Site Map

CHURCH COMMITTEE REPORTS

130
traditional procedures that it must adhere to; but when the same
agency deals with the counterintelligence, national security, it is living
in a different ·world. ,Vould it be sensible to break the Bureau in two
so that the part that deals with traditional law enforcement is that, and
that alone, and that another department within the Justice Department
and under the Attorney General would deal exclusively with
national security and counterintelligence matters, that are really quite
a different character than normal law enforcement?
Attorney General LEVI. Obviously, that is not a question that one
answers without a great deal of thought. My own present view is that
it would not be a good idea, because the point is to develop procedures
which are adhered to just as vigorously in both areas. This is one
reason we do have a committee which has been hard at work fashioning
guidelines. These guidelines, when completed-I think the committee
has seen some of them-will be in statutory or Executive order
form.
But I think, whatever the shortcomings may have been in the past,
that a strong attribute of the Bureau is its discipline, and that one
wants to develop in this area-where, by the way, it is wrong in some
sense to fault agencies when the law changed as it did. It would bE'
desirable to develop procedures in that area which would evoke the
same discipline and, although the area is quite different, there are
comparable points, the checking, the reviewing, the getting permission,
and so on. It is really a different world. One of the problems, Mr.
Chairman, if I may say so, is when one looks at the past, one finds
some terribly interesting things, hut sometimes one forgets what the
present is like.
Tho CUAIRlIfAN. I will not belabor the point, except to say when one
agency does both kinds of work, I think that there is some dangel',
although it may be well-disciplined, for the methods in the one area
to creep into the other. It may be more sensible to let counterintelligcmce
and national security matters of that kind be handled by a separate
bureau under the .Justice Department. I would not want to see
it all thrown into the CIA, for example; I want them to look outward
in dealing with foreign countries, and not dealing with this country.
But a separate department within Justice that deals with this quite
separate matter from ordinary law enforcement, is an idea which I
think should be given more thought.
Thank you very much for your testimony.
Our next witness is Prof. Philip Heymann of the Harvard Law
School.
[The prepared statement of Prof. Philip Heymann in full follows:]
PREPARED STATEMENT OF PHILIP B. HEY~rANN, PROFESSOR OF LAW, HARVARD
LAW SCHOOL
1, INTRODUCTION
A. This Committe€ has heard evidence about a number of aethities of the
intelligence agencies which raise significant questions.
1. Two forms of activities are familiar:
a. Surreptitious entries.
h. Domestic electronic surveillance.
2. Two other forms of activity were previously unknown and raise comparatively
novel questions:
a. The opening of maHto and from the United States.
131
b. The interception of cable and phone communications between the united
States and foreign countries.
B. These activities and others the Committee has reviewed raise three sets
of questions. I shall address only the last of the three, not because the others
are unimportant or even less important but because time does not allow dealing
with all of them on a single occasion.
1. 'l'here is a serious question about the collection of files 011 dissenters. I
think there can be no serious doubt that an operation such as the "CHAOS"
operation of the CIA tends to discourage participation in legitimate political
activities, particularly by those who are somewhat timid. The Army intelligence
gathering program raised similar questions.
2. Wholly separate from the question of the chilling effect of an excessive
collection and maintenance of files, there are the unique problems that are created
when intelligence agencies such as the CIA and NSA wander into the domestic
area. 'l'hese agencies ai"e unlike our domestic investigative agencies in a number
of rcleva.nt ways.
a. Tlley are funded in the billions of dollaTs.
b. Their employees are trained to operate in secret circumstances abroad and
without necessary conformity with local law.
c. 'l'lle importance of secrecy makes the monitoring function performed for
domestic agencies by the Congress, the courts, and the public at large much less
applicable.
'l'hese characteristics led the Congress to attach a statutory prohibition to
domestic activities of the CIA. I am aware that members of the Committee
pressed General Allen all whether this would not also be desirable for the NSA.
3. The third subject for the Committee's concern, and the only one I intend to
address today, is the problem of invading the privacy of communications of
American citizens. This is an area that the Fourth Amendment of the Constitution
and a number of statutes protect. In discussing this area I will attempt to
make clear where the law is moderately firm and where it is uncertain. I shall
also do my best to separate off my recommendations from my estimates of what
the law is.
C. As we proceed to discuss these questions, it will become apparent that additional
legislation would be highly desirable for several reasons.
1. We are dealing with the area of foreign policy and most particularly with
the special situation of intelligence gathering and secret technology. This Committee
and through it, the Congress, have a factual basis for assessing these
matters which courts cannot duplicate. This is especially true after the Committee's
extended set of hearings.
2. There are obvious and important gaps in the present law which legislation
will be needed to flll. I will allude to these as I proceed.
II. THE EFFECT OF A GOVERNMENTAL INTEREST IN FOREIGN INTELLIGENCE ON THE
FOCRTH AMENDMENT RIGHTS OF CITIZENS
A. One question runs through each of the areas the Committee bas been investigating:
to what extent does the Fourth Amendment apply to matters of
national security?
1. 'l'here are a series of additional difficulties to be addressed in connection
with searches of international mail and international voice and non-voice
communications.
2. But the same question as to what difference is made by a foreign intelligence
objective applies to those programs as well as to more familiar searches of
homes. offices, or domestic communications.
B. The Fourth Amendment provides two different forms of protection, each of
which could be affected by the fact that the government is pursuing a foreign
intelligence interest.
