PAGE 1 Electronic Surveillance and Civil Liberties October 1985 NTIS order #PB86-123239 PAGE 2 Recommended Citation: Federal Government Information Technology: Electronic Surveillance and Civil Liberties (Washington, DC: U.S. Congress, Office of Technology Assessment, OTACIT-293, October 1985). Library of Congress Catalog Card Number 85-600609 For sale by the Superintendent of Documents U.S. Government Printing Office, Washington, DC 20402 PAGE 3 Foreword Public policy on the use of information technology to electronically monitor individual movements, actions, and communications has been based on a careful balancing of the civil liberty versus law enforcement or investigative interests. New technologiessuch as data transmission, electronic mail, cellular and cordless telephones, and miniature cameras-have outstripped the existing statutory framework for balancing these interests. The primary technical focus of this report is on technological developments in the basic communication and information infrastructure of the United States that present new or changed opportunities for and vulnerabilities to electronic surveillance, not on the details of specific surveillance devices. The primary policy focus is on domestic law enforcement and investigative applications, not on foreign intelligence and counterintelligence applications. Thus, this report addresses four major areas: 1) technological developments relevant to electronic surveillance; 2) current and prospective Federal agency use of surveillance technologies; 3) the interaction of technology and public law in the area of electronic surveillance, with special attention to the balancing of civil liberty and investigative interests; and 4) policy options that warrant congressional consideration, including the amendment of existing public law to eliminate gaps and ambiguities in current legal protections. Conducted at the request of the House Committee on the Judiciary, Subcommittee on Courts, Civil Liberties, and the Administration of Justice, and the Senate Committee on Governmental Affairs, this report is one component of the OTA assessment of Federal Government Information Technology: Congressional Oversight and Civil Liberties. Other topics covered in the assessment include: information technology management, planning, procurement, and security; computer crime; computer matching and privacy; electronic dissemination of Government information; and computer-based decision support, modeling, and Government foresight. These will be published under separate cover. In preparing this report on electronic surveillance, OTA has drawn on working papers developed by OTA staff and contractors, the comments of participants at an OTA workshop on this topic, and the results of an OTA Federal Agency Data Request that was completed by over 140 agency components. The draft of this report was reviewed by the OTA project advisory panel, officials from the U.S. Department of Justice, and a broad spectrum of interested individuals from the governmental, academic, private industry, and civil liberty communities. OTA appreciates the participation of the advisory panelists, workshop participants, external reviewers, Federal agency officials, and others who helped bring this report to fruition. The report itself, however, is solely the responsibility of OTA, not of those who so ably advised and assisted us in its preparation. Director PAGE 4 Electronic Surveillance and Civil Liberties Advisory Panel Theodore J. Lowi, Chairman Professor of Political Science, Cornell University Arthur G. Anderson IBM Corp. (Ret.) Jerry J. Berman Legislative Counsel American Civil Liberties Union R. H. Bogumil Past President IEEE Society on Social Implications of Technology James W. Carey Dean, College of Communications University of Illinois Melvin Day Vice President Research Publications Joseph W. Duncan Corporate Economist The Dun & Bradstreet Corp. William H. Dutton Associate Professor of Communications and Public Administration Annenberg School of Communications University of Southern California David H. Flaherty Professor of History and Law University of Western Ontario Carl Hammer Sperry Corp. (Ret.) Starr Roxanne Hiltz Professor of Sociology Upsala College John C. Lautsch Chairman, Computer Law Division American Bar Association Edward F. Madigan Office of State Finance State of Oklahoma Marilyn Gell Mason Director Atlanta Public Library William Joe Skinner Corporate Vice President Electronic Data Systems Corp. Terril J. Steichen President New Perspectives Group, Ltd. George B. Trubow Director, Center for Information Technology and Privacy Law The John Marshall Law School Susan Welch Professor and Chairperson Department of Political Science University of Nebraska Alan F. Westin Professor of Public Law and Government Columbia University Langdon Winner Associate Professor of Political Science Rensselaer Polytechnic Institute Congressional Agency Participants Robert L. Chartrand Senior Specialist Congressional Research Service Robert D. Harris Deputy Assistant Director for Budget Analysis Congressional Budget Office Kenneth W. Hunter Senior Associate Director