Calendar: Senate 2D
Calendar: Senate 2D
643
95TH CONGRESS
2D SESSION
SENATE
{ No. 95-701
REPoR
REPORT
together with
ADDITIONAL VIEWS
[To accompany S. 1566].
S. 1566 amends title 18, United States Code, by adding after chapter
119 a new chapter 120 entitled "Electronic Surveillance Within the
United States for Foreign Intelligence Purposes." The bill requires a
court order for electronic surveillance as defined therein conducted for
foreign intelligence purposes within the United States or targeted
against the international comunications of particular U.S. persons who
are in the United States. The bill establishes the exclusive means by
which such surveillance may be conducted. S. 1566 does not require a
court order for electronic surveillance abroad, and the bill does not
address the question whether the President has any constitutional
power to conduct electronic surveillance of a U.S. person abroad
without a court order to acquire foreign intelligence information, if
such power exists. 2
Under S. 1566 the Attorney General, upon the general authorization
of the President for the conduct of electronic surveillance within the
United States for foreign intelligence purposes, iay authorize appli-
cations to members of a special court for orders to conduct such surveil-
lance. Applications are to be made to one of seven district judges pub-
licly designated by the Chief Justice of the United States to serve stag-
gered 7-year terms on a special court. Denials of such applications may
be appealed to a special three-judge court of review and ultimately to
the Supreme Court.
Approval of an application under the bill would require a finding by
the court that the target of the surveillance is a "foreign power" or an
"agent of a foreign power" and that the facilities or place at which the
1Hearing before the Subcommittee on Criminal Laws and Procedures of the Senate
Committee on the Judiciry. Foreign Intelligence Surveillance Act of 1977, 95th Cong., lst
sess.. p. 13 (1977.
I Further legislation may be needed to protect the rights of Americans abroad from
improper electronic surveillance by their Government. Such legislation should he considered
separately because the Issues are different than those posed by electronic sur-
veillance within the United States. S. 2525. the National Intelligence Reorganization
and Reform Act of 1978. has been introduced by members of the Select Committee on
Intelligence to fill this gap. Title III of that bill would establish procedures for electronic
surveillance of Americans abroad.
surveillance is to be directed are being used or are about to be used
by a foreign power or an agent of a foreign power. A "foreign power"
may include a foreign government, a faction of a foreign government,
a foreign-based terrorist group, a foreign-based political organization,
or an entity directed and controlled by a foreign government. An
"agent of a foreign power" includes non-resident aliens who act as
officers or employees of foreign powers or who act on behalf of foreign
powers which engage in clandestine intelligence activities contrary to
the interests of this country. U.S. persons meet the "agent of a foreign
power" criteria if they engage in certain activities on behalf of a
foreign power which involve or may involve criminal acts.
The court would also be required to find that procedures proposed in
the application adequately minimize the acquisition and retention, and
prohibit the dissemination, of information concerning U.S. persons
which does not relate to national defense, foreign affairs, or the ter-
rorist, sabotage, or clandestine intelligence activities of a foreign
power. Additional limits are placed on the dissemination of informa-
tion relating solely to national defense or foreign affairs.
Finally, a certification or certifications must be made by the As-
sistant to the President for Nati6nal Security Affairs or an executive
branch official or officials designated by the President from among
those executive officers with responsibilities for national security or de-
fense who are appointed by the President with the advice and consent
of the Senate. Those officials would be required to certify that
any information sought by the surveillance relates to, and if concern-
ing a U.S. person is necessary to, the national defense or the successful
conduct of foreign affairs of the United States or the ability of the
United States to protect against grave hostile acts or the terrorist,
sabotage, or clandestine intelligence activities of a foreign power. The
court would be required to review each certification for surveillance
of a U.S. person and to determine that the certification is not clearly
erroneous.
The court could approve electronic surveillance for foreign intel-
ligence purposes for a period of 90 days or, in the case of surveillance of
a foreign government, faction, or entity openly controlled by a foreign
government, for a period of up to 1 year. Any extension of the surveil-
lance beyond that period would require a reapplication to the court
and new findings as required for the original order.
Emergency surveillance without a court order would be permitted in
limited circumstances, but a court order must be obtained within
24 hours of the initiation of the surveillance.
S. 1566 requires annual reports to the Administrative Office of the
U.S. Courts and to the Congress of statistics regarding applications
and orders for electronic surveillance. The Attorney General is also re-
quied, on a semiannual basis, to inform fully the House Permanent
Select Committee on Intelligence and, the Senate Select Committee on
Intelligence concerning all electronic surveillance under the bill; and
nothing in the bill 'estricts the authority of those committees to obtain
further information related to their congressional oversight respon-
sibilities. The Senate committee is required to report annually to the
Senate on the implementation of the bill.
II. STATEMENT OF NEED
24-419 0 - 78 - 2
veillance is needed to acquire foreign intelligence information, nor is
it given a detailed description of the nature of the information sought
or the means of surveillance to be used. The surveillance may last as
long as a year before a new court order is required.
Even though the surveillance targets are not U.S. persons, substan-
tial information about Americans may be acquired from surveillance
of foreign powers. The primary role for the court in these circum-
stances is to ensure compliance with the requirement for minimiza-
tion procedures governing incidentally acquired information concern-
ing U.S. persons. Procedures are required to insure that, if the infor-
mation relates solely to national security or foreign affairs interests,
it is not disseminated in a manner that identifies a U.S. person unless
the person's identity is needed to understand or assess information
about a foreign power or unless the information is otherwise publicly
available. The court may monitor compliance with these procedures.
Surveillance of certain foreign persons and certain foreign organi-
zations, other than "official" foreign powers, may be conducted to ob-
tain foreign intelligence. In such cases the judge is fully informed
of (but does not review) the basis for the certification and is given a
detailed description of the nature of the information sought and a
statement of the means of surveillance to be used. Such surveillance
may last only 90 days before a new court order is required. Foreign
persons acting in the United States as officers or employees of foreign
powers may be targeted for surveillance to collect foreign intelli-
gence; but these requirements ensure that the information sought
fulfills proper intelligence objectives and that the surveillance does
not intrude unnecessarily into the personal privacy of the individual.
U.S. citizens, resident aliens, and foreign visitors to the United
States may not be targeted for surveillance to collect foreign intelli-
gence unless they also meet the separate foreign counterintelligence
standards regarding terrorism, sabotage, or clandestine intelligence
activities, discussed below. In the case of a U.S. person, the court
would review the certification that the information sought is neces-
sary for national security or foreign affairs purposes. Such judicial
review of the Executive Branch certification, based on a "clearly
erroneous" standard, occurs only if the surveillance target is a U.S.
person.
In summary, the authority for surveillance to collect positive for-
eign intelligence varies according to the nature of the target and the
type of information sought. Because the judicial role is very limited,
it is the responsibility of the Attorney General and the certifying ofi-
cials designated by the President to make determinations that take into
account the characteristics of the foreign power, the risks involved, and
the relevance of the information sought to the fulfillment of proper
foreign intelligence objectives. Regular reporting to the Intelligence
Committees of the House and Senate is also required to help insure
that these surveillances are consistent with U.S. foreign policy, na-
tional defense needs, and appropriate standards of international
conduct.
B. Foreigncounterintelligenceinvestigations
Electronic surveillance for foreign counterintelligence and counter-
terrorism purposes requires different standards an procedures. U.S.
persons may be authorized targets, and the surveillance is part of an
investigative process often designed to protect against the commis-
sion of serious crimes such as espionage, sabotage, assassination, kid-
naping, and terrorist acts committed by or oil behalf of foreign
powers. Intelligence and criminal law enforcement tend to merge in
this area.' The targeting of U.S. persons and the overlap with crimi-
nal law enforcement require close attention to traditional fourth
amendment principles.
S. 1566 departs from ordinary criminal law enforcement procedures
in several ways. A judicial warrant is normally granted upon
probable cause that a crime has been or is about to be committed.
By contrast, in some cases the bill allows issuance of a court order
upon probable cause that a person's activities "may involve" a criminal
violation. Unlike the provisions of the Omnibus crime Control Act of
1968 governing surveillance in regular criminal investigations, there is
no listing of specific Federal criminal laws. Moreover, acts of sabotage
and terrorism need not be violations of the criminal statutes of the
United States, so long as they "would be criminal" under the laws of the
United States or (in the case of terrorism) of any State if committed
within this country. No showing of criminal activity is required
where the target is a foreign person who acts on behalf of a foreign
power which engages in clandestine intelligence activities contrary to
the interests of the United States.
Additionally, surveillances conducted under S. 1566 need not stop
once conclusive evidence of a crime is obtained, but instead may be
extended longer where protective measures other than arrest and
prosecution are more appropriate. The requirement of subsequent
notice to the surveillance target is eliminated, unless the fruits are
to be used against him in legal proceedings. In camera procedures
are adopted for subsequent challenges to the legality of the surveil-
lance.
The question is whether departures from traditional Fourth Amend-
ment criminal procedures "are reasonable both in relation to the legiti-
mate need of Government for intelligence information and the pro-
tected rights of our citizens," as required by the Supreme Court's lead-
inW decision in this field, United States v. United States District Court,
40< U.S. 297, 323 (1972).
One approach to balancing these interests is the adoption of certain
safeguards which are more stringent than conventional criminal pro-
cedures. S. 1566 does this in two ways. First, it requires the Judge to
review the certification that surveillance of a U.S. person is necessary
for foreign counterintelligence purposes. Because the probable cause
standards are more flexible under the bill. the judge must also deter-
minie that the executive branch certification of necessity is not "clearly
erroneous."' Second, the bill provides for close and continuing com-
I Surveillance to collect positive foreign intelligence may result in the incidental acqul-
sition of information about crimes; but that is not its objective. By contrast, forelvn
counterintelligence surveillance frequently seeks information needed to detect or anticipate
the commission of crimes
SThe "clearly erroneous" standard drawn from administrative law is more suitable
here than the "probable cause" standard, which takes its meaning from the criminal law.
The judge is required to review an administrative determination that, in the pursuit of a
particular type of investigation, surveillance is justified to acquire necessary information.
The judge may request additional information in order to understand fully how and why
the surveillance is expected to contribute to the investigation.
munication with the congressional committees having jurisdiction over
foreign intelligence activities. Such communication is inappropriate
in conventional criminal cases where the objective is primarily prose-
cution and subsequent notice is served on the surveillance targets. But
in the absence of notice or frequent judicial review in subsequent
prosecution, as with criminal cases, congressional oversight supplies
a compensating check.
Even with these added safeguards, the main issue is whether the
investigative process in foreign counterintelligence cases requires spe-
cific departures from normal Fourth Amendment procedures. Based
on its study of both electronic surveillance and foreign counterintelli-
gence investigations, the Select Committee on Intelligence has con-
cluded that such departures are reasonable. The need to preserve
secrecy for sensitive counterintelligence sources and methods justifies
elimination of the notice requirement, consolidation of judicial au-
thority in a special court, and in canwra procedures allowing per-
sons to challenge illegal surveillance without endangering the security
of legitimate surveillances.
The international character of foreign terrorist activities fully
supports the more flexible probable cause standard allowing sur-
veillance where foreign-based terrorist activities abroad "would"
violate Federal or State laws if committed here. The United States
has a duty to ad vise other nations if foreign agents within this coun-
try are mounting serious acts of violence to be committed outside our
borders. We expect other countries to warn us when they learn of
plans to commit serious violence in the United States; and this obli-
gation should be reciprocal. The Federal Government also has an
obligation to the States whose law enforcement agencies lack the
capability of detecting foreign-based terrorist activities.
The absence of a list of specific Federal statutes furnishing the
basis for surveillance, as in Title III, raises other considerations.
With respect to terrorism, there is a limitation to violent acts on be-
half of a foreign-based group which appear intended to intimidate or
coerce the civilian population, to influence Government policy by in-
timidation or coercion, or to affect the conduct of government. by
assassination or, kidnaping. There is no similar definition of the
terms "clandestine intelligence-gathering activities" and "any other
clandestine intelligence activities." The imprecision of these terms
reflects an assessment of the nature and difficulty of foreign counter-
intelligence investigations.
The essential point is that, if electronic surveillance is to make an
effective contribution to foreign counterintelligence, it must be avail-
able for use when necessary for the investigative process. The criminal
laws are enacted to establish standards for arrest and conviction; and
they supply guidance for investigations conducted to collect evidence
for prosecution. Foreign counterintelligence investigations have dif-
ferent objectives. They succeed when the United States can insure that
an intelligence network is not obtaining vital information, that a
suspected agent's future access to such information is controlled effec-
tively, and that security precautions are strengthened in areas of top
priority for the foreign intelligance service. Prosecution is a useful
deterrent, but only where the advantages outweigh. the sacrifice of
other interests. Therefore, procedures appropriate in regular criminal
investigations need modification to fit the counterintelligence context.
S. 1566 adopts probable cause standards that allow surveillance at
an early stage in the investigative process by not requiring that a
crime be imminent or that the elements of a specific offense exist. Sur-
veillance of clandestine intelligence gathering activities that "may
involve" a criminal violation, and of persons engaged in activities that
"may be" in preparation for sabotage or terrorism, makes it possible
to discover whether a person is likely to commit an offense in the
foreseeable future.
On the other hand, because of the danger to activities protected
by the first amendment, the standard for "clandestine intelligence
activities" other than intelligence gathering requires probable cause
that such activities are pursuant to the direction of a foreign intelli-
gence service and that they "involve or are about to involve" a Federal
crime. The bill also provides that no U.S. person may be considered
an "agent of a foreign power" solely upon the basis of activities pro-
tected by the first amendment to the Constitution.
Finally, foreign counterintelligence surveillance of unofficial foreign
visitors to the United States must meet the same probable cause stand-
ard as surveillance of U.S. persons, unless they act on behalf of par-
ticular foreign governments which engage in clandestine intelligence
activities contrary to U.S. interests. Such surveillance is limited to
persons who, on the basis of past experience *with a particular foreign
government, are reasonably believed to have clandestine intelligence
assignments from the foreign government. It is intended to apply to
visitors acting for foreign governments such as the Soviet Union
which have used such visitors to the 'United States for clandestine
intelligence purposes. This provision is tailored.to demonstrated for-
eign counterintelligence requirements.
To summarize, the select committee's review of U.S. foreign counter-
intelligence requirements confirms the current relevance of the state-
ment made 20 years ago in a study by the Fund for the Republic:
The problems of crime detection in combating espionage are
not ordinary ones. Espionage is a crime which succeeds only
by secrecy. Moreover, spies work not for themselves or pri-
vately organized crime "syndicates," but as agents of national
states. Their activities are therefore likely to be carefully
planned, highly organized, and carried on by techniques
skillfully designed to prevent detection.6
The response of the United States to such threats must be equally
sophisticated, and S. 1566 provides techniques to. satisfy this need.
C. Foreign intelligence surveillance and the fourth amendment
S. 1566 embodies a legislative judgment that court orders and other
procedural" safeguards are necessary to insure that electronic sur-
veillance by the U.S. Government within this country conforms to the
fundamental principles of the fourth amendment. The bill has been
designed carefully to accommodate the two basic subdivisions of
S uad for te RepublD,
Digeat of the Public Record of Communtem in the United
statek' (New York, 1955); p. 29.
United States intelligence requirements-collection of positive foreign
intelligence and of information needed for foreign counterintelligence
and counterterroism investigations.
