[House Report 106-932]
[From the U.S. Government Publishing Office]



106th Congress                                                   Report
                        HOUSE OF REPRESENTATIVES
 2d Session                                                     106-932

======================================================================



 
             ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 2000

                                _______
                                

October 4, 2000.--Committed to the Committee of the Whole House on the 
              State of the Union and ordered to be printed

                                _______
                                

    Mr. Canady, from the Committee on the Judiciary, submitted the 
                               following

                              R E P O R T

                        [To accompany H.R. 5018]

      [Including cost estimate of the Congressional Budget Office]

    The Committee on the Judiciary, to whom was referred the 
bill (H.R. 5018) amending title 18, United States Code, to 
modify certain provisions of law relating to the interception 
of communications, and for other purposes, having considered 
the same, reports favorably thereon with an amendment and 
recommends that the bill as amended do pass.

                           TABLE OF CONTENTS

                                                                  

                                                                 Page
The Amendment..............................................           2
Purpose and Summary........................................           7
Background and Need for the Legislation....................           8
Hearings...................................................          22
Committee Consideration....................................          23
Votes of the Committee.....................................          23
Committee Oversight Findings...............................          27
Committee on Government Reform Findings....................          27
New Budget Authority and Tax Expenditures..................          27
Congressional Budget Office Cost Estimate..................          27
Constitutional Authority Statement.........................          29
Section-by-Section Analysis and Discussion.................          29
Changes in Existing Law Made by the Bill, as Reported......          31
    The amendment is as follows:
    Strike all after the enacting clause and insert the 
following:

SECTION 1. SHORT TITLE.

    This Act may be cited as the ``Electronic Communications Privacy 
Act of 2000''.

SEC. 2. USE AS EVIDENCE.

    (a) In General.--Section 2515 of title 18, United States Code, is 
amended--
            (1) by striking ``wire or oral'' in the heading and 
        inserting ``wire, oral, or electronic''.
            (2) by striking ``Whenever any wire or oral communication 
        has been intercepted'' and inserting ``(a) Except as provided 
        in subsection (b), whenever any wire, oral, or electronic 
        communication has been intercepted, or any electronic 
        communication in electronic storage has been disclosed'';
            (3) by inserting ``or chapter 121'' after ``this chapter''; 
        and
            (4) by adding at the end the following:
    ``(b) Subsection (a) does not apply to the disclosure, before a 
grand jury or in a criminal trial, hearing, or other criminal 
proceeding, of the contents of a communication, or evidence derived 
therefrom, against a person alleged to have intercepted, used, or 
disclosed the communication in violation of this chapter, or chapter 
121, or participated in such violation.''.
    (b) Section 2517.--Paragraphs (1) and (2) of section 2517 are each 
amended by inserting ``or under the circumstances described in section 
2515(b)'' after ``by this chapter''.
    (c) Section 2518.--Section 2518 of title 18, United States Code, is 
amended--
            (1) in subsection (7), by striking ``subsection (d)'' and 
        inserting ``subsection (8)(d)''; and
            (2) in subsection (10)--
                    (A) in paragraph (a)--
                            (i) by striking ``or oral'' each place it 
                        appears and inserting ``, oral, or 
                        electronic'';
                            (ii) by striking the period at the end of 
                        clause (iii) and inserting a semicolon; and
                            (iii) by inserting ``except that no 
                        supresssion may be ordered under the 
                        circumstances described in section 2515(b).'' 
                        before ``Such motion''; and
                    (B) by striking paragraph (c).
    (d) Clerical Amendment.--The item relating to section 2515 in the 
table of sections at the beginning of chapter 119 of title 18, United 
States Code, is amended to read as follows

``2515. Prohibition of use as evidence of intercepted wire, oral, or 
electronic communications.''.

SEC. 3. REPORTS CONCERNING THE DISCLOSURE OF THE CONTENTS OF ELECTRONIC 
                    COMMUNICATIONS.

    Section 2703 of title 18, United States Code, is amended by adding 
at the end the following:
    ``(g) Reports Concerning the Disclosure of the Contents of 
Electronic Communications.--
            ``(1) By January 31 of each calendar year, the judge 
        issuing or denying an order, warrant, or subpoena, or the 
        authority issuing or denying a subpoena, under subsection (a) 
        or (b) of this section during the preceding calendar year shall 
        report on each such order, warrant, or subpoena to the 
        Administrative Office of the United States Courts--
                    ``(A) the fact that the order, warrant, or subpoena 
                was applied for;
                    ``(B) the kind of order, warrant, or subpoena 
                applied for;
                    ``(C) the fact that the order, warrant, or subpoena 
                was granted as applied for, was modified, or was 
                denied;
                    ``(D) the offense specified in the order, warrant, 
                subpoena, or application;
                    ``(E) the identity of the agency making the 
                application; and
                    ``(F) the nature of the facilities from which or 
                the place where the contents of electronic 
                communications were to be disclosed.
            ``(2) In January of each year the Attorney General or an 
        Assistant Attorney General specially designated by the Attorney 
        General shall report to the Administrative Office of the United 
        States Courts--
                    ``(A) the information required by subparagraphs (A) 
                through (F) of paragraph (1) of this subsection with 
                respect to each application for an order, warrant, or 
                subpoena made during the preceding calendar year; and
                    ``(B) a general description of the disclosures made 
                under each such order, warrant, or subpoena, 
                including--
                            ``(i) the approximate number of all 
                        communications disclosed and, of those, the 
                        approximate number of incriminating 
                        communications disclosed;
                            ``(ii) the approximate number of other 
                        communications disclosed; and
                            ``(iii) the approximate number of persons 
                        whose communications were disclosed.
            ``(3) In June of each year, beginning in 2002, the Director 
        of the Administrative Office of the United States Courts shall 
        transmit to the Congress a full and complete report concerning 
        the number of applications for orders, warrants, or subpoenas 
        authorizing or requiring the disclosure of the contents of 
        electronic communications pursuant to subsections (a) and (b) 
        of this section and the number of orders, warrants, or 
        subpoenas granted or denied pursuant to subsections (a) and (b) 
        of this section during the preceding calendar year. Such report 
        shall include a summary and analysis of the data required to be 
        filed with the Administrative Office by paragraphs (1) and (2) 
        of this subsection. The Director of the Administrative Office 
        of the United States Courts is authorized to issue binding 
        regulations dealing with the content and form of the reports 
        required to be filed by paragraphs (1) and (2) of this 
        subsection.''.

SEC. 4. PEN REGISTERS AND TRAP AND TRACE DEVICES.

    (a) Requirement for Showing.--Section 3122(b)(2) of title 18, 
United States Code, is amended to read as follows:
            ``(2) a statement of facts showing that the requirements of 
        section 3123 have been met.''.
    (b) Finding by Court.--Subsection (a) of section 3123 of title 18, 
United States Code, is amended by striking ``the attorney for the 
Government'' and all that follows through the end of such subsection 
and inserting ``specific and articulable facts reasonably indicate that 
a crime has been, is being, or will be committed, and information 
likely to be obtained by such installation and use is relevant to the 
investigation of that crime.''.

SEC. 5. CIVIL DAMAGES.

    Section 2520(c)(2) of title 18, United States Code, is amended--
            (1) by striking ``court may'' and inserting ``court 
        shall'';
            (2) by striking ``greater'' and inserting ``greatest'';
            (3) in subparagraph (A), by striking ``or'' after the 
        semicolon;
            (4) in subparagraph (B), by striking ``whichever is the 
        greater of $100 a day for each day of violation or $10,000.'' 
        and inserting ``$500 a day for each violation; or''; and
            (5) by inserting after subparagraph (B), the following:
            ``(C) statutory damages of $10,000.''.

SEC. 6. NOTIFICATION.

    Section 2705(a)(4) of title 18, United States Code, is amended by 
striking ``or by certification by a governmental entity, but only in 
accordance with subsection (b) of this section.'' and inserting ``if 
the court determines that there is reason to believe that notification 
of the existence of the court order or subpoena may have an adverse 
result described in paragraph (2) of this subsection.''.

SEC. 7. GOVERNMENT ACCESS TO LOCATION INFORMATION.

    (a) Court Order Required.--Section 2703 of title 18, United States 
Code, as amended by section 3 of this Act, is further amended by adding 
at the end the following:
    ``(h) Disclosure of Location Information to Governmental 
Entities.--
            ``(1) Disclosure upon court order.--Except as provided in 
        paragraph (2), a provider of mobile electronic communication 
        service shall provide to a governmental entity information 
        generated by and disclosing the current physical location of a 
        subscriber's equipment only if the governmental entity obtains 
        a court order issued upon a finding that there is probable 
        cause to believe that--
                    ``(A) a person is committing, has committed, or is 
                about to commit a felony offense; and
                    ``(B) the location information sought to be 
                obtained concerns the location of the person believed 
                to have committed, be committing, or be about to commit 
                that offense or a victim of that offense.
            ``(2) Permitted disclosures without court order.--A 
        provider of mobile electronic communication service may provide 
        information described in paragraph (1)--
                    ``(A) to a public safety answering point, emergency 
                medical service provider or emergency dispatch 
                provider, public safety, fire service or law 
                enforcement official, or hospital emergency or trauma 
                care facility, in order to respond to the user's call 
                for emergency services;
                    ``(B) to inform the user's legal guardian or 
                members of the user's immediate family of the user's 
                location in an emergency situation that involves the 
                risk of death or serious physical harm; or
                    ``(C) with the express consent of the subscriber or 
                the user of the equipment concerned.
            ``(3) Definition.--The term `public safety answering point' 
        means a facility that has been designated to receive emergency 
        calls and route them to emergency service personnel.''.
    (b) Conforming Amendment.--Subsection (c)(1)(A) of section 2703 of 
title 18, United States Code, is amended by striking ``(b) of this 
section'' and inserting ``(b), or wireless location information covered 
by subsection (g)''.

SEC. 8. COMPUTER CRIME AMENDMENTS.

    (a) Generally.--Section 1030 of title 18, United States Code, is 
amended--
            (1) in subsection (a)(3), by striking ``such a computer'' 
        and inserting ``without or in excess of authorization a 
        computer'';
            (2) in subsection (a)(5), by inserting after subparagraph 
        (C) the following:
            ``(B) whose conduct described in clause (i), (ii), or (iii) 
        of subparagraph (A)--
                    ``(i) caused loss to one or more persons during any 
                one-year period (including loss resulting from a 
                related course of conduct affecting one or more other 
                protected computers) aggregating at least $5,000;
                    ``(ii) modified or impaired, or potentially 
                modified or impaired, the medical examination, 
                diagnosis, treatment, or care of one or more 
                individuals;
                    ``(iii) caused physical injury to any individual;
                    ``(iv) threatened public health or safety;
                    ``(v) caused damage affecting a computer system 
                used by or for a government entity in furtherance of 
                the administration of justice, national defense, or 
                national security; or
                    ``(vi) intentionally defaced, damaged, or destroyed 
                images or information made available to the public and 
                thereby interfered with the rights protected under the 
                First Amendment to the Constitution;''.
            (3) in subsection (a)(5)(A), by inserting ``(i)'' after 
        ``(5)(A)'';
            (4) in subsection (a)(5)(B), by striking ``(B)'' and 
        inserting ``(ii)'';
            (5) in subsection (a)(5)(C)--
                    (A) by striking ``(C)'' and inserting ``(iii)''; 
                and
                    (B) by inserting ``and'' after the semicolon;
            (6) in subsection (a)(7), by striking ``, firm, 
        association, educational institution, financial institution, 
        government entity, or other legal entity,'';
            (7) in subsection (b), by adding before the period ``as if 
        such person had committed the completed offense'';
            (8) in subsection (c)(1)(A) and (B), by striking ``, or an 
        attempt to commit an offense punishable under this 
        subparagraph'';
            (9) in subsection (c)(1)(A), by inserting ``, (a)(5)(A)(i), 
        or (a)(5)(A)(ii)'' after ``(a)(1)'';
            (10) by amending subsection (c)(2)(A) to read as follows:
            ``(2)(A) except as provided in subsection (c)(2)(B), a fine 
        under this title or imprisonment for not more than one year, or 
        both, in the case of an offense under subsection (a)(2), 
        (a)(3), (a)(5)(A)(iii), or (a)(6) of this section which does 
        not occur after a conviction for another offense under this 
        section;'';
            (11) by striking subparagraph (C) of subsection (c)(2);
            (12) in subsection (c)(3)--
                    (A) by striking ``(3)(A)'' and inserting ``(3)'';
                    (B) by striking ``, (a)(5)(A), (a)(5)(B),'';
                    (C) by striking ``, or an attempt to commit an 
                offense punishable under this subparagraph; and'' and 
                inserting ``; and''; and
                    (D) by striking subparagraph (B) and inserting:
            ``(4) a fine under this title or imprisonment for not more 
        than ten years, or both, in the case of an offense under 
        subsection (a)(2), (a)(3), (a)(4), (a)(5), (a)(6), or (a)(7) of 
        this section which occurs after a conviction for another 
        offense under this section.'';
            (13) in subsection (d)--
                    (A) by striking ``subsections (a)(2)(A), (a)(2)(B), 
                (a)(3), (a)(4), (a)(5), and (a)(6) of''; and
                    (B) by striking ``which shall be entered into by'' 
                and inserting ``between'';
            (14) in subsection (e)(7), by striking ``and'' after the 
        semicolon;
            (15) in subsection (e)(8), by striking all after 
        ``information'' and inserting a semicolon;
            (16) in subsection (e)(9), by striking the period at the 
        end and inserting a semicolon;
            (17) by inserting the following after subsection (e)(9):
            ``(10) the term `conviction for another offense under this 
        section' includes a State conviction for a crime punishable by 
        imprisonment for more than 1 year, an element of which is 
        unauthorized access, or exceeding authorized access, to a 
        computer;
            ``(11) the term `loss' means any reasonable cost to any 
        victim, including responding to the offense, conducting a 
        damage assessment, restoring any data, program, system, or 
        information to its condition before the offense, and any 
        revenue lost or costs incurred because of interruption of 
        service; and
            ``(12) the term `person' includes any individual, firm, 
        association, educational institution, financial institution, 
        corporation, company, partnership, government entity, or other 
        legal entity.'';
            (18) by amending subsection (g) to read as follows:
    ``(g) Except as herein provided, any person who suffers damage or 
loss by reason of a violation of this section may maintain a civil 
action against the violator to obtain compensatory damages and 
injunctive or other equitable relief. A suit for a violation of 
subsection (a)(5) may be brought only if the conduct involves one or 
more of the factors enumerated in subsection (a)(5)(B). No action may 
be brought under this subsection unless such action is begun within 2 
years of the date of the act complained of or the date of the discovery 
of the damage.''; and
            (19) by adding the following subsection after subsection 
        (h):
    ``(i)(1) The court, in imposing sentence on any person convicted of 
a violation of this section, shall order, in addition to any other 
sentence imposed and irrespective of any provision of State law, that 
such person forfeit to the United States--
            ``(A) such person's interest in any personal property that 
        was used or intended to be used to commit or to facilitate the 
        commission of such violation; and
            ``(B) any property, real or personal, constituting or 
        derived from, any proceeds that such person obtained, directly 
        or indirectly, as a result of such violation.
    ``(2) The criminal forfeiture of property under this subsection, 
any seizure and disposition thereof, and any administrative or judicial 
proceeding in relation thereto, shall be governed by the provisions of 
section 413 of the Comprehensive Drug Abuse Prevention and Control Act 
of 1970 (21 U.S.C. 853), except subsection (d) of that section.''.
    (b) Sentencing Commission.--Section 805(c) of the Antiterrorism and 
Effective Death Penalty Act of 1996 (Public Law 104-132; 28 U.S.C. 994 
note) is amended by striking ``shall amend the sentencing guidelines to 
ensure any individual convicted of a violation of paragraph (4) or 
(5)'' and inserting ``shall amend the sentencing guidelines to ensure 
any individual convicted of a violation of paragraph (4) or a felony 
violation of paragraph (5)(A)(i) (but not of paragraph (5)(A)(ii) or 
(5)(A)(iii))''.

