[House Hearing, 112 Congress]
[From the U.S. Government Publishing Office]


 
                   REAUTHORIZATION OF THE PATRIOT ACT

=======================================================================

                                HEARING

                               BEFORE THE

                   SUBCOMMITTEE ON CRIME, TERRORISM,
                         AND HOMELAND SECURITY

                                 OF THE

                       COMMITTEE ON THE JUDICIARY
                        HOUSE OF REPRESENTATIVES

                      ONE HUNDRED TWELFTH CONGRESS

                             FIRST SESSION

                               __________

                             MARCH 9, 2011

                               __________

                           Serial No. 112-14

                               __________

         Printed for the use of the Committee on the Judiciary


      Available via the World Wide Web: http://judiciary.house.gov



                  U.S. GOVERNMENT PRINTING OFFICE
65-076                    WASHINGTON : 2011
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing Office, 
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, U.S. Government Printing Office. Phone 202�09512�091800, or 866�09512�091800 (toll-free). E-mail, gpo@custhelp.com.  

                       COMMITTEE ON THE JUDICIARY

                      LAMAR SMITH, Texas, Chairman
F. JAMES SENSENBRENNER, Jr.,         JOHN CONYERS, Jr., Michigan
    Wisconsin                        HOWARD L. BERMAN, California
HOWARD COBLE, North Carolina         JERROLD NADLER, New York
ELTON GALLEGLY, California           ROBERT C. ``BOBBY'' SCOTT, 
BOB GOODLATTE, Virginia                  Virginia
DANIEL E. LUNGREN, California        MELVIN L. WATT, North Carolina
STEVE CHABOT, Ohio                   ZOE LOFGREN, California
DARRELL E. ISSA, California          SHEILA JACKSON LEE, Texas
MIKE PENCE, Indiana                  MAXINE WATERS, California
J. RANDY FORBES, Virginia            STEVE COHEN, Tennessee
STEVE KING, Iowa                     HENRY C. ``HANK'' JOHNSON, Jr.,
TRENT FRANKS, Arizona                  Georgia
LOUIE GOHMERT, Texas                 PEDRO PIERLUISI, Puerto Rico
JIM JORDAN, Ohio                     MIKE QUIGLEY, Illinois
TED POE, Texas                       JUDY CHU, California
JASON CHAFFETZ, Utah                 TED DEUTCH, Florida
TOM REED, New York                   LINDA T. SANCHEZ, California
TIM GRIFFIN, Arkansas                DEBBIE WASSERMAN SCHULTZ, Florida
TOM MARINO, Pennsylvania
TREY GOWDY, South Carolina
DENNIS ROSS, Florida
SANDY ADAMS, Florida
BEN QUAYLE, Arizona

      Sean McLaughlin, Majority Chief of Staff and General Counsel
       Perry Apelbaum, Minority Staff Director and Chief Counsel
                                 ------                                

        Subcommittee on Crime, Terrorism, and Homeland Security

            F. JAMES SENSENBRENNER, Jr., Wisconsin, Chairman

                  LOUIE GOHMERT, Texas, Vice-Chairman

BOB GOODLATTE, Virginia              ROBERT C. ``BOBBY'' SCOTT, 
DANIEL E. LUNGREN, California        Virginia
J. RANDY FORBES, Virginia            STEVE COHEN, Tennessee
TED POE, Texas                       HENRY C. ``HANK'' JOHNSON, Jr.,
JASON CHAFFETZ, Utah                   Georgia
TIM GRIFFIN, Arkansas                PEDRO PIERLUISI, Puerto Rico
TOM MARINO, Pennsylvania             JUDY CHU, California
TREY GOWDY, South Carolina           TED DEUTCH, Florida
SANDY ADAMS, Florida                 DEBBIE WASSERMAN SCHULTZ, Florida
BEN QUAYLE, Arizona                  SHEILA JACKSON LEE, Texas
                                     MIKE QUIGLEY, Illinois

                     Caroline Lynch, Chief Counsel

                     Bobby Vassar, Minority Counsel


                            C O N T E N T S

                              ----------                              

                             MARCH 9, 2011

                                                                   Page

                           OPENING STATEMENTS

The Honorable F. James Sensenbrenner, Jr., a Representative in 
  Congress from the State of Wisconsin, and Chairman, 
  Subcommittee on Crime, Terrorism, and Homeland Security........     1
The Honorable Robert C. ``Bobby'' Scott, a Representative in 
  Congress from the State of Virginia, and Ranking Member, 
  Subcommittee on Crime, Terrorism, and Homeland Security........     2
The Honorable Lamar Smith, a Representative in Congress from the 
  State of Texas, and Chairman, Committee on the Judiciary.......     4
The Honorable John Conyers, Jr., a Representative in Congress 
  from the State of Michigan, and Ranking Member, Committee on 
  the Judiciary..................................................     5

                               WITNESSES

Todd M. Hinnen, Acting Assistant Attorney General, National 
  Security Division, Department of Justice
  Oral Testimony.................................................     8
  Prepared Statement.............................................    10
Robert S. Litt, General Counsel, Office of the Director of 
  National Intellilgence
  Oral Testimony.................................................    16
  Prepared Statement.............................................    18
Nathan A. Sales, Assistant Professor of Law, George Mason 
  University
  Oral Testimony.................................................    24
  Prepared Statement.............................................    26
Julian Sanchez, Research Fellow, Cato Institute
  Oral Testimony.................................................    36
  Prepared Statement.............................................    38

          LETTERS, STATEMENTS, ETC., SUBMITTED FOR THE HEARING

Report by the American Civil Liberties Union (ACLU) submitted by 
  the Honorable Henry C. ``Hank'' Johnson, Jr., a Representative 
  in Congress from the State of Georgia, and Member, Subcommittee 
  on Crime, Terrorism, and Homeland Security.....................    61

                                APPENDIX
               Material Submitted for the Hearing Record

Prepared Statement of the Honorable Henry C. ``Hank'' Johnson, 
  Jr., a Representative in Congress from the State of Georgia, 
  and Member, Subcommittee on Crime, Terrorism, and Homeland 
  Security.......................................................    99
Letter from Debra Burlingame, Co-Founder, and Timothy Killeen, 
  Executive Director, Keep America Safe..........................   101
Letter from J. Adler, National President, the Federal Law 
  Enforcement Officers Association (FLEOA).......................   102
Letter from Konrad Motyka, President, the Federal Bureau of 
  Investigation Agents Association...............................   105


                   REAUTHORIZATION OF THE PATRIOT ACT

                              ----------                              


                        WEDNESDAY, MARCH 9, 2011

              House of Representatives,    
              Subcommittee on Crime, Terrorism,    
                             and Homeland Security,
                                Committee on the Judiciary,
                                                    Washington, DC.