In the first instance, surveillance solely to collect foreign intel-
lience is not targeted against U.S. citizens or resident aliens and dis-
tinctions are made among "official" foreign powers, other types of
foreign organizations, and foreign persons who act as officers or em-
ployees of foreign powers. Because the purpose is unrelated to law en-
orcement and the targets are foreign powers or their officials, the
fourth amendment may allow wider latitude in conducting reason-
able research or surveillance operations designed to serve important
national defense and foreign affairs interests. As former Attorney,
General Levi stated:
"[A] central concern of the fourth amendment was with
intrusions to obtain evidence to incriminate the victim of
the search. This concern has been reflected in Supreme Court-
decisions which have traditionally treated intrusions to
gather incriminatory evidence differently from intrusions
for neutral or benign purposes.... Where the purpose.-or ef-
fect is noncriminal, the search and seizure is perceived As
less troublesome and there is a readiness to find reasonable-
ness even in the absence of a judicial warrant. By contrast,
where the purpose of the intrusion is to gather incriminatory
evidence, and hence hostile, or when the consequence -of the
intrusion is the sanction of the criminal law, greater protec-
tions may be given."
Although foreign persons are protected by the fourth amendment
when they are in the United States,8 the noncriminal purpose, the
linitation: to officers or employees acting as such in the Uhited States
and the certification requirements satisfy the "reasonable search"
standard of the Fourth Amendment as it may apply to sui-veillance
conducted solely for the collection of foreign intelligence. Court or-
ders simply ensure that the targets fit the categories and that miiimi-
zation procedures limit the acquisition, retention, and dissemiiration of
incidentally acquired information about U.S. persons. Congressional
review supplies an added check.
Foreign counterintelligence surveillance may target U.S. persons
and may involve detection of crimes, even though criminal prosecu-
tion may not result. The departures here from conventional Fourth
Amendment doctrine have, therefore, been given close scrutiny to en-
sure that the procedures established in S. 1566 are reasonable in rela-
tion to legitimate foreign counterintelligence requirements and the
protected rights of individuals. Their reasonableness depends, in part,
upon an assessment of the difficulties of investigating activities plan-
ned, directed, and supported from abroad -byforeign intelligence serv-
ices and foreign-based terrorist groups. The differences between- ordi-
nary criminal investigations to gather evidence of specific crimes and
foreign counterintelligence investigations to uncover and monitor
clandestine activities have been taken into account. Other factors in-
' Church committee Hearings, Vol. 5, pp. 75-76. See Camara v. Municipal Court, 387
U.S. 523 (1967); Almeida-Sanchez V. United States, 413 U.S. 266 (1973).
* Abel v. United Statea, 362 U.S. 217 (1960).
clude the international responsibilities of the United States, the duties
of the Federal Government to the States in matters involving foreign
terrorism, and the need to maintain the secrecy of lawful counter-
intelligence sources and methods.
An effort has been made to balance the need for surveillance at
earlier stages of the investigative process and the protection afforded
by the Fourth Amendment's requirement that searches for normal
criminal law enforcement purposes be conducted only where a crime
has been or is about to be committed. Because of the wider latitude
granted by the bill, judicial review of the necessity for surveillance of
U.S. persons and regular congressional oversight are required to en-
sure the proper exercise of administrative discretion.
That these departures from traditional Fourth Amendment crimi-
nal law enforcement standards are constitutional is supported by the
Supreme Court's opinion in the Keith case. Although considering do-
mestic security surveillance, the principles apply with even greater
force to foreign counterintelligence surveillance. Justice Powell's
opinion for the court states:
[W]e do not hold that the same type of standards and
procedures prescribed by title III are necessarily applicable
to this case. We recognize that domestic security surveillance
may involve different policy and practical considerations
from the surveillance of "ordinary crime." The gathering
of security intelligence is often long range and involves the
interrelation of various sources and types of information.
The exact targets of such surveillance may be more difficult
to identify than in surveillance operations against many
types of crime specified in title III. Often, too, the emphasis
of domestic intelligence gathering is on the prevention of
unlawful activity or the enhancement of the Government's
preparedness for some possible future crisis or emergency.
Thus, the focus of domestic surveillance may be less precise
than that directed against moie conventional types of crime.
Given these potential distinctions between title III criminal
surveillances and those involving the domestic security, Con-
gress may wish to consider protective standards for the latter
which differ from those already prescribed for specified
crimes in title III. Different standards may be compatible
with the fourth amendment if they are reasonable both in
relation to the legitimate need of Government for intelli-
ence information and the protected rights of our citizens.
for the warrant application may vary according to the gov-
ernment interest to be enforced and the nature of citizen
rights deserving protection . . . It may be that Congress, for
example, would judge that the application and affidavit show-
ing probable cause need not follow the exact requirements of
section 2518 [of title 18] but should allege other circumstances
more appropriate to domestic security cases; that the request
for prior court authorization could, in sensitive cases, be
made to any member of a specially designated court . .. ; and
that the time and reporting requirements need not be so strict,
as those in section 2518.
16
The above paragraph does not, of course, attempt to guide
the congressional judgment but rather to delineate the pres-
ent scope of our own opinion.. . . We do hold, however, that
prior judicialapproval is required for the type of domestic
security surveillance involved in this case and that such ap-
proval may be made in accordance with such reasonable,.
standards as the Congress may prescribe. United States v.
United States District Court, 407 U.S. 297, 322-324 (1972).
Far more than in domestic security matters, foreign counterintel-
ligence investigations are "long range" and involve "the interrela-
tion of various sources and types of information." Targets are often
"difficult to identify," and the emphasis is primarily "on the preven-
tion of unlawful activity." Where foreign governments and foreign-
based organizations are the source of the danger, the Government
clearly must prepare for a "possible future crisis or emergency." When
clandestine intelligence and terrorist activities are planned, directed,
and supported from abroad, rather than within the United States, the
investigative task is extraordinarily difficult. Therefore, the focus of
surveillance of suspected foreign agents must "be less precise" if the
United States is to maintain adequate security.
The Select Committee on Intelligence believes the standards and
procedures of S. 1566 reconcile national intelligence and counterin-
telligence needs with constitutional principles in a way that is con-
sistent with both national security and individual rights. S. 1566
would allow electronic surveillance in circumstances where, because of
uicertainty about the legal requirements, the Government may other-
wise be reluctant to use this technique for detecting dangerous foreign
intelligence and terrorist activities by foreign powers in this country.
At the same time it provides safeguards that have not existed before
and that may reasonably be expected to prevent any recurrence of the
abuses of the past.
SECTION-BY-SECTION ANALYSIS
Section 1 of the bill provides that te act may be cited as the
"Foreign Intelligence Surveillance Act of 1978".
Section 2 of the bill amends title 18, United States Code by adding
a new chapter 120 composed of sections 2521-2528 as follows:
Section 925921
Subsection (a) provides that, except for those119 terms specifically
the definitions of chapter relating to the
defined in this section,
interception of wire and oi al communications apply to this chapter as
well..
A. "Foreign power"
six separate ways:
Subsection (b) (1) defines "foreign power" in thereof,
(1) "A foreign government Or any component whether or
not recognized by the United States." This cateory would include
foreign embassies and consulates 'and similar "cofficial" foreign govern-
ment establishments that are located in the United States.
(2) "A faction of a foreign nation or nations, not substantially
composed of permanent resident aliens or citizens of the United States."
This category is intended to include factions of a foreign nation or
nations which are in a contest for power over, or control of the territory
of, a foreign nation or nations. The faction must be foreign-based and
controlled from abroad. Specifically excluded from this category is any
faction of a foreign government or governments which is substantially
composed of permanent resident aliens or citizens of the United States.
The word "substantially" means a significant proportion, but less than
a majority.
(3) "An entity, which is openly acknowledged by a foreign govern-
ment or governments to be directed and controlled by-such foreign
government or governments." This category is specifically delineated
in order to treat entities of this type in the same manner as the gov-
ernment they serve by including them within those "official" foreign
powers subject to court-ordered surveillance under a less stringent
standard. That standard permits less information to be given to the
judge and allows the surveillance to be continued for a longer period
of time before reauthorization. Only entities "openly acknowledged"
by a foreign government to be directed and controlled by it are sub-
ject to the extended court orders granted on a lesser showing.
Those entities which are clearly arms of a government or govern-
ments and not privately controlled meet this definition. This category
woidd permit surveillance, for example. of a legitimate commercial
establishment which is directed and controlled by a foreign govern-
ment and which, because of the nature of its operations, constitutes a
souree of foreign intelligence information otherwise unavailable to
the U.S. Government.
The committee is concerned about the possibility that many innocent
U.S. persons might be employed by such entities, and that their offices
and telephones could be subject to surveillance. The committee would
have preferred that only entities not substantially composed of U.S.
persons could be subject to surveillance as "foreign powers." If such,
this requirement had been included in the bill, however, those entities
could have hired a substantial number of Americans in order to avoid
surveillance. To provide adequate protection for Americans, the Com-
mittee strengthened the "minimization" requirements to limit strictly
the dissemination of information about U.S. persons where such infor-
mation relates solely to national security or foreign affairs interests.
See section 2521(b) (8), infra.
A law firm, public relations firm, or other legitimate concern that
merely represents a foreign government or its interests is not an entity
in this category. The question whether a group. commercial enterprise,
or organization comes within the scope of this definition is one for
the court to answer on the basis of a probable cause standard.
(4) "A foreign-based terrorist group." This category refers to a
foreign-based group engaged in "terrorism," as defined. 'Ihe committee
recognizes that international terrorist groups may have members from
various nations and may not have any clearly definable "base."
Under this definition the group must be "foreign-based"; that is, it
may not be based in the United States. It is the committee's belief that
a domestic terrorist group should not be subjected to electronic surveil-
lance pursuant to this chapter. Where a group is not domestically
based, but derives strength and refuge by organizing, planningi and
24-419 0 - 78 - 3
preparing its terrorist activities or training its members outside the
United States, then that group is a legitimate target for intelligence
surveillance under this bill no matter what the, citizenship of its
members.
The committee does not intend to authorize electronic surveillance
under any circumstances for the class of groups included by the
Supreme Court within the scope of the Keith decision requiring ju-
dicial warrants for alleged threats to security of a purely domestic
nature. The rare case might arise where a foreign-based terrorist group
is substantially composed of U.S. persons. The judge must examine-
the circumstances carefully in order to determine whether the orga-
nization is a foreign-based terrorist group and not a domestic group
with some 'foreign aspects to it. If there is significant doubt whether
a terrorist group substantially composed of U.S. persons is foreign-
based, the committee intends that this bill not apply. Instead, the
Government may rely upon the domestic law enforcement surveillance
procedures of title III of the Omnibus Crime Control Act of 1968,
contained in chapter 119, United States Code.
(5) "A foreign-based political organization, not substantially com-
posed of permanent resident aliens or citizens of the United States."
This category is intended to include, for example, foreign political
parties that are mere instrumentalities of a foreign government and
that are not substantially composed of Americans. This category
clearly does not include organizations comprised of Americans of
Greek, Irish, Jewish, Chinese, or other extraction who have joined to-
gether out of interest in or concern for the country of their ethnic
origin.
(6) "An entity, which is directed and controlled by a foreign gov-
ernment or governments." This category is similar to category (3)
above, except that the entity need not be openly acknowledged to be
directed and controlled by a foreign government or governments. Such
an entity must be acting as arm of the government with respect to the
activities that are of foreign intelligence or counterintelligence sig-
nificance. An example would be an entity which appears to be a legiti-
mate commercial establishment, but which is being utilized by a foreign
government as a cover for espionage activities. The concerns set forth
with respect to openly controlled entities apply to this category as
well. There is an added danger that electronic surveillance of a
covertly controlled entity, substantially composed of U.S. persons,
would offer a means for evading the requirements for surveillance of
individual U.S. persons. Therefore, it is important to emphasize that
the judge must find probable cause that the entity is both "directed"
and "controlled" by a foreign government or governments. Merely
following the directions of a foreign government which wants a group
to lobby or speak out publicly on behalf of the government's interests,
is not it itself sufficient to place the group in this category.
A revised definition of "United States person" insures that, where
the entity is substantially composed of American citizens or perma-
ment resident aliens, minimization procedures will apply, and the
judge will review, applying a "clearly erroneous" standard, the cer-
tification that surveillance of the entity is needed to acquire foreign
intelligence information. See section 2521(b) (9), infra.
B. "Agent of a foreign power"
Subsection (b) (2) defines an "agent of a foreign power" in two
separate ways. Subparagraph (A) (1) includes persons who are not
U.S. persons and who act in the United States as officers or employees
of a foreign power. The definition is framed in this way because it is
presumed that nonresident aliens who act in the United States as
officers or employees of a foreign power are likely sources of foreign
intelligence or counterintelligence information. The definition ex-
cludes persons who serve as officers or employees of a foreign power
in their home country, but do not act in that capacity in the United
States. The reference to employees of a foreign power is meant to
include those persons who have a normal employee-employer relation-
ship. The subparagraph is otherwise not intended to encompass such
foreign visitors as professors, lecturers, exchange students, performers,
or athletes, even if they are receiving remuneration or expenses from
their home government in such capacity.
Given the tenuous relationship of such officers and employees with
the United States and their close relationship with a foreign power,
this standard is considered to be reasonable in light of the Govern-
ment's legitimate need for foreign intelligence and counterintelligence
information and the nature of the interests upon which the search
would intrude. There are several other limitations on such surveillance.
An executive official must certify that the information sought from sur-
veillance of an officer or employee of a foreign power relates to the
national defense or security or to the successful conduct of foreign
affairs, or that such information relates to the ability of the United
States to protect against grave hostile acts, sabotage, terrorism, or
clandestine intelligence activities. The committee does not intend that
there should be indiscriminate surveillance of officers or employees
of foreign powers within the United States. The judge will be in-
formed of the type of information sought and the means by which
the surveillance will be effected: and the surveillance may last no
longer than 90 days before reauthorization. The judge will not, how-
ever, review the Executive Branch certification of need for the stir-
veillance.
Subparagraphs (A) (ii) and (B) (i)-(iv) of subsection (b) (2)
comprise the second definition of "agent of a foreign power." They
define an agent in terms of the activities in which he is or may be
engaged, or may engage, for or on behalf of a foreign power.
1. Foreign iitors
24-419 0 - 78 - 4
ticular member was acting pursuant to the direction of a foreign in-
telligence service for purposes of this subparagraph.
It is necessary that the person be aware he is acting on behalf of a
foreign power. It would not suffice to establish probable cause that the
American is engaged in a covert activity at the direction of a foreign
power; the government must establish probable cause that the Ameri-
can knows his efforts are on behalf of a foreign power.
4. Sabotage or terrorism
Subparagraph (B) (iii) allows surveillance of any person, includ-
ing a U.S. person, who knowingly engages in sabotage or terrorism, or
activities which are or may be in preparation therefor, for or on be-
half of a foreign power. This standard differs from S. 3197, as reported
favorably by the committee in the 94th Congress, which covered any
person who "knowingly engages in or knowingly acts in furtherance
of," sabotage or terrorism for or on behalf of a foreign power. It also
differs from S. 1566, as reported by the Judiciary Committee, which
adopted the standard "knowingly engages in activities that involve
or will involve sabotage or terrorism for or on behalf of a foreign
power." The committee has modified these earlier standards in order
to accommodate the need to anticipate serious terrorist crimes. The
words "will involve" in the bill as reported by the Judiciary Com-
mittee require too high a degree of certainty that terrorism will take
place, especially compared to the "may involve" standard for spying
in subparagraph (B) (i).
The terms "sabotage" and "terrorism" are defined separately and
require a showing of criminal activity. Again, in no event is mere
sympathy for, identity of interest with, or vocal support for the
goals of a foreign group, even a foreign-based terrorist group, suf-
ficient to justify surveillance under this subparagraph. The term "ac-
tivities which are or may be in preparation" for sabotage or terrorism
is intended to encompass activities supportive of acts of serious
violence--for example, purchase or surreptitious importation into the
United States of explosives, planning for assassinations, or financing
of or training for such activities.
