KLAYMAN v. OBAMA et al
Filing
44
MEMORANDUM by LARRY E. KLAYMAN, CHARLES STRANGE, MARY ANN STRANGE. (Attachments: # 1 Exhibit 1 -- Binder Part 1, # 2 Exhibit 1 -- Binder Part 2, # 3 Exhibit 2 -- Gov't Opposition in In Re Epic)(Klayman, Larry)
Exhibit 15
Exhibit 16
(fS//SV/NF) FAA Certification Renewals With Caveats
2011-10-12 0850
(fS//Sl//NF) The FISA Comt signed the 20 11 FAA Certifications on 3 Oct 2011 -these
are valid until 2 Oct 2012, pennitting SSO FAA-authorized accesses to continue
operations. However, in the 80-page opinion, the judge ordered certain "upstream" or
"passive" FAA DNI collection to cease after 30 days, unless NSA implements solutions
to conect all deficiencies identified in the opinion document. PRISM operations are not
affected by these caveats. All PRISM providers, except Yal10o and Google, were
successfully transitioned to the new Certifications. We e>..'}Ject Yal10o and Google to
complete transitioning by F1iday 6 Oct. Regarding the non-PRISM FAA collection
programs, the Comt cited targeting and minimization procedures related to collection of
Multiple Conununications Transactions as "deficient on statut01y and constitutional
grotmds." SSO, Teclmology Directorate, OGC, and other organizations are coordinating a
response, which includes plruming to implement a conse1vative solution in which the
higher-risk collection will be sequestered. It is possible that this higher risk collection
contains much of the non-duplicative FAA collection resulting in FAA repo1ting from
upstream accesses. This solution is designed to comply with the judge's order; however,
the judge will have to dete1mine if it does. If the solution is installed, SSO will then work
with OPis and OGC to modify the solution over time such that the filte1ing process will
be optimized to pennit more valid collection to be processed and f01warded to OPis.
Finally, in parallel with these efforts, the OGC is contemplating filing an appeal to the
ruling.
Exhibit 17
Case 1:13-cv-03994-WHP Document 12
Filed 07/03/13 Page 1 of 4
JAM EEL JAFFER
DEPUTY LEGAL DIRECTOR
(1SDCSDN¥
DOCttMINT
ACLU
AMERICAN CIVIL LIBERTIES UNION
ZGI3
MEMO ENDORSED
fJ 5
-?
t....
"~£CTR()NrCALLV FILED
~#:
1...'_1.
.. ,
DATrPlLED: 7 IS/I')
m i i\ i ere 0 ~ltti=~u ;====;;;;;;;~;;;;;;;.1j
S
F/="
July 2,2013
Honorable William H. Pauley III
United States District Court for the
Southern District of New York
500 Pearl Street, Room 2210
New York, NY 10007
AMERICAN CIVIL LIBERTIES
UNION FOUNDATION
NATIONAL O";:IC
Re:
American Civil Liberties Union et at. v, Clapper et al.
Case No. 13-CV-03994 (WHP) OLC)
125 BROAD STREET, 1BT~ "
I>EW YORK, NY 10004 2400
T/212.549.2500
Dear Judge Pauley:
WWWACLJ,ORG
OFFICERS AND DIRECTORS
SUSAN N. HERMAI>
PRESIDENT
AI>THOI>Y D. ROMERO
EXECUTIVE DIRECTOR
On behalf of Plaintiffs, who challenge the lawfulness of the
government's dragnet acquisition of "metadata" relating to every phone call
made or received by residents of the United States, we write to request a pre-_
\ motion conference to discuss a motion for a preliminary injunction. Because
the Court has already scheduled an initial conference iritIiiSiiiiittef for July
17, we respectfully request that the Court also conduct the pre-motion
conference on that date.
By way of background, on June 5, 2013, The Guardian published a
story reporting that the National Security Agency ("NSA") was "collecting the
telephone records of millions of US customers ofVerizon, one of America's
largest telecoms providers." Glenn Greenwald, NSA Collecting Phone
Records ofMillions of Verizon Customers Daily, Guardian, June 5, 2013,
http://gu.comJp/3gc62/tw. The Guardian also published an order of the
Foreign Intelligence Surveillance Court ("FISC") directing Verizon Business
Network Services ("VBNS") to "produce to the [NSA] ... and continue
production on an ongoing daily basis thereafter ... all call detail records or
'telephony metadata' created by Verizon for communications (i) between the
United States and abroad; or (ii) wholly within the United States, including
local telephone calls" over the three-month period ending on July 19, 2013.
The government has since authenticated the VBNS order. James R.
Clapper, DNI Statement on Recent Unauthorized Disclosures of Classified
Information (June 6, 2013), http://1.usa.gov/188X5LW. Senator Diane
F einstein, who chairs the Senate Select Committee on Intelligence, has
disclosed that the VBNS order was part of a broader program that has been in
Case 1:13-cv-03994-WHP Document 12
Filed 07/03/13 Page 2 of 4
place for seven years, and that similar orders have been served on all of the
major telephone companies. Senator Feinstein: NSA Phone Call Data
Collection in Place 'Since 2006,' Guardian, June 6,2013,
http://bitlyIl3rfxdu.
AMERICAN CIVil LIBERTIES
UNION FOUNDATION
As alleged in the Complaint, Plaintiffs are current and former VBNS
subscribers. The VBNS order requires VBNS to turn over to the government,
on an "ongoing daily basis," all metadata associ.ated with Plaintiffs' phone
calls. Under the VBNS order and predecessor orders, the government has
collected detailed information about Plaintiffs' communications and stored
that information in government databases. The government's past and ongoing
collection of this information allows it to learn sensitive and privileged
information about Plaintiffs' work and clients, and it is likely to have a
chilling effect on whistIeblowers and others who might otherwise contact
Plaintiffs for legal assistance.
The government's surveillance of Plaintiffs' communications is not
authorized by Section 215 of the Patriot Act, 18 U.S.C. § 1861, the provision
under which the VBNS order was issued, and it violates the First and Fourth
Amendments. Plaintiffs have filed this suit to obtain a declaration that this
surveillance is unlawful; to enjoin the government from continuing the
surveillance under the VBNS order or any successor thereto; and to require
the government to purge from its databases all of the call records related to
Plaintiffs' communications collected pursuant to the VBNS order or any
predecessor thereto.
Plaintiffs intend to file a motion for a preliminary injunction (i)
directing the government to quarantine all of Plaintiffs' telephony metadata
collected under the VBNS order or any predecessor or successor thereto; and
(ii) barring the government from querying metadata obtained through the
VBNS order using any phone number or other identifier associated with the
Plaintiffs.
Preliminary relief is warranted here. The harm suffered by Plaintiffs is
ongoing and irreparable. Plaintiffs are non-profit organizations engaged in
public education, lobbying, and pro bono litigation concerning civil rights and
civil liberties. The tracking and retention of their telephony metadata with
respect to every call they make or receive is a direct and wide-ranging
invasion of their constitutional right to privacy. This continuing invasion is,
by itself, irreparable injury. See, e.g., Covino v. Patrissi, 967 F.2d 73, 77 (2d
Cir. 1992). Equally irreparable, and equally substantial, is the injury to
Plaintiffs' expressive and associational rights. See Brown v. Socialist Workers
74 Campaign Comm. (Ohio), 459 U.S. 87,96-98 (1982); Elrod v. Burns, 427
U.S. 347, 373 (1976).
2
Case 1:13-cv-03994-WHP Document 12
Filed 07/03/13 Page 3 of 4
Plaintiffs will also show a substantial likelihood of success on the
merits. First, the surveillance under the VBNS order is not authorized by
Section 215. That provision does not authorize the government to collect
everything; it authorizes the collection of records that are "relevant" to
authorized investigations. In addition, Section 215 authorizes the collection of
"tangible things" already in existence; it does not authorize the government to
order recipients to tum over records as they are generated. Indeed, as Plaintiffs
will demonstrate, reading the provision to permit the latter kind of
surveillance makes nonsense of the larger statutory scheme.
AMERICAN CIVIL LIBERTIES
UNION FOUNDATION
The surveillance under the VBNS order is also unconstitutional. The
kind of information being collected by the government is highly sensitive, and
its warrantless and suspicionless collection over long periods constitutes an
unreasonable search under the Fourth Amendment. Cf United States v. Jones,
132 S. Ct. 945 (2012) (holding that tracking of location data for one individual
over twenty-eight days constituted a search under the Fourth Amendment). It
also violates the First Amendment by exposing private association to
government scrutiny and by substantially burdening Plaintiffs' protected
advocacy and expression. See Gibson v. Fla. Legis. Investigation Comm. 372
U.S. 539, 546 (1963); NAACP v. Ala. ex reI. Patterson, 357 U.S. 449, 460-61
(1958); McIntyre v. Ohio Elections Comm'n, 514 U.S. 334, 347 (1995).
Finally, the balance of hardships favors Plaintiffs' request for
preliminary relief. The preliminary injunction sought by Plaintiffs would
substantially mitigate the continuing violation of Plaintiffs' rights. At the
same time, entry of the requested injunction would not prejudice any
legitimate government interest. Should Plaintiffs not ultimately prevail, the
government will be in the same position it would have been in had Plaintiffs'
suit never been brought. Pending final judgment, the government can access
Plaintiffs' telephony metadata, if necessary, under a proper demonstration of
cause under other authorities. See, e.g., 50 U.S.c. § 1842 (authorizing pen
registers in foreign intelligence investigations).
3
Case 1:13-cv-03994-WHP Document 12
Filed 07/03/13 Page 4 of 4
submitted,
Christopher T. Dunn
Arthur N. Eisenberg
New York Civil Liberties Union
Foundation
125 Broad Street, 19th Floor
New York, NY 10004
Phone: (212) 607-3300
Fax: (212) 607-3318
aeisenberg@nyclu.org
Brett Max Kaufman
Patrick Toomey
Catherine Crump
American Civil Liberties Union
Foundation
125 Broad Street, 18th Floor
New York, NY 10004
Phone: (212) 549-2500
Fax: (212) 549-2654
jjaffer@aclu.org
AMERICAN CIVIL LIBERTIES
UNION FOUNDATION
Counsel for Plaintiffs
Cc:
Tara Marie La Morte
(tara.lamorte2@usdoj.gov)
4
Exhibit 18
UNITED STATES FOREIGN
INTELLIGENCE SURVEILLANCE COURT
Washington, D.C.
Honorable Reggie B. Walton
Presiding Judge
July 29, 2013
Honorable Patrick J. Leahy
Chairman
Committee on the Judiciary
United States Senate
Washington, DC 20510
Dear Mr. Chairman:
I am writing in response to your letter of July 18, 2013, in which you posed several
questions about the operations of the Foreign Intelligence Surveillance Court (the Court). As you
requested, we are providing unclassified responses. We would note that, as a general matter, the
Court's practices have evolved over time. Various developments in the last several years
including statutory changes, changes in the size of the Court and its staff, the adoption of new
Rules of Procedure in 2010, and the relocation ofthe Court's facilities from the Department of
Justice headquarters to a secure space in the federal courthouse in 2009- have affected some of
these practices. The responses below reflect the current practices of the Court.
I.
Describe the typical process that the Court follows when it considers the following: (I)
an application/or an order for electronic surveillance under Title I of FISA: (2) an
application for an order for access to business records under Title V of FISA; and (3)
submissions from the government under Section 702 of FISA. As to applications for
orders for access to business records under Title V of FISA, please describe whether the
process for the Court's consideration ofsuch applications is different when considering
requests for bulk collection ofphone call metadata records, as recently declassified by
the Director ofNational Intelligence.
Each week, one of the eleven district court judges who comprise the Court is on duty in
Washington. As discussed below, most of the Court's work is handled by the duty judge with the
assistance of attorneys and clerk's office personnel who staff the Court. Some of the Court's
more complex or time-consuming matters are handled by judges outside of the duty-week
system, at the discretion of the Presiding Judge. In either case, matters before the Court are
thoroughly reviewed and analyzed by the Court.
Rule 9(a) of the United States Foreign Intelligence Surveillance Court Rules ofProcedure
Honorable Patrick J. Leahy
July 29, 2013
Page 2
(FISC Rules ofProcedure) 1 requires that except in certain circumstances (i.e., a submission
pursuant to an emergency authorization under the statute or as otherwise permitted by the Court),
a proposed application must be submitted by the government no later than seven days before the
government seeks to have the matter entertained. 2 Upon the Court's receipt of a proposed
application for an order under FISA, a member of the Court's legal staff reviews the application
and evaluates whether it meets the legal requirements under the statute. As part of this
evaluation, a Court attorney will often have one or more telephone conversations with the
governmene to seek additional information and/or raise concerns about the application. A Court
attorney then prepares a written analysis of the application for the duty judge, which includes an
identification of any weaknesses, flaws, or other concerns. For example, the attorney may
recommend that the judge consider requiring the addition of information to the application;
imposing special reporting requirements; 4 or shortening the requested duration of an
authorization.
The judge then reviews the proposed application, as well as the attorney's written
analysis. 5 The judge typically makes a preliminary determination at that time about what course
1
A copy of the FISC Rules of Procedure is appended hereto as Attachment A. The rules are also
available at http://www. uscourts.gov /uscourts/rules/FISC20 I 0. pdf.
2
A proposed application is also sometimes referred to as a "read copy" and has been referred to
in this manner in at least one recent congressional hearing. A proposed application or "read copy" is a
near-final version of the government's application, which does not include the signatures of executive
branch officials required by statutory provisions such as 50 U.S.C. §§ 1804(a)(6) and 1823(a)(6). As
described below, in most circumstances, the government will subsequently file a final copy of an
application pursuant to Rule 9(b) ofthe FISC Rules of Procedure. Both the proposed and final
applications include proposed orders.
