KLAYMAN v. OBAMA et al

Filing 44

MEMORANDUM by LARRY E. KLAYMAN, CHARLES STRANGE, MARY ANN STRANGE. (Attachments: # 1 Exhibit 1 -- Binder Part 1, # 2 Exhibit 1 -- Binder Part 2, # 3 Exhibit 2 -- Gov't Opposition in In Re Epic)(Klayman, Larry)

Download PDF
Exhibit 15 Exhibit 16 (fS//SV/NF) FAA Certification Renewals With Caveats 2011-10-12 0850 (fS//Sl//NF) The FISA Comt signed the 20 11 FAA Certifications on 3 Oct 2011 -these are valid until 2 Oct 2012, pennitting SSO FAA-authorized accesses to continue operations. However, in the 80-page opinion, the judge ordered certain "upstream" or "passive" FAA DNI collection to cease after 30 days, unless NSA implements solutions to conect all deficiencies identified in the opinion document. PRISM operations are not affected by these caveats. All PRISM providers, except Yal10o and Google, were successfully transitioned to the new Certifications. We e>..'}Ject Yal10o and Google to complete transitioning by F1iday 6 Oct. Regarding the non-PRISM FAA collection programs, the Comt cited targeting and minimization procedures related to collection of Multiple Conununications Transactions as "deficient on statut01y and constitutional grotmds." SSO, Teclmology Directorate, OGC, and other organizations are coordinating a response, which includes plruming to implement a conse1vative solution in which the higher-risk collection will be sequestered. It is possible that this higher risk collection contains much of the non-duplicative FAA collection resulting in FAA repo1ting from upstream accesses. This solution is designed to comply with the judge's order; however, the judge will have to dete1mine if it does. If the solution is installed, SSO will then work with OPis and OGC to modify the solution over time such that the filte1ing process will be optimized to pennit more valid collection to be processed and f01warded to OPis. Finally, in parallel with these efforts, the OGC is contemplating filing an appeal to the ruling. Exhibit 17 Case 1:13-cv-03994-WHP Document 12 Filed 07/03/13 Page 1 of 4 JAM EEL JAFFER DEPUTY LEGAL DIRECTOR (1SDCSDN¥ DOCttMINT ACLU AMERICAN CIVIL LIBERTIES UNION ZGI3 MEMO ENDORSED fJ 5 -? t.... "~£CTR()NrCALLV FILED ~#: 1...'_1. .. , DATrPlLED: 7 IS/I') m i i\ i ere 0 ~ltti=~u ;====;;;;;;;~;;;;;;;.1j S F/=" July 2,2013 Honorable William H. Pauley III United States District Court for the Southern District of New York 500 Pearl Street, Room 2210 New York, NY 10007 AMERICAN CIVIL LIBERTIES UNION FOUNDATION NATIONAL O";:IC Re: American Civil Liberties Union et at. v, Clapper et al. Case No. 13-CV-03994 (WHP) OLC) 125 BROAD STREET, 1BT~ " I>EW YORK, NY 10004 2400 T/212.549.2500 Dear Judge Pauley: WWWACLJ,ORG OFFICERS AND DIRECTORS SUSAN N. HERMAI> PRESIDENT AI>THOI>Y D. ROMERO EXECUTIVE DIRECTOR On behalf of Plaintiffs, who challenge the lawfulness of the government's dragnet acquisition of "metadata" relating to every phone call made or received by residents of the United States, we write to request a pre-_ \ motion conference to discuss a motion for a preliminary injunction. Because the Court has already scheduled an initial conference iritIiiSiiiiittef for July 17, we respectfully request that the Court also conduct the pre-motion conference on that date. By way of background, on June 5, 2013, The Guardian published a story reporting that the National Security Agency ("NSA") was "collecting the telephone records of millions of US customers ofVerizon, one of America's largest telecoms providers." Glenn Greenwald, NSA Collecting Phone Records ofMillions of Verizon Customers Daily, Guardian, June 5, 2013, http://gu.comJp/3gc62/tw. The Guardian also published an order of the Foreign Intelligence Surveillance Court ("FISC") directing Verizon Business Network Services ("VBNS") to "produce to the [NSA] ... and continue production on an ongoing daily basis thereafter ... all call detail records or 'telephony metadata' created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local telephone calls" over the three-month period ending on July 19, 2013. The government has since authenticated the VBNS order. James R. Clapper, DNI Statement on Recent Unauthorized Disclosures of Classified Information (June 6, 2013), http://1.usa.gov/188X5LW. Senator Diane F einstein, who chairs the Senate Select Committee on Intelligence, has disclosed that the VBNS order was part of a broader program that has been in Case 1:13-cv-03994-WHP Document 12 Filed 07/03/13 Page 2 of 4 place for seven years, and that similar orders have been served on all of the major telephone companies. Senator Feinstein: NSA Phone Call Data Collection in Place 'Since 2006,' Guardian, June 6,2013, http://bitlyIl3rfxdu. AMERICAN CIVil LIBERTIES UNION FOUNDATION As alleged in the Complaint, Plaintiffs are current and former VBNS subscribers. The VBNS order requires VBNS to turn over to the government, on an "ongoing daily basis," all metadata associ.ated with Plaintiffs' phone calls. Under the VBNS order and predecessor orders, the government has collected detailed information about Plaintiffs' communications and stored that information in government databases. The government's past and ongoing collection of this information allows it to learn sensitive and privileged information about Plaintiffs' work and clients, and it is likely to have a chilling effect on whistIeblowers and others who might otherwise contact Plaintiffs for legal assistance. The government's surveillance of Plaintiffs' communications is not authorized by Section 215 of the Patriot Act, 18 U.S.C. § 1861, the provision under which the VBNS order was issued, and it violates the First and Fourth Amendments. Plaintiffs have filed this suit to obtain a declaration that this surveillance is unlawful; to enjoin the government from continuing the surveillance under the VBNS order or any successor thereto; and to require the government to purge from its databases all of the call records related to Plaintiffs' communications collected pursuant to the VBNS order or any predecessor thereto. Plaintiffs intend to file a motion for a preliminary injunction (i) directing the government to quarantine all of Plaintiffs' telephony metadata collected under the VBNS order or any predecessor or successor thereto; and (ii) barring the government from querying metadata obtained through the VBNS order using any phone number or other identifier associated with the Plaintiffs. Preliminary relief is warranted here. The harm suffered by Plaintiffs is ongoing and irreparable. Plaintiffs are non-profit organizations engaged in public education, lobbying, and pro bono litigation concerning civil rights and civil liberties. The tracking and retention of their telephony metadata with respect to every call they make or receive is a direct and wide-ranging invasion of their constitutional right to privacy. This continuing invasion is, by itself, irreparable injury. See, e.g., Covino v. Patrissi, 967 F.2d 73, 77 (2d Cir. 1992). Equally irreparable, and equally substantial, is the injury to Plaintiffs' expressive and associational rights. See Brown v. Socialist Workers 74 Campaign Comm. (Ohio), 459 U.S. 87,96-98 (1982); Elrod v. Burns, 427 U.S. 347, 373 (1976). 2 Case 1:13-cv-03994-WHP Document 12 Filed 07/03/13 Page 3 of 4 Plaintiffs will also show a substantial likelihood of success on the merits. First, the surveillance under the VBNS order is not authorized by Section 215. That provision does not authorize the government to collect everything; it authorizes the collection of records that are "relevant" to authorized investigations. In addition, Section 215 authorizes the collection of "tangible things" already in existence; it does not authorize the government to order recipients to tum over records as they are generated. Indeed, as Plaintiffs will demonstrate, reading the provision to permit the latter kind of surveillance makes nonsense of the larger statutory scheme. AMERICAN CIVIL LIBERTIES UNION FOUNDATION The surveillance under the VBNS order is also unconstitutional. The kind of information being collected by the government is highly sensitive, and its warrantless and suspicionless collection over long periods constitutes an unreasonable search under the Fourth Amendment. Cf United States v. Jones, 132 S. Ct. 945 (2012) (holding that tracking of location data for one individual over twenty-eight days constituted a search under the Fourth Amendment). It also violates the First Amendment by exposing private association to government scrutiny and by substantially burdening Plaintiffs' protected advocacy and expression. See Gibson v. Fla. Legis. Investigation Comm. 372 U.S. 539, 546 (1963); NAACP v. Ala. ex reI. Patterson, 357 U.S. 449, 460-61 (1958); McIntyre v. Ohio Elections Comm'n, 514 U.S. 334, 347 (1995). Finally, the balance of hardships favors Plaintiffs' request for preliminary relief. The preliminary injunction sought by Plaintiffs would substantially mitigate the continuing violation of Plaintiffs' rights. At the same time, entry of the requested injunction would not prejudice any legitimate government interest. Should Plaintiffs not ultimately prevail, the government will be in the same position it would have been in had Plaintiffs' suit never been brought. Pending final judgment, the government can access Plaintiffs' telephony metadata, if necessary, under a proper demonstration of cause under other authorities. See, e.g., 50 U.S.c. § 1842 (authorizing pen registers in foreign intelligence investigations). 3 Case 1:13-cv-03994-WHP Document 12 Filed 07/03/13 Page 4 of 4 submitted, Christopher T. Dunn Arthur N. Eisenberg New York Civil Liberties Union Foundation 125 Broad Street, 19th Floor New York, NY 10004 Phone: (212) 607-3300 Fax: (212) 607-3318 aeisenberg@nyclu.org Brett Max Kaufman Patrick Toomey Catherine Crump American Civil Liberties Union Foundation 125 Broad Street, 18th Floor New York, NY 10004 Phone: (212) 549-2500 Fax: (212) 549-2654 jjaffer@aclu.org AMERICAN CIVIL LIBERTIES UNION FOUNDATION Counsel for Plaintiffs Cc: Tara Marie La Morte (tara.lamorte2@usdoj.gov) 4 Exhibit 18 UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT Washington, D.C. Honorable Reggie B. Walton Presiding Judge July 29, 2013 Honorable Patrick J. Leahy Chairman Committee on the Judiciary United States Senate Washington, DC 20510 Dear Mr. Chairman: I am writing in response to your letter of July 18, 2013, in which you posed several questions about the operations of the Foreign Intelligence Surveillance Court (the Court). As you requested, we are providing unclassified responses. We would note that, as a general matter, the Court's practices have evolved over time. Various developments in the last several years including statutory changes, changes in the size of the Court and its staff, the adoption of new Rules of Procedure in 2010, and the relocation ofthe Court's facilities from the Department of Justice headquarters to a secure space in the federal courthouse in 2009- have affected some of these practices. The responses below reflect the current practices of the Court. I. Describe the typical process that the Court follows when it considers the following: (I) an application/or an order for electronic surveillance under Title I of FISA: (2) an application for an order for access to business records under Title V of FISA; and (3) submissions from the government under Section 702 of FISA. As to applications for orders for access to business records under Title V of FISA, please describe whether the process for the Court's consideration ofsuch applications is different when considering requests for bulk collection ofphone call metadata records, as recently declassified by the Director ofNational Intelligence. Each week, one of the eleven district court judges who comprise the Court is on duty in Washington. As discussed below, most of the Court's work is handled by the duty judge with the assistance of attorneys and clerk's office personnel who staff the Court. Some of the Court's more complex or time-consuming matters are handled by judges outside of the duty-week system, at the discretion of the Presiding Judge. In either case, matters before the Court are thoroughly reviewed and analyzed by the Court. Rule 9(a) of the United States Foreign Intelligence Surveillance Court Rules ofProcedure Honorable Patrick J. Leahy July 29, 2013 Page 2 (FISC Rules ofProcedure) 1 requires that except in certain circumstances (i.e., a submission pursuant to an emergency authorization under the statute or as otherwise permitted by the Court), a proposed application must be submitted by the government no later than seven days before the government seeks to have the matter entertained. 2 Upon the Court's receipt of a proposed application for an order under FISA, a member of the Court's legal staff reviews the application and evaluates whether it meets the legal requirements under the statute. As part of this evaluation, a Court attorney will often have one or more telephone conversations with the governmene to seek additional information and/or raise concerns about the application. A Court attorney then prepares a written analysis of the application for the duty judge, which includes an identification of any weaknesses, flaws, or other concerns. For example, the attorney may recommend that the judge consider requiring the addition of information to the application; imposing special reporting requirements; 4 or shortening the requested duration of an authorization. The judge then reviews the proposed application, as well as the attorney's written analysis. 5 The judge typically makes a preliminary determination at that time about what course 1 A copy of the FISC Rules of Procedure is appended hereto as Attachment A. The rules are also available at http://www. uscourts.gov /uscourts/rules/FISC20 I 0. pdf. 2 A proposed application is also sometimes referred to as a "read copy" and has been referred to in this manner in at least one recent congressional hearing. A proposed application or "read copy" is a near-final version of the government's application, which does not include the signatures of executive branch officials required by statutory provisions such as 50 U.S.C. §§ 1804(a)(6) and 1823(a)(6). As described below, in most circumstances, the government will subsequently file a final copy of an application pursuant to Rule 9(b) ofthe FISC Rules of Procedure. Both the proposed and final applications include proposed orders. The process of using proposed applications and final applications is altogether similar to the process employed by other federal courts in considering applications for wiretap orders under Title Ill of the Omnibus Crime Control and Safe Streets Act of 1968, as amended ("Title Ill"), which is codified at 18 U.S.C. §§ 2510-2522. 3 In discussing Court interactions with "the government" throughout this document, I am referring to interactions with attorneys in the Office oflntelligence of the National Security Division of the United States Department of Justice. 4 Pursuant to 50 U.S.C. §§ 1805(d)(3) and 1824(d)(3), the Court is authorized to assess compliance with the statutorily-required minimization procedures by reviewing the circumstances under which information concerning United States persons was acquired, retained, or disseminated. 