The term "preparation" does not require evidence of preparation for
one specific terrorist act, because the definition of "terrorism" speaks of
"violent acts" and means a range of acts, not just a single act. "Prepara-
tion" normally means preparation for a specific crime, which might be
too strict a standard for surveillance under this bill. However, the term
"preparation" would not have its normal meaning because of the
special definition of "terrorism." It could reasonably be interpreted to
cover, for example, providing the personnel, training, funding, or other
means for the commission of acts of terrorism, rather than one partic-
ular bombing. The "preparation" provision is also adopted in order to
permit electronic surveillance at some point before the danger sought to
be prevented-for example, a kidnaping, bombing, or hijacking, ac-
tually occurs. This standard is in no way intended to dilute the re-
quirement of knowledge, or the requisite connection with a foreign
power.
Concern has been expressed that this subparagraph could permit
surveillance solely on the basis of information that someone might com-
mit acts of terrorism or sabotage in the distant future. This is clearly
not the intent of the committee. There must be a showing of ac-
tivities which may be in preparation for the commission of such acts.
The committee has concluded, however, that surveillance is justified on
the basis of somewhat less information regarding the nature of this
activity than would be required in the absence of the words
"may be." Under the extension provisions of section 2525 (c), discussed
infra, the judge can insist on examining the fruits of any earlier sur-
veillance when it is necessary to determine whether there is still prob-
able cause to believe that the individual may be preparing for sabotage
or terrorism.
This subparagraph would allow surveillance where the Government
cannot establish probable cause that an individual has knowingly en-
gaged in preparation for sabotage or terrorism, but where there are
sufficient specific and articulable facts to indicate that the individual's
activities may be in preparation for sabotage or terrorism. As with the
"may involve" standard of subparagraph (B) (i), the judge is expected
to take all the known circumstances into account. The circumstances
must be such as would lead a reasonable man to conclude that there is
probable cause to believe the person is knowingly engaged in activities
which may be in preparation for sabotage or terrorism.
Finally, any person targeted for surveillance under this subpara-
graph must be shown to have a knowing and substantial connection
with the foreign power for whom he is working. In the case of ter-
rorism, it is anticipated that in most cases this connection will be shown
to exist with a foreign-based terrorist group. The person must be
clearly and knowingly acting for or on behalf of the foreign power
itself. As elsewhere in this bill, the committee does not intend to au-
thorize electronic surveillance under any circumstances in which a
warrant would be required by the Supreme Court decision in the Keith
case.
The rare case might arise where a U.S. person is acting for or on
behalf of a foreign-based terrorist group that is substantially com-
posed of U.S. persons. In such a case, the judge must examine the cir-
cumstances carefully in order to determine whether the organization
is,. a foreign-based terrorist group and not a domestic group
with some foreign aspects to it. Where there is significant doubt as to
whether a terrorist group substantially composed of U.S. persons is
foreign-based, the committee intends that the provisions of this bill
should not apply to a person acting for or on behalf of such group. In-
stead, the Government may rely on the domestic law enforcement sur-
veillance procedures of title III of the Omnibus Crime Control Act of
1968, contained in chapter 119, of title 18, United States Code.
thin testifying in 1976 at the House hearings on S. 3197, Attorney General Levi confirmed
"Mr. KASTENMaHR. How do you understand the
foreign power? Is there enoufh precedent or other term other hostile acts of a
language so that we under-
standl precisely what the hostile acts constitute, whether a criticism of our par-
ticipation in the Vietnam war would be a hostile act? Or
an American ship on the high seas is a more classical attempting to board
hostile acts? case. How broad is the
"Attorney General LEvi. I certainly wouldn't think that hostile
criticism. I would assum e-I don't know that we can get a better acts involved
It does after all sa 'against actual or potential attack or definition. But
So that it is the actual or potential attack which really gives other hostile acts.'
the flavor to what
is meant.
be much more In
th t"Mr.tefore
KATENMET. other words, it must be seen in a broader context, and
limited?
"Attorney General LEvi. I would think so." (1976 House hearings
10-11.)
Subparagraph (C) (i) of this subsection includes information which
relates to, and if concerning a U.S. person is necessary to, the ability of
the United States to protect against sabotage or terrorism by a foreign
power or foreign agent. It is anticipated that the type of information
described in this subparagraph will be the type sought when an elec-
tronic surveillance is instituted against the type of foreign power de-
fined in section 2521(b) (1) (D), or against the type of foreign agent
defined in section 2521(b) (2) (B) (iii).
Subparagraph (C) (ii) of this subsection includes information which
relates to, arid if concerning a U.S. person is necessary to, the ability
of the United States to protect against the clandestine intelligence ac-
tivities of an intelligence service or network of a foreign power or a
foreign agent. This subparagraph encompasses classic counterintelli-
gence information; that is, information deemed necessary to the Na-
tion's ability to discover and protect against the clandestine intelligence
activities of foreign powers or their agents in the United States. This
subsection is not intended to encompass information sought about
political activity by U.S. citizens allegedly "necessary" to determine
the nature and extent of any possible involvement in those activities
by the intelligence services of foreign powers. Such a dragnet ap-
proach to counterintelligence has been the basis for improper investi-
gations of citizens in the past and is not intended to be a permissible
avenue of "foreign intelligence" collection under this subparagraph.
Nor does this subparagraph include efforts to prevent "news leaks" or
to prevent publication of such leaked information in the American
press, unless there is reason to believe that such leaking or publication
is itself being done by an agent of a foreign intelligence service and
that such publication would harm the national security.
Information about a UT.S. person's private affairs is not intended to
be included in the meaning of "foreign intelligence information" un-
less it relates to his activities on behalf of a foreign power. This is
achieved by including in each subsection of the foreign intelligence
definition the requirement that the information sought actually "re-
lates to" the type of information that is necessary. For example, the
Government could not seek purely personal information about a U.S.
citizen or permanent resident alien, who is a suspected spy, upon a
theory that it might learn something that would be "compromising."
The bill makes clear that only information about U.S. citizens or per-
manent resident aliens that is necessary to the ability of the United
States to protect against clandestine intelligence activities may be
sought. This restriction might now always be fully applicable to agents
of foreign powers as defined in section 2521(b) (2) (A) (i) or (ii),
because information about their private lives may itself he foreign in-
telligence information. For example, such information might identify
their true status or reveal the intentions or activities of the foreign
pbower of which they are officers or employees.
E. Flectronicsurveillance
Subsection (b) (6) defines electronic surveillance to include four
separate types of activities.
Subparagraph (A) protects U.S. persons who are located in the
United States from being targeted in their domestic or international
24-419 0 - 78 - 5
communications without a court order no matter where the surveil-
lance is being carried out. Under S. 3197 as reported by the commit-
tee in the 94th Congress, such targeting did not fall within the con-
fines of the bill; this provision is, therefore, a significant extension of
the protections afforded U.S. citizens and resident aliens. The sub-
paragraph covers the acquisition of the contents of a wire or radio
communication of a U.S. person by intentionally targeting that par-
ticular, known U.S. citizen or resident alien, provided that the per-
son is located within the United States. Thus, for example, the watch-
listing activities of the National Security Agency, if directed against
the international communications of particular U.S. persons who
are in the United States, would require a court order under this
provision.14
Only acquisition of the contents of those wire or radio communica-
tions made with a reasonable expectation of privacy where a warrant
would be required for law enforcement purposes is covered by sub-
paragraph (A). It is the committee's intent that acquisition of the
contents of a wire communication, without the consent of any party
thereto, would clearly be included; the definition of "wire communi-
cation" under 18 U.S.C. 2510(1) covers any communication "made in
whole or part" through wire facilities. Excluded would be, for ex-
ample, commercial broadcasts, as well as ham radio and citizen band
radio broadcasts [cf. 47 U.S.C. 605; United States v. Hall, 488 F. 2d
193 (9th Cir. 1973)].
The term "intentionally.targeting" a particular, known U.S. person
who is in the United States includes the deliberate use of a surveillance
device to monitor a specific channel of communication which would not
be surveilled but for the purpose of acquiring information about a
party who is a particular, named U.S. person located within the United
States. 5 It also includes the deliberate use of surveillance techniques
which can monitor numerous channels of communication among num-
erous parties, where the techniques are designed to select out from
among those communications the communications to which a particular
U.S. person located in the United States is a party, and where the com-
munications are selected either by name or by other information which
would identify the particular person and would select out his
communications.
This subparagraph does not apply to the acquisition of the contents
of international or foreign communications, where the contents are not
acquired by intentionally targeting a particular known U.S. person
who is in the Inited States. Therefore, this bill does not afford protec-
tions to U.S. persons who are abroad. Nor does it regulate the acqui-
sition of the contents of international communications of U.S. persons
who are in the United States, where the contents are acquired uninten-
tionally. The committee is concerned about the need to provide statu-
tory protections and regulations in this area, but does not believe that
14 See Church committee hearings, vol. 5, esp. pp. 5-24; Church Committee Report,
book II, pp. 58-60, 108 and 308-311, and book III, pp. 738-783, for careful documenta-
tion of the nature of such National Security Agency activities undertaken on behalf
of the FBI, CIA. Army intelligence, and the Bureau of Narcotics and Dangerous Drugs, and
the technological problems associated with authorized NSA signals intelligence activities.
i' This would include wiretapping a foreign official when the intent and purpose of the
wire tap Is to hear the conversations of a particular U.S. person with that foreign official,
if the foreign official would not otherwise have been wire tapped for different purposes. Such
a case has occurred in the past. See Church Committee Report, book II, p. 228.
S. 1566 is the appropriate vehicle for doing so. The standards and pro-
cedures for overseas surveillance may have to be different than those
provided in S. 1566 for electronic surveillance within the United
States or targeted against U.S. persons who are in the United
States. Instead, members of the committee have introduced as part of
S. 2525, the National Intelligence Reorganization and Reform Act of
1978, separate legislation to achieve this objective.
The fact that S. 1566 does not bring the overseas surveillance activi-
ties of the U.S. intelligence community within its purview, however,
should not be viewed as congressional authorization of such activities
as they affect the privacy interests of Americans. The committee
merely recognizes at this point that such overseas surveillance activi-
ties are not covered by this bill. In any case, the requirements of the
fourth amendment would, of course, continue to apply to this type of
communications intelligence activity."
Subparagraph (B) includes the acquisition, by an electronic, me-
chanical, or other surveillance device, of the contents of a wire com-
munication to or from a person in the United States without the
consent of any party thereto when such acquisition occurs in the
United States while the communication is being transmitted by
wire. As this subdefinition makes clear, one party to the wire
communication may be outside the United States if the acquisi-
tion occurs within the United States. Thus, either a wholly do-
mestic telephone call or on international telephone call can be the
subject of electronic surveillance under this subdefinition if the acqui-
sition of the content of the call takes place in this country and if such
acquisition occurs "while the communication is being transmitted by
wire." This second qualifier is necessary because the definition of "wire
communication" under 18 U.S.C. 2510(1) includes any communica-
tion "made in whole or in part" through wire facilities. Because most
telephonic and telegraphic communications are transmitted at least
in part by microwave radio transmissions, subdefinition (B) is
meant to apply only to those surveillance practices which are effected
by tapping into the wire over which the communication is being trans-
mitted. The interception of the microwave radio transmission is meant
to be covered by subdefinition (C) if the sender and all intended re-
cipients are located within the United States, or by subdefinition (A)
if it is done through the targeting of a U.S. person who is in the
United States.
The surveillance covered by subparagraph (B) is not limited to the
acquisition of the oral, or verbal contents of a wire communication. It
includes the acquisition of any other contents of the communication,
for example, where computerized data is transmitted by wire. There-
fore, it includes any form of "pen register" or "touch-tone decoder"
device which is used to acquire, from the contents of a wire communi-
cation, the identities or locations of the parties to the communication.
Examination of telephone billing records in documentary form is not
16The committee notes with approval that electronic surveillance of American citizens
while abroad has been limited in part both by the President's Executive Order applicable to
the U.S. Intelligence community and by procedures approved by the Attorney General. See
Executive Order 12036, Jan. 24. 1978; testimony of Attorney General Edward H. Levi,
Church committee hearings. vol. 2, p. 60 ff. Thus, the surveillance of journalists, such as In
the Joseph Kraft case, would be prohibited.
covered. The committee is concerned about the need to protect the
privacy of such confidential records of the provision of telecommuni-
cations services, but does not believe that S. 1566 is the appropriate
measure in which to do so. As introduced, S. 2525, the National
Intelligence Reorganization and Reform Act of 1978, provides certain
statutory safeguards in this area.
Subparagraph (C) includes the intentional acquisition by an elec-
tronic, mechanical, or other surveillance device of the contents of a
totally domestic radio communication, without the consent of any
party thereto, made with a reasonable expectation of privacy and
under circumstances where a warrant would be required for law en-
forcement purposes, where both the sender and all intended recipients
are located within the United States. This part of the definition would
reach not only the acquisition of communications made wholly by radio
but also the acquisition of "wire communications" by means of inter-
cepting the radio transmitted portion of those communications within
the United States. The territorial limits of this subdefinition are not
dependent on the point of acquisition, as is the case with subdefinition
(B), but on the locations of the sender and intended recipients. Thus,
the acquisition of radio communications outside the territorial limits
of the United States would be covered if all of the parties were located
within the United States. Only acquisition of those domestic radio
communications made with a reasonable expectation of privacy where
a warrant would be required for law enforcement purposes would be
included in the term "electronic surveillance." This would exclude, for
example, commercial broadcasts, as well as ham radio and citizen band
radio broadcasts (cf. 47 U.S.C. section 605); United States v. Hall,
488 F. 2d 193 (9th Cir. 1973).
It is the committee's intent that the intentional acquisition of the
contents of a wire communication being transmitted by radio micro-
wave, without the consent of any party thereto and where all parties
to the communication are located in the United States, would clearly
be included here. The intentional acquisition of such contents is not
limited to, the intentional acquisition of oral or verbal contents. It in-
cludes the intentional acquisition of any other contents, as described
with respect to subparagraph (B).
Only "intentional" acquisitions of private domestic radio communi-
cations are within this subdefinition because, by their very nature,
radio transmissions may be intercepted anywhere in the world, even
though the sender and all intended recipients are in the United States.
Thus, intelligence collection may be targeted against foreign or inter-
national communications but accidentally and unintentionally acquire
the contents of communications intended to be totally domestic. As
amended by this committee, S. 1566 would require the destruction of
such contents in almost all circumstances. See Sec. 2 5 26(g). infra.
The effect of this amendment, in combination with subparagraphs
(A), (B), and (C) of this subsection, is to apply either a destruction
requirement or a court order requirement for the nonconsensual acqui
sition of all domestic radio communications made with a reasonable
expectation of privacy, the nonconsensual acquisition within the
United States of all wire communications, as defined in section 2510
(1), title 18, United States Code, and the targeting of particular
United States persons located in the United States in order to acquire
domestic or international communications made with a reasonable ex-
pectation of privacy.
Subparagraph (D) brings within the definition of "electronic sur-
veillance" the acquisition of information, not transmitted as a wire
communication or radio communication, by the installation or use
of an electronic, mechanical, or other surveillance device for moni-
toring in the United States under circumstances in which a person has
a reasonable expectation of privacy and a warrant would be required
for law enforcement purposes. This is intended to include the ac-
quisition of oral communications made by a person exhibiting an
expectation that such utterances are not subject to acquisition, under
circumstances justifying such expectation. In addition, it is meant
to include the installation of "beepers" and "transponders," if a
warrant would he required in the ordinary criminal context. United
States v. Holmes, 537 F.2d 227 (5th Cir. 1976). It could also include
miniaturized television cameras and other sophisticated devices not
aimed merely at communications.
This part of the definition is meant to be broadly inclusive, be-
cause the effect of including a particular means of surveillance is not
to prohibit it but to subject it to judicial review. It is not meant
to include, however, the acquisition of those international radio trans-
missions or international wire communications, when acquired by
intercepting radio transmissions, which are not acquired by targeting
a particular U.S. person in the United States. Nor, as earlier indicated,
is it meant to require a court order in any case where a search warrant
would not be required in an ordinary criminal context.
