Privacy: An Overview of Federal Statutes Governing Wiretapping and Electronic Eavesdropping
Prepared for Members and Committees of Congress
This report provides an overview of federal law governing wiretapping and electronic
eavesdropping. It also appends citations to state law in the area and contains a bibliography of
legal commentary as well as the text of the Electronic Communications Privacy Act (ECPA) and
the Foreign Intelligence Surveillance Act (FISA).
It is a federal crime to wiretap or to use a machine to capture the communications of others
without court approval, unless one of the parties has given their prior consent. It is likewise a
federal crime to use or disclose any information acquired by illegal wiretapping or electronic
eavesdropping. Violations can result in imprisonment for not more than five years; fines up to
$250,000 (up to $500,000 for organizations); in civil liability for damages, attorneys’ fees and
possibly punitive damages; in disciplinary action against any attorneys involved; and in
suppression of any derivative evidence. Congress has created separate but comparable protective
schemes for electronic communications (e.g., e-mail) and against the surreptitious use of
telephone call monitoring practices such as pen registers and trap and trace devices.
Each of these protective schemes comes with a procedural mechanism to afford limited law
enforcement access to private communications and communications records under conditions
consistent with the dictates of the Fourth Amendment. The government has been given even more
narrowly confined authority to engage in electronic surveillance, conduct physical searches,
install and use pen registers and trap and trace devices for law enforcement purposes under the
Electronic Communications Privacy Act and for purposes of foreign intelligence gathering under
the Foreign Intelligence Surveillance Act.
This report includes a brief summary of the recently expired Protect America Act, P.L. 110-55 and
of the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, P.L. 110-261
(H.R. 6304). It is available in an abridged form without footnotes, quotations, or appendices as
CRS Report 98-327, Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping
and Electronic Eavesdropping, by Gina Marie Stevens and Charles Doyle. Both will be revised as
circumstances warrant.
Introduc tion ..................................................................................................................................... 1
Backgr ound ..................................................................................................................................... 1
Prohibitions ..................................................................................................................................... 6
Illegal Wiretapping and Electronic Eavesdropping...................................................................6
Person......................................................................................................................... ......... 7
Intentional .................................................................................................................... ....... 7
J urisdicti on ................................................................................................................... ....... 7
Intercepti on ................................................................................................................... ...... 8
By Electronic, Mechanical, or Other Device......................................................................9
Wire, Oral, or Electronic Communications........................................................................11
Endeavoring to Intercept....................................................................................................11
Exemptions: Consent Interceptions..................................................................................12
Exemptions: Publicly Accessible Radio Communications...............................................13
Exemptions: Government Officials..................................................................................13
Exemptions: Communication Service Providers..............................................................14
Domestic Exemptions.......................................................................................................15
Consequences: Criminal Penalties....................................................................................16
Consequences: Civil Liability...........................................................................................17
Consequences: Civil Liability of the United States..........................................................18
Consequences: Administrative Action..............................................................................18
Consequences: Attorney Discipline..................................................................................18
Consequences: Exclusion of Evidence.............................................................................19
Illegal Disclosure of Information Obtained by Wiretapping or Electronic
Eave sdropping ...................................................................................................................... 21
Illegal Use of Information Obtained by Unlawful Wiretapping or Electronic
Eave sdropping ...................................................................................................................... 24
Shipping, Manufacturing, Distributing, Possessing or Advertising Wire, Oral, or
Electronic Communication Interception Devices................................................................25
Stored Electronic Communications.........................................................................................27
Pen Registers and Trap and Trace Devices.............................................................................30
Foreign Intelligence Surveillance Act.....................................................................................31
Procedure ....................................................................................................................................... 34
Law Enforcement Wiretapping and Electronic Eavesdropping..............................................34
Stored Electronic or Wire Communications............................................................................37
Pen Registers and Trap and Trace Devices.............................................................................39
Foreign Intelligence Surveillance Act.....................................................................................40
Pen Registers and Trap and Trace Devices.......................................................................45
Tangible Items...................................................................................................................45
Protect America Act (Expired)..........................................................................................46
Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 (P.L.
110-261) ......................................................................................................................... 47
Selected Bibliography.............................................................................................................54
Appendix A. State Statutes Outlawing the Interception of Wire(w), Oral(o) and Electronic
Communications (e) .................................................................................................................... 61
Appendix B. Consent Interceptions Under State Law...................................................................62
Appendix C. Statutory Civil Liability for Interceptions Under State Law....................................63
Appendix D. Court Authorized Interception Under State Law.....................................................64
Appendix E. State Statutes Regulating Stored Electronic Communications (SE), Pen
Registers (PR) and Trap and Trace Devices (T).........................................................................65
Appendix F. State Computer Crime Statutes.................................................................................66
Appendix G. Spyware....................................................................................................................67
Appendix H. Text of ECPA/FISA.................................................................................................68
Author Contact Information........................................................................................................195
Depending on one’s perspective, wiretapping and electronic eavesdropping are either “dirty
business,” essential law enforcement tools, or both. This is a very general overview of the federal
statutes that proscribe wiretapping and electronic eavesdropping and of the procedures they
establish for law enforcement and foreign intelligence gathering purposes. Although the specifics
of state law are beyond the scope of this report, citations to related state statutory provisions have
been appended. The text of pertinent federal statutes and a selected bibliography of legal 1
materials appear as appendices as well.
At common law, “eavesdroppers, or such as listen under walls or windows, or the eaves of a
house, to hearken after discourse, and thereupon to frame slanderous and mischievous tales, are a
common nuisance and presentable at the court-leet; or are indictable at the sessions, and
punishable by fine and finding of sureties for [their] good behavior,” 4 BLACKSTONE,
COMMENTARIES ON THE LAWS OF ENGLAND, 169 (1769).
Although early American law proscribed common law eavesdropping, the crime was little 2
prosecuted and by the late nineteenth century had “nearly faded from the legal horizon.” With
1 Portions of this report draw upon a series of earlier reports, no longer available, entitled: Wiretapping and Electronic
Surveillance: A Brief Discussion of Pertinent Supreme Court Cases, A Summary and Compilation of Federal State
Statutes, and a Selected Legal Bibliography (1970); Wiretapping and Electronic Surveillance: A Brief Discussion of
Pertinent Supreme Court Cases, A Summary and Compilation of Federal State Statutes, and a Selected Legal
Bibliography (1971); Wiretapping and Electronic Surveillance: Federal and State Statutes (1974); Taps and Bugs: A
Compilation of Federal and State Statutes Governing the Interception of Wire and Oral Communications (1981); The
Interception of Communications: A Legal Overview of Bugs and Taps (1988); Wiretapping & Electronic Surveillance:
The Electronic Communications Privacy Act and Related Matters (1992); Taps, Bugs & Telephony: An Overview of
Federal Statutes Governing Wiretapping and Electronic Eavesdropping (1998); Privacy: An Overview of Federal
Statutes Governing Wiretapping and Electronic Eavesdropping (2001); id. (2003); id. (2006).
As used in this report “electronic eavesdropping” refers to the use of hidden microphones, recorders and any other
mechanical or electronic means of capturing ongoing communications, other than wiretapping (tapping into telephone
conversations). In previous versions of this report and other earlier writings, it was common to use a more neutral, and
consequently preferred, term – electronic surveillance – at least when referring to law enforcement use. Unfortunately,
continued use of the term “electronic surveillance” rather than “electronic eavesdropping” risks confusion with forms
of surveillance that either have individualistic definitions (e.g., “electronic surveillance” under the Foreign Intelligence
Surveillance Act, 50 U.S.C. 1801(f)), that involve surveillance that does not capture conversation (e.g., thermal
imaging or electronic tracking devices), or that may or may not capture conversation (e.g., video surveillance which
when it does capture conversation is covered by the law governing electronic eavesdropping, see United States v.
Williams, 124 F.3d 411 (3d Cir. 1997)).
Related developments are discussed in CRS Report RL30465, The Foreign Intelligence Surveillance Act: An Overview
of the Statutory Framework and Recent Judicial Decisions; CRS Report 97-1025, Cybercrime: An Overview of the
Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws; CRS Report RL30677, Digital
Surveillance: The Communications Assistance for Law Enforcement Act; and CRS Report RL34409, Selected Laws
Governing the Disclosure of Customer Phone Records by Telecommunications Carriers.
2 “Eavesdropping is indictable at the common law, not only in England but in our states. It is seldom brought to the
attention of the courts, and our books contain too few decisions upon it to enable an author to define it with confidence.
. . . It never occupied much space in the law, and it has nearly faded from the legal horizon.” 1 BISHOP, COMMENTARIES
ON THE CRIMINAL LAW, 670 (1882).
the invention of the telegraph and telephone, however, state laws outlawing wiretapping or
indiscretion by telephone and telegraph operators preserved the spirit of the common law
prohibition in this country.
Congress enacted the first federal wiretap statute as a temporary measure to prevent disclosure of 3
government secrets during World War I. Later, it proscribed intercepting and divulging private 4
radio messages in the Radio Act of 1927, but did not immediately reestablish a federal wiretap
prohibition. By the time of the landmark Supreme Court decision in Olmstead, however, at least
forty-one of the forty-eight states had banned wiretapping or forbidden telephone and telegraph 5
employees and officers from disclosing the content of telephone or telegraph messages or both.
Olmstead was a Seattle bootlegger whose Prohibition Act conviction was the product of a federal
wiretap. He challenged his conviction on three grounds, arguing unsuccessfully that the wiretap
evidence should have been suppressed as a violation of either his Fourth Amendment rights, his
Fifth Amendment privilege against self-incrimination, or the rights implicit in the Washington
state statute that outlawed wiretapping.
For a majority of the Court, writing through Chief Justice Taft, Olmstead’s Fourth Amendment
challenge was doomed by the absence of “an official search and seizure of his person, or such a
seizure of his papers or his tangible material effects, or an actual physical invasion of his house or 67
curtilage for the purposes of making a seizure,” 277 U.S. at 466.
Chief Justice Taft pointed out that Congress was free to provide protection which the Constitution 8
did not. Congress did so in the 1934 Communications Act by expanding the Radio Act’s
3 40 Stat.1017-18 (1918)(“whoever during the period of governmental operation of the telephone and telegraph systems
of the United States . . . shall, without authority and without the knowledge and consent of the other users thereof,
except as may be necessary for operation of the service, tap any telegraph or telephone line . . . or whoever being
employed in any such telephone or telegraph service shall divulge the contents of any such telephone or telegraph
message to any person not duly authorized or entitled the receive the same, shall be fined not exceeding $1,000 or
imprisoned for not more than one year or both”); 56 Cong.Rec. 10761-765 (1918).
4 44 Stat. 1172 (1927)(“. . . no person not being authorized by the sender shall intercept any message and divulge or
publish the contents, substance, purpose, effect, or meaning of such intercepted message to any person . . .”).
5 Olmstead v. United States, 277 U.S. 438, 479-80 n.13 (1928)(Brandeis, J., dissenting). Olmstead is remembered most
today for the dissents of Holmes and Brandeis, but for four decades it stood for the view that the Fourth Amendment’s
search and seizure commands did not apply to government wiretapping accomplished without a trespass onto private
property.
6 Curtilage originally meant the land and buildings enclosed by the walls of a castle; in later usage it referred to the
barns, stables, garden plots and the like immediately proximate to a dwelling; it is understood in Fourth Amendment
parlance to describe that area which “harbors those intimate activities associated with domestic life and the privacies of
the home,” United States v. Dunn, 480 U.S. 294, 301 n.4 (1987).
7 Olmstead had not been compelled to use his phone and so the Court rejected his Fifth Amendment challenge. 277
U.S.C. at 462. Any violation of the Washington state wiretap statute was thought insufficient to warrant the exclusion
of evidence, 277 U.S. at 466-68. Justice Holmes in his dissent tersely characterized the conduct of federal wiretappers
as “dirty business,” 277 U.S. at 470. The dissent of Justice Brandeis observed that the drafters of the Constitution
“conferred as against the Government, the right to be let alone – the most comprehensive of rights and the right most
valued by civilized men. To protect that right, every unjustifiable intrusion by the Government against privacy of the
individual whatever the means employed, must be deemed in violation of the Fourth Amendment,” 277 U.S. at 478-79.
8 “Congress may of course protect the secrecy of telephone messages by making them, when intercepted inadmissible
in evidence in federal criminal trials, by direct legislation,” 277 U.S. at 465.
proscription against intercepting and divulging radio communications so as to include 9
intercepting and divulging radio or wire communications.
The Federal Communications Act outlawed wiretapping, but it said nothing about the use of 10
machines to surreptitiously record and transmit face to face conversations. In the absence of a
statutory ban the number of surreptitious recording cases decided on Fourth Amendment grounds 11
surged and the results began to erode Olmstead’s underpinnings.
Erosion, however, came slowly. Initially the Court applied Olmstead’s principles to the electronic
eavesdropping cases. Thus, the use of a dictaphone to secretly overhear a private conversation in
an adjacent office offended no Fourth Amendment precipes because no physical trespass into the
office in which the conversation took place had occurred, Goldman v. United States, 316 U.S. 129
(1942). Similarly, the absence of a physical trespass precluded Fourth Amendment coverage of
the situation where a federal agent secretly recorded his conversation with a defendant held in a
commercial laundry in an area open to the public, On Lee v. United States, 343 U.S. 747 (1952).
On the other hand, the Fourth Amendment did reach the government’s physical intrusion upon
private property during an investigation, as for example when they drove a “spike mike” into the
common wall of a row house until it made contact with a heating duct for the home in which the
conversation occurred, Silverman v. United States, 365 U.S. 505 (1961).
Silverman presented something of a technical problem, because there was some question whether
the spike mike had actually crossed the property line of the defendant’s town house when it made
contact with the heating duct. The Court declined to rest its decision on the technicalities of local
property law, and instead found that the government’s conduct had intruded upon privacy of 12
home and hearth in a manner condemned by the Fourth Amendment, 365 U.S. at 510-12.
9 48 U.S.C. 1103-4 (1934), 47 U.S.C. 605 (1940 ed.). The Act neither expressly condemned law enforcement
interceptions nor called for the exclusion of wiretap evidence, but it was read to encompass both, Nardone v. United
States, 302 U.S. 379 (1937); Nardone v. United States, 308 U.S. 321 (1939).
10 Section 605 did ban the interception and divulgence of radio broadcasts but it did not reach the radio transmission of
conversations that were broadcast unbeknownst to all of the parties to the conversation. Late in the game, the FCC
supplied a partial solution when it banned the use of licensed radio equipment to overhear or record private
conversation without the consent of all the parties involved in the conversation, 31 Fed.Reg. 3400 (March 4, 1966),
amending then 47 C.F.R. §§2.701, 15.11. The FCC excluded “operations of any law enforcement offices conducted
under lawful authority,” id.
11 The volume of all Fourth Amendment cases calling for Supreme Court review increased dramatically after Mapp v.
Ohio, 367 U.S. 643 (1961), acknowledged the application of the Fourth Amendment exclusionary rule to the states.
12 “The absence of a physical invasion of the petitioner’s premises was also a vital factor in the Court’s decision in
Olmstead v. United States . . . . In holding that the wiretapping there did not violate the Fourth Amendment, the Court
noted that the insertions were made without trespass upon any property of the defendants. They were made in the
basement of the large office building. The taps from house lines were made in the streets near the houses. 277 U.S. at
457. There was no entry of the houses or offices of the defendants. 277 U.S. at 464. Relying upon these circumstances,
the Court reasoned that the intervening wires are not part of (the defendant’s) house or office any more than are the
highways along which they are stretched. 277 U.S. at 465.
“Here, by contrast, the officers overheard the petitioners’ conversations only by usurping part of the petitioners’ house
or office – a heating system which was an integral part of the premises occupied by the petitioners, a usurpation that
was effected without their knowledge and without their consent. In these circumstances we need not pause to consider
whether or not there was a technical trespass under the local property law relating to party walls. Inherent Fourth
Amendment rights are not inevitably measurable in terms of ancient niceties of tort or real property law . . . .
“The Fourth Amendment, and the personal rights which it secures, have a long history. At the very core stands the right
of a man to retreat into his own home and there be free from unreasonable governmental intrusion . . . This Court has
never held that a federal officer may without warrant and without consent physically entrench into a man’s office or
(continued...)
Each of these cases focused upon whether a warrantless trespass onto private property had
occurred, that is, whether the means of conducting a search and seizure had been so unreasonable
as to offend the Fourth Amendment. Yet in each case, the object of the search and seizure had
been not those tangible papers or effects for which the Fourth Amendment’s protection had been
traditionally claimed, but an intangible, a conversation. This enlarged view of the Fourth
Amendment could hardly be ignored, for “[i]t follows from u u u Silverman u u u that the Fourth
Amendment may protect against the overhearing of verbal statements as well as against the more
traditional seizure of papers and effects,” Wong Sun v. United States, 371 U.S. 471, 485 (1963).
Soon thereafter the Court repudiated the notion that the Fourth Amendment’s protection was
contingent upon some trespass to real property, Katz v. United States, 389 U.S. 347 (1967). Katz
was a bookie convicted on the basis of evidence gathered by an electronic listening and recording
device set up outside the public telephone booth that Katz used to take and place bets. The Court
held that the gateway for Fourth Amendment purposes stood at that point where an individual
should to able to expect that his or her privacy would not be subjected to unwarranted 13
governmental intrusion, 389 U.S. at 353.
One obvious consequence of Fourth Amendment coverage of wiretapping and other forms of
electronic eavesdropping is the usual attachment of the Amendment’s warrant requirement. To
avoid constitutional problems and at the same time preserve wiretapping and other forms of
electronic eavesdropping as a law enforcement tool, some of the states established a statutory
system under which law enforcement officials could obtain a warrant, or equivalent court order,
authorizing wiretapping or electronic eavesdropping.
The Court rejected the constitutional adequacy of one of the more detailed of these state statutory
schemes in Berger v. New York, 388 U.S. 41 (1967). The statute was found deficient its failure to
require:
• a particularized description of the place to be searched; a particularized
description of the crime to which the search and seizure related;
(...continued)
home, there secretly observe or listen, and relate at the man’s subsequent criminal trial what was seen or heard.
“A distinction between the dictaphone employed in Goldman and the spike mike utilized here seemed to the Court of
Appeals too fine a one to draw. The court was unwilling to believe that the respective rights are to be measured in
fractions of inches. But decision here does not turn upon the technicality of a trespass upon a party wall as a matter of
local law. It is based upon the reality of an actual intrusion into a constitutionally protected area. What the Court said
long ago bears repeating now: It may be that it is the obnoxious thing in its mildest and least repulsive form; but
illegitimate and unconstitutional practices get their first footing in that way, namely, by silent approaches and slight
deviations from legal modes of procedure. Boyd v. United States, 116 U.S. 616, 635. We find no occasion to re-
examine Goldman here, but we decline to go beyond it, by even a fraction of an inch,” 365 U.S. at 510-12 (internal
quotation marks omitted).
13 “We conclude that the underpinnings of Olmstead and Goldman have been so eroded by our subsequent decisions
that the trespass doctrine there enunciated can no longer be regarded as controlling. The Government’s activities in
electronically listening to and recording the petitioner’s words violated the privacy upon which he justifiably relied
while using the telephone booth and thus constituted a search and seizure within the meaning of the Fourth
Amendment. The fact that the electronic device employed to achieve that end did not happen to penetrate the wall of
the booth can have no constitutional significance.” Later courts seem to prefer the “expectation of privacy” language
found in Justice Harlan’s concurrence: “My understanding of the rule that has emerged from prior decisions is that
there is a twofold requirement, first that a person have exhibited an actual (subjective) expectation of privacy and,
second, that the expectation be one that society is prepared to recognize as reasonable,” 389 U.S. at 361.
• a particularized description of the conversation to be seized;
• limitations to prevent general searches;
• termination of the interception when the conversation sought had been seized;
• prompt execution of the order;
• return to the issuing court detailing the items seized; and
• any showing exigent circumstances to overcome the want of prior notice. 388
U.S. at 58-60.
Berger help persuade Congress to enact Title III of the Omnibus Crime Control and Safe Streets
Act of 1968, 87 Stat. 197, 18 U.S.C. 2510 - 2520 (1970 ed.), a comprehensive wiretapping and
electronic eavesdropping statute that not only outlawed both in general terms but that permitted
federal and state law enforcement officers to use them under strict limitations designed to meet
the objections in Berger.
A decade later another Supreme Court case persuaded Congress to supplement Title III with a
judicially supervised procedure for the use of wiretapping and electronic eavesdropping in foreign
intelligence gathering situations. When Congress passed Title III there was some question over
the extent of the President’s inherent powers to authorize wiretaps – without judicial approval – in
national security cases. As a consequence, the issue was simply removed from the Title III 14
scheme. After the Court held that the President’s inherent powers were insufficient to excuse
warrantless electronic eavesdropping on purely domestic threats to national security, United
States v. United States District Court, 407 U.S. 297 (1972), Congress considered it prudent to
augment the foreign intelligence gathering authority of the United States with the Foreign
Intelligence Security Act of 1978, 92 Stat. 1783, 50 U.S.C. 1801-1862. The Act provides a
procedure for judicial review and authorization or denial of wiretapping and other forms of
electronic eavesdropping for purposes of foreign intelligence gathering.
In 1986, Congress recast Title III in the Electronic Communications Privacy Act (ECPA), 100
Stat. 1848, 18 U.S.C. 2510 - 2521. The Act followed the general outline of Title III with
adjustments and additions. Like Title III, it sought to strike a balance between the interests of
privacy and law enforcement, but it also reflected a Congressional desire to avoid unnecessarily
crippling infant industries in the fields of advanced communications technology, H.Rept. 99-647,
at 18-9 (1984); S.Rept. 99-541, at 5 (1986).
ECPA also included new protection and law enforcement access provisions for stored wire and
electronic communications and transactional records access (e-mail and phone records),
recording the calls placed to or from a particular telephone), 18 U.S.C. 3121 - 3126.
14 18 U.S.C. 2511(3)(1970 ed.)(“Nothing contained in this chapter or in section 605 of the Communications Act . . .
shall limit the constitutional power of the President to take such measures as he deems necessary to protect the Nation
against actual or potential attack or other hostile acts of a foreign power, to obtain foreign intelligence information
deemed essential to the security of the United States, or to protect national security information against foreign
intelligence activities. . .”).
15 These provisions were also grounded in Supreme Court jurisprudence. In United States v. Miller, 425 U.S. 435, 441-
43 (1976), the Court held that a customer had no Fourth Amendment protected expectation of privacy in the records his
bank maintained concerning his transactions with them. These third party records were therefore available to the
government under a subpoena duces tecum rather than a more narrowly circumscribed warrant, 425 U.S. 44-45. In
(continued...)
Over the years, Congress has adjusted the components of Title III/ECPA or FISA. Sometimes in
the interests of greater privacy; sometimes in the interest of more effective law enforcement or th
foreign intelligence gathering. The 107 Congress, for instance, amended the basic statutes in the
USA PATRIOT Act, P.L. 107-56, 115 Stat. 272 (2001); the Intelligence Authorization Act for st
Fiscal Year 2002, P.L. 107-108, 115 Stat. 1394 (2001); the 21 Century Department of Justice
Appropriations Authorization Act, P.L. 107-273, 116 Stat. 1758 (2002); the Department of
Homeland Security Act, P.L. 107-296, 116 Stat. 2135 (2002). The later modifications appear in
the USA PATRIOT Improvement and Reauthorization Act, P.L. 109-177, 120 Stat. 192 (2006)
and the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, P.L. 110-261,
Unless otherwise provided, Title III/ECPA outlaws wiretapping and electronic eavesdropping,
possession of wiretapping or electronic eavesdropping equipment, use or disclosure of
information obtained through illegal wiretapping or electronic eavesdropping, and in order to
obstruct justice, disclosure of information secured through court-ordered wiretapping or
electronic eavesdropping, 18 U.S.C. 2511. Elsewhere ECPA outlaws:
• unlawful access to stored communications, 18 U.S.C. 2701;
• unlawful use of a pen register or a trap and trace device, 18 U.S.C. 3121; and
• abuse of eavesdropping and search authority or unlawful disclosures under the
Foreign Intelligence Surveillance Act, 50 U.S.C. 1809, 1827.
At the heart of Title III/ECPA lies the prohibition against illegal wiretapping and electronic
eavesdropping, 18 U.S.C. 2511(1), that proscribes:
• any person from
• intentionally
• intercepting, or endeavoring to intercept,
• wire, oral or electronic communications
• by using an electronic, mechanical or other device
• unless the conduct is specifically authorized or expressly not covered, e.g.
• one of the parties to the conversation has consent to the interception
(...continued)
Smith v. Maryland, 442 U.S. 735, 741-46 (1979), it held that no warrant was required for the state’s use of a pen
register or trap and trace device which merely identified the telephone numbers for calls made and received from a
particular telephone. No Fourth Amendment search or seizure occurred, the Court held, since the customer had no
justifiable expectation of privacy in such information which he knew or should know that the telephone company might
ordinarily capture for bill or service purposes, id.
• the interception occurs in compliance with a statutorily authorized, (and
ordinarily judicially-supervised) law enforcement or foreign intelligence
gathering interception,
• the interception occurs as part of providing or regulating communication
services,
• certain radio broadcasts, and
• in some places, spousal wiretappers.
The prohibition applies to “any employee, or agent of the United States or any State or political
subdivision thereof, and any individual, partnership, association, joint stock company, trust, or 16
corporation,” 18 U.S.C. 2510(6).
Conduct can only violate Title III/ECPA if it is done “intentionally,” inadvertent conduct is no 17
crime; the offender must have done on purpose those things which are outlawed. He need not be 18
shown have known, however, that his conduct was unlawful.
Section 2511(1) contains two interception bars – one, 2511(1)(a), simply outlaws intentional
interception; the other, 2511(1)(b), outlaws intentional interception when committed under any of
five jurisdictional circumstances with either an implicit or explicit nexus to interstate or foreign 19
commerce. Congress adopted the approach because of concern that its constitutional authority
16 Although the governmental entities are not subject to criminal liability, as noted infra, some courts believe them
subject to civil liability under 18 U.S.C. 2520.
17 “In order to underscore that the inadvertent reception of a protected communication is not a crime, the subcommittee
changed the state of mind requirement under Title III of the Omnibus Crime Control and Safe Streets Act of 1968 from
‘willful’ to ‘intentional,’” S.Rept. 541, at. 23 (1986); “This provision makes clear that the inadvertent interception of a
protected communication is not unlawful under this Act,” H.Rept. 99-647, at 48-9 (1986). See, e.g., In re Pharmatrak,
Inc., 329 F.3d 9, 23 (1st Cir. 2003); Sanders v. Robert Bosch Corp., 38 F.3d 736, 742-43 (4th Cir. 1994); Lonegan v.
Hasty, 436 F.Supp.2d 419, 429 (E.D.N.Y. 2006).
18 Narducci v. Village of Bellwood, 444 F.Supp. 924, (N.D. Ill. 2006).
19 “(1) Except as otherwise specifically provided in this chapter any person who – (a) intentionally intercepts,
endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic
communication;
“(b) intentionally uses, endeavors to use, or procures any other person to use or endeavor to use any electronic,
mechanical, or other device to intercept any oral communication when – (I) such device is affixed to, or otherwise
transmits a signal through, a wire, cable, or other like connection used in wire communication; or (ii) such device
transmits communications by radio, or interferes with the transmission of such communication; or (iii) such person
knows, or has reason to know, that such device or any component thereof has been sent through the mail or transported
in interstate or foreign commerce; or (iv) such use or endeavor to use (A) takes place on the premises of any business or
other commercial establishment the operations of which affect interstate or foreign commerce; or (B) obtains or is for
the purpose of obtaining information relating to the operations of any business or other commercial establishment the
operations of which affect interstate or foreign commerce; or (v) such person acts in the District of Columbia, the
Commonwealth of Puerto Rico, or any territory or possession of the United States,” 18 U.S.C. 2511(1)(a),(b).
might not be sufficient to ban instances of electronic surveillance that bore no discernable
connection to interstate commerce or any other of the enumerated powers. So it enacted a general
prohibition, and as a safety precaution, a second provision more tightly tethered to specific 20
jurisdictional factors. The Justice Department has honored that caution by employing
subparagraph (b) to prosecute the interception of oral communications, while using subparagraph
(a) to prosecute other forms of electronic eavesdropping, DEPARTMENT OF JUSTICE CRIMINAL 21
RESOURCE MANUAL at 1050.
Interception “means the aural or other acquisition of the contents” of various kinds of 22
communications by means of electronic, mechanical or other devices. The definition raises
questions of where, when, what, and how. Although logic might suggest that interception occurs
only in the place where the communication is captured, the cases indicate that interception occurs 23
as well where the communication begins, is transmitted, or is received.
Once limited to aural acquisitions, ECPA enlarged the definition by adding the words “or other 24
acquisition” so that it is no longer limited to interceptions of communications that can be heard.