    The Subcommittee met, pursuant to notice, at 1:30 p.m., in 
room 2141, Rayburn Office Building, the Honorable F. James 
Sensenbrenner, Jr. (Chairman of the Subcommittee) presiding.
    Present: Representatives Sensenbrenner, Smith, Gohmert, 
Lungren, Poe, Chaffetz, Griffin, Marino, Gowdy, Adams, Quayle, 
Scott, Conyers, Johnson, Chu, Wasserman Schultz, and Quigley.
    Staff present: (Majority) Caroline Lynch, Subcommittee 
Chief Counsel; Sarah Allen, Counsel; Arthur Radford Baker, 
Counsel; Sam Ramer, Counsel; Lindsay Hamilton, Clerk; 
(Minority) Bobby Vassar, Subcommittee Chief Counsel; Sam Sokol, 
Counsel; and Veronica Eligan, Professional Staff Member.
    Mr. Sensenbrenner. The Subcommittee will come to order.
    And welcome to today's hearing on the reauthorization of 
the PATRIOT Act. I would like to especially welcome our 
witnesses and thank you for joining us today.
    Presently I am joined by the distinguished Ranking Member 
and Chairman emeritus of the Subcommittee, Bobby Scott of 
Virginia. There will be more Members that will be coming later 
on.
    I yield myself 5 minutes for an opening statement.
    Today's hearing on the reauthorization of the PATRIOT Act 
will focus on three provisions set to expire May 27th: section 
206, roving authority; section 215, business records; and the 
``lone wolf'' definition.
    Last month, Congress approved a 90-day extension of these 
provisions to ensure their continued use by the intelligence 
community. The extension also affords this Committee the 
opportunity to review how these provisions are used and how to 
assist our national security investigations and to ensure that 
they are not being misused. The Committee plans to hold an 
additional hearing later this month on the permanent provisions 
of the PATRIOT Act.
    As the then Chairman of the House Judiciary Committee, I 
oversaw the enactment of the USA PATRIOT Act in response to the 
9/11 terrorist attacks. Title 2 of the act addressed enhanced 
foreign intelligence and law enforcement surveillance 
authority. 14 of the 16 sections of that title were made 
permanent by the 2005 PATRIOT Act reauthorization. The roving 
wiretap and business records provisions were extended to 
December 31st, 2009. Also set to expire on that date was 
section 6001 of the Intelligence Reform and Terrorist 
Prevention Act of 2004, which we call IRTPA, the lone wolf 
definition. Congress did not enact a reauthorization in 2009. 
Instead the expiring provisions were extended three times, 
first for 60 days, then for a year, and now for 90 days, and it 
is time for Congress to reauthorize this law.
    Congress should make permanent the lone wolf definition. 
This provision closes a gap in FISA that if allowed to expire 
could permit an additional terrorist to slip through the cracks 
and carry out his plot undetected. It has nothing to do 
whatsoever with any type of surveillance on these people. That 
is in other parts of the act.
    When FISA was originally enacted in 1978, America was 
concerned largely with collecting intelligence from foreign 
nations such as the Soviet Union or terrorist groups like the 
FARC in Colombia. Therefore, the law authorized intelligence 
gathering to foreign powers and their agents.
    The intelligence landscape has changed dramatically in the 
last 30 years. Today we are confronted with threats from 
individuals who may subscribe to certain beliefs but do not 
belong to a specific terrorist group. Without the lone wolf 
definition, our surveillance tools will be powerless against 
this growing threat to America's security.
    Section 206 of the PATRIOT Act authorizes the use of roving 
or multi-point wiretaps for national security and intelligence 
investigation. This allows the Government to use a single 
wiretap order to cover any communications device that the 
target is using or about to use. Without roving wiretap 
authority, investigators are required to seek a new court order 
each time a terrorist or spy changes cell phones or computers.
    Section 215 of the act allows FISA Courts to issue orders 
granting the Government access to business records and foreign 
intelligence, international terrorism, and clandestine 
intelligence cases. The 2005 reauthorization expanded 
congressional oversight and added additional procedural 
requirements and judicial review.
    Since the PATRIOT Act was enacted, these provisions have 
been scrutinized by Congress and have been either unchallenged 
or found constitutional. The lone wolf definition has never 
been challenged. Section 206 roving authority has never been 
challenged. The criminal roving wiretap authority was upheld 
under the Fourth Amendment to the Constitution by the Ninth 
Circuit in 1992. Section 215 business records was challenged, 
but after Congress made changes to that provision in the 2005 
reauthorization, the lawsuit was withdrawn. Each of these 
provisions is integral to defending America against enemy 
nations, terrorist groups, and individual terrorists and must 
be kept intact.
    I wish to welcome our witnesses and thank you for joining 
us today.
    And now I would like to recognize for his opening statement 
the gentleman from Virginia, Mr. Scott, who is the Ranking 
Member of the Subcommittee.
    Mr. Scott. Thank you, Mr. Chairman. I thank you for holding 
this hearing on the reauthorization of the expiring provisions 
of the USA PATRIOT Act. We are here on a temporary 3-month 
extension. The House passed a much longer extension. I am 
pleased that it was shorter extension, but I remain opposed to 
the extension of these provisions without changes to them to 
better ensure the rights of innocent Americans are not trampled 
upon.
    Three sections scheduled to sunset are deeply troubling. 
Section 215 of the PATRIOT Act authorizes the Government to 
secretly obtain any tangible thing so long as it provides, in 
an ex parte proceeding, a statement of facts showing that there 
is reasonable grounds to believe that the tangible things are 
relevant to a foreign intelligence, international terrorism, or 
espionage investigation. No showing of probable cause, no 
direct connection to a foreign power or agent is needed, and 
any tangible thing includes business records, library records, 
tax records, educational records, medical records, or anything 
else.
    Before the enactment of section 215, only specific types of 
records were subject to such orders and the Government had to 
show specific and articulable facts giving reason to believe 
that the person to whom the records pertain is a foreign power 
or an agent of a foreign power. While these extraordinary 
powers were authorized and defended under the rubric that they 
are necessary to protect us from patriotism, the secret dragnet 
style approach allows the Government to review personal records 
even if there is no specific and articulable facts giving 
reason to believe that the individual targeted had anything to 
do with terrorism. The justification of these extraordinary 
powers is to protect us from terrorism. Congress should either 
ensure that things collected with this power have a meaningful 
connection to at least suspected terrorism or the provision 
should expire.
    Section 206 provides for roving wiretaps, including a John 
Doe roving wiretap, which permit the Government to secretly tap 
phones it believes a non-U.S. person may use. The order may be 
against any phone, including a phone of a neighbor if the 
person has visited before and used the phone whether or not he 
is determined to be using the phone again or if the officials 
represent to a judge, on an ex parte basis, that the person is 
evasive in the use of phones.
    Section 6001, the so-called ``lone wolf'' provision, 
permits secret intelligence gathering of non-U.S. persons in 
the U.S. even if they are not affiliated with a foreign 
government or terrorist organization. We have traditionally 
limited this kind of Government power to situations that 
involve agents of foreign governments or foreign terrorist 
organizations. With the necessity for business people to 
operate in a global economy and the frequency with which 
American citizens interact with people from around the world, 
the risk that this provision poses for ordinary activities of 
such Americans to be subject to spying is unacceptable, 
especially since the Government testimony indicates that the 
lone wolf provision is rarely, if ever, used. And even if there 
was a case where there was good cause for the Government to 
keep tabs on such people, there is no reason to jeopardize the 
safeguards that protect the traditional rights and freedoms of 
Americans when we can pursue such persons under existing 
authorities which allow emergency warrants and just about any 
other Government action that is reasonably based on pursuing a 
suspect.
    It is encouraging that there was significant bipartisan 
opposition to the extension of these PATRIOT Act provisions. It 
shows a healthy skepticism of unrestrained Government power to 
spy on people in the United States. We need to restore our 
traditional respect for the right of every individual to be 
secure from unchecked Government intrusion. I hope that we can 
arrive at ways of doing so in our review of these authorities. 
We did so before under your leadership, Mr. Chairman, when we 
arrived at a version of the PATRIOT Act when it was originally 
passed that every Member of the House Judiciary Committee voted 
for, and I am confident that we can again under your leadership 
do the same thing.
    Thank you and I yield back.
    Mr. Sensenbrenner. The time of the gentleman has expired.
    The Chair now recognizes the Chairman of the Committee, the 
gentleman from Texas, Mr. Smith.
    Mr. Smith. Thank you, Mr. Chairman.
    The September 11th attack--and this September 11th marks 
the 10-year anniversary of the worst terrorist attack in U.S. 
history. America is fortunate not to have suffered another 
attack of such magnitude and devastation in the past decade. 
This does not mean that the terrorists have given up their plot 
to destroy America or that we should no longer be prepared for 
another large-scale attack. As we have seen in recent years, 
the absence of a major attack does not mean that America is 
secure.
    To avoid detection, terrorists have shifted their tactics 
away from complex, coordinated attacks by a group of terrorists 
to smaller, individualized plots by rogue terrorists.
    On Christmas Day 2009, a foreign terrorist from Nigeria 
attempted to detonate a bomb hidden under his clothes on a 
plane on the way to Detroit.
    Last spring, a radicalized American citizen from Pakistan 
tried to explode a car bomb in Times Square.
    Plots to attack both the Washington, D.C. Metro and New 
York subway systems have also been thwarted.
    And just 2 weeks ago, a 20-year-old student from Saudi 
Arabia was arrested in my home State of Texas for attempting to 
use weapons of mass destruction. Khalid Aldawasari entered the 
United States in 2008 on a student visa to complete English 
language training, but in reality, he came to the United States 
to carry out violent jihad on innocent Americans. Aldawasari 
had been planning his bombing plot for years, even seeking out 
a particular scholarship to attend school in the U.S. while 
carrying out this plot. According to prosecutors, Aldawasari 
obtained two of the three chemicals needed for a bomb over the 
last 3 months and had attempted to buy the third. He had also 
researched potential targets, including the Dallas residence of 
former President George W. Bush, several dams in Colorado and 
California, and the homes of three former military guards who 
served in Iraq.
    The PATRIOT Act was enacted to prevent both large-scale 
attacks and terrorist plots by individual terrorists acting 
alone like the one in Dallas. Unfortunately, the myths 
surrounding the PATRIOT Act often overshadow the truth, but 
this is not ``Law and Order'' or some criminal justice show 
painting the PATRIOT Act as a tool of ``Big Brother'' just for 
their ratings. This is the real world where we must address the 
real threat from foreign terrorists. As we review these 
expiring provisions, Congress must set aside fiction and focus 
on the facts.
    The three expiring national security provisions that 
Congress will consider this year are both constitutional and 
common sense. For example, the roving wiretap provision allows 
intelligence officials, after receiving approval from a Federal 
court, to conduct surveillance on terrorist suspects regardless 
of how many communication devices they use. We know terrorists 
use many forms of communication to conceal their plots, 
including disposable cell phones.
    Roving wiretaps are nothing new. Domestic law enforcement 
agencies have had roving authority for criminal investigations 
since 1986. If we can use this authority to track down a drug 
lord, why shouldn't we also use it to prevent a terrorist 
attack?
    The business records provision allows the FBI to access 
tangible items, including business records in foreign 
intelligence, international terrorism, and espionage cases. 
Again, this provision requires the approval of a Federal judge. 
That means the FBI must prove to a Federal judge that the 
documents are needed as part of a legitimate national security 
investigation.
    The third provision amends the legal definition of an agent 
of a foreign power to include a lone wolf provision. National 
security laws allow intelligence gathering on foreign 
governments, terrorist groups, and their agents. But what about 
a foreign terrorist who either acts alone or cannot be 
immediately tied to a terrorist organization? The lone wolf 
definition simply brings our national security laws into the 
21st century to allow our intelligence officials to answer the 
modern day terrorist threat.
    We cannot fight terror in this century with the tools of 
the last century. Congress must reauthorize these important 
national security laws. We simply cannot afford to leave our 
intelligence community without the resources it needs to 
dismantle terrorist organizations, identify threats from both 
groups and individuals, and interrupt terrorist plots of all 
sizes.
    Mr. Chairman, let me say in conclusion that I personally 
appreciate all the work that you have done on the PATRIOT Act. 
You were the Chairman of this Committee when it first passed. 
You have conducted oversight of the PATRIOT Act in the past. 
You are continuing to do so today. And I hope the results of 
all of our efforts will be to reassure individuals that these 
three provisions need to be extended and that they are doing a 
lot to protect the lives of Americans today.
    I yield back.
    Mr. Sensenbrenner. The Chair recognizes the most recent 
Chairman emeritus of the Committee, the gentleman from 
Michigan, Mr. Conyers.
    Mr. Conyers. I want to thank the most senior Chairman 
emeritus for recognizing me and to let you know that I do not 
know if you are, as our present Chairman, about to move the 
discussion of the PATRIOT Act from the Constitution 
Subcommittee to the Crime Subcommittee. That is your 
prerogative. And I noticed that is what the senior Chairman 
emeritus did when he was Chair. And here we are doing it again.
    Now, it is my understanding that many Members in the 
Subcommittee opposed this 3-month extension. They wanted it 
longer. I am satisfied with 3 months and apparently so is the 
other body.
    So we are here today. And I guess no one else has to 
recount all the horror stories of terrorism, incidents of 
terrorists, people arrested for terrorism and not yet 
prosecuted. That has all been done. But I am not sure if that 
is the main issue that surrounds us today because the most 
basic questions raised to me are what intrusions on our freedom 
and privacy will we accept, how much will we accept in this 
fight against terrorism. I noticed that the Chairmen of the 
Subcommittee and the full Committee have failed to even comment 
on that, which I consider to be the crux of us coming together. 
It is commented on by one of the witnesses here from the Cato 
Institute.
    What we are trying to do here today is reach a balance 
between protection and our liberties. I just want to read you 
what came from a former Senator from Minnesota--Wisconsin: ``Of 
course, there is no doubt that if we lived in a police state, 
it would be easier to catch terrorists. If we lived in a 
country that allowed the police to search your home at any time 
for any reason, if we lived in a country that allowed the 
Government to open your mail, eavesdrop on your conversations, 
intercept your email, if we lived in a country that allowed the 
Government to hold people in jail indefinitely based on what 
they write or think or based on mere suspicion that they are up 
to no good, then the Government would, no doubt, discover and 
arrest more terrorists. But that is not a country which we 
would want to live in and that would not be a country for which 
we could, in good conscience, ask our young people to fight and 
die for. In short, it would not be America.'' And so it is that 
set of concerns that to me bring us here today.
    And for all of us, I keep remembering that the Chairman's 
original PATRIOT bill was passed unanimously out of this 
Committee, and then not so mysteriously substituted in the 
Rules Committee for a bill that no one had ever seen before. 
And so it is against that backdrop that I join in welcoming all 
of the witnesses today for this discussion.
    Thank you.
    Mr. Sensenbrenner. The time of the gentleman has expired.
    Without objection, Members' opening statements will be made 
a part of the record.
    And also without objection, the Chair will be authorized to 
declare recesses during votes on the House floor.
    It is now my pleasure to introduce today's witnesses.
    Todd Hinnen is the Acting Assistant Attorney General for 
National Security at the Department of Justice. Prior to 
assuming this position, Mr. Hinnen was the Deputy Assistant 
Attorney General for Law and Policy at the National Security 
Division of the Department of Justice. He also has previously 
served as chief counsel to then Senator Joseph Biden, Jr., and 
as a director in the National Security Council's Combating 
Terrorism Directorate and as a trial attorney in the Department 
of Justice's Computer Crime and Intellectual Property Section.
    Mr. Hinnen clerked for Judge Richard Tallman on the Ninth 
Circuit Court of Appeals and he is a graduate of Amherst 
College and Harvard Law School.
    Robert Litt is the General Counsel in the Office of the 
Director of National Intelligence. Before joining ODNI, Mr. 
Litt was a partner with the law firm of Arnold & Porter, LLP. 
He served as a member of the governing body of the American Bar 
Association's Criminal Justice Section and is a member of the 
advisory committee to the standing Committee on Law and 
National Security.
    From 1993 to 1999, Mr. Litt worked at the Department of 
Justice where he served as the Deputy Assistant Attorney 
General in the Criminal Division and then as the Principal 
Associate Deputy Attorney General. His duties at DOJ included 
FISA applications, covert action reviews, computer security, 
and other national security matters.
    He started his legal career as a clerk for Judge Edward 
Weinfeld of the Southern District of New York and Justice 
Potter Stewart of the United States Supreme Court. From 1978 to 
1984, he was an assistant U.S. attorney for the Southern 
District of New York. He also spent 1 year as a special advisor 
to the Assistant Secretary of State for European and Canadian 
Affairs.
    He holds a B.A. from Harvard college and an M.A. and J.D. 
from Yale University.
    Nathan Sales is an Assistant Professor of Law at the George 
Mason University School of Law where he teaches national 
security and administrative law. Prior to coming to George 
Mason, he was a Deputy Assistant Secretary for Policy 
Development at the U.S. Department of Homeland Security.
    He has previously served as counsel and then senior counsel 
in the Office of Legal Policy at the U.S. Department of 
Justice. In 2002, he received the Attorney General's Award for 
exceptional service for his role in drafting the USA PATRIOT 
Act.
    He graduated from Duke Law School magna cum laude where he 
joined the Order of the Coif and was research editor of the 
Duke Law Journal.
    He clerked for the Honorable David B. Sentelle of the U.S. 
Court of appeals for the D.C. Circuit, and from 2003 to 2005, 
he practiced at the Washington, D.C. law firm of Wiley, Rein & 
Fielding. He was the John N. Olin Fellow at Georgetown 
University Law Center in 2005 and 2006.
    Julian Sanchez is a research fellow at the Cato Institute 
who studies the intersection of privacy, technology, and public 
policy. He has written extensively about surveillance and the 
intelligence community for publishers across the political 
spectrum, from National Review to Newsweek and The Nation. As a 
journalist, Sanchez has covered these same issues as Washington 
editor of the technology site, Ars Technica, a blogger for the 
Economist, and an editor for Reason magazine. He studied 
philosophy and political science at New York University.
    Without objection, the witnesses' statements will appear in 
the record in their entirety. Each witness will be recognized 
for 5 minutes to summarize their written statement, and the 
Chair now recognizes Mr. Hinnen.

