Here it is what does everyone think about it?
DOMESTIC SECURITY ENHANCEMENT ACT OF 2003
SECTION-BY-SECTION ANALYSIS
Title I: Enhancing National Security Authorities
Subtitle A: Foreign Intelligence Surveillance Act Amendments
Section 101: Individual ists as Foreign Powers.
Under 50 U.S.C. � 1801(a)(4), the definition of "foreign power" includes groups that engage in international ism, but does not reach unaffiliated
individuals who do so. As a result, investigations of "lone wolf" ists or "sleeper cells" may not be authorized under FISA. Such investigations
therefore must proceed under the stricter standards and shorter time periods set forth in Title III, potentially resulting in unnecessary and
dangerous delays and greater administrative burden. This provision would expand FISA's definition of "foreign power" to include all persons,
regardless of whether they are affiliated with an international ist group, who engage in international terrorism.
Section 102: Clandestine Intelligence Activities by Agent of a Foreign Power.
FISA currently defines "agent of a foreign power" to include a person who knowingly engages in clandestine intelligence gathering activities on
behalf of a foreign power--but only if those activities "involve or may involve a violation of" federal criminal law. Requiring the additional
showing that the intelligence gathering violates the laws of the United States is both unnecessary and counterproductive, as such activities threaten
the national security regardless of whether they are illegal. This provision would expand the definitions contained in 50 U.S.C. � 1801(b)(2)(A) &
(B). Any person who engages in clandestine intelligence gathering activities for a foreign power would qualify as an "agent of a foreign power,"
regardless of whether those activities are federal crimes.
Section 103: Strengthening Wartime Authorities Under FISA.
Under 50 U.S.C. �� 1811, 1829 & 1844, the Attorney General may authorize, without the prior approval of the FISA Court, electronic surveillance,
physical searches, or the use of pen registers for a period of 15 days following a congressional declaration of war. This wartime exception is
unnecessarily narrow; it may be invoked only when Congress formally has declared war, a rare event in the nation's history and something that has not
occurred in more than sixty years. This provision would expand FISA's wartime exception by allowing the wartime exception
1
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
to be invoked after Congress authorizes the use of military force, or after the United States has suffered an attack creating an national
emergency.
Section 104: Strengthening FISA's Presidential Authorization Exception.
50 U.S.C. � 1802 allows the Attorney General to authorize electronic surveillance for up to a year, without the FISA Court's prior approval, in two
narrow circumstances: (1) if the surveillance is are directed solely at communications between foreign powers; or (2) if the surveillance is directed
solely at the acquisition of technical intelligence, other than spoken communications, from property under the exclusive control of a foreign power.
In addition, the Attorney General must certify that there is no substantial likelihood that such surveillance will acquire the communications of U.S.
persons. (In essence, � 1802 authorizes the surveillance of communications between foreign governments, and between a foreign government and its
embassy.) Section 1802 is of limited use, however, because it explicitly prohibits efforts to acquire spoken communications. (No such limitation
exists in the parallel exception for physical searches, 50 U.S.C. � 1822(a), under which agents presumably could infiltrate a foreign power's
property for the purpose of overhearing conversations.) This provision would enhance the presidential authorization exception by eliminating the
requirement that electronic surveillance cannot be directed at the spoken communications of foreign powers.
Section 105: Law Enforcement Use of FISA Information.
50 U.S.C. � 1806(b) currently prohibits the disclosure of information "for law enforcement purposes" unless the disclosure includes a statement that
the information cannot be used in a criminal proceeding without the Attorney General's advance authorization. This provision would amend � 1806(b) to
give federal investigators and prosecutors greater flexibility to use FISA-obtained information. Specifically, it would eliminate the requirement that
the Attorney General personally approve the use of such information in the criminal context, and would substitute a requirement that such use be
approved by the Attorney General, the Deputy Attorney General, the Associate Attorney General, or an Assistant Attorney General designated by the
Attorney General.
Section 106: Defense of Reliance on Authorization.
50 U.S.C. � 1809(b) and 1827(b) create a defense for agents who engage in unauthorized surveillance or searches, or who disclose information without
authorization, if they were relying on an order issued by the FISA Court. However, there does not appear to be a statutory defense for agents who
engage in surveillance or searches pursuant to FISA authorities under which no prior court approval is required--e.g., pursuant to FISA's wartime
exception (50 U. S.C. �� 1811, 1829 & 1844), or FISA's presidential authorization exception (50 U.S.C. � 1802 & 1822(a)). This provision would
clarify that the "good faith reliance" defense is available, not just when
2
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
agents are acting pursuant to a FISA Court order, but also when they are acting pursuant to a lawful authorization from the President or the Attorney
General.
Section 107: Pen Registers in FISA Investigations.
50 U.S.C. � 1842(a)(1) makes FISA pen registers available in investigations of non-U.S. persons to "obtain foreign intelligence information." But
for U.S. persons, the standard is much higher: in cases involving U.S. persons, pen registers are only available "to protect against international
ism or clandestine intelligence activities." Perversely, this appears to be stricter than the standard for pen registers under Title III, which
requires only that it be shown that the information "is relevant to an ongoing criminal investigation." 18 U.S.C. � 3123(a)(1). This provision would
amend � 1842(a)(1) by eliminating the stricter standard for U.S. persons. Specifically, FISA pen registers would be available in investigations of
both U.S. persons and non-U.S. persons whenever they could be used "to obtain foreign intelligence information."
Section 108: Appointed Counsel in Appeals to FISA Court of Review.
Under FISA, proceedings before the FISA Court and the Court of Review are conducted ex parte. As a result, when the Court of Review meets to consider
an appeal by the United States, there is no party to defend the judgment of the court below. The FISA Court of Review thus is obliged to interpret
sensitive and complicated statutes without the benefit of the adversary process. This provision would amend FISA to permit the FISA Court of Review,
in its discretion, to appoint a lawyer, with appropriate security credentials, to defend the judgment of the FISA Court, when the United States
appeals a ruling to the FISA Court of Review. It would also provide for the compensation of a lawyer so appointed by the FISA Court of Review.
Sec. 109: Enforcement of Foreign Intelligence Surveillance Court Orders.