The change complicates the question of whether the wiretap, stored communications, or trap and
trace portions of the ECPA govern the legality of various means of capturing information relating
to a communication. The analysis might seem to favor wiretap coverage when it begins with an
examination of whether an “interception” has occurred. Yet, there is little consensus over when an
interception occurs; that is, whether “interception” as used section 2511 contemplates only
20 “Subparagraph (a) establishes a blanket prohibition against the interception of wire communication. Since the
facilities used to transmit wire communications form part of the interstate or foreign communications network,
Congress has plenary power under the commerce clause to prohibit all interception of such communications whether by
wiretapping or otherwise.
“The broad prohibition of subparagraph (a) is also applicable to the interception of oral communications. The
interception of such communications, however, does not necessarily interfere with the interstate or foreign commerce
network, and the extent of the constitutional power of Congress to prohibit such interception is less clear than in the
case of interception of wire communications. . . .
“Therefore, in addition to the broad prohibitions of subparagraph (a), the committee has included subparagraph (b),
which relies on accepted jurisdictional bases under the commerce clause, and other provisions of the Constitution to
prohibit the interception of oral communications,” S.Rept. 90-1097, at 91-2 (1968).
21 As will be noted in moment, the statutory definitions of wire and electronic communications contain specific
commerce clause elements, but the definition of oral communications does not, see notes 29 and 30, infra. Subsequent
Supreme Court jurisprudence relating to the breadth of Congress’ commerce clause powers indicates that the
precautions may have been well advised, United States v. Lopez, 514 U.S. 549 (1995) and United States v. Morrison,
529 U.S. 598 (2000).
22 The dictionary definition of “aural” is “of or relating to the ear or to the sense of hearing,” MERRIAM-WEBSTER’S
COLLEGIATE DICTIONARY 76 (10th ed. 1996).
23 United States v. Luong, 471 F.3d 1107, 1109 (9th Cir. 2006)(“an interception occurs where the tapped phone is
located and where the law enforcement officers first overheard the call . . . United Stats v. Rodriguez, 968 F.2d 130,
136 (2d Cir. 1992); accord United States v. Ramirez, 112 F.3d 849, 852 (7the Cir. 1997)(concluding that an
interception occurs in the jurisdiction where the tapped phone is located, where the second phone in the conversation is
located, and where the scanner used to overhear the call is located); United States v. Denman, 100 F.3d 399, 403 (5th
Cir. 1996)”).
24 S.Rept. 99-541, at 13 (1986)(the “amendment clarifies that it is illegal to intercept the non-voice portion of a wire
communication. For example, it is illegal to intercept the data or digitized portion of a voice communication”); see also
H.Rept. 99-647, at 34 (1986).
surreptitious acquisition, contemporaneous with transmission, or whether such acquisition may 25
occur anytime before the initial cognitive receipt of the contents by the intended recipient.
The USA PATRIOT Act resolved some of the uncertainty when it removed voice mail from the
wiretap coverage of Title III, 115 Stat. 283 (2001)(striking the phrase “and such term includes any
electronic storage of such communication” from the definition of “wire communications” in Title
III (18 U.S.C. 2510(1)) and added stored wire communications to the stored communications
coverage of 18 U.S.C. 2703.
As for the “what,” the interceptions proscribed in Title III are confined to those that capture a
communication’s content. Trap and trace devices and pen registers once captured only
information relating to the source and addressee of a communication, not its content. That is no
longer the case. The “post-cut-through dialed digit features” of contemporary telephone
communications now transmit communications in such a manner that the use of ordinary pen 26
register or trap and trace devices will capture both non-content and content. As a consequence, a
few courts have held, either as a matter of statutory construction or constitutional necessity, that
the authorities must rely on a Title III wiretap order rather than a pen register/trap and trace order 27
if such information will be captured.
The statute does not cover common law “eavesdropping,” but only interceptions “by electronic, 28
mechanical or other device,” 18 U.S.C. 2510(4). That phrase is in turn defined so as not to
25 United States v. Smith, 155 F.3d 1051, 1058 (9th Cir. 1998)(unauthorized retrieval and recording of another’s voice
mail messages constitutes an “interception”); Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 878 (9th Cir.
2002)(fraudulent access to stored communication does not constitutes “interception;” interception requires access
contemporaneous with transmission); United States v. Councilman, 418 F.3d 67, 79-80(1st Cir. 2005)(en banc)(service
provider’s access to e-mail “during transient storage” constitutes “interception”; without deciding whether “interception
is limited to acquisition contemporaneous with transmission”); United States v. Jones, 451 F.Supp.2d 71, 75 (D.D.C.
2006)(government’s acquisition from the phone company of text messages was no interception because there was no
contemporaneous access); Fraser v. National Mutual Insurance Co., 135 F.Supp.2d 623, 634-37 (E.D.Pa. 2001)
(“interception” of e-mail occurs with its unauthorized acquisition prior to initial receipt by its addressee); Steve Jackson
Games, Inc. v. United States Secret Service, 36 F.3d 457, 461-62n.7 (5th Cir. 1994) (Congress did not intend for
“interception” to apply to e-mail stored on an electronic bulletin board; stored wire communications (voice mail),
however, is protected from “interception”); United States v. Meriwether, 917 F.2d 955, 959-60 (6th Cir. 1990)(access
to stored information through the use of another’s pager does not constitute an “interception”); United States v. Reyes,
922 F.Supp. 818, 836-37 (S.D.N.Y. 1996)(same); Wesley College v. Pitts, 947 F.Supp. 375, 385 (D.Del. 1997)(no
“interception” occurs when the contents of electronic communications are acquired unless contemporaneous with their
transmission); see also, Adams v. Battle Creek, 250 F.3d 980, 982 (6th Cir. 2001)(use of a “clone” or duplicate pager to
simultaneously receive the same message as a target pager is an “interception”); Brown v. Waddell, 50 F.3d 285, 294
(4th Cir. 1995)(same).
26 “‘Post-cut-through dialed digits’ are any numbers dialed from a telephone after the call is initially setup or ‘cut-
through.’ Sometimes these digits are other telephone numbers, as when a party places a credit card call by first dialing
the long distance carrier access number and then the phone number of the intended party. Sometimes these digits
transmit real information, such as bank account numbers, Social Security numbers, prescription numbers, and the like.
In the latter case, the digits represent communications content; in the former, they are non-content call processing
numbers,” In re United States, 441 F.Supp.2d 816, 818 (S.D. Tex. 2006).
27 In re United States for Orders (1) Authorizing Use of Pen Registers and Trap and Trace Devices, 515 F.Supp.2d 325,
328-38 (E.D.N.Y. 2007); In re United States, 441 F.Supp.2d 816, 818-27 (S.D. Tex. 2006).
28 United States v. Jones, 451 F.Supp.2d 71, 75 (D.D.C. 2006)(government’s acquisition from the phone company of
text messages was not an interception because it did not involve contemporaneous access and because no electronic,
mechanical, or other devices were used).
include hearing aids or extension telephones in normal use.29 Whether an extension phone has
been installed and is being used in the ordinary course of business or in the ordinary course of law
enforcement duties, so that it no longer constitutes an interception device for purposes of Title 30
III/ECPA and comparable state laws has proven a somewhat vexing question.
Although often intertwined with the consent exception discussed below, the question generally 31
turns on the facts in a given case. When the exemption is claimed as a practice in the ordinary
course of business, the interception must be for a legitimate business reason, it must be routinely
conducted, and at least in some Circuits employees must be notified that their conversations are 32
being monitored. Similarly, “Congress most likely carved out an exception for law enforcement
officials to make clear that the routine and almost universal recording of phone lines by police
departments and prisons, as well as other law enforcement institutions, is exempt from the 33
statute,” Adams v. Battle Creek, 250 F.3d at 984. The exception contemplates administrative 34
rather than investigative monitoring, which must nevertheless be justified by a lawful, valid law 35
enforcement concern.
29 “‘[E]lectronic, mechanical, or other device’ means any device or apparatus which can be used to intercept a wire,
oral, or electronic communication other than – (a) any telephone or telegraph instrument, equipment or facility, or any
component thereof, (I) furnished to the subscriber or user by a provider of wire or electronic communication service in
the ordinary course of its business and being used by the subscriber or user in the ordinary course of its business or
furnished by such subscriber or user for connection to the facilities of such service and used in the ordinary course of
its business; or (ii) being used by a provider of wire or electronic communication service in the ordinary course of its
business, or by an investigative or law enforcement officer in the ordinary course of his duties; (b) a hearing aid or
similar device being used to correct subnormal hearing to not better than normal,” 18 U.S.C. 2510(5).
30 See the cases cited and commentary in Barnett & Makar, “In the Ordinary Course of Business”: The Legal Limits of
Workplace Wiretapping, 10 HASTINGS JOURNAL OF COMMUNICATIONS AND ENTERTAINMENT LAW 715 (1988);
Application to Extension Telephones of Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (18 U.S.C.
§§2510 et seq.), Pertaining to Interceptions of Wire Communications, 58 ALR Fed. 594; Eavesdropping on Extension
Telephone as Invasion of Privacy, 49 ALR 4th 430.
31 See e.g., Deal v. Spears, 780 F.Supp. 618, 623 (W.D.Ark. 1991), aff’d, 980 F.2d 1153 (8th Cir. 1992)(employer
regularly taped employee calls by means of a device attached to an extension phone; most of the calls were personal
and recording and disclosing them served no business purpose).
32 Adams v. Battle Creek, 250 F.3d 980, 983 (6th Cir. 2001); Arias v. Mutual Central Alarm Service, 202 F.3d 553, 558
(2d Cir. 2000); Berry v. Funk, 146 F.3d 1003, 1008 (D.C.Cir. 1998); Sanders v. Robert Bosch Corp., 38 F.3d 736, 741
(4th Cir. 1994). See also, Hall v. Earthlink Network Inc., 396 F.3d 500, 503-04 (2d Cir. 2005) (Internet service
provider’s receipt and storage of former customer’s e-mail after termination of the customer’s account was done in
ordinary course of business and consequently did not constitute an interception).
Some courts include surreptitious, extension phone interceptions conducted within the family home as part of the
“business extension” exception, Anonymous v. Anonymous, 558 F.2d 677, 678-79 (2d Cir. 1977); Scheib v. Grant, 22
F.3d 149, 154 (7th Cir. 1994); Newcomb v. Ingle, 944 F.2d 1534, 1536 (10th Cir. 1991); contra, United States v.
Murdock, 63 F.3d 1391, 1400 (6th Cir. 1995).
33 See e.g.,United States v. Lewis, 406 F.3d 11, 18 (1st Cir. 2005); United States v. Hammond, 286 F.3d 189, 192 (4th
Cir. 2002); Smith v. U.S.Dept. of Justice, 251 F.3d 1047, 1049-50 (D.C.Cir. 2001); United States v. Poyck, 77 F.3d 285,
292 (9th Cir. 1996); United States v. Daniels, 902 F.2d 1238, 1245 (7th Cir. 1990); United States v. Paul, 614 F.2d 115,
117 (6th Cir. 1980).
34 Amati v. Woodstock, 176 F.3d 952, 955 (7th Cir. 1999)(“Investigation is within the ordinary course of law
enforcement, so if ‘ordinary’ were read literally warrants would rarely if ever be required for electronic eavesdropping,
which was surely not Congress’s intent. Since the purpose of the statute was primarily to regulate the use of
wiretapping and other electronic surveillance for investigatory purposes, ‛ordinary’ should not be read so broadly; it is
more reasonably interpreted to refer to routine noninvestigative recording of telephone conversations”)l Accord United
States vl Lewis, 4l6 Fl3d at 1l (1st Cirl 2ll5l; Colandrea vl Orangetown, 4ll FlSuppl2d 342, 347-48 (S.D.N.Y. 2007).
35 The exception, however, does not permit a county to record all calls in and out of the offices of county judges merely
because a detention center and the judges share a common facility, Abraham v. Greenville, 237 F.3d 386, 390 (4th Cir.
2001), nor does it permit jailhouse telephone monitoring of an inmate’s confession to a clergyman, Mockaitis v.
(continued...)
An interception can only be a violation of ECPA if the conversation or other form of
communication intercepted is among those kinds which the statute protects, in over simplified
terms – telephone (wire), face to face (oral), and computer (electronic). Congress used the
definitions of the three forms of communications to describe the communications beyond the
Act’s reach as well as those within its grasp. For example, “oral communication” by definition
includes only those face to face conversations with respect to which the speakers have a 36
justifiable expectation of privacy. Similarly, “wire communications” are limited to those that are 37
at some point involve voice communications (i.e. only aural transfers). Radio and data
transmissions are generally “electronic communications.” The definition includes other forms of
information transfer but excludes certain radio transmissions which can be innocently captured 38
without great difficulty. Although it is not a federal crime to intercept radio communications
under any number of conditions, the exclusion is not a matter of definition but of special general
exemptions, 18 U.S.C. 2511(2)(g), discussed below.
Although the statute condemns attempted wiretapping and electronic eavesdropping
(“endeavoring to intercept”), 18 U.S.C. 2511(1), the provisions appear to have escaped use,
interest, or comment heretofore, perhaps because the conduct most likely to constitute preparation
for an interception – possession of wiretapping equipment – is already a separate crime, 18
U.S.C. 2512, discussed, infra.
(...continued)
Harcleroad, 104 F.3d 1522, 1530 (9th Cir. 1997). The courts are divided over whether private corrections officials are
covered by the law enforcement exception. Compare United States v. Faulkner, 323 F. Supp. 2d 1111, 1113-17 (D.
Kan. 2004), aff’d on other grounds, 439 F.3d 1221 (10th Cir. 2006) (not covered) with United States v. Rivera, 292 F.
Supp. 2d 838, 842-43 (E.D. Va. 2003) (covered).
36 “‘[O]ral communication’ means any oral communication uttered by a person exhibiting an expectation that such
communication is not subject to interception under circumstances justifying such expectation, but such term does not
include any electronic communication,” 2510(2). Pattee v. Georgia Ports Authority, 512 F.Supp.2d 1372, 1376-377
(S.D.Ga. 2007)(“the section contains two slightly different requirements: (1) that the circumstances justify an
expectation that the communication is not being intercepted; and (2) that the speaker exhibits that expectation”). Note
that unlike the definitions of wire and electronic communications, infra, there is no reference to interstate or foreign
commerce here.
37 “‘[W]ire communication’ means any aural transfer made in whole or in part through the use of facilities for the
transmission of communications by the aid of wire, cable, or other like connection between the point of origin and the
point of reception (including the use of such connection in a switching station) furnished or operated by any person
engaged in providing or operating such facilities for the transmission of interstate or foreign communications or
communications affecting interstate or foreign commerce,” 18 U.S.C. 2510(1).
38 “‘[E]lectronic communication’ means any transfer of signs, signals, writing, images, sounds, data, or intelligence of
any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system that
affects interstate or foreign commerce, but does not include – (A) the radio portion of a cordless telephone
communication that is transmitted between the cordless handset and the base unit; (B) any wire or oral communication;
(C) any communication made through a tone-only paging device; or (D) any communication from a tracking device (as
defined in section 3117 of this title),” 18 U.S.C. 2510(12).
Consent interceptions are common, controversial and have a history all their own. The early bans
on divulging telegraph or telephone messages had a consent exception. The Supreme Court
upheld consent interceptions against Fourth Amendment challenge both before and after the 39
enactment of Title III. The argument in favor of consent interceptions has always been
essentially that a speaker risks the indiscretion of his listeners and holds no superior legal position
simply because a listener elects to record or transmit his statements rather than subsequently 40
memorializing or repeating them. Wiretapping or electronic eavesdropping by either the police
or anyone else with the consent of at least one party to the conversation is not unlawful under the 41
federal statute. These provisions do no more than shield consent interceptions from the
sanctions of federal law; they afford no protection from the sanctions of state law. Many of the
states recognize comparable exceptions, but some only permit interception with the consent of all 42
parties to a communication.
Under federal law, consent may be either explicitly or implicitly given. For instance, someone
who uses a telephone other than his or her own and has been told by the subscriber that
conversations over the instrument are recorded has been held to have implicitly consented to 43
interception when using the instrument. This is not to say that subscriber consent alone is
39 On Lee v. United States, 343 U.S. 747 (1952); Lopez v. United States, 373 U.S. 427 (1963); United States v. White,
401 U.S. 745 (1971).
40 United States v. White, 401 U.S. at 751 (1971)(“Concededly a police agent who conceals his police connections may
write down for official use his conversations with a defendant and testify concerning them, without a warrant
authorizing his encounters with the defendant and without otherwise violating the latter’s Fourth Amendment rights . . .
. For constitutional purposes, no different result is required if the agent instead of immediately reporting and
transcribing his conversations with defendant, either (1) simultaneously records them with electronic equipment which
he is carrying on his person, Lopez v. United States, supra; (2) or carries radio equipment which simultaneously
transmits the conversations either to recording equipment located elsewhere or to other agents monitoring the
transmitting frequency. On Lee v. United States, supra. If the conduct and revelations of an agent operating without
electronic equipment do not invade the defendant’s constitutionally justifiable expectations of privacy, neither does a
simultaneous recording of the same conversations made by the agent or by others from transmissions received from the
agent to whom the defendant is talking and whose trustworthiness the defendant necessarily risks”); Lopez v. United
States 373 U.S. 427, 439 (1963)(“Stripped to its essentials, petitioner’s argument amounts to saying that he has a
constitutional right to rely on possible flaws in the agent’s memory, or to challenge the agent’s credibility without
being beset by corroborating evidence that is not susceptible of impeachment. For no other argument can justify
excluding an accurate version of a conversation that the agent could testify to from memory. We think the risk that
petitioner took in offering a bribe to Davis fairly included the risk that the offer would be accurately reproduced in
court, whether by faultless memory or mechanical recording”).
41 “(c) It shall not be unlawful under this chapter for a person acting under color of law to intercept a wire, oral, or
electronic communication, where such person is a party to the communication or one of the parties to the
communication has given prior consent to such interception.
“(d) It shall not be unlawful under this chapter for a person not acting under color of law to intercept a wire, oral, or
electronic communication where such person is a party to the communication or where one of the parties to the
communication has given prior consent to such interception unless such communication is intercepted for the purpose
of committing any criminal or tortious act in violation of the Constitution or laws of the United States or of any State,”
18 U.S.C. 2511(2)(c), (d).
42 For citations to state law, see Appendix II.
43 United States v. Friedman, 300 F.3d 111, 122-23 (2d Cir. 2002)(inmate use of prison phone);United States v.
Faulkner, 439 F.3d 1221, 1224 (10th Cir. 2006)(same); United States v. Hammond, 286 F.3d 189, 192 (4th Cir. 2002)
(same); United States v. Footman, 215 F.3d 145, 154-55 (1st Cir. 2000) (same); Griggs-Ryan v. Smith, 904 F.2d 112,
116-17 (1st Cir. 1990) (use of landlady’s phone); United States v. Rivera, 292 F. Supp. 2d 838, 843-45 (E.D. Va.
2003)(inmate use of prison phone monitored by private contractors); see also, United States v. Conley, 531 F.3d 56, 58-
9(1st Cir. 2008)(explicit consent as a condition for phone privileges).
sufficient, for it is the parties to the conversation whose privacy is designed to protect.44 Although
consent may be given in the hopes of leniency from law enforcement officials or as an election 45
between unpalatable alternatives, it must be freely given and not secured coercively.
Private consent interceptions may not be conducted for a criminal or tortious purpose.46 At one
time, the limitation encompassed interceptions for criminal, tortious, or otherwise injurious
purposes, but ECPA dropped the reference to injurious purposes for fear that First Amendment
values might be threatened should the clause be read to outlaw consent interceptions conducted to 47
embarrass.
Radio communications which can be inadvertently heard or are intended to be heard by the public
are likewise exempt. These include not only commercial broadcasts, but ship and aircraft distress
signals, tone-only pagers, marine radio and citizen band radio transmissions, and interceptions
necessary to identify the source any transmission, radio or otherwise, disrupting communications 48
satellite broadcasts.
Government officials enjoy an exemption when acting under judicial authority, whether that
authority is provided for in Title III/ECPA for federal and state law enforcement officers acting 4950
under a court order, acting in an emergency situation pending issuance of a court order, or in
44 Anthony v. United States, 667 F.2d 870, 876 (10th Cir. 1981).
45 United States v. Antoon, 933 F.2d 200, 203-204 (3d Cir. 1991). But see O’Ferrell v. United States, 968 F.Supp. 1519,
1541 (M.D. Ala. 1997) (an individual who spoke to his wife on the telephone after being told by FBI agents who were
then executing a search warrant at his place of business that he could only speak to her with the agents listening in
consented to the interception, even if FBI’s initial search was unconstitutional).
46 18 U.S.C. 2511(2)(d); United States v. Lam, 271 F.Supp.2d 1182, 1183-184 (N.D.Cal. 2003).
47 S.Rept. 99-541, at 17-8 (1986); H.Rept. 99-647, at 39-40 (1986).
48 “(g) It shall not be unlawful under this chapter or chapter 121 of this title for any person – (I) to intercept or access an
electronic communication made through an electronic communication system that is configured so that such electronic
communication is readily accessible to the general public;
“(ii) to intercept any radio communication which is transmitted – (I) by any station for the use of the general public, or
that relates to ships, aircraft, vehicles, or persons in distress; (II) by any governmental, law enforcement, civil defense,
private land mobile, or public safety communications system, including police and fire, readily accessible to the general
public; (III) by a station operating on an authorized frequency within the bands allocated to the amateur, citizens band,
or general mobile radio services; or (IV) by any marine or aeronautical communications system;
“(iii) to engage in any conduct which – (I) is prohibited by section 633 of the Communications Act of 1934; or (II) is
excepted from the application of section 705(a) of the Communications Act of 1934 by section 705(b) of that Act;
“(iv) to intercept any wire or electronic communication the transmission of which is causing harmful interference to
any lawfully operating station or consumer electronic equipment, to the extent necessary to identify the source of such
interference; or
“(v) for other users of the same frequency to intercept any radio communication made through a system that utilizes
frequencies monitored by individuals engaged in the provision or the use of such system, if such communication is not
scrambled or encrypted,” 18 U.S.C. 2511(2)(g).
49 “Except as otherwise specifically provided in this chapter any person who (a) intentionally intercepts . . . .” 18
U.S.C. 2511(1)(emphasis added).
50 “Notwithstanding any other provision of this chapter, any investigative or law enforcement officer, specially
designated by the Attorney General, the Deputy Attorney General, the Associate Attorney General, or by the principal
(continued...)
the case of communications of an intruder in a communications system acting with the approval 5152
of the system provider; in the Foreign Intelligence Surveillance Act, or in the separate 53
provisions according them the use of pen registers and trap and trace devices.
There is a general exemption for those associated with supplying communications services, the
telephone company, switchboard operators, and the like. The exemption not only permits 54
improved service and lets the telephone company protect itself against fraud, but it allows for
(...continued)
prosecuting attorney of any State or subdivision thereof acting pursuant to a statute of that State, who reasonably
determines that – (a) an emergency situation exists that involves – (I) immediate danger of death or serious physical
injury to any person, (ii) conspiratorial activities threatening the national security interest, or (iii) conspiratorial
activities characteristic of organized crime, [ – ] that requires a wire, oral, or electronic communication to be
intercepted before an order authorizing such interception can, with due diligence, be obtained, and (b) there are grounds
upon which an order could be entered under this chapter to authorize such interception, may intercept such wire, oral,
or electronic communication if an application for an order approving the interception is made in accordance with this
section within forty-eight hours after the interception has occurred, or begins to occur. In the absence of an order, such
interception shall immediately terminate when the communication sought is obtained or when the application for the
order is denied, whichever is earlier. In the event such application for approval is denied, or in any other case where the
interception is terminated without an order having been issued, the contents of any wire, oral, or electronic
communication intercepted shall be treated as having been obtained in violation of this chapter, and an inventory shall
be served as provided for in subsection (d) of this section on the person named in the application,” 18 U.S.C. 2518(7).
51 “(I) It shall not be unlawful under this chapter for a person acting under color of law to intercept the wire or
electronic communications of a computer trespasser transmitted to, through, or from the protected computer, if — (I)
the owner or operator of the protected computer authorizes the interception of the computer trespasser’s
communications on the protected computer; (II) the person acting under color of law is lawfully engaged in an
investigation; (III) the person acting under color of law has reasonable grounds to believe that the contents of the
computer trespasser’s communications will be relevant to the investigation; and (IV) such interception does not acquire
communications other than those transmitted to or from the computer trespasser,” 18 U.S.C. 2511(2)(I).
52 “(e) Notwithstanding any other provision of this title or section 705 or 706 of the Communications Act of 1934, it
shall not be unlawful for an officer, employee, or agent of the United States in the normal course of his official duty to
conduct electronic surveillance, as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978, as
authorized by that Act,” 18 U.S.C. 2511(2)(e).
53 “(h) It shall not be unlawful under this chapter – (I) to use a pen register or a trap and trace device (as those terms are
defined for the purpose of chapter 206). . . .” 18 U.S.C. 2511(2)(h). Neither the stored communications sections in
chapter 121 nor the pen register and trap and trace device in chapter 206 authorize the contemporaneous interception of
the contents of a communication. For the citations to state statutes permitting judicial authorization of law enforcement
interception of wire, oral or electronic communications, for access to stored electronic communications, and for the use
of pen registers and trap and trace devices, see Appendix V.
54 “(a)(I) It shall not be unlawful under this chapter for an operator of a switchboard, or an officer, employee, or agent
of a provider of wire or electronic communication service, whose facilities are used in the transmission of a wire or
electronic communication, to intercept, disclose, or use that communication in the normal course of his employment
while engaged in any activity which is a necessary incident to the rendition of his service or to the protection of the
rights or property of the provider of that service, except that a provider of wire communication service to the public
shall not utilize service observing or random monitoring except for mechanical or service quality control checks . . .
* * *
“(h) It shall not be unlawful under this chapter . . .
“(ii) for a provider of electronic communication service to record the fact that a wire or electronic communication was
initiated or completed in order to protect such provider, another provider furnishing service toward the completion of
the wire or electronic communication, or a user of that service, from fraudulent, unlawful or abusive use of such
service,” 18 U.S.C. 2511(2)(a)(I), (h).
assistance to federal and state officials operating under a judicially supervised interception 5556
order, and for the regulatory activities of the Federal Communications Commission.
A few courts recognize a “vicarious consent” exception under which a custodial parent may 57
secretly record the conversations of his or her minor child in the interest of protecting the child. 58
Although rejected by most, a handful of federal courts have held that Title III/ECPA does not 59
preclude one spouse from wiretapping or electronically eavesdropping upon the other, a result
other courts have sometimes reached through the telephone extension exception discussed 60
above.
55 “(ii) Notwithstanding any other law, providers of wire or electronic communication service, their officers,
employees, and agents, landlords, custodians, or other persons, are authorized to provide information, facilities, or
technical assistance to persons authorized by law to intercept wire, oral, or electronic communications or to conduct
electronic surveillance, as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978, if such provider,
its officers, employees, or agents, landlord, custodian, or other specified person, has been provided with –
(A) a court order directing such assistance signed by the authorizing judge, or
(B) a certification in writing by a person specified in section 2518(7) of this title or the Attorney General of the
United States that no warrant or court order is required by law, that all statutory requirements have been met, and
that the specified assistance is required,
setting forth the period of time during which the provision of the information, facilities, or technical assistance is
authorized and specifying the information, facilities, or technical assistance required. No provider of wire or electronic
communication service, officer, employee, or agent thereof, or landlord, custodian, or other specified person shall
disclose the existence of any interception or surveillance or the device used to accomplish the interception or
surveillance with respect to which the person has been furnished a court order or certification under this chapter, except
as may otherwise be required by legal process and then only after prior notification to the Attorney General or to the
principal prosecuting attorney of a State or any political subdivision of a State, as may be appropriate. Any such
disclosure, shall render such person liable for the civil damages provided for in section 2520. No cause of action shall
lie in any court against any provider of wire or electronic communication service, its officers, employees, or agents,
landlord, custodian, or other specified person for providing information, facilities, or assistance in accordance with the
terms of a court order, statutory authorization, or certification under this chapter,” 18 U.S.C. 2511(2)(a)(ii).
56 “(b) It shall not be unlawful under this chapter for an officer, employee, or agent of the Federal Communications
Commission, in the normal course of his employment and in discharge of the monitoring responsibilities exercised by
the Commission in the enforcement of chapter 5 of title 47 of the United States Code, to intercept a wire or electronic
communication, or oral communication transmitted by radio, or to disclose or use the information thereby obtained,” 18
U.S.C. 2511(2)(b).
57 Pollock v. Pollock, 154 F.3d 601, 611 (8th Cir. 1998); Wagner v. Wagner, 64 F.Supp. 2d 895, 889-901 (D.Minn.
1999); Campbell v. Price, 2 F.Supp. 2d 1186, 1191-192 (E.D.Ark. 1998); Thompson v. Dulaney, 838 F.Supp. 1535,
1544-45 (D.Utah 1993).