TESTIMONY OF TODD M. HINNEN, ACTING ASSISTANT ATTORNEY GENERAL, 
       NATIONAL SECURITY DIVISION, DEPARTMENT OF JUSTICE

    Mr. Hinnen. Thank you, Mr. Chairman.
    Mr. Sensenbrenner. The Chair may withdraw his recognition 
of Mr. Hinnen, seeing if we have some votes on the floor. We 
have three votes on the floor. We will wait until the votes are 
over with and then I will recognize you for 5 minutes.
    The Committee is recessed. Would Members please come back 
here promptly following the last vote?
    [Recess.]
    Mr. Sensenbrenner. The Subcommittee will be in order, and 
the Chair will re-recognize Mr. Hinnen for 5 minutes.
    Mr. Hinnen. Thank you, Mr. Chairman.
    Chairman Sensenbrenner, Ranking Member Scott, Ranking 
Member Conyers, and Members of the Subcommittee, thank you for 
inviting me to testify today concerning the three provisions of 
the Foreign Intelligence Surveillance Act currently scheduled 
to sunset in May: the roving wiretap provision, the lone wolf 
definition, and the business records provision.
    I will make four general observations about these 
provisions and then discussion each of them briefly.
    First, these provisions are constitutional. Two of them, 
the roving wiretap provision and the business records provision 
have close analogues in criminal law: Title III roving 
wiretaps, and grand jury subpoenas. The courts have upheld each 
of these criminal analogues as constitutional. The lone wolf 
definition is simply a specific application of FISA 
surveillance authority which the courts have also upheld as 
constitutional.
    Second, they are important to our ability to conduct 
effective national security investigations. Allowing them to 
expire even for a brief time would make America less safe from 
international terrorism and other foreign threats.
    Third, they are subject to robust protections for privacy 
and civil liberties that involve all three branches of 
Government. Each requires the Government to make certain 
showings to an independent court, the FISA Court. Each imposes 
strict rules governing how the Government handles information 
regarding United States persons. Each is subject to extensive 
executive branch oversight, and each is subject to 
congressional reporting requirements.
    Fourth, these authorities have been subject to extensive 
discussions between Congress and the executive branch, and 
Congress has already renewed them several times.
    My written testimony sets forth a detailed explanation of 
how each of them works. Let me summarize it briefly.
    First, the roving wiretap provision. Ordinarily when the 
Government demonstrates probable cause that a subject is an 
agent of a foreign power and is using a facility such as a 
telephone number, the FISA Court issues two orders. One order 
is to the Government authorizing the surveillance, and the 
second order is to the provider, the telephone company, 
directing it to assist the Government. When we demonstrate to 
the court that the subject may take steps to thwart 
surveillance, such as by switching telephone companies, the 
court can issue a roving order, directing any telephone company 
to assist the Government. When the Government identifies the 
new phone number that the subject is using and initiates 
surveillance, it must notify the court within 10 days and 
provide the facts indicating that the subject is using that 
phone number.
    As courts have repeatedly held in the criminal context, a 
roving order is not a general warrant. The Government may use 
roving surveillance only against that specific agent of a 
foreign power and on a specific phone number that person is 
using. The Government obtains roving authority about 20 times a 
year on average, generally where the subject is a highly 
trained foreign intelligence officer or a terrorist with 
particularly sophisticated tradecraft.
    Second, the lone wolf definition permits surveillance when 
the Government demonstrates probable cause that a subject is 
engaged in international terrorism, even if the Government does 
not demonstrate a connection to a terrorist organization. The 
Government may not use this authority against a United States 
citizen or lawful permanent resident. Although we have not used 
this authority to date, it fills an important gap in our 
collection capabilities. It allows us to collect on an 
individual engaged in terrorist activity who is inspired by but 
not a member of a terrorist group.
    Third, the business records provision allows the Government 
to apply to the FISA Court for an order directing the 
production of tangible things that are relevant to an 
authorized national security investigation. This authority is 
analogous to grand jury subpoena authority in criminal cases. 
In fact, the Government can only obtain records that could be 
obtained by subpoena in criminal cases. But this authority 
imposes more demanding requirements on the Government than a 
criminal subpoena. The Government must demonstrate relevance 
and obtain an order from an independent court. This provision 
is used about 40 times per year on average. It has never been 
used to obtain library circulation records or the titles of 
books borrowed.
    In closing, Mr. Chairman, it is appropriate to discuss 
these authorities which are so important to our national 
security and to Americans' privacy and civil liberties, and we 
appreciate the opportunity to do so. Congress based these 
provisions on well-established, time-tested authorities in the 
criminal context and has refined them since they were enacted. 
All three are on solid constitutional footing. All three are 
important to protect this country from international terrorism 
and other foreign threats, and all three are subject to robust 
protections for privacy and civil liberties. The Department 
urges Congress to renew them.
    I look forward to the Subcommittee's questions.
    [The statement of Mr. Hinnen follows:]

    
    
    
    
    
    
    
    
    
    
    
    

                               __________
    Mr. Sensenbrenner. Thank you, Mr. Hinnen.
    Mr. Litt?

         TESTIMONY OF ROBERT S. LITT, GENERAL COUNSEL, 
        OFFICE OF THE DIRECTOR OF NATIONAL INTELLILGENCE

    Mr. Litt. Thank you, Mr. Chairman. Chairman Sensenbrenner, 
Ranking Member Scott, Ranking Member Conyers, Members of the 
Subcommittee, thank you for inviting me here to testify today 
about the three expiring provisions of the Foreign Intelligence 
Surveillance Act.
    Mr. Chairman, I particularly want to thank you for your 
leadership on PATRIOT Act issues since 2001 which have been so 
helpful for the intelligence community.
    I want to start by making clear that the three expiring 
provisions are tools that are critical to help us defend our 
national security and they must be reauthorized. At the same 
time, I want to say that I think the distinguished Ranking 
Member of the full Committee correctly identified the issue 
which is what is the proper balance to strike between the tools 
to protect national security and the protection of civil 
liberties. I think our position is--and I hope to be able to 
persuade you--that these tools in fact do that.
    I do want to begin by giving you a couple of unclassified 
examples of how these tools have been used.
    For roving taps, I can tell you that we are currently using 
one against a foreign agent who changes cellular phones 
frequently. Without roving surveillance, there would be a gap 
in collection each time this agent switched phones because of 
the time we would need to get a new court order.
    The business records provision is also important. For 
example, recently a business record order was used to obtain 
information that was essential in the investigation of Khalid 
Aldawasari, which Chairman Smith referred to earlier, who was 
subsequently arrested in Texas.
    In another case, hotel records that we obtained under a 
business records order showed that over a number of years a 
suspected spy had arranged lodging for other suspected 
intelligence officers. These records provided information about 
the subject that helped the FBI ultimately to get full FISA 
coverage.
    As you know, many uses of the authorities under FISA are 
classified and we cannot discuss them publicly. This has led to 
some myths and misconceptions about FISA and the PATRIOT Act, 
and I want to take a couple of minutes to dispel some of those.
    First, although the lone wolf definition has not been used, 
it is nonetheless an important tool to have in our toolbox in 
light of the constantly evolving terrorism threat that we face. 
Michael Leiter, the Director of the National Counterterrorism 
Center, has testified that the availability of sophisticated 
extremist propaganda on the Internet means that terrorist 
organizations can reach out and incite individual extremists to 
attack us even when those extremists may not actually be agents 
of the terrorist organization. This is the kind of situation 
that the lone wolf definition applies to, and I want to 
reiterate what Todd Hinnen just said, which is that this 
applies only to foreigners, not to U.S. citizens or lawful 
permanent residents.
    Second, criminal law authorities are not always an adequate 
substitute for FISA authorities. In particular, criminal 
wiretaps under Title III have to be disclosed to the target 
which may make it impossible to protect critical intelligence 
sources and methods. And in some cases, for example, in many 
instances when we are tracking foreign spies, we may not have a 
criminal predicate to support a Title III wiretap.
    Third, despite what some claim, we cannot get a roving 
wiretap without identifying the target. The statute requires 
that we provide the identity, if known, or a description of the 
specific target of FISA electronic surveillance.
    Finally, it is critical that the public understand that 
these are not unchecked or unrestrained authorities. We 
recognize that effective oversight of the intelligence 
community is essential both because of the powers the 
intelligence community has and because those powers are often 
exercised in secret. And we welcome that oversight. There is, 
in fact, extensive and effective oversight of these provisions 
by all three branches of Government. The legal framework 
requires that we can't predicate investigations on activity 
that is protected by the First Amendment, that information we 
collect under these authorities has to be minimized in 
accordance with procedures that are approved by the court, and 
intelligence agencies are governed by rules that limit the 
collection, retention, and dissemination of information about 
U.S. persons.
    Each of these authorities, as Todd said, requires prior 
approval by the FISA Court, and I can say from my experience in 
a year and a half on this job, that the FISA Court is not a 
rubber stamp but gives a searching review to each application 
that comes before it and often requires changes and 
modifications. In addition, FISA applications get extensive 
high-level review within the executive branch even before they 
are submitted to the court. Agents and analysts who work in 
this area get regular training in the requirements of the law, 
and use of these authorities is subject to oversight by 
inspectors general, by the National Security Division of the 
Department of Justice, and by my office, the Office of the 
Director of National Intelligence.
    And finally, the use of these authorities, including 
classified details that we can't disclose publicly, is 
regularly reported to the appropriate committees of Congress in 
a variety of ways. So there is really an extensive oversight 
framework.
    And I just want to close by reiterating that, first, as the 
Attorney General and the DNI have said, we are prepared to 
consider appropriate additional protections for civil liberties 
that don't compromise the operational utility of these 
provisions, but it is important that these provisions be 
reauthorized and reauthorized for as long a period as possible.
    Thank you.
    [The statement of Mr. Litt follows:]

    
    
    
    
    
    
    
    
    
    
    
    


                               0_________
    Mr. Sensenbrenner. Mr. Sales?