SEC. 9. INTERCEPTION OF WIRE, ORAL, AND ELECTRONIC COMMUNICATIONS 
                    AMENDMENTS.

    Chapter 119 of title 18, United States Code, is amended--
            (1) in section 2510(10), by striking ``153(h)'' and 
        inserting ``153(10)'';
            (2) in section 2516(1), by striking ``wire or oral'' and 
        inserting ``wire, oral, or electronic'';
            (3) in the first paragraph (p) of section 2516(1), by 
        inserting ``section 1030 (relating to computer fraud and 
        abuse), section 1362 (relating to destruction of government 
        communications facilities),'' after ``identification 
        documents),''; and
            (4) in section 2516(1), by redesignating the second 
        paragraph (p) as paragraph (q).

SEC. 10. AMENDMENTS TO THE ELECTRONIC COMMUNICATIONS PRIVACY ACT.

    (a) Penalties for Unlawful Access to Stored Communications.--
Section 2701 of title 18, United States Code, is amended--
            (1) in subsection (b)(1)--
                    (A) by striking ``purposes of'' and inserting ``a 
                tortious or illegal purpose,'';
                    (B) in subparagraph (A), by striking ``one year'' 
                and inserting ``three years''; and
                    (C) in subparagraph (B), by striking ``two'' and 
                inserting ``five''; and
            (2) by amending subsection (b)(2) to read as follows:
            ``(2) in any other case--
                    ``(A) a fine under this title or imprisonment for 
                not more than one year, or both, in the case of a first 
                offense under this subparagraph; and
                    ``(B) a fine under this title or imprisonment for 
                not more than five years, or both, for any subsequent 
                offense under this subparagraph.''.
    (b) Voluntary Disclosure of Customer Communications or Records.--
Section 2702 of title 18, United States Code, is amended--
            (1) by amending the catchline to read as follows:

``Sec. 2702. Voluntary disclosure of customer communications or 
                    records'';

            (2) in subsection (a)(1)--
                    (A) by striking ``person or entity providing an'' 
                and inserting ``provider of''; and
                    (B) by striking ``and'' at the end;
            (3) in subsection (a)(2)--
                    (A) by striking ``person or entity providing'' and 
                inserting ``provider of''; and
                    (B) by striking the period at the end and inserting 
                ``; and'';
            (4) in subsection (a), by adding the following paragraph 
        after paragraph (2):
            ``(3) a provider of remote computing service or electronic 
        communication service to the public shall not knowingly divulge 
        a record or other information pertaining to a subscriber to or 
        customer of such service (not including the contents of 
        communications covered by paragraph (1) or (2) of this 
        subsection) to any governmental entity.'';
            (5) in the heading of subsection (b) by inserting ``for 
        Disclosure of Communications'' after ``Exceptions'';
            (6) in subsection (b), by striking ``person or entity'' and 
        inserting ``provider described in subsection (a)''; and
            (7) by adding the following subsection after subsection 
        (b):
    ``(c) Exceptions for Disclosure of Customer Records.--A provider 
described in subsection (a) may divulge a record or other information 
pertaining to a subscriber to or customer of such service (not 
including the contents of communications covered by subsection (a)(1) 
or (a)(2) of this section)--
            ``(1) as otherwise authorized in section 2703 of this 
        title;
            ``(2) with the lawful consent of the customer or 
        subscriber;
            ``(3) as may be necessarily incident to the rendition of 
        the service or to the protection of the rights or property of 
        the provider of that service;
            ``(4) to a governmental entity, if the provider reasonably 
        believes that an emergency involving immediate danger of death 
        or serious physical injury to any person justifies disclosure 
        of the information; or
            ``(5) to any person other than a governmental entity where 
        not otherwise prohibited by law.''.
    (c) Conforming Amendments.--Section 2703 of title 18, United States 
Code, as amended by section 7 of this Act, is futher amended--
            (1) in subsection (c) by--
                    (A) redesignating paragraph (2) as paragraph (3); 
                and
                    (B) redesignating subparagraph (C) of paragraph (1) 
                as paragraph (2);
            (2) in subsection (c)(1) by--
                    (A) striking ``(A) Except as provided in 
                subparagraph (B),'' and inserting ``A governmental 
                entity may require'';
                    (B) striking ``may disclose'' and inserting ``to 
                disclose''; and
                    (C) striking ``to any person other than a 
                governmental entity.'';
                    (D) striking ``(B) A provider of'' through ``to a 
                governmental entity'';
                    (E) redesignating subclauses (i) through (iv) as 
                subparagraphs (A) through (D);
                    (F) striking ``or'' at the end of subparagraph (C) 
                as redesignated;
                    (G) striking the period at the end of subparagraph 
                (D) as redesignated and inserting ``; or''; and
                    (H) adding the following subparagraph after 
                subparagraph (D) as redesignated:
            ``(E) seeks information pursuant to paragraph (2).''; and
            (3) in subsection (c)(2) as redesignated by--
                    (A) striking ``an administrative subpoena 
                authorized by a Federal or State statute or a Federal 
                or State grand jury or trial subpoena'' and inserting 
                ``a Federal or State grand jury or trial subpoena, or a 
                subpoena or equivalent process authorized by a Federal 
                or State statute,''; and
                    (B) striking ``subparagraph (B).'' and inserting 
                ``paragraph (1).''.
    (d) Civil Damages.--Section 2707(c) of title 18, United States 
Code, is amended by striking ``$1,000'' and inserting ``$5,000''.
    (e) Clerical Amendment.--The item relating to section 2702 in the 
table of sections at the beginnning of chapter 121 of title 18, United 
States Code, is amended to read as follows:

``2702. Voluntary disclosure of customer communications or records.''.

SEC. 11. ADDITIONAL PROVISIONS RELATING TO PEN REGISTERS.

    (a) Emergency Provisions.--Section 3125 of title 18, United States 
Code, is amended--
            (1) in subsection (a)(1)--
                    (A) in subparagraph (A), by striking ``or'' after 
                the semicolon;
                    (B) in subparagraph (B), by striking the comma 
                after ``crime'' and inserting a semicolon; and
                    (C) by inserting after subparagraph (B), the 
                following:
                    ``(C) an immediate threat to a national security 
                interest; or
                    ``(D) an ongoing attack on the integrity or 
                availability of a protected computer in violation of 
                section 1030(a)(5)(A)(i) or 1030(a)(5)(A)(ii) of this 
                title,'';
            (2) at the end of the matter following subsection (a)(2), 
        by inserting the following: ``In the event an application for 
        such order is denied, or in any other case where the 
        installation and use of a pen register or trap and trace device 
        is terminated without an order having been issued, any 
        information obtained by such installation and use shall be 
        treated as having been obtained in violation of this chapter, 
        and an inventory shall be served as provided for in subsection 
        (b) of this section on the person named in the application.'';
            (3) by inserting the following after subsection (a):
    ``(b) Within a reasonable time but not later than 90 days after the 
filing of an application for an order of approval under subsection 
(a)(2) of this section which is denied, the denying judge shall cause 
to be served, on the persons named in the order or the application, and 
such other parties to the information obtained by such installation and 
use of a pen register or trap and trace device as the judge may 
determine in his discretion is in the interest of justice, an inventory 
which shall include notice of--
            ``(1) the fact of the entry of the application;
            ``(2) the date of the entry and the date of the denial of 
        the application; and
            ``(3) the fact that during the period covered by the 
        application, information was obtained by the installation and 
        use of a pen register or trap and trace device.
The judge, upon the filing of a motion, may in his discretion make 
available to such person or his counsel for inspection such portions of 
the applications as the judge determines to be in the interest of 
justice. On an ex parte showing of good cause to a judge of competent 
jurisdiction the serving of the inventory required by this subsection 
may be postponed.''; and
            (4) by redesignating subsections (b) through (d) as 
        subsections (c) through (e), respectively.
    (b) Definitions.--Section 3127 of title 18, United States Code, is 
amended--
            (1) in paragraph (6), by striking the period and inserting 
        ``; and''; and
            (2) by adding the following paragraph after paragraph (6):
            ``(7) the term `protected computer' has the meaning set 
        forth in section 1030 of this title.''.

SEC. 12. GOVERNMENT ACCESS TO CONTENTS OF STORED ELECTRONIC 
                    COMMUNICATIONS.

    Section 2703(a) of title 18, United States Code, is amended by 
striking ``one hundred and eighty days'' each place it appears and 
inserting ``one year''.

SEC. 13. ENHANCED PRIVACY PROTECTION FOR INFORMATION ON COMPUTER 
                    NETWORKS.

    Section 2510(17) of title 18, United States Code, is amended--
            (1) by striking ``and'' at the end of subparagraph (A); and
            (2) by inserting at the end the following:
                    ``(C) any storage of an electronic communication by 
                an electronic communication service without regard to 
                whether the communication has been accessed by the 
                intended recipient; and''.

                          Purpose and Summary

    H.R. 5018 balances the need for privacy and effective law 
enforcement in the digital age. H.R. 5018 protects privacy by 
raising the standard for the government's access to the 
transactional data regarding a person's communications obtained 
with so-called pen register or trap and trace devices; 
requiring the Federal Government to report annually on the 
number of requests it makes to disclose the contents of stored 
electronic communications; expanding the statutory exclusionary 
rule to also exclude from use in evidence at trial electronic 
communications--including electronic communications such as e-
mail that lies in storage with an electronic communications 
service--obtained in violation of Federal law, just as 
illegally obtained wire and oral electronic communications are 
currently excluded, while also allowing the use of such 
communications against those who illegally obtained them; 
prohibiting the government from obtaining a mobile phone user's 
location without first obtaining a court order based on 
probable cause, except in the case of certain emergency 
situations; requiring high-level Department of Justice approval 
for interceptions of electronic communications, as is currently 
required for interceptions of wire and oral communications; 
increasing the civil penalties that may be applied to those who 
illegally intercept electronic communications by raising the 
daily damages for each violation; making clear that protections 
of electronic communications in electronic storage cover e-mail 
messages that have been accessed by the intended recipient but 
remain stored by an electronic communications service; and 
extending the protection of a warrant requirement to electronic 
communications stored for 1 year or less.
    H.R. 5018 helps law enforcement capture criminals in the 
computer age by allowing electronic communications service 
providers to disclose to law enforcement basic customer 
records, such as those including names and addresses, in 
certain emergency situations; allowing law enforcement to use 
devices that track the source and destination of criminal 
communications without a court order for up to 48 hours in 
situations involving national security and ongoing attacks on 
computer networks, but also requires that, if a court finds law 
enforcement had an insufficient basis to conduct the 
monitoring, the judge must order that the person whose 
communications were wrongfully tracked be notified; adding 
computer crimes to the enumerated offenses for which 
interceptions may be ordered; raising the maximum penalty for 
the most serious computer violations to 10 years in prison; 
allowing the Federal investigation and prosecution of those who 
deface or destroy information or images on computer systems 
without causing $5,000 in damages; amending the Federal 
sentencing guidelines such that only the most serious computer-
related offenses are subject to a mandatory 6-month sentence; 
increasing criminal and civil penalties for the illegal 
disclosure of stored electronic communications; and applying 
criminal asset forfeiture provisions to computer crimes.

                Background and Need for the Legislation

    Seventy years ago, Justice Brandeis, in his dissenting 
opinion in Olmstead v. United States, 277 U.S. 438, 474 (1928) 
(Brandeis, J., dissenting), predicted that ongoing 
technological developments would someday enable law enforcement 
to search people or their property without physical trespass. 
He also cautioned that courts should be alert to these changes 
in technology in determining the contours of privacy rights. 
See id. at 472-73. Today, advances in telecommunications 
technology have dramatically changed people's lives. Internet 
technology has increased in popularity and has significantly 
changed the way people handle their affairs, and consequently 
the government's handling of personal communications.\1\
---------------------------------------------------------------------------
    \1\ As stated in a recent White House Working Group Report, 
``Regulation tied to a particular technology may quickly become 
obsolete and require further amendment. In particular, laws written 
before the widespread use of the Internet may be based on assumptions 
regarding then-current technologies and thus may need to be clarified 
or updated to reflect new technological capabilities or realities.'' 
The Electronic Frontier: The Challenge of Unlawful Conduct Involving 
the Use of the Internet, Report by the President's Working Group on 
Unlawful Conduct on the Internet (hereinafter ``Report'') at 13.
---------------------------------------------------------------------------

                       Privacy in the Digital Age

    The dramatic development of the Internet has transformed 
methods of gathering, processing and sharing information. In 
1981, fewer than 300 computers were linked to the Internet. See 
Reno v. ACLU, 929 F. Supp. 824, 831 (E.D. Pa. 1996). In 1986--
when the Electronic Communications Privacy Act became law--
there were about 50,000. See id. By June 1996, there were over 
9.4 million host computers worldwide linked to the Internet. A 
recent report by a White House Working Group states that:

        There can be little doubt that the Internet, a global 
        electronic network of computer networks (including the 
        World Wide Web) that connects people and information, 
        has revolutionized and will continue to revolutionize 
        how we communicate, educate ourselves, and buy and sell 
        goods and services. The Internet has grown from 65 
        million users in 1998 to over 100 million users in the 
        U.S. in 1999, or half the country's adult population; 
        the number of Internet users in the U.S. is projected 
        to reach 177 million by the end of 2003; and the number 
        of Internet users worldwide is estimated to reach 502 
        million by 2003. Business-to-business electronic 
        commerce totaled over $100 billion in 1999 (more than 
        doubling from 1998) and is expected to grow to over $1 
        trillion by 2003.

Report, at 5.
    The dramatic development of the Internet as a networked 
global communications medium, the expansion in the range of 
transactions that occur ``on-line,'' and the amount of 
information now stored with third party Internet companies have 
produced a qualitative change in the nature of communications 
and, accordingly, in the nature and amount of the information 
that may be exposed to interception by the government.\2\
---------------------------------------------------------------------------
    \2\ As stated in the Report:

      Indeed, computers have made it possible for law enforcement 
      agencies to gather some information that may not have been 
      previously even maintained in the physical world. For 
      example, an unsophisticated offender, even after 
      ``deleting'' computer files (as opposed to destroying paper 
      records), might leave evidence of unlawful activity that a 
      trained computer forensic expert could recover. In 
      addition, because an average computer with several 
      gigabytes of memory can contain millions of pages of 
      information, a law enforcement agent might, pursuant to 
      lawful authority (such as a warrant), find volumes of 
      information in one place. Of course, that information is 
      only useful if there are trained computer experts on hand 
      in a timely fashion, familiar with the relevant computer 
      hardware or software configuration, to search the computer 
      for specific information and to retrieve it in readable 
---------------------------------------------------------------------------
      form.

Report, at 11.
    In light of these developments, existing statutes should be 
updated to appropriately balance the concerns of law 
enforcement--namely, the concern that they have sufficient 
authority to obtain the information they need in order to keep 
the public safe--with individuals' concerns that a sufficient 
degree of privacy and the integrity of personal information are 
maintained in an age of modern communications and information 
storage.