The process of using proposed applications and final applications is altogether similar to the
process employed by other federal courts in considering applications for wiretap orders under Title Ill of
the Omnibus Crime Control and Safe Streets Act of 1968, as amended ("Title Ill"), which is codified at
18 U.S.C. §§ 2510-2522.
3
In discussing Court interactions with "the government" throughout this document, I am
referring to interactions with attorneys in the Office oflntelligence of the National Security Division of
the United States Department of Justice.
4
Pursuant to 50 U.S.C. §§ 1805(d)(3) and 1824(d)(3), the Court is authorized to assess
compliance with the statutorily-required minimization procedures by reviewing the circumstances under
which information concerning United States persons was acquired, retained, or disseminated.
5
For each application, the Court retains the attorney's written analysis and the notes made by the
judge, so that if the government later seeks to renew the authorization, the judge who considers the next
Honorable Patrick J. Leahy
July 29, 2013
Page 3
of action to take. These courses of action might include indicating to Court staff that he or she is
prepared to approve the application without a hearing; indicating an inclination to impose
conditions on the approval of the application; determining that additional information is needed
about the application; or determining that a hearing would be appropriate before deciding
whether to grant the application. A staff attorney will then relay the judge's inclination to the
government, and the government will typically proceed by providing additional information, or
by submitting a final application (sometimes with amendments, at the government's election) for
the Court's ruling pursuant to Rule 9(b) ofthe FISC Rules ofProcedure. In conjunction with its
submission of a final application, the government has an opportunity to request a hearing, even if
the judge did not otherwise intend to require one. The government might request a hearing, for
example, to challenge conditions that the judge has indicated he or she would impose on the
approval of an application. If the judge schedules a hearing, the judge decides whether to
approve the application thereafter. Otherwise, the judge makes a determination based on the
final written application submitted by the government. In approving an application, a judge will
sometimes issue a Supplemental Order in addition to signing the government's proposed orders.
Often, a Supplemental Order imposes some form of reporting requirement on the government.
If after receiving a final application, the judge is inclined to deny it, the Court will prepare
a statement ofreason(s) pursuant to 50 U.S.C. § 1803(a)(l). In some cases, the government may
decide not to submit a final application, or to withdraw one that has been submitted, after
learning that the judge does not intend to approve it. The annual statistics provided to Congress
by the Attorney General pursuant to 50 U.S.C. §§ 1807 and 1862(b)- frequently cited to in press
reports as a suggestion that the Court's approval rate of applications is over 99%- reflect only
the number ofjinal applications submitted to and acted on by the Court. These statistics do not
reflect the fact that many applications are altered prior to final submission or even withheld from
final submission entirely, often after an indication that a judge would not approve them. 6
Most applications under Title V ofFISA are handled pursuant to the process described
above. However, applications under Title V ofFISA for bulk collection of phone call metadata
records are normally handled by the weekly duty judge using a process that is similar to the one
described above, albeit more exacting. The government typically submits a proposed application
of this type more than one week in advance. The attorney who reviews the application spends a
application has the benefit of the prior thoughts of the judge(s) and staff, and a written record of any
problems with the case.
6
Notably, the approval rate for Title III wiretap applications (see note 2 above) is higher than
the approval rate for FISA applications, even using the Attorney General's FISA statistics as the baseline
for comparison, as recent statistics show that from 2008 through 2012, only five of 13,593 Title III
wiretap applications were requested but not authorized. See Administrative Office of the United States
Courts, Wiretap Report 2012, Table 7 (available at
http://www. uscourts.gov/uscourts/statistics/wiretapreports/20 12/Table 7. pdf).
Honorable Patrick J. Leahy
July 29, 2013
Page 4
greater amount of time reviewing and preparing a written analysis of such an application, in part
because the Court has always required detailed information about the government's
implementation of this authority. The judge likewise typically spends a greater amount of time
than he or she normally spends on an individual application, carefully considering the extensive
information provided by the government and determining whether to seek more information or
hold a hearing before ruling on the application.
As described above, the majority of applications submitted to the Court are handled on a
seven-day cycle, by a judge sitting on a weekly duty schedule. Applications that are novel or
more complex are sometimes handled on a longer time-line, usually require additional briefing,
and are assigned by the Presiding Judge based on judges' availability. Section 702 (i.e., 50
U.S.C. § 1881a) applications7 would typically fall into this category.
I
!
I
I
f
I
I
~
Where the Court's process for handling Section 702 applications differs from the process
described above, it is largely based on the statutory requirements of that section, which was
enacted as part ofthe FISA Amendments Act of2008 (FAA). Pursuant to 50 U.S.C. §§
1881 a(g)(l )(A) & (g)(2)(D)(i), prior to the implementation of an authorization under Section
702, the Attorney General and the Director of National Intelligence must provide the Court with
a written certification containing certain statutorily required elements, and that certification must
include an effective date for the authorization that is at least 30 days after the submission of the
written certification to the Court. 8 Under 50 U.S.C. § 1881a(i)(B), the Court must review the
certification, as well as the targeting and minimization procedures adopted in accordance with 50
U.S.C. §§ 1881a(d) & (e), not later than 30 days after the date on which the certification and
procedures are submitted. The statutorily-imposed deadline for the Court's review typically
coincides with the effective date identified in the final certification filed with the Court.
The government's submission of a Section 702 application typically includes a cover
filing that highlights any special issues and identifies any changes that have been made relative to
the prior application. The government has typically filed proposed (read copy) Section 702
applications approximately one month before filing a final application. Proposed Section 702
applications are reviewed by multiple members ofthe Court's legal staff. At the direction of the
Presiding Judge or a judge who has been assigned to handle the Section 702 application, the
7
"Section 702 application" is used here to refer collectively to a Section 702 certification and
supporting affidavit, as well as to the statutorily-required targeting and minimization procedures.
8
If the acquisition has already begun (e.g., pursuant to a determination of exigent circumstances
under 50 U.S.C. § 1881 a( c)(2)) or the effective date is less than 30 days after the submission of the
written certification to the Court (e.g., because of an amendment to a certification while judicial review is
pending, pursuant to 50 U.S.C. § 1881a(i)(l)(C)), 50 U.S.C. § 1881a(g){2){D)(ii) requires the
certification to include the date the acquisition began or the effective date of the authorization.
t
I
I
Honorable Patrick J. Leahy
July 29, 2013
Page 5
Court's legal staff may request a meeting with the government to discuss a proposed application.
Also at the direction of the Presiding Judge or a judge who has been assigned to handle the
Section 702 application, the Court legal staff may request additional information from the
government or convey a judge's concerns about the legal sufficiency of a proposed Section 702
application. Following these interactions, the government files a final Section 702 application,
which the government may have elected to amend based on any concerns raised by the judge.
The judge reviews the final Section 702 application and may set a hearing if he or she has
additional questions about it. If the judge finds (based on the written submission alone or the
written submission in combination with a hearing) that the certification contains all of the
required elements, and that the targeting and minimization procedures adopted in accordance
with 50 U.S.C. §§ 1881a(d) & (e) are consistent with the requirements of those subsections and
with the Fourth Amendment to the Constitution of the United States, the judge enters an order
approving the certification in accordance with 50 U.S.C. § 1881a(i)(3)(A). As required by 50
U.S.C. § 1881a(i)(3)(C), the judge also issues an opinion in support of the order. If the judge
finds that the certification does not contain the required elements or the targeting and
minimization procedures are inconsistent with the requirements of 50 U.S.C. §§ 1881a(d) & (e),
or the Fourth Amendment, the judge will, pursuant to 50 U.S.C. § 1881a(i)(3)(B), issue an order
directing the government to, at the government's election and to the extent required by the
Court's order, either correct any deficiency identified by the Court's order not later than 30 days
after the date on which the Court issues the order, or cease, or not begin, the implementation of
the authorization for which the certification was submitted. Subsequent review of any remedial
measures taken by the government may then be required and may result in another order and
opinion pursuant to 50 U.S.C. § 1881a(i).
2.
When considering such applications and submissions, please describe the interaction
between the government and the Court (including both judges and court stajj), including
any hearings, meetings, or other means through which the Court has the opportunity to
ask questions or seek additional information from the government. Please describe how
frequently such exchanges occur, and generally what types ofadditional information that
the Court might request of the government, if any. Please also describe how frequently
the Court asks the government to make changes to its applications and submissions
before ruling.
The process through which the Court interacts with the government in reviewing
proposed applications, seeking additional information, conveying Court concerns, and
adjudicating final applications, is very similar to the process employed by other federal courts in
considering applications for wiretap orders under Title III (discussed in notes 2 and 6 above).
Under FISA practice, the first set of interactions often take place at the staff level. The
Court's legal staff frequently interacts with the government in various ways in the context of
Honorable Patrick J. Leahy
July 29, 2013
Page 6
examining the legal sufficiency of applications before they are presented in final form to a judge.
Indeed, in the process of reviewing the government's applications and submissions in order to
provide advice to the judge, the legal staff interact with the government on a daily basis. These
daily interactions typically consist of secure telephone conversations in which legal staff ask the
government questions about the legal and factual elements of applications or submissions. These
questions may originate with legal staff after an initial review of an application or submission, or
they may come from a judge.
At the direction of the Presiding Judge or the judge assigned to a matter, Court legal staff
sometimes meet with the government in connection with applications and submissions. The
Court typically requests such meetings when a proposed application or submission presents a
special legal or factual concern about which the Court would like additional information (e.g., a
novel use of technology or a request to use a new surveillance or search technique). The
frequency of such meetings varies depending on the Court's assessment of its need for additional
information in matters before it and the most conducive means to obtain that information. Court
legal staff may meet with the government as often as 2-3 times a week, or as few as 1-2 times a
month, in connection with the various matters pending before the Court.
Pursuant to 50 U.S.C. § 1803(a)(2)(A) and Rule 17(a) ofthe FISC Rules ofProcedure,
the Court also holds hearings in cases in which a judge assesses that he or she needs additional
information in order to rule on a matter. The frequency of hearings varies depending on the
nature and complexity of matters pending before the Court at a given time, and also, to some
extent, based on the individual preferences of different judges. Hearings are attended, at a
minimum, by the Department of Justice attorney who prepared the application and a fact witness
from the agency seeking the Court's authorization.
The types of additional information sought from the government - through telephone
conversations, meetings, or hearings- include, but are not limited to, the following: additional
facts to justifY the government's belief that its application meets the legal requirements for the
type of authority it is seeking (e.g., in the case of electronic surveillance, that might include
additional information to justifY the government's belief that a target of surveillance is a foreign
power or an agent of a foreign power, as required by 50 U.S.C. § 1804(a)(3)(A), or that the target
is using or about to use a particular facility, as required by 50 U.S.C. § 1804(a)(3)(B)); additional
facts about how the government intends to implement statutorily required minimization
procedures (see, e.g., 50 U.S.C. §§ 1801(h); 1805(a)(3); 1824(a)(3); 1861(c)(l); 1881a(i)(3)(A);
and 1881 c(c)(1 )(c)); additional information about the government's prior implementation of a
Court order, particularly if the government has previously failed to comply fully with a Court
order; or additional information about novel issues of technology or law (see Rule 11 of FISC
Rules of Procedure).
In a typical week, the Court seeks additional information or modifies the terms proposed
I
t
l
I
l
Honorable Patrick J. Leahy
July 29, 2013
Page7
by the government in a significant percentage of cases. 9 (The Court has recently initiated the
process of tracking more precisely how frequently this occurs.) The judge may determine, for
example, that he or she cannot make the necessary findings under the statute without the addition
of information to the application, or that he or she can approve only some of the authorities
sought through the application. The government then has the choice to alter its final application
or proposed orders in response to the judge's concerns; request a hearing to address those
concerns; submit a final application without changes; or elect not to proceed at all with a final
application. If the government files a final application, the Court may, on its own, make changes
to the government's proposed orders (or issue totally redrafted orders) to address the judge's
concern about a given application. The judge may choose, for example, to make an authorization
of a shorter duration than what was requested by the government, or the judge may issue a
Supplemental Order imposing special reporting or minimization requirements on the
government's implementation of an authorization.
3.
Public FISA Court opinions and orders make clear that the Court has considered
the views of non-governmental parties in certain cases, including a provider
challenge to the Protect America Act of 2007. Describe instances where nongovernmental parties have appeared before the Court. Has the Court invited or
heard views from a nongovernmental party regarding applications or submissions
under Title/, Title V, or Title VII of FISA? lf so, how did this come about, and
what was the process or mechanism that the Court used to enable such views to
be considered?
FISA does not provide a mechanism for the Court to invite the views of nongovernmental
parties. In fact, the Court's proceedings are ex parte as required by the statute (see. e.g., 50
U.S.C. §§ 1805(a), 1824(a), 1842(d)(l) & 1861(c)(l)), and in keeping with the procedures
followed by other courts in applications for search warrants and wiretap orders. Nevertheless,
the statute and the FISC Rules of Procedure provide multiple opportunities for recipients of
Court orders or government directives to challenge those orders or directives, either directly or
through refusal to comply with orders or directives. Additionally, as detailed below, there have
been several instances - particularly in the past several months - in which nongovernmental
parties have appeared before the Court outside of the context of a challenge to an individual
Court order or government directive.
There has been one instance in which the Court heard arguments from a nongovernmental
party that sought to substantively contest a directive from the government. Specifically, in 2007,
the government issued directives to Yahoo!, Inc. (Yahoo) pursuant to Section 1058 ofthe Protect
America Act of 2007 (PAA). Yahoo refused to comply with the directives, and the government
9
This assessment does not include minor technical or typographical changes, which occur more
frequently.