for Program Information U.S. General Accounting Office NOTE: OTA appreciates and is grateful for the valuable assistance and thoughtful critiques provided by these advisory panel members. The views expressed in this OTA report, however, are the sole responsibility of the Office of Technology Assessment. iv PAGE 5 OTA Electronic Surveillance and Civil Liberties Project Staff John Andelin, Assistant Director, OTA Science, Information, and Natural Resources Division Frederick W. Weingarten, Communication and Information Technologies Program Manager Project Staff Fred B. Wood, Project Director Jean E. Smith, Assistant Project Director Priscilla M. Regan, Principal Author and Analyst Jim Dray, Research Analyst Jennifer Nelson, Research Assistant Administrative Staff Elizabeth A. Emanuel, Administrative Assistant Shirley Gayheart, Secretary Audrey Newman, Secretary Renee Lloyd, Secretary Patricia Keville, Clerical Assistant Contractor Herman Schwartz, The American University PAGE 6 OTA Electronic Surveillance and Civil Liberties Workshop Stanley S. Arkin Attorney Peter Benitez New York County District Attorneys Office Kier Boyd Deputy Assistant Director Technical Services Federal Bureau of James C. Carr U.S. Magistrate Floyd Clarke Deputy Assistant Criminal Division Federal Bureau of Russell Cestare Division Investigation Director Investigation Chief of Liaison and Communication Financial Investigations Division U.S. Customs Service Ronald C. Farm Chief, Counterintelligence Operations U.S. Department of the Army Richard Gerstein Partner Bailey, Gerstein, Rashkind & Dresnick Morton H. Halperin Director American Civil Liberties Union Frederick D. Hess Head, Office of Enforcement Operations Criminal Division U.S. Department of Justice Mary Lawton Counsel, Office of Intelligence and Policy Review U.S. Department of Justice Frederick B. Lothrop Analyst/Project Manager PSC, Inc. Paul Lyon Chief of Special Operations Bureau of Alcohol, Tobacco and Firearms U.S. Department of the Treasury Gary Marx Professor, Department of Urban Studies and Planning Massachusetts Institute of Technology Ronald S. Plesser Attorney Blum, Nash & Railsback Christopher Pyle Professor, Political Science Department Mount Holyoke College James B. Rule Professor, Department of Sociology State University of New York at Stony Brook Herman Schwartz Professor of Law The American University L. Britt Snider Director, Counterintelligence and Security Policy Office of the Secretary of Defense Other Reviewers Michael Cavanagh Electronic Mail Association Charles Miller American Telephone & Telegraph Co. David Peyton Information Industry Association Barbara Philips Telocator Network of America Harold Relyea Congressional Research Service vi PAGE 7 Contents Chapter Page 1. 2. 3. 4. 5. Summary . . . . . . 3 Introduction and Overview . . 9 Summary . . . . 9 Introduction . 11 Background. . ..., . 12 Technology and Use. . 12 Policy . . . 15 Findings and Policy Implications 21 Appendix 2A: Key Supreme Court Decisions on Electronic Surveillance . 24 Appendix 2B: Key Statutes Relevant to Electronic Surveillance 25 Telephone Surveillance . . . 29 Summary. . . 29 Introduction . . . . 30 Background, ,,...... . 31 Findings and Policy Implications 34 Electronic Mail Surveillance . . 45 Summary. . . . 45 Introduction . 45 Background. ,, ,,.. . 46 Findings and Policy Implications 48 Other Surveillance Issues . . 55 Summary. . . . . 55 Electronic Physical Surveillance. 55 Electronic Visual Surveillance. 55 Data Base Surveillance 56 Part I: Electronic Physical Surveillance ..., 57 Introduction 57 Background . . . 57 Findings and Policy Implications. 59 Chapter Part II: Electronic Surveillanc e Introduction Background Page Visual ... .,,, ,,,, 62 ..., ,,.,, ,,,, 62 ..,, . ,,.,, ,, 63 Findings and Policy Implications, 64 Part III: DataBase Surveillance. 67 Introduction . . 67 Background. ..., ., 68 Findings and Policy Implications. 70 List of Tables Table No. Page 1. 2. 3. 4. 5. 6. 7 Categories of Surveillance Technology ., . . . . 13 Categories of Behavior Subject to Electronic Surveillance . . 13 Top Fifteen Agency Components Using Electronic Surveillance Technology ., 14 Electronic Surveillance Technology: Current and Planned Agency Use 15 Agency Components Indicating the Largest Projected Use of Electronic Surveillance Technology . . 15 Dimensions for Balancing Civil Liberty Interest v. Government Investigative Interest . 22 Treasuray Enforcement Communication 8 9 System/Border Enforcement System Users . . . 69 Source of Treasury Enforcement Communication System/Border Enforcement System Records. ..., 69 Selected INS Computerized Record Systems . . . . 