<?php

include("eff_setup2.php");

$smarty = new EFFSmarty;

$smarty->assign('title','EFF Analysis of USA PATRIOT Act (Oct. 31, 2001)');

// if breadcrumb == true, then it fill in the right trail in the issue
// array
$smarty->assign('breadcrumb','false');

// example:
//$issue = array("Issues" => "/issues/", "Privacy" => "/issues/privacy/", "TIA" => "/issues/privacy/tia/");

$smarty->assign('issue',$issue);

$content  = '
<div id="featuretext">


<h1>EFF Analysis Of The Provisions Of The USA PATRIOT Act</h1>
<h2>That Relate To Online Activities (October 31, 2001)</h1>
<p class="smalltext"><em>Last updated October 27, 2003</em></p>

<h3>Introduction</h3>

<p>On October 26, 2001, President Bush signed the USA PATRIOT Act (PATRIOT)
into law. PATRIOT gave sweeping new powers to both domestic law enforcement and
international intelligence agencies and eliminated the checks and balances that
previously gave courts the opportunity to ensure that such powers were not
abused. Most of these checks and balances were put into place after previous
misuse of surveillance powers by these agencies were uncovered including
the revelation in 1974 that the FBI and foreign intelligence agencies had
spied on over 10,000 U.S. citizens, including Martin Luther King. </p>

<h3>A Rush Job</h3>

<p>The bill is 342 pages long and makes changes, some large and some small, to
over 15 different statutes. This document provides explanation and some
analysis to the sections of the bill relating to online activities and
surveillance. Other sections, including those devoted to money laundering,
immigration and providing for the victims of terrorism, are not discussed here.
</p>

<p>Yet even just considering the surveillance and online provisions of PATRIOT,
it is a large and complex law that had over four different names and several
versions in the five weeks between the introduction of its first predecessor
and its final passage into law. While containing some sections that seem
appropriate -- providing for victims of the September 11 attacks, increasing
translation facilities and increasing forensic cybercrime capabilities -- it
seems clear that the vast majority of the sections included were not carefully
studied by Congress, nor was sufficient time taken to debate it or to hear
testimony from experts outside of law enforcement in the fields where it makes
major changes. This concern is amplified because several of the key procedural
processes applicable to any other proposed laws, including inter-agency review,
the normal committee and hearing processes and thorough voting, were suspended
for this bill. </p>

<h3>Were our Freedoms the Problem?</h3>

<p>The civil liberties of ordinary Americans have taken a tremendous blow with
this law, especially the right to privacy in our online communications and
activities. Yet there is no evidence that our previous civil liberties posed a
barrier to the effective tracking or prosecution of terrorists. In fact, in
asking for these broad new powers, the government made no showing that the
previous powers of law enforcement and intelligence agencies to spy on U.S.
citizens were insufficient to allow them to investigate and prosecute acts of
terrorism. The process leading to the passage of the bill did little to ease
these concerns. To the contrary, they are amplified by the inclusion of so many
provisions that, instead of being aimed at terrorism, are aimed at nonviolent,
domestic crime. In addition, although many of the provisions facially appear
aimed at terrorism, the Government made no showing that the reasons they failed
to detect the planning of the recent attacks or any other terrorist attacks
were the civil liberties compromised with the passage of PATRIOT. </p>

<h3>Executive Summary</h3>

<h4>Chief Concerns</h4>

<p>The EFF\'s chief concerns with PATRIOT include: </p>

<ol start=1 type=1>
     <li><strong>Expanded Surveillance With Reduced Checks and
     Balances.</strong> PATRIOT expands all four traditional tools of
     surveillance used by law enforcement -- wiretaps, search warrants,
     pen/trap orders and subpoenas. Their counterparts under the Foreign
     Intelligence Surveillance Act (FISA) that allow spying in the U.S. by
     foreign intelligence agencies have similarly been expanded. This means: 
  <ol start=1 type=a>
	<li><strong>Be careful what you read on the Internet.</strong> The
       government may now monitor the online activities of innocent Americans, and
       perhaps even track what Web sites you read, by merely telling a judge
       anywhere in the U.S. that the spying could lead to information that is
       &quot;relevant&quot; to an ongoing criminal investigation. The person
       spied on does not have to be the target of the investigation. This
       application must be granted and the government is not obligated to
       report to the court or tell the person spied upon what it has done. </li>
        <li><strong>Nationwide roving wiretaps.</strong>
        FBI and CIA can now go from phone to phone,
        computer to computer without demonstrating that each is being used by a
        suspect or target of an order, or even specifically identifying the
        person targeted. The government may now serve a single Title III wiretap,
        FISA wiretap or pen/trap order on any person or entity nationwide,
        regardless of whether that person or entity is named in the order. The
        government need not make any showing to a court that the particular
        information or communication to be acquired is relevant to a criminal
        investigation. In the pen/trap or FISA situations, they do not even
        have to report where they served the order or what information they
        received. The EFF believes that the opportunities for abuse of these
        broad new powers are immense. For pen/trap orders, while ISPs or others
        who are not specifically named in the order do have the legal right to
        request certification from the Attorney General\'s office that the order
        applies to them, they have no right to request such confirmation from a
        court.</li>
     <li><strong>ISPs hand over more user information.</strong> The law
         makes two changes to increase how much information the government may
         obtain about users from their ISPs or others who handle or store their
         online communications. First it allows ISPs to voluntarily hand over
         all &quot;non-content&quot; information to law enforcement with no
         need for any court order or subpoena. &sect;212. Second, it expands the
         records that the government may seek with a simple subpoena (no court
         review required) to include records of session times and durations,
         temporarily assigned network (I.P.) addresses, and means and source of
         payments, including credit card or bank account numbers. &sect;&sect;210, 211. </li>
      <li><strong>New definitions of terrorism expand scope of surveillance.</strong>
          One new definition of terrorism and three expansions of previous definitions
          also expand the scope of surveillance. &nbsp;PATRIOT &sect;802\'s definition of &quot;domestic terrorism&quot; (amending 18 USC &sect;2331) raises concerns about legitimate
          protest activity being prosecuted as terrorism, especially if
          violence erupts, while additions to three existing definitions of
          terrorism (int\'l terrorism per 18 USC &sect;2331, terrorism transcending
          national borders per 18 USC &sect;2332b, and federal terrorism per amended
          18 USC &sect;2332b(g)(5)(B)) expose more people to surveillance (and
          potential &quot;harboring&quot; and &quot;material support&quot;
          liability, &sect;&sect;803, 805). </li>
	</ol></li>

