- Foreign Intelligence Surveillance Act
The Foreign Intelligence Surveillance Act of 1978 ("FISA" USStatute|95|511|92|1783|1978|10|25, usctc|50|36) is an
Act of Congress which prescribes procedures for the physical and electronicsurveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of being engaged in espionage and violating U.S. law on territory under United States control).Usctc|50|36, The complete text of the Foreign Intelligence Surveillance Act]ubsequent amendments
The Act was amended in 2001 by the
USA PATRIOT Act , primarily to include terrorism on behalf of groups that are not specifically backed by a foreign government.An overhaul of the bill, the
Protect America Act of 2007 was signed into law onAugust 5 ,2007 [cite web
url=http://www.npr.org/templates/story/story.php?storyId=15419879
title=The Foreign Service Intelligence Act: A Primer
first=Eric
last=Weiner
publisher=National Public Radio
date=2007-10-18] . It expired onFebruary 17 ,2008 .The
FISA Amendments Act of 2008 passed by theUnited States Congress onJuly 9 ,2008 . [cite web
url=http://senate.gov/legislative/LIS/roll_call_lists/roll_call_vote_cfm.cfm?congress=110&session=2&vote=00168
title=U.S. Senate Roll Call Vote Summary, Vote 00168, 100th Congress, 2nd Session
date=2008-07-09]History
The Foreign Intelligence Surveillance Act resulted from extensive investigations by Senate Committees into the legality of domestic intelligence activities. These investigations were led separately by
Sam Ervin andFrank Church in 1978 as a response to President Nixon’s usage of federal resources to spy on political and activist groups, which violates theFourth Amendment to the U.S. Constitution . [ [http://www.dailynexus.com/article.php?a=15892 FISA Debate Involves More Than Terrorism - Daily Nexus ] ] The act was created to provide Judicial and congressional oversight of the government's covert surveillance activities of foreign entities and individuals in the United States, while maintaining the secrecy needed to protect national security. It allowed surveillance, withoutcourt order , within the United States for up to one year unless the "surveillance will acquire the contents of any communication to which a United States person is a party". If a United States person is involved, judicial authorization was required within 72 hours "after" surveillance begins.Bush administration warrantless domestic wiretapping program
The Act came into public prominence in December 2005 following publication by the "
New York Times " of an article ["Bush Lets US Spy on Callers Without Courts" (Dec. 16, 2005; [http://www.commondreams.org/headlines05/1216-01.htm] ] that described a program of warrantless domestic wiretapping ordered by the Bush administration and carried out by theNational Security Agency since 2002 (a subsequent Bloomberg article [ [http://www.bloomberg.com/apps/news?pid=20601087&sid=abIV0cO64zJE&refer= Bloomberg.com: Worldwide ] ] suggested that this may have already begun by June 2000). Many critics have asserted that the Administration's warrantless spying program is a violation of theFourth Amendment to the United States Constitution against warrantless search and a criminal violation of FISA.cope and limits
For most purposes, including electronic surveillance and physical searches, "foreign powers" means a foreign
government , any faction(s) or foreign governments not substantially composed of US persons, and any entity directed or controlled by a foreign government. §§1801(a)(1)-(3) The definition also includes groups engaged in international terrorism and foreign political organizations. §§1801(a)(4) and (5). The sections of FISA authorizing electronic surveillance and physical searches without a court order specifically exclude their application to groups engaged in international terrorism. "See" §1802(a)(1) (referring specifically to §1801(a)(1), (2) and (3)).The statute limits its application to US persons. A US person includes citizens, lawfully admitted permanent resident aliens, and
corporation s incorporated in the US.The code defines "foreign intelligence information" to mean information necessary to protect the
United States against actual or potential grave attack,sabotage orinternational terrorism . [http://www.law.cornell.edu/uscode/html/uscode50/usc_sec_50_00001801----000-.html#e 50 U.S.C. §1801(e)] Definition of Foreign intelligence information]Provisions
The subchapters of FISA provide for:
* Electronic Surveillance (usctc|50|36|I)
* Physical Searches (usctc|50|36|II)
* Pen Registers and Trap & Trace Devices for Foreign Intelligence Purposes (usctc|50|36|III)
* Access to certain Business Records for Foreign Intelligence Purposes (usctc|50|36|IV)
* Reporting Requirement (usctc|50|36|V)The act created a court which meets in secret, and approves or denies requests forsearch warrants . Only the number of warrants applied for, issued and denied, is reported. In 1980 (the first full year after its inception), it approved 322 warrants. [ [http://www.fas.org/irp/agency/doj/fisa/1980rept.html Foreign Intelligence Surveillance Act 1980 Annual Report ] ] This number has steadily grown to 2224 warrants [http://www.fas.org/irp/agency/doj/fisa/2006rept.pdf] in 2006.In the period 1979-2006 a total of 22,990 applications for warrants were made to the Court of which 22,985 were approved (sometimes with modifications; or with the splitting up, or combining together, of warrants for legal purposes), and only 5 were definitively rejected. [ [http://www.epic.org/privacy/wiretap/stats/fisa_stats.html EPIC: FISA Orders 1979-2006 ] ]Electronic surveillance
Generally, the statute permits electronic surveillance in two scenarios.