           The Electronic Communications Privacy Act of 1986

    Congress initially responded to the emergence of wireless 
communication services and the digital era by enacting the 
Electronic Communications Privacy Act (``ECPA'') in 1986. See 
Electronic Communications Privacy Act of 1986, Pub. L. No. 99-
508, 100 Stat. 1848 (codified in sections of 18 U.S.C. 
including Sec. Sec. 2510-21, 2701-10, 3121-26). The Federal 
wiretap statute had been limited to voice communications. ECPA 
extended the wiretap provisions to include wireless voice 
communications and electronic communications such as e-mail or 
other computer-to-computer transmissions.\3\ ECPA was intended 
to reestablish the balance between privacy and law enforcement, 
which Congress found had been upset to the detriment of privacy 
by the development of communications and computer technology 
and changes in the structure of the telecommunications 
industry. Among the developments noted by Congress were 
``large-scale electronic mail operations, cellular and cordless 
phones, paging devices, miniaturized transmitters for radio 
surveillance, and a dazzling array of digitized networks.'' 
H.R. Rep. No. 99-647, at 18 (1986). Privacy, Congress 
concluded, was in danger of being gradually eroded as 
technology advanced. S. Rep. No. 99-541, at 2-3, 5 (1986); H.R. 
Rep. No. 99-647, at 16-19 (1986). See also H.R. Rep. No. 99-
647, at 18 (stating that ``[l]egal protection against the 
unreasonable use of newer surveillance techniques has not kept 
pace with technology. '').
---------------------------------------------------------------------------
    \3\ ECPA, in fact, did not extend all of the Federal wiretap 
protections to electronic communications. The court order authorizing 
the interception of electronic communications can be based upon 
suspected violations of any Federal felony, rather than the limited 
list of crimes that can serve as a predicate for telephone 
interceptions. See 18 U.S.C Sec. 2516(3). In addition, no statutory 
exclusionary rule applies to non-voice interceptions that violate 
procedures required by statute. See 18 U.S.C. Sec. 2515 (exclusionary 
rule only refers to wire or oral communications, not electronic 
communications).
---------------------------------------------------------------------------
    In addition to the goals of privacy and law enforcement, 
ECPA sought to advance the goal of supporting the development 
and use of these new technologies and services. See S. Rep. No. 
99-541, at 5 (noting that legal uncertainty over the privacy 
status of new forms of communications ``may unnecessarily 
discourage potential customers from using innovative 
communications systems ''). It was the intent of Congress to 
encourage the proliferation of new communications technologies, 
but it recognized that consumers would not trust new 
technologies if the privacy of those using them was not 
protected. See S. Rep. No. 99-541, at 5 (1986); H.R. Rep. No. 
99-647, at 19 (1986).
    ECPA was designed to provide rules for government 
surveillance in the modern age. However, technology has evolved 
in unanticipated ways. The interactive nature of the Internet, 
now including elements such as home banking and telecommuting, 
has produced an environment in which many people may spend 
hours each day ``on-line.'' In this context, a person's 
electronic communications will encompass much more today than 
it would have in 1986.
    A thorough examination of the effects of ECPA's rules 
governing governmental access to e-mail and other computer 
communications is made difficult because there is no publicly 
available data on which to base such an assessment. While the 
Federal wiretap provisions require very detailed reports on 
interception of voice communications and interception of e-mail 
in transit, see 18 U.S.C. Sec. 2519, there is no similar 
requirement for collecting and publishing information on the 
extent of government access to e-mail and other electronic 
communications while they are being stored by service providers 
following their transmission.\4\
---------------------------------------------------------------------------
    \4\ Requirements regarding law enforcement's ``interception'' of 
electronic communications apply only to real-time monitoring of 
communications. As most electronic communications are stored 
immediately after their transmission, communications recovery of stored 
electronic communications is by far the easier and presumably the more 
common means of government's accessing electronic communications.
---------------------------------------------------------------------------

  Government Access to Electronic Information Stored By Third Parties

    In regard to e-mail and other electronic communications, 
ECPA has two purposes. First, ECPA outlaws most unauthorized 
private access to stored electronic communications. See 18 
U.S.C. Sec. 2701. Second, ECPA provides prerequisites for 
government access. See 18 U.S.C. Sec. 2703.
    Although ECPA provides some protection for e-mail and other 
forms of ``electronic communication'' held in ``electronic 
storage,'' the law does not provide stored communications the 
same level of protection from government access that is 
afforded to wire or electronic communications in transit. See 
18 U.S.C. Sec. Sec. 2701-2711. Government access to 
communications in transit requires an intercept order issued 
pursuant to strict requirements.\5\ However, in order for the 
government to immediately seize any ``electronic 
communications'' \6\ in ``electronic storage'' \7\ for 180 days 
or less requires only an ordinary warrant, and seizure of 
electronic communications in storage for more than 180 days \8\ 
on an ``electronic communications service,'' \9\ requires only 
a subpoena or an order issued pursuant to an offering of 
``specific and articulable'' facts showing reasonable grounds 
to believe that the contents of an ``electronic communication'' 
are relevant to an ongoing criminal investigation. See 18 
U.S.C. Sec. Sec. 2703(a); 2703(b)(B)(ii); 2703(d). Thus, if the 
same information were stored in a home file cabinet for more 
than 180 days, Federal officials would be required to obtain a 
warrant after a stringent showing of ``probable cause'' to 
retrieve the information. 18 U.S.C. Sec. 2703; 18 U.S.C. 
Sec. 2516. A warrant is also not required for the government to 
obtain the contents of electronic communications in a ``remote 
computing service.'' See 18 U.S.C. Sec. Sec. 2703(b); 2703(d); 
2711(2) (the term ``remote computing service'' means ``the 
provision to the public of computer storage or processing 
services by means of an electronic communications system''). 
Consequently, if the same information is stored by a third 
party in electronic form--unbeknownst to the deliverer or 
receiver of the information--rather than in a home file 
cabinet, Federal officials would be required to obtain a 
subpoena or an order, see 18 U.S.C. Sec. 2703(b)(B)(ii), 
following a less rigorous showing of need, to retrieve this 
same information and subject to a delay in notice to the target 
for up to 90 days if a court determines that notification may, 
among other things, ``seriously jeopardize an investigation.'' 
18 U.S.C. Sec. 2705.
---------------------------------------------------------------------------
    \5\ See 18 U.S.C. Sec. 2518(3) (requiring for a court order that 
``(a) there is probable cause for belief that an individual is 
committing, has committed, or is about to commit a particular 
[enumerated] offense . . .; (b) there is probable cause for belief that 
particular communications concerning that offense will be obtained 
through such interception; (c) normal investigative procedures have 
been tried and have failed or reasonably appear to be unlikely to 
succeed if tried or to be too dangerous; (d) . . . there is probable 
cause for belief that the facilities from which, or the place where, 
the wire, oral, or electronic communications are to be intercepted are 
being used, or are about to be used, in connection with the commission 
of such offense, or are leased to, listed in the name of, or commonly 
used by such person'').
    \6\ See 18 U.S.C. Sec. 2510(12) (``electronic communication'' 
means, with certain exceptions, ``any transfer of signs, signals, 
writing, images, sounds, data, or intelligence of any nature 
transmitted in whole or in part by a wire, radio, electromagnetic, 
photoelectronic or photooptical system that affects interstate or 
foreign commerce'').
    \7\ See 18 U.S.C. Sec. 2510(17) (``electronic storage'' means ``(A) 
any temporary, intermediate storage of a wire or electronic 
communication incidental to the electronic transmission thereof; and 
(B) any storage of such communication by an electronic communication 
service for purposes of backup protection of such communication''). 
``[A]ny temporary, intermediate storage'' describes an e-mail message 
that is being held by a third party Internet service provider until it 
is requested to be read.
    \8\ If the communication has been in electronic storage for 180 
days or less, the government must obtain a warrant. See 18 U.S.C. 
Sec. 2703(a).
    \9\ See 18 U.S.C. Sec. 2510(15) (``electronic communication 
service'' means ``any service which provides to users thereof the 
ability to send or receive wire or electronic communications'').
---------------------------------------------------------------------------

    H.R. 5018 Would Require the Federal Government to Report Basic 
    Information Regarding Its Requests for the Disclosure of Stored 
                       Electronic Communications

    Personal information in people's homes and file cabinets 
are protected by a warrant requirement and it is clear when the 
government searches through such materials pursuant to a 
warrant. Today, as much of that very same information 
gravitates toward new locations on the Internet's landscape, 
such as the networks of Internet service providers and other 
third parties, it is available to law enforcement under lower 
legal standards, without contemporaneous notice, and often 
without any notice at all in the case of innocent parties whose 
stored electronic communications have been disclosed. See 18 
U.S.C. Sec. Sec. 2703; 2705. In order to provide some 
opportunity for oversight, H.R. 5018 would require the Federal 
Government to produce annual reports regarding its requests for 
orders for the disclosure of the contents of electronic 
communications, such as the contents of stored e-mails, similar 
to but less detailed than the disclosure requirements the 
Federal Government must meet under 18 U.S.C. Sec. 2519 
regarding the use of electronic wiretaps to intercept telephone 
conversations. H.R. 5018 provides for the enumeration of basic 
information relating to requests for the disclosure of the 
contents of stored electronic communications under 18 U.S.C. 
Sec. Sec. 2703(a) and (b)--such as the number of such requests 
made and the approximate number of incriminating and non-
incriminating communications disclosed--to help further 
Congress' oversight responsibilities and provide the public 
with a certain level of comfort that the disclosure of the 
contents of electronic communications is reasonably 
proportionate to the needs of law enforcement. These reporting 
requirements will not unduly burden law enforcement.
    The committee recognizes that this bill imposes reporting 
requirements on the Administrative Office of the U.S. Courts 
that will require the hiring of four additional analysts. This 
committee urges Congress to appropriate sufficient funds for 
the Administrative Office of the U.S. Courts to comply with the 
reporting requirements contained in this bill.

   H.R. 5018 Raises the Standard the Government Must Meet to Obtain 
                 Information Under the Pen Register Act

    H.R. 5018 would also amend the standard that must be met by 
the government before transactional information, such as the 
numbers dialed to and from a telephone, may be obtained under 
the Pen Register Act.
    The Pen Register Act, enacted when the telephone was the 
predominant mode of distance communication, currently allows 
the government to obtain, with a so-called ``pen register,'' 
the ``electronic or other impulses which identify the numbers 
dialed or otherwise transmitted on the telephone line'' and, 
with a so-called ``trap and trace device,'' the ``electronic or 
other impulses which identify the originating number'' of the 
device from which a wire or electronic communication was 
transmitted. 18 U.S.C. Sec. Sec. 3127(3); 3127(4). The 
government can obtain this information if a government attorney 
has simply ``certified'' to the court ``that the information 
likely to be obtained by such installation and use [of the pen 
register or trap and trace device] is relevant to an ongoing 
criminal investigation.'' 18 U.S.C. Sec. 3123(a). Upon such 
``certification'' by a government official, the court ``shall'' 
issue the order. 18 U.S.C. Sec. 3123(a).
    Authority under the Pen Register Act is also used by the 
government to obtain e-mail addresses sent and received.\10\ 
Officials from the Justice Department and the Federal Bureau of 
Investigation have testified before the Constitution 
Subcommittee that the Pen Register Act grants the government 
the authority to capture e-mail addresses as well as telephone 
numbers. See Hearing Transcript, ``Fourth Amendment Issues 
Raised by the FBI's `Carnivore' Program'' (July 24, 2000) at 
37-39 (testimony of Dr. Donald Kerr, Director, Lab Division, 
Federal Bureau of Investigation, and Christopher Painter, 
Deputy Chief, Computer Crimes and Intellectual Property 
Section, Department of Justice). Unlike a telephone number, 
however, an e-mail address often indicates not only the 
identity of the person communicating, but also their place of 
work, as in the e-mail address [email protected].
---------------------------------------------------------------------------
    \10\ Although the authority for such use of pen registers is not 
without doubt, H.R. 5018 does not attempt to resolve this debate.
---------------------------------------------------------------------------
    H.R. 5018 would require that, before a pen register or trap 
and trace device could be ordered installed, the government 
must first demonstrate to an independent judge that ``specific 
and articulable facts reasonably indicate that a crime has 
been, is being, or will be committed, and information likely to 
be obtained by such installation and use [of a pen register or 
trap and trace device] is relevant to an investigation of that 
crime.'' The standard that ``specific and articulable facts 
reasonably indicate that a crime has been, is being, or will be 
committed'' is well supported in the law, and in current 
practice. Indeed, the standard is that which the nation's 
primary investigative agency, the Federal Bureau of 
Investigation, must meet each time it initiates an 
investigation.
    The Attorney General's Guidelines on General Crimes, 
Racketeering Enterprise and Domestic Security/Terrorism 
Investigations (``Guidelines''), as in effect today and last 
revised by Attorney General Thornburgh in March, 1989, apply to 
the Federal Bureau of Investigation, which the Guidelines 
describes as ``the primary investigative agency in the Federal 
Government.'' Guidelines, at 1. The Guidelines state:

        Investigations by the FBI are premised upon the 
        important duty of government to protect the public 
        against general crimes, against organized criminal 
        activity, and against those who would engage in 
        political or racial terrorism or would destroy our 
        constitutional system through criminal violence. At the 
        same time, that duty must be performed with care to 
        protect individual rights and to ensure that 
        investigations are confined to matters of legitimate 
        law enforcement interest . . . [I]nvestigations 
        governed by these Guidelines are conducted for the 
        purpose of preventing, detecting, or prosecuting 
        violations of Federal law. They shall be conducted with 
        as little intrusion into the privacy of individuals as 
        the needs of the situation permit.

Id. at 1, 3.
    The Guidelines make clear that certain types of 
investigative techniques ``shall not'' be used prior to 
initiating an investigation, including ``mail covers'' and 
``[n]onconsensual electronic surveillance.'' Id. at 5. The 
Guidelines also make clear that ``[a] general crimes 
investigation may be initiated by the FBI'' only when ``facts 
or circumstances reasonably indicate that a Federal crime has 
been, is being, or will be committed.'' Id. at 7.\11\ Further, 
the Guidelines state that ``[t]he standard of `reasonable 
indication' is substantially lower than probable cause . . . 
However, the standard does require specific facts or 
circumstances indicating a past, current, or impending 
violation. There must be an objective, factual basis for 
initiating the investigation; a mere hunch is insufficient.'' 
Id. (Emphasis added).\12\
---------------------------------------------------------------------------
    \11\ Current law requires that an order permitting the installation 
and use of a pen register or trap and trace device be granted only when 
there is ``an ongoing criminal investigation.'' 18 U.S.C. Sec. 3123(a).
    \12\ The phrase ``specific and articulable facts'' is also a 
central part of the Supreme Court's opinion in Terry v. Ohio, 392 U.S. 
1, 21 (1968), and it has been seen by subsequent courts as a central 
part of the Terry standard:

      [T]here is no ready test for determining reasonableness 
      other than by balancing the need to search (or seize) 
      against the invasion which the search (or seizure) entails. 
      And in justifying the particular intrusion the police 
      officer must be able to point to specific and articulable 
      facts which, taken together with rational inferences from 
      those facts, reasonably warrant that intrusion . . . 
      Anything less would invite intrusions upon constitutionally 
      guaranteed rights based on nothing more substantial than 
      inarticulate hunches, a result this Court has consistently 
---------------------------------------------------------------------------
      refused to sanction.

Terry v. Ohio, 392 U.S. 1, 21 (1968) (citations and quotation marks 
omitted).
  The footnote at this point of the opinion states, ``This demand for 
specificity in the information upon which police action is predicated 
is the central teaching of this Court's Fourth Amendment 
jurisprudence.'' Id. at n.18. Numerous subsequent cases applying and 
amplifying on the Terry standard include the phrase ``specific and 
articulable facts.'' See, e.g., Maryland v. Buie, 494 U.S. 325, 327 
(1990); Michigan v. Long, 463 U.S. 1032, 1049-1050 (1983) (quoting 
Terry v. Ohio, 392 U.S. 1, 21 (1968)).
    Kevin DiGregory, Deputy Assistant Attorney General, noted 
in written testimony before the Constitution Subcommittee, that 
``H.R. 5018 would require such [pen register or trap and trace] 
applications to contain `specific and articulable facts' that 
would justify the collection of the data'' and that ``the 
Justice Department can comply with the added administrative 
burdens imposed by increasing this standard [to the standard 
imposed by H.R. 5018].'' Written Testimony of Kevin DiGregory 
provided to the Constitution Subcommittee, ``Fourth Amendment 
Issues Raised by the FBI's `Carnivore' Program'' (July 24, 
2000) (Emphasis added.).

 H.R. 5018 Would Require High-Level Department of Justice Approval for 
           Federal Interceptions of Electronic Communications

    H.R. 5018 expands 18 U.S.C. Sec. 2516(1) to apply the 
existing requirements for authorizing the interception of wire 
and oral communications to the authorization of the 
interception of electronic communications. These requirements 
are that of high-level official approval and the investigation 
of an enumerated offense. In addition, because the 
investigation of crimes that involve computers and interstate 
communications systems often require the interception of 
electronic communications, H.R. 5018 adds such crimes to the 
list of predicate offenses in 18 U.S.C. Sec. 2516(1).