	<li><strong>Overbreadth with a lack of focus on terrorism.</strong>
	Several provisions of PATRIOT have no apparent connection to preventing
          terrorism. These include:

       <ol start=1 type=a>
		<li><strong>Government spying on suspected computer trespassers with
		no need for court order.</strong> &sect;217. </li>

         	<li><strong>Adding samples to DNA database for those convicted of
		&quot;any crime of violence.&quot; </strong>
		&nbsp;&sect;503. This provision allows collection of DNA for terrorists,
		but then inexplicably also allows collection for the broad,
		non-terrorist category of &quot;any crime of violence.&quot; </li>

		<li><strong>Wiretaps now allowed for suspected violations of the
		Computer Fraud and Abuse Act.</strong> This includes anyone suspected
		of exceeding authorized access to a computer used in interstate
		commerce and thereby causing over $5000 worth of combined damage.</li>

		<li><strong>Dramatic increases to the scope and penalties of the
		Computer Fraud and Abuse Act.</strong> These include: 1) raising the
		maximum penalty for violations to 10 years (from 5) for a first offense
		and 20 years (from 10) for a second offense; 2) ensuring that violators
		only need to intend to cause damage generally, not intend to cause
		damage or other specified harm over the $5,000 statutory damage
		threshold; 3) allowing aggregation of damages to different computers
		over a year to reach the $5,000 threshold; 4) enhancing punishment for
		violations involving any (not just $5,000) damage to a government
		computer involved in criminal justice or the military; 5) including
		damage to foreign computers involved in U.S. interstate commerce; 6)
		including state law offenses as priors for sentencing; 7) expanding
		the definition of loss to expressly include time spent on investigation,
		response, damage assessment and restoration.</li>
      </ol></li>

           <li>
               <strong>Allows Americans to be More Easily Spied Upon by U.S. Foreign Intelligence Agencies.</strong> Just as the domestic law enforcement surveillance powers
               have expanded, the corollary powers under the Foreign
               Intelligence Surveillance Act have also been greatly expanded,
               including:
            <ol start=1 type=a>
             <li>
                 <strong>General Expansion of FISA Authority.</strong>
                 FISA authority to spy on Americans or foreign persons in the U.S.
                 (and those who communicate with them) increased from
                 situations where obtaining foreign intelligence information is
                 &quot;the&quot; purpose of the surveillance to anytime that it
                 is &quot;a significant purpose&quot; of the surveillance. </li>

              <li>
                  <strong>Increased information sharing between domestic law
		  enforcement and
                  intelligence.</strong> This is a partial
                  repeal of the wall put up in the 1970s after the discovery
                  that the FBI and CIA had been conducting investigations on
                  over half a million Americans during the McCarthy era and
                  afterwards, including the pervasive surveillance of Martin
                  Luther King in the 1960s. It allows wiretap results, grand
                  jury information and other evidence collected in a criminal
                  case to be disclosed to the intelligence agencies when the
                  information constitutes foreign intelligence information. </li>
               <li>
                   <strong>FISA detour around federal domestic surveillance
                   limitations; domestic detour around FISA limitations.</strong>
		   Domestic surveillance limits can be skirted by the
                   Attorney General, for instance, by obtaining a FISA wiretap
                   against a U.S. person where &quot;probable cause&quot; does
                   not exist, but when the person is suspected to be an agent
                   of a foreign government. The information can then be shared
                   with the FBI. The reverse is also true. </li>
             </ol></li>
</ol>

<h4>Future Actions</h4>

<p>The EFF urges the following: </p>
<ol start=1 type=1>
<li>That law
 enforcement and the intelligence agencies use these new
 powers carefully and limit their use to bona fide
 investigations into acts of terrorism. </li>
                
<li>That the courts appropriately
  punish those who misuse these new laws and that Congress reexamine
  its decision to grant such broad, unchecked powers. </li>

<li>That if these
   laws are misused to harm the rights of ordinary Americans
   involved in low-level crimes unrelated to terrorism, the
   courts refuse to allow evidence collected through use of
   these broad powers to be used in prosecuting them. 
	<ul>
	<li>That the many vague, undefined terms in PATRIOT be defined
	in a manner that protects the civil liberties and privacy of
	Americans. </li>
	</ul></li>
                  
