Tech Law Journal Daily E-Mail Alert
December 13, 2010, 8:00 AM, Alert No. 2,177.
Home Page | Calendar | Subscribe | Back Issues | Reference
House Judiciary Subcommittee Holds Hearing on Civil Liberties and ICT Issues

12/9. The House Judiciary Committee's (HJC) Subcommittee on the Constitution, Civil Rights, and Civil Liberties will held a hearing titled "Civil Liberties and National Security".

This hearing covered a wide range of topics involving detention, interrogation, torture, prosecution and trial of defendants, prisoners of war, foreign detainees, and terrorism suspects. It also addressed covert military operations. However, some of the hearing addressed information and communications technology (ICT) related topics, including the state secrets privilege, warrantless wiretaps, government access to consumers' phone call records, and a potential CALEA like statute for the internet.

This hearing, which was sparsely attended by members, staff, and the public, was held days before the end of a lame duck session, and just before a change of party control. Rep. John Conyers (D-MI), the Chairman of the HJC, conducted the two and one half hour hearing on his own.

Rep. John ConyersRep. Conyers (at left) and some witnesses focused their criticism on the Bush administration. Rep. Conyers stated that it created an "expanded national security state". He cited "civil rights abuses", including "widespread warrantless wiretapping", and abuse of the state secrets privilege.

Rep. James Sensenbrenner (R-WI), the ranking Republican on the Subcommittee, stated in opening that "I don't see why we need to have this hearing today because it is talking about things in the past". He added that "next year, when this Committee is under new management, we will be much more productive, much more relevant, and we won't be looking at the calendar of last year or two years ago." He then left the hearing room.

Rep. Conyers and Laura Murphy (ACLU) conceded that the Bush administration policies that they condemned at this hearing have been continued by the Obama administration. Thomas Pickering stated at the end of the hearing that the hearing had a "partisan flavor".

State Secrets Privilege. This is not inherently ICT related. And, the government invokes it in cases that do not involve ICT. However, the government has relied upon it in recent years to evade legal claims arising out of allegation of illegal and warrantless wiretapping.

For an explanation of the doctrine, see story titled "9th Circuit Rules in State Secrets Case" in TLJ Daily E-Mail Alert No. 1,927, April 29, 2009, story titled "Holder Advocates Some Constitutional Principles" in TLJ Daily E-Mail Alert No. 1,927, April 15, 2009, and story titled "Holder Issues Memorandum on State Secrets Privilege" in TLJ Daily E-Mail Alert No. 1988, September 24, 2009.

Rep. Conyers said that "invocation of the state secrets privilege, which has gone on in recent years, including this administration, to an incredible new height, to shut down complaints, investigations and lawsuits challenging executive branch action, such as illegal domestic surveillance".

Thomas Pickering wrote about the state secrets privilege, among other topics, in his prepared testimony. He is a former career diplomat. He was Ambassador to Russia and Undersecretary of State for Political Affairs during the Clinton administration, and U.S. Ambassador to the United Nations during the elder Bush's administration. He now works at Hills & Company.

Pickering wrote that "The application of the state secrets doctrine is also an area of growing concern, particularly as it affects the rights of citizens and aliens to seek redress in court for actions of the government which negatively impact them or their interests. Blanket efforts to block all such claims seeking redress are both unfair and improper. Any doctrine that leaves the Executive Branch entirely immune, on its own say so, from all claims for redress against mistakes, errors, or bad or improperly applied policy seems overly broad and peremptory. We need to look carefully at how to assure the right to redress while fully protecting the government’s responsibility to keep its legitimate secrets secure."

He added that it "should be restored to its proper role as an evidentiary privilege, safeguarding particular pieces of evidence against disclosure. The privilege should not be used as an immunity doctrine, completely blocking challenges to government actions. Judges should independently examine the evidence asserted to be secret to determine whether the privilege applies, and should assess whether there is sufficient non-privileged evidence for the case to proceed. This would help to assure the executive branch is not left to police itself."

The ACLU's Murphy wrote in her prepared testimony that "the Bush administration began using the privilege to dismiss entire lawsuits at the onset -- and the Obama Administration has supported and continued that abuse of power."

There have been unsuccessful efforts to address abuse of the state secrets privilege by legislation in the 110th and 111th Congresses. The HJC approved HR 984 [LOC | WW], the "States Secret Protection Act", on December 5, 2009. However, the full House did not pass the bill. See also, story titled "House Constitution Subcommittee Approves States Secrets Protection Act" in TLJ Daily E-Mail Alert No. 1,954, June 12, 2009.

And see, S 417 [LOC | WW], which the Senate Judiciary Committee (SJC) did not pass, and in the 110th Congress, S 2533 [LOC | WW], which the SJC, but not the full Senate, passed.

Warrantless Wiretaps. Laura Murphy (ACLU) wrote that "our spy agencies have departed radically from their supposedly exclusive focus on overseas spying, and have turned their eyes and ears inward upon the American people."

She wrote that in December of 2005,  "the New York Times first reported that the NSA was tapping into telephone calls of Americans in violation of existing laws and the Constitution. Furthermore, the agency gained direct access to the telecommunications infrastructure through some of America's largest companies. Using that access, the agency appeared to be using broad data-mining techniques to evaluate the communications of millions of people within the United States."