Without a court order
The
President may authorize, through theAttorney General , electronic surveillance without a court order for the period of one year provided it is only for foreign intelligence information; targeting foreign powers as defined by 50 U.S.C. §1801(a)(1),(2),(3) [http://www.law.cornell.edu/uscode/html/uscode50/usc_sec_50_00001801----000-.html#a 50 U.S.C. §1801(a)] Definition of Foreign power] or their agents; and there is no substantial likelihood that the surveillance will acquire the contents of any communication to which aUnited States person is a party.USC|50|1802(a)(1), Conditions under which the President, through the Attorney General, may authorize electronic surveillance without a court order]The Attorney General is required to make a certification of these conditions under seal to the
Foreign Intelligence Surveillance Court ,USC|50|1802(a)(3), Requirement of the Attorney General's to file reports under seal on warrantless surveillance to the FISC] and report on their compliance to the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence.USC|50|1802(a)(2), Requirement of the Attorney General's to report on compliance with warrantless surveillance requirements to Congress]Since USC|50|1802(a)(1)(A) of this act specifically limits warrantless surveillance to foreign powers as defined by 50 U.S.C. §1801(a) (1),(2), (3) and omits the definitions contained in 50 U.S.C. §1801(a) (4),(5),(6) the act does not authorize the use of warrantless surveillance on: groups engaged in international terrorism or activities in preparation therefore; foreign-based political organizations, not substantially composed of United States persons; or entities that are directed and controlled by a foreign government or governments. [http://www.law.cornell.edu/uscode/html/uscode50/usc_sec_50_00001802----000-.html#a_1_A 50 U.S.C. sect;1802 (a)(1)(A)] The limitation of warrantless surveillance to foreign powers as defined in 50 U.S.C § 1801 (a) (1),(2), and (3)] Under the FISA act, anyone who engages in electronic surveillance except as authorized by statute is subject to both criminal penalties [http://www.law.cornell.edu/uscode/html/uscode50/usc_sec_50_00001809----000-.html 50 U.S.C. §1809] - Criminal sanctions] and civil liabilities. [http://www.law.cornell.edu/uscode/html/uscode50/usc_sec_50_00001810----000-.html 50 U.S.C. §1810] - Civil liability]
Under 50 U.S.C. § 1811, the President may also authorize warrantless surveillance at the beginning of a war. Specifically, he may authorize such surveillance "for a period not to exceed fifteen calendar days following a declaration of war by the Congress." [http://www.law.cornell.edu/uscode/html/uscode50/usc_sec_50_00001811----000-.html 50 U.S.C. § 1811] - Authorization during time of war]
With a court order
Alternatively, the government may seek a court order permitting the surveillance using the FISA court. [http://www.law.cornell.edu/uscode/html/uscode50/usc_sec_50_00001805----000-.html 50 U.S.C §1805] Electronic surveillance with a court order] Approval of a FISA application requires the court find
probable cause that the target of the surveillance be a "foreign power" or an "agent of a foreign power", and that the places at which surveillance is requested is used or will be used by that foreign power or its agent. In addition, the court must find that the proposed surveillance meet certain "minimization requirements" for information pertaining to US persons. [http://www.law.cornell.edu/uscode/html/uscode50/usc_sec_50_00001801----000-.html#h 50 U.S.C. §1801(5)] Minimization procedures definition]Physical searches
In addition to electronic surveillance, FISA permits the "physical search" of the "premises, information, material, or property used exclusively by" a foreign power.
The requirements and procedures are nearly identical to those for electronic surveillance.
FISA court
The Act created the
Foreign Intelligence Surveillance Court (FISC) and enabled it to oversee requests for surveillance warrants by federal police agencies (primarily the F.B.I.) against suspected foreign intelligence agents inside the U.S. The court is located within the Department of Justice headquarters building. The court is staffed by eleven judges appointed by theChief Justice of the United States to serve seven year terms.Proceedings before the FISA court are "
ex parte " and non-adversarial. The court hears evidence presented solely by the Department of Justice. There is no provision for a release of information regarding such hearings, or for the record of information actually collected.Denials of FISA applications by the FISC may be appealed to the Foreign Intelligence Surveillance Court of Review. The Court of Review is a three judge panel. Since its creation, the court has only come into session once in2002 .Remedies for violations
Both the subchapters covering physical searches and electronic surveillance provide for criminal and civil liability for violations of FISA.