The Foreign Intelligence Surveillance Act does not specify the means for enforcement of orders issued by the Foreign Intelligence Surveillance Court.
Thus, for example, if a person refuses to comply with an order of the court to cooperate in the installation of a pen register or trap and trace
device under 50 U.S.C. � 1842(d), or an order to produce records under 50 U.S.C. � 1861, existing law provides no clearly defined recourse to secure
compliance with the court's order. This section remedies this omission by providing that the Foreign Intelligence Surveillance Court has the same
authority as a United States district court to enforce its orders, including the authority to impose contempt sanctions in case of disobedience.
Sec. 110: Technical Correction Related to the USA PATRIOT Act.
3
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
Section 204 of the USA PATRIOT Act clarified that intelligence exceptions from the limitations on interception and disclosure of wire, oral, and
electronic communications continue to apply, notwithstanding section 216 of the Act. Section 224 sunsetted several provisions of the Act on December
31, 2005. Although section 216 was not included in the sunset provision, section 204's clarifying language was sunsetted. If not corrected, this
anomaly will result in the loss of valuable and necessary intelligence exemptions to the pen register and trap and trace provisions after December 31,
2005. This provision would eliminate this anomaly and treat the clarifying language of section 204 the same as section 216.
Sec. 111. International ist Organizations as Foreign Powers.
Groups engaged in international ism are included under the definition of "foreign power" in FISA. See 50 U.S.C. � 1801(a)(4). However, for certain
purposes--including the duration of surveillance orders and the definition of what constitutes a "United States person"--they are effectively
excluded from the concept of foreign powers, and accorded the more protected treatment that FISA provides to other entities. This section amends FISA
so that international terrorist organizations are consistently treated as foreign powers for these purposes.
More specifically, there are basically two sets within the FISA definition of "foreign power" under 50 U.S.C. � 1801(a): (i) A paragraph (1)-(3)
set, which includes foreign governments, foreign factions, and entities that foreign governments openly acknowledge they direct and control. (ii) A
paragraph (4)-(6) set, which includes groups engaged in international ism or preparations therefor, foreign-based political organizations not
substantially composed of U.S. persons, and entities directed and controlled by foreign governments.
50 U.S.C. �� 1805(e) and 1824(d) define the authorization periods for electronic surveillance and physical searches under FISA. The basic
authorization and extension periods are 90 days, but longer for surveillance and searches relating to certain foreign powers. Specifically, the
authorization and extension periods for foreign powers in the paragraph (1)(3) set--foreign governments, foreign factions, and entities for which
foreign governments openly acknowledge direction and control--are up to a year. In contrast, for foreign powers in the paragraph (4)-(6)
set--international ist organizations, foreign-base political organizations not substantially composed of U.S. persons, and entities directed and
controlled by foreign governments--the initial authorization period is no more than 90 days. The extension period for foreign powers in the paragraph
(4)-(6) set is also no more than 90 days, unless certain restrictions and special finding requirements are satisfied. (Specifically, the extension
period may be up to a year for an order relating to a foreign-based political organization not substantially composed of U.S. persons or an order
relating to an entity directed and controlled by a foreign government, and up to a year for an order relating to an international ist organization
that is not a U.S. person, if the judge finds probable cause to believe that no communication or property of any individual U.S. person will be
acquired.)
4
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
Another context in which different types of "foreign powers" are treated differently is the FISA definition of "United States person." United
States persons have a more protected status under FISA for certain purposes, such as dissemination of information. The existing definition of "United
States person" in 50 U.S.C. � 1801(i) categorically excludes a corporation or association which is a foreign power--but only if it falls in the
paragraph (1)-(3) set.
The effect of the foregoing provisions is that, even if probable cause is established that a group is an international ist organization, it may be
subject only to brief periods of surveillance absent renewal, and it may be accorded the protected status of a United States person. The amendments in
this section will facilitate the investigation of threats to the national security posed by such groups by reassigning them to the less protected
status now accorded to foreign powers in the paragraph (1)-(3) set. Thus, the normal authorization and extension periods for surveillance of
international ist organizations would be up to a year, and corporations and associations which are international ist organizations would not be
treated as United States persons under FISA.
Subtitle B: Enhancement of Law Enforcement Investigative Tools
Section 121: Definition of ist Activities.
This section adds a definition of % ist activities" to the definitional section for the chapter of the criminal code governing electronic
surveillance (chapter 119). The definition encompasses criminal acts of domestic and international ism as defined in 18 U.S.C. � 2331, together with
related preparatory, material support, and criminal activities. The same definition of terrorist activities would also apply through cross-referencing
provisions, see 18 U.S.C. � 2711(1) and 3127(1) (as amended), in the chapters of the criminal code that govern accessing stored communications and the
use of pen registers and trap and trace devices (chapters 121 and 206).
The surveillance chapters of the criminal code contain many provisions which state that the authorized surveillance activities may be carried out as
part of "criminal investigations." Section 121 also adds a provision to 18 U.S.C. � 2510 which specifies that "criminal investigations" include
all investigations of criminal ist activities, to make it clear that the full range of authorized surveillance techniques are available in
investigations of % ist activities" under the new definition.
Section 122: Inclusion of ist Activities as Surveillance Predicates.
This section adds ist activities, as defined under the amendment of section 121, and four specific offenses that are likely to be committed by
terrorists (the offenses defined by 18 U.S.C. � 37, 930(c), 956, and 1993), as explicit predicates for electronic surveillance and monitoring. It
further adds an explicit reference to ist activities to the provision authorizing electronic
5
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
surveillance without a court order in emergency situations--18 U.S.C. � 2518(7)--and makes conforming changes in the corresponding provision (18
U.S.C. � 3125) for using pen registers and trap and trace devices without a court order in emergency situations.
The final subsection of this section modifies the definition of "court of competent jurisdiction" in 18 U.S.C. � 3127(2), to correct an unintended
effect of amendments in sections 216(c)(1) and 220 of the USA PATRIOT Act. The purpose of the amendments was to authorize courts having jurisdiction
over an offense to issue orders for pen registers and trap and trace devices, and search warrants for the disclosure of e-mails, which could be
executed outside of their districts. However, the language utilized inadvertently created a lack of clarity concerning the continued validity of the
pre-existing authority of the courts to issue such orders and warrants for within their own districts (regardless of whether they have "jurisdiction
over the offense").