1. Through its requirement of a judicial warrant absent certain long-established
exceptions for emergencies and arrests, the Amendment imposes a more neutral
e"alnation of the situation between a governmental desire for information and
the action of engaging in a search. It also, equally significantly, requires a written,
sworn record of the basis on which the search is undertaken.
a. It is important to emphasize, as .Justice Powell did in United States v.
District Court, that the fears the framers had in mind included not only invasions
of privacy but also the use of a search to silence dissent.
lJ. The classic language IH're is that a detached, neutral judicial officer should
stand between an over-eager executive branch and the rights of citizens.
132
2. 'I'he Fourth Amendment also imposes certain requirements of probable cause
and sensible procedures.
a. In this al'ea there has been a great deal of fluidity. Less probable cause is
necessary if the intrusion is less or if the threatened harm is greater.
lJ. SUCll requirements as notice of tbe search bave been held to be snhject to
re:1Sonable modifications as in the case of the "Wiretap Act where no nutice need
be giyen for nincty days and even thcn it can be delayed if this is essential to an
investigation.
C. The simpler part of the question as to the impact of national secnrity concerns
on the Fourth Amendment goes to the need for a warrant at nil. This part
Illay be the more important nOlletheless, for on our trust in the neutrality of
judges turns a great deal of the citizens' sense of securit~· as well as a real protE'etion
against unjustified attacks on dissent or a simple arbitrariness.
1. 'Vith the concurrence of judgE'S from the most conservative to the most
liberal wings of their benches, the courts have by now gone far toward answering
the question as to the necessity for a warrant in national security areas.
a. First the Supl'eme Court held in a unanimous opinion by Justice Powell that
the President had no power to dispense with the warrant in the area of internal
security. Justice Powell emphasized the dangers to dissent.
b. 'I'hen after two courts had sustained surveillance without a warrant of
diplomatic establishments and non-citizen foreign agents, the D.C. Circuit in
Zwcibon v. lJIitchell has held unanimously that, at least whereyer the party being
monitored is neither a foreign agent nor a collaborator with a foreign government,
a warrant is required for a wiretap even in the pursuit of fOTeign intelligence
or foreign policy.
c. Note that this leaves the government free to search without a warrant in
the cases of embassies and non-resident employees of foreign governments.
d. This area is one to be regulated by diplomacy, not by the Fourth
Amendment.
2. The courts' reasoning has been, I believe, persuasive.
a. The rules as to probable cause and necessary procedures can be adjusted in
such a way that the requirement of a warrant protects against malice, arbitrariness,
or attacks on dissent without limiting the government in its pursuit of
legitimate goals.
b. The history of the Fourth Amendment involves a number of searches in
the national security area where, in important cases, warrants have been
reqUired.
c. The notion that courts are unable to understand enough of the situation
to exercise a meaningful review function is implausible, especially when one
recognizes that the Attorney General exercised that function for the executive
branch. Moreover, there is no real risk of revealing secrets. The record of courts
in this regard is far better than that of the executive branch.
d. It is my understanding that the Attorney General has now accepted the
position of the D.C. Circuit at least for the time being.
3. These cases leave open three questions that the Committee could well
address:
a. No court has yet held that an American citizen or resident alien-as opposed
to an embassy or foreign employee of another nation-who is found to be
a foreign agent or collaborator can be searched without judicially determined
probable cause to believe he has committed espionage, sabotage, or some other
crime. Both the Supreme Court and the D.C. Circuit have left that question
open. Should there be such a category? The case against it is that the Congress
has prohibited and can prohibit any conduct it considers dungerous to our
national security and that no action should be taken against a citizen until there
is reason to believe be has violated (or conspired to violate) such a prohibition.
The case for an exception is that secret foreign agents are an important source
of positive information about intentions of other gOYernments and about other
agents even when they are not yet engaged in illegal conduct.
b. If there is to be such a less-protected category of citizens who are secret
agents, what should the definition of foreign agent or collaborator be when we
are dealing with American citizens? It cannot, for example, open to electronic
surveillance the telephones of any law firm which represents the government
of France or Bolivia. A statutory definition would have to involve the secret
acceptance of payor directions from a foreign government.
c. Perhaps most important, if there is a category of American citizens who
are foreign agents or collalJorators and which receives less protection under the
Fourth Amendment, should tllere not be a requirement that the status of foreign
133
agent or collaborator, as defined by Congress, be determined by the courts on
a warrant. The excessive suspicions of Presidents Johnson and Nixon that
anti-war dissent was controlled from abroad led to the CHAOS program. A
sensible protection against any recurrence would be to require a judicial warrant
based on a sworn affidavit establishing that a citizen is a foreign agent.
This is obviously 11 highly important protection when organized, legitimate
disagreement with government policy is involved.
D. The second aspect of the queston whether a foreign intelligence interest
makes a difference to Fourth Amendment protection is harder. It raises the
question whether in the case of citizens ,rho are not foreign agents or collaborators
,,,ith a foreign government there is any right to s<'arch simply to obtain
foreign intelligence and not only, as traditionally. with prohable cause to believe
that eyidence of a crime will be found. On analysis, it seems clear to me that
no such right should eXist, although the case law is not helpful one way or the
other.