Honorable Patrick J. Leahy
July 29, 2013
Page 8
filed a motion with this Court to compel compliance. The Court ordered and received briefing
from both parties, and rendered a decision in April 2008. 10
As noted above, the FISC Rules of Procedure and the FISA statute provide opportunities
for the appearance of nongovernmental parties before the Court in matters pending pursuant to
Titles I, V and VII of the statute. For example, Rule 19(a) of the FISC Rules of Procedure
provides that if a person or entity served with a Court order fails to comply with that order, the
government may file a motion for an order to show cause why the recipient should not be held in
contempt and sanctioned accordingly. Thus, a nongovernmental party served with an order may
invite an opportunity to be heard by the Court through refusal to comply with an order.
With respect to applications filed under Title V ofFISA, 50 U.S.C. § 1861(t)(2)(A)(i)
provides that a person receiving a production order may challenge the legality of that order by
filing a petition with the Court. The same section of the statute provides that the recipient of a
production order may challenge the non-disclosure order imposed in connection with a
production order by filing a petition to modify or set aside the nondisclosure order. Rules 33-36
of the FISC Rules of Procedure delineate the procedures and requirements for filing such
petitions, including the time limits on such challenges. To date, no recipient of a production
order has opted to invoke this section of the statute.
With respect to applications filed under Title VII ofFISA, 50 U.S.C. § 188la(h)(4)(A)
provides that an electronic communication service provider who receives a directive pursuant to
Section 702 may file a petition to modify or set aside the directive with the Court. Sections
188la(h)(4)(A)-(G) ofthe statute, as well as Rule 28 ofthe FISC Rules of Procedure, delineate
10
Yahoo thereafter appealed the Court's decision to the Foreign Intelligence Surveillance Court
of Review (FISCR). See In re Directives [redacted] Pursuant to Section 105b of the Foreign
Intelligence Surveillance Act, 551 F.3d 1004 (FISA Ct. Rev. 2008). This is not the only instance in
which a nongovernmental entity has appeared before the FISCR. In 2002, the FISCR accepted briefs
filed by the ACLU and the National Association of Criminal Defense Lawyers as amici curiae in In re
Sealed Case, 310 F.3d 717 (FISA Ct. Rev. 2002).
While Yahoo's identity as the provider that challenged these directives was previously under seal
pursuant to the FISCR's decision in In re Directives, 551 F.3d 1004, 1016-18, the FISCR issued an Order
on June 26, 2013, indicating that it does not object to the release of Yahoo's identity, and ordering,
among other things, a new declassification review of the FISCR's opinion in In re Directives. The
FISCR issued this order in response to a motion by Yahoo's counsel, and after receiving briefing by
Yahoo and the government. Yahoo also recently filed a motion for publication of the Court's decision
that was appealed to the FISCR, resulting in the published opinion in In re Directives. The Court granted
the motion. Documents related to Yahoo's recent motion to this Court are available at
http://www.uscourts.gov/uscourts/courts/fisc/index.html under Docket No. 105B(g) 07-0 I.
Honorable Patrick J. Leahy
July 29, 2013
Page 9
the procedures and requirements for such challenges. Relatedly, 50 U.S.C. § 188la(h)(5)(A)
provides that if an electronic communication service provider fails to comply with a directive
issued under Section 702, the Attorney General may file a petition with the Court for an order to
compel compliance, which would likely result in the service provider's appearance before the
Court through its legal representatives. (Section 1881a(h)(5), as well as Rule 29 of the FISC
Rules of Procedure, provide further detail on the procedures and requirements for the
enforcement of Section 702 directives.) Finally, 50 U.S.C. § 1881a(h)(6) and Rule 31 ofthe
FISC Rules of Procedure allow for the government or an electronic communication service
provider to appeal an order ofthis Court under§§ 1881a(h)(4) or (5) to the FISCR. To date, no
electronic communication service provider has opted to challenge a directive issued pursuant to
Section 702, although, as noted above, Yahoo refused to comply with government directives
issued under the PAA, which resulted in the government invoking a provision under that statute
to compel compliance.
As noted above, there have been a number of other instances in which nongovernmental
parties have appeared before the Court outside of the context of a direct challenge to a court
order or a government directive, particularly recently. Those instances are as follows:
In August 2007, the American Civil Liberties Union (ACLU) filed a motion with the
Court for the release of certain records. The Court ordered and received briefing on the matter
from the ACLU and the government, and rendered a decision in December 2007. See In re
Motion for Release of Court Records, 526 F. Supp. 2d 484 (FISA Ct. 2007).
On May 23, 2013, the Electronic Frontier Foundation (EFF) filed a motion with this
Court for consent to disclosure of court records, or in the alternative, a determination of the effect
of the Court's rules on access rights under the Freedom oflnformation Act. Following briefing
by EFF and the government, the Court issued an Opinion and Order on June 12, 2013. All
documents filed in this docket are available at
http://www.uscourts.gov/uscourts/courts/fisc/index.html under Case No. Misc. 13-01.
On June 12, 2013, the ACLU, the American Civil Liberties Union of the Nation's
Capital, and the Media Freedom and Information Access Clinic (Movants) filed a motion with
this Court for the release of Court records. The Court ordered and has received briefing on the
matter from the Movants and the government. On July 18, 2013, the Court granted the motions
of ( 1) sixteen members of the House of Representatives and (2) a coalition of news media
organizations for leave to file amicus curiae briefs in this case. The matter is pending before the
Court. All documents filed in this docket are available at
http://www.uscourts.gov/uscourts/courts/fisc/index.html under Case No. Misc. 13-02.
On June 18, 2013, Google, Inc. filed a motion with this Court for declaratory judgment of
the company's first amendment right to publish aggregate information about FISA orders. The
~
I
I
I
Honorable Patrick J. Leahy
July 29, 2013
Page 10
court ordered briefing on the matter. On July 18,2013, the Court granted the motions of(1) a
coalition of news media organizations and (2) the First Amendment Coalition, the ACLU, the
Center for Democracy and Technology, the EFF, and Techfreedom for leave to file amicus curiae
briefs in this case. The matter is pending before the Court. All documents filed in this docket
are available at http://www.uscourts.gov/uscourts/courts/fisc/index.html under Case No. Misc.
13-03.
On June 19, 2013, Microsoft Corporation filed a motion in this Court for declaratory
judgment or other appropriate relief authorizing disclosure of aggregate data regarding any FISA
orders it has received. The court ordered briefing on the matter. On July 18, 2013, the Court
granted the motions of (1) a coalition of news media organizations and (2) the First Amendment
Coalition, the ACLU, the Center for Democracy and Technology, the EFF, and Techfreedom for
leave to file amicus curiae briefs in this case. The matter is pending before the Court. All
documents filed in this docket are available at
http://www.uscourts.gov/uscourts/courts/fisc/index.html under Case No. Misc. 13-04.
4.
Please describe the process used by the Court to consider and resolve any instances
where the government notifies the Court ofcompliance concerns with any ofthe FISA
authorities.
Pursuant to 50 U.S.C. § 1803(h), the Court is empowered to ensure compliance with its
orders. Additionally, Rule 13(a) of the FISC Rules of Procedure requires the government to file
a written notice with the Court immediately upon discovering that any authority or approval
granted by the Court has been implemented (either by government officials or others operating
pursuant to Court order) in a manner that did not comply with the Court's authorization or
approval or with applicable law. Rule 13(a) also requires the government to notifY the Court in
writing of the facts and circumstances relevant to the non-compliance; any modifications the
government has made or proposes to make in how it will implement any authority or approval
granted by the Court; and how the government proposes to dispose of or treat any information
obtained as a result of the non-compliance.
When the government discovers instances of non-compliance, it files notices with the
Court as required by Rule 13(a). Because the rule requires the government to "immediately
inform the Judge" of a compliance incident, the government typically files a preliminary notice
that provides whatever facts are available at the time an incident is discovered. The legal staff
review these notices as they are received and call significant matters to the attention of the
appropriate judge. In instances in which the non-compliance has not been fully addressed by the
time the preliminary Rule 13(a) notice is filed, the Court may seek additional information
through telephone calls, meetings, or hearings. Typically, the government will file a final Rule
13(a) notice once the relevant facts are known and any unauthorized collection has been
destroyed. However, judges sometimes issue orders directing the government to take specific
I
i
!
Honorable Patrick J. Leahy
July 29, 2013
Page 11
actions to address instances of non-compliance either before or after a final notice is
filed, and, less frequently, to cease a course of action that the Court considers non-compliant.
This process is followed for compliance issues in all matters, including matters handled under
Title V and Section 702.
I hope these responses are helpful to the Senate Judiciary Committee in its deliberations.
m
rel~(31{;k
R g ie B. Walton
Presiding Judge
Identical letter sent to:
Honorable Charles E. Grassley
I
I
r
TO THE BENCH, BAR AND PUBLIC:
The attached Rules ofProcedure for the Foreign Intelligence Surveillance Court supersede both
the February 17, 2006 Rules of Procedure and the May 5, 2006 Procedures for Review of
Petitions Filed Pursuant to Section 501(/) of the Foreign Intelligence Surveillance Act of 1978,
As Amended. These revised Rules of Procedure are effective immediately.
John D. Bates
Presiding Judge
Foreign Intelligence Surveillance Court
November 1, 20 l 0
UNITED STATES FOREIGN
INTELLIGENCE SURVEILLANCE COURT
Washington, D.C.
RULES OF PROCEDURE
Effective November 1, 2010
Rule
Page
Title I. Scope of Rules; Amendment
1. Scope of Rules ............................................................. 1
2. Amendment ............................................................... 1
Title II. National Security Information
3. National Security Information ................................................. 1
Title III. Structure and Powers of tbe Court
4. Structure ............................................................... .
5. Authority of the Judges .................................................... .
Title IV. Matters Presented to tbe Court
6. Means of Requesting Relief from the Court ...................................... 2
7. Filing Applications, Certifications, Petitions,
Motions, or Other Papers ("Submissions") ....................................... 2
8. Service ................................................................... 3
9. Time and Manner of Submission of Applications .................................. 3
10. Computation of Time ....................................................... 4
11. Notice and Briefing of Novel Issues ............................................ 4
12. Submission of Targeting and Minimization Procedures ............................. 5
13. Correction of Misstatement or Omission; Disclosure of Non-Compliance .............. 5
14. Motions to Amend Court Orders .............................................. 5
15. Sequestration .............................................................. 5
16. Returns .................................................................. 6
Title V. Hearings, Orders, and Enforcement
17. Hearings ................................................................. 6
18. Court Orders .............................................................. 6
19. Enforcement of Orders ...................................................... 7
Title VI. Supplemental Protedures for Proteedings Under SO U.S.C. § 188la(h)
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
Scope .................................................................... 7
Petition to Modify or Set Aside a Directive ...................................... 7
Petition to Compel Compliance With a Directive ................................. 7
Contents of Petition ........................................................ 8
Response ................................................................. 8
Length of Petition and Response; Other Papers ................................... 8
Notification of Presiding Judge ............................................... 8
Assignment ............................................................... 8
Review of Petition to Modify or Set Aside a Directive ............................. 9
Review of Petition to Compel Compliance Pursuant to 50 U.S.C. § 1881a(h)(5)(C) ...... 9
In Camera Review ......................................................... 9
Appeal ................................................................... 9
Title VII. Supplemental Protedures for Proteedings Under SO U.S.C. § 186l(f)
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
Scope ...................................................................
Petition Challenging Production or Nondisclosure Order ..........................
Contents of Petition .......................................................
Length of Petition .........................................................
Request to Stay Production ..................................................
Notification of Presiding Judge ..............................................
Assignment ..............................................................
Initial Review ............................................................
Response to Petition; Other Papers ............................................
Rulings on Non-frivolous Petitions ...........................................
Failure to Comply .........................................................
In Camera Review ........................................................
Appeal ..................................................................
10
10
10
10
10
10
11
11
11
11
12
12
12
Title VIII. En Bant Proteedings
45.
46.
47.
48.
49.
50.
51.
52.
53.
Standard for Hearing or Rehearing En Bane .....................................
Initial Hearing En Bane on Request of a Party ...................................
Rehearing En Bane on Petition by a Party ......................................
Circulation of En Bane Petitions and Responses .................................
Court-Initiated En Bane Proceedings ..........................................
Polling ..................................................................
Stay Pending En Bane Review ...............................................
Supplemental Briefing .....................................................
Order Granting or Denying En Bane Review ....................................
-11-
12
12
12
13
13
13
13
13
13
54.
55.
56.
57.
58.
59.
Title IX. Appeals
How Taken .............................................................. 14
When Taken ............................................................. 14
Stay Pending Appeal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Motion to Transmit the Record ............................................... 14
Transmitting the Record .................................................... 14
Oral Notification to the Court of Review ....................................... 14
Title X. Administrative Provisions
60.
61.
62.
63.
Duties ofthe Clerk ........................................................ 14
Office Hours . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Release of Court Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Practice Before Court ...................................................... 15
-111-
Title I. Scope of Rules; Amendment
Rule I. Scope of Rules. These rules, which are promulgated pursuant to 50 U.S.C. § 1803(g),
govern all proceedings in the Foreign Intelligence Surveillance Court (''the Court"). Issues not
addressed in these rules or the Foreign Intelligence Surveillance Act, as amended (''the Act"),
may be resolved under the Federal Rules of Criminal Procedure or the Federal Rules of Civil
Procedure.
Rule 2. Amendment. Any amendment to these rules must be promulgated in accordance with
28 u.s.c. § 2071.
