Site Map CHURCH COMMITTEE REPORTS |
66 PREPARED STATEMENT OF HON. EDWARD H. LEVI, ATTORNEY GENERAL OF THE UNITED STATES I am here today in response to a request from the Committee to diseuss the relationship between electronie surveillance and the Fourth Amendment of the Constitution. If I remember correctly, the original request was that I place befo!"e the Committee the philosophical or jurisprudential framework relevant to this relationship which lawyers, those with executive responsibilities or dise)' etron, and lawmakers, viewing this complex field, ought to kepp in mind. If thj~ s!lUnds vague and general and perhaps useless, I can only ask for indulgence. ~ly first concern when I received the request was that any remarks I might be nble to make would be so general as not to be helpful to the Committee. Bill" I want to be as helpful to the Committee as I can be. The area with which the Committee is concerned is a most important one. In my view, the development of the law in this area has not been satisfactory, although there are reasons why the law has developed as it has. Improvement of t')e law, \vhleh in part means Hs clarification, will not be easy. Yet it is a most important ventnre. In a talk before the American Bar Association last AUl,'1lst, I discussed SOllie of thc aspects of the legal framework. Speaking for the DepartllH'nt of Justice, I eonduded this portion of the talk with the observation and commitment that "IYC Jun'e very much in mind the necessity to determine what procedures through legislation, court action or executive processes will best serve the national interest, including, of course, the protection of constitutional rights, ., I begin then with an apology for the general nature of my remarks. This will be due in pa~t to the nature of the law itself in this area. But I should state at the outset there are other reasons as well. In any area. and possibly in this one more than most, legal principles gain meaning through an interaction with the facts. Thns. the factnal situations to he imaginp(l are of enormons significance. As this Committee well knows, some of the factual situations to be imagined in this area are not only of a sensitive nature !Jut alBO of a changing nature. Therefore, I am limited in what I can say about them, not only beeanse they are sell.~ith'e, but also because a lawJ'er's imagination about futul'P scientific developments carries its own warningi'; of ignoranee. This is a point worth making vdwn onp tries to ctevelop appropriate safeguards for the future. There is an additional professional restriction upon me which I am snre the Cnmmittce will appredate. The Department of .Justice has uml\'r active criminal inYPBtiglltion varions activities which mayor may not have been illegal. In IHlctition. the Department through its own attorneys. or private attorncrs specially hired, is representing present or former government employees in civil suits which have been brought against them for activities in the course of official conduct. These circumstances naturally impose some limitation upon what it is appropriate for me to say in this forum. I ought not give specific ·conclusory opinions as to matters uncleI' criminal investigation or in litigation, I can only hope thnt what I have to sny may neyprthe]ess be of some value to the Committee in its i'carch for constructive solutions. I do realir.e there hal' to he some factual hase. howpyer unfocused it may at times have to be. to give this discussion meauinl';. Therefore, as a beginning, I propose to recount something of the history of the Department's position and practice with respect to the use of electronic surveillance, hoth for telephone wiretapping and for trespassory placement of microphones. As I read tIJe histor:>. going hack to 1931 and undoubtedly prior to that time, excevt for an interlude between 1928 and 1931, and for two months in 1940, the pnJiey of the Department of .Justice has been that electronic surveillance con],] be employed without a warrant in certain circumstances. In 1928 the Supreme Court in OImstcad v. United States held that wiretapping was not within the coverage of the Fourth Amendment. Attorney General Sargent had issued an order earlier in the same year prohibiting what was thpn known as the Bureau of Invei'tigatioll from engaging ill any telephone wire· tapping for any reason. Soon after the order was issued, the Prohibition Unit "'as transferred to the Department as a new bureau. Because of the nature of its work and the fact that the Unit had previously engaged in telephone wiretaP111ng, in JannaI'> 1031. Attornf'Y Gpneral William D. ~Iit('hell directed that a ;.:tndy be made to determine whether telephone wiretapping should be permitl" E't1 ano. if so. under what circnmi'tant'E's. The Ath)l'ney General (jptermiJwd that in the meantime the bureaus within the Department could engage in 67 telephone wiretapping upon the personal approval. of the bureau chief after consultation with the Assistant Attorney ~neral III charge of the case. The policy during this period was to allow wiretapping only with respect to the telephones of syndicated bootleggers, where the agent had probable cause to believe the telephone was being used for liquor operations. The bureaus we~e instructed not to tap telephones of public officials and other persons not directly engaged in the liquor business. In December 1931, Attorney General "Yilliam Mitchell expanded the previous authority to include "exceptional cases where the crimes are substantial and serious, and the necessity is great and [the bureau chief and the Assistant Attorney General] are satisfied that the persons whose wires are to be tapped are of the criminal type." During the rest of the thirties it appears that the Department's policy concernin~ telephone Wiretapping generally conformed to the guidelines adopted by Attorney General William Mitchell. Telephone wiretapping was limited to cases involving the safety of the victim (lIB in kidnappings), location and apprehension of "desperate" criminals, and other cases considered to be of major law enforcement importance, such as espionage amI sabotage. In December 1937, however, in the first Nardone case the United States Supreme Court reversed the Court of Appeals for the Second Circuit, and apl) lied Section 605 of the Federal Communications Act of 1934 to law enforcement officers, thus rejecting the Department's argument that it did not so apply. Although the Court read the Act to cover only wire interceptions where there had also been disclosure in court or to the public, the decision unuoubtedly had its impact upon the Department's estimation .of the value of telephone wiretapping as an investigative technique. In the second Nardone case in December 1939, the Act was read to bar the use in court not only of the overheard evidence, but also of the fruits of that evidence. Possibly for this reason, and also because of public concern over telephone wiretapping, on )!arch 15, 1940, Attorney General Robert Jackson imposed a total ban on its use by the Department. This ban lasted about two months. On May 21, 1940, President Franklin Roosevelt issued a memorandum to the Attorney General stating his view that electronic surveillance would be proper under the Constitution where "grave matters involving defense of the nation" were involved. The President authorized and directed the Attorney General "to secure information by listening devices [directed at] the conversation or other communications of persons suspected of subversive activities against the Government of the United States, including suspected spies." The Attorney General was requested "to limit these investigations so conducted to a minimum 3nd to limit them insofar as possible as to aliens." Although the President's memorandum did not use the term "trespassory microphone surveillance," the language was sufficiently broad to include that practice, and the Department construed it as an authorization to conduct trespassory microphone surveillances as well as telephone wiretapping in national security cases. The authority for. ~he President's action WlIB later confirmed by an opinion by Assistant SolICItor Gem'ral Charles Fahy who advised the Attornev General that electronic snrveillance could be conducted where matters affected the security of the nation. On .Tnly 17. 1946. AttornE'Y General Tom C. Clark sent President Truman a lE'tter reminding him that President Roosevelt had authorized and directed Attorney General Jackson to appro,p "listening c1pvicps [directed at] the con, Ns-ation of nther communications of persons SllSpf'Cten of suhvprsivE' llctivities a~llinst the Government of the trnited States. including snspected spies" and that t"lw dirpctive had been follmw'd l1y Attorneys Genpral Rohert .Jackson and Francis Birlc1le'. Attorney GE'neral Clark recommpndE'd that thE' dir"ctlve "he contintlPd in force" in ,iE'W of the "increase in subversive acti,ities" and "a verv snhstnntiaJ increase in crime." He staterl that it wns imperHtive to use such t""]mi(J1H's "in cases vitally llffE'ctin.g' the rlompstic secnrity. or whE're hnman life is in jeonaruy" and that Df'partmE'nt tilt's imli('atE'd thnt his two most recent pre(lE'cpssors as Attorney General would concnr in this view. President Truman Si~l"rl his (''')1('nrrenee on the AttornE'Y Gennrfll's letter. ,\pcorrling to the Department's recorrls. tl1f' flnn11a1 totfll of telephonp wirefnps and microphones installed by the Bureau betwt'en 1940 through 1951 WfiS as follows: Tele1p9h4o0ne wiretaps: _ 1941 _ 1942 _ 1943 _ 1944 _ 1945 _ 1946 _ 1947 _ 194R _ 1949 _ ]9~0 _ 1951 _ 68 6 ",licr1o9p4h0ones : _ 67 1941 _ 304 1942 _ 475 1943 _ 517 1944 _ 519 1945 _ 364 1946 _ 374 1947 _ 416 1948 _ 471 1949 _ 270 1950 _ 285 1951 _ 6 25 88 193 198 186 84 81 67 7;:) Gl 75 It should be understood that these figures, as is the case for the figures I have given before, are cumulative for each year and also duplicative to some extent, since a telephone wiretap or microphone which was installed, then discontinued, but later reinstated would be counted as a new action upon reinstatement. In 1952, there were 285 telephone wiretaps, 300 in 1953, and 322 in 1954. Betwcen February 1952 and May 1954, the Department's position was not to authorize trespassory microphone surveillance. This "'as the position taken by Attorney General McGrath, who informed the FBI that he would not approve the installation of trespassory microphone sun'eillance because of his concern over a possible violation of the Fourth Amendment. FBI records indicate there were 63 microphones installed in 1952, there were 52 installed in 1953, and there were 99 installed in 1954. The policy against Attorney General approval, at least in general, of trespassory microphone suneillance was reversed by Attorney General Herbert Brownell on )fay 20, 1954, in a memorandum to Director Hoover instructing him that the Bureau was authorized to conduct trespassory microphone surveillances. The Attorney General stated that "considerations of internal security and the national safety are paramount and, therefore, may compel the unrestricted use of this technique in the national interest." A memorandum from Director Hoover to the Deputy Attorney General on :May 4, 1961, described the Bureau's practice since 1954 as follows: "[I]n the internal security field, we are utilizing microphone surveillances on a restricted basis even though trespass is necessary to assist in uncovering the activities of Soviet intelligence agents and Communist Party leaders. In the interests of national safety, microphone surveillances are also utilized on a restricted basis, even though trespass is necessary, in uncovering major criminal activities. We are using such coverage in connection with our investigations of the clandestine activities of top hoodlums and organized crime. From an intelligence standpoint, this investigative technique has produced results unobtainable through other IDt:>ans. The information so obtained is treated in the same manner as information obtained from wiretaps, that is, not from the standpoint of evidentiary value but for intelligence purposes." The number of telephone wiretaps and microphones from 1955 through 1964 was as follows: Telephone wiretaps: Microphones: 19~5_______________________ 214 1955_______________________ 102 1956_______________________ 164 1956_______________________ 71 1957_______________________ 173 1957_______________________ 73 19j8_______________________ 166 1958_______________________ 70 1959_______________________ 120 1959_______________________ 75 1960_______________________ 115 1960_______________________ 74 1961_______________________ 140 ]961_______________________ 85 19G2_______________________ 198 1962_______________________ 100 1963_______________________ 244 1963_______________________ 83 1964_______________________ 260 1964_______________________ 106 It appears that there was a change in the authorization procedure for microphone surveillance in 1965. A memorandum of March 30, 1965, from Director Hoover to the Attorney General states that "[i]n line with your sugg:estion this morning, I have already set up the procedure similar to requesting of authority for phone taps to be utilized in requesting authority for the placement of microphones." President Johnson announced a policy for federal agencies in June 1965 which required that the interception of telephone conversations without the consent of one of the parties be limited to investigations relating to national security and 69 that the consent of the Attorney General be obtained in each instance. The memorandum went on to state that use of mechanical or electronic devices to overhear conversations not communicated by wire is an even more difficult problem "~vlljch raises substantial and unresolved questions of Constitutional interpretation." The memorandum instructed eacll agency conducting such an investigation to consult with the Attorney General to ascertain wllether the agelll'y's practices were fully in accord with the law. Subsequently, in September 196;:;, the Director of tile FBI wrote the Attorney Genel'UI and referred to the "present atmosphere, brought about by the unrestrained and injudicious use of special investigative techniques by other agencies and departments, resulting in Congressional and public alarm and opposition to any activity which could in any way be termed an invasion of privacy." "As a consequence," the Director wrote, "lYe have discontinued completely the use of microphones." The Attorney General responded in part as follows: "The use of wiretaps and microphones involving trespass present more difficult problems because of the inadmissibility of any evidence obtained in court cases and because of current judicial and public attitude regarding their use. It is my understanding that such devices will not be used without my authorization, although in emergency circumstances they may be used subject to my later ratification. At this time I believe it desirable that all such techniques be confined to the gathering of intelligence in national security matters, and I will continue to approve all such requests in the future as I have in the past. I see no need to curtail any such activities in the national security field." The policy of the Department was stated publicly by the Solicitor General in a "upplemental brief in the Supreme Court in Blew'" v. United State8 in 1!)li6. Speaking of the general delegation of authority by Attorneys General to the Director of the Bureau, the Solicitor General stated in his brief: ")ell exception to the general delegatlOn of authority has been prescribed, since 1()40. for the interceptioll of wire communications, which (in addition to being lilllitell to matters involving national security or llanger to human life) has required the specific authorization of the Attorney General in each instance. ilia similar procedure existed until 1965 with respect to the use of devices such [IS those involved in the instant ease, although rec(Jrds of oral and written comlllunications within the Department of Justice reflect concern by Attorneys Gf'neral and the Director of the Federal Bureau of Inyestigation that the use of listening devices by agents of the government should be confined to a strictl~· limited category of situations. Under Departmental practice in effect for a period of years vrior to 1963, and continuing until 196;:;, the Director of the Federal Bureau of Investigation was given authority to approve the installatiou of devices such as that in question for intelligence (and not evidentiary) purposes when required in the interests of internal security or national safety, including organized crime, kidnappings and matters wherein llUman life might be at stake.... Present Departmental practice. adopted in July 1965 in conformity with the policies declared by the President on June 30, 1965, for the entire federal establishment, prohibits the use of such li"tening devices (as well as the interception of tf'lephone and other wire communications) in all instances other than those involving the collection of intelligence affecting the national security. The specific authorization of the Attorney General must be obtained in each instance when this exception is invoked:' The Solicitor General made a similar statement in another brief filed that same term (Schipani v. U.S.) again emphasizing that the data would not be made available for proseeutorial purposes, and that the specific authorization of the Attorney General must be obtained in each instance when the national security is sought to he invoked. The number of telephone wiretaps and microphones installed since 1965 are as follows: Telephone 1Yiretaps : ;)Iicrophones: 1965_______________________ 233 1965_______________________ 67 ]966_______________________ 174 1966_______________________ 10 1967_______________________ 113 1967_______________________ 0 1968_______________________ 82 1968_______________________ 9 1969_______________________ 123 1969_______________________ 14 1n70_______________________ 102 1970_______________________ 19 1971_______________________ 101 1971_______________________ 16 1!)72_______________________ 108 1972_______________________ 32 In73_______________________ 123 1973_______________________ 40 1974_______________________ 190 1974_______________________ 42 70 Comparable figures for the year 1975 up to October 29 are: Telephone wiretaps: 121 Microphones: 24 In 1968 Congress passed the Omnibus Crime Control and Safe Streets Act. 'l'itle III of the Act SEt up a detailed procedure for the interception of wire or oral c(Jmmunications. The procedure requires the issuance of a judicial warrant, prescribes the information to be set forth in the petition to the judge so that, among other things, he may find probable cause that a crime has been or is abouT to be committed. It requires notification to tile parties subject to the intended surveillance within a period not more than ninety days after the application for an order of approval has been denied or after the termination of the period of the order or the period of the extension of the order. Upon a showing of good cause the judge may postpone the notification. The Act contains a saving clause to the effect that it does not limit the constitutional power of the President to take such measures as he deems necessary to protect the nation against actual or potential attack or other hostile acts of a foreign power. to obtain foreign intelligence information deemed essential to the security of the United States. or to protect national security information against foreign intelligence activities. Then in a separate sentence the proviso goes on to say. "Nor shall anything contained in this chapter be deemed to limit the constitutional powel' of the President to take such measures as he deems necessary to protect the United States against the overthrow of the government by force or other unlawful means, or against any other clear and present danger to the structure or existence of the government." The Act specifies the conditions under which information obtained through a presidentially authorized interception might be received into evidence. In speaking of this saving clause. Justice Powell in the Keith case in 1972 wrote: "Congress simpl)' left presidential powers where it found them." In the Keith case the Supreme Court held that in the field of internal security, if there was no foreign involvement, a judicial warrant was required for the Fourth Amendment. Fifteen months after the Keith case Attorney General Richardson. in a letter to Senator Fulbright which was publicly released by the Department, stated: "In general, before I approve any new application for surveillance without a warrant, I must be convinced that it is necessary (1) to protect the nation again~t actual or potential attack or other hostile acts of a foreign power; (2) to obtain foreign intelligence information deemed essential to the security of the Uniterl States; or (3) to protect national security information against foreign intelligence activities." I have read the debates and the reports of the Senate Judiciary Committee with respect to Title III and particularly the proviso. It may be relevant to point out that Senator Philip Hart questioned and opposed the form of the proviso reserving presidential power. But I believe it is fair to say that his concern was primarily, perhaps exclusively, with the language which dealt with presidential power to take such measures as the President deemed necessary to protect the United States "against any other clear and present danger to the structure or existence of the Government." I now comE' to the Department of Justice's present position on electronic surveillance conducted without a warrant. Under the standards and procedures established by the President, the personal approval of the Attorney General i~ required before any non-consensual electronic surveillance may be instituted within the United States without 11 jUdicial warrant. All requl'sts for surwillance must be made in writing by the Director of the Federal Bureau of Investigation and must set forth the relevant circumstancl's that justify the proposeo SUrVl'illllnce. Both the agency and the Presidentinl appointee initiating the rl'quNiit must be identified. These requests come to the Attornl'Y General aftl'r they have gone through review procedures within the Federal Burpau of Investigation. At my request, they are thpn reviewed in the Criminal Division of the Department. Before they come to the Attorney General, they are tlwn examined by a special reviE'w group which I ha,e l'stnbJished within the Office of the Attorney GenernJ. Each request. before authorization or denial. receives my per!' onnl attention. Rpquests are only aut'horized when thl' requested electronic snrveillance is necessary to protl'ct the nation against actual or potential attack 01' oOwr hostile nds of a foreign power; to obtain foreign intl'lJigellCf' dpem('(l e,sf'ntial to th!' security of the llfiti0n; to pr0tect wltionnl s(,(,111'i(,' inf()rmMir'n against foreign intelligf'nee flctivities; or to obtain information certified as 71 nf'CE'~~:1ty for the conduct of foreign affairs matters important to thE' nationar sf'eurity of the United States. In addition the subject of the electronic sl1neillance must be consciously assisting a foreign power or foreign-based political group, and there must be assurance that the minimum physical intrusion Iwe<'ssary to obtain the information sought will be used. As these criteria will show and a>1 I will indicate at greater length later in discussing current guideline~ tlle Department of Justice follows, our concern is with respect to foreign powers or their agents. In a public statement made last July 9th, speaking of the warrantless suncillances then authorized by the Department, I said "it can be said that there 2re no outstanding instances of warrantless wiretaps or electronic surnoilance directed against American citizens and none will be authorized h~- me except in cases where the target of surveillance is an agent or collaborator of a fureign power." This statement accurately reflects the situation toda~- as well. Having described in this fashion something of the history and conduct of the Department of Justice with respect to telephone wiretaps and microphone installation~. I should like to remind the Committee of a point with which I began, namely, that the factual situations to be imagined for a discussion such as this are not only of a sensitive but a changing nature. I do not have much to say about this <'xcept to recall some of the language used by General Allen in his testimony before this Committee. The techniques of the NSA, he said, 2re of the most sensitiye and fragile character. He described as the responsibility of the ]\"SA the interception of international communication signals smt through the air. He said there had heen a watch list, which among many other names, contained the llames of V.S. citizens. Senator Tower spoke of an awesome technology-a huge vacuulll eleaner of communications-which had the potential for abuses. General Allen pOInted out that "The United States, as part of its effort to produce foreign intelligence, has intercepted foreign communications, analyzed, and in some Cllses decoded, these communications to produce such foreign iutelligence since the Re,-olutionary War." He said the mission of XSA is directed to foreign intelligence obt:lined from foreign electrical communications and also from other foreign signals such as radar. Signals are intercepted by many techniques and processed, sorted and analyzed by procedures which reject inappropriate or unnecessary signals. He mentioned that the interception of communications. however it ma~' occur, is conducted in such a manner as to minimize the unwanted Ill<'Ssages. :\evertheless, according to his statement, many unwanted communications are potentially selected for further processing. He testified that subsequent processing, sorting and selection for analysis are conducted in accordance with strict procedures to insure immediate and, wherever possible, automatic rl'jl'l'tion of inflppropriate messages. The analysis and reporting is 2ccomplished only for those messages which meet specific conditions and requirements for foreign intelligence. The use of lists of words, including individual names, snbjects. locations, et cetera, has long been one of the methods used to sort out information ot foreign intelligence value from that which is not of interest. General Allen mentioned a very interesting statute, 18 USC 952, to which I should like to call your particular attention. The statute makes it a crilllp fnr anyone who by virtue of his employment hy the United States obtains any official diplomatic code and willfully publishes or furnishes to another withont authorization Rny such code or any other matter which was obtained while in the process of transmission between any foreign government and its diplomatic mission in the United State>1. I call this to your attention because a certain indirection is characteristic of the development of law, whetber by statutE' or not, in this area. The Committee will at once recognize that I have not attempted to snmmarize General Allen's testimony, but rather to recall it so that this extended dimension of the variety of fact situations whie11 we have to think ahout as we explore the coverage and direction of the Fourth Amendment is at least suggestPtL Having attempted to provide somethin.g of a factual base for our discnssion, I turn now to the Fourth Amendment. Let me say at once, however, that while the Fourth Amendment can be a most important guide to values and procedures, it does not mandate automatic solutions. The history of the lfourth Amendment is very much the history of the American Revolntion and this nation's quest for independence. The Amendment is the legacy or onr early years and reflects values most cherished by the Founders. In a direct sense, it was a reaction to the g-eneral warrants and writs of assistance employed by the officers of the British Crown to rummage and ran"acok colonists' homes as a means to enforce antismuggling and customs laws. General 72 sE'arcll warrants had been used for cE'nturiE's in England against those accused of seditious libel and other offenses. These warrants, sometimes judicial, SOIllE'tillll'S not, often general as to persons to be arrested. pla(:es to he searched, and things to be seized, were finally condemned by Lord Camden in 17G3 in Billick v. Carrington, a decision later celebrated by the Supreme Court in Boyd v. UliitCll Si l ltC8 as a "landmark of English liberty ... Olle' of the IwrllllllH'Ilt monuments of the British Constitution." The case involved a general warrant, issued b~' Lord Halifax as Secretary of State, authorizing messengers to search for John Entick and to seize his private papers and hooks. Entick had written publications criticizing the Crown and was a supporter of John 'Wilkes, the famous author and editor of the Xorth Briton whose own publications had prompted wholesale arrests, searches, amI seizures. Entick sued for treslJass and obtained a jury verdict in his fllYOr. In upholding the verdiet, Lord Camden observed that if the government's power to break into and search homes were accepted, "the secret cabinE'ts and burE'aus of every subject in this kingdom would be thrown open to the search and inspection of a messcnger, whenever the secretary of state shall see fit to charge, or eVE'n to suspect, a person to lJe the author, printer, or pulJlisher of a seditious lilJpl.'