       TESTIMONY OF NATHAN A. SALES, ASSISTANT PROFESSOR 
                OF LAW, GEORGE MASON UNIVERSITY

    Mr. Sales. Thank you, Mr. Chairman. Chairman Sensenbrenner, 
Ranking Member Scott, Ranking Member Conyers, thank you for 
your time. Members of the Subcommittee, thank you for your 
time.
    My name is Nathan Sales. I am a law professor at George 
Mason Law School.
    My testimony today is that the three provisions that are up 
for renewal, roving wiretaps, business records, and lone wolf, 
are actually quite modest. Generally speaking, these tools 
simply let counter-terrorism investigators use some of the same 
investigative methods that ordinary cops have been using for 
decades, tools in fact that the Federal courts repeatedly have 
upheld. Plus, the law contains elaborate safeguards. In several 
respects, these safeguards under the PATRIOT Act are even 
stronger than the laws that apply in the ordinary criminal 
context.
    Take, for instance, roving wiretaps. Sophisticated 
criminals like drug dealers and mobsters sometimes try to evade 
surveillance by using burner cell phones or swapping out their 
SIM cards. The result is a drawn-out game of cat and mouse. 
Investigators get a court order to tap a particular phone, only 
to find out that he already switched to an even newer one. So 
it is back to the courthouse for a fresh warrant.
    Now, in 1986, Congress solved this problem for criminal 
investigators by letting them use roving wiretaps, basically a 
wiretap--a court order that applies to particular people rather 
than to particular devices. Agents, thus, can monitor a cell 
phone--a suspect regardless of what cell phone he happens to be 
using without first heading back to court for yet another 
order.
    Now, roving wiretaps have been upheld by no fewer than 
three Federal appellate courts, the Ninth, the Fifth, and the 
Second Circuits. To my knowledge, no appellate court has 
disagreed.
    So what the PATRIOT Act did was allow the same sort of 
investigative technique in terrorism cases. The basic idea is 
to level the playing field. If a roving wiretap is good enough 
for Tony Soprano, it is good enough for Mohamed Atta.
    In addition, the law contains strict safeguards. A court 
order is necessary. FBI agents can't unilaterally eavesdrop on 
every phone a person uses. They have to convince a judge that 
there is probable cause first. Agents also have to follow 
minimization procedures. That means they have to follow rules 
that limit their collection, retention, and sharing of 
information about innocent Americans, information that is 
inadvertently collected.
    Now, there may be cases where agents don't yet know the 
precise name of a terrorist. Indeed, that's one of the reasons 
why you investigate the terrorist. But even then, the law 
requires agents to provide the FISA Court with--and I am 
quoting now--a description of the specific target. They cannot 
just run a dragnet under the law.
    Second, let us focus on the business records provision. In 
criminal cases, grand juries routinely subpoena documents from 
entities like online retailers and banks. The PATRIOT Act lets 
investigators do the same sort of thing in national security 
cases, but only if they persuade the FISA Court that the 
documents they seek are relevant to an ongoing and authorized 
investigation. This provision isn't aimed at libraries, though 
it conceivably might be applied to them, although as we have 
heard, it has not yet been so. Still, that is not unusual. 
Grand juries sometimes demand business records from libraries 
in ordinary criminal investigations. Indeed, the Iowa Supreme 
Court once upheld a library subpoena in a case involving cattle 
mutilation. If we can investigate cattle mutilators, hopefully 
we can investigate international terrorists using the same 
technique.
    In fact, the PATRIOT Act's protections are even stronger 
than the protections that apply to grand jury rules. Federal 
prosecutors can issue grand jury subpoenas more or less on 
their own, but PATRIOT requires the FBI to get a court's 
approval first. In addition, PATRIOT expressly bars 
investigators from investigating Americans based on their First 
Amendment protected activities. It also imposes special limits 
when investigators seek sensitive records such as medical 
records or library records. Grand jury rules offer no such 
guarantees.
    Finally, there is lone wolf, which wasn't in the PATRIOT 
Act but which Congress adopted in 2004. Sometimes it is 
difficult to prove that a suspect is formally linked to a 
terrorist organization overseas. The FBI faced a similar 
problem just before 9/11. It was suspected that Zacarias 
Moussaoui was up to no good, but agents hadn't yet connected 
him to any foreign terrorists. As a result, it was unclear 
whether they had legal authority under FISA to search his 
apartment or search his laptop. The 9/11 Commission would go on 
to speculate later that if agents had been able to investigate 
Moussaoui, they might have unraveled the entire 9/11 plot.
    There is another reason for lone wolf: the growing danger 
of what might be called ``entrepreneurial terrorism.'' Solitary 
actors who are inspired by al Qaeda are on the rise, and they 
are capable of causing just as much death and just as much 
destruction as those who are formally members of that group.
    PATRIOT fixes these problems. Now investigators can get a 
court order to monitor any target who is engaging in 
international terrorism. There is no need to make the 
additional showing that he is engaging in international 
terrorism on behalf of a foreign power. Again, PATRIOT provides 
robust protection for civil liberties, perhaps the most 
important of which is that investigators can't start monitoring 
a lone wolf who is engaging in domestic terrorism. There is 
still a foreign nexus. Investigators can only investigate 
international terrorism.
    Thank you, Mr. Chairman. Thank you, Members of the 
Subcommittee. I would be happy to answer any questions.
    [The statement of Mr. Sales follows:]

    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
                               __________

    Mr. Sensenbrenner. Thank you, Mr. Sales.
    Mr. Sanchez?

         TESTIMONY OF JULIAN SANCHEZ, RESEARCH FELLOW, 
                         CATO INSTITUTE

    Mr. Sanchez. Thank you, Mr. Chairman, and thanks again to 
the Committee for soliciting Cato's perspective on these 
important issues.
    I am drawing in my remarks today on a forthcoming Cato 
paper focusing on these issues, which I hope to be able to make 
available within the next few days. I just want to pull out a 
few important issues about each provision here.
    With respect to lone wolf, I think it is important to 
recall that prior to the passage of this provision, the 
architecture of FISA tracked the constitutionally salient 
distinction made by a unanimous Supreme Court in the Keith case 
between ordinary national security investigations and those 
involving foreign powers which present special challenges and 
obstacles to investigations. In the absence of those special 
needs, which may justify the extraordinary breadth and secrecy 
of FISA surveillance, I think the criminal authority that a 
bipartisan Senate report found would have been available and, 
indeed, was used on 9/11 to obtain records and the laptop of 
Zacarias Moussaoui should be the norm. It is just hard to see 
why that authority is justified when we are dealing with 
persons who don't have access to the resources of a global 
terror network.
    With respect to roving wiretaps, I think it is important to 
emphasize that everyone agrees that roving authority should be 
available to intelligence investigators as it is in criminal 
cases, but that the same requirement of identifying a named 
target that the Ninth Circuit emphasized was crucial to 
allowing that criminal authority to meet the particularity 
requirements of the Fourth Amendment and limit the discretion 
of investigators so that, as the Ninth Circuit put it, there 
was virtually no possibility of error or abuse, be added on 
this side to match.
    Now, again, the roving surveillance constitutes about 22 of 
the FISA warrants issued every year, which is a tiny fraction 
of FISA surveillance. Most of those cases we have to assume do, 
in fact, involve a named target. So closing this loophole would 
affect a relatively tiny percentage of FISA warrants issued.
    I think it is also important to recognize that on the 
criminal side, there are important structural differences 
between the way surveillance is subject to scrutiny after the 
fact. The FISA Court may be informed about the nature of roving 
surveillance, but what we don't have on the FISA side is the 
assumption that surveillance collection is for the purpose of 
criminal trial where the parties will learn that they have been 
targeted by surveillance, where defense counsel will have an 
opportunity to seek disclosure and have an incentive to impose 
that kind of distributed surveillance of the enormous volume of 
collection. Again, recall, we are talking about surveillance 
that takes in essentially hundreds of years' worth of audio 
every year, millions of digital files. Without that kind of 
distributed scrutiny, there is much greater need for checks on 
the front end limiting the discretion of agents, especially in 
the context of online surveillance where I think, again, we are 
not in the situation at all where there is, as the Ninth 
Circuit put it, virtually no possibility of error or abuse.
    Finally, with respect to section 215--and I want to suggest 
that 215 orders and national security letters be grouped 
together. These are complementary orders, and so changes to one 
authority are likely to affect the scope of the other. The 
Inspector General found that it is the extraordinary breadth of 
national security letters that account for the relatively 
sparing use that has been made of section 215.
    I would like to see greater use made of 215 insofar as that 
would replace essentially agency fiat with judicial scrutiny. I 
don't need to recount for the Committee the widespread and 
serious abuse that the Inspector General has found in the case 
of national security letters. I do want to mention that former 
Senator Russ Feingold believes that 215 has been misused but 
was unable to specify in an unclassified setting what that 
might consist of.
    But I think it may actually be a mistake to focus too much 
on formal misuses of authorities that are already so broad and 
that after the PATRIOT Act permit records to be acquired that 
pertain to people who have no even suspected connection to the 
target of a terror investigation. This creates a situation 
where we have enormous and ever-growing databases consisting of 
billions of records about Americans who again are not under 
suspicion. These third party records are generally subject to 
less Fourth Amendment scrutiny which is why the probable cause 
standard here as a general rule doesn't apply. But in the last 
decade, we have seen courts increasingly finding that certain 
categories of third party records like location information do, 
in fact, merit Fourth Amendment protection in a way that has 
previously been assumed not to obtain. And there are other 
First Amendment interests often implicated by, in particular, 
telecommunication records. And so I would suggest that the 
analogy between these criminal side authorities is not always 
appropriate.
    [The statement Mr. Sanchez follows:]

    
    
    
    
    
    
    
    
    
    
    
    
    
    