<li>That ISPs and
     others served with &quot;roving&quot; wiretaps and other
     Orders that do not specify them as recipients require the
     Attorney General to certify that the order properly
     applies to them. </li>
  
<li>That Congress require
      the law enforcement and intelligence agencies who
      operate under provisions of PATRIOT that are set to
      expire in December, 2005, to provide it with
      comprehensive reports about the use of these new powers,
      so as enable Congress to reasonably determine whether
      these provisions should be renewed. </li>
</ol>

<h3>I. Expanded Surveillance with Reduced Checks and Balances</h3>

<h4>A. A Brief, Incomplete Introduction to Electronic Surveillance under
U.S. Law. </h4>

<p>U.S. law
  has provided four basic mechanisms for surveillance on
  people living in the United States: interception orders
  authorizing the interception of communications; search
  warrants authorizing the search of physical premises and
  seizure of tangible things like books or other evidence;
  &quot;pen register&quot; and &quot;trap-and-trace device&quot;
  orders (pen/trap orders), which authorize the collection of
  telephone numbers dialed to and from a particular
  communications device; and subpoenas compelling the
  production of tangible things, including records. Each
  mechanism has its own proof standards and procedures based
  on the Constitution, statutes, or both. </p>

<p>U.S. law also provides two separate &quot;tracks&quot; with
 differing proof standards and procedures for each of these
 mechanisms depending upon whether surveillance is done by
 domestic law enforcement or foreign intelligence. All of
 these have been expanded by PATRIOT. </p>

<p>For
 instance, when surveillance is conducted for domestic law
 enforcement purposes, the probable cause standard of the
 Fourth Amendment applies to interception orders and search
 warrants. But a court order compelling an ISP to produce
 e-mail logs and addresses of past e-mail correspondents
 uses a lower standard: the government must show specific
 and articulable facts showing reasonable grounds to believe
 that the records are relevant and material to an ongoing
 criminal investigation. A pen/trap order uses an even lower
 standard: the government need only tell the court that the
 surveillance is relevant to a criminal investigation. The
 standard for subpoenas is also very low. </p>

<p>Where
 foreign intelligence surveillance is concerned, however,
 the standard of proof and procedures for each mechanism has
 been different. One key difference is that foreign
 intelligence surveillance is not based on the concept of
 criminality. Under the Foreign Intelligence Surveillance
 Act (FISA), the key issue is whether the intended
 surveillance target is an &quot;agent of a foreign
 power&quot; or a &quot;foreign power.&quot; Only if the
 target is a U.S. citizen or permanent resident alien must
 the government show probable cause of criminality. </p>

<p>Second,
 FISA allows a secret court to authorize U.S. intelligence
 agencies to conduct surveillance using each of the four
 basic mechanisms listed above. For instance, FISA
 interception orders involving U.S. persons are issued by
 the secret court based on an application from the Attorney
 General stating reasons to believe that the surveillance
 target is an agent of a foreign power or a foreign power,
 certifying that &quot;the purpose&quot; of the surveillance
 is to gather foreign intelligence information, and several
 other facts and representations. The secret court\'s role
 here, however, is quite limited: it is not supposed to
 &quot;second-guess&quot; the government\'s certifications or
 representations. (Unsurprisingly, the secret FISA court has
 only denied one application in its over twenty-year
 existence.) Moreover, unlike ordinary interception orders,
 FISA does not require reports to the court about what the
 surveillance found; no reports of what is being sought or
 what information is retrieved are ever available to the public.
 Thus, the secret court\'s only practical accountability is
 in a district court when a surveillance target is
 prosecuted and seeks to suppress the fruits of FISA
 surveillance. </p>

<p>FISA\'s
 requirements are even weaker if the electronic surveillance
 is directed solely at means of communications used
 exclusively between or among foreign powers and when it is
 unlikely that communications to which a U.S. person is a
 party will be intercepted; in such cases, surveillance may
 proceed for up to a year without a court order. </p>

<p>Immediately
 after the September 11 attacks, electronic surveillance was
 conducted pursuant to FISA orders. There have been no
 reports that the limitations of FISA power posed any
 problems for the government. </p>

<table border=1 cellpadding=4 cellspacing=0> 
  <tr>
   <td><strong>Domestic Law Enforcement</strong></td>
   <td><strong>Foreign Intelligence Surveillance</strong></td>
</tr>
<tr>
   <td><em>1. Intercept Orders.</em>
 <p>Title III (named after the relevant section of the original
 legislation, the Omnibus Crime Control and Safe Streets
 Act of 1968) surveillance is a traditional wiretap that
 allows the police to bug rooms, listen to telephone
 conversations, or get content of electronic
 communications in real time. </p>
 <ul>
  <li>
      Obtained after law enforcement
      makes a showing to a court that there is
      &quot;probable cause&quot; to believe that the
      target of the surveillance committed one of a
      special list of severe crimes. </li>
   <li>Law enforcement must report
       back to the court what it discovers. </li>
   <li>Up to 30 days; must go back to
       court for 30-day extensions </li>
 </ul>
    <p>(Courts do not treat unopened e-mail
    at ISPs as real-time communications.) </p></td>

 <td valign="top">
 <em>1. FISA Intercept Orders.</em> </p>
 <ul>
  <li>Secret Court. No public
      information about what surveillance requested or
      what surveillance actually occurs, except for a
      raw annual report of number of requests made and
      number granted (the secret court has only refused
      one request). </li>
   <li>Previous standard was certification
       by Attorney General that &quot;the purpose&quot;
       of an order is a suspicion that the target is a
       foreign power or an agent of a foreign power. </li>
    <li>Attorney General is not
        required to report to the court what it does. </li>
         
