Campbell et al v. Facebook Inc.

Filing 31

RESPONSE (re 29 MOTION to Dismiss Consolidated Amended Complaint ) filed byMatthew Campbell, Michael Hurley, David Shadpour. (Attachments: # 1 Declaration of Michael W. Sobol, # 2 Exhibit A, # 3 Exhibit B, # 4 Exhibit C, # 5 Exhibit D)(Sobol, Michael) (Filed on 7/30/2014)

Download PDF
EXHIBIT C LAW KF 31 .J8 1986 Calendar No. 1064 C O P . 2 RESS REPORT SENATE 99-541 ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 OCTOBER 17 (legislative day, OCTOBER 10), 1986.—Ordered to be printed Mr. THURMOND, from the Committee on the Judiciary, submitted the following REPORT [To accompany S. 2575] The Committee on the Judiciary, to which was referred the bill (S. 2575) having considered the same, reports favorably thereon with an amendment in the nature of a substitute and recommends that the bill, as amended, do pass. CONTENTS Page I. II. III. IV. V. VI. VII. VIII. IX. X. Purpose History Statement Glossary Section-by-section analysis Agency views Cost estimate Regulatory impact statement Vote of committee Changes in existing laws .. 1 3 5 8 11 50 51 52 52 52 I. PURPOSE The Electronic Communications Privacy Act amends title III of the Omnibus Crime Control and Safe Streets Act of 1968—the Fed­ eral wiretap law—to protect against the unauthorized interception of electronic communications. The bill amends the 1968 law to update and clarify Federal privacy protections and standards in light of dramatic changes in new computer and telecommunica­ tions technologies. When the Framers of the Constitution acted to guard against the arbitrary use of Government power to maintain surveillance over citizens, there were limited methods of intrusion into the "houses, 91-010 O 2 papers, and effects" protected by the fourth amendment. During the intervening 200 years, development of new methods of commu­ nication and devices for surveillance has expanded dramatically the opportunity for such intrusions. The telephone is the most obvious example. Its widespread use made it technologically possible to intercept the communications of citizens without entering homes or other private places. When the issue of Government wiretapping first came before the Supreme Court in Olmstead v. United States, 277 U.S. 438 (1928), the Court held that wiretapping did not violate the fourth amendment, since there was no searching, no seizure of anything tangible, and no physical trespass. Today, the Olmstead case is often remembered more for Justice Brandeis' prescient dissent than for its holding. Justice Brandeis predicted: Ways may some day be developed by which the Govern­ ment, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home . . . Can it be that the Constitution affords no pro­ tection against such invasions of individual security? Forty years later, the Supreme Court accepted Justice Brandeis' logic in Katz v. United States, 389 U.S. 347 (1967), holding that the fourth amendment applies to Government interception of a tele­ phone conversation. At the same time, the Court extended fourth, amendment protection to electronic eavesdropping on oral conver­ sations in Berger v. New York, 388 U.S. 41 (1967). Congress responded in a comprehensive fashion by authorizing Government interception, under carefully subscribed circumstances in title III of the Omnibus Crime Control and Safe Streets Act of 1968, 18 U.S.C. 2510 et seq. Title III is the primary law protecting the security and privacy of business and personal communications in the United States today. Its regimen for protecting the privacy of voice communications is expressly limited to the unauthorized aural interception of wire or oral communications. It only applies where the contents of a communication can be overheard and un­ derstood by the human ear. See United States v. New York Tele­ phone Company, 434 U.S. 159, 167 (1977). Furthermore, existing title III applies only to interceptions of communications sent via common carriers. 18 U.S.C. 2510(10). As Senator Leahy said when he introducted S. 2575 with Senator Mathias, the existing law is "hopelessly out of date." Congressional Record, June 19, 1986. It has not kept pace with the development of communications and computer technology. Nor has it kept pace with changes in the structure of the telecommunications industry. Today we have large-scale electronic mail operations, computerto-computer data transmissions, cellular and cordless telephones, paging devices, and video teleconferencing.1 A phone call can be carried by wire, by microwave or fiber optics. It can be transmitted in the form of digitized voice, data or video. Since the divestiture of 1 These new forms of telecommunications and computer technology are described in the Glos­ sary below. 3 AT&T and deregulation, many different companies, not just common carriers, offer a wide variety of telephone and other com­ munications services. It does not make sense that a phone call transmitted via common carrier is protected by the current federal wiretap statute, while the same phone call transmitted via a pri­ vate telephone network such as those used by many major U.S. cor­ porations today, would not be covered by the statute. These tremendous advances in telecommunications and computer technologies have carried with them comparable technological ad­ vances in surveillance devices and techniques. Electronic hardware making it possible for overzealous law enforcement agencies, indus­ trial spies and private parties to intercept the personal or proprie­ tary communications of others are readily available in the Ameri­ can market today. Title I of the Electronic Communications Privacy Act addresses the interception of wire, oral and electronic communications. It amends existing chapter 119 of title 18 to bring it in line with tech­ nological developments and changes in the structure of the tele­ communications industry. The Committee also recognizes that computers are used exten­ sively today for the storage and processing of information. With the advent of computerized recordkeeping systems, Americans have lost the ability to lock away a great deal of personal and business information. For example, physicians and hospitals maintain medi­ cal files in offsite data banks, businesses of all sizes transmit their records to remote computers to obtain sophisticated data processing services. These services as well as the providers of electronic mail create electronic copies of private correspondence for later refer­ ence. This information is processed for the benefit of the user but often it is maintained for approximately 3 months to ensure system integrity. For the person or business whose records are involved, the privacy or proprietary interest in that information should not change. Nevertheless, because it is subject to control by a third party computer operator, the information may be subject to no con­ stitutional privacy protection. See United States v. Miller, 425 U.S. 435 (1976) (customer has no standing to contest disclosure of his bank records). Thus, the information may be open to possible wrongful use and public disclosure by law enforcement authorities as well as unauthorized private parties. The provider of these serv­ ices can do little under current law to resist unauthorized access to communications. Title II of S. 2575 addresses access to stored wire and electronic communications and transactional records. It is modeled after the Right to Financial Privacy Act, 12 U.S.C. 3401 et seq. to protect pri­ vacy interests in personal and proprietary information, while pro­ tecting the Government's legitimate law enforcement needs. Title III of the bill addresses pen registers and trap and trace de­ vices. II. HISTORY In 1984, Senator Leahy asked the Attorney General whether he believed interceptions of electronic mail and computer-to-computer communications were covered by the Federal wiretap law. The 4 Criminal Division of the Justice Department responded that Feder­ al law protects electronic communications against unauthorized ac­ quisition only where a reasonable expectation of privacy exists. Un­ derscoring the need for this legislation, the Department concluded: In this rapidly developing area of communications which range from cellular non-wire telephone connections to microwave-fed computer terminals, distinctions such as [whether there does or does not exist a reasonable expecta­ tion of privacy] are not always clear or obvious. Senator Leahy's letter and the Justice Department's response mark the beginning of this legislation. The Subcommittee on Pat­ ents, Copyrights and Trademarks chaired by Senator Mathias, held hearings in the 98th Congress. See, Hearing before the Subcommit­ tee on Patents, Copyrights and Trademarks of the Committee on the Judiciary on Privacy and Electronic Communications, Septem­ ber 12, 1984, S. Hrg. 98-1266. The product of that hearing and subsequent discussions with the Department of Justice and private groups interested in promoting communications privacy, while protecting legitimate law enforce­ ment needs and promoting technological innovation, was S. 1667, the Electronic Communications Privacy Act of 1985. Senators Leahy and Mathias introduced that bill on September 19, 1985. On the same day, Congressmen Kastenmeier and Moorhead, the Chair­ man and Banking Minority Member of the House Judiciary Sub­ committee on Courts, Civil Liberties and the Administration of Jus­ tice introduced an identical bill, H.R. 3378. In October 1985, the Office of Technology Assessment issued a report entitled "Electronic Surveillance and Civil Liberties." That study concluded that current legal protections for electronic mail are weak, ambiguous, or non-existent," and that "electronic mail remains legally as well as technically vulnerable to unauthorized surveillance." "Federal Government Information Technology: Elec­ tronic Surveillance and Civil Liberties" (Washington, D.C.: U.S. Congress, Office of Technology Assessment, OTA-CIT-293, October 1985). The Subcommittee on Patents, Copyrights and Trademarks held a hearing on S. 1667 on November 13, 1985. Testimony was re­ ceived from interested individuals and groups, including represent­ atives of the telephone industry, the electronic mail industry, and the software and service industries. Representatives of the Depart­ ment of Justice presented their views, and the subcommittee also received testimony from the American Civil Liberties Union and elicited technical information from the Institute of Electrical and Electronics Engineers. As a result of those hearings, S. 1667 was superseded by a new bill to reflect the concerns raised by some of these groups, particu­ larly the Department of Justice and radio hobbyists. On June 19, 1986, Senator Leahy, joined by Senator Mathias, introduced S. 2575. On August 12, 1986, the Judiciary Committee Subcommittee on Patents, Copyrights and Trademarks favorably reported S. 2575, as amended, to the full Committee by voice vote. 5 On September 19, 1986, Senators Leahy and Mathias and Chair­ man Thurmond offered an amendment in the nature of a substi­ tute to S. 2575. The Committee voted unanimously to favorably report the Electronic Communications Privacy Act of 1986, as amended, to the full Senate. III. STATEMENT A letter sent by first class mail is afforded a high level of protec­ tion against unauthorized opening by a combination of constitu­ tional provisions, case law, and U.S. Postal Service statutes and regulations. Voice communications transmitted via common carrier are protected by title III of the Omnibus Crime Control and Safe Streets Act of 1968. But there are no comparable Federal statutory standards to pro­ tect the privacy and security of communications transmitted by new noncommon carrier communications services or new forms of telecommunications and computer technology. This is so, even though American citizens and American businesses are using these new forms of technology in lieu of, or side-by-side with, first class mail and common carrier telephone services. This gap results in legal uncertainty. It may unnecessarily dis­ courage potential customers from using innovative communications systems. It probably encourages unauthorized users to obtain access to communications to which they are not a party. It may dis­ courage American businesses from developing new innovative forms of telecommunications and computer technology. The lack of clear standards may expose law enforcement officers to liability and may endanger the admissibility of evidence. Most importantly, the law must advance with the technology to ensure the continued vitality of the fourth amendment Privacy cannot be left to depend solely on physical protection, or it will gradually erode as technology advances. Congress must act to pro­ tect the privacy of our citizens. If we do not, we will promote the gradual erosion of this precious right. The Committee believes that S. 2575, te Electronic Communica­ tions Privacy Act of 1986, represents a fair balance between the privacy expectations of American citizens and the legitimate needs of law enforcement agencies. The Justice Department strongly supports S. 2575 because it strengthens the current wiretap law from a law enforcement per­ spective. Specifically, it expands the list of felonies for which a voice wiretap order may be issued and the list of Justice Depart­ ment officials who may apply for a court order to place a wiretap. The bill also includes provisions making it easier for law enforce­ ment officials to deal with a target who repeatedly changes tele­ phones to thwart interception of his communications and creates criminal penalties for those who notify a target of a wiretap in order to obstruct it. These provisions will be particularly helpful to the Justice Department in its fight against drug trafficking. The organizations and individual corporations named below also support the principles embodied in the legislation. Organizations: Electronic Mail Assoc.; ADAPSO; Telocator Net­ work of America; Cellular Telecommunications Industry Assoc; 6 ACLU; National Association of Manufacturers (NAM); U.S. Cham­ ber of Commerce; National Association of Broadcasters (NAB); Na­ tional Cable Television Assoc. (NCTA); National Association of Business & Educational Radio (NABER); CBEMA; U.S. Telephone Assoc.; Videotext Industry Assoc.; Information Industry Assoc; Electronic Funds Transfer Assoc.; Radio and Television News Di­ rectors Assoc.; Association of American Railroads; Institute of Elec­ trical and Electronics Engineers (IEEE); Direct Marketing Associa­ tion; Utilities Telecommunications Council; and Associated Credit Bureaus, Inc. Corporations: AT&T; General Electric; IBM; GTE; EDS; ITT; MCI; CBS; ABC; NBC; Tandy Corp. (Radio Shack); Trintex; Equifax; TRW; Source Telecomputing Corporation; Chase Manhattan Bank; Motorola; Ameritech; Bell Atlantic; Bell South; Southwestern Bell; NYNEX; Pacific Telesis; US West; and Associated Credit Services, Inc. A few points in the development of the Electronic Communica­ tions Privacy Act of 1986 should be noted here. After Senators Leahy and Mathias introduced the bill in June 1986, S. 2575 was referred to the Subcommittee on Patents, Copyrights and Trade­ marks. During the subcommittee markup session held on August 12,1986, the bill was further amended to clarify certain provisions. At the request of the FCC, in response to the recent Captain Mid­ night incident, in which an individual in Florida interfered with the transmission of an HBO program being relayed by satellite, the subcommittee included in the bill language to address deliberate or malicious interference with satellite transmissions. It also added to title III of the bill related to installation and use of pen registers, procedural requirements for orders to use "trap and trace" devices. In order to underscore that the inadvertent reception of a pro­ tected communication is not a crime, the subcommittee changed the state of mind requirement under title III of the Omnibus Crime Control and Safe Streets Act of 1968 from "willful" to "intention­ al." This change in the law addresses the concerns of radio scan­ ners that in the course of scanning radio frequencies in order to receive public communications, one could inadvertently tune through a protected communication like a cellular telephone call. This provision makes clear that the inadvertent interception of a protected communication is not unlawful under this Act. During subcommittee consideration, Senators Laxalt, Grassley, DeConcini and Simpson expressed concerns about the bill's penalty structure for the interception of certain satellite transmissions by home viewers. Senators Leahy and Mathias agreed that those con­ cerns would be addressed during Committee consideration of the Electronic Communications Privacy Act. The Leahy-Mathias-Thurmond substitute for S. 2575, which was offered when the full Committee considered this legislation, incor­ porated an amendment offered by Senator Grassley. Senators Laxalt, McConnell, Simpson and Denton cosponsored Senator Grassley's amendment. Senator Grassley's amendment modifies the criminal penalties and civil liability provisions of chapter 119 of title 18 of the United States Code so that there is a two-track, tiered penalty structure for home viewing of private satellite transmissions when the con­ 7 duct is not for a tortious or illegal purpose or for purposes of direct or indirect commercial advantage or private commercial gain. In a public action, under the Grassley amendment, a first offend­ er would be subject to a suit by the Government for injunctive relief. If injunctive relief is granted, one who violates the injunc­ tion would be subject to the full panoply of enforcement mecha­ nisms within the court's existing authority, including criminal and civil contempt. Second and subsequent offenses carry a mandatory $50 civil fine for each violation. The term "violation" in this con­ text refers to each viewing of a private video communication. In a private civil action, a person harmed by the private viewing of such a satellite communication may sue for damages. If the de­ fendant has not previously been enjoined in a government action as described above, and has not previously been found liable in a civil suit, the plaintiff may recover the greater of his actual dam­ ages or statutory damages of $50 to $500. A second offender (one who has been found liable in a prior private civil action or one who has been enjoined in a government suit) is subject to liability for the greater of actual damages or statutory damages of $100 to $1,000. Third and subsequent offenders are subject to the bill's full civil penalties. The Grassley amendment also takes outside the penalty provi­ sions of the Electronic Communications Privacy Act, the intercep­ tion of a satellite transmission via audio subcarrier if the transmis­ sion is intended for redistribution to facilities open to the public, provided that the conduct is not for the purpose of direct or indi­ rect commercial advantage or private financial gain. Audio subcar­ riers intended for redistribution to the public include those for re­ distribution by broadcast stations and cable and like facilities. They also include those for redistributions to buildings open to the public like hospitals and office buildings that pump in music which has been transmitted via subcarrier. As specified in the substitute, this audio subcarrier exclusion does not apply to data transmis­ sions or telephone calls. The substitute amendment also incorporated Senator, Simon's amendment. Senator Simon had expressed concern that the Elec­ tronic Communications Privacy Act s penalties were too severe for the first offender, who without an unlawful or financial purpose, intercepts a cellular telephone call or certain radio communica­ tions related to news-gathering. Senator Simon's amendment reduces the penalty for such an interception of an unencrypted, unscrambled cellular telephone call to a $500 criminal fine. Unencrypted, unscrambled radio com­ munications transmitted on frequencies allocated under subpart D of part 74 of the FCC rules are treated like private satellite video communications are under Senator Grassley's amendment. Scanning enthusiasts have argued to the Committee that the mere monitoring of cellular telepnone calls should not be illegal. That argument ignores three important realities. First, Congress, in passing the 1968 wiretap law already made willful monitoring of such telephone calls illegal when at least part of the conversation is carried by wire. Second, unlike many signals which are more commonly scanned, the design of the cellular telepnone system makes the intentional monitoring of specific calls more difficult be­ 8 cause they are handed off among cells. The Committee is not con­ vinced that these arguments overcome the need for protection of privacy interests. It has been suggested that the Federal Communications Commis­ sion consider labeling requirements on cellular telephnones, radio scanning equipment and private satellite video communications. The Commission might consider the feasibility of requiring that cellular telephones be labeled to indicate that cellular calls are radio-based communications, and as such, portions of the communi­ cation may be intercepted by available scanning equipment and of requiring that scanning equipment be labeled to indicate that the intentional interception of protected communications could be a Federal criminal violation. Finally, the Commission might consider the feasibility of requiring those who transmit private satellite video communications to periodically transmit a crawl across the bottom of the screen indicating that such communications are pro­ tected. IV. GLOSSARY For reference, some of the new telecommunications and comput­ er technologies referred to in the Electronic Communications Pri­ vacy Act of 1986 and this report are described briefly below. Treat­ ment of these and other technologies under current law is dis­ cussed in the House Report to its companion measure, H.R. 4952. See House Report 99-647. ELECTRONIC MAIL Electronic mail is a form of communication by which private cor­ respondence is transmitted over public and private telephone lines. In its most common form, messages are typed into a computer ter­ minal, and then transmitted over telephone lines to a recipient computer operated by an electronic mail company. If the intended addressee subscribes to the service, the message is stored by the company's computer "mail box" until the subscriber calls the com­ pany to retrieve its mail, which is then routed over the telephone system to the recipient's computer. If the addressee is not a sub­ scriber to the service, the electronic mail company can put the message onto paper and then deposit it in the normal postal system. Electronic mail systems may be available for public use or may be proprietary, such as systems operated by private companies for internal correspondence. COMPUTER-TO-COMPUTER COMMUNICATIONS Common computer-to-computer communications include the transmission of financial records or funds transfers among finan­ cial institutions, medical records between hospitals and/or physi­ cians' offices, and the transmission of proprietary data among the various offices of a company. ELECTRONIC BULLETIN BOARDS Electronic "bulletin boards" are communications networks cre­ ated by computer users for the transfer of information among com­ 9 puters. These may take the form of proprietary systems or they may be noncommercial systems operating among computer users who share special interests. These noncommercial systems may in­ volve fees covering operating costs and may require special "pass­ words" which restrict entry to the system. These bulletin boards may be public or semi-public in nature, depending on the degree of privacy sought by users, operators or organizers of such systems. MICROWAVE Microwave consists of extremely high frequency radio waves transmitted point-to-point on line-of-sight paths between antennas located on towers or building tops (in terrestrial microwave sys­ tems) and between satellites and earth station "dish" antennas (in satellite-based systems). CELLULAR TELEPHONES In 1981 the Federal Communications Commission approved "the use of cellular telephone services. This technology uses both radio transmission and wire to make "portable" telephone service avail­ able in a car, a briefcase, or in rural areas not reached by tele­ phone wire. In a cellular radiotelephone system, large service areas are divid­ ed into honeycomb-shaped segments or cells"—each of which is equipped with a low-power transmitter or base station which can receive and radiate messages within its parameters. When a caller dials a number on a cellular telephone, a transceiver sends signals over the air on a radio frequency to a cell site. From there the signal travels over phone lines or a microwave to a computerized mobile telephone switching office ("MTSO") or station. The MTSO automatically and inaudibly switches the conversation from one base station and one frequency to another as the portable tele­ phone, typically in a motor vehicle, moves from cell to cell. Cellular technology, because it is more complex, is more difficult to intercept than traditional mobile telephones; it is, however, more accessible than microwave transmissions. Cellular telephone calls can be intercepted by either sophisticated scanners designed for that purpose, or by regular radio scanners modified to intercept cellular calls. CORDLESS TELEPHONES A cordless telephone consists of a handset and a base unit wired to a landline and a household/business electrical current. A com­ munication is transmitted from the handset to the base unit by AM or FM radio signals. From the base unit the communication is transmitted over wire, the same as a regular telephone call. The radio portions of these telephone calls can be intercepted, with rela­ tive ease using standard AM radios. ELECTRONIC PAGERS Electronic pagers are radio activated devises through which a user is notified of another's attempt to contact the carrier of the portable paging unit. These are in wide use among persons who are away from their homes or offices—or, more precisely, away from 10 telephones or two-way radios—yet still need to be reachable by others. Pagers take on one of three basic forms: "tone only," "display" and "tone and voice pagers." The "tone only" device emits a "beep" or other signal to inform the user that a message is wait­ ing, and where that message can be retrieved by the user's making a phone call to a predetermined number (usually an office or an­ swering service). "Display" pagers are equipped with screens that can display visual messages, usually the telephone number of the person seeking to reach the person being paged. The party seeking to make contact with the user is instructed to provide a message, usually by pushing the buttons of a touch-tone telephone; this mes­ sage is stored by the paging company's computer until it can be transmitted to the user's pager, where the message can then be read directly by the user, obviating the need for the user to make a telephone call to retrieve the message. The most sophisticated type of pager is the "tone and voice" model. It can receive a spoken message that the paging company's computer has taken from the party seeking to contact the unit's user. After the beep tone is made, the device "repeats" the recorded message. This requires that a radio signal containing voice communications be sent from the paging company's base to the mobile unit. PEN REGISTERS/TRAP AND TRACE DEVICES Pen registers are devices that record the telephone numbers to which calls have been placed from a particular telephone. These capture no part of an actual telephone conversation, but merely the electronic switching signals that connect two telephones. The same holds true for trap and trace devices, which record the num­ bers of telephones from which calls have been placed to a particu­ lar telephone. ELECTRONIC TRACKING DEVICES (TRANSPONDERS) These are one-way radio communication devices that emit a signal on a specific radio frequency. This signal can be received by special tracking equipment, and allows the user to trace the geo­ graphical location of the transponder. Such "homing" devices are used by law enforcement personnel to keep track of the physical whereabouts of the sending unit, which might be placed in an auto­ mobile, on a person, or in some other item. REMOTE COMPUTER SERVICES In the age of rapid computerization, a basic choice has faced the users of computer technology. That is, whether to process data in­ house on the user's own computer or on someone else's equipment. Over the years, remote computer service companies have developed to provide sophisticated and convenient computing services to sub­ scribers and customers from remote facilities. Today businesses of all sizes—hospitals, banks and many others—use remote computing services for computer processing. This processing can be done with the customer or subscriber using the facilities of the remote com­ puting service in essentially a time-sharing arrangement, or it can be accomplished by the service provider on the basis of information 11 supplied by the subscriber or customer. Data is most often trans­ mitted between these services and their customers by means of electronic communications. V. SECTION-BY-SECTION ANALYSIS Section 1 provides that the short title of the bill is the "Electron­ ic Communications Privacy Act of 1986." TITLE I—INTERCEPTION OF COMMUNICATIONS AND RELATED MATTERS Under current law, the interception of wire and oral communica­ tions are governed by chapter 119 of title 18 (18 U.S.C. 2510 et seq.). Title I of the Electronic Communications Privacy Act expands chapter 119 to take into account modern advances in electronic telecommunications and computer technology. Section 101—Federal penalties for the interception of communica­ tions Definitions for terms used in chapter 119 and new chapter 121 of title 18 are set out in section 101 of the bill. This section also de­ scribes conduct which is not unlawful under this Act and modifies the penalties set out in existing section 2511 of title 18. It provides that the remedies in chapter 119 are the exclusive statutory reme­ dies for violations of this chapter. Technical amendments to chap­ ter 119 are also included in Section 101 of the bill. Subsection 101(a)—Definitions Subsection 101(a) of the Electronic Communications Privacy Act sets out the definitions and amendments to definitions used in chapter 119 and new chapter 121 of title 18. Paragraph 101(a)(1) amends the definition of the term "wire communication in subsec­ tion 2510(1) of title 18. Subparagraph (A) amends that definition to include aural trans­ fers. As defined in proposed subsection 2510(18) of title 18, "aural transfers" are those which include the human voice at any point between and including the points of origin and reception. Subparagraph (B) specifies that the use of wire, cable or other similar connections for the transmission of communications in­ cludes the use of such connections in a switching station. This sub­ paragraph makes clear that cellular communications—whether they are between two cellular telephones or between a cellular telephone and a "land line" telephone—are included in the defini­ tion of "wire communications" and are covered by the statute. As noted below, the bill distinguishes between cordless and cellular telephones. Recognizing that since deregulation and the divestiture of AT&T, many different companies, not just common carriers, offer and use telephone and other communications services, subpargraph (C) de­ letes from the definition of "wire communication" the requirement that communications must be transmitted via common carrier to be covered by the federal wiretap statute. Subparagraph (D) specifies that wire, cable or similar connec­ tions furnished or operated by any person engaged in providing or operating such facilities for the transmission of "communications 12 affecting interstate or foreign commerce," are within the definition of a "wire communication. This language recognizes that private networks and intra-company communications systems are common today and brings them within the protection of the statute. Howev­ er, that language is not meant to suggest that the Electronic Com­ munications Privacy Act applies to interceptions made outside the territorial United States. Like the Omnibus Crime Control and Safe Streets Act of 1968 which it revises, the Electronic Communi­ cations Privacy Act regulates only those interceptions conducted within the territorial United States. The Senate Judiciary Committee's Subcommittee on Patents, Copyrights and Trademarks amended subparagraph (D) to specify that wire communications in storage like voice mail, remain wire communications, and are protected accordingly. The combined effect of subparagraphs (A) through (D) is to clari­ fy that the term "wire communication" means the transfer of a communication which includes the human voice at some point. The transfer must be made in whole or in part through the use of com­ munication transmission facilities by the aid of wire, cable, or other like connection, including fiber optics. The facilities may be furnished or operated by any person engaged in providing or oper­ ating such facilities for the transmission of interstate or foreign communications or he may provide or operate those facilities for the transmission of communications affecting interstate or foreign commerce. Thus, a wire communication encompasses the whole of a voice telephone transmission even if part of the transmission is carried by fiber optic cable or by radio—as in the case of cellular tele­ phones and long distance satellite or micowave facilities. The con­ version of a voice signal to digital form for purposes of transmis­ sion does not render the communication non-wife. The term "wire communication" includes existing telephone service, and digitized communications to the extent that they contain the human voice at the point of origin, reception, or some point in between. A pri­ vate telephone system established by a company whose activities affect interstate commerce, would also be covered. It should be noted that an improperly mechanical reading of the phrase "in whole or in part * * * by the aid of wire * * *" could sweep in virtually all voice communications made with the aid of any electronic equipment, inasmuch as virtually all such equip­ ment includes in its assembly some length of wire or the equiva­ lent. The quoted is intended to refer to wire that carries the com­ munication to a significant extent from the point of origin to the point of reception, even in the same building. It does not refer to wire that is found inside the terminal equipment at either end of the communication. Subparagraph (D) specifies that the term "wire communication" does not include the radio portion of a cordless telephone communi­ cation transmitted between the cordless handset and the base unit. Because communications made on some cordless telephones can be intercepted easily with readily available technologies, such as an AM radio, it would be inappropriate to make the interception of such a communication a criminal offense. The wire portion of a cordless communication remains fully covered, however. 