3 Fl . .. July 2009 (U5) Preface (U) Title of the Foreign Intelligence-Surveillance :ACtrAmEndments Act of 2008 required the Inspectors General (res) of the elements of the IntelligenCe community that lparticipated in the Presidentfs.SurveillanCe Program (PSP) to 'conduct a cemprehensiVe-reView of the Pregram. The res of the-Department of JuStice the Department of Defense (DOD), the Central Intelligence Agency (CIA), the NatiOnal security Agency (NBA), and the Office of the Director of -National Intelligence (ODNI) participated in the review required uthr the Act. The Act required the IGs to submit a comprehensiVe report on the review to the Senate SeleCt Committee.on Intelligence, the Senate Committee on the Judiciary, the House Permanent Select.Committee on, Intelligence, and the House.Committee.on the Judiciary, I (U) ?Because many aspects of the PSP remain classified, .and_in order to provide the GengreSSiOHal committees the complete results of our review, we have prepared this .c1assified repOIt on the PSP. The repOrt is in three volumes: 9 ?Volume I summarizes the collective results of the review. 0' Velume II contains the individual reports prepared and isshed by'the.DoD, CIA, NBA, and ODNI IGS. 0 Volume contains the report prepared and issued by the IG. (U) The unclassified report on the PSP required by Title has been provided to the Congressional committees in a separately bound volume. Unclassified When Separated From Attachment - ed From: 1?52 Dated: 20 f3?! git. ang g' ?g i?p? I "a f? d? f3 95?: ?gw LJ?;me 1 unawn??i gum;x . -?lenn A. Fine. Gordon Heddell ?e Inspector.General Aeting;InspeCtor General Department-of Justice- Department Of Defense ;Vi??mwwg??gm? Gearge?Ethrd Acting InSpeetOr General Inspector General .Central Intelligence AgenCy Natienal Security Agency '1 4%;mMazerU Inap?c or General Office of the Director of National 1hte1lig?nce m?we?cewwe twh?j?x 1} (3 -D gem-gel .eigeur?te, out, (U) Table at Contents Ii-qnni'I-g' ?gauge-? (Mi?Stem ..-. .. THE PRESHDENTE SURVEELLANCE PROGRAM Nationaiseea my Agency. Countertertorism .Ettoirts Poor-to (unsung; n3. ?gunning! idea initiatiy Used Existing: Authorities to. Enhance Signals After ?the September 2091; Terrariet Attacks (U) Mega Explored @ptione taimpmve Sioux-ti"; Collection and Address tnteitigenoe Gaps on TerroriStzTarg?ets.? "6 (U): ampedimentsto SEGHNT 'Coiieption Againet?Termriet Targets Were: ieca53ed With. the White .HouSe ..-. .. i? (U) Authorization! of?tirne Presidi?entis aieiNT Activates Authorized Uhtterthe-Progjtam (AU): Content of the .Preeit?entiai Authorizations and] Department of JusticesCertitication asto Fotm and Legatity .9 (U) The Threat Assessment Memorandums Supporting Presidential Authorization of the Program .. 11 (U) Eariy Revisions to the Presidential Authorizations .. 111] (U) Bod @ftioe of [Legal] Counsel Memorandums 'Soppon'ting Legaltty ot the Program "1?12 EMPLEMENTATHQN OF THE SURVEBLLANGE ., 1U). NBA impiementati?on "116 "metaphor-1e Co?htehtl?ot?eottom and] Anaysie Ff Tetep?hony and] ?u um.- From the a . "2.11 NSA Menagerie? Structure?ahd ?vers?ght?tthe President's Surveillance Program (U) NSAMahegerneht Contro?s to Erasure Comp?ta?nCe With Presidera'ttenAuthorizationsm ofthe Program a ?'24 Access to the President?s Starveiflance Pregtam (Ll) Congressional! Erie?ngs don-the Program-m" ?12.6 Foreign ?n'te?ligenee SurveitlarrceCourt Brie?ngs onthe Program (U) FBI Participatton in the Pr?esidentsSurveiBlance Program ., (U): CIA Participation in the President's Surveillancde Program: ?.30 NCTC Participation in the President?s ?SurvetllencePI-ogrem .. 32. (U) The President's Surveillance Program and the Foreign ?htelligehce' Serve?itlahce Court .4333 (U) :DisCoVery Issues Associated With the President?s SUrveilIance Program ?35 (U) LEGAL OF THE SURVEELLANCE PROGRAM (2003 - 2004Over th re?ection? (U) A New Legal Basis for the Program Es Adopted .. Department of Justice Of?ciants Convey Concerns About the I Program to the White House .. 39 (Ll) con?ict etWeern the Departmeht'ot Justice and] the White House Over the Program .., ., White Hc?ause Counsel certifies Pres-identia? ust?c?e Cs urre'rr - Resrr'?mie?s on: Asce'sst?e- rh'ex?P'res?it??ent?s Survei'?l?ance I err Pessrsemrs [seesaw reserem- INTELLHGENCE ac?r .. ., Enterner??eraclata Correction Transiriorr fro. Operation Under-Has Authority .. :Depart'menr ofJusrice Notices ef-Gem?plliance anicients "53 a 3, 7 TelephonyM'eradara Ceiiecrmn Transrtien to I @p?eratienUnder?FHSA Aurhcrity .-. .i ?We-754!- . Content C'o?lectien Transiton ta Operatacr?a Under FESA IMAGTDF THE rr?EerENTs 9N . EFFQR-TS 60* (U) Seniorilnteii?ge'nCe Community OfficialsBellieveiThat the Presi?dent?ersuweillamce Program [Filled an Hinre?ligence Gap "641 (EU) iffi'wlt?y the Empact of the President?s Surveillance Program (U) Impact of the President?s Survei?iance Program an FBI Connterterrorism E?or?s r. "Bil (U) FEE Efforts to Assess the Va?ue ef'the Program .. 52 (U) FEE Judgmenra! Assessments of the Program "52; (U) ?m?pact of the President?s Servei??arrce Program err BEA Counterterrerism Operations (U) The 030A Did] Not Systematicar?y Assess the Effectiveness of the Program .-. .. ".63 (LB) Several] Factors Hinderedl CHA Ut?rizaricrr or the [Program 641: nlm'pacfofmh?vPresidem?s Surv?i?lan?e :i'535 (U) ??ou'mer?ermrism Operations :S?upported by the President?s I mmgr- Ill; nan! _fi\m (Ext _1 . 41.. GE CD 4 I (U) The: President?s. enWet??anee 'P'regramw tilt)? ne?areceuctmw j; i, j' ?lresponse to?f'the tartarist; attacks Q?fll. September 2001,0111 doctchet .2001, President. GeorgeSW. Bushiissned a Top Secret authorization to the Sieicretary-ofDefensc directing that the of the. National Seour-ity' Agency'ENSA)? be used ?to; detect-andj?prevent thither attacks in. the United-States. The Presidential. Anthorization stated?tliat- an eXtraordi'nary emergency taxi-sterlipeintitting theuse-o'felectronic surire?illance within the-United Statesrfor countert'errorism puiposes?vithoutra under certain circumstances. Fer More than ?ue?years?, the Presidential Authorization was renewed at 3t} to 60~day intervals-to authorize the highly classi?ed NSA surveillance p170 gram, whidh isreferred? to throughom? this, report as the; Eresident?s? Sm?srei'llancePto (ESP), 1 Under" thePresidentialAuthorizatiens, the NBA intercepted the content-of inte1nationa?l telephoneand?il?ternet communications-of both US. and non?US. Inadditien, the co?ected telephone and, Internet-Inet?adata?? communications: signaling j'iilifoimationeshowhig cont'actS-hetween andarnong telephone. numbers-and Int but-netincludihg HIE-contemsof the communications -- anal?ed tbyn?the NBA embers-of thehitelligence Community (EC), to generate thitelligence reports. These reports were centre the'Eederal Bureau of Inyes?tigation (FBI), theiC'ennfal Intelligence. Ageney other intelligence o'rganiZations. - The-Scope of collectionpennitted under thePresidential Authorizations Varied over time In stages between July 2004 and January 2007,. NSA ceased collection aetivi?es? under ?PI?SSidential authorizationaa?d resumed them under four separate court with the Foreign Intelligenc?. Suwaillance Act of 1.978 as amended (U) Scope- ot the Renew (U) Title HI of the Foreign Intelligence Surveillance Act Amendments Act of 2008 (PISA Amendments ActJ-msign'ecl into law 011 10 July NOB?required the inspectors The coirer tennNSA uses to protect-the President?s Surveitlance Program is 2 (U). Unless otherwise indicated, references to PISA in this report are to the statute as itexisted prior to being amended in 2008. .i 2 ll general of the elements of the that participated in the PSP to conduct a ccinprehens'iVe review of the program? The (Act required that the review examine: call oflth'e facts neceSsary to-rdeseribe the establishment; implementation, product, and use of the product-ot?the?Program; :aCcess;to. Clegal reviews of the Program- and access to information- about the Program; communicationswith, and participation or; individuals-and. entities: in theprivate sectOr re?latedito the Program; (D) interaction withthe Foreign Intelligence SurveillanceCour-t and. transition to court Orders related to the Program; and :03) any other matters identi?ed by any such Inspector General-that Would enable that Inspector General to complete a reviewef the Program, with respect to silchDepartment or element? (U) The InspectorsGeneral (1013) of the Department of Defense (DoDLthe Department the CIA, the NSA, and-the Of?ce of the DireetorgofNatiOn?al Intelligence conducred the review-required under the Act. ?Thisrrepott' summariZes the;-collectiVe results efithefI?Gs' review. Conclusions and resommendationsin thisr?epOrt that are attributed to aiparticularIG should he understood to repreSent that opinion. IndiVidual reports detail. the results of each IG's review and? are annexes to ,thisrepert. All of the reports have been classi?edin? accordance With the program's classi?cation guide, which was revised during our review and re-issued on 21 Janualy 2009. (U): Title Amendments Act also requiifeCI?tliat the reportiofany relating to by the D01 Of?ce of Professional Responsibility (CPR) be provided to the and that the ?ndings and conclusions?f .s'uehirivestigation be included in the D01 'IG'S-i'eview. OPR intends to review whether?any standards ot?profe?ssiiorial conduct Were _vio'lated in the preparation cfthe ?rstseries :o?f?legal memorandums supporting the PSP. OP-R has not yet completed its review or provided its ?ndings and conclusions to the DOT IG. (Ll) Methadology' (U) During the course of this review, the pa1ticipating IGs conducted approximately 20 0. interViews. Among the individuals We interviewed Were: former White House Counsel and Attorney General Alberto R. Gonzales; former Deputy Attorney General James Comey; FBI Director Robert S. Mueller, former Secretary of Defense 3 (U) The President?s Snrveiilance Program is defined in the Act as the intelligence activity involving cemmunications that Was authorized by the President duringthe period beginning on 11 September 2001 and ending'on '17 January 2007, including the pregram referred to by the President in a radio address on 1?77DEGemhcr'2005 (commonly kaovm as the Terrorist Surveillance Program). Donald??, Director, Principal Deputy Direetor of National. hit.elligenee,,.and Director M-iChael V, Hayden; former Director of antral Intelligence and Director Porter I. Goss; SA Director Lieutenant General Alexander; feirrner Director's of National Intelligence 61111- D.:Negroponte and MeComrellgiandformer.National Counterten?orism Center (NCTC) Director John 0,13rennan Certain other persons who had sign?i?eantxinyolveinent in the either declined ordidnoit respond to our- IBqu_ests-f01? an interview, iheludingformer?eputy ?Seeretaryjof Defense Paul D.. Welfowitz; former Chief of Staff-t0 :PresidentIBUSh AndrewiH.. 'Card';fDaVid S. Addington, fenner Connsel' to Vice President: Ribhatd B. Cheney; fonher-Attorney General John D. Ashcroft; former Deputy ASSistant Attoi'ney General John Yoog; and former DCI Gearge I. Tenet. Wei 'erviewed former-SA 3 Well aszle?dershl-p eaterate SID we and current. and farmer- sealer NCTC of?cials. We also interviewed officials antl'foiQe of general counsel officials fr-on?rthe participating Organizations who Were invelved.in?legal?revieWS of the PSP and/or had access to the memoranduins supporting the legality: of the P8P. We examined thousands of electronic andhardeopy documents, including- the PresidentialAuthorizations, terrorist threat assessments, legal inemorandums, applicable regulations aindelieies, brie?ngs, reports, correspondence, and notes. We obtained-access teas FBI database of PSPederived leads that had been disseminated-to FBI ?sldof?ces. to cen?'rrn information obtained'throughinterviews and to assist in our analysis: ofFBl investigations that utilized information. We evaluated the?justi?lcatione inolnded in thexrequests. for information (RFIS) submitted by the to the NSA to deter-mine whethe' 1 they were in aceordance with program guidelines. Reperts- of prior reviews. and: investigations of the PSP conducted by'the NSA were also utilized in. our b1, b3, b7E at): PRUGRAM Nation'ai'l?eeutity Agency .conntenerrertem E?e?ttey Prior to:- 1?1. Septem ber 2001 e, ?5 For-mcre'thana decade before thetertoi?ist attacks of ll September 2001, NEAii'rtis capabilities to-IC requirem?ntsg' The NSA, SID, led these-efforts. was au?ltjl?izfeciby Executive Order (192.0,) 123.33", ?UnitedrSz?ntes ?ttelligel?tCE'ACffoffGS, 4?Dece1nber 1981, as amended, to collect, process, and disseminateSIGlNT- forfci'eign intelligence and comiterintelligence purposes in accm'd'ancewith'DCI guidance the-conduct of military Operationsunderi the guidance of the: Secretary of Defense. Itcis. the. policy of US. G'GVernment entities: that conductSIGlNI actiVitieS- that they will collect, retain, and dieseininateonly fereign communications: In septeinheri 2001, compliance procedures defined foreign - communication-s least one the United States, entirely among foreign powers, or communications betweena lforeignpowe?rand of?cers 0r employees. eta foreign power. All other communications Were considered domestic NSA was-not authorizedunder-ED. 12333 to collect communications from a? wire in the United States without a court order unless thecommunications originated and terminated outside the United States 01? met? applicable encepti?ons tothe: requirement, of acourt order under ISA. 50 "1801', et seq?., was enacted in 197:8.to "providellegislatitre authorization and regulation for all electronic surveillance ?conducted with-in the United States. for fere'ign intelligence purposes. FISA antl10r12es the Federal Genemrn'ent to engage-in electronic surveillance and. physical use pen register and trap and trace devices, and to obtain. business records to acquire foreign intelligence information by targetingfo reign powers and agents of foreign powers inside the United States.4 As a hfgeneralrule, the FISC must ?rst approve an'appliCation for a warrant before the government may initiate electronic sUnVeillanCe. . Pjn'Or to the PSP, SA anther-try to nttercept foreign collunll'?icaf?ict?st included the Director, authority to approvethe targeting of cetnmuni?catiOns with one cotnnlunicant Within the United States if technical devices could be employed to limit collection to i ii a United States, 4 Thezterm "pen register? is de?ned in 18 3512:?:r as a device or records or decodes dialing, routing?, addressing, or signaling; transmitted by an instrument or facility from which a'wiresor electronic communication, is transmitted, provided, however, infcn?naticnshali not include the. contents of any communication. The term "trap and trace device" is de?ned in 18 H.310. 3127 ?15.21. device or process wliicti. captures the incoming electronic or other impulses Which. identifytbe originating number or other dialing, routing, addressing?, and signaling reasonably likely to'identify tti'e'scurce of a wire or electronic. communication, provided, however, that such. shall not inc-{tide the Contents ofany communication. .. .. lfteshmcal was 0011ec-ion', 1ecollection-reg royal-by the Attorney General, The?iDlirectonfNSA except When the collection Was o'tlietwiSe regulated, for example, under PISA for communiCations collected from a wire in the United States. NSAEt?iitiatly Used EnietinglAu?EhDrittes to Enhance- Signals- lnt?etligence collection .nn?er- the. Septem Terrorist Attacks 7. as royed?th?e?task1ngefthe esp h? was an aouresswesuse ?o Hayden's 1:4 septeinber 2001 approval ineinoran um targeting?wajs to facilitate analysis/Contact chaining. 5 .NS-A Office ofGeneral personnel concurred with the -_pr0p03ed activity, but provided-a handwritten note to Hayden stating that chainingwas permitted only on foreig'lr'numhers ldbe chainedwithout a court order. Collectionofthe centen-t a as not addressed inthe memorandmn; cheiref; other dez?uitientano?neness that and SID personnel understood that Hayden also approved centent?collection and analysis. NSA OGC a?ctienWaS a-lanul? exercise-of his authority underE.O. 12333. {In to "Gr neral Counsel Hayden had deciv . .. "ill-'1? that ieuld'be presumed to be of foreign intelligence value rand-could be provided eyden told us that?his actions were a ?tactical decision? ;and' thathe was operating in a unique environment because it was widely believed that?more terrorist attacks on US. soil were imminent. In late September, Hayden informed Tenet that he had expanded SIGINT operations under E.O. 12333 authority. According to Hayden, Tenet later said that he .had explained the expanded SIGINT operations to Vice President Cheney during a meeting at the White House. On 2 October 2001, Hayden briefed the Heuse Permanent Select Committee on Intelligence on his decision to expand operations under ED. "123 33 and informed members of the Senate Select Committee on Intelligence by telephone. Hm . Eigp?org'ed @p?ions'to?mprow mom?Coliseum-mam Address ?n?ee??genca Gaps om'TeH'rorfs't Targets meeting at thaWhit'eHougci at Which Tenet; cXpand?d SIGINT operations T?to the Vioo Erosidont. Accordmg to; during the meeting the Vice Pres-idgntasked 1132111310 was: db?igigewry?iing:possible to preventmlother attack; Vito?Prosie?t speci?cally- asked Tenetifpould do :mo'ro.? Tenet then. discussod thematterwi?if?ayde?; Haydon told. .doneWi?thin tax-Listing:authorities; In: follow-up- tal?ophono- collver? ation, Tenet Hayden wha'f' the NSA could do if it? Was provided: additional authorities, ?To formulate a response, Hayden,th with personnel, who Wane alxeady wOrkingto?ll to identifyadditiorj a1 authorities torsuPpmt SIGINT collbotionao?vitios that would bogoperationa?y- useful-and'teohnically faasiblo?, In P?l?m??n - discussions ?focuS?Cd 011 how NS migl'it bridge tho; ?5inte1'11ational gap,? 1 La, collection ofifl1t61:11atiollai COmmunioations in which one communicant was within the ?Ujr?ijitedlis'ta't?st 'Ill?il?d?YS ilmnedifatelya?er 11 Septhber 2:001,- iths: HousejiPamlanent Salem: Into?igence asked NSA forftoohnioal' assiSta?n'oe in Eilil?i?ld?FIS?Aij giVe the-Presideh? au?ior?ityio coud?ct Electronic:suryei?ano?Withoum court-order to obta?tl foreign intelligence hafor1?11ati?on. On 20=Soptiember??oo L, the. NSA 'Genera'lf?ounselwrotem White HouSe- "Counsel Goma?iles asking if-thegpl?Opdsed amendment had- merit. W6 found no: ro'cord of-arrogponse to the NSA Gonoral CounSol?s Writi?gand could not determine Why the proposal to amend PISA was not pursueda?f that time; Hayden saidthat, in his professional udgment, NSA oO?uld not intelligence gap'using PISA. he process far obtainingFISC ordei-s?was it involved. egtonSiVercoordina?on.and separatologalaud policy rovieWs by severalragenoies; A'ltl?iough?FISA'S emergency authorization provision penni?od 72' hours-Of Surveillance befotoobjtait?og a'court ofdey, itdid? notallow the govermnont-?to uni?e?algesm?if??lance immediatol' Ratheg the'Attomoy General had toonsure that ems: eno surVeill?ance ?(1J0tmsedteesetq eaeINrcotecnon ., gi?eai?inet'teri?eriet . 1 - a .. i,ay-dsn-Issalled thatattetconsultins with FISAconshfained NSA collectionoizl" carried? on. a Udit?dStates. . Hayden explained that NSAi-cduld tact-collect from-5a Wire in the order, content jer:n.1etadatafrom oiigimted'and/or terminated in the United States. Hayden also said that communications ine'tadatado not have the same level-of constitutional protectionas the content of communications :and'th'at. access to metadaita concerning: Conimluiications having One end in. the-UnitedrStates would signi?cantly enhance Hayden sogge'sted-tliatithe ability. to eel-loot communications that originated-m: tetniinatedf'io the United-States" without a-court orderwould agility. After two addi'tionalj-mEethiggs-with Vice President Cheney to discuss .fmtherThOW'NSACollection could he estpanded along? the lines: described! at the White- I~Iouse meeting, the Vice ?residenttold Hayden to workout a solution with?Couusel to the Vice PreSident Detonamngeu. gm)? Authorization- urine 'PfIfES-ident'e Serveiltance Program I a . _According-t0 Hayden, Adc?lington drafted the ?rst Presidential Aether-13510011of?the-PSP. Hayden -c11a1'aCterized. hires elf as. the ?subject matter expert,? and?he saidfthat no other SA personnel, inch'Iding the General. Counsel, pai'ticipated in authorization. Hayden also said that personnel had. not been involved in his discussions with concerning Presidential autho'riZation ofthe PSP. The came into existence-on 4. October 2001, when President Bush signed the Presidential Authori-Zation drafted by Addington. The; authorization was entitled: Presidential Aiztlioi?izotz?mzfor Speci?ed Electronic: Surveillance Activities during a Limited Period to Detect-and Pr?vent Acts ofTerrorism within the United'Staz?es. Between 4 Oetober 2001 and 8' December 2006, President Bush signed 43 authorizations, exclusiVe of modi?catic'ms and other program?r.elated memoranda to the Secretary of Defense. (U) SEGINT Activities Authorized Under the Program The 4 October 2001 Presidential Authorization directed the Secretary of?Defense to "use the capabilities of the Department of .Det?eiise, including but not: [limited to the signals intelligence capabilities of. the National Security Agency, to collect foreign intelligence lay-electronic surveillance," provided the sur-Veiilance was intended to: :35" one: ?t ?iQ Fa . ti 'ti I'rm'ij .r spam-1w 134:. .t on) - I ~11 ux. acetate. 21 communication not limited to .a Wire: =comirf?unijeation carried into communication IS a .?groupeng aetiyitiesxin preparation therefor, orran agent of such a group; or (is) acquire, with respect to. a ceinmnnication, header/t'outer/addressing? type information, minding data; but not the contents of the communication, when at least one party to is. outside the United States or partjr to. such communication is known. to bee citizen of the United States, content hiding thoSe tot-from: presetusweiy tint fin-t is: rare state's", 'Wliere1jrobahl.e. cause exi?sted'to believe-one of the cominrmicants was! engaged in; international terrorism. The authorization also allowed the NSA to acqttitfej.telephony-and Internet inetadata Where" one-end of the communication was outside the United States or neither:corrununicant was [crown to bea U-.S. citizen. For telephone calls, rnetadata generally referred to ?dialing?type information" (the originating and terminatingtelephone numbers, and the date, time, and duration of?t'he call), but not the content ofz'the call; For TEheSec-retary of Defense 8' October 2001 - . iorization to on targets-related 5' internat' nal ti?l?O? m? Because the suWeillance-was conducted in in nded i communications into or out of the United Statest and a of these communications was to or from per-sons in the United- States, the-surveillance otherwise Would have required a FISC order. NSA was also alloWed to retain, process, analyze, and disseminate intelligence from acquiredunder the Presidential Anthorizr-rtion. In addition to allowing the interception of the content of communications into or out of the United States: paragraph ofthc first. Presidential Authorization allowed NSA to intercept the content of purely demesticcommunications. "Hayden told us hedid not realize this until Addington speci?cally raised the subj ect during Although the authorisation ?was not limited to the signals intelligence capsbliities of the National Security Agency? DoD?s operational involvement in the PSP was limited to activities undertaken discuss reneWiogthe.authorizationo According-to I?iaydeh,sheltoIdAddirigton collect?domestio communicationsheoaose'NgA 'ista? foreign. intelligence. agency; its gi??aSiI'uCllEe did: notsup port do'messiecollection, aiidThe: would require. eucli-arhig'li ?evicleotiary stagi?darcl'to justify intercepting purely demostic communicationrthot such cases mightjust as well go to the FIS to) Content otth?, Pre?'tdentia! Authorizations and, as toFo?tm and Legality - Each of the Presidential Authorizations moludedal?nding to the? effect that terroris t'groo?pstof global. reach possesse'd?the intent and: capability-to attack the United: States,.that.an extraordinary emergency continuedto these-circumstances 'eoostiioted an urgent and compelling govemmentalzioterest permitting electronic Surveillance within the United-States foreounterterrorism purposes, Without judicial court.orders. The primary authoitities eited for. the legality oftheielootronier staveiilaooe and related activities. were Article of tlie..Constitut-ion= and?the 183'8ept'e'1?r'iberi?2001 Authorization for Use.ofMilitary-Ferocioth Resolution Theiaothorizations '?uther provided that an}r limitation inlE?. 13333 or any other PreSideo?al directive inconsistem with the Presidential Authorizations Shall not apply, to- ?i?eextehtgof?re inconsistency, to the electronic the PSP, E?aoh authorization also included the President's cleterminatiot1-that1 to ?thie?s'eore'cy' necessary to" "cleiedt and prevent acts of terrorism against the the?Secretaty of Defense was to defer noti?cation oi?thetauthorizations and the activities dei?ed out purSuant to them to persons outside the iExeCutiVe Branch. The President also noted?hisihtention to inform appr0priate members of the Senate and the House of Representatives of the pro gram "as soon as I judge that it can be done consistently with defense needs." Ashcro? certi?ed the ?rst Presidential Authorization as to "form and legality" 0114 October 2001. According to NSA records, this was-the same day that ?ASheroft was read into the PSP. There was no legal requirement that thePresidential Authorizations of the PSP be certified by the Attorney General or Other Do] of?cials. Former senior D01 of?cial Patrick F. Philbin told us he thought one?purpose of the the D01 certi?cations sewed as of?cial con?rmation that had determined-that the activities carried out under the program were lawful. Gonzales told us that approval of the program as to form and legality was not required. as a matter of law, but he believed that it "added value? to the Presidential Authorizatioti for three reasons. First, NSA was being asked to do somethihgit had 1101: done before, audit Was important to assure the NSA that the Attorney General had it?) 1:11 ?regi mivb?itt?tghe value 9 ?ros ectiVetyH . 13 . reviews of 'thepro?grani. Onssz"?"?wettmney I I. eappreVali'of 1?1? theevent inspector Third; for ?purely? political coi The. Presidential Authorizations wereis?sued- at?intervalsof 3031's .60 says; Bradbth aid that the. main reason fol" PB?oidi?cially -1'eauthori2ii1ggtlie pregnant. was to ensiue that-the Presidential authorizations werereviewed??eqnentlyuto assess the: 1irf0gr_ainfs7'val11e and ,effeetiveness. Aetheperiod fer drew to ?aelose, tljteiDCIlprepared a threat assessine?ntmemoi'anduni for the-President. describing .thecur'rent state of potential?ter'rori st threats to the United States. I (U) ?TheThreat Assess?t?n?ent Memorandums Presidential Authorization: ofthe Program. FreinD'ctoher 2001? to May 2003?, the CIA prepared the-threatassessment nietnorandnr?ns that supported Presidential authorization andlperiio'dio reautliorizatiOn' ofthe PSP, The nieinorandums documentedthe the US. homeland and to .interestS"aer?d from alsQa?idaand- af?liatecltejrrorist organizations. Tlie'ifirst?threat aszesSmentineinoranduniw?ze mama-Ba: ilwa's on 4 "Combat 2001:..7 SuBSeqnent- threat asseSsment wegappsepaiaasvery 30. to 60.-days.-to correspond withthe President's reautlioriaat,ioiis?; l' TheDCI'Ehief ofSta?f? John Moseman; wasuthe-GIA focalfpo?inttit?oi? Accordingto Moseman; ?lietrlireeted the prepare] Objective appraisals O'ftlie- 7_ on threats tozthe' homelandiancl tedoeumeut those-appraisals in a memorandum. I nalyst?s drew upon all sources of intelligence in preparing their threatassessments. - as of the inernorandums fo?eusedtpri'rnarily oil-the current threat Situation and did notroutinely provide reported threats or an? assessment of the utility in addressing previously reported threats. I I _~Aiter cenipleted its pertion ofthe meinoranduins, Mosema?n added. a paragraph at the on the Inernorandurns stating that the individuals and organizations involved in global terrorism (and discussed in the niemorandurns) possessed the capability and intention to undertake ?nth er terrorist attacks within the United States. Moseman recalled that the paragraph was provided to him initially by either Gonzales or Addington. The paragraph recommended that the President authorize the Secretary of Defense to employ within the United States the capabilities of DOD, including but not limited to NSAE SIGINT capabilities, to collect foreign intelligence by electronic.surveillance, The paragraph desen'bed the types of communication and data that would be collected and the 'Curret terrorist threat, foeasrng pri Thetitle of the threat assessment memorandtinis was changed toT/rs Global War Against Terror-rim in Line 2002 ?a ?t a I circumstances under widen they could be collected.- The draft threat assessment randums were reviewed by CIA Qf??ce'of General-counsel attorneys assigned to '1dj.CIA,rtCt.i1ig General Connsel Deputy General CounselL JotntA. Risen. Risa i. told us that thedraft mcinorandums? were. generally srfLE?oient, but there were cecasionEWhen, based on hiszexperiencewith previous memorandinns?, he thought that ~draft-memorandme contained insufficient threat infonn?ation or did not present a i case-'forreanthorization of the PSP. In such instances, tRizao Would request ironideadditional available threat information or make revisions to the'draft' memorandunis. The threat assessment nietnoi'andunjswere the?nsigned bythe DUI and forwarded-to the Secretary of Defense to he co-signed. Tenet signed. most of-the threat memorandum prepared-during his tenure as CI. There were no occasions when the DUI signature from the threat assessment memorandums, The tlueatassessniem memorandum were reviewed byDoTs OLC to assess whether there was ?a ?sntticientfactualE basis demonstrating a threat?of terrorist attacks in the United States rm- itlto eonthruccto be reasonable under the. standards. of the Fourth Amendment for the President'to [continue] to! authorize the warrant-less in the program. then-advisedthe Attorney General Whether the constitutional standard of ateaSOHableneSS.hadabeen met and whether the Presidential Authorization couldhe-cr?ard?ed as: toiforinz andzlegality, After-- review and approval..as to ?01111 and legality? by the Attorney were delivered to the White House. to be attached to thePSP reauthorization meinorandums signed by the President. Re sibility for drafting the threat assessment memorandums was transferred from to-the newly-establishedTerrorist. Threat Integration Center in May 2003-, This was retained. by TTIC's successor organization, CTC. The DCI Continued to sign the threat aSSessment inernorandums through 15 April 20.05. Subsequent were signed by the Director of National Intelligence or. his designee.? (U) Early Revisions to the Presidential Authorizations On 2 NovemberZODl, With the ?rst authorization set to expire, President Bush signed a second Presidential Authorization of the PSP. The second authorization cited the same authorities in support of the President's actions, principally the Article II Commander?in?Chief powers and the AUMF. The second authorization also cited the same ?ndings of a threat assessment concerning the magnitude of potential terrorist threats and the likelihood of their occurrence in the future. However, the scope of authorized content collection and metadata acquisition was rede?ned in. the second Presidential Authorization. The language of the second Presidential Authorization changed in. hree respects the scope of collection and acquisition authorized under the PSP. First, the "probable cause to believe? standard for the collection of Internet communications and telephone content was replaced with "based on the factual and Tali) Were: a to? an; rmr?r?m IUI I I pt'aicttcal considerations of everyday life on which reasonable and. prudent persons sot, there-etereasonable grounds?to believe . . Do], Counsel threlnt'elligencePolicy; 5 Better told us} this change was; made 'hy'Atldington because ?he-belieVeda?the ?temis' ?Vprehablezeause" wete "too ?eighted" with "usage injnnicial opinions, B-Etlterrals-o: s'aidfhe "bel?ievedthechange to more colloquial language Was be: appliediijy?nonsel'awyers at the NSA. Secor1d,- the-newly de?ned standard was to be applied to tlfiftiheliefl-thatrthe eommu?nicatmn "originated 01' terminated Outside the United I Then?ew language therefore eliminated the authority that existed?in the feet autltojrizationt? intercept thecontent of purely domestic cemt?nunicationsThe third ohangei?n thersoope of PSP collection and acquisition contained in: the second Presidential Anthorizatiott?was the inelusionof an additionzil'?hird) category of Internet and telephony metadatn that could be'acquife'd: basedon the factualand practical considerations. of everyday life- on ?Wll?ichleasonable and prudent ?pe1'50ns- act, there-ere speci?c and articuleble facts ;.giiling reason to believe llt'at such communication relates to international terrojriSm, or activities in preparation therefor. This languagejrept?esented an expansion of collection authority to include metedate pertaining tojcerta'in communications even when both-parties Were persons, as long as there. were facts givhlg "reason to believe that the communication was related to international.?tertofisni. J) On 30 November 2001, the Presidentsigned'n third 9 January 2002 conceming scope ofnutho?zed collection and acquisition becamertl' 'e (U) Office of Legal Counsel Memorandums supporting Legality of. the Program OLC Deputy Assistant Attomey General John Yoo was responsible for drn??ingthe ?rst series of legal memorandums supporting the PSP. Yco was the only OLC of?cial read into the PSP from the-progmn?s inception until he .let?cDoJ in May 2-003. an "an? n? During Yams tenure at he'wa's one; of only three Doliof?'c?ials. read into the Th6 Ashcro?zand Baker, on: Assistant A?cmey-Gfenerall Jay idix??tS?parviisor, was neverread into the? program. ?B?eforejthe Prasident authorized the 0114: October ZODL Yoo?h?a-d; preparedamemdraiid?m emulating the legality Tprc?i?thcj: Uni:th States-to monitor. 001nmu?iCa?idlis.Dfpotential taprorist's. His, m'emotandum, dated 171 September 20031,, as addressed G'mmsel q?ggF Flgnidml andwasentitled 'e ?rst?OLC memorandiun e'xplimtly addressing the legallty. of PSP was '2th alter the-program had been formally authorized by the PreSident and after- Ashcro?: had certi?ed the pro gramas to form and legality. The'ii'rst OLC opinion directly supporting the legality of the PSP Was dated 2 November 2001, and was .di'afted by Yoo. outset of his .2- November memorandmn' that "[b]ecause of the highly:seusitiVenature of this subject and the time pressures involved, this memorandmn ha" not n'dergone theusual editing and review process for opinions that issue from our . You. acloaow1'ed'ged'in his 2. November 2001 memorandum that the first Presidchtial.Authorization was "in tension with Yoo-stated that PISA "purports to he: statutory means for conducting electronic surveillance fer foreign intelligence." But Yoo then opined. that a reading of PISA would be an unconstitutional in??ingemenit on the President?s Article II authorities.? Citing advice of OLCandiDo?I's position as presented to Congress during passage of the USA PATRIOT Actseveral weeks earlier, Yoo characterized as merely providing a "safe harbor for electrOnic surveillance,? adding that it "cannot restrict the President's ability to engage in warrantless searches that protect the national security.? Regarding whether the activities conducted under the PSP could be conducted under FISA, Yoo described the same potential impediments that he had cited in his 4, October memorandum. Noting that the Presidential Authon'zation could be viewed as a violation civil and, criminal sanctions in 50 U.S.C. 1809?10, Yoo opinedthat in this regard FISA representedan unconstitutional in?'ingement on the-President?s Article IIpowers. Accordingto Yoo, the ultimate test, of Whether the government may engage in Warrantless electronic surveillance activities is Whether such conduct is consistent- with the Fourth Amendment, not whether it meets the standards of PISA. Yea qute,tf11at reading President?s inherentauthority to Geneva-fora g1; i?telli?gmee surveillance womd raisegraveconstifu??mal {undefl?je ire-resolving theer?issuema I . 7 .. ear?siatemen? 1111+ SA. Ideniialtauther?itylte conduct ?wairant1e33,5eatcl1es in the. nationz? semi?y itihas'not??the? thejstetute must-be cemetr?ed to avOi'd such: a'uqr'eiadin?g?z" 1 - I I, . 1?0er ?2 Amendment. concerns ?t6 the .eXtentIhat the aut-lmrized gelleetien "in-valved non-U. persons outside the Unitedzstates', Regarding these aspects of the program thaf invoked of the hitematibna'l, communicatimls of US. persons within thqunitedStates-v, Yoo assertedithet .a11owecl for searches o'fgp?et's one crossing Us. i?t?emati'onal'borders a?d?that .?itereept?ions och?minui?'eations into ?01" out ?of theUnited iSlfatesfeIIWijth'in the "border crossing Yoo further pined that el?Ch?Qnic- Sufyeillance "in "difeot supper?tzofi?i'lifaly operatio?s? didin?ot trigger constiimticj?al preteb?b? against illegal [s earohesrand? seizures, in: part..beeause theFouL-Th Amendment :is, 'p?fii?arilj?i?aii?ed ?atgculfbing law enforcement abuses. "Finally, Yoo wrote thati?le eleettOnie net xec?mghfi?b"teetricrpres Authorizatiene was "reasonable" under 'a?gu?rth' Amendment and therefore. d-i'd'not-requiireaa Warrant: situation the 1?01 A r?a-k u. .. ll as (x basic: I 111061701361" 11332" 0. SURVEHLLANGE PROGRAM b1, b3, b7D, b7E b1, b3, b7E ?11 WTelephoneandInternet fGiriirnrnim?leat?lons content Collection a I 3, Content collection and-analysis under the PSP was conducted in the Seine inanner? as collection and analysis conducted previously by the NSA under 1,2333 authority. NBA management applied standard minimization and specially to-taslc domestic seleetors such as telephone numbers and email addf?sse?g Selectors had to meet two criteria before being tasked under the PSP: the purpose of the collectionhad to be to prevent and- detect terrorist attacks in the United collection managers were responsible for ensuring that telephony and-Internet comnnmications selectors were appropriately added or removed from collection. Content: collection for domestic selectors was sometimes approved for speci?c b1,- b3, b7E. 'tiniepeigiodsa Data-collectedunder the PSP were'storedv in compartnientecl NBA databaSes, antlajccessi to thedataba?ses was strictly'controlled. i if The?inajOriW oftatgets for. content collection under the were forein telephone numbers and Internet communic-atio addresses, 1112008, reported oreig?n telephone niinib erszan'd in excess eign: Internet ?1 i 'd beentargetedfrom 11 December. 2006. omesti'ctelephone numb ers and einestcicl Internet in communications for?PSP'content collection from October? 2001 to January?2007; .Al?iough targeted domestic telephone. numbers addresses Were located in the United States, they were not necessarily used citizens.- ESP prograni'officials'. told 'us that-the NSAdicl not: seek to collect domestic c?einlnuni'eationsunder the PSP. I-lo e? manauers'sai'd that there-are noread?ily available teCImical means Withinth I to guarantee that no domestic calls will be collected. Issues of 'ltitid' arise from time to time in other VSIGINT -o eratiOns, and are not Unique to? the ESP. Over the life of the program, the NSA reported ?incidents of unintentional collection of domestic or non~targeted In such cases, the NSA determined that personnel followed established procedures in reporting the incidents, adjusting collection, and purging unauthorized collection records from NSA databases. . NSA analysis of content collected under the PSP involved the same practices and techniques used in analyzing information from other SIGINT operations. Telephone content was made available to tlirougli'a voice processing system; Internet communications con-tent was available from the database in which it was stored. Analysis involVed more than. listening to, or? reading the content of, a Communication and transcribingand disseminating a transcript, Analysis alsoinvolved coordinating and collaborating with other 10 applying'pr'evious knowledge of?the target, and integrating other relevant intelligence. ?i9 @Meitedata. assesses-ans.suggests. Nb" rspersonnei; US B?i?i?f 51? ainetsdat I Gi?? ai?i?g; gouge? the-NSA had the capability to collect bulk te?lepho11ytsud httemet metad?tat before lthe'_4P'SP, collection was collect- inete?ata?fome Wire inside the Without when one end; (if the the United States. through; domestic. seljeotoizs; Access to large amounts of '1neta?data is: required'fm' effectivecentaotehaining ?an?cli'fthei P3P increased the data aavagilable to. NSA and alloWed'them to perfonn- rmere thorough contact-Ollaining. a Although .NSA analyst's could Search bulk?collected inetadate under" the-P3P, the searches- wereilin?ted. to targets that Were zappxoved under'the' standards set'fotth in the-Presidential Authorizations. As suehb only a small fraction of?the metadata collected; under the 5PSP was eV'eracoesSe'd. the NBA estimated] .o'f'thetelephoneseeordsin the databasai(01? one ofevesy' 'foiut?lzrriillio?- regards) could be expected to be seen telep one :11umberor' Internet; cojnmuni'cation Specialized metajdata analysis searchesjth?e metsdata euclidentifies' contacts; bet-weenthe selector ?ancl.o??1er? telephoilenumbe-t?s' 01" Internet Commun'ieationssadj tesses. a his ?11131 Z?dl'oflintdi 7. - at? 'an gem Presto; "ti A11 tot-testie'osdt? nor "htts'izt assessment; eparation from the target, NSA detennined that-it was not analytically useful to do so. automated process was created to alert-and automatically chain new and potentially reportable telephone numbers using What was called an ?alert list.? 2o '1 djl??cted to or dollec?b?' mu. ?databases. NSA repo?tt?e?d three such ViUlati?bnS?aear'Iy ina'th?- pitmgtam. and toquneasures to cement them, (Ll) N391 Raponing From the P?resic'?'ent?s Suw?illance i types .dffepo?s: iss?eu?nated .. ?3 'uu?for?mati'onx?mt ., .?Sometiljpergco11taiin onte?t J?Or?ts-iwhmh: $9111de aria ysi?s? '22 NSAManage-rial Struc-tLire and Dyereight of the President's Surveillance Program Analysis and reporting associated with the PSP was conducted within STD at Fert Meade, Maryland headquarters. P8P activities were not conducted at NSA ?eld sites. he Director and Deputy Director exercised senior operational control and authority over the program. The individual who was Director in 2001 told us that, aside from ensuring that the PSP had appropriate checks and balances, she left direct management of the program to the NSA Director, the Deputy Director, and the Office of General Counsel. She noted that Hayden took personal responsibility for the program and managed it carefully. By 2004, speci?c managerial authorities concerning PSP collection, analysis, and reporting activities had been delegated to the SIGINT Director. The SIGINT Director furtherdelegated managerial authority to the PSP program manager and mission execution responsibilities to the Chief of the CT Product Line. The PSP- program manager position was restructured to provide the incumbent authority and responsibility for oversight of P8P a?cms's the, SP program manager Was providedadditional staf?. *ng: The lif?; of:th program, th?'rs were ?ve PSP;p1;og1-am managErs, who re 01?.th directly fo-?Ethe Dir?ctorxor??ie _ief?of the CT Product" Lina. 3- . .. -. .3. :(Uy 305% From FY ZUGZ-thmugh FY 2006} (dbilarsih thousands, personnei costs "not'iricluded-) (U) .NSA Management Cantrols to Ensure Cidmp'liance-With Presidential Authorizations. - p?qn lrun kvu ?u Huh-an: "Ir-=1 II as .j .. Connect-Was:meditate the the day- ?rstBi-esident-ial. AuthoriaatiOn was" si On October .200 the General ounsel provided Hayden-andhis fer nserfin briefuigiNSA 13617301111615.011: the- authorities. The" talking. points "included the fact: that Hayden had directed. the-NSK GeneifaliTComis?el thetN?S-A ASSo?Ci'ate -.Gcnera,1f CQunSelfOl?e: Operationsto ratiewand The NSA: Aswciate?G'eneralitCoimsel er: Operations p'r?ovided mast ofzthe pregramtovetsight?befmfe the NSJA. I'G-waseeacl into the PSP in The Assodate General Counsel for Operations-oversaw program implementation, reviewed propOSBd?t-atget packages-for complianceth the: authofizations, and coordinated pro issuesrwithDoI. (-U.) inspectcrieenera?t Oversight of- the-Prog ram WTITIB NSA IG and other O'fficie ?of Inspector General pets onnel were read. *int'ogthez-PSP beginning, in August 2002;. Over the life-of the NSA tenduct'ed: :3 Three investigations inwresponse to sneci?'c incidents. Violations of the: Presidential Authorizations "to attach and remedy 0 Tea t?eViewS to detcnn'iaeitheeadequacy Qfmauags?ieli?f Controlsto ensm?s' compliance with ?the assess the. mitigation ofrisk associated with program activities, and identify impediments to Ine??l?lg the requirements of the autli? rizations. a" .f Ten ofthe-NSA .lCt-rcpoits included-a total-o 3; econintendations-to management to strengthen internal. controls and procedures?overthe PSP. The NSA .-IG-cidenti?ed no intentional IniSLlse-of the PSP. Signi?cant?ndings from NSA reviews ofthe include the following: o- In- 2005, the NSA then. . trots when comparing records of'dornest-ic telephone and communications selectors approved for content collection with selectors actually on collection. The errors ineluded selectors that were not removed from collection after being detaskedj selectors that were not put on collection When approved, and. selectors that were mistakenly put on collection due to typographical errors. NS-A management took Steps to correct the errors and establish procedures-to reconcile approVed selectors with selectors actually on collection. 0 During a 2006 review, the NSA IG found that all items in a randomly selected sample of domestic selectors met Presidential Authorization criteria. Using a statistiCally valid sampling methodology, the;;IG concluded with 95 percent con?dence that 95 percent owners of domestic selecth taskedlforPSP content-collectionwere linked to alaQa?ida, its ,ans?o_oiatea, or international terrorist threatsrinside the.U11ited' States. 7 "i i In; addition' Irepnrt-recommenidati0113,; iir-Mar-dh 2.003", the NSA the-there art-violatioiis the President, The NBA IIG prep ared (it Ereisidea?algnoti-?cationsrfor the-N58115: Director eeoneerr?rlg, Violations of the. authorizations. x: violationsinvolvmg collection activities conducted'unaefsi?sr authority as well asviolations related to re?ner PS-P-iactiftf-itiesthat were :-_operati11g under FISA authority were reported quarterly to 'thexPresident.?s Intelligence weight Beard, through the Assistant to the Secretary. ofi?Defense-vfer Intelligence it therefore try-determine the e'Xaot'nature' collection. o?t this incident in its upcoming'report' to. the President?s Intelligehcei?OverSight:Board. i . 