[Congressional Record: October 25, 2001 (Senate)]
[Page S10990-S11060]
From the Congressional Record Online via GPO Access [wais.access.gpo.gov]
[DOCID:cr25oc01-91]
USA PATRIOT ACT OF 2001
The PRESIDENT pro tempore. Under the previous order, the Senate will
now proceed to consideration of H.R. 3162, which the clerk will report.
The bill clerk read as follows:
A bill (H.R. 3162) to deter and punish terrorist acts in
the United States and around the world, to enhance law
enforcement investigatory tools, and for other purposes.
The PRESIDENT pro tempore. The senior Senator from Vermont, Mr.
Leahy, is recognized.
Mr. LEAHY. Mr. President, what is the time agreement that we now have
before us?
The PRESIDENT pro tempore. The chairman and ranking member of the
Judiciary Committee have 90 minutes each; the Senator from Michigan,
Mr. Levin, has 10 minutes; the Senator from Minnesota, Mr. Wellstone,
has 10 minutes; the Senator from Maryland, Mr. Sarbanes, has 20
minutes; the Senator from Wisconsin, Mr. Feingold, has 1 hour; the
Senator from Florida, Mr. Graham, has 15 minutes; and the Senator from
Pennsylvania, Mr. Specter, has 15 minutes.
Mr. LEAHY. I thank the Presiding Officer, the President pro tempore
of the Senate.
Mr. President, I yield myself such time as I may need out of my 90
minutes.
Mr. REID. Will the Senator yield?
Mr. LEAHY. Of course.
Mr. REID. Mr. President, I ask unanimous consent that during the day,
when quorum calls are initiated, the time be charged proportionately,
not only against the person who asked for the quorum to be initiated,
but that it be charged proportionately against all people who have time
under the agreement that is now in effect.
The PRESIDENT pro tempore. Is there objection?
The Chair hears no objection. That will be the order of the Senate.
The Senator from Vermont, Mr. Leahy, is recognized.
(Mrs. CLINTON assumed the chair.)
Mr. LEAHY. Thank you, Mr. President. I agree with the distinguished
Democratic leader in his request because we do want to have discussion
of this piece of legislation, but there is no question we will vote on
this piece of legislation today and we will pass this legislation
today.
I think it is only fitting the Senator from New York is now in the
chair as we begin discussion of this legislation because her State was
one of those that was badly impacted, terribly impacted, tragically
impacted on September 11, as were the people of New Jersey and
Connecticut, who worked in the World Trade Towers, and, of course,
those at the Pentagon in Virginia, including those in Maryland and the
District of Columbia, and actually the whole Nation.
Today we consider H.R. 3162, the second House-passed version of the
``Uniting and Strengthening of America Act'' or ``USA Act of 2001.''
Senate passage of this measure without amendment will amount to final
passage of this important legislation, and the bill will be sent to the
President for his signature. We complete our work six weeks after the
September 11 attacks and months ahead of final action following the
destruction of the Federal Building in Oklahoma City in 1995. The
American people and the Members of this body deserve fast work and
final action.
On October 4, I was pleased to introduce with the Majority Leader,
Senator Daschle, and the Chairmen of the Banking and Intelligence
Committees, as well as the Republican Leader, Senator Lott, and Senator
Hatch and Senator Shelby, the Uniting and Strengthening America, or USA
Act. This was not the bill that I, or any of the sponsors, would have
written if compromise was unnecessary. Nor was it the bill the
Administration had initially proposed and the Attorney General
delivered to us on September 19, at a meeting in the Capitol.
We were able to refine and supplement the Administration's original
proposal in a number of ways in the original USA Act, and have
continued that process in the development of H.R. 3162. The
Administration accepted a number of the practical steps I had
originally proposed on September 19 to improve our security on the
Northern Border, assist our Federal, State and local law enforcement
officers, and provide compensation to the victims of terrorist acts and
to the public safety officers who gave their lives to protect ours.
This final version of the USA Act further improves the compromise by
including additional important checks on the proposed expansion of
government powers that were not contained in the Attorney General's
initial proposal.
Let me outline just ten ways in which we in the bicameral, bipartisan
negotiations were able to supplement and improve this legislation from
the original proposal we received from the Administration.
We improved security on the Northern Border;
We added money laundering;
We added programs to enhance information sharing and coordination
with State and local law enforcement, grants to State and local
governments to respond to bioterrorism, and to increase payments to
families of fallen firefighters, police officers and other public
safety workers;
We added humanitarian relief to immigrant victims of the September 11
terrorist attacks;
We added help to the FBI to hire translators;
We added more comprehensive victims assistance;
We added measures to fight cybercrime;
We added measures to fight terrorism against mass transportation
systems;
We added important measures to use technology to make our borders
more secure;
Finally, and most importantly, we were able to include additional
important checks on the proposed expansion of government powers
contained in the Attorney General's initial proposal.
In negotiations with the Administration, I did my best to strike a
reasonable balance between the need to address the threat of terrorism,
which we all keenly feel at the present time, and the need to protect
our constitutional freedoms. Despite my misgivings, I acquiesced in
some of the Administration's proposals to move the legislative process
forward. That progress has been rewarded by a bill we have been able to
improve further during discussions over the last two weeks.
The Senate passed the original version of the USA Act, S. 1510, by a
vote of 96-1 on October 11. The House passed a similar bill, based
largely on the USA Act, the following day. The Majority Leader and I
both strongly believed that a conference would have been the better and
faster way to reconcile the differences between the bills, and to
consider the proposals that had been included in the managers'
amendment to S. 1510, which Republicans did not approve in time for
consideration and passage with the Senate bill. The House did not
request a conference when it passed the bill, however, and despite the
understanding among House and Senate leadership, the House leadership
abruptly incorporated the product of our discussions in a new bill
rather than proceed to a quick conference.
Yesterday, the House passed H.R. 3162, which was based upon informal
agreements reached by Senate and House negotiators, but which did not
include additional important provisions to make the Justice Department
more efficient and effective in its anti-terrorism efforts and to
reduce domestic demand for illegal drugs, some of which are produced
and supplied from Taliban-controlled regions of Afghanistan. I am
disappointed that the commitment we received to hold a conference--at
which these proposals could have been considered more fully--was not
honored. Nonetheless, H.R. 3162, which the House passed yesterday,
contains additional improvements to the USA Act that had been
negotiated on a bicameral, bipartisan basis, and deserves the support
of the Senate.
I do believe that some of the provisions contained both in this bill
and the original USA Act will face difficult tests in the courts, and
that we in Congress may have to revisit these issues at some time in
the future when the present crisis has passed, the sunset has expired
or the courts find an infirmity in these provisions. I also intend
[[Page S10991]]
as Chairman of the Judiciary Committee to exercise careful oversight of
how the Department of Justice, the FBI and other executive branch
agencies are using the newly-expanded powers that this bill will give
them. I know that other members of the Judiciary Committee--including
Senator Specter, Senator Grassley, and Senator Durbin--appreciate the
importance of such oversight.
The negotiations on anti-terrorism legislation have not been easy.
Within days of the September 11 attacks, I began work on legislation to
address security needs on the Northern Border, the needs of victims and
State and local law enforcement, and criminal law improvements. A week
after the attack, on September 19, the Attorney General and I exchanged
the outlines of the legislative proposals and pledged to work together
toward our shared goal of putting tools in the hands of law enforcement
that would help prevent another terrorist attack.
Let me be clear: No one can guarantee that Americans will be free
from the threat of future terrorist attacks, and to suggest that this
legislation--or any legislation--would or could provide such a
guarantee would be a false promise. I will not engage in such false
promises, and those who make such assertions do a disservice to the
American people.
I have also heard claims that if certain powers had been previously
authorized by the Congress, we could somehow have prevented the
September 11 attacks. Given this rhetoric it may be instructive to
review efforts that were made a few years ago in the Senate to provide
law enforcement with greater tools to conduct surveillance of
terrorists and terrorist organizations. In May 1995, Senator Lieberman
offered an amendment to the bill that became the Antiterrorism and
Effective Death Penalty Act of 1996 that would have expanded the
government's authority to conduct emergency wiretaps to cases of
domestic or international terrorism and added a definition of domestic
terrorism to include violent or illegal acts apparently intended to
``intimidate, or coerce the civilian population.'' The consensus,
bipartisan bill that we consider today contains a very similar
definition of domestic terrorism.
In 1995, however, a motion to table Senator Lieberman's amendment was
agreed to in a largely party-line vote, with Republicans voting against
the measure. In fact, then Senator Ashcroft voted to table that
amendment, and one Republican colleague spoke against it and opined,
``I do not think we should expand the wiretap laws any further.'' He
further said that ``We must ensure that in our response to recent
terrorist acts, we do not destroy the freedoms that we cherish.'' I
have worked very hard to maintain that balance in negotiations
concerning the current legislation.
Following the exchange on September 19 of our legislative proposals,
we have worked over the last month around the clock with the
Administration to put together the best legislative package we could. I
share the Administration's goal of providing promptly the legal tools
necessary to deal with the current terrorist threat. While some have
complained publicly that the negotiations have gone on for too long,
the issues involved are of great importance, and we will have to live
with the laws we enact for a long time to come. Demands for action are
irresponsible when the roadmap is pointed in the wrong direction. As
Ben Franklin once noted, ``if we surrender our liberty in the name of
security, we shall have neither.''
Moreover, our ability to make rapid progress was impeded because the
negotiations with the Administration did not progress in a straight
line. On several key issues that are of particular concern to me, we
had reached an agreement with the Administration on Sunday, September
30. Unfortunately, over the next two days, the Administration announced
that it was reneging on the deal. I appreciate the complex task of
considering the concerns and missions of multiple Federal agencies, and
that sometimes agreements must be modified as their implications are
scrutinized by affected agencies. When agreements made by the
Administration must be withdrawn and negotiations on resolved issues
reopened, those in the Administration who blame the Congress for delay
with what the New York Times described as ``scurrilous remarks,'' do
not help the process move forward.
We expedited the legislative process in the Judiciary Committee to
consider the Administration's proposals. In daily news conferences
prior to the original passage of the USA Act, the Attorney General
referred to the need for such prompt consideration. He made time to
appear before the Judiciary Committee at a hearing September 25 to
respond to questions that Members from both parties had about the
Administration's initial legislative proposals. I thank the Attorney
General for extending the hour and a half he was able to make in his
schedule for the hearing for another 15 minutes so that Senator
Feinstein and Senator Specter were able to ask questions before his
departure. I regret that the Attorney General did not have the time to
respond to questions from all the Members of the Committee either on
September 25 or at any time since. He promised to answer the written
questions Members submitted about the legislation promptly, but we did
not receive any answers before passage of S. 1510, H.R. 2975, or H.R.
3162. I will make those answers a part of the hearing record whenever
they are received even after final passage of the legislation.
The Chairman of the Constitution Subcommittee, Senator Feingold, also
held an important hearing on October 3 on the civil liberties
ramifications of the expanded surveillance powers requested by the
Administration. I thank him for his assistance in illuminating these
critical issues for the Senate.
To accede to the Administration's request for prompt consideration of
the USA Act, the Leaders decided to hold the bill at the desk rather
than refer it to the Committee for markup, as is regular practice.
Senator Hatch specifically urged that this occur. Indeed, when the
Senate considered the anti-terrorism act in 1995 after the Oklahoma
City bombing, we bypassed the Committee in order to deal with the
legislation more promptly on the floor.
After Senate consideration and passage on the one-month anniversary
of the terrorist attack, the House Republican leadership decided to
proceed with a version of the Senate-passed bill rather than the bill
reported by the House Judiciary Committee. H.R. 2975 passed the House
with opposition on October 12. Unfortunately, the House did not take
the traditional step of requesting a conference to reconcile the bills.
In an apparent effort by the Administration and House Republican
leadership to try to pressure the Senate to accept that version of the
bill, without strong money laundering or biological weapons provisions
and with a 5-year sunset, the House failed to take the procedural steps
necessary to convene a conference. Had a conference been requested and
begun, a final bill would have been passed last week. Instead, without
a structure or process, discussions were less concentrated and it was
only after a leadership meeting late last week that the major outline
of the measure was agreed upon.
During the negotiations over the past two weeks, the Administration
sought to eliminate the sunset altogether, but that effort failed. The
House insisted that the amendments to the so-called ``McDade law'' be
dropped, and the Administration acquiesced. Eventually, the House
accepted the Senate's position on the need to include both money
laundering and biological weapons provisions. Even then, the House
Republican leadership reneged on the agreement to proceed by way of a
traditional House-Senate conference. Instead, they opted to proceed by
a new bill passed by the House in short order and sent to the Senate as
an amendable measure. That brings us to today.
Given the expedited process that has been used to move this
legislation through the House and now to the Senate, I will take more
time than usual to detail its provisions.
This bill has raised serious and legitimate concerns about the
expansion of authorities for government surveillance and intelligence
gathering within this country. Indeed, this bill will change
surveillance and intelligence procedures for all types of criminal and
foreign intelligence investigations, not just for terrorism cases.
Significantly, the sunset provision included in the final bill calls
for vigilant legislative oversight, so that the Congress will know how
these legal authorities are
[[Page S10992]]
used and whether they are abused over the next four years.
We should be clear at the outset that while the sunset applies to the
expanded surveillance authorities under FISA, it does not apply to
other controversial provisions in the bill. As originally passed by the
House, the sunset did not apply to the provisions on sharing grand jury
information with intelligence agencies, in section 203(a), and the so-
called ``sneak and peak'' authority for surreptitious search and
seizure, in section 213. The final bill, H.R. 3162, removes two more
provisions from the sunset--the expanded scope of subpoenas for records
of electronic communications, in section 210, and the new authority for
pen registers and trap and trace devices in criminal investigations, in
section 216.
Congressional oversight is especially necessary to monitor the
implementation of these new authorities. I agree with Leader Armey that
the sunset will help ensure that law enforcement is responsive to
congressional oversight and inquiries on use of these new authorities
and that a full record is developed on their efficacy and necessity.
The Senate Judiciary Committee has the challenging duty to establish
and maintain an oversight regime that allows the Congress to know how
these powers are exercised.
This bill will authorize the expanded sharing with intelligence
agencies of information collected as part of a criminal investigation,
and the expanded use of foreign intelligence surveillance tools and
information in criminal investigations. Where foreign-sponsored
terrorism is the target of an investigation, criminal and foreign
intelligence jurisdictions clearly overlap and agencies must coordinate
their efforts accordingly. This bill enters new and uncharted territory
by breaking down traditional barriers between law enforcement and
foreign intelligence. This is not done just to combat international
terrorism, but for any criminal investigation that overlaps a broad
definition of ``foreign intelligence.''
Yet, before final passage of this bill, the Senate should recall our
nation's unfortunate experience with domestic surveillance and
intelligence abuses that came to light in the mid-1970s. Until
Watergate and the Vietnam war, Congress allowed the Executive branch
virtually a free hand in using the FBI, the CIA, and other intelligence
agencies to conduct domestic surveillance in the name of national
security. It was the Cold War, Members of Congress were reluctant to
take on FBI Director J. Edgar Hoover, and oversight was non-existent.
One of the few safeguards enacted into law drew a sharp line between
foreign intelligence and law enforcement. The National Security Act of
1947, which established the Central Intelligence Agency, said--and
still says today--that the CIA ``shall have no police, subpoena, or law
enforcement powers or internal security functions.''
The provisions on the disclosure of ``foreign intelligence'' from
Federal criminal investigations make fundamental changes in the rules
for the handling of highly sensitive personal, political and business
information acquired for law enforcement purposes. Such information may
now be disclosed to intelligence, defense, and national security
agencies. The law is changed not only to permit the wider sharing of
information from grand juries, domestic law enforcement wiretaps, and
criminal investigations generally (in section 203), but also to require
Federal law enforcement agencies to share this information with
intelligence agencies through the Director of Central Intelligence,
unless the Attorney General makes exceptions (in section 905).
There would be far less controversy if these provisions were limited
to information about domestic or international terrorism or espionage.
Instead, they potentially authorize the disclosure throughout
intelligence, military, and national security organizations of a far
broader range information about United States persons, including
citizens, permanent resident aliens, domestic political groups, and
companies incorporated in the United States. The information may be
shared if it fits the broad definitions of ``foreign intelligence'' and
``foreign intelligence information.''
The term ``foreign intelligence'' is defined to mean ``information
relating to the capabilities, intentions, or activities of foreign
governments or elements thereof, foreign organizations, or foreign
persons, or international terrorist activities.'' The term ``foreign
intelligence information'' is defined to include information about a
United States person that concerns a foreign power or foreign territory
and ``that relates to the national defense or the security of the
United States'' or ``the conduct of the foreign affairs of the United
States.'' Therefore, potentially, whenever a criminal investigation
acquires information about an American citizen's relationship with a
foreign country or its government, that information is eligible to be
disseminated widely as ``foreign intelligence information''--even if
the information is about entirely lawful activities, business
transactions, political relationships, or personal opinions.
Criminal investigations acquire voluminous information about persons
who are not involved in illegal activity. Many individuals are
investigated and later cleared. Many cases are investigated and never
prosecuted. Many witnesses are interviewed whose testimony never
surfaces at trial. Immunity is granted to compel testimony before grand
juries about people who are never indicted. Wiretaps and microphone
``bugs'' and computer communications intercepts pick up extensive
information about activities and opinions and personal lives that have
no relevance to the criminal activity that they are authorized to
detect or monitor. Where regulatory or tax laws carry criminal
penalties, investigators probe the confidential financial details of
business transactions and records. Federal criminal investigators have
enormous discretion, with little statutory or constitutional guidance
for how they interview people, conduct physical surveillance, recruit
informants in organizations, and request access to records they
consider ``relevant'' to an investigation. All that information would
be eligible to be disseminated widely within the government, beyond the
purposes of the criminal investigation, if it meets the definition of
``foreign intelligence'' or ``foreign intelligence information.''
The risks of misusing this information were documented 25 years ago,
when the Congress made public the record of Cold War abuses of
investigative powers by Federal agencies acting in the name of national
security. The Senate created a Select Committee To Study Governmental
Affairs With Respect to Intelligence Communities, chaired by Senator
Frank Church, to conduct a year-long investigation with extensive
public hearings and detailed reports on the investigations of lawful
political dissent and protest. The Church Committee found that the
FBI's internal security and domestic intelligence programs compiled
massive files on activities protected by the First Amendment and the
political opinions of Americans.
During the height of antiwar protest and urban unrest in the late
1960's, Army intelligence joined the FBI in monitoring domestic
political activity. National intelligence agencies such as CIA and NSA
received extensive reporting from the FBI and the military, as well as
from their own intelligence gathering on critics of government policy.
Other law enforcement agencies such as the Internal Revenue Service
were used to selectively investigate organizations based on their
political views. Under President's of both parties, these agencies
disseminated information to the White House about the lawful political
activities and opinions of critics of Administration policy--all under
the rubric of protecting the national security. The scope of
intelligence gathering swept up environmental groups, women's
liberation activists, and virtually any organization that mounted
peaceful protest demonstrations.
During this unfortunate period in our history, the government did
more than just gather information about protest and dissent. The FBI
developed a systematic program to disrupt domestic groups and discredit
their leaders, known as ``COINTELPRO.'' The FBI's efforts included the
selective sharing of information from its investigations to deny people
employment and smear their reputations. Beginning with Communist and
socialist groups, the FBI's COINTELPRO operations spread in the 1960s
to the Klan, the ``new left,'' and black militants. Elements of the
civil
[[Page S10993]]
rights and antiwar movements were targeted for disruption because of
suspicion that they were ``influenced'' by communists; others because
of their strident rhetoric. When some targets were suspected of
engaging in violence, the FBI's tactics went so far as to place lives
in jeopardy by passing false allegations that individuals were
government informants.
The most notorious case was J. Edgar Hoover's vendetta against Dr.
Martin Luther King, Jr. The Church Committee documented the FBI's
effort to discredit Dr. King by disclosing confidential information
that was obtained from wiretaps and microphones targeted against him.
The wiretaps were justified to the Kennedy and Johnson Administrations
on the grounds that some of Dr. King's advisors were Communists, but
this excuse allowed the FBI to mount continuous political surveillance
to undermine Dr. King's effectiveness. The FBI disseminated allegedly
derogatory information not only within the government, but to media and
other private organizations including efforts to deny Dr. King the
Nobel Peace Prize. Most vicious of all was the FBI's preparation of a
composite tape recording that was sent to him anonymously with an
apparent invitation to commit suicide. During the 1964 Democratic
National Convention in Atlantic City where the greatest controversy
involved seating the Mississippi Freedom Democratic Party delegates,
the FBI provided the Johnson White House a continuous flow of political
intelligence from the wiretaps on Dr. King's telephones in Atlantic
City.
These methods of domestic political surveillance and covert
manipulation and disruption have no place in a free society. They are
lawful for the CIA to use against terrorists abroad, under Presidential
authorization and oversight by the Intelligence Committees. In the
United States, however, such surveillance activities by our government
offends our fundamental First Amendment rights of speech and
association, and undermines our democratic values. Since the Church
Committee investigation, one of the main reasons for maintaining
barriers between domestic criminal investigations and foreign
intelligence operations has been a concern that the no-hold-barred
methods used abroad must not be brought back into this country.
The Church Committee recommended a series of safeguards to restrict
the collection of information about Americans by the CIA, the National
Security Agency, and other U.S. intelligence agencies. The Attorney
General issued guidelines for FBI investigations and Presidents issued
Executive Orders requiring procedures approved by the Attorney General
for the collection and retention of information about Americans by U.S.
intelligence agencies. These guidelines and procedures have served for
the past 25 years as a stable framework that, with rare exceptions, has
not allowed previous abuses to recur.
The most significant legislative result of the Church Committee
investigation was the Foreign Intelligence Surveillance Act of 1978
which required court orders for national security electronic
surveillance in the United States. No longer did the Executive branch
have exclusive control over the vast powers of U.S. intelligence to
conduct wiretapping, bugging, and other communications monitoring in
this country. Surveillance was limited to foreign powers and agents of
foreign powers, and the statutory probable cause standard for targeting
an American as an ``agent of a foreign power'' required a showing of
clandestine intelligence activities, sabotage, or international
terrorist activities on behalf of a foreign power. Americans could not
be targeted solely on the basis of activities protected by the First
Amendment. Surveillance of Americans under FISA was limited to
counterintelligence purposes to defend the nation against foreign
spying and terrorism. Americans could not be considered ``agents of a
foreign power'' on the basis of their lawful business or political
relationships with foreign governments or organizations.
The Congress has been cautious in the decades following the
revelations of the Church Committee about allowing use of criminal
justice information for other purposes and, specifically, on sharing
such information with intelligence agencies. In 1979 Attorney General
Benjamin Civiletti testified before the House Judiciary Subcommittee on
Constitutional Rights that the guidelines for ``any dissemination
outside the Bureau . . . will have to be very, very specific. We will
have to be very certain the dissemination is lawful, meets the same
standards of certainty, of intent, which is the basic reason for the
collection of the information and the investigation. . . .'' On the
issue of FBI sharing with the CIA, Attorney General Civiletti said
``you have to be extremely careful in working out, pursuant to the law,
the information which is being exchanged, what its purpose is, how it
was obtained and collected, so that you are not inadvertently, out of a
sense of cooperation or efficiency, perverting or corrupting the fact
that the CIA's main duty is foreign intelligence, and they have no
charter, no responsibility, and not duty performance, no mission to
investigate criminal acts in the United States.''
The bill we are passing today makes potentially sweeping changes in
the relationships between the law enforcement and intelligence
agencies. In the current crisis, there is justification for expanding
authority specifically for counterintelligence to detect and prevent
international terrorism. I support the FBI request for broader
authority under FISA for pen registers and access to records without
having to meet the statutory ``agent of a foreign power'' standard,
because the Fourth Amendment does not normally apply to such techniques
and the FBI has comparable authority in its criminal investigations.
However, I have insisted that this authority to investigate U.S.
persons be limited to counterintelligence investigations conducted to
protect against international terrorism and spying activities and that
such investigations may not be based solely on activities protected by
the First Amendment. None of the changes in FISA would authorize
investigations of Americans for the broader, more ambiguous purpose of
collecting ``foreign intelligence'' generally. In that respect, the
bill adheres to the basic principles recommended by the Church
Committee.
The gravest departure from that framework, and the one with most
potential for abuses, is the new and unprecedented statutory authority
for sharing of ``foreign intelligence'' from criminal investigations
with ``any other Federal law enforcement, intelligence, protective,
immigration, national defense, or national security official.'' The
Church Committee warned of the political abuse of the dissemination of
intelligence from domestic investigations. Intelligence was
disseminated to the White House to track the contacts of members of
Congress with particular foreign embassies. Information was volunteered
to the White House about Administration critics and other political
figures. The Church Committee found ``excessive dissemination of large
amounts of relatively useless or totally irrelevant information'' to
the White House that was not evaluated and ``thus exaggerated the
dangers.''
The Church Committee recommended permitting FBI dissemination of
personally identifiable information about Americans to intelligence,
military and other national security agencies in two areas--
``preventive criminal investigations of terrorist activities'' and
``preventive intelligence investigations of hostile foreign
intelligence activities.'' This has been substantially the practice
under the Attorney General's guidelines and Executive order procedures
since then.
The new authority to disseminate ``foreign intelligence'' from
criminal investigations, including grand juries and law enforcement
wiretaps, is an invitation to abuse without special safeguards.
Fortunately, the final bill includes a provision, which was not in the
Administration's original proposal, to maintain some degree of judicial
oversight of the dissemination of grand jury information. Within a
``reasonable time'' after the disclosure of grand jury information, a
government attorney ``shall file under seal a notice with the court
stating the fact that such information was disclosed and the
departments, agencies, or entities to which the disclosure was made.''
No such judicial role is provided for the disclosure of information
from wiretaps and
[[Page S10994]]
other criminal investigative techniques including the infiltration of
organizations with informants. However, that authority to disclose
without judicial review is subject to the sunset in four years.
Other safeguards can, if used properly, minimize the unnecessary
disclosure of ``foreign intelligence'' that identifies an American.
When the information comes from grand juries or wiretaps, the Attorney
General is required under the bill to establish procedures for the
disclosure of information that identifies a United States person. The
Senate Judiciary Committee will want to take a very close look at these
procedures. Although not required under the bill, such procedures would
also be desirable for disclosure of information from criminal
investigations generally, as permitted under section 203(d). In section
905, where the bill requires disclosure to intelligence agencies from
criminal investigations, the Attorney General is authorized to make
exceptions and must issue implementing procedures. Again, these
procedures will be closely examined by the Senate Judiciary Committee.
These procedures will be critical in determining the scope and impact
of these provisions. Will they focus the sharing of information on
international terrorism, which is the immediate and compelling need
before us, or will they sweep more broadly? Will they permit automatic
dissemination to intelligence agencies of any information about foreign
governments, foreign organizations, or foreign persons that is obtained
in FBI investigations of international organized crime and white collar
crime? What are the specific circumstances under which confidential
information collected by particular agencies, such as the Internal
Revenue Service or the Bureau of Alcohol, Tobacco and Firearms, will be
disseminated to the U.S. Military or other agencies? What will be the
guidelines for including information that identifies United States
persons? How will need-to-know decisions be made on the handling of
this information, and how will access be controlled? What will be done
to ensure compliance with the 1947 ban on CIA having ``police,
subpoena, or law enforcement powers or internal security functions?''
These and many other questions must be the subject of the Judiciary
Committee's oversight of the implementation of the surveillance and
intelligence provisions of this bill. Our government is entering
uncharted territory. Much of the government's experience from the Cold
War era before the mid-1970s warns us of the risks of abuse. Reasonable
measures that we are taking to protect against international terrorism
may have far-reaching ramifications beyond the immediate crisis. There
has never been a greater need for Congressional vigilance to ensure
against unnecessary and improper use of the wide discretion being
granted by a new law. I intend to ask the Attorney General and the
Director of Central Intelligence to advise the Judiciary Committee of
their implementation plans and practices every step of the way.
The final bill includes a long overdue remedy for unauthorized
disclosure of information obtained from electronic surveillance under
FISA and under criminal procedures. If the government monitors the
conversations of a person under the electronic surveillance procedures
of title 18 or FISA and that information is disclosed without proper
authority, the aggrieved person may recover money damages from the
Federal Government. Such improper disclosure is what happened in the
past when the FBI passed information from the electronic surveillance
of Dr. Martin Luther King to selected private individuals and
organizations in an effort to discredit Dr. King. The government itself
would be liable, in addition to individual employees, if something like
this ever happens again.
This provision is especially valuable in this bill, because of the
expanded sharing of information from electronic surveillance in
criminal cases to agencies with intelligence, military, and other
national security responsibilities. When this kind of sensitive
information is disseminated more widely, the risk increases that it
will be leaked.
As a deterrent against malicious leaks, this provision wisely
includes procedures for administrative discipline as well as the civil
remedy against the Government. When a court or the appropriate agency
determines that there is serious question about whether or not an
employee willfully disclosed information without proper authority,
disciplinary proceedings must be initiated. If the agency head decides
that discipline is not warranted, he or she must notify the Inspector
General with jurisdiction over the agency and provide the reasons for
the decision not to impose discipline.
Representative Barny Frank deserves credit for developing this
proposal, and the Department of Justice has worked with Representative
Frank to ensure that the procedures for civil discovery take into
account the needs for protecting related criminal investigations or
prosecutions and classified operations under the Foreign Intelligence
Surveillance Act.
When Congress authorized electronic surveillance in 1968 under title
18 and in 1978 under FISA, the legislation imposed civil and criminal
sanctions for violations by individuals. This bill takes the law two
steps forward by adding government liability and administrative
discipline against government employees. Along with the sunset
provision, judicial oversight of the sharing of grand jury information,
and other improvements, the Frank amendment reflects the valuable
contribution of the House of Representatives towards making this a
balanced bill.
The heart of every American aches for those who died or have been
injured because of the tragic terrorist attacks in New York, Virginia,
and Pennsylvania on September 11. Even now, we cannot assess the full
measure of this attack in terms of human lives, but we know that the
number of casualties is extraordinarily high.
Congress acted swiftly to help the victims of September 11. Within 10
days, we passed legislation to establish a Victims Compensations
Program, which will provide fair compensation to those most affected by
this national tragedy. I am proud of our work on that legislation,
which will expedite payments to thousands of Americans whose lives were
so suddenly shattered.
But now more than ever, we should remember the tens of thousands of
Americans whose needs are not being met--the victims of crimes that
have not made the national headlines. Just one day before the events
that have so transformed our nation, I came before this body to express
my concern that we were not doing more for crime victims. I noted that
the pace of victims legislation had slowed, and that many opportunities
for progress had been squandered. I suggested that this year, we had a
golden opportunity to make significant progress in this area by passing
S. 783, the Leahy-Kennedy Crime Victims Assistance Act of 2001.
I am pleased, therefore, that the antiterrorism package now before
the Senate contains substantial portions of S. 783 aimed at refining
the Victims of Crime Act of 1984 (VOCA), and improving the manner in
which the Crime Victims Fund is managed and preserved. Most
significantly, section 621 of the USA Act will eliminate the cap on
VOCA spending, which has prevented more than $700 million in Fund
deposits from reaching victims and supporting essential services.
Congress has capped spending from the Fund for the last two fiscal
years, and President Bush has proposed a third cap for fiscal year
2002. These limits on VOCA spending have created a growing sense of
confusion and unease by many of those concerned about the future of the
Fund.
We should not be imposing artificial caps on VOCA spending while
substantial unmet needs continue to exist. Section 621 of the USA Act
replaces the cap with a self-regulating system that will ensure
stability and protection of Fund assets, while allowing more money to
be distributed to the States for victim compensation and assistance.
Other provisions included from S. 783 will also make an immediate
difference in the lives of victims, including victims of terrorism.
Shortly after the Oklahoma City bombing, I proposed and the Congress
adopted the Victims of Terrorism Act of 1995. This legislation
authorized the Office for Victims of Crime (OVC) to set aside an
emergency reserve of up to $50 million as part of the Crime Victims
Fund. The emergency reserve was intended to serve as a ``rainy day''
fund to supplement compensation and assistance
[[Page S10995]]
grants to States to provide emergency relief in the wake of an act of
terrorism or mass violence that might otherwise overwhelm the resources
of a State's crime victim compensation program and crime victim
assistance services. Last month's disaster created vast needs that have
all but depleted the reserve. Section 621 of the USA Act authorizes OVC
to replenish the reserve with up to $50 million, and streamlines the
mechanism for replenishment in future years.
Another critical provision of the USA Act will enable OVC to provide
more immediate and effective assistance to victims of terrorism and
mass violence occurring within the United States. I proposed this
measure last year as an amendment to the Justice for Victims of
Terrorism Act, but was compelled to drop it to achieve bipartisan
consensus. I am pleased that we are finally getting it done this year.
These and other VOCA reforms in the USA Act are long overdue. Yet, I
regret that we are not doing more. In my view, we should pass the Crime
Victims Assistance Act in its entirety. In addition to the provisions
that are included in today's bill, this legislation provides for
comprehensive reform of Federal law to establish enhanced rights and
protections for victims of Federal crime. It also proposes several
programs to help States provide better assistance for victims of State
crimes.
I also regret that we have not done more for other victims of recent
terrorist attacks. While all Americans are numbed by the heinous acts
of September 11, we should not forget the victims of the 1998 embassy
bombings in East Africa. Eleven Americans and many Kenyan and Tanzanian
nationals employed by the United States lost their lives in that tragic
incident. It is my understanding that compensation to the families of
these victims has in many instances fallen short. It is my hope that
OVC will use a portion of the newly replenished reserve fund to remedy
any inequity in the way that these individuals have been treated.
We cannot speak of the victims of the September 11 without also
noting that Arab-Americans and Muslims in this country have become the
targets of hate crimes, harassment, and intimidation. I applaud the
President for speaking out against and condemning such acts, and for
visiting a mosque to demonstrate by action that all religions are
embraced in this country. I also commend the FBI Director for his
periodic reports on the number of hate crime incidents against Arab-
American and Muslims that the FBI is aggressively investigating and
making clear that this conduct is taken seriously and will be punished.
The USA Act contains, in section 102, a sense of the Congress that
crimes and discrimination against Arab and Muslim Americans are
condemned, and in section 1002, a provision suggested by Senator Durbin
that condemns violence and discrimination against Sikh Americans. Many
of us would like to do more, and finally enact effective hate crimes
legislation, but the Administration has asked that the debate on that
legislation be postponed. One of my greatest regrets regarding the
negotiations in this bill was that objections prevented the Local Law
Enforcement Enhancement Act, S. 625, from being included in the USA
Act.
The Administration's initial proposal was entirely focused on Federal
law enforcement. Yet, we must remember that State and local law
enforcement officers have critical roles to play in preventing and
investigating terrorist acts. I am pleased that the bill we consider
today recognizes this fact.
As a former State prosecutor, I know that State and local law
enforcement officers are often the first responders to a crime. On
September 11, the nation saw that the first on the scene were the
heroic firefighters, police officers and emergency personnel in New
York City. These New York public safety officers, many of whom gave the
ultimate sacrifice, remind us of how important it is to support our
State and local law enforcement partners. The USA Act provides three
critical measures of Federal support for our State and local law
enforcement officers in the war against terrorism.
We streamline and expedite the Public Safety Officers' Benefits
application process for family members of fire fighters, police
officers and rescue workers who perish or suffer a disabling injury in
connection with prevention, investigation, rescue or recovery efforts
related to a future terrorist attack.
The Public Safety Officers' Benefits Program provides benefits for
each of the families of law enforcement officers, firefighters, and
emergency response crew members who are killed or disabled in the line
of duty. Current regulations, however, require the families of public
safety officers who have fallen in the line of duty to go through a
cumbersome and time-consuming application process. In the face of our
national fight against terrorism, it is important that we provide a
quick process to support the families of brave Americans who selflessly
give their lives so that others might live before, during, and after a
terrorist attack.
This provision builds on the new law championed by Senator Clinton,
Senator Schumer and Congressman Nadler to speed the benefit payment
process for families of public safety officers killed in the line of
duty in New York City, Virginia, and Western Pennsylvania, on September
11.
We have raised the total amount of Public Safety Officers' Benefit
Program payments from approximately $150,000 to $250,000. This
provision retroactively goes into effect to provide much-needed relief
for the families of the brave men and women who sacrificed their own
lives for their fellow Americans during the year. Although this
increase in benefits can never replace a family's tragic loss, it is
the right thing to do for the families of our fallen heroes. I want to
thank Senator Biden and Senator Hatch for their bipartisan leadership
on this provision.
We expand the Department of Justice Regional Information Sharing
Systems Program to promote information sharing among Federal, State and
local law enforcement agencies to investigate and prosecute terrorist
conspiracies and activities and authorize a doubling of funding for
this year and next year. The RISS Secure Intranet is a nationwide law
enforcement network that already allows secure communications among the
more than 5,700 Federal, State and local law enforcement agencies.
Effective communication is key to effective law enforcement efforts and
will be essential in our national fight against terrorism.
The RISS program enables its member agencies to send secure,
encrypted communications--whether within just one agency or from one
agency to another. Federal agencies, such as the FBI, do not have this
capability, but recognize the need for it. Indeed, on September 11,
immediately after the terrorist attacks, FBI Headquarters called RISS
officials to request ``Smartgate'' cards and readers to secure their
communications systems. The FBI agency in Philadelphia called soon
after to request more Smartgate cards and readers as well.
The Regional Information Sharing Systems Program is a proven success
that we need to expand to improve secure information sharing among
Federal, State and local law enforcement agencies to coordinate their
counter-terrorism efforts.
During negotiations following initial passage of the Senate and House
bills, we added two new provisions to support State and local
governments in the final legislation. At Senator Biden's request, the
First Responders Assistance Act, was added as section 1005 of H.R.
3062. This provision authorizes a $25 million Department of Justice
program to authorize grants to State and local authorities to respond
to and prevent acts of terrorism.
I authored section 1014 of H.R. 3062 to authorize a Department of
Justice grant program for State and local domestic preparedness
support. These grants will help each State prepare for and respond to
terrorist acts including but not limited to events of terrorism
involving weapons of mass destruction and biological, nuclear,
radiological, incendiary, chemical, and explosive devices. This
provision improves an appropriated program to provide: 1, additional
flexibility to purchase needed equipment; 2, training and technical
assistance to State and local first responders; and 3, a more equitable
allocation of funds to all States.
Our State and local law enforcement partners welcome the challenge to
join in our national mission to combat terrorism. We cannot ask State
and local
[[Page S10996]]
law enforcement officers to assume these new national responsibilities
without also providing new Federal support. This bill provides five key
provisions for necessary Federal support for our State and local law
enforcement officers to serve as full partners in our fight against
terrorism.
I am deeply troubled by continuing reports that critical information
is not being shared with State and local law enforcement. In
particular, the recent testimony of Baltimore Police Chief Ed Norris
before the House Government Reform Committee highlighted the current
problem. I have also spoken to Mayor Giuliani and to Senator Schumer
and Senator Clinton about the need for better coordination and
information sharing between the FBI and State and local law enforcement
authorities who are being called upon to assist in the current
terrorism investigations. This is no time for turf battles. The FBI
must recognize the contributions of other law enforcement authorities
and facilitate their continued cooperation in this national effort.
The unfolding facts about how the terrorists who committed the
September 11 attack were able to enter this country without difficulty
are chilling. Since the attacks many have pointed to our northern
border as vulnerable to the entry of future terrorists. This is not
surprising when a simple review of the numbers shows that the northern
border has been routinely short-changed in personnel. While the number
of border patrol agents along the southern border has increased over
the last few years to over 8,000, the number at the northern border has
remained the same as a decade ago at 300. This remains true despite the
fact that Admad Ressam, the Algerian who planned to blow up the Los
Angeles International Airport in 1999, and who has been linked to those
involved in the September 11 attacks, chose to enter the United States
at our northern border. That border will remain an inviting target
until we dramatically improve our security.
The USA Act includes my proposals to provide the substantial and long
overdue assistance for our law enforcement and border control efforts
along the Northern Border. My home State of Vermont has seen huge
increases in Customs and INS activity since the signing of the North
American Free Trade Agreement. The number of people coming through our
borders has risen steeply over the years, but our staff and our
resources have not.
I proposed--and this legislation authorizes in section 402--tripling
the number of Border Patrol, INS inspectors, and Customs Service
employees in each of the States along the 4,000-mile Northern Border. I
was gratified when 22 Senators--Democrats and Republicans--wrote to the
President supporting such an increase, and now hope that the
Administration will fully fund this critical law enforcement
improvement.
Senators Cantwell and Schumer in the Committee and Senators Murray
and Dorgan have been especially strong advocates of these provisions
and I thank them for their leadership. In addition, the USA Act, in
section 401, authorizes the Attorney General to waive the FTE cap on
INS personnel in order to address the national security needs of the
United States on the northern border. Now more than ever, we must
patrol our border vigilantly and prevent those who wish America harm
from gaining entry. At the same time, we must work with the Canadians
to allow speedy crossing to legitimate visitors and foster the
continued growth of trade which is beneficial to both countries.
In addition to providing for more personnel, this bill also includes,
in section 402(4), my proposal to provide $100 million in funding for
both the INS and the Customs Service to improve the technology used to
monitor the Northern Border and to purchase additional equipment. The
bill also includes, in section 403(c), an important provision from
Senator Cantwell directing the Attorney General, in consultation with
other agencies, to develop a technical standard for identifying
electronically the identity of persons applying for visas or seeking to
enter the United States. In short, this bill provides a comprehensive
high-tech boost for the security of our nation.
This bill also includes important proposals to enhance data sharing.
The bill, in section 403, directs the Attorney General and the FBI
Director to give the State Department and INS access to the criminal
history information in the FBI's National Crime Information Center
(NCIC) database, as the Administration and I both proposed. The
Attorney General is directed to report back to the Congress in two
years on progress in implementing this requirement. We have also
adopted the Administration's language, in section 413, to make it
easier for the State Department to share information with foreign
governments for aid in terrorist investigations.
The USA Act contains a number of provisions intended to improve and
update the Federal criminal code to address better the nature of
terrorist activity and assist the FBI in translating foreign language
information collected. I will mention just a few of these provisions.
The truth certainly seems self-evident that all the best surveillance
techniques in the world will not help this country defend itself from
terrorist attack if the information cannot be understood in a timely
fashion. Indeed, within days of September 11, the FBI Director issued
an employment ad on national TV calling upon Arabic speakers to apply
for a job as an FBI translator. This is a dire situation that needs
attention. I am therefore gratified that the final bill contains my
proposal, in section 205, to waive any Federal personnel requirements
and limitations imposed by any other law in order to expedite the
hiring of translators at the FBI.
This bill also directs the FBI Director to establish such security
requirements as are necessary for the personnel employed as
translators. We know the effort to recruit translators has a high
priority, and the Congress should provide all possible support.
Therefore, the bill calls on the Attorney General to report to the
Judiciary Committees on the number of translators employed by the
Justice Department; any legal or practical impediments to using
translators employed by other Federal, State, or local agencies, on a
full, part-time, or shared basis; and the needs of the FBI for specific
translation services in certain languages, and recommendations for
meeting those needs.
The Administration's initial proposal assembled a laundry list of
more than 40 Federal crimes ranging from computer hacking to malicious
mischief to the use of weapons of mass destruction, and designated them
as ``Federal terrorism offenses,'' regardless of the circumstances
under which they were committed. For example, a teenager who spammed
the NASA website and, as a result, recklessly caused damage, would be
deemed to have committed this new ``terrorism'' offense. Under the
Administration's proposal, the consequences of this designation were
severe. Crimes on the list would carry no statute of limitations. The
maximum penalties would shoot up to life imprisonment, and those
released earlier would be subject to a lifetime of supervised release.
Moreover, anyone who harbored a person whom he had ``reasonable grounds
to suspect'' had committed, or was about to commit, a ``Federal
terrorism offense''--whether it was the Taliban or the mother of my
hypothetical teenage computer hacker--would be subject to stiff
criminal penalties. I worked closely with the Administration to ensure
that the definition of ``terrorism'' in the USA Act fit the crime.
First, we have trimmed the list of crimes that may be considered as
terrorism predicates in section 808 of the bill. This shorter, more
focused list, to be codified at 18 U.S.C. Sec. 2332(g)(5)(B), more
closely reflects the sorts of offenses committed by terrorists.
Second, we have provided, in section 809, that the current 8-year
limitations period for this new set of offenses will remain in place,
except where the commission of the offense resulted in, or created a
risk of, death or serious bodily injury.
Third, rather than make an across-the-board, one-size-fits-all
increase of the penalties for every offense on the list, without regard
to the severity of the offense, we have made, in section 810, more
measured increases in maximum penalties where appropriate, including
life imprisonment or lifetime supervised release in cases in which the
offense resulted in death. We have also
[[Page S10997]]
added, in section 811, conspiracy provisions to a few criminal statutes
where appropriate, with penalties equal to the penalties for the object
offense, up to life imprisonment.
Finally, we have more carefully defined the new crime of harboring
terrorists in section 803, so that it applies only to those harboring
people who have committed, or are about to commit, the most serious of
Federal terrorism-related crimes, such as the use of weapons of mass
destruction. Moreover, it is not enough that the defendant had
``reasonable grounds to suspect'' that the person he was harboring had
committed, or was about to commit, such a crime; the government must
prove that the defendant knew or had ``reasonable grounds to believe''
that this was so.
I am deeply disappointed that the amendments to the so-called McDade
law, which were included in the original USA Act, S. 1510, which passed
the Senate, are not included in the bill before the Senate today. Well
before September 11, the Justice Department has said that the McDade
law--which subjects Federal prosecutors to multiple and potentially
conflicting State bar rules--has delayed important criminal
investigations, prevented the use of effective and traditionally-
accepted investigative techniques, and served as the basis of
litigation to interfere with legitimate Federal prosecutions. Despite
this record of opposition, and the increasing demands upon Federal
prosecutors in the wake of the terrorist attacks, the Administration
simply acceded to House demands to remove this provision of the USA
Act. This abandonment has removed a critical law enforcement provision
from the bill. No one in the Senate knows more about the importance of
this provision than Senator Wyden, who worked strenuously to include
the McDade law in this bill. But his efforts and mine proved unavailing
without Administration backing through the entire process.
The McDade law has a dubious history, to say the least. At the end of
the 105th Congress, it was slipped into an omnibus appropriations bill
over the objection of every member of the Senate Judiciary Committee.
Since it was adopted, it has caused numerous problems for Federal
prosecutors, and we must find a way to amend it before more cases are
compromised. At a time when we need Federal law enforcement authorities
to move quickly to catch those responsible for the September 11
attacks, and to prevent further attacks on our country, we can no
longer tolerate the drag on Federal investigations and prosecutions
caused by this ill-considered legislation.
Another provision of the USA Act that was not included in the
Administration's initial proposal is section 801, which targets acts of
terrorism and other violence against mass transportation systems.
Earlier this month, a Greyhound bus crashed in Tennessee after a
deranged passenger slit the driver's throat and then grabbed the
steering wheel, forcing the bus into oncoming traffic. Six people were
killed in the crash. Because there are currently no Federal laws
addressing terrorism of mass transportation systems, however, there may
be no Federal jurisdiction over such a case, even if it were committed
by suspected terrorists. Clearly, there is an urgent need for strong
criminal legislation to deter attacks against mass transportation
systems. Section 801 will fill this gap.
The Computer Fraud and Abuse Act, 18 U.S.C. Sec. 1030, is the
primary Federal criminal statute prohibiting computer frauds and
hacking. I worked with Senator Hatch in the last Congress to make
improvements to this law in the Internet Security Act, which passed the
Senate as part of another bill. Our work is included in section 814 of
the USA Act. This section would amend the statute to clarify the
appropriate scope of Federal jurisdiction. (1) The bill adds a
definition of ``loss'' to cover any reasonable cost to the victim in
responding to a computer hacker. Calculation of loss is important both
in determining whether the $5,000 jurisdictional hurdle in the statute
is met, and, at sentencing, in calculating the appropriate guideline
range and restitution amount.
(2) The bill amends the definition of ``protected computer,'' to
include qualified computers even when they are physically located
outside of the United States. This clarification will preserve the
ability of the United States to assist in international hacking cases
and finally, this section eliminates the current directive to the
Sentencing Commission requiring that all violations, including
misdemeanor violations, of certain provisions of the Computer Fraud and
Abuse Act be punished with a term of imprisonment of at least six
months.
Borrowing from a bill introduced in the last Congress by Senator
Biden, the USA Act contains a provision in section 817 to strengthen
our Federal laws relating to the threat of biological weapons. At a
time when the national headlines are filled with news about anthrax and
other biological threats, it is fitting that the House added this
provision back to the bill after dropping it from H.R. 2975.
Unfortunately, the bill does not contain certain regulatory provisions
that the Administration initially proposed and later withdrew,
apparently due to its inability to resolve inter-agency conflicts.
Given the grave importance of this issue, I urge the Administration to
resolve these disputes and work with the Congress to provide these
additional protections.
Current law prohibits the possession, development, or acquisition of
biological agents or toxins ``for use as a weapon.'' Section 817 amends
the definition of ``for use as a weapon'' to include all situations in
which it can be proven that the defendant had any purpose other than a
peaceful purpose. This will enhance the government's ability to
prosecute suspected terrorists in possession of biological agents or
toxins, and conform the scope of the criminal offense in 18 U.S.C.
Sec. 175 more closely to the related forfeiture provision in 18 U.S.C.
Sec. 176. This section also contains a new statute, 18 U.S.C. Sec.
175b, which generally makes it an offense for certain restricted
persons, including non-resident aliens from countries that support
international terrorism, to possess a listed biological agent or toxin.
Of greater consequence, section 817 defines another additional
offense, punishable by up to 10 years in prison, of possessing a
biological agent, toxin, or delivery system ``of a type or in a
quantity that, under the circumstances,'' is not reasonably justified
by a peaceful purpose. As originally proposed by the Administration,
this provision specifically stated that knowledge of whether the type
or quantity of the agent or toxin was reasonably justified was not an
element of the offense. Thus, although the burden of proof is always on
the government, every person who possesses a biological agent, toxin,
or delivery system was at some level of risk. At my urging, the
Administration agreed to drop this portion of the provision.
Nevertheless, I remain troubled by the subjectivity of the
substantive standard for violation of this new criminal prohibition,
and question whether it provides sufficient notice under the
Constitution. I also share the concerns of the American Society for
Microbiology and the Association of American Universities that this
provision will have a chilling effect upon legitimate scientific
inquiry that offsets any benefit in protecting against terrorism. While
we have tried to prevent against this by creating an explicit exclusion
for ``bona fide research,'' this provision may yet prove unworkable,
unconstitutional, or both. I urge the Justice Department and the
research community to work together on substitute language that would
provide prosecutors with a more workable tool.
Two sections of the USA Act were added at the request of the United
States Secret Service, with the support of the Administration. I was
pleased to accommodate the Secret Service by including these provisions
in the bill to expand Electronic Crimes Task Forces and to clarify the
authority of the Secret Service to investigate computer crimes.
The Secret Service is committed to the development of new tools to
combat the growing areas of financial crime, computer fraud, and
cyberterrorism. Recognizing a need for law enforcement, private
industry and academia to pool their resources, skills, and vision to
combat criminal elements in cyberspace, the Secret Service created the
New York Electronic Crimes Task Force (NYECTF). This highly successful
model includes
[[Page S10998]]
over 250 individual members, including 50 different Federal, State and
local law enforcement agencies, 100 private companies, and 9
universities. Since its inception in 1995, the NYECTF has successfully
investigated a range of financial and electronic crimes, including
credit card fraud, identity theft, bank fraud, computer systems
intrusions, and e-mail threats against protectees of the Secret
Service. Section 105 of the USA Act authorizes the Secret Service to
develop similar task forces in cities and regions across the country
where critical infrastructure may be vulnerable to attacks from
terrorists or other cyber-criminals.
Section 506 of the USA Act gives the Secret Service concurrent
jurisdiction to investigate offenses under 18 U.S.C. Sec. 1030
relating to fraud and related activity in connection with computers.
Prior to the 1996 amendments to the Computer Fraud and Abuse Act, the
Secret Service was authorized to investigate any and all violations of
section 1030, pursuant to an agreement between the Secretary of
Treasury and the Attorney General. The 1996 amendments, however,
concentrated Secret Service jurisdiction on certain specified
subsections of section 1030. The current amendment would return full
jurisdiction to the Secret Service and would allow the Justice and
Treasury Departments to decide on the appropriate work-sharing balance
between the two. This will enable the Secret Service to investigate a
wide range of potential White House network intrusions, as well as
intrusions into remote sites (outside of the White House) that could
impact the safety and security of its protectees, and to continue its
missions to protect the nation's critical infrastructure and financial
payment systems.
The USA Act also authorizes, for the first time, a counter-terrorism
fund in the Treasury of the United States to reimburse Justice
Department for any costs incurred in connection with the fight against
terrorism. I first authored this counter-terrorism fund in S. 1319, the
21st Century Department of Justice Appropriations Authorization Act,
which Senator Hatch and I introduced in August.
Specifically, this counter-terrorism fund may be used: (1) to
reestablish an office or facility that has been damaged as the result
of any domestic or international terrorism incident; (2) to provide
support to counter, investigate, or prosecute domestic or international
terrorism, including paying rewards in connection with these
activities; (3) to conduct terrorism threat assessments of Federal
agencies; and (4) for costs incurred in connection with detaining
individuals in foreign countries who are accused of acts of terrorism
in violation of United States law.
This bill provides enhanced surveillance procedures for the
investigation of terrorism and other crimes. The challenge before us
has been to strike a reasonable balance to protect both the security
and the liberties of our people. In some respects, the changes made are
appropriate and important ones to update surveillance and investigative
procedures in light of new technology and experience with current law.
Yet, as I noted at the beginning of my statement, in other respects, I
have deep concerns that we may be increasing surveillance powers and
the sharing of criminal justice information without adequate checks on
how information may be handled and without adequate accountability in
the form of judicial review.
The bill contains a number of sensible proposals that should not be
controversial.
For example, sections 201 and 202 of the USA Act would add to the
list of crimes that may be used as predicates for wiretaps certain
offenses which are specifically tailored to the terrorist threat. In
addition to crimes that relate directly to terrorism, the list would
include crimes of computer fraud and abuse which are committed by
terrorists to support and advance their illegal objectives.
The bill, in section 206, would authorize the use of roving wiretaps
in the course of a foreign intelligence investigation and brings FISA
into line with criminal procedures that allow surveillance to follow a
person, rather than requiring a separate court order identifying each
telephone company or other communication common carrier whose
assistance is needed. This is a matter on which the Attorney General
and I reached early agreement. This is the kind of change that has a
compelling justification, because it recognizes the ease with which
targets of investigations can evade surveillance by changing phones. In
fact, the original roving wiretap authority for use in criminal
investigations was enacted as part of the Electronic Communications
Privacy Act, ECPA, in 1986. I was proud to be the primary Senate
sponsor of that earlier law.
Paralleling the statutory rules applicable to criminal
investigations, the formulation I originally proposed made clear that
this roving wiretap authority must be requested in the application
before the FISA court was authorized to order such roving surveillance
authority. Indeed, the Administration agrees that the FISA court may
not grant such authority sua sponte. Nevertheless, we have accepted the
Administration's formulation of the new roving wiretap authority, which
requires the FISA court to make a finding that the actions of the
person whose communications are to be intercepted could have the effect
of thwarting the identification of a specified facility or place. While
no amendment is made to the statutory directions for what must be
included in the application for a FISA electronic surveillance order,
these applications should include the necessary information to support
the FISA court's finding that roving wiretap authority is warranted.
Section 220 of this bill authorizes nationwide service of search
warrants in terrorism investigations. This will allow the judge who is
most familiar with the developments in a fast-breaking and complex
terrorism investigation to make determinations of probable cause, no
matter where the property to be searched is located. This will not only
save time by avoiding having to bring up-to-speed another judge in
another jurisdiction where the property is located, but also serves
privacy and Fourth Amendment interests in ensuring that the most
knowledgeable judge makes the determination of probable cause. The
bill, in section 209, also authorizes voice mail messages to be seized
on the authority of a probable cause search warrant rather than through
the more burdensome and time-consuming process of a wiretap.
The bill updates the laws pertaining to electronic records in three
primary ways. First, in section 210, the bill authorizes the nationwide
service of subpoenas for subscriber information and expands the list of
items subject to subpoena to include the means and source of payment
for the service.
In section 211, the bill equalizes the standard for law enforcement
access to cable subscriber records on the same basis as other
electronic records. The Cable Communications Policy Act, passed in 1984
to regulate various aspects of the cable television industry, did not
take into account the changes in technology that have occurred over the
last fifteen years. Cable television companies now often provide
Internet access and telephone service in addition to television
programming. This amendment clarifies that a cable company must comply
with the laws governing the interception and disclosure of wire and
electronic communications just like any other telephone company or
Internet service provider. The amendments would retain current
standards that govern the release of customer records for television
programming.
Finally, the bill, in section 212, permits, but does not require, an
electronic communications service to disclose the contents of and
subscriber information about communications in emergencies involving
the immediate danger of death or serious physical injury. Under current
law, if an ISP's customer receives an e-mail death threat from another
customer of the same ISP, and the victim provides a copy of the
communication to the ISP, the ISP is limited in what actions it may
take. On one hand, the ISP may disclose the contents of the forwarded
communication to law enforcement (or to any other third party as it
sees fit). See 18 U.S.C. Sec. 2702(b)(3). On the other hand, current
law does not expressly authorize the ISP to voluntarily provide law
enforcement with the identity, home address, and other subscriber
information of the user making the threat. See 18 U.S.C.
Sec. 2703(c)(1)(B),(C) (permitting disclosure
[[Page S10999]]
to government entities only in response to legal process). In those
cases where the risk of death or injury is imminent, the law should not
require providers to sit idly by. This voluntary disclosure, however,
in no way creates an affirmative obligation to review customer
communications in search of such imminent dangers.
Also, under existing law, a provider (even one providing services to
the public) may disclose the contents of a customer's communications--
to law enforcement or anyone else--in order to protect its rights or
property. See 18 U.S.C. Sec. 2702(b)(5). However, the current statute
does not expressly permit a provider voluntarily to disclose non-
content records (such as a subscriber's login records) to law
enforcement for purposes of self-protection. See 18 U.S.C.
Sec. 2703(c)(1)(B). Yet the right to disclose the content of
communications necessarily implies the less intrusive ability to
disclose non-content records. Cf. United States v. Auler, 539 F.2d 642,
646 n.9 (7th Cir. 1976) (phone company's authority to monitor and
disclose conversations to protect against fraud necessarily implies
right to commit lesser invasion of using, and disclosing fruits of, pen
register device) (citing United States v. Freeman, 524 F.2d 337, 341
(7th Cir. 1975)). Moreover, as a practical matter providers must have
the right to disclose the facts surrounding attacks on their systems.
When a telephone carrier is defrauded by a subscriber, or when an ISP's
authorized user launches a network intrusion against his own ISP, the
provider must have the legal ability to report the complete details of
the crime to law enforcement. The bill clarifies that service providers
have the statutory authority to make such disclosures.
There is consensus that the existing legal procedures for pen
register and trap-and-trace authority are antiquated and need to be
updated. I have been proposing ways to update the pen register and trap
and trace statutes for several years, but not necessarily in the same
ways as the Administration initially proposed. In fact, in 1998, I
introduced with then-Senator Ashcroft, the E-PRIVACY Act, S. 2067,
which proposed changes in the pen register laws. In 1999, I introduced
the E-RIGHTS Act, S. 934, also with proposals to update the pen
register laws.
Again, in the last Congress, I introduced the Internet Security Act,
S. 2430, on April 13, 2000, that proposed: 1, changing the pen register
and trap and trace device law to give nationwide effect to pen register
and trap and trace orders obtained by Government attorneys and obviate
the need to obtain identical orders in multiple Federal jurisdictions;
2, clarifying that such devices can be used for computer transmissions
to obtain electronic addresses, not just on telephone lines; and 3, as
a guard against abuse, providing for meaningful judicial review of
government attorney applications for pen registers and trap and trace
devices.
As the outline of my earlier legislation suggests, I have long
supported modernizing the pen register and trap and trace device laws
by modifying the statutory language to cover the use of these orders on
computer transmissions; to remove the jurisdictional limits on service
of these orders; and to update the judicial review procedure, which,
unlike any other area in criminal procedure, bars the exercise of
judicial discretion in reviewing the justification for the order. The
USA Act, in section 216, updates the pen register and trap and trace
laws only in two out of three respects I believe are important, and
without allowing meaningful judicial review. Yet, we were able to
improve the Administration's initial proposal, which suffered from the
same problems as the provision that was hastily taken up and passed by
the Senate, by voice vote, on September, 13, 2001, as an amendment to
the Commerce Justice State Appropriations Act.
The existing legal procedures for pen register and trap-and-trace
authority require service of individual orders for installation of pen
register or trap and trace device on the service providers that carried
the targeted communications. Deregulation of the telecommunications
industry has had the consequence that one communication may be carried
by multiple providers. For example, a telephone call may be carried by
a competitive local exchange carrier, which passes it at a switch to a
local Bell Operating Company, which passes it to a long distance
carrier, which hands it to an incumbent local exchange carrier
elsewhere in the U.S., which in turn may finally hand it to a cellular
carrier. If these carriers do not pass source information with each
call, identifying that source may require compelling information from
a host of providers located throughout the country.
Under present law, a court may only authorize the installation of a
pen register or trap device ``within the jurisdiction of the court.''