13 Section 101(a)(2) of the Electronic Communications Privacy Act amends the definition of "oral communication" in current section 2510(2) of title 18 to exclude electronic communications. There have been cases involving radio communications in which the court having determined that the radio communication was not a wire communication then analyzes it in privacy terms to determine if it is an oral communication. The bill rejects that analysis by exclud­ ing electronic communications from the definition of oral commu­ nications. An oral communication is an utterance by a person under cir­ cumstances exhibiting an expectation that the communication is not subject to interception, under circumstances justifying such an expectation. In essence, an oral communication is one carried by sound waves, not by an electronic medium. Section 101(a)(3) of the Electronic Communications Privacy Act amends the definition of the term "intercept" in current section 2510(4) of title 18 to cover electronic communications. The defini­ tion of "intercept" under current law is retained with respect to wire and oral communications except that the term "or other" is inserted after "aural." This amendment clarifies that it is illegal to intercept the non-voice portion of a wire communication. For exam­ ple, it is illegal to intercept the data or digitized portion of a voice Communication. Subsection 101(a)(4) of the Electronic Communications Privacy Act amends existing section 2510(5) of title 18 to clarify that tele­ phone equipment provided by the user and connected to the facili­ ties of a service provider is not an "electronic, mechanical or other device," provided that it is used in the ordinary course of the user's business. The Committee notes that proposed section 2510's definition of an "electronic, mechanical or other device" includes any combina­ tion of parts designed or intended for use in converting those parts into such a device or apparatus and from which such a device or apparatus may be readily assembled. The Committee also notes that section 2512, as amended by the Electronic Communications Privacy Act, prohibits the manufacture, distribution, possession, and advertising only of devices primarily useful for surreptitious interception. Subsection 101(a)(5) of the Electronic Communications Privacy Act amends current section 2510(8) of title 18 to exclude from the definition of the term "contents," the identity of the parties or the existence of the communication. It thus distinguishes between the substance, purport or meaning of the communication and the exist­ ence of the communication or transactional records about it. The Supreme Court has clearly indicated that the use of pen reg­ isters does not violate either chapter 119 of title 18 or the fourth amendment. Subsection 101(a)(5) of this legislation makes that policy clear. It should be read in conjunction with Title III of the Electronic Communications Privacy Act which adds new chapter 206 on pen registers and trap and trace devices to title 18. Subsec­ tion 101(a)(5) of the bill does not affect the installation or use of pen registers under the Foreign Intelligence Surveillance Act (FISA), 50 U.S.C. 1801 et. seq. Similarly, the omission of a conform­ ing amendment to the definition of "contents" in section 705 of 14 title 47 is not intended to affect the current law under that section with respect to pen registers. The use of pen registers has been found not to violate section 705. See Hodge v. Mountains Tel. & Telegraph Co., 555 F.2d 254 (9th Cir. 1977). Subsection 101(a)(6) of the Electronic Communications Privacy Act adds to section 2510 of title 18 definitions for the terms "elec­ tronic communication," "electronic communications system," "elec­ tronic communication service," "readily accessible to the general public," "electronic storage," and "aural transfer." An "electronic communication" is defined in proposed subsection 2510(12) of title 18 as "any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or a photooptical system that affects foreign or interstate com­ merce." The following are explicitly excluded from the definition: (A) the radio portion of a cordless telephone communication trans­ mitted between the cordless phone handset and the base unit; (B) any wire or oral communication; (C) any communication made through a tone-only paging device; (D) any communication from a tracking device. As a general rule, a communication is an electronic communica­ tion protected by the federal wiretap law if it is not carried by sound waves and cannot fairly be characterized as containing the human voice. Communications consisting solely of data, for exam­ ple, and all communications transmitted only by radio are electron­ ic communications. This term also includes electronic mail, digi­ tized transmissions, and video teleconferences. Although radio com­ munications are within the scope of the Act, the provisions of the Electronic Communications Privacy Act directed specifically to radio do not affect the applicability of section 705 of the Communi­ cations Act of 1934, as amended, to actions by members of the public. Under proposed subsection 2510(13), the term "user" is defined as any person or entity who (A) uses an electronic communication service and (B) is duly authorized by the service provider to do so. An "electronic communication system" is defined in proposed subsection 2510(14). Such a system encompasses any wire, radio, electromagnetic, photooptical or photoelectronic facilities for the transmission of electronic communications as well as any computer facilities or related electronic equipment for the electronic storage of such communications. An "electronic communication service" is defined in proposed subsection 2510(15) of title 18 as a service which provides its users the ability to send or to receive wire or electronic communications. Such services can be provided through the same facilities. Existing telephone companies and electronic mail companies are providers of electronic communication services. Other services like remote computing services may also provide electronic communication services. Radio communications "readily accessible to the general public" are defined in proposed subsection 2510(16). Radio communications are considered readily accessible to the general public unless they fit into one of five specified categories. 15 As described below, subsection 101(b) of the Electronic Communi­ cations Privacy Act provides an exception to the general prohibi­ tions on interception for electronic communications which are con­ figured to be readily accessible to the general public. Thus, the radio communications specified in proposed subsection 2510(16) are afforded privacy protections under this legislation unless another exception applies. As specified in paragraph (A) of proposed subsection 2510(16), scrambled or encrypted radio communications are not readily ac­ cessible to the general public. The terms are used in their technical sense. To "encrypt" or to "scramble" means to convert the signal into unintelligible form by means intended to protect the contents of a communication from unintended recipients. Methods which merely change the form of a plaintext message, e.g., a device which converts an analog signal to a digital stream, does not provide "en­ cryption" within the meaning of this bill. Nor does the use of a word code, no matter how sophisticated, amount to scrambling or encryption. Examples of scrambling techniques which are currently available include the data encryption standard (DES). As specified in paragraph (B) radio communications transmitted through modulation techniques whose essential parameters have been withheld from the public in order to preserve the privacy of the communication are not readily accessible to the general public. This paragraph (B) refers to spread spectrum radio communica­ tions. Spread spectrum technology usually involves the transmis­ sion of a signal on different frequencies where the receiving station must possess the necessary algorythm in order to reassemble the signal. As specified in paragraph (C) of proposed subsection 2510(16) of title 18, radio communications carried on a subcarrier or other signal subsidiary to a radio transmission are protected by the Elec­ tronic Communications Privacy Act. This category includes, for ex­ ample, data and background music services carried on FM subcar­ riers. It also includes data carried on the Vertical Blanking Inter­ val (VBI) of a television signal. Radio communications transmitted over a system provided by a common carrier are not readily accessible to the general public with one exception. That exception is for tone-only paging systems. As a result of that exception, the interception of tone-only paging system transmissions will not be prohibited by this law. However, the unauthorized interception of a display paging system, which in­ vovles the transmission of alphanumeric characters over the radio, carried by a common carrier, is illegal. As specified in proposed paragraph (E), radio communications transmitted on frequencies allocated under parts 25 and 94 and subparts D, E, an F of part 74 of the FCC rules are protected by the Electronic Communications Privacy Act. These communications in­ clude satellite communications, auxiliary broadcast services and private microwave services, each of which routinely carries private business or personal communications. Two-way voice radio commu­ nications made on frequencies shared with services outside part 74 are expressly excluded from this category of protected communica­ tions. 16 The liability incurred under chapter 119 for the interception of the communications described in proposed paragraph 2510(16(E) may be limited. Section 101(b) of the Electronic Communications Privacy Act sets out exceptions from liability under this Act with respect to electronic communications and section 101(d) establishes the penalty structure for violations of this Act. The term "electronic storage" is defined in proposed subsection 2510(17) of title 18. Electronic storage means (A) the temporary, in­ termediate storage of a wire or electronic communication inciden­ tal to its transmission as well as (B) the storage of such communi­ cation by an electronic communications service for backup protec­ tion. The term covers storage within the random access memory of a computer as well as storage in any other form including storage of magnetic tapes, disks or other media. Thus, for example, section 2701's prohibitions against unauthorized access to wire or electron­ ic communications while they are in electronic storage would pro­ hibit unauthorized access to such a communication while it is stored on magnetic tape or disk. The section 2701 prohibitions simi­ larly would apply to information held on magnetic tape or disk pursuant to an agreement to provide remote computing services. The last new definition in subsection 101(a)(6) of the Electronic Communications Privacy Act is the definition of an "aural trans­ fer" in proposed subsection 2510(18). An aural transfer means any transfer containing the human voice at any point between and in­ cluding the points of origin and reception. Under this definition, voice messages transferred over a paging system are protected. It is intended that computer-generated or otherwise artificial voices are not included in this definition and thus will not be part of a "wire communication." They would, however, be part of an "electronic communication." It is important to recognize that a transaction may consist, in part, of both electronic communications and wire or oral communi­ cations as those terms are defined in section 2510 of title 18, as amended by the Electronic Communications Privacy Act. Accord­ ingly, different aspects of the same communication might be char­ acterized differently. For example, the transmission of data over the telephone is an electronic communication. If the parties use the line to speak to one another between data transmissions, those communications would be wire communications. At the same time, for a person overhearing one end of the telephone conversation by listening in on the oral utterances of one of the parties, those utter­ ances are oral communications. Although this bill does not address questions of the application of title III standards to video surveillance and only deals with the interception of closed circuit television communications to a limited extent, closed circuit television communications do provide another example of the importance of, and the interrelationship between, the definitions contained in this legislation. If a person or entity transmits a closed circuit television picture of a meeting using wires, microwaves or another method of transmission, the trans­ mission itself would be an electronic communication. Interception of the picture at any point without either consent or a court order would be a violation of the statute. By contrast, if law enforcement officials were to install their own cameras and create their own 17 closed circuit television picture of a meeting, the capturing of the video images would not be an interception under the statute be­ cause there would be no interception of the contents of an electron­ ic communication. Intercepting the audio portion of the meeting would be an interception of an oral communication, and the statute would apply to that portion. Section 101(b)—Exceptions with respect to electronic communica­ tions Subsection 2511(1) of title 18 of the United States Code sets out prohibitions against the interception, disclosure and use of wire or oral communications. Subsection 2511(2) specifies conduct which is not unlawful under chapter 119 of title 18. Subsection 101(b) of the Electronic Communications Privacy Act amends Subsection 2511(2). Paragraph 101(b), consistent with other provisions of this legislation, deletes references to common carriers. It thus clarifies that any service provider who discloses the exist­ ence of an interception or surveillance or the device used to accom­ plish the interception or surveillance would be liable for civil dam­ ages under Section 2520 of title 18. Paragraph 101(b)(2) of the Electronic Communications Privacy Act amends section 2511(2)(d) of title 18 by striking out "or for the purpose of committing any other injurious act". Under current Federal law it is permissible for one party to consent to the inter­ ception of a conversation unless that interception is for illegal, tor­ tious or other injurious purposes such as blackmail. In numerous court cases the term "other injurious purposes" has been miscon­ strued. Most troubling of these cases have been attempts by parties to chill the exercise of first amendment rights through the use of civil remedies under this chapter. For example, in Boddie v. Ameri­ can Broadcasting Co., 731 F.2d 333 (6th Cir. 1984), the plaintiff, whose conversations were recorded by a journalist, sued. Despite the consent of the reporter who was a party to the conversation, the plaintiff claimed that the recording of the conversation was il­ legal because it was done for an improper purpose, to embarrass her. While the appeals court decision in Boddie merely sent the case back for further factual development, it is clear from the facts of the case that the term "improper purpose" is overly broad and vague. The court's opinion suggests that if the network intended to cause "insult and injury" to plaintiff Boddie, she might be entitled to recover. This interpretation of the statute places a stumbling block in the path of even the most scrupulous journalist. Many news stories have been brought to light by recording a conversation with the consent of ony one of the parties involved—often the jour­ nalist himself. Many news stories are embarrassing to someone. The present wording of section 2511(2)(d) not only provides such a person with a right to bring suit, but it also makes the actions of the journalist a potential criminal offense under section 2511, even if the interception was made in the ordinary course of responsible news-gathering activities and not for the purpose of committing a criminal act or a tort. Such a threat is inconsistent with the guar­ antees of the first amendment. Inasmuch as chapter 119 as amend­ ed by the Electronic Communications Privacy Act continues to pro­ hibit interceptions made for the purpose of committing either a S.Rept. 99-541-----2 18 crime or a tort (including defamation), the public will be afforded ample portection against improper or unscrupulous interception. Subsection 101(b)(3) of the Electronic Communications Privacy Act amends section 2511(2)(f) of title 18 to clarify that nothing in chapter 119 as amended or in proposed chapter 121 affects existing legal authority for U.S. Government foreign intelligence activities involving foreign electronic communications systems. The provision neither enhances nor diminishes existing authority for such activi­ ties; it simply preserves the status quo. It does not provide author­ ity for the conduct of any intelligence activity. Further the Senate expects that the practice of providing to the House and Senate Intelligence Committees proposed changes in rel­ evant executive branch procedures and regulations governing the conduct of intelligence activities, including those involving elec­ tronic surveillance, physical searches, and the minimization of in­ formation collected concerning U.S. persons will be continued. As in the past, the Senate expects that any relevant changes in these procedures and regulations will be provided to the Senate and House Intelligence Committees prior to their taking effect. Finally, since Congress last addressed the issue of privacy com­ munications in a comprehensive fashion, the technologies of com­ munication and interception have changed dramatically, and are expected to continue to do so. These factors have raised serious issues about the protection of the privacy interests of U.S. citizens, which are of great concern to the Senate and to the American people. For this reason, the Senate wishes to emphasize the obliga­ tion of the heads of intelligence agencies to continue to keep the Select Committee on Intelligence fully and currently informed of all intelligence activities pursuant to title V of the National Securi­ ty Act of 1947. Subsection 101(b)(4) of the Electronic Communications Privacy Act amends section 2511(2)(g) of title 18 of the United States Code. It sets out new exemptions from criminal liability applicable to the technologies which this legislation adds to the privacy protections of the federal wiretap law. Proposed section 2511(2)(g) provides that it shall not be unlawful under chapters 119 or 121 of title 18 for any person to engage in the conduct described in its five subpara­ graphs. Under proposed section 2311(2)(g)(i), it is permissible to intercept electronic communications made through an electronic communica­ tion system configured so that the conmmunication is "readily ac­ cessible to the general public." That term is defined with respect to radio communications in proposed section 210(16) of title 18. The term "configure" is intended to establish an objective standard of design configuration for determining whether a system receives privacy protection. Under this provision, it would not be unlawful to intercept subcarrier and UBI communications that are transmitted for the use of the general public. Such "public" communications would include the stereo subcarrier used in FM broadcasting or data carried on the VBI to provide closed-captioning of TV programming for the hearing-impaired. Under proposed section 2511(g)(ii) it is permissible to intercept any radio communication which is transmitted (I) by any station 19 for the use of the general public, or that relate to ships, aircraft, vehicles or persons in distress; (II) by any government, law enforce­ ment, civil defense, private land mobile or public safety communi­ cations system (including police and fire), that is readily accessible to the general public; (III) by a station operating on an authorized frequency within the bands allocated to amateur, citizens band or, general mobile radio services; or (IV) by any marine or aeronauti­ cal communications system. Traditionally, these radio communications have been free from prohibitions on mere interception. Amateur radio communications, including those utilizing telephone interconnect or amateur radio computer linked message systems are certainly not those to which this legislation is aimed. All amateur radio communications con­ ducted on radio frequencies allocated to the Amateur Radio Serv­ ices are exempt from this bill's prohibitions against the intercep­ tion of electronic communications. Radio services readily accesible to the general public are exempt from this act's prohibitions against interception by the generic ex­ ception contained in proposed paragraph 2511(2)(g)(i). Proposed section 1511(2)(g)(iii) addresses conduct which is either prohibited or permitted by the Communications Act of 1934, as amended. Under clause (I) of subparagraph (iii) it is not unlawful under chapter 119 or 121 of title 18 for any person to engage in conduct prohibited by section 633 of the Communications Act of 1934 relating to cable piracy. If an individual violates the criminal prohibitions in section 633 of the Communications Act, he cannot also be charged under chapters 119 or 121 of title 18. Clause (II) exempts from the prohibitions on interception con­ tained in this Act conduct which is excepted from section 705(a) of the Communications Act by virtue of section 705(b) of that Act. Thus, if conduct is permitted under section 705(b) of the Communi­ cations Act, engaging in that conduct would not be a crime under chapters 119 or 121 of title 18, as amended by the Electronic Com­ munications Privacy Act. Determination of whether conduct is per­ mitted under section 705(b) must, of course, be the result of an ex­ amination of the statute, relevant legislative history, existing court interpretations and constructions given the statute by appropriate federal regulatory entities. Proposed section 2511(2)(g)(iv) of title 18 exempts from the crimi­ nal prohibition contained in chapters 119 and 121 of that title, the interception of any wire or electronic communication the transmis­ sion of which is causing harmful interference to any lawfully oper­ ating station, to the extent necessary to identify the source of such interference. Finally, proposed section 2511(2)(g)(v) exempts interceptions of radio communication by other users of the same frequency when such communication is made through a system that utilizes fre­ quencies monitored by individuals engaged in the provision or use of such a system. This exemption clarifies that it is not unlawful for users of the same frequency, who must listen to be sure a chan­ nel is clear before using it, to do so. The exception applies to users of common and non-common carrier systems, but does not apply if the communication is scrambled or encrypted. 20 Subsection 101(b)(4) of the Electronic Communications Privacy Act amends subsection 2511(2) of title 18 to add a new paragraph (h) to that subsection. Proposed subparagraph (i) of paragraph (h) clarifies that the use of pen registers and trap and trace devices are not regulated by chapter 119 of title 18. The use of those de­ vices will be regulated by new chapter 206 of title 18 as amended by the Electronic Communications Privacy Act. Subparagraph (ii) of paragraph (h) states that no violation of this chapter occurs if a provider of wire or electronic communication service records the fact that a communication was initiated or com­ pleted in order to protect such provider, another provider furnish­ ing service toward the completion of the wire or electronic commu­ nication or a user of that service, from fraudulent, unlawful or abusive use of such a service. This provision permits the electronic and wire communication providers to protect themselves and their customers. Subsection 101(c)—Technical and conforming amendments Subsection (c) sets out technical and conforming amendments to chapter 119 of title 18. Paragraph (c)(1) adds "electronic communi­ cation" in appropriate places throughout the chapter. Paragraph (c)(2) amends the heading of the chapter. Paragraph (c)(3) amends the table of chapters to add electronic communications to the table. Paragraphs (4), (5), (6), (7), and (8) of subsection 101(c) of the Elec­ tronic Communications Privacy Act make appropriate technical amendments to delete the term "common carrier" and substitute in its place "provider of wire or electronic communication." Section 2511(2)(a)(i), as amended, specifies that it is not unlawful for the employees of providers of wire or electronic communication services to intercept, disclose or use customer communications in the normal course of employment while engaged in any activity which is a necessary incident to the rendition of the service or to the protection of the rights or property of the provider, except that a provider of wire communication service to the public shall not utilize service observing or random monitoring except for mechani­ cal or service quality checks. In applying the second clause only to wire communications, this provision reflects an important technical distinction between elec­ tronic communications and traditional voice telephone service. The provider of electronic communications services may have to moni­ tor a stream of transmissions in order to properly route, terminate, and otherwise manage the individual messages they contain. These monitoring functions, which may be necessary to the provision of an electronic communication service, do not involve humans listen­ ing in on voice conversations. Accordingly, they are not prohibited. In contrast, the traditional limits on service "observing" and random "monitoring" do refer to human aural interceptions and are retained with respect to voice or "wire" communications. Subsection 101(d)—Penalties modification Subsection 101(d) of the Electronic Communications Privacy Act modifies the general penalty structure for violations of this chap­ ter. It sets out proposed subsections (4) and (5) of section 2511 of title 18. Subsection (4) sets out the criminal penalties for violations 21 of subsection 2511(1). Subsection (5) outlines the injunctive relief available to the federal government in the case of specified conduct related to private satellite video communications that are not scrambled or encrypted and to communications transmitted on fre­ quencies allocated under subpart D of part 74 of the FCC rules that are not scrambled or encrypted. The general rule as set out in proposed paragraph 2511(4)(a) is that a violation is punishable as a 5-year felony. Unless one of the exceptions in proposed subsection 2511(4)(b) or subsection 2511(5) applies, a person violating section 2511(1) will be liable for a fine under this chapter, imprisonment up to 5 years, or both. The fines under the chapter are set by section 3623 of title 18. That section provides for a different maximum fine level for felonies or misde­ meanors resulting in death. Individual defendants can be fined up to $250,000 and organizations can be fined up to $500,000. As stated in proposed paragraph 2511(14)(b), the first exception to the general rule that violations are 5-year felonies, applies to un­ scrambled, unencrypted radio communications provided that the conduct is a first offense and is not for a tortious or illegal purpose or purposes of direct or indirect commerical advantage or private financial gain. If the radio communication is scrambled or encrypt­ ed, if the person violating the statute has been found guilty of a prior offense, or if his conduct was for one of the enumerated bad purposes, the conduct remains punishable as a 5-year felony. As stated in subparagraph (ii) of proposed paragraph 2511(4)(b), for first offenders whose conduct was not for one of the enumerated bad purposes, if the communication is not scrambled or encrypted and it is the radio portion of a cellular telephone, public land mobile radio service or paging service communication, then the vio­ lator will be subject to a $500 criminal fine. Otherwise, as stated in clause (i) of proposed paragraph 2511(4)(b), the conduct is punish­ able as a one-year misdemeanor with fines of up to $100,000, 18 U.S.C. 3623, unless the conduct is that described in subsection (5). It should be noted that the exceptions set out in proposed para­ graph 2511(4)(b) apply only to radio communications. The intercep­ tion of "wire" communications remain punishable as five-year felo­ nies. The interception of the wire portion of a cellular telephone call, for example, is a five-year felony. Proposed paragraph 2511(4)(c) decriminalizes certain conduct unless it is for the purposes of direct or indirect commercial advan­ tage or private financial gain. The terms "direct or indirect com­ mercial advantage or private financial gain" are intended to have the same meaning as those terms have when they are used in 47 U.S.C. 705(b). This exception from the criminal provisions of the Electronic Communications Privacy Act applies to the interception of an un­ encrypted, unscrambled satellite transmission that is transmitted (i) to a broadcasting station for purposes of retransmission to the general public; or (ii) as an audio subcarrier intended for redistri­ bution to facilities open to the public, but not including data trans­ missions or telephone calls. The conduct described in subpara­ graphs (i) and (ii) is not an offense under this chapter and is not subject to civil liability under this chapter. 