Criminal sanctions follows violations of electronic surveillance by "
intent ionally" engaging in electronic surveillance under the color of law or through disclosing information known to have been obtained through unauthorized surveillance. The penalties for either act are fines up to $10,000, up to five years in jail, or both.In addition, the statute creates a
cause of action for private individuals whose communications were unlawfully monitored. The statute permits actualdamages of not less than $1,000 or $100 per day. In addition, that statute authorizespunitive damages and an award ofattorney's fees .Similar liability is found under the subchapter pertaining to physical searches.
In both cases, the statute creates an
affirmative defense for a law enforcement agent acting within their official duties and pursuant to a valid court order. Presumably, such a defense is not available to those operating exclusively under presidential authorization.Lone wolf amendment
In 2004, FISA was amended to include a "lone wolf" provision. USC|50|1801(b){1)(C). A "lone wolf" is a non-US person who engages in or prepares for international terrorism. The provision amended the definition of "foreign power" to permit the FISA courts to issue surveillance and physical search orders without having to find a connection between the "lone wolf" and a foreign government or terrorist group. [http://www.fas.org/irp/crs/RS22011.pdf “Lone Wolf” Amendment to the Foreign Intelligence Surveillance Act] , via fas.org]
Constitutionality
Before FISA
In 1967, the
Supreme Court of the United States held that the requirements of the Fourth Amendment applied equally to electronic surveillance and to physical searches. "Katz v. United States ", 389 U.S. 347 (1967). The Court did not address whether such requirements apply to issues ofnational security . Shortly after, in 1972, the Court took up the issue again in "United States v. United States District Court, Plamondon", where the court held that court approval was required in order for the domestic surveillance to satisfy the Fourth Amendment. 407 U.S. 297 (1972). Justice Powell wrote that the decision did not address this issue that "may be involved with respect to activities of foreign powers or their agents."In the time immediately preceding FISA, a number of courts squarely addressed the issue of "warrantless wiretaps". In both "United States v. Brown", 484 F.2d 418 (5th Cir. 1973), and "United States v. Butenko", 494 F.2d 593 (3rd Cir. 1974), the courts upheld warrantless wiretaps. In "Brown", a US citizen's conversation was captured by a wiretap authorized by the Attorney General for foreign intelligence purposes. In "Butenko", the court held a wiretap valid if the primary purpose was for gathering foreign intelligence information.
A
plurality opinion in "Zweibon v. Mitchell", 516 F.2d 594 (D.C. Cir. 1975), held that a warrant was required for the domestic surveillance of a domestic organization. In this case, the court found that the domestic organization was not a "foreign power or their agent", and "absent exigent circumstances, all warrantless electronic surveillance is unreasonable and therefore unconstitutional."Post FISA
There have been very few cases involving the
constitutional ity of FISA. In two lower court decisions, the courts found FISA constitutional.In the "United States v. Duggan", thedefendant s were members of theIrish Republican Army . 743 F.2d 59 (2nd Cir., 1984). They were convicted for various violations regarding the shipment ofexplosive s andfirearm s. The court held that there were compelling considerations of national security in the distinction between the treatment of U.S. citizens and non-resident aliens.In the "United States v. Nicholson", the defendant moved to suppress all evidence gathered under a FISA order. 955 F.Supp. 588 (Va. 1997). The court affirmed the denial of the motion. There the court flatly rejected claims that FISA violated
Due process clause of the Fifth Amendment,Equal protection ,Separation of powers , nor theRight to counsel provided by the Sixth Amendment.However, in a third case, the special review court for FISA, the equivalent of a Circuit Court Of Appeals, opined differently should FISA limit the President's inherent authority for warrantless searches in the foreign intelligence area. In "In re Sealed Case", 310 F.3d 717, 742 (Foreign Intel. Surv. Ct. of Rev. 2002) the special court stated “ [A] ll the other courts to have decided the issue [have] held that the President did have inherent authority to conduct warrantless searches to obtain foreign intelligence information . . . . We take for granted that the President does have that authority and, assuming that is so, FISA could not encroach on the President’s constitutional power.”