Title II. National Security Information
Rule 3. National Security Information. In all matters, the Court and its staff shall comply with
the security measures established pursuant to 50 U.S.C. §§ 1803(c), 1822(e), 186l(f)(4), and
188la(k)(l), as well as Executive Order 13526, "Classified National Security Infonnation" (or its
successor). Each member of the Court's staff must possess security clearances at a level
commensurate to the individual's responsibilities.
Title III. Structure and Powen of the Court
Rule 4. Structure.
(a) Composition. In accordance with 50 U.S.C. § 1803(a), the Court consists ofUnited
States District Court Judges appointed by the Chief Justice of the United States.
(b) Presiding Judge. The Chief Justice designates the "Presiding Judge."
Rule 5. Authority of the Judges.
(a) Scope of Authority. Each Judge may exercise the authority vested by the Act and
such other authority as is consistent with Article III of the Constitution and other statutes
and laws of the United States, to the extent not inconsistent with the Act.
(b) Referring Matten to Other Judges. Except for matters involving a denial of an
application for an order, a Judge may refer any matter to another Judge of the Court with
that Judge's consent. If a Judge directs the government to supplement an application, the
Judge may direct the government to present the renewal of that application to the same
Judge. If a matter is presented to a Judge who is unavailable or whose tenure on the
Court expires while the matter is pending, the Presiding Judge may re-assign the matter.
(e) Supplementation. The Judge before whom a matter is pending may order a party to
furnish any infonnation that the Judge deems necessary.
-1-
Title IV. Matters Presented to the Court
Rule 6. Means of Requesting Relief from the Court.
(a) Application. The government may, in accordance with 50 U.S.C. §§ 1804, 1823,
1842, 1861, 188lb(b), 188lc(b), or 1881d(a), file an application for a Court order
("application").
(b) Certification. The government may, in accordance with 50 U.S.C. § 1881a(g), file a
certification concerning the targeting of non-United States persons reasonably believed to
be located outside the United States ("certification").
(c) Petition. A party may, in accordance with 50 U.S.C. §§ 1861(f) and 1881a(h) and
the Supplemental Procedures in Titles VI and VII of these Rules, file a petition for review
of a production or nondisclosure order issued under 50 U.S.C. § 1861 or for review or
enforcement of a directive issued under 50 U.S.C. § 1881a ("petition").
(d) Motion. A party seeking relief, other than pursuant to an application, certification, or
petition permitted under the Act and these Rules, must do so by motion ("motion").
Rule 7. Filing Applications, Certifications, Petitions, Motions, or Other Papers
("Submissions").
(a) Filing. A submission is filed by delivering it to the Clerk or as otherwise directed by
the Clerk in accordance with Rule 7(k).
(b) Original and One Copy. Except as otherwise provided, a signed original and one
copy must be filed with the Clerk.
(c) Form. Unless otherwise ordered, all submissions must be:
(1) on 8~-by-ll-inch opaque white paper; and
(2) typed (double-spaced) or reproduced in a manner that produces a clear black
image.
(d) Electronic Filing. The Clerk, when authorized by the Court, may accept and file
submissions by any reliable, and appropriately secure, electronic means.
(e) Facsimile or Scanned Signature. The Clerk may accept for filing a submission
bearing a facsimile or scanned signature in lieu of the original signature. Upon
acceptance, a submission bearing a facsimile or scanned signature is the original Court
record.
(f) Citations. Each submission must contain citations to pertinent provisions of the Act.
(g) Contents. Each application and certification filed by the government must be
approved and certified in accordance with the Act, and must contain the statements and
other information required by the Act.
(h) Contact Information in Adversarial Proceedings.
(1) Filing by a Party Other Than the Government. A party other than the
government must include in the initial submission the party's full name, address,
and telephone number, or, if the party is represented by counsel, the full name of
the party and the party's counsel, as well as counsel's address, telephone number,
facsimile number, and bar membership information.
(2) Filing by the Government. In an adversarial proceeding, the initial
-2-
submission filed by the government must include the full names of the attorneys
representing the United States and their mailing addresses, telephone numbers,
and facsimile numbers.
(i) Information Concerning Security Clearances in Adversarial Proceedings. A party
other than the government must:
(1) state in the initial submission whether the party (or the party's responsible
officers or employees) and counsel for the party hold security clearances;
(2) describe the circumstances in which such clearances were granted; and
(3) identify the federal agencies granting the clearances and the classification
levels and compartments involved.
(j) Ex Parte Review. At the request of the government in an adversarial proceeding, the
Judge must review ex parte and in camera any submissions by the government, or
portions thereof, which may include classified information. Except as otherwise ordered,
if the government files ex parte a submission that contains classified information, the
government must file and serve on the non-governmental party an unclassified or
redacted version. The unclassified or redacted version, at a minimum, must clearly
articulate the government's legal arguments.
(k) Instructions for Delivery to the Court. A party may obtain instructions for making
submissions permitted under the Act and these Rules by contacting the Clerk at (202)
357-6250.
Rule 8. Service.
(a) By a Party Other than the Government. A party other than the government must,
at or before the time of filing a submission permitted under the Act and these Rules, serve
a copy on the government. Instructions for effecting service must be obtained by
contacting the Security and Emergency Planning Staff, United States Department of
Justice, by telephone at (202) 514-2094.
(b) By the Government. At or before the time of filing a submission in an adversarial
proceeding, the government must, subject to Rule 7G), serve a copy by hand delivery or
by overnight delivery on counsel for the other party, or, if the party is not represented by
counsel, on the party directly.
(c) Certificate of Service. A party must include a certificate of service specifying the
time and manner of service.
Rule 9. Time and Manner of Submission of Applications.
(a) Proposed Applications. Except when an application is being submitted following
an emergency authorization pursuant to 50 U.S.C. §§ 1805(e), 1824(e), 1843, 188lb(d),
or 1881c(d) ("emergency authorization"), or as otherwise permitted by the Court,
proposed applications must be submitted by the government no later than seven days
before the government seeks to have the matter entertained by the Court. Proposed
applications submitted following an emergency authorization must be submitted as soon
after such authorization as is reasonably practicable.
(b) Final Applications. Unless the Court permits otherwise, the final application,
-3-
including all signatures, approvals, and certifications required by the Act, must be filed
no later than 10:00 a.m. Eastern Time on the day the government seeks to have the matter
entertained by the Court.
(c) Proposed Orders. Each proposed application and final application submitted to the
Court must include any pertinent proposed orders.
(d) Number of Copies. Notwithstanding Rule 7(b), unless the Court directs otherwise,
only one copy of a proposed application must be submitted and only the original final
application must be filed.
(e) Notice of Changes. No later than the time the final application is filed, the
government must identify any differences between the final application and the proposed
application.
Rule 10. Computation of Time. The following rules apply in computing a time period
specified by these Rules or by Court order:
(a) Day of the Event Excluded. Exclude the day of the event that triggers the period.
(b) Compute Time Using Calendar Days. Compute time using calendar days, not
business days.
(c) Include the Last Day. Include the last day of the period; but if the last day is a
Saturday, Sunday, or legal holiday, the period continues to run until the next day that is
not a Saturday, Sunday, or legal holiday.
Rule 11. Notice and Briefing of Novel Issues.
(a) Notice to the Court. If a submission by the government for Court action involves an
issue not previously presented to the Court - including, but not limited to, a novel issue
of technology or law- the government must inform the Court in writing of the nature
and significance of that issue.
(b) Submission Relating to New Techniques. Prior to requesting authorization to use a
new surveillance or search technique, the government must submit a memorandum to the
Court that:
(1) explains the technique;
(2) describes the circumstances of the likely implementation of the technique;
(3) discusses any legal issues apparent1y raised; and
(4) describes the proposed minimization procedures to be applied.
At the latest, the memorandum must be submitted as part of the first proposed application
or other submission that seeks to employ the new technique.
(c) Novel Implementation. When requesting authorization to use an existing surveillance
or search technique in a novel context, the government must identify and address any new
minimization or other issues in a written submission made, at the latest, as part of the
application or other filing seeking such authorization.
(d) Legal Memorandum. If an application or other request for action raises an issue of
law not previously considered by the Court, the government must file a memorandum of
law in support of its position on each new issue. At the latest, the memorandum must be
-4-
submitted as part of the first proposed application or other submission that raises the
issue.
Rule 12. Submission of Targeting and Minimization Procedures. In a matter involving
Court review of targeting or minimization procedures, such procedures may be set out in full in
the government's submission or may be incorporated by reference to procedures approved in a
prior docket. Procedures that are incorporated by reference to a prior docket may be
supplemented, but not otherwise modified, in the government's submission. Otherwise,
proposed procedures must be set forth in a clear and self-contained manner, without resort to
cross-referencing.
Rule 13. Correction of Misstatement or Omission; Disclosure of Non-Compliance.
(a) Correction of Material Facts. If the government discovers that a submission to the
Court contained a misstatement or omission of material fact, the government, in writing,
must immediately inform the Judge to whom the submission was made of:
(1) the misstatement or omission;
(2) any necessary correction;
(3) the facts and circumstances relevant to the misstatement or omission;
(4) any modifications the government has made or proposes to make in how it will
implement any authority or approval granted by the Court; and
(S) how the government proposes to dispose of or treat any information obtained
as a result of the misstatement or omission.
(b) Disclosure of Non-Compliance. If the government discovers that any authority or
approval granted by the Court has been implemented in a manner that did not comply
with the Court's authorization or approval or with applicable law, the government, in
writing, must immediately inform the Judge to whom the submission was made of:
(1) the non-compliance;
(2) the facts and circumstances relevant to the non-compliance;
(3) any modifications the government has made or proposes to make in how it will
implement any authority or approval granted by the Court; and
(4) how the government proposes to dispose of or treat any information obtained
as a result of the non-compliance.
Rule 14. Motions to Amend Court Orders. Unless the Judge who issued the order granting an
application directs otherwise, a motion to amend the order may be presented to any other Judge.
Rule IS. Sequestration. Except as required by Court-approved minimization procedures, the
government must not submit material for sequestration with the Court without the prior approval
of the Presiding Judge. To obtain such approval, the government must, prior to tendering the
material to the Court for sequestration, file a motion stating the circumstances of the material's
acquisition and explaining why it is necessary for such material to be retained in the custody of
the Court.
-5-
I
I
I
J
i
l
!
i,
f
I
J
~
l
Rule 16. Returns.
(a) Time for Filing.
(1) Search Orders. Unless the Court directs otherwise, a return must be made
and filed either at the time of submission of a proposed renewal application or
within 90 days of the execution of a search order, whichever is sooner.
(2) Other Orders. The Court may direct the filing of other returns at a time and
in a manner that it deems appropriate.
(b) Contents. The return must:
(1) notify the Court of the execution of the order;
(2) describe the circumstances and results of the search or other activity including,
where appropriate, an inventory;
(3) certify that the execution was in conformity with the order or describe and
explain any deviation from the order; and
(4) include any other information as the Court may direct.
Title V. Hearings, Orders, and Enforcement
Rule 17. Hearings.
(a) Scheduling. The Judge to whom a matter is presented or assigned must determine
whether a hearing is necessary and, if so, set the time and place of the hearing.
(b) Ex Parte. Except as the Court otherwise directs or the Rules otherwise provide, a
hearing in a non-adversarial matter must be ex parte and conducted within the Court's
secure facility.
(c) Appearances. Unless excused, the government official providing the factual
information in an application or certification and an attorney for the applicant must attend
the hearing, along with other representatives of the government, and any other party, as
the Court may direct or permit.
(d) Testimony; Oath; Recording of Proceedings. A Judge may take testimony under
oath and receive other evidence. The testimony may be recorded electronically or as the
Judge may otherwise direct, consistent with the security measures referenced in Rule 3.
Rule 18. Court Orders.
(a) Citations. All orders must contain citations to pertinent provisions of the Act.
(b) Denying Applications.
(1) Written Statement of Reasons. If a Judge denies the government's
application, the Judge must immediately provide a written statement of each
reason for the decision and cause a copy of the statement to be served on the
government.
(2) Previously Denied Application. If a Judge denies an application or other
request for relief by the government, any subsequent submission on the matter
must be referred to that Judge.
-6-
(c) Expiration Dates. An expiration date in an order must be stated using Eastern Time
and must be computed from the date and time of the Court's issuance of the order, or, if
applicable, of an emergency authorization.
(d) Electronic Signatures. The Judge may sign an order by any reliable, appropriately
secure electronic means, including facsimile.
Rule 19. Enforcement of Orders.
(a) Show Cause Motions. If a person or entity served with a Court order (the
"recipient") fails to comply with that order, the government may file a motion for an
order to show cause why the recipient should not be held in contempt and sanctioned
accordingly. The motion must be presented to the Judge who entered the underlying
order.
(b) Proceedings.
(1) An order to show cause must:
(i) confirm that the underlying order was issued;
(ii) schedule further proceedings; and
(iii) afford the recipient an opportunity to show cause why the recipient
should not be held in contempt.
(2) A Judge must conduct any proceeding on a motion to show cause in camera.
The Clerk must maintain all records of the proceedings in conformance with 50
U.S.C. § 1803(c).
(3) If the recipient fails to show cause for noncompliance with the underlying
order, the Court may find the recipient in contempt and enter any order it deems
necessary and appropriate to compel compliance and to sanction the recipient for
noncompliance with the underlying order.
(4) If the recipient shows cause for noncompliance or if the Court concludes that
the order should not be enforced as issued, the Court may enter any order it deems
appropriate.
Title VI. Supplemental Procedures for Proceedings Under SO U.S.C. § 1881a(h)
Rule 20. Scope. Together with the generally-applicable provisions of these Rules concerning
filing, service, and other matters, these supplemental procedures apply in proceedings under 50
. U.S.C. § 188la(h).