As a result, when one provider indicates that the source of a
communication is a carrier in another district, a second order may be
necessary. The Department of Justice has advised, for example, that in
1996, a hacker (who later turned out to be launching his attacks from a
foreign country) extensively penetrated computers belonging to the
Department of Defense. This hacker was dialing into a computer at
Harvard University and used this computer as an intermediate staging
point in an effort to conceal his location and identity. Investigators
obtained a trap and trace order instructing the phone company, Nynex,
to trace these calls, but Nynex could only report that the
communications were coming to it from a long-distance carrier, MCI.
Investigators then applied for a court order to obtain the connection
information from MCI, but since the hacker was no longer actually using
the connection, MCI could not identify its source. Only if the
investigators could have served MCI with a trap and trace order while
the hacker was actively on-line could they have successfully traced
back and located him.
In another example provided by the Department of Justice,
investigators encountered similar difficulties in attempting to track
Kevin Mitnick, a criminal who continued to hack into computers attached
to the Internet despite the fact that he was on supervised release for
a prior computer crime conviction. The FBI attempted to trace these
electronic communications while they were in progress. In order to
evade arrest, however, Mitnick moved around the country and used cloned
cellular phones and other evasive techniques. His hacking attacks would
often pass through one of two cellular carriers, a local phone company,
and then two Internet service providers. In this situation, where
investigators and service providers had to act quickly to trace Mitnick
in the act of hacking, only many repeated attempts--accompanied by an
order to each service provider--finally produced success. Fortunately,
Mitnick was such a persistent hacker that he gave law enforcement many
chances to complete the trace.
This duplicative process of obtaining a separate order for each link
in the communications chain can be quite time-consuming, and it serves
no useful purpose since the original court has already authorized the
trace. Moreover, a second or third order addressed to a particular
carrier that carried part of a prior communication may prove useless
during the next attack: in computer intrusion cases, for example, the
target may use an entirely different path (i.e., utilize a different
set of intermediate providers) for his or her subsequent activity.
The bill would modify the pen register and trap and trace statutes to
allow for nationwide service of a single order for installation of
these devices, without the necessity of returning to court for each new
carrier. I support this change.
The language of the existing statute is hopelessly out of date and
speaks of a pen register or trap and trace ``device'' being
``attached'' to a telephone ``line.'' However, the rapid
computerization of the telephone system has changed the tracing
process. No longer are such functions normally accomplished by physical
hardware components attached to telephone lines. Instead, these
functions are typically performed by computerized collection and
retention of call routing information passing through a communications
system.
The statute's definition of a ``pen register'' as a ``device'' that
is ``attached'' to a particular ``telephone line'' is particularly
obsolete when applied to the wireless portion of a cellular phone call,
which has no line to which anything can be attached. While courts have
authorized pen register orders for wireless phones based on the
[[Page S11000]]
notion of obtaining access to a ``virtual line,'' updating the law to
keep pace with current technology is a better course.
Moreover, the statute is ill-equipped to facilitate the tracing of
communications that take place over the Internet. For example, the pen
register definition refers to telephone ``numbers'' rather than the
broader concept of a user's communications account. Although pen
register and trap orders have been obtained for activity on computer
networks, Internet service providers have challenged the application of
the statute to electronic communications, frustrating legitimate
investigations. I have long supported updating the statute by removing
words such as ``numbers . . . dialed'' that do not apply to the way
that pen/trap devices are used and to clarify the statute's proper
application to tracing communications in an electronic environment, but
in a manner that is technology neutral and does not capture the content
of communications. That being said, I have been concerned about the FBI
and Justice Department's insistence over the past few years that the
pen/trap devices statutes be updated with broad, undefined terms that
continue to flame concerns that these laws will be used to intercept
private communications content.
The Administration's initial pen/trap device proposal added the terms
``routing'' and ``addressing'' to the definitions describing the
information that was authorized for interception on the low relevance
standard under these laws. The Administration and the Department of
Justice flatly rejected my suggestion that these terms be defined to
respond to concerns that the new terms might encompass matter
considered content, which may be captured only upon a showing of
probable cause, not the mere relevancy of the pen/trap statute.
Instead, the Administration agreed that the definition should expressly
exclude the use of pen/trap devices to intercept ``content,'' which is
broadly defined in 18 U.S.C. 2510(8).
While this is an improvement, the FBI and Justice Department are
short-sighted in their refusal to define these terms. We should be
clear about the consequence of not providing definitions for these new
terms in the pen/trap device statutes. These terms will be defined, if
not by the Congress, then by the courts in the context of criminal
cases where pen/trap devices have been used and challenged by
defendants. If a court determines that a pen register has captured
``content,'' which the FBI admits such devices do, in violation of the
Fourth Amendment, suppression may be ordered, not only of the pen
register evidence by any other evidence derived from it. We are leaving
the courts with little or no guidance of what is covered by
``addressing'' or ``routing.''
The USA Act also requires the government to use reasonably available
technology that limits the interceptions under the pen/trap device laws
``so as not to include the contents of any wire or electronic
communications.'' This limitation on the technology used by the
government to execute pen/trap orders is important since, as the FBI
advised me in June 2000, pen register devices ``do capture all
electronic impulses transmitted by the facility on which they are
attached, including such impulses transmitted after a phone call is
connected to the called party.'' The impulses made after the call is
connected could reflect the electronic banking transactions a
caller makes, or the electronic ordering from a catalogue that a
customer makes over the telephone, or the electronic ordering of a
prescription drug.
This transactional data intercepted after the call is connected is
``content.'' As the Justice Department explained in a May 1998 letter
to then-House Judiciary Committee Chairman Henry Hyde, ``the retrieval
of the electronic impulses that a caller necessarily generated in
attempting to direct the phone call'' does not constitute a ``search''
requiring probable cause since ``no part of the substantive information
transmitted after the caller had reached the called party'' is
obtained. But the Justice Department made clear that ``all of the
information transmitted after a phone call is connected to the called
party . . . is substantive in nature. These electronic impulses are the
`contents' of the call: They are not used to direct or process the
call, but instead convey certain messages to the recipient.''
When I added the direction on use of reasonably available technology
(codified as 18 U.S.C. 3121(c)) to the pen register statute as part of
the Communications Assistance for Law Enforcement Act (CALEA) in 1994,
I recognized that these devices collected content and that such
collection was unconstitutional on the mere relevance standard.
Nevertheless, the FBI advised me in June 2000, that pen register
devices for telephone services ``continue to operate as they have for
decades'' and that ``there has been no change . . . that would better
restrict the recording or decoding of electronic or other impulses to
the dialing and signaling information utilized in call processing.''
Perhaps, if there were meaningful judicial review and accountability,
the FBI would take the statutory direction more seriously and actually
implement it.
Due in significant part to the fact that pen/trap devices in use
today collect ``content,'' I have sought in legislation introduced over
the past few years to update and modify the judicial review procedure
for pen register and trap and trace devices. Existing law requires an
attorney for the government to certify that the information likely to
be obtained by the installation of a pen register or trap and trace
device will be relevant to an ongoing criminal investigation. The court
is required to issue an order upon seeing the prosecutor's
certification. The court is not authorized to look behind the
certification to evaluate the judgement of the prosecutor.
I have urged that government attorneys be required to include facts
about their investigations in their applications for pen/trap orders
and allow courts to grant such orders only where the facts support the
relevancy of the information likely to be obtained by the orders. This
is not a change in the applicable standard, which would remain the very
low relevancy standard. Instead, this change would simply allow the
court to evaluate the facts presented by a prosecutor, and, if it finds
that the facts support the government's assertion that the information
to be collected will be relevant, issue the order. Although this change
will place an additional burden on law enforcement, it will allow the
courts a greater ability to assure that government attorneys are using
such orders properly.
Some have called this change a ``roll-back'' in the statute, as if
the concept of allowing meaningful judicial review was an extreme
position. To the contrary, this is a change that the Clinton
Administration supported in legislation transmitted to the Congress
last year. This is a change that the House Judiciary Committee also
supported last year. In the Electronic Communications Privacy Act, H.R.
5018, that Committee proposed that before a pen/trap device ``could be
ordered installed, the government must first demonstrate to an
independent judge that `specific and articulable facts reasonably
indicate that a crime has been, is being, or will be committed, and
information likely to be obtained by such installation and use . . . is
relevant to an investigation of that crime.'' (Report 106-932, 106th
Cong. 2d Sess., Oct. 4, 2000, p. 13). Unfortunately, the Bush
Administration has taken a contrary position and has rejected this
change in the judicial review process.
Currently, an owner or operator of a computer that is accessed by a
hacker as a means for the hacker to reach a third computer, cannot
simply consent to law enforcement monitoring of the computer. Instead,
because the owner or operator is not technically a party to the
communication, law enforcement needs wiretap authorization under Title
III to conduct such monitoring. I have long been interested in closing
this loophole. Indeed, when I asked about this problem, the FBI
explained to me in June 2000 that:
This anomaly in the law creates an untenable situation
whereby providers are sometimes forced to sit idly by as they
witness hackers enter and, in some situations, destroy or
damage their systems and networks while law enforcement
begins the detailed process of seeking court authorization to
assist them. In the real world, the situation is akin to a
homeowner being forced to helplessly watch a burglar or
vandal while police seek a search warrant to enter the
dwelling.
I therefore introduced as part of the Internet Security Act, S. 2430,
in 2000,
[[Page S11001]]
an exception to the wiretap statute that would explicitly permit such
monitoring without a wiretap if prior consent is obtained from the
person whose computer is being hacked through and used to send
``harmful interference to a lawfully operating computer system.''
The Administration initially proposed a different formulation of the
exception that would have allowed an owner/operator of any computer
connected to the Internet to consent to FBI wiretapping of any user who
violated a workplace computer use policy or online service term of
service and was thereby an ``unauthorized'' user. The Administration's
proposal was not limited to computer hacking offenses under 18 U.S.C.
1030 or to conduct that caused harm to a computer or computer system.
The Administration rejected these refinements to their proposed wiretap
exception, but did agree, in section 217 of the USA Act, to limit the
authority for wiretapping with the consent of the owner/operator to
communications of unauthorized users without an existing subscriber or
other contractual relationship with the owner/operator.
This bill will make significant changes in the sharing of
confidential criminal justice information with various Federal
agencies. For those of us who have been concerned about the leaks from
the FBI that can irreparably damage reputations of innocent people and
frustrate investigations by alerting suspects to flee or destroy
material evidence, the Administration's insistence on the broadest
authority to disseminate such information, without any judicial check,
is disturbing. Nonetheless, I believe we have improved the
Administration's initial proposal in responsible ways. Only time will
tell whether the improvements we were able to reach agreement on are
sufficient.
At the outset, we should be clear that current law allows the sharing
of confidential criminal justice information, but with close court
supervision. Federal Rule of Criminal Procedure 6(e) provides that
matters occurring before a grand jury may be disclosed only to an
attorney for the government, such other government personnel as are
necessary to assist the attorney and another grand jury. Further
disclosure is also allowed as specifically authorized by a court.
Similarly, section 2517 of title 18, United States Code provides that
wiretap evidence may be disclosed in testimony during official
proceedings and to investigative or law enforcement officers to the
extent appropriate to the proper performance of their official duties.
In addition, the wiretap law allows disclosure of wiretap evidence
``relating to offenses other than specified in the order'' when
authorized or approved by a judge. Indeed, just last year, the Justice
Department assured us that ``law enforcement agencies have authority
under current law to share title III information regarding terrorism
with intelligence agencies when the information is of overriding
importance to the national security.'' (Letter from Robert Raben,
Assistant Attorney General, September 28, 2000).
For this reason, and others, the Justice Department at the time
opposed an amendment proposed by Senators Kyl and Feinstein to S. 2507,
the Intelligence Authorization Act for FY 2001, that would have allowed
the sharing of foreign intelligence and counterintelligence information
collected from wiretaps with the intelligence community. I deferred to
the Justice Department on this issue and sought changes in the proposed
amendment to address the Department's concern that this provision was
not only unnecessary but also ``could have significant implications for
prosecutions and the discovery process in litigation,'' ``raises
significant issues regarding the sharing with intelligence agencies of
information collected about United States persons,'' and jeopardized
``the need to protect equities relating to ongoing criminal
investigations.'' In the end, the amendment was revised to address the
Justice Department's concerns and passed the Senate as a free-standing
bill, S. 3205, the Counterterrorism Act of 2000. The House took no
action on this legislation.
The Administration initially proposed adding a sweeping provision to
the wiretap statute that broadened the definition of an ``investigative
or law enforcement officer'' who may receive disclosures of information
obtained through wiretaps to include Federal law enforcement,
intelligence, national security, national defense, protective and
immigration personnel and the President and Vice President. This
proposal troubled me because information intercepted by a wiretap has
enormous potential to infringe upon the privacy rights of innocent
people, including people who are not even suspected of a crime and
merely happen to speak on the telephone with the targets of an
investigation. For this reason, the authority to disclose information
obtained through a wiretap has always been carefully circumscribed in
law.
While I recognize that appropriate officials in the executive branch
of government should have access to wiretap information that is
important to combating terrorism or protecting the national security, I
proposed allowing such disclosures where specifically authorized by a
court order. Further, with respect to information relating to
terrorism, I proposed allowing the disclosure without a court order as
long as the judge who authorized the wiretap was notified as soon as
practicable after the fact. This would have provided a check against
abuses of the disclosure authority by providing for review by a neutral
judicial official. At the same time, there was a little likelihood that
a judge would deny any requests for disclosure in cases where it was
warranted.
On Sunday, September 30, the Administration agreed to my proposal,
but within two days, it backed away from its agreement. I remain
concerned that the resulting provision will allow the unprecedented,
widespread disclosure of this highly sensitive information without any
notification to or review by the court that authorizes and supervises
the wiretap. This is clearly an area where our Committee will have to
exercise close oversight to make sure that the newly-minted disclosure
authority is not being abused.
The Administration offered three reasons for reneging on the original
deal. First, they claimed that the involvement of the court would
inhibit Federal investigators and attorneys from disclosing information
needed by intelligence and national security officials. Second, they
said the courts might not have adequate security and therefore should
not be told that information was disclosed for intelligence or national
security purposes. And third, they said the President's constitutional
powers under Article II give him authority to get whatever foreign
intelligence he needs to exercise his national security
responsibilities.
I believe these concerns are unfounded. Federal investigators and
attorneys will recognize the need to disclose information relevant to
terrorism investigations. Courts can be trusted to keep secrets and
recognize the needs of the President.
Current law requires that such information be used only for law
enforcement purposes. This provides an assurance that highly intrusive
invasions of privacy are confined to the purpose for which they have
been approved by a court, based on probable cause, as required by the
Fourth Amendment. Current law calls for minimization procedures to
ensure that the surveillance does not gather information about private
and personal conduct and conversations that are not relevant to the
criminal investigation.
When the Administration reneged on the agreement regarding court
supervision, we turned to other safeguards and were more successful in
changing other questionable features of the Administration's bill. The
Administration accepted my proposal to strike the term ``national
security'' from the description of wiretap information that may be
shared throughout the executive branch and replace it with ``foreign
intelligence'' information. This change is important in clarifying what
information may be disclosed because the term ``foreign intelligence''
is specifically defined by statute whereas ``national security'' is
not.
Moreover, the rubric of ``national security'' has been used to
justify some particularly unsavory activities by the government in the
past. We must have at least some assurance that we are not embarked on
a course that will lead to a repetition of these abuses because the
statute will now more clearly define what type of information is
subject to disclosure. In addition, Federal officials who receive the
information
[[Page S11002]]
may use it only as necessary to the conduct of their official duties.
Therefore, any disclosure or use outside the conduct of their official
duties remains subject to all limitations applicable to their retention
and dissemination of information of the type of information received.
This includes the Privacy Act, the criminal penalties for
unauthorized disclosure of electronic surveillance information under
chapter 119 of title 18, and the contempt penalties for unauthorized
disclosure of grand jury information. In addition, the Attorney General
must establish procedures for the handling of information that
identifies a United States person, such as the restrictions on
retention and dissemination of foreign intelligence and
counterintelligence information pertaining to United States persons
currently in effect under Executive Order 12333.
While these safeguards do not fully substitute for court supervision,
they can provide some assurance against misuse of the private,
personal, and business information about Americans that is acquired in
the course of criminal investigations and that may flow more widely in
the intelligence, defense, and national security worlds.
The wiretap statute was not the only provision in which the
Administration sought broader authority to disclose highly sensitive
investigative information. It also proposed broadening Rule 6(e) of the
Federal Rules of Criminal Procedure to allow the disclosure of
information relating to terrorism and national security obtained from
grand jury proceedings to a broad range of officials in the executive
branch of government. As with wiretaps, few would disagree that
information learned in a criminal investigation that is necessary to
combating terrorism or protecting the national security ought to be
shared with the appropriate intelligence and national security
officials. The question is how best to regulate and limit such
disclosures so as not to compromise the important policies of secrecy
and confidentiality that have long applied to grand jury proceedings.
I proposed that we require judicial review of requests to disclose
terrorism and foreign intelligence information to officials in the
executive branch beyond those already authorized to receive such
disclosures. Once again, the Administration agreed to my proposal on
Sunday, September 30, but reneged within two days. As a result, the
bill does not provide for any judicial supervision of the new
authorization for dissemination of grand jury information throughout
the executive branch. The bill does contain the safeguards that I have
discussed with respect to law enforcement wiretap information. However,
as with the new wiretap disclosure authority, I am troubled by this
issue and plan to exercise the close oversight of the Judiciary
Committee to make sure it is not being abused.
The Administration also sought a provision that would allow the
sharing of foreign intelligence information throughout the executive
branch of the government notwithstanding any current legal prohibition
that may prevent or limit its disclosure. I have resisted this proposal
more strongly than anything else that still remains in the bill. What
concerns me is that it is not clear what existing prohibitions this
provision would affect beyond the grand jury secrecy rule and the
wiretap statute, which are already covered by other provisions in the
bill. Even the Administration, which wrote this provision, has not been
able to provide a fully satisfactory explanation of its scope.
If there are specific laws that the Administration believes impede
the necessary sharing of information on terrorism and foreign
intelligence within the executive branch, we should address those
problems through legislation that is narrowly targeted to those
statutes. Tacking on a blunderbuss provision whose scope we do not
fully understand can only lead to consequences that we cannot foresee.
Further, I am concerned that such legislation, broadly authorizing the
secret sharing of intelligence information throughout the executive
branch, will fuel the unwarranted fears and dark conspiracy theories of
Americans who do not trust their government. This was another provision
on which the Administration reneged on its agreement with me; it agreed
to drop it on September 30, but resurrected it within two days,
insisting that it remain in the bill. I have made efforts to mitigate
its potential for abuse somewhat by adding the same safeguards that
apply to disclosure of law enforcement wiretap and grand jury
information.
Another issue that has caused serious concern relates to the
Administration's proposal for so-called ``sneak and peek'' search
warrants. The House Judiciary Committee dropped this proposal entirely
from its version of the legislation. Normally, when law enforcement
officers execute a search warrant, they must leave a copy of the
warrant and a receipt for all property seized at the premises searched.
Thus, even if the search occurs when the owner of the premises is not
present, the owner will receive notice that the premises have been
lawfully searched pursuant to a warrant rather than, for example,
burglarized.
Two circuit courts of appeal, the Second and the Ninth Circuits, have
recognized a limited exception to this requirement. When specifically
authorized by the issuing judge or magistrate, the officers may delay
providing notice of the search to avoid compromising an ongoing
investigation or for some other good reason. However, this authority
has been carefully circumscribed.
First, the Second and Ninth Circuit cases have dealt only with
situations where the officers search a premises without seizing any
tangible property. As the Second Circuit explained, such searches are
``less intrusive than a conventional search with physical seizure
because the latter deprives the owner not only of privacy but also of
the use of his property.'' United States v. Villegas, 899 F.2d 1324,
1337 (2d Cir. 1990).
Second, the cases have required that the officers seeking the warrant
must show good reason for the delay. Finally, while the courts have
allowed notice of the search may be delayed, it must be provided within
a reasonable period thereafter, which should generally be no more than
seven days. The reasons for these careful limitations were spelled out
succinctly by Judge Sneed of the Ninth Circuit: ``The mere thought of
strangers walking through and visually examining the center of our
privacy interest, our home, arouses our passion for freedom as does
nothing else. That passion, the true source of the Fourth Amendment,
demands that surreptitious entries be closely circumscribed.'' United
States v. Freitas, 800 F.2d 1451, 1456 (9th Cir. 1986).
The Administration's original proposal would have ignored some of the
key limitations created by the case law for sneak and peek search
warrants. First, it would have broadly authorized officers not only to
conduct surreptitious searches, but also to secretly seize any type of
property without any additional showing of necessity. This type of
warrant, which has never been addressed by a published decision of a
Federal appellate court, has been referred to in a law review article
written by an FBI agent as a ``sneak and steal'' warrant. See K. Corr,
``Sneaky But Lawful: The Use of Sneak and Peek Search Warrants,'' 43 U.
Kan. L. Rev. 1103, 1113 (1995). Second, the proposal would simply have
adopted the procedural requirements of 18 U.S.C. Sec. 2705 for
providing delayed notice of a wiretap. Among other things, this would
have extended the permissible period of delay to a maximum of 90 days,
instead of the presumptive seven-day period provided by the caselaw on
sneak and peek warrants.
I was able to make significant improvements in the Administration's
original proposal that will help to ensure that the government's
authority to obtain sneak and peek warrants is not abused. First, the
provision that is now in section 213 of the bill prohibits the
government from seizing any tangible property or any wire or electronic
communication or stored electronic information unless it makes a
showing of reasonable necessity for the seizure. Thus, in contrast to
the Administration's original proposal, the presumption is that the
warrant will authorize only a search unless the government can make a
specific showing of additional need for a seizure. Second, the
provision now requires that notice be given within a reasonable time of
the execution of the warrant rather than giving a blanket authorization
for up to a 90-day delay. What constitutes a reasonable time, of
course, will depend upon the circumstances of the particular case. But
I would expect courts
[[Page S11003]]
to be guided by the teachings of the Second and the Ninth Circuits
that, in the ordinary case, a reasonable time is no more than seven
days.
Several changes in the Foreign Intelligence Surveillance Act, FISA,
are designed to clarify technical aspects of the statutory framework
and take account of experience in practical implementation. These
changes are subject to the four-year sunset.
The USA Act, in section 207, changes the duration of electronic
surveillance under FISA in cases of an agent of a foreign power, other
than a United States persons, who acts in the United States as an
officer or employee of a foreign power or as a member of an
international terrorist group. Current law limits court orders in these
cases to 90 days, the same duration as for United States persons.
Experience indicates, however, that after the initial period has
confirmed probable cause that the foreign national meets the statutory
standard, court orders are renewed repeatedly and the 90-day renewal
becomes an unnecessary procedural for investigators taxed with far more
pressing duties.
The Administration proposed that the period of electronic
surveillance be changed from 90 days to one year in these cases. This
proposal did not ensure adequate review after the initial stage to
ensure that the probable cause determination remained justified over
time. Therefore, the bill changes the initial period of the
surveillance from 90 to 120 days and changes the period for extensions
from 90 days to one year. The initial 120-day period provides for a
review of the results of the surveillance or search directed at an
individual before one-year extensions are requested. These changes do
not affect surveillance of a United States person.
The bill also changes the period for execution of an order for
physical search under FISA from 45 to 90 days. This change applies to
United States persons as well as foreign nationals. Experience since
physical search authority was added to FISA in 1994 indicates that 45
days is frequently not long enough to plan and carry out a covert
physical search. There is no change in the restrictions which provide
that United States persons may not be the targets of search or
surveillance under FISA unless a judge finds probable cause to believe
that they are agents of foreign powers who engage in specified
international terrorist, sabotage, or clandestine intelligence
activities that may involve a violation of the criminal statutes of the
United States.
The bill, in section 208, seeks to ensure that the special court
established under FISA has sufficient judges to handle the workload.
While changing the duration of orders and extensions will reduce the
number of cases in some categories, the bill retains the court's role
in pen register and trap and trace cases and expands the court's
responsibility for issuing orders for records and other tangible items
needed for counterintelligence and counter terrorism investigations.
Upon reviewing the court's requirements, the Administration requested
an increase in the number of Federal district judges designated for the
court from seven to 11 of whom no less than three shall reside within
20 miles of the District of Columbia. The latter provision ensures that
more than one judge is available to handle cases on short notice and
reduces the need to invoke the alternative of Attorney General approval
under the emergency authorities in FISA.
Other changes in FISA and related national security laws are more
controversial. In several areas, the bill reflects a serious effort to
accommodate the requests for expanded surveillance authority with the
need for safeguards against misuse, especially the gathering of
intelligence about the lawful political or commercial activities of
Americans. One of the most difficult issues was whether to eliminate
the existing statutory ``agent of a foreign power'' standards for
surveillance and investigative techniques that raise important privacy
concerns, but not at the level that the Supreme Court has held to
require a court order and a probable cause finding under the Fourth
Amendment. These include pen register and trap and trace devices,
access to business records and other tangible items held by third
parties, and access to records that have statutory privacy protection.
The latter include telephone, bank, and credit records.
The ``agent of a foreign power'' standard in existing law was
designed to ensure that the FBI and other intelligence agencies do not
use these surveillance and investigative methods to investigate the
lawful activities of Americans in the name of an undefined authority to
collect foreign intelligence or counterintelligence information. The
law has required a showing of reasonable suspicion, less than probable
cause, to believe that a United States person is an ``agent of a
foreign power'' engaged in international terrorism or clandestine
intelligence activities.
However, the ``agent of a foreign power'' standard is more stringent
than the standard under comparable criminal law enforcement procedures
which require only a showing of relevance to a criminal investigation.
The FBI's experience under existing laws since they were enacted at
various time over the past 15 years has been that, in practice, the
requirement to show reasonable suspicion that a person is an ``agent of
a foreign power'' has been almost as burdensome as the requirement to
show probable cause required by the Fourth Amendment for more intrusive
techniques. The FBI has made a clear case that a relevance standard is
appropriate for counterintelligence and counterterrorism
investigations, as well as for criminal investigations.
The challenge, then, was to define those investigations. The
alternative proposed by the Administration was to cover any
investigation to obtain foreign intelligence information. This was
extremely broad, because the definition includes any information with
respect to a foreign power that relates to, and if concerning a United
States person is necessary to, the national defense or the security of
the United States or the conduct of the foreign affairs of the
United States. This goes far beyond FBI counterintelligence and
counterterrorism requirements. Instead, the bill requires that use of
the surveillance technique or access to the records concerning a United
States person be relevant to an investigation to protect against
international terrorism or clandestine intelligence activities.
In addition, an investigation of a United States person may not be
based solely on activities protected by the First Amendment. This
framework applies to pen registers and trap and trace under section
215, access to records and other items under section 215, and the
national security authorities for access to telephone, bank, and credit
records. Lawful political dissent and protest by American citizens
against the government may not be the basis for FBI counterintelligence
and counterterrorism investigations under these provisions.
A separate issue for pen registers and trap and trace under FISA is
whether the court should have the discretion to make the decision on
relevance. The Administration has insisted on a certification process.
I discussed this issue as it comes up in the criminal procedures for
pen registers and trap and trace under title 18, and my concerns apply
to the FISA procedures as well.
Among the more controversial changes in FISA requested by the
Administration was the proposal to allow surveillance and search when
``a purpose'' is to obtain foreign intelligence information. Current
law requires that the secret procedures and different probable cause
standards under FISA be used only if a high-level executive official
certifies that ``the purpose'' is to obtain foreign intelligence
formation. The Administration's aim was to allow FISA surveillance and
search for law enforcement purposes, so long as there was at least some
element of a foreign intelligence purpose. This proposal raised
constitutional concerns, which were addressed in a legal opinion
provided by the Justice Department.
The Justice Department opinion did not defend the constitutionality
of the original proposal. Instead, it addressed a suggestion made by
Senator Feinstein to the Attorney General at the Judiciary Committee
hearing to change ``the purpose'' to ``a significant purpose.'' No
matter what statutory change is made even the Department concedes that
the court may impose a constitutional requirement of ``primary
purpose'' based on the appellate court decisions upholding FISA against
constitutional challenges over the past 20 years.
[[Page S11004]]
Section 218 of the bill adopts ``significant purpose,'' and it will
be up to the courts to determine how far law enforcement agencies may
use FISA for criminal investigation and prosecution beyond the scope of
the statutory definition of ``foreign intelligence information.''
In addition, I proposed and the Administration agreed to an
additional provision in Section 505 that clarifies the boundaries for
consultation and coordination between officials who conduct FISA search
and surveillance and Federal law enforcement officials including
prosecutors. Such consultation and coordination is authorized for the
enforcement of laws that protect against international terrorism,
clandestine intelligence activities of foreign agents, and other grave
foreign threats to the nation. Protection against these foreign-based
threats by any lawful means is within the scope of the definition of
``foreign intelligence information,'' and the use of FISA to gather
evidence for the enforcement of these laws was contemplated in the
enactment of FISA. The Justice Department's opinion cites relevant
legislative history from the Senate Intelligence Committee's report in
1978, and there is comparable language in the House report.
The Administration initially proposed that the Attorney General be
authorized to detain any alien indefinitely upon his certification that
the alien met the criteria of the terrorism grounds of the Immigration
and Nationality Act, or was engaged in any other activity endangering
the national security of the United States. Under close questioning by
both Senator Kennedy and Senator Specter at the Committee hearing on
September 25, the Attorney General said that his proposal was intended
only to allow the government to hold an alien suspected of terrorist
activity while deportation proceedings were ongoing. In response to a
question by Senator Specter, the Attorney General said: ``Our intention
is to be able to detain individuals who are the subject of deportation
proceedings on other grounds, to detain them as if they were the
subject of deportation proceedings on terrorism.'' The Justice
Department, however, continued to insist on broader authority,
including the power to detain even if the alien was found not to be
deportable.
I remain concerned about the provision, in section 412, but I believe
that we have twice improved it from the original proposal offered by
the Administration, first in S. 1510 and second in the bill we pass
today. S. 1510 provided that the Justice Department had to charge an
alien with an immigration or criminal violation within seven days of
taking custody, and that the merits of the Attorney General's
certification were subject to judicial review. The bill we vote on
today is further improved. First, if an alien is found not to be
removable, he must be released from custody. Second, the Attorney
General can only delegate the power to certify an alien to the Deputy
Attorney General, ensuring greater accountability and preventing the
certification decision from being made by low-level officials. Third,
the Attorney General must review his certification of an alien every
six months. Fourth, an alien who is found to be removable but has not
been removed, and whose removal is unlikely in the reasonably
foreseeable future, may be detained only if the Attorney General
demonstrates that release of the alien will adversely affect national
security or the safety of the community or any person. This improvement
is essential to preserve the constitutionality of the bill. Fifth,
habeas corpus review of detention is made available in the District
where the detention is occurring, instead of only in the District Court
in the District of Columbia. Despite these improvements, this remains a
major and controversial new power for the Attorney General, and I would
urge him and his successors to employ great discretion in using it.
In addition, the Administration initially proposed a sweeping
definition of terrorist activity and new powers for the Secretary of
State to designate an organization as a terrorist organization for
purposes of immigration law. We were able to work with the
Administration to refine this definition to limit its application to
individuals who had innocent contacts with non-designated
organizations. We also limited the retroactive effect of these new
definitions. If an alien solicited funds or membership, or provided
material support for an organization that was not designated at that
time by the Secretary of State, the alien will have the opportunity to
show that he did not know and should have known that his acts would
further the organization's terrorist activity. This is substantially
better than the administration's proposal, which by its terms, would
have empowered the INS to deport someone who raised money for the
African National Congress in the 1980s.
Throughout our negotiations on these issues, Senator Kennedy provided
steadfast leadership. Although neither of us are entirely pleased with
the final product, it is far better than it would have been without his
active involvement.
I was disappointed that the Administration's initial proposal
authorizing the President to impose unilateral food and medical
sanctions would have undermined a law we passed last year with
overwhelming bipartisan support.
Under that law, the President already has full authority to impose
unilateral food and medicine sanctions during this crisis because of
two exceptions built into the law that apply to our current situation.
Nevertheless, the Administration sought to undo this law and obtain
virtually unlimited authority in the future to impose food and medicine
embargoes, without making any effort for a multi-lateral approach in
cooperation with other nations. Absent such a multi-lateral approach,
other nations would be free to step in immediately and take over
business from American firms and farmers that they are unilaterally
barred from pursuing.
Over 30 farm and export groups, including the American Farm Bureau
Federation, the Grocery Manufacturers of America, the National Farmers
Union, and the U.S. Dairy Export Council, wrote to me and explained
that the Administration proposal would ``not achieve its intended
policy goal.''
I worked with Senator Enzi, and other Senators, on substitute
language to give the Administration the tools it needs in this crisis.
This substitute has been carefully crafted to avoid needlessly hurting
American farmers in the future, yet it will assure that the U.S. can
engage in effective multilateral sanctions.
This bipartisan agreement limits the authority in the bill to
existing laws and executive orders, which give the President full
authority regarding this conflict, and grants authority for the
President to restrict exports of agricultural products, medicine or
medical devices. I continue to agree with then-Senator Ashcroft, who
argued in 1999 that unilateral U.S. food and medicine sanctions simply
do not work when he introduced the ``Food and Medicine for the World
Act.'' As recently as October 2000, then-Senator Ashcroft pointed out
how broad, unilateral embargoes of food or medicine are often
counterproductive. Many Republican and Democratic Senators made it
clear just last year that the U.S. should work with other countries on
food and medical sanctions so that the sanctions will be effective in
hurting our enemies, instead of just hurting the U.S. I am glad that
with Senator Enzi's help, we were able to make changes in the trade
sanctions provision to both protect our farmers and help the President
during this crisis.
Title III of this bill contains money laundering provisions agreed
upon by the relevant House and Senate committees. I commend the
Chairman of the Senate Banking Committee, Senator Sarbanes, for working
with the House to produce a balanced and effective package of measures
to combat international money laundering and the financing of
terrorism.
The Senate included money laundering provisions in the original USA
Act, but those provisions were removed from the bill the House passed
the following day. Instead, the House passed a separate money
laundering bill, H.R. 3004, on October 17. House and Senate negotiators
then met to resolve the differences between the bills and produce the
language contained in the bill the Senate considers today.
I am very pleased that the House has agreed to include money
laundering provisions in anti-terrorism legislation. Preventing money
laundering is a
[[Page S11005]]
crucial part of our efforts to defeat terrorism, and it was important
for Congress to develop a bipartisan approach to strengthening our
laws. This bill contains such an approach.
I am also pleased that a number of provisions that would have
undermined the Civil Asset Forfeiture Act of 2000, which I sponsored in
the Senate, have been removed. In addition, this bill does not include
language that would have unduly expanded administrative subpoena powers
in all money laundering cases. A more targeted approach was necessary,
and has been produced.
This measure could not be considered today and would not be in the
improved condition it is without the steadfast commitment of our
Majority Leader. Senator Daschle deserves all the credit for all that
is good in this bill. Without his commitment and focus, we simply would
not be in the position to pass this bill today.
On my behalf and more importantly on behalf of the American people, I
want to publicly acknowledge his vital role in this legislation.
I have done my best under the circumstances and want to thank
especially Senator Kennedy for his leadership on the Immigration parts
of the bill. My efforts have not been completely successful and there
are a number of provisions on which the Administration has insisted
with which I disagree. Frankly, the agreement of September 30, 2001 on
the sharing of criminal justice information would have led to a better
balanced bill. I could not stop the Administration from reneging on the
agreement any more than I could have sped the process to reconstitute
this bill in the aftermath of those breaches. In these times we need to
work together to face the challenges of international terrorism. I have
sought to do so in good faith.
We have worked around the clock for the past month to put forward the
best legislative package we could. While I share the administration's
goal of promptly providing the tools necessary to deal with the current
terrorist threat, I feel strongly that our responsibilities include
equipping such tools with safety features to ensure that these tools do
not cause harm and are not misused.
I want to conclude my remarks with thanks for the efforts of many
staff members who have worked tirelessly under unusual and enormously
inconvenient circumstances to help us craft the legislation before us
today. In particular, I want to thank Mark Childress and Andrea LaRue
on the staff of Majority Leader Daschle, and David Hoppe on the staff
of Republican Leader Lott. I would also like to thank Makan Delrahim,
Jeff Taylor, Stuart Nash, and Leah Belaire with Senator Hatch, the
Ranking Member of the Judiciary Committee, Melody Barnes and Esther
Olavarria with Senator Kennedy, Neil McBride and Eric Rosen with
Senator Biden, Bob Schiff with Senator Feingold, and Stacy Baird and
Beth Stein with Senator Cantwell. Finally, I would like to thank my own
Judiciary Committee staff, especially Bruce Cohen, Beryl Howell, Julie
Katzman, Ed Pagano, John Elliff, David James, Ed Barron, Tim Lynch,
Susan Davies, Manu Bhardwaj, Liz McMahon, and Tara Magner.
I ask unanimous consent that a section-by-section analysis be printed
in the Record.
There being no objection, the material was ordered to be printed in
the Record, as follows:
The Uniting and Strengthening America by Providing Appropriate Tools
Required To Intercept and Obstruct Terrorism (USA Patriot) Act of 2001,
H.R. 3162--Section-by-Section Analysis
Sec. 1. Short title and table of contents. Both S. 1510
passed by the Senate on October 11, 2001 (the ``Senate
bill''), and H.R. 2975 passed by the House of Representatives
on October 12, 2001, included this section containing the
short title ``Uniting and Strengthening America (USA) Act of
2001'' and the table of contents for the Act. H.R. 3162, the
bill subsequently passed by the House on October 24, 2001
(the ``House bill''), changed the title to the ``Uniting and
Strengthening America by Providing Appropriate Tools Required
to Intercept and Obstruct Terrorism (USA PATRIOT) Act of
2001.''
Sec. 2. Construction; severability. Both the House and
Senate bills included this rule of construction to provide
that any portion of this Act found to be invalid or
unenforceable by its terms, or as applied to any person or
circumstance, shall be construed to give it the maximum
effect permitted by law and that any portion found invalid or
unenforceable in its entirety shall be severable from the
rest of the Act.
title i--enhancing domestic security against terrorism
Sec. 101. Counterterrorism fund. Both the House and Senate
bills included this provision to establish a counterterrorism
fund in the Treasury of the United States, without affecting
prior appropriations, to reimburse Department of Justice
components for costs incurred in connection with terrorism
and terrorism prevention, rebuild any Justice Department
component damaged or destroyed as a result of a terrorism
incident, pay terrorism-related rewards, conduct terrorism
threat assessments, and reimburse Federal agencies for costs
incurred in connection with detaining suspected terrorists in
foreign countries. Not in original Administration proposal.
Sec. 102. Sense of Congress condemning discrimination
against Arab and Muslim Americans. Both the House and Senate
bills included this provision to condemn acts of violence and
discrimination against Arab Americans, American Muslims, and
Americans from South Asia, and to declare that every effort
must be taken to protect their safety. Not in original
Administration proposal.
Sec. 103. Increased funding for the technical support
center at the Federal Bureau of Investigation. Both the House
and Senate bills included this provision to
authorize $200,000,000 per year for fiscal years 2002,
2003 and 2004 for the Technical Support Center established
in section 811 of the Antiterrorism and Effective Death
Penalty Act of 1996 to help meet the demands of activities
to combat terrorism and enhance the technical support and
tactical operations of the FBI. Not in original
Administration proposal.
Sec. 104. Requests for Military Assistance to Enforce
Prohibition in Certain Emergencies. Both the House and Senate
bills included this provision to authorize the Attorney
General to request military assistance in support of
Department of Justice activities relating to the enforcement
of 18 U.S.C. Sec. 2332a during an emergency situation
involving a weapon of mass destruction. Current law
references a statute that was repealed in 1998, relating to
chemical weapons. Not in original Administration proposal.
Sec. 105. Expansion of National Electronic Crime Task Force
Initiative. Both the House and Senate bills included this
provision to allow the Secret Service to develop a national
network of electronic crime task forces, based on the highly
successful New York Electronic Crimes Task Force model, for
the purpose of preventing, detecting, and investigating
various forms of electronic crimes, including potential
terrorist attacks against critical infrastructure and
financial payment systems. Not in original Administration
proposal.
Sec. 106. Presidential authority. Both the House and Senate
bills included this provision to give to the President, in
limited circumstances involving armed hostilities or attacks
against the United States, the power to confiscate and vest
in the United States the property of enemies of the United
States during times of national emergency, which was
permitted by the Trading with the Enemy Act, 50 app. U.S.C.
Sec. 5(b), until 1977, when the International Economic
Emergency Act was passed. The new provision permits the
President, when the United States is engaged in military
hostilities or has been subject to attack, to confiscate
property of any foreign country, person or organization
involved in hostilities or attacks on the United States. This
section also permits courts, when reviewing determinations
made by the executive branch, to consider classified evidence
ex parte and in camera. Same as original Administration
proposal.
TITLE II--ENHANCED SURVEILLANCE PROCEDURES
[Note: Elimination of original Administration proposal to
allow government use of wiretap information on U.S. citizens
obtained illegally overseas in violation of the Fourth
Amendment and of foreign government laws.]
Sec. 201. Authority to intercept wire, oral, and electronic
communications relating to terrorism. Both the House and
Senate bills included this provision to add criminal
violations relating to terrorism to the list of predicate
statutes in the criminal procedures for interception of
communications under chapter 119 of title 18, United States
Code. Not in original Administration proposal.
Sec. 202. Authority to intercept wire, oral, and electronic
communications relating to computer fraud and abuse offenses.
Both the House and Senate bills included this provision to
add criminal violations relating to computer fraud and abuse
to the list of predicate statutes in the criminal procedures
for interception of communications under chapter 119 of title
18, United States Code. Not in original Administration
proposal.
Sec. 203. Authority to share criminal investigative
information. Both the House and Senate bills included
provisions amending the criminal procedures for interception
of communications under chapter 119 of title 18, United
States Code, and the grand jury procedures under Rule 6(e) of
the Federal Rules of Criminal Procedures to authorize
disclosure of foreign intelligence information obtained by
such interception or by a grand jury to any Federal law
enforcement, intelligence, national security, national
defense, protective or immigration personnel to assist the
official receiving that information in
[[Page S11006]]
the performance of his official duties. Section 203(a)
requires that within a reasonable time after disclosure of
any grand jury information, an attorney for the government
notify the court of such disclosure and the departments,
agencies or entities to which disclosure was made. Section
203(b) pertains to foreign intelligence information obtained
by intercepting communications pursuant to a court-ordered
wiretap. Section 203(c) also authorizes such disclosure of
information obtained as part of a criminal investigation
notwithstanding any other law.
The information must meet statutory definitions of foreign
intelligence or counterintelligence or foreign intelligence
information. Recipients may use that information only as
necessary for their official duties, and use of the
information outside those limits remains subject to
applicable penalties, such as penalties for unauthorized
disclosure under chapter 119, contempt penalties under Rule
6(e) and the Privacy Act. The Attorney General must establish
procedures for disclosure of information that identifies a
United States person, such as the current procedures
established under Executive Order 12333 for the intelligence
community. Modified Administration proposal to limit scope of
personnel eligible to receive information. In case of grand
jury information, limited proposal to require notification to
court after disclosure.
Sec. 204. Clarification of intelligence exceptions from
limitations on interception and disclosure of wire, oral, and
electronic communications. Both the House and Senate bills
included this provision to amend the criminal procedures for
interception of wire, oral, and electronic communications in
title 18, United States Code, to make clear that these
procedures do not apply to the collection of foreign
intelligence information under the statutory foreign
intelligence authorities. Not in original Administration
proposal.
Sec. 205. Employment of translators by the Federal Bureau
of Investigation. Both the House and Senate bills included
this provision to authorize the FBI Director to expedite the
employment of personnel as translators to support
counterterrorism investigations and operations without regard
to applicable Federal personnel requirements and limitations.
Not in original Administration proposal.
Sec. 206. Roving surveillance authority under the Foreign
Intelligence Surveillance Act of 1978. Both the House and
Senate bills included this provision to modify the Foreign
Intelligence Surveillance Act (``FISA'') to allow
surveillance to follow a person who uses multiple
communications devices or locations, a modification which
conforms FISA to the parallel criminal procedure for
electronic surveillance in 18 U.S.C. Sec. 2518(11)(b). The
court order need not specify the person whose assistance to
the surveillance is required (such as a particular
communications common carrier), where the court finds that
the actions of the target may have the effect of thwarting
the identification of a specified person. Same as original
Administration proposal.
Sec. 207. Duration of FISA surveillance of non-United
States persons who are agents of foreign power. Both the
House and Senate bills included this provision to change the
initial period of a FISA order for a surveillance or physical
search targeted against an agent of a foreign power from 90
to 120 days, and changes the period for extensions from 90
days to one year. One-year extensions for physical searches
are subject to the requirement in current law that the judge
find ``probable cause to believe that no property of any
United States person will be acquired during the period.''
Section 207 also changes the ordinary period for physical
searches under FISA from 45 to 90 days. Narrower than
Administration proposal which sought to eliminate the initial
90-day limitation and authorize surveillance for up to one
year from the outset.
Sec. 208. Designation of judges. Both the House and Senate
bills included this provision to increase the number of
Federal district judges designated to serve on the FISA court
from seven to 11, and requires that no less that 3 of the
judges reside within 20 miles of the District of Columbia.
Not in original Administration proposal.
Sec. 209. Seizure of voice-mail messages pursuant to
warrants. Both the House and Senate bills included this
provision to authorize government access to voice mails with
a court order supported by probable cause in the same way e-
mails currently may be accessed, and authorizes nationwide
service with a single search warrant for voice mails. Current
law, 18 U.S.C. Sec. 2510(1), defines ``wire communication''
to include ``any electronic storage of such communication,''
with the result that the government must apply for a Title
III wiretap order before it may obtain unopened voice mail
messages held by a service provider. This section amends the
definition of ``wire communication'' so that it no longer
includes stored communications. It also amends 18 U.S.C.
Sec. 2703 to specify that the government may use a search
warrant (instead of a wiretap order) to compel the production
of unopened voicemail, thus harmonizing the rules applicable
to stored voice and non-voice (e.g., e-mail) communications.
Same as Administration proposal.
Sec. 210. Scope of subpoenas for records of electronic
communications. Both the House and Senate bills included this
provision to broaden the types of records that law
enforcement may obtain, pursuant to a subpoena, from
electronic communications service providers by requiring
providers to disclose the means and source of payment,
including any bank account or credit card numbers. Current
law allows the government to use a subpoena to compel
communications providers to disclose a small class of records
that pertain to electronic communications, limited to such
records as the customer's name, address, and length of
service. 18 U.S.C. Sec. 2703(c)(1)(C). Investigators may not
use a subpoena to obtain such records as credit card number
or other form of payment and must use a court order. In many
cases, users register with Internet service providers using
false names, making the form of payment critical to
determining the user's true identity. Same as original
Administration proposal.
Sec. 211. Clarification of scope. Both the House and Senate
bills included provisions to amend the Cable Communications
Policy Act to clarify that when a cable company acts as a
telephone company or an Internet service provider, it must
comply with the same laws governing the interception and
disclosure of wire and electronic communications that apply
to any other telephone company or Internet service provider.
This section also expressly provides, however, that
authorized disclosures under this provision do not include
records that reveal customer cable viewing activity. Modified
original Administration proposal to specify that targets do
not receive advance notice of wiretap order and amends
title 47 to accomplish same purpose as administration
proposal.
Sec. 212. Emergency disclosure of electronic communications
to protect life and limb. Both the House and Senate bills
included this provision to amend 18 U.S.C. Sec. 2702 to
authorize providers of electronic communications services to
disclose the communications (or records of such
communications) of their subscribers if the provider
reasonably believes that an emergency involving immediate
danger of death or serious physical injury to any person
requires the disclosure of the information without delay.
This section also corrects an anomaly in the current law by
clearly permitting a provider to disclose non-content records
(such as a subscriber's log-in records) as well as the
contents of the customer's communications to protect their
computer systems. Same as original Administration proposal.
Sec. 213. Authority for delaying notice of the execution of
a warrant. Both the House and Senate bills included this
provision to amend 18 U.S.C. Sec. 3103a to authorize a court
to issue a search warrant in which the government is
permitted to delay providing notice of the warrant's
execution. Consistent with the requirements of case law from
the Second and Ninth Circuits, this section also provides
several limitations on this authority. See United States v.
Villegas, 899 F.2d 1324 (2d Cir. 1990); United States v.
Freitas, 800 F.2d 1451 (9th Cir. 1986). First, delayed notice
is authorized only in cases where the government has
demonstrated reasonable cause to believe that providing
immediate notice would have an adverse result as defined in
18 U.S.C. Sec. 2705. Second, the provision prohibits the
government from seizing any tangible property or any wire or
electronic communication or stored wire or electronic
communication unless it makes a showing of reasonable
necessity for the seizure. Third, the warrant must require
the giving of notice within a reasonable time of the
execution of the search. Narrower than original
Administration proposal, which would have permitted delay as
law enforcement saw fit.
Sec. 214. Pen register and trap and trace authority under
FISA. Both the House and Senate bills included this provision
to modify FISA provisions for pen register and trap and trace
to eliminate the requirement to show to the court that the
target is in contact with an ``agent of a foreign power.'' It
replaces this requirement with a determination that the pen
register or trap and trace is relevant to an investigation to
protect against international terrorism or clandestine
intelligence activities or to obtain foreign intelligence
information not concerning U.S. persons. Any investigation of
a United States person may not be based solely on activities
protected by the First Amendment. Narrower than original
Administration proposal, which would simply have removed
the ``agent of a foreign power'' requirement.
Sec. 215. Access to records and other items under the FISA.
Both the House and Senate bills included this provision to
remove the ``agent of a foreign power'' standard for court-
ordered access to certain business records under FISA and
expands the scope of court orders to include access to other
records and tangible items. The authority may be used for an
investigation to protect against international terrorism or
clandestine intelligence activities or to obtain foreign
intelligence information not concerning U.S. persons. An
investigation of a United States person may not be based
solely on activities protected by the First Amendment.
Narrower than original Administration proposal, which would
have removed requirements of court order and the ``agent of a
foreign power'' showing.
Sec. 216. Modification of authorities relating to use of
pen registers and trap and trace devices. Both the House and
Senate bills included this provision to authorize courts to
grant pen register and trap and trace orders that are valid
anywhere in the nation. It also ensures that the pen register
and trap and trace provisions apply to facilities other than
telephone lines (e.g., the Internet). It specifically
provides, however, that the grant of authority to capture
``routing'' and
[[Page S11007]]
``addressing'' information for Internet users does not
authorize the interception of the content of any such
communications. It further requires the government to use the
latest available technology to insure that a pen register or
trap and trace device does not intercept the content of any
communications. Finally, it provides for a report to the
court on each use of ``Carnivore''-like devices on packet-
switched data networks. Makes a number of improvements over
Administration proposal, including exclusion of content,
exclusion of ISP liability, and Carnivore report.
Sec. 217. Interception of computer trespasser
communications. Both the House and Senate bills included this
provision to allow computer service providers who are victims
of attacks by computer trespassers to authorize persons
acting under color of law to monitor trespassers on their
computer systems in a narrow class of cases. A computer
trespasser is defined as a person who accesses a protected
computer without authorization and thus has no reasonable
expectation of privacy in any communications transmitted to,
through, or from the protected computer. However, it does not
include a person known by the owner or operator of the
protected computer to have an existing contractual
relationship with the owner or operator for access to all or
part of the protected computer. Narrower than original
Administration proposal, which did not exclude service
provider subscribers from definition of trespasser and did
not limit interception authority to only those
communications through the computer in question.
Sec. 218. Foreign intelligence information. Both the House
and Senate bills included this provision to amend FISA to
require a certification that ``a significant purpose'' rather
than ``the purpose'' of a surveillance or search under FISA
is to obtain foreign intelligence information. Narrower than
Administration proposal, which would have allowed FISA
surveillance if intelligence gathering was merely ``a''
purpose.
Sec. 219. Single-jurisdiction search warrants for
terrorism. Both the House and Senate bills included this
provision to amend Federal Rule of Criminal Procedure 41(a)
to provide that warrants relating to the investigation of
terrorist activities may be obtained in any district in which
the activities related to the terrorism may have occurred,
regardless of where the warrants will be executed. Same as
Administration proposal.
Sec. 220. Nationwide service of search warrants for
electronic surveillance. Both the House and Senate bills
included this provision to amend 18 U.S.C. Sec. 2703(a) to
authorize courts with jurisdiction over the offense to issue
search warrants for electronic communications in electronic
storage anywhere in the United States, without requiring the
intervention of their counterparts in the districts where
Internet service providers are located. Narrower than
Administration proposal in that it limits forum shopping
problem by limiting to courts with jurisdiction over the
offense.
Sec. 221. Trade sanctions. Both the House and Senate bills
included this provision to authorize the President
unilaterally to restrict exports of agricultural products,
medicine or medical devices to the Taliban or the territory
of Afghanistan controlled by the Taliban. Narrower than
original Administration proposal which would have undermined
the congressional approval requirement, conferring upon the
President control of agricultural and medical exports ``to
all designated terrorists and narcotics entities wherever
they are located.''
Sec. 222. Assistance to law enforcement agencies. Both the
House and Senate bills included this provision that this Act
does not impose any additional technical requirements on a
provider of a wire or electronic communication service and
that a provider of a wire or electronic communication
service, landlord, custodian or other person who furnishes
facilities or technical assistance pursuant to section 216
shall be reasonably compensated for expenditures incurred in
providing such facilities or assistance. Not in original
Administration proposal.
Sec. 223. Civil liability for certain unauthorized
disclosures. H.R. 2975 included this provision to create
civil liability for violations, including unauthorized
disclosures, by law enforcement authorities of the electronic
surveillance procedures set forth in title 18, United States
Code (e.g., unauthorized disclosure of pen trap, wiretap,
stored communications), or FISA information. Also requires
administrative discipline of officials who engage in such
unauthorized disclosures. Not in original Administration
proposal.
Sec. 224. Sunset. H.R. 2975 included a provision to sunset
certain amendments made by this title in 3 to 5 years. H.R.
3162 provides a 4-year sunset for sections 206, 201, 202,
203(b), 204, 206, 207, 209, 210, 212, 214, 215, 217, 218,
220, 223--at the end December 31, 2005, with the authorities
``grandfathered'' as to particular investigations based on
offenses occurring prior to sunset. No sunset provided in
original Administration proposal or S. 1510, and four-year
sunset shorter than the five-year sunset in H.R. 2975.
Title III--INTERNATIONAL MONEY LAUNDERING ABATEMENT AND ANTI-TERRORIST
FINANCING ACT OF 2001
[Note: Elimination of original Administration proposals to
allow broad disclosure of individual tax return information;
pre-trial restraint of legitimately obtained property in all
criminal forfeiture cases; carve-out of tobacco companies
from RICO liability for foreign excise taxes; and creation of
new criminal offense to misrepresent identification when
opening bank account. The Administration bill contained none
of the money laundering provisions contained in either the
Senate bill or H.R. 3004.]
Sec. 301. Short title. This section contains the short
title of Title III, ``International Money Laundering
Abatement and Financial Anti-Terrorism Act of 2001,'' which
merges the short title of Title III of the Senate bill with
the short title of H.R. 3004, which passed the House of
Representatives on October 17, 2001 (``H.R. 3004''). This
section also contains the table of contents for Title III.
Sec. 302. Findings and purposes. The Senate bill included
this provision, which states the legislative findings and
purposes in support of Title III.
Sec. 303. 4-Year congressional review; expedited
consideration. Section 303, included in the Senate bill,
provides that the provisions added and amendments made by
Title III will terminate after September 30, 2004, if the
Congress enacts a joint resolution to that effect, and that
any such joint resolution will be given expedited
consideration by the Congress.
Subtitle A--International Counter-Money Laundering and Related Measures
Sec. 311. Special measures for jurisdictions, financial
institutions, or international transactions or accounts of
primary money laundering concern. Section 311, included in
both the Senate bill and H.R. 3004, adds a new section 5318A
to the Bank Secrecy Act, to give the Secretary of the
Treasury, in consultation with other senior government
officials, authority (in the Secretary's discretion), to
impose one or more of five new ``special measures'' against
foreign jurisdictions, foreign financial institutions,
transactions involving such jurisdictions or institutions, or
one more types of accounts, that the Secretary, after
consultation with Secretary of State and the Attorney
General, determines to pose a ``primary money laundering
concern'' to the United States. The special measures include:
(1) requiring additional recordkeeping or reporting for
particular transactions; (2) requiring the identification of
the foreign beneficial owners of certain accounts at a U.S.
financial institution; (3) requiring the identification of
customers of a foreign bank who use an interbank payable-
through account opened by that foreign bank at a U.S. bank;
(4) requiring the identification of customers of a foreign
bank who use an interbank correspondent account opened by
that foreign bank at a U.S. bank; and (5) after consultation
with the Secretary of State, the Attorney General, and the
Chairman of the Federal Reserve Board, restricting or
prohibiting the opening or maintaining of certain interbank
correspondent or payable-through accounts. Measures (1)
through (4) may not be imposed for more than 120 days except
by regulation, and measure (5) may only be imposed by
regulation.
Sec. 312. Special due diligence for correspondent accounts
and private banking accounts. Section 312, included in both
the Senate bill and H.R. 3004, adds a new subsection (i) to
31 U.S.C. Sec. 5318, to require a U.S. financial institution
that maintains a correspondent account or private banking
account for a non-United States person to establish
appropriate and, if necessary, enhanced due diligence
procedures to detect and report instances of money
laundering. The new provision also creates minimum anti-money
laundering due diligence standards for U.S. financial
institutions that enter into correspondent banking
relationships with banks that operate under offshore banking
licenses or under banking licenses issued by countries that
(1) have been designated as noncooperative with international
counter money laundering principles by an international body
with the concurrence of the U.S. representative to that body,
or (2) have been the subject of special measures authorized
by section 311. Finally, the new provision creates minimum
anti-money laundering due diligence standards for
maintenance of private banking accounts by U.S. financial
institutions. New section 31 U.S.C Sec. 5318(i) will take
effect 270 days after the date of enactment; the Secretary
of the Treasury is required to issue regulations (in
consultation with the appropriate Federal functional
regulators) within 180 days of enactment further
delineating the requirements of the new subsection, but
the statute is to take effect whether or not such
regulations are issued, and failure to issue final
regulations shall in no way affect the enforceability of
Sec. 5318(i) as added by section 312.
Sec. 313. Prohibition on United States correspondent
accounts with foreign shell banks. Section 313, included in
both the Senate bill and H.R. 3004, adds a new subsection (j)
to 31 U.S.C. Sec. 5318, to bar depository institutions and
brokers and dealers in securities operating in the United
States from establishing, maintaining, administering, or
managing correspondent accounts for foreign shell banks,
other than shell bank vehicles affiliated with recognized and
regulated depository institutions. The new 31 U.S.C.
Sec. 5318(j) takes effect 60 days after enactment. The House
receded to the Senate with respect to differences in the
language of the versions of the provision in the Senate bill
and H.R. 3004.
Sec. 314. Cooperative efforts to deter money laundering.
Section 314, contained in the Senate bill, requires the
Secretary of the Treasury to issue regulations, within 120
days of the date of enactment, to encourage
[[Page S11008]]
cooperation among financial institutions, financial
regulators and law enforcement officials, and to permit the
sharing of information by law enforcement and regulatory
authorities with such institutions regarding persons
reasonably suspected, based on credible evidence, of engaging
in terrorist acts or money laundering activities. This
section also allows (with notice to the Secretary of the
Treasury) the sharing of information among banks involving
possible terrorist or money laundering activity, and requires
the Secretary of the Treasury to publish, at least
semiannually, a report containing a detailed analysis of
patterns of suspicious activity and other appropriate
investigative insights derived from suspicious activity
reports and law enforcement investigations. The final text of
this section includes section 203 (Reports to the Financial
Services Industry on Suspicious Financial Activities) and
portions of section 205 (Public-Private Task Force on
Terrorist Financing Issues) of H.R. 3004.
Sec. 315. Inclusion of foreign corruption offenses as money
laundering crimes. Section 315, included in both the Senate
bill and H.R. 3004 in somewhat different language, amends 18
U.S.C. Sec. 1956 to include foreign corruption offenses,
certain U.S. export control violations, certain customs and
firearm offenses, certain computer fraud offenses, and
felony violations of the Foreign Agents Registration Act
of 1938, to the list of crimes that constitute ``specified
unlawful activities'' for purposes of the criminal money
laundering provisions.
Sec. 316. Anti-terrorist forfeiture protection. Section
316, included in the Senate bill, establishes procedures to
protect the rights of persons whose property may be subject
to confiscation in the exercise of the government's anti-
terrorism authority.
Sec. 317. Long-arm jurisdiction over foreign money
launderers. Section 317, which was included in both the
Senate bill and H.R. 3004, amends 18 U.S.C. Sec. 1956 to give
United States courts ``long-arm'' jurisdiction over foreign
persons committing money laundering offenses in the United
States, over foreign banks opening U.S. bank accounts, and
over foreign persons who convert assets ordered forfeited by
a U.S. court. It also permits a Federal court dealing with
such foreign persons to issue a pre-trial restraining order
or take other action necessary to preserve property in the
United States to satisfy an ultimate judgment. The Senate,
but not the House, bill included language permitting the
appointment by a Federal court of a receiver to collect and
take custody of assets of a defendant to satisfy criminal or
civil money laundering or forfeiture judgments; with respect
to the latter provision, the House receded to the Senate.
Sec. 318. Laundering money through a foreign bank. Section
318, included in both the Senate bill and H.R. 3004, expands
the definition of financial institution for purposes of 18
U.S.C. Sec. Sec. 1956 and 1957 to include banks operating
outside of the United States.
