an open question. This legislation
would provide the secure framework by which the Executive Branch
may conduct legitimate electronic surveillance for foreign. intelligence
purposes within the context of this Nation's commitment to privacy
and individual rights.
IV. CONCLUSION
S. 1566 would alter the current debate arising out of the uncertainty
of the present law by completing an exclusive charter for the conduct
of electronic surveillance in the United 'States. It would relegate to
the past the wire-tapping abuses brought to light during the committee
hearings by providing, for the first time, effective substantive and
procedural statutory controls over foreign intelligence electronic
surveillance.-
0,51-6 F.2d at 613-614. Neither Brown nor Buten ko provide a systematic analysis of the
problem within the framework indicated by the Supreme Court decision in Keith, i.e.,
whether the requirement of a warrant would unduly frustrate the exercise of the I. resi-
dent's responsibility in the area of national security. The court's opinion in Brown simply
confirmed the President's inherent power to authorize foreign intelligence collection
through, among other things, electronic surveillance without a warrant. The Butenko
opinion offers a sightly more extensive analysis of the problem. On the other hand, the
Zweibon opinion, insofar as it considered and rejected the arguments for the existence of
an inherent power by applying the analytical framework used by the Supreme Court in
Keith, was a plurality opinion.
27 The Church committee concluded that, in many cases, surveillance was based on the
belief that groups or individuals were directed, financed or otherwise controlled by a
hostile foreign power. Some of the surveillances were directed against citizens or organi-
zations whose activities, while not necessarily violent, were thought to be sufficiently
subversive to pose a danger to the security of the country. (III, pp. 316-317.) However,
from this "subversive activities" standard it was, according to the committee, relatively
easy to justify and order electronic surveillance against American citizens and organi-
zations, not primarily because of their own activities, but because they were believed to
be adversely influenced, whether consciously or not, by persons acting under the direction
of foreign power. The electronic surveillance of Martin Luther King was justified not
because King himself posed any threat to national security, but because of the possibility
that two of King's advisers were associated with the Communist party. (III, p. 318.)
The infinite elasticity of the "national security" criteria unrestrained by any judicial
or external check, has been dramatically underscored in recent years by a series of
surveillances directed against Government employees and journalists for the avowed pur-
poses of identifying the sources of "leaks" of classified information. (III, p. 321.)
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
16
The basis for this legislation is the understanding-concurred in by
the Attorney General-that even if the President has an "inherent"
constitutional power to authorize warrantless surveillance for foreign
intelligence purposes, Congress has the power to regulate the exercise
of this authority by legislating a reasonable warrant procedure govern-
ing foreign intelligence surveillance."
The bill provides external and internal checks on the executive. The
external check is found in the judicial warrant procedure which re-
quires the executive branch to secure a warrant before engaging in
electronic surveillance for. purposes of obtaining foreign intelligence
information. Such surveillance would be limited to a "foreign power"
and ",agent of a foreign power." United States citizens and lawful
resident aliens could be targets of electronic surveillance only if they
are : (1) knowingly engaged in "clandestine intelligence activities
which involve or will involve a violation" of the criminal law; (2)
knowingly engaged in activities "that involve or will involve sabotage
or terrorism for or on behalf of a foreign power" ; or (3) "pursuant
to the direction of an intelligence service or intelligence network of a
foreign power" are knowingly or secretly collecting or transmitting
foreign intelligence in a manner harmful to the security of the United
States. All other persons-such as illegal aliens or foreign visitors-
could also be targets if they are: (1) either officers or employees of a
foreign power; or (2) are "knowingly engaging in clandestine intel-
ligence activities for or on behalf of a foreign power under circum-
stances which indicate that such activities would be harmful to the
security of the United States." For such surveillance to be undertaken,
a judicial warrant must be secured on the basis of a showing of "prob-
able cause" that the target is a "foreign power" or an "agent of a for-
eign power." Thus the courts for the first time will ultimately rule on
whether such foreign intelligence surveillance should occur.
Before a warrant can be requested, a designated Executive Branch
official must first certify in writing to the court that the information
sought to be obtained is "foreign intelligence information" as defined,
and that the purpose of the surveillance is to obtain such information.
Moreover the Attorney General is required to make a finding that
the requirements for a warrant application have been met before he
authorizes the application. These provisions provide an internal check
on applications for electronic surveillance by establishing a method of
written accountability within the Executive Branch.
Other procedural safeguards assure that the Government will not
engage in illegitimate eavesdropping or misuse of information so ac-
quired. The bill requires that each order include a detailed procedure
to minimize the extraneous or irrelevant information that might other-
wise be obtained; information acquired concerning United States cit-
izens or lawful resident aliens can be used and disclosed only for
foreign intelligence purposes or in connection with the enforcement
of the criminal law; even if the target is not a United States citizen
or lawful resident alien information acquired can only be used for
"lawful purposes" ; detailed provisions safeguard the right of the
criminal defendant to challenge the validity and propriety of the sur-
xfl Cr. See Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579 (1952) (Jackson, J.
concurring).
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
veillance; if the target is an individual or specified types of foreign
powers the application for a warrant must state the means by which
the surveillance will be effected; when the target is an "official" for-
eign power, as defined, the application must still designate the type
of electronic surveillance to be used and whether or not physical entry
will be used to' effect the surveillance; finally, the Attorney General
is required to transmit to the Congress annually certain statistics
concerning the surveillances engaged in during the preceding year.
Most importantly, the disclaimer in 18 U.S.C. ? 2511(3) is replaced
by provisions that assure that this bill, together with chapter 119, will
ie exclusive means by which electronic surveillance covered by this
be S16(
bill., and the interception of wire and oral communications, may be
conducted.
A difficult issue posed during committee deliberations was whether
foreign intelligence electronic surveillance should be limited to situa-tf% tions involving the commission of a crime. S. 1566 provides four lim-
ited situations in which natural persons may be made the target of an
electronic surveillance without a probable cause showing of criminal
activity. The first and least problematic involves persons who are
neither citizens nor Permanent resident aliens but who are officers or
employees of a "foreign power". This provision is-primarily designed
to cover foreigners who are employed in diplomatic and consular
offices in the United States. It is unchanged from the provisions in
5.3197.
The second situation, which constitutes a major change from S. 3197,
involves an alien (other than an alien who has been admitted for per-
manent resident) who "knowingly engages in clandestine intelligence
activities for or on behalf of a foreign power under circumstances
which indicate that such activities would be harmful to the security
of the United States." S. 3197 made no such distinction between aliens
and United States citizens in the application of the noncriminal stand-
ard. S. 1566, however, broadens the noncriminal standard of S. 3197
in cases involving nonresident aliens.
The third situation involves a United States citizen or permanent
resident alien who, "pursuant to the direction of an intelligence serv-
ice or intelligence network of a foreign power, knowingly collects or
transmits information or material to an intelligence service or intel-
ligence network of a foreign power in a manner intended to conceal
the nature of such information or material or the fact of such trans-
mission or collection, under circumstances which indicate the trans-
mission of such information or material would be harmful to the
security of the United States, or that lack of knowledge by the United
States of such collection or transmission would be harmful to the
security of the United States." This standard was also present in S.
3197 except for the addition of "collection" to the activities which
would justify surveillance.
The last situation, and the one most disturbing to some members of
the committee, is the change from S. 3197 allowing electronic surveil-
lance of one who conspires with or aids or abets another engaged in
the noncriminal activities described in the second and third situations.
While the Committee feels this is justified, it should be emphasized
g hat the aider or abetter cannot be an unknowing dupe. The bill re-
S. Kept. 601.:I5 4--::
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
18
quires that he know that the person he is aiding is engaged in the
described activities.
S. 3197 did not extend the doctrine of conspiracy to the non-criminal
standard. Thus, insofar as S. 1566 loosens the language of the non-
criminal standard for certain aliens, and permits the application of
conspiracy to that standard in all cases, the bill posed problems to some
members of the committee.
Although there is precedent for departing from a strict criminal
standard in the issuance of search warrants deemed compatible with
the fourth amendment, see e.g., Camara v. Municipal Court, 387 U.S.
523 (1967) ; Almeida-Sanchez v. United States, 413 U.S. 266 (1973) ;
c,f. United States v. Martinez-Fuerte, 428 U.S. 543 (1976), (no war-
rant required at all), those decisions did not involve national security
surveillance. It should also be pointed out, however, that in the Keith
case, supra, the Supreme Court noted that the reasons for domestic
Security surveillance may differ from those justifying surveillance for
domestic crimes and that, accordingly, "different standards may be
compatible with the Fourth Amendment if they are reasonable both
in relation to the legitimate needs of Government for intelligence in-
formation and the protected rights of our citizens. For the warrant
application may vary according to the governmental interest to be
enforced and the nature of citizens rights deserving protection." 28 As
indicated in the section-by-section analysis, this departure from the
general principle that such surveillance must be linked to criminal
activity is intended to be a narrow, circumscribed one, reflecting the
deep concern of the committee. This bill authorizes electronic surveil-
lance in a limited number of non-criminal situations only under the
twin safeguards of an independent review by a neutral judge and his
application of a "probable cause standard".
It is important to note that the committee's favorable recommenda-
tion of this legislation in no way reflects any judgment that it would
also be appropriate to depart from the standard of criminal activity
as the basis for using other intrusive investigative techniques. The bill
does not impliedly authorize departure from the standard of criminal-
ity in other aspects of national security investigations or intelligence
collection directed at Americans without the safeguards of judicial
review and probable cause. It remains to determine, in fashioning a
charter for the use of informants, physical surveillance and other in-
vestigative procedures, whether the departure from a criminal stand-
ard is an acceptable basis for investigating United 'States citizens on
grounds of national security.
Conforming amendments in S. 1566 integrate existing electronic
surveillance provisions in title III of the Omnibus Crime Control and
Safe Streets Act with the new provisions of the bill.
SECTION-BY-SECTION ANALYSIS
Section 1 of the bill. provides that the Act may be cited as the "For-
eign Intelligence Surveillance Act of 1977".
Section 2 of the bill amends title 18, United States Code, by adding
a new chapter 1.20 composed of sections 2521-2527 as follows :
21407 U.S. at 322 ; see also, Zueibon v. Mitchell, 516 F. 2d at 669.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/111/23 : CIA-RDP80S01268A000500040008-7
Section 25,01
Subsection (a) provides that except for those terms specifically de-
fined in this section the definitions of chapter 119, relating to the in-
terception of wire and oral communications, apply to this chapter as
well.
A. "Foreign Power"
Subsection (b) (1) defines "foreign power" in six separate ways:
(1) "A foreign government or any component thereof, whether or
not recognized by the United States." This category would include
foreign embassies and consulates and similar "official" foreign gov-
ernmental establishments which are located in the United States.
(2) "A faction of a foreign nation or nations, not substantially com-
posed of permanent resident aliens or citizens of the United States."
This category is intended to include factions of a foreign nation or
nations which are in a contest for power over, or control of the terri-
tory of, a foreign nation or nations. The faction must be foreign-based
and controlled from abroad. Specifically excluded from this category
is any faction of a foreign government or government which is sub-
stantially composed of permanent resident aliens or citizens of the
United States.
(3) "An entity, which is openly acknowledged by a foreign govern-
ment or governments to be directed and controlled by such foreign
government or governments." This is a category which was not spe-
cifically delineated in S. 3197. Certain changes have been made in
the S. 3197 warrant requirements with respect to specific foreign pow-
ers which generally require less information to be given to the judge
and allow the surveillance to be continued for a longer period of time
without the need for reauthorization. This decision to treat certain
"foreign powers" differently in terms of warrant requirements was
made at the insistence of the Administration. The Committee is satis-
fied, however, that the distinction is sufficiently limited so as not to
pose any threat of abuse. Thus, it is only with respect to "entities"
openly acknowledged by a foreign government to be directed and
controlled by such foreign government-those which are clearly arms
of a government or governments and not privately controlled-that
are subject to the extended warrants granted on a lesser showing. Such
"official" entities are treated in the same manner as the government
they serve.
(4) "A foreign-based terrorist group." This category refers to a
foreign-based group tivhose activities involve "terrorism", as defined.
The committee recognizes that many international terrorist groups
have members from various nations, and may not in fact have any
clearly definable "base." Nevertheless, under this definition the group
must be "foreign-based;" that is, it must not be based in the United
States, although it may carry out terrorist acts in this country. It is
the Committee's belief that a domestic terrorist group should be sub-
jected to electronic surveillance only pursuant to Title III. Where,
however, a group is not domestically based, but derives strength and
refuge by organizing, planning, and preparing its terrorist activities
outside the jurisdiction of the United States, then that group is a legiti-
mate target for intelligence surveillance under this bill no matter
what the citizenship of its members.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
20
(5) "A foreign-based political organization, not substantially com-
posed of permanent resident aliens or citizens of the' United States."
This category is intended to include, for example, those foreign politi-
cal parties which are more instrumentalities of a foreign government
and which are not substantially composed of Americans. This category
clearly does not include organizations comprised of Americans of
Greek, Irish, Jewish, Chinese or other extraction, who have joined
together out of interest in or concern for the country of their ethnic
(6) "An entity, which is directed and controlled by a foreign gov-
ermnent or governments." This category, found verbatim in S. 3197,
would include an entity which appears to be a legitimate commercial
establishment but which is actually being utilized by a foreign govern-
ment as a cover for espionage activities. A law firm, public relations
firm, or,other legitimate concern which merely represents a foreign
government. or its interests is not, by (lefiriitiolr, an entity under this
category. The question. of whether a group, commercial enterprise. or
organization comes within the scope of this definition is one for the
d-onl?t to determine on the basis of a probable, cause, standard.
B. "Agent of a Foreign Power"
Subsection (b) (2) defines an "agent of a, foreign power" in two
separate ways. Subparagraph (A) (i), includes officers or employees
of foreign powers who are not United States citizens or aliens lawfully
admitted for permanent residence. The definition is framed in this
way because it is presumed that nonresident aliens who are officers or
employees of a foreign power are likely sources of foreign intelligence
information. Given the tenuous relationship of foreign officers or em-
polyees with the United States and their close relationship with a for-
eign power, this standard is considered by the Committee to be reason-
able in light of the Uovernnien.t's legitimate need for foreign int.elli-
f^ence information and the nature of the interests upon which the
.,catch would intrude. The reference to employees of a foreign power
is meant to include those persons who have. a normal employee-em-
ployer relationship.- The subparagraph is not intended to encompass
inch foreign visitors as professors, lecturers, exchar.ge students, per-
-iormers, or athletes, even if they are receiving reinun.eration or ex-
penses from their horse government in such capacity.
Subparagraphs (A) (ii), (iii) and (B) of subsection (b) (2) com-
prise the second definition of "agent of a foreign power." They define
ail agent in terms of the activities in which he is engaged for or on
behalf of a foreign power.
Subparagraph (A) (ii) defines an agent of it foreign power as a
person who is not a citizen or resident alien of the United States who
"knowingly engages in clandestine intelligence activities for or on
behalf of a foreign power under circumstances which indicate that
19 This bill is not intended, of course, to repeal or abrogate the Vienna Convention on
Diplomatic Relations, which was ratified by the Senate and carne into effect in the Vnited
States on December 13, 1972. The Convention provides that diplomatic agents, their
residences (article 30(1)), and their missions (article 22 (1) and (3)), as well as their
olHcial correspondence (Article 27(2) and 30(2)), are "inviolable." The obligations of the
Convention are reciprocal; when another nation has failed to maintain the inviolability of
American diplomatic communications, this country is free under International law to net
similarly towards representatives of that nation (article 47(2a.)). The bill does not affect
nor floe, the Committee intend to affect, the. legal interpretations of the Vienna Convention
under which the Executive Branch has made those treaty obligations effective within the
1:11ited States.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/? : CIA-RDP80SO1268A000500040008-7
such activities would be harmful to the United States." This category
could potentially include illegal aliens, foreign terrorists, exchange
visitors, foreign businessmen, foreign students, and foreign seamen.
While it is expected that in most cases such foreigners would, even
under this standard, be violating United States criminal laws, and
would certainly be subject to deportation (see, e.g., 8 U.S.C. ? 1251 (a)
(7) ), there is no specific requirement that the activity providing the
justification for the surveillance constitute a Federal crime. This
separate non-criminal standard for foreigners is a significant change
from S. 3197. In favorably reporting S. 3197 during the 94th Congress,
the Committee accepted the need for a narrower noncriminal standard
applicable to all persons within the United States. S. 1566, however,
while retaining the S. 3197 noncriminal standard largely intact for
United States citizens and lawful resident aliens, alters it substan-
tially when other persons-not United States citizens or resident
aliens-are the targets of the surveillance.
For example, no reference is made to the requirement of "direction"
from a foreign power's "intelligence service or intelligence network",
nor is there any requirement of "collection" or "transmission" in a
secret manner. Because it eliminates such requirements when foreign
visitors-and only when foreign visitors-are involved, the bill has
been criticized by some members of the Committee. The Fourth
Amendment to the Constitution speaks in terms of protecting all "per-
sons"--not just United States citizens and law resident aliens-yet the
bill. establishes a different standard for illegal aliens and foreign
visitors.
Proponents of the change, however, point out that where there are
compelling considerations of national security, alienage distinctions
are clearly lawful.29 The Director of the FBI testified in support of
the different standard. He pointed out that large numbers of tempo-
rary aliens visit the United States and that many of these aliens are
working for foreign intelligence networks. The Select Committee on
Intelligence Activities similarly identified the problem, pointing out
that one quarter of the Soviet exchange students coming to the United
States in a ten-year period were found to be intelligence oflicers.30
This Committee is aware that less ir,trusi'e investigative techniques
may not be able to obtain sufficient information about persons
visiting here only for a limited time : the additional. showing required
for _ United States citizens and permanent resident aliens, therefore,
may simply not be possible. Weighing these findings, recommenda-
tions, and considerations, as well as the recognized, bipartisan goal of
enacting statutory safeguards in this area, the Committee has con-
cluded that this distinction between United States citizens, lawful resi-
dent aliens and other aliens should be permitted,
It is. clear, however, that this standard-unlike that in subparagraph
(A) (i)-is not one which allows surveillance on the basis of the alien's,
status per se. The alien must be engaged in "clandestine intelligence
activities" for or on behalf of a foreign power, and while these
clandestine activities need not involve criminal violations (as they
must for United States citizens and permanent resident aliens), they
must be occurring under circumstances which indicate that the activi
20 See, e.g., Hampton V. Mow Sun Wong, 426U.S. 88,115 (1976).
81 Book I. at 168-164.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
22
ties would be harmful to the security of the United States. Addi-
tionally, of course, the determination that sufficient justification exists
to conduct electronic surveillance of a foreign visitor or a nonresident
alien will be made by a judge, and not a member of the Executive
Branch.
Subparagraph (B) (i) is unchanged from the comparable provision
S. 3197 and allows surveillance of any person, including a United
States citizen or permanent resident alien, who is knowingly engaged
in clandestine intelligence activities for or on behalf of a foreign
power, which activities involve or will involve a violation of the
criminal statutes of the United States. Under this standard the person
to be surveilled must be shown to have a knowing and substantial
connection with the foreign power for whom he is working. There
must be a principal-agent relationship under which the alleged agent
has undertaken to provide services for his foreign principal. The agent
must also be knowingly engaged in "clandestine intelligence activi-
ties" which involve or will involve violations of federal criminal law.
It is anticipated that most of the persons surveilled under this section
will be violating the criminal espionage laws (Title 18, U.S. Code,
sections 792-799, 951; title 42, U.S. Code, section 2272-2278b; and
title 50, U.S. Code, section 855).
0. "Clandestine Intelligence Activities"
The term "clandestine intelligence activities" as used in the bill is
directed primarily toward those traditional activities associated with
"spying," that is gathering information in a clandestine manner or
conducting covert operations for a foreign power.
In addition to those activities which fall within the substantive
statutory crimes of spying are activities directly related to spying
which are criminal within the meaning of the conspiracy, attempt,
and aiding and abetting statutes. Examples would include maintain-
ing a "safehouse" for secret meetings, servicing "letter drops" or "dead
drops" to facilitate covert transmission of instructions or information,
recruiting new agents, or infiltrating and exfiltrating agents under
deep cover to and from the United States.
In addition to conventional "spying," that is, the gathering of infor-
mation, the intelligence agencies of foreign powers also engage in
covert action designed to influence events in this country. Under sub-
paragraph (b) (i), if such political action is covert, involves a viola-
tion of federal criminal law, such as the bribery of a public official,
and is undertaken directly on behalf of a foreign power, it would be
encompassed by this subparagraph. The bill does not authorize elec-
tronic surveillance when the activities, even though not public and
conducted for a foreign power, involve lawful acts such as lobbying
or the use of confidential contacts to influence public officials, directly
or indirectly, through the dissemination of information. Individuals
exercising their right to lobby public officials or to engage in political
dissent from official policy may well be in contact with representatives
of foreign governments and groups when the issues concern foreign
affairs or international economic matters.
They must continue to be free to communicate about such issues
and to obtain information or exchange views with representatives of
foreign governments or with foreign groups, free from any fear that
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/1 x(23 : CIA-RDP80S01268A000500040008-7
such contact might trigger the Government's power to conduct elec-
tronic surveillance. The intent of the bill is to exclude from the defi-
nition of "clandestine intelligence activities" any activity which in-
volves the lawful exercise of first amendment rights of speech, peti-
tion, assembly, and association. In no event may lawful political
activity within the ambit of the protections afforded by the first
amendment be the basis, or form any part of the basis, for finding
that any individual is engaged in "clandestine intelligence activities."
As a corollary, even the ]awful gathering of information done in a con-
fidential manner which is a part of lawful political activity-such as
gathering "intelligence" about the political strength and plans of
proponents or opponents of a particular policy--would not constitute
"clandestine intelligence activity" under this section, where such infor-
mation gathering is a normal ancillary part of lobbying, organizing
political protest, and other political activity protected by the first
amendment. Clandestine collection of information regarding the busi-
ness plans or trade secrets of an American company which merely
might provide a competitive advantage to foreign firms, for example,
in bidding on a contract with a third country would also not be
"clandestine intelligence activity" under subsection (b) (i) unless the
foreign disclosure of such financial or business information involved
or would involve a violation of federal criminal. law. Classified in-
formation held by private firms is covered in this way.