The New York Times published a story by James Risen and Eric Lichtblau titled "Bush Lets U.S. Spy on Callers Without Courts". It stated that "President Bush secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity without the court-approved warrants ordinarily required for domestic spying, according to government officials." See also, story titled "President Bush Discloses Interception of Communications Without Court Approval" in TLJ Daily E-Mail Alert No. 1,275, December 19, 2005, and story titled "Bush, Gonzales & Hayden Discuss Presidential Intercepts and PATRIOT Act" in TLJ Daily E-Mail Alert No. 1,276, December 20, 2005.

Murphy continued that "In May 2006, Americans learned that at least some of the major telecommunications companies granted the NSA direct, wholesale access to their customers' calling records -- once again, outside the law -- and that the NSA was compiling a giant database of those records."

The USA Today published an article by Leslie Cauley titled "NSA has massive database of Americans' phone calls". See, story titled "Bush Responds to USA Today Story Regarding NSA Database of Phone Calls" in TLJ Daily E-Mail Alert No. 1,369, May 12, 2006.

Murphy also said that "Congress worsened the situation in 2008 by passing the Foreign Intelligence Surveillance Act Amendments Act (FAA), which permits the government to get annual court orders that can capture all communications coming into or going of the United States -- even if an American citizen is on one end, and even if that person is not suspected of doing something wrong. The amount of private American communications that can be collected under this law is staggering, and this un-American and unconstitutional spying continues under President Obama. The ACLU has challenged the constitutionality of this law and our case is pending before the Second Circuit."

CALEA for the Internet. The ACLU's Murphy also discussed in her written testimony, and oral statement, a Communications Assistance for Law Enforcement Act (CALEA) like statute for the internet. She said that in the 112th Congress, there will be an Obama administration proposal "to change the very architecture of the Internet in order to make eavesdropping easier".

She elaborated that "the administration is expected to submit legislation to Congress early next year that would require all online services even those which operate by putting individuals in direct contact with each other to make it possible for the government to eavesdrop upon demand. This would require companies to completely restructure the way their services work. The proposed measure would mandate that all online communications services allow the government to collect private communications and decode encrypted messages that Americans send over texting platforms, BlackBerries, social networking sites and other ``peer to peer´´ communications software."

Murphy argued that "This is particularly problematic because many of the privacy protections that governed the government’s wiretapping powers when CALEA passed in 1994 no longer exist or have been significantly weakened. For example, Congress has granted the executive branch virtually unchecked power to conduct dragnet collection of Americans' international e-mails and telephone calls without a warrant or suspicion of any kind under the FISA Amendments Act of 2008."

Moreover, she wrote, "This proposal would interfere with technological innovation, create significant new cybersecurity vulnerabilities, reduce privacy and chill expression on the Internet, and pose dangers of government and third-party abuse. Under the guise of a mere technical fix, the executive branch seeks significant new power to reconfigure the Internet and conduct easy dragnet collection of Americans’ most private communications."

The other witnesses, who addressed non ICT related issues, were Jamil Jaffer (Kellogg Huber), Michael Lewis (Ohio Northern University law school), Jeremy Scahill (Democracy Now), Mary Ellen O'Connell (University of Notre Dame Law School), and Bruce Fein (Litchfield Group). See also, HJC web page with hyperlinks to the prepared testimony of all of the hearing witnesses.

Holder Writes Sen. Leahy Regarding Surveillance

12/9. Attorney General Eric Holder sent a letter to Sen. Patrick Leahy (D-VT) regarding extending expiring surveillance provisions of the FISA and Title II of the USA PATRIOT Act, Sen. Leahy's letter [4 pages in PDF] to Holder of March 17, 2010, and S 1692 [LOC | WW], the "USA PATRIOT ACT Sunshine Extension Act".

Holder tries to assure Sen. Leahy in his letter that in utilizing some of the more controversial surveillance tools of the FISA, such as Section 215 orders and NSLs, the DOJ now has standards, oversight and accountability in place to protect civil liberties.

This article first provides some historical background information that may be useful in understanding Holder's letter. It then summarizes Sen. Leahy's letter to Holder. Finally, it summarizes Holder's response.

Quick Review of History. The Congress enacted the Foreign Intelligence Surveillance Act (FISA) in 1978. It is codified in Title 50. It pertains to surveillance of a "foreign power" and an "agent of a foreign power". The term "foreign power" is defined to include "a group engaged in international terrorism". The FISA gives the government broader powers to conduct surveillance of foreign powers and their agents, and under lower standards, than the government possesses under Title 18 when conducting surveillance of U.S. persons.

Terrorists attacked targets in the U.S. on September 11, 2001. The Congress quickly enacted the huge and multi-faceted USA PATRIOT Act, HR 3162 (107th Congress). Title II expanded the surveillance powers of the federal government under both Title 50 and 18, and blurred the lines between foreign and domestic surveillance. Due to the haste of passage, and concerns for civil liberties and privacy, the Congress added sunset provisions to many sections of Title II.

In 2004, the 108th Congress enacted S 2845, the "Intelligence Reform and Terrorism Prevention Act of 2004", Section 6001 of which amended the FISA to allow FISA surveillance of individuals; it two contains a sunset provision.