    <li>Up to 90 days, or 1 year (if foreign power) </li>
 </ul></tr>
   <tr>
    <td><em>2. Pen/Trap.</em>
    <p>Pen/Trap surveillance was
    based upon the physical wiring of the telephone
    system. It allowed law enforcement to obtain the
    telephone numbers of all calls made to or from a
    specific phone. </p>
    <ul>
         <li>Allowed upon a
         &quot;certification&quot; to the court that the
         information is relevant to an ongoing criminal
         investigation. </li>
      <li>Court must grant if proper application made. </li>
       <li>Does
	not require that the target be a suspect in
	that investigation and law enforcement is not
	required to report back to the court. </li>
    </ul>

       <p>Prior to PATRIOT there
       had been debate about how this authority is to be
       applied in the Internet context. </p></td>

      <td valign="top">
      <em>2. FISA Pen/Trap.</em>
      <p>Previous FISA pen/trap
      law required not only showing of relevance but
      also showing that the communications device had
      been used to contact an &quot;agent of a foreign
      power.&quot; </p>

      <p>While this exceeds the
      showing under the ordinary pen/trap statute, such
      a showing had the function of protecting U.S.
      persons against FISA pen/trap surveillance. </p>
     </td>
  </tr>
  <tr>
      <td><em>3. Physical search warrants</em>
      <p>Judicial finding of probable
      cause of criminality; return on warrant. </p>
      <p>Previously, agents were
      required at the time of the search or soon
      thereafter to notify person whose premises were
      searched that search occurred, usually by leaving
      copy of warrant. </p>
      <p>PATRIOT makes it easier
      to obtain surreptitious or
      &quot;sneak-and-peek&quot; warrants under which
      notice can be delayed. </p></td>

      <td><em>3. FISA Physical search warrants</em>
      <p>See FISA 50 USC &sect;1822. PATRIOT
      extends duration of physical searches. </p>

      <p>Under previous FISA,
      Attorney General (without court order) could
      authorize physical searches for up to one year of
      premises used exclusively by a foreign power if
      unlikely that U.S. person will be searched;
      minimization required. A.G. could authorize such
      searches up to 45 days after judicial finding of
      probable cause that U.S. target is or is an agent
      of a foreign power; minimization required, and
      investigation may not be based solely on First
      Amendment-protected activities. </p></td>
  </tr>
  <tr>
      <td><em>4. Subpoenas for stored information.</em>
      <p>Many statutes authorize
      subpoenas; grand juries may issue subpoenas as
      well. EFF\'s main concern here has been for stored
      electronic information, including e-mail
      communications and subscriber or transactional
      records held by ISPs. Subpoenas in this area are
      governed by the Electronic Communications Privacy
      Act (ECPA). </p></td>

      <td><em>4. FISA subpoenas</em>
      <p>Previously, FISA
      authorized collection of business records in very
      limited situations, mainly records relating to
      common carriers, vehicles or travel, and only via
      court order.</p>

      <p>PATRIOT permits any
      &quot;tangible things,&quot; including business
      records, to be obtained via a subpoena.</p></td>
  </tr>
</table>

<h3>II. Increased Surveillance Authority</h3>

<p>PATRIOT removes many of
the checks and balances that prevented both police
and the foreign intelligence agencies from
improperly conducting surveillance on U.S. citizens
who are not involved in criminal or terrorist
activity. For Internet users, it opens the door for
widespread surveillance of web surfing, e-mails and
peer-to-peer systems. In addition, the protections
against the misuse of these authorities -- by the
foreign intelligence agencies to spy on U.S.
citizens and by law enforcement to use foreign
intelligence authority to exceed their domestic
surveillance authority -- have been greatly reduced.</p>

<h4>A. Law enforcement intercept orders (Wiretaps)</h4>

<p>Wiretaps (for telephone conversations) can only be issued for
certain crimes listed in 18 USC &sect;2516. PATRIOT adds to this list.
This restriction has never applied to interception
of electronic communications. </p>

<h5>1. Adds Terrorism.</h5>

<p>PATRIOT &sect;201 adds terrorism offenses, which is probably redundant
since the list already included most if not all terrorist acts --
e.g., murder, hijacking, kidnapping, etc.</p>

<h5>2. Adds Computer Fraud and Abuse Act (CFAA), 18 USC &sect;1030. </h5>
<p>PATRIOT &sect;202 adds felony violations of the CFAA (see below for
discussion of changes to CFAA). </p>

<h5>3. Removes voicemail from Title III purview. </h5>

<p>PATRIOT &sect;209 allows police to get voicemail and other stored wire
communications without an intercept order; now, only a search warrant needed. </p>

<h5>4. Exempts certain interceptions from requirement of judicial
authorization.</h5>

<p>Computer trespassers, see below. </p>

<h4>B. Law enforcement search warrants.</h4>

<h5>1.  Single-jurisdiction search warrants for terrorism
and for electronic evidence. </h5>

<p>In general, search warrants must be obtained within a judicial district
for searches in that district. Fed.R.Crim.Pro. 41. PATRIOT
relaxes this rule. PATRIOT &sect;219 adds terrorist
investigations to the list of situations where
single-jurisdiction search warrants may be issued. PATRIOT
also allows issuance in any district in which
activities related to terrorism may have occurred
for search of property or person within or outside
the district. &sect;220. Once a judge somewhere approves
a warrant for seizing unopened e-mail less than 180
days old, that order can be served on any ISP or
telecommunications company nationwide, without any
need that the particular service provider be
identified in the warrant. </p>