                               __________

    Mr. Sensenbrenner. Thank you very much.
    The Chair will now recognize the Members alternatively by 
sides in the order in which they appear after Mr. Scott and I 
are able to question the witnesses. And I yield myself 5 
minutes.
    Mr. Sanchez, you really haven't complained very much about 
the section 215 orders and have taken off after the national 
security letters to a much greater extent. Are you aware that 
the national security letters were authorized in 1986 
legislation sponsored by Senator Leahy?
    Mr. Sanchez. I am, of course. But I believe it is 
important----
    Mr. Sensenbrenner. No, no. Okay. You know that that was not 
a part of the original PATRIOT Act.
    Are you aware that there were civil liberties protections 
that were put into the national security letter statute at the 
time of the 2006 reauthorization?
    Mr. Sanchez. Certainly.
    Mr. Sensenbrenner. What is wrong with those protections?
    Mr. Sanchez. Well, I think the problem here is that as, for 
example, the recent WikiLeaks disclosures have made clear, when 
databases, however protected or classified they may be, are 
allowed to contain so many records about so many different 
people without the requirement of some sort of individualized 
suspicion, it takes only really one bad actor to enable 
enormous disclosure of----
    Mr. Sensenbrenner. But does that mean that the tools of 
section 215 and the national security letters should be 
completely thrown out the window because of one bad actor?
    Mr. Sanchez. No. What I would suggest, however----
    Mr. Sensenbrenner. Okay. Well, then when the 
reauthorization was done, section 215 was declared 
unconstitutional by a Federal court. I believe it was in 
Michigan. And after the Congress did the reauthorization that 
many of my friends opposed, the plaintiffs withdrew their 
lawsuit. Now, were the changes that caused the plaintiffs to 
withdraw their lawsuit inadequate in any respect, and if so, 
how?
    Mr. Sanchez. Well, I would suggest, again to return to what 
I alluded to----
    Mr. Sensenbrenner. Answer the question if they were 
inadequate in any respect.
    Mr. Sanchez. I believe that one the changes that was 
considered by not implemented ultimately but that was approved 
by the Senate unanimously creating a requirement that there be 
at least a one-removed nexus to a terror suspect would have 
narrowed that authority in a way that----
    Mr. Sensenbrenner. But section 215 is directed at people 
who hold business records, and the courts have already 
determined that they are not subject to the protections of the 
Fourth Amendment because the potential criminal defendant or 
terrorist, if you would, was not in possession of those 
records. And there is a pretty significant difference that the 
courts have recognized.
    Now, you know, again I am asking if the protections were 
inadequate.
    Mr. Sanchez. Well, let me suggest two differences.
    Mr. Sensenbrenner. No. Just tell me how they were 
inadequate because there hasn't been a ruling of 
unconstitutionality.
    Mr. Sanchez. Nor, of course, covert authorities and so----
    Mr. Sensenbrenner. You know, yes, they are, but in the 
amendments, we gave anybody who got a section 215 FISA Court 
order the opportunity to go to court and to get it quashed or 
cancelled, and to my knowledge, there has been no court that 
has done that.
    Mr. Sanchez. Well, if you look at what the Inspector 
General has found about----
    Mr. Sensenbrenner. No. I am looking at what the courts have 
been saying, sir. You know, the Inspector General has got an 
opinion just as the Attorney General has an opinion. I don't 
know that since the changes in 2006 were made there has been 
any finding by a court that there is unconstitutionality.
    Mr. Sanchez. One problem is that in the criminal context 
where----
    Mr. Sensenbrenner. But we are not talking about the 
criminal context. We are talking about FISA here.
    Mr. Sanchez. But I wanted to suggest a contrast in that----
    Mr. Sensenbrenner. No. There is no need for a contrast 
because we are talking about either extending a provision of 
FISA or letting a provision of FISA drop.
    Mr. Sanchez. The third option, though, would be to extend 
it suitably narrowed to compensate for the fact that third 
party record custodians, where the acquisition of records does 
not ultimately become public, lack the incentive that they have 
on the criminal side and we see frequently in challenges to 
subpoenas for records that----
    Mr. Sensenbrenner. Well, just because they don't have the 
incentive doesn't take away their right to go to court to get 
it quashed.
    Okay. Let me talk about roving wiretaps. You know, we have 
heard from the previous witnesses that if roving wiretaps are 
okay for the Sopranos, you know, why not for Mohamed Atta. Why 
not for Mohamed Atta?
    Mr. Sanchez. I do not oppose these roving wiretaps in 
intelligence investigations.
    Mr. Sensenbrenner. Okay, thank you very much.
    My time has expired.
    The gentleman from Virginia, Mr. Scott?
    Mr. Scott. Thank you, Mr. Chairman.
    Mr. Hinnen, on the lone wolf provision, it is my 
understanding that these cannot be used against U.S. persons. 
Is that right?
    Mr. Hinnen. That is correct.
    Mr. Scott. Are they limited to terrorism as opposed to 
routine foreign intelligence?
    Mr. Hinnen. Yes. The statutory definition requires that the 
individual be engaged in or preparing for international 
terrorism.
    Mr. Scott. And what do you need to represent to a court to 
get a lone wolf----
    Mr. Hinnen. You need to demonstrate to the court probable 
cause that the individual is engaged in or preparing for 
international terrorism and probable cause that he is using or 
is about to use the telephone that you want to surveil.
    Mr. Scott. The information that you have to show that--
would that not be sufficient to get a Title III normal criminal 
warrant?
    Mr. Hinnen. It might in some cases.
    Mr. Scott. How can you have that information and it not be 
sufficient? How could it not be sufficient?
    Mr. Hinnen. It may in most cases be sufficient. I think 
that because the criminal statute requires proof of probable 
cause that a crime is being committed, whereas the FISA statute 
requires probable cause that the individual be engaged in or 
preparing to engage in international terrorism, there is a 
possibility that there might be some slight difference, but I 
will certainly grant the Congressman's point----
    Mr. Scott. International terrorism is a crime.
    Mr. Hinnen [continuing]. That they are very similar.
    Mr. Scott. International terrorism is a crime. Is that 
right?
    Mr. Hinnen. There are jurisdictional elements to criminal 
statutes as well, and we need to ensure that those are 
satisfied.
    Mr. Scott. On 215, you are entitled to get information 
relevant to foreign intelligence. Is that right?
    Mr. Hinnen. That is correct.
    Mr. Scott. Is that limited to terrorism?
    Mr. Hinnen. No, that is not limited to terrorism. That 
includes counter-intelligence as well and information regarding 
the national defense or foreign affairs.
    Mr. Scott. Foreign affairs, diplomacy.
    Mr. Hinnen. Correct.
    Mr. Scott. What was done before the USA PATRIOT Act in 
getting information? What do you get under the PATRIOT Act that 
you couldn't get otherwise?
    Mr. Hinnen. Under these specific authorities?
    Mr. Scott. Right.
    Mr. Hinnen. I think these authorities provide an 
opportunity for the intelligence community to obtain in a 
secure way, while at the same time protecting classified 
information and sources and methods, records that are relevant 
to national security investigations.
    Mr. Scott. You couldn't get that before USA PATRIOT Act?
    Mr. Hinnen. We could get it before the USA PATRIOT Act. 
Certainly the grand jury subpoena authority was available then. 
Of course, the----
    Mr. Scott. What about just FISA?
    Mr. Hinnen. You know, I don't know the answer to that 
question. I wasn't practicing in this area before the PATRIOT 
Act.
    Mr. Scott. Mr. Litt, were you practicing then?
    Mr. Litt. I am going out on a limb here. I have a 
recollection that there may have been some authority prior to 
the PATRIOT Act that was expanded in the PATRIOT Act, but I am 
not certain of that. I wouldn't want to be quoted on that. 
There certainly was NSL authority.
    Mr. Scott. But, Mr. Hinnen, what you get is information 
relevant to foreign intelligence. Do you need to show any 
probable cause of any crime or speculation or terrorism?
    Mr. Hinnen. You don't for a business records order. As with 
the grand jury subpoena----
    Mr. Scott. Do you have show that the records are connected 
to a foreign agent?
    Mr. Hinnen. Collected through a foreign agent?
    Mr. Scott. Connected to a foreign agent.
    Mr. Hinnen. You need to show that they are relevant to a 
national security investigation.
    Mr. Scott. Which includes foreign intelligence, not just 
terrorism.
    Mr. Hinnen. Correct.
    Mr. Scott. When people hear of national security, they 
think terrorism, but you are talking just normal diplomacy kind 
of stuff.
    Mr. Hinnen. No. It includes spies and espionage and that 
sort of thing as well.
    Mr. Scott. Now, on the roving wiretap, how is the standard 
to get a roving wiretap different from the normal Title III 
warrant?
    Mr. Hinnen. The difference with respect to a roving wiretap 
is that the Government has to demonstrate, in addition to 
probable cause, that the individual is an agent of a foreign 
power and is using or is about to use a telephone number. The 
Government also has to demonstrate to the court that the 
individual may take steps to thwart the surveillance.
    Mr. Scott. Now, is the roving wiretap under this authority 
limited to terrorism as opposed to 215 which is any kind of 
spying?
    Mr. Hinnen. No.
    Mr. Scott. Is the roving wiretap limited to----
    Mr. Hinnen. Excuse me. It too permits the collection of 
foreign intelligence information.
    Mr. Scott. Which----
    Mr. Hinnen. Which is the broad definition that we have been 
discussing, Congressman.
    Mr. Scott. And the minimization. You said collection, 
dissemination, and retention. Does the minimization include 
collection?
    Mr. Hinnen. It does for surveillance, yes, Congressman.
    Mr. Sensenbrenner. The time of the gentleman has expired.
    The gentleman from South Carolina, Mr. Gowdy.
    Mr. Gowdy. Thank you.
    Mr. Sanchez, you cited the Ninth Circuit which from my 
perspective is the most reversed, least likely to be correct 
circuit in the country. Can you cite any other authority for 
your concerns?
    Mr. Sanchez. As Mr. Sales mentioned, there are three 
Federal appellate courts that have examined roving wiretaps in 
the criminal context, and I think--back me up--that all three 
have stressed the additional requirement in the case of roving 
taps that a named target be identified as important to allowing 
those taps to meet the particularity standard.
    Mr. Gowdy. Would you agree with me that the United States 
can indict Fnu Lnu?
    Mr. Sanchez. Yes.
    Mr. Gowdy. Well, then why can't they investigate Fnu Lnu?
    Mr. Sanchez. I am not opposed to investigation and 
certainly of persons who are reliably believed to be connected 
to terror groups. The issue is not whether the investigation 
should happen but what constraints should exist to narrow the 
investigation to ensure that the information pertaining to 
innocent people is not swept up especially given the relative 
lack of the kind of back-end constraints that exist in the 
criminal context.
    Mr. Gowdy. Well, if you don't know the name of the person, 
if his first name is unknown and his last name is unknown, how 
are you going to investigate him under your recommendations?
    Mr. Sanchez. Well, if his first name is unknown and the 
last name unknown, how are you sure you are investigating that 
person?
    Mr. Gowdy. There are lots of people in the criminal context 
that you know a crime was committed. You don't have any idea 
what their first name or last name is. Trust me from 16 years 
of doing it. A name is sometimes the last piece of information 
that you get.
    Mr. Sanchez. And what can be done in that context is to 
target a facility. Again, both FISA and criminal warrants 
permit a facility where there is an evidentiary nexus 
connecting it to a crime or in this case an agent of a foreign 
power can be specified. The question is whether the agent in a 
case where the target is not known, where there isn't that 
anchor, has discretion to choose new facilities not----
    Mr. Gowdy. When you say the target is not known, there is a 
difference between not being known and not being identified. 
Correct?
    Mr. Sanchez. It borders on metaphysics, but yes.
    Mr. Gowdy. Well, it doesn't border on metaphysics. It is a 
fact. You can not know the identity of someone and still know 
that that person exists. Correct?
    Mr. Sanchez. Certainly.
    Mr. Gowdy. So there is a difference between being 
identified and being known.
    Mr. Sanchez. And when a target is known by description, 
which will often be connected to the facility which is 
originally monitored, I think that anchor should limit the 
extent of the warrant until identification of information about 
the identity of that person can be obtained.
    Mr. Gowdy. You don't have serious concerns about the roving 
wiretap. Correct? If I understood your testimony correctly.
    Mr. Sanchez. If it is narrowed to match the criminal 
authority, no.
    Mr. Gowdy. You are upset about national security letters, 
but that is not part of what we are doing.
    Mr. Sanchez. I was tying those with----
    Mr. Gowdy. But that is not part of this reauthorization.
    Mr. Sanchez. That is true.
    Mr. Gowdy. So roving wiretaps, not that much of an issue 
with roving wiretaps.
    Lone wolf----
    Mr. Sanchez. There is potential for roving--for these John 
Doe warrants, but I think that is, again, a very narrow set of 
cases. And so closing that loophole would----
    Mr. Gowdy. We have Fnu Lnu indictments. That would even be 
worse than a Fnu Lnu warrant. Wouldn't it? I mean, we indict 
unknown people.
    Mr. Sanchez. In the context of a criminal investigation 
where the point is, of course, to identify that person and to 
have trial in a public fashion.
    Mr. Gowdy. Business records. A Federal prosecutor can send 
a subpoena without going to any Article III judge and getting 
permission, without getting any permission from anyone, can do 
it on behalf of a grand jury anytime she or he wants to. 
Correct?
    Mr. Sanchez. Yes.
    Mr. Gowdy. So you would agree that there is an additional 
layer of protection in these cases that doesn't even exist in 
drug cases or child pornography cases or carjacking cases or 
bank robbery cases.
    Mr. Sanchez. But there is an absent layer of protection 
insofar as there is no independent grand jury in these cases 
and also insofar as the secrecy removes----
    Mr. Gowdy. Wait a second. What do you mean there is an 
absence? You think an Article III judge who has a job for life 
is less independent than a grand jury?
    Mr. Sanchez. Well, there is a difference in terms of the 
nature of the scope of the investigation. Again, on the 
criminal side, we are talking about in most cases some kind of 
nexus to a crime that has been or is being committed. And then 
again----
    Mr. Gowdy. But you would concede we cannot wait in these 
cases until a crime is committed. So that analogy falls. I 
mean, the goal is not to wait until a crime has been committed 
in these cases and then do a really good job prosecuting it. 
Correct?
    Mr. Sanchez. But to the extent that scope difference 
creates more discretion, additional protections I think are 
appropriate.
    Mr. Sensenbrenner. The gentleman's time has expired.
    The junior Chairman emeritus of the Committee, the 
gentleman from Michigan, Mr. Conyers?
    Mr. Conyers. Thank you, Mr. Chairman.
    Mr. Hinnen and Mr. Litt, I understand that the Judiciary 
Committee in the other body is considering a bill that would 
make some changes in some of this law that we are discussing, 
S. 290. Do any of you have any operational concerns about 
anything in this bill that you would like to bring to our 