· The practice of the general warrant", however, continued to he known in the colonies. The writ of assistance, an even more arbitrary and oppressive instrument than the gE'nE'ral warrant, was also widely used by ren'nue officers to detect smuggled goods. Unlike a general warrant, the writ of assistance was virtually unlimitecl in duration and !lW not llaVE' to lle returned to the court upon its executiO!l. It broadly authorized indiscriminate searches and seizures against any per"on suspected by IT ('ustoms officer of possessing prohibited or uncustomed goods. The writs, sometimE'S judicial, sometimes not, were usually isued by colonial judges and YestE'd Crown officers with umeviewed and unbounded discretion to break into homes, rifle drawers, and seize private papers. All ofIicers and subjects of the Crown were further commanded to assist in the writ's execution. In 17Gl James Otis eloquently denounced the writs as "the worst instrument of arbitrary powE'r, the most destructive of English liberty, and the fundamE'ntal principles of law, that ever was found in an English law book," since they put "the liberty of every man in the hands of every petty officer." Otis' fiE'ry oration later prompted John Adams to reflect that "then and there was the first scene of the fir"t act of opposition to the arbitrary claims of Great Britain. Then and there the child Independence was lJorn." The words of the Fourth Amendment are mostly the product of James :Madison. Hi;.; original version appearE'd to be directrd solE'ly at the issuance of improper warmnts.' Hevisions accomplished under circumstances that are still unclear transformpd the Amendment into two serJarate clauses. The chanc:e has influencecl our understanding of the nature of'the rights it protects. As'embodied in our Constitution, the Amendment reads: "The right of the people to be secure in their persons, houses, papE'rs, and effects, against unreasonable searches and l'E'iznres, shall not be violatrd, and lJO 'Yarrants shall issue. but upon probable CaIlSE', supported by oath or affirmation, aud particularly dE'scribing the place to be searched, and the persons or things to be seizE'd." Our understanding of the purposes underlying the Fourth AmE'ndmE'nt has been an evolving one. It has beE'n shnped by snbsequE'nt historical events, by the changing conditions of our modern technological society, and 0.1' the developmE'nt of our own traditions, customs, and values. From the beginning, of course, there has been agreement that the Anwndment protects against practices such as those of the Crown officers unrlrr the notoriolls gpneral warrants and writs of assistance. Above all, the Amendment safeguards the people from unlimited, undue infringement by the governmE'nt on the sE'curlty of persons and their property. But our perceptions of the language and spirit of the Amendment have gone beyond the historical wrongs the Amendment was intended to prevent. The Supreme Court has servE'd as the primary explicator of these evolving perceptions and has sought to articulate thE' values the AmendmE'nt incorporates. I hE'Jie,e it is useful in our present endE'avor to identify some of these perceived VahlE'S. 1 Madison's proposal read ns follows: "The rights of the prop]e to be secured In their persons. their houses. their papers. and their other property, from all unreasonable searehes and spiznres. shall not he violated hy warrants Issued without probable eause, stlpported by olit11 0" affirmation. or not particularly describing the places to be searched, or the persons or things to he seized." 73 First. broadly considered, the Amendment sppaks to the flUtonom~' of th~ imlh'idual ltg-ain"t snciet~·. It seeks to accord to ('ach indivillnal, albeit ill111erfec·tly, a measure of the eontidentialit;; e""pntial to the attainnH'nt of human dig-llity. It is a shidd ai'ainst imlis('riminate pxposure of an individnal's private atTairs to the worJ(J--an exposlll'P whieh can destro;;, since it piacps in jeopanly the spontaneity of tlllJU,:dlt :111(1 action on ,vhieh so much depends. As .Justice BnI!H]f'is oilscl'H:d ill his dissent in tlw Olmstead case. in the Fourth ~\mclldl:tent the Foull(lers "conferred, as against the GQH'rnlllcnt, the right to he let alonethp most cOll1prehpilSiye of rights and the right most ,alued by (·ivili7.€'d men." ,Judgp .Jerome Frank Illack the same point in a (lissent in a case in ,vhleh a paid informer with a concealed m!cl'Op]wne bronflcast all interceptc-d conversation ta a uar('otics agent. ,Judge Frank wrote in UI/ited States v. On Lee that "[a) sanl', decent, civilized society must provide some such oasis, some shelter from puhlic scrutiny, some insulated enclosure some enclave, some inviolate place wlJich is a man's castle." The Amendment does not protect absolutely the priv:ley of an individual. The need fer privaey. and the law's response to that IlPCtl, go beyond the Amendment. But the recognition of the value of individual autonomv rpmains close to the Amendment's core. A parallel value bas been tbe Amendment's special concern 'lVith intrusions wben the purpose is to obtain evidence to incriminate the ,ictim of the search. As llle Supreme Court observed in Boyd, which involved an attempt to compel the production of an indi,idual's pri,ate papers, at some point tbe Fourtb Amendment's prohibition against unreasonable searches and seizur€'s and the l!'ifth Amendment's prohibition against compulsory self-incrimination "run almost into each other." The intrusion on an individual's privacy has long been thought to be especially grave when the search is based on a desire to discover incriminating evidence.2 The desire to incriminate may be seen as only an aggravating circumstance of the search, but it has at times proven to be a decisive factor in dctermining its legality. Indeed. in Boyd the Court declared broadly that "compellillg the production of [a person's] private books and Papers, to convict him of crime, or to forfeit his property, is contrary to the principles of a free goverlllllent." 'rhe incriminating evidence point goes to the integrity of the criminal justice system. It does not necessarily settle the issue whether the overhearing can properly take place. .It goes to the use and purpose of the information overheard'. An additional concern of the Amendment has been the protection of freedom of thought, speech, and religion. The general warrants were used in England as a powerful instrument to suppress what 'lVas regarded as seditious libel or nonconformity. 'Vilkes was imprisoned in the Tower and all his pri,ate papers seized under such a warrant for his criticism of the King. As Jnstlce Frankfurter inquired, dissenting in Harris v. United States, a case that concerned the perlllis~ ihJe scope of searches incident to arrest. "How can there be freedom or thought or freedom of speech or freedom of religion, if the police can, without warrant, search your house and mine from garret to cellar ...7" So Justice Powell stated in Keith that "Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected or ullorthodoxy in their political beliefs." Another coneern embodied in the Amendment may be found in its second clause dealing with the warrant requirement, even though the Fourth Amendment does not always require a warrant. The fear is that the law enforc€'ment officer, if unchecked, may misuse his powers to harass those who hold unpopular or siIllply different views and to intrude capriciously upon the privacy of individuals. .It is the recognition of the possibility for abuse, inherent whene,er executive discretion is uncontrOlled, that gives rise to the requirement of a warrant. 'l'hat requirement constitutes an assurance that the judgment of a neutral lwd detached magistrate will come to bear before the intrnsion is made and that the decision whether the privacy of the individual must yield to a greater need of society will not be left to the executive alone. 2 The eon(:ern with self-Incrimin.'tion is reflected in the test of standIng to invoke the exel",ionar)' rnle. As the Court stated In United States v. Calalldr": "Thns. standin/: to in"ol,e the exclnslonary rule [under the Fourth Amendmentl has been confined to situations whpJ"(' tllp Goyernment seeks to use such evidence to incriminate the victim of the unlawful "·llI'(·h.... 'l'hi" standing rule is premised on a recognition that the need for deterrence, nud hpTlce tIle' rationale for excluding the p\,idellce are strong-est where the Governnu'nt"s "n1'1\"f,,1 conduct would result in imposition of a crimina] sanction on the victim of the 8(':11'('11." 74 A final Yalue reflected in the Fourth Amendment is revealed in its openin'" WfJ'"'L..:: "The right of the people." 'Vho are "the people" to whom the Amendment ref'!',,? TIle Constitution begins with the phrase, "We the People of the united States." That phra"e has the character of words of art, denoting the power from whkh the Constitution comes. It does suggest a special concern for the American citizen and for those who share the responsibilities of citizens. The Fourth Alll€'ndment guards the right of "the people" and it can be urged that it was not Illeant to apply to foreign nations. their agents and collaborators. Its application may at least take accollnt of that difference. The values outlined above have lJeen embodied in the Amendment from the IJ€'ginning. But the importance accorded a particular value has varied during the comse of our history. Some have been thought more important or more thnatcned than others at times. When several of the values coalesce, the need for l'I'otection has been regarded as greatest. When only one is im'oIYed, that need has been regarded as lessened. Moreover, the scope of the Amendment itself has been altered over time, expanding or contracting in the fact of changing circumstances and needs. As with the evolution of other constitutional proYisions. this development has been case in definitional terms. 'Vords have been TPUd hy different Justices and different Courts to mean different things. The -word;;: of the Amendment have not changed; we, as a people, and the world which <cnvelops us, have changed. An important example is what the Amendment seeks to guard as "secure." 'The wording of the Fourth Amendment suggests a concern with tangible prop- erty. By its terms, the Amendment protects the right of the people to be secure in their "persons, houses, papers and effects." The emphasis appears to be on the material possessions of a person, rather than on his privacy generally. The 'Court came to that clnclusion in 1928 in the Olmstead case, holding that the intereeption of telephone messages, if accomplished without a physical trespass, Was outside the scope of the Fourth Amendment. Chief Justice Taft, writing for the Court, reasoned that wiretapping did not involve a search or seizure; the Amendment protected only tangible material "effects" and not intangibes such as oral conversations. A thr('ad of the same idea can be fonnd in En tick, where Lord Camden said: "The great end for which men entered into society was to secure their property." But, while the removal and carrying off of papers was a trespass of the most aggravated sort, inspection alone was not: "the e;l"('," Lord Camden said, "cannot by the law of England be guilty of a trespass." The movement of the law since Olmstead has been steadily from protection of property to protection of privacy. In the Goldman case in 1942 the Court held that the use of a deteetaphone pla('ed against the wall of a room to overhear oral COllyersations in an adjoining office was not unlawful because no physical tr('spass was involved. The opinion's un;;:tated assumption. howev('l'. appeared to 1,(> that a private oral conversation could be among tlle protected "effects" within the meaning of the Fourth Amendment. The Silverman case later eroded Olm~tead substantially by holding that the Amendment was "iolated hy the interc(' ption of an oral conversation through the use of a spike mike driven into a part)- wall. penetrating the heating duct of the adjacent home. The Court ;;:tnted that the qnestion whether a trespass had occurred as a techni('al matter of propf'l'ty law was not controlling; the existence of an actual intrusion was suffieient. The Court finally reachf'd the opposite emphaf'is from its previous strf'SS on pt:Opert,. in 1967 in Katz v. United State.~. The Court declared that the Fourth Amendment "protects people. not places," against unreasonable searche~ and f'pizures: that oral conversations. although intangible. were entitled to be secure ag:ainst the uninvited ear of a government officer. and that the interception of a tplf'phone conversation. e»en if accomplished without a trespass, "iolated the priyacy on which petitioner justifiably relied while using a telephone booth. .TllsriC'e Harlan, in a concurring opinion. explained that to ha,e a constitutionall," protected right of privacy under Katz it was necessary that a person. first, "IIWP exhibitf'd an actual (subjective) expectation of privacy and. second. that tIp expectation be one that society is prepared to recognized a;;: 'reasonablf'.' " At first g]:1.J1ce. Ka.tz might be taken as a statf'ment that the Fonrth ,j,mpndllWnf no",' protects all reasonable expectations of privacy-that the boundaries of til(' right of privacy are coterminons with those of the Fourth Am('nflment. But t11:1t I1ssumption would be misleading. To begin with the Amendment still prntr,,,ts'nme interests that have very little if any thing to do with privacy. Thns. the pr,lir'e nwy not, without warrant, seize an automobile parked on the owner"s 75 driveway even though they have reason to believe that the automobile was nsed in committing a crime. The interest protected by the Fourth Amendment in such a case is probably better defined in terms of property than privacy. Moreover, the llatz opinion itself cautioned that "the Fourth Amendment cannot be translated into a general constitutional 'right to privacy.' " Some privacy interests are protected by remaining Constitutional guarantees. Others are protected by federal statute, by the states, or not at all, The point is twofold. First, under the Court's decisions, the Fourth Amendment dues not protect every expectation of privac;r, no matter how reasonable or actual that expectation may be. It does mot protect, for example, against false friends' betrayals to the police of even the most private confidences. ~econd. the "reasonable expectation of privacy" standard, often said to be the test of Katz, is itsell' a conclusion. It represents a judgment that certain behavior should as a matter of law be protected against unrestrained governmental intrusion. That judgment, to be sure, rests in part on an assessment of the reasonableness of the expectation, that is, on ,an objective, factual estimation of a risk of intrusion nnder given circumstances, joined with an actual expectation of privacy by the V>l'son involved in a particular case. But it is plainly more than that, since it is also intermingled with a judgment as to how important it is to society that an expectation should be confirmed-a judgment based on a perception of our cnstoms, traditions, and values as a free people. The Eatz decision itself illustrates the point. Was it really a "reasonable expectation" at the time of ](atz for a person to lJelieve that his telephone conver~ ation in a pUblic phone booth was private and not susceptible to interception by a microphone on the booth's outer wall': Almost fortr years earlier in Olmstead tile Court held that such nontrespassory interceptions were permissible. Goldmat~ n'affirmed that holding. So how could Kat:z reasonabl~' expect the contrary? The :lllswer, I think. is that the Court's dcdsion in Katz turned ultimately on an assessment of the effect of permitting such ulll'estrained intrusions on the inlliyidual in his private and social life. The judgment was that a license for unlimited governmental intrusions upon every telephone would pose too great a danger to the spontaneity of human thought and behavior..Justice Harlan IJut the point this way in Unite(l States v. White: "The analysis must, in my view, transcend the search for subjective expectations Dr legal attriLmtion of assumptions of risk. Our expectations, and the risks we assume, are in large part reflections of laws that translate into rules the customs and values of the past and present." A weighing of values is an inescapable part in the interpretation and growth of the ]'ourth Amendment. Expectations, and their reasonableness, vary according to circumstances. So will the need for an intrusion and its likely efl'ect. These elements will define the boundaries of the interests which the Amendment holds as "secure." To identify the interests which are to be "secure," of course, only begins the inquiry. It is equally essential to identify the dangers from which those interestsare to be secure. What constitutes an intrusion will depend on the scope of the protected interest. The early view that the Fourth Amendment protected only tangible property resulted in the rule that a physical trespass or taking was Tlle measure of an intrusion. Oltnste(/(l rested on the fact that there had been no j,l!ysical trespass into the defendant's horne or office. It also held that the use Df the sense of hearing to intetcept a conversation did not constitute a search or ~pizure, Kat~, by expanding the scope of the protected interests, necessarily altered our misunderstanding of what constitutes an intrusion. Since intanr;ibles snch as oral conversations are now regarded as protected "effects" the OTerhearing of a conversation may constitute an intrusion apart frorr;{ whether a physical trespass is involved. The nature of the search and seizure can be very important. An entry into a house to search its interior may he viewed as more serious than the over! lE'aring of a certain type of conversation. The risk of abuse may loom larger ;ll one case than the other. The factors that have come to be viewed as most Important, however, are the purpose and effect of the intrusion. The Supreme ~'ourt has tended to focus not so much on what was physically done, but on why I twas, done and wha~ thecon?equence is likely to be. What is seizE'd, why it was seized, and what IS done ;nth what is seized are critical questions I stated earlier that a central coneern of the Fonrth Amendment'was with intrusions to obtain evidence to incriminate the Yictim of the search. This .concern has been reflected in Supreme Court decisions which have traditionally 76 treated intrusions to gather incriminatory eyiaence differently from intrusions fOl' nPlltral or benign purposes. In Franl,; v. ,Uaryland, the appellant was fined for refusing to allow a housing inspector to enter his residence to determine \\"llether it was maintained in compliance with the municipal housing code. Violation of the code would haye lee] only to a direction to remove the yiolation. Only failure to comply with the direction would lead to a criminal sunc'tion. The Court lIeld tlmt such admiuistratiye searches could be conducted without warrant. Justice I!'rankfurter, writiug for the Court, noted that the Fourth Amendment was a reaction to "ransacking !ly Crown officers of the 110mes of citizens in search of evidence of crime or of illegally imported goods." III' observed that both Entick and Boyd were coneerned with attempts to compel indi\" iduals to incriminnt{l tlJemseh"es in criminal cases and that "it was 011 the issue of the right to be secure from searches for eyidence to be used in crimina! prosecutions or for forfeitures that the great battle for fundamental liberty was fought." There was th llS a gTPat difference, the Justice said, between seardJes to seize evidence for crimina! prosecutions and searches to detect the existcllce of municipal health code yiolations. Searches in this latter category, conducted "as an adjunet to a r('~ulatory scheme for the general welfare of the community and not as a means of enforcing the criminal law, [have] antecedents deep in our history:' and should not he snbj('cted to the warrant requirement. 1-'1"([111.: was later oyerruled in Hlti7 in Camara v. Municipal Court, and a companion ease, Sec v. CitJ} ot Scattlc. In Camara, nppellant was, like P1'G1II;, chargf'd with a criminal yiolation ns a rp~ult of his refusal to permit a municipal inspector to enter his apartment to im"estigate possible violations of the city's housing code. The Supreme Conrt rejected the Franl" rationale that municipal fire, health, and housing inspections could be conducted without a warrant oecanse the objpet of the intrusion was not to search for the fruits or instrumentalities of crime. ~[oreover, the Court noted that most regnlatory laws snch as fire, health, a]Hl housing cm]es were enforcpd by criminal processes, that refusal to permi t pntry to an inspector was often a criminal offense, and that the "self-protection" or "non-incrimination" objective of thc Fourth Amendment was therefor(' illdpf'f] inrolved. nut the doctrine of Camara proyed to oe limited. In 1971 in Wyman v. James the Court heh] th;l t a "home visit" by a welfare caseworker, which entailed terllIillntion of benefits if the '\I"elfare recipient refused entry, was lawful despite thp absenee of a warrant. The Court relied on the importance of the puulic's interest in ohtaining information about the recipient, the reasonableness of the measures tnken to ('nsure that the intrusion was limited to the extent practicable, and most importantly, the fact that the primary objective of the search was not to ohtain evidence for a criminal investigation or prosecution. Camara and PI"II'IIk wpre distinguished as involving criminal proceedings. Perhaps what these cases mainly say is that the purpose of the intrusion. and the nse to whieh what is seized is put, are more important from a constitutional st:lIlllpoiut thau the !Jhysical act of intrusion itself. 'Vhere the purpose or effect is Iloucrimiua I, tIl(> search and seizure is perceiyed as less troublesome and there is a readiness to find rpasonableness even in the absence of a judicial warrant. By contrast, where the purpose of the intrusion is to gather incriminatory eviIlpIWP. and hene!' hostile, or when the consequence of the intrusion is the SanCt'iOll of the criminal !a,,", gTPater protections may be given. The Fourth Amendment then, as it has always been interpreted, does not give ahsollltl; prot!'ction against Government intrusion. In the words of the AmendIllt'nt, the right guarnnteed is security against unreasonable searches and seizures, .\s Justice 'Vhite said in the Cam{/,ra case, "there can be no ready test for determining reasonahleness other than by balancing the need to search against the inl"l1sjon ,,-hiI'll the st'arch entails." 'Whether there has been a constitutionally prohibitPl] im-asion at all has come to d('pend less on an absolute dividing line IIp(,Y(,I'n prn[petp(] and unprot('etpd areas, and more on an estimation of the indil·il1ual s{'('n1'ity interests affected IIr the Gorernnwnt's actions. Those effects, in turn. mar depend on the purpose for which the search is made, whether it io< hn,stile. nputral, or henign in rplation to the person whose interests are in' ·aded. amI also on the mllnner of the sparch. By thp same tokpn, tllE' Goyernment's lwt'd tn search. to inyade indiYiduat pri\"ac.\" inl"1'psts, is no longer mNlsurt'l] rx{']usiyely-if illl]et'd it erer was~-hv thp tnillitiona t prohnl'lp cause standard. The s('eonl! dausp of the AmcIH]lllen't statps. in part, thnt "110 warrants shnll issue bnt upon prohahle cause." The' COlll'Cpt of probahle cause has oft('n bePII read to hpar upon amI in mau;> cases, 77 to control the question of the reasonableness of searches, whether with or withont warrant. The traditional formulation of the standard, as "rem:onable grounds for believing that the law was being violated on the premises to be searched" relates to the Governmental interest in the prevention of criminal offenses, and to seizure of their instruments and fruits (Brinegar v. United States). This formulation in GOl/led v. United States once took content from the longo-standing "mere evidence rule"-that searches could not he undertal,en "solely for The purpose of ... [securing] evidence to he used ... in a criminal or penal proceeding, but that they may be resorted to only when a primary right to such ::;eardl and seizure may be found in the interest which the public ... may have in the property to be seized." The Government's interest in the intrusion, like the individual's interest in privacy, thus was defined in terms of property, and the right to search as well as to seize was limited to items-contraband and the fruits and instrumentalities of crime-in which the Government's interest was thought superior to the individual's. This notion, long eroded in practice, was expressly abandoned by the Court in 19G7 in Warden v. Hayden. Thus, the detection of crime-the need to discover and use "mere evidence"-may presently justify intrusion. Moreover, as I have indicated, the Court has held that, in certain situations, something less than probable cause-in the traditional sense-may be suffidellt ground for intrusion, if the degree of intrusion is limited strictly to the purposes for which it is made. In Terry v. Ohio the Court held that a policeman, in order to protect himself and others nearby, may conduct a limited "pat down" search for weapons when he has reasonable grounds for believing that criminal conduct is taking place and that the person searched is armed and dangerous. Last term, in United States v. Brignoni-Poncc, the Court held that, if an officer has a "founded suspicion" that a car in a border area contains illegal aliens, the officer IlJllY stop the car and ask the occupants to explain suspicious circumstances. The Court concluded that the important Governmental interest involved, and the absence of practical alternatives, justified the minimal intrusion of a brief stop. In both Terry and Brignoni, the Court emphasized that a more drastic intrusion-a thorough search of the suspect or automobile-would require the justification of traditional probable cause, This point is reflected in the Court's decisions in Almeida-Sanchez and Ortiz, in which the Court held that, despite the interest in stemming illegal immigration, searches of automobiles either at fixed checlqlOints or by roving patrols in places that are not the "functional equivalent" of borders could not be undertaken without probable cause. Nonetheless, it is clear that the traditional probable cause standard is not the exclusil'e measure of the Government's interest. The kind and degree of interest required depend on the severity of the intrusion the Government seeks to make, The requirement of the probable cause standard itself may vary, as the Court made clear in Camara. That case, as you recall, concerned the nature of the probaille cansc requirement in the context of searches to identify housing code violations. 'rhe Court was persuaded that the only workable method of enforcement was periodic inspection of all structures, and concluded that because the ~e::tl'ch was not "personal in nature," and the invasion of privacy involved was limited, probable cause could be based on "appraisal of conditions in the area as Ii whole," rather than knowledge of the condition of particular buildings. "If a valid public interest justifies the intrusion contemplated," the court stated, "then then' is probable cause to issue a suitable restricted search warrant." In the Keith ensl', while holding that domestic national security surveillance-not involving' the activities of foreign powers and their agents-was subject to the warrant reqnirement, the Court noted that the reasons for such domestic surveillance may differ from those justifying surveillances for ordinary crimes, and that dOlllP::;tic seclll·it~· suneillances often have to be long range projects. For th~'se reasons, a standard of prohahle cause to obtain a warrant different from the traditional standard would be justified: "Different standards lllay he compatihle with the Fomth Amenclnll'ut if thl'y are reasonable both in relation to the legitima te need of GOYE~rnlllent for intelligence information and the protected rig-hts of our dOzeus. III hri(>f, although at one time the "reasonahleness" of a search may ha\'e been defillcd Hc('o['(lillg' to the traditional probable C:luse stamlard, the situation bas now ht'ell l"l'H'l"scd, ProhalJ)p cause has come to depend on reasonableness-on the legitimate lIeed of the GO\'ernmellt and whether there is reasoll to believe tlwt tllP preeise illtrnstioll ~(1llght, mea~nl"e(l in tprms of its effect on indil"idllal spcurity, i~ np('(I~sary to satisfy it. 78 This point is critical in evaluating the reasonableness of searches or suryeillances undertaken to protect national security. In some instances, the Government's interest may be, in part, to protect the nation against specific actions of foreign powers or their agents-action,s that are criminal offenses. In other instances, the interest may be to protect against the possibility of actions by foreign powers and their agents dangerous to national security-actions that mayor may not be criminal. Or the interest may be solely to gather intelligence. in a variety of forms, in the hands of foreign agents and foreign power,s-intelligence that Illay be essential to informed conduct of our nation's foreign affairs. This last interest indeed may often be far more critical for the protection of the nation than the detection of a particular criminal offense. The Fourth Amendment'sstandard of reasonableness as it has developed in the Court's decisions is sUfficiently flexible to recognize this. .Just as the reasonableness standard of the Amendment's first clau,se has taken content from the probable clause standard, so it has also corne to incorporate the particularity requirement of the warrant clause-that warrants particularly describe ;'the place to be searched, and the persons or things to be ,pized." As one Circuit Court has written, in Unitcd Statc8 v. Poller, although pointing out tlle remedy might not be very extensive, "[L]imitations on the fruit to be gathered tend to limit the quest itself." The Government's interest and purpose in undertaking the search defines its scope, and the societal importance of that purpose can be weighed against the effects of the intrusion on the individual. By precise definition of the objects of the search, the degree of intrusion can be minimized to that reasonably necesS! Il'y to achieve the legitimate purpose. In this sense, the particularity requirement of the warrant clause is analogous to the minimization requirement of Title Ill, that interception!> Hbe executed in such a wa.v to minimize the interception of communications not otherwise subject to interception" under the Title. But there is a distinct aspect to the particularity requirements-one that is often overlooked. An officer who has obtained a warrant based upon probable cau"e to search for particular items may in conducting the search necessarily have to examine other items, some of which may constitute evidence of an entirely distinct crime. The normal rule under the plain view doctrine is that the officer may seize the latter incriminating items as well !IS those specifically identified in the warrant so long as the scope of the authorized search is not exceeded. The minimization rule responds to the concern about overly broad searches, and it requires an effort to limit what can be seized. It also may be an attempt to limit how it can be used. Indeed, this minimization concern may have been the original purpose of the Hmere evidence" rule. The concern about the use of what is seized may be most important for futurE! actions. Until very recently-in fact, until the Court's 1971 decision in Biven v. Sii1' Unkn07{'n Federal Narcotic Agents-the only sanction against an illegal search was that its fruit,S were inadmissible at any criminal trial of the person whose interest was invaded. So long as this was the only sanction, the courts, in judging reasonableness, did not really have to weigh any governmental intere~ t other than that of detecting crimes. In practical effect, a search could only he Hunreasonahle" as a matter of law if an attempt was made to use its fruits for prol'!ecution of a criminal offense. So long as the Government did not attempt such u~t", the search could continue and the Government's interests, other than eBforcing criminal laws, could be satisfied. It may be said that this confuses rights and remedies; searches could be unreasonable even though no sanction followed. But I am not clear that this is theoretically so, and realistically it was not so. As I have noted earlier, the reasonableness of a search has depended, in major part, on the purpose for which it is undertal{en and on whether that purpose, in relation to the person whom it affects, is hostile or benignl. The search most hostile to an individual is one in preparation for his criminal prosecution. Exclusion of evidence from criminal trials may help assure that searches undertaken for ostensibly benign moti,es are not used as blinds for attempts to find criminal evidence, while permitting searches that are genuinely benign to continue. But there is a more general point. The effect of a Government intrusion on individual security is a function, not only of the intrusion's nature and circumstances, but also of disclosure and of the use to which its product is put. Its effects are perhaps grE'atest when it is employed or can be employed to impose criminal sanctions or to deter, hy disclosure, the exercise of individual freedoms. In short, the use of the product ~eized hears upon t.he reasonableness of the search. 