It has been held, for example, that fourth amendment protections a partici-
do not extend to activities undertaken in the open where be ob-
might
pant could reasonably anticipate that his activities
served." But two persons in a public park, far from any stranger,
would not reasonably anticipate that their conversations could be
and so would
overheard from afar through a directional microphone,
retain their right of privacy.
The definition of "electronic surveillance" applying to wire com-
munications has an explicit exception where any party has consented
This is intended to perpetuate the existing law
to the interception.
regarding consensual interceptions found in 18 U.S.C. section 2511
(2) (c) and in the case law interpreting 47 U.S.C. section 605.1
Whether consent may be inferred in a particular case will depend on
the facts and circumstances. The other parts of theof definition of
surveillance" require that the acquisition information
"celectronic
has a constitutionally
be under circumstances ii which a person be no such right in situations
of privacy. There may
protected right to by at least one party to the
where the acquisition is consented
communication or conversation.consent For instance, a body microphone
is an installation of a device
placed on an informer with his speaking to the informer may
to acquire information, but a person
Vaia nce Board v. Western Ajf Corp., 416 U.S. 861 (1974).
21 Air Potltionl U.S. 197
is Lopez v. United States, 373 U.S. 427 (19 63)-1athbun V. United States, 355
(1957).
have no justifiable expectation that the informer will not repeat,
record, or even transmit by a miniature transmitter what the person
voluntarily tells the informer.19
The committee does not intend the term "surveillance device" as
used in subparagraph (D) to include devices which are used inci-
dentally as part of a physical search, or the opening of mail, but which
do not constitute a device for monitoring. Lock picks, still cameras, and
similar devices can be used to acquire information, or to assist in the
acquisition of information, by means of physical search. So-called
chamfering devices can be used to open mail. This bill does not bring
these activities within its purview. Although it is desirable to develop
legislative controls over physical search techniques, the committee has
concluded that these practices are sufficiently different from electronic
surveillance as to require separate consideration by the Congress.
S. 2525, the National Intelligence Reorganization and Reform Act of
1978, addresses the problem of physical searches within the United
States or directed against U.S. persons abroad for intelligence pur-
poses. The fact that S. 1566 does not cover physical searches for in-
telligence purposes should not be viewed as congressional authoriza-
tion for such activities. In any case, the requirements of the fourth
amendment would, of course, continue to apply to this type of
activity. 20
Except for the use of a surveillance device as an incident to physical
search or mail opening, the term "device for monitoring" would apply
in any circumstances where a warrant would be required for law
enfbrcement purposes.
The provisions that "a warrant would be required for law enforce-
ment purposes" do not mean that a court must, previously, have
required a warrant for the particular type of surveillance activity
carried out under subparagraph (A), (C), or (D). The techniques
involved may not have been used for law enforcement purposes, or if
so used, may not have come before a court for a determination as to
whethqr a warrant is required. Nevertheless, the surveillance activity
is intended to be covered if a warrant would be required for law
enforcement purposes, as determined on the basis of an assessment of
the similarity with other surveillance activities which the courts have
ruled upon and the reasonableness of the expectation of privacy that
a U.S. person has with respect to such activity. The committee expects
that, if an agency wishes to use a related new surveillance technique, it
will seek a ruling from the Attorney General as to whether the tech-
nique requires a court order. The intelligence committees should be
advised of such rulings under the provisions of section 2528.
Law enforcement officials may, if they wish, continue to obtain an
ordinary search warrant or chapter 119 court order if the facts and
circumstances justify it.
F. "Attorney general"
Paragraph (7) defines "Attorney General" to mean the Attorney
General of the United States, the Acting Attorney General, or the
"United States v. White, 401 U.S. 745 (1971) ; but see the dissenting opinion of Mr.
Justice Harlan for a contrary view.
2 It should be noted that Executive Order 12036, Jan. 24, 1978, places limits on physical
searches and the opening of mail.
Deputy Attorney General. Under S. 3197 as reported in the 94th
Congress, only the Attorney General or the Acting Attorney General
could approve an application for an electronic surveillance order. S.
1566 as originally introduced permitted a specially designated Assist-
ant Attorney General to approve such applications. The administra-
tion saw a need to lessen the administrative burden on the Attorney
General which would be perpetuated even after this bill has estab-
lished the safeguards of a court order procedure.
With the assurance of Attorney General Bell in his testimony be-
fore the Judiciary Committee on S. 1566 that he would personally
continue to approve applications under the bill until standards of
review have been well established, that committee adopted a modified
version of the administration's proposal. It provides authority for the
Attorney General (or the Acting Attorney General) or the Deputy
Attorney General-rather than a specially designated Assistant At-
torney General-to approve applications for an electronic surveillance
order under this chapter. This committee endorses that approach. The
Deputy Attorney General is appropriate because, as the second-rank-
ing official in the Justice Department, he would most often be the Act-
ing Attorney General in the Attorney General's absence.
G. "Minimizationprocedures"
The minimization procedures of the bill provide vital safeguards
because they regulate the acquisition, retention, and dissemination of
information about U.S. persons, including persons who are not the au-
thorized targets of surveillance. For example, an entirely innocent
American might use a telephone that is tapped to target someone else.
Or an American might talk on the phone to a foreign official who is
under surveillance for purposes unrelated to the particular conversa-
tion. The procedures also protect Americans who are not parties to a
communication, but who are referred to in the communication; such
information has in the past been disseminated for improper purposes.
Paragraph (8) defines "minimization procedures" as procedures
reasonably designed to minimize the acquisition and retention, and
prohibit the dissemnination, except as provided in subsections 2526 (a)
and (b), of any information concerning U.S. persons not related to
certain purposes. Specifically, information concerning Americans must
he related to the ability. of the United States to protect itself against
actual or potential attack or other grave hostile acts of a foreign power
or agent of a foreign power, to provide for the national defense or se-
curity of the Nation, to provide for the conduct of the foreign affairs
of the United States, to protect against terrorism or sabotage by for-
eign powers or their agents, or to protect against the clandestine in-
telligence activities of a foreign intelligence service or an agent of a
foreign power.
The minimization requirement of this paragraph is meant generally
to parallel the minimization provision in existing law. (18 U.S.C.
2518 (5)). As the courts have noted in construing that section, "It
is . . . obvious that no electronic surveillance can be so conducted that
innocent conversations can be totally eliminated." 21 In assessing the
minimization effort, the court's role is to determine whether "on the
11 United States v. Rynum, 485 F. 2d 490, 500 (2nd Cir. 1973), cert. denied 423 U.S.
1005 (1975).
whole, the agents have shown a high regard for the right of privacy
and have done all they reasonably could to avoid unnecessary intru-
sion." 22 Absent a charge that the minimization procedures have been
disregarded completely, the test of compliance is "whether a good
faith effort to minimize was attempted." 23
Among the factors to be considered in evaluating the reasonable-
ness of the agents' conduct will be the scope of the enterprise under
investigation, the location and operation of the subject telephone (or
microphone), the Government's expectations of the character of and
parties to the calls, and the length or brevity of the monitored conver-
sations.24 Minimization procedures may differ depending on the nature
of the relationship to a foreign power, the individuals using the facil-
ities or place to be surveilled, the type of foreign intelligence informa-
tion sought, and other similar factors. Minimization procedures might
also include restrictions on the use of surveillance to times when foreign
intelligence information is likely to be obtained, directions that the
surveillance cease if it does not produce results of the specified type,
requirements that conversations not involving the named target be
deleted from the records at an appropriate time, and other require-
ments. For example, if a citizen or permanent resident alien were
using facilities of a foreign agent that were the target of the sur-
veillance, the Government would be reauired to minimize the acquisi-
sition and retention of any information that did not relate to foreign
intelligence purposes.
The definition of minimization speaks in terms of acquisition,reten-
tion and dissemination.
By minimizing acquisition the committee envisions, for example,
that in a given case, where A is the target of a wiretap, after deter-
mining that A's wife is not engaged with him in clandestine intelli-
gence activities, the interception of her calls on the tapped phone, to
which A was not a party, would be discontinued as soon as it was real-
ized that she rather than A was the party. In other cases, however, pri-
marily for technological reasons, it may not be possible to avoid ac-
quiring all conversations. In these situations minimizing retention and
dissemination becomes most important. By -minimizing retention, the
committee intends that information acquired, which does not relate to
the approved purposes in the minimization procedures, be destroyed.
For example, after determining that A's wife is not engaged with her
husband in clandestine intelligence activities, her communications, ac-
quired and retained in order to make this determination, would be
estroyed. Indeed, even A's communications which are clearly not rele-
vant to his clandestine intelligence activities should be destroyed. In
certain cases destruction would take place almost immediately while
in other cases the information might be retained for a reasonable period
in order to determine whether it did indeed relate to one of the ap-
proved purposes. Procedures governing minimization-particularly
how long information should be retained and how it should be de-
stroyed once it is deemed irrelevant-are to be approved by the court
and are, of course, subject to judicial supervision.
2 United States v. Tortorello, 480 F. 2d 764 (2nd Cir.), cert. denied 414 U.S. 886 (1973).
2 United States v. Armecida, 515 F. 2d 29. 44 (3d Cir. 1975).
24 United States v. Armocida, supra; United States v. James, 494 F. 2d 1007 (D.C. Cir.
1974), cert. denied 419 U.S. 1020 (1975) ; United States v. Bynum, supra.
A Judiciary Committee amendment to the minimization definition
makes explicit the intent that information not related to an approved
purpose not be disseminated. The only exceptions to this prohibition
recognized.by the bill are for one of the purposes authorized in sec-
tion 2521(b) (8), or for the enforcement of the criminal law under
the provisions of section 2526 (a) and (b). Under the dissemination
phrase, information being held to determine relevancy would not be
disseminated until the determination was made (or would only be dis-
seminated to those who could determine its relevancy). It should also
mean that, even with respect to information relevant to an approved
purpose, dissemination would be restricted to those officials with a
need for such information. And, again, the judge, in approving the
minimization procedures, could require specific restrictions on the
retrieval of such information.
In short, the committee believes that the definition of minimization
procedures authorizes and requires that information concerning Amer-
ican citizens and resident aliens be handled in such a way as to assure
that it is used only for the purposes specified in the definition and
not for any other purpose. Some have suggested that the statutory
definition is too general. The committee recognizes, however, that
minimization requirements which are appropriate for some types of
surveillances would be inappropriate for others. A certain flexibility
in the statute is, therefore, necessary with careful judicial scrutiny
of a particular application constituting the best protection against
abuse. But the definition does not give carte blanche to the judge. It
requires that the procedures be designed to limit the acquisition, reten-
tion, and dissemination of information concerning American citi-
zens and lawful resident aliens to that information which is related
to one of the approved purposes; in addition, the procedures must
provide that the information obtained by the surveillance will not
be used for an unrelated purpose (other than for enforcement of the
criminal law, see section 2526(a), infra).
Of course, minimization applies only to information known to con-
cern U.S. persons. Where communications are encoded or otherwise
not processed so the contents of a communication are not known, it
would not be possible to minimize the acquisition, retention, and dis-
semination of information concerning U.S. persons. Nevertheless, the
minimization procedures can be structured to apply to other agencies
of the Government, so that if an agency different from the intercept-
ing agency decodes or processes the communication, it could be re-
quired to minimize the retention and prohibit the dissemination of
information therein concerning U.S. persons.
It should be noted that this provision contains one significant
change from the minimization provisions in chapter 119. Section
2518(a) requires that all interceptions be recorded, if possible, and
that the tapes not be edited or destroyed for 10 years. In a criminal
context the maintenance of such tapes and files under court seal insures
that the interceptions will be retained in their original state so that
when criminal prosecutions are undertaken it is clear that the evidence
is intact and has not been tampered with. Although there may be cases
in which information acquired from a foreign intelligence surveillance
will be used as evidence of a crime, these cases are expected to be
relatively few in number, unlike chapter 119 interceptions the very
24-419 0 - 78 - 6
purpose of which is to obtain evidence of criminal activity. The com-
mittee believes that in light of the relatively few cases in which infor-
mation acquired under this chapter may be used as evidence, the better
practice is to allow the destruction of information that is not foreign
intelligence information or evidence of criminal activity. This course
will safeguard the privacy of individuals more effectively, insuring
that irrelevant information will not be filed. The committee believes
that existing criminal statutes relating to obstruction of justice will
deter any efforts to tamper with evidence acquired under this chapter.
Such destruction should occur, of course, only pursuant to procedures
approved by the court. Destruction insures that the information can-
not be used to "taint" a civil or criminal proceeding; accordingly,
there is no requirement to index, for purposes of 18 U.S.C. section
3504, interceptions which are destroyed.
The committee is concerned that the surveillance authorized under
this chapter not result in the retention or dissemination of informa-
tion which would adversely affect the exercise of first amendment
rights. Such abuses occurred with distressing frequency in the past. In-
formation relating solely to the lawful political activity of American
citizens or resident aliens may not be retained or disseminated under
the provisions of this legislation.
In a hypothetical case, for example, an ambassador from an im-
portant neutral nation, speaking to a U.S. Senator, tells the Senator
that his country has been approached secretly by a foreign nation
concerning a planned attack on the United States. Assuming that the
surveillance was initiated against the ambassador and approved in
accordance with the procedures of this chapter, there should be no
doubt that the information could be retained and used because of its
importance and relationship "to the ability of the United States to
protect itself against actual or potential attack." At the same time,
however, the constitutional rights of speech, association, and privacy
of the Senator are implicated. He is plainly not the target of the
surveillance, nor could he be, since he is not the "agent of a foreign
power." Still he is overheard. The functioning of democratic govern-
ment can be impaired if its representatives are deterred from discuss-
ing important issues with representatives of other countries for fear
that their conversations will be overheard and retained.
There is no perfect solution to the problem. As long as the surveil-
lance was instituted lawfully, the Senator's conversation may be over-
heard. Given the subject matter of the conversation, it should not be
excluded by minimization procedures. If the subject matter relates
to foreign intelligence purposes, the information should be retained.
The alternative-a blanket rule depriving the Government of the
right to retain foreign intelligence, regardless of its importance, be-
cause an American citizen was incidentally overheard-is unaccept-
able. Similarly, it would not be advisable to obligate the Government
to render the conversation senseless by deleting all portions of the
statements in the conversation made by the Senator.
The committee believes, however, that every effort should be made
to minimize the "chilling effect" that retention of such conversations
of Americans will have. Therefore, the definition of minimization
procedures places additional restrictions on the dissemination of infor-
mation, where abuses are most. likely to occur. These restrictions focus
on those types of information which are the hardest to pin down
concretely, that is, information which relates solely to the national
defense or security and the conduct of foreign affairs. The bill requires
procedures which are reasonably designed to insure that such informa-
tion is not disseminated in a manner which identifies a U.S. person,
without that person's consent, unless the person's identify is neces-
sary to understand or assess the importance of information with re-
spect to a foreign power of foreign territory or the information is
otherwise publicly available.
The phrase "with respect to a foreign power or foreign territory"
comes from the definition of "foreign intelligence information." It
requires that the information must contribute to the fulfillment of the
Government's requirements for foreign intelligence regarding foreign
powers and territories.
The first part of this dissemination standard allows dissemi-
nation where a U.S. person's identity is "necessary to understand" in-
formation with respect to a foreign power or territory. The person's
identity must be needed to make the information fully intelligible. If
the information can be understood without identifying the person, it
should be disseminated that way. However, sometimes it might be
difficult or impossible to make sense out of the information without a
U.S. person's identity. To take one obvious case, if the message says
a foreign government official is arriving in this country at a particular
time and place, it would be necessary to identify the airline he is arriv-
ing on. The airline company would fall in the definition of "United
States person" if it is a U.S. corporation and not a foreign power.