22 Subparagraph (i) decriminalizes the interception of "network feeds" under title 18. Such conduct will be governed exclusively by section 705 of the Communications Act (47 U.S.C. 705). Subparagraph (ii) decriminalizes the interception of material transmitted as an audio subcarrier provided that the information is intended for redistribution to facilities open to the public. Audio subcarriers intended for redistribution to facilities open to the public include those for redistribution by broadcast stations, cable TV systems and like facilities. They also include those for redistri­ bution to buildings open to the public, and thus, it would not be unlawful to intercept music transmitted via an audio subcarrier if it is intended for redistribution to buildings like hospitals and office buildings which pump music into their lobbies and other public areas. Subparagraph (ii) does not apply to data transmissions or tele­ phone calls. The interception of those transmissions, like the inter­ ception of transmissions made for the enumerated bad purposes, would be punishable as 5-year felonies. The private viewing of satellite cable programming, network feeds and certain audio subcarriers will continue to be governed ex­ clusively by section 705 of the Communications Act of 1934, as amended, and not by chapter 119 of title 18 of the United States Code. A new government action for injunctive relief is set out in pro­ posed subsection 2511(5) of title 18. This new subsection was cre­ ated to underscore that this public injunctive is distinct from the criminal penalties set out in subsection (4). Its exceptions apply only if the communication is not scrambled or encrypted and the conduct is not for one of the enumerated bad purposes. Clause (A) refers to the private or home viewing of a pri­ vate satellite video communication. With regard to the home view­ ing of private satellite video communications, for purposes of this provision and proposed section 2520,2 the Committee views as scrambling that type of multiplexing in which the audio and video portions of a communication are split, requiring special equipment to reassemble the whole communication (generally a vid­ eoteleconference) before it can be received in intelligible form. Clause (B) refers to radio communications transmitted on frequen­ cies allocated under subpart D of part 74 of the FCC rules. Under proposed clause 2511(5)(a)(ii)(A), if the violation is a first offense and the person has not previously been found liable in a private civil action under section 2520 of title 18, the government may sue for appropriate injunctive relief. Under proposed clause (B) if the violation is a second or subsequent offense or the person has previously been found liable under section 2520, he shall be subject to a mandatory $500 civil fine. Proposed paragraph (b) of subsection 2511(5) clarifies that the court may use any means within its existing authority, including civil or criminal contempt, to enforce an injunction issued to an in­ dividual under this subsection. Paragraph (b) also requires that the court impose a civil fine of $500 or more for each violation of such 2 Multiplexing refers to the transmission of communications by means of modulation tech­ niques whose essential parameters have been withheld from the public. 23 an injunction. The term "violation" in this context refers to each viewing of a private video communication and to each reception of a part 74 D radio communication. Subsection 101(e)— Exclusivity of remedies with respect to electronic communications Subsection 101(e) of the Electronic Communications Privacy Act amends subsection 2518(10) of title 18 to add a paragraph (c) which provides that with respect to the interception of electronic commu­ nications, the remedies and sanctions described in this chapter are the only judicial remedies and sanctions available for nonconstitu­ tional violations of this chapter involving such communications. In the event that there is a violation of law of a constitutional magni­ tude, the court involved in a subsequent trial will apply the exist­ ing Constitutional law with respect to the exclusionary rule. The purpose of this provision is to underscore that, as a result of discussions with the Justice Department, the Electronic Communi­ cations Privacy Act does not apply the statutory exclusionary rule contained in title III of the Omnibus Crime Control and Safe Streets Act of 1968 to the interception of electronic communica­ : tions. Similarly, the Electronic Communications Privacy Act does not amend the Communications Act of 1934. Conduct in violation of that statute, will continue to be governed by that statute. Subsection 101(f)—State of mind Subsection 101(f) of the Electronic Communications Privacy Act changes the state of mind required to violate section 2511 or sec­ tion 2512 of title 18 of the United States Code from "willful" to "in­ tentional." The purpose of this amendment is to underscore that inadvertent interceptions are not crimes under the Electronic Com­ ; munications Privacy Act. . As used in the Electronic Communications Privacy Act, the term "intentional" is narrower than the dictionary definition of "inten­ tional." "Intentional" means more than that one voluntarily en­ gaged in conduct or caused a result. Such conduct or the causing of the result must have been the person's conscious objective. An "in­ tentional" state of mind means that one's state of mind is inten­ tional as to one's conduct or the result of one's conduct if such con­ duct or result is one's conscious objective. The intentional state of mind is applicable only to conduct and results. Since one has no control over the existence of circumstances, one cannot "intend" them. As indicated in the Judiciary Committee's report to accompany the Criminal Code Reform Act of 1981 (S. 1630): The highest degree of culpability is present if a person engages in conduct (or causes a result) intentionally, that is, "if it is his conscious objective or desire to engage in the conduct (or cause the result)." A common means to de­ scribe conduct as intentional, or to say that one causes the result intentionally, is to state that it is done or accom­ plished "on purpose." 24 The term "intentional" is not meant to connote the ex­ istence of a motive. Liability for intentionally engaging in prohibited conduct is not dependent on an assessment of the merit of the motive that led the person to disregard the law. (Emphasis in original; citation omitted.) Report of the Committee on the Judiciary, United States Senate, to accompany S. 1630, Criminal Code Reform Act of 1981, Report 97-307 at 67. The Committee went on to point out that people who steal be­ cause they like to or to get more money or to feed the poor, like Robin Hood, all commit the same crime. Id. The word "intentional" describes the mental attitude associated with an act that is being done on purpose. It does not suggest that the act was committed for a particular evil purpose. At this point, it is important to note that the crime of intercep­ tion under the Electronic Communications Privacy Act consists of the intentional acquisition of the contents of a wire, electronic or oral, communication through the use of any electronic, mechanical, or other device. Some groups which engage in testing were con­ cerned that the picking up of the contents of a communication inci­ dent to those tests might be considered a crime under title III as amended by the Electronic Communications Privacy Act. They then sought exemptions from liability under proposed para­ graph 2511(2)(g). The Subcommittee on Patents, Copyrights and Trademarks rejected this approach solely because it feared applica­ tion of the principle of statutory construction of "expressio unius, est exclusio alterius" would encourage courts to treat similar tests as unlawful. For example, since the early 1960s, motor vehicle manufacturers and others have been committed to voluntary actions to make their products "good citizens" in the electromagnetic environment. That commitment has fostered the development of test procedures and programs resulting in systems to help ensure that the electromag­ netic energy radiated from equipment such as motor vehicles, agri­ cultural and construction machinery, engines for transportation, marine, industrial and consumer applications, electronic equipment and components of the foregoing do not interfere with signals car­ rying video, voice or data transmissions. Personal, business and en­ tertainment radio, television, digital data communications, and radio navigation services are examples of services benefited by such test procedures and programs. The equipment for measuring the test procedures and technical specifications by which electromagnetic radiation from motor vehi­ cles typically includes an antenna for picking up electromagnetic energy radiated from the vehicle, and a radio receiver for scanning the frequency range from 20 or 30 to 1,000 MHz to determine the field strength of all emissions in that range which the antenna picks up. The antenna picks up not only the electromagnetic emissions from the equipment being tested, but also any other signals present at the antenna location. Indeed, to be able to quantify the strength of the emissions to be measured, even though additional signals are present at the frequency on which the measurement is being made, 25 the procedures and programs specify initial measurement of these additional signals. Of course, any radio service operating in the scanned frequency range will be picked up and its field strength measured during both the baseline and the vehicle tests. Although occasionally a speaker will be used to verify that a radio service is indeed producing a high field strength reading, in virtually all of the testing there is not attempt to ascertain the substance, purport or meaning of the signal. Similar equipment and procedures are used to measure electro­ magnetic radiation emitted by computing devices. In addition, the operation of electronic equipment, and devices equipped with elec­ tronic controls, may be susceptible to disruption by electromagnetic radiation impinging on such equipment or devices. For example, the operation of electronic engine controls, electronic speed con­ trols, and anti-lock brake systems employing electronic controls, and even the operation of heart pacemakers, are potentially sus­ ceptible to disruption by strong electromagnetic radiation. To help design equipment and devices which are resistant to such disruption, such equipment and devices customarily are irra­ diated during their development with electromagnetic engery at a variety of radio frequencies, and the effects, if any, of such irradia­ tion on their operation are observed. To avoid interference with on­ going radio services, it is essential that the test engineer, before turning on the radio transmitter used for such irradiation; listen on the transmitter frequency to ascertain that there is no other signal on that frequency with which the test transmission might interfere. In addition, both the EPA and the FCC have pointed out that Federal agencies and state and local governments are currently ad­ dressing the problem of potentially excessive public exposure to radio frequency (RF) radiation emitted by various kinds of equip­ ment. Testing solely to determine the source of, or to measure, RF emissions in order to comply with or to establish or enforce appli­ cable federal, state or local standards limiting human exposure to RF radiation is not prohibited by the Electronic Communications Privacy Act. This legislation was never intended to outlaw such testing, con­ ducted in the ordinary course of the tester's business or regulatory activities. However, if one who obtained information in the course of such a test went beyond the procedures of the test to use any information obtained through the testing process, he could violate this statute. Section 102—Requirements for certain disclosures Section 102 of this legislation amends section 2511 of title 18 of the United States Code to add a new criminal prohibition on disclo­ sure of electronic communications. It adds a new subsection (3) to section 2511. This amendment includes the term "to the public." The Government is included as part of the public. Thus, FTS serv­ ices are covered. The language in paragraph (a) of proposed subsection 2511(3) of title 18 provides that a person or entity providing an electronic communication service to the public shall not intentionally divulge the contents of any communication (other than one to such person 26 or entity, or an agent thereof) while in transmission on that service to any person or entity other than an addressee or intended recipi­ ent of such communication or the agent of such addressee or in­ tended recipient. Proposed paragraph (b) of new subsection 2511(3) of title 18 sets out exceptions to paragraph (a)'s criminal prohibition on disclosure. Providers of electronic communication services to the public are permitted to divulge the contents of any such communication (i) as otherwise authorized in section 2511(2)(a) or 2517 or title 18; (ii) with the lawful consent of the originator or any addressee or in­ tended recipient; (iii) to any person employed or authorized, or whose facilities are used, to forward such communication to its des­ tination, or (iv) which were inadvertently obtained by the service provider and which appear to pertain to the commission of a crime if such divulgence is made to a law enforcement agency. The exceptions to the divulgence bar are relatively straightfor­ ward. Providers should be permitted to divulge under other provi­ sions of the chapter. To be consistent with the one party consent exception found in the chapter, a similar exception is appropriate here. It is also logical to provide an exception with respect to ac­ tivities necessary and intrinsic to the communication activity. Therefore, it is necessary to exempt communication intermediaries. Finally, if an electronic communications service provider inad­ vertently obtains the contents of a communication during transmis­ sion and the communication appears to relate to the commission of a crime, divulgence is permitted when such divulgence is made to a law enforcement agency. If the provider purposefully sets out to monitor conversations to ascertain whether criminal activity has occurred, this exception would not apply. Section 103—Recovery of civil damages Section 103 of the Electronic Communications Privacy Act amends existing section 2520 of title 18 of the United States Code to incorporate violations involving interception, disclosure or inten­ tional use of wire, oral, or electronic communications. Proposed subsection 2520(a) of title 18 authorizes the commence­ ment of a civil suit. There is one exception. A civil action will not lie where the requirements of section 2511(2)(a)(ii) of title 18 are met. With regard to that exception, the Committee intends that the following procedural standards will apply: (1) The complaint must allege that a wire or electronic com­ munications service provider (or one of its employees): (a) dis­ closed the existence of a wiretap; (b) acted without a facially valid court order or certification; (c) acted beyond the scope of a court order or certification or (d) acted on bad faith. Acting in bad faith would include failing to read the order or collu­ sion. If the complaint fails to make any of these allegations, the defendant can move to dismiss the complaint for failure to state a claim upon which relief can be granted. (2) If during the course of pretrial discovery the plaintiffs claim proves baseless, the defendant can move for summary judgment. (3) If the court denies the summary judgment motion, the case goes to trial. At the close of the plaintiffs case, the de­ 27 fendant again can move for dismissal. If that motion is denied, the defendant then has the opportunity to present to the jury its section 2520 good faith defense. The plaintiff may bring a civil action under section 2520 whether or not the defendant has been subject to a criminal prosecution for the acts complained of, but in the absence of such prosecution and conviction, it is the plaintiffs burden to establish that the require­ ments of this section are met. Proposed subsection 2520(b) indicates that appropriate relief in a civil action can include: (1) preliminary and other equitable or de­ claratory relief as may be appropriate; (2) damages under subsec­ tion (c) and punitive damages in appropriate cases; and (3) a rea­ sonable attorney's fee and other reasonable litigation costs. Proposed subsection 2520(c) provides a method for the computa­ tion of damages. The general rule is set out in paragraph (2) of sub­ section (c). The court may assess damages consisting of whichever is the greater of (A) the sum of the plaintiffs actual damages and any profits the violator made as a result of the violation; or (B) statutory damages of whichever is the greater of $100 a day or $10,000. An exception from that general rule is set out in proposed para­ graph (1) of subsection 2520(c). This exception applies if the viola­ tion consists of the private or home viewing of an unencrypted or unscrambled private satellite video communication or if the com­ munication is an unencrypted or unscrambled radio communica­ tion that is transmitted on frequencies allocated under subpart D of part 74 of the FCC rules, and the conduct is not for one of the enumerated bad purposes. Under subparagraph (A), if the violator has not previously been enjoined in a government action under subsection 2511(5) and has not been found liable in a prior civil action, the court shall assess the greater of the sum of the plaintiffs actual damages or statuto­ ry damages of $50 to $500. Under subparagraph (B), if the violator is a second offender (one who has been found liable in a prior pri­ vate civil action under section 2520 or one who has been enjoined in a government suit), the court shall assess the greater of the sum of the plaintiffs actual damages or statutory damages of $100 to $1000. Third and subsequent offenders are subject to the bill's full civil penalties as described in the general rule set out in proposed paragraph 2520(c)(2). Subsection 2520(d) provides a good faith defense for those who comply with court orders or warrants, grand jury subpoenas, legis­ lative or statutory authorizations, or a request of an investigative or law enforcement officer under section 2518(7) of title 17 concern­ ing emergency situations. As used in this subsection, the term "good faith" includes the receipt of a facially valid court order. The fact that the provider of a wire or electronic communication service received a facially valid court order means that the provider would be entitled to a dismissal of a civil action upon a showing that he acted within the scope of that order. Proposed subsection 2520(e) sets out the statute of limitations for actions brought under this section. Actions may not be commenced more than 2 years after the date on which the claimant first has a reasonable opportunity to discover the violation. 28 Section 104—Certain approvals by justice department officials Section 104 of the Electronic Communications Privacy Act amends section 2516(1) of title 18 of the United States Code to add to the list of Federal officials who may make applications for court orders under chapter 119. Under this amendment, the list of offi­ cials who may be specially designated by the Attorney General to authorize applications will include any acting Assistant Attorney General, or any Deputy Assistant Attorney General in the Crimi­ nal Division. The addition of an acting Assistant Attorney General is not meant to imply rejection in any other context of the wellestablished principle that an acting official ordinarily possesses all the legal powers of the official for whom he is acting, but to clarify the law under this statute. As indicated in proposed subsection 111(c) of the Electronic Co­ munications Privacy Act, this section 104 shall take effect on the date of enactment. Section 105—Addition of offenses to crimes for which interception is authorized Section 105 of the Electronic Communications Privacy Act amends existing section 2516 of title 18 to add to the list of felonies for which a wiretap or bugging order may be obtained under chap­ ter 119. It also adds a new subsection (3) to section 2516 which ad­ dresses applications and orders for interceptions of electronic com­ munications. ' Subsection 105(a)—Offenses for which wire and oral interceptions are authorized Subsection 105(a) of the legislation amends subsection 2516(1) of title 18 by adding to the list of predicate felonies for which an ap­ plication for a wiretapping or bugging order may be made. Those crimes are set out in the bill. Subsection 105(b)—Offenses for which interception of electronic com­ munication are authorized Subsection 105(b) of the Electronic Communications Privacy Act amends section 2516 to authorize the Government to apply for a court order authorizing or approving the interception of an elec­ tronic communication by an investigative or law enforcement offi­ cer when an interception may provide or has provided evidence of a Federal felony. Thus, for non-wire, non-oral electronic communi­ cations, a different and less restrictive list of crimes can be used to justify an application for interception. The Department of Justice has advised the Committee on the Ju­ diciary that for the three years which follow the date of enactment of this legislation, this authority will only be exercised pursuant to the approval of the same level of officials as those involved in the approval of applications for wire interceptions. In addition to this voluntary regulatory limitation, the Department of Justice has committed itself to submitting to the relevant congressional com­ mittees any proposed changes in these regulations at least 90 days in advance of any change. 29 Section 106—Applications, orders, and implementation of orders Section 106 of the Electronic Communications Privacy Act amends section 2518 of title 18 of the United States Code. This sec­ tion addresses the implementation of interception orders, reim­ bursement for providers who assist law enforcement agencies in carrying out an interception order and minimization requirements. Subsection 106(d) of the legislation permits law enforcement agen­ cies to request an order for a "roving tap" under certain limited circumstances. Telephone companies have, as a matter of practice, provided in­ formation and technical assistance to law enforcement officials in connection with lawfully authorized wiretaps. They have steadfast­ ly maintained, however, an important distinction between such technical assistance and any active participation in the wiretap itself. Section 2518(4) of title 18 is a codification of the cooperative working relationship that exists between telephone companies and law enforcement officials. This section anticipates that these gov­ ernment officials will, and should, seek the cooperation of tele­ phone companies in accomplishing telephone line interceptions. Nevertheless, telephone company customers have a reasonable expectation, traditionally enhanced by telephone company prac­ tices and policies, that their company will not become in effect, a branch of Government law enforcement. Accordingly, while techni­ cal assistance is provided and paid for, the Committee wishes to make clear that Section 2518(4) is not intended to authorize and should not be construed as authorizing, issuance of an order for land line telephone company assistance which either requires a company to actually accomplish or perform a wiretap or requires that law enforcement wiretap activity take place on land line tele­ phone company premises. The Committee understands that some cellular service providers may have cooperated with law enforcement officials to establish wiretap connections on the cellular service provider's premises. The Committee does not intend to alter this specific form of assist­ ance. The Committee understands that the practice followed with regard to land line telephones is that telephone company employ­ ees do not perform the wiretap itself, and that telephone company premises are not used for wiretap activity. This procedure is ac­ cepted by both company and law enforcement officials. The Com­ mittee does not expect any departure from current practice. To ensure that the practice does not change, absent a compelling need appropriately addressed to Congress, the Committee expects the Justice Department to include in its United States Attorneys Manual a statement that no enforcement agency or official shall attempt to compel any telephone company employee to perform any wiretap, or attempt to compel any such company to make its premises available for wiretap activity. Any proposed amendment to that language should be reported to the Committee well in ad­ vance of dissemination so that the Committee has sufficient oppor­ tunity to assess both the extent of which such proposed language comports with its view of the scope of section 2518(4) as expressed 30 above and the extent to which any amendment of section 2518(4) to permit a change in prevailing practice may be warranted by subse­ quent and compelling changes in technology or other circum­ stances. Subsection 106(a)—Place of authorized interception Subsection 106(a) of the Electronic Communications Privacy Act amends subsection 2518(3) of title 18. It provides, that in the case of a mobile interception device, a court can authorize an order withinits jurisdiction and outside its jurisdiction but within the United States. This provision applies to both a listening device installed in a vehicle and to a tap placed on a cellular or other telephone in­ strument installed in a vehicle. In most cases, courts will authorize the installation of a device and the device will be installed within the court's jurisdiction, but the suspect will subsequently move outside that jurisdiction. In cer­ tain cases, however, a device authorized for installation in an auto­ mobile may be authorized in one district and the vehicle might be moved to another district prior to installation. Subsection 106(a) of the bill permits installation in the district to which the vehicle has been moved. Nothing in this subsection affects the current law with regard to the use of such devices outside the United States. Subsection 106(b)—Reimbursement Subsection 106(b) of the Electronic Communications Privacy Act establishes that service providers that provide assistance t o the agency carrying out an interception order may be compensated for reasonable expenses incurred in providing such facilities or assist­ ance. This is designed to permit reimbursement at an amount ap­ propriate to the work required. In most cases, a flat or general rate will be appropriate, but this change in the existing law will permit flexibility by authorizing reimbursement at a higher level in un­ usual cases. Subsection 106(c)—Minimization This subsection makes two changes in section 2518(5) of title 18. Under existing law, no section 2518 interception order may extend longer than 30 days. Paragraph (1) of subsection 106(c) provides a rule for establishing when the 30 days to install a tap or a bug begins to run. Under this rule, the 30-day time period commences on the earlier of the day on which the officer first begins to con­ duct the interception, or 10 days after the order is entered. Paragraph (2) of this subsection of the Electronic Communica­ tions Privacy Act provides a special minimization rule for inter­ cepted communications that are in code or in a foreign language. If an expert in that foreign language or code is not reasonably avail­ able during that interception period, minimization may be accom­ plished as soon as practicable after the interception. In this regard, it is contemplated that the translator or decoder will listen to the tapes of an interception and make available to the investigators the minimized portions preserving the rest for possible court perus­ al later. 