attention this afternoon?
    Mr. Hinnen. Mr. Ranking Member, I am not sure exactly which 
bill S. 290 is. Who is the sponsoring Senator, please?
    Mr. Conyers. Chairman Leahy.
    Mr. Hinnen. Congressman, Mr. Ranking Member, with the 
caveat that that bill is currently going through markup or at 
least was until very recently and we may not have reviewed the 
most recent set of changes, the Administration had reached a 
point where it was supporting a very similar bill to that at 
the end of the last Congress when these provisions were set to 
expire. So without knowing every jot and title that may have 
been changed in the recent markup, we are prepared to support a 
bill that is similar to the one that was considered at the 
close of the last Congress.
    Mr. Conyers. Mr. Litt?
    Mr. Litt. Mr. Ranking Member, that bill--I think the 
provisions in there are examples of the kinds of provisions 
that I described in my statement as provisions that would 
provide enhanced protection for civil liberties without 
affecting operational utility. So, yes, that is our view on 
those.
    Mr. Conyers. Thank you both.
    Mr. Sanchez, it has been a fairly difficult afternoon, 
hasn't it? [Laughter.]
    Mr. Sanchez. I am having fun.
    Mr. Conyers. Could I inquire if you are an attorney?
    Mr. Sanchez. I am not.
    Mr. Conyers. Well, that may account for some of the 
difficulty.
    What would you tell a Member of this Committee this 
afternoon who might be thinking about voting against this 3-
year extension?
    Mr. Sanchez. Well, first of all, in terms of the 
operational impact, there is a grandfather clause. That means 
these powers would continue to be in effect for investigations 
already underway. So the immediate operational impact I think 
would likely be limited by that.
    I would suggest that certainly all three appear to--well, 
in one case, not used at all; in the other cases, used in a 
fairly limited way.
    But I would suggest that at least with respect to roving 
wiretaps in 215, what would be desirable is to sufficiently 
constrain them so that they are narrowed to minimize the 
collection of information about innocent Americans in a way to 
account, again, for the structural differences between 
intelligence and criminal investigations and that fixing these 
provisions so that they can be made permanent is actually 
preferable to allowing them to expire.
    Mr. Conyers. Does anyone here want to comment on that 
suggestion?
    Mr. Hinnen. I would just say, Congressman, that I think the 
reference to a distinction in the constitutional architecture 
between a group and an individual--I actually, with due 
respect, disagree with the assertion that that is what Congress 
did in 1978 and that that is what the Keith case does. What 
those cases do and what the Fourth Amendment cases that focus 
on this do is distinguish between the Government's interest in 
criminal investigation and the Government's interest in 
protecting the national security. They don't distinguish 
between--the distinction of constitutional significance is not 
one between an individual and a group.
    Mr. Litt. I think from the intelligence community's point 
of view, we certainly share the hope that we can reach the 
stage where these authorities can be authorized on a permanent 
basis. From our point of view, while we encourage oversight, 
having to run up against repeated expirations is not something 
that we particularly enjoy doing. I guess at the generic level, 
I can share the sentiment that I hope we get to the stage where 
we all agree on what the appropriate way is that we can 
authorize these permanently. We may disagree as to what the 
details of that are.
    Mr. Conyers. Professor?
    Mr. Sales. I think, if I may--I know we are very short on 
time. So I will be as brief as I can, which is hard for a 
professor to do.
    I think Congress has struck the right balance with the 
provisions as they exist. Since the PATRIOT Act was enacted, 
Congress has revisited these provisions time and time again, 
each time adding additional layers of oversight and additional 
safeguards. I think those additional mechanisms to protect 
privacy and civil liberties would justify a permanent extension 
of these provisions now without any additional tinkering.
    Thank you, sir.
    Mr. Sensenbrenner. The time of the gentleman has expired.
    The Vice Chair of the Subcommittee, the gentleman from 
Texas, Judge Gohmert?
    Mr. Gohmert. Thank you, Mr. Chairman.
    I appreciate your all's testimony.
    One of the things I got hit up--when we were talking about 
extending 206, 215 of the PATRIOT Act, was that under 206, 
apparently somebody had been talking about it on TV that that 
could allow the FBI to get a wiretap on an entire neighborhood 
because the person being pursued had used a neighbor's phone 
before and therefore might be likely to use other people's 
phones in the neighborhood. Has anybody here ever heard of an 
entire neighborhood being wiretapped under 206?
    Mr. Hinnen. No, Congressman, and I think that would be 
inconsistent with the terms of the statute which require the 
Government to demonstrate probable cause that the specific 
agent of a foreign power is using a specific telephone number.
    Mr. Litt. In addition to that, when you do get a roving 
wiretap order, every time the agents go up on a new telephone, 
they have to report that to the FISA Court within 10 days and 
they have to report the specific basis on which they believe 
that the particular facility was being used. And I would doubt 
that that would pass muster with the FISA Court if anybody 
tried that.
    Mr. Gohmert. In my understanding with the roving wiretap, 
the goals was to go after cell phones that could be disposed of 
quickly and not give time to go after the new phone. Is that 
correct?
    Mr. Hinnen. And other similar kinds of tradecraft where 
individuals cycle through providers quickly in order to try and 
shake surveillance, yes.
    Mr. Gohmert. Professor, do you have any comment on that? Do 
you think it is plausible, possible even to get a wiretap of an 
entire neighborhood under 206?
    Mr. Sales. No, sir. I think that would be inconsistent with 
the terms of FISA as it is written. As my colleagues have said, 
FISA is very clear about what is required in order to initiate 
surveillance. You must establish, in the case of 206, probable 
cause to believe that the target is engaging in international 
terrorism. I think it would be extraordinarily difficult to 
persuade the FISA Court that there is probable cause to believe 
that an entire neighborhood is engaging in international 
terrorism.
    In addition, it must be shown that there is probable cause 
to believe that the target is using a specific facility in 
question. If there is a terrorist using a phone, then we should 
be listening to it, but it is inconceivable to me that the FISA 
Court would approve dragnet surveillance like this. I think 
that is the most important part. It is the court that decides, 
not the FBI.
    Mr. Gohmert. Well, Mr. Sanchez, you brought up NSL's. I 
think most of us were quite alarmed when the IG came in with a 
report that they had been badly abused and they were not 
getting the supervision we had been assured that NSL's would 
get. And you had FBI agents just doing fishing expeditions 
without proper supervision.
    If I understood you correctly, you seem to think that 215 
could take care of the needs that are currently given to--or 
the power that is currently under the national security 
letters. Is there anybody else that you know of that agrees 
with that? If you just did away with national security letter 
power----
    Mr. Sanchez. I am not proposing doing away with the 
national security letter power.
    Mr. Gohmert. Oh, you are not? What is your specific 
proposal?
    Mr. Sanchez. My suggestion is that if the national security 
letter authority were narrowed further, for example, as it 
previously did, to permit the acquisition of records that 
pertain to a suspected terrorist and in the case of 
communications records for basic subscriber information for 
persons believed to be in contact with a suspected terrorist, 
that narrower authority could allow the kind of initial 
investigation on the basis of relatively limited records that 
don't sweep in people 2 and 3 degrees removed. And if that kind 
of greater breadth is necessary, 215 orders could be employed 
for those categories of records.
    Mr. Gohmert. So you think national security letters do 
perform an important function. They just need to be narrowed. 
Is that correct?
    Mr. Sanchez. I think that is accurate, yes.
    Mr. Gohmert. I see my time has expired and I yield back.
    Mr. Sensenbrenner. The time of the gentleman has expired.
    The gentleman from Georgia, Mr. Johnson?
    Mr. Johnson. Thank you, Mr. Chairman, for holding this very 
important hearing.
    I have--well, before I go down that line, let me say that 
section 215, the business records section, can be used against 
Americans who are alleged to be an agent of a foreign power. Is 
that correct?
    Mr. Hinnen. Yes, that is correct.
    Mr. Johnson. And you would just simply need specific and 
articulable facts giving reason to believe that an American may 
be assisting a foreign power or an agent of a foreign power, in 
other words, not probable cause but a level below probable 
cause.
    Mr. Hinnen. Certainly the relevant standard is a more 
lenient or a minimal standard as opposed to probable cause.
    What the business records provision actually allows us to 
do is to get records from a third party custodian, to go to a 
bank and get an individual's bank records or that kind of 
thing. And so that is why the importance is demonstrating their 
relevance to a national security investigation, not necessarily 
anything specific about the individual because they don't 
actually act against the individual directly.
    Mr. Litt. Let me here--just to be clear, in those FISA 
authorities which do depend upon a finding that somebody is an 
agent of a foreign power, that finding is based on probable 
cause by the court.
    Mr. Johnson. The finding that the person is an agent of a 
foreign power looks to me that it simply requires a showing of 
specific and articulable facts as opposed to probable cause. I 
am correct on that, am I not?
    Mr. Hinnen. That was the distinction, Congressman, I was 
trying to draw. I don't think I articulated it very well. What 
the business records provision requires the Government to show 
is something with respect to the investigation itself rather 
than something----
    Mr. Johnson. Yes. Well, I understand that part. That is 
probable cause, the fact that it may be related to a terrorism 
or a security investigation, national security.
    But the person whose documents are being subpoenaed, if you 
will--that person can be an American and they can be 
established as an agent of a foreign power merely through an 
articulable, reasonable suspicion as opposed to probable cause.
    Now, I have serious concerns about the possible abuse and 
misuse of counter-terrorism technologies developed by Federal 
contractors under the authority of the PATRIOT Act and the 
Homeland Security Act. Are either one of you familiar with the 
recent Chamber leaks controversy?
    Mr. Litt. I am sorry. The recent what?
    Mr. Johnson. Chamber leaks, a situation where there was a 
group of----
    Mr. Litt. The Chamber of Commerce?
    Mr. Johnson. Yes.
    Mr. Litt. I am familiar from reading it in the newspapers, 
yes.
    Mr. Johnson. So the technologies that were developed by 
these security contractors which could have been unleashed on 
American citizens for domestic illegitimate purposes, the 
mining of social network sites, the planting of false personas 
and things like that, false documentation--these are 
technologies that are depended upon by individuals who are 
executing their authority under the PATRIOT Act. Correct?
    Mr. Litt. Well, I don't specifically know what technologies 
those people planned to use, but I do know----
    Mr. Johnson. Let me ask you are you familiar with Palantir 
Technologies, Bar Code technologies, or HBGary Federal and 
whether or not the Department of Justice or the national 
security agency which you belong to, Mr. Litt, contracts with 
any of those firms for their software?
    Mr. Litt. I am familiar with the names of the companies. I 
don't know whether there are any contracts between the 
intelligence community and any of those companies.
    Mr. Johnson. Well, I have asked for a congressional hearing 
to take place in Judiciary, and I look forward to hearing back 
from the Chairman of the full Committee as to whether or not 
there will be hearings held on this most important topic, which 
is directly related to our subject matter today.
    Thank you.
    Mr. Sensenbrenner. The time of the gentleman has expired.
    The gentleman from California, Mr. Lungren?
    Mr. Lungren. Thank you very much, Mr. Chairman.
    Mr. Sanchez, you talked about the Ninth Circuit. I am a 
little familiar with the Ninth Circuit. They were, during the 
time I had experience with them, the most reversed circuit in 
the entire United States. I think 1 year they had 19 out of 20 
cases reversed; 1 year, 21 out of 22, a number of them that my 
office brought before the Supreme Court.
    But I was interested in the language that you cited as 
exemplary for what we ought to be using. It really caught my 
attention because you quoted their language saying that they 
approved it in the criminal context because there is virtually 
no possibility of abuse or mistake. I guess my question is, 
should that be the standard that we use, virtually no 
possibility of mistake, before we are allowed to have a roving 
wiretap in a case in which we are trying to stop an attempted 
terrorist attack?
    Mr. Sanchez. Well, I should say in the context----
    Mr. Lungren. I mean, that is the language that you used. So 
I assume that you meant that that is the kind of standard we 
ought to have, virtually no possibility of mistake.
    Mr. Sanchez. I think in fact, again in particular when we 
are talking about online surveillance or surveillance of 
electronic communications, anytime a tap is roving, there is 
inherently some possibility of error, but that is dramatically 
magnified without the anchor of----
    Mr. Lungren. So that would not be your standard. I 
appreciate that.
    Mr. Litt and Mr. Hinnen, sort of the general talk about 
roving wiretap--can you tell me how many times it has been 
utilized under section 206?
    Mr. Hinnen. I am afraid we don't have that number with us 
today. As I mentioned in my testimony, we obtain the 
authorization about 20 times a year. The set of circumstances 
doesn't always eventuate such that we need to use the authority 
despite the fact that we have gotten it. So it would be 
something less than 20 times a year.
    Mr. Lungren. There would be some people that would believe 
perhaps, if they heard some of the commentary today, that my 
goodness, if we don't have the same restrictions that you have 
in a criminal case, this must give rise to your ability to have 
a wide-ranging, exploratory search with no specificity. As I 
read the statute, it doesn't allow that. Could you explain 
exactly what you have to do in order to obtain the authority 
for a roving wiretap in a section 206 case?
    Mr. Hinnen. Sure. Thank you, Congressman.
    The Government has to make three important showings in that 
case. It has to make the two showings that are required for 
regular FISA surveillance in any case: probable cause to 
believe the individual is an agent of a foreign power and 
probable cause that the individual will use the specific phone 
number----
    Mr. Lungren. The individual. It is an individual even 
though you may not know the individual's name.
    Mr. Hinnen. That is correct. I thought Congressman Gowdy 
did an excellent job of demonstrating the difference between 
being able to identify someone and being able----
    Mr. Lungren. But I want to make sure that as you understand 
the statute, it requires you to have some specificity with 
respect to an individual who is the target of your inquiry.
    Mr. Hinnen. That is correct, Congressman. Specificity both 
with respect to a specific individual and with respect to a 
