KLAYMAN v. OBAMA et al

Filing 44

MEMORANDUM by LARRY E. KLAYMAN, CHARLES STRANGE, MARY ANN STRANGE. (Attachments: # 1 Exhibit 1 -- Binder Part 1, # 2 Exhibit 1 -- Binder Part 2, # 3 Exhibit 2 -- Gov't Opposition in In Re Epic)(Klayman, Larry)

Download PDF
Exhibit 1 11/26/13 Edward Snowden Interview Transcript FULL TEXT: Read the Guardian's Entire Interview With the Man Who Leaked PRISM - PolicyMic Edward Snowden Interview Transcript FULL TEXT: Read the Guardian's Entire Interview With the Man Who Leaked PRISM Image Credit: The Guardian The NSA whistleblower who revealed the PRISM program has publically revealed himself to be Edward Snowdern, a former private contactor for the NSA. He gave an interview with journalist Glenn Greenwald about his thoughts on his reasons behind whistleblowing and what what his experience in the NSA was like. The following is a transcript of the entire video interview. Edward Snowden: "My name is Ed Snowden, I'm 29 years old. I worked for Booz Allen Hamilton as an infrastructure analyst for NSA in Hawaii. Glenn Greenwald: "What are some of the positions that you held previously within the intelligence community?" Snowden: "I've been a systems engineer, systems administrator, senior adviser for the Central Intelligence Agency, solutions consultant, and a telecommunications informations system officer." Greenwald: "One of the things people are going to be most interested in, in trying to understand what, who you are and what you are thinking is there came some point in time when you crossed this line of thinking about being a whistleblower to making the choice to actually become a whistleblower. Walk people through that decision making process." Snowden: "When you're in positions of privileged access like a systems administrator for the sort of intelligence community agencies, you're exposed to a lot more information on a broader scale then the average employee and because of that you see things that may be disturbing but over the course of a normal person's career you'd only see one or two of these instances. When you see everything you see them on a more frequent basis and you recognize that some of these things are actually abuses. And when you talk to people about them in a place like this where this is the normal state of business people tend not to take them very seriously and move on from them." "But over time that awareness of wrongdoing sort of builds up and you feel compelled to talk about. And the more you talk about the more you're ignored. The more you're told its not a problem until eventually you realize that these things need to be determined by the public and not by somebody who was simply hired by the government." Greenwald: "Talk a little bit about how the American surveillance state actually functions. Does it target the actions of Americans?" Snowden: "NSA and intelligence community in general is focused on getting intelligence wherever it can by any means possible. It believes, on the grounds of sort of a selfcertification, that they serve the national interest. Originally we saw that focus very narrowly tailored as foreign intelligence gathered overseas." "Now increasingly we see that it's happening domestically and to do that they, the NSA specifically, targets the communications of everyone. It ingests them by default. It collects them in its system and it filters them and it analyses them and it measures them and it stores them for periods of time simply because that's the easiest, most efficient, and most valuable way to achieve these ends. So while they may be intending to target someone associated with a foreign government or someone they suspect of terrorism, they're collecting you're communications to do so." "Any analyst at any time can target anyone, any selector, anywhere. Where those communications will be picked up depends on the range of the sensor networks and the authorities that analyst is empowered with. Not all analysts have the ability to target everything. But I sitting at my desk certainly had the authorities to wiretap anyone from you or your accountant to a Federal judge to even the President if I had a personal e-mail." Greenwald: "One of the extraordinary parts about this episode is usually whistleblowers do what they do anonymously and take steps to remain anonymous for as long as they can, which they hope often is forever. You on the other hand have decided to do the opposite, which is to declare yourself openly as the person behind these disclosures. Why did you choose to do that?" Snowden: "I think that the public is owed an explanation of the motivations behind the people who make these disclosures that are outside of the democratic model. When you are subverting the power of government that's a fundamentally dangerous thing to democracy and if you do that in secret consistently as the government does when it wants to benefit from a secret action that it took. It'll kind of give its officials a mandate to go, 'Hey tell the press about this thing and that thing so the public is on our side.' But they rarely, if ever, do that when an abuse occurs. That falls to individual citizens but they're typically maligned. It becomes a thing of 'These people are against the country. They're against the government' but I'm not." www.policymic.com/articles/47355/edward-snowden-interview-transcript-full-text-read-the-guardian-s-entire-interview-with-the-man-who-leaked-prism 2/10 11/26/13 Edward Snowden Interview Transcript FULL TEXT: Read the Guardian's Entire Interview With the Man Who Leaked PRISM - PolicyMic "I'm no different from anybody else. I don't have special skills. I'm just another guy who sits there day to day in the office, watches what's happening and goes, 'This is something that's not our place to decide, the public needs to decide whether these programs and policies are right or wrong.' And I'm willing to go on the record to defend the authenticity of them and say, 'I didn't change these, I didn't modify the story. This is the truth; this is what's happening. You should decide whether we need to be doing this.'" Greenwald: "Have you given thought to what it is that the US government's response to your conduct is in terms of what they might say about you, how they might try to depict you, what they might try to do to you?" Snowden: "Yeah, I could be rendered by the CIA. I could have people come after me. Or any of the third-party partners. They work closely with a number of other nations. Or they could pay off the Traids. Any of their agents or assets. We've got a CIA station just up the road and the consulate here in Hong Kong and I'm sure they're going to be very busy for the next week. And that's a fear I'll live under for the rest of my life, however long that happens to be." "You can't come forward against the world's most powerful intelligence agencies and be completely free from risk because they're such powerful adversaries. No one can meaningfully oppose them. If they want to get you, they'll get you in time. But at the same time you have to make a determination about what it is that's important to you. And if living unfreely but comfortably is something you're willing to accept, and I think it many of us are it's the human nature; you can get up everyday, go to work, you can collect your large paycheck for relatively little work against the public interest, and go to sleep at night after watching your shows." "But if you realize that that's the world you helped create and it's gonna get worse with the next generation and the next generation who extend the capabilities of this sort of architecture of oppression, you realize that you might be willing to accept any risk and it doesn't matter what the outcome is so long as the public gets to make their own decisions about how that's applied." Greenwald: "Why should people care about surveillance?" Snowden: "Because even if you're not doing anything wrong you're being watched and recorded. And the storage capability of these systems increases every year consistently by orders of magnitude to where it's getting to the point where you don't have to have done anything wrong. You simply have to eventually fall under suspicion from somebody even by a wrong call. And then they can use this system to go back in time and scrutinize every decision you've ever made, every friend you've ever discussed something with. And attack you on that basis to sort to derive suspicion from an innocent life and paint anyone in the context of a wrongdoer." Greenwald: "We are currently sitting in a room in Hong Kong, which is where we are because you travelled here. Talk a little bit about why it is that you came here and specifically there are going to be people…people speculate that what you really intend to do is to defect to the country that many see as the number one rival of the Untied States, which is China. And that what you are really doing is essentially seeking to aid an enemy of the United States with which you intend to seek asylum. Can you talk a little about that?" Snowden: "Sure. So there's a couple assertions in those arguments that are sort of embedded in the questioning of the choice of Hong Kong. The first is that China is an enemy of the United States. It's not. I mean there are conflicts between the United States government and the Chinese PRC government but the peoples inherently we don't care. We trade with each other freely, we're not at war, we're not in armed conflict, and we're not trying to be. We're the largest trading partners out there for each other." "Additionally, Hong Kong has a strong tradition of free speech. People think 'Oh China, Great Firewall.' Mainland China does have significant restrictions on free speech but the people of Hong Kong have a long tradition of protesting in the streets, of making there views known. The internet is not filtered here more so then any other western government and I believe that the Hong Kong government is actually independent in relation to a lot of other leading western governments." Greenwald: "If your motive had been to harm the United States and help its enemies or if your motive had been personal material gain were there things you could have done with these documents to advance those goals that you didn't end up doing?" Snowden: "Oh absolutely. Anyone in the positions of access with the technical capabilities that I had could suck out secrets, pass them on the open market to Russia; they always have an open door as we do. I had access to the full rosters of everyone working at the NSA, the entire intelligence community, and undercover assets all over the world. The locations of every station, we have what their missions are and so forth." "If I had just wanted to harm the US? You could shut down the surveillance system in an afternoon. But that's not my intention. I think for anyone making that argument they need to think, if they were in my position and you live a privileged life, you're living in Hawaii, in paradise, and making a ton of money, 'What would it take you to leave everything behind?'" "The greatest fear that I have regarding the outcome for America of these