1; 011.15 January 2009,,l3116D01 reported to the HBO that the had been ?uSIing' an "alert list? to compare FISA-?authoriZed metadata against telephone numbers a350?ittgteclwith counteitelrotism targets taskedzby-th?e The. NSAhad reported to the FISC that the: alert list e?onsiat'edof telephone numbers for which had determined the existence of a reasonable, 21? su to aterrorist orgai??fzatiM ass eciated wit deteimi?ation} had not been made for themajen 5e ,ee ore - alert list. The IG to-t?he President?s Intelligence Oversight; Board", and has provided. updates as required. The alert list-arid a detailed?NSA 60-day. review of processes related to the buSiness records FISC order were the subject of Betreral. to the F180 and of NBA brie?ngs to theiCongressional oversight cOmmitte es. (U) Access to the President?s Surveillance Program 26 (3U) Gamul'atiVe clearance Totals- January'20?07) Kjtotyl'edge .of the PSP was strictly controlledand "limited at the eXp?r?ess ?cttsect?toa Off-HieTWlliteil-louSe; . Hayden: eventually delegated his P8P clearance-approval authjriity?for FBL ;and,CIA Operational. personnel to the NSA- progranrn1anager.- .Haydenzwas required to obtain-approval from'the White House: to clear memberso?f congresStFII-SC and others. A . was?not'read into the?PSP untilAugust?ZOOZ. According to;- the Beunsel'at the tithe, the PreSideht Would nortaattowthe robe briefed prior Itoz._that date. Although Hayden did, not recall why the had not been cleared earlier, he thought that itTWOittld have been inappropriate to. clear him when the-length: of the prograrntuiltqun andr?before operations had stabilized. By August 2002;.? Hayden and the NBA General Counsel wanted to instimtionalsize P8P oversight with the involvement oftheNSA-IG. Hayden recalled-having to "make a case" to the White ?Hou'se?t?o have the IG read in. The ODNI IG found that ODNI oversight of the was: limited by ODNI oversight personnel not being provided timely access to the program. (U) Congressional Briefings on the Program On 25 October 2001, Hayden oondueteda brie?ng on the PSP for the Chairman and the Ranking Nle1nber of the House Permanent Select Committee on Intelligence, Nancy P. Pelosi.an.d Porter .1 Goes; and the Chairman and the Vice Cha?innan of-?the, Senate'S'eleCt. Committee on Intelligence (SSCI), D, Robert Graham and Richard Shelby. Between 25 October 2001. and 17 January 2007, Hayden and outreth NSA: Director-Alexander, sometimes supported by other NSA. to members of Congress and theirstaft'. Haydentoldus that sting the-many ESP brie?ngs to. 'ni'e1n'b'e'rs 'offcon?gress, no One ever suggestedthatthegNSASHGtild stop the Ef?gtanii Hayden?elnghasized that he did mere-than- just during the .bi??ietingsa- whieh'lasted as long. as aattendees?had questions. . .. Foreign :ln?t'euigence Serveiilaneeicourt Briefings en the? Program I. 1 a; . on 31 January 2-002, the beearnegth'e ?rst-member of the: oou?it'to beread into the H?s-was :briefed on the Of?ceoflntellivene?e Po?lioyatid?evi?ew Lambertht?s brie?ng- Was. conducted-at the 1-30.! rand-was . Yen, and Baker. 1 A Ashcroft provided Lamberth deei'sinn to; create the PSP, and Ashcroft stated that he haddetennine d, based uponthe advieefef-Jolin Yaoo, an" attorney in Do] Of?ce- of Legal that. the Bresid'ent?s?aetions Were l?aw?il under the Constitution. Ashoro'it also emphasized to Lamberth thattheaFISC was not'being asked to. approve thep?rograin. Following- I~Iayde11 described for .Lambe'rth how?the program ?metioned operationally, 'Yoo aspects of the program, and Baker propoSed-procedures: ?ltel?tlational terrorism FISAapplications that contained-IESP-?derivted infonnation} For the next four months, until the end of. his term in May 2002,. Lamberth was the .onty'FISiC judge read into the-P8P. . .7 Judge Colleen Kollar?Kotelly snoceeded .Lamberth as the 'P-residing?ludge' and was briefed on thePSP on 17 May 2002. The brie?ng was similar term and sub?Sta?nce to that provided to Lamberth, In response to several questions from Keller?Kotelly about the scope of the President?s authority-t0 conductwarrantles?s surVeillanoe,.DoiI prepared a letter to signedrby Yon, that, aoeordingto Kol'lar-Kotelly, ?set out-abroad overview of the legal authority for conducting [the butzdid notanalyze the speci?cs of the pro grain.? The 'letter,lwhi011 KollarsKotelly reviewed at the White House but was not permitted to retain, essentially (-2 November 2001 memorandum regarding the legality of the PSP. Was the onlys'ittinglFISC judge read into the PSP until Jannary 2006, when the other FISC judges were read in. Baker was read into the PSP only after he came upon ?strange, unattributed? language in i su vested the. existence of a his successor, Keller ote .re? in. 'l'eDoJ IG believes that notba-vmg OIPIR- ot'?'c?ials; and members of the FISC read into the PSP, while'prograrn-derived informatiOn- was being dieseminated as investigative leads to the FBI and ?nding its Way into 2.7 applications, .putat. risk the Doltsiimpoitzint relationship with theFIS IG agrees With-1Baker?sassessmentthat; representativgibetbse tItegFIS good relations between the DUI and the FISG depend on candor and transparency; Participation in the Pregnant-ts. Surveillance Pregnant I-As a; user OFP'SP-derivedinformation, the FBI: disseminated leads?s? tipperse?to of?ces. consisted-of domestictelephonenumbers and hitemet communications addresses {that {had deter-tinned through" :rnetadata analysis Were cotmeeted? to indhtiduails involved Withal??Qa?id'a- or: its af?liates. Dame-sac telephone numbers represented the: overwhelming majority- ofP?S'Puderived information-contained in tippers. Tipper-'3 also provided information derived fromeontent collection under- the P8P. 1 . . f' 3. 1113..me principal-ObjectiVe P8P Was to disseminate. pro gram armaments FBI ?eld of?ces Whileprotecting the source of the infonnation-and the methods used to-collectit. The initially assigned responsibilityfo: this to;its Telephone Analysis Unit .Whieh? developed procedures atozidis?seminate informatimrfromN A 'ep'orts in secret-never rennet- "The result-in. restrietions on how the of?ces "Wereto as the infomiation ?for lead purposes only? and not?HSe the information in legal or judicial proceedings. WEE paitic-ipatiort in the eVorlved over time asthe- program "became less; a'temporaty tespottSe to- the Sitaptembe: 311 att - ?1 andmore aypennanent surveillance Capabilit To?imrov I cation in the pro grain, the FBI initiatedth .111 anage its tenement PSR In "bt'uary enemas FBI assigned a.'tean1'ofEBI personnel?,wNTeam work full-time at?the NBA to manage the paiticipation in. the program. i Team 10% primary .I'esponsibili-ty PSP-?infonmtion Overtime, Team 130 began to participate in the in other Ways. For example, Team 10 occasionally submitted. telephone numbers and Internet addresses to the NSA to be searched. against the bulk metadata collected under the PSP. The NSA conducted independent analysis to determine Whether telephone numbers or Intemet communications addresses Submitted by Team 10 met the standards established by the Presidential Authorizations. Team 10 also regularly contributed to PSP process by reviewing draft reports and providing releVant information from FBI databases. FBI ?eld a .. u. not required, to investigate every tipper by Team 10 under th project. Rather-,5the type oflead thatcthe EC: assigned??"aetion, "discretion or "for the ?eld of?ce?s b1,b3, b7E b1, b3, b7E b1,b3, b7E b1, b3, b7E response to 'arippeys The vast maj avastigative actirityrelatedrp-Psr informationrnwolved reaponding-t "telephone, number tippers that assigned. action leads, Teanrllil'generally 'sagned?acuon leads for telephone numbers that We?re not alige?idy'lniownrto the FBI Dt-tele'phonesnumbers' that Team 10 otherwise deemed a high priorityShannan-number tliatshadia rate a; major FBli'inve in approximately was established,- ins'truCted t?oobtain far the telep, a I Withinits to conduct-any "legisal investigatibnto detenninetelroris't' connections??. Some-agents complained that?action- leads lacked guidance about how-to make. .use-oftlte tippers, which Was ef?pj?a?rtieular concern because agents were noteon-f-ident the ommunieations provided suf?cientpredication to open national security hivestlg'ations. I es to-FBl?procedures--i112003 addressed some FBI agents' concerns. FBI?Headqttalters assUmed responsibility from field offices rmrissurng nationalisecurity letters to, obtain subscriber info t' b1, b3, dltelgephone- numbers comlnuni'cationsaddressesr- b7E the-Attorney national es 1ga 10.118 thatereatedaunew category of inves?tigatitre activity Called a "threat assessment" .ntler? a threatassessment, FBI?iagents are authorized to 'inVestigate 0r Collectinformation on indittiduals, groups; andorgariizations investiga - - a it not opening a preliminary nationalsecutity 'investigatiOD. Beginnin? assignedb office 0! thlje .- asseis'sme'nts and advtsed that FBI headquarters wouldissue NSLs to obtain subscriber information general,;an iiwolved-searching several public, and Commercial -.databiases:for information about the tippedtelephone number, and requesting that Various state and 100511 government entities conduct similarsearfches. Sometimes these searches identified theisubscriber to the telephone-number befOre FBI Headquarters sobtained?the information withan NSL. In otliertcaSes, the threat assessmentsr continued-after the. ?eld-office. received the NSL results, Th eads frequently were closed after conducting a threat asseSSment interViEW with the subseriber and determining that there was no news to terrorism or threat to national security. In other cases, the leads were closedhased solely on theresults of database checks Beginning BI ?eld of?ces Were required to report the results of their threat assessments to FBI headquarters. FBI field of?ces typically reported b1, b3> b7E all of the information that was obtained about the tipped telephone numbers, including the details of an},r subscriber interviews, and then stated that the of?ce had determined that the . Two chem b1, b3, b7E An action lead instructs an FBI ?eld of?ce to take a particular actionin response. A discretionary lead allows the :?eld?ol??ceto make a determination whether the informatiOn provided warrants im?estigative action. A ?eldtoffice is not expected toatake any speci?c action on a for information. lead. 29) tailap'h011ernumber?didnot and Consideradthe;lead-0103361 Much .Ia's?s'ifrelcllujcn??y, ?eld 'of?ces.f6p01f6d that tof 'intemati?liai terroriSm threat assi?ssmant, 15the result-s; of-th?e threat- assassm?nts and the infon?ation that was poll'e?cted about subscribers":generally andsup'loadcd to FBI .databasas. P-fa?iainatbn in the . Frasi?dentfas?uminame ?P?rcgram C913 (I) i i 3 i ?wan?m 31] 3-2 '?gfiuitto-thssUnited-Stat a. i i The 1G. found that, the ODNPs primary role wasthe preparation tln?eatrassessnrents, that smii'marized the ?aleQal-ida'. threat to the United States and were Used torsuppert periodic reanthori?zation of-the' program. The- If} the-threat assessments were drafted by experienced NCTC personnel who. prepared the documents-in a memorandum style-following an. establishEd Del format. The also determined that the ODN-I?threat-assessrnents were preparedusmg revalnatedintelligence information Chosen-from .ajwide Variety of 71C Sources ODNI Psrsolmtl?said the incri?d?when' the ODNI preparnd theiithreat assessmentsg?the to ?1111)! evaltiate'd' intelligence-inat- cited; an assessment that The NCTC said that they handle NSAvsurveillance consistent with the standard rules and procedures forhan tiling NBA intelligence information including minimization of US. person identities. On those occasions when the NCTC knew that a particular NSA intelligence product was derived from the PSP, the told us they reviewed program information in the same inarmeras other incoining NSA intelligence products. If appropriate, NCT then incorporated the PSP information into analytical products being prepared for the Director of National Intelligence (DNI) and other senior intelligence officials. They identi?ed the President's TerrOrism Threat Reportand the Senior EXecirtive Terrorism Report as examplesof the types ofi?nished intelligence products that would, at times, contain PSP- information. The President?s Surveillance Program and the Foreign intelligence .2 p. a initially withthe court?s directed. diavel'oped to as. ?scrubbing?? 4 prd??diif?k-fd210601131th15 and make the court aware-of instanCes WhenPS?Pvde?ved information Was} included in FISAappiications; Lambenh required that all, 'appiicatiens diet-contained PEP?derived infoifmation, or that Cblieciien against particular targets 'under'botli the Psraada only, narrate-nag that Lambeith wanted-to be informed of?appi'icatiens diat.,ccnta.ined? P3Pinforn1ation and of dual coverage situation'a AccOrding tcB?aker, the. scrubbing were 'arineans of meeting his ethical duty of Gender to the. Without ?disclc's'i'n' the existence-of the PSP touncleared judges. i i W. 7 Do} effectuated the scrubbing procedureslay-compiling Lists of information contained in initial and reneWai FISAapplicationsthat was attributed to the and?o'ffall facilities surveillance: in the applications. Thes?e?li?stis' weresent to the NSA to determine Whether any of the was Whether anyof the facilities- also We're targeted under- The NSA ccnununi'cate?d' -the results back to ?led, the applications with. theF 'ccnS'istelnt with the scrubbing procedures. .- i - Kollar?KOtel 13': continued the procedures thathad been Baker-and agreed- to by Lainberthfor handling PISA applications thatcontained deriv?ed?iinfOnnation. required to excise applicaticnsany information. obtained or derived from the ButKolilarv?Kotelly also? instructed Baker to alert her to any instances where an applicati'cnisbasis for the requisiite prbable cause'showing under FISA Was weakened by excising?PSP information. cases, {Ko'llar?Koteliy Would then ascess the application with the knowledge that additibnal relevant information. had been cXcised. .. llar-Kotelly also instructedDoJ to discontinue the practice "l ludin ina licatio'ns a descriptive phrase associated with 1, b3, . pphcatlons were b7E also targeted under the PSP. Baker to as that while Kollar?Kotelly understood that instances of dual coverage would occur, she did not want to appear to judicially sanction coverage. . . I In. March 2004, Kollar~Kote113r was infonned of operational changes made-to the PSP following a dispute betWeen DUI and the White House about the legal basis fer certain aspects of the program. Kollar-Kote?lly responded by imposing an- additional scrubbing requirement to further ensure, to the extentpossi?ble; that infatuation-was not ineluded in FISA applications. The FBI, in coordination with D01 and NSA, was to determine Whether a facility included 'ina FISA applicationm-not just a targeted telephone number or Internet communication addreSSQ?also appeared. in a PSP report. Ko?llar?Kotelly permitted any such facility to remain in the application if it could be 5?2? TF1 nix? r??h?ikl?T'. - - Fix a I LWV :?vi'u I $1 demonstrated thattithe FBI had developed, independent of the PSP, an investigative: interest insthe facility, or "that the FBI inevitably would have identi?ed the facility in question through nerma?l investigative. steps. Ans GIPR?ofticial ?Who was responsible'for discussing KOllaraKotelly told itsthat the judge generally accepted Delis assessment thatithe're: Was a ngonePSP a facility in qtlestion, or that the facility inevitably Would. have been discovered'evenin the absence of PSP?deriVed leadseto the EBL {SW-Implementing? the scrubbing procedures, both under Lamberth and Keller? Kotelly, wasa complicated and. titne~c0nsu1ning endeavor for OIPR staff, Baker, who until March 2004 was theonly individual in}.OIPR..read into the PSP, foil-1nd himself "having. to cash attorneys to compile infonnation aboutthe?ir cases,.,and sometimes to make - 'ehanges -_t_oj their PISA applications, without being able: to provide {an explanatimi other than that had spoken to the .Attolney General and the about the-situation.- Baker regularly told-attorneysthat-they did not have-to s-ignappIiCations that they'were not comfortableavith, and, insome instances, international terrorism cases had to be reassigned fotzthis?rreason a Thesit?ua?tion was furthercomplicated by the fact that, until August ?2003, Only One-of the We statute to ?approve:?FISA applibationse? Ashcroft and Deputy Attorney General. Laney Thernpsonmwasreadr into 'theiPSE. Thompson, who served General ?out May-2001 to August ?2003, was nevepre'ad-into the'PSP, despite .As-hcroft?s request to the White House. - Similarly, KollanKotelly, who by November handling appro?matel: percent. of all appliCations as a result of her requirement that filed with her onlmmade unsuccessful requeSts .for?adclitional FISCV'judgesitobe cleared for the program. KollanKotelly' decided inNoveinber2004 that. inev?i?ex'vofthe scrubbing procedures that'WBrie in operation, applicationscould be decided by other judges based on the infermation contained in the applications. 7 D01 together with theFBI and the NSA, Continue to apply'the scrubbing procedures to international terror-ism PISA applications. Since January 2006;, all members of the F180 have been. briefed on the PSP and all of the judges handle applications thatinvolve the issue of PSP?derived information. Although compliance with the procedures has been burdensome, we did not ?nd instances when the government was unable to obtain PISA smweillance coverage. on a target because .of the requirement. However, the Do} IG concluded that once the PSP began to affect the functioning of?the PISA process, OIPR and the FISC effectively beCam?e part of the operations, and more OIPR staff and FISC judges should. have been read'into the PSP to address-the impact. Instead, access-to the PSP was limited forjyears to a single of?cial and one FREE judge. issf?i?ies Associated With ?the. Pteeiti ent?313urveiilanee Program to; was aware as earl-yam that for under Rule-16 of b1, b3, b6, b7C, b7'E 1, b3, b6, b7C b7E attorney/swim ?thegPSP'tmtilmid-20045 and asa result,_DoJ did not have aeoess torthe advice ofiattoi'neys Who wei?etbjest eq?ippejd to identify and examine discovery issues aseiati' lieves.that,.sineeth must reexamine past cases to see whether potentially undisclosed Ri?e 1601' Brady material "was collected by the NSA, and take appropriate steps to ensure that it has complied with its discovery obligations in such cases. The Do] also reoommends that Do] 'inco ordination with the NS A, implement a procedure to identify PSPederiiVed.inf01'matio1i that may be associated with international terrorism cases w?q '11?rryiu an uu In "sum in ?Ir-Hurt" II .. n\ 36 opinions the ?ssinnptionthatIEISA ,di? glm?cn?yp?ndiugp? HWY ?60 inzthe ?ame and Evaluate:Wining-such . informationshoum 1.53 idijsc?losed in. light: Of't?e Rub. ?li?iand-Br?dyt SURVEILLANCE: {2003+ 261M), V. I Of?cials: onthe Eon: ?theprogran?s 'inq?ption'in Octuber: 20.011; ?uctugh Yaw-s, i'nnMay'ZOOS'. Upon Ybohad?pamire, Patrick Ph?binjwasv's?tall?t?ed to .assumeYod?s 190166.213 adViSorato General; Concerningthe Philbin legalmsmorandu?israbout flies?'S'P?, he realized thatYOo had Omitted from his analysis any referenceto-?ie, FISA. provisicgsn gdays following declaration of mm- 53?? {1811 .1) 4' ar? but prbuamym wmxmuwll is ?jfjeif??foiia?advi?sed Aslicrqut to continue t9 cartify the program??aszt? Bli?binalso reconunandadt'hst- a new OLC memorandum assessing the legality of the ESP .a Tbegtdr?a??d, and With Ashcro??s drafting the? memorandmm (U), A?New Legal sis-is. for the: Pragmm us Adopted GoldSm-i'th was?swom in as the Assistant Attomey General :63Qc?g13317?2003, replacing. Bybee, W110. hadJe?It-that pOSitiO'n saws vasfagjud'ge th?US; com Qf Appeals-?01! the Ninth-Circuit. Philbi?stOIdEUszth'afihe :fO have rgsdint?o the and that Addingtonrtp'l'd Wd?ld ave: must-ifs! thearequast? before take itifb a: 'de?i?ibii?. read Goldsl?i?l into the program-011 1372?Novembcr2003. in ii" memorandums andPliilbin?sdnew wrann s. s. 1-. nuvuthH-ul nun my? in WW 38 Judlqlalaut Litigation fail Within any of the exceptions to this requirement. mete-in av EfMay' 2004 legal memoranduln reassessng the legality of the pregtmn: theta 151701361? analysis ofthe P8P ?must not censiderFISA in isolation? but rather- Congress, by authorizing the use of military force against al?Qe?ida, also ?effectivety exempts?isuch stirVeiHanee-from PISA. Goldsmith believed that this feeding ?Oi'f?the Was eo'nfeetibeeau?se the AUMF authorized the-President to use ?all appropriate-force? against the enemy that attacked the United States 011 71-1? and to ?prevent any future acts of international terreriSm against the t1: :Stateg? bysucih 01511:)! 'thatrhas. long been recognized to include the'iuse aj'sxa- military to 0'1. Altemati-vejly,Goldsmith reasoned that even if the - V'p?rbgr?ai?n {tom the restrictiensimpOSed by PISA, the ambiguous to wanza?nt the appliCation eftthe deetrine- 07f . 7 1' onlthoDoJ officials ina position to briefing: Airtime}; General and Vinnie-Housaof?ciatsen tithe their-legal: . rami?cations fer the. operationofthe program; Goldsmith . the: program, Ashcroft-should: certify the Morization. tier adv'iSed'Ashcro-ft to eertify the 141 anuary 2004authcirization as well. Goldsmithtold =us?thathemade these recommendationsro Asheroi?iwith- the Caveat that 'althougli;.11e he'lieyedYoo?s lneniorandunis to?b'e ?aWed; G'Ol?dsmith' hadnot yet the pro gram itself was . integral. (it) Department of Justice attic-tale-Convey Concerns About the Program to the Whte House in December 2003, Goldsmith and-Philbinmetwith Addington and Genzal'esatthe White House to eXpre'sstheir growing ceneer-ns about?fthe legal 7 und?lpinnings for the program. Goldsmithsaid he toldthern' that notsure the program eodl?d? survive in its current form, According to-Goldsinithis- contemporaneous notes ofthese. events, these discussions did.th contemplateg.an intenuption of the program; although the White House of?cials represented that they awould"?ragree' to pull the plug? if '?i?eproblemswiththe program- Were.'fonnd to be Goldsmith toldns that the White Housemtypically thrOugh Addington?e??told hirn ?several times?ithat it Would-halt the pro gram if Do] found that. it; could notbje legally Suppiorted.? I 011 18 December andi Gonzales and: Wrote in his - notes that during this meeting he conneyed'Wi?r ?hnore force?" his ?Seriousngubt'sandi the need to seen-as, possible] 3? Goldsmith told us that- during this meetinghe also asked to have Deputy Attomey?General'Cemey read into the program. .Acc?ording to Goldsmith-Emotes, Addington and Gonzales ?brist1e[d]? at that suggestion. Goldsmithtold us that he requested that Cor'ne?y?b?e read in because he believed he would need 'Conieiy?s assistance to help ?make the case? to. the White House that the program was legally ?awed. pIn?addition,? he Said he. wanted Corney read in because, as the Deputy Attorney General, Corney was Philbin?s direct supervisor. . Goldsmith?s efforts to gain the White House?s permission to have additional attorneys, and especially Comey, read into the pro gram continuedtln?ough January 2004. According to Goldsmith?s notes, both Addington and Gonzales pressed Goldsmith on his reason for the request and continued to express doubt that additiOnal personnel were needed. However, in late January 2004 the White House agreed to allow Comey to be read in, and Conley was briefed into the on 12 March 2004 by Hayden. ?A??er'his J'brie?n?g, Conley discussed the program with Goldsmith, I?hilbih, DrillerDied-of?cials . and agreed that the concerns with were well." - Conley told us that of particular concern to him and Goldsmith Was-the notion that Yoolis legalaiialysis entailedfiignorh?ig an act of -'Gongres,s,- and-doing?sewahout .?Jll C-Q?gi-?GSSiQnalinoti?cation-- the Department.ordus?ee an'd?the'White House Over-the Program EQmeytold us that he met with Ashcroft fer lnnolron to discuss "thee-ESP; andthat Ashcroft agreed with Conley andthee other .Dolibf?bials.? assessmenth thegpotential legal problems with the program. Three hours-after theh'luneh meeting, Ashcroft? became: ill: and Was admittecl. to the George Washington University Hospital; 173" On Goldsmith advised Conley by-niemOrandumithat raiderthe circumstances of Ashcroft-ls'niedical condition and hospitalization, .a-?clear basis? exercise the audioritiesrofthe-Attorney General alldwed by law as Deputy Attorney .G'enerallor ActhingttorneyGe?neraL The ?cc? line of Goldsmith?s? memorandum to Comeyindicated that a copy of thememorandum was sent to-Go?nzales. I a . On 5 March'2004?msixdays befOre?thePrjeSijde sinef?fe?ct- asusctto Philbin .ine?t- With '6 the-? nt-ial Authorization then. Later-?that day, Gonzales called-Goldsmith to u?om ULL. Stating-mat 1? 00's prior OLCopinions ?covered the program.? Philbin told us that Gonzales was not requesting a new opinionthat the program itself was legal, but only a letter stating that the prior opinions had concluded that it was. other of?cials inciuded? Counsel for Intelligence Policy Baker, Counselor to the Attorney General Levin, and Comey?s Chief of Staff Chuck Rosenberg. Both Levin and Rosenberg had been read into the While at the FBI. Comey also discussed DoJ's concerns about the legaiity of the-program With FBI Director i .Mueller on 1 March 2004. Mueller told us that this was the ?rst time he'had'b?een made aware of'DoJ'sconcei-ns. ?3 CU) Ashcro??s dots-tors did not clear Ashcroft to resume his duties asAttorney General until 31 March 2004. r, As a result of ?G'onzales? 3 request, Goldsmith, Philhinq and .Comey re? . :_exami11ed??cpts memorandums with a View toward they adequater described theaaetual colltecti on activities. of the NSA under the Presidential Autliol=i3at10ns. 1 onelttdedithat'?ieinemorandums did not. According. to Goldsr?riithj the concl?S?ion t""aceu1?ately describe, letal?oneprovide meant-that OLC Could not tell the WhiteHOuse- that the '1 grant con neon inne- un 1 her-it? of those legal" 0116 March-2004, Geldsmithaand Philhin, withComeyisconcurrence, end'?onaale "their .. ?Accosdmg?to moiusmn-n 3 news, Adding?toi onzales reacted enemas said theywonld get On Synday; 7?Ma1?Ch 2004', Guldsmith and Philbin met again with Adding-tori and Gonzales at ?the'YWhite House ?AccOr?ding? to Goldsmith, "the White House of?cialsiinfonned Goldsmith: {mdPhilhin that-they- diSagreed with their interpretation of Yoe?s memorandums and on the need: to change-the scope of theNSA"s collection under'the PSP. '1-Onf9lVIarCh?2-OO4, Gonzales Called Goldsmith tothe-White House in-an effort him- that?his criticisms of Yoo?s immoralide d-th Yoo?s to persuade After" than: as Gonzal'eslnejxt"argued tore ten-nay cringe it; get pastitlie expiratien ofthe current. Presidential Authorization on 11 March 2004; Gonnales: reasoned thatAshcroft, who was still hospitalized, wasnot in any conditionto Sign a?renewal of the authorization and that a ?30-day bridge? would move the situation to .Ashcro? would be Well enough to' approve the program. Goldsmith told Gonzales to recommend-an extension because aspects offthe program lacked legal suppert. I i I At noon on 9 March, another meeting was held at the White House-in Card?s-office. According to Mueller?s notes, Mueller, Card, Vice President Cheney, Deputy Director of Central Intelligence John E. McLaughlin, Hayden, Genz?ale's, and other unspeci?ed of?cials were present. Comey, Goldsmith, and Philth were not invited to this meeting. After a presentation on the value vas ?lained to the group that Corney ?has problems? with Mueller?s notes state that the Vice President suggested that the Prern ent may haVe to reauthorize without [the] blessing of Del,? to which Mueller responded, could haVe aproblem with that,? and that the FBI would ?have to review legality of continued partiCip?ation in the program.? 'f A third meeting at the White House was held on 97 March, this time with Conley, Goldsmith, and "Philbin present. Gonzales told us that the meeting was held to make. sure that Cemey UnderstOOd what was at stake with the program and to demonstrate. ?itS-va'lue. Comey Said the-Vice President stressed that the program was ?critically tene? AW z:er fn\?i\?li\?f?\?lFlf?l\inHKii I I 1? l.l\l II 1' Ir?' . 42 important-l and Warned-that 'Coiney Would risk ?thousands? of lives if-he did not'anree to I 7 "eating-that he, as Acting ?colle,ctilon.w cealdin?or agree. to that mainstream. I WG?onzales told us that alter-President-Bush was advised of the results of the 95Marc1iineetings, he the Vice President on the memingof 10 March to call a meetingwith congressional leaders to advise them ofthe hnpassiswith 't?hat afternoon, Gonzales and-other Whitelelouse and of?cials, including Vice President. Cheney, Card; Hayden,McL augh?li-n, and Tenet, convened an ?emergency meeting? with Congressional leadersin the White House Situation Room. The Congressional leaders in attendance Were Senate Majority?and'Minority Leader's William ?Bill? Frist and ?TthasgA. Dasc'hle; 'S'enateSeleet Committee on Intelligence Chairman PatRobeitS-ancl Vice-Chainnan John D. Rooke'feller, Speaker of the I??IouseJ. Dennis Hastertand?House Leader! Nancy Pelosi?; and House Permanent Select Committeeon Intelligence ChairP01ter=C305s and Rar?dngMember Jane Harman. No Del of?cials were asked to be presenter theirneetlnse . According to GonzaleS?snotes ofi?the meeting, individual.Congressional leaders heir-pressed?loughts and, cohcemsrelated to the program. Gonzales toldus that the was thatthe program should continue. GonZ?l?s also said that following- the Imeeting?with Congressional leaders, President Bush instructed. him and Card, to go to the George'Washington Uniirersity Hespital to. speak to Ashero?, who was. in the intensive caretunit.recoverin from surgery. Accordingto notes from Aslicro??s FBI security detail, at 18:20 on 1&0?March2004, Card called the hospital and spoke with an agent in the security detail, advising the agent that President Bush would be calling shortly to Speak With Ashcroft. Ashcro?e wife toldtheag'ent-that Ashcroft would not accept the call. Ten minutes later, the agent called AShcroft.?s Chief of Staff David Ayres at to request that Ayres speak with Card about the President?s intention to call Ashcroft. The agent conveyed to Ayres Mrs. Asher-offs desire that no calls be made to Ashcroft for another day or tWo. However, at 18:43, Card and the President called the hospital and, according to the agent?s notes, ?insisted on speaking [with Attorney General Ashcroft].? According to theagent?s notes, Mrs. Ashcroft took the call from Card and the President and was informed that Gonzales and Card were coming to the hospital to see Ashcroft regarding a matter involving national security. (U) At approximately 19:00, Ayres was advisedthat?Gonzales and Card were On their Way to the hospital. Ayres then called Comey, who at the time was being driven home by his security detail, and told Comey that Gonzales and Card were on their way to the hospital. Comcy-told his driVer to take him to the hospital. According-to his May 2007 testimony before the Senate ludiciary Committee, Comey then called his Chief of Staff, Chuck Rosenbergand directed him to ?get as many ?ofmy' peopleas possible to the hospitali?immediately.? Gomey next called Mueller and toldhim that Gonzales and Card were on to the hospitath see? Ashcroft, and that Was in no candition-to receive visitors, much 1655 make a decision about Whether to recer-tify. the PSP. AccOrding 'Comey asked Mueller to come to the liespital to ?witness [the]. condition ofrA'G.? Mueller told'Comey he would go to the hospital right aWay. (U), Corney emitted at the hospital between 19:10 and 19:30. C'omey said he began speakingto Ashcroft, and that it was not clear that Asherofceould focus and that he ?seemed?pretty'bad off." Goldsmith and. Philbin also hadbeen summoned to the-hospital and arrivedrwithin' a few minutes of each other. Contey, Goldsmith, and Philbin met briefly in an FBI ?command post? that had been set up in a room adj acent to AShcroft?s mom. Moments later, the command post was noti?ed that Cardand Gonzales had arrived at the-hospital and were on their way upstairs to see Ashcroft. Comey, Goldsinith, and Philbin: entered Ashcro'ft?s- room and, according to Goldsmith?s notes, Comey? and the others adviSed Ashcroft ?not to sign anything.? (U) Gonzales and, Card entered Ashcrotl?s hospital room at 19:35, Gonzales told us that he had with him in a manila envelope the ll March 2004, Presidential Auth01?i2ati0n for Ashcroftator-sign, According to Philbin, Gonzales ?rst askedAshcroft how he. was feeling. Ashcroft replied, ?not- Well.? Gonzales then said words to the effect, ?You lmow?, there?s. a reauthot'i'Zati011 that has to be renewed . Gonzales told us that hemay also have told Ashcroft that White House of?cials had met with Congressional leaders ?to pursue a? legislative p; homey testi?ed to the Senate Judiciary Committee that at this point Ashcroft told Gj'onzales and Card ?in. very strong terms? his-objections to the PSP, Which Comey'testi?ed. Ashcroft drew from. his meeting with. Comey about the program a week earlier. Goldsmith?s notes indicate that Ashcroft. complained in particular that collection activities exoeed?ed the scope of the authorizations and the memoranduma Comey testi?ed that Ashcroft- next stated: ?But that doesn?t matter, because I?m not the Attorney General. There is the Attomey General,? and he pointed to me?I was just to his left. The two men [Gonzales and Card] did not acknowledge me; they turned and walked ??om the room. (U) Moments after Gonzales and Card departed, Mueller arrived at the hospitaL Mueller met brie?y with AShcroft and later wrote in his notes, in chair; is feeble, barely articulate, clearly stressed.? mAme??mP?n Fe ?an n-r- I- mun-.1 amt - Belbreleoving aloe-ll'ftom Card; Comey testi?ed that gCatcl washer-3r upeet'. and. demandedithat- Coniey some: to." theWh?lite immediately. Comey told?Cartl'that he would meet withfhimlihut not ?wlthoutia?Witness, and'that he that; witnees to he: Solicitor 1'1 General Theodore Olson. Stanley-and the otherIDoJ of?cials atQO: 10 'erldifmet 31:13.01 They were - joined there by Olson. Del-mg this meeting, aeall?eame??m the Vice Presidents: Olson, which ClsoutdOlc one? game line-Jo Condeyie of?ce while Gerrieywaited outside. Carney toldus. he believes the Vice:PteSide11t e?feetively teed; 013011 into itheprogram eating thatconvers? ation.? Come?y and Olson then {vent at atom: 23 :00- athet- With GonZal?s'and Card..- Gonzaleet'old 3113 that littlermote was achieved at this meeting than agenerel aCknoWledgement that-21E ?siluatiori?n'contlnuetl to ij?St?b-?GauSB between Doll audithe Whitelrlouee regarding the pngram. White-House Gelmse?l Certifies Presidential Authorizatieh Without Department of Justice concurrence .: 37 . 1 .. "i the morningvof ITMm?eh 2.004, with thelh'efsidential Authorization set-to, expirellh'eeldent'BUSh signedanewauthorization Ina. depemlre from the past practice of having, theiAl?tomey General certify:theieuthoriZatlon as to Form and. legality, the 11. Marelrau'tliorlzation was certi?ed by Whi?te-HoueeCounsel? Gonzales. "Thell March authorization also prior.authorize?1310115kin three-other: respects. 3 i - The ?rst-signi?cant difference between the '11 Match 2004f (Presidential Authorization and prior rautliorlzatjims explieit assertion thatthe exercise of his. Article II- authority ?displ ace[s] the proviSions ref-law, Surveillance Act-sand'ehapter 1159 of Title 18 of cede (ineluding {5251 1(1) relatihg-tO-exdusiVe the extentof any con?iet between the provisions- and such exercises under Article SubseQuent Presidential Autlmrizatious did not include this particular language. 7.. . - .1 Second, to narrow the gap between the auth?o?ty given on the face of prior authorizations and the-actual operation of the program by the NSA, the terms governing the collection of telephony and Internet metadata were clari?ed. The language for ?acquiring? both telephony and Internet metedota remained as it had been, giving the NSA an?mr?ity to ?acquire? the metadata: .. -- I. 3' ~?gtl m. I aim Prim. Ht m1. A r. 03 rl?x?y" 1?3 I L. '5 MW Nks?l'??s . When?f) at least one~panyrto Such conn'mmicatio'n isoutside- the UnitediStates; (131111013th .?to such communication is. ?11de to be a citizenoftbe United States, or based 0n the factualand practical Considerations ofeveryday flife"ion whiel'1;reasonable and-nprud'entipersons act, there are-speci?c and facts givingyreason Such. communication relates to inter-national terrorism, or activities "in grep'aration "therefor. .[Pres-itlentfal Authorization, -1 .1- Maren 2004,13211'21. 403).] Heweve?r,thisllanguagewaa new quali?ed by the following two subparagraphs: the Department of Defense may obtain, and?.tetain headerlrouteI/addressingatype info ti 1d, nse?dialiA?llch -. 1+eml?fr11 bt?aitc?d . type..mfonnatlon,, hlcludin'g telecomnmr?cations dialing-type- data, shall Occur. only in accordance with this authorization; and (ii) information, including data, .is ?acquire: for. ,purpbse's: 403) above when, and only'when, thelDepartment of Defenseihas searched for and retrieved information, including telee ethnIuI?eations dialingatype- not when the ssingetype 3 B?data, 04 authorizatio for the ?rst time scught: to te phony and Internet I out the metadata colleCted could only'be in accordance with any of the three conditions set forth in. ..s. .1?53. 2.- {4153 1.1"the third departure-tram prior.air-alternationswas 'theiaelus'ion ofa Mersey General of the to roan-sad legality [?li?zPIjiDI authorizing the'sarne activities as are extendediby? this Jauthorjiza?m.? (Id. at para. Card. informed Carney? by telephoneon the 11 March 20045 -that-theL-P:esidenthad signed the at: approximarery razed "Gonzales =?eal_1ed- .Goldsn?tlr to infera?n him, that the President, "in?i'ssning the authorization, hadmadeian interpretation of. law concerning his authorities and-that-DQJE should not aetzi'n, contradiotionof the Presidentis determinations; a Also" at 12:00 on-lii March, Mueller :a't the?mtite-Honse. According- to Muell'er?s notes, Card summoned Mueller to his of?ce to bring Mueller up. tordate on-therevents of the including the brie?ng of the Congressional leaders thesprior afternoon and the President's issuance-of?le new authorization without DoI?s'certi?cation as to legality. In addition1 Card told-Mueller that-if co?ld; be faundby 6 May 2004, when the .Mareh?authorizatien was set to expire, the program. would be discontinued; 4: AceOrding to Mtieller?s-no?tes, Card- aclmOWIedged?t'o Mueller that PresidentlBush hadsent him and Gonzalesto the,ho'spita1toseek; Ashero?is Certi?cation for. the-1 1 March" 2004 authorization, but. 'tlratAs?l'mro?gh'adsaidhe Was too ill. tog?make the: detennination an d-that Carney Was the AetingAttOH-tey General. Mueller: wrote. thathe the failure to? have Do] representation at: the?ongressional brie?ng and the attempt to haveAshctott certify the" without going through Conley ?gaVe the strong-perception that the [White House] was trying to (loan end run around. the Acting [Attorneys-General] whom they leiewite have serious concerns asto the legality of portions :oftheprogranr.? Card responded that her?and Gonzales were. unaware at?the time, ofthe hespital visit that Carney. was the Acting Attorney G'Cnefral, andthat they-had only been following the. directions. President. Severalsenior Del and: FBI of?cials, including Conley, Goldsmith, and Mueller cohsidered resigning after- the 1 1' March 2004 Presidential AuthoriZatior-rwas sigriedeithout DoJ?s concurrence. Theseof?cials citedas reasons for considering reSignation themanner in which the White House had handled its di5pute with 1301 and the treatment of Ashcroft, among other reasons. On 12 March 2004, Mueller drafted by hand a letter stating, in part: ?[A]fter reviewing the plain language of the MBA statute, and the order issued yesterday by the President . . . and in the absence of further clari?catidn of the legality of the program from the Attorney General,.I am forced to withdraw the FBI from participation in the program. Partners-should the President order-the Continuation of the participat?iOn in'the Prostate, ??ndi in the-absenceo?f further l'e galadvi'ce from "the AG, I Would be "Constrainedito: resign asDireetoreor?ie Mueller told ?us he- plannedon having the letter typedand then tendering-it, but that based on subsequent events his resignation was not necessary; .7 .i .Muellersent Comey a memorandum seeking, guidance on how the FBI shouldproceed inilight of developments. related to the Presidential AuthorizatiOnst The I memorandUmaSked ?Whether FBI agents detailed to theNSA to wOrlc on the PSP sage. b1) b3) - Should contii?i'" - based 0' b7E and whether On" {hemoniing of '12 March, Comeyand Mueller attended?the regular daily threat brie?ng-with thePresident in the Oval O?ice. Comey said that, following the brie?ng,PresidentBush called him into the-President?fspriVate study for" an ?unscheduled message-r Conley told the President of DoJ?s legal coneerns regardingthe-PSP. According tozCom?ey, the: President?s response indicated that he had not been fully informed Comey told the PreSi'dent that the President?s staff had been adVised of these issues ?for weeks.? Ace?0rdin?g ?to- C'omey, the Presidentsa-id that he just needed-untlil'rMayt-ig (thedate of the nentgauthorization), and that if he could not get C'orng?ress'rtof?x PISA by {then he would shut down the program. The President emphasized the impedance of'the program and. that it ?saves lives.? 7. 1 The President next met wi?tMueller. According Mueller President of his concerns regarding the continued participation the-program?withoUt- an opinion from the Attorney General as to its legality, and that he was considerimg resigning if the FBI were directed to continue to participate without the: .concurrenCe of the Attorney General, The President directed Mueller to meet with Cemey andzether principals to address the legal concerns so that the, FBI could continue pattieipating?inthe program ?as appropriate under the law.? Comey decided not to direct to cease GQOperati?ngr with the NSA in conjunction?with the PSP. Comey?s decision is. ,doemnented'in a on'eupage memorandum from Goldsmith to Comey- in which Goldsmith explained that the President, as Commander?imChief and Chief Enecutive with the eo?nStituti'onalduty to ?take care that the laws are faithfully executed,? made a determination that the PSP, as practiced, was lawful. Goldsmith concluded that this determination was binding on the entire Executive Branch, including Comey in his exercise of the powers of the Attorney General. a The same day, an interagency working group was convened to continue reanalyzi'ng the legality of the PSP. In accordance with the President?s directive to Mueller, of?cials from the FBI, NSA, and CIA were brought into the process, although the OLC maintained the lead role.? On 16 March 2004, Corney drafted a memorandum to Gonzales setting out Comey's advice to a at in the PSP. Come: advised: - an as a. Carney was ongoing 'eotllectgtanget raised??serious iSSLtesi"?bout Congres?ieealhe??c write the egal? besiefOrthe pregram ie the. tofaussei't?hie authorityto override an otherwise appl'ieabte Act-of; 1?1 1. c1 Gonztiles' letter 011th eyeuhig of 16' i'Merch. Thelettetstat?ed; part: nleInOI'andum appears to have?beeubased on. a misunderstanding of the President?s expectations regarding? the "conductof?the Depattmentt of Justice. While the'PLfesident? Was,? and-teinai?ns, interested in. any thoughts the Department o?fHJLIstieemay ha?veon alternative Ways to achieve effectiVely theg-oa'l'sef the activities. authorized by the Presidentiala Authorization of March 1 1, 2004h't11e President has ad?dreSSe?d d??nitively' for the. EXchtiveiBtaneh in. the Presidential Authorization the of the law. PteaidentialAuthorization; I I . 01119 March 2004,, the President signed, egftfi?ed-as- to and legality, a~1nodi?oation of the 11 March 2004. Presidential A'LithUtiZation. The modi?cation made two significant changes to therctirrent eumorization Ong?lMay..2004, Goldsmith and completed an OLC legal ofthe are it was then operating. The memorandum statedthat'the passed shortly after the attacks of 11 September 2001 gave: the-President: authority to use both domestically and abroad ?all necessary and .appjropriateafoifceg" includingss-IGWT capabilities, to prevent future acts of international terrorisIn again-st the. United States. Ac'cording to the memorandum, the AUMF was properlyread as an expresSjauthoriz?ation to. conduct targeted electronic surveillance af?liates, the entities responsible for attacking the United States, thereby supporting thePresident?s directives to conduct these activities under the PSP. MirohyofftIE-ilegal? reasoning the 6 May 2004 OLC memorandum was publicly released by DoIin a ?White Paper?L??Legal Authorities Supporting the Activities 'of the National Sfe'eintity Agency Described by the on 19 January 2006 after the content at" ?V?tm?l Nl' il'?'llf'iw? . . . mum unn- I In uinn ?lb 1! "1?53 egllection pbrtiQIl-thh?prngam' was Yarkames and :?c?on?nned by 'the.?PreSitleiit in ecember 200.5 . I (U) Restrictions; en: {homage to: the President's-Surveillamce Pregr'am lmpetled Department ewusnce Legal Renew 7 1 i? . ., The DOI found it extraordinary andinappropriatethat?a-single D,le attainey, John. Yon-,- Was irelied'uPonto conduct .tli?e initial legal asses slmen?tsof theiPSP; and. thatlt?helacksoftoversight-and review of work, which centnaryto.,t11e - enemaeg practieegof contributed to a) legal analysis .ef?leFP-S?P that, at a minimum, was facthally ?awed, De?ciencies in the. legal mommvendums b'ec?anieepparent once additional?DbJ attorneys werereedinto the program a operation. The White ?Houseis strict controls over .the?PSP Del ?3 ability to provide the base-availab 1e: .a'dVice'aboutithepro grain. The 1301 IG 1 also .coneludedth?atthe circumstances: plainly ;calledfor-additionalDel resources to he applied to the? 11eg?ilvreView ef?thespi?ogem, and thatxit-was theAttomey .General?s.responsibility tube-aware ofthis need toltalce steps to. address it; However, the Do] DIG could aggressively Songht-edditional. teed-Aims to "easier with legal review?of the-program prior to 2003 ec?ause Ashcro'?did'not agree to be .intenrieWedL I SURVEILLANCE To FGREIGN SURVEILLANCE ACT AUTHORITY Internetj??etadata collection. Transition to; Operation Under ?Authority v- i - The government?s FIS diTr A application, entitled ?Application for Pen 4 :a toeolcag'einlud?ed: A prepose'd order authorizing the collection activity and-secondary orders mandating carriers- to COOPBIELEB. ?a A-de?elaration. by Hayden explaining the technical aspects of "the proposed. Internet metadata collection and identifying the government Of?cial Swn?: ILrl/ :?x?giallg tar aurl'trap and devices. cuy?l?ed tib'n by Tenet- describ'in'g- the fhiiea?t "posed t0 the United States. In: statingi-fhatrthe l?cely to :ba RZTT devices Wag=1?fe??nt tom ?Qngei'ng iri'Ves?g?a?ong USS for Of 50 a: Accrti?cafion fm? wtained ftQm-the?P 1?91:erth against internatiOyal terrorism, asrequifedlby 1842(6), 46>: A?memotandmn of law andffact?in support of'the application. ure authority undergFISA this timeless:aromxdiradltmu .au'thg??ri??s: provided unjdefEI-SQA, :(Sge i The goypmment metadata-mgt bynot-ingithat the. metadata? soughtic?ompp?w wi?x? car-signaling data. desc?bed: 1'11: HEN-Bade??itious devices, The govemrneut neXtarguedgthat?the information ?lctelyto be obtajmdi?'cmtha relevant b1, b3, tcsi all-oilgoihg hweg?gation to protect?against int??lation?l terrorism, 31311.6 b7E Attorn' ~LGe1lex'aliunder 50 ortwefthis"?certi?aati?n ofr?le-Yan?