31 Paragraph (2) also provides that the monitoring of interceptions under this chapter may be conducted in whole or in part by Gov­ ernment personnel, or by individuals operating under contract with the Government, as long as such personnel are acting under the su­ pervision of an investigative or law enforcement officer authorized to conduct the interception. This change, which was sought by the Federal Bureau of Investigation, is designed to free field agents from the relatively routine activity of monitoring interceptions so that they can engage in other law enforcement activities. The Committee recognizes that although the statutory standards for minimizing wire, oral, and electronic communications are the same under proposed subsection 2518(5), the technology used to either transmit or intercept an electronic message such as electron­ ic mail or a computer data transmission ordinarily will not make it possible to shut down the interception and taping or recording equipment simultaneously in order to minimize in the same manner as with a wire interception. It is impossible to "listen" to a computer and determine when to stop listening and minimize as it is possible to do in listening to a telephone conversation. For in­ stance, a page displayed on a screen during a computer transmis­ sion might have five paragraphs of which the second and third are relevant to the investigation and the others are not. The printing technology is such that the whole page including the irrelevant paragraphs, would have to be printed and read, before anything can be done about minimization. Thus, minimization for computer transmissions would require a somewhat different procedure than that used to minimize a tele­ phone call. Common sense would dictate, and it is the Committee's intention, that the minimization should be conducted by the initial law enforcement officials who review the transcript. Those officials would delete all non-relevant materials and disseminate to other officials only that information which is relevant to the investiga­ tion. Subsection 106(d)—Roving taps This subsection of the Electronic Communications Privacy Act adds a new subsection (11) to section 2518 of title 18. Under current law, the application and the order for a bug or tap must indicate the "particular" facility or place in which the interception is to occur. Subsection 106(d) of this legislation sets out new rules for the specificity required in the description of the place where the interceptions of wire and oral communications are to occur. The Committee finds such a provision necessary to cover circumstances under which law enforcement officials may not know, until shortly before the communication, which telephone line will be used by the person under surveillance. Telephone companies assist law enforce­ ment officials by providing cable and pair information, or leased line facilities when requested and feasible: this is the information which will be provided to law enforcement for roving taps. In the case of both oral and wire communications, only a limited list of Federal officials can apply for a special order seeking relief under this provision. With regard to "oral" communications, as set out in paragraph (a) of proposed subsection 2518(11), an application for a special 32 order must contain a full and complete statement as to why the or­ dinary specification requirements are not practical. The application must also identify the person committing the offense and whose communications are to be intercepted. The judge must find that the ordinary specification rules are not practical. Situations where ordinary specification rules would not be practical would include those where a suspect moves from room to room in a hotel to avoid a bug or where a suspect sets up a meeting with another suspect on a beach or a field. In such situations, the order would indicate au­ thority to follow the suspect and engage in the interception once the targeted conversation occurs. The rule with respect to "wire communications" is somewhat similar. As indicated in paragraph (b), the application must show that the person committing the offense has a purpose to thwart interception by changing facilities. In these cases, the court must find that the applicant has shown that such a purpose has been evidenced by the suspect. An example of a situation which would meet this test would be an alleged terrorist who went from phone booth to phone booth numerous times to avoid interception. A person whose telephone calls were intercepted who said that he or she was planning on moving from phone to phone or to pay phones to avoid detection also would have demonstrated that purpose. Proposed subsection 2518(12) of title 18 provides, with respect to both wire" and "oral" communications, that where the federal government has been successful in obtaining a relaxed specificity order, it cannot begin the interception until the facilities or place from which the communication is to be intercepted is ascertained by the person implementing the interception order. In other words, the actual interception could not begin until the suspect begins or evidences an intention to begin a conversation. It would be improper to use this expanded specificity order to tap a series of telephones, intercept all conversations over such phones and then minimize the conversations collected as a result. This pro­ vision puts the burden on the investigation agency to ascertain when the interception is to take place. The Subcommittee on Patents, Copyrights and Trademarks added a provision to proposed subsection 2518(12) allowing a service provider to move the court to modify or quash the order on the grounds that it cannot provide assistance in a timely or reasonable manner. As indicated, on notice to the Government, the court must decide such a motion expeditiously. This provision recognizes that a telephone company may not be able to respond instantaneously to an eleventh hour target line designation. It is designed to account for the practicalities of tele­ phone company response time, the number of phones that may be covered by the order, and the geographic area of the target lines that may be used by the person under surveillance. The Committee intends that the court look to several factors in considering whether to issue an order pursuant to proposed para­ graph (11)(b). The request for the order, and the order itself, should specify a reasonably limited geographic area, the number of phones (and phone numbers) if known, to be intercepted—so as not to render telephone company cooperation technically infeasible—and the time within which the interception is to be accomplished. The 33 failure to make such specifications in the request and/or in the order may be considered evidence of unreasonableness or untimeli­ ness by a court acting upon a telephone company motion made pur­ suant to proposed subsection (12). The Committee also expects law enforcement officials to continue the current practice of consulting with telephone company employ­ ees regarding the details of implementation (such as phone num­ bers and the specific locations of the telephones) in advance of the time any order for interception is sought. Finally, subsection 106(d) of the Electronic Communications Pri­ vacy Act provides that reports to the Administrative Office of the United States Courts under current section 2519 of title 18 on the kind of order or extension applied for include whether or not the order was one applied for under the relaxed specifity provisions of subsection 2518(11). Section 107—Intelligence activities Subsection (a) of this section of the bill clarifies that the amend­ ments made in subsection 102(b) of the bill do not provide any new authority for intelligence activities but only represent an exemp­ tion from the coverage of this chapter and chapter 121 of title 18 for activities that are otherwise lawful. Subsection (b) of this section of the bill exempts communications security monitoring activities of the Federal Government otherwise in accordance with U.S. law and undertaken in accordance with procedures approved by the Attorney General from coverage under chapter 119 or 121 of title 18. This subsection provides no new au­ thority for such activities. Specifically this subsection exempts from the coverage of this act the lawful activities of Federal agencies intended to intercept en­ crypted or other official communications for communications secu­ rity purposes. Communications security measures are protective measures taken to deny unauthorized persons information derived from U.S. Government telecommunications and to ensure the au­ thenticity of such communications. Communications security pro­ tection is the application of security measures to electrical systems generating, handling, processing, or using information the loss of which could adversely affect the national interest. Monitoring of security measures and security protection includes the intentional interception of executive branch official communications, including the communications of certain Government contractors, to provide technical material for analysis to determine the degree of security being provided to these transmissions. In addition, the interception, by authorized Federal agencies, of radio communications between foreign powers or agents as defined by the Foreign Intelligence Surveillance Act of 1978, and the accessing of electronic communi­ cations systems used exclusively by a foreign power as defined by the Foreign Intelligence Surveillance Act of 1978, are exempted from coverage of this act by this subsection of the bill. Section 108—Mobile tracking devices Subsection (a) of this section of the bill adds a new section to chapter 205 of title 18. This new code section provides that if a court is empowered to issue a warrant or other order for the instal- S.Rept. 99-541 3 34 lation of a mobile tracking device, and the tracking of the object or person on which the device is installed, such warrant remains valid even if the device is moved outside the jurisdiction of the court, even outside the jurisdiction of the United States, provided that the device was installed within the jurisdiction of the court, in con­ formity with the court order. This clarification does not effect cur­ rent legal standards for the issuance of such an order. A tracking device is defined as an electronic or mechanical device which permits the tracking of the movement of a person or object. Subsection (b) adds a new section 3117, "Mobile tracking devices" to the table of contents of chapter 205. Section 109—Warning subject of surveillance The section amends section 2232 of title 18 by adding at the end a new subsection. Proposed subsection 2232(c) adds two new of­ fenses to title 18. First, it makes it a criminal act punishable by a fine under this title and/or imprisonment for not more than 5 years to warn any person that a Federal agency or law enforce­ ment officer has been authorized or has sought authorization under chapter 119 of title 18 to intercept a wire, oral, or electronic com­ munication. Second, the proposed subsection provides the same penalties for warning anyone that a Federal officer has been au­ thorized or has applied for authorization to conduct electronic sur­ veillance under the provisions of the Foreign Intelligence Surveil­ lance Act. The elements of both new crimes are the same. It is required that the defendent have knowledge that the Federal law enforce­ ment or investigative officer has been authorized or has applied for an interception order. The defendent need not know that such an application was made under a particular chapter of federal law, rather, only that such application or order was made under federal law. The defendent must engage in conduct of giving notice of the possible interception to any person who was or is the target of the interception. Finally, the defendents action must have been under­ taken with the specific intent to obstruct, impede or prevent the interception. The offense also includes an attempt to engage in the offense. Section 110—Injunctive remedy This section of the act sets out a proposed section 2521 of title 18. Section 2521 adds to the existing criminal and civil remedies avail­ able for violations of this chapter by authorizing the Attorney Gen­ eral to seek an injunction to prevent felony level violations of this chapter. Section 2521 also provides that preliminary relief can be granted to prevent a continuing and substantial injury to the United States or to any person for whose protection the action is brought. Actions under section 2521 are governed by the Federal Rules of Civil Procedure, except that when an indication has been returned against the respondent, discovery is governed by the Fed­ eral Rules of Criminal Procedure. 35 Section 111—Effective date Subsection (a) provides that in general the amendments made by this act are effective 90 days after enactment, and that the act ap­ plies only with respect to court orders or extensions made after the effective date. Thus existing court orders would not be affected by these changes and on-going investigations would not be hindered, but any extention of an existing court order made 90 days after passage would be governed by these new provision. Subsection (b) provides a special rule for the effective date in the case of state authorizations of interceptions. This special effective date rule is necessary because the provisions of chapter 119 of title 18 supersede state laws with respect to electronic communications. Under chapter 119, the states must enact statutes which are at least as restrictive as the provisions of chapter 119 before they can authorize their state courts to issue interception orders. Because of the substantial changes made by this act it is appropriate to grant the states sufficient time to modify their laws. This special effective date rule gives the states two years to amend their laws to meet the new requirements of chapter 119. Subsection (c) provides that section 104 of the act is effective upon enactment. Section 104 modifies Justice Department proce­ dures for approval of requests under this chapter, since section. 104 is designed to alleviate management difficulties at the Department of Justice there is no reason to delay implementation of these changes. TITLE II—STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS Section 201—Title 18 amendment This section amends title 18 by adding at the end thereof a new chapter 121 consisting of ten new sections. These sections are dis­ cussed below. New section 2701—Unlawful access to stored communications Subsection (a) of this new section creates a criminal offense for either intentionally accessing, without authorization, a; facility through which an electronic communication service is provided, or for intentionally exceeding the authorization for accessing that fa­ cility. Subsection 2701, also provides that the offender must obtain, alter, or prevent authorized access to a wire or electronic communi­ cation while it is in electronic storage in such an electronic storage system in order to commit a violation under the subsection. :The term "electronic storage" is defined in section 2510(17) of title 18 and includes both temporary, intermediate storage of a wire or electronic communication incidental to the transmission of the message, and any storage of such a communication by the electron­ ic communication service for purposes of backup protection of the communication. This provision addresses the growing problem of unauthorized persons deliberately gaining access to, and sometimes tampering with, electronic or wire communications that are not intended to be available to the public. 36 This subsection does not prevent broad authorizations to the gen­ eral public to access such a facility. The bill does not for example hinder the development or use of "electronic bulletin boards" or other similar services where the availability of information about the service, and the readily accessible nature of the service are widely known and the service does not require any special access code or warning to indicate that the information is private. To access a communication in such a public system is not a violation of the Act, since the general public has been "authorized" to do so by the facility provider. However, the offense of intentionally exceeding an authorization to access a computer facility would apply both to public and private aspects of a system. For example, a computer mail facility author­ izes a subscriber to access information in their portion of the facili­ ties storage. Accessing the storage of other subscribers without spe­ cific authorization to do so would be a violation of this provision. Similarly, a member of the general public authorized to access the public portion of a computer facility would violate this section by intentionally exceeding that authorization and accessing the pri­ vate portions of the facility. Subsection (b) of this new section provides punishment for viola­ tion of subsection (a). A distinction is drawn between offenses com­ mitted for purposes of commercial advantage, malicious destruction or damage, or for private commercial gain and all other types of violation. If the offense is committed for private or commercial gain or for malicious destruction the subsection provides a fine of not more than $250,000 or imprisonment for not more than one year, or both, for a first offender. Second and subsequent offenders are subject to the same fine provision but a jail term up to two years can be imposed for such violations. In all other cases the fine is limited to not more than $5,000 and imprisonment for not more than 6 months or both. Subsection (c) of this new section provides exceptions to the viola­ tions contained in subsection (a). It is not a violation of subsection (a) if the conduct was authorized by the person or entity providing the wire or communications service, or if the conduct was author­ ized by the user of that service with respect to communications of or intended for that user or if the conduct is authorized by new sec­ tions 2703, 2704, or 2518 or title 18. New section 2702—Disclosure of contents Proposed section 2702 is divided between electronic communica­ tion services and remote computing services. The restrictions on the service provider are the same in each instance. However, as de­ scribed below, there is different treatment for electronic communi­ cation service providers and remote computing services with regard to government access. Subsection (a) of this new section prohibits the provider of an electronic communications service or the provider of a remote com­ puting service from knowingly divulging the contents of any com­ munication. The "contents of a communication has the same meaning in this section as it has in subsection 2510(8) of title 18 or the United States Code as amended by section 101(a)(5) of this Act. The requirement that a violator must "knowingly" divulge the con­ 37 tents is intended to make clear that "reckless" or "negligent" con­ duct is not sufficient to constitute a violation of this section. Sub­ section (b) of this section provides exceptions to this general rule of non-disclosure. The application of new code section 2702(a) generally prohibits the provider of a wire or electronic communication service to the public from knowingly divulging the contents of any communica­ tion while in electronic storage by that service to any person other than the addressee or intended recipient. Similarly, section 2511(3) of title 18, as amended by this Act, prohibits such a provider from divulging the contents of a communication while it is in transmis­ sion. Neither provision, however, nor any other provision in the Act, is intended to affect any other provision of federal law that prohibits the disclosure of information on the basis of the content of the information, such as the Fair Credit Reporting Act. The application of sections 2701(a) and 2511(3) is limited to pro­ viders of wire or electronic communications services. There are in­ stances, however, in which a person or entity both acts as a provid­ er of such services and also offers other services to the public. In some such situations, the bill may allow disclosure while another federal requirement, applicable to the person or entity in another of its roles, prohibits disclosure. The Committee intends that such instances be analyzed as though the communication services and the other services were provided by distinct entities. Where a com­ bined entity in its non-provider role would not be allowed to dis­ close, the appropriate outcome would be non-disclosure. Subsection (b) of this new section provides exceptions to the gen­ eral rule of nondisclosure provided in subsection (a). These excep­ tions permit disclosure: (1) to the addressee or intended recipient of the communication or the authorized agent of such addressee or in­ tended recipient; (2) in conformity with a court order issued pursu­ ant to the procedures in section 2516 of title 18; or in the course of normal business practice as defined in section 2511(2)(a) of this title; or to the government under procedures of new section 2703; (3) with the lawful consent of the sender or the addressee or an in­ tended recipient of such communication or with the consent of the subscriber in the case of a remote computing service; (4) to a person employed or authorized or whose facilities are used to for­ ward the communication to its ultimate destination; (5) as neces­ sary in order to render the service or to protect the rights or prop­ erty of the provider of the service: of (6) to a law enforcement agency, if the contents were inadvertently obtained by the service provider and appear to pertain to the commission of a crime. The exceptions to the general rule of nondisclosure provided in subsection (b) fall into three categories. The first category are those disclosures which are authorized by either the sender or receiver of the message. Either the sender or the receiver can directly or through authorized agents authorize further disclosures of the con­ tents of their electronic communication. The second category are disclosures which are necessary for the efficient operation of the communications system. Such business procedures are included in the section 2511(2)(a) exemption as well the exemptions of this sub­ section relating to the diclosure of the message to forwarding facili­ ties and the exemption for service provider activities designed to 38 protect the system and perform the service. The third category are disclosures to the government. In this area there are two types of disclosures. Those pursuant to a court order under the procedures of sections 2516 and 2703 and those disclosures undertaken at the initiative of the service provider in the exceptional circumstances when the provider has become aware of the contents of a message that relate to ongoing criminal activity. New section 2703.—Requirements for governmental access Subsection (a) of section 2703 provides requirements for the gov­ ernment to obtain the contents of an electronic communication that has been in electronic storage for 180 days or less. A govern­ ment entity can only gain access to the contents of such an elec­ tronic communication pursuant to a warrant issued under the Fed­ eral Rules of Criminal Procedure or an equivalent State warrant. Subsection (b) of section 2703 provides that for electronic commu­ nications that are maintained by a remote computing service and that have been in storage in an electronic communication service for more than 180 days the Government can gain access in several ways. If the Government wishes to obtain the contents of a commu­ nication without the required notice to the subscriber then the gov­ ernmental entity must obtain a warrant issued under the Federal Rules of Criminal Procedure or an equivalent State warrant. With prior notice from the government entity to the subscriber or cus­ tomer, the entity may obtain the contents of the electronic commu­ nication either by using an administrative subpoena authorized by a Federal or State statute or a Federal or State grand jury subpoe­ na or obtain a court order pursuant to subsection (d) of this section. In addition, the required notice may be delayed pursuant to the re­ quirements of section 2705 of title 18 as provided in the Act. Subsection (b) of new section 2703 of title 18 is made applicable to all electronic communications held or maintained by the service provider on behalf of a customer or subscriber and received by means of electronic transmission as well as electronic communica­ tions in storage or computer processing if the provider is not au­ thorized to access the contents of any communications for purposes other than storage or computer processing. Subsection (c) provides for access to records or other information pertaining to a subscriber to or customer of an electronic communi­ cations or remote computer service, not including the content of electronic communications. This section permits the provider of the service to divulge, in the normal course of business, such informa­ tion as customer lists and payments to anyone except a Govern­ ment agency. It should be noted that the information involved is information about the customer's use of the service not the content of the customer's communications. A provider of electronic communication service or remote com­ puting service must disclose information pertaining to a subscriber or customer, but not the contents of any communications of that customer, to a Government entity only when the-Government entity either (i) uses an administrative subpoena authorized by a Federal or State statute, or a Federal or State grand jury subpoe­ na; (ii) obtains a warrant issued under the Federal Rules of Crimi­ nal Procedure or an equivalent state warrant; (iii) obtains a court­ 39 order for such disclosure under subsection (d) of this section; or (iv) has obtained the consent of the subscriber. A Government entity which receives customer records pursuant to one of these four al­ ternatives is not required to provide notice to the subscriber or cus­ tomer that it has requested or obtained this information. Subsection (d) provides that orders requiring access by a Govern­ ment entity to the contents of a wire or electronic communication or to the records or other information sought shall issue only if the governmental entity shows there is reason to believe the contents of the wire or electronic communication, or the records or other in­ formation sought, are relevant to a legitimate law enforcement in­ quiry. This section provides no authority for the issuance of a state subpoena that is prohibited under the law of such state. This subsection also permits the provider of the communications or remote computing service to move to quash or modify any other issued under this section if the information or records requested are unusually voluminous or compliance with the order would cause an undue burden on the provider. This specific standing for the service provider to contest an overly broad order is intended to protect the service provider from unduly burdensome requirements and to permit an impartial judicial officer to evaluate the appropri­ ateness of the government's request. Subsection (e)—No cause of action against a provider disclosing information under this chapter. This subsection of the proposed new section provides a defense for the service provider, its employees and officers, from suits aris­ ing because of its disclosure of information pursuant to a warrant or other court order issued under this chapter. New section 2704—Backup preservation Subsection (a) of proposed section 2704 of title 18 provides that a Government entity may include in its subpoena or court order ob­ tained pursuant to the provisions of new section 2703(b)(2) a re­ quirement that the service provider create and maintain a dupli­ cate copy of the contents of the electronic communications sought in order to preserve those communications. Without notifying the customer or subscriber, the service provider must create such a du­ plicate copy as soon as practicable and confirm to the Government entity that the duplicate file has been created. In all cases the serv­ ice provider must create such a duplicate file within two business days after receipt by that provider of the subpoena or court order directing that such a duplicate file be created. Paragraph (2) of this new subsection requires the Government entity to give notice to the subscriber or customer that such a du­ plicate file has been created and has been ordered to be provided to the Government. This notification to the customer or subscriber must be given within three days of the receipt of confirmation from the service provider (as required by subsection (a) above) that the duplicate file has been created, unless the Government agency has obtained permission to delay such notification pursuant to pro­ posed subsection 2705(a). Paragraph (3) also prohibits the service provider from destroying the backup copy until the information has been delivered to the Government entity or any proceedings, including all appeals, con­ 40 cerning the Government's subpoena or court order have been re­ solved, whichever is later. The service provider is required to comply with the order and release the copy to the requesting Gov­ ernment entity no sooner than fourteen days after the Government entity has notified the subscriber or customer that it is seeking this information. Paragraph (4) provides that the service provider should release the information to the Government only if the service provider has not received notice from its subscriber or customer that the sub­ scriber or customer has challenged the Government's request and if the service provider has not itself challenged the request of the Government entity. Finally, paragraph (5) provides that when a Government entity seeks to require the creation of the backup or duplicate copy under this subsection and the governmental entity further determines that notification under section 2703 of this title of the existence of the subpoena or court order may result in destruction of or tamper­ ing with the evidence this later determination is not subject to challenge either by the subscriber or customer or by the service provider. While this subtitle provides the subscriber or customer, and in some circumstances the service provider a right to challenge the necessity for or scope of a court order, neither this section or any other section of this Act provides grounds to challenge the determi­ nation of the Government agency that no notification is to be given to the subscriber or customer of the mere creation of the duplicate file. The file is created and maintained by the service provider solely for the purpose of assuring that potential evidence is not tampered with or destroyed. Keeping the fact of the creation of this file secret does not harm any privacy interest since there are ade­ quate safeguards included in the bill and in this chapter to control the actual release of the duplicate file to the Government agency. Subsection (b) of proposed section 2704 provides a procedure for challenges to a court order by the subscriber or customer. The sub­ scriber or customer whose records are sought can within 14 days after notification by the Government under subsection (a)(2) of this section file a motion to quash such subpoena or vacate such court order in an appropriate State or Federal court. The subscriber or customer challenging the subpoena or order must serve a copy of the motion on the governmental entity and provide written notice to the service provider that such a challenge has been initiated. The subsection further provides that the application or motion must state that the applicant is the customer or subscriber to the service from which the contents of electronic communications maintained for him have been sought and state the reasons for be­ lieving that the records sought are not relevant to a legitimate law enforcement inquiry or state that there has not been substantial compliance with the provisions of this chapter in some other re­ spect. The service required by this subsection shall be made upon the governmental entity by delivering or mailing by registered or certi­ fied mail a copy of the papers to the person, or office, or depart­ ment specified in the notice which the customer has received pur­ suant to this chapter. The term "delivery" in this subsection has 41 the meaning given that term in the Federal Rules of Civil Proce­ dure. If a court determines that the customer or subscriber has com­ plied with the requirements for such a motion including the re­ quirements of "delivery" to the Government entity, then the court shall order the Government entity to file a sworn response to the motion or application. Such response may be in camera if the gov­ ernmental entity includes in its response the reasons which make such an in camera review appropriate. If the motion and response provide insufficient information for the court to make a determina­ tion, the court may conduct such additional proceedings as it deems appropriate. Any additional proceedings and a decision on the challenge shall occur as rapidly as feasible, i.e. within 7 calen­ dar days in all but the most unusual circumstances. The subsection also provides that the court shall enforce the process if it finds that the applicant challenging the order or appli­ cation is not the subscriber or customer for whom the records are maintained or if it finds that the law enforcement inquiry is legiti­ mate and that the communications sought are relevant to that in­ quiry. If the court finds that the customer or subscriber challeng­ ing the order or application is the subscriber or customer for whom the records are maintained and that the records are not relevant to a legitimate law enforcement inquiry or that there has not been substantial compliance with the provisions of this chapter in some other respect, then the court shall order the process quashed. Finally, the subsection provides that a court order denying a motion or application under section 2704 shall not be deemed a final order and no interlocutory appeal may be taken by the cus­ tomer or subscriber from such a denial. In the event that there is no indictment then the person whose records are involved may move for the return of the records. Obvi­ ously, nothing precludes a customer or subscriber who is later the subject of a criminal proceeding from raising these issues again subject to the sanctions limitation of section 2708 of title 18. New section 2705—Delayed notice This proposed section provides procedures and requirements for implementation for a delay of notice to the customer or subscriber that his records are being sought or have been provided to a gov­ ernment entity. Subsection (a) of this section 2705 provides that when a Govern­ ment entity seeks or obtains access to the contents of an electronic communication by application for a court order notification can be delayed for an initial period of up to 90 days, if the Government entity requests such a delay and the court determines that there is reason to believe that the notification of the existence of the court order may have an adverse result as described in this subsection. Where an administrative subpoena authorized by a Federal or State statute or a Federal or State grand jury subpoena is obtained, a delay of notification for a period of not more than 90 days can be obtained upon the execution of a written certification of a supervi­ sory official that there is reason to believe that notification of the existence of the subpoena may have an adverse result. 