70 v;; PAGE 8 Chapter 1 Summary PAGE 9 . Chapter 1 Summar y In the last 20 years, there has been a virtual revolution in the technology relevant to electronic surveillance. Advances in electronics, semiconductors, computers, imaging, data bases, and related technologies have greatly increased the technical options for surveillance activities. Closed circuit television, electronic beepers and sensors, and advanced pen registers are being used to monitor many aspects of individual behavior. Additionally, new electronic technologies in use by individuals, such as cordless phones, electronic mail, and pagers, can be easily monitored for investigative, competitive, or personal reasons. The existing statutory framework and judicial interpretations thereof do not adequately cover new electronic surveillance applications. The fourth amendmentwhich protects the right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures was written at a time when people conducted their affairs in a simple, direct, and personalized fashion. Telephones, credit cards, computers, and cameras did not exist. Although the principle of the fourth amendment is timeless, its application has not kept abreast of current technologies. The major public law addressing electronic surveillance is Title III of the Omnibus Crime Control and Safe Streets Act of 1968 which was designed to protect the privacy of wire and oral communications. At the time Congress passed this act, electronic surveillance was limited primarily to simple telephone taps and concealed microphones (bugs). Since then, the basic communications infrastructure in the United States has been in rapid technological change. For example, satellite communication systems and digital switching and transmission technology are becoming pervasive, along with other easily intercepted technical applications such as cellular mobile radio, cordless telephones, electronic mail, computer conferencing, and electronic bulletin boards. Continued advances in computer-communications technology such as the Integrated Services Digital Network (ISDN), now close to implementation, are likely to present additional new opportunities for electronic surveillance. 1 The law has not kept pace with these technological changes. The courts have, on several occasions, asked Congress to give guidance. Most recently, U.S. Circuit Court Judge Richard Posner, in a case involving the use of video surveillance in a law enforcement investigation, said: we would think it a very good thing if Congress responded to the issues discussed in this opinion by amending Title III to bring television surveillance within its scope judges are not authorized to amend statutes even to bring them up to date. In legislating the appropriate uses of electronic surveillance, Congress attempts to strike a balance between civil libertiesespecially those embodied in the first, fourth, and fifth amendments to the U.S. Constitutionand the needs of domestic law enforcement and investigative authorities for electronic surveillance in fighting crime, particularly white-collar and organized crime, and generally for drug, gambling, and racketeering investigations. Law enforcement and investigative agencies, at least at the Federal level, are making significant use of electronic surveillance techniques and are planning to use many new techniques. Based on a review of available reports 1 ISDN permits the transmission of ~oice, \ideo, and data signals as needed o~er a common multi-purpose communications network, Note: This stud} did not retiew technolog~ or polic~ issues concerning foreign intelligence and counterintelligence applications of electronic surveillance. 3 PAGE 10 4 and the results of its Federal Agency Data Request, 3 OTA found that: l l l The number of Federal court-approved bugs and wiretaps in 1984 was the highest ever. About 25 percent of Federal agency components responding (35 out of 142) indicated some current and/or planned use of various electronic surveillance technologies, including, but not limited to, the following: closed circuit television (29 agencies); night vision systems (22); miniature transmitters (21); electronic beepers and sensors (15); telephone taps, recorders, and pen registers (14); computer usage monitoring (6); electronic mail monitoring or interception (6); cellular radio interception (5); pattern recognition systems (4); and satellite interception (4). About 25 percent of Federal agency components responding (36 out of 142) report use of computerized record systems for law enforcement, investigative, or intelligence purposes: agencies reported a total of 85 computerized systems with, collectively, about 288 million records on 114 million persons; 4 examples of four such systems that could be used in part for data base surveillance purposes are the: 1. National Crime Information Center (FBI), 2. Treasury Enforcement Communications System (Treasury), 3. Anti-Smuggling Information System (Immigration and Naturalization ServiceINS), and 4. National Automated Immigration Lookout System (INS). The data request was sent to all major components within the 13 cabinet-level agencies and to 20 selected independent agencies. Due to the unclassified focus of this study, two Department of Defense componentsthe National Security Agency and Defense Intelligence Agencyalong with the Central Intelligence Agency were excluded from the data request. Extent of multiple records on the same person is unknown. none of the 85 system operators provided the requested statistics on record quality (completeness and accuracy). Most do not maintain such statistics. After conducting a review