Criticisms
K. A. Taipale of the
World Policy Institute , James Jay Carafano of theHeritage Foundation , [ [http://www.washingtontimes.com/commentary/20060124-104527-1255r.htm Commentary] , Wash. Times, Jan. 24, 2006] and Philip Bobbitt of the University of Texas Law School, [ [http://www.nytimes.com/2006/01/30/opinion/30bobbitt.html?ex=1139374800&en=c455580a2c60431a&ei=5070 Why We Listen] , N.Y. Times, Jan. 30, 2006] among others, [ [http://www.denverpost.com/search/ci_3469783 The Eavesdropping Debate We Should be Having] ] have argued that FISA may need to be amended (to include, among other things, procedures for programmatic approvals) as it may no longer be adequate to address certain foreign intelligence needs and technology developments, including: the transition from circuit-based communications to packet-based communications; theglobalization of communications infrastructure; and the development of automated monitoring techniques, includingdata mining andtraffic analysis . [ [http://ssrn.com/abstract=889120 "Whispering Wires and Warrantless Wiretaps"] , N.Y.U. Rev. L. & Sec., No. VII Supl. (Spring 2006)]The need for programmatic approval of technology-enabled surveillance programs is particularly crucial in foreign intelligence. See, for example, John R. Schmidt, the associate attorney general (1994–1997) in the Justice Department under President Bill Clinton, [" [http://www.chicagotribune.com/news/opinion/chi-0602120419feb12,0,6895976.story?coll=chi-newsopinioncommentary-hed A historical solution to the Bush spying issue] ," Chicago Tribune (Feb. 12, 2006)] recalling early arguments made by then-Attorney General
Edward Levi to theChurch Committee that foreign intelligence surveillance legislation should include provisions for programmatically authorizing surveillance programs because of the particular needs of foreign intelligence where "virtually continuous surveillance, which by its nature does not have specifically predetermined targets" may be required. In these situations, "the efficiency of a warrant requirement would be minimal."And, in a recent essay, Judge
Richard A. Posner opined that FISA “retains value as a framework for monitoring the communications of known terrorists, but it is hopeless as a framework for detecting terrorists. [FISA] requires that surveillance be conducted pursuant to warrants based on probable cause to believe that the target of surveillance is a terrorist, when the desperate need is to find out who is a terrorist.” [ [http://online.wsj.com/article/SB113996743590074183-search.html A New Surveillance Act] , Wall Street Journal February 15, 2006]Amendments
Terrorist Surveillance Act of 2006
On
March 16 ,2006 , SenatorsMike DeWine (R-OH),Lindsey Graham (R-SC),Chuck Hagel (R-NE), andOlympia Snowe (R-ME) introduced the Terrorist Surveillance Act of 2006 (S.2455), [ [http://www.fas.org/irp/congress/2006_cr/dewine031606.html Press Release of Senator DeWine] ] [ [http://www.cdt.org/security/20060324dewinebill.pdf Dewine Bill as introduced] ] under which the President would be given certain additional limited statutory authority to conduct electronic surveillance of suspected terrorists in the United States subject to enhanced Congressional oversight. Also onMarch 16 ,2006 , SenatorArlen Specter (R-PA) introduced theNational Security Surveillance Act of 2006 (USBill|110|S.|2453), [ [http://information-retrieval.info/docs/SpecterFloorStmt.pdf Specter Floor Statement] ] [ [http://information-retrieval.info/docs/NSAfinal.pdf Specter Bill as introduced] ] which would amend FISA to grant retroactive amnesty [ [http://www.washingtonpost.com/wp-dyn/content/article/2006/06/08/AR2006060801992.html Specter Offers Compromise on NSA Surveillance] , Washington Post,June 9 ,2006 ] for warrantless surveillance conducted under presidential authority and provide FISA court (FISC) jurisdiction to review, authorize, and oversight "electronic surveillance programs." OnMay 24 ,2006 , Senator Specter and SenatorDianne Feinstein (D-CA) introduced theForeign Intelligence Surveillance Improvement and Enhancement Act of 2006 (USBill|110|S.|3001) asserting FISA as the exclusive means to conduct foreign intelligence surveillance.All three competing bills were the subject of Judiciary Committee hearings throughout the summer. [ [http://www.fas.org/irp/congress/2006_hr/index.html#fisa4 FIS linking to 2006 FISA Congressional Hearings material] ] On
September 13 ,2006 , the Senate Judiciary Committee voted to approve all three mutually exclusive bills, thus, leaving it to the full Senate to resolve. [ [http://www.fas.org/blog/secrecy/2006/09/conflicting_bills_on_warrantle.html Conflicting Bills on Warrantless Surveillance Advance in Senate] , Secrecy News,September 14 ,2006 ]On
July 18 ,2006 , U.S. RepresentativeHeather Wilson (R-NM) introduced theElectronic Surveillance Modernization Act (USBill|110|H.R.|5825). Wilson's bill would give the President the authority to authorize electronic surveillance of international phone calls and e-mail linked specifically to identified terrorist groups immediately following or in anticipation of an armed or terrorist attack on the United States. Surveillance beyond the initial authorized period would require a FISA warrant or a presidential certification to Congress. OnSeptember 28 ,2006 the House of Representatives passed Wilson's bill and it was referred to the Senate. [ [http://wilson.house.gov/NewsAction.asp?FormMode=Releases&ID=1309 House Passes Wilson FISA Bill] , Press Release,September 29 ,2006 .]Protect America Act of 2007