Another example would be the identity of a person who is the in-
cumbent of an office of the executive branch of the U.S. Government
having significant responsibility for the conduct of U.S. defense or
foreign policy, such as the Secretary of State or the State Department
country desk officer. The identities of such persons would frequently
satisfy the "necessary to understand' requirement, especially when
such person is referred to in the communications of foreign officials.
This example does not mean, however, that all the conversations of a
particular executive branch official with foreign officials who are under
surveillance should he automatically or routinely reported to the U.S.
official's superior without his knowledge or consent.
The second part of the special dissemination standard allows dis-
semination where a U.S. person's identity is necessary to "assess the
importance" of information with respect to a foreign power or terri-
tory. The word "importance" means important in terms of the inter-
ests set out in the definition of foreign intelligence information. For
example, if a foreign government is negotiating with an American
business firm to purchase nuclear materials, it might be important to
the national defense or security-in a military sense-or to the success-
ful conduct of the Government's nonproliferation policy, to know the
identity of the business firm involved. That might be the only way the
State Department could determine whether a deal is likely to be made.
On the other hand, the information may turn out not to be important.
The question under the bill is whether the identity of the person or
entity is needed to asses that importance.
The third part of the special dissemination standard allows dissemi-
nation where the information identifying a U.S. person is otherwise
publicly available. An example is a foreign official's discussion of the
contents of a newspaper article referring to U.S. persons.
Of course, none of these are hard-and-fast lines. What the bill
requires is careful deliberation by responsible officials in the executive
branch. The court is also authorized to monitor compliance with the
minimization procedures, including the special dissemination proce-
dures, in order to deter abuses. There will inevitably be close judgment
calls, both in devising detailed procedures and in applying them to
particular circumstances. Therefore, the bill does not attempt to im-
pose absolute rules, but rather says that the procedures must be "rea-
sonably designed" to achieve their objectives.
S. 1566 as reported by the Judiciary Committee included different
procedural requirements which had been added by this committee to
S. 3197 in the 94th Congress. The committee has determined on the
basis of further study that these procedures, dealing with the manner
of retention of information and with surveillance of certain foreign-
controlled entities, may be too complex to administer. Therefore, they
have been deleted from the bill.
The committee looks with favor, however, upon efforts by the Execu-
tive Branch to devise and submit to the court more restrictive proce-
dures than the minimum standards required by the terms of the bill
itself. The Attorney General has already promulgated procedures gov-
erning certain surveillance activities which would be covered by
S. 1566; and this committee has examined those procedures in the
course of discharging its responsibilities. The committee does not in-
tend that passage of S. 1566, which by its terms might be interpreted
as permitting relaxation of current restrictions, should automatically
have this effect.
In some instances the surveillance technology available to the Gov-
ernment requires more rigorous procedures than those prescribed by
S. 1566, in order to safeguard privacy interests adequately. Such pro-
cedures cannot be spelled out by law, or otherwise disclosed publicly,
without revealing sensitive sources and methods of foreign intelli-
gence collection. Nevertheless, the committee intends that the Attor-
ney General should continue the efforts already underway to establish
procedures which will most effectively reconcile privacy interests with
advancing technology, and that the court should take such considera-
tions into account in approving the procedures that are proposed by
the Attorney General. It is also anticipated that this committee will
continue to review such procedures.
Existing policies governing the dissemination of information ob-
tained through conventional electronic surveillance techniques, such
as wiretapping, should be revised if they conflict with any requirement
of the bill. 25 For example, information about the suitability or credi-
bility of U.S. persons who are sources or contacts of an agency in the
intelligence community, or who are reasonably believed to be potential
sources or contacts, might be disseminated on specific request by name
from the particular agency. It is questionable whether all such dis-
2 C.F.. letter from Attorney General Griffin B. Bell to Hon. Birch Bayh, chairman, Senate
Select Committee on Intelligence, Feb. 28, 1978.
as a rou-
semination, without the person's consent., would be permitted
tine matter under the minimization procedures of S. 1566. However,
if the consent of the person is obtained for the conduct, of an inquiry
S. 1566
regarding his suitability or credibility as a source or contact,
would allow such dissemination in the course of the inquiry. The per-
for
son should be advised that consent for the inquiry means consent
of information in the possession of the
the retrieval and dissemination
of a
agencies in the Intelligence Community by means, for example, be
"national agencies name check." Information may not, of cotu-se,
statu-
retained for such dissemination unless it otherwise satisfies the
tory requirements for retention.
Similarly. information might be disseminated where it raises a ques-
tion about Ie trustworthiness of a current Federal employee, a former
employee of an agency in the intelligence community, a personorholding facilh-
a security clearance or having access to sensitive information
a security clearance for or was otherwise
ties, or a person who held
or a higher classifi-
granted access to information classified as "Secret" to the Government
cation. Such information might be disseminated
the clearrance
employer or former employer, the agency which granted to investi-
or access, or another Federal agency having responsibility
gate the trustworthiness of the individual. Such dissemination might
the trust-
also occur where the information raises a question about Govern-
worthiness of individuals who are applicants or prospective
ment employees, if the disseminating agency verified the employer's
official interest in the individual concerned. Once again, it is question-
able whether all such dissemination, without the person's consent, not be
would be permitted as a routine matter; and information may the re-
retained for such dissemination unless -it otherwise satisfies
quirements for retention. the
The committee wishes to emphasize that dissemination without
that the information relates
person's consent requires a determination
to the ability of the United States to protect against grave hostile acts
of a foreign power or foreign agent, sabotage or terrorism by a foreigna
activities of
power or foreign agent. or the clandestine intelligencethe information
foreign intelligence service or foreign agent; or that
relates to national defense or security or foreign affairs and is neces-
with re-
sary to understand or assess the importance of informationavailable.
or territory or is otherwise publicly
spect to a foreign power
A reasonable case can be made that information about the suitability
or credibility of intelligence sources or contacts, and information
about the trustworthiness of persons who hold. have held, or are ex-
information
pected to hold positions giving them access to sensitive
or facilities, would relate to the ability of the United States to protect
or for-
against clandestine intelligence activities of a foreign power
eign agent. The case is less compelling, however, where the informa-
tion is not counterintelligence information but merely concerns the
trustworthiness of a person who is a Government employee not having
or having had access to sensitive information or facilities, or an appli-
cant or prospective applicant for such a position.
Additionally, the provisions of S. 1566 permitting dissemination
and use for law enforcement purposes of information that is evidence
of a crime would not permit dissemination of information when nec-
essary to the conduct of any investigation that may be within the juris-
diction of a law enforcement agency. Such investigations must be
criminal investigations, rather than civil,. background, or other types
of investigations.
If provision is made for dissemination in exceptional circumstances
that are not otherwise provided for in more detailed minimization
procedures, for example, with the prior approval of the Attorney Gen-
eral, such a provision must be approved by the judge to whom the
procedures are presented in an application for an electronic surveil-
lance order; and such a provision may be approved and applied only. in
conformity with the minimization requirements of S. 1566 itself.
These considerations should be taken into account by the court and
by the executive branch, especially the Attorney General, in applying
the minimization requirements of S. 1566 to the dissemination of in-
formation obtained through conventional electronic surveillance.
H. "United States person" and "United States"
Section 2521(b) (9) defines a "United States person" to include a
citizen of the United States, an alien lawfully admitted for permanent
residence, an unincorporated association of which a substantial num-
ber of members are citizens of the United States or permanent resident
aliens, and a corporation incorporated in the United States, but not
including corporations or associations which are "foreign powers" as
defined in section 2521 (b) (1) (A)-(E).
The term "United States person" was not defined in S. 3197, as re-
ported in the 94th Congress, because S. 3197 made no distinction in its
provisions between different types of "persons." S. 1566 does not, for
example, afford to nonresident aliens the protections of the "minimiza-
tion procedures" or the court's review of the certification that sur-
veillance of the person is required to obtain information "necessary"
for certain purposes. However, such protections either did not exist
or were less stringent in S. 3197. Their application to nonresident
aliens would impose undue burdens upon the court and the agencies
conducting electronic surveillance.
The term "members" with respect to unincorporated associations is
not intended, of course, to be limited to formal, card-carrying mem-
bers. For instance, an unincorporated commercial establishment's em-
ployees would be members under this definition. The committee in-
tends the reference to "a substantial number of members" to be equiva-
lent to the term "substantially composed of" used in parts (B) and
(E) of the definition of "foreign power." In both contexts the words
"substantial" or "substantially" require that there be a significant pro-
portion, but less than a majority. The judge is expected to take all the
known circumstances into account in determining whether an asso-
ciation is a "United States person."
S. 1566 as reported by the Judiciary Committee excluded from
"United States person" any corporation or association which is a for-
eign power. This exception has been modified to exclude only those
foreign powers which fall into parts (A)-(E) of the "foreign power"
definition. A corporation incorporated in the United States, or an un-
incorporated association of which a substantial number of members
are American citizens or resident, aliens, retains its "United States
person" status if it is alleged to be directed and controlled by a for-
eign government, but where such direction and control is not openly
acknowledged. This provides safeguards needed because of the possi-
bility that such an entity could be placed under surveillance without
meeting the requirements for surveillance of an individual U.S. per-
son. See section 2521(b) (1) (E), supra.
Section 2521(b) (10) offers a. new definition of "United States" for
geographic purposes. Evidence publicized last year of CIA activities
in Micronesia led the administration to propose this change which
makes explicit that S. 1566 covers electronic surveillance in all areas
under the territorial sovereignty of the United States (the United
States and its territories) as well as the Canal Zone and Micronesia. The
term "territorial sovereignty" does not include U.S. Embassies, military
bases, and other installations abroad. The Commonwealth of the
Northern Marianas is intended to be covered by this definition after
its severance from the Trust Territory of the Pacific Islands. The re-
mainder of the Trust Territory of the Pacific Islands is intended to be
covered so long as the trust is in effect and thereafter only if the poli-
tical status agreements with the United States provide for territorial
sovereignty of the United States in a manner similar to that of the
Northern Mariana Islands, Puerto Rico, or Guam.
Section 252
Section 2522 authorizes the submission of applications to a judge for
a court order approving the use of electronic surveillance under this
chapter. Applications may be submitted only if the President has, by
prior written authorization, empowered the Attorney General to ap-
prove the submission. This section dxs not require the President to
authorize each specific application; he may authorize the Attorney
General generally to seek applications under this chapter or upon such
terms and conditions as the President wishes so long as the terms and
conditions are consistent with this chapter. The reference to Presi-
dential authorization does not mean that the President has inde-
pendent, or "inherent," authority to authorize electronic surveillance
in any way contrary to the provisions of S. 1566. The procedures of this
bill are "ohe exclusive means" by which electronic surveillance, as de-
fined in section 2521(b) (6), may be conducted. See conforming amend-
ment section (f) to section 2511(2), chapter 119, United States Code,
infra. This bill will establish the exclusive United States law governing
electronic surveillance in the United States for foreign intelligence
purposes. Therefore, an application for a court order which meets the
standards of this bill should be granted. notwithstanding any other
law, treaty, or international agreement.
Section 2523
Subsection (a) provides for public designation by the Chief Justice
of seven U.S. district court judges to sit on a special court, each
member of whch may hear applications and grant orders under this
chapter. The court shall have nationwide jurisdiction, and the com-
mittee contemplates that there will be some geographic dispersion
among the judges designated. The provision for the judges to serve
as members of a special court has been added upon the recommenda-
tion of the General Counsel of the Administrative Office of the U.S.
Courts.26 The committee intends that the special court should sit
continuously in the District of Columbia.
The subsection provides that none of the designated judges shall
have jurisdiction to hear an application for electronic surveillance if
that same application has been previously denied by another of the
designated district judges. This provision is intended to make clear
that if the Government desires to pursue an application after a denial,
it must seek review in the special court of review established in sub-
section (b); it cannot apply to another district judge. Obviously,
where one judge has asked for additional information before approving
an application, and that judge is unavailable when the Government
comes forward with such additional information, the Government
may seek approval from another judge. It would, however, have to
inform the second judge about the first application. See section
2524(a) (9), infra.
Similarly, where an application is made and then withdrawn,
perhaps because a change in circumstances makes the electronic sur-
veillance no longer technically feasible, the Government may seek
approval from another judge if the application is subsequently rein-
stated. The committee does not intend, however, that the Government
be allowed to seek approval from another judge if the original with-
drawal was occasioned by indications that the first judge intended to
deny or modify the order requested by the Government.
The subsection further provides that a designated district judge
who denies an application for electronic surveillance shall provide a
complete written statement of the reasons for the denial, and, if the
Government seeks review of the decision, forward that statement and
other documents comprising the record to the special court of review.
This insures that the special court of review will have the full record
of the proceedings of the district court in reviewing the case.
Subsection (b) provides for the public designation by the Chief
Justice of three judges from the Federal courts of appeals or district
courts who shall sit together as a special court of review having juris-
diction to review denials of applications made to the individual judges
designated in subsection (a). One of the three is to be designated
publicly as the presiding judge. If the special court of review deter-
mines that an application was properly denied, it shall provide a
wrtten statement of the reasons for its decision and, on petition of the
Government for a writ of certiorari, forward the complete record to
the Supreme Court, which will have jurisdiction to review the decision.
Subsection (c) provides for the expeditious handling of all pro-
ceedings under this chapter and also states that the Chief Justice, in
consultation with the Attorney General and the Director of Central
Intelligence, shall establish security measures under which applica-
tions made and orders granted shall be maintained. The committee
contemplates that the record of applications made, information pro-
vided, and orders granted by the several judges designated under this
chapter shall be maintained in such a way that the judges designated
26 Testimony of Carl H. Imlay, General Counsel, Administrative Office of the U.S. Courts,
before the Subcommittee on Legislation of the House Permanent Select Committee on
Intelligence, Jan. 10, 1978.
under this chapter shall have access when necessary to the records of
actions taken by the other judges similarly designated.
Subsection (d) has been added to S. 1566, as reported by the Ju-
diciary Committee, for the purpose of providing fixed, staggered terms
for the judges, also as recommended by the General Counsel of the
Administrative Office of the U.S. Courts. Each judge designated under
this section shall so serve for a maximum of 7 years and shall not be
eligible for redesignation. The judges first designated under sub-
section (a) shall be designated for terms of from 1 to 7 years so that
one term expires each year. The judges first designated under sub-
section (b) shall be designated for terms of 3, 5, and 7 years.
Section 2524
This section is patterned after 18 U.S.C. section 2518 (1) and (2),
and specifies what information must be included in the application.
Applications must be made by a Federal officer in writing and under
oath or affirmation. If the officer making the application is unable
to verify the accuracy of the information or representations upon
which the application is based, the application should include affidavits
by other officers who are able to provide such personal verification.
Thus, for example, if the applicant was an attorney in the Department
of Justice who had not personally gathered the information contained
in the application, it would be necessary that the application also con-
tain an affidavit by the investigating officer personally attesting to the
status and reliability of any informants or other covert sources of
information. By this means the source of all information contained in
the application and its accuracy will have been sworn to by a named
official of the U.S. Government and a chain of responsibility established
for judicial review.
Each application must be approved by tie Attorney General, who
may grant such approval if he finds that the appropriate procedures
have been followed. The Attorney Generals written approval must
indicate his belief that the facts and circumstances relied upon for the
application would justify a judicial finding of probable cause that tihe
target is an agent of a foreign power and that the facilities or place
at which the electronic surveillance. is directed are being used, or about
to be used, by an agent of a foreign power, and that all other staltu-
tory criteria have been met. In addition, the Attorney General must
personally be satisfied that the certification has been made pursuanit
to statutory requirements.
Paragraph (1 )of subsection (a) requires that the application iden-
tify the Federal officer making the application; that is, the name of
tIe person who actually presents the application to the judge.
Paragraph (2) requires that the application contain evidence of the
authority of the applicant to make this application. This would consist
of the Presidential authorization to the Attorney General and the
Attorney General's approval of the particular application.