42 For purposes of a delay of notification, an adverse result is de­ fined as (A) endangering the life or physical safety of an individual; (B) flight from prosection; (C) destruction of or tampering with evi­ dence; (D) intimidating of potential witnesses; or (E) otherwise seri­ ously jeopardizing an investigation or unduly delaying a trial. In the case of an administrative or grand jury subpoena, the gov­ ernmental entity is required to maintain a true copy of the re­ quired certification, and the certification can only be given by a supervisory official". The subsection defines such an official as the investigative agent in charge of an agency's headquarters or re­ gional office, or the assistant to such an agent or the equivalent, or the chief prosecuting attorney or the first assistant prosecuting at­ torney of an agency's headquarters or regional office, or the equiva­ lent. The subsection also provides that extensions of the delay period for not more than 90 days each may be granted by the court upon application or by certification by the government agency provided the requirements of subsection (b) of section 2705 are met for each extension. When the delay period, including any extensions thereof, as pro­ vided in this subsection and subsection (b), has expired the govern­ mental entity must serve upon, or deliver by registered or firstclass mail to the customer or subscriber, a copy of the process or request together with notice that states the nature of the law en­ forcement inquiry and informs the customer or subscriber: (i) that the information maintained for such customer or subscriber by the service provider was supplied or requested by the Government agency and stating the date on which the information was supplied or requested; (ii) that notification to the customer of this action was delayed; (iii) what Government entity or court made the certifica­ tion or determination that notification could be delayed; and (iv) which provision or provisions of this chapter allowed the delay. Subsection (b) provides that if a governmental entity has delayed notice or has not been required to give notice under the provisions of section 2703, then the governmental entity may also apply to the court for an order commanding a provider of electronic communi­ cations service or remote computing service to whom a warrant, subpoena, or court order is directed, not to notify any person of the existence of the warrant, subpoena, or court order. The court is re­ quired to enter such an order to prevent disclosure by the service provider if notification of the existence of the warrant, subpoena, or court order will result in any of the five adverse results listed in this subsection. The entity must apply to a court for preclusion under this subsection, even if the underlying process—an adminis­ trative subpoena, for example—does not require a court order. New section 2706—Cost reimbursement This proposed section provides that when a governmental entity obtains the contents of communications, records or other informa­ tion under the authority of sections 2702, 2703, or 2704, it shall pay to the person or entity assembling or providing the information a fee for reimbursement for the reasonably necessary direct costs. The section provides an exception to this general rule with regard to records or other information maintained by a communications 43 common carrier that relate to telephone toll records and telephone listings obtained under section 2703. No fee is normally required for access to such records. However, the court may order a pay­ ment if the court determines the information required is unusually voluminous. The amount of the fee provided in this subsection is to be mutually agreed upon by the governmental entity and the person or entity providing the information. If they are unable to reach an agreement, the court which issued the order for produc­ tion of the information, or the court before which a criminal pros­ ecution relating to the information would be brought if no court order was issued, is empowered to determine a reasonable fee. New section 2707—Civil action Subsection (a) of this proposed section provides that, except as provided in section 2703(e), any provider of electronic communica­ tion service, subscriber, or customer of such service aggrieved by any violation of this new chapter may recover from any person or entity—including governmental entities—who knowingly or inten­ tionally violated this chapter. Under subsection (b), appropriate relief in a civil action under this title includes: (1) such preliminary, declaratory, or other equi­ table relief as may be appropriate; (2) damages under the section including the sum of actual damages suffered by the plaintiff and any profits made by the violator as the result of the violation as provided in (c) with minimum statutory damages of $1,000; and (3) reasonable attorney's fees and other reasonable litigation costs. The section also provides a defense to an action under this chap­ ter. If the defendant's action was based on a good faith reliance on a court order or warrant, a grand jury subpoena, a legislative or statutory authorization; or a request of an investigative or law en­ forcement officer under section 2518(7) of this title, or if it was based on a good faith determination that section 1511(3) of this title permitted the conduct complained of, then this good faith reliance or determination is a complete defense to any civil or criminal action brought under this chapter or under any other law. This new section also provides that any action under this section must be commenced not later than 2 years after the date upon which the claimant first discovered or had a reasonable opportuni­ ty to discover that a violation had occurred. ; . : 1 . New section 2708—Exclusivity of remedies The remedies and sanctions provided in this chapter are the only judicially available remedies and sanctions for nonconstitutional violations of the chapter. New section 2709.—Counterintelligence access to telephone toll and transactional records Section 2709 provides for FBI counterintelligence access to tele­ phone toll and transactional records. This provision is substantially the same as language recently reported by the Intelligence Com­ mittee as section 503 of the Intelligence Authorization Act for Fiscal Year 1987. There are two differences. The first is that sec­ tion 2709 applies not only to FBI requests for telephone subscriber information and toll billing information, but also to FBI requests 44 for electronic communication transactional records. This ensures that the FBI has the necessary authority with regard to subscriber information and toll billing information with respect to electronic communication services other than ordinary telephone service. Section 2709 is a carefully balanced provision that remedies the defect in current law that the FBI cannot gain access on a manda­ tory basis to telephone toll records maintained by communications common carriers, for counterintelligence purposes. As a result, es­ pecially in states where public regulatory bodies have created ob­ stacles to providing such access, the FBI has been prevented from obtaining these records, which are highly important to the success­ ful investigation of counterintelligence cases. The second difference concerns the standard that the FBI must meet before it can require a common carrier or service provider to supply the requested records. Section 2709 requires a certification by a designated FBI official that the information sought is relevant to an authorized foreign counterintelligence investigation and that there are specific and articulable facts giving reason to believe that the person or entity to whom the information sought pertains is a foreign power or an agent of a foreign power as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978. Section 503 of the Intelligence Authorization Act for Fiscal Year 1987, as reported by the Intelligence Committee, contains a slightly differ­ ent "reason to believe standard requiring specific and articulable facts giving reason to believe that the target "is or may be a for­ eign power or an agent of a foreign power. Subsection 2709(a) of this proposed section provides that a wire or electronic communication service provider must comply with a request for subscriber information and toll billing records in its custody or possession made by the Director of the Federal Bureau of Investigation under subsection (b) of this section. It should be noted that this applies only to transactional records, not to the con­ tent of the electronic messages of a customer or subscriber. Subsection 2709(b) provides that in order for the requirement to provide information in subsection (a) of this section to apply, the Director of the Federal Bureau of Investigation, or a specific person within the Bureau designated for this purpose by the Director, must certify in writing to the wire or electronic communication service provider that (1) the information sought is relevant to an authorized foreign counterintelligence investigation; and (2) that there are specific, articulable facts giving reason to believe that the person or entity to whom the information sought pertains is a for­ eign power or an agent of a foreign power as defined m section 101 of the Foreign Intelligence Surveillance Act. . The House Judiciary Committee report on the Electronic Com­ munications Privacy Act of 1986 does not discuss the meaning of the "reason to believe" standard in section 2709. It is essential, therefore, to clarify the intent of the Senate with respect to this item. The "reason to believe" requirement in section 2709 is intended to be substantially less stringent than the requirement of "proba­ ble cause." It is intended that the application of the "reason to be­ lieve" requirement will be determined by a senior FBI official at the level of Deputy Assistant Director or above. It is intended that 45 in applying the "reason to believe" standard to a specific case, t h e FBI official may take into account any facts or circumstances that a prudent investigator would consider, so long as there is an objec­ tive, factual basis of the determination. The Senate Select Committee on Intelligence has informed t h e Judiciary Committee that the language contained in the bill would not significantly affect the application of the current FBI investiga­ tive standard in this area. Further discussion of the investigatory standard in particular cases is contained in the reports of t h e Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence on FY 87 Intelligence Authoriza­ tion Act (S. 2477 and H.R. 4759). Subsection 2709(c) prohibits a service provider, or any officer, em­ ployee, or agent of t h e service provider from disclosing to any person that t h e Federal Bureau of Investigation has sought or ob­ tained access to information or records under this section. Subsection 2709(d) permits the Federal Bureau of Investigation to disseminate such information only in conformance with guidelines approved by the Attorney General for foreign intelligence and for­ eign counterintelligence investigations. If t h e information is to be disseminated to another federal agency, it can only be disseminated if the information is clearly relevant to t h e authorized responsibil­ ities of such agency. Subsection 2709(e) further requires that on a semiannual basis the Director of the Federal Bureau of Investigation fully inform the Permanent Select Committee on Intelligence of the House of Representatives and t h e Select Committee on Intelligence of t h e Senate concerning all requests made by t h e Bureau under subsec­ tion 2709(b). New section 2710—Definitions for chapter Terms used in section 2510 retain the definitions given to each term by that section. The term "remote computing service" is de­ fined to mean the provision to the public of computer storage, or computer processing services by means of an electronic communica­ tions system. This section also provides for the change in the table of chapters of title 18 of the United States Code by adding chapter 121 to the table. Section 202—Effective date This section provides that the amendments made by Title II of the bill shall be effective 90 days after the date of enactment. It further provides that changes made by this, title that apply to con­ duct pursuant to court order or extension, apply only with respect to court orders or extensions made after the effective date of the title. TITLE III—PEN REGISTERS AND TRAP AND TRACE DEVICES Title III of the Electronic Communications Privacy Act proposes to add a new chapter 206 to title 18 of the United States Code. This chapter will govern the use, application and issuance of orders for pen registers and trap and trace devices. Those terms are defined 46 in proposed section 3126 of title 18. Briefly, a pen register is a device which can be attached to a telephone line for the purpose of decoding and recording the numbers dialed from that line. A trap and trace device is used to identify the originating number of an incoming wire or electronic communication. These devices do not identify or record the contents of the communciation. Section 301—Pen registers and trap and trace devices Subsection 301(a) of the Electronic Communications Privacy Act sets out the six proposed sections of title 18 governing pen registers and trap and trace devices. New section 3121—General prohibition on use of pen registers and trap and trace devices Subsection (a) of proposed section 3121 of title 18 contains a gen­ eral prohibition against the installation or use of a pen register or trap and trace device without a court order. Such a court order may be obtained under section 3123 of title 18 or under the Foreign Intelligence Surveillance Act (FISA). Proposed subsection 3121(b) contains exceptions to subsection (a)'s general prohibition against the use of pen registers and trap and trace devices. Providers of electronic or wire communication services may use pen registers or trap and trace devices if one of three conditions are met. The provider may use a pen register or trap and trace device (1) if it relates to the operation, maintenance, and testing of a wire or elecronic communication service, or to the protection of the rights or property of such provider, or to the pro­ tection of users of that service from abuse or unlawful use of the service; (2) to record the fact that a wire or electronic communica­ tion was initiated or completed in order to protect the provider, an­ other provider furnishing service toward completion, or a user of that service from fraudulent, unlawful or abusive use of service; or (3) where the consent of the user has been obtained. Proposed subsection 3121(c) imposes a penalty for a knowing vio­ lation of subsection (a). The penalty is a fine under this title, im­ prisonment for up to 1 year, or both. New section 3122—Applications Proposed section 3122 of title 18 sets out the procedures for ap­ plying for a court order for a pen register or trap and trace device. Under subsection (a), a government attorney may apply for an order, or the extension of an order, authorizing or approving the installation and use of a pen register or trap and trace device. Such order must be made in writing under oath or affirmation to a court of competent jurisdiction. Proposed paragraph 3122(a)(2) contains parallel provisions for state investigative or law enforcement officers. The phrase "Unless prohibited by state law," makes clear that this law does not pre­ empt any existing state law regulating the installation and use of pen registers or trap and trace devices by state officials. To the extent that state law currently provides that a pen register or trap and trace device may only be installed or used by a state official based on some other, higher standard of proof, that law will contin­ ue in effect with respect to such officials. 47 Proposed subsection 3122(b) of title 18 sets out the contents re­ quired in an application for a court order for a pen register or a trap and trace device. The application must include the identity of the applicant and the law enforcement agency conducting the in­ vestigation. Also, the applicant must certify that the information likely to be obtained is relevant to an ongoing criminal investiga­ tion being conducted by the agency. New section 3123—Issuance of orders Subsection (a) of proposed section 3123 provides that, upon appli­ cation, a court shall issue an ex parte order authorizing the instal­ lation and use of a pen register or trap and trace device within its jurisdiction. To issue an order, the court must first be satisfied that the information sought is relevent to an ongoing criminal investi­ gation. This provision does not envision an independent judicial review of whether the application meets the relevance standard, rather the court needs only to review the completeness of the certi­ fication submitted. Proposed paragraph 3123(b)(1) describes the contents of the order authorizing the use or installation of a pen register or trap and trace device. The order shall specify (A) the identity, if known, of the person whose telephone line will receive the pen register; (B) the identity, if known, of the person who is under criminal investi­ gation;(C)the number and, if known, location of the telephone line and, in the case of a trap and trace device, the geographic limits of the order; and (D) a statement of the offense to which the informa­ tion likely to be obtained relates. Under proposed paragraph 3123(b)(2), the order, upon request of the applicant, shall direct a third party to furnish information, fa­ cilities, and technical assistance necessary to install the pen regis­ ter or trap and trace device. This provision of the order relating to cooperation is intended to codify the existing informal practice of cooperation between telephone companies and the Department of Justice. Under proposed subsection 3123(c), the time period of authoriza­ tion of installation and use of a pen register or a trap and trace device is 60 days, with possible extensions of 60 days. An extension may be granted upon application for a section 3122 order. The same judicial findings required by subsection 3123(a) are also re­ quired. Proposed subsection 3123(d) provides that an order authorizing or approving the installation and use of a pen register or trap and trace device shall direct that the order be sealed, until otherwise ordered by the court. In addition, the order shall bar the disclosure of the existence of the pen register or trap and trace device and the disclosure of an investigation to the listed subscriber or to any other unauthorized person unless or until otherwise directed by the court. Intentional violations of the non-disclosure provisions may be, in appropriate circumstances, punishable as contempt. New section 3124—Assistance in installation and use Proposed subsection 3124(a) provides that upon the request of an authorized person, a wire or electronic communication service pro­ vider, landlord, custodian, or other person shall furnish such re­ 48 quester with all information, facilities, and technical assistance necessary to effectuate the pen register order unobtrusively and with a minimum of interference. The Committee assumes that the current practice of law enforcement officials installing and main­ taining pen registers will continue. For trap and trace devices, proposed subsection 3124(b) provides that upon request of a government attorney or law enforcement of­ ficer authorized to receive the results, a wire or electronic commu­ nication service provider, landlord, custodian or other person shall promptly install the trap and trace device and furnish the request­ er all additional information, facilities and technical assistance, in­ cluding installation and operation of the device unobtrusively and with a minimum of interference with services, provided that the in­ stallation and service is ordered under section 3123(b). This provi­ sion also requires that the results be furnished to the law enforce­ ment officer designated by the court, at reasonable intervals, during regular business hours for the duration of the order, unless the court orders otherwise. Proposed subsection 3124(c) provides reasonable compensation for those providing facilities and assistance under this section. This compensation provision is modeled after that which applies under section 2518 of title 18 and subsection 106(b) of this bill. It is in­ tended to be interpreted and implemented in a similar fashion. Proposed subsection 3124(d) provides that no cause of action shall lie in any court against a wire or electronic communication service provider, its officers, agents, employees or other specified persons for providing information, assistance or facilities in accordance with the terms of a chapter 206 court order. Proposed subsection 3124(e) establishes a good faith defense against any civil or criminal action brought under chapter 206 or any other law. New section 3125—Reports Under a current order of the Attorney General, statistics con­ cerning pen registers are compiled. Proposed section 3125 requires that this information be reformulated and submitted to the appro­ priate committees of Congress. It also extends such reporting re­ quirements to trap and trace devices. Specifically, proposed section 3125 requires that the Attorney General annually report to Congress on the number of pen register and trap and trace device orders applied for by law enforcement agencies of the Department of Justice. The Committee requests that these reports include information as to the nature of the of­ fenses for which the pen registers and trap and trace devices are being used. New section 3126—Definitions Proposed section 3126 contains definitions for this chapter. The terms "wire communication," "electronic communication," and "electronic communication service" have the same meanings as in section 2510 of title 18. The term "court of competent jurisdiction" means (A) a district court of the. United States (including a magis­ trate of such court) or a U.S. Court of Appeals; or (B) a state court 49 of general criminal jurisdiction authorized to enter pen register or trap and trace orders. As indicated in proposed section 3126(3), the term "pen register" means a device which records or decodes electronic or other im­ pulses which identify the numbers dialed or otherwise transmitted for purposes of routing telephone calls, with respect to wire com­ munications, on the telephone line to which such device is at­ tached. Pen registers do not record the contents of a communica­ tion. They record only the telephone numbers dialed. Devices used by a provider or customer or wire or electronic com­ munication service incident to billing or cost accounting, or for any other similar purposes in the ordinary course of business are ex­ cluded from the definition of a pen register. Thus, devices that many companies and firms use to record billable time for their cli­ ents' accounts are outside this bill's prohibitions against the instal­ lation and use of pen registers. Trap and trace devices are defined in proposed subsection 3126(4). A "trap and trace device" is a device which captures the incoming electronic or other impulses which identify the originat­ ing number of an incoming wire or electronic communication. Trap and trace devices do not record the contents of communications. The term "attorney for the government" has the meaning given to that term by the Federal Rules of Criminal Procedure. The term "State" means a State, the District of Columbia, Puerto Rico, and any other possession or territory of the United States. Subsection 301(b) of the bill contains a clerical amendment to the table of chapters. Section 302—Effective date Section 302 of the bill contains the effective date for Title III of the Electronic Communications Privacy Act. Subsection (a) pro­ vides that as a general rule, Title III of the bill shall take effect 90 days after enactment. In the case of conduct pursuant to a court order or extension, these amendments apply only with respect to court orders or extensions made after this title takes effect. Subsec­ tion 302(b) of the bill contains special rules which, in essence, give states two years to bring their laws into conformity with the Elec­ tronic Communications Privacy Act's amendments to Federal law. Section 303—Interference with the operation of a satellite This section of the bill adds a new section to chapter 65 of title 18, United States Code. New section 1367—Interference with the operation of a satellite Subsection (a) of this proposed section provides that anyone who, without the authority of the satellite operator, intentionally or ma­ liciously interferes with the authorized operation of a satellite or obstructs or hinders any satellite transmission, including both the transmission from the ground to the satellite and the transmission from the satellite to the ground (commonly known as the up-link and the down-link respectively) is subjected to criminal penalties including a fine of up to $250,000, imprisonment for not more than 10 years, or both. The subsection does not prohibit any actions by 50 the authorized satellite operator which are designed to protect the satellite from unauthorized use. Subsection (b) of this new section makes it clear that the crimi­ nal act described in subsection (a) does not include any lawfully au­ thorized investigative, protective, or intelligence activity of a law enforcement or intelligence agency of the United States. This sub­ section does not provide any new authority for such activities. Finally, this section of the bill provides that the table of sections for chapter 65 of title 18 is amended to include the new section 1367. VI. AGENCY VIEWS On June 25, 1986 and July 29, 1986, the Committee received the following letters from the Department of Justice. U.S. DEPARTMENT OF JUSTICE, OFFICE OF LEGISLATIVE AND INTERGOVERNMENTAL AFFAIRS, Washington, DC, June 25, 1986. Hon. STROM THURMOND, Chairman, Committee on the Judiciary, U.S. Senate, Washington, DC. DEAR MR. CHAIRMAN: This letter is to advise you of the Depart­ ment of Justice's position with regard to S. 2575, the Electronic Communications Privacy Act of 1986. This bill, which is identical to H.R. 4952 as recently passed by the House of Representatives, makes important changes to the existing wiretap statutes and fills gaps in current laws by creating provisions to regulate interception of and access to new forms of electronic communication such as data transmissions. The Department of Justice has worked intensively on this legis­ lation over the past several weeks with the staff of the Subcommit­ tee on Patents, Copyrights and Trademarks, as well as with inter­ ested representatives of industry and civil liberties groups. While initial versions of this legislation did not in our view adequately safeguard legitimate and vital law enforcement and national secu­ rity needs for access to communications, as a result of the negotia­ tions that have occurred the bill has been substantially modified to accommodate our concerns. In our judgment the bill as presently drafted fairly balances the interests of privacy and law enforce­ ment and its enactment would represent a major accomplishment of the 99th Congress, holding forth the promise of significant bene­ fits for business, privacy, and law enforcement alike. Accordingly, the Department of Justice strongly supports the en­ actment of S. 2575. Sincerely, JOHN R. BOLTON, Assistant Attorney General. 51 U.S. DEPARTMENT OF JUSTICE, OFFICE OF LEGISLATIVE AND INTERGOVERNMENTAL AFFAIRS, Washington, DC, 20530 July 29, 1986. Hon. STROM THURMOND, Chairman, Committee on the Judiciary, U.S. Senate, Washington, DC. DEAR MR. CHAIRMAN: This is with further reference to my letter of June 25, 1986, expressing support for S. 2575, the Electronic Communications Privacy Act of 1986. A copy of my earlier letter is enclosed for ready reference. We continue to believe that this measure is a well balanced one which, in addition to modernizing the 1968 electronic surveillance law, also benefits both law enforcement and individual privacy by clarifying many aspects of this highly complex area of the law. As the 99th Congress is rapidly drawing to a close, we sincerely hope that the Senate will act on S. 2575 at an early date. We would deeply appreciate your consideration of S. 2575 and, if possible, your formal co-sponsorship of the bill. Having your name on the bill would, we believe, be most helpful in efforts to process this important legislation this year. Sincerely, JOHN R. BOLTON, Assistant Attorney General. VII. COST ESTIMATE U.S. CONGRESS, CONGRESSIONAL BUDGET OFFICE, Washington, DC, September 23, 1986. Hon. STROM THURMOND, Chairman, Committee on the Judiciary, U.S. Senate, Washington, DC. DEAR MR. CHAIRMAN: The Congressional Budget Office has re­ viewed S. 2575, the Electronic Communications Privacy Act of 1986, as ordered reported by the Senate Committee on the Judici­ ary, September 19, 1986. CBO estimates that enactment of this leg­ islation would result in no significant cost to the federal govern­ ment and in no cost to state or local governments. S. 2575 would make a number of amendments to Title 18 of the U.S. Code concerning access to electric communications. Title I of the bill would establish penalties for the unlawful interception or disclosure of electronic communications, provide for the recovery of civil damages for persons whose communications are intercepted, disclosed or used in violation of this provision, and modify proce­ dures for government interception of communications. T i t l e II, would create specific penalties for unlawful access to stored wire and electronic communications, while Title III would establish a general prohibition on the use of pen registers. These titles would mandate specific procedures for access to stored communications and use of pen registers by government entities, and Title II would allow for civil actions. 52 S. 2575 would require government entities to compensate private parties assembling or providing information concerning stored elec­ tronic communications, or assisting in the installation and use of a pen register. Because such compensation is currently provided in Department of Justice (DOJ) investigations, CBO does not expect the these provisions would result in any significant additional cost to the federal government. Based on information from the DOJ, we do not expect that enact­ ment of this bill would result in a significant change in the govern­ ment's law enforcement practices or expenditures. S. 2575 would specifically authorize law enforcement efforts the DOJ is currently undertaking with other authority. If you wish further details on this estimate, we will be pleased to provide them. With best wishes, Sincerely, JAMES BLUM (for Rudolph G. Penner, Director). VIII. REGULATORY IMPACT STATEMENT In compliance with paragraph 11(b) of Rule XXVI of the Stand­ ing Rules of the Senate, the Committee has concluded that no sig­ nificant additional regulatory impact would be incurred in carrying out the provisions of this legislation. After due consideration, the Committee concluded that the changes in existing law contained in the bill will not increase or diminish any present regulatory re­ sponsibilities of the U.S. Department of Justice or any other de­ partment or agency affected by the legislation. IX. VOTE OF COMMITTEE On August 12, 1986, the Subcommittee on Patents, Copyrights, and Trademarks, with a quorum present, reported S. 2575, with an amendment in the nature of a substitute, to the Committee on the Judiciary by voice vote. On September 19, 1986, the Judiciary Com­ mittee adopted two further changes in the bill as reported by the Subcommittee. The Judiciary Committee, with a quorum present, and without objection heard, approved the amendment in the nature of a substitute. The Committee then favorably reported S. 2575, as amended, by unanimous consent. X. CHANGES IN EXISTING LAW In compliance with paragraph 12 of Rule XXVI, of the Standing Rules of the Senate, changes in existing law made by S. 2575 as reported are shown as follows (existing law proposed to be omitted is enclosed in brackets, new matter is printed in italic, and existing law in which no change is proposed is shown in roman): UNITED STATES CODE * * * * * * * 53 TITLE 18—CRIMES AND CRIMINAL PROCEDURE PART I. CRIMES Chapter Sec. ****** 1 * General provisions ******* 119. Wire and electronic communications interception and interception of oral communications * * * * * * * 121. Stored Wire and Electronic Communications and Transactional Records Access * * * * * * * 2510 2701 PART II-CRIMINAL PROCEDURE 201. General provisions * 3001 ****** 206. Pen Registers and Trap and Trace Devices * * * * 3121 * * * CHAPTER 65—MALICIOUS MISCHIEF Sec. * * * * * * * * 1367. Interference with the operation of a satellite. ******* §1367. Interference with the operation of a satellite (a) Whoever, without the authority of the satellite operator, inten­ tionally or maliciously interferes with the authorized operation of a communications or weather satellite or obstructs or hinders any sat­ ellite transmission shall be fined in accordance with this title or imprisoned not more than ten years of both. (b) This section does not prohibit any lawfully authorized investi­ gative, protective, or intelligence activity of a law enforcement agency or of an intelligence agency of the United States. * * * * * * * CHAPTER 109-SEARCHES AND SEIZURES * * * * * * * § 2232. Destruction or removal of property to prevent seizure (a) PHYSICAL INTERFERENCE WITH SEARCH. —Whoever, before during, or after seizure of any property by any person authorized to make searches and seizures, in order to prevent the seizure or securing of any goods, wares, or merchandise by such person, staves, breaks, throws overboard, destroys, or removes the same, shall be fined not more than $10,000 or imprisoned more than five years, or both. 54 (b) NOTICE OF SEARCH.