of the technology and policy history of electronic surveillance, OTA found that: The contents of phone conversations that are transmitted in digital form or calls made on cellular or cordless phones are not clearly protected by existing statutes. Data communications between computers and digital transmission of video and graphic images are not protected by existing statutes. There are several stages at which the contents of electronic mail messages could be intercepted: 1) at the terminal or in the electronic files of the sender, 2) while being communicated, 3) in the electronic mailbox of the receiver, 4) when printed into hardcopy, and 5) when retained in the files of the electronic mail company or provider for administrative purposes. Existing law offers little or no protection at most of these stages. Legislated policy on electronic physical surveillance (e.g., pagers and beepers) and electronic visual surveillance (e.g., closed circuit TV and concealed cameras) is ambiguous or nonexistent. Legislated policy on data base surveillance (e.g., monitoring of transactions on computerized record systems and data communication linkages) is unclear. There is no immediate technological answer to protection against most electronic surveillance, although there are emerging techniques to protect communication systems from misuse or eavesdropping (e.g., low-cost data encryption). 5 OTA identified a range of policy options for congressional consideration: l Congress could do nothing and leave policymaking up to the development of case Technical options are being addressed in a separate OTA study on New Communications Technology: Implications for Privacy and Security, expected to be published in winter 1986/87. PAGE 11 5 law and administrative discretion. However, this would lead to continued uncertainty and confusion regarding the privacy accorded phone calls, electronic mail, data communication, and the like, and ignores judicial requests for clarification in areas such as electronic visual surveillance. l Congress could bring new electronic technologies and services clearly within the purview of Title III of the Omnibus Crime Control and Safe Streets Act, for example by: treating all telephone calls similarly with respect to the extent of protection against unauthorized interception, whether analog or digital, cellular or cordless, radio or wire; legislating statutory protections against unauthorized interception of data communication; legislating a level of protection across all stages of the electronic mail process so that electronic mail is afforded the same degree of protection as is presently provided for conventional first class mail; subjecting electronic visual surveillance to a standard of protection similar to or even higher than that which currently exists under Title 111 for bugging and wiretapping. l Congress also could set up new mechanisms for control and oversight of Federal data base surveillance, for example by: requiring congressional approval of specific Federal data base surveillance applications (e.g., by statutory amendment or approval of House and Senate authorizing committees); establishing a data protection board to administer and oversee general statutory standards for creating and using data bases for purposes of surveillance. Congress also could amend the Computer Fraud and Abuse Act of 1984 to cover interstate computer crime. This option, not detailed here, could provide additional legal protection against unauthorized penetration (whether for surveillance or other reasons, e.g., theft or fraud) of computer systems. G Chapters 2 through 5 of this report provide technical and policy analyses relevant to proposed legislation on electronic surveillance and civil liberties, such as the Electronic Communications Privacy Act of 1985 and the Video Surveillance Act of 1985. See the computer crime chapter of the forthcoming OTA report on Federal Government Information Technology: Ke~ Trends and Policy Issues for discussion. HR. 3378 introduced by Rep. Robert Kastenmeier and S. 1667 introduced by Sen. Patrick Leah~. See U.S. Congress, I{ouse of Representatives, Congressional Record, Extension of Remarks, Sept. 19, 1985, p. E-4 128; and U.S. Congress, Senate, Congressional Record, Sept. 19, 1985, p. S-11 795. R. 3455 introduced b~ Representati\re Kastenmeier, See U.S. Congress, House of Representati\es, Congressional Record, l+~xtension of Remarks, Sept. 30, 1985, p, I+; -4269. PAGE 12 Chapter 2 Introduction and Overview PAGE 13 Chapter 2 Introduction and Overview SUMMARY Electronic surveillance is the epitome of the two-edged sword of technology for many Americans. Public opinion polls evidence considerable concern about possible excessive and abusive use of electronic surveillance by the Government (and others), and show support for strong safeguards and protections to tightly control the use of such technology. But, at the same time, the public is concerned about crimeespecially violent crimeand supports the appropriate use of technology to combat and prevent crime and bring offenders to justice. Until the past 10 years or so, the balancing of these concerns