79 These observations have particular bearing on electronic surveillance. By the nature of the technology the "search" may necessarily be far broader than its legitimate objects. For example, a surveillance justified as the only means of (lbtaining value foreign intelligence may require the temporary overhearing of conversations containing no foreign intelligence whatever in order eventually to locate its object. To the extent that we can, by purely mechanical means, select (Iut only that information that fits the purpose of the search, the intrusion is Tactically reduced. Indeed, in terms of effects on individual security, there would be no intrusion at all. But other steps may be appropriate. In this respect, I think we should recall the language and the practice for many years under former § 605 vf the Communications Act. The Act was violated, not be surveillance alone, but (lnly by surveillance and disclosure in court or to the public. It may be that if a l'ritical Governmental purpose justifies a surveillance, but because of technological limitations it is not possible to limit surveillance strictly to those persons as to whom alone sur,eillance is justified, one way of reducing the intrUision's effects is to limit strictly the revelation or disclosure or the use of its product. Minimization procedures can be very important. Iu discussing the standard of reasonableness, I ha,e necessarily described the l'Yolving standards for issuing warrants and the standards governing their scope. But I have not yet discussed the warrant requirement itself-how it relates to the reasonableness standard and what purposes it was intended to serve. 1.'he rplationship of the warrant requirement to the reasonableness standard was deO'Cribed in Johnson v. United States by Justice Robert Jackson: "Any assumption that evidence sufficient to support a magistrate's disinterested determination to issue a search warrant will justify the officers in making a search without a warrant would reduce the Amendment to a nullity and leave the people's homes !'ecure only in the discretion of police officers.... "'hen the rights of privacy must reasonably yield to the right of search is, as a rule, to be decided by a judicial officer, not by a policeman or government enforcement agent. This view has not ah\"HYs been accepted by a majority of the Court; the Court's view of the relation" hip between the general reasonableness standard and the warrant requirement has shifted often and dramatically. But the view expressed by Justice Jackson is now quite clearly the preYailing position. The Court said in Katz that "searches condllcted outside the judicial process, without prior approval by judge or magistrate, are per so unreasonable under the Fourth Amendment-subject only to a few 8pecifically established and well-delineated exceptions." Such exceptions include those grounded in necessity-where exigencies of time and circumstance make r('sort to a magistrate practically impossible. These include, of course, the Terry stop and frisk and, to some degree, searches incident to arrest. But there are other ('xCf:>ptions, not always grounded in exigency-for example, some automobile li'earches-and at least some kinds of searches not conducted for purposes of en· forcing criminal laws-snch as the welfare visits of Wyman v. James. In short, the ",arrant requirement itself depends on the purpose and degree of intrusion. A footnote to the majority opinion in Katz, as well as Justice 'White's concurring opinion, left open the possibility that warrants may not be required for searches undertaken for national security purposes. And, of course, Justice Powell's opinion in Keith, while requiring warrants for domestic security surveillances, suggests that a different balance may be struck when the surveillance is undertaken against foreign powers and their agents to gather intelligence information or to protect against foreign threats. The purpose of the warrant requirement is to guard against oyer-zealousness nf Goyernlllent officials, who may tend to overestimate the basis and necessity of illtrusion and to underestimate the impact of their efforts on indiYiduals. It was said in UnHcd States v. United Statcs District GauI't: "The historical judgment, which the Fourth Amendment accepts, is that nnreviewed executiyc discretion may yield too readily to pressures to obtain incriminating evidence and orerJook potential invasiO!ls of llriyucy and protected speech." These purposes ,.f thl' warrant requirement must be kept firmly in mind in analyzing the appropriateness of applying it to the foreign intellip;ence and security area. Tlwre is a real possibility that application of the warrant requirement, at least .ill the form of the normal criminal search warrant, thp form adopted in Title III. will Plldangl'r leg-itimate Goyernll1pnt interests..\13 I haYe indicat('d, Title HI [,('ts up a detailed procedure for interception of wire or oral communications. It requires the procurement of a jUdicial warrant and prescribes the information to he set forth in tIll' petition to the jndl?:f' so that, among- other thing;s, he may find probable cause that a crime has been or is about to be committed. It reo 80 quirps notification to the partips sulljed to the suneil1ance within a period ufterit has takpn vlace. The statute is clearly unsuited to protection of the vital Batiollal interests in cOlltinuing dptf'etion of Ole aethities of foreign powers and thdr agents. ~\ llotice requirement-aside from other possible repercussionscould destroy the usefulness of intelligenc0 sourC0S and methods. The most eritical surveillance in this area may haH~ nothing wbate,"er to do with detection of erimp. Apart from the problems presented by particular provisions of Title Ill, the argumpnt against application of the warrant requirement, even with an expanded probable cause standard, is that judges and magistrates may underestimate the importance of the Government's need, or that the information necessary to make that determination cannot be disclosed to a judge or magistrate without risk of its accidental revelation-a revelation tlmt could work great harm to the nation's security. 'What is often less likely to be noted is that a magistrate may be as prone to overestimate as to underestimate the force of the Government's need. 'Varrants necessarily are issued ex parte,. often decision must cOllie qUickly on the basis of information that must remain confidential. Applications to anyone judge or magistrate would be only sporadic: no opinion coul(} be published: this would limit the growth of jUdicially developed, reasonably uniform standards based, in part, on the quality of the information sought and the knowledgc of possible alternatives. Equally important, responsibility for the intrmdoll would have been diffused. It is possible that the actual numlwr of searches or surveillances would increase if executive officials. rather than b('aring responsibility themselves, can find shield behind a maiistrate's judgment of reasonableness. On the other band, wbatever the practical effect of a warrant requirement lUay be, it would still sene the important purpose of assuring the pnblic that searches are not conducted without the approval of a nentral magistrate who could prevent abuses of tbe technique. In discussing the advisability of a warrant requirement, it may also be useful to distinguish among possible situations that arise in the national security area. '1'hree situations-greatly simplified-come to mind. Tbey differ from one anotber in tbe extent to wbich they are limited in time or in target. l"irst, the seareb may be directed at a particular foreign agent to detect a sppcific anticipated activity-such as the purchase of a secret document. The activity which is to be detected ordinarily would constitute a crime. Second, the search may he more extended in time-even virtually continuous-but still would be directed at au identified foreign agent. The purpose of such a surveillnnce wonld be to monitor the agent's activities, determine tbe identities of per",ons whose nccess to classified information he might be exploiting, and determine the identity of other foreign agents with Whom he may be in contae!. Snch a suryeillanee might also gather foreign intelligence information about the agent's own country, information that would be of positive intelligence value to the United States. Third, there Illay be virtually continuous suneillance which by its nature does not have specifically predetermined targets. Snc]l a snrveillance could be designed to gather foreign intelligence information eS1!ential to the security of the nation. The more limited in time and target a :o;urveillance is, the more nenrly analogous it appears to be with a traditional criminal search which involves a particular target location or individual at a specific time. Thus, the first situation I just described would in that respect be most amenahle to I"omesort of warrant requirement, the second less so. The efficiency of a warmnt requirement in the third situation would be minimaL If t.be third type of snrvrillance I described were submitted to prior judicial appro..-al, that judicial deci~ion wonld take the form of an ea; parte declaration that the program of surveillance desig-ned hy the GOl'ernment strikes n reasonable balance between the government's need for the information and the protection of individuals' rights. Xeycrtheless, it may he that different kinds of warrants could he developed to eover the third situation. In his opinion in Almeida-Sanchez, .Justice Powell ~ugge~ted the possibility of area warrants-issued on the basis of the conditions in the area to be surycilled-to allow automobile searches in areas near Ameriea's horders. The law has not lost its inventiveness. and it might he possihle to fashion new jUdicial approaches to the novel situations that ('ome up in the area of foreign intelligence. I thinl, it must he pointed out tJlat for the (]prf'lopment of such all extended. new kiml of warrant. a statutory hase might he required or at least appropriate. At the same time, in dpaling with this arpa, 81 it lllfl'y be mistaken to focus on the warrant requirement alone to the exclnsion of other, possibly more realistiC', proteetioIlS. 'Yhat, then, is the shape of tbe present law? To begin with, several statutes alJpear to reC'ognize that the Governmcnt does interC'ept certain messages for foreign intelligence purpose and that this activity must be, and can be, efnried out. Section 9[;2 of Title IS, which I mentioned earlier is one example; section iDS of the same title is another. In addition, Title nI"s proviso, which I have quoted ern·lier. explicitly disclaimed any intent to limit the authority of the Executive to conduct electronic surveillance for national security and foreign intelligence purposes. In an apparent recognition that the vower would be e:s:ercize<l, Title III specifies the conditions under which information obtained through Pl'esidentially authorized surveillance Illay he received into evidence. It seems clear, therefore, that in 1968 Congress was not prepareu to come to a judgment that the Executive should discontinue its activities in this area, nor was it prepared to regulate how those activities were to be conuucteu. Yet it cannot be said that Congress has been entirely silent on this matter. Its express statutory references to the existence of the acti\-it~- must be taken into account. The case law, although unsatisfactory in Ilome respects, has supported or left untouched the policy of the Executive in the foreign intelligence area whenever the issne has been squarely confronted. The Supreme Court's decision in the Keith case in 1972 concerned the legality of warrantless surveillance directed against a domestic organization ,,,ith no connection to a foreign power and the 'Government's attempt to introduce the product of the surveillance as evidence in the criminal trial of a person charged with bombing a C.I.A. office in Ann Arbor, Michigan. In part because of the danger that uncontrollcd discretion might result in use of electronic surveillance to deter domestic organizations from exercising First Amendment rights, the Supreme Court held that in cases of internal security, when there is no foreign involvement, a judicial warrant is required. Speaking for the Court. Justice Powell emphasized that "this case involves only the domestic aspects of national security. We have expressed no opinion as to the issues which may be involved with respect to activities of foreign powers or their agents. As I observed in my remarks at the ABA convention, the Supreme Court surely realized, "in view of the importance the Government has placed on the need for warrantless electronic surveillance that, after the holding in Keith, the Government would proceed with the procedures it had developed to conduct those surveillances not prohibited-that is, in the foreign intelligence area or, as .Justice Powell said, 'with respect to activities of foreign powers and their agents.'" I The two federal circuit court decisions after Keith that have expressly ad· dressed the problem have both held that the Fourth Amendment does not require a warrant for electronic surveillance instituted to obtain foreign intelligence. In the first, United State-~ v. Brown the defendant, an American citizen, was incidentally overheard as the result of a warrantless 'l\iretap authorized hy the Attorney General for foreign intelligence purposes. In upholding the legality of the surveillance, the Court of Appeals for the Fifth Circuit declared that on the hURis of "the President's constitutional duty to act for the United States in the fif'ld of foreign affairs, and his inherent power to protect national security in the conduct of foreign affairs ... the President may constitutionally authorize warrantless wiretaps for the purpose of gathering foreign intelligence." The -court added that" (r)estrictions on the President's power which are appropriate in cases of domestic security become inappropriate in the context or the inter' national sphere." In United States v. Butenlw tIl(' Third Circuit reached the same conclusionthat the warrant requirement of the Fourth Amf'ndment does not apply to electronic surveillance undertaken for foreign intelligence purposes. Although the surveillance in that case was directed at a foreig-n agent, the court held broadlv that the warrantless surveillance wonlc1 be lawful so long as the primary purpose was to obtain foreign intelligence informati(1ll. The court stated that such surveillance would be reasonahle without a warrant even though it might involvp the ovprhearing- of conversations of "aHpn officials and agents, and perhans of American citizens." I should note tlJat althongh the Unitec1 States prevailed in the RlItenl,-n case, the Department acquiescl'G in the petitioner's application for -certiorari in order to obtain the Supremp Court's ruling on the question. The 'Supr('me Court denied review, howeYer, and thus left the Third Circnit'~ decision undisturbed as the prevailing law. 82 Most recently, in Zu:eibon v. Mitchell, decided in June of this year, the District of Columbia Circuit dealt with warrantless electronic surveillance directl'd agaiust a domestic organization allegedly engaged in activities affecting this country's relations with a foreign power. Judge Skelly Wright's opinion for four of the nine judges makes many statements questioning any national security exception to the warrant requirement. The court's actual holding made clear in Judge Wright's opinion was far narrower and, in fact, is consistent with holdings in Brown and Butenko. The court held only that "a warrant must be obtained before a wiretap is installed on a domestic organization that is neither the agent of nor acting in collaboration with a foreign vower." This holding, I should add, was fully consistent with the Department of Justice's policy prior to the time of the Zu:eibon decision. With these cases in mind, it is fair to say electronic sur,eillance conducted for foreign intelligence purposes. essential to tbe national security, is lawful under the Fourth Amendment. even in the absence of a warrant, at least where tile SUbject of the surveillance is a foreign power or an agent or collaborator of a foreign power. Moreover, the opinions of two circuit courts stress the purpose for which the surveillance is undertaken. rather than the identity of the subject. This suggests that in their view sueh snrveillance without a warrant is lawful ,,0 long as its purpose is to obtain foreign intelligence. But the legality of the acti,ity does not remove from the Executive or from Congress the responsibility to take steps. within their power. to seek an accommodation between the vital public and pri,ate interests im·ol,ed. In our effort to seek such an accommodation. the Department hilS adopted standards and procedures designed to ensure the reasonableness under the Fourth Amendment of electronic surveillance and to minimize to the extent practical the intrusion on individual interests. As I have stated. it is the Department's policy to authorize electronic surveillance for foreign intelligence purposes only when the subject is a foreign power or an agent of a foreign power. By the term "agent" I mean a conscious agent; the agency mu;<t be of a special kind and must relate to activities of great concern to the United States for foreign intelligence or counterintelligence reasons. In addition, at present, there is no warrantless electronic surveillance directed against any American citizen, and although it is conceil-' able that circumstances justifying such surveillance Illay arise in the future. I will not authorize the surveillance unless it is clear that the American citizcn is an active, conscious agent or collaborator of a foreign power. In no e,ent, of course, would I authorize any warrantless surveillance against domestic person.~ or organizations such as those involved in the Keith case. Surveillance without a warrant will not he conducted for purposes of security against domestic or internal threatB. It is our policy. moreover, to use the Title III procedure whenever it is possible and appropriate to do so, altbough the statutory provisions rE"garding probable cause, notification. and prosecutive purpose make it unworkable in all foreign intelligence and many counterintelligence cases. The standards and procedures tIlat tile Department has established within the' United States seek to ensure that every request for surveillance receives thorough and impartial consideration before a decision is made whether to institute it. The process is elaborate and time-consuming. but it is necessary if the public interest is to be served and individual rights safeguarded. I have jnst been spealdng about telPphone wiretapping and microphone surveillances which are revi0wed by the Attorney Genpral. In the comse of its investigation. the committf'e has become familiar with the more technologicllll~sophisticated and complex electronic surveillance activities of other agencie.~. These sUl'Yeillance activitips present somewhrrt different legal question!'!. The communications con('eiYaill~' might tal,e place entirely outside the UnitN} States. That fact alone, of course. would not automatically remove the agl'neie,,' activities from scrutiny umler the Fourth Amendm!'nt since at times even communications abroad may involve a legitimate privacy interest of American citizens. Other communications conc<>ivably might be exclusively hetween foreilffi powers and their agents and involve no American tcrminal. In such a case. even though American citizens llJay b!' discussed. this rnny raisE' less l;ilIllificant. or perhaps no significant, qUP~tiOllS under j-he Fourth Amendment. Bnt the primal'.. concern, I suppose, is whether rensonable minimization procedures are employc(l with respect to use and dissemination. With respect to all electronic surveillance, whl'ther conducted within the United States or abroad. it is essential that efforts be made to minimize Q;>, much a~ possible the extent of the intrusion. Much in this regard can be don~ 83 by modern tt'chnology. Standard and procedures can be developed and effectively deployed to limit the scope of the intrusion and the use to which its product is put. Yarious mechanisms can provide a needed assurance to the American people that the activity is undertaken for legitimate foreign intelligence purposes, and not for political or other improper purposes. The procedures used should not be ones which by indirection in fact target American citizens and resident aliens where these individuals would not themselves be appropriate targets. The proper minimization criteria can limit the activity to its justifiable and necessary scope. Another factor must be recognized. It is the importance or potential importance of the information to be secured. The activity may be undertaken to obtain information deemed necessary to protect the nation against actual or potential attack or othcr hostile acts of a foreign power, to obtain intelligence informMion deemed essestial to the security of the United States, or to protect national secm·ity information against foreign intelligence activities. Xeed is itself a matter of degree. It may be that the importance of some information is slight, but that may be impossible to gauge in advance; the significance of a single bit of informatiion may become apparent only when joined to intelligence from other sources. In short, it is necessary to deal in probabilities. The importance of information gathered from foreign establishments and agents may be regarded generally as high-although even here there may be wiele variations. At the same time, the effect on individual liberty and security-at least of American citizens--eaused by methods directed exclusively to foreign agents, particularly with minimization procedures, would be very slight. There may be regulatory and institutional devices other than the warrant requirant that would better assure that intrusions for national security and foreign intelligence purposes reasonably balance the important needs of Government and of individual interests. In assessing possible approaches to this problem it may be useful to examine the practices of other Western democracies. For example, England, Canada, and West Germany each share our concern about the confidentiality of communications within their borders. Yet each recognizes the right of the Executive to intercept communications without a judicial warrant in cases involving suspected espionage, subversion or other national security intelligence matters. In Canada and West Germany, which have statutes analogous to Title III, the Executive in national security cases is exempt by statute from the requirement that jUdicial warrants be obtained to authorize surveillance of communications. In England, where judicial warrants are not required to authorize surveillance of communications in criminal investigations, the relevant statutes recognize an inherent authority in the Executive to authorize such surveillance in national security cases." In each country, this authority is deemed to cover interception of mail and telegrams, as well as telephone conversations. In all three countries, requests for national security surveillance may be made by the nation's intelligence agencies. In eaCh, a Cabinet member is authorized to grant the request. In England and West Germany, however, interception of communications is intended to be a last resort, used only when the information being sought is likely to be unobtainable by any other means. It is interesting to note, however, that both Canada and West Germany do require the Executive to report periodically to the Legislature on its national security surveillance activities. In Canada, the Solicitor General files an annual report with the Parliament setting" forth the number of national security surveillances initiated, their avera~'e length, a general description of the methods of interception or seizure used, and assessment of their utility. It may be that we can draw on these practices of other ""Vestern democracies, with appropriate adjustments to fit our system of separation of powers. The procedures and standards that should govern the use of electronic methods of obtaining foreign intelligence and of guarding against foreign threats are matters of public policy and values. They are of critical concern to the Ex{'Cutive Branch and to Congress, as well as to the courts. The Fourth Amendment itself is a reflection of public policy and values-an evolving accommodation bdwpen governmental needs and the necessity of protecting individual security and righh. 3 Report of the Committee of Privy Councillors appointed to Inquire Into the interception of communications (1957), which state'. at page 5, that, "The orig:in of tile power to int..1'cept communiC'atjons can only be ~nrmL:;f'r1.. but the power has bpen (>xpr('i.~e~1 froln vt"'ry p:ul~' timps : and haR hp(ln recognised as a la'Yful power by a succession of f.:tntutes co\-eringthe last 200 years 01' more." 84 Ger;eral public understanding of these problellls is of paramount importance, to aswre that neither the Executive, nor the Congress, nor the courts risk discounting the vital interests on both sides. The problems are not simple. Evolving solutions probably will and should cOllle---as they have in the past-from a combination of legislation, court decisiam:, and executive actions. The law in this area. as Lord Devlin once described the law of search in England, "is haphazard and ill defined." It recognized the existence and the necessity of the Executive's power. But the Exeeutiv(~ and the Legislature are, as Lord Devlin also said, "expected to act reasonably." 'fhe future course of the law will depend on whether we can meet that obligation. TESTHvIONY OF HON. EDWARD H. LEVI, ATTORNEY GENERAL OF THE UNITED STATES Attornev General LEVI. I must warn that even the truncated version. unfortunately, is long. I am here today, Mr. Chairman, in response to a request from the ('ommittee to discuss the relationship bet\n~n electronic surveillance and tlle fourth amflndmrnt of the Constitution. If I remember corrretly, the original request waS that I place before the committee the philosophical or jurisprudential framework relevant to this relationship which lawyers, viewing this complex field, ought to keep in mind. J f this sounds vague and general and perhaps useless, I can only ask for indulgence. My first concern when I received the request was that any remarks I might be able to make w'ould be so general as not to be helpful to the committee. But I want to be as helpful to the committee as I can b~. The area with which the committee is concerned is a most important one. In my view, the development of the la,,' in this area has not been satisfactory, although there are reasons why the law has devrloped as it has. Improvement of the la,,', which in part means its clarification, will not be easy. Yet it is a most important Yenture. In a talk bdore the American Bar Association last August, I discussed some of t he aspects of the legal framework. Speaking for the Department of .Tl1sticc, I concluded this portion of the talk ,,,itll the obsen-ation and ~ommitment that "we have very much in mind the necessity to determine what proced1ll'es through legislation, court action or executive processes "ill best seITe the national interest, including, of course, tlw protection of constitutional rights." I begin then with an apology for the general nature of my remarks. This will be due in part to the nature or the law itself in this area. But I should state at the outset there arc other reasons as "'1'11. In any area, and possibly in this one more than most, legal principles gain mraning through an interaction with the facts. Thus, the factual situations to be imagined are of enormous significance. ' As this committee wen knmvs, some of the fadnal situations to be imagined in this area are not only of a sensitive nature but also of a changing natnre. Therefore, I am limited in ,,,hat I can say about them, not only because they arc sensitive, but also because a lawyer's imag'ination about future scientific denlopments carriers its own warnings of ignorance. This is a point worth making when one tries to develop appropriate safeguards for the future. ThC're is an additional professional restriction upon me which I am sure the committee will appreciate. The Department of Justice has uncleI' active criminal investigation various activities which mayor 85 may not have been illegal. In addition, t~le Dep.artm~nt through. its own attorneys, or private attorneys specIa~ly ~I~'ed, ~s repI:esentmg present or former Government employees 11l CIVIl smts ,vhIch have been brought against them for activities in the course of official conduct. These circumstances naturally impose some limitation upon wha~ it is appropriat.e ~or me to say in this foru!ll'. I ol~ght n?t g! ve speCIfic conclusory opllllons as to mattBrs uncleI' crImmalmvestIgatlOll or in litiO"ation. I can only hope that what I have to say may nevertheless b~of some value to the committee in its scarch for constructive solutions. I do realize there has to be some factual basc, however unfocused it may at times have to be, to give this discussion meaning. Therefore, as a beginning, I propose to recount something of the history of the Department's position and practice with respect to thc use of electronic sUrYcillance, both for telephone wiretapping l1nd for trespassory placcment of microphones. As I read the history, going back to 1031 and undoubtedly prior to that time, except for an interlude between 1028 and 1931 and for 2 months in 1940, the policy of the Department of Justice has been that electronic sUrYeilJance could Le employed "'ithout a warrant in c('rtain circumstances. During the rest of the thirties it appears that the Department's policy concel'11ing telephone wiretapping generally COiIformed to the guidelines adopted by Attorney General ·William Mitchell. Telephone wiretapping mIS limited to cases involving the safety of the victim, as in li:idnapings, location and apprehension of "desperate" criminals, and other cases considered to be of major law ellforcement importance, such as espionage and sabotage. In Decembcr 1937, howevcr, in the first Nardone case, the Unitcd States Supreme Court reversed the Court of Appeals for the Second Circuit, and applied section GOiS of the Federal Communications Act of ID3± to law enforcement ofilcers; thus rejecting the Department's argument that it did not so apply. Although the Court read the act to cover only wire interceptions "'here there had also been disclosure in court or to the public, the decision undoubtedly had its impact upon the Department's estimation of the value of telephone wiretapping as an investigative technique. In the second Nardone case in December 19~9, the act ,,;as read to bar the use in court not only of the oycrhead eVIdence, but also the fruits of that evidence. Possibly for this reaSOll, and also because of public concern over telephone wiretapping, on March 15, 19'10, Attorney General Robert Jackson imposed a total ban on its nse for the Department. This ban lasted abont 2 months. On May 21, 1940, President Franklin Roosevelt issued a memorandum to the Attorney General stating his view that electronic surveillance would be proper under the Constitution where "grave matters involving defrnse of the nation" were involved. The President authorized and directed the Attornev General "to secure information by listening devices [directed at] cthe conversation or other communications of persons suspected of subversive activities against the Govcrnment of the United States, including suspected spies." The Attornev General ,,,as requested "to limit these investi!!ations so conducte'd to a minimum and to limit them insofar as pos'sible to aliens." Although the President's memorandum did not use the term "trespassory microphone sUrYeillance," the language was sufficiently broad 86 to inc1urle that practice, and the Department construed it as an authorization to conduct trespassory microphone surveillances as well as telephone wiretapping in natIOnal security cases. The authority for the President's action was later confirmed by an opinion by Assistant Solicitor General Charles Fahy who advised the Attorney General that electronic surveillance could be conducted where matters affected the security of the Nation. On July 17, 1946, Attorney General Tom C. Clark sent President Tmman a letter reminding him that President Roosevelt had authorized and directed Attorney General Jackson to approve "listenin rr devices [directed at] the conversation of other communications ol'persons suspected of subversive activities against the Government of the United States, including suspected spies." The CJIAIR"rA~.MI'. Attorney General, you're rrferring by that term "trespassory microphone surveillance" to bugs, are you not I Attornev General LEVI. 