1. Put in its clearest form, the question is this. Assume that an American
industrialist or banker has returned from an unfriendly country with knowledge
that would be yery valuable to our intelligcn<.:e agencies regarding the industry
or finances of the foreign country.
a. Certainly it is proper to ask the American citizen to reveal that information
and indeed we presentlY do.
b. But what if that extremely important foreign intelligence is withheld by
the citizen for any of a number of reasons. Can he then be made a subject of
electronic surreillance or can his home and office be searched if the information
is important enough? The question, quite starkly, is whether there should be
a warrant procedure that allows searching entirely loyal Americans wheneyer
there is probable cause to believe that they possess important foreign intelligence
which they will not reveal freely.
2. I believe the answer to this question is that the matter should be handled
by leg'islation, if at all, and not by executive discretion. Although the merits
of the proposal are highly questionable, the Congress might:
a. Make it a crime to fail to turn over certain well-specified classes of information.
If it did, there would then be probable cause to search for and seize such
information if it was not turned over.
b. In the alternative, the Congress could make a well-defined class of information
subject to subpoena.
I don't recommend either of these alternatiYcs, but they are obviously preferable
to an undefined executive discretion to search entirely loyal American
citizens. If the matter is to be handled at all. it should be by legislation.
3. There is indeed case law that indicates that a search of an innocent party
is improper unless there is reason to believe that the evidence will not be turned
oyer voluntarily or in response to a subpoena. This case law would also suggest
that only a well-defined class of foreign agents (who could not be expected to
comply with a subpoena) might possibly be subject to electronic surveillance
in order to obtain valuable, positire intelligence in situations where there is
no reason to belieye that they haye committed or are about to commit a crime.
III. TIlE ADDITIOXAL DIFFICULTIES PRESENTED BY THE PROGRAMS OF MAIL OPENINGS
AND INTERCEPTION OF II\TERNATIONAL COMMUNICATIONS TO AND FROM THE UI\ITED
STATES AXD INVOLVING UNITED STATES CITIZENS
A. Vi'holly aside from the special questions with regard to a possible foreign
intelligence exception to the Fourth Amendment rights of American citizens,
there are a series of difficult problems presented by the testimony the Committee
has receiyed with regard to mail openings and interception of international
communications. I will address three of these in an order of increasing
difficulty.
B. Fourth Amendml.'nt rights only pertain to American citizens in a situation
,,-here they cnjoy a reasonable expectation of privacy with regard to their comIllunica
tions.
1. The situation with regard to mail is unusuallv clear.
a. TIl(' germinal case dealing with Fourth An~endment protection of the Illail
waf! E:r Parte .!aek8()n, fl6 U.S. 727 (1878) in which the court helti thnt while
in the first class mail. papers can only he opened anti examined nnder a search
,,-n.rrant. This Tnle which was reaffirmed as rN'pntly as 1070 in U.s. Y. Van
J,ceI11DCJ1. :'\fl7 U.R. 249. is now embodied in a fetieral statute. 39 U.S.f'. 4057. It
proYides tllat "only un employee opening dead mail by authority of the Post
134
~Iaster General, or a person holding a search warrant authorized by law may
<lpen any letter or parcel of the first class which is in the custody of tlIe Department."
b. The only possible questions involve whether a U.S. citizen is protected as
a recipient of mail from a foreign resident, or is only protected as the sender
of mail. For four reasons I believe it is moderately well established that We
recipient is also protected.
(1) A number of cases have indicated that there is such protection subject
only to a reasonable customs power. See, c.g., U.S. v. Bohnen, 298 F. Supp. 51
and U.S. ... Farious Articles of Obsccne j}[erchand'isc, SuS l!'. Supp. 165; State v.
Gallan t, 308 A.2d 274.
(2) sn U.S.C. 4057 seems to clearly cover the recipient as well as the sender.
(3) The modern law with regard to the privacy of oral communications protects
ail the parties to the communication anll would probably be read to apply
to all the parties to a written communication as well.
(4) 'l'he recipient of a letter has something very close to a possessory claim
to the paper 011 which it is written.
2. I believe the situation with regard to voice communications involving an
American citizen and with one terminal in the United States is equally plainly
covered both by the Constitution and by thc Omnibus Crime Control and Safe
Streets Act of 1068.
a. The definition of "wire communication" in the 1968 Act includes any comn1Unication
made through the use of facilities for the transmission of communications
by cable by any person engaged as a common carrier in providing
such facilities for the transmission of foreign communications. The definition
of common carrier plainly incorporates international communications to and
from the United States.
b. PresumablY the definition of "oral communications" would be read to he
consistent \vith' that and would therefore include radiotype voice communications.
S. The situation with regard to non-voice communications is less clear, but I
believe there is every indication that they, too, would be considered protected
under the Fourth Amendment.
a. As a matter of a reasonable privacy in expectation of communications, the
only difference from voice communications is the extent to which a cable is
revealed openly to a transmitting company. This might make revelation of its
contents to the government within the reasonable expectation of senders were
it not for 47 U.S.C. §605, the old Wiretap Act, which still forbids the revelation
of content except "in response to a subpoena issued by a court of competent
jurisdiction or on demand of other lawful authority." Any other form of interception
of a non-voice communication would be a violation of a reasonable expectation
of privacy. I take it that the voluntary act of a common carrier in
complying with a request by a government agency to turn over cable traffic
would not satisfy the exception for "demand of other lawful authority," a
phrase that is apparently intended to refer to the subpoena powers granted by
Congress to various agencies. See NeWfield v. Ryan, 91 F.2d 700. Certainly an
interception without the assistance of the common carrier would be treated as
an invasion of the privacy of communications. Still, I should quickly acknowledv,
e that tlwre are practically no 1<'onrth Amendment cases dealing with the
interCE'I)tion of communications either domestically or in international traffic.
b. I do not believe that the 1968 statute covers non-voice communications. Its
definition of "intercept" requires "the aural acquisition of the contents of any
wire or oral communication." Acquiring the contents of a non-voice communication
would not be "aural." The only possible statutory prohibition is in 47 U.S.C.