Rule 21. Petition to Modify or Set Aside a Directive. An electronic communication service
provider ("provider"), who receives a directive issued under 50 U.S.C. § 188la(h)(l), may file a
petition to modify or set aside such directive under 50 U.S.C. § 1881a(h)(4). A petition may be
filed by the provider's counsel.
-7-
Rule 22. Petition to Compel Compliance With a Directive. In the event a provider fails to
comply with a directive issued under 50 U.S.C. § 1881a(h)(l), the government may, pursuant to
50 U.S.C. § 188la(h)(5), file a petition to compel compliance with the directive.
Rule 23. Contents of Petition. The petition must:
(a) state clearly the relief being sought;
(b) state concisely the factual and legal grounds for modifying, setting aside, or
compelling compliance with the directive at issue;
(c) include a copy of the directive and state the date on which the directive was served on
the provider; and
(d) state whether a hearing is requested.
Rule 24. Response.
(a) By Government. The government may, within seven days following notification
under Rule 28(b) that plenary review is necessary, file a response to a provider's petition.
(b) By Provider. The provider may, within seven days after service of a petition by the
government to compel compliance, file a response to the petition.
Rule 25. Length of Petition and Response; Other Papers.
(a) Length. Unless the Court directs otherwise, a petition and response each must not
exceed 20 pages in length, including any attachments (other than a copy of the directive at
issue).
(b) Other papers. No supplements, replies, or sur-replies may be filed without leave of
the Court.
Rule 26. Notification of Presiding Judge. Upon receipt, the Clerk must notify the Presiding
Judge that a petition to modify, set aside, or compel compliance with a directive issued under 50
U.S.C. § 188la(h)(l) has been filed. If the Presiding Judge is not reasonably available when the
Clerk receives a petition, the Clerk must notify each of the local Judges, in order of seniority on
the Court, and, if necessary, each of the other Judges, in order of seniority on the Court, until a
Judge who is reasonably available has received notification. The reasonably available Judge who
receives notification will be the acting Presiding Judge ("Presiding Judge") for the case.
Rule 27. Assignment.
(a) Presiding Judge. As soon as possible after receiving notification from the Clerk that
a petition has been filed, and no later than 24 hours after the filing of the petition, the
Presiding Judge must assign the matter to a Judge in the petition review pool established
by 50 U.S.C. § 1803(e)(l). The Clerk must record the date and time ofthe assignment.
(b) Transmitting Petition. The Clerk must transmit the petition to the assigned Judge
as soon as possible but no later than 24 hours after being notified of the assignment by the
Presiding Judge.
-8-
Rule 28. Review of Petition to Modify or Set Aside a Directive.
(a) Initial Review Pursuant to 50 U.S.C. § 1881a(h)(4)(D).
(1) A Judge must conduct an initial review of a petition to modify or set aside a
directive within five days after being assigned such petition.
(2) If the Judge determines that the provider's claims, defenses, or other legal
contentions are not warranted by existing law or by a nonfrivolous argument for
extending, modifying, or reversing existing law or for establishing new law, the
Judge must promptly deny such petition, affirm the directive, and order the
provider to comply with the directive. Upon making such determination or
promptly thereafter, the Judge must provide a written statement of reasons. The
Clerk must transmit the ruling and statement of reasons to the provider and the
government.
(b) Plenary Review Pursuant to 50 U.S.C. § l88la(b)(4)(E).
(l) If the Judge determines that the petition requires plenary review, the Court
must promptly notify the parties. The Judge must provide a written statement of
reasons for the determination.
(2) The Judge must affirm, modify, or set aside the directive that is the subject of
the petition within the time permitted under 50 U.S.C. §§ 1881a(h)(4)(E) and
1881 a(j)(2).
(3) The Judge may hold a hearing or conduct proceedings solely on the papers
filed by the provider and the government.
(c) Burden. Pursuant to 50 U.S.C. § 1881a(h)(4)(C), a Judge may grant the petition only
if the Judge finds that the challenged directive does not meet the requirements of 50
U.S.C. § 1881a or is otherwise unlawful.
(d) Continued Effect. Pursuant to 50 U.S.C. § 1881a(h)(4)(F), any directive not
explicitly modified or set aside by the Judge remains in full effect.
Rule 29. Review of Petition to Compel Compliance Pursuant to 50 U.S.C. § 1881a(b)(5)(C).
(a) The Judge reviewing the government's petition to compel compliance with a directive
must, within the time permitted under 50 U.S.C. §§ 1881a(h)(5)(C) and 1881aG)(2), issue
an order requiring the provider to comply with the directive or any part of it, as issued or
as modified, if the Judge fmds that the directive meets the requirements of 50 U.S.C.
§ 1881 a and is otherwise lawful.
(b) The Judge must provide a written statement of reasons for the determination. The
Clerk must transmit the ruling and statement of reasons to the provider and the
government.
Rule 30. In Camera Review. Pursuant to 50 U.S.C. § 1803(e)(2), the Court must review a
petition under 50 U.S.C. § 1881a(h) and conduct related proceedings in camera.
Rule 31. Appeal. Pursuant to 50 U.S.C. § 1881a(h)(6) and subject to Rules 54 through 59 of
these Rules, the government or the provider may petition the Foreign Intelligence Surveillance
Court of Review ("Court of Review") to review the Judge's ruling.
-9-
Title VII. Supplemental Procedures for Proceedings Under 50 U.S.C. § 186l(f)
Rule 32. &ope. Together with the generally-applicable provisions of these Rules regarding
filing, service, and other matters, these supplemental procedures apply in proceedings under 50
u.s.c. § 1861(f).
Rule 33. Petition Challenging Production or Nondisclosure Order.
(a) Who May File. The recipient of a production order or nondisclosure order under 50
U.S.C. § 1861 ("petitioner") may file a petition challenging the order pursuant to 50
U.S.C. § 1861(f). A petition may be filed by the petitioner's counsel.
(b) Time to File Petition.
(1) Challenging a Production Order. The petitioner must file a petition
challenging a production order within 20 days after the order has been served.
(2) Challenging a Nondisclosure Order. A petitioner may not file a petition
challenging a nondisclosure order issued under 50 U.S.C. § 186l(d) earlier than
one year after the order was entered.
(3) Subsequent Petition Challenging a Nondisclosure Order. If a Judge
denies a petition to modify or set aside a nondisclosure order, the petitioner may
not file a subsequent petition challenging the same nondisclosure order earlier
than one year after the date of the denial.
Rule 34. Contents of Petition. A petition must:
(a) state clearly the relief being sought;
(b) state concisely the factual and legal grounds for modifying or setting aside the
challenged order;
(c) include a copy of the challenged order and state the date on which it was served on the
petitioner; and
(d) state whether a hearing is requested.
Rule 35. Length of Petition. Unless the Court directs otherwise, a petition may not exceed 20
pages in length, including any attachments (other than a copy of the challenged order).
Rule 36. Request to Stay Production.
(a) Petition Does Not Automatically Effect a Stay. A petition does not automatically
stay the underlying order. A production order will be stayed only if the petitioner
requests a stay and the Judge grants such relief.
(b) Stay May Be Requested Prior to Filing of a Petition. A petitioner may request the
Court to stay the production order before filing a petition challenging the order.
Rule 37. Notification of Presiding Judge. Upon receipt, the Clerk must notify the Presiding
Judge that a petition challenging a production or nondisclosure order has been filed. If the
Presiding Judge is not reasonably available when the Clerk receives the petition, the Clerk must
-10-
t
I
notify each of the local Judges, in order of seniority on the Court, and, if necessary, each of the
other Judges, in order of seniority on the Court, until a Judge who is reasonably available has
received notification. The reasonably available Judge who receives notification will be the acting
Presiding Judge ("Presiding Judge") for the case.
Rule 38. Assignment.
(a) Presiding Judge. Immediately after receiving notification from the Clerk that a
petition has been filed, the Presiding Judge must assign the matter to a Judge in the
petition pool established by 50 U.S.C. § 1803(e)(l). The Clerk must record the date and
time of the assignment.
(b) Transmitting Petition. The Clerk must transmit the petition to the assigned Judge
as soon as possible but no later than 24 hours after being notified of the assignment by the
Presiding Judge.
Rule 39. Initial Review.
(a) When. The Judge must review the petition within 72 hours after being assigned the
petition.
(b) Frivolous Petition. If the Judge determines that the petition is frivolous, the Judge
must:
(1) immediately deny the petition and affirm the challenged order;
(2) promptly provide a written statement of the reasons for the denial; and
(3) provide a written ruling, together with the statement of reasons, to the Clerk,
who must transmit the ruling and statement of reasons to the petitioner and the
government.
(c) Non-Frivolous Petition.
(1) Scheduling. If the Judge determines that the petition is not frivolous, the
Judge must promptly issue an order that sets a schedule for its consideration. The
Clerk must transmit the order to the petitioner and the government.
(2) Manner of Proceeding. The judge may hold a hearing or conduct the
proceedings solely on the papers filed by the petitioner and the government.
Rule 40. Response to Petition; Other Papers.
(a) Government's Response. Unless the Judge orders otherwise, the government must
file a response within 20 days after the issuance of the initial scheduling order pursuant to
Rule 39(c). The response must not exceed 20 pages in length, including any attachments
(other than a copy of the challenged order).
(b) Other Papers. No supplements, replies, or sur-replies may be filed without leave of
the Court.
Rule 41. Rulings on Non-frivolous Petitions.
(a) Written Statement of Reasons. Ifthe Judge determines that the petition is not
frivolous, the Judge must promptly provide a written statement of the reasons for
modifying, setting aside, or affirming the production or nondisclosure order.
-11-
I
~
•
I
(b) Affirming the Order. If the Judge does not modify or set aside the production or
nondisclosure order, the Judge must affirm it and order the recipient promptly to comply
with it.
(c) Transmitting the Judge's Ruling. The Clerk must transmit the Judge's ruling and
written statement of reasons to the petitioner and the government.
Rule 42. Failure to Comply. If a recipient fails to comply with an order affirmed under 50
U.S.C. § 1861(f), the government may file a motion seeking immediate enforcement ofthe
affirmed order. The Court may consider the government's motion without receiving additional
submissions or convening further proceedings on the matter.
Rule 43. In Camera Review. Pursuant to 50 U.S.C. § 1803(e)(2), the Court must review a
petition under 50 U .S.C. § 1861 (f) and conduct related proceedings in camera.
Rule 44. Appeal. Pursuant to 50 U.S.C. § 1861(f)(3) and subject to Rules 54 through 59 of
these Rules, the government or the petitioner may petition the Court of Review to review the
Judge's ruling.
Title VIII. En Bane Proceedings
Rule 45. Standard for Hearing or Rehearing En Bane. Pursuant to 50 U.S.C.
§ 1803(a)(2)(A), the Court may order a hearing or rehearing en bane only if it is necessary to
secure or maintain uniformity of the Court's decisions, or the proceeding involves a question of
exceptional importance.
Rule 46. Initial Hearing En Bane on Request of a Party. The government in any proceeding,
orapartyinaproceedingunder50U.S.C. § 1861(f)or50U.S.C. § 1881a(h)(4)-(5),mayrequest
that the matter be entertained from the outset by the full Court. However, initial hearings en bane
are extraordinary and will be ordered only when a majority of the Judges determines that a matter
is of such immediate and extraordinary importance that initial consideration by the en bane Court
is necessary, and en bane review is feasible in light of applicable time constraints on Court
action.
Rule 47. Rehearing En Bane on Petition by a Party.
(a) Timing of Petition and Response. A party may file a petition for rehearing en bane
permitted under 50 U.S.C. § 1803(a)(2) no later than 30 days after the challenged order or
decision is entered. In an adversarial proceeding in which a petition for rehearing en bane
is permitted under§ 1803(a)(2), a party must file a response to the petition within 14 days
after filing and service of the petition.
(b) Length of Petition and Response. Unless the Court directs otherwise, a petition for
rehearing en bane and a response to a petition for rehearing en bane each must not exceed
15 pages, including any attachments (other than the challenged order or decision).
-12l
t
i
l
l
Rule 48. Circulation of En Bane Petitions and Responses. The Clerk must, after consulting
with the Presiding Judge and in a manner consistent with applicable security requirements,
promptly provide a copy of any timely-filed en bane petition permitted under 50 U.S.C.
§ 1803{a)(2), and any timely-filed response thereto, to each Judge.
Rule 49. Court-Initiated En Bane Proceedings. A Judge to whom a matter has been presented
may request that all Judges be polled with respect to whether the matter should be considered or
reconsidered en bane. On a Judge's request, the Clerk must, after consulting with the Presiding
Judge and in a manner consistent with applicable security requirements, promptly provide notice
of the request, along with a copy of pertinent materials, to every Judge.
Rule 50. Polling.
(a) Deadline for Vote. The Presiding Judge must set a deadline for the Judges to submit
their vote to the Clerk on whether to grant a hearing or rehearing en bane. The deadline
must be communicated to all Judges at the time the petition or polling request is
circulated.
(b) Vote on Stay. In the case of rehearing en bane, the Presiding Judge may request that
all Judges also vote on whether and to what extent the challenged order or ruling should
be stayed or remain in effect if rehearing en bane is granted, pending a decision by the en
bane Court on the merits.
Rule 51. Stay Pending En Bane Review.
(a) Stay or Modifying Order. In accordance with 50 U.S.C. §§ 1803(a)(2){B) and
1803{f), the Court en bane may enter a stay or modifying order while en bane
proceedings are pending.