Sec. 319. Forfeiture of funds in United States interbank
accounts. Section 319 combines sections 111, 112, and 113 of
H.R. 3004 with section 319 of the Senate bill. This section
amends 18 U.S.C. Sec. 981 to treat amounts deposited by
foreign banks in interbank accounts with U.S. banks as having
been deposited in the United States for purposes of the
forfeiture rules, but grants the Attorney General authority,
in the interest of justice and consistent with the United
States' national interest, to suspend a forfeiture
proceeding, based on that presumption. This section also adds
a new subsection (k) to 31 U.S.C. Sec. 5318 to require U.S.
financial institutions to reply to a request for information
from a U.S. regulator relating to anti-money laundering
compliance within 120 hours of receipt of such a request, and
to require foreign banks that maintain correspondent accounts
in the United States to appoint agents for service of process
within the United States. The new 31 U.S.C. 5318(k)
authorizes the Attorney General and the Secretary of the
Treasury to issue a summons or subpoena to any such foreign
bank seeking records, wherever located, relating to such a
correspondent account, and it requires U.S. banks to sever
correspondent arrangements with foreign banks that do not
either comply with or contest any such summons or
subpoena. Finally, section 319 amends section 413 of the
Controlled Substances Act to authorize United States
courts to order a convicted criminal to return property
located abroad and to order a civil forfeiture defendant
to return property located abroad pending trial on the
merits. With respect to the provisions requiring a
response to certain requests for information by U.S.
regulators within 120 hours of receipt and the requirement
that correspondent relationships with foreign banks that
do not either respond or challenge subpoenas issued under
new 31 U.S.C. Sec. 5318(k) must be terminated, the House
receded to the Senate. With respect to the power to order
convicted criminals to return property located abroad, the
Senate receded to the House.
Sec. 320. Proceeds of foreign crimes. Section 320, included
in both the Senate bill and H.R. 3004, amends 18 U.S.C.
Sec. 981 to permit the United States to institute forfeiture
proceedings against the proceeds of foreign criminal offenses
found in the United States.
Sec. 321. Financial institutions specified in subchapter II
of chapter 53 of Title 31, United States Code. Section 321,
included in H.R. 3004, amends 31 U.S.C. Sec. 5312(2) to add
credit unions, futures commission merchants, commodity
trading advisors, or commodity pool operators to the
definition of financial institution for purposes of the Bank
Secrecy Act, and to provide that the term ``Federal
functional regulator'' includes the Commodity Futures Trading
Commission for purposes of the Bank Secrecy Act.
Sec. 322. Corporation represented by a fugitive. Section
322, included in both the Senate bill and H.R. 3004, extends
the prohibition against the maintenance of a forfeiture
proceeding on behalf of a fugitive to include a proceeding by
a corporation whose majority shareholder is a fugitive and a
proceeding in which the corporation's claim is instituted by
a fugitive.
Sec. 323. Enforcement of foreign judgments. Section 323,
included in both the Senate bill and H.R. 3004, permits the
government to seek a restraining order to preserve the
availability of property subject to a foreign forfeiture or
confiscation judgment.
Sec. 324. Report and recommendation. Section 324, included
in the Senate bill, directs the Secretary of the Treasury, in
consultation with the Attorney General, the Federal banking
agencies, the SEC, and other appropriate agencies to evaluate
operation of the provisions of subtitle A of Title III of the
Act and recommend to Congress any relevant legislative
action, within 30 months of the date of enactment.
Sec. 325. Concentration accounts at financial institutions.
Section 325, included in both the Senate bill and H.R. 3004,
authorizes the Secretary of the Treasury to issue regulations
concerning the maintenance of concentration accounts by U.S.
depository institutions, to prevent an institution's
customers from anonymously directing funds into or through
such accounts.
Sec. 326. Verification of identification. Section 326(a),
included in H.R. 3004, adds a new subsection (l) to 31 U.S.C.
Sec. 5318 to require the Secretary of the Treasury to
prescribe by regulation, jointly with each Federal functional
regulator, minimum standards for financial institutions and
their customers regarding the identity of the customer that
shall apply in connection with the opening of an account at a
financial institution; the minimum standards shall require
financial institutions to implement, and customers (after
being given adequate notice) to comply with, reasonable
procedures concerning verification of customer identity,
maintenance of records of identity verification, and
consultation at account opening of lists of known or
suspected terrorists provided to the financial institution by
a government agency. The required regulations are to be
issued within one year of the date of enactment.
Section 326(b), included in both the Senate bill and H.R.
3004, requires the Secretary of the Treasury, again in
consultation with the Federal functional regulators (as well
as other appropriate agencies), to submit a report to
Congress within six months of the date of enactment
containing recommendations about the most effective way to
require foreign nationals to provide financial institutions
in the United States with accurate identity information,
comparable to that required to be provided by U.S. nationals,
and to obtain an identification number that would function
similarly to a U.S. national's tax identification number.
Sec. 327. Consideration of anti-money laundering record.
Section 327, included in H.R. 3004, amends section 3(c) of
the Bank Holding Company Act of 1956, and section 18(c) of
the Federal Deposit Insurance Act to require the Federal
Reserve Board and the Federal Deposit Insurance Corporation,
respectively, to consider the effectiveness of a bank holding
company or bank (within the jurisdiction of the appropriate
agency) in combating money laundering activities, including
in overseas branches, in ruling on any merger or similar
application by the bank or bank holding company. The Senate
receded to the House, with the agreement that the amendments
will apply only to applications submitted after December 31,
2001.
Sec. 328. International cooperation on identification of
originators of wire transfers. Section 328, included in H.R.
3004, requires the Secretary of the Treasury, in consultation
with the Attorney General and the Secretary of State, to take
all reasonable steps to encourage foreign governments to
require the inclusion of the name of the originator in wire
transfer instructions sent to the United States, and to
report annually to the House Committee on Financial Services
and the Senate Committee on Banking, Housing, and Urban
Affairs concerning progress toward that goal.
Sec. 329. Criminal penalties. Section 329, included in the
Senate bill, provides criminal penalties for officials who
violate their trust in connection with the administration of
Title III.
Sec. 330. International cooperation in investigations of
money laundering, financial crimes, and the finances of
terrorist groups. Section 330, included in H.R. 3004, states
the sense of the Congress that the President should direct
the Secretary of State, the Attorney General, or the
Secretary of the Treasury, as appropriate and in consultation
with the Federal Reserve Board, to seek negotiations with
foreign financial supervisory agencies and other foreign
officials, to ensure that foreign financial institutions
maintain adequate records relating to any foreign terrorist
organization or its membership, or any person engaged in
money laundering or other financial crimes, and make such
records available to U.S. law enforcement and financial
supervisory personnel when appropriate.
[[Page S11009]]
Subtitle B--Bank Secrecy Act Amendments and Related Improvements
Sec. 351. Amendments relating to reporting of suspicious
activities. Section 351, included in both the Senate bill and
H.R. 3004, restates 31 U.S.C. Sec. 5318(g)(3) to clarify the
terms of the safe harbor from civil liability for financial
institutions filing suspicious activity reports pursuant to
31 U.S.C. Sec. 5318(g). The amendments to subsection (g)(3)
also create a safe harbor from civil liability for banks that
provide information in employment references sought by other
banks pursuant to the amendment to the Federal Deposit
Insurance Act made by section 355. The House receded to the
Senate with respect to minor differences in wording between
the House and Senate versions of the provision.
Sec. 352. Anti-money laundering programs. Section 352,
included in both the Senate bill and H.R. 3004, amends 31
U.S.C. Sec. 5318(h) to require financial institutions to
establish anti-money laundering programs and grants the
Secretary of the Treasury authority to set minimum standards
for such programs. The Senate recedes to the House with
respect to a provision in H.R. 3004 that the anti-money
laundering program requirement take effect at the end of
the 180-day period beginning on the date of enactment of
the Act and a related provision that the Secretary of the
Treasury shall prescribe regulations before the end of
that 180-day period that consider the extent to which the
requirements imposed under amended Sec. 5318(h) are
commensurate with the size, location, and activities of
the financial institutions to which the regulations apply.
Sec. 353. Penalties for violations of geographic targeting
orders and certain recordkeeping requirements, and
lengthening effective period of geographic targeting orders.
Section 353, included generally in both the Senate bill and
H.R. 3004, amends 31 U.S.C. Sec. Sec. 5321, 5322, and 5324 to
clarify that penalties for violation of the Bank Secrecy Act
and its implementing regulations also apply to violations of
Geographic Targeting Orders issued under 31 U.S.C. Sec. 3526,
and to certain recordkeeping requirements relating to funds
transfers. The House receded to a provision in the Senate
bill that also amends 31 U.S.C. Sec. 5326 to make the period
of a geographic target order 180 days.
Sec. 354. Anti-money laundering strategy. Section 354,
included in the Senate bill, amends 31 U.S.C. Sec. 5341(b) to
add ``money laundering related to terrorist funding'' to the
list of subjects to be dealt with in the annual National
Money Laundering Strategy prepared by the Secretary of the
Treasury pursuant to the Money Laundering and Financial
Crimes Strategy Act of 1998.
Sec. 355. Authorization to include suspicions of illegal
activity in written employment references. Section 355,
included in both the Senate bill and H.R. 3004, amends
Sec. 18 of the Federal Deposit Insurance Act to permit (but
not require) a bank to include information, in a response to
a request for an employment reference by a second bank, about
the possible involvement of a former institution-affiliated
party in potentially unlawful activity. The House receded to
the Senate with respect to a provision that the safe harbor
from civil liability for a bank that provides information to
a second bank applies unless the first bank acts with
malicious intent.
Sec. 356. Reporting of suspicious activities by securities
brokers and dealers; investment company study. Section
356(a), included generally in both the Senate bill and H.R.
3004, directs the Secretary of the Treasury, after
consultation with the Securities and Exchange Commission and
the Federal Reserve Board, to publish proposed regulations,
on or before December 31, 2001, and final regulations on or
before July 1, 2002, requiring broker-dealers to file
suspicious activity reports. The Senate receded to the
House with respect to the specific time requirements in
section 356(a).
Sec. 356(b), included in H.R. 3004, authorizes the
Secretary of the Treasury, in consultation with the Commodity
Futures Trading Commission, to prescribe regulations
requiring futures commission merchants, commodity trading
advisors, and certain commodity pool operators to submit
suspicious activity reports under 31 U.S.C. Sec. 5318(g).
Sec. 356(c), included in the Senate bill, requires the
Secretary of the Treasury, the SEC and Federal Reserve Board
to submit jointly to Congress, within one year of the date of
enactment, recommendations for effective regulations to apply
the provisions of 31 U.S.C. Sec. Sec. 5311-30 to both
registered and unregistered investment companies, as well as
recommendations as to whether the Secretary should promulgate
regulations treating personal holding companies as financial
institutions that must disclose their beneficial owners when
opening accounts or initiating funds transfers at any
domestic financial institution.
Sec. 357. Special report on administration of bank secrecy
provisions. Section 357, included in the Senate bill, directs
the Secretary of the Treasury to submit a report to Congress,
six months after the date of enactment, on the role of the
IRS in the administration of the Bank Secrecy Act, with
emphasis on whether IRS Bank Secrecy Act information
processing responsibility (for reports filed by all financial
institutions) or Bank Secrecy Act audit and examination
responsibility (for certain non-bank financial institutions)
should be retained or transferred.
Sec. 358. Bank Secrecy provisions and activities of the
United States intelligence agencies. Section 358, included in
the same general terms in both the Senate bill and H.R. 3004,
contains amendments to various provisions of the Bank Secrecy
Act, the Right to Financial Privacy Act, and the Fair Credit
Reporting Act, to permit information to be used in the
conduct of United States intelligence or counterintelligence
activities to protect against international terrorism. This
section combines the Senate and House provisions, with each
body receding to the other in the case of particular language
included in one version of the provision but not the other.
Sec. 359. Reporting of suspicious activities by underground
banking systems. Section 359, included in both the Senate
bill and H.R. 3004, clarifies that the Bank Secrecy Act
treats certain underground banking systems as financial
institutions, and that the funds transfer recordkeeping rules
applicable to licensed money transmitters also apply to
such underground systems. This section also directs the
Secretary of the Treasury to report to Congress, within
one year of the date of enactment, on the need for
additional legislation or regulatory controls relating to
underground banking systems. The House receded to the
Senate with respect to certain technical changes in the
definition of the underground banking systems at issue.
Sec. 360. Use of authority of the United States Executive
Directors. Section 360, included in Senate bill, authorizes
the Secretary of the Treasury to instruct the United States
Executive Director of each of the international financial
institutions (for example, the IMF and the World Bank) to use
such Director's ``voice and vote'' to support loans and other
use of resources to benefit nations that the President
determines to be contributing to United States efforts to
combat international terrorism, and to require the auditing
of each international financial institution to ensure that
funds are not paid to persons engaged in or supporting
terrorism.
Sec. 361. Financial crimes enforcement network. Section
361, included in H.R. 3004, adds a new Sec. 310 to subchapter
I of chapter 3 of title 31, United States Code, to make the
Financial Crimes Enforcement Network (``FinCEN'') a bureau
within the Department of the Treasury, to specify the duties
of FinCEN's Director, and to require the Secretary of the
Treasury to establish operating procedures for the
government-wide data access service and communications center
that FinCEN maintains. Section 361 also authorizes
appropriations for FinCEN for fiscal years 2002 through 2005.
Finally, this section requires the Secretary to study methods
for improving compliance with the reporting requirements for
ownership of foreign bank and brokerage accounts by U.S.
nationals imposed by regulations issued under 31 U.S.C.
Sec. 5314. The required report is to be submitted within six
months of the date of enactment and annually thereafter.
Sec. 362. Establishment of highly secure network. Section
362, included in H.R. 3004, directs the Secretary of the
Treasury to establish, within nine months of enactment, a
secure network with FinCEN that will allow financial
institutions to file suspicious activity reports and provide
such institutions with information regarding suspicious
activities warranting special scrutiny.
Sec. 363. Increase in civil and criminal penalties for
money laundering. Section 363, included in the Senate bill,
increases from $100,000 to $1,000,000 the maximum civil and
criminal penalties for a violation of provisions added to the
Bank Secrecy Act by sections 311 and 312 of this Act.
Sec. 364. Uniform protection authority for Federal Reserve
facilities. Section 364, included in H.R. 3004, authorizes
certain Federal Reserve personnel to act as law enforcement
officers and carry firearms to protect and safeguard Federal
Reserve employees and premises.
Sec. 365. Reports relating to coins and currency received
in nonfinancial trade or business. Section 365, included in
H.R. 3004, adds 31 U.S.C. Sec. 5331 (and makes related and
conforming changes) to the Bank Secrecy Act to require any
person who receives more than $10,000 in coins or currency,
in one transaction or two or more related transactions in the
course of that person's trade or business, to file a report
with respect to such transaction with FinCEN. Regulations
implementing the new reporting requirement are to be
promulgated within six months of enactment.
Sec. 366. Efficient use of currency transaction report
system. Section 366, included in H.R. 3004, requires the
Secretary of the Treasury to report to the Congress before
the end of the one year period beginning on the date of
enactment containing the results of a study of the possible
expansion of the statutory system for exempting transactions
from the currency transaction reporting requirements and ways
to improve the use by financial institutions of the statutory
exemption system as a way of reducing the volume of unneeded
currency transaction reports.
Subtitle C--Currency Crimes
Sec. 371. Bulk cash smuggling into or out of the United
States. Section 371, included in both the Senate bill and
H.R. 3004, but with different language relating to
forfeiture, creates a new Bank Secrecy Act offense, 31 U.S.C.
Sec. 5332, involving the bulk smuggling of more than $10,000
in currency in any conveyance, article of luggage or
merchandise or
[[Page S11010]]
container, either into or out of the United States, and
related forfeiture provisions. The Senate receded to the
House language.
Sec. 372. Forfeiture in currency reporting cases. Section
372, included in the Senate bill and H.R. 3004 with different
language concerning mitigation, amends 31 U.S.C. Sec. 5317 to
permit confiscation of funds in connection with currency
reporting violations consistent with existing civil and
criminal forfeiture procedures. The Senate receded to the
House language.
Sec. 373. Illegal money transmitting businesses. Section
373, included in H.R. 3004, amends 18 U.S.C. Sec. 1960 to
clarify the terms of the offense stated in that
provision, relating to knowing operation of an unlicensed
(under state law) or unregistered (under Federal law)
money transmission business. This section also amends 18
U.S.C. Sec. 981(a) to authorize the seizure of funds
involved in a violation of 18 U.S.C. Sec. 1960.
Sec. 374. Counterfeiting domestic currency and obligations.
Section 374, included in H.R. 3004, makes a number of changes
to the provisions of 18 U.S.C. Sec. Sec. 470-473 relating to
the maximum sentences for various counterfeiting offenses,
and adds to the definition of counterfeiting in 18 U.S.C.
Sec. 474 the making, acquiring, etc. of an analog, digital,
or electronic image of any obligation or other security of
the United States.
Sec. 375. Counterfeiting Foreign Currency and Obligations.
Section 375, included in H.R. 3004, makes a number of changes
to the provisions of 18 U.S.C. Sec. Sec. 478-480 relating to
the maximum sentences for various counterfeiting offenses
involving foreign obligations or securities and adds to the
definition of counterfeiting in 18 U.S.C. Sec. 481 the
making, acquiring, etc. of an analog, digital, or electronic
image of any obligation or other security of a foreign
government.
Sec. 376. Laundering the proceeds of terrorism. This
provision expands the scope of predicate offenses for
laundering the proceeds of terrorism to include ``providing
material support or resources to terrorist organizations,''
as that crime is defined in 18 U.S.C. Sec. 2339B of the
criminal code. Same as original Administration proposal.
Sec. 377. Extraterritorial jurisdiction. This provision
applies the financial crimes prohibitions to conduct
committed abroad in situations where the tools or proceeds of
the offense pass through or are in the United States. Same as
original Administration proposal.
TITLE IV--PROTECTING THE BORDER
Subtitle A--Protecting the Northern Border
Sec. 401. Ensuring adequate personnel on the Northern
border. Both the House and Senate bills included this
provision to authorize the Attorney General to waive any cap
on the number of full time employees assigned to the INS on
the northern border. Not in original Administration proposal.
Sec. 402. Northern border personnel. Both the House and
Senate bills included this provision to authorize additional
appropriations to allow for a tripling in personnel for
the Border Patrol, INS Inspectors, and the US Customs
Service in each State along the northern border, and an
additional $50 million each to the INS and the US Customs
Service to improve technology and acquire additional
equipment for use at the northern border. Not in original
Administration proposal.
Sec. 403. Access by the Department of State and the INS to
certain identifying information in the criminal history
records of visa applicants and applicants for admission to
the United States. Both the House and Senate bills included
this provision to give the State Department and INS access to
the criminal history record information contained in the
National Crime Information Center's Interstate Identification
Index, Wanted Persons File, and any other information
mutually agreed upon between the Attorney General and the
agency receiving access. Same as original Administration
proposal.
Sec. 404. Limited authority to pay overtime. Both the House
and Senate bills included this provision to allow the
Attorney General to authorize overtime pay for INS employees
in an amount in excess of $30,000 during calendar year 2001,
to ensure that experienced personnel are available to handle
the increased workload generated by the events of September
11, 2001. Same as original Administration proposal but based
on a Leahy-Conyers proposal.
Sec. 405. Report on the integrated automated fingerprint
identification system for points of entry and overseas
consular posts. Both the House and Senate bills included this
provision to require the Attorney General to report to
Congress on the feasibility of enhancing the FBI's Integrated
Automated Fingerprint Identification System or other
identification systems to identify foreign passport and visa
holders who may be wanted in connection with a criminal
investigation in the United States or abroad before issuing a
visa to that person or their entry or exit from the United
States. Not in original Administration proposal.
Subtitle B--Enhanced Immigration Provisions
Sec. 411. Definitions relating to terrorism. Both the House
and Senate bills included this provision to amend the
definition of ``engage in terrorist activity'' to clarify
that an alien who solicits funds or membership or provides
material support to a certified terrorist organization is
inadmissible and removable. Aliens who solicit funds or
membership or provide material support to organizations not
designated as terrorist organizations have the opportunity to
show that they did not know and should not have known that
their actions would further terrorist activity. This section
also creates a definition of ``terrorist organization,''
which is not defined under current law, for purposes of
making an alien inadmissible or removable. It defines a
terrorist organization as one that is (1) designated by
the Secretary of State as a terrorist organization under
the process supplied by current law; (2) designated by the
Secretary of State as a terrorist organization for
immigration purposes; or (3) a group of two or more
individuals that commits terrorist activities or plans or
prepares to commit (including locating targets for)
terrorist activities. The changes made by this section
will apply to actions taken by an alien before enactment
with respect to any group that was at that time certified
by the Secretary of State. Narrower than original
Administration proposal by allowing an alien to show
support for non-designated organization was offered
without knowledge of organization's terrorist activity.
Sec. 412. Mandatory detention of suspected terrorists;
habeas corpus; judicial review. Both the House- and Senate-
passed bills included provisions to grant the Attorney
General the authority to certify that an alien meets the
criteria of the terrorism grounds of the Immigration and
Nationality Act, or is engaged in any other activity that
endangers the national security of the United States, upon a
``reasonable grounds to believe'' standard, and take such
aliens into custody. This authority is delegable only to the
Deputy Attorney General. The Attorney General must either
begin removal proceedings against such aliens or bring
criminal charges within seven days, or release them from
custody. An alien who is charged but ultimately found not to
be removable is to be released from custody. An alien who is
found to be removable but has not been removed, and whose
removal is unlikely in the reasonably foreseeable future, may
be detained if the Attorney General demonstrates that release
of the alien will adversely affect national security or the
safety of the community or any person. Judicial review of any
action taken under this section, including review of the
merits of the certification, is available through habeas
corpus proceedings, with appeal to the U.S. Court of Appeals
for the D.C. Circuit. The Attorney General shall review his
certification of an alien every six months. Narrower than
original Administration proposal in numerous ways, including
placing a 7-day limit on detention without charge, ordering
release of aliens found not to be removable, and more
meaningful judicial review of Attorney General's
determination of national security risk posed by alien.
Sec. 413. Multilateral cooperation against terrorists. Both
the House and Senate bills included this provision to provide
new exceptions to the laws regarding disclosure of
information from State Department records pertaining to the
issuance of or refusal to issue visas to enter the U.S., and
allows the sharing of this information with a
foreign government on a case-by-case basis for the purpose
of preventing, investigating, or punishing acts of
terrorism. Based on original Administration proposal.
Sec. 414. Visa integrity and security. This section
expresses the sense of the Congress that the Attorney
General, in consultation with the Secretary of State, should
fully implement the entry/exit system as expeditiously as
practicable. Particular focus should be given to the
utilization of biometric technology and the development of
tamper-resistant documents. Not in original Administration
proposal.
Sec. 415. Participation of Office of Homeland Security on
Entry-Exit Task Force. This section includes the new Office
of Homeland Security as a participant in the Entry and Exit
Task Force established by the Immigration and Naturalization
Service Data Management Improvement Act of 2000. Not in
original Administration proposal.
Sec. 416. Foreign student monitoring program. This section
seeks to implement the foreign student monitoring program
created in 1996 by temporarily supplanting the collection of
user fees mandated by the statute with an appropriation of
$36,800,000 for the express purpose of fully and effectively
implementing the program through January 2003. Thereafter,
the program would be funded by user fees. Currently, all
institutions of higher education that enroll foreign students
or exchange visitors are required to participate in the
monitoring program. This section expands the list of
institutions to include air flight schools, language training
schools, and vocational schools. Not in original
Administration proposal.
Sec. 417. Machine readable passports. This section requires
the Secretary of State to conduct an annual audit to assess
precautionary measures taken to prevent the counterfeiting
and theft of passports among countries that participate in
the visa waiver program, and ascertain that designated
countries have established a program to develop tamper-
resistant passports. Results of the audit will be reported to
Congress. This provision would advance the deadline for
participating nations to develop machine readable passports
to October 1, 2003, but permit the Secretary of State to
waive the requirements imposed by the deadline if he finds
that the program country is making sufficient progress to
provide their nationals with machine-readable passports. Not
in original Administration proposal.
[[Page S11011]]
Sec. 418. Prevention of consulate shopping. This section
directs the State Department to examine what concerns, if
any, are created by the practice of certain aliens to
``shop'' for a visa between issuing posts. Not in original
Administration proposal.
Subtitle C--Preservation of Immigration Benefits for Victims of
Terrorism
[Note: This subtitle was not in original Administration
proposal. It is certain that some aliens fell victim to the
terrorist attacks on the U.S. on September 11. For many
families, these tragedies will be compounded by the trauma of
husbands, wives, and children losing their immigration status
due to the death or serious injury of a family member. These
family members are facing deportation because they are out of
status: they no longer qualify for their current immigration
status or are no longer eligible to complete the application
process because their loved one was killed or injured in the
September 11 terrorist attack. Others are threatened with the
loss of their immigration status, through no fault of their
own, due to the disruption of communication and
transportation that has resulted directly from the terrorist
attacks. Because of these disruptions, people have been and
will be unable to meet important deadlines, which will mean
the loss of eligibility for certain benefits and the
inability to maintain lawful status, unless the law is
changed.
At the request of Congressman Conyers and Senator Leahy,
this new subtitle (sections 421-428) was included in the
final bill to modify the immigration laws to provide the
humanitarian relief to these victims and their family members
in preserving their immigration status.]
Sec. 421. Special immigrant status. This section provides
permanent resident status to an alien who was the beneficiary
of a petition filed (on or before September 11) to grant the
alien permanent residence as a family-sponsored immigrant or
employer-sponsored immigrant, or of an application for labor
certification (filed on or before September 11), if the
petition or application was rendered null because of the
disability of the beneficiary or loss of employment of the
beneficiary due to physical damage to, or destruction of, the
business of the petitioner or applicant as a direct result of
the terrorist attacks on September 11, or because of the
death of the petitioner or applicant as a direct result of
the terrorist attacks. Permanent residence would be granted
to an alien who was the spouse or child of an alien who was
the beneficiary of a petition filed on or before September 11
to grant the beneficiary permanent residence as a family-
sponsored immigrant (as long as the spouse or child follows
to join not later than September 11, 2003). Permanent
residence would be granted to the beneficiary of a petition
for a nonimmigrant visa as the spouse or the fiance (and
their children) of a U.S. citizen where the petitioning
citizen died as a direct result of the terrorist attack. This
section also provides permanent resident status to the
grandparents of a child both of whose parents died as a
result of the terrorist attacks, if either of such
deceased parents was a U.S. citizen or a permanent
resident. Not in original Administration proposal.
Sec. 422. Extension of filing or reentry deadlines. This
section provides that an alien who was legally in a
nonimmigrant status and was disabled as a direct result of
the terrorist attacks on September 11 (and his or her spouse
and children) may remain lawfully in the United States (and
receive work authorization) until the later of the date that
his or her status normally terminates or September 11, 2002.
Such status is also provided to the nonimmigrant spouse and
children of an alien who died as a direct result of the
terrorist attacks. The Act provides that an alien who was
lawfully present as a nonimmigrant at the time of the
terrorist attacks will be granted 60 additional days to file
an application for extension or change of status if the alien
was prevented from so filing as a direct result of the
terrorist attacks. Also, an alien who was lawfully present as
a nonimmigrant at the time of the attacks but was then unable
to timely depart the United States as a direct result of the
attacks will be considered to have departed legally and will
not be considered to have been unlawfully present for the
purposes of section 212(a)(9) of the INA if departure occurs
before November 11. Not in original Administration proposal.
Sec. 423. Humanitarian relief for certain surviving spouses
and children. Current law provides that an alien who was the
spouse of a U.S. citizen for at least 2 years before the
citizen died shall remain eligible for immigrant status as an
immediate relative. This also applies to the children of the
alien. This section provides that if the citizen died as a
direct result of the terrorist attacks, the 2-year
requirement is waived. This section provides that if an alien
spouse, child, or unmarried adult son or daughter had been
the beneficiary of an immigrant visa petition filed by a
permanent resident who died as a direct result of the
terrorist attacks, the alien will still be eligible for
permanent residence. In addition, if an alien spouse, child,
or unmarried adult son or daughter of a permanent resident
who died as a direct result of the terrorist attacks was
present in the United States on September 11 but had not yet
been petitioned for permanent residence, the alien can self-
petition for permanent residence. The section also provides
that an alien spouse or child of an alien who (1) died as a
direct result of the terrorist attacks and (2) was a
permanent resident (petitioned-for by an employer) or an
applicant for adjustment of status for an employment-based
immigrant visa, may have his or her application for
adjustment adjudicated despite the death (if the application
was filed prior to the death). Not in original Administration
proposal.
Sec. 424. ``Age-out'' protection for children. Under
current law, certain visas are only available to an alien
until the alien's 21st birthday. This section provides that
an alien whose 21st birthday occurs this September and who is
a beneficiary for a petition or application filed on or
before September 11 shall be considered to remain a child for
90 days after the alien's 21st birthday. For an alien whose
21st birthday occurs after this September, (and who had a
petition for application filed on his or her behalf on or
before September 11) the alien shall be considered to remain
a child for 45 days after the alien's 21st birthday. Not in
original Administration proposal.
Sec. 425. Temporary administrative relief. This section
provides that temporary administrative relief may be provided
to an alien who was lawfully present on September 10, was on
that date the spouse, parent or child of someone who died or
was disabled as a direct result of the terrorist attacks, and
is not otherwise entitled to relief under any other provision
of this legislation. Not in original Administration proposal.
Sec. 426. Evidence of death, disability, or loss of
employment. This section instructs the Attorney General to
establish appropriate standards for evidence demonstrating
that a death, disability, or loss of employment due to
physical damage to, or destruction of, a business, occurred
as a direct result of the terrorist attacks on September 11.
The Attorney General is not required to promulgate
regulations prior to implementing this subtitle. Not in
original Administration proposal.
Sec. 427. No Benefits to Terrorists or Family Members of
Terrorists. This section states that no benefit under this
subtitle shall be provided to anyone culpable for the
terrorist attacks on September 11 or to any family member of
such an individual. Not in original Administration proposal.
Sec. 428. Definitions. This section defines the term
`specified terrorist activity' as any terrorist activity
conducted against the Government or the people of the United
States on September 11, 2001. Not in original Administration
proposal.
TITLE V--REMOVING OBSTACLES TO INVESTIGATING TERRORISM
Sec. 501. Attorney General's authority to pay rewards to
combat terrorism. Both the House and Senate bills included
this provision to authorize the Attorney General to offer
rewards--payments to individuals who offer information
pursuant to a public advertisement--to gather information to
combat terrorism and defend the nation against terrorist acts
without any dollar limitation (Current law limits rewards to
$2 million). Rewards of $250,000 or more require the personal
approval of the Attorney General or President and notice
to Congress. Narrower than original Administration
proposal.
Sec. 502. Secretary of State's authority to pay rewards.
Both the House and Senate bills included this provision to
authorize the Secretary of State to offer rewards--payments
to individuals who offer information pursuant to a public
advertisement--to gather information to combat terrorism and
defend the nation against terrorist acts without any dollar
limitation (Current law limits rewards to $5 million).
Rewards of $100,000 or more require the personal approval of
the Secretary of State and notice to Congress. Narrower than
original Administration proposal.
Sec. 503. DNA identification of terrorists and other
violent offenders. Both the House and Senate bills included
this provision to authorize the collection of DNA samples
from any person convicted of certain terrorism-related
offenses and other crimes of violence, for inclusion in the
national DNA database. Modified from original Administration
proposal.
Sec. 504. Coordination with law enforcement. Both the House
and Senate bills included this provision to amend FISA to
authorize consultation between FISA officers and law
enforcement officers to coordinate efforts to investigate or
protect against international terrorism, clandestine
intelligence activities, or other grave hostile acts of a
foreign power or an agent of a foreign power. Not in original
Administration proposal.
Sec. 505. Miscellaneous national security authorities. Both
the House and Senate bills included this provision to modify
current statutory provisions on access to telephone, bank,
and credit records in counterintelligence investigations to
remove the ``agent of a foreign power'' standard. The
authority may be used only for investigations to protect
against international terrorism or clandestine intelligence
activities, and an investigation of a United States person
may not be based solely on activities protected by the First
Amendment. Narrower than original Administration proposal
which simply removed ``agent of foreign power'' requirement.
Sec. 506. Extension of Secret Service jurisdiction. Both
the House and Senate bills included this provision to give
the Secret Service concurrent jurisdiction to investigate
offenses relating to fraud and related activity in connection
with computers, and permanently extends its current authority
to investigate financial institution fraud. Not in original
Administration proposal.
[[Page S11012]]
Sec. 507. Disclosure of educational records. Both the House
and Senate bills included this provision to require
application to a court to obtain educational records in the
possession of an educational agency or institution if it is
determined by the Attorney General or Secretary of Education
(or their designee) that doing so could reasonably be
expected to assist in investigating or preventing a federal
terrorism offense or domestic or international terrorism.
Limited immunity is given to persons producing such
information acting in good faith, and the Attorney General is
directed to issue guidelines to protect confidentiality.
Narrower than original Administration proposal.
Sec. 508. Disclosure of information from NCES surveys. Both
the House and Senate bills included this provision to require
application to a court to obtain reports, records and
information in the possession of the National Center for
Educational Statistics that are relevant to an authorized
investigation or prosecution of terrorism. Limited immunity
is given to persons producing such information acting in good
faith, and the Attorney General is directed to issue
guidelines to protect confidentiality. Narrower than original
Administration proposal.
TITLE VI--PROVIDING FOR VICTIMS OF TERRORISM, PUBLIC SAFETY OFFICERS,
AND THEIR FAMILIES
Subtitle A--Aid for Families of Public Safety Officers
Sec. 611. Expedited payment for public safety officers
involved in the prevention, investigation, rescue, or
recovery efforts related to a terrorist attack. Both the
House and Senate bills included this provision to streamline
the Public Safety Officers Benefits Program application
process for family members of law enforcement officers,
firefighters, and emergency personnel who perished or
suffered serious injury in connection with prevention,
investigation, rescue or recovery efforts related to a
terrorist attack. The Public Safety Officers Benefits Program
provides benefits for each of the families of law enforcement
officers, fire fighters, emergency response squad members,
ambulance crew members who are killed or permanently and
totally disabled in the line of duty ($151,635 in FY 2001).
Current regulations, however, require the families of public
safety officers who have fallen in the line of duty to go
through a cumbersome and time-consuming application process.
Not in original Administration proposal.
Sec. 612. Technical correction with respect to expedited
payments for heroic public safety officers. Both the House
and Senate bills included this provision to make technical
corrections to Public Law 107-37 to provide sufficient
information to make expedited Public Safety Officers Benefits
Program payments to the fallen firefighters, emergency
personnel and law enforcement officers who perished or
were disabled during the rescue and recovery efforts
related to the terrorist attacks of September 11, 2001.
Modified from original Administration proposal.
Sec. 613. Public safety officers benefits program payment
increase. Both the House and Senate-passed bills included
this provision to raise the total amount of Public Safety
Officers Benefits Program payment to $250,000 and is
effective for any death or disability occurring on or after
January 1, 2001. Not in original Administration proposal.
Sec. 614. Office of Justice programs. Both the House and
Senate bills included this provision to amend the Office of
Justice Program's authorities to enhance the authority of the
Assistant Attorney General to coordinate and manage emergency
response activities of its various components including the
Public Safety Officers Benefits Program. Modified from
original Administration proposal.
Subtitle B--Amendments to the Victims of Crime Act of 1984
[Note: The original Administration proposal did not include
most of the provisions of this subtitle to streamline the
administration of the Crime Victims Fund.]
Sec. 621. Crime victims fund. Both the House and Senate
bills included this provision to authorize the Office for
Victims of Crime (OVC) to replenish the antiterrorism
emergency reserve with up to $50 million and establishes a
mechanism to allow for replenishment in future years. Funds
added to the Crime Victims Fund to respond to the September
11 attacks shall not be subject to the cap or the new formula
provisions. A technical clarification includes the September
11th Victim Compensation Fund established in Public Law 107-
42 as one of the Federal benefits that should be a primary
payer to the States. This section also replaces the annual
cap on the Fund with a self-regulating system that ensures
stability in the amounts distributed while preserving the
amounts remaining for use in future years; it authorizes
private gift-giving to the Fund; and it increases the portion
of the Fund available for discretionary grants and assistance
to victims of Federal crime. Significant expansion of
original Administration proposal.
Sec. 622. Crime victim compensation. Both the House and
Senate bills included this provision to increase the minimum
threshold for the annual grant to State compensation
programs. It clarifies that a payment of compensation to a
victim shall not used in means tests for Federal benefit
programs. A technical clarification removes the dual
requirement that State crime victim compensation programs
cover victims of terrorism occurring outside the United
States. Not in original Administration proposal.
Sec. 623. Crime victim assistance. Both the House and
Senate bills included this provision to authorize States to
give VOCA funds to U.S. Attorney's Offices in jurisdictions
where the U.S. Attorney is the local prosecutor. It prohibits
victim assistance programs from discriminating against
certain victims; authorizes grants to eligible victim
assistance programs for program evaluation and compliance
efforts; and allows use of funds for fellowships, clinical
internships and training programs. Not in original
Administration proposal.
Sec. 624. Victims of terrorism. Both the House and Senate
bills included this provision to conform VOCA's domestic
terrorism section to the international terrorism section,
giving OVC the flexibility to deliver timely and critically-
needed assistance to victims of terrorism and mass violence
occurring within the United States. It also makes a technical
correction to recent legislation that inadvertently reversed
the existing exclusion under VOCA of individuals eligible for
other Federal compensation under the Omnibus Diplomatic
Security and Antiterrorism Act of 1986. Expansion of original
Administration proposal.
TITLE VII--INCREASED INFORMATION SHARING FOR CRITICAL INFRASTRUCTURE
PROTECTION
[Note: The original Administration proposal did not include
this subtitle to expand regional information sharing to
facilitate Federal-state-local law enforcement responses to
terrorism.]
Sec. 701. Expansion of regional information sharing system
to facilitate Federal-State-local law enforcement response
related to terrorist attacks. Both the House and Senate bills
included this provision to expand the Department of Justice
Regional Information Sharing Systems (RISS) Program to
facilitate information sharing among Federal, State and local
law enforcement agencies to investigate and prosecute
terrorist conspiracies and activities and doubles its
authorized funding for FY2002 and FY2003. Currently, 5,700
Federal, State and local law enforcement agencies participate
in the RISS Program. Not in original Administration proposal.
TITLE VIII--STRENGTHENING THE CRIMINAL LAWS AGAINST TERRORISM
Sec. 801. Terrorist attacks and other acts of violence
against mass transportation systems. Both the House and
Senate bills included this provision to create a new statute
(to be codified at 18 U.S.C. Sec. 1993) to make punishable
acts of terrorism and other violence against mass
transportation vehicles, systems, facilities, employees and
passengers; the reporting of false information about such
activities; and attempts and conspiracies to commit such
offenses. Violations are punishable by a fine and term
imprisonment of 20 years; however, the mass transportation
vehicle was carrying a passenger at the time of the attack,
or if death resulted from the offense, the maximum term of
imprisonment is increased to life. Not in original
Administration proposal.
Sec. 802. Definition of domestic terrorism. Both the House
and Senate bills included this provision to define the term
``domestic terrorism'' as a counterpart to the current
definition of ``international terrorism'' in 18 U.S.C.
Sec. 2331. The new definition for ``domestic terrorism'' is
for the limited purpose of providing investigative
authorities (i.e., court orders, warrants, etc.) for acts of
terrorism within the territorial jurisdiction of the United
States. Such offenses are those that are ``(1) dangerous to
human life and violate the criminal laws of the United States
or any state; and (2) appear to be intended (or have the
effect)--to intimidate a civilian population; influence
government policy intimidation or coercion; or affect
government conduct by mass destruction, assassination, or
kidnapping (or a threat of).'' Same as Administration
proposal.
Sec. 803. Prohibition against harboring terrorists. Both
the House and Senate bills included this provision to
establish a new criminal prohibition against harboring
terrorists, similar to the current prohibition in 18 U.S.C.
Sec. 792 against harboring spies, and makes it an offense
when someone harbors or conceals another they know or should
have known had engaged in or was about to engage in federal
terrorism offenses. Narrower than Administration's proposal
except that the final bill removes the Administration's
original proposal to make it an offense to harbor someone
merely suspected of engaging in terrorism.
Sec. 804. Jurisdiction over crimes committed at U.S.
facilities abroad. Both the House and Senate bills included
this provision to extend the special maritime and territorial
jurisdiction of the United States to cover, with respect to
offenses committed by or against a U.S. national, U.S.
diplomatic, consular and military missions, and residences
used by U.S. personnel assigned to such missions. Based on
original Administration proposal.
Sec. 805. Material support for terrorism. Both the House
and Senate bills included this provision to amend 18 U.S.C.
Sec. 2339A, which prohibits providing material support to
terrorists, in four respects. First, it adds three terrorism-
related offenses to the list of Sec. 2339A predicates.
Second, it provides that Sec. 2339A violations may be
prosecuted in any Federal judicial district in which the
predicate offense was committed. Third, it clarifies that
monetary instruments, like currency and other financial
securities, may constitute ``material support or resources''
[[Page S11013]]
for purpose of Sec. 2339A. Fourth, it explicitly prohibits
providing terrorists with ``expert advice or assistance,''
such as flight training, knowing or intending that it will be
used to prepare for or carry out an act of terrorism. Same as
original Administration proposal.
Sec. 806. Assets of terrorists organizations. Both the
House and Senate bills included this provision to provide
that the assets of individuals and organizations engaged in
planning or perpetrating acts of terrorism against the United
States, as well as the proceeds and instrumentalities of such
acts, are subject to civil forfeiture. Same as original
Administration proposal.
Sec. 807. Technical clarification relating to provision of
material support to terrorism. Both the House and Senate
bills included this provision to clarify that the provisions
of the Trade Sanctions Reform and Export Enhancement Act of
2000 (title IX of Public Law 106-387) do not limit or
otherwise affect the criminal prohibitions against providing
material support to terrorists or designated terrorist
organizations, 18 U.S.C. Sec. Sec. 2339A & 2339B. Same as
original Administration proposal.
Sec. 808. Definition of Federal crime of terrorism. Both
the House and Senate bills included this provision to update
the list of predicate offenses under the current definition
of ``Federal crime of terrorism,'' 18 U.S.C.
Sec. 2332b(g)(5). Narrower than original Administration
proposal.
Sec. 809. No statute of limitation for certain terrorism
offenses. Both the House and Senate bills included this
provision to eliminate the statute of limitations for certain
terrorism-related offenses, if the commission of such offense
resulted in, or created a foreseeable risk of, death or
serious bodily injury to another person. Narrower than
original Administration proposal.
Sec. 810. Alternative maximum penalties for terrorism
offenses. Both the House and Senate bills included this
provision to raise the maximum prison terms to 15 or 20 years
or, if death results, life, in the following criminal
statutes: 18 U.S.C. Sec. 81 (arson within the special
maritime and territorial jurisdiction of the United
States); 18 U.S.C. Sec. 1366 (destruction of an energy
facility); 18 U.S.C. Sec. 2155(a) (destruction of
national-defense materials); 18 U.S.C. Sec. Sec. 2339A &
2339B (provision of material support to terrorists and
terrorist organizations); 42 U.S.C. Sec. 2284 (sabotage of
nuclear facilities or fuel); 19 U.S.C. Sec. 46505(c)
(killings on aircraft); 49 U.S.C. Sec. 60123(b)
(destruction of interstate gas or hazardous liquid
pipeline facility). Narrower than original Administration
proposal.
Sec. 811. Penalties for terrorist conspiracies. Both the
House and Senate-passed bills included this provision to
ensure adequate penalties for certain terrorism-related
conspiracies by adding conspiracy provisions to the following
criminal statutes: 18 U.S.C. Sec. 81 (arson within the
special maritime and territorial jurisdiction of the United
States); 18 U.S.C. Sec. 930(c) (killings in Federal
facilities); 18 U.S.C. Sec. 1362 (destruction of
communications lines, stations, or systems); 18 U.S.C.
Sec. 1363 (destruction of property within the special
maritime and territorial jurisdiction of the United States);
18 U.S.C. Sec. 1992 (wrecking trains); 18 U.S.C. Sec. 2339A
(material support to terrorists); 18 U.S.C. Sec. 2340A
(torture); 42 U.S.C. Sec. 2284 (sabotage of nuclear
facilities or fuel); 49 U.S.C. Sec. 46504 (interference with
flight crews); 49 U.S.C. Sec. 46505 (carrying weapons or
explosives on aircraft); 49 U.S.C. Sec. 60123 (destruction of
interstate gas or hazardous liquid pipeline facility).
Narrower than original Administration proposal.
Sec. 812. Post-release supervision of terrorists. Both the
House and Senate bills included this provision to authorize
extended period of supervised release for certain terrorism-
related offenses that resulted in, or created a foreseeable
risk of, death or serious bodily injury to another person.
Narrower than original Administration proposal.
Sec. 813. Inclusion of acts of terrorism as racketeering
activity. Both the House and Senate bills included this
provision to amend the RICO statute to include certain
terrorism-related offenses within the definition of
``racketeering activity,'' thus allowing multiple acts of
terrorism to be charged as a pattern of racketeering for RICO
purposes. This section expands the ability of prosecutors to
prosecute members of established, ongoing terrorist
organizations that present the threat of continuity that the
RICO statute was designed to permit prosecutors to combat.
Narrower than original Administration proposal.
Sec. 814. Deterrence and prevention of cyberterrorism. Both
the House and Senate bills included this provision to clarify
the criminal statute prohibiting computer hacking, 18 U.S.C.
Sec. 1030, to cover computers located outside the United
States when used in a manner that affects the interstate
commerce or communications of this country, update the
definition of ``loss'' to ensure full costs to victims of
hacking offenses are counted, clarify the scope of civil
liability and eliminate the current mandatory minimum
sentence applicable in some cases. Not in original
Administration proposal.
Sec. 815. Additional defense to civil actions relating to
preserving records in response to Government requests. Both
the House and Senate bills included this provision to provide
an additional defense under 18 U.S.C. Sec. 2707(e)(1) to
civil actions relating to preserving records in response to
Government requests. Not in original Administration proposal.
Sec. 816. Development and support of cybersecurity forensic
capabilities. Both the House and Senate bills included this
provision to require the Attorney General to establish
regional computer forensic laboratories and to support
existing computer forensic laboratories to help combat
computer crime. Not in original Administration proposal.
Sec. 817. Expansion of the biological weapons statute. The
Senate-passed bill included this provision to amend the
definition of ``for use as a weapon'' in the current
biological weapons statute, 18 U.S.C. Sec. 175, to include
all situations in which it can be proven that the defendant
had any purpose other than a prophylactic, protective, or
peaceful purpose. This section also creates a new criminal
statute, 18 U.S.C. Sec. 175b, which generally makes it an
offense for certain restricted persons, including non-
resident foreign nationals of countries that support
international terrorism, to possess a listed biological agent
or toxin. Finally, this section provides that the Department
of Health and Human Services enhance its role in bioterrorism
prevention by establishing and enforcing standards and
procedures governing the possession, use, and transfer of
certain biological agents that have a high national security
risk, including safeguards to prevent access to such agents
for use in domestic or international terrorism. Modified from
original Administration proposal, which did not require the
government to establish the mens rea of the defendant to
prove the crime of possession of the biological weapon.
TITLE IX--IMPROVED INTELLIGENCE
Sec. 901. Responsibilities of Director of Central
Intelligence regarding foreign intelligence collected under
the Foreign Intelligence Surveillance Act of 1978. Both the
House and Senate bills included this provision to clarify the
role of the Director of Central Intelligence (``DCI'') with
respect to the overall management of collection
goals, analysis and dissemination of foreign intelligence
gathered pursuant to the Foreign Intelligence Surveillance
Act, in order to ensure that FISA is properly and
efficiently used for foreign intelligence purposes. It
requires the DCI to assist the Attorney General in
ensuring that FISA efforts are consistent with
constitutional and statutory civil liberties. The DCI will
have no operational authority with respect to
implementation of FISA, which will continue to reside with
the FBI. Not in original Administration proposal.
Sec. 902. Inclusion of international terrorism activities
within scope of foreign intelligence under National Security
Act of 1947. Both the House and Senate bills included this
provision to revise the National Security Act definitions
section to include ``international terrorism'' as a subset of
``foreign intelligence.'' This change will clarify the DCI's
responsibility for collecting foreign intelligence related to
international terrorism. Not in original Administration
proposal.
Sec. 903. Sense of Congress on the establishment and
maintenance of intelligence relationships to acquire
information on terrorists and terrorist organizations. Both
the House and Senate bills included this provision to express
the Sense of Congress that the CIA should make efforts to
recruit informants to fight terrorism. Not in original
Administration proposal.
Sec. 904. Temporary authority to defer submittal to
Congress of reports on intelligence and intelligence-related
matters. Both the House and Senate bills included this
provision to allow the Secretary of Defense, the Attorney
General and the DCI to defer the submittal of certain reports
to Congress until February 1, 2002. Not in original
Administration proposal.
Sec. 905. Disclosure to Director of Central Intelligence of
foreign intelligence-related information with respect to
criminal investigations. Both the House and Senate bills
included this provision to create a responsibility for law
enforcement agencies to notify the Intelligence Community
when a criminal investigation reveals information of
intelligence value. Regularizes existing ad hoc notification,
and makes clear that constitutional and statutory
prohibitions of certain types of information sharing apply.
Not in original Administration proposal.
Sec. 906. Foreign Terrorist Asset Tracking Center. Both the
House and Senate bills included this provision to regularize
the existing Foreign Terrorist Asset Tracking Center by
creating an element within the Department of Treasury
designed to review all-source intelligence in support of both
intelligence and law enforcement efforts to counter
terrorist financial support networks. Not in original
Administration proposal.
Sec. 907. National Virtual Translation Center. Both the
House and Senate bills included this provision to direct the
submission of a report on the feasibility of establishing a
virtual translation capability, making use of cutting-edge
communications technology to link securely translation
capabilities on a nationwide basis. Not in original
Administration proposal.
Sec. 908. Training of government officials regarding
identification and use of foreign intelligence. Both the
House and Senate bills included this provision to direct the
Attorney General, in consultation with the DCI, to establish
a training program for Federal, State and local officials on
the recognition and appropriate handling of intelligence
information discovered in the normal course of their duties.
Not in original Administration proposal.
[[Page S11014]]
TITLE X--MISCELLANEOUS
Sec. 1001. Review of the Department of Justice. This
provision authorizes the Inspector General of the Department
of Justice to designate one official to review information
and receive complaints alleging abuses of civil rights and
civil liberties by employees and officials of the Department
of Justice. Not in original Administration proposal.
Sec. 1002. Sense of Congress. This provision condemns
discrimination and acts of violence against Sikh-Americans.
Not in original Administration proposal.
Sec. 1003. Definition of ``electronic surveillance.'' This
provision authorizes the use of the new computer trespass
authority under FISA. Not in original Administration
proposal.
Sec. 1004. Venue in money laundering cases. This provision
clarifies the judicial districts in which money laundering
prosecutions under 18 U.S.C. Sec. Sec. 1956 and 1957 may be
brought. Not in original Administration proposal.
Sec. 1005. First responders assistance act. This provision
authorizes grants to State and local authorities to respond
to and prevent acts of terrorism. Not in original
Administration proposal.
Sec. 1006. Inadmissibility of aliens engaged in money
laundering. This provision makes inadmissible to the United
States any alien who a consular officer or the Attorney
General knows, or has reason to believe, is involved in a
Federal money laundering offense. Not in original
Administration proposal.
Sec. 1007. Authorization of funds for DEA police training
in South and Central Asia. This provision authorizes money
for anti-drug training in the Republic of Turkey, and for
increased precursor chemical control efforts in the South and
Central Asia region. Not in original Administration proposal.
Sec. 1008. Feasibility study on use of biometric identifier
scanning system with access to the FBI Integrated automated
fingerprint identification system at overseas consular posts
and points of entry to the United States. This provision
directs the Attorney General to report to Congress on the
feasibility of using a biometric identifier (fingerprint)
scanning system, with access to the FBI fingerprint database,
at consular offices abroad and at points of entry into the
United States. Not in original Administration proposal.
Sec. 1009. Study of access. This provision directs the FBI
to report to Congress on the feasibility of providing
airlines with computer access to the names of suspected
terrorists. Not in original Administration proposal.
Sec. 1010. Temporary authority to contract with local and
State governments for performance of security functions at
United States military installations. This provision provides
temporary authority for the Department of Defense to enter
contracts for the performance of security functions at any
military installation of facility in the United States with a
proximately located local or State government. Not in
original Administration proposal.
Sec. 1011. Crimes against charitable Americans. This
provision amends the Telemarketing and Consumer Fraud and
Abuse Prevention Act to require any person engaged in
telemarketing for the solicitation of charitable
contributions to disclose to the person receiving the call
that the purpose of the call is to solicit charitable
contributions, and to make such other disclosures as the FTC
considers appropriate. Not in original Administration
proposal.
Sec. 1012. Limitation on issuance of hazmat licenses. This
provision allows the Department of Transportation to obtain
background records checks for any individual applying for a
license to transport hazardous materials in interstate
commerce. Not in original Administration proposal.
Sec. 1013. Expressing the sense of the Senate concerning
the provision of funding for bioterrorism preparedness and
response. This provision expresses the sense of the Senate
that the United States should make a substantial new
investment this year toward improving State and local
preparedness to respond to potential bioterrorism attacks.
Not in original Administration proposal.
Sec. 1014. Grant program for State and local domestic
preparedness support. This provision authorizes an
appropriated Department of Justice program to provide grants
to States to prepare for and respond to terrorist acts
including but not limited to events of terrorism involving
weapons of mass destruction and biological, nuclear,
radiological, incendiary, chemical, and explosive devices.
The authorization revises this grant program to provide: (1)
additional flexibility to purchase needed equipment; (2)
training and technical assistance to State and local first
responders; and (3) a more equitable allocation of funds to
all States. Not in original Administration proposal.
Sec. 1015. Expansion and reauthorization of the Crime
Identification Technology Act for antiterrorism grants to
States and localities. This provision adds an additional
antiterrorism purpose for grants under the Crime
Identification Technology Act, and authorizes grants under
that Act through fiscal year 2007. Not in original
Administration proposal.
Sec. 1016. Critical infrastructures protection. This
provision establishes a National Infrastructure Simulation
and Analysis Center (NISAC) to address critical
infrastructure protection and continuity through support for
activities related to counterterrorism, threat assessment,
and risk mitigation. Not in original Administration proposal.
Mr. LEAHY. After that terrible day of September 11, we began looking
at our laws, and what we might do. Unfortunately, at first, rhetoric
overcame reality. We had a proposal sent up, and we were asked to pass
it within a day or so. Fortunately for the country, and actually
ironically beneficial to both the President and the Attorney General
who asked for such legislation, we took time to look at it, we took
time to read it, and we took time to remove those parts that were
unconstitutional and those parts that would have actually hurt
liberties of all Americans.
I say that because I think of what Benjamin Franklin was quoted as
saying at a time when he literally had his neck on the line, where he
would have been hanged if our revolution had failed. He said: A people
who would give up their liberty for security deserve neither.
What we have tried to do in this legislation is to balance the
liberties we enjoy as Americans and those liberties that have made us
the greatest democracy in history but at the same time to enhance our
security so we can maintain that democracy and maintain the leadership
we have given the rest of the world.
We completed our work 6 weeks after the September 11 attacks. I
compare this to what happened after the bombing of the Federal Building
in Oklahoma City in 1995. It took a year to complete the legislation
after that. We have done this in 6 weeks. But there has been a lot of
cooperation. There have been a lot of Senators and a lot of House
Members in both parties and dedicated staff who have worked around the
clock.
I think of my own staff--and this could be said of many others,
including the Presiding Officer's staff and the ranking member's
staff--who were forced out of their offices because of the recent
scares on Capitol Hill, and they continue to work literally in phone
booths and in hallways and from their homes and off laptops and cell
phones.
I made a joke in my own hide-away office. To those who have ever
watched ``The X-Files,'' there is a group called ``the lone gunmen,''
who are sort of these computer nerds who meet in a small house trailer.
I am seeing some puzzled looks around the Senate as I say this. But
they have all these wires hanging from the ceiling and laptops and all,
and they do great things. That is the way our office looked. But they
were working around the clock on this legislation to get something
better. There was some unfortunate rhetoric along the way, but again,
the reality overcame it. We have a good piece of legislation.
As we look back to when we began discussions with the administration
about this bill, there were sound and legitimate concerns on both sides
of the Capitol, both sides of the aisle, about the legislation's
implication for America's rights and freedoms. There was also a sincere
and committed belief that we needed to find a way to give law
enforcement authority new tools in fighting terrorism.
This is a whole new world. It is not similar to the days of the cold
war where we worried about armies marching against us or air forces
flying against us or navies sailing against us. This is not that world.
Nobody is going to do that because we are far too powerful. Since the
end of the cold war, with the strength of our military, nobody is going
to do a frontal attack. But as the Presiding Officer and everyone else
knows, a small dedicated group of terrorists, with state-supported
efforts, can wreak havoc in an open and democratic Nation such as ours.
Anybody who has visited the sites of these tragedies doesn't need to
be told the results. We know our Nation by its very nature will always
be vulnerable to these types of attacks. None of us serving in the
Senate today will, throughout our service, no matter how long it is,
see a day where we are totally free of such terrorist attacks. That is
the sad truth. Our children and our grandchildren will face the
possibilities of such terrorist attacks because that is the only way
the United States can be attacked. But that doesn't mean we are
defenseless. It doesn't mean we suddenly surrender.
[[Page S11015]]
We have the ability, with our intelligence agencies and our law
enforcement, to seek out and stop people before this happens. We are in
an open session today, so I won't go into the number of times we have
done that. But in the last 10 years, we have had, time and time again,
during the former Bush administration, during the Clinton
administration, and in the present administration, potential terrorist
attacks thwarted. People have either been apprehended or eliminated.
Everybody in America knows our life has changed. Whether the security
checks and the changes in our airlines are effective or not, we know
they are reality. We know travel is not as easy as it once was. We will
be concerned about opening mail. We will worry when we hear the sirens
in the night. But we are not going to retreat into fortress America. We
are going to remain a beacon of democracy to the rest of the world.
Americans don't run and hide. Americans face up, as we have, to
adversities, whether they be economic or wars or anything else.
We began this process knowing how we had to protect Americans. It was
not that we were intending to see how much we could take out of the
administration's proposal, but it was with a determination to find
sensible, workable ways to do the same things to protect America the
administration wanted but with checks and balances against abuse. We
have seen at different times in this Nation's history how good
intentions can be abused. We saw it during the McCarthy era.
Following the death of J. Edgar Hoover, we found how much
totalitarian control of the FBI hurt so many innocent people without
enhancing our security. We saw it during the excesses of the special
prosecutor law enacted with good intentions.
We wanted to find checks and balances. We wanted to make sure we
could go after terrorism. We wanted to make sure we could go after
those who would injure our society, those who would strike at the very
democratic principles that ironically make us a target. But we wanted
to do it with checks and balances against abuse. That is what we did.
In provision after provision, we added those safeguards that were
missing from the administration's plan.
By taking the time to read and improve the antiterrorism bill,
Congress has done the administration a great favor in correcting the
problems that were there. We have used the time wisely. We have
produced a far better bill than the administration proposed. Actually,
it is a better bill than either this body or the House initially
proposed. The total is actually greater than the sum of the parts.
We have done our utmost to protect Americans against abuse of these
new law enforcement tools, and there are new law enforcement tools
involved. In granting these new powers, the American people but also
we, their representatives in Congress, grant the administration our
trust that they are not going to be misused. It is a two-way street. We
are giving powers to the administration; we will have to extend some
trust that they are not going to be misused.
The way we guarantee that is congressional oversight. Congressional
oversight is going to be crucial in enforcing this compact. If I might
paraphrase former President Reagan: We will entrust but with oversight.
We will do this. The Republican chairman and his ranking member in
the House of Representatives intend to have very close oversight. I can
assure you that I and our ranking member will have tight oversight in
the Senate.
Interestingly enough, the 4-year sunset provision included in this
final agreement will be an enforcement mechanism for adequate
oversight.
We did not have a sunset provision in the Senate bill. The House
included a 5-year provision. The administration wanted even 10 years.
We compromised on 4. It makes sense. It makes sense because with
everybody knowing there is that sunset provision, everybody knows they
are going to have to use these powers carefully and in the best way. If
they do that, then they can have extensions. If they don't, they won't.
It also enhances our power for oversight.
This is not precisely the bill that Senator Hatch would have written.
It is not precisely the bill I would have written, or not precisely the
bill the Presiding Officer or others on the floor would have written.
But it is a good bill. It is a balanced bill. It is a greatly improved
piece of legislation. It is one that sets up the checks and balances
necessary in a democratic society that allow us to protect and preserve
our security but also protect and preserve our liberties.
I reserve the remainder of my time.
The PRESIDING OFFICER. The Senator from Utah.
Mr. HATCH. Madam President, shortly after the September 11 attack on
America, the President of the United States asked Congress to pass
legislation that would provide our law enforcement and intelligence
agencies the tools they needed to wage war on the terrorists in our
midst. These tools represent the domestic complement to the weapons our
military currently is bringing to bear on the terrorists' associates
overseas. At the same time, the President asked that, in crafting these
tools, we remain vigilant in protecting the constitutional freedoms of
all Americans--certainly of all law-abiding Americans.
After several weeks of negotiations with Chairman Leahy, the House of
Representatives, and the administration, we have developed bipartisan
consensus legislation that will accomplish both of these goals. It
enhances our ability to find, track, monitor, and prosecute terrorists
operating here in the U.S. without in any way undermining civil
liberties.