5 For each application, the Court retains the attorney's written analysis and the notes made by the judge, so that if the government later seeks to renew the authorization, the judge who considers the next Honorable Patrick J. Leahy July 29, 2013 Page 3 of action to take. These courses of action might include indicating to Court staff that he or she is prepared to approve the application without a hearing; indicating an inclination to impose conditions on the approval of the application; determining that additional information is needed about the application; or determining that a hearing would be appropriate before deciding whether to grant the application. A staff attorney will then relay the judge's inclination to the government, and the government will typically proceed by providing additional information, or by submitting a final application (sometimes with amendments, at the government's election) for the Court's ruling pursuant to Rule 9(b) ofthe FISC Rules ofProcedure. In conjunction with its submission of a final application, the government has an opportunity to request a hearing, even if the judge did not otherwise intend to require one. The government might request a hearing, for example, to challenge conditions that the judge has indicated he or she would impose on the approval of an application. If the judge schedules a hearing, the judge decides whether to approve the application thereafter. Otherwise, the judge makes a determination based on the final written application submitted by the government. In approving an application, a judge will sometimes issue a Supplemental Order in addition to signing the government's proposed orders. Often, a Supplemental Order imposes some form of reporting requirement on the government. If after receiving a final application, the judge is inclined to deny it, the Court will prepare a statement ofreason(s) pursuant to 50 U.S.C. § 1803(a)(l). In some cases, the government may decide not to submit a final application, or to withdraw one that has been submitted, after learning that the judge does not intend to approve it. The annual statistics provided to Congress by the Attorney General pursuant to 50 U.S.C. §§ 1807 and 1862(b)- frequently cited to in press reports as a suggestion that the Court's approval rate of applications is over 99%- reflect only the number ofjinal applications submitted to and acted on by the Court. These statistics do not reflect the fact that many applications are altered prior to final submission or even withheld from final submission entirely, often after an indication that a judge would not approve them. 6 Most applications under Title V ofFISA are handled pursuant to the process described above. However, applications under Title V ofFISA for bulk collection of phone call metadata records are normally handled by the weekly duty judge using a process that is similar to the one described above, albeit more exacting. The government typically submits a proposed application of this type more than one week in advance. The attorney who reviews the application spends a application has the benefit of the prior thoughts of the judge(s) and staff, and a written record of any problems with the case. 6 Notably, the approval rate for Title III wiretap applications (see note 2 above) is higher than the approval rate for FISA applications, even using the Attorney General's FISA statistics as the baseline for comparison, as recent statistics show that from 2008 through 2012, only five of 13,593 Title III wiretap applications were requested but not authorized. See Administrative Office of the United States Courts, Wiretap Report 2012, Table 7 (available at http://www. uscourts.gov/uscourts/statistics/wiretapreports/20 12/Table 7. pdf). Honorable Patrick J. Leahy July 29, 2013 Page 4 greater amount of time reviewing and preparing a written analysis of such an application, in part because the Court has always required detailed information about the government's implementation of this authority. The judge likewise typically spends a greater amount of time than he or she normally spends on an individual application, carefully considering the extensive information provided by the government and determining whether to seek more information or hold a hearing before ruling on the application. As described above, the majority of applications submitted to the Court are handled on a seven-day cycle, by a judge sitting on a weekly duty schedule. Applications that are novel or more complex are sometimes handled on a longer time-line, usually require additional briefing, and are assigned by the Presiding Judge based on judges' availability. Section 702 (i.e., 50 U.S.C. § 1881a) applications7 would typically fall into this category. I ! I I f I I ~ Where the Court's process for handling Section 702 applications differs from the process described above, it is largely based on the statutory requirements of that section, which was enacted as part ofthe FISA Amendments Act of2008 (FAA). Pursuant to 50 U.S.C. §§ 1881 a(g)(l )(A) & (g)(2)(D)(i), prior to the implementation of an authorization under Section 702, the Attorney General and the Director of National Intelligence must provide the Court with a written certification containing certain statutorily required elements, and that certification must include an effective date for the authorization that is at least 30 days after the submission of the written certification to the Court. 8 Under 50 U.S.C. § 1881a(i)(B), the Court must review the certification, as well as the targeting and minimization procedures adopted in accordance with 50 U.S.C. §§ 1881a(d) & (e), not later than 30 days after the date on which the certification and procedures are submitted. The statutorily-imposed deadline for the Court's review typically coincides with the effective date identified in the final certification filed with the Court. The government's submission of a Section 702 application typically includes a cover filing that highlights any special issues and identifies any changes that have been made relative to the prior application. The government has typically filed proposed (read copy) Section 702 applications approximately one month before filing a final application. Proposed Section 702 applications are reviewed by multiple members ofthe Court's legal staff. At the direction of the Presiding Judge or a judge who has been assigned to handle the Section 702 application, the 7 "Section 702 application" is used here to refer collectively to a Section 702 certification and supporting affidavit, as well as to the statutorily-required targeting and minimization procedures. 8 If the acquisition has already begun (e.g., pursuant to a determination of exigent circumstances under 50 U.S.C. § 1881 a( c)(2)) or the effective date is less than 30 days after the submission of the written certification to the Court (e.g., because of an amendment to a certification while judicial review is pending, pursuant to 50 U.S.C. § 1881a(i)(l)(C)), 50 U.S.C. § 1881a(g){2){D)(ii) requires the certification to include the date the acquisition began or the effective date of the authorization. t I I Honorable Patrick J. Leahy July 29, 2013 Page 5 Court's legal staff may request a meeting with the government to discuss a proposed application. Also at the direction of the Presiding Judge or a judge who has been assigned to handle the Section 702 application, the Court legal staff may request additional information from the government or convey a judge's concerns about the legal sufficiency of a proposed Section 702 application. Following these interactions, the government files a final Section 702 application, which the government may have elected to amend based on any concerns raised by the judge. The judge reviews the final Section 702 application and may set a hearing if he or she has additional questions about it. If the judge finds (based on the written submission alone or the written submission in combination with a hearing) that the certification contains all of the required elements, and that the targeting and minimization procedures adopted in accordance with 50 U.S.C. §§ 1881a(d) & (e) are consistent with the requirements of those subsections and with the Fourth Amendment to the Constitution of the United States, the judge enters an order approving the certification in accordance with 50 U.S.C. § 1881a(i)(3)(A). As required by 50 U.S.C. § 1881a(i)(3)(C), the judge also issues an opinion in support of the order. If the judge finds that the certification does not contain the required elements or the targeting and minimization procedures are inconsistent with the requirements of 50 U.S.C. §§ 1881a(d) & (e), or the Fourth Amendment, the judge will, pursuant to 50 U.S.C. § 1881a(i)(3)(B), issue an order directing the government to, at the government's election and to the extent required by the Court's order, either correct any deficiency identified by the Court's order not later than 30 days after the date on which the Court issues the order, or cease, or not begin, the implementation of the authorization for which the certification was submitted. Subsequent review of any remedial measures taken by the government may then be required and may result in another order and opinion pursuant to 50 U.S.C. § 1881a(i). 2. When considering such applications and submissions, please describe the interaction between the government and the Court (including both judges and court stajj), including any hearings, meetings, or other means through which the Court has the opportunity to ask questions or seek additional information from the government. Please describe how frequently such exchanges occur, and generally what types ofadditional information that the Court might request of the government, if any. Please also describe how frequently the Court asks the government to make changes to its applications and submissions before ruling. The process through which the Court interacts with the government in reviewing proposed applications, seeking additional information, conveying Court concerns, and adjudicating final applications, is very similar to the process employed by other federal courts in considering applications for wiretap orders under Title III (discussed in notes 2 and 6 above). Under FISA practice, the first set of interactions often take place at the staff level. The Court's legal staff frequently interacts with the government in various ways in the context of Honorable Patrick J. Leahy July 29, 2013 Page 6 examining the legal sufficiency of applications before they are presented in final form to a judge. Indeed, in the process of reviewing the government's applications and submissions in order to provide advice to the judge, the legal staff interact with the government on a daily basis. These daily interactions typically consist of secure telephone conversations in which legal staff ask the government questions about the legal and factual elements of applications or submissions. These questions may originate with legal staff after an initial review of an application or submission, or they may come from a judge. At the direction of the Presiding Judge or the judge assigned to a matter, Court legal staff sometimes meet with the government in connection with applications and submissions. The Court typically requests such meetings when a proposed application or submission presents a special legal or factual concern about which the Court would like additional information (e.g., a novel use of technology or a request to use a new surveillance or search technique). The frequency of such meetings varies depending on the Court's assessment of its need for additional information in matters before it and the most conducive means to obtain that information. Court legal staff may meet with the government as often as 2-3 times a week, or as few as 1-2 times a month, in connection with the various matters pending before the Court. Pursuant to 50 U.S.C. § 1803(a)(2)(A) and Rule 17(a) ofthe FISC Rules ofProcedure, the Court also holds hearings in cases in which a judge assesses that he or she needs additional information in order to rule on a matter. The frequency of hearings varies depending on the nature and complexity of matters pending before the Court at a given time, and also, to some extent, based on the individual preferences of different judges. Hearings are attended, at a minimum, by the Department of Justice attorney who prepared the application and a fact witness from the agency seeking the Court's authorization. The types of additional information sought from the government - through telephone conversations, meetings, or hearings- include, but are not limited to, the following: additional facts to justifY the government's belief that its application meets the legal requirements for the type of authority it is seeking (e.g., in the case of electronic surveillance, that might include additional information to justifY the government's belief that a target of surveillance is a foreign power or an agent of a foreign power, as required by 50 U.S.C. § 1804(a)(3)(A), or that the target is using or about to use a particular facility, as required by 50 U.S.C. § 1804(a)(3)(B)); additional facts about how the government intends to implement statutorily required minimization procedures (see, e.g., 50 U.S.C. §§ 1801(h); 1805(a)(3); 1824(a)(3); 1861(c)(l); 1881a(i)(3)(A); and 1881 c(c)(1 )(c)); additional information about the government's prior implementation of a Court order, particularly if the government has previously failed to comply fully with a Court order; or additional information about novel issues of technology or law (see Rule 11 of FISC Rules of Procedure). In a typical week, the Court seeks additional information or modifies the terms proposed I t l I l Honorable Patrick J. Leahy July 29, 2013 Page7 by the government in a significant percentage of cases. 9 (The Court has recently initiated the process of tracking more precisely how frequently this occurs.) The judge may determine, for example, that he or she cannot make the necessary findings under the statute without the addition of information to the application, or that he or she can approve only some of the authorities sought through the application. The government then has the choice to alter its final application or proposed orders in response to the judge's concerns; request a hearing to address those concerns; submit a final application without changes; or elect not to proceed at all with a final application. If the government files a final application, the Court may, on its own, make changes to the government's proposed orders (or issue totally redrafted orders) to address the judge's concern about a given application. The judge may choose, for example, to make an authorization of a shorter duration than what was requested by the government, or the judge may issue a Supplemental Order imposing special reporting or minimization requirements on the government's implementation of an authorization. 