—Whoever, having knowledge that any person authorized to make searches and seizures has been author­ ized or is otherwise likely to make a search or seizure, in order to prevent the authorized seizing or securing of any perosn, goods, wares, merchandise or other property, gives notice or attempts to give notice of the possible search or seizure to any person shall be fined not more than $10,000 or imprisoned not more than five years, or both. (c) NOTICE OF CERTAIN ELECTRONIC SURVEILLANCE.—Whoever, having knowledge that a Federal investigative or law enforcement officer has been authorized or has applied for authorization under chapter 119 to intercept a wire, oral, or electronic communication, in order to obstruct, impede, or prevent such interception, gives notice or attempts to give notice of the possible interception to any person shall be fined under this title or imprisoned not more than five years, or both. Whoever, having knowledge that a Federal officer has been au­ thorized or has applied for authorization to conduct electronic sur­ veillance under the Foreign Intelligence Surveillance Act (50 U.S.C. 1801, et seq.), in order to obstruct, impede, or prevent such activity, gives notice or attempts to give notice of the possible activity to any person shall be fined under this title or imprisoned not more than five years, or both. * * * * * * * CHAPTER 119—WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION AND INTERCEPTION OF ORAL COMMUNI­ CATIONS Sec. 2510. Definitions. 2511. Interception and disclosure of wire or oral communications prohibited. 2512. Manufacture, distribution, possession, and advertising of wire or oral commu­ nication intercepting devices prohibited. 2513. Confiscation of wire [or oral], oral, or electronic communication intercepting devices. 2514. Immunity of witnesses. 2515. Prohibition of use as evidence of intercepted wire [or oral], oral, or electronic communications. 2516. Authorization for interception of wire [or oral], oral, or electronic communi­ cations. 2517. Authorization for disclosure and use of intercepted wire [or oral], oral, or electronic communications. 2518. Procedure for interception of wire [or oral], oral, or electronic communica­ tions. 2519. Reports concerning intercepted wire [or oral], oral, or electronic communica­ tions. 2520. Recovery of civil damages authorized. 2521. Injunction against illegal interception. § 2510. Definitions As used in this chapter— (1) "wire communication" means any [communication] aural transfer made in whole or in part through the use of fa­ cilities for the transmission of communications by the aid of wire, cable, or other like connection between the point of origin and the point of reception (including the use of such con­ 55 nection in a switching station) furnished or operated by any person engaged [as a common carrier] in providing or operat­ ing such facilities for the transmission of interstate or foreign communications or communications affecting interstate or for­ eign commerce and such term includes any electronic storage of such communication, but such term does not include the radio portion of a cordless telephone communication that is transmit­ ted between the cordless telephone handset and the base unit; (2) "oral communication" means any oral communication ut­ tered by a person exhibiting an expectation that such commu­ nication is not subject to interception under circumstances jus­ tifying such expectation, but such term does not include any electronic communication; * * * * * * * (4) "intercept" means the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device. (5) "electronic mechanical, or other device" means any device or apparatus which can be used to intercept a wire [or oral], oral, or electronic communication other than— (a) any telephone or telegraph instrument, equipment or facility, or any component thereof, (i) furnished to the sub­ scriber or user by a [communications common carrier] provider of wire or electronic communication service in the ordinary course of its business and being used by the sub­ scriber or user in the ordinary course of its business or fur­ nished by such subscriber or user for connection to the fa­ cilities of such service and used in the ordinary course of its business; or (ii) being used by a communications common carrier in the ordinary course of its business, or by an investigative or law enforcement officer in the ordi­ nary course of his duties; * * * * * * * (8) "contents", when used with respect to any wire [or oral], oral, or electronic communication, includes any informa­ tion concerning the [identity of the parties to such communi­ cation or the existence,] substance, purport, or meaning of that communication; (9) "Judge of competent jurisdiction" means— (a) a judge of a United States district court or a United States court of appeals; and (b) a judge of any court of general criminal jurisdiction of a State who is authorized by a statute of that State to enter orders authorizing interceptions of wire [or oral], oral, or electronic communications; (10) "communication common carrier" shall have the same meaning which is given the term "common carrier" by section 153(h) of title 47 of the United States Code; [and] (11) "aggrieved person" means a person who was a party to any intercepted wire [or oral], oral, or electronic communica­ tion or a person against whom the interception was direct­ ed [.]; 56 (12) "electronic communication" means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electro­ magnetic, photoelectronic or photooptical system that affects interstate or foreign commerce, but does not include— (A) the radio portion of a cordless telephone communica­ tion that is transmitted between the cordless telephone handset and the base unit; (B) any wire or oral communication; (C) any communication made through a tone-only paging device; or (D) any communication from a tracking device (as de­ fined in section 3117 of this title); (13) "user" means any person or entity who— (A) uses an electronic communication service; and (B) is duly authorized by the provider of such service to engage in such use; (14) "electronic communications system" means any wire, radio, electromagnetic, photooptical or photoelectronic facilities for the transmission of electronic communications, and any computer facilities or related electronic equipment for the elec­ tronic storage of such communications; (15) "electronic communication service" means any service which provides to users thereof the ability to send or receive wire or electronic communications; (16) "readily accessible to the general public" means, with re­ spect to a radio communication, that such communication is not— (A) scrambled or encrypted; (B) transmitted using modulation techniques whose es­ sential parameters have been withheld from the public with the intention of preserving the privacy of such commu­ nication; (C) carried on a subcarrier or other signal subsidiary to a radio transmission; (D) transmitted over a communication system provided by a common carrier, unless the communication is a tone only paging system communication; or (E) transmitted on frequencies allocated under part 25, subpart D, E, or F of part 74, or part 94 of the Rules of the Federal Communications Commission, unless, in the case of a communication transmitted on a frequency allocated under part 74 that is not exclusively allocated to broadcast auxiliary services, the communication is a two-way voice communication by radio; (17) "electronic storage" means— (A) any temporary, intermediate storage of a wire or elec­ tronic communication incidental to the electronic transmis­ sion thereof; and (B) any storage of such communication by an electronic communication service for purposes of backup protection of such communication; and 57 (18) "aural transfer" means a transfer containing the human voice at any point between and including the point of origin and the point of reception. § 2511. Interception and disclosure of wire or oral communica­ tions prohibited (1) Except as otherwise specifically provided in this chapter any person who— (a) [willfully] intentionally intercepts, endeavors to inter­ cept, or procures any other person to intercept or endeaver to intercept, any wire [or oral] oral, or electronic communica­ tion; (b) [willfully] intentionally uses, endeavors to use, or pro­ cures any other person to use or endeavor to use any electron­ ic, mechanical, or other device to intercept any oral communi­ cation when— (i) such device is affixed to, or otherwise transmits a signal through, a wire, cable, or other like connection used in wire communication; or (ii) such device transmits communications by radio, or interferes with the transmission of such communication; or (iii) such person knows, or has reason to know, that such device or any component thereof has been sent through the mail or transported in interstate or foreign commerce; or (iv) such use or endeavor to use (A) takes place on the permises of any business or other commercial establish­ ment the operations of which affect interstate or foreign commerce; or (B) obtains or is for the purpose of obtaining information relating to the operations of any business or other commercial establishment the operations of which affect interstate or foreign commerce; or (v) such person acts in the District of Columbia, the Commonwealth of Puerto Rico, or any territory or posses­ sion of the United States; (c) [willfully] intentionally discloses, or endeavors to dis­ close, to any other person the contents of any wire [or oral] oral, or electronic communication, knowing or have reason to know that the information was obtained through the intercep­ tion of a wire [or oral] oral, or electronic communication in violation of this subsection; or (d) [willfully] intentionally uses, or endeavors to use, the contents of any wire [or oral] oral, or electronic communica­ tion, knowing or having reason to know that the information was obtained through the interception of a wire [or oral] oral, or electronic communication in violation of this subsec­ tion; [shall be fined not more than $10,000 or imprisoned not more than five years, or both.] shall be punished as provided in subsection (4) or shall be subject to suit as provided in sub­ section (5). (2)(a)(i) It shall not be unlawful under this chapter for an opera­ tor of a switchboard, or an officer, employee, or agent of [any com­ munication common carrier,] a provider of wire or electronic com­ 58 munication service, whose facilities are used in the transmission of a wire communication, to intercept, disclose, or use that communi­ cation in the normal course of his employment while engaged in any activity which is a necessary incident to the rendition of his service or to the protection of the rights or property [of the carrier of such communication: Provided, That said communication common carriers] of the provider of that service, except that a pro­ vider of wire communication service to the public shall not utilize service observing or random monitoring except for mechanical or service quality control checks. (ii) Notwithstanding any other law, providers of wire or electronic communication service, [communication common carriers,] their officers, employees, and agents, landlords, custodians, or other per­ sons, are authorized to provide information facilities, or technical assistance to persons authorized by law to intercept wire [or oral], oral, or electronic communications or to conduct electronic surveillance, as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978, if [the common carrier,] such provider its officers, employees, or agents, landlord, custodian, or other spec­ ified person has been provided with— (A) a court order directing such assistance signed by the au­ thorizing judge, or (B) a certification in writing by a person specified in section 2518(7) of this title or the Attorney General of the United States that no warrant or court order is required by law, that all statutory requirements have been met, and that the speci­ fied assistance is required. setting forth the period of time during which the provision of the information, facilities, or technical assistance is authorized and specifying the information, facilities, or technical assistance re­ quired. No [communication common carrier] provider of wire or electronic communication service officer, employee, or agent there­ of, or landlord, custodian, or other specified person shall disclose the existence of any interception or surveillance or the device used to accomplish the interception or surveillance with respect to which the person has been furnished an order or certification under this subparagraph, except as may otherwise be required by legal process and then only after prior notification to the Attorney General or to the principal prosecuting attorney of a State or any political subdivsion of a State, as may be appropriate. Any [viola­ tion of this subparagraph by a communication common carrier or an officer, employee, or agent thereof] such disclosure, shall render [the carrier] such person liable for the civil damages pro­ vided for in section 2520. No cause of action shall lie in any court against any [communication common carrier] provider of wire or electronic communication service its officers, employees, or agents, landlord, custodian, or other specified person for providing infor­ mation, facilities, or assistance in accordance with the terms of [an order of certification under this subparagraph] a court order or certification under this chapter. (b) It shall not be unlawful under this chapter for an officer, em­ ployee, or agent of the Federal Communications Commission, in the normal course of his employment and in discharge of the moni­ toring responsibilities exercised by the Commission in the enforce­ 59 ment of chapter 5 of title 57 of the United States Code, to intercept a wire or electronic communication, or oral communication trans­ mitted by radio, or to disclose or use the information thereby ob­ tained. (c) It shall not be unlawful under this chapter for a person acting under color of law to intercept a wire [or oral], oral, or electronic communication, where such person is a party to the communica­ tion or one of the parties to the communication has given prior consent to such interception. (d) It shall not be unlawful under this chapter for a person not acting under color of law to intercept a wire [or oral], oral, or electronic, communication where such person is a party to the com­ munication or where one of the parties to the communication has given prior consent to such interception unless such communica­ tion is intercepted for the purpose of committing any criminal or tortious act in violation of the Constitution or laws of the United States or of any State [or for the purpose of committing any other injurious act]. (e) Notwithstanding any other provision of this title or section 705 or 706 of the Communications Act of 1934, it shall not be un­ lawful for an office, employee, or agent of the United States in the normal course of his official duty to conduct electronic surveil­ lance, as defined in section 101 of the Foreign Intelligence Surveil­ lance Act of 1978, as authorized by that Act. (f) Nothing contained in this chapter or chapter 121, or section 705 of the Communications Act of 1934, shall be deemed to affect the acquisition by the United States Government of foreign intelli­ gence information from international or foreign communication [ b y ] , or foreign intelligence activities conducted in accordance with otherwise applicable Federal law involving a foreign electronic communications system, utilizing a means other than electronic surveillance as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978, and procedures in this chapter and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 of such Act, and the interception of domestic wire and oral communi­ cations may be conducted. (g) It shall not be unlawful under this chapter or chapter 121 of this title for any person— (i) to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public; (ii) to intercept any radio communication which is transmit­ ted— (I) by any station for the use of the general public, or that relates to ships, aircraft, vehicles, or persons in distress: (II) by any governmental, law enforcement, civil defense private land mobile, or public safety communications system, including police and fire, readily accessible to the general public; (III) by a station operating on an authorized frequency within the bands allocated to the amateur, citizens band, or general mobile radio services; or 60 (IV) by any marine or aeronautical communications system; (iii) to engage in any conduct which— (I) is prohibited by section 633 of the Communications Act of 1934; or (II) is excepted from the application of section 705(a) of the Communications Act of 1934 by section 705(b) of that Act; (iv) to intercept any wire or electronic communication the transmission of which is causing harmful interference to any lawfully operating station or consumer electronic equipment, to the extent necessary to identify the source of such interference; or (v) for other users of the same frequency to intercept any radio communication made through a system that utilizes frequencies monitored by individuals engaged in the provision or the use of such system, if such communication is not scrambled or encrypt­ ed. (h) It shall not be unlawful under this chapter— (i) to use a pen register or a trap and trace device (as those terms are defined for the purposes of chapter 206 (relating to pen registers and trap and trace devices) of this title); or (ii) for a provider of electronic communication service to record the fact that a wire a electronic communication was ini­ tiated or completed in order to protect such provider, another provider furnishing service toward the completion of the wire or electronic communication, or a user of that service, from fraud­ ulent, unlawful or abusive use of such service. (3)(a) Except as provided in paragraph (b) of this subsection a person or entity providing an electronic communication service to the public shall not intentionally divulge the contents of any com­ munication (other than one to such person or entity, or an agent thereof) while in transmission on that service to any person or entity other than an addressee or intended recipent of such communication or an agent of such addressee or intended recipient. (b) A person or entity providing electronic communication service to the public may divulge the contents of any such communication— (i) as otherwise authorized in section 2511(2)(a) or 2517 of this title; (ii) with the lawful consent of the originator or any addressee or intended recipient of such communication; (iii) to a person employed or authorized, or whose facilities are used, to forward such communication to its destination; or (iv) which were inadvertently obtained by the service provider and which appear to pertain to the commission of a crime, if such divulgence is made to a law enforcement agency. (4)(a) Except as provided in paragraph (b) of this subsection or in subsection (5), whoever violates subsection (1) of this section shall be fined under this title or imprisoned not more than five year, or both. (b) If the offense is a first offense under paragraph (a) of this sub­ section and is not for a tortious or illegal purpose or for purposes of direct or indirect commercial advantage or private commercial gain, and the wire or electronic communication with respect to which the 61 offense under paragraph (a) is a radio communication that is not scrambled or encrypted, then— (i) If the communication is not the radio portion of a cellular telephone communication, a public land mobile radio service communication or a paging service communication, and them conduct is not that described in subsection (5), the offender shall be fined under this title or imprisoned not more than one year, or both, and (ii) if the communication is the radio portion of a cellular telephone communication, a public land mobile radio service communication or a paging service communication, the offender shall be fined not more than 500. (c) Conduct otherwise an offense under this subsection that con­ sists of or relates to the interception of a satellite transmission that is not encrypted or scrambled and that is transmitted— ((i) to a bradcasting station for purposes of retransmission to the general public; or (ii) as an audio subcarrier intended for redistribution to fa­ cilities open to the public, but not including data transmissions or telephone calls, is not an offense under this subsection unless the conduct is for the purposes of direct or indirect commercial advantage or private fi­ nancial gain. (5)(a)(i) If the communication is— (A) a private satellite video communication that is not scram­ bled or encrypted and the conduct in violation of this chapter is the private viewing of that communication and is not for a tor­ tious or illegal purpose or for purposes of direct or indirect com­ mercial advantage or private commercial gain; or (B) a radio communication that is transmitted on frequencies allocated under subpart D of part 74 of the rules of the Federal Communications Commission that is not scrambled or encrypt­ ed and the conduct in violation of this chapter is not for a tor­ tious or illegal purpose or for purposes of direct or indirect com­ mercial advantage or private commercial gain, then the person who engages in such conduct shall be subject to suit by the Federal Government in a court of competent jurisdiction. (ii) In an action under this subsection— (A) if the violation of this chapter is a first offense for the person under paragraph (a) of subsection (4) and such person has not been found liable in a civil action under section 2520 of this title, the Federal Government shall be entitled to appropri­ ate injunctive relief; and (B) if the violation of this chapter is a second or subsequent offense under paragraph (a) of subsection (4) or such person has been found liable in any prior civil action under section 2520, the person shall be subject to a mandatory $500 civil fine. (b) The court may use any means within its authority to enforce an injunction issued under paragraph (ii)(A), and shall impose a civil fine of not less than $500 for each violation of such an injunc­ tion, 62 § 2512. Manufacture, distribution, possession, and advertising of wire or oral communication intercepting devices pro­ hibited (1) Except as otherwise specifically provided in this chapter, any person who [willfully] intentionally— (a) sends through the mail, or sends or carriers in interstate or foreign commerce, any electronic, mechanical, or other device, knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire [or oral], oral, or electronic communications; (b) manufacturers, assembles, possesses, or sells any electron­ ic, mechanical, or other device, knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire [or oral], oral, or electronic communications, and that such device or any component thereof has been or will be sent through the mail or transported in interstate or foreign commerce; or (c) places in any newspaper, magazine, handbill, or other publication any advertisement of— (i) any electronic, mechanical, or other device knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surrepti­ tious interception of wire [or oral], oral, or electronic communications; or (ii) any other electronic, mechanical, or other device, where such advertisement promotes the use of such device for the purpose of the surreptitious interception of wire [or oral], oral, or electronic communications, knowing or having reason to know that such advertisement will be sent through the mail or transported in interstate or foreign commerce, shall be fined not more than $10,000 or imprisoned not more than five years, or both. (2) It shall not be unlawful under this section for— (a) [ a communications common carrier] a provider of wire or electronic communication service or an officer, agent, or em­ ployee of, or a person under contract with, [ a communications common carrier] such a provider, in the normal course of the [communications common carrier's business] business of pro­ viding that wire or electronic communication service, or (b) an officer, agent, or employee of, or a person under con­ tract with, the United States, a State, or a political subdivision thereof, in the normal course of the activities of the United States, a State, or a political subdivision thereof, to send through the mail, send or carry in interstate or foreign com­ merce, or manufacture, assemble, possess, or sell any electron­ ic, mechanical, or other device knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire [or oral], oral, or electronic communications. 63 § 2513. Confiscation of wire [or oral], oral, or electronic commu­ nication intercepting devices Any electronic, mechanical, or other device used, sent, carried, manufactured, assembled, possessed, sold, or advertised in violation of section 2511 or section 2512 of this chapter may be seized and forfeited to the United States. All provisions of law relating to (1) the seizure, summary and judicial forfeiture, and condemnation of vessels, vehicles, merchandise, and baggage for violations of the customs laws contained in title 19 of the United States Code, (2) the disposition of such vessels, vehicles, merchandise, and baggage or the proceeds from the sale thereof, (3) the remission or mitigation of such forfeiture, (4) the compromise of claims, and (5) the award of compensation to informers in respect of such forfeitures, shall apply to seizures and forfeitures incurred, or alleged to have been incurred, under the provisions of this section, insofar as applicable and not inconsistent with the provisions of this section; except that such duties as are imposed upon the collector of customs or any other person with respect to the seizure and forfeiture of vessels, vehicles, merchandise, and baggage under the provisions of the cus­ toms laws contained in title 19 of the United States Code shall be performed with respect to seizure and forfeiture of electronic, me­ chanical, or other intercepting devices under this section by such officers, agents, or other persons as may be authorized or designat­ ed for that purpose of the Attorney General. §2515. Prohibition of use as evidence of intercepted wire [or oral], oral, or electronic communications Whenever any wire [or oral], oral, or electronic communication has been intercepted, no part of the contents of such communica­ tion and no evidence derived therefrom may be received in evi­ dence in any trial, hearing, or other proceeding in or before any court, grand jury, department, officer, agency, regulatory body, leg­ islative committee, or other authority of the United States, a State, or a political subdivision thereof if the disclosure of that informa­ tion would be in violation of this chapter. §2516. Authorization for interception of wire [or oral], oral, or electronic communications (1) The Attorney General, Deputy Attorney General, Assoicate Attorney General, [ o r ] any Assistant Attorney General, any acting Assistant Attorney General, or any Deputy Assistant Attorney General in the Criminal Division specially designated by the Attor­ ney General, may authorize an application to a Federal judge of competent jurisdiction for, and such judge may grant in conformity with section 2518 of this chapter an order authorizing or approving the interception of wire of oral communications by the Federal Bureau of Investigation, or a Federal agency having responsibility for the investigation of the offense as to which the application is made, when such interception may provide or has provided evi­ dence of— (a) any offense punishable by death or by imprisonment for more than one year under sections 2274 through 2277 of title 42 of the United States Code (relating to the enforcement of 64 the Atomic Energy Act of 1954), section 2284 of title 42 of the United States Code (relating to sabotage of nuclear facilities or fuel), or under the following chapters of this title: chapter 37 (relating to espionage), chapter 105 (relating to sabotage), chap­ ter 115 (relating to treason), [ o r ] chapter 192 (relating to riots), chapter 65 (relating to malicious matter mischief), chap­ ter 111 (relating to destruction of vessels), or chapter 81 (relat­ ing to piracy); (b) a violation of section 186 or section 501(c) of title 29, United States Code (dealing with restrictions on payments and loans to labor organizations), or any offense which involves murders, kidnapping, robbery, or extortion, and which is pun­ ishable under this title; (c) any offense which is punishable under the following sections of this title: section 201 (bribery of public officials and witnesses), section 224 (bridery in sporting contests), subsection (d), (e), (f), (g), (h), or (i) of section 844 (unlawful use of explosives), section 1084 (transmission of wagering information), section 751 (relating to escape), sections 1503, 1512, and 1513 (influencing or injuring an of­ ficer, juror, or witness generally), section 1510 (obstruction of crimi­ nal investigations), section 1511 (obstruction of State or local law enforcement), section 1751 (Presidential and Presidential staff as­ sassination, kidnapping, and assualt), section 1951 (interference with commerce by threats or violence), section 1952 (interstate and foreign travel or transporation in aid of racketeering enterprises), section 1952A (relating to use of interstate commerce facilities in the commission of murder for hire), section 1952B (relating to vio­ lent crimes in aid of racketeering activity), section 1954 (offer ac­ ceptance, or solicitation to influence operations of employee benefit plan), section 1955 (prohibition of business enterprises of gambling), section 659 (theft from interstate shipment), section 664 (embezzle­ ment from pension and welfare funds), section 1343 (fraud by wire, radio, or television), section 2252 or 2253 (sexual exploitation of children), Section 2251 and 2252 (sexual exploitation of children), section [2314] 2312, 2313, 2314, and 2315 (interstate transporta­ tion of stolen property), the second section 2320 (relating to traffick­ ing in certain motor vehicles or motor vehicle parts), section 1203 (relating to hostage taking), section 1029 (relating to fraud and re­ lated activity in connection with access devices), section 3146 (relat­ ing to penalty for failure to appear), section 3521(b)(3) (relating to witness relocation and assistance), section 32 (relating to destruction of aircraft or aircraft facilities), section 1963 violations with respect to racketeer influenced and corrupt organizations), section 115 (re­ lating to threatening or retaliating against a Federal official), the section in chapter 65 relating to destruction of an energy facility, and section 1341 (relating to mail fraud), [or] section 351 (vola­ tions with respect to congressional, Cabinet, or Supreme Court as­ sissination, kidnapping, and assault), section 831 (relating to prohib­ ited transaction involving nuclear materials), section 33 (relating to destruction of motor vehicles or motor vehicle facilities), or section 1992 (relating to wrecking trains); (d) any offense involving counterfeiting punishable under section 471, 472, or 473 of this title; 65 (e) any offense involving fraud connected with a case under title 11 or the manufacture, importation, receiving, concealment, buying, selling, or otherwise dealing in narcotic drugs, marihuana, or other dangerous drugs, punishable under any law of the United States; (f) any offense including extortionate credit transactions under sections 892, 893, or 894 of this title; (g) a violation of section 5322 of title 31, United States Code (dealing with the reporting of currency transactions); f o r ] (h) any felony violation of sections 2511 and 2512 (relating to interception and disclosure of certain communications and to cer­ tain intercepting devices) of this title; (i) any violation of section 1679(c)(2)(relating to destruction of a natural gas pipeline) or subsection (i) or (n) of the United States Code; (j) any criminal violation of section 2778 of title 22 (relating to the Arms Export Control Act); or (k) the location of