And, in the case of an organization whose leaders are engaged in
clandestine intelligence activity, such activity cannot be attributed to
every member of the group. There must be probable cause that a
particular member is himself engaged in such activity, or is conspiring
with or knowingly aiding and abetting those who are, before electronic
surveillance directed against him may be authorized under this
chapter.
Whatever the nature of the activity in question, there must be a
clandestine aspect. The statute requires that the alleged foreign agent
not only be working for or on behalf of a foreign power or its agent,
but also, as a separate requirement, that he be engaged in clandestine
intelligence activity.
There must also be an effort to obtain information which is being
kept secret and is not generally available to the public, or not available
to the general public. Therefore, the collection. for whatever purpose,
of information within the public domain such as that contained in
books, magazines, scientific journals, or newspapers would never con-
stitute "clandestine intelligence activity." 8
Finally, the word "involve" as used in subparagraph (b) (i) is not
intended to encompass any individuals who are not actually engaged
in it violation of federal law. It is intended to encompass a. violation of
federal law which is an integral part of the clandestine intelligence
activity even though the clandestine intelligence activity itself
ai It should be noted that even failing to comply fully with the Foreign Agents Regis-
tration Act (22 U.S.C. 611, et seq.) in and of itself is not intended to he clandestine intelli-
gence activity merely because the agent seeks to lobby Congress or influence public opinion
on matters relating to the national defense or foreign affairs. If, however, foreign intelli-
gence services hide behind the cover of some person or organization in order to influence
American political events and deceive Americans into believing that the opinions or
influence is of domestic origin and initiative and such deception is willfully maintained in
justified under s bsection (b) (i) of S. 1566 if all' the other statutory criteria were hmee then electronic surveillance
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
24
might fall between the, cracks of the espionage laws. For instance,
foreign intelligence agents might be collecting sensitive industrial or
technological information. While this collection may not violate the
espionage laws, the agents may have to transport the material across
state lines, thereby violating federal laws which proscribe the inter-
state transportation of stolen property. The phrase "will involve",
which also appears in this subparagraph, is likewise in no way in-
tended to diminish or dilute the nature of the criminal activity to be
established. Its only purpose is to permit electronic surveillance at
some point prior to the time when the actual crime sought to be pre-
vented, for example the actual passage of classified documents, actually
occurs. The Committee recognizes that an argument can be made that
a person could be surveilled for an inordinate period of time. That
is clearly not the intention. Indeed, even upon an assertion by the
government that an informant has claimed that someone has been
instructed by a foreign power to go into "deep cover" for several years
before actually commencing his espionage activities, such facts would
not necessarily be encompassed by the immediacy of the phrase "will
involve." Tinder the extension provisions of section 2525(c), discussed
infra, the judge can insist on examining the fruits of any earlier sur-
veillance when it is necessary to determine whether there is probable
cause to believe that the individual will be involved in clandestine
intelligence activities.
Subparagraph (B) Ni) includes any person who knowingly engages
in activities that involve or will involve sabotage or terrorism for or
on behalf of a foreign power. The terms "sabotage" and "terrorism"
are defined and require a showing of criminal activity. Again, the
nature of the knowledge and agency relationship are the same as
required under subparagraph (B)(i). In no event may mere sympathy
for, identity of interest with, or vocal support for the goals of a foreign
group, even a foreign terrorist group, be sufficient. The terms "involve"
and "will involve" are intended to encompass activities directly sup-
portive of some act of terrorism., e.q., the purchase or surreptitious
importation into the United States of explosives for use in a terrorist
incident, or the planning for an assassination.
D. The Noncrzimzinal Standard
Subparagraph (B) (iii) is the so-called non-criminal standard
applicable to United States citizens and resident aliens. The only sub-
stantive change from the similar provision in S. 3197 is the inclusion-
at the Administration's request-of "collection" among the activities
justifying the surveillance. This change makes sense. Actual trans-
mission of information to a foreign intelligence service may not yet
be completed or may not be detected., yet, given the other criteria
under this subparagraph, collection alone should be sufficient to justify
the surveillance.
During the course of the hearings on S. 1566, testimony was elicited
from various witnesses as to the precise contours. of the noncriminal
standard. All witnesses agreed that the phrase would, with limited
exception for certain activity, refer to activity constituting a Federal
or State crime. On the basis of testimony of, and discussions with, the
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/11123 : CIA-RDP80S01268A000500040008-7
Department of Justice, the committee agreed to include language
covering certain narrowly circumscribed intelligence activities closely
related to criminal espionage but not presently constituting an offense
under Federal law. Such a decision was made despite serious reserva-
tions voiced by various members of the Committee. In introducing
S. 1566, Senator Kennedy stated that he had "never been altogether
satisfied with the explanations offered by the Department of Justice
as to why a noncriminal standard is necessary at all." This view
continues to be shared by many Committee members. However, for
various reasons-perhaps the most important being the desire of the
Committee to at long last enact important statutory safeguards in this
arefl and to avoid the acrimony of past fruitless efforts-the Commit-
tee has again agreed to include in S. 1566 a narrow, carefully circum-
scribed, noncriminal standard. The Administration has agreed, how-
ever, to draft a revision of the espionage laws which might enable this
narrow noncriminal standard to be repea.led.33 In the interim, the
Committee believes that this subparagraph contains standards suffi-
ciently stringent as to be incapable of abuse.
Although the Administration is committed to using the criminal
standards wherever possible, there. are several situations where this
subparagraph may be necessary. For example, the situation where
the information being collected or transmitted is not "information re-
lating to the national defense," as defined by the courts. Gorin V.
United States, 312 U.S. 19 (1941) ; United States v. Heine, 151 F.2d
813 (2d Cir. 1945) (L. Hand, J.), cert. denied, 328 U.S. 833 (1946).
The example is also cited where Federal agents have witnessed a
series of "meets" or "drops" between a hostile foreign intelligence of-
ficer and a citizen, information is being passed, but the federal agents
have been unable to determine precisely what information is being
transmitted. A third example referred to is where personally damag-
ing information is being gathered about persons for purposes of black-
mailing. them into becoming foreign agents. This may or may not be
a crime, depending on whether the technical requirements of the black-
mail or extortion statutes have been satisfied, but the national security.
could be threatened, and electronic surveillance may enable the gov-
ernment to protect the victim from such attempts. Another example
is where a foreign intelligence service is targeting the installations or
personnel of a foreign government in the United States. There still
must be a nexus to our national security, but such nexus may well exist
where the foreign government is an ally of the United States and a
compromise of the former's secrets to an adversary nation may en-
danger our own security.34
Because of this range of cases, which may or may not fall within the
ambit of the espionage laws, but do involve Americans working for a
foreign intelligence service under circumstances dangerous to the na-
tional security, the Committee has chosen to include this limited non-
criminal standard for Americans. The bill permits, in this subpara-
32123 Cong. Rec. S7857 (daily ed., May 18, 1977). 12-46
P Senate Judiciary Heartnge, testimony of Attorney General Griffin Bell, pp
(June 13, 1977).
" Of course, nothing in this subparagraph would allow electronic surveillance of those
engaged in protests, demonstrations, or other such lawful activity directed against a third
country, even if carried out at the direction of a foreign power.
S. Rept. 604, 95-1-4
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : C26-RDP80SO1268A000500040008-7
graph, the surveillance of any person if the Government can estab-
lish that there is probable cause to believe that :
(1) Said person was acting pursuant to the direction of a
foreign intelligence service;
(2) Said person was knowingly either collecting or transmit-
ting information or material to a foreign intelligence service in
a manner intended to conceal either the nature of the information
or material or the fact that it was being collected or transmitted ;
and
(3) The circumstances indicate that the transmission of the in-
formation or material would harm the security of the United
States, or that lack of knowledge by the United States govern-
ment about what is being transmitted would harm the security
of the United States.
E. "Pursuant to the Direction of an Intelligence Service or Intelligence
Network of a Foreign Power"
Perhaps the most important phrase in the subparagraph is the re-
quirement that the target of the surveillance be acting "pursuant to
the direction of an intelligence service or intelligence network of a
foreign power." This language :means that a person must be acting
under the direction and control of such power.
There must be a principal-agency relationship under which the
alleged agent has undertaken to do the bidding of his foreign princi-
pal. This subparagraph, therefore, would not authorize electronic
surveillance of United States citizens or permanent resident aliens,
whatever the nature of their alleged activities, unless there was prob-
able cause to believe they are acting pursuant to the direction of a
foreign intelligence service or network. It does not authorize electronic
surveillance under any circumstances for the class of individuals in-
cluded by the Supreme Court within the scope of the Keith decision
requiring judicial warrants for alleged threats to security of a domestic
nature. It is the intent of this requirement that even if there is some
substantial contact between domestic groups or individual citizens
and a foreign power, as defined in this bill, no electronic surveillance
under this subparagraph may be authorized unless the American is
acting under the direction of an intelligence service of a foreign power.
For example, Americans of Greek, Jewish, Irish, or Chinese extrac-
tion legitimately may seek to influence United States policy toward
the country of their ethnic origin. In the process, such Americans are
likely to be in communication with representatives of the governments
of those countries in order to learn about particular situations or prob-
lems. If an American formulates lobbying efforts in part on the basis
of such advice or suggestions he could, in one sense, be said to be
following the "direction" of a foreign power. But this subparagraph
requires that the agent act pursuant to the "direction of intelligence
service or network of a foreign power". Thus, such "direction" from
personnel of a foreign power which are not connected with an intel-
ligence service or network would not be a basis for electronic surveil-
lance under this subparagraph. There would have to be additional
information specifically indicating the Americans had undertaken
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/13723 : CIA-RDP80SO1268A000500040008-7
to do the bidding of an intelligence service or network, or its agents,
rather than merely acting because of an affinity for the same concerns
as that foreign power. The key legal doctrine is that of agency; mutual
goals or common concerns are not sufficient.
Another example of Americans having contact with foreign powers
is the case of Americans who were active in the protest against United
States involvement in Vietnam. Some of them may have attended in-
ternational conferences at which there were representatives of foreign,
powers, as defined in the bill, or may have been directly in communica-
tion with foreign governments concerning this issue. There may have
been an exchange of information about activities protesting the Viet-
nam var. But if there merely had been evidence that an American was
coordinating the dates of planned peace demonstrations in the United
States to coincide with similar activities abroad in order to maximize
worldwide public attention, that would not have sufficed to find
probable cause that the American was acting under the direction of a
foreign intelligence service as required by this subparagraph. Addi-
tional evidence would have been required indicating that the Amer-
ican had undertaken to follow the instruction of a foreign intelligence
service or network, rather than simply trying to coordinate his
independent effort with related activities abroad.
For both of these two illustrations, it should be emphasized that
even if there was probable cause to believe an American was acting
pursuant to the direction of a foreign. intelligence service, the court
would also have to find probable cause to believe that the American
was engaged in the secret collection or transmission of information
or material to a foreign power. This is a separate and distinct
requirement.
Further, an organization substantially composed of Americans,
whether residing in the United States or abroad, would not come with-
in the definition of acting pursuant to the direction of a foreign intel-
ligence service merely because it was part of a worldwide confederation
of national organizations. Even if a domestic organization were found
to be acting through its leaders at the direction of a foreign intelligence
service, an individual's more membership in that organization, with-
out more information about his own undertaking to do so, would not
constitute probable cause to believe that that particular member was
acting pursuant to the direction of a foreign intelligence service for
purpose- of this subparagraph.
I really, it is necessary that the person be aware he is acting on
behalf of a foreign power. An American might be secretly collecting
information about important technology, for example, and have been
misled into the belief he was acting for a research institute or a multi-
national corporation. Therefore it would not suffice to establish prob-
able cause that the American is, in fact, engaged in a covert activity
at the direction of a foreign power; the government must establish
probable cause that the American knows his efforts are on behalf of a
foreign power's intelligence activities.
It also follows, of course, that evidence a foreign power is trying
to recruit an American as an agent does not suffice to establish probable
cause to believe he has agreed to do the foreign power's bidding and is
engaged on its behalf. Before electronic surveillance could be directed
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
against the American, the court would have to find probable cause that
the. American had responded positively to the recruitment effort, and
it is now acting as a member of that power's intelligence network.
In applying these various tests, the judge is expected to take all
The known circumstances into account, e.g., who the American is,
where lie is employed, whether he has access to classified or other sensi-
tive information, the nature of the clandestine meetings (whether it is
merely in an out-of-the-way restaurant as opposed to a hidden location
in a distant city), the method of transmission (handing over a sealed
envelope in a public place, as opposed to using a "drop"), and whether
there are any other reasonable explanations for the behavior. It is
clear, moreover, that the circumstances must not merely be suspicious,
but must be sulli'ient support for a finding of probable cause that the
.security of the United States would be harmed.
This subparagraph also recognizes that there are certain rare situ-
ations where, for example, a citizen who has access to classified infor-
mation is clandestinely meeting with a known intelligence officer
of a. hostile foreign power, and it is, therefore, essential that the
TTnited States find out what is transpiring between them. In such a
rare case, lack of knowledge by the U.S. Government about what is
being transmitted might, by definition, harm the security of the United
States. In such a situation, if the judge concludes that there is probable
cause to believe that such "lack of knowledge would be harmful to the
security of the United. States," an American could also be targeted.
The Committee emphasizes that this narrow inclusion for electronic
surveillance without probable cause to believe that the targets are
engaged in criminal activity is, of course, not intended to provide a
bootstrap for even broader authority to investigate noncriminal activ-
ity of Americans absent the safeguards in this bill. The Committee
emphasizes that S. 1566 establishes a legislative scheme to deal only
with electronic surveillance; the use of other investigative techniques
do not fall within the scope of this bill.
F. "Conspires or Aids and Abets"
Subparagraphs (A) (iii) and (B) (iv) are provisions which allow
electronic surveillance of persons who knowingly conspire with or aid
or abet persons who could otherwise be subjected to electronic sur-
veillance under the provisions discussed above. Insofar as the doc-
trines of conspiracy and aiding and abetting have been made applicable
to the noncriminal standards of S. 1566-a change from S. 3197-
some members of the Committee are concerned. They feel that the
safeguards and protections found in the narrow, carefully circum-
scribed language of the noncriminal standards (especially in the non-
criminal standard applicable to United States citizens) can be abused
through the use of the conspiracy and aiding and abetting language.
Under (A) (iii) non-resident aliens can be subjected to electronic
surveillance by conspiring with or aiding or abetting another non-
resident alien, knowing that person is engaged in clandestine intelli-
gence activities for or on behalf of a foreign power. Under (B) (iv)
a person can be subjected to electronic surveillance if he conspires
with or aids or abets a person knowing that person is engaged in the
activities described in subparagraphs (B) (i) through (iii). Under
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
29
both (A) (iii) and (13) (iv) the Government would have to establish
probable cause that the prospective target knew both that the person
with whom he was conspiring or whom he was aiding or abetting was
engaging in the described activities as an agent of a foreign power
and that his own conduct was assisting or furthering; such activity,
The knowledge requirement is therefore applicable to both the status
of the person being aided by the proposed subject of the surveillance
and the nature of the activity being promoted. The innocent dupe
who unwittingly aids a foreign intelligence officer cannot be targeted
under this provision.35
An illustration of the "knowing" requirement is provided by the
case of Dr. Martin Luther King. Dr. King was subjected to electronic
surveillance on "national security grounds' when he continued to asso-
ciate with two advisers whom the Government had apprised him were
suspected of being American Communist party members and, by im-
plication, agents of a foreign power. Dr. King's mere continued asso-
ciation and consultation with those advisers, despite the Government's
warnings, would clearly not have been a sufficient basis under this bill
to target Dr. King as the subject of electronic surveillance.
Indeed, even if there had been probable cause to believe that the
advisers alleged to be Communists were engaged in criminal clan-
destine intelligence activity for a foreign power within the meaning
of this section, and even if there were probable cause to believe Dr.
King was aware they were acting for a foreign power, it would aa,o
have been necessary under this bill to establish probable cause that
Dr. King was knowingly engaged in furthering leis advisers' criminal
clandestine intelligence activities. Absent one or more of these re-
quired showings, King could not have been found to be one who know-
ingly aids or abets a foreigrn. agent.35
Subsection (b) (3) defines "terrorism" as criminal activities which
are violent or dangerous to human life. The purpose of the activities
must be either the forceful intimidation of the civilian population, the
intimidation of national leaders in order to force a significant change
in governmental policy, or the affecting of Governmental conduct by
assassination or kidnaping. Examples of such activities would be
the detonation of bombs in a metropolitan area, the kidnapping of a
high-ranking government official, the hijacking of an airplane in a
deliberate and articulated effort to force the government to release a
certain class of prisoners or to suspend aid to a particular foreign
In the case of a person alleged to be knowingly aiding or abetting those engaged in
terrorist activities on behalf of a foreign power, such a person might be assisting a group
would be necessary to establish probable cause that the Individual was aware lof a ease, the ter-
rorist rorist activities undertaken by the group and was knowingly furthering them, and not
merely that he was aware of and furthering their lawful activity.
80 Mere membership in the United States Communist Party is not sufficient under this
hill foreign power or that he is engaged in clandestie acting Intelligence activities. lon and control of
Moreover, even if additional information established probable cause to believe some
inembers of the party were acting under the direction and control of a foreign power.
neither efforts to collect information about the plans and program of the civil rights.
movement or other political protests, nor efforts to stimulate or shape them would con-
stitute clandestine intelligence activity within this, section. Gathering information about the
movement would neither be criminal espionage nor the kind of economic or technical relating to the
tutionally
since athe civil rights protest movement t elf Invoilvedtcon t noncrinitnal
protected rights of association, speech and petition for redress of grlevnnees. efforts hr a
are intended to
from t be specifically exclude .1
fore, he ow nit oinv involve itself I Intellia gence movement
activity.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
country, or the deliberate assassination of persons to strike fear into
others to deter them from exercising their rights.
Subsection (b) (4) defines "sabotage" as activities which would con-
stitute crimes under chapter 105 of title 18, United States Code, if con-
ducted against the United States. In S. 3197 only actual violations of
chapter 105 were included in the definition of sabotage. But by its
terms, chapter 105 makes criminal only acts of sabotage against United
States government facilities. S. 1566 has expanded the definition of
sabotage to include similar acts when committed against a State or
another nation's facilities and materials relating to defense. Thus,
sabotage directed against State and local police facilities and equip-
ment, or against the defense facilities of foreign nations, would
constitute sabotage under this definition.37 Of course, electronic sur-
veillance under this chapter could be undertaken only if such sabotage
was knowingly conducted for or on behalf of a foreign power and was
related to foreign intelligence as defined. The Committee agrees with
the Administration that where persons are knowingly engaged in
sabotage of State or foreign facilities for or on behalf' of a foreign
power, such persons should be subjected to foreign intelligence elec-
tronic surveillance in this country even before there is probable cause
to believe that they will engage in sabotage against Federal facilities.
0. "Foreign Intelligence Information"
Subsection (b) (5) defines "foreign intelligence information" to in-
clude five types of information, which, while not mutually exclusive,
tend to be distinguishable. Subparagraph (A) of this subsection is de-
fined as information deemed necessary for the United States to protect
itself against actual or potential attack or other similarly grave hostile
acts of foreign power or its agents. This category is intended to en-
compass information which relates to foreign military capabilities and
intentions, as well as acts of force or aggression which would have
serious adverse consequences to the national security of the United
States. The term "hostile acts" must be read in the context of the sub-
paragraph which is keyed to' actual or potential attack on the United
States. Thus, only the most "grave" types of "hostile acts" would be
envisioned as falling within this provision.38
Subparagraph (B) of this subsection includes information which
because of its importance is deemed essential (i) to the national de-
fense or the security of the Nation or (ii) to the conduct of the foreign
affairs of the United States. This subparagraph also requires that the
information sought involve "information with respect to foreign pow-
ers or territories", and would therefore not include information about
ar Under 18 U.S.C. 956, it is a Federal crime for persons within the United States to
conspire to injure or destroy property located in and owned by it foreign government.
as In testifying last year in the House Hearings on S. 3197, Attorney General Levi con-
firmed this interpretation :
"Mr. ICASTENMEIER. How do you understand the term other hostile acts of a foreirn
power? Is there enough precedent or other language so that we understand precisely
what the hostile acts constitute, whether a criticism of our participation in the Vietnam
war would be a hostile act? Or attempting to board an American ship on the high seas is a
more classical case. How broad is the hostile acts?
"Attorney General LEVI. I certainly wouldn't think that hostile acts involved criticism.
I would assume-I don't know that we can get a better definition. Burt it does after all say,
against actual or potential attack or other hostile acts.' So that it is the actual or potential
attack which really gives the flavor to what is meant.
"Mr. KASTENMMEIER. In other words, it must be seen in a broader context, and therefore
be much more limited?
'Attorney General LEVI. I would think so." (House Hearings 10-11, emphasis added.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 1CIA-RDP80SO1268A000500040008-7
the views or planned statements or activities of Members of Congress,
executive branch officials, or private citizens concerning the foreign af-
fairs of the United States.
It is anticipated that the types of "foreign intelligence information"
defined in subparagraphs (A) and (B) will be the types most often
sought when an electronic surveillance is instituted against a foreign
power as defined in Section 2521 (b) (1) (A), (B), (C), and (E), or
against most foreign agents as defined in Section 2521(b) (2) (A) (i).
Subparagraph (C) of this subsection includes information which is
deemed necessary for the United States to protect against terrorism by
a foreign power or foreign agent. It is anticipated that the type of in-
formation described in this subparagraph will be the type sought when
,in electronic surveillance is instituted against the type of foreign
power defined in Section 2521(b) (1) (D), or against the type of for-
eign agent defined in Section 2521(b) (2) (B) (ii~.
Subparagraph (D) of this subsection includes information which is
deemed necessary for the United States to protect against sabotage by
a foreign power or foreign agent.
Subparagraph (E) of this subsection includes information which is
deemed necessary to the ability of the United States to protect against
the clandestine intelligence activities of an intelligence service or net-
work of a foreign power or a foreign agent. This subparagraph en-
compasses classic counterintelligence information; that is, informa-
tion deemed necessary to the nation's ability to discover and protect
against the activities of clandestine intelligence services of foreign
powers in the United States. This subsection is not intended to encom-
pass information sought about dissident political activity by United
States citizens allegedly "necessary" to determine the nature and ex-
tent of any possible involvement in those activities by the intelligence
services of foreign powers. Such a dragnet approach' to counterintelli-
gence has been the basis for past improper investigations of citizens
and is not intended to be included as a permissible avenue of "foreign
intelligence" collection under this subparagraph. Nor does this sub-
paragraph include efforts to prevent "news leaks" or to prevent publi-
cation of such leaked information in the American press, unless there
is reason to believe that such publication is itself being done by an
agent of a foreign intelligence service and that such publication would
harm the national security.