58 Glazner v. Glazner, 347 F.3d 1212, 1215-16 (11th Cir. 2003); Heggy v. Heggy, 944 F.2d 1537, 1539 (10th Cir.
1991); Kempf v. Kempf, 868 F.2d 970, 972 (8th Cir. 1989); Pritchard v. Pritchard, 732 F.2d 372, 374 (4th Cir. 1984);
United States v. Jones, 542 F.2d 661, 667 (6th Cir. 1976); Kratz v. Kratz, 477 F.Supp. 463, 467-70 (E.D.Pa. 1979);
Heyman v.Heyman, 548 F.Supp. 1041, 1045-47 (N.D.Ill.1982); Lombardo v. Lombardo, 192 F.Supp. 2d 885, 809
(N.D.Ill. 2002).
59 Simpson v. Simpson, 490 F.2d 803, 809 (5th Cir. 1974); Perfit v. Perfit, 693 F.Supp. 851, 854-56 (C.D.Cal. 1988);
see generally, Applicability, in Civil Action, of Provisions of Omnibus Crime Control and Safe Streets Act of 1968
Prohibiting Interception of Communications (18 USCS §2511(1)), to Interception by Spouse, or Spouse’s Agent, of
Conversations of Other Spouse, 139 ALR Fed. 517, and the cases discussed therein.
60 Anonymous v. Anonymous, 558 F.2d 677, 678-79 (2d Cir. 1977); Scheib v. Grant, 22 F.3d 149, 154 (7th Cir. 1994);
Newcomb v. Ingle, 944 F.2d 1534, 1536 (10th Cir. 1991); contra, United States v. Murdock, 63 F.3d 1391, 1400 (6th
Cir. 1995).
Subject to the same exceptions, section 2511 also protects wire, oral and electronic
communications from any person who intentionally:
• discloses or endeavors to disclose information with reason to know it has been
unlawfully intercepted, or
• uses or endeavors to use information with reason to know it has been unlawfully
intercepted, or
• discloses or endeavors to disclose information with intent to obstruct justice and
with reason to know the information was secured through a court-ordered
interception.
Interceptions in violation of Title III/ECPA are generally punishable by imprisonment for not
more than five years and/or a fine of not more than $250,000 for individuals and not more than 61
$500,000 for organizations. The same penalties apply to the unlawful capture of cell phone and
cordless phone conversations, now that the Homeland Security Act, 116 Stat. 2158 (2002), has
repealed the reduced penalty provisions that at one time applied to the unlawful interceptions
using radio scanners and the like, 18 U.S.C. 2511(4)(b)(2000 ed.). There is a reduced penalty,
however, for filching satellite communications as long as the interception is not conducted for
criminal, tortious, nor mercenary purposes: unauthorized interceptions are broadly proscribed 62
subject to an exception for unscrambled transmissions and are subject to the general five-year
penalty, but interceptions for neither criminal, tortious, nor mercenary purposes subject offenders 63
to only civil punishment. Equipment used to wiretap or eavesdrop in violation of Title III is
61 “Except as provided in (b) of this subsection or in subsection (5), whoever violates subsection (1) of this section shall
be fined under this title* or imprisoned not more than five years, or both.” 18 U.S.C. 2511(4)(a).
* Section 3559 of title 18 classifies as a felony any offense with a maximum penalty of imprisonment of more than one
year; and as a Class A misdemeanor any offense with a maximum penalty of imprisonment set at between six months
and one year. Unless Congress clearly rejects the general fine ceilings it provides, section 3571 of title 18 sets the fines
for felonies at not more than $250,000 for individuals and not more than $500,000 for organizations, and for class A
misdemeanors at not more than $100,000 for individuals and not more than $200,000 for organizations. If there is
monetary loss or gain associated with the offense, the offender may alternatively be fined not more than twice the
amount of the loss or gain, 18 U.S.C. 3571.
62 “(b) Conduct otherwise an offense under this subsection that consists of or relates to the interception of a satellite
transmission that is not encrypted or scrambled and that is transmitted — (I) to a broadcasting station for purposes of
retransmission to the general public; or (ii) as an audio subcarrier intended for redistribution to facilities open to the
public, but not including data transmissions or telephone calls, is not an offense under this subsection unless the
conduct is for the purpose of direct or indirect commercial advantage or private financial gain,” 18 U.S.C. 2511(4)(b).
63 “(5)(a)(I) If the communication is — (A) a private satellite video communication that is not scrambled or encrypted
and the conduct in violation of this chapter is the private viewing of that communication and is not for a tortious or
illegal purpose or for purposes of direct or indirect commercial advantage or private commercial gain; or (B) a radio
communication that is transmitted on frequencies allocated under subpart D of part 74 of the rules of the Federal
Communications Commission that is not scrambled or encrypted and the conduct in violation of this chapter is not for
tortious or illegal purpose or for purposes of direct or indirect commercial advantage or private commercial gain, then
the person who engages in such conduct shall be subject to suit by the Federal Government in a court of competent
jurisdiction. (ii) In an action under this subsection — (A) if the violation of this chapter is a first offense for the person
under paragraph (a) of subsection (4) and such person has not been found liable in a civil action under section 2520 of
this title, the Federal Government shall be entitled to appropriate injunctive relief; and (B) if the violation of this
chapter is a second or subsequent offense under paragraph (a) of subsection (4) or such person has been found liable in
any prior civil action under section 2520, the person shall be subject to a mandatory $500 civil fine.
“(b) The court may use any means within its authority to enforce an injunction issued under paragraph (ii)(A), and shall
(continued...)
subject to confiscation by the United States, either in a separate civil proceeding or a part of the 64
prosecution of the offender.
In addition to exemptions previously mentioned, Title III provides a defense to criminal liability 65
based on good faith. As noted below, the defense seems to lack sufficient breadth to shelter any
offender other than a government official or some one working at their direction.
Victims of illegal wiretapping or electronic eavesdropping may be entitled to equitable relief, 66
damages (equal to the greater of actual damages, $100 per day of violation, or $10,000), 67
punitive damages, reasonable attorney’s fees and reasonable litigation costs, 18 U.S.C. 2520. A
majority of federal courts hold that a court may decline to award damages, attorneys’ fees and 68
costs once a violation has been shown, but a few still consider such awards mandatory. In
addition, a majority holds that governmental entities other than the United States may be liable 69
for violations of section 2520 and that law enforcement officers enjoy a qualified immunity 70
from suit under section 2520.
(...continued)
impose a civil fine of not less than $500 for each violation of such an injunction.” 18 U.S.C. 2511(5).
Under 18 U.S.C. 2520, victims may recover the greater of actual damages or statutory damages of not less than $50 and
not more than $500 for the first offense; those amounts are increased to $100 and $1000 for subsequent offenses.
64 18 U.S.C. 2513 (“Any electronic, mechanical, or other device used, sent, carried, manufactured, assembled,
possessed, sold, or advertised in violation of section 2511 or section 2512 of this chapter may be seized and forfeited to
the United States. . .”); 18 U.S.C. 983(a)(3)(C)(“In lieu of, or in addition to, filing a civil forfeiture complaint, the
Government may include a forfeiture allegation in a criminal indictment. . .”).
65 “A good faith reliance on – (1) a court warrant or order, a grand jury subpoena, a legislative authorization, or a
statutory authorization; (2) a request of an investigative or law enforcement officer under section 2518(7) of this title;
or (3) a good faith determination that section 2511(3) [electronic communications provider authority to disclose content
of an electronic communication “(i) as otherwise authorized in section 2511(2)(a) or 2517 of this title; (ii) with the
lawful consent of the originator or any addressee or intended recipient of such communication; (iii) to a person
employed or authorized, or whose facilities are used, to forward such communication to its destination; or (iv) which
were inadvertently obtained by the service provider and which appear to pertain to the commission of a crime, if such
divulgence is made to a law enforcement agency] or 2511(2)(I) [interception of communications of a trespasser in a
computer system] of this title permitted the conduct complained of; is a complete defense against any civil or criminal
action brought under this chapter or any other law,” 18 U.S.C. 2520(d).
66 The $10,000 lump sum for liquidated damages is limited to a single award per victim rather than permitting $10,000
multiples based on the number of violations or the number of types of violations, as long as the violations are
“interrelated and time compacted,” Smoot v. United Transportation Union, 246 F.3d 633, 642-645 (6th Cir. 2001);
Desilets v. Wal-Mart Stores, Inc., 171 F.3d 711, 713 (1st Cir. 1999).
67 The text of 18 U.S.C. 2520 is appended.
68 Compare, e.g., DIRECTV, Inc. v. Brown, 371 F.3d 814, 818 (11th Cir. 2004); Dorris v. Absher, 179 F.3d, 420, 429-
30 (6th Cir. 1999); Nalley v. Nalley, 53 F.3d 649, 651-53 (4th Cir. 1995), Reynolds v. Spears, 93 F.3d 428, 433 (8th
Cir. 1996); DIRECTV, Inc. v. Neznak, 371 F.Supp.2d 130, 133-34 (D.Conn. 2005) (each concluding that courts have
discretion), with, Rodgers v. Wood, 910 F.2d 444, 447-49 (7th Cir. 1990) and Menda Biton v. Menda, 812 F.Supp. 283,
284 (D. Puerto Rico 1993) (courts have no such discretion) (note that after Menda, the First Circuit in Desilets v. Wal-
Mart Stores, Inc., 171 F.3d at 716-17 treated as a matter for the trial court’s discretion the question of whether the
award of plaintiff’s attorneys’ fees should be reduced when punitive damages have been denied).
69 Adams v. Battle Creek, 250 F.3d 980, 984 (6th Cir. 2001); Organizacion JD Ltda. v. United States Department of
Justice, 18 F.3d 91, 94-5 (2d Cir. 1994); Connor v. Tate, 130 F.Supp. 2d 1370, 1374 (N.D.Ga. 2001); Dorris v. Absher,
959 F.Supp. 813, 820 (M.D.Tenn. 1997), aff’d/rev’d in part on other grounds, 179 F.3d 420 (6th Cir. 1999); PBA Local
No. 38 v. Woodbridge Police Department, 832 F.Supp. 808, 822-23 (D.N.J. 1993) (each concluding that governmental
entities may be held liable); contra, Abbott v. Winthrop Harbor, 205 F.3d 976, 980 (7th Cir. 2000); Amati v.
(continued...)
The cause of action created in section 2520 is subject to a good faith defense, 18 U.S.C. 2520(d).
The only apparent efforts to claim the defense by anyone other than a government official or 71
someone working at their direction have been unsuccessful.
The USA PATRIOT Act authorizes a cause of action against the United States for willful
violations of Title III, the Foreign Intelligence Surveillance Act or the provisions governing stored 72
communications in 18 U.S.C. 2701-2712, 18 U.S.C. 2712. Successful plaintiffs are entitled to
the greater of $10,000 or actual damages, and reasonable litigation costs, 18 U.S.C. 2712(a).
Upon a judicial or administrative finding of a Title III violation suggesting possible intentional or
willful misconduct on the part of a federal officer or employee, the federal agency or department
involved may institute disciplinary action. It is required to explain to its Inspector General’s 73
office if declines to do so.
At one time, the American Bar Association (ABA) considered it ethical misconduct for an
attorney to intercept or record a conversation without the consent of all of the parties to the
conversation, ABA Formal Op. 337 (1974). The reaction of state regulatory authorities with the 74
power to discipline professional misconduct was mixed. Some agreed with the ABA. Some
agreed with the ABA, but expanded the circumstances under which recording could be conducted
(...continued)
Woodstock, 176 F.3d 952, 956 (7th Cir. 1999).
70 Compare, Berry v. Funk, 146 F.3d 1003, 1013 (D.C.Cir. 1998)(no immunity), with, Tapley v. Collins, 211 F.3d 1210,
1216 (11th Cir. 2000)(immunity); Blake v. Wright, 179 F.3d 1003, 1011-13(6th Cir. 1999)(same); see generally,
Qualified Immunity as Defense in Suit Under Federal Wiretap Act (18 U.S.C.A. §§2510 et seq.), 178 ALR FED. 1.
71 Williams v. Poulos, 11 F.3d 271, 285 (1st Cir. 1993); United States v. Wuliger, 981 F.2d 1497, 1507 (6th Cir. 1992).
72 The text of 18 U.S.C. 2712 is appended.
73 “If a court or appropriate department or agency determines that the United States or any of its departments or
agencies has violated any provision of this chapter, and the court or appropriate department or agency finds that the
circumstances surrounding the violation raise serious questions about whether or not an officer or employee of the
United States acted willfully or intentionally with respect to the violation, the department or agency shall, upon receipt
of a true and correct copy of the decision and findings of the court or appropriate department or agency promptly
initiate a proceeding to determine whether disciplinary action against the officer or employee is warranted. If the head
of the department or agency involved determines that disciplinary action is not warranted, he or she shall notify the
Inspector General with jurisdiction over the department or agency concerned and shall provide the Inspector General
with the reasons for such determination,” 18 U.S.C. 2520(f).
74 Ala. Opinion 84-22 (1984); People v. Smith, 778 P.2d 685, 686, 687 (Colo. 1989); Haw. Formal Opinion No. 30
(1988); Ind.State Bar Ass’n Op.No.1 (2000); Iowa State Bar Ass’n v. Mollman, 488 N.W.2d 168, 169-70, 171-72 (Iowa
1992); Mo.Advisory Comm. Op. Misc. 30 (1978); Tex.Stat.Bar Op. 514 (1996); Va. LEO #1635 (1995), Va. LEO
#1324; Gunter v. Virginia State Bar, 238 Va. 617, 621-22, 385 S.E.2d 597, 600 (1989).
The federal courts seem to have been in accord, Parrott v. Wilson, 707 F.2d 1262 (11th Cir. 1983); Moody v. IRS, 654
F.2d 795 (D.C. Cir. 1981); Ward v. Maritz, Inc., 156 F.R.D. 592 (D.N.J. 1994); Wilson v. Lamb, 125 F.R.D. 142
(E.D.Ky. 1989); Haigh V. Matsushita Electric Corp., 676 F.Supp. 1332 (E.D.Va. 1987).
within ethical bounds.75 Some disagreed with the ABA view.76 The ABA has now repudiated its
earlier position, ABA Formal Op. 01-422 (2001). Attorneys who engage in unlawful wiretapping 77
or electronic eavesdropping will remain subject to professional discipline in every jurisdiction;
in light of the ABA’s change of position, courts and bar associations have had varied reactions to 78
lawful wiretapping or electronic eavesdropping by members of the bar.
When the federal wiretap statute prohibits disclosure, the information is inadmissible as evidence 79
before any federal, state, or local tribunal or authority, 18 U.S.C. 2515. Individuals whose
75 Ariz. Opinion No. 95-03 (1995); Alaska Bar Ass’n Eth.Comm. Ethics Opinions No. 95-5 (1995) and No. 91-4 (1991);
Idaho Formal Opinion 130 (1989); Kan.Bar.Ass’n Opinion 96-9 (1997); Ky.Opinion E-279 (1984); Minn.Law.Prof.
Resp.Bd. Opinion No. 18 (1996); Ohio Bd.Com.Griev.Disp. Opinion No. 97-3 (1997); S.C. Ethics Advisory Opinion 92-
17 (1992); Tenn.Bd.Prof.Resp. Formal Ethics Opinion No. 86-F-14(a) (1986).
76 D.C. Opinion No. 229 (1992) (recording was not unethical because it occurred under circumstances in which the
uninformed party should have anticipated that the conversation would be recorded or otherwise memorialized);
Mississippi Bar v. Attorney ST., 621 So.2d 229 (Miss. 1993)(context of the circumstances test); Conn.Bar Ass’‘n Op.
98-9 (1998)(same); Mich.State Bar Op. RI-309 (1998)(same); Me.State Bar Op.No. 168 (1999)(same); N.M.Opinion
1996-2 (1996)(members of the bar are advised that there are no clear guidelines and that the prudent attorney avoids
surreptitious recording); N.C. RPC 171 (1994)(lawyers are encouraged to disclose to the other lawyer that a
conversation is being tape recorded); Okla.Bar Ass’n Opinion 307 (1994)(a lawyer may secretly recording his or her
conversations without the knowledge or consent of other parties to the conversation unless the recording is unlawful or
in violation of some ethical standard involving more than simply recording); Ore.State Bar Ass’n Formal Opinion No.
1991-74 (1991) (an attorney with one party consent he or she may record a telephone conversation “in absence of
conduct which would reasonably lead an individual to believe that no recording would be made”); Utah State Bar
Ethics Advisory Opinion No. 96-04 (1996) (“recording conversations to which an attorney is a party without prior
disclosure to the other parties is not unethical when the act, considered within the context of the circumstances, does
not involve dishonesty, fraud, deceit or misrepresentation”); Wis.Opinion E-94-5 (“whether the secret recording of a
telephone conversation by a lawyer involves ‛dishonesty, fraud, deceit or misrepresentation’ under SCR 20:8.4(c)
depends upon all the circumstances operating at the time”). In New York, the question of whether an attorney’s
surreptitiously recording conversations is ethically suspect is determined by locality, compare, Ass’n of the Bar of City
of N.Y. Formal Opinion No. 1995-10 (1995)(secret recording is per se unethical), with, N.Y.County Lawyer’s Ass’n
Opinion No. 696 (1993)(secret recording is not per se unethical).
77 Cf., Nissan Motor Co., Ltd. v. Nissan Computer Corp., 180 F.Supp.2d 1089, 1095-97 (C.D.Cal. 2002).
78 See, e.g., State v. Murtagh, 169 P.3d 602, 617-18 (Alaska 2007)(“undisclosed recording is not unethical”); In re
Crossen, 450 Mass. 533, 558, 880 N.E.2d 352, 372 (2008) (undisclosed was unethical where it was part of scheme to
coerce or manufacture testimony against the judge presiding over pending litigation); Midwest Motor Sports v. Arctic
Cat Sales, Inc., 347 F.3d 693, 699 (8th Cir. 2003) (citing ABA Comm. on Ethics and Prof’l Responsibility, Formal Op.
01-422, which states that recording without consent should be prohibited when circumstances make it unethical);
United States v. Smallwood, 365 F. Supp. 2d 689, 697-98 (E.D. Va. 2005) (holding that a lawyer cannot ethically
record a conversation without the consent of all parties, even though doing so is not illegal under Virginia law).
Declaring the new ABA opinion to be an “overcorrection,” one bar association explained that secret taping should not
be routine practice, but that it should be permitted if it advances a “societal good.” Ass’n of the Bar of the City of New
York Formal Opinion No. 2003-02 (2003), available at [http://www.abcny.org]. For a New York state bar opinion
employing a similar line of reasoning, see Mena v. Key Food Stores Co-operative, Inc., 758 N.Y.S.2d 246, 247-50
(N.Y. Sup. Ct. 2003) (conduct of attorney who obtained a private investigator’s services for a client and instructed the
client on the use of recording equipment held not to warrant severe sanctions, because there was a compelling public
interest in exposing the racial discrimination that was the subject of the secret recordings).
79 “Whenever any wire or oral communication has been intercepted, no part of the contents of such communication and
no evidence derived therefrom may be received in evidence in any trial, hearing, or other proceeding in or before any
court, grand jury, department, officer, agency, regulatory body, legislative committee, or other authority of the United
States, a State, or a political subdivision thereof if the disclosure of that information would be in violation of this
chapter,” 18 U.S.C. 2515 (emphasis added); United States v. Lam, 271 F.Supp.2d 1182, 1183-184 (N.D.Cal. 2003).
Note that suppression does not extend to unlawfully intercepted electronic communications, United States v. Steiger,
318 F.3d 1039, 1050-52 (11th Cir. 2003); United States v. Jones, 364 F. Supp. 2d 1303, 1308-09 (D. Utah 2005); nor
(continued...)
conversations have been intercepted or against whom the interception was directed80 have
standing to claim the benefits of the section 2515 exclusionary rule through a motion to suppress 81
under 18 U.S.C. 2518(10)(a). Paragraph 2518(10)(a) bars admission as long as the evidence is
the product of (1) an unlawful interception, (2) an interception authorized by a facially
insufficient court order, or (3) an interception executed in manner contrary to the order
authorizing the interception.18 U.S.C. 2518(10)(a). Mere facial insufficiency is not enough; the
defect must be of a nature that substantially undermines the regime of court-supervised 82
interception for law enforcement purposes.
Although the Supreme Court has held that section 2515 may require suppression in instances
where the Fourth Amendment exclusionary rule would not, Gelbard v. United States, 408 U.S. 41,
to the Fourth Amendment exclusionary rule in section 2515 cases. Other courts have held,
moreover, that the fruits of an unlawful wiretapping or electronic eavesdropping may be used for 84
impeachment purposes.
The admissibility of tapes or transcripts of tapes of intercepted conversations raise a number of
questions quite apart from the legality of the interception. As a consequence of the prerequisites
(...continued)
does it extend to evidence secured in violation the pen register/trap and trace provisions, United States v. German, 486
F.3d 849, 852-53 (5th Cir. 2007).
80 18 U.S.C. 2510(11)(“‘aggrieved person’ means a person who was a party to any an intercepted wire, oral, or
electronic communication or a person against whom the interception was directed”); United States v. Gonzales, 412
F.3d 1102, 1115-117 (9th Cir. 2005).
81 The text of 18 U.S.C. 2518(10)(a) is appended.
82 United States v. Williams, 124 F.3d 411, 426 (3d Cir. 1997)(“The Supreme Court has explained the relationship
between these two provisions. In United States v. Giordano, 416 U.S. 505 (1974), the Court wrote that ‘what
disclosures are forbidden under 2515 and we subject to motions to suppress is . . . governed by 2518(10)(a).’ Thus,
evidence may be suppressed only if one of the grounds set out in 2518(10)(a) is met. Moreover not every failure to
comply fully with any requirement provided in Title III would render the interception of wire or oral communications
unlawful under 2518(10)(a)(I). United States v. Donovan, 429 U.S. 413, 433 (1977), quoting United States v. Chavez,
416 U.S. 562 (1974). Rather suppression is mandated only for a failure to satisfy any of those statutory requirements
that directly and substantially implement the congressional intention to limit the use of intercept procedures to those
situations clearly calling for the employment of this extraordinary investigative device, Donovan, 429 U.S. at 433-34,
quoting Girodano, 416 U.S. at 527”); United States v. Lopez, 300 F.3d 46, 55-6 (1st Cir. 2002); United States v.
Staffeldt, 451 F.3d 578, 582-85 (9th Cir. 2006); United States v. Gray, 521 F.3d 514, 522 (6th Cir. 2008). This is the
case even where the court is clearly troubled by the government’s failure to comply with the requirements of Title III,
United States v. Callum, 410 F.3d 571, 579 (9th Cir. 2005)(“Under the force of precedent, we uphold the challenged
wiretap applications and orders. Still, we note that the Department of Justice and its officers did not cover themselves
with glory in obtaining the wiretap orders at issue in this case. Title III is an exacting statute obviously meant to be
followed punctiliously, yet the officers repeatedly ignored its clear requirements”).
83 United States v. Moore, 41 F.3d 370, 376 (8th Cir. 1994); United States v. Ambrosio, 898 F.Supp. 177, 187
(S.D.N.Y. 1995); United States v. Malelzadeh, 855 F.2d 1492, 1497 (11th Cir. 1988); United States v. Mullen, 451
F.Supp.2d 509, 530-31 (W.D.N.Y. 2006); contra, United States v. Rice, 478 F.3d 704, 711-14 (6th Cir. 2007).
Gelbard held that a grand jury witness might claim the protection of section 2515 through a refusal to answer questions
based upon an unlawful wiretap notwithstanding the fact that the Fourth Amendment exclusionary rule does not apply
in grand jury proceedings. Gelbard, 408 U.S. at 51-52. The good faith exception to the Fourth Amendment
exclusionary rule permits the admission of evidence secured in violation of the Fourth Amendment, if the officers
responsible for the breach were acting in good faith reliance upon the apparent authority of a search warrant or some
like condition negating the remedial force of the rule, United States v. Leon, 468 U.S. 897, 909 (1984).
84 Culbertson v. Culbertson, 143 F.3d 825, 827-28 (4th Cir. 1998); United States v. Echavarria-Olarte, 904 F.2d 1391
(9th Cir. 1990); United States v. Vest, 813 F.2d 477, 484 (1st Cir. 1987).
required for admission, privately recorded conversations are more likely to be found inadmissible
than those recorded by government officials. Admissibility will require the party moving for 85
admission to show that the tapes or transcripts are accurate, authentic and trustworthy. For some
courts this demands a showing that, “(1) the recording device was capable of recording the events
offered in evidence; (2) the operator was competent to operate the device; (3) the recording is
authentic and correct; (4) changes, additions, or deletions have not been made in the recording;
(5) the recording has been preserved in a manner that is shown to the court; (6) the speakers on
the tape are identified; and (7) the conversation elicited was made voluntarily and in good faith, 86
without any kind of inducement.”
Although often overlooked, it also a federal crime to disclose information obtained from illicit
wiretapping or electronic eavesdropping, 18 U.S.C. 2511(1)(c):
• any person [who]
• intentionally
• discloses or endeavors to disclose to another person
• the contents of any wire, oral, or electronic communication
• having reason to know
• that the information was obtained through the interception of a wire, oral, or
electronic communication
• in violation of 18 U.S.C. 2511(1)
• is subject to the same sanctions and remedies as the wiretapper or electronic
eavesdropper.
85 United States v. Thompson, 130 F.3d 676, 683 (5th th Cir. 1997); United States v. Panaro, 241 F.3d 1104, 1111 (9th
Cir. 2001); United States v. Smith, 242 F.3d 737, 741 (7th Cir. 2001).
86 United States v. Webster, 84 F.3d 1056, 1064 (8th Cir. 1996); United States v. Green, 175 F.3d 822, 830 n.3 (10th
Cir. 1999); United States v. Green, 324 F.3d 375, 379 (5th Cir. 2003)(citing 4 of the 7 factors); cf., United States v.
Calderin-Rodriguez, 244 F.3d 977, 986-87 (8th Cir. 2001). These seven factors have been fairly widely cited since they
were first announced in United States v. McKeever, 169 F.Supp. 426, 430 (S.D.N.Y. 1958), rev’d on other grounds,
271 F.2d 669 (2d Cir. 1959). They are a bit formalistic for some courts who endorse a more ad hoc approach to the
assessment of whether the admission of what purports to be a taped conversation will introduce fraud or confusion into
the court, see e.g., Stringel v. Methodist Hosp. of Indiana, Inc., 89 F.3d 415, 420 (7th Cir. 1996)(McKeever “sets out a
rather formal, seven step checklist for the authentication of tape recordings, and we have looked to some of the features
[in the past]”); United States v. White, 116 F.3d 903, 921 (D.C.Cir. 1997)(“tapes may be authenticated by testimony
describing the process or system that created the tape or by testimony from parties to the conversation affirming that
the tapes contained an accurate record of what was said”); United States v. Tropeano, 252 F.3d 653, 661 (2d Cir.
2001)(“[T]his Circuit has never expressly adopted a rigid standard for determining the admissibility of tape
recordings”); United States v. Westmoreland, 312 F.3d 302, 310-11 (7th Cir. 2002); United States v. Dawson, 425 F.3d
389, 393 (7th Cir. 2005)(“But there are no rigid rules, such as chain of custody, for authentication; all that is required is
adequate evidence of genuineness. (There are such rules for electronic surveillance governed by Title III, but Title III is
inapplicable to conversations that, as here, are recorded with the consent of one of the participants”)).
This is true of the wiretapper or electronic eavesdropper and of all those who disclose
information, that in fact can be traced to a disclosure by the original wiretapper or eavesdropper,
with reason to know of the information’s illicit origins, except to the extent the First Amendment 87
bans application. The legislative history speaks of a common knowledge limitation on the
statute’s coverage, but it is not clear whether it refers to common knowledge at the time of 88
interception or at the time disclosure, S.Rept. 90-1097, at 93 (1967). By definition a violation of
paragraph 2511(1)(c) requires an earlier unlawful interception under subsection 2511(1). If there
is no predicate unlawful interception there can be no violation of paragraph 2511(1)(c).
The results of electronic eavesdropping authorized under Title III/ECPA may be disclosed and 8990
used for law enforcement purposes and for testimonial purposes.
It is also a federal crime to disclose, with an intent to obstruct criminal justice, any information
derived from lawful police wiretapping or electronic eavesdropping, i.e.:
• any person [who]
• intentionally discloses, or endeavors to disclose, to any other person
87 Bartnicki v. Vopper, 532 U.S. 514, 533-34 (2001), pointed out that the First Amendment right to free speech bars the
application of section 2511(1)(c) to the disclosure of illegally intercepted, but lawfully acquired, communications
dealing with a matter of unusual public concern. Bartnicki was a union negotiator whose telephone conversations with
the union’s president were surreptitiously intercepted and recorded a discussion negotiation of a teachers’ contract.