In 2006, the Congress enacted HR 3199, the "USA PATRIOT Improvement and Reauthorization Act of 2005", which removed all but three of the sunsets, which it extended through December 31, 2009. The three provisions pertain to (1) roving wiretap orders, (2) FISA surveillance of individuals, and (3) easy access under FISA to business records, including library, phone, ISP and other business records.

(1) Section 206 of the 2001 Act amended Section 105(c)(2)(B) of the FISA, which is codified at 50 U.S.C. § 1805, to have the effect of allowing the court to authorize roving wiretaps.

(2) The FISA authority is restricted to surveillance and activities directed at foreign governments and terrorist organizations. The 2001 Act gave the government FISA authority with respect to certain individuals. This authority is sometimes referred to as "lone wolf".

(3) Section 215 of the 2001 Act rewrote Section 501 of the FISA, which is codified at 50 U.S.C. § 1861. This is the section of the FISA that provides for "Access to Certain Business Records for Foreign Intelligence and International Terrorism Investigations". The 2001 Act set a very low standard for issuance of these orders, which can be directed at phone companies, ISPs, and libraries in the US. This authority is sometimes referred by as "Section 215".

On September 22, 2009, Sen. Leahy introduced his bill, S 1692. The Senate Judiciary Committee (SJC) amended and approved this bill on October 8, 2009. AG Holder endorsed it. However, the Senate did not pass it.

Rather, the Congress, after short term extensions, enacted HR 3961 [LOC | WW] in late February of 2010. That bill merely extended sunset dates from February 28, 2010, to February 28, 2011. See, story titled "House and Senate Extend Expiring Surveillance Provisions" in TLJ Daily E-Mail Alert No. 2,054, March 3, 2010.

Sen. Leahy's bill, S 1692, in contrast, is a large bill, that would have extended the three sunsets through 2013, added a 2013 sunset to National Security Letter (NSL) authority, and also created new oversight and judicial review processes to protect civil liberties and privacy.

Sen. Leahy's Letter to AG Holder. President Obama signed HR 3961 into law on February 27, 2010. Sen. Leahy sent his letter to Holder on March 17. Basically, he asked that the Department of Justice (DOJ) adhere to some of the provisions of the unpassed bill, even in the absence of a statutory mandate.

He wrote that "A number of the improvements that were included in the bill should not require statutory changes". He began by citing the writing of reports.

He also wrote that the government has "significantly misused" its NSL authority. He argued that "It is important that there be increased accountability for this authority. I urge you to proceed without delay to implement the accountability measures that were in our bill with respect to NSLs. Some improvements can be achieved through the issuance of internal policies, procedures, and guidance."

With regard to Section 215 orders for access to business records under the FISA, he wrote, "please explain the policy guidance you will issue in order to realize the changes to section 215 orders that you supported in the bill". Also, "I urge you to issue guidance that requires the FBI to present the FISC with a complete statement of facts sufficient to show relevance of the section 215 order to an authorized investigation."

S 1692 would have required court approved minimization procedures for both Section 215 orders and pen register and trap and trace (PRTT) devices. PRTT device orders apply in the context of both telephone numbers to which or from which calls are made, and e-mail addressing information.

Hence, Sen. Leahy also asked, "Please explain how you will institute appropriate guidelines that are consistent with the intent of the bill in this regard, and whether you will seek the approval of the FISC prior to implementing the provisions."

FISC is the Foreign Intelligence Surveillance Court, the body authorized under 50 U.S.C. § 1803 to issue FISA orders.

Holder's Response. Holder reminded Sen. Leahy that three surveillance provisions sunset on February 28, 2011, and added "I strongly urge that Congress again take action to ensure that these provisions remain in force."

Last month, Rep. Pete Hoekstra (R-MI) introduced HR 6429 [LOC | WW], a bill that would simply extend the three sunsets for one more year. See, story titled "Rep. Hoekstra Introduces Bill to Extend Sunset Date for Three FISA Surveillance Provisions" in TLJ Daily E-Mail Alert No. 2,160, November 19, 2010.

Eric HolderHolder (at right) also wrote that "Assuming these authorities are reauthorized, the Department has determined that many of the privacy and civil liberties  provisions of S. 1692 can be implemented without legislation. Indeed, in a number of instances, we have already taken steps to do so. I am confident that these measures will enhance standards, oversight and accountability ..."

With respect to NSLs, he wrote that now, "all NSLs are required to include a notice that informs recipients of the opportunity to contest the nondisclosure requirement through the government initiated judicial review." (What Holder terms a "non-disclosure requirement" is called a "gag order" by some others.)

He continued that "in any case in which a recipient challenges a nondisclosure order, the recipient is notified when compliance with the order is no longer required."

He disclosed that "there have been only four challenges to the non-disclosure requirement, and in two of the challenges, the FBI permitted the recipient to disclose the fact that an NSL was received."

Holder also wrote that he has approved new procedures for NSLs, and the "FBI's current practice is consistent with the procedures".

Regarding public reporting on the use of NSLs, Holder said that the FBI will continue to merely release "the aggregate numbers of NSLs on an annual basis".

NSLs, which do not require a warrant or other prior court authorization, enable the DOJ's FBI to obtain records, including subscriber, billing and call records of phone companies and ISPs. NSLs also apply to libraries to the extent that they are providing an electronic communication service.