Most importantly, all five subparagraphs set out standards estab-
lishing a nexus between the information sought and the desired end.
Subparagraph (B) requires that the information sought be "essential"
while the other subparagraphs establish a standard of "necessary."
Where the term `necessary" is used, the Committee intends to re-
quire more than a showing that the information would be useful or
convenient. When the term "essential" is used, the Committee intends
to require a showing that the information is important and required
but not that it is of utmost importance or indispensable.
The use of these standards is intended by the committee to mandate
that a significant degree of need be demonstrated by those seeking the
surveillance. For example, it is often contended that the intelligence
analyst, if not the policymaker himself, must have every possible bit
of information about a subject because it might prove an important
piece of the larger picture. In that sense, any information relating to
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
32
the specified purposes might be called "necessary" but such a reading
is clearly not intended.
"Essential" is used in subparagraph (B) because of the more
amorphous nature of the information which can be acquired under this
subparagraph. While subparagraph (A) deals with positive foreign
intelligence involving actual or potential attack or comparable hostile
acts and subparagraphs (C), (D), and (E) cover terrorist, sabotage,
and counterintelligence information, subparagraph (B) potentially
brings within the definition of foreign intelligence information a
broader range of material dealing with the national defense and for-
eign affairs of the United States.
In addition, information about a United States citizen's private
affairs shall not be deemed "foreign intelligence information" unless
it directly relates to his activities on behalf of a foreign power. This
interest is achieved by including in each subsection of the foreign in-
telligence definition the requirement that the information sought
actually "relates to" the type of information deemed necessary or essen-
tional. For example, the government could not seek purely personal
information about a United States citizen or permanent resident alien,
who is a suspected spy, upon a theory that it might learn something
which would be "compromising." Instead, the bill makes clear that the
only information about United States citizens or permanent resident
aliens which may be sought must not only be necessary to the ability of
the U.S. to protect against clandestine intelligence activities, but must
also "relate to" the activities themselves. This restriction might not
always be fully applicable to agents of foreign powers as defined in
Section 2521(b) (2) (A) (i), because information about their private
lives may itself be foreign intelligence information. For example, such
information might identify their true status or reveal the intentions
or activities of the foreign power of which they are officers or
employees.
H. "Electronic Surveillance"
Paragraph (6) defines "electronic surveillance" to include four
separate types of activities.
Subparagraph (A) makes a major improvement over the language
of S. 3197 by protecting United States citizens and resident aliens in
the United States from being targeted in their international com-
munications without a judicial warrant no matter where the sur-
veillance is being carried out. Under S. 3197 such targeting did not
fall within the confines of the bill; this provision is, therefore, a
significant extension of the protections afforded United States citizens
and lawful resident aliens. The subparagraph specifically brings
within the procedures of S. 1566 the acquisition of the contents of a
wire or radio communication of United States citizens and perma-
nent resident aliens in the United States by intentionally targeting
that particular, known United States citizen or resident alien, under
circumstances in which a person has a reasonable expectation of
privacy and a warrant would be required for law enforcement pur-
poses. Thus, for example, the "watch-listing" activities of the National
Security Agency, if directed against United States citizens in the
United States, would require a warrant under this regulation.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/1 SE23 : CIA-RDP80S01268A000500040008-7
Subparagraph (B) includes the acquisition, by an electronic,
mechanical, or other surveillance device, of the contents of a wire
communication without the consent of any party thereto when such
acquisition occurs in the United States while the communication is
being transmitted by wire. As this subdefinition makes clear, the loca-
tion of the parties to the wire communication is immaterial if the
acquisition occurs within the United States. Thus, either a wholly
domestic telephone call or an international telephone call can be the
subject of electronic surveillance under this subdefinition if the acquisi-
tion of the content of the call takes place in this country and if such
acquisition occurs "while the communication is being transmitted
by wire." This second qualifier is necessary because the definition of
"wire communicatoin" under 18 U.S.C. 2510(l) includes any com-
munication "made in whole or in part" through wire facilities. Because
most telephonic and telegraphic communications are transmitted at
least in part by microwave radio transmissions, subdefinition (B) is
meant to apply only to those surveillance practices which are effected
by tapping into the wire over which the communication is being trans-
mitted. The interception of the microwave radio transmission is meant
to be covered by subdefinition (C) if the sender and all intended
recipients are located within the United States, or by subdefinition
(A) if it is done through the targeting of a United States citizen or
resident alien in the United States.
Subparagraph (C) includes the intentional acquisition by an elec-
tronic, mechanical, or other surveillance device of the contents of a
radio communication, without the consent of any party thereto, made
with a reasonable expectation of privacy and under circumstances
where a warrant would be required for law enforcement purposes,
where both the sender and all intended recipients are located within
the United States, i.e., a totally domestic radio communication. This
part of the definition would reach not only the acquisition of commu-
nications made wholly by radiobut also the acquisition of "wire com-
munications" by means of intercepting the radio transmitted portion
of those communications within the United States. The territorial
limits of this subdefinition are not dependent on the point of acquisi-
tion, as is the case with subdefinition (B), but on the locations of the
comnnunicants. Thus, the acquisition of radio communications outside
the territorial limits of the United States would be covered if all of
the communicants were located within the United States. Only acquisi-
tion of those domestic radio communications made with a reasonable
expectation of privacy where a warrant would be required for law
enforcement purposes would be included in the term "electronic sur-
veillance." This would exclude, for example, commercial broadcasts, as
well as ham radio and citizen band radio broadcasts (cf. 47 U.S.C.
section 605) ; United v. Hall, 488 F.2d 193 (9th Cir. 1973).
Only "intentional" acquisitions of domestic communications are
within this subdefinition because, by their very nature, radio trans-
missions may be intercepted anywhere in the world, even though the
sender and all intended recipients are in the United 'States. Thus,
intelligence collection may be targeted against foreign or international.
communications but accidently and unintentionally acquire communi-
cations intended to be totally domestic. It is the Committee's under-
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CI~R DP80S01268A000500040008-7
standing that these communications are immediately destroyed. Absent
the word "intentional", however, these accidental interceptions, even
if the contents are immediately destroyed, could leave these agencies
open to civil or criminal liability for failing to secure a judicial
warrant.
The effect of subparagraphs (A), (B) and (C) of Section 2521
(b) (6), therefore, is to include within the term "electronic surveil-
lance" the nonconsensual acquisition of all domestic radio communica-
tions made with t reasonable expectation of privacy, the nonconsensual
acquisition within the United States of all wire communications, as
defined in 18 U.S.C. Section 2510(1), except those international wire
communications which are acquired by intercepting the radio trans-
mitted portions of the communications, and the targeting of particular
United States citizens or resident aliens in the United States in order
to acquire international communications made with a reasonable
expectation of privacy.
'The reason for excepting from the definition of "electronic surveil-
lance" the acquisition of international radio transmissions, including
international wire communications when acquired by intercepting
radio transmissions when not accomplished by targeting a particular
United States person in the United States, is to exempt from the pro-
cedures of the bill certain signals intelligence activities of the National
Security Agency.
Although it is desirable to develop legislative controls in this area,
the Committee has concluded that these practices are sufficiently dif-
ferent from traditional electronic surveillance techniques, both con-
ceptually and technologically, that, except when they target particular
United States citizens or resident aliens in the United States, they
should be considered separately by the Congress.39 The fact that this
bill does not bring these activities within its purview, however, should
not be viewed as congressional authorization of such activities. This
committee merely recognizes that this particular signals intelligence
activity is not covered by the procedures outlined in this bill. In any
case, the requirements of the .[i ourth Amendment would, of course,
continue to apply to this type of communications intelligence
activity.40
Subparagraph (D) brings within the definition of "electronic sur-
veillance" the acquisition of information, not transmitted as a wire
communication or radio communication, by the installation or use of
an electronic, mechanical, or other surveillance device for monitor-
ing in the United States under circumstances in which a person has a
reasonable expectation of privacy and a warrant would be required
for law enforcement purposes. This is intended to include the acquisi-
tion of oral communications made by a person exhibiting an expec-
tation that such utterances are not subject to acquisition, under eir-
sv The nature of National Security Agency activities, the purposes of such activities and
the technological problems associated with such activities have been carefully documented
by the Church committee in vol. III, pages 733 et seq. See also, II Church committee 55-60,
108 and 308-311.
,0'i'he Committee notes with approval, however, that broadscale electronic surveillance
of American citizens while abroad has been limited in part by both the President's Executive
Order applicable to the foreign intelligence agencies and Department of Justice directives
I. the intelligence community. See Executive Order No. 11905. February 18, 1976: testi-
mony of Attorney General Edward H. Levi before the Church Committee. November 6,
1975. p. 15. Thus, the surveillance of journalists, such as in the Joseph Kraft case, would
be prohibited.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/2335CIA-RDP80S01268A000500040008-7
cumstances justifying such expectation. In addition, it is meant to
include the installation of beepers and "transponders," if a warrant
would be required in the ordinary criminal context. United States v.
Holmes, 537 F.2d 227 (5th Cir. 1976). It could also include minia-
turized television cameras and other sophisticated devices not aimed
merely at communications.
This part of the definition is meant to be broadly inclusive, because
the effect of including a particular means of surveillance is not to
prohibit it but to subject it to judicial oversight. It is not meant to
include, however, the acquisition of those international radio trans-
missions or international wire communications, when acquired by
intercepting radio transmissions, which are not acquired by targeting
a particular United States person in the United States. Nor, as earlier
indicated, is it meant to require a court order in any case where a
search warrant would not be required in an ordinary criminal context.
It has been held, for example, that Fourth Amendment protections
do not extend to activities undertaken in the open where a participant
could reasonably anticipate that his activities might be observed .41- But
two persons in a public park, far from any stranger, would not reason-
ably anticipate that their conversations could be overhead from afar
through a directional microphone, and so would retain their right of
privacy. Of course, law enforcement officials may, if they wish, con-
tinue to obtain an ordinary search warrant or chapter 119 court order
if the facts and circumstances so justify it.
The definition of "electronic surveillance" comprising the intercep-
tion of wire communications and radio transmissions has an explicit
exception where any party has consented to the interception. This is
intended to perpetuate the existing law regarding consensual inter-
ceptions found in 18 U.S.C. section 2511 (2 (c) and in the case law
interpreting 47 U.S.C. section 605.42 Whether consent may be inferred
in a particular case will depend on the facts and circumstances.
That part of the definition of "electronic surveillance" regarding the
installation of a device requires that the acquisition of information be
under circumstances in which a person has a, constitutionally protected
right of privacy. There is no such right in those situations* where the
interception is consented to by at least one party to the conversation.
For instance, a body microphone placed on an informer with his con-
sent is an installation of a device to acquire information, but a person
speaking to the informer has no justifiable expectation that the in-
former will not repeat, record, or even transmit by a miniature trans-
mitter what the person voluntarily tells the informer. By telling the
informer something, the person has, with respect to that information,
surrendered his expectation of privacy vis-a-vis the informer. Such
a situation is not, of course, limited to body microphones. Telephone
conversations to which one of the parties has consented and micro-
phones installed with consent would be functionally equivalent. What
is important is the consent. So long as one party to the conversation
has consented to the surveillance, the other party has no justifiable
,t Air Pollution Variance Board v. Western Alfalfa Corp., 416 U.S. 861 (1974).
Lopez v. United States, 373 U.S. 427 (196,3) ; Rathbun v. United States, 355 U.S 197
(1957).
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
36
expectation of privacy in that which lie voluntarily reveals to the
party who has consented to the surveillance.43
rl'lHus the absence of a reasonable expectation of privacy where one
party consents to the surveillance is, the equivalent of the explicit con-
sent provision in 18 D.S.C. section 2511(2) (c).
I. "-4tteruei/ General"
Paragraph (7) defines "Attorney General" to mean the Attorney
General of the United States. the Acting Attorney General, or the
Deputy Attorney General. Under S. 3197 only the Attorney General.
or the Acting Attorney General could approve an application. The
Administration had urged the Committee to permit a specially desig-
nated Assistant Attorney General to approve an application for sur-
veillance. The Administration cites as the reason for the delegation of
this authority to a specially designated assistant Attorney General
the need to lessen the administrative burden of the Attorney General
which would be perpetuated even after this bill has established the
safeguards of a judicial warrant procedure.''
Some members of the Committee were troubled that the delegation
of this authority as suggested by the Administration would not pro-
vide the tight control and objective methods that should be required
in the foreign intelligence area. These Committee members distinguish
Title III applications, for which authority may be delegated, by point-
ing out that: (1) Such applications are made in conjunction with
specific criminal investigations and are, therefore, more capable of ob-
jective determination; and (2) that when it comes to foreign intelli-
gence electronic surveillance it is more likely that the heads of various
agencies, such as the Secretary of Defense or the Director of the FBI,
will intercede directly in the application process, thus placing more
pressure on the Attorney General's designate to approve the warrant
request. These Committee members believe that, in the last analysis,
only the Attorney General could withstand such official pressure and
decide the issue in an objective manner.
Senator Kennedy maintained during the hearings on S. 1566 that
since administrative inconvenience was not cited by the Ford Admin-
istration as a reason for delegating authority to review the applica-
tions, the present Department of Justice should not depart from the
previous Administration's corn niitment.45
With the assurance of Attorney General Bell in his testimony dur-
ing the hearings on S. 1566 that lie would personally continue to ap-
prove applications under the bill until standards of review have been
well established,41 the Committee adopted a modified version of the
Administration's proposal.. It provides authority for the Attorney
General (or the Acting Attorney General) or the Deputy Attorney
General-rather than a specially designated Assistant Attorney Gen-
oral-to approve applications for an electronic surveillance order
under this chapter.
"' United States v. White, 401 U.S. 745 (1971).
,' Sea ate Judiciary Hearings, Testimony of Attorney General Bell, pp. 18-19 (June 13,
1977).
,Senate Judiciary Hearings, pp. 18-20.
au Senate Judiciary Hearings, testimony of Attorney General Bell, p. 20 (June 13, 1977).
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/1=3 : CIA-RDP80S01268A000500040008-7
J. "Minimisation"
Paragraph (8) deals with "minimization", i.e., procedures which are
designed to limit the acquisition, retention., and dissemination of in-
formation that is not foreign intelligence information and which re-
lates to United States citizens or permanent resident aliens. The para-
graph defines "minimization procedures" as procedures reasonably
designed to minimize the acquisition and retention, and prohibit the
dissemination, except as provided in subsections 2526 (a) and (b), of
any information concerning United States persons not related to for-
eign intelligence. Specifically, information concerning Americans must
be related to the ability of the United States to protect itself against
actual or potential attack or other grave hostile acts of a foreign power
or agent of a foreign power, to provide for the national defense or
security of the Nation, to provide for the conduct, of the foreign affairs
of the United States, to protect against terrorism or sabotage by for-
eign powers or their agents, or to protect against the clandestine intel-
ligence activities of a foreign intelligence service or an agent of a
foreign power.
The minimization requirement of this paragraph is meant generally
to parallel the minimization provision in existing law. (18 U.S.C. 2518
(5)) As the courts have noted in construing that section, "It is ...
obvious that no electronic surveillance can be so conducted that inno-
cent conversations can be totally eliminated." 47 In assessing the mini-
mization effort, the court's role is to determine whether "on the whole,
the agents have shown a high regard for the right of privacy and have
done all they reasonably could to avoid unnecessary intrusion.," 4"
Absent a charge that the minimization procedures have been com-
pletely disregarded, the test of compliance is "whether a good faith
effort to minimize was attempted." 49
Among the factors to be considered in evaluating the reasonableness
of the agents' conduct will be the scope of the enterprise under investi-
gation, the location and operation of the subject telephone (or micro-
phone), the Government's expectations of the character of and parties
to the calls, the degree of judicial supervision, and the length or brevity
of the monitored conversations. i0 Minimization procedures may differ
from case to case depending on the nature of the agency relationship,
the individuals using the facilities or place to be surveilled, the type of
foreign intelligence information sought, and other similar factors.
Minimization procedures might also include restrictions on the use of
surveillance to times when foreign intelligence information is likely to
be obtained, directions that the surveillance cease if it does not produce
results of the specified type, requirements that conversations not in-
volving the named target be deleted from the records at an appropriate
time, and other requirements specified by the judge. For example, if a
citizen or permanent resident alien were using facilities of a foreign
47 T0,ited States V. Bynum, 485 F.2d 490, 500 (2nd Cir. 1973), cert. denied 423 U.S. 1005
(1975).
9e United States v. Tortorello, 480 F20 764, 784, (2nd Cir.), cert. denied 41.4 U.S. 346
(1073).
40 United States v. Armocida, 515 F.2d 29, 44 (3d Cir. 1975).
50 United States v. Armocida. supra; United States v. James, 494 F.2d 1007 (D.C. Cir.
1974), cert. denied 419 U.S. 1020 (1975) ; United States v. Bynum, supra.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
38
agent that were the target of the surveillance, the government would
be required to minimize the acquisition and retention of any informa-
tion that did not rel ate to foreign intelligence information.
The definition of minimization speaks in terms of acquistion, reten-
tion and dissemination.
By minimizing acquisition the committee envisions, for example,
that in a given case, where A is the target of a wiretap, after determin-
ing that A's wife is not engaged with him in clandestine intelligence
activities, the interception of her calls on the tapped phone, to which A
was not a party, would be discontinued as soon as it was realized that
she rather than A was the party. In other cases, however, primarily
for sophisticated technological reasons, it may not be possible to, avoid
acquiring all conversations. In these situations minimizing retention
and dissemination becomes most important. By minimizing retention,
the committee intends that information acquired, which does not re-
late to the approved purposes justifying the warrant, be destroyed.
For example, after determining that A's wife is not engaged with her
lmsband in clandestine intelligence activities, her communications,
acquired and retained in order to make this determination, would be
destroyed. Indeed, even A's communications which are not relevant to
his clandestine intelligence activities should be destroyed. In certain
cases destruction would take place almost immediately while in other
cases the information might be retained for a reasonable period in
order to determine whether it did indeed relate to one of time approved
purposes. Procedures governing minimization-particularly how long
information should be retained and how it should be destroyed once it
is deemed irrelevant-are to be fashioned by the court and are, of
course, subject to judicial supervision.
Time Committee amendment to the minimization definition makes ex-
plicit, the intent that information not related to an approved purpose
not be disseminated. The only exceptions to this prohibition recognized
by the Committee are for one of the purposes authorized in Section
2521 (b) (8) or for the enforcement of the criminal law under the pro-
visions of Section 2526 (a) and (b). Under the dissemination please,
information being held to determine relevancy would not be dissemi-
nated until the determination was made (or would only be dissemi-
nated to those who could determine its relevancy.) It could also mean
that, even with respect to information relevant to an approved pur-
pose, dissemination would be restricted to those officials with a need
for such information. And, aiainin, the judge, in fashioning the minimi-
zation order, could place specific restrictions on the retriev,11 of such
information.
In short, the committee believes that the definition of minimization
procedures authorizes and requires that information concerning Amer-
ican citizens and lawful resident aliens be handled in such a way as to
assure that it is used only for the purposes specified in. the definition
and that it cannot he, used for any other purpose. Some. have suggested
that the statutory definition is too general. The committee recognizes,
however, that minimization requirements must differ from case to case
and that minimization restrictions which are appropriate for some sur-
veillances would be inappropriate for others. A certain flexibility in
thw statute is, therefore, necessary with careful judicial scrutiny of a
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/1'133 : CIA-RDP80S01268A000500040008-7
particular application the best protection against abuse. But the defi-
nition does not give carte blanche to the judge. It requires that the
procedures be designed to limit the acquisition, retention, and dissemi-
nation of information concerning American citizens and lawful resi-
dent aliens to that information which is related to one of the approved
purposes; in addition, the procedures must provide that the informa-
tion obtained by the surveillance will not be used for an unrelated
purpose (other than for enforcement of the criminal law, see section
2526(a),infra).
Of course, minimization only applies to information known to con-
cern United States persons. Where communications are encoded or oth-
erwise not processed so the contents of a communication are not known,
it would not be possible to minimize the acquisition, retention and dis-
semination of information concerning United States persons. Never-
theless, the minimization procedures can be structured to apply to
other agencies of the Government, so that if an agency different from
the intercepting agency decodes or processes the communication, it
could be required to minimize the retention and prohibit the dissemi-
nation of information therein concerning United States persons.
It should be noted that this provision contains one significant change
from the minimization provisions in chapter 119. Section 2518 (8) (a)
requires that all interceptions be recorded, if possible, and that the
tapes not be edited or destroyed for ten years. In a criminal context
the maintenance of such tapes and files under court seal ensures that
the interceptions will be retained in their original state so that when
criminal prosecutions are undertaken it is clear that the evidence is
intact and has not been tampered with. Although there may be cases in
which information acquired from a foreign intelligence surveillance
will be used as evidence of a crime, these cases are expected to be rela-
tively few in number, unlike Title III interceptions the very purpose
of which is to obtain evidence of criminal activity. The Committee
believes that in light of the relatively few cases in which information
acquired under this chapter may be used as evidence, the better prac-
t.ico is to allow the destruction of information that is not foreign
intelligence information or evidence of criminal activity. This course
will more effectively safeguard the privacy of individuals, ensuring
that irrelevant information will not be filed. The committee believes
that existing criminal statutes relating to obstruction of justice will
defer any efforts to tamper with evidence acquired under this chapter.
Such destruction should occur, of course, only pursuant to procedures
approved by the court. Destruction insures that the information can-
not be used to "taint" a civil or criminal proceeding; accordingly,
there is no requirement to index, for purposes of 18 U.S.C. ? 3504,
interceptions which are destroyed.
The committee is concerned that the surveillance authorized under
this chapter not result in the acquisition and retention of information
which would adversely affect the exercise of first amendment rights.
Nor should any dissemination of the information obtained so affect
those rights. Such abuses occurred with distressing frequency in the
past. Information relating to the lawful political activity of Ameri-
can citizens or resident aliens is, by definition, not foreign intelligence
information and may not be acquired, retained, or disseminated under
the provisions of this legislation.