'Well-- The CH~\IR:\[AN.Bugs and wiretaps? Attorney General LEVI. That is one way they are commonly referred to. The CHAIR:\L\X. Yes, thank you. Attomev General IiEVI. And that the directive had been followed bv Attorneys"General Robert Jackson and Francis Biddle. Attorney Gen(' ral Clark recommended that the directive "be continued in force" in yiew of the "increase in subversive activities" and "a yery substantial increase in crime." He stated that it was imperative to use such techniques "in cases vitally affecting the domestic security, or where human life is in jeopardy" and that Department files indirated that ~is hyo most l'rcent predecessors as Attorney General would concur m this view. President Truman signed his concurrence on the Attorney General's letter. In 1952, there were 285 telephone wiretaps. 300 in 1953, and 322 in 1954. Between February 1952 and May 1954, the Attorney General's position was not to authorize trespassory microphone surveillance. This was the position taken by Attorney General McGrath, who informed the FBI that he would not approve the installation of trespassory microphone surveillance because of his concern over a possible violation of the fourth amendment. Xevertheless, FBI records indicate there were 63 microphones installeel in 1952, there were 52 installed in 1953, and there were 99 insbl1cd in 1954. Tile Crr.\IlmAX. 'Vas that during Attorney General McGrath's period in office? Attornev General LEVI. Yes. The CH~\ImHx. Are you saying then that his orders were disregal'( J('d by the FBI? 'Attorne~' General LnI. I may not be saying that because. as I think the statement will show. there may well haye been a view that tIl(' apprO\·~1 of thr Attorney General was not retluired. It may be that J ..ttorney Grneral ~IcGrath was simply saying that he woulcl'not rrive his appmntl, but he may not have been prohibiting the use. to> I cannot answer the question better than that. Sl'nafor :U..\THT.\S. ::Ur. Chairman. the Attorney General hac: relied upon the ,,,it,,,,",:; of his predecessors in stating the position of the De87 partment. Perhaps it is not inappropriate to comment that some of his predecessors, as advocates, did have the view that he is purporting. But later when they went to the Supreme Court, in a more neutral and objective position, they changed their views and Attorney General ,Tackson and Attorney General Clark had that experience. The elevation of defense seemed to give them a different perspective. Attornev General LEVI. This committee, of course, has an enormous number of documents from the Department of Justiee. You may have 5('(>11 more than I have seen, although I doubt it on this point. Senator MATHUS. I do not dispute your reflection of their views [tS Attorneys General. I am just saying that not only this committee but the J llstice Department has copies of Supreme Court opinions where they regist~reddifterent views. Attorn~y General LEV£. I think that the responsibility often deterwines action. It is also true that when one speaks of Attorney General .ruckson, I think he ,,'as unique in that his attitude was that he only lw{'ume a free mrm when he went on the Supreme Court. That is not ;l position "'hich I think other people should take, and I always thought it "1\"(18 rather astonishing that he took it. To continue, the policy against Attorney General approval, at least in general. of trespassory microphone surveillance was reversed by Attorney Gl'neral Herbert Brownell on May 20, 19G4, in a memoJ': ll1d1l111 to Dircctor Hoover instructing him that the Bureau was aut hOl'ized to conduct trespassory micrOl)llOne surveillances. The Att.orllCy General stated that: Considerations of internal security and the natirmal safety are paramount and, therefore, may compel the unrestricted use of this technique in the national interest. ...:\. memorandum from Director Hom'er to the Depnty Attorney GenHalon :JIay 4, 1961, described the Bureau's practice since 1954 as follows: In the internal security field. we are utilizing microphone surveillances on a restricted basis even though trespass is necessary to assist in uncovering the activities of Sodet intelligence agents llnd Communist Pany leadf'rs. In the illtprE\sts of na tional safety, microphoue surveillances are also utilized on a re;.; tricted oasis, even though trespass is necessary. in unCO\'erillg major criminal activities. We are using such coverage in connection with our investigations of the clandestine activities of top hoodlums and organized crime. From an intelli~ ence standpoint, this inn'Stigative techniqul' has produced results unobtainable rhrr,ugh other means. The information so obtained is treated in the same manner as information obtained from wirl'taps, that is, not from the standpoint of evidentiary value but for intelligence purposes. President .Johnson announced a policy for Federal agencies in .Tune 1965, which requil'ed that the interception of telephone conver," at ions without the consent of one of the parties be limited to investi.~ ations relating to national security and that the consent of the Atrorney Generafbe obtained in er..ch" instance. The memorandum went OIl to state that use of mechanical or electronic devices to overhear {'onversations not communicated bv wire is an even more difficult Droblem "which raised substantial and unresoh'ed questions of Con~titut: rmal interpretations." The memorandum instructed each agency conducting such an investigation to consult 'with the Attorney General to ascedain wllf'tlwr the agency's practices were fnlly in accord with the Jaw. Subsequently, in September 10G5. the Director of the FBI wrote the Attorney General and refelTed to the88 • • • present atmosphere, brought about by the unrestrained and injudicious use of special investigative techniques by other agencies and departments, resulting in CDngressional and public alarm and opposition to any activity which could in any way be termed an innlsion of prh'ucy. As a consequence, we have discontinued completely the use of microphones. The Attorney General responded in part as follows: The use of wiretaps and microphones involving trespass present more difficult problems because of the inadmissibility of any evidence obtained in court cases and because of current judicial and public attitude regarding their use. It is my understanding that such devices will not be used without my authorization, although in emergency circumstances they may be used subject to my later ratification. At this time I believe it desirable that all such techniques be confined to the gathering of intelligence in national security matters, and I will continue to approve all such requests in the future as I have in the past. I see no need to curtail any such activities in the national security field. That was the Attorney General in 1965. The CIIAIR:UAN. Is that still the policy? Attorney General LEVI. That is not quite the policy ,Yhich I "'ill try to explain. The CUAIRlI1AN. Fine. Attorney General LEVI. The policy of the Department was stated publicly by the Solicitor General in a supplemental brief in the Supreme Court in Blade v. United States in 1966. Speaking of the general delegation of authority by Attorneys General to the Director of the Bureau, the Solicitor General stated in his brief: Present Departmental practice, adopted in .Tuly, 1965 in conformity with the policies declared by the President on June 30, 1965, for the entire Federal establishment, prohibits the use of such listening devices, as well as the interception of telephone and other wire communications, in all instances other than those involving the collection of intelligence affecting the national security. The specific authorization of the Attorney General must be obtained in each instance when this exception is invoked. The Solicitor General made a similar statement in another brief filed that same term again emphasizing that the data would not be made available for prosecutorial purposes, and that the specific authorization of the Attorney General must be obtained in each instance when the national security is sought to be invoked. In 1968, Congress passed the Omnibus Crime Control and Safe Streets Act. Title III of the act set up a detailed procedure for the interception of "ire or oral communications. The procedure requires the issuance of a judicial warrant, prescribes the information to be set forth in the petition to the judge 60 that, among other things, he may find probable cause that a crime has been or is about to be committed. It requires notification to the parties subject to the intended surveillance within a period not more than 00 days after the application for an order of approval has been denied or after the termination of the pedod of the order or the period of the extension of the order. Upon a shmving of good cause the judge may postpone t1w notification. The act contains a saving clause to the efIect that it docs not limit the constitutional power of the President to take surh mrasurrs as he deems necessary to protect the Nation against actual or potential attack or other hostile acts of a foreign po"Yer, to obtain foreign intelligence information deemed essential to the security of the United States. or to protect national security information against foreign intelligence acti"ities. Then in a separate sentence the proviso goes on to say: 89 Nor shall anything contained in this chapter lJe deemed to limit the constitutional power of the President to take such measures as he deems necessary to protect the United States against the overthrow of the government by force or other unlawful means, or against any other clear and present danger to the structure or existence of the government. Congress simply left presidential powers where it found tllem. Now I think a very responsible thing for a Congress to have done, I may say-- The CHAIRlIIAX. May I ask you what you meant by that? Attornev General LEn. I meant, in a matter of this importance, Congress should speak so that its intention is clear and if it meant to affirm this power, as I rather snspect that it did, there should be no ambiguity. But if it meant to pass an act that left a matter of this kind dangling in the air, I do not regard that as responsible. Senator MATHIAS. ::111'. Chairman, let me just say I support the Attorney General absolutely. lYhen we asked about the overload in the courts, it wonld be much more effective if the Congress, instead of creating new judgeships, would simply write the laws more accurately and more precisely so that there ,,'ould not have to be as many lawsuits or those we have to be so protracted. And I think the Attorney General has chided us in a way that is entirely justified. To this indictment I think the Congress has to plead guilty. The CHAIRMAN. In principle I agree, although I think the effect of your proposal may greatly augment the rolls of the unemployed in this country. Senr-tor'MATHIAS. Unemployed lawyers. We have acted as a legal employment bureau long enough, I think. The CHAIR;\L\N. All right, Mr. Attorney General. Attorney General LEI'!. In the J{e-ith case the Supreme Court held that in the field of internal security, if there was no foreign involvement, a judicial warrant was required by the fourth amendment. Fifteen months aIter the J{eith case Attorney General Richardson, in a letter to Senator Fulbright, ,,'hich waS publicly released by the Department, stated: In general, llefore I approve any new application for surveillance without a "'arrant, I must be conyincec1 that it is llPcrssnry (1) to protect the nation ag-'linst actual or potential attack or other hostile acts of a foreign power; (2) to ohtain foreig-n intellig-eilce information deemed essential to the security of the Fnited States; or (3) to protect national security information against foreign intplligence actiYities. I have read the debates and the reports of the Senate Judiciary Committee with respect to titb III and, particularly, the proviso. It may be relevant to point ant that Senator Philip Hart f[nestioned and opposed the form of the pro,'iso resetTing presidential po"er. But I believe it is fail' to say that his concern was primarily, perhaps exeJusi \~ely, ,,'ith the language ,.-hich dealt with presidential power to take snch measures as the President deemed necessary to protect the united States "against any other clear and present danger to the struetm'c or existence aT the Government." I now COIllO to the Departmcllt of .Tustice's present position on electronic snneil1ance eonductC'cl "Y1t11011t a ,,'[[Trant. Under the standal'cls and procedures established by the President, the personal appronll of the _\ttorney 8ene1'a1 is required before any nonconsensual electronic snneillance may DC' instituted ,yithin the Fnitccl States without a ju90 dicial warrant. All reqnests for surveillance must be made in writin~ by the Director of the Federal Bureau of Investigation and must set. forth the relevant circumstances that justify the proposed surveillance. Both the agency and the Presidential appointee initiating the request must be identified. These requests come to the Attorney General after they have gone through review procedures within the Federal Bureau of Investigation. At my reqnest, they are then review-ed in the Crimina.l Division of the Department. Before, they come to the Attorney General, they are then examined by a special review group which I have established within the Office of the Attorney General. Each request, before authorization or denial, receives my personal attention. Requests are only authorized when the requested electronic surveillance is necessary to protect the Nation against actual or potential attack or othel' h<>..-~tile acts of a foreign power: to obtain foreign inteUigence deenwd essential to the security of the Nation; to protect national security information against foreign intelligence activities; or to obtain information ceItified as necessary for the conduct of foreign affairs matters important to the national security of the United States. In addition the subject of the electronic surveillance must be 0011sciously assisting a foreign power or foreign-based political group,_ and there must be assurance that the minimum physical intrusion neee. ssary to obtain the information sought will be used. As these criteria will show and as I will indicate at greater length later in discussing current guidelines the Department of Justice follows, our concern is with respect to foreign powers or their agents. In a public statement made last Jnly 9, speaking of the warrantless suneillances then authorized by the Department, I said: It ran be said that there are no outstanding instances of warrantless wiretap" or electronic surveillance directed against American citizens and none will be authorized by me except in cases where the target of surveillance is an agent or collaborator of a foreign power. This statement accuratelv reflects the situation todav as well. Havin,g described in this' fashion something of the history and conduct of the Department of .Tustice with respeet to tl'lephone wiretap."and microphone installations. I should like to remind the committee of a point with which I began, namely, that the factual situations to be imagined for a discussion such as this are not onlv of a sensitin' but a changing nat11re. I do not have much to sny about this except to recan some of the Ianr:-nng:e word bv GeneraJ Allen in his testimony before this committ<~e. The techniques of the NSA, he said, are of tJ;" most sensitive and fra,'!ile chararter. He desrribed as the res{lonsibilitv of the NSA the inte.rception of international commnnication siQ'llflls sent through the air. He said there had bern ft watch list, which U11101lg" many other nanws. contftlned the names of U.S. ('itizens. . Senator Tower' spoke of an awesome technoloL:v-a l11we vaC11nm cleaner of commnnicaticns-whieh had the potenti~\l for ah~lses. Grneral Allen pointed out that "The United Statl's. ns part of its rfl'Ol,t to produce foreign intelligence, has intercepted forei!!!1 commnnications to produce s11c11 foreign inteJligrnce sincf' the' Revolntiona1'\" War." He said the mission of XSA is directed to fOl'eig:n intelli([Pl1l'e obtained from foreign electrical communications and ~lso from 'otllf'l' foreign signals, sucll as racIal'. Signals are intercer>ted bv many techniques and processed, sorted, and analyzed by procedures which re91 ject inappropriaw or unnecessary signals. He mentioned that the interception of communications, however it may occur, is conducted in such a manner as to minimize the unwanted mes..%ges. Xevertheles~. according to his statement, many unwanted communications are potentially selected for further processing. He testified that subsequem processinQ", sorting, and selection for analysis are conducted in accordance with strict procedures to insure immediate and, wherever possible, automatic rejection of inappropriate messages. The analysis and reporting is accomplished only for those messages which ID'(>ct specific conditions and requirements for foreign intelligence. The use of lists of words, including individual names, subjects, locations. °et cetera, has long boon one of the methods used to sort out information of foreign intelligence value from that which is not of interest. General Allen mentioned a very interesting statute, 18 U.S.C. 952, to which I should like to call your particular attention. The statute makes it a crime for anyone who by virtue of his employment by the United States obtains any official diplomatic code and willfully publishes or furnishes to another without authori7..ation any such code or any other matter which was obtained while in the process of trammission between any foreign government and its diplomatic mission in the United States. I call this to your attention, because a certain indirection is characteristic of the development of law, whether by statute or not, in this area. The CHAIRMAN. Can you explain what yon mean by that last sentence? Are you suggesting that the law you have cited upon its face makes the activities oithe NSA illegal? Attornev General LEVI. I think that the law on its face seems to be a law to protect the actions of the NSA from having any tranmission of messages intercepted go to unauthorized persons. The statute a voids by indirection saying that this is what the U.S. Government should do. It is assumed that it does it, and proceeds to find some way to give added potential. The CHAlmL\.~. That particular statute is specifically limited to codes between foreign governments and its diplomatic mission in the United States, is it not? Attorney General LEVI. That is right. As I say, it has a certain indirection. The CIIAIR~IA~. Yes. Attorney General LEVI. The committee will at once recognize that I have not attempted to summarize General Allen's testimony, but rather to recall it so that the extended dimensions of the varietv of fact situations which ,ve haTe to think about as we explore the coveraO'c and direction of the fourth amendment is at least suggested. b Having attempted to provide something of a 'factual base for our discussion, I turn now to the fourth amendment. Let me say at once. ho:"cver, that while the fourth ame,ndment can be a most Important gmde to values and procedures, It does not mandate automatic solutions. The history 0:1' the fourth amendment is verv much the historv of t he American Revolution and this Nation's ql1est for inclependence. The ame~dment is the legacy of our early years and reflects valllPs most cherIshed by the Founders. In a direct sense, it was a reaction to the general warrants and writs of assistance employed by the officers of 92 the British Crown to rummage and ransack colonists' homes as a means to enforce antismuggling and customs laws. General search warrants had been used for Centuries in England against those accused of seditious libel and other offenses. These warrants, sometimes judicial, sometimes not, often general as to persons to be arrested, places to be searched, and things to be seized, were finally condemned by Lord Camden in 17G5 in Enticle v. Oa71'inpfon, a decision later celebrated by the Supreme Court as a landmark of English liberty one of the permanent monuments of the British Constitution." The case involved a general warrant, issued by Lord Halifax as Secretary of State, authorizing messengers to search for .Tohn Entick and to seize his private papers and books. Entick had written publications critieizing the Cro,Yn and was a snpporter of John lVilkes, the famous author and editor of the "North Briton" whose own publications had prompted wholesale arrests, searches, and seizures. Entick sued for trespass and obtained a jury verdict in his favor. In upholding the verdict, Lord Camden observed that if the Government's power to break into and search homes were accepted, "the secret cabinets and bureaus of eYE~ry subject in this kingdom ,vould be thrown open to the search and inspection of a messenger, whenever the secretary of state shall see fit to charge, or eyen to suspect, l\, person to be the author, printer, or publisher of a seditious libel." The practice of the general warrants, however, continued to be known in the colonies. The writ of assistance, an even morc arbitrary and oppressive instrument than the general "arrant, was also widely nsed by revenue officers to detect smuggled goods. Unlike a general warrant, the writ of assistance was virtna]}y unlimited in duration and did not have to be returned to the court upon its execution. It broadly authorized indiscriminate searches and seizures against any person suspected by a customs officer of possessing prohibited or uncustomed goods. The writs, sometimes judicial, sometimes not, were usua]}y issued by colonial judges and Vl'sted Crown officers with unreviewed and unbounded discretion to break into homes, rifle drawers, and seize priYate papers. All officers and subjects of the Crown were further commanded to assist in the writ's execution. In 17tH, .Tames Otis eloquently denounced the writs as "the worst instrument of arbitrary p0',er, the most destructive of English liberty, and the fundamental principles of law, that eyer was found in an English law book," since they put "the libel:ty of every man in the hands of every petty officer." Otis' fiery orabon later prompted .John Adams to reflect that "then and there was the first scene of the first act of opposition to the arbitrary claims of Great Britain. Then and there the child Independence was born." The words of the fCllrth amendment are mostly the product of .Tames Madison. His original nrsion appeared to bc directed solely at the issuance of improper wnrrants. ReYisions accomplished uncleI' circumstances that arc stiJIl1nclear transformed the amendment into two separate chl11se~~. The change has influenced onr unclerstnnc1ing- of the nature of the rights it 111'otects. As embodied in our Constitlltion, the amendment reads: The right of the people to oe ~ecure in their persons. bonses. papers, and <'ffects, against unreasonable searches and seizures, shall not he violated, ano. no \Yarrants shall issue, but upon probable cause, supported by oath or affirmation, :md partiCUlarly describing the place to be s('arched, and the persOns or things to be seized. - 93 Om understanding of the purposes underlying the fourth amen,dnwm has been an eyolving one. It has been shaped by subsequent IllStorieal nents, by the changing conditions of our modern technological society, and by tIl(' (]evelopnwnt of our mvn traditions, customs, and values. From the beginning. of COUl'se, there has been agreement that the amenclmrnt protects ag'ainst practices such as those of the Crown olhccrs under the notorious general warrants and writs of as.'3istance. _\ ho\'e all, the anlPndment safegnards the people from unlimited, 1111dne infringement by the Government on the security of persons an'] their propert,v. But our perceptions of the language and spirit of the amendment have O'one bevond the historical wrongs the amendnlf'nt was intended to pr~'ent. The SupremE' Conrt has selTPd as the primary explicator of thE'se eTolYing pE'rceptions and has sought to articulate the values the amendment incorporates. I belieye it is useful in our present endeavor to identif,'- SOllie of these perceived values. First. broadlv considpre,l, the amendment speaks to the autonomy of the individual against soc.iety, It seeks to accord to each individual, albeit imperfedly. a measure of the confidentiality essential to the attainment of human digl1ity. It is a shield against indiscriminate exposure of an individuaFs private affairs to the world-an exposure ,vhich can destroy. sincp it places in jeopardy the spontaneity of thong-ht and ar'tion on ,vhich so n111ch depends. As .Tustice Brandeis ohc'PITed in his di:-isent in tIl(' 01m8fead case. in the fourth amendnwnt the Founders ·'conferred. as against the Government, the right to b' let alollr-tlw most c0111prphellsi n' of rights and the right most nlued by civilized men." The amendment does not protect absolutely the privacy of an individual. The need for privacy, and the law's n'sponse to that need. go bC'yoncl the amendment. But the reco{.,rnition of the value of imli \"idaa] autonomy remains close to the amendlllPnt's core. _\. parallel value has been the HnlPndment's sppcial concern with intrusions when the pm'pose is to obtain evidence to incriminate the I'jctim of the search. As the Supreme Court obsrrved in Boyd. which im"oIYN] an attempt to compPl the production of an individual's priI'atp papers. at some point the fourth amendment's prohibition against unreasonable searches and seizures and the fifth alllC'ndment's prohibition against compulsory self-incrimination "nm almost into each otllE'l'." The intrusion on an individual's privacy has long been thought to be especially gral'e ,,"hen the search is based on a desire to discover incriminating eviflence. The desire to incriminate may be seen as only an aggrayating circumstance of the search, but it has at times proven to be a clecisiye factor in determining its legality. Inderd. in Boyd the court declared broadly that "compelling the prodnetion of (n person's) private books and papers, to com-iet him of crime, or to -forfeit his property~ is contrar,'" to the principlps of a free gOVCl'llllH'nt." The incriminating' evidpnee point goes to thp integrity of the niminal justie2 system. It d()('s not npC'essarily settle the issue whether the overhearing can propprly take plaC'e, It gor'S to the use and purpose of the inf011l111tion ovel'llPanl. ..:\n additional concern of the anwndment has bC'pn the prott'ction of freedom of thought, spepch. and rpligion. Th" gpnpral wan-ants w"re 1l:~l'(1 in England as H pmwrful instrument to '3Uppress ,dwt ,vas 67-522-76--7 94 regarded as seditious libel or nonconformity. So .Tustice Powell stated in Keith that "fourth amendment protections become the more necessarv when the targets of offici.al surveillance mav be those susDecten of unorthodoxy in their political beliefs." v ... Another concern emhodird in the, amendment may be found in its second clause, dealing with the w,arrant requirement, e,,'en thongh the, fourth amendment does not always require a warrant. The fear is that the law enforceme,nt officer, if unchecked, may misuse his powe,rs tD harass those who hold unpopular or simply diffeTe,nt yiews and to intrude capriciously upon the princy of indiyiduals. It is the r~Ognition of tlw nossibiIity for abuse. inherent when0"er executive discr!:'tion is uncontrolled, that gives rise to the requirement of a warrant. That require,ment constitutes an assurance that the judgme,nt of a neutral and detached magistrate will come to bear before the intrusion is made, and that the decision whether the privacy of the indio vidual mnst yield to a greater need of society will not be left to the executin:l alone,. A final yalue reflected in the fourth amendment is revealed in its opening ,yards: "The right of the people." ,Vho are "the people" to whom the amendment refers? The Constitution begins with the phrase, ",Ve the People of the United Stat('$." That phrase has the character of words of art, denoting the power from which the Consti. tution comes. It does suggrst a special concern for the Anwrican citizen and for those "'ho share the responsibilities of citizrns. The fourth amendment guards the right of "the people" and it can be urged that it was not meant to apply to foreign nations. their 3gents and collaborators. Its application may at least take account of that difference. The yalues outlined above have bren embodied in the amendment from the beginning. But the importance accorded a particular value has yaried during the course of OUr history. Some, have been thought more important or marc threatened than others at time. ·When several of the vnlnes coalesce, the need for protection has been regarded as greatest. ,Yhen only one is involved, that need has been regarded as lessened. Moreover, the scope of the amendment itself has been altered over time. 