disclosures is that nothing will change. People will see in the media all of these disclosures. They'll know the lengths that the government is going to grant themselves powers unilaterally to create greater control over American society and global society. But they won't be willing to take the risks necessary to stand up and fight to change things to force their representatives to actually take a stand in their interests." "And the months ahead, the years ahead it's only going to get worse until eventually there will be a time where policies will change because the only thing that restricts the activities of the surveillance state are policy. Even our agreements with other sovereign governments, we consider that to be a stipulation of policy rather then a stipulation of law. And because of that a new leader will be elected, they'll find the switch, say that 'Because of the crisis, because of the dangers we face in the world, some new and unpredicted threat, we need more authority, we need more power.' And there will be nothing the people can do at that point to oppose it. And it will be turnkey tyranny." Like us on Facebook: SHARE TWEET Like 54k Gabriel Rodriguez Gabriel Rodriguez is currently studying for a Masters in Applied Economics at Georgetown. He is a graduate of New College of Florida with a degree in Economics. He is interested in behavioral economics, development economic, fishing economics, and ... Follow @Zikan YOU MIGHT BE INTERESTED IN www.policymic.com/articles/47355/edward-snowden-interview-transcript-full-text-read-the-guardian-s-entire-interview-with-the-man-who-leaked-prism 3/10 Exhibit 2 TOP SECRET//SI//NOFORN UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. IN REAPPLICATION OF THE FEDERAL BUREAU OF INVESTIGATION Docket Number: BR · FOR AN ORDER REQUIRING THE PRODUCTION OF TANGIBLE THINGS FROM VERIZON BUSINESS NETWORK SERVICES, 1 3INC. ON BEHALF OF MCI COMMUNICATION SERVICES, INC. D/B/A VERIZON BUSINESS SERVICES. 8 0 SECONDARY ORDER This Court having found that the Application of the Federal Bureau of Investigation (FBI) for an Order requiring the production of tangible things from Verizon Business Network Services, Inc. on behalf of MCI Communication Services Inc., d/b/a Verizon Business Services (individually and collectively "Verizon") satisfies the requirements of 50 U.S.C. § 1861, IT IS HEREBY ORDERED that, the Custodian of Records shall produce to the National Security Agency (NSA) upon service of this Order, and continue production TOP SECRET//SI//NOFORN Derived from: Declassify on: . Pleadings in the above-captioned docket 12 April 2038 TOP SECRET//SI//NOFORN on an ongoing daily basis thereafter for the duration of this Order, unless otherwise ordered by the Court, an electronic copy of the following tangible things: all call detail records or "telephony metadata" created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local telephone calls. This Order does not require Verizon to produce telephony metadata for communications wholly originating and terminating in foreign countries. Telephony metadata includes comprehensive communications routing information, including but not limited to session identifying information (e.g., originating and terminating telephone number, International Mobile Subscriber Identity (IMSI) number, International Mobile station Equipment Identity (IMEI) number, etc.), trunk identifier, telephone calling card numbers, and time and duration of call. Telephony metadata does not include the substantive content of any communication, as defined by 18 U.S.C. § 2510(8), or the name, address, or financial information of a subscriber or customer. IT IS FURTHER ORDERED that no person shall disclose to any other person that the FBI or NSA ,has sought or obtained tangible things under this Order, other than to: (a) those persons to whom disclosure is necessary to comply with such Order; (b) an attorney to obtain legal advice or assistance with respect to the production of things in response to the Order; or (c) other persons as permitted by the Director of the FBI or the Director's designee. A person to whom disclosure is made pursuant to (a), (b), or (c) TOP SECRET//SI//NOFORN 2 TOP SECRET//SI//NOFORN shall be subject to the nondisclosure requirements applicable to a person to whom an Order is directed in the same manner as such person. Anyone who discloses to a person described in (a), (b), or (c) that the FBI or NSA has sought or obtained tangible things pursuant to this Order shall notify such person of the nondisclosure requirements of this Order. At the request of the Director of the FBI or the designee of the Director, any person making or intending to make a disclosure under (a) or (c) above shall identify to the Director or such designee the person to whom such disclosure will be made or to whom such disclosure was made prior to the request. IT IS FURTHER ORDERED that service of this Order shall be by a method agreed upon by the Custodian of Records of Verizon and the FBI, and if no agreement is reached, service shall be personal. -- Remainder of page intentionally left blank. -- TOP SECRET//SI//NOFORN 3 TOP SECRET//SI//NOFORN This authorization requiring the production of certain call detail records or utelephony metadata" created by Verizon expires on the /'Ji" day of July, 2013, at 5:00p.m., Eastern Time. Signed ~] :'t - ? 5- 2. 0 l 3 po : :z6 z _ _ _ _ _ _ _ _ _ _ _ Eastern Time Date Time Jud , nited States Foreign Int lligence Surveillance Court !, Beverly C. Queen, Chief Deputy Clerk, FISC, certify that this document is a true and correct copy of the original~ TOP SECRET//SI//NOFORN 4 Exhibit 3 TOPSECRETn~V~FOftN UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. IN REAPPLICATION OF THE FEDERAL BUREAU OF INVESTIGATION FOR AN ORDER REQUIRING TIIE PRODUCTION OF TANGffiLE THINGS FRO~ Docket Number: BR 13-158 MEMORANDUM The Court has today issued the Primary Order appended hereto granting the "Application for Certain Tangible Things for Investigations to Protect Against International Terrorism" ("Application"), which was submitted to the Court on October TOPSECRETHSY~OFORN TOP SECRETHSI//NOFORN 10, 2013, by the Federal Bureau of Investigation ("FBI"). The Application requested the issuance of orders pursuant to 50 U.S.C. § 1861, as amended (also known as Section 215 of the USA PATRIOT Act), requiring the ongoing daily production to the National Security Agency ("NSA") of certain telephone call detail records in bulk. The Primary Order appended hereto renews the production of records made pursuant to the similar Primary Order issued by the Honorable Claire V. Eagan of this Court on July 19, 2013 in Docket Number BR 13-109 ("July 19 Primary Order"). Qn August 29, 2013, Judge Eagan issued an Amended Memorandum Opinion setting forth her reasons for issuing the July 19 Primary Order ("August 29 Opinion"). Following a declassification review by the Executive Branch, the Court published the July 19 Primary Order and August 29 Opinion in redacted form on September 17, 2013. The call detail records to be produced pursuant to the orders issued today in the above-captioned docket are identical in scope and nature to the records produced in response to the orders issued by Judge Eagan in Docket Number BR 13-109. The records will be produced on terms identical to those set out in Judge Eagan's July 19 Primary Order and for the same purpose, and the information acquired by NSA through the production will be subject to the same provisions for oversight and identical restrictions on access, retention, and dissemination. TOP SECRET/JSI//NOFORN Page2 TOP SECRETHSII/NOFORN This is the first time that the undersigned has entertained an application requesting the bulk production of call detail records. The Court has conducted an independent review of the issues presented by the application and agrees with and adopts Judge Eagan's analysis as the basis fo'f granting the Application. The Court writes separately to discuss briefly the issues of "relevance" and the inapplicability of the Fourth Amendment to the production. Although the definition of relevance set forth in Judge Eagan's decision is broad, the Court is persuaded that that definition is supported by the statutory analysis set out in the August 29 Opinion. That analysis is reinforced by Congress's re-enactment of Section 215 after receiving information about the government's and the FISA Court's interpretation of the statute. Although the existence of this program was classified until several months ago, the record is clear that before the 2011 re-enactment of Section 215, many Members of Congress were aware of, and each Member had the opportunity to learn about, the scope of the meta data collection and this Court's interpretation of Section 215. Accordingly, the re-enactment of Section 215 without change in 2011 triggered the doctrine of ratification through re-enactment, which provides a strong reason for this Court to continue to adhere to its prior interpretation of Section 215. See Lorillard v. Pons, 434 U.S. 575, 580 (1978); see also EEOC v. Shell Oil Co., 466 U.S. 54, 69 (1984); Haig v. Agee, 453 U.S. 280, 297-98 (1981). TOP8ECRETI$Y/NOFORN Page3 TOP SECRE'IY/SI/INOFORN The undersigned also agrees with Judge Eagan that, under Smith v. Maryland. 442 U.S. 735 (1979), the production of call detail records in this matter does not constitute a search under the Fourth Amendment. In Smith. the Supreme Court held that the use of a pen register to record the numbers dialed from the defendant's home telephone did not constitute a search for purposes of the Fourth Amendment. In so holding, the Court stressed that the information acquired did not include the contents of any communication and that the information was acquired by the government from the telephone company, to which the defendant had voluntarily disclosed it for the purpose of completing his calls. The Supreme Court's more recent decision in United States v. Jones,- U.S.-, 132 S. Ct. 945 (2012), does not point to a different result here. Ione.