§ 605 which first prohibits the interception and divulgence of radio communications
and then states that "no person not being entitled thereto shall receive
or assist in receiving any ... foreign communication by radio and use such
communication (or any information therein contained) for his own benefit or
for the benefit of another not entitled thereto."
4. With regard to each of these forms of communication, the situation may be
entirely different when there are two foreign terminals.
a. A channel of communication that is overwhelmingly used and controlled by
foreign interests does not invoke a reasonable expectation of privacy by American
citizens.
b. The only qualification here would be if American agents or foreign governments
acting at their behest specifically targeted the foreign communications of
an American citizen. Here there might well be a Fourth Amendment claim.
135
C. In one situation the result of all this seems moderately clear. If an intelligence
agency wants to open the letters or intercept the international communications
of a named American citizen who is the target of an investigation, it will
naye to get a warrant and either show there is probable cause to believe the
citizen is committing a crime or, if the Congress so determines, show that he
is a secret foreign agent and that the communication is likely to contain important
foreign intelligence.
1. This alone disposes of many of the situations before the Committee.
2. The lack of a clear law dealing with non-voice communications suggests
that t he Committee would serve a real function by addressing this question
directly.
D. The luudest question arises with communications that can, without a
serious inyasipn of lll'ivacy, be checked for words or other selection criteria or,
in the case of letters, for indicators on the envelope that tend to show that the
COP.llllUllication may contain evidence of a past or prospective crime.
1. In the case of mail, looking at the outside of the envelope for indicators
that it ma~' contain evidence is not itself a search.
2. The difficult question arises if it turns out that the indicators will lead the
investigatiyt' agency to read a number of innocent letters for each letter that
contains evidence of a past or prospective crime. At this point, there is apparently
lW c!l(,:ce other than to either open the letter and invade the privacy of the
~encler mul receiver or to leave it unopened although there is a probability that
it contains evidence bearing on a substantial danger.
a. In traditional t>'rms, the question is one of a general search. The Constitution
,vas \yrilten to forbid general search warrants such as the Writs of Assistance
were in colonial times.
b. There is no simple answer to when a search is too general. Any search
involves a certain probability that it will not reveal evidence and every search,
even where the result is that evidence is found, involves breaching the privacy of
non,eyitlentiary matters. The question is always one of establishing a balance
hetween the illyasion of privacy and the need for the search. As always under
tile Fourth Amendment, if what is involved is a serious prospective crime, there
is more room for a fairly general search.
3. The problem with international communications is similar, but may be
subject to more of a technological solution. Consider the case of non-voice communications
between an American citizen and an alien.
a. General Allen's testimony indicates that it may be possible to identify
certain selection criteria without reading the entire message. These, like the
indicators on the outside of a letter, would narrow the number of communications
inspected and would increase the probability that any single communication
containpd evidence of a past or prospective crime. If this were done mechanically
without reading all of the messages, there would not be a search during this stage
of the operation.
b. \'.'hen a narrower, but perhaps still excessive, class of non-voice communications
has been identified, it may be possible to review these without revealing
the name of the sender or receiver. Adding in that second step would substantially
rednce the invasion of privacy.
c. It is also, of course, relevant whether the intelligence agency immediately
discards an" message that, on reading, proves to be innocent without keeping
copies or recol'us of the transactions.
4. The hardest question of all would be presented if: (1) an important part
of the communications traffic on an international route to and from the United
Statcs does not involve American citizens; and (2) there is no way of sorting
this part of the traffic from the part involving American citizens without a
substantial invasion of the privacy rights of citizens. This might well be true
with regard to voice communications, for example. Here there would be two
questions to be addressed in sequence.
a. What procedures could be developed to minimize the intrusion on the
privacy of American citizens, for example by quickly and completely discarding
any communication involving American citizens and not revealing evidence of a
crime?
b. What is the balance between the now-diminished invasion of the privacy
of American citizens and the volume and importance of the purely foreign
traffic involved? If, for example, ninety-five percent of the "take" were domestic
and the remaining five percent pertained primarily to commercial matters, the
balance would have to be struck in favd'r of forbidding the particular technique
of intercepting international communications.
136
E. Obviously the questions I have just reviewed concerning- the permissible
techniques for monitoring international communications are matters which badly
need legislative standards. In some cases, the nature of the program will he so
clear and stable that Congress could itself define the requirements. In other
cases, the Committee might well wish to consider a warrant requirement that
first set forth general standards and procedures and then directed a court to
approve a hroad vlan for monitoring a particular type of communications.
1. In either event, I would think it was highly tlesirahle to require the intelligence
agency to furnish on a continuing hasis two forms of information.
a. Copies of any communications perused in their entirety with some indication
of which onE'S were furnished to other government departments.
b. A numerical summary of the relationship between communications read but
discarded and communications read and kept as part of any governmental program
or file.