'Yords have been read by differrnt justices and different courts to mean different things. The words of the amendment have not changed; we, as a people, and the world which envelops us, have changed. An important example is what the amendment seeks to guard as "secure." The ',ording of the fourth amendment suggests a concern "with tangi.ble property. By its terms, the amendment protects the right of the people to be secure in their "persons, houses, papers and effects." The emphasis appears to be on the material possessions of a person, rather than on his privacy generally. The CHAm::lL1.x. ,Vhy do yon say that when the word "persons" comes first; "houses, papers and effects" comes after "persons?" It seems to me that the emphasis was on persons in the first instance, and material holdings afterward. Attorney General LEVI. I suspect one r('ason you think so. Mr. Chairman, is the fact that you are Jiving today, but the emphasis on property and property rights, I think, was the way the, amendment was previously loolmd at. There is an interesting exchange be,tween Sir Frederick Pollack and Justice Holmes on that very subject at the time of the Olmstead case. In any event, this emphasis on property was the conclusion the court came to on the Olmstead case in 1928, holding that the intercept of telephone messages, if accomplished without a physical trespass, was outside the scope of the fourth amendment. Chief Justice Taft, writing for the court, reasoned that wiretapping did not involw a search or seizure; the amendment protected only tangible material "effects" and not intangibles such as oral conversations. But, while the removal and carrying off of papers was a trespai's of the most aggravated sort, inspection alone was not: "The eye," Lord Camden said, "cannot by the law of England be guilty of a trespa:,-s." The CHAill:\IAN. Did he really sal' that? .Attorney General LEVI. Yes; he clid. The movement of the law since OlJnstcad has been steadily from protection of property to the protection of priyacy. In the Goldman case in 1942 the Court held that the use of a detectaphone placed against the wall of a room to moerhear oral connrsatiolls in an adjoining office was not unlawful becanse no physical trespass was involved. The opinion's unstated assumption. hm-rever, appeared to be that a pri \Oate oral conversation could be alllong the protected "effects" within the meaning of the fourth amendment. The Sil1'cTln(ll1 case later eroded Olmstead substantially by holding that the amendment was violated by the interception of an oral conversation through the use of a spike mike driven into a party wall, penetrating the heating duct of the adjacent home. The Court stated that the question whether a trespass had occurred as a technical matter of property law ,vas not controlling; the existence of an actual intrusion was sufficient. The Court finally reached the opposite emphasis from its previous stress on property in 1967 in J(atz v. United States. The Court declared that the fourth amendment "protects people, not plac2s." against. unreasonable searches and seizures; that oral conversations, although intangible, were entitled to be secure against the uninvited ear of a government officer, and that the interception of a telephone conversation, even if accomplished without a trespass, violated the privacy on which petitioner justifiably rrlied while using a telephone booth. ,Tusticc Harlan. in a concurring opinion, explained that to have a constitutionally protected right of lwinlcy under Katz it was 11r('('8sary that a person. first. "have exhibited an actual-subjective-expectation of privac~r and, second, that tlw expectation be one that society is prepared to recognize as 'rea:o:onable.' " At first glance, Katz might be taken as a statement that the f011rth amendment now protects all reasonable expectations of privacy-that the boundaries of the right of pri,racy are coterminous with thosr of the fourth amendment. But that DSS1~mption "oould he mislendinQ·. To he!!in with, the amendment still protects some interrsts that haw' ,-ery little, if anything, to do with privacy. Thus, the police may not. w;thout warrant, seize an automobile parked on the owner's driveway even though they have reason to believe that the automobile was used in committing a crime. The interest protected by the fourth anwllflment in such a case is probably better defined in terms of propert~othan privacy. Moreover, the Katz opinion itself cautioned that "the fourth amendment cannot be translated into a general constitutional 'right 96 to, pl'iy~,cy" ~~ SOlIIC pl'i,'acy ill:prests are pl'Otedl'cl by rPJlJainingColl~ tItutlOllal gn<lr<lnt('Ps. Otl1C'r'O <ll'l' nrolrcte(l by Fpdpml statute. In' tll<' States. or not at all. ~, .. . . The (>I.\11DL\2" )Iay I interrupt a~ this point t? sllp:ge~t that there IS a vote III the Senate. a roll-call, WlllCh accounts for the fact that the SP1WTOI'S hu\'p had to lean'. It looks as thouuh tll'~ balance of Yom' statement "'ill require the remainder of the session this mornin:r so that I wonld snggest. if it is pos;~ihle for YOU to do so. that we n~glrn ~lpon the completion of your testimony. that we retnrn this afte1'lloon 111 order that :Members then may have an op!)ortllnitv havino- heard f ' ." ~ pnl'ts 0 your statenwnt and IX'ad the rest to ask qnestions. .\t 2. o'clock this afte1'lloon. we will continne the qupstioning. I am ]jot p:omg to go 10 /11(' \'otp. I am ,'ery much interested in the paper. Twonld Eke you (0 continue. please, . Attorney Genrral LEVI. The point that I was making abont Katz is twofold. First. under thr C01ll't's decisions. the fourth amendment dors not protect m'rry expectation of pri,'acy. no matter how reasonable 01' artual that expectation may he. It does not protect. for example. against falsp. fripnds' betrayals to the police of e,'en the most private ('ollfidpnpps. Sero'ld, tlw "rensonablp exppdation of privacy" standard; often sa id to he t he test of Klitz. is itself a conclusion. It represents a judgmrnt that rertain behavior should as a matter of law be protected ~lgainst unrestrained gO\'ernmentnl intrusion. That judgment, to be Slll'(', rrsts in part on an assessnwnt of the reasonableness of the expectatim'. that is. on all ohipdive. fartual estimation of a risk of intrusion Hnder gj,'en eirC'umstanees. joined \viih an actual pxpectation of pl'inwv by the person involved in a particnlar case. But it is plainly morr than that, since it is also intermingled with a judgment as to how inmol'tnnt it is to soriety that all expertation should he confirmed-a judgment based on a perception of our customs. traditions. and vallws as 11 free people. The Katz decision itself illustrates the point. "'Vas it really a "reasonable expectation" at the time of Katz for a person to believe that his trlephone connrsatiol1 in a public phonr booth was private and not sllsrrptihle to interception by a mirrophone on the booth's onter ,,'all? Almost 40 years earlier in Olm~tead~ the Court lwld such nontrespassor.\' intercentions ,"err permissible. G07r111J1111 reaffirnwcl that holding:. So hm, could K(ftz reasonahly expect the contrary? Thr fillS\YC'r: I think. is that thp ('omt·s dpcision in Katz tnrned ultimateh: on an nssessmrnt of thr rffeet of prrmitting such unrrstrained intl'llsions on thr indi,'idnal in his private and sorial life. The judgllwnt \\'as that a licrnse for unlimited gO\'ernmental intrusions upon (','pr)' tpjpphone ,,,auld po~e too gr~at a' danger to the sl:onta~eity of human thouQ:ht and brhanor.•Tnshce Harlan put the pomt tIllS way: "Thr analys'is mnst. in my view. transcend the search for subjective eXlwct~tioilS or legal attrilmtion of assumptions of risk. Onr expectations. and thE' risks wr assump. arr in large part reflections of laws that tra~,slate into 1'ulrs the customs and values of the past and l)1'Psrnt.~· A weighing of valurs is an inescapahle part i~l the interpr~tation and growth of the fourth amrndmrnt. Expectahons. and theIr rpasonahl('~('ss,vary according to circumstanres. ~o will the nred for an intrusion and its likely effect. These elemrnts wlll flefine the bound- (arips of the interests wh.irh the amendment hoIds as " secure." 07 1~0 idpllt,ify ~hc illt~l'psts ,,'hich are, to be, "sec~m'," of course, only begms the m<jmry. It IS equally eSS0nhal to IdentIfv the danlYers from \vhich those interests are to he serme. ",Vhat constitutes an~intrllsion ,vill depend on the scope of the protected interest. The early yiew !hat the fomth amendl~1ent protected only tangible property resulted ~n the ,rn1e that ,l phY";]!'al treaspass or taking \I'a" the llJ('aSlIl'(' of ,lll mtl'USlOn. 07mBteod rested 011 the fact that there had been no physical trespass into thf' defen<bnt's homr or officr. It also held that tile nse of the sense of hearing- to interrept a conyel'sating did Hot com;tit'lte a search or seizure. 11·11t:=.:. by rxpancling the scopp of the protected intpT'psts, necessarily altel'rcl our undrrstandinO' of what constitutes an intrusion. Since intangibles such as oral cOI';'...·ersations are now' regaI'Cled as protected "eLjfC'cts." the Q\'C'rhearing of a conversation may constitute an intrusion apart from whptheI' a physical trespass is involved. The naturr of the search and seizure can be very important. ,An e,ntn' into a hom;e to search its interior mav bc viewed as more serious than the onrhraring of a cl:'rtain type of conversation. The risk of aImsr may loom larger in one case than tlw other. The factors that ha\'e rome to bp yiewed as most important, however, are the purpose and effect of the intrusion. TI:e Supreme Conrt has ten~ed to focus not so mnch on \vhat was phySIcally done. but on why It was done and what tlw consequenee is likely to be. 'What is seized. \yhy it \yas sl:'ized. and \"hat is clone \"ith \"hat i" spizprl ar(' (']'itical q1lP ct i011S. I stated earlier that a central concern of the f01lrth amendllwut was with intrusions to obtain evidence to incriminate the victim of t11r :"parch. This conrern has Iwen reflected in Sll prelllr C01lrt drcisions \v!lith ha\'e traditionally treated intrusions to gntlwT' incriminatory e\'idpl1ce differently froin intrusions for neutral or benign purposes. In }'mnk Y. Jfaryland. 31)9 U.S. 360 (19;)9). the apprllant \ya,: line(l for reJusing to a1low a h01lsin,\l' inspector to enter his J'('siflelH'p to determine \yhether it ,,'as maintainrd in compl ianee \"ith the nmnici pa1 honsing cO(le. Yiolntion of the code WOllld han' le(l only to a dil'rction ,to remove the yiolntion. Only failure to comply with tlIP dirpdion \y01l1d lead to n criminal sanction. The C011rt. hel(l that :"l1rh aclministratiw searrhes cOlll(1 he conducted without warrant. .T1Istire Frankfurter, writing for the C01lrt. noted that the f01lrt h amendment was a reaction to "ransackin,,! bv Crown officers of the homes of cjtizrns in search of eyidence of cr'imr or of illegally imported Hoo(k·· TTl' obseITed that both Entirl.· and Boyd \Vf're concerned \yith attpJ11pts to compel indivi(lnals to incriminate themselws in criminal casps and that "it was on the iss11e of the right to he secm'c from searches for evidence to he 1Ise(1 i.n rriminal p~'oseclltions or for forfrihlrr" that the grl:'at b~tt Ie for f1lndamentrrl 1ihrrtv was fOlW:ht." Thel'r W,F t h11s a iu:eat differencr, the .Tnstire said. hrt~H'en sparchrs to seize e\'idf'nce :foi· criminal prosecuti.ons and sparcl1Ps to detect the exi.stence of m1lnicipal health corle yiolations. Searches in this lattp]' catrgo]'y, conrlnC'led "as an adjunct to a reg-nlator~' :"chr]]H' fo]' t hl' !!'C'w'ra1 ',r!fnl'E' of tlw cOlllllllmih' and not as a 111r:1nS of pnfo]'cin"o thp c:';;ninal In\\'. have antecP(lenU; <l('ep in ou]' hi:"to]'y." and s!loulcl 1I0t be suhjeded to the walTant reljuirC'llIent. Fml1l~ was later overruled in 1967 in rrrmom Y • .l!/U1iriflrr7 (lO)!I't. and a companion case. ,,'1"(' v. City of 8('(1tt7('. Tn romrrl'fl. appelhnt was. like Fm111c, charged with a criminal yiolation as a ],P:"lllt of his 98 -refusal to permit a municipal inspector to enter his apartment to investigate possible violations of the city~s housing code. The Supreme Court rejected the Fral1lc rationale that municipal fire, health, and housing inspections could be conducted 'without a warrant because the object of the intrusion was not to search for the fruits or instrumentalities of crime. Moreover, the COUlt noted that most regulatory laws such as fire, heal'th, and housing codes were enforced by criminal processes, that refusal to permit entry to an inspector was often a criminal offense~ and that the "self-protection" or "noncrimination" objective of the fourth amendment was therefore indeed involved. 'But the doctrine of Camara proved to be limited. In 1971 in Wyman v. James the COUlt held that a "home "isit" by a welfare caseworker, which entailed termination of benefits if the welfare recipient refused entrv, was lawful despite the absence of a ,,'arrant. The Court relied on the importance of the public's interest in obtaining information about the recipient, the reasonableness of the measures taken to insure that the intrusion was limited to the extent practicable, and most importantly, the fact that the primary objective of the search was not to obtain evidence for a criminal investigation or prosecution. (}all7ara and Frank were distinguished as involving criminal proceellings. Perhaps what these cases mainly say is that the purpose of the intrusion, and the use to which what is seized is put, are more important from a constitution~tl standpoint than the physical act of intrusion itself. 'Vhere the purpose or effect is noncriminal, the search and seizure is perceived as less trOllhlesome and there is a reacliness to find reasOluthleness even in the absence of a judicial warrant. By contrast, 'where the purpose of the intrusion is to gather incriminatory evidence, anel hence hostile, or when the consefluence of the intrusion is the sanction of the criminal law, greater protections may be given. The fourth amendment then~ as it has always been interpreted, does not give absolute protection against Government intrusion. In the words of the amendment, the right guaranteed is security against lllll'casonable searches and seizures. As .Justice 'Yhite said in the Ca'llwra case, "there can be no ready test for determining reasonableness other than by balancin,rr the need to search against the invasion which the search entails." 'Yhether there has been a constitutionally prohibited invasion at all has COllle to depend less on an absolute dividing line between protected and unproteC'ted areas, and more on an estim:;tion.of the individual s.ecurity interests affected by the Government's actIOns. Those effects, III turn. may depend on the purpose for which the search is made~ whether it is hostile, neutral, or benii-'11 in relation to the person whose interests are invaded, and also on the manner of the search. By the same token, the Government's need to search, to invade individual privacy interests, is no longer measured exclusively, if indeed it ever was, by the traditional probable cause standard. The second clause of the amendment states, in part, that "no warrants shall issue but upon probable cause." The concept of probable cause has oftcIl been read to bear upon and in many cases to control the question of the reasonableness of searches, whether with or without warrant. The traditional formulation of the standard, as "reasonable grounds for believing that the law was being violated on the premises to be searchecF' relates to the governmental interest in the prevention of criminal offenses, and to seizure of their instruments and fruits. This formulation once took content from the long-standing "mere evidence rule" that searches could not be undertaken "solely for the purpose of securing evidence to be used in a criminal or penal proceeding, but that they may be resorted to only when a primary right to such search and seizure may be found in the interest which the public may have in the property to be seized." The Government's interest in the intrusion, like the individual's interest in privacy, thus was defined in terms of property, and the right to search as well as to seize was limited to items, contraband and the fruits and instrumentalities of crime, in which the Government's interest was thought superior to the individual's. This notion, long eroded in practice, was expressly abandoned by the Court in 1967 in 1Varden v. Hayden. Thus, the detection of crime, the need to discover and use "mere evidence" may presently justify intrusion. Moreover, as I have indicated, the Court has held that, in certain situations, something less than probable cause, in the traditional sense, may be sufficient ground for intrusion, if the degree of intrusion is limited strictly to the purposes for which it is made. In Terry v. Ohio the Court held that a policeman, in order to protect himself and others nearby, may conduct a limited "pat down" search for weapons when he has reasonable grounds for believing that criminal conduct is taking place and that the person searched is armed and dangerous. Last term, in United State8 v. Brignoni-Ponce, the Court held that, if an officer has a "founded suspicion" that a car in a border areas contains illegal aliens, the officer may stop the car and ask the occupants to explain suspicious circumstances. The Court concluded that the important governmental interest involved, and the absence of practical alternatives, justified the minimal intrusion of a brief stop. In both Terry and Brignoni, the Conrt emphasized that a more drastic intrusion, a thorough search of the suspect or automobile, would require the justification of traditional probable cause. This point is reflected in the Court's decisions in Almeida-Sanche.?' and Ortiz, in which the Court held that, despite the interest in stemming illegal immigration, searches of automobiles either at fixed checkpoints or by roving patrols in places that are not the "functional equivalent" of borders could not be undertaken without prohable cause. Nonetheless. it is clear that the traditional probable cause standard is not the exclusive measure of the Government's interest. The kind and degree of interest required depend on the severity of the intrusion the Government seeks to make. The requirement of the probable cause standard itself may yary, as the Court made clear in Oamara. Th'tt case, as you recall, concerned the nature of the probable cause requirement in the context of searches to identify housing code violations. The Court was persuaded that the only workable method of enforcrment was periodic inspec60n of all structures, and concluded that because the search was not "personal in nature," and the invasion of privacy inyolved ,,-as limited, probable cause could be based on "~ppraisal of conditions in the area as a whole," rather than knowledge of the condition of particular buildings. "If a valid public interest justifies the intrusion contemplated," the Court stated, "then there is probable cause to issue a suitable restricted search warrant." In the Keith 100 case, while holding that domestic national security surveillance, not involving the activitiC's of foreign powers and their agents, was subject to the warrant requirement, the Court noted that the reasons for "inch domestic surveillance may differ from those justifying snrveillances for ordinary crimes, and that domestic security surveillances often have to be long-range projects. For thesC' reasons, a standard of probable cause to obtain a warrant different from the traditional standard ,vould be justified: "Different standards may be compatible with the fourth amendment if they are reasonable both in relation to the legitimate need of Government for intelligence information and the protected rights of our citizens." In brief, although at one time the "reasonableness" of a search may have been define{l according to the tratlitional probable cause standard, the situation has now been reversed. Probable canse has ('0111e to c1ppend all reasonableness, on the legitimate need of the Government and whether there is reason to belim'e that the precise intrusion sought, measured in terms of its effect on individual security, is uecessllry to satisfy it. This point is critical in evaluating the reasonableness of searcNe's or surveillances undertaken to protect national secnrity. In some instances, the Government's interest may be, in part, to protect th~ Xa· tion a~aiust specific actions of foreigl1 p0',ers or th~ir agents. actions that are criminal offenses. In other instances, the interest may be to protect against the possibility of aetiollS by foreign pmwrs "and their agents dangerous to national security, actions that mayor may not be eriminaJ. Or tlw int('rest may be solel~' to ~athrr intelligPllr'r. in a variety of forms, in the hands of fOl'rign agents and foreign pow(')'s, intelligence that may be essential to informed conduct of onr Nation's foreign affairs. This last interest i11(]('C'(l may often be far n;lOre rl'itical for the protection of tll€' Kation that the detection of a particnlar criminal offense. The fourth amendrnent's standard of l'easonablenpss as it has developpd in the Court's decisions is sufficiently flexible to reco!!nize this. •Tl~St as the reasonableness standard of the amendment's first clause has taken content frol11 the probable causE' stalldanl. so it has also ('orne to incorporate the particularity requirement of tIlE' warrant ('lallSE'. that warrants particnlarlv desrribe "the place to be searched, and the persons or things to be seized." As one cirenit eourt has written. although pointing ant the remedy might not be Yer~' extf'nsive "limitations on the :frnit to 1)(' gatherpd tend to limit tl10 (111(,8t itspH." Thr Gm'ernment's interest awl pnrposc in uw1ertaking the search definE'S its scope, and the soeirtal importanre of that pmposr can he wrig1lt('(1 against the effects o:f thC' intrusion on the in(lividuul. By prerise definition of the objects of the sC'ar-ch. tIl(' degree of intrusion can be minimized to that rE'asonably ner'C'ssary to achif'Ye the legitimate pnrposE'. In this sense, th(' particn1flrity requirrllwnt of tlw warrant clausr is analogons to the minimization requirement of title III. that interceptions "be execnted in snch a way I1S to minimize the interreption o,f communications not otherwise snhjrct to interreption~' under the tItle. Rnt: tlwre is a distinct asper't to tlw particnlaritv n~qllirement.onr that lS often overlookrd. An offirrr who has obtainerl a "'arrant hnsec1 npon probable ('Ruse to O'l'arch for particlllar itE'ms may in conducting101 the search necessarily haye to examine other items, some of which may constitute evidence of an entirely distinct crime. The normal rule under the plain view doctrine is that the officer may seize the latter incriminating items as ,,,ell as those specifically identified in the warrant so long as the scope of the authorized search is not exceeded. The minimization rule responds to the concern aoout overly broad searches, and it requires an effort to limit "'hat can be seized. It also may be an attempt to limit how it can be used. Indeed, this minimization concern may have been the original purpose of the "mere e"idence" rule. The concern about the use of ,,,hat is seized may be most important for future actions. Until VCI'V rccentlv. in fact. until the Court's 1971 deeision in Bi~'wn8, the only sanction against an' illegal search was that its fruits were inadmissible at anv criminal trial of the person whose interest was invaded. So long as this was the only sanction, the courts, in judging reasonableness, did not really have to weigh any governmental interest other than that of detecting crimes. In practical effect, a search could only be "unreasonable" as a matter of law if an at· tempt was made to' use its fruits for prosecution of a criminal offense. So long- as the Gowrlllnent dicl not attempt such usc the search could continue and the Government's interests, other than enforcing criminallav, s. could be satisfie(l. It may be sai(l that this confusrs rights and remedies; searches could he Ullrpasonable eH'n though no sanction followed. But I am not clear that this is theoretically so. and realistically it was not 80. As I han noted earlier. thp rpasonablelwss of a searrh has depended. in major part. on the ]JnJ'jlosP for ",hir11 it is 11lldrrtaken and 011 ,,,hether that purpose, in relation to the prrson whom it affects. is hostile or l)pni~m. The search most hostile to an indiyidual is one in preparation for his criminal prosecution. Exclusion of ryidence from criminal trials may help assure that searrIles undertaken for ostensibly benign motives are not used as blinds for attempts to find criminal evidence, ,,,hile permitting srarclws that arr genuinely benign to continue. But there is a more general poiilt. The effect of a gm'ernment intrusion on individual secm'itv is a function. not only of the intrusion~s nature awl circumstances, b~lt also of disclosure aild of the use to which its product is put. Its effects are, perhaps grl:'atest ,,,hen it is employed or can be employed to impose criminal sanctions or to deter, by disclosnre. the exercise of individual freedoms. In short. the use of the product seized bears upon tlw reasonableness of thr search. These observations have particular bearing on ell:'ctronic surveillancr. By the nature of the tpchnology the "search" may necessarily bp far broader than its legitimate objerts. For exnmple. a surveillance justified as the only means of obtaining valuable foreign intelligrnce may require tlw temporary overhearing of conversations containing: no foreign intelligence whatever in order eventually to locate its object. To the pxtent that we can. by purely mechanical means, SPtr>ct out only that information that fits the purpose of the search, the intrnsion is radicallv rpdnced. Indeed. in terms of effects on individnal spcurity. tlwre ,~ould bE' no intrusion at all. But other steps may be appropriatp. In this respect, I think we should recall the language and the practice for many ypars unrler formpr section 601) of the Communications Act. The art ,ns violated. not bv surveillanre Idone. but only by snrveillancp and disclosure in court or to the public. It may be 102 that if a critical government purpose justifies a suryeillance, but because of technological limitations it is not possible to limit surveillance strictly to those persons as to whom alone surveillance is justified, one way of reducing the intrusion's effects is to limit strictly the revelation or disclosure or the use of its product. Minimization procedures can be very important. In discussing the standard of reasonableness, I have necessarily described the eyolving standards for issuing warrants and the standards governing their scope. But I have not yet discussed the warrant requirement itself, how it relates to the reasonableness standard and what purposes it was intended to serve. The relationship of the warrant requirement to the reasonableness standard was described by J ustice Robert Jackson: Any assumption that evidence sufficient to support a magistrate's disinterested determination to issue a search warrant will justify the officers in making a search without a warrant would reduce the amendment to a nullity and leave the people's homes secure only in the discretion of police officers. The CHAIRMAN. That is Senator Mathias' previous point, that once Attorney General Jackson became Mr. Justice Jackson, he took a different view. Attorney General LEVI. That may be, although I had not realized he had been a police officer. That is Justice Jackson. The CHAIRMAN. He had been Attorney General. Attorney General LEVI. I make a substantial distinction. The CHAIRMAN. I recognize the distinction. Attorney General LEVI. "'When the right of privacy must reasonably yield to the right of search is, as a rule, to be decided by a judicial officer, not bya policeman or government enforcement agent. That makes his point better. The CHAIRMAN. Yes. Attorney General LEVI. This virw has not always been accepted by a majority of the Court; the Court's view of the relationship between the ge.neral reasonableness standard and the Warrant requirement has shiffed often and dramatically. But the view expressed by .Justice Jackson is now quite clearly the prevailing position. The Court said in Katz that "searches concluct~d outside the judicial process. without prior approval by judge or magistrate, are per se unreasonable under the fourth amendment. subject only to a few specifically established and well-drlineatecl exceptions." Such exceptions include those grounded in necessity, where exigencies of time and circumstances make resort to a magistrate practically impossible. These include. of course. the Terry stop and frisk and, to some degree, searches incident to arrest. But there are other exceptions, not ahrays grounded in exigency, for example. some automobile searches, and at least some kinds of searches not conducted for purposes of enforcing criminal laws, such as the welfare visits of Wyman v. James. In short, the warrant requirement itseH depends on the purpose and degree of intrusion. A footnote to the majority opinion in Katz. as well as .Justice 1Yhite's concurring opinion, left open the possibility that warrants may not be required for sf'arches undertaken for national security purposes. And, of course, Justice Powell's opinion in Keith. while requiring 'warrants for domestic securitv snrveillanc0s. snggests that a different balance mav be struck when the surveillal~ceis 'undertaken against foreign po,yers and 103 their agents to gather intelligence information or to protect against foreign threats. The purpose of the warrant requirement is to guard against overzealousness of government officials, who may tend to overestimate the basis and necessity of intrusion and to underestimate the impact of their efforts on individuals. The historical judgment, which the fourth amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech. These purposes of the warrant requirement must be kept firmly in mind in analyzing the appropriateness of applying it to the foreign intelligence and security area. The CIIAIR'\IAX. Mr. Attorney General, we are now on final passage of a bill. Since you have been' testifying for some time, I think you could probably take a break, take a 5-minute recess, take a drink of ,,'ateI', and I think it would be inappropriate as we examine the vagaries of the fonrth amendment for me to miss final vote on the Sunshine bill permitting congressional committees to hold open hearings. Attornev General LEn. ,Vithont a warrant. The CH"~IR~IAX.'