The FBI has a history of serious and serial violation of NSL and other authority. See:

  • January 20, 2010, DOJ Inspector General (IG) report [PDF], and story titled "Another DOJ Inspector General Report Finds FBI Misconduct in Obtaining Phone Records" in TLJ Daily E-Mail Alert No. 2,037, January 20, 2010.
  • March 13, 2008, DOJ/IG report [PDF] titled "A Review of the FBI’s Use of National Security Letters: Assessment of Corrective Actions and Examination of NSL Usage in 2006", and story titled "DOJ Inspector General Releases Second Report on FBI Misuse of National Security Letters" in TLJ Daily E-Mail Alert No. 1,730, March 12, 2008.
  • March 9, 2007, DOJ/IG report [PDF] titled "A Review of the Federal Bureau of Investigation's Use of National Security Letters", and story titled "DOJ IG Releases Reports on Use of NSLs and Section 215 Authority" in TLJ Daily E-Mail Alert No. 1,551, March 13, 2007.

With respect to Section 215 orders, Holder wrote that it is current FBI practice to present the FISC "with a complete statement of facts sufficient to show relevance of the tangible things requested to an authorized investigation". In the case of Section 215 orders for bookseller or library records that contain personally identifiable information, "we are prepared to require a statement of specific and articulable facts as would be required under S. 1692".

Regarding minimization procedures for Section 215 and PRTT orders, he wrote that "Minimization procedures are already required by statute in relation to section 215 orders. The proposal to extend this requirement to PR/TT orders is intended to apply only to certain intelligence collection activities. Procedures governing these operations are currently in effect ..."

As for providing "an annual unclassified report on the use of FISA authorities", Holder wrote that "there may be little information that can be provided in an unclassified format". Hence, he committed only to "work with the committee".

7th Circuit Amends Opinion on Wiretap Act, E-Mail and Microsoft Outlook Rules

12/2. The U.S. Court of Appeals (7thCir) issued a short order that amends its September 9, 2010, opinion [13 pages in PDF] in USA v. David Szymuskiewicz, a case regarding application of the Wiretap Act to the use of software for the unauthorized forwarding of e-mail messages.

The Court of Appeals' September opinion affirmed the judgment of the District Court, which convicted and sentenced the defendant for violation of the Wiretap Act (18 U.S.C. § 2511). The December order removes a huge chunk of the reasoning from the original opinion, but otherwise leaves the holding intact. The unauthorized use of Microsoft Outlook to forward someone else's e-mail can constitute a violation of the Wiretap Act.

The Court of Appeals wrote that the defendant, who worked for the IRS, used the office computer of his supervisor, without authorization, to set up a rule in Microsoft Outlook that automatically forwarded the supervisor's e-mail to his e-mail account. The forwarding lasted for three years. A grand jury returned an indictment that charged Szymuskiewicz with violation of the Wiretap Act. A trial jury returned a verdict of guilty.

The Court of Appeals affirmed.

18 U.S.C. § 2511(1) provides, in part, that "any person who (a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication ... shall be punished

The defendant argued on appeal that he should have been charged under the Stored Communications Act (SCA), 18 U.S.C. §§ 2701-12, rather than the Wiretap Act.

The Court of Appeals wrote that the software used caused the e-mail to be forwarded by an e-mail server, rather than by the supervisor's client. It concluded that copying and forwarding of e-mail at the server is interception.

But, it continued that "it does not matter which computer did the copying. To see why, we need to take a brief foray into the world of packet switching, the method by which nearly all electronic communications between computers are now sent. When the Wiretap Act was enacted in 1968, the normal communications pathway was circuit switching: the telephone company's machinery (initially switchboards, then mechanical solenoids, and finally computers) would establish a single electronic pathway, or circuit, between one telephone and another. Computers can communicate over dedicated circuits, but usually they break each message into packets, which can be routed over a network without the need to dedicate a whole circuit to a single message." (Parentheses in original.)

The Court of Appeals, citing Wikipedia, continued with its explanation of internet protocol (IP) based packet switching. The Court's key point was that the e-mail in question was broken down into packets.

The defendant's "understanding of ``interception´´ as ``catching a thing in flight´´ is sensible enough for football, but for email there is no single ``thing´´ that flies straight from sender to recipient. When sender and recipient are connected by a single circuit, and the spy puts a ``tap´´ in between, the football analogy makes some sense (though the tap does not prevent the recipient from getting the message; the spy gets a copy, just as Szymuszkiewicz did). For email, however, there are no dedicated circuits. There are only packets, segments of a message that take different routes at different times."  (Parentheses in original.)

The Court discussed and relied upon the 2005 en banc opinion of the U.S. Court of Appeals (1stCir) in US v. Bradford Councilman, 418 F.3d 67.

The three judge panel of the First Circuit issued its split opinion on June 29, 2004. The Court held that there was no violation of the Wiretap Act, as amended by the ECPA, when stored e-mail was accessed, because, since it was in storage, there was no interception within the meaning of the statute. See, story titled "1st Circuit Holds Wiretap Act Does Not Apply to E-Mail in Storage" in TLJ Daily E-Mail Alert No. 930, July 1, 2004. On August 11, 2005, the en banc panel issued its opinion. See, story titled "1st Circuit Issues En Banc Opinion in Councilman Case" in TLJ Daily E-Mail Alert No. 1,194, August 12, 2005. It held that the Wiretap Act does apply to e-mail in transient storage.