We can never know whether these tools would have prevented the attack
on America, but, as the Attorney General has said, it is certain that
without these tools we did not stop the vicious acts of last month.
I personally believe that if these tools had been in law--and we have
been trying to get them there for years--we would have caught those
terrorists. If these tools could help us now to track down the
perpetrators--if they will help us in our continued pursuit of
terrorists--then we should not hesitate to enact these measures into
law. God willing, the legislation we pass today will enhance our
abilities to protect and prevent the American people from ever again
being violated as we were on September 11.
This legislation truly represents the product of intense, yet
bipartisan, negotiations. Senator Leahy and I carried out a painstaking
review of the antiterrorism proposal submitted by the administration.
There have been several hearings on this legislation in the Senate--not
just this year, but in prior years--on some of the provisions and
features that we have in here, including discussions during the
enactment of the 1996 Antiterrorism Effective Death Penalty Act, called
the Dole-Hatch bill.
We have heard from countless experts and advocates on all sides of
this issue in this debate. Of late, we have also worked closely with
Chairman Sensenbrenner in the House, Mr. Conyers, the ranking member on
the House Judiciary Committee, and others in our effort to complete
legislation that could receive near unanimous approval and support in
the Congress. Although I do not expect every Senator to vote in favor
of this legislation, Senator Leahy and I have worked tirelessly to
accommodate every concern. While Members ultimately may differ on some
of these proposals, I know we all share the same overriding concern,
and that is protecting our country from further harm.
The bill before us, which I hope we will pass today, differs in
several respects from the legislation we passed in the Senate 2 weeks
ago. These changes result from negotiations with our House
counterparts, and some of the changes are certainly not objectionable.
For example, we have included language requiring prosecutors to notify
Federal courts when they have disclosed grand jury information to other
Federal agencies for national security purposes. Also, the bill
includes a provision requiring law enforcement to provide detailed
reports concerning their use of the FBI's so-called Carnivore computer
surveillance system. These changes will properly encourage the law
enforcement community to use these tools responsibly.
Unfortunately, not all of the changes are welcome. For instance, our
effort to mitigate the unforeseen problems created by a change in the
law governing the discipline of Federal prosecutors was rebuffed by the
House of
[[Page S11016]]
Representatives. As a result, Federal prosecutors will continue to be
hampered by the myriad and often contradictory State bar rules, and
sometimes very politicized State bar rules. Even more alarming, Federal
law enforcement authorities in the State of Oregon will continue to be
prohibited from engaging in legitimate undercover activity--even
undercover activity designed to infiltrate a terrorist cell. That is
ridiculous. Nevertheless, we could not get our House counterparts to
resolve that problem.
Another troublesome change concerns the 4-year sunset provision. As
my colleagues know, the legislation that passed the Senate 2 weeks ago
by a vote of 96-1 did not contain a sunset. This omission was
intentional and wise. In my opinion, a sunset will undermine the
effectiveness of the tools we are creating here and send the wrong
message to the American public that somehow these tools are
extraordinary.
One hardly understands the need to sunset legislation that both
provides critically necessary tools and protects our civil liberties.
Furthermore, as the Attorney General stated, how can we sunset these
tools when we know full well that the terrorists will not sunset their
evil intentions? I sincerely hope we undertake a thorough review and
further extend the legislation once the 4-year period expires. At
least, we will have 4 years of effective law enforcement against
terrorism that we currently do not have.
Despite these provisions, the legislation before us today deserves
unanimous support. The core provisions of the legislation we passed in
the Senate 2 weeks ago remain firmly in place. For instance, in the
future, our law enforcement and intelligence communities will be able
to share information and cooperate fully in protecting our Nation
against terrorist attacks.
Our laws relating to electronic surveillance also will be updated.
Electronic surveillance conducted under the supervision of a Federal
judge happens to be one of the most powerful tools at the disposal of
our law enforcement community. We now know that e-mail, cellular
telephones, and the Internet have been the principal tools used by
terrorists to coordinate their attacks, and our law enforcement and
intelligence agencies have been hamstrung by laws that were enacted
long before the advent of these technologies. This bill will modernize
our laws so our law enforcement agencies can deal with the world as it
is, rather than with the world as it existed 20 years ago.
Also, the legislation retains the compromise immigration proposals
that I negotiated with Senator Leahy, Senator Kennedy, Senator Kyl,
Senator Brownback, and also Senator Feinstein, who has played a
significant role. She and Senator Kyl have both played significant
roles leading up to this particular bill, and over the last 5 years in
particular. We have worked hard to craft language that allows the
Attorney General to be proactive, rather than reactive, without
sacrificing the civil liberties of noncitizens.
In total, the amendments made by this legislation to the Immigration
and Nationality Act reflect, and account for, the complex and often
mutating nature of terrorist groups by expanding the class of
inadmissible and deportable aliens and providing a workable mechanism
by which the Attorney General may take into custody suspected alien
terrorists. Further, the legislation breaks down some of the barriers
that have in the past prevented the State Department, the Immigration
and Naturalization Service, the FBI, and others from effectively
communicating with each other. If we are to fight terrorism, we cannot
allow terrorists, or those who support terrorists, to enter or to
remain in our country.
Finally, the bill provides the administration with powerful tools to
attack the financial infrastructure of terrorism. For instance, the
legislation expands the President's authority to freeze the assets of
terrorists and terrorist organizations and provides for the eventual
seizure of such assets. These financial tools will give our Government
the ability to choke off the financing that these dangerous
organizations need in order to survive.
The legislation provides numerous other tools--too many to mention
here--to aid our war against terrorism. Many of these were added at the
request of our Senate colleagues, and I commend all of them for their
input.
Before I yield the floor, I must take a moment to acknowledge the
hard work by my staff, the staff of Senator Leahy, and the
representatives of the administration, from the White House and the
Justice Department and elsewhere, who were involved in the negotiation
of this bill. These people have engaged in discussions literally around
the clock over the 6 weeks to produce this legislation. So I thank
everybody who has worked on this legislation.
This is a major anticrime, antiterrorism bill. It is probably the
most important bill we will enact this year, certainly with regard to
national security and terrorism. I thank everybody involved, and I will
make further remarks about that later in the debate.
With that, I yield the floor and reserve the remainder of my time.
The PRESIDING OFFICER. The Senator from Florida.
Mr. GRAHAM. Madam President, it is my hope that today as we pass this
antiterrorism legislation and as we will in future days take action on
issues of resources to fight antiterrorism and changes in
organizational structure, we will be making as significant a national
statement about our will and determination to eliminate the scourge of
global terrorism as previous generations did about other scourges that
afflicted our country.
It was not that long ago that America was beset by the scourge of
organized crime. Many of our communities had been seriously invaded by
these insidious influences of organized crime. People, many of whom
occupy the chairs that we now occupy in this very Chamber, decided a
half century or more ago that was intolerable and we would take the
necessary steps to recapture the essential values of our country.
I think it is fair to say we live in a much safer and more secure
America because of those efforts. I hope that in years in the future
those who occupy this Chamber will look back with a similar belief that
the actions we are taking now have had a similar effect in terms of
making this a more secure, not just America but world for our children
and grandchildren.
With that hope, I wish to talk about a few of the provisions of this
legislation that relate directly to America's intelligence community
and the role it will play in securing that future.
First, a bit of history. For most of America's history, we have been
extremely uncomfortable with the idea of clandestine intelligence. It
ran contrary to our basic spirit of national openness. While the
British have had a well-developed intelligence system since the
Napoleonic wars, our first adventure in this field really is a product
of the Second World War, and as soon as the war was over, the military
intelligence services were essentially collapsed.
Two years later, President Truman recognized that with the advent of
the Soviet Union and the development of what we came to know as the
Iron Curtain that separated the Soviet Union from the free world, we
were going to have to have some capability to understand what this
large adversary was about and therefore prepare ourselves. So in 1947
the National Security Act was adopted which created the Central
Intelligence Agency and from that the other intelligence agencies which
now constitute America's intelligence community.
For 40 years that intelligence community was focused on one target:
the Soviet Union and its Warsaw Pact allies. We knew that community.
The United States had been dealing with Russia since even before John
Quincy Adams was our Ambassador in St. Petersburg. It was a homogenous
enemy. Most of the countries spoke Russian, and therefore if we had
command of that language, we could understand what most of the Warsaw
Pact nations were saying. It was also an old style symmetrical enemy:
We were matching tanks for tanks, nukes for nukes.
With the fall of the Berlin Wall, the world changed in terms of
intelligence requirements. Suddenly, instead of one enemy, we had
dozens of enemies. Suddenly, instead of having command of one language
which made us linguistically competent, there were scores of languages
we had to learn to speak. In
[[Page S11017]]
Afghanistan alone, there are more than a half dozen languages with
which one must have some familiarity in order to understand what is
being said there. And instead of symmetrical relationships, we now have
small groups of a dozen or a hundred or a thousand or so against a
nation the size of the United States of America. So our intelligence
community has been challenged to respond to this new reality. This
legislation is going to accelerate that response.
Let me focus, in my limited time, on three areas within this
legislation that I think will be significantly beneficial.
The first goes to the reality that we have had, in large part, out of
this history of unease with dealing with clandestine information, an
orientation to treat terrorist activities as crimes and put up yellow
tape, secure the crime scene, hold the information very close because
we did not want to have it infected so that the evidence could not be
used at a subsequent trial that would lead to the conviction of the
perpetrator. In the course of that, we also shut off the ability to
share information which might allow us to anticipate the future actions
of those same perpetrators and interdict an act of terrorism before it
had occurred.
We take some significant steps to overcome that orientation by the
provisions contained in this legislation which will require the sharing
of criminal justice information with intelligence agencies. I
underscore the word ``require'' because even as recently as today's
Washington Post, there is an article describing the legislation which
uses the term ``the authority to share,'' as if this were a permissive
requirement.
In fact, the legislation very explicitly makes it mandatory. I refer
to page 308 beginning at line 9 where it states that the Attorney
General or the head of any other Department or Agency of the Federal
Government with law enforcement responsibilities shall --shall--
expeditiously disclose to the Director of Central Intelligence pursuant
to guidelines developed foreign intelligence acquired by an element of
the Department of Justice or any element of such Department or Agency,
as the case may be, in the course of a criminal investigation.
We are closing that gap which has in the past been a major source of
limitation and frustration to our ability to predict and interdict
future actions.
Second, we are dealing with the issue of the empowerment of the
Director of Central Intelligence. We tend to think of the CIA as being
the lead agency for our intelligence community. In fact, that is not
correct. If one looks at an organizational chart, across the top is the
Director of Central Intelligence. Under the Director of Central
Intelligence is a series of agencies, of which the CIA is one, which
have operational responsibility.
If one looks at that chart, one assumes the Director of Central
Intelligence is the head coach, the leader with the ability to command
and control the intelligence community. In fact, because of other
authorities, including budget authority and personnel authorities and
some culture of individuality by agencies, the Director of Central
Intelligence has not been fully empowered.
We take a step in this legislation towards giving the Director of
Central Intelligence greater authority and in a very significant area.
We have a limited capability to eavesdrop on the communication of
potential adversaries, including terrorists. Under the current
structure, it is primarily the responsibility of the Federal Bureau of
Investigation, which actually operates and targets our electronic
surveillance, as to which target will be listened to first if we cannot
listen to everybody because we do not have, for instance, enough people
who can understand the exotic language in which the communication is
being spoken.
This legislation will establish the fact it is the Director of
Central Intelligence who will decide what the strategic priorities for
the use of our electronic surveillance will be. So if the Director of
Central Intelligence is aware we face a terrorist attack from a
specific terrorist organization which speaks a specific language, those
communications will be given the priority for purposes of how we will
use our available electronic surveillance capability.
The Director of Central Intelligence will then also, at the back end
of that process, have the primary responsibility for determining how to
disseminate that information. The nightmare that exists, and will exist
until we complete a full review of what happened on September 11, is we
are going to find someplace a tape of a conversation we secured which
will disclose what would have been key information as to what was being
prepared, what plot was being matured which resulted in the terror of
September 11.
These provisions are intended to prioritize, on the front end, what
we will gather information against and, on the back end, who will be
first in line to get the information that has come from that
surveillance.
A third provision goes to the criticism that the intelligence
community has become risk adverse; that we have been reticent to take
on the hardest targets because they are hard, because they may result
in failure and nonaccomplishment of the mission. As President Kennedy
said as we started our space program, we start this not because it is
easy but because it is hard and it will challenge us to our fullest.
One of the areas in which we have become risk adverse has been the
area of hiring foreign nationals to do work which it is very difficult
for Americans to do, not because we are not smart, capable people, but
if we are going to hire someone or secure the services of someone who
can get close to an ominous figure such as Osama bin Laden, frankly, it
is probably somebody who is pretty similar to bin Laden. It is someone
who can gain his confidence. That may well mean he has been an
associate of bin Laden in the past, has engaged in some of the
activities we so abhor.
Today there is a sense within the intelligence community we should
not hire people who have that kind of background because they are
potentially unreliable but also because they bring a dirty background.
This legislation, through a sense-of-the-Congress statement, reverses
that and says our priority goal in employing persons to assist in our
antiterrorism activity should be to acquire services of persons who can
be of greatest assistance to us in determining the plans and intentions
of the terrorists, even if it means we might have to hire someone with
whom we would not personally like to have a social or other
relationship.
That is a statement of our commitment to this intelligence community;
that we, the Congress, are prepared to back them up when they take some
of these high-risk undertakings and that we will understand there is
the risk of failure but it is better to risk failure than to be cowered
by the unwillingness to engage in important but high-risk ventures.
So those are three illustrative provisions which are in the
intelligence section of this legislation, which I think have the
potential of the same impact on our capacity to rid the world of the
scourge of terrorism as similar actions have so contributed to our
ability to reduce the influence of organized crime within this Nation.
I urge the adoption of this conference report.
The PRESIDING OFFICER. Who yields time?
Mr. HATCH. Madam President, I yield 5 minutes to the Senator from
Kansas.
The PRESIDING OFFICER. The Senator from Kansas.
Mr. BROWNBACK. Madam President, I thank my colleague, Senator Hatch
of Utah, for giving me time to speak in support of the bill. I want to
particularly direct attention to the immigration provisions in the
bill.
Last month, our Nation was attacked by extremists who hoped to
undermine our way of life and the liberties we enjoy. These individuals
and the groups they represent want our country to recoil in terror and
capitulate to fear. This we will not do.
We have before us today legislation that stands firm before those who
mean us harm. This antiterrorism package, the product of an earnest
bipartisan effort, is an intelligent and thorough response to the
immediate security needs of our Nation. I commend in particular the
immigration provisions of this legislation, which will strengthen our
immigration laws to better combat terrorism.
[[Page S11018]]
My heartfelt gratitude is to my colleagues on the Immigration
Subcommittee and to the committee's leadership--Senator Hatch, Senator
Leahy, and others--for their dedication and diligence in crafting what
I think is fine legislation.
This antiterrorist package will enhance the ability of our consuls
overseas and our immigration officers at home to intercept and remove
both alien terrorists and those who support them. This is a daunting
task.
We had a hearing last week on trying to intercept people coming into
this country who mean us harm, and it is difficult in the sense we have
nearly 350 million people a year, non-U.S. citizens, who enter this
country, and we are looking for those few who mean us harm. This is a
difficult task. This legislation helps to make it easier. We are
looking for a needle in a haystack, and this legislation helps us in
finding that or gives us a bigger magnet to be able to find it.
This legislation will capture not only those individuals who commit
acts of terror but also those who enhance, enable, and finance them. It
does so through several forceful changes to our current immigration
laws. Among those changes is an expanded definition of terrorism, one
that encompasses not only the acts of terrorism but the network of
terrorism.
This legislation will also permit the Attorney General to promptly
take into custody and detain those aliens who pose a threat to the
safety or security of this Nation. At the same time, it will provide
the Secretary of State with better information and better tools to
identify terrorists and to deny them access to our country.
Perhaps most important of all, this legislation will improve the flow
of information between the Immigration and Naturalization Service, the
Department of State, and the law enforcement and intelligence
communities. This is important. What we have is several stovepipes of
information, and we need to be able to get those collected to be able
to stop the terrorists before they enter our land.
This increased flow of information will allow those agencies tasked
with protecting our borders to better coordinate and thereby thwart any
terrorist seeking to reach our shores. This is not to say this
legislation is unmindful of innocent visitors or the lawful permanent
residents of our country. To the contrary. These immigration
provisions contain appropriate safeguards to protect the liberties of
persons whom we want in this country.
I am pleased to report this legislation is carefully crafted to
combat terrorism without compromising the values or the economy of the
United States or the values that guide our immigration laws. This
legislation represents a profound and essential improvement in our
immigration laws. We need these changes if our immigration laws are to
be an effective defense against the threat of terrorism we face today.
I urge my colleagues to support the legislation and note as well we
are continuing to refine further other potential areas where we can
make changes in our immigration laws to better be able to catch those
who seek to enter our country to do us harm. Senator Kennedy and I are
working on bipartisan legislation to do just that. We hope to introduce
this next week.
I appreciate the opportunity to address my colleagues on this
important legislation. I reserve the remainder of our time, and I yield
the floor.
The PRESIDING OFFICER. The Senator from Vermont.
Mr. LEAHY. Madam President, I yield myself such time as I may need.
I see the Senator from Wisconsin, so I am only going to take 2 or 3
minutes at this point.
A number of Senators have asked some of the areas where this changes.
We had a separate, bipartisan, bicameral negotiation, and we shaped and
changed the legislation as originally proposed by the Attorney General
and the administration. I will speak at greater length as we go on.
We improved security on the northern border, the 4,000-mile wonderful
border between our country and Canada, another democratic nation. The
State of the Presiding Officer borders Canada, as does mine. It is just
a short drive from the Canadian border. Many members of my wife's
family came from Canada. We have always had historic and economic ties
with Canada. Partly because we have taken so much for granted, we have
also shortchanged this relationship. We should look at the border for
our sake and for the sake of Canada. We have greatly improved security
on the northern border by adding better technology, more Customs and
INS agents. That helps.
We added something the administration did not include--money
laundering. I learned as a prosecutor--and most Members know this--if
you want to learn something, follow the money. If you want to stop
terrorism, one way is to cut off the money supply.
Third, we have added programs to enhance information sharing in
coordination with State and local law enforcement, grants for local
governments to respond to bioterrorism, to increase payments to
families of fallen firefighters, police officers, and other public
safety officers. That is important.
Cooperation is necessary. The mayor of New York City, Mayor Giuliani,
called me saying the police commissioner has justifiable concerns about
the previous lack of cooperation from the Federal Government in their
own antiterrorism efforts, although New York City has one of the best
antiterrorist units in the country. The mayor of Baltimore has called,
as have other mayors.
I ask unanimous consent to have printed in the Record the Washington
Post op-ed piece by Robert D. Novak in today's paper entitled ``Same
Old FBI.''
There being no objection, the material was ordered to be printed in
the Record, as follows:
Same Old FBI
Behind the facade of cooperation following the Sept. 11
attacks, less than amicable relations between New York Mayor
Rudolph Giuliani and the FBI have further deteriorated.
According to New York City sources, the mayor has engaged in
more than one shouting match with FBI Assistant Director
Barry Mawn.
It's the same old problem because it's the same old FBI.
Newly appointed, much acclaimed Director Robert Mueller makes
little difference. The bureau refuses to share information
with local police agencies. It won't permit security
clearances for high local officials. Law enforcement officers
around the country say that attitude lent itself to
catastrophe on Sept. 11 and could permit further disasters.
Last Friday in Washington, Mueller--amiable and agreeable--
sat down with big city police chiefs and promised things will
get better. The chiefs doubt whether Mueller or Tom Ridge,
the new homeland security director, can change the bureau's
culture, described to me by one police chief as ``elitist and
arrogant.'' Efforts to enlist members of Congress into
pressing for reform find politicians awed by the FBI
mystique.
The FBI's big national security section in New York City
long has grappled with the New York Police Department. ``the
FBI's attitude has been that if you need to know, we'll tell
you,'' one New York police source told me. That ``need''
never occurs, with the FBI adamant against any local anti-
terrorism activity. The locals, in turn, complain about the
feds failing to follow important leads.
Giuliani is not venting his outrage in this time of crisis,
but sources report a high private decibel level by the mayor.
The complaint to Mawn is that the NYPD is out of the loop,
its senior officers not even granted security clearances.
Such complaints are common across the country, but only a
few police chiefs speak publicly--notably Edward Norris of
Baltimore (who complained in congressional testimony),
Michael Chitwood of Portland, Maine, and Dan Oates of Ann
Arbor, Mich.
Chitwood's experience is most bizarre. He was infuriated to
learn that the FBI knew of a visit to Portland by two Sept.
11 hijackers but did not inform him. When his police pursued
a witness of that visit, the FBI threatened to arrest the
chief. ``I ignored them,'' Chitwood told me. Has cooperation
with the bureau improved? ``Not a bit,'' he said. Only
Tuesday he learned from reading his local newspaper about a
plane under federal surveillance parked at the Portland
airport for seven weeks.
Oates is familiar with the FBI, having tried to work with
the feds during 21 years with the NYPD before retiring this
year to go to Ann Arbor. As a deputy chief who was commanding
officer of NYPD intelligence, he describes the FBI as
``obsessed with turf.''
Closing doors to police officers particularly infuriates
Oates. ``The security clearance issue is a tired old excuse
that allows the FBI not to share,'' he told me. ``They should
hand out 10,000 security clearances to cops around the
country.'' Oates and other police chiefs believe Sept. 11
might have been averted had the FBI alerted local police
agencies about a Minnesota flight school's report of an Arab
who wanted instructions for steering a big jet but not for
landing or taking off.
Police chiefs would open the FBI to the same probing of
decisions and actions that they routinely perform after the
fact. They
[[Page S11019]]
also would like the same rules for the bureau that govern
most of the nation's police departments. In the FBI, nobody
takes the fall for blundering.
A promise that things will change in the FBI was implicit
in Director Mueller's remarks to city police chiefs last
Friday. Philadelphia Police Commissioner John Timoney,
another NYPD veteran who is more cautious in his criticism of
the feds than his former colleague Oates, sounded skeptical
after the meeting. ``I'm hopeful,'' he told me, but he would
make no predictions.
What he hopes for is the safety of the American people. The
police chiefs of America want a top-to-bottom cleaning of the
FBI that will require leadership from the Oval Office. If
George W. Bush doubts the urgency, he should talk to Rudy
Giulianai.
Mr. LEAHY. We have to dramatically increase that cooperation or stop
the noncooperation and start cooperating.
We have added humanitarian relief to immigrant victims of the
September 11 terrorist attacks. A lot of immigrants became victims of
that attack. They suddenly became orphans or were spouses of people
killed.
We added help to the FBI to hire translators. I shudder to think how
much information was available before September 11 that was never
translated that might have prevented this.
We have added more comprehensive victims assistance; measures to
fight cyber-crime; measures to fight terrorism against mass
transportation systems; important measures to use technology to make
our borders more secure.
Last, Madam President, and I cannot emphasize this enough, the Senate
should never give a blank check to our law enforcement or to any
President or Attorney General of either party. We have to protect the
liberties of our people. Who watches the watchers? We watch.
I said earlier, as Benjamin Franklin once said, a nation that would
trade its liberties for security deserves neither.
We can have our security and we can protect our liberties but only if
we have adequate checks and balances. People who are professional law
enforcement say give us the checks and balances. We give enormous power
to Federal, State, and local law enforcement, but with that there have
to be checks and balances. We have all seen times where if law
enforcement is unchecked, innocent people can be hurt.
I was a prosecutor for 8 years, and I know we have to have checks and
balances. We have done that. You cannot simply have a case and say: Do
this, we will set aside this pesky Constitution for the moment.
We cannot do that. We built in checks and balances that were not in
the original proposal. Ultimately, that will be the best thing for the
country.
We will give law enforcement translators, tools, computers, and other
things necessary to help them. We stand united as a nation. We know the
only way to protect ourselves is to stop the terrorists before they
strike. Going to the funerals after the strike is too late. We will do
that, but we will do it protecting the foundations of our Constitution
and freedom which made us such a great democracy in the first place.
None of us have any idea how long we will be in the Senate. I hope my
colleagues are willing to stay here as long as they can. When I leave
the Senate, as I will, I want to leave knowing I have done my best to
protect our freedoms. I have said over and over again, the Senate is
the conscience of the Nation. As much as any piece of legislation, this
has to reflect our conscience.
I reserve the remainder of my time.
The PRESIDING OFFICER. The Senator from Wisconsin.
Mr. FEINGOLD. Madam President, I have asked for this time to speak
about the antiterrorism bill, H.R. 3162. As we address this bill, of
course, we are especially mindful of the terrible events of September
11 and beyond, which led to this bill's proposal and its quick
consideration in the Congress.
This has been a tragic time in our country. Before I discuss this
bill, let me first pause to remember, through one small story, how
September 11 has irrevocably changed so many lives. In a letter to the
Washington Post recently, a man, as he went jogging near the Pentagon,
came across the makeshift memorial built for those who lost their
lives. He slowed to a walk as he took in the sight before him, the red,
white, and blue flowers covering the structure. Off to the side, was a
smaller memorial with a card that read: Happy birthday, Mommy. Although
you died and are no longer with me, I feel as if I still have you in my
life. I think about you every day.
After reading the card, the man felt as if he were ``drowning in the
names of dead mothers, fathers, sons, and daughters.'' The author of
this letter shared a moment in his own life that so many of us have
had, the moment where televised pictures of the destruction are made
painfully real to us. You read a card, see the anguished face of a
loved one, and then, suddenly, we feel the enormity of what has
happened to so many American families and to all of us as a people.
We also had our initial reactions to the attack. My first and most
powerful emotion was a solemn resolve to stop these terrorists. That
remains my principal reaction to these events. But I also quickly
realized, as many did, that two cautions were necessary. I raised them
on the Senate floor the day after the attacks.
The first caution was that we must continue to respect our
Constitution and protect our civil liberties in the wake of the
attacks.
As the chairman of the Constitution subcommittee of the Judiciary
Committee I recognize fully that this is a different world, with
different technologies, different issues, and different threats.
Yet we must examine every item that is proposed in response to these
events to be sure we are not rewarding these terrorists and weakening
ourselves by giving up the cherished freedoms that they seek to
destroy.
The second caution I issued was a warning against the mistreatment of
Arab Americans, Muslim Americans, South Asians, or others in this
country. Already, one day after the attacks, we were hearing news
reports that misguided anger against people of these backgrounds had
led to harassment, violence, and even death.
I suppose I was reacting instinctively to the unfolding events in the
spirit of the Irish statesman John Philpot Curran, who said:
The condition upon which God hath given liberty to man is
eternal vigilance.
During those first few hours after the attacks, I kept remembering a
sentence from a case I had studied in law school. Not surprisingly, I
didn't remember which case it was, who wrote the opinion, or what it
was about, but I did remember these words:
While the Constitution protects against invasions of
individual rights, it is not a suicide pact.
I took these words as a challenge to my concerns about civil
liberties at such a momentous time in our history; that we must be
careful to not take civil liberties so literally that we allow
ourselves to be destroyed.
But upon reviewing the case itself, Kennedy v. Mendoza-Martinez, I
found that Justice Arthur Goldberg had made this statement but then
ruled in favor of the civil liberties position in the case, which was
about draft evasion. He elaborated:
It is fundamental that the great powers of Congress to
conduct war and to regulate the Nation's foreign relations
are subject to the constitutional requirements of due
process. The imperative necessity for safeguarding these
rights to procedural due process under the gravest of
emergencies has existed throughout our constitutional
history, for it is then, under the pressing exigencies of
crisis, that there is the greatest temptation to dispense
with fundamental constitutional guarantees which, it is
feared, will inhibit governmental action.
The Justice continued:
The Constitution of the United States is a law for rulers
and people, equally in war and peace, and covers with the
shield of its protection all classes of men, at all times,
and under all circumstances . . . In no other way can we
transmit to posterity unimpaired the blessings of liberty,
consecrated by the sacrifices of the Revolution.
I have approached the events of the past month and my role in
proposing and reviewing legislation relating to it in this spirit. I
believe we must, we must, redouble our vigilance. We must redouble our
vigilance to ensure our security and to prevent further acts of terror.
But we must also redouble our vigilance to preserve our values and the
basic rights that make us who we are.
The Founders who wrote our Constitution and Bill of Rights exercised
that vigilance even though they had recently fought and won the
Revolutionary War. They did not live in comfortable and easy times of
hypothetical
[[Page S11020]]
enemies. They wrote a Constitution of limited powers and an explicit
Bill of Rights to protect liberty in times of war, as well as in times
of peace.
Of course, there have been periods in our nation's history when civil
liberties have taken a back seat to what appeared at the time to be the
legitimate exigencies of war. Our national consciousness still bears
the stain and the scars of those events: The Alien and Sedition Acts,
the suspension of habeas corpus during the Civil War, the internment of
Japanese-Americans, German-Americans, and Italian-Americans during
World War II, the blacklisting of supposed communist sympathizers
during the McCarthy era, and the surveillance and harassment of antiwar
protesters, including Dr. Martin Luther King Jr., during the Vietnam
War. We must not allow these pieces of our past to become prologue.
Even in our great land, wartime has sometimes brought us the greatest
tests of our Bill of Rights. For example, during the Civil War, the
Government arrested some 13,000 civilians, implementing a system akin
to martial law. President Lincoln issued a proclamation ordering the
arrest and military trial of any persons ``discouraging volunteer
enlistments, or resisting militia drafts.'' Wisconsin provided one of
the first challenges of this order. Draft protests rose up in Milwaukee
and Sheboygan. And an anti-draft riot broke out among Germans and
Luxembourgers in Port Washington, WI. When the government arrested one
of the leaders of the riot, his attorney sought a writ of habeas
corpus. His military captors said that the President had abolished the
writ. The Wisconsin Supreme Court was among the first to rule that the
President had exceeded his authority.
In 1917, the Postmaster General revoked the mailing privileges of the
newspaper the Milwaukee Leader because he felt that some of its
articles impeded the war effort and the draft. Articles called the
President an aristocrat and called the draft oppressive. Over dissents
by Justices Brandeis and Holmes, the Supreme Court upheld the action.
We all know during World War II, President Roosevelt signed orders to
incarcerate more than 110,000 people of Japanese origin, as well as
some roughly 11,000 of German origin and 3,000 of Italian origin.
Earlier this year, I introduced legislation to set up a commission to
review the wartime treatment of Germans, Italians, and other Europeans
during that period. That bill came out of heartfelt meetings in which
constituents told me their stories. They were German-Americans, who
came to me with some trepidation. They had waited 50 years to raise the
issue with a member of Congress. They did not want compensation. But
they had seen the Government's commission on the wartime internment of
people of Japanese origin, and they wanted their story to be told, and
an official acknowledgment as well with regard to what had happened to
them. I hope, that we will move to pass this important legislation
early next year. We must deal with our nation's past, even as we move
to ensure our nation's future.
(Mrs. STABENOW assumed the chair.)
Mr. FEINGOLD. Now some may say, indeed we may hope, that we have come
a long way since those days of infringements on civil liberties. But
there is ample reason for concern. And I have been troubled in the past
6 weeks by the potential loss of commitment in the Congress and the
country to traditional civil liberties.
As it seeks to combat terrorism, the Justice Department is making
extraordinary use of its power to arrest and detain individuals,
jailing hundreds of people on immigration violations and arresting more
than a dozen ``material witnesses'' not charged with any crime.
Although the Government has used these authorities before, it has not
done so on such a broad scale. Judging from Government announcements,
the Government has not brought any criminal charges related to the
attacks with regard to the overwhelming majority of these detainees.
For example, the FBI arrested as a material witness the San Antonio
radiologist Albader Al-Hazmi, who has a name like two of the hijackers,
and who tried to book a flight to San Diego for a medical conference.
According to his lawyer, the Government held Al-Hazmi incommunicado
after his arrest, and it took 6 days for lawyers to get access to him.
After the FBI released him, his lawyer said:
This is a good lesson about how frail our processes are.
It's how we treat people in difficult times like these that
is the true test of the democracy and civil liberties that we
brag so much about throughout the world.
I agree with those statements.
Now, it so happens--and I know the Presiding Officer is aware of that
because she has been very helpful on this issue--that since early 1999,
I have been working on another bill that is poignantly relevant to
recent events: legislation to prohibit racial profiling, especially the
practice of targeting pedestrians or drivers for stops and searches
based on the color of their skin. Before September 11, people spoke of
the issue mostly in the context of African-Americans and Latino-
Americans who had been profiled. But after September 11, the issue has
taken on a new context and a new urgency.
Even as America addresses the demanding security challenges before
us, we must strive mightily also to guard our values and basic rights.
We must guard against racism and ethnic discrimination against people
of Arab and South Asian origin and those who are Muslim.
We who do not have Arabic names or do not wear turbans or headscarves
may not feel the weight of these times as much as Americans from the
Middle East and South Asia do. But as the great jurist Learned Hand
said in a speech in New York's Central Park during World War II:
The spirit of liberty is the spirit which seeks to
understand the minds of other men and women; the spirit of
liberty is the spirit which weighs their interests alongside
its own without bias. . . .
Was it not at least partially bias, however, when passengers on a
Northwest Airlines flight in Minneapolis a month ago insisted that
Northwest remove from the plane three Arab men who had cleared
security?
Of course, given the enormous anxiety and fears generated by the
events of September 11, it would not have been difficult to anticipate
some of these reactions, both by our government and some of our people.
Some have said rather cavalierly that in these difficult times we must
accept some reduction in our civil liberties in order to be secure.
Of course, there is no doubt that if we lived in a police state, it
would be easier to catch terrorists. If we lived in a country that
allowed the police to search your home at any time for any reason; if
we lived in a country that allowed the government to open your mail,
eavesdrop on your phone conversations, or intercept your email
communications; if we lived in a country that allowed the government to
hold people in jail indefinitely based on what they write or think, or
based on mere suspicion that they are up to no good, then the
government would no doubt discover and arrest more terrorists.
But that probably would not be a country in which we would want to
live. And that would not be a country for which we could, in good
conscience, ask our young people to fight and die. In short, that would
not be America.
Preserving our freedom is one of the main reasons we are now engaged
in this new war on terrorism. We will lose that war without firing a
shot if we sacrifice the liberties of the American people.
That is why I found the antiterrorism bill originally proposed by
Attorney General Ashcroft and President Bush to be troubling.
The administration's proposed bill contained vast new powers for law
enforcement, some seemingly drafted in haste and others that came from
the FBI's wish list that Congress has rejected in the past. You may
remember that the Attorney General announced his intention to introduce
a bill shortly after the September 11 attacks. He provided the text of
the bill the following Wednesday, and urged Congress to enact it by the
end of the week. That was plainly impossible, but the pressure to move
on this bill quickly, without deliberation and debate, has been
relentless ever since.
It is one thing to shortcut the legislative process in order to get
Federal financial aid to the cities hit by terrorism. We did that, and
no one complained that we moved too quickly. It
[[Page S11021]]
is quite another to press for the enactment of sweeping new powers for
law enforcement that directly affect the civil liberties of the
American people without due deliberation by the peoples' elected
representatives.
Fortunately, cooler heads prevailed at least to some extent, and
while this bill has been on a fast track, there has been time to make
some changes and reach agreement on a bill that is less objectionable
than the bill that the administration originally proposed.
As I will discuss in a moment, I have concluded that this bill still
does not strike the right balance between empowering law enforcement
and protecting civil liberties. But that does not mean that I oppose
everything in the bill. By no means. Indeed many of its provisions are
entirely reasonable, and I hope they will help law enforcement more
effectively counter the threat of terrorism.
For example, it is entirely appropriate that with a warrant the FBI
be able to seize voice mail messages as well as tap a phone. It is also
reasonable, even necessary, to update the federal criminal offense
relating to possession and use of biological weapons. It made sense to
make sure that phone conversations carried over cables would not have
more protection from surveillance than conversations carried over phone
lines. And it made sense to stiffen penalties and lengthen or eliminate
statutes of limitation for certain terrorist crimes.
There are other non-controversial provisions in the bill that I
support--those to assist the victims of crime, to streamline the
application process for public safety officers benefits and increase
those benefits, to provide more funds to strengthen immigration
controls at our Northern borders--something that the Presiding Officer
and I understand--to expedite the hiring of translators at the FBI, and
many other such provisions.
In the end, however, my focus on this bill, as Chair of the
Constitution Subcommittee of the Judiciary Committee in the Senate, was
on those provisions that implicate our constitutional freedoms. And it
was in reviewing those provisions that I came to feel that the
administration's demand for haste was inappropriate; indeed, it was
dangerous. Our process in the Senate, as truncated as it was, did lead
to the elimination or significant rewriting of a number of audacious
proposals that I and many other members found objectionable.
For example, the original administration proposal contained a
provision that would have allowed the use in U.S. criminal proceedings
against U.S. citizens of information obtained by foreign law
enforcement agencies in wiretaps that would be illegal in this country.
In other words, evidence obtained in an unconstitutional search
overseas was to be allowed in a U.S. court.
Another provision would have broadened the criminal forfeiture laws
to permit--prior to conviction--the freezing of assets entirely
unrelated to an alleged crime. The Justice Department has wanted this
authority for years, and Congress has never been willing to give it.
For one thing, it touches on the right to counsel, since assets that
are frozen cannot be used to pay a lawyer. The courts have almost
uniformly rejected efforts to restrain assets before conviction unless
they are assets gained in the alleged criminal enterprise. This
proposal, in my view, was simply an effort on the part of the
Department to take advantage of the emergency situation and get
something that they've wanted to get for a long time.
As I have indicated, the foreign wiretap and criminal forfeiture
provisions were dropped from the bill that we considered in the Senate.
Other provisions were rewritten based on objections that I and others
raised about them. For example, the original bill contained sweeping
permission for the Attorney General to get copies of educational
records without a court order. The final bill requires a court order
and a certification by the Attorney General that he has reason to
believe that the records contain information that is relevant to an
investigation of terrorism.
So the bill before us is certainly improved from the bill that the
administration sent to us on September 19, and wanted us to pass on
September 21. But again, in my judgement, it does not strike the right
balance between empowering law enforcement and protecting
constitutional freedoms. Let me take a moment to discuss some of the
shortcomings of the bill.
First, the bill contains some very significant changes in criminal
procedure that will apply to every federal criminal investigation in
this country, not just those involving terrorism. One provision would
greatly expand the circumstances in which law enforcement agencies can
search homes and offices without notifying the owner prior to the
search. The longstanding practice under the fourth amendment of serving
a warrant prior to executing a search could be easily avoided in
virtually every case, because the government would simply have to show
that it had ``reasonable cause to believe'' that providing notice `may'
seriously jeopardize an investigation.'' This is a significant
infringement on personal liberty.
Notice is a key element of fourth amendment protections. It allows a
person to point out mistakes in a warrant and to make sure that a
search is limited to the terms of a warrant. Just think about the
possibility of the police showing up at your door with a warrant to
search your house. You look at the warrant and say, ``yes, that's my
address, but the name on the warrant isn't me.'' And the police realize
a mistake has been made and go away. If you're not home, and the police
have received permission to do a ``sneak and peek'' search, they can
come in your house, look around, and leave, and may never have to tell
you that ever happened.
That bothers me. I bet it bothers most Americans.
Another very troubling provision has to do with the effort to combat
computer crime. I want the effort to stop computer crime. The bill
allows law enforcement to monitor a computer with the permission of its
owner or operator, without the need to get a warrant or show probable
cause.
I want to tell you, Madam President, I have been at pains to point
out things I can support in this bill. I think that power is fine in a
case of a so-called denial of service attack. What is that? That is
plain old computer hacking. You bet. We need to be able to get at that
kind of crime.
Computer owners should be able to give the police permission to
monitor communications coming from what amounts to a trespasser on the
computer, a real trespasser.
But we tried to point out as calmly and as constructively as possible
on the floor that, as drafted in this bill, the provision might permit
an employer to give permission to the police to monitor the e-mails of
an employee who has used her computer at work to shop for Christmas
gifts. She violated the rules of her employer regarding personal use of
the computer. Or someone who uses a computer at a library or at a
school and happens to go to a gambling or pornography site in violation
of the Internet use policies of the library or the university might
also be subjected to Government surveillance--without probable cause
and without any time limit at all. With this one provision, fourth
amendment protections are potentially eliminated for a broad spectrum
of electronic communications.
I am also very troubled by the broad expansion of Government power
under the Foreign Intelligence Surveillance Act, known as FISA. When
Congress passed FISA in 1978, it granted to the executive branch the
power to conduct surveillance in foreign intelligence investigations
without having to meet the rigorous probable cause standard under the
fourth amendment that is required for criminal investigations. There is
a lower threshold for obtaining a wiretap order from the FISA court
because the FBI is not investigating a crime, it is investigating
foreign intelligence activities. But the law currently requires that
intelligence gathering be the primary purpose of the investigation in
order for this much lower standard to apply.
The bill changes that requirement. The Government now will only have
to show that intelligence is a ``significant purpose'' of the
investigation. So even if the primary purpose is a criminal
investigation, the heightened protections of the fourth amendment will
not apply.
It seems obvious that with this lower standard, the FBI will be able
to try to
[[Page S11022]]
use FISA as much as it can. And, of course, with terrorism
investigations, that won't be difficult because the terrorists are
apparently sponsored or at least supported by foreign governments. So
this means the fourth amendment rights will be significantly curtailed
in many investigations of terrorist acts.
The significance of the breakdown of the distinction between
intelligence and criminal investigations becomes apparent when you see
other expansions of Government power under FISA in this bill.
Another provision that troubles me a lot is one that permits the
Government, under FISA, to compel the production of records from any
business regarding any person if that information is sought in
connection with an investigation of terrorism or espionage.
I want to be clear here, as well, we are not talking about travel
records directly pertaining to a terrorist suspect, which we can all
see obviously can be highly relevant to an investigation of a terrorist
plot. FISA already gives the FBI the power to get airline, train,
hotel, car rental, and other records of a suspect.
But this bill does much more. Under this bill, the Government can
compel the disclosure of the personal records of anyone--perhaps
someone who worked with, or lived next door to, or went to school with,
or sat on an airplane with, or had been seen in the company of, or
whose phone number was called by--the target of the investigation.
Under this new provision, all business records can be compelled,
including those containing sensitive personal information, such as
medical records from hospitals or doctors, or educational records, or
records of what books somebody has taken out from the library. We are
not talking about terrorist suspects, we are talking about people who
just may have come into some kind of casual contact with the person in
that situation. This is an enormous expansion of authority under a law
that provides only minimal judicial supervision.
Under this provision, the Government can apparently go on a fishing
expedition and collect information on virtually anyone. All it has to
allege, in order to get an order for these records from the court, is
that the information is sought for an investigation of international
terrorism or clandestine intelligence gathering. That is it. They just
have to say that. On that minimal showing, in an ex parte application
to a secret court, with no showing even that the information is
relevant to the investigation, the Government can lawfully compel a
doctor or a hospital to release medical records or a library to release
circulation records. This is truly a breathtaking expansion of police
power.
Let me turn to a final area of real concern about this legislation,
which I think brings us full circle to the cautions I expressed on the
day after the attacks. These are two very troubling provisions dealing
with our immigration laws in the bill.
First, the administration's original proposal would have granted the
Attorney General extraordinary powers to detain immigrants
indefinitely, including legal permanent residents. The Attorney General
could do so based on mere suspicion that the person is engaged in
terrorism. I believe the administration was really overreaching here. I
am pleased that our distinguished chairman of the Judiciary Committee,
Senator Leahy, was able to negotiate some protections. The bill now
requires the Attorney General to charge the immigrant within 7 days
with a criminal offense or immigration violation. In the event the
Attorney General does not charge the immigrant, the immigrant must be
released.
This protection is an improvement, but the provision remains
fundamentally flawed. Even with this 7-day charging requirement, the
bill would nevertheless continue to permit the indefinite detention in
two situations. First, immigrants who win their deportation cases may
be continued to be held if the Attorney General continues to have
suspicions. Second, this provision creates a deep unfairness to
immigrants who are found not to be deportable for terrorism but have an
immigration status violation, such as overstaying a visa. If the
immigration judge finds that they are eligible for relief from
deportation, and therefore can stay in the country--for example, if
they have longstanding family ties here--nonetheless, the Attorney
General can continue to hold them indefinitely.
I am pleased that the final version of the legislation includes a few
improvements over the bill that passed the Senate. In particular, the
bill would require the Attorney General to review the detention
decision every 6 months. And it would only allow the Attorney General
or the Deputy Attorney General--not lower level officials--to make that
determination.
While I am pleased these provisions are included in the bill, I
believe it still falls short of meeting even basic constitutional
standards of due process and fairness.
The bill continues to allow the Attorney General to detain persons
based on mere suspicion. Our system normally requires higher standards
of proof for a deprivation of liberty. For example, deportation
proceedings themselves are subject to a clear and convincing evidence
standard. And, of course, criminal convictions require proof beyond a
reasonable doubt. The bill also continues to deny detained persons a
trial or a hearing where the Government would be required to prove that
that person is, in fact, engaged in terrorist activity. I think this is
unjust and inconsistent with the values of our system of justice that
we hold dearly.
Another provision in the bill that deeply troubles me allows the
detention and deportation of people engaging in innocent associational
activity. It would allow for the detention and deportation of
individuals who provide lawful assistance to groups that are not even
designated by the Secretary of State as terrorist organizations but
instead have engaged in something vaguely defined as ``terrorist
activity'' sometime in the past. To avoid deportation, the immigrant is
required to prove a negative: That he or she did not know, and should
not have known, that the assistance would further terrorist activity.
I think this language creates a very real risk that truly innocent
individuals could be deported for innocent associations with
humanitarian or political groups that the Government later chooses to
regard as terrorist organizations. Groups that could fit this
definition could include Operation Rescue, Greenpeace, and even the
Northern Alliance fighting the Taliban in northern Afghanistan. So this
really amounts to a provision of ``guilt by association,'' which I
think violates the first amendment.
Speaking of the first amendment, under this bill, a lawful permanent
resident who makes a controversial speech that the Government deems to
be supportive of terrorism might be barred from returning to his or her
family after taking a trip abroad.
Despite assurances from the administration at various points in this
process that these provisions that implicate associational activity
would be improved, there have been no changes in the bill on these
points since it passed the Senate.
Here is where my caution in the aftermath of the terrorist attacks
and my concern about the reach of the antiterrorism bill come together.
To the extent that the expansion of new immigration powers that the
bill grants the Attorney General are subject to abuse, who do we think
is most likely to bear the brunt of that abuse? It probably won't be
immigrants from Ireland. It probably won't be immigrants from El
Salvador or Nicaragua or immigrants from Haiti or Africa. Most likely
it will be immigrants from Arab, Muslim and South Asian countries.
In the wake of these terrible events, our Government has been given
vast new powers, and they may fall most heavily on a minority of our
population who already feel particularly, acutely the pain of this
disaster.
Concerns of this kind have been raised with the administration.
Supporters of this bill have just told us: Don't worry, the FBI would
never do that. I call on the Attorney General and the Justice
Department to ensure that my fears are not borne out.
The antiterrorism bill we consider in the Senate today, of course,
highlights the march of technology and how that march cuts both for and
against personal liberty. But Justice Brandeis foresaw some of the
future in a 1928 dissent when he wrote:
[[Page S11023]]
The progress of science in furnishing the Government with
means of espionage is not likely to stop with wire-tapping.
Ways may some day be developed by which the Government,
without removing papers from secret drawers, can reproduce
them in court, and by which it will be enabled to expose to a
jury the most intimate occurrences of the home. . . . Can it
be that the Constitution affords no protection against such
invasions of individual security?
We must grant law enforcement the tools that it needs to stop this
terrible threats, but we must give them only those extraordinary tools
that they need and that relate specifically to the task at hand.
In the play, ``A Man for All Seasons,'' Sir Thomas More questions the
bounder Roper whether he would level the forest of English laws to
punish the Devil. ``What would you do?'' More asks, ``Cut a great road
through the law to get after the Devil?'' Roper affirms, ``I'd cut down
every law in England to do that.'' To which More replies:
And when the last law was down, and the Devil turned round
on you--where would you hide, Roper, the laws all being flat?
This country's planted thick with laws from coast to coast .
. . and if you cut them down . . . d'you really think you
could stand upright in the winds that would blow then? Yes,
I'd give the Devil benefit of law, for my own safety's sake.
We must maintain our vigilance to preserve our laws and our basic
rights. We in this body have a duty to analyze, to test, to weigh new
laws that the zealous and often sincere advocates of security would
suggest to us. That is what I have tried to do with the anti-terrorism
bill, and that is why I will vote against this bill when the roll is
called.
Protecting the safety of the American people is a solemn duty of the
Congress. We must work tirelessly to prevent more tragedies like the
devastating attacks of September 11. We must prevent more children from
losing their mothers, more wives from losing their husbands, and more
firefighters from losing their heroic colleagues. But the Congress will
fulfill its duty only when it protects both the American people and the
freedoms at the foundation of American society.
So let us preserve our heritage of basic rights. Let us practice as
well as preach that liberty, and let us fight to maintain that freedom
that we call America.
Madam President, I reserve the remainder of my time.
The PRESIDING OFFICER. Who yields time?
Mr. REID. Madam President, on behalf of Senator Leahy, I yield 10
minutes to the Senator from North Dakota.
Mr. HATCH. May I make a few comments before?
Mr. REID. When the Senator from Utah finishes his remarks, I ask that
the Senator from North Dakota be recognized for 10 minutes.
The PRESIDING OFFICER. Without objection, it is so ordered.
The Senator from Utah.
Mr. HATCH. I rise to address briefly a couple of the points made by
the distinguished Senator from Wisconsin.
First, what he called a ``sneak and peek'' search warrant, these
warrants are already used throughout the United States, throughout our
whole country. The bill simply codifies and clarifies the practice
making certain that only a Federal court, not an agent or prosecutor,
can authorize such a warrant.
Let me be clear. Courts already allow warrants under our fourth
amendment. It is totally constitutional. It has been held so almost
from the beginning of this country; some will say from the beginning of
this country. Together with Senator Leahy, we carefully drafted a
provision that standardizes this widely accepted practice.
Second, to respond to the suggestion that the legislation is not
properly mindful of our constitutional liberties--my friend from
Wisconsin talks theoretically about maybe the loss of some civil
liberties--I would like to talk concretely about the loss of liberty of
almost 6,000 people because of the terrorist acts on September 11. I am
a little bit more concerned right now about their loss of life. I am
even more concerned now that they have lost their lives that thousands
of other Americans don't lose their lives because we fail to act and
fail to give law enforcement the tools that are essential.
It is a nice thing to talk about theory. But we have to talk about
reality. We have written this bill so the constitutional realities are
that the Constitution is not infringed upon and civil liberties are not
infringed upon except to the extent that the Constitution permits law
enforcement to correct difficulties.
Yes, I think we must protect the Constitution, and that has been at
the top of my list all through my 25 years in the Congress. This bill
does just that. Nothing in this bill undermines constitutional liberty.
Nothing in this bill comes remotely close to the Alien and Sedition
Act, which, of course, was held to be unconstitutional, or the
internment of Japanese prisoners of war, which was a disgrace--there is
no question about it, but at that point it was held to be
constitutional--or the other outrages that have occurred in the past
that were mentioned by the distinguished Senator from Wisconsin.
The tools we are promoting in this legislation have been carefully
crafted to protect civil liberties. In addition to protecting civil
liberties, give law enforcement the tools they need so we, to the
extent we possibly can, will be able to protect our citizens from
events and actions such as happened on September 11 of this year.
Thousands of Americans died that day, thousands. That is real. We
have been told there may be some other actions taken by terrorists.
That may be real. To the extent that may be real, we sure want to make
sure our law enforcement people, within the constraints of the
Constitution, have the optimum law enforcement tools they need to do
the job.
As the past few weeks have made clear, these terrorists still have a
gun pointed at the heads of all the American people. Under such
circumstances, it is our sworn duty to do everything in our power,
within the bounds of the Constitution, to protect and defend our
people. That is what this bill does.
The Senator from Wisconsin worries about the ``possible'' loss of
civil liberties. That is laudable. But I am more concerned about the
actual loss of the thousands of lives that have been lost and the
potential of other lives that may be lost because we don't give law
enforcement the tools they need.
This bill protects us, to the extent that we possibly can, against
further attacks such as occurred on September 11 and many, many other
potential attacks as well.
I think most people in this country would be outraged to know that
various agencies of Government, the intelligence community, and law
enforcement community, under current law--until this bill is passed--
cannot exchange information that might help interdict and stop
terrorism. People are outraged when they hear this. And they ought to
be.
The fact is that that is the situation. I know the heads of the
Criminal Division of the Justice Department have said that: Unless we
can share this information, we cannot pick up the people who are
terrorists, whom we need to stop, in time to stop them. I think they
would be outraged to know that, under title III, you cannot
electronically surveil a terrorist unless there is some underlying
criminal predicate. In many cases, there is no underlying criminal
predicate, so you can't do to terrorists what we can do for health care
fraud, or for sexual exploitation of children, or for the Mafia, or for
drug dealers.
People would be amazed to know we treat terrorism with kid gloves in
the current criminal code. This bill stops that. I think most people
would be amazed to know that pen register trap-and-trace devices are
not permitted against terrorists under provisions of the law today. You
can't get the numbers called out of the phone and you can't get the
numbers called into the phone. That is what that means. This bill
remedies that so we can get these numbers and do what has to be done.
I think most people are shocked to find out that you can't
electronically surveil the terrorists. You have to go after the phone,
and then you have to get a warrant in every jurisdiction where that
phone shows up. Terrorists don't pay any attention to those antiquated
laws. They just buy 10 cell phones, talk for a while, and throw it out
the window. We have to be able to track terrorists. Under current law,
we cannot do that with the efficiency that needs to be used here. I
don't see any
[[Page S11024]]
civil liberties violated there, but I see some of them protected. I
think of the civil liberties of those approximately 6,000 people who
lost their lives, and potentially many others if we don't give law
enforcement the tools they need to do the job. That is what this bill
does.
I will have more to say, perhaps, on this later. I wanted to make
these particular points. I am happy to retain the remainder of my time.
The PRESIDING OFFICER. The Senator from North Dakota is recognized.
Mr. WELLSTONE. I ask unanimous consent that I may follow the Senator
from North Dakota.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. DORGAN. I understand we are under a time agreement and I am
allotted 10 minutes; is that correct?
The PRESIDING OFFICER. The Senator is correct.
Mr. DORGAN. Madam President, the legislation that is on the floor is
legislation I will vote for and support. I think it advances our
country's interests in dealing with the issue of terrorism. But I don't
want to talk about what is in the bill; I want to talk about something
that is not now in the bill and should be. I want to ask the question,
Why?
I came to the floor an hour ago and was surprised to find out that
something about which I care very much, something agreed to in the
Senate, is now no longer in this legislation. Here is the issue. I held
and chaired a hearing in my subcommittee on Appropriations a couple
weeks ago. The Customs Service was there and Immigration was there.
They said we have a system in this country called the advance passenger
information system. It is a system under which international air
carriers electronically transmit to the Customs Service passenger and
cargo manifests, so that before they enter and are cleared for
departure, we know who is on that plane and what is on that plane, so
we can determine whether there are people who should not be allowed to
enter this country. That is the advance passenger information system.
It works, but it is voluntary and only 85 percent of the carriers are
complying.
I asked at my hearing of Customs and Immigration: Should this be
mandatory? They said: Absolutely, we need you to make this mandatory.
When we had the antiterrorism bill on the floor of the Senate, I had
cleared an amendment in the managers' package that would make this
mandatory. Let me tell you of the airlines that do not comply, for
which we don't get advance passenger information: Saudi Arabia, Kuwait,
Royal Jordanian, Pakistani International, to name a few airlines that
do not comply under the voluntary standard and give us no advance
passenger information.
Mr. HATCH. If the Senator will yield, I commend the Senator. I think
he is absolutely right. We had it in the Senate bill. It was a
worthwhile provision that I think we need to include later, since we
can't do it on this bill at this point. I will support him in every way
possible to get this done in the future. I commend the Senator for
bringing this to the attention of this body because I have to say the
House absolutely would not permit us to put that in the bill.
Mr. DORGAN. I inquire of the Senator from Utah, what possibly could
be their motive to not want this in the antiterrorism bill?
Mr. HATCH. I think it came down to a jurisdictional argument. That is
my opinion. We understand that around here, but we are trying to solve
terrorism now. The Senator's point is a very good point. My main reason
for interrupting him at this point is to commend him and tell him I
will do everything in my power to get that passed. I think it is
critical that the other 15 percent be made mandatory, that they have to
comply, because most of the airlines comply on a voluntary basis.
I am sorry to interrupt the Senator. I reserve my time.
Mr. DORGAN. Madam President, I appreciate the comments of the Senator
from Utah. It is not his fault. I understand he strongly supports this.
I kind of felt blind-sided an hour ago when I was told this wasn't in
the bill we are discussing because we had cleared it. Apparently, some
folks from the other side of this Capitol have this notion of muscle
flexing with respect to jurisdictional standards. Frankly, I don't
understand that on an issue that is this important. We need advance
passenger information clearing--not on a voluntary basis but on a
mandatory basis. Somehow it got left out.
I thank the Senator from Utah for his cooperation because we are
going to get this done. This needs to be done. If we have a few small-
minded people in this Capitol simply protecting their turf and who
don't seem to worry about combating terrorism, we will move beyond them
and we are not going to pay much attention to their concerns.
If I might ask, how much time remains on my 10 minutes?
The PRESIDING OFFICER. The Senator has 6\1/2\ minutes.
Mr. DORGAN. I want to mention two other issues, and they don't relate
directly to this bill. They are very important to me.
We are talking about antiterrorism activities. We have an
organization down at the Treasury Department's Office of Foreign Asset
Control. I happen to fund that area, as I am chairman of the
Appropriations subcommittee that funds that. I want to say something I
said before the terrorist attacks of September 11. OFAC, in my
judgment, ought to be using its resources to track terrorists and track
the trail left by terrorists with the movement of money around the
globe.
But in August I pointed out that what OFAC was doing--at least with
some of its resources--and it appears that 10 percent of the resources
of OFAC is devoted to chasing little old ladies in tennis shoes from
Illinois who join a bicycle club from Canada and go bicycling in Cuba
and 15 months later get a letter from the Treasury Department that they
have a $9,500 fine. That is one example of a retired teacher from
Illinois. OFAC is chasing retired folks who go on a bicycling trip to
Cuba with a Canadian bicycling Club, and she was fined $9,500. I talked
to her and others who have been fined.
There was a $55,000 fine for someone who was with some friends in the
Cayman Islands and they decided to go to Cuba for the weekend. This guy
is wondering what on Earth has happened. He was not supposed to travel
to Cuba, but he didn't know it. OFAC is supposed to be tracking
terrorists, but they are chasing retired schoolteachers from Illinois
for taking a bicycling trip in Cuba.
Let's stop this foolishness and track the trail of terrorists. It
doesn't make sense to be doing what OFAC has been doing. First of all,
it is embarrassing. I understand the restrictions on travel, which we
should change and we will change, but should we be using 10 percent of
the assets of OFAC to track these people down and levy civil fines at a
time when terrorists are designing approaches to kill Americans? What
on Earth is going on here?
I say to Treasury and OFAC, if they are listening: Get busy doing the
right things. Get right about public policy initiatives that we are
funding you to do.
Let me mention one additional item, if I may, and again it relates to
antiterrorism, not necessarily just to this bill, and that is the issue
of northern border security. We have a 4,000-mile border between the
United States and Canada, with 128 ports of entry, and 100 of them are
not staffed at night. At 10 o'clock at night, the security between the
United States and Canada is an orange rubber cone, just a big old
orange rubber cone. It cannot talk. It cannot walk. It cannot shoot. It
cannot tell a terrorist from a tow truck. It is just a big fat dumb
rubber cone sitting in the middle of the road.
Those who want to come in illegally at 11 or 12 o'clock at night and
are polite about it will stop in front of the rubber cone, remove the
rubber cone, drive through, and replace it. Those who do not care will
shred it at 60 miles an hour. That is supposed to be security in this
country.
We know a terrorist came across that northern border at Port Angeles.
This particular Middle Eastern terrorist was going to create
substantial bombing activities of public facilities at the turn of the
millennium in Los Angeles. We know the terrorists know where it is easy
to get through our border and where it is not.
Having said all that, that a rubber cone is no substitute for
security, the Treasury Department has said to this
[[Page S11025]]
Congress that none of the $20 billion we appropriated for security is
going to go for increased resources at the northern border for Customs.
The other side, Immigration and Border Patrol, are going to get
increased resources, but the Treasury Department says: No, we do not
need additional resources with the Customs Service.
Nothing could be further from the truth. I am just asking these
people who are thinking through these issues to start thinking the
right way. We do need additional resources. That is why we provided the
$20 billion. We do need additional security on the northern border.
Yes, orange rubber cones are inexpensive. They are also ineffective.
They are no substitute for security in this country. I know I am going
a bit afield from this bill, but I wanted to make the other two points
about OFAC and what it is doing and northern border security because
that, too, relates to the issue of antiterrorism and this country's
ability to deal with the terrorist threats.
I conclude by saying I came here to talk about the advance passenger
information system. I, again, feel terrible it was left out of this
bill because we had agreement in the Senate. I understand some folks in
the House refused to move on this issue.
One way or another I am going to get this done in the next couple of
weeks. I will find a bill, a vehicle. This is going to get done. I
appreciate the willingness of the Senator from Vermont and the Senator
from Utah to help me do that. That is a glaring omission from this
bill, and if the House does not want to do it on this bill, we will
force them to do it on another bill.