3. Public FISA Court opinions and orders make clear that the Court has considered the views of non-governmental parties in certain cases, including a provider challenge to the Protect America Act of 2007. Describe instances where nongovernmental parties have appeared before the Court. Has the Court invited or heard views from a nongovernmental party regarding applications or submissions under Title/, Title V, or Title VII of FISA? lf so, how did this come about, and what was the process or mechanism that the Court used to enable such views to be considered? FISA does not provide a mechanism for the Court to invite the views of nongovernmental parties. In fact, the Court's proceedings are ex parte as required by the statute (see. e.g., 50 U.S.C. §§ 1805(a), 1824(a), 1842(d)(l) & 1861(c)(l)), and in keeping with the procedures followed by other courts in applications for search warrants and wiretap orders. Nevertheless, the statute and the FISC Rules of Procedure provide multiple opportunities for recipients of Court orders or government directives to challenge those orders or directives, either directly or through refusal to comply with orders or directives. Additionally, as detailed below, there have been several instances - particularly in the past several months - in which nongovernmental parties have appeared before the Court outside of the context of a challenge to an individual Court order or government directive. There has been one instance in which the Court heard arguments from a nongovernmental party that sought to substantively contest a directive from the government. Specifically, in 2007, the government issued directives to Yahoo!, Inc. (Yahoo) pursuant to Section 1058 ofthe Protect America Act of 2007 (PAA). Yahoo refused to comply with the directives, and the government 9 This assessment does not include minor technical or typographical changes, which occur more frequently. Honorable Patrick J. Leahy July 29, 2013 Page 8 filed a motion with this Court to compel compliance. The Court ordered and received briefing from both parties, and rendered a decision in April 2008. 10 As noted above, the FISC Rules of Procedure and the FISA statute provide opportunities for the appearance of nongovernmental parties before the Court in matters pending pursuant to Titles I, V and VII of the statute. For example, Rule 19(a) of the FISC Rules of Procedure provides that if a person or entity served with a Court order fails to comply with that order, the government may file a motion for an order to show cause why the recipient should not be held in contempt and sanctioned accordingly. Thus, a nongovernmental party served with an order may invite an opportunity to be heard by the Court through refusal to comply with an order. With respect to applications filed under Title V ofFISA, 50 U.S.C. § 1861(t)(2)(A)(i) provides that a person receiving a production order may challenge the legality of that order by filing a petition with the Court. The same section of the statute provides that the recipient of a production order may challenge the non-disclosure order imposed in connection with a production order by filing a petition to modify or set aside the nondisclosure order. Rules 33-36 of the FISC Rules of Procedure delineate the procedures and requirements for filing such petitions, including the time limits on such challenges. To date, no recipient of a production order has opted to invoke this section of the statute. With respect to applications filed under Title VII ofFISA, 50 U.S.C. § 188la(h)(4)(A) provides that an electronic communication service provider who receives a directive pursuant to Section 702 may file a petition to modify or set aside the directive with the Court. Sections 188la(h)(4)(A)-(G) ofthe statute, as well as Rule 28 ofthe FISC Rules of Procedure, delineate 10 Yahoo thereafter appealed the Court's decision to the Foreign Intelligence Surveillance Court of Review (FISCR). See In re Directives [redacted] Pursuant to Section 105b of the Foreign Intelligence Surveillance Act, 551 F.3d 1004 (FISA Ct. Rev. 2008). This is not the only instance in which a nongovernmental entity has appeared before the FISCR. In 2002, the FISCR accepted briefs filed by the ACLU and the National Association of Criminal Defense Lawyers as amici curiae in In re Sealed Case, 310 F.3d 717 (FISA Ct. Rev. 2002). While Yahoo's identity as the provider that challenged these directives was previously under seal pursuant to the FISCR's decision in In re Directives, 551 F.3d 1004, 1016-18, the FISCR issued an Order on June 26, 2013, indicating that it does not object to the release of Yahoo's identity, and ordering, among other things, a new declassification review of the FISCR's opinion in In re Directives. The FISCR issued this order in response to a motion by Yahoo's counsel, and after receiving briefing by Yahoo and the government. Yahoo also recently filed a motion for publication of the Court's decision that was appealed to the FISCR, resulting in the published opinion in In re Directives. The Court granted the motion. Documents related to Yahoo's recent motion to this Court are available at http://www.uscourts.gov/uscourts/courts/fisc/index.html under Docket No. 105B(g) 07-0 I. Honorable Patrick J. Leahy July 29, 2013 Page 9 the procedures and requirements for such challenges. Relatedly, 50 U.S.C. § 188la(h)(5)(A) provides that if an electronic communication service provider fails to comply with a directive issued under Section 702, the Attorney General may file a petition with the Court for an order to compel compliance, which would likely result in the service provider's appearance before the Court through its legal representatives. (Section 1881a(h)(5), as well as Rule 29 of the FISC Rules of Procedure, provide further detail on the procedures and requirements for the enforcement of Section 702 directives.) Finally, 50 U.S.C. § 1881a(h)(6) and Rule 31 ofthe FISC Rules of Procedure allow for the government or an electronic communication service provider to appeal an order ofthis Court under§§ 1881a(h)(4) or (5) to the FISCR. To date, no electronic communication service provider has opted to challenge a directive issued pursuant to Section 702, although, as noted above, Yahoo refused to comply with government directives issued under the PAA, which resulted in the government invoking a provision under that statute to compel compliance. As noted above, there have been a number of other instances in which nongovernmental parties have appeared before the Court outside of the context of a direct challenge to a court order or a government directive, particularly recently. Those instances are as follows: In August 2007, the American Civil Liberties Union (ACLU) filed a motion with the Court for the release of certain records. The Court ordered and received briefing on the matter from the ACLU and the government, and rendered a decision in December 2007. See In re Motion for Release of Court Records, 526 F. Supp. 2d 484 (FISA Ct. 2007). On May 23, 2013, the Electronic Frontier Foundation (EFF) filed a motion with this Court for consent to disclosure of court records, or in the alternative, a determination of the effect of the Court's rules on access rights under the Freedom oflnformation Act. Following briefing by EFF and the government, the Court issued an Opinion and Order on June 12, 2013. All documents filed in this docket are available at http://www.uscourts.gov/uscourts/courts/fisc/index.html under Case No. Misc. 13-01. On June 12, 2013, the ACLU, the American Civil Liberties Union of the Nation's Capital, and the Media Freedom and Information Access Clinic (Movants) filed a motion with this Court for the release of Court records. The Court ordered and has received briefing on the matter from the Movants and the government. On July 18, 2013, the Court granted the motions of ( 1) sixteen members of the House of Representatives and (2) a coalition of news media organizations for leave to file amicus curiae briefs in this case. The matter is pending before the Court. All documents filed in this docket are available at http://www.uscourts.gov/uscourts/courts/fisc/index.html under Case No. Misc. 13-02. On June 18, 2013, Google, Inc. filed a motion with this Court for declaratory judgment of the company's first amendment right to publish aggregate information about FISA orders. The ~ I I I Honorable Patrick J. Leahy July 29, 2013 Page 10 court ordered briefing on the matter. On July 18,2013, the Court granted the motions of(1) a coalition of news media organizations and (2) the First Amendment Coalition, the ACLU, the Center for Democracy and Technology, the EFF, and Techfreedom for leave to file amicus curiae briefs in this case. The matter is pending before the Court. All documents filed in this docket are available at http://www.uscourts.gov/uscourts/courts/fisc/index.html under Case No. Misc. 13-03. On June 19, 2013, Microsoft Corporation filed a motion in this Court for declaratory judgment or other appropriate relief authorizing disclosure of aggregate data regarding any FISA orders it has received. The court ordered briefing on the matter. On July 18, 2013, the Court granted the motions of (1) a coalition of news media organizations and (2) the First Amendment Coalition, the ACLU, the Center for Democracy and Technology, the EFF, and Techfreedom for leave to file amicus curiae briefs in this case. The matter is pending before the Court. All documents filed in this docket are available at http://www.uscourts.gov/uscourts/courts/fisc/index.html under Case No. Misc. 13-04. 4. Please describe the process used by the Court to consider and resolve any instances where the government notifies the Court ofcompliance concerns with any ofthe FISA authorities. Pursuant to 50 U.S.C. § 1803(h), the Court is empowered to ensure compliance with its orders. Additionally, Rule 13(a) of the FISC Rules of Procedure requires the government to file a written notice with the Court immediately upon discovering that any authority or approval granted by the Court has been implemented (either by government officials or others operating pursuant to Court order) in a manner that did not comply with the Court's authorization or approval or with applicable law. Rule 13(a) also requires the government to notifY the Court in writing of the facts and circumstances relevant to the non-compliance; any modifications the government has made or proposes to make in how it will implement any authority or approval granted by the Court; and how the government proposes to dispose of or treat any information obtained as a result of the non-compliance. When the government discovers instances of non-compliance, it files notices with the Court as required by Rule 13(a). Because the rule requires the government to "immediately inform the Judge" of a compliance incident, the government typically files a preliminary notice that provides whatever facts are available at the time an incident is discovered. The legal staff review these notices as they are received and call significant matters to the attention of the appropriate judge. In instances in which the non-compliance has not been fully addressed by the time the preliminary Rule 13(a) notice is filed, the Court may seek additional information through telephone calls, meetings, or hearings. Typically, the government will file a final Rule 13(a) notice once the relevant facts are known and any unauthorized collection has been destroyed. However, judges sometimes issue orders directing the government to take specific I i ! Honorable Patrick J. Leahy July 29, 2013 Page 11 actions to address instances of non-compliance either before or after a final notice is filed, and, less frequently, to cease a course of action that the Court considers non-compliant. This process is followed for compliance issues in all matters, including matters handled under Title V and Section 702. I hope these responses are helpful to the Senate Judiciary Committee in its deliberations. m rel~(31{;k R g ie B. Walton Presiding Judge Identical letter sent to: Honorable Charles E. Grassley I I r TO THE BENCH, BAR AND PUBLIC: The attached Rules ofProcedure for the Foreign Intelligence Surveillance Court supersede both the February 17, 2006 Rules of Procedure and the May 5, 2006 Procedures for Review of Petitions Filed Pursuant to Section 501(/) of the Foreign Intelligence Surveillance Act of 1978, As Amended. These revised Rules of Procedure are effective immediately. John D. Bates Presiding Judge Foreign Intelligence Surveillance Court November 1, 20 l 0 UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT Washington, D.C. RULES OF PROCEDURE Effective November 1, 2010 Rule Page Title I. Scope of Rules; Amendment 1. Scope of Rules ............................................................. 1 2. Amendment ............................................................... 1 Title II. National Security Information 3. National Security Information ................................................. 1 Title III. Structure and Powers of tbe Court 4. Structure ............................................................... . 5. Authority of the Judges .................................................... . Title IV. Matters Presented to tbe Court 6. Means of Requesting Relief from the Court ...................................... 2 7. Filing Applications, Certifications, Petitions, Motions, or Other Papers ("Submissions") ....................................... 2 8. Service ................................................................... 3 9. Time and Manner of Submission of Applications .................................. 3 10. Computation of Time ....................................................... 4 11. Notice and Briefing of Novel Issues ............................................ 4 12. Submission of Targeting and Minimization Procedures ............................. 5 13. Correction of Misstatement or Omission; Disclosure of Non-Compliance .............. 5 14. Motions to Amend Court Orders .............................................. 5 15. Sequestration .............................................................. 5 16. Returns .................................................................. 6 Title V. Hearings, Orders, and Enforcement 17. Hearings ................................................................. 6 18. Court Orders .............................................................. 6 19. Enforcement of Orders ...................................................... 7 Title VI. Supplemental Protedures for Proteedings Under SO U.S.C. § 188la(h) 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. Scope .................................................................... 7 Petition to Modify or Set Aside a Directive ...................................... 7 Petition to Compel Compliance With a Directive ................................. 7 Contents of Petition ........................................................ 8 Response ................................................................. 8 Length of Petition and Response; Other Papers ................................... 8 Notification of Presiding Judge ............................................... 8 Assignment ............................................................... 8 Review of Petition to Modify or Set Aside a Directive ............................. 9 Review of Petition to Compel Compliance Pursuant to 50 U.S.C. § 1881a(h)(5)(C) ...... 9 In Camera Review ......................................................... 9 Appeal ................................................................... 9 Title VII. Supplemental Protedures for Proteedings Under SO U.S.C. § 186l(f) 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. Scope ................................................................... Petition Challenging Production or Nondisclosure Order .......................... Contents of Petition ....................................................... Length of Petition ......................................................... Request to Stay Production .................................................. Notification of Presiding Judge .............................................. Assignment .............................................................. Initial Review ............................................................ Response to Petition; Other Papers ............................................ Rulings on Non-frivolous Petitions ........................................... Failure to Comply ......................................................... In Camera Review ........................................................ Appeal .................................................................. 10 10 10 10 10 10 11 11 11 11 12 12 12 Title VIII. En Bant Proteedings 45. 46. 47. 48. 49. 50. 51. 52. 53. Standard for Hearing or Rehearing En Bane ..................................... Initial Hearing En Bane on Request of a Party ................................... Rehearing En Bane on Petition by a Party ...................................... Circulation of En Bane Petitions and Responses ................................. Court-Initiated En Bane Proceedings .......................................... Polling .................................................................. Stay Pending En Bane Review ............................................... Supplemental Briefing ..................................................... Order Granting or Denying En Bane Review .................................... -11- 12 12 12 13 13 13 13 13 13 54. 55. 56. 57. 58. 59. Title IX. Appeals How Taken .............................................................. 14 When Taken ............................................................. 14 Stay Pending Appeal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Motion to Transmit the Record ............................................... 14 Transmitting the Record .................................................... 14 Oral Notification to the Court of Review ....................................... 14 Title X. Administrative Provisions 60. 61. 62. 63. Duties ofthe Clerk ........................................................ 14 Office Hours . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Release of Court Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Practice Before Court ...................................................... 15 -111- Title I. Scope of Rules; Amendment Rule I. Scope of Rules. These rules, which are promulgated pursuant to 50 U.S.C. § 1803(g), govern all proceedings in the Foreign Intelligence Surveillance Court (''the Court"). Issues not addressed in these rules or the Foreign Intelligence Surveillance Act, as amended (''the Act"), may be resolved under the Federal Rules of Criminal Procedure or the Federal Rules of Civil Procedure. Rule 2. Amendment. Any amendment to these rules must be promulgated in accordance with 28 u.s.c. § 2071. Title II. National Security Information Rule 3. National Security Information. In all matters, the Court and its staff shall comply with the security measures established pursuant to 50 U.S.C. §§ 1803(c), 1822(e), 186l(f)(4), and 188la(k)(l), as well as Executive Order 13526, "Classified National Security Infonnation" (or its successor). Each member of the Court's staff must possess security clearances at a level commensurate to the individual's responsibilities. Title III. Structure and Powen of the Court Rule 4. Structure. (a) Composition. In accordance with 50 U.S.C. § 1803(a), the Court consists ofUnited States District Court Judges appointed by the Chief Justice of the United States. (b) Presiding Judge. The Chief Justice designates the "Presiding Judge." Rule 5. Authority of the Judges. (a) Scope of Authority. Each Judge may exercise the authority vested by the Act and such other authority as is consistent with Article III of the Constitution and other statutes and laws of the United States, to the extent not inconsistent with the Act. (b) Referring Matten to Other Judges. Except for matters involving a denial of an application for an order, a Judge may refer any matter to another Judge of the Court with that Judge's consent. If a Judge directs the government to supplement an application, the Judge may direct the government to present the renewal of that application to the same Judge. If a matter is presented to a Judge who is unavailable or whose tenure on the Court expires while the matter is pending, the Presiding Judge may re-assign the matter. (e) Supplementation. The Judge before whom a matter is pending may order a party to furnish any infonnation that the Judge deems necessary. -1- Title IV. Matters Presented to the Court Rule 6. Means of Requesting Relief from the Court. (a) Application. The government may, in accordance with 50 U.S.C. §§ 1804, 1823, 1842, 1861, 188lb(b), 188lc(b), or 1881d(a), file an application for a Court order ("application"). (b) Certification. The government may, in accordance with 50 U.S.C. § 1881a(g), file a certification concerning the targeting of non-United States persons reasonably believed to be located outside the United States ("certification"). (c) Petition. A party may, in accordance with 50 U.S.C. §§ 1861(f) and 1881a(h) and the Supplemental Procedures in Titles VI and VII of these Rules, file a petition for review of a production or nondisclosure order issued under 50 U.S.C. § 1861 or for review or enforcement of a directive issued under 50 U.S.C. § 1881a ("petition"). (d) Motion. A party seeking relief, other than pursuant to an application, certification, or petition permitted under the Act and these Rules, must do so by motion ("motion"). Rule 7. Filing Applications, Certifications, Petitions, Motions, or Other Papers ("Submissions"). (a) Filing. A submission is filed by delivering it to the Clerk or as otherwise directed by the Clerk in accordance with Rule 7(k). (b) Original and One Copy. Except as otherwise provided, a signed original and one copy must be filed with the Clerk. (c) Form. Unless otherwise ordered, all submissions must be: (1) on 8~-by-ll-inch opaque white paper; and (2) typed (double-spaced) or reproduced in a manner that produces a clear black image. (d) Electronic Filing. The Clerk, when authorized by the Court, may accept and file submissions by any reliable, and appropriately secure, electronic means. (e) Facsimile or Scanned Signature. The Clerk may accept for filing a submission bearing a facsimile or scanned signature in lieu of the original signature. Upon acceptance, a submission bearing a facsimile or scanned signature is the original Court record. (f) Citations. Each submission must contain citations to pertinent provisions of the Act. (g) Contents. Each application and certification filed by the government must be approved and certified in accordance with the Act, and must contain the statements and other information required by the Act. (h) Contact Information in Adversarial Proceedings. (1) Filing by a Party Other Than the Government. A party other than the government must include in the initial submission the party's full name, address, and telephone number, or, if the party is represented by counsel, the full name of the party and the party's counsel, as well as counsel's address, telephone number, facsimile number, and bar membership information. (2) Filing by the Government. In an adversarial proceeding, the initial -2- submission filed by the government must include the full names of the attorneys representing the United States and their mailing addresses, telephone numbers, and facsimile numbers. (i) Information Concerning Security Clearances in Adversarial Proceedings. A party other than the government must: (1) state in the initial submission whether the party (or the party's responsible officers or employees) and counsel for the party hold security clearances; (2) describe the circumstances in which such clearances were granted; and (3) identify the federal agencies granting the clearances and the classification levels and compartments involved. (j) Ex Parte Review. At the request of the government in an adversarial proceeding, the Judge must review ex parte and in camera any submissions by the government, or portions thereof, which may include classified information. Except as otherwise ordered, if the government files ex parte a submission that contains classified information, the government must file and serve on the non-governmental party an unclassified or redacted version. The unclassified or redacted version, at a minimum, must clearly articulate the government's legal arguments. (k) Instructions for Delivery to the Court. A party may obtain instructions for making submissions permitted under the Act and these Rules by contacting the Clerk at (202) 357-6250. Rule 8. Service. (a) By a Party Other than the Government. A party other than the government must, at or before the time of filing a submission permitted under the Act and these Rules, serve a copy on the government. Instructions for effecting service must be obtained by contacting the Security and Emergency Planning Staff, United States Department of Justice, by telephone at (202) 514-2094. (b) By the Government. At or before the time of filing a submission in an adversarial proceeding, the government must, subject to Rule 7G), serve a copy by hand delivery or by overnight delivery on counsel for the other party, or, if the party is not represented by counsel, on the party directly. (c) Certificate of Service. A party must include a certificate of service specifying the time and manner of service. Rule 9. Time and Manner of Submission of Applications. (a) Proposed Applications. Except when an application is being submitted following an emergency authorization pursuant to 50 U.S.C. §§ 1805(e), 1824(e), 1843, 188lb(d), or 1881c(d) ("emergency authorization"), or as otherwise permitted by the Court, proposed applications must be submitted by the government no later than seven days before the government seeks to have the matter entertained by the Court. Proposed applications submitted following an emergency authorization must be submitted as soon after such authorization as is reasonably practicable. (b) Final Applications. Unless the Court permits otherwise, the final application, -3- including all signatures, approvals, and certifications required by the Act, must be filed no later than 10:00 a.m. Eastern Time on the day the government seeks to have the matter entertained by the Court. (c) Proposed Orders. Each proposed application and final application submitted to the Court must include any pertinent proposed orders. (d) Number of Copies. Notwithstanding Rule 7(b), unless the Court directs otherwise, only one copy of a proposed application must be submitted and only the original final application must be filed. (e) Notice of Changes. No later than the time the final application is filed, the government must identify any differences between the final application and the proposed application. Rule 10. Computation of Time. The following rules apply in computing a time period specified by these Rules or by Court order: (a) Day of the Event Excluded. Exclude the day of the event that triggers the period. (b) Compute Time Using Calendar Days. Compute time using calendar days, not business days. (c) Include the Last Day. Include the last day of the period; but if the last day is a Saturday, Sunday, or legal holiday, the period continues to run until the next day that is not a Saturday, Sunday, or legal holiday. Rule 11. Notice and Briefing of Novel Issues. (a) Notice to the Court. If a submission by the government for Court action involves an issue not previously presented to the Court - including, but not limited to, a novel issue of technology or law- the government must inform the Court in writing of the nature and significance of that issue. (b) Submission Relating to New Techniques. Prior to requesting authorization to use a new surveillance or search technique, the government must submit a memorandum to the Court that: (1) explains the technique; (2) describes the circumstances of the likely implementation of the technique; (3) discusses any legal issues apparent1y raised; and (4) describes the proposed minimization procedures to be applied. At the latest, the memorandum must be submitted as part of the first proposed application or other submission that seeks to employ the new technique. (c) Novel Implementation. When requesting authorization to use an existing surveillance or search technique in a novel context, the government must identify and address any new minimization or other issues in a written submission made, at the latest, as part of the application or other filing seeking such authorization. (d) Legal Memorandum. If an application or other request for action raises an issue of law not previously considered by the Court, the government must file a memorandum of law in support of its position on each new issue. At the latest, the memorandum must be -4- submitted as part of the first proposed application or other submission that raises the issue. Rule 12. Submission of Targeting and Minimization Procedures. In a matter involving Court review of targeting or minimization procedures, such procedures may be set out in full in the government's submission or may be incorporated by reference to procedures approved in a prior docket. Procedures that are incorporated by reference to a prior docket may be supplemented, but not otherwise modified, in the government's submission. Otherwise, proposed procedures must be set forth in a clear and self-contained manner, without resort to cross-referencing. Rule 13. Correction of Misstatement or Omission; Disclosure of Non-Compliance. (a) Correction of Material Facts. If the government discovers that a submission to the Court contained a misstatement or omission of material fact, the government, in writing, must immediately inform the Judge to whom the submission was made of: (1) the misstatement or omission; (2) any necessary correction; (3) the facts and circumstances relevant to the misstatement or omission; (4) any modifications the government has made or proposes to make in how it will implement any authority or approval granted by the Court; and (S) how the government proposes to dispose of or treat any information obtained as a result of the misstatement or omission. (b) Disclosure of Non-Compliance. If the government discovers that any authority or approval granted by the Court has been implemented in a manner that did not comply with the Court's authorization or approval or with applicable law, the government, in writing, must immediately inform the Judge to whom the submission was made of: (1) the non-compliance; (2) the facts and circumstances relevant to the non-compliance; (3) any modifications the government has made or proposes to make in how it will implement any authority or approval granted by the Court; and (4) how the government proposes to dispose of or treat any information obtained as a result of the non-compliance. Rule 14. Motions to Amend Court Orders. Unless the Judge who issued the order granting an application directs otherwise, a motion to amend the order may be presented to any other Judge. Rule IS. Sequestration. Except as required by Court-approved minimization procedures, the government must not submit material for sequestration with the Court without the prior approval of the Presiding Judge. To obtain such approval, the government must, prior to tendering the material to the Court for sequestration, file a motion stating the circumstances of the material's acquisition and explaining why it is necessary for such material to be retained in the custody of the Court. -5- I I I J i l ! i, f I J ~ l Rule 16. Returns. (a) Time for Filing. (1) Search