This threatens to be a serious practical problem when information gathering in the United States is needed in response to requests by foreign law
enforcement agencies to assist in foreign ism (or other criminal investigations) and to fulfill the United States' obligations under mutual legal
assistance treaties, and in the context of investigations relating to crimes committed on U.S. military bases abroad, because in those cases the U.S.
courts generally do not have jurisdiction over the offense. This section corrects the problem in relation to pen register and trap and trace orders
through definitional language that explicitly includes both a court with jurisdiction over the offense or activities being investigated, and a court
in the district in which the order will be executed. A parallel correction for the problem relating to search warrants for e-mails appears in section
125(b) of this bill.
Section 123: Extension of Authorized Periods Relating to Surveillance and Searches in Investigations of ist Activities.
In Katz v. United States, 389 U.S. 347 (1967), the Supreme Court held for the first time that government wiretapping was subject to the Fourth
Amendment. In response, Congress enacted Title III of the 1968 Omnibus Crime Control and Safe Streets Act, 28 U.S.C. �� 2510-2522, which governs
electronic surveillance for all federal criminal offenses. Congress also subsequently enacted the Electronic Communications Privacy Act (ECPA), 18
U.S.C. �� 2701-2712, which addresses government access to stored communications, and established statutory standards and procedures for the use of pen
registers and trap and trace devices, 18 U.S.C. �� 3121-3127. Further, because Katz and progeny specifically stated that the Court did not hold that
the same Fourth Amendment restrictions applied with respect to the activities of foreign powers and their agents, in 1978 Congress enacted the Foreign
Intelligence Surveillance Act, 50 U.S.C. �� 1801-1862, which establishes standards applicable to surveillance of foreign powers and agents of foreign
powers--including electronic surveillance, physical searches, and use of pen registers and trap and trace devices--in relation to the investigation of
such matters as international ism and espionage.
6
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
Congress has not provided separate statutory standards governing investigations of wholly domestic threats to the national security, particularly
domestic ism. Thus, such investigations are subject to the time limits set forth in Title III. However, the Supreme Court in United States v. United
States District Court ("Keith"), 407 U.S. 297 (1972), explicitly recognized that domestic security investigations would require different standards
than those set forth in Title III:
"We recognize that domestic security surveillance may involve different policy and practical considerations from the surveillance of 'ordinary
crime.' The gathering of security intelligence is often long range and involves the interrelation of various sources and types of information. The
exact targets of such surveillance may be more difficult to identify than in surveillance operations against many types of crime specified in Title
III. Often, too, the emphasis of domestic intelligence gathering is on the prevention of unlawful activity or the enhancement of the Government's
preparedness for some possible future crisis or emergency. Thus, the focus of domestic surveillance may be less precise than that directed against
more conventional types of crime."
Id. at 322. Because domestic security investigations were subject to Title III, despite these considerations, the Court invited Congress to legislate
new and different standards for such investigations:
"Given [the] potential distinctions between Title III criminal surveillances and those involving the domestic security, Congress may wish to consider
protective standards for the latter which differ from those already prescribed for specified crimes in Title III. Different standards may be
compatible with the Fourth Amendment if they are reasonable both in relation to the legitimate need of Government for intelligence information and the
protected rights of our citizens."
Id.
In Keith, the court noted that, with respect to surveillance in domestic security cases, "the time and reporting requirements need not be so strict
as those in � 2518." Id. at 323. This section accepts the Court's invitation and extends, in investigations of ist activities, a number of statutory
time limits or periods relating to electronic surveillance or monitoring and searches. The specific changes are:
(1) Amend 18 U.S.C. � 2518(5) to extend the normal duration of electronic surveillance orders in investigations of ist activities from 30 days to 90
days.
(2) Amend 18 U.S.C. � 2518(6), which provides that an electronic surveillance order may require periodic progress reports to the judge who issued the
order "at such intervals as
7
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
the judge may require." As amended, the provision would not allow reports to be required at shorter intervals than 30 days in investigations of ist
activities.
(3) Amend 18 U.S.C. � 2705, which permits delaying notification concerning the accessing of a person's stored electronic communications where
specified "adverse results" would result from the notification. As amended, the provision would include endangerment of the national security as a
specified adverse result that permits delaying notification.
(4) Amend 18 U.S.C. � 3123 to extend the normal authorization periods for pen registers and trap and trace devices in investigations of ist activities
from 60 days to 120 days.
Section 124: Multi-function Devices
Electronic manufacturers increasingly are producing devices that are capable of performing multiple functions--e.g., cell phones that also can send
e-mail like a Blackberry, and that include a calendar like a Palm Pilot. Multiple functions are also illustrated by ordinary home computers, which
may, for example, be used to send and receive e-mail messages, to engage in oral communications through an Internet phone service, to store sent and
received messages, and to store other information. Current law does not make it clear that the authorization (e.g., under an electronic surveillance
order) to monitor one of a device's functions also entails the authority to monitor other functions.
This section accordingly amends 18 U.S.C. � 2518(4) to make it clear that authorization of electronic surveillance with respect to a device, unless
otherwise specified, may be relied on to intercept and access communications through any of the device's functions. The section also effectively
allows a search warrant for other information retrievable from the device (whether or not related to the intercepted communications) to be combined
with the electronic surveillance order, and makes conforming changes in the chapters relating to accessing stored communications and pen registers and
trap and trace devices.
The section further incorporates a correction for an unintended consequence of amendments in section 220 of the USA PATRIOT Act. As discussed in
relation to section 122 of the bill above, amendments designed to authorize courts having jurisdiction over an offense to issue search warrants for
the disclosure of e-mails outside of their districts have inadvertently clouded the pre-existing authority of the courts to issue such orders and
warrants for within their own districts. This section corrects the problem by amending the pertinent language in 18 U.S.C. � 2703(b)(1)(A) and
(c)(1)(A) to refer to a court in a district in which a provider of electronic communications service is located, as well as a court having
jurisdiction over the offense or activities under investigation.