<h5>2.  &quot;Sneak-and-peek&quot; warrants greatly
expanded.</h5>
<p>PATRIOT &sect;213 allows delayed notification of a search for &quot;a
    reasonable period&quot; that can be &quot;extended
    for good cause shown&quot; to a court for any wire
    or electronic communication or tangible property. This
    is problematic because notice to a searched person
    is a key component of Fourth Amendment
    reasonableness. </p>

<h4>C. Law enforcement Pen/Trap orders</h4>

    <p>Pen/trap orders are
    issued by a court under a very low standard; PATRIOT
    does not change this standard. PATRIOT instead
    expands the reach of pen/trap orders to the Internet.
    </p>

    <p>PATRIOT &sect;216 modifies 18
    USC &sect;3121(c) to expressly include routing and addressing
    information, thus expressly including e-mail and
    electronic communications. &quot;Contents&quot; of
    communications are excluded, but there remain
    serious questions about the treatment of Web
    &quot;addresses&quot; and other URLs that identify
    particular content. </p>

    <p>Pen/trap orders can now
    apply even to those not named in an order (nationwide).
    Previously, pen/trap orders were limited by a court\'s
    jurisdiction, so they had to be installed within the
    judicial district. Now, a court shall enter an ex
    parte order authorizing use anywhere within the U.S.
    if that court has jurisdiction over crime being
    investigated and the attorney for the U.S.
    Government has certified that information
    &quot;likely to be obtained&quot; is &quot;relevant
    to an ongoing criminal investigation.&quot; The
    order applies to any provider &quot;whose assistance
    may facilitate the execution of the order, &quot;
    whether or not within the jurisdiction of the
    issuing court. But if the entity is not named, it may
    require that the U.S. attorney provide written or
    electronic certification that the order applies to
    the person or entity being served. </p>
    
    <p>If a government agency
    uses its own technology (e.g., Carnivore) to conduct
    pen/trap surveillance, then an &quot;audit
    trail&quot; is required, e.g., 30 day report back to
    court. There is no mandate that the served entity\'s equipment
    facilitate the surveillance. &sect;222 (prevents CALEA
    application here). </p>

<h4>D. Law enforcement subpoenas (and some court orders) for
    stored information </h4>

    <h5>1. PATRIOT &sect;&sect;210
    and 212 amend the Electronic Communications Privacy
    Act (ECPA).</h5>

    <p>PATRIOT &sect;210 expands the
    records that can be sought without a court order to
    include: records of session times and durations,
    temporarily assigned network addresses, and means
    and source of payments, including any credit card or
    bank account number. </p>
    
  <p>PATRIOT &sect;212 expands &quot;emergency&quot;
    voluntary disclosure to government of both content
    and customer records if there is reason to believe that
    there exists immediate danger of death or serious
    physical injury (The Homeland Security Act further
    expanded this exception for cases where there is a good
    faith basis to believe the same). </p>
 
<h5>2. PATRIOT &sect;211. Reduction of Privacy for Cable Records.</h5>

    <p>Previously, the Cable
    Act had mandated strong privacy protection for
    customer records of cable providers; PATRIOT
    overrides these protections for customer records
    related to telecommunications services. This is not
    a major change because several courts have already
    held that these privacy protections don\'t apply for
    telecommunications services. </p>

    <h4>E. Information sharing between law enforcement and intelligence
    community</h4>

    <p>Because foreign
    intelligence surveillance does not require probable
    cause of criminality and because of the fear that
    foreign intelligence surveillance aimed at foreign
    agents would violate the rights of U.S. persons, the
    law has tried to keep foreign intelligence
    surveillance (including evidence gained therefrom)
    separate from law enforcement investigations. PATRIOT
    greatly blurs the line of separation between the
    two. </p>

    <h5>1. Easier to Use FISA authority for Criminal Investigations.</h5>

    <p>Under PATRIOT &sect;218, foreign
    intelligence gathering now only needs to be &quot;a
    significant purpose&quot; rather than &quot;the
    purpose&quot; of FISA surveillance (edits to 50 USC
    &sect;1804(a)(7)(b), and 1823 (a)(7)(B)). The FISA court
    only looks to see that the required certifications are
    present in the application and are not &quot;clearly
    erroneous&quot;.
    &nbsp; Courts have said that it is not their
    function to &quot;second guess&quot; the
    certifications. </p>

<h5>2. Now Can Disclose Formerly Secret Grand Jury Information to
Intelligence Services. </h5>

    <p>PATRIOT &sect;203(a) amends
    Federal Rule of Criminal Procedure 6 so that grand
    jury information can now be disclosed to
    intelligence services when &quot;matters involve
    foreign intelligence or counterintelligence per 50
    USC &sect;401a or foreign intelligence information"
    (defined below).</p>

<h5>3. Foreign Intelligence Information.</h5>

    <p>This is a new category
    of information that can be disclosed to foreign
    intelligence agents. It includes any information,
    whether or not concerning a U.S. person, that
    &quot;relates&quot; to the ability of the U.S. to
    protect against an actual or potential attack,
    sabotage or international terrorism or clandestine
    intelligence activities, as well as any information,
    whether or not concerning a U.S. Person, that
    &quot;relates&quot; to the national defense or
    security or the conduct of foreign affairs. </p>