During the conversation, the possibility of using violence against school board members was mentioned. After the
teachers’ contract was signed, the unknown wiretapper secretly supplied Yocum, a critic of the union’s position, with a
copy of the tape. Yocum in turn played it for members of the school board and turned it over to Vopper, a radio talk
show host, who played it on his show. Other stations and media outlets published the contents as well. Bartnicki sued
Vopper and Yocum for use and disclosure in violation of sections 2511(1)(c) and 2511(1)(d). Vopper and Yocum
offered a free speech defense, which the Supreme Court accepted. But see, Quigley v. Rosenthal, 327 F.3d 1044, 1067-
68 (10th Cir. 2003) (denying First Amendment protection for those knowingly involved with interceptors of private
matters (not public concerns)); Boehner v. McDermott, 484 F.3d 573, 577-81 (D.C. Cir. 2007)(Members of Congress
do not have a First Amendment right to disclose unlawful wiretap information in violation of House rules). For a more
extensive examination of Bartnicki, see, CRS Report RS20974, The Right to Publish Lawfully Obtained But Illegally
Intercepted Material of Public Concern: Bartnicki v. Vopper.
88 “Subparagraphs (c) and (d) prohibit, in turn, the disclosure or use of the contents of any intercepted communication
by any person knowing or having reason to know the information was obtained through an interception in violation of
this subsection. The disclosure of the contents of an intercepted communication that had already become ‘public
information’ or ‘common knowledge’ would not be prohibited. The scope of this knowledge required to violate either
subparagraph reflects existing law (Pereira v. United States, 347 U.S. 1 (1954)).” The remark may also have been
influenced by the high level of intent (willfully rather than intentionally) included in the disclosure provision as
reported out.
89 “Any investigative or law enforcement officer who, by any means authorized by this chapter, has obtained
knowledge of the contents of any wire, oral, or electronic communication, or evidence derived therefrom, may disclose
such contents to another investigative or law enforcement officer to the extent that such disclosure is appropriate to the
proper performance of the official duties of the officer making or receiving the disclosure,” 18 U.S.C. 2517(1).
90 “Any person who has received, by any means authorized by this chapter, any information concerning a wire, oral, or
electronic communication, or evidence derived therefrom intercepted in accordance with the provisions of this chapter
may disclose the contents of that communication or such derivative evidence while giving testimony under oath or
affirmation in any proceeding held under the authority of the United States or of any State or political subdivision
thereof,” 18 U.S.C. 2517(3). This does not entitle private litigants to disclosure in the view of at least one court, In re
Motion to Unseal Electronic Surveillance Evidence, 990 F.2d 1015 (8th Cir. 1993).
When court-ordered interception results in evidence of a crime other than the crime with respect to which the order was
issued, the evidence is admissible only upon a judicial finding that it was otherwise secured in compliance with Title
III/ECPA requirements, 18 U.S.C. 2517(5).
• the contents of any wire, oral, or electronic communication
• intercepted by means authorized by sections:
• 2511(2)(a)(ii) (communication service providers, landlords, etc. who
assist police setting up wiretaps or electronic eavesdropping devices
• 2511(2)(b) (FCC regulatory activity)
• 2511(2)(c) (police one party consent)
• 2511(2)(e) (Foreign Intelligence Surveillance Act)
• 2516 (court-ordered, police wiretapping or electronic surveillance)
• 2518 (emergency wiretaps or electronic surveillance)
• knowing or having reason to know that
• the information was obtained through the interception of such a communication
• in connection with a criminal investigation
• having obtained or received the information in connection with a criminal
investigation
• with intent to improperly obstruct, impede, or interfere with a duly authorized
criminal investigation,
• is subject to the same sanctions and remedies as one who illegally wiretaps, 18 91
U.S.C. 2511(1)(e).
The proscriptions in 2511(1)(e) would appear to apply to efforts to obstruct justice by information
gleaned from either federal or state police wiretaps. Use of the word “authorized” in conjunction
with a list of federal statutes might suggest that the paragraph was only intended to protect
wiretap information gathered by federal rather than by federal or state authorities. But most of the
cited sections do not “authorize” anything; they simply confine the reach of the statutory
prohibitions. And several are as likely to involve state interceptions as federal, e.g., the one-party-
consent-under-color-of-law interceptions.
Essentially, the same consequences flow from an unlawful disclosure under paragraphs
2511(1)(c) or 2511(1)(e) as follow unlawful interception under paragraphs 2511(1)(a) or
91 When acting with a similar intent, disclosure of the fact of authorized federal wiretap or foreign intelligence
gathering is proscribed elsewhere in title 18. “Whoever, having knowledge that a Federal investigative or law
enforcement officer has been authorized or has applied for authorization under chapter 119 to intercept a wire, oral, or
electronic communication, in order to obstruct, impede, or prevent such interception, gives notice or attempts to give
notice of the possible interception to any person shall be fined under this title or imprisoned not more than five years, or
both.”
“Whoever, having knowledge that a Federal officer has been authorized or has applied for authorization to conduct
electronic surveillance under the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801, et seq.), in order to
obstruct, impede, or prevent such activity, gives notice or attempts to give notice of the possible activity to any person
shall be fined under this title or imprisoned not more than five years, or both,” 18 U.S.C. 2232(d),(e).
• maximum five year prison terms and fines of not more than $250,000 or
$500,000, depending upon whether the offender is an individual or 92
organization;
• exposure to civil liability including equitable relief and actual or statutory 93
damages.
The prohibition on the use of information secured from illegal wiretapping or electronic
eavesdropping mirrors the disclosure provision, 18 U.S.C. 2511(1)(d):
• any person [who]
• intentionally
• uses or endeavors to use to another person
• the contents of any wire, oral, or electronic communication
• having reason to know
• that the information was obtained through the interception of a wire, oral, or
electronic communication
• in violation of 18 U.S.C. 2511(1)
• is subject to the same sanctions and remedies as the wiretapper or electronic
eavesdropper.
The available case law under the use prohibition of section 2511(1)(d) is scant, and the section
has rarely been invoked except in conjunction with the disclosure prohibition of section
same breath, and they are treated alike for law enforcement purposes. Bartnicki seems
destined to change all of that, because it appears to parse the constitutionally suspect ban on
92 “[W]hoever violates subsection (1) of this section shall be fined under this title or imprisoned not more than five
years, or both,” 18 U.S.C. 2511(4)(a).
93 “(a) . . . any person whose wire, oral, or electronic communication is . . . disclosed . . . used in violation of this
chapter may in a civil action recover from the person or entity, other than the United States, which engaged in that
violation such relief as may be appropriate. . . .(g) Any willful disclosure . . . by an investigative or law enforcement
officer or governmental entity of information beyond the extent permitted by section 2517 is a violation of this chapter
for purposes of section 2520(a),” 18 U.S.C. 2520(a),(g).
94 “Subparagraphs (c) and (d) prohibit, in turn, the disclosure or use of the contents of any intercepted communication
by any person knowing or having reason to know the information was obtained through an interception in violation of
this subsection,” S.Rept. 90-1097, at 93 (1967).
95 Compare, 18 U.S.C. 2517(1)(“Any investigative or law enforcement officer who, by any means authorized by this
chapter, has obtained knowledge of the contents of any wire, oral, or electronic communication, or evidence derived
therefrom, may disclose such contents to another investigative or law enforcement officer to the extent that such
disclosure is appropriate to the proper performance of the official duties of the officer making or receiving the
disclosure”), with 18 U.S.C. 2517(2)(“Any investigative or law enforcement officer who, by any means authorized by
this chapter, has obtained knowledge of the contents of any wire, oral, or electronic communication or evidence derived
therefrom may use such contents to the extent such use is appropriate to the proper performance of his official duties”).
disclosure from the constitutionally permissible ban on use.96 In doing so, it may also resolve a
conflict among the lower federal appellate courts over the so-called “clean hands” exception. A
few courts had recognized an exception to the disclosure-use bans of section 2511(1) where law
enforcement officials might disclose or use the results of an illegal interception in which they had 97
played no role. Bartnicki appears to dim the prospects of a clean hands exception because, to
illustrate situations to which the section 2511(1)(d) use might be constitutionally outlawed, it 98
points to one of the cases which rejected to the exception.
The consequences of unlawful use of intercepted communications in violation of paragraph
2511(d) are similar to those for unlawful disclosure in violation of paragraphs 2511(1)(c) or
• maximum five year prison terms and fines of not more than $250,000 or
$500,000, depending upon whether the offender is an individual or organization,
• exposure to civil liability including equitable relief and actual or statutory
damages, 18 U.S.C. 2520(a), (g).
The proscriptions for possession and trafficking in wiretapping and eavesdropping devices are
even more demanding than those that apply to the predicate offense itself. There are exemptions 99100
for service providers, government officials and those under contract with the government, but
96 “[T]he naked prohibition against disclosures is fairly characterized as a regulation of pure speech. Unlike the
prohibition against the ‛use’ of the contents of an illegal interception in §2511(1)(d), subsection (c) is not a regulation
of conduct,” 532 U.S. at 526-27.
97 Forsyth v. Barr, 19 F.3d 1527, 1541-545 (5th Cir. 1994); United States v. Murdock, 63 F.3d 1391, 1400-403 (6th Cir.
1995); contra, Berry v. Funk, 146 F.3d 1003, 1011-13 (D.C.Cir. 1998); Chandler v. United States Army, 125 F.3d
1296, 1300-302 (9th Cir. 1997); In re Grand Jury, 111 F.3d 1066, 1077 (3d Cir. 1997); United States v. Vest, 813 F.2d
477, 481 (1st Cir. 1987); United States v. Lam, 271 F.Supp.2d 1182, 1184-187 (N.D.Cal. 2003); see also, United States
v. Gray, 521 F.3d 514, 530 (6th Cir. 2008)(noting that doctrine is only available in cases of government use).
98 “Unlike the prohibition against the ‛use’ of the contents of an illegal interception in §2511(1)(d),* subsection (c) is
not a regulation of conduct.
*”The Solicitor General has catalogued some of the cases that fall under subsection (d): . . . . The statute has also been
held to bar the use of illegally intercepted communications for important and socially valuable purposes, see, In re
Grand Jury, 111 F.3d 1066, 1077-79 (3d Cir. 1997),” 532 U.S. at 527 (footnote 10 of the Court’s opinion quoted after
the *).
99 “It shall not be unlawful under this section for – (a) a provider of wire or electronic communication service or an
officer, agent, or employee of, or a person under contract with, such a provider, in the normal course of the business of
providing that wire or electronic communication service . . . to send through the mail, send or carry in interstate or
foreign commerce, or manufacture, assemble, possess, or sell any electronic, mechanical, or other device knowing or
having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious
interception of wire, oral, or electronic communications,” 18 U.S.C. 2512(2)(a).
100 “(2) It shall not be unlawful under this section for . . . (b) an officer, agent, or employee of, or a person under
contract with, the United States, a State, or a political subdivision thereof, in the normal course of the activities of the
United States, a State, or a political subdivision thereof, to send through the mail, send or carry in interstate or foreign
commerce, or manufacture, assemble, possess, or sell any electronic, mechanical, or other device knowing or having
reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious
interception of wire, oral, or electronic communications.
(continued...)
there is no exemption for equipment designed to be used by private individuals, lawfully but 101
s u r re p ti ti o us l y.
The three prohibitions in section 2512 present generally common features, declaring that:
• any person who
• intentionally
• either
(a)
• sends through the mail or sends or carries in interstate or foreign
commerce
• any electronic, mechanical, or other device
• knowing or having reason to know
• that the design of such device renders it primarily useful
• for the purpose of the surreptitious interception of wire, oral, or
electronic communications; or
(b)
• manufactures, assembles, possesses, or sells
• any electronic, mechanical, or other device
• knowing or having reason to know
• that the design of such device renders it primarily useful
• for the purpose of the surreptitious interception of wire, oral, or
electronic communications, and
• that such device or any component thereof has been or will be sent
through the mail or transported in interstate or foreign commerce; or
(c)
• places in any newspaper, magazine, handbill, or other publication or
disseminates electronically
• any advertisement of —
• any electronic, mechanical, or other device
(...continued)
“(3) It shall not be unlawful under this section to advertise for sale a device described in subsection (1) of this section if
the advertisement is mailed, sent, or carried in interstate or foreign commerce solely to a domestic provider of wire or
electronic communication service or to an agency of the United States, a State, or a political subdivision thereof which
is duly authorized to use such device,” 18 U.S.C. 2512(2)(b),(3).
101 United States v. Spy Factory, Inc., 951 F.Supp. 450, 473-75 (S.D.N.Y. 1997); United States v. Bast, 495 F.2d 138,
141 (D.C.Cir. 1974).
• knowing or having reason to know
• that the design of such device renders it primarily useful
• for the purpose of the surreptitious interception of wire, oral, or
electronic communications; or
• any other electronic, mechanical, or other device
• where such advertisement promotes the use of such device
• for the purpose of the surreptitious interception of wire, oral, or
electronic communications
• knowing the content of the advertisement and knowing or having reason
to know
• that such advertisement will be sent through the mail or transported in
interstate or foreign commerce
• shall be imprisoned for not more than five years and/or fined not more than
$250,000 (not more than $500,000 for organizations), 18 U.S.C. 2512.
The legislative history lists among the items Congress considered “primarily useful for the
purpose of the surreptitious interception of communications: the martini olive transmitter, the
spike mike, the infinity transmitter, and the microphone disguised as a wristwatch, picture frame,
cuff link, tie clip, fountain pen, stapler, or cigarette pack,” S.Rept. 90-1097, at 95 (1968).
Questions once raised over whether section 2512 covers equipment designed to permit 102
unauthorized reception of scrambled satellite television signals have been resolved. Each of the 103
circuits to consider the question has now concluded that 2512 outlaws such devices, but simple 104
possession does not give rise to a private cause of action. Their use is also proscribed by 47 105
U.S.C. 605.
In its original form Title III was ill-suited to ensure the privacy of those varieties of modern
communications which are equally vulnerable to intrusion when they are at rest as when they are
in transmission. Surreptitious “access” is as least as great a threat as surreptitious “interception”
102 The two appellate panel decisions that found the devices beyond the bounds of section 2512, United States v.
Herring, 933 F.2d 932 (11th Cir. 1991) and United States v. Hux, 940 F.2d 314 (8th Cir. 1991) were overturned en
banc, United States v. Herring, 993 F.2d 784, 786 (11th Cir. 1993); United States v. Davis, 978 F.2d 415, 416 (8th Cir.
1992).
103 United States v. Harrell, 983 F.2d 36, 37-39 (5th Cir. 1993); United States v. One Macom Video Cipher II, 985 F.2d
258, 259-61 (6th Cir. 1993); United States v. Shriver, 989 F.2d. 898, 901-06 (7th Cir. 1992); United States v. Davis,
978 F.2d 415, 417-20 (8th Cir. 1992); United States v. Lande, 968 F.2d 907, 910-11 (9th Cir. 1992); United States v.
McNutt, 908 F.2d 561, 564-65 (10th Cir. 1990); United States v. Herring, 993 F.2d 784, 786-89 (11th Cir. 1991).
104 DIRECTV, Inc. v. Treworgy, 373 F.3d 1124, 1129 (11th Cir. 2004); DIRECTV, Inc. v. Robson, 420 F.3d 532, 538-39
(5th Cir. 2005)(citing several district court cases that have reached the same conclusion). Proof that the possessor used
the device to intercept satellite transmission evidences a violation of section 2511 and exposure to civil liability under
section 2520, DIRECTV, Inc. v. Nicholas, 403 F.3d 223, 227-28 (4th Cir. 2005); DIRECTV, Inc. v. Pepe, 431 F.3d 162,
169 (3d Cir. 2005).
105 The text of the section is appended.
to the patrons of electronic mail (e-mail), electronic bulletin boards, voice mail, pagers, and
remote computer storage.
Accordingly, Title III/ECPA also bans surreptitious access to communications at rest, although it
does so beyond the confines of that apply to interception, 18 U.S.C. 2701 - 2711. These separate
provisions afford protection for e-mail, voice mail, and other electronic communications
somewhat akin to that available for telephone and face to face conversations under 18 U.S.C.
• intentionally
• either
• access without authorization or
• exceed an authorization to access
• a facility through which an electronic communication service is provided
• and thereby obtain, alter, or prevent authorized access to a wire or electronic
communication while it is in electronic storage in such system, 18 U.S.C.
The exceptions cover electronic storage facility operators, their customers, and – under 106
procedural counterparts to court ordered wiretapping – governmental entities.
Violations committed for malicious, mercenary, tortious or criminal purposes are punishable by
imprisonment for not more than five years and/or a fine of not more than $250,000 (not more than
10 years for a subsequent conviction); lesser transgressions, by imprisonment for not more than
one year (not more than five years for a subsequent conviction) and/or a fine of not more than 107
$100,000. Those who provide the storage service and other victims of unlawful access have a
cause of action for equitable relief, reasonable attorneys’ fees and costs, damages equal the loss 108
and gain associated with the offense but not less than $1000. Both criminal and civil liability 109
are subject to good faith defenses.
106 “Subsection (a) of this section does not apply with respect to conduct authorized – (1) by the person or entity
providing a wire or electronic communications service; (2) by a user of that service with respect to a communication of
or intended for that user; or (3) in section 2703 [requirements for government access], 2704 [backup preservation] or
2518 [court ordered wiretapping or electronic eavesdropping] of this title,” 18 U.S.C. 2701(c).
Section 2709 creates an exception for counterintelligence access to telephone records.
107 “The punishment for an offense under subsection (a) of this section is – (1) if the offense is committed for purposes
of commercial advantage, malicious destruction or damage, or private commercial gain, or in furtherance of any
criminal or tortious act in violation of the constitution and laws of the United States or any state – (A) a fine under this
title or imprisonment for not more than 5 years, or both, in the case of a first offense under this subparagraph; and (B) a
fine under this title or imprisonment for not more than 10 years, or both, for any subsequent offense under this
subparagraph; and (2)(A) a fine under this title or imprisonment for not more than 1 year or both, in the case of a first
offense under this paragraph; and (B) a fine under this title or imprisonment for not more than 5 years, or both, in the
case of an offense under this subparagraph that occurs after a conviction of another offense under this section,”18
U.S.C. 2701(b).
108 “(a) Cause of action – Except as provided in section 2703(e)[relating to immunity for compliance with judicial
process], any provider of electronic communication service, subscriber, or customer aggrieved by any violation of this
chapter in which the conduct constituting the violation is engaged in with a knowing or intentional state of mind may,
in a civil action, recover from the person or entity other than the United States which engaged in that violation such
relief as may be appropriate.
(continued...)
Service providers, nevertheless, may incur civil liability for unlawful disclosures,110 unless they 111
can take advantage of one of a fairly extensive list of exceptions and defenses.
Violations by the United States may give rise to a cause of action and may result in disciplinary
action against offending officials or employees under the same provisions that apply to U.S. 112
violations of Title III, but unlike Title III there is no statutory rule for the exclusion of evidence
(...continued)
“(b) Relief – In a civil action under this section, appropriate relief includes – (1) such preliminary and other equitable
or declaratory relief as may be appropriate; (2) damages under subsection(c); and (3) a reasonable attorney’s fee and
other litigation costs reasonably incurred;
“(c) Damages – The court may assess as damages in a civil action under this section the sum of the actual damages
suffered by the plaintiff and any profits made by the violator as a result of the violation, but in no case shall a person
entitled to recover receive less than the sum of $1,000. . . .” 18 U.S.C. 2707.
109 “A good faith reliance on – (1) a court warrant or order, a grand jury subpoena, a legislative authorization, or a
statutory authorization (including a request of a governmental entity under section 2703(f) of this title) [relating to an
official request to for a service provider preserve evidence]; (2) a request of an investigative or law enforcement officer
under section 2518(7) of this title [relating to emergency wiretapping and electronic eavesdropping]; or (3) a good faith
determination that section 2511(3) of this title [relating to the circumstances under which an electronic communications
provider may divulge the contents of communication] permitted the conduct complained of – is a complete defense to
any civil or criminal action brought under this chapter or any other law,” 18 U.S.C. 2707(e).
110 “Except as in subsection (b) or (c) – (1) a person or entity providing an electronic communication service to the
public shall not knowingly divulge to any person or entity the contents of a communication while in electronic storage
by that service; (2) a person or entity providing remote computing service to the public shall not knowingly divulge to
any person or entity the contents of any communication which is carried or maintained on that service – (A) on behalf
of, and received by means of electronic transmission from (or created by means of computer processing of
communications received by means of electronic transmission from), a subscriber or customer of such service; and (B)
solely for the purpose of providing storage or computer processing services to such subscriber or customer, if the
provider is not authorized to access the contents of any such communications for purposes of providing any services
other than storage or computer processing; and (3) a provider of remote computing service or electronic communication
service to the public shall not knowingly divulge a record or other information pertaining to a subscriber to or customer
of such service (not including the contents of communications covered by paragraph (1) or (2)) to any government
entity,” 18 U.S.C. 2702(a).
Section 2702 makes no mention of any consequences that follow a breach of its commands, but 2707 establishes a civil
cause of action for the victims of any violation of chapter 121 (18 U.S.C. 2701 - 2711).
111 “A provider described in subsection (a) may divulge the contents of a communication – (1) to an addressee or
intended recipient of such communication or an agent of such addressee or intended recipient; (2) as otherwise
authorized in section 2517, 2511(2)(a), or 2703 of this title; (3) with the lawful consent of the originator or an addressee
or intended recipient of such communication, or the subscriber in the case of remote computing service; (4) to a person
employed or authorized or whose facilities are used to forward such communication to its destination; (5) as may be
necessarily incident to the rendition of the service or to the protection of the rights or property of the provider of that
service; (6) to the National Center for Missing and Exploited Children, in connection with a report submitted thereto
under section 227 of the Victims of Child Abuse Act of 1990; (7) to a law enforcement agency – (A) if the contents –
(I) were inadvertently obtained by the service provider; and (ii) appear to pertain to the commission of a crime; (8) to a
Federal, State, or local government entity, if the provider, in good faith, believes that an emergency involving danger of
death or serious physical injury to any person requires disclosure without delay of communications relating to the
emergency,” 18 U.S.C. 2702(b).
The Ninth Circuit recently noted that a remote computer service provider may disclose to a subscriber (as noted in
italics above), but that an electronic service provider, such as one who provides text messaging services, may not, even
when the material disclosed resides in storage, Quon v. Arch Wireless Operating Co., Inc., 529 F.3d 892, 900-901(9th
Cir. 2008).
112 “Any person who is aggrieved by any willful violation this chapter or of chapter 119 of this title [18 U.S.C. 2510-
2520] . . . may commence an action in United States District Court . . . .If . . . any of the departments or agencies has
violated any provision of this chapter . . . the department or agency shall . . . promptly initiate a proceeding to
determine whether disciplinary action . . . is warranted. . . .”18 U.S.C. 2712(a),(c).
as a consequence of a violation.113 A Sixth Circuit panel has held, in a decision since vacated en
banc, that the Fourth Amendment precludes government access to the content of stored
communications (e-mail) held by service providers in the absence of a warrant, subscriber 114
consent, or other indication that the subscriber has waived his or her expectation of privacy.
Where the government instead secures access through a subpoena or court order as section 2703
permits, the evidence may be subject to both the Fourth Amendment exclusionary rule and the 115
exceptions to the rule.
Unlawful access to electronic communications may involve violations of several other federal and
state laws, including for instance the federal computer fraud and abuse statute, 18 U.S.C. 1030, 116
and state computer abuse statutes.
A trap and trace device identifies the source of incoming calls, and a pen register indicates the 117
numbers called from a particular phone. Since neither allows the eavesdropper to overhear the
“contents” of the phone conversation, they were not considered interceptions within the reach of
Title III prior to the enactment of ECPA, United States v. New York Telephone Co., 434 U.S. 159
(1977). Although Congress elected to expand the definition of interception, it chose to continue to
regulate these devices beyond the boundaries of Title III for most purposes, 18 U.S.C. 3121 -
As noted earlier, however, the Title III wiretap provisions apply when due to the nature of
advances in telecommunications technology pen registers and trap and trace devices are able to 118
capture wire communication “content.”
113 United States v. Steiger, 318 F.3d 1039, 1049 (11th Cir. 2003); United States v. Perrine, 518 F.3d 1196, 1202 (10th
Cir. 2008).
114 Warshak v. United States, 490 F.3d 455, 468-82 (6th Cir. 2007), vac’d en banc, 532 F.3d 521 (6th Cir.
2008)(vacated on grounds that the issue was not ripe for decision).
115 United States v. Ferguson, 508 F.Supp.2d 7, 8-10 (D.D.C. 2007)(even if a Fourth Amendment violation occurred,
officers could rely in good faith on the magistrate’s order issued before any court had raised the specter of
constitutional suspicion which surfaced later in Warshak).
116 See generally, CRS Report 97-1025, Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute
and Related Federal Criminal Laws. Citations to the various state computer abuse statutes are appended.
117 “(3) the term ‘pen register’ means a device which records or decodes electronic or other impulses which identify the
numbers dialed or otherwise transmitted on the telephone line to which such device is attached, but such term does not
include any device used by a provider or customer of a wire or electronic communication service for billing, or
recording as an incident to billing, for communications services provided by such provider or any device used by a
provider or customer of a wire communication service for cost accounting or other like purposes in the ordinary course
of its business; (4) the term ‘trap and trace device’ means a device which captures the incoming electronic or other
impulses which identify the originating number of an instrument or device from which a wire or electronic
communication was transmitted,” 18 U.S.C. 3127(3),(4)). Although clone pagers are not considered pen registers,
Brown v. Waddell, 50 F.3d 285, 290-91 (4th Cir. 1995), “caller id” services have been found to constitute trap and trace
devices, United States v. Fregoso, 60 F.3d 1314, 1320 (8th Cir. 1995).
118 “‘Post-cut-through dialed digits’ are any numbers dialed from a telephone after the call is initially setup or ‘cut-
through.’ Sometimes these digits are other telephone numbers, as when a party places a credit card call by first dialing
the long distance carrier access number and then the phone number of the intended party. Sometimes these digits
transmit real information, such as bank account numbers, Social Security numbers, prescription numbers, and the like.
In the latter case, the digits represent communications content; in the former, they are non-content call processing
numbers,” In re United States, 441 F.Supp.2d 816, 818 (S.D. Tex. 2006); In re United States for Orders (1) Authorizing
(continued...)
The USA PATRIOT Act enlarged the coverage of sections 3121-3127 to include sender/addressee
information relating to e-mail and other forms of electronic communications, 115 Stat. 288-91
(2001).
The use or installation of pen registers or trap and trace devices by anyone other than the
telephone company, service provider, or those acting under judicial authority is a federal crime,
punishable by imprisonment for not more than a year and/or a fine of not more than $100,000 119
($200,000 for an organization). There is no accompanying exclusionary rule, however, and
consequently a violation of section 3121 will not serve as a basis to suppress any resulting 120
evidence.
Unlike other violations of Title III/ECPA, there is no separate federal private cause of action for
victims of a pen register or trap and trace device violation. Some of the states have established a
separate criminal offense for unlawful use of a pen register or trap and trace device, yet most of
these do seem to follow the federal lead and decline to establish a separate private cause of action,
See Appendix III.
The Foreign Intelligence Surveillance Act (FISA) authorizes special court orders for four
purposes: electronic surveillance, physical searches, installation and use pen registers/trap and
trace devices, and orders to disclose tangible items, 50 U.S.C. 1801-1861. The electronic
surveillance portion of FISA, 50 U.S.C. 1801-1811, creates a procedure for judicially supervised
“electronic surveillance” (wiretapping) conducted for foreign intelligence gathering purposes.
The Act classifies four kinds of wiretapping as “electronic surveillance.” The four classes of
electronic surveillance involve wiretapping that could otherwise only be conducted under court
order:
(...continued)
Use of Pen Registers and Trap and Trace Devices, 515 F.Supp.2d 325, 328-38 (E.D.N.Y. 2007).
119 “(a) In general – Except as provided in this section, no person may install or use a pen register or a trap and trace
device without first obtaining a court order under section 3123 of this title or under the Foreign Intelligence
Surveillance Act of 1978 (50 U.S.C. 1801 et seq.). (b) Exception – The prohibition of subsection (a) does not apply
with respect to the use of a pen register or a trap and trace device by a provider of electronic or wire communication
service – (1) relating to the operation, maintenance, and testing of a wire or electronic communication service or to the
protection of the rights or property of such provider, or to the protection of users of that service from abuse of service
or unlawful use of service; or (2) to record the fact that a wire or electronic communication was initiated or completed
in order to protect such provider, another provider furnishing service toward the completion of the wire
communication, or a user of that service, from fraudulent, unlawful or abusive use of service; or (3) where the consent
of the user of that service has been obtained. (c) Limitation – A government agency authorized to install and use a pen
register or trap and trace device under this chapter or under State law shall use technology reasonably available to it
that restricts the recording or decoding of electronic or other impulses to the dialing, routing, addressing, and signaling
information utilized in identifying the origination or destination of wire or electronic communications. (d) Penalty. –
Whoever knowingly violates subsection (a) shall be fined under this title or imprisoned not more than one year, or
both,” 18 U.S.C. 3121.