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
40
In addition to the general minimization requirements discussed
above, there are two specific requirements aimed at particular types of
surveillance.
The first requires that appropriate steps be taken to prevent foreign
intelligence information, which relates solely to the conduct of foreign
affairs, from being maintained in a way that would permit retrieval
by reference to the name of a United States citizen or lawful resident
alien who is a party to the intercepted communication. This require-
ment is intended to strike a balance between individual rights and
government needs in the delicate situation where American citizens
are overheard in conversations which contain information solely re-
lated to the conduct of foreign affairs. V
In a hypothetical. case, for example, an ambassador from an im-
portant neutral nation, speaking to a United States Senator, tells the
Senator that his country has been secretly approached by a foreign
nation concerning a planned attack on the United States. Assuming
that the surveillance was initiated against the ambassador and ap-
proved in accordance with the procedures of this chapter, there should
be no doubt that the information could be retained and used because
of its importance and relationship "to the ability of the United
States to protect itself against actual or potential attack." At the same
time, however, the constitutional rights of speech, association, and pri-
vacy of the Senator are implicated. He is plainly not the target of the
surveillance, nor could he be, since he is not the "agent of a foreign
power." Still he is overheard. The functioning of democratic Govern-
ment can be impaired if its representatives are deterred from dis-
cussing important issues with representatives of other countries for
fear that their conversations will be overheard and retained.
There is no perfect solution to the problem. As long as the surveil-
lance was instituted lawfully, the Senator's conversation may be over-
heard. Given the subject matter of the conversation, it should not be
excluded by miniiniza,tion procedures. If the subject matter is foreign
intelligence information, the information should be retained. The
alternative-a blanket rule depriving the Government of the right to
retain foreign intelligence information, regardless of its importance,
because an American citizen was incidentally overheard-is unaccept-
able. Similarly, it would not be advisable to obligate. the Government
to render the, conversation senseless by deleting all portions of the
statements in the conversation made by the Senator.
The Committee believes, however, that every effort should be made
to minimize the "chilling effect" that retention of such conversations
of Americans will have. No file should be started or maintained
under the name of the American citizen when the information relates
solely to the conduct of foreign affairs.
The second requirement provides special protections for permanent
resident aliens and citizens of the United States who are employed by
an entity controlled and directed by a foreign government or govern-
ments, which is the target of electronic surveillance and which is not
substantially composed ~of officers or employees of a foreign govern-
nment or individuals who are agents of a foreign power as defined in
Section 2521(b) (2) (B). In such cases, the government must, in acidi-
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/123 : CIA-RDP80S01268A000500040008-7
tion to the general procedures required by this paragraph present a
statement of procedures to prevent the acquisition, retention, and
dissemination of communications of permanent resident aliens and
United States citizens who are not officers or executives of the
entity responsible for activities which involve foreign intelligence
information.
K. "United States Person"
Section 2521(b) (9) defines a "United States person" to include a
citizen of the United States, an alien lawfully admitted for permanent
residence, an unincorporated association of which a substantial num-
ber of members are citizens of the United States or permanent resident
aliens, and a corporation incorporated in the United States, but not
including corporations or associations which are "foreign powers."
This definition is new to S. 1566 since S. 3197 made no distinction in
its provisions between different types of "persons." As already indi-
cated, this new section has proven troublesome. As Senator Kennedy
stated when he introduced S. 1566:
Another major question mark concerning the bill involving
the decision of the Justice Department to grant less protec-
tions and safeguards to illegal aliens or foreign visitors. This
disquieting feature of the bill was absent from S. 3197. When
it comes to illegal aliens or foreign visitors today's legislation
provides an expanded noncriminal standard, does not allow
the court to look behind the executive branch certification and
allows the government to use the information obtained as a
result of the surveillance for whatever purpose it deems nec-
essary. The Fourth Amendment of the Constitution speaks
in terms of protecting all "persons"-not just American citi-
zens and lawful resident aliens-and to the extent that this
bill establishing different standards and procedures for illegal
aliens and temporary foreign visitors, it is open to criticism.-
Proponents of the change correctly point out, however, that this
new distinction in S. 1566 is, in large part, the result of an Admin-
istration decision to confer additional statutory protections, over and
above those found in S. 3197, for American citizens and lawful resi-
dent aliens. Thus, for example, in cases involving American citizens
or lawful resident aliens S. 1566 allows the court to look behind the
Executive branch certification and also expands the definition of
electronic surveillance. The Committee recognizes these distinct im-
provements over S. 3197 and is aware of the Administration's reluc-
tance to extend these safeguards across the board to all persons.
The term "members" with respect to unincorporated associations is
not intended, of course, to be limited to formal, card-carrying mem-
bers. For instance, an unincorporated commercial establishment's em-
ployees would be members under this definition. Corporations or
groups which are within the definitions of a foreign power in Section
2521(b) (1) (C), (D), or (F) would continue to be foreign powers
notwithstanding incorporation in the United States or the presence
o f a substantial number of American members.
51 Congressional Record 57857 (daily ed. May 18, 1977).
S. Rept. 604, 95-1-6
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CI,RDP80S01268A000500040008-7
Section 2521(b) (10) offers a new definition of "United States" for
geographic purposes. Evidence publicized last year of CIA bugging
in Micronesia led the Administration to propose this change which
makes explicit that S. 1566 covers electronic surveillance in all areas
under the territorial sovereignty of the United States (the United
States and its territories) as well as the Canal Zone and Micronesia.
The terra "territorial. sovereignty" does not include United States em-
bassies, military bases and other installations abroad. The Common-
wea.lthI of the Northern Marianas is intended to be covered by this
definition after its severance from the Trust Territory of the Pacific
Islands. The remainder of the Trust Territory of the Pacific ;birds
is intended to be covered. so long as the Trust is in erect and there-
after only if the political status agreements with the United States
provide or territorial sovereignty of the United States in a manner
similar to that of the Northern Mariana Islands, Puerto Rico or Guam.
Section 0520
Section 2522 authorizes the submission of applications to a judge
for a court order approving the use of electronic surveillance under
this chapter. Applications may be submitted only if the President has,
by prior written authorization, empowered the Attorney General to
approve the submission. This section does not require the President to
authorize each specific application; he may authorize the Attorney
General generally to seek applications under this chapter or upon such
terms and conditions as the President wishes so long as the terms and
conditions are consistent with this chapter.
Section 2523
Subsection (a) provides for the public designation by the Chief Jus-
tice of seven United States district court judges, any one of whom may
hear applications and grant orders under this chapter. Each judge
shall have nationwide jurisdiction, and the Committee contemplates
that there will be some geographic dispersion among them.
The subsection provides that none of the designated judges shall
have jurisdiction to hear an application for electronic surveillance if
that same application has been previously denied by another of the
designated district judges. This provision is intended to make clear
that if the government desires to pursue an application after a denial,
it must seek review in the special court of review established in sub-
section (b) ; it cannot apply to another district judge. Obviously,
where one judge has asked for additional information before approv-
ing an application, and that judge is unavailable when the Govern-
ment comes forward with such additional information, the Govern-
ment may seek approval from another judge. It would, however, have
to inform the second judge about the first application (see Section
2524 (a) (9), infra).
Similarly, where an application is made and then withdrawn, per-
haps because of a change in circumstances makes the electronic sur-
veillance no longer technically feasible, the Government may seek
approval from another judge if the application is subsequently
reinstated.
The subsection further provides that a designated district judge
who denies an ,application for electronic surveillance shall providea
complete written statement of the reasons for the denial, and, if the
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
43
Government seeks review of the decision, forward that statement and
other documents comprising the record to the special court of review.
This ensures that the special court of review will. have the full record
of the proceedings of the district court in reviewing the case.
Subsection (b) provides for the public designation by the Chief
Justice of three judges from the Federal courts of appeals or district
courts who shall sit together as a special court of review having juris-
diction to review denials of applications made to the individual judges
designated in subsection (a). One of the three is to be publicly desig-
nated as the presiding judge. If the special court of review determines
that an application was properly denied, it shall provide a written
statement of the reasons for its decision and, on petition of the gov-
ernment fora writ of certiorari, forward the complete record to the
Supreme Court, which will have jurisdiction to review the decision.
Subsection (c) provides for the expeditious handling of all proceed-
ings under this chapter and also states that the Chief Justice, in con-
sultation with the Attorney General and the Director of Central In-
telligence, shall establish security measures under which applications
made and orders granted shall be maintained. The Committee contem-
plates that the record of applications made, information provided,
and orders granted by the several judges designated under this chap-
ter shall be maintained in such a way that the judges designated un-
der this chapter shall have access to the records of actions taken by
the other judges similarly designated.
Section 2624
This section is patterned after 18 U.S.C. section 2518 (1) and (2),
and specifies what information must be included in the application.
Applications must be made in writing and under oath or affirmation
by a federal officer. If the officer making the application is unable to
verify personally the accuracy of the information or representations
upon which the application is based, the application must also include
affidavits by investigative or other officers who are able to provide
such personal verification. Thus, for example, if the applicant was an
attorney in the Department of Justice who had not personally gathered
the information contained in the application, it would be necessary
that the application also contain an affidavit by the investigating of-
ficer personally attesting to the status and reliability of any informants
or other covert sources of information. By this means the source of all
information contained in the application and its accuracy will have
been sworn to by a. named official of the United States Government
and a chain of responsibility established for judicial review.
Each application must be approved by the Attorney General, who
may grant such approval if he finds that the appropriate procedures
have been followed. The Attorney General shall also state in writing
his belief that the facts and circumstances relied upon for the applica-
tion would justify a judicial finding of probable cause that the target
is an agent of a foreign power and that the facilities or place at which
the electronic surveillance is directed are being used, or about to be
used, by an agent of a foreign power, and that all other statutory
criteria have been met. In addition, the Attorney General must person-
ally be satisfied that the certification has been made pursuant to statu-
tory requirements.
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
44
Paragraph (1) of subsection (a) requires that the application iden-
tify the Federal officer making the application; that is. the name of
the person who actually presents the application to the judge.
Paragraph (2) requires that the application contain evidence of
the authority of the applicant to make this application. This would
consist of the presidential authorization to the Attorney General and
the Attorney General's approval of the particular application.
Paragraph (3) requires the identity or description of the person
who is the target of the electronic surveillance. The word "person" is
used in its juridical sense to mean the individual or entity that is the
target of the surveillance. However, care must be taken in framing
the order authorizing such surveillance (and minimization procedures)
that surveillance against one individual does not lead to the intercep-
tion of communications of an entire group or organization of United
States citizens, thus violating constitutional rights of association and
privacy.
Paragraph (4) requires a statement of the facts and circumstances
justifying the applicant's belief that the target of the electronic sur-
veillance is a foreign power or an agent of a foreign power and that
the facilities or place at which the surveillance is directed are being
used or are about to be used by that power or agent. These re uire-
ments parallel existing law. (1.8 U.S.C. 2518(1) (b) (ii) and (iv) ).
Paragraph (5) requires a statement of the proposed minimization
procedures.
The statement of procedures required under this paragraph should
be full and complete and subject to the closest judicial scrutiny. These
procedures may differ from case to case, depending on the type of
foreign agent involved, the individuals using the facilities or place
to be surveilled, the type of foreign intelligence information sought,
and other similar factors. Minimization procedures should normally
include such elements as methods to avoid the acquisition of irrelevant
information at the time of intercept, restrictions on the use of surveil-
lance to times when foreign intelligence information is likely to be
obtained, and requirements for deletion of information obtained which
is not foreign intelligence information.
For example steps should be taken to prevent unnecessary invasion
of the privacy of a target's family caused by a twenty-four hour tap
on the family phone when it is known that the target is out of town
or at the office. Similarly, conversations unrelated to foreign intelli-
gence should not be retained or, of course, disseminated.
Paragraph (6) calls for a factual description of the nature of the
information sought by the electronic surveillance, except where the
surveillance is of a foreign power as defined in section 2521(b) (1) (A),
(B), or (C). The description should be as specific as possible and
sufficiently detailed so as to state clearly what the Government seeks.
A simple* designation of which subdefinition of "foreign intelligence
information" is involved will not suffice.
Such a description is not required where a target is one of the
"official" foreign powers defined in Section 2521(b) (1) (A), (13), or
(C). Where these types of powers are the targets, a designation of a
particular subcategory of the definition of "foreign intelligence infor-
mation" will suffice. The reason for this distinction is, that with respect
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
45
to such "official" targets, the sensitivity of the surveillance is greatly
multiplied while the risk of a fruitless surveillance which will not
obtain any foreign intelligence information is greatly reduced. There-
fore the Administration maintains that such applications should not
require as much detailed information to be presented as in cases in-
volving American citizens or other individual targets.
Paragraph (7) requires a certification or certifications by the As-
sistant to the President for National Security Affairs or by an appro-
priate executive official appointed by the President with the advice and
consent of the Senate. The certification would be made by the official
having ultimate responsibility for the collection of the informa-
tion-normally the Assistant to the President for National Security
Affairs, the Director of the Central Intelligence Agency, the Director
of the Federal Bureau of Investigation, or the Secretary of Defense-
or such other officer, appointed with the advice and consent of the Sen-
ate, who has full knowledge of the case. The possibility of additional
certifications is provided to insure that a detailed and complete certifi-
cation is presented to the judge.
The certification shall state that the information sought is foreign
intelligence information, that the purpose of the surveillance is to
obtain forei intelligence information, and that such information
cannot feasibly be obtained by normal investigative techniques. It
shall include a designation of what type of foreign intelligence infor-
mation is sought and where the target is not a foreign power as defined
in section 2521(b) (1) (A), (B), or (C) a reasoned statement of the
basis for certifying that the information sought is foreign intelligence
information and that such information cannot feasibly be obtained
by other investigative techniques.
The requirement that the information sought be "foreign intelli-
gence information" is designed to insure that a high-level official
with responsibility in the area of national security, will review and,
where the target is not a foreign power as defined in section 2ii21(b)
(1) (A), (B)~ or (0), explain the Executive Branch determination
that the information sought is in fact foreign intelligence information.
The requirement that this judgment be explained is to ensure that
those making certifications carefully consider the cases before them
and avoid the temptation to simply sign off on certifications which
consist largely of boilerplate language. The committee does not intend
that the certification be vague generalizations or standardized as-
sertions. The designated official must similarly explain that the pur-
pose of the surveillance is to obtain the described foreign intelligence
information. This requirement is designed to prevent the practice of
targeting one individual for electronic surveillance when the true
purpose of the surveillance is to gather information about another
individual. It is also designed to make explicit that the sole purpose
of such surveillance is to secure foreign intelligence information and
not to obtain information for any other purpose. The designated offi-
cial must similarly explain in his affidavit why the information"cannot
be obtained through less intrusive techniques. This requirement is
particularly important in those cases when United States citizens or
resident aliens are the target: of the surveillance.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Finally, where the target of the surveillance is one of the special
class of "official" foreign powers (defined in sections 2521(b) (1) (A),
(B) or (C) ), the certification shall include a statement of the period
of time for which the surveillance is required. With respect to sur-
veillances of this special class of foreign powers, this statement is
placed in the certification since the reviewing court does not have the
power to control the length of the surveillance within the 00-day pe-
riod otherwise applicable in the bill. This provision-a major change
from the blanket 90-clay limitation in S. 3197-has been criticized by
some members of the committee who object to the likelihood of
lengthy, ongoing wiretaps being conducted without adequate judicial
supervision.
Paragraph (8) requires the application to contain a statement of
the means by which the surveillance will be effected where it is not
targeted against the special class of foreign powers. Unlike S. 3191,
where the target is one of the special classes of foreign powers listed
in section 2521 (b) (1) (1), (B), or (C), the Administration has in-
sisted that only a designation of the type of surveillance according to
the categories of the definition of electronic surveillance be required.
It will generally be sufficient in such cases if the application merely
indicates whether the information will be acquired by means of a wire-
tap, a microphone installation, the interception of a radio signal or
some other means. The Administration maintains that less specificity
in describing the means of the surveillance is required for the special
class of foreign powers because of the extreme importance and sensi-
tivity of the information sought. However, if such a surveillance
requires physical entry of the property of a non-consenting person,
a statement to that effect is required.,52
Paragraph (9) parallels 18 U.S.C. Section 2518 (1) (e) and requires
a statement concerning all previous applications dealing with the same
persons, facilities, or places and the disposition of each such previous
application.
Paragraph (10) parallels 18 U.S.C. Section 2518(1) (d) and re-
quires a statement as to the period of time for which the surveillance
is necessary in those cases where the special class of foreign powers is
not the target. If the surveillance order is not to terminate automati-
cally when the particular information sought has been obtained, the
applicant must provide additional facts supporting his belief that
additional information of the same type will be obtained thereafter.
Subsection (b) allows the Attorney General to require other execu-
tive officers to provide information to support the application.
Subsection (c) enables the judge to require the applicant to furnish
further information as may be necessary to make the required determi-
nations. It parallels existing law, 18 U.S.C. Section 2518 (2). Such addi-
62 Some members of the Committee have expressed concern that the failure of S. 1346
to require a statement of means in cases involving the special class of foreign powers is
part of a disquieting pattern, a pattern that results in less oversight of warrant appil-
rations by both the Department of Justice and the judiciary. Thus. insofar as (1) the
Attorney General can delegate his authority to review warrant applications (2521(h) (7),
eupra), (2) the court has no supervisory role over the length of surveillance of "of$cial"
foreign powers (2524(a) (7) M, sapra), and (121 the Government need not give a state-
ment of the means by which the surveillance of "official" foreign powers will be effected,
there is obviously a marked lessening of the statutory safeguards found in S. 5197. The
opportunity for abuse obviously Increases. Some members of the Committee have none
along with these changes with the greatest reluctance and only because they view
S. 1566-in its entirety-as a major improvement over existing law.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/1#23 : CIA-RDP80SO1268A000500040008-7
tional proffers would, of course, be made part of the record and would
be subject to the security safeguards applied to the application and
order.
Section 2,525
Subsection (a) of this section is patterned after 18 U.S.C. Section
2518(3) and specifies the findings the judge must make before he
grants an order approving the use of electronic surveillance for foreign
intelligence purposes. While the issuance of an order is mandatory if
the judge finds that all of the requirements of this section are met, the
judge has the discretionary power to modify the order sought, such as
with regard to the period of authorization (except where the special
class of foreign powers is the target) or the minimization procedures
to be followed.
Paragraph (1) of this subsection requires the judge to find that the
President has authorized the Attorney General to approve such appli-
cations.
Paragraph (2) requires the judge to find that the Attorney General
has approved the application being submitted and that the application
has been made by a federal officer.
Paragraph (3) requires a finding that there is "probable cause" to
believe that the target of the electronic surveillance is a foreign power
or an agent of a foreign power and that the facilities or place at which
the surveillance is directed are being used or are about to be used by
that power or agent.
In determining whether probable cause exists under this section, the
court must consider the same requisite elements which govern such
determinations in the traditional criminal context. Such elements in-
clude, for example, the issue of any informant's reliability, the cir-
cumstances -under which the informant was able to learn about the
alleged activity of the individual who is the subject of the warrant, the
length of time which has passed since the information relied upon was
acquired, and the degree to which information corroborating an in-
formant must relate to the essential conduct on which the application
is premised and not merely to incidental details.
In addition, in order to find "probable cause" to believe the subject
of the surveillance is an "agent of a foreign power" under subsection
2521 (b) (2) (A) (ii), (iii), or (B), the judge must, of course, find that
the Government has established probable cause that each and every
element of that status exists. For example, if a United States citizen
or resident alien is alleged to be acting on behalf of a foreign entity,
the judge must first find probable cause to believe that the entity is a
"foreign power" as defined in section 2521. There must also be probable
cause to believe the person is acting for or on behalf of that foreign
power and probable cause to believe that the efforts undertaken by the
person on behalf of the foreign power constitute sabotage, terrorism
or other proscribed activities as defined in section 2521.
Similar findings of probable cause are required for each element
necessary to establish that a United States citizen is conspiring with
or aiding and abetting someone engaged in sabotage, terrorism, or
clandestine intelligence activities at the direction of a foreign power.
A judicial determination that a person is an agent of a foreign
power as defined in section 2521(b) (2) (B) (iii) requires other find-
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CI~~DP80SO1268A000500040008-7
ings: that the person is acting pursuant to the direction of a foreign
intelligence service or network; that the person is knowingly collect-
ing or transmitting information or material to that service or network
in a covert manner; and that the circumstances surrounding the ac-
tivity taken together are so compelling that they indicate that the in-
formation or material transmitted to the network harm the security
of the United States, or that 'lack of knowledge of the collection or
transmission would harm our national security. Thus, the nature of
the activity, its relationship to the national security, and the status of
the target are all vital to the judicial determination. The required find-
ing must be made by the judge, on the basis of the information and
explanation provided by the Government. In order to determine
whether the requisite probable cause has been established, the judge
may request such additional information as is necessary in light of
the facts and circumstances to make the required determination.
Paragraph (4) requires the judge to find that the procedures de-
scribed in the application to minimize the acquisition, retention, and
dissemination of certain information or communications relating to
United States citizens or lawful resident aliens fit the definition of
minimization procedures. The committee contemplates that the court
would give these procedures most careful consideration. If it is not
convinced that they will be effective, the application should be denied
or the procedures modified. The committee realizes that total minimi-
zation may not be possible. Therefore, the bill's requirement is phrased
in terms of minimization procedures being "reasonably designed."
Thus, for example, where irrelevant information cannot be erased from
part of a tape, minimization procedures should prohibit dissemination
of the tape. In addition, where it cannot immediately be determined
whether a certain piece of information is irrelevant, minimization pro-
cedures should require that within a specified time such a determina-
tion be made and the irrelevant matter expunged.
Paragraph (5) requires that the judges find that the application
contains the description and certification or certifications specified in
section 2524(a) (7). If the application meets the requirement of those
sections, the court is not permitted to substitute its judgment for that
of the executive branch officials, except where a United States person
is the target of a surveillance. In such a case, the judge must review
the certifications to determine whether they are clearly erroneous.
This authority of the court to "look behind" the certifications and
reject them if "clearly erroneous" is recognized by the committee
as a major improvement over S. 3197 (which did not provide for any
judicial review of the certifications.) The "clearly erroneous" standard
of review is not, of course, comparable to a probable cause finding by
the judge. Nevertheless, S. 1.566 does provide a workable procedure for
judicial review (and possible rejection) of Executive branch certifica-
tions.