§ involved the acquisition of a different type of information through different means. There, law enforcement officers surreptitiously attached a Global Positioning System (GPS) device to the defendant's vehicle and used it to track his location for 28 days. The Court held in Justice Scalia's majority opinion that the officers' conduct constituted a search under the Fourth Amendment because the information at issue was obtained by means of a physical intrusion on the defendant's vehicle, a constitutionally-protected area. The majority declined to decide whether use of the GPS device, without the physical intrusion, impinged upon a reasonable expectation of privacy. TOP SECRETHSI/INOFORN Page4 TOP SECRETNSIIINOFORN Five Justices in Jones signed or joined concurring opinions suggesting that the precise, pervasive monitoring by the government of a person's location could trigger Fourth Amendment protection even without any physical intrusion. This matter, however, involves no such monitoring. Like Smith, this case concerns the acquisition of non-content metadata other than location information. See Aug. 29 Op. at 29 at 4 n.5; iQ.. at 6 & n.10. Justice Sotomayor stated in her concurring opinion in Jones that it 11may be necessary" for the Supreme Court to reconsider the premise that an individual has no /I reasonable expectation of privacy in information voluntarily disclosed to third parties," which she described as 11ill suited to the digital age." See Jones, 132 S. Ct. at 957 (Sotomayor, J., concurring) (citing Smith and United States v. Miller, 425 U.S. 435,443 (1976), as examples of decisions relying upon that premise). But Justice Sotomayor also made clear that the Court undertook no such reconsideration in Jones. See id. ("Resolution of these difficult questions in this case is unnecessary, however, because the Government's physical intrusion on Jones' Jeep supplies a narrower basis for decision."). The Supreme Court may some day revisit the third-party disclosure principle in the context of twenty-first century communications technology, but that day has not arrived. Accordingly, Smith remains controlling with respect to the acquisition by the government from service providers of non-content telephony TOP SECRETHSIIJNOFORN Page 5 J'OP SECRET//BI//NOFORN metadata such as the information to be produced in this matter. In light of the public interest in this matter and the government's declassification of related materials, including substantial portions of Judge Eagan's August 29 Opinion and July 19 Primary Order, the undersigned requests pursuant to FISC Rule 62 that this Memorandum and the accompanying Primary Order also be published and directs such request to the Presiding Judge as required by the Rule. ENTERED this 11th day of October, 2013. Judge, nited States Foreign Intelligence Surveillance Court TOPSECRETHSY~OFORN Page6 TOP SBCRETI/Sli/NOFORN UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D. C. IN REAPPLICATION OF THE FEDERAL BUREAU OF INVESTIGATION FOR AN ORDER REQUIRING THE PRODUCTION OF TANGIBLE TIDNGS FROM Docket Number: BR 13-158 PRIMARY ORDER A verified application having been made by the Director of the Federal Bureau of Investigation (FBI) for an order pursuant to the Foreign Intelligence Surveillance Act of 1978 (the Act), Title 50, United States Code (U.S.C.), § 1861, as amended, requiring the TOP SECRET//Sli/NOFORN Derived from: Declassify on: Pleadings in the above-captioned docket TOP SECRET/ISI//NOFORN production to the National Security Agency (NSA) of the tangible things described below, and full consideration having been given to the matters set forth therein, the Court finds as follows: 1. There are reasonable grounds to believe that the tangible things sought are relevant to authorized investigations (other than threat assessments) being conducted by the FBI under guidelines approved by the Attorney General under Executive Order 12333 to protect against international terrorism, which investigations are not being conducted solely upon the basis of activities protected by the First Amendment to the Constitution of the United States. [50 U.S.C. § 1861(c)(l)] 2. The tangible things sought could be obtained with a subpoena duces tecum issued by a court of the United States in aid of a grand jury investigation or with any other order issued by a court of the United States directing the production of records or tangible things. [50 U.S.C. § 1861(c)(2)(D)] 3. The application includes an enumeration of the minimization procedures the government proposes to follow with regard to the tangible things sought. Such procedures are similar to the minimization procedures approved and adopted as binding by the order of this Court in Docket Number BR 13-109 and its predecessors. [50 U.S.C. § 1861(c)(l)] TOP SBCRBT//SII/NOFORN 2 TOP SECRET/ISI//NOFORN Accordingly, and as further explained in the accompanying Memorandum, the Court finds that the application of the United States to obtain the tangible things, as described below, satisfies the requirements of the Act and, therefore, IT IS HEREBY ORDERED, pursuant to the authority conferred on this Court by the Act, that the application is GRANTED, and it is FURTHER ORDERED, as follows: (1 )A. The Custodians of Records produce to NSA upon service of the appropriate secondary order, and continue production on an ongoing daily basis thereafter for the duration of this order, unless otherwise ordered by the Court, an electronic copy of the following tangible things: all call detail records or "telephony metadata" 1 created B. The Custodian of Records of shall produce to NSA upon service of the appropriate secondary order, and continue production on an ongoing daily basis t For purposes of this Order "telephony metadata" includes comprehensive communications routing information, including but not limited to session identifying information (e.g., originating and terminating telephone number, International Mobile Subscriber Identity (IMSI) number, International Mobile station Equipment Identity (IMEI) number, etc.), trunk identifier, telephone calling card numbers, and time and duration of call. Telephony metadata does not include the substantive content of any communication, as defined by 18 U.S.C. § 2510(8), or the name, address, or financial information of a subscriber or customer. Furthermore, this Order does not authorize the production of cell site location information (CSLI). TOP SECRET//SII/NOFORN 3 TOP SBCRET/1-SI//:NOFORN thereafter for the duration of this order, unless otherwise ordered by the Court, an electronic copy of the following tangible things: all call detail records or "telephony metadata" created b~or communications (i) between the United States and abroad; or (ii) wholly within the United States, including local telephone calls. . . (2) With respect to any information the FBI receives as a result of this Order (information that is disseminated to it by NSA), the FBI shall follow as minimization procedures the procedures set forth in The Attorney General's Guidelines for Domestic FBI Operations (September 29, 2008). (3) With respect to the information that NSA receives as a result of this Order, NSA shall strictly adhere to the following minimization procedures: A. The government is hereby prohibited from accessing business record metadata acquired pursuant to this Court's orders in the above-captioned docket and its predecessors ("BR metadata") for any purpose except as described herein. B. NSA shall store and process the BR metadata in repositories within secure networks under NSA' s control. 2 The BR meta data shall carry unique markings such The Court understands that NSA will maintain the BR metadata in recovery back-up systems for mission assurance and continuity of operations purposes. NSA shall ensure that any access 2 TOPSBCREt~~llfNOFORN 4 TOP SECRET//Sl//NOFORN that software and other controls (including user authentication services) can restrict access to it to authorized personnel who have received appropriate and adequate training with regard to this authority. NSA shall restrict access to the BR metadata to authorized personnel who have received appropriate and adequate training. 3 Appropriately trained and authorized technical personnel may access the BR metadata to perform those processes needed to make it usable for intelligence analysis. Technical personnel may query the BR metadata using selection terms 4 that have not been RASapproved (described below) for those purposes described above, and may share the results of those queries with other authorized personnel responsible for these purposes, or use of the BR metadata in the event of any natural disaster, man-made emergency, attack, or other unforeseen event is in compliance with the Court's Order. The Court understands that the technical personnel responsible for NSA' s underlying corporate infrastructure and the transmission of the BR metadata from the specified persons to NSA, will not receive special training regarding the authority granted herein. 3 TOP SECRET//Sl//-NOFORN 5 TOP SECRET/!SIJ,lNOFORN but the results of any such queries will not be used for intelligence analysis purposes. An authorized technician may access the BR metadata to ascertain those identifiers that may be high volume identifiers. The technician may share the results of any such access, i.e., the identifiers and the fact that they are high volume identifiers, with authorized personnel (including those responsible for the identification and defeat of high volume and other unwanted BR metadata from any of NSA's various metadata repositories), but may not share any other information from the results of that access for intelligence analysis purposes. In addition, authorized technical personnel may access the BR metadata for purposes of obtaining foreign intelligence information pursuant to the requirements of subparagraph (3)C below. C. NSA shall access the BR metadata for purposes of obtaining foreign intelligence information only through queries of the BR metadata to obtain contact chaining information as described in paragraph 17 of the Declaration o -attached to the application as Exhibit A, using selection terms approved as "seeds" pursuant to the RAS approval process described below. 5 NSA shall ensure, s For purposes of this Order, "National Security Agency'' and "NSA personnel" are defined as any employees of the National Security Agency/Central Security Service ("NSA/CSS" or "NSA") and any other personnel engaged in Signals Intelligence (SIGINT) operations authorized pursuant to FISA if such operations are executed under the direction, authority, or control of the Director, NSA/Chie£, CSS (DIRNSA). NSA personnel shall not disseminate BR metadata outside the NSA unless the dissemination is permitted by, and in accordance with, the requirements of this Order that are applicable to the NSA. TOP SISCR'ET/l.SII/NOFORN 6 TOP SECRET//Sl//NOFORN through adequate and appropriate technical and management controls, that queries of the BR metadata for intelligence analysis purposes will be initiated using only a selection term that has been RAS-approved. Whenever the BR metadata is accessed for foreign intelligence analysis purposes or using foreign intelligence analysis query tools, an auditable record of the activity shall be generated. 