Paragraph (3) requires the identity or description of the person
who is the target of the electronic surveillance. The word "person" is
used in its juridical sense to mean the individual or entity that is the
target of the surveillance. However, care must be taken in framing the
order authorizing such surveillance-and minimization procedures-
that surveillance against one individual does not lead to the acquisi-
tion, retention, and dissemination of communications of an entire
group or organization of U.S. citizens, thus violating constitutional
rights of association and privacy.
Paragraph (4) requires a statement of the facts and circumstances
justifying the applicant's belief that the target of the electronic sur-
veillance is a foreign power or an agent of a foreign power and that
the facilities or place at which the surveillance is directed are being
used or are about to be used by that power or agent. These require-
ments parallel existing law on surveillances for law enforcement pur-
poses (18U.S.C.2518(1) (b) (ii) and (iv)).
Paragraph (5) requires a statement of the proposed minimization
procedures. The statement of procedures required under this para-
graph should be full and complete and subject to close judicial review.
These procedures may differ from case to case, depending on the type
of foreign agent involved, the individuals using the facilities or place
to be surveilled, the type of foreign intelligence information sought,
and other similar factors. Minimization procedures should where pos-
sible include such elements as methods to avoid the acquisition of
irrelevant information at the time of intercept, restrictions on the use
of surveillance to times when foreign intelligence information is likely
to be obtained, and requirements for deletion of information obtained
which does not relate to foreign intelligence purposes.
For example, steps should be taken to prevent unnecessary invasion
of the privacy of a target's family caused by a 24-hour tap on the
family phone when it is known that the target is out of town or at the
office. Similarly, conversations unrelated to foreign intelligence should
not be retained or, of course, disseminated.
It is the intention of the committee that minimization procedures
be as uniform as possible for similar surveillances. The committee
recognizes that certain types of surveillance operations may involve
essentially indentical concerns with respect to protecting U.S. per-
sons' rights. This is so regardless of the specific targets involved and
makes possible the adoption of uniform minimization procedures for
essentially identical surveillance operations. The application of uni-
form procedures to identical surveillances will result in a more con-
sistent implementation of the procedures, will result in an improved
capability to assure compliance with the procedures, and ultimately
means a higher level of protection for the rights of U.S. persons.
Paragraph (6) calls for a factual description of the nature of the
information sought by the electronic surveillance, except where the
surveillance is of a foreign power as defined in section 2521(b) (1) (A),
(B), or (C). The description should be as specific as possible and suf-
ficiently detailed so as to state clearly what the Government seeks. A
simple designation of which subdefinition of "foreign intelligence in-
formation" is involved will not suffice. Such a description is not re-
quired where a target is one of the "official" foreign powers defined
in section 2521 (b) (1) (A), (B), or (C). Where these types of powers
are the targets, a designation of a particular subcategory of the de-
finition of "foreign intelligence information," as required by sub-
paragraph (7) (D), will suffice. The reason for this distinction is that,
with respect to such "official" targets, the sensitivity of the surveillance
is greatly multiplied while the risk of a fruitless surveillance which
will not obtain any foreign intelligence information is greatly re-
duced. Therefore the administration maintains that such applications
should not require as much detailed information to be presented as in
cases involving American citizens or other individual targets.
Paragraph (7) requires a certification or certifications by the As-
sistant to the President for National Security Affairs or by an ap-
propriate executive official appointed by the President with the advice
and consent of the Senate. The certification would be made by an of-
ficial having responsibility for the collection of the information-
normally the Assistant to the President for National Security Affairs,
the Director of Central Intelligence, the Director of the Federal
Bureau of Investigation, or the Secretary of Defense-or such other
officer, appointed with the advice and consent of the Senate, who has
full knowledge of the case. The possibility of additional certifications
is provided to insure that a detailed and complete certification is
presented to the judge. The judge may, of course, require the applicant
to furnish further information regarding the basis for the certifica-
tion. See subsection (c) and section 2525(a) (5), infra.
The certification shall state that the certifying official deems the in-
formation sought to be foreign intelligence information, that the pur-
pose of the surveillance is to obtain foreign intelligence information,
and that such information cannot feasibly be obtained by normal in-
vestigative techniques. It shall include a designation of what type of
foreign intelligence information is sought and, where the target is
not a foreign power as defined in section 2521(b) (1) (A), (B), or (C),
a reasoned statement of the basis for certifying that the information
sought is foreign intelligence information and that such information
cannot feasibly be obtained by other investigative techniques.
The requirement that the information sought be deemed "foreign
intelligence information" is designed to insure that a high-level of-
ficial with responsibility in the area of national security will review
and, where the target is not a foreign power as defined in section 2521
(b) (1) (A), (B), or (C), explain the executive branch determination
that the information sought is in fact foreign intelligence information.
The requirement tiat this judgment be explained is to insure that those
making certifications consider carefully the cases before them and
avoid the temptation simply to sign off on certifications that consist
largely of boilerplate language. The committee does not intend that
the certification be vague generalizations or standardized assertions.
The designated official must similarly explain that the purpose of the
surveillance is to obtain the described foreign intelligence information.
This requirement is designed to prevent the practice of targeting one
individual for electronic surveillance when the true purpose of the
surveillance is to gather information about another individual. It is
also designed to make explicit that the sole purpose of such surveillance
is to secure foreign intelligence infornation and not to obtain infor-
mation for any other purpose. The designated official must similarly
explain in his affidavit why the information cannot be obtained through
less intrusive techniques. This requirement is particularly important
in those cases when U.S. citizens or resident aliens are the target of the
surveillance.
Finally, where the target of the surveillance is one of the special
class of "official" foreign powers (defined in sections 2521(b) (1) (A),
(B), or (C)), the certification shall include a statement of the period
of time for which the surveillance is required. With respect to sur-
veillances of this special class of foreign powers, this statement is
placed in the certification because the reviewing court does not have
the power to control the length of the surveillance as is the case within
the 90-day period otherwise applicable in the bill.
Paragraph (8) requires the application to contain a statement of
the means by which the surveillance will be effected where the target
is other than the special class of foreign powers. Where the target is
one of the special classes of foreign powers listed in section 2521 (b)
(1) (A), (B), or (C), only a designation of the type of surveillance
according to the categories of the definition of electronic surveillance
,is required. It will be sufficient in such cases if the application merely
indicates whether the information will be acquired by means of a wire-
tap, a microphone installation, the interception of a radio signal, or
some other means. Less specificity in describing the means of the sur-
veillance is required for the special class of foreign powers because
of the extreme importance and sensitivity of the information sought.
If such a surveillance requires physical entry (whether forcible or not)
of the property of a nonconsenting person, a statement to that effect is
required.
Paragraph (9) parallels 18 U.S.C. 2518 (1) (e) and requires a state-
ment concerning all previous applications dealing with the same
persons, facilities, or places, and the disposition of each such previous
application.
Paragraph (10) parallels 18 U.S.C. 2518(1) (d) and requires a
statement as to the period of time for which the surveillance is neces-
sary in those cases where the special class of foreign powers is not the
target. If the surveillance order is not to terminate automatically
when the particular information sought has been obtained, the ap-
plicant must provide facts supporting his belief that additional in-
formation of the same type will be obtained thereafter.
Subsection (b) allows the Attorney General to require other execu-
tive officers to provide information to support the application.
Subsection (c) enables the judge to require the applicant to furnish
further information as may be necessary to make the required deter-
minations. It parallels existing law, 18 U.S.C. 2518(2). Such addi-
tional proffers would, of course, be made part of the record and would
be subject to the security safeguards applied to the application and
order.
Section 2525
Subsection (a)_of-this section is patterned after 18 U.S.C. 2518(3)
and specifies the findings the judge must make before he grants an
order approving the use of electronic surveillance for foreign intel-
ligence purposes. While the issuance of an order is mandatory if the
judge finds that all of the requirements of this section are met, the
judge has the discretionary power to modify the order sought, such
as with regard to the period of authorization (except where the spe-
cial class of foreign powers is the target) or the minimization proce-
dures to be followed. Modifications in the minimization procedures
should take into account the impact of inconsistent procedures on
successful implementation.
Paragraph (1) of this subsection requires the judge to find that the
President has authorized the Attorney General to approve such appli-
cations.
Paragraph (2) requires the judge to find that the Attorney General
has approved the application being submitted and that the application
has been made by a Federal officer.
Paragraph (3) requires a finding that there is "probable cause" to
believe that the target of the electronic surveillance is a foreign power
or an agent of a foreign power and that the facilities or place at which
the surveillance is directed are being used or are about to be used by
that power or agent.
In determining whether probable cause exists under this section, the
court must consider the same requisite elements which govern such
determinations in the traditional criminal context. Such elements in-
clude, for example, the issue of any informant's reliability, the cir-
cumstances under which the informant was able to learn about the
idleged activity of the individual who is the subject of the warrant,
the length of time which has passed since the information relied upon
was acquired, and the degree to which information corroborating an
informant must relate to the essential conduct on which the applica-
tion is premised and not merely to incidental details. -
In addition, in order to find "probable cause" to believe the subject
of the surveillace is an "agent of a foreign power" tuder subsection
2521(b) (2), the judge, must, of course, find that each and every ele-
ment of that status exists. For example, if a U.S. citizen or resident
alien is alleged to be acting on behalf of a foreign entity, the judge
must first find probable cause to believe that the entity is a "foreign
power" as defined in section 2521(b) (1). There must also be probable
cause to believe the person is acting for on behalf of that foreign
power and probable cause to believe that the efforts undertaken by the
person on behalf of tie foreign power constitute sabotage, terrorism,
or other proscribed activities as defined in section 2521(b) (2) (B).
Similar findings of probable cause are required for each element
necessary to establish that a U.S. citizen is conspiring with or aiding
and abetting someone engaged in sabotage, terrorism, or clandestine
intelligence activities at the direction of a foreign power.
Paragraph (4) requires the judge to find that, the procedures de-
scribed in the application to minimize the acquisition, retention, and
dissemination of certain information or communications relating to
U.S. citizens or lawful resident alien fit the definition of minimization
procedures. The committee contemplates that the court would give
these procedures most careful consideration. If it is not convinced that
they will be effective, the application should be denied or the proce-
dures modified. The committee realizes that total minimization may
not be possible. Therefore, the bill's requirement is phrased in terms
of minimization procedures being "reasonably designed." Thus, 'for
example, where irrelevant information cannot be erased from part. of
a tape, minimization procedures should restrict dissemination of the
tape. In addition, where it cannot be determined immediately whether
a certain piece of information is irrelevant, minimization procedures
should require that within a specified time such a determination be
made and the irrelevant matter expunged.
Paragraph (5) requires that the judges find that the application
contains the description and certification or certifications specified in
section 2524 (a) (7). If the application meets the requirements of those
sections, the court is not permitted to substitute its judgment for that
of the executive branch officials, except where a U.S. person is the tar-
get of a surveillance. In such -a case, the judge must review the cer-
tifications to determine whether they are clearly erroneous. This au-
thority of the court to "look behind" the certification for surveillances
of Americans and reject them if "clearly erroneous" is recognized by
the committee as a major improvement over S. 3197 (which did not
provide for any judicial review of the certifications). The "clearly
erroneous" standard of review is not, of course, comparable to a prob-
able cause finding by the judge. Nevertheless, S. 1566 does provide a
workable procedure 'for judicial review (and possible rejection) of
executive branch certifications for surveillances of United States
persons.
S. 1566 as reported by the Judiciary Committee has been amended
to clarify the point that the judge may base his review of the certifica-
tion regarding U.S. persons not only on the statement initially sub-
mitted to him but also on any other information required by the judge
to be furnished as necessary for him to determine whether or not the
certification is clearly erroneous, see section 2524 (c) supra. The judge
must find that the determination by the certifying official that the
information sought concerning a U.S. person is "foreign intelligence
information" was not a clearly erroneous determination.
Despite the fact that the court is not allowed to "look behind" the
certification in cases not involving U.S. persons there are several
checks against the possibility of arbitrary executive action. First,
the court, not the executive branch, makes the finding of whether
probable cause exists that the target of surveillance is a foreign power
or its agent. Second, the certification procedure assures written ac-
countability within the executive branch for the decision made to
engage in such surveillance. This constitutes an internal check on
executive branch arbitrariness.
Moreover, it should be noted that if the description and certification
do not comply fully with section 2524(a) (7), they can and must be
rejected by the court. Thus, the court could invalidate the certifica-
tion if it were not properly signed by the President's designee, did
not designate the type of information sought, or did not state that
the information sought is deemed to be foreign intelligence informa-
tion that the purpose of the surveillance is to obtain foreign intelli-
gence information, and that such information cannot feasibly be
obtained by normal investigative techniques. Further, if the certifica-
tion did not present an explanation of why the information sought
is foreign intelligence information which cannot be obtained through
normal investigative techniques, the judge could (if surveillance
was not targeted against the special class of foreign powers) reject
the application or defer approval until an adequate certification was
supplied.
Subsection (b) specifies what the order approving the electronic
surveillance must contain. It must include the identity or a description
of the person or persons targeted by the electronic surveillance. The
order must specify the place or facilities against which the surveillance
is directed. The order must also specify the type of information sought,
or where the special class of foreign powers is the target, the specific
category of "foreign intelligence information." These requirements are
designed to satisfy the fourth amendment's requirements that warrants
describe with particularity and specificity the person, place, and ob-
jects to be searched or seized. The order must, in addition to the fourth
amendment's requirements, specify the means by which the surveil-
lance will be effected (where the target is one of the special class of
foreign powers, however, only the specific category of "electronic sur-
veillance" is required). In addition, the order must specify the period
of time during which the surveillance is approved.
The order shall direct that minimization procedures will be fol-
lowed. It is intended that the court shall monitor compliance with
the minimization procedures in much the same way as has been done
pursuant to chapter 119. Willful failure to abid by the minimization
procedures may be treated as contempt of court.
The order may also direct that a common carrier, landlord, cus-
todian, contractor or other specified person furnish information, facili-
ties or technical assistance necessary to accomplish the electronic sur-
veillance successfully and with a minimum of interference to the serv-
ices provided by such person to the target of the surveillance. If this
is done, the court shall direct that the person rendering the assistance
maintain under security procedures approved by the Attorney General
and the Director of the Central Intelligence Agency any records con-
cerning surveillance which the person wishes to retain. If the judge
directs such assistance, he shall also direct that the applicant com-
pensate the person for such assistance. These provisions generally
parallel 18 U.S.C. 2518 (4).
This directive provision must be read in conjunction with the bill's
conforming amendment to 18 U.S.C. 2511(2) (a) (ii), contained in sec-
tion 4(b) of this bill. That amendment requires that before a com-
munication common carrier or its agent provides such information,
facilities or technical assistance to an investigative or law enforcement
officer, that officer is required. to furnish to the carrier either an order
signed by the authorized judge certifying that a court order directing
such assistance has been issued or, in the case of surveillance under-
taken under chapter 119 or 120 in which a prior order is not required,
such as an emergency surveillance, a certification uder oath by the
officer requesting the assistance that the applicable statutory require-
ments have been met.
Subsection (c) allows an order approving electronic surveillance
under this chapter against any person or entity other than a special
foreign power as defined in section 2521(b) (1) (A), (B), or (C) to be
effective for the period necessary to achieve its purposes or for 90 days,
whichever is less. In the coimittee's view 90 days is the maximum
length of time during which a surveillance of these persons or entities
for foreign intelligence purposes should continue without renewed
judicial scrutiny. This period of time is not as long as some have wished
but longer than others desired. It is considered to be a reasonable con-
2
dition in the' foreign intelligence context. 1
When the special class of "official" foreign powers is targeted, how-
ever, the surveillance may last as long as one year. Moreover, the ex-
ecutive determines the necessary length of the surveillance of these
special foreign powers (not to exceed 1 year without reauthorization),
and this determination is not subject to the court's review or approval.