\Tithout a warrant, right. [A brief recess was taken.] The CJIAIR:;IL\X. The hearing will please come back to order. Mr. Attorney General, would you take up where you left off, please f Attorney General LEn. There is a real possibility that application of the warrant requiremenL at least in the form of the normal criminal scar('h warrant, the form adopted in title III, will endanger legitimate government interests..As I have indicated, title III sets up a detailed procBdure for interception of wire or oral communications. It requires tIl(' procurenwnt of a judicial warrant and prescribes the information to be set forth in the petition to the judge so that, among other things, he may find probable cause that a crime has been or is about to be committed. It requires notification to the parties subject to the slll'veill:mce within a period after it has taken place. The statute is dearly unsuited to protection of the vital national interests in continui.ng detection of the activities of foreign powers and their agents. A notice requirement, aside from other possible repercussions, could destroy the usefulness of intelligence sources and methods. The most critical surveillance in this area may have nothing- whatever to do with detection of cri.me. Apart from the problems presented by particular provisions of title III, the argument against application of the warrant requirement, even with an expanded probable cause standard, is that judges and magistrates may underestimate the importance of the Government's need, or that the information necessary to make the determination cannot be disclosed to a judge or magistrate without risk of its accidental revelation. a revelation that could work great harm to the Nation's security. ,Yhat is often less likely to be noted is that a magistrate may 'be as prone to overestimate as to underestimate the force of the Government's need. ,Yarrants necessarily are used em parte; often decision must come quickly on the basis of information that must remain confidential. Applications to anyone judge or magistrate would be only sporadic: no opinion could be published; this would limit the growth of judicially developed, reasonably uniform standards based, 104 in p.nt. on the quality of the information sought and the knowledge of possible altc'l'llatin's. Equally important. responsibility for the intl'Usion wOlllel haye been diffused. It is possible that the actual number of s('arch('s or snryeillallc('s would increase if executive officials, rather tllflll l)('tn'in~ responsibility themselycs, can finel shield behind a magistrate's judgmrnt of l'rasona'bleness. On the other hand, what!wer th(' practical effect of a warrant requirement may be. it would still sene the important purpose of assnring the puhlic that searches are not conc1nrtecl "ithont the approyal of a neutral magistrate "ho could prey(, Ht abuses of the' tcchniqne. In discussing the achisability of a warrant requirement. it may also lw llspfnl to clisti))[!uish amOlL'l' nossihl(' sitllations that arise' in the lwtio!lal secnrity a're'a. Thl'pe sitlwtions. greatly simplified, ('ome to mind. They cliffrr from one anotlwr in the extent to which they are limirecl in time or in target. First. the search may be directed at a particula l' fore'ign agent to detect a specific anticipated actiYity, such as the nUl'chase of a i-'ccret document. The activit>, which is to be dptected 0]'(1 (nadly wonlel constitute' a erinH'. Second, the search may be more extended in time. e\'en yirt11ally cD!1tinuous. but still would be directed at ::n ielenti fieel fOl'ei!!n al2'ent. The pmpose of such a surveillance ,,-ou]<1 he to monitor the agent's activities. determine the identities of l)('rsons "'hose access to classified information he might be exploiting. aJHllleterllline the identity of other foreign agents with whom he may 1)(' in contact. Such a suneillauce might also gather foreign intelligence information a'bont the agent's own country. information that ,voul(l be of posih'.'l' intelligellce yaIne to th(' rnitr<l States. Third, there. mav be vil'tuallv continnons surveillance \\'hich bv its nature does not hay(,.' sprci hcn11,\' 'predetrrm ined targets. Snch a sllrniIIancr could be (Iesigned to gather foreig'n intelligence information essential to the SE'c11l'itv of the Xation. 1'1)(' m01:e ]imitE'd in time and target a sHlTeillance is, the more nearly nlla logous it appC'ars to be ,,'ith a traditional criminal search which im"olns a particnlar target location or incli\'idual at a specific time. Thus. the first situation I just drsC'rihecl wonld in that respect be most nmenable to some sort of ,~'aITant requirement. the second less so. The C'flicacv of a ,,'arrant rC'quirell1ent in the third situation would be minimal. If the third type of snrveiliance I described were submitted to prior judicial appronll. that judicial decision would take the form of fin ex parte declaration that the program of surveillance designed by the Goyernment strikes a reasonable balance 'between the Governn1C'nt's need for the information anll the protection of individuals' Tights. XHel'the]pss. it may he that clifferent kinds of warrants could be developed to cO"er the third situation. In his opinion in A7meidaRlmrhez. .Justice Powrll snggested the possibility of arpa warrants, issllecl on the hasis of the conditions in the area to be surveilled. to ~1l0\Y antOll1Dhilp searches in areas near America's borders. The law 11:1" not lost its inwntiwness. and it might he possible to fashion new jlHljeinl appro:1ehrs to the novel situations that come up in the area of foreign intellig€llce. I think it must be pointed out that for the deyelopment of snch an extended. new kind of warrant. a statutory base might he reqnirrd or at least appropriate. At the same time. in dealing ,,-jth this area. it may 'be mistaken to focns on the warrant requirement alone to the exclnsion of other. po~sihlymore realistic, protections. 10;') 'Vhat, tl\('n~ is the shape of tlw present la\d To begin \vith, se\Oe1'al statutes appeal' to recognize that the Government does intercept C0rtain messagrs for foreign intellig011ce purposes and that this activity nl1lst be, and can Le, carried out. Section %2 of title 18. which I mrntioned rarlier is one cxample; section 788 of the same title is another. In addition, title Ill's proviso, which I hayc qnoted earlier, explicitly (lisclaimed any intent to limit the authority of the Executiye to con( luct electronic surveillance for national sccurity and foreign intelligence purposes. In an apparent recognition that the power wonld be 0xcl'cised, title III specifies the conditions nnder \vhich information obtained througoh Pr0sidcntia,lly authorized snrveillance llla~o be rec(' ive(l into evidence. It seems clear, therefore, that in 1968 Congress \vas not prqmred to come to a judgment that the Executive should dis( Oontinuc its adi\Oities ill this area~ nor was it prepared to regulatc how those activit ies were to he condnded. Yet it cannot be said that Congress has bcpn entirely silC'l1t on this matter. Its express statntor~o rrfercncrc; to tl](' existrIlC(' of the acti,oity must be taken into account. The cnse law, althougoh unsatisfactory in some !TSpe('ts, has suppodrd or le'ft untonC'll('el the policy of the Executiye in the foreigtl intellip:ence area wheneyer the issll(' has been sqna-relyconfronted. The Suprpme Comt's decision in the Keith case in 1m2 concerned the legality of warrantless surveillance elireetec1 against a domestic organizat ion \" ith no c011llPC'tion to a foreign power and the Govel'lllllent's attcmpt to introdllcr the product of the surveillance as evidence in the ('l'imi'lal tr;:t! of :l IWl"on dWl'grd \,"itll homhing a CIA office in Ann .\1'1>c1". ~Ii('!l, III part bec:lus(' of the danger that llIwOIltTolled discl'rtioll III 11[ht I'csnlt in usc of electronic snrveillance to drter dOIllf'stic organizations from exercising first amendment rights, the Supreme COlll't held that in cases of internal secnrity~ when there is no fOl'eigoll imoolnlment. a judicial warrant is required. Speaking for the Conrt, Jnstice PO\ycll emphasized that- 'l'hisC'ase Imoolves only the donlf'stiC' aSlwcis of national securityo \Ye lunoe pxpresspd no opinion as to tbe issues which may be imooln'd with resjlt'd to adiYitief> of foreign powel>: or their agentso As I obsP!Ted in my remarks at the ABA conn~lltioll the Supreme COlll-t snrely rcalizedin Yie,Y of till' illljlOrt:ll1C'P thp Goyprnmpnt has plaC'prt on thp nppd for warrantIpss electronic slllTeillancp tllat, aftpr ih" holding- in I(citll, thp GO\oernll1pnt would IlIoocppd with th€' proeedurps it had dp,'ploped to conduct thosp sunopillances not prohilJit('(I-that is, In the foreign intelligpnce area 01°, as oTustiC'e Powell snirt, "with ref'IJpC't to aetiyities of foreign powers ancI their agents:' The CJI\I10IAx. )Iay I interrupt to say that .Tnstice PowelFs p('J'C'PptiOll of the latent threat of ull\varmnted snrYeillance aO'ainst domestic organizations in the name of national security is of g~eat concrrn to Ille and to the members of this committee because n-othina: coulel be 1i100°e intimidating on the right of individuals to express themsrlves and protest policies of the Government with which thev disaO"ree. than the belief that they are being watched and their conversation;an> being monitored by the Federal Govel'l1ment. ' Attorney 'General LEYI, ~\s I believe von know. ~fr. Chairman. it has aliOo been agreat ('oncern to me. . ~'I:e CTL~Il~:lL\oX, I alll simply eXI)]'essing apprO\oal of the PO\H'11 OpIl1lOll awl !ts Importance. and I am certain it is being obselTee1. 106 Attorney General LEVI. The two Federal court decisions after Keitn-I am not sure, Mr. Chairman, if that is a question. If it were a question, the answer is yes. The two Federal court decisions after [{eith that have expressly addressed the problem have both held that the fourth amendment does not reqnire a 'warrant for electronic surveillance instituted to obtain foreign intelligence. In the first. United States v. Brown, the defenrlant, ~n Ameri~an citizen, was incidentally overheard as the result of a warrantless wiretap authorized by the Attorney General for foreign intelligence purposes. In upholding the legality of the surveillance. the Court of Appeals for the Fifth Circuit declared that on the basis of "the President's constitutional duty to act for the United States in the field of foreign affairs, and his inherent power to protect national security in the conduct of foreign affairs. the President may constitutionally authorize warrantless wiretaps for the purpose of gathering foreign intel1igence." The court added that "restrictions on the President's power which are appropriate in cases of domestic security become inappropriate in the context of the international sphere." In the United States v. Butenko. the Third Circuit reached the ·same conclusion-that the warrant requirement or the fourth amendment does not apply to electronic snrveillance undertaken for foreign "intelligence purposes. Although the surveillance in that case was directed at a foreign agent, the court held broadly that the warrantle::;::; surveillance would be lawful so long as the primary purpose was to obtain foreign intelligence information. The court stated that such surveillance would be reasonable without a warrant even though it might involve the overhearing or conversations of "alien officials and agents, and perhaps of American citizens." I should note that although the United States prevailed in the Butenko case. the Department acquiesced in the petitioner's application for certiorari in order to obtain the Supreme Court's rnling on the qllestion. The Sllpreme Conrt denied review, however, and thus left the third circuit's decision undisturbed as the prevailing la". The CHAIRUAN. Do vou know anywhere in the prevailing law that the tenn "foreign intelligence" is defined? ~\.ttorney General LEVI. I am not S11re I can answer that qnestion. I think that the constant emphasis on foreign powers and their u!!ents helps define. In a discussion of the diplomatic powers of the President, his position in terms of the Armed Forces and so on perhaps helps. The CHAIR~fA),T. ",Ye find it a very el11si,e term becallse it can be applied as jnstification for most ariything and broadly defined can go far beyond the criteria that yon j11st snggested. I know no place in the la". that nndertakes to define the term. Attorney General LEVI. That. of course. is the problem with all the terms in this area. Also, a problem with the term "internal security," "domestic seeurity," or "national security." becanse one might tend to billow those terms to the point that they cover foreign intelligence, PO that we have a problem. ~r()~.t rrrcnth. in Zll'eihon Y. ,~fitr7z('7Z. (lpeirlrrl in ,Tnnr of t1)js Yf'flr, the Di.strict of Columbia circuit dealt with warrantless electronic surveillance directed against a domestic organization allegedly en107 gaged in adivitirs affecting this country's relations with a foreign power. It dealt specifically with the .Jewish Defense League and the allegation that it ,ns inyolyed with bombing of foreign diplomats of importance to the UN. Judge Skelly "Wright's opinion for four of the nine judges makes many sbvtements questioning any national se{'urity exception to the warrant requirement. The court's actual holding made clear in Judge ,Yright's opinion was far narrower and, in fact, is consistent with holdings in Brown and B1ttenko. The court held only that "a warrant must be obtained before a wiretap is installed on a don1estic organization that is neither the agent of nor acting in collaboration 'with a foreign power." This holding, I should add, was fully consistent with the Department of ,Tustice's policy prior to the time of the ZU'eibon decision. The CHAIRMAN. Is it also preyailing law? Attorney General LEYI. I regard it as pre,"ailing law. The CHAIRMAN. Is there an appeal pending? Is it being taken to the Supreme Court? Attorney General LEVI. My understanding is that the Department is not taking an appeal. I am not sure of the defendants. Since the Department's policy is really in agl'C'empnt with the holding, the only way for us to accept as la,Yyrrs repn'scnting others to take an appeal, would have been to say that the broad language of the eourt was an attempt to make an illicit rxtension of its holc1ing and to try to appeal on that. I do not believe you would have gotten anyplace. I would like to haye done it partly as a ,yay of trlling judges thnt they should take care what they say. 'Vith these cases in mind. it is fair to sav plrrtTonic sllrvril1ance conducted for foreign intelligence purposes, 'essent jn1 tD t1)(' nH'tiona1 security, is lawful under the fourth amendment. ev('Jl in thr a1J~PIH'e of a warrant, at least where the subject of the surveillance is a foreign power or an agent or eollaborator of a foreign power. )fo1'ro\'£'r. the opinions of two cireuit courts stress the purpose for which tlw sun-eilJance is undertaken, rather than the identity of the snhject. This snggests that in their vipw such s1llTeillance without a warrant is lawful so long as its purpose is to ohtain foreign inteIligen("e. But the legality of the ncti,'+V does not remm"e from thr Executive or from Congress the responsibility to take steps. within their powpr, to seek an aceommodation between the vital publie and private interests involved. In our effort to seek sueh an accommodation, the Department has adopted standards and procedures designed to insure the reasonableness under the fourth amendment of electronic surveillnnce and to minimize to the extent praetical the intrusion on individual interests. As I have stated, it is the Departmpnt's policy to authorize eledronic surveillance for foreign intelligence purposes only when the subject is a foreign powpr or an agent of a foreign powrr. By the term "agent" I mean a eonscious agent; the agpncy mnst be of a special kind and must relate to activities of great concern to the United States for foreign intelligence or counterintelligenee reasons. In addition at present there is no warrnntlpss elpctronic sUl'veil1ance ,lirected against any American citizen, and although it is conceivable that circnmstances justifying such slllTrillmlcP may arisp in the fntnre, I will not 9uthorize the slU'Yeillance unless it is clpar that the AmC'rican eitizen is an aetive, conscio11s ag0nt or collaborator of a foreign power. In no event, of eourse, would I authOl'ize any warrantless snr108 vril hll1cP ag-a il1~t dOIP.est ic !W!'SOIlS OJ' onranizatiollR such IlS t ho~p inyolved in the Keith case. SnlTeillance ,,:ithout a "arrant "ill not he condll('.t~d fol' purposps of security flu-a inst donwstic or intern a1 thrpats. It is OUI' policy. 1110I'rO\'rl'. to Ilsr the titll-' TIl procedure wl1"n(' VPI' it is possible and appT'Opriatp to (10 so. although the statuto]'y j)I'O\-iRions regarding probablr crrURr. notification, and prosecll'tin' pnrposr make it unwodmble in all fOl'eig-J1 int<>lligpnc<> anel many COlmtrl'intplligrncr cases. The standards and procedurrs that the Depaliment has establishr(l within thr Fnitrd States srek to insm~ that evpry request for smypillance recpives thorough and impartial consideration before a decision is madp ,dwtl1rl' to iustitntl? it. Th<> 1>l'Ocess is elahomte and time consuming. but it is necessary if the public interest is to be SBITPd and individualriu-hts safe,(!llardrd. I han' just lwen speaking about tele])hone, wiretapping and microphone surveillances which are reviewed by the Attorney Genera1. In thp comsr of its inwstig·ation. tilE' committl?e has hecome familiar with the more tf'c1mologiclllly sophisticated and complex eleetI'Onic slHTeilIH1wP act.iyitips of other agencies. These sUlTei11ance activities present somewhat. different legal questions. The communications conceiYabl~might tab' place entin'ly ontsirle tlle Fnited States. That, fact alone. of course. ,,"ould not automatically remow the ag-encies' activities from scrutinv undPI' the fourth amendrnent since at times even communications abroad may involve a legitimate privacy interest of Americnn citizens. Otlwr commllllications ronrpivablv might. be exe1usiyplv hehwpn fo]'('ig-n pmwr:.; an<1 tlwir agpnts and involve no Americall tprminal In sllch n, casc, even though American citizens may be discussNl. this may raise less sig1lificant. at· perhaps no significant, questions nnder the fourth nmendment. Rut the primary concern, I suppose. is whether rpasonable minimization procedures are employed with respert, to llse a,]1(l disspmination. 'With resprct to all elpctronic surwillance. whether conduded within tll(' Fnitpd Statf's or abroad. it is essential that efforts be made to minimize as much as possible the extent of that intrusion. Much in this regn I'd can be done by modern technology. Standards and procedures can be deyrloped and effectively deployed to limit the scope of thl? intl'llsion and the USe to which its product is put. Various mechanisms can pl'ovicle a needpd assurance to the American people that the activity is undertaken for legitimate foreign intelligpnC'e lHlrposps. and not fo!' political or other improper purposes. The procedures used should not be onps which bv the indirection in fact tanret AmPI'ican citizens and I'esidpnt aliens v;-hel'(, these individuals would not themselves be appl'opriat. e targ-cts. The proper minimization criteria can limit the acti,-ity to its jnstifiabk and necpssary scope. TIlE' CHAIIDL\~. This is one of the subjects I'm sure the committee ",ill "'ant to onestion VOIl abont this afternoon because we had so l11nch ('vidence of ,,:atch list and even random openings of the mail without any particular criteria. and names of people that would appear to be ,dlO]Jv inappropriate for purposes of suneil1ance. These are the rpal lifc' fltlPstions that are presented to this committee in terms of what t hn Gon'l'llll1ent art-UH 11 y has been doing. ,\.ttOi'lWY GpllPral LEn. I assume. -:\11'. Chairman, that the main ,h mst of t'hr, r0ll1111ittpe is to see what kind of legislation or better procedures ('an be den'loped and I\'e tried very hard speaking on those 109 subjects that I can speak on, and not speaking on those that I cannot. to try to lay that down before the committee as a base. Another factor must be recognized. It is the importance of potent ia1 importance of the information to be sC'cured. The activity may he undertaken to obtain information deemed necessary to protect the Xation against actual 01' potential attack or other hostilr acts of a foreign power, to obtain foreign intelligence information deemed essential to the security of the United States. or to protect national security information against foreign intelligence acti"ities. Need is itself a matter of degree. It may ]w that the importance of some information is slight. but that may he impossible to gange in a<1nmce; th(' si/--rnificance of a single bit of information may become apparent only when joined to intelligence from other sources. In short. it is necessary to deal in probabilities. The importancB of information gathered from foreign establishments and agents may be regarded gellC'rally as high-although even here may be wide variations. At the same time, the effect on individual liberty and security-at least of American citizens-caused bv methods directed exclusivelY to forei,!!,11 agents, particularly with minimization procedures, wOldd 00 \'e'ry slight. There may be regulatory and institntional dp\·iees other than the ,,'arrant requirrment that ',"ould 11Pttrr assnre that intrusions for national s('cnr1ty and foreign intelligence pnrposes reasonably bnlanf'r the important needs of Gon'rnment and of indiddnal interests. In assessing possible approaches to this problem it may be useful to pxaminp t11(\ prrretif'eq of onwr ,ypstpm r1emocraries. For rxa mplp. England. Canada. and 'Ypst Germany each share our concern ahont the confidentiality of communications "'1thin their horders. Yet earh 1'E'CO;:?-'nizps the right of the Executin to intercept communicfltions ,,,ithont a jndicial warrant in C'ases inYolying suspected rspiona/Ie, subwl'sion 01' othP1' national secnrity intelligencp matters. In Canada and "~est Germany, which harC' statutE'S a11:1]0,0:0U8 to title III. the Executin in national security cases is expmpt hy statutp from the re1uirement that jndicial ,,,arrants be obtained to nnthori;:E' snrreillanre of commnnications. In England, where indiria1 "'nlTants are not refJllired to authorize 8111Teillance of commUJlic~tjoJlS in criminal innstigations, the relerant statutes recognize an inherent a11thoritv in the Executive to authorize snch surveillance in nati()]1al secnritv' cases. In each case, this authoritv 1s dremed to cover intercepti011 of mail and t('legrams, as 'Yell as 'telephone conwrsations. In all three countries, reqnests for national secnrity surreilJance may he made by the nation~s intelligence agencies. In each, a Cahinet member is authorized to grant the requpst. In EngJand and 'Vest Germanv. howerer, interception of communications is intended to he a last resort, used only "hen the information being sought is likely to he unohtninable by any other means. It is interesting to note. howereI'. that both Canada and 'Vest Germany do re'fuire the Exerntin~ to report periodically to the legislature on its national security surveillance activities. In Canada, the Solicitor General files an annual report ,,,ith the Parliament setting forth the number of national S('rl]ritv snneilhmces initiatrd, their awrage length. it general description of the nwtbods of interception or seizure used, and an assessment of their utility. 110 It may be that "e can draw on these practices of other 1Vestern democracies. with appropriate adjustments to fit our system of separation of pmnors. The procedures and standards that should govern the use of electronic methods of obtaining foreign intelligence and of g'na rcling against foreign threats are matters of public policy and YalnE's. Thev are of critical concern to the executive branch and to the Congress, a's well as to the conrts. The fourth amendment itself is a l'cflection of public policy and values-an evolving accommodation Iwtll('Cll gmocl'1lwental needs and the necessity of protecting individual se'cmity and rights. General public undeTstanding of these problems is of paramount importance, to assure that neither the Executive, nor the Congress, nor the courts risk discounting the vital interests Oil hoth sides. The prol)lems are not simple. Evolving solutions probably will and shonl(] come-as they have in the past-from a combination of legislation. court decisions, and execntive actions. The law in this area, as Lord Devlin once de.scribed the law of search in England, "is hapha/~ ard and ill-defined." It recognizes the existence and the necessity of the Executive's pmver. But the executive and the legislative are, as Lord Dedin also said, "expected to act reasonably." The future course of the law will depend on whether we can meet that obligation. Tl1E' Cl'LUR:\LL\'". Indeed, it wilJ, Mr. Attorney General, and I want to thank you for this very learned dissertation on the fourth amendllwnt. I think that it will prompt a number of questions from the committee this afternoon. It is 12 :30 now, and I had hoped that we might adjoul'll until 2 this afternoon. Senator ~Iathias? Senator ~IATHIAs. :Mr. Chairman. I comply with the instruction of the Chair to withhold questions for the moment, but I was one of those urging the invitation of the Attorney General to the session hecauq> I anticipated a thoroullh and scholarly discussion of the subjert. I think that the Attorney General has fully met all of our expectations, and this "ill be an important document on this whole subject, both among those who will cite it for support and those who will wish to argue against it. But I think that it is obviously an important dorument and I look fonmrd to the dialog this afternoon. The CIIAnDux. I think it goes further on the subject than any other previous statement of the Government from any source. Therefore, the committee appreciates the time and effort that you have given to it and we look forward to a chance to question this afternoon. If there are no further comments, the hearing stands adjourned until:2 this afternoon. ["Whereupon, at 12 :30 p.m., the hearing adjourned, to reconvene at :2 p.m. of the same day.] AFTERNOON SESSION The CHAIR~L\N.The hearing will please come to order. ~Ir. ~\..ttorney General. in your statement this morning, yon testified: I now come to the Department of .Justice's presput position on electronic surypillance conducted without a warrant. rnlll-r the standards and procedures estahlished h.' the President, the personal approntl of the Attorney General is rerjuired [)t'fore any nouconsensual t'lpetrouic suryt'illance may be instituted Within the l:nited States without a jUdicial warmnt. 111 Do you mean by that statement that your approval is required before anyone may be bugged or wiretapped without a warrant as long as the target is within the Fnited States? Is that correct? Attorney General LEVI. 1Vell, I really cannot quite mean that, because- I guess I can. I ,,-as going to say that title III, which of course has a warrant provision, permits States to do wiretapping, but I suppose that I do mean that \vithout a judicial warrant, that is-- The CHAIR)UX. The existing practice? Attorney General LEn. The standard procedure established by the Pn'siclent. The CHAIR)L\X. Yes. Since it is a procedure established by the President, it could be changed at any time by the President. Attornev General LEVI. I assume so. The ClI~IR::IIAN."What about electronic surveillance of messages that have one terminal outside the United States? Is your permission required before an uuwarranted iuterc.eption of such messages may take place? Attorney General LEVI. vVell, my belief is, if it is a surveillance which there is a base in the United States and a conul1lmication from the United States, which is what we would ordinarily think of as being covered, I think the Attorney GelleraFs appro~'al would be required. The CUAIW\L\X. 1Vhat about the messages that NSA snatches out of the ~lir? They do not require J'our approval, do they ~ Attorney General LEVI. You are now asking me about the NSA procedures. The CHAIR3L\N. I'm only asking you whether they reqUlre your approval. Attornry General LEVI. I have only started to answer. The CHAIW\IA~. I see. Attorney General Ln~. The first part of the answer is, I want to make this clear that I do not really know what the NSA procedures are. And I think that is an important point. I do not think that a briefing in which an Attorney General or some other kind of a lawyer is given a certain amount of information which adheres, means that the result of that is that the Attorney General knows what the procedures are. And at this time I would have to sav that I do not know what the procedures are. I do not know what the possibilities are. I do not know t'Ilonp:h about the minimization possibilities. The position on that is, \\8 have asked that we be fully informed, that we be fuJIy informed as to the lee,vays, the possible proceduresl the possible minimization procedures, and the President has directed the KSA to provide that information to the Department of Justice, to the Attorney General, so that we can make some kind of a determination on it. The CHAIR)L\K. Until you have that information, you really do not have the foggiest idea of ,,-hether what they are cloing is 'legal or illegal, constitutional or unconstitutional? Attorney General LEVI. I would be glad to accept the protective shape of that proposed answer. I suppose I ha~-e a foggy idea. The CIL\IR:\IAN. You do not-- Attorney Genend LEVI. I do not think I should be in a position of making a detrrmination about it until, for various reasons possibly, hut not until I really knO\y \yhat it is and I have tolel you many times that I do not know what it is. 1Ve have requested that we be given a 112 full account, which is probably not too easy to give. ,Ve haY{~ reqlH'stE'cl that, procedures be outlined. More important. that the possible protectlve procedures be outlined a.nd the President has specifically directed them to give them to us. . The CHAIRMAX. These practices have been going on for a long time. Hundreds of thousands of American citizens have had their messages intercepted by the Government. analyzed, disseminated to variolls agcncies of thc (;0VPl'JlnH'nt. Do yon not think that it is awfullv latl' f;)r the Attorney Genera1to Ill' ilHluiring about the pl'Ocednl'es in"onlp1' to dE'tennine their constitutionality! I commend you for doing it: this question is not meant to be critical of you. but looking back onr the years that these practices haH gOll(' on. is it not [t very late date that 'Yl' should now lw scrionsly inquiring into their constitutionality at the .Justice DepartmE'nt? Attorney General L}~vI. One first has to rE'member that the law has ('hanged, that some of those practices-I do not know which ones about the KSA you are referring to--lwgan a long time ago, so as a matter of fact. I cannot say that other ,,\ttorneysGeneral might not han. years ago, inquired into it. So I do not know how to answer that. except to say that I have not becn around that long as Attorney Genera1. If you go hack to l!lH. 1\)4!). yon really had a different shape to it all, and one would have to look at it in those terms. 