8
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
Section 125: Nationwide Search Warrants in ism Investigations.
Federal Rule of Criminal Procedure 41(a)(3) currently authorizes judges in one district to issue search warrants that are valid in another district,
if the crime being investigated is "domestic ism or international ism" as defined in 18 U.S.C. � 2331. But � 2331 sets forth an extremely narrow
definition of ism, as it is limited to "violent acts or acts dangerous to human life." Thus section 2331 arguably does not include investigations
into terrorist financing, or other crimes that ists are likely to commit. As a result, a federal judge sitting in New York would be able to issue a
search warrant that is valid in California in an investigation of a plot to a building, but arguably could not issue the same warrant if the
investigation concerned the raising of money to support ist operations.
This provision would expand the types of ism crimes for which judges may issue search warrants that are valid nationwide. Specifically, it would
authorize nationwide search warrants in investigations of the offenses listed in 18 U.S.C. � 2332b(g)(5)(B), including computer crimes, attacks on
communications infrastructure, and providing material support to ists or ist organizations.
Section 126: Equal Access to Consumer Credit Reports.
In recent years, it has become increasingly apparent that law enforcement investigators need access to suspected ists' banking information to
determine their connections to ist organizations, including financial ties. The current version of 15 U.S.C. � 1681b(a)(1) allows investigators to
obtain a suspect's credit report-the first step in locating his banking recordsonly in response to a court order or a federal grand jury subpoena. As
a result, law enforcement cannot obtain a suspect's banking information without issuing multiple timeconsuming subpoenas. In some cases, it can take
a series of three subpoenas--first to the credit reporting agency, then to the suspect's creditors, then to the suspect's banks--and a period of
nine to 12 weeks to learn where a suspected ist keeps his accounts. Perversely, the law makes it far easier for priva ies to obtain an individual's
credit reports; under 15 U.S.C. � 1681b(a)(3)(F), a priva y can obtain--usually within minutes--a credit report on anyone in the United States so long
as it has a "legitimate business need" for the information.
This provision would enable the government to obtain credit reports on virtually the same terms that priva ies may. Specifically, it would amend �
1681b(a)(1) to allow law enforcement officers to obtain credit reports upon their certification that they will use the information only in connection
with their duties to enforce federal law. This certification parallels the existing requirement that a priva y must have a "legitimate business
need" before obtaining a credit report. In addition, to avoid alerting ists that they are under investigation, this provision would prohibit (absent
court approval) disclosing to a consumer the fact that law enforcement has sought his credit report.
9
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
Section 127: Authority.
Autopsies of the victims of ist attacks and other ly crimes, as well as other persons, can be an effective way of obtaining information about the
perpetrators. In addition to revealing the cause of , sometimes enable law enforcement to retrieve forensic evidence (such as fragments) from the
deceased's body. The primary need for federal authority arises in the case of offenses, including acts of ism, outside the United States. At present,
however, except in cases involving military personnel, the United States has no statutory authority to conduct . When a non-military United States
national dies abroad as a result of a possible offense against the United States, the victim's body typically must be transported back to the United
States before an can be performed; this may significantly delay both the return of the loved one's remains to family members, as well as cause
significant delays in the criminal investigation.
This provision would create federal authority, in the Attorney General, to conduct when necessary or appropriate in the conduct of federal criminal
investigations. This authority is not limited and may be delegated to other officers. This proposal is not intended to result in the hiring of medical
examiners by federal law enforcement agencies. Rather, the will be performed by local coroners, private forensics investigators, or the Armed Forces
Medical Examiner and his staff.
Section 128: Administrative Subpoenas in ism Investigations.
The Department of Justice currently has the authority to issue administrative subpoenas in investigations of a wide variety of federal offenses,
including health-care fraud, see 18 U.S.C. � 3486(a)(1)(A), immigration violations, see 8 U.S.C. � 1225(a), and false claims against the United
States, see 31 U.S.C. � 3733. But administrative subpoenas are not available in investigations of ism, even though the consequences of a ist attack
are far more dire than committing simple fraud against the United States government. As a result, lawenforcement personnel are required to seek grand
jury subpoenas before individuals who may have information relevant to a terrorism investigation can be compelled to testify or provide documents.
This provision would extend the existing administrative-subpoena authorities into investigations involving domestic or international ism. It also
would prohibit a subpoena recipient from disclosing to any other person (except to a lawyer in order to obtain legal advice) the fact that he has
received a subpoena. This proposal would not give the Justice Department a unilateral, unreviewable authority to compel production of documents
relevant to a ism investigation. If recipients refuse to comply with subpoenas, the Justice Department would have to ask a court to enforce them. And
subpoena recipients would retain the ability, as they do in other contexts, to ask a court to quash the subpoena. See, e.g., In re Administrative
Subpoena, John Doe, D.P.M., 253 F.3d 256 (6th Cir. 2001).
10
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
Sec. 129: Strengthening Access to and Use of Information in National Security Investigations.
This section is primarily concerned with correcting problems and weaknesses in provisions authorizing the use of "national security letters." In
substance, national security letters are administrative subpoenas that may be issued by FBI officials--or in some instances, other authorized
government officials-to obtain specified types of records or information for use in national security investigations. The existing national security
letter provisions include the following:
(1) 18 U.S.C. � 2709--Providing FBI access, in connection with investigations of international ism or espionage, to certain electronic communication
transactional records maintained by communication service providers.
(2) Section 625(a)-(b) of the Fair Credit Reporting Act (15 U.S.C. � 168 Iu(a)(b))--Providing FBI access, in connection with investigations of
international ism or espionage, to certain consumer information maintained by consumer reporting agencies.
(3) Section 626 of the Fair Credit Reporting Act (15 U.S.C. � 1681v)--Providing access to consumer reports and other consumer information maintained
by consumer reporting agencies, where needed by government agencies authorized to investigate or carry out intelligence or analysis activities related
to international ism.
(4) Section 1114(a)(5) of the Right to Financial Privacy Act (12 U.S.C. � 3414(a)(5))--Providing FBI access, in connection with investigations of
international ism or espionage, to financial records maintained by financial institutions.