As already indicated, this is a substantial change from S. 3197 as re-
ported in the 94th Congress. There are, however, considerable argu-
ments for the change: First, the determination that an entity is within
the definition of section 2521(b) (1) (A), (B), or (C) is not likely to
be erroneous. Unlike a person suspected of being a foreign agent,
whether an entity fits one of the three special classes of foreign
powers-such as a foreign embassy or consulate-will usually be self-
evident. Second, the likelihood of obtaining valuable foreign intelli-
gence information from these entities is very high. Third, surveillance
against such official powers, because of their continuing presence in the
United States, is likely to be required for much longer periods of time.
Although such surveillance could be accomplished by successive 90-
day court renewals, the generation of four times the amount of re-
quired paperwork with the attendant increased possibility of a com-
promise as well as the administrative burden which would result, are
reasons for exempting these foreign powers from the 90-day limita-
tion. Given these considerations and the unique status of the targets in-
volved, the committee believes that 1 year is not an excessive period of
time.
In coming to this conclusion, however, the committee emphasizes
that, in order for U.S. citizens to be protected adequately in such
cases, this provision must not be interpreted to bar judicial review of
the effectiveness of the minimization procedures. U.S. citizens may be
overheard talking to employees of such an "official" foreign power or
may be referred to by such employees. As already indicated, the court
has the power to review minimization during the course of the sur-
veillance as it does now under chapter 119. This applies regardless of
the type of target and remains an important protection.
As under chapter 119, extensions of an order may be sousght and
granted on the same basis as the original order. A new application,
including a new certification pursuant to section 2524(a) (7), would
therefore be required, updating the information provided previously.
Before the extension should be granted, however, the court would again
have to find probable cause that the target is a foreign power or its
agent. To aid the judge in making this determination anew, it is ex-
pected that the court would evaluate the success or failure of any pre-
vious surveillances and the facts and circumstances surrounding such
surveillance. The court, however, in consideringZ a renewal involving
a foreign power as defined in section 2521(b) (1) (A), (B), or (C),
cannot order the Government to submit any information actually ob-
tained as a result of the original surveillance or previous extension.
This change from S. 3197 reflects concern with the sensitive nature of
the information obtained from special foreign powers.
0 United States v. United States District Court, 407 U.S. 297 at 323 (1972).
In order to make clear the judge's authority to review compliance
with the -minimization procedures, a provision has been added at the
end of subsection (c). It provides that at the end of the
period of time for which an electronic surveillance is ap-
proved by an order or an extension issued under this section, the
judge may assess compliance with the minimization procedures re-
quired by this chapter. This provision is not intended to require the
judge to assess such compliance, nor is it intended to limit such assess-
ments to any particular intervals. The committee believes, however,
that it is useful to spell out the judge's authority explicitly so that there
vill be no doubt that a judge may review the manner in which infor-
mation about U.S. nersons is being handled. This specifically includes
information about U.S. persons acquired from electronic surveillance
of a foreign power, as defined in section 2521(b) (1) (A), (B), or (C).
Subsection (d) authorizes the Attorney General to approve an
emergency electronic surveillance prior to judicial authorization un-
der certain limited circurst ances. First, the Attorney General must
determine that an emergency situation exists which reouires the em-
ployment of electronic surveillance before an order authorizinz such
surveillance can with due dilifgence be obtained. In addition, the fac-
tual basis for the issuance of an order under this chapter must be
present.
The procedures under which such an emergency surveillance is au-
thorized are considerably stricter than those of the comoarable pro-
vision in chanter 119, 18 U.S.C. 2518(7). First. only the Attorney
General-as defined-may authorize such emergency surveillance,
whereas in 18 U.S.C. 2518(7) the Attorney General may designate any
investigative or law enforcement officer to authorize emeraenev inter-
ceptions under that subsection. Second. the Attorney General or his
desinee must, conteumporaneousiv notify one of the desiumrted judges
that an emergency surveillance has been autbori7ed. There is no com-
parable requirement in 18 U.S.C. 2518(7). Third. an anplication for
an order anprovirue the surveillance must be made to that judIe within
24 hours: 18 U.S.C. 2518(7) requires the anplication tobe made within
48 hours. Fourth, the emergency surveillance cannot continue bevond
24 hours without the issuance of an order: under 18 U.S.C. 2.518(7)
the emergency surveillance may continue indefinitely until the judge
denies the application. Fifth. the Attorney General must order that
minimization procedures reauired hv this chanter for the issuance of
a iudicial order be followed durink the neriod of the vimerfrency sur-
veillance. There is no comparable provision under 18 U.S.C. 2518(7).
This last provision is desizned to insure that as much as possible be
done to eliminate the acquisition, retention, and dissemination of in-
formation which does not relate to foreign intelligence nurposes. The
committee's intent is to place the Attorney General in the role of the
court during the 24-hour emergency period. He must, examine the min-
imization procedures as the court could normally do under paragraph
(a) (4) of this section, and ensure that the appropriate procedures are
followed.
The committee wishes to emphasize that the application must be
made for judicial approval even if the surveillance is terminated
within the 24-hour period and regardless of whether the information
sought is obtained. This requirement insures that all emergency sur-
veillance initiated pursuant to this chapter will receive judicial review
and that judicial approval or denial will be forthcoming nunc pro
tune. Thus, the termination of an emergency surveillance before the
expiration of the 24-hour period shall not be a basis for the court fail-
ing to enter an order approving or disapproving the subsequent appli-
cation. It is necessary for both the Department of Justice and con-
gressional intelligence committees to have available a complete record
both of the bases for such emergency surveillance authorization and
of the judicial determinations of their legality under the statutory
standard.
This provision for emergency authorization of surveillance by the
Attorney General may not be utilized pending an appeal under sec-
tion 2523, following the denial of an application for a judicial order.
Under such circumstances, the Attorney General could not reasonably
determine that the factual basis for the issuance of an order under
this chapter to approve such surveillance exists, as required by this
subsection.
If the application is subsequently denied, or if the surveillance is
terminated without an order eventually being sought-which, as al-
ready indicated, would constitute an unlawful act under this subsec-
tion-no information obtained or evidence derived from the surveil-
lance shall be received, used or disclosed by the Government in any
trial hearing or other proceeding before any court, grand jury, depart-
ment, office, agency, regulatory body, legislative committee or other
Federal, State, or local authority. This exclusionary provision is de-
signed to be absolute.
S. 1566 as reported by the Judiciary Committee did not cover the use
of information acquired from such disapproved emergency surveil-
lance for other purposes. Further restrictions are needed so that there
is less incentive to use questionable emergency surveillances. The addi-
tional provision requires that no information concerning any U.S.
person acouired from a disapproved emergency surveillance shall sub-
sequently be used or disclosed in any other manner by Federal officers
or employees without the consent of such person, except with the ap-
proval of the Attorney General where the information indicates a
threat of death or serious bodily harm. The fact that an emergency
surveillance was conducted improperly should not disable the Gov-
ernment from using the information to protect the life or physical
safety of a person.
A denial of the apOlication may be reviewed in the same manner as
a denial of an original application under section 2523.
Section 2526
This section sets forth the permissible uses which may be made of
information acquired by means of electronic surveillance conducted
pursuant to this chapter. The fact that effective minimization with
regard to acquisition and retention may be more difficult in the foreign
intelligence area than in the more traditional criminal area, and that
this chapter contains certain less restrictive procedures than does
chapter 119-for example, 90 days or 1 year of surveillance per order
rather than 30 days-mandates that the uses to be made of the in-
formation acquired by means of this chapter be carefully restricted.
This section, therefore, places more stringent restrictions on dissemina-
tion and use than does the corresponding provision of title III, 18
U.S.C. 2517. The extent to which the Government should be required
to surrender to the parties in a criminal trial the underlying documen-
tation used to jiustifv electronic surveillance raises delicate problems
and competing interests. On the one hand, broad rights of access to the
dociunentation and subsequent intelligence information can threaten
the secrecy necessary to effective intelligence practices. However, the
defendant's constitutional guarantee of a fair trial could be seriously
undercut if he is denied the materials needed to present a proper
defense. The committee believes that a just, effective balance has been
struck in this section.
Subsection (a) requires that information concerning U.S. persons
acquired from electronic surveillance conducted pursuant to this chap-
ter may he used by Federal officers and employees only for purposes
relating to the ability of the United States to protect itself against
actual or potential attack or other grave hostile acts of a foreign
power or foreign agent. to provide for the national defense or security
of the Nation, to provide for the conduct of foreign affairs, to protect
a(rainst terrorism or sabotage by or oni behalf of a foreign power or an
agent of a foreign power; to protect against the clandestine intelligence
activities of an intelligence service or network of a foreign power or
an agent of a foreign power; or for the enforcement of the criminal
law. Thnus the lawful uses of foreign intelligence information con-
cerning U.S. citizens and resident aliens gathered pursuant to this
chanter are restricted carefully to actual foreign intelligence purposes
and the enforcement of the crinminal law.
In order to -make clear that this provision is linked directly to the
required minimization procedures, one addition has been made to
S. 1566 as reported by the Judiciary Committee. Information must
not only be used or disclosed for the specified purposes, but it must
also be used and disclosed in accordance with the minimization proce-
dures required by this chapter.
A major change from S. 3197 has been made in this section at the
insistence of the administration. Whereas in S. 3197 this section ap-
plied to all persons, regardless of whether they were Americans. S. 1560
limits the protections of section 2526(a) to U.S. persons. Information
concerning non-U.S. persons-who indeed may be. foreigners not even
in the United States-is not subject to the same restrictions as infor-
ination concerning TT.S. persons. For example, the information
obtained might be used to decort an illegal alien even though such
use of the information is not for foreign intelligence purposes and is
not for the iurpose of enforcing the criminal law.
This differentiation between T.S. persons and other persons was
sufficiently troublesomne to result, in an important Judiciary Commit-
tee amendment to section 2526(a). Bv limiting the subsection to U.S.
persons, the possibility existed that information obtained by surveil-
lance could be used in a variety of illegal ways against, for example,
foreign visitors and students. The Judiciary Committee amended this
subsection to make clear that no information acquired pursuant to
this chapter may be used or disclosed for other than lawful purposes.
The billdoes not perinmit information gathered about the lawful activi-
ties or private life of a foreign visitor to be used to illegally blackmail
him into becoming an agent against his country. S. 1566, as amended,
now requires that in those cases where the Government wishes to use
foreign intelligence information against non-U.S. persons beyond the
specific o listed in section 2526 (a), it do so in a lawful manner
and for lawful purposes.
There is no specific restriction in the bill regarding to whom Fed-
eral officers may disclose information concerning U.S. persons ac-
quired pursuant to this chapter-although specific minimization pro-
cedures might require specific restrictions in particular cases. First,
the committee believes that dissemination should be permitted to
State and local law enforcement officials. If Federal agents monitoring
a foreign intelligence surveillance authorized under this chapter were
to overhear information relating to a violation of State criminal law,
such as homicide, the agents could hardly be expected to conceal such
information from the appropriate local officials. Second, the commit-
tee can conceive of situations where disclosure should be made outside
of Government channels. For example, Federal agents may learn of a
terrorist plot to kidnap a business executive. Certainly in such cases
they should be permitted to disclose such information to the executive
and his company in order to provide for the executive's security.
Finally, the committee believes that foreign intelligence information
relating to crimes, espionage activities, or the acts and intentions of
foreign powers may, in some circumstances, be appropriately dissemi-
nated to cooperating intelligence services of other nations. So long
as all the procedures of this chapter are followed by the Federal offi-
cers, including minimization and the limitations on dissemination,
this cooperative relationship should not be terminated by a blanket
prohibition on dissemination to foreign intelligence services. The
committee wishes to stress, however, that any such dissemination be
reviewed carefully to ensure that there is a sufficient reason why dis-
closure of information to foreign intelligence services is in the inter-
ests of the United States.
Disclosure, -in compelling circumstances, to local .officials for the
purpose of enforcing the criminal law, to the targets of clandestine
intelligence activity or planned violence, and to foreign intelligence
services under the circumstances described above are generally the
only exceptions to the rule that dissemination should be limited to
Federal officials.
It is recognized that these strict requirements only apply to infor-
mation known to concern U.S. persons. Where the information in the
communication is encoded or otherwise not known to concern U.S.
persons, only the requirement that the information be disclosed for
lawful purposes applies. There is no requirement that before disclosure
can be made information be decoded or otherwise processed to deter-
mine whether information concerning U.S. persons is indeed present.
Of course, the restrictions on use and disclosure still apply, so that
if any Government agency received coded information from the inter-
cepting agency, were it to break the code, the limitations on use and
disclosure would apply to it.
Section 2526(a) also states that foreign intelligence information
obtained may be used to enforce the criminal law if its use outweighs
the possible harm to the national security. This new language, which
did not appear in S. 3197, states the obvious. The Department of
Justice always has the option of deciding whether to proceed with a
criminal prosecution or forego it in the interests of national security.
For example, the Department of Justice may decline to prosecute
rather than disclose the names of important witnesses and key inform-
ants. Whether to go forward with a criminal prosecution remains
in the exclusive hands of the executive branch and nothing in section
2526(a) changes that fact. This provision should under no circum-
stances be interpreted to deny the Attorney General the opportunity
to perform his important role in this weighing of interests.
This subsection also notes that no otherwise privileged communi-
cation obtained in accordance with or in violation of this chapter shall
lose its privileged character. This provision is identical to 18 U.S.C.
2517 (4) and is designed, like its title III predecessor, to change exist-
ing law as to the scope and existence of privileged communications only
to the extent that it provides that otherwise privileged communica-
tions do not lose their privileged character because they are inter-
cepted by a person not a party to the conversation.
Subsection (b) must be read in conjunction with the minimization
requirements of section 2521(b) (8) and with the preceding subsec-
tion (a). As previously noted, the minimization procedures mandated
by the court are designed to restrict the acquisition of information
obtained by means of electronic surveillance to information related
to foreign intelligence. However, even the most thorough minimization
efforts may result in the acquisition of some information which is not
foreign intelligence information. This subsection states that, the mini-
mization procedures required by this chapter do not preclude the
retention and dissemination of any information which is evidence of a
crime. Such disclosure would, of course, be restricted by the provisions
of subsection (a).
The implication that such criminal evidence be acquired incidentally
logically connotes that it must be acquired lawfully. This requires
that there be a good faith effort to minimize. 8 Thus for example, if
monitoring agents choose to disregard the minimization standards and
thereby acquire evidence of a crime against an overheard party whose
conversation properly should not have been acquired, that evidence
would be acquired in violation of this chapter and would properly be
suppressed if offered at any official proceeding. See subsection (C),
infra.
Disclosure, for law enforcement purposes must be accompanied by
a statement that such evidence, or any information derived therefrom,
may be used in a criminal proceedingz only with the advance authori-
zation of the Attorney General. This provision is designed to elimi-
nate circumstances in which a local prosecutor has no knowledge that
evidence was obtained through foreign intelligence electronic surveil-
lance. In granting approval of the use of the evidence the Attorney
General would alert the prosecutor to the surveillance and he, in turn,
would alert the court in accordiance with subsection (c).
28 United States v. Annocida, 515 F. 2d 29 (3d Cir. 1975).
Subsections (c), (d), and (e) set forth the procedures under which
information acquired by means of electronic surveillance may be re-
ceived in evidence or otherwise used or disclosed in any trial, hearing
or other Federal or State proceeding. Although the primary purpose
of electronic surveillance conducted pursuant to this chapter will not
be the gathering of criminal evidence, it is contemplated that such evi-
dence will be acquired and these subsections establish the procedural
mechanisms by which such information may be used in formal pro-
ceedings.