Orders. Unless the Court directs otherwise, a return must be made and filed either at the time of submission of a proposed renewal application or within 90 days of the execution of a search order, whichever is sooner. (2) Other Orders. The Court may direct the filing of other returns at a time and in a manner that it deems appropriate. (b) Contents. The return must: (1) notify the Court of the execution of the order; (2) describe the circumstances and results of the search or other activity including, where appropriate, an inventory; (3) certify that the execution was in conformity with the order or describe and explain any deviation from the order; and (4) include any other information as the Court may direct. Title V. Hearings, Orders, and Enforcement Rule 17. Hearings. (a) Scheduling. The Judge to whom a matter is presented or assigned must determine whether a hearing is necessary and, if so, set the time and place of the hearing. (b) Ex Parte. Except as the Court otherwise directs or the Rules otherwise provide, a hearing in a non-adversarial matter must be ex parte and conducted within the Court's secure facility. (c) Appearances. Unless excused, the government official providing the factual information in an application or certification and an attorney for the applicant must attend the hearing, along with other representatives of the government, and any other party, as the Court may direct or permit. (d) Testimony; Oath; Recording of Proceedings. A Judge may take testimony under oath and receive other evidence. The testimony may be recorded electronically or as the Judge may otherwise direct, consistent with the security measures referenced in Rule 3. Rule 18. Court Orders. (a) Citations. All orders must contain citations to pertinent provisions of the Act. (b) Denying Applications. (1) Written Statement of Reasons. If a Judge denies the government's application, the Judge must immediately provide a written statement of each reason for the decision and cause a copy of the statement to be served on the government. (2) Previously Denied Application. If a Judge denies an application or other request for relief by the government, any subsequent submission on the matter must be referred to that Judge. -6- (c) Expiration Dates. An expiration date in an order must be stated using Eastern Time and must be computed from the date and time of the Court's issuance of the order, or, if applicable, of an emergency authorization. (d) Electronic Signatures. The Judge may sign an order by any reliable, appropriately secure electronic means, including facsimile. Rule 19. Enforcement of Orders. (a) Show Cause Motions. If a person or entity served with a Court order (the "recipient") fails to comply with that order, the government may file a motion for an order to show cause why the recipient should not be held in contempt and sanctioned accordingly. The motion must be presented to the Judge who entered the underlying order. (b) Proceedings. (1) An order to show cause must: (i) confirm that the underlying order was issued; (ii) schedule further proceedings; and (iii) afford the recipient an opportunity to show cause why the recipient should not be held in contempt. (2) A Judge must conduct any proceeding on a motion to show cause in camera. The Clerk must maintain all records of the proceedings in conformance with 50 U.S.C. § 1803(c). (3) If the recipient fails to show cause for noncompliance with the underlying order, the Court may find the recipient in contempt and enter any order it deems necessary and appropriate to compel compliance and to sanction the recipient for noncompliance with the underlying order. (4) If the recipient shows cause for noncompliance or if the Court concludes that the order should not be enforced as issued, the Court may enter any order it deems appropriate. Title VI. Supplemental Procedures for Proceedings Under SO U.S.C. § 1881a(h) Rule 20. Scope. Together with the generally-applicable provisions of these Rules concerning filing, service, and other matters, these supplemental procedures apply in proceedings under 50 . U.S.C. § 188la(h). Rule 21. Petition to Modify or Set Aside a Directive. An electronic communication service provider ("provider"), who receives a directive issued under 50 U.S.C. § 188la(h)(l), may file a petition to modify or set aside such directive under 50 U.S.C. § 1881a(h)(4). A petition may be filed by the provider's counsel. -7- Rule 22. Petition to Compel Compliance With a Directive. In the event a provider fails to comply with a directive issued under 50 U.S.C. § 1881a(h)(l), the government may, pursuant to 50 U.S.C. § 188la(h)(5), file a petition to compel compliance with the directive. Rule 23. Contents of Petition. The petition must: (a) state clearly the relief being sought; (b) state concisely the factual and legal grounds for modifying, setting aside, or compelling compliance with the directive at issue; (c) include a copy of the directive and state the date on which the directive was served on the provider; and (d) state whether a hearing is requested. Rule 24. Response. (a) By Government. The government may, within seven days following notification under Rule 28(b) that plenary review is necessary, file a response to a provider's petition. (b) By Provider. The provider may, within seven days after service of a petition by the government to compel compliance, file a response to the petition. Rule 25. Length of Petition and Response; Other Papers. (a) Length. Unless the Court directs otherwise, a petition and response each must not exceed 20 pages in length, including any attachments (other than a copy of the directive at issue). (b) Other papers. No supplements, replies, or sur-replies may be filed without leave of the Court. Rule 26. Notification of Presiding Judge. Upon receipt, the Clerk must notify the Presiding Judge that a petition to modify, set aside, or compel compliance with a directive issued under 50 U.S.C. § 188la(h)(l) has been filed. If the Presiding Judge is not reasonably available when the Clerk receives a petition, the Clerk must notify each of the local Judges, in order of seniority on the Court, and, if necessary, each of the other Judges, in order of seniority on the Court, until a Judge who is reasonably available has received notification. The reasonably available Judge who receives notification will be the acting Presiding Judge ("Presiding Judge") for the case. Rule 27. Assignment. (a) Presiding Judge. As soon as possible after receiving notification from the Clerk that a petition has been filed, and no later than 24 hours after the filing of the petition, the Presiding Judge must assign the matter to a Judge in the petition review pool established by 50 U.S.C. § 1803(e)(l). The Clerk must record the date and time ofthe assignment. (b) Transmitting Petition. The Clerk must transmit the petition to the assigned Judge as soon as possible but no later than 24 hours after being notified of the assignment by the Presiding Judge. -8- Rule 28. Review of Petition to Modify or Set Aside a Directive. (a) Initial Review Pursuant to 50 U.S.C. § 1881a(h)(4)(D). (1) A Judge must conduct an initial review of a petition to modify or set aside a directive within five days after being assigned such petition. (2) If the Judge determines that the provider's claims, defenses, or other legal contentions are not warranted by existing law or by a nonfrivolous argument for extending, modifying, or reversing existing law or for establishing new law, the Judge must promptly deny such petition, affirm the directive, and order the provider to comply with the directive. Upon making such determination or promptly thereafter, the Judge must provide a written statement of reasons. The Clerk must transmit the ruling and statement of reasons to the provider and the government. (b) Plenary Review Pursuant to 50 U.S.C. § l88la(b)(4)(E). (l) If the Judge determines that the petition requires plenary review, the Court must promptly notify the parties. The Judge must provide a written statement of reasons for the determination. (2) The Judge must affirm, modify, or set aside the directive that is the subject of the petition within the time permitted under 50 U.S.C. §§ 1881a(h)(4)(E) and 1881 a(j)(2). (3) The Judge may hold a hearing or conduct proceedings solely on the papers filed by the provider and the government. (c) Burden. Pursuant to 50 U.S.C. § 1881a(h)(4)(C), a Judge may grant the petition only if the Judge finds that the challenged directive does not meet the requirements of 50 U.S.C. § 1881a or is otherwise unlawful. (d) Continued Effect. Pursuant to 50 U.S.C. § 1881a(h)(4)(F), any directive not explicitly modified or set aside by the Judge remains in full effect. Rule 29. Review of Petition to Compel Compliance Pursuant to 50 U.S.C. § 1881a(b)(5)(C). (a) The Judge reviewing the government's petition to compel compliance with a directive must, within the time permitted under 50 U.S.C. §§ 1881a(h)(5)(C) and 1881aG)(2), issue an order requiring the provider to comply with the directive or any part of it, as issued or as modified, if the Judge fmds that the directive meets the requirements of 50 U.S.C. § 1881 a and is otherwise lawful. (b) The Judge must provide a written statement of reasons for the determination. The Clerk must transmit the ruling and statement of reasons to the provider and the government. Rule 30. In Camera Review. Pursuant to 50 U.S.C. § 1803(e)(2), the Court must review a petition under 50 U.S.C. § 1881a(h) and conduct related proceedings in camera. Rule 31. Appeal. Pursuant to 50 U.S.C. § 1881a(h)(6) and subject to Rules 54 through 59 of these Rules, the government or the provider may petition the Foreign Intelligence Surveillance Court of Review ("Court of Review") to review the Judge's ruling. -9- Title VII. Supplemental Procedures for Proceedings Under 50 U.S.C. § 186l(f) Rule 32. &ope. Together with the generally-applicable provisions of these Rules regarding filing, service, and other matters, these supplemental procedures apply in proceedings under 50 u.s.c. § 1861(f). Rule 33. Petition Challenging Production or Nondisclosure Order. (a) Who May File. The recipient of a production order or nondisclosure order under 50 U.S.C. § 1861 ("petitioner") may file a petition challenging the order pursuant to 50 U.S.C. § 1861(f). A petition may be filed by the petitioner's counsel. (b) Time to File Petition. (1) Challenging a Production Order. The petitioner must file a petition challenging a production order within 20 days after the order has been served. (2) Challenging a Nondisclosure Order. A petitioner may not file a petition challenging a nondisclosure order issued under 50 U.S.C. § 186l(d) earlier than one year after the order was entered. (3) Subsequent Petition Challenging a Nondisclosure Order. If a Judge denies a petition to modify or set aside a nondisclosure order, the petitioner may not file a subsequent petition challenging the same nondisclosure order earlier than one year after the date of the denial. Rule 34. Contents of Petition. A petition must: (a) state clearly the relief being sought; (b) state concisely the factual and legal grounds for modifying or setting aside the challenged order; (c) include a copy of the challenged order and state the date on which it was served on the petitioner; and (d) state whether a hearing is requested. Rule 35. Length of Petition. Unless the Court directs otherwise, a petition may not exceed 20 pages in length, including any attachments (other than a copy of the challenged order). Rule 36. Request to Stay Production. (a) Petition Does Not Automatically Effect a Stay. A petition does not automatically stay the underlying order. A production order will be stayed only if the petitioner requests a stay and the Judge grants such relief. (b) Stay May Be Requested Prior to Filing of a Petition. A petitioner may request the Court to stay the production order before filing a petition challenging the order. Rule 37. Notification of Presiding Judge. Upon receipt, the Clerk must notify the Presiding Judge that a petition challenging a production or nondisclosure order has been filed. If the Presiding Judge is not reasonably available when the Clerk receives the petition, the Clerk must -10- t I notify each of the local Judges, in order of seniority on the Court, and, if necessary, each of the other Judges, in order of seniority on the Court, until a Judge who is reasonably available has received notification. The reasonably available Judge who receives notification will be the acting Presiding Judge ("Presiding Judge") for the case. Rule 38. Assignment. (a) Presiding Judge. Immediately after receiving notification from the Clerk that a petition has been filed, the Presiding Judge must assign the matter to a Judge in the petition pool established by 50 U.S.C. § 1803(e)(l). The Clerk must record the date and time of the assignment. (b) Transmitting Petition. The Clerk must transmit the petition to the assigned Judge as soon as possible but no later than 24 hours after being notified of the assignment by the Presiding Judge. Rule 39. Initial Review. (a) When. The Judge must review the petition within 72 hours after being assigned the petition. (b) Frivolous Petition. If the Judge determines that the petition is frivolous, the Judge must: (1) immediately deny the petition and affirm the challenged order; (2) promptly provide a written statement of the reasons for the denial; and (3) provide a written ruling, together with the statement of reasons, to the Clerk, who must transmit the ruling and statement of reasons to the petitioner and the government. (c) Non-Frivolous Petition. (1) Scheduling. If the Judge determines that the petition is not frivolous, the Judge must promptly issue an order that sets a schedule for its consideration. The Clerk must transmit the order to the petitioner and the government. (2) Manner of Proceeding. The judge may hold a hearing or conduct the proceedings solely on the papers filed by the petitioner and the government. Rule 40. Response to Petition; Other Papers. (a) Government's Response. Unless the Judge orders otherwise, the government must file a response within 20 days after the issuance of the initial scheduling order pursuant to Rule 39(c). The response must not exceed 20 pages in length, including any attachments (other than a copy of the challenged order). (b) Other Papers. No supplements, replies, or sur-replies may be filed without leave of the Court. Rule 41. Rulings on Non-frivolous Petitions. (a) Written Statement of Reasons. Ifthe Judge determines that the petition is not frivolous, the Judge must promptly provide a written statement of the reasons for modifying, setting aside, or affirming the production or nondisclosure order. -11- I ~ • I (b) Affirming the Order. If the Judge does not modify or set aside the production or nondisclosure order, the Judge must affirm it and order the recipient promptly to comply with it. (c) Transmitting the Judge's Ruling. The Clerk must transmit the Judge's ruling and written statement of reasons to the petitioner and the government. Rule 42. Failure to Comply. If a recipient fails to comply with an order affirmed under 50 U.S.C. § 1861(f), the government may file a motion seeking immediate enforcement ofthe affirmed order. The Court may consider the government's motion without receiving additional submissions or convening further proceedings on the matter. Rule 43. In Camera Review. Pursuant to 50 U.S.C. § 1803(e)(2), the Court must review a