On July 28, 2007, President Bush called on Congress to pass legislation to reform the FISA in order to ease restrictions on surveillance of terrorist suspects where one party (or both parties) to the communication are located overseas. He asked that Congress pass the legislation before its August 2007 recess. On August 3, 2007, the Senate passed a Republican-sponsored version of FISA ( [http://www.opencongress.org/bill/110-s1927/show S. 1927] ) in a vote of 60 to 28. The House followed by passing the bill, 227–183. The
Protect America Act of 2007 (USPL|110|55, USBill|110|S.|1927) was then signed into law byGeorge W. Bush on2007-08-05 . [cite web
url=http://www.fas.org/sgp/crs/intel/RL34143.pdf
title=P.L. 110-55, the Protect America Act of 2007:Modifications to the Foreign Intelligence Surveillance Act
last=Bazan
first=Elizabeth
publisher=Congressional Research Service
date=2008-02-14
accessdate=2008-04-29]Under the Protect America Act of 2007, communications that begin or end in a foreign country may be wiretapped by the US government without supervision by the FISA Court. The Act removes from the definition of "electronic surveillance" in FISA any surveillance directed at a person reasonably believed to be located outside the United States. As such, surveillance of these communications no longer requires a government application to, and order issuing from, the FISA Court.
The Act provides procedures for the government to "certify" the legality of an acquisition program, for the government to issue directives to providers to provide data or assistance under a particular program, and for the government and recipient of a directive to seek from the FISA Court, respectively, an order to compel provider compliance or relief from an unlawful directive. Providers receive costs and full immunity from civil suits for compliance with any directives issued pursuant to the Act.
A summary of key provisions follows.
The Act empowers the Attorney General or Director of National Intelligence ("DNI") to authorize, for up to one year, the acquisition of communications concerning "persons reasonably believed to be outside the United States" if the Attorney General and DNI determine that each of five criteria has been met:
#there are reasonable procedures in place for determining that the acquisition concerns persons reasonably believed to be located outside the United States;
#the acquisition does not constitute electronic surveillance (meaning it does not involve solely domestic communications);
#the acquisition involves obtaining the communications data from or with the assistance of a communications service provider who has access to communications;
#a significant purpose of the acquisition is to obtain foreign intelligence information; and
#minimization procedures outlined in the FISA will be used.This determination by the Attorney General and DNI must be certified in writing, under oath, and supported by appropriate affidavit(s). If immediate action by the government is required and time does not permit the preparation of a certification, the Attorney General or DNI can direct the acquisition orally, with a certification to follow within 72 hours. The certification is then filed with the FISA Court.
Once the certification is filed with the FISA Court, the Attorney General or DNI can direct a provider to undertake or assist in the undertaking of the acquisition.
If a provider fails to comply with a directive issued by the Attorney General or DNI, the Attorney General may seek an order from the FISA Court compelling compliance with the directive. Failure to obey an order of the FISA Court may be punished as a contempt of court.
Likewise, a person receiving a directive may challenge the legality of that directive by filing a petition with the FISA Court. An initial review must be conducted within 48 hours of the filing to determine whether the petition is frivolous, and a final determination concerning any non-frivolous petitions must be made – in writing – within 72 hours of receipt of the petition.
Determinations of the FISA Court may be appealed to the Foreign Intelligence Court of Appeals, and a petition for a writ of certiorari of a decision from the FICA can be made to the U.S. Supreme Court.
All petitions must be filed under seal.
The Act allows providers to be compensated, at the prevailing rate, for providing assistance as directed by the Attorney General or DNI.
The Act provides explicit immunity from civil suit in any federal or state court for providing any information, facilities, or assistance in accordance with a directive under the Act.
Within 120 days, the Attorney General must submit to the FISA Court for its approval the procedures by which the government will determine that acquisitions authorized by the Act conform with the Act and do not involve purely domestic communications. The FISA Court then will determine whether the procedures comply with the Act. The FISA Court thereafter will enter an order either approving the procedures or directing the government to submit new procedures within 30 days or cease any acquisitions under the government procedures. The government may appeal a ruling of the FISA Court to the FICA and ultimately the Supreme Court.
On a semiannual basis, the Attorney General shall inform the Intelligence and Judiciary Committees of the House and Senate of incidents of noncompliance with a directive issued by the Attorney General or the DNI, incidents of noncompliance with FISA Court-approved procedures by the Intelligence Community, and the number of certifications and directives issued during the reporting period.