<h5>4. Disclose Criminal Wiretap Information to Any Government
    Official, Including Foreign Intelligence Services</h5>

    <p>PATRIOT &sect;203(b) amends
    18 USC &sect;2517, allowing disclosure of the contents of
    wiretaps or evidence derived therefrom to any other
    government official, including intelligence,
    national defense and national security, &quot;to the
    extent such contents include foreign intelligence or
    counterintelligence or foreign intelligence
    information" (defined above). </p>

<h5>5. General Authority to Disclose</h5>

    <p>Notwithstanding other
    law, PATRIOT &sect;203(d) makes it lawful for foreign
    intelligence or counterintelligence or foreign
    intelligence information (see definition above) to
    be disclosed to anyone to assist in performance of
    official duties. PATRIOT &sect;504 also authorizes
    general coordination between law enforcement and
    FISA surveillance. </p>

<h4>F. FISA</h4>

<h5>1. Intercept orders: adds &quot;roving wiretap&quot; authority to
    FISA.</h5>

    <p>PATRIOT &sect;206 amends 50
    USC &sect;1805. FISA court now may authorize intercepts
    on any phones or computers that the target may use.
    The foreign intelligence authorities can require
    anyone to help them wiretap. Previously they could
    only serve such orders on common carriers,
    landlords, or other specified persons. Now they can
    serve them on anyone and the Order does not have to
    specify the name of the person required to assist. Such
    roving wiretap authority raises serious Fourth
    Amendment problems because it relaxes the &quot;particularity&quot;
    requirements of the Warrant Clause. Such authority
    already exists under Title III. </p>
    
    <p>PATRIOT &sect;207 increases the
    duration of FISA intercept orders, amending 50 USC
    &sect;1805(e)(1) to increase the duration of surveillance
    on agents of a foreign power (not U.S. persons) from
    90 to 120 days. </p>

    <h5>2. FISA search warrants</h5>
    
    <p>PATRIOT &sect;207 extends the
    time period during which a FISA search warrant may
    be used, amending 50 USC &sect;1824(d) to increase the
    period for judicially authorized physical searches a)
    to 90 days (up from 45), or b) if agent of a foreign
    power (employee or member of a foreign power but not
    U.S. persons), to 120 days. </p>

    <h5>3. FISA pen/trap orders</h5>
    <p>PATRIOT &sect;214 amends 50
    USC 1842 and 1843 (emergency) to allow pen/trap
    orders when they are concerning foreign intelligence
    information and: </p>

    <ol start=1 type=a>
     <li>are not concerning a U.S. person or; </li>
     <li>ARE concerning a U.S.
          person, and are to protect against
          international terrorism or clandestine
          intelligence activities, provided that such
          investigation is not conducted solely upon the
          basis of 1st Amendment activities. </li>
    </ol>

<h5>4. FISA
      subpoenas and similar authorities</h5>

      <p>PATRIOT grants broad
      authority for compelling business records. Under previous
      law, only records of common carriers, public
      accommodation facilities, physical storage
      facilities and vehicle rental facilities could be
      obtained with a court order. </p>
      <p>PATRIOT &sect;215 amends
      50 USC &sect;1862 to allow application to the FISA
      court for an order to compel the production of any
      business record or tangible thing from anyone for
      any investigation to protect against international
      terrorism or clandestine intelligence activities
      (but cannot investigate a U.S. person solely for
      First Amendment activities). </p>

      <ol start=1 type=a>
       <li>No showing needed that the person is an agent of a foreign power. </li>
       <li>Order MUST be granted by the court if application meets
		requirements. </li>
       <li>Order will not state that it is authorized under this section.</li>
       <li>Persons served with such an order are gagged. </li>
       <li>DOJ must provide to Congress a semiannual report on the
	number of applications and the number of
	those that were granted or denied, but
	there is no required reporting to the court
	or Congress regarding actual documents
	seized or their usefulness.</li>
      </ol>

<h4>G. Other changes related to surveillance</h4>
<h5>1. New surveillance of communications &quot;relevant&quot; to computer
trespasser investigation</h5> 

<p>PATRIOT &sect;217 changes 18 USC &sect;2510, adding another
area where any government employee, not just
law enforcement, may conduct content
surveillance of U.S. persons. This is when a computer
owner and operator &quot;authorizes&quot;
surveillance and a law enforcement agent
&quot;has reasonable grounds to believe
contents of communication will be
relevant&quot; to investigating computer
trespass and does not acquire anyone else\'s
communications. This section authorizes interception
of messages suspected of being sent through a
computer without &quot;authorization.&quot; </p>
<ol start=1 type=a>
 <li>The term &quot;authorization&quot; is not
   defined, giving the owner/operator of
   protected computer and the government
   agent great discretion. </li>
<li>BUT this does not
    include someone who is known to have an
    existing contractual relationship to
    access all or part of the computer.
    According to DOJ, ISP customers who
    send spam in violation of ISP\'s terms
    of service would not be trespassers. </li>
</ol>

<h5>2.Civil liability for certain unauthorized disclosures.</h5>

<p>PATRIOT &sect;223. This provision provides a small bit
of relief for those who discover that law
enforcement or the foreign intelligence
authorities have disclosed information
about them improperly. </p>
<ol start=1 type=a>
 <li>Allows Administrative discipline. Amends 18 USC &sect;&sect;2520, 2707.</li>
 <li>Allows &sect;2712 civil actions with a $10,000 recovery limit,
    but only for willful disclosures. [It\'s
    a $10K statutory damages minimum
    (&quot;actual damages, but not less
    than $10,000, whichever amount is greater.&quot;)]</li>
</ol>