 H.R. 5018 Would Require the Government to Obtain a Warrant to Seize E-
               Mail Messages Stored for One Year or Less

    H.R. 5018 requires that the government obtain a warrant to 
require the disclosure of electronic communications in 
electronic storage--namely, an e-mail message stored by an 
Internet service provider--if the communication sought has been 
stored for 1 year or less, as opposed to the current 
requirements for a warrant to disclose electronic 
communications in electronic storage for 180 days or less. H.R. 
5018 also clarifies that an electronic communication in 
``electronic storage'' enjoys the protections provided to such 
communications regardless of whether or not the communication 
has been ``opened'' or otherwise accessed by the intended 
recipient. This would extend ECPA's protections governing 
electronic communications in electronic storage, for example, 
to the electronic communications of those who use Web-based 
electronic communications services, which often remotely store 
communications in a third party network even after the messages 
have been accessed by the recipient.

    H.R. 5018 Would Extend the Statutory Exclusionary Rule to Cover 
Illegally Intercepted Electronic Communications and Illegally Disclosed 
            Electronic Communications in Electronic Storage

    The statutory exclusionary rule provides that ``[w]henever 
any wire or oral communication has been intercepted, no part of 
the contents of such communication and no evidence derived 
therefrom may be received in evidence in any trial, hearing, or 
other proceeding . . . if the disclosure of that information 
would be in violation of this chapter.'' 18 U.S.C. Sec. 2515. 
This ``exclusionary rule'' allows individuals about whom 
information has been gathered in violation of Federal law to 
rely on the exclusion of such information from evidence by 
statute, thereby relieving them of the need to litigate whether 
or not the action that resulted in the gathering of such 
information constituted an ``unreasonable search or seizure'' 
under the Fourth Amendment. Currently, only illegally obtained 
``wire and oral communications'' are excluded from use as 
evidence by statute. H.R. 5018 would amend the ``statutory 
exclusionary rule'' to also exclude from use as evidence 
illegally intercepted ``electronic communications'' and 
illegally obtained ``electronic communications in electronic 
storage,'' namely stored e-mail messages, resulting from 
violations the Electronic Communications Privacy Act, 18 U.S.C. 
Sec. 2701 et seq.
    H.R. 5018 also allows the introduction of intercepted or 
disclosed communications where an individual violates 18 U.S.C. 
chapters 119, governing the interception of communications, or 
121, governing the disclosure of stored electronic 
communications, by engaging in illegal communications 
interception or disclosure and the government seeks to use the 
communication for the limited purpose of prosecuting that 
violator. Conforming amendments are also made to 18 U.S.C. 
Sec. Sec. 2517 and 2518(10)(a).
    Some in the law enforcement community have expressed 
concern that the statutory exclusionary rule does not contain a 
good faith exception and therefore could result in the 
exclusion of evidence based on technical violations. However, 
even in the context of statutory exclusion, courts have held 
that when there is a violation of Federal wiretap laws that is 
of a constitutional magnitude, the good faith exception does 
apply. Thus, the good faith exception has been applied to the 
failure of a judge to sign the wiretap order, United States v. 
Moore, 41 F.3d 370, 375 (8th Cir. 1994), to inadequacies in the 
probable cause showing, United States v. Millan, 817 F.Supp. 
1072, 1078 (S.D.N.Y. 1993) (``Even if probable cause is found 
lacking, the wiretap order should be suppressed only where: (1) 
the issuing judge abandoned his or her detached, neutral role; 
(2) the agent was dishonest or reckless in preparing the 
affidavit supporting the issuance of the wiretap order; or (3) 
the agent's reliance on the warrant was not objectively 
reasonable.''), and to other defects. See, e.g., United States 
v. Ferrara, 771 F.Supp. 1266, 1314 (D. Mass 1991) (finding that 
even if application for warrant to conduct roving electronic 
surveillance to intercept certain criminal communications of 
some members of suspected organization were required to 
disclose other authorizing electronic surveillance of other 
members of that same suspected organization, failure to 
disclose that surveillance would not justify suppression of 
evidence obtained pursuant to warrant because other authorizing 
surveillance was not disclosed because affiant had good faith 
belief such disclosure was not legally required and it was in 
best interests of investigation not to divulge them 
gratuitously) (citing 18 U.S.C. Sec. 2518(1)(c), (11)(a)).
    Moreover, as to nonconstitutional violations of the Federal 
wiretap laws, the Supreme Court has held that evidence cannot 
be excluded under 18 U.S.C. Sec. 2515 for minor or technical 
violations. The Court held in United States v. Giordano, 416 
U.S. 505, 527 (1994) that suppression under 18 U.S.C. Sec. 2515 
is required only for ``failure to satisfy any of those 
statutory requirements that directly and substantially 
implement the congressional intention to limit the use of 
intercept procedures to those situations clearly calling for 
the employment of this extraordinary investigative technique.'' 
In determining whether suppression is warranted, courts must 
examine whether the violated statutory requirement occupies ``a 
central role in the statutory scheme.'' Id. at 528 (holding 
that, although wiretap application had been approved by the 
Executive Assistant to the Attorney General rather than by 
Attorney General himself or a designated Assistant Attorney 
General, application on its face identified Assistant Attorney 
General as authorizing application, and wiretap materials were 
not subject to statutory exclusionary rule). See also United 
States v. Chavez, 416 U.S. 562, 578 (1974) (misidentification 
of officer authorizing wiretap application did not affect the 
fulfillment of any of the reviewing or approval functions 
required by Congress and therefore was not ``unlawful'' under 
the Federal wiretap laws and subject to statutory exclusionary 
rule). Thus, as one leading treatise states, ``many violations 
of the requirements of Title III [the Federal wiretap statute] 
will lead to either no suppression or only partial suppression 
. . . In most jurisdictions there are relatively few violations 
which will lead to the ultimate and absolute sanction of 
complete suppression of all surveillance evidence . . . In many 
instances the government has disregarded procedural protections 
established by Section 2518 without affecting the admissibility 
of the eavesdropping evidence.'' James G. Carr, The Law of 
Electronic Surveillance, Sec. 6.3 (1995).

    H.R. 5018 Would Require the Government to Meet a Probable Cause 
  Standard to Obtain Information Disclosing the Physical Location of 
              Mobile Phone Users, With Certain Exceptions

    Location tracking of users of wireless communications 
services is an emerging concern. Wireless telephones, which are 
increasingly used, generate information that can be used to 
physically track the movement of users. Initially limited to 
cell site antenna location, this tracking data is becoming more 
sophisticated with the introduction of new technologies. Still, 
persons in emergency situations want to be found when they call 
emergency services such as ``911,'' and the government should 
have the ability to locate suspected criminals in those 
circumstances. Currently, there are no clear legal standards 
governing when the government can collect location information 
from cell phone companies. Law enforcement now uses its 
authority under 18 U.S.C. Sec. 2703(d) (requirements for 
government access to business ``records'') to obtain location 
information from mobile phone service providers. However, 18 
U.S.C. Sec. 2703(d) does not contain any emergency exceptions 
to its requirements.
    H.R. 5018 provides that the government must show probable 
cause before it may obtain information disclosing the location 
of a customer or user of a mobile phone from a mobile phone 
service provider. Certain exceptions to this provision are 
provided in the bill for disclosing such information to 
emergency service providers such as hospitals, or to the legal 
guardian or members of the user's immediate family in 
situations involving the risk of death or serious physical 
harm, or with the express consent of the user of the mobile 
phone equipment. These exceptions are based on 47 U.S.C. 
Sec. 222, which already prohibits cell phone companies from 
disclosing customer location information to marketers and other 
commercial entities without express customer consent or under 
other exceptions. See 47 U.S.C. Sec. 222(d).

   H.R. 5018 Would Increase Penalties for Illegally Intercepting or 
                  Disclosing Electronic Communications

    H.R. 5018 contains provisions that increase the minimum 
damages that may be awarded under 18 U.S.C. Sec. 2520 to those 
whose electronic communications were illegally intercepted from 
$100 per day per violation, to $500 per day per violation.
    H.R. 5018 also contains provisions raising the minimum 
criminal penalties under 18 U.S.C. Sec. 2701 for the illegal 
disclosure of stored electronic communications from one to 3 
years for first time offenses, and from two to 5 years for 
repeat offenses involving the disclosure of stored electronic 
communications for tortious or illegal purposes, commercial 
advantage, malicious destruction or damage, or private 
commercial gain. H.R. 5018 also increases the minimum civil 
damages available under 18 U.S.C. Sec. 2707 to those whose 
stored electronic communications are illegally disclosed. from 
$1,000 to $5,000. An increase in the penalties for such 
violations is appropriate, considering that more and more 
sensitive and personal information is gravitating from 
citizens' file cabinets to computing services on third party 
networks.

 Law Enforcement Concerns: Investigating and Prosecuting Criminals in 
                            the Digital Age

    The new digital age has spawned new digital crimes. As 
stated by a recent White House Working Group Report, ``Prior 
technological advances--the automobile, the telegraph, and the 
telephone, for example--have brought dramatic improvements for 
society, but have also created new opportunities for 
wrongdoing. The same is true of the Internet, which provides 
unparalleled opportunities for socially beneficial endeavors 
such as education, research, commerce, entertainment, and 
debate on public affairs in ways that we may not now even be 
able to imagine. By the same token, however, individuals who 
wish to use a computer as a tool to facilitate unlawful 
activity may find that the Internet provides a vast, 
inexpensive, and potentially anonymous way to commit unlawful 
acts, such as fraud, the sale or distribution of child 
pornography, the sale of guns or drugs or other regulated 
substances without regulatory protections, and the unlawful 
distribution of computer software or other creative material 
protected by intellectual property rights.'' Report, at 4.
    As described in the Report, ``These needs and challenges 
are not theoretical. Law enforcement agencies today, for 
example, are faced with the need to evaluate and to determine 
the source, typically on very short notice, of anonymous e-
mails that contain bomb threats against a given building or 
threats to cause serious bodily injury.'' Id. H.R. 5018 
contains several provisions that would help law enforcement 
meet these new needs and challenges.

   H.R. 5018 Would Allow the Disclosure of Basic Customer Records By 
  Electronic Communications Service Providers In Emergency Situations

    H.R. 5018 would grant electronic communications service 
providers the right, but not impose on them the obligation, to 
disclose basic customer records in emergency situations. Under 
current law, an electronic communications service provider may 
disclose the contents of a communication under 18 U.S.C. 
Sec. 2702(b)--for example, the substance of an e-mail message--
to (1) an addressee or intended recipient of such 
communication; (2) with the lawful consent of the originator or 
an addressee; (3) as may be necessarily incident to the 
rendition of the service or to the protection of the rights or 
property of the provider of that service; or (4) to a law 
enforcement agency if the contents appear to pertain to the 
commission of a crime. Under current law, however, if an 
Internet service provider's customer receives an e-mail 
containing a death threat from another customer of the same 
Internet service provider, the provider is limited in what 
actions it may take. It may disclose the contents of a 
communication to law enforcement under 18 U.S.C. 
Sec. 2703(b)(3), but current law does not expressly authorize a 
provider to voluntarily provide to law enforcement the 
identity, home address, and other basic subscriber information 
of the user making the threat. See 18 U.S.C. Sec. 2703(c)(1)(B) 
and (C) (permitting disclosure to government entities only in 
response to legal process).
    As law enforcement already has the appropriate authority to 
disclose the contents of customer communications in such 
circumstances, it is appropriate to allow providers to disclose 
customer records, which are not content, in certain emergency 
situations, as the right to disclose the contents of 
communications implies the less intrusive ability to disclose 
non-content records. H.R. 5018 would allow providers to 
disclose non-content customer records, including a subscriber's 
login records, with the lawful consent of the customer or 
subscriber; as may be necessarily incident to the rendition of 
service or to the protection of the rights or property of the 
provider of that service; or to a governmental entity, if the 
provider reasonably believes that an emergency involving 
immediate danger of death or serious physical injury to any 
person justifies disclosure of the information. Furthermore, 
providers should have the right to disclose the facts 
surrounding attacks on their systems. When an authorized user 
of an Internet service launches a network intrusion against 
their Internet service provider, the provider should have the 
legal right to report the complete details of the crime to law 
enforcement.

H.R. 5018 Would Allow Law Enforcement to Install Pen Register and Trap 
    and Trace Devices Without a Court Order in Emergency Situations 
Involving Threats to National Security and Ongoing Attacks on Computer 
                                Networks

    Existing law empowers law enforcement to use trap and trace 
devices in emergency situations--such as when it encounters an 
immediate danger of death or serious bodily injury or when it 
is investigating organized crime--without getting prior 
approval from a court. Law enforcement authorities must then 
obtain court approval within 48 hours. H.R. 5018 would create 
two more emergency exceptions, those involving immediate 
threats to national security corresponding to the emergency 
wiretap provisions at 18 U.S.C. Sec. 2518(7)(a)(ii), and 
investigations of ongoing intrusions into computer networks. In 
the latter case, rapid investigative response is made essential 
by the speed with which, for example, computer viruses are 
spread through a computer network. In many cases, if 
investigators cannot trace the computer criminal while the 
criminal is actively connected to the computers being attacked, 
it may prove impossible to do so afterwards. Any abuse of these 
or the other emergency provisions would be deterred by the 
provisions in H.R. 5018 requiring that when a court determines 
that law enforcement did not act reasonably under these 
emergency provisions, the person regarding whom information had 
been gathered must be notified, just as such notification is 
provided for when the emergency provisions of the Federal 
wiretap law are found by a court to have been exercised 
inappropriately. See 18 U.S.C. Sec. 2518(7)(b).

 H.R. 5018 Would Raise Penalties and Expand Federal Jurisdiction Over 
 Serious Computer Crimes and Amend the Sentencing Guidelines Such That 
    Only the Most Serious Computer Crime Violations Are Subject to 
                     Mandatory Six-Month Sentences