(b) Statement of Position Regarding Continued Eft'ect of Challenged Order. A
petition for rehearing en bane and any response to the petition each must include a
statement of the party's position as to whether and to what extent the challenged order
should remain in effect if rehearing en bane is granted, pending a decision by the en bane
Court on the merits.
Rule 51. Supplemental Briefing. Upon ordering hearing or rehearing en bane, the Court may
require the submission of supplemental briefs.
Rule 53. Order Granting or Denying En Bane Review.
(a) Entry of Order. If a majority of the Judges votes within the time allotted for polling
that a matter be considered en bane, the Presiding Judge must direct the Clerk to enter an
order granting en bane review. If a majority of the Judges does not vote to grant hearing
or rehearing en bane within the time allotted for polling, the Presiding Judge must direct
the Clerk to enter an order denying en bane review.
(b) Other Issues. The Presiding Judge may set the time of an en bane hearing and the
time and scope of any supplemental hearing in the order granting en bane review. The
-13-
order may also address whether and to what extent the challenged order or ruling will be
stayed or remain in effect pending a decision by the en bane Court on the merits.
Title IX. Appeals
Rule 54. How Taken. An appeal to the Court of Review, as pennitted by law, may be taken by
filing a petition for review with the Clerk.
Rule 55. When Taken.
(a) Generally. Except as the Act provides otherwise, a party must file a petition for
review no later than 30 days after entry of the decision or order as to which review is
sought.
(b) Effect of En Bane Proceedings. Following the timely submission of a petition for
rehearing en bane pennitted under 50 U.S.C. § 1803(a)(2) or the grant of rehearing en
bane on the Court's own initiative, the time otherwise allowed for taking an appeal runs
from the date on which such petition is denied or dismissed or, if en bane review is
granted, from the date of the decision of the en bane Court on the merits.
Rule 56. Stay Pending Appeal. In accordance with 50 U.S.C. § 1803(f), the Court may enter a
stay of an order or an order modifying an order while an appeal is pending.
Rule 57. Motion to Transmit the Record. Together with the petition for review, the party
filing the appeal must also file a motion to transmit the record to the Court of Review.
Rule 58. Transmitting the Record. The Clerk must arrange to transmit the record under seal to
the Court of Review as expeditiously as possible, no later than 30 days after an appeal has been
filed. The Clerk must include a copy of the Court's statement of reasons for the decision or order
appealed from as part of the record on appeal.
Rule 59. Oral Notification to the Court of Review. The Clerk must orally notify the Presiding
Judge of the Court of Review promptly upon the filing of a petition for review.
Title X. Administrative Provisions
Rule 60. Duties of the Clerk.
(a) General Duties. The Clerk supports the work of the Court consistent with the
directives of the Presiding Judge. The Presiding Judge may authorize the Clerk to
delegate duties to staff in the Clerk's office or other designated individuals.
(b) Maintenance of Court Records. The Clerk:
(1) maintains the Court's docket and records- including records and recordings
of proceedings before the Court - and the seal of the Court;
-14f
f
I
.,
(2) accepts papers for filing;
(3) keeps all records, pleadings, and files in a secure location, making those
materials available only to persons authorized to have access to them; and
(4) performs any other duties, consistent with the usual powers of a Clerk of
Court, as the Presiding Judge may authorize.
Rule 61. Offiee Hours. Although the Court is always open, the regular business hours of the
Clerk's Office are 9:00a.m. to 5:00p.m. daily except Saturdays, Sundays, and legal holidays.
Except when the government submits an application following an emergency authorization, or
when the Court otherwise directs, any filing outside these hours will be recorded as received at
the start of the next business day.
Rule 62. Release of Court Records.
(a) Publication of Opinions. The Judge who authored an order, opinion, or other
decision may sua sponte or on motion by a party request that it be published. Upon such
request, the Presiding Judge, after consulting with other Judges of the Court, may direct
that an order, opinion or other decision be published. Before publication, the Court may,
as appropriate, direct the Executive Branch to review the order, opinion, or other decision
and redact it as necessary to ensure that properly classified information is appropriately
protected pursuant to Executive Order 13526 (or its successor).
(b) Other Records. Except when an order, opinion, or other decision is published or
provided to a party upon issuance, the Clerk may not release it, or other related record,
without a Court order. Such records must be released in conformance with the security
measures referenced in Rule 3.
(e) Provision of Court Records to Congress.
(1) By the Government. The government may provide copies of Court orders,
opinions, decisions, or other Court records, to Congress, pursuant to 50 U.S.C.
§§ 187l(a)(5), l871(c), or 188U{b)(l)(D), or any other statutory requirement,
without prior motion to and order by the Court. The government, however, must
contemporaneously notify the Court in writing whenever it provides copies of
Court records to Congress and must include in the notice a list of the documents
provided.
(2) By the Court. The Presiding Judge may provide copies of Court orders,
opinions, decisions, or other Court records to Congress. Such disclosures must be
made in conformance with the security measures referenced in Rule 3.
Rule 63. Practice Before Court. An attorney may appear on a matter with the permission of
the Judge before whom the matter is pending. An attorney who appears before the Court must be
a licensed attorney and a member, in good standing, of the bar of a United States district or
circuit court, except that an attorney who is employed by and represents the United States or any
of its agencies in a matter before the Court may appear before the Court regardless of federal bar
membership. All attorneys appearing before the Court must have the appropriate security
clearance.
Exhibit 19
Exhibit 20
Exhibit 21
TOP SECRET//COMINT//NOFORN
UNITED STATES GOVERNMENT
Memorandum
OC-034-12
DATE:
3 May 2012
REPLY TO
ATTN OF:
SID Oversight & Compliance
SUBJECT:
(U//FOUO) NSAW SID Intelligence Oversight (IO) Quarterly Report – First Quarter Calendar
Year 2012 (1 January – 31 March 2012) – EXECUTIVE SUMMARY
TO:
SIGINT Director
I.
(U) Overview
(U//FOUO) The attached NSAW SID Intelligence Oversight (IO) Quarterly Report for the First Quarter
Calendar Year 2012 (1 January – 31 March 2012) identifies NSAW SID compliance with E.O. 12333, DoD
Regulation 5240.1-R, NSA/CSS Policy 1-23, USSID SP0018, and all related policies and regulations.
(U//FOUO) Detailed incident narratives are provided in the attached annexes. The number of incidents in
each category and a reference to the annex related to each incident category are contained in the body of the
report.
(U//FOUO) As part of SID Oversight and Compliance’s (SV) charge to provide comprehensive trends and
analysis information as it pertains to incidents of non-compliance, this Executive Summary provides analysis
and evaluation of incidents reported throughout the current quarter to better address the “whys” and “hows”
behind NSAW SID’s compliance posture.
(U//FOUO) Section II, Metrics, has been broken down into several sub-sections: metrics and analysis of
NSAW SID-reported incidents by authority, type, root cause, and organization. Also included is an assessment
of how incidents were discovered (i.e., methods of discovery) for SID-reported incidents (see Figure 7).
(U//FOUO) Significant Incidents of Non-compliance and Report Content follow in Sections III and IV,
respectively.
(S//REL) Overall, the number of incidents reported during 1QCY12 increased by 11% as compared to the
number of incidents reported during 4QCY11. This included a rise in the number of E.O. 12333 incidents, as
well as for incidents across all FISA authorities. The majority of incidents in all authorities were database
query incidents due to human error. Of note, S2 continued to be the NSAW SID organization with the largest
number of reported incidents (89%), although S2 experienced an overall decrease in reported incidents. SV
noted an overall improvement in timeliness regarding 1QCY12 IO Quarterly Report submissions from the SID
elements.
Page 1 of 13
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
II.
(U) Metrics
a. (U//FOUO) NSAW SID-reported Incidents by Authority
(TS//SI//REL TO USA, FVEY) Figures 1a-b compares all categories of NSAW SID-reported incidents
(collection, dissemination, unauthorized access, and retention) by Authority for 2QCY11 – 1QCY12. From
4QCY11 to 1QCY12, there was an overall increase in incidents of 11%. There was also an increase of 11% for
both E.O. 12333 and FISA incidents. The increase in incidents reported for 1QCY12 was due to an increase in
the number of reported Global System for Mobile Communications (GSM) roamer 1 incidents, which may be
attributed to an increase in Chinese travel to visit friends and family for the Chinese Lunar New Year holiday.
(U//FOUO) Figure 1a: Table of the Number of NSAW SID-reported Incidents by Authority
(U//FOUO)
E.O. 12333
FISA
TOTAL
2QCY11
396
150
546
3QCY11
390
198
588
4QCY11
601
176
777
1QCY12
670
195
865
(U//FOUO)
(U//FOUO) Figure 1b: Line Graph of the Number of NSAW SID-reported Incidents by Authority
U//FOUO
800
Number of Incidents
700
600
500
400
E.O. 12333
300
FISA
200
100
0
2QCY11
3QCY11
4QCY11
1QCY12
Quarter
U//FOUO
(TS//SI//NF) FISA Incidents: As reflected in Figures 1a-b, during 1QCY12, NSAW SID reported a total
of 195 FISA incidents, 185 of which were associated with unintentional collection. NSAW SID also reported 6
incidents of unintentional dissemination under FISA authority and 4 incidents of unauthorized access to Raw
1
(U//FOUO) Roaming incidents occur when a selector associated with a valid foreign target becomes active in the U.S.
Page 2 of 13
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
SIGINT FISA data. Figure 2 illustrates the most common root causes for incidents involving FISA authorities
as determined by SV.
•
63% (123) of 1QCY12 FISA incidents can be attributed to Operator Error as the root cause, and
involved:
o Resources ( i.e., inaccurate or insufficient research information and/or workload issues (60);
o Lack of due diligence (i.e., failure to follow standard operating procedures) (39);
o Human error (21) which encompassed:
Broad syntax (i.e., no or insufficient limiters / defeats / parameters) (12);
Typographical error (6);
Query technique understood but not applied (2); and
Incorrect option selected in tool (1); and
o Training and guidance (i.e., training issues) (3).
(U//FOUO) The Resources root cause category accounted for the largest percentage of Operator Error
incidents under FISA authorities for 1QCY12. Analysis identified that these incidents could be reduced if
analysts had more complete and consistent information available about selectors and/or targets at the time of
tasking and if analysts consistently applied rules for conducting queries.
•
37% (72) of 1QCY12 FISA incidents can be attributed to System Error as the root cause, and
involved:
o System limitations (i.e., system lacks the capability to ‘push’ real-time travel data out to
analysts, system/device unable to detect changes in user) (67);
o System engineering (i.e., system/database developed without the appropriate oversight
measures, data flow issues, etc.) (4); and,
o System disruptions (i.e., glitches, bugs, etc.) (1).
(U//FOUO) The System Limitations root cause category accounted for the largest percentage of System
Error incidents under FISA authorities for 1QCY12. The largest number of incidents in the System Limitations
category account for roamers where there was no previous indications of the planned travel. These incidents are
largely unpreventable. Consistent discovery through the Visitor Location Register (VLR) occurs every quarter
and provides analysts with timely information to place selectors into candidate status or detask. Analysis
identified that these incidents could be reduced if analysts removed/detasked selectors more quickly upon
learning that the status of the selector had changed and more regularly monitored target activity. This analysis
indicates that continued research on ways to exploit new technologies and researching the various aspects of
personal communications systems to include GSM, are an important step for NSA analysts to track the travel of
valid foreign targets.
Page 3 of 13
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
(U//FOUO) Figure 2: 1QCY12 FISA Incidents – Root Causes
U//FOUO
11%
Operator | Human Error (21)
20%
Operator | Due Diligence (39)
Operator | Resources (60)
Operator | Training (3)
34%
31%
System | Disruptions (1)
System | Engineering (4)
2%
System | Limitations (67)
2%
U//FOUO
Total: 195
(TS//SI//REL TO USA, FVEY) Delayed Detasking FISA Incidents: As reflected in Figures 1a-b, during
1QCY12, NSAW SID reported a total of 195 FISA incidents. 19 (10%) of the total FISA incidents were
associated with detasking delays. Of the 19 delayed detasking incidents, 12 (63%) of these incidents occurred
under NSA FISA Authority, 5 (27%) occurred under FAA 702 Authority, 1(5%) occurred under FAA 704
Authority, and 1 (5%) occurred under FAA 705(b) Authority. Figure 3a illustrates the detasking delay incidents
versus all other FISA incidents reported during 1QCY12. Figure 3b illustrates the detasking delay incidents by
FISA Authority reported during 1QCY12.
(U//FOUO) Figure 3a: 1QCY12 Detasking FISA
Incidents vs. All other FISA incidents
(U//FOUO) Figure 3b: 1QCY12 FISA Incidents
by Authority – Delayed Detaskings
U//FOUO
U//FOUO
5% 5%
10%
NSA Establishment FISA
(12)
FAA 702 (5)
Delayed Detasking (19)
27%
90%
Other Incidents (176)
63%
FAA 704 (1)
FAA 705(b) (1)
Total: 19
Total: 195
U//FOUO
U//FOUO
Page 4 of 13
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
(TS//SI//REL TO USA, FVEY) As depicted in Figures 3a and 3b, of the 19 delayed detasking FISA
incidents, 15 (79%) resulted from a failure to detask all selectors, 2 (11%) resulted from analyst not detasking
when required, 1 (5%) resulted from partner agency error, and 1 (5%) resulted from all tasking not terminated
(e.g., dual route).
b. NSAW SID-reported Collection Incidents by Sub-Type and Authority
(U//FOUO) Figures 4a-b depicts NSAW SID-reported collection incidents by Authority (E.O. 12333 and
all FISA Authorities), and identifies the primary sub-types for those incidents. An explanation of the more
prominent collection incident sub-types follows the graphs.