Madam President, I yield the floor.
The PRESIDING OFFICER. The Senator from Nevada.
Mr. REID. Madam President, on behalf of senator Leahy, I yield 10
minutes to the Senator from Massachusetts, and I ask unanimous consent
that his remarks follow--there is an order already in effect for
Senator Wellstone to be heard now--the remarks of Senator Wellstone.
The PRESIDING OFFICER. Without objection, it is so ordered.
The Senator from Minnesota.
Mr. WELLSTONE. I thank the Chair.
Madam President, this is one of the most important pieces of
legislation we will consider during this Congress. The horrific loss of
life and destruction that occurred on September 11, the crime against
humanity, changed us as a country. The Uniting and Strengthening
America Act is an opportunity to help ensure that such terrorist
attacks do not occur again. We need to improve all aspects of our
domestic security, including by enhancing our intelligence capacities
so that we can identify possible future attacks in their planning
stages and prevent them from happening. We must be vigilant and willing
to invest the resources and time required to gather the information
that we need to protect ourselves and our way of life.
I appreciate the enormous amount of time and energy that my
colleagues in both Chambers have put into this legislation. They have
done their best to balance the risk of further terrorist attacks with
possible risks to civil liberties. This comprehensive bill includes
measures to enhance surveillance; improve the working relationship
among Federal, State, and local agencies; strengthen border control;
permit the detention of certain suspects who may be the subject of
investigative efforts; help crime victims; respond to bioterrorism; and
crack down on money laundering.
I am especially supportive of two new important provisions added in
conference that will enhance domestic preparedness against future
attacks, at the local level: the First Responders Assistance Act, and
the Grant Program for State and Local Domestic Preparedness Support.
These provisions authorize grants to State and local authorities to
respond and prevent acts of terrorism, particularly for terrorism
involving weapons of mass destruction and biological, nuclear, and
chemical devices; and revises an existing grant program to provide 1,
additional flexibility to purchase needed equipment; 2, training and
technical assistance to State and local first responders; and 3, a more
equitable allocation of funds to all States.
Last week I traveled to Moorhead, Mankato and Rochester, MN and
talked with firefighters and first-responders about this very issue.
They told me they desperately need training and equipment to address
our new terrorism risks. These local grants are extremely important to
address the needs our most important asset in the fight against
terrorism: those law enforcement and emergency personnel on the front
lines.
Although I still have some reservations about certain provisions of
the bill as they might affect civil liberties, and wish that it were
more tightly targeted to address only actions directly related to
terrorism or suspected terrorism, I am pleased with the inclusion of
several key civil liberty safeguards. The bill requires certain
electronic reports to go to a judge when pen registers are used on the
internet; includes provisions requiring notification to a court when
grand jury information is disclosed; and contains a 4-year sunset with
limited grandfathering for several of the electronic surveillance
provisions.
The bill expands the Regional Information Sharing Systems Program to
promote information sharing among Federal, State, and local law
enforcement have a critical role to play in preventing and
investigating terrorism, and this bill provides them benefits
appropriate to such duty. The bill streamlines and expedites the Public
Safety Officers' Benefits application process for family members of
fire fighters, police officers and other emergency personnel who are
killed or suffer a disabling injury in connection with a future
terrorist attack. And it raises the total amount of the Public Safety
Officers' Benefit Program payments from approximately $150,000 to
$250,000.
This bill will also make an immediate difference in the lives of
victims of terrorism and their families. It refines the Victims of
Crime Act and by doing so improves the way in which its crime fund is
managed and preserved. It replenishes the emergency reserve of the
Crime Victims Fund with up to $50 million and improves the mechanism to
replenish the fund in future years. The USA Act also increases security
on our northern border, including the border between Canada and my
State of Minnesota. It triples the number of Border Patrol, Customs
Service, and INS inspectors at the northern border and authorizes $100
million to improve old equipment and provide new technology to INS and
the Customs Service at that Border.
On the criminal justice side, the bill clarifies existing
``cybercrime'' law to cover computers outside the United States that
affect communications in this country and changes sentencing guidelines
in some of these cases. It provides prosecutor better tools to go after
those involved in money laundering schemes that are linked to
terrorism, and it adds certain terrorism-related crime as predicates
for RICO and money-laundering. At the same time, the bill establishes
procedures to protect the rights of persons whose property may be
subject to confiscation in the exercise of the government's
antiterrorism authority. It strengths our Federal laws relating to the
threat of biological weapons and enhances the Government's ability to
prosecute suspected terrorists in possession of biological agents. It
will prohibit certain persons, particularly those from countries that
support terrorism, from possessing biological agents. And it will
prohibit any person from possessing a biological agent of a type of
quantity that is not reasonably justified by a peaceful purpose.
I support these much-needed measures. And I especially support the
four-year sunset provision for several of the electronic surveillance
provisions. I do wish, however, that some provisions were might tightly
targeted to address only actions directly related to terrorism or
suspected terrorism. It is for this reason, I believe we will need to
monitor the use of new authorities provided to law enforcement agents
to conduct surveillance. The bill broadens the Foreign Intelligence
Surveillance Act, FISA, by extending FISA surveillance authority to
criminal investigations, even when the primary purpose is not
intelligence gathering. The bill limits this ability by authorizing
surveillance only if a significant purpose of it is to gather
intelligence information. I hope this new FISA authority will be used
for the purpose of investigating and preventing terrorism or
[[Page S11026]]
suspected terrorism, and not for other domestic purposes. The bill also
allow surveillance to follow a person who uses multiple communications
devices or locations, the so-called ``roving-wiretap.'' Again, I am
hopeful this new authority will not be abused.
We have done our best in this bill to maximize our security while
minimizing the impact some of these changes may have on our civil
liberties. Nearly all of us have probably said since September 11 that
if that day's terror is allowed to undermine our democratic principles
and practices, then the terrorists will have won a victory. We should
pass this bill today. And we should also commit ourselves to monitoring
its impact of civil liberties in the coming months and years.
Our challenge is to balance our security with our liberties. While it
is not perfect, I believe we are doing that in this bill.
Madam President, it is a jarring analogy, but I use it to explain how
I arrived at my decision on this legislation. In 1940 and 1941, the
Germans engaged in an unprecedented attack on the civilian population
of Great Britain. The goal was to weaken citizens in their fight
against Nazism. At the end of that attack, 20,000 people were killed.
On September 11 in our country, close to 6,000 innocent people were
massacred.
It is absolutely the right thing to take the necessary steps to try
to prevent this from happening and to provide protection to people in
our country.
There are many provisions in this legislation with which I agree.
They are important to people in Minnesota, Michigan, and around the
country, by way of what we need to do to protect our citizens.
When it comes to electronic surveillance, as Senator Feingold has
stated with considerable eloquence, the legislation goes too far and
goes beyond world terrorists, who I think are a real threat to people
in our country and other nations as well.
How do I balance it out? My view is that I support this legislation
because all of the positive issues, which I will go into in a moment,
that are so important to the people I represent have to do with
protecting the lives of people. If we do not take this action and we
are not able to protect people, then more people can die, more people
will be murdered. That is irreversible. We cannot bring those lives
back.
This legislation has a 4-year sunset. I said when the Senate passed
the bill that I would reserve final judgment as to whether I vote for
the final product based on whether there will be a 4-year sunset when
it comes to electronic surveillance. We can monitor--there will be some
abuses, I think--we can monitor that, and if there are abuses, it is
reversible; we can change it. That is why I err on the side of
protecting people, and it is why I support this legislation.
The bill includes measures to enhance surveillance, to improve the
working relationships of Federal, State, and local agencies--that has
to happen--to strengthen control of the Canadian border. For our States
up North, that is very important. When it comes to the detention of
certain suspects who may be the subject of investigative efforts, there
are safeguards against unlimited detention.
I thank Senator Leahy and Senator Hatch and others for pulling back
from some of the original proposals which made this a much better piece
of legislation.
There is a crackdown on money laundering. I thank Senator Sarbanes
and Senator Kerry and others for their fine work.
There is another provision that is very important. The First
Responders Assistance Act and grant program all go together. When I
traveled to greater Minnesota last week, when I went to Moorhead,
Mankato, Rochester, and Duluth, I spoke with fire chiefs and all said:
We are the first responders. We know that from New York. Please get
some resources back to the local level. It is a local public safety
model where if you give us the resources, let us assess our needs--we
have the training; we may need additional equipment--if you are going
to talk about the ways we can best protect people, we are going to
protect people where they live, where they work, or where their
children go to school. Getting the resources to the local community,
the fire chiefs, and police chiefs is critically important.
As I said, there are some key civil liberty safeguards. The bill
requires certain electronic reports to go to a judge when pen registers
are used on the Internet. It includes provisions requiring notification
to a court when grand jury information is disclosed, and it contains
the 4-year sunset when it comes to the electronics surveillance
provisions. That is critically important.
The bill streamlines and expedites the public safety officers
benefits application for the firefighters and the police officers and
others who were killed and suffered disabling injuries.
It raises the total amount of the Public Safety Officers' Benefits
Program.
The Victims Crime Act is in this bill.
It improves the way the crime fund is managed. It replenishes the
emergency fund for crime victims up to $50 million. This is really
important.
These are the important provisions.
On the other hand, I do wish some of the provisions were more tightly
targeted to address only actions directly related to terrorism or
suspected terrorism. It is for this reason that I think it is
critically important each and every Senator and Representative monitor
the use of new authorities provided to the law enforcement agency to
conduct surveillance.
We are going to have to monitor this aspect very closely. It has been
said, and it should be said, we do not want to pass legislation that
undermines our democratic principles or practices. If we do that, the
terrorists have won a victory. If I thought this was such legislation,
I would not support it.
I will say this one more time: From my point of view, this
legislation is better than it was when it passed the Senate. The sunset
provision is critically important. Ultimately, where I come down is if
we do not take some of these steps with some of the provisions I have
outlined, which are very important, very positive in protecting people,
and more people are killed and there is more loss of life of innocent
people, you cannot bring those lives back.
I am not a lawyer, and this is my layperson way of analyzing this. If
there are some abuses with the surveillance, we monitor it, we can pass
new legislation, and we can change it. It sunsets in 4 years. That is
reversible. I err on the side of protection for people.
I wish we did not even have to consider this legislation. I wish we
were not even living in these times. I believe terrorism is going to be
a part of our lives. I think it is going to be a part of our children's
lives. I think it is going to be a part of our grandchildren's lives. I
think this is going to be the struggle for several generations to come.
No one action and no one step is going to end it. I think that is now
the world, unfortunately, in which we live. That is now the world in
which all of God's children live.
There are some things we are going to have to do differently and, as
I said, we must be vigilant. Where there are excesses, we need to
change that. I do believe this legislation is an important step in the
direction of trying to prevent this and providing protection to our
citizens.
I yield the floor.
The PRESIDING OFFICER (Mr. Nelson of Nebraska). The Senator from
Massachusetts.
Mr. KERRY. Mr. President, I support the conference report before the
Senate today. It reflects an enormous amount of hard work by the
members of the Senate Banking Committee and the Senate Judiciary
Committee. I congratulate them and thank them for that work.
I particularly thank Senator Daschle, Senator Leahy, Senator
Sarbanes, Senator Hatch, and Senator Levin for their work in developing
this legislation. I am pleased the Conference Report includes what I
consider to be a very important provision regarding money laundering
that has been hard fought over and, frankly, long awaited for. We have
been working on this for quite a few years, almost 10 years or more
when I was a member of the Banking Committee and within the Foreign
Relations Committee where I was Chairman of the Subcommittee on
Narcotics, Terrorism and International Operations. This really is the
culmination of much of that work.
[[Page S11027]]
I am pleased at the compromise we have reached on the antiterrorism
legislation, as a whole, which includes the sunset provision on the
wiretapping and electronic surveillance component. It has been a source
of considerable concern for people, and I think the sunset provision
provides Congress a chance to come back and measure the record
appropriately, and that is appropriate.
The reason I think the money-laundering provision is so important is
it permits the United States--it really authorizes and gives to the
Secretary of the Treasury the power to be able to enforce the interests
of the United States. It allows the Secretary to deny banks and
jurisdictions access to our economy if in the last measure they are not
cooperative in other ways to prevent money laundering from being a tool
available to terrorists.
This is a bill I introduced several years ago that assists our
ability to be able to crack down on the capacity for criminal elements,
not just terrorists, who are criminals themselves. But also narcotics
traffickers, arms proliferators, people who traffic in people
themselves. There are all kinds of criminal enterprises which benefit
from access to the American financial system. All of these will now be
on notice that our law enforcement community has additional tools to
use to be able to close the incredible benefits of access to the
American financial marketplace.
The global volume of laundered money staggers the imagination. It is
estimated to be 2 to 5 percent of the gross domestic product of the
United States. That is $600 billion to $1.5 trillion that is laundered,
that comes into the country or passes through banks without
accountability. Those funds escape the tax system, for one thing. So
for legitimate governments struggling to fairly distribute the tax base
while the average citizen who gets their paycheck deducted or those
good corporate citizens and others who live by the rules, they are
literally being required to assume a greater burden because other
people using the laundering and lack of accountability escape that
responsibility.
The effects of money laundering go far beyond the parameters of law
enforcement, creating international political issues and generating
very genuine domestic political crises. International criminals have
taken advantage of the technology and the weak financial supervision in
many jurisdictions to simply smuggle their funds into our system.
Globalization and advances in communications and technologies have
allowed them to move their illicit gains with much more secrecy, much
faster, commingled, and in other ways that avoid or complicate
significantly the ability of prosecutors to be able to do their job.
Many nations, some of them remote, small islands that have no real
assets of their own, have passed laws solely for the purpose of
attracting capital illicitly, as well as legally. By having the legal
capital that is attracted by virtue of the haven that is created, they
provide the cover for all of the illicit money. There are places not so
far away from us, islands in the Caribbean and elsewhere, which at last
count I remember $400 billion of assets that supposedly belong to this
island in about 1 square mile of the downtown area, most of which was
the property of entities that had a brass plate on a door and a fax
machine inside, perhaps a telephone number, and that was sort of the
full extent of the corporate entity.
So there is $400 billion on an island that everybody knows is not on
the island. Where does it go? It goes back into the financial
marketplace where it earns interest, is invested, goes into legitimate
efforts, much of it legitimate money to begin with but a whole portion
of it not. I might add, with the knowledge of people involved in those
businesses and many of the banks that receive it.
So if one is going to cope with an al-Qaida, with a terrorist entity
such as Osama bin Laden, who moves his money into this legitimate
marketplace, law enforcement has to have the ability to be able to hold
people accountable where it is legitimate to do so.
Now obviously we do not want to do that where there is a legitimate
enterprise, and we do not want to create a crossing of the line of the
corporate veil that has been protected for a long period of time, and I
am not urging that we do that. But we do have to have a system in
place, where probable cause exists, for law enforcement entities.
I spent a number of years as a prosecutor. We make pretty good
judgments in the law enforcement community about probable cause. They
are not always without question, and they are not, obviously, without
error at times. We understand that. We have a pretty good system in the
United States to protect against that. What we are trying to do with
this legislation is to put those protections in place, but even as we
put in a series of steps that allow the Secretary of the Treasury to be
able to target a particular area as a known money-laundering problem,
and then be able to require of the government of that entity, a
cooperative effort. It is only if the entity or government's
cooperative effort at several different stages is not forthcoming that
the Secretary would ultimately consider exercising the power to denying
that entity as a whole, or individual banks or other financial
institutions, access to our financial marketplace and to its benefits.
I believe this leverage will be critical in our ability to wage a war
on terrorism, as well as to be able to wage a sufficient law
enforcement effort against the criminal enterprises that exist on a
global basis.
I think the Secretary will have a number of different options and it
will provide a transparency and an accountability that is absent today.
Let me comment on one criticism that is often raised by some
opponents of this legislation who do not like the idea that the United
States should somehow put in place sanctions against an entity that has
a lower tax rate than we happen to have. I emphasize there is nothing
in this legislation that empowers us to take action because another
government has a lower tax rate. That is their privilege. It is
healthy, as all Members know, to have competition in the marketplace of
taxes, too. The Chair is a former Governor and he knows well the
competition between States. States will say: We will not have a sales
tax; we will not have an excise tax; we will try to make ourselves more
business friendly. We want to be as competitive and as low tax as we
conceivably can be.
We are not seeking to try to address those jurisdictions that simply
make themselves more competitive on a tax basis. What we are trying to
address are those jurisdictions that not only have lower taxes but use
the lower taxes, coupled with a complete absence of accountability, a
complete absence of transparency, a complete absence of living by the
law enforcement standards of other parts of the world, to knowingly
attract the illicit gains that come from criminal activity or that
attract and move terrorist money through the world.
We are simply putting into place the standards by which most of the
developed world is living. Ultimately we hope all countries will adopt
appropriate money laundering standards so we can all live in a safer
world.
Passage of this legislation is going to make it a lot more difficult
for new terrorist organizations to develop. I can remember a number of
years ago when I was chairing the subcommittee on Narcotics, Terrorism
and International Operations, I conducted an investigation into a bank
called BCCI, the Bank of Credit Commerce International. We uncovered a
complex money-laundering scheme involving billions of dollars.
Fortunately, BCCI was forced to close. We were able to bring many of
those involved in it to justice. But we have learned since the closing
that BCCI was a bank that had a number of Osama bin Laden's accounts.
We learned when BCCI closed, we dealt Osama bin Laden a very serious
blow.
So as the Congress gives final approval to this legislation in
response to these attacks, we need to keep in our focus the benefits
that will come to us by pressing these money laundering standards on
banks. With the passage of this legislation, terrorist organizations
will not be able to move funds as easily and they will not be able to
have their people move within our country with bank accounts that we
cannot
[[Page S11028]]
penetrate, with major sources of funding transferred to them from the
Middle East or elsewhere to empower them to be able to do the kind of
things they did on September 11.
I also point out this bill will require the U.S. financial
institutions to use appropriate caution and diligence when opening and
managing accounts for foreign financial institutions. It will actually
prohibit foreign shell banks, those who have no physical location in
any country, from opening an account in the United States. Think about
that. We currently allow a bank that has no physical presence
anywhere--a bank--to open an account in the United States. That is
today. With this legislation, that will change. It is high time.
The conference report expands the list of money-laundering crimes and
will assist our law enforcement efforts in making it easier to
prosecute those crimes. It requires the Federal Reserve to take into
consideration the effectiveness financial institutions in combating
money-laundering activities before any merger is approved. We will have
an ability to judge the road traveled before we open up new
opportunities for financial institutions.
The following is a description of the legislative intent of the
Counter Money Laundering and Foreign Anti-Corruption Act of 2001 which
was included in section 311 of subtitle A--International Counter Money
Laundering and Related Measures of the conference report. First, the
Secretary of the Treasury determines whether ``reasonable grounds exist
for concluding'' that a foreign jurisdiction, a financial institution
operating in a foreign jurisdiction, or a type of international
transaction, is of ``primary money laundering concern.'' In making this
determination, the Secretary must consult with the Secretary of State,
the Attorney General, the Secretary of Commerce, and the United States
Trade Representative. The Secretary is also directed to consider any
relevant factor, including the quality of a jurisdiction's bank
secrecy, bank supervision, and anti-money laundering laws and
administration, the extent to which a particular institution or type of
transaction is involved in money laundering as compared to legitimate
banking operations, whether the U.S. has a mutual legal assistance
treaty with the jurisdiction and whether the jurisdiction has high
levels of official or internal corruption.
Second, if a jurisdiction, institution, or transaction is found to be
a ``primary money laundering concern,'' the Secretary then selects from
a menu of five ``special measures'' to address the identified issue.
these five special measures are: requiring additional record keeping
and/or reporting on particular transactions; requiring reasonable and
practicable steps to identify the beneficial foreign owner of an
account opened or maintained in a domestic financial institution;
requiring the identification of those using a foreign bank's payable-
through account with a domestic financial institution; requiring the
identification of those using a foreign bank's correspondent account
with a domestic financial institution; and restricting or prohibiting
the opening or maintaining of certain corresponding accounts for
foreign financial institutions. The special measure relating to the
restriction or prohibition of accounts can only be imposed by
regulation. However, nothing in this legislation will in any way
restrict the right of the Secretary of the Treasury to impose a rule
immediately and to ask for comment at the same time. The other four
special measures may not remain in effect for more than 120 days,
except pursuant to a rule promulgated on or before the end of the 120-
day period beginning on the date of the issuance of such order.
In choosing which ``special measure'' to impose and how to tailor it,
the Secretary shall consider the extent to which they are used to
facilitate or promote money laundering, the extent to which they are
used for legitimate business purposes and the extent to which such
action will sufficiently guard against money laundering. The Secretary
is also to consult with the Chairman of the Board of Governors of the
Federal Reserve. If the Secretary is considering prohibiting or
restricting correspondent accounts, he is also to consult with the
Secretary of State and the Attorney General. The Secretary is also
obligated to consider three factors: whether other countries or
multilateral groups are taking similar actions; whether the imposition
of the measure would create a significant competitive disadvantage for
U.S. firms, including any significant cost or compliance; the extent to
which the action would have an adverse systemic impact on the payment
system and legitimate business; and the effect of such action on United
States national security and foreign policy.
Within 10 days of invoking any of the special measures against a
primary money laundering concern, the Secretary must notify the House
and Senate Banking Committees of any such action taken.
The conference report includes a provision within section 351
relating to reporting of suspicious transactions which clarifies that
the ``safe harbor'' from civil liability for filing a Suspicious
Activity Report (SAR) applies in any litigation, including suit for
breach of contract or in an arbitration proceeding and clarifies the
prohibition on disclosing that a SAR has been filed.
Section 353 of the conference report also includes a provision that
increases penalties for violation of Geographic Targeting Orders (GTO)
by making it a civil and criminal offense on par with existing law to
file reports required by a Geographic Targeting Order; requiring
structuring transactions to fall below a GTO-lowered threshold a civil
and criminal offense on par with structuring generally; and extends the
presumptive GTO period from 60 to 180 days.
Finally, section 355 of the conference report includes a provision
that grants financial institutions civil immunity for including
suspicions of criminal wrongdoing in a written reference on a current
or former employer.
It has been brought to my attention that this bill, as originally
passed by the House, contained a rule of construction which could have
limited our ability to provide assistance and cooperation to our
foreign allies in their battle against money laundering. The House-
passed rule of construction could have potentially limited the access
of foreign jurisdictions to our courts and could have required them to
negotiate a treaty in order to be able to take advantage of our money-
laundering laws in their fight against crime and terrorism. The
conference report did not include a rule of construction because the
Congress has always recognized the fundamental right of friendly
nations to have access to our courts to enforce their rights. Foreign
jurisdictions have never needed a treaty to have access to our courts.
Since some of the money-laundering conducted in the world today also
defrauds foreign governments, it would be hostile to the intent of this
bill for us to interject into the statute any rule of construction of
legislative language which would in any way limit our foreign allies
access to our courts to battle against money laundering. That is why we
did not include a rule of construction in the conference report. That
is why we today clarify that it is the intent of the legislature that
our allies will have access to our courts and the use of our laws if
they are the victims of smuggling, fraud, money laundering, or
terrorism. I make these remarks today because there should be no
confusion on this issue and comments made by others should not be
construed as a reassertion of this rule of construction which we have
soundly rejected. Our allies have had and must continue to have the
benefit of U.S. laws in this fight against money laundering and
terrorism.
Smuggling, money laundering, and fraud against our allies are an
important part of the schemes by which terrorism is financed. It is
essential that our money laundering statutes have appropriate scope so
our law enforcement can fight money laundering wherever it is found and
in any form it is found. By expanding the definition of ``Specified
Unlawful Activity'' to include a wide range of offenses against
friendly nations who are our allies in the war against terrorism, we
are confirming that our money laundering statutes prohibit anyone from
using the United States as a platform to commit money laundering
offenses against foreign jurisdictions in whatever form that they
occur. it should be clear that our intention that the
[[Page S11029]]
money laundering statues of the United States are intended to insure
that all criminals and terrorists cannot circumvent our laws. We shall
continue to give our full cooperation to our allies in their efforts to
combat smuggling and money laundering, including access to our courts
and the unimpeded use of our criminal and civil laws.
Ms. CANTWELL. Mr. President, we must act on many fronts to wage a
successful fight against terrorism. The USA Patriot Act of 2001 will
provide our law enforcement agencies with significant new tools to
fight this battle on the home front. There are many good things in this
bill. I am especially pleased that the bill includes language to allow
the tripling of manpower on our northern border. The bill also includes
a provision to set a new technology standard for our visa program so we
can better identify people coming into this country. I am very proud of
the many tools in the bill for law enforcement. This legislation
increases the number of FISA judges to speed law enforcement's ability
to get taps in place and going and contains excellent new provisions to
help law enforcement and banks better track and freeze financial assets
of terrorists. Further, the bill provides for expedited hiring and
training of FBI translators. Finally, the legislation takes steps to
allow better sharing of information between the law enforcement and
intelligence communities, although I believe this sharing and
coordination would be better accomplished with a process for judicial
review.
But I have my concerns, as well, with the scope and the pace of these
sweeping changes. We may have gone further than we really need to go to
address terrorism. Thanks to the extremely hard work of Senator Leahy
and his staff, Senator Hatch and others in both houses of Congress,
this legislation is much more carefully tailored to addressing
terrorism than the legislation proposed by the Administration only a
short month ago. But I remain concerned about several provisions such
as those involving wiretap authorities, pen register and trap and
trace, computer trespass, access to business records and other new
legal authorities which will not require a showing by the government of
probable cause or allow for any meaningful judicial review. The scope
of these provisions may make them susceptible to abuse--allowing
inappropriate, possibly unconstitutional, intrusion into the privacy of
American citizens. I am pleased that some of the most disconcerting
provisions of this legislation will expire in four years. This
``sunset'' provision will give Congress the opportunity to evaluate the
implementation of these new laws, and reassess the need for the
changes.
I would like to believe that the government's new ability to place
wiretaps on the lines of American citizens--in secret with limited
reporting and opportunity for oversight by Congress --will not be
abused. I would like to believe that technologies like Carnivore will
not be used to derive content from email communications. But I am
skeptical.
Several other aspects of this bill, when taken together, could also
interfere with Americans' enjoyment of their right to privacy without
providing value in the fight against terrorists. Those of us who feel
strongly about how new powers might chip away at traditional privacy
rights will pay close attention to how law enforcement uses these
tools.
The bill's ostensible purpose in regard to searches of personal
communication is to facilitate the sharing of information gathered in a
law enforcement context with the intelligence community. There is a
difference, however, between facilitating the sharing of information
between the law enforcement and intelligence communities, and blurring
the line between the missions of the two communities. Where information
is sought for the purpose of law enforcement, we must ensure that
fourth amendment protections apply. Our fear about the legislation
comes from a legitimate concern that information gathered ostensibly
for intelligence and defense purposes could be used for law enforcement
purposes. The intelligence community does not prosecute and lock up its
targets; it uses information to intervene against foreign nationals
seeking to harm America or Americans. But the law enforcement community
has a different mission, to catch and prosecute criminals in our courts
of law. Because law enforcement acts upon U.S. citizens, it must do so
within the bounds of the Constitution. The differences in these
missions must be acknowledged, and we must be vigilant to maintain the
distinctions.
Last week, Senator Leahy and I discussed here on the floor the need
to maintain strict oversight of the law enforcement community's use of
new authorities enumerated in this legislation. Today I want to
reiterate the need for that oversight, the need for regular Government
Accounting Office reports to Congress of the use of the new authorities
under FISA and pen register and trap and trace law and the need for the
Committee on the Judiciary to scrutinize the use of these new
authorities regularly. I am pleased that many members of the Senate
believe we must pursue this duty diligently.
I am also pleased that the final version of this legislation
incorporates a four-year limit on the applicability of these and many
other search authorities. With this ``sunset,'' law enforcement and
intelligence agencies will be able to use new powers to identify and
act on terrorist efforts and Congress will have the ability to review
fully the implications of the new law.
We can all agree that the events on September 11 have focused America
on the fight against terrorism, and we applaud the efforts of the
administration in the weeks since that tragic day. Clearly, there were
failures in our investigative network, and this legislation will help
avoid such failures in the future, allowing greater sharing of
information that could foil terrorists before they carry out their
brutal schemes against innocent civilians.
The question then becomes how to make sure that the new authority
isn't abused--in fact used for law enforcement purposes or fishing
expeditions. Over many years and with great effort, we have crafted a
careful balance in protecting personal privacy. The bottom line is this
legislation could circumvent or supersede Federal and State privacy
laws that have balanced law enforcement needs and privacy concerns,
going well beyond the changes to the law needed for intelligence
gathering. This is no ordinary time for our country. But in this
process we must remember those Fourth Amendment rights that we have so
diligently fought for in the past.
I am proud of this Congress for acting promptly and thoughtfully in
response to the horrific events of September 11. That day was an
awakening to Americans, signaling the urgency for this government to
change how we deal with terrorism. This legislation does much to
facilitate better information gathering and sharing between our law
enforcement and intelligence communities and greater protection of our
borders from the intrusion of terrorists. I am hopeful that those of us
in government have the wisdom and prudence to use these new powers in
such a way as to not undermine the freedoms we seek to protect.
Mr. President, currently, there is no single technology standard in
place that allows the Federal Government to confirm with certainty the
identity of aliens seeking entry into the United States through the
visa program. Insufficient identification technology is available to
our consular officers responsible for reviewing visa applications to
facilitate a comprehensive background check of persons applying for a
United States visa. Consular officers lack the technology to verify
that a person seeking a visa has not previously sought or received a
visa using another name or identity. Similarly, there is no widely
implemented technology that allows United States border inspectors to
confirm the identity of persons seeking admittance into the United
States using a visa.
Pursuant to Section 403(c) of the USA PATRIOT Act of 2001, the
Federal Government is required to develop and implement a technology
standard that can facilitate extremely high confidence in confirming
the identity of an alien seeking a visa or seeking entry into the
United States pursuant to a visa.
The standard required by these provisions will facilitate the capture
and sharing of all relevant identity information regarding the alien
applicant,
[[Page S11030]]
including biometrics, and information relevant to determining the
eligibility of such a person for entry into the United States from and
between all relevant departments and agencies through compatible,
interoperable systems.
The purpose of this subsection is to ensure that United States
Government will establish a technology standard to allow: 1, the State
Department, at the time a person applies for a United States visa, to
do a comprehensive background check against databases of known aliens
ineligible for entry into the United States; 2, the State Department to
verify the identity of a person applying for a United States visa as a
person who has not on a previous occasion sought a visa using a
different name or identity; and 3, United States border inspectors and
preclearance agents to confirm that a person seeking entry to the
United States on the basis of a visa is the same person who obtained
the visa from the Department of State.
Although it is understood by Congress that technological advances may
require revisions to any standard adopted pursuant to this provision,
it is expected that the standard will initially incorporate appropriate
biometric technologies to compare identity information provided by the
visa applicant to criminal, immigration and intelligence databases that
use a fingerprint biometric or a facial recognition biometric.
Further, to obtain the greatest protection of United States citizens
by excluding persons ineligible for entry into the United States, the
Department of State, the Department of Justice and other appropriate
departments of the Federal Government should work with the governments
of other countries to encourage such countries to adopt the standard
established pursuant to this subparagraph and to establish
international interoperability of identity databases. In particular, it
will be beneficial to the United States to facilitate adoption of this
technology standard for appropriate identity information exchange with
Canada and Mexico. It would further benefit the security of United
States citizens to encourage adoption of this standard by those
countries for whose citizens the United States, Canada or Mexico do not
require a visa to enter the respective country.
Paragraph (1) requires the Department of Justice and Department of
State, through the National Institute of Standards and Technology
(NIST), and in consultation with other Federal law enforcement and
intelligence agencies deemed appropriate by the Attorney General or the
Secretary of State, to develop a technology standard to facilitate
confirmation of the identity of persons seeking a visa or persons using
a visa to enter the United States. The Departments of Justice and State
shall also consult with Congress in the development of this standard
through the reporting process described in paragraph (4) of this
subsection.
This technology standard will enable the Department of State to
confirm that a person seeking a visa is not known to the Federal
Government as a person ineligible for a visa, or is a person who has
sought or obtained a visa using a different name or identity. The
technology standard will also enable Federal inspectors at all ports of
entry and preclearance locations to confirm that a person seeking entry
to the United States using a visa is the same as the person to which
the Department of State issued the visa, and is not a person sought by
the Federal Government to be excluded from entry to the United States.
The technology standard must be developed and certified by NIST
within two years of the date of enactment of this subsection.
Paragraph (2) provides that the technology standard described in
paragraph (1) shall be the basis for a cross-agency, cross-platform
electronic database system that is a cost-effective, efficient, fully
integrated means to share law enforcement and intelligence information
necessary to confirm the identity of a person applying for a United
States visa, or such a person seeking to enter the United States using
a visa.
Paragraph (3) requires that the system described in paragraph (2)
shall be implemented in a manner that is readily and easily accessible
to all consular officers responsible for the issuance of United States
visas; all Federal inspection agents at United States border inspection
points (including any preclearance locations); and all law enforcement
and intelligence officers responsible for investigation or
identification of aliens admitted to the United States pursuant to a
visa, provided that such officers are provided access to this system
pursuant to regulation.
Paragraph (4) provides that the Attorney General and the Secretary of
State jointly and in consultation with the Secretary of the Treasury,
shall report to Congress within 18 months of the date of enactment of
this Act, and every two years thereafter, describing the development,
implementation and efficacy of the technology standard described in
this subsection. The report must also consider the privacy implications
and applicability of Federal privacy laws.
The PRESIDING OFFICER. Who yields time?
Mr. HATCH. I yield the Senator as much time as he requires.
The PRESIDING OFFICER. The Senator from Missouri.
Mr. BOND. I thank the Senator from Utah, the leader on our side on
this committee.
I want to talk just in specifics about one area with which this bill
deals. We know that as a result of the tragedy of September 11 and the
continuing problems we are having with anthrax and other threats from
abroad, we need to do a better job of seeing who comes into this
country to make sure people who wish to do us harm are, if possible,
screened out before they get here so people who are visitors from
abroad who engage in things that are inappropriate, who violate the
terms of their visas or their other status, can be removed.
So after the September 11 incident happened and people started
talking about problems in immigration, I spent a full day traveling
with representatives from the INS in my State. We are in the heartland,
but Missouri is directly involved because many of these visitors come
to Missouri as well. I know the people at our major ports have even
greater problems, but we saw the problems firsthand.
I said: Why can't you get somebody out of the country if they
overstay their visa?
And they asked a very logical question: How do you know where they
are? We don't have a good system.
I said: Is it possible?
They said: You probably could not give us enough INS enforcement
agents to make sure we could find every person. They come in, they say
they are going to go to Branson, MO, or they are going to visit the
Arch in Missouri, and they may go to one or two other lesser tourist
attractions across the country, and we don't know where they are.
As a result of discussions with them and some great assistance I
received from my cosponsors, Senator Conrad and Senator Snowe, we put
together what we think are some significant improvements in the way we
deal with visitors to this country to lessen the likelihood that they
will be able to participate in causing harm to citizens of the United
States. So we have put together the Visa Integrity and Security Act. I
express our sincere appreciation to the managers of this bill and to
our colleagues in the House for adopting these principles and putting
them into the bill.
This is not going to be a total solution. Nobody can expect that we
are going to do a 100-percent job. But when we look at what has
happened in the past, we think this is going to be a significant
improvement.
As Senator Snowe pointed out, Sheik Rahman, who has been in prison
for his part in the first bombing of the World Trade Center, had been
on a watch list, the Foreign Intelligence Watch List, for years, and
nobody told the State Department or the INS, and they gave him
permanent status in the United States. That was after he had been
identified.
We are saying the criminal agencies, the law enforcement agencies
have to talk with the State Department, the people who are issuing
these visas, and let them know we should not let this guy back into the
United States. He came and went five times. That is just not
acceptable.
I also trust the State Department will change the directions in their
[[Page S11031]]
manual which has said in recent years that merely urging terrorist
activities or belonging to a terrorist organization do not disqualify
you from coming to the United States. I mean, if you are a member of
al-Qaida, you say: Oh, well, he may not be one of the murderers?
Give me a break. If there is any ground for keeping somebody out of
the United States, it ought to be that they are a member of al-Qaida. I
hope in the future we can share that information and make sure they do
not come in.
So one of the things we require is that the FBI share the National
Criminal Information System with the State Department and the INS. We
are going to ask the Director of Homeland Security to report to
Congress on the need for any other Federal agencies, intelligence
agencies, to share or feed their information into this database.
One of the things we know now is that people can come in under one
name and then change names and we don't know exactly who they are. We
don't have a foolproof method of identifying these people who come into
the United States. Isn't it about time we know for certain, before they
even come in, who they are? Doesn't it make sense that we know for
certain who they are when they are in the United States?
I talked with the dean of the engineering school at the University of
Missouri at Columbia. He said 10 years ago it wouldn't be possible but
now, clearly, we have the technology to do this. So this bill instructs
the Attorney General to implement an automated system to track the
entry and exit of visa holders, to make sure who they are, where they
are, and what their status is.
Back in my time, we used to talk about fingerprints. Now the term is
a biometric system. There are a number of different systems to review.
There can be digitized facial profiles, digitized photos of the iris of
the eye, whatever is most feasible and effective there--to select that.
We need to put some money in putting the machinery in our consular
offices overseas so when somebody comes in and presents himself to get
a visa to get into the country, we can find out and make a record,
permanently, of who they are. No more using stolen passports.
One of our partners in Western Europe who operates under the visa
waiver system has a problem with 60,000 stolen passports. Right now, if
you buy a passport or take somebody else's visa, we have a tough time
tracking them. But once they get that biometric card, we know
positively. We have a modern-day thumbprint on them. We can check them
out overseas; we can check them in our records. When they come to the
port of entry, we check them at the port of entry to make sure they are
who they say they are. And if they do not get out of the country in
time, we turn that information over to law enforcement agencies, so if
there is a contact with a law enforcement agency, this rings a bell:
You are out of status. You stayed too long. Or if a student leaves the
school, departs the school which he or she is supposed to attend or an
H-1B visa holder leaves the job he or she is supposed to have, that is
reported to the INS and they can turn over that information. Any law
enforcement official in the United States who comes in contact with him
will know that person is out of status.
Somebody says: Why is it important to know if they are out of status?
Many people who are out of status and performing activities that are
highly suspicious may not rise to the level of criminal indictment or
for a criminal information to be filed against them, but if they are
involved in suspicious activities and they are out of status, they are
violating the terms of their visa and they can be deported and we
potentially can avoid problems before they actually occur.
This is not going to be 100 percent effective. But when people are
out of status, particularly if they are acting suspiciously, we will
have a record on them, and we need to tighten up the system to know
when they leave. Right now, it just depends upon the airlines, making
sure they tell us who leaves the country. That is not good enough. We
need to keep a record of who comes in and who leaves so we know who is
overstaying their visa. They say 4 to 6 million people are here
illegally because they overstayed their visa, and we don't have any
idea how to find them. At least if we have a biometric card, when they
come in contact with a law enforcement agency, then we can do that.
Student visas are another thing. A lot of people focused on the
student visas. That is a small portion of the people who come to the
United States. There were a couple of people involved in the September
11 tragedy who were here on student visas.
Hanni Hanjour came here supposedly to study English in California and
never showed up at school. The school didn't know he was coming. They
didn't tell anybody. The next time we heard from him he was apparently
piloting the plane that went into the Pentagon.
It is not the student visas that are the problem. All visas are
problems. But in this bill we authorize almost $37 million to implement
the system that Congress dictated 4 or 5 years ago to track the people
who come into the United States and to get a solid tracking system to
know if they are overstaying their visa. If they do not show up for
school, then the schools would have to notify the INS. It would apply
the same requirements to language schools, to vocational schools, and,
yes, especially to flight schools. So we would know who was coming in.
This data system which has been put on the slow road is to be speeded
up and to be fully in effect by the beginning of January 2003. So we
will have a better system.
Let me say a brief word about student visa holders. The foreign
students who come to this land are a vitally important part of our
educational system. We are very proud in Missouri to have a number of
schools with a significant number of foreign students who bring their
culture, their experience, and their knowledge to this country. In my
view, one of the best foreign relation tools we have is to share
education with the future leaders of other countries.
I have traveled extensively in Asia. I have found that many of the
governmental leaders, scientific leaders, and leaders in journalism
have studied in my State. They come up to me and ask how the Missouri
Tigers are doing. They know what we are about. We have a good basis to
talk with them.
I was in Malaysia in August to talk about the potential that we have
to gain great medical insight and perhaps advances through
biotechnology using the information in genes in the Malaysian rain
forest. Two of the leaders graduated from the University of Missouri.
These are in the bill. The visa waiver program needs to be tightened
up so countries that just send their citizens into our country without
going through the visa process--we need to work with them and negotiate
with them so they have a strong, positive identifier, and so we have
the same kind of identification with them as we do with these other
states.
I know many people want to speak on this. I, again, express my
appreciation to the managers of the bill. I thank my cosponsors,
Senator Conrad and Senator Snowe. I urge adoption of this measure which
I think is going to move us significantly in the right direction of
preventing terrorist activities in the future.
The PRESIDING OFFICER. The Senator from Vermont is recognized.
Mr. LEAHY. Mr. President, I will take a moment. How much time is
remaining to the Senator from Vermont?
The PRESIDING OFFICER. The Senator from Vermont has 43 minutes
remaining.
Mr. LEAHY. Mr. President, I know the distinguished senior Senator
from New York has been waiting on the floor for some time. How much
time is the Senator from New York going to want?
Mr. SCHUMER. I ask for 7 minutes.
Mr. LEAHY. I see the distinguished senior Senator from California.
How much time does she want?
Mrs. FEINSTEIN. I will take 1 additional minute; 8 minutes.
That was meant to be a joke.
Mr. LEAHY. I am trying to think how to react to that, considering the
size of the State of Vermont--other than to say that when Vermont was
admitted to the Union it had twice the population of California when
California was admitted to the Union. Every day now California gains
the population of Vermont.
Mr. President, I ask that 8 minutes of my time be given to the
Senator from
[[Page S11032]]
New York and 8 minutes to the Senator from California, both of whom are
valued members of the Senate Judiciary Committee.
Mr. CONRAD. Mr. President, will the manager of the bill and others
who are waiting permit me 15 seconds to mention what has occurred?
The PRESIDING OFFICER. Without objection, it is so ordered.
The Senator from North Dakota.
Mr. CONRAD. Mr. President, I thank the manager of the bill for
including the provisions that Senator Bond, myself, and Senator Snowe
authored to tighten our borders, to provide coordination with schools
and employers when visa holders come to this country, to coordinate the
work of our intelligence agencies with the INS and the State Department
so we are confident of who is coming in, and to impose these new
provisions using biometrics so we really know who is coming to our
country.
I thank the managers very much, and I thank Senator Bond for his
leadership.
Mr. LEAHY. Mr. President, I thank Senator Bond. I thank Senator
Conrad and Senator Byrd.
The PRESIDING OFFICER. The Senator from New York.
Mr. SCHUMER. Thank you, Mr. President.
Mr. President, first, let me thank our senior Senator from Vermont
and our senior Senator from Utah for their leadership on this bill; and
also the many who have worked on it.
It is good that we have brought this bill in a timely fashion before
the Senate. On the one hand, we didn't rush so much that we did the
bill in a day or two. On the other hand, we didn't have a great need to
wait in terms of security. I think it is coming to the floor at the
right time with enough deliberation and care but at the same time not
delaying too much because the security problems America faces are large
and at times seem almost overwhelming.
If there is one key word that underscores this bill, it is
``balance.'' In the new post-September 11 society that we face, balance
is going to be a key word. Technology has forced us to recalibrate in
many different ways. The technology that allowed these horrible people
to do what they did to my city and to America and the technology that
allows law enforcement to try to catch up with them changes rapidly. No
law can sit still as that technology changes and still be effective.
The balance between the need to update our laws given the new
challenges and the need to maintain our basic freedoms which
distinguish us from our enemies is real.
There have been some on the right who have said just pass anything.
We just have to go after the terrorists and forget about our freedoms
and our civil liberties. There are some on the left who say only look
at the civil liberties aspect. They are both wrong. Fortunately,
neither prevailed in this fine piece of work that we have before us.
Balance and reason have prevailed.
This is the Senate working at its best under a crisis situation but
still with care and an appropriate degree of deliberation.
It is also an example of the two parties coming together, and of the
administration and the Congress coming together. In a sense, in this
bill there is something for everyone to like and something for everyone
to dislike, which may well show that it will end up in the right place.
I would like to talk about a few parts of the bill. The trap-and-
trace provision is basically a proposal that Senator Kyl and I put
together a couple years ago which is basically in the bill intact. It
is vital. If you ask law enforcement what they need, they need a
standard when they have somebody who is a terrorist or a potential
terrorist, that would allow a wiretap to be made so they can find that
person.
In the old days it was easy. It was not easy to get a new telephone.
You had to go to the phone company to get one, and it would take a few
weeks. Now people have cell phones; and anyone, for an illicit or bad
purpose, can get a cell phone every day. In fact, we know some of the
hijackers regularly bought new cell phones.
Without this new process, without nationalizing trap-and-trace
authority so you can follow the numbers that are called--you still
cannot look at content without going to a judge--law enforcement would
be powerless. It still confounds me that a simple provision such as
this, which does not change the balance but simply updates the
technology we need, had been held up for so long. Fortunately, it is
here now. Or unfortunately, it took an awful incident to make it
happen.
Most of the terrorists--and other criminals as well: money
launderers, drug dealers--are pretty technologically savvy. To put
handcuffs on law enforcement so they cannot be as technologically
savvy, would make no sense.
I was also proud to work on the money laundering provision. Law
enforcement has often said: Show me the money, and I will show you the
terrorists. Let's be honest about it. The money-laundering provision is
not going to stop the flow of money completely to the terrorists. They
can still have couriers and packets and things such as that. But what
it does do, No. 1, is make it harder, and, No. 2, it gives us
information, the ability to find information, and find the flow of who
is connected to whom, how, where, why, and when.
Again, the late Senator Coverdell and I had a money-laundering bill
that is not terribly different than the provisions in this bill. We had
introduced it a couple years ago.
I see my friend from Michigan. He has come to the Chamber. He has
done great work in relation to money laundering, as has the Senator
from Massachusetts, and so many others.
As to information sharing, again, we need to share information more
quickly and more rapidly among our various law enforcement agencies and
between law enforcement and intelligence agencies.
When we are facing a war where it is more likely that more civilians
will die than military personnel, the homefront is a warfront. The old
high wall between foreign intelligence and domestic law enforcement has
to be modified. The bill does a good job of that.
There is a provision that would improve communication between Federal
law enforcement and local law enforcement, which Senator Clinton and I
believe needs tightening up. There were procedural, not substantive,
objections raised to it. We hope to bring that measure back either as a
freestanding measure or as part of some other legislation.
The other provisions in the bill are good as well. I believe in
immigration. I think immigrants are great for America. But immigrants
do not have the exact same rights as citizens. They never have, nor
should they. To say that somebody who is not a U.S. citizen and might
be suspicious should be detained for a short period of time while law
enforcement checks them out--after all, they are trying to enter the
country, which is a privilege, not a right--makes sense. To say they
should be detained indefinitely without going to a judge cuts too far
against the grain of the freedoms we have. Once again, this bill seeks
a balance.
Finally, as to the sunset, I was very much opposed to the House 2-
year sunset. How could we have law enforcement adapt to a new law
knowing that by the time they get geared up, it is almost going to be
sunsetted? In fact, I think you do it the other way. If a law is good,
you put it on the books permanently, and then you reexamine it. You do
not automatically have it off the books. That means you do not trust
the product you put together.
Four years is about the minimum amount of time that would be
acceptable to me. I thought 5 would be better, or, frankly, no sunset.
Putting the burden of proof the other way would have made more sense,
still. But a 4-year sunset, again, shows compromise.
Mr. President, I have said this in this Chamber before. In this new
world in which we live, everyone has to give a little bit. We are
asking our citizens to give a little bit. We are asking our Armed
Forces to give a lot. And that applies to us as well.
I hope and pray--and I believe it has happened in this bill--there is
a bit of a new attitude. Even if you cannot get everything your way, at
least you give the benefit of the doubt to the compromise that has been
put together because we have to move things forward, and this bill does
that.
In conclusion, the scourge of terrorism is going to be with us for a
while. Law enforcement has a lot of catching up to do. There is no
question
[[Page S11033]]
about it. In this bill, at least, we give them fair and adequate tools
that do not infringe on our freedoms but, at the same time, allows them
to catch up a lot more quickly.
Mr. President, I yield back the remainder of my time.
The PRESIDING OFFICER. The Senator from California.
Mr. LEVIN. Mr. President, I wonder if the Senator from California
would yield for a unanimous consent request.
Mrs. FEINSTEIN. I would be happy to yield.
The PRESIDING OFFICER. The Senator from Michigan.
Mr. LEVIN. Mr. President, I ask unanimous consent that after the
remarks of the Senator from California, I be recognized for the time
allotted to me.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. LEVIN. I thank the Senator.
The PRESIDING OFFICER. The Senator from California.
Mrs. FEINSTEIN. Mr. President, Americans tend to be a very open
people. Americans, to a great extent, have looked at Government,
saying: Just leave me alone. Keep Government out of my life. At least
that is the way it was before September 11. What I hear post-September
11 are people saying: What is my Government going to do to protect me?
As we look back at that massive, terrible incident on September 11,
we try to ascertain whether our Government had the tools necessary to
ferret out the intelligence that could have, perhaps, avoided those
events. The only answer all of us could come up with, after having
briefing after briefing, is we did not have those tools. This bill aims
to change that. This bill is a bill whose time has come. This bill is a
necessary bill. And I, as a Senator from California, am happy to
support it.
This legislation brings our criminal and national security laws in
line with developing technologies so that terrorists will no longer be
able to stay one step ahead of law enforcement. And believe me, they
can today.
Right now, for example, terrorists can evade Foreign Intelligence
Surveillance Act wiretaps, which are device-specific, by simply
switching cell phones every few hours. This legislation fixes that and
allows for roving FISA wiretaps, the same as are currently allowed for
suspected criminals under the domestic law enforcement portions of the
law known as title III.
And because modern communications often travel through countless
jurisdictions before reaching their final destination, investigators
must now get court orders from every one of those jurisdictions. They
can have to get 15, 20 court orders to carry out a wiretap. This bill
would change that, allowing for just one court order from the
originating jurisdiction.
And the bill recognizes that voice mails and e-mails should be
treated alike when law enforcement seeks access to them. Technology, as
it changes, changes the ability to conduct an intelligence
surveillance. This bill attempts to keep a very careful balance between
the personal right to privacy and the Government's right to know, in an
emergency situation, to be able to protect its citizens.
It also increases information sharing between the intelligence
community and law enforcement. As a matter of fact, it mandates it.
Criminal investigations often result in foreign intelligence. This
information, up to this point, is not shared with the intelligence
community. After this bill becomes law, it must be shared.
And it makes it easier for law enforcement to defeat those who would
use the computers of others to do mischief.
For example, with the Zombie computer, I invade your computer and, by
invading your computer, go into 1,000 other computers and am able to
get one of them to open the floodgates of a dam. This bill prevents
that.
Overall, this bill gives law enforcement and the intelligence
community the tools they need to go after what is an increasingly
sophisticated terrorist element.
I am very pleased this legislation also includes a number of
provisions I drafted with Senator Graham well before the events on
September 11--title 9 of this bill. These provisions give the Director
of the CIA, as head of the intelligence community, a larger role with
regard to the analysis and dissemination of foreign intelligence
gathered under FISA. These mandate that law enforcement share
information with the intelligence community.
And title 9 improves the existing Foreign Terrorist Asset Tracking
Center which helps locate terrorist assets. It authorizes additional
resources to help train local law enforcement to recognize and handle
foreign intelligence.
We now have these anti-terrorist teams throughout the country. They
need to be trained, and they need to learn the tools of the trade and
get the security clearances so they can tap into these databases.
I agree with the 4-year sunset included for certain surveillance
provisions in the bill. In committee I suggested a 5-year sunset. The
House had 2 years. It is now 4 years. That is an appropriate time. It
gives us the time to review whether there were any outrageous uses of
these provisions or whether uses were appropriate under the basic
intent of the bill.
Let me briefly touch on a related topic of great importance in the
war against terrorism. As an outgrowth of the Technology, Terrorism,
and Government Information Subcommittee, today Senator Jon Kyl of
Arizona and I held a press conference indicating a bill we will shortly
introduce to create a new, central database, a database that is a
lookout database into which information from intelligence, from law
enforcement, from all Federal agencies will go. That database will be
for every visa holder, every person who crosses borders coming in and
out of this country. The legislation will provide for ``smart visa
cards'', reform the visa waiver program, reform the unregulated student
program, and improve and beef up identity documents.
I passed around at the press conference a pilot's license, easily
reproducible, no biometric data, no photograph, perforated around the
edges showing that it had been removed from a bigger piece. This is the
pilot's license that every 747 pilot carries, every private pilot
carries. It is amazing to me that this can be a Federal document and be
as sloppy as it is in this time.
We intend to see that identity documents are strengthened to provide
not only photographs, but biometric data as well (such as fingerprints
or facial recognition information). And the data system would be such
that it is flexible and scalable so as biometric technology and
requirements progress, the database can keep up.
Both Senator Kyl and I also met with Larry Ellison, the CEO of
Oracle. Oracle has stated that they are willing to devote some 1,500
engineers to develop a national identity database. What we are
proposing is different from that. He said they would devote their
software free of charge.
The PRESIDING OFFICER. The time of the Senator has expired.
Mrs. FEINSTEIN. If I may just have 1 minute to conclude.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mrs. FEINSTEIN. We are not proposing a national identity card, but we
do believe this kind of database could be prepared by a company such as
Oracle--they have offered to give it to the Government for free or by
NEC, which did a state-of-the-art fingerprint system for San Francisco.
We believe this should be under the auspices of the Homeland Security
Director, that these decisions need to be made rapidly, and that we
need to get cracking to close the loopholes that have made the United
States of America one giant sieve.
This bill, which I am so happy to support, takes a giant step forward
in that direction. I thank both the chairman of the committee and the
ranking member for their diligence on this bill.
I yield the floor.
The PRESIDING OFFICER. Under the previous order, the Senator from
Michigan is recognized.
Mr. LEVIN. Mr. President, the antiterrorism bill which the Senate is
about to pass reflects the sentiments the American people have
expressed since the events of September 11--that we must act swiftly
and strongly to defend our country without sacrificing our most
cherished values. The Senate antiterrorism legislation meets that test.
It responds to these dangerous times by giving law enforcement agencies
important new tools to use in combating terrorism without denigrating
[[Page S11034]]
the principles of due process and fairness embedded in our
Constitution.
The bill is not perfect. In fact, during the Senate's consideration
of its bill, I supported three amendments offered by Senator Feingold.
Each of the Feingold amendments would have strengthened privacy
protections for American citizens without undermining law enforcement
efforts to investigate terrorists. One amendment would have maintained
limits in Federal and State law on law enforcement access to personal
records, particularly with regards to sensitive medical and financial
information. A second amendment would have required law enforcement to
ascertain that a surveillance target under the antiterrorism bill's
expanded wiretap authority was actually in the house that was bugged or
using the phone that was tapped before surveillance could be initiated.
The third amendment that I supported would have placed sensible limits
on the government's ability to intercept computer communications. Among
these limits were the type of investigation and the length of
surveillance in which the government could utilize new surveillance
authority provided in the antiterrorism bill.
While the amendments I supported were not adopted the bill before us
is much stronger from a civil liberties standpoint than the legislation
that was initially proposed by the administration. This is due in large
part to the strong commitment to civil liberties and the tireless
efforts of Senate Judiciary Committee Chairman Patrick Leahy.
The bill also bolsters Federal criminal laws against terrorism in
several important areas, including extending the statute of limitations
for terrorist offenses and modernizing surveillance laws to permit
investigators to keep pace with new technologies like cell phones and
the Internet.
Michigan's economy and security depend on the Federal Government
providing adequate resources for inspection and law enforcement at the
State's northern border. I am pleased that the final bill now before us
also includes significant new funding to increase security and improve
traffic flow at the northern border.
Finally, this legislation includes a landmark set of provisions that
I have been proud to sponsor that will strengthen and modernize U.S.
anti-money laundering laws. Osama bin Laden has boasted that his modern
new recruits know the ``cracks'' in ``Western financial systems'' like
they know the ``lines in their hands.'' Enactment of this bill will
help seal the cracks that allow terrorists and other criminals to use
our financial systems against us.
The final money laundering provisions appear in Title 3 of the bill
and represent a significant advance over existing law. Here are some of
the anti-money laundering provisions that I authored and that are
included in the final bill.
For the first time, all U.S. financial institutions--not only banks
but securities firms, insurance companies, money transmitters, and
other businesses that transfer funds or engage in large cash
transactions--will have a legal obligation to exercise due diligence
before allowing a foreign financial institution to open a correspondent
account with them and thereby gain entry into the U.S. financial
system.
For the first time, U.S. banks and securities firms will be barred
from opening accounts for foreign shell banks that have no physical
presence anywhere and no affiliation with another bank.
For the first time, U.S. prosecutors will be able to freeze and seize
a depositor's funds in a foreign financial institution's correspondent
account to the same extent under civil forfeiture laws as a depositor's
funds in other U.S. financial accounts.
For the first time, foreign corruption offenses such as bribery and
misappropriation of funds by a public official will qualify as
predicate offenses that can trigger a U.S. money laundering
prosecution.
Still other provisions in the bill give U.S. law enforcement a host
of new tools to investigate and prosecute money laundering crimes,
especially crimes involving a foreign financial institution.
Here are some of the other key provisions in the bill that make
landmark changes in U.S. anti-money laundering laws.
For the first time, all U.S. financial institutions will have a legal
obligation to verify the identity of their customers, and all customers
will have a legal obligation to tell the truth about who they are.
For the first time, all U.S. financial institutions will be required
to have anti-money laundering programs.
For the first time, the U.S. Treasury Secretary will have legal
authority to designate specific foreign financial institutions,
jurisdictions, transactions or accounts as a ``primary money laundering
concern'' and use special measures to restrict or prohibit their access
to the U.S. marketplace.
For the first time, bulk cash smuggling over U.S. borders will be a
prosecutable crime, and suspect funds will be subject to forfeiture
proceedings.
Just like we are tightening our border controls to restrict access to
the United States across its physical borders, the bill's anti-money
laundering provisions will tighten our financial controls to restrict
access into the U.S. financial system. They will require our financial
institutions to take new steps, to do more work, and to exercise
greater caution before opening up the financial system of the United
States.
When the anti-money laundering provisions first passed the Senate on
October 11, I gave a floor statement explaining a number of the
provisions that had been taken from the Levin-Grassley anti-money
laundering bill, S. 1371. While I do not want to repeat all of that
legislative history here, some important improvements were made during
the House-Senate negotiations that I would like to comment on in order
to explain their intent and impact.
First is the shell bank ban in Section 313 of the final bill. That
provision appeared in both the House and Senate bills, with only a few
differences. The primary difference is that the House provision applied
only to ``depository institutions,'' while the Senate bill was intended
to ban both U.S. banks and U.S. securities firms from opening accounts
for shell banks. The final bill takes the broader approach advocated by
the Senate and applies the shell bank ban to both U.S. banks and U.S.
securities firms. This broader ban is intended to make sure that
neither U.S. banks nor U.S. securities firms open accounts for shell
banks, which carry the highest money laundering risks in the banking
world. This broader ban means, for example, that a bank that had shell
banks as clients and was required to close those accounts under this
provision would not be able to circumvent the ban simply by switching
its shell bank clients to accounts at an affiliated broker-dealer. The
goal instead is to close off the U.S. financial system to shell banks
and institute a broad ban on shell bank accounts.
In my floor statement of October 11, I explained the related
requirement in Section 313 that U.S. financial institutions take
reasonable steps to ensure that other foreign banks are not allowing
their U.S. accounts to be used by shell banks. The purpose of this
language is to prevent shell banks from getting indirect access to the
U.S. financial system by operating through a correspondent account
belonging to another foreign bank. That requirement was included in
both the House and Senate bills, and in the final version of the
legislation. It is a key provision because it will put pressure on all
foreign financial institutions that want to do business in the United
States to cut off the access that shell banks now enjoy in too many
countries around the world.
I also explained on October 11 that the shell bank ban contains one
exception that is intended to be narrowly construed to protect the U.S.
financial system from shell banks to the greatest extent possible. This
exception, which is identical in both the House and Senate bills and is
unchanged in the final version of the legislation, allows U.S.
financial institutions to open an account for a shell bank that meets
two tests: the shell bank is affiliated with another bank that
maintains a physical presence, and the shell bank is subject to
supervision by the banking regulator of that affiliated bank. The
intent of this exception is to allow U.S. financial institutions to do
business with shell branches of large, established banks on the
understanding that
[[Page S11035]]
the bank regulator of the large, established bank will also supervise
the established bank's branch offices worldwide, including any shell
branch. As explained in my earlier floor statement, U.S. financial
institutions are cautioned not to abuse this exception, to exercise
both restraint and common sense in using it, and to refrain from doing
business with any shell operation that is affiliated with a poorly
regulated bank.
The House-Senate negotiations also added a new provision to Section
313 giving U.S. financial institutions a 60-day period to wind up and
close any existing accounts for shell banks and to institute the
reasonable procedures called for to ensure that other correspondent
accounts with foreign financial institutions are not being used by
shell banks. As I suggested on October 11, one possible approach with
respect to other correspondent accounts would be for the U.S. financial
institution to develop standard language asking the foreign financial
institution to certify that it is not and will not allow any shell bank
to use its U.S. accounts and then to rely on that certification absent
any evidence to the contrary.