120 United States v. German, 486 F.3d 849, 852-53 (5th Cir. 2007); United States v. Fregoso, 60 F.3d 1314, 1320 (8th
Cir. 1995); United States v. Thompson, 936 F.2d 1249, 1249-250 (11th Cir. 1991). To the extent that the unlawful use
captures content, the Fourth Amendment exclusionary rule may apply, cf., In re United States for Orders (1)
Authorizing Use of Pen Registers and Trap and Trace Devices, 515 F.Supp.2d 325, 328-38 (E.D.N.Y. 2007); United
States v. Ferguson, 508 F.Supp.2d 7 (D.D.C. 2007).
“(1) the acquisition by an electronic, mechanical, or other surveillance device of the contents
of any wire or radio communication sent by or intended to be received by a particular, known
United States person who is in the United States, if the contents are acquired by intentionally
targeting that United States person, under circumstances in which a person has a reasonable
expectation of privacy and a warrant would be required for law enforcement purposes;
“(2) the acquisition by an electronic, mechanical, or other surveillance device of the contents
of any wire communication to or from a person in the United States, without the consent of
any party thereto, if such acquisition occurs in the United States, does not include the
acquisition of those communications of computer trespassers that would be permissible
under section 2511(2)(I) of title 18, United States Code;
“(3) the intentional acquisition by an electronic, mechanical, or other surveillance device of
the contents of any radio communication, under circumstances in which a person has a
reasonable expectation of privacy and a warrant would be required for law enforcement
purposes, and if both the sender and all intended recipients are located within the United
States; or
“(4) the installation or use of an electronic, mechanical, or other surveillance device in the
United States for monitoring to acquire information, other than from a wire or radio
communication, under circumstances in which a person has a reasonable expectation of
privacy and a warrant would be required for law enforcement purposes,” 50 U.S.C. 1801(f).
Section 1809 proscribes:
• intentionally
• either
• engaging in electronic surveillance
• under color of law
• except as authorized by statute, or
• disclosing or using
• information obtained under color of law
• by electronic surveillance,
• knowing or having reason to know
• that the information was obtained by electronic surveillance not authorized by
statute, 50 U.S.C. 1809.
The prohibitions of section 1809 apply only to federal officers and employees,121 but do not apply 122
to a law enforcement officer operating under a warrant or court. Violations are punishable by
121 “There is Federal jurisdiction over an offense under this section if the person committing the offense was an officer
or employee of the United States at the time the offense was committed,” 50 U.S.C. 1809(d). The criminal
proscriptions and exemptions of Title III/ECPA (18 U.S.C. 2510-2518) may apply as well.
imprisonment for not more than five years and/or a fine of not more than $250,000, id. and 123
expose the offender to civil liability. By virtue of USA PATRIOT Act amendments, victims of
any improper use of information secured under a FISA surveillance order may also be entitled to 124
actual or statutory damages.
FISA also has its own exclusionary rule for electronic surveillance and physical searches.125 126
However, Congress anticipated, and the courts have acknowledged, that surveillance conducted 127
under FISA for foreign intelligence purposes may result in admissible evidence of a crime.
The physical search portion of FISA authorizes the issuance of physical search orders for foreign
intelligence gathering purposes, 50 U.S.C. 1821-1829. Its accompanying criminal proscriptions
(...continued)
122 “It is a defense to a prosecution under subsection (a) of this section that the defendant was a law enforcement or
investigative officer engaged in the course of his official duties and the electronic surveillance was authorized by and
conducted pursuant to a search warrant or court order of a court of competent jurisdiction,” 50 U.S.C. 1809(b).
123 “An aggrieved person, other than a foreign power or an agent of a foreign power, as defined in section 1801(a) or
(b)(1)(A) of this title, respectively, who has been subjected to an electronic surveillance or about whom information
obtained by electronic surveillance of such person has been disclosed or used in violation of section 1809 of this title
shall have a cause of action against any person who committed such violation and shall be entitled to recover – (a)
actual damages, but not less than liquidated damages of $1,000 or $100 per day for each day of violation, whichever is
greater; (b) punitive damages; and (c) reasonable attorney’s fees and other investigation and litigation costs reasonably
incurred,” 50 U.S.C. 1810. Victims are not entitled to injunctive relief, ACLU Foundation of Southern California v.
Barr, 952 F.2d 457, 469-70 (D.C.Cir. 1992). The court did not address the question of whether conduct in violation of
both FISA and Title III/EPCA might be enjoined under 18 U.S.C. 2520(b)(1). The Sixth Circuit, however, has held that
the proscriptions of Title III/ECPA do not apply to interception in this country for foreign intelligence gathering
purposes of communications between parties in the United States and those in other nations, ACLU v. National Security
Agency, 493 F.3d 644, 680 (6th Cir. 2007), citing, 18 U.S.C. 2511(2)(f).
124 “Any person who is aggrieved by any willful violation of . . . section[] 106(a) . . . of the Foreign Intelligence
Surveillance Act [relating to the use of information acquired from electronic surveillance under the Act] may
commence an action in United States District Court against the United States to recover money damages. In any such
action, if a person who is aggrieved successfully establishes a violation of . . . the above special provisions of title 50,
the Court may assess as damages – (1) actual damages, but not less than $10,000, whichever amount is greater; and (2)
litigation costs, reasonably incurred,” 18 U.S.C. 2712(a).
125 “If the United States district court pursuant to subsection (f) of this section determines that the surveillance was not
lawfully authorized or conducted, it shall, in accordance with the requirements of law, suppress the evidence which was
unlawfully obtained or derived from electronic surveillance of the aggrieved person or otherwise grant the motion of
the aggrieved person. If the court determines that the surveillance was lawfully authorized and conducted, it shall deny
the motion of the aggrieved person except to the extent that due process requires discovery or disclosure,” 50 U.S.C.
1806(g); 1825(f); United States v. Campa, 529 F.3d 980, 993 (11th Cir. 2008). The text of 50 U.S.C. 1825 and 1806(f)
are appended.
126 S.Rept. 95-701, at 61 (1978); 50 U.S.C. 1806(b)(“. . . such information . . . may only be used in a criminal
proceeding with the advance authorization of the Attorney General”).
127 When FISA required certification that the acquisition of foreign intelligence was “the” purpose for seeking the a
FISA surveillance order, there was some debate among the courts over how prominent the foreign intelligence purpose
had to be in order to permit the evidence it unearthed under as FISA order to be used in a criminal prosecution, United
States v. Johnson, 952 F.2d 565, 572 (1st Cir. 1992); United States v. Duggan, 743 F.2d 59, 77 (2d Cir. 1984); United
States v. Sarkissian, 841 F.2d 959, 964 (9th Cir. 1988); United States v. Badia, 827 F.2d 1458, 1463 (11th Cir. 1987).
The USA PATRIOT Act changed “the purpose” to “a significant purpose,” a change which the FISA review court
concluded demands only that the government have a “measurable” foreign intelligence purpose when it seeks a FISA
surveillance order, In re Sealed Case, 310 F.3d 717, 734-35 (F.I.S.Ct.Rev. 2002); see also, Seamon & Gardner, The
Patriot Act and the Wall Between Foreign Intelligence and Law Enforcement, 28 HARVARD JOURNAL OF LAW AND
PUBLIC POLICY 319 (2005).
and civil liability provisions, and are identical to those used in the electronic surveillance portion 128
of FISA.
Each of the prohibitions mentioned above recognizes a procedure for government use
notwithstanding the general ban, usually under judicial supervision. Although Fourth Amendment
concerns supply a common theme, the procedures are individually distinctive.
Title III/ECPA authorizes both federal and state law enforcement wiretapping and electronic
eavesdropping, under court order, without the prior consent or knowledge of any of the
participants, 18 U.S.C. 2516 - 2518. At the federal level, a senior Justice Department official must 129
approve the application for the court order. The procedure is only available where there is
probable cause to believe that the wiretap or electronic eavesdropping will produce evidence of 130
one of a long, but not exhaustive, list of federal crimes, or of the whereabouts of a “fugitive
from justice” fleeing from prosecution of one of the offenses on the predicate offense list, 18
U.S.C. 2516(1)(l). Any federal prosecutor may approve an application for a court order under
section 2518 authorizing the interception of e-mail or other electronic communications during 131
transmission.
128 50 U.S.C. 1827 (“A person is guilty of an offense if he intentionally – (1) under color of law for the purpose of
obtaining foreign intelligence information, executes a physical search within the United States except as authorized by
statute . . . .”); 50 U.S.C. 1828 (“An aggrieved person, other than a foreign power or an agent of a foreign power, as
defined in section 1801(a) or (b)(1)(A), respectively, of this title, whose premises, property, information, or material
has been subjected to a physical search within the United States or about whom information obtained by such a
physical search has been disclosed or used in violation of section 1827 of this title shall have a cause of action against
any person who committed such violation . . . .”); 18 U.S.C. 2712(a)(“Any person who is aggrieved by any willful
violation of . . . section[] 305(a) . . . of the Foreign Intelligence Surveillance Act [relating to the use of information
acquired from a physical search under the Act] may commence an action in United States District Court against the
United States to recover money damages. . . . “).
129 “The Attorney General, Deputy Attorney General, Associate Attorney General, or any Assistant Attorney General,
any acting Assistant Attorney General, or any Deputy Assistant Attorney General or acting Deputy Assistant Attorney
General in the Criminal Division specially designated by the Attorney General, may authorize an application to a
Federal judge of competent jurisdiction for, and such judge may grant in conformity with section 2518 of this chapter
an order authorizing or approving the interception of wire or oral communications by the Federal Bureau of
Investigation, or a Federal agency having responsibility for the investigation of the offense as to which the application
is made, when such interception may provide or has provided evidence of [the predicate offenses]. . .” 18 U.S.C.
2516(1).
130 The list appears in 18 U.S.C. 2516(1) the text of which is appended.
131 “Any attorney for the Government (as such term is defined for the purposes of the Federal Rules of Criminal
Procedure) may authorize an application to a Federal judge of competent jurisdiction for, and such judge may grant, in
conformity with section 2518 of this title, an order authorizing or approving the interception of electronic
communications by an investigative or law enforcement officer having responsibility for the investigation of the
offense as to which the application is made, when such interception may provide or has provided evidence of any
Federal felony,” 18 U.S.C. 2516(3). The less demanding procedures of 18 U.S.C. 2701-2711 may be used with respect
to e-mail or other electronic communications that are in storage; recourse to subsection 2516(3) is only necessary when
wire, oral or electronic communications are to be “intercepted.”
At the state level, the principal prosecuting attorney of a state or any of its political subdivisions
may approve an application for an order authorizing wiretapping or electronic eavesdropping
based upon probable cause to believe that it will produce evidence of a felony under the state
laws covering murder, kidnaping, gambling, robbery, bribery, extortion, drug trafficking, or any
other crime dangerous to life, limb or property. State applications, court orders and other 132
procedures must at a minimum be as demanding as federal requirements.
Applications for a court order authorizing wiretapping and electronic surveillance include:
• the identity of the applicant and the official who authorized the application;
• a full and complete statement of the facts including
• details of the crime,
• a particular description of nature, location and place where the 133
interception is to occur,
• a particular description of the communications to be intercepted, and
• the identities (if known) of the person committing the offense and of the
persons whose communications are to be intercepted;
• a full and complete statement of the alternative investigative techniques used or
an explanation of why they would be futile or dangerous;
• a statement of period of time for which the interception is to be maintained and if
it will not terminate upon seizure of the communications sought, a probable
cause demonstration that further similar communications are likely to occur;
• a full and complete history of previous interception applications or efforts
involving the same parties or places;
• in the case of an extension, the results to date or explanation for the want of
results; and
• any additional information the judge may require, 18 U.S.C. 2518(1), (2).
Before issuing an order authorizing interception, the court must find:
• probable cause to believe that an individual is, has or is about to commit one or
more of the predicate offenses;
• probable cause to believe that the particular communications concerning the
crime will be seized as a result of the interception requested;
• that normal investigative procedures have been or are likely to be futile or too
dangerous; and
• probable cause to believe that “the facilities from which, or the place where, the
wire, oral, or electronic communications are to be intercepted are being used, or
132 18 U.S.C. 2516(2). The text of subsection 2516(2) is appended.
133 Identification of the place where, or facilities over, which the targeted communications are to occur may be excused
where the court finds that the suspect has or will take steps to thwart interception, 18 U.S.C. 2518(11), (12)(text is
appended).
are about to be used, in connection with the commission of such offense, or are
leased to, listed in the name of, or commonly used by such person,” 18 U.S.C.
Subsections 2518(4) and (5) demand that any interception order include:
• the identity (if known) of the persons whose conversations are to be intercepted;
• the nature and location of facilities and place covered by the order;
• a particular description of the type of communication to be intercepted and an
indication of the crime to which it relates;
• individual approving the application and the agency executing the order;
• the period of time during which the interception may be conducted and an
indication of whether it may continue after the communication sought has been
seized;
• an instruction that the order shall be executed
• as soon as practicable, and
• so as to minimize the extent of innocent communication seized; and
• upon request, a direction for the cooperation of communications providers and
others necessary or useful for the execution of the order, 18 U.S.C. 2518(4).
Compliance with these procedures may be postponed briefly until after the interception effort has
begun, upon the approval of senior Justice Department officials in emergency cases involving
organized crime or national security threatening conspiracies or involving the risk of death or 134
serious injury, 18 U.S.C. 2518(7).
The court orders remain in effect only as long as required but not more than 30 days. After 30
days, the court may grant 30 day extensions subject to the procedures required for issuance of the
original order, 18 U.S.C. 2518(5). During that time the court may require progress reports at such
intervals as it considers appropriate, 18 U.S.C. 2518(6).
Intercepted communications are to be recorded and the evidence secured and placed under seal
(with the possibility of copies for authorized law enforcement disclosure and use) along with the
application and the court’s order, 18 U.S.C. 2518(8)(a),(b).
Within 90 days of the expiration of the order those whose communications have been intercepted
are entitled to notice, and evidence secured through the intercept may be introduced into evidence
with 10 days’ advance notice to the parties, 18 U.S.C. 2518(8)(d), (9).
Title III also circumscribes the conditions under which information derived from a court ordered
interception may be disclosed or otherwise used. Nevertheless, it may be disclosed to and used
for official purposes by:
• other law enforcement officials including foreign officials, 18 U.S.C. 2517(1),
(2), (5), (7);
134 The text of section 2518(7) is appended.
• federal intelligence officers to the extent that it involves foreign intelligence 135
information, 18 U.S.C. 2517(6);
• other American or foreign government officials to the extent that it involves the
threat of hostile acts by foreign powers, their agents, or international terrorists, 18 136
U.S.C. 2517(8).
It may also be disclosed by witnesses testifying in federal or state proceedings, 18 U.S.C. 137
The procedural requirements for law enforcement access to stored wire or electronic
communications and transactional records are less demanding but equally complicated, 18 U.S.C.
2701-2712. They deal with two kinds of information – often in the custody of the telephone
company or some other service provider rather than of any of the parties to the communication –
communications records and th content of electronic or wire communications. Law enforcement
officials are entitled to access:
• with the consent of the one of the parties;138
• on the basis of a court order or similar process under the procedures established 139
in Title III/ECPA;
• in certain emergency situations;140 or
135 “‘[F]oreign intelligence information’, for purposes of section 2517(6) of this title, means – (A) information, whether
or not concerning a United States person, that relates to the ability of the United States to protect against – (I) actual or
potential attack or other grave hostile acts of a foreign power or an agent of a foreign power; (ii) sabotage or intentional
terrorism by a foreign power or an agent of a foreign power; or (iii) clandestine intelligence activities by and
intelligence service or network of a foreign power or by an agent of a foreign power; or (B) information, whether or not
concerning a United States person, with respect to a foreign power or foreign territory that relates to – (I) the national
defense or the security of the United States; or (ii) the conduct of the foreign affairs of the United States,” 18 U.S.C.
2510(19).
136 The text of 18 U.S.C. 2578(1), (2), (5), (6), (7), and (8)is appended.
137 The text of 18 U.S.C. 2517(3) and (4) is appended.
138 “(b) A provider described in subsection (a) may divulge the contents of a communication . . . (3) with the lawful
consent of the originator or an addressee or intended recipient of such communication, or the subscriber in the case of
remote computing service. . . . (c) . . . A provider described in subsection (a) may divulge a record or other information
pertaining to a subscriber to or customer of such service, (not including the contents of communications covered by
subsection (a)(1) or (a)(2)) . . . (2) with the lawful consent of the customer or subscriber. “ 18 U.S.C. 2702(b)(3),(c)(2).
139 “A provider described in subsection (a) may divulge the contents of a communication . . . (2) as otherwise
authorized in section 2517, 2511(2)(a), or 2703 . . . .(c) . . . A provider described in subsection (a) may divulge a record
or other information pertaining to a subscriber to or customer of such service, (not including the contents of
communications covered by subsection (a)(1) or (a)(2)) (1) as otherwise authorized in section 2703, “ 18 U.S.C.
2702(b)(2), (c)(1).
140 “(b) A provider described in subsection (a) may divulge the contents of a communication . . . (8) to a governmental
entity, if the provider, in good faith, believes that an emergency involving danger of death or serious physical injury to
any person requires disclosure without delay of communications relating to the emergency. (c) . . . A provider
described in subsection (a) may divulge a record or other information pertaining to a subscriber to or customer of such
service, (not including the contents of communications covered by subsection (a)(1) or (a)(2)) . . .(4) to a government
entity, if the provider, in good faith, believes that an emergency involving danger of death or serious physical injury to
any person requires disclosure without delay of the information relating to the emergency,” 18 U.S.C.
(continued...)
• under one of the other statutory exceptions to the ban on service provider 141
disclosure.
Section 2703, which affords law enforcement access to the content of stored wire and electronic
communications, distinguishes between recent communications and those that have been in
electronic storage for more than six months. Government officials may gain access to wire or
electronic communications in electronic storage for less than six months under a search warrant
issued upon probable cause to believe a crime has been committed and the search will produce 142
evidence of the offense.
The government must used the same warrant procedure to acquire older communications or those
stored in remote computer storage if access is to be afforded without notice to the subscriber or 143
customer. If government officials are willing to afford the subscriber or customer notice or at
least delayed notice, access may be granted under a court order showing that the information
sought is relevant and material to a criminal investigation or under an administrative subpoena, a 144
grand jury subpoena, a trial subpoena, or court order.
Under the court order procedure, the court may authorize delayed notification in 90 day 145
increments when contemporaneous notice might have an adverse impact. Government 146
supervisor officials may certify the need for delayed notification in the case of a subpoena.
Traditional exigent circumstances and a final general inconvenience justification form the
grounds for delayed notification in either case:
• endangering the life or physical safety of an individual;
• flight from prosecution;
(...continued)
2702(b)(8),(c)(4).
141 “(b) A provider described in subsection (a) may divulge the contents of a communication — (1) to an addressee or
intended recipient of such communication or an agent of such addressee or intended recipient; . . . (4) to a person
employed or authorized or whose facilities are used to forward such communication to its destination; (5) as may be
necessarily incident to the rendition of the service or to the protection of the rights or property of the provider of that
service; (6) to the National Center for Missing and Exploited Children, in connection with a report submitted thereto
under section 227 of the Victims of Child Abuse Act of 1990; (7) to a law enforcement agency – (A) if the contents –
(I) were inadvertently obtained by the service provider; and (ii) appear to pertain to the commission of a crime . . . (c) .
. . A provider described in subsection (a) may divulge a record or other information pertaining to a subscriber to or
customer of such service, (not including the contents of communications covered by subsection (a)(1) or (a)(2)) . . . (3)
as may be necessarily incident to the rendition of the service or to the protection of the rights or property of the
provider of that service,” 18 U.S.C. 2702(b)(1),(4),(5),(6),(7); (c)(3).
142 18 U.S.C. 2703(a)(text is appended). The 21st Century Department of Justice Appropriations Authorization Act, 116
Stat. 1822 (2002), amended section 2703 to permit execution of the warrant by service providers and others without
requiring the presence of a federal officer, 18 U.S.C. 2703(g)(“Notwithstanding section 3105 of this title, the presence
of an officer shall not be required for service or execution of a search warrant issued in accordance with this chapter
requiring disclosure by a provider of electronic communications service or remote computing service of the contents of
communications or records or other information pertaining to a subscriber to or customer of such service”), see United
States v. Bach, 310 F.3d 1063 (8th Cir. 2002)(the Fourth Amendment does not require the presence of a federal officer
when technicians execute a search warrant on a service provider’s server).
143 18 U.S.C. 2703(a), (b)(1)(A), (b)(2) (text is appended).
144 18 U.S.C. 2703(b)(1)(B), (d) (text is appended).
145 18 U.S.C. 2705(a)(1)(A), (4) (text is appended).
146 18 U.S.C. 2705(a)(1)(B), (4) (text is appended).
• destruction of or tampering with evidence;
• intimidation of potential witnesses; or
• otherwise seriously jeopardizing an investigation or unduly delaying a trial, 18 147
U.S.C. 2705(a)(2), (b).
Comparable, if less demanding, procedures apply when the government seeks other customer
information from a service provider (other than the content of a customer’s communications). The
information can be secured:
• with a warrant;
• with a court order;
• with customer consent;
• with a written request in telemarketing fraud cases; or
• with a subpoena in some instances.148
Most customer identification, use, and billing information can be secured simply with a subpoena 149
and without customer notification.
Pen registers and trap and trace devices identify the source of calls placed to or from a particular
telephone. Federal government attorneys and state and local police officers may apply for a court
order authorizing the installation and use of a pen register and/or a trap and trace device upon
147 A Sixth Circuit panel, in a decision later vacated en banc on grounds of ripeness, held that the Fourth Amendment
precluded the seizure of stored e-mail from a service provider under a section 2703 court order which featured a
delayed notice authorization under section 2705, Warshak v. United States, 490 F.3d 455, 468-82 (6th Cir. 2007), vac’d
en banc, 532 F.3d 521 (6th Cir. 2008). The panel did not address whether exigent circumstances would permit seizure
with delayed notice, perhaps because the government apparently did not raise the question, 490 F.3d at 464-65.
148 “(1) A government entity may require a provider of electronic communication service or remote computing service
to disclose a record or other information pertaining to a subscriber to or customer of such service (not including the
contents of communications) – (A) obtains a warrant issued using the procedures described in the Federal Rules of
Criminal Procedure by a court with jurisdiction over the offense under investigation or equivalent State warrant; (B)
obtains a court order for such disclosure under subsection (d) of this section; (C) has the consent of the subscriber or
customer to such disclosure; or (D) submits a formal written request relevant to a law enforcement investigation
concerning telemarketing fraud for the name, address, and place of business of a subscriber or customer of such
provider, which subscriber or customer is engaged in telemarketing (as such term is defined in section 2325 of this
title); or (E) seeks information under paragraph (2) . . . (3) A governmental entity receiving records or information
under this subsection is not required to provide notice to a subscriber or customer,” 18 U.S.C. 2703(c)(1),(3).
149 “(2) A provider of electronic communication service or remote computing service shall disclose to a governmental
entity the (A) name; (B) address; (C) local and long distance telephone connection records, or records of session times
and durations; (D) length of service (including start date) and types of service utilized; (E) telephone or instrument
number or other subscriber number or identity, including any temporarily assigned network address; and (F) means and
source of payment (including any credit car or bank account number), of a subscriber to or customer of such service,
when the governmental entity uses an administrative subpoena authorized by a Federal or State statute or a Federal or
State grand jury or trial subpoena or any means available under paragraph (1). (3) A governmental entity receiving
records or information under this subsection is not required to provide notice to a subscriber or customer,” 18 U.S.C.
2703(c)(2),(3).
certification that the information that will provide is relevant to a pending criminal 150
investigation.
An order authorizing installation and use of a pen register or trap and trace device must:
• specify
• the person (if known) upon whose telephone line the device is to be
installed,
• the person (if known) who is the subject of the criminal investigation,
• the telephone number, (if known) the location of the line to which the
device is to be attached, and geographical range of the device,
• a description of the crime to which the investigation relates;
• upon request, direct carrier assistance pursuant to section 3124;
• terminate within 60 days, unless extended;
• involve a report of particulars of the order’s execution in Internet cases; and
• impose necessary nondisclosure requirements.151
Senior Justice Department or state prosecutors may approve the installation and use of a pen
register or trap and trace device prior to the issuance of court authorization in emergency cases
that involving either an organized crime conspiracy, an immediate danger of death or serious 152
injury, an threat to national security, or a serious attack on a “protected computer.”
Federal authorities have applied for court orders, under the Stored Communications Act (18
U.S.C. 2701-2712) and the trap and trace authority of 18 U.S.C. 3121-3127, seeking to direct
communications providers to supply them with the information necessary to track cell phone
users in conjunction with an ongoing criminal investigation. Thus far, their efforts have met with 153
mixed success.
The procedure for securing wiretapping court orders under the Foreign Intelligence Surveillance 154
Act (FISA), 50 U.S.C. 1801-1811, is the most distinctive of the wiretap-related procedures.
First, its focus is different. It was designed to secure foreign intelligence information – not
150 18 U.S.C. 3122 (text is appended).
151 18 U.S.C. 3123 (text is appended).
152 18 U.S.C. 3125 (text is appended).
153 E.g., In re Application of the United States, 497 F.Supp.2d 301 (D. P.R. 2007); In re United States, 441 F.3d 816
(S.D. Tex. 2006); In re Application of the Untied States, 416 F.Supp. 390 (D.Md. 2006); In re Application of the United
States, 415 F.Supp.2d 211 (W.D.N.Y. 2006); In re Application of the United States, 412 F.Supp.2d 947 (E.D.Wis.
2006); In re Application of the United States, 407 F.Supp.2d 134 (D.D.C. 2006) (each denying the application); but see,
In re Application of the United States, 509 F.Supp.2d 76 (D.Mass. 2007); In re Application of the United States, 460
F.Supp.2d 448 (S.D.N.Y. 2006); In re Application of the United States, 433 F.Supp.2d 804 (S.D. Tex. 2006); In re
Application of the United States, 411 F.Supp.2d 678 (W.D.La. 2006).
154 See generally, CRS Report RL30465, The Foreign Intelligence Surveillance Act: An Overview of the Statutory
Framework, by Elizabeth B. Bazan.
evidence of a crime.155 Second, it operates in a highly secretive manner. But its most
individualistic feature is that the procedure is conducted entirely before members of an
independent court convened for no other purpose. The Act operates in the field of foreign
intelligence gathering, primarily through a Foreign Intelligence Surveillance Court whose judges
grant or reject petitions for wiretap and electronic surveillance orders, orders authorizing physical
searches and seizures, pen register and trap and trace orders, and orders relating to the surrender
of tangible items.
The Foreign Intelligence Surveillance Court is comprised of eleven federal court judges 156
designated by the Chief Justice to sit on the Court for a single seven year term. In the area of 157
wiretaps and physical searches, the judges of the Court individually receive and approve or 158
reject requests, authorized by the Attorney General, to conduct the four specific types of 159160
electronic surveillance noted earlier of the communications and activities of foreign powers.
The contents of FISA application include:
• the identity of the individual submitting the application;
• the identity or a description of the person whose communications are to be
intercepted;
• an indication of
• why the person is believed to be a foreign power or the agent of a foreign
power, and
155 In its original form, gathering foreign intelligence was “the” purpose for which FISA surveillance orders were
sought, 50 U.S.C. 1804(a)(7)(B) (1982 ed.). Although amended by the USA PATRIOT Act, gathering foreign
intelligence must still provide a “significant” reason for seeking a FISA surveillance order, 50 U.S.C. 1804(a)(7)(B); In
re Sealed Case, 310 F.3d 717, (F.I.S.Ct.Rev. 2002); United States v. Ning Wen, 477 F.3d 896, 897 (7th Cir. 2007).
156 50 U.S.C. 1803(a),(b),(d) (text is appended).
157 The FISA procedures relating to wiretapping and electronic surveillance orders, 50 U.S.C. 1801-1811, and those
relating to physical searches, 50 U.S.C. 1821-1829, are virtually identical and consequently are treated together here.
158 P.L. 110-261 explicitly granted the FISA court judges the authority to sit as a group on their own initiative or on the
petition of the government when a majority of court concludes that a particular matter is exceptional significance or in
order uniformity of interpretation among the members of the court, 50 U.S.C. 1803(a)(2).