specific phone number.
    Mr. Lungren. And if in fact in the process of using the 
roving wiretap, you move it to another instrumentality, do you 
not have to then inform the court of that?
    Mr. Hinnen. We do. We have to inform the court of the facts 
that lead us to believe that the target for whom we have 
already shown probable cause that he was an agent of a foreign 
power is using a specific phone number at that new provider.
    Mr. Lungren. So there is a continuing oversight by the 
court in that context?
    Mr. Hinnen. That is correct.
    Mr. Lungren. And obviously in a criminal case and in a case 
such as this, when you allowed to have a roving wiretap, I 
assume you collect conversations with people who are not 
targets.
    Mr. Hinnen. That is certainly correct that when the 
Government conducts surveillance, not every conversation 
relates to the conduct being----
    Mr. Lungren. And the Government has done this for years and 
years in the criminal context. I presume that you handle it in 
this context in a similar manner, that is, you are required to 
minimize those conversations of people who are not targets. 
Correct?
    Mr. Hinnen. Although the minimization process works 
slightly differently, yes, there is a strict minimization 
requirement in the FISA statute.
    Mr. Lungren. Would you explain for the record what that 
minimization process is?
    Mr. Hinnen. In a criminal context, real-time minimization 
is required. In other words, an agent literally listens to the 
phone call, and if it appears to be a call to mom about picking 
up milk on the way home, the call is dropped. Because Congress 
recognized that spies and terrorists don't always operate that 
way, there may be language issues, there may be issues of 
talking in code, there may be tradecraft issues, the FISA 
statute does not require real-time minimization. It requires 
after-the-fact minimization.
    Mr. Lungren. But minimization nonetheless.
    Mr. Hinnen. Minimization nonetheless.
    Mr. Sensenbrenner. The time of the gentleman has expired.
    The gentlewoman from California, Ms. Chu?
    Ms. Chu. I was interested in a couple of anecdotes from the 
Inspector General report, the first case where the FBI was 
collecting information about a certain telephone line. During 
this time the phone company assigned the number to a different 
person but failed to inform the FBI of this fact for several 
weeks, and as a result, the FBI collected information about an 
innocent person who was not connected to the investigation.
    And then a second anecdote where the FBI learned that a 
source who had provided significant information about the 
target changed his mind and no longer believed that the target 
was involved with a particular terrorist group, but the change 
was not reported to the court until about a year later. Hence, 
all that information was collected.
    Well, let me ask about these roving wiretaps, Mr. Hinnen or 
Mr. Litt. The criminal law also permits roving wiretaps, as it 
should, but it also includes a critical protection that section 
206 of the PATRIOT Act does not. It requires the Government to 
specifically identify the target if it is not going to identify 
a device and rove with an individual. There have been 
legislative fixes proposed for almost 10 years to put this 
common sense protection into FISA. Do you oppose this proposal 
or do you support this proposal? Please explain what your 
position is on this.
    Mr. Litt. I must say I think that proposal is entirely 
unnecessary. As Mr. Hinnen explained before, the FISA statute 
already requires that we either identify the person by name or 
give a sufficient description of him so that we know who it is.
    I must say I spent a number of years at the beginning of my 
career as an assistant U.S. attorney, and I encountered 
situations where we would wiretap somebody and the target of 
the wiretap would be, you know, John Doe, aka, Chico. All we 
knew was a nickname, but we knew enough to know who it was so 
that when we were listening to the phone, as Mr. Hinnen said, 
we could turn it off if we didn't have our target on the line.
    It is the same principle here. We may not know the person's 
name and we certainly may not know that we know his true name, 
but we can't get a FISA order unless we know enough to convince 
the court that we know who the person is and that that person 
is an agent of a foreign power. And that requires 
particularity.
    Ms. Chu. Well, another protection in criminal wiretaps is 
that the Government must ascertain that the subject is actually 
using the device before it begins recording, thereby greatly 
reducing the number of innocent people that are inadvertently 
recorded by the Government. As you can see here in the anecdote 
that I just named, the suspected person wasn't even using that 
particular phone.
    Do you oppose putting this protection into FISA, and if so, 
why?
    Mr. Hinnen. Congresswoman, that protection is in FISA for 
surveillance. The Government must show, in addition to probable 
cause that the targeted individual is an agent of a foreign 
power, probable cause that the individual is using or is about 
to use the phone. I suspect--and I am not familiar with that 
particular passage of the Inspector General's report, but I 
expect that that was a mistake. I won't sit here and tell you 
that mistakes never occur in this area of human endeavor, just 
like they occur in all others. But the FISA statute does 
require the Government to demonstrate probable cause that the 
individual is using or about to use the specific number that 
the Government wants to conduct surveillance on.
    Ms. Chu. Mr. Sanchez, how do you respond to this?
    Mr. Sanchez. I think what is crucial to keep in mind when 
talking about the equivalence between two powers is the larger 
framework in which they are embedded. So as Mr. Hinnen already 
discussed, collection in the first instance is much broader, is 
weighted toward, as the FISA Court has said, the Government's 
need to acquire foreign intelligence, and that even when it is 
minimized, often that doesn't entail the destruction of 
information. So there have been a number of cases where FISA 
recordings that were nominally minimized were when the 
Government was faced with the Brady obligation to provide 
exculpatory information, they were actually able to ultimately 
retrieve many, many times more hours of recording than had been 
not minimized.
    So in particular, in the context of where you are talking 
about roving across facilities where I think the inherent 
possibility of using an identifier like Chico creates a lot 
more slippage, a lot more potential for error, the need to 
compensate on the front end means that the protections on the 
discretion of agents need to be at least as strong as they are 
on the criminal side where, again, there is going to be a lot 
more back-end scrutiny in a distributed fashion if not by the 
court itself.
    Mr. Sensenbrenner. The time of the gentlewoman has expired.
    The gentleman from Pennsylvania, Mr. Marino?
    Mr. Marino. Thank you, Mr. Chairman.
    Gentlemen, I think you have been asked a question to a 
certain extent, but before I ask you to answer my question, am 
I correct there are two attorneys and two non-attorneys? Or 
there are three attorneys and one non-attorney. Got it. All 
right.
    Just for the interest of brevity, I would like to start at 
the left end, my left, of the table. Could you please 
succinctly describe the difference between a Title III search 
warrant and a FISA warrant? I think that is critical at this 
point because as a U.S. attorney for 6 years and a district 
attorney for 12 years, to some extent I had more latitude as a 
district attorney in acquiring a Title III warrant than I did a 
FISA warrant.
    Mr. Hinnen. Yes, Congressman. The principal differences 
between a Title III warrant and a FISA order are that in the 
first case the Government needs to demonstrate that the 
individual target is an agent of a foreign power, not an 
individual committing a crime but must show probable cause in 
both cases.
    Second, Congress decided in 1978 that it would be harmful 
to foreign intelligence investigations if the strict notice 
requirements in Title III also existed in the criminal context. 
You would essentially in every case in which you conducted 
surveillance against a spy or a terrorist have to notify him 
within a certain amount of time after that surveillance had 
occurred.
    And then the last is one that we have already discussed 
here today as well which is in the technical manner in which 
the minimization is applied to the information collected.
    Mr. Marino. Attorney Litt, please. Can you follow up on 
that?
    Mr. Litt. I agree with that.
    Mr. Marino. Good.
    Professor?
    Mr. Sales. Thank you, Congressman.
    I agree with that and one additional and important 
difference between the Title III context and the FISA context 
is the internal approval mechanism for a wiretap order. In the 
Title III context--let me talk about the FISA context first.
    The FISA context requires incredibly high-level sign-off 
from the highest levels within the Justice Department. The FBI 
Director is involved. The Deputy Attorney General is personally 
involved. The Attorney General is personally involved. That is 
much more rigorous internal executive branch scrutiny than you 
have for a Title III wiretap which I suspect may explain your 
own experience of the relative ease of obtaining a Title III 
versus a FISA.
    Mr. Marino. And it hinges on the credibility of the United 
States attorney and the FBI agent or whatever agent requesting 
that. Okay.
    Mr. Marino. Sir?
    Mr. Sanchez. I think they have covered it fairly well, but 
I would stress again the distinction between minimization in 
real time and minimization after the fact as again weighted 
toward broad acquisition of most of the information flowing 
through a facility unless it could not be foreign intelligence 
information which almost anything could. So again, just the 
idea that there is much broader initial collection.
    Mr. Marino. Broader initial collection where?
    Mr. Sanchez. That is to say as opposed to the case where 
information is recorded only when there is some nexus to the 
predicate offense, there is generally recording of all 
communications.
    Mr. Marino. You know, with all due respect you are throwing 
out first-year law school criminal law terms, ``predicate 
offense,'' ``nexus,'' you know, the whole 9 yards, something 
that any one of us can get off the Internet. But you are not 
getting specifics. Do you understand, sir, with all due 
respect, the delineation between the two and what one has to go 
through for the FISA order compared to the Title III?
    Mr. Sanchez. I do. I am referring only to, again, the 
question of when minimization occurs, which everyone else here 
has, I think, already alluded to.
    Mr. Marino. Thank you.
    I yield my time.
    Mr. Sensenbrenner. The gentleman from Arkansas, Mr. 
Griffin?
    Mr. Griffin. Thank you, Mr. Chairman.
    I want to follow up with some questions for you, Mr. 
Sanchez. I was reading in your written statement when you were 
talking about--and these pages are not numbered. You have a 
section here where you are talking about the transparency that 
normally surrounds the acquisition of documents via grand jury 
subpoena.
    Mr. Sanchez. Yes.
    Mr. Griffin. And you indicate that it is impossible to 
overstate the significance of the transparency that normally 
surrounds the acquisition of documents by those means, those 
means being via the grand jury subpoena. Could you talk a 
little bit about what that transparency is?
    Mr. Sanchez. Well, insofar as normally on the criminal side 
that those processes do not involve gag orders, as 215 orders 
and national security letters normally do, the incentives I 
believe are different for companies served with those orders. 
They are not always incentivized to stand up for the privacy 
rights of their customers, the people whose records they are in 
custody of. But we see frequently booksellers or companies like 
Google moving to quash subpoenas specifically citing the ground 
that they fear that their reputation would be damaged by the 
disclosure of the fact that they were turning over sensitive 
records without making any kind of move to limit the scope of 
the subpoenas.
    By contrast, what we have seen, again, in at least the 
national security letter and 215 cases, is that often when 
there have been identified misuses, they have typically 
occurred with the enthusiastic collaboration of the record 
custodians, often violating the rules because of 
overproduction.
    Mr. Griffin. I am limited on time here.
    So I guess in my experience, I haven't seen a lot of 
transparency, not that it is warranted. The whole nature of a 
grand jury process is secrecy. I am not sure where you are 
going with your transparency argument. But the grand jury 
issues the subpoena in secrecy. It is issued and complied with 
in secrecy. The documents are obtained and brought to the grand 
jury. So I am not exactly sure what that argument is that you 
are making there.
    But I also want to go over here. You talk about the PATRIOT 
Act's roving wiretap provision includes no parallel requirement 
that an individual target be named. We just discussed that. We 
were given the example of at least identifying the individual 
even if we don't know the name.
    But then you go on and you say, quote, this is disturbingly 
close to the sort of general warrant the Founders were so 
concerned to prohibit when they crafted our Bill of Rights. A 
little hyperbole there maybe.
    Mr. Litt, would you comment on that?
    And this gets me to the broader question, and this is what 
I have heard a lot back home. If you would each--I know I am 
running out of time--just briefly comment on the 
constitutionality of the three provisions that we just voted to 
extend. Do you any of you have constitutionality concerns? And 
if this was asked previously, I apologize.
    Why do we not just start on the end and go down?
    Mr. Hinnen. No, Congressman.
    Mr. Griffin. Mr. Litt?
    Mr. Litt. No. No, I don't. I think the only two issues that 
have been raised--with respect to the lone wolf provision, I 
think there has been concern expressed that this may be beyond 
the national security powers as set out in the Keith case. And 
I think that when you have a situation where you are talking 
about non-U.S. persons who are engaged in international 
terrorism and a collection which is certified to be for the 
purpose of collecting foreign intelligence, I don't think that 
is a serious constitutional concern.
    And similarly, for the reasons we previously discussed, I 
think that the roving wiretap adequately meets the 
particularity requirement of the Fourth Amendment.
    Mr. Griffin. Mr. Sales?
    Mr. Sales. Thank you, Congressman.
    I agree with that as well.
    I think we are pretty far away from the days of King George 
III. FISA, as amended by the PATRIOT Act, doesn't allow the 
sort of general warrant dragnets that our founders justifiably 
worried about 200 years ago. That is not the situation that 
FISA authorizes. In all cases, FISA, as amended by the PATRIOT 
Act, requires probable cause to believe that the target is an 
agent of a foreign power, i.e., somebody who is a spy or a 
terrorist. That seems like it meets the particularity 
requirement pretty precisely to me.
    Mr. Sensenbrenner. The time of the gentleman has expired.
    Mr. Griffin. Thank you, Mr. Chairman.
    Mr. Sensenbrenner. I would like to thank all of our 
witnesses today for their testimony. I think it has been very 
enlightening and elucidating.
    Without objection, all Members will have 5 legislative days 
to submit to the Chair additional written questions for the 
witnesses which we will forward and ask the witnesses to 
respond as promptly as they can so that their answers may be 
made part of the record.
    The gentleman from Georgia?
    Mr. Johnson. Thank you, Mr. Chairman.
    I would ask unanimous consent to introduce into the hearing 
record a report by the American Civil Liberties Union titled 
``Reclaiming Patriotism.''
    Mr. Sensenbrenner. Without objection.
    [The information referred to follows:]