petition under 50 U .S.C. § 1861 (f) and conduct related proceedings in camera. Rule 44. Appeal. Pursuant to 50 U.S.C. § 1861(f)(3) and subject to Rules 54 through 59 of these Rules, the government or the petitioner may petition the Court of Review to review the Judge's ruling. Title VIII. En Bane Proceedings Rule 45. Standard for Hearing or Rehearing En Bane. Pursuant to 50 U.S.C. § 1803(a)(2)(A), the Court may order a hearing or rehearing en bane only if it is necessary to secure or maintain uniformity of the Court's decisions, or the proceeding involves a question of exceptional importance. Rule 46. Initial Hearing En Bane on Request of a Party. The government in any proceeding, orapartyinaproceedingunder50U.S.C. § 1861(f)or50U.S.C. § 1881a(h)(4)-(5),mayrequest that the matter be entertained from the outset by the full Court. However, initial hearings en bane are extraordinary and will be ordered only when a majority of the Judges determines that a matter is of such immediate and extraordinary importance that initial consideration by the en bane Court is necessary, and en bane review is feasible in light of applicable time constraints on Court action. Rule 47. Rehearing En Bane on Petition by a Party. (a) Timing of Petition and Response. A party may file a petition for rehearing en bane permitted under 50 U.S.C. § 1803(a)(2) no later than 30 days after the challenged order or decision is entered. In an adversarial proceeding in which a petition for rehearing en bane is permitted under§ 1803(a)(2), a party must file a response to the petition within 14 days after filing and service of the petition. (b) Length of Petition and Response. Unless the Court directs otherwise, a petition for rehearing en bane and a response to a petition for rehearing en bane each must not exceed 15 pages, including any attachments (other than the challenged order or decision). -12l t i l l Rule 48. Circulation of En Bane Petitions and Responses. The Clerk must, after consulting with the Presiding Judge and in a manner consistent with applicable security requirements, promptly provide a copy of any timely-filed en bane petition permitted under 50 U.S.C. § 1803{a)(2), and any timely-filed response thereto, to each Judge. Rule 49. Court-Initiated En Bane Proceedings. A Judge to whom a matter has been presented may request that all Judges be polled with respect to whether the matter should be considered or reconsidered en bane. On a Judge's request, the Clerk must, after consulting with the Presiding Judge and in a manner consistent with applicable security requirements, promptly provide notice of the request, along with a copy of pertinent materials, to every Judge. Rule 50. Polling. (a) Deadline for Vote. The Presiding Judge must set a deadline for the Judges to submit their vote to the Clerk on whether to grant a hearing or rehearing en bane. The deadline must be communicated to all Judges at the time the petition or polling request is circulated. (b) Vote on Stay. In the case of rehearing en bane, the Presiding Judge may request that all Judges also vote on whether and to what extent the challenged order or ruling should be stayed or remain in effect if rehearing en bane is granted, pending a decision by the en bane Court on the merits. Rule 51. Stay Pending En Bane Review. (a) Stay or Modifying Order. In accordance with 50 U.S.C. §§ 1803(a)(2){B) and 1803{f), the Court en bane may enter a stay or modifying order while en bane proceedings are pending. (b) Statement of Position Regarding Continued Eft'ect of Challenged Order. A petition for rehearing en bane and any response to the petition each must include a statement of the party's position as to whether and to what extent the challenged order should remain in effect if rehearing en bane is granted, pending a decision by the en bane Court on the merits. Rule 51. Supplemental Briefing. Upon ordering hearing or rehearing en bane, the Court may require the submission of supplemental briefs. Rule 53. Order Granting or Denying En Bane Review. (a) Entry of Order. If a majority of the Judges votes within the time allotted for polling that a matter be considered en bane, the Presiding Judge must direct the Clerk to enter an order granting en bane review. If a majority of the Judges does not vote to grant hearing or rehearing en bane within the time allotted for polling, the Presiding Judge must direct the Clerk to enter an order denying en bane review. (b) Other Issues. The Presiding Judge may set the time of an en bane hearing and the time and scope of any supplemental hearing in the order granting en bane review. The -13- order may also address whether and to what extent the challenged order or ruling will be stayed or remain in effect pending a decision by the en bane Court on the merits. Title IX. Appeals Rule 54. How Taken. An appeal to the Court of Review, as pennitted by law, may be taken by filing a petition for review with the Clerk. Rule 55. When Taken. (a) Generally. Except as the Act provides otherwise, a party must file a petition for review no later than 30 days after entry of the decision or order as to which review is sought. (b) Effect of En Bane Proceedings. Following the timely submission of a petition for rehearing en bane pennitted under 50 U.S.C. § 1803(a)(2) or the grant of rehearing en bane on the Court's own initiative, the time otherwise allowed for taking an appeal runs from the date on which such petition is denied or dismissed or, if en bane review is granted, from the date of the decision of the en bane Court on the merits. Rule 56. Stay Pending Appeal. In accordance with 50 U.S.C. § 1803(f), the Court may enter a stay of an order or an order modifying an order while an appeal is pending. Rule 57. Motion to Transmit the Record. Together with the petition for review, the party filing the appeal must also file a motion to transmit the record to the Court of Review. Rule 58. Transmitting the Record. The Clerk must arrange to transmit the record under seal to the Court of Review as expeditiously as possible, no later than 30 days after an appeal has been filed. The Clerk must include a copy of the Court's statement of reasons for the decision or order appealed from as part of the record on appeal. Rule 59. Oral Notification to the Court of Review. The Clerk must orally notify the Presiding Judge of the Court of Review promptly upon the filing of a petition for review. Title X. Administrative Provisions Rule 60. Duties of the Clerk. (a) General Duties. The Clerk supports the work of the Court consistent with the directives of the Presiding Judge. The Presiding Judge may authorize the Clerk to delegate duties to staff in the Clerk's office or other designated individuals. (b) Maintenance of Court Records. The Clerk: (1) maintains the Court's docket and records- including records and recordings of proceedings before the Court - and the seal of the Court; -14f f I ., (2) accepts papers for filing; (3) keeps all records, pleadings, and files in a secure location, making those materials available only to persons authorized to have access to them; and (4) performs any other duties, consistent with the usual powers of a Clerk of Court, as the Presiding Judge may authorize. Rule 61. Offiee Hours. Although the Court is always open, the regular business hours of the Clerk's Office are 9:00a.m. to 5:00p.m. daily except Saturdays, Sundays, and legal holidays. Except when the government submits an application following an emergency authorization, or when the Court otherwise directs, any filing outside these hours will be recorded as received at the start of the next business day. Rule 62. Release of Court Records. (a) Publication of Opinions. The Judge who authored an order, opinion, or other decision may sua sponte or on motion by a party request that it be published. Upon such request, the Presiding Judge, after consulting with other Judges of the Court, may direct that an order, opinion or other decision be published. Before publication, the Court may, as appropriate, direct the Executive Branch to review the order, opinion, or other decision and redact it as necessary to ensure that properly classified information is appropriately protected pursuant to Executive Order 13526 (or its successor). (b) Other Records. Except when an order, opinion, or other decision is published or provided to a party upon issuance, the Clerk may not release it, or other related record, without a Court order. Such records must be released in conformance with the security measures referenced in Rule 3. (e) Provision of Court Records to Congress. (1) By the Government. The government may provide copies of Court orders, opinions, decisions, or other Court records, to Congress, pursuant to 50 U.S.C. §§ 187l(a)(5), l871(c), or 188U{b)(l)(D), or any other statutory requirement, without prior motion to and order by the Court. The government, however, must contemporaneously notify the Court in writing whenever it provides copies of Court records to Congress and must include in the notice a list of the documents provided. (2) By the Court. The Presiding Judge may provide copies of Court orders, opinions, decisions, or other Court records to Congress. Such disclosures must be made in conformance with the security measures referenced in Rule 3. Rule 63. Practice Before Court. An attorney may appear on a matter with the permission of the Judge before whom the matter is pending. An attorney who appears before the Court must be a licensed attorney and a member, in good standing, of the bar of a United States district or circuit court, except that an attorney who is employed by and represents the United States or any of its agencies in a matter before the Court may appear before the Court regardless of federal bar membership. All attorneys appearing before the Court must have the appropriate security clearance. Exhibit 19 Exhibit 20 Exhibit 21 TOP SECRET//COMINT//NOFORN UNITED STATES GOVERNMENT Memorandum OC-034-12 DATE: 3 May 2012 REPLY TO ATTN OF: SID Oversight & Compliance SUBJECT: (U//FOUO) NSAW SID Intelligence Oversight (IO) Quarterly Report – First Quarter Calendar Year 2012 (1 January – 31 March 2012) – EXECUTIVE SUMMARY TO: SIGINT Director I. (U) Overview (U//FOUO) The attached NSAW SID Intelligence Oversight (IO) Quarterly Report for the First Quarter Calendar Year 2012 (1 January – 31 March 2012) identifies NSAW SID compliance with E.O. 12333, DoD Regulation 5240.1-R, NSA/CSS Policy 1-23, USSID SP0018, and all related policies and regulations. (U//FOUO) Detailed incident narratives are provided in the attached annexes. The number of incidents in each category and a reference to the annex related to each incident category are contained in the body of the report. (U//FOUO) As part of SID Oversight and Compliance’s (SV) charge to provide comprehensive trends and analysis information as it pertains to incidents of non-compliance, this Executive Summary provides analysis and evaluation of incidents reported throughout the current quarter to better address the “whys” and “hows” behind NSAW SID’s compliance posture. (U//FOUO) Section II, Metrics, has been broken down into several sub-sections: metrics and analysis of NSAW SID-reported incidents by authority, type, root cause, and organization. Also included is an assessment of how incidents were discovered (i.e., methods of discovery) for SID-reported incidents (see Figure 7). (U//FOUO) Significant Incidents of Non-compliance and Report Content follow in Sections III and IV, respectively. (S//REL) Overall, the number of incidents reported during 1QCY12 increased by 11% as compared to the number of incidents reported during 4QCY11. This included a rise in the number of E.O. 12333 incidents, as well as for incidents across all FISA authorities. The majority of incidents in all authorities were database query incidents due to human error. Of note, S2 continued to be the NSAW SID organization with the largest number of reported incidents (89%), although S2 experienced an overall decrease in reported incidents. SV noted an overall improvement in timeliness regarding 1QCY12 IO Quarterly Report submissions from the SID elements. Page 1 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN II. (U) Metrics a. (U//FOUO) NSAW SID-reported Incidents by Authority (TS//SI//REL TO USA, FVEY) Figures 1a-b compares all categories of NSAW SID-reported incidents (collection, dissemination, unauthorized access, and retention) by Authority for 2QCY11 – 1QCY12. From 4QCY11 to 1QCY12, there was an overall increase in incidents of 11%. There was also an increase of 11% for both E.O. 12333 and FISA incidents. The increase in incidents reported for 1QCY12 was due to an increase in the number of reported Global System for Mobile Communications (GSM) roamer 1 incidents, which may be attributed to an increase in Chinese travel to visit friends and family for the Chinese Lunar New Year holiday. (U//FOUO) Figure 1a: Table of the Number of NSAW SID-reported Incidents by Authority (U//FOUO) E.O. 12333 FISA TOTAL 2QCY11 396 150 546 3QCY11 390 198 588 4QCY11 601 176 777 1QCY12 670 195 865 (U//FOUO) (U//FOUO) Figure 1b: Line Graph of the Number of NSAW SID-reported Incidents by Authority U//FOUO 800 Number of Incidents 700 600 500 400 E.O. 12333 300 FISA 200 100 0 2QCY11 3QCY11 4QCY11 1QCY12 Quarter U//FOUO (TS//SI//NF) FISA Incidents: As reflected in Figures 1a-b, during 1QCY12, NSAW SID reported a total of 195 FISA incidents, 185 of which were associated with unintentional collection. NSAW SID also reported 6 incidents of unintentional dissemination under FISA authority and 4 incidents of unauthorized access to Raw                                                              1  (U//FOUO) Roaming incidents occur when a selector associated with a valid foreign target becomes active in the U.S.   Page 2 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN SIGINT FISA data. Figure 2 illustrates the most common root causes for incidents involving FISA authorities as determined by SV. • 63% (123) of 1QCY12 FISA incidents can be attributed to Operator Error as the root cause, and involved: o Resources ( i.e., inaccurate or insufficient research information and/or workload issues (60); o Lack of due diligence (i.e., failure to follow standard operating procedures) (39); o Human error (21) which encompassed: Broad syntax (i.e., no or insufficient limiters / defeats / parameters) (12); Typographical error (6); Query technique understood but not applied (2); and Incorrect option selected in tool (1); and o Training and guidance (i.e., training issues) (3). (U//FOUO) The Resources root cause category accounted for the largest percentage of Operator Error incidents under FISA authorities for 1QCY12. Analysis identified that these incidents could be reduced if analysts had more complete and consistent information available about selectors and/or targets at the time of tasking and if analysts consistently applied rules for conducting queries. • 37% (72) of 1QCY12 FISA incidents can be attributed to System Error as the root cause, and involved: o System limitations (i.e., system lacks the capability to ‘push’ real-time travel data out to analysts, system/device unable to detect changes in user) (67); o System engineering (i.e., system/database developed without the appropriate oversight measures, data flow issues, etc.) (4); and, o System disruptions (i.e., glitches, bugs, etc.) (1). (U//FOUO) The System Limitations root cause category accounted for the largest percentage of System Error incidents under FISA authorities for 1QCY12. The largest number of incidents in the System Limitations category account for roamers where there was no previous indications of the planned travel. These incidents are largely unpreventable. Consistent discovery through the Visitor Location Register (VLR) occurs every quarter and provides analysts with timely information to place selectors into candidate status or detask. Analysis identified that these incidents could be reduced if analysts removed/detasked selectors more quickly upon learning that the status of the selector had changed and more regularly monitored target activity. This analysis indicates that continued research on ways to exploit new technologies and researching the various aspects of personal communications systems to include GSM, are an important step for NSA analysts to track the travel of valid foreign targets. Page 3 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN (U//FOUO) Figure 2: 1QCY12 FISA Incidents – Root Causes U//FOUO 11% Operator | Human Error (21) 20% Operator | Due Diligence (39) Operator | Resources (60) Operator | Training (3) 34% 31% System | Disruptions (1) System | Engineering (4) 2% System | Limitations (67) 2% U//FOUO Total: 195 (TS//SI//REL TO USA, FVEY) Delayed Detasking FISA Incidents: As reflected in Figures 1a-b, during 1QCY12, NSAW SID reported a total of 195 FISA incidents. 