    H.R. 5018 would raise the maximum penalty, from five to 10 
years, for computer crime felony violations that are knowingly 
and intentionally committed and which cause severe damage to 
governmental and private computer systems. Currently, a first 
time offense for such felonies could be met with a maximum of 5 
years in prison. H.R. 5018 raises that minimum penalty to 10 
years. The current 5 year maximum does not adequately take into 
account the seriousness of these crimes. For example, David 
Smith recently pled guilty to committing such serious felony 
offenses for releasing the ``Melissa'' virus in 1999, which 
caused massive damage to thousands of computers across the 
Internet. Although Smith agreed as part of his plea that his 
conduct caused over $80 million worth of damage--the maximum 
dollar figure contained in the Sentencing Guidelines--estimates 
of the real amount of damage have run much higher. See T. 
Brune, ``Cyber-Crooks Elude Justice, Just a Handful Get 
Punished,'' Newsday (February 25, 2000) at A7. H.R. 5018 also 
creates a Federal offense when an attack on a protected 
computer modifies or impairs, or threatens to modify or impair, 
the medical examination, diagnosis, treatment, or care of one 
or more individuals, causes physical injury to any individual, 
or threatens public health or safety. H.R. 5018 also creates a 
new category of felony violations where a hacker causes damage 
to a computer system used by or for a government entity in 
furtherance of the administration of justice, national defense, 
or national security. Attacks on computers used in the nation's 
defense that occur during periods of active military engagement 
are particularly serious, even if they do not disrupt the 
military's defense capabilities, because they divert time and 
attention away from the military's proper objectives.
    Further, H.R. 5018 clarifies that damage to multiple 
protected computers must be aggregated in determining whether a 
violation has exceeded the $5,000 threshold for a Federal 
offense. For example, a person may unlawfully access five 
computers on a network on 10 different dates but cause only 
$1,000 damage to each computer during each intrusion. H.R. 5018 
would allow a count to be brought for the full $50,000 of 
damage caused by the individual. Aggregating the damage caused 
to the various computers properly measures an individual's 
culpability for such conduct. This would bring the statute into 
harmony with others permitting the aggregation of related 
conduct in determining the level of culpability. See, e.g., 
United States v. Griffith, 17 F.3d 865 (6th Cir. 1994) (value 
of various shipments of stolen property, none of which was 
valued at $5,000, was properly aggregated in determining 
whether government met $5,000 jurisdictional requirement for 
felony interstate transportation of stolen goods).
    H.R. 5018 would also apply the criminal forfeiture rules to 
computer hacking crimes and require anyone convicted of a 
violation of the computer crime laws to forfeit to the United 
States property used or proceeds gained in the commission of 
the crime. It is the experience of law enforcement that 
forfeiture of property used in the commission of computer crime 
or proceeds derived therefrom can provide effective punishment 
and deterrence, and that it makes little sense to return 
computers to convicted computer criminals. These criminal 
forfeiture provisions are based on the familiar forfeiture 
procedures set forth in section 413 of the Comprehensive Drug 
Abuse Prevention and Control Act of 1970, 21 U.S.C. Sec. 853.
    H.R. 5018 also expressly defines the term ``loss'' as used 
in the statute to account for a wide range of possible harms 
done to the victims of computer crimes, including reasonable 
costs of responding to the offense, conducting a damage 
assessment, restoring the system and data to their condition 
prior to the offense, and any lost revenue or costs incurred 
because of the interruption of service.
    H.R. 5018 also allows the Federal Government to investigate 
and prosecute offenses in which a person intentionally defaced, 
damaged or destroyed images or information made available to 
the public, such as the defacing of images or information on 
Web sites, even if such offenses did not result in more than 
$5,000 in damages. This provision responds to a serious problem 
that came to the attention of the committee when the Web site 
of a non-profit organization became the victim of a computer 
hacking attack in which educational material was removed and 
replaced with images of a bomb, skull and crossbones, 
obscenities, and links to Web sites that espouse contrary 
points of view. The hackers also violated the privacy of a 
number of visitors to the Web site by stealing all of the e-
mails sent to the site. In response to a request by the 
committee's ranking member to the Department of Justice, 
seeking an investigation into the Web site attack, the 
Department responded that limitations in existing law precluded 
an investigation because the resulting damage to the site was 
less than the $5,000 Federal jurisdictional limit. This kind of 
Web site attack prevents a non-profit organization from using 
the Internet as a forum for its free expressive activities, and 
a criminal who carries out such activities in cyberspace should 
be treated similarly to a criminal who steals a non-profit 
organization's direct mail shipments or replaces an 
organization's national radio advertisements with its own. To 
that end, this provision extends Federal jurisdiction to the 
investigation and prosecution of intentional efforts to deface, 
damage, or destroy images or information made available to the 
public and protected by the first amendment. This provision, 
however, would not apply to expression on the Internet that 
does not deface, damage, or destroy other expression, such as 
e-mails sent which may express views contrary to those 
expressed elsewhere on a Web site but which do not 
intentionally deface, damage or destroy such expression.
    Finally, H.R. 5018 would give prosecutors more flexibility 
in charging computer criminals. Section 805 of the 
Antiterrorism and Effective Death Penalty Act of 1996 
transmitted a directive to the Sentencing Commission to ensure 
that all individuals convicted of a violation of 18 U.S.C. 
Sec. 1030(a)(4) or (a)(5) be imprisoned for not less than 6 
months. A mandatory 6 month sentence, however, may be 
inappropriate for violations of the least serious computer 
hacking offenses, which apply to those who have intentionally 
accessed a protected computer, but did not intend to cause 
damage. Consequently, prosecutors may be reluctant to charge 
those committing these less serious hacker violations when the 
minimum sentence is 6 months in prison. In those cases in which 
mandatory imprisonment for 6 months might not be the most 
appropriate remedy, it is nonetheless best that Federal 
conviction occur. A conviction, even one not resulting in 
mandatory imprisonment, will become part of a defendant's 
criminal history and qualify the defendant for the more 
substantial recidivist provisions of the computer crime laws if 
the defendant does not reform after the first conviction. H.R. 
5018 restricts the 6 month minimum sentence to only the more 
serious computer crimes and better ensures that the punishment 
fits the crime.

                                Hearings

    The committee's Subcommittee on the Constitution held 3 
days of hearings on issues addressed by H.R. 5018 on April 6, 
2000, July 24, 2000 and September 6, 2000. On April 6, 2000, 
testimony was received from several witnesses: James X. 
Dempsey, Senior Staff Counsel, The Center for Democracy and 
Technology; Gregory Nojeim, Legislative Counsel, American Civil 
Liberties Union, Washington National Office; Kevin V. 
DiGregory, Deputy Associate Attorney General, Department of 
Justice; accompanied by David Green, Deputy Chief, Computer 
Crime and Intellectual Property Section, Department of Justice; 
Stewart Baker, Steptoe & Johnson; Frederick Juergens Baker, 
Chair, Internet Engineering Task Force; Clifford S. Fishman, 
Professor of Law, Columbus School of Law, The Catholic 
University of America; Robert Corn-Revere, Hogan & Hartson; 
Jeff B. Richards, Executive Director, Internet Alliance; Nicole 
Wong, Perkins Coie, San Francisco; and Jeffrey Rosen, Associate 
Professor of Law, The George Washington University Law School.
    On July 24, 2000, testimony was received from several 
witnesses: Dr. Donald M. Kerr, Director, Lab Division, Federal 
Bureau of Investigation; Larry R. Parkinson, General Counsel, 
Federal Bureau of Investigation; Kevin V. DiGregory, Deputy 
Associate Attorney General, Department of Justice; Alan 
Davidson, Staff Counsel, The Center for Democracy and 
Technology; Matt Blaze, Research Scientist; Barry Steinhardt, 
Associate Director, American Civil Liberties Union; Robert 
Corn-Revere, Attorney, Hogan & Hartson; Stewart Baker, 
Attorney, Steptoe & Johnson; Peter William Sachs, ICONN, 
L.L.C.; and Tom Perrine, Principal Investigator, Pacific 
Institute for Computer Security.
    On September 6, 2000, testimony was received from the 
following witnesses: Kevin DiGregory, Deputy Associate Attorney 
General, Department of Justice; accompanied by David Green, 
Deputy Chief, Computer Crime and Intellectual Property Section; 
James Dempsey, Senior Staff Counsel, The Center for Democracy 
and Technology; Gregory Nojeim, Legislative Counsel, the 
American Civil Liberties Union; Robert Corn-Revere, Hogan & 
Hartson; and Marc Rotenberg, Director, Electronic Privacy 
Information Center.

                        Committee Consideration

    On September 14, 2000, the Subcommittee on the Constitution 
met in open session and ordered favorably reported the bill 
H.R.5018 with an amendment in the nature of a substitute, by a 
voice vote, a quorum being present. On September 20 and 26, 
2000, the committee met in open session and ordered favorably 
reported the bill H.R. 5018 with an amendment in the nature of 
a substitute by a recorded vote of 20 to 1, a quorum being 
present.

                         Votes of the Committee

    1. Mr. Scott Amendment to H.R. 5018 which removed 
provisions allowing the Federal investigation and prosecution 
of computer crimes committed by juveniles passed favorably by a 
voice vote.
    2. On September 20, 2000, Mr. Barr offered an amendment 
that would extend the warrant requirement to the disclosure of 
electronic communications in electronic storage for 1 year or 
less. This amendment was defeated by a rollcall vote of 10 to 
10.

                                                   ROLLCALL NO. 1
----------------------------------------------------------------------------------------------------------------
                                                                       Ayes            Nays           Present
----------------------------------------------------------------------------------------------------------------
Mr. Sensenbrenner...............................................              X   ..............  ..............
Mr. McCollum....................................................  ..............  ..............  ..............
Mr. Gekas.......................................................  ..............  ..............  ..............
Mr. Coble.......................................................  ..............              X   ..............
Mr. Smith (TX)..................................................  ..............  ..............  ..............
Mr. Gallegly....................................................  ..............              X   ..............
Mr. Canady......................................................  ..............              X   ..............
Mr. Goodlatte...................................................  ..............  ..............  ..............
Mr. Chabot......................................................  ..............              X   ..............
Mr. Barr........................................................              X   ..............  ..............
Mr. Jenkins.....................................................              X   ..............  ..............
Mr. Hutchinson..................................................  ..............              X   ..............
Mr. Pease.......................................................              X   ..............  ..............
Mr. Cannon......................................................  ..............              X   ..............
Mr. Rogan.......................................................  ..............  ..............  ..............
Mr. Graham......................................................  ..............  ..............  ..............
Ms. Bono........................................................  ..............              X   ..............
Mr. Bachus......................................................  ..............  ..............  ..............
Mr. Scarborough.................................................              X   ..............  ..............
Mr. Vitter......................................................  ..............  ..............  ..............
Mr. Conyers.....................................................              X   ..............  ..............
Mr. Frank.......................................................  ..............  ..............  ..............
Mr. Berman......................................................  ..............  ..............  ..............
Mr. Boucher.....................................................  ..............  ..............  ..............
Mr. Nadler......................................................              X   ..............  ..............
Mr. Scott.......................................................              X   ..............  ..............
Mr. Watt........................................................  ..............              X   ..............
Ms. Lofgren.....................................................  ..............  ..............  ..............
Ms. Jackson Lee.................................................              X   ..............  ..............
Ms. Waters......................................................              X   ..............  ..............
Mr. Meehan......................................................  ..............  ..............  ..............
Mr. Delahunt....................................................  ..............  ..............  ..............
Mr. Wexler......................................................  ..............  ..............  ..............
Mr. Rothman.....................................................  ..............              X   ..............
Ms. Baldwin.....................................................  ..............  ..............  ..............
Mr. Weiner......................................................  ..............  ..............  ..............
Mr. Hyde, Chairman..............................................  ..............              X   ..............
                                                                 -----------------------------------------------
    Total.......................................................             10              10   ..............
----------------------------------------------------------------------------------------------------------------

    3. At the next Full Committee meeting, Mr. Cannon moved to 
reconsider the vote by which the Barr amendment was defeated. 
The motion to reconsider was agreed to by voice vote, and the 
Barr amendment was agreed to by voice vote.
    4. Mr. Conyers offered an amendment which would make it a 
Federal offense to deface or destroy information or images on 
computer systems even if the resulting damage does amount to 
$5,000 or more. Passed by voice vote.
    5. Mr. Nadler, Mr. Conyers and Mr. Barr offered an 
amendment which would add to the definition of ``electronic 
storage'' those communications stored by an electronic 
communications service without regard to whether they had been 
accessed by the intended recipient. Passed favorably by voice 
vote.
    6. Mr. Nadler and Mr. Barr offered an amendment which would 
add provisions to the Federal reporting requirements. This 
amendment was defeated by a rollcall vote of 9 to 16.

                                                   ROLLCALL NO. 2
----------------------------------------------------------------------------------------------------------------
                                                                       Ayes            Nays           Present
----------------------------------------------------------------------------------------------------------------
Mr. Sensenbrenner...............................................  ..............  ..............  ..............
Mr. McCollum....................................................  ..............  ..............  ..............
Mr. Gekas.......................................................  ..............              X   ..............
Mr. Coble.......................................................              X   ..............  ..............
Mr. Smith (TX)..................................................  ..............              X   ..............
Mr. Gallegly....................................................  ..............              X   ..............
Mr. Canady......................................................  ..............              X   ..............
Mr. Goodlatte...................................................  ..............              X   ..............
Mr. Chabot......................................................  ..............              X   ..............
Mr. Barr........................................................              X   ..............  ..............
Mr. Jenkins.....................................................  ..............              X   ..............
Mr. Hutchinson..................................................  ..............              X   ..............
Mr. Pease.......................................................  ..............              X   ..............
Mr. Cannon......................................................  ..............  ..............  ..............
Mr. Rogan.......................................................  ..............              X   ..............
Mr. Graham......................................................  ..............              X   ..............
Ms. Bono........................................................  ..............  ..............  ..............
Mr. Bachus......................................................  ..............  ..............  ..............
Mr. Scarborough.................................................  ..............  ..............  ..............
Mr. Vitter......................................................  ..............  ..............  ..............
Mr. Conyers.....................................................              X   ..............  ..............
Mr. Frank.......................................................              X   ..............  ..............
Mr. Berman......................................................  ..............  ..............  ..............
Mr. Boucher.....................................................  ..............  ..............  ..............
Mr. Nadler......................................................              X   ..............  ..............
Mr. Scott.......................................................              X   ..............  ..............
Mr. Watt........................................................              X   ..............  ..............
Ms. Lofgren.....................................................  ..............              X   ..............
Ms. Jackson Lee.................................................  ..............              X   ..............
Ms. Waters......................................................              X   ..............  ..............
Mr. Meehan......................................................  ..............  ..............  ..............
Mr. Delahunt....................................................  ..............  ..............  ..............
Mr. Wexler......................................................  ..............  ..............  ..............
Mr. Rothman.....................................................  ..............              X   ..............
Ms. Baldwin.....................................................              X   ..............  ..............
Mr. Weiner......................................................  ..............              X   ..............
Mr. Hyde, Chairman..............................................  ..............              X   ..............
                                                                 -----------------------------------------------
    Total.......................................................              9              16   ..............
----------------------------------------------------------------------------------------------------------------

    7. Ms. Lofgren offered an amendment which would extend the 
statutory exclusionary rule to exclude from evidence illegally 
disclosed electronic communications in electronic storage. This 
amendment was agreed to by a rollcall vote of 9 to 7.

                                                   ROLLCALL NO. 3
----------------------------------------------------------------------------------------------------------------
                                                                       Ayes            Nays           Present
----------------------------------------------------------------------------------------------------------------
Mr. Sensenbrenner...............................................  ..............  ..............  ..............
Mr. McCollum....................................................  ..............  ..............  ..............
Mr. Gekas.......................................................  ..............  ..............  ..............
Mr. Coble.......................................................  ..............              X   ..............
Mr. Smith (TX)..................................................  ..............              X   ..............
Mr. Gallegly....................................................  ..............  ..............  ..............
Mr. Canady......................................................  ..............              X   ..............
Mr. Goodlatte...................................................  ..............  ..............  ..............
Mr. Chabot......................................................  ..............  ..............  ..............
Mr. Barr........................................................              X   ..............  ..............
Mr. Jenkins.....................................................  ..............              X   ..............
Mr. Hutchinson..................................................  ..............              X   ..............
Mr. Pease.......................................................              X   ..............  ..............
Mr. Cannon......................................................  ..............  ..............  ..............
Mr. Rogan.......................................................  ..............  ..............  ..............
Mr. Graham......................................................  ..............              X   ..............
Ms. Bono........................................................  ..............  ..............  ..............
Mr. Bachus......................................................  ..............  ..............  ..............
Mr. Scarborough.................................................              X   ..............  ..............
Mr. Vitter......................................................  ..............  ..............  ..............
Mr. Conyers.....................................................  ..............  ..............  ..............
Mr. Frank.......................................................  ..............  ..............  ..............
Mr. Berman......................................................              X   ..............  ..............
Mr. Boucher.....................................................  ..............  ..............  ..............
Mr. Nadler......................................................              X   ..............  ..............
Mr. Scott.......................................................  ..............  ..............  ..............
Mr. Watt........................................................              X   ..............  ..............
Ms. Lofgren.....................................................              X   ..............  ..............
Ms. Jackson Lee.................................................  ..............  ..............  ..............
Ms. Waters......................................................              X   ..............  ..............
Mr. Meehan......................................................  ..............  ..............  ..............
Mr. Delahunt....................................................  ..............  ..............  ..............
Mr. Wexler......................................................  ..............  ..............  ..............
Mr. Rothman.....................................................              X   ..............  ..............
Ms. Baldwin.....................................................  ..............  ..............  ..............
Mr. Weiner......................................................  ..............  ..............  ..............
Mr. Hyde, Chairman..............................................  ..............              X   ..............
                                                                 -----------------------------------------------
    Total.......................................................              9               7   ..............
----------------------------------------------------------------------------------------------------------------

    8. Ms. Waters offered an amendment which would require 
notification to all those whose communications had been traced 
under an order for the installation of a pen register or trap 
and trace device. The amendment was defeated by a rollcall vote 
of 9 to 12.