The 7th Circuit continued that "The difference between circuit-switch and packet-switch transmission methods thus is irrelevant under §2510. We agree with Councilman's conclusion on that subject (as well as its conclusion that the Stored Communications Act does not repeal any part of the Wiretap Act by implication; each statute is fully enforceable according to its own terms)."  (Parentheses in original.)

"Several circuits have said that, to violate §2511, an interception must be “contemporaneous´´ with the communication." But, the Court wrote, contemporaneous "differs from ``in the middle´´ or any football metaphor. Either the server in Kansas City or Infusino's computer made copies of the messages for Szymuszkiewicz within a second of each message's arrival and assembly; if both Szymuszkiewicz and Infusino were sitting at their computers at the same time, they would have received each message with no more than an eyeblink in between. That's contemporaneous by any standard."

The Court of Appeals opinion then elaborated on the meaning of "contemporaneous". However, that portion of the original opinion was deleted by the order of December 2. The original opinion also went on to discuss the SCA. That portion too was deleted by the December 2 order.

The December 2 order provides that "The opinion of this court issued on September 9, 2010, is amended as follows:
   Page 8, delete the entire paragraph beginning on the bottom of this page starting with, ``In saying that ...´´
   Page 9, delete the entire paragraph beginning on the bottom of this page starting with, ``The Stored Communication Act ...´´"

This case is USA v. David Szymuskiewicz, U.S. Court of Appeals for the 7th Circuit, App. Ct. No. 10-1347, an appeal from the U.S. District Court for the Eastern District of Wisconsin, D.C. No. 07-CR-171, Judge Lynn Adelman presiding. Judge Easterbrook wrote the opinion of the Court of Appeals, in which Judges Posner and Kanne joined.

In This Issue
This issue contains the following items:
 • House Judiciary Subcommittee Holds Hearing on Civil Liberties and ICT Issues
 • Holder Writes Sen. Leahy Regarding Surveillance
 • 7th Circuit Amends Opinion on Wiretap Act, E-Mail and Microsoft Outlook Rules
 • People and Appointments
 • More News
Washington Tech Calendar
New items are highlighted in red.
Monday, December 13

The House will meet at 10:00 AM in pro forma session only. See, Rep. Hoyer's notice.

The Senate will meet at 2:30 PM. The Senate will resume consideration of HR 4853 [LOC | WW], the vehicle for extending certain expiring tax provisions.

8:30 AM. Day one of a two day partially closed meeting of the Department of Commerce's (DOC) Bureau of Industry and Security's (BIS) Emerging Technology and Research Advisory Committee. See, notice in the Federal Register, November 26, 2010, Vol. 75, No. 227, at Pages 72792-72793. Location: Room 3884, DOC, Hoover Building, 14th Street between Pennsylvania and Constitution Avenues, NW.

9:00 AM. 9:30 AM. The Federal Communications Commission's (FCC) Communications Security, Reliability, and Interoperability Council (CSRIC) will meet. See, original notice in the Federal Register, November 30, 2010, Vol. 75, No. 229, at Pages 74050-74051, and supplemental notice in the Federal Register, December 8, 2010, Vol. 75, No. 235, at Pages 76465-76466. Location: FCC, Commission Meeting Room (Room TW-C305), 445 12th St., SW.

9:30 AM. Rep. Steny Hoyer (D-MD), the House Democratic Leader, will give a speech. Location: National Press Club,13th Floor, 529 14th St. NW.

11:00 AM - 2:00 PM. The Department of Commerce's (DOC) National Telecommunications and Information Administration's (NTIA) Spectrum Management Advisory Committee (SMAC) will meet by teleconference. The call in number is 1-888-769-8761; the passcode is 2684385. See, notice in the Federal Register, November 26, 2010, Vol. 75, No. 227, at Page 72792. The agenda includes discussion of a report of the SMAC's Incentives Subcommittee, including spectrum fees, strengthening OMB Circular A11, and the Spectrum Innovation Fund.

TIME? Michael Punke (Deputy USTR and representative to the WTO) and other officials of the Office of the U.S. Trade Representative (OUSTR) officials will hold a closed meeting with officials of the People's Republic of China to discuss the Doha Development Agenda. See, OUSTR calendar.

Deadline to submit comments to the Department of Justice's (DOJ) Antitrust Division regarding the proposed final judgment in USA v. American Express, et al., D.C. No. CV-10-4496. The DOJ initiated an action against American Express, MasterCard and Visa alleging violation of Section 1 of the Sherman Act, which is codified at 15 U.S.C. § 1, in connection with their alleged anticompetitive conduct at the point of sale. The settlement, which covers only MasterCard and Visa, requires public notice and comment, and approval by the District Court. The DOJ's notice in the Federal Register states that comments are due within 60 days of publication of its notice in the Federal Register. However, it does not fix an actual date. See, Federal Register, October 13, 2010, Vol. 75, No. 197, at Pages 62858-62874. See also, story titled "DOJ and States Bring Antitrust Action Against Credit Card Companies" in TLJ Daily E-Mail Alert No. 2,139, October 5, 2010.