A second provision I want to discuss in detail is the due diligence
requirement in Section 312 of the final bill. This provision also
appeared in both the House and Senate bills, again with only a few
differences in wording. This provision is intended to tighten U.S.
anti-money laundering controls by requiring all U.S. financial
institutions to exercise due diligence when opening or managing
correspondent or private banking accounts for foreign financial
institutions or wealthy foreign individuals. The purpose of this
requirement is to function as a preventative measure to stop rogue
foreign financial institutions, terrorists or other criminals from
using U.S. financial accounts to gain access to the U.S. financial
system.
The most important change made to the due diligence requirement
during the House-Senate negotiations was to make the definitional
provisions in section 311 also apply to section 312. Specifically, the
House and Senate negotiators amended what is now Section 311(e) to make
sure that its provisions would be applied to both the new 31 U.S.C.
5318A and the new subsections (i) and (j) of 31 U.S.C. 5318 created by
Sections 311, 312 and 313 of the final bill.
As I mentioned in my floor statement on October 11, one of the key
changes that the Senate Banking Committee made to the due diligence
requirement when they took that provision from the Levin-Grassley bill,
S. 1371, was to make the due diligence requirement apply to all U.S.
financial institutions, not just banks. The Banking Committee expanded
the scope of the due diligence requirement by deleting the Levin-
Grassley references to ``banks'' and substituting the term ``financial
institutions'' which, in Section 5312(a)(2) of the Bank Secrecy Act,
includes not only banks, but also securities firms, insurance
companies, money exchanges, and many other businesses that transfer
funds or carry out large cash transactions. The House Financial
Services Committee adopted the same approach as the Senate Committee,
using the term ``financial institution'' in its due diligence provision
rather than, for example, the term ``depository institution'' which the
House Committee used in its version of the shell bank ban. The bottom
line, then, is that both the House and Senate expanded the due
diligence provision to apply to all U.S. financial institutions, not
just banks.
During the House-Senate negotiations on the final version of the
anti-money laundering legislation, Section 311(e) of the bill was
amended to make it applicable to both the due diligence requirement
created by Section 312 and to the shell bank ban created by Section
313. Section 311(e) establishes several new definitions for such terms
as ``account'' and ``correspondent account,'' and also directs or
authorizes the Treasury Secretary to issue regulations to clarify other
terms. By making those definitions and regulatory authority applicable
to the due diligence requirement and shell bank ban, the House-Senate
negotiators helped ensure that the same terms would be used
consistently across Sections 311, 312 and 313. In addition, the change
helps clarify the scope of the due diligence and shell bank provisions
in several respects.
First, the change makes the definition of ``account'' applicable to
the due diligence requirement. This definition makes it clear that the
due diligence requirement is intended to apply to a wide variety of
bank accounts provided to foreign financial institutions or private
banking clients, including checking accounts, savings accounts,
investment accounts, trading accounts, or accounts granting lines of
credit or other credit arrangements. The clear message is that, before
opening any type of account for a foreign financial institution or a
wealthy foreign individual and giving that account holder access to the
United States financial system, U.S. financial institutions must use
due diligence to evaluate the money laundering risk, to detect and
report possible instances of money laundering, and to deny access to
terrorists or other criminals.
The definition also ensures that the shell bank ban applies widely to
bar a shell bank from attempting to open virtually any type of
financial account available at a U.S. financial institution.
Second, the change makes it clear that the definition of
``correspondent account'' applies to the due diligence requirement.
This clarification is important, because the definition makes it clear
that ``correspondent accounts'' are not confined to accounts opened for
foreign banks, as specified in S. 1371, but encompass accounts opened
for any ``foreign financial institution.'' This broader reach is in
keeping with the effort of the Senate Banking Committee and the House
Financial Services Committee to expand the due diligence requirement to
apply to all financial institutions, not just banks. It means, for
example, that U.S. financial institutions must use due diligence when
opening accounts not only for foreign banks, but also for foreign
securities firms, foreign insurance companies, foreign exchange houses,
and other foreign financial businesses.
Section 311(e)(4) authorizes the Treasury Secretary to further define
terms used in subsection (e)(1), and Treasury may want to use that
authority to issue regulatory guidance clarifying the scope of the term
``foreign financial institution'' to help U.S. financial institutions
understand the extent of their due diligence obligation under the new
31 U.S.C. 5318(i). In fashioning this regulatory guidance, Treasury
should keep in mind the intent of Congress in issuing this new due
diligence requirement--to require all U.S. financial institutions to
use greater care when allowing any foreign financial institution inside
the U.S. financial system.
The significance of applying the ``correspondent account'' definition
to the shell bank ban is, again, to ensure that the ban applies widely
to bar a shell bank from opening virtually any type of financial
account available at a U.S. financial institution.
Third, due to the change made by House-Senate negotiators, Section
311(e)(3) directs the Treasury Secretary to issue regulations defining
``beneficial ownership of an account'' for purposes of both the new 31
U.S.C. 5318A and the new subsections (i) and (j) of 31 U.S.C. 5318. How
the regulations define ``beneficial ownership'' will have profound
implications for these new provisions as well as for other aspects of
U.S. anti-money laundering laws. Section 311(e)(3) directs Treasury to
address three sets of issues in defining beneficial ownership: the
significance of ``an individual's authority to fund, direct, or manage
the account''; the significance of ``an individual's material interest
in the income or corpus of the account''; and the exclusion of
individuals whose beneficial interest in the income or corpus of the
account is immaterial.''
The issue of beneficial ownership is at the heart of the fight
against terrorists and other criminals who want to use our financial
institutions against us. Terrorists and other criminals want to hide
their identity as well as the criminal origin of their funds so that
they can use their U.S. accounts without alerting law enforcement. They
want to use U.S. and international payment systems to move their funds
to their operatives with no questions asked. They want to deposit their
funds in interest-bearing accounts to
[[Page S11036]]
increase the financial resources available to them. They want to set up
credit card accounts and lines of credit that can be used to finance
their illegal activities. Above all, they do not want U.S. financial
institutions determining who exactly is the owner of their accounts,
since that information can lead to closure of the accounts, seizure of
assets, exposure of terrorist or criminal organizations, and other
actions by law enforcement.
After the September 11 attack, it is more critical than ever that
U.S. financial institutions determine exactly who is the beneficial
owner of the accounts they open. Another provision of the final bill,
Section 326 which was authored by House Financial Services Committee
Chairman Oxley, requires financial institutions to verify the identify
of their customers. That provision gets at the same issue--that our
financial institutions need to know who they are dealing with and who
they are performing services for.
Some financial institutions have pointed out the difficulties
associated with determining the beneficial owner of certain accounts.
But these are not new issues, and they can be dealt with in common
sense ways. U.S. tax administrators and financial regulators have years
of experience in framing ownership issues. Switzerland has had a
beneficial ownership requirement in place for years, and in fact
requires accountholders to sign a specific document, called ``Form A,''
declaring the identify of the account's beneficial owner. The
difficulties associated with determining beneficial ownership can be
addressed.
There will, of course, be questions of interpretation. No one wants
financial institutions to record the names of the stockholders of
publicly traded companies. No one wants financial institutions to
identify the beneficiaries of widely held mutual funds. That is why
this section directs the Treasury Secretary to issue regulatory
guidance in this area.
At the same time, there are those who are hoping to convince Treasury
to turn the definition of beneficial ownership inside out, and declare
that attorneys or trustees or asset managers who direct payments into
or out of an account on behalf of unnamed parties can somehow qualify
as the ``beneficial owner of the account.'' Others will want to
convince Treasury that offshore shell corporations or trusts can
qualify as the beneficial owner of the accounts they open. But those
are exactly the types of accounts that terrorists and criminals use to
hide their identities and infiltrate U.S. financial institutions. And
those are exactly the accounts for which U.S. financial institutions
need to verify and evaluate the real beneficial owners.
The beneficial ownership regulation will be a challenging
undertaking. But there is plenty of expertise to draw upon, from FATF,
the Basel Committee, U.S. financial and tax regulators, other countries
with beneficial ownership requirements and, of course, from our own
financial community.
Fourth, Section 311(e)(2) directs the Treasury Secretary to issue
regulations clarifying how the term ``account'' applies to financial
institutions other than banks. This authority should be read in
conjunction with Section 311(e)(4) which allows, but does not require,
the Secretary to issue regulations defining other terms in the new 31
U.S.C. 5318A and the new subsections (i) and (j) of 31 U.S.C. 5318.
These two regulatory sections should, in turn, be read in conjunction
with Section 312(b)(1) which directs the Secretary to issue regulations
further clarifying the due diligence policies, procedures and controls
required under that section. Together, these grants of regulatory
authority provide the Treasury Secretary with ample authority to issue
regulatory guidance to help different types of financial institutions
understand what is expected of them in the area of due diligence. Such
guidance may be needed by banks, securities firms, insurance companies,
exchange houses, money service businesses and other financial
institutions. The guiding principle, again, is to ensure that U.S.
financial institutions exercise appropriate due diligence before
opening accounts for foreign financial institutions or wealthy foreign
individuals seeking access to the U.S. financial system.
These grants of regulatory authority can also be used by Treasury to
ensure that the shell bank ban established by Section 313 is as broad
and effective as possible to keep shell banks out of the U.S. financial
system.
Next is due diligence and correspondent banking. Section 312 imposes
an ongoing, industry-wide legal obligation on all types of financial
institutions operating in the United States to exercise appropriate
care when opening and operating correspondent accounts for foreign
financial institutions to safeguard the U.S. financial system from
money laundering. The general obligation to establish appropriate and
specific due diligence policies, procedures and controls when opening
correspondent accounts is codified in a new 31 U.S.C. 5318(i)(1).
Subsection 5318(i)(2) specifies additional, minimum standards for
enhanced due diligence policies, procedures and controls that must be
established by U.S. financial institutions for correspondent accounts
opened for two specific categories of foreign banks: banks operating
under offshore banking licenses and banks operating in foreign
countries that have been designated as raising money laundering
concerns. These two categories of foreign banks were identified due to
their higher money laundering risks, as explained in the extensive
staff report and hearing record of the Permanent Subcommittee on
Investigations, copies of which I released earlier this year.
Subsection 5318(i)(2) provides two alternative ways in which a
foreign country can be designated as raising money laundering concerns.
The first way is if a country is formally designated by an
intergovernmental group or organization of which the United States is a
member. Currently, the most well known such group is the Financial
Action Task Force on Money Laundering, also known as FATF, which is
composed of about 30 countries and is the leading international group
fighting money laundering. In 2000, after a lengthy fact-finding and
consultative process, FATF began issuing a list of countries that
FATF's member countries formally agreed to designate as noncooperative
with international anti-money laundering principles and procedures.
This list, which names between 12 and 15 countries, is updated
periodically and has become a powerful force for effecting change in
the listed jurisdictions. The second way a country may be designated
for purposes of the enhanced due diligence requirement is if the
country is so designated by the Treasury Secretary under the procedures
provided in the new Section 5318A. This second alternative enables the
United States to act unilaterally as well as multilaterally to require
U.S. financial institutions to take greater care in opening
correspondent accounts for foreign banks in jurisdictions of concern.
The House and Senate bills contained one minor difference in the
wording of the provision regarding foreign country designations by an
intergovernmental group or organization under the new 31 U.S.C.
5318(i)(2)(A)(ii)(I). The House bill included a phrase, not in the
Senate bill, stating that the foreign country designation had to be one
with which the Secretary of Treasury concurred, apparently out of
concern that an intergovernmental group or organization might designate
a country as noncooperative over the objection of the United States.
The final version of the provision includes the House approach, but
uses statutory language making it clear that U.S. concurrence in the
foreign country designation may be provided by the U.S. representative
to the relevant international group or organization, whether or not
that representative is the Secretary of Treasury or some other U.S.
official.
The new 31 U.S.C. 5318(i)(2) states that the enhanced due diligence
policies, procedures and controls that U.S. financial institutions must
establish for correspondent accounts with offshore banks and banks in
jurisdictions designated as raising money laundering concerns must
include at least three elements. They must require the U.S. financial
institution to ascertain the foreign bank's ownership, to carefully
monitor the account to detect and report any suspicious activity, and
to determine whether the foreign bank is allowing any other banks to
use its U.S. correspondent account and, if so, the identity of those
banks and related due diligence information.
[[Page S11037]]
The three elements specified in Section 5318(i)(2) for enhanced due
diligence policies, procedures and controls are not meant to be
comprehensive. Additional reasonable steps would be appropriate before
opening or operating accounts for these two categories of foreign
banks, including steps to check the foreign bank's past record and
local reputation, the jurisdiction's regulatory environment, the bank's
major lines of business and client base, and the extent of the foreign
bank's anti-money laundering program. Moreover, other categories of
foreign financial institutions will also require use of enhanced due
diligence policies, procedures and controls including, for example,
offshore broker-dealers or investment companies, foreign money
exchanges, foreign casinos, and other foreign money service businesses.
Now I would like to discuss due diligence and private banking. The
new Section 5318(i) also addresses due diligence requirements for
private banking accounts. The private banking staff report issued by
the Permanent Subcommittee on Investigations explains why these types
of private banking accounts are especially vulnerable to money
laundering and why initial and ongoing due diligence reviews are needed
to detect and report any suspicious activity.
The House and Senate versions of this provision were very similar.
The primary difference between them is that the House bill included a
definition of ``private banking accounts'' that originally appeared in
the Levin-Grassley bill, S. 1371, while the Senate left the term
undefined. The final version of Section 5318(i) includes the House
definition. It has three elements. First, the account in question must
require a $1 million minimum aggregate of deposits. Second, the account
must be opened on behalf of living individuals with a direct or
beneficial ownership interest in the account. Third, the account must
be assigned to, administered, or managed in part by, a financial
institution employee such as a private banker, relationship manager or
account officer. The purpose of this definition is to require U.S.
financial institutions to exercise due diligence when opening and
operating private banking accounts with large balances controlled by
wealthy foreign individuals with direct access to the financial
professionals responsible for their accounts.
U.S. financial institutions with private banking accounts are
required by the new Section 5318(i)(1) to establish appropriate and
specific due diligence policies, procedures and controls with respect
to those accounts. Section 5318(i)(3) states that, at a minimum, the
due diligence policies, procedures and controls must include reasonable
steps to ascertain the identity of the accountholders, including the
beneficial owners; to ascertain the source of funds deposited into the
account; and to monitor the account to detect and report any suspicious
activity. If the account is opened for or on behalf of a senior foreign
political figure or a close family member or associate of the political
figure, the U.S. financial institution must use enhanced due diligence
policies, procedures and controls with respect to that account,
including closely monitoring the account to detect and report any
transactions that may involve the proceeds of foreign corruption. The
enhanced due diligence requirements for private banking accounts
involving senior foreign political figures are intended to work in
tandem with the guidance issued on this subject by Treasury and federal
banking regulators in January 2001.
The accounts covered by the private banking definition are not
confined to accounts at U.S. banks, but also cover accounts opened at
other types of financial institutions, including securities firms which
have developed lines of business offering similar types of accounts to
wealthy foreign individuals. In addition, the section is intended to
cover not only private banking accounts physically located inside the
United States, but also private banking accounts that are physically
located outside of the United States but managed by U.S. personnel from
inside the United States. For example, the private banking
investigation conducted by my Subcommittee found that it was a common
practice for some U.S. private banks to open private banking accounts
for foreign clients in an offshore or bank secrecy jurisdiction, but
then to manage those accounts using private bankers located inside the
United States. In such cases, the U.S. financial institution is
required to exercise the same degree of due diligence in opening and
managing those private banking accounts as it would if those accounts
were physically located within the United States.
Another area of inquiry involves the $1 million threshold. Some
financial institutions have asked whether the $1 million minimum would
be met if an account initially held less than the required threshold,
or the account's total deposits dipped below the threshold amount on
one or more occasions, or the same individual held accounts both inside
and outside the private bank and kept the private bank account's total
deposits below the threshold amount. Such inquires are reminiscent of
structuring efforts undertaken to avoid certain anti-money laundering
reporting requirements. Such structuring efforts have not been found
acceptable in avoiding other anti-money laundering requirements, and
the language of the private banking provision is intended to preclude
such maneuvering here.
The purpose of the private banking provision is to require U.S.
financial institutions to exercise due diligence when opening or
managing accounts with large deposits for wealthy foreign individuals
who can use the services of a private banker or other employee to move
funds, open offshore corporations or accounts, or engage in other
financial transactions that carry money laundering risks. Because it is
the intent of Congress to strengthen due diligence controls and protect
the U.S. financial system to the greatest extent possible in the
private banking area, the private banking definition should be
interpreted in ways that will maximize the due diligence efforts of
U.S. financial institutions.
Finally, the House-Senate negotiators adjusted the effective date of
the due diligence provision. The new effective date gives the Treasury
Secretary 180 days to issue regulations clarifying the due diligence
policies, procedures and controls required under the new 31 U.S.C.
5318(i). These regulations are, again, intended to provide regulatory
guidance to the range of U.S. financial institutions that will be
compelled to exercise due diligence before opening a private banking or
correspondent banking account. Section 312(b) states that, whether or
not the Treasury Secretary meets the 180-day deadline for regulations,
the due diligence requirement will go into effect no later than 270
days after the date of enactment of the legislation. That means,
whether or not the Treasury Secretary issues any regulations, after 270
days, U.S. financial institutions will be legally required to establish
appropriate and specific due diligence policies, procedures and
controls for their private banking and correspondent accounts,
including enhanced due diligence policies, procedures and controls
where necessary.
In addition to due diligence and the Shell Bank provisions, my
October 11 floor statement discusses several other bill provisions
including those that add foreign corruption offenses to the list of
crimes that can trigger a U.S. money laundering prosecution, and those
that close a forfeiture loophole applicable to correspondent accounts
for foreign financial institutions. I will not repeat that legislative
history again, but I do want to mention one other provision that I
authored to expand use of Federal receivers in money laundering and
forfeiture proceedings.
The Federal receivers provision is contained in Section 317 of the
final bill, and I want to make three points about it. First, this
provision comes out of the work of the Permanent Subcommittee on
Investigations which found that many money laundering crimes include
such complex flows of money across international lines that the average
prosecutor does not have the time or resources needed to chase down the
money, even when that money represents savings stolen or defrauded from
hundreds of crime victims in the United States. In too many money
laundering cases, the crime victims will never see one dime of their
lost savings. The Federal receiver provision in Section 317 is intended
to provide Federal prosecutors and the Federal and State regulators
working with
[[Page S11038]]
them the option of using a court-appointed receiver to chase down the
laundered funds.
Second, the provision is intended to allow any U.S. district court to
appoint a Federal receiver in a money laundering or forfeiture
proceeding, whether criminal or civil, if so requested by the Federal
prosecutor or Federal or State regulator associated with the
proceeding. The only restriction is that the court must have
jurisdiction over the defendant whose assets the receiver will be
pursuing. Jurisdiction may be determined in the context of the criminal
or civil proceeding before the court, including under new language in
other parts of Section 317 making it clear that a district court has
jurisdiction over any foreign financial institution that has a
correspondent account at a U.S. financial institution; over any foreign
person who has committed a money laundering offense involving a
financial transaction occurring in whole or in part in the United
States; and over any foreign person that has converted to their own use
property that is the subject of a U.S. forfeiture order, as happened in
the Swiss American Bank case described in the Subcommittee's staff
report.
The third point about the Federal receiver provision is that it is
intended to make it clear that Federal receivers appointed under U.S.
money laundering laws may make requests and may obtain financial
information from the U.S. Financial Crimes Enforcement Network in
Treasury and from foreign countries as if the receiver were standing in
the shoes of a federal prosecutor. This language is essential to
increase the effectiveness of receivers who often have to work quickly,
in foreign jurisdictions, in cooperation with foreign law enforcement
and financial regulatory personnel, and who need clear statutory
authority to make use of international information sharing arrangements
available to assist U.S. law enforcement. The provision is intended to
make it clear that the Federal receiver has the same access to
international law enforcement assistance as a Federal prosecutor would
if the prosecutor were personally attempting to recover the laundered
funds. The language is also intended to make it clear that Federal
receivers are bound by the same policies and procedures that bind all
Federal prosecutors in such matters, and that Federal receivers have no
authority to exceed any restrictions set by the Attorney General.
Finally, I would like to take note of two other provisions that are
included in the final bill. They are Section 352 authored by Senate
Banking Committee Chairman Sarbanes to require all U.S. financial
institutions to establish anti-money laundering programs, and Section
326 authored by House Financial Services Committee Chairman Oxley to
require all U.S. financial institutions to verify the identity of their
customers. Both are strong requirements that apply to all U.S.
financial institutions and, in the case of the Oxley provision, to all
financial accounts. Both represent important advances in U.S. anti-
money laundering laws by codifying basic anti-money laundering
requirements. I commend my colleagues for enacting these basic anti-
money laundering controls into law and filling in some of the gaps that
have made our anti-money laundering safeguards less comprehensive than
they need to be.
The clear intention of both the House and the Senate bills, and the
final bill being enacted by Congress today, is to impose anti-money
laundering requirements across the board that reach virtually all U.S.
financial institutions. Congress has determined that broad anti-money
laundering controls applicable to virtually all U.S. financial
institutions are needed to seal the cracks in our financial systems
that terrorists and other criminals are all too ready to exploit.
There are many other noteworthy provisions of this legislation, from
requirements involving legal service of subpoenas on foreign banks with
U.S. accounts, to new ways to prosecute money laundering crimes, to new
arrangements to increase cooperation among U.S. financial institutions,
regulators and law enforcement to stop terrorists and other criminals
from gaining access to the U.S. financial system. There just is not
sufficient time to go into them all.
To reiterate, the antiterrorism bill we have before us today would be
very incomplete--only half of a toolbox--without a strong anti-money-
laundering title to prevent foreign terrorists and other criminals from
using our financial institutions against us. With the anti-money-
laundering provisions in this bill, the antiterrorism bill gives our
enforcement authorities a valuable set of additional tools to fight
those who are attempting to terrorize this country.
Osama bin Laden has boasted that his modern new recruits know, in his
words, the ``cracks'' in ``Western financial systems'' like they know
the ``lines in their own hands.'' Enactment of this bill with these
provisions will help seal those cracks that allow terrorists and other
criminals to use our own financial systems against us.
The intention of this bill is to impose anti-money-laundering
requirements across the board that reach virtually all U.S. financial
institutions.
Our Permanent Subcommittee on Investigations, which I chair, spent 3
years examining the weaknesses and the problems in our banking system
with respect to money laundering by foreign customers, including
foreign banks. Through 6 days of hearings and 2 major reports, one of
which contained case studies on 10 offshore banks, we developed S. 1371
to strengthen our anti-money-laundering laws. A strong bipartisan group
of Senators joined me in pressing for its enactment, including Senators
Grassley, Sarbanes, Kyl, DeWine, Bill Nelson, Durbin, Stabenow, and
Kerry.
The major elements of S. 1371 are part of the legislation we are now
considering.
Finally, Mr. President, I want to give a few thank-yous. First, I
thank Senator Sarbanes, chairman of the Senate Banking Committee. He
saw the significance of the money laundering issue in the fight against
terrorism, and I thank him for his quick action, his bipartisan
inclusive approach, and his personal dedication to producing tough,
meaningful legislation. I also thank him for allowing my staff to
participate fully in the negotiations to reconcile the anti-money-
laundering legislation passed by the House and the Senate.
I extend my thanks and congratulations to the Senate Banking
Committee and the House Financial Services Committee for a fine
bipartisan product that will strengthen, modernize, and revitalize U.S.
anti-money-laundering laws. Congressman Oxley and Congressman LaFalce
jumped right into the issue, committed themselves to producing strong
legislation, and did the hard work needed to produce it. The
negotiations were a model of House-Senate collaboration, with
bipartisan, productive discussions leading to a legislative product
that is stronger than the legislation passed by either House and which
is legislation in which this Congress can take pride.
I also extend my thanks to Senator Daschle, Senator Lott, and Senator
Leahy for taking the actions that were essential to ensure that the
anti-money-laundering title was included in the antiterrorism bill.
Senator Daschle made it very clear that without these provisions no
antiterrorism bill would be complete. Senator Leahy took actions of all
kinds to make sure that, in fact, the anti-money laundering provisions
were included in the final bill.
I thank Senator Grassley who joined me in this effort early on and
who worked with me every step of the way win enactment of the anti-
money laundering legislation into law.
Senator Stabenow I thank for her quick and decisive action during the
Banking Committee's consideration of this bill. Without her critical
assistance, we would not be where we are today. I also thank Senator
Kerry for his consistent, strong and informed role in fashioning this
landmark legislation.
Finally I want to give a few thank-yous to staff. Elise Bean of my
staff first and foremost deserves all of our thanks for her heroic
efforts on this legislation. She and Bob Roach of our Subcommittee
staff led the Subcommittee investigations into money laundering and did
very detailed work on private banking and correspondent banking that
laid the groundwork for the legislation we are passing today. I want to
thank them both.
[[Page S11039]]
I want to thank Bill Olson of Senator Grassley's office for jumping
in whenever needed and lending strong support to this legislative
effort. Similar thanks go to John Phillips of Senator Kerry's office
who was there at all hours to make sure this legislation happened.
Similar thanks go to Senator Sarbanes' staff on the Senate Banking
Committee--especially Steve Harris, Marty Gruenberg, Patience Singleton
and Steve Kroll, who put in long hours, maintained a high degree of
both competency and professionalism, and provided an open door for my
staff to work with them.
I also want to thank the staff of the House Financial Services
Committee--Ike Jones, Carter McDowell, Jim Clinger and Cindy Fogleman.
They put in long hours, knew the subject, and were dedicated to
achieving a finished product of which we could all be proud.
Our thanks also go to Laura Ayoud of the Senate Legislative Counsel's
office who literally worked around the clock during the negotiations on
this legislation and, through it all, kept a clear eye and a cheerful
personality. Her work was essential to this product.
The PRESIDING OFFICER. The Senator from Maryland is recognized.
Mr. SARBANES. Before I make my statement and before Senator Levin
leaves the floor, I wish to acknowledge the very substantial
contribution that Senator Levin made to the money-laundering title that
is in this bill, which I think is an extremely important title. In
fact, you can't watch any program on television that has experts
talking about what we ought to be doing with respect to this terrorism
challenge when either the first or second thing they mention is to dry
up the financial sources of the terrorists, and that, of course, comes
right back to the money laundering.
Senator Levin, over a sustained period of time, in the government
operations committee, held some very important hearings, issued very
significant reports, and formulated a number of recommendations. This
title is, in part, built on the recommendations that Senator Levin put
forward at an earlier time. I simply acknowledge his extraordinary
contribution to this issue. I acknowledge Senator Kerry as well. There
were two proposals. They both had legislation in them and we used those
as building blocks in formulating this title. We think it is a very
strong title and that it can be a very effective tool in this war
against terrorism, and against drugs, and against organized crime. It
should have been done a long time ago, but it is being done now.
Before the able Senator from Michigan leaves the floor, I thank him
and acknowledge his tremendous contribution.
Mr. LEVIN. Again, I thank Senator Sarbanes for his great leadership,
along with Senator Leahy, which made this possible.
Mr. SARBANES. Mr. President, I rise in very strong support of this
legislation--in particular, title III, the International Money
Laundering Abatement and Financial Antiterrorism Act, which was
included as part of the antiterrorism legislation. Of course, that bill
was approved yesterday by the House of Representatives and will be
approved very shortly by this body.
Title III represents the most significant anti-money-laundering
legislation in many, many years--certainly since money laundering was
first made a crime in 1986. The Senate Committee on Banking, Housing,
and Urban Affairs, which I have the privilege of chairing, marked up
and unanimously approved the key anti-money-laundering provisions on
October 4. Those provisions were approved unanimously, 21-0. Those were
approved as Title III of S. 1510, the Uniting and Strengthening America
Act on October 11 by a vote of 96-1. H.R. 3004, the Financial
Antiterrorism Act, which contained many of the same provisions and
added important additional provisions, passed the House of
Representatives by a vote of 412-1 on October 17.
Title III of this conference report represents a skillful melding of
the two bills and is a result of the strong contribution made by House
Financial Services Committee and chairman Michael Oxley and ranking
member John LaFalce, working with Senator Gramm, the ranking member of
the Senate committee, and myself.
President Bush said on September 24, when he took executive branch
action on the money-laundering issue:
We have launched a strike on the financial foundation of
the global terror network.
Title III of our comprehensive antiterrorism package supplies the
armament for that strike on the financial foundation of the global
terror network. Terrorist attacks require major investments of time,
planning, training, practice, and financial resources to pay the bills.
Osama bin Laden may have boasted, ``Al-Qaida includes modern, educated
youth who are as aware of the cracks inside the Western financial
system as they are aware of the lines in their hands,'' but with title
III, we are sealing up those cracks.
Money laundering is the transmission belt that gives terrorists the
resources to carry out their campaigns of carnage, but we intend, with
the money-laundering title of this bill, to end that transmission belt
in its ability to bring resources to the networks that enable
terrorists to carry out their campaigns of violence.
I need not bring to the attention of my colleagues the fact that
public support across the country for anti-money-laundering legislation
is extremely strong. Jim Hoagland put it plainly in the Washington
Post:
This crisis offers Washington an opportunity to force
American and international banks to clean up concealment and
laundering practices they now tolerate or encourage, and
which terrorism can exploit.
This legislation takes up that challenge in a balanced and forceful
way.
Title III contains, among other provisions, authority to take
targeted action against countries, institutions, transactions, or types
of accounts the Secretary of the Treasury finds to be of primary money-
laundering concern.
It also contains critical requirements of due diligence standards
directed at correspondent accounts opened at U.S. banks by foreign
offshore banks and banks in jurisdictions that have been found to fall
significantly below international anti-money-laundering standards.
It prohibits U.S. correspondent accounts for offshore shell banks,
those banks that have no physical presence or employees anywhere and
that are not part of a regulated and recognized banking company.
The title also contains an important provision from the House bill
that requires the issuance of regulations requiring minimum standards
for verifying the identity of customers opening and maintaining
accounts at U.S. financial institutions, and it very straightforwardly
requires all financial institutions to establish appropriate anti-
money-laundering programs.
Title III also includes several provisions to enhance the ability of
the Government to share more specific information with banks, and the
ability of banks to share information with one another relating to
potential terrorist or money-laundering activities.
In addition, it provides important technical improvements in anti-
money-laundering statutes, existing statutes, and mandates to the
Department of the Treasury to act or formulate recommendations to
improve our anti-money-laundering programs.
This is carefully considered legislation. While the committee moved
expeditiously, its movement was based upon and reflects the efforts
which have been made over a number of years on this issue.
As I indicated earlier, Senator Carl Levin, Senator Kerry, and in
addition, Senator Charles Grassley have led farsighted efforts to keep
money-laundering issues on the front burner. Others in the Congress
have also been involved with this issue over time. The House Banking
Committee, under the leadership of then-Chairman Jim Leach and ranking
member John LaFalce, approved a money-laundering bill in June of 2000
by a vote of 31-1. It was very similar to the legislation introduced by
Senator Kerry.
As the successor to Congressman Leach, House Financial Services
Chairman Oxley has continued the commitment to fighting money
launderers to maintain the integrity of our financial system and, now,
to help ensure the safety of our citizens.
We have been guided in our work by the testimony presented to the
committee on September 26. We heard from a number of expert witnesses
and from the Under Secretary of the Treasury
[[Page S11040]]
Gurule, Assistant Attorney General Chertoff, and Ambassador Stuart
Eizenstat, the former Deputy Secretary of the Treasury. All of the
witnesses advocated stronger and more modern money-laundering laws.
Before describing the provisions of Title III in greater detail, I
want to single out a number of our colleagues and their staffs for
their extraordinary contributions.
I have already spoken about House Financial Services Committee
Chairman Oxley and ranking member LaFalce, but I want to note their
personal willingness and that of their staffs to work overtime to
ensure that the House and Senate reached agreement on this important
legislation. In fact, last week when the office buildings were closed
down, we met here in a room in the Capitol on Wednesday evening, well
beyond midnight, and resumed early the next morning and continued
throughout the day on Thursday, finally resolving all of our issues by
the end of that afternoon.
I am truly grateful to all the members of the Senate Banking
Committee for their strong, positive, and constructive contributions to
the Senate-approved version of Title III. I indicated it was approved
by the committee on a 21-0 vote. Ranking member Senator Gramm provided
critical support.
Senators Stabenow, Johnson, and Hagel were instrumental in producing
a compromise to resolve a dispute over one of the package's most
important provisions.
Senator Enzi brought his expertise as an accountant to bear in
refining another critical provision.
Senator Schumer, who has been involved in past efforts to address
money-laundering activities, played an important role, as did Senators
Dodd, Bayh, Carper, Corzine, Allard, and Crapo who either offered
amendments or made other important contributions for improvements in
this title.
I also want to take a moment to recognize those members of our staff
who devoted so many hours to crafting this important and comprehensive
legislation, literally all night in a couple of instances along the way
in the legislative process: Steve Kroll, Patience Singleton, Steve
Harris, Lynsey Graham, Vince Meehan, Marty Gruenberg, and Jesse Jacobs
on the Banking Committee's majority staff. And on the Banking
Committee's minority staff, I want to underscore the work of Wayne
Abernathy, Linda Lord, and Madelyn Simmons.
I also thank Elise Bean from Senator Levin's staff and John Phillips
from John Kerry's staff who worked closely with us and made significant
contributions.
Finally, I take special note of Laura Ayoud of the Legislative
Counsel's office. Mrs. Ayoud worked countless hours from the very
beginning so that the committee print and a substitute for the Banking
Committee markup were all produced on time and with the utmost accuracy
and professionalism. I must say, I think the Senate is extremely
fortunate to have professionals of the caliber of Mrs. Ayoud in the
Legislative Counsel's office. I tip my hat not only to her, but to the
extraordinary record of professionalism and dedicated service which the
Legislative Counsel's office renders to the Senate.
Title III addresses all aspects of our defenses against money
laundering. Those defenses generally fall into three parts. The first
is the Bank Secrecy Act passed in 1970. It requires financial
institutions to keep standardized transaction records and report large
currency transactions and suspicious transactions, and it mandates
reporting of the movement of more than $10,000 in currency into and out
of our country.
The Bank Secrecy Act is so named because it bars bank secrecy in
America by preventing financial institutions from maintaining opaque
records or disregarding their records altogether. Secrecy is a hiding
place for crime, and Congress has barred our institutions from allowing
those hiding places.
The second part of our money-laundering defenses are the criminal
statutes first enacted in 1986 that make it a crime to launder money
and that allow criminal and civil forfeiture of the proceeds of crime.
The third part is a statutory framework that allows information to be
communicated to and between law enforcement officials. Our goal must be
to assure, to the greatest extent consistent with reasonable privacy
protections--and we understood the necessity of balancing these
considerations--to assure ourselves that necessary information can be
used by the right persons in real time to cut off terrorism and crime.
Title III modernizes provisions in all three areas to meet today's
threats in a global economy. Its provisions are divided into three
subtitles dealing respectively with international counter-money-
laundering measures, sections 311 through 330; Bank Secrecy Act
amendments and related improvements, sections 351 through 366; and
currency crimes and protections, sections 371 through 377.
There are 46 provisions in Title III. At this time, I want to
summarize some of the bill's most important provisions.
Section 311 gives the Secretary of the Treasury, in consultation with
other senior government officials, authority to impose one or more of
five new ``special measures'' against foreign jurisdictions, entities,
transactions or accounts that in the determination of the Secretary,
after consultation with other senior federal officials, poses a
``primary money laundering concern'' to the United States. The special
measures all involve special recordkeeping and reporting measures--to
eliminate the curtains behind which launderers hide. In extreme cases
the Secretary is permitted to bar certain kinds of inter-bank accounts
from especially problematic jurisdictions. The statute specifies the
considerations the Secretary must take into account in using the new
authority and contains provisions to supplement the Administrative
Procedure Act to assure that any remedies--except certain short-term
measures--are subject to full comment from all affected persons.
This new provision gives the Secretary real authority to act to close
overseas loopholes through which U.S. financial institutions are
abused. At present the Secretary has no weapons except Treasury
Advisories, which do not impose specific requirements, or full economic
sanctions which suspend financial and trade relations with offending
targets. President Bush's invocation of the International Economic
Emergency Powers Act, IEEPA, several weeks ago was obviously
appropriate. But there are many other situations in which we will not
want to block all transactions, but where we will want to do more than
simply advise financial institutions about under-regulated foreign
financial institutions or holes in foreign countermoney laundering
efforts. Former Deputy Secretary Eizenstat testified before the
Committee in September that adding this tool to the Secretary's arsenal
was essential.
Section 312 focuses on another aspect of the fight against money
laundering, the financial institutions that make the initial decisions
about what foreign banks to allow inside the United States. It requires
U.S. financial institutions to exercise appropriate due diligence when
dealing with private banking accounts and interbank correspondent
relationships with foreign banks. With respect to foreign banks, the
section requires U.S. financial institutions to apply appropriate due
diligence to all correspondent accounts with foreign banks, and
enhanced due diligence for accounts sought by offshore banks or banks
in jurisdictions found to have substandard money laundering controls or
which the Secretary determines to be of primary money laundering
concern under the new authority given him by section 311.
The section also specifies certain minimum standards for the enhanced
due diligence that U.S. financial institutions are required to apply to
accounts opened for two categories of foreign banks with high money
laundering risks--offshore banks and banks in jurisdictions with weak
anti-money laundering and banking controls. These minimum standards
were developed from, and are based upon, the factual record and
analysis contained in the comprehensive report on correspondent banking
and money laundering that was prepared by the staff of the Senate
Permanent Subcommittee on Investigations, which Senator Levin chairs.
Section 312 is essential to title III. It addresses, with appropriate
flexibility, mechanisms whose very importance for the conduct of
commercial banking
[[Page S11041]]
makes them special targets of money launderers, as illustrated in
Senator Levin's extensive reports and hearings. The intent of the
statute is to provide special due diligence rules which will apply to
correspondent relationships maintained for foreign financial
institutions not merely by domestic banks but by all types of financial
institutions operating in the United States, subject to the authority
of the Secretary of the Treasury to define the appropriate
correspondent relationships by regulation where appropriate. Given the
scope of the applicable definition of correspondent account, in new
section 5318A (which also applies for purposes of new section 5318(i)),
the general due diligence obligations of new section 5318(i)(1) apply
to all correspondent accounts maintained by U.S. financial institutions
for any foreign financial institution (i.e., not simply foreign
depository institutions).
The statutory intent with respect to private banking accounts is
similar; that is, the statute is intended to provide special due
diligence rules for private banking accounts maintained for non-United
States persons not merely by depository institutions operating in the
United States, but by all types of financial institutions operating in
the United States and defined in 31 U.S.C. 5312, subject to the
authority of the Secretary of the Treasury to define the appropriate
definitions of the relevant terms by regulation.
The question has been raised whether the due diligence provisions of
section 312 are ``discretionary.'' The answer is no. The provisions are
to apply whether or not any rules are issued by the Treasury or whether
the Treasury takes any other implementing action (in contradistinction
to the provisions of new section 5318A, which must be affirmatively
invoked by the Secretary. The Secretary is given authority to issue
regulations ``further delineating'' the ``due diligence policies,
procedures, and controls'' required by new subsection 5318(i), but
those regulations must of course be consistent with the statutory
language and intent to require all U.S. financial institutions to
exercise the required standard of care in dealing with the risk of the
misuse of the financial mechanisms with which the subsection deals.
A provision of section 319 of title III requires foreign banks that
maintain correspondent accounts in the United States to appoint agents
for service of process within the United States and authorizes the
Attorney General and the Secretary of the Treasury to issue a summons
or subpoena to any such foreign bank seeking records, wherever located,
relating to such a correspondent account. U.S. banks must sever
correspondent arrangements with foreign banks that do not either comply
with or contest any such summons or subpoena, upon notification from
the Attorney General or Secretary of the Treasury.
All of these provisions send a simple message to foreign banks doing
business through U.S. correspondent accounts: be prepared, if you want
to use our banking facilities, to operate in accordance with U.S. law.
Section 313 of title III also builds on the factual record before the
Banking Committee to bar from the United States financial system pure
``brass-plate'' shell banks created outside the U.S. that have no
physical presence anywhere and are not affiliated with any recognized
banking institution. These shell banks carry the highest money
laundering risks in the banking world because they are inherently
unavailable for effective oversight--there is no office where a bank
regulator or law enforcement official can go to observe bank
operations, review documents or freeze funds. Thus the ban on provision
of correspondent banking services for such brass-plate institutions is
a particularly important part of title III. New 31 U.S.C. 5318(j) is
intended to be vigorously enforced and strictly applied, especially in
light of the relief provided in the statute for special banking
vehicles that are affiliated with operating institutions and are
subject to financial supervision along with those institutions.
Section 325 permits the Secretary to deal with abuse of another
recognized commercial banking mechanism--concentration accounts that
are used to commingle related funds temporarily in one place pending
disbursement or the transfer of funds into individual client accounts.
Concentration accounts have been used to launder funds, and the bill
authorizes the Secretary to issue rules to bar the use of concentration
accounts to move client funds anonymously, without documentation
linking particular funds to their true owners. I believe that the
Secretary must move promptly to exercise the regulatory authority
granted by this section.
Section 326 will help ensure that individuals opening accounts with
U.S. financial institutions provide information adequate to enable law
enforcement and supervisory agencies to identify accounts maintained by
individuals suspected of terrorist activities. The section requires the
Secretary of the Treasury to prescribe regulations in consultation with
each federal functional regulators to set minimum standards and
procedures concerning the verification of customers' identity,
maintenance of records of identity verification, and consultation at
account opening of lists of known or suspected terrorists provided to
the financial institution by a government agency. This section also
requires the Secretary of the Treasury to submit recommendations to
Congress, within 6 months of enactment, on the most effective way to
require foreign nationals to provide financial institutions in the
United States with accurate identity information.
It is the intent of section 326 that regulations pursuant to that
section do not place obligations solely on the shoulders of the
Nation's financial institutions, without placing any obligations on
their customers. The contemplated regulations should therefore include
provisions relating to the obligations of individuals to provide
accurate information in connection with account-opening procedures, so
that in appropriate cases penalties may apply under the Bank Secrecy
Act to customers who willfully mislead bank officials about matters of
customer identity.
Section 352 requires financial institutions to establish minimum
antimoney laundering programs that include appropriate internal
policies, management, employee training, and audit features. This is
not a ``one-size-fit-all'' requirement; in fact its very generality
recognizes that different types of programs will be appropriate for
different types and sizes of institutions. It is our intention, by
using general language in the amended provision, that the content of
the relevant antimoney laundering programs will necessarily vary with
the details of the particular financial institutions involved and the
money laundering risks to which the nature of such institution and its
financial products exposes the institution. Treasury regulations
pursuant to this section should allow adjustment of the extent of
antimoney laundering programs for smaller businesses but not exempt
businesses from the requirement altogether simply because of their
size.
A number of improvements are made to the suspicious activity
reporting rules. First, technical changes strengthen the safe harbor
from civil liability for institutions that report suspicious activity
to the Treasury, Sec. 351. The provisions not only add to the
protection for reporting institutions; they also address individual
privacy concerns by making it clear that government officers may not
disclose suspicious transaction reports information except in the
conduct of their official duties. Section 356 also requires the
issuance of final suspicious transaction reporting rules applicable to
brokers and dealers in securities by July 1, 2002; senior officials of
the relevant agencies must meet expeditiously to resolve the policy
issues raised at staff levels about the content of the necessary
regulations and the extent to which suspicious transaction reporting
rules should be the same for banking and securities.
Sections 359 and 373 of the title deal with underground banking
systems such as the Hawala, which is suspected of being a channel used
to finance the al Qaeda network. Section 359 makes it clear that
underground money transmitters are subject to the same recordkeeping
rules--and the same penalties for violating those rules--as above-
ground, recognized, money transmitters. It also directs the Secretary
of the Treasury to report to Congress, within 1 year, on the need for
additional legislation or regulatory controls relating to underground
banking
[[Page S11042]]
systems. Section 373 clarifies that operators of a money transmitter
business can be prosecuted under Federal law for operating an illegal
money transmitting business if they do not have a required State
license.
Section 360 authorizes the Secretary of the Treasury to instruct the
United States Executive Director of each of the international financial
institutions to use such Director's ``voice and vote'' to support loans
and other use of resources to benefit nations that the President
determines to be contributing to efforts to combat international
terrorism, and to require the auditing of each international financial
institution to ensure that funds are not paid to persons engaged in or
supporting terrorism.
Section 371 creates a new Bank Secrecy Act offense involving the bulk
smuggling of more than $10,000 in currency in any conveyance, article
of luggage or merchandise or container, either into or out of the
United States, and related forfeiture provisions. This provision has
been sought for several years by both the Departments of Justice and
Treasury.
Other provisions of the bill address relevant provisions of the
Criminal Code. These provisions were worked out with the House and
Senate Judiciary Committees and are included in title III because of
their close relationship to the provisions of title 31 added or
modified by title III.
The most important is section 315, which expands the list of
specified unlawful activities under 18 U.S.C. 1956 and 1957 to include
foreign corruption offenses, certain U.S. export control violations,
offenses subject to U.S. extradition obligations under multilateral
treaties, and various other offenses. The Department of Justice should
make use of the expanded authority, created by section 315, to make the
risk of detection to foreign kleptocrats immediate and palpable.
Section 316 establishes procedures to protect the rights of persons
whose property may be subject to confiscation in the exercise of the
government's antiterrorism authority. This provision is designed to
assure that there is no situation in which the defendant in a
forfeiture action will lack the opportunity to challenge the forfeiture
simply because of the authority under which the forfeiture is sought.
Section 319 treats amounts deposited by foreign banks in interbank
accounts with U.S. banks as having been deposited in the United States
for purposes of the forfeiture rules, but grants the Attorney General
authority, in the interest of fairness and consistent with the United
States' national interest, to suspend a forfeiture proceeding based on
that presumption. This closes an important forfeiture loophole.
A third important set of provisions modernize information-sharing
rules to reflect the reality of the flight against money laundering and
terrorism.
Section 314 requires the Secretary of the Treasury to issue
regulations to encourage cooperation among financial institutions,
financial regulators and law enforcement officials and to permit the
sharing of information by law enforcement and regulatory authorities
with such institutions regarding persons reasonably suspected, based on
credible evidence, of engaging in terrorist acts or money laundering
activities. The section also allows banks to share information
involving possible money laundering or terrorist activity among
themselves--with notice to the Secretary of the Treasury.
Section 330 states the sense of Congress that the President should
direct certain cabinet officers to seek negotiations with foreign
supervisory agencies to ensure that foreign institutions maintain
adequate records relating to any foreign terrorist organization or
person engaged in any financial crime and to make such records
available to U.S. law enforcement and financial supervisory personnel.
Section 355 permits but does not require, a bank to include
information, in a response to a request for an employment reference by
a second bank, about the possible involvement of a former institution-
affiliated party in potentially unlawful activity, and creates a safe
harbor from civil liability for the bank that includes such information
in response to an employment reference request, except in the case of
malicious intent.
Section 358 contains amendments to various provisions of the Bank
Secrecy Act, the Right to Financial Privacy Act, and the Fair Credit
Reporting Act to permit information subject to those statutes to be
used in the conduct of United States intelligence or
counterintelligence activities to protect against international
terrorism.
Section 361 seeks to enhance the ability of FinCEN to address money
laundering and terrorism. The section makes FinCEN a bureau of the
Treasury and requires the Secretary to establish operating procedures
for the government-wide data access service and communications center
that FinCEN operates. In recognizing FinCEN's evolution and maturity,
it is not our intention to require existing delegations of authority to
be reissued simply because FinCEN's organizational status has changed
from Treasury office to Treasury bureau.
The modernization of our money-laundering laws represented by Title
III is long overdue. It is not the work of one or two weeks but
represents years of careful study and a bipartisan effort to produce
prudent and effective legislation. The care taken in producing the
legislation extends to several provisions calling for reporting on the
effect of the legislation and a provision for a three-year review of
the effectiveness of the legislation. Title III responds, as I have
indicated, to the statement of Assistant Attorney General Chertoff, the
head of the Department of Justice's Criminal Division. I want to
express my appreciation to him, Under Secretary Gurule at the Treasury,
and his associates for their help in this effort.
At the hearing on September 26, Assistant Attorney General Chertoff
said, and I quote him, ``We are fighting with outdated weapons in the
money-laundering arena today.'' Without this legislation, the cracks in
the financial system of which bin Laden spoke would remain open. We
should not, indeed we cannot, allow that to continue. And that is why
enactment of this legislation is so important.
Title III is a balanced effort to address a complex area of national
concern. It is the result of a truly bipartisan effort on both sides of
Congress working closely with the executive branch, with the White
House, with the Department of the Treasury, and the Department of
Justice. I very strongly urge support for this essential component of
the antiterrorism package.
I ask unanimous consent that a section-by-section summary be printed
in the Record.
There being no objection, the material was ordered to be printed in
the Record, as follows:
Title III--International Money Laundering Abatement and Financial Anti-
Terrorism Act of 2001--Section-by-Section Summary
Section 301. Short title and table of contents
Section 302. Findings and purposes
Section 303. 4-Year congressional review-expedited
consideration
Section 313 provides that the provisions added and
amendments made by Title III will terminate after September
30, 2004, if the Congress enacts a joint resolution to that
effect, and that any such joint resolution will be considered
by the Congress expeditiously.
subtitle a. international counter-money laundering and related matters
Section 311. Special measures for jurisdictions, financial
institutions, or international transactions or accounts
of primary money laundering concern
Section 311 adds a new section 31 U.S.C. 5318A, entitled
``Special measures for jurisdictions, financial institutions,
or international transactions of primary money laundering
concern,'' to the Bank Secrey Act. The new section gives the
Secretary of the Treasury, in consultation with other senior
government officials, authority (in the Secretary's
discretion), to impose one or more of five new ``special
measures'' against foreign jurisdictions, foreign financial
institutions, transactions involving such jurisdictions or
institutions or one more types of accounts, that the
Secretary, after consultation with Secretary of State and the
Attorney General, determines to pose a ``primary money
laundering concern'' to the United States. The special
measures include: (1) requiring additional recordkeeping or
reporting for particular transactions, (2) requiring the
identification of the foreign beneficial owners of certain
accounts at a U.S. financial institution, (3) requiring the
identification of customers of a foreign bank who use an
interbank payable-through account opened by that foreign bank
at a U.S. bank, (4) requiring the identification of customers
of a foreign bank who use an interbank correspondent account
opened by that foreign
[[Page S11043]]
bank at a U.S. bank, and (5) after consultation with the
Secretary of State, the Attorney General, and the Chairman of
the Federal Reserve Board, restricting or prohibiting the
opening or maintaining of certain interbank correspondent or
payable through accounts. Measures 1-4 may not be imposed for
more than 120 days except by regulation, and measure 5 may
only be imposed by regulation.
Section 312. Special due diligence for correspondent accounts
and private banking accounts
Section 312(a) of the Act adds a new subsection (1),
entitled ``Due Diligence for United States Private Banking
and Correspondent Banking Accounts involving Foreign
Persons,'' to 31 U.S.C. 5318. The new subsection requires a
U.S. financial institution that maintains a correspondent
account or private banking account for a non-United States
person (or that person's representative) to establish
appropriate, specific, and, where necessary, enhanced due
diligence procedures that are reasonably designed to detect
and report instances of money laundering through such
accounts. For this purpose, a correspondent account is
defined in the new section 5318A, added to the Bank Secrecy
Act by section 311 of Title III.
The general requirement is supplemental by two additional,
more specific, due diligence standards that are required for
certain types of correspondent and private banking accounts.
Correspondent Accounts.--In the case of certain
correspondent accounts, the additional standards required by
subsection 5318(i)(2) require a U.S. financial institution
to, at a minimum, do three things. First, it must ascertain
the identity, and the nature and extent of the ownership
interests, of the owners of any foreign bank correspondent
whose shares are not publicly traded. Second, it must conduct
enhanced scrutiny of the correspondent account to guard
against money laundering and satisfy its obligation to report
suspicious transactions under the terms of 31 U.S.C. 5318(g).
Third, it must ascertain whether any foreign bank
correspondent in turn provides correspondent accounts to
third party foreign banks; if so the U.S. financial
institution must ascertain the identity of those third party
foreign banks and related due diligence information required
under the general rules of paragraph 5318(i)(1).
These additional standards apply to correspondent accounts
requested or maintained by or on behalf of any foreign bank
operating under (i) an offshore banking license (defined by
the statute as a banking license that bars the licensee from
conducting banking activities with citizens of, or in the
local currency of, the jurisdiction that issued the license),
or (ii) under a banking license issued (A) by any country
designated as noncooperative with international anti-money
laundering principles by an intergovernmental body of which
the United States is a member, with the concurrence of the
U.S. representative to such body, or (B) by a country that
has been designated by the Secretary of the Treasury as
warranting special measures (i.e., the special measures
authorized by new section 31 U.S.C. 5318A, added by section
311 of Title III), due to money laundering concerns.
Private Banking Accounts.--In the case of private banking
accounts, the additional standards required by subsection
5318(i)(3) require a U.S. financial institution to, at a
minimum, do two things. First, the U.S. financial institution
must take reasonable steps to ascertain the identity of the
nominal and beneficial owners of the account and the source
of funds deposited into the account, as needed to guard
against money laundering and report any suspicious
transactions under the terms of 31 U.S.C. 5318(g). Second,
the U.S. financial institution must take reasonable steps to
conduct enhanced scrutiny, that is reasonably designed to
detect and report transactions that may involve the proceeds
of foreign corruption, for any private banking account that
is requested or maintained by, or on behalf of, a senior
foreign political figure (or any immediate family member or
close associate of such a political figure).
A private banking account for this purpose is any account
or combination of accounts that requires a minimum aggregate
deposit of at least $1 million, is established on behalf of
one or more individuals who have either a direct or
beneficial ownership interest in the account, and that is
assigned to, or administered or managed by, in whole or in
part, an officer, employee or agent of a financial
institution who serves as liaison between the institution
and the account's direct or beneficial owner or owners.
Effective Date; Regulations.--31 U.S.C. 5318(j) will take
effect 270 days after the date of enactment of Title III as
part of the Uniting to Save America Act and will apply to
otherwise covered correspondent and private banking accounts,
whether opened before, on, or after the date of enactment.
Section 312(b) of Title III requires the Secretary of the
Treasury, in consultation with the appropriate federal
functional regulators of the affected financial institutions,
to further delineate, by regulation, the due diligence
policies, procedures, and controls required under new
subsection 5318(j), not later than 180 days of the date of
enactment. However, the new subsection will take effect
whether or not final regulations are issued before the 270th
day following enactment, and any failure to issue regulations
whether before or after the effective date is in no way to
affect the enforceability of subsection 5318(j).
Section 313. Prohibition on United States correspondent
accounts with foreign shell banks
Section 313(a) of the Act adds a new subsection (j),
entitled ``Prohibition on United States Correspondent
Accounts with Foreign Shell Banks'' to 31 U.S.C. 5318. The
new subsection bars any depository institution or registered
broker-dealer in securities, operating in the United States,
from establishing, maintaining, administering, or managing a
correspondent account in the United States for a foreign
bank, if the foreign bank does not have ``a physical presence
in any country.'' The subsection also includes a requirement
that any financial institution covered by the subsection must
take reasonable steps (as delineated by Treasury regulations)
to ensure that it is not providing the prohibited services
indirectly to a ``no-physical presence bank,'' through a
third party foreign bank correspondent of the U.S.
institution. The prohibition does not apply, however, to a
correspondent account provided by a U.S. institution to a
foreign ``no physical presence'' bank if that foreign bank is
an affiliate of a depository institution (including a credit
union or foreign bank) that does have a physical presence in
some country and if the foreign shell bank is subject to
supervision by a banking authority that regulates its
``physical presence'' affiliate in that country. Both the
terms ``affiliate'' and ``physical presence'' are defined in
the new subsection.
Section 313(b) provides that the ban on provision of
correspondent accounts for brass-plate banks will take effect
at the end of the 60 day period ending on the date of
enactment.
Section 314. Cooperative efforts to deter money laundering
Section 314 requires the Secretary of the Treasury to issue
regulations, within 120 days of the date of enactment, to
encourage cooperation among financial institutions, financial
regulators and law enforcement officials, and to permit the
sharing of information by law enforcement and regulatory
authorities with such institutions regarding persons
reasonably suspected, based on credible evidence, of engaging
in terrorist acts or money laundering activities. Section 314
also allows (with notice to the Secretary of the Treasury)
the sharing of information among banks involving possible
terrorist or money laundering activity, and requires the
Secretary of the Treasury to publish, at least semiannually,
a report containing a detailed analysis of patterns of
suspicious activity and other appropriate investigative
insights derived from suspicious activity reports and law
enforcement investigations.
Section 315. Inclusion of foreign corruption offenses as
money laundering crimes
Section 315 amends 18 U.S.C. 1956 to include foreign
corruption offenses, certain U.S. export control violations,
certain customs and firearm offenses, certain computer fraud
offenses, and felony violations of the Foreign Agents
Registration Act of 1938, to the list of crimes that
constitute ``specified unlawful activities'' for purposes of
the criminal money laundering provisions. These changes in
law mean that the U.S. will no longer allow a rapacious
foreign dictator to bring his funds to the U.S. and hide them
without fear of detection or prosecution.
Section 316. Anti-terrorist forfeiture protection
Section 316 establishes procedures to protect the rights of
persons whose property may be subject to confiscation in the
exercise of the government's anti-terrorism authority.
Section 317. Long-arm jurisdiction over foreign money
launderers
Section 317 amends 18 U.S.C. 1956 to give United States
courts ``long-arm'' jurisdiction over foreign persons
committing money laundering offenses in the United States,
over foreign banks opening U.S. bank accounts, and over
foreign persons who convert assets ordered forfeited by a
U.S. court. The amendments made by section 317 also permit a
federal court dealing with such foreign persons to issue a
pre-trial restraining order or take other action necessary to
preserve property in the United States to satisfy an ultimate
judgment. Finally, the amendment also permits the appointment
by a federal court of a receiver to collect and take custody
of a defendant's assets to satisfy criminal or civil money
laundering or forfeiture judgments.
Section 318. Laundering money through a foreign bank
Section 318 expands the definition of financial institution
for purposes of 18 U.S.C. 1956 and 1957 to include banks
operating outside of the United States.
Section 319. Forfeiture of funds in United States interbank
accounts
Section 319 contains a number of provisions that are
designed to deal with practical issues raised by money
laundering control and financial transparency, relating
primarily to correspondent accounts at U.S. financial
institutions.
First, section 319 amends 18 U.S.C. 981 to treat amounts
deposited by foreign banks in interbank accounts with U.S.
banks as having been deposited in the United States for
purposes of the forfeiture rules, but grants the Attorney
General authority, in the interest of justice and consistent
with the United
[[Page S11044]]
States' national interest, to suspend a forfeiture proceeding
that is otherwise based on the ``U.S. deposit'' presumption.
Second, section 319 adds a new subsection (k) to 31 U.S.C.
5318 to require U.S. financial institutions to reply to a
request for information from a U.S. regulator relating to
anti-money laundering compliance within 120 hours of receipt
of such a request, and to require foreign banks that maintain
correspondent accounts in the United States to appoint agents
for service of process within the United States; the new 31
U.S.C. 5318(k) authorizes the Attorney General and the
Secretary of the Treasury to issue a summons or subpoena to
any such foreign bank seeking records, wherever located,
relating to such a correspondent account. Finally, the
provision requires the U.S. depository institution or broker-
dealer that maintains the account to sever correspondent
arrangements with any foreign bank within 10 days of
notification by the Attorney General or the Secretary of the
Treasury (each after consultation with the other) that the
foreign bank has neither complied with nor contested any such
summons or subpoena.
Finally, Section 319 amends section 413 of the Controlled
Substances Act to authorize United States courts to order a
convicted criminal to return property located abroad and to
order a civil forfeiture defendant to return property located
abroad pending trial on the merits.
Section 320. Proceeds of foreign crimes
Section 320 amends 18 U.S.C. 981 to permit the United
States to institute forfeiture proceedings against the
proceeds of foreign criminal offenses found in the United
States.
Section 321. Financial institutions specified in subchapter
II of chapter 53 of Title 31, United States Code
Section 321 amends 31 U.S.C. 5312(2) to add credit unions,
futures commission merchants, commodity trading advisors, and
registered commodity pool operators to the definition of
``financial institution'' for purposes of the Bank Secrecy
Act, and to include the Commodity Futures Trading Commission
within the term ``federal functional regulator'' for purposes
of the Bank Secrecy Act.
Section 322. Corporation represented by a fugitive
Section 322 extends the existing prohibition, in 18 U.S.C.
2466, against the maintenance of a forfeiture proceeding on
behalf of a fugitive to include a proceeding by a corporation
whose majority shareholder is a fugitive and a proceeding in
which the corporation's claim is instituted by a fugitive.
Section 323. Enforcement of foreign judgments
Section 323 permits the government to seek a restraining
order to preserve the availability of property subject to a
foreign forfeiture or confiscation judgment.
Section 324. Report and recommendation
Section 324 directs the Secretary of the Treasury, in
consultation with the Attorney General, the Federal banking
agencies, the SEC, and other appropriate agencies to evaluate
operation of the provisions of Subtitle A of Title III of the
Act and recommend to Congress any relevant legislative
action, within 30 months of the date of enactment.
Section 325. Concentration accounts at financial
institutions
Section 325 amends 31 U.S.C. 5318(h) to authorize the
Secretary of the Treasury to issue regulations concerning the
maintenance of concentration accounts by U.S. depository
institutions, to prevent an institution's customers from
anonymously directing funds into or through such accounts.