19 (10%) of the total FISA incidents were associated with detasking delays. Of the 19 delayed detasking incidents, 12 (63%) of these incidents occurred under NSA FISA Authority, 5 (27%) occurred under FAA 702 Authority, 1(5%) occurred under FAA 704 Authority, and 1 (5%) occurred under FAA 705(b) Authority. Figure 3a illustrates the detasking delay incidents versus all other FISA incidents reported during 1QCY12. Figure 3b illustrates the detasking delay incidents by FISA Authority reported during 1QCY12. (U//FOUO) Figure 3a: 1QCY12 Detasking FISA Incidents vs. All other FISA incidents (U//FOUO) Figure 3b: 1QCY12 FISA Incidents by Authority – Delayed Detaskings U//FOUO  U//FOUO 5% 5% 10% NSA Establishment FISA (12) FAA 702 (5) Delayed Detasking (19) 27% 90% Other Incidents (176) 63% FAA 704 (1) FAA 705(b) (1) Total: 19 Total: 195 U//FOUO U//FOUO Page 4 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN (TS//SI//REL TO USA, FVEY) As depicted in Figures 3a and 3b, of the 19 delayed detasking FISA incidents, 15 (79%) resulted from a failure to detask all selectors, 2 (11%) resulted from analyst not detasking when required, 1 (5%) resulted from partner agency error, and 1 (5%) resulted from all tasking not terminated (e.g., dual route). b. NSAW SID-reported Collection Incidents by Sub-Type and Authority (U//FOUO) Figures 4a-b depicts NSAW SID-reported collection incidents by Authority (E.O. 12333 and all FISA Authorities), and identifies the primary sub-types for those incidents. An explanation of the more prominent collection incident sub-types follows the graphs. (U//FOUO) Figure 4a: NSAW SID-reported Collection Incidents Under E.O. 12333 Authority U//FOUO 582 600 491 500 2QCY11 3QCY11 4QCY11 1QCY12 400 300 251 262 200 100 4 1 5 1 2 1 3 0 No FISC/AG Auth Computer Network Exploitation (CNE) 74 53 70 97 9 6 2 2 18 26 23 22 14 16 7 27 2 4 0 5 0 Roamers Database Queries Task/Detask Delays/Errors USP Transit Program* Other Inadvertent U//FOUO (U//FOUO) Figure 4a: During 1QCY12, NSAW SID reported a 39% increase of database query incidents under E.O. 12333 Authority. Human Error accounted for 74% of E.O.12333 database query incidents. (TS//SI//REL TO USA, FVEY) International Transit Switch Collection*: International Transit switches, FAIRVIEW (US-990), STORMBREW (US-983), ORANGEBLOSSOM (US-3251), and SILVERZEPHYR (US-3273), are Special Source Operations (SSO) programs authorized to collect cable transit traffic passing through U.S. gateways with both ends of the communication being foreign. When collection occurs with one or both communicants inside the U.S., this constitutes inadvertent collection. From 4QCY11 to 1QCY12, there was an increase of transit program incidents submitted from 7 to 27, due to the change in our methodology for reporting and counting of these types of incidents. (*See Annex G in SID’s 1QCY12 IO Quarterly Report for additional details regarding these incidents.) Page 5 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN (U//FOUO) Figure 4b: NSAW SID-reported Collection Incidents Under All FISA Authorities U//FOUO 100 90 80 70 60 50 40 30 20 10 0 2QCY11 81 87 3QCY11 4QCY11 1QCY12 95 69 55 49 54 36 18 1 Roamers 0 0 0 No FISC/AG Auth 2 0 0 0 Computer Network Exploitation (CNE) 7 7 5 Database Queries 5 12 18 Task/Detask Delays/Errors 19 17 0 2 1 USP Other Inadvertent U//FOUO (U//FOUO) Figure 4b: During 1QCY12, NSAW SID reported an increase of 9% of roamer incidents under all FISA Authorities. There was also a 260% increase in database query FISA Authority incidents during 1QCY12. Human Error accounted for the majority of all FISA Authorities database query incidents (74%). (U//FOUO) Roamers: Roaming incidents occur when valid foreign target selector(s) are active in the U.S. Roamer incidents continue to constitute the largest category of collection incidents across E.O. 12333 and FAA authorities. Roamer incidents are largely unpreventable, even with good target awareness and traffic review, since target travel activities are often unannounced and not easily predicted. (S//SI//NF) Other Inadvertent Collection: Other inadvertent collection incidents account for situations where targets were believed to be foreign but who later turn out to be U.S. persons and other incidents that do not fit into the previously identified categories. (TS//SI//REL TO USA, FVEY) Database Queries: During 1QCY12, NSAW SID reported a total of 115 database query incidents across all Authorities, representing a 53% increase from 4QCY11. E.O. 12333 Authority database query incidents accounted for 84% (97) of the total, and all FISA Authorities database query incidents accounted for 16% (18). (U//FOUO) Figure 5 illustrates the most common root causes for incidents involving database queries as determined by SV. • 99% (114) of the 1QCY12 database query incidents are attributed to Operator Error as the root cause, and involved: o Human error (85) which encompassed: Broad syntax (i.e., no or insufficient limiters / defeats / parameters) (55); Typographical error (17); Boolean operator error (6); Query technique understood but not applied (4); Not familiar enough with the tool used for query (2); and Page 6 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN Incorrect option selected in tool (1) o Lack of due diligence (i.e., failure to follow standard operating procedure) (13) o Training and guidance (i.e., training issues) (9); and o Resources (i.e., inaccurate or insufficient research information and/or workload issues) (7). (U//FOUO) The remaining 1 database query incident can be attributed to System Error as the root cause and occurred due to a mechanical error with the tool. (U//FOUO) Analysis identified that the number of database query incidents could be reduced if analysts more consistently applied rules/standard operating procedures (SOPs) for conducting queries. (S//SI//NF) Auditors continue to play an important role in the discovery of database query incidents, identifying 70 (61%) of the 115 reported database query incidents. (U//FOUO) Figure 5: 1QCY12 Database Query Incidents – Root Causes 1% 8% 6% Operator | Human Error (85) Operator | Due Diligence (13) 11% Operator | Resources Operator | Training 74% (7) (9) System | Disruptions (1) Total: 115 (TS//SI//REL TO USA, FVEY) Of the 115 database query incidents reported for 1QCY12, Figure 6 identifies the database involved and the associated percentage of the total. Databases considered to be Source Systems of Record (SSR) have been labeled as such. (TS//SI//REL TO USA, FVEY) Note that the total number of databases involved in the database query incidents in Figure 6 does not equal the number of database query incidents reflected in Figure 5 or in the 1QCY12 SID IO Quarterly Report because a database query incident may occur in more than one database. Page 7 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN (U//FOUO) Figure 6: 1QCY11 Database Query Incidents – Database(s) Involved U//FOUO CLOUD/ABR DISHFIRE FASTSCOPE MARINA (SSR) OCTAVE PINWALE (SSR) SIGINT NAVIGATOR TRACFIN TRANSX TUNINGFORK UTT XKEYSCORE Unknown 1% 7% 20% 1% 13% 1% 3% 2% 2% 1% 20% 28% 1% Total: 119 (8) (16) (1) (24) (1) (34) (1) (2) (2) (4) (1) (24) (1) U//FOUO (U//FOUO) NSAW SID-reported Incidents – Method of Discovery (U//FOUO) Figure 7 depicts the most prominent method(s) of discovery for incidents reported by NSAW SID elements for 1QCY12. As SV’s assessment of root causes matures, and as corrective measures are implemented, identification of how incidents are discovered will provide additional insight into the effectiveness of those methods. (U//FOUO) Figure 7: 1QCY12 Incidents – How Discovered U//FOUO 553 600 500 400 300 200 100 83 0 36 77 7 1 6 12 10 67 5 3 2 3 0 Total: 865 U//FOUO   Page 8 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN     (U//FOUO) For 1QCY12, of the 865 reported incidents, 553 (64%) were discovered by automated alert. 444, (80%) of the 553 incidents that were discovered by automated alert occurred via the VLR and other analytic tools, such as SPYDER, CHALKFUN, and TransX. c. (U//FOUO) NSAW SID-reported Incidents by Organization (U//FOUO) Figure 8 illustrates the total 1QCY12 NSAW SID-reported incidents by primary SID Deputy Directorate (DD) level organization. S2, having the largest NSAW SID contingent of reported incidents, accounted for 89% of the total incidents for the quarter, a proportion consistent with the overall size of the S2 organization. As compared to 4QCY11, S2 experienced an overall 8% reduction in incidents occurrences. (U//FOUO) Figure 8: 1QCY12 Incidents by NSAW SID Organization U//FOUO 2% 2% 7% S1 1 S2 772 S3 56 F74 MOC 4 SSG 14 ST 89% 1 2nd Party /Various 17 Total: 865 U//FOUO (U//FOUO) Figure 9 provides a look into S2 (by Product Line) as the NSAW SID organization with the largest number of reported incidents. For 1QCY12, three Product Lines accounted for 72% of S2’s reported incidents. These Product Lines were: the and Korea Division (S2B) with 28% of the reported incidents, the International Security Issues Division (S2C) with 23% of the reported incidents, and the China, and the Office of Middle East & Africa (S2E) with 21% of the incidents. As compared to 4QCY11, this resulted in an increase of 16% for S2B, a reduction of 35% for S2C, and an increase of 9% for S2E. The number of incidents reported by the remaining seven Product Lines held relatively steady from 4QCY11 to 1QCY12. Page 9 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN (U//FOUO) Figure 9: 1QCY12 S2 Incidents by Product Line (U//FOUO) 4% S2A S2G 29 60 S2J Total: 772 25 S2H 23% 17 S2I 8% 159 S2F 21% 61 S2E 28% 174 S2D 8% 2% 213 S2C 3% 32 S2B 4% 2 (U//FOUO)   (U//FOUO) Figures 10a-b illustrates the operator related (Figure 10a) and system related (Figure 10b) root causes associated with the 772 incidents reported by S2. 30% of the incidents were due to operator related errors that resulted in an incident. 70% of the incidents were due to system related issues that resulted in an incident. (U//FOUO) Figure 10a: 1QCY12 S2 Incidents – Operator Related Root Causes (U//FOUO) 4% 1% Human Error 71 Information Resources 80 31% 30% 29% Lack of Due Diligence 68 70% 35% Personnel Resources 2 Training&Guidance 9 Total: 230 (U//FOUO) (U//FOUO) 30% of the S2-reported incidents during 1QCY12 are attributed to Operator Error as the root cause, and involved: • Resources (i.e., inaccurate or insufficient research information and/or workload issues, and personnel resource issues) (82); Page 10 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN • • • Human error (i.e., selector mistypes, incorrect realm, or improper query) (71); Lack of due diligence (i.e., failure to follow standard operating procedures) (68); and Training and guidance (i.e., training issues) (9). (U//FOUO) Analysis found that analysts could reduce the number of incidents if there was more comprehensive research information available at the time of tasking as well as through better use of defeats, more careful review of data entry to avoid typographical errors and omissions, and by following SOPs more consistently. (U//FOUO) Figure 10b: 1QCY12 S2 Incidents – System Related Root Causes (U//FOUO) < 1% System Engineering 1 System Limitations 541 30% 70% 99% Total: 542 (U//FOUO)   (U//FOUO) 70% of the S2-reported incidents during 1QCY12 are attributed to system issues as the root cause, and involved: • System limitations (i.e., system lacks the capability to ‘push’ real-time travel data out to analysts, system/device unable to detect changes in user) (541); and • System engineering (i.e., data tagging, configuration, design flaws, etc.) (1). (TS//SI//REL TO USA, FVEY) System Limitations, the largest percentage of System Error root cause, can be attributed to situations where a valid foreign target is found roaming in the United States without indication in raw traffic. III. (U) Significant Incidents of Non-compliance (TS//SI//NF) Business Record (BR) FISA.  As of 16 February 2012, NSA determined that approximately 3,032 files containing call detail records potentially collected pursuant to prior BR Orders were retained on a server and been collected more than five years ago in violation of the 5-year retention period established for BR collection. Specifically, these files were retained on a server used by technical personnel working with the Business Records metadata to maintain documentation of provider feed data formats and performed background analysis to document why certain contain chaining rules were created. In addition to the BR Page 11 of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN work, this server also contains information related to the STELLAR WIND program and files which do not appear to be related to e ither of these programs. NSA bases its determination that these files may be in violation of docket number BR 11-191 because of the type of information contained in the files (i.e., call detail records), the access to the server by technical personnel who worked with the BR metadata, and the listed "creation date" for the files. It is possible that these fi les contain STELLARWIND data, despite the creation date. T he STELL ARWIND data could have been copied to this server, and that process could have changed the creation date to a timeframe that appears to indicate that they may contain BR metadata. Additional details regarding this incident can be found in the "Bulk Metadata FISA" Annex, ANNEX R (Item Rl ) in SID's 1QCY12 10 Qua1terly Report. (S//SI//REL TO USA, FVEY) Detasking De lay. Four sel ned active after multiple 2012, a South Asia Language indications were received that the target he ld a U.S. Analysis Branch (S2A51) senior linguist was selectors for OCfAVE migration when it was discovered that the tasking record that there were four selectors that were in active status even though his tasking file indicated he held a U.S. g reen card as of03 October 20 I I. On 09 March 2012, the S2A51 senior linguist de tasked the four selectors, and on 13 March 2012, the S2A51 senior linguist requested the 881 c uts in from those four selectors be purged. On 13 March 2012, a senior Branch (S2A52) researched S2A52's locally held file of that an S2A52 analyst had indications in intercept on 09 September 201 ·ght have a U.S. green card. It was also recorded in the fi S2A52 had s ubmitted a request to the .B., the date of the S2A52 request to DHS was Department of Homeland Security not recorded) and learned from DHS on 28 September 2011 that Qw-eshi had obtained a U.S. green card as ol 10. The · Y and discovered that S2A52 had On 14 March 2012, S2A5 submitted a con1taiJ the name of t1ed Customer Relationships, Information Sharing Services Branch (S12) approved ISS/BDA-068-12 on 16 March 2012. Serialized dissemination of U.S. person information did occur. On 13 March 2012, the S2A51 senior linguist who ad not been detasked reminded the other two me mbers of the found that these num Governmental Unified Targe tin g Tool (UTT) Group for S2A5 to check all S2A5 databases for officials who have U.S. (and Second Pmty person) status before submitting selectors for tasking. Additional details regarding th is incident can be found in the Unintentional Collection under E.O. 12333 Authority Annex, "Collection as a Result of Tasking En-ors or De tasking Delays", ANNEX E (Item El) and in the "Unin tentional Dissemination of U.S. Person Information Collected Under E.O. 12333, FISA, and FAA Authorities", Annex M (Item M15) in SID's 1QCYI 2 1 Quarterly Report. 