Deadline to submit reply comments to the Federal Communications Commission (FCC) in response to its Notice of Proposed Rulemaking (NPRM) [25 pages in PDF] regarding commercial radio operator licenses for maritime and aviation radio stations who perform certain functions performed within the commercial radio operators service. The FCC adopted this item on August 31, 2010, and released the text on September 8, 2010. It is FCC 10-154 in WT Docket No. 10-177. See, notice in the Federal Register, October 29, 2010, Vol. 75, No. 209, at Pages 66709-66715.

Deadline for Federal Communications Commission (FCC) Commissioner Michael Copps to respond to Rep. Joe Barton's (R-TX) interrogatories regarding his proposal that broadcasters be subjected to a public value test (PVT). See, story titled "Copps Wants to Impose Public Value Test on Broadcasters" in TLJ Daily E-Mail Alert No. 2,168, December 4, 2010. See also, Rep. Barton's letter and story titled "Barton Questions Copps Regarding Public Value Test" in TLJ Daily E-Mail Alert No. 2,171, December 7, 2010.

Tuesday, December 14

The House will meet at 12:30 PM for morning hour, and at 2:00 PM for legislative business. Votes will be postponed until 6:00 PM. The schedule for the week also includes HR 4853 [LOC | WW], the vehicle for extending certain expiring tax provisions. See, Rep. Hoyer's notice.

RESCHEDULED FOR FEBRUARY 8. 8:00 -10:00 AM. Broadband Census News LLC will host a panel discussion titled "Meet The Chinese Embassy IP Attache". The speakers will be Fuli Chen (Intellectual Property Rights Attache for the Chinese Embassy to the US), Steven Adkins (Orrick), Drew Clark, and others. Breakfast will be served. This event is free and open to the public. See, notice and registration page. This event is also sponsored by the National Cable & Telecommunications Association (NCTA) and the Public Knowledge (PK). Location: Clyde's of Gallery Place, 707 7th St., NW.

8:30 AM. Day two of a two day partially closed meeting of the Department of Commerce's (DOC) Bureau of Industry and Security's (BIS) Emerging Technology and Research Advisory Committee. See, notice in the Federal Register, November 26, 2010, Vol. 75, No. 227, at Pages 72792-72793. Location: Room 3884, DOC, Hoover Building, 14th Street between Pennsylvania and Constitution Avenues, NW.

10:30 AM. The Federal Communications Commission (FCC) will host an event titled "Generation Mobile Forum". The speakers will include FCC Chairman Julius Genachowski. The topics to be discussed include cyber bullying. Location: McKinley Technology High School, Auditorium, 151 T St., NE.

12:15 - 1:30 PM. The Federal Communications Bar Association's (FCBA) Mass Media Committee will host a brown bag lunch titled "Views from the Fourth Estate". The speakers will be Amy Schatz (Wall Street Journal), Cecilia Kang (Washington Post), Kim Hart (Politico), and Dennis Wharton (NAB). The FCBA bars reporters from some of its events. Location: Wiley Rein, 1776 K St., NW.

2:30 PM. The Federal Trade Commission's (FTC) Bureau of Economics will host a presentation by Wallace Mullin (George Washington University Department of Economics). He will present a paper [PDF] titled "Diversity, Social Goods Provision, and Performance in the Firm". For more information, contact Loren Smith at lsmith2 at ftc dot gov or Tammy John at tjohn at ftc dot gov. Location: Room 8089, 1800 M St., NW.

5:00 PM. Deadline to submit comments to the U.S. Patent and Trademark Office (USPTO) in response to its notice of proposed rulemaking (NPRM) regarding practice before the Board of Patent Appeals and Interferences (BPAI) in ex parte patent appeals. See, notice in the Federal Register, November 15, 2010, Vol. 75, No. 219, at Pages 69827-69849.

6:00 - 9:15 PM. The DC Bar Association will host an event titled "Intellectual Property Law 2010: Year in Review Series:Copyright and Trademark Update". The speakers will be Brian Banner (H&A Intellectual Property Law) and Terence Ross (Crowell & Moring). The price to attend ranges from $89 to $129. For more information, contact 202-626-3488. See, notice. CLE credits. Location: DC Bar Conference Center, B-1 Level, 1250 H St., NW.

TIME? U.S. Trade Representative Ron Kirk, Secretary of Commerce Gary Locke, and others will participate in a closed meeting of the U.S.-China Joint Commission on Commerce and Trade (JCCT). See, OUSTR calendar.

Wednesday, December 15

The House will meet at 10:00 AM for legislative business. The schedule includes consideration of S 30 [LOC | WW], the "Truth in Caller ID Act of 2009", and S 3386 [LOC | WW], the "Restore Online Shoppers' Confidence Act". The schedule for the week also includes HR 4853 [LOC | WW], the vehicle for extending certain expiring tax provisions. See, Rep. Hoyer's notice.

9:30 AM. The Common Cause will host a news conference regarding Senate filibuster reform. For more information, contact Mary Boyle at 202-736-5770 or mboyle at commoncause dot org. Location: National Press Club.

RESCHEDULED FOR DECEMBER 21. 10:30 AM. The Federal Communications Commission (FCC) may hold an event titled "open meeting". The agenda may include adoption of a network neutrality order. Location: FCC, Commission Meeting Room, 445 12th St., SW.