(5) Section 802(a) of the National Security Act of 1947 (50 U.S.C. � 436(a))--Providing access by authorized investigative agencies to financial
records and information, consumer reports, and travel records in relation to a person having access to classified information, based on indications
that the person has disclosed or may disclose classified information to a foreign power.
Problems under these provisions include the following: (1) The statutes in which the national security letter provisions appear generally prohibit
persons from disclosing that they have received these requests for information, to safeguard the integrity of the ism and espionage investigations in
which national security letters are used. However, they specify no penalty for persons who make such unlawful disclosures. (2) While these statutes
create a legal obligation for the recipient to provide the requested information, they do not specify any procedures for judicial enforcement in case
the recipient refuses to comply with the request. (3) The scope of the national security letter provisions on the ism side is generally limited to
international
11
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
terrorism; however, the distinction between international and domestic terrorism is increasingly elusive in contemporary circumstances. (4) These
provisions are restrictive regarding the sharing of information among federal agencies with relevant responsibilities. This is in conflict with
current needs and with the broad principles favoring the sharing of intelligence among federal agencies under the USA PATRIOT Act.
Subsection (a) of this section provides appropriate penalties for violations of the nondisclosure provisions of the national security letter
provisions. Currently, 18 U. S.C. � 1510(b) makes it an offense for an officer of a financial institution to notify other persons about a grand jury
subpoena or an administrative subpoena issued by the Department of Justice for records of the financial institution. The offense is punishable by up
to a year of imprisonment, or up to five years of imprisonment if the disclosure was made with the intent to obstruct a judicial proceeding.
Similarly, 18 U.S.C. � 1510(d) makes it an offense, punishable by up to five years of imprisonment, for an insurance company employee to notify other
persons about a grand jury subpoena for records with intent to obstruct a judicial proceeding.
Subsection (a) of this section adds a parallel offense (proposed 18 U.S.C. � 1510(e)) covering violations of the non-disclosure requirements of the
national security letter provisions described above. As with current 18 U.S.C. � 1510(b), the offense would be a misdemeanor punishable by up to a
year of imprisonment, but would be punishable by up to five years of imprisonment if the unlawful disclosure was committed with the intent to obstruct
the ism or espionage investigation. In addition to providing appropriate penalties for unlawful disclosure of national security letter requests, the
same penalties would apply to: (i) violation of the non-disclosure requirement under 50, U. S .C. � 1861(d) for orders of the Foreign Intelligence
Surveillance Court requiring the production of records, documents, and other tangible things in connection with investigations to obtain foreign
intelligence information about non-United States persons or to protect against international ism or espionage, and (ii) violation of the
non-disclosure provision of proposed 18 U.S.C. � 2332f(d) in section 129 of this bill, relating to administrative subpoenas in ism investigations.
The national security letter provisions make compliance with the request for information mandatory. See 12 U.S.C. � 3414(a)(5)(A); 15 U.S.C. �
1681u(a)-(b), 1681v(a); 18 U.S.C. � 2709(a); 50 U.S.C. � 436(c). However, they make no provision for judicial enforcement in case this legal
obligation is not met. Subsection (b) of this section authorizes the Attorney General to seek judicial enforcement in such cases. This is similar, for
example, to the existing judicial enforcement provision in 18 U.S.C. � 3486(c) for administrative subpoenas under that section.
Subsection (c) of this section amends the national security letter provisions relating to electronic communication transactional records, consumer
credit information, and financial institution records, so that they apply in investigations of all types of ist activities. The specific amendments
involve substituting, for current references in these provisions to
12
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
investigations relating to "international ism," references to investigations relating to % ist activities." The latter notion is defined in
proposed 18 U.S.C. � 2510(20) in section 121 of this bill so as to include domestic, as well as international, ism. The limitation to international
terrorism in existing law is an impediment to the effective use of national security letters because it may not be apparent in the early stages of a
terrorism investigation-or even after it has continued for some time-whether domestic or international ism is involved. The Oklahoma City ing and the
anthrax letter incidents illustrate this point. Moreover, in the current circumstances, domestic ists who attempt to ally with or are inspired to
emulate international ists are an increasing concern. The dangers posed to the national security by such persons may be comparable to those posed by
international ists, and national security letters should likewise be an available tool in the investigation of their criminal activities.
Subsection (d) of this section deletes or modifies language in the national security letter provisions which unduly limits information sharing among
federal agencies. For example, 18 U.S.C. � 2709 is the national security letter provision for electronic communication transactional records.
Subsection (d) of � 2709 states that the FBI may disseminate information and records obtained pursuant to that section only as provided in guidelines
approved by the Attorney General "for foreign intelligence collection and foreign counterintelligence investigations conducted by the Federal Bureau
of Investigation, and, with respect to dissemination to an agency of the United States, only if such information is clearly relevant to the authorized
responsibilities of such agency." The reference to guidelines that relate to "foreign intelligence collection and foreign counterintelligence
investigations" is inconsistent with the amendment proposed in subsection (c) of this section to extend the scope of 18 U.S.C. � 2709 to include
investigations of domestic ism, as well as international ism. The restrictive language regarding information sharing with other federal agencies is in
conflict with the principles favoring broad sharing of intelligence among federal agencies under section 203 of the USA PATRIOT Act (Pub. L.
107-56).
Subsection (c) of this section accordingly deletes the restrictive language quoted above in 18 U.S.C. � 2709(d), so that it states simply that the FBI
may disseminate information and records obtained under � 2709 only as provided in guidelines approved by the Attorney General. Subsection (c) also
makes similar changes in the other national security letter provisions. The general effect of the amendments is to remove existing impediments to the
sharing of information obtained by means of national security letters in ism and espionage investigations with other federal agencies having relevant
responsibilities.
Title II: Protecting National Security Information
Section 201: Prohibition of Disclosure of ism Investigation Detainee Information.