The amendments to FISA made by the Act expire 180 days after enactment, except that any order in effect on the date of enactment remains in effect until the date of expiration of such order and such orders can be reauthorized by the FISA Court.”cite web
last = Sussmann
first = Michael
title = FISA Amended to Allow Acquisition of Cross-Border Communications Without a Court Order
publisher = DigestibleLaw.com
date = 2007-08-06
url = http://www.digestiblelaw.com/advertising/blogQ.aspx?entry=3915&id=1
accessdate = 2007-08-11 ]ubsequent developments
Legal experts experienced in national security issues are divided on how broadly the new law could be interpreted or applied. Some believe that due to subtle changes in the definitions of terms such as "electronic surveillance," it could empower the government to conduct warrantless physical searches and even seizures of communications and computer devices and their data which belong to U.S. citizens while they are in the United States, if the government contended that those searches and potential seizures were related to its surveillance of parties outside the United States. Intelligence officials, while declining to comment directly on such possibilities, respond that such interpretations are overly broad readings of the act, and unlikely to actually occur. Democratic lawmakers have nonetheless indicated that they are planning to introduce a revised version of the legislation for consideration as early as September of 2007. [cite news
author = James Risen and Eric Lichtblau
title = Concerns Raised on Wider Spying Under New Law
publisher = The New York Times
date = 2007-08-19
url = http://www.nytimes.com/2007/08/19/washington/19fisa.html?hp=&pagewanted=all
accessdate = 2007-08-19 ]In a
September 10 ,2007 address at a symposium on modernizing FISA held atGeorgetown University Law Center 's National Security Center, Kenneth L. Wainstein, Assistant Attorney General for National Security, argued against the current six-monthsunset provision in the Protect America Act of 2007, saying that the broadened surveillance powers the act provides for should be made permanent. Wainstein proposed that internal audits by the Office of theDirector of National Intelligence and the National Security Division of the Justice Department, with reporting to select groups of Congressmen, would insure that that the expanded capability would not be abused. [cite news
author = Ryan Singel
title = Government Promises to Self-Audit Spying to Make Powers Permanent
publisher = Wired News
date = 2007-09-11
url = http://blog.wired.com/27bstroke6/2007/09/government-prom.html
accessdate = 2007-09-11 ]Also on September 10, DNI Mike McConnell testified before the
Senate Committee on Homeland Security and Governmental Affairs that the Protect America Act had helped foil a major terror plot in Germany. U.S. intelligence-community officials questioned the accuracy of McConnell's testimony and urged his office to correct it, which he did in a statement issued September 12, 2007. Critics cited the incident as an example of the Bush administration's exaggerated claims and contradictory statements about surveillance activities. Counterterrorism officials familiar with the background of McConnell's testimony said they did not believe he made inaccurate statements intentionally as part of any strategy by the administration to persuade Congress to make the new eavesdropping law permanent. Those officials said they believed McConnell gave the wrong answer because he was overwhelmed with information and merely mixed up his facts. [cite news
author = Michael Isikoff and Mark Hosenball
title = Spy Master Admits Error
publisher = Newsweek
date = 2007-09-12
url = http://www.msnbc.msn.com/id/20749773/site/newsweek/page/0/
accessdate = 2007-09-13 ]Speaking at
National Security Agency headquarters in Fort Meade, Maryland on September 19, 2007, PresidentGeorge W. Bush urged Congress to make the provisions of the Protect America Act permanent. Bush also called for retroactive immunity for telecommunications companies who had cooperated with government surveillance efforts, saying, "It's particularly important for Congress to provide meaningful liability protection to those companies now facing multibillion-dollar lawsuits only because they are believed to have assisted in efforts to defend our nation, following the 9/11 attacks." [cite web
author = Anne Broache
title = President Bush rallies for immortal spy law changes, telco protection
publisher = CNET News.com
date = 2007-09-12
url = http://www.news.com/8301-10784_3-9781991-7.html
accessdate = 2007-09-20]On
October 4 ,2007 , the bipartisan Liberty and Security Committee of theConstitution Project , co-chaired byDavid Keene andDavid D. Cole , issued its "Statement on the Protect America Act." [http://www.constitutionproject.org/pdf/Statement%20on%20PAA1.pdf] The Statement urged Congress not to reauthorize the PAA, saying the language of the bill "runs contrary to the tripartite balance of power the Framers envisioned for our constitutional democracy, and poses a serious threat to the very notion of government of the people, by the people and for the people." Some in the legal community have questioned the constitutionality of any legislation that would retroactively immunize telecommunications firms alleged to have cooperated with the government from civil liability for having potentially violated their customers' privacy rights. [cite web
author = Anthony J. Seebok
title = Is It Constitutional for the Senate to Retroactively Immunize From Civil Liability the Telecoms That Provided the Government with Information About Customers' Communications?