was relatively straightforward from a technological perspective. Electronic surveillance was limited primarily to audio surveillance devices such as telephone taps and concealed microphones (bugs). Now, however, technological developments have significantly expanded the range of electronic surveillance options. These include miniaturized transmitters for audio surveillance, lightweight compact television cameras for video surveillance, improved night vision cameras and viewing devices, and a rapidly growing array of computer-based surveillance techniques. In addition, most forms of electronic communicationwhether via wire, coaxial cable, microwave, satellite, or even fiber opticscan be monitored if one has the time, money, and technical expertise. Encryptionthe only technological countermeasure thought at this time to be generally effectiveis still too expensive and cumbersome for widespread application, See Alan F. Westin, ( Public and Group Attitudes Toward Information Policies and Boundaries for Criminal Justice, in U.S. Department of Justice, Bureau of Justice Statistics, Information Policjr and Crime Control Strategies, Proceedings of a BtJS SE] ARC13 Conference, July 1984, pp. 32-46; and William 13. L)utton and Robert (i. Meadow, Public Perspectives on (lo~ernrnent Information Technology: A Re\iew of Survey Research on Pri\~acy, Ci\il I,iberties, and the Democratic Process, OTA contractor report, January 1985, although costs are declining and ease of use is improving. The primary purpose of electronic surveillance is to monitor the behavior of individuals, including individual movements, actions, communications, emotions, and/or various combinations thereof, as well as the movement of property or objects. Some uses of electronic surveillance devices may infringe on the protections afforded by the first, fourth, and fifth amendments to the U.S. Constitution and various public laws. This chapter surveys the Federal Governments use of electronic surveillance and outlines a framework for the analysis of electronic surveillance issues. Based on a review of available reports and the results of its Federal Agency Data Request, OTA found that: The extent of use of electronic surveillance by the private sector is unknown. The number of Federal and State courtapproved wiretaps and bugs reported in 1984 was the highest since 1973. The number of Federal court-approved bugs and wiretaps in 1984 was the highest ever. According to early reports, an average of about 25 percent of intercepted communications in 1984 were reported to be incriminating in nature, with 2,393 persons arrested as a result of electronic surveillance. About 25 percent of Federal agency components responding to the OTA Federal Data Request indicated some use of electronic surveillance. z Due to the unclassified focus of this study, two Department of Defense componentsthe National Securit~ Agency and Defense Intelligence Agency-along with the Central Intelligence Agency were excluded from the data request. 9 53.548 0 85 2 : t2L 3 PAGE 14 10 Federal agency use is concentrated in components of the Departments of Justice, Treasury, Defense, Agriculture, and Interior. The Drug Enforcement Administration and Federal Bureau of Investigation (Justice), U.S. Customs Service (Treasury), and Air Force Office of Spe cial Investigations (Defense) use the greatest number of different types of electronic surveillance technologies. The FBI, which currently uses nine different types of surveillance technologies, has plans to use eight additional types of technologies. A thorough review of the technology and policy history of electronic surveillance led OTA to conclude that: l l l The existing statutory framework and judicial interpretations thereof do not adequately cover new and emerging electronic surveillance technologies. Indeed, the courts have asked Congress for guidance on the new technologies. There is no immediate technological answer to protection against most electronic surveillance, although there are emerging techniques to protect communication systems from misuse or eavesdropping (e.g., low-cost data encryption). Despite a lack of coordination in electronic surveillance policymaking among the three branches of Government and the ad hoc nature of that policy, there are seven general components that are found in existing policies, be they legislative, executive, or judicial: 1. a way of checking on the discretion of the Government agent in the field; Z a listing of the crimes and circumstances for which a particular type of electronic surveillance is considered appropriate; 3. a standard to indicate at what stage in l l l 4 5 6 7 an investigation the use of a particular surveillance technique is appropriate; a justification for the need to use a particular surveillance technique; an account of how the scope of the surveillance will be minimized; a requirement to give notice after the fact to the subject of the surveillance; and remedies and sanctions, including a statutory exclusionary rule or a civil remedy. In setting electronic surveillance policy, Congress, the executive branch, and the courts, implicitly or