6:00 - 8:15 PM. The DC Bar Association will host an event titled "Intellectual Property Law 2010: Year in Review Series: Patent Update". The speakers will be Eric Wright (Stites & Harbison) and Bradley Wright (Banner & Witcoff). The price to attend ranges from $89 to $129. For more information, contact 202-626-3488. See, notice. CLE credits. Location: DC Bar Conference Center, B-1 Level, 1250 H St., NW.

Deadline to submit applications to participate in the Federal Communications Commission's (FCC) Auction 90, regarding certain VHF construction permits. See, FCC September 8, 2010, Public Notice (DA 10-1351 in AU Docket No. 10-147) and notice in the Federal Register, September 23, 2010, Vol. 75, No. 184, at Pages 57947-57952. See also, November 1, 2010, Public Notice (DA 10-2008 in in AU Docket No. 10-147). And see, notice in the Federal Register, December 1, 2010, Vol. 75, No. 230, at Page 74719-74731.

Thursday, December 16

The House will meet at 10:00 AM for legislative business. The schedule for the week also includes HR 4853 [LOC | WW], the vehicle for extending certain expiring tax provisions. See, Rep. Hoyer's notice.

8:00 AM - 2:00 PM. The Atlantic and Government Executive will host an event titled "Cyber Security Forum". See, notice. Location: National Press Club,13th Floor, 529 14th St. NW.

9:30 AM - 5:00 PM. The Federal Communications Commission's (FCC) North American Numbering Council (NANC) will meet. See, notice in the Federal Register, November 30, 2010, Vol. 75, No. 229, at Pages 74051-74052. Location: FCC, Commission Meeting Room (Room TW-C305), 445 12th St., SW.

9:30 AM. The House Judiciary Committee (HJC) will hold a hearing titled "Espionage Act and the Legal and Constitutional Issues Raised by WikiLeaks". See, notice. The HJC will webcast this event. Location: Room 2141, Rayburn Building.

9:30 AM - 4:00 PM. The Department of Justice's (DOJ) Civil Right Division (CRD) will hold a hearing regarding its four notice of proposed rulemakings (NPRMs) that propose to expand the scope of the Americans with Disabilities Act (ADA) to regulate certain communications and information technologies. See, story titled "DOJ/CRD Releases Advance NPRMs Proposing Expansion of ADA" in TLJ Daily E-Mail Alert No. 2,111, July 26, 2010. Location: U.S. Access Board, 1331 F St., NW.

12:00 NOON - 1:30 PM. The Federal Communications Bar Association's (FCBA) will host a lunch. The speaker will be Erwin Chemerinsky. The topic will be "Approaches to First Amendment regulations with the distinctions between traditional mediums disappearing with a lot of discussion of the Fox indecency case". The price to attend ranges from $25 to $40. See, registration form. Registrations and cancellations are due by 12:00 NOON on December 14. Location: Hogan Lovells, 555 13th St., NW.

5:30 - 7:30 PM. The Federal Communications Bar Association's (FCBA) Homeland Security and Emergency Communications Committee will host an event titled "Holiday Happy Hour Mentoring Opportunity for Young Lawyers. The speakers will include James Barnett (Chief of the FCC's Public Safety and Homeland Security Bureau). For more information, contact Jeff Cohen at jeff dot cohen at mail dot house.gov or Mark Brennan at mark dot brennan at hoganlovells dot com. Location: Mandarin Hotel, Empress Lounge, 1330 Maryland Ave., SW.

TIME? U.S. Trade Representative Ron Kirk and European Commissioner for Trade Karel DeGucht will hold a closed meeting. See, OUSTR calendar.

TIME? Miriam Sapiro (Deputy USTR) will hold a closed meeting with the member companies of the Information Technology Industry Council (ITIC). See, OUSTR calendar.

Deadline to submit initial comments to the Federal Communications Commission (FCC) in response to its Notice of Proposed Rulemaking (NPRM) [58 pages in PDF] regarding universal service subsidies and certain 3G and next generation wireless services. The FCC adopted and released this item on October 14, 2010. It is FCC 10-182 in WT Docket No. 10-208. See, notice in the Federal Register, November 1, 2010, Vol. 75, No. 210, at Pages 67060-67077. See also, story titled "FCC Adopts NPRM Regarding Universal Service Subsidies for 3G and Next Generation Wireless" in TLJ Daily E-Mail Alert No. 2,142, October 19, 2010.

Deadline to submit initial comments to the Federal Communications Commission (FCC) in response to its Notice of Proposed Rulemaking (NPRM) regarding expanding the FCC's universal service program to subsidize certain 3G and next generation wireless services. The FCC calls this its "Mobility Fund". The FCC adopted and released this item on October 14, 2010. It is FCC 10-182 in WT Docket No. 10-208. See, notice in the Federal Register, November 12, 2010, Vol. 75, No. 218, Page 69374-69395. See also, story titled "FCC Adopts NPRM Regarding Universal Service Subsidies for 3G and Next Generation Wireless" in TLJ Daily E-Mail Alert No. 2,142, October 19, 2010.