159 50 U.S.C. 1801(f)(text is appended). The courts have noted that, unlike surveillance under Title III/EPCA, silent
video surveillance falls within the purview of FISA by virtue of subsection 1801(f)(4), United States v. Koyomejian,
970 F.2d 536, 540 (9th Cir. 1992); United States v. Mesa-Rincon, 911 F.2d 1433, 1438 (10th Cir. 1990); United States
v. Biasucci, 786 F.2d 504, 508 (2d Cir. 1986).
160 “‘Foreign power’ means – (1) a foreign government or any component thereof, whether or not recognized by the
United States; (2) a faction of a foreign nation or nations, not substantially composed of United States persons; (3) an
entity that is openly acknowledged by a foreign government or governments to be directed and controlled by such
foreign government or governments; (4) a group engaged in international terrorism or activities in preparation therefor;
(5) a foreign-based political organization, not substantially composed of United States persons; (6) an entity that is
directed and controlled by a foreign government or governments; or an entity not substantially composed of United
States persons that is engaged in the international proliferation of weapons of mass destruction,” 50 U.S.C.
1801(a)(language in italics added in P.L. 110-261). Note that the definition of foreign power includes international
terrorists groups regardless of whether any nexus to a foreign power can be shown, 50 U.S.C. 1801(a)(4) and includes
agents of foreign powers that no longer exist, United States v. Squillacote, 221 F.3d 542, 554 (4th Cir. 2000) (agents of
East Germany intercepted under an order granted after unification). Moreover, at least until it expires on December 31,
2009, the definition of “agent of foreign power” (50 U.S.C.1801(b)(1)(c)) includes international terrorists with no
necessary to connection to a foreign power or group. The FISA physical search provisions adopt by cross reference the
definitions of “foreign power” and “agent of a foreign power,” 50 U.S.C. 1821(1).
• why foreign powers or their agents are believed to use the targeted
facilities or places;
• a summary of the minimization procedures161 to be followed;
• a description of the communications to be intercepted and the information 162
sought;
• certification by a senior national security or senior defense official designed by
the President that
• the information sought is foreign intelligence information,
• a significant purpose of interception is to secure foreign intelligence
information,
• the information cannot reasonably be obtained using alternative 163
means,
• a summary statement of the means of accomplishing the interception (including 164
whether a physical entry will be required);
• a history of past interception applications involving the same persons, places or
facilities;
• the period of time during which the interception is to occur, whether it will
terminate immediately upon obtaining the information sought, and if not, the 165
reasons why interception thereafter is likely to be productive intercepted.
FISA court judges issue orders approving electronic surveillance or physical searches upon a
finding that the application requirements have been met and that there is probable cause to
believe that the target is a foreign power or the agent of a foreign power and that the targeted 166
places or facilities are used by foreign powers of their agents.
161 “Minimization procedures” are defined in 50 U.S.C. 1801(h). They are essentially those procedures designed to
minimize the unnecessary acquisition, retention, and dissemination of information relating to U.S. persons (American
citizens, permanent resident aliens, U.S. corporations, and organizations a substantial number of whose members are
Americans). Like the procedures in Title III, they are crafted to minimize the amount of “innocent” communications
captured with the communications which are the target of the order and require a good faith effort on the part of the
government to avoid the capture and retention of irrelevant material, United States v. Hammoud, 381 F.3d 316, 334
(4th Cir. 2004), vac’d on other grounds, 543 U.S. 1097 (2004), reinstated in pertinent part after remand, 405 F.3d 1034
(4th Cir. 2005); United States v. Rosen, 447 F.Supp.2d 538, 550-51 (E.D.Va. 2006).
162 Section 104(a)(1)(c) of P.L. 110-261 eliminated the requirement of a “detailed” description.
163 Section 104(a)(1)(D) of P.L. 110-261 authorized the President to designate the Deputy Director of the Federal
Bureau of Investigation as a certifying official as well.
164 Section 104(a)(1)(E) of P.L. 11-261 added that the statement need only be “summary.”
165 50 U.S.C. 1804 (text is appended). 50 U.S.C. 1823 relating to applications for a FISA physical search order is
essentially the same. Section 104(a)(1)(A) of P.L. 110-261 eliminated the requirement that the application indicate that
the Attorney General approved the application and that the President had authorized him to do so. It also eliminated the
requirement that the application indicate whether more than one interception device was to be used and if so their range
and the minimization procedures associated with each. Section 104(a)(2) of P.L. 110-261, however, repealed the
language once found in 50 U.S.C. 1804(b) which, when the target of the surveillance was a foreign power, excused the
inclusion of multiple device information, of a statement of the means of execution, of a statement relating to the basis
for the “last resort” and foreign intelligence information certifications, and of a description of the information sought
and the type of communications targeted.
166 50 U.S.C. 1805(a) (text is appended); 50 U.S.C. 1824(a) is to the same effect with respect to physical search orders.
Orders approving electronic surveillance must:
• specify
• the identity or a description of the person whose communications are to
be intercepted,
• the nature and location of the targeted facilities or places, if known,
• type of communications or activities targeted and the kind of information
sought,
• the means by which interception is to be accomplished and whether
physical entry is authorized,
• the tenure of the authorization, and
• whether more than one device are to be used and if so their respective
ranges and associated minimization procedures;
• require
• that minimization procedures be adhered to,
• upon request, that carriers and others provide assistance,167
• that those providing assistance observe certain security precautions, and 168
be compensated;
• direct the applicant to advise the court of the particulars relating to surveillance
directed at additional facilities and places when the order permits surveillance
although the nature and location of targeted facilities and places were unknown at
the time of issuance;
• expire when its purpose is accomplished but not later than after 90 days generally
(after 120 days in the case of certain foreign agents and after a year in the case of
167 “An order approving an electronic surveillance under this section shall . . . (2) direct – (B) that, upon the request of
the applicant, a specified communication or other common carrier, landlord, custodian, or other specified person, or in
circumstances where the Court finds that the actions of the target of the application may have the effect of thwarting
the identification of a specified person, such other persons, furnish the applicant forthwith all information, facilities, or
technical assistance necessary to accomplish the electronic surveillance in such a manner as will protect its secrecy and
produce a minimum of interference with the services that such carrier, landlord, custodian, or other person is providing
that target of electronic surveillance,” 50 U.S.C. 1805(c)(2)(B). By virtue of section 102(b) of the USA PATRIOT
Improvement and Reauthorization Act, the language in italics expires on December 31, 2009, unless statutorily
extended or made permanent, P.L. 109-177, §102(b) 120 Stat. 195 (2006).
168 50 U.S.C. 1805(c)(2)(C),(D); 50 U.S.C. 1824(c)(2)(C),(D)(text is appended). FISA physical search orders must also
direct “the federal officer conducting the physical search promptly report to the court the circumstances and results of
the physical search,” 50 U.S.C. 1824(c)(2)(E).
The USA PATRIOT Act’s amendments make it clear that those who provide such assistance are immune from civil
suit, 18 U.S.C. 1805(i) (“No cause of action shall lie in any court against any provider of a wire or electronic
communication service, landlord, custodian, or other persons (including any officer, employee, agent, or other specified
person thereof) that furnishes any information, facilities, or technical assistance in accordance with a court order or
request for emergency assistance under this Act for electronic surveillance or physical search”). As discussed at greater
length later, P.L. 110-261 affords service providers retroactive protection for foreign intelligence assistance provided
outside the confines of FISA.
foreign governments or their entities or factions of foreign nations) unless 169
extended (extensions may not exceed one year).
As in the case of law enforcement wiretapping and electronic eavesdropping, there is authority 170
for interception and physical searches prior to approval in emergency situations, but there is
also statutory authority for foreign intelligence surveillance interceptions and physical searches
without the requirement of a court order when the targets are limited to communications among
or between foreign powers or involve nonverbal communications from places under the open and 171
exclusive control of a foreign power. The second of these is replete with reporting requirements 172173
to Congress and the FISA court. These and the twin war time exceptions may be subject to 174
constitutional limitations, particularly when Americans are the surveillance targets.
FISA has detailed provisions governing the use of the information acquired through the use of its
surveillance or physical search authority that include:
• confidentiality requirements, 50 U.S.C. 1806(a), 1825(a);
• notice of required Attorney General approval for disclosure, 50 U.S.C. 1806(b),
• notice to the “aggrieved” of the government’s intention to use the results as
evidence, 50 U.S.C. 1806(c),(d), 1825(c),(d);
• suppression procedures, 50 U.S.C. 1806(e), (f), (g), (h), 1825(e), (f), (g), (h);175
• inadvertently captured information, 50 U.S.C. 1806(I), 1825(b);
169 50 U.S.C. 1805(c); 1824(c) (text is appended).
170 50 U.S.C. 1805(f); 1824(e) (text is appended). P.L. 110-261 extends the permissible length of emergency
authorizations absent court approval from 72 hours to 7 days. It also removes earlier language which called for review
of a FISA court denial of an application to approve an emergency authorization. Finally, it states that the Attorney
General is to assess compliance with the statutory provisions which permit use of the information secured under an
authorization which fails to secure judicial approval.
171 50 U.S.C. 1802(a)(1),(4); 1822(a)(1), (4) (text is appended).
172 50 U.S.C. 1802(a)(2),(3); 1822(a)(2), (3) (text is appended).
173 “Notwithstanding any other law, the President, through the Attorney General, may authorize electronic surveillance
without a court order under this subchapter to acquire foreign intelligence information for a period not to exceed fifteen
calendar days following a declaration of war by the Congress, “ 50 U.S.C. 1811.
“Notwithstanding any other provision of law, the President, through the Attorney General, may authorize physical
searches without a court order under this subchapter to acquire foreign intelligence information for a period not to
exceed 15 calendar days following a declaration of war by the Congress,” 50 U.S.C. 1829.
174 Over the years, however, the vast majority of courts have rejected the suggestion that FISA is vulnerable to
constitutional attack on Fourth Amendment grounds or any other, In re Sealed Case, 310 F.3d 717, 737-46
(F.I.S.Ct.Rev. 2002); United States v. Damrah, 412 F.3d 618, 624-25 (6th Cir. 2005); United States v. Mubayyid, 521
F.Supp.2d 125, 135-36 (D. Mass. 2007); United States v. Benkahla, 437 F.Supp.2d 541, 554-55 (E.D.Va. 2006);
contra, Mayfield v. United States, 504 F.Supp.2d 1023, 1036-43 (D. Ore. 2007).
175 Consideration of a motion to suppress occurs ex parte and in camera when the government files a notice that
national security would otherwise be compromised, 50 U.S.C. 1806(f); In re Grand Jury Proceedings, 347 F.3d 197,
203 (7th Cir. 2003); United States v. Damrah, 412 F.3d 618, 623-24 (6th Cir. 2005); review is the same as that afforded
by the FISA court, statutory compliance; there is no authority to “second guess the executive branches certification,” In
re Grand Jury Proceedings, 347 F.3d 197, 204-205 (7th Cir. 2003); United States v. Campa, 529 F.3d 980, 993 (11th
Cir. 2008); United States v. Amawi, 531 F.Supp.2d 832, 837 (N.D. Ohio 2008); United States v. Abu-Jihaad, 531
F.Supp.2d 299, 312 (D.Conn. 2008).
• notification of emergency surveillance or search for which no FISA order was
subsequently secured, 50 U.S.C. 1806(j), 1825(j); and
• clarification that those who execute FISA surveillance or physical search orders
may consult with federal and state law enforcement officers, 50 U.S.C. 1806(k),
Both the surveillance and the physical search authorities are subject to Congressional oversight in
the form of semiannual reports on the extent and circumstances of their use, 50 U.S.C. 1808,
FISA pen register and trap and trace procedures, 50 U.S.C. 1841-1846, are similar to those of
their law enforcement counterparts, but with many of the attributes of other FISA provisions. The
orders may be issued either by a member of the FISA court or by a FISA magistrate upon the
certification of a federal officer that the information sought is likely to be relevant to an
investigation of international terrorism or clandestine intelligence activities, 50 U.S.C. 1842. The
order may direct service providers to supply customer information related to order, 50 U.S.C.
1842.(d)(2)(C). The statute allows the Attorney General to authorize emergency installation and
use as long as an application is filed within 48 hours, 50 U.S.C. 1843, and restricts the use of any
resulting evidence if an order is not subsequently granted, 50 U.S.C. 1843(c)(2). The provisions
for use of the information acquired run parallel to those that apply to FISA surveillance and
physical search orders, 50 U.S.C. 1845. The USA PATRIOT Improvement and Reauthorization
Act increased the level of Congressional oversight by requiring that the semiannual report on the
government’s recourse to FISA pen register/trap and trace authority including statistical
information on the extent its use, 50 U.S.C. 1846.
FISA’s tangible item orders, 50 U.S.C. 1861, are perhaps its most interesting feature. Prior to the
USA PATRIOT Act, senior FBI officials could approve an application to a FISA judge or
magistrate for an order authorizing common carriers, or public accommodation, storage facility,
or vehicle rental establishments to release their business records based upon certification of a
reason to believe that the records pertained to a foreign power or the agent of a foreign power, 50
U.S.C. 1862 (2000 ed.). The USA PATRIOT Act and later the USA PATRIOT Improvement and
Reauthorization Act temporarily rewrote the procedure. In its temporary form, it requires rather
than authorizes access; it is predicated upon relevancy rather than probable cause; it applies to all
tangible property (not merely records); and it applies to the tangible property of both individuals 176
or organizations, commercial and otherwise. It is limited, however, to investigations conducted
to secure foreign intelligence information or to protect against international terrorism or
clandestine intelligence activities, 50 U.S.C. 1861(a).
Recipients are prohibited from disclosing the existence of the order, but are expressly authorized
to consult an attorney with respect to their rights and obligations under the order, 50 U.S.C.
176 Unless legislative extended, the authority reverts to its pre-USA PATRIOT Act form on December 31, 2009, 50
U.S.C. 1861 note; P.L. 109-177, §102(b), 120 Stat. 195 (2006).
They may challenge the legality of the order and/or ask that its disclosure restrictions be lifted or
modified, 50 U.S.C. 1861(f). The grounds for lifting the secrecy requirements are closely defined,
but petitions for reconsideration may be filed annually, 50 U.S.C. 1861(f)(2)(C)(iii). The decision
to set aside, modify or let stand either the disclosure restrictions of an order or the underlying
order itself are subject to appellate review, 50 U.S.C. 1861(f)(3),(4),(5).
As addition safeguards, Congress has:
• insisted upon the promulgation of minimization standards, 50 U.S.C. 1861(g);
• established use restrictions, 50 U.S.C. 1861(h),
• required the approval of senior officials in order to seek orders covering the
records of libraries and certain other types of records, 50 U.S.C. 1861(a)(3);
• confirmed and reenforced reporting requirements, 50 U.S.C. 1862; and
• directed the Justice Department’s Inspector General to conduct an audit of the use
of the FISA tangible item authority, P.L. 109-177, §106A, 120 Stat. 200-202
(2006).
The Protect America Act (Protect Act) granted the Attorney General and the Director of National
Intelligence the power, under limited conditions, to authorize gathering foreign intelligence 177
information, including by electronic surveillance, (for up to a year) relating to persons believed 178
to be overseas. In order to exercise that power, the Attorney General and the Director of
National Intelligence were required to certify under oath that the collection effort involved:
• procedures reasonably calculated to assure that the information sought concerned
a person outside the United States;
• communications to which service providers or others had access;
• a desire, at least in significant part, to gather foreign intelligence information;
• accompanying minimization procedures; and
177 “‘Foreign intelligence information’ means – (1) information that relates to, and if concerning a United States person
is necessary to, the ability of the United States to protect against – (A) actual or potential attack or other grave hostile
acts of a foreign power or an agent of a foreign power; (B) sabotage, international terrorism, or the international
proliferation of weapons of mass destruction by a foreign power or an agent of a foreign power; or (C) clandestine
intelligence activities by an intelligence service or network of a foreign power or by an agent of a foreign power; or (2)
information with respect to a foreign power or foreign territory that relates to, and if concerning a United States person
is necessary to – (A) the national defense or the security of the United States; or (B) the conduct of the foreign affairs
of the United States,” 50 U.S.C. 1801(e)(language in italics added by P.L. 110-261 did not apply when the Protect Act
was in effect).
178 P.L. 110-55, §§2, 3, 121 Stat. 552 (2007), 50 U.S.C. 1805a - 1805c. By operation of section 6(c) of the Public Law,
sections 2, 3, 4, and 5 expired 180 days after enactment; the deadline was extended to 195 days on January 31, 2008, by
P.L. 110-182, 122 Stat. 605 (2008); and the sections expired when the deadline ran out in mid-February. Section 6(b) of
the Act provides that orders issued and extended under the authority of the Act remain in effect until they expire under
the terms of the order, the Act, and the FISA provisions in effect when they were issued. See generally, CRS Report
RL34143, P.L.110-55, the Protect America Act of 2007: Modifications to the Foreign Intelligence Surveillance Act, by
Elizabeth B. Bazan.
• no electronic surveillance other than that directed at a person reasonably believed 179
to be abroad, 50 U.S.C. 1805b(a)(expired).
That having been done or in emergency situations with their oral approval,180 the Attorney
General and Director of National Intelligence might direct the communications providers, or
others with access, to immediately assist in the gathering of the foreign intelligence information
in a manner least disruptive of service to the target and under confidentiality restrictions imposed
by the Attorney General and the Director of National Intelligence, 50 U.S.C. 1805b(e)(expired).
The directive came with the promise of compensation at prevailing rates as well as immunity
from civil liability and was enforceable through the contempt power of the FISA court, 50 U.S.C.
issued contrary to the statute or otherwise unlawfully, in the FISA court under expedited
procedures, 50 U.S.C. 1805b(h), (I), (j), (k) (expired).
The FISA court was also tasked with the responsibility of reviewing the procedures crafted to
ensure that the authority was only invoked with respect to persons reasonably believed to be
found overseas, 50 U.S.C. 1805c(expired). Should the court have determined that the procedures
were clearly erroneous, the government was free to amend them or to appeal the determination
initially to the Foreign Intelligence Surveillance Court of Review and then to the Supreme Court,
id.
P.L. 110-261 (H.R. 6304), signed July 10, 2008, addresses four FISA-related matters.181 First, in a
manner reminiscent of the Protect Act, it provides temporary authority to gather foreign 182
intelligence information from overseas targets. Second, it reasserts the exclusivity of FISA and 183
Title III/ECPA as a basis for governmental electronic surveillance. Third, it instructs the
Inspectors General in various agencies to conduct a review and report to Congress on the Terrorist 184
Surveillance Program. Fourth, it seeks to protect those who assist government surveillance 185
activities from civil liability.
179 Section 1805b(a)(2) simply called for a determination that “the acquisition does not constitute electronic
surveillance,” but section 1805a had declared that “nothing in the definition of electronic surveillance under section
101(f)[ which provides the definition of terms used in the subchapter in which section 1805b is found] shall be
construed to encompass surveillance directed at a person reasonably believed to be located outside the United States.”
180 In emergency situations, information gathering could begin prior certification under oral instructions as long as
minimization procedures were followed and certification was provided within 72 hours, 50 U.S.C. 1805b(a),
(d)(expired).
181 For a general discussion of the debate leading up to enactment see CRS Report RL34279, The Foreign Intelligence
Surveillance Act: An Overview of Selected Issues, by Elizabeth B. Bazan.
182 50 U.S.C. 1881-1881g.
183 50 U.S.C. 1812 (“(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of title 18,
United States Code, and this Act shall be the exclusive means by which electronic surveillance and the interception of
domestic wire, oral, or electronic communications may be conducted. (b) Only an express statutory authorization for
electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an
amendment to this Act or chapters 119, 121, or 206 of title 18, United States Code, shall constitute an additional
exclusive means for the purpose of subsection (a)”).
184 P.L. 110-261, tit. III, 122 Stat. 2471 (2008).
185 P.L. 110-261, tit. II, 122 Stat. 2467 (2008); 50 U.S.C. 1885-1885c (text is appended). For a general discussion of the
(continued...)
P.L. 110-261 repeals the Protect Act.186 Yet like the Protect Act, it establishes a temporary set of
three procedures to authorize the acquisition of foreign intelligence information by targeting an 187
individual or entity thought to be overseas. One, 50 U.S.C. 1881a, applies to the targeting of an 188
overseas person or entity that is not a U.S. person. Another, 50 U.S.C. 1881b, covers situations
when the American target is overseas but the gathering involves electronic communications or 189
stored electronic communications or data acquired in this country. The third, 50 U.S.C. 1881c,
applies to situations when the American target is overseas, but section 1881b is not available,
either because acquisition occurs outside of the United States or because it involves something
other than electronic surveillance or the acquisition of stored communications or data, e.g., a 190
physical search.
In the case of targets who are not U.S. persons, section 1881a(a) declares “upon the issuance of
an order in accordance with subsection (i)(3) or a determination under subsection (c)(2), the
Attorney General and the Director of National Intelligence may authorize jointly, for a period of
up to 1 year from the effective date of the authorization, the targeting of persons reasonably
believed to be located outside the United States to acquire foreign intelligence information.” It
makes no mention of authorizing acquisition. It merely speaks of targeting with an eye to
acquisition. Moreover, it gives no indication of whether the anticipated methods of acquisition
include the capture of a target’s communications, of communications relating to a target, of
communications of a person or entity related to the target, or information concerning one of the
three. The remainder of the section, however, seems to dispel some of the questions. Section
1881a is intended to empower the Attorney General and the Director of National Intelligence to
authorize the acquisition of foreign intelligence information and the methods that may be used to
the capture of communications and related information.
The procedure begins either with a certification presented to the FISA court for approval or with a
determination by the two officials that exigent circumstances warrant timely authorization prior 191
court approval. In the certification process, they must assert in writing and under oath that:
• a significant purpose for the effort is the acquisition of foreign intelligence
information
• the effort will involve the assistance of an electronic communication service
provider
(...continued)
immunity provisions see CRS Report RL34600, Retroactive Immunity Provided by the FISA Amendments Act of 2008,
by Edward C. Liu.
186 P.L. 110-261, §403(a)(1)(A), 122 Stat. 2473 (2008)(repealing 50 U.S.C. 1805a, 1985b, and 1805c).
187 Sections 1881a-1881g are repealed effective December 31, 2012, P.L. 110-261, §403(b)(1), 122 Stat. 2474 (2008).
188 “United States person” includes United States citizens, permanent resident aliens of the United States, corporations
incorporated in the United States, and unincorporated associates made up of a substantial number of U.S. citizens, 50
U.S.C. 1881(a), 1801(j).
189 50 U.S.C. 1881b.
190 50 U.S.C. 1881c.
191 50 U.S.C. 1881a(a), (i)(3), (c)(2).
• the court has approved, or is being asked to approve, procedures designed to
ensure that acquisition is limited to targeted persons found outside the U.S. and to
prevent the capture of communications in which all the parties are within the
U.S.
• minimization procedures, which the court has approved or is being asked to
approve and which satisfy the requirements for such procedures in the case of
FISA electronic surveillance and physical searches, will be honored
• guidelines to ensure compliance with limitations imposed in the section have
been adopted and the limitations will be observed
• these procedures and guidelines are consistent with Fourth Amendment 192
standards.
The certification is be accompanied by a copy of the targeting and minimization procedures, any
supporting affidavits from senior national security officials, an indication of the effective date of
the authorization, and a notification of whether pre-approval emergency authorization has been 193
given. The certification, however, need not describe the facilities or places at which acquisition 194
efforts will be directed.
The limitations preclude intentionally targeting a person in the U.S., “reverse targeting”
(intentionally targeting a person overseas purpose of targeting a person within the U.S.),
intentionally targeting a U.S. person outside the U.S., intentionally acquiring a communication in
which all of the parties are in the U.S., or conducting the acquisition in a manner contrary to the 195
demands of the Fourth Amendment.
The Attorney General, in consultation with the Director of National Intelligence, is obligated to
promulgate targeting and minimization procedures and guidelines to ensure that the section’s 196
limitations are observed. The minimization procedures must satisfy the standards required for 197
similar procedures required for FISA electronic surveillance and physical searches. The
targeting procedures must be calculated to avoid acquiring communications in which all of the 198
parties are in the U.S. and to confine targeting to persons located outside the U.S. Both are
subject to review by the FISA court for sufficiency when it receives the request to approve the 199
certification. Copies of the guidelines, which also provide directions concerning the application
for FISA court approval under the section, must be supplied to court and to the congressional 200
intelligence and judiciary committees.
The Attorney General and Director of National Intelligence may instruct an electronic
communications service provider to assist in the acquisition. Cooperative providers are entitled to
192 50 U.S.C. 1881a(g)(2).
193 Id.
194 50 U.S.C. 1881a(g)(4).
195 50 U.S.C. 1881a(b).
196 50 U.S.C. 1881a(d), (e), (f).
197 50 U.S.C. 1881a(e).
198 50 U.S.C. 1881a(d).
199 50 U.S.C. 1881a(d), (e), (i).
200 50 U.S.C. 1881a(f).
compensation and are immune from suit for their assistance.201 They may also petition the FISA 202
court to set aside or modify the direction for assistance, if directive is unlawful. The Attorney 203
General may petition the court to enforce a directive against an uncooperative provider. The
court’s decisions concerning certification approval, modification of directions for assistance, and
enforcement of the directives are each appealable to the Foreign Intelligence Court of Review and 204
on certiorari to the Supreme Court.
Except with respect to disclosure following a failure to court approval of an emergency
authorization, section 1806, discussed earlier, governs the use of information obtained under the 205
authority of section 1881a.
When the overseas target is an American individual or entity and acquisition is to occur in this
country, the FISA court may authorize acquisition by electronic surveillance or by capturing
stored electronic communications or data under section 1881b. The Attorney General must
approve the application which must be made under oath and indicate:
• the identity of the applicant
• the identity, if known, or description of the American target
• the facts establishing that reason to believe that the person is overseas and a
foreign power or its agent, officer, or employee
• the applicable minimization procedures
• a description of the information sought and the type of communications or
activities targeted
• certification by the Attorney General or a senior national security or defense
official that
• foreign intelligence information is to be sought
• a significant purpose of the effort is to obtain such information
• the information cannot otherwise reasonable be obtained (and the facts
upon which this conclusion is based)
• the nature of the information (e.g., relating to terrorism, sabotage, the
conduct of U.S. foreign affairs, etc.)(and the facts upon which this
conclusion is based)
• the means of acquisition and whether physical entry will be necessary
• the identity of the service providing assisting (targeted facilities and premises
need not be identified)
• a statement of previous applications relating to the same American and actions
taken
201 50 U.S.C. 1881(h)(1)-(3).
202 50 U.S.C. 1881(h)(4).
203 50 U.S.C. 1881(h)(5).
204 50 U.S.C. 1881a(h)(6), (i).
205 50 U.S.C. 1881e(a).
• the proposed tenure of the order (not to exceed 90 days), and
• any additional information the FISA court may require.206
The court must issue an acquisition order upon a finding that the application satisfies statutory
requirements, the minimization procedures are adequate, and there is probable cause to believe
that the American target is located overseas and is a foreign power or its agent, officer or 207
employee. The court must explain in writing any finding that the application’s assertion of 208
probable cause, minimization procedures, or certified facts is insufficient. Such findings are
appealable to the Foreign Intelligence Surveillance Court of Review and under certiorari to the 209
Supreme Court.
The court’s order approving acquisition is to include the identity or description of the American
target, the type of activities targeted, the nature of the information sought, the means of 210
acquisition, and duration of the order. The order will also call for compliance with the
minimization procedures, and when appropriate, for confidential, minimally disruptive provider 211
assistance, compensated at a prevailing rate. Providers are immune from civil liability for any 212
assistance they are directed to provide.
As in other instances, in emergency cases the Attorney General may authorize acquisition 213
pending approval of the FISA court. The court must be notified of the Attorney General’s 214
decision and the related application must be filed within 7 days. If emergency acquisition is not
judicially approved subsequently, no resulting evidence may be introduce any judicial, legislative
or regulatory proceedings unless the target is determined not to be an American, nor may
resulting information be shared with other federal officials without the consent of the target,
unless the Attorney General determines that the information concerns a threat of serious bodily 215
injury. Except with respect to disclosure following a failure to court approval of an emergency
authorization, section 1806, discussed earlier, governs the use of information obtained under the 216
authority of section 1881a.
The second provision for targeting an American overseas in order to acquire foreign intelligence
information, section 1881c, is somewhat unique. Both FISA and Title III/ECPA have been
understood to apply only to interceptions within the United States. Neither has been thought to
apply overseas. Section 1881c, however, may be used for acquisitions outside the United States.
Moreover, it may be used for acquisitions inside the United States as long as the requirements that 217
would ordinarily attend such acquisition are honored. 50 U.S.C. 1881d(“(a) Joint applications
206 50 U.S.C. 1881b(b).
207 50 U.S.C. 1881b(c)(1). An American may not be considered a foreign power or its agent, officer or employee based
solely on activities protected by the First Amendment, 50 U.S.C. 1881b(c)(2).