                                                   ROLLCALL NO. 4
----------------------------------------------------------------------------------------------------------------
                                                                       Ayes            Nays           Present
----------------------------------------------------------------------------------------------------------------
Mr. Sensenbrenner...............................................  ..............  ..............  ..............
Mr. McCollum....................................................  ..............  ..............  ..............
Mr. Gekas.......................................................  ..............  ..............  ..............
Mr. Coble.......................................................  ..............              X   ..............
Mr. Smith (TX)..................................................  ..............              X   ..............
Mr. Gallegly....................................................  ..............              X   ..............
Mr. Canady......................................................  ..............              X   ..............
Mr. Goodlatte...................................................  ..............  ..............  ..............
Mr. Chabot......................................................  ..............              X   ..............
Mr. Barr........................................................              X   ..............  ..............
Mr. Jenkins.....................................................  ..............              X   ..............
Mr. Hutchinson..................................................  ..............              X   ..............
Mr. Pease.......................................................  ..............              X   ..............
Mr. Cannon......................................................  ..............              X   ..............
Mr. Rogan.......................................................  ..............              X   ..............
Mr. Graham......................................................  ..............  ..............  ..............
Ms. Bono........................................................  ..............  ..............  ..............
Mr. Bachus......................................................  ..............  ..............  ..............
Mr. Scarborough.................................................              X   ..............  ..............
Mr. Vitter......................................................  ..............  ..............  ..............
Mr. Conyers.....................................................  ..............  ..............  ..............
Mr. Frank.......................................................  ..............  ..............  ..............
Mr. Berman......................................................              X   ..............  ..............
Mr. Boucher.....................................................  ..............  ..............  ..............
Mr. Nadler......................................................              X   ..............  ..............
Mr. Scott.......................................................              X   ..............  ..............
Mr. Watt........................................................              X   ..............  ..............
Ms. Lofgren.....................................................              X   ..............  ..............
Ms. Jackson Lee.................................................  ..............  ..............  ..............
Ms. Waters......................................................              X   ..............  ..............
Mr. Meehan......................................................  ..............  ..............  ..............
Mr. Delahunt....................................................  ..............  ..............  ..............
Mr. Wexler......................................................  ..............  ..............  ..............
Mr. Rothman.....................................................  ..............              X   ..............
Ms. Baldwin.....................................................  ..............  ..............  ..............
Mr. Weiner......................................................              X   ..............  ..............
Mr. Hyde, Chairman..............................................  ..............              X   ..............
                                                                 -----------------------------------------------
    Total.......................................................              9              12   ..............
----------------------------------------------------------------------------------------------------------------

    9. Motion to report favorably to the House the bill H.R. 
5018, with an amendment in the nature of a substitute was 
agreed to by a rollcall vote of 20 to 1.

                                                   ROLLCALL NO. 5
----------------------------------------------------------------------------------------------------------------
                                                                       Ayes            Nays           Present
----------------------------------------------------------------------------------------------------------------
Mr. Sensenbrenner...............................................  ..............  ..............  ..............
Mr. McCollum....................................................  ..............  ..............  ..............
Mr. Gekas.......................................................  ..............  ..............  ..............
Mr. Coble.......................................................              X   ..............  ..............
Mr. Smith (TX)..................................................              X   ..............  ..............
Mr. Gallegly....................................................              X   ..............  ..............
Mr. Canady......................................................              X   ..............  ..............
Mr. Goodlatte...................................................  ..............  ..............  ..............
Mr. Chabot......................................................              X   ..............  ..............
Mr. Barr........................................................              X   ..............  ..............
Mr. Jenkins.....................................................              X   ..............  ..............
Mr. Hutchinson..................................................              X   ..............  ..............
Mr. Pease.......................................................              X   ..............  ..............
Mr. Cannon......................................................              X   ..............  ..............
Mr. Rogan.......................................................  ..............  ..............  ..............
Mr. Graham......................................................              X   ..............  ..............
Ms. Bono........................................................  ..............  ..............  ..............
Mr. Bachus......................................................  ..............  ..............  ..............
Mr. Scarborough.................................................              X   ..............  ..............
Mr. Vitter......................................................  ..............  ..............  ..............
Mr. Conyers.....................................................  ..............  ..............  ..............
Mr. Frank.......................................................  ..............  ..............  ..............
Mr. Berman......................................................              X   ..............  ..............
Mr. Boucher.....................................................  ..............  ..............  ..............
Mr. Nadler......................................................              X   ..............  ..............
Mr. Scott.......................................................              X   ..............  ..............
Mr. Watt........................................................              X   ..............  ..............
Ms. Lofgren.....................................................              X   ..............  ..............
Ms. Jackson Lee.................................................  ..............  ..............  ..............
Ms. Waters......................................................              X   ..............  ..............
Mr. Meehan......................................................  ..............  ..............  ..............
Mr. Delahunt....................................................  ..............  ..............  ..............
Mr. Wexler......................................................  ..............  ..............  ..............
Mr. Rothman.....................................................              X   ..............  ..............
Ms. Baldwin.....................................................  ..............  ..............  ..............
Mr. Weiner......................................................  ..............              X   ..............
Mr. Hyde, Chairman..............................................              X   ..............  ..............
                                                                 -----------------------------------------------
    Total.......................................................             20               1   ..............
----------------------------------------------------------------------------------------------------------------

                      Committee Oversight Findings

    In compliance with clause 3(c)(1) of rule XIII of the Rules 
of the House of Representatives, the committee reports that the 
findings and recommendations of the committee, based on 
oversight activities under clause 2(b)(1) of rule X of the 
Rules of the House of Representatives, are incorporated in the 
descriptive portions of this report.

                Committee on Government Reform Findings

    No findings or recommendations of the Committee on 
Government Reform were received as referred to in clause 
3(c)(4) of rule XIII of the Rules of the House of 
Representatives.

               New Budget Authority and Tax Expenditures

    Clause 3(c)(2) of House Rule XIII is inapplicable because 
this legislation does not provide new budgetary authority or 
increased tax expenditures.

               Congressional Budget Office Cost Estimate

    In compliance with clause 3(c)(3) of rule XIII of the Rules 
of the House of Representatives, the committee sets forth, with 
respect to the bill, H.R. 5018, the following estimate and 
comparison prepared by the Director of the Congressional Budget 
Office under section 402 of the Congressional Budget Act of 
1974:

                                     U.S. Congress,
                               Congressional Budget Office,
                                   Washington, DC, October 3, 2000.
Hon. Henry J. Hyde, Chairman,
Committee on the Judiciary,
House of Representatives, Washington, DC.
    Dear Mr. Chairman: The Congressional Budget Office has 
prepared the enclosed cost estimate for H.R. 5018, the 
Electronic Communications Privacy Act of 2000.
    If you wish further details on this estimate, we will be 
pleased to provide them. The CBO staff contact is Mark Hadley, 
who can be reached at 226-2860.
            Sincerely,

Enclosure

cc:
        Honorable John J. Conyers Jr.
        Ranking Democratic Member
H.R. 5018--Electronic Communications Privacy Act of 2000.
    Based on information from the Department of Justice, CBO 
estimates that implementing the reporting requirements of H.R. 
5018 would cost federal law enforcement agencies about $1 
million a year. Enacting H.R. 5018 could affect direct spending 
and receipts; therefore, pay-as-you-go procedures would apply 
to the bill. However, CBO estimates that any impact on direct 
spending and receipts would not be significant.
    H.R. 5018 would require greater judicial oversight when law 
enforcement officials monitor the electronic communications 
(such as e-mail) of suspected criminals. The bill would require 
law enforcement officials who request court orders to monitor 
these communications to provide evidence of a crime and show 
that information related to the crime is likely to be contained 
in such communications. (Under current law, officials need to 
certify that these communications are related to a criminal 
investigation.) The bill would prohibit illegally obtained 
electronic communications from being used as evidence in 
trials. In addition, the bill would require federal law 
enforcement agencies to report annually to the Congress on the 
number and nature of their requests for such orders.
    The bill would increase penalties for certain crimes, and 
establish federal crimes related to the unauthorized disclosure 
or distruction of certain electronic information. As a result, 
the federal government might be able to pursue cases that it 
otherwise would not be able to prosecute. CBO expects that any 
increase in federal costs for law enforcement, court 
proceedings, or prison operations would not be significant, 
however, because of the small number of cases likely to be 
involved. Any such additional costs would be subject to the 
availability of appropriated funds.
    Because those prosecuted and convicted under H.R. 5018 
could be subject to criminal fines, and increased fines and 
penalties, the federal government might collect additional 
fines if the bill is enacted. Collections of such fines are 
recorded in the budget as governmental receipts (revenues), 
which are deposited in the Crime Victims Fund and spent in 
subsequent years. CBO expects that any additional receipts and 
direct spending would be less than $500,000 each year.
    H.R. 5018 also would increase judicial oversight of efforts 
by state and local law enforcement agencies to monitor certain 
electronic communications. Such requirements would constitute 
intergovernmental mandates (on both courts and law enforcement 
agencies) as defined in th Unfunded Mandates Reform Act (UMRA). 
Based on information from state and local public safety 
officials, however, CBO estimates that the costs of complying 
with these new requirements would not likely be significant, 
and would not exceed the threshold established in UMRA ($55 
million in 2000, adjusted annually for inflation). The bill 
contains no new private-sector mandates as defined by UMRA.
    The CBO staff contacts are Mark Hadley (for federal costs), 
who can be reached at 226-2860, and Theresa Gullo (for the 
impact on state and local governments), who can be reached at 
225-3220. This estimate was approved by Peter H. Fontaine, 
Deputy Assistant Director for Budget Analysis.

                   Constitutional Authority Statement

    Pursuant to clause 3(d)(1) of rule XIII of the Rules of the 
House of Representatives, the committee finds the authority for 
this legislation in Article I, section 8, clauses 3 and 18 of 
the Constitution.

               Section-by-Section Analysis and Discussion

Section 1--Short Title
    Section 1 states that the act may be cited as the 
``Electronic Communications Privacy Act of 2000.''
Section 2--Use as Evidence
    Section 2 extends the statutory exclusionary rule to also 
exclude from use in evidence at trial electronic 
communications--including electronic communications such as e-
mail that lies in storage with an electronic communications 
service--obtained in violation of Federal law, just as 
illegally obtained wire and oral electronic communications are 
excluded, while also allowing the use of such communications 
against those who illegally obtained them.
Section 3--Reports Concerning the Disclosure of the Contents of 
        Electronic Communications
    Section 3 requires the Federal Government to report 
annually basic information regarding the requests it makes to 
disclose the contents of stored electronic communications under 
18 U.S.C. Sec. Sec. 2703(a) and (b).
Section 4--Pen Registers and Trap and Trace Devices
    Section 4 raises the standard for the government's access, 
under the Pen Register Act, to transactional information 
regarding a person's communications by requiring that a court 
find that ``specific and articulable facts reasonably indicate 
that crime has been, is being, or will be committed, and 
information likely to be obtained by such installation and use 
is relevant to the investigation of that crime.''
Section 5--Civil Damages
    Section 5 increases the civil penalties that may be applied 
to those who illegally intercept electronic communications by 
raising the daily damages for each violation from $100 a day to 
$500 a day.
Section 6--Notification
    Section 6 makes clear that only a court may decide whether 
delays in notifying those whose stored electronic 
communications are disclosed are appropriate.
Section 7--Government Access to Location Information
    Section 7 prohibits the government from obtaining a mobile 
phone user's location without first obtaining a court order 
based on probable cause, except in certain emergency 
situations. Certain exceptions to this provision are provided 
for disclosing such information to emergency service providers 
such as hospitals, or to the legal guardian or members of the 
user's immediate family in situations involving the risk of 
death or serious physical harm, or with the express consent of 
the user of the mobile phone equipment.
Section 8--Computer Crime Amendments
    Section 8 raises the maximum penalty for the most serious 
computer violations to 10 years in prison and extends Federal 
jurisdiction to those computer crimes involving an attack on a 
protected computer that modifies or impairs, or threatens to 
modify or impair, the medical examination, diagnosis, 
treatment, or care of one or more individuals, causes physical 
injury to any individual, or threatens public health or safety. 
Section 8 also creates a new category of felony violations 
where a hacker causes damage to a computer system used by or 
for a government entity in furtherance of the administration of 
justice, national defense, or national security.
    Section 8 also clarifies that damage to multiple protected 
computers must be aggregated in determining whether a violation 
has exceeded the $5,000 threshold for an offense and applies 
the criminal forfeiture rules to computer hacking crimes.
    Section 8 also expressly defines the term ``loss'' as used 
in the statute to account for a wide range of possible harms 
done to the victims of computer crimes, including reasonable 
costs of responding to the offense, conducting a damage 
assessment, restoring the system and data to their condition 
prior to the offense, and any lost revenue or costs incurred 
because of the interruption of service.
    Section 8 also allows the Federal Government to investigate 
and prosecute offenses in which a person intentionally defaced, 
damaged or destroyed images or information made available to 
the public, such as the defacing of images or information on 
computer systems, even if such offenses did not result in more 
than $5,000 in damages.
    Finally, Section 8 restricts the 6 month minimum sentence 
under the Federal Sentencing Guidelines to only the more 
serious computer crimes and better ensures that the punishment 
fits the crime.
Section 9--Interception of Wire, Oral, and Electronic Communications 
        Amendments
    Section 9 requires high-level Department of Justice 
approval for interceptions of electronic communications, as is 
currently required for interceptions of wire and oral 
communications, and also adds computer crimes to the enumerated 
offenses for which interceptions may be ordered.
Section 10--Amendments to the Electronic Communications Privacy Act
    Section 10 increases the criminal penalties for the illegal 
disclosure of stored electronic communications and allows 
electronic communications service providers to disclose to law 
enforcement basic customer records, such as name and address, 
with the lawful consent of the customer or subscriber; as may 
be necessarily incident to the rendition of service or to the 
protection of the rights or property of the provider of that 
service; or to a governmental entity, if the provider 
reasonably believes that an emergency involving immediate 
danger of death or serious physical injury to any person 
justifies disclosure of the information.
    Section 10 also raises the minimum civil damage award for 
the illegal disclosure of stored electronic communications to 
$5,000.
Section 11--Additional Provisions Relating to Pen Registers
    Section 11 allows law enforcement to use devices that track 
the source and destination of criminal communications without a 
court order for up to 48 hours in situations involving national 
security and ongoing attacks on computer networks, but also 
requires that, if a court finds law enforcement had an 
insufficient basis to conduct the monitoring, the judge must 
order that the person whose communications were wrongfully 
tracked be notified.
Section 12--Government Access to Contents of Stored Electronic 
        Communications
    Section 12 extends the protection of a warrant requirement 
to electronic communications stored by electronic 
communications services for 1 year or less.
Section 13--Enhanced Privacy Protection for Information on Computer 
        Networks
    Section 13 makes clear that protections of electronic 
communications in electronic storage cover e-mail messages that 
have been accessed by the intended recipient but remain stored 
by an electronic communications service.