6 (i} Except as provided in subparagraph (ii} below, all selection terms to be used as "seeds" with which to query the BR metadata shall be approved by any of the following designated approving officials: the Chief or Deputy Chief, Homeland Security Analysis Centerj or one of the twenty specially-authorized Homeland Mission Coordinators in the Analysis and Production Directorate of the Signals Intelligence Directorate. Such approval shall be given only after the designated approving official has determined that based on the factual and practical considerations of everyday life on which reasonable and prudent persons act, there are facts giving rise to a reasonable, articulable suspicion (RAS) that the selection term to be queried is associated 6 This auditable record requirement shall not apply to accesses of the results of RAS-approved 7 TOP SECRET//SI//NOFORN 8 TOPSECRETh~YANOPORN shall first determine that any selection term reasonably believed to be used by a United States (U.S.) person is not regarded as associated wi~ First Amendment to the Constitution. (ii) Selection terms that are currently the subject of electronic surveillance authorized by the Foreign Intelligence Surveillance Court (FISC) based on the FISC's finding of probable cause to believe that they are used by - including those used by U.S. persons, may be deemed approved for querying for the period of FISC-authorized electronic surveillance without review and approval by a designated approving official. The preceding sentence shall not apply to selection terms under surveillance TOP SECRET!l-SI#NOPORN 9 TOPSECRETHSYfNOFORN pursuant to any certification of the Director of National Intelligence and the Attorney General pursuant to Section 702 of FISA, as added by the FISA Amendments Act of 2008, or pursuant to an Order of the FISC issued under Section 703 or Section 704 of FISA, as added by the FISA Amendments Act of 2008. (iii) A determination by a designated approving official that a selection term is associated shall be effective for: one hundred eighty days for any selection term reasonably believed to be used by a U.S. person; and one year for all other selection terms. 9•10 9 The Court understands that from time to time the information available to designated approving officials will indicate that a selection term is or was associated with a Foreign Power only for a specific and limited time frame. In such cases, a designated approving official may determine that the reasonable, articulable suspicion standard is met, but the time frame for which the selection term is or was associated with a Foreign Power shall be specified. The automated query process described in th~ Declaration limits the first hop query results to the specified time frame. Analysts conducting manual queries using that selection term shall continue to properly minimize information that may be returned within query results that fall outside of that timeframe. The Court understands that NSA receiv~s certain call detail records pursuant to other authority, in addition to the call detail records produced in response to this Court's Orders. NSA shall store, handle, and disseminate call detail records produced in to this to this 10 TOP SECRET/18II/NOFORN 10 TOP SBCRETI/SI//NOFORN (iv) Queries of the BR metadata using RAS-approved selection terms may occur either by manual analyst query or through the automated query process described below. 11 This automated query process queries the collected BR metadata (in a "collection store") with RAS-approved selection terms and returns the hop-limited results from those queries to a "corporate store." The corporate store may then be searched by appropriately and adequately trained personnel for valid foreign intelligence purposes, without the requirement that those searches use only RAS-approved selection terms. The specifics of the automated query process, as described in the-Declaration, are as follows: n This automated query process was initially approved by this Court in its November 8, 2012 Order amending docket number BR 12-178. As an added protection in case teclmical issues prevent the process from verifying that the most up-to-date list of RAS-approved selection terms is being used, this step of the automated process checks the expiration dates of RAS-approved selection terms to confirm that the approvals for those terms have not expired. This step does not use expired RAS-approved selection terms to create the list of "authorized query terms" (described below) regardless of whether the list of RAS-approved selection terms is up-to-date. 12 TOP SECRET//SI//NOFORN 11 TOP SBCRET//SI/INOFORN D. Results of any intelligence analysis queries of the BR metadata may be shared, prior to minimization, for intelligence analysis purposes among NSA analysts, subject to the requirement that all NSA personnel who receive query results in any form first TOP SBCRBT//Sl//NOFORN 12 TOP 8ECRET//81!/NOFOR..l\J receive appropriate and adequate training and guidance regarding the procedures and restrictions for the handling and dissemination of such information. 15 NSA shall apply the minimization and dissemination requirements and procedures of Section 7 of United States Signals Intelligence Directive SPOOlS (USSID 18) issued on January 25, 2011, to any results from queries of the BR metadata, in any form, before the information is disseminated outside of NSA in any form. Additionally, prior to disseminating any U.S. person information outside NSA the Director of NSA, the Deputy Director of NSA, or one of the officials listed in Section 7.3(c) of USSID 18 (!&., the Director of the Signals Intelligence Directorate (SID), the Deputy Director of the SID, the Chief of the Information Sharing Services (ISS) office, the Deputy Chief of the ISS office, and the Senior Operations Officer of the National Security Operations Center) must determine that the information identifying the U.S. person is in fact related to counterterrorism information and that it is necessary to understand the counterterrorism information or assess its importance. 16 Notwithstanding the above requirements, NSA may share results from intelligence analysis queries of the BR metadata, including U.S. person identifying information, with Executive Branch 1s In addition, the Court nnderstands that NSA may apply the full range of SIGINT analytic tradecraft to the results of intelligence analysis queries of the collected BR metadata. In the event the Government encounters circumstances that it believes necessitate the alteration of these dissemination procedures, it may obtain prospectively-applicable modifications to the procedures upon a determination by the Court that such modifications are appropriate under the circumstances and in light of the size and nature of this bulk collection. 16 TOP 8ECRET//8II/NOFORN 13 TOP SECRET//SII/NOFORN personnel (1) in order to enable them to determine whether the information contains exculpatory or impeachment information or is otherwise discoverable in legal proceedings or (2) to facilitate their lawful oversight functions. E. BR metadata shall be destroyed no later than five years (60 months) after its initial collection. F. NSA and the National Security Division of the Department of Justice (NSD/Don shall conduct oversight of NSA's activities under this authority as outlined below. (i) NSA' s OGC and Office of the Director of Compliance (ODOC) shall ensure that personnel with access to the BR metadata receive appropriate and adequate training and guidance regarding the procedures and restrictions for collection, storage, analysis, dissemination, and retention of the BR metadata and the results of queries of the BR metadata. NSA' s OGC and ODOC shall further ensure that all NSA personnel who receive query results in any form first receive appropriate and adequate training and guidance regarding the procedures and restrictions for the handling and dissemination of such information. NSA shall maintain records of all such training. 17 OGC shall provide NSD/DoJ with copies The nature of the training that is appropriate and adequate for a particular person will depend on the person's responsibilities and the circumstances of his access to the BR metadata or the results from any queries of the metadata. 17 TOP SECRET/ISII/NOFORN 14 TOP SECRBT//SI//NOFORN of all formal briefing and/or training materials (including all revisions thereto) used to brief/train NSA personnel concerning this authority. (ii) NSA' s ODOC shall monitor the implementation and use of the software and other controls (including user authentication services) and the logging of auditable information referenced above. (iii) NSA's OGC shall consult with NSD/DoJ on.all significant legal opinions that relate to the interpretation, scope, and/or implementation of this authority. When operationally practicable, such consultation shall occur in advance; otherwise NSD shall be notified as soon as practicable. (iv) At least once during the authorization period, NSA's OGC, ODOC, NSD/DoJ, and any other appropriate NSA representatives shall meet for the purpose of assessing compliance with this Court's orders. Included in this meeting will be a review of NSA' s monitoring and assessment to ensure that only approved metadata is being acquired. The results of this meeting shall be reduced to writing and submitted to the Court as part of any application to renew or reinstate the authority requested herein. (v) At least once during the authorization period, NSD/DoJ shall meet with NSA' s Office of the Inspector General to discuss their respective oversight responsibilities and assess NSA' s compliance with the Court's orders. TOP SECRBTI/SI//NOFORN 15 TOP SEC&ET/!SII/NOFORN (vi) At least once during the authorization period, NSA's OGC and NSD/DoJ shall review a sample of the justifications for RAS approvals for selection terms used to query the BR metadata. (vii) Other than the automated query process described in th~ Declaration and this Order, prior to implementation of any new or modified automated query processes, such new or modified processes shall be reviewed and approved by NSA's OGC, NSD/DoJ, and the Court. G. Approximately every thirty days, NSA shall file with the Court a report that includes a discussion of NSA' s application of the RAS standard, as well as NSA' s implementation and operation of the automated query process. In addition, should the United States seek renewal of the requested authority, NSA shall also include in its report a description of any significant changes proposed in the way in which the call detail records would be received from the Providers and any significant changes to the controls NSA has in place to receive, store, process, and disseminate the BR metadata. Each report shall include a statement of the number of instances since the preceding report in which NSA has shared, in any form, results from queries of the BR metadata that contain United States person information, in any form, with anyone outside NSA. For each such instance in which United States person information has been shared, the report shall include NSA' s attestation that one of the officials TOP SBCRBT/JSII/NOFORN 16 TOP S8CRST/!SJ!/NOFORN authorized to approve such disseminations determined, prior to dissemination, that the information was related to counterterrorism information and necessary to understand counterterrorism information or to assess its importance. of January, 2014, at 5:00 p.m., Eastern Time. 10-11-2013 P'l2:05 S i g n e d - - - - - - - - - - - Eastern Time Date Time Judge, U "ted States Foreign Intelligence Surveillance Court TOP SECRETHSII/NOFORN 17 Exhibit 4 TOP SECRET//Sl!/ORCONtiNOF .. . ~ Hotmall' G~..J il . .'' ' . GoL~gle . "'-7.AHOOJ ~..~ ' (f$//S PRISM Tasking Process VINF) '~"~s ~.-...v Target Analyst inputs selectors into Unified Taraetina Tool IUm Pendln swvelllanc 52 FAA Adjudicators in Each Product line TargeUng RevlewiYaUdatlon scoted Comms Special FISA Oversight and Processing (SV4) Stored comms RMew Noti<S&tiOn survelll&nee _ ,. ~ ~ .; - Pendi ng StOfed Comms Targeting and Mission Management ($343) Final Targeting Review .