(U//FOUO) Figure 4a: NSAW SID-reported Collection Incidents Under E.O. 12333 Authority
U//FOUO 582
600
491
500
2QCY11
3QCY11
4QCY11
1QCY12
400
300 251 262
200
100
4 1 5 1
2 1 3 0
No FISC/AG
Auth
Computer
Network
Exploitation
(CNE)
74 53 70 97
9 6 2 2 18 26 23 22 14 16 7 27 2 4 0 5
0
Roamers
Database
Queries
Task/Detask
Delays/Errors
USP
Transit
Program*
Other
Inadvertent
U//FOUO
(U//FOUO) Figure 4a: During 1QCY12, NSAW SID reported a 39% increase of database query incidents
under E.O. 12333 Authority. Human Error accounted for 74% of E.O.12333 database query incidents.
(TS//SI//REL TO USA, FVEY) International Transit Switch Collection*: International Transit switches,
FAIRVIEW (US-990), STORMBREW (US-983), ORANGEBLOSSOM (US-3251), and SILVERZEPHYR
(US-3273), are Special Source Operations (SSO) programs authorized to collect cable transit traffic passing
through U.S. gateways with both ends of the communication being foreign. When collection occurs with one or
both communicants inside the U.S., this constitutes inadvertent collection. From 4QCY11 to 1QCY12, there was an
increase of transit program incidents submitted from 7 to 27, due to the change in our methodology for reporting and
counting of these types of incidents. (*See Annex G in SID’s 1QCY12 IO Quarterly Report for additional details
regarding these incidents.)
Page 5 of 13
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
(U//FOUO) Figure 4b: NSAW SID-reported Collection Incidents Under
All FISA Authorities
U//FOUO
100
90
80
70
60
50
40
30
20
10
0
2QCY11
81
87
3QCY11
4QCY11
1QCY12
95
69
55
49
54
36
18
1
Roamers
0
0
0
No FISC/AG
Auth
2
0
0
0
Computer
Network
Exploitation
(CNE)
7
7
5
Database Queries
5
12
18
Task/Detask
Delays/Errors
19
17
0
2
1
USP
Other Inadvertent
U//FOUO
(U//FOUO) Figure 4b: During 1QCY12, NSAW SID reported an increase of 9% of roamer incidents under
all FISA Authorities. There was also a 260% increase in database query FISA Authority incidents during
1QCY12. Human Error accounted for the majority of all FISA Authorities database query incidents (74%).
(U//FOUO) Roamers: Roaming incidents occur when valid foreign target selector(s) are active in the U.S.
Roamer incidents continue to constitute the largest category of collection incidents across E.O. 12333 and FAA
authorities. Roamer incidents are largely unpreventable, even with good target awareness and traffic review,
since target travel activities are often unannounced and not easily predicted.
(S//SI//NF) Other Inadvertent Collection: Other inadvertent collection incidents account for situations
where targets were believed to be foreign but who later turn out to be U.S. persons and other incidents that do
not fit into the previously identified categories.
(TS//SI//REL TO USA, FVEY) Database Queries: During 1QCY12, NSAW SID reported a total of 115
database query incidents across all Authorities, representing a 53% increase from 4QCY11. E.O. 12333
Authority database query incidents accounted for 84% (97) of the total, and all FISA Authorities database query
incidents accounted for 16% (18).
(U//FOUO) Figure 5 illustrates the most common root causes for incidents involving database queries as
determined by SV.
•
99% (114) of the 1QCY12 database query incidents are attributed to Operator Error as the root
cause, and involved:
o Human error (85) which encompassed:
Broad syntax (i.e., no or insufficient limiters / defeats / parameters) (55);
Typographical error (17);
Boolean operator error (6);
Query technique understood but not applied (4);
Not familiar enough with the tool used for query (2); and
Page 6 of 13
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
Incorrect option selected in tool (1)
o Lack of due diligence (i.e., failure to follow standard operating procedure) (13)
o Training and guidance (i.e., training issues) (9); and
o Resources (i.e., inaccurate or insufficient research information and/or workload issues) (7).
(U//FOUO) The remaining 1 database query incident can be attributed to System Error as the root cause
and occurred due to a mechanical error with the tool.
(U//FOUO) Analysis identified that the number of database query incidents could be reduced if analysts
more consistently applied rules/standard operating procedures (SOPs) for conducting queries.
(S//SI//NF) Auditors continue to play an important role in the discovery of database query incidents,
identifying 70 (61%) of the 115 reported database query incidents.
(U//FOUO) Figure 5: 1QCY12 Database Query Incidents – Root Causes
1%
8%
6%
Operator | Human Error
(85)
Operator | Due Diligence (13)
11%
Operator | Resources
Operator | Training
74%
(7)
(9)
System | Disruptions
(1)
Total: 115
(TS//SI//REL TO USA, FVEY) Of the 115 database query incidents reported for 1QCY12, Figure 6 identifies
the database involved and the associated percentage of the total. Databases considered to be Source Systems of
Record (SSR) have been labeled as such.
(TS//SI//REL TO USA, FVEY) Note that the total number of databases involved in the database query
incidents in Figure 6 does not equal the number of database query incidents reflected in Figure 5 or in the
1QCY12 SID IO Quarterly Report because a database query incident may occur in more than one database.
Page 7 of 13
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
(U//FOUO) Figure 6: 1QCY11 Database Query Incidents – Database(s) Involved
U//FOUO
CLOUD/ABR
DISHFIRE
FASTSCOPE
MARINA (SSR)
OCTAVE
PINWALE (SSR)
SIGINT NAVIGATOR
TRACFIN
TRANSX
TUNINGFORK
UTT
XKEYSCORE
Unknown
1%
7%
20%
1%
13%
1%
3%
2%
2%
1%
20%
28%
1%
Total: 119
(8)
(16)
(1)
(24)
(1)
(34)
(1)
(2)
(2)
(4)
(1)
(24)
(1)
U//FOUO
(U//FOUO) NSAW SID-reported Incidents – Method of Discovery
(U//FOUO) Figure 7 depicts the most prominent method(s) of discovery for incidents reported by NSAW
SID elements for 1QCY12. As SV’s assessment of root causes matures, and as corrective measures are
implemented, identification of how incidents are discovered will provide additional insight into the
effectiveness of those methods.
(U//FOUO) Figure 7: 1QCY12 Incidents – How Discovered
U//FOUO
553
600
500
400
300
200
100
83
0
36
77
7
1
6
12
10
67
5
3
2
3
0
Total: 865
U//FOUO
Page 8 of 13
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
(U//FOUO) For 1QCY12, of the 865 reported incidents, 553 (64%) were discovered by automated alert.
444, (80%) of the 553 incidents that were discovered by automated alert occurred via the VLR and other
analytic tools, such as SPYDER, CHALKFUN, and TransX.
c. (U//FOUO) NSAW SID-reported Incidents by Organization
(U//FOUO) Figure 8 illustrates the total 1QCY12 NSAW SID-reported incidents by primary SID Deputy
Directorate (DD) level organization. S2, having the largest NSAW SID contingent of reported incidents,
accounted for 89% of the total incidents for the quarter, a proportion consistent with the overall size of the S2
organization. As compared to 4QCY11, S2 experienced an overall 8% reduction in incidents occurrences.
(U//FOUO) Figure 8: 1QCY12 Incidents by NSAW SID Organization
U//FOUO
2%
2%
7%
S1
1
S2 772
S3 56
F74 MOC 4
SSG 14
ST
89%
1
2nd Party /Various 17
Total: 865
U//FOUO
(U//FOUO) Figure 9 provides a look into S2 (by Product Line) as the NSAW SID organization with the
largest number of reported incidents. For 1QCY12, three Product Lines accounted for 72% of S2’s reported
incidents. These Product Lines were: the and Korea Division (S2B) with 28% of the reported incidents, the
International Security Issues Division (S2C) with 23% of the reported incidents, and the China, and the Office
of Middle East & Africa (S2E) with 21% of the incidents. As compared to 4QCY11, this resulted in an increase
of 16% for S2B, a reduction of 35% for S2C, and an increase of 9% for S2E. The number of incidents reported
by the remaining seven Product Lines held relatively steady from 4QCY11 to 1QCY12.
Page 9 of 13
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
(U//FOUO) Figure 9: 1QCY12 S2 Incidents by Product Line
(U//FOUO)
4%
S2A
S2G
29
60
S2J
Total: 772
25
S2H
23%
17
S2I
8%
159
S2F
21%
61
S2E
28%
174
S2D
8%
2%
213
S2C
3%
32
S2B
4%
2
(U//FOUO)
(U//FOUO) Figures 10a-b illustrates the operator related (Figure 10a) and system related (Figure 10b)
root causes associated with the 772 incidents reported by S2. 30% of the incidents were due to operator related
errors that resulted in an incident. 70% of the incidents were due to system related issues that resulted in an
incident.
(U//FOUO) Figure 10a: 1QCY12 S2 Incidents – Operator Related Root Causes
(U//FOUO)
4%
1%
Human Error 71
Information Resources 80
31%
30%
29%
Lack of Due Diligence 68
70%
35%
Personnel Resources 2
Training&Guidance 9
Total: 230
(U//FOUO)
(U//FOUO) 30% of the S2-reported incidents during 1QCY12 are attributed to Operator Error as the root
cause, and involved:
•
Resources (i.e., inaccurate or insufficient research information and/or workload issues, and
personnel resource issues) (82);
Page 10 of 13
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
•
•
•
Human error (i.e., selector mistypes, incorrect realm, or improper query) (71);
Lack of due diligence (i.e., failure to follow standard operating procedures) (68); and
Training and guidance (i.e., training issues) (9).
(U//FOUO) Analysis found that analysts could reduce the number of incidents if there was more
comprehensive research information available at the time of tasking as well as through better use of defeats,
more careful review of data entry to avoid typographical errors and omissions, and by following SOPs more
consistently.
(U//FOUO) Figure 10b: 1QCY12 S2 Incidents – System Related Root Causes
(U//FOUO)
< 1%
System Engineering 1
System Limitations 541
30%
70%
99%
Total: 542
(U//FOUO)
(U//FOUO) 70% of the S2-reported incidents during 1QCY12 are attributed to system issues as the root
cause, and involved:
• System limitations (i.e., system lacks the capability to ‘push’ real-time travel data out to analysts,
system/device unable to detect changes in user) (541); and
• System engineering (i.e., data tagging, configuration, design flaws, etc.) (1).
(TS//SI//REL TO USA, FVEY) System Limitations, the largest percentage of System Error root cause, can
be attributed to situations where a valid foreign target is found roaming in the United States without indication
in raw traffic.
III.
(U) Significant Incidents of Non-compliance
(TS//SI//NF) Business Record (BR) FISA. As of 16 February 2012, NSA determined that approximately
3,032 files containing call detail records potentially collected pursuant to prior BR Orders were retained on a
server and been collected more than five years ago in violation of the 5-year retention period established for
BR collection. Specifically, these files were retained on a server used by technical personnel working with
the Business Records metadata to maintain documentation of provider feed data formats and performed
background analysis to document why certain contain chaining rules were created. In addition to the BR
Page 11 of 13
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
work, this server also contains information related to the STELLAR WIND program and files which do not
appear to be related to e ither of these programs. NSA bases its determination that these files may be in
violation of docket number BR 11-191 because of the type of information contained in the files (i.e., call
detail records), the access to the server by technical personnel who worked with the BR metadata, and the
listed "creation date" for the files. It is possible that these fi les contain STELLARWIND data, despite the
creation date. T he STELL ARWIND data could have been copied to this server, and that process could have
changed the creation date to a timeframe that appears to indicate that they may contain BR metadata.
Additional details regarding this incident can be found in the "Bulk Metadata FISA" Annex, ANNEX R
(Item Rl ) in SID's 1QCY12 10 Qua1terly Report.
(S//SI//REL TO USA, FVEY) Detasking De lay. Four sel
ned active after multiple
2012, a South Asia Language
indications were received that the target he ld a U.S.
Analysis Branch (S2A51) senior linguist was
selectors for OCfAVE
migration when it was discovered that the tasking record
that there were four selectors
that were in active status even though his tasking file indicated he held a U.S. g reen card as of03
October 20 I I. On 09 March 2012, the S2A51 senior linguist de tasked the four selectors, and on 13 March
2012, the S2A51 senior linguist requested the 881 c uts in
from those four
selectors be purged. On 13 March 2012, a senior
Branch
(S2A52) researched S2A52's locally held file of
that an S2A52 analyst had indications in intercept on 09 September 201
·ght have a U.S.
green card. It was also recorded in the
fi
S2A52 had s ubmitted a request to the
.B., the date of the S2A52 request to DHS was
Department of Homeland Security
not recorded) and learned from DHS on 28 September 2011 that Qw-eshi had obtained a U.S. green card as
ol
10. The
·
Y and discovered that S2A52 had
On 14 March 2012, S2A5 submitted a
con1taiJ the name of
t1ed
Customer Relationships,
Information Sharing Services Branch (S12) approved ISS/BDA-068-12 on 16 March 2012. Serialized
dissemination of U.S. person information did occur. On 13 March 2012, the S2A51 senior linguist who
ad not been detasked reminded the other two me mbers of the
found that these num
Governmental Unified Targe tin g Tool (UTT) Group for S2A5 to check all S2A5 databases for
officials who have U.S. (and Second Pmty person) status before submitting selectors for tasking. Additional
details regarding th is incident can be found in the Unintentional Collection under E.O. 12333 Authority
Annex, "Collection as a Result of Tasking En-ors or De tasking Delays", ANNEX E (Item El) and in the
"Unin tentional Dissemination of U.S. Person Information Collected Under E.O. 12333, FISA, and FAA
Authorities", Annex M (Item M15) in SID's 1QCYI 2 1 Quarterly Report.