    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
                               __________

    Mr. Sensenbrenner. Also without objection, all Members will 
have 5 legislative days to submit any additional materials for 
inclusion in the record, and without objection, the hearing is 
adjourned.
    [Whereupon, at 3:54 p.m., the Subcommittee was adjourned.]


                            A P P E N D I X

                              ----------                              


               Material Submitted for the Hearing Record

 Prepared Statement of the Honorable Henry C. ``Hank'' Johnson, Jr., a 
   Representative in Congress from the State of Georgia, and Member, 
        Subcommittee on Crime, Terrorism, and Homeland Security
    Mr. Chairman, on October 26, 2001, in a time of fear and 
uncertainty that followed the terrorist attacks of September 11, 2001, 
President George W. Bush signed the Uniting and Strengthening America 
by Providing Appropriate Tools Required to Intercept and Obstruct 
Terrorism Act of 2001, commonly referred to as the PATRIOT Act, into 
law.
    The PATRIOT Act is one of the most controversial laws to date. It 
was more than 300 pages long and was passed a little over a month after 
the September 11th attacks.
    I am not down-playing the significance of the September 11th 
attacks; it was the worst terrorist attack in American history.
    While the threat of terrorism is real, and law enforcement must 
have the right tools to protect Americans, any counterterrorism 
measures must have a solid Constitutional footing and respect the 
privacy and civil liberties of the American people.
    The framers of the Constitution recognized the inherent danger of 
giving the government unbridled authority to look into our private 
lives and put checks and balances in place to curb government abuses.
    As we started off the 112th Session, my colleagues on the other 
side of the aisle demonstrated their commitment to the Constitution by 
reading it on the House floor.
    Surely, they are familiar with the Fourth Amendment which states 
``[t]he right of the people to be secure in their persons, houses, 
papers, and effects, against unreasonable searches and seizures, shall 
not be violated, and no Warrants shall issue, but upon probable cause, 
supported by Oath or affirmation, and particularly describing the place 
to be searched, and the persons or things to be seized.''
    The provisions of the PATRIOT Act that will sunset on May 27, 2011 
are disconcerting and expand the government's authority to meddle in 
our lives with little or no evidence of illegal conduct.
    Section 215 of the PATRIOT Act allows the government to seize ``any 
tangible thing,'' from an American who has not been suspected of 
terrorism, including library records and diaries, relevant to a 
terrorism investigation, even if there was no showing that the 
``thing'' pertains to suspected terrorists or terrorist activities.
    Section 206 of the PATRIOT Act, commonly referred to as the 
``roving wiretap'' provision, is less controversial. Roving wiretaps 
are commonly used by law enforcement and it is reasonable to make it 
available to intelligence officers. Under the Foreign Intelligence 
Surveillance Act (``FISA''), ``John Doe'' wiretaps that do not specify 
the person's identity are allowed. This standard could be tightened to 
decrease the likelihood that the wrong person will be targeted.
    Finally, Section 6001 of the Intelligence Reform and Terrorism 
Prevention Act of 2004 (``IRTPA''), also known as the ``lone wolf'' 
provision, permits secret service intelligence surveillance of non-U.S. 
persons suspected of being involved in terrorist activities even if 
they are not connected to any overseas terrorist group. Because the 
``lone wolf'' provision operates in secret, it could be subject to 
government abuses. To date, this provision has never been used.
    There is bipartisan consensus, evidenced by the 26 Republican 
Members who voted against reauthorization of the expiring provisions of 
the PATRIOT Act on February 17th, that they need improvement to 
preserve the rights of the American people.
    If Congress reauthorizes these provisions again with no changes, 
Americans merely visiting a website, mentioning a matter under 
investigation on social networks, or checking out a ``controversial'' 
book from a library is enough not only to invade the privacy of law-
abiding Americans, but to also do so without any of them knowing that 
the Feds are watching.
    One of the most difficult tasks for Congress is balancing the 
nation's need for security against Americans' rights to privacy, but 
this is a duty that should not be ignored.
    I look forward to hearing from the witnesses about how we can 
achieve this goal.
    Thank you, Mr. Chairman, and I yield back the balance of my time.





                                

    Letter from Debra Burlingame, Co-Founder, and Timothy Killeen, 
                 Executive Director, Keep America Safe




                                

               Letter from J. Adler, National President, 
        the Federal Law Enforcement Officers Association (FLEOA)









                                

                 Letter from Konrad Motyka, President, 
         the Federal Bureau of Investigation Agents Association