Despite the fact that the court is not allowed to "look behind" the
certification in cases not involving United States persons there are
several checks against the possibility of arbitrary executive action.
First, the court, not the Executive branch, makes the findiu 2 of whether
probable cause exists that the target of surveillance is a foreign
power or its agent. It is this finding that constitutes a fundamental
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/114 / 3 : CIA-RDP80S01268A000500040008-7
safeguard for the civil liberties of the individual. It is also an effective
external control on arbitrary executive action. Second, the certifica-
tion procedure assures written accountability within the Executive
branch for the decision made to engage in such surveillance. This con-
stitutes an internal check on executive branch arbitrariness.
Moreover, it should be noted that if the description and certification
do not fully comply with sections 2524(a) (7), they can and must be
rejected by the court. Thus, the court could invalidate the certification
if it were not properly signed by the President's designee, did not des-
ignate the type of information sought, or did not state that the infor-
mation sought is foreign intelligence information, that the purpose of
the surveillance is to obtain foreign intelligence information, and that
such information cannot feasibly be obtained by normal investigative
techniques. Further, if the certification did not present an explanation
of why the information sought is foreign intelligence information
which cannot be obtained through normal. investigative techniques, the
judge could (if surveillance was not targeted against the special class
of foreign powers) reject the application or defer approval until an
adequate certification was supplied.
Subsection (b) specifies what the order approving the electronic
surveillance must contain. It must include the identity or a description
of the person or persons targeted by the electronic surveillance. The
order must specify the place or facilities against which the surveil-
lance is directed. The order must also specify the type of information
sought, or where the special class of foreign powers is the target, a
specific definition of "foreign intelligence information." These require-
ments are designed to satisfy the Fourth Amendment's requirements
that warrants describe with particularity and specificity the person,
place, and objects to be searched or seized. The order must, in addition
to the Fourth Amendment's requirements, specify the means by which
the surveillance will be effected (where the target is one of the special
class of foreign powers, however, only a specific definition of "elec-
tronic surveillance" is required). In addition, the order must specify
the period of time during which the surveillance is approved.
The order shall direct that minimization procedures will be fol-
lowed. It is intended that the court shall monitor compliance with
the minimization procedures in much the same way as has been done
pursuant to chapter 119. Failure to abide by the minimization proce-
dures may be treated as contempt of court.
The order may also direct that a common carrier, landlord, cus-
todian, contractor or other specified person furnish information,
facilities or technical assistance necessary to accomplish the electronic
surveillance successfully and with a minimum of interference to the
services provided by such person to the target of the surveillance. If
this is done, the court shall direct that the person rendering the assist-
ance maintain under security procedures approved by the Attorney
General and the Director of the Central Intelligence Agency any
records concerning the surveillance which the person wishes to retain.
If the judge directs such assistance, he shall also direct that the appli-
cant compensate the person for such assistance. These provisions gen-
erally parallel 18 U.S.C. 2518(4).
This directive provision must be read in conjunction with the bill's
conforming amendment to 18 U.S.C. 2511(2) (a) (ii), contained in
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
50
section 4(b) of this bill. That amendment requires that before a com-
munication common carrier or its agent provides such information,
facilities or technical assistance to an investigative or law enforcement
officer, that officer is required to furnish to the carrier either an order
signed by the authorizing judge certifying that a court order directing
such assistance has been issued or, in the case of surveillance under-
taken under chapter 119 or 120 in which a prior order is not required,
such as an emergency surveillance, a certification under oath by the
officer requesting the assistance that the applicable statutory require-
ments have been met.
Subsection (c) allows an order approving electronic surveillance
under this chapter against any person or entity other than a special
foreign power as defined in Section 2521(b) (1) (A), (B), or (C) to
be effective for the period necessary to achieve its purposes or for 9&
days, whichever is less. In the Committee's view 90 days is the maxi-
mum length of time during which a surveillance of these persons or
entities for foreign intelligence purposes should continue without new
judicial scrutiny. This period of time is not as long as some have
wished but longer than others desired. It is considered to be a reason-
able condition in the foreign intelligence context.53
When the special class of "official" foreign powers is targeted, how-
ever, the surveillance may last as long as one year. Moreover, the
Executive determines the necessary length of the surveillance of these
special foreign powers (not to exceed one year without re authorize
tion), and this determination is not subject to the cour's review or
approval. As already indicated, this is a substantial change from
S. 3197 which has provoked widespread criticism from some members
of the Committee. The Administration, however, offers considerable
arguments for the change: First, the determination that an entity is
within the definition of Section 2521(b) (1) (A), (B), or (C) is not
likely to be erroneous. Unlike a person suspected of being a foreign
agent, whether an entity fits one of the. three special classes of foreign
powers--such as a foreign embassy or consulate-will usually be self-
evident. Second, the likelihood of obtaining valuable foreign intel-
ligence information from these entities is very high. Third, surveil-
lance against such official powers, because of their continuing presence
in the United States, is likely to be required for much longer periods
of time. Although such surveillance could be accomplished by succes-
sive 90 day court renewals, the. Administration cites the generation of
four times the amount of required paperwork with the attendant in-
creased possibility of a compromise as well as the administrative bur-
den which would' result, as reasons for exempting these foreign powers.
from the 90 day limitation. Given these considerations and the unique
status of the targets involved, the Administration feels that one year
is not an excessive period of time..
Others disagree, maintaining that excessive paperwork and adm inis-
trative inconvenience are not sufficient reasons to extend such surveil-
lance to as long as one year without judicial approval (and with the
possibility that the Attorney General will. not even personally be
reviewing the foreign power warrant application). Nevertheless, the.
13 United States V.. United States District Court, 407 U.S. 297 at 323 (1972) ).
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/1I/123 : CIA-RDP80S01268A000500040008-7
Committee has acceded to the Administration's position and has
granted the change from S. 3197 in the limited situation of special
foreign powers as defined in section 2521(b) (1) (A), (B), or (C).
In coming to this conclusion, however, the Committee emphasizes
that, in order for United States citizens to be adequately protected in
such cases, this provision must not be interpreted to bar judicial review
of the effectiveness of the minimization procedures. United States
citizens may be overheard talking to employees of such a "special"
foreigai power. As already indicated, the court has the power to review
minimization during the course of the surveillance as it does now under
Chapter 119. This applies regardless of the type of target and remains
an important protection.
As under chapter 119. extensions of an order may be sought and
granted on the same basis as the original order. A new application,
including a new certification pursuant to section 2524(a) (7), would
therefore be required, updating the information previously provided.
Before the extension should be granted, however, the court would
again have to find probable cause that the target is a foreign power
or its agent. To aid the judge in making this determination anew, it is
expected that the court would evaluate the success or failure of any
previous surveillances and the facts and circumstances surrounding
such surveillance. The court, however, in considering t renewal involv-
ing a foreign power as defined in section 2521(b) (1) (A), (B), or (C),
cannot order the government to submit any information actually ob-
tained as a result of the original surveillance or previous extension.
This change from S. 3197 was made at the request of the Administra-
tion and reflects its concern with the sensitive nature of the information
obtained from special foreign powers.
Subsection (d) authorizes the Attorney General to approve an emer-
gency electronic surveillance prior to judicial authorization under cer-
tain limited circumstances. First, the Attorney General must deter-
mine that an emergency situation exists which requires the employ-
ment of electronic surveillance before an order authorizing such sur-
veillance can with due diligence be obtained. In addition, the factual
basis for the issuance of an order under this chapter must be present.
The procedures under which such an emergency surveillance is au-
thorized are considerably stricter than those of the comparable pro-
vision in chapter 119, 18 U.S.C. section 2518(7). First, only the Attor-
ney General (as defined) may authorize such emergency surveillance,
whereas in 18 U.S.C. section 2518 (7) the Attorney General may des-
ignate "any investigative or law enforcement officer" to authorize emer-
gency interceptions under that subsection. Second. the Attorney Gen
eral ~or his designee must contemporaneously notify oneof the desig-
nated judges that an emergency surveillance has been authorized.
There is no comparable requirement in 18 U.S.C. section 2518(7).
Third, an application for an order approvine? the surveillance must be
made to that judge within 24 hours; 18 U.S.C. section 2518 (7) requires
the application to be made within 48 hours. Fourth, -the emergency
surveillance cannot continue beyond 24 hours without the issuance of
an order; under 18 U.S.C. section 2418 (7) the emergency surveillance
may continue indefinitely until the judge denies the application. Fifth,
the Attorney General must order that minimization procedures re-
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
52
quived by this chapter for the issuance of a judicial order be followed
during the period of the emergency surveillance. There is no compa-
rable provision under 18 U.S.C. section 2518(7). This last provision is
designed to ensure that as much as possible be done to eliminate the ac-
quisition, retention and dissemination of information which is not
foreign intelligence information. The Committee's intent is to place
the Attorney General in the role of the court during the 24 hour emer-
gency period. He must examine the minimization procedures as the
court would normally do under paragraph (a) (4) of this section, and
order that the appropriate procedures be followed just as if lie were the
court granting a judicial order.
The committee wishes to emphasize that the application must be
made for judicial approval even if the surveillance is terminated within
the, twenty-four hour period and regardless of whether the information
sou ht. is obtained. This requirement ensures that all. emergency sur-
veillance initiated pursuant to this chapter will receive judicial review
and that judicial approval or denial will be forthcoznin'? nwnc pro tune.
Thus, the termination of an emergency surveillance before the expira-
tion of the twenty-four hour period shall not be a basis for the court
failing to enter an order approving or disapproving the subsequent ap-
plication. It is necessary for both the Department of Justice and Con-
g?ressional oversight committees to have available a complete record
both of the bases for such emergency surveillance authorization and of
the judicial. determinations of their legality under the statutory stand-
ard.
This provision for emergency authorization of surveillance by the
Attorney General may not be utilized pending an appeal under section
252 3, following the denial of an application fora judicial order. Under
such circumstances, the Attorney General could not reasonably deter-
mine that "the factual basis for the issuance of an order under this
chapter to approve such surveillance exists," as required by this sub-
section.
If the application is subsequently denied, or if the surveillance is
terminated without an order eventually being sought (which, as al-
ready indicated, would constitute an unlawful act under this sub-
section), no information obtained or evidence derived from the sur-
veillance shall be received, used or disclosed by the Government in
any trial hearing or other proceeding before any court, grand jury, de
partment, office, agency, regulatory body, legislative committee or
other Federal, State or local authority. This exclusionary provision is
designed to be absolute.
A denial of the application may be reviewed in the same manner as
a denial of an original application under section 2523.
Section 2526
This section sets forth the permissible uses which may be made of
information acquired by means of electronic surveillance conducted
pursuant to this chapter. The fact that effective minimization may be
more difficult in the foreign intelligence area than in the more tradi-
tional criminal area, and that this chapter contains certain less restric-
tive procedures than does chapter 119 (for example. 90 days of sur-
veillance per order rather than 30 days). mandates that the uses to be
made of the information acquired by means of this chapter be care-
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
53
fully restricted. This section, therefore, places more stringent restric-
tions on use and dissemination than does the corresponding provision
of Title III1 18 U.S.C. 2517. The extent to which the Government
should be required to surrender to the parties in a criminal trial the
underlying documentation used to justify electronic surveillance raises
delicate problems and competing interests. On the one hand, broad
rights of access to the documentation and subsequent intelligence in-
formation can threaten the secrecy necessary to effective intelligence
practices. IIotivever, the defendant's constitutional guarantee of a fair
trial could seriously be undercut if he is denied the materials needed to
present a proper defense. The Committee believes that a just, effective
balance has been struck in this section.
Subsection (a) requires that information concerning United States
persons acquired from electronic surveillance conducted pursuant to
this chapter may be used by Federal officers and employees only for
purposes relating to the ability of the United States to protect itself
against actual or potential attack or other grave hostile acts of a for-
eign power or foreign agent; to provide for the national defense or
security of the nation; to provide for the conduct of foreign affairs; to
protect against the terrorist or sabotage activities of a foreign power
or an agent of a foreign power; to protect against the clandestine intel-
ligence activities of an intelligence service or network of a foreign
power or an agent of a foreign power; or for the enforcement of the
criminal law. Thus the lawful uses of foreign intelligence informa-
tion concerning United States citizens and resident aliens gathered
pursuant to this chapter are carefully restricted to actual foreign in-
telligence purposes and the enforcement of the criminal law.
A major change from S. 3197 has, however, been made in this sec-
tion at the insistence of the Administration. Whereas in S. 3197 this
section applied to all persons, whether or not they were American
citizens, S. 1566 limits the protections of section 2526 (a) to United
States persons. Information concerning non-United States persons
(who indeed may be foreigners not even in the United States)) is not
subject to the same restrictions as information concerning TTnited
States persons. For example, the information obtained might be
used to deport an illegal alien even though such use of the information
is not for foreign intelligence purposes and is not for the purpose of
enforcing the criminal law.
This differentiation between United States persons and other persons
was sufficiently troublesome to the Committee to result in an im-
portant amendment to section 2526(a). By limiting the subsection
to United States persons, the possibility existed that information ob-
tained by surveillance could be used in a variety of illegal ways against,
for example, foreign visitors and students. The Committee has amended
this subsection to make clear that no information acquired pursuant
to this chapter may be used or disclosed for other than "lawful pur-
poses". The committee does not intend nor does the bill permit that
information gathered about a foreign. visitor be used to blackmail him
into t)ecornine' an agent against his country. S. 1566, as amended, now
requires that in those cases where the government wishes to use foreign
intelligence information against non-United States persons, beyond
the specific purposes listed in section 2526(a), it do so in a lawful
manner and for lawful purposes.
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
There is no specific restriction in the bill as to whom Federal officers
may disclose information concerning United States persons acquired
pursuant to this chapter (although specific minimization procedures
might require specific restrictions in particular cases). First, the Com-
mittee believes that dissemination should be permitted to state and
local law enforcement officials. If Federal agents monitoring a foreign
intelligence surveillance authorized under this chapter were to over-
hear information relating to a violation of state criminal law, such as
homicide, the agents could hardly be expected to conceal such infor-
mation from the appropriate local officials. Second, the Committee can
conceive of situations where disclosure should be made outside of
government channels. For example, Federal agents may learn of a
terrorist plot to kidnap a business executive. Certainly in such cases
they should be permitted to disclose such information to the execu-
tive and his company in order to provide for the executive's security.
Finally, the Committee believes that foreign intelligence information
relating to crimes, espionage activities, or the acts and intentions of
foreign powers may, in some circumstances, be appropriately dissemi-
nated to cooperating intelligence services of other nations. So long as
all the procedures of this chapter are followed by the Federal officers,
including minimization and the limitations on dissemination, this
cooperative relationship should not be terminated by a blanket prohi-
bition on dissemination to foreign intelligence services. The Com-
mittee wishes to stress, however, that any such dissemination be care-
fully reviewed to ensure that there is a sufficient reason why disclosure
to foreign intelligence services :is in the interests of the United States.
Disclosure, in compelling circumstances, to local officials for the
purpose of enforcing the criminal law, and to foreign intelligence
services under the circumstances described above are generally the
only exceptions to the rule that dissemination should be limited to
Federal officials.
It is recognized that these strict requirements only apply to infor-
mation known to concern United States persons. Where the infor-
mation in the communication is encoded or otherwise not known to
concern United States persons, only the requirement that the infor-
mation be disclosed for lawful purposes applies. There is no require-
ment that before disclosure can be made information be decoded or
otherwise processed to determine whether information concerning
United States persons is indeed. present. Of course, the restrictions
on use and disclosure apply to the entire Government, so that if any
agency received coded information from the intercepting agency, were
it to break the code, the limitations on use and disclosure would apply
to it.
Section 2526(a) also states that foreign intelligence information
obtained may be used to enforce the criminal law "if its use outweighs
the possible harm to the national security." This new language, which
did not appear in S. 3197, states the obvious. The Department of Justice
always has the option of deciding whether to proceed with a criminal
prosecution or forego it in the interests of national security. For
example, the Department of Justice may decline to prosecute rather
than disclose the names of important witnesses and key informants.
Whether to go forward with a criminal prosecution remains in
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
the exclusive hands of the Executive Branch and nothing in section
2526(a) changes that fact.
This subsection also notes that no otherwise privileged communica-
tion obtained in accordance with or in violation of this chapter shall
lose its privileged character. This provision is identical to 18 U.S.C.
2517 (4) and is designed, like its Title III predecessor, to change, exist-
ing law as to the scope and existence of privileged communications only
to the extent that it provides that otherwise privileged communica-
tions do not lose their privileged character because they are intercepted
by a person not a party to the conversation.
Subsection (b) must be read in conjunction with the minimization
requirements of section 2521(b) (8) and with the preceding subsec-
tion (a). As previously noted, the minimization procedures mandated
by the court are designed to restrict the acquisition of information
obtained by means of electronic surveillance to information re-
lated to foreign intelligence. However, even the most thorough minimi-
zation efforts may result in the acquisition of some information which
is not foreign intelligence information. This subsection states that such
incidentally acquired information which is evidence of a crime may
be retained and disclosed for law enforcement purposes. Such disclos-
ure would, of course, be restricted by the provisions of subsection (a).
The requirement that such criminal evidence be acquired inciden-
tally logically connotes that it must be acquired lawfully. This requires
that there be a good faith effort to minimize."
Thus for example, if monitoring agents choose to disregard the
minimization standards and thereby acquire evidence of a crime
against an overheard party whose conversation properly should have
been minimized, that evidence would be acquired in violation of this
chapter and would properly be suppressed if offered at any official
proceeding.
Disclosure for law enforcement purposes must be accompanied by a
statement that such evidence, or any information derived therefrom,
may only be used in a criminal proceeding with the advance authoriza-
tion of the Attorney General. This provision is designed to eliminate
circumstances in which a local prosecutor has no knowledge that evi-
dence was obtained through foreign intelligence electronic surveil-
lance. In granting approval of the use of the evidence the Attorney
General would alert the prosecutor to the surveillance and he, in turn,
would alert the court in accordance with subsection (c).
Subsections (c), (d) and (e) set forth the procedures under the bill
whereby information acquired by means of electronic surveillance
may be received in evidence or otherwise used or disclosed in any trial,
hearing or other Federal or State proceeding. Although the primary
purpose of electronic surveillance conducted pursuant to this chapter
will not be the gathering of criminal evidence, it is contemplated
that such evidence will be acquired and this subsection and the succeed-
ing one establish the procedural mechanisms by which such informa-
tion may be used in formal proceedings.
At the outset the committee recognizes that nothing in subsection
{c) abrogates the rights afforded a criminal defendant under Brady v.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Marylancd,55 and the Jencks Act.", These legal principles inhere in
any such proceeding and are wholly consistent with the procedures
detailed here. Furthermore, nothing contained in this section is in-
tended to alter the traditional principle that the Government cannot
use material at trial against a criminal defendant, and then withhold
from him such material at trial.5'
Subsection (c) states that no information acquired pursuant to
this chapter may be used unless, prior to the trial, hearing, or other
proceeding, or at a reasonable time prior to an effort to disclose the
information or submit, it in evidence, the government notifies the court.
that such information was acquired by means of electronic surveil
lance conducted pursuant to this chapter. This provision has been
broadened in S. 1566 over its counterpart in S. 3197 by including non-
judicial proceedings. In instan'=es in which the government intends to
disclose surveillance information in such a non-judicial forum, sub-
section (c) would require that the United States district court in the
district in which the disclosure is to take place be notified of the
proposed disclosure or use.
Subsection (d) parallels 18 U.S.C. 2518(10) (a) and provides a.
separate statutory vehicle by which a person who has been a subject
of electronic surveillance and ? against whom. evidence derived there-
from is to be or has been introduced or otherwise used or disclosed in
any trial, hearing or proceeding may move to suppress the contents of
any communication acquired by, or evidence derived from, such elec-
tronic surveillance. The grounds for such a motion would be that (a)
the communication was unlawfully acquired, or (b) the surveillance.
was not made in conformity with the order of authorization or
approval.
The "subject" of electronie surveillance means an individual who.
was a party to the intercepted communication or was a person against
whom the interception was directed. Thus the word is defined to coin-
cide with the definition of "aggrieved person" in section 2510 of title
I11.'11
One situation in which such a motion might be presented would be
that in which the court orders disclosed to the party the court order
and accompanying application under subsection (e) prior to ruling
on the legality of the surveillance. Such motion would also be appro-
priate, however, even after the court's finding of legality if, in subse-
quent trial testimony, a Government witness provides evidence that
the. electronic surveillance may have been authorized or conducted in
violation of the court order. The most common circumstance in which
such a motion might be appropriate would be a situation in which a,
defendant queries the government under 18 U.S.C. 3504 and discovers
that he has been intercepted by electronic surveillance even before
the government has decided whether evidence derived from that sur-
veillance will be used in the presentation of its case. In this instance,
under the appropriate factual circumstances, the defendant might
move to suppress such evidence under this subsection even without hav-
ing seen any of the underlying documentation.
5 373 U.S. 83 (1963).
10 IS U.S.C. 3500 at seq.
R7 fTn. trd States V. Andolsehek, 142 P. 25 503 (2nd Car. 1944).
M See also. Alderman v. United States, 394 'U.S. 165 (1967).
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11 f3 : CIA-RDP80S01268A000500040008-7
A motion under this subsection shall be made before the trial, hear-
ing, or proceeding unless there was no opportunity to make such motion
or the movant was not aware of the grounds for the motion. the only
change in subsection (d) from S. 3197 is to remove as a separate, inde-
pendent basis for suppression the fact that the order was insufficient
on its face. This is not a substantive change, however, since communi-
cations acquired pursuant to an order insufficient on its face would be
unlawfully acquired and therefore subject to suppression under para-
graph (1).
Subsection (e) states in detail the procedure the court shall follow
when it receives a notification under subsection (c) or a suppression
motion is filed under subsection (d). This procedure applies, for ex-
ample, whenever an individual makes a motion pursuant to subsection
(d) or 18 U.S.C. 3504, or any other statute or rule of the United States
to discover, obtain or suppress evidence or information obtained or
derived from electronic surveillance conducted pursuant to this chap-
ter (for example., Rule 12 of the Federal Rules of Criminal Procedure).
Although a number of different procedures might be used to attack the
legality of the surveillance, it is this procedure "notwithstanding any
other law" that must be used to resolve the question. The Committee
wishes to make very clear that the procedures set out in subsection (e)
apply whatever the underlying rule or statute referred to in the mo-
tion. This is necessary to prevent the carefully drawn procedures in
subsection (e) from being bypassed by the inventive litigant using a
new statute, rule or judicial construction.
