We don’t have a summary available yet.
The summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress, and was published on Dec 16, 2015.
Liberty Through Strength Act II
This bill requires the National Security Agency (NSA) to have access to business records, telephone call records, and other tangible things collected under the Foreign Intelligence Surveillance Act of 1978 (FISA) prior to November 29, 2015, in the same manner and for the same purposes for which the NSA had access to such records prior to such date (thereby allowing the NSA to access such records in the same manner as prior to the effective date of amendments made by the USA FREEDOM Act of 2015).
The NSA must maintain such records for five years after they are acquired.
The NSA's authority to access such business records under this Act shall be in effect for five years after enactment of this Act.
The bill amends the USA PATRIOT Improvement and Reauthorization Act of 2005, the Intelligence Reform and Terrorism Prevention Act of 2004, and the FISA Amendments Act of 2008 to make permanent expiring FISA provisions concerning: (1) roving electronic surveillance orders, (2) a revised definition of "agent of a foreign power" that includes any non-U.S. persons who engage in international terrorism or preparatory activities (commonly referred to as the "lone wolf" provision), and (3) authority for the Department of Justice and the Director of National Intelligence to authorize the targeting of non-U.S. persons located outside the United States to acquire foreign intelligence information.
The federal criminal code is amended to: (1) return procedures for the Federal Bureau of Investigation's (FBI's) access to toll and transactional records to how they operated prior to the USA FREEDOM Act in order to allow the FBI (without using a term that specifically identifies a person, entity, telephone, or account) to request the name, address, length of service, and local and long distance toll billing records of a person or entity if the FBI certifies to the wire or electronic communication service provider that such information is relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities; and (2) add electronic communications transactional records as information that the FBI may request under such certification procedures.