The following is mirrored from its source at http://archive.aclu.org/congress/l102301g.html. © 2001, American Civil Liberties Union. Reprinted with permission of the American Civil Liberties Union (www.aclu.org). ---------------------------------------------------------------------------- How the USA-Patriot Act Limits Judicial Oversight of Telephone and Internet Surveillance The final version of the anti-terrorism legislation, the Uniting and Strengthening America By Providing Appropriate Tools Required To Intercept and Obstruct Terrorism (H.R. 3162, the "USA PATRIOT Act") limits judicial oversight of electronic surveillance by: i. subjecting private Internet communications to a minimal standard of review; ii. permitting law enforcement to obtain what would be the equivalent of a "blank warrant" in the physical world; iii. authorizing scattershot intelligence wiretap orders that need not specify the place to be searched or require that only the target's conversations be eavesdropped upon; and iv. allowing the FBI to use its "intelligence" authority to circumvent the judicial review of the probable cause requirement of the Fourth Amendment. The FBI already has broad authority to monitor telephone and Internet communications. Current law already provides, for example, that wiretaps can be obtained for the crimes involved in terrorist attacks, including destruction of aircraft and aircraft piracy. Most of the changes to wiretapping authority contemplated in the USA PATRIOT Act would apply not just to surveillance of people suspected of terrorist activity, but to investigation of other crimes as well. The FBI also has authority to intercept communications without probable cause of crime for "intelligence purposes under the Foreign Intelligence Surveillance Act ("FISA"). The standards for obtaining a FISA wiretap are lower than those for obtaining a criminal wiretap. Minimal and Inadequate Standards for Access To Internet Communications Section 216 of the USA PATRIOT Act substantially changes current law. Under current law, a law enforcement agent can get a pen register or trap and trace order requiring a telephone company to reveal the "numbers dialed" to and from a particular telephone. To obtain the order, the law enforcement agent must simply certify that the information to be obtained is "relevant to an ongoing criminal investigation." This a very low level of proof, far less than the probable cause standard (probable cause that a crime has occurred, is occurring or will occur.) - a standard that must be met now to authorize access to the contents of a communication. Under the proposed Section 216, the judge must grant the order upon receiving the certification. Even if the judge disagrees, and believes that law enforcement officers are on a fishing expedition that will yield up no relevant information, the judge must issue the order. The judge is therefore not positioned to protect the privacy of a person's telephone communications; he wields a rubber stamp. Section 216 of the USA PATRIOT Act would extend this low threshold of proof to Internet communications that are far more revealing than the numbers dialed to or from a telephone, and to portions of e-mail communications that cannot readily be separated from content. Section 216 gives law enforcement agents who obtain pen register and trap and trace orders access to "dialing, routing and signaling information." The bill does not define those terms. They would apparently apply to law enforcement efforts to determine what websites a person has visited. This is like giving law enforcement the power -- based only on its own certification -- to require the librarian to report on the books you had perused while visiting the public library. This is extending a low standard of proof -- far less than probable cause -- to "content" information even while Section 216 purports to exclude content. The contents of a telephone call are readily separated from the telephone numbers dialed to and from a telephone. However, the same cannot be said of an e-mail address and the contents of an e-mail message. This information moves together in packets. To execute the pen register and trap and trace orders authorized by Section 216, somebody must separate the e-mail address from the contents of the e-mail message of the target. The FBI's answer to this problem is troubling. It obtains access to the entire message. Then, it asserts that it can be trusted to separate the addressing information to which it would be entitled under a pen or trap and trace order from content, and retain only the addressing information. Moreover, the FBI sometimes uses the "Carnivore" Internet surveillance system to perform this function. Carnivore gives the FBI access not only to all of the target's communications, but to the communications of non-targets as well, who use the same Internet Service Provider as does the target. Section 216 would worsen the problem by giving the FBI access to communications of non-targets and to portions of the target's communications to which it is not entitled under the court order it obtained. The "trust us, we're the government" solution the FBI proposes is entirely unacceptable and inconsistent with the Fourth Amendment. While Section 216 requires reports on the use of Carnivore, it will likely result in more use of the system. Permitting Blank Warrant Equivalents Normally, court orders authorizing surveillance or a search name the "place to be searched." If information seized from that place suggests that a search of another place is warranted, a law enforcement official must apply for a new order or warrant. To prevent forum shopping by law enforcement agents, the judge having