'I'll(> CHAIR").IAN. If I understood vour testimony this morning correctly. you said that thl' Pl'esiclrrlt hl'S thc p(),wr to wirptap lln ~\mrrir:m citizen without a wanant if he is an agPllt or a collaborator of a fon'ign po\\'rl'. This ,,'ould lw one of thosl' casrs where yon. as the a,2'Pllt of th(> Prcsident. ,,'ouh1 approYe of a wiretap without a judicial \Y~ll'1'allt.That is correct. is it not? ~\ttorneY General LEVI. It is r01'1'l'ct. although I neYer-I hope. I do not thiilk that I said that that ,,'as all that we would look for. Tlw Cn,\1n:lL\x. Oh. no. I was jnst taking one l'xample. You laid 01\t the criteria. I think there were two or three things you would look fol'. But one ~was an agent or collaborator of a foreign power. I do not think that any of ns ,,'ould qnarrel \yith a wiretap on a foreign agent as faning ,,'ithin thr counterintplligence operations of the Government, and ha\'ing to do with both foreign intl'lligence and national security. 1Vhat I am interested in is hmv yon would vie,,: a foreign agent or collabon1tor. For example. what is a collaborator? Suppose you have young people who were proh'sting the ~war, for example, as so man:" did. and some of them met with certain foreign government officials. ,Yould they then be rcganll'd as collaborators? How cloes this term apply! Attol'llry Gcnrral LEn. I think-I will ans\ver directly-I do not mwt one to think that I am Hading the question. but then I want to go on to say somrthing more. I would not think that that ,,'ould makr a person a collaborator. You have not given all the facts. Yon could turn it around and say. one cannot say that one is a collahorator because one is. at the same time. takin,g part in nnpopular political canses. One has to look Yer~' carefnllv at ,,-hat the kind of c\"id0nce is. and that really points to the procedll'rc, which it sel'ms to me in any constr-ndive solution of this 113 kind of problem. {)]l(' has to look to sre what procedures arc followed rlEd what kind of e\'idence has to be weig·hed. I am sure that thpre is rrally no abs;)lutely automatic way of doing that. One of the strong argmnpnts that is so frequently made for warrantless sIl1Tl'illancl' is that it is necessary to use it in order to drtrrmine \yhether SOl1wone is an agent 01' a conscious agent. That, of course. is celtainlv \yhat \Ye ha,-e trird to do is make sure that the evicl('!\('r is bettl'r tha'n that. The CIL\lR~L\X. Of coursr. the difficnlty is that judgment in a case of this kind. and I "'ould suppose necessarily so, is made by interested parties. so to speak. Tlw ~\ttol11ey General is a member of the executive 1n':mch as an agent of thr Prrsident. l'nlike t1lP ordinary law enforcewent Cfise. there is neypr a necessity to present the reasons that gi ,'e probahle cause to IlPlie"e that a crime has been performed to some independent tribunal. Therefore, the procedures and the criteria become very important. .Tnst to press this. because I can think of other examples, I remember t1](' case of .Toseph Krait. a distinguished columnist. meeting with ('('Ita ill foreign agents of a certain foreign government in Paris during t11(' Vietnam ,,·ar. In your vip\y. he was presnmably looking for news. looking for their vie"IYpoints. ,You](l that. in any sense, in your view, Ilia ke him a collaborator and justify a wiretap? ~\ttol'llry General LEY!. Certfiinly ilOt. I hope I have not said anyth ill~ that snggests that. The' CHAIlDL\X.l do !lot IJe1ien you have. I am just trying to clarify t11(' l:onncJal'ips L~' Illy qllPstions. ~\ttomr.v General LEn. Let Illr make the point. since we are talking about the foreign legislation remedies you take. If one had a statute, ow' of the things that I suppose that a judge might hn H' to make some kiwI of finding on is "'hrth('r there is evidence suftieient to establish the' eOllscious collaboration of agents. Thpl'p is a problem there. because one would know that through th~ most s('('ret sources. and disclosure might expose someone to assassination. It is the killd of thing which I suppose It judge could make a finding' on. As far as the Attorney General's position is concerned, I think that the Attorney General probably feels that his position is one of protecting- the laws of the rnited States, protecting the President. Hp is probably Illore vigilant on that account. I assure you that it is much easier for me to sign the title III than it is to handle these ease". Thr CIIAlR~IAX. You have been, I think it is fair to say, a vigilant .\ttoI'Ilev Genera1. bnt that has not always been the case. We have hal] s~lI1'e Attorneys General who have paid very little heed to the law, and (lId pretty much as the President wanted them to do. So, unless \,(' ha\'e som(' statntory guidelines. I think that it is very dangerous just to leave it to the Attorney General to decide. knowing that the office changes, and Presidents change. Do yon think thaf, there is an~' way that we could write into law certain statutory guidelines which would determine when warrantless snrvei1lance would be permissible. what test must be met ~ "\ttol11ey General LEVI. I would hope so. Other countries have been nble to do it. and I would hope that this one conld. althongh I am not nbsolutely confident. as I say. it "'onld have to be the reason I 114 pointed ant this morning. This is an area where people proceed frequently by statutes through indirection, in part, because of the nature of the problem. But I, myself, would hope that it would be possible to have a statute. The CHAIRJlTAX. If this committee should decide that among its recommendations we should include a recommended statute that would govern warrantless' surveillance in the general field of foreign intel· ligence and national security, would you be prepared, as Attorney General, to assist the cOlmnittee in desig11ing such a statute? Attorney General LEVI. Of course. The more interesting question is whether the committee, since it has more power, would be willing to assist me. The CHAIRMAN. The power of the committee in this case is merely that of recommending. The actual action upon any recommendations would ha,e to go to the appropriate legislative committees of the Senate. But in any case, I should think that our collaboration may be fruitful, and I w~lcome it. . The other aspect of this case-there are many aspects of the case t llat are troubling me. Because other Senators are here now, I do not want to monopolize the time, but I would like to ask you just a question or two on another term that is constantly coming into use, the term "foreign intelligence." Here ''Ie have an agency, the NSA, which has no statutory base, by creation of an Executive order. Its scope of authority rests on certain executive directives that give it a general mission of obtaining foreign intelligence. Now, as I suggestE'd earlier, foreign intelligE'nce has newr heen defined by statute, and I snppose that we could all agree that rf'rtain kinds of information wonld clearly be foreign intelligence. But we look at the NSA and we find that they are collecting all kinds of data on economic intelligence: that now falls in what we now call foreign intelligence, having to do with transfer of funds, business investments, the movement of capital. Suppose that an American company was making a decision with respect to an investment in some foreign land, was interested in keeping that decision secret for business rensons, competitive reasons. Is that a case that would fall within the net of foreign intelli~ence. thus entitling the government to obtain that kind of information' with~ out a warrant, because it is generically a part of what we have come to can foreign intelligence? How do ,,'e grapple with this? Attorney General LEY!. I think the way you have to grapple with it, Mr. Chairman, is not just to belabor the point of what the definition of foreign intelligence means, because, as you pointed out, it ran inelude an enormous variety. It can indurle, for example, all kinds of economic information. And I am quite sure that professional intelligence people would think that a very wide net might be appropriate because small items of information all bv themselves may not mean anything, as I said in m:- statrment, but n'dded to somethili'g elsf', the,Y mean something. So vou mi~'ht han- a verI' broad definition of fOJ'eian intelligence within that a ~;erv broad notion of important econo;ic information, but certainly the'inquiry does not stop there. One has to sa:v, ,yell, how did they get it? What is the target of the surveillance'? !s .it heing oh~ained through the targeting of an official foreign unit. or IS It targeted III such a ,,'ay as to pick up American firms or Americans who are discussing these proLll'llls? 115 As I tried to say this morning, it seems to me that the fourth amrndment coveracre wfll depend to a considerable extent on the limitations one can imp;se. It is one thing, I think-although this is a very difficult field-for an American company to be discussing something ,vith a foreign official establishment, and quite another thing when it is discussing it with some kind of a foreign concern. So that it is one thing where the information is picked up because the targeting is on the foreiO'n governmental unit, or whatever it is, official unit, whatev"r it is, and quite another thing where the targeting, in fact, is on the American firm. A great deal will depend on how one-maybe one can mechanically, to a considerable extent, minimize that. 'Vhen one gets to that point, one has to find out how one can go any further. The CHAIRJ\fAN. This committee knows that the NSA is one gigantic set of earphones and all kinds of requests are coming in as to what to listen to in the world, and the agencies themselves determine-I do not suppose that the President enters into it, clearly the Attorney General does not enter into it, no department of the government that is supposed to look out for the laws and the Constitution enters into it. We know some of the things they have done; some are laudible in terms of the ultimate objective, for example, drug traffic. That is a good thing to learn about. 'Ve are trying to enforce laws in this country, and information that you can get by listening in on telephone conversations-- Attorney General LEVI. Of American citizens abroad? The CHAIRlHAN. American citizens at one end of the terminal. and possibly an American citizen on the other, or a foreign citizen on the other; they listen to all the telephone conversations and extract ones relating to drugs. That is a laudable purpose, but is that foreign intelligence ? ~ Attorney General LEVI. It may be foreign. The CI-IAIR.:\fAN. Or is that law enforcement? Attorney General LEVI. It may be foreign intelligence, but as you stated quite broadly, and you stated quite broadly a number of possible sit,uations. Some of them I would regard as unconstitutional. At that pOlllt the word-I cannot imagine the word intelligence is to be defined in such a way as to permit unconstitutional behavior. The CHAIRJ\fAN. Right. That is terribly important to say bec:.mse very seldom can you get anybody, when you get into this field of national security, to say that it is subject to the Constitution. It is much more frequent for them to say in this area the Constitution is an archaic docl~ment of the 18th century, and we have to be practic:1l about these thmgs. I am not saying you suggested that, but I am happy for you to say that even in questions relating to foreign intelligence and national security, the Constitution and its guarantees remain applicable. Attorney General LEVI. Mr. Chairman, there are arguments-I mnst say that I tried in the paper I gave this mornincr-in fact, Senator )fathias. hurt my feelings by complimf'nting me. I was really trying to be qUIte neutral. I was really not making an argument on one side or the other. One argument that I did not include which is sometimes made is that if .matters J}re picked Hp out of the air~ so to speak, as waves of some kmd go across the ocean, that there is no reason for people to assume that the conversations are private and therefore the 116 fourth amendment does not apply. I do not make that argument because I do not like it, I guess, and because I think it goes too far. I guess I say that only to say again that this is a very difficult field, and the procedures which are devised and the protections that are devised are terribly complicated. ::'enator .l\hTHIAS. If the chairman would yield, I do not think the Attorney General's feelings should be hurt by what I said because I believe I did indicate that there were those that might take this document and raise it as their banner and march off in one direction. There '''ould be others who would take this document and raise it as their banner and march in the other. _\.Homey ~neral LEY!. I hoped that is what you were going to say, and I am delighted that you said it. The CHAIRMAN. There is another example that the committee spent a 'H>ek looking into, which was:20 years of opening the mail, conducted by the CIA in this case, and it developed in the course of the inquiry that some of this mail was opened because it was clearly foreign government mail,1 Other mail mls opened because various agencies had furnished the CIA ,vith names of American citizens that they wanted '''ntched. If a letter were coming to that citizen or were being sent by that citizen to a foreign address, that mail ,vas opened. Other evidence show('d that letters were also op('n('d just at random, random selection to l'rad and photograph and then to distribute to various agencies. (}n']' the years, a quarter of a million lett21's ';-£'1'e opened and photograpIH'd in this way. Do you think that that practice, which Tthink is a fair statement of the range of ('yidence that we received. conforms "dth the protections that are supposed to be conferred by the fourth amendment? _\.ttorney General LEn. In one statement you mentioned, as I am s1lI'e ~'on recognize, many different examples. You might ha \"I' 11 Iptter which for some rpason or another yon get a warrant to open. and of course. that can be done. You might haye Iptters written by or addressed to partieular persons "'ho might or might not be American citizens ,,1lf'J'C' you would have good reason to think that they were conscious collaborators. in a meaningful sense, of a foreign government. Then yon would have the prohlem of where does the authorization to proceed under Presidential power. if that is what we are discussing. come fro111. And I think that one would have to look for the authorization. Sow. you are in an area ",here there is a criminal investigation by the Department, and I really should not say very much. I do want to say that if one goes back early enou/lh in the forties Director Hoover hn(l a particHlar position. I think. if I remember correctly, as censor of the mails. appointed by the President for that purpose. So that it dops l)('come a matter of sonw question as to authorization. TJw ('HAIR~L\N. lVe have looked into the law and we cannot find any ullthOl lzation for oppning thp mails. ",Ve find 1:1',8 and court decisions ng'ainst it. CertainlY random opening of the mail could not possibly 1)(' reconciled with tIle fourth amendment. .\ttorney General LEVI. I did not sav that. The CHAIR)rA~. Could it? . 1 See Senate select committee hearings, vol. 4, Mail Openinl<. lli Attol'1ley General LEYI. I shonld not think the random opening conld. Certainly in circumstances, I cannot imagine what circumstances to imagine, I suppose random mail from a particular source would no longer be random. so I do not know how to comment on that. But I would like to go back to the authorization point becHlhP I think that ,dmt you haye said suggests that there cannot be Pn·~idential anthorization for it. I haye to say that I am not at all sure but I think that there could be n Presidential nuthorization under nI'Y limited circumstances. Then the question would be, would it han' to be in writing. I do not know whether it has to be in writing or not. How does onf' know whf'ther the authorization "'as ginn, is it belieYH bIe, and so on and so on. The CHAIRMAN. None of these procedures seem to exist in this area. It is part of the work of this committee to try to get them denloped and established. Attomey General LEYI. That is right. I hope the activities to which yon are referring do not exist either. The CHAIRMAN. At the moment, the particular mail opening operation has come to a halt, and since this investigation started, some of the NSA activities have come to a halt, but 've would like to see some laws that would keep it that way. ~enator Huddleston. Senator HrDDLEsTON. Thank you, )11'. Chairman. Attorney General Levi. I appreciate the detail and scholarly dissertation that yon have giYen to this committee on this genern] suhject. I did not hear all of it, but I did have an opportunity to read it. I am olle of the few members of this committee that is not an attol'llf'\', which I am sure is apparent when I pose questions relating to legal problems. I am wondering, thongh, after reading your statement whether or not I might be qualified at least to apply for a license to practicf' law. Attorney General LEVI. Yon mean the statement is so inferior that anybody else could do it, too. Senator HUDDLESTON. If I leal'1led all the knowledge there, I might have something to go along with my honorary doctorate degree of ]:l'\', Mr. Attorney General, there have been seyeral court cases. one going back as far as 1928 in O"~terul Y. United States in which the majority held that wire tapping did not constitute a trespass over constitutional rights.•Tustin' Bramkis in a disspnt that said, "tIl(' progress of science in furnishing Government with the means of espionage is not likf'ly to stop wiretapping. 'Yays lllay some day be deyeloperl 1l\' which the Government. without removal of papers from secret drawers, can reproduce them in court. and by which it will be enabled to expose to the jury the most intimate occurrences of a home." In a later case, 1963, Lopez v. United States. the eflect of technology on the fourth amendment guarantees was again alluded to by the Court throngh .Tnstje(' Hl'f'J1nan. He snid that "this COl1l't hns hy flnd Inr!!f' stf'fldfasth held the fourth amendment against the physical intrusiOll of a person's home and property by law enforcement officers, but our course of decisions, it now seems, have been outflanked by the technological advances of the recent past." I am just wondering whether you think that thf' Court's prf'sent posture with regard to the fourth amendnwnt has been outflanked by the technology that is now amilable. 118 Attorney General LEVI. No; I do not. I think, in fact, what the Court is doing is a little bit like what the Congress is doing, or has done, That is to say, that it knows that technological advances are occurring. It knows that many of these devices can be extremely important for good in the sense that they are essential to the security of the country, or for evil if they are misused. And it is difficult then for the Court, and I think for the Congress, to try to solve the whole problem at once. I do not believe that the legal system, even though lawyers like sometimes to think it does, I do not think the legal system would say all of the~p efforts must be banned, period. I think that that is just much too simple. Therefore it is a complicated problem that has to be appl'u: lched. I rnyself think it has been approached too piecemeal. I have constantly said that one can put the pieces together. Sc'lUttor HUi:lDLESTOX. Are you saying that rather than attempt to legislate the kind of restrictions that would cover all of these possible situations, that we are going to have to rely on court interpretations of ('ach case as ive go along? .Attorney General LEVI. You will have court interpretations. And there will hai'e to be procedures, because one cannot really be sure of what new dei'elopments will occur. One can build in reporting procedures, one can build in a variety of kinds of procedures to try to handle that. Senator HCDDLESTOX. In your statement you list four pnrposes of electronic surveillance. The first three come from language of Congress in the Ul68 aet, so-called conceptions of national security. The fourth one is new, which says "to obtain information certified as necessary for r.1lC conduct of foreign affairs matters important to the national security of the United States." \Vho certifies this? Attorney General LEVI. As it says, it would have to be an appropriate Presidential appointee. Senator HCDDLESTO"'. It may be somebody he may designat€, Secreta ry of State. Director of Central Intelligence. Attorney General LEVI. It wonld have to be a Presidential appointee. Senator HLDDLESTOX. In effect, on behalf of the President of the rnjted States. .Attorney General LEn. I am not sure it would jnst be that. I think that also speaks to the level of the responsibility that that President has and the appropriateness for him to give that kind of It certificate. Senator H LDDLESTO",. How does that reason differ from the second purpose that you han listed, which ivas to obtain foreign intelligence deemed essential to thr securitv of the Nation? Attorney General LEVI. It "is an excellent question coming from a nonlawyer, and I interpret the two of them as the same. That has not always been a welcome interpretation. Senator HUDDLESTO"" It seems to me that the latter one would be a litt 10 broader. ~\ttorney General LEVI. I do not interpret it as broader. I interpret it as an attempt to say what foreign intelligence deemed essential to the secnrity of the Nation might mean when it comes to the conduct of forrign affairs, bnt my flat answer is that the way I have interpreted that is to reC(uil'e that it be deemed essential. Senator HLDDLESTON. In order for it to be important it has to be essential. 119 Attorney General LEVI. This is an area where, if you are going to have legislation or procedures, you will find that words of that kind are always used. That is true in the Canadian legislation. It is just genemIly true. Se~lator HlnmLEsTox. Another area that is almost foreign to me, as I understand the fourth amendment, it sets out very specifically that \Y;\rrants should be obtained for instrusion, for search and seizure. It :::ays, at least to me, that these warrants must be very specific, first of all, in the place ,vhich is going to be searched; second, in things that are to be seized. How can that be applied to a situation where, while the general purpose may be acceptable-that of security, that of maybe discovering a violation of law-the system is such that it is bound to bring in a lot of extraneous information. It is almost as though you had a warrant to search an apartment for drugs and you also walked out with the dining room table, because a lot of information that is picked up in conversations necessarily does not have anything at all to do with the original purpose. Attorney Geneml LEVI. If it ,,'ere a notorious dining room table stolen from the lVbite House and the person who went in for drugs could not help but notice it was there, I suppose it might be within tlw authority to take it. Senator HUDDLESTON. I understand if it is a clear observation that there is something illegal about the dining room table, I would take it, too. maybe. In the case of picking up conversations, this is not the case. That is the first part of my question: How in the world can you prescribe the activity to the extent that you would eliminate in the first place getting this information which is a violation of privacy; more importantly, though, is the use of it? In some of our inquiry there have been at least indications that some agencies have used information for the purpo:::e of either embarrassing or discrediting individuals, although the specific information that they used, gathered from wiretaps, had no relationship at a11 to a crime or to the purpose that the ,"iretap was placed there. How elo ynu keep that information from being used in such a 'vay as to be detrimental to the citizen and when it is not related to the original purpo~e of the surveillance? .Attorney General LEVI. Senator, I really do not know how to answer that one. lYhat you can do is to try to legislatively ban all operations. That, of course, would be an expression of the opinion of the Crmgress. It would raise a question whether it was Presidrntial power to continue it any,,-ay, that you could attempt to han it. I suppose the Prrsiclent could ban it. Somehow or another that does not seem to me to be a constructive ,,'a~' to approach that kind of a problem because the fourth amendment was not originally conceived of as applying to these kinds of nwrhnnisms anyway. The fourth amendment has shown, by so many othpr provisions in the Constitution~ which is one reason why the Constitution works, that it can both C3Xry important values and have a f!0xihility and yet have a real meaning- of protection. The problem that yon are asking me is. of course, the central problem referring to things likr. again, the NSA. operation which I think you are desClihing-, bnt I all1110t sure. 120 Senator HUDDI-ESTOX. That is true, except you have two parts of it because the NSA is just a collector, and it supplies the information to its so-called customers. Thl'\' do not know what the customers do with it. The customers might use it in a \vay entirely different from what had been anticipated. .c\.ttorney General LEVI. It is possible to devise procedurrs \v!licIt undollbteclly arr not pel'fr.ct. designed to minimize it. \Vhat one ha:' to do is see how far one can go in that. and then take a look at it and see whether the achievement is sufficient. That is one of the reasons that the President asked that these procedures be shown to us. That is the reason that \YC asked for tllt' description, to see \vhat procedures \vould be possible. I think the procedures can \,ork at both ends, procedures as to what is picked up; you have to han procedures as to what use is made of it and where it goes. Senator HUDDLESTOX. Another elementary statement: Today under the present interpretation of laws if an individual found out that he had been maligned, damaged. or slandpl'ed by use of information that had been gathered in what started out as a legitimate surveillance. what recourse would he have? Could hp sue anybody~ Attol'Iley Gem'ral LEVI. Again. I really do not know how to answrr that question. You are asking nw what is the relationship between sUlTeillancc which may have been proper, or may have been improper and the law of slander-it may be libel in the kind of case yOIl drscribe. I just have to say I do not knmv the answer to that question. If I did ~now it. I would havp to rrmind myself that the Department of .rustice is defending a great many dpfendants in prrsPl1t cases wherr thrre aT{' all kinds of lawsuits filed a.round the countrv. I do not think I should bp making proelamations. ' Senator HlJDDLESTOX.•\1so in your statenlPnt. YOU say there' ~H(, appropriate lwd adpqllUte standa~>ds for a person' being' wiretapper] or bllgged. 'I'll(' qlH~stion is, these a,re ~>onr standarr]s. ('an they hind any SlH'C'('ssor of YOllrs. or are they standards that are just con~titutionally requirrd by the fourth amendment? Attorney General LEVI. ·Well. it is mv view-two answers to that. In the first place, the only authority that:I have in this area comes from thp Prpsident. so that a good deal of what is decided is the authorizlltion which is limited in that way bv the President. I cannot authorize' an~-thing that goes beyond that. My interpretation of it is based on what I regard as the constitutional reqllirements which I think in this area rpsp0Jl(l to and do reflect to a considerable degree public polic~· and concerns about individual rights. so that I think the only power t Itr Attorney General has in this area is. first the authorization aIH] its restrictions. and second. his interpretation of what the Constitution allows. Senatol' HroDLEsTOX. \'~hat wOllld lJrPvpnt a future Prrsident or Attorney General from rpdefining a foreign agent or collaborator to inclnde a political leadrl' who might collaborate in a sense with n £01'rign goyernment by loh];yinr>' his col1ea:2'uPs for support for that C'01]11try. nnd mepts with its officials? 'Attorney General LEVI. I think the Constitution would prevent that. I am not smp that that is what your question is asking. I do not know hoy; to anS\YPr a fluestion which says there is a great deal of varipty in political leaders and there is a ,!.'.wat deal of history. Of comse there is. 1~1 I suppose that is why we ha,~e the form of government that we do haye. Senator HroDLEsTOX. It just occurred to me that a political enemy of a President or Attorney General that may have had some foreign contact could be brought under this as a potential collaborator, and therefore be subject to surveillance. ."-ttornev General Ll;n. I included in the statement that one of the procedures that has to be worked toward is to make sure that there is no partisan political purpose. I am sure, speaking from what I lmow, there is none. I cannot obviouslv talk about these other areas. The CHAIR)IAX. Senator Sch"weiker. Senator SCHWEIKER. Thank you, ~Ir. Chairman. ~1r. Attorney General, one of the concerns of this committee as related to the warrant requirements is that the more deeply we got into the various intelligence agencies, CIA, KSA, and FBI, there seems to be ,1 failure in the system to go before any kind of neutral magistrate to make a determination about such requirements. And the result is, 0:£ course, because that fail-safe system is not in operation, that we have illrgal activities such as mail opening, listening, and black bag jobs. hI like to ask you, as Attorney General, what is currently being done in the Justice Department to give you some kind of a better check, better control, better feel of the situation in terms of ferreting out possihle illegal procedures and making certain that they are followed up as to what happens in the future 'I Attorney General LEn. As far as the Federal Bureau of Investigation is concerned, there are memoranda from me and from the Director which have asked that all activities which might raise any question of impropriety be called to my attention. Insofar as you are talking about what goes on in other agencies, what I think you are referring to are violations of law. vVe have criminal prosecutions and we ha,~e investigations in process now. Senator SCHWEIKER. The problem here in the case of both mail opening and KSA intereeptions-I believe the testimony shmvs that the .