13
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
In certain instances, the release of information about persons detained in connection with ism investigations could have a substantial adverse impact
on the United States' security interests, as well as the detainee's privacy. Cf. North Jersey Media Group, Inc. v. Ashcroft, 308 F.3d 198, 217-19
(3d Cir. 2002). Publicizing the fact that a particular alien has been detained could alert his coconspirators about the extent of the federal
investigation and the imminence of their own detention, thus provoking them to flee to avoid detention and prosecution or to accelerate their ist
plans before they can be disrupted.
Although existing Freedom of Information Act (FOIA) exemptions 7(A), 7(C), and 7(F) (5 U.S.C. � 552(b)(7)) permit the government to protect
information relating to detainees, defending this interpretation through litigation requires extensive Department of Justice resources, which would be
better spent detecting and incapacitate ists. This provision thus establishes a specific authority under Exemption 3 of the FOIA to clarify what is
already implicit in various FOIA exemptions: the government need not disclose information about individuals detained in investigations of ism until
disclosure occurs routinely upon the initiation of criminal charges.
Section 202: Distribution of "Worst Case Scenario" Information.
Section 112(r) of the Clean Air Act, 42 U. S.C. � 7412(r), requires private companies that use potentially dangerous chemicals to submit to the
Environmental Protection Agency a "worst case scenario" report detailing what would be the impact on the surrounding community of release of the
specified chemicals. Such reports are a roadmap for ists, who could use the information to plan attacks on the facilities.
This provision would revise section 112(r)(7)(H) of the Clean Air Act to better manage access to information contained in "worst case scenario"
reports. This revised section would continue to allow such information to be shared with federal and state officials who are responsible for
preventing or responding to accidental or criminal releases. However, the revised section will require that public access be limited to "read-only"
ods, and only to those persons who live or work in the geographical area likely to be affected by a worst-case release from a facility.
Section 203: Information Relating to Capitol Buildings.
The Congressional Accountability Act of 1995, 2 U.S.C. � 1301 et seq., establishes the Office of Compliance, a congressional office that has the power
to enforce OSHA standards with respect to the working conditions of legislative branch employees. OSHA often assists the Office in its work, see 2
USC. � 1382(e) & 1385(b), and therefore the agency sometimes obtains securitysensitive information (e.g., the layout of government buildings, and the
location of air circulation equipment and ventilation ducts). ists may be able to obtain this information from OSHA via a FOIA request. To ensure that
congressional officials can provide necessary information with
14
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
the assurance that it will not be publicly released, this provision makes clear that such information is exempt from disclosure under FOIA Exemption
3.
Section 204: Ex Parte Authorizations Under Classified Information Procedures Act.
Under the current version of the Classified Information Procedures Act, 18 U.S.C. App. 3 � 116, courts have discretion over whether to approve the
government's request for a CIPA authorization-which enables the submission of sensitive evidence ex parte and in camera. See 18 U.S.C. App. 3 � 4
("The court may permit the United States to make a request for such authorization [for a protective order] in the form of a written statement to be
inspected by the court alone." (emphasis added)). As a result, the government is forced to divert valuable resources to litigating this question. And
even worse, a request for confidentiality itself can be a security breach: the government risks disclosing sensitive national-security information
simply by explaining in open court why the information should be redacted. See, e.g., United States v. Rezaq, 899 F. Supp. 697, 707 (D.D.C. 1995)
(government's CIPA pleadings must be served "on the defendant and then litigated in an adversarial hearing").
This provision would amend CIPA to provide that courts shall allow the United States to make a request for a CIPA authorization ex parte and in
camera. This amendment would not affect the showing that the United States is required to make in order to obtain a protective order, but by replacing
"may" with "shall," the United States will be able to obtain the court's guidance in every case in which classified information may potentially
be discoverable, without risking disclosure of the very secrets that it seeks to protect. See United States v. Klimavicius-Viloria, 144 F.3d 1249,
1261 (9th Cir. 1998) (upholding the use under CIPA of ex parte, in camera hearings and written submissions by the government when the court is
required to make discovery determinations).
Section 205: Exclusion of United States Security Requirements from Gross Income of Protected Officials.
Under current tax law, certain federal officials--those whose movements are restricted, or who are required to use specific facilities, for their
physical protection in the interest of the United States' national security--may be taxed on the value of these protective "services." See 26
C.F.R. 1.132-5(m) (describing the circumstances under which police protection and related transportation expenses may be deemed to be working
condition fringe benefits). Due to the recent ist threats, an increasing and variable number of government officials--including Cabinet and subcabinet
officers, congressional leaders, and Justices of the Supreme Court--have begun to receive protective services, and now find themselves taxed on the
value of these services.
15
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
Accordingly, this provision would add a provision to the Internal Revenue Code to clarify that required security measures jointly determined by the
Secretary of the Treasury, the Attorney General, and the Director of Central Intelligence, are excludable from the gross income of the protected
officials. This provision is limited to provisions from appropriate fluids to be consistent with restrictions on the receipt of private funds for
public purposes, and to ensure that the exclusion is limited to the public security purpose.
Section 206: Grand Jury Information in ism Cases.
This section amends Rule 6(e)(2)(B) of the Federal Rules of Criminal Procedure to make witnesses and persons to whom subpoenas are directed subject to
grand jury secrecy rules in cases where serious adverse consequences may otherwise result, including danger to the national security or to the life or
physical safety of an individual, flight from prosecution, destruction of or tampering with evidence, intimidation of a potential witness, or other
serious jeopardy to an investigation. The provision would permit witnesses and recipients of grand jury subpoenas to consult with counsel regarding
the subpoena and any testimony, but would impose the same secrecy obligations on counsel.
Title III: Enhancing Investigations of ist Plots
Subtitle A: ism Identification Database
Section 301: Short Title.
This provision indicates that Title III, Subtitle B may be referred to as the "Terrorist Identification Database Act of 2003."
Section 302: Collection and Use of Identification Information from Suspected Terrorists and Other Sources.