Section 326. Verification of identification
Sec, 326(a) adds a new subsection (l) to 31 U.S.C. 5318 to
require the Secretary of the Treasury to prescribe by
regulation, jointly with each federal functional regulator,
minimum standards for financial institutions and their
customers regarding the identity of the customer that shall
apply in connection with the opening of an account at a
financial institution; the minimum standards shall require
financial institutions to implement, and customers (after
being given adequate notice) to comply with, reasonable
procedures concerning verification of customer identity,
maintenance of records of identity verification, and
consultation at account opening of lists of known or
suspected terrorists provided to the financial institution by
a government agency. The required regulations are to be
issued within one year of the date of enactment.
Section 326(b) requires the Secretary of the Treasury,
again in consultation with the federal functional regulators
(as well as other appropriate agencies), to submit a report
to Congress within six months of the date of enactment
containing recommendations about the most effective way to
require foreign nationals to provide financial institutions
in the United States with accurate identity information,
comparable to that required to be provided by U.S. nationals,
and to obtain an identification number that would function
similarly to a U.S. national's tax identification number.
Section 327. Consideration of anti-money laundering record
Section 327 amends section 3(c) of the Bank Holding Company
Act of 1956, and section 18(c) of the Federal Deposit
Insurance Act to require the Federal Reserve Board and the
Federal Deposit Insurance Corporation, respectively, to
consider the effectiveness of a bank holding company or bank
(within the jurisdiction of the appropriate agency) in
combating money laundering activities, including in overseas
branches, in ruling on any merger or similar application by
the bank or bank holding company.
Section 328. International cooperation on identification of
originators of wire transfers
Section 328 requires the Secretary of the Treasury, in
consultation with the Attorney General and the Secretary of
State, to take all reasonable steps to encourage governments
to require the inclusion of the name of the originator in
wire transfer instructions sent to the United States, and to
report annually to the House Committee on Financial Services
and the Senate Committee on Banking, Housing, and Urban
Affairs concerning progress toward that goal.
Section 329. Criminal penalties
Section 329 provides criminal penalties for officials who
violate their trust in connection with the administration of
Title III.
Section 330. International cooperation in investigations of
money laundering, financial crimes, and the finances of
terrorist groups
Section 330 states the sense of the Congress that the
President should direct the Secretary of State, the Attorney
General, or the Secretary of the Treasury, as appropriate and
in consultation with the Federal Reserve Board, to seek
negotiations with foreign financial supervisory agencies and
other foreign officials, to ensure that foreign financial
institutions maintain adequate records relating to any
foreign terrorist organization or its membership, or any
person engaged in money laundering or other financial crimes,
and make such records available to U.S. law enforcement and
financial supervisory personnel when appropriate.
Subtitle B. Bank Secrecy Act Amendments and Related Improvements
Section 351. Amendments relating to reporting of suspicious
activities
Section 351 restates 31 U.S.C. 5318(g)(3) to clarify the
terms of the safe harbor from civil liability for financial
institutions filing suspicious activity reports pursuant to
31 U.S.C. 5318(g). The amendments to paragraph (g)(3) also
create a safe harbor from civil liability for banks that
provide information in employment references sought by other
banks pursuant to the amendment to the Federal Deposit
Insurance Act made by Section 355 of Title III.
Section 352. Anti-money laundering programs
Section 352 amends 31 U.S.C. 5318(h) to require financial
institutions to establish anti-money laundering programs and
grants the Secretary of the Treasury authority to set minimum
standards for such programs. The anti-money laundering
program requirement takes effect at the end of the 180 day
period beginning on the date of enactment of the Act and the
Secretary of the Treasury is to prescribe regulations before
the end of that 180 day period that consider the extent to
which the requirements imposed under amended section 5318(h)
are commensurate with the size, location, and activities of
the financial institutions to which the regulations apply.
Section 353. Penalties for violations of geographic targeting
orders and certain recordkeeping requirements, and
lengthening effective period of geographic targeting
orders
Section 353 amends 31 U.S.C. 5321, 5322, and 5324 to
clarify that penalties for violation of the Bank Secrecy Act
and its implementing regulations also apply to violations of
Geographic Targeting orders issued under 31 U.S.C. 5326, and
to certain recordkeeping requirements relating to funds
transfers. Section 353 also amends 31 U.S.C. 5326 to make the
period of a geographic target order 180 days.
Section 354. Anti-money laundering strategy
Section 354 amends 31 U.S.C. 5341(b) to add ``money
laundering related to terrorist funding'' to the list of
subjects to be dealt with in the annual National Money
Laundering Strategy prepared by the Secretary of the Treasury
pursuant to the Money Laundering and Financial Crimes
Strategy Act of 1998.
Section 355. Authorization to include suspicions of illegal
activity in written employment references
Section 355 amends section 18 of the Federal Deposit
Insurance Act to permit (but not require) a bank to include
information, in a response to a request for an employment
reference by a second bank, about the possible involvement of
a former institution-affiliated party in potentially unlawful
activity. A bank that provides information to a second bank
under the terms of this amendment is protected from civil
liability arising from the provision of the information
unless the first bank acts with malicious intent.
Section 356. Reporting of suspicious activities by securities
brokers and dealers; investment company study
Section 356(a) directs the Secretary of the Treasury, after
consultation with the Securities and Exchange Commission and
the Federal Reserve Board, to publish proposed regulations,
on or before December 31, 2002, and final regulations on or
before July 1, 2002, requiring broker-dealers to file
suspicious activity reports.
Section 356(b) authorizes the Secretary of the Treasury, in
consultation with the Commodity Futures Trading Commission,
to prescribe regulations requiring futures commission
merchants, commodity trading advisors, and certain commodity
pool operators to submit suspicious activity reports under 31
U.S.C. 5318(g). To a significant extent, the authorization
clarifies and restates the terms of existing law, but it also
signals our concern that the Treasury move quickly to
[[Page S11045]]
determine the extent to which suspicious transaction
reporting by commodities firms is necessary as a part of the
nation's anti-money laundering programs.
Section 356(c) requires the Secretary of the Treasury, the
SEC and Federal Reserve Board to submit jointly to Congress,
within one year of the date of enactment, recommendations for
effective regulations to apply the provisions of 31 U.S.C.
5311-30 to both registered and unregistered investment
companies, as well as recommendations as to whether the
Secretary should promulgate regulations treating personal
holding companies as financial institutions that must
disclose their beneficial owners when opening accounts or
initiating funds transfers at any domestic financial
institution.
Section 357. Special report on administration of Bank Secrecy
provisions
Section 357 directs the Secretary of the Treasury to submit
a report to Congress, six months after the date of enactment,
on the role of the Internal Revenue Service in the
administration of the Bank Secrecy Act, with emphasis on
whether IRS Bank Secrecy Act information processing
responsibility (for reports filed by all financial
institutions) or Bank Secrecy Act audit and examination
responsibility (for certain non-bank financial institutions)
should be retained or transferred.
Section 358. Bank Secrecy provisions and anti-terrorist
activities of the United States intelligence agencies
Section 358 contains amendments to various provisions of
the Bank Secrecy Act, the Right to Financial Privacy Act, and
the Fair Credit Reporting Act, to permit information to be
used in the conduct of United States intelligence or
counterintelligence activities to protect against
international terrorism.
Section 359. Reporting of suspicious activities by
underground banking systems
Section 359 amends various provisions of the Bank Secrecy
Act to clarify that the Bank Secrecy Act treats certain
underground banking systems as financial institutions, and
that the funds transfer recordkeeping rules applicable to
licensed money transmitters also apply to such
underground systems. Section 359 also directs the
Secretary of the Treasury to report to Congress, within
one year of the date of enactment, on the need for
additional legislation or regulatory controls relating to
underground banking systems.
Section 360. Use of authority of the United States Executive
Directors.
Section 360 authorizes the Secretary of the Treasury to
instruct the United States Executive Director of each of the
international financial institutions (for example, the IMF
and the World Bank) to use such Director's ``voice and vote''
to support loans and other use of resources to benefit
nations that the President determines to be contributing to
United States efforts to combat international terrorism, and
to require the auditing of each international financial
institution to ensure that funds are not paid to persons
engaged in or supporting terrorism.
Section 361. Financial Crimes Enforcement Network.
Section 361 adds a new section 310 to Subchapter I of
chapter 3 of title 31, United States Code, to make the
Financial Crimes Enforcement Network (``FinCEN'') a bureau
within the Department of the Treasury, to specify the duties
of FinCEN's Director, and to require the Secretary of the
Treasury to establish operating procedures for the
government-wide data access service and communications center
that FinCEN maintains. Section 361 also authorizes
appropriations for FinCEN for fiscal years 2002 through 2005.
Finally, Section 361 requires the Secretary to study methods
for improving compliance with the reporting requirements for
ownership of foreign bank and brokerage accounts by U.S.
nationals imposed by regulations issued under 31 U.S.C. 5314;
the required report is to be submitted within six months of
the date of enactment and annually thereafter.
Section 362. Establishment of highly secure network.
Section 362 directs the Secretary of the Treasury to
establish, within nine months of enactment, a secure network
with FinCEN that will allow financial institutions to file
suspicious activity reports and provide such institutions
with information regarding suspicious activities warranting
special scrutiny.
Section 363. Increase in civil and criminal penalties for
money laundering.
Section 363 increases from $100,000 to $1,000,000 the
maximum civil and criminal penalties for a violation of
provisions added to the Bank Secrecy Act by sections 311, 312
and 313 of this Act.
Section 364. Uniform protection authority for Federal
Reserve facilities.
Section 364 authorizes certain Federal Reserve personnel to
act as law enforcement officers and carry fire arms to
protect and safeguard Federal Reserve employees and premises.
Section 365. Reports relating to coins and currency received
in nonfinancial trade or business.
Section 365 adds 31 U.S.C. 5331 (and makes related and
conforming changes) to the Bank Secrecy Act to require any
person who receives more than $10,000 in coins or currency,
in one transaction or two or more related transactions in the
course of that person's trade or business, to file a report
with respect to such transaction with FinCEN; regulations
implementing the new reporting requirement are to be
promulgated within six months of enactment.
Section 366. Efficient use of current transaction report
system.
Section 366 requires the Secretary of the Treasury to
report to the Congress before the end of the one year period
beginning on the date of enactment containing the results of
a study of the possible expansion of the statutory system for
exempting transactions from the currency transaction
reporting requirements and ways to improve the use by
financial institutions of the statutory exemption system as a
way of reducing the volume of unneeded currency transaction
reports.
Subtitle C. Currency Crimes
Section 371. Bulk cash smuggling.
Section 371 creates a new Bank Secrecy Act offense, 31
U.S.C. 5332, involving the bulk smuggling of more than
$10,000 in currency in any conveyance, article of luggage or
merchandise or container, either into or out of the United
States, and related forfeiture provisions.
Section 372. Forfeiture in currency reporting cases.
Section 372 amends 31 U.S.C. 5317 to permit confiscation of
funds in connection with currency reporting violations
consistent with existing civil and criminal forfeiture
procedures.
Section 373. Illegal money transmitting business.
Section 373 amends 18 U.S.C. 1960 to clarify the terms of
the offense stated in that provision, relating to knowing
operation of an unlicensed (under state law) or unregistered
(under federal law) money transmission business. Section 373
also amends 18 U.S.C. 981(a) to authorize the seizure of
funds involved in a violation of 18 U.S.C. 1960.
Section 374. Counterfeiting domestic currency and
obligations.
Section 374 makes a number of changes to the provisions of
18 U.S.C. 470-473 relating to the maximum sentences for
various counterfeiting offenses, and adds to the definition
of counterfeiting in 18 U.S.C. 474 the making, acquiring,
etc. of an analog, digital, or electronic image of any
obligation or other security of the United States.
Section 375. Counterfeiting foreign currency and
obligations.
Section 375 makes a number of changes to the provisions of
18 U.S.C. 478-480 relating to the maximum sentences for
various counterfeiting offenses involving foreign obligations
or securities and adds to the definition of counterfeiting in
18 U.S.C. 481 the making, acquiring, etc. of an analog,
digital, or electronic image of any obligation or other
security of a foreign government.
Section 376. Laundering the proceeds of terrorism.
Section 376 amends 18 U.S.C. 1956 to add the provision of
support to designated foreign terrorist organizations to the
list of crimes that constitute ``specified unlawful
activities'' for purposes of the criminal money laundering
statute. (This provision was originally included in another
title of the terrorism legislation.)
Section 377. Extraterritorial jurisdiction.
Section 377 amends 18 U.S.C. 1029 to vest United States
authorities with extraterritorial jurisdiction over acts
involving access device, credit card and similar frauds that
would be crimes if committed within the United States and
that are directed at U.S. entities or linked to U.S.
activities.
The PRESIDING OFFICER. The Senator from Nevada.
Mr. REID. Mr. President, what Senator Daschle would like to do, and
this has been cleared with the two managers, is have a vote before 2
p.m. today, approximately 5 minutes to 2 p.m. There is a meeting at the
White House. There are a number of very important hearings, one
including the Secretary of State. We are waiting for one more Senator
who has 15 minutes. We understand that Senator Specter is on his way.
I ask unanimous consent that the vote on passage of the
Counterterrorism Act occur at 1:55 p.m. Further, that there be 10
minutes of closing debate. I will alter that by saying whatever time
Senator Specter does not use, it will be divided between the two
managers of the bill.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. REID. I suggest the absence of a quorum.
The PRESIDING OFFICER. The clerk will call the roll.
The legislative clerk proceeded to call the roll.
Mr. SPECTER. Mr. President, I ask unanimous consent that the order
for the quorum call be rescinded.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. SPECTER. Mr. President, I have sought recognition to state my
support
[[Page S11046]]
for the pending legislation. This is very important legislation in
response to the atrocious terrorist attacks of September 11. We will at
some date in the future conduct congressional oversight to make a
determination as to whether there were any deficiencies in our
intelligence operations prior to the September 11 attacks. However, we
should wait until the appropriate time because our intelligence
entities are busy now collecting intelligence to avoid any recurrence
of the terrorist attacks. But it is important that law enforcement have
appropriate tools at their disposal to combat terrorists. In the United
States that means careful legislation which is in accordance with our
constitutional rights and our civil liberties.
I believe Congress has responded appropriately in this matter with
due deliberation. There is obviously a temptation in the face of what
occurred on September 11 to respond spontaneously or reflexively, but
we have undertaken this legislation, I think, with appropriate care and
now have a good product.
I had expressed concerns when the bill was on the Senate floor that
there could be some question about the adequacy of the deliberative
process because the Supreme Court of the United States has held acts of
Congress unconstitutional where they questioned the thoroughness or
deliberation. I think this bill as presented today does meet that
standard.
The legislation has very important provisions under the Foreign
Intelligence Surveillance Act where a modification has been made to
authorize electronic surveillance where there is a ``significant''
rather than a ``primary'' purpose, allowing use of the Foreign
Intelligence Surveillance Act.
I chaired the Judiciary subcommittee, which did Department of Justice
oversight, getting into the Foreign Intelligence Surveillance Act in
some detail with respect to the Wen Ho Lee case. This is a change which
is necessary, and I believe it is a change which will pass
constitutional muster.
The electronic surveillance adds terrorism to wiretap predicates. It
is rather surprising that terrorism, or allegations of terrorism, have
not been sufficient to authorize electronic surveillance in the past.
This corrects a long-standing deficiency.
The pen register has been expanded for nationwide orders, which makes
sense on an administrative level and does not conflict with any issues
of civil liberties or constitutional rights. The bill increases the
civil liability for unauthorized disclosure of wiretapping information,
which I think is important.
One of the key provisions of the bill is the sunset provisions
relating to the Foreign Intelligence Surveillance Act, electronic
surveillance, and information sharing which expire on December 31,
2005, with an appropriate exception for ongoing investigations. This
will enable us to see how this expanded power will work out and will
require reauthorization, new legislation, if we wish to continue it
beyond.
The provisions on immigration are important, requiring the Department
of Justice and the FBI to share certain information with the State
Department and INS. The issues regarding detention, I think, have been
very substantially improved to be sure that there is a protection of
constitutional rights while giving law enforcement an adequate
opportunity to conduct the inquiries which they need.
The provisions on money laundering, I think, are very important
additions to take a stand, to stop terrorist organizations such as al-
Qaida and terrorists such as Osama bin Laden not to be financed through
the laundering which has been possible through laxity of the banking
regulations.
In short, I believe this is a very significant step forward. There is
a very heavy overhang over Washington, DC, today with what is happening
here with our efforts to respond in so many ways to September 11. Now
with the anthrax, we are all concerned about what may happen in the
future.
Having served as chairman of the Intelligence Committee back in the
1995-1996 time period and chairing the appropriations subcommittee on
terrorism, I am glad to see us move forward with this legislation which
will give law enforcement the tools which would give them a better
opportunity to prevent any more sneak attacks, any recurrence of the
dastardly deeds of September 11.
I thank the Chair, and I yield the floor.
Mr. KENNEDY. Mr. President, I ask unanimous consent that a joint
memorandum on the immigration provisions of H.R. 3162 be printed in the
Record.
There being no objection, the material was ordered to be printed in
the Record, as follows:
Joint Memorandum of Senator Edward M. Kennedy and Senator Sam Brownback
on the Immigration Provisions of ``The Uniting and Strengthening
America by Providing Appropriate Tools Required to Intercept and
Obstruct Terrorism Act of 2001''
The U.S.A. PATRIOT Act of 2001 contains certain immigration
provisions worked out between the Administration and members
of both parties. Because the legislation was developed
outside the ordinary committee process, it was not
accompanied by the usual reports elaborating on the
background and purpose of its provisions. This memorandum is
accordingly submitted on behalf of the Chairman and Ranking
Member of the Subcommittee on Immigration of the Senate
Committee on the Judiciary to provide some background and
explanations for these provisions.
TITLE IV: PROTECTING THE BORDER
subtitle A--protecting the northern border
Section 401 Ensuring Adequate Personnel on the Northern
Border
This section permits the Attorney General to lift the cap
on the number of ``full time equivalent'' employees that the
Immigration and Naturalization Service (INS) may assign to
the northern border.
Section 402 Northern Border Personnel
This section triples the number of Border Patrol agents,
INS Inspectors, and Customs Service employees in each state
along the northern border. It also funds any additional staff
and facilities needed to support northern border personnel.
Further, this section provides $50 million to the INS and $50
million to the Customs Service to improve technology to
monitor the northern border and to acquire additional
equipment for this purpose.
Section 403 Requiring Sharing by the Federal Bureau of
Investigation of Certain Criminal Record Extracts with
Other Federal Agencies in Order to Enhance Border
Security
This section provides the State Department and the INS with
electronic access to the information contained in the Federal
Bureau of Investigation's National Crime Information Center
Interstate Identification Index (NCIC-III), Wanted Persons
File, and other files maintained by the National Crime
Information Center. This information is to be used in
determining whether a visa applicant or an applicant for
admission to the United States has a criminal history.
Under this section, the FBI must provide the State
Department and the INS with extracts from its criminal
history records and periodically update those extracts.
Within four months of enactment of this legislation, the
State Department must issue regulations regarding the proper
use of the information provided by the FBI. Within two years
of enactment, the Attorney General and the Secretary of State
will report to Congress on the implementation of this
section.
Further, this section directs the Attorney General and the
Secretary of State, working with the National Institute of
Standards and Technology (NIST) and other agencies, to
develop and certify a technology standard that can conform
the identity of a visa applicant or applicant for admission.
As these agencies do not utilize a single technology, the
development of a technology standard will facilitate the
collection and sharing of relevant identity information
between all the pertinent agencies. In particular, this
section instructs those agencies to investigate the use of
biometric technology. The technology standard must be
developed and certified by NIST within two years of the date
of enactment of this subsection.
Section 404 Limited Authority to Pay Overtime
This section eliminates the $30,000 limit on overtime pay
for INS personnel during 2001. The limit was contained in the
2001 Department of Justice Appropriations Act, which did not
contemplate the extraordinary demands that have been placed
on the INS since the terrorist attacks of September 11.
Section 405 Report on the Intergrated Automated Fingerprint
Identification System for Points of Entry and Overseas
Consular Posts
This provision instructs the Attorney General, in
consultation with the heads of other federal agencies, to
report to Congress on the feasibility of enhancing the FBI's
Integrated Automated Fingerprint Identification System
(IAFIS), and other identification systems, to better identify
foreign nationals wanted in connection with criminal
investigations in the United States and abroad.
subtitle b: enhanced immigration provisions
Section 411 Definitions Relating to Terrorism
Under current law, unless otherwise specified, an alien is
inadmissible and deportable for engaging in terrorist
activity only when
[[Page S11047]]
the alien has used explosives or firearms. Because a
terrorist can use a knife, a box-cutter, or an airplane in a
terrorist act, this section expands the definition of
terrorist activity to include the use of any ``other weapon
or dangerous device.'' The language looks to the purpose, not
the instrument, in determining whether an activity is
terrorist in nature.
Current immigration law contains no provision acknowledging
organized terrorist threats per se and therefore contains no
ground for inadmissibility or deportability based on
activities involving ``terrorist organizations.'' Section 411
defines terrorist organization to include: (1) an
organization expressly designated by the Secretary of
State under current section 219 of the INA; (2) an
organization otherwise designated as a terrorist
organization by the Secretary of State, in consultation
with the Attorney General, after finding that such
organization engages in terrorist activities, as defined
by section 212(a)(3)(iv)(I), (II) and (III), or provides
material support to further terrorist activity; or (3) any
group of two of more individuals that commits, plans, or
prepares to commit terrorist activities.
This section adds three grounds of inadmissibility for
individuals who, while not members of terrorist
organizations, may advocate terrorism. These include (1)
under new INA section 212(a)(3)(B)(i)(IV)(bb), being a
representative of a group ``whose public endorsement of
terrorist activity'' the Secretary of State has determined
undermines United States efforts to combat terrorism; (2)
under new INA section 212(a)(3)(B)(i)(VI), using one's
``position of prominence within any country to endorse or
espouse terrorist activity, or persuade others to support
terrorist activity or a terrorist organization, in a way that
the Secretary of State determines'' undermines United States
efforts to combat terrorism; or (3) under new INA section
212(a)(3)(B)(i)(VII), being a spouse or child of a person
inadmissible under this section, unless the spouse or child
did not know or reasonably should not have known of the
activity causing the inadmissibility, or the spouse or child
has renounced such activity.
This section clarifies the circumstances under which the
provision of material support, solicitation of funds, or
solicitation of membership for a terrorist organization can
be the basis for a charge permitting the removal of an alien.
It provides that, after an organization is designated as a
terrorist organization by the Secretary of State, any
provision of material support or solicitation of funds or
membership, as defined in subsection (iv) of INA section
212(a)(3)(B), for a designated organization may be the basis
for a charge of removal. With respect to activity prior to
the designation of the organization, or with respect to non-
designated organizations under section 212(a)(3)(B)(vi)(III),
only activity that was or is intended to further terrorist
activity of the organization is prohibited by this section.
Section 412 Mandatory Detention of Suspected Terrorists;
Habeas Corpus; Judicial Review
The section creates INA section 236A, giving the Attorney
General the authority to certify and therefore detain persons
who pose a terrorist or security threat to the United States.
The power to certify is limited to the Attorney General and
the Deputy Attorney General. This section also provides
judicial review of this authority in habeas corpus
proceedings.
This section sets forth the standards for certification,
custody, and detention. All persons certified under these new
provisions shall be placed in custody and detained until
removed or decertified. Persons who are not removable would
be released from custody upon conclusion of the proceedings.
Further, it permits certification of aliens whom the
Attorney General has ``reasonable grounds to believe'' are
described under the terrorism grounds of the INA or are
engaged in any other activity that endangers the national
security of the United States. ``Reasonable grounds'' is a
higher standard than mere ``reason to believe'' and requires
objective, articulatable grounds.
The Attorney General must, in certified cases, either
initiate removal proceedings within seven days or release the
alien. In cases not involving an alien certified by the
Attorney General, proceedings should continue to be initiated
within the time provided by the regulations. See 66 Fed. Reg.
48335 (amending 8 CFR Sec. 237.3(d)). The seven-day window to
initiate proceedings is limited to cases certified under
section 236A and should be used judiciously, with charges
filed as promptly as possible.
For aliens whose removal is unlikely in the reasonably
foreseeable future, the Attorney General is required to
demonstrate that release of the alien will adversely affect
national security or the safety of the community or any
person before detention may continue beyond the removal
period. Indefinite detention of aliens is permitted only in
extraordinary circumstances. Zadvydas v. Davis, 121 S. Ct.
2491 (2001).
The Attorney General shall review the certification of an
alien every six months and, when appropriate, revoke the
certification and release the alien under such conditions as
the Attorney General deems appropriate. The alien may submit
documentation or other evidence to be considered by the
Attorney General in reviewing his or her certification.
The Attorney General's decision to certify and detain an
alien is subject to judicial review in habeas corpus
proceedings. This review encompasses both procedural
protections and the merits of the Attorney General's
certification decision and any decision to extend detention
beyond the expiration of the removal period where removal is
unlikely in the reasonably foreseeable future. Habeas corpus
review is permitted in any appropriate district court of the
United States, but appeals are limited to the United States
Court of Appeals for the District of Columbia, with review
available in the United States Supreme Court by petition for
certiorari or by original petition for habeas corpus.
Restricting appellate review to a single court protects the
government's interest in uniformity, while providing an alien
with a meaningful opportunity to seek judicial review.
Section 413 Multilateral Cooperation Against Terrorists
The records of the State Department pertaining to the
issuance of or refusal to issue visas to enter the United
States are confidential and can be used only in the
formulation and enforcement of U.S. law. This section allows
the State Department to provide such records to a foreign
government on a case-by-case basis for the purpose of
preventing, investigation, or punishing acts of terrorism.
Section 414 Visa Integrity and Security
In 1996, Congress enacted legislation mandating the
development of an automated entry/exit control system to
record the entry and departure of every non-U.S. citizen
arriving in the United States. The INS lacks the
technology and funding to implement this measure at all
ports of entry, especially on the land border. Last year
Congress amended the law to establish reasonable
implementation deadlines. This provision directs the
Attorney General, in consultation with the Secretary of
State, to fully implement the entry/exit system, as
amended, as expeditiously as practicable, with particular
focus on the utilization of biometric technology and the
development of tamper-resistant documents. To that end,
this section also authorizes the appropriation of such
funds as may be necessary to implement this system.
The entry/exit system will notify the INS whether foreign
nationals departed the United States under the terms of their
visas. Since the vast majority of persons who enter the
United States do not pose a threat to our safety or security,
this provision requires that the information obtained from
the entry/exit system be interfaced with intelligence and law
enforcement databases to enable authorities to focus on
apprehending those few who do pose a threat.
Federal intelligence and law enforcement agencies maintain
``look out lists'' containing the names of foreign nationals
who pose safety or security threats. Not all critical
information is currently shared with the INS and the State
Department, which are the two agencies charged with
determining who is granted a visa or admitted to the United
States. This provision requires the Office of Homeland
Security to submit a report to Congress assessing the
information that these two agencies need to effectively
screen out those who might pose a threat to the United
States.
Section 415 Participation of Office of Homeland Security on
Entry Task Force
This section includes the new Office of Homeland Security
as a participant in the Entry and Exit Task Force established
by the Immigration and Naturalization Service Data Management
Improvement Act of 2000.
Section 416 Foreign Student Monitoring Program
In 1996, Congress established a program to monitor foreign
students and exchange visitors to the United States, funded
by user fees. While a pilot phase of this program ended in
1999, this system has not been implemented nationwide. This
section requires the system to be fully implemented and
temporarily funds the program through January 2003.
Currently, all institutions of higher education that enroll
foreign students or exchange visitors are required to
participate in the monitoring program. This section also
expands the list of institutions to include air flight
schools, language training schools, and vocational schools.
Section 417 Machine Readable Passports
The Visa Waiver Program permits nationals of participating
countries to enter the United States without obtaining
nonimmigrant visas. Countries participating in the program
must have low nonimmigrant visa refusal rates, have machine
readable passport programs, and not compromise the law
enforcement interests of the United States.
This section requires the Secretary of State to conduct an
annual audit of the program to assess measures to prevent the
counterfeiting and theft of passports and to ascertain
whether participating countries have established a program to
develop tamper-resistant passports. Results of the audit will
be reported to Congress.
Currently, nationals of participating countries have until
October 1, 2007 to obtain machine-readable passports to seek
admission to the United States. This section advances the
deadline to October 1, 2003, but permits the Secretary of
State to waive the requirements imposed by the deadline for
all nationals of a program country, if that country is making
sufficient progress to provide their nationals with machine-
readable passports.
[[Page S11048]]
Section 418 Prevention of Consulate Shopping
This section directs the State Department to examine the
concerns, if any, created by the practice of certain aliens
to ``shop'' for a visa between issuing posts.
SUBTITLE C: PRESERVATION OF IMMIGRATION BENEFITS FOR VICTIMS OF
TERRORISM
Section 421 Special Immigrant Status
The section provides permanent residence as special
immigrants to the spouses and children of certain victims of
the terrorist attacks. They include aliens who would have
obtained permanent residence through a family or employment-
based category, but for death, disability, or loss of
employment as a direct result of the terrorist attacks on
September 11, 2001. Permanent residence would be granted to
the fiance or fiancee (and children) of a U.S. citizen who
died in the attacks. Permanent residence would also be
granted to the grandparents of a child whose parents died in
attacks, if either parent was a U.S. citizen or a permanent
resident.
Section 422 Extension of Filing or Reentry Deadlines
This section creates safeguards so that aliens seeking
immigration benefits are not adversely affected by the
terrorist attacks. For aliens in lawful nonimmigrant status
at the time of the terrorist attacks, this section extends
the filing deadline for an extension of status request or
change of status request where the alien was unable to meet
the filing deadline due to the terrorist attacks. Deadlines
are similarly extended for aliens unable to reenter in time
to request an extension of status, aliens unable to enter
during the period of visa validity or parole, and aliens
unable to depart within their period of lawful status or
voluntary department. The section also protects recipients of
diversity visas who were adversely affected by the terrorist
attacks.
Section 423 Humanitarian Relief for Certain Surviving
Spouses and Children
Current law provides that an alien who was the spouse of a
U.S. citizen for at least two years before the citizen died
shall remain eligible for immigrant status as an immediate
relative. This eligibility also applies to the children of
the alien. This section provides that if the U.S. citizen
died as a direct result of the terrorist attacks, the alien
can seek permanent residence even if the marriage was less
than two years old.
This section also protects the spouse and unmarried sons
and daughters of a permanent resident killed in the terrorist
attacks by allowing them to seek permanent residence either
through a pending visa petition (filed by or on behalf of the
deceased) or by filing a ``self-petition'' based on their
relationship to the deceased permanent resident.
Section 424 `Age-Out' Protection for Children
By providing a brief filing extension, this provision
ensures that no alien will ``age out of eligibility to
immigrate as the result of the terrorist attacks. Aliens who
turn 21 years of age while their applications are pending are
no longer considered children under the INA, and therefore
``age out'' of eligibility to immigrate.
Section 425 Temporary Administrative Relief
This section provides temporary administrative relief to an
alien lawfully present on September 10, who was the spouse,
parent, or child of someone killed or disabled by the
terrorist attacks and otherwise not entitled to relief.
Section 426 Evidence of Death, Disability, or Loss
Employment
This section directs the Attorney General to establish
evidentiary standards regarding on constitutes death,
disability, or loss of employment ``as a direct result'' of
the terrorist attacks. Regulations are not required to
implement the provisions of this subtitle.
Section 427 No Benefit to Terrorists or Family Members of
Terrorists
No benefit under this subtitle will be provided to anyone
involved in the terrorist attacks on September 11 or to any
family member of such an individual.
Section 428 Definitions
The term `specified terrorist activity' means any terrorist
activity conducted against the United States, its government,
or its people of the United States on September 11, 2001.
title viii
Mr. GRAHAM. Mr. President, several provisions of title VIII would
establish criminal prohibitions or expand existing criminal laws to
deter terrorist conduct. My understanding is that the Senate certainly
does not intend title VIII to criminalize otherwise lawful and
authorized United States Government activities. Would the Senator
confirm my understanding of the intent and effect of title VIII?
Mr. LEAHY. The Senator's understanding is absolutely correct. Unless
expressly provided, none of the general restrictions in title VIII are
intended to criminalize lawful and authorized United States Government
activities.
Mr. BIDEN. Mr. President, 6 years ago I stood on this floor and
called upon the Senate to join the fight against terrorism in the wake
of the horrific bombing in Oklahoma City. Back then some argued
terrorism was something that usually happened far away, in distant
lands, over distant conflicts. Well, that's all changed.
Terrorism has come to America.
We have to be a little proactive now. Back then, I proposed a series
of precise anti-terrorism tools to help law enforcement catch
terrorists before they commit their deadly act, not ever imagining the
events of September 11.
In particular, I said that it simply did not make sense that many of
our law enforcement tools were not available for terrorism cases.
For example, the FBI could get a wiretap to investigate the mafia,
but they could not get one to investigate terrorists. To put it
bluntly, that was crazy! What's good for the mob should be good for
terrorists.
Anyway, some of my proposals were enacted into law in 1996, a number
were not.
There were those who decided that the threat to Americans was
apparently not serious enough to give the President all the changes in
law be requested.
Today, 5 years later, I again call on my colleagues to provide law
enforcement with a number of the tools which they declined to pass back
then. The anti-terrorism bill we consider today is measured and
prudent. It has been strengthened considerably since the Administration
originally proposed it in mid-September. It takes a number of important
steps in waging an effective war on terrorism.
It allows law enforcement to keep up with the modern technology these
terrorists are using. The bill contains several provisions which are
identical or nearly identical to those I previously proposed.
For example: it allows the FBI to get wiretaps to investigate
terrorists, just like they do for the Mafia or for drug kingpins; it
allows the FBI to get a roving wiretap to investigate terrorists--so
they can follow a particular suspect, regardless of how many different
forms of communication that person uses; and it allows terrorists to be
charged with Federal ``racketeering offenses,'' serious criminal
charges available against organizations which engage in criminal
conduct as a group, for their crimes.
I am pleased that the final version of the bill we are considering
today contains three provisions that I fought for.
First, section 613 incorporates a bill that Senator Hatch and I
introduced earlier this year, S. 899. Named in honor of Delaware State
trooper Francis Collender, who was tragically killed while on a traffic
stop in Odessa, DE this past February, S. 899 and section 613 of this
bill will raise the one-time death benefit paid to the families of
slain or permanently disabled law enforcement officers. For too long,
this benefit has stood at $100,000. It was indexed for inflation and
currently stands at $151,000, but even this is far too low for the
families of these heroes to make ends meet. The bill we consider today
raises this benefit to $250,000, continues to index it for inflation,
and makes it applicable to the family of any law enforcement or fire
personnel who lost their life on or after January 1, 2001. It's the
least we can do for the Collender family, the least we can do for the
hundreds of families who tragically lost a loved one on September 11,
and I'm grateful my colleagues have agreed we need to include my bill
in this larger anti-terrorism bill today.
Second, section 817 is based on legislation I introduced in the 106th
Congress, S. 3202. It may shock my colleagues that under current law,
anyone, including convicted felons, fugitives, and aliens from
terrorist-sponsoring states, can possess anthrax or other biological
agents. And under current law, the FBI has no tool at its disposal to
charge someone with possession of anthrax. Possession of anthrax, or
any other dangerous biological agent, is legal, unless the FBI can make
a case that the suspect intended to use the agent as a weapon. This far
too high a hurdle for our investigators to overcome in many cases, and
indeed the FBI has informed me it has hindered several of their past
bioweapons investigations. Section 817 closes this loophole. It
prohibits certain classes of individuals, felons, illegal aliens,
fugitives and others, from ever possessing these dangerous biological
agents. And for everyone else, my provision says you need to be able to
show you possessed this stuff with a peaceful or
[[Page S11049]]
bona fide research reason. If not, you're going to be charged with a
felony and you face up to ten years in Federal prison.
Finally, section 1005 of this bill incorporates my First Responders
Assistance Act. I have spoken with too many local police officers,
chiefs, firemen and women, and others who feel left out of our fight
against terrorism. I commend FBI Director Mueller for recently pledging
to do a better job sharing information with our State and local law
enforcement people, but clearly more needs to be done. Who responds
first to a terrorist incident? On September 11 it was the New York City
and Arlington County, VA police and fire departments. That's always
going to be the case, local law enforcement is our first line of
defense against terrorists, and we need to give them the tools they
need to get that job done well.
My provision will, for the first time, give State and local
enforcement and fire personnel the opportunity to apply directly to the
Justice Department to receive terrorism prevention assistance.
Specifically, departments will now be able to get help purchasing gas
masks, hazardous material suits, intelligence-gathering equipment,
twenty-first century communications devices and other tools to help
them respond to terrorist threats. This section also creates a new
anti-terrorism training grant program that will fund seminars and other
training sessions to help local police departments better analyze
intelligence information they come across, help local fire departments
acquire the knowledge they need to respond to critical incidents, and
assist those agencies who may be called upon to stabilize a community
after a terrorist incident. It is my intent that these funds go to
professional law enforcement organizations who are in some instances
already delivering this type of training. The Department of Justice's
Office for Domestic Preparedness does some of this, but their program
is a block grant sent to the Governor. I want to involve local police
and fire departments directly in the fight against terrorism, and this
section is an important step towards meeting that goal. The funds
authorized, $100 million over the next four years, may not be enough to
get the job done, but it's a good start. I thank the Police Executives
Research Forum for working with me to craft this proposal, and I look
forward to seeing significant dollars allocated to it in future
spending bills.
So this bill contains many provisions critical to law enforcement.
Some may say it doesn't go far enough.
I have to say, I was disappointed that the Administration dropped
some proposals from an early draft of its bill, measures which I called
for five years ago. Those measures are not in the bill we consider
today, but I continue to believe that they're common-sense tools we
ought to be giving to our men and women of law enforcement.
We should be extending 48-hour emergency wiretaps and pen-registers,
caller-ID-type devices that track incoming and outgoing phone calls
from suspects, to terrorism crimes. This would allow police, in an
emergency situation, to immediately obtain a surveillance order against
a terrorist, provided the police go to a judge within 48 hours and show
that they had the right to get the wiretap and that emergency
circumstances prevented them from going to the judge in the first
place. Now, this emergency tool is available only for organized crime
cases and the bill we consider today does not expand this power to
terrorist investigations.
We should be extending the Supreme Court's ``good faith'' exception
to wiretaps. This well-accepted doctrine prevents criminals in other
types of offenses from going free when the police make an honest
mistake in seizing evidence or statements from a suspect. We should
apply this good faith exception to terrorist crimes as well, to prevent
terrorists from getting away when the police make an honest mistake in
obtaining a wiretap.
I'm pleased Chairman Leahy and the Administration were able to reach
consensus on the two areas which gave me some pause in the
Administration's original proposal: those provisions dealing with
mandatory detention of illegal aliens and with greater information
sharing between the intelligence and law enforcement communities.
The agreement reached has satisfied me that these provisions will not
upset the balance between strong law enforcement and protection of our
valued civil liberties.
This bill is not perfect. No one here claims it embodies all the
answers to the question of how best to fight terrorism. But I am
confident that by updating our surveillance laws, by taking terrorism
as seriously as we do organized crime, and by recognizing the important
role state and local law enforcement has to play in this campaign, that
we are taking a step in the right direction by passing this bill today.
Antiterrorism
Mr. KYL. Mr. President, I rise in strong support of the anti-
terrorism bill. The bill will provide our Nation's law-enforcement
personnel with important tools to more effectively investigate and
prevent further attacks against the people of the United States.
At the outset, I want to make clear that we did not rush to pass ill-
conceived legislation.
During the past two Congresses, when I chaired the Judiciary
Committee's Subcommittee on Technology and Terrorism, the Subcommittee
held 19 hearings on terrorism. I want to repeat that: 19. The witnesses
who appeared before the Subcommittee included the then-Director of the
FBI Louis Freeh and representatives of all three of the
congressionally-mandated commissions on terrorism that have issued
reports over the last two years. Additional hearings on terrorism were
held by the full Judiciary Committee and by other committees.
Many of the provisions proposed by the Attorney General, and included
in the legislation we sent to the President today, mirror the
recommendations of one or more of the major terrorism commissions and
have already been examined by the committee of jurisdiction. In fact,
some of these provisions had already been voted on and passed by the
Senate in other legislation.
Indeed, as I will discuss more fully in a minute, the language sent
forward by the Attorney General to establish nationwide trap and trace
authority was included in the Hatch-Feinstein-Kyl Amendment to the
recently passed Commerce, Justice, State Appropriations bill. Much of
the remaining language in that amendment was included in the
Counterterrorism Act of 2000, which the Senate passed last fall, after
a terrorist attack on the U.S.S. Cole killed 17 American sailors and
injured another 39. That bill was based on recommendations of the
bipartisan, congressionally-mandated National Commission on Terrorism,
known as the Bremmer Commission, which was established in 1998 in
response to the embassy bombings in Tanzania and Kenya.
One particularly important provision, which was included in both the
CJS bill and the current bill, updates the law to keep pace with
technology. The provision on pen registers and trap and trace devices:
one, would allow judges to enter pen/trap orders with nationwide scope;
and two, would codify current case law that holds that pen/trap orders
apply to modern communication technologies such as e-mail and the
Internet, in addition to traditional phone lines.
Nationwide jurisdiction for a court order will help law-enforcement
to quickly identify other members of a criminal organization such as a
terrorist cell. Indeed, last year Director Freeh testified before the
Terrorism Subcommittee that one of the problems law-enforcement faces
is ``the jurisdictional limitation of pen registers and trap-and-trace
orders issued by federal courts.''
He continued: ``Today's electronic crimes, which occur at the speed
of light, cannot be effectively investigated with procedural devices
forged in the last millennium during the infancy of the information
technology age.''
Prior to the legislation we passed today, in order to track a
communication that was purposely routed through Internet Service
Providers located in different States, law-enforcement was required to
obtain multiple court orders. This is because, under existing law, a
Federal court can order only those communications carriers within its
district to provide tracing information to law enforcement.
[[Page S11050]]
According to Director Freeh's testimony before the Terrorism
Subcommittee, ``As a result of the fact that investigators typically
have to apply for numerous court orders to trace a single
communication, there is a needless waste of time and resources, and a
number of important investigations are either hampered or derailed
entirely in those instances where law enforcement gets to a
communications carrier after that carrier has already discarded the
necessary information.''
This bill solves the problem.
I would also like to address another important provision.
The bill will more clearly to criminalize the possession of
biological and toxin agents by those who should not possess them. The
bill would amend the implementing legislation for the 1972 ``Convention
on the Prohibition of the Development, Production, and Stockpiling of
Bacteriological, Biological, and Toxin Weapons and on their
Destruction,'' BWC. Article I of the BWC prohibits the development,
production, stockpiling, acquisition, or retention of Microbial or
other biological agents, or toxins, whatever their origin or method of
production, of types and in quantities that have no justification for
prophylactic, protective, or other peaceful purposes. It is not the
intent of the BWC, nor is it the intent of Section 802, to prevent the
legitimate application of biological agents or toxins for prophylactic,
protective, bona fide research, or other peaceful purposes. These
purposes include, inter alia, medical and national health activities,
and such national security activities as may include the confiscation,
securing, and/or destruction of possible illegal biological substances.
In addition to the other provisions in this anti-terrorism
legislation that will provide our law enforcement communities with the
tools to weed out and stop terrorism, I want to express my support for
the immigration provisions upon which the administration, key members
of the House Judiciary Committee, Senators Hatch, Kennedy, Leahy and I
have reached agreement, and which are included in this bill.
We must not forget, however, that the United States will continue to
face overwhelming infrastructure and personnel needs at our consular
offices abroad, along both the southern and northern border, and in our
immigration offices throughout the United States. And, in addition to
the provisions included in this anti-terrorism bill, the U.S.
government will need additional tools to keep terrorists out of the
country and, once they are in the country, find them and remove them.
That means, among other things, eliminating the ability of terrorists
to present altered international documents, and improving the
dissemination of information about suspected terrorists to all
appropriate agencies. After hearing first-hand about the extraordinary
weaknesses of our immigration and visa processing systems, Senate
Judiciary Terrorism Subcommittee Chairwoman Dianne Feinstein and I will
soon introduce legislation to better equip our government with the
tools necessary to make our immigration and visa processing systems
more secure.
With that said, the anti-terrorism bill will certainly provide a
better legal framework for keeping foreign terrorists out of the United
States, and detaining them should they enter.
First, this anti-terrorism bill clarifies that the Federal Bureau of
Investigation is authorized to share data from its ``most wanted
list,'' and any other information contained in its national crime-
information system, with the Immigration Naturalization Service and the
State Department. This will help the INS and State Department identify
suspected terrorists before they come to the United States, and, should
they gain entry, will help track them down on our soil. It also allows
the State Department, during a U.S. criminal investigation, to give
foreign governments information on a case-by-case basis about the
issuance or refusal to issue a U.S. visa.
The bill will also clarify U.S. law prohibiting the entry of, and
requiring the removal of, individual alien terrorists. It will probably
surprise the Members of this body a great deal to know that, under
current law, a terrorist alien is not considered either inadmissible
to, or deportable from, the United States even if he or she has
``endorsed or espoused terrorist activity that undermines the efforts
of the United States to fight terrorism,'' or has provided ``material
support to a terrorist organization.'' Nor is an individual deportable
for being a ``representative of a terrorist organization.'' The anti-
terrorism bill makes it clear to U.S. officials considering whether to
allow someone to come to the country, that a person meeting any one of
these criteria is not welcome to come here. Although the final bill
prohibits admission of individuals who have endorsed terrorism or are
representatives of a terrorist organization, neither of those criteria
will make such an individual deportable. I will work to make it clear
that such criteria are deportable.
In addition, the anti-terrorism package that we are debating today
further defines what is considered by the United States to be a
terrorist organization. Under current law, a terrorist organization
must be designated by the Secretary of State under Section 219 of the
Immigration and Nationality Act. This process can take several months,
and has been criticized by some experts as potentially politically
corruptible. Under this final package, Section 219 designations will
remain in effect. A separate designation process is added, whereby an
organization can be designated by the Secretary of State or the
Attorney General, in consultation with each other, with seven days'
notice to the leadership of the House and Senate and the congressional
committees of jurisdiction. Additionally, an organization, whether or
not it is formally designated by the Secretary of State or the Attorney
General, can be considered to be terrorist if it is made up of two or
more individuals who commit or plan to commit terrorist activities.
This anti-terrorism package also has provisions regarding temporary
detention. It allows for the temporary detention of aliens who the
Attorney General certifies that he has ``reasonable grounds to believe
is inadmissible or deportable under the terrorism grounds.'' This
compromise represents a bipartisan understanding that the Attorney
General of the United States needs the flexibility to detain suspected
terrorists. Under the compromise that Members have reached, the
Attorney General must charge an alien with a deportable violation or he
must release the alien. In this final version, if the charge is not
sustained, or if withholding of deportation is granted by an
immigration judge then the alien must be released. In addition, the
underlying certification, and all collateral matters, can be reviewed
by any U.S. District Court and any appeals can be heard by U.S. Appeals
Court for the District of Columbia. The Attorney General, under this
final version, is required to review all individual certifications
every six months, and any alien certified can ask that the Attorney
General review the case.
Finally, this package will determine whether ``consular shopping,''
i.e. someone has a visa application pending from his or her home
country, but goes to another country for adjudication, is a problem. If
so, the Secretary of State must recommend ways to remedy it. Another
provision prevents countries that do not have machine-readable
passports from participating in the Visa Waiver Program, although the
Secretary of State is allowed to provide a waiver for countries that do
not provide such passports. I do not support the waiver authority, but
am pleased that the overall requirement is included. Another provision
authorizes $36.8 million for quick implementation of the INS foreign
student tracking system, a program that I have repeatedly urged be
implemented. The final package also includes relief for immigrants, who
but for the tragic events of September 11, are here legally and could
now lose their legal status.
As former chairman and now ranking Republican of the Judiciary
Committee's Terrorism Subcommittee, I have long suggested, and strongly
supported, many of the anti-terrorism and immigration initiatives now
being advocated by Republicans and Democrats alike. In my sadness about
the overwhelming and tragic events that took thousands of precious
lives, I am resolved to push forward to make the United States a safer
place for its millions of law-abiding citizens and legal immigrants.
That means delivering justice to those who are responsible for
[[Page S11051]]
the lives lost on September 11, and reorganizing our institutions of
government so that the law-abiding can continue to live their lives in
freedom.
Finally, let me address briefly the concern voiced by some that we
are in danger of ``trampling civil liberties.'' I reiterate that we did
not rush, that we have had thorough, deliberative hearings, and that
many of the proposals within this bill have already been passed by the
Senate. Nothing in the current bill impinges on civil liberties. The
bill will give Federal agencies fighting terrorism the same tools we
have given those fighting illicit drugs, or even postal fraud. Many of
the tools in the bill are modernizations of the criminal law,
necessitated by the advent of the Internet.
While some of these tools are extremely helpful in terrorism
investigations, it makes no sense to refuse to apply these common sense
changes to other crimes that are committed, like kidnaping, drug
dealing, and child pornography. It is unwise to limit these tools to
only terrorism offenses because often, at the outset of an
investigation of a particular person or crime, law enforcement does not
know what you are dealing with. A credit-card fraud case or a false
immigration documents case may turn out to be connected to funding or
facilitating the operations of a terrorist group. We should give law
enforcement the tools it needs to have the best chance of discovering
and disrupting these activities.
We have a responsibility to the people of this nation to ensure that
those who are charged with protecting us from future terrorist attacks
are empowered to do so. This is not a zero sum game. We can both ensure
our security and protect our liberties.
We cannot afford to lose this race against terror, and we cannot
afford to give the enemy in this war a full lap head-start. I support
this bill. I commend President Bush and General Ashcroft for submitting
a sound proposal to the Senate, and for their tremendous efforts during
the past month.
section 1012
Mr. HOLLINGS. I have a number of questions about the substance, scope
and procedure of section 1012 of the USA PATRIOT Act of 2001. I am
concerned that there are some significant issues which this provision
has not addressed, notwithstanding its noble intentions. Would the
gentleman be able to clarify some of these issues for me?
Mr. LEAHY. I will do my best to clarify the intent and operation of
this section for the gentleman.
Mr. HOLLINGS. Would the gentleman please explain how the Secretary of
DOT will determine whether an individual seeking an original or renewed
license presents a security risk?
Mr. LEAHY. The Secretary will rely upon the background records check
to be done by the Justice Department. Any further analysis to be done
by the Secretary on this issue should be explained following a
Congressional directive to do so, in regulations issued by the
Secretary for notice and comment.
Mr. HOLLINGS. Does the section make clear what standards will be
applied to determine if a security risk is presented by an individual?
Mr. LEAHY. At this time the section does not and that matter should
be clarified in subsequent legislation.
Mr. HOLLINGS. I am concerned that the review process could be delayed
and a person seeking renewal of a hazmat license could be unable to
work due to matters beyond his or her control.
Mr. LEAHY. The gentleman is correct. Regulations need to be issued by
the Secretary specifying time periods and making it clear that delays
not due to the applicant should not force him to be out of work and
that his existing hazmat license will remain in effect pending
completion of the security risk review process.
Mr. HOLLINGS. I am troubled by the lack of due process protections
for the applicant. What is the gentleman's opinion on this subject?
Mr. LEAHY. I agree with the gentleman. The section needs to be
clarified by legislation and regulations issued making clear that any
applicant denied a hazmat license because of a security risk will be
advised of the reasons for such denial and given an opportunity to
present any comments he or she deems appropriate. We need to provide
the applicant with a right to challenge the Secretary's decision and
insure due process is protected.
Mr. HOLLINGS. Finally, isn't there a concern that foreign drivers
transporting hazmat present an equal, if not a greater, security risk
than that presented by U.S. drivers? If so, how will we deal with
foreign drivers because they do not appear to be covered by section
1012.
Mr. LEAHY. I fully agree with the gentleman. The legislation must
address foreign drivers to cover adequately the security risks
applicable to hazmat transportation.
Mr. THURMOND. Mr. President, the September 11 terrorist attack has
brought to the forefront numerous flaws in how we control and manage
immigration in this country. It is now clear that the control of our
borders has become a matter of national security.
Let me first state that I have no doubt that most aliens who enter
this country are innocent, hard-working people who make important
contributions to our society. America can continue our tradition of
supporting reasonable legal immigration, but I am concerned that we are
allowing illegal immigration to get out of control.
According to the most recent census data, there are at least 7 and
possibly as many as 8 million illegal aliens in the United States. The
number has at least doubled just since 1990. This trend is very
troubling and has to be reversed. We must do more to stop illegal
aliens from entering our country, and we must do more to deport those
who are already here illegally. Our previous efforts, such as the 1996
Immigration Act, have proven to be inadequate.
This is not only a matter of upholding our laws, it is a matter of
maintaining the safety and security of our country. We do not even know
how some of the September 11 hijackers got into the country. This is
not acceptable. We must do more to track and keep out those who wish to
harm our country and terrorize our citizens.
The Antiterrorism Act we are considering today contains some reforms
in this area and is a step in the right direction. It expands the
number of Border Patrol agents, INS inspectors, and Customs agents
along the Northern Border. Also, it provides for greater data-sharing,
including giving the INS easier access to the criminal history
information contained in the NCIC database. Moreover, it grants the
Attorney General greater authority to detain those who may be involved
in terrorist activity, although we should continue to review this issue
and grant the Attorney General greater power in the future.
In addition to immigration, this bill contains other crucial reforms
that will update our wiretapping laws and allow greater sharing of
intelligence and law enforcement information. I strongly supported this
bill during Judiciary Committee hearings, including in one hearing in
the Constitution Subcommittee of which I am Ranking Member. I am
pleased that we are finalizing this bill today.
However, this bill is only a beginning. It is a move in the right
direction, not an end in itself. Much more needs to be done to protect
our nation from illegal immigration.
I believe one important measure could be to return to annual
registration for immigrants who are in the United States. Requiring
immigrants to register each year would help the INS keep track of where
immigrants are in the United States, and whether they have overstayed
their visas. In addition, it would benefit aliens by helping them prove
how long they have been in the United States.
An alien registration system existed before 1981. However, the system
became inactive at that time due to lack of funds and administrative
difficulties. I think the time has come to reconsider this program.
Recent technology, such as scanners, can help address some of the
record-keeping problems that harmed the old system.
There are many other reform possibilities. Currently, when an alien
commits a crime in the United States and is ordered deported, some home
countries refuse to take him back. This creates huge difficulties for
us, especially when the alien has completed his prison sentence. I
believe the United States should respond in kind by not granting visas
to countries that have such a policy. This would encourage
[[Page S11052]]
countries to live up to their responsibilities. Also, we need to look
into expanding the use of identification cards for aliens, including
more fingerprinting.
The antiterrorism bill demonstrates that the Congress is committed to
addressing the problems we face regarding immigration. I look forward
to working with my colleagues to continue our important work in this
area. It must remain a top priority. We should not rest until we have
illegal immigration under control in this country.
Ms. SNOWE. Mr. President, I rise today in support of the anti-
terrorism legislation we have before us, the USA PATRIOT Act. I
supported the Senate bill when it passed 2 weeks ago, and this bill--
which was overwhelmingly passed by the House yesterday--retains key
provisions that give our Government the tools it needs to combat
terrorism.
One of the key issues during the House-Senate negotiations was that
of the so-called ``sunset.'' While the Senate-passed bill ensured these
provisions would remain in effect as long as necessary, the House voted
to suspend the bill's provisions in 5 years. Ultimately, the bill
before us today includes a four year sunset. While I believe the
provisions of this bill will be needed to combat terrorism beyond 4
years, it is fair to say Congress should review the provisions and make
an assessment of their effectiveness in 4 years.
Let me also say I am pleased to have worked in conjunction with
Senator Bond and Senator Conrad in supporting the Visa Integrity and
Security Act. This bill addresses many of the concerns we raised, such
as the importance of information sharing among government law
enforcement and intelligence agencies with the State Department and
tightening tracking controls on those entering the U.S. on student
visas, including those attending flight schools. These are critical
issues, and I commend both Senators for their efforts, and I am pleased
the bill before us contains provisions from this bill on information
sharing and the use of biometric technology for the entry and exit of
aliens.
With this legislation, we take reasonable, constitutional steps to
enhance electronic and other forms of surveillance, without trampling
on the rights of Americans. We will also institute critical measures to
increase information sharing by mandating access to the FBI's National
Crime Information Center, or NCIC, by the State Department and INS.
Incredibly, while intelligence is frequently exchanged, no law
requires agencies like the FBI and CIA to share information on
dangerous aliens with the State Department or INS. While I am pleased
the bill before us ensures information sharing between the FBI, State
Department and INS, I believe it does not go far enough as other
crucial agencies, such as the DEA, CIA, or DoD, that may have
information the State Department and INS need, but are still not
required to share information. In short, by only providing access to
the FBI's NCIC system, we are not summoning the sum total of U.S.
Government information on individual aliens which is now needed in our
war on terrorism.
I saw firsthand the consequences of serious inadequacies in
coordination and communication during my 12 years as ranking member of
the House Foreign Affairs International Operations Subcommittee and
chair of the subcommittee's Senate counterpart.
Access to the FBI's NCIC system by the State Department is a first
step, and one that I advocated in 1993, after the Justice Department
ruled that because the State Department was not a ``law enforcement
agency,'' it no longer had free access to the NCIC. Tellingly, after
ruling, the visa denial rate for past criminal activities plunged a
remarkable 45 percent--stark evidence that we can't afford to tie the
hands of America's overseas line of defense against terrorism.
Although my legislation designated the State Department a ``law
enforcement agency'' for purposes of accessing the NCIC when processing
any visa application, whether immigrant or non-immigrant, a revised
provision enacted in 1994 only provided the State Department with free
access for purposes of processing immigrant visas--dropping my
requirement for non-immigrant visas eventually used by all 19 suspected
hijackers. Even that limited law was sunsetted in 1997 with a brief 6-
month extension to 1998.
Currently, U.S. posts check the lookout database called the Consular
Lookout and Support System--Enhanced, or CLASS-E, prior to issuing any
visa. CLASS-E contains approximately 5.7 million records, most of which
originate with U.S. embassies and consulates abroad through the visa
application process. The INS, DEA, Department of Justice, and other
federal agencies also contribute lookouts to the system, however, this
is voluntary.
To further fortify our front-line defenses against terrorism--to turn
back terrorists at their point of origin--information sharing should be
mandatory, not voluntary. That is why I introduced a bill that would
require that law enforcement and the intelligence community share
information with the State Department and INS for the purpose of
issuing visas and permitting entry into the U.S. And while my bill
would have gone farther than the legislation before us, by including
the DEA, CIA, Customs and the Department of Defense in the mandated
information-sharing network, I am pleased that this bill we are
considering at least mandates access to the NCIC by INS and the State
Department.
The bottom line is, if knowledge is power, we are only as strong as
the weakest link in our information network. Therefore, we must ensure
that the only ``turf war'' will be the one to protect American turf.
Another important issue is that of verifying the identity of a visa
holder. Once a visa is issued at the point of origin, we should be
ensuring that it is the same person who shows up at the point of entry.
The fact is, we don't know how many, if any, of the 19 terrorists
implicated in the September 11 attacks entered the U.S. on visas that
were actually issued to someone else.
Currently, once a visa is issued by the State Department, it then
falls to INS officials at a port-of-entry to determine whether to grant
entry. The problem is, no automated system is utilized to ensure that
the person holding the visa is actually the person who was issued the
visa. In other words, the INS official has to rely solely on the
identification documents the person seeking entry is carrying--making
that official's job that much more difficult.
There is a better way, and legislation I introduced would require the
establishment of a fingerprint-based check system to be used by State
and INS to verify that the person who received the visa is the same
person at the border crossing station trying to enter the country.
Simply put, it requires the State Department and INS to jointly
create an electronic database which stores fingerprints, and that other
agencies may use as well. When a foreign national receives a visa, a
fingerprint is taken, which then is matched against the fingerprint
taken by INS upon entry to the U.S. This is a common sense approach
that would take us one step closer to minimizing the threat and
maximizing our national security.
The fact of the matter is fingerprint technology, one part of the
larger category of biological factors that can be used for
identification known as biometrics, is not new. In fact, the U.S.
Government has already employed biometrics to verify identities at
military and secret facilities, at ports-of-entry, and for airport
security, among many others.
The bill before us includes a provision that requires the Attorney
General to report on the feasibility of enhancing the FBI's Integrated
Automated Fingerprint Identification System (IAFIS) or other
identification systems to identify visa holders who may be wanted in a
criminal investigation in the U.S. or abroad before they are issued a
visa or permitted entry or exit to the U.S.
This surely doesn't sound all that much different than the
legislation I have proposed. I am pleased this bill at least starts us
down the road toward implementing biometric technologies, and I hope
this can be achieved as soon as possible.
Although I would prefer an even stronger bill and indeed worked
toward the inclusion of measures that would have accomplished this
goal, this legislation negotiated by the House and Senate is vital to
our national security, and I am proud to support it. The
[[Page S11053]]
war on terrorism is a war on many fronts. Some of the battles will be
great in scale, many will be notable by what is not seen and by what
doesn't happen, namely, that individuals who pose a serious threat to
this nation never see these shores and never set foot on our soil.
Many of our greatest victories will be measured by the attacks that
never happen, in battles we win before they ever have a name, in
conflicts we prevent before they ever claim one American life. I hope
we will pass and enact legislation that will help make that possible,
and urge my colleagues to join me in supporting this bill.