         Changes in Existing Law Made by the Bill, as Reported

    In compliance with clause 3(e) of rule XIII of the Rules of 
the House of Representatives, changes in existing law made by 
the bill, as reported, are shown as follows (existing law 
proposed to be omitted is enclosed in black brackets, new 
matter is printed in italics, existing law in which no change 
is proposed is shown in roman):

                     TITLE 18, UNITED STATES CODE

           *       *       *       *       *       *       *


                            PART I--CRIMES

           *       *       *       *       *       *       *


                CHAPTER 47--FRAUD AND FALSE STATEMENTS

           *       *       *       *       *       *       *


Sec. 1030. Fraud and related activity in connection with computers

    (a) Whoever--
            (1) * * *

           *       *       *       *       *       *       *

            (3) intentionally, without authorization to access 
        any nonpublic computer of a department or agency of the 
        United States, accesses [such a computer] without or in 
        excess of authorization a computer of that department 
        or agency that is exclusively for the use of the 
        Government of the United States or, in the case of a 
        computer not exclusively for such use, is used by or 
        for the Government of the United States and such 
        conduct affects;

           *       *       *       *       *       *       *

            (5)(A)(i) knowingly causes the transmission of a 
        program, information, code, or command, and as a result 
        of such conduct, intentionally causes damage without 
        authorization, to a protected computer;
            [(B)] (ii) intentionally accesses a protected 
        computer without authorization, and as a result of such 
        conduct, recklessly causes damage; or
            [(C)] (iii) intentionally accesses a protected 
        computer without authorization, and as a result of such 
        conduct, causes damage; and
            (B) whose conduct described in clause (i), (ii), or 
        (iii) of subparagraph (A)--
                    (i) caused loss to one or more persons 
                during any one-year period (including loss 
                resulting from a related course of conduct 
                affecting one or more other protected 
                computers) aggregating at least $5,000;
                    (ii) modified or impaired, or potentially 
                modified or impaired, the medical examination, 
                diagnosis, treatment, or care of one or more 
                individuals;
                    (iii) caused physical injury to any 
                individual;
                    (iv) threatened public health or safety;
                    (v) caused damage affecting a computer 
                system used by or for a government entity in 
                furtherance of the administration of justice, 
                national defense, or national security; or
                    (vi) intentionally defaced, damaged, or 
                destroyed images or information made available 
                to the public and thereby interfered with the 
                rights protected under the First Amendment to 
                the Constitution;

           *       *       *       *       *       *       *

            (7) with intent to extort from any person[, firm, 
        association, educational institution, financial 
        institution, government entity, or other legal entity,] 
        any money or other thing of value, 
        transmits in interstate or foreign commerce any 
        communication containing any threat to cause damage to 
        a protected computer;
shall be punished as provided in subsection (c) of this 
section.
    (b) Whoever attempts to commit an offense under subsection 
(a) of this section shall be punished as provided in subsection 
(c) of this section as if such person had committed the 
completed offense.
    (c) The punishment for an offense under subsection (a) or 
(b) of this section is--
            (1)(A) a fine under this title or imprisonment for 
        not more than ten years, or both, in the case of an 
        offense under subsection (a)(1), (a)(5)(A)(i), or 
        (a)(5)(A)(ii) of this section which does not occur 
        after a conviction for another offense under this 
        section[, or an attempt to commit an offense punishable 
        under this subparagraph]; and
            (B) a fine under this title or imprisonment for not 
        more than twenty years, or both, in the case of an 
        offense under subsection (a)(1) of this section which 
        occurs after a conviction for another offense under 
        this section[, or an attempt to commit an offense 
        punishable under this subparagraph];
            [(2)(A) a fine under this title or imprisonment for 
        not more than one year, or both, in the case of an 
        offense under subsection (a)(2), (a)(3), (a)(5)(C), or 
        (a)(6) of this section which does not occur after a 
        conviction for another offense under this section, or 
        an attempt to commit an offense punishable under this 
        subparagraph; and]
            (2)(A) except as provided in subsection (c)(2)(B), 
        a fine under this title or imprisonment for not more 
        than one year, or both, in the case of an offense under 
        subsection (a)(2), (a)(3), (a)(5)(A)(iii), or (a)(6) of 
        this section which does not occur after a conviction 
        for another offense under this section;

           *       *       *       *       *       *       *

            [(C) a fine under this title or imprisonment for 
        not more than ten years, or both, in the case of an 
        offense under subsection (a)(2), (a)(3) or (a)(6) of 
        this section which occurs after a conviction for 
        another offense under such subsection, or an attempt to 
        commit an offense punishable under this subparagraph; 
        and]
            [(3)(A)] (3) a fine under this title or 
        imprisonment for not more than five years, or both, in 
        the case of an offense under subsection (a)(4)[, 
        (a)(5)(A), (a)(5)(B),] or (a)(7) of this section which 
        does not occur after a conviction for another offense 
        under this section[, or an attempt to commit an offense 
        punishable under this subparagraph; and]; and
            [(B) a fine under this title or imprisonment for 
        not more than ten years, or both, in the case of an 
        offense under subsection (a)(4), (a)(5)(A), (a)(5)(B), 
        (a)(5)(C), or (a)(7) of this section which occurs after 
        a conviction for another offense under this section, or 
        an attempt to commit an offense punishable under this 
        subparagraph; and]
            (4) a fine under this title or imprisonment for not 
        more than ten years, or both, in the case of an offense 
        under subsection (a)(2), (a)(3), (a)(4), (a)(5), 
        (a)(6), or (a)(7) of this section which occurs after a 
        conviction for another offense under this section.
    (d) The United States Secret Service shall, in addition to 
any other agency having such authority, have the authority to 
investigate offenses under [subsections (a)(2)(A), (a)(2)(B), 
(a)(3), (a)(4), (a)(5), and (a)(6) of] this section. Such 
authority of the United States Secret Service shall be 
exercised in accordance with an agreement [which shall be 
entered into by] between the Secretary of the Treasury and the 
Attorney General.
    (e) As used in this section--
            (1) * * *

           *       *       *       *       *       *       *

            (7) the term ``department of the United States'' 
        means the legislative or judicial branch of the 
        Government or one of the executive departments 
        enumerated in section 101 of title 5; [and]
            (8) the term ``damage'' means any impairment to the 

        integrity or availability of data, a program, a system, 
        or information[, that--
                    [(A) causes loss aggregating at least 
                $5,000 in value during any 1-year period to one 
                or more individuals;
                    [(B) modifies or impairs, or potentially 
                modifies or impairs, the medical examination, 
                diagnosis, treatment, or care of one or more 
                individuals;
                    [(C) causes physical injury to any person; 
                or
                    [(D) threatens public health or safety; 
                and];
            (9) the term ``government entity'' includes the 
        Government of the United States, any State or political 
        subdivision of the United States, any foreign country, 
        and any state, province, municipality, or other 
        political subdivision of a foreign country[.];
            (10) the term ``conviction for another offense 
        under this section'' includes a State conviction for a 
        crime punishable by imprisonment for more than 1 year, 
        an element of which is unauthorized access, or 
        exceeding authorized access, to a computer;
            (11) the term ``loss'' means any reasonable cost to 
        any victim, including responding to the offense, 
        conducting a damage assessment, restoring any data, 
        program, system, or information to its condition before 
        the offense, and any revenue lost or costs incurred 
        because of interruption of service; and
            (12) the term ``person'' includes any individual, 
        firm, association, educational institution, financial 
        institution, corporation, company, partnership, 
        government entity, or other legal entity.

           *       *       *       *       *       *       *

    [(g) Any person who suffers damage or loss by reason of a 
violation of this section may maintain a civil action against 
the violator to obtain compensatory damages and injunctive 
relief or other equitable relief. Damages for violations 
involving damage as defined in subsection (e)(8)(A) are limited 
to economic damages. No action may be brought under this 
subsection unless such action is begun within 2 years of the 
date of the act complained of or the date of the discovery of 
the damage.]
    (g) Except as herein provided, any person who suffers 
damage or loss by reason of a violation of this section may 
maintain a civil action against the violator to obtain 
compensatory damages and injunctive or other equitable relief. 
A suit for a violation of subsection (a)(5) may be brought only 
if the conduct involves one or more of the factors enumerated 
in subsection (a)(5)(B). No action may be brought under this 
subsection unless such action is begun within 2 years of the 
date of the act complained of or the date of the discovery of 
the damage.

           *       *       *       *       *       *       *

    (i)(1) The court, in imposing sentence on any person 
convicted of a violation of this section, shall order, in 
addition to any other sentence imposed and irrespective of any 
provision of State law, that such person forfeit to the United 
States--
            (A) such person's interest in any personal property 
        that was used or intended to be used to commit or to 
        facilitate the commission of such violation; and
            (B) any property, real or personal, constituting or 
        derived from, any proceeds that such person obtained, 
        directly or indirectly, as a result of such violation.
    (2) The criminal forfeiture of property under this 
subsection, any seizure and disposition thereof, and any 
administrative or judicial proceeding in relation thereto, 
shall be governed by the provisions of section 413 of the 
Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 
U.S.C. 853), except subsection (d) of that section.

           *       *       *       *       *       *       *


   CHAPTER 119--WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION AND 
                  INTERCEPTION OF ORAL COMMUNICATIONS

Sec.
2510.  Definitions.
     * * * * * * *
[2515.  Prohibition of use as evidence of intercepted wire or oral 
          communications.]
2515.  Prohibition of use as evidence of intercepted wire, oral, or 
          electronic communications.
     * * * * * * *

Sec. 2510. Definitions

    As used in this chapter--
            (1) * * *

           *       *       *       *       *       *       *

            (10) ``communication common carrier'' shall have 
        the same meaning which is given the term ``common 
        carrier'' by section [153(h)] 153(10) of title 47 of 
        the United States Code;

           *       *       *       *       *       *       *

            (17) ``electronic storage'' means--
                    (A) any temporary, intermediate storage of 
                a wire or electronic communication incidental 
                to the electronic transmission thereof; [and]

           *       *       *       *       *       *       *

                    (C) any storage of an electronic 
                communication by an electronic communication 
                service without regard to whether the 
                communication has been accessed by the intended 
                recipient; and

           *       *       *       *       *       *       *


Sec. 2515. Prohibition of use as evidence of intercepted [wire or oral] 
                    wire, oral, or electronic communications

    [Whenever any wire or oral communication has been 
intercepted] (a) Except as provided in subsection (b), whenever 
any wire, oral, or electronic communication has been 
intercepted, or any electronic communication in electronic 
storage has been disclosed, no part of the contents of such 
communication and no evidence derived therefrom may be received 
in evidence in any trial, hearing, or other proceeding in or 
before any court, grand jury, department, officer, agency, 
regulatory body, legislative committee, or other authority of 
the United States, a State, or a political subdivision thereof 
if the disclosure of that information would be in violation of 
this chapter or chapter 121.
    (b) Subsection (a) does not apply to the disclosure, before 
a grand jury or in a criminal trial, hearing, or other criminal 
proceeding, of the contents of a communication, or evidence 
derived therefrom, against a person alleged to have 
intercepted, used, or disclosed the communication in violation 
of this chapter, or chapter 121, or participated in such 
violation.

Sec. 2516. Authorization for interception of wire, oral, or electronic 
                    communications

    (1) The Attorney General, Deputy Attorney General, 
Associate Attorney General, or any Assistant Attorney General, 
any acting Assistant Attorney General, or any Deputy Assistant 
Attorney General or acting Deputy Assistant Attorney General in 
the Criminal Division specially designated by the Attorney 
General, may authorize an application to a Federal judge of 
competent jurisdiction for, and such judge may grant in 
conformity with section 2518 of this chapter an order 
authorizing or approving the interception of [wire or oral] 
wire, oral, or electronic communications by the Federal Bureau 
of Investigation, or a Federal agency having responsibility for 
the investigation of the offense as to which the application is 
made, when such interception may provide or has provided 
evidence of--
            (a) * * *

           *       *       *       *       *       *       *

            (p) a felony violation of section 1028 (relating to 
        production of false identification documents), section 
        1030 (relating to computer fraud and abuse), section 
        1362 (relating to destruction of government 
        communications facilities), section 1542 (relating to 
        false statements in passport applications), section 
        1546 (relating to fraud and misuse of visas, permits, 
        and other documents) of this title or a violation of 
        section 274, 277, or 278 of the Immigration and 
        Nationality Act (relating to the smuggling of aliens); 
        or
            [(p)] (q) any conspiracy to commit any offense 
        described in any subparagraph of this paragraph.

           *       *       *       *       *       *       *


Sec. 2517. Authorization for disclosure and use of intercepted wire, 
                    oral, or electronic communications

    (1) Any investigative or law enforcement officer who, by 
any means authorized by this chapter or under the circumstances 
described in section 2515(b), has obtained knowledge of the 
contents of any wire, oral, or electronic communication, or 
evidence derived therefrom, may disclose such contents to 
another investigative or law enforcement officer to the extent 
that such disclosure is appropriate to the proper performance 
of the official duties of the officer making or receiving the 
disclosure.
    (2) Any investigative or law enforcement officer who, by 
any means authorized by this chapter or under the circumstances 
described in section 2515(b), has obtained knowledge of the 
contents of any wire, oral, or electronic communication or 
evidence derived therefrom may use such contents to the extent 
such use is appropriate to the proper performance of his 
official duties.

Sec. 2518. Procedure for interception of wire, oral, or electronic 
                    communications

    (1) * * *

           *       *       *       *       *       *       *

    (7) Notwithstanding any other provision of this chapter, 
any investigative or law enforcement officer, specially 
designated by the Attorney General, the Deputy Attorney 
General, the Associate Attorney General, or by the principal 
prosecuting attorney of any State or subdivision thereof acting 
pursuant to a statute of that State, who reasonably determines 
that--
            (a) * * *
            (b) there are grounds upon which an order could be 
        entered under this chapter to authorize such 
        interception,
may intercept such wire, oral, or electronic communication if 
an application for an order approving the interception is made 
in accordance with this section within forty-eight hours after 
the interception has occurred, or begins to occur. In the 
absence of an order, such interception shall immediately 
terminate when the communication sought is obtained or when the 
application for the order is denied, whichever is earlier. In 
the event such application for approval is denied, or in any 
other case where the interception is terminated without an 
order having been issued, the contents of any wire, oral, or 
electronic communication intercepted shall be treated as having 
been obtained in violation of this chapter, and an inventory 
shall be served as provided for in [subsection (d)] subsection 
(8)(d) of this section on the person named in the application.

           *       *       *       *       *       *       *

    (10)(a) Any aggrieved person in any trial, hearing, or 
proceeding in or before any court, department, officer, agency, 
regulatory body, or other authority of the United States, a 
State, or a political subdivision thereof, may move to suppress 
the contents of any wire [or oral], oral, or electronic 
communication intercepted pursuant to this chapter, or evidence 
derived therefrom, on the grounds that--
            (i) the communication was unlawfully intercepted;
            (ii) the order of authorization or approval under 
        which it was intercepted is insufficient on its face; 
        or
            (iii) the interception was not made in conformity 
        with the order of authorization or approval[.];
except that no supresssion may be ordered under the 
circumstances described in section 2515(b). Such motion shall 
be made before the trial, hearing, or proceeding unless there 
was no opportunity to make such motion or the person was not 
aware of the grounds of the motion. If the motion is granted, 
the contents of the intercepted wire [or oral], oral, or 
electronic communication, or evidence derived therefrom, shall 
be treated as having been obtained in violation of this 
chapter. The judge, upon the filing of such motion by the 
aggrieved person, may in his discretion make available to the 
aggrieved person or his counsel for inspection such portions of 
the intercepted communication or evidence derived therefrom as 
the judge determines to be in the interests of justice.

           *       *       *       *       *       *       *

    [(c) The remedies and sanctions described in this chapter 
with respect to the interception of electronic communications 
are the only judicial remedies and sanctions for 
nonconstitutional violations of this chapter involving such 
communications.]

           *       *       *       *       *       *       *


Sec. 2520. Recovery of civil damages authorized

    (a) * * *

           *       *       *       *       *       *       *

    (c) Computation of Damages.--(1) * * *
    (2) In any other action under this section, the court [may] 
shall assess as damages whichever is the [greater] greatest 
of--
            (A) the sum of the actual damages suffered by the 
        plaintiff and any profits made by the violator as a 
        result of the violation; [or]
            (B) statutory damages of [whichever is the greater 
        of $100 a day for each day of violation or $10,000.] 
        $500 a day for each violation; or
            (C) statutory damages of $10,000.

           *       *       *       *       *       *       *


      CHAPTER 121--STORED WIRE AND ELECTRONIC COMMUNICATIONS AND 
                      TRANSACTIONAL RECORDS ACCESS

Sec.
2701.  Unlawful access to stored communications.
[2702.  Disclosure of contents.]
2702.  Voluntary disclosure of customer communications or records.

           *       *       *       *       *       *       *


Sec. 2701. Unlawful access to stored communications

    (a) * * *
    (b) Punishment.--The punishment for an offense under 
subsection (a) of this section is--
            (1) if the offense is committed for [purposes of] a 
        tortious or illegal purpose, commercial advantage, 
        malicious destruction or damage, or private commercial 
        gain--
                    (A) a fine under this title or imprisonment 
                for not more than [one year] three years, or 
                both, in the case of a first offense under this 
                subparagraph; and
                    (B) a fine under this title or imprisonment 
                for not more than [two] five years, or both, 
                for any subsequent offense under this 
                subparagraph; and
            [(2) a fine under this title or imprisonment for 
        not more than six months, or both, in any other case.]
            (2) in any other case--
                    (A) a fine under this title or imprisonment 
                for not more than one year, or both, in the 
                case of a first offense under this 
                subparagraph; and
                    (B) a fine under this title or imprisonment 
                for not more than five years, or both, for any 
                subsequent offense under this subparagraph.