$.gpve?r?me?t?al?so?s gal-mat- discover enemy. communications; thei?f?fi?b?tbf the pmp?o?sea common 91;, that atil'castiane and 0131:1176 trat?jsmit-te for locations out 'deth'e United States, (3. Was- ?Werwhelm'ingly lace-1v ?tted. ?Was jdestina database. The NSA were to?be bricfedlby ?Dncg??gg the Giraumstauces und?r which the database 00111de queried. 311d. 2111 W0111d?1?13V35t0 the ,japproved by 011le seven senior. NSAoi??cialsi The appl-icatiOn proposed that. qneries of Internet?inetadata archive would be perfo fined when the-?Eternet communication address met-the. following standard: [Baased on the factual and practical eonsiderations of everyday life on which reasonable :andprudent persons act, there are facts giving riSe to a reasonable artist-liable: suspicion theta-part The docume?ts- ?it?tiidscl?.t0 use the?Inter?etm?tadata to develop. BOntact cha?f l? estimated that its queries ofthe database Would gene ate. 1313450.E to: the-FBI and each year. Of these;- t-ips, the NSA projected that 2'5: percent Would: 'incjlilde-US.1sperscn information, amounting to leads including nifnna'tion. on about ?four to persons each month.? V. fr 7' On. 1.4 July-32004, Kollar?liotelly signed a-Pe?n Register and Trap and ?Trace: Qpinidh and Otder Order) based on 11er??ndings. that the:131toposed,Collection so steamer metadata - and?the - government?s proposed. controls ever of thiszint'onnation satis?ed the requirements The; 'Orderewhich 'granted??ie- :governinent?sgiappliCati'OH in all key respects, approved feta eiod hill-1:116 United-States. ofInternet- inetada rib-5}" ?blt3 . The Order also required-the government to comply with certain additional restrictions and procedures either adapted ?'om'or not originally proposed. in-the amended the goverrnnent?s proposed. querying, standard, consiSte'nt With ?5 1842(e)(2), to-includethe proviso thatthe-NSA may query-the d'atabaSe based. on its reasonable articulable suspioi - - communication address is seen ?lattiVi?de'cl, hoWe-ver, that a not beregarded as associated the basis of activities that are pro irst Amendment to theCOnStitUtion.? Regarding the stering, accessing, and disseminating of the Internet nietadata obtained by theNSA, the FISC ordered that the NSA store the information in a manner that ensures it is not commingled with other data, and ?generate a log of auditing information for each occasion when the in?formati ccessed, to retrieval re re i .e i sued separate orders I 7 I I 7 b1, b3, b7E eso- ecy? ofthe activities. . . 7 Several officials told us that Obtaining the PRITT Order was seen :asa snceess, ,thattheife was general agreement that the govermne?nt had securedall the ?conduct- the bulk- Internet metadata collection 1 A 1' The FISC ?rst renewed the EMT Order 0 . 90u'd'ay intervals, In these 13?: it approvedwitlithe- b1, 133? Under tenew app we 10118, the scope of - ..7 21.: r1 Department-of eldest ?led a ti 1.1g seen" ff 1? . l) the FISC issued 21 Compliance Order stating that the violated its: Wnpifopos?eid?l 'tations." The FISC stated - the duration of the Violations, which extended from 14 Inly throng tlette'Comt was reluctant to issue a renewal of the PM 7 However, Keller-Kotelly signed a Renewal Order 0 the NBA to continue collecting Intentet metadata under 0 terms similar to' the Mm an?!!an uh?: il Ill-5'4: if Telephony Metadata??eliectten Transition temper-action ?UnderFtS?A [authority i Another part of the PSP, bull: collection of telephony metadata, was FISA authority in May 2006. As With Internet metadatai, thebullc.na1nire"of* lection provided the the ability to. c011duct Contact Chainijn The?transition ofbullc "telephony metadata Collecuon"ftonilPres'idential authority: to ?FTISAiauthority relied on PISA that authorized the'FBI to 'seelcan order Horn the, 180 compelling the production of.?anjy tangible things.?- from anybusin'ess, organization, or entity, provided the items are fer anauthori?zed hrVeStigation to protect- interr'rational terrorism or clandestineintelii'gence activities, (See Orders under-this proviSion arecorranonly referredth as ?Sectioni211'5? ordersi'riret?erenCe to Section-215 of the USA PATRIOT Act; which: amended the -?husiues$ records?? provision in TitleV of F1 Susi.18 Ines?t?angible ?ange?? sought?tuthis ?Sectional-.215 application were the telephone- call detail records of certain telecommunications service providers. 7 The timing ofthe decision. in May 2:005'i0, sacks order er'?lB bulk- collection of telephony ametadata was driven primarily by'external events. A inThe New York Times entitled? ?Bush?LetsUS. Spylen are i . .9. 7? cases; a -003; "in rape 3s Bu pub 31' con?nned that he had authbrized the NSA to intercept?the international communications of people with known links to al-Qa?ida and related terroriSt organizations. 011 19 Januaiy 2006, D01 issued its WiitePaper?m?iegal Authorities Supporting the Activities of the National Security Agency Described by the that addressed in an unclassi?ed form the legal basis for the collection activities described in TheNei-v York imes article and continued by the President. Him-J Prior?to the enact'rnent of Section 215 cf the USA PATRIOT Act; the TFISA ?business records" provisions Were iimitedto obtaining information about a speci?c person. or entity under investigation and only from common carriers, public accommodation facilities, physical storage facilities, and vehicle rental facilities. this aspect ofthe program inearly 200.6, Bia 7 1113/ leipated that article would attract when published. As anticipatedon 1.1 May 2006, the USA published-the results of its investigation in an article-entitled, l-Ias Massive {Database oiiAnier?iCan Phone Calls." I 'On 23 May 2006, the FBI?led with the 131393. Section-?21 I i assist the NSA a. . a . in supp'o? ofth Iiny?estigationsthen pe1 hd'Otli'er ICeperatiohs. 1e--appliCatien reque'St'ed aaiprdar? certain telecommunicatiOns companies to produce (forfthe duration of thew-?ay order). calldetail retzords relating to all telephone communications maintained by the carrier's. Aceordhig to the application, theinaj?erity efthe-telepliony nie'tadata provided to. the IN SA was expected to. involyecommitnications that Were (1) between- dd'?les?tic and fereign lecations, 01? (2) Wholly within ithe'United?States, includingflocml telephone calls; The appi .st'irnated: that the collectionwe?uld involve the recs-lying appraidmately 5 application dL?identi . b1, b3, b7E call detail records perday??ii - a . Thesappheation acknowledged that the vast colleCtion WOuldfinclude communications records of U3. persons located Within the United'States who were not the any FBI intre?stigation. However, relying on; the precedent established by the 1' at: then l-icaticn asserted that the colle'ctionwas needed for the to ?nd b1, nd to identify unknown Operatives, some of whom ma? b3 tieUtStates- or in. communication. with persons, by using contact b7E?:1 Dita As was done under the PSP, the- calldetail. records would he entered in an database and would query tie data 'tlijarticular teleph numbers to identify Connections with other numbers (b in)" he proposed query standard in the Section 215 applic an essentially was the same standard applied under the PSP in connection with telephony nietadata, and the same standard the FISC authorized in the Order for Internet metadata. The Section 215 application also included in-the proposed queiy standard the First Amendment proviso that the F180 added to. the query standard. 19W): records rather th - I. I. age amount of telephony metadata collected per day stirnated in the applieaticn. ?24: sord'er-atap roxrrnately 90~day intervals, with ?tar-3r? an r? anht?f? . 1' C) .- ms marl? @lt?l I 7 On 24 May 2-006, the FISC approved the Section 215 applicatioir, thatthere werereasonable grounds .to' believe that the telephony metadatarecoricls. sought We?re relevant investigations the FBI was conducting to protect against 'int'emat-iCanal-terrorism. The IFISC Section 215 order: incoipm?ated each: of the procedures proposed in application relating to access to and. use. of the metad'ata,_ :Wete identical to those included in the hrtemetmetadat'a Order. Through Marci-?1. 2009,? the renewed the authorities granted in-ithe. some-mo diz?cations sought by - la the FISC anted ?anIAuust12006-motion reuest'intr I the terms" of the MEG 3, grant of lectio'n of telephony metadata remained essential-'7 a Nettie meninges use aft-he te p? 13:; . were authorized. to query the dataas they had under-the P8P, and disseminate the results to the?FB I, the CIA, and other toiletmnersi 3 a a However, the FISC drastically changed the authority contained inits Martin 215 Order after it was noti?ed in January 2009 that the .NSA had been queryingthenietadata inqa manner that was not authorized by the court?s Section 215 Order '8 ec?it?ially, the SA, on a daily basis, was automatically querying the metadata 1 ??om an alert list that had notrbeen determined to satisfy the: reasonable 'articulablcsuspicion standard required by to access the telephony metadata for search or analysis purposes. .f a 7 On 2' March. 2.009, the FISC issued an order that addressed the compliance had been reported in January 2009, the go Vernment?s eXplanatimr for their--OCC-urrence, and the'remedial and prospective measures being taken in response. The FISC stated its concerns with the telephony metadata program and its lack of?tconfidence ?that the government is doing its utmost to ensure that those responsible for implementation fully comply with the Court?s orders.? Nonetheless, the FISC authorized the govemment'to continue collecting telephony metadata under the Section 215 Orders, explained that in light of the government?s repeated representations that the colleCtion of the telephony metadata is Vital to national security; taken together with the .eonit?s prior determination that the collection properly administered conforms with the FISA statute, that ?it would not be prudent" to order the government to cease the bulk collection. . ran 3.1' mas .y tr?O?w- VMVH 3.5 a .1 ,5 However, "believing-that" personiinfennatien pursuant "to the metadata collected ?until 511911 time ag?ie gamma-eat taxable; toplgtestOre the Court-2?s- con?denceithati'the *goivenuii cat can and.- will approved piecedures?iforac?eSSiris Sudh'data?? A The. Diagonacaseahyu?case basis, .n?ecgp?iestauthorityfromE the a. number toobt?tin?foreign intelligence The ?also authorizedthe government to query ,?ie?metadata Withoutcoilrtapprovallto protect against an imminent threat- to human life, provided the the loo-newfaa?the day. Content collection Transition to Qperation Underli=lSAiAuthority The last part of the PSP-htought under-FISHauthority'was- telephone- and Internet {communications ,As'exp1atined-b plow? theeffo?vto accomplishitl?s tranSition was legally and. operationally complex audii?eQuifet-lcan enoniious effOft?on ?ie-par't of and the FISC, The FISC judge'who ?ml?dzan the initial application appmved the uncanv entiona'l legal appro ach the. goyeimnent preposed to: ?t content collection activitieswithin However; also;judgerrespensmle for considerhig-the government?s tenewa'l application rejected ithelegalappr'oaCh. This resulted-in :Signi?Can?t diminution inauthorized'survreillance activity initializing iconte'nt collection and. hastened "the enactment :of'lesiSEEL?ticnthet and presided the:govenmient?surveillance authorities . - appIiCation sought to replacethe conventionai an 7 . vidual applications each time the goveminent had probable cause to believe thatta?particular f?lephone- number or Internet communication address was 'h?eing used oraleut to be used Dy members or agents of aforei'gn power. the place of the indiifidua-lized proceSs, the application proposed that the FISC establish brOad parameters for theeinterceptiOn off so mmunicationse?wthe groups that can be targeted and the loCa-tions wherei?the surveillance can be conducted?and thatNSA of?cials, rather than ISC 'ud' es :detenninewithinithese parameter-sthe particular selectors to be collected against. "nu-dram u. . ..-.. IrlIlm HILL. mmulli'i ?t 7 "7 ethertawithBISGrewewand supetivrsion; The govenmfient .s approach 111 the. .. pli?atio'nrestedvona broad interpretation of the statutory term ?facility? and the 1136 of: minimization pi?oeedur?es by NSA of?cials: to make-probable cause determinations ?aboutihdividuallselectOrS, rather than have a FISC judge make such detem?nations. armaments content-2a lioation to ?nd Ice probable . sequenitly reviewed by the FISC) aboutwhether individual telephone Intent seats of and whether the omtnanma?onsef addresses. are to or ?forn a foreign country. Wren probablecause ?ndhag?ewere made, the SA could direct the telecommunications rcolnpal?es :to'pfovitie the content of Commanications assoeiatecl with those telephone numbers and Internet communications addresses01110 January 2007, Judge Malcolm J. Howard approved. menswear-eases December 2006 content-app?liCation as it pertained to fereign selfeetorsw?tetephone_ numbers and [ntemet communieations addresses reasonably believed .to he usedby'individuals outside the United States. The effort to implement the order Was a massive: undertaking for Doi andNSA. At the time of the order, the SA was activelyr tasking. for-content collection oreign selectorswintemet ?eeimiiuliieat?ionsi-addtesses or-telephonenum'bers under authorityofdie PSP. I of?thes?e- were ?led with Howard on an approved schedule of rolling: submissions 'ovei' the 9.0+day duration ol?the order. did not approve the govemrnent?s 13 DecemberZOO? *cont?entapplicmion as it pertained to domestic; selectors-?telephone numbers and Internet communications addresses reasonably believed to be-used by individuals in the United States. Howard adViSed' to ?le a separate application for the internatiOnal calls of' domestic selectorsthat took a more traditional approach. to PISA. A more traditional approach meant that the facilities targeted by the FISA application should be particular telephone numbers and Internet communiCation addresses and that the probable cause determination for a particular selector would reside with the FISC. did this in an appliCation filed on 9 January 2007, which Howard approved the following day. The FISC electors order approved by Howard for the ?nal time in thas since expired. - i Dolls ?rst renewal application . was} tiled onglofMareh-2'007 With Judge: Roger Vinson; the?fFISCgdutyjudgethat week. on 2007, VinSQno'rally' advised Do] that hescould] not approvethe: application and, (1113 . April?ZQOl'he issued an order and Memorandum-Opinien 'exljlainingthereasoning- forti?cconctusion. Vinson Wrote that Dol?s foreignselectors renewal application-coneeras: .an=?exigenieiy important :iseue? regarding who may make probable cause detemtine the individuals and?the Communications that can be- subjected to electronic stiIVei-l?lfance- under-FISH, In. Vinson?s view; the quest-ion was Whether probablecause: determinations- are required to "be triade by the FISC through proeedures, established by statutepor Whether the may make such determinations under. analternati'v'e: ?minimizatiOn. procedtnes.? Vinson concluded, baSed on past practice under-FISA-and the Congressional intent underlying-the statute, that prdbable can-Se determinations must be made bythe FIS .WVi11s011 also wrote that he was mindful of. the government?s argument that proposed approach to foreign selectors was-necessary to provide or enhance ?fspeed with which the NSA responds to. threats, and that foreign intelligence information may be lost in the time it takesfto obtain Attorney General emergenCy autherizations. However, in re?ected a struck?by?Congress between?privaCy interests and the need-to obtain foreign nintell-igenceinforin?ation, and untilj?Con'gresjs rtoolclegistatiVe act-ion-on-FISA to respond to. the F180 must apply the statute?s procedures. He concluded that the gove?mrnent?sapplicatiOn Sought to-strike' a different balance for the smeeili-anee- of foreign telephone numb ers and Internet addresses. Vinson rejected this position, Stating,f?the' statute applies-the same requirements to aneurveillanc?e of "facilities used. overseas: as it does to surveillance of facilities used in the United.rStates.? Vinson-suggestedthat, ?Congress should also consider'clarifyinglor modifying the scepe of andfo'tithis Court?s jurisdiction with regard to such: facilities . . Vinson?s sUggestion- Was .a spur to Congress to consider PISA nio'dernizatiOn.legislation in the summer of 2007. . InMay 2007, Do] ?led, and Vinson approved, a revised foreign selectors application that took a more traditional approach to PISA. Although the revised approach sought to preserve some of the ?Speed and agility? the govemrnent had under Howard?s order, the comparatively laborious processfor targeting foreign selectOrs under VinSon?s ordercaused the government to place only 'a fractiOn of the desired foreign selectors under coverage. The number of foreign on collection dropped from abet; underthe January 2007 order to abou nder the May 2007 order. The situation accelerated the government?s efforts to obtain legislation that would amend PISA to address the government?s surveillance capabilities within the United States directed at persons located. outside the United States. The Protect, America Act, signed into law on 5' August 2007, acComplished this objective by authorizing the NSA to intercept inside the United-States any communications of non?U.S. persons reaSOnablybelieved to be located the United States, provided a signi?cant purpose of the acquisition pertains to. foreign intelligence. The Protect America Act effectively superseded Vinson?s foreign- SL313 ($01.78. Order- and the government therefore did not: i orderwhen' it exp?il?edon :24. August .2007; The 1301 1G concluded that-sevexal .cOliSldefations from Presidential. authority to 0?04; eSpeei?ally less a temporary-respiOIisle-to the-September I?ltzifermti'st attacks?attd more a- permanent SuWe?la'nCe tool. These?considerations included - Bilbstantialeffect= On privacy interests. of: 'legal reasoning. ?n which the: ptfo'gtam 1633th for several yeafs; and? ?le-SubstantialfeStEictions :Vplace?d'mt I and. access to and use ofPIQgramad.er-ived informatiOH-adueto the highly of IG alSo {recommended that-JDQJ' carefully FnQ?i'torithe collect-ion, use, and retention, of the information.- that' is: now collected under FIS?faulhorily and, together with other agencies, continue-to eitaniine?izts: value to the :gov?r?menti?s- ongoing couute1'terror-is mefforts. to); IMPACT OF THE SURVEILLANCE COMMUNITY .t EOUNTERTERRORISM EFFORTS (U) Senior-Intelligence {communitym?cials Believe-Thelma President?s SurveillancerP?roemm Filled Intelligence {Gap IIayclen, Goss, McLaughlin, and. other senior Of?cials-We interiewed told. us that the PSP addressed. agap in intelligence collection. The. IC.L11eecl?d ilicveasedaEICGeSSfto international Communicatiml wires, particularly international communications ?iatlori?ginateclj? States. However, collection authorization under PISA, land-?fthere was: Widespread beliefttniic?glse?ier the Septembet hijackers Klialicl Almihdhar .a?d Nawaf Alhazmi almost Certainly Would have been identified and located. According to senior NSA ffocele in ll? scam between foreign-and Ell) .. toldus thatfhe- alWays felt-the was and successlul. ation Was-that the'CIA and the FBI would be oust ers of re - arm?derived ?t into their" respective operations. told ?usi?thattl'ie- program helped to determine that terroris co the {Thith States to the: extent that had been feared. Difficulty in Assessing the impact of the Program to assess the overall impact of PSP c.1110 counterterrorism efforts; Except for theFBI, ICrorganizations that participated in the PSP did not have or tr how PSPireporting was used. were d1 tha he P8P wasoneo a mun . alytic tools that were available to IC personnel, and that, because PSP reporting was used in conjunction With reporting from?other intelligence sources, it was dif?cult to attribute the success of particular counterterrorism operations exclusively to the PSP. (U) impact of the President's Surveillance Program on Counterterrorlsm Efforts D01 IG found it dif?cult to assess or quantify the impact of the PSP on FBIcounterterror?ism efforts. However, based on our interviews of FBI managers" and agents-and our review of documents, We concluded that, although PSP information had Value'in some counteiterrorisni investigatidns, the pro gram generally played a limited role in. the FBI's overall counterteirorism efforts. Several of?cials we intervieWed suggested that the program proV-ided an ?early warning system? to allow the IC to detect potential 6?1 ?h terrorist. attacks, even if the uncoveredevidence of preparations fortsuchzat'taclgs. (U) FBI Efforts toAssess the Value cit-the Program -. The FBI made several attempts toiiassess the PSP to FBI countertet-rotfismefforts. E12004 andv'ag?ain'in 200.6, of General Counsel? assess the value to the FBI. of PS?P?inforn-tation. This ?rst assessment reliedon 'aneodotal infonna?tion and in?fontial ?eld offices. The-200.16- :aSse's'snieiit was l'iniited' to the aspect of the TSP disclosed in The New York Timesartiele and snb's'oquentl'y eon-?nnedby the President, Le, content collection. The FBI undertook two more" e??ortsto study impact oniFBI Operations-in early 2006. In both of these statisticalistudi?es, the FBI sought'to detennin,ze what percentage of PSP tippers resulted in ?Signi?cant the identification r-of?teiroriSt subjects or: activity on soil.? consideth atieper signi?Cant-if' it led to any of-t-hree; investigatiVe results: the identi?cation. offal terrorist, the deportatin. ffom thetlnitea States of aasuspectedterrorist, or thesdeveloprnent of an asset that can r?pmt?about the ?cti??eso?f terroi'i's'ts; 'he ?rst-study amnian a-sampl?e 7 tippers the provided theFBI from approximately?etober . De tribe 20075; The study found. that 'the'leads made signifibant b7E contributloue? as de?ned above The study extrapolated of leads anddetermined that one could expect to fntd: the the a . I FBI- comiterterronsm e?i?fmts. The studies did explicit conclusions on. the program?s useft?ness. Hmvev?er, based in part 011 the results of the-?rst study, FBI executive management, including Mueller and Deputy-Directoriolm Pistole, concluded that the Was ?Of value.? (U) Judgmenta! Assessments of the Program intewi'ewed FBI headquarters and ?eld, of?ce personnel who regularly handled PSP information for their assessments of the impact of program infomtatio?n on FBI counterterrorism efforts. The FBI personnel we interviewed were generally stipporti've of the .PSP- as ?one tool of many" in the a11ti~terrori51n efforts that ?could help more cases for-ward?. .E-Vell though most loads were determined not to have any connection to terrori51n,_many of the FBI of?cials believed the mere possibility of a termrist connection made inVestigating the tips i i Itlext/ever2 the eitceptional-?ly compartinented manifreof the; program. created Seme agents criticized PS?P'reports? ferprottidjing' 'insuffioientidetails- about the foreign individuals alleged- V'Tirw01ved interrorismi Others the prohibiti?Qn on usin elimination in judicial processemmh as-?in applications, although none Of field of?ce agents-we, 131) 133, intel'vieWedfeould? identify an investigation- in hich the restrictions adherSely 'affected the b7E case. d? untert?errorism programs- at'the?FBI ?eldinf?ces we visited werecriitical ofth project for failing to adequately prioritize threat infomiation..and, because of the pro graln?s.special status, fer limiting the managers? ability to prioritize the leads in the manner they felt was warrantedby the information. Mneller'told us that the PSP was useful. He said the FBI must fellowm'ery lead it receives in orderto prevent ?ler terrorist attacks and thatto. the extent such information can be gathered and used legally it must be exploited; He. stated that he ?would potency ofa program based on the percentage of hits.? Mueller added that-as a.general-n1atter, it is very dif?cult to quantify the eit?ectiveness of an intelligeneegprogram without ?tagging? the leads that are produced inercler to evaluate the rdlfe theprogramiinformation played in. any-investigation. int pact of the President?s Suweillahce Program on Gh?t? Countert?rroriem Operations (U) The'Cl?ADid Not Systematically Assess the Effectiveness of the "Program W??m CIAdid not implement procedures to systematically assess the of the PSP and did not routinely document whether particular ESP-reloading had-contributed tosucoess'ful countertel-rorisnr Operations. CIA officials, including Hayden, told-us that reporting was used in conjtinc?tidn with reporting. ?ora. other intelligenCe sources; consequently, it is dif?cult to attribute the-SucceSS of particular counterterrerism op exclusively to the PSP. In a May 2006 brie?ng to the 8801, the Deputy Director, said that PSP reporting was-rarely the sole basis for an intelligence success, but that it ??equen?tly playeda supporting. role. He went onto state that the program was an additional resource to enhance the CLASS 11nd ding of. terrorist networks and to help identify potential threats to the homeland. Othe fticials we interviewed saidthat the PSP was one of many tools available to them, and that the tools coinhinati011 Man-m hnnt-rmr?h urn: In um? limited information on how program. reperting' - contribjnted'to operations? and unable to otters-Ili-use?llness ?HES?Vefai Factors Hindered'CIA. Utilization of "the Program IG-eoncliuded.thatseveral factors hindered-the CIAin-makingjfitll use-of t?e'capabilitiesr o'f'the PEP. Many ot?eialsetold 11.5; persomel level were '1?ead?into the. At .theg'prograniis inception; a. dislarop'oi-tionatfe: - the delimit)? etvteenvthe number of $511.19? CIA managers ad ?11tio='PS=P and-:tlle-number of werlc-ingeIeVel personnel read'into the program resulted-in tooi?fe'w to :ful-ly?utilize ESP infonnationafortargeting and analysis; ivorl?ingalevel' and targeting of?cers Who?- elreadiinto'the had too many-compe ting priorities, andth 'v .o?ther infonnation sources and analytic tools available to them; to fully tit-i?liz?e BPS-P ?oft-iCials-lalsQ tol?cl nathat much of the PSP reportng was vagueor without .led and targeting of?cers to rely more heavily on other information sources and analytic tecl's?, WltiCh were. more easily secessed and timely than the PSP. WEE of?cers said that the PSP would have been more fully utilized if and targeting officers had obtained a better understanding of the program's capabilities. There was no formal training on the use of the beyond the initial read in to the program. Many CIA of?cers we interviewed said that the instruction provided in the brie?ng was not suf?cient and that they were surprised and frustrated by the lack of additional guidance. Some of?cers toldius that there was insuf?cieritjegtll guidance on the us of PSP-doriveclinfornlation. . The factors: thathindered the CIA in making full use of the PSP might have been-mitigated if the CIA had designatedE an individualatan of managerial authority, who p05se55?d knowledge of both the PSP and CIA countenerrorism ?aetiviti?es, to be responsible and acConntable for overseeing CIA participation in the we? .1 was: i rm 641? T553 i i it VII Gennterlermrism [Efforts bills) OTC characterized the PSP as: a use?il ?toelgf?b ?11 Itpre?gr? 11 Was only one of several valuable sources of information aVailable to them. In their View, PEEP-derived infomiation was not of?greater value than other sources. of?in'telli?gencc. Although NCTC we interviewed could Where PSP information provided what they considered they remember. attending meetings'where thebe?ne?ts etthePSP Were regularly discussed. Counterterreriem:?Dperations Supported by the PreSident?S?5u'rv9illance Program . i - Our efforts to independently identify how PSP information imp?aCted terricrisr-n havestigationsand count'erterrorism operations were hampered by the nature of theSe- acjti?Vi-ties, which as previously stated, frequently are predicated on multiple sources of infonnation. Many of?cials we interviewed had dif?culty citing speci?c instances whereaPSP reporting Contributed to a com1te1te1rori5111 success. The same b1, b3, b6, gndf?l] eases-tended to be cited as P8P Successes 'bypersorm?el we interviewed from 1376? ME lg. - new, Amm?mrm?gn unnummanin/ABWHMim??i??f?ml BE m3 .Umb 6n? :mn? mun.3. Fax. rl\:kq. r. r, villimun?nk?u} . .1: My fa To so EVEELLANCE P?noeean . As part of this treView, the D01 IG Exam-ined?whether Attorney madefalsm inaccurate, 01'- 'misle'adingi,statements toCongress -1?elated to Aspects of?the?PSP Were first disalosed publicly fin a..s?eries: of at?ti'cle's?fin. The. New Yo rit' Times in: Dedel??beI-?QUDS. ?111 publicly con?nneda portion of the inhiehithe- called the tent) program?dos c?hin it as. the? intetdeption of the sententz-of internatioan Cannmmieations. of peoplereasonah?ly believed to have. links to- alaQaeda and? related organizations. Suhseqitentl?y, Gonzalesxwas QuestionedaboutNS?A sun?eillance.activities.7 mo hearings hetere-theij enate' Judiciai'y February 2006 ?anttjuly 2-007. ?j Through media accounts and Barney?s Senate Judiciary Committee May revealed-thath and the WhitesHouse-had amajor ?disagreementrelate?d to thePSP, which broughts'ever-al sealer-Doll and PBI?'of?elalsto'the htihk?dfl?Sighatidhin'March 23004;. In his testimony before the senate.Judieiaty Gonzalesstated thatthe dispute at i?ssuehetween Do} and the White House did the ??TertoriSt Surveillance Program? that the President had eon?nned,,but rathen'pertained to other intelligence activities. We believe this testimony created the thiss:MpreSS'iOnl that the dispute eon'eemed activities entirely unrelated toi'the terrorist surveillance program, whiehwas not accurate. In addition, we believe Gonzales?s testimony- that attorneys did not have ?reservationsWtute House ovet a perlod of 1 the 11 these concerns had; been conveyed to issUe? was resolved. The IG recognizes that Gonzales was in the dif?cult position of testifying about a highly classi?edprogram in an open forum. HoWeVer, Gonzales, as a pantieipant in the March 2004 dispute between Do] and the White importantly, as the nation?s- chief law enforcement of?eer, had a duty to balaneehis obligation not to disclOSe classi?ed 'htfonnation with the need not to be misleading in his testimony. Although we believe that Gonzales did not intend to mislead Congress, we. believe his-testimony Was confusing", i11aCoutate, and had the effect of IniSlea-dingthOSe Who'wxere not knowledgeable about the program. .i'rVT? man I *letrWal 69 "El i ,1 FT: W) -. Pursuant to of the FISA Amendments Act of 2.008,, the Inspectors General o'thhe DOD, the DUI, the CIA, he NBA, and the conducted re?exes-cf theaPSP-'. lit-this report and the accompanying individual reportsof the participating "le, We describehow, following, the terrorist attacks of 11 September .2001, the President-yenhanCed the SIGM?Colkctionauthorities in an effort. to "detect and prevent-actsoftentirism agai'nst'the- Unitedgstates'.? . . . colleCted Signi?cant new- 111 crma ,?icn, . contentiof Communications "into and-cut States, where one party to the coinmunicaticn was reasonably believed to be a member of aI-Qa?ida, or its af?liates, or a? group the President deteimined was in anned con?ict with the United?States. In-addition, the President?autliOriaed the collection of signi?cant amounts or itelephOnyand Internet metadata, analyzed this information for dissemination as leadsto the IC, principally the CIA and the FBI. .As describedin the IG reports, the scope of this I collection authority. changed over the course of the PSP. The IG reports-describe the role of each of the participating agencies in including the-NSA?s managementiancl oversight cfthe cellection,.analysis, and reporting and ?FBl'suse oiftheP'SPLder-ived intelligence-in their corinterterrorisin efforts; the supth of the pro gram by prottiding'periodic threat asseSSmentsyand the 1301?s role in analyzing and certifyingthe legalityof?thePSP? and managing use of information in the judicial process. (U) The reports also describe the conflicting views surr-omiding the legality of aSpects of the PSP during 2-003 and 2004, the con?onta?ticn between of?cials-fromDoJ and the White House about the legal basis. for parts of the program and the resolution of that confliCt. The ensuingtransition of the PSP, in stages, from presidential authority to statutmy authority under PISA, is also described in the 1G reports. The IGs also examined the impacth P8P mformatiorr on ccunterterrorism efforts. Many senior IC of?cials believe that the PSP ?lled a- gap in intelligence collectiOn thought to exist under PISA by increasing access to intemational? that transited domestic US. communication wires, particularly international communiCations that originated or terminated within the United States. Others within the IC Community, including FBI agents, CIA and managers, and other officials had dif?culty evaluating the precise contribution of the PSP to counterterrorism efforts because it was most often viewed as one source among many available analytic and. intelligence~gathering tools inthese efforts. The IG reports describe several examples of how PSP?derived information factored into speci?c investigations and operations. (U) The collection activities pursued under the PSP, and under PISA following the activities' transition to operation under that authority, as described. in this report, resulted in. unprecedented collection of communications content and metadata. Webelieve the retention- and? useby lC organizations of information collected under the PSP and PISA, particularly information on US. persons, should be carefully monitored. ?mum? in un wu "u HIMM {?hO I m. This page.:intenti011a11yle? blank. . fa 131 w) imbue-mf- Gamma (U) The emmen? afl?efense ungpeciar Gene-wars RQWEW @f the President?s ?Suwei??ancez-Program the @eimm?f?ntel?igaence Agency Mamma? 'G?nen'jaf?is Rem-9w of CHA Pani?p?a?an in the P?ras?dem?s Survei?lame (m The Nation-a! Security Agencerentra? Security Sewage ?lnspectar Gen?em?s [Raview of the Presid?en?s S-uwei?lance uh "'45 of the Director?Of Natiana? unteuigeme Ensaectw GeneraPSr-Revitew of??hepa??icipal?an 05f the-GEN! Suwei?l?ance Program. 333357?53 . Q: Li ?43 GENERAL . SECRETARY or DEFENSE B-JEGT: Report on Review of'th?e 'Presiidcnt?s iSurveillancePr-ogram Report No.: (U) (U) We are prov'idin this report for your infonnation, This report ful?lls the DOD Inspector. .Gen'eral?s requirement pursuant to Section 3011 oanbiic Law. 110- .2615 the Foreign Intelligence Surveillance AmendmentsA?ct . of 270078 (thesAct); Thi?sreporh along with reports preparedby the Inspectors General ?of the Department of Justice:(DoD, the Of?ce of the Directoriof National Intelligence (DN-I), central Intelligence Agency the Na-tional?Secnrity Agency SA), willbe SummariZetliin- acomprehensiy'e-Ieport .asrrequited by the Act. . 3 I i Results; The 08]) ?l?Oidi?ulihe establishment and implementation Ofth?e was limited, withthe?burden of program executi on residingiwithithe NSA.. determined that there. We?resixOSD officials with 390638 to: the?P-SP. These individuals had limited involvement5,_and. did? not make any additional. tasking deciSions beyon?dithose directed for NSA implementation. Weare aware efnoi-other-?OSD involvement in the PSP. The Actrequire's the 163 Of the Do], DNI, NSA, the and any other element of the intelligence conununity that participated in the President?s Surveillance Program to'COrnplete a comprehensive review of, with respect to the oversight authority and responsibility of each suohlG: 0? All facts necessary to describe establishment, implementation, product and use of the product in: the program 0 Access to legal revieWs and access to information about the Program 0 Communications and participation of individuals/entities related to the Program I (U) The President?s Suwciliance Program is de?ned in the Act asthe intelligence activity involving communications that was-authorized by the President during the period beginning on'September 1, 2001, and ending on January 17, 2007, including the program referred to by the President in a radio address on December 1-7, 2005 (commonly known as the Terrorist Surveillance Program). Interaction with??ijor?ign I?ta?igence:Sumaillance. Courtaand a Any-Mia: matters identi?ed theiIGs; .. . . 1 "We canducted??nis review to the Of?ce of Of?DefenseLOSDg): Departmef?tbf Defenss (DOD), the establishment and implementation of the ?P'rasiidcn?s lSuWeiIlancei ngram W's interviewed.icurrents?uid fame; Of?cials:Within?Si} that tothe-PSP, We wifhdtaw.ounrequestztoy interview Secretary of- Dafanse?ates bacauss: he-W'as P8P after: the magma ended. The ib?nner {Eif- DgfensesDy;LWb?1fow?itz we. reviewed an relevant dowmentation "within and-NBA related to involvementzinthe, we also: reviewed domumutationsat DUI related to the PSP. I The-16's- of?th?e' OJ and CIA- isgsue'd. 0112011. ?S?pt?mberrl 0., 2008.; In the interim report, 17116213013. IG s?tated' that he 'Wciuld? Of?ce Of'the Secretary-Of Def?nse (08D) and ianlemautaiion of the: PSP. rajSF within. 7 DoD?pie'rformed? the requirements conducting- a9refvf?wzof NSA involv emth with the-PS]? separate memorandum rbporat, amass of?the-PSP. . to the PSP was 'limi?tedato "Six indiVidu?aLlsF Those "individuals are SecretaryhfiDefenseRobert (Eats-s; ?f?r-mer Secretary ofDefeIise Donald?? RumeaId; f6 rmer D?p?uty Secretary of Defense P3111 Und?r- Seeretary of Dafense? for Intelligence. (USDGEJ) James 61313136143; f0?1161?3?U .Steplien ?C-ambon?e; and Principal Deputy General Counsel DanielDell' ?0110eigtlfemely $5nsitivecounterfen?orisin program'focus?cd 011 detecting and preventing Iten'oristtattaqks: within the United ?S.ta;tss.. The PSP was authorized by Ehe ?13-resident Wary?? 0' to 45 days and was "initially d?irecftadagainst international terrorism; after March f?gicused speci?CaIIyagaihSt-aaned? and its aff?iates. TheDi?rGCtOr 'of?Central Intelligance (DU), and later the DN1, Would preparea Threat Assa?ssment 3 Secretary Sam and Under Secretary Was lr?nsferred to a Memorandum, which Validated-the (immutthteattortho United states. ?The? - iSecretaiyernere-nse: would: andzsign stiheithre?at AssesSment Memorandum; Qn three the sfomer 10f af?ne e, Qty-me: Memoraada when. Secretary Runnf?ld?i audit); Wolfewitz were unavailable. 5 a 1 a a Memorandumwasz Signed; the. President wou?ldithonSign Atl?ioriiZatiOn with A t0 employJD'oD resources to execute the requirements-sat forth the Anthori'z'ation. he Attorney Genera-1, or his designewvvoul?d? certify the Presidential Anthonz?ation for-foicnrandrlegality. The S-eeretaiy of Det?euse?woul?d actions authorized by the Presidential Authorization to the; NSA- fOr imPlBinontation. On one. occasion, Dr; the the. toiim?p'lement the Presidential Authorization, in the ?S?ecretaiyi?sabsence; 2011asepaiatGiDGG?SiOm 1315-: 1111369113: directed the Dir?o'tor efN-SAqtesimplemeut 'tliei'Preeid'ent'Eal Authorization. . Dr." 'Wolfowitiz: als-oti-BXBontod?two declarations t. arr-s riot Intelligence surveillance Court? The. ?rst, Executed? OT. rene a 138415-1846"? as amended. The initlal authonty-un'der to install and use poll. Eriegiater and trap. and traoe devices for that purpose was? 'rantod'h the oreign Intelligence Surveillance-Courton Julle 200 deelmrationwas-executed sponge to the Foreign Intellige "Saw .llanoe C0urt Order requiring the?GOvermn?ent'tO' snbmita declaration from the Deputy Secretary of Defense discussingNSA? ?violations of the Court?s July 14 Order authorizing SA to install an an btain information about In that declaration, Dr; Wolfownz stated the circumstances surrounding unauthorized collection that oocun?ed,? the disposition of information collected without authorization, Steps NBA took to remedy the and-measures NSA maplemented?to prevent recmrenoe- of such violations. Dr. Wolfowitz?e cw.? li' Hm . I . - I rm REPQRT ALHST (U) (U) OF '13 EFENSE Secretary ofDefense U?deri Sacret?IY 0f ef?nSe. fur Intelligenw .Deputy" General Counsel, Intelligence. Inspector General, National Security Agency FEDERAL-ORGANHZATIONS- InSpectqr Gengra15D1rectm: OfNRtiO?EtlI?t?lligB?CB Inspector General, Department of Justina. I'Ii?spectOr Geneltal,? -'Cent"ral 'I?telligeucevAgBIlcy CONGRESSIONAL COMMITTEES Sanate Judic?i?apy' Conunittee Senate-Select?Comrr?tt?ee: on Intelligence House Judiciary CQMittee House Permanent Sela-Ct Committee on. Intelligence 5 SEQ PL. f. I Qmp@NrN@a?? 1? a? w?t? .Io? 5mg} .v in 5 .2 -. j? 'Thispage; intentionally l'??iblahk- This: page intentionally 16ft blank. GD 11(0) Of?ce! of .l nSpeator General: cm..Pa?icipatian invithe Pgresad?envs?u W?illafme? ngsazeam Repmt Mmg20108~06316~?a$ Image Date. M. ?[12 1'13 page ?1 ntentiOnally- le?'iblank mm nu new: nnu Imr" tar" l?xulisolcr Hump?lrnw (Ul Tame at Contents- exEcunvesunan-?av (U) origin-and ScOpeOf the Review (U) The President?s Surveillance Program .i ..5 (m REVIEW Rescue PartiCipa?tieniin the President?sSurveillance sci deli-lily Prepared theThreatAssessment Memorandums SUpporting Authorization of the PreSidentInes-IlnIc-v'o_ I I I Ii (UHF-866) CIA Tasked and Received Reporting From-the President's Surveillance Program .v ., .39 (HUME-6) ProcedUres and Standards for Reporting Provided in Response to Requests for Requesting}Information tuna-schPrimary CIA Users of the President's Surveillance Inn-galnun-sued I I I (WW) CIA Requests for Information Were AdeQuately - Senior cm Ot?cials Believe That the-President?s Surveillance Program Filled an Intelligence Gap .. (WW6) The CIA Did Not Assess the Effectiveness of the President's Surveillance Program .. (U) Counterterrorism Successes Supported by the President's Surveillance Program .. W?Several Factors Hindered?ClA Utilization of'the President?s Surveillance Program 1'1 13 13 15 16. Mr r" Arm; - I: .3: MC 3 Tmam mangr: Gem-Alt! Iral at 7 -T U: LI) . (U) cm; Had Limited. Acce?Sstp L?gal?eviewsof the President's CIA: Delay Ei?p??sUreOf?the? I President's:Surveillance York Tri?es :20 A Threat Ass?ssment ?Hem-grandma: Concluding Paragraph (U) Example of Link Diagram'iFromAugust Aij "Gm 3 I . scimsleicmation in the? Pregiden??s Surveillance Program" EKECUTNESUMMARY . 3 Title-HI qfthe-Emiign Intelligence.Surveillance Act (FISAJ.A1i1.endn1ents- Icqh?gs the. Inspeg?tors? Galleyalf (K35): ofith'e- elements. Of theil?telligeiice ComwityfICJEthat ?attiicipate?din the President?s Simvei?ll?ance'ProgramQSP) to program. The .rc?sults of our r'evi?ew. participatidnti? the 333 presented in this report, andwi? be included ill-the, 1'0 provided 0535011817653 by ?1-0 July 2009.; i - assesSmentmemm-ldm-S that: used. to ?Tha?thr??at assessmenfmemomndumf . . I. . .. . :5 (mi .0619 Wid'erail assessment Of the utility- ill-addressing .prev'ious'ly rammed threats?. The threat gagessmant-jmbr?orandums thB' Director of-iCentral Intelligence. and forwagded to ?it: Secretary of Defensa to bdcd?i?g?ned.? Responsibility for .dra?'ing the: threat randums Was transfantedit? the newly-established ?Termris?t Threat In'teggation-JCautGE' in May 2003. and retaine'd?by. organization, (me a?bn?al The; DCI'L?on'ti?ued vto - sign the. threat assessment memorandum athrou'gh' ;1 S'iibs'eque?nt memorandums were signed: by the Directo r- OfNation?l I?te?lligence; 1:7? CIA consumers-,Staskad I. 4 I "m Tamra: erg-131 ,3 we, {mt-d @iwmiviy teem: Maize/era other ?We em: 01 en HOWever, collection of ens: under EISA, and there was widespread ?b?eltefarnongi senior 1C of?cials: that: the process for obtaining FISA a?diorira'ationwas toscumbersome and time consuming to address the current threat ?Curirenttand former?CLA of?dia?ls: emphasized the-increased timeliness, ?exibility, and asscompared to the process for obtaining a. warrant under VFISA. -r t- . - y, The CIA did not implement procedures to assess the usefulness of the. product of]? the P-SP anddi?d not routinely document whether particular PSPrepe?rtin-g lia?dicontribnted to successful count?erten'orisrn operations. CIA of?cials I a i??ecnn' f?Tnm nil-19:17 from-t was use "Irictienw?b 1 P8P reporting- Consequently, thereis no means to comprehensively track how PSP information was used. CIA of?cials were able to provide only limited information On how program reporting contributed to successful operations, and therefore, we were unable to independently draw any conclusion on the eyerall of the program to CIA. t] I - Save-r131 factors. >11inderac1..gt?1rie GEAip'mal?iilg full use" of- the capabilities of CIA of ?toldUSniihat tpdfe?r?CIAjp?aer?nel girdle.waking-lava; werere'ad df??ialSitbl?m that: ??halysitsrand'tm?g??ngbf?c?rs whoxwerema?l i?hacltOo many- competingipriorities midiod?m??b? D?ief?milable ib?na?bn seminars. ?and tdolswm?ny" of We?re more easily-amass edmid . 31313313} .?offimrsalscr 't?dldius the-PS}? Woulti?have? u?lizetl if officers'had csb'tained abetter? undemmdi?gbf mat?there was legaliguidanca - concen?rig -?fogra?i9is capabilities and The usa-iof?ESBdefived h?a?na?dn. The ?faptorsf?i'at?fhind?ratl?ier (3113x311 making of PEP niigh?t'llave been mitigated-if?leEm designatedmindividual at level of managerial au?lority, j;th of both ?ieiPSP: and comma?terrorism acfivi?titas,j to be rag poms i513 - ahdz?ic?icomt?ble? for :overseeing; participation in the programs . There'is?nofihdication tha_tperson_11?el of G?en?ral Counsel or other memoraudms- supporting The mat were. ?xei?e?ar?nent 'of I Qf??e of?Legal COUHSBI QGCI parsdrihel vet}? Zlimited?access ito-?iesememomndums. I a Senior officials pax?j?ipamd aNewYar-?IC Times editor?and reporter and is enior?Adr?i?istta?bnbf?di?ls acmemihg an'article the. nei?rsmper?was?preparmg ESP. ?1183 .v . 