-nd Relent I Unified Targetin g Tool (UTT) J, J, PRINTAURA; Site Selector Distribution Manager Surveillance _ ,. ~ - Pencttng Scoted Comms FBI Electtonlc communlcaUons survellr anc:e Unit (ECSU) Restareh & V&I«Sate NO USPER$ Providers (Google, Yahoo, etc.) Targeting Sel•e:tors J,.;- StOfed Comms Release FBI Data Intercept Technology Unit (DITU) Collection Collection PINWALE, NUCLEON, etc. ~ TOP SECRET//Sli/ORCON//NOFORN TOP SECRET/tS I//ORCONtfNOI~ G~.. ir liiilil '\1 Hotmall' Coogle """ AHOO, y ~ <TS//SIIfNF> PRISM ,. ,.. • pa talk4'1! Y ouiim t-"""'li :_] --·-· -mail ~ Collection Dataflow ., I I I I I I I IIIII t roce:ssing I I : FAA :r'artitions : TOP SECRET//SJI/ORCON/fNOFORN : -------------------------------------~ TOP SECRET//Slt/ORCON/INOF ~~~ G.~.. . 1( · · ··• (TS//Sl/INF) ~ Hotmail" Google ....YAEOOf • ~ ~ paltalkfll Younll'!' II:W mail /), -·-- -~ t.:' \ , . - AOL PRISM Case Notations P2ESQC120001234 .----T PRISM Provider P1: Microsoft P2:Yahoo P3: Google P4 : Facebook PS: PaiTalk P6:YouTube P7: Skype PS: AOL PA: Apple I 1:~~_) J, L' Fixed trigraph , denotes PRISM source collection c __; ~ Year CASN established for selector ~ I Serial # I Content Type L ) A: Stored Comms (Search) B: IM (chat) . C: RTN-EDC (real-time notification of an e-mail event such as a logon or sent message) O: RTN-IM (real-time notification of a chat login or logout event) E: E-Mail F:VoiP G: Full (WebForum) H: OSN Messaging (photos, wallposts, activity, etc.) 1 OSN Basic Subscriber Info : J: Videos . (dol): Indicates multiple types TOP SECRET//SII/ORCONl : 'OFORJ'-1 TOP SECRETttSVIORCON/INOt~ ~ Hotmall' e M 1 liiliiiil 1 (TS//SV/NF) Ccx'lgle YA.Hoor a • REPRISMFISA TIPS COUNTERTERRORISM REPRISMfiSA ~... \ 1 p~~~ \(k .J.!!.U U! .Oln." W': p) o!t • I wel,)~,.::tj PRISN ENTRIES 'l ~·· ... ~ ~~ter-bdo'w ~ • -(4- • v... , I ""'1t o< • Sfof,.. .... ~, · ~<:;>! t¥'1 e. M4n~f~::o u. .. 1:>~1-'olo ~ c1 . ..._ ., ... '"""'""'"" ' ' ' '"" t ()l.;> l((lo..• "'l · ~ ,.,..vcr. ,,..,.~ ' " ""' '"'' • ,.( PII ...Mtt'.,, '"'''''' "8. " ' " ""• f ·MAO f ll'lot fi( I'W,Mfi:.A f Uf> ("(;.....C.>\1 Prism Cun ent Entries v talk"'~ You lim Exhibit 5 SECRET//SI//REL USA, GBR (U//FOUO) WINDSTOP/2P __System Highlights MUSCULAR • Minor circuit move, not collection suite move (so-2013-00762) • XKS FP updates across TU systems I NArchive throttle update IN CENSER • INCS4 config issue (uo-2013-00471) SECRET//SI//REL USA GBR Speaker’s Notes From Feb 28 2013: Proposed/imminent latest DO/Volume reduction: Narchive BLUF: Requested S2 concurrence at S2 TLC on 25 Feb with partial throttling of content from Yahoo, Narchive email traffic which contains data older than 6 months from MUSCULAR. Numerous S2 analysts have complained of its existence, and the relatively small intelligence value it contains does not justify the sheer volume of collection at MUSCULAR (1/4th of the total daily collect). Background: Since July of 2012, Yahoo has been transferring entire email accounts using the Narchive data format (a proprietary format for which NSA had to develop custom demultiplexers). To date, we are unsure why these accounts are being transferred – movement of individuals, backup of data from overseas servers to US servers, or some other reason. There is no way currently to predict if an account will be transferred via Yahoo Narchive. Currently, Narchive traffic is collected and forwarded to NSA for memorialization in any quantity only from DS-­‐200B. On any given day, Narchive traffic represents 25% (15GB) of DS-­‐200B’s daily PINWALE content allocation (60GB currently). DS-­‐200B is scheduled to be upgraded in the summer of 2013; it is likely that memorialized Narchive traffic, if still present in the environment, will grow proportionally (i.e. double now, to 30 GB/day). Narchive traffic is mailbox formatted email, meaning unlike Yahoo webmail, any attachments present would be collected as part of the message. This is a distinct advantage. However, it has not been determined what causes an Narchive transfer of an account, so these messages are rarely collected “live”. Based on analysis of Narchive email data by and communications date for Narchive email messages collected: < 30 days > 30 days, < 90 days > 90 days < 180 days > 180 days, < 1 year > 1years, < 5 years > 5years 1118 1758 1302 2592 3084 154 , we were able to indentify statistics for the original 11% 17% 13% 26% 31% >1% Numerous target offices have complained about this collection “diluting” their workflow. One argument for keeping it is that it provides a retrospective look at target activity – this argument is hampered by a) the unreliable and non-­‐understood nature of when the transfer occurs for an account, and b) that FISA restrospective collection would retrieve the exact same data “on demand”. SSO Optimization believes that while this is “valid” collection of content, the sheer volume and the age – coupled with the unpredictable nature of Narchive activity – makes collecting older data a less desirable use of valuable resources. 59% of Narchive email collected was originally sent and received more than 180 days after collection. This represents about 8.9 GB a day of “less desirable” collection – long term allocation that could be easily filled with more timely, useful FI from this lucrative SSO site. As always with our optimization, the data would still be available at the site store for SIGDEV. This would not impact metadata extraction. Past DO volume reduction efforts: Webmail OAB-­‐ Leap day 2012: the original defeat only targeted gmail, yahoo, and hotmail webmail protocol FB buddylist sampling since last year Today: FB OAB defeat/atxks/facebook/ownerless_addressbook : this is a JSON addressbook Exhibit 6 TOP SECRET//SI//NOFORN Content Acquisition Optimization TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Yahoo Webmessenger •  Update data sent to individuals logged into Yahoo’s Instant Messenger service online –  Online contact status, unread emails in Yahoo inbox –  Usually small sessions (2-4kB) •  Sporadic collection (30,000 – 60,000 sessions per day) •  Intermittent bursts of collection against contacts of targets –  Large numbers of sessions (20,000+) against a single targeted selector –  Not collected against the target (online presence/unread email from target) –  No owner attribution (metadata value limited to fact-of comms for emails, online presence events for buddies) •  Over a dozen selectors detasked in two weeks –  Because a target’s contact was using/idling on Yahoo Webmessenger –  Several very timely selectors (Libyan transition, Greek financial related) TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Address Books •  Email address books for most major webmail are collected as stand-alone sessions (no content present*) •  Address books are repetitive, large, and metadata-rich •  Data is stored multiple times (MARINA/MAINWAY, PINWALE, CLOUDs) •  Fewer and fewer address books attributable to users, targets •  Address books account for ~ 22% of SSO’s major accesses (up from ~ 12% in August) Access (10 Jan 12) US-­‐3171 DS-­‐200B US-­‐3261 US-­‐3145 US-­‐3180 US-­‐3180 (16 Dec 11) TOTAL Total Sessions 1488453 938378 94132 177663 269794 289318 3257738 Address Books 237067 (16% of traffic) 311113 (33% of traffic) 2477 (3% of traffic) 29336 (16% of traffic) 40409 (15% of traffic) 91964 (32% of traffic) 712366 (22% of traffic) Provider Yahoo Hotmail Gmail Facebook Other TOTAL TOP SECRET//SI//NOFORN Collected 444743 105068 33697 82857 22881 689246 A;ributed 11009 1115 2350 79437 1175 95086 A;ributed% 2.48% 1.06% 6.97% 95.87% 5.14% 13.80% TOP SECRET//SI//NOFORN Buddy Lists,Inboxes •  Unlike address books, frequently contain content data –  Offline messages, buddy icon updates, other data included –  Webmail inboxes increasingly include email content –  Most collection is due to the presence of a target on a buddy list where the communication is not to, from, or about that target •  NSA collects, on a representative day, ~ 500,000 buddylists and inboxes –  More than 90% collected because tasked selectors identified only as contacts (not communicant, content, or owner) •  Identifying buddylists and inboxes without content (or without useful content) an ongoing challenge TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Scenario: •  @yahoo Sep 2011 @yahoo.com (tasked S2E, asw Iran Quds Force) has his/her Yahoo account hacked by an unknown actor, sends out spam email to his/her contact list: TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Scenario: @yahoo •  @yahoo.com has a number of Yahoo groups in his/her contact list, some with many hundreds or thousands of members •  At DS-200B in particular, collection spiked as: –  The initial spam messages were sent (and collected) –  Inboxes of email recipients were viewed by contact list –  Messages were sometimes viewed, but more often sent as precached views on Google and Yahoo (along with inboxes) –  Inboxes where the recipient did not delete the spam message continued to be collected every time they were viewed –  Some recipients added @yahoo.com to their address books (possibly as a spam defeat?) – address books were collected every time TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Scenario: @yahoo DS-200B Collection By Day - 11 Sep - 24 Sep (in MB) 120000 100000 80000 60000 40000 20000 0 DS-200B Collection By Hour – 18 Sep – 23 Sep (in MB) 40000 30000 20000 10000 0 9/18/2011 0:00 9/18/2011 12:00 9/19/2011 8:00 9/19/2011 20:00 9/20/2011 8:00 9/20/2011 20:00 9/21/2011 8:00 9/21/2011 20:00 TOP SECRET//SI//NOFORN 9/22/2011 8:00 9/22/2011 20:00 9/23/2011 8:00 9/23/2011 20:00 TOP SECRET//SI//NOFORN Scenario: @yahoo •  @yahoo.com emergency detasked from DS-200B and US-3171 at 13:04Z on 20 Oct •  Numerous first-order address books and inboxes collected meant tasked selectors on address books or buddy lists of contacts of @yahoo.com also affected: –  @yahoo.com and detasked off US-3171 at 13:10Z on 20 Sep @gmail.com emergency •  Memorializing to PINWALE only address books and inboxes owned by target selectors would have reduced PINWALE volumes 90%+ –  Site XKEYSCOREs would buffer data for SIGDEV purposes –  Metadata from known owner address books and inboxes stored regardless TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Mobile IMAP •  IMAP protocol used by email clients to fetch mail from server(s) •  Not designed for devices with intermittent connections (i.e. mobile phones) •  Android implementation in particular uses a lot of bandwidth TOP SECRET//SI//NOFORN Exhibit 7 TOP SECRET//COMINT//NOFORN UNITED STATES GOVERNMENT Memorandum OC-034-12 DATE: 3 May 2012 REPLY TO ATTN OF: SID Oversight & Compliance SUBJECT: (U//FOUO) NSAW SID Intelligence Oversight (IO) Quarterly Report – First Quarter Calendar Year 2012 (1 January – 31 March 2012) – EXECUTIVE SUMMARY TO: SIGINT Director I. (U) Overview (U//FOUO) The attached NSAW SID Intelligence Oversight (IO) Quarterly Report for the First Quarter Calendar Year 2012 (1 January – 31 March 2012) identifies NSAW SID compliance with E.O. 12333, DoD Regulation 5240.1-R, NSA/CSS Policy 1-23, USSID SP0018, and all related policies and regulations. (U//FOUO) Detailed incident narratives are provided in the attached annexes. The number of incidents in each category and a reference to the annex related to each incident category are contained in the body of the report. (U//FOUO) As part of SID Oversight and Compliance’s (SV) charge to provide comprehensive trends and analysis information as it pertains to incidents of non-compliance, this Executive Summary provides analysis and evaluation of incidents reported throughout the current quarter to better address the “whys” and “hows” behind NSAW SID’s compliance posture. (U//FOUO) Section II, Metrics, has been broken down into several sub-sections: metrics and analysis of NSAW SID-reported incidents by authority, type, root cause, and organization. Also included is an assessment of how incidents were discovered (i.e., methods of discovery) for SID-reported incidents (see Figure 7). (U//FOUO) Significant Incidents of Non-compliance and Report Content follow in Sections III and IV, respectively. (S//REL) Overall, the number of incidents reported during 1QCY12 increased by 11% as compared to the number of incidents reported during 4QCY11. This included a rise in the number of E.O. 12333 incidents, as well as for incidents across all FISA authorities. The majority of incidents in all authorities were database query incidents due to human error. Of note, S2 continued to be the NSAW SID organization with the largest number of reported incidents (89%), although S2 experienced an overall decrease in reported incidents. SV noted an overall improvement in timeliness regarding 1QCY12 IO Quarterly Report submissions from the SID elements. Page 1 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN II. (U) Metrics a. (U//FOUO) NSAW SID-reported Incidents by Authority (TS//SI//REL TO USA, FVEY) Figures 1a-b compares all categories of NSAW SID-reported incidents (collection, dissemination, unauthorized access, and retention) by Authority for 2QCY11 – 1QCY12. From 4QCY11 to 1QCY12, there was an overall increase in incidents of 11%. There was also an increase of 11% for both E.O. 12333 and FISA incidents. The increase in incidents reported for 1QCY12 was due to an increase in the number of reported Global System for Mobile Communications (GSM) roamer 1 incidents, which may be attributed to an increase in Chinese travel to visit friends and family for the Chinese Lunar New Year holiday. (U//FOUO) Figure 1a: Table of the Number of NSAW SID-reported Incidents by Authority (U//FOUO) E.O. 12333 FISA TOTAL 2QCY11 396 150 546 3QCY11 390 198 588 4QCY11 601 176 777 1QCY12 670 195 865 (U//FOUO) (U//FOUO) Figure 1b: Line Graph of the Number of NSAW SID-reported Incidents by Authority U//FOUO 800 Number of Incidents 700 600 500 400 E.O. 12333 300 FISA 200 100 0 2QCY11 3QCY11 4QCY11 1QCY12 Quarter U//FOUO (TS//SI//NF) FISA Incidents: As reflected in Figures 1a-b, during 1QCY12, NSAW SID reported a total of 195 FISA incidents, 185 of which were associated with unintentional collection. NSAW SID also reported 6 incidents of unintentional dissemination under FISA authority and 4 incidents of unauthorized access to Raw                                                              1  (U//FOUO) Roaming incidents occur when a selector associated with a valid foreign target becomes active in the U.S.   Page 2 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN SIGINT FISA data. Figure 2 illustrates the most common root causes for incidents involving FISA authorities as determined by SV. • 63% (123) of 1QCY12 FISA incidents can be attributed to Operator Error as the root cause, and involved: o Resources ( i.e., inaccurate or insufficient research information and/or workload issues (60); o Lack of due diligence (i.e., failure to follow standard operating procedures) (39); o Human error (21) which encompassed: Broad syntax (i.e., no or insufficient limiters / defeats / parameters) (12); Typographical error (6); Query technique understood but not applied (2); and Incorrect option selected in tool (1); and o Training and guidance (i.e., training issues) (3). (U//FOUO) The Resources root cause category accounted for the largest percentage of Operator Error incidents under FISA authorities for 1QCY12. Analysis identified that these incidents could be reduced if analysts had more complete and consistent information available about selectors and/or targets at the time of tasking and if analysts consistently applied rules for conducting queries. • 37% (72) of 1QCY12 FISA incidents can be attributed to System Error as the root cause, and involved: o System limitations (i.e., system lacks the capability to ‘push’ real-time travel data out to analysts, system/device unable to detect changes in user) (67); o System engineering (i.e., system/database developed without the appropriate oversight measures, data flow issues, etc.) (4); and, o System disruptions (i.e., glitches, bugs, etc.) (1). (U//FOUO) The System Limitations root cause category accounted for the largest percentage of System Error incidents under FISA authorities for 1QCY12. The largest number of incidents in the System Limitations category account for roamers where there was no previous indications of the planned travel. These incidents are largely unpreventable. Consistent discovery through the Visitor Location Register (VLR) occurs every quarter and provides analysts with timely information to place selectors into candidate status or detask. Analysis identified that these incidents could be reduced if analysts removed/detasked selectors more quickly upon learning that the status of the selector had changed and more regularly monitored target activity. This analysis indicates that continued research on ways to exploit new technologies and researching the various aspects of personal communications systems to include GSM, are an important step for NSA analysts to track the travel of valid foreign targets. Page 3 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN (U//FOUO) Figure 2: 1QCY12 FISA Incidents – Root Causes U//FOUO 11% Operator | Human Error (21) 20% Operator | Due Diligence (39) Operator | Resources (60) Operator | Training (3) 34% 31% System | Disruptions (1) System | Engineering (4) 2% System | Limitations (67) 2% U//FOUO Total: 195 (TS//SI//REL TO USA, FVEY) Delayed Detasking FISA Incidents: As reflected in Figures 1a-b, during 1QCY12, NSAW SID reported a total of 195 FISA incidents. 19 (10%) of the total FISA incidents were associated with detasking delays. Of the 19 delayed detasking incidents, 12 (63%) of these incidents occurred under NSA FISA Authority, 5 (27%) occurred under FAA 702 Authority, 1(5%) occurred under FAA 704 Authority, and 1 (5%) occurred under FAA 705(b) Authority. Figure 3a illustrates the detasking delay incidents versus all other FISA incidents reported during 1QCY12. Figure 3b illustrates the detasking delay incidents by FISA Authority reported during 1QCY12. (U//FOUO) Figure 3a: 1QCY12 Detasking FISA Incidents vs. All other FISA incidents (U//FOUO) Figure 3b: 1QCY12 FISA Incidents by Authority – Delayed Detaskings U//FOUO  U//FOUO 5% 5% 10% NSA Establishment FISA (12) FAA 702 (5) Delayed Detasking (19) 27% 90% Other Incidents (176) 63% FAA 704 (1) FAA 705(b) (1) Total: 19 Total: 195 U//FOUO U//FOUO Page 4 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN (TS//SI//REL TO USA, FVEY) As depicted in Figures 3a and 3b, of the 19 delayed detasking FISA incidents, 15 (79%) resulted from a failure to detask all selectors, 2 (11%) resulted from analyst not detasking when required, 1 (5%) resulted from partner agency error, and 1 (5%) resulted from all tasking not terminated (e.g., dual route). b. NSAW SID-reported Collection Incidents by Sub-Type and Authority (U//FOUO) Figures 4a-b depicts NSAW SID-reported collection incidents by Authority (E.O. 12333 and all FISA Authorities), and identifies the primary sub-types for those incidents. An explanation of the more prominent collection incident sub-types follows the graphs. (U//FOUO) Figure 4a: NSAW SID-reported Collection Incidents Under E.O. 12333 Authority U//FOUO 582 600 491 500 2QCY11 3QCY11 4QCY11 1QCY12 400 300 251 262 200 100 4 1 5 1 2 1 3 0 No FISC/AG Auth Computer Network Exploitation (CNE) 74 53 70 97 9 6 2 2 18 26 23 22 14 16 7 27 2 4 0 5 0 Roamers Database Queries Task/Detask Delays/Errors USP Transit Program* Other Inadvertent U//FOUO (U//FOUO) Figure 4a: During 1QCY12, NSAW SID reported a 39% increase of database query incidents under E.O. 12333 Authority. Human Error accounted for 74% of E.O.12333 database query incidents. (TS//SI//REL TO USA, FVEY) International Transit Switch Collection*: International Transit switches, FAIRVIEW (US-990), STORMBREW (US-983), ORANGEBLOSSOM (US-3251), and SILVERZEPHYR (US-3273), are Special Source Operations (SSO) programs authorized to collect cable transit traffic passing through U.S. gateways with both ends of the communication being foreign. When collection occurs with one or both communicants inside the U.S., this constitutes inadvertent collection. From 4QCY11 to 1QCY12, there was an increase of transit program incidents submitted from 7 to 27, due to the change in our methodology for reporting and counting of these types of incidents. (*See Annex G in SID’s 1QCY12 IO Quarterly Report for additional details regarding these incidents.) Page 5 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN (U//FOUO) Figure 4b: NSAW SID-reported Collection Incidents Under All FISA Authorities U//FOUO 100 90 80 70 60 50 40 30 20 10 0 2QCY11 81 87 3QCY11 4QCY11 1QCY12 95 69 55 49 54 36 18 1 Roamers 0 0 0 No FISC/AG Auth 2 0 0 0 Computer Network Exploitation (CNE) 7 7 5 Database Queries 5 12 18 Task/Detask Delays/Errors 19 17 0 2 1 USP Other Inadvertent U//FOUO (U//FOUO) Figure 4b: During 1QCY12, NSAW SID reported an increase of 9% of roamer incidents under all FISA Authorities. There was also a 260% increase in database query FISA Authority incidents during 1QCY12. Human Error accounted for the majority of all FISA Authorities database query incidents (74%). (U//FOUO) Roamers: Roaming incidents occur when valid foreign target selector(s) are active in the U.S. Roamer incidents continue to constitute the largest category of collection incidents across E.O. 12333 and FAA authorities. Roamer incidents are largely unpreventable, even with good target awareness and traffic review, since target travel activities are often unannounced and not easily predicted. (S//SI//NF) Other Inadvertent Collection: Other inadvertent collection incidents account for situations where targets were believed to be foreign but who later turn out to be U.S. persons and other incidents that do not fit into the previously identified categories. (TS//SI//REL TO USA, FVEY) Database Queries: During 1QCY12, NSAW SID reported a total of 115 database query incidents across all Authorities, representing a 53% increase from 4QCY11. E.O. 12333 Authority database query incidents accounted for 