208 50 U.S.C. 1881b(c)(3).
209 50 U.S.C. 1881b(f).
210 50 U.S.C. 1881b(c)(4).
211 50 U.S.C. 1881b(c)(5).
212 50 U.S.C. 1881b(e).
213 50 U.S.C. 1881b(d)(1).
214 Id.
215 50 U.S.C. 1881b(d)(4).
216 50 U.S.C. 1881e(a).
217 50 U.S.C. 1881c(a)(3)(B)(“If an acquisition for foreign intelligence purposes is to be conducted inside the United
(continued...)
and orders.– If an acquisition targeting a United States person under section 703 or 704 is
proposed to be conducted both inside and outside the United States, a judge having jurisdiction
under section 703(a)(1) or 704(a)(1) may issue simultaneously, upon the request of the
Government in a joint application complying with the requirements of sections 703(b) and
704(b), orders under sections 703(c) and 704(c), as appropriate. (b) Concurrent authorization– If
an order authorizing electronic surveillance or physical search has been obtained under section
105 or 304, the Attorney General may authorize, for the effective period of that order, without an
order under section 703 or 704, the targeting of that United States person for the purpose of
acquiring foreign intelligence information while such person is reasonably believed to be located
outside the United States”).
Otherwise, section 1881c features many of the same application, approval, and appeal provisions
as section 1881b. Authorization is available under a FISA court order or in emergency 218
circumstances under the order of the Attorney General. Acquisition activities must be 219
discontinued during any period when the target is thought to be in the United States. Unlike
1881b, however, it is not limited to electronic surveillance or the acquisition of stored electronic
information. Moreover, it declares that in the case of acquisition abroad recourse to a FISA court
order need only be had when the target American, found overseas, has a reasonable expectation of
privacy and a warrant would be required if the acquisition efforts had taken place in the United 220
States and for law enforcement purposes.
Title III/ECPA has long declared that it should not be construed to confine governmental activities
authorized under FISA, but that the two – Title III/ECPA and FISA – are the exclusive authority 221
under which governmental electronic surveillance may be conducted in this country. The
Justice Department suggested, however, that in addition to the President’s constitutional authority 222
the Authorization for the Use of Military Force Resolution, enacted in response to the events of
(...continued)
States and could be authorized under section 703 [1881b], the acquisition may only be conducted if authorized under
section 703 or in accordance with another provision of this Act other than this section”).
50 U.S.C. 1881d(“(a) Joint applications and orders.– If an acquisition targeting a United States person under section
703 or 704 is proposed to be conducted both inside and outside the United States, a judge having jurisdiction under
section 703(a)(1) or 704(a)(1) may issue simultaneously, upon the request of the Government in a joint application
complying with the requirements of sections 703(b) and 704(b), orders under sections 703(c) and 704(c), as
appropriate. (b) Concurrent authorization– If an order authorizing electronic surveillance or physical search has been
obtained under section 105 or 304, the Attorney General may authorize, for the effective period of that order, without
an order under section 703 or 704, the targeting of that United States person for the purpose of acquiring foreign
intelligence information while such person is reasonably believed to be located outside the United States”).
218 50 U.S.C. 1881c(a).
219 50 U.S.C. 1881c(a)(3).
220 50 U.S.C. 1881c(a)(2).
221 18 U.S.C. 2511(2)(f).
222 Section 2(a), P.L. 107-40, 115 Stat. 224 (2001), 50 U.S.C. 1541 note (“That the President is authorized to use all
necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized,
committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or
persons, in order to prevent any future acts of international terrorism against the United States by such nations,
organizations or persons”).
September 11, established an implicit exception to the exclusivity requirement.223 Section 102 of
P.L. 110-261 seeks to overcome the suggestion by establishing a second exclusivity section which 224
declares that it exceptions may only be created by explicit statutory language.
Section 301 of P.L. 110-261 instructs the Inspectors General of the Justice and Defense
Departments, of the Office of the Director of National Intelligence, of the National Security
Agency, and of any pertinent intelligence agency to conduct a comprehensive review of their
agency’s activities relating to presidentially authorized intelligence activities involving 225
communications, including the Terrorist Surveillance Program. It further directs them to
provide the Judiciary and Intelligence Committees with interim reports within 60 days of 226
enactment and final reports within 1 year.
P.L. 110-261 bars the initiation or continuation of civil suits in either state or federal court based 227
on charges that the defendant assisted any of the U.S. intelligence agencies. Dismissal is
required upon the certification of the Attorney General that the person either:
• did not provide the assistance charged;
• provided the assistance under order of the FISA court;
• - provided the assistance pursuant to a national security letter issued under 18
U.S.C. 2709;
• provided the assistance pursuant to 18 U.S.C. 2511(2)(a)(ii)(B) and 2518(7)
under assurances from the Attorney General or a senior Justice Department
official, empowered to approve emergency law enforcement wiretaps, that no
court approval was required;
• provided the assistance in response to a directive from the President through the
Attorney General relating to communications between or among foreign powers
pursuant to 50 U.S.C. 1802(a)(4);
• provided the assistance in response to a directive from the Attorney General and
the Director of National Intelligence relating to the acquisition of foreign
223 H.Rept. 110-373, at 9-10 (2007), citing a letter from Assistant Attorney General William E. Moschella.
224 50 U.S.C. 1812 (“(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of title 18,
United States Code, and this Act shall be the exclusive means by which electronic surveillance and the interception of
domestic wire, oral, or electronic communications may be conducted. (b) Only an express statutory authorization for
electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an
amendment to this Act or chapters 119, 121, or 206 of title 18, United States Code, shall constitute an additional
exclusive means for the purpose of subsection (a)”).
225 P.L. 110-261, §301(b), (a)(3), 122 Stat. 2471(2008).
226 P.L. 110-261, §301(c), 122 Stat. 2471(2008).
227 50 U.S.C. 1885a(a)(“Notwithstanding any other provision of law, a civil action may not lie or be maintained in a
Federal or State court against any person for providing assistance to an element of the intelligence community, and
shall be promptly dismissed. . .”).
intelligence information concerning persons believed to be overseas pursuant to
• provided the assistance in response to a directive from the Attorney General and
the Director of National Intelligence relating to the acquisition of foreign
intelligence information targeting non-U.S. persons thought to be overseas
pursuant to 50 U.S.C. 1881a(h); or
• provided the assistance in connection with intelligence activities authorized by
the President between September 11, 2001 and January 17, 2007 relating to 228
terrorist attacks against the United States.
Only telecommunications carriers, electronic service providers, and other communication service
providers may claim the protection afforded those who assisted activities authorized between 9/11 229
and January 17, 2007. The group which may claim protection for assistance supplied under
other grounds is larger. It includes not only communication service providers but also any 230
“landlord, custodian or other person” ordered or directed to provide assistance.
The Attorney General’s certification is binding if supported by substantial evidence, and the court
is to consider challenges and supporting evidence ex parte and in camera where the Attorney 231
General asserts that disclosure would harm national security. Cases filed in state court may be 232
removed to federal court.
P.L. 11-261 also preempts state regulatory authority over communication service providers with 233
respect to assistance provide intelligence agencies. Moreover, it directs the Attorney General to
report to the Judiciary and Intelligence Committees on implementation of the protective 234
provisions.
Books and Articles
Banisar & Davies, Global Trends in Privacy Protection: An International Survey of Privacy, Data
Protection, and Surveillance Laws and Developments, 18 JOHN MARSHALL JOURNAL OF
COMPUTER AND INFORMATION LAW 1 (1999)
228 50 U.S.C. 1885a(a). On January 17,2007, the Attorney General notified Congress that any subsequent electronic
surveillance conducted as part of the Terrorist Surveillance Program would conducted pursuant to FISA court approval,
S. Rept. 110-209, at 4 (2007).
229 50 U.S.C. 1885a(a)(4); 1885(6)(“(A) a telecommunications carrier, as that term is defined in section 3 of the
Communications Act of 1934 (47 U.S.C. 153); (B) a provider of electronic communication service, as that term is
defined in section 2510 of title 18, United States Code; (C) a provider of a remote computing service, as that term is
defined in section 2711 of title 18, United States Code; (D) any other communication service provider who has access
to wire or electronic communications either as such communications are transmitted or as such communications are
stored; (E) a parent, subsidiary, affiliate, successor, or assignee of an entity described in subparagraph (A), (B), (C), or
(D); or (F) an officer, employee, or agent of an entity described in subparagraph (A), (B), (C), (D), or (E)”).
230 50 U.S.C. 1885a(a)(1)-(3), (5); 1885(7).
231 50 U.S.C. 1885a(b), (c).
232 50 U.S.C. 1885a(g).
233 50 U.S.C. 1885b.
234 50 U.S.C. 1885c.
Brownell, The Public Security and Wire Tapping, 39 CORNELL LAW QUARTERLY 154 (1954)
Carr & Bellia, THE LAW OF ELECTRONIC SURVEILLANCE (2001)
Chemerinsky, Losing Liberties: Applying a Foreign Intelligence Model to Domestic Law
Enforcement, 51 UCLA LAW REVIEW 1619 (2004)
Chiarella & Newton, “So Judge, How Do I Get that FISA Warrant?”: The Policy and Procedure
for Conducting Electronic Surveillance, 1997 ARMY LAWYER 25 (Oct. 1997)
Cinquegrana, The Walls (and Wires) Have Ears: The Background and First Ten Years of the
Foreign Intelligence Surveillance Act of 1978, 137 UNIVERSITY OF PENNSYLVANIA LAW REVIEW
Cooper, The Electronic Communications Privacy Act: Does the Answer to the Internet
Information Privacy Problem Lie in a Fifteen-Year-Old Federal Statute? A Detailed Analysis, 20
JOHN MARSHALL JOURNAL OF COMPUTER & INFORMATION LAW 1 (2001)
Dinger, Should Parents Be Allowed to Record a Child’s Telephone Conversations When They
Believe the Child Is in Danger?: A Examination of the Federal Wiretap Statute and the Doctrine
of Vicarious Consent in the Context of a Criminal Prosecution, 28 SEATTLE UNIVERSITY LAW
REVIEW 955 (2005)
Donnelly, Comments and Caveats on the Wiretapping Controversy, 63 YALE LAW JOURNAL 799
(1954)
Fishman, Technologically Enhanced Visual Surveillance the Fourth Amendment: Sophistication,
Availability and the Expectation of Privacy, 26 AMERICAN CRIMINAL LAW REVIEW 315 (1989)
Fishman & McKenna, WIRETAPPING AND EAVESDROPPING (2d ed.1995) & (Mar. 2005)
Freiwald, Online Surveillance: Remembering the Lessons of the Wiretap Act, 56 ALABAMA LAW
REVIEW 9 (2004)
Froomkin, The Metaphor Is the Key: Cryptography, the Clipper Chip, and the Constitution, 143
UNIVERSITY OF PENNSYLVANIA LAW REVIEW 709 (1995)
Garrie, Armstrong & Harris, Voice Over Internet Protocol and the Wiretap Act: Is Your
Conversation Protected?, 29 SEATTLE UNIVERSITY LAW REVIEW 97 (2005)
Gilbreath & Cukjati, Tape Recording of Conversations: Ethics, Legality and Admissibility, 59
TEXAS BAR JOURNAL 951 (1996)
Goldsmith & Balmforth, The Electronic Surveillance of Privileged Communications: A Conflict
of Doctrines, 64 SOUTH CALIFORNIA LAW REVIEW 903 (1991)
Kash, Prewarrant Thermal Imaging as a Fourth Amendment Violation: A Supreme Court
Question in the Making, 60 ALBANY LAW REVIEW 1295 (1997)
Kesan, Cyber-Working or Cyber-Shirking?: A First Principles Examination of Electronic Privacy
in the Workplace, 54 FLORIDA LAW REVIEW 289 (2002)
Kastenmeier, Leavy & Beier, Communications Privacy: A Legislative Perspective, 1989
WISCONSIN LAW REVIEW 715
Lieb, E-Mail and the Wiretap Laws: Why Congress Should Add Electronic Communications to
Title III’s Statutory Exclusionary Rule and Expressly Rejected a “Good Faith” Exception, 34
HARVARD JOURNAL OF LEGISLATION 393 (1997)
Maher, Tale of the Tape: Lawyers Recording Conversations, 15 PROFESSIONAL LAWYER 10
(2004)
McCarthy, Don’t Fear Carnivore: It Won’t Devour Individual Privacy, 66 MISSOURI LAW
REVIEW 827 (2001)
Meason, The Foreign Intelligence Surveillance Act: Time for Reappraisal, 24 INTERNATIONAL
LAWYER 1043 (1990)
National Commission for the Study of Federal and State Laws Relating to Wiretapping and
Electronic Surveillance, FINAL REPORT (1976)
Rosenstein, The Electronic Communications Privacy Act of 1986 and Satellite Descramblers:
Toward Preventing Statutory Obsolescence, 76 MINNESOTA LAW REVIEW 1451 (1992)
Seamon & Gardner, The Patriot Act and the Wall Between Foreign Intelligence and Law
Enforcement, 28 HARVARD JOURNAL OF LAW & PUBLIC POLICY 319 (2005)
Simons, From Katz to Kyllo: A Blueprint for Adapting the Fourth Amendment to Twenty-First
Century Technologies, 53 HASTINGS LAW JOURNAL 1303 (2002)
Symposium, The Future of Internet Surveillance Law: A Symposium to Discuss Internet
Surveillance, Privacy & the USA PATRIOT Act, 72 GEORGE WASHINGTON LAW REVIEW 1139
(2004)
- Kerr, Foreword: The Future of Internet Surveillance Law, 72 GEORGE WASHINGTON LAW
REVIEW 1139 (2004)
- Howell, Seven Weeks: The Making of the USA PATRIOT Act, 72 GEORGE WASHINGTON LAW
REVIEW 1145 (2004)
- Kerr, A User’s Guide to the Stored Communications Act, and a Legislator’s Guide to Amending
It, 72 GEORGE WASHINGTON LAW REVIEW 1208 (2004)
- Schwartz, Evaluating Telecommunications Surveillance in Germany: The Lessons of the Max
Plank Institute’s Study, 72 GEORGE WASHINGTON LAW REVIEW 1244 (2004)
- Solove, Reconstructing Electronic Surveillance Law, 72 GEORGE WASHINGTON LAW REVIEW
- Swire, The System of Foreign Intelligence Surveillance Law, 72 GEORGE WASHINGTON LAW
REVIEW 1306 (2004)
- Bellia, Surveillance Law Through Cyberlaw’s Lens, 72 GEORGE WASHINGTON LAW REVIEW
-Dempsey & Flint, Commercial Data and National Security, 72 GEORGE WASHINGTON LAW
REVIEW 1459 (2004)
- Fishman, Technology and the Internet: The Impending Destruction of Privacy by Betrayers,
Grudgers, Snoops, Spammers, Corporations, and the Media, 72 GEORGE WASHINGTON LAW
REVIEW 1503 (2004)
- Mulligan, Reasonable Expectations in Electronic Communications; A Critical Perspective on
the Electronic Communications Privacy Act, 72 GEORGE WASHINGTON LAW REVIEW 1557
(2004)
- Ohm, Parallel-Effect Statutes and E-Mail “Warrants”: Reframing the Internet Surveillance
Debate, 72 GEORGE WASHINGTON LAW REVIEW 1559 (2004)
Symposium, Spyware: The Latest Cyber-Regulatory Challenge, 20 BERKELEY TECHNOLOGY
LAW JOURNAL 1269 (2005)
- Schwartz, Privacy Inalienability and the Regulation of Spyware, 20 BERKELEY TECHNOLOGY
LAW JOURNAL 1269 (2005)
- Bellia, Spyware and the Limits of Surveillance Law, 20 BERKELEY TECHNOLOGY LAW JOURNAL
-Winn, Contracting Spyware by Contract, 20 BERKELEY TECHNOLOGY LAW JOURNAL 1345
(2005)
- Crawford, First Do No Harm: The Problem of Spyware, 20 BERKELEY TECHNOLOGY LAW
JOURNAL 1433 (2005)
Spritzer, Electronic Surveillance by Leave of the Magistrate: The Case in Opposition, 118
UNIVERSITY OF PENNSYLVANIA LAW REVIEW 169 (1969)
Taylor, Issues Raised by the Application of the Pen Register Statutes to Authorize Government
Collection of Information on Packet-Switched Networks, 6 VIRGINIA JOURNAL OF LAW &
TECHNOLOGY 4 (2001)
Turkington, Protections for Invasions of Conversational and Communications Privacy by
Electronic Surveillance in Family, Marriage, and Domestic Disputes Under Federal and State
Wiretap and Store Communications Acts and the Common Law Privacy Intrusion Tort, 82
NEBRASKA LAW REVIEW 693 (2004)
Turley, The Not-So-Noble Lie: The Nonincorporation of State Consensual Surveillance Standards
in Federal Court, 79 JOURNAL OF CRIMINAL LAW & CRIMINOLOGY 66 (1988)
Whitehead & Aden, Forfeiting “Enduring Freedom” for “Homeland Security”: A Constitutional
Analysis of the USA PATRIOT Act and the Justice Department’s Anti-Terrorism Initiatives, 51
AMERICAN UNIVERSITY LAW REVIEW 1081 (2002)
Notes and Comments
Attorney Private Eyes: Ethical Implications of a Private Attorney’s Decision to Surreptitiously
Record Conversations, 2003 UNIVERSITY OF ILLINOIS LAW REVIEW 1605 (2003)
The Case for Magic Lantern: September 11 Highlights the Need for Increased Surveillance, 15
HARVARD JOURNAL OF LAW & TECHNOLOGY 521 (2002)
Electronic Surveillance in the Internet Age: The Strange Case of Pen Registers, 41 AMERICAN
CRIMINAL LAW REVIEW 1321 (2004)
The Fourth Amendment and the Wiretap Act Fail to Protect Against Random ISP Monitoring of
E-Mails for the Purpose of Assisting Law Enforcement, 22 JOHN MARSHALL JOURNAL OF
COMPUTER AND INFORMATION LAW 493 (2004)
Government Access to Transactional Information and the Lack of Subscriber Notice, 8 BOSTON
UNIVERSITY JOURNAL OF SCIENCE & TECHNOLOGY 648 (2002)
Hijacking Civil Liberties: The USA PATRIOT Act of 2001, 33 LOYOLA UNIVERSITY OF CHICAGO
LAW JOURNAL 933 (2002)
How the USA PATRIOT Act Will Permit Governmental Infringement Upon the Privacy of
Americans in the Name of “Intelligence” Investigations, 150 UNIVERSITY OF PENNSYLVANIA
LAW REVIEW 1651 (2002)
The “Magic Lantern” Revealed: A Report of the FBI’s New “Key Logging” Trojan and Analysis
of its Possible Treatment in a Dynamic Legal Landscape, 20 JOHN MARSHALL JOURNAL OF
COMPUTER AND INFORMATION LAW 287 (2002)
The Patriot Act’s Impact on the Government’s Ability to Conduct Electronic Surveillance on
Ongoing Domestic Communications, 52 DUKE LAW JOURNAL 179 (2002)
Privacy Versus Protection: Exploring the Boundaries of Electronic Surveillance in the Internet
Act, 29 FORDHAM URBAN LAW JOURNAL 2233 (2002)
A Puzzle Even the Codebreakers Have Trouble Solving: A Clash of Interests Over the Electronic
Encryption Standard, 27 LAW AND POLICY IN INTERNATIONAL BUSINESS 217 (1995)
Qualified Immunity as a Defense to Federal Wiretap Act Claims, 68 UNIVERSITY OF CHICAGO
LAW REVIEW 1369 (2001)
The Revamped FISA: Striking a Better Balance Between the Government’s Need to Protect Itself th
and the 4 Amendment, 58 VANDERBILT LAW REVIEW 1671 (2005)
Scowl Because You’re on Candid Camera: Privacy and Video Surveillance, 31 VALPARAISO
UNIVERSITY LAW REVIEW 1079 (1997)
Should “Clean Hands” Protect the Government Against §2515 Suppression Under Title III of the
Omnibus Crime Control and Safe Streets Act of 1968? 53 WASHINGTON & LEE LAW REVIEW
Tapping Into Family Affairs: Examining the Federal Wiretapping Statute as It Applies to the th
Home, Pollock v. Pollock, 154 F.3d 601 (6 Cir. 1998), 68 UNIVERSITY OF CINCINNATI LAW
REVIEW 995 (2000)
Thirty-Second Annual Review of Criminal Procedure: Electronic Surveillance, 91 GEORGETOWN
LAW JOURNAL 117 (2003)
You’ve Got Mail . . . And Your Boss Knows It: Rethinking the Scope of the E-Mail Monitoring
Exceptions to the Electronic Communications Privacy Act, 2001 UCLA JOURNAL OF LAW &
TECHNOLOGY 5
ALR Notes
Applicability, in Civil Action, of Provisions of Omnibus Crime Control and Safe Streets Act of
1968, Prohibiting Interception of Communications (18 USCS §2511(1)), to Interceptions by
Spouse, or Spouse’s Agent, of Conversations of Other Spouse, 139 ALR FED. 517
Application of Extension Telephones of Title III of the Omnibus Crime Control and Safe Streets
Act of 1968 (18 USCS §§2510 et seq.) Pertaining to Interceptions of Wire Communications, 58
ALR FED. 594
Constitutionality of Secret Video Surveillance, 91 ALR 5th 585
Construction and Application of 18 USCS 2511(1)(a) and (b), Providing Criminal Penalty for
Intercepting, Endeavoring to intercept, or Procuring Another to Intercept Wire, Oral or
Electronic Communication, 122 ALR FED. 597
Construction and Application of Provision of Omnibus Crime and Safe Streets Act of 1968 (18
U.S.C.A. §2520) Authorizing Civil Cause of Action by Person Whose Wire, Oral, or Electronic
Communication Is Intercepted, Disclosed, or Used in Violation of the Act, 164 ALR FED. 139
Construction and Application of State Statutes Authorizing Civil Cause of Action by Person
Whose Wire or Oral Communications Is Intercepted, Disclosed, or Used in Violation of Statutes, TH
33 ALR 4 506
Eavesdropping and Wiretapping, What Constitutes “Device Which Is Primarily Useful for the
Surreptitious Interception of Wire, Oral, or Electronic Communication,” Under 18 USCS
549
Eavesdropping on Extension Telephone as Invasion of Privacy, 49 ALR 4TH 430
Interception of Telecommunications by or With Consent of Party as Exception Under 18 USCS
§2511(2)(c) and (d), to Federal Proscription of Such Interceptions, 67 ALR FED. 429
Permissible Surveillance, Under State Communications Interception Statute, by Person Other TH
than State or Local Law Enforcement Officer or One Acting in Concert with Officer, 24 ALR 4
1208
Permissible Warrantless Surveillance, Under State Communications Interception Statute, by State TH
or Local Law Enforcement Officer or One Acting in Concert with Officer, 27 ALR 4 449
Propriety of Attorney’s Surreptitious Sound Recording of Statements by Others Who Are or May
Become Involved in Litigation 32 ALR 5H 715
Propriety of Monitoring of Telephone Calls to or From Prison Inmates Under Title III of Omnibus
Crime Control and Safe Streets Act (18 USCS §§2510 et seq.) Prohibiting Judicially
Unauthorized Interception of Wire or Oral Communications, 61 ALR FED. 825
Propriety of Governmental Eavesdropping on Communications Between Accused and His
Attorney, 189 ALD Fed. 419
Propriety, Under 18 USCS 2517(5), of Interception or Use of Communications Relating to
Federal Offenses Which Were Not Specified in Original wiretap Order, 103 ALR FED. 422
Qualified Immunity as Defense in Suit Under Federal Wiretap Act (18 U.S.C.A. §§2510 et seq.),
178 ALR FED 1
State Regulation of Radio Paging Services, 44 ALR 4TH 216
Validity, Construction, and Application of Foreign Intelligence Surveillance Act of 1978 (50
USCS §§1801 et seq.) Authorizing Electronic Surveillance of Foreign Powers and Their Agents,
86 ALR FED. 782
What Constitutes Adequate Response by the Government, Pursuant to 18 U.S.C. 3504, Affirming
or Denying Use of Unlawful Electronic Surveillance, 53 ALR Fed. 378
What Constitutes Compliance by Government Agents With Requirement of 18 U.S.C. 2518(5) that
Wire Tapping and Electronic Surveillance Be Conduct in Such Manner as to Minimize
Interception of Communications Not Otherwise Subject to Interception, 181 ALR Fed. 419
Who May Apply or Authorize Application for Order to Intercept Wire or Oral Communications
Under Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (18 U.S.C. 2510 et
seq.), 169 ALR Fed. 169
Alabama: Ala.Code §§13A-11-30 to 13A-11-37(w/o); New Jersey: N.J.Stat.Ann. §§ 2A:156A-2, 2A:156A-
Alaska: Alaska Stat. §§42.20.300 to 42.20.390 (w/o/e); 3(w/o/e);
Arizona: Ariz.Rev.Stat.Ann. §§13-3001 to 13-3009 New Mexico: N.M.Stat.Ann. §30-12-1(w);
(w/o/e); New York: N.Y.Penal Law §§ 250.00, 250.05(w/o/e);
Arkansas: Ark.Code §§5-60-120, 23-17-107(w/o/e); North Carolina: N.C.Gen.Stat. §§ 15A-286, 15A-
California: Cal.Penal Code §§631(w), 632(o), 632.7(e); 287(w/o/e);
Colorado: Colo.Rev.Stat. §§18-9-301 to 18-9-New Hampshire: N.H.Rev.Stat.Ann. §§ 570-A:1, 570-A:2
305(w/o/e); (w/o);
Connecticut: Conn.Gen.Stat.Ann. §§53a-187 to 53a-New Jersey: N.J.Stat.Ann. §§ 2A:156A-2, 2A:156A-
189, 54-41t (w/o); 3(w/o/e);
Delaware: Del.Code tit.11 §§ 2401, 2402(w/o/e); New Mexico: N.M.Stat.Ann. §30-12-1(w);
Florida: Fla.Stat.Ann. §§ 934.02, 934.03(w/o/e); New York: N.Y.Penal Law §§ 250.00, 250.05(w/o/e);
Georgia: Ga.Code §16-11-62 (w/o/e); North Carolina: N.C.Gen.Stat. §§ 15A-286, 15A-
Hawaii: Hawaii Rev.Stat. §§ 711-1111, 803-41, 803-287(w/o/e);
42(w/o/e); North Dakota: N.D.Cent.Code §§12.1-15-02, 12.1-15-04
Idaho: Idaho Code §§ 18-6701, 18-6702(w/o/e); (w/o);
Indiana: Ind.Code Ann. §§ 35-33.5-1-5, 35-33.5-5-Ohio: Ohio Rev.Code §§ 2933.51, 2933.52 (w/o/e);
5(w/e); Oklahoma: Okla.Stat.Ann. tit.13 §§ 176.2, 176.3 (w/o/e);
Iowa: Iowa Code Ann. §§272.8, 808B.2(w/o/e); Oregon: Ore.Rev.Stat. §§165.535 to 165.545 (w/o/e);
Kansas: Kan.Stat.Ann. §21-4001(w/o); 21-4002(w); Pennsylvania: Pa.Stat.Ann. tit.18 §§ 5702, 5703 (w/o/e);
Kentucky: Ky.Rev.Stat. §§526.010, 526.020(w/o); Rhode Island: R.I.Gen.Laws §§11-35-21(w/o/e);
Louisiana: La.Rev.Stat.Ann. §§ 15:1302, 15:1303 South Carolina: S.C. Code Ann. §§16-17-470, 17-30-10
(w/o/e); to 17-30-20 (w/o/e);
Maine: Me.Rev.Stat.Ann. tit. 15 §§ 709, 710(w/o);
Maryland: Md.Cts. & Jud.Pro.Code Ann. §§ 10-401, South Dakota: S.D.Cod.Laws §§ 23A-35A-1, 23A-35A-20
10-402(w/o/e); (w/o);
Massachusetts: Mass.Gen.Laws Ann. ch.272 §99 Tennessee: Tenn.Code Ann. §39-13-601(w/o/e);
(w/o); Texas: Tex.Penal Code. § 16.02; Tex. Crim. Pro. Code
Michigan: Mich.Comp.Laws Ann. §§750.539a, art. 18.20 (w/o/e);
750.539c(o); 750.540(w); Utah: Utah Code Ann. §§ 76-9-405, 77-23a-3, 77-23a-4
Minnesota: Minn.Stat.Ann. §§ 626A.01, 626A.02 (w/o/e);
(w/o/e);
Mississippi: Miss.Code §41-29-533(w/o/e) Virginia: Va.Code §§ 19.2-61, 19.2-62(w/o/e);
Missouri: Mo.Ann.Stat. §§ 542.400 to 542.402 (w/o); Washington: Wash.Rev.Code Ann.§9.73.030 (w/o);
Montana: Mont.Code Ann. §45-8-213(w/o/e); West Virginia: W.Va.Code §§ 62-1D-2, 62-1D-3(w/o/e);
Nebraska: Neb.Rev.Stat. §§ 86-271 to 86-290 (w/o/e); Wisconsin: Wis.Stat.Ann. §§ 968.27, 968.31(w/o/e);
Nevada: Nev.Rev.Stat. §§ 200.610, 200.620(w), Wyoming: Wyo.Stat. §§ 7-3-701, 7-3-702(w/o/e);
200.650(o); District of Columbia: D.C.Code §§ 23-541, 23-542(w/o).