jurisdiction over the place to be searched usually authorizes the search. Section 216 of the USA PATRIOT Act permits a federal judge or magistrate in one area to issue a pen register or trap and trace order that does not name the ISP's upon which it can be served, and that can be served on ISP's anywhere in the U.S. The judge issues the order and law enforcement agents fill in the places at which the order can be served. This further marginalizes the role of the judge. Law enforcement obtains the equivalent of a blank warrant. In addition, nationwide searches of pen register and trap and trace orders effectively insulate law enforcement from challenge in court. If a small ISP in San Francisco thinks that the FBI is illegally viewing content based on a pen register or trap and trace court order issued in New York, it would have to muster its resources to fight the warrant in New York. Given these hurdles, an ISP is unlikely to challenge an over-broad court order, or challenge FBI actions that are inconsistent with the court order. Scattershot Intelligence Wiretaps The Fourth Amendment to the Constitution requires that search warrants specify the place to be searched. This provides an important privacy protection. It prevents abuses such as random searches of the homes of innocent persons based on a warrant obtained to search the home of another. In the context of electronic surveillance, the specificity requirement of the Fourth Amendment means that law enforcement officers applying for a court order must specify the phone they want to tap. In 1986, Congress amended the wiretapping law that applies in criminal cases to allow for "roving wiretaps." If law enforcement agents could prove to a judge that a person was changing telephones for the purpose of thwarting a tap of telephone lines or Internet communications specified in the order, they could obtain a "roving" wiretap that specifies a person to be tapped, not a particular telephone. In 1998, Congress relaxed the standards for roving wiretaps in criminal cases by allowing such surveillance when the target's conduct in changing telephones or facilities has the effect of thwarting the tap -- a much looser standard than the purposeful thwarting then required by the statute. The Supreme Court has not yet decided whether roving wiretaps violate the Fourth Amendment. A roving wiretap means that law enforcement agents can listen in on any phone the target might use because he is nearby. When the target of a roving wiretap order enters another person's home, law enforcement agents can tap the homeowner's telephone. Congress attempted to lessen the possibility that law enforcement officers executing a roving wiretap would intercept the conversations of innocent persons. It required that before roving surveillance of a particular telephone line could commence, law enforcement officers must ascertain that the target is actually using the line. 18 U.S.C. 2518(12). Section 206 of the USA PATRIOT Act would extend roving wiretap authority to "intelligence" wiretaps authorized by the Foreign Intelligence Surveillance Court. These wiretaps pose a greater challenge to privacy because they are authorized secretly without a showing of probable cause of crime. However, while Section 206 extends power to engage in roving wiretaps to the intelligence realm, it does not also require that law enforcement agents must first ascertain that the target is actually using the phone to be tapped. This Section represents a broad expansion of power without building in a necessary privacy protection. It means, for example, that if a terrorist was using the Internet connection at a public library and law enforcement was using a FISA wiretap order to monitor his Internet communications, it might continue to monitor all Internet communications at that site after the terrorist left and was no longer using the computer. Surveillance could remain in place, and innocent users would have their privacy invaded. Evading Judicially-Determined Probable Cause Requirements Section 218 of the USA PATRIOT Act would allow the FBI to use its intelligence gathering power to circumvent the standard that must be met for criminal wiretaps. Currently, wiretapping conducted under the Foreign Intelligence Surveillance Act, which does not contain many of the same checks and balances that govern wiretaps for criminal purposes, can be authorized only when gathering foreign intelligence information is the primary purpose of the surveillance. FISA requirements are looser than those that apply to wiretaps for criminal purposes. Most importantly, probable cause of crime need not be found by a judge in order to justify an intelligence wiretap. Section 218 would allow use of FISA surveillance authority even if the primary purpose of the surveillance is a criminal investigation. This would allow law enforcement officials to wiretap people in the United States primarily for the purpose of conducting a criminal investigation even if they did not have probable cause of crime. The fact that Section 218 would authorize such evasion of a judicial finding of probable cause of crime only when intelligence gathering was a "significant" purpose of the surveillance does not alter this fact. Because of its importance and because the surveillance this section would authorize would apply both to electronic surveillance and to physical searches, this provision is more fully described in the ACLU fact sheet: How the Anti-Terrorism Bill Enables Law Enforcement To Use Intelligence Authorities To Circumvent Privacy Protections in Criminal Cases. http://www.ratical.org/ratville/CAH/l102301g.html (hypertext) http://www.ratical.org/ratville/CAH/l102301g.txt (text only)