2. This will make it possible to estimate the extent to which the search is
over-broad, the equivalent of a general warrant.
TESTIMONY OF PHILIP B. HEYMANN, PROFESSOR OF LAW,
HARVARD LAW SCHOOL
Mr. HEYl\L\XN. Mr. Chairman, I recognize it is late, and if I could
submit my prepared statement for the record, I would be happy to try
to sunm1arize in a very few minutes 'vhat I have to say.
Tlly objective. ::\11'. Chairman, is to try to state clearly the four or five
or six issues that I think are presented by surreptitious entries, domestic
bugging', NSA interceptions and mail openings.
I have had the feeling today that sometimes we are dealing with a
larg-c ball of wax called national security; sometimes we are dealing
with 500 difficult little issues. :'\Iy own view, and I hope I can convince
YOll, is that there are abod five or six different issues. and that
this committee can address them individually with the result. I hope,
that the law will be a little clearer when you are through. There are
two types of issues. I want to break the categories into two, and then
bred: them. There are certain issues that go directlv to what the impact
of foreign intelligence is on fourth amendment rights. Then there
is another set of issues that involve what is special about international
communications, mail, nonvoice cable. or voice.
Let me start with the question of ,vhat is special about national intelligence,
foreign intelligence, because that one cuts through everything
this committee has looked at. It cuts all the wav from black
bag jobs to sophisticated NSA items. v
As you well know, there are two pri;nrrry protections here, and foreign
intelligence considerations could afi'ect these. First, the fourth
amendment has a warrant protection, to get a judge over an overly
eager executive branch, if it is over-eager in a search. The warrant was
there largely, as Justice Powell reminded us recently, because of fears
as far back as the 18th century.
In the area of the warrant, the first part of what is special about
intelligence, the courts have taken us a very long way toward a conclusion.
First the Supreme Court, in the United States v. U.S. District
Court, held that internal security required a warrant. Then the D.C.
Circuit, in Zweibon v. l1fitchell, in an opinion that the Attorney General
has said he will live with, at least for the time being, has said
even when the Government is pursuing foreign intelligence, it must
get a warrant unless it's dealing with a foreign agent or colhLborator.
In other words, a great deal of the ambiguity the Congress left in
137
1968 is now cut down to the question, what happens with foreign
agents and collaborators. As to that, I think that this committee has
two very important questions to addI:ess, and it has been asking them
of the Attorney General today. One question is: 'Vhat should the definition
of foreign agent or collaborator be? Senator Hart was pressing
the Attorney General on that. It is not going to be an easy thing to
draw up. If there is some special category of foreign agent and collaborator,
it is going to take some work. It cannot include Kew York
law firms who are representing Bolivia or France. It cannot include
major .Jewish organizations ,Yorking in collaboration with Israel on a
bond drive. It is going to take some work.
The second issue under the ,,,arrant that this committee is going
to have to address is: If there is an exception for foreign agents and
collaborators, should that be decided by the executive branch without
a warrant, or should there be a warrant required where a judge
decides that someone is a foreign agent, a citizen, a foreign agent
or collaborator? Let me be clear that no one, including me or any
court, is suggesting a warrant requirement for embassies or nonresident
employees of foreign gonrnments, all right? But what if
the executive branch believes that someone is a foreign agent or a
collaborator? Should not a court have to get into it? I would strongly
urge that they should.
The CHAIR~L\~. Are you talking in this point, Professor Heymann,
about bugging and wiretapping? The cases you have cited
relate to those traditional methods.
Mr. HEYMANN. I believe exactly the same standard would apply
with regard to intercepting overseas communications, Senator Church.
In other words, as I go about three steps down the line I am going
to say to you that I think it is clear that international mail with a
U.S. terminal, or U.S. citizen; international phone conversations,
the same conditions: and international cable traffic, are all protected
by the fourth amendment. I am going to give you cases and statutes
that say that, and I am going to say that requires a warrant unless
it is a foreign agent.
I hope that this committee says if the Government wants to say
it is a foreign agent. it will require a warrant to certify that it is a
foreign agent.
The second half of what is special about foreign intelligence is do
you always need probable cause of crime, or can the Government
sometimes go out, simply pursuing foreign intelligence. I think that
you have to divide that one into two cases. One, with regard to foreign
agents or collaborators, it makes some sense. There is a quite argtlable
position that for a foreign agent or a collaborator so certified by
a court on a warrant, the Government ought to be able to pursue foreign
intelligence, not just probable cause of a crime. The executive
branch could live with a stricter standard, but there are cases that
you can imagine and point out where a foreign agent would have
information about a foreign country's plan that you wanted to pick
up, with or without probable cause that the agent is committing a
crime: or a foreign agent would make contact with other agents whose
names it was important to know.
My sharpest difference with everything that the Attorney General
was saying comes, I think, in the question. can the Government pick
67-5220-76-10
138
up information from loyal, trustworthy American citizens by electronic
surveillance at home, or through international means? Can it
do that simply to get foreign intelligence when there is no evidence
of a crime '? Let me state the question very specifically: if David Rockefeller
goes to the Soviet Union and learns information about their
financial structure that the CIA would give a great deal to know,
that it is very important to our foreign security, is there a right to
bug David Rockefeller's phone to find out what he has learned?