84% (97) of the total, and all FISA Authorities database query incidents accounted for 16% (18). (U//FOUO) Figure 5 illustrates the most common root causes for incidents involving database queries as determined by SV. • 99% (114) of the 1QCY12 database query incidents are attributed to Operator Error as the root cause, and involved: o Human error (85) which encompassed: Broad syntax (i.e., no or insufficient limiters / defeats / parameters) (55); Typographical error (17); Boolean operator error (6); Query technique understood but not applied (4); Not familiar enough with the tool used for query (2); and Page 6 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN Incorrect option selected in tool (1) o Lack of due diligence (i.e., failure to follow standard operating procedure) (13) o Training and guidance (i.e., training issues) (9); and o Resources (i.e., inaccurate or insufficient research information and/or workload issues) (7). (U//FOUO) The remaining 1 database query incident can be attributed to System Error as the root cause and occurred due to a mechanical error with the tool. (U//FOUO) Analysis identified that the number of database query incidents could be reduced if analysts more consistently applied rules/standard operating procedures (SOPs) for conducting queries. (S//SI//NF) Auditors continue to play an important role in the discovery of database query incidents, identifying 70 (61%) of the 115 reported database query incidents. (U//FOUO) Figure 5: 1QCY12 Database Query Incidents – Root Causes 1% 8% 6% Operator | Human Error (85) Operator | Due Diligence (13) 11% Operator | Resources Operator | Training 74% (7) (9) System | Disruptions (1) Total: 115 (TS//SI//REL TO USA, FVEY) Of the 115 database query incidents reported for 1QCY12, Figure 6 identifies the database involved and the associated percentage of the total. Databases considered to be Source Systems of Record (SSR) have been labeled as such. (TS//SI//REL TO USA, FVEY) Note that the total number of databases involved in the database query incidents in Figure 6 does not equal the number of database query incidents reflected in Figure 5 or in the 1QCY12 SID IO Quarterly Report because a database query incident may occur in more than one database. Page 7 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN (U//FOUO) Figure 6: 1QCY11 Database Query Incidents – Database(s) Involved U//FOUO CLOUD/ABR DISHFIRE FASTSCOPE MARINA (SSR) OCTAVE PINWALE (SSR) SIGINT NAVIGATOR TRACFIN TRANSX TUNINGFORK UTT XKEYSCORE Unknown 1% 7% 20% 1% 13% 1% 3% 2% 2% 1% 20% 28% 1% Total: 119 (8) (16) (1) (24) (1) (34) (1) (2) (2) (4) (1) (24) (1) U//FOUO (U//FOUO) NSAW SID-reported Incidents – Method of Discovery (U//FOUO) Figure 7 depicts the most prominent method(s) of discovery for incidents reported by NSAW SID elements for 1QCY12. As SV’s assessment of root causes matures, and as corrective measures are implemented, identification of how incidents are discovered will provide additional insight into the effectiveness of those methods. (U//FOUO) Figure 7: 1QCY12 Incidents – How Discovered U//FOUO 553 600 500 400 300 200 100 83 0 36 77 7 1 6 12 10 67 5 3 2 3 0 Total: 865 U//FOUO   Page 8 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN     (U//FOUO) For 1QCY12, of the 865 reported incidents, 553 (64%) were discovered by automated alert. 444, (80%) of the 553 incidents that were discovered by automated alert occurred via the VLR and other analytic tools, such as SPYDER, CHALKFUN, and TransX. c. (U//FOUO) NSAW SID-reported Incidents by Organization (U//FOUO) Figure 8 illustrates the total 1QCY12 NSAW SID-reported incidents by primary SID Deputy Directorate (DD) level organization. S2, having the largest NSAW SID contingent of reported incidents, accounted for 89% of the total incidents for the quarter, a proportion consistent with the overall size of the S2 organization. As compared to 4QCY11, S2 experienced an overall 8% reduction in incidents occurrences. (U//FOUO) Figure 8: 1QCY12 Incidents by NSAW SID Organization U//FOUO 2% 2% 7% S1 1 S2 772 S3 56 F74 MOC 4 SSG 14 ST 89% 1 2nd Party /Various 17 Total: 865 U//FOUO (U//FOUO) Figure 9 provides a look into S2 (by Product Line) as the NSAW SID organization with the largest number of reported incidents. For 1QCY12, three Product Lines accounted for 72% of S2’s reported incidents. These Product Lines were: the and Korea Division (S2B) with 28% of the reported incidents, the International Security Issues Division (S2C) with 23% of the reported incidents, and the China, and the Office of Middle East & Africa (S2E) with 21% of the incidents. As compared to 4QCY11, this resulted in an increase of 16% for S2B, a reduction of 35% for S2C, and an increase of 9% for S2E. The number of incidents reported by the remaining seven Product Lines held relatively steady from 4QCY11 to 1QCY12. Page 9 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN (U//FOUO) Figure 9: 1QCY12 S2 Incidents by Product Line (U//FOUO) 4% S2A S2G 29 60 S2J Total: 772 25 S2H 23% 17 S2I 8% 159 S2F 21% 61 S2E 28% 174 S2D 8% 2% 213 S2C 3% 32 S2B 4% 2 (U//FOUO)   (U//FOUO) Figures 10a-b illustrates the operator related (Figure 10a) and system related (Figure 10b) root causes associated with the 772 incidents reported by S2. 30% of the incidents were due to operator related errors that resulted in an incident. 70% of the incidents were due to system related issues that resulted in an incident. (U//FOUO) Figure 10a: 1QCY12 S2 Incidents – Operator Related Root Causes (U//FOUO) 4% 1% Human Error 71 Information Resources 80 31% 30% 29% Lack of Due Diligence 68 70% 35% Personnel Resources 2 Training&Guidance 9 Total: 230 (U//FOUO) (U//FOUO) 30% of the S2-reported incidents during 1QCY12 are attributed to Operator Error as the root cause, and involved: • Resources (i.e., inaccurate or insufficient research information and/or workload issues, and personnel resource issues) (82); Page 10 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN • • • Human error (i.e., selector mistypes, incorrect realm, or improper query) (71); Lack of due diligence (i.e., failure to follow standard operating procedures) (68); and Training and guidance (i.e., training issues) (9). (U//FOUO) Analysis found that analysts could reduce the number of incidents if there was more comprehensive research information available at the time of tasking as well as through better use of defeats, more careful review of data entry to avoid typographical errors and omissions, and by following SOPs more consistently. (U//FOUO) Figure 10b: 1QCY12 S2 Incidents – System Related Root Causes (U//FOUO) < 1% System Engineering 1 System Limitations 541 30% 70% 99% Total: 542 (U//FOUO)   (U//FOUO) 70% of the S2-reported incidents during 1QCY12 are attributed to system issues as the root cause, and involved: • System limitations (i.e., system lacks the capability to ‘push’ real-time travel data out to analysts, system/device unable to detect changes in user) (541); and • System engineering (i.e., data tagging, configuration, design flaws, etc.) (1). (TS//SI//REL TO USA, FVEY) System Limitations, the largest percentage of System Error root cause, can be attributed to situations where a valid foreign target is found roaming in the United States without indication in raw traffic. III. (U) Significant Incidents of Non-compliance (TS//SI//NF) Business Record (BR) FISA.  As of 16 February 2012, NSA determined that approximately 3,032 files containing call detail records potentially collected pursuant to prior BR Orders were retained on a server and been collected more than five years ago in violation of the 5-year retention period established for BR collection. Specifically, these files were retained on a server used by technical personnel working with the Business Records metadata to maintain documentation of provider feed data formats and performed background analysis to document why certain contain chaining rules were created. In addition to the BR Page 11 of 13 TOP SECRET//COMINT//NOFORN Exhibit 8 11/13/13 Grassley Presses for Details about Intentional Abuse of NSA Authorities Article For Immediate Release August 28, 2013 Grassley Presses for Details about Intentional Abuse of NSA Authorities WASHINGTON – Senator Chuck Grassley, Ranking Member of the Senate Judiciary Committee, is asking the Inspector General of the National Security Agency (NSA) to provide additional information about the intentional and willful misuse of surveillance authorities by NSA employees. He’s also asking for the Inspector General to provide as much unclassified information as possible. The Senate Judiciary Committee has oversight jurisdiction over the Foreign Intelligence Surveillance Act (FISA) and the intelligence courts that fall under the act’s authority. “The American people are questioning the NSA and the FISA court system. Accountability for those who intentionally abused surveillance authorities and greater transparency can help rebuild that trust and ensure that both national security and the Constitution are protected,” Grassley said. The text of Grassley’s letter is below. August 27, 2013 Dr. George Ellard, Inspector General National Security Agency Office of the Inspector General 9800 Savage Road, Suite 6247 Fort Meade, MD 20755 Dear Dr. Ellard: I write in response to media reports that your office has documented instances in which NSA personnel intentionally and willfully abused their surveillance authorities. For each of these instances, I request that you provide the following information: (1) The specific details of the conduct committed by the NSA employee; (2) The job title and attendant duties and responsibilities of the NSA employee at the time; (3) How the conduct was discovered by NSA management and/or your office; (4) The law or other legal authority – whether it be a statute, executive order, or regulation – that your office concluded was intentionally and willfully violated; (5) The reasons your office concluded that the conduct was intentional and willful; www.grassley.senate.gov/news/Article.cfm?RenderForPrint=1&customel_dataPageID_1502=46858 1/2 11/13/13 Grassley Presses for Details about Intentional Abuse of NSA Authorities (6) The specifics of any internal administrative or disciplinary action that was taken against the employee, including whether the employee was terminated; and (7) Whether your office referred any of these instances for criminal prosecution, and if not, why not? Thank you for your prompt attention to this important request. I would appreciate a response by September 11, 2013. I also request that you respond in an unclassified manner to the extent possible. Sincerely, Charles E. Grassley Ranking Member cc: Honorable Patrick Leahy, Chairman © 2008, Senator Grassley www.grassley.senate.gov/news/Article.cfm?RenderForPrint=1&customel_dataPageID_1502=46858 2/2 Exhibit 9 Exhibit 10 Exhibit 11 United ~totes ,.Senate WASHINGTON, DC 20510 June 24. 