<h5>3.  Disclosure of Educational Records. </h5>

<p>PATRIOT &sect;&sect;507-8 amends 20 USC &sect;1232g:</p>
  <ol start=1 type=a>
   <li>Upon written application to a court the Attorney
    General may require an educational
    agency to collect educational records
    &quot;relevant&quot; to an authorized
    investigation of a listed terrorist
    offense or &quot;domestic or
    international terrorist offense.&quot;
    If the application is correct and
    satisfies the low pen/trap Òrelevance"
    standard, the court shall grant the
    order.</li>
    <li>Same for National Education Statistics Act surveys. </li>
  </ol>

<h5>4. Similarly expands quasi-subpoena power for many other records.</h5>

<p>PATRIOT &sect;505 authorizes issuance of ÒNational Security
    Letters," administrative subpoenas for certain phone billing records, bank
    records, credit records on the same showing as for FISA pen/trap (but no
    court order). </p>

<h3>III.  Changes With Little Relationship to Fighting Terrorism.</h3>
    <p>The EFF is deeply dismayed to see that the
    Attorney General seized upon the legitimate Congressional concern
    following the September 11, 2001 attacks to pad PATRIOT with provisions
    that have at most a tangential relationship to preventing terrorism.
    Instead, these provisions appear targeted at low and mid-level computer
    defacement and damage cases which, although clearly criminal, are by no
    means terrorist offenses and have no business being included in the Act. </p>

<h4>A.  Computer Fraud and Abuse Act (CFAA 18 USC &sect;1030).</h4>

<p>The CFAA provides for civil and criminal liability for acts exceeding the
    &quot;authority&quot; to access or use a computer connected to the Internet.
    It is used to prosecute those engaging in computer graffiti, website
    defacement and more serious computer intrusion and damage. It has also been
    applied in civil cases to spammers and those sending unwanted bots to gather
    information from the websites of others. PATRIOT makes several changes
    to this law, none of which seems aimed at preventing or prosecuting terrorist
    offenses -- which are separately defined and already include the use of
    computers to commit terrorism. An earlier version of the bill would have
    made many violations of the statute &quot;terrorist&quot; offenses. After
    outcry from EFF members and many others, most (but not all, see below) of
    the offenses under &sect;1030 were removed from the &quot;terrorist&quot;
    definition. However, the penalties and scope of &sect;1030 were instead greatly
    expanded. The changes include: </p>
    <ol start=1 type=1>
    <li>Adds an &quot;attempt to commit an offense&quot; under &sect;1030 to the
	list of illegal activities with the same penalties as an offense.
	&sect;814. </li>
    <li>The law now applies if the damage is done to computers outside the U.S.
	that affect U.S.  Interstate commerce. &sect;814. </li>
    <li>Includes state court convictions under similar statutes as priors for
	purposes of a second conviction with increased penalties. &sect;814. </li>
    <li>Increases penalties for violations of the statute. &sect;814(1).</li>
    </ol>
    <p>&quot;Loss&quot; under the statute now expressly
    includes time spent responding and
    assessing damage, restoring data,
    program, system or information, any
    revenue lost, cost incurred or other
    consequential damages. &sect;814. </p>

<h4>B. Computer Crimes under CFAA Defined as
    &quot;Terrorist Offenses&quot;</h4>
    <p>As far as the investigation has revealed so far, computer crime played no role
    in the September 11, 2001 attacks or in any previous terrorist attacks suffered
    by the United States. Computer crime, especially when it results in danger to
    lives, is a serious offense, but PATRIOT adds it to the list of &quot;terrorist
    offenses.&quot; Although it is obviously possible that a computer crime in the
    future could be part of a terrorist offense, the definition of
    &quot;terrorism&quot; already includes murder, hijacking, kidnapping and
    similar crimes that would be the result of a &quot;cyber-terrorist&quot;
    attack. Yet without explanation, early versions of PATRIOT included even low-level
    computer intrusion and web defacement as &quot;terrorist offenses.&quot; The
    final bill was not so draconian, but still includes the following (among
    others unrelated to computer crime) as &quot;terrorist offenses&quot; under 18 USC
    &sect;2332b(g)(5)(B): </p>
    <ol start=1 type=1>
    <li>An act calculated to influence or affect the conduct of
    government by intimidation or coercion or to retaliate against government
    conduct (this language was in existing law) AND EITHER </li>
    <li>violates 18 USC &sect;1030(a)(1), accessing restricted or
    classified information on computers that require protection for reasons of
    national security, national defense or &sect;11(y) of Atomic Energy Act of 1954
    with reason to believe that the information could injure the U.S. or
    advantage a foreign nation, and willfully communicating the information to one
    not entitled to it, OR </li>
    <li>violates 18 USC &sect;1030(a)(5)(A)(i) resulting in damage
    that: 
    <ol start=1 type=a>
    <li>causes a medical care problem, physical injury, or
    threat to public health or safety, OR </li>
    <li>affects a computer system used by or for a government
    entity in furtherance of the administration of justice, national
    defense, or national security. </li>
    </ol></li>
    <li>If an offense is a federal terrorism offense per 18 USC
    2332b(g)(5)(B): 
    <ol start=1 type=a>
    <li>RICO procedures apply. &sect;813. This
    includes seizure of assets pre-conviction, forfeiture
    post-conviction and many other procedural provisions previously
    applicable just to organized crime and the drug war. </li>
    <li>8 year statute of limitation &sect;3286 (&sect;809). </li>
    <li>Alternate maximum penalties (&sect;810) 15 year max
    penalty 810(c)(1) and if death of a person results, for any term or for
    life. </li>
    <li>Included in &sect;803: harboring or concealing terrorists </li>
    <li>Included in &sect;805: Material support under 18 USC 2339A. </li>
    <li>Section 806 regarding assets &quot;of any individual, entity
    or organization engaged in planning or perpetrating any act of domestic or
    international terrorism,&quot; and all assets &quot;affording any person a
    source of influence over any such entity or organization.&quot; </li>
    <li>PATRIOT &sect;805 amends 18 USC 2339A. Material support for
    terrorists now includes &quot;expert advice or assistance&quot;; e.g.,
    biochemist\'s advice on how to increase lethality of biological agents. </li>
    </ol></li>
</ol>