The special procedures in subsection (e) cannot be invoked until
they are triggered by a Government affidavit that disclosure or an
adversary hearing would harm the national security of the United
States. If no such assertion is made, the Committee envisions that
mandatory disclosure of the application and order, and discretionary
disclosure of other surveillance materials, would be made to the de-
fendant, as is required under Title III.-59 When the procedure is so
triggered, however, the Government must make available to the court
a copy of the court order and accompanying application upon which
the. surveillance was based.
The court must then conduct an ex parte, in camera inspection of
these materials as well as any other documents which the Government
may be ordered to provide, to determine whether the surveillance was
authorized and conducted in a manner which did not violate any con-
stitutional or statutory right of the person against whom the evidence
is sought to be introduced. The subsection further provides that in
making such a determination, the court may order disclosed to the
person against whom the evidence is to be introduced the court order or
accompanying application, or portions thereof, or other materials re-
lating to the surveillance, only if it finds that such disclosure is neces-
sary to make arm accurate determination of the legality of the sur-
veillance. Thus, this subsection deals with the procedure to be followed
by the trial court in determining the legality (or illegality) of the sur-
veillance.
The question of how to determine the legality of an electronic :cur-
veilanee. conducted for forek n intelligence purposes has never been
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CI-RDP80SO1268A000500040008-7
decided by the Supreme Court. As Justice Stewart noted in his con-
curring opinion in Giordano v. United States, "Moreover, we did not
in Alderman, Butenko or Ivanov, and we do not today, specify the pro-
cedure that the District Courts are to follow in making this prelimi-
nary determination [of legality.]" 394 U.S. 310, 314 (1968) ; see also,.
Taglianetti v. United States, 394: U.S. 316 (1968). The committee views
the procedures set forth in this subsection as striking a reasonable bal-
ance between an entirely in camera proceeding which might adversely
affect the defendant's ability to defend himself, and mandatory dis-
closure, which might occasionally result in the wholesale revelation of
sensitive foreign intelligence information.
The decision whether it is necessary to order disclosure to a person
is for the court to make after reviewing the underlying documentation
and determining its volume, scope and complexity. The committee has
noted the reasoned discussion of these matters in the opinion of the
Court in United States v. Butenko, supra. There, the court, faced with
the difficult problem of determining what standard to follow in balanc-
ing national security interests with the right to a fair trial stated :
The distinguished district court judge reviewed in camera
the records of the wiretaps at issue here before holding the
surveillances to be legal ... Since the question confronting
the district court as to the second set of interceptions was the
legality of the taps, not the existence of tainted evidence, it
was within his discretion to grant or to deny Ivanov's request
for disclosure and a hearing. The exercise of this discretion
is to be guided by an evaluation of the complexity of the
factors to be considered by the court and by the likelihood
that adversary presentation would substantially promote a
more accurate decision. (494 F. 2d at 607)
Thus, in some cases, the court will likely be able to determine the
legality of the surveillance without any disclosure to the defendant.
In other cases, however, the question may be more complex because
of, for example, indications of possible misrepresentation of fact,,
vague identification of the persons to be surveilled or surveillance
records which includes a significant amount of non.foreign intelligence
information, calling into question compliance with the minimization
standards contained in the order. In such cases, the committee con-
templates that the court will likely decide to order disclosure to the
defendant, in whole or in part since such disclosure "is necessary to
make an accurate determination of the legality of the surveillance."
Cases may arise, of course, where the court believes that disclosure
is necessary to make an accurate determination of legality, but the
Government argues that to do so, even given the court's broad dis-
cretionary power to excise certain sensitive portions, would damage
the national security. In such situations the Government must choose-
either disclose the material or forego the use of the surveillance-based
evidence. Indeed, if the Government objects to the disclosure, thus
preventing a proper adjudication of legality, the prosecution would
B0 Cf. Alderman v. United States, 394 U.S. 165, 182 n. 14 (1968) ; Taglianetti v. United
States, supra at 817.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23q CIA-RDP80S01268A000500040008-7
probably have to be dismissed, and, where the court determines that
the surveillance was unlawfully authorized or conducted, the court
would, "in accordance with the requirements of law," suppress that
evidence which was unlawfully obtained.61
Where the court determines that the surveillance was lawfully
authorized and conducted, it would, of course, deny any motion to
suppress. In addition, the Committee emphasizes that, once a judicial
determination is made that the surveillance was lawful, a motion for
discovery of evidence must be denied unless disclosure or discovery is
required by the requirements of due process.
Subsection (f) provides for notice to be served on United States
citizens and permanent resident aliens who were targets of an emer-
gency surveillance and, in the judge's discretion, on other citizens and
resident aliens who are incidentally overheard, where a judge denies
an application for an order approving an emergency electronic sur-
veillance. Such notice shall be limited to the fact that an application
was made, the period of the emergency surveillance, and the fact that
during the period information was or was not obtained. This notice
may be postponed for a period of up to ninety days upon a showing of
good cause to the judge. Thereafter the judge may forego the require-
ment of notice upon a second showing of good cause.
The fact which triggers the notice requirement-the failure to obtain
approval of an emergency surveillance-need not be based on a deter-
mination by the court that the target is not an agent of a foreign power
engaged in clandestine intelligence activities, sabotage, or terrorist
activities or a person aiding such agent. Failure to secure a warrant
could be based on a number of other factors, such as an improper
certification. A requirement of notice in all cases would have the
potential of compromising the fact that the Government had focused
an investigation on the target. Even where the target is not, in fact,
an agent of a foreign power, giving notice to the person may result in
compromising an on-going foreign intelligence investigation because
of the logical inferences a foreign intelligence service might draw
from the targeting of the individual. For these reasons, the Govern-
81 The Committee has deliberately chosen the general phrase "in accordance with the
requirements of law" to avoid dealing with the very complex problem of what procedures
are to be followed in those cases where the trial court determines that the surveillance
was either unlawfully authorized or conducted or the Government's refusal to disclose
the underlying documentation to the defendant prevents the court from making that deter-
mination. The evidence obtained would not, of course, be admissible during the trial. But
beyond this is the question of whether, in the case of an illegal surveillance. the
Government is cons titutionallv mandated to surrender to the defendant all the records of
the surveillance in its possession in order for the defendant to make an intelligent motion
on the question of taint. The Supreme Court opinion in Alderman v. United States, supra.,
clearly answers this question in the affirmative. In the Alderman case, the Court held that,
once a defendant claiming evidence against him was the fruit of unconstitutional electronic
surveillance has established the illegality of such surveillance (and his "standing" to
object), he must be given confidential materials in the Government's flies to assist him in
establishing the existence of "taint." The Court rejected the Government's contention that
the trial court could be permitted to screen the files in camera and give the defendant only
material which was "arguably relevant" to his claim, saying such screening would be suffi-
ciently subject to error to interfere with the effectiveness of adversary litigation of the
question of "taint."
Alderman, however, was a pre-title III case (which, in section 2518(10) (a) confers dis-
cretion on the court to deal with the issue of "taint" in "the interest of justice") and both
this committee and the Department of Justice have maintained that Alderman was an exer-
cise of the Supreme Courts supervisory jurisdiction over the lower federal courts and not
a constitutional interpretation. Senate Committee on the Judiciary, S. Rept. 91-617, Orga-
nized Crime Control Act of 1970, 91st Conc., 2d seas., 64-70. (1970). However, the Supreme
Court has refused to reconsider the Alderman rule and, in fact, reasserted its validity in
its Keith decision. (United States v. United States District Court, supra, at 393.)
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 t?PIA-RDP80S01268A000500040008-7
went is given the opportunity to present its case to the judge for initi.-
ally postponing notice. After ninety days, during which time the
Government may be able to gather more facts, the Government may
seek the elimination of the notice requirement altogether.
It is the intent of the Committee that if the Government can ini-
tially show that there is a reason to believe that notice might compro-
mise an ongoing investigation, or confidential sources or methods,
notice should be postponed. Thereafter, if the Government can show
a likelihood that notice would compromise an ongoing investigation,
or confidential sources or methods, notice should not be given.
Section 2527
Section 2527 requires the submission of annual reports to both the
Congress and the Administrative Office of the United States Courts
containing statistical information relating to electronic surveillance
under this chapter. Specifically, the reports must include the total
number of applications made for orders and extensions and the total
number of orders or extensions granted, modified, and denied. The
statistics in these reports should present a quantitative indication of
the extent to which surveillance under this chapter are used.
The requirements in S. 3197 for the public reporting of certain ad-
ditional statistics have been altered due to the introduction in S. 1566
of two different types of warrant (creating a 90 day warrant for
one class of target, and a one year warrant for "official" foreign pow-
ers). The reporting requirements in S. 3197, if reenacted verbatim in
S. 1,566, would obviously give foreign intelligence networks significant
information concerning the number and duration of surveillances of
"official" foreign powers. Changes have been made, therefore, in the
public reporting requirements of S. 3197 so as to avoid the compro-
mising of sensitive information.
The statistics reported pursuant to this section will provide a
basis for further inquiry by appropriate oversight committees of the
Congress.
Such congressional oversight is particularly important in monitor-
ing the operation of this statute. By its very nature foreign intelligence
surveillance must be conducted in secret. This bill reflects the need
for such secrecy; judicial review is limited to a select panel and
routine notice to the target is avoided. In addition, unlike the statutory
scheme in Title III, it is not contemplated that most electronic sur-
veillance conducted pursuant to this chapter will result in criminal
prosecution.
For these reasons, the Committee believes it important that con-
gressional oversight play an important role in the proper imple-
mentation of the statute. In that regard section 2527 must be read
in the context of other congressional enactments mandating intelli-
gence oversight 62 This Committee contemplates that the Department
of Justice and intelligence agencies will provide such information
to those committees as is required by their independent oversight
mandate. Indeed, it is expected that some form of Congressional over-
sight will be written into S. 1566 itself by the Senate Intelligence
Committee when the bill is referred to that Committee. Such over-
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/1 W3 : CIA-RDP80S01268A000500040008-7
sight would be seriously hampered if congressional committees were
denied access to the information found in the application record, such
as the underlying affidavits and documentation, requests for exten-
sions, the appeal record, orders and decisions of the court.
In addition, in the exercise of its oversight function, the Senate
Committee on the Judiciary shall consult with members of the De-
partment of Justice and the intelligence community concerning the
proper implementation of the act.
Section 3
Section 3 delays the effective date of the act until 90 days following
the designation of the first judge pursuant to section 2523 of this
chapter. The purpose of this delay is to allow time for the development
of the applications required under this bill and of security measures
governing the subrmssion of these applications to the courts. The 90
day delay will also prevent the situation where one judge will be forced
to handle all of the applications.
Section 4 serves the important purpose of integrating the new chap-
ter 120 with the current electronic surveillance law found ill chapter
119 of title 18, United States Code. Various provisions of chapter 119
are applicable to the electronic surveillance engaged in under the new
bill and the conforming amendments in this section of S. 1566 are
designed to make changes reflecting this fact. In addition, where cer-
tain provisions of chapter 119 should not encompass the surveillance
procedures in S. 1566, conforming amendments so limit such sections :
(a) (1) and (2). These amendments are designed to establish the
same criminal penalties for violations of this chapter as apply to vio-
lations of chapter 119. As amended, these sections will make it a crimi-
nal offense to engage in electronic surveillance except as otherwise
specifically provided in chapters 119 and 120. This amendment also
provides, however, that "with respect to techniques used by law en-
forcement officers" which do not involve the actual interception of
wire or oral communications, yet do fall within the literal definition
of electronic surveillance in Chapter 120--such as the use of a pen
register-the procedures of chapter 120 do not apply. In such cases
criminal penalties will not attach simply because the government fails
to follow the procedures in chapter 120 (such penalties may, of course,
attach if the surveillance is commenced without a search warrant or
in violation of a court order.) In all cases involving electronic sur-
veillance for the purpose of obtaining foreign intelligence informa-
tion, however, the prohibitions of 18 U.S.C. 2511 would apply.
(a) (3), (4), (5), and (6). These amendments make clear that the
prohibitions in chapter 119 concerning disclosure and use of informa-
tion, obtained through the interception of wire or oral communica-
tions in sections 2511(1) (c) and (d), also apply to disclosure and
use of information obtained through electronic surveillance as defined
in chapter 120.
The statute calls for a fine of not more than $10,000 or imprison-
ment for not more than five years, or both, for each violation.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
62
(b) (1) This amendment adds radio communication to wire com-
'munication and extends the meaning of intercept to include "or other-
wise acquire" in section 2511(2) (a) (i), which permits communication
common carriers to engage in certain activities.
(h) (2) This amendment, when read in conjunction with section
2525(b) (2) (B), makes explicit the fact that a court order obtained
under chapter 120 may direct an officer, employee or agent of a com-
munication common carrier to provide certain assistance to the gov-
ernment agents implementing the order. The nature and scope of
such assistance is intended to be identical to that which may be directed
under section 2518 (4) (e) of chapter 119. The amendment further
provides that before the carrier may provide such information or as-
sistance, whether under chapter 119 or 120, the government agent
must furnish the carrier with an order signed by the court (but not
necessarily the same order as authorizes the actual surveillance) if an
order has been acquired, or a sworn statement by the agent that all
statutory requirements have been met if the surveillance is being con-
ducted pursuant to the provisions of section 2518(7) of chapter 119
or sections 2525 (d) of chapter 120. The document so furnished must
also set forth the period of time for which the surveillance is author-
ized and a description of the facilities from which the communication
is to be intercepted. Any violation of this subsection by a carrier or its
representative will render the carrier liable for the civil damages pro-
vided for in section 2520, subject, of course, to the good faith reliance
defense contained therein.
(c) (1) This amendment makes explicit that an employee of the
Federal Communications Commission may engage in electronic sur-
veillance as well as intercept a wire or oral communication in the dis-
charge of monitoring responsibilities exercised by the Commission.
(c) (2) This amendment makes clear that it is 'legal to engage in
electronic surveillance, as well as intercept a wire or oral communica-
tion, if a party consents.
(c) (3) This amendment: (1) provides statutory authorization for
the government to conduct tests of equipment which may result in
electronic surveillance as defined in section '2521(b) (6) , (2) author-
izes the conduct of "sweeps" to discover illegal taps and bugs, which
"sweeps" may result in "electronic surveillance" as defined in section
2521. (b) (6) ; and (3), makes explicit that chapter 119 and 120 are the
"exclusive means by which electronic surveillance, as defined in Sec-
tion 2521(b) (6) of chapter 120, and the interception of domestic wire
and oral communications may be conducted."
All tests conducted pursuant to this provision must be in the normal
course of official business by the government agent conducting the
test and must be designed solely for determining the capability of
equipment used for foreign intelligence gathering purposes. In addi-
tion, the test period shall be limited to that necessary to determine
such capability and shall in no instance exceed ninety days without the
-express approval of the Attorney General. The contents of any com-
munication acquired as a result of the test shall be disclosed only to
those officials conducting the test and shall be used and retained by
them only for the purpose of the test. At the completion of the testing
period, the contents so acquired shall be destroyed.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/231j3CIA-RDP80S01268A000500040008-7
The Committee contemplates that in all cases such testing will be
approved by a senior official prior to the commencement of the testing
period.
"Sweeps" to discover the existence and capability of electronic sur-
veillance equipment in violation of 18 U.S.C. section 2511 or 47 U.S.C.
section 605 do not have a specific time limit, but are limited in time to
that "necessary to determine the existence and capability of such
equipment".
The Department of Defense, in a letter to the Committee, has char-
acterized these activities as follows:
These activities, commonly called technical surveillance
countermeasures surveys, are for the purpose of determining
if a particular sensitive area has been penetrated by electronic
surveillance devices installed by a foreign power or other hos-
tile forces. In some cases, these surveys are conducted on a
continuous basis. Since these activities are strictly defensive
in nature and are for the sole purpose of detecting and
neutralizing the illegal efforts of hostile powers, a time limit
does not seem appropriate.
Information acquired pursuant to such "sweeps" may be used only
to enforce chapter 119 or section 605 of the Communications Act of
1934 or to protect information from being subject to unlawful elec-
tronic surveillance. The provision is not an authorization to target a
person known to be, or suspected of, engaging in unlawful electronic
surveillance, even where the purpose is to determine the existence and
capability of that person's electronic surveillance equipment. If the
person engaged in the unlawful electronic surveillance is an agent of
a foreign power, he should be targeted under t statutory
he applicable provisions
of chapter 120. This provision is designed to confer authority
on the Government's effort to locate and analyze unlawful electronic
surveillance activity.
A new paragraph (f) is added to section 2511(2) by this conform-
ing amendment, which must be read in conjunction with the conform-
ing amendment contained in paragraph (d) which repeals section
2511(3) of Title 18, United States Code, the so-called "National Seeu-
rity disclaimer" of Title III of the 1968 Omnibus Crime Control and
Safe Streets Act. The effect of these two conforming amendments is to
establish Chapter 120 as the exclusive congressional statement on the
question of the Executive's power to order electronic surveillance.
This new paragraph states that nothing in chapter 119 or section
605 of the Communications Act of 1934 shall be deemed to affect the
acquisition of foreign intelligence information. by a means other than
electronic surveillance, as defined in chapter 120. The purpose of this
prefactory phrase is twofold. First, it sets forth the sections of the
United States Code which regulate the procedures by which electronic
surveillance may be conducted within the United States and the statu-
tory controls for the use and dissemination of information so acquired.
If enacted, this chapter will constitute the sole and exclusive statutory
authority under which electronic surveillance of a foreign power or its
agent to obtain foreign intelligence information may be conducted
within the United States. It will complement chapter 119, which deals
with electronic surveillance for law enforcement purposes and section
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
64
605 of the Communications Act of 1934, as amended, which restricts the
dissemination of certain information transmitted by wire or radio.
Second, the language of this amendment exempts from section 605
and chapter 119 foreign intelligence gathering by means of an elec-
tronic, mechanical or other surveillance device if the acquisition does
not come within the definition of "electronic surveillance" contained in
section 2521(b) (6). Specifically, this provision is designed to make
clear that the legislation does not deal with international signals intel-
ligence activities as currently engaged in by the National Security
Agency and electronic surveillance conducted outside the United
States. As to methods of acquisition which come within the definition
of "electronic surveillance" in this bill, the Congress has declared that
this statute, not any claimed presidential. power, controls.
The activities of the National Security .Agency pose particularly dif-
ficult conceptual and technical problems which are not dealt with in
this legislation. Although many on the Committee are of the opinion
that it is desirable to enact legislative safeguards for such activity, the
committee. adopts the view expressed by the Attorney General during
the hearings that enacting statutory controls to regulate the National
Security Agency and the surveillance of Americans abroad raises prob-
lems best left to separate legislation.?' This language insures that cer-
tain electronic, surveillance activities targeted against. international
communications for foreign intelligence, purposes will not be pro-
hibited absolutely during the interim period when these activities are
not regulated by chapter 120 and charters for intelligence agencies and
legislation regulating international.. electronic surveillance have not
vet. been developed.
Paragraph (f) continues by stating that with respect to electronic
surveillance, as defined in. Section 2521(b).(6), and the interception of
domestic wire and oral communications, the procedures of chapter 119
and chapter 120 shall be the "exclusive means by which electronic sur-
veillance . . . may be . . . conducted." This statement puts to rest
the notion that Congress recognizes an inherent Presidential power to
conduct such surveillances in the United States outside of the proce-
dures contained in chapters 119 and 120.
It is clear that the Supreme Court has recognized that Congress
may legislate in areas, where, absent such legislation, a constitutional
power of the executive may be found to exist. Youngstown Sheet and
Tube v. Sawyer, 343 U.S. 579 (1952). In that landmark case the Su-
preme Court rejected President Truman's argument that he had in-
herent constitutional authority to seize the steel mills to prevent strilkes
and insure continued steel production needed for the war effort. The
decision was influenced in large measure by the fact that Congress,
by passing the Taft-Hartley Act, had explicitly rejected seizure of the
steel mills and enacted a legislative alternative to curb labor unrest.
In his concurring opinion Justice Jackson wrote :
When a President takes measures incompatible with the
express or implied a ill of Congress, his power is at the low-
est ebb, for then he can rely only upon his own constitutional
power minus any Constitutional power of Congress over the
-For a discussion of NSA activities and proposed legislative controls, see II Church
committee 58-00, 108 and 308-311. The problems posed by electronic surveillance of
Americans overseas can be found at pages 305 and 306; see, also III Church committee
7:13, et seq.
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/2: CIA-RDP80S01268A000500040008-7
matter. Courts can sustain exclusive presidential control in
such a case only by disabling the Congress from acting upon
the subject. (343 U.S. at 637.)
(d) This amendment repeals section 2511(3) of chapter 119
eliminating any congressional recognition or suggestion of inherent.
Presidential power with respect to electronic surveillance.
(e) This amendment brings any electronic surveillance as defined in
chapter 120 under the same statutory exclusionary rule as applies to
chapter 119. This section imposes an evidentiary sanction for failure
to comply with the provisions of the chapter.. It makes explicit that
not only is the communication itself excluded but also any information
obtained from electronic surveillance.
(f) This amendment makes explicit that the requirements for an
application enumerated in subsection 2518(l) apply only to surveil-
Lance conducted pursuant to chapter 119, since chapter 120 contains its
own requirements.
(g) This amendment makes explicit that the necessary elements of
an order set forth in subsection 2518(4) apply only to surveillance
conducted pursuant to chapter 119, since chapter 120 contains its own
requirements.
(h) This amendment makes explicit that the procedures for dis-
closure of the application and accompanying application under this.
subsection apply only to surveillances conducted pursuant to chapter
119, since chapter 120 contains its own requirements.
(i) This amendment makes explicit that the provision for a statutory
suppression motion contained in this subsection applies only to sur-
veillances conducted pursuant to chapter 119, since chapter 120 con-
tains its own requirements.
(j) This amendment makes explicit that the reporting requirements
of the Administrative Office of the I`niied States Courts contained in
this subsection apply only to surveillances conducted pursuant to
chapter 119 since chapter 120 contains its own requirements.
(k) These amendments are designed to entherize the recovery of
civil damages for violations of chapter 120 in the same manner and
amounts ,is already provided for violations of chapter 119. The only
category of individuals who would be exempted from the provisions of
this section are foreign powers and agents of a foreign power as de-
lined in section 2521(b) (1) and (b) (2) (A) of chapter 120.