any fugitive from justice from an offense de­ scribed in this section; or [(h)](I) any conspiracy to commit any of the foregoing offenses. (2) The principal prosecuting attorney of any State, or the princi­ pal prosecuting attorney of any political subdivision thereof, if such attorney is authorized by a statute of that State to make applica­ tion to a State court judge of competent jurisdiction for an order authorizing or approving the interception of wire [or oral], oral, or electronic communications, may apply to such judge for, and such judge may grant in conformity with section 2518 of this chap­ ter and with the applicable State statute an order authorizing, or approving the interception of wire [or oral] oral, or electronic communications by investigative or law enforcement of officers having responsibility for the investigation of the offense as to which the application is made, when such interception may provide or has provided evidence of the commission of the offense of murder, kidnapping, gambling, robbery, bribery, extortion, or deal­ ing in narcotic drugs, marihuana or other dangerous drugs, or other crime dangerous to life, limb, or property, and punishable by imprisonment for more than one year, designated in any applicable State statute authorizing such interception, or any conspiracy to commit any of the foregoing offenses. (3) Any attorney for the Government (as such term is defined for the purposes of the Federal Rules of Criminal Procedure) may au­ thorize an application to a Federal judge of competent jurisdiction for, arid such judge may grant, in conformity with section 2518 of this title, an order authorizing or approving the interception of elec­ tronic communications by an investigative or law enforcement offi­ cer having responsibility for the investigation of the offense as to which the application is made, when such interception may provide or has provided evidence of any Federal felony. § 2517. Authorization for disclosure and use of intercepted wire [ o r o r a l ] , oral, or electronic communication (1) Any investigative or law enforcement officer who, by any means authorized by this chapter, has obtained knowledge of the contents of any wire [or oral], oral, or electronic communication, 66 or evidence derived therefrom may disclose such contents to an­ other investigative or law enforcement officer to the extent that such disclosure is appropriate to the proper performance of the offi­ cial duties of the officer making or receiving the disclosure. (2) Any investigative or law enforcement officer who, by any means authorized by this chapter, has obtained knowledge of the contents of any wire [or oral], oral, or electronic communication or evidence derived therefrom any use such contents to the extent such use is appropriate to the proper performance of his official duties. (3) Any person who has received, by any means authorized by this chapter, any information concerning a wire [or oral], oral, or electronic communication, or evidence derived therefrom intercept­ ed in accordance with the provisions of this chapter may disclose the contents of that communication or such derivative evidence while giving testimony under oath or affirmation in any proceeding held under the authority of the United States or of any State or political subdivision thereof. (4) No otherwise privileged wire [or oral], oral, or electronic communication intercepted in accordance with, or in violation of, the provisions of this chapter shall lose its privileged character. (5) When an investigative or law enforcement officer, while en­ gaged in intercepting wire or oral communications in the manner authorized herein, intercepts wire [or oral], oral, or electronic communications relating to offenses other than those specified in the order of authorization or approval, the contents thereof, and evidence derived therefrom, may be disclosed or used as provided in subsections (1) and (2) of this section. Such contents and any evi­ dence derived therefrom may be used under subsection (3) of this section when authorized or approved by a judge of competent juris­ diction where such judge finds on subsequent application that the contents were otherwise intercepted in accordance with the provi­ sions of this chapter. Such application shall be made as soon as practicable. § 2518. Procedure for interception of wire [or oral], oral, or elec­ tronic communications (1) Each application for an order authorizing or approving the interception of a wire [or oral], oral, or electronic communication under this chapter shall be made in writing upon oath or affirma­ tion to a judge of competent jurisdiction and shall state the appli­ cant's authority to make such application. Each application shall include the following information: (a) the identity of the investigative or law enforcement offi­ cer making the application, and the officer authorizing the ap­ plication; (b) a full and complete statement of the facts and circum­ stances relied upon by the applicant, to justify his belief that an order should be issued, including (i) details as to the par­ ticular offense that has been, is being, or is about to be com­ mitted, (ii) except as provided in subsection (11), a particular de­ scription of the nature and location of the facilities from which or the place where the communication is to be intercepted, (iii) a particular description of the type of communications sought 67 to be intercepted, (iv) the identity of the person, if known, com­ mitting the offense and whose communications are to be inter­ cepted; (c) a full and complete statement as to whether or not other investigative procedures have been tried and failed or why they reasonably appear to be unlikely to succeed if tried or to be too dangerous; (d) a statement of the period of time for which the intercep­ tion is required to be maintained. If the nature of the investi­ gation is such that the authorization for interception should not automatically terminate when the described type of com­ munication has been first obtained, a particular description of facts establishing probable cause to believe that additional communications of the same type will occur thereafter; (e) a full and complete statement of the facts concerning all previous applications known to the individual authorizing and making the application, made to any judge for authorization to intercept, or for approval of interceptions of, wire [or oral], oral, or electronic communications involving any of the same persons, facilities or places specified in the application; and (f) where the application is for the extension of an order, a statement setting forth the results thus far obtained from the interception, or a reasonable explanation of the failure to obtain such results. (2) The judge may require the applicant to furnish additional tes­ timony or documentary evidence in support of the application. (3) Upon such application the judge may enter an ex parte order, as requested or as modified, authorizing or approving interception of wire [or oral], oral, or electronic communications within the territorial jurisdiction of the court in which the judge is sitting (and outside that jurisdiction but within the United States in the case of a mobile interception device authorized by a Federal court within such jurisdiction) if the judge determines on the basis of the facts submitted by the applicant that— (a) there is probable cause for belief that an individual is committing, has committed, or is about to commit a particular offense enumerated in section 2516 of this chapter. (b) there is probable cause for brief that particular communi­ cations concerning that offense will be obtained through such interception; (c) normal investigative procedures have been tried and have failed or reasonably appear to be unlikely to succeed if tried or to be too dangerous; (d) except as provided in subsection (11), there is probable cause for belief that the facilities from which, or the place where the wire [or oral], oral, or electronic communications are to be intercepted are being used, or are about to be used, in connection with the commission of such offense, or are leased to, listed in the name of, or commonly used by such person. (4) Each order authorizing or approving the interception of any wire [or oral], oral, or electronic communication under this chap­ ter shall specify— (a) the identity of the person, if known, whose communica­ tions are to be intercepted; 68 (b) the nature and location of the communications facilities as to which, or the place where, authority to intercept is grant­ ed; (c) a particular description of the type of communication sought to be intercepted, and a statement of the particular of­ fense to which it relates; (d) the identity of the agency authorized to intercept the communications, and of the person authorizing the application; and (e) the period of time during which such interception is au­ thorized, including a statement as to whether or not the inter­ ception shall automatically terminate when the described com­ munication has been first obtained. An order authorizing the interception of a wire [or oral], oral, or electronic communication under this chapter shall, upon request of the applicant, direct that a [communication common carrier],pro­ vider of wire or electronic communication service, landlord, custodi­ an or other person shall furnish the applicant forthwith all infor­ mation, facilities, and technical assistance necessary to accomplish the interception unobtrusively and with a minimum of interference with the services that such [carrier] service provider, landlord, custodian, or person is according the person whose communications are to be intercepted. Any [communication common carrier] pro­ vider of wire or electronic communication service, landlord, custo­ dian or other person furnishing such facilities or technical assist­ ance shall be compensated therefor by the applicant [at the pre­ vailing rates.] for reasonable express incurred in providing such fa­ cilities or assistance. (5) No order entered under this section may authorize or approve the interception of any wire [or oral], oral, or electronic communi­ cation for any period longer than is necessary to achieve the objec­ tive of the authorization, nor in any event longer than thirty days. Such thirty-day period begins on the earlier of the day on which the investigative or law enforcement officer first begins to conduct an interception under the order or ten days after the order is entered. Extensions of an order may be granted, but only upon application for an extension made in accordance with subsection (1) of this sec­ tion and the court making the findings required by subsection (3) of this section. The period of extension shall be no longer than the au­ thorizing judge deems necessary to achieve the purposes for which it was granted and in no event for longer than thirty days. Every order and extension thereof shall contain a provision that the au­ thorization to intercept shall be executed as soon as practicable, shall be conducted in such a way as to minimize the interception of communications not otherwise, subject to interception under this chapter, and must terminate upon attainment of the authorized ob­ jective, or in any event in thirty days. In the event the intercepted communications is in a code or foreign language, and an expert in that foreign language or code is not reasonably available during the interception period, minimization may be accomplished as soon as practicable after such interception. An interception under this chap­ ter may be conducted in whole or in part by Goverment personnel, or by an individual operating under a contract with the Government, 69 acting under the supervision of an investigative or law enforcement officer authorized to conduct the interception. (6) Whenever an order authorizing interception is entered pursu­ ant to this chapter, the order may require reports to be made to the judge who issued the order showing what progress has been made toward achievement of the authorized objective and the need for continued interception. Such reports shall be made at such in­ tervals as the judge may require. (7) Notwithstanding any other provision of this chapter, any in­ vestigative or law enforcement officer, specially designated by the Attorney General, the Deputy Attorney General, the Associate At­ torney General, or by the principal prosecuting attorney of any State or subdivision thereof acting pursuant of that State, who rea­ sonably determines that— (a) an emergency situation exists that involves— (i) immediate danger of death or serious physical injury to any person. (ii) conspiratorial activities threatening the national se­ curity interest, or (iii) conspiratorial activities characteristic of organized crime, that requires a wire [or oral], oral, or electronic communica­ tion to be intercepted before an order authorizing such inter­ ception can, with due diligence, be obtained, and (b) there are grounds upon which an order could be entered under this chapter to authorize such interception. may intercept such wire [or oral], oral, or electronic communica­ tion if an application for an order approving the interception is made in accordance with this section within forty-eight hours after the interception has occurred, or begins to occur. In the absence of an order, such interception shall immediately terminate when the communication sought is obtained or when the application for the order is denied, whichever is earlier. In the event such application for approval is denied, or in any other case where the interception is terminated without an order having been issued, the contents of any wire [or oral], oral, or electronic communication intercepted shall be treated as having been obtained in violation of this chap­ ter, and an inventory shall be served as provided for in subsection (d) of this section on the person named in the application. (8)(a) The contents of any wire [or oral], oral, or electronic com­ munication intercepted by any means authorized by this chapter shall, if possible, be recorded on tape or wire or other comparable device. The recording of the contents of any wire [or oral], oral, or electronic communication under this subsection shall be done in such a way as will protect the recording from editing or other al­ terations. Immediately upon the expiration of the period of the order, or extensions thereof, such recordings shall be made avail­ able to the judge issuing such order and sealed under this direc­ tions. Custody of the recordings shall be wherever the judge orders. They shall not be destroyed except upon an order of the issuing or denying judge and in any event shall be kept for ten years. Dupli­ cate recordings may be made for use or disclosure pursuant to the provisions of subsections (1) and (2) of section 2517 of this chapter for investigations. The presence of the seal provided for by this sub­ 70 section, or a satisfactory explanation for the absence thereof, shall be a prerequisite for the use or disclosure of the contents of any wire [or oral], oral, or electronic communication or evidence de­ rived therefrom under subsection (3) of section 2517. (b) Applications made and orders granted under this chapter shall be sealed by the judge. Custody of the applications and orders shall be wherever the judge directs. Such applications and orders shall be disclosed only upon a showing of good cause before a judge of competent jurisdiction and shall not be destroyed except on order of the issuing or denying judge, and in any event shall be kept for ten years. (c) Any violation of the provisions of this subsection may be pun­ ished as contempt of the issuing or denying judge. (d) Within a reasonable time but not later than ninety days after the filing of an application for an order of approval under section 2518(7)(b) which is denied or the termination of the period of an order or extensions thereof, the issuing or denying judge shall cause to be served, on the persons named in the order or the appli­ cation, and such other parties to intercepted communications as the judge may determine in his discretion that is in the interest of justice, an inventory which shall include notice of— (1) the fact of the entry of the order or the application; (2) the date of the entry and the period of authorized, ap­ proved or disapproved interception, or the denial of the appli­ cation; and (3) the fact that during the period wire [or oral], oral, or electronic communications were or were not intercepted. The judge, upon the filing of a motion, may in his discretion make available to such person or his counsel for inspection such portions of the intercepted communications, applications and orders as the judge determines to be in the interest of justice. On an ex parte showing of good cause to a judge of competent jurisdiction the serv­ ing of the inventory required by this subsection may be postponed. (9) The contents of any wire [or oral], oral, or electronic commu­ nication intercepted pursuant to this chapter or evidence derived therefrom shall not be received in evidence or otherwise disclosed in any trial, hearing, or other proceeding in a Federal or State court unless each party, not less then ten days before the trial, hearing, or proceeding, has been furnished with a copy of the court order, and accompanying application, under which the interception was authorized or approved. This ten-day period may be waived by the judge if he finds that it was not possible to furnish the party with the above information ten days before the trial, hearing, or proceeding and that the party will not be prejudiced by the delay in receiving such information. (10)(a) Any aggrieved person in any trial, hearing, or proceeding in or before any court, department, officer, agency, regulatory body, or other authority of the United States, a State, or a political subdivision thereof, may move to suppress the contents of any wire or oral communication intercepted pursuant to this chapter, or evi­ dence derived therefrom, on the grounds that— (i) the communication was unlawfully intercepted; (ii) the order of authorization or approval under which it was intercepted is insufficient on its face; or 71 (iii) the interception was not made in conformity with the order of authorization or approval. Such motion shall be made before the trial, hearing, or proceeding unless there was no opportunity to make such motion or the person was not aware of the grounds of the motion. If the motion is grant­ ed, the contents of the intercepted wire or oral communication, or evidence derived therefrom, shall be treated as having been ob­ tained in violation of this chapter. The judge, upon the filing of such motion by the aggrieved person, may in his discretion make available to the aggrieved person or his counsel for inspection such portions of the intercepted communication or evidence derived therefrom as the judge determines to be in the interests of justice. (b) In addition to any other right to appeal, the United States shall have the right to appeal from an order granting a motion to suppress made under paragraph (a) of this subection, or the denial of an application for an order of approval, if the United States at­ torney shall certify to the judge or other official granting such motion or denying such application that the appeal is not taken for purposes of delay. Such appeal shall be taken within thirty days after the date the order was entered and shall be diligently pros­ ecuted. (c) The remedies and sanctions described in this chapter with re­ spect to the interception of electronic communications are the only judicial remedies and sanctions for nonconstitutional violations of this chapter involving such communications. (11) The requirements of subsections (1)(b)(ii) and (3)(d) of the sec­ tion relating to the specification of the facilities from which, or the place where, the communication is to be intercepted do not apply if­ (a) in the case of an application with respect to the intercep­ tion of an oral communication— (i) the application is by a Federal investigative or law en­ forcement officer and is approved by the Attorney General, the Deputy Attorney General, the Associate Attorney Gener­ al, an Assistant Attorney General, or an acting Assistant Attorney General; (ii) the application contains a full and complete state­ ment as to why such specification is not practical and iden­ tifies the person committing the offense and whose commu­ nications are to be intercepted; and (iii) the judge finds that such specification is not practi­ cal; and (b) in the case of an application with respect to a wire or elec­ tronic communication— (i) the application is by a Federal investigative or law en­ forcement officer and is approved by the Attorney General, the Deputy Attorney General, the Associate Attorney Gener­ al, an Assistant Attorney General, or an acting Assistant Attorney General; (ii) the application identifies the person believed to be committing the offense and whose communications are to be intercepted and the applicant makes a showing of a pur­ pose, on the part of that person, to thwart interception by changing facilities; and 72 (iii) the judge finds that such purpose has been adequate­ ly shown. (12) An interception of a communication under an order with re­ spect to which the requirements of subsections (l)(b)(ii) and (3)(d) of this section do not apply by reason of subsection (11) shall not begin until the facilities from which, or the place where, the communica­ tion is to be intercepted is ascertained by the person implementing the interception order. A provider of wire or electronic communica­ tions service that has received an order as provided for in subsection (11)(b)may move the court to modify or quash the order on the ground that its assistance with respect to the interception cannot be performed in a timely or reasonable fashion. The court, upon notice to the government, shall decide such a motion expeditiously. § 2519. Reports concerning intercepted wire [or oral], oral, or electronic communications (1) Within thirty days after the expiration of an order (or each extension thereof) entered under section 2518, or the denial of an order approving an interception, the issuing or denying judge shall report to the Administrative Office of the United States Courts— (a) the fact that an order or extension was applied for; (b) the kind of order or extension applied for (including whether or not the order was an order with respect to which the requirements of sections 2518(1)(b)(ii) and 2581(3)(d) of this title did not apply by reason of section 2518(11) of title); (c) the fact that the order or extension was granted as ap­ plied for, was modified, or was denied; (d) the period of interceptions authorized by the order, and the number and duration of any extensions of the order; (e) the offense specified in the order or application, or exten­ sion or an order; (f) the identity of the applying investigative or law enforce­ ment officer and agency making the application and the person authorizing the application; and (g) the nature of the facilities from which or the place where communications were to be intercepted. (2) In January of each year the Attorney General, an Assistant Attorney General specially designated by the Attorney General, or the principal prosecuting attorney of a State, or the principal pros­ ecuting attorney for any political subdivision of a State, shall report to the Administrative Office of the United States Courts— (a) the information required by paragraphs (a) through (g) of subsection (1) of this section with respect to each application for an order or extension made during the preceding calendar year; (b) a general description of the interceptions made under such order or extension, including (i) the approximate nature and frequency of incriminating communications intercepted, (ii) the approximate nature and frequency of other communica­ tions intercepted, (iii) the approximate number of persons whose communications were intercepted, and (iv) the approxi­ mate nature, amount, and cost of the manpower and other re­ sources used in the interceptions; 73 (c) the number of arrests resulting from interceptions made under such order or extension, and the offenses for which ar­ rests were made; (d) the number of trials resulting from such interceptions; (e) the number of motions to suppress made with respect to such interceptions, and the number granted or denied; (f) the number of convictions resulting from such intercep­ tions and the offenses for which the convictions were obtained and a general assessment of the importance of the intercep­ tions; and (g) the information required by paragraphs (b) through (f) of this subsection with respect to orders or extensions obtained in a preceding calendar year. (3) In April of each year the Director of the Administrative Office of the United States Courts shall transmit to the Congress a full and complete report concerning the number of applications for orders authorizing or approving the interception of wire [or oral], oral, or electronic communications pursuant to this chapter and the number of orders and extensions granted or denied pursuant to this chapter during the preceding calendar year. Such report shall include a summary and analysis of the data required to be filed with the Administrative Office by subsections (1) and (2) of this sec­ tion. The Director of the Administrative Office of the United States Courts is authorized to issue binding regulations dealing with the content and form of the reports required to be filed by subsections (1) and (2) of this section. § 2520. Recovery of civil damages authorized [Any person whose wire or oral communication is intercepted, disclosed, or used in violation of this chapter shall (1) have a civil cause of action against any person who intercepts, discloses, or uses, or procures any other person to intercept, disclose, or use such communications, and (2) be entitled to recover from any such person— [(a) actual damages but not less than liquidated damages computed at the rate of $100 a day for each day of violation or $1,000, whichever is higher; [(b) punitive damages; and [(c) a reasonable attorney's fee and other litigation costs reasonably incurred. A good faith reliance on a court order or legislative authorization shall constitute a complete defense to any civil or criminal action brought under this chapter or under any other law.] (a) IN GENERAL.—Except as provided in section 2511(2)(a)(ii), any person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used in violation of this chapter may in a civil action recover from the person or entity which engaged in that violation such relief as may be appropriate. (b) RELIEF.—In an action under this section, appropriate relief in­ cludes— (1) such preliminary and other equitable or declaratory relief as may be appropriate; (2) damages under subsection (c) and punitive damages in ap­ propriate cases; and 74 (3) a reasonable attorney's fee and other litigation costs rea­ sonably incurred. (c) COMPUTATION OF DAMAGES.—(1) In an action under this sec­ tion, if the conduct is in violation of this chapter is the private viewing of a private satellite video communication that is not scrambled or encrypted or if the communication is a radio commu­ nication that is transmitted on frequencies allocated under subpart D of part 74 of the rules of the Federal Communications Commis­ sion that is not scrambled or encrypted and the conduct is not for a tortious or illegal purpose or for purposes of direct or indirect com­ mercial advantage or private commercial gain, then the court shall assess damages as follows: (A) If the person who engaged in that conduct has not previ­ ously been enjoined under section 2511(5) and has not been found liable in a prior civil action under this section, the court shall assess the greater of the sum of actual damages suffered by the plaintiff, or statutory damages of not less than $50 and not more than $500. (B) If, on one prior occasion, the person who engaged in that conduct has been enjoined under section 2511(5) or has been found liable in a civil action under this section, the court shall assess the greater of the sum of actual damages suffered by the plaintiff, or statutory damages of not less than $100 and not more than $1,000. (2) In any other action under this section, the court may assess as damages whichever is the greater of— (A) the sum of the actual damages suffered by the plaintiff and any profits made by the violator as a result of the viola­ tion; or (B) statutory damages of whichever is the greater of $100 a day for each day of violation or $10,000. (d) DEFENSE.—A good faith reliance on— (1) a court warrant or order, a grand jury subpoena, a legisla­ tive authorization, or a statutory authorization; (2) a request of an investigative or law enforcement officer under section 2518(7) of this title; or (3) a good faith determination that section 2511(3) of this title permitted the conduct complained of; is a complete defense against any civil or criminal action brought under this chapter or any other law. (e) LIMITATION.—A civil action under this section may not be com­ menced later than two years after the date upon which the claimant first has a reasonable opportunity to discover the violation. §2521. Injunction against illegal interception Whenever it shall appear that any person is engaged or is about to engage in any act which constitutes or will constitute a felony viola­ tion of this chapter, the Attorney General may initiate a civil action in a district court of the United States to enjoin such violation. The court shall proceed as soon a practicable to the hearing and deter­ mination of such an action, and may, at any time before final deter­ mination, enter such a restraining order or prohibition, or take such other action, as is warranted to prevent a continuing and substan­ tial injury to the United States or to any person or class of persons 75 for whose protection the action is brought. A proceeding under this section is governed by the Federal Rules of Civil Procedure, except that, if an indictment has been returned against the respondent, discovery is governed by the federal Rules of Criminal Procedure. * * * * * * * CHAPTER 121—STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS Sec. 2701. Unlawful access to stored communications. 2702. Disclosure of contents. 2703. Requirements for governmental access. 2704. Backup preservation. 2705. Delayed notice. 2706. Cost reimbursement 2707. Civil action. ' 2708. Exclusivity of remedies. 2709. Counterintelligence access to telephone toll and transactional records. 2710. Definitions. §2701. Unlawful excess to stored communications (a) OFFENSE.—Except as provided in subsection (c) of this section whoeover— (1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access that facil­ ity; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished as provided in subsection (b) of this sec­ tion. (b) PUNISHMENT.—The punishment for an offense under subsec­ tion (a) of this section is— (1) if the offense is committed for purposes of commercial ad­ vantage, malicious destruction or damage, or private commer­ cial gain— (A) a fine of not more than $250,000 or imprisonment for not more than one year, or both, in the case of a first of­ fense under this subparagraph; and (B) a fine under this title or imprisonment for not more than two years, or both, for any subsequent offense under this subparagraph; and (2) a fine of not more than $5,000 or imprisonment for not more than six months, or both, in any other case. (c) EXCEPTIONS.—Subsection (a) of this section does not apply with respect to conduct authorized— (1) by the person or entity providing a wire or electronic com­ munications service; (2) by a user of that service with respect to a communication of or intended for that user; or (3) in section 2703, 2704 or 2518 of this title. §2702. Disclosure of contents (a) PROHIBITIONS.—Except as provided in subsection (b)— 76 (1) a person or entity providing an electronic communication service to the public shall not knowingly divulge to any person or entity the contents of a communication while in electronic storage by that service; and (2) a person or entity providing remote computing service to the public shall not knowingly divulge to any person or entity the contents of any communication which is carried or maintained on that service— (A) on behalf of, and received by means of electronic transmission from (or created by means of computer proc­ essing of communications received by means of electronic transmission from), a subscriber or customer of such serv­ ice; and (B) solely for the purpose of providing storage or computer processing services to such subscriber or customer, if the provider is not authorized to access the contents of any such communications for purposes of providing any services other than storage or computer processing. (b) EXCEPTIONS.