65 9 J. Th?i's alg?? intentionally left Blank. TH (33' (Ll) origin and Shape-of the Review . Title efthe Foreign IntellifgeHCerSurveillance Act amendments Act of 2008?, Which Was signed; intelaw on 1.0 the IGscof the. Blel?GIltS'Of the? Intelligence. Community ?thatglpartioipate?d .in' the: to? conduct comprehensiVe 'reVieW'Of the program? Thereviiew required to be conducted underth'e Act is to' examine: (A) all, offthe- then; necessary to describe theeStablishnient, implementation, product, and useof the product of the Pro grain; (B) aCCess to legal reviews-of the program and access to information about the Program; cornmtu?cationsi with, and participation of, individuals; and, entities- -in 'thlerpriVate- sector" related to the Fragrant; interaction with the Foreign Intelligence" Surveillance court-and: transition forerunner-deg related to the Program; and. anyothermattersiidienti?ed by?any such Inspector ?Would?enable. that Inspector General tolcom?plete a review of the. Program, with respect to such Department 0r element. . . I The interim report requiiredrundcr. the-Act was submitted tattle corrunittees of 'Cjongress prescribed in the on 1?08eptemberi2008. That thesCopeof the Work to be conducted by eacho-f theparticipatingle, which include:theilnspectors- General :of the Department; of Justice, theOf?cerofthe DireCtor-ofNat-ienal. Intelligence, Security Agency, the Departmentof Defense, and the. CIA. Our review of CIA participation in the PSP examined 0 Role in preparing the. threat assessments and legal certi?cations supporting?periodic reauthorization of the PSP. 0 Role in identifying targets for the PSP. .W) Thel?resident?s Surveillance Program is de?ned in the Act?as the intelligence activity involving communicationsthat was authoriz'ed by the Pre?identduring the period beginningon ll September-?2001, and. ending on 1-7 January 2007, including the program referred to by the President'in a radio address on 1'71Decemher2005 (commonty known. as:.the The classi?ed name for the President's Sumeillance Program is 4 t" l\ who-m m' of llk/x.) r: r: my. Pumas .?lhli?n -nlt\ . nL?n - rm lug) ll I?wr in the?cm?prehe?sive aha; {egort xeq?ireditdhe jammed: to- i?ie appreprfiateincommittees of Congress by 10 (U) The President?s Surveillance-Program. -- _7 . . According to former- Director ef?the 'NSA'and 'fenner DirectorOf?theCIA Hayden, initial discussions:concerning the actiVities-that would hecOme the PSP Qecutr'cd'less than "two weeks after 1 sep?temberEOGl tertorist?attacks in a meetinglbetween-DCi G?eor'ge'Jl Tenet?and VICE-President Richard B. Cheney; Although Haydendid?ot attendtheIneet'itlg1 he was told by?T-enet that: Cheney asked if the. Intelligence Community was doing eWMh'iFigf Possiblats clamspanse deemed; . Cheney then asked if?lere was ?inore that-ENS}; "ceu1dit do. Thisled to 'diis'cus'si'oH's-between Cheney, I?I?ayden1 Cheneya: legal-'connsel Davids; Addiligton, and senior NSA of?cials; It was determinedithat. the-:NSA .had~Unitied States. Paragraph .6 Minimization _r 7 Paragraph six directed that information .c?oncerninglAmencari Citizens he unnamed to: the .e'Xtent consistent with the; miSsion and with the. AuthoriZation. (U/Iroee} Paragraph 7 usNotify?ing cohgre'ss -. . J. Paragraph seVen statedthat .noti?eation of the Authorization outside the. executive branch Would. be deferredi but the President stated his intentto notify .C'ongress when consistent withnational defense. When select members of Congress were briefed on the Program, information on the brie?ngs was contained?in paragraph eight. (U) Paragraph 8 ?3 Other Notifications . . a . - 7 The initial Authorization speci?ed that Collection days after- signature and requiredreporting- on changes in circumstances-underlying the. Authorization. After the initial Authorization, paragraph eight contained a statement on reatricting noti?catiOns to" GOVernrnent of?cials outside the executive branch or it named-individuals, by title, who had been informed since. the previous Arithorization period expired. (U) Paragraph 9 Expiration i - After the initial. Authorization, the exact date of- expiration was speci?ed in paragraph nine. (mam) Paragraph 10 - ?The President?s Ultimate Resp?onsibifity" The Authorization signed in March of 2004 the only one not signed by the Attorney General or a Deputy Attorney Genera1~ is also the only Authorization that contains a paragraph ten. This paragraph contained a legal argument about the President?s ultimate responsibility to interpret the law on behalf of the eXeeutiVe branch andhis authority for issuing the Authorization. we 51749-0002 president - i The weresignedby 'the-Pre'sident', followed-by aplacqand date off'signatL1_re, but o-ne-?authorizatitm Was signed in Washirigt?Oil, D..C-. ?other. Signatures ,1 . I ?iUndelr? thei?phg'apsc ?approved for form and legality," the-Attorney Generale signed all but one of thea?uthoxizations: Thez'd?ther authorizaticrr and ?thci?two modj?Cafioris were signed by ihe'Counsel to the President.- Note: modi?catibjn's?, have a?handwritten .nbte signed-by flies? a 7 sense. (orDePu'ty Secretary of Defgrise)? direqti?gth? NSA or the Director of SA to execute the donument. I I Ty? 'fl fl! 15KB ?@309? my: Wme?im my Eva-mg- 1151] 1552 This; page intentionally 16ft blank. (? - :3 . . . i ?Fimeimee? ties! Events (U This timelmeincludes key events implementation of :thePresident?s? ?Sui'Ve?lance 'In'ad'd'itioII. to iss emcee the Authorization, the timelineincludes-.seleoted. CommuI?cations --between NSA and "oer: tees the Foreign Intel-ligetfce surveillance Court Beoause, thetzttir'nelineis limited to documented. 1t is notral?l-injcluswe. extents cOmmunlcat1onsv, 72001 east-o1 1st Presidential Authdrizaticin signed 4-;Qetw01 lGenerai Hayden ?br?iefsWhiteiHouse (Presidentt Vice -. VP COh?s?eij?VP- it Counsei) NSAbrjeftheirj-a?nd, Rankithember oi-?House Permanent 85$th 3 'inteiifggenoe Vice Chaif'o'f senate Seith Committee on intelligehoe (380i) 2mm ?an 14?Nov?0-1 NSA briefs Chairend .Ra'riking Member, HPSGI. Chair and Vice-Chair. sec: 30-Now0?1 3rd Presidential Authorization signed 4;Dec;01 NSAL ?Senate Defense Appropriations subcommittee; and Rahking Appropriations Subcommittee 2002 11?Jan?02 NSA briefs Department of Justice, Of?ce of lnteliigence Pol?oy and Review QEPR), James Baker 31-Jamoz- NW3 mm 'etambeh 5?Mar~02 NSA briefs?Chair?and Ranking Member. and Vice. Chair, 3501 1153 104Apr??Q?2 NSAbriefs Chair sac; 1=zmmay+02 briefs ihCU'mibent?FISC Presiding JudgeKollaereteliy and Ranking V. ?SA-briefs FtSC'PresidingJudge Koltar~Koteliy at the'White'House NSAir?Il?s?peCtor Genera}. (1G) cleared for. the PSP 1Dtt1Presid_e_ntial Authorization signed ?gs-3pm. Depuw General Counsel AssociateGCrfor'Operations, "d?iG" 18?S?p?~02' TsthiS?Al DuesDiiI'gence Meeting sweep?02 NSA for 16?Dec-O-2- iG adwses General Hayden to ISSUE ?Deiegatzon of Anthonty Letters" to "units that administer the project" 2003 B-J?an303 ?1-3th Presidential Authorization at Red I .Rsratrama rag??r"- I1 Tam? M: ?and?! :1 :?w?ar aqu! we: {a ti mun?m . hi ?w v-E .2: 5-fr- We! 11,, "El: mi?gur; Hang/5 FBI ?Din?citor visits far: brie?ng ngan'?g briefs: Chair and RankingMembe?r. HPSCI, Chair and. I k' 'Gi?neraI-HEYd?n [531185 ?rst-.D.eiegatign of {Di-key Directorate Qplerational personml mama: i Mtg.- ?#55 "Tn-ism? r? =1 amrap? . rah/mm}! WEE-W a-vm.? 1.. 5MP - L353: Ra?: to dist-mas PSP'Qperatiohsand Customer . needs - 3400503 15-Oct-03 1~Dee~031 paratione $132903 PSP Jegal?Dpinio?nsand is raid that ?a request ?Sh'Qut.d ?CQmeisfrom G'Bn?r?l' Hayden 2131::Presidential Authorizationsigned: :le?moasks Genera: Haydenth VPCounsei's-permission-for NSA mac-013' 20.04 B'aJan-Ud. NSAy-br?xefing-?Zto ?5.on Mr, Pyhilbiny Mr. Goldsmithfor'Mr'. .Goldsmith's. ahdoth?r-NSA Sig?nazs Intelligence Efforts against and meet-t0 disCussthe-PSF.? andfrecent-Changea Lat?Ns?A?i. ?Generat Hayden brtefS?DtrEGtOF of Central'lntethgenee-IDCBon of the PSP 10~Mar~?4 General-Hayden of'Sta'ff, Deputy DCE, Deputy. AG, and FBI Director. PSP 10-Mar?04 aGenerai Hayden briefs Speaker of the Heuse. Senate Majority and Minority leaders, 'HousefMinorityLeader, Chairman and Ranking Member, HPSCI. and Chair and Vice Chair, 850! 10?Mar?04 Genera! Hayden briefs Sactetary 0f Defense, DOD Principal Deputy GG 11temaryo4 23rdPresidential- Authorization eighed 'i?1-Maer4 iG? and-Acting GC discuss?new Authorization signed by President?s :Co'unsel rather than the AG NSA brie'faHouae Majority ad 12+Mar?O4 muf?er-04 General Hayden briefs House Majority Leader Revision to 23rd Presidentiat Authorization signed . 31 I: ?at! Emu- few?. 1 in?! ?a . :41 Ix? pr:- f? A, *ri-?Kaixrg 1gmg! gen. 2 ginApnozt 2th Ramon to 23rd Presidential Authorization signed Order?a?pprov?d byFl'S'C ?Et-FreSi? ntEaI-AuthOrEzation signed Advise? i'Auth?riati?oh signed 23-?Sep904 Pr?ESidentiat "further direction" of 9 August 2004 expires- as Chair, 17-Nov-04 'ZBth Presidential Authorization sign :1 5-Jan-05 NSA briefs Nationai Security Advisor and White House Counsel 23th ressdenti?al Authorization signed ??57 ?Ti 58 seals; 5 SSCE, 25$?9b455? GBnere! Hayden briefs'Wnite House Counse! and Counseirto Deputy/AG dams-10,5 ?B'D?th? Presidenti?lerthoriZation signed .IGsneral Hayden'briefs DireCt?o?r. of National inteIhgence?(DNl- 23?May?05. Two-fevei PSP *li?Jpn?OiS 'DiSCUSsionsto seek FISC-orders to authorize. contenteolleotion begin With . . 93'2nd- Presidential-Authorize use - med. ersnew Director General .ErlncipaIDepuly DN Ataxa?nder on thePSP 10aSep-?5 signed 154eSep~05 Chair?and Ran?kingMember, HPSCI, Ghairand en 13.09.2415 36th Presrdential Authorization Signed 164Dec-?05 Neerork Times says that President secretEy authorized NSA . eavesdro in on Americans DOD-16 receives bush-signed by 39 Congressmen. reques?ng a reView of the PSP. IG faxes the Ietterto the NSA on 10 Jan 06 21-Dec-05 NBA briefs 20090-05- r- i luvminixkov?gr?ni is?wa tantra SrJan-D?- iG ancifDoD iG' discussietter from 39?Congressmen requesting DOD '36 review of-th'e' PSP NSAIbri-efs' nine. FiSCjudgejsand three FISG legal advisors briefs-Speaker Majority Leader, Chairof ,Chairand Vioe?Chair, NS briefs Senate Leader. ChairSSCi?, jg a . 27%! ani-O'B' -J?an?06; 1 NSAjbriesthairSSCi 16~4Feb?106 NSA briefs "Speaker of'th?e Houee and Chair; HPSCI NSA .briefernair-andrR nisin'g Member, House-Appropriations (Jamar?06 NSAbriefsChairand'Vioe Chair, 5301. and? Members car-sec: Terrorist. surveillance Program (TSP) Subcommittee (Roberts, Rockefelier, Hatch, DeW?rie, Fei'nstein, Levin. Bond) with $80 Minority and majority Staff Directors, Senior DirectOr foriLegisiatiVe Affairs; National Security Counsel, House Counsel, and VP Chief of'Staff 10?Mar?06 NSA briefs Mr. Bond, Member, 880] TSP Subcommittee 13-Mar-06 NSAbriefs-Chair?, TSP Subcommittee. Members see: TSP subcommitteemoberts, Feinstein, andHatoh), SSCI Majority and Minority "Staff-Directors. and SSGI Counsel at.rNSA 14?Mar-06 NSA briefs Mr. DeWine, Member, SSCE TSP Subcommittee at NSA 21aMar-06 38th Presidential Authorization signed 21~Mar~06 NSA briefs FiSCJudge Bates- 27??Mar?06 NSA briefs Mr. Levin, Member, SSCI TSP Subcommittee and Minority I Staff Director at NSA 29-Mar-06 NSA briefs Chairman and Ranking Member TSP Subcommittee, TSP Subcommittee Members (Hoekstra. Harman, MoHughr Rogers, Thornbeny. Wilson. Davis. Holt, Cramer, Es?hoo,,and Bosweli), MaJOrity :Generai C'ounseij Staff Member, andMinority General'Counsei ?rm: 5? ems-M 1.1.x; zir?w? unlit - at 9 milk. if - iLnM ?33: swan a-iwgiy?f?i ?ii 6'0 the Subcommittee; HPSCI . Subcommittee Roger?s} and General COUNSEL Stef? timber. and? MiftD?W Genera} :GounS?iiat-xN-SAJ -- i. - :NSAbriefSiRankingMember, fHPsor Members of" ?iG ?ei?Staff-?Member and Mi?n?brit Genera oeunsetatleSA briefs Chair and RankingMember House Approp'riaticins? Committee DefeHSerSub'Committee ??rmware, AuthOrizatioun signed 1.??May406 Chair MembersgiSSCiiRobert's; Hageii? Bayh, Gha?mbiiss, LavineFeingold? Faihstein, Wyden?WEImer), SSCJ- St?aff?Member, SSCI Majority Staff Diractor. Ehd 17'4May406. Chair. HPSCIV Members (Hoekstra, Wilson, E?shooL Rogers, Thorn'b'erry. Hoit, Boswell, Cra?mer, Gaitegiy, Davie, Tiahrtl Reyes, Ruppers?berger. and Tierney), MajoritymGeneral 24.4May406 FirStBusiriesS Records Order approved by thexFISC? NSAbriefs Ms. Feingotd. SSCE MEmber at NSA 7%Jun:06 NSAbriefe-Ra?nking Member, Senate Defense Appropriations Subcommittee, "and Director mum briefs?President?SPrivaoy? and CiviE Liberties Oversight Board NSA-briefsChair, Members (Mikuis?kjh Wyden, and Hegel), Minority?Staff Director, 8863 COunsel', and Staff?DireCto'r 15?Jun?06 NSA briefs Chair, sec: and $30! Members Feingoid; ?Bayh, Snow'el Hatch, Lott._ and Bond),- and Minority Staff Director 26?Jun-06 NSA-briefs Chair. Senate Defense Appropriations Subcommittee, and HouSe Minority Leader 30-Jun-06 .NSA briefs Mr. Bayh, 530! Member at NSA Gunl-OB Authorization signed 10?Jul-06 .NSA?briefsMs. owe, SCI Mebend NSAbriefs Mr. Cbambiiss, Memberat NSA . 419:: Presidentiai Authorizatim signed iris? r:"riie 11.! titty: i . i3)? a" 3? wter git i) i 120.24N'0w06 :84D?ecma 2007? 1??Fieb-?07 1i ff) @253 pl '3?rg Us? g" Ra?. 3; .5: ?2 ?wmizbriefs Presidan?t35 Privacy :a?d?GiVH ?Liberties-tOversightBoard 43rdzand fi?'aEPresIdentia! Authorii?tion orders bythe FISC AG?,Ietter tabongr?e?s: br?dught'mder the F150 'NSA=b'riefS and CM: Libertiesovers?ight Board expires 33?. i1 0). This page ?intEntionalljr left blank, g2) (ma) @Mmu?a?-Ev? Mummy-m ?Q?aa?'a?n??eg APPEN m. - m} . This page intentionally left blank; 1164 .?f?ih??wm??a?c?vg me?ma? @Eem?amaag Em ii}an @mwg?mgs? ngmm4 Thispagc int?ntion'ally left?bla?nk. . 1&3? Pms?c?m?s Eimgim'm and] ampemr Gm?m?? Reamr?s @tm' Em APEMMEQ 3309?0002 7 1' 3 mu 1 . This page intentiOHally left-blank; ?1168 W) tam-mg,me @t?gmm? .mp??s @133 ?ling am V'Thisu-appendix lists describes DIG ?ihv?stigation and review "(jigsaw-t3; cbnducted ?nder the @1153 referred ritola's the STELLARWIND Progp?m," Iglated activitites such as [the-Pen :R?gi'ster?Trap Trace :Qrdefrarid the.- BuSinesaRemrds' limited to activity conducted befWeen. 410?C'tober?2001 and I7 2007. W) ?9Eigmwes??a?w$ (U) Report of'anestigatibn 01? TWO Viblati'ons . . . . 0' . .. . . ?neiOlG issued arepovt on. whgtipbdi?j?d t-b bathe; ?gst'tw'o violationsof?AuthoriZatiOn, 130 th. of Which were ur?iitentional, NSA OIG found that in .neither'rincident had NSA parSanEI acted with intent their authority. ?11:69 117(0) Beth incidents occurred, at. leaS?teii?n-part, because early inv'the' ?the terms- of the Authorization were: so closely held operationalpersonnel-wanting under: the": Autho?ty?were permitted to see the Authorization, .or'fits .leetativeiprovisions. hold persons Violating an order that they had not seen; When theordet was tooi'eomplex to be easein committed to memory; Accordirfigly,= :the- GIG did not fe?ommend diaciP-linanrac?an, blit'did-teCOmmer-id that the-NBA Director issue formal-written delegations of authority to the Signals IntelligenceDitector'and Speci?ed subordinates so that personnel working-z, the ?Programwould'-know ?th precise terms-of theyAu'thorization; Management Concurred with the, reeomt?endatioris'and made: noti?cations; This report Wasfsentto ssoi 01131 May 2006 anciiHPSOL 01:12 -. On issued-a report on an investigation iota-management breakdown that had resultEd in unintentional ?ltering violations of the. FISC Order. The Order permitted NSA to collect Internet metadata from communications involving he Violations occurred because . However, no ations 4 r0 . . .e collection Of domes __1o CommunicatiOns. collection manager discovered the? violationson .. ., The the ?ques'tiOn'able no er: ion was opi?ied; c1 ted the DIG and the CBC. With the exception .0 3 GIG evaluation-e responm . leddire?c?tly to the replacement of the Program Manager and to in Program management, leadership, Chain of ?th This report wasr'sent'to 5801 on 31 May 2006- 91132. January 2008 and was redacted at the .reqtieist of the. White'House. None? ?th messages had een in en nay colleet been analyzed, and none had been reported outside NSA. This-report was sent to SSCI on 31 May 2006 and HPSCI on 2 January 2008. (U) ENG Reviews May 200:4 (U) Need for Documentation and Development of Key Processes (ST-040024) a a his DIG report concluded that a continuing de?Ciency in clear, written procedures governing the collection, processing, and dissemination of PSP material created undile risk of unintentional violations of the Authorization. The report noted that Program of?cials had (1711?1'1?1 Wmlinm-r 1n 1. 1 L: If tit/"C L. 11W 1 51,, Strangest): 13 394072004 f?adegptogress in addressinssome de?ciencies) but. found that. processes had not been fully documented-in the former. management directives, administrative policies, or aperiatmgmanuais- 01G, recommended that ngram {Gf??cials Writtenoperatias. I procedures-for thezifol'low'ingik'ey prooes'ses'; a ApprOVals for contentcollection by the appropriate- narned officials so? Reporting-.Ofvidlationsi 0f the-Aumorityy similar to ,proeeduresf-Ifor 'd'o'cunienti 11g violations of Legal. Compliance- and ?Mini?niizatiOn ProCed?ures?- 0? Evaluation of dual FISA. and PSP .content collection Systematic.identi?cation andevaluation oftelephone numbers and Internet identi?ers for corrective action Was taken in response. to the fourcre'cbmmenda?ons. This report was-sent to 8301 on 31 May 0'6?ar'1d 01:12 January 200a Need?er 'mGreasedAtfention to SEQUI-?ity-Rela?ted As?p'ectsaof?the. STELLA-R WIND Program is taxi-?0025) This GIG report Weaknesses in Program security; The Program was particularly-mtlnerable to exposure hecaus?eit- involved numerous organizationszinsi'cle arid outside NSA. While the Program Manager placed a Strong 'eniphasis' on personnel security, he did not take-a proactive and-Strategic approaChli?to physical and operational security. In particular, better useof the Program Seeurity Of?cer would have helped to improve special security practices for handling Program material and strengthen operations security (OPSEC). (U The Program Manager and the Associate Director for Security and Counterintelligence concurred with the ?ndings. and implemented corrective measures. In particular, :lth?e f?cer?wasireedfr?om other responsibilities to ok 'a more active-and effective role - in. Program security. I M?iiag??iemfid I101: andli?t'a 312135377513 recommended;howevsr, straps-V taken: management ?to implement the original recomm?nda?on. report Was sentto .8801 011.31 May 2006 23nd: on ai'luar-y 2008. eviawvof theTas?khg Processfm" . us. Content Collection tr This report-identi?ed material I iveakneSSes in the tasking and detask'ihg prooess under the The. process to task andide'ta?skxtelephone z-nurnbers? for Content ?ColleCtion'under' the PrOgram was" inherently fragile because-zit was based on e?mail exchanges and Was not automatedor mannered. apprOVed for . colleCtiononlthe date November-2004 When. the audit began identi?ed the following types of- errors: involved under?collection; identi?ers Were not put on colleCti?on quickly- enough or were not put on. colle'ction?until the DIG discovered the errors. I yolved unauthorizedcollection caused by a Wpog?faphical error. nv?olve'd OVer?collection; they were not remove from collecti?On quickly enough. record?keeping errors in: the Program?s tracking database unauthorized collection caused by a typographical error, SA personnel did not review the collected information before destroying it, nor did NSA issue any report based on, or seminate, any information from the 2 of untimely detasking. However, without a robust reliable collection and tracking process, NSA increased its risk of unintentionally violating the Authorization. .NSA also increased the-risk of missing i fee snowing: valuable foreign intelligence; by failing; to task telephone numbers andInternet?fidenti?ers in a timelyr manner. (11/ INS-A DIG reocmmended that all encrs be SWif?y that speei?c to. prevent, recurrences, andthat identi?ersetas'ked? fer-collection be receneilecl With identi?ersapproved for repeated every 90 days; Manage?ment?irnplemen-ted the recommendatio,ns._ ((1/wa9) This report was sent to 31May 2006- and HPSCI on Z'January 2008 and Was redacted at the request? of the White House. 31 May 2006 Review ofCompliance? with Authorization Reqyire'ments. for STELLARWIND U. 3. Content Collection (stream-0027his reportsdetermined that, based on Pregram of?cials Were-adhering to the terms-ofithe fAuthoriZ'a'tiOn and the Director?s delegation thereunder; that tasking Was appropriately approved and duly recorded under the Authorization; task-ingswats justified as linkedvtolal-?Qa?ida or af?liates or aleQ?a?ida. The: report remainiended improvements in record~keeping practices. W?Due to a leek of suf?cient and. reliable-data, the NSA 01G: Could: not reacha con.c1uSion on "the. taSking approval process f0r.?tWO PSP-?related collection pregrams, The OIG recommended that management reapoihs?ible for: the affected programs, designxand implement a tasking and tracking process to allOw managers to?a?udit, assess timeliness, and Validate the sequencing of tasking; activities. Management agreed to install automated tracking of tasking and Wmmough the collection architecture was designed to produce communications, inadvertent collection of domestic communications occurred and was addressed. The OIG recommended changes in management reporting to improve the tracking and resolution of inadvertent collection issues. Corrective action has been completed for one-of the two recommendations. - . mt? wan alum-r; 1W4 @m Cu?: in.) LN: on: a e) 111/ This report-was sent t6. 380101131 on 2 p-Januexy 2008 and was redacted at the .rrequest-?f-?the White. House 1ng :i applementelReportwv?eview withA [Immigration Requirements 'Content?rco?eC?On (sf-044027.01; 11? 2006 H. -, .1 IV?After the conducted further research tondetennine" wheth'erPro of?cials were approving content: tasking requests based solely'on.metadajta analysis. USing the statistical-sample in the Original no instances" of metadiata analysis as the sole justification for content tasking. In all 'casesteste?d, there was corroborating evidence. to- support the. tasking- decisiOn. report was sent- to 88611 on 13 February on 2 January 2008. 5 Sen 2006; WREPOFIT on=the Assassment Of Management Implementing the Foreign Intelligence: I .Semez?laince-Court Order: Telephony Business'?ecords. (snoreoms) . - the telephony metadata portion of the PSP was transierired to'FISC-O'rder' of Investigation for an Ord?r Requiring the Produc?cjnofT - I . On 10 July 2006, in a memorandum with the subject FISA Court order: Telephony Business Records 0018), the NSA OIG issued ?a report to the Director of NSA 4-5 days after the initiation of the activity [permitted by the Order] assessing the adequacy of the management controls for the processing and dissemination of US. person information." This report was issued with the Of?ce of the General Counsel?s concurrence as mandated by the Order. The ?Report on the Assessmentof Management Controls for Implementing the Foreign Intelligence Surveillance i175 S?Septe'mbier 200.6, provided the details at the ?nding? of the loamy memorandum amid made formal, to mauggemear .. 3eMainagementcommiegoverning the pm??'SSingg and oversight-of" telephony metadata a?nd U18. under the Order were adequa?tc-sand in several-impecc- the? terms oil-the order; Hoiveizergdue; to f'the rieki as?ecciateci With?the, collection and. proceseing metadatasinvolving U.S-. personiinf0rmation, Icc?omnended threeaddi?dnal Contrc?s regarding procedures, r?cnciliatibn of auditlogs, and Segregation of d?tiee. . .celt?eetion Procedures: I n. During an GIG review. proced ram management-discovered that washer?21in" ?g data uici ve een suppressedfroma the CQ lg ow. Immediately,management-blocked the View. Further, Working the Prayiders, Program management completed-Suppresaion of the suspect dataon l?Octo'ber 2006 and agreed 'to' implement additional procedures :to- Prevent- the Co'liectiOn. of un'autho?zed'data. A W?econdiiation of-Audit-Logs WManagement-controls were not in place to verity "that, telephone numbers approved. for querying were the only'numbers queried. Although audit-logs documented the queries of the arch'iVecl metadata, theiogs were not in a usable format, and Program management did not routinely use them to audit telephone numbers queried. Management concurred with the recommendatiOn to conduct periodic reconciliations; however, action was contingent on the approval of a Program management request for two additional computer Programmers. hang: wr?wisna I .wa?xlml ?wither w: it 20;. Dezcazms =~ack est-segregation arouses, sCVen iridiVidua?ls" with the authority to, approve queriesalso hadthe ability to conduct Queries Under-{the order. Standard internal "Controlipraotices require that key duties responsibilities be diVided among d?ferentzpeo'ple to ie'du'cethe AlthoughiProgram management ?clorictrirreduwith ??ier finding it SCUM 11,6?: implement the-recommendation [clue to; 'Staf??rlgiand operationalrieeds. As alternative, Progreun management . agreed. toivde?ve?lop a proCess, to- queries of the s'eVenindividuals; This. action plan was- Contingent on the development artisans. audit logs recommendEd above. (U. .COrrective action has been completed for one of the three re comma ndati'Oris. report was. sentto $301 on 13i'Febrtia1jy on 2 2008'. i. #111,136an 016 oversight2001-2906] Activities? l1) 20- D'ecember?QO?O'?, the. 01G issued?a report summarizingQIG?s?overSightrof the STELLARWIND Program after five years of implementatiOn. This report was sent to 8301 on 13~February 007 and HPSCI on 2 January 2008 and Was redacted at the re'qilest of the White House. Assessment of Management Controls. to Implement the FISC?OrderAuthorizirig NSA ?to- Collect Information Using Pen Registerand Trap and Trace DeVices (ST-0641020) W) the DIG reported that the management contr collection, dissemination, and data security of electronic communications metadata and US. person information obtained under the FISC Order authorizing NSA to collect Internet metadata using devices were adequate and in several aspects exceeded the terms of the Order. Due to the risk associated with the processing of electronic Communications metadata involving U38. person information, additional controls were needed for processing and monitOring queries made against PRTT data, decumenting ?1177 a ET, 's '3 'sr?09a00202 oyefsig?ht ac?vities, and providing assual refresher. training on the Oi?dEr. Corrective-action has been completed for 9f the-smirrecommahdations'. to ssoI. and HPSCI 5? Jo} 2007- Domestic Selector Review (Stadium?) (w The 01G conducted this review to ?determine whether t?as?kingzjusti?cation statements were supported with- intelligenoe-information consistent with sources cited in the. justi?cations. The Ongidenti?ed some justi?cations Containing errors but there was no. pattern of errors or exaggeratiOn? of facts or intentiOnal misstatements. This reportwasvsent to 38011 on 2.8 anuary 2008 and HPSCI on 28: January 2008. 30Jun'e 2008' Wd?sory Report onethe Adequaoyxof I STELLARWIND Decompartmentation Plans? (ST-08001.3) I, 7 At the request of the SID Program Manager for Special?Projects,. theOIG assessed the adeQua?cyoftNSA?s prams torremwe data from the STELLARWIND-pqmpartmeht. 'asrau-thorized by-the DirectOr of National Intelligence; On the'OIG reported. thatrNSA management had a ?sol'idlfo?utidation ofplanning fOtr?deeompart-mentation. In particular, the assignment: of supporting to provide reasonable- assurance ofisuCcessfully removing data from, the compartment, while- camplyi'ng with laws and authorities. Management was also diligent in. assessing the scope and complexity. of this unertaking AlthoUgh the OIG made no formal recommendations, it suggested improvements to develop more detailed plans, set ?rm milestones, and establish a feedback: system to ensure that plans were successfully implemented. report was not sent to SSCI or HPSCI. - r?r?a 1.1:..Ibh; (mum: @131 ?9 w? wasmenmu maa?im?mm APPENMKF 03? 75 c: av NA Swag-0002 This . page blank. 118(3 72msaeamaa?. I I. ?Excput-NB Orders 12333 and 1-28.63; intelligence agehlcies Zto .r?e'p'ol't to the. PreSidenti..through me Pre?s?ident?s Intelligence Oversight Boa-rdglac?vities? they have-reasgn to believe may?he?uhlawml .Qr contraly 'tQ eXe?cu-tive Order Ofpresidc?tial dir?acti?e; Knowmg. that Beard members werenot claarsd; hOWeveri, Director or Deputy Dixector reported-the vidlations. of .t?shePres'identi related authoritiesstouthaPresideut through his Cour-1361, ratherathan thrbug?h the Board- Each 'zioti?cation: was Som? ofthe noti?cations Were not the- sub?jeet of the 016' reviews 'Cil? Evasti'gations discussed in Appendix E. (U) Date Summaryof Notification (.1), the: none ?it was not 1181] ED 2 merg- '5 near? yam} Tl . . 11:2. if?) 5sz MLM Wk!) Date . summary of Notl?pation 7: 1 Describes one mstaneeiof nt-colle?etion "Of a can with both ends in the us. a team trio have bee . until it was listened to showed-the call as h-avin aforei .I. iin?dt?? I Describes three incidents: The-?rst involved a Onemdigit typoresultingin one incorrectly tasked number. The second intiolved a number improperly tasked for metadata analysis. The-operator discovered it almost immediatel and. removed it from. tasking- The third involve - numbers that'were not detaslced in a .?jnely?fashion. 1:2":Aeg32005' y-ve regultee in overs efers to work in developing pursuant to statute, the data?ow was femin?at?ed Immediately upon discovery. Also, because the improperly collected metadata had been forwarded to non? STELLARWIND databases, the Agency removed nonwcompliant metadata from all affected databases, including those in which STELLARWIND data is normally stored. e1. of'Notlfication beset-lb nstanoestin which perly tasked d: in inadve Exit Collection of, ot-tnon-etarget data. me error was I erson?nel res - onsible for dieoovered??iih" Hours- monitoring Was eorrec dyatn deleted; op erly taekd bf?prO. PEFIY tasked in inadvertent collecnoniof tele hone. numbers res :and- 'there'Was no em Lance-that communications" :?Although noreporte were generated, I as all end foreign without reviewin Th ?les were deleted ,d 3 I A second incident was reported in which a typographical error re ntaot chaining on a US. telephone number with af?liation. The telephone number was rechecked, an error was corrected. WE This. page blank. i184 GD T1 (0 mams g?gm?s Erem?w 3mm, Wm?mim?mm Pmamawess . In?ll-MN! WOMDIWIV U14 0m? 7 .-. A SUN-H ume 1 ?85 ?1186 This page intentionally left blank. mm - maxim I {ML-am? aiLW L, WNW W?v rl-v- Fth??-rge Masada:- Mary?and?w EWQTES 3 ?33 $13 WT LL 3 ?73: DH 8- 27? July 1993 INCLUDES 1 and 2 ?31 Dl't raproductian or release of this dommenr. "1563's JUN HEQUEHEU mm 1187 15;: @a ?ti Es) . 7&3 This page intantional?lyile? blank. ?L'M?aTtimmL SEQ-URIW A?mw E0 (1339 we. 98:39,? Maryaulam 257" July 1993 - UNITED SamT?-g BHREESTWE Mrs-saw PHGGEDUHEE ;a LETTER (U) f?sts?SID furs-Scribes palici?sisizw and aSsi?gtgisg respansabl?tias {Demure 'tha?cithe offithai?uniged-Sta?as: Sl?iw?r Sysiem (Laminated "In '55 mannar {ha} excung?tuamas rights 01,113; gersqn's. EU) This to. make itg-s?dr-tEr? am eager to} c??n?umti?s'a summary .2:er laws disrecu?y- zuaa'a?unne] who Enact; to. from, {Jr-alumni parssna; in me- Un?.a?ed Statesr?tusl-b?e? familial: with its cgn??an'ts. Th?s" Haas-a 16. and :3st mr mnax A GS wh-i'ch are. daiad?q Ciugtgbar mus": ba d33?lroy'ed9 Notlr'y if. ihis Edition IE an Gin?urgency mien: otherwise. reguest?appmvai Iran's {mime resuming? 1mg USSiit-i. Reina-age 0r signs-Mrs of. ih'is document '10 q-cnt'racmrs and ?cvnsuk?ants whhuul the: h-S?a??agfar istpra?hibitai, Instruc?cs?ns applicable?to rahaaf?a of to canlracmraan?d aorxsuiiaram'r?ay be" found in Ul??iD 1E3. sh?ufsci he addraased the Gi?ce at th. 5E1 Questions and Comments 6 Banarai CIZIUFISBE, NSTS CBGN EL Vice Admir?ai, US. Navy {lira-afar tan [3 Lin-?! [Cl "?ank. I .w c. I This Qp Ir: an, ED 119 Na {a 5, @m i mama REGISTER cmwes {Jane Auner Wag 250%; ma?a H1 3m}: Dec 93 119ac93? 13'- '37. Juiy 11.993- ENTERED Dma 290mg? R53 11.031398 WF 1191] m; 69 Thisrpage intentionally left-blank9-2 - i: 1:3 354? July 19.93 TAB LEI QF CUP-ITEMS Persons anti Faraign ?Intesligance SuNeil?lance Gaunt Approvs'eb..Atmrn?meeralAppmvai c. d. :ErmrgancySituations run-g 42,. 4:3. incic?ieematrAcquistzian mammanbn 4.4. Nt?nresid??t-AlianTargats} Entering the uhiaeudlStateS 4.5. LLS. Persm Targets Entering-{he Druid-States4'3. Parsons . . . . . 43?. ?Direcriun'Fihd??n?g 1; I u-v-I 5; at am Sammy Taming of Automated'Enfermaizirzin Systems . r. A .- A: 1 Prcceasfng C. .. 531Cornmunicataons between Peisons in ?ha Uniied Sta?t3, Communications betwgen US. Persona c. CommunEcatjon-s 13-on ?ng an Officer or Empfoyee oft?ne U.S,Governmant . . . . . . t. 139 :42; Hi cn r? 0'1 WE an; I . I. . [Fill 4m:- 1 5.5. Radio with a Terminal in me United States- .. . . 7" a 6.1. Retanainn a. Unenciph?i?a'rad Gommunfca??ng: and1.60mmunica?onsmemssary to Ma?ntam Technicail?atasESa-SBS fnrr?i?cyptanafylmiur Puf?p?as?Carnmunicationss?u?v'?ich Qatzid be: DiSs?mina'ted Under session?- . 5.3. 3 SECTION . . . . . . . . . . . . . . . 8 721Pu?liclyAvailabE-elniarmatinn .9 c. l?forrnaiion Necesgarytn understand arAcc?gs5 9 Y?s. I I a. a . th Spital. had been ?outrageous? baSiS' alone, . duct-during the in'eid?ent endihie was willingto ?resign on that General Counsel :Caproniatold' :us that :shewal-Sio Was-(prepared to resigm She- said that'the ears. pri'maljzzeoncern regarding the. impasse between the Department and the White-House over the r?ogrameras not with. issues of privacy andci'v?il liberties, butrather With: ?the rule of'lawf? At approximately 1:30 am? on March 20074:, Mueller drafted: by: handa. letter stating, in part: ?[A]fter reviewing theplain language of the FISA statute, and the order issued yesterday "by the President . . . and in the absenCe of further clari?cation of the legality of the program from the Attorney General, I am forced to withdraw the FBI from participation in the program. Further, should the President order the continuation of the. F8175 participation in the program, and in the absence of fUrther legal advice from. the AG, I would be constrained to resign as Director of the Mueller told us he planned 0n having the letter typed and then tendering it, along With his March. 11, 2004, memorandum to Comey, but that based on subsequent events his resignation Was not necessary. 3. Gamay and Mueller Meet with President Bush the merning of Mare-h 12,- 2004, Corney and Mueller Went toathe- White-HouSe to.-attend the regular'daily threat briefing with the President'in- the-Diral Office.? Conley said. that following the briefing President Bush called him into-"the. President?s private study for an ?unscheduled meeting.? . Comey told us that President Bush said to him-,- "You look burdened? Comey told?the Pres?id'entithat he did feel burdened, to Whieh the President responded, ?Let melift'that burden from you.? Conley told the President that he felt as if he were standing on railroad; tracks with a train coming toward him to run oyer his career" and can?t get off the tracks.? (U) Comey said he then explained to the. President the three baskets of. Stellar Wind collection and the issues and prOblerns associated With eat-3h. President Bush responded With Words to the effect, ?You whipped this on me?? all of a sudden, that hewas hearing about theseuproblems. at the last minute, and that the President not being told of these deVelopments regarding the program was ?not fair to the American people.? 'C'o?me?y responded that the President?s staff had been advised of these issues ?for. weeks,? and that the President was being "?s'poorliy serVed? and ?misled? by his advisers. Conley also saidto the President, ?iThe-AmeriCan people are going to freak when they hear What'ooll?eetion is? going on,? President Bush respond-ed, ?That?s for me toworl?y about.? 3 ACcording- to Corney, the President said that he just needed, until May. 6 [the date- of'the next Authorization), and that if he could not get Congress to ?x PISA by then he Would shut dawn the program. The PreSidentemphasized the importance of the program?a-nd, that it ?saves lives.? Comey told the President that while he understood-the President?s position he still could not. agree to certify the program. Comey said he then quoted Martin Luther to the President: ?Here stand, I can do no other.? At the end of the ConVersation, Corney told the President, ?You should know that Bob Mueller is going to resign this morning.? The President thanked Comey for telling him. that and said he would speak with Mueller next. Comey said his conversation with the President lasted approximately 15 minutes. ollowing the conversation, Conley went to Mueller, who was waiting in the West Wing, and started discussing- his meeting with the President. "Word Was then sent toMuelle-r through a Secret Service-agent "that the President Wanted t6 meet with .him.13-0? Mueller-later ?l-Sid?? nete's in, his programing about his. meeting PresidentQBuSh. hectording to his-notes, the.'iPresident told Muellerthatghe about another terrorist shade and that he?. lined? that the Stellar Wind program was essential to preteeting? rt fu- b1, b3, b7E believed woul?dbe aCCOunitahle?-if he did not do possibleth prevent another attack. The President explained. to Mueller that. fer these reasons he had authonzed the Continuation (?fths: pregra?hi evenwithout the iconcurrenCe of the Attorney General as to the legality of ?Various aspects of the program.? Aceerding to the notes, the President :told- Mueller that the congressional leadership had been briefed-on the-President?s action to lentendthe program and was ?Understanding;.and- supportive of the ?Presidentis position.? The President also toldlMueller' that he had: urged Conley to agree to extend the program until-May? and that he hoped for a legislative :fix by that time, but that if no legislative; sel'ution could be found the legalityof the program was still in question by that time, he ?would shut AcCorfdin-g" to notes, Mueller told the Presidentiof his concerns regarding the continued participation in theprogram-without opinion from the-Attorney General as to-its legality, and that he was considering resigning if the FBI were directed to Continue to particia?te without the ;conCUrre_nce of the Attorney General: The President responded that he?Wi-shed to relieve any burden [Mueller] may be laboring under" and. that heididnot want Mueller to resign. Mueller said he explained to the- President that he had an ?independent obligation to the FBI and to the Justice Department to assure the legality of actions we undertook, and that a presidential order alone could not do that.? ?30 At this point (9:27 Comey sent an e-mail from his Blackberry to GoldSmith, Philbin, Ayres, Levin, and others; stating: President just took me into his private office for 15 minute one on one talk. Told him he wasbeing misled and poorly served. We had a very full and frank exchange. Don?t know that either of us can see a way out. He premised that he Would shut down 57/16 if Congress didn?t fix FISA. Told him. Mueller was about to resign. He just pulled Blob into his of?ce. I According to Muelle-r?snotes?, the P~resident?expressed understanding for-Muelleris posit-ion and aske-What needed to be cloneto address nuances concerns Mueller responded that Conley, the "Office of?Legael' 'CounsieLthe and the NSA ?needed to sit down immediately? and .ass?eSS legal status of the program in light of. deubts about the existing legal rationaleand the March 11?, 2004, Authorization. Mueller wrote: 7 Awarding notes, the President then directed Mtie'lljer to 'rnee?tlwith? Comey'and other principals to address the legal concerns 50 that the FBIciou71deontinue participating-{in the program ?as appropriate-under. the 'l?awl,? Mueller toldus he, met with Comey an hour later to: begin coerdinating that effort. At 4:50pm. that afternoon, Mueller called Gonzales to. request that additional Department lawyer's be-read into the prograini:181 Mueller told us: that this request originated with Comey and that Mueller Was merely acting as an ?intermediary.? (U) The President?s direction to Mueller to- meet with Corney and other - principals to address the legal concerns averted the mass resignations. at the Department and the FBI. According to Corney and other" Department officials-V, the White House?s decision to. Seeka legal solution and allow more attoiineys to beread into the program was a significant step toward resolving- the dispute, and in thewords of. one Department- official provided a way of 3?Stepping- back from the brink.? As We describe below, these Department officials still faced the challenge of finding a legaland operational remedy 'for the program that would address the concerns of the White House, the NBA, and Department, 4. Conley Directs Continued Cooperation with PISA (U) On the merning of March 12, 2004, Comey decided not. to direct OIPR and to cease Cooperating with the NSA in conjunction with the program. Comey?s decisionis documented in a 1?page memorandum from At least three additional Department-attorneys Were read intothc program on March 12, 2004, including OIPR. Acting Deputy Counsel for Intelligence Operations Peggy Skelly~Nolen and two OLC attorneys. (U) Goldsmith- to Corney in which Goldsmith explained Why Comey?s. action was legal. jl?nhi?s mornorandum, Goldsmith stated that the President, as ., commander?eineCh?ief and :Chief'Executive with. the constitutional duty to: ?take-care that the: laws. are faithfully executed,? made, a determination that StellaiiWind, as,p1?a3tiCed,WaslanLIl. Goldsmith concluded that this Department Conducts Additional Legal Anelyeis (U) On March: 12,- 2004,, an interagency Working group was convened to continue the legal analysis of the pregr'a?rn. In acCordance With the Presidents direCtiVe to Mueller, officials from the FBI, NSA, and the CIA werebrought into the process, although the OLC maintained the lead role. The workinggroup included Deputy Solicitor General Clement, Baker, FBI General Counsel Ca-prbni, Mueller, and several attorneys from OLC. Conley said CIA Director Tenet and his Deputy, McLaughlin, may have had limited participation as well. WW On March 13, Mueller asked NSA Director Hayden to assist FBI General Counsel Caproni in assessing the value of the Stellar Wind program. Mueller said he wanted Caproni to become more familiar with the program and to understand how the View of the value of the program 35.? Goldsmith told us his determination that the entire Executive Branch was bound by the-President?s interpretation of law was based on his discussions with several other Justice Department attorneys, as Well as on long-standing OLC precedent. (U) gcomparedjwith that-0f {Mueller said :that?iayti??:provided slides highlighting. cases in iinfermatien prayed:u.seful._ :1 wCapgr'Oni.toId that during; this March 2004 period, and-two other 3 - of?ciials made "anteffort wuat Value? FBI Stale:'Win'CEdeIivcd waswdi-f?cultto Value ofathe?program-? duri?ngfilm? early- stagesvbecause FBI field offices. time?Were required to reprt back to F1. Headquarters Withiieformation abou-thOW-infarmation fram?the NBA program had been -7 On the afternoon of Sunday, March 141,204, the Department convened a large meeting inthe: Justice Command Center- to ,reyiew-OLC?S program. .Muellen Carney,? Goldsmith, Philibin, Bakes CIA General CounseliMi?len Captor-ii, Tenet?, Hayden"; Olson, Clement, and-several lawyers attended the meeting; 1 Prior to the meeting, Goldsmith. and'Philbin prepared a detailed outline 'ofDLCi?s' chrren?t Which-Goldsmith ?described: to? us as his ?mdSt'honeet.take? of the-legalisweset Goldsmith Said me outline-to meeting-?partieipa?nts used it to: the? group 133 Capr?o'n'i- had been appointed the FBI General Counsel August?2003 and was read into the Stellar Wind program in-September or.'October 2003., She told us, she did not givemuch thought to the pregra?m at the time became OLC had determined that it was legal. She stated that in 200.4- she learned thatDLC was legal analysis and had concerns with it. She later spoke with Philbin, Who?confin'ned to her that he and Goldsmith had problems with the legal support fer the program and that he was frustrated because the program was so compartmented that he could not talk to anybody about it. Capro?ni told us that at some point she obtained a copy of Yoo?s legal opinion. She stated that after reading it she immediately understood Philb?in?s concerns because the opinion appeared to lack analysis and simply concluded that the program was if? Electronic Communications Analysis Unit compiled a summary of .. Stellar Wind tip results {rem Jamiary 1, 2003,. through mid?December $2003. b1, b3 However; the data. included in. the summary. was incompleteContin any analysis of the effectiveness of these tips. Another study of the 5 i tippers Was conductedjn 2006, The results of that. study are discussed in ChaptersSix ofthisreport3a10ng with the OlGls-analySis of the effe?tiVerless. of the program. 13$ Geldsmithalso noted. that as of the March 14, 2004, meeting, the Attorney 'General.had. not yet reported to Congress on the. program under 28 U.S.C. 530D. H?mvever, asdiscussed abOVe, the White House had briefed the congressional leadership aboutthe prOgram on March 10?, 2004. In addition, the former Presiding Judge of the FISA Court, 'Reyee Lamberth, and the Current Presiding Judge, Colleen l?Collar?Kotelly, had been read Into the program by this time. (U) I I. lell Ill?n. Ixxl .. IMP. I I I. .II. . .. awaam?ll. xm? ?Huang? .u1l . I I. emf - l. Lt :Lunal. II.qu a1 -I?ia?m? ?w?ii. g?tai kl. .. am": .au. .. a. immilul. .wufzuiansatuawwumanhll - ?ma?a: in. . Goldsmith told us that that/[arch 4- meeting'Was- designedto. achieve - ful?lzennsensusaamong the prineip?a'ls on theiss'uefs?, andi?iat the meeting was; in this. regard. (U) That evening Mueller called Gonza?l Nee-Fess- had been made, altheugh legal to: i" {had enot?beentennd. Mueller. also told Gonzalesthat 1m .sheuldspeak directly With Ciomey. On these matte-rs. Conley Determines that Ashcroft?e?mains ?Absent or Dis?a?bled? (U) Attorney General Ashcroft Was released from the hospital at norm on March 14, 2.004. The nextday, Conley advised Ayre's by memorandum that Ashereft?s elector believed that Ashcroft required additional time to recuperateat home was. not yet ready to restime'his responsibilities as Attorney General. Corney?s: memorandum noted 'th-atrthe doe-tor intended to .reassessAshcroft?s condition on March 24, 2004. ?Comey?s memorandum stated that, based on these circumstanCes, Comey continued to believe that Ashcroft was ?absent or disabled? within the meaning of 28 U.S.C. 508(a). Come'y?s memorandum concluded: As before, notwithstanding my continued temporary capacity as Acting Attorney General, I intend, Where possible, to exercise ?all the power and authority of the Attorney General? pursuant to the authority that 28 C.F.R. 0415(a). delegates to me in my regular capacity as Deputy Attorney General. (U) :COpyH-of the-memorandum was sent to Gonzales at "the White Heuseand to; senior- D'epartment (U) Judge authentically entered on Lacs or-?Atterney: General (U) Asrdiseusse?d earlier {in this report, the extent to which.?OIPR could? use Ste'llar'3Winds'derived information in PISA applicatidns had. been limitedby I Judge.KollaraKotelly, the Court?s Aftet her readariaeto- itheprogram in: May 2002, Judge had directed to- eontinuej. with-Some. modificati0nst, the ?iserubbin?g? procedures for FISA applications 'in?place at that time. it According to- an OLC memorandum, on March 1.4-, 2004, Judge Kellar+Kotelly {Was- informed that the. President. had. reauthorized the V?Stel?lar program, but that the. latest Authorizatidn lacks-dethe Attorney Gan-amps certi?cation: as reform and legality; 190 The: memorandum indicaitedthatas airesult i?ollar~Kotelly?suncertainty about. the implications of ?development, she intended to insist on a templete separation of intermation. derived from Stellar Wind, Whether direCtl-yi er indirectly, from all PISA applications presented to the FISA Court, The memorandum?noteid that. ?