Current law permits the FBI to establish an index to collect DNA identification records of persons convicted of certain crimes, and DNA samples
recovered from crime scenes and unidentified human remains. 42 U.S.C. � 14132. However, the law does not directly address the FBI's authority to
collect and use DNA samples of ists or those suspected of ism. It would be extremely beneficial to clarify how DNA samples from suspects, such as
samples taken from unlawful combatants at Guantanaino Bay, can be used as necessary for counterterrorism and law-enforcement purposes. Section 302
would allow the Attorney General or Secretary of Defense to collect, analyze, and maintain DNA samples and other identification information from
"suspected ists"--i.e., (1) persons suspected of engaging in ism as defined in 18 U.S.C. � 2331 (1) & (5), or committing an offense described in 18
U.S.C. � 2332b(g)(5)(B), or persons conspiring or attempting to do so; (2) enemy combatants or other battlefield detainees;
16
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
(3) persons suspected of being members of a ist organization; and (4) certain classes of aliens including those engaged in activity that endangers
national security.
Section 303: Establishment of Database to Facilitate Investigation and Prevention of ist Activities.
This provision would allow the Attorney General to establish databases of DNA records pertaining to the ists or suspected ists from whom DNA samples
or other identification information have been collected. All federal agencies, including the Department of Defense and probation offices, would be
required to give the Attorney General, for inclusion in the databases, any DNA records, fingerprints, or other identification information that can be
collected under this Subtitle. This provision also allows the Attorney General to use the information to detect, investigate, prosecute, prevent, or
respond to ist activities, or other unlawful activities by suspected ists. In addition, the Attorney General would be able to share the information
with other federal, state, local, or foreign agencies for the same purposes.
Section 304: Definitions.
This section would establish definitions for the terms "DNA sample" and "DNA analysis." It also would define "suspected ist," which describes
the class of individuals from whom the Attorney General may acquire DNA samples and other identification information, and whose information may be
included in DNA databases.
Section 305: Existing Authorities.
This provision would establish that the new authorities created by this Subtitle are in addition toy authorities that may exist under any other source
of law. It also would provide that this Subtitle shall not construed to preclude the receipt, collection, analysis, maintenance, or dissemination of
evidence or information pursuant to any other source of law.
Section 306: Conditions of Release.
This provision would amend several portions of the United States Code to clarify that ists or suspected ists who are under any form of federal
supervision or conditional release, including parole, are subject to this Subtitle's provisions. These individuals would be in the physical custody
of the United States but for an act of governmental discretion. This section would require such individuals to cooperate in the collection of a DNA
sample as a condition of supervision or conditional release.
Subtitle B: Facilitating Information Sharing and Cooperation
17
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
Section 311: State and Local Information Sharing.
Section 203 and other provisions of the USA PATRIOT Act broadened authority to share information among federal agencies that may be relevant to the
detection and prevention of ism, and to obtain otherwise confidential information for use in ism investigations. That Act, however, did not adequately
address the need for enhanced information sharing authority in relation to state and local officials and foreign governments, who are the critical
partners of the United States in investigating ist crimes and preventing future ist attacks. This section of the bill would provide further authority
for sharing of consumer credit information, visa-related information, and educational records information with state and local law enforcement,
thereby enacting the remainder of the information sharing proposals that have been proposed legislatively and endorsed by the Administration and the
Department of Justice. See Letter of Assistant Attorney General Daniel J. Bryant to Honorable Patrick J. Leahy concerning S. 1615 (April 30, 2002).
Section 312: Appropriate Remedies with Respect to Law Enforcement Surveillance Activities.
During the 1970s and 1980s, some law enforcement agencies--e.g., the New York City Police Department--entered consent decrees that limit such agencies
from gathering information about organizations and individuals that may be engaged in terrorist activities and other criminal wrongdoing. See, e.g.,
Handschu v. Special Servs. Div., 605 F. Supp. 1384 (S.D.N.Y. 1985), aff'd, 787 F.2d 828 (2d Cir. 1986). As a result, they lack the ability to use the
full range of investigative techniques that are lawful under the Constitution, and that are available to the FBI. (For example, the Attorney
General's investigative guidelines authorize agents, subject to certain restrictions, to attend public places and events "on the same terms and
conditions as members of the public generally.") The consent decrees also handicap officers in their efforts to share information with other law
enforcement agencies, including federal law enforcement agencies such as the FBI. These problems threaten to frustrate the operations of the
federal-state-local Joint ism Task Forces, and could prevent effective cooperation at all levels of government in antiterrorism efforts. As the United
States Court of Appeals for the Seventh Circuit explained (before September 11) in discussing one consent decree, as a result of such a decree "the
public safety is insecure and the prerogatives of local government scorned. To continue federal judicial micromanagement of local investigations of
domestic and international ist activities ... is to undermine the federal system and to trifle with the public safety." Alliance to End Repression v.
City of Chicago, 237 F.3d 799, 802 (7th Cir. 2001).
This proposal would discontinue most consent decrees that could impede terrorism investigations conducted by federal, state or local law enforcement
agencies. It would immediately terminate most decrees that were enacted before September 11, 2001 (including New York City's). All surviving decrees
would have to be necessary to correct a current and ongoing
18
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
violation of a Federal right, extend no further than necessary to correct the violation of the Federal right, and be narrowly drawn and the least
intrusive means to correct the violation. This provision is ed on the Prison Litigation Reform Act, 18 U.S.C. � 3626, which terminated many
prison-related consent decrees and which repeatedly has been upheld by the courts. Section 312 does not apply to consent decrees or injunctions
remedying discrimination based on race, color, religion, , or national origin, and therefore would not affect decrees or injunctions involving
allegations of racial profiling.
Section 313: Disclosure of Information.
This provision provides protection against civil liability for businesses and their personnel who voluntarily provide information to federal law
enforcement agencies to assist in the investigation and prevention of ist activities. The purpose of the provision is to encourage voluntary
cooperation and assistance in counterterrorism efforts by priva ies and individuals.
Subtitle C: Facilitating International ism Investigations
Section 321: Authority to Seek Search Warrants and Orders to Assist Foreign States.
28 U.S.C. � 1782 does not clearly authorize the United States to obtain search warrants in response to requests from foreign governments; it only
clearly applies to subpoenas. Nor is it clear that federal law enforcement can obtain orders under the pen register/trap and trace statute at foreign
governments' requests. As a result, the United States can seek search warrants only if we have entered into a treaty with the foreign government that
contains a provision authorizing us to do so (and, naturally, only if the foreign government has set forth facts sufficient to establish probable
cause). The same is true of pen./trap orders. The United States therefore may find itself in a situation where it cannot assist a foreign government
in one of its criminal investigations, which is hardly an effective way of encouraging foreign allies to assist our own counterterrorism
investigations.