0 (C// REL TO USA, FVEY) Unaut horized Access. On 29 December 2011, a Cryptanalysis a nd Exploitation (CES)/Office of Target Pursuit (S31174) Branch Chief discovered that CES personnel had likely been inappropriate ly granted access to NSA Establis hment FTSA data. Multiple external factors contributed to this situation. First, in 2002, RAGTIME was changed to encompass both NSA Establishment FISA a nd FBI FTSA, but due to insufficient notice regm·ding this modification, CES continued to apply the earlier rule that RAGTIME applied only to NSA Establishment FISA data. Second, CES relied on the RAGTIME label in CASPORT for granting access to NSA Establishment FISA data but discovered that CASPORT does not accurately retlect NSA Establishment FTSA briefing status. Third, CASPORT often lists NSA-FTSA in the Page 12of 13 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN "Oversight" section even though this has nothing to do with a particular user's access. CES has alerted its workforce to look in the CASPORT "Briefing" section for the NSA Establishment FISA entry and CEScontrolled software is being updated regarding data access control. Additional details regarding this incident can be found in the "Unauthorized Access to Raw SIGINT" Annex, ANNEX P (Item P2) in SID's lQCY 1210 Quarterly Report. (U) Report Content • Upcoming Initiatives (U//FOUO) During CY 12, SV plans to develop 'score cards' to capture and illustrate an organization 's rep01ted quarterly activities. SV plans to use this information during scheduled feedback sessions with SID repo1ting organizations to provide a detailed view into specific areas of high interest or concern arising from analyzing 10 Quarterly Report metrics. • NSAW SID 1QCY12 IOQ Report Challenges: (U//FOUO) SV noted an overall improvement in timeliness regarding l QCY 12 10 Quarterly Repo1t submissions from the STD elements. SV received late submissions from STGDEV Strategy & Governance (SSG) and SID/Deputy Directorate for Data Acquisition (S3), delaying SV's preparation of the NSAW SID TO Quarterly Report. SV will continue to focus on outreach with SSG and S3 in order to ensure more complete and timely report s ubmissions. Page 13 of 13 TOP SECRET//COMINT//NOFORN All redacted information exempt under (b)(1) and (b)(3) except as otherwise noted. TOP SECRET//COMINT//NOFORN ('f'8//Sl/flfP) In response to the Government's compliance notice, on 28 January 2009, the Court directed the Government to file a brief and supporting documentation describing how the compliance and misreporting incidents occurred so the Court can determine what remedial action, if any, is warranted. Since the Court was aware that there are similarities between NSA's processing of telephony metadata and electronic communications metadata under separate orders, the Court also directed the Goven1ment to determine whether NSA bas been processing the electronic communications metadata in accordance with the terms of the Court's orders for this category of material. As part of this review, the Government concluded that NSA was processing the electronjc communications metadata in accordance with the terms of the Court's orders, with one exception. The review identified one particular process that the Government concluded was not in conformity with the Court's order. NSA had employed the process in a small number of cases to approve queries against the electronic communications metadata. Although the Agency had previously reported the process to the Court this process, too, has been discontinued. I -fS7 NSA and DoJ have already identified a number of steps designed to improve the Agency's ability to comply with the relevant orders and implementation of these changes has begun. Also, in addition to notifying the Court, the Government has notified a number of senior Executive Branch officials about these compliance matters. Officials who have received such notification include the President's Intelligence Oversight Board, the Director of National Intelligence, NSA's Inspector General, and the Under Secretary of Defense for Intelligence. My office is also prepared to brief the Committee on these matters at the Committee's convenience. (U) Should you have any questions, lease contact Jonathan E. Miller, Associate Director of Legislative Affairs, at vrl!.;c!~ General Counsel Copy Furnished: Minority Staff Director, House Permanent Select Committee on Intelligence 2 'f'OP SECRE'f'7'/COMUft'/fl~OFOIDq= (fS//SV/NF) FAA Certification Renewals With Caveats 2011-10-12 0850 (fS//Sl//NF) The FISA Comt signed the 20 11 FAA Certifications on 3 Oct 2011 -these are valid until 2 Oct 2012, pennitting SSO FAA-authorized accesses to continue operations. However, in the 80-page opinion, the judge ordered certain "upstream" or "passive" FAA DNI collection to cease after 30 days, unless NSA implements solutions to conect all deficiencies identified in the opinion document. PRISM operations are not affected by these caveats. All PRISM providers, except Yal10o and Google, were successfully transitioned to the new Certifications. We e>..'}Ject Yal10o and Google to complete transitioning by F1iday 6 Oct. Regarding the non-PRISM FAA collection programs, the Comt cited targeting and minimization procedures related to collection of Multiple Conununications Transactions as "deficient on statut01y and constitutional grotmds." SSO, Teclmology Directorate, OGC, and other organizations are coordinating a response, which includes plruming to implement a conse1vative solution in which the higher-risk collection will be sequestered. It is possible that this higher risk collection contains much of the non-duplicative FAA collection resulting in FAA repo1ting from upstream accesses. This solution is designed to comply with the judge's order; however, the judge will have to dete1mine if it does. If the solution is installed, SSO will then work with OPis and OGC to modify the solution over time such that the filte1ing process will be optimized to pennit more valid collection to be processed and f01warded to OPis. Finally, in parallel with these efforts, the OGC is contemplating filing an appeal to the ruling. I'IA I NAL C,~ 1-( ( E NTRA SE '- URIT 'w 25 June 20l3 The Honorable Ron Wyden United States Senate 221 Dirksen Senate Office Building Washington, DC 20510 The Honorable Mark Udall United States Senate 328 Hart Senate Office Building Washington, DC 2051 0 Dear Senators Wyden and Udall: Thank you for your letter dated 24 June 2013. After reviewing your letter, I agree that the fact sheet that the National Security Agency posted on its website on 18 June 2013 could have more precisely described the requirements for collection under Section 702 of the FISA Amendments Act. This statute allows for "the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information." 50 U.S.C. 188 J(a). The statute provides several express limitations, namely that such acquisition: (1) may not intentionally target any person known at the time of acquisition to be located in the United States; (2) may not intentionally target a person reasonably believed to be located outside the United States if the purpose of such acquisition is to target a particular, known person reasonably beHeved to be in the United States; (3) may not intentionally target a United States person reasonably believed to be located outside the United States; (4) may not intentionaiJy acquire any communication as to which the sender and all intended recipients are known at the time of acqu1sition to be located in the United States; and (5) shall be conducted in a manner consistent with the fourth amendment to the Constitution of the United States. 50 U.S.C. 1881(b). With respect to the second point raised in your 24 June 2013 letter, the fact sheet did not imply nor was it intended to imply "that NSA has the ability to determine how many American communications it has collected under section 702, or that the law does not allow the NSA to deliberately search for the records of particular Americans.,. As you correctly state, this point has been addressed publicly. 1 refer you to unclassified correspondence from the Director of National Intelligence dated 26 July 2012 and 24 August 2012. NSA continues to support the effort Jed by the Office of the Director of National Intelligence and the Department of Justice to make publicly available as much information as possible about recently disclosed intelligence programs, consistent with the need to protect national security and sensitive sources and methods. £;t~oe General; U.S. Army Director, N SNChief, CSS Copies Furnished: The Honorable Dianne Feinstein Chairman, Select Committee on Intelligence The Honorable Saxby Chambliss Vice Chairman, Select Committee on IntelJigencc 11/13/13 Grassley Presses for Details about Intentional Abuse of NSA Authorities Article For Immediate Release August 28, 2013 Grassley Presses for Details about Intentional Abuse of NSA Authorities WASHINGTON – Senator Chuck Grassley, Ranking Member of the Senate Judiciary Committee, is asking the Inspector General of the National Security Agency (NSA) to provide additional information about the intentional and willful misuse of surveillance authorities by NSA employees. He’s also asking for the Inspector General to provide as much unclassified information as possible. The Senate Judiciary Committee has oversight jurisdiction over the Foreign Intelligence Surveillance Act (FISA) and the intelligence courts that fall under the act’s authority. “The American people are questioning the NSA and the FISA court system. Accountability for those who intentionally abused surveillance authorities and greater transparency can help rebuild that trust and ensure that both national security and the Constitution are protected,” Grassley said. The text of Grassley’s letter is below. August 27, 2013 Dr. George Ellard, Inspector General National Security Agency Office of the Inspector General 9800 Savage Road, Suite 6247 Fort Meade, MD 20755 Dear Dr. Ellard: I write in response to media reports that your office has documented instances in which NSA personnel intentionally and willfully abused their surveillance authorities. For each of these instances, I request that you provide the following information: (1) The specific details of the conduct committed by the NSA employee; (2) The job title and attendant duties and responsibilities of the NSA employee at the time; (3) How the conduct was discovered by NSA management and/or your office; (4) The law or other legal authority – whether it be a statute, executive order, or regulation – that your office concluded was intentionally and willfully violated; (5) The reasons your office concluded that the conduct was intentional and willful; www.grassley.senate.gov/news/Article.cfm?RenderForPrint=1&customel_dataPageID_1502=46858 1/2 11/13/13 Grassley Presses for Details about Intentional Abuse of NSA Authorities (6) The specifics of any internal administrative or disciplinary action that was taken against the employee, including whether the employee was terminated; and (7) Whether your office referred any of these instances for criminal prosecution, and if not, why not? Thank you for your prompt attention to this important request. I would appreciate a response by September 11, 2013. I also request that you respond in an unclassified manner to the extent possible. Sincerely, Charles E. Grassley Ranking Member cc: Honorable Patrick Leahy, Chairman © 2008, Senator Grassley www.grassley.senate.gov/news/Article.cfm?RenderForPrint=1&customel_dataPageID_1502=46858 2/2 TOP SECRET//Sl!/ORCONtiNOF .. . ~ Hotmall' G~..J il . .'' ' . GoL~gle . "'-7.AHOOJ ~..~ ' (f$//S PRISM Tasking Process VINF) '~"~s ~.-...v Target Analyst inputs selectors into Unified Taraetina Tool IUm Pendln swvelllanc 52 FAA Adjudicators in Each Product line TargeUng RevlewiYaUdatlon scoted Comms Special FISA Oversight and Processing (SV4) Stored comms RMew Noti<S&tiOn survelll&nee _ ,. ~ ~ .; - Pendi ng StOfed Comms Targeting and Mission Management ($343) Final Targeting Review .-nd Relent I Unified Targetin g Tool (UTT) J, J, PRINTAURA; Site Selector Distribution Manager Surveillance _ ,. ~ - Pencttng Scoted Comms FBI Electtonlc communlcaUons survellr anc:e Unit (ECSU) Restareh & V&I«Sate NO USPER$ Providers (Google, Yahoo, etc.) Targeting Sel•e:tors J,.;- StOfed Comms Release FBI Data Intercept Technology Unit (DITU) Collection Collection PINWALE, NUCLEON, etc. ~ TOP SECRET//Sli/ORCON//NOFORN TOP SECRET/tS I//ORCONtfNOI~ G~.. ir liiilil '\1 Hotmall' Coogle """ AHOO, y ~ <TS//SIIfNF> PRISM ,. ,.. • pa talk4'1! Y ouiim t-"""'li :_] --·-· -mail ~ Collection Dataflow ., I I I I I I I IIIII t roce:ssing I I : FAA :r'artitions : TOP SECRET//SJI/ORCON/fNOFORN : -------------------------------------~ TOP SECRET//Slt/ORCON/INOF ~~~ G.~.. . 1( · · ··• (TS//Sl/INF) ~ Hotmail" Google ....YAEOOf • ~ ~ paltalkfll Younll'!' II:W mail /), -·-- -~ t.:' \ , . - AOL PRISM Case Notations P2ESQC120001234 .----T PRISM Provider P1: Microsoft P2:Yahoo P3: Google P4 : Facebook PS: PaiTalk P6:YouTube P7: Skype PS: AOL PA: Apple I 1:~~_) J, L' Fixed trigraph , denotes PRISM source collection c __; ~ Year CASN established for selector ~ I Serial # I Content Type L ) A: Stored Comms (Search) B: IM (chat) . C: RTN-EDC (real-time notification of an e-mail event such as a logon or sent message) O: RTN-IM (real-time notification of a chat login or logout event) E: E-Mail F:VoiP G: Full (WebForum) H: OSN Messaging (photos, wallposts, activity, etc.) 1 OSN Basic Subscriber Info : J: Videos . (dol): Indicates multiple types TOP SECRET//SII/ORCONl : 'OFORJ'-1 TOP SECRETttSVIORCON/INOt~ ~ Hotmall' e M 1 liiliiiil 1 (TS//SV/NF) Ccx'lgle YA.Hoor a • REPRISMFISA TIPS COUNTERTERRORISM REPRISMfiSA ~... \ 1 p~~~ \(k .J.!!.U U! .Oln." W': p) o!t • I wel,)~,.::tj PRISN ENTRIES 'l ~·· ... ~ ~~ter-bdo'w ~ • -(4- • v... , I ""'1t o< • Sfof,.. .... ~, · ~<:;>! t¥'1 e. M4n~f~::o u. .. 1:>~1-'olo ~ c1 . ..._ ., ... '"""'""'"" ' ' ' '"" t ()l.;> l((lo..• "'l · ~ ,.,..vcr. ,,..,.~ ' " ""' '"'' • ,.( PII ...Mtt'.,, '"'''''' "8. " ' " ""• f ·MAO f ll'lot fi( I'W,Mfi:.A f Uf> ("(;.....C.>\1 Prism Cun ent Entries v talk"'~ You lim

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?