—A person or entity may divulge the contents of a communication— (1) to an addressee or intended recipient of such communica­ tion or an agent of such addressee or intended recipient; (2) as otherwise authorized in section 2516, 2511(2)(a), or 2703 of this title; (3) with the lawful consent of the originator or an addressee or intended recipient of such communication, or the subscriber in the case of remote computing service; (4) to a person employed or authorized or whose facilities are used to forward such communication to its destination; (5) as may be necessarily incident to the rendition of the serv­ ice or to the protection of the rights or property of the provider of that service; or (6) to a law enforcement agency, if such contents— (A) were inadvertently obtained by the service provider; and (B) appear to pertain to the commission of a crime. §2703. Requirements for governmental access (a) CONTENTS OF ELECTRONIC COMMUNICATIONS IN ELECTRONIC STORAGE.—A governmental entity may require the disclosure by a provider of electronic communication service of the contents of an electronic communication, that is in electronic storage in an elec­ tronic communications system for one hundred and eighty days or less, only pursuant to a warrant issued under the Federal Rules of Criminal Procedure or equivalent State warrant. A governmental entity may require the disclosure by a provider of electronic commu­ nications services of the contents of an electronic communication that has been in electronic storage in an electronic communications system for more than one hundred and eighty days by the means available under subsection (b) of this section. (b) CONTENTS OF ELECTRONIC COMMUNICATIONS IN A REMOTE COMPUTING SERVICE.—(1) A governmental entity may require a pro­ vider of remote computing service to disclose the contents of any 77 electronic communication to which this paragraph is made applica­ ble by paragraph (2) of this subsection— (A) Without required notice to the subscriber or customer, if the governmental entity obtains a warrant issued under the Federal Rules of Criminal Procedure or equivalent State war­ rant; or (B) with prior notice from the governmental entity to the sub­ scriber or customer if the governmental entity— (i) uses an administrative subpoena authorized by a Fed­ eral or State statute or a Federal or State grand jury sub­ poena; or (ii) obtains a court order for such disclosure under subsec­ tion (d) of this section; except that delayed notice may be given pursuant to section 2705 of this title. (2) Paragraph (1) is applicable with respect to any electronic com­ munication that is held or maintained on that service— (A) on behalf of, and received by means of electronic trans­ mission from (or created by means of computer processing of communications received by means of electronic transmission from), a subscriber or customer of such remote computing serv­ ice; and (B) solely for the purpose of providing storage or computer processing services to such subscriber or customer, if the provid­ er is not authorized to access the contents of any such communi­ cations for purposes of providing any services other than storage or computer processing. (c) RECORDS CONCERNING ELECTRONIC COMMUNICATION SERVICE OR REMOTE COMPUTING SERVICE.—(1)(A) Except as provided in sub­ paragraph (B), a provider of electronic communication service or remote computing service may disclose a record or other information pertaining to a subscriber to or customer of such service (not includ­ ing the contents of communications covered by subsection (a) or (b) of this section) to any person other than a governmental entity. (B) A provider or electronic communication service or remote com­ puting service shall disclose a record or other information pertain­ ing to a subscriber to or customer of such service (not including the contents of communications covered by subsection (a) or (b) of this section) to a governmental entity only when the governmental entity— (i) uses an administrative subpoenal authorized by a Federal or State statute, or a Federal or State grand jury subpoena; (ii) obtains a warrant issued under the Federal Rules of Criminal Procedure or equivalent State warrant; (iii) obtains a court order for such disclosure under subsection (d) of this section; or (iv) has the consent of the subscriber or customer to such dis­ closure. (2) A governmental entity receiving records or information under this subsection is not required to provide notice to a subscriber or customer. (d) REQUIREMENTS FOR COURT ORDER.—A court order for disclo­ sure under subsection (b) or (c) of this section shall issue only if the governmental entity shows that there is reason to believe the con­ 78 tents of a wire or electronic communication, or the records or other information sought, are relevant to a legitimate law enforcement in­ quiry. In the case of a State governmental authority, such a court order shall not issue if prohibited by the law of such State. A court issuing an order pursuant to this section, on a motion made prompt­ ly by the service provider, may quash or modify such order, if the information or records requested are unusually voluminious in nature or compliance with such order otherwise would cause an undue burden on such provider. (e) No CAUSE OF ACTION AGAINST A PROVIDER DISCLOSING INFOR­ MATION UNDER THIS CHAPTER.—No cause of action shall lie in any court against any provider of wire or electronic communication serv­ ice, its officers, employees, agents, or other specified persons for pro­ viding information, facilities, or assistance in accordance with the terms of a court order, warrant, subpoena, or certification under this chapter. §2704. Backup preservation (a) BACKUP PRESERVATION.—(1) A governmental entity acting under section 2703(b)(2) may include in its subpoena or court order a requirement that the service provider to whom the request is direct­ ed create a backup copy of the contents of the electronic communica­ tions sought in order to preserve those communications. Without no­ tifying the subscriber or customer of such subpoena or court order, such service provider shall create such backup copy as soon as prac­ ticable consistent with its regular business practices and shall con­ firm to the governmental entity that such backup copy has been made. Such backup copy shall be created within two business days after receipt by the service provider of the subpoena or court order. (2) Notice to the subscriber or customer shall be made by the gov­ ernmental entity within three days after receipt of such confirma­ tion, unless such notice is delayed pursuant to section 2705(a). (3) The service provider shall not destroy such backup copy until the later of— (A) the delivery of the information; or (B) the resolution of any proceedings (including appeals of any proceeding) concerning the government's subpoena or court order. (4) The service provider shall release such backup copy to the re­ questing governmental entity no sooner than fourteen days after the governmental entity's notice to the subscriber or customer if such service provider— (A) has not received notice from the subscriber or customer that the subscriber or customer has challenged the governmen­ tal entity's request; and (B) has not initiated proceedings to challenge the request of the governmental entity. (5) A governmental entity may seek to require the creation of a backup copy under subsection(a)(1)of this section if in its sole dis­ cretion such entity determines that there is reason to believe that notification under section 2703 of this title of the existence of the subpoena or court order may result in destruction of or tampering with evidence. This determination is not subject to challenge by the subscriber or customer or service provider. 79 (b) CUSTOMER CHALLENGES.—(1) Within fourteen days after notice by the governmental entity to the subscriber or customer under sub­ section (a)(2) of this section, such subscriber or customer may file a motion to quash such subpoena or vacate such court order, with copies served upon the governmental entity and with written notice of such challenge to the service provider. A motion to vacate a court order shall be filed in the court which issued such order. A motion to quash a subpoena shall be filed in the appropriate United States district court or State court. Such motion or application shall con­ tain an affidavit or sworn statement— (A) stating that the applicant is a customer or subscriber to the service from which the contents of electronic communica­ tions maintained for him have been sought; and (B) stating the applicant's reasons for believing that the records sought are not relevant to a legitimate law enforcement inquiry or that there has not been substantial compliance with the provisions of this chapter in some other respect. (2) Service shall be made under this section upon a governmental entity by delivering or mailing by registered or certified mail a copy of the papers to the person, office, or department specified in the notice which the customer has received pursuant to this chapter. For the purposes of this section, the term "delivery" has the meaning given that term in the Federal Rules of Civil Procedure. (3) If the court finds that the customer has complied with para­ graphs (1) and (2) of this subsection, the court shall order the gov­ ernmental entity to file a sworn response, which may be filed in camera if the governmental entity includes in its response the rea­ sons which make in camera review appropriate. If the court is unable to determine the motion or application on the basis of the parties' initial allegations and response, the court may conduct such additional proceedings as it deems appropriate. All such proceed­ ings shall be completed and the motion or application decided as soon as practicable after the filing of the governmental entity's re­ sponse. (4) If the court finds that the applicant is not the subscriber or customer for whom the communications sought by the governmental entitly are maintained, or that there is a reason to believe that the law enforcement inquiry is legitimate and that the communications sought are relevant to that inquiry, it shall deny the motion or ap­ plication and order such process enforced. If the court finds that the applicant is the subscriber or customer for whom the communica­ tions sought by the governmental entity are maintained, and that there is not a reason to believe that the communications sought are relevant to a legitimate law enforcement inquiry, or that there has not been substantial compliance with the provisions of this chapter, it shall order the process quashed. (5) A court order denying a motion or application under this sec­ tion shall not be deemed a final order and no interlocutory appeal may be taken therefrom by the customer. §2705. Delayed notice (a) DELAY OF NOTIFICATION.—(1) A governmental entity acting under section 2703(b) of this title may— 80 (A) where a court order is sought, include in the application a request, which the court shall grant, for an order delaying the notification required under section 2703(b) of this title for a period not to exceed ninety days, if the court determines that there is reason to believe that notification of the existence of the court order may have an adverse result described in paragraph (2) of this subsection; or (B) where an administrative subpoena authorized by a Feder­ al or State statute or a Federal or State grand jury subpoena is obtained, delay the notification required under section 2703(b) of this title for a period not to exceed ninety days upon the exe­ cution of a written certification of a supervisory official that there is reason to believe that notification of the existence of the subpoena may have an adverse result described in paragraph (2) of this subsection. (2) An adverse result for the purposes of paragraph (1) of this sub­ section is— (A) endangering the life or physical safety of an individual; (B) flight from prosecution; (C) destruction of or tampering with evidence; (D) intimidation of potential witnesses; or (E) otherwise seriously jeopardizing an investigation or unduly delaying a trial. (3) The governmental entity shall maintain a true copy of certifi­ cation under paragraph (1)(B). (4) Extensions of the delay of notification provided in section 2703 of up to ninety days each may be granted by the court upon applica­ tion, or by certification by a governmental entity, but only in accord­ ance with subsection (b) of this section. (5) Upon expiration of the period of delay of notification under paragraph (1) or (4) of this subsection, the governmental entity shall serve upon, or deliver by registered or first-class mail to, the custom­ er or subscriber a copy of the process or request together with notice that— (A) states with reasonable specificity the nature of the law en­ forcement inquiry; and (B) informs such customer or subscriber— (i) that information maintained for such customer or sub­ scriber by the service provider named in such process or re­ quest was supplied to or requested by that governmental au­ thority and the date on which the supplying or request took place; (ii) that notification of such customer or subscriber was delayed; (iii) what governmental entity or court made the certifica­ tion or determination pursuant to which that delay was made; and (iv) which provision of this chapter allowed such delay. (6) As used in this subsection, the term "supervisory official" means the investigative agent in charge or assistant investigative agent in charge or an equivalent of an investigating agency's head­ quarters or regional office, or the chief prosecuting attorney or the first assistant prosecuting attorney or an equivalent of a prosecuting attorney's headquarters or regional office. 81 (b) PRECLUSION OF NOTICE TO SUBJECT ACCESS.—A governmental entity acting under OF GOVERNMENTAL section 2703, when it is not required to notify the subscriber or customer under section 2703(b)(1), or to the extent that it may delay such notice pursuant to subsection (a) of this section, may apply to a court for an order com­ manding a provider of electronic communications service or remote computing service to whom a warrant, subpoena, or court order is directed, for such period as the court deems appropriate, not to notify any other person of the existence of the warrant, subpoena, or court order. The court shall enter such an order if it determines that there is reason to believe that notification of the existence of the warrant, subpoena, or court order will result in— (1) endangering the life or physical safety or an individual; (2) flight from prosecution; (3) destruction of or tampering with evidence; (4) intimidation of potential witnesses; or (5) otherwise seriously jeopardizing an investigation or unduly delaying a trial. §2706. Cost reimbursement (a) PAYMENT.—Except as otherwise provided in subsection (c), a governmental entity obtaining the contents of communications, records, or other information under section 2702, 2703, or 2704 of this title shall pay to the person or entity assembling or providing such information a fee for reimbursement for such costs as are rea­ sonably necessary and which have been directly incurred in search­ ing for, assembling, reproducing, or otherwise providing such infor­ mation. Such reimbursable costs shall include any costs due to nec­ essary disruption of normal operations of any electronic communica­ tion service or remote computing service in which such information may be stored. (b) AMOUNT.—The amount of the fee provided by subsection (a) shall be as mutually agreed by the governmental entity and the person or entity providing the information, or, in the absence of agreement, shall be as determined by the court which issued the order for production of such information (or the court before which a criminal prosecution relating to such information would be brought, if no court order was issued for production of the informa­ tion). (c) The requirement of subsection (a) of this section does not apply with respect to records or other information maintained by a com­ munications common carrier that relate to telephone toll records and telephone listings obtained under section 2703 of this title. The court may, however, order a payment as described in subsection (a) if the court determines the information required is unusually volu­ minous in nature or otherwise caused an undue burden on the pro­ vider. ' § 2707. Civil action (a) CAUSE OF ACTION—Except as provided in section 2703(e), any provider of electronic communication service, subscriber, or customer aggrieved by any violation of this chapter in which the conduct con­ stituting the violation is engaged in with a knowing or intentional state of mind may, in a civil action, recover from the person or 82 entity which engaged in that violation such relief as may be appro­ priate. (b) RELIEF.—In a civil action under this section, appropriate relief includes— (1) such preliminary and other equitable or declaratory relief as may be appropriate; (2) damages under subsection (c); and (3) a reasonable attorney's fee and other litigation costs rea­ sonably incurred. (c) DAMAGES.—The court may assess as damages in a civil action under this section the sum of the actual damages suffered by the plaintiff and any profits made by the violator as a result of the vio­ lation, but in no case shall a person entitled to recover receive less than the sum of $1,000. (d) DEFENSE.—A good faith reliance on— (1) a court warrant or order, a grand jury subpoena, a legisla­ tive authorization, or a statutory authorization; (2) a request of an investigative or law enforcement officer under section 2518(7) of this title; or (3) a good faith determination that section 2511(3) of this title permitted the conduct complained of; is a complete defense to any civil or criminal action brought under this chapter or any other law. (e) LIMITATION.—A civil action under this section may not be com­ menced later than two years after the date upon which the claimant first discovered or had a reasonable opportunity to discover the vio­ lation. §2708. Exclusivity of remedies The remedies and sanctions described in this chapter are the only judicial remedies and sanctions for nonconstitutional violations of this chapter. §2709. Counterintelligence access to telephone toll and transactional records (a) DUTY TO PROVIDE.—A wire or electronic communication serv­ ice provider shall comply with a request for subscriber information and toll billing records information, or electronic communication transactional records in its custody or possession made by the Direc­ tor of the Federal Bureau of Investigation under subsection (b) of this section. (b) REQUIRED CERTIFICATION.—The Director of the Federal Bureau of Investigation (or an individual within the Federal Bureau of Investigation designated for this purpose by the Director) may request any such information and records if the Director (or the Director's designee) certifies in writing to the wire or electronic com­ munication service provider to which the request is made that— (1) the information sought is relevant to an authorized for­ eign counterintelligence investigation; and (2) there are specific and articulable facts giving reason, to be­ lieve that the person or entity to whom the information sought pertains is a foreign power or an agent of a foreign power as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801). 83 (c) PROHIBITION OF CERTAIN DISCLOSURE.—NO wire or electronic communication service provider, or officer, employee, or agent there­ of, shall disclose to any person that the Federal Bureau of Investi­ gation has sought or obtained access to information or records under this section. (d) DISSEMINATION BY BUREAU.—The Federal Bureau of Investiga­ tion may disseminate information and records obtained under this section only as provided in guidelines approved by the Attorney Gen­ eral for foreign intelligence collection and foreign counterintelli­ gence investigations conducted by the Federal Bureau of Investiga­ tion, and, with respect to dissemination to an agency of the United States, only if such information is clearly relevant to the authorized responsibilities of such agency. (e) REQUIREMENT THAT CERTAIN CONGRESSIONAL BODIES BE IN­ FORMED.—On a semiannual basis the Director of the Federal Bureau of Investigation shall fully inform the Permanent Select Committee on Intelligence of the House of Representatives and the Select Committee on Intelligence of the Senate concerning all re­ quests made under subsection (b) of this section. §2710. Definitions for chapter As used in this chapter— (1) the terms defined in section 2510 of this title have, respec­ tively, the definitions given such terms in that section; and (2) the term "remote computing service" means the provision to the public of computer storage or processing services by means of an electronic communications system. * * * * * * * CHAPTER 205—SEARCHES AND SEIZURES Sec. 3101. Effect of rules of court—Rules. * * * 3117. Moble tracking devices. * * * * * * * * * * * §3117. Mobile tracking devices (a) IN GENERAL.—If a court is empowered to issue a warrant or other order for the installation of a mobile tracking device, such order may authorize the use of that device within the jurisdiction of the court, and outside that jurisdiction if the device is installed in that jurisdiction. (b) DEFINITION.—As used in this section, the term "tracking device" means an electronic or mechanical device which permits the tracking of the movement of a person or object. CHAPTER 206—PEN REGISTERS AND TRAP AND TRACE DEVICES Sec. 3121. 3122. 3123. 3124. General prohibition on pen register and trap and trace device use; exception. Application for an order for a pen register or a trap and trace device. Issuance of an order for a pen register or a trap and trace device. Assistance in installation and use of a pen register or a trap and trace device. 84 3125. Reports concerning pen registers and trap and trace devices. 3126. Definitions for chapter. §3121. General prohibition on pen register and trap and trace device use; exception (a) IN GENERAL.—Except as provided in this section, no person may install or use a pen register or a trap and trace device without first obtaining a court order under section 3123 of this title or under the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et seq.). (b) EXCEPTION.—The prohibition of subsection (a) does not apply with respect to the use of a pen register or a trap and trace device by a provider of electronic or wire communication service— (1) relating to the operation, maintenance, and testing of a wire or electronic communication service or to the protection of the rights or property of such provider, or to the protection of users of that service from abuse or service or unlawful use of service; or (2) to record the fact that a wire or electronic communication was initiated or completed in order to protect such provider, an­ other provider furnishing service toward the completion of the wire communication, or a user of that service, from fraudulent, unlawful or abusive use of service, or with the consent of the user of that service. (c) PENALTY.—Whoever knowingly violates subsection (a) shall be fined under this title or imprisoned not more than one year, or both. §3122. Application for an order for a pen register or a trap and trace device (a) APPLICATION.—(1) An attorney for the Government may make application for an order or an extension of an order under section 3123 of this title authorizing or approving the installation and use of a pen register or a trap and trace device under this chapter, in writing under oath or equivalent affirmation, to a court of compe­ tent jurisdiction. (2) Unless prohibited by State law, a State investigative or law en­ forcement officer may make application for an order or an extension of an order under section 3123 of this title authorizing or approving the installation and use of a pen register or a trap and trace device under this chapter, in writing under oath or equivalent affirmation, to a court of competent jurisdication of such State. (b) CONTENTS OF APPLICATION.—An application under subsection (a) of this section shall include— (1) the identity of the attorney for the Government or the State law enforcement or investigative officer making the appli­ cation and the identity of the law enforcement agency conduct­ ing the investigation; and (2) a certification by the applicant that the information likely to be obtained is relevant to an ongoing criminal investigation being conducted by that agency. §3123. Issuance of an order for a pen register or a trap and trace device (a) IN GENERAL.—Upon an application made under section 3122 of this title, the court shall enter an ex parte order authorizing the installation and use of a pen register or a trap and trace device 85 within the jurisdiction of the court if the court finds that the attor­ ney for the Government or the State law enforcement or investiga­ tive officer has certified to the court that the information likely to be obtained by such installation and use is relevant to an ongoing criminal investigation. (b) CONTENTS OF ORDER.—An order issued under this section— (1) shall specify— (A) the identity, if known, of the person to whom is leased or in whose name is listed the telephone line to which the pen register or trap and trace device is to be at­ tached; (B) the identity, if known, of the person who is the sub­ ject of the criminal investigation; (C) the number and, if know, physical location of the tele­ phone line to which the pen register or trap and trace device is to be attached and, in the case of a trap and trace device, the geographic limits of the trap and trace order; and (D) a statement of the offense to which the information likely to be obtained by the pen register or trap and trace device relates; and (2) shall direct, upon the request of the applicant, the furnish­ ing of information, facilities, and technical assistance necessary to accomplish the installation of the pen register or trap and trace device under section 3124 of this title. (c) TIME PERIOD AND EXTENSIONS.—(1) An order issued under this section shall authorize the installation and use of a pen register or a trap and trace device for a period not to exceed sixty days. (2) Extensions of such an order may be granted, but only upon an application for an order under section 3122 of this title and upon the judicial finding required by subsection (a) of this section. The period of extension shall be for a period not to exceed sixty days. (d) NONDISCLOSURE OF EXISTENCE OF PEN REGISTER OR A TRAP AND TRACE DEVICE.—An order authorizing or approving the instal­ lation and use of a pen register or a trap and trace device shall direct that— (1) the order be sealed until otherwise ordered by the court; and (2) the person owning or leasing the line to which the pen reg­ ister or a trap and device is attached, or who has been ordered by the court to provide assistance to the applicant, not disclose the existence of the pen register or trap and trace device or the existence of the investigation to the listed subscriber, or to any other person, unless or until otherwise ordered by the court. §2124. Assistance in installation and use of a pen register or a trap and trace device (a) PEN REGISTERS.—Upon the request of an attorney for the Gov­ ernment or an officer of a law enforcement agency authorized to in­ stall and use a pen register under this chapter, a provider of wire or electronic communication service, landlord, custodian, or other person shall furnish such investigative or law enforcement officer forthwith all information, facilities, and technical assistance neces­ sary to accomplish the installation of the pen register unobtrusively 86 and with a minimum of interference with the services that the person so ordered by the court accords the party with respect to whom the installation and use is to take place, if such assistance is directed by a court order as provided in section 3123(b)(2) of this title. (b) TRAP AND TRACE DEVICE.—Upon the request of an attorney for the Government or an officer of a law enforcement agency author­ ized to receive the results of a trap and trace device under this chap­ ter, a provider of a wire or electronic communication service, land­ lord, custodian, or other person shall install such device forthwith on the appropriate line and shall furnish such investigative or law enforcement officer all additional information, facilities and techni­ cal assistance including installation and operation of the device un­ obtrusively and with a minimum of interference with the services that the person so ordered by the court accords the party with re­ spect to whom the installation and use is to take place, if such in­ stallation and assistance is directed by a court order as provided in section 3123(b)(2) of this title. Unless otherwise ordered by the court, the results of the trap and trace device shall be furnished to the of­ ficer of a law enforcement agency, designated in the court, at rea­ sonable intervals during regular business hours for the duration of the order. (c) COMPENSATION.—A provider of a wire or electronic communica­ tion service, landlord, custodian, or other person who furnishes fa­ cilities or technical assistance pursuant to this section shall be rea­ sonably compensated for such reasonble expenses incurred in provid­ ing such facilities and assistance. (d) No CAUSE OF ACTION AGAINST A PROVIDER DISCLOSING INFOR­ MATION UNDER THIS CHAPTER.—No cause of action shall lie in any court against any provider of a wire or electronic communication service, its officers, employees, agents, or other specified persons for providing information, facilities, or assistance in accordance with the terms of a court order under this chapter. (e) DEFENSE.—A good faith reliance on a court order, a legislative authorization, or a statutory authorization is a complete defense against any civil or criminal action brought under this chapter or any other law. § 3125. Reports concerning pen registers and trap and trace devices The Attorney General shall annually report to Congress on the number of pen register orders and orders for trap and trace devices applied for by law enforcement agencies of the Department of Jus­ tice. § 3126. Definitions for chapter As used in this chapter— (1) the terms 'wire communication', 'electronic communica­ tion', and 'electronic communication service' have the meanings set forth for such terms in section 2510 of this title; (2) the term 'court of competent jurisdiction' means— (A) a district court of the United States (including a mag­ istrate of such a court) or a United States Court of Appeals; or 87 (B) a court of general criminal jurisdiction of a State au­ thorized by the law of that State to enter orders authoriz­ ing the use of a pen register or a trap and trace device; (3) the term pen register' means a device which records or de­ codes electronic or other impulses which identify the numbers dialed or otherwise transmitted on the telephone line to which such device is attached, but such term does not include any device used by a provider or customer of a wire or electronic communication service for billing, or recording as an incident to billing, for communications services provided by such provid­ er or any device used by a provider or customer of a wire com­ munication service for cost accounting or other like purposes in the ordinary course of its business; (4) the term 'trap and trace device' means a device which cap­ tures the incoming electronic or other impulses which identify the originating number of an instrument or device from which a wire or electronic communication was transmitted; (5) the term 'attorney for the Government' has the meaning given such term for the purposes of the Federal Rules of Crimi­ nal Procedure; and (6) the term 'State' means a State, the District of Columbia, Puerto Rico, and any other possession or territory of the United States. O

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?