At the outset the committee recognizes that nothing in subsection
(c) abrogates the rights afforded a criminal defendant under Brady
0
v. Maryland29 and the Jencks Act.A These legal principles inhere in
any such proceeding and are wholly consistent with the procedures
detailed here. Furthermore, nothing contained in this section is in-
tended to alter the traditional principle that the Government cannot
use material at trial against a criminal defendant, and then withhold
from him such material at trial.31
Subsection (c) states that no information acquired pursuant to this
chapter may be used unless, prior to the trial, hearing, or other pro-
ceeding, or at a reasonable time prior to an effort to disclose the in-
formation or submit it in evidence, the Government notifies the court
that such information was acquired by means of electronic surveil-
lance conducted pursuant to this chapter. This provision has been
broadened in S. 1566 over its counterpart in S. 3197 by including non-
judicial proceedings. In instances in which the Government intends to
disclose surveillance information in such a nonjudicial forum, sub-
section (c) would require that the U.S. district court in the district in
which the disclosure is to take place be notified of the. proposed dis-
closure or use.
Subsection (d) parallels 18 U.S.C. 2518 (10) (a) and provides a sepa-
rate statutory vehicle by which a person who has been a subject of elec-
tronic surveillance and against whom evidence derived therefrom is
to be or has been introduced or otherwise used or disclosed in any trial,
hearing or proceeding may move to suppress the contents of any com-
munication acquired by, or evidence derived from, such electronic
surveillance. The grounds for such a motion would be that (a) the com-
munication was unlawfully acquired, or (b) the surveillance was not
made in conformity with the order of authorization or approval.
The "subject" of electronic surveillance means an individual who
was a party to a communication acquired by electronic surveillance or
was a person against whom the surveillance was directed. Thus the
word would include an "aggrieved person" as defined in section 2510 of
title III.32.
One situation in which such motion might be presented would be
that in which the court orders disclosed to the party the court order
and accompanying application under subsection (e) prior to ruling
on the legality of the surveillance. Such motion would also be appro-
priate, however, even after the court's finding of legality if, in sub-
-373 U.S. 83 (1963).
8 18 U.S.C. 3500 et sea
n1United States v. Andolschek, 142 F. 2d 503 (2nd Cir. 1944).
32See also, Alderman v. United States, 394 U.S. 165 (1967).
sequent trial testimony, a Government witness provides evidence that
the electronic surveillance may have been authorized or conducted in
violation of the court order. The most common circumstance in which
such a motion might be appropriate would be a situation in which
a defendant queries the Government under 18 U.S.C. 3504 and dis-
covers that he has been intercepted by electronic surveillance even
before the Government has decided whether evidence derived from that
surveillance will be used in the presentation of its case. In this instance,
under the appropriate factual circumstances, the defendant might
move to suppress such evidence under this subsection even without
having seen any of the underlying documentation.
A motion under this subsection shall be made before the trial,
hearing, or proceeding unless there was no opportunity to make such
motion or the movant was not aware of the grounds for the motion.
The only change in subsection (d) f roi S. 3197 is to remove as a sepa-
rate, independent basis for suppression the fact that the order was in-
sufficient on its face. This is not a substantive change, however, since
coriunications acquired pursuant to an order insufficient on its face
would be unlawfully acquired and therefore subject to suppression
under paragraph (1).
Subsection (c) states in detail the procedure the court shall follow
when it receives a notification under subsection (c) or a suppression
motion is filed under subsection (d). This procedure applies, for
example, whenever an individual makes a motion pursuant to sub-
section (d) or 18 U.S.C. 3504, or any other statute or rule of the
Tnited States to discover, obtain or suppress evidence or information
obtained or derived from electronic surveillance conducted pursuant
to this chapter (for example, Rule 12 of the Federal Rules of Criminal
Procedure). Although a number of different procedures might be
used to attack the legality of the surveillance, it is this procedure
"notwithstanding any other law" that must be used to resolve the
question. The committee wishes to make very clear that the, procedures
set out in subsection (e) apply whatever the underlying rule or statute
refered to in the motion. This is necessary to prevent the carefully
drawn procedures in subsection (e) from being bypassed by the in-
ventive litigant using a new statute, rule or judicial construction.
The special procedures in subsection (e) cannot be invoked unitil
they are triggered by a Government affidavit that disclosure or an
adversary hearing would harm the national security of the United
States. if no such assertion is made, the committee envisions that
mandatory disclosure of the application and order. and discretionary
disclosure of other surveillance materials, would be available to the
defendant, as is required under title III. When the procedure is so
triggered, however, the Government must make available to the court
a copy of the court order and accompanying application upon which
the surveillance was based.
The court must then conduct an ex parte. in camera inspection of
these materials as well as any other documents relation to the surveil-
lance which the Government may be ordered to provide, to determine
whether the surveillance was authorized and conducted in a manner
which did not violate any constitutional or statutory right of -the per-
son against whom the evidence is sought to be introduced. The sub-
section further provides .that in making such a determination, the
court may order disclosed to the person against whom the evidence is
to be introduced the court order or accompanying application, or por-
tions thereof, or other materials relating to the surveillance, only if
it finds that such disclosure is necessary to make an accurate determi-
nation of the legality of the surveillance.
The question of how to determine the legality of an electronic sur-
veillance conducted for foreign intelligence purposes has never been
decided by the Supreme Court. As Justice Stewart noted in his con-
curring opinion in Giordanov. United States:
Moreover, we did not in Alderman, Butenko or Ivanov,
and we do not today, specify the procedure that the district
courts are to follow in making this preliminary determina-
tion [of legally.]
394 U.S. 310, 314 (1968); see also, Taglianetti v. United States, 394
U.S. 316 (1968). The committee views the procedures set forth in this
subsection as striking a reasonable balance between an entirely in
camera proceeding which might adversely affect the defendant's
ability to defend himself, and mandatory disclosure, which might
occasionally result in the wholesale revelation of sensitive foreign in-
telligence information.
The decision whether it is necessary to order disclosure to a person
is for the Court to make -afterreviewing the underlying documentation
and determining its volume, scope, and complexity. The committee has
noted the reasoned discussion of these matters in the opinion of the
Court in United States v. Butenko, supra.There, the Court. faced with
the difficult problem of determining what standard to follow in bal-
ancing national security interests with the right to a fair trial, stated:
The distinguished district court judge reviewed in camera
the records of the wiretaps at issue here before holding the
surveillance to be legal * * *. Since the question confronting
the district court as to the second set of interceptions was the
legality of the taps, not the existence of tainted evidence, it
was within his discretion to grant or to deny Ivanov's request
for disclosure and a hearing. The exercise of this discretion
is to be guided by an evaluation of the complexity of the fac-
tors to be considered by the court and by the likelihood that
adversary presentation would substantially promote a more
accurate decision. (494 F. 2d at 607.)
Thus, in some cases, the Court will likely be able to determine the
legality of the surveillance without any disclosure to the defendant.
In other cases, however, the question may be more complex because of,
for example, indications of possible misrepresentation of fact, vague
identification of the persons to be surveilled, or surveillance records
which include a signifiqant amount of nonforeign intelligence informa.-
tion, calling into questAon compliance with the minimization standards
contained in the ordr. In such cases, the committee contemplates that
the court will likely decide to order disclosure to the defendant, in
whole or in part, since such disclosure "is necessary to make an accu-
rate determination of the legality of the surveillance." 33
" Cf. Alderman v. United States, 894 U.S. 165, 182 n. 14 (1968); Taglianetti v. United
States, supra at 317.
Cases may arise, of course, where the Court believes that disclosure is
necessary to make an accurate determination of legality, but the Gov-
crnment argues that, to do so, even given the Court's broad discretion-
ary power to exercise certain sensitive portions, would damage the
national security. In such situations the Government must choose-
either disclose the material or forgo the use of the surveillance-based
evidence. Indeed, if the Government objects to the disclosure, thus pre-
venting a proper adjudication of legality, the prosecution would prob-
ably have to be dismissed, and, where the Court determines that the
surveillance was lawfully authorized or conducted, the court would,
"in accordance with the requirements of la.w," suppress that evidence
which was unlawfully obtained.
The committee has chosen the general phrase "in accordance with
the requirements of law" to deal with the problem of what procedures
are to be followed in those cases where the trial court determines
that the surveillance was unlawfully authorized or conducted. The
evidence obtained would not, of course, be admissible during the trial.
But beyond this, in the case of an illegal surveillance, the Govern-
ment is constitutionally mandated to surrender to the defendant all
the records of the surveillance in its possession in order for the de-
fendant to iake an intelligent motion. on the question of taint. The
Supreme Court in Alderman v. United States, supra, held that, once
a defendant claiming evidence against him was the fruit of uncon-
stitutional electronic surveillance has established the illegality of such
surveillance (and his "standing" to object), he must be given confi-
dential materials in the Government's files to assist him in establish-
ing the existence of "taint." The Court rejected the Government's
contention that the trial court could be permitted to screen the files
in camera and give the defendant only matei-ial which was "arguably
relevant" to his claim, saying such screening would be sufficiently
subject to error to interfere with the effectiveness of adversary litiga-
tion of the question of "taint." The Supreme Court has refused to re-
consider the Alderman rule and, in fact reasserted its validity in its
Keith decision. (United States v. U.S. District Court, supra, at 393.)
Where the court determines that the surveillance was lawfully
authorized and conducted, it would, of course, deny any motion to
suppress. In addition, once a judicial determination is made that the
surveillance was lawful, a motion for discovery of evidence must be
denied unless disclosure or discovery is required by due process.
Subsection (f) provides for notice to be served on U.S. citizens
and permanent resident aliens who were targets of an emergency
surveillance and, in the judge's discretion, on. other citizens and resi-
dent aliens who are incidentally overheard, where a judge denies an
application for an order approving an emergency electronic surveil-
lance. Such notice shall be limited to the fact that an application was
made, the period of the emergency surveillance, and the fact that
during the period information was or was not obtained. This notice
may be postponed for a period of up to 90 days upon a showing of
good cause to the judge. Thereafter the judge may forgo the require-
ment of notice upon a second showing of good cause.
The fact which triggers the notice requirement--the failure to
obtain approval of an emergency surveillance-need not be based on
a determination by the court that the target is not an agent of a
foreign power engaged in clandestine intelligence activities, sabotage,
or terrorist activities or a person aiding such agent. Failure to secure
a court order could be based on a number of other factors, such as an
improper certification. A requirement of notice in all cases would have
the potential of compromising the fact that the Government had
focused an investigation on the target. Even where the target is not,
in fact, an agent of a foreign power, giving notice to the person may
result in compromising an ongoing foreign intelligence investigation
because of the logical inferences a foreign intelligence service might
draw from the targeting of the individual. For these reasons, the Gov-
ernment is given the opportunity to present its case to the judge for
initially postponing notice. After 90 days, during which time the Gov-
ernment may be able to gather more facts. the Government may seek
the elimination of the notice requirement altogether.
It is the intent of the committee that if the Government can initially
show that there is a reason to believe that notice might compromise
an ongoing investigation, or confidential sources or methods, notice
should be postponed. Thereafter, if the Government can show a likeli-
hood that notice would compromise an ongoing investigation, or con-
fidential sources or methods, notice should not be given.
A new subsection (g) has been added to S. 1566 as reported by the
Judiciary Committee, for the purpose of restricting the use of unin-
tentionally acquired private domestic radio communications. The
new subsection is needed because "electronic surveillance" as defined
in section 2521(b) (6) (C) covers only the intentional acquisition of
the contents of private domestic radio communications. Such communi-
cations may include telephone calls and other wire communications
transmitted by radio microwaves. Concern has been expressed that,
unless the use of such unintentionally acquired communications is re-
stricted, there would be a potential for abuse if the Government
acquired those kinds of domestic communications, even without in-
tentionally targeting any particular communication. The amendment
forecloses this possibility by restricting the use of any information
acquired in this manner.
In circumstances involving the unintentional acquisition, by an
electronic, mechanical, or other surveillance device of the contents of
any radio communication, where a person has a reasonable expecta-
tion of-privacy and a warrant would be required for law enforcement
purposes, and where both the sender and all intended recipients are
located within the United States, the contents must be destroyed upon
recognition. The only exception is with the approval of the Attorney
General where the contents indicate a threat of death or serious bodily
harm to any person. This restriction is not intended to prevent the
Government from maintaining a record of the radio frequency of the
communication for later collection avoidance purposes.
Section 2527
Section 2527 requires the submission of annual reports to both the
Congress and the Administrative Office of the U.S. courts containing
statistical information relating to electronic surveillance under this
chapter. The reports must include the total number of applications
made for orders and extensions and the total
number
tensions granted. modified, and denied. The statistics of orders or ex-
should present a Iquantitative indication in these reports
of the extent to which sur-
veillance under this chapter is used,
The requirements in S. 3197 for the public
tional statistics have been altered due to the reporting of certain addi-
two different types of warrant (creating introduction in S. 1566 of
a 90-day warrant for one
class of target, and a 1-year warrant for official
reporting requirements in S. 3197, if reenacted foreign powers). The
would obviousiv give foreign intelligence networks verbatim in S. 1566
mation concerning the number and duration of significant infor-
surveillances of official
foreign powers. Changes have been made, therefore,
porting requirements of S. 3197 so as to avoid in the public re-
the compromising of
sensitive information. The statistics reported pursuant
may be made public. to this section
Section 2.528
Congressional oversight is particularly important
operation of this statute. By its very nature foreign in monitoring the
veillance must be conducted in secret. The bill reflects intelligence sur-
the
secrecy: judicial review is limited to a select panel and need for such
to the target is avoided. In addition, unlike the statutory routine notice
of title IT of the Omnibus Crime Control Act of provisions
1968. i is not con-
templated that most electronic surveillance conducted
puirsuant to this
chapter will result in criminal prosecution.
For these reasons, the committee has added a new section
dealing with the information to be furnished to the appropriate to the bill
congressional committees. Section 2528 requires the
eral to inform fully the House Permanent Select Attorney Gen-
Committee oin
Intelligence and the Senate Select Committee on Intelligence
cerning all electronic surveillance under this chapter. con-
He must do so
at least semiannually.
The use of the word "fully" in this provision has
the meaning
used in Senate Resolution 460, 94th Congress, 2nd
session, which
expresses the sense of the Senate that the head of each department
and agency of the United States should keep the Select Committee
ot Intelligence fully and currently informed with respect to in-
telligence activities, including any significant anticipated activities,
which are the responsibility of or engaged in by such department or
agency." A similar provision appears in Executive Order 12036, Jan-
uary 24, 1978. This requirement does not constitute a condition prece-
dent to the implementation of any such anticipated intelligence ac-
tivity. As interpreted by the committee, the "fully" requirement
means that the committee must be given enough information to under-
stand the activities, but does not mean that the Attorney General
must set forth each and every detailed item of information relating to
all electronic surveillances. For example, the committee would
not ordinarily wish to know the identities.of particular individuals.
To preserve the' committee's right to seek further information, when
necessary, section 2528 adopts language similar.to that contained in
S. 3197 as reported in the 94th Congress. It makes clear that nothing
in this chapter shall he deemed to limit the authority and responsibil-
ity of those committees to obtain such additional information
as they
may need to carry out their respective functions and duties. In the
case of the Senate Select Committee on Intelligence, that authority
and responsibility is set forth in Senate Resolution 400,
94th Congress,
2d session.
Section 2528 also incorporates a provision contained in S. 3197 re-
quiring the Senate Select Committee on Intelligence to report each
year to the Senate concerning the implementation of this chapter. It
also provides that any amendments to this chapter proposed by the
committee shall be considered and acted upon promptly.
In the exercise of their respective functions, the Senate Select
Committee on Intelligence and the Senate Committee on the Ju-
diciary shall consult with members of the Department of Justice
and the intelligence community concerning the proper implementa-
tion of the act.
Section 3
Section 3 delays the effective date of the act until 90 days following
the designation of the first judge pursuant to section 2523 -of this
chapter. The purpose of this delay is to allow time for the development
of the applications required under this bill and of security measures
governing the submission of these applications to the courts. The
90-day delay will also prevent the situation where one judge will be
forced to handle all of the applications.
CONFORMING AMENDMENTS