0
(C// REL TO USA, FVEY) Unaut horized Access. On 29 December 2011, a Cryptanalysis a nd Exploitation
(CES)/Office of Target Pursuit (S31174) Branch Chief discovered that CES personnel had likely been
inappropriate ly granted access to NSA Establis hment FTSA data. Multiple external factors contributed to this
situation. First, in 2002, RAGTIME was changed to encompass both NSA Establishment FISA a nd FBI FTSA,
but due to insufficient notice regm·ding this modification, CES continued to apply the earlier rule that
RAGTIME applied only to NSA Establishment FISA data. Second, CES relied on the RAGTIME label in
CASPORT for granting access to NSA Establishment FISA data but discovered that CASPORT does not
accurately retlect NSA Establishment FTSA briefing status. Third, CASPORT often lists NSA-FTSA in the
Page 12of 13
TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
"Oversight" section even though this has nothing to do with a particular user's access. CES has alerted its
workforce to look in the CASPORT "Briefing" section for the NSA Establishment FISA entry and CEScontrolled software is being updated regarding data access control. Additional details regarding this incident
can be found in the "Unauthorized Access to Raw SIGINT" Annex, ANNEX P (Item P2) in SID's lQCY 1210
Quarterly Report.
(U) Report Content
•
Upcoming Initiatives
(U//FOUO) During CY 12, SV plans to develop 'score cards' to capture and illustrate an organization 's
rep01ted quarterly activities. SV plans to use this information during scheduled feedback sessions with SID
repo1ting organizations to provide a detailed view into specific areas of high interest or concern arising from
analyzing 10 Quarterly Report metrics.
•
NSAW SID 1QCY12 IOQ Report Challenges:
(U//FOUO) SV noted an overall improvement in timeliness regarding l QCY 12 10 Quarterly Repo1t
submissions from the STD elements. SV received late submissions from STGDEV Strategy & Governance
(SSG) and SID/Deputy Directorate for Data Acquisition (S3), delaying SV's preparation of the NSAW SID TO
Quarterly Report. SV will continue to focus on outreach with SSG and S3 in order to ensure more complete
and timely report s ubmissions.
Page 13 of 13
TOP SECRET//COMINT//NOFORN
All redacted
information exempt
under (b)(1) and (b)(3)
except as otherwise
noted.
TOP SECRET//COMINT//NOFORN
('f'8//Sl/flfP) In response to the Government's compliance notice, on
28 January 2009, the Court directed the Government to file a brief and
supporting documentation describing how the compliance and misreporting
incidents occurred so the Court can determine what remedial action, if any, is
warranted. Since the Court was aware that there are similarities between
NSA's processing of telephony metadata and electronic communications
metadata under separate orders, the Court also directed the Goven1ment to
determine whether NSA bas been processing the electronic communications
metadata in accordance with the terms of the Court's orders for this category
of material. As part of this review, the Government concluded that NSA was
processing the electronjc communications metadata in accordance with the
terms of the Court's orders, with one exception. The review identified one
particular process that the Government concluded was not in conformity with
the Court's order. NSA had employed the process in a small number of cases
to approve queries against the electronic communications metadata.
Although the Agency had previously reported the process to the Court
this process, too, has been discontinued.
I
-fS7 NSA and DoJ have already identified a number of steps designed
to improve the Agency's ability to comply with the relevant orders and
implementation of these changes has begun. Also, in addition to notifying
the Court, the Government has notified a number of senior Executive Branch
officials about these compliance matters. Officials who have received such
notification include the President's Intelligence Oversight Board, the Director
of National Intelligence, NSA's Inspector General, and the Under Secretary
of Defense for Intelligence. My office is also prepared to brief the Committee
on these matters at the Committee's convenience.
(U) Should you have any questions, lease contact Jonathan E. Miller,
Associate Director of Legislative Affairs, at
vrl!.;c!~
General Counsel
Copy Furnished:
Minority Staff Director, House Permanent
Select Committee on Intelligence
2
'f'OP SECRE'f'7'/COMUft'/fl~OFOIDq=
(fS//SV/NF) FAA Certification Renewals With Caveats
2011-10-12 0850
(fS//Sl//NF) The FISA Comt signed the 20 11 FAA Certifications on 3 Oct 2011 -these
are valid until 2 Oct 2012, pennitting SSO FAA-authorized accesses to continue
operations. However, in the 80-page opinion, the judge ordered certain "upstream" or
"passive" FAA DNI collection to cease after 30 days, unless NSA implements solutions
to conect all deficiencies identified in the opinion document. PRISM operations are not
affected by these caveats. All PRISM providers, except Yal10o and Google, were
successfully transitioned to the new Certifications. We e>..'}Ject Yal10o and Google to
complete transitioning by F1iday 6 Oct. Regarding the non-PRISM FAA collection
programs, the Comt cited targeting and minimization procedures related to collection of
Multiple Conununications Transactions as "deficient on statut01y and constitutional
grotmds." SSO, Teclmology Directorate, OGC, and other organizations are coordinating a
response, which includes plruming to implement a conse1vative solution in which the
higher-risk collection will be sequestered. It is possible that this higher risk collection
contains much of the non-duplicative FAA collection resulting in FAA repo1ting from
upstream accesses. This solution is designed to comply with the judge's order; however,
the judge will have to dete1mine if it does. If the solution is installed, SSO will then work
with OPis and OGC to modify the solution over time such that the filte1ing process will
be optimized to pennit more valid collection to be processed and f01warded to OPis.
Finally, in parallel with these efforts, the OGC is contemplating filing an appeal to the
ruling.
I'IA I NAL C,~
1-(
( E NTRA SE '- URIT
'w
25 June 20l3
The Honorable Ron Wyden
United States Senate
221 Dirksen Senate Office Building
Washington, DC 20510
The Honorable Mark Udall
United States Senate
328 Hart Senate Office Building
Washington, DC 2051 0
Dear Senators Wyden and Udall:
Thank you for your letter dated 24 June 2013. After reviewing your letter, I agree that
the fact sheet that the National Security Agency posted on its website on 18 June 2013 could
have more precisely described the requirements for collection under Section 702 of the FISA
Amendments Act. This statute allows for "the targeting of persons reasonably believed to be
located outside the United States to acquire foreign intelligence information." 50 U.S.C.
188 J(a). The statute provides several express limitations, namely that such acquisition:
(1)
may not intentionally target any person known at the time of acquisition to be located
in the United States;
(2)
may not intentionally target a person reasonably believed to be located outside the
United States if the purpose of such acquisition is to target a particular, known person
reasonably beHeved to be in the United States;
(3)
may not intentionally target a United States person reasonably believed to be located
outside the United States;
(4)
may not intentionaiJy acquire any communication as to which the sender and all
intended recipients are known at the time of acqu1sition to be located in the United
States; and
(5)
shall be conducted in a manner consistent with the fourth amendment to the
Constitution of the United States. 50 U.S.C. 1881(b).
With respect to the second point raised in your 24 June 2013 letter, the fact sheet did not
imply nor was it intended to imply "that NSA has the ability to determine how many American
communications it has collected under section 702, or that the law does not allow the NSA to
deliberately search for the records of particular Americans.,. As you correctly state, this point
has been addressed publicly. 1 refer you to unclassified correspondence from the Director of
National Intelligence dated 26 July 2012 and 24 August 2012.
NSA continues to support the effort Jed by the Office of the Director of National
Intelligence and the Department of Justice to make publicly available as much information as
possible about recently disclosed intelligence programs, consistent with the need to protect
national security and sensitive sources and methods.
£;t~oe
General; U.S. Army
Director, N SNChief, CSS
Copies Furnished:
The Honorable Dianne Feinstein
Chairman, Select Committee on Intelligence
The Honorable Saxby Chambliss
Vice Chairman, Select Committee on IntelJigencc
11/13/13
Grassley Presses for Details about Intentional Abuse of NSA Authorities
Article
For Immediate Release
August 28, 2013
Grassley Presses for Details about Intentional Abuse of NSA Authorities
WASHINGTON – Senator Chuck Grassley, Ranking Member of the Senate Judiciary Committee,
is asking the Inspector General of the National Security Agency (NSA) to provide additional
information about the intentional and willful misuse of surveillance authorities by NSA employees.
He’s also asking for the Inspector General to provide as much unclassified information as possible.
The Senate Judiciary Committee has oversight jurisdiction over the Foreign Intelligence Surveillance
Act (FISA) and the intelligence courts that fall under the act’s authority.
“The American people are questioning the NSA and the FISA court system. Accountability for
those who intentionally abused surveillance authorities and greater transparency can help rebuild that
trust and ensure that both national security and the Constitution are protected,” Grassley said.
The text of Grassley’s letter is below.
August 27, 2013
Dr. George Ellard, Inspector General
National Security Agency
Office of the Inspector General
9800 Savage Road, Suite 6247
Fort Meade, MD 20755
Dear Dr. Ellard:
I write in response to media reports that your office has documented instances in which NSA
personnel intentionally and willfully abused their surveillance authorities.
For each of these instances, I request that you provide the following information:
(1) The specific details of the conduct committed by the NSA employee;
(2) The job title and attendant duties and responsibilities of the NSA employee at the time;
(3) How the conduct was discovered by NSA management and/or your office;
(4) The law or other legal authority – whether it be a statute, executive order, or regulation – that
your office concluded was intentionally and willfully violated;
(5) The reasons your office concluded that the conduct was intentional and willful;
www.grassley.senate.gov/news/Article.cfm?RenderForPrint=1&customel_dataPageID_1502=46858
1/2
11/13/13
Grassley Presses for Details about Intentional Abuse of NSA Authorities
(6) The specifics of any internal administrative or disciplinary action that was taken against the
employee, including whether the employee was terminated; and
(7) Whether your office referred any of these instances for criminal prosecution, and if not, why
not?
Thank you for your prompt attention to this important request. I would appreciate a response by
September 11, 2013. I also request that you respond in an unclassified manner to the extent
possible.
Sincerely,
Charles E. Grassley
Ranking Member
cc: Honorable Patrick Leahy, Chairman
© 2008, Senator Grassley
www.grassley.senate.gov/news/Article.cfm?RenderForPrint=1&customel_dataPageID_1502=46858
2/2
TOP SECRET//Sl!/ORCONtiNOF
.. . ~ Hotmall'
G~..J il
.
.'' '
.
GoL~gle
.
"'-7.AHOOJ
~..~
'
(f$//S PRISM Tasking Process
VINF)
'~"~s
~.-...v
Target Analyst inputs selectors into
Unified Taraetina Tool IUm
Pendln
swvelllanc
52 FAA Adjudicators in Each Product line
TargeUng RevlewiYaUdatlon
scoted Comms
Special FISA Oversight and Processing
(SV4)
Stored comms RMew Noti PRISM
,. ,.. •
pa talk4'1!
Y
ouiim
t-"""'li :_] --·-· -mail ~
Collection Dataflow
.,
I
I
I
I
I
I
I
IIIII
t roce:ssing
I
I
: FAA
:r'artitions
:
TOP SECRET//SJI/ORCON/fNOFORN :
-------------------------------------~
TOP SECRET//Slt/ORCON/INOF
~~~
G.~.. .
1(
· · ··•
(TS//Sl/INF)
~ Hotmail"
Google
....YAEOOf • ~
~ paltalkfll
Younll'!'
II:W
mail /),
-·-- -~
t.:' \ , . -
AOL
PRISM Case Notations
P2ESQC120001234
.----T
PRISM Provider
P1: Microsoft
P2:Yahoo
P3: Google
P4 : Facebook
PS: PaiTalk
P6:YouTube
P7: Skype
PS: AOL
PA: Apple
I
1:~~_)
J,
L'
Fixed trigraph , denotes
PRISM source collection
c
__;
~
Year CASN established
for selector
~
I
Serial #
I
Content Type
L
)
A: Stored Comms (Search)
B: IM (chat)
.
C: RTN-EDC (real-time notification of an e-mail event such as a logon
or sent message)
O: RTN-IM (real-time notification of a chat login or logout event)
E: E-Mail
F:VoiP
G: Full (WebForum)
H: OSN Messaging (photos, wallposts, activity, etc.)
1 OSN Basic Subscriber Info
:
J: Videos
. (dol): Indicates multiple types
TOP SECRET//SII/ORCONl : 'OFORJ'-1
TOP SECRETttSVIORCON/INOt~ ~ Hotmall'
e M 1 liiliiiil
1
(TS//SV/NF)
Ccx'lgle
YA.Hoor
a
•
REPRISMFISA TIPS
COUNTERTERRORISM
REPRISMfiSA
~... \ 1 p~~~
\(k
.J.!!.U
U! .Oln." W': p) o!t • I wel,)~,.::tj
PRISN ENTRIES
'l ~··
...
~ ~~ter-bdo'w
~
• -(4- •
v... ,
I
""'1t o<
• Sfof,.. .... ~,
· ~<:;>!
t¥'1
e. M4n~f~::o u. .. 1:>~1-'olo ~ c1
. ..._ .,
...
'"""'""'""
' ' ' '"" t ()l.;> l((lo..• "'l · ~ ,.,..vcr. ,,..,.~ ' " ""' '"''
•
,.( PII ...Mtt'.,, '"'''''' "8. " ' " ""• f ·MAO
f
ll'lot fi( I'W,Mfi:.A f Uf> ("(;.....C.>\1
Prism Cun ent Entries
v
talk"'~
You lim
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?