publisher = FindLaw Writ Legal News and Commentary
date = 2008-01-29
url = http://writ.news.findlaw.com/scripts/printer_friendly.pl?page=/sebok/20080129.html
accessdate = 2008-02-07]In an article appearing in the January/February 2008 issue of the
Institute of Electrical and Electronics Engineers journal of Security and Privacy, noted technology experts from academia and the computing industry found significant flaws in the technical implementation of the Protect America Act which they said created serious security risks, including the danger that such a surveillance system could be exploited by unauthorized users, criminally misused by trusted insiders, or abused by the government. [cite journal
author = Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter G. Neumann, and Jennifer Rexford
title = Risking Communications Security: Potential Hazards of the Protect America Act
journal =Institute of Electrical and Electronics Engineers Security and Privacy
date = 2008-02-05
url = http://www.crypto.com/papers/paa-ieee.pdf
accessdate = 2008-02-05]On
October 7 ,2007 ,The Washington Post reported that House Democrats planned to introduce alternative legislation which would provide for one-year "umbrella" warrants, and would require the Justice Department inspector general to audit the use of those warrants and issue quarterly reports to a special FISA court and to Congress. The proposed bill would not include immunity for telecommunications firms facing lawsuits in connection with the administration'sNSA warrantless surveillance program. House Democrats said that as long as the administration withholds requested documents explaining the basis for the program that they cannot consider immunity for firms alleged to have facilitated it. [cite news
author = Ellen Nakashima
title = Democrats to Offer New Surveillance Rules
publisher = The Washington Post
date = 2007-10-07
url = http://www.washingtonpost.com/wp-dyn/content/article/2007/10/06/AR2007100601265_pf.html
accessdate = 2007-10-07 ] InOctober 10 ,2007 comments on the White House South Lawn, President Bush said he would not sign any bill that did not provide retroactive immunity for telecommunications corporations. [cite news
author = David Stout
title = Bush Presses Congress on New Eavesdropping Law
publisher = The New York Times
date = 2007-10-10
url = http://www.nytimes.com/2007/10/10/washington/10cnd-nsa.html?pagewanted=print
accessdate = 2007-10-10 ]On
October 18 ,2007 , the House Democratic leadership put off a vote on the proposed legislation by the full chamber to avoid consideration of a Republican measure that made specific references toOsama bin Laden . At the same time, theSenate Intelligence Committee reportedly reached a compromise with the White House on a different proposal that would give telephone carriers legal immunity for any role they played in the National Security Agency’s domestic eavesdropping program approved by President Bush after the Sept. 11 terrorist attacks. [cite news
author = Eric Lichtblau
title = Senate Deal on Immunity for Phone Companies
publisher = The New York Times
date = 2007-10-18
url = http://www.nytimes.com/2007/10/18/washington/18nsa.html?pagewanted=print
accessdate = 2007-10-18 ]On
November 15 ,2007 , theSenate Judiciary Committee voted 10-9 along party lines to send an alternative measure to the full Senate other than the one the intelligence committee had crafted with the White House. The proposal would leave to the full Senate whether or not to provide retroactive immunity to telecommunications firms that cooperated with the NSA. Judiciary Committee chairmanPatrick Leahy said that granting such immunity would give the Bush administration a "blank check" to do what it wants without regard to the law.Arlen Specter of Pennsylvania, the top Republican on the committee, said that court cases may be the only way Congress can learn exactly how far outside the law the administration has gone in eavesdropping in the United States. When the full Senate takes up the bill, Specter is expected to offer a compromise that would shield the companies from financial ruin but allow lawsuits to go forward by having the federal government stand in for the companies at trial. [cite news
author = Pamela Hess
title = Congress Takes Up Terrorist Surveillance
publisher = Associated Press
date = 2007-11-15
url = http://ap.google.com/article/ALeqM5hJKgeE0Z-SivATjok-utYBdh9wDwD8SUD33G0
accessdate = 2007-11-15 ]On the same day, the House of Representatives voted 227-189 to approve a Democratic bill that would expand court oversight of government surveillance inside the United States while denying immunity to telecom companies.