\ttorney General did not know about the mail openings until 1973 and the KSA interceptions until 197;'5. So we have seen a breakdown in the system in terms of your people being aware that these things ,wre going on for 20 or 30 years. Attorney General LEVI. vVell-- Senator SCIIWEIKER. I'll say your people. I am talking about the system. o Attorney General LEYI. It seems to me that the kind of items that )'ou are describing usually require presidential authorization of some kil 1d or anot!lPr and I ,,~oul(l hope in the future that any such presi( lential authorization or intended authorization would be passed upon h~ the Attorney General. . Senator SCIiwEIKER. The problem was that it did not have presi( l('ntial authorization. In the case of mail opening I do not believe we h:l<l any testimony specifically linking it to a President. This ,vas one of the troubles. The sYstem seemed to break down because it does not ,go up the elwin of cOlimland at present. Apparently, in most cases not to the Attorney General either. It seems to me it places a larger burden OJl the Attorney G'enrral and the .Tustice Department to luwe a ,yay of checking' this, finding it out, ferreting it onto That is the point I'm trying to raise. 122 Attorney General LEVI. As I say, I do not understand unless there is Presidential authorization on the mail openings, ror example, 01' the kind or case where you can get a warrant. I am not sure how that differs rrom any other kind or violation ir in ract they occur. There is always the problem about authorization. I would not be so sure abont who, arter a great many years have passed, has the burden. I really should not discuss that, the question or authorization. If you are saying do I know some automatic way, no; I do not. 'Senator SCHwEmER. Let me put the question another way thell. How would you reel about an Inspector General's office under your direction that would have this responsibility? Attorney General LEVI. That would roam around the Government? Senator SCHW"EIKER. To the areas that you would normally haw jurisdiction ror prosecution ir there were illegal procedures. It Sf>ems to me that something is missing in our government procedures. That inrormation has not gotten to the Justice Department so that action could be taken. The CIA has an Inspector General. The question is whether the Attorney General shou~d have ror his procedures an Inspector General procedure or some kmd. Attorney General LEVI. The argument that is being made is that the Inspector General worked so well with the CIA, that the Department of Justice should also have a similar, perhaps a more general Inspector General? I really think what is involved is, first, the morality, which is perhaps not the right word, or the administration of the country. I say it is not the right word because I am very conscious that many or these things were begun at different times with different spirit and reeling or importance and what not. But, second, the enrorcement or the criminal law. And I think that has to be pursued vigorously. I am not sure that an Inspector General would make any difference in terms or the investigation because the investigation would be conducted for us, as you described it now ror the other agencies, by the FBI. Senator SCHWEIKER. Let me rocus maybe even more specifically on my question. Part I, section 9 or the FBI manual, ror example, which is entitled "Disciplinary )Iatters." has this section in it. I would Ii ke to read it. This is a matter of the policing or possible areas or possible illegality. It's entitled "Disciplinary Matters." It reads. and I quote: Any investigation necessary to de,elop complete essential facts regarding any allegation against Bureau employees mnst be instituted promptly, and every logical lead which 'will establish the true facts should be completely run out nnless such action would embarrass the Bureau or might prejudice pendillg investigations or prosecutions in which event the Bureau will weight the facts, along with the recommendation of the division head. I think the attitnclinal prahlI'm. the intrinsic institutional prohlclll, here is a built-in pl'OcCflnre. that ir it's embarrassing to the Bureau, that investigation is aLorted. I'm talking here to the FBI. Frankly. I can ma1w jll;;:;t ns strong n case ror CIA as someone else. I do not want tD single out the FBI. It seems to me as Jong as VOll have that attitude within the Government by enfOl'C'f'rS llmfpeol)lc \yho look at others for laws, we really haY(' some problems, If it is embarrassing, do not pursne it, do not follo\'; it up, do not inYestigate~ abort. "Tlwt is your response to that 123 attitude, that situation? Do you agree with that statement? Should that be a part of the FBI manual? Attorney General LEVI. Senator, I assume you know I do not agree with the statemC'nt. First, I do not know ",hen this delightful statement was written. Statements of this kind have been in the Go,'el11ment long enough, I know get written, and there they are. They do remind me when I ,vas in the Antitrust Division, of similar statements written by employees of companies, and obviously, it is a foolish and wrong statement. I am sure that it does not retiect the present policy or attituue of the Bnreau. On the ,,-hole, I think it is a rather good thing that you haY(' this document and that I have it and that one can usc it to make the point which I suppose has to be repeatedly made. But I can assure you that as far as I know, that docs not represent the present position of the Bureau in anv wav. I have not seen this before. That should not surprise you. Tllere are a number of these things I have not seen. I am glad to see it. I suppose that this is one of those actions that "Woulel embarrass the Bureau and so they will have to deal with it. It is a little unfortunate, I think, because I am sure the present lca(1ercohip of the Bureau is not reflected in the slight€st in this statement. Of course I am opposed to this statement. Senator SCHWErKER. To be fair, ~[r. Attorney GeneraL "e did alert you this morning that I vms going to make tli.is point so you would have a response. Attorney General LEn. To be fair, that is really not the case. 'To be fair, I was alerted when I sat clm,n here after lunch and I had no opportunity to check it whatsoever. I did not muke any point of it. because it "would not have made any difference. Senator SCHWEIKER. IVe did"eall the Bureau this morning, Mr. Attorney General. rhey came back with a statement to me. I assume they came back to you around lunch time. :My only point is we first talked about this esoterically, theoretically. You say you do not really see a need for an Inspector General's office. You do not see a neecl to police it. I'm getting very specific. I think intrinsically and institutionally that there is a heck of a problem and we have it here and this is just part of it. I am not pinning it on the FBI or CIA. Attorney General LEVI. The Bureau does have a very active inspection system. The Department of .Justice when there is an allegation of "Tongdoing-we establish a separate group to look into it. So really it becomes a question-I am not arguing about the means. Eienator SCHwErKER. I asked you that just 5 minutes ago. Attorney General LEVI. Then I do not understand the question. I thonght the question was, should we have an Inspector General in the Department of .Tllstiee for the entire Government. I thouO'ht that } • C ,..as w lflt your questJOn was. Senator SCHWEIKEH. Both. Attorney General Lv-vI. As to the letter. it seems to me that the Department of .Justice's function, when it is not referred to as a matter of law, would be a violation of the criminal law, and we have to be vig'ilant in the enforcement of criminal law. Senator SCHWEIKER. 'What we are dealing with is an intrinsic. inher(' ut institntional problem. In one of the other hearings we had on black bag jobs, a memo again said that in essence black bag jobs are 124 justified. The special agent in charge must completely justify the need TO]' tlw nse of the technique-black bag job--and at the same time asSl1rr that it can be used safely without any danger or embarrassment to tlw Bureau. The point that T am making is that the criteria seem to be not what the facts are, not ,,,hat the legalities are, not what the integrity of the system is. not what the enforcers ought to be doing, but is it embarrassing? .\s :roulook through here, this is really the whole thrust, and to pnsh it 011 and say: "Gee ,,,hiz. we do not need an Inspector General, we do not need this. we do not need thaL" is to ignore the whole mountain of eyidence the other way. I think it is the job of this committee to point this ont. I think it is the job of all of us to see if we cannot find a better ,,,ay of giying assistance. I do not want to say the FBI-I want to make it very clear you can make just as strong a case against any intelligence agency you ,"oul(l look at. It just so happens that ,,,e have something in terms of specifics. To say that there is no problem, to say that we do not need a system. to Sa" that we do not seek some kind of inspector. is to say \H:do not haY(,'to take a look at it. Thonestly do not think it's realistic. That is all I have. ~fr. Chairman. . cHtomey General LEVI. I ,,,ish to say that the Attorney General did J] ot s:' y thosr thimfs. ~rnator SCHWEIKER. I would like to insert into the record a statement provided to me by the FBI which is the Bureau's explanation of tlw provision in the present manual that I have been referring to. [The material referred to follows:] ThE' FBI's }fanual of Rules and Regulations; Part I, Section 9: Disciplinary MattE'rs; Item C: Investigation; states as follows: "Any inwstigation necessary to develop complE'te essential facts regarding any allE'l:ntion al'?:ninst BurE'au employees must be instituted promptly, and every log-ical lead which will establish the true facts should be completely run out unless wcll action would E'mbarrass the Bureau or might prejudice pending investigations or prosecutions in which event the Bureau will weigh the facts, along with tlw rE'cor.mwndation of the division head," TIlE' statE'ment, "unless such action would E'mbarrass the Bureau," means that in sueh eventuality, FBI Headquarters desires to be advisE'd of the matter before inYt'sti,gation is instituted so that Headquarters would be on notice and could clil'pct the inquiry if necessary, The statement. "unless su('h action ... might prejudice pending invE'stigations or prosecution;" in which event the Bureau will WE'igh the facts" mE'ans that in ,Suell cases, FBI Headquarters would desire to carefully evaluate the propriety of initiating or defE'l'l'ing invE'stigation of a disciplinary matter where such im'estig- ation might prejudice pending invE'stigations or prosecutions. Xothing in this ",fanual provision is intended to dpviate from tbp FBI's e!'<tahli!'< hed policy of conducting logical and npcpssary investigation to resolve possible misconduct on the part of its employees! Senator HART of Colorado. ~rr. Attornev General, just an observation of your statement: ~rll('h of the' case law ~'on presented, and the po1i(':" discussions anI' the years rf'late to unauthorized use of inforI11ntion by Gonrnment employees, FBI age.nts, or whatever, carrying out snrwi11ance, ,viretapping. and so on. One of the reasons that this committee sits and von aTe here today is the chanlIcd circnmstanC('s. tlw situation ,vhere'the highest officials of onr Government use the instrmnentnlities and the information the~' gain for ,,,lwt('''Cr pm'pose. 1 See ~.\cppendix, page 164, 125 largely for political purposes, often for an i~leg!timate pu~·pose. "'\V~at we 'vant to do is address that problem, wInch IS at least In my ml!1d utmost, rather than the problem of the random FBI agent, Justlce lawyer, U.S. attorney, or assistant U.S. attorney somewhere, who may strike out with a little bit of information he picked up. "'\Ye are concerned about the frontiers here and consequently I think your thoughts on the question of warranted versus warrantless search and seizure, are extremely important to us. I noticed at the beginning of your statement in this connection, you talk about your present policies of authorizing.electronic su~vei11anee, and interestingly enough, of the four. categorIes you mentlOn~d, two start off with the purpose of protectmg, and two start off With the purpose of obtaining. I personally have very little problem with the two, starting off with protect. I have more problem with the two that talk about obtaining-"to obtain foreign intelligence deemed essential to the security of the Xation." That, as I am sure you would admit, is a very, very wide category. Although your statement i.s liI?ited to electronic surveillance, it could be broadened to the breakmg mto embassies and a lot of other things. Do you feel competent to determine, even with the structure established under you, what is essential to the security of this Nation ?, Attorney General LEVI. I feel competent to pass in a legal way on whether the kind of certification ,vhich has been given to me and to my staff, along with such responses to questions of importance which we may have, so that we are sure that the certification is taken seriously and so that ,ve can hawl some measure of the importance. Yes: I feel competent to do that. I am sure that a different answer would be that the intelligence people would think that I was quite incompetent to do it. Senator I-L\RT of Colorado. "'\Vould you feel equally comfortable with this procedure if you knew your successor were a highly politicized Attomey General, appointed by a President in which you had little confidence, whom you suspected would use this procedure to further his own political purposes? Attorney General LEVI. I would never feel comfortable with people in high office if that is what it is, distorting the law for political reasons. Senator H,\RT of Colorado. There is no law here. This is the problem we are talking about. Attorney General LEVI. That is not my view in the slightest. I think that there is law. I do not know how one defines that. There are cases; they make law. Senator HART of Colorado. What cases would you refer tD, to instruct you as to what is essential to the security of the Nation? ""Ve are talking about judgment here, factual judgment. Attorney General LEVI. All right. That happens to come, that language comes from the proviso which Congress wrote into title III. And I suppose it would be the same law if Congress, in writing it in. had provided some kind of a procedure to implement it. We would stilI have tD make that determination. I do not know going back to--you asked me really two questions. One is am I competent to make that determination or members of my 61-522-16-9 126 staff; and second, how would I feel about someone who is distorting judgments for political rcasons or something. I thillk spcftking ill this political forum, I ahrays feel uncomfortable if legal matters, if the interpretation of this phrase in a sense is a legal matter, are distorted. But I think that the constructive problem is, if this is not the best way to do it, to find the best way to do it. I tried to discuss in the paper how one \vould do it if you went to a judge for a warrant; on that you \vould have exactly the same kind of a problem. It might be worse. Senator IL'\RT of Colorado. How about a congressional oversight committee to which you brought these requests and consulted with them to share that burden? Attorney General LEVI. That strikes me as raising both of the questions that you asked me. First, the one of competence and second, a political vie\v. So I do not know \vhat to say. You have had more experience than I have had on such matters, about whether that ,vould make it more or less political. And the second question, I do not know if the information is secure. I cannot answer that either. "Whether that would be some kind of a check, I do not know-that kind of a procedure as mentioned in the paper is followed in some foreign countries. ",Vhile I have not given-and I rather doubt \vhether a congressional oversight committee might 'want the specific job of passing on a warrant or an authorization, \vhich I \yould not regard as oversight at all. I do not know what YOU would call it. I do not know whether you "auld want that. I have" reported to what I regarded as the appropriate, so-called oversight committees. mainly the .Judiciary Committees, quite precisely, on wiretaps and microphones. The question is how far one goes with that. I do not know whether it is the cOJlgressional O\'el'sight function to pass on a particular warrant. That may be. That seems to me to raise serious constitutional problems. Senator I-L\RT of Colorado. I take it your answers so far would apply to the fonrth category, also to obtain information certified as necessary for the conduct of foreign affairs. Does that include, let us say, a Secretary of State \....ho is concerned about members of his staff talking to the press? Attornev General LEVI. Certainly not. Senator'HART of Colorado. Certainly not? Attorney General LEVI. Certainly not. Senator HART of Colorado. Well, if to the degree that conduct of foreign affairs is being jeopardized or was thought to be jeopardized by possible leaks from within the staff, I would think obtaining information about that would be important, would it not? Attorney General LEVI. If you think that, Senator Hart, I really have to worry about the procedure that vou are suggesting about having it go to an oversight committee. • Senator HART of Colorado. I did not suggest it. I was merely asking your opinion. Attorney General LEVI. My opinion would be it would not. Senator HART of Colorado. Why is that? Attorney General LEVI. I do not think that that is an appropriate way to read that kind of doctrine against the background of what I tried in this paper to describe as the reach of the fourth amendment. I would think it quite inappropriate and a violation really of what 127 the Keith case is talking about. I cannot believe that either you or 1- Senator R.\.RT of Colorado. I am sorry. \Ve have some dangling answers here. I am not sure I understood what you said. Attorney General LEVI. Apparently I misunderstood you. I thought you said that a scrutiny of a newspaperman as to whether he was getting leaks, whether that was necessary for the foreign affairs matters and national security of the United States, would that be uncovered? I misunderstood you to sav that you thought it would be. That shocked me. • Senator HART of Colorado. I was asking a rhetorical question, Again, ,ve have the problem that '.ve don't knmv what your successor would think. Attornev General LEYT. ,ITe do not knmv ,vho he is, I presume. Senator'IL\RT of Colorado. If the Secretarv of State were to come to the Attorney General and sny, "a member ofmy staff is talking to the press about matters importantto the conduct 01 foreign affairs"-you say you ,Yould not grant it. 'lYe do not know whether your successor ,vould. Attorney General LEVI. It is unconstitutional. Senator'HART of Colorado. I hope your successor :feels the same way. Unfortunately, I have to go vote. ""Ve will bid you good day. Thank you very much for your participation. [A brief recess was taken.] Senator MATHIAS. Mr. Attorney General, you have chosen to visit us on a yery peripatetic day. ,Ve seem to haye difficulty in arranging our meeting so we do not stumble all over each other. I was interested in several of the facets of the statement. One, in "hich you refer to the Constitution as emanating from and applying to the people. And I do not think any of us seriously challenges that flS a concept. But I guess the difficulty arises, when do you decide that a certain American is no longer one of the people? Andlet me ask the question, maybe more speeifically, if an American citizen is charged with foreign espionage, does that separate him from the people? Attorney General LEYI. No. Of course the fourth amendment applies to it, as do other constitutional protections. I think that was not really intended to be the thrust of that paragraph. Senator :MATHIAS. So that the mere charge or serious suspicion on the part of the law enforcement authorities would not suspend the protections of the fourth amendment? Attorney General LEVI. Senator, if I may so say to sharpen it, the question is whether you think it applies to foreign nations. And all I was sug-gesting was that its application must at least take account of that difference. Senator :MATHIAS. Also in your statement. you refer to the fact that at the same time, in dealing ,,,ith this area, it may be mistaken to focus on the warrant requirement alone to the exclusion of other, possibly more realistic, proteetions, That could get us into days of discussion on what more realistic protections are, I was more interested that there seemed to be a cross-reference between that and another line in which yOll refer to the Canadian experience, in ,yhieh one of the other more ,'ealistie protections was the report to the Parliament of the number 128 of national security surveillances initiated, their average length, a general description of the methods of interception or seizure used, and an assessment of their utilitv. You and I, on a previous occasion, discussed a bill which I had introduced ,vhich in fact calls for this very kind of a report to the Congress. I wonder if you would like to enlarge on either of these references? Attorney General LEn. I think that is a possibility, and I said, I think ,vhen you were not here, that I had, in fact, made something of a report that mlS made public to the Judiciary Committee which gave some of this information. Now. my guess is that the Solicitor General files in Omada are in fact, quite general, and it is probably somewhat the same as my letter. althou!rh mine did not include an assessment of the utility. \Vl~cn you were not here, Senator Hart was asking me how I felt ab'out having a so-called oYersight committee, if I understood him correctly. to determine ,,,hether a ,varrant or authorization could be given. Tllnt seemed to me to mix up all parts of the Government even more than they are nOlV, and to raise security questions and so on. It is obviously something one can think about. Senator MATHIAS. In some\dwt the same area, Kevin T. Maroney who is your Deputy Assistant in the Criminal Division testified in the House and argued against a requirement of judicial warrant in all national security cases. One of the grouncls he advanced vms the question of the competency of judges, who are perhaps not that accustomed to dealing with foreign policy matters, to evaluate the affidaYit of a person ,Yho is a foreign intelligence expert. It is a long time since I earned a living at the law. My recollection is, we impose on judges a task of evaluating a wide yariety of technical questions on matters that deal with inclustl'ial processes, with surgical procedures, with traffic patterns, with environmental questions. ,Voulc1 you not think that a judge could e"aluate an affidavit that the person who was a foreign intelligence expert as he does other expert testimony? Attorney General LEVI. I think that there would be some problems. In the first place, it would be hard to get a doctrine of common law on the subject. because opinions could not really be written. A great deal of the material would be extremely confidential. Since I concluded that portion of my paper, not Kevin Maroney's, by saying that I thought that a judicial warrant would gin a greater sense of security to the country, I do not want to overpress the point that it would be difficult for judges to make the kind of determinations that would be necessary. I ,Yould say that I would assume that they would have to spencl as much time on it as I do, and would have to have as much a staff on it as I do, which is considerable, and that there would be security problems, and so on and so forth, and the security of the judge. So that, I also think that the judges undoubtedly would respond to this in general by haying broad categories where they automatically, ,yhere I clo not. ryive the warrant. I think that that is a fact. I do not say that becanse'I wish to keep for myself or my successors this undelightful duty. I think it is something that you have to take account of. though, in thinking about the legislation. Senator MATHIAS. You have been very patient with us, I must say, in spite of the fact that your voice is still very strong and yigorous-Attorney General LEY!. It is because of electronic surveillance. 129 Senator MATHIAS. 'Without pressing you on that point, I would say that it does concern me that an American has less protection because the "probable cause" standard docs not exist if there is a suspicion of a national security interest in the case. Attorney General LEVI. I think the fact is that at the moment Americans have much more protection under the procedures that we have devised than they do under title III. Senator MATHIAS. That is a subject that will be debated, I think. The CHAIRMAN. You are talking about your Department, are you not, and not the NSA? Attorney General LEVI. Yes; that is all I am talking about. The CHAIRMAN. You are just talking about the Justice Department? Attorney General LEVI. That is correct. Senator MATHIAS. I have two very brief other questions. I am just wondering if, in your view, the constitutional powers in the area of foreign intelligence are exclusive to the Executive or whether they are concurrent with the legislative branch? Attorney General LEVI. They are sufficiently concurrent so that legislation by the Congress would be influential. You have an example of it, because the wording of the President's memorandum, while not identical, so closely follows the proviso that Congress wrote. You are asking me whether I think there is presidential power beyond that, and my answer is, "Yes." Senator lfATHIAs. Finally, and I realize this might be asking you to make a statement against your interests, whatever way you answer: Do you think the Attorney General ought to be a statutory member of the National Security Council? Attorney General LEVI. I have never thought of that. Up until the present time, I have been delighted that I have not been. Senator MATHIAS. If you think further of it and care to share your thoughts with US, we would be glad to hear them. The CHAImIAN. One final question from me. I have listened to the discussion of how one set of procedures, a traditional set of procedures involving courts and warrants, has developed in the criminal field; how a very different set of procedures exist in the intelligence or national security field; how, in the latter field, people could be watched and listened to without knowing in any way that their rights had been trespassed upon by a less scrupulous Attorney General than yourself, or a less scrupulous administration; and how there is nothing outside of the executive branch to check on it, and in this way it is different from the ordinary practices in the law; I think it is potentially very dangerous. You can fall back on the argument that good men will establish and follow good procedures, but there is no one outside the executive branch that can check on any of this, and I should think that there ought to be. Maybe it is not a judge that has to give a warrant. That may not be the practical way of dealing with it. :Maybe it should be an oversight committee of the Congress that exercises jurisdiction oyer such matters, a committee that can ascertain to its own satisfaction that pro~edures are being followed and the laws, whatever they may be, are bemg adhered to. The question I have relates hm';ever to the FBI. I sometimes think that the FBI has a kind of .Tek:vll and Hyde complex, in the sense that 'when it is dealing with law enforcement matters it has these rather 130 traditional procedures that it must adhere to; but when the same agency deals with the counterintelligence, national security, it is living in a different ·world. ,Vould it be sensible to break the Bureau in two so that the part that deals with traditional law enforcement is that, and that alone, and that another department within the Justice Department and under the Attorney General would deal exclusively with national security and counterintelligence matters, that are really quite a different character than normal law enforcement? Attorney General LEVI. Obviously, that is not a question that one answers without a great deal of thought. My own present view is that it would not be a good idea, because the point is to develop procedures which are adhered to just as vigorously in both areas. This is one reason we do have a committee which has been hard at work fashioning guidelines. These guidelines, when completed-I think the committee has seen some of them-will be in statutory or Executive order form. But I think, whatever the shortcomings may have been in the past, that a strong attribute of the Bureau is its discipline, and that one wants to develop in this area-where, by the way, it is wrong in some sense to fault agencies when the law changed as it did. It would bE' desirable to develop procedures in that area which would evoke the same discipline and, although the area is quite different, there are comparable points, the checking, the reviewing, the getting permission, and so on. It is really a different world. One of the problems, Mr. Chairman, if I may say so, is when one looks at the past, one finds some terribly interesting things, hut sometimes one forgets what the present is like. Tho CUAIRlIfAN. I will not belabor the point, except to say when one agency does both kinds of work, I think that there is some dangel', although it may be well-disciplined, for the methods in the one area to creep into the other. It may be more sensible to let counterintelligcmce and national security matters of that kind be handled by a separate bureau under the .Justice Department. I would not want to see it all thrown into the CIA, for example; I want them to look outward in dealing with foreign countries, and not dealing with this country. But a separate department within Justice that deals with this quite separate matter from ordinary law enforcement, is an idea which I think should be given more thought. Thank you very much for your testimony. Our next witness is Prof. Philip Heymann of the Harvard Law School. [The prepared statement of Prof. Philip Heymann in full follows:] PREPARED STATEMENT OF PHILIP B. HEY~rANN, PROFESSOR OF LAW, HARVARD LAW SCHOOL 1, INTRODUCTION A. This Committe€ has heard evidence about a number of aethities of the intelligence agencies which raise significant questions. 1. Two forms of activities are familiar: a. Surreptitious entries. h. Domestic electronic surveillance. 2. Two other forms of activity were previously unknown and raise comparatively novel questions: a. The opening of maHto and from the United States.
|