[h]ecauSe of?the way tips get worked-into (and lost in) the mix of intelligenceinformation, that would have virtually crippled all countersterrorism -- I 3. Come}; and Gonzales Exchange Documents Asserting Con?icting Positions (U) According to Mueller?s pregram log, on the morning of Monday, 15?, .2004, folIOWing the-daily threat. briefing in the White House "Si-tUat-ion Room, President Bush remarked to Mueller that he understood ?progress had been made,? referring- to the discussiOns on the legal basisv'fOr the Stellar Wind program.- Mueller called C?omey shortly thereafter to convey the President?s remark. Mueller suggested to Comey? that additional briefings on the program should be given to CongresS, including to both the House-and Senate Judiciary Cemmittees. Also on March 15, Goldsmith drafted for Comey a 3?page memorandum summarizing views with respect to the legality of the program. The memorandum recast in narrative form Goldsmith?s outline of. 35" As discussed below, Ashcroft?s doctors later cleared Ashcroft to resume his duties. as Attorney General asof March 31. (U) ?90 The memorandum was prepared in anticipation of a briefing for the Attorney General on March .30, 2004. (U) "March 14,2004 (discussed. above), that OSLC had. not reaehe?d; arty; ebneluSieti-?s ?a?d yet-prepared to issue-a final (Opinien'oti the program?" The memerandumalso stated that the-Stellar Windpregtam heten'tf'iially implicated' Various Con-grie ssionaliand ihtra?instecutive Branch repetititig;tequitements imposed; both by statute-and. Executive (Dr-den A The I memorandum? stated that OLC?rwas Only beginning to analyze these Goldsmith and Philbin went toe see Gonzales 01:1 the-afternoon Match 15 to explain what OLC had determined its.1egal.analySis to that p'eitit,? to noitify'Grlenzales that he WOuld be heath-1g fi'rjomComey shortly about the Department?s position as to the-program?s legality. According; to Philbin?s contemporaneous notes en the extents, of the next We days, "on March 16}, 2:004,- the momitig threat briefing at theWhite Reuse, Cemey? told President Bush that had finished its-? analysis 9f the program. 191? Conley asked the President it? Ceimey'should Convey the details of the analysis to the President?jndieated; that Conley should d0 80: After "Comeytetutnedto- the Department, he signed -a *shert memoriahdum to "Gonzales that he had. drafted the .Iiight'befete. In the Conley first recounted how the-President on March 12,? 2004;, directed the Justice Department to continue-its analysis Lof'th?e Stellar program and to. "?p?rOV'ide its best advicecOn?ceming'Ways tel-?Change the program to; cenfermawi?th the JuStiCe the applicablelaw? Comey then described the-compOS-itiorivof the Working 'gmupgeonvened to accomplish this abjective and how the group?s efforts had res-ulteduin Supage- analysis, which Cemey attached to his 5? Conley then :set out hisad?vice to the President; According to the 11:31 Cemey advised that the President-may lawfully continue: legally aggresSive indeed, novel arguments . . Carney fu ther-rote' that the-De - tment remained unable to find a legal basis to - lb ll - Come advised the such Philbin told the. OIG he-kem notes of these events because. Come}! had asked him to ?keep a record.? (U) rais?edw?fsjer10us_ issues about congressi . inst-ificati?on, ?partiei?arly where 'legali?basisfor the program-is? the President?s:decision toass?ert his authoritth oVerri'd?e an, .otherWise applieable Comey'-wr0te Would continue to exp-lorex?the notification" is sue. Conley instructed Goldsmith and. Phi-lbin to: hand? deliver the memoranda to? Gonzales at the White House, id. also delivered, Copies to. Solicitor General Olson; Philbin?s. notes "indie-ate that Olson Was"; ?annoyed? that Come-y had sent the memoranda to the White House-window consultinghim, andasked. Philbi?n .seVeral times, ?what?s'my role Supposed to be here?? Olson also said to. ,Philhin that he thought the memoranda werega ?poke in the eye?to- the 'White-H-ouse. Philhin wrote that Olson?s reaction ?raised concerns may havergotten himself too far butt-here alone? by not bringing Olson. in On the Department?s- legal. *ieadvancez (U) Comer livid us that he knew his-memorandum would anger peeplesatj the abuse because hehajd put writingthe arguments. questioning _of:iaspeiets of the program and that the memorandum Goldsniifth?s, attachment Would become a part of the Presidential records Would'be discovered later by historians. He. stated he believed it was nnpor-tant to ?make: a record.? (U) According to Mueller?s program log, Gonzales called Mueller at: 1:45 1.1-6 to discuss the situation. Gonzales explained (to Muell?i' ntis tentatiVe Gentiles-ion that legal support for as still lacking, Gonzales would bare to make. a seed. Genzales t'o?ld Mueller if the President decided. Mneller responded thathe. 1.1 to ta re nine as? s, ut that he ?would have to give it serious consideration if the President decided to go ahead in the face off finding.? Later that afternoon on March 16, Card called Comey to the White se-for a meeting. According to Philbin-?s notes, ?the back channel word or ale was that President Bush might be ?ruling to Prior tothe- .rnee .ing,. Conley, Goldsmith, and p.111. on rel-l: Hou hilbin the am; would: decide ?'vejrys?o'ong? omey displea Aer-Ithat-?Corriey had. putin Writing po?s?i?on On the legality-of Teapevemng, while resending-a. farewell dinner for a Department 'eolzleague at Ph?ilbi?ri received ar'o'all from DaVid Addi?ngton i?diC?i??gzthatzhe.W?l??d deliver a le?tt?r Gonzales- had?written to Comey.. Ph=ilbl?lrme?t Addingtori atthe_- Department at .8230 that night'th accept letter; Philhiri?s- notes-also indicate. that Genealeshad called :Com?eyr in advance to teleromey-?not to get too overheatedtlqur the letter.? Gomey told us he recalled. that Gonzales teld him in the call. that the White House would agree to work with 'theDepartment to.be the program. thatgemeysheuld;not ?ovleri?eac.t?to Go'n?zasl?si?s letter. Comey said he relieved Addihgton, and? not Gonzales, had. actually drafted the letter, and thatiGanal'es tent ito?ully to saunter GomeY?s.memorandum to make a record 0151 of the White House. I Gonzales-s that the Presidenthad. directed him. to respond to? Carney-?8 memorandum. The letter stated; Your: memorandum appears to-have been based on a m?isunde'rstahding of. the Presider'i-tis ex-peet'ations re garding. the condiJct of, the Department ofJustiCe. While the President was, and in? aHY/th'oughts the of" Justice may-have on alternatiVe ways to achieve effectively the gOalSIsof the actitfities authorized the Presidential Authorization. of-March 11., 2004,. the. President. has addressed definitively for the- Executive Branch. in the. Presidential Authoi?ization th?e'interpretation of the The letter excerpted the language of paragraph 10 from the March 11,. 2004, Authorization, which recited ?the bases on which the President acted to rea?uthorize the program, and then concluded: ?Please ensure that the GOHZales?s letter also addressed Comey?s comments about congressional notification. Citing Department of?the Navy u. Egan, 484115.518 (1988) and a 2003 OLC opinion, Gonzales?s letter stated that the President has the Constitutional authority to define and control aeo'ess to the natiCn?s secrets, ?including- aut-hority to determine the EXtent tO-which disclosure may be made outside the ExecutiVe-Branch.? Departmentijd-uStiCC complies withithe directimigiven-in, the Pissid?ntial 4 - - - . - regereg. GonzalesCalled-Comey to .adiz?ise of the President?s.?demsiion onMarch 17., 2004, and, Comey passedthis infOrrlnation to Mueller-later that day, C'Orn'ey, in an email dated March 1.7, eatpressed relief at the President?s decision, Writing: Eoiday, in a remarkable development, We stepped batik from the. brink of "disaster; All seems-We'll in the-Goyemment. thingwas done. *Gon-zales ton during'hisxinterview that 'h'evo'OLJ-ld not say whether the prospeet of; resignations at the may have. had impact on: the President?s decision.-194 were notable to interview other-sat the White House to determine.whatfspeei?earlly caused: thep1"ogram to be modified in accord with the D?epartmentislegal position, (U) The. President?s direeiti?i?Ve was expressed twe: modi?cations to the. 11, 2004, Presidential Authorization. These well as the operational and legal implications of the President?s decision-for the Department and the FBI, are described in the n-eXt seetions; i. Modi?cation (U) On March 19, 2004, the President signed, and Gonzales certified as to form and legality, a Modification of the March 11, 2004, Presidential 193 Come},r stated that he did not believe Gonzales wrote this letter. He stated that ?Addin'gton was the ?ame-thrower? and that Gonzales was generally more reasonable and moderate. Conley said that Genzales had later apologized to both Corney and Ashcroft for his conduct during the March 10 incident at the hospital and had even cemeraround to agree'with Philbin and Goldsmith ?3 analysis regardingthe program. Gonzales told the 01G- that he?did not apologiZe to-Asheroft for the incident in the hospital hecatise he had been ins-trusted by the President to go there, but-stated that he ??egretted? the incident. (U) ?'94 Ho?wever, When Gonzal'es-Commented-on a draft of this report, he told the that the. prospect of resignations at the Department and the FBI wereanot the reason for the. President?s decision. Gonzales stated that he. could not elaborate on- this Statement dUe to eXecutive privilege considerations. (U) ?oors-take: :1 "that ?this? .Au?lo?zation; The first paragraph .of?the Mod-Him: siden?i-e?rl: Auth' ?ization of memorandum! as a. policy-matters. modifies: 53% 20204 as set'forth. below -. .o . and ii- by an Au?iorizationsm the-exam sat tort 2111: 12- Modification]? Tho 19 ,?Modi?oati?oo: made t?Wo significant changes to, the @3581?5113.Auth?rization and 1 angeaiffmti?g all Authorizations To. allow for a :t changes were to. at. midl?ght .326; $2004.. First, the-March 19 Modificationinserted language ma?arrow content collection {basket to al. Qaeda and as, the Dopartment had adVis_ed,. The new con-tent od?eotiOn authority in, paragraph Math 1 1 Authorization?, with; the. new language the March '19 Modification indicated in italics", was: aoqu?ire a Cd'mmunlimtiml (inoluc?ng but 1101: limited to aWire- communica'tioanaIried into. or out of- thoUnited; States by cable) fan'Whioh, based 0n the Ifac?tual'- and: practical oonsidiorations of everyday life on. which reasonable and prudent persons act, ther?are reasonable grounds to'beliexre such. communiCation. originated or tem?nated ouLtSide- the United ?State'san apa?y to such communication is a; group engagodfin international terrorism, Or aetivi?t'ies in preparation therefor, or any agent of suchalgmup, provided that such group is al' Qa??da, is-a? group af?liated with Lil Qa?fda, or is a-r'mthergroup that tief?jm'i?efor purposes- of this? Prosiden-tia'l Authorization is in rammed Con?ibt with the United: States and poses a threatofhostile actioniuithin the United a - 3 1 "he language, with the deleted dicated in italics, was: Each Presidential Authorization. had contained a directive to the secretary :of Defense not to- disclose the. program outside the Executive Brannon-without the President?s approval. The Modification reiterated that any change Was not intended to reverse the President?s control over access The ultimate disposition of this previously obtaine subsequentlyaddressed in anApr? 2, 2004, Modification, and therea ter in an .. 2004 Presidential memorandum to the Secretary of Defense, as described below in subsection 195 Bradbury was nominated tobe Assistant Attorney General for OLC in June this position, and. told us that after exhausting the time period;er use Liner the Vacancies Reform Act of 1.998 (see 5 U.S.C. reverted to Principal Deputy Assistant Attorney General, thegiposlitionahe had-held prior to his nomination. As head of OLC, Bradbury became responSible for briefing?members?of Congress on OLC?slegal analyses concerning the well as oii?theiPreSidential Authorizations. Bradbury?s access to these ri" ts and'the officials responsible fordrafting them provided. him signi?cant b1, b3, b7E As noted abeve, Judge K011ar?K0telly was made aware on March 14, 20:04, that the Mar-ch 11 Authorization had been signed by the President but-chad not been certi?ed-as to form and legality by the Justiee Department, On Marcih 18:, 2004, Goldsmith, Philb?in, Baker, and Gonzales met Judge Kollar-Kote?y to further brief her on the status ofthe- pregnann :AceOrdingto an internal OLE) memorandum, they advised her that forthcoming. legal o?piniOns. from OLC would alley her concerns about the use informatiOn in MBA app'liCations-EQQ' .. The} reVi'ewed a .rlla?dwpitte'n l'etter'frOm-JUdge Kallar?Kotelly to.- Bee d. to have been. written ji?ust after-the; initiation "3 Qmandat?edinsthe' 19,2004, Mod?ificatio 1. ."Baker told-us that he; handwritten letter should bB-?ViBWstaS? angin'formal draft designed to Convey udge- Kolliar?Kotelly?s preliminary understanding of the issues raised by changes to the Stellar program, In theiletter, Judge Kollaerotelly reiterated. her position that. StellarrWind?derived information should be excluded from PISA applications, writing, ?so there is no misunderstanding, It will not Sign a, PISA-application which Contains any information derived from and/or Obtained fitomrithe. {Stellar Wind]g program i? including application?s a: 'StellarWind: tip ?was the sole or principal factor in starting an investigation of the agencies, evenfif the inVestiglation was conducted independently of the tip {from [Stellar Windl.? Judge Kollar~Kote11y also requested, as .a precondition to her agreeing?to Sign applicatiOns in the filters, that clarify in writingfits proposal for reviewing. FISA applications to ensure that all Stellar Wind?derived information had been exalud?e'gd. Baker told us that he had a lot of ?verbal back and forth? with to eXplain scrubbing procedures. ese legal opinions, which addressed the legality of ?were' provided. toJudge Kollar?Kotelly in late March and of information- derived indirectly froj Ln 2004,. OLG completed a dralt memorandum for Baker- entitled-?11313?or?Diselosure of Certain Stellar Wind Information in- Applications U?nd?ef?FlSA.? This-.memorandurn address -eine?1uso 75 ?205? Kollar?Kotelly with a copy of its 'drt legal 30?? This argument is discussed below in connection with Goldsmith?s May 6, 200.4, legalanalysis. (U) 205 With respect to 7 the memOrandum stated that the Department did not bali'eVe information was subject to any constitutional restraints or statutory restrictions, but that ?Me the extent Judge Kel?l?ar-Ketelly has concerns about those conclusions, we note that the analysis in this memorandum independently demostrates thathere are no legal restrictions on the use of informa-tiOn indirectly derived fro 7 tippers in PISA applications.? The draft memorandum did not address inclusion in FISA applications of information derived directly from the program because OIPR had s?Llccessfuily managed to address Judge Kollar?Kotelly?s order to exclude such information. 6. April General Ashcroft?s doctor-s 'c?leared' him to resume his duties as?At?m-ney General as of March 31. Cor-nay a?vised'Ayr?es in a Mamba-0., memQ'randum- that as on March 31, the Attorney General was no. .l?on'gerf'fabsent or di?sabied? Within the meaning of 28 jthat-a?ndf' ?that time Gamay Gould 110' 10nger :eXerc?ise-th?e duties of the Giffice {of pursuant. tojit?he statute. Agco?py of the .Inem?raiidumgwas sent 'to: White. H'ousefCounSeleOnzaJeS arid othe?u? senior Department Officials. (U) 0.1-1 April 2004?, President Bush. signed, and Gonzales certifiedas-to a second Modification of the nt'ial astion. This modi?catign addressed only of the Stellar Windiprogram, 1?S'tandaitd; ie- e'enireyedi to Yfai'iltl??iiZedT Modifieatieins mate? ZFBIeInpleyees onto the ?eld. mm anti-enlaseque . '19 .. . .i .. theme-a tesponSibleth 3 glans were comm-- Iari? .indinforme?ci I. A farmer Unit Chief in the CommuniCations Analysis Unit (CAU) withintheFBlT?s Communications Exploitation Section. of the Cionntejrterr Division told usgh'e became-aware that at- some pointthe- Stellar Wind Was narrowed to include only Said this was passed along to him ., . eith - - neatly meetingi?with NSA representatives. He sat a?c?tiee was ?taken the-NSA. Requests?foir? RM 1? the the: numbers not Lessee-iated with rejected "by: the NSA {as outside the ?scopefof the. .NSALcalled?Team told us that ,e analys?i?s-chfleunder the pregram '3 recalled . ii" at when the FBI ,1fequeste'd that the. NSA Collect Information on; a particular-- nun-linen the closely analyzed: the number request-ed supporting "information from the FBI before querying the Stellar Wind database. This supervisor also Stated that the SA did a?good job of keeping the co?located FBI personnel informed of changes to the scope of collections. He said this information typically would be conveyed to appropriatepersonnel during the daily ?all hands meetings.? 8. Of?ce of Legal Counsel. Assesses Compliance with New (De?ection Standards Goldsmith told us that during. the week of'Mar'ch 29, 2004Stellar Wind program to ensure that the r. was being. conducted in accordance with :Geld?srrli?a said that while. resources were notsaVailablewtor-condue't a. ?prefe'ssio?alt audit, he ViSited the NSA ah . "i thelegal parameters for queryin . I I wh?iehta?s discussed; aboVe required a Showmgof reasonable-artieulaible .sll?piCiQn that-the-target belonged- to a group. that was engaged in: international terrorism?og Goldsmith told the 01G that as part of the ?3 ed the new collection 115- 12004. Goldsmith: reportedthe resul-tsof his lfor?Operatiorisrin the General Counsel at the time. 9. May 5, 2004, Presidential Authorization As noted above, the March 11, 2004, Presidential Authorization, as modified, was set to expire on May 6, 2004. On May 5, the President signed another AuthoriZation extending the Stellar Wind program through June 24, 2004. Unlike the March 11 Authorization and the two modifications that {endured it, 5 to form andlagality . 3' -r The; ,Auth o'riza?tion I: tired-tha- with; minor variations, th e- collection,standardssand other language: set? fox-thin the May 5, 2004:? Presidential Autharizatmn remained of the. Subsequt??t Autllol?izatiens.31 1 10? May 6,.2004,.0m Memorandum 1g On May 6, 2004, Goldsmith, -.comp1?eted ardviscd OLC?memoranduI-n mi 'Iegalify cf the Stellar The .l?GS?page document- Stated that it for the Attornay'General in: weapons: 11.02 OLC- ?t'p undertake a thorough reexamination of the stellar Wind pregam- ass-it- i?svcurren?y operated e?on?-rm that 'tl'leactionsthat the Pre?ide?-t has directed the Dep?artment?of Defense to undertake thmugh' the National. Sacm'ity Agency are lawful?? The memorandum traogd thenhistmy of the [program and analyzed: the legsjitypf?eaw. of th? three co?ee?oniibasketsin light =0f applicable statutes, "Order?src?ases, and chsti?tutional provision-s. ?0 als'o dropped the language describing the legal bases on which the President relied in ordering the continuation of the program in the: March '11, 2,004 Authorizaticm - gfl?hememerandum neted that Section 1:811, presidingiith=at die. Pro? sidth ?may authorize electronic: sures-illance withOut court order . . toacquire.foreilgr1 intelligence- mfonnetion for a. period not toaexoeed- calendar days following .afdeolatatiOIl ofwarbyCongress,? made?itsclear that EISAexpressly addresses electronic. surveill?aheeduring WartimeQ-QIQ? The memorandum stated that the Authorization-forUse-of Force (MJMF) passed by Congress Shortly after the. attacks. or September 20011, genre the Prestdent authority to use. abroad; tall? necessary analappropriate tenet-2;? including signals intelligencecapabilities, to prevent. future acts lot-international.terrorism eigenstates United States. According. to the memorandum, the Was. properly read? as an express authorization to. conduct targeted electronic surveillance against a1 Q'aecla and its affiliates, the entities reSponsible for attaekmgithc United States. - - Thememmandum noted that the legislative, history of FI-SA-ihdiCates? that the 15~day window Was ?thought sufficient for the President to sect-ire" legislationle'asiilg the restrictions of for the-con?ict at hand? Quoting 3:4, reprinted 4048,. 4063. intend thatthis- period will allow time for Consideration of amendment to: this act that may :be. appropriate dm?ing. a Wattime' emeligency?i-ll Accordingt?o' the OLCsmemorandu-m, ?The Congressional Authorizationfunctions. as precisely such legislation: it iszge'rnergency legislationzpassed to address a specific armed?con?ict and expressly designed to- authorize Whatever military actions the Executive'- deems appropriate-to safeguard the United States.? - i The memorandum-concluded that at a minimum the AUMF'mad'e the, applications .F-ISA in a wartime context suf?bien?y ambiguous- that the dostr'in'e' of? ooh-stittztiOnal avoidanceproperly applied to avoid a con?ict betWeen and the presid'entially authorized: Stellar Wind? program. Alternatively, the memorandum argued that FISA, as. applied in the particular ?circums?tanCes of a President directing surveillance of the enemy to. pretrth future attacks upon the nation, represented an unconstitutional infringement on. the President?s Article II CommanderwimChief powers. WW ?2 As discussed in section I of this chapter, the legal implications of thislprovision 'was not. addressed inthe memoranda John Yoo had drafted in sUpport of the program in late 2001. memorandum discussedtiie "u ram. To determine Whether I violated the Fourth Amendmerlt?sjp searches, the memorandum analyzed whether the importance of the government?s interest in this colleetion outweighed. the individual privacy interests at stake. Citing dings Supreme Court opinions, the Federalist Papers, and congressional testimony, the memorandum cuticle I dthat the government?s overwhelminginterest in detecting and thwarting further al- Qaeda attacks is easily sufficient to make reasonable the intrusion into privacy involved in intercepting selected communications,? The memorandum noted that the weight of the gOVeifnment?S' interest in this regardeould change-overtime ifithr-ea?it' from ?QiaeclaWere-deemed to recede. The memorandum also analysed'te?lepho no? and e?mail me ta data collection under the Fourth Amendment. The memorandeUm. concluded, .basedon the Supreme Court?s holding in Smith. Maryland; 44211.8. 735-, 742? (212979;), that there is 1:10 legitimate 'Sxp'eietation?o?pfivecy'in the numbers dials d-ito- pistes T't'elephone calls. Referring to cases :Iholdi-n that no expectation attached. to the address. information on, either letter or, e'r?mail, thexmemorandum -.c0If1C1Uded-that9no Fourth Amendment- privaeyinterests were hnpli?Cate-d in the collection of earn-ail meta data. ?r'no st comprehensive sum~ the Mav? ?6 memorandum was ?t .4. Ill-ll". DIG Analysis (U) A. Department?szAceess to and Legal ReView? of Stellar Wind. Program Through May 2004 We} The Justice Department?s access to the Stellar Wind program was controlled by the White House, and Gonzales told the DIS that the President decided whether non~0perational personnel, including Department lawyers, could he read into the program. Department and FBI'offieials told- us that obtaining approval to read in Department officials and FISA Court judges involved justifying the requests to Addington and Gonzales, who effectively acted as gatekeepers to the read~in proeess for non-operational of?cials. In Contrast, according to the operational personnel at the SA, CIA, and the FBI were read into the program on the anthority of the NSA Director, who at some point delegated this authority to the Stellar ?Wind?Program Manager. Various. officials we ii-ntervieWed about the iiSsue. uniformly agreed that I the white nous-e songh-tfto Strictly limitsoverall'iaecess to theiStell?ar Wind We belieVe that this policy was applied at: the Department in an restrictive manner prior to March:20.04, and. was. detrimental to the?DepartmentFS role in the operation of the program through. that period; We; also believe that. Attorney General Achcroft, as head ef'th'e Department, Was r.esponsible for See-king "to-ensure thatthic Diepertrnent had adequate attorney resources. thorough accurate review of the legality- of the program. Because A.sher0ft didinot agree to he. interviewed for this investigation, we were unable to determine the extent of his efforts-to pressthe White House to read. in additional Department of?cials between the program?s inception in October 2001 and the critical events- (if March. 2004. In Chapter Three we described how early inVolvement Wind program was limited to the participation of only three attorneys Attorney eneral Ashcroft, OLC Deputy Assistant Attorney General JohnYoo, and Counsel 'forlntelli'genCe Policy'James Bakerzzl?- Working alone, Y'oo drafted several legal merner'and'a in; 200:1 {and 2002 advismg the l-Atto-rney General and the White House that? the program was legally supported, In reliance on race advice, Afterney'G?Il?ral Ashcroft certified- the legality'of the Presidential Authorizations to implement: the BecaHSe worked alone, his legal .analysis was not reviewed by otherattorneys, either? in OLC or elsewhere-in the Department.217 Even 915 Counsel for Intelligence Policy armies-Baker was read into the program in either late 2001 or January-2002. But, Baker appears to have been read in only becausehe inadvertently caine acress informatioii that suggested-Such a program existed, Whil'eB'aker' had involvement in Several aspects of the program, he hadino-involvem?ent in drafting or reviewing Yoo?s legal memoranda Supporting the program. Daniel Levin,;who served as both Chief of Staff 'to FBI Director Mueller and brie-fly as a national Security counselor to Ashcroft, also was read into. Stellar Wind at the inception of the program; However, Levin only served for. months at the Department during this early phase of Stellar Wind and had very limited involvement in the program during this period, Levin told us he was read into stellar Wind along with Director Mueller at the FBI and that he understood that he was being cleared into the program as an FBI official. We therefore consider Levin to be an. FBI readwin, not a Department read?in. Gonzales told us that he thought Yoo may have assigned discrete tasks to other attorneys in connection with his work on the Stellar Wind legal 'memoranda-. Because Yoo declined our request for an interview, we werenunable to confirm this. In any event, no other attorneys were read into Stellar Wind and therefore would not have been permitted to work on or review those portions of the memoranda that contained Top Secret/ Sensitive Compartmented Information (T SCI) related to the Stella-r Wind program. By contrast, Yoo-had at least One other OLC attorney to assist him in drafting other OLC legal memoranda on the detainee interrogation program during the 200.1 to 2003 period, and these memoranda Were reviewed by another OL-C Deputy Assistant Attorney General (Cont?cl.) when Jay Bybee bee-amethe. Assistant Attorney General-in November 2001, was, therefore Yeo?s. supervisor, Bybeegwas not read into the program?? Bybee told us. he also was unaWare- that Yoo was, providing advice to the Attorney White Housean the legal-basis. to support the program. -n even befOre Patrick Phizlbin voicedhisiniitial concerns with Yoo?stanaly?sis in. 2008, the c'ircurnst?ances in .2001 and-2002? plainly Called: for to betapplied?tothe legal review of the program anditih?at it was the Attorney General?_s: responsibility to be aware-bf this need and to take steps to address it. 'M?Oreover, "beCauSe Ashcroft met frequently with the President on national..security matters, he Would have been wellepositioned to request additional legal. resources if he believed they were necessaiy. The facts suggest that Ashcroft had some .awarienessxand concern that Yoo- was Working On the legal justification for the Stellar Wind program Without Department assistance or Oversight, and pessiny wast-advising the; White House irectly of his?ifindlings.. Based on accounts of the incident in Ashcroft?s hospital room in March 2004, Ashcroft made specific complaints to Gonzales and Card about insuffioi'ent legal resources at the Department and that the Department had been ?cutout of the whole affair..? Hehad also eigpressed frustration to Comey months earlier about?being ?in a box? Yoo. Further, according-to Goldsmith, when Goldsmith firSt intervieWed for the position of Assistant Attorney General for OLE in 2003, Ashcroft andhis Chief of Staff alluded to concerns overseeing kept informed the Office of Legal Counsel. was Working on and the importanCe of keeping the Attorney General _?in the loop.? Weralso NoVember 2, 2001, memorandum to Asher-ft indicated of the highly Sensitive nature of this subject and. the time pressures involved, this memorandum has not undergone the usual editing andreview process for opinions that issue-from our Office While we. believe that Ashcroft may have been aware that Yoo was working alone on the Stellar Wind analysis and had concerns about this, we do not know whether or how hard he pressed the White House to read in additional attorneys to assist or supervise Yoo. At the same time, however, (Philbini-and approved by the OLC Assistant Attorney General (Bybee). The detainee interrogation program also was classified as We also note that Philbin?s background in telecommunications law would have made him a logical choice to assist Yoo on the Stellar'Wind legal analysis. 3?3 In contrast, Bybee was allotved to supervise Yoo?s work drafting legal memoranda cencerning a detainee interrogation program during the same time period. Welcannot assume that any requests ?byAshcroft for additional attorney readein's' wouldihav'e been. grantedby the White House. Gonzales" toldus AShci?Ofi; had requested that Deputy Attorney General Larry Thomp?S?on and-Ashcroftb "Chief cf Staff-David'Ayre's be read in. HoWZever, neither- request was apprOVed.919 Gonzales stated that hesdid not recall re?ne-sting? additional read?ins beyOnd Thompson Ayres. analyzing-the read~insituation at the Department during 'Yoo?s also. Considered? that Ashcroft certified the: programas to its .-legalityu=each time? the program came up for renewal, and did so at a time When iY'ooi?salegial advice Was: the- only Department, guidanCe available conserning the. program?sle?gality. We believe the fact that only three Department attorneys were read into Stellar Wind through mid-2003 may have been due at least in part to Ashcroft?s routine recertifications the PreSidenti-al Authorizations. during- this period. As noted in Chapter Three, (Gonzales told. us that it was up to the Attorney General to_decide.how to legal obligations as Attorney General, and that if Asheroft believed:moreirzattorneys were needed for-this purpose, he could-haVe asked the? President tolapprove additional Department 're'ad~ins. Gonzales also told- ;us that As?h?c-ro17t7s Continued certifications of the Presidential Authorizations supported} Gonzalesis belief that Ashcroft was satisfied with the quality of :legal-adVice~ he was receiving at the time within the Department ?There is evidence as well that Gonzales, as White He?u'se Counsel, ?was satiSfi'e'dWith Yeo?s legal memoranda supporting the. program. Gonzales ?told usth?at although. he did not believe Yen?s first two memorand?a full}r addressed-theWhite House?s understand-ingof the Stellar Wind program, Gonzales believed that they described as lawful activities-that were bmader than thosevcani?ied out under Stellar Wind, and that Yoo"s memoranda th'erefOre ?coIVered'? the program.220 WW 91" Deputy Attorney General Thompson resigned. from the Department in August 2003, so Ashcroft?s request to have him read into the program would have been made to be read int. wins. 2-2.0 We were troubled by Gonzales?s suggestion that Yoois men'i?oranda covered the program because the memoranda deter-mined to be lawful a range of ?hypothetical? activities that Were interpreted by; GonZales to be broader than those actually carried out under Stellar Wind. Such an approach, ?if'deeme?d acceptable by the "client" [in this case the White House), would encourage the Office of Legal Counsel to draft broad and imprecise (Cont?d.) therized these read However,',. even apart from the limited number of Department read?ins, we believe that the White House imposed execs-sitier strict controls over .acces?sitovthe pregram in other ways that were-detrimental to the Department?s ability to provide the:White House with the soundest possible- ?legail' advice, For instance, we found no indication that Yoo coordinated {his legal analysis with the NSA. According: to Michael'Hiayd'en, the Director (of the NSA when Stellar began, the relied on its OffiCe of General Cour-islelk not the Departrnent of Justice, for ,adviICesas to the legalitylgof. the program when it was created. Hewever, we fOu?nd that the NSA?s-?Offiee of "General Counsel :did not coordinate its .legaladviCe with the Department, and even as late asv2003 the NSA General. Counsel was prevented, by the WhitetaHouse from reviewing the .Departrnentis legal Opinions on the program?21 Hayden also told the OIG that he was ?surprised with a small that the Department did not participate in the Early meetings with him and White I-?I?Ouse officials when Stellar Wind was. first conceived. In addition, Addington instructed Philbin not to discussthe program with Bakerpwhovas; Counsel for Intelligence {Policy was responsible for representing the goVernment before the FISA Court.222 (We believe that that White House should have allotted and even encouraged Coordination between the Department and the NSA regarding the development of the legal analysis of the program, especially as this analysis was first being formulated in late 2001s Such interaction between the Department and other Executive agencies is a mainstay of traditional pfactice, and we believe its absencewh'ere contributed to factual errOrs regarding the operation of the program; Although, we could not determine exactly why Yoo remained the 01113: Department attorney assigned to assessthe program?s legality from 2001 until his departure in May 2003,, we discuSs below our belief that this practice represented an extraordinaiy and inappropriate departure from traditional review andoversight prOcedures and resulted in significant harm to the Department?s role in the program. When Yoo left the Department in May 2003, he was replaced by Patrick Philbin, who was read into the program to advise Ashcroft whether he could continue to certify the Presidential Authorizations as to their form legal. analysis and. would discourage the type of careful scholarship to which the OLC traditionally aspires. In addition, the NSA Office of the Inspector General, which wanted to conduct an internal audit of the program during this period, was prevented by Addington from reviewing the Justice Department?s legal memoranda supporting the program. (17/ #994318?; 332 Pliilbin told the OIG that he spoke with Baker about the program despite Addington?s instruction not to. (U) and. legality; When Goldsmith. became the OLD Assistant Attomeyceneral 'ingOC?COber 200.3, pressed Addington to have Goldsmith read in, and .Gold'smi?thvbecame the first head of to- be read into the program! As predecessor Jay Bybee?. Was never read? into the program. - Thus, by the end totalof only-5 Department of?cials-w Yoo?, Ashcroft, Baker, Philbin,, and Goldsmith had been read into Stellar -Win-cil; arid Elsi-?shown in Chart 4.. 1 below, we determined-?iatzmvany ?Othef?incglit??i?dual's through 3 . - . 'hrou -=the Same eriod -. The assignment of only one Department attorney, John Yoo, to cendUCt a legal review 'of the program without assistance or. oversight from anyOne- else at the Department, combined With the White House?s decision to-prevent the NSA from reviewing-Yoo?s work, resulted in legal opinions by Yoo that were later determined by OLE) to be so inaccurate and incomplete 1?23 This t' 'ble was derived from NSA read?in information. Justice Department personnel who were read into Stellar Wind in 20 06. (U ?tdjbe mgardedias not severing key aspects ofithe Stellar Wind: I complexnature of the Program from: both a t?'?hnica?l and 16331 per-Speci?c; Coupled, with the;.fact that he 'Wai?s'wOrkingjalone, it .WaS-c?th sutprismg-that Vedas analysis containedmaccumcies ail-id. 'Gmitt?dC??C?l .givbri ?the Measure toilgenerate a off-he program:iimPlementa?on. *IiOt' Ghairigeior iri??l?ujd'e ?a accurateidesc?pitionof rim-Ming ape-ration Over the course of tenure. With-then O?nthe program) Ph?'bi? they Characterized as sggripu__ '90 31 555" '3de33- failure told?scrib bemgconducted'by - 1? . I, toas'sess 'the' legality OfthiS?a?d "Vities asx-thejy Were: cutiby NS-A, 7 ally .lboth. Gdl?dsmith: and :Philbingstated :oharacteriZed the Cellectio and thus their legal advice was-albased- warmers-closely as edit-he factual. operation :of the. programws? - Rhilbin discovered that Yoo?s assertion that the PreSid?th?had' broad authority to conduct electronic: Surveillance. dirtiest a pursuant to his Commander?in?thef'powers under. II of the constitution, particularly during War-time, never addressed? -thtiiFISAprovision-that expressly addressed electronic surveillance fdlloWin-g aiformal. declaration of war. Seeso 1811. Goldsmith also critieized. Yes-is1egalx-memoranda "for" failing to Support Yoo"s aggresSive-Artiole ZGomander?in?l?ef theory with a fully ?deveIOped separation of powers analysis, and instead offering only sweeping conclusions. As an example, hit-ed Yoo?s assertion that reading FISA to. he the ?errolusi've statutory-'means for.c?onduotingeleotronic surveillance for foreign to?an ?unconstitutional infringement on the II -authorities.?225 Moreover, noted Goldsmith, Yea. beaded-from his separationeofepoWers discussion any analysis of haw-the Young?StoWn Steel?Seizure Caseia seminal Supreme d?ecision?on the distribution?off governmental powers between the Executive and Legislative wartime, Would affth legality of the. President?sliaetions- .) Wifh?re'spect to Stellar Willd.227' in reliance: on Yoo?s adv-ice, the Attorney General certi?ed the prograjn toiforrn? and legality? some 20 times-before Y-oo?s analysis was determined to :ibe??awed by hissuCCesso-rs in- OM) and by attorneys in the: Office of the'Deputy Attorney General. We agree 1?w?v?it?l?l many of the, criti'oisms- officials regarding the practice of allowing single: Department attorney to develop thel'egal justi?cation for the program erllance for foreign-intelligence urposes, Id. 927 The Department?s-Office of Professional Responsibility (ORR) intendsto review whether Yoo?s legal analysis concerning the Stellar Wind program violated any standards of professional conduct. OPR has similarly reviewed whether the. legal analysis by-Yoo and others co?ncerni?ng?the detainee interrogation program violated standards of professional Cbnduct itsrearly Stage of operation. We Summarize these Criticisms below. described as ?Crazy? the assignment of 13.6qu Assistant Attorney General to providclegal-advice to-vthe White House WithOutthe knowledge oraconCu-rrence 'of? the Senatemon?rmed Assistant-Attorney General? for-0L6, who is. aecouritable fer the: legal. positions? taken theoffice. Goldsmith sai? that, not. a single. .e?riti?clalcye reviewed Yoo?s work on a program: that Goldsmith described as ??ying in of the. .con'ventioinal understanding of the law at the time. Goldsmith legal memorand?a did not include facts about how the S'tellar'Wind program operated in practice, and he surmised that Yoo instead might have ?keyed off? the Presidential Authorizations rather than Sms- actual collection. practises in detreloping his analysis Goldsmithal?sosaid it was ?insane? that ?oo?s? memoranda were not shared-With the NSA. Goldsmith said that had the. NSA reviewed the-sememor-anda YoO?sfa?ure to accurately describe: the nature and scope of the Collection by the NSA the resulting rI"mifs1"r1?at?Ch? bet'Ween the actual praCtiCerand. the?wording. of. the'Presidential Authorizations might have been detected earlier. .. 7 . 1 Similarly, Daniel: Levin, who was onexof the first FBI officials to be readsinto Stellar Wind and who would later become Acting Assistant AttOrney General for upon GoldiSmi?th.?s departure in June 2004:, criticized allowing-a single attorney to be the sole voice of the OLC concierningga program such asStella?r Wind. Levin" stated that OLC has a spjecialrole at the Department and within the government, esecially with. ?ihighly?sec?ret programs where opiniOns may never See, the light of day.? Under 5th circumstances, according to Levin, it is very difficult notto say ?yes? to the White H'ouSe client in the face of. national security threats; Levin stated that unlike situationswhere a court pl?acesilimitations' on the positions the government may take, there are no such limitations when considers a position that will. remain secret, and it is easier to be .more aggressive and ?cut some corners? under such circumstances. WW Levin stated that Yoo?s memoranda justifying the program suffered from too little circulation and a lack of alternative views. He said that the OLC- memoranda produced under GoldSmith?s tenure were better, not because the authors were ?smarter? than Yoo, but because the authors benefited from multiple VieWpoints and input. Levin also said that he never understood why the Stellar Wind program was deemed so sensitive. at the Operational level. Levin said he appreciated that the program was politically sensitive, but added that it was a ?huge mistake? to keep the. program so closely held within the Department. Weqhelieve that: Goldsmithls and. Levin'7s comments concerning-the, seerer otStellar Wind are especially relevant to the need: for. legally and .?faCtuallY analysis with respect to classified nationalseeurity programs. Because programs like Stellar Wrind'are not subj eat to. the usual re?terna?l Checksjand "balances on Executive authority, OUTS advisoryrole is particularly-critic-a-ll'to the Enecutive'h understanding of potential statutory- its actions. 1 Deputy Attorney General ?Comey also criticized the: decision to, allow: a? single; 136198011 to asseSS the legality of the program on-behalf of the Department. Gemey' told us: that Goldsmith had onCe aptly described the Yoo Situation to him as ?the perfect storm? ingwhich: the following'factors, eonv?erged?: the terroriSt attacks of September 11,2001; a ?brilliant guy? at who was? ?an aggressive adVOcate fer executive power?; and House ?determined to restore eXecutive power;? expressed a degree-of sympathy for Yoo, noting the eXtraOrdinary 'SituatiOn into which been placed. .Comey also observed that the response to September 11 the policy burden on laWyers, who were now looked: to by others fer guidance as: to,whatscou-nterterrorism activities within: the bounds oflthe'law, HoWever, Conley said that he. believed Whiteg?ouse officials ?got what they ordered? by asking Yoo for opinions and reatricting' thenumbercf persOns: with access to the program or the - - Attorney General Ashcroft declined to be in our review,. and we were thusunable. to determine what his views were on the assignment of 'Yoo alone to conduct? the legal review of the program, HQWever, as..noted above, witness accounts of his statements concerning the Ydo; situation leave little. doubt. that Ashcroft was plainly upset with. the White House for putting him ?in a box? with Yoo. Acc0rding to Goldsmith. ?and Philbiln, Ashcroft was direct about his grievanceswhen Gonzales and card came to see him in thehos'pital on March 10, 2004', including complaining that Ashcroft?s Chief of Staff and until recently the Deputy Attorney General. had not been allo I .e a. to the program, and that he found it ?very troubling tha eoplc in other agencies? had been read into the program. What remains unclear is whether Ashcroft came to the realization that the Department had been given an insufficient number of read?ins only after Philbin and Goldsmith presented him with their concerns about the quality of Yoo?s legal analysis, or at some point before. 