At the moment, as you know, we do make inquiries of David Rockefeller,
and that is entirely proper. The question is if for any of a
number of reasons he refuses to furnish that information, the foreign
intelligence information that the executive branch wants, can his
communications be monitored to find it out?
The CHAIRl\IAN. At home?
Mr. HEYl\L\NK. I mean at home. bv cable overseas, letter overseas.
I mean by phone overseas, Mr. Cha·irman. It seems to me that the
Congress ;has to face up to that rather directly.
The CHAIRl\IAN. Let us take the case of business transactions that
may have an economic impact upon the Unit€d States. I would take it
that if thev were a transaction that involved foreign governments,
investment~. capital transfers and the like, that this would be within
the right. of the Government. to obtain information through electronic
surveillance methods, or any other method.
Mr. HEYMANN. The position that. I am urging on you, Senator-The
CHAIRMAN. We are talking now about actions of foreign governments
in the economic field.
Mr. HEYMANN. The question is whether the communications of an
American citizen are monitored secretly to find out that information.
I suggest to you that Congress would not pass a statute making it a
crime to withhold valuable information, making it a crime for an
American citizen to withhold valuable information, that Congress
would probably not pass a statute authorizing an executive agency to
subpena that information. It would be regarded as the information of
that citizen. If Congress were not to allo'w it to be done directly by
criminal statute or subpena. Congress should not allow it to be done
indirectly by the executive branch monitoring an entirely innocent
American citizen's communications.
The CHAIRMAN. Suppose that you are looking simply for intelligence
having to do with mes...-~gesof foreign governments.
MI'. HEYMANN Wholly?
The CHAIRMAN. You would have no problem with that?
MI'. HEYMANN. Foreign to foreign messages, I would have no trouble
with, and foreign to foreign terminals, I have no trouble with.
The CHAIRMAN. How about messages between foreigners, as such,
either abroad with both terminals abroad, or one terminal in this
countrv and the other terminal abroad? Any trouble with that?
MI'. HEUIANN. Between two foreigners?
The CHAIRMAN. Yes.
Mr. HEYMANN. No, Mr. Chairman. There could be possibly a problem
with resident aliens, but setting that minor problem aside.-The
CHAIR.lfAN. Suppose in order to get the messages of foreign governments
or foreign aliens with which you would have no problem,
139
it was necessary for technical reasons to take these messages out of the
whole stream of messages.
Mr. HEYMANN. That is the hardest problem of all, Mr. Chairman.
The CHAIR..."\fAN. Yes, it is.
Mr. HEYMANN. If I just may take three sentences to work up to the
hardest problem. As I said to you, my statement makes clear that I
think the law is absolutely solid that letters, including international
letters, are protected. They have been protected by statute of Congress
since 1825. The Supreme Court has held them highly protected for
the last 80,90 years. I think the law with regard to international voice
communications involving American citizens is clear, constitutionally
protected, and protected under the Safe Streets and Crime Act. I think
the Wiretap Act applies to international communications if you look
carefully at its definitions.
Mr. SCHWARZ. Do you mean with one terminal in the United States?
Mr. HEYMANN. With one terminal in the United States, that is the
way the definition was.
Finally, I think the case is slightly less clear in regard to· nonvoice
communIcations. What this means, the second sentence that leads up to
your hardest of examples, if these are protected communications, then
you need a warrant. I think the Attorney General agrees with that,
although he is hard pressed to say at this time, November 6, whatever
date it is. If these are protected communications, the executive branch
cannot read them or hear them without a warrant if what is being
read, if what is being targeted is an American citizen. If somebody
says I want to read Frank Church's international cables, there is a
warrant requirement protecting it.
The hardest question, if what is being targeted is not an individual
American, if it is an individual American--
The CHAIRMAN. To answer my question.
Mr. HEYMANN. That is the hardest question. As your committee has
heard, the NSA has systems for identifying particular parts of the international
traffic which are somewhat more likelv to contain either
evidence of a crime or foreign intelligence info;mation than other
parts. What if once it has identified a large, relatively large volume
of traffic, that is suspicious? It will still be true that the investigating
agency is going to have to read a great deal of that traffic in order to
separate out perhaps perfectly proper foreign-to-foreign cables from
American cables. Then what? My answer is really quite similar to the
Attorney General's, if I heard him right, Mr. Chairman. The first
question is what steps can be taken to minimize the invasion of privacy
with regard to the protected cables involving an American citizen, an
American terminal, or a protected phone conversation or protected
mail? What steps can be taken to minimize the invasion? That includ~
s. among other things, how quickly is the matter discarded. who
sees It.
The second step which I think the Attorney General recognized
this morning is you then compare the minimized-a court woul(l have
to and the Congress would have to-the minimized damage to American
privacy with the importance and the value of the foreign-to-foreign
traffic which is intercepted. If it turns out that 95 percent of the
traffic is protected in the sense that it involves a loyal American citizen
as one terminal in the Fnited States. and 5 percent is foreign to
140
foreign, and the 5 percent is not of great value, say the 5 percent involves
the price of grain; then the whole bundle would be unconstitutional.
THE CHAIRMAN. Who makes that judgment?
Mr. HEYMANN. The last question. It can only be done in one or two
ways, I believe. If we are talking about a type of interception of communications
which was very constant over time, Congress could go far
to either declaring it legal or illegal. If we are talking about a type
of interception that may change and be different next year than it
is this year, Congress is going to have to lay down standards for courts
to apply.