explicitly, balance the societal interest in maintaining civil liberties protections for the individual against the societal interest in successful Government investigations. Based on an evaluation of previous policy formulation, policymakers, more or less consciously, have looked to certain dimensions in determining this balance. In determining the civil liberty interest with respect to electronic surveillance, policymakers look to five dimensions the nature of information, the nature of the place or communication, the scope of the surveillance, the surreptitiousness of surveillance, and the pre-electronic analogy of the surveillance technique or device. In determining the Governments interest, policymakers have used three dimensions to evaluate the need for using an electronic surveillance technique or device-the purpose of the investigation, the degree of individualized suspicion, and the effectiveness of the electronic device as an investigatory tool compared to nonelectronic options. This policy framework is applied in the following chapters to specific types of electronic surveillance technology. PAGE 15 INTRODUCTION The capabilities for surveillance-the observation and monitoring of individual or group behavior including communication-are greatly expanded and enhanced with the use of technological devices. For example, technology makes it more efficient and less conspicuous to track movements, to hear conversations, to know the details of financial and other personal transactions, and to combine information from diverse sources into a composite file. New surveillance tools are technically more difficult to detect, of higher reliability and sensitivity, speedier in processing time, less costly, more flexible and adaptable, and easier to conceal because of miniaturization and remote control. Current R&D will produce devices with increased surveillance capabilities, e.g., computer speech recognition and speaker identification, fiber optics, and expert systems. Many electronic devices are currently available for monitoring individual or group behavior. For example, phone conversations might be overheard, records of phone numbers dialed might be accessed, movements at home and in the workplace might be video-recorded, and movements outside the home or workplace, even in the dark, could be observed. In addition, bank and credit records could be examined electronically to determine financial habits and general movements, and conversations in a public place could be recorded by a parabolic microphone. Further, it is possible that actions might be evaluated by computer to determine whether they match any profiles or have a pattern, that electronic mail communication might be accessed and read, that the movements of physical objects such as a car might be tracked by a beeper, and that a new friend or local taxi driver might be wired for sound. From a law enforcement and investigative standpoint, the potential benefits offered through new electronic technologies may be substantial-e. g., the development of more accurate and complete information on suspects, the possible reduction in time and manpower required for case investigation, and the expansion of the options for preventing and deterring crimes. From a societal perspective, the possible benefits are also importantincluding the potential to increase ones sense of physical security in the home and on the streets, improve the capability to know when someone is in need of assistance, strengthen efforts to prevent the sale of illegal substances, and enhance the protection of citizens and Government officials from terrorist actions. However, while providing increased security, the use of sophisticated technologies for surveillance purposes also presents possible dangers to society. Over time, the cumulative effect of widespread surveillance for law enforcement, intelligence, or other investigatory purposes could change the climate and fabric of society in fundamental ways. For example, how will hotlines that encourage people to anonymously report potentially damaging information and one-party consent to the monitoring of conversations affect the level of trust in our society? Will private space and anonymity be preserved when individuals increasingly must make private information widely available, e.g., to banks, medical clinics, and credit agencies, in order to carry on everyday activities? How will informality and spontaneity in communications and behavior be affected as more personal activities are on the record or in view? But most importantly for the purposes of this study, the use of electronic surveillance devices may infringe on the protections afforded in the first amendment (freedom of speech and press, and the right to peaceably assemble and to petition the Government for a redress of grievances), fourth amendment (unreasonable searches and seizures), and fifth amendment (protection against self-incrimination). The use of such devices may also conflict with procedural and substantive protections in specific statutes, e.g., Title III of the (j~~T. hlarx, The New Sur\eillance, Technolo~. Reiiew. \ol, 88, N-o. 4, hl a?