Friday, December 17

The House may meet at 9:00 AM for legislative business. The schedule for the week also includes HR 4853 [LOC | WW], the vehicle for extending certain expiring tax provisions. See, Rep. Hoyer's notice.

10:00 AM. Deadline for foreign governments to submit comments to the Office of the U.S. Trade Representative (OUSTR) regarding its Special 301 out of cycle review of the Philippines and Thailand. These reviews pertain to identifying countries that deny adequate and effective protection of intellectual property rights (IPR) or deny fair and equitable market access to U.S. persons who rely on intellectual property protection. See, notice in the Federal Register, November 12, 2010, Vol. 75, No. 218, at Pages 69519-69520.

12:00 NOON. Deadline to submit initial comments to the Office of the U.S. Trade Representative (OUSTR) regarding its review of the operation, effectiveness, and implementation of and compliance with various telecommunications agreements, including the World Trade Organization (WTO) General Agreement on Trade in Services. See, notice in the Federal Register, November 18, 2010, Vol. 75, No. 222, at Pages 70770-70771.

Deadline to submit initial comments to the Federal Communications Commission (FCC) in response to its Further Notice of Proposed Rulemaking (FNPRM) regarding the appropriate date for the termination of analog operations in the low power television and Class A television services. The FCC adopted and released this item on September 17, 2010. This item is FCC 10-172 in MB Docket No. 03-185. See, notice in the Federal Register, October 18, 2010, Vol. 75, No. 200, at Pages 63766-63773.

Deadline to submit reply comments to the Federal Communications Commission (FCC) in response to its Notice of Proposed Rulemaking (NPRM) regarding assignment of telephone numbers associated with internet based Telecommunications Relay Service (iTRS), Video Relay Service (VRS) and IP Relay. The FCC adopted this item on September 16, 2010, and released the text on September 17. It is FCC 10-161 in CG Docket No. 03-123, WC Docket No. 05-196, and WC Docket No. 10-191. See, notice in the Federal Register, November 2, 2010, Vol. 75, No. 211, at Pages 67333-67341.

Monday, December 20

EXTENDED TO JANUARY 31. Deadline to submit initial comments to the Library of Congress's (LOC) Copyright Office (CO) in response to its Notice of Inquiry (NOI) regarding federal coverage of sound recordings fixed before February 15, 1972. See, notice in the Federal Register, November 3, 2010, Vol. 75, No. 212, at Pages 67777-67781. This proceeding is LOC Docket No. 2010-4. See also, story titled "Library of Congress Issues NOI on Extending Copyright Act to Pre 1972 Sound Recordings" in TLJ Daily E-Mail Alert No. 2,150, November 8, 2010. See also, extension notice in the Federal Register, December 1, 2010, Vol. 75, No. 230, at Pages 74749-74750.

People and Appointments

12/10. The Interactive Advertising Bureau (IAB) promoted Mike Zaneis to SVP and General Counsel. He had been VP for Public Policy. The IAB stated in a release that "Zaneis will continue to lead the IAB's public policy office and guide the strategy of the self-regulatory privacy program. Additionally, he will oversee outside counsel and coordinate all IAB legal resources in industry relations, public policy and other critical initiatives. The IAB also named Patrick Dolan EVP and COO; he was previously EVP and Chief Administrative Officer. The IAB also named David Doty SVP and Chief Marketing Officer; he was previously SVP for Marketing & Thought Leadership.

More News

12/9. Bruce Fein told Rep. John Conyers (D-MI), the Chairman of the House Judiciary Committee (HJC), during a HJC hearing on December 9, 2010, that because of Republican and Democratic administrations' refusals to comply with Congressional subpoenas, "you know more about the U.S. from reading WikiLeaks than you get from classified briefings".

12/6. The National Institute of Standards and Technology's (NIST) Computer Security Division (CSD) released its draft SP 800-51 Rev. 1 [13 pages in PDF], titled "Guide to Using Vulnerability Naming Schemes". January 3, 2011 is the deadline to submit comments.

12/6. The National Institute of Standards and Technology's (NIST) Computer Security Division (CSD) released its draft NIST IR-7694 [24 pages in PDF], titled "Specification for the Asset Reporting Format 1.1". January 3, 2011 is the deadline to submit comments.

12/6. The National Institute of Standards and Technology's (NIST) Computer Security Division (CSD) released its draft NIST IR-7693 [32 pages in PDF], titled "Specification for Asset Identification 1.1". January 3, 2011 is the deadline to submit comments.

About Tech Law Journal

Tech Law Journal publishes a free access web site and a subscription e-mail alert. The basic rate for a subscription to the TLJ Daily E-Mail Alert is $250 per year for a single recipient. There are discounts for subscribers with multiple recipients.

Free one month trial subscriptions are available. Also, free subscriptions are available for federal elected officials, and employees of the Congress, courts, and executive branch. The TLJ web site is free access. However, copies of the TLJ Daily E-Mail Alert are not published in the web site until two months after writing.

For information about subscriptions, see subscription information page.

Tech Law Journal now accepts credit card payments. See, TLJ credit card payments page.

Solution Graphics

TLJ is published by David Carney
Contact: 202-364-8882.
carney at techlawjournal dot com
P.O. Box 4851, Washington DC, 20008.

Privacy Policy
Notices & Disclaimers
Copyright 1998-2010 David Carney. All rights reserved.