928 As noted in Chapter Three, Yoo had been given thenation?al sectirity portfolio whenhe first joined the OLC in July 2001, several months before the attacks of September 1 1, 2001, and the inception of Stellar Wind. (U H666) 7 Wesought to obtain Yoo?s and the White House?sperspective on his sieleostiona'sthe 5016: Justice Departmentattoirney to be read into Stellar Wind to previde advice on the legaliw of the-program. We were notable to interyiew Yoo, who declined our request, or Ad'din-gton and Card, who did not respond. to our requests. TheOlG asked Gonzales. about how the White Houae determined?who- in the: Department could be. read into the. program, butch the advice of special Counsel to the President, Gonzales limited his answer to his personal views. and declined to: discuss internal White House deliberations that may haVe factored into the-read?in decisiOns. Gonzales. stated that "he believed it wasnecessary for national security reasons to limit the number of read?ins to those ?who were absolutely essential.? Gonzales also stated that there had to be suf?cient operatiOHal personnel at the SA, CIA, and FBI read in for. the purpose of running the program, while reading in additional lawyers-at the Department had comparatively less value because all lawyers will ?hate opinions? about the program. Yet, Gonzales also stressed to us that he weldome?d the Department?s reaSSessment of Yoo?s opinions and encouraged Goldsmith and Philbin to reexamine the legal basis for the program in 2003 and 2004.229 We-th-ink the proposition that the participation. of 'Departrnent attorneys-toanalyze the legality of a pregram as factually and legally complex as Stellar Wind should be limited for the reasons offered by Gonzales. is shortsighted and counterproductive. First, it is evident that Stellar Wind was as legally complex as it was technically challenging. Just asa sufficient number of operational personnel were read into the program to: assure its proper technical implementation, we think as many attorneys as-ne'CCSSary shOuld have been read in to assure the 'soundness of the program?s legal foundation. This was not done during the early phase of the program. The full history of the program also indicates that the program benefited from additional attorney read?ins. In this chapter, we described. how Philbin and Goldsmith who held differing opinions on which legal theory best supported the program discovered serious deficiencies in Yoo?s analysis and together drafted more factually accurate and legally thorough support for the program. In Chapters Five, Six, and Seven we further describe how reading in additional attorneys facilitated the grounding of the program on firmer legal footing under PISA, allowed the Department more effiCiently to ?scru Stellar Wind?derived information in FISA applications, 229 As discussed in this chapter, Comey, Goldsmith, and Philbin generally agreed that Gonzales supported the Department?s legal reassessment of the program. They also characterized Addington as far less supportive of their work than Gonzales. I and improved the handling- iof-Sjtellar Wind?relateddiscovery issues in international terrorism. presecutions :.Second,. iwe'do not believe: that reading? in a. few additional Department attorneysduring the first 2 yearsoi'f the program would have, jeopardized national- security as Gonzales, espeCial?ly given the hundreds of operational- Who. were: cleared into-the program during the Same period (se?e1'Ch'art. 4.1). fact,;as notedabove, we think-thehi?ghly classified- natnre. oft-he program, rather than constituting-an argument for limiting the 0L0 read?"ins to a single attorney, made the. need for careful analysis and review-Within the Department and by the :NSA-on'ly more Compelling. In sum, we concluded that the departure- from established OLCT and} Department practices resulted in legal. opinions to support the program that were-?laterdetermiIIEd to be?awed. We believe the Slii?iCt?_eontrol Over?the Department?s access to theprogram undermined. the role of-the Department tole?nsure- the zl'egalinr of ?Exeeut?iVe Branch- set-ions?, as discuSSed below, co- tributed to.:theaMaIeh 2004 crisis that nearly resulted'in the mass resignation of the Department?s leadership. We resentmend thatWhen the Justice. Department is involved With- such programs, in the future, the Attorney General Should carefully assess whether the Department has been given adequate resources to carry out its Vital function as legal adviser to the Presidentand Should aggressively seek additional resources if they. are found to be insuf?cient. believe that the Wihite-iI-?louSe shOuld' all?o'wthe Department ausuf?cient number of read?ins When requested, consistent with national security considerations, to ensure that sensitive programs receive afull and careful. legal review. (U) B. The Hospital Visit (U) The Department?s reassessment of Yoo?s analysis led Comey, who was exercising the powers of the Attorney General while Ashcroft was hO'Spita'lized in March 2004, to conclude that he could not certify the legality of the Stellar Wind program. In response, the President sent Gonzales and Chief of Staff Andrew Card to visit Ashcroft in the hospital to seek his certification of the program, an action Ashcroft refused to take. We believe that the Way the White House handled its dispute with the Department about the program partiCularly in diSpatching Gonzales and Card to Ashcroft?s hospital room to override Comey?s decision Was troubling for several reasons. As discussed in this chapter, by March 2004, when the Presidential Authorization Was'set to eXpire. again, Goldsmith had placed Gonzales and Addington on notice for several months of the Department?s doubts about legalitytutu-sapeets-tof?the Stellar Win-d program. particular Phitbin "had: ads ?clear that: the Basement heartened :t AfterAttomey General Reheroft was hospitalized. and unable: to ful?ll his the?Wh-?tte House was informed. ?tters-er Gamers-'1' Comey'had aSSumed the Attorney Genera-1?s responsibilities; warms-d that assert-an by Somalia the White House at 'thetime that they had not b?eEn: informed of the situation was the-"facts. In particular-,Gonizales later acknowledged that heWas estate that Carney was acting as the AttorneyGeneral-F31 (U) Before the PreSidential Authorization was Set to BX-pire: on March 11, was exercising the powers of the AttOrney-Generalatthe time, 'Offic?ials. in the White House including Vice President Cheney. and Hou?se that the Justice- Departmeht could not recerti'fy-L the legality ofthe program asitWas presently-awarding, The White Hon-serdisagreed with the Justice Department?s 10, al-meeting?of eight congressional leaders to brief "them on the" Justiw-?Depart?rnent?s Seemingly Sudden relurztance' to rectal-tit? the program and On the need to continue theprogram. 'TheWhite: House-did not anycne'. tram the Department to this.? brie?ng- to describe: the basis for. jits-gadVice-about the legality of the program, 1101? itrinfo-rm-ther Department ofi-ts intention to _h01d.the-rneeting.932 3' Following. this briefing, Gonzales andiCard went, tether hospital to ask Attorney General Ashcroft, who was in the inten;sive care unit recovering 330 Our Conclusion'that Goldsmith advised Gonzales and Addington of the Department?s concerns in Decembm' 2003 'is-supported byhi?s contemporaneous notes. of these events. In addition; although Gjonzal'es told us' that the ?rst tiine he recalledfhearin?g of these concerns in detail Was. in early M'arch'2004, not diapnte that Golds'znith had first begun to advise him of the Department?s general Concerns months earlier; (U 231 During his congressional testimony, when questioned about whether he knew that Attorney General Ashcroft?s powers had been transferred to Comey, Gonzales responded, think that there were newspaper accounts, and that fact. that Mr. Oomey was the acting Attorney General is probably somethingl knew of.? (U) 932 On the advice of. White House counsel, Genzales declined to provide a reason to the OIG why the Department was not asked to participate in the briefing. EIoweVer, when Gonzales-commented on a draft ofthis report, he stated that the purpose of the meeting? Wasto inform the cong?ressionall that the D'ea'rtme 't a - - basis; for aspects of the program, an? that a legislative stated?tlffat the put-posts of the meeting was not to have a ?debate? betWeen the White House and the Department concerning the legality of the program, but rather to explOre justsuch a legislative ?fut.? I I . from surgeryand aCCOrd-ing to. winiesses' appear?e?d. heavily. ,mediCated, to certify'the-program, notwithstanding C'Onleyis state oppdSit-ion. Yet, they? did notnotifycomey or anyone elsc in the "Department that they. intended to. take this action. Their- attempt to hairs Ashcroft frecertify? theprogram did. not: succeed. Ashcroft told them from his hospital bed that he supported, the Department?s legal position, but that in any event he- Was not the Attorney General at the time ~?G?omey ?Was- (U) Gonzalesstated that even if he knew that Ashcroft was aware .f Comeyis opposition to recerti'fyingthe program, Gonzales would still have wanted to?s?peatk with Ashcroft because he believed Ashcroft still retained- the authoriw tocertify the program- Gonzales testified before-the: Senate JudiciaryCommittee in July 2007 that although there Was concern over Ashcroft-?3?condition, ?We would not have .soughtnor did we intend toget anyapproval from General Ashcroft if in fact he. wasn?t fully competent to make that decision 3? Gonzales. also testified, ?There?s no. gOverning legal principle that says that Mr. Ashcroft, if he decided he. felt better, could decide; ?I?m feeling better-and I?ca-n make this decision, and I?m going to makethis decision-? (U) We found this explanation and the way theWhite House handled the .diSpute to be troubling. Rather, we agree Wit-h Director Mueller?s observation, . as recorded: in his program log 'ifollowingfhis.-meeting: with card on March. 11, 2004, that die-failure to have Department of Justice representatioii at the congressional briefing and the: attempt to have Ashcroft certify the Authorization by overruling Comey ?gave the-strong percolation that the [White House] was trying to do an end run around the Acting {Attorney General] whom they knew to have serious concerns as to the legality of portiOns .of the program.? Ata minimum, we would have expected the White House to alert cemeydirectly that. it planned to brief the congressional leaders on the Department?s position and that it intended to seek Ashcroft?s approval of the prOgraIn despite Comey and Goldsmith?s stated legal position against continuing certain activities under the program. Instead, White House officials brie-fed. congressional leaders and sought to have Attorney General Ashcroft recertify the program from his hospital bed without any notice to Corney' or anyone else at the Department. We believe these actions gave the appearance of an ?end run? around the ranking Justice Department official with whom they disagreed. C. Recertifieation of the Presidential Authorization and. Modi?cation of the Program (U) As described in this chapter, the Department had n'otified Gonzales and Addington of its concerns about the legality of aspects of the program for --seVe-ra15 months. In facet; the White in 201103 and more. empha?ca?y?invaserie SiiOf xmfeetingsin that it believedythat aspects'of. the ?gprogr.ani' ,c?ouldnot be: legally s?npperted?in: their-exis?ngiferm; Geniey and Goldsmithywereclear ?in their? advi-c?etothe-President otherWhi? - 'At't-h' "t '1 - A hcrof deep cOnc?er? 7 and ?toidsGonZales and Card that-hea-snpported the: peei?on dfzhi's wherein; es. We believe" that Ashcroft acted admirably under arduous ~=espiteathe legal geoncerns uniformly by-senior-Diepartrnent goflJusti'ce leaders! the White Honse, through White. Counsel Gonzales, reoe'rtified the Authorizatioii, allowing-the program to ?Continue- substantively unchanged. 4 a Only- after Mueller, Conley, other senior Department and FBI officials ?rnade known theirintentrto resign if the White HousecentinIIecl'Tthe unchanged, despite the Department?s conclus'i?on that arSpeets of the'program could not. be legally supported, :did the President? direct that the issue'he-res'olved, the program-:be-Inodiified to address the Departmentis? legal 'eoncerns-.. Because We were unable: to .jnterVieW key White. House officials, we Could not determine for Certain What causesthe White House to changeits position?end modify therrosram, althoiIghi the. pro spect'rof?maes' resignations :atthe Department- and the appears. to have been a signifieantffacgtor inthi?s decision.233? According. to Conley, the'fPrlesident' 1?aiseclaxconcern that he was hearing aboutthe'se problems at the last. minute", and the President thoughtit was not fair that he was: not told earlier-about the Department?s legal. In fact, asComey?informed. the President, the President?s staff had been. advised of these issues. ?for weeks.? Finally, We believe that the Department and FBI officials Who resiSted the pre3sure to recertify the Stellar Wind program because of?their belief that aspects of the program Were not legally supportable acted cowageo'usly and at significant professional risk. We believe that this action by Department and FBI. officials particularly Ashcroft, Comey, Mueller, 233 For instance, we found it signi?cant that on March l6, 2004, White House Counsel Gonzales, who had to make a recommendation. to the President about how c?onclusionthatlegal. I Goldsmith? :Ph?binggand' "Bak?r e-Was- in: standardsenf the; Justice feillgcotd the-?highest prqf?ssional ottoman FWE :smttaa WIND Paoeagtiies=mgtitsmoo to Jet-Sn AUTHORITY (some soc-.4; cannon AUGUST got-p this chapterwe examine the'transitibn in-stag?e-s of the Stella-1: Wind program frompresidenti?al authority to FISA authority. We: first describe? the FISACcurt?js approEVal in Ju71y2004 o?f ?7 acquire iforeigni intelligence informatiOn through the collei?t?icn cf bulk eema? meta. data information). This application'WaS. ba?SGd?o?n-a legal thery related to FISA?si-pen register and trap and trace device: provisions; We the government?s suCceszul May 2006 application to the Court-forwan order to obtain bull: telephony meta data {basket 2 Eby?the production of business records by certain telecommumcations- carriers. We then describe the ?goVetnment?s' interaction the FISA court to plaCe- under FISA the government?s authority-to intercept the content of certain communication-s involving both domestic and foreign telephone. numbers: and e-m'ail addresses (basket. 1 information), Fmally, We. summarize legislation enacted-in August 2007 to amend: to address, among other concerns, thedif?cuity in obtaining FISA authority for Content a?s Weilas the gcvernment?s contention that certain. provisions of FISAhad'failed to keep pace with changes in telecOmmunications technology. i 'sLMaii 'Mietainata Connection Under FISA Decisim to 5931?? Pen Register amt Trap and Tosca Order from the FISA Court i .hilbin to us that he encountered some opposition to the FISA approachafroni Counsel to the Vice President David Addiington, who argued Was unconstitutional and questioned the need to seek its?auth'orization for e~mail meta data collection, iPhi'lbin said that he .resp'cnded that obtaining an order from the Was: ?ironclad Safe.? Bakerirecalled?attending atleast-one meeting at the White House with- White Gonzales and Addington to discuss whether to seek an order based on pen register and trap and trace device pretriasiiens(agPR Order.) and how the FISA Court should be approached tecO'btainssfuch-uan order. Baker Stated that during the meeting Addington ?We areione bomb away from getting rid of this obnoxious Court.? Baker"said?aAddington also stressed to him that there?i~s a lot riding on your [Baker?s] relationship with this ?Court.? in contrast, Hayden told us that he did nothave any concerns about transitioningthe bulk e?mail meta data collection to FISA authority and was about the move. Hayden stated that while he believed the President-had the authority to collect the bulk meta data for the NSA. to conduct r'n?eta?data analysis, he believes that involving an additional branch (pf-government in, the activity provided some clarity on this subject. Gonzales told us that he did not recall much about the process of ?ling the application with the FISA Court to obtain e?1nail meta data througha Order, but stated that there may have been individuals at the White House who expressed concern that seeking the Order from the - I th at there; was concernfat the White House that I?lirig?j?ie- application :coiild lead to an Unauthorized disalos'u-re of the, .pingtam. Brie?ng for Judge KoliaeKotelly (U) Baker, Philb'inl and Goldsmith met With Genz'al'es and Addington- at the Whlt? ?Houjsefto disease how to approach Judge Kalilari?Kotelly?licenserning the proposed application; and it 7 se'ntation Present decided . to give her a 'abC} pro?ded to on were?t?tornequeneral Ashcroft, Centr . actor George Tenet, FBI Director Mueller, Hayden, Gonzales, AttOrney General Goldsmith, 'Philbizl, Baker,_ and Director of the Terrorist Threat epondi?ayci?n d?e'sefibedi?the teohniealvaspeots of the? proposedbulkemaji "metaa'data congestion, including how theinformation was? to be collected; .arohlive?d, minimized. This portion of the pre?sentati?On stressed that the reuiifed? the collection of meta=data i capabilities through Contactzeh?ain-in - I I terrorist ?Communieations.234 Third, 'Philhi?n explained the government?s legal argument that-PISA authorized the Court to approve a broad to collect email meta data under the statute?s pen register and traceprov-tsions. - Ii . II s. The Application Philbin, Baker, and at least two Office of Legal Counsel attorneys assumed primary responsibility for drafting the PR TT application to the FISA Court and a memorandum of law in support of the application.235 23'? The agenda refers to the ?needle in haystack? metaphor to illustrate the need for bulk collection, noting ?must transform streams of hay into haystack that can later be I cellection "ac'tiVity and seco'ri to cooperate; a declaration of NBA Director Hayden explaining the technical aspects of. the Baker. that Judge Keller-?Kotelly was given a ?read~ahead copy? 0f the aplication, Since it was standard practice to give the FISA Court draft applicatibes for review. ?to ed in 'a ainst the database to ientify . 13793 4 and "to reveal "ions 'e'r'atives. The resulting analytical. products would then be tipped out. as leads to the FBI th 1 i ?nts of' telli?gence Community to-find. members of erupt their activities, and prevent future te 7 rroris-t at ache. in the. The Justice Department constructed its legal argument for this novel use of pen register and trap and trace devices around traditional authorities provided under Speci?cally, '50 authorizes the Attemey General or other designated government attorney to apply for-an. order or an extension of an order authorizing or approving the installation and use of a pen register or trap and trace device for an}r investigation to obtain foreign intelligence informatiOn not .concerning'a United States person or to protect prOpOSEd e-mail meta data collection and identifying the government official seeking to use the pen register and trap and trace devices covered by the application for purposes of 5 U-.S..C. 1842(c? i t' fD? Central Inteliigence Tenet describing the threat posed by. a certification from Attorney General Ashero '2 that the information?likely to be?Obtained from the pen register and trap and tracedevices was relevant to an ongoing investigation to protect against terrorism, as required by 50 0.3.0. 1842(c); and a memorandum of law and fact in support- of the application. hasized: that Internet e?mai1 is one of the primary methods communicate. The memorandum of law? in s" .3 ll against international.terrorism .or clandestinel?intelligence .aotiVitieIs, provided that such?investigatifo?a:Of?a United};}States 'by?the ?firsti-rame?d?ientito? the Constitution is Fb?ingconducted? Federal 01f 'Itnvestiga-?on= uncle: guidelines asithe; Attorney General. [approves pursuant to Executive Order No.- 1233.3,017 arsuccessorwofder. 1i 3 incorporatedthede?nitions of theftemis ?penregiLner?iand ?trap and tracedevi?e? from?l-s 3:127; Thuss adapted? as the-definition 16f ai?ipenuregister? a device or process which records :or decodes dialing, muting, addressingror signaling. infonnatign transmitted by an instrument or facility from ?a wire or electronic umca??m transmit-ed: Wadi-id: however-that 611611 not-indude contests? any communication. is 1:8 65 3127(3). FiSAai's'o-adOpte'd asde?n-ition-rofa?hrap and trace; device?" e?idevicewor process-Whichrcantures the incoming.electronic-or other. which identify the originatingnumber or other dining, and. information reasonably likely to identify thevsotircez oflarWi-re .or electronic Communication; providem ihOWeve-f, that? ch. information shall: :not'indud?e the Contents Of any communiCation. - 9 15:3 application the government argued that the propOSed- collecltiOn of meta. data met. the requirements-of by noting that the meta data sought comported with the ?dialing, routing, addressing, or signaling information? type of data described in definitions of pen registers and trap and trace devices, The government also noted that nothing in these definitions required that the ?instrument? or ?facility? 011 which the device is placed carry communications of only a single user rather than multiple users. The government next argLIed that the information liker to be obtained from the pen register and trap and trace devices was relevant to ongoing investigation to protect againstintemational- terrorism, as. certi?ed by the At ene? - lunder 50 SC in support-oifthi's ?CertificatiOn .. . . a. dam. at ?the oVerWheljmingvmajority of communication. ill-be collected Will? not-"be- rassociat?ed Wit HOWever, the government maintained thatFI-S did notimpose- any requirement to: tailor Collection .preeiSjely to .Obta-in'only Communication-s that. are strictlyirelje-Vant, to the (intresti'g?ationz, argued that, in eVent?, ?the, "tailoring mestfbe informed. by. the balance between the. overwhelming national Security at Stake - - randthe minimal *imr-?U?Si-On into privacy interests that will be implicated ?by collecting meta data especially theta data that will: IiC?Ver be seen by a human being, unless a} connectiOn, to ant-terrori?stsassociated is 'f'oundg? 3 I Theig?eirernment acknowledged-?at The government also stated that the NSA needed to collect meta-data ffeCtiVely use analytic tools such as contact chaining at WOuld enable. the NSA to discover?enemy commu- sr?argume-nt echoed a premise many Of?eial?s tol__cl?us nature..ofi'intelligenee gathering in; general. For, Baker ?likened?the; search for Useful intelligence, particularly in; thei?meta data Context tel-jiijtiinding. a needle in au'haystaek, stating, ?the only way to ?nd the needle: is to, haVe the haystack;? Gonzales argued that. the dots first to collect: the. dots were descnbed as represented that for most of the proposed collection on. 11;:Was ?Overwhelmineg likely? that at least one end of the c: Immunisation Either originated in or was destined for ilbe?lti'onSOHtSidexthe United States, and that insome cases both ends of the ?wg?muniieation Were tirel ewe/reeds.337 However kno eded tha 1, - --1rn_a sly agreed that the abovc~described collectio ?atisfied? the de?nitions of pen register and trap an under FISA and Title 18. See 50 U.S.C. 1841(2); 18 U.S.C. 3127(3) 82; 'TheapplicatiOn also explained the proposed archiving and querying process. According to the application, the collected meta data would be stored in a..s_ecure' NSA network accessible only through two administrative l'qgin amounts and by specially-cleared meta data archive system administrators. Each tirne the database was accessed, the retrieval request wOuld be recorded foriaud'iting- purposes. The-application proposedgallowing, accessth the - databassass The 'b?e?briefed? by of COUHSGI concerning the circumstances-under which-{thE-detabase ?c'oultli?b'e queried, and all queries would'haveto ?ber approved?bgy one vof?seVen senior?NSAof?cials-239' PThepliapp?Qai?in explainedthat the bulk, collection. wool smail'addressesin?rde5' . . These-15119 eti?i?i ??db?e performed prep when the email address-met the following standard: based. on the factual and practical considerations of everyday on which reasonable prudent piersonsract, there are. ?faetsggi ingri'se to {a reaSOnable articulabl?e tenspidon that a. knonrn- {email assesses is associated In addition, the NSA proposed applying the minimization procedures in the United States Signals Intelligence Directive 18 18) to minimize the information reported concerning U.S. persons. According to the application, compliance with these minimization procedures Would. be 233 At the governmen? ber of SA was increased to 15 when the Order was renewed 939 When it granted the?govemment?s application, the FISA Court noted that in ConVentio'nal pen register and trap and trace surveillances aucourt ?rst ?reviews the apPliCation bef0re a-particular email account can be targeted. The Court-stressed. the iniport?ance. ofthe Of?ce of General Counsel?s obligation to ensure that the legal adequacy fer such queries was met. Inspector-General and General Counsel. The geveenment each. reneWal application the 'NSA.-Would.- report itoj-the Cell-ft Ons- querie?suthat' Were, .made during the! prior: period the: application of?the "reasonable articulahle su-spiCion standard for determining thatvqueriedraddresses 1were terroristwelated. supporting "docmments explained howr the. a th 1 d?metaidata. 'ught to use meta t' =1 SO?phiSi?iCated-r appliejatien, the, NSA estimated?that .l a1; ends-gathering- andinterhal analysis-it would Inset We preposed querying standard on average {less than. .e'nce" a day. The further estimated that these queries 400 tips: to FBI and CIA per year,241 Of these-tips. to the FBI CIA, the NSA projected that 25 percent would incluel?e US, person information, amountingto leads includinginformation on persons each month,? Application. Judge-Kollar-Kotelly wrote Baker to inform him- ?a?s'jeonsidefirig'the applicatien was in the processef? preparing" opiniOnHand order?in response to: it. She wrote that before-the epinin OrdercDqu be Completed, however, she required Written reaponses to two questions: Judge Ko?at?Kotelly Rakes Questions about PRITT Apart from the First Amendment. proviso in the statute (-50 What are the general First Amendment implications of collecting-and retaining this large volume of'inforrnatin that is derived, in part, from the communications of persons? (2) Fer. how longwou-ld the information collected under this authority contintle to be of operational value to the countereterrorisrn investigation(s) for which it would be collected? Baker responded in a letter to the FISA Court on Concerning the first question, Baker?s letter asserted that the proposed 2?19 These analytic-tools are discussed in {Ch'apter Threethis estimate based on the assu be expected to general: ?mail addresses ?one level out,? an 1 addresses ?two levels out.? The overall number of: direct and indirect contests With the itial seed address Would; be signi?cantly reduced using ?analytical trade?craft.? that each query could the FirstAmendmen?c and that he could-?nd-no-reported .dze'c?iS'ions'holding- that the use of "pen- regist?er trap trace-devices violated 'the-?FirSt Amendment. . In his? letter, Baker argued "that although the meta data. Collection entirely innocentcornmunicatimrs, aggoodwfaith investigation Violate" the First Amendment simply- becaus-e it'is ??broa[d] in agape?? (quoting Laird v. Tatum, 4'08 1, '10" He also wrote that? the?usepf .do'llE?Cted meta data would lac-?narrowly constrained? beCauSe the querying Standard for the meta data-Would be subset to. 1] "reasonable :artiCulable Suspicion? offs-nexus to i Regarding Judge Kollar?Kotelly?s Second question Concerning how collected meta data would continue to be of operational value, Baker Wrote that, based on the-analytic continue to be releVant least months. Baker also advised "that the NSA eve the e?mail meta data would continue to retain operational value beyond 18 months, hilt that itigshould be stored accessible to? queries only hya- :'SpeeialIy?oleare'd administrator. Baker proposed that 3 years after the 1?823inolnth?tirnefrarne, after. it is ?rstcollected, the. meta data i i 5. court Order (U) In reSponse to the application and follow-up questions, on July 14, 2004, Judge Kellar?Kotelly signed a Pen Register and Trap and TraCe Opinion and Order based on her'?ndings that the proposed collection of e?rnail meta data,_and the government?spropos'ed controls over and dissemination of this information satis?ed the requirements of FISA. The Order granted the government?s application in all key respects. It approved for a period of 90 do. a the collection within the United States of email meta data The Order also required the government ?tocomply with Certain additional restrictions and procedures either adapted from or not originally proposed in the application, In. the Order, the Court found that the information to be collected was ?dialing, routing, .addressing, or'signaling information? that did not include 242 the FISA Court issued an order authorizing the NBA to maintain bulk ?maa data chi-line "for years after which time it must be destroyed. According to the NSA Office of General Counsel, the SA still follows this retention procedure. authorizingcollection of te_gories~of information delineated-in ?ePp'liCa-tion, but acknowledged-"that- addit?ion?atin?formati?cm ?(lounges gleam-d? from-that" meta .da The Court "found th 7 'of-metadatawereto: be collected I I I the means. for collecting th I tegory of irnet'a data-satisfied the FISAide?IiitiOn of attrap and: trade: dev1ce See 18 ULSAC. 3127(3) as incorporatedinFISA at 50 U.S.C. 1841(2). 3? ?g a pen The Court further found. that the government. satisfied requirement that the application certify that the information likely to he obtained is relevant to an ongoing investigation to protect against international terrorism. The COur't concluded that?, ?under the circumstances-of this case, the applicable relevance standard does. not require aetatistical 2tight fit? between the volume of proposed collectionand i - . proportion of information that wil-lbe directly relevant to investigations.?243 I The: Court also agreed the position that the. privacy interest; etvsteke the Collectibin 0.17 email meta-data did netrise to.? ?Stature-pretected by the Fourth Amendment,? and that the nature 'o'f'the inthiD?was? mitigated by the restrictions on accessing-and disseminating the information, only a small percentage of Which wouldbe seen-by any- person. In sum, the Court concluded that the use of pen register trap and traee devices to "collect email meta data would not violate the First Amendment, stating that the bulk collection proposed in this case. is analogous to suspicionless searches or seizures that have been upheld under the Fourth Amendment in that the Government?s need is compelling and immediate, the intrusion on individual privacy interests is limited, and bulk collection appears to be a I reasonably effective means of detecting and monitoring 243 The Court cautioned that its ruling with regard to the breadth of the meta data collection should not be construed as precedent for similar collections of the full content of communications under the. electronic surveillance provisions of FISA. The Court noted important differences in the tale types of collection, includingthe fact that overbroad eleetronic surveillance requires a showing of probable cause to- believe the of?a foreign power, while the bulk meta data collection under pen register and trap and trace device provisions merely require - overbroad collectionis justified as necessary to discover unknow persons. The court also contrasted. the high privacy interests at stake with respect to content communicatiOn-s with the absence of a privacy interest in meta data; Howrever, the Court also. was concerne'dnthat ?th?e-?eittremely broad nature-of this ColleCtion: Carries it a heightened- risk that collected information. could be subject to various- forms ?of. misuse, pcten?auy i?leving 'abridgement (sf-First Amendment of innocent The: 50 1842mm), pen register and trap and trace: information about the commu-ni'cationSUf a person cannot be targetedfor cellection anlesS it isrjeleV-ant- togan investigation that is not upon the FirstAmendment. Therefore, the Ce'urt ordered that its criterion for querying the arc'hiVeddata inserting the following language, as Shown below: will qualify as a seed 7_ only If NBA concludes, based on the-faCtu' praCti a1: cens'ider?ations of eVeryday life On which. reasonable-and prudent persotis act, there, are facts. giving rise to a- reasonable '?rlticulabl?-s?us: asvseciatedwifth ermidsd.? hoWeverrthat a - se?l 2a: - eraser shall. net. be re . that arenrotecte the, ConstitutiOn. - Regarding the storage, accessing, and..disseminating of the e?mail. meta data obtained by the NSA, the Court ordered that the NSA must store th ?informationin a manner?thatgensures it is not commingled with other data, and must ?generate a log of auditing information for each occasion when the information'is accessed, to, include the . . . retrieval request.? The COu'r-t further ordered that the e?mail meta '11 sed only through queries using the contact chainin described by the NSA in the government?s application. The Court noted the ?distinctive legal considerations? involved in implementing the authority the Court was vesting in the NSA. Speci?cally, the Court observed that conventional pen register and trap and trace surveillance required judicial review before any particular e?mail account could be targeted. However, by granting the government?s application, the. Court noted that the - sion to target an e-mail address (sometimes referred to as a ?see would be made Without judicial review. Therefore, the?Court dered that the Office" of General Counsel would. be responsible for training to comply with querying standards and otheraprocedures- and ?to review thele'gal adequacy for thejbasisyof such queries, First Amendment. revises- suggested a regarding the Court ordered data shall. be available for 1281 querying. The Court further Ordered that after?the lemonth period, the "data". lac-transferred to: ?of?ine? tape, systemifrioni it could still ?b-ecaccessad. for querying upon approval of ?ue NSA to: approve qUeries, and that such meta data must bepdEStreye?dA?U/z years after initially- C'O?llected. 1 I 3? i I The Court?s Order was set to expire aftergO days. The Court required that anyapplication to renew or reinstate the, authority granted in the Order a. report discussing queries made; since the prior application N-?SA?s-appiication of the rem-kite toil thosetqu?friCS; detailed mama-1011 reg-atdi prop?OSed tobe added .to the. ..authegri?il earrteduunder the dier; changes-to the-descriptien of: the ed Order-or the natureof the communications means :ofeouectfiom Cit-h registervand 7 I to the Courtis-SUed separate orders . with: the-installation and use of th per-1 register strap and trace races and :to. maihta the secrecy of the caJJed ??seCondiary orders a. .7 I Wa directed to compensate-the carriers for all in connection with the Order". and i i/gr/ NF) 4.4.34?, Baker and other Witnesses told us that obtaining the. Order was: seen by the Department as a great success, and that "there-Was general agreement that the government had secured not the bulk e?mail meta data coliec Conley told us that in- ng Order from the FISA- Court also prdVided an ?air of legitimacy? to. the program-1.244 94" Carney and others informally referred to the Order'as ?the mother of all pen regis'ters.? eeiden??rciers: Limited Us" a s? . [a We discuss below the President?s directive and't?he oLo: memorandum that-Was; drafted. to-13na1y2ezits legality. .1, The President?s August 9-, 20.04;;Meimoralndium to. the Secretary of Dafense. On August 2004, the same day a routine Presidential- Authorization was issued to continue Stellar Wind, thePreisider?it sent a separate memorandum.th fthe email -meta, data collecte .. The direct the rec .0 Defeneesth?at?, icon?iet grit Withthe Augustifgi 2004?, Presidential Authorization (and-?any ucceesor Presidential the? NS was authorized'to .t 245 The President?s Memorandum provided that the authority to conduct suoh searches Was. to terminate on- September 23, 2004. In the September 17, 72004, Presidential AuthoriZation, this authority was extended until November 18, 2004. .Jgek- Goldsmith resigned as ASSi?stant Attorney General for the Of?ce ,off?Le'gTal Counsel (in July 730, 2004. Goldsmith Was-replaced byiDan-iel serVeduas the Acting AsSistantAttomey Generalfsr'QLC Fabr'uaryQiOUS. (U) re uestvof LSVinggan $31, b3, 255 The mail meta-data has sinma been placed on tape and is being held by the Counsel pursuant to a preservation Order. The ?nal version of the OLC memorandum was signed by Levin on February 4, 2005. Levin told th'eOIG that decision? membrandum to the speci?c purgos'e However, Levin stated that, based on his analysm of the lssue?, I Thus, the. President? asserted ?zeXtrajlldi?dial authority reorder the meta-data- eo?lleCted' underd?S?tellar Wind??for?theflirn'ited' purposedescribed in his 9 memorandum. The: FI'SeCourt Was i of ithisagaetion, although the- government did not. seek-its lperIniSSior-I. Non?compliance - orders issued under the renewed every-90 days. Duringth?e early :1?enewalis, tWO-rnajjorinstanees .on :rieri?ee?mplsia?ceuwere brought to. the FISA Genres attention, ,As? deseribedi 'beioiw? these violations of the Order resulted primarily from?the NSA senior officials? failure to adequately cemmunieate? the-technical. requirements of the Order to the NSA operators tasked with. implementingthern, miscommUn?iC-ations among the FISA Court, the Justice, Department, and the concerning Certain legal issues, I Filteringviomtions "e I-PR?l-e?d with, thatthe-coice icidents Cited the eomp?aneeaiSSue?SWith about; by: the DIVE-43 atta?hm'ent a letter 'fr-O NSA General Cbunsel Robert Deitz ?to-Baker? ., could be queried for any purpose. Levin told us that, other than Addington, no-one date was pushing to broaden the memorandum?s application. 243 Subsequent filings indicate the of overaJJ collections under the Order were affected by the violations. 349 One tipper that was based on this unauthorized collectionwas diesern-in'ated as a 19:: c1: tn the FBI but was subsequently retracted! :KollaraKo?t thegFIS'A, . o1; nappy aha-militate an Orders-Regarding- 3 i ?(Cornplia?nce Order}. :wret?i watt-he Vlol'ated- its own proposed Were attested to bykits Director and, at the government?s invitation, adopted as-sproviSiOns of the orders of this Court.? The Court found that the deliberate actions by NSA personnel,? as echni?cal failures; T-he-COurt stated it was also troubled violation-s, which extended from July 1-4 thrDug?h jthe Con reluctant to issue a renewal of (W) Curt iSSUed an Order to address .0. ion for Authorities:Initializing requiring that an a teatim- . 7 be ac mpamed: a. .. a ewSecre ,ary? of b??f?hs?e atteSti?ng to the stated compli 2 Order and a description of the procedureS that dis?n?guished from day, the. c: would-be 713186di to ensure: compliance. hm)- it the government moved for an extension of time I -in which to. provide the Secretary of Defense'b assured the Court that 'co act chaining database using only properly obtained meta data and purged the unauthorized meta data from the system. A declaration by NSA Director accompanying the government?s motion stated a total 0 e?mail addresses Wee t' ped as leads to the FBI and CIA during the v'io ation period and leadsamayuhave come from the unauthorized. collection Hayden wrote. that Office of the'lnspector General subSequently issued a report of the unautliorized COllecti'ons. The NSA OIG report stated thattheyfiltering, Violations ?probably led. to actual :unauthorized collection, 'butsxve have?th been-able to determine the extent of such are not certain- that we'Will be able to do so.? The report The re. ortconczluded that both . .. Within the Signals Intelligence Directorate (85115)], and a complete lack of program management 1h regard to collection.? The report stated that ?ther failures While-the trainri-ngprovided by the NSA Office of General Counsel Was- ?Vigproua,:eonscientious, and compliant with the July 14 Order, it was inadequate in scope.? . t. . . . .Act?ording- to the report, the N-SA removed as much of the tainted 'co?ec'tion from the TT database as 16. The N-SA unable. to segregate'unau-thor-i'Zed collection fro 7 that portion of the TT database from the-virilation Was discovered), forward. Moreover, ac'corelmg- to report, analytical personnel were restricted from accessing the unauthorized meta data. 2. FISA Court Renews Order W) The FIS-A Cour-Es Order expired on date the government filed its first renewal application. The Reewal sought authorization to collect e?rnail meta data 0 and ed- reauth?oriz?ation for collection due to a variety of operational reasons which theap'pli'cation did not speedy. Baker told.? us that during one of his ?oversight? ViSits to the .fd?QWijng FI?SA-Gourt?s Order, he was given a demonstration of how the. NBA the e?rnailim'eta data, including an eXpl?ahatibn Officiw ear-mail meta-data is: celle'et'ed queried. Baker said?he that; of data that might be used?to meetthe. able-anti ulabtestandard 7 951 In the initial Order, the Court required such a report only upon the government?s. submission of a re ewal application every 90 days. '25? As noted above, see numberstor whioh a reasonable art-ieulable "exists to believe th is. related toa terrorist entity. See "are used to-queiy the met?'di??i'd?f?base to reveal links with other addresses or numbers. 3 b7E I Ap?i'i?e?ttlo?e??d', A?s deseribe'd above, the Order-wast first renewed andiwais .renCWed by subsequent orders of the PISA Cour I the Court lesued a Supplemental. Order- nhance'its reporting to the'Court of?thc. foreign. intelligence bene?ts reahZc-zcl under the orders. Writihg? for the FISA . Jud 1e. Keller?Katelly stated that the. authority granted.under-these: NSA ?to collect vast amounts. of fe?rma-il. but that ?the - Court- is. unable ?on the: the extent-to which information-asle- collected has ace-many resulted in the foreign intelligence bene?ts; orig-mall}! 'Suppl-e?len?tal Order at 1?2. The government responded-with, amotion I requestingthat? in light of prior brie?ngs it had given the FISA not berecluifed-tofully comply With the: Supplemental Order. 11: is notelear' epeoi?e act-ion - he FISA Court took in response to this] motion,, althoughil?asied on thie-zOIG-?s-review of the docket the government regular- reportsto "the. FISA- Court. b1, b3, b7E 254 In these renewals, hat were approved in the July 14, 2004, Order. b7E Ill Telephony Mata Data Collection Under FISA second, part of the Stellar Wind program brought tinder FISA NISATS hulk collection of telephony meta data (basket 2). Chapter Three, under this aspect of the Stellar Wind . program-1thefiNSAabtained clet 1 records of tele hone calls *d??ati0 a . meta data, the bulk b1, b3, b7E number 0 aeh call, and the date, time, and duration ofeac?h call. do net include the substantive content of any communication or the name, address, or ?nancial information of a subscriber or customer. hony' collection 7_ to Conduct Contact chemin . The. transition. of. bulk telephony meta data collectioniifmm Presidential; AuthOrizati'oni? tinder the Stellar Wind program to FI?SAauthority' PISA statute: the FBI siegekean - order from the. FISA Cour-t compelling theproduotion of ?any tangible filomany?ibnsmese, organization, providedthesitems-are for- an 'aqthori'z?d? investigation to protect against international terror-ism or 1, b3, intelligenee See 50 1318.0. 1861'. orders under this. 13713 prox?rlision =oorrmionsly are referred to. as ?Section; 2:15.? orders, inrefere'nce to Section 2?15 of the USA PATRIOT which amended the ?business re'eordS? provision. in title of FISA.358 The ?tangible things? the gavern?ient "the 2-15 avlioation described-tin this {section were the call Wezgdescribefbelow the Circumstancesthat led ?to-th'e go?Vernmentts' decision togstransitionthe bulk sensation of? telephony meta data from presidential-autherity to PISA Authority. We then Summarize the government?sinitial ,apjplieatiiOn and the related Court Order. ?v - I. 4 A. Decision to Seek Order CompellingProduct-ion of Call.detai1 record?s Th-etimingof the Department?s decision in May12'006 to. seek; Court; order for the bulk collection of telephony metadata was d?ven primarily 7by-external events, On December 161 2005, The. New York?Times thlisjhed-iansartiele entitled, ?ush Lets us. spy on Callers Without Courts.? The article, WhiCh we discuss in more detail in Chapter Eight, deScribedin broad terms the content cellee?tion aspect of the Stellar program, stating that the NSA had ?monitored the international telephone ca?suof hundreds, perhaps thousands, of. people inside the United States without warrants over the past thre a ?d numbers? linked to al Qaeda.? i I I mom?. I. I 253 The term PATRIOT Act? is an aeronym for the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and obstruct, Terrorism Act-of 2001., Pub; L. No. 10766, 115 Stat. 2'72 (2001). It is commonly referred to as ?the Patriot Act.? (U) . . 17, article, President Bush publicly had authorized the to. intereept the international communications of people. with ?knOwn link_s"' tidalQaed?a re-late'd'terrori'st organifZatio'ns (baSket On January 19', 20:06,, the Justice. issued a document. ran-titled: ?Le-gal Authorities Sapport-?ing-?the O?fiithe National, Security Agency iDesCribed by the President? and informally referred to as. a. ?White Paper,? that addresSed in an unclassi?ed form? the legal-basis for the collection activities that were descri?bedin the New-Yerk'Tiines article confirmed by? the President. carding to Steven .Bradbur'y?g, ?e-lieadn analysis Contained May 11, 2006, USA Today published the results of its investigation. The article, entitled Has Massive Database of AmeriCan Phone Calls,? reported that the NSA ?had been secretly collecting-the phone call records of tens of millions of Americans, Using data provided by A'l?de, Verizon, and BellSouth.? The article stated that the program, launched shortly after the Septemberrll attacks, collected the records of billions of domestic calls in. order to analyze calling patternsto detect terrorist-activity. The article reported that the records provided 'to the NSA did not include customer names, street addresses, and other personal information, but noted that? such infOrr?na?t?ion was readily available by cross-checking the telephone numbers against other databases. b1, b3, b7E -A Summary at Deaartmentis Applicatia? and R?atedi?sa maritime: - As} noted Previous-1y, applicationsto thexFIlSA Court order; ?tangible are commonlyareferree ?to - inreference to Section. 