<p>Previously, 2339A included &quot;training&quot;;
    statute requires &quot;knowing or intending that they [material support
    or resources] are to be used in preparation for, or in carrying out, a
    violation . . .. [of, inter alia, 2332b]" -- so this requires knowing or
    intentional facilitation.</p>

<p>Under 2339A a facilitator may be culpable whether or not the underlying offense is
    committed; also, scienter does not require &quot;specific intent to commit
    the underlying action,&quot; but only knowledge that material support or
    resources &quot;are to be used&quot; for a specified offense -- however, normally
    this is interpreted to mean that the facilitator be &quot;aware that that result is
    practically certain to follow from his conduct.\'&quot; If a facilitator was
    virtually certain that particular recipients would in fact use the
    provided resources to commit a terrorist crime, it would be immaterial whether
    the facilitator knew precisely when or where the criminal conduct would occur.
</p>

<h3>IV.  Sunset Provisions</h3>

<p>Under PATRIOT &sect;224, several of the surveillance
    portions of PATRIOT will expire on December 31, 2005. </p>

<p>The EFF is pleased that at least some of the more
    severe changes in the surveillance of U.S. persons contained in PATRIOT will
    expire on December 31, 2005 unless renewed by Congress. We are concerned,
    however, that there is no way for Congress to review how several of these
    key provisions have been implemented, since there is no reporting requirement
    to Congress about them and no requirements of reporting even to a judge about
    several others. Without the necessary information about how these broad new
    powers have been used, Congress will be unable to evaluate whether they have
    been needed and how they have been used in order to make an informed decision
    about whether and how they should continue or whether they should be
    allowed to expire without renewal. </p>

<h4>A.  The provisions that expire include:</h4>
	<ul>
    <li>&sect;201. Authority To Intercept Wire, Oral, And Electronic
    Communications Relating To Terrorism. </li>
    <li>&sect;202. Authority To Intercept Wire, Oral, And Electronic
    Communications Relating To Computer Fraud And Abuse Offenses. </li>
    <li>&sect;203(b), (d).  Authority To Share Criminal
    Investigative Information. </li>
    <li>&sect;206. Roving Surveillance Authority Under The Foreign
    Intelligence Surveillance Act Of 1978. </li>
    <li>&sect;207. Duration Of FISA Surveillance Of Non-United States
    Persons Who Are Agents Of A Foreign Power. </li>
    <li>&sect;209. Seizure Of Voice-Mail Messages Pursuant To
    Warrants. </li>
    <li>&sect;212. Emergency Disclosure Of Electronic Communications
    To Protect Life And Limb. </li>
    <li>&sect;214. Pen Register And Trap And Trace Authority
    Under FISA. </li>
    <li>&sect;215. Access To Records And Other Items Under FISA. </li>
    <li>&sect;217.  Interception Of Computer Trespasser Communications. </li>
    <li>&sect;218. Foreign Intelligence Information. </li>
    <li>&sect;220. Nationwide Service Of Search Warrants For
    Electronic Evidence. </li>
    <li>&sect;223. Civil Liability For Certain Unauthorized
    Disclosures. </li>
	</ul>

<h4>B. The following provision do not expire:</h4>

    <ul type=disc>
    <li>&sect;203(a),(c). Authority To Share Criminal Investigative
    Information.</li>
    <li>&sect;208. Designation Of Judges. </li>
    <li>&sect;210. Scope Of Subpoenas For Records Of Electronic Communications.</li>
    <li>&sect;211. Clarification Of Scope [privacy provisions of Cable
    Act overridden for communication services offered by cable providers
      (but not for records relating to cable viewing.)] </li>
    <li>&sect;213. Authority For Delaying Notice Of The Execution Of
      A Warrant. </li>
    <li>&sect;216. Modification Of Authorities Relating To Use Of Pen
      Registers And Trap And Trace Devices. </li>
    <li>&sect;219. Single-Jurisdiction Search Warrants For Terrorism.</li>
    <li>&sect;222. Assistance To Law Enforcement Agencies. </li>
    <li>&sect;225. Immunity For Compliance With Fisa Wiretap. Can
      continue all investigations active at the time of expiration. </li>
    </ul>



</div>
';

global $REQUEST_URI;
$smarty->assign('content',$content);
$smarty->display('generic.tpl',$REQUEST_URI);

?>