New Hampshire: N.H.Rev.Stat.Ann. §§ 570-A:1, 570-
A:2 (w/o);
Alabama: Ala.Code §13A-11-30 (one party consent); Montana: Mont.Code Ann. §§45-8-213 (all
Alaska: Alaska Stat. §§42.20.310, 42.20.330 (one party consent); party consent with an exception for the
Arizona: Ariz.Rev.Stat.Ann. §13-3005 (one party consent); performance of official duties);
Arkansas: Ark.Code §5-60-120 (one party consent); Nebraska: Neb.Rev.Stat. § 86-290 (one party
California: Cal. Penal Code §§ 631, 632 (one party consent for consent);
police; all party consent otherwise), 632.7 (all party consent); Nevada: Nev.Rev.Stat. §§200.620, 200.650 (one
party consent);
New Hampshire: N.H.Rev.Stat.Ann. §570-A:2
(all party consent);
New Jersey: N.J.Stat.Ann. §§2A:156A-4 (one
party consent);
Colorado: Colo.Rev.Stat. §§18-9-303, 18-9-304 (one party New Mexico: N.M.Stat.Ann. §§30-12-1 (one
consent); party consent);
Connecticut: Conn.Gen.Stat.Ann. §§53a-187, 53a-188 (criminal New York: N.Y.Penal Law §250.00 (one party
proscription: one party consent); §52-570d (civil liability: all party consent);
consent except for police); North Carolina: N.C.Gen.Stat. §15A-287 (one
Delaware: Del.Code tit.11 §2402 (one party consent); party consent);
Florida: Fla.Stat.Ann. §934.03 (one party consent for the police; North Dakota: N.D.Cent.Code §§12.1-15-02
all party consent for others); (one party consent);
Ohio: Ohio Rev.Code §2933.52 (one party
consent);
Georgia: Ga.Code §16-11-66 (one party consent); Oklahoma: Okla.Stat.Ann. tit.13 §176.4 (one
Hawaii: Hawaii Rev.Stat. §§ 711-1111, 803-42 (one party party consent);
consent); Oregon: Ore.Rev.Stat. §165.540 (one party
Idaho: Idaho Code §18-6702 (one party consent); consent for wiretapping and all parties must
Illinois: Ill.Comp.Stat.Ann. ch.720 §§5/14-2, 5/14-3 (all party consent for other forms of electronic
consent with law enforcement exceptions); eavesdropping);
Indiana: Ind.Code Ann. §35-33.5-1-5 (one party consent ); Pennsylvania: Pa.Stat.Ann. tit.18 §5704 (one
Iowa: Iowa Code Ann. §808B.2 (one party consent); party consent for the police; all parties consent
otherwise);
Rhode Island: R.I.Gen.Laws §§11-35-21 (one
party consent);
Kansas: Kan.Stat.Ann. §§21-4001, 21-4002 (one party consent); South Carolina: S.C. Code Ann. § 17-30-30
Kentucky: Ky.Rev.Stat. §526.010 (one party consent); (one party consent);
Louisiana: La.Rev.Stat.Ann. §15:1303 (one party consent); South Dakota: S.D.Comp.Laws §§23A-35A-20
Maine: Me.Rev.Stat.Ann. tit. 15 §709 (one party consent); (one party consent);
Maryland: Md.Cts. & Jud.Pro.Code Ann. §10-402 (all party Tennessee: Tenn.Code Ann. §39-13-601 (one
consent); party consent)
Massachusetts: Mass.Gen.Laws Ann. ch.272 §99 (all parties Texas: Tex.Penal Code §16.02 (one party
must consent, except in some law enforcement cases); consent);
Utah: Utah Code Ann. §§77-23a-4 (one party
consent);
Virginia: Va.Code §19.2-62 (one party consent);
Michigan: Mich.Comp.Laws Ann. §750.539c (proscription Washington: Wash.Rev.Code Ann. §9.73.030
regarding eavesdropping on oral conversation: all party consent, (all parties must consent, except that one party
except that the proscription does not apply to otherwise lawful consent is sufficient in certain law enforcement
activities of police officers); cases);
Minnesota: Minn.Stat.Ann. §626A.02 (one party consent); West Virginia: W.Va.Code §62-1D-3 (one
Mississippi: Miss.Code §41-29-531 (one party consent); party consent);
Missouri: Mo.Ann.Stat. §542.402 (one party consent); Wisconsin: Wis.Stat.Ann. §968.31 (one party
consent);
Wyoming: Wyo.Stat. §7-3-702 (one party
consent);
District of Columbia: D.C.Code §23-542 (one
party consent).
Arizona: Ariz.Rev.Stat.Ann. §12-731; Nevada: Nev.Rev.Stat. §200.690;
California: Cal. Penal Code §§ 637.2; New Hampshire: N.H.Rev.Stat.Ann. §570-A:11;
Colorado: Colo.Rev.Stat. §18-9-309.5; New Jersey: N.J.Stat.Ann. §§2A:156A-24;
Connecticut: Conn.Gen.Stat.Ann. §§54-41r, 52-570d; New Mexico: N.M.Stat.Ann. §§30-12-11;
Delaware: Del.Code tit.11 §2409; North Carolina: N.C.Gen.Stat. §15A-296;
Florida: Fla.Stat.Ann. §§934.10, 934.27; Ohio: Ohio Rev.Code §2933.65;
Hawaii: Hawaii Rev.Stat. §803-48; Oregon: Ore.Rev.Stat. §133.739;
Idaho: Idaho Code §18-6709; Pennsylvania: Pa.Stat.Ann. tit.18 §§5725, 5747;
Illinois: Ill.Comp.Stat.Ann. ch.720 §5/14-6; Rhode Island: R.I.Gen.Laws §12-5.1-13;
Indiana: Ind.Code Ann. §35-33.5-5-4; South Carolina: S.C. Code Ann. § 17-30-135;
Iowa: Iowa Code Ann. §808B.8; Tennessee: Tenn.Code Ann. §39-13-603;
Kansas: Kan.Stat.Ann. §22-2518 Texas: Tex.Code Crim.Pro. art. 18.20;
Louisiana: La.Rev.Stat.Ann. §15:1312; Utah: Utah Code Ann. §§77-23a-11; 77-23b-8;
Maine: Me.Rev.Stat.Ann. ch.15 §711; Virginia: Va.Code §19.2-69;
Maryland: Md.Cts. & Jud.Pro.Code Ann. §§10-410, 10-4A-08; Washington: Wash.Rev.Code Ann. §9.73.060;
Massachusetts: Mass.Gen.Laws Ann. ch.272 §99; West Virginia: W.Va.Code §62-1D-12;
Michigan: Mich.Comp.Laws Ann. §750.539h; Wisconsin: Wis.Stat.Ann. §968.31;
Mississippi: Miss. Code § 41-29-529; Wyoming: Wyo.Stat. §7-3-710;
Minnesota: Minn.Stat.Ann. §§626A.02, 626A.13; District of Columbia: D.C.Code §23-554.
Nebraska: Neb.Rev.Stat. § 86-297;
Alaska: Alaska Stats. §§12.37.010 to 12.37.900; North Carolina: N.C.Gen.Stat. §§15A-286 to 15A-298;
Arizona: Ariz.Rev.Stat.Ann. §§13-3010 to 13-3019; North Dakota: N.D.Cent.Code §§29-29.2-01 to 29-
California: Cal.Penal Code §629.50 to 629.98; 29.2-05;
Colorado: Colo.Rev.Stat. §§16-15-101 to 16-15-104; Ohio: Ohio Rev.Code §§2933.51 to 2933.66;
Connecticut: Conn.Gen.Stat.Ann. §§54-41a to 54-41u; Oklahoma: Okla.Stat.Ann. tit.13 §§176.1 to 176.14
Oregon: Ore.Rev.Stat. §§133.721 to 133.739;
Delaware: Del.Code tit.11 §§2401 to 2412; Pennsylvania: Pa.Stat.Ann. tit.18 §§5701 to 5728
Florida: Fla.Stat.Ann. §§934.02 to 934.43; Rhode Island: R.I.Gen.Laws §§12-5.1-1 to 12-5.1-16;
Georgia: Ga.Code §16-11-64 to 16-11-69; South Carolina: S.C. Code Ann. §§ 17-30-10 to 17-30-
Hawaii: Hawaii Rev.Stat. §§803-41 to 803-49; 145;
Idaho: Idaho Code §§18-6701 to 18-6709; 6719 to 6725;
Illinois: Ill.Stat.Ann. ch.725 §§5/108A-1 to 108B-14; South Dakota: S.D.Cod.Laws §§23A-35A-1 to 23A-
Indiana:Ind.Code §§35-33.5-1-1 to 35-33.5-5-6; 35A-34;
Iowa: Iowa Code Ann. §§808B.3 to 808B.7; Tennessee: Tenn.Code Ann. §§40-6-301 to 40-6-311;
Kansas: Kan.Stat.Ann. §§ 22-2514 to 22-2519; Texas: Tex.Crim.Pro. Code. art. 18.20;
Louisiana: La.Rev.Stat.Ann. §§15:1301 to 15:1316; Utah: Utah Code Ann. §§77-23a-1 to 77-23a-16;
Maryland: Md.Cts. & Jud.Pro.Code Ann. §§10-401 to 10-Virginia: Va.Code §§19.2-61 to 19.2-70.3;
410;
Massachusetts: Mass.Gen.Laws Ann. ch.272 §99; Washington: Wash.Rev.Code Ann. §§9.73.040 to
Minnesota: Minn.Stat.Ann. §§626A.01 to 626.41; 9.73.250;
Mississippi: Miss.Code §§41-29-501 to 41-29-537; West Virginia: W.Va.Code §§62-1D-1 to 62-1D-16;
Missouri: Mo.Ann.Stat. §§542.400 to 542.422; Wisconsin: Wis.Stat.Ann. §§968.27 to 968.33;
Nebraska: Neb.Rev.Stat. §§ 86-271 to 86-2,115; Wyoming: Wyo.Stat. §§7-3-701 to 7-3-712;
District of Columbia: D.C.Code §§23-541 to 23-556.
Nevada: Nev.Rev.Stat. §§179.410 to 179.515;
New Hampshire: N.H.Rev.Stat.Ann. §§570-A:1 to 570-
A:9;
New Jersey: N.J.Stat.Ann. §§2A:156A-8 to 2A:156A-26;
New Mexico: N.M.Stat.Ann. §§30-12-1 to 30-12-11;
New York: N.Y.Crim.Pro. Law §§700.05 to 700.70;
Alaska: Alaska Stats. §§12.37.200 (PR&T), 12.37.300(SE); New Jersey; N.J.Stat.Ann. §§2A:156A-27 to
Arizona: Ariz.Rev.Stat.Ann. §§13-3016 (SE); 13-3005, 13-2A:156A-34 (SE);
3017 (PR&T); New York: N.Y.Crim.Pro.Law §§705.00 to 705.35
Arkansas: Ark. Code Ann. § 5-60-120(g) (PR&T); (PR&T);
Colorado: Colo. Rev. Stat. § 18-9-305 (PR&T); North Carolina: N.C.Gen.Stat. §§15A-260 to 15A-
Delaware: Del.Code tit.11 §§ 2401; 2421 to 2427 (SE); 2430 264 (PR&T);
to 2434 (PR&T); North Dakota: N.D.Cent.Code §§29-29.3-01 to
29-29.3-05 (PR&T);
Florida: Fla.Stat.Ann. §§934.02; 934.21 to 934.28 (SE); Ohio: Ohio Rev.Code §2933.76 (PR&T);
934.32 to 934.34(PR&T); Oklahoma: Okla.Stat.Ann. tit.13 §177.1 to 177.5
Georgia: Ga.Code Ann. §§16-11-60 to 16-11-64.2 (PR &T); (PR&T);
§ 16-9-109 (SE); Oregon: Ore.Rev.Stat. §§165.657 to 165.673
Hawaii: Hawaii Rev.Stat. §§803-41; 803-44.5, 803-44.6 (PR&T);
(PR&T), 803-47.5 to 803.47.9 (SE); Pennsylvania: Pa.Stat.Ann. tit.18 §§5741 to 5749
Idaho: Idaho Code §§18-6719 to 18-6725 (PR&T); (SE), 5771 to 5775 (PR&T);
Iowa: Iowa Code Ann. §§808B.1, 808B.10 to 808B.14 Rhode Island; R.I.Gen.Laws §§12-5.2-1 to 12-5.2-5
(PR&T); (PR&T);
Kansas: Kan.Stat.Ann. §§22-2525 to 22-2529 (PR&T); South Carolina: S.C.Code §§17-29-10 to 17-29-50,
Louisiana: La.Rev.Stat.Ann. §§15:1302, 15:1313 to 15:1316 17-30-45 to 17-30-50 (PR&T);
(PR&T); South Dakota: S.D.Cod.Laws §§23A-35A-22 to
Maryland: Md.Cts. & Jud.Pro.Code Ann. §§10-4A-01 to 10-23A-35A-34 (PR&T);
4A-08 (SE), 10-4B-01 to 10-4B-05 (PR&T); Tennessee: Tenn.Code Ann. §40-6-311 (PR&T);
Minnesota: Minn.Stat.Ann. §§626A.01; 626A.26 to 626A.34; Texas: Tex.Code Crim.Pro. art. 18.20, 18.21; Tex.
(SE), 626A.35 to 636A.391 (PR&T); Penal Code §§ 16.03, 16.04 (SE, PR&T);
Mississippi: Miss.Code §41-29-701(PR&T); Utah: Utah Code Ann. §§77-23a-13 to 77-23a-15
(PR&T); 77-23b-1 to 77-23b-9(SE);
Missouri: Mo.Ann.Stat. §542.408 (PR); Virginia: Va.Code §§19.2-70.1, 19.2-70.2 (PR&T),
Montana: Mont.Code Ann. §§46-4-401 to 46-4-405 (PR&T); 19.2-70.3 (SE);
Nebraska: Neb.Rev.Stat. §§ 86-279, 86-2,104 to 86-2,110 Washington: Wash.Rev.Code Ann. §9.73.260
(SE); 86-284, 86-287, 86-298 to 86-2,101 (PR&T); (PR&T);
Nevada: Nev.Rev.Stat. §§179.530 (PR&T), 205.492 to West Virginia: W.Va.Code §§62-1D-2, 62-1D-10
205.513(SE); (PR&T);
New Hampshire: N.H.Rev.Stat.Ann. §§570-B:1 to 570-B:7 Wisconsin: Wis.Stat.Ann. §968.30 to 968.37
(PR&T); (PR&T);
Wyoming: Wyo.Stat. §§7-3-801 to 7-3-806 (PR&T).
Alabama: Ala.Code §§13A-8-100 to 13A-8-103; Nevada: Nev.Rev.Stat. §§205.473 to 205.492; 205.509 to
Alaska: Alaska Stat. §11.46.740; 205.513;
Arizona: Ariz.Rev.Stat.Ann. §§13-2316 to 13-New Hampshire: N.H.Rev.Stat.Ann. §638:16 to 638:19;
2316.02; New Jersey: N.J.Stat.Ann. §§2C:20-2, 2C:20-23 to 2C:20-34;
Arkansas: Ark.Code §§5-41-101 to 5-41-206;
California: Cal.Penal Code §502;
Colorado: Colo.Rev.Stat. §§18-5.5-101, 18-5.5-New Mexico: N.M.Stat.Ann. §§30-45-1 to 30-45-7;
102; New York: N.Y.Penal Law §§156.00 to 156.50;
Connecticut: Conn.Gen.Stat.Ann. §§53a-250 to North Carolina: N.C.Gen.Stat. §§14-453 to 14-458;
53a-261; North Dakota: N.D.Cent.Code §12.1-06.1-08;
Delaware: Del.Code tit.11 §§931 to 941; Ohio: Ohio Rev.Code §§2909.01, 2909.07, 2913.01 to 2913.04,
Florida: Fla.Stat.Ann. §§815.01 to 815.07; 2913.421;
Georgia: Ga.Code §§16-9-92 to 16-9-94;
Hawaii: Hawaii Rev.Stat. §708-890 to 708-895.7; Oklahoma: Okla.Stat.Ann. tit.21 §§1951 to 1959;
Idaho: Idaho Code §§18-2201, 18-2202; Oregon: Ore.Rev.Stat. §164.377;
Illinois: Ill.Stat.Ann. ch.720 §§5/16D-1 to 5/16D-7; Pennsylvania: Pa.Stat.Ann. tit.18 §7611;
Indiana: Ind.Code §§35-43-1-4 to 35-43-2-3; Rhode Island: R.I.Gen.Laws §§11-52-1 to 11-52-8;
Iowa: Iowa Code Ann. §716.6B; South Carolina: S.C.Code §§16-16-10 to 16-16-40, 26-6-210;
Kansas: Kan.Stat.Ann. §21-3755; South Dakota: S.D.Cod.Laws §§43-43B-1 to 43-43B-8;
Kentucky: Ky.Rev.Stat. §§434.840 to 434.860; Tennessee: Tenn.Code Ann. §§39-14-601 to 39-14-605;
Louisiana: La.Rev.Stat.Ann. §§14:73.1 to 14:73.7; Texas: Tex.Penal Code. §§33.01 to 33.05;
Maine: Me.Rev.Stat.Ann. tit. 17-A §§431 to 433; Utah: Utah Code Ann. §§76-6-702 to 76-6-705;
Maryland: Md.Code Ann., Crim. Law. §7-302;
Massachusetts: Mass.Gen.Laws Ann. ch.266
§120F;
Michigan: Mich.Comp.Laws Ann. §§752.791 to Vermont: Vt. Stat. Ann. tit. 13, §§ 4101 to 4107;
752.797; Virginia: Va.Code §§18.2-152.1 to 18.2-152.15, 19.2-249.2;
Minnesota: Minn.Stat.Ann. §§609.87 to 609.893; Washington: Wash.Rev.Code Ann. §§9A.52.110 to 9A.52.130;
Mississippi: Miss.Code §§97-45-1 to 97-45-29; West Virginia: W.Va.Code §§61-3C-1 to 61-3C-21;
Missouri: Mo.Ann.Stat. §§569.095 to 569.099; Wisconsin: Wis.Stat.Ann. §943.70;
Montana: Mont.Code Ann. §§45-6-310, 45-6-311; Wyoming: Wyo.Stat. §§6-3-501 to 6-3-505.
Nebraska: Neb.Rev.Stat. §§28-1341 to 28-1348;
Alaska: Alaska Stat. §§ 45.45.471 to 45.45.798;
Arizona: Ariz. Rev. Stat. Ann. §§ 44-7301 to 44-7304;
Arkansas: Ark. Code §§ 4-110-101 to 4-110-105;
California: Cal. Bus. & Prof. Code §§ 22947 to 22947.6;
Georgia: Ga. Code Ann. §§ 16-9-150 to 16-9-157;
Indiana: Ind. Code Ann. §§ 24-4.8-1-1 to 24-4.8-3-2;
Iowa: Iowa Code Ann. §§ 714F.1 to 714F.8;
Louisiana: La. Rev. Stat. Ann. §§ 51:2006 to 51:2014;
Nevada: Nev. Rev. Stat. Ann. §205.4737;
New Hampshire: N.H. Rev. Stat. Ann. §§ 359-H:1 to 359-H:6;
Texas: Tex. Bus. & Com. Code Ann. §§ 48.001 to 48.102;
Utah: Utah Code Ann. §§ 13-40-101 to 13-40-401;
Washington: Wash. Rev. Code Ann. §§19.270.010 to 19.270.900.
235 Depending upon the definition used, spyware has been outlawed under a host of federal and state laws; this
appendix is limited to those state statutes that address “spyware” as such. For a general discussion of activities at the
federal level see CRS Report RL32706, Spyware: Background and Policy Issues for Congress.
Electronic Communications Privacy Act (ECPA).
As used in this chapter--
(1) “wire communication” means any aural transfer made in whole or in part through the use of
facilities for the transmission of communications by the aid of wire, cable, or other like
connection between the point of origin and the point of reception (including the use of such
connection in a switching station) furnished or operated by any person engaged in providing or
operating such facilities for the transmission of interstate or foreign communications or
communications affecting interstate or foreign commerce;
(2) “oral communication” means any oral communication uttered by a person exhibiting an
expectation that such communication is not subject to interception under circumstances justifying
such expectation, but such term does not include any electronic communication;
(3) “State” means any State of the United States, the District of Columbia, the Commonwealth of
Puerto Rico, and any territory or possession of the United States;
(4) “intercept” means the aural or other acquisition of the contents of any wire, electronic, or oral
communication through the use of any electronic, mechanical, or other device;
(5) “electronic, mechanical, or other device” means any device or apparatus which can be used to
intercept a wire, oral, or electronic communication other than--
(a) any telephone or telegraph instrument, equipment or facility, or any component thereof, (i)
furnished to the subscriber or user by a provider of wire or electronic communication service in
the ordinary course of its business and being used by the subscriber or user in the ordinary course
of its business or furnished by such subscriber or user for connection to the facilities of such
service and used in the ordinary course of its business; or (ii) being used by a provider of wire or
electronic communication service in the ordinary course of its business, or by an investigative or
law enforcement officer in the ordinary course of his duties;
(b) a hearing aid or similar device being used to correct subnormal hearing to not better than
normal;
(6) “person” means any employee, or agent of the United States or any State or political
subdivision thereof, and any individual, partnership, association, joint stock company, trust, or
corporation;
(7) “Investigative or law enforcement officer” means any officer of the United States or of a State
or political subdivision thereof, who is empowered by law to conduct investigations of or to make
arrests for offenses enumerated in this chapter, and any attorney authorized by law to prosecute or
participate in the prosecution of such offenses;
(8) “contents”, when used with respect to any wire, oral, or electronic communication, includes
any information concerning the substance, purport, or meaning of that communication;
(9) “Judge of competent jurisdiction” means--
(a) a judge of a United States district court or a United States court of appeals; and
(b) a judge of any court of general criminal jurisdiction of a State who is authorized by a statute
of that State to enter orders authorizing interceptions of wire, oral, or electronic communications;
(10) “communication common carrier” has the meaning given the term in section 3 of the
Communications Act of 1934;
(11) “aggrieved person” means a person who was a party to any intercepted wire, oral, or
electronic communication or a person against whom the interception was directed;
(12) “electronic communication” means any transfer of signs, signals, writing, images,
sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio,
electromagnetic, photoelectronic or photooptical system that affects interstate or foreign
commerce, but does not include--
(A) any wire or oral communication;
(B) any communication made through a tone-only paging device;
(C) any communication from a tracking device (as defined in section 3117 of this title); or
(D) electronic funds transfer information stored by a financial institution in a communications
system used for the electronic storage and transfer of funds;
(13) “user” means any person or entity who--
(A) uses an electronic communication service; and
(B) is duly authorized by the provider of such service to engage in such use;
(14) “electronic communications system” means any wire, radio, electromagnetic,
photooptical or photoelectronic facilities for the transmission of wire or electronic
communications, and any computer facilities or related electronic equipment for the electronic
storage of such communications;
(15) “electronic communication service” means any service which provides to users thereof
the ability to send or receive wire or electronic communications;
(16) “readily accessible to the general public” means, with respect to a radio communication,
that such communication is not--
(A) scrambled or encrypted;
(B) transmitted using modulation techniques whose essential parameters have been withheld from
the public with the intention of preserving the privacy of such communication;
(C) carried on a subcarrier or other signal subsidiary to a radio transmission;
(D) transmitted over a communication system provided by a common carrier, unless the
communication is a tone only paging system communication; or
(E) transmitted on frequencies allocated under part 25, subpart D, E, or F of part 74, or part 94 of
the Rules of the Federal Communications Commission, unless, in the case of a communication
transmitted on a frequency allocated under part 74 that is not exclusively allocated to broadcast
auxiliary services, the communication is a two-way voice communication by radio;
(17) “electronic storage” means--
(A) any temporary, intermediate storage of a wire or electronic communication incidental to the
electronic transmission thereof; and
(B) any storage of such communication by an electronic communication service for purposes of
backup protection of such communication; and
(18) “aural transfer” means a transfer containing the human voice at any point between and
including the point of origin and the point of reception.
(19) “foreign intelligence information”, for purposes of section 2517(6) of this title, means –
(A) information, whether or not concerning a United States person, that relates to the ability of
the United States to protect against –
(i) actual or potential attack or other grave hostile acts of a foreign power or an agent of a
foreign power;
(ii) sabotage or intentional terrorism by a foreign power or an agent of a foreign power; or
(iii)_ clandestine intelligence activities by and intelligence service or network of a foreign power
or by an agent of a foreign power; or
(B) information, whether or not concerning a United States person, with respect to a foreign
power or foreign territory that relates to –
(i) the national defense or the security of the United States; or
(ii) the conduct of the foreign affairs of the United States.
(20) “protected computer” has the meaning set forth in section 1030; and
(21) “computer trespasser” –
(A) means a person who accesses a protected computer without authorization and thus has no
reasonable expectation of privacy in any communication transmitted to, through, or from the
protected computer; and
(B) does not include a person known by the owner or operator of the protected computer to have
an existing contractual relationship with the owner or operator of the protected computer for
access to all or part of the protected computer.
18 U.S.C. 2511. Interception and disclosure of wire, oral, or electronic
communications prohibited.
(1) Except as otherwise specifically provided in this chapter any person who--
(a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or
endeavor to intercept, any wire, oral, or electronic communication;
(b) intentionally uses, endeavors to use, or procures any other person to use or endeavor to use
any electronic, mechanical, or other device to intercept any oral communication when--
(i) such device is affixed to, or otherwise transmits a signal through, a wire, cable, or other like
connection used in wire communication; or
(ii) such device transmits communications by radio, or interferes with the transmission of such
communication; or
(iii) such person knows, or has reason to know, that such device or any component thereof has
been sent through the mail or transported in interstate or foreign commerce; or
(iv) such use or endeavor to use (A) takes place on the premises of any business or other
commercial establishment the operations of which affect interstate or foreign commerce; or (B)
obtains or is for the purpose of obtaining information relating to the operations of any business or
other commercial establishment the operations of which affect interstate or foreign commerce; or
(v) such person acts in the District of Columbia, the Commonwealth of Puerto Rico, or any
territory or possession of the United States;
(c) intentionally discloses, or endeavors to disclose, to any other person the contents of any wire,
oral, or electronic communication, knowing or having reason to know that the information was
obtained through the interception of a wire, oral, or electronic communication in violation of this
subsection;
(d) intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic
communication, knowing or having reason to know that the information was obtained through the
interception of a wire, oral, or electronic communication in violation of this subsection; or
(e) (i) intentionally discloses, or endeavors to disclose, to any other person the contents of any
wire, oral, or electronic communication, intercepted by means authorized by sections
2511(2)(a)(ii), 2511(2)(b)-(c), 2511(2)(e), 2516, and 2518 of this chapter, (ii) knowing or having
reason to know that the information was obtained through the interception of such a
communication in connection with a criminal investigation, (iii) having obtained or received the
information in connection with a criminal investigation, and (iv) with intent to improperly
obstruct, impede, or interfere with a duly authorized criminal investigation,
shall be punished as provided in subsection (4) or shall be subject to suit as provided in
subsection (5).
(2)(a)(i) It shall not be unlawful under this chapter for an operator of a switchboard, or an officer,
employee, or agent of a provider of wire or electronic communication service, whose facilities are
used in the transmission of a wire or electronic communication, to intercept, disclose, or use that
communication in the normal course of his employment while engaged in any activity which is a
necessary incident to the rendition of his service or to the protection of the rights or property of
the provider of that service, except that a provider of wire communication service to the public
shall not utilize service observing or random monitoring except for mechanical or service quality
control checks.
(ii) Notwithstanding any other law, providers of wire or electronic communication service, their
officers, employees, and agents, landlords, custodians, or other persons, are authorized to provide
information, facilities, or technical assistance to persons authorized by law to intercept wire, oral,
or electronic communications or to conduct electronic surveillance, as defined in section 101 of
the Foreign Intelligence Surveillance Act of 1978, if such provider, its officers, employees, or
agents, landlord, custodian, or other specified person, has been provided with--
[Sec. 101(c)(1)] (A) a court order directing such assistance or a court order pursuant to section
[Sec.403(b)(2)(C)] Effective December 31, 2012 . . . (C) except as provided in section 404,
section 2511(2)(A)(ii)(A) of title 128, United States Code, is amended by striking “or a court
order pursuant to