215 cf the?USA PATRIOT secs-0a authorizes. the FBI. to requesta FIISA Court? order 7 requiring the-production of any tangible things (including books, resords, papers, documents, other'iterns) fer an investigation to obtain foreign intelligence information not aUnited States person or to protect against international; terrorism or clandestine intelligence activities, "providedthat' such intrest?ig-atiOn of. a United States person-isnot upon thebasis-ofactivities protested by the ji?fi'rSt'. amendment to the Constitution. (U) i iSng Section: 2115 does not require that the?items' tee-the subject of an=investigation1sgthe government need only demonstrate that the items: are relevant to an authorized investigationgg?g (U3). OnrrMa?y 23,2006, the FBI filed with the .FISA Court a Section 15' a plieation seeking authority to collect telephony meta datato assist the I - 'oragents?o elated-e31: investigations- then 13 T-h?elapplication requested an order compellin produce (for-the duration of the 90wday order) call an records relalng to? all telephOne communications maintained by the carriers. The applicatiOn described call detail records as routing information that included the b1, b3, b7E 25? ?United States person? is de?ned in FISA as a citizen, legal permanent resident, or unincorporated association in which a ?substantial number? of members are citizenscr legal permanent. residents, and corporations incorporated in the United States as IOng as such associations or corporations are not themseIVCs ?foreign powers.? 50 U.S-.-C. 9-5? Prior to the enactmentof?Section- 215, the statute?s ?business records? provisions were limited to obtaining information abOut a specific-person .or entity under _iriVesti'g'ation. Also, information could be obtained only from Common carrier-s, public accommodation facilities, physical storage facilities, and vehicle rental facilities. - originatingand terminating{telephohe number of each call,- =aand the date, time, duratioin of eachxcall. The application stated that telephony theta d?atiadicl not-inelud'e the substantivevmntentof any communicaticnor the. I name, address, or financial intermatiOn of a Subscriber or customer. - the application, the majority of the telephony meta data, provided tortheNSA Was-expected toinvolve communications. that were (1)1 Unitedz.States and abroad or,? 2 when .. within United. nc?lud local elephone calls. The. application acknowledged that th collection w0u=ld include rec-otds Of'Cornm-uniications of US. persons located. Within the United States Who. ere. not the subject of any investigation. the established the Order, the. application asserted that the dad for the NSA to perform: analysis to find known 7 and to: identity unknown operatives, some. of whom . _United?.rStates or comniunication. with U.S. persons. The: application-State.d thatit was not possible to determine in advance which particularpiece of'mjeta data will identify a terrorist. The application stated diatobtaininggsuch "bulk data inoreases the. ability, through con? echainin to detect and _.identify members-o. . 0 er rds, according- to the "application, metata?'ata'analySis'iS possible onlyif'the ?has collected and archived a broad? set of that contains within it the subset of communications thatcan latel'. be identified as I :b b1, b3, b7E 955 The FISA Court had stated in its July 2004 that the FISA statute?s ?relevance? requirement is a relatively low standard and that in evaluatin; Whether bqu meta to an? investigation into shouldgbe .giVen to the fully considered judgment of the executive branch in assessing and responding to national-security- threats and in determining?the potential significance of information.? The. government cited this precedent'in the Section 21-5 ust as the bulk-coilection. of e?mail metadata Waslrelevant to FBI investigations int is the bulk collection of telephony metadata described herein.? W) life on reasoriablezand prudent persous- th like a. the. to?the- query standard; 7 telephone number?bel-ieved- - . . . .f?gal?d?d- as associated? With solely-0n basis of activities a laced-by; the? Firs-t7 Ame?dmenrto the C'instittLtion.? Awarding to the applicatiomlhezsNSA estimated mat Only fraction (1. in 4 million, .or'io.00'0023percent1 of?the 'o?a?ll' detail records . 111- the-databaSe Were-expectedgyto beganalyz'ei "The results Gian? begrovi?dedv', or "??pp?ed?ito on access to, the processmgand-disseminatioh of; the data 061160th thatswere es'st?ntially identicaljto those included in the Order. These included'the reqUii?emeiJ-t that queries. be approved by one: of seven officials or managers that'thei Office of the General Counsel would review approife proposed queries of telephone numbers reasonably believed :to housed byUS; per-80118357 a Leis 35?" ofmeta data;- s?ch?as ._controls on the dissemination-Of any! US. person information, the creation of a capability to audit NSA with access to the meta data, the destruction- Of-?oOIleCted metadata after a periOd of '5 years [the destructionp'er'iod for email meta data and a by the Inspector General and General Counsel cendu?t?d- With-in45 days of implementingthe FISA Cour'tOtder that assessed the. (Cont?d.) 524-30rder atapproximately Q'Oeday intervals, with some A on {May 24, 200.6,, the FISA Court application. Court?s Order: Stated thatthere-were reasonab-lezgrounds to Believe: that the telephony metaidata were. releVant to :atifthorizved inVes-tigation's being conducted by theFB-I tozpromcta?gainst international terrorism; The Order-incorporated- each. of the procedure-s proposedin application relating. to- access to and use of data. . These procedures included a requirement? that orfeinstato. thesaut-hority for. the collection contain-areport queries madersince the .Order'Was- ?egr?anted; the manner in which the- procedui'es-Ielating: to-access' and use W?O'f'the meta: data were applied; and 5(3) any prOpo'sed =_changeS? in the way in: 2thecall detail records would be received from the communications: cal-tiers, The Orderalso requires the Justice Department to'review, at least ?90 days, a sample of?the NSA?sjustification-s for querying the call .. Through" March 2009, theiFISA Court reneWed the authorities granted 'bl, Furthei?fth? uCoiirt?siS'ecition" I 7 do o-fn?odify its-usesof the telephony ,meta data froin an analytical perSpect?iVe. However, as discusSed below, the FISA Court drastically changed the authority contained in its March 2009 section 215 Order following the government?s disclosUre of? incidents involvingthe failUIe to comply with the terms of the Court?s priOr orders. adequacy of the-management controls for the proCess?ing and dieseminatiOH of person information. 255 As noted above, the: Court'grantecl an identical motion at the same time in connection With the bulk collection of e-mail meta data. Non-Compliance with Section. 2 is Orders January 2009', repreSentatives from the Department?s National Division attended a briefing at'the SA concerning the telephony metadata collectiOn. Course of this briefing, and as con?rmed by the inz-the?days .that?fol?l?OWed, the Department came- to understand au?rying the telephony meta- data in a- manner thatwas notepaumori'z'ed by the FISA. 2'15. Order-s. Speci?cally, the NSA'itaS-lon ax the meta data with of telephone identi?ers from an ?alert list? that had not been determinedth sati?sfyathe reasonable alitioul'able suspicion (MS) standard the Court required be ?met_%before the NSA was authorized to ?accessthe' archived-data? for Search Or analysis purposes??s9 The. alert list contained telephone identifiers that we [31? re of interest to: . b1, b3, b7E genetate conduet Contact chainin of the telephony meta data. Hewe?v'er, automated ana fei?l'a?l'eiits etiei?: ed by non?RAB approxie'd identifierswere net permitt rite were sent to to determine'JWhether Chaining as Warrantsd in aetzordance with the standard. On January 15, 2009, the eparnnent noti?ed that the NSA had? bee - at? 5's This ustiee? .h b1, b3, b7E On January 28, 2009, 259 The term ?telephone identifier? used by the government means a telephone number as well as other unique identifiers associated with a particular user or telecommunications device for purposes of billing or routing communications. 9.70 Fellowing the DBpartment?s notice to the Court, the attempted to Complete 'a software fix to the alert process so that ?hits? against the telephony meta data genera-ted by telephone identifiers were deleted and that only ?hits? gEnefated'by RAS?approved identifiers were sent to. NBA for further analysis. The also attempted to construct a new alert list consisting of enly RAS~approVed telephone identi?ers HOWever, the irnplernentation of these modifications Was unsuccessfulancl on a-nuary 24, 2009, the?NSA shutdown the alert. process completely; . 3 whateppeerstebe sir-?agrant Violation stilts The: to fileaebrief?to?f?fhelp; the aesess: whethergtheyord?ers- in this-sdoeket should be :me'difiedi?ore rescindejdifixihether ether remedialsteps should: bezdireeted; :anchheitl-leruthe Court Sheen?l?d. take aetion'regarding persons responsible fer. misrepresentations. to} the Ceiirter through itsee?tempt pester-ts referral to appropriate ?inv?e sitigativeof?cee? The C'Qut-t also required. the government to additional specific knew :a1ert..list' being used to query the meta-data included . had. net? been-determined to, meet the reasonable and. 'articillable Suspicion Standard; ?how'lonig the. ?unauthorized querying? had. been conducted, and-why none of the entities the Court" direCted'to- conduCt 'rgeviewsizof the'meta- date ee-llectien program identi?ed the problem earlier;2?1 aOnF'ebrualy 17, 2009,, the government responded to ?theCourt?s order that the previeus 'deseriptions_- 1:0 Court; (lithe-alert;Illist process were inaccurate andr'that the. Section-.2515 Order-did notc'authorize'the goVernment tones the alert list in the manner the-tit ,?gieirernment-deiscribed tor the. C?ourtin detailhowthe-s?NSAdeveloped procedures-in May. 2.0.0.:eto ?hnplement the Section 215 authority that resulted the-NSA querying the telephony mes datawith: .?omRnS approved telepho?eidentij?ersrfer? 'over 2, yea?1:3, in vialetionf of therurt?s- Ordermand how thosepmcedures came to be deScrihed incorrectly to the Genre According te?the? the Situation resulted from the interpretation of the term ?archived data? used in the Court?s Orders and. the" that the alert-precets?s under the SeetiOrl 2 15' authority operated the same as the alert process under the Pen Register Trap and Trace authority?? The. government told the 'C'curt that ?there was never a Complete understanding among key personnel?" who re?ie?Wed the. initial report to the-Court describing the alert process about 271 The entities directed to Conduct-such reviews under the Section '215 Orders were the'NSA?s Inspector General, General Counsel, and Signals Intelligence Directorate Oversight and Compliance Of?ce. 272 The NBA understood the term ?archived da ta? in the Court?s Order to refer ?arch-hem?" repository of?telephony?met?a data. For this reason, the View, 1t-wasnot. required-to limit the alert list to RAS?approved identi?ers. I terminology wasintended. to mean, and that ?there was-no smgle..pelisonWhOVhad 'domplete .te'C-h-nioal understanding of 3? The-government- argued that-the Section." 2.15 Orders 's'h'oul?d notxbe rescinded-or modified.?in. light of the significant steps'thatthe Government to remedy the alert list compliance: incident effects, ?ae significant modi?cations the .Govel'nrnentf"isgin the. and the Value orthe telephohy emetadata coileetitm Government?s national security Ameng thetseveraj measures;the-government highlighted. to the ,Courtwas "the NSA Director?s decision to?rorder ?ende-to-end systemsengineeringand prosess reviews and operational) of. handlingof [telephony] metadata.? Less weeks thegovernrnent ?led the reSponse summarized above, goizernment i?nforrned?'ie Courtthatth?e NSA-lhad identi?ed additional compliance incidents during these in? Orders dated March 2 and .53, 2009, the FISA caurt addressed the Complianeeincidents reported. by the government imposed changes to. the Scotion 2,15 authoritiespreviOusly granted. The Court first. the interpretation of r'the terrn ?5archiVed :data,? The said the. interpretation ?strains 'ere'dulit3?? and observed that interpretation??thatturn-s on Whether the meta data being-saCCE?sSed has been in a particular database at the of- the access would ?render Complianceiwith the .RAS- "requirement merely optionalf?W that data ?for; areport, the-identifier was either ?already sabject a been. reviewed by the Office of General Counsel to ensure the RAS determination was not based solely on a US. person?s First Amendmentaprotected activities?{513W 974 The additional compliance incidents involved the. handling of the telephony meta data in an unauthorized manner. The ?rst incident involved the .use of an analytical tool to query [usually automatically) the meta data with non-HAS approved telephone identifiers. The tool determined if a record of a telephone identifier was present in NSA databases and, if so, provided information about the. calling activity as?SoCiated Withthat identifier. The second incident involved three who conducted chaininganalyses in the telephony meta data using 14 non?RAB approved identi?ers. Aesording to the government?s notice to the Court, the conducted queries'of? none'F-ISA authorized telephony meta data and were unaware their queries also ran against the FISAaauthorized meta data. The government stated that none of the queries used an, identifier associated with a person or telephone identi?er and none of the queries. resulted in intelligence reporting. 9.1.. at: Jan: . the misrepresentations; the government made-tome Court from August 2006'- toDecember 2008 in report-Ls- that - inaCctiratelydie-scribed the alert list- process. TheCOurt .reCounzted; speci?esmi?sreprestentations and summarized"theggovernmentis epran-atien for;theiroeeurrenca The Courtthenconcluded, Regardiess Qi'what tasters-contributed to these misrepresentations, the Court finds that the government?s. failure to?ensure that mamas-11316 officials. adequately underston NSA?Salertili?st process, and to- accurately repert its implementation to the-Court, has prevented,_if0r more; two bath the gavemmentand the F180 from. taking steps tolrernedy daily violations of the minimization. roCeduresiset ??forth'in orders and designedto proteo all "recoiids pertaining to. telephone-com nicationsof U..S. persons. locatedwit?hin the United States who are not. the subject- of any FBI investigations and. whose call detail information could not otherwise have been legally captured in bulku Thaco'urtalso addressed the additional nonaeompliance meid?etits thatwere: identified during-the initial review orderedby the Director, des?pitethe?NS-?A implementing intended to prevent their occurrence-k. In view of re?COrd-lof reomplianCe incidents the gevernment had reported to date, the Caurt stated, - [Ht has-finally come to light that the authorizations of vast collection program have been premised on 'a ?awed depietion; of- how the NSA uses BR metad'ata. this missperception by the FISC 'existedirom the inceptiOn of its authorized collectiOn? in May 2006, buttressed by repeated inaccurate statements made in the government?s submissions; and despite. a -government~.devised and Court-mandated over-sight regime. The minimization procedures proposed by the government in each successive applicatiOn and approved and- adopted as binding by the orders of the F180 have been-so frequently and systemically violated that it can fairly be said that this critical element of the overall BR regime has never functioned effectively. Despite the Court?s concerns with the telephony meta data program, and its lack of confidence ?that the government is doing? its utmoSt toensure' that thoSe responsible for implementation fully comply with the Court?s ..orders,? it authorized the government to continue collecting telephony meta data under the SectiOn 2915 Orders. The Court explained that in lightof the government?s ijepe'ated representationsthat the-Collection of. the: telephony - metadata lsvital to national security, together with the vCourt-?spriOr determination- thet the De?ection proper-1y administered Conforms with the FIESA Statute, "?it would not be prudent?tto order the government: to the. bulk-collection, HoweVer, ?more. is needed to protect person inferrnation aequired and retained? pursuanttotheSeeti-onQ?IS orders, the Court: prohibited the government from accessing coll?eeted ?until such time as the-government is able-to restore-?-thejCourtfs? confidence that the go?vernmcantican and?w?l comply with previOus-ly approved procedures for The government alcasesby?case basis, request authority from the Court-to: qUer-y' the meta data-to obtain thI?C?lgIl 'i-ntelligeneof?6 reqUeSt must Speedy the telephone identifier to be used and thefactu'al basistr-the SA?s?v RAS determination. I The C?ourt Ordered thatupon: completion of: the NEWS) end?to?end system engineering: and process reviews} the government file'a report that - describes the results of reviews, discusses the stepsi'taken' to remedy nenseempliance incidents, andpreposes minimization-and oversight procedUIes to employ should the Court authorize resumption- of regular access to thetelephony meta data. "The governmentis report. also must ineludean affidavit from the: FBI Director and anyoth?er national. security official deemed appropriate(describing the value of the telephony meta data to national security. . a 1- Additionally, the Court ordered the: government'to implement OVertsigh't mechanisms proposed the government?sreslsonse to the compliance incidents. These mechanisms generally require the Justice Departments National Security Division to aesume-a more prominent role in the NSA?sadminis'tration of the bulk Collection program.- For example, the Office of General Counsel must now consult with the National 275 The Court also stated, the Executive Branch?s responsibility for and expertise in determining how best to protect our national security, and in light of the scale of this bulk collection program, the Court muSt rely heavily on. the government to monitor this program to ensure that it continues to be justified, in the View of those responsible for our natidnal security, and that it is being implemented in a manner that protects the privacy interests of US. 27-5 The Court authorized the government to query the meta data without Court approval to protect against an imminent threat to=11uman life, with notice. to the COurt Within the next businessday of the query being conducted. The-Court also authOriZejd the government to access the meta data to ensure ?data integrity?.and to; develop and test technological measures designed to enable to the NSA to oomphr with previously approved, procedures for accessing the meta I _-SecurityifDii_Vsision re'l'ateito the I i?terpiietation, scope,- erimpIergneritation of past, Current, and? .futUre?iSecti?on related-to the telephony bulk meta data collection May '29, 2009', the Court authorized the . government to- continue collecting} telephony meta. data: under? the section 215: Ordersa'for 43: days. I subjeet'to the same jl-irnitations'lrset out in its. orders: Of'March 2 and 2009-. m. leansentcullzectien under PISA- I third-and last partied-the Stellar Wind program brought under EISA'authOrity wasscontenteol-l'ectijon (basket The thistransit?ibn' .Wasi?legellr operationally endear discussion in Sje?c?on does net addresS each. statutory element or the full. ChrOil?Qlogy offthe.ygevernmenES- applicatiensxand related FISAC'ourt'orders. Rather, describe- dec' 'be to: mgr-eon: com-em cohesion we omen collection propesals Fahd-the era, Is. it "i?ssued; Inthi's section, We FISA courtjudges. rejectiOn-?of the goVernnientis: legal. apiproachv'to con-tent Collectiom ardeci'sic'jn- that hastened the enactment ~0f-le?giS1ation that'rs?igni?cantly amended the statute .pr?Ovi?deid the government surveillance- authorities broader. than thoseauthorized under Stellar Wind. - A- Decision te: Seek Contth outer.- The Department first began Work On bringing- Stellar- Winds content. col'lectin activity (basket 1) under PISA in March 2005, shortly after Alberto Gen-zales beCa-m?e Attorney General, Gonzalesto'ld us- that he initiated discussions about making this change with OLC Principal Deputy Assistant Attorney General Bradbury. Gonzales said that he had questions about how the NSA was conducting the collection in terms of audits and checks being performed, and he wanted to ensure that the agency was running the program properly. Gonzales told us that placing. content collection under authority would also eliminate the constitutional debate about the aeti'Vityi would reassure people that the President Was actingi'acoordi?ng to: the Constitution and the law, Gonzales said that,in his View, it is better to Conduct activities. such as content collection without a direct Order from thefPresident when possible. Gonzales addedthat in 2.0.071 nobody thought it was possible to- bring Stellar Wind under FISA authority. a When Gonzales became Attorney Generaliti- earlyQOOS, .hoivcver, he also knew there had been a leak to The New Yorlc'llime's about theNSA?s content collection activity under Stellar Wind an that the paper: actively investigating the story. In November 2004', Gonzales (then the. WhiteHou-se Counsel), together with Deputy Attomey General Carney and his Chief ,of- Staff, had. met with New York Times reporters to discuss. the pOtent-ial .. .. I In re's?pOnse *to Gonzales?s request, Bradbury, attorneys- and the Of?ce: of Intelligence and Policy Review, (OIP-Rlaswell as, with iNSAperson-nel, devised-allegal theory, summarizedbelow, fer bringing under the Stellar Wind program?s content-collection activities while. preseivingthe ?speed and agility? many IntelligenCe' Community officials cited. as the chief advantage. of the NSA program. In June 2005, Bradbury, ?together'with.Associate Deputy Attorney General PatrickPhilbin, presented the legal theory to -White Honse of?cials David Addingtor'i, 'Ilari'ie-t Miers, and Daniel-Levin received their approval to continue-work on. a draft FISH appIiCatiOn373+?8+tS??W Bradbury told the OIG that heaals?o spoke to the Director of National Intelligence and to officials about bringing Stellar Windisxciontenft collectiOn under FISA. According to Bradbury, the. Director of National Intelligenceresponded positively to the proposal, but the NSA was skeptical as: to whether a FISA approach would be feasible, 'in'view of the substantial administrative requirements under the FISA Court?s Order. The NBA also believed that?the Court would be reluctant to grant the the operaticnal ?eXibil-ity it would insist on in any content application, resulting in less suWeillance Coverage of telephone numbers and email addresses used by persons outside the United States. As discussed in detail in Chapter Eight ofth'is report, in December 2005 The New York Times published its series of articles 0n the Content collection portion of the Stella-r Wind program, resulting_in considerable controversy and public criticism of the NSA pregrarn. Through the. spring of 2006, the Department continued work on the content application. In May 2006, at the first of the ISA Court?s semiannual meetings that year, the Department provided the Court a draft of the applicatiOn for content collecrion to obtain feedback on the. government?s unconventional approach to the FISA statute. None of FISA Court judges indicated Whether the 277 The New York Times held the article until December 2005, when it published a series of articles on the content collection portion of Stellar Wind. 373 After serving as Acting Assistant Attorney General for OLC frOm June 2004 to February 2005, Levin joined the National Security Council, where he remained until approximately November 2005. (U) w. lappli'e fat-ion Wo'uldfhe cgrante if but so'megidenti?ed fecncernrs; with. certainpaSpeetslofthe propOSaL i? sodsgres'sand the Adminise-?ationvwere and discussing FISA statute to 'au?iorize the-type :of electronic surveillance that the con-tent appli'Cat-ion sought, Work,ont1ae .applieation- was temporarily"suspended as the Department fOCuS'ed its ate-new. 0.11 Congress to craft this-legisllationl However, this". snapension of. application was brief; Bradburysaidfh?eoncludsd by the: falliof -, as Congress Was heading for there, would be no legis1atiVe' .Iefotrn of statute in the foreseeable future that would address content collection as it was being As a result, Department pressed f0rward. with the draft Content application tattle-FISH C'ourt38. Summary 011' Department?sbe?eenmer 206, Content Application IiiNevember 2006, at the second of the-Court?s. semiannual; meetings, the2Departm-entpresented an updated draitojf the application. that?- frcy?m member-s of the during the meeting; 0n:D'eCernbei: 13', 2006, the Department filed content application With the Court, government?s .D'ecembe - 113' application; sought interest-thee.tziw - . authority 'a b7E 11 as . 3- .Community to be able quickly and ef?ciently to acquire communications to or from individuals reasonably believed to 279 The Content application?included the following caveat: By filing this application, the United States does not in any way suggest that the President lacks". constitutional or- statutory authority to conduct the elect-tonic Surveillance detailed herein without Court authorization. members 61' agents of sign}. powers.? . According-"t0: application, V?Ifgn-zea?y Warmng system .FISA males he?. overnment to the rescues-of; - b.1?b3? Individuals u: . tee-States.- The ywamns 3% Sousht 170- WE replacethe ml 1p individual .-appli??ati?ons. bash: time: st-heagovei?nmentz h'a?clapmbabl?c cause phone-number or. e~mai1eaddress, referred to by as ?selector,? Was being? usedor about to be used. by membersoragents-of- at fOre-ign- powen Un 1 . Ialb'e FISH FCGi-lrt The legal: arguments. ruse-arming are also. require discussim of statute?ain?l previous decisions. .R'atherpithan: describe at length 1116361531163, seetiOn- we detail the two components of to content collection the application that 'critiCaii-for understanding c?e judge?s. approval of the applieati'sntand motherjudge?s later rejectibnvof essentially the same application. First, the, government proposed interpretatiOn of the term ?facility? in the FISA statute that was broader than how the term was. ordinarily, but 230 The Department?s application, provided an example to illustrate the risks. associated with the existing requirement. that FISA Cqurt approval or Attorney General "r not} always, {app?lied?m Sectioxi prov-ides that the Court may order electronic surveillance. only upon finding that; there "is. probable cause; to; believe that ?5eachnof the facilities orplaces at which the. electronic is: directed is 'b'eing'us'e'd, or is about to tie-Used, by? a grout): invoked ihintemational te-rmrism. The. term ?facilities? generally- wa's interpreted to refer to individual telephone niimbers or e?mailladd-resses-zat. whichysurte?lanee- A in its,an titration that theiterm facilities? cbe?i'inter feted broad a rider. this approach, instead (if 7. . eat ti'u telephone numbers- or e-imlail add-IiCSSeS; the: Court would :determihe on" To th "there-was robable. cause to believe that the target Was using: communicate t?elephonically or by e~ma?l?qa3r Second, the governmentis;-appiication requested that Senior NSA o?f?'eiails be authorized to make. individualized ?ndings of probable cause about?whether a .pattiCular telephone number or ermail adore-sewers being a agent Of'One- 0f the 'applicationis targets- makes this probable cause determination. I implement this transfer of authority, the government proposed that NSAOf?c-ials make-the probable cauSe determinations as part of "requirements called??m;inimization procedures,? which are detailed rules '1231 the. government?s-memorandum of Law ?led in'support of' the content application scribed sevCral instancesiyhere the FISA court authorized surveillance. of oilit" Wasrnot-Iimite to- 'a?r?ticularetele?hone numbetsend addresses, that a broader?th thorizedb 'the?Court . . b1b3, useof the international telephone system and b7E thetgdvem :mustwhandle intercepts- ,pertaini'fng, person-s. statutegproizidesrthat each FISA'CaP-pilibation must-finclude; Flea m-ini-iniifation procedures that the age n?cy vwiil. foam-with- respect-to. communications intercepted pursuant. to a: PISA- Court order.- Mini-mention ?praooeduresi in the content-Ordinarily govern. the handling of intercepted communications involving U58;peremeyafter"the" .afeqeieinonhae been approved by ELSA Court Gnu-rt authorize s- thewag'ency- to intercept the commumicati??s- the agency follows? the Minimization: prOCEdiJresWith. respect tohow itgitetains', uses, and disseminates any US. person-information "it collects- under the Court?s order-W However, the government proposed as? part of the. content application procedures also encompasshowthe SAacqniree the communicatiOnSPB-?t Speci?cally, the application propoSCd thatathe-NSA could intercept the-communications of? Specific: Sel?ectoffs'ijf?ageney officials vdeiari?iiledthemwas probable '1 ct? ed a member or ragenft?of' a, ,an?diizl Hie-communism our :ore?n-cinn eminence refenred tothis- as the "minimization probable: ca?SC' .standard'l"235' Thus, the content application had a tWo~ptong tenable: cause standard?: (.1) probable cause to believe at-eelthor-isnbeingiused bye member- or agent of a targeted group, and (2) probable can 23?? Bradburyitold the that this argument was based-on thetexit'of thez?rFISA -.statute;. which states. that minimization procedures- apply to comlrnUniCationein addition to their retention and dissemination, seasons-.0. Indeed, the government?s Memoi?andum of Law ?led in Support of the content application described several cases in which the FISA Court authorized the. g'oVEm?ment to ndu ele troni surveillance that included minimization at the time of acquisit n. 1' in b' any targete' b12133: b7E 7 ?he pfoposeid ?minimization probable can se standard? was inad?dition to-the? standard minimization procedures that. accompany every- FISA appliCation submitted by" the government and that have been liong~approved by the FISA- court?W . - . gproing ?probablecause to believe a Selector is lacing used by aineinber or ?agentin a? ?targeted?group would "assess de?ned in the application as infO?nation "from-a.iJariety: ofldomeat-ic foreign intelligence law enforcement Under iihe 'terms::of Ehe- applliCation, pos-itiVe-?ndinge of probable. would. be-recoI-dBd?in ado-tabasetandihc assessment process would be to piefiodicinternal. roview by NSA offiCialS, including the NSA General Counsel and Inspector General. b1, b3accordance With standard inimization procedures that apply to all of the agency?s electroIiic surveillance activities. 23? As'it did with telephone communications, the application acknowledged that the manner in which e?mai'l communications are routed would cause the SA to collect some email-Communications thattin fact are between communicants wholly within the United (Cont?d.) 1 viewing-the gov?nment?s.approach to both- ?facilities? and the December 13,, 2006 content - - terms of theapplication, co?mmuniCations acquired by the .NSA .cou1dl3'be- retained for 5 years, unless the Court approved retention for additional aspect of the content application is important to understand. The ?early warning system? the government prOposed applied both to ?d'orne?Stic selectors? and ?foreign selectors. Domestic selectors are telephone numbers and e?mail addresses reasonably believed to be used by individuals in the United States; fOreign selectors are telephone numbers and evmail addresses reasonably believed to be used by individuals outside the United States. Under Stellar Wind, the NSA intercepted the communiCations- of both categories of selectors, although the NSA tasked far more foreign selectors than domestic selectors. States,- even though the NSA had probable cause to believe the communication was to or from a foreign country. The application stated that the NSA would handle any such communications-in accordance with its standard minimization procedures. The its confront application that the domestic selectors ?wOuld: be set ?to more. rigorous; targeting approval and. more- -freqiient reporting to the FISA Court foreign. selectors, but the application sought to preserve officials? authOri-ty to make the probable ?gauge?{determinations as to CaCh;283 .A?s1we describe below, first. FISAL ?to-consider the contentapp'li?cation, Judge Malcolm Howard,? wasunwilling-to extend this authority to demeStic selectors. Judge?liioward GrantsAppiication-in PartW - Department?s-December 13, 2006,, Content application was assigned to Jtidge Howard, because he was the ?duty? judge that week responsible for Considering new applications.5389 Judge Heward' advised the D?paftment orally that he Would not authorize, on the terms proposed in; the application, the electronic surveillance of selectors to be used by persons United States (domestic seleCtOrs). He did not issue a written opinionor-order concerning this decision. The Department, in response to- oral advisement, ?led a separate applicationrequesting authorityto Conduct eleCtronic surveillance on domesticselectors, This application, below, was filed on January 9, 2007, is- ,eensidered the-?rst ?fdomestic selectorsapplications; the December 13- cons?idered the ?rSt ?foreign Selectors application.? udg?e Howard also requested additional briefin- - 3 A eOnstituted ?facilities? under rid Whether'the surveillanee an 3r sought the government?s content application-would. in fact be ?directed? not at these ?facilities? but rather at particulartelephone-numbers and lea-mail addresses the government would'task for- collec'tion. In response, the Department ?led a supplemental memorandum of law on anuaryQ, 2007, arguing that the government?s construction of the 235 Under the terms of the original content application, domestic selectors tasked by the goVernment would subsequently be reported to the Court for approval. The Court either had. to approve?each domestic selector within 48 hours of receivingthe government?s reporter, if the Court did not agree there was probable cause to believe the selector was being used by a member or agent of a target of the applicatiOn, provide the government24 hours to submit additional information eStablishing probable cause. Foreign selectors tasked by the government did not require subsequent approval: by the Court, although the Court could direct that the surveillance of any selector cease. 239 The Department offered to submit the application to the FISA Presiding Judge, Judge Kollar~Kotelly, but she said that it should be ?led in the normal fashion, which meant it "would be assigned to the FISA duty judge that week. 1W bl, b3, b7E the. selector li's- bein - 'sd 7 and. ?directed? was fully consiStent the terttof FISA Supported Court practice-and precedent, The; memorandum. explained Why the traditional approach-t0 surveillance under. PISA notaprovijdeithe speed and agility necessary for the ?early warning system?the? application sought to create?go?W January 10,; 2007, Judge-Harvard app?rOvecl the Department?s content-application as to foreign selectors, endorsing the legal fraIneWork on WhiCh the; content application for foreign selectors Was based, including "the broad constructionsof the term? ?facility? and 'the?use of minimization- procedures to emvaver SAoffi?cials to make targeting. decisions-abetlt particular? selectors. Judge Howard?s Order authorized government to cenduct. eleCtroniesurveillancefora period of 90 days ?at' b1, b3, b7E Judge-Howard?s Order also required that an attorney?from the Justice Departments Nationalv~Seourity Division fer- targeting-particmar foreign. selectors. The Order required the-government- to. submit- reports to Court every 30 days listing new 'selectors'tasked 30 days and brie?y. summarizing the basis for the d?eterrninationgthat the first prongm" the minimization proba?le cause "srandiar'dihasabeen met for each new The Order preserved the Court?s authority to direct that surveillance cease on any selectors for which 990 on thiS? point, the memorandum cited the. government?s; limited resources as; presenting a' significant obstacle tofiling-a separate FISAapplication for each selector it wanted to plce' under surveillance. ?The government stated that it anticipated initiating. collection :5 new selectors each month, a figure that translates to fi motion'to amend a PISA order or seeking Attorney General emergency authorit times per day (017,; alternatively filin onernotion or seeking one Attorney General emergency authorization coverin new Selectors each day). The government stated that if the government proceeded under any of these options, valuable intelligence would be lost. 291 As noted earlier, the Order compelled The Order also required that with each request for reauthoriz. n, thegovemment present a listof enrrent selectors previously reported to the Court that the government intended to continue b1, b3, b7E tasking, identify any selectors reasonably believed to be used by US, persons outside the United? Statescommunications. that mentioned a tasked e-mail address but that were not to or from that selector. b1, b3, b7E 2?92 As noted above, the first prong of the standard is b1, b3, b7E Ci?ourtfound that the first. prong-sot the standard [has not been- Sati?S?ed, tagaddi?tion, the Order required the Inspector General, General. Counsel, Signals Intelligence DireCtorateto periodically review thea'authorized *oolleetion-acti?Vities; These office'sWerereqiairedfto .submita report the days :arter?the collection was initiated. under. the Order that wouldraddress theuadequacy of managementcontrolsr Whether. per-son informationwaSKbein-g handled- preperlyr . 3 According to several D'epar?tinent officials, the effort to. E: b1, b3, b7E Astanresultof Order,- the Department and NBA .submittedl'to the Cotth for its review the factual basis forteach selector supporting the. dcte?rn?nation? that the ?minimization ?prObable cause- b1 "standard?t-had been satisfied, The Department aeoompligshed pursuant; b3? to: rixed'bydudge Heward under?which the Department ?led. 1-3733 foreign selectors every ya "for the duratioii of? the 'jgovadayoraer; {1 I - The probable cause. explanation for each foreign selector filed Was described in several sentences. According to Bradbury, be: impressed upon-the NSA that Judge Howard Would review each submissiiOn inquire about how recently the NSA had acquired communications relating toga particular selector. According to Matthew Olsen, the Deputy Assistant AttOrney General in the Department?s National Security Division-who was responsible fer overseeing; intelligence matters, Judge Howard did in some cases inquire about the. government?s facmal basis for? believing the minimization probable cause standard has been. met?gi Bradbury also said he stressed-that the Court would scrutinize the probable cause determination-s more rigorously than the agency had been doing itself and that the Court was more likely to approve a selector where the surveillance was cur-rent than it would a selector that has ?remained dormant for 293 Olsen was involved in the drafting and presentation to the FISA Court of the contentapplication and the government?s implementation of the related FISA Court Orders. 294 However, information? in asses ?problematic? becaus radbury Olsen told. us that ereig-n selectors.ultimately were filed then-FISA Court understh?e terms. of Judge Howard?lsa Order; Said that the NSA sewed to submitsele ?tdl?s that-were deemed high th-at'had a Wellsdocumente'd nexus: foreignpowers, b3? and. that had recent communicatiens?--aetivity. A?tt?erneys? WE theterrns- the Order were required lie-greview the ENSA?SAjustificatiOn - for -?e1a.ehl foreignrse'l?eetor that it tasked, worked with the: NSA this reyiew process: Ascordi?gto Olsen; OIPR attorneys: the probablelcause determmation ferfeach "selector, but idlidnot mnduetindependent probable cause, inquiries. This re?ewi ?i?de?tifi?e electors that in judgment required? additional?ddeumen-tation befOre theycoul?d be submitted toth'e Court.295- Olsen described the bao'k5and~forth between theNs-A as said- the. SA was recep'tiVe. to involvement? Olsen Statedthat the NSA Committed s?igni?Cant reSouirces "toutihe transition of foreign selectors. Both Bradbury and Olsen observed that the transition of content coneeti?os of foreign selectors to FISA requiredzsome- adjustment by NSA itS-Fapproaeh "to establishing. probable came?, Fer example; while an. analyst base a probable cause determination to semeaextent. en i-nmilitian2 Similar to a ?Cop on the beat-,7? it Was a'different proposition When that {probable Cause determination had to be revieWed. by several. attorneys trying to anticipate how-the Court the judgment Olsenstat'ed that it was also ?new? for the to document the pIObajbl'e causes-to the level OIPR believed'the Court wetlld require. to Bradbury, the effort. sought an equilibrium between ?the necessary speed andsagilib?? and the ?multiple layers oil-probable cause detErmin-ation.? Bf?glburyfalljd Olsen both toldthe OIGrthatf tlie?:NSA haduconcerns- about whether the FISA approach to content CollectiOH would work and the extent to W?ieh a measure or effectiveness would be 1051: under? FISA Court supervision. ID. Domestic Selectors Application and. Order-W In contrast to foreign selectors, Judge-Howard advised the Justice Department that requests for surveillance of the-international calls of domestic selectors telephone numbers or email addresses reasonably believed, to be used by individuals in the United States should be ?led with . 295 Olsen told the DIG that he believes the NBA die?tasked 'some of these foreign selectors. the Courtin a-s-se-parate? application. Judge Howard also advised orffiEiasls take a more traditionalapproaeh 3 meaningthe ?facilities? targeted by "the application. be "particular telephone numbers. and e?mail addressessand that the probable determination for taskinga selector would reside with the. ELSA. Court, not With NBA. of?cials pursuant to minimization pr?Oeedu?res'. On 2007, the Department-?led the??ret domestic selectors appliea?on. application sought two things. First, the application r'reues?tedlauthority to intercept the international communications of peci?fic domestic selectors??3 SeCond, the application b1. b3. sought-{forpurposes of future-applications, approval to use a. ?streamlined b71E version? of the emergency authorization procedures available under FISA. emergency the use of electronic. surveill'anCe for apperiod of up to '72 hours withO'ut a Court order when the Attorney General reasonably determined that-anemergeHCy situation exists. See 50 The. procedures required theAttorney General to inform the FISA Cour-t that?th? surveillance has beeninitiated and required the Department .tes'file the-Court emergency appliCartion to continue the surveillance not morethat 72 hours after the Surveillance Was authorized. Theg?oal of'the Department?s proposed streamlined emergency application procedures, referred to in the January 9., 2007, application as- a ?VerifiedApplication,? was to ensure that the emergency surveillance process be completed as sWif-tly as possible for. qualifying domestic selectors. proposal allowed the Verified Application to incorporate by reference the reasons er'facts contained in the original-domestic selectors application neceSSaryito satisfy- some of the statutory requirements under- FISA, instead in each :applicationrfor a new domestic selector that each- of the requirements 'of FISA were met. The only new substantive .infOnnatiOn contained-in a Verified Application would be the identity of the target, if known, the telephone number the target was using Or was about to so and 7_ bl eve the target is . we and is using or is about to 11% the identi?ed telephone number. Judge Howard granted the domestic selectors application on January 10, 2007, for a period of 90 days. His Order also approved the 2295 Unlike the December 13, 200 . did not seek: authority to target agents 0 nor did the application-seek authority to cenduct content-surveillanceof. b1: exp. In unications-. Thedeclaratidn summarized for each of the domestic selectors, b3, generally in to-three paragraphs, the facts that supported the government-?sbelief that b7E the telephone num be used by a known or unknown agent 0 '7 located in the United States. SI NF) streamlined emergency authorization procedures proposed in the applicationfor anyadditional domestic selectors Whose cominu-niCations the government intercept: duringthe' 90-day period-fer'which Surveillance. was NSD Deputy Assistant Attorney G?Eneral Olsen told the. DIG that in comparison With. foreign selectors the eparnne?ntxconducted armore rigorous review of-the-initial domestic selectors submitted Court ensure that probable cause-"was met. Olsen saida few domestic selector [their] face? lacked suf?Ci?ent documentation and that these deficieno'ies were apparent to OIPR attorneys revieWi'ng the information because the attorneys werelooking at the information for the first time. He said- that the responsible for the seleCtors, in contrast, were very familiar with the numbers and" 'lmowledgEable of details abOLit the ne?ers-ithat might net have been evident to persons revieWing documentation idexn'ovo. According to Olsen, for selector packages that were considered ,e?cient, the NSA either provided the Justice Department attorneys with additional- information or deatasked the selector.293: E. Last stellar Wind Presidential Authorization Expires on December 2006, the President signed what would become the final Presidential Authorization for the Stellar Wind program. The ?ecember 8 AuthOIiZatio-n was scheduled. to expire on February 11, 2007 .. However,_Judge Howard?sJ '10, 2007, Orders relating to-fOreign and domestic selectors completed the transition of Stellar Wind?s. 297 On January 22, 2007, the Department ?led, and Judgel-IoWard apprOved, the ?rst verified Application with the FISA Court using the streamlined precedur?e's approved in the Order. 293 Olsen and OIPR Deputy Counsel Margaret Skelly?Nolen told the OIG- that during the applicatioii for and implementation of the domestic seleCtors Order, it bedame apparent that there Were coordination problems betWeen the FBI and the NSA. They noted that in man}r instances a domestic. selector the NSA sought to task was already targeted by an FBI FISA order. According to Skelly-Nolan, in those cases problems can arise in providing accurate, current, and consistent information to the FISA Court. about such selectors. She said the practice has been to consult with the FBI assigned to. the NBA and to request from them the most current information the FBI has about a particular telephone number or user of that number. The FBI. at the NSA have access to FBI databases to Search for such information, although the most current information frequently can only be obtained from the operational personnel at FBI Headquarters. As a Consequence, according to Skelly-Nolen, the FISA Court has on some limited occasions. been provided incOns'istent information concerning demestic telephone nUmbers or the users off-those numbers. Olsen told the OIG that the domestic selectors Order has required a higher level of Coordination between the FBI and NBA and that the National Security Division has worked to address this issue. pregr?am officially '6Xpif?d.299 elommuni'cati?c?ns and meta- data :cell?ectiOn; Presidential Anithorizationgte ELSA Bradburygtold the?lG that-becauselt was believed that; Judge HQWardis Orders, partiCularly theaforei-gn. selectors I omen prettidedgthe; sufficients?exibility to conduct content collection it. . was not nesessarye'te renew the. December 78; 20.06;.Presidential? gauthorizatient; Therefore; 2007, Authorization for the Fe Selectors FISA Renewal Ayplication?s Judge Howard?s January 10, 2007?, Orde?fswere. set to expire after 90 days. During. the Week. of Mar-ch 20, 2007, the government filed .eeneWal .te next??d. the authorities both as to; denies-tic and foreign selectors. These, application-swere?led with .