           *       *       *       *       *       *       *


[Sec. 2702. Disclosure of contents]

Sec. 2702. Voluntary disclosure of customer communications or records

    (a) Prohibitions.--Except as provided in subsection (b)--
            (1) a [person or entity providing an] provider of 
        electronic communication service to the public shall 
        not knowingly divulge to any person or entity the 
        contents of a communication while in electronic storage 
        by that service; [and]
            (2) a [person or entity providing] provider of 
        remote computing service to the public shall not 
        knowingly divulge to any person or entity the contents 
        of any communication which is carried or maintained on 
        that service--
                    (A) on behalf of, and received by means of 
                electronic transmission from (or created by 
                means of computer processing of communications 
                received by means of electronic transmission 
                from), a subscriber or customer of such 
                service; and
                    (B) solely for the purpose of providing 
                storage or computer processing services to such 
                subscriber or customer, if the provider is not 
                authorized to access the contents of any such 
                communications for purposes of providing any 
                services other than storage or computer 
                processing[.]; and
            (3) a provider of remote computing service or 
        electronic communication service to the public shall 
        not knowingly divulge a record or other information 
        pertaining to a subscriber to or customer of such 
        service (not including the contents of communications 
        covered by paragraph (1) or (2) of this subsection) to 
        any governmental entity.
    (b) Exceptions for Disclosure of Communications.--A [person 
or entity] provider described in subsection (a) may divulge the 
contents of a communication--
            (1) * * *

           *       *       *       *       *       *       *

    (c) Exceptions for Disclosure of Customer Records.--A 
provider described in subsection (a) may divulge a record or 
other information pertaining to a subscriber to or customer of 
such service (not including the contents of communications 
covered by subsection (a)(1) or (a)(2) of this section)--
            (1) as otherwise authorized in section 2703 of this 
        title;
            (2) with the lawful consent of the customer or 
        subscriber;
            (3) as may be necessarily incident to the rendition 
        of the service or to the protection of the rights or 
        property of the provider of that service;
            (4) to a governmental entity, if the provider 
        reasonably believes that an emergency involving 
        immediate danger of death or serious physical injury to 
        any person justifies disclosure of the information; or
            (5) to any person other than a governmental entity 
        where not otherwise prohibited by law.

Sec. 2703. Requirements for governmental access

    (a) Contents of Electronic Communications in Electronic 
Storage.--A governmental entity may require the disclosure by a 
provider of electronic communication service of the contents of 
an electronic communication, that is in electronic storage in 
an electronic communications system for [one hundred and eighty 
days] one year or less, only pursuant to a warrant issued under 
the Federal Rules of Criminal Procedure or equivalent State 
warrant. A governmental entity may require the disclosure by a 
provider of electronic communications services of the contents 
of an electronic communication that has been in electronic 
storage in an electronic communications system for more than 
[one hundred and eighty days] one year by the means available 
under subsection (b) of this section.

           *       *       *       *       *       *       *

    (c) Records Concerning Electronic Communication Service or 
Remote Computing Service.--(1)[(A) Except as provided in 
subparagraph (B),] A governmental entity may require a provider 
of electronic communication service or remote computing service 
[may] to disclose a record or other information pertaining to a 
subscriber to or customer of such service (not including the 
contents of communications covered by subsection (a) or [(b) of 
this section] (b), or wireless location information covered by 
subsection (g)) [to any person other than a governmental 
entity.]
    [(B) A provider of electronic communication service or 
remote computing service shall disclose a record or other 
information pertaining to a subscriber to or customer of such 
service (not including the contents of communications covered 
by subsection (a) or (b) of this section) to a governmental 
entity] only when the governmental entity--
            [(i)] (A) obtains a warrant issued under the 
        Federal Rules of Criminal Procedure or equivalent State 
        warrant;
            [(ii)] (B) obtains a court order for such 
        disclosure under subsection (d) of this section;
            [(iii)] (C) has the consent of the subscriber or 
        customer to such disclosure; [or]
            [(iv)] (D) submits a formal written request 
        relevant to a law enforcement investigation concerning 
        telemarketing fraud for the name, address, and place of 
        business of a subscriber or customer of such provider, 
        which subscriber or customer is engaged in 
        telemarketing (as such term is defined in section 2325 
        of this title)[.]; or
            (E) seeks information pursuant to paragraph (2).
    [(C)] (2) A provider of electronic communication service or 
remote computing service shall disclose to a governmental 
entity the name, address, local and long distance telephone 
toll billing records, telephone number or other subscriber 
number or identity, and length of service of a subscriber to or 
customer of such service and the types of services the 
subscriber or customer utilized, when the governmental entity 
uses [an administrative subpoena authorized by a Federal or 
State statute or a Federal or State grand jury or trial 
subpoena] a Federal or State grand jury or trial subpoena, or a 
subpoena or equivalent process authorized by a Federal or State 
statute, or any means available under [subparagraph (B).] 
paragraph (1).
    [(2)] (3) A governmental entity receiving records or 
information under this subsection is not required to provide 
notice to a subscriber or customer.

           *       *       *       *       *       *       *

    (g) Reports Concerning the Disclosure of the Contents of 
Electronic Communications.--
            (1) By January 31 of each calendar year, the judge 
        issuing or denying an order, warrant, or subpoena, or 
        the authority issuing or denying a subpoena, under 
        subsection (a) or (b) of this section during the 
        preceding calendar year shall report on each such 
        order, warrant, or subpoena to the Administrative 
        Office of the United States Courts--
                    (A) the fact that the order, warrant, or 
                subpoena was applied for;
                    (B) the kind of order, warrant, or subpoena 
                applied for;
                    (C) the fact that the order, warrant, or 
                subpoena was granted as applied for, was 
                modified, or was denied;
                    (D) the offense specified in the order, 
                warrant, subpoena, or application;
                    (E) the identity of the agency making the 
                application; and
                    (F) the nature of the facilities from which 
                or the place where the contents of electronic 
                communications were to be disclosed.
            (2) In January of each year the Attorney General or 
        an Assistant Attorney General specially designated by 
        the Attorney General shall report to the Administrative 
        Office of the United States Courts--
                    (A) the information required by 
                subparagraphs (A) through (F) of paragraph (1) 
                of this subsection with respect to each 
                application for an order, warrant, or subpoena 
                made during the preceding calendar year; and
                    (B) a general description of the 
                disclosures made under each such order, 
                warrant, or subpoena, including--
                            (i) the approximate number of all 
                        communications disclosed and, of those, 
                        the approximate number of incriminating 
                        communications disclosed;
                            (ii) the approximate number of 
                        other communications disclosed; and
                            (iii) the approximate number of 
                        persons whose communications were 
                        disclosed.
            (3) In June of each year, beginning in 2002, the 
        Director of the Administrative Office of the United 
        States Courts shall transmit to the Congress a full and 
        complete report concerning the number of applications 
        for orders, warrants, or subpoenas authorizing or 
        requiring the disclosure of the contents of electronic 
        communications pursuant to subsections (a) and (b) of 
        this section and the number of orders, warrants, or 
        subpoenas granted or denied pursuant to subsections (a) 
        and (b) of this section during the preceding calendar 
        year. Such report shall include a summary and analysis 
        of the data required to be filed with the 
        Administrative Office by paragraphs (1) and (2) of this 
        subsection. The Director of the Administrative Office 
        of the United States Courts is authorized to issue 
        binding regulations dealing with the content and form 
        of the reports required to be filed by paragraphs (1) 
        and (2) of this subsection.
    (h) Disclosure of Location Information to Governmental 
Entities.--
            (1) Disclosure upon court order.--Except as 
        provided in paragraph (2), a provider of mobile 
        electronic communication service shall provide to a 
        governmental entity information generated by and 
        disclosing the current physical location of a 
        subscriber's equipment only if the governmental entity 
        obtains a court order issued upon a finding that there 
        is probable cause to believe that--
                    (A) a person is committing, has committed, 
                or is about to commit a felony offense; and
                    (B) the location information sought to be 
                obtained concerns the location of the person 
                believed to have committed, be committing, or 
                be about to commit that offense or a victim of 
                that offense.
            (2) Permitted disclosures without court order.--A 
        provider of mobile electronic communication service may 
        provide information described in paragraph (1)--
                    (A) to a public safety answering point, 
                emergency medical service provider or emergency 
                dispatch provider, public safety, fire service 
                or law enforcement official, or hospital 
                emergency or trauma care facility, in order to 
                respond to the user's call for emergency 
                services;
                    (B) to inform the user's legal guardian or 
                members of the user's immediate family of the 
                user's location in an emergency situation that 
                involves the risk of death or serious physical 
                harm; or
                    (C) with the express consent of the 
                subscriber or the user of the equipment 
                concerned.
            (3) Definition.--The term ``public safety answering 
        point'' means a facility that has been designated to 
        receive emergency calls and route them to emergency 
        service personnel.

           *       *       *       *       *       *       *


Sec. 2705. Delayed notice

    (a) Delay of Notification.--(1) * * *

           *       *       *       *       *       *       *

    (4) Extensions of the delay of notification provided in 
section 2703 of up to ninety days each may be granted by the 
court upon application, [or by certification by a governmental 
entity, but only in accordance with subsection (b) of this 
section.] if the court determines that there is reason to 
believe that notification of the existence of the court order 
or subpoena may have an adverse result described in paragraph 
(2) of this subsection.

           *       *       *       *       *       *       *


Sec. 2707. Civil action

    (a) * * *

           *       *       *       *       *       *       *

    (c) Damages.--The court may assess as damages in a civil 
action under this section the sum of the actual damages 
suffered by the plaintiff and any profits made by the violator 
as a result of the violation, but in no case shall a person 
entitled to recover receive less than the sum of [$1,000] 
$5,000. If the violation is willful or intentional, the court 
may assess punitive damages. In the case of a successful action 
to enforce liability under this section, the court may assess 
the costs of the action, together with reasonable attorney fees 
determined by the court.

           *       *       *       *       *       *       *


                      PART II--CRIMINAL PROCEDURE

           *       *       *       *       *       *       *


CHAPTER 206--PEN REGISTERS AND TRAP AND TRACE DEVICES

           *       *       *       *       *       *       *


Sec. 3122. Application for an order for a pen register or a trap and 
                    trace device

    (a) * * *
    (b) Contents of Application.--An application under 
subsection (a) of this section shall include--
            (1) * * *
            [(2) a certification by the applicant that the 
        information likely to be obtained is relevant to an 
        ongoing criminal investigation being conducted by that 
        agency.]
            (2) a statement of facts showing that the 
        requirements of section 3123 have been met.

Sec. 3123. Issuance of an order for a pen register or a trap and trace 
                    device

    (a) In General.--Upon an application made under section 
3122 of this title, the court shall enter an ex parte order 
authorizing the installation and use of a pen register or a 
trap and trace device within the jurisdiction of the court if 
the court finds that [the attorney for the Government or the 
State law enforcement or investigative officer has certified to 
the court that the information likely to be obtained by such 
installation and use is relevant to an ongoing criminal 
investigation.] specific and articulable facts reasonably 
indicate that a crime has been, is being, or will be committed, 
and information likely to be obtained by such installation and 
use is relevant to the investigation of that crime.

           *       *       *       *       *       *       *


Sec. 3125. Emergency pen register and trap and trace device 
                    installation

    (a) Notwithstanding any other provision of this chapter, 
any investigative or law enforcement officer, specially 
designated by the Attorney General, the Deputy Attorney 
General, the Associate Attorney General, any Assistant Attorney 
General, any acting Assistant Attorney General, or any Deputy 
Assistant Attorney General, or by the principal prosecuting 
attorney of any State or subdivision thereof acting pursuant to 
a statute of that State, who reasonably determines that--
            (1) an emergency situation exists that involves--
                    (A) immediate danger of death or serious 
                bodily injury to any person; [or]
                    (B) conspiratorial activities 
                characteristic of organized crime[,];
                    (C) an immediate threat to a national 
                security interest; or
                    (D) an ongoing attack on the integrity or 
                availability of a protected computer in 
                violation of section 1030(a)(5)(A)(i) or 
                1030(a)(5)(A)(ii) of this title,
        that requires the installation and use of a pen 
        register or a trap and trace device before an order 
        authorizing such installation and use can, with due 
        diligence, be obtained, and
            (2) there are grounds upon which an order could be 
        entered under this chapter to authorize such 
        installation and use;
may have installed and use a pen register or trap and trace 
device if, within forty-eight hours after the installation has 
occurred, or begins to occur, an order approving the 
installation or use is issued in accordance with section 3123 
of this title. In the event an application for such order is 
denied, or in any other case where the installation and use of 
a pen register or trap and trace device is terminated without 
an order having been issued, any information obtained by such 
installation and use shall be treated as having been obtained 
in violation of this chapter, and an inventory shall be served 
as provided for in subsection (b) of this section on the person 
named in the application.
    (b) Within a reasonable time but not later than 90 days 
after the filing of an application for an order of approval 
under subsection (a)(2) of this section which is denied, the 
denying judge shall cause to be served, on the persons named in 
the order or the application, and such other parties to the 
information obtained by such installation and use of a pen 
register or trap and trace device as the judge may determine in 
his discretion is in the interest of justice, an inventory 
which shall include notice of--
            (1) the fact of the entry of the application;
            (2) the date of the entry and the date of the 
        denial of the application; and
            (3) the fact that during the period covered by the 
        application, information was obtained by the 
        installation and use of a pen register or trap and 
        trace device.
The judge, upon the filing of a motion, may in his discretion 
make available to such person or his counsel for inspection 
such portions of the applications as the judge determines to be 
in the interest of justice. On an ex parte showing of good 
cause to a judge of competent jurisdiction the serving of the 
inventory required by this subsection may be postponed.
    [(b)] (c) In the absence of an authorizing order, such use 
shall immediately terminate when the information sought is 
obtained, when the application for the order is denied or when 
forty-eight hours have lapsed since the installation of the pen 
register or trap and trace device, whichever is earlier.
    [(c)] (d) The knowing installation or use by any 
investigative or law enforcement officer of a pen register or 
trap and trace device pursuant to subsection (a) without 
application for the authorizing order within forty-eight hours 
of the installation shall constitute a violation of this 
chapter.
    [(d)] (e) A provider of a wire or electronic service, 
landlord, custodian, or other person who furnished facilities 
or technical assistance pursuant to this section shall be 
reasonably compensated for such reasonable expenses incurred in 
providing such facilities and assistance.

           *       *       *       *       *       *       *


Sec. 3127. Definitions for chapter

    As used in this chapter--
            (1) * * *

           *       *       *       *       *       *       *

            (6) the term ``State'' means a State, the District 
        of Columbia, Puerto Rico, and any other possession or 
        territory of the United States[.]; and
            (7) the term ``protected computer'' has the meaning 
        set forth in section 1030 of this title.

           *       *       *       *       *       *       *

                              ----------                              


  SECTION 805 OF THE ANTITERRORISM AND EFFECTIVE DEATH PENALTY ACT OF 
                                  1996

SEC. 805. DETERRENT AGAINST TERRORIST ACTIVITY DAMAGING A FEDERAL 
                    INTEREST COMPUTER.

    (a) * * *

           *       *       *       *       *       *       *

    (c) Amendment of Guidelines.--Pursuant to its authority 
under section 994(p) of title 28, United States Code, the 
United States Sentencing Commission [shall amend the sentencing 
guidelines to ensure any individual convicted of a violation of 
paragraph (4) or (5)] shall amend the sentencing guidelines to 
ensure any individual convicted of a violation of paragraph (4) 
or a felony violation of paragraph (5)(A)(i) (but not of 
paragraph (5)(A)(ii) or (5)(A)(iii)) of section 1030(a) of 
title 18, United States Code, is imprisoned for not less than 6 
months.