.lion. JAMES O. L' ASTLAN D,
Chairman, Committee on'the Judiciary,-
U.S. Senate, f-Vashington., D.C.
Ocl'onrr. 13, 19 7 7.
DEAR MR. CHAIRMAN: Pursuant to section 403 of the Congressional
Budget Act of 1974, the Congressional Budget Office has reviewed S.
1556, the Foreign Intelligence Surveillance Act of 1977, as ordered
reported by the Senate Committee on the Judiciary. October 5, 1977.
Based oil this review, it appears that no additional cost to the govern-
ment would be incurred as a result of enactment of this bill.
Sincerely,
ALICE M. Rrvr,IN. Director.
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/11/23 : GCIIA-RDP80SO1268A000500040008-7
CHANGES IN EXISTING LAw
In compliance with subsection (4) of rule XXIX of the Standing
Rules of the Senate, changes in existing law made by the bill, as re-
ported, are shown as follows (existing law proposed to be omitted is
enclosed in black brackets, new matter is printed in italic, and existing
law in which no change is proposed is shown in roman) :
UNITED STATES CODE
* * * * * *
TITLE 18.-CRIMES AND CRIMINAL PROCEDURE
Chapter 119-WIRE INTERCEPTION ON INTERCEPTION
OF ORAL COMMUNICATIONS
Sec.
2510. Definitions.
2511. Interception and disclosure of wire or oral communications prohibited.
2512. Manufacture, distribution, possession, and advertisement of wire or oral
communication intercepting devices prohibited.
2513. Confiscation of wire or oral communication intercepting devices.
2515. Prohibition of use as evidence of intercepted wire or oral communications.
2510. Authorization for interception of wire or oral communications.
2517. Authorization for disclosure and use of intercepted wire or oral
communications.
2518. [Procedure for interception of wire or oral communications.
2519. Reports concerning intercepted wire or oral communications.
2520. Recovery of civil damages authorized.
? 2510. Definitions
As used in this chapter-
(1) "wire communication" means any communication made, in
whole or in part through the use of facilities for the transmission
of communications by the aid of wire, cable, or other like connec-
tion between the point of origin and the point of reception fur-
nished or operated by any person engaged as a common carrier in
providing or operating such facilities for the transmission of in-
terstate or foreign communications;
(2) "oral communication" means any oral coin munication.
uttered by a person exhibiting an expectation that such communi-
cation is not subject to interception under circumstances justifying
such expectation;
(3) "State" means any State of the United States, the District
of Columbia, the Commonwealth of Puerto Rico, and any terri-
tory or possession of the United States;
(4) "intercept" means the aural acquisition of the contents of
any wire or oral communication through the use of any elec-
tronic, mechanical, or other device.
(5) "electronic, mechanical, or other device" means any device
or apparatus which can be used to intercept a wire or oral corn-
munication other than-
(a) any telephone or telegraph instrument, equipment or
facility, or any component thereof, (i) furnished to the sub-
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/x: CIA-RDP80S01268A000500040008-7
scriber or user by a communications common carrier in the
ordinary course of its business and being used by the sub-
scriber or user in the ordinary course of its business; or (ii)
being used by a communications common carrier in the ordi-
nary course of its business, or by an investigative or law
enforcement officer in the ordinary course of his duties;
(b) a hearing aid or similar device being used to correct
subnormal hearing to not better than normal;
(6) "person" means any employee, or agent of the United
States or any State or political subdivision thereof, and any in
dividual, partnership, association, joint stock company, trust, or
corporation;
(7) "Investigative or law enforcement officer" means any officer
of the United States or of a State or politic%l subdivision thereof,
who is empowered by _.iw to conduct investigations of or to make
arrests for offenses enumerated in this chapter, and any attorney
authorized 'by law to prosecute or participate in the prosecution
of such offenses;
(8) "contents", which used with respect to any wire or oral
communication, includes any information concerning the identity
of the parties to such communication or the existence, substance,
purport, or meaning of that communication ;
(9) "Judge of competent jurisdiction" means-
(a) a judge of a United States district court or a United
States court of appeals; and
(b) a judge of any court of general criminal jurisdiction
of a State who is authorized by a statute of that State to
enter orders authorizing interceptions of wire or oral com-
munications ;
(10) "communication common carrier" shall have the same
meaning which is given the term "common carrier" by section
153 (h) of title 47 of the United States Code; and
(11) "aggrieved person" means a person who was a party to
any intercepted wire or oral communication or a person against
whom the interception was directed.
? 21511. Interception and disclosure of wire or oral communications
prohibited
(1) Except as otherwise specifically provided in this chapter or
chapter 1,00 or with respect to techniques used by law enforcement
officers not involving the interception of wire or oral communications
as otherwise authorized by a search warrantor order of a court of com-
petent jurisdiction, any person who-
(a) willfully intercepts, endeavors to intercept, or procures any
other person to intercept or endeavor to intercept, any wire or oral
communication or, under color of law, willfully engages in any
form of electronic surveillance as defined in chapter 120;
(b) willfully uses, endeavors to use, or procures any other
person to use or endeavor to use any electronic, mechanical, or
other device to intercept any oral communication when-
(i) such device, is affixed to, or otherwise transmits a signal
through, a wire, cable, or other like connection used in wire
communication; or
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
68
(ii) such device transmits communications by radio, or
interferes with the transmission of such communication; or
(iii) such person knows, or has reason to know, that such
device or any component thereof has been sent through the
mail or transported in interstate or foreign commerce; or
(iv) such use or endeavor to use (A) takes place on the
premises of any business or other commercial establislinient
the operations of which affect interstate or foreign commerce;
or (B) obtains or is for the purpose of obtaining information
relating to the operations of any business or other commercial
establishment the operations of which affect interstate or for-
eign commerce; or
(v) such person acts in the District of Columbia, the Coin-
monwealth of Puerto Rico, or any territory or possession of
the United States;
(c) willfully discloses, or endeavors to disclose, to any other
person the contents of any wire or oral communication or infor-
mation obtained under color of law by any other form of electronic
surveillance as defined in chapter 120, knowing or having reason
to know that the information was obtained through the intercep-
tion of a wire or oral commianiaction or any other form of elec-
tronic surveillance, as de fisted in chapter 120, in violation of this
subsection ; or
((I) willfully uses, or endeavors to use, the contents of any
wire, or oral communication or is formation obtained under color
of law by any other form of electronic surveillance as defined in
chapter 120, knowing or having reason to know that the informa-
tion was obtained through the interception of a wire or oral com-
iiiunication or any other form of electronic surveillance, as defined
in chapter 1M0, in violation of this subsection;
(2) (a) (i) It. shall not be unlawful under this chapter for an opera-
tor of a switchboard, or an officer, employee, or agent of any coin-
in.unication common carrier, whose facilities are used in the trans-
mission of a wire communication or radio communication, to inter-
cept or otherwise acquire, disclose, or use that communication in the
normal course of his employment while engaged in any activity which
is a, necessary incident to the rendition of his service. or to the protec-
tion of the rights or property of the carrier of such communication :
Provided, That said communication common carriers shall not utilize
service observing or random monitoring except for mechanical or
service quality control checks.
(ii) It shall not be unlawful under this chapter for an officer,
employee, or agent of any communication common carrier to pro-
vide information, facilities, or technical assistance to an investigative
or law enforcement officer who, pursuant to this chapter, or chapter
120, is authorized to intercept a wire or oral [communication.] com-
m.un,ieation or engage in electronic surveillance, as defined in chapter
120: Provided, however, That before the information, facilities, or
teee! ,eal assistance may be provided. the investigative or law enforce-
ment, o icer shall furnish to the officer, employee, or agent of the
caa'ricr either-
(J) an order signed by the authorizing fudge certifying that
a court, order directing such assistance has been issued; or
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
(2) in the case of an emergency interception or electronic
surveillance as provided for in section 2518 (7) of this chapter or
section 20,5 (d) of chapter 120, a certification under oath by roves,
tigatirve or law enforcement officer that the applicable statutory
requirements have been met,
and setting forth the period of time for which the electronic surveil-
lance is authorized and describing the facilities from which the com-
munication is to be acquired. Any violation of this subsection by a
communication common carrier or an officer, employee, or agency
thereof, shall render the carrier liable for the civil damages provided
for in section 2520."
(b) It shall not be unlawful under this chapter for an officer,
employee, or agent of the Federal Communications Commission, in
the normal course of his employment and in discharge of the monitor-
ing responsibilities exercised by the Commission in the enforcement of
chapter 5 of title 47 of the United States Code, to intercept a wire
communication, or oral communication transmitted by radio or other-
wise engaged in electronic surveillance, as defined in chapter 120, or
to disclose or use the information thereby obtained.
(c) It shall not be unlawful under this chapter for a person acting
under color of law to intercept a wire or oral communication or
engage in electronic surveillance, as defined in chapter 120, where such
person is a party to the communication or one of the parties to the
communication has given prior consent to such interception or such
surveillance.
(d) It shall not be unlawful under this chapter for a person not
acting under color of law to intercept a wire or oral communication
where such person is a party to the communication or where one of
the parties to the communication has given prior consent to such
interception unless such communication is intercepted for the purpose
of committing any criminal or tortuous act in violation of the Con-
stitution or laws of the United States or of any State or for the
purpose of committing any other injurious act.
(e) Notwithstanding any other provision o f this title or sections 605
or 600 o f the Communications Act o f 193 , it shall not be unlawful
for an officer, employee, or agent of the United States in the normal
course of his official duty to conduct electronic surveillance as defined
in section 2521(b) (6) of chapter X20 without a court order for the
sole purpose of:
(i) testing the capability of electronic equipment, provided
that no particular United States person shall be intentionally tar-
geted for testing purposes without his consent, the test period
shall be limited in extent and duration to that necessary to deter-
mine the capability of the equipment, that the content of any
communication acquired under this paragraph shall be retained
and used only for the purpose of detei-nining the capability gf
such equipment, shall be disc7osed only to the persons conducting
the test, and shall be destroyed upon completion of the testing,
and that the test may exceed ninety days only with the prior
approval of the Attorney General; or
(ii) determining the existence and capability of electronic sur-
veillance equipment being used unlawfully, provided that such
electronic surveillance shall be limited in extent and duration to
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
that necessary to determine the existence and capability of such
equipment, and that any information acquired by such surveil-
lance shall be used only to enforce this chapter or section 605
of the Communications Act of 1934 or to protect information
from unlawful surveillance.
(f) Nothin q contained in this chapter, or section 605 of the Com-
munications Act of 193.4 (47 U.S.C. 605) shall be deemed to affect the
acquisition by the United States Government of foreign intelligence
information from international communications by a means other
than electronic surveillance as defined in section 2521 (b) (6) of this
title; and the procedures in this chapter and chapter 1.20 of this title,
sluxll be the enclusive means by which electronic surveillance, as defined
in section 2521(b) (6) of chapter 120, and the interception of domestic
wire and oral communications may be conducted.
[(3) Nothing contained in this chapter or in section 605 of
the Communications Act of 1934 (48 Stat. 1143, 47 U.S.C. 605)
shall limit the constitutional power of the President Ito take such
measures as he deems necessary to protect the Nation against ac-
tual or potential attack or other hostile acts of a foreign power, to
obtain foreign intelligence information deemed essential to the
security of the United States, or to protect national security in-
formation against foreign intelligence activities. Nor shall any-
thing contained in this chapter he deemed to limit the cons[itu-
tional power of the President to take such measures as he deems
necessary to protect the United States against the overthrow of the
Government by force or other unlawful means, or against any
other clear and present danger to the structure or existence of the
Government. The contents of any wire or oral communication in-
tercepted by authority of the President in the exercise of the
foregoing powers may be received in evidence in any trial, hear-
ing, or other proceeding only where such interception was reason-
able, and shall not be otherwise used or disclosed except as is nec-
essary to implement that power.]
2515. Prohibition of use as evidence of intercepted wire or oral
communications
Whenever any wire or oral communication has been intercepted
or electronic surveillance, as defined in chapter 120, has been con-
ducted, no part of the contents of such communication or other in-
formation obtained from electronic surveillance, as defined in chapter
.120, and no evidence derived therefrom may be received in evidence in
any trial, hearing, or other proceeding in or before any court, grand
jury, department, officer, agency, regulatory body, legislative commit-
tee, or other authority of the United States, a State, or a political sub-
division thereof if the disclosure of that information would be in
violation of this chapter or chapter 120.
* * * * * *
? 2518. Procedure for interception of wire or oral communications
(1) Each application for an order authorizing or approving the
interception of a wire or oral communication under this chaptershall
be made in writing upon oath or affirmation to a judge of competent
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
71
jurisdiction and shall state the applicant's authority to make such
application. Each application shall include the following information :
(4) Each order authorizing or approving the interception of any
wire or oral communication under this chapter shall specify-
An order authorizing the interception of a wire or oral communica-
tion under this chapter shall, upon request of the applicant, direct that
a communication common carrier, landlord, custodian or other person
shall furnish the applicant forthwith all information, facilities, and
technical assistance necessary to accomplish the interception unob-
strusively and with a minimum of interference with the services that
such carrier, landlord, custodian, or person is according the person
whose communications are to be intercepted. Any communication corn-
mon carrier, landlord, custodian or other person furnishing such fa-
cilities or technical assistance shall be compensated therefor by the
applicant at the prevailing rates.
(9) The contents of any [intercepted] wire or oral communication
intercepted pursuant to this chapter or evidence derived therefrom
shall not be received in evidence or otherwise disclosed in any trial,
hearing, or other proceeding in a Federal or State court unless each
party, not less than ten days before the trial, hearing, or proceeding,
has been furnished with a copy of the court order, and accompanying
application, under which the interception was authorized or approved.
* * * * * *
2519. Reports concerning intercepted wire or oral communica-
tions
* * * * * *
(3) In April of each year the Director of the Administrative Office
of the United States Courts shall transmit to the Congress a full and
complete report concerning the number of applications for orders
authorizing or approving the interception of wire or oral communica-
tions pursuant to this chapter and the number of orders and extensions
granted or denied pursuant to this chapter during the preceding cal-
endar year.
? 2520. Recovery of civil damages authorized
[Any person whose wire or oral communication is intercepted,
disclosed, or used in violation of this chapter shall (1) have a civil
cause of action against any person who intercepts, discloses, or uses,
or procures any othex person to intercept, disclose, or use such com-
munications and] Any person other than a foreign power or an agent
of a foreign power as defined in sections 2521 (b) (1) and 2521(b) (2)
(A) of chapter 120, who has been subject to electronic surveillance,
as defined in chapter 120, or whose wire or oral commrnunication
has been intercepted, or about whom information has been disclosed
or used. in violation of this chapter, shall (1) have a civil cause of
action against any person who so acted in violation of this chapter
and (2) be entitled to recover from any such person-
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
72
(a) actual damages but not less than liquidated damages com-
puted at the rate of $100 a day for each day of violation or.
$1,000, whichever is higher;
b) punitive damages; and
c) a reasonable attorney's fee and other litigation costs rea-
sonably incurred.
A good faith reliance on a court order or legislative authorization
shall constitute a complete defense to any civil or criminal action
brought under this chapter or under any other law.
Chapter 120. ELECTRONIC SURVEILLANCE WITHIN THE
UNITED STATES FOR FOREIGN INTELLIGENCE PUR.
POSES
Sec.
2521. Definitions.
2522. Authorization for electronic surveillance for foreign intelligence purposes,
2523. Designation of judges authorized to grant orders for electronic surveil-
lance.
2521. Application for an order.
2525. Issuance of an order.
2.526. Use of information.
2527. Report of electronic surveillance.
? 2521. Definitions
(a) Except as otherwise provided in this section the definitions
of section 2510 of this title shall apply to this chapter.
(b) As used in this chapter-
(1) "Foreign power" means-
(A) a foreign government or any component thereof,
whether or not recognized by the United States;
(71) a faction of a foreign nation or nations, not substan-
tially composed o f United States persons;
(C) an entity, which is openly acknowledged by a foreign
government or governments to be directed and controlled by
such foreign government or governments;
(D) a foreign-based terrorist group;
(E) a foreign-based political organization, not substan-
tially composed of United States persons; or
(1;) an entity which is directed and controlled by a foreign
government or governments.
(2) "Agent of a foreign power" means-
(A) any person, other than a United States citizen or an
alien lawfully admitted for permanent residence (as defined
in section 101 (a) (20) of the Immigration and Nationality
Act), who-
(i) is an officer or employee of a foreign power;
(ii) knowingly engages in clandestine intelligence
activities for or on behalf of a foreign power under cir-
cumstances which indicate that such activities would be
harmful to the security of the United States; or
(iii) conspires with or knowingly aids or abets any
person, knowing that such person is engaged in activities
described in paragraph (ii) above;
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
73
(B) any person who-
(i) knowingly en ages in clandes tine intelligence activ-
ities for or on behalf of a f oreign power, which activities
involve or will involve a violation of the criminal statutes
of the United States;
(ii) knowingly engages in activities that involve or will
involve sabotage or terrorism for or on behalf of a foreign
power;
(iii) pursuant to the direction of an intelligence service
or intelligence network of a foreign power, knowingly col-
lects or transmits information or material to an intelli-
gence service or intelligence network of a foreign power
in a manner intended to conceal the nature of such in-
formation or material or the fact of such transmission or
collection, under circumstances which indicate the trans-
mission of such information or material would be harm-
ful to the security of the United States, or that Zack of
knowledge by the United States of such collection or
transmission would be harmful to the security of the
United States; or
(iv) conspires with or knowingly aids or abets any
person knowing that such person is engaged in activities
described in subsections B (i)-(iii) above.
(3) "Terrorism" means activities which-
(A) are violent acts or acts dangerous to human life which
would be criminal under the laws of the United States or of
any State if committed within its jurisdiction; and
(B) appear to be intended-
(i) to intimidate or coerce the civilian population,
(ii) to influence the policy of a government by intimi-
dation or coercion, or
(iii) to affect the conduct of a government by assassi-
nation or kidnapping.
(4) "Sabotage" means activities which would be prohibited by
title 18, United States Code, chapter 105, if committed against the
United States.
(5) "Foreign intelligence information" means-
(A) information which relates to, and is deemed necessary
to the ability of the United States to protect itself against,
actual or potential attack or other grave hostile acts of a for-
eign power or an agent of a foreign power;
(B) information with respect to a foreign power or for-
eign territory, which relates to, and because of its importance
is deemed essential to-
(i) the national defense or the security of the Nation;
or
(ii) the successful conduct of the foreign affairs of the
United States:
(C) information which relates to, and is deemed necessary
to the ability of the United States to protect against terrorism
by a foreign, power or an agent of a foreign power;
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
(D) information which relates to, and is deemed necessary
to the ability of the United States to protect against sabotage
by a foreign power or an agent of a foreign power; or
(F,) information which relates to, and is deemed necessary
to the ability of the United States to protect against the
clandestine intelligence activities of an intelligence service
or network of a foreign power or an agent of a foreign power.
(6) "Electronic surveillance means-
"(A) the acquisition by an electronic, mechanical, or other
surveillance device of the contents of any wire or radio com-
munication sent by or intended to be received by a particular,
known United States person who is in the United States,
where the contents are acquired by intentionally targeting
that United States person, under circumstances in'whieh, a,
person has a reasonable expectation of privacy and a warrant
would be required for law enforcement purposes;
(B) the acquisition by an electronic, mechanical, or other
surveillance device, of the contents of any wire communica-
tion to or from a person in the United States, without the
consent of any party thereto, where such acquisition. occurs
in the United'States while the communication is being trans-
mitted by wire;
(C) the intentional acquisition, by an electronic,'mechan-
ical, or other surveillance device, o f the contents of any radio
communication, under circumstances in. which, a person has
a reasonable expectation of privacy and a. warrant would he
required for law enforcement purposes, and where both the
sender and all intended recipients are located within the
United States: or
(D) the installation or use of an electronic, mechanical,
or other surveil7avee device in the United States for monitor-
ing to acquire infornwtiov:, other than from a wire or radio
communication, under circumstances in which. a person has
a reasonable expectation of privacy and a warrant would be
required for law enforcement purposes.
(7) "Attorney General" means the Attorney General of the
United States (or Acting Attorney General) or the Deputy A ttor-
ney General.
(8) "Minimisation procedures" means procedures wha.ch, are
reasonably designed to rn,inimise the acquisition,, retention, and
prohibit the die.eeminrrtion, except as provided for? in svb.se'tions
2626 (a) and (b), of any in f orma Lion concerning United States
persons without their consent that does not relate to the ability
of the United Statee-
(A) to protect itself against actual or potential attack or
other grave hostile acts of a foreign power or an agent of a
foreign power;
(B) to provide for the national defense or security of the
Nation;
(C) to provide for the conduct of the foreign affairs of the
United States;
(D) to protect against terrorism by a foreign power or
an agent of a foreign power;
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/237.5CIA-RDP80S01268A000500040008-7
(E) to protect against sabotage by a foreign power or an
agent of a foreign power; or
(F) to protect against the clandestine intelligence activi-
ties of an intelligence service or network of a foreign power
or an agent of a foreign power;
and which are reasonably designed to insure that information
which relates solely to the conduct of foreign affairs shall not be
maintained in such a manner as to permit the retrieval of such
information by reference to a United States person, without his
consent, who was a party to a commzunication acquired pursuant
to this chapter; and i tlee target of the electronic surveillance
is a foreign power which qualifies as such solely on the basis that
it is an entity controlled and directed by a foreign government
or governments, and unless there is probable cause to believe that
a substantial number of the officers or employees of a foreign
government, or agents of a foreign power as defined in section
3521(b) (2) (B), procedures which are reasonably designed to
prevent the acquisition, retention, and dissemination of com-
m nications of unconsenting United States persons who are not
officers or executives of such entity responsible for those areas of
its activities which involve foreign intelligence information.
(9) United States person," means a citizen of the United States,
an alien lawfully admitted for permanent residence (as defined in
section 101(a) (~0) of the Immigration and Nationality Act),
an unincorporated association a substantial number of members
o/ which are citizens of the United States or aliens lawfully
admitted for permanent residence or a corporation which is incor-
porated in the United States, but not including corporations or
associations which are foreign powers.
(.10) "United States" when used in a geographic sense means all
areas under the territorial sovereignty of the United States, the
Trust Territory of the Pacific Islands, and the Canal Zone.