Now the Attorney General's statement this morning contains references
to a number of cases where the Supreme Court has ordered and
authorized courts to set up general principles and general procedures
for handling fourth amendment questions. The most recent is ,Tustice
Powell involving Customs searches on the border of Mexico. The
Supreme Court with Justice Powell speaking said, the lower court
ought to say just when and where there can be inspections within 20
miles of the border of Mexico.
I believe that ultimately the Congress is going to have to pass a
statute that sets forth standards and then requires a warrant from a
court. Perhaps a warrant approving a monitoring system with a whole
volume of traffic. It does not have to be a warrant for each individual
bit. Congress is going to have to set forth the standards and courts are
going to have to come in and apply them.
Finally, I think it is very important that the whole system is not
going to work unless there is some what is technically called feedback
where the court or legislative oversight committee keeps getting records
regularly giving a comparison of the quantity and quality of
the American messages being intercepted, the innocent American messages
being intercepted, a comparison of that quantity and quality
with the value of the legitimate take. There is going to have to be
some wrt of system that keeps bringing that back in.
The CHAffiMAN. It would seem to me that where you get into the
legitimate foreign intelligence area that the introduction of a court
device or the warrant device may indeed become very awkward.
The best device would be an oversight committee of the Congress that
would be kept fully informed and would pass judgment on these cases
just to satisfy itself that these operations were being kept within
proper guidelines and under proper restriction.
The trouble I have with the Attorney General's dissertation and his
responses today is that he somehow seems to visualize that all of
this could be done within the executive branch, that everything could
be worked out with better procedures. Unless there is somebody checking
on the executive branch that is not part of the executive branch
and not subject to the ultimate control, direction and dismissal of the
President, I do not think you have much protection.
Mr. HEYMANN. I certainly agree with that, Mr. Chairman. The
only thing that I question in your statement is to whatever extent it
involves a notion that entirely innocent, meaning nonforeign agent,
American citizens can properly be monitored in their communications
at home or from home to abroad simply because they are thought to
possess in their minds intelligence which the CIA, or the NSA, or the
State Department, or the Department of Defense, or the White House
141
would like to have. That is a notion which I believe on reflection the
committee will find unpalatable. I must say I believe that, and a number
of courts have acted whether it is in dictum quite acceptable. On
reflection courts will not accept it. I think when tIl(' committee thinks
hard about what it means--
The CHAIRMAN. In such cases you would require a warrant, or would
you simply flatly prohibit?
Mr. HEYMANN. I would simply flatly prohibit a claim to own the
mental--
The CHAIRMAN. That would be part of the definition. That would
be part of the statutory exclusion from a definition of foreign intelligence.
Mr. HEYMANN. That is correct. In fact, the amendment that was
written in 1789 or 1791 requires probable cause. Of course it has
been extended and applies otherwise now.
The CHAIRMAN. Mr. Schwarz would like to ask a question.
Mr. SCHWARZ. Picking up on Senator Church's and your recognition
of the hardest question, on a stream of communications, I understood
your first point to be that if upon analysis the foreign intelligence
value of the stream is not very great, even though it might exist,
you say the stream could not be surveilled at all.
Mr. HEYMANN. If surveilling the stream requires a substantial invasion
of the privacy of protected American communications.
Mr. SCHWARZ. Now let us assume that the stream does include significant,
legitimate fnreign intelligence-government to governmentand
in the courSe of analyzing. of obtaining that. it is technologically
inevitable that one also obtains American citizrns' messages. I want to
put two different cases to you. One of those messages from an American
citizen to an American citizen upon analysis contains eviclence of
a crime, although no one had any reason to suspect that before the
stream was interrupted. The other message contains eviclence of either
economic matters or political matters. \\mat do you 00 with those
two messages that NSA or some other agencv has now? Pnder your
first principle, it was legitimate for the NSA to snrvri11 the strel\m.
and in the course of doing so it has acquired these two messag-es. What
shonld thev do with them?
~rr. KTR·BOW. This is withont a "'arrant?
~rr. SCHWARZ. TllPrr has been no warrant.
~fr. HEY)[ANN. ~fv answer. ~fr. Schwarz, is the traditional one.
T helie\'c it is the oj;posite of what the Attorney General suggested
todav. I think if the XSA legitimately reacls a message which revealed
itself as being evidence of a crime. keeps that message and seizes it. it
has come upon it legitimately ancl is eviflencf' of a crime. It keeps it
and uses it and sends it to the FBI and it sends the people to jail. The
other messap"e that it renos that involn's economic information, it has
no right to. That is what I was urging npon Sf'nator Church. That you
havp no right to take from ~\nlPrican citizens what they happen to
know just because the Government is interested in it. too.
Onr of my major differpnces with the Attorney Gpneral this morning
was the notion that the fonrth amendment particnlarly protects
criminals. that its most important function is to exrJnde evidence
against criminals. It ,vas not written for that. It was written to protect
142
you and me. In your case I would send it directly to the FBI. I would
send the message that indicated evidence of crime.
~fr. SCHWARZ. That you would send to the FBI, but the one economic
or political--
)1r. HEYl\fAXX. ,Yould have to be destroyed immediately.