This provision would modify federal law to clarify that the United States may seek search warrants, pen/trap orders, and ECPA orders, in response to
the requests of foreign governments. Doing so will enhance our ability to assist foreign law enforcement investigations, as well as promote better
cooperation from foreign allies when we seek evidence from within their borders.
Section 322: Extradition Without Treaties and for Offenses Not Covered by an Existing Treaty.
Many of the United States' older extradition treaties contain "lists" or "schedules" of extraditable offenses that reflect only those serious
crimes in existence at the time the treaties
19
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
were negotiated. (For. example, our treaty with Egypt dates from 1874, and our treaty with Great Britain which includes Pakistan dates from the
1930s.) As a result, these older treaties often fail to include more modern offenses, such as money laundering, computer crimes, and certain crimes
against children. While some old treaties are supplemented by newer multilateral ism treaties, extradition is possible under these newer treaties only
if the other country is also a party to the multinational treaty, leaving gaps in coverage. Additionally, absent a few narrow exceptions, U.S. law
permits the extradition of offenders to a foreign nation only when there is a treaty or convention in force with that country or a statute conferring
such authority upon the executive branch. See Valentine v. United States, 299 U.S. 5, 8 (1936). At present, there are close to seventy countries in
the world with which the U.S. has no extradition treaty at all. This means that the U.S. can become a "safe haven" for some foreign criminals, and
that we cannot take advantage of some countries' willingness to surrender fugitives to us in the absence of an extradition treaty these nations
usually require at least the possibility of reciprocity.
This provision would amend current extradition law to: (1) authorize the U.S. to extradite offenders to treaty partners for modern crimes that may not
be included in our older list treaties with those countries; and (2) provide for on a case-by-case basis and with the approval of the Attorney General
and the Secretary of State extradition from the United States for serious crimes even in the absence of an extradition treaty.
Title IV: Enhancing Prosecution and Prevention of ist Crimes
Subtitle A: Increased Penalties and Protections Against Terrorist Acts
Section 401: ism Hoaxes.
In the wake of the anthrax attacks in the fall of 2001, a number of individuals chose to perpetrate ism hoaxes (e.g., sending unidentified white
powder in a letter with the intent that the recipient believe it to be anthrax). Such hoaxes divert law-enforcement and emergencyservices resources,
and thus impede our ability to respond to actual ist events. Current federal law does not adequately address the problem of hoaxes relating to various
weapons of mass destruction. At present, the primary way to prosecute terrorism hoaxes is to use "threat" statutes--e.g., 18 U.S.C. � 2332a, which
criminalizes certain threats to use a weapon of mass destruction, and 18 U.S.C. � 876, which criminalizes the use of the mails to threaten injury to a
person. But some ism hoaxes are simply false reports that cannot easily be characterized as outright threats.
This section would amend federal law to create a new prohibition on ism hoaxes. In particular, it would (1) make it unlawful to knowingly convey false
or misleading information, where the information reasonably may be believed, and concerns criminal activity relating to
20
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
weapons of mass destruction; (2) require criminal defendants to reimburse any person, including the United States, State and local first responders
who incur expenses incident to an emergency or investigative response to the ism hoax; and (3) authorize a civil action for such expenses.
Section 402: Providing Material Support to ism.
18 U.S.C. � 2339A's prohibition on providing material support to ists is unnecessarily narrow; it currently does not reach all situations where
material support o resources are provided to facilitate the commission of "international ism." Rather, � 2339A only encompasses those acts of
international ism which are prohibited by some other federal statute. Because, unlike the existing underlying offenses in � 2339A(a), "international
terrorism" per se is not an offense under Title 18, it is prudent to establish unassailable constitutional bases for prohibiting such support. The
first basis is if the material support is in or affects interstate or foreign commerce. The second basis is the regulation and control over the
activities of U.S. nationals and U.S. legal entities who are outside the United States. Such control is based on, among others, the United States'
constitutional foreign affairs power. In addition, this section amends the definition of "international ism" to make it clear that it covers acts
which by their nature appear to be intended for the stated purposes. Hence, there would be no requirement to show that the defendants actually had
such an intent. (There is a conforming amendment to the definition of "domestic ism" to maintain the existing parallel between the two
definitions.)
Second, one court of appeals recently has questioned whether the current prohibition in 18 U.S.C. � 2339B on providing "training" or "personnel"
to terrorist organizations designated under section 219 of the Immigration and Nationality Act are unconstitutionally vague. See Humanitarian Law
Project v. Reno, 205 F.3d 1130 (9th Cir. 2000), cert. denied, 121 S. Ct. 1226 (2001). But see United States v. Lindh, ___ F. Supp. 2d (E.D. Va. 2002)
(rejecting the holding of Humanitarian Law Project). Subsection (b) would amend the pertinent statutes to remove any possible doubts about the scope
of the prohibition. In particular, "training" would now be defined as "instruction or teaching designed to impart a specific skill." And criminal
liability for "personnel" would apply to "knowingly provid[ing], attempt[ing] to provide, or conspir[ing] to provide a ist organization with one or
more individuals (including himself) to work in concert with it or under its direction or control."
Section 403: Weapons of Mass Destruction.
At present, the federal weapons of mass destruction statute, 18 U.S.C. � 2332a, contains only one of the several constitutional bases for asserting
federal jurisdiction over a ist attack involving weapons of mass destruction in certain circumstances: if the attack is against a person or property
and "affect[s] interstate commerce." Id. � 2332a(a)(2). This provision would amend the statute to specifically cover property and persons in three
other circumstances where federal jurisdiction constitutionally can be asserted: (1) if the mail or any facility of interstate or foreign
21
--------------------------------------------------------------------------------
CONFIDENTIAL -- NOT FOR DISTRIBUTION
Draft--January 9, 2003
commerce is used in furtherance of the offense; (2) if the attacked