2013 General Keith Alexander Director National Security Agency Fort Meade. MD 20755 Dear General Alexander: The NSA recenlly released a fact sheet on surveillance authorities that contains in formation about both section 702 of the Foreign Imelligence Surveillance Act (FlSA) and section 215 of the USA Patriot /\ct. As you know. section 215 of the Patriot Act is the basis for the NSA · s bulk phone records collection program. while section 702 of FISA governs the collection of phone and internet communications, and involves the PRISM compmer system. We were disappointed to sec that this fact sheet contains an inaccurate statement about how the section 702 amhority has been interpreted by tht! US government In our judgment this inaccuracy is significant. as it portrays protections for Americans· privacy as being significantly stronger than they actually arc. We have identified this inaccurate statement in the classified attachment to this letter. We urge you to conect this statement as soon as possible. 1\.s you have seen,. when the NSA makes inaccurate statements about government surveillance and fails to correct the public record. it can decrease public confidence in the NSA ·s openness and its commitment to protecting Americans' constitutional rights. Rebuilding this confidence will require a willingness to correct misstatements and a willingness to make reforms where appropriate. Separately, we note that this same fact sheet states that under section 702. "Any inadvertently acquired commw1ication of or concerning a US person must be promptly destroyed if it is neither relevant to the authorized purpose nor evidence of a crime." We believe that this statement is somewhat misleading, in that it implies that the NSA has the ability to determine how many American communications it has collected under section 702, or that the law does not allow the NSA to deliberately search for the records ol'panicular Americans. ln fact, the intelligence community has told us repeatedly that it is ··not reasonably possible to identify the number of people located in the United States whose communications may have been reviewed under the authority" of the FISA Amendments Act. We appreciate your attention to this matter. We believe that the US government should have broad autl10ritics to investigate terrorism and espionage. and that it is possible to aggressively pursue terrorists without compromising the constitutional rights of ordinary Americans. Achieving this goal depends not just on secret courts and secret congressional hearings, but on informed public debate as well. We look forward to your response. IJ)·den-Udall Leifer to General Alexander- Page 2 June 2-1. 20 I 3 Sincerely. Exhibit 12 I'IA I NAL C,~ 1-( ( E NTRA SE '- URIT 'w 25 June 20l3 The Honorable Ron Wyden United States Senate 221 Dirksen Senate Office Building Washington, DC 20510 The Honorable Mark Udall United States Senate 328 Hart Senate Office Building Washington, DC 2051 0 Dear Senators Wyden and Udall: Thank you for your letter dated 24 June 2013. After reviewing your letter, I agree that the fact sheet that the National Security Agency posted on its website on 18 June 2013 could have more precisely described the requirements for collection under Section 702 of the FISA Amendments Act. This statute allows for "the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information." 50 U.S.C. 188 J(a). The statute provides several express limitations, namely that such acquisition: (1) may not intentionally target any person known at the time of acquisition to be located in the United States; (2) may not intentionally target a person reasonably believed to be located outside the United States if the purpose of such acquisition is to target a particular, known person reasonably beHeved to be in the United States; (3) may not intentionally target a United States person reasonably believed to be located outside the United States; (4) may not intentionaiJy acquire any communication as to which the sender and all intended recipients are known at the time of acqu1sition to be located in the United States; and (5) shall be conducted in a manner consistent with the fourth amendment to the Constitution of the United States. 50 U.S.C. 1881(b). With respect to the second point raised in your 24 June 2013 letter, the fact sheet did not imply nor was it intended to imply "that NSA has the ability to determine how many American communications it has collected under section 702, or that the law does not allow the NSA to deliberately search for the records of particular Americans.,. As you correctly state, this point has been addressed publicly. 1 refer you to unclassified correspondence from the Director of National Intelligence dated 26 July 2012 and 24 August 2012. NSA continues to support the effort Jed by the Office of the Director of National Intelligence and the Department of Justice to make publicly available as much information as possible about recently disclosed intelligence programs, consistent with the need to protect national security and sensitive sources and methods. £;t~oe General; U.S. Army Director, N SNChief, CSS Copies Furnished: The Honorable Dianne Feinstein Chairman, Select Committee on Intelligence The Honorable Saxby Chambliss Vice Chairman, Select Committee on IntelJigencc Exhibit 13 Title VII, Section 702 of the Foreign Intelligence Surveillance Act (FISA), "Procedures for Targeting Certain Persons Outside the United States Other Than United States Persons" (50 U.S.c. sec. 1881a) • This authority allows only the targeting, for foreign intelligence purposes, of communications of foreign persons who are located abroad. • The government may not target any U.S. person anywhere in the world under this authority, nor may it target a person outside of the U.S. if the purpose is to acquire information from a particular, known person inside the U.S. • Under this authority, the Foreign Intelligence Surveillance Court annually reviews "certifications" jointly submitted by the U.S. Attorney General and Director of National Intelligence. • These certifications define the categories of foreign actors that may be appropriately targeted, and by law, must include specific targeting and minimization procedures adopted by the Attorney General in consultation with the Director of National Intelligence and approved by the Court as consistent with the law and 4th Amendment to the Constitution. • There must be a valid, documented foreign intelligence purpose, such as counterterrorism, for each use of this authority. All targeting decisions must be documented in advance. • The Department of Justice and the Office of the Director of National Intelligence conduct on-site reviews of targeting, minimization, and dissemination decisions at least every 60 days. • The Foreign Intelligence Surveillance Court must approve the targeting and minimization procedures, which helps ensure the protection of privacy and civil liberties. • These procedures require that the acquisition of information is conducted, to the greatest extent reasonably feasible, to minimize the acquisition of information not relevant to the authorized foreign intelligence purpose. • Any inadvertently acquired communication of or concerning a U.S. person must be promptly destroyed if it is neither relevant to the authorized purpose nor evidence of a crime. • If a target who was reasonably believed to be a non-U.S. person outside of the U.S. either enters the U.S. or was in fact a U.S. person at the time of acquisition, targeting must be immediately terminated. • Any information collected after a foreign target enters the u.s. -or prior to a discovery that any target erroneously believed to be foreign was in fact a u.s. person- must be promptly destroyed unless that information meets specific, limited criteria approved by the Foreign Intelligence Surveillance Court. • The dissemination of any information about u.S. persons is expressly prohibited unless it is necessary to understand foreign intelligence or assess its importance; is evidence of a crime; or indicates a threat of death or serious bodily harm. • The FISCrules of procedure require immediate reporting of any compliance incident. In addition, the government reports quarterly to the FISCregarding any compliance issues that have arisen during the reporting period, including updates of previously reported incidents. • The Department of Justice and Office of the Director of National Intelligence provide a semiannual assessment to the Court and Congress assessing compliance with the targeting and minimization procedures. In addition, the Department of Justice provides semi-annual reports to the Court and Congress concerning implementation of Section 702. • An annual Inspector General assessment is provided to Congress, reporting on compliance with procedural requirements, the number of disseminations relating to U.S. persons, and the number of targets later found to be located inside the u.S. Section 215 of the USA PATRIOT Act of 2001, which amended Title V, Section 501 of the Foreign Intelligence Surveillance Act (FISA), "Access to Certain Business Records for Foreign Intelligence and International Terrorism Investigations" (50 U.S.c. sec. 1861) • This program concerns the collection only of telephone metadata. Under this program, the government does not acquire the content of any communication, the identity of any party to the communication, or any cell-site locational information. • This metadata is stored in repositories within secure networks, must be uniquely marked, and can only be accessed by a limited number of authorized personnel who have received appropriate and adequate training. • This metadata may be queried only when there is a reasonable suspicion, based on specific and articulated facts, that the identifier that will be used as the basis for the query is associated with specific foreign terrorist organizations. • Only seven senior officials may authorize the dissemination of any U.S. person information outside of NSA (e.g. to the FBI) after determining that the information is related to and is necessary to understand counterterrorism information, or assess its importance. • Every 30 days, the government must file with the Foreign Intelligence Surveillance Court a report describing the implementation of the program, to include a discussion of the application ofthe Reasonable Articulable Suspicion (RAS) standard, the number of approved queries and the number of instances that query results that contain U.S. person information were shared outside of NSA in any form. • The Foreign Intelligence Surveillance Court reviews and must reauthorize the program every 90 days. • At least once every 90 days, DOJ must meet with the NSA Office of Inspector General to discuss their respective oversight responsibilities and assess NSA's compliance with the Court's orders. • At least once every 90 days, representatives from DOJ, ODNI and NSA meet to assess compliance with the Court's orders. • Metadata collected under this program that has not been reviewed and minimized must be destroyed within 5 years. • DOJ and NSA must consult on all significant legal opinions that relate to the interpretation, scope, and/or implementation of this authority. Exhibit 14

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?