)fr. leIRBOW. ,Yhere do you attach the illegality? At the collection
point, or the distribution point, or the machine where they supposedly
sort all of this you are talking about?
~fr. HEYMAXX. Let me take it in those three stag-es, Mr. Kirbow.
I do not think that there is any search that is worth being called a
search that would trouble anybody, either in looking at the envelopes
for indicators, whatever they may be. I do not know what they are, or
in g-oing through voice or nonvoice traffic simply to cut down from
1 million items to 100,000 items which have the word assassination in
them, let us say, or have the word Xorth Korea in them. I do not think
there is any search running those million items past somebody, only
going so far. That does not seem to be a search.
The next step is the question as to whether you then have to read
the 100,000 items along with the name of the sender and receiver. If it
were technologically possible to do this somehow or another without
g-etting the name of the sender and receiver, you could read the items.
I think that there was just a limited search at the second stage. But if
at the second stage, having cut yourself down to envelopes with indicators
or some other kind of international traffic with selection criteria,
if at that point you have to read the whole message or hear the whole
message, together with the sender and receiver. there is very definitely
a search at that point. You can minimize the effect of the search by
thereafter discarding quickly whatever you have no right to.
~1r. KIRBOW. Do you mean to draw a distinction between reading the
body of the message which I send as being different from one which
I send if you read my signature as the sender and the addressee as the
receiver? Do you draw a distinction between those two categories?
~fr. HEY~L\XX. I recognized it is idiosyncratic. I have not seen it
anywhere else. ,"nen I think of it myself. I think I would feel quite
differently. Let us take a letter. for example. about having a Government
official read my letter, the body of my letter. If it were possible
to eliminate who wrote it and who it is to. I would feel very differently
about the privacy of that letter from a Government official reading it
and knowing who it is from and who it is to.
)fr. KIRBOW. You are familiar with some of the technology of extremely
high-speed transmissions. are you not? How do you distinguish
there where they are almost instantaneously sent and then the
signal goes off the air. and in that stream or volume of information
when they are finally decoded on the other end. or smoothed ont on the
other end. we will C:all it bv another mechanical device? How do yoU
provide for snch high-speed transmissions in this theory of yours a's to
what is legal? These are messages which make nothing but a sound as
they go out over the air as you probably know. What do you do with
those sort of things, which is the predominant way of sending secret
information?
)1r. HEYl\L\NN. I just have togo through the steps. :Mr. Kirbow.
There is no happy answer at the end of the steps. The first qnestion is
you have to ide.ntify conceptually what it is legitimate to pick up and
143
what it is not legitimate to pick up on that instantaneous stream, almost
instantaneous s-tream. I have arg-ued it is only leg-itimate to pick
up foreign agents' traffic. foreign to foreign traffic. evidence-of-crime
traffic. or something like that. First you haYe to identify what is illegitimate
and what is legitimate. Then you ask yourself, is there any
,,-ay that you can process this strE'am so to cut <lm\n the invasion of
privacy to a minimum in the leg-itimate traffic that should not be
intercepted?
You know. in the protected traffic. once you haw done that and you
explore e\'Cry possibility for doing that. vou do it by statute or by ~warrant.
The next step is to say what is the balance between ,vhat is properly
taken out of that and what is not? I agree ,\"it11 vou. I think yoU
are sug-gesting-, ~I:r. Kirbow. when you are all through ,vith that l{ind
of fancy transmission. you're going to hnve a lot of USI?ll?ss stuff that
vou are allowed to take and a lot of stuff that YOU are not allowl?d to
take when you arl? all through. At that point C'ongress and the courts
are g-oing to have to decide whether you are getting too much that is
proteet~d in order to get what you are leg-itimately allowed to take.
:Mr. KIRBOW. Among the methods being- used I do not see when the
production comes you can review it as an aftereffect thing-. I do not see
how you are protecting the "ender and receiver from an interception of
the communication.
~fr. HEY:\L\XX. J would ref]uire some kind of warrant in advance,
unless Cong-ress could handle that by statute. which I do not think the
,,-armnt procedure-I am shooting a little bit from the hip. Mr.
Kirbow. I have only been thinking about it in thE' last few days since
I startE'd looking into it. The warmnt procedure might say a court
would itself pass on the selE'ction criteria and the Congress might say
use qualitative standards. saying the selection criteria shoulrl onlv be
acceptable if they are so designed as to bring in highlv important
information of a forl?ign intelligencl? sort, proportionate in some way
to the im-asion of privacy. Thl?n it could go on and Congress could add
a second paragraph and 8.:'ty, eYen with thE'se selection criteria, it can
only be u"ed if the following measures and minimization are used.
Something like that.
Mr. KlRBOW. Thank vou.
The CHAIRMAN. I think that we all recog-nize that this is a very
complex mattrr when we are dealing with snch advanced and rapidly
changing trchnologies. and it leans us all groping for new wavs to
keep old protections alive. .
I think that yonr testimony has been very forthrig-ht and it has been
yerv hel pfnl. I want to thank VOll for it.
Mr. HEY2IL\XX. Thank von ~'erv mnch.
. The CI.ŁAIRl\1;\N. That conclndps thr hearing today. 'Ye mret again
m a pubhe srSSlOn at the call of the Chair.
['Vhereupon. at 4 :25 p.m.. tIlr hearing in thr abovf'-mcntioned matter
was concluded.]
 

Go to Next Page