Mr. President, I ask unanimous consent to have printed in the Record
an op-ed from The Bangor Daily News.
There being no objection, the material was ordered to be printed in
the Record, as follows:
[From the Bangor Daily News, Oct. 24, 2001]
Homeland Security and the ``Three C's'': Coordination, Communication,
and Cooperation
(By U.S. Senator Olympia J. Snow)
This week, Congress is expected to send to the President
landmark legislation for a new era: a bill designed to bring
the full resources of the federal government to bear in our
war against terrorism. One of the most critical elements of
this anti-terrorism package--which also includes expanded
authority to hunt down and identify terrorist activity within
our own borders--addresses the ``Three C's'' that have been
lacking among those federal agencies that are integral to
preventing terrorism: coordination, communication, and
cooperation.
Incredibly, there is no provisions of current law that
mandates State Department access to sources such as the FBI's
National Crime Information Center (NCIC). This system, which
maintains arrest and criminal information from a wide variety
of federal, state, and local sources as well as from Canada,
will be used by the State Department to deny visas to
dangerous aliens. Similar to legislation I introduced in
1993, the bill pending in conference will finally make such
information-sharing a requirement, and when combined with the
new Office of Homeland Security should help ensure that our
federal agencies are as united in the effort against
terrorism as the American people. I urged conferees to
further strengthen this requirement, so both State and the
Immigration and Naturalization Service (INS) have access to
the full range of information gathered by U.S. intelligence
and law enforcement agencies.
During my twelve years as ranking member of the House
Foreign Affairs International Operations Subcommittee and
Chair of the subcommittee's Senate counterpart, I saw
firsthand why removing impediments to a cooperative federal
effort is a national imperative. Perhaps the most egregious
example came to light in our investigations into the comings-
and-goings of radical Egyptian cleric Sheikh Omar Abdel
Rahman, mastermind of the 1993 World Trade Center bombing.
Astoundingly, we found that in the period since 1987 when
Sheikh Rahman was placed on the State Department lookout
list, he entered and exited the U.S. five times totally
unimpeded. Even after the State Department formally revoked
his visa, INS granted him permanent residence status. When he
was finally caught on July 31, 1991, reentering the U.S., he
was immediately released back into U.S. society to allow him
to pursue a multi-year appeal process.
Just as unbelievable is the fact that, even after the 1993
attack on the World Trade Center, membership in a terrorist
organization in and of itself--with the exception of the
PLO--was not sufficient grounds for visa denial. Rather, the
Immigration Act of 1990 required the government to prove that
an individual either was personally involved in a terrorist
act, or planning one. This absurd threshold made it almost
impossible to block individuals, such as Sheikh Rahman, from
entering the country legally. Legislation I introduced in
1993 removed that bureaucratic and legal obstacle--yet it
took nearly three more years to enact it as part of the Anti-
Terrorism and Effective Death Penalty Act of 1996.
Further, to respond to the trail of errors we uncovered,
provisions from my bill were enacted in a year later, in
1994, requiring modernization in the State Department's
antiquated microfiche ``lookout'' system to keep dangerous
aliens from entering the United States. Recognizing the need
to mate these new technologies with the need for the most
comprehensive, current and reliable information, the bill
also attempted to address the issue of access. Tellingly,
after the State Department lost free access to the NCIC
because of a 1990 Justice Department ruling that the State
Department was not a ``law enforcement agency'', the visa
denial rate for past criminal activities plunged a
remarkable 45 percent.
Therefore, my 1993 bill also designated the State
Department a ``law enforcement agency'' for purposes of
accessing the NCIC as well as other FBI criminal records when
processing any visa application, whether immigrant or non-
immigrant. Unfortunately, a revised provision also enacted in
1994 provided the State Department with free access to these
FBI resources only for purposes of processing immigrant
visas--dropping my requirement for non-immigrant visas
eventually used by all 19 of the suspected hijackers. Even
that limited law was allowed to expire, despite my
legislation enacted in 1996 repealing the requirement that
visa applicants be informed of the reason for a denial--a
provision that law enforcement agencies legitimately believed
could impede ongoing investigations, or reveal sources and
methods.
Having introduced my own legislation after the attacks to
mandate information sharing among all agencies such as the
FBI, CIA, DEA, Customs, INS and the State Department, I would
have preferred that the recently-passed anti-terrorism bill
go even further. Nevertheless, re-instating State Department
access to the NCIC for both types of visas is a critical step
in ensuring that information sharing will no longer be
voluntary and ad hoc.
To further fortify our front-line defenses against
terrorism and turn back terrorists at their point of origin,
I also proposed mandating information sharing by establishing
Terrorist Lookout Committees, comprised of the head of the
political section of each embassy and senior representatives
of all U.S. law enforcement and intelligence agencies. The
committees would be required to meet on a monthly basis to
review and submit names to the State Department for inclusion
in the visa lookout system. Unfortunately, Senators did not
reach agreement on amendments that could be added to the
anti-terrorism bill, so the package was ultimately passed
with no modifications. Consequently, I will continue to work
to pass this important measure separately.
Clearly, the catastrophic events of September 11 have
catapulted us into a different era, and everything if forever
changed. We must move heaven and earth to remove the
impediments that keep us from maximizing our defense against
terrorism, and that means changing the prevailing system and
culture by re-focusing on the ``Three C's'' of coordination,
communication and cooperation. The bottom line is, if
knowledge is power, we are only as strong as the weakest link
in our information network--therefore, we must ensure that
the only ``turf war'' will be the one to protect American
turf. In our fight against terrorism, we can do no less.
The PRESIDING OFFICER. The Senator from Utah.
Mr. HATCH. Mr. President, I ask unanimous consent the time be divided
equally between the distinguished chairman and myself.
How much time remains?
The PRESIDING OFFICER. Ten minutes for each side.
Mr. HATCH. Mr. President, as we wind down the debate and move to
final passage, I want to continue my acknowledgment of those who worked
so hard and were instrumental in getting this legislation enacted. I
start again by expressing my gratitude to Senators Kyl and Feinstein
for their efforts. No Senators have worked harder over the past few
years in such a bipartisan manner on terrorist missions. They have both
done an excellent job. Also, Senators Bob Graham and Shelby, who
cosponsored this legislation, deserve credit for significant
contributions. In the Intelligence Committee, of course, Senator
Sarbanes and Senator Phil Gramm are to be praised for the money
laundering provisions of the package. They developed that in this bill.
I credit the hard work of other fellow members of the Judiciary
Committee; in particular, Senators Biden and Schumer, who have devoted
their energy to several of these proposals. Their assistance was
instrumental in shaping this final product.
Next, I thank my dedicated staff and my chief counsel and staff
director, Makan Delrahim, who has been instrumental in putting this
bill together. I also thank my crime policy counsels on the Judiciary
Committee: Jeff Taylor, whose background as a federal prosecutor was
crucial in crafting the many technical provisions of this legislation,
as well as Stuart Nash, another former federal prosecutor, and Leah
Belaire, each of whom has brought invaluable expertise to this process;
my lead immigration counsel, Dustin Pead, and our tireless legislative
assistant, Brigham Cannon, each has provided critical assistance. I am
also grateful to Elizabeth Maier on Senator Kyl's staff, David Neal on
Senator Brownback's staff, and Esther Olavarria on Senator Kennedy's
staff, for their input on the immigration provisions. I also extend our
thanks to Sharon Prost, my former chief counsel who recently was
appointed by President Bush to serve as a Federal appellate judge, for
her wise counsel on this legislation.
In addition, I personally thank our Chairman, Senator Leahy. I
reserve that until the end. His staff deserve a lot of credit and I
personally thank
[[Page S11054]]
them for their long hard hours. I thank personally his chief counsel
and staff director, Bruce Cohen, and other members of his staff: Beryl
Howell, Julie Katzman, Ed Barron, Ed Pagano, Tim Lynch, David James,
and John Eliff, each of whose expertise I personally found invaluable.
I am grateful to them for the many long hours they devoted to drafting
this bill and helping ensure that our final product has strong
bipartisan support. I enjoyed working with them and I certainly always
enjoy working with Senator Leahy and appreciate the good things we were
able to do.
The Department of Justice has been of great assistance to us in
putting this bill together. In particular, I would like to thank
Attorney General John Ashcroft and his Deputy Larry Thompson for their
wise counsel, their leadership, and their quick response to our many
questions and concerns. Michael Chertoff, the Assistant Attorney
General for the Criminal Division was a frequent participant in our
meetings, as was Assistant Attorneys General Dan Bryant and Viet Dinh.
Justice Department lawyers Jennifer Newstead, John Yoo, John Elwood,
Pat O'Brien, and Carl Thorsen were also important and valuable
participants in this process.
The White House Counsel and Congressional Liaison staff provided
essential contributions at all stages of this process. Judge Al
Gonzales, the White House Counsel, provided key guidance with the help
of his gifted staff, including Deputy White House Counsel Tim Flanagan
and Associate Counsels Courtney Elwood, Brett Kavanaugh, and Brad
Berenson.
The White House Congressional Liaison office, together with the Vice
President's office, worked nonstop to keep this process moving forward
and were critically responsive to any requests the Senate had. Nick
Calio, Ziad Ojakli, and Heather Wingate with the White House, and Nancy
Dorn and Candy Wolff with the Vice President's office, deserve our
gratitude for all the assistance they have given us.
Finally, Mr. President, I must recognize the diligence and invaluable
assistance provided by leadership staff on both sides of the aisle.
Mark Childress and Andrea Larue with Majority Leader Daschle's
office, and David Hoppe, Sharon Soderstrom, and John Mashburn with
Senator Lott's office, all deserve our collective thanks. These
dedicated professionals selflessly gave up their nights and weekends to
facilitate passage of this final product. Also, I take special pride in
thanking Stewart Verdery, who now works for Senator Nickles but
previously worked on my Judiciary Committee staff, for his cooperation
and assistance in this process.
As we close debate on this legislation, I would like to note that the
fundamental obligation of government is to protect our citizens from
harm and every member of this Senate, by virtue of the sworn oath of
the office we hold, must do everything in his or her power to ensure
that the heinous attacks of September 11 are never repeated. We must
never forget the more than 5,000 innocent men, women, and children who
lost their lives on American soil some 6 weeks ago.
I am grateful that I have been able to work on this matter with the
distinguished Senator from Vermont. I am grateful we have been able to
pull together, in a relatively short period of time, an antiterrorism
bill that really is going to make a difference in all our lives. So I
urge my colleagues' support for this important legislation, thank my
colleagues for all their help.
Mr. President. The Department of Justice has prepared an excellent
and precise analysis of the legislation, with which I fully agree. I
ask unanimous consent that the analysis be printed in the Record.
There being no objection, the material was ordered to be printed in
the Record, as follows:
Overview
In the wake of the tragic, criminal act of violence
perpetrated against the United States on September 11, the
Bush Administration proposed legislation that would provide
the Department of Justice with the tools and resources
necessary to disrupt, weaken, and counter the infrastructure
of terrorist organizations, to prevent or thwart terrorist
attacks, and to punish or defeat in battle perpetrators of
terrorist acts.
On October 24, the House passed a bill which contains a
substantial number of the key provisions originally requested
by the Administration. The Department of Justice strongly
supports this bill and urges the Senate to act quickly so
that these new authorities can be made available to
prosecutors and agents who are working around the clock to
prevent future attacks and to bring the perpetrators of
September 11 to justice.
The events of September 11, 2001 demonstrate that terrorist
acts are perpetuated by expertly organized, highly
coordinated, and well financed organizations, operating
without regard to borders, to advance their agendas. The
fight against terrorism thus is both a war to defend the
security of our nation and our citizens against terrorism and
a unified criminal justice effort.
Existing laws fail to provide our national security
authorities and law enforcement with certain critical tools
they need to fight and win the war against terrorism. Indeed,
we have tougher laws for fighting organized crime and drug
trafficking than for combating the threat of terrorism. For
example, technology has dramatically outpaced our statutes.
Many of our most important intelligence gathering laws were
enacted decades ago, in and for an era of rotary telephones.
Meanwhile, our enemies use e-mail, the Internet, mobile
communications and voice mail. Until Congress provides law
enforcement with the tools necessary to identify, dismantle
and punish terrorist organizations, we are fighting an uphill
battle.
Making the fight against terrorism a national priority must
not and will not mean that the rights and freedoms guaranteed
to all Americans under the Constitution will become victims
of this war. In this law enforcement mission, as in all that
we undertake at the Department of Justice, the protection of
the rights and privacy of all Americans is the principle that
guides us--the outcome which, if not achieved, renders our
efforts meaningless.
This new terrorist threat to Americans on our soil is a
turning point in America's history. It is a new challenge for
law enforcement. Our fight against terrorism is not solely or
primarily a criminal justice endeavor--it is defense of our
nation and its citizens. We cannot wait for terrorists to
strike to begin investigations and take action. We must
prevent first, and prosecute second. The anti-terrorism
proposals that have been submitted by the Administration and
considered by the House and Senate represent careful,
balanced, and long overdue improvements to our capacity to
combat terrorism.
Process
The Administration reached bipartisan agreement with the
leadership of the House and Senate and the chairmen and
ranking members of the Senate and House Judiciary Committees
on a bill which was passed by the House on October 24 by an
overwhelming majority.
The Department of Justice strongly supports this bill and
urges the Senate to act quickly so that these new authorities
can be made available to prosecutors and agents who are
working around the clock to prevent future attacks and to
bring the perpetrators of September 11 to justice. Although
the compromises reflected in specific provisions of the bill
do not in every case meet the Administration's original
goals, the bill does overall substantially achieve each and
every one of the Administration's objectives.
discussion on substantive provisions
Enhancing domestic security against terrorism (title I)
These provisions would provide new funding and structural
reforms in the fight against terrorism. A counterterrorism
fund would be established to address terrorism issues within
the Department of Justice with regard to investigations and
damage to components as a result of terrorism (Sec. 101);
discrimination against Arab and Muslim Americans is condemned
(Sec. 102); additional funding would be provided for the
FBI's technical support center (Sec. 103); the National
Electronic Crime Task Force Initiative would be expanded
(Sec. 105); and the military would be authorized to assist
state and local law enforcement in chemical weapons
emergencies (Sec. 104).
The President's powers under the International Economic
Emergency Powers Act would be expanded in cases of military
hostilities and regarding the use of classified information
(Sec. 106). President Bush signed a new Executive Order under
the International Emergency Economic Powers Act (IEEPA)
blocking the assets of, and transactions with, terrorist
organizations and certain charitable, humanitarian, and
business organizations that finance or support terrorism. At
present, however, the President's powers are limited to
freezing assets and blocking transactions with such
individuals and entities. Starving terrorist organizations of
the funds that sustain them requires that we do more. When we
encounter drug traffickers, for instance, we don't just
freeze assets, we seize assets.
Enhanced surveillance procedures (title II)
These provisions of the bill address gaps in the coverage
of the federal electronic surveillance statutes (particularly
the wiretap statute, the pen registers and trap and trace
statute, and the Electronic Communications Privacy Act). The
key element that unites these provisions is the goal of
making the statutes technology-neutral: that is, ensuring
that the same existing authorities that apply to telephones,
for example, are made applicable to computers and use of e-
mail on the Internet. It is critically important to
[[Page S11055]]
note that in drafting these provisions, the Department's
goal was and remains ensuring that the scope of the
authority remains the same--in other words, that no more
or less information as is currently obtainable through a
particular device (for example, a pen register) on a
telephone, is obtainable from a computer.
Law enforcement must have intelligence gathering tools that
match the pace and sophistication of the technology utilized
by terrorists. Critically, we also need the authority for law
enforcement to share vital information with our national
security and intelligence agencies in order to prevent future
terrorist attacks.
Terrorist organizations increasingly take advantage of
technology to hide their communications from law enforcement.
Today's terrorist communications are carried over multiple
mobile phones and computer networks--frequently by multiple
telecommunications providers located in different
jurisdictions. To facilitate their criminal acts, terrorists
do not discriminate among different kinds of technology.
Regrettably, our intelligence gathering laws don't give law
enforcement the same flexibility.
The bill creates a technology-neutral standard for
intelligence gathering, ensuring law enforcement's ability to
trace the communications of terrorists over mobile phones,
computer networks and any new technology that may be
developed in the coming years.
We are not seeking changes in the protections in the law
for the privacy of law-abiding citizens. The bill would
streamline intelligence gathering procedures only. Except for
under those circumstances authorized by current law, the
content of communications would remain off-limits to
monitoring. The information captured by this technology-
neutral standard would be limited to the kind of information
you might find in a phone bill, such as the phone numbers
dialed by a particular telephone.
The Department strongly opposed the two-year ``sunset'' on
these critical provisions in the original House version of
the legislation. The President and the Attorney General have
stressed that the threat of terrorism will not ``sunset'';
rather the fight against terrorism will be a long struggle,
and law enforcement must have the necessary tools to fight
this war over the long term. However, law enforcement must
have these tools now. To calm fears of a permanent authority,
the bill now includes a four-year ``sunset'' provision for
several provisions as noted during the discussion of the
impacted provisions, at which time it is the Administration's
hope that these changes in surveillance law will be made
permanent.
Foreign Intelligence Surveillance Act (FISA) amendments (title II)
These provisions sharpen the tools used by the FBI, CIA,
and NSA for collecting intelligence on international
terrorists and other targets under FISA, 50 U.S.C.
Sec. Sec. 1801-63. The amendments in this area would enable
the agents and case officers of the FBI and CIA and the
analysts of NSA to respond more quickly and efficiently to
crises and to operational opportunities against terrorists
and other targets.
Period of FISA Surveillance and Search Orders
Problem: Currently, with limited exceptions, applications
to the FISA Court for its authorization to conduct electronic
surveillance and physical search must be renewed by the Court
every 90 and 45 days, respectively. Applications to the Court
for surveillance and search against foreign terrorists and
spies are noncontroversial but bog down the agencies and clog
the Court.
Solution: The legislation would, for the conduct of
electronic surveillance and physical search against foreign
terrorists and spies, extend the duration of an approval
order to 120-days with extension possible for up to a year
for electronic surveillance and would extend the duration for
searches from 45 to 90 days. (Sec. 207). This provision would
sunset in four-years.
Multi-Point Authority
Problem: Foreign terrorists and spies are trained to change
mobile or ground-line phones, hotel rooms, and restaurants in
order to defeat surveillance. Currently, to effect FISA
coverage at a new facility, DOJ must develop and draft a new
application, get it certified by the Director of FBI and
signed by the Attorney General, and find and present it to a
judge on the FISA Court. This delays or defeats our coverage
of these targets and impairs our ability to investigate and
detect terrorism and espionage.
Solution: The bill would enable the FBI, in response to
such actions by FISA targets that thwart coverage (Sec. 206),
to serve an order on a previously unidentified vendor or
facility in order to maintain the coverage. Congress passed a
similar provision for Title III a few years ago. These
provisions will sunset in four years.
Mobility--Nationwide Search Warrants
As communications technology now provides significant
mobility to its users, who can pass from jurisdiction to
jurisdiction in minutes, law enforcement and intelligence
officers need that same flexibility.
The bill provides for nationwide search warrants for voice
mail (Sec. 209), e-mail (as long as the issuing court has
jurisdiction over the offense being investigated) (Sec. 220),
and in investigations involving terrorism (Sec. 219).
Foreign Intelligence Information
Problem: Currently, as interpreted, the FISA requires that
the FBI Director or other senior official certify that the
collection of foreign intelligence is ``the purpose'' of
the FISA search or surveillance. As interpreted by the
FISA Court, that standard has hindered the Department's
ability to coordinate multi-faceted responses to
international terrorism, which involve foreign
intelligence and criminal investigations and equities.
Solution: The bill would change this standard. The bill
would require certification that the collection of foreign
intelligence is ``a significant purpose,'' rather than ``the
purpose,'' of the FISA search or surveillance; however, this
provision is subject to the four-year sunset applicable to
several FISA provisions. (Sec. 218).
Foreign Intelligence Information Sharing
Problem: Currently, with few exceptions, criminal
investigators may not share grand jury or Title III
information with the intelligence agencies. Records obtained
through grand jury subpoenas and insights gained through
Title III remain inaccessible to agencies that need such
information in their operations and analysis.
Solution: The bill would enable foreign intelligence
information obtained in a criminal investigation, including
information obtained through a grand jury or Title III, to be
shared with intelligence and other federal officers, subject
to the four-year sunset and would require the court to be
notified after any such information sharing occurs in the
case of grand jury information. (Sec. 203). In addition, the
Attorney General must establish procedures for the release of
information when it pertains to a case against a United
States citizen. Also, the FBI has been authorized to expedite
the hiring of translators capable of translating any
information gathered under these and other procedures
(Sec. 205).
Pen Register: Business Records; National Security Letters
Problem: The ability of the FBI to obtain basic records as
a part of an international terrorist or other intelligence
investigation has been hampered by cumbersome procedures
concerning pen registers, business records, and national
security letters. As the current investigation of flight
school records makes clear, our ability to gain quick access
to such information may be critical to an investigation.
Solution: The legislation would enable the FBI to obtain
toll, business, and other records more efficiently by
eliminating the requirement of a showing that there is a
nexus to a foreign power, and applying a standard of
relevance to an intelligence or counterintelligence
investigation. This new standard is limited to protection
against international terrorism or clandestine intelligence
activities and may not be based solely on First Amendment
activities. (Sec. Sec. 214, 215, 216). Pen/trap provisions
would also now apply to Internet traffic, as well as
telephone communications, while excluding Internet Service
Providers (ISPs) and other entities complying with wiretap
orders from liability based on any surveillance under these
provisions. See also (Sec. Sec. 201, 202, expanding
predicates for obtaining surveillance authority). These
provisions are subject to the four-year sunset.
Broadened Scope of Subpoenas for Records of Electronic Communications
and Subscriber Records
The bill would permit the disclosure of information such as
means of payment for electronic services, including bank
account and credit card numbers, pursuant to subpoena. The
bill would treat cable companies acting in their capacity of
providing Internet services the same as other ISPs and
telephone companies in this regard, removing them from the
protections of laws governing cable privacy, the intent of
which was and is to prevent disclosure of shows watched in
the privacy of one's home not benign information such as
account numbers and forms of payment. (Sec. 225). ISPs would
also be permitted under the bill to disclose information of
stored electronic communications where such communications
indicate a risk of immediate death or injury. (Sec. Sec. 210,
211, 212).
Delayed Notice of Execution of Search Warrant
The bill would permit delayed notice of execution of a
search warrant in criminal investigations, for a reasonable
time thereafter, where notice of the execution would have an
adverse result. (Sec. 213).
International Money Laundering Abatement and Anti-Terrorist Financing
Act of 2001 (title III)
Title III of the bill is designed to impede the financing
of terrorist activities. It accomplishes that goal by
allowing the government to confiscate the assets of foreign
terrorist organizations, the terrorists themselves and those
who aid them. In addition, it allows the United States
government to restrain those assets after indictment but
before any final adjudication to ensure those assets are
available to satisfy a judgment of forfeiture.
Law enforcement must be able to ``follow the money'' in
order to identify and neutralize terrorist networks.
The bill gives law enforcement the ability to seize the
assets of terrorist organizations. In addition, criminal
liability is imposed on those who knowingly engage in
financial transactions--money laundering--involving the
proceeds of terrorist acts. In addition, financial
institutions are encouraged to participate in this endeavor
by providing civil
[[Page S11056]]
liability immunity to financial institutions that disclose
suspicious activity. (Sec. 314). The bill further includes
financial institutions in this endeavor by requiring them to
have anti-money laundering programs. (Sec. Sec. 314, 352).
The bill would expand the scope of predicate money
laundering offenses to include providing material support for
terrorist organizations. (Sec. 301). These offenses would
further not be limited to conduct occurring within the United
States, as long as the tools of the offense are in or passed
through the United States. (Sec. Sec. 302, 377).
Various common banking problems are also addressed in the
bill, such as shell banks, correspondent accounts, and
concentration accounts. (Sec. Sec. 312, 313, 325). Treasury
would be authorized to order special measures be taken by
financial institutions where they are involved in such
accounts or other primary money laundering concerns.
(Sec. 311). Information would be made available as to such
crucial facts as the beneficial, as opposed to nominal, owner
of a bank account and minimum standards and policies would be
put into effect to deal with correspondent and concentration
accounts involving foreign persons. (Sec. Sec. 312, 313, 325,
326).
Employee references would be permitted to include reference
to suspicious activity by the employee without fear of
liability and other cooperation among financial institutions,
law enforcement, and regulatory authorities would be
encouraged. (Sec. Sec. 314, 330, 355).
These money laundering provisions are all subject to the
four-year sunset.
Protecting the border (title IV)
The legislation expands the grounds for deeming an alien
inadmissible or deportable from the United States for
terrorist activity, provides for the mandatory detention of
aliens whom the Attorney General certifies pose a risk to the
national security, and facilitates information sharing within
the U.S. and with foreign governments. Current law allows
some aliens who are threats to the national security to enter
and remain in the United States. The provisions in the bill
correct those inadequacies and are necessary tools to prevent
detain and remove aliens who are national security threats
from the United States. The Attorney General would also have
the authority to detain suspected terrorists who are threats
to national security, as long as removal proceedings or
criminal charges are filed within 7 days. (Sec. 412). In the
rare cases where removal is determined appropriate but is not
possible, detention may continue upon a review by the
Attorney General every 6 months. (Sec. 412). The bill further
would expand the definition of terrorists for purpose of
inadmissibility or removal to include public endorsement of
terrorist activity or provision of material support to
terrorist organizations. (Sec. 411). The bill further expands
the types of weapons the use of which can be considered
terrorist activity. (Sec. 411).
The ability of alien terrorists to move freely across
borders and operate within the United States is critical to
their capacity to inflict damage on the citizens and
facilities in the United States. Under current law, the
existing grounds for removal of aliens for terrorism are
limited to direct material support of an individual
terrorist. The bill would expand these grounds for removal to
include material support to terrorist organizations.
(Sec. 412).
To address the need for better border patrol, additional
border patrol officers would be authorized, specifically on
the northern border which has, during the investigation into
the September 11th events, been shown to be extremely
problematic. (Sec. Sec. 401, 402). To aid INS agents, the FBI
would also be required to provide criminal records
information to those agents. (Sec. 403).
The bill addresses not only unwelcome suspected terrorist
aliens but also immigrants who may need additional
consideration to stay within the United States where their
loved ones were victims of terrorist activity.
(Sec. Sec. 421-428).
Removing obstacles to investigating terrorism (title V)
The bill authorizes the Attorney General and Secretary of
State to pay rewards related to terrorism investigations. It
also provides for the DNA data collection from those
convicted of terrorism offenses and the coordination of
Federal law enforcement agencies. (Sec. Sec. 501, 502, 503,
504).
Providing for victims and public safety officers (title VI)
The bill establishes procedures for expedited payment of
public safety officers involved in the prevention,
investigation, rescue or recovery efforts related to a
terrorist attack, as well as providing increases to the
Public Safety Officer Benefit Program. (Sec. Sec. 611-614).
Increased information sharing (title VII)
The bill would require information sharing among Federal,
State and Local law enforcement, thus, providing the
necessary full picture needed to address terrorism.
(Sec. 711).
Substantive criminal law/criminal procedure: Strengthening the criminal
law against terrorism (title VIII)
These provisions reform substantive and procedural criminal
law to strengthen federal law enforcement's ability to
investigate, prosecute, prevent, and punish terrorist crimes.
There are substantial deficits in each of these areas which
impede or weaken our antiterrorism efforts.
We must make fighting terrorism a national priority in our
criminal justice system. Current law makes it easier to
prosecute members of organized crime than to crack down on
terrorists who can kill thousands of Americans in a single
day. The same is true of drug traffickers and individuals
involved in espionage--our laws treat these criminals and
those who aid and abet them more severely than terrorists.
Our investigation has found that wide terrorist networks,
not isolated individuals, are responsible for the September
11 attacks. Whether the members of these networks are in the
United States or in other countries, they and those who aid
them must be subject to the full force of our laws. Just as
the law currently regards those who harbor persons engaged in
espionage, the bill would make the harboring of terrorists a
criminal offense. The bill also increases the penalties for
conspiracy to commit terrorist acts to a serious level as
we have done for many drug crimes.
Key Provisions
Removing impediments to effective prosecution--elimination
of statute of limitations for offenses creating the risk of
death or personal injury and extending the statute for all
other terrorism offenses to 8 years (Sec. 809).
Removing impediments to effective investigation--single
jurisdiction search warrants; expanded jurisdiction to
include terrorism against U.S. facilities abroad. (Sec. 804).
Strengthening substantive criminal law--prohibition on
harboring terrorists and on material support of terrorists
(Sec. Sec. 803, 805, 807); making terrorist crimes RICO
predicates (Sec. 813); extending powers of asset forfeiture
to terrorists' assets (Sec. 806); including altering
cyberterrorism offense (Sec. 814); expanding the offense of
possession of bioweapons (prohibiting possession of
biological toxins by felons and aliens) (Sec. 817); creating
a federal offense for attacking mass transportation systems
(Sec. 801); expanding definition of domestic terrorism and
offenses of the crime of terrorism, requiring a showing of
coercion of government as an element of the offense
(Sec. Sec. 802, 808).
Strengthening criminal penalties--longer prison terms and
postrelease supervision of terrorists (Sec. 812); higher
conspiracy penalties for terrorists (Sec. 811); alternative
maximum sentences up to life for terrorism offenses
(Sec. 810).
Improved intelligence (title IX)
The bill authorizes the Director of the CIA to establish
requirements and provide for the collection of foreign
intelligence. The Director would also be asked to ensure
proper dissemination of foreign intelligence information.
Only if the appropriate officials have all the relevant
information will prevention, investigation, and prosecution
be fully functioning. The bill also would provide for the
tracking of terrorist assets as part of the collection of
information. (Sec. Sec. 901, 905).
Miscellaneous (title X)
The bill would finally require the Department of Justice
Inspector General to designate an official to receive civil
liberty and civil rights complaints and report those
complaints to Congress. The presumption is that such
information will be used in determining the continuing
viability of the provisions in the bill subject to sunset in
2005. (Sec. 1001).
Mr. HATCH. Mr. president, I also ask unanimous consent that a
section-by-section analysis be printed in the Record.
There being no objection, the material was ordered to be printed in
the Record, as follows:
FINAL COUNTER-TERRORISM BILL SECTION-BY-SECTION ANALYSIS
------------------------------------------------------------------------
Bill provision No. Bill description
------------------------------------------------------------------------
1...................... Title and table of contents.
2...................... Construction and severability clause.
101.................... Establishes a fund to reimburse DOJ components
for costs incurred to rebuild facilities,
investigate and prosecute terrorism, and to
reimburse other Federal agencies for detaining
individuals in foreign countries accused of
terrorist acts.
102.................... Sense of Congress condemning discrimination
against Arab and Muslim Americans.
103.................... Authorizes $200M for each of FY 2002, 2003 and
2004 for the FBI Technical Support Center
(established by AEDPA).
104.................... Broadens Attorney General's authority to
request assistance of Secretary of Defense in
emergency situations involving weapons of mass
destruction.
105.................... Directs the Secret Service to develop a
national network of electronic crime task
forces modeled on the New York task force.
106.................... Grants President the power to confiscate and
take title to enemies' property, when United
States has been attacked or is engaged in
military hostilities; also authorizes courts
to consider classified evidence, without
making it public, in lawsuits that challenge
the government's seizure of property.
201.................... Adds terrorism statutes--including chemical
weapons offenses under 18 U.S.C. 22--as
predicate offenses for which Title III wiretap
orders are available.
202.................... Allows voice wiretaps in computer hacking
investigations.
[[Page S11057]]
203(a)................. Permits sharing of grand jury information
regarding foreign intelligence and
counterintelligence with federal law-
enforcement, intelligence, protective,
immigration, national defense and national
security personnel; must notify court that
disclosure has taken place. Can share grand
jury information with state officials upon
court order.
203(b)................. Sharing of wiretap information regarding
foreign intelligence, counterintelligence, and
foreign intelligence information with federal
law-enforcement, intelligence, protective,
immigration, national defense and national
security personnel.
203(c)................. Requires AG to establish procedure for
information sharing in 203(a) and (b).
203(d)................. Permits sharing of information regarding
foreign intelligence, counterintelligence, and
foreign intelligence information with federal
law-enforcement, intelligence, protective,
immigration, national defense and national
security personnel notwithstanding other law.
204.................... Assures that foreign intelligence gathering
authorities are not disrupted by changes to
pen register/trap and trace statute.
205.................... Employment of translators by the FBI.
206.................... Allows court to authorize roving surveillance
under FISA where court finds that the actions
of the target may have effect of thwarting the
identification of a target.
207.................... Initial authorization for surveillance and
search of officers/employees of foreign powers
changed to 120 days; can be extended for one
year period. All other searches authorized for
90 day period.
208.................... Increases the number of judges on the FISA
Court to 11, no less than 3 of whom must live
within 20 miles of Washington, D.C.
209.................... Allows voice mail stored with a third party
provider to be obtained with a search warrant,
rather than a wiretap order.
210.................... Broadens the types of records that law
enforcement can subpoena from communications
providers, including the means and source of
payment.
211.................... Clarifies that statutes governing telephone and
internet communications (and not the
burdensome provisions of the Cable Act) apply
to cable companies that provide internet or
telephone service in addition to television
programming.
212.................... Allows computer-service providers to disclose
communications and records of communications
to protect life and limb; and clarifies that
victims of computer hacking can disclose non-
content records to protect their rights and
property.
213.................... Amends 18 U.S.C. 3103a to permit delayed notice
of search warrants where court determines that
immediate notice would have an ``adverse
result''; officers may seize property if court
finds ``reasonable necessity.''
214.................... To get pen register/trap and trace order under
FISA, must certify that information likely to
be obtained is relevant to an ongoing
investigation to protect against international
terrorism or clandestine intelligence
activities; investigations of US persons may
not be conducted upon the basis of First
Amendment protected activities.
215.................... Business records provision allows any designee
of FBI director no lower than Assistant
Special Agent in Charge to apply to FISA court
or a magistrate designated by Chief Justice
for an ex parte order requiring production of
any tangible things for an investigation to
protect against international terrorism or
clandestine intelligence activities;
investigation must be conducted under AG
Guidelines under EO 12333, and investigation
of a US person cannot be based on First
Amendment protected behavior; also requires
semiannual reporting to Congress.
216.................... Amends the pen register/trap and trace statute
to apply to internet communications, and to
allow for a single order valid across the
country.
217.................... Allows victims of computer-hacking crimes to
request law enforcement assistance in
monitoring trespassers on their computers;
``computer trespasser'' does not include
persons who have a contractual relationship
with the hacked computer's owner.
218.................... Allows law enforcement to conduct surveillance
or searches under FISA if ``a significant
purpose'' is foreign intelligence.
219.................... Permits courts to issue search warrants that
are valid nationwide for investigations
involving terrorism.
220.................... Permits courts to issue search warrants for
communications stored by providers anywhere in
the country; court must have jurisdiction over
the offense.
221.................... Authorizes President to impose sanctions
relating to the export of devices that could
be used to develop missiles or other weapons
of mass destruction. Also expands President's
ability to restrict exports to the portions of
Afghanistan controlled by the Taliban.
222.................... Protects communications providers from having
to develop or deploy new technology as a
result of the Bill, and assures that they will
be reasonably compensated.
223.................... Creates a cause of action and authorizes money
damages against the United States if officers
disclose sensitive information without
authorization.
224.................... Provides that all changes in Title II sunset
after four years (except sections 203(a),
203(c), 205, 208, 210, 211, 213, 216, 219,
221, and 222).
225.................... Grants immunity from civil liability to persons
who furnish information in compliance with a
FISA order.
301.................... Title of money-laundering act.
302.................... Congressional findings.
303.................... Sunset provision; money-laundering provisions
will expire in 2005 if Congress enacts joint
resolution.
311.................... Authorizes the Treasury Secretary to require
that financial institutions undertake a
variety of special measures to prevent money
laundering, such as recording certain
transactions and obtaining information about
correspondent accounts.
312.................... Imposes special due diligence requirements for
private banking and correspondent accounts
that involve foreign persons.
313.................... Prohibits domestic financial institutions from
maintaining correspondent accounts with
foreign shell banks.
314.................... Requires Treasury Secretary to promulgate
regulations to encourage cooperation among
financial institutions, regulators, and law
enforcement; allows financial institutions to
share information regarding persons suspected
of terrorism-related money laundering.
315.................... Includes various foreign-corruption offenses--
including bribery and smuggling--as
``specified unlawful activities'' under the
money-laundering statute.
316.................... Allows persons to contest confiscations of
their property in connection with
antiterrorism investigations.
317.................... Authorizes long-arm jurisdiction over foreign
money launderers; also allows courts to
restrain foreign-money launderers' assets
before trial.
318.................... Essentially a technical amendment, defines
``financial institution'' to include a
``foreign bank.''
319.................... Permits forfeiture of funds held in United
States interbank accounts; upon the request of
federal banking agencies, requires financial
institutions to disclose information about
anti-money laundering compliance.
320.................... Authorizes the civil forfeiture of property
related to certain offenses against foreign
nations, including controlled-substances
crimes, murder, and destruction of property.
321.................... Includes various entities in the definition of
``financial institution,'' including futures
commission merchants and the Commodity Futures
Trading Commission.
322.................... Provides that a statute preventing fugitives
from using court resources in forfeiture
actions, also applies to claims brought by
corporations whose officers are fugitives.
[typo in bill; refers to title 18; should be
title 28]
323.................... Allows courts to issue restraining orders to
preserve the availability of property subject
to forfeiture by a foreign government.
324.................... Requires Treasury Secretary to report on the
operation of this subtitle.
325.................... Allows Treasury Secretary to issue regulations
governing concentration accounts, to ensure
that customers cannot secretly move funds.
326.................... Requires Treasury Secretary to promulgate rules
requiring financial institutions to verify the
identities of persons opening accounts.
327.................... Requires the government to consider financial
institutions' anti-money laundering record
when deciding to approve various requests,
including proposed mergers.
328.................... Requires Treasury Secretary to cooperate with
foreign governments to identify the
originators of wire transfers.
329.................... Imposes criminal penalties on government
employee who is bribed in connection with his
duties under the money-laundering title.
330.................... Sense of Congress that the United States should
negotiate with foreign nations to secure their
cooperation in investigations of terrorist
groups' finances.
351.................... Grants immunity to a financial institution that
voluntarily discloses suspicious transactions;
prohibits the institution from notifying the
person who conducted the suspicious
transaction that it has been reported.
352.................... Directs financial institutions to establish
anti-money laundering programs, and allows
Treasury Secretary to prescribe minimum
standards.
353.................... Imposes civil and criminal penalties for
violations of geographic targeting orders;
extends the effective period for geographic
targeting orders from 60 to 180 days.
354.................... Requires the President's national strategy on
money laundering to include data regarding the
funding of international terrorism.
355.................... Allows financial institutions to disclose
suspicious activity in employment references.
356.................... Obliges Treasury Secretary to issue regulations
that require securities brokers and
commodities merchants to report suspicious
activities.
357.................... Requires Treasury Secretary to report on the
administration of Bank Secrecy Act provisions.
358.................... Makes various amendments to Bank Secrecy Act to
enhance United State's ability to fight
international terrorism, including making
information available to intelligence
agencies.
359.................... Requires reporting on the suspicious activities
of underground banking systems.
360.................... Instructs United States Executive Directors of
international financial institutions to use
their voice and vote to support loans to
foreign countries that assist the United
States' fight against international terrorism.
361.................... Establishes procedures and rules governing the
Treasury Department's Financial Crimes
Enforcement Network.
362.................... Requires Treasury Secretary to establish in the
Financial Crimes Enforcement Network, a highly
secure network that will allow the exchange of
information with financial institutions.
363.................... Increases civil and criminal penalties for
money laundering.
364.................... Authorizes the Federal Reserve to hire security
personnel.
365.................... Requires companies that receive more than
$10,000 in currency in a transaction to file a
report with the Financial Crimes Enforcement
Network.
366.................... Requires Treasury Secretary to study expanding
exemptions from currency reporting
requirements.
371.................... Makes it a crime to smuggle more than $10,000
in currency into or out of the United States,
with the intent of avoiding a currency
reporting requirement, also authorizes civil
forfeiture.
372.................... Authorizes criminal and civil forfeiture in
currency-reporting cases.
373.................... Includes a scienter requirement for the crime
of operating an unlicensed money transmitting
business.
374.................... Increases penalties for counterfeiting United
States currency and obligations; clarifies the
counterfeiting statutes apply to counterfeits
produced by electronic means.
375.................... Increases penalties for counterfeiting foreign
currency and obligations.
376.................... Designates a new predicate money-laundering
offense: providing material support or
resources to foreign terrorist organizations
in violation of 18 U.S.C. Sec. 2339B.
377.................... Provides for extraterritorial jurisdiction over
certain crimes of fraud in connection with
access devices.
401.................... Authorizes AG to waive caps on immigration
personnel assigned to protect Northern Border.
402.................... Triples the number of Border Patrol personnel,
Customs Service personnel, and Immigration and
Naturalization Service inspectors; also
allocates an additional $50 million each to
the Customs Service and the INS.
403.................... Requires the FBI to share criminal-record
information with the INS and the State
Department for the purpose of adjudicating
visa applications.
404.................... One-time expansion of INS authority to pay
overtime.
405.................... Requires AG to report to Congress on
feasibility of enhancing FBI's Integrated
Automated Fingerprint Identification System,
or ``IAFIS,'' to prevent foreign terrorists
from receiving visas and from entering United
States.
411.................... Broadens the Immigration and Nationality Act's
terrorism-related definitions. Expands grounds
of inadmissibility to include persons who
publicly endorse terrorist activity. Expands
definition of ``terrorist activity'' to
include all dangerous devices in addition to
firearms and explosives. Expands definition of
`'engaging in a terrorist activity'' to
include providing material support to groups
that the person knows or should know that are
terrorist organizations, regardless of whether
the support's purpose is terrorism related.
412.................... Requires AG to detain aliens whom he certifies
as threats to national security. AG must
charge aliens with criminal or immigration
offenses within seven days. AG must detain
aliens until they are removed or until he
determines that they no longer pose threat.
Establishes D.C. Circuit as exclusive
jurisdiction for appeals.
413.................... Gives Secretary of State discretion to provide
visa-records information to foreign
governments, for the purpose of combating
international terrorism or crime; gives
certain countries general access to State
Department's lookout databases.
414.................... Sense of Congress regarding need to expedite
implementation of an integrated entry and
exist data system.
415.................... Provides that Office of Homeland Security shall
participate in the entry-exit task force
authorized by Congress in 1996.
416.................... Requires AG to implement fully and expand the
foreign student visa monitoring program
authorized by Congress in 1996.
417.................... Requires Secretary of State to enhance efforts
to develop machine-readable passports.
418.................... Obliges Secretary of State to review how
consular officers issue visas to determine
whether consular shopping is a problem.
421.................... Grants special immigrant status to people who
were in the process of securing permanent
residence through a family member who died,
was disabled, or lost employment as a result
of the September 11 attacks.
422.................... Provides a temporary extension of status to
people who are present in the United States on
a ``derivative status'' (the spouse or minor
child) of a non-immigrant who was killed or
injured on September 11.
423.................... Provides that aliens whose spouses or parents
were killed in the September 11 attacks will
continue to be considered ``immediate
relatives'' entitled to remain in the United
States.
424.................... Provides that aliens who turn 21 during or
after September 2001 shall be considered
children for 90 or 45 days, respectively,
after their birthdays.
425.................... Authorizes AG to provide temporary
administrative relief, for humanitarian
purposes, to any alien who is related to a
person killed by terrorists.
426.................... Requires AG to establish evidentiary guidelines
for demonstrating that death or disability
occurred as a result of terrorist activity.
427.................... Provides that no benefits shall be given to
terrorists or their family members.
[[Page S11058]]
428.................... Definitions.
501.................... Enhances the AG's authority to pay rewards in
connection with terrorism.
502.................... Enhances Secretary of State's authority to pay
rewards in connection with terrorism.
503.................... Expands DNA sample collection predicates for
federal offenders to include all offenses in
18 U.S.C. 2332b(g)(5)(B) list, all crimes of
violence (as defined in 18 U.S.C. 16), and
attempts and conspiracies to commit such
crimes.
504.................... Allows ``federal officers'' who conduct FISA
surveillance or searches to coordinate efforts
to investigate or protect against attacks,
grave hostile acts, sabotage, international
terrorism, or clandestine intelligence
activities by foreign power.
505.................... Allows FBI Deputy Assistant Director or higher
(or Special Agent in Charge) to issue National
Security Letters for telephone toll and
transaction records, financial records, and
consumer reports.
506.................... Extends Secret Service's jurisdiction
(concurrently with FBI's) to investigate
offenses against government computers.
507.................... Person not lower than Assistant AG can apply
for an ex parte court order to obtain
educational records that are relevant to an
authorized investigation or prosecution of a
grave felony or an act of domestic or
international terrorism; must provide specific
and articulable facts showing that records
likely to contain information related to the
offenses; AG required to issue guidelines to
protect confidentiality.
508.................... Eliminates restrictions on production of
information from National Center for Education
Statistics; allows person not lower than
Assistant AG to collect information if there
are specific and articulable facts that
records are likely to contain information
related to a grave felony or an act of
domestic or international terrorism; AG
required to issue guidelines to protect
confidentiality.
611.................... Provides for expedited payment of Public Safety
Officer benefits in connection with terrorism.
612.................... Technical amendments to Pub. L. 107-37.
613.................... Raises base amount of Public Safety Officer
benefits from $100K to $250K.
614.................... Enhances authority of Assistant Attorney
General for the Office of Justice Programs to
manage OJP.
621.................... Makes many minor changes in crime victims
compensation program; one is: amounts received
by the Crime Victims Fund from the $40B
emergency fund are not subject to spending
cap.
622.................... Makes many minor changes in the crime victims
compensation program.
623.................... Makes many minor changes in the crime victims
compensation program.
624.................... Makes many minor changes in the crime victims
compensation program; one expands use of its
emergency reserve.
701.................... Expands regional information-sharing system to
enhance federal and state law-enforcement
officers' ability to respond to terrorist
attacks.
801.................... Makes it a crime to engage in terrorist attacks
on mass transportation systems.
802.................... Adds definition of ``domestic terrorism'' to 18
U.S.C. 2331 and makes conforming change in
existing definition of `'international
terrorism.''
803.................... Makes it a crime to harbor a person where
perpetrator knows or has reasonable grounds to
believe that the person has committed or is
about to commit one of several serious
terrorism crimes; includes venue provision.
804.................... Extends the United States' special maritime and
territorial jurisdiction to any offenses
committed by or against U.S. nationals at
foreign missions and related residences;
excludes offenses by persons covered under 18
U.S.C. 3261(a) (which provides separate
extraterritorial provision for persons
accompanying the armed forces).
805.................... Amends crime of providing material support to
terrorists by deleting the ``within the U.S.''
restriction; adds some additional predicate
offenses; and adds ``monetary instruments''
and ``expert advice or assistance'' as types
of prohibited support. Also, adds material
support of foreign terrorist organizations as
money laundering predicate.
806.................... Amends 18 U.S.C. 981(a)(1) to authorize civil
forfeiture of all assets owned by persons
engaged in terrorism.
807.................... Clarifies that Trade Sanctions Reform and
Export Enhancement Act of 2000 does not limit
the prohibition on providing material support
to terrorists or foreign terrorist
organizations.
808.................... Amends definition of ``federal crime of
terrorism'' in 18 U.S.C. 2332b(g)(5)(B) to
include a number of serious crimes that
terrorists are likely to commit. Makes
conforming amendment to 2332b(f) to avoid
reducing AG's primary investigative
jurisdiction.
809.................... No statute of limitations for certain terrorism
crimes that involve the occurrence or
foreseeable risk of death or serious injury;
other terrorism crimes subject to extended
eight-year limitations period.
810.................... Amends statutes defining various terrorism
crimes (including arson and material support
to terrorists) to provide base maximum prison
terms of 15 or 20 years, and up to life
imprisonment where death results.
811.................... Amends statutes defining various terrorism
crimes (including arson and killings in
federal facilities) to add a prohibition on
attempt and conspiracy; provides increased
penalties for attempts and conspiracies that
are equal to the penalties for the underlying
offenses.
812.................... Authorizes postrelease supervision periods of
up to life for persons convicted of terrorism
crimes that involved the occurrence or
foreseeable risk of death or serious injury.
813.................... Adds terrorism crimes listed in 18 U.S.C.
2332b(g)(5)(B) as predicates under RICO.
814.................... Makes a number of amendments to the computer
hacking law to clarify protection of protected
computers, and to ensure adequate penalties
for cyber-terrorists.
815.................... Creates a defense for persons who disclose wire
or electronic communications records in
response to the request of a governmental
entity.
816.................... Requires AG to establish regional computer
forensic laboratories to enhance
cybersecurity.
817.................... Broadens prohibition on possessing biological
toxins: unlawful to possess toxins for
anything other than a peaceful purpose; makes
it a crime to possess a biological toxin in a
quantity suggesting defendant had no peaceful
purpose; provides that a small category of
restricted persons (felons, illegal aliens and
others) are disqualified from possessing
biological toxins.
901.................... Gives CIA Director responsibility to establish
requirements and priorities for foreign
intelligence information under FISA, and to
assist AG in ensuring that information derived
from FISA surveillance or searches is used
effectively for foreign intelligence purposes.
902.................... Includes international terrorist activities
within the scope of foreign intelligence under
the National Security Act.
903.................... Sense of Congress on the need to establish
intelligence relationships to acquire
information on terrorists.
904.................... Grants CIA Director temporary authority to
delay submitting reports to Congress on
intelligence matters.
905.................... Requires AG to disclose to CIA Director any
foreign intelligence acquired by a DOJ element
during a criminal investigation; AG can
provide exceptions for classes of information
to protect ongoing investigations.
906.................... Requires AG, CIA Director, and Secretary of the
Treasury to report to Congress on feasibility
of developing capacity to analyze foreign
intelligence relating to terrorist
organizations' finances.
907.................... Obliges Directors of FBI and CIA to report on
the development of a ``National Virtual
Translation Center,'' which will provide
intelligence community with translations of
foreign intelligence.
908.................... Requires AG to establish a program to train
government officials in the identification and
use of foreign intelligence.
1001................... Directs DOJ Inspector General to review
allegations that DOJ employees engaged in
civil rights abuses.
1002................... Sense of Congress that Sikhs should not be
subject to discrimination in retaliation for
the September 11 attacks.
1003................... Defines ``electronic surveillance'' in FISA to
exclude the acquisition of computer
trespassers' communications.
1004................... Provides that money laundering prosecutions may
be brought in any district where the
transaction occurred, or in any district the
underlying unlawful activity could be
prosecuted.
1005................... Requires AG to make grants to enhance states
and local governments' ability to respond to
and prevent terrorism.
1006................... Provides that aliens who are engaged in money
laundering may not be admitted to the United
States.
1007................... Authorizes Drug Enforcement Administration
funds for antidrug training in Turkey and in
South and Central Asia.
1008................... Requires AG to study feasibility of using
fingerprint scanner at overseas consular posts
and points of entry into the United States.
1009................... Requires FBI to report to Congress on
feasibility of providing airlines with names
of passengers who are suspected to be
terrorists.
1010................... Allows Defense Department to contract with
state and local governments to provide
security at military installations during
Operation Enduring Freedom.
1011................... Enhances statutes making it unlawful to
fraudulently solicit charitable contributions.
1012................... Restricts states' ability to issue licenses to
transport hazardous materials; Transportation
Secretary must first determine that licensee
poses no security risk.
1013................... Sense of the Senate that the United States
should increase funding for bioterrorism
preparedness.
1014................... Requires Office of Justice Programs to make
grants to states to enhance their ability to
prepare for and respond to terrorism involving
weapons of mass destruction.
1015................... Expands and reauthorizes the Crime
Identification Technology Act for
antiterrorism grants to states and localities.
1016................... Establishes National Infrastructure Simulation
and Analysis Center to protect United States'
critical infrastructure from terrorist
attacks.
------------------------------------------------------------------------
Mr. LEAHY. Mr. President, I thank the distinguished senior Senator
from Utah for his comments. Senator Hatch and I, over the last
generation, have spent a great deal of time with each other on a many
issues, on numerous committees, especially the Judiciary Committee. But
we have spent so much time together on this, we even appear to be
coordinating wardrobes with gray suits and blue shirts today. But I
appreciate his help.
I appreciate so many who helped on crafting and moving forward with
this legislation. I thank our leader, Senator Daschle. It would have
been impossible for us to be here at this point without his steadfast
commitment to the committee system and his willingness to have the
committee work diligently to improve the legislation initially
presented by the Administration. On my behalf and on behalf of the
American people, I want to publicly acknowledge his vital role in this
legislation. Senator Reid has also provided valuable counsel and
assistance as we have moved first the original Senate USA Act, S. 1510,
and now the House-passed bill, H.R. 3162.
Many others also helped us: Senator Hatch and Senator Specter and
Senator Grassley and Senator Durbin, Senator Schumer, Senator Cantwell,
and so many others on the Judiciary committee.
I said many times we are merely constitutional impediments to staff.
In particular, I want to thank Mark Childress and Andrea LaRue on the
staff of Majority Leader Daschle, and David Hoppe on the staff of
Republican Leader Lott. I would also like to thank Markan Delrahim,
Jeff Taylor, Stuart Nash, and Leah Belaire with Senator Hatch, the
ranking member of the Judiciary Committee, Melody Barnes and Esther
Olavarria with Senator Kennedy, Neil McBride, and Eric Rosen with
Senator Biden, Bob Schiff with Senator Feingold, and Stacy Baird and
Beth Stein with Senator Cantwell. I also want to thank Bill Jensen of
the Legislative Counsel's office.
Finally, I would like to thank my own Judiciary Committee staff,
especially Bruce Cohen, Beryl Howell, Julie Katzman, Ed Pagano, John
Elliff, David James, Ed Barron, Tim Lynch, Susan Davies, Liz McMahon,
Manu Bhardwaj, and Tara Magner. These are people who are more than just
accomplished Senate staffs, they are close personal friends.
I think of the way they have worked, also, with personal office staff
such as Luke Albee, J.P. Dowd, David Carle, and others. These are dear
friends, but they are also people who bring such enormous expertise--
expertise they had in their other careers before they came to the
Senate, and how helpful this is.
Mr. President, we are about to vote and we will vote in a matter of
minutes. I want us to think just for a moment why we are here. We have
all
[[Page S11059]]
shared the sadness, the horror of September 11. We are seeing Members
of Congress and staffs threatened, tragic deaths in the Postal Service,
those who died in the Pentagon, those who died at the Twin Towers.
It is also almost a cliche to say America under attack, but that is
what it is. Each of us has a job helping to respond to that. We are not
Republicans or Democrats in that, we are Americans preserving our
Nation and preserving our democracy. But, you know, we preserve it not
just for today, we preserve it for the long run. That presents the kind
of questions we have to answer in a bill such as this.
I suspect terrorist threats against the United States will exist
after all of us, all 100 of us, are no longer serving in the Senate. It
is a fact of life. It will come from people who hate our democracy,
hate our diversity, hate our success. But that doesn't mean we are
going to stop our democracy, our diversity, or our success.
Think what we cherish in this Nation. Our first amendment, for
example, giving us the right to speak out about what we want--as we
want. How many countries even begin to give that freedom?
Also, in that same first amendment, the right to practice any
religion we want, or none if we want.
The leaders of the Judiciary Committee, Senator Hatch and I, belong
to different religions which we hold deeply. I think we gain a great
deal of inner strength from our respective faiths. But we know we are
not judged by our religion. That is something we must protect and hold.
We are judged by how well we do in representing our States and our
Nation.
Because we face terrible terrorist attacks today, we should not
succumb tomorrow by giving up what makes us a great nation. That has
been my benchmark throughout the work I have done in this bill.
I spoke of the people who bring so much to this. I was just talking
with Beryl Howell, a brilliant lawyer, who, with Bruce Cohen, has led
our team on all this. She is a former prosecutor. How much she learned
from her prior experiences and how much she brought here. Bruce Cohen,
who was in private practice and came here, probably is as knowledgeable
about Senate practice as anybody I know of, and he has brought that
knowledge here. There are so many others I could name.
I have to think of my own case. Probably my 26 years here in the
Senate, in many ways led up to this moment because I have never brought
more of my own experiences or knowledge to bear than on this.
There was a rush, an understandable and even, some may say,
justifiable rush, to pass legislation immediately after these terrible
events. I understand that, the United States having been attacked
within our borders for the first time, really, by an outside power
since the War of 1812--attacked terribly, devastatingly. Who can forget
the pictures we saw over and over again on television?
So I can understand the rush to do something, anything. But I used
every bit of credibility I had as a Senator to say, wait, let us take
time. I applaud people such as Senator Daschle who, using his great
power as majority leader, said we will take the time to do this right,
and backed me up on this. Other Senators from both sides of the aisle
said, OK, let's work together.
I know the Senator from Utah shared the same anger that I did at the
terrorists, and perhaps had been reluctant at first to join with me on
that. But then the Senator from Utah and I worked day and night,
weekends, evenings, and everything else to put together the best
possible bill.
We worked with our friends and our colleagues in both parties in the
other body. Ultimately, we do nothing to protect America if we pass a
bill which for short-term solutions gives us long-term pain by
destroying our Constitution or our rights as Americans.
There are tough measures in this legislation. Some may even push the
envelope to the extent that we worry. That is why we put in a 4-year
sunset. We have also built in constitutional checks and balances within
the court system and within even some of the same agencies that will be
given new enforcement powers. But we also will not forget our rights
and responsibilities and our role as U.S. Senators.
We will not forget our role and our responsibilities as Senators to
do oversight. Senator Hatch and I are committed to that. We will bring
the best people from both sides of aisle, across the political
spectrum, to conduct effective oversight.
I have notified Attorney General Ashcroft and Director Mueller that
we will do that to make sure these powers are used within the
constitutional framework to protect all of us. I said earlier on this
floor what Benjamin Franklin said: that the people who would trade
their liberties for security and deserve neither.
We will enhance our security in this bill, but we will preserve our
liberties. How could any one of us who have taken an oath of office to
protect the Constitution do otherwise?
Like the distinguished Presiding Officer, I have held different
elective offices. As the distinguished Presiding Officer knows, we take
seriously our duties and our roles in each of those. He was a Member of
the House and was the Governor of one of the original 13 States. I was
a prosecutor and am a U.S. Senator from the 14th State. But all of us
take this responsibility, because none of us are going to be here
forever.
I want to be able to look back at my time in the U.S. Senate and be
able to tell my children, my grandchildren, and my friends and
neighbors in Vermont--the State I love so much--that I came home having
done my best.
We have so much in this country--so much. But it is our rights and
our Constitution that give us everything we have, which allows us to
use the genius of so many people who come from different backgrounds
and different parts of the world. That makes us stronger. We become
weak if we cut back on those rights.
We have had some difficult times in our Nation where we have not
resisted the temptation to cut back. Here we have. The American people
will know that this Congress has worked hard to protect us with this
bill.
I will vote for this legislation knowing that we will continue to do
our duty, and to follow it carefully to make sure that these new powers
are used within our Constitution.
I suggest that all time be yielded, and that we be prepared to vote.
I ask for the yeas and nays.
The PRESIDING OFFICER. Is there a sufficient second?
There is a sufficient second.
The yeas and nays were ordered.
The PRESIDING OFFICER. The clerk will read the bill for the third
time.
The bill was read the third time.
The PRESIDING OFFICER. The bill having been read the third time, the
question is, Shall the bill pass?
The clerk will call the roll.
The assistant legislative clerk called the roll.
Mr. REID. I announce that the Senator from Louisiana (Ms. Landrieu)
is necessarily absent.
The PRESIDING OFFICER (Mr. Johnson). Are there any other Senators in
the Chamber desiring to vote?
The result was announced--yeas 98, nays 1, as follows:
[Rollcall Vote No. 313 Leg.]
YEAS--98
Akaka
Allard
Allen
Baucus
Bayh
Bennett
Biden
Bingaman
Bond
Boxer
Breaux
Brownback
Bunning
Burns
Byrd
Campbell
Cantwell
Carnahan
Carper
Chafee
Cleland
Clinton
Cochran
Collins
Conrad
Corzine
Craig
Crapo
Daschle
Dayton
DeWine
Dodd
Domenici
Dorgan
Durbin
Edwards
Ensign
Enzi
Feinstein
Fitzgerald
Frist
Graham
Gramm
Grassley
Gregg
Hagel
Harkin
Hatch
Helms
Hollings
Hutchinson
Hutchison
Inhofe
Inouye
Jeffords
Johnson
Kennedy
Kerry
Kohl
Kyl
Leahy
Levin
Lieberman
Lincoln
Lott
Lugar
McCain
McConnell
Mikulski
Miller
Murkowski
Murray
Nelson (FL)
Nelson (NE)
Nickles
Reed
Reid
Roberts
Rockefeller
Santorum
Sarbanes
Schumer
Sessions
Shelby
Smith (NH)
Smith (OR)
Snowe
Specter
Stabenow
Stevens
Thomas
Thompson
Thurmond
Torricelli
Voinovich
Warner
Wellstone
Wyden
NAYS--1
Feingold
[[Page S11060]]
NOT VOTING--1
Landrieu
The bill (H.R. 3162) was passed.
Mr. COCHRAN. Mr. President, I move to reconsider the vote, and I move
to lay that motion on the table.
The motion to lay on the table was agreed to.
____________________
Share this page
|
Bookmark this page
The leading immigration law publisher - over 50000 pages of free information! © Copyright 1995- American Immigration LLC, ILW.COM
|