? 2522. Authorization for electronic surveillance for foreign
intelligence purposes
Applications for a court order under this chapter are authorized if
the President has, by written authorization, empowered the Attorney
General to approve applications to Federal judges having jurisdiction
under section 8523 of this chapter, and a judge to whom an application
is made may grant an order, in con f ormiity with section 2525 of this
chapter, approving electronic surveillance of a foreign power or an
agent of a foreign power for the purpose of obtaining foreign intel-
ligence in f ormation.
? 2523. Designation of judges authorized to grant orders for
electronic surveillance
(a) The Chief Justice of the United States shall publicly designate
seven district court judges, each of whom shall have jurisdiction to
hear applications for and grant orders approving electronic surveil-
lance anywhere within the United States under the procedures set
forth in this Chapter, except that no judge designated under this sub-
section shall have jurisdiction of the same application for electronic
surveillance under this chapter which has been denied previously by
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
76
another judge designated under this subsection. If any judge so des-
ignated denies an application for an order authorizing electronic
surveillance under this chapter, such judge shall provide immediately
for the record a written statement of each reason for his decision and,
on motion of the United States, the record shall be transmitted, under
seal, to the special court o f review established in subsection (b).
(b) The Chief Justice shall publicly designate three judges, one of
whom. shall be publicly designated as the presiding judge, from the
United States district courts or courts of appeals who together shall
comprise a special court of review which shall have jurisdiction to
review the denial of any application made under this chapter. If such
special court determines that the application was properly denied, the
special court shall immediately provide for the record a written state-
ment of each reason for its decision and, on petition of the United
States for a writ of certiorari, the record shall be transmitted under
seal to the Supreme Court, which shall have jurisdiction to review such
decision.
(c) Proceedings under this chapter shall be conducted as expeditious-
ly as possible. The record of proceedings under this chapter, including
applications made and orders granted, shall be sealed and maintained
under security measures established by the Chief Justice in con-
sultation with the Attorney General and the Director of Central
Intelligence.
? 2524. Application for an order
(a) Each application for an order approving electronic surveillance
under this chapter shall be made by a Federal officer in writing upon
oath or affirmation to a judge having jurisdiction under section 2523
of this chapter. Each application shall require the approval of the
Attorney General based upon his finding that it satisfies the criteria
and requirements of such application as set forth in this chapter. It
shall include the following information--
(1) the identity of the Federal officer making the application;
(2) the authority conferred on the Attorney General by the
President of the United States and the approval of the Attorney
General to make the application;
(3) the identity or a description of the target of the electronic
surveillance;
(4) a. statement of the facts and circumstances relied upon by
the applicant to justify his belief that-
(A) the target of the electronic surveillance is a foreign
power or an agent of a foreign power; and
(B) the facilities or the place at which the electronic sur-
veillance is directed are being used, or are about to be used,
by a foreign power or an agent of a foreign power;
(5) a statement of the proposed minimization procedures;
(6) when the target of the surveillance is not a foreign power
as defined in section 252.1(b) (1) (A), (B), or (C), a detailed
description of the nature of the information sought;
(7) a certification or certifications by the Assistant to the
President for National Security Affairs or an executive branch
official or officials designated by the President from among those
executive officers employed in the area of national security or de-
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005111/23 : CIA-RDP80SO1268A000500040008-7
77
Tense and appointed by the President with the advice and con-
sent of the Senate-
(A) that the information sought is foreign intelligence
information,;
(B) that the purpose of the surveillance is to obtain for-
eign intelligence information;
(C) that such information cannot reasonably be obtained
by normal investigative techniques;
(D) including a designation of the type of foreign intelli-
gence information being sought according to the categories
described in section 2521 (b) (5);
(E) when the target of the surveillance is not a foreign
power, as defined in section 2521(b) (1) (A), (B), or (C),
including a statement of the basis for the certification that-
(i) the information sought is the type of foreign in-
telligence information designated; and
(ii) such information cannot reasonably be obtained
by normal investigative techniques;
(F) when the target of the surveillance is a foreign power,
as defined in section 2521(b) (1) (A), (B), or (C), stating
the period of time for which the surveillance is required to
be maintained;
(8) when the target of the surveillance is not a foreign power,
as defined in section 25.21(b) (1) (A), (B), or (C), a statement of
the means by which the surveillance will be effected, and when the
target is a foreign power, as defined in section 2521 (b) (1) (A),
(B), or (C), a designation of the type of electronic surveillance
to be used according to the categories described in section 2,521
(b) (6) and a statement whether physical entry is required to
effect the surveillance;
(9) a statement of the f acts concerning all previous applications
that have been made to any judge under this chapter involving
any of the persons, facilities, or places specified in the application,
and the action taken on each previous application; and
(10) when the target of the surveillance is not a foreign power,
as defined in section 2521(b) (1) (A), (B), or (C), a statement of
the period of time for which the electronic surveillance is required
to be maintained. If the nature of the intelligence gathering is
such that the approval of the use of electronic surveillance under
this chapter should not automatically terminate when the de-
scribed type of information has first been obtained, a description
of facts supporting the belief that additional information of the
same type will be obtained therea f ter.
(b) The Attorney/ General may require any other affidavit or certifi-
cation from any other officer in connection with the application.
(c) The judge may require the applicant to furnish such other inf or-
mation as may be necessary to make the determinations required by
section 2525 01 this chapter.
? 2525. Issuance of an order
(a) Upon an application made pursuant to section 2524 of this title,
the judge shall enter an ex parte order as requested or as modified
approving the electronic surveillance if he finds that-
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
78
(1) the President has authorized the Attorney General to
approve applications for electronic surveillance for foreign intel-
ligence information;
(2) the application has been made by a Federal officer and
approved by the Attorney General;
(3) on the basis of the facts submitted by the applicant there
is probable cause to believe that-
(A) the target of the electronic surveillance is a foreign
power or an agent of a foreign power; and
(B) the facilities or place at which the electronic surveil-
lance is directed are being used, or are about to be used, by a
foreign power or an agent of a foreign power;
(4) the proposed minimization procedures meet the de fnition
Of minimization procedures under section 2821(b) (8) of this title ;
(5) the application which has been filed contains the descrip-
tion and certification or certifications, specified in section 2524 (a)
(7) and, if the target is a United States person, the certification
or certifications are not clearly erroneous on the basis of the state-
ment made under section 2524(a) (7) (F).
(b) An order approving an electronic surveillance under this sec-
tion shall-
(1) specify-
(A) the identity or a description of the target of the elec-
tronic surveillance;
(B) the nature and location of the facilities or the place
at which the electronic surveillance will be directed,;
(C) when the target of the surveillance is not a foreign
power as defined in section 2521 b (1) (A), (B), or (C), the
type of information sought to be acquired and when the target
is a. foreign power defined in section 2521 (b) (1) (A), (B) or
(C), the designation of the type of foreign intelligence in-
formation under section 2521(b) (5) sought to be acquired;
(D) when the target of the surveillance is not a foreign
power, as defined in section 2.521(b) (1) (A), (Ti), or (C),
the metens by which the electronic surveillance will be effected,
and when the target is a foreign power, as defined in section
2521(b) (1) (A), (B), or (C), a designation of the type of
electronic surveillance to be used according to the categories
described in section 2521 (b) (.6) and whether physical entry
will be used to affect the surveillance;
(F) the period of time during which the electronic sur-
llance is approved; and
(2) direct,-
(A) that the minimization procedures be followed.'
(B) that, upon the request of the applicant, a specified com-
munication or other common carrier, landlord, custodian,
contractor, or other specified person furnish the applicant
forthwith any and all information, facilities, or technical
assistance, necessary to accomplish the electronic surveillance
in such manner as will protect its secrecy and produce a mini-
mum o f interference with the services that such carrier, land-
lord, custodian, contractor, or other person is providing that
target of electronic surveillance;
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/P : CIA-RDP80S01268A000500040008-7
(C) that such carrier, landlord, custodian, or other person
maintain under security procedures approved by the Attorney
General and the Director of Central Intelligence any records
concerning the surveillance or the aid furnished which such
person, wishes to retain;
(D) that the applicant compensate, at the prevailing rate,
such carrier, landlord, custodian, or other person for furnish-
ing such aid.
(c) An order issued under this section may approve an electronic
surveillance not targeted against a foreign power, as defined in section
2521(b) (1) (A), (B), or (C), for the period necessary to achieve its
purpose, or for ninety days, whichever is less; an order under this
section shall approve an electronic surveillance targeted against a for-
eign power, as defined in section 2521 (b) (1) (A), (B), or (C) for the
period specified in the certification required in section 2524(a) (7) (F),
or for one year, whichever is less. Extensions of an order issued under
this chapter may be granted on the same basis as an original order
upon an application for an extension made in the same manner as
required for an original application and after new findings required
by subsection (a) of this section. In connection with applications for
extensions where the target is not a foreign power, as defined in section
2521(b) (1) (A), (B), or (C), the judge may require the applicant
to submit information., obtained pursuant to the original order or to
any previous extensions, as may be necessary to make new findings of
probable cause.
(d) Notwithstanding any other provision of this chapter when the
Attorney General reasonably determines that-
(1) an emergency situation exists with respect to the employ-
ment of electronic surveillance to obtain foreign intelligence in-
formation before an order authorizing such surveillance can with
due diligence be obtained, and
(2) the factual basis for issuance of an order under this chap-
ter to approve such surveillance exists, he may authorize the emer-
gency employment of electronic surveillance i f a judge designated
pursuant to section 2523 of this chapter is informed by the Attor-
ney General or his designate at the tine of such authorization that
the decision has been made to employ emergency electronic sur-
veillance and if an application in accordance with this chapter is
made to that judge as soon as practicble, but not more than
t-vcnty-four hours after the Attorney General authorizes such ac-
quisition. If the Attorney General authorizes such emergency
employment of electronic surveillance, he shall require that the
minimization procedures required by this chapter for the issu-
ance of a judicial order be followed. In the absence of a judicial
order approving such electronic surveillance, the surveillance shall
terminate when the in sought is obtained, when the ap-
plication for the order is denied, or a f ter the expiration of twenty-
four hours from the time of authorization by the Attorney Gen-
eral, whichever is earliest. In the event that such application for
approval is denied, or in any other case where the electronic sur-
veillance is terminated without an order having been issued, no
information obtained or evidence derived from such surveillance
shall be received in evidence or otherwise disclosed in any trial,
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
so
hearing or other proceeding in or before any court, grand jury,
department, office, agency, regulatory body, legislative conwmittee
or other authority of the United States, a State or political sub-
division thereof. A denial of the application made under this sub-
section may be reviewed as provided in section 2523.
? 2526. Use of information
(a) Information concerning United States persons acquired from
an electronic surveillance conducted pursuant to this chapter may be
used and disclosed by Federal officers and employees without the con-
sent of the United States person only for purposes specified in sec-
tion 2521(b) (8) (A) through (F), or for the enforcement of the
criminal law if its use outweighs the possible harm to the national
security. No otherwise privileged communication obtained in accord-
ance with, or in violation of, the provisions of this chapter shall lose
its privileged character. No information acquired from an electronic
surveillance conducted pursuant to this chapter may be used or dis-
closed by federal officers or employees except for lawful purposes.
(b) The minimization procedures required under this chapter shall
not preclude the retention and disclosure, for law enforcement pur-
poses, of any information which constitutes evidence of a crime if such
disclosure is accompanied by a statement that such evidence, or any
information derived therefrom, may only be used in a criminal pro-
ceeding with the advance authorization o f the Attorney General.
(c) Whenever the Government intends to enter into evidence or
otherwise use or disclose in any trial, hearing, or other proceeding in
or before any court, department, officer, agency, or other authority of
the United States, a State, or a political subdivision thereof, any in-
formation obtained or derived from an electronic surveillance, the
Government shall prior to the trial, hearing, or other proceeding or at
a, reasonable time prior to an effort to so disclose or so use the informa-
tion or submit it in evidence notify the court in which the informa-
tion is to be disclosed or used or, if the information is to be disclosed
or used in or before another authority, shall notify a court in the dis-
trict wherein the information is to be so disclosed or so used that the
Government intends to so disclose or so use such in f ormation.
(d) Any person who has been a subject of electronic surveillance
and against whom evidence derived from such electronic surveillance
is to be, or has been, introduced or otherwise used or disclosed in any
trial, hearing, or proceeding in or before any court, department officer,
agency, regulatory body, or other authority of the United States, a
State, or a political subdivision thereof, may move to suppress the con-
tents of any communication acquired by electronic surveillance, or
evidence derived therefrom, on the grounds that-
(1) the communication was unlawfully acquired; or
(2) the surveillance was not made in conformity with the order
of authorization approval.
Such motion shall be made before the trial, hearing, or proceeding
unless there was no opportunity to make such motion or the person
was not aware of the grounds of the motion.
(e) Whenever any court is notified in accordance with subsection
(c), or whenever a motion is made by an aggrieved person pursuant
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Approved For Release 2005/11/23g1CIA-RDP80S01268A000500040008-7
to subsection (d), to suppress evidence on the grounds that it was ob-
tained or derived from an unlawful electronic surveillance, or when-
ever any motion or request is made bi an aggrieved person pursuant to
section 3501 of this title or any other statute or rule of the United
.States, to discover, obtain or suppress evidence or information ob-
tained or derived from electronic surveillance, the federal court, or
where the motion is made before another authority, a federal court in
the same district as the authority, shall, notwithstanding any other
law, if the Government by affidavit asserts that disclosure or an ad-
versary hearing would harm the national security of the United States,
review in camera and ex paste the application, order, and other ma-
terials relating to the surveillance as may be necessary to determine
whether the surveillance was authorized and conducted in a manner
that did not violate any right afforded by the Constitution and statutes
of the United States to the aggrieved person. In making this determi-
nation, the court shall disclose to the aggrieved person portions of the
.application, order, or other materials relating to the surveillance only
where such disclosure is necessary to make an accurate determination
of the legality of the surveillance. If the court. determines that the elec-
tronic surveillance of the aggrieved person was not lawfully author-
ized or conducted, the court shall in accordance with the requirements
law suppress the information obtained or evidence derived from
tie unlawful electronic surveillance. If the court determines that the
surveillance was lawfully authorized and conducted, the court shall
deny any motion for disclosure or discovery unless required by due
process.
(e) If an emergency employment of the electronic surveillance is
authorized under section 2525(d) and a subsequent order approving
the surveillance is not obtained, the judge shall cause to be served on
any United States person named in the application and on such other
United States persons subject to electronic surveillance as the judge
may determine in his discretion it is in the interest of justice to serve,
notice of-
( 1) the fact of the application;
(?0) the period of the surveillance; and
(3) the fact that during the period information was or was not
obtained.
On an ex parte showing of good cause to the judge the serving of the
notice required by this subsection may be postponed or suspended for
a period not to exceed ninety days. Thereafter, on a further ex parte
showing of good cause, the court shall forego ordering the serving of
the notice required under this subsection.
2527. Report of electronic surveillance
In April of each year, the Attorney General shall report to the Ad-
ministrative Office of the United States Courts and shall transmit to
tJongress with respect to the preceding calendar year-
(1) the total number of applications made for orders and ex-
tensions of orders approving electronic surveillance,, and
(0) the total number of such orders and extensions either
granted, modified, or denied.
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
MINORITY VIEWS OF SENATOR JAMES A13OUREZK
After giving careful consideration to S. 1566, the Foreign Intel-
ligence Surveillance Act of 1977, I have reluctantly decided that I
cannot support this legislation in its present form.
I have reached this decision with great hesitancy, because I endorse
the goals of S. 1566-to bring electronic surveillance for foreign intel-
ligence purposes under the rule of law and to put to rest once and for
all the myth of some "inherent executive power" which, it, has been
alleged, superseded the clear mandate of the fourth Amendment to the
Constitution.
As to the latter point, S. 1566 is clearly superior to S. 3197, its pred-
ecessor from the 94th Congress. For years, Congress has struggled
with the question of a supposed inherent Presidential power in the
foreign intelligence sphere. Every recent administration has claimed
such a power and Congress explicitly recognized the possibility of such
an inherent power when it incorporated the "national security dis-
claimer" in title III of the Omnibus Crime Control and Safe Streets
Act of 1968.1
When the Ford administration proposed legislation to cover foreign
intelligence electronic surveillance in 1976, it nevertheless sought to
retain some vestige of this inherent; power. Although the Judiciary
Committee substantially amended the "Presidential Power" section of
S. 3197, the bill as reported by the committee last year did reflect the
demand of the Ford Administration that the proposed legislation not
completely foreclose the possibility of the President exercising this
supposed "constitutional power" in a narrow range of exceptional
circumstances. As was noted at that time :
It is worth emphasizing, as the congressional report indi-
cates, that section 2528 does not constitute either a conferral
or a recognition of any Presidential power to conduct war-
rantless electronic surveillance for foreign national security
purposes. Section 2528 simply disclaims congressional intent
to mandate the bill's warrant procedures in two possible situa-
tions involving surveillance by electronic, mechanical or other
technical devices.
Given their exclusion from the warrant requirement of this
legislation, the President may ultimately be found to have
power to authorize each of these kinds of surveillance without
judicial warrant. But even if such warrantless surveillances
were constitutional in the absence of congressional action,
Congress could impose a similar warrant procedure as the
required mode of conducting them, just as this bill mandates
Approved For Release 2005/11/23 : CIA-RDP80S01268A000500040008-7
Approved For Release 2005/11/23 : CIA-RDP80SO1268AO00500040008-7
83
procedures for the forms of surveillance it covers. For now,
however, S. 3197 defers the exercise of congressional power
in regard to these additional areas of intelligence gathering.
In this subsection, S. 3197 stops short of asserting the reg-
ulatory power of Congress to its fullest extent?
I am pleased to note that the Judiciary Committee has, this year,
asserted its power to the fullest extent as regards electronic surveil-
lance within the United States. The committee has adopted statutory
language, with the full support of the Carter administration, which
makes it clear that, if enacted, the Congress does not recognize any
claim of inherent executive power to engage in electronic surveillance
within the United States and that S. 1566 and title III of the 1968
act represent "the exclusive means" by which such activities can be
conducted.
I regard this as a very positive action and commend President Carter
and Attorney General Bell for their farsighted efforts in this regard.
This is not the only improvement which S. 1566 makes over S. 3197.
As the committee report points out, this year's bill also brings within
its scope certain targeting activities of the National Security Agency
which were not covered by S. 3197. It also allows for a limited degree
of judicial review of the executive certifications relating to United
States citizens and resident aliens.
Again, I believe that the committee has acted wisely in adopting
these improvements to the legislation.
Yet despite these positive features, I believe that S. 1566 is fatally
defective in one important respect. It is the inclusion of this flawed
provision that prevents me from supporting the Foreign Intelligence
Surveillance Act.
I ain referring, of course, to the so-called, noncriminal standard
contained in subsection 2521(b) (2) (I3) (iii).
For the second year in a row, the Justice Department has prevailed
on the committee to include in this legislation a, provision that would
allow U.S. citizens and resident aliens who were not violating any
federal law to be targeted for foreign intelligence electronic surveil-
lance. This year's provision is, in fact, slightly broader than the one
finally adopted by the Senate Intelligence Committee last year in
that "collection" activities have been added to the definition in
5.1566.
During the committee hearings on the bill, I questioned the At-
torney General closely about the need for this noncriminal standard.
In addition, in response to a written inquiry he supplied me with six
hypothetical cases which, he asserted, pointed up the necessity of this
provision.3
After carefully reviewing both the oral testimony and written sub-
missions on the question, however, I have not been convinced that this
controversial provision is necessary, wise, or, most importantly, con-
sistent with the Constitution.
2 Rcpt. 94-1031, "Senate Committee on the Judiciary. Foreign Intelligence Surveillance
Aet of 1976, Additional Views of Senators Abourezk, Hart and Slathias," 94th Coug., 2d
seas.. 76 (1976).
3 As an appendix, I have attached both the Justice Department's hypotheticals and an
analysis of each prepared by the Washington Office of the American Civil Liberties Union.
Approved For Release 2005/11/23 : CIA-RDP80SO1268AO00500040008-7
i
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7
Let me make it clear that my opposition does not stem from a belief
that this noncriminal standard is overly broad. Nor do I believe that its
inclusion will result in the wholesome abuses of electronic surveillance
that have occurred in the past.
It is clear from any fair reading of subsection 2521(b) (2) (B) (iii)
that it has been drafted as narrowly as possible.
Yet, the fact remains that this provision is in direct conflict with my
belief that the 4th Amendment requires a showing of probable cause
that a criminal offense has been, or is about to be, committed before an
American citizen can be subjected to the pervasive type of search which
electronic surveillance entails. I believe, as the Church committee
found, that "as a matter of principle ... an American ought not to
be targeted for surveillance unless there is probable cause to believe that
he may violate the law." 4
Exposing Americans to such risk should be limited to situations
where the alleged activity is sufficiently harmful to the national secu-
rity to have been made a Federal offense.
It was principally this provision which prevented me from support-
ing S. 1566 in the Judiciary Committee. I believe that there is some
cause for hope, however, that before this bill is scheduled for action by
the full Senate, some compromise may be reached on this issue.
Attorney General Bell has already indicated that the Justice De-
partment intends to propose statutory revisions to the espionage law
intended to cover those types of intelligence activities which are de-
signed to be covered by the non-criminal standard of S. 1566. If this
were done, of course, there would be no need for subsection 2511(b)
(2) (B) (iii).
A more likely short-term solution, however, might involve revising
that provision of the bill so that it provides the flexibility needed by
our intelligence agencies while at the same time protecting the consti-
tutional liberties of our citizens.
I believe that such a formulation-some middle ground which will
serve both purposes-can be found.
For my part, I intend to work toward that end. At the committee
markup of S. 1566 on October 5, I withdrew my amendment to strike
the noncriminal standard in order to provide a more neutral frame-
work for continued discussions with representatives of the Justice
Department on this matter. It is my hope that the Attorney General
will be responsive to this invitation and will join us in attempting to
reach some accommodation on this difficult and important issue.
Report 94-755 "Senate Select Committee to Study Governmental Operations With
Respect to intelligence Activities, Final Report, Book II intelligence Activities and the
Rights of Americans," 94th Congress, 2d Session, 325 (1976).
0
Approved For Release 2005/11/23 : CIA-RDP80SO1268A000500040008-7