House Judiciary Committee chairmanJohn Conyers left the door open to an immunity deal in the future, but said that the White House must first give Congress access to classified documents specifying what the companies did that requires legal immunity. [cite news
author = Pamela Hess
title = House OKs Surveillance Oversight Bill
publisher = Associated Press
date = 2007-11-15
url = http://ap.google.com/article/ALeqM5hJKgeE0Z-SivATjok-utYBdh9wDwD8SUFI800
accessdate = 2007-11-15 ]In February 2008, the Senate passed the version of the new FISA that would allow telecom companies immunity. On
March 13 ,2008 , the U.S. House of Representatives held a secret session to discuss related information. OnMarch 14 , the House voted 213-197 to approve a bill that would "not" grant telecom immunity — far short of the 2/3 majority required to override a Presidential veto. [cite news
author = Jonathan Weisman
title = House Passes a Surveillance Bill Not to Bush's Liking
publisher = The Washington Post
date = 2008-03-15
url = http://www.washingtonpost.com/wp-dyn/content/article/2008/03/14/AR2008031400803.html?hpid=topnews
accessdate = 2008-03-28 ] The Senate and House bills are compared and contrasted in a June 12, 2008 report from theCongressional Research Service . [cite web
url=http://www.fas.org/sgp/crs/intel/RL34533.pdf
title=The Foreign Intelligence Surveillance Act: Comparison of House-Passed H.R. 3773, S. 2248 as Reported by the Senate Select Committee on Intelligence, and S. 2248 as Reported Out of the Senate Judiciary Committee
last=Bazan
first=Elizabeth
publisher=Congressional Research Service
date=2008-02-08
accessdate=2008-04-29]ee also
*
Operation Minaret
*Project Shamrock
*Watergate
*Church Committee
* United States v. United States District Court, Plamondon
*United States Foreign Intelligence Surveillance Court
**United States Foreign Intelligence Surveillance Court of Review
*NSA warrantless surveillance controversy References
External links
* [http://www.eff.org/Censorship/Terrorism_militias/fisa_faq.html The Electronic Frontier Foundation's Foreign Intelligence Surveillance Act FAQ]
* [http://www.epic.org/privacy/terrorism/fisa/ EPIC FISA page]
* [http://www.fas.org/irp/agency/doj/fisa/index.html Foreign Intelligence Surveillance Act] resources from the Federation of American Scientists
* [http://www.fas.org/sgp/crs/intel/RL34279.pdf The Foreign Intelligence Surveillance Act: A Brief Overview of Selected Issues] , Congressional Research Service, February 8, 2008
* [http://www.fas.org/irp/crs/RL30465.pdf The Foreign Intelligence Surveillance Act: An Overview of the Statutory Framework and Recent Judicial Decisions] , Congressional Research Service, September 22, 2004
* [http://www.pbs.org/now/shows/411/index.html NOW on PBS Uncovers Surveillance Details Through AT&T Whistleblower]
* [http://www.fas.org/irp/agency/doj/fisa/2004rept.pdf 2004 FISA Annual Report to Congress] , via FAS
* [http://www.epic.org/privacy/terrorism/usapatriot/foia/fisa-recipe.pdf FBI memo, "What do I have to do to get a FISA?]
* [http://fas.org/irp/agency/doj/fisa/sojudge.pdf "So Judge, How Do I Get That FISA Warrant?" The Policy and Procedure for Conducting Electronic Surveillance.] The Army Lawyer, October 1997
* - Jimmy Carter's Executive order to provide as set forth in FISA for the authorization of electronic surveillance for foreign intelligence purposes
* - Bill Clinton's Executive order to provide for the authorization of physical searches for foreign intelligence purposes
* David Alan Jordan, [http://iilj.org/documents/Jordan-47_BC_L_Rev_000.pdf Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice over Internet Protocol] - Boston College Law Review, Vol. 47, 2006
*K. A. Taipale , [http://ssrn.com/abstract=959927 "The Ear of Dionysus: Rethinking Foreign Intelligence Surveillance"] , 9 Yale J. L. & Tech. 128 (Spring 2007).
* [http://eteraz.org/2007/08/11/short-primer-on-new-fisa/ Plural Politics Protect American Act Plainspeak Legal Primer]
* [http://www.ss8.com/pdfs/Ready_Guide_Download_Version.pdf Guide to lawful intercept legislation around the world]
* [http://digital50.com/news/items/PR/2007/09/10/DC02717/prepared-remarks-of-kenneth-l-wainstein-assistant-attorney-general-for-national-sec.html Prepared Remarks of Kenneth L. Wainstein, Assistant Attorney General for National Security] at the Georgetown University Law Center's National Security Center Symposium on Foreign Intelligence Surveillance Act Modernization, September 10, 2007
* [http://www.dotgovwatch.com/?/archives/17-Department-of-Justice-Website-Illegally-Lobbies-Congress-LifeAndLiberty.gov.html Department of Justice on FISA and the Protect America Act]
* [http://www.opencongress.org/bill/110-s2248/show OpenCongress on S.2248 Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2007]
* [http://www.fas.org/sgp/congress/2008/secret.html Secret House meeting on FISA]
Wikimedia Foundation. 2010.