-J udge Roger ?Vinson, the Courtdutyijudg? thatweek: 7 - a. Theadome?Stic selectors: application, ?led ?22, Was in all? material respects identiealjte the genrernmente original applicatien, Judge Vinsonggranted. the applicationon April 2007;300 i? foreign selectors application was filed on March 20., 2007. The con-tent- and censt?ruetien of theM'arch 20 applicationwas? substantially identical to: the government?s original and advanced. the; same; broadi?cOn-stmetion 0f the term"?facilitie the use of- minimization preceduresito_;authorize NSA officials, instead of judges, to makeapr-ohable nausea."determinations: (subsequently reviewed by the FISA- Cour-t) about particularseleetors; - On Mai-eh 2007, Judge Vinson orally advised the Department-that he could not grant'the. foreign selectors application. His decision. validated some conCer-ns Within the Justice Department that Judgenovvarde original 299 On January 17, 2007, Attorney General Gonzales sent a letter to Senators Leahy and Specter, the Chairman and Ranking Member of the Senate Judiciary Committee, inferming them of Judge Howard's Orders. Gonzales?s letter stated that as a result of the anuary? 10-, 2.007, FISA COurt Orders, any electronic surveillance that was occurring under the TerroriStvsurveillance Program would now be conducted under FISA, and that ?the President determined not to reauthoriz'e theTerrorist Surveillance Program When- the current-. authorization expires." :300 .As noted previously, the dome I 7 a1 coodinatien sueshetween the FBI and theNSA, and a a The Order was renewed for??the. final time in: and has Slnce expue IOHgEtBITIIi?fstrategy for intercepting {the otsfegrfeignaselectors; :Vinsoanprecisionalga uacstl?tated Department?s Bfiort3i= it: Obtain statute! tolsauthoriiae "typeuof surveillance zcoattested-innderastellat asdaithat WastapprovedibyiJIidscHoward, - Oil-April; 351720071}: Judge Vinson: issued an; Order-and MemOrathiuttI Opinion for hiseconelu'Sion theV-eoul?d? migrant e.?f0reign selectors application. However, Judge Vinson did not deny government?s*applicatidri. Insteadgheencouraged? Department tome a extremist-1390f existing; January-'10; In encouraging the D'epartment of- file the motionwith Judge Howard, Judge, Vinson Write, have concludedthat'anzextension for this purposeis; 'appropriata in View of the followms circumstances: that the government has rco mendabw d?VOtv?Sd substantial-resources to bring the .conducted uhderthezPresident?s astertion: 'aijudse cf ?iis Court pro-Viousl'yf au?iorized {the 10, 2007, foreign selectors. Order] on': substantially the". saitne terms as the government-now props see; that - no simple: matterxf'Orthe 'governmentto "terminate ssurveill'anCe- phone; numbers- and eamailladdressesunder b1, b3, b7E FI-SA: authority, and to decide Whether-.md how: git?: Should: continue 3011162017 allof surveillance authority; and, importantly, that, within theallotted time: the :governrnentvmay be able to. submit application thatwould permit me to anther-ice at least part of'th'evsurveillancein a manner consistent with this order? and opinion Judge VinSo-n wrote that the Department?s foreign selectors re-neWal? application concerns an. ?extremely important. issue"? regarding who may make probable cause ?ndings that determine the. individuals and the communications that can be subjected to electronic surveillance under FISA. In Judge Vinson?s View, the question was whether probable cause determinations are- required to. be made by the FISA Court through procedures established by statute, or whether the. may make such, determinations under alternative mechaniSm'cast as ?minimization procedures.? Judge Vinson concluded, based on past Practice under FISH and the CongressiOnal? the statute, thatproba?ble cause determinations must be made by the FISA Court. epicplaiiningehis reasoning, Judge Vinson first rejected the Department?s broad. construction of: the-term ?facilities,? concluding that -?.electronic the; .g'IO'Vernment?s application ?w the if acquisitiOn"-of the content ef?communicationsw? was directed at particular telephone. numbers;sand. e?mail addresses .and- not- I need. snags Vinson distingur v- - - gcvefrnf Aent'c'tc?d fer its: broad interpretation 0f ?facilities,? asserting; I none of the cited cases stand fer the proposition 011 application: restsw that electronic ice?mail addresses Judge Wrote. that his conclusion was also supporte'dfby the armaments and the Court?s past praCtice, as well as the, legislative history 'Whi'Ch, according- to Judge Vinson, made clear that ?CongreSs- mandates pre~surveillance judicial warrant procedure,? and particularly the judge?s?probable? causepfind-ings, to provide an ?external che'ck?o elitecutigve brat-lob de?cis?ibns to conduct s-urv precesal the ebab?le cause purview the quesnon O?fWhether?the communiCatiOnS to be acquiredcwill relate to the targeted foreign pow-crawl Judge Vinson rejected the government?s ?minimization'probable cause standard,? stating that ?[m]inimization does not provide a substitute for, or a-imechani'srn for overriding, the other requirements of Judge Vinson Concluded that government?s propOsed .minimiZation procedures, by- authorizing the. NSA to make probable cause decisions, con?icted with specific provisions of FISA that govern. electronic surveillance, such the requirement that only the Attorney General can grant emergency approvals to conduct surVeillance (followed Within 72 hours by an application to the 301 Stated another Way, ?[thc application] represented that NSA will make the required. probable cause ?nding for each such facility before commencing surveillance.? Judge Vision wrote, ?[t]jhe application seeks, in effect, to delegate to the NSA the Court?s responsibility to make such findings rbased on the totality of circumstances.? Obviously, thisWould be inconsistent with the statutory requirement and the congressional intent that the Court, make such ?ndings prior to issuing the order (emphasis in original).? surveillance coirerage? must be based. on findingst?of probable cause by a judge. Judge VinSOntsum-mari?zed. his position?: The Clea-r purpo;Se of these Statutory provisions: isfto ensure that, as .ageneral rule, surveillancesare supported byjudici?al' determinations of probable cause before commence; that deciSiion-s "to initiate surveillance prior to in emergency circumstances are made at politically ~1aeecnntable levels; that judicial review of such; emergency authorizations. follows swiftly; and that decisions :toz-continue' surveillance 'receivethe same degree of scrutiny aspzdecisions:togini-tiate, The law does not permit me, under the rubric? of minimization, to approve- :or authorize. alternative procedures-to relieve- :goirernment of burdensome safeguards expresslyi?mposed ?by the statute. 7 Judge Vinsonwrote-that he was mindful ,of the government?s argument that the. preposed minimization procedures Were necessary-to; - provide orienhahclezthe ?speed and ?exibilini? With ?whieh?the-NSA reSponds tertithreats, and that fereig?n "intelligence reinformati'OH maybe lost in it-takes to obtain Attorney General. emergency authorizations. Hiowever,iin Judger'VinSOn?s View, requirements re?ected a balance; str?uClt by Congress between privacyin-terests and the need to obtain foreign intelligence intermatien, and until Congress took legislative action on FISA toresponditovthe government?s concerns, the Court must apply-the statute?s lHe-eonclude?d that the g0vernment?s application sought {to strike a different balance for the surveillance of. foreign teleph'e?ne: numbers and email addresses. Vinson rejected this ?provided that the surVei-llanee iswithin FISA at all, the. statute applies the same requirements to surveillance of facilities used overseasas it-does to surveillance of facilities used in the United. States.??303 302 Judge Vinson stated that he recognized that the government maintained the President may haVe constitutional or statutory authority to conduct the surveillance requested in the-renewal application. Judge Vinson stated, ?[nlothing in this order and opinion is intended to address the existence or scope of such authOIity, or this Court?s jurisdiction over such. matters.? 303 JudgeVinson wrote in a footnote. that the status of the proposed Surveillance: as being withinthe Scope of FISA was ?assumed, but nOt- decided, 'for purposies of "this-order and opinion.? He continued, believe that there are jurisdictional application of FISA to communiCations that are between or ameng parties who are all located outside the United-States.? Judge Vinson suggested that ?Congress should: also consider-clarifying or inbdifying the scope of .FISA and of this regard to such facilities . . . Bradbury told the OIG thatJudge VinSOn?s suggestion was animportant spur to Congress?s willingness to consider FISA m'Odernization legislation in (Cont?d.) "to dircct Surveillance d?l?iSi'on one and, th'at?th? ?canfiirmedour con?rm? about going to theiFIS? "Court]f.il? Said he: beli??lcd the decision was? ?troubling for purposcs?norfi'thc- national. enfour Judge Vinson-3? ruling-i. including"- appealing-thc-dcciSiOH to: the; FISA Gourtr of Reviw, said? the: to --Iatt?mpt 130- War-k with. I Judgemnsonsto craft know-application and "discs-Separately to; foneW-"the Administration-s efforts- to obtain legina?onatomodernize;141?th G. Revised Ranewal Application for Foreign and. Order 1' As; suggested by Judge VinSOn,_ 2.07: the J?s?ce Department Obtained ?iJUd?g'B {Howard anextension the.exi.$ting fereign- selectors order 'un?li?MaY 3:11,: 2007, to prepare. a revised ereig?? sclecitOfS'r application, interim, ?the 1D apartments?led, two-?rqportsawim Judge . Vinson- d-eScribiT-rlgv?t new aPPrOach :to ?foreign: galactors that addressed ?ihegoncerns ?meg-swim his" O'pimon? and that Sought~inpuwro.m the court abouthow 533,1; . .: would?seekauthor?y On May24, 2007,- the Department ?led? aiitev-irsjed'renewal application sacking?to..renew, Withmodil?catiions; the; Howardn January 10., 2007,. Ordcr. Hzowaver, mesapplicationdidmt and instead: {Sought aumarity to include: the. broad construe-?Lion of ?facilities 't'es telophonc? 3?3014' The application conduct ?l?eCtmnic?! .. able clause standard?:fapprovcd and ?*e?ma .. also did not inCh?Ide the ?prob the-summer of 2007. In Sectioan below, we summarize this legislation, the Promct America Act, and its successor, the FISA Amendments Act of 2008. 304 According to the May 24, 2007,. application, such. uses inc} and from a tareted ewma?il ?address accordmg to autho?zes, electronic Sumo-lance using [thereem to identify this type of facility,? - - - . by Judgex?l?low?ard that had the: effeCt of-sihiftingifmm the Chart to: the. probable cause: determinations sab'Qu-t? particulaf the targets of the governmenf?? revised application remained selectors .(telephone. number ands-email facilities) reasonably belieVed tobe. rused-aoutsideithe United States-rand .for'Wh-iCh thE-re si ble?iea to beliexiewer?beinused 131,133, WE. . ,eci?ficallyl the application requested authority to? direct; surveillance ateg?ories of liareign selectors; 0 Foreign telephone knew; to merit. This categoiy accountEd fora particle of the foreign selectors all-read under Survv?eilili?ance 305- The May ?24, 2 007, application explicitly-stated that the: government was not seeking surveillanceauthority for any new facilities reasonably?belieVed?gby the?NSA.tobe usedby' {Therapplication?stated that'snrireillancerof thosegfacilities ??buldgbe ir?'ti?ttitil ?51111? emergency taumorimtidri "71?0" '7 i REEF-193A b1, b3, b7E ed an appendix with the revised renewal application acilities and contained the factual basis for theNSA?s belief that eac 1 am. 1 ies was being used by a person outside the United States and for-Which .there was probable cause to believe were being?usedror about tobe usedby a member- or agent of'one of the targeted fereign poWers. The government had provided Judge Vinson these facilities on a rolling basis during? May 2007 fer his consideratioIl. The b1 b3 discontinUBd the surVeillance of facilities that were targeted under Judge?HowaId?s 33 Order, hilt that were not included among the facilities submitted to Judge Vinson for- 7 - 'val told. the DIS that the decision to. discontinue these facilities largely was a resource decision-and that was the arriourit the SA could timely process for filing with the 0911M. ?Foteignemail -:sele-ctors (not telephone number selectors); ptesently unknovvn to the'government but that ?refer to? ornare "about?" knoer foreign =e?jrna?il selectors. This .categoryof -surveillaneez, which the-NBA. had? been conducting under Judge; Howard?s ore-n inelues situations where already targeted email-facility is men-timed? in the-body ofa message betWeen: two thi'rdepa?rty, non~targeted According to. the application, serveiilance would, enablethe NSA to ,7 ?with. the speed and. agllity necessary to obtain vital intelligence to "detect and prevent terroristatta'cks.? The-application Theeoilection' authoritiesrequested-in the renewal application that Permitted Currently unknown facilities would, according to the application, address this .lirnitation.3~09 Judge'VinSOn granted the government?s revised renewal application May'S'll,? 2007, His Order authorized, for a period of 90 days, each of the Categories of electronic surveillance described above, although the 303 The category presented an issue under FISA in that communications- are being acquiredbecause they contain the targeted e?mail selector, and not becausc there v'vas probable cause to believe the e?maii accounts sending or receiving the communications are used or about to be used by an international terrorist group. In such cases, the surveillance is at? the targeted email selector. The government argued that such acquisition was still consistent with NSF). because, ?at the time of. acquisition, the NSA has probable. cause to believe that the facilities at Which the NSA is directing surveillance are? being used by the foreign power target."l . 309 The government argued that the FISA Court?s authority to authorize subsequent collection against new selectors unknown to the government at the time an application was approVed is?rooted- in section 1805(c](3) of. FISA. That provision imposes specific reporting reguirernentson the g0vernment-where the FISA Court approves an electronic surveillance in CircumStances where the nature and location of each of the facilities at which surveillance will: be directed is unknown at the time of the application. circumstances under which the SA couldacqui?re- CDm?hicationsfalling wighi? the. 51150 lin?ud?d reporting at??gb??sof :survema?ce, for which the government was require to select-crate the .T idlidg? initially approved ore-lien. seleetors underithe?ite?rms of his Ma Order (theseselectors; were submitted 2007, Shortlyafter theorder was issued, the FISA Court. dedidedthat the Weekly rcports ?led by the 131,133, .government?notifyiing- the Cdurt of?newly? discovered Selectors, as well as the b7E gov?ermnentis- motions see?kingapproval? to conduct surveillance on additional selectors, coul be filed for review with any member of the tbsp-government. received feedback from judges on the first reports and. modems that?were' ?led, itobs?ervedl that judges were applying a more 3- sUrveillan?c-Je for each selector than ..Judger Vinson applied th selectorshe approved; government consequently adjusted amoun of factual information it provided! e7 IS (3 ubsequent reperts and motions ,ulti?rnatejly'added foreign selectors to Judge rigorous standard of review to ?the factual basislsu 0 0 a ?Pi-?CC?Ording to Bradbury, the more rigorous c-rutinv Gourt. judges rafter Judge Vinson?s- initial appro'v caused the .NSA place: Only a fraction of the foreign . pplied- by JFISA foreign selectors. are under coverage 131,133, Wanted to.. This concern, combined with the comparatively laborious b7E process roe targeting foreign selectors under Judge Vinson-?3 Order, accelerated the government?s efforts- to obtain legislation that would. amend FISA to address the governinent?s surveillance capabilitieswithin the United Stateswdireeted at per-son's located outside the UnitedStatea The: Protect America Act, signed into law on August 2007, accomplished this objective email messages containing a targeted e~ma11 account only when the determined, based? on the acquired communication and other intelligence or publicly available information, that there was probable cause to believe the e?mail facility was beingused, or was about to- be used, by one of the targeted foreign powers. Judge Vinson agreed with the government?sposition?th?at there Was probable cause to believe that Internet communicationsrelating to a previously targeted e?niail facility were themselves being sent or receivedby one of the targeted foreign. powers and could be acquired. Judge Vinson 1, b3, b7E helding ?novel,? but concludedthat the decision-was ?consistent with theaove?rall statutory requirements; it requires the government to report and provide appropriatejusti?cation to the Court; and it supplies the Government with. a necessary- degree- of agility and flexibility in tracking the targeted foreign powers.? .- i i dqu The. . I [EC-ifermnent therefore did. renew the-'Orderwhen it expire-don August??r; 2007.. . - In the next section, We summarize the. effect of the Protect America .succeS'SOr legislation, the FISA Amendments Act of 2:008. ThecProtectAmerica Act and the FESAArnendments lit-cit- of 200:8 Iii-August 20,07, the Protect- America Act was enacted, amend-ingsFISA 'to-address' ability .to. conduct electronic :surVeillance in the Uan-ited'States of persons reasonably believed to be. heated-Outside. the United States. This on. February 2008, but Was extended by Congress to February 16, 2008. In July 32008, the FISA. Amendments Act: of 12-008 was enacted, which, among other things, created -a,;epmprehensire process under FISA for-content. collection directed at foreigniftargets, 'TheSe twol?aWs modernized the FISA statute as- it applied to theacquisfition._ in the United-States-vof communiCations of person-S reasonably .believecii} to be Outside the United States. (Ur) AslgdiscuSSed?inChapter Three, PISA was enacted in 1978 When-mast international .callswere'carried; by Satellite. The interception of such cal-17s cd?'stimted ?electronic-su-rveillancei? .fOr 19111790368 of FISA only if the acqui,sitien intentionally targeteda :Ugs. per-son in the United States, or if all participants to the comunication Were located-in the. United?States; Thus, government Surveillance .Of satellite communications that targeted foreign person's: eutSide. the: United States generally Was not considered electronic surveillance, and the government was not required to obtain 'a FISA Court- rord?er authorizing the surveillance even if one of the parties to the communication was in the United States, However, in the mid-?19808, fiber optic technology began to replace Satellites. as the means fOr transmittinginternatiOnal [and domestic) telephOne communications. This change brought within definition of ?electronic surveillance? the acquisition of telephone calls to or from a person in the United States if the acquisition occurred in the United States, thereby triggering the requirement that the government obtain FISA Court orders to conduct surVeill'ance that it previously conducted outside of PISA. Under the Stellar "Wind roram, the SEA-collected international 1, b3, b7E selectors)?? A's; n?ote?cli'in Chapters Three and ?F'Our, the-?Adniinistra-tiOn eon-tended} that..FISA,- aesupplernentedby a subSE-quent legis?latiye. enactment (the AUMFL did-not .ipreclude. the surveillance:aetivitieS- under. stellar-Wind, er in the: alternatiVe represented an unconstitutional infringement on the-President?sArtiCle authority as "Commanderin Chief toitther eXtentit con?icted With these collection activities; . Thedustice? iDEpartment?s effort to transfer; content collection from -preeidenti'al authority under stellar Wind to. PISA .raiSeid? the issue "of ?liFI'S'Ai?s. application-r to the: acquisition in. the UnitedSt'ates oficornniufnicatio?s to or fromqtargetedrforeign selectors. The ProteCt America: Act and the amendments. Act, in different Ways, addressed this issue'by treating the communications of persons reasonably believed to be located: outside the United States differently from communications of persons located in" the United- States-.312 1 The Protect AmeriCa Act (U) TheP-rotect? America Act of 2007', Pub.pL. No. was a temporary- measure Signedinto law on August .5, 2007.313- The?Protect America Act?s chief objective?) was to exclude item the requirements-ofFlSA the. interception the United States of communiCation?s' of. perSQl?lS located outside the UnitedSta?tes, the Category of communications?referred to above as ?fereign, selectors? (U) The, Protect America Act amended FISA so that thei?interception of fore-ignl-seleCtor communications fell outside thep'statuteb definition of ?electronic surveillance.? Under the original definition of?ielectronic surveillance,? FISA generally applied to any communication to or from a knoWn United States person inside the?United States if the communicatiOn is acquired by targeting the known United. States person.3-l4 ISA also 311 The NSA also targeted under Stellar Wind a much smaller number of facilities located inside the United States (domestic selectors). 3? The two laws did not substantially affect the provisions-of FISA relating to pen register and trap and trace surveillance or to the production of ?tangible things.? The government continues to collect bulk e?mail and telephone meta data under the and Section 215 Orders described in Sections 1 and II of this chapter. 331-3 The Protect America Act was set to expire 180 days after its enactment, or on Februaly 1, 2008. However, Congress passed and on January 31, 2008, the President. signed a bill to extend the Protect America Act for 15 days while further discussions on new legislation occi1rred. However, no agreement was reached 011 new legislation and the Act eXpir?ed on February '16, 2008. (U) 314 The original definition of ?electronic surveillance? included: (Con applied? to :?isacquiiSi-?tion of other communications tsuchras .fC?l?I?H?-ica? he acquired by'taITgEting the if . the communication and; thervauiSition occurred" inside the- United States, (U) Protect; Acre-mended PISA by Stating-:- ?Nothing in the definition-of electronic surveillance .. . . encompass surveillanee direoted Eat a personreasonably believed to be. located the United States?" heeffect of: requirements of PISA anycornmuniCatiOn acqt?redfiby targetingcagforieignl selector, regardless of: Where the Communication WElSi?t-It?fcepte or whether. the communication traveled? wire. As aresult,? the Acteliinjin'atedgthe need 'for. Judge. Vinson-ls: May 2007: torreign: selectors Order, because the collectimiof communiCations targeted under that-Order no longer: constituted ?electronic surveillance? not longer requned PISA Court Order?s??lS: the-acquisitionby anelectronic, mechanical, 0r of the contents of any wire or'radio cornzmuniCatiOn'sentihy' or intended? to he recanted toy-a partid??ffkilOWniUHith Statesperson,Whetsin the United :States, if theCOn?t?en-ts are :acqilired'lb?y- intentionally. tar'geting?i?thataUnited Statesrperson, under circumstances 'inWhich a personhgas -a:-reasqnab1e 'eXpectat?ion ofp?r'ivaey'and?. a warrant would "be requiredior'flaw enforcement ?pui?bds?s; (-2) the acquisition by; an electronic; mechanical, brother- SurVeilla'rioe {deviee of the contents of any wire communication to or from a person ?in the United States, Without the consent of r'any?party thereto, itsuoh .acquiSition occur-??. in. the United. States, but include the. acquisition ofjthose communications ?of;computer' trespassers that" Would 'be'apermissible' under section Of Title 1-8; (3) the intentional vauisition by an electronic, mechanical, Or other surveillance device of the. contents of any-radio communication, under circumstances in which a person has a reaSOnable expectation of ?p'riVacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or (4) the installation or use of an electronic, mechanical, or other surveillance device in "the United States fer monitoring to acquireinformation, other than from a wire or radio communication, under circumstances in whicha person 'hasa reasonable expectation of priTVacy and 3. Warrant Wauld be required for law enforcement purposes. .59 use. a 1801(1). LU) In the place of individualized PISA Court-Orders, the Protect Americ a. Act also"in'serte'd'several previsionsainto the FISA statute ref-govern acquiSition- retoommunieations from perSOns ?reeseneb?ly believed to. be Outside the United- -States.?? These-previsions authorized the heresy General and the Director of National Intelligence to-acsqnire foreign intelligenCe?Zinforrnation concerningsuCh persons to: up? to one Year,? previ'dedithese officials certified that procedur?sfin. p15ace.r.cfor the-government to determine- thata target? reasonably believed to: beoutside th'el Uni'tedVStates and that the acquisitien :oifz-the foreign intelligence therefore is mended. definition of the ten-11,316. The accompanying- the: certi?cation had. to be: submitted to the FISA courti?orappriovat, based 0n the clearly erroneous standard, Within 120 days .?o?fthe Protect America: Act?s enactment. However, the certi?catiOn was. nOt. required to identify'spec?i??c facilities or places at Which?the acquisition-of foreignlintelligence' (U) I 7 . In addition, the Protect Americanct authorized the Attorney General and the. Director of National carriers] to provide the government with ?all: and assistance necessary to acc?ompliSh the acquisition in such a manner as Wiil protect the Secrecy of ?the acquisition. .. Protect America senses. The Preteet=-Americaaet also. authorized the Attorney General of National The Protect America Act addressed this issue byexcluding-all ditch:th at persons reasonably beheved- to Outside the United States. 315' The Attorney General and the Director of National Intelligence alsoahad to thatthe acquiSitiOn involves the assistanCeofaa communieatfons service_provid.er; thata ?Signi?cantipurpme? of the acquisition to obtain foreignintelligence inform'ation-is-ifor foreign intelligence. purposes; and the minimization procedures tombs used with the" acquisition activity compart with 50. Pretect AmeriCa-Act, Sec; codi?ed. in FISA at?SO (U) 317 The Protect America Act left unchanged the prOcedures 'for' acquiring foreign intelligence information by targeting foreign powers or agents of foreign power inside the United States, as well as the procedures under Executive Order 12333 SEC. 2.5 to obtain Attorney General approval before acquiring foreign intelligence information against a US. persion outside the United States. Thus, FISA orders issued prior to the enactment of the Protect America Act, and FISA orders, including applications for renewals, sought after enactment of the Protect America Act but not pursuant to the Act?s amendments (acquisition of fOIeign intelligence infonnatien "from- targets outsidethe United States) were still subject to FISA as it existed prior to the Protect America Act. The BrotectAmeri'ca Act also previded, by means of an tiopt?out? clause, that the government did not have to use the new procedures for new applications and-could instead ?le applications under the provisions of FISA as it existed before the Protect America Act. See" Protect America Act, Sec. Intelligence. to? seek the assiStance- of the? Courtcto compel compliance With stash]. directives, and implemented proceduresfor teliecorrir?il?icationsv carriers: to challenge the legality directives-?3? m) the Attorney General 3 up to one year-targeting poisons .reasonany- believed to- seaside ?sf. Thesejjordersremained-1h; effectbeyona; expiration-arms Proteot-AmeriCa Adt on. February ?16, 2008.. On August I0, 2007., the Attol-ney General and intelligence ?led? a certification the Court, 11mg: the; Protect AmeriCa :Acftp relating? to surVeillanCez-of persons- ire'aS'Qnably'bel'ievsdrianaemia b1? b3, b7E as directive . s' for" aesiStanc-e to specif ?on.s"carr1.ersg.a reign selectors-under Judge Vin-son?s - Order were ?rolled over" tos'the'hew Protect America authority. Deputy .Aesi-Stan-tmtorney. General in the National securiw Stellar?wind to .FISA Court authority told-us that: the: _1gever"riment also began to. ?build new selectors? under the; Protect America Rota-no Worked. toward restoring the: un'iVerse Dijforeign selectors. that were first ant-horned for taSl?in?gfunder Judge Hewardts. 20.07" Order contentcollection under Stellar to FISA Court ?authority.- I7 i. 3 b1, b3, b7E Although the Department viewed the .Protect America Act as an a_dequate?tempora1y fix to thoseprovisions of seen are outdated because ofchanges in telecommunications technolOgy, Department officials continued to press Congress for more permanent'modern-ization legislation. (U) 313 The Protect America Act also stated that any person providing assistance to the government. pursuant to a governmental directive would not be subject to any cause-of action for providing such? assistance. HOWever, the Protect America. Act did not grant retr?oaCtive' legal immunity to any ?person,? a term defined: in FISA to include ?any group, entity, assodation, corporation, or foreignpower,? 50 U.S.C. 1801(m). On August 22, 2008,, the Court of Review upheld as constitutional the Protect America Act provision arithor'iZing;the Director of National Intelligence and the Attorney General to direct a persOn to (assist the gDVernment in'implernenting the Act. ?S?eeln Re: DireCtiv'es? [redacted text] PuISuant to. Section 105B of'the Foreign Intelligence Surveillance Act, No. 08-01; (U) 134- The MESA- Amensments Act of aces (U) . .011 July 11,2008, the-President signedthe Foreign Intelligence. ?S'urveiilance Act of 1.97 8 Amendments of 200.8 Amendments Act). This composed :of four titles, replaced the ProtectA'meri'ca Act Similar surveillance authOrity; The provisions FISH Amendments Aet-eXpire', With limited enceptions,uon December .31, 2?0 .1 A'chief Objective. of the Amendments Act Was to change the rules for intercepting "the electronic communications of persons rjeaSonably belieyed to be outside the United States When the acquisition ofccurs in. the United States. As discussed abOVe, the Protect America Act accomplished de?nition of surveillance? to exclude this activity from FISA requirements. The Arnendments Act took a different approach. Instea of eXclu'ding the activity from thestatute?s definition of ?electronic. surveillance,? the FISA AmendmentsAct created a new title in govern how the government may conduct this =electr20nic' Under this approach, the FISA, Amendments Act, unlike the Protect America Act, distinguiShes between the and personsreasonably believed to be outs?idethe. United 'States,319 (U) For persons, the new title created by the FISA Amendments. Actprov-ides for surveillance authority similar to the ProteCt .AmeriCa Act. In'Stead of requiring the government to obtain individualized Orders. item the Court to intercept communications persons reasonably believed .to be outside "the United States, the FISAAnn-endrnents Act. anthorized the government. to conduct any such interceptions for a. period of Up to one year provided that it adopts, and the .FISA Court approves, general targetingprocedures designed to chaurethat the new authority is not used 319 The Senate Select Committee on Intelligence (SSCI) prepared a section?by-scction analysis of the FISA Amendments Act of 2008 explaining the significance of the FISA Amendment Act?s approach. According to the SSCI report, the goal of the Protect America Act in redefining the term ?electronic surveillance? was to exclude the surveillance of persons outside the United States from the individualized order requirements of However, 'a consequence of the term?s redefinition was to broadly exempts foreign surveillance activities both of non?US and US. persons outside the-United States, The FISA Amendments Act of 2008, instead of adopting the Protect America Act?s modi?eddefinition of ?electronic surveillance,? explicitly stated that the targeting of non-US. persons outside the United States shall be conductedunder the new prosedures, which docs not require an application for a FISA order. In this way, the FISA Amendments AC1: accomplished the same goalas the Protect America Act Without exe?mpting?the targeting Of US. persons outside the United Statesfrom individualized order requirements. (U) 'toldirect Surveillance-atpersonswithin the United States or at p'erSOns outside the: Unitedfstategoeo In contrast, to .condnet Uastabased surveillance" of P-CFQOHS: reasonablybelieved- to be locatedoutside: ?le United-States, the: FISA Amendments Act requiremhe government to. obtain individualized-F1313; courtrorders for 90?day. period-s based on. aeshoWin of .probable'r sause-=to "holistic that the US. personis outside/the United a foreign- asentofticer, ?or employee surveillance pencils-1y wasgoverniedhy Executivesorder 12333;, and. required'only a- certification from HOt'the (U) Compared to-S?tellar Wind, the FISA Amendments Act provides the [government brOader authority to acquire in the-United States with Court the communications reasonably believed: to he-ElQC'a-tedioutside the United States.- Under'Stelglar Wind, the. NSA. was anthoriz?ed to collect communications Where-there was probablexoause to believe originated or terminated ontside- the United States and party?zto the communications. was; alQae'd-a a- group aff?iated Qa'edag. Under the FISA AmendmentsAet, the NSA is authorized i=9 colle'ct?i'n the United States any communications iof'vnoneU persons. reasonablybelieve-d, to be located! outside the: United States-,- provide 3 :aeqtiisnion pertaihsn:ts~foreignintellige eel; 3'20 Like the Protect America. Act, in addition to these targeting procedures the certi?cationthe government is requiredto file with the must also contain minimization procedures and. state that a signi?cant pierose of the acquisition that Will be conducted is to obtain foreign intelligence information. Howwer, unlike the Protect America Act the PISA Amendments Act does not limit the Court?s review of the targeting procedures to a ?clearly erroneous? standard. On August 5, 2008, the government submitted to the FISA Court a certification pursuant to the FISA Amendments Act. On September 5, 2008, the Court approved the certification and the Use of the targeting and minimization procedures the government submitted. 321 On.the..other hand, the FISA Amendments Act does not similarly broaden the g0Vernment?s antherity to conduct surveillance of US. persons reasonably belieVed to be [coated'outside the United States. "The Presidential Authorizations did not diStii?lguish betWeen and non-US, persons, and the NSA was authorized under Stellar Wind to intercept the .communications of US. persons (domestic selectors) provided the- Communicationsoriginated or tennin'ated-outside the United States. I - 'urider-toc?yk?measures to identify and correct incidents under Stellar Wind, and the government described the issue v~ i '1 =?1G1ltnalysis (U). As d'iis'ous-Sed in this chapter, the government?s effort to transition stellar-Wind fromupresidential atith?Orit-y to Fisa, which began-in 2.00.4, eventually resulted in- all-?three baskets of colleetiOn being-authorized by While the-legal. theories supporting this transitionwere aggressive, Webelieve; that theDepaIt-Inent could hays and should have-pursued transition as viable legal alternative; earlier?ian it did, rather than. operate aspects-0f Stellar Wind program solely under presidential amnesty tor several years. if" i - Chapte?rs'Threeand Four we dietzusseddohn Yoo?s 200.1 and 2-002: memorand'a concerning the legality of Stellar Wind and his contention that represented an unconstitutional infringement on the President?s authority under Article II. of the Constitution to. conduct electronic Surveillance during Wartime. We recognize that Yen?s] analysis Was to some extent a. response to the extraordinary circumstanCes that Confronted the federal .gOvernnient 1? 1 'terroristattacks and its. effort to take emergency steps to. what many officials believed wasan imminent ascend wave of attacks. Yet, even if one agrees: Yoo?s- Article II analysis supports the decision to enhance outSiC-le? the judicial or legislative process: the signals.3in.telhgence collection capabilities, we believe there are Strong countervailing considerationsthat favored attempting to transition the program to FI-SA, especially as Stellar Wind became less a temporary response to the September. 11 attacks and more a permanent surveillance tool. Chief among these considerations was the Stellar Wind program?s. substantial effeCt. on privacy interests -of?U.S. persons. Under Stellar Wind, theggovernment engaged in unprecedented collection of information censorning US. persons". The PreS?ident authorized the NSA to intercept, Without judicial approval or oversight, the content of international communications involving many US. persons and the NSA. collected large amounts of non?content data about persons? domestic and international telephone calls and to a lesser extent e?mail communications for possible analysis consistent with the extant Presidential Authorization. We believe the FISA Court, as an Article court and the judicial authority charged by statute to oversee U.S.?based electronic surveillance and other collection activities affecting U.S. persons for foreign intelligence purposes, Was the appropriate entity to monitor and approve such broad acquisitions Of condUcted undersite?liar?Wind-322 as several Justice Department amid NSA Of?cials Commehtedi the: FISH statute offered a ??rmer footing?" for the collectiohaetii?ties- As: discussed "in Chapter Four, the veggie ssive? assertion of. Arti?cie authority on which Stella: Wine Was basejd r?e??eeted'the legal reasoning-hfaVSingleuJUSitiee Department attorney sane, Without?adeguete reviewer scmtinyiof analySi?s!- :As' also "Co?cluded, thisl'ed to. a ?awed; legal analysis on which the program. years. This approach also :ledLyto aces-tentious. dispute betWeen? Department and White-House of?bi?als ?2004-inv01vihgarenewal of aspects of-the' program? By contrast, the FISA statute prevailed alternatives basis fer Stellar Wind?like Collection-tactivi?es that we-?bcliever should-have beenijeonsidered, andjpursued, much earlier by the Administration. In this regards, the White House?s (strict central. ever Justice Departments assess to. the p?r?Q?grar-n, lessened the opportunity for lawyers. With;relevanteXpertise? to adviSe the of '7 Working Within? the FISA statute. to achieve the? same - sperational obj estives' as; theirSteillar Win program. Moreover, as the-limited nUmibe-ref D?pai?trnent-readeins persisted, meaningfu1 consideratieh of as to presidential authority for the pregram was" limited??- .?322 For instance, under Stellar Wind the meta-data querying Standards-did Iibt inelude restrictions on acqujr'm'gda'ta that may haVe been haSed of- rFir-jstjAjm?endment rights. When these activities were placed under the FISA Court?s suPentiSioni the ?Ce?r?tvrequired that this adhere't'o the standard that ante-mail address or telephone number cannot be basedsolely'on activities protected by the First Amendment. 1 I i Operatiahal bene?ts *0 tra?Si?tioning-?Ste?ar b1, b3, 157E . "Thetranisi?tion of Stellar Wind'to FISA authority, together with the passageof the-?Protect America Act, allowed theNSA-to begin the pr?oceSs to dissaor ?dc?compartment,? the Stellar Wind'prog'ram. Thischange, which Was not completed? untilrnid-QOOB, has allowed agents field?offices gee-tel? access- to information about the telephone numbers and e?mail add esses being provided as leads. As described - b1, I of agents who were assigned and b3, eadstwasthe lack of 'etailprOVided about nature or the. b7E - . "contacts and the foreign entity allegedly involved terrorism that Was one of the communicants. These details often were not: provided because of the and compartmented nature :of the Stellar-Wind program. Now that such information is gathered under PISA authority and notlcompartmented as it was under Samar-Wind, it is at .arl'evel, that allows agents in FBI gain access to? .addi-tienalydetails upon r?equest.324 We recognize. that Stellar Wind?s transition to FISA'resul-ted in the =o?f-new reSponsibilities and conditions on the? exercise of?theses' unprecedented collection authorities. In. Section 2115 Orders, thezFl?SA Gourt imposed significant oversight measures that were not required under Stellar Wind. To be sure, the government, particularly the NSA, must devote substantial reSOuroes to ensure compliance with these oversight measures. Yet,.we believe that such requirements are appropriate, given the massivearnounts of data collected and the potential. impact on the privacy interests of US. persons. We also recognize that the transition of content collection from presidential authority to statutory authority under FISA resulted in signi?cant diminution in authorized surveillance activity of the content of communications. We described in this chapter. how first under Judge Howard?s Order, and then more significantly under Judge Vinson-?8 revised 324 Chapter Six of this report discusses FBI agents improved access to program?derived information under FISA after the Stellar Wind program was closed. plaCedliinereasingly fewer ?fete-i-gn selectors deem-SA:- Covera compared'to Stellar Wind. ThezN's?A wasstasking I. under Stellar olefin: . ationl-inDecember 27006:, but place foreign selectors under:- reuneiillancecoverage under Ju'dgeuVinsons May 207 order; National EijviSie-n of?cials told no that awfully added . ??l?pm?i?m?l under the Cou?t?S-?Order. . bl, b3, b7E' However, We believe that'suehfbro'ad: andvveolleetion: activitiesemanated in :the?UnitediStateSi, . parti'oularly? for neignificantspersiod oftimc, should be conducted- pursuantto- statute - judicial oversight, even though this -1-esnlted in a. diminution of foreign,selectors?duste- resource .?issues. We also believe that placingthe activitiesn:under supervision provides important measure of . accountability ler the that is less, assured whenthe oneness-are both and supervised by?tlie' ll'n'. therel?weife A-compellingl 116330113 Lto beginningthepmeess-of transitio - - ?the lleetionactivitiesfof?S-tellar FISA authority- earlier-ill I 004*. ?pmgre-amfsah1-arge- Callection of information about pet-30113;; ?Warrantedkjudieial instability of the-legal reasomng on Which, the program rested for seVeral?yesrs; substantial res?ictionS-plaeed on FBI agents?iaceess to and use, to. Stellar-Wind?s highly Classi?ed status. Vie-acknowledge? that {transitioning Stellar-Wind?s collection activities tic?) been an enormously complex time~consuzmingieffort:that. rested. upon novel'i?nterpretationsl uses. of FISA that'no?t judges-would: authorize. Neve-?igtheless, the events described in this chapter demonstrate. that a full transition to authority?Was achievable and, and iniour?jutl'gmenlt, should have been pursuedearlier. communications in the United States of persons located outside the-United-St'a-teS, especially persons. In this way,? transitioning Stellar'Windb contenticollection to FISH helped the government make its cage to Congressin concrete, non?:hypothetiCal terms for r'noclErnization legislation amending'the' statute. section I ef hischapter Summarizes. how the. FBI used bl,b3,b7E The-preceding,chapters examined the: evolution of the Stellar Wind pregram and its transition from?Pre'sidential authorization to FISA In this-chapter, We examine. 5 Stellar ?Wind impact theprogram had on. FBI counterterrOrisrn- areas; . thecodename for-thepmject, :Classi?e'd brag-that zme??FBI-?iln? ated in {September 2002 to disseminate Stellar Wind informatiOn to FBI field ?offices in a'manner that did not disc-lose the: scurce 131,133, ofitheazinformetien or the means 'y which it 'Waslacquired. The FBI b7E originally Opened s-anaadrniniStrative file to serve as. the: rep" ?sitory' fer :a-ll eemninmeations FBI Headquarters disseminated in F131 field offices relatingto Stellar Wind as well as all communications FBI Headquarters-received from ?eld of?ces reporting the ?Ifeslults cfany investigation Conducted in res.ponse- to the ?tipped? intermanon originatingfrom Stellar Wind; 2006, the FBI. investigative under the narn dieseminate Stellar Wind infor-matiOn- to FBI field offices. 1 describes: the decision in midaQDO'S to make its h?eaquarterssbased 131,133, Communications Analysis Unit (CAU), instead ?eldef?ces, b7E uing?Nationa'l. Security Letters (NSL) to obtainisu?bscriber t' phone numbers (beeketQ of Stellar Wind) disseminated I i 39-7 section discusses the role the FBI played, beginning-Tin apprexirnately March 2004, in the process to ?scrub? international terrorism FISA applications for Stellar Wind information, Section IV of this chapter examines the impact of the information obtained from Stellar Wind on FBI counterterrorism efforts. It first provides statistics concerning the number of tippers the NSA derived from Stellar Wind information telephony, email, and content disseminated to FBI preceded by th b1, b3, 25 As discussed in Chapter Thre I and dissem'inate'Stellar b7E the FBI created in October "Wind?s?deriVed information. 327 The CAU is the successor to the Telephone Analysis Unit which the FBI created after, the September '11 terrorist attacks. to analyze telephone communications. The CAU assumed responsibilities in late 2002. field ism-6637 thrOugh field gef?ces generally?hv 1D . tippers-sand 'typieal?restilts investigations. The section "'z'egsv mo {statisticalSurveys softneta data tippers the lessees lithe ,valuelefi_8t?1?1ari :to RBIs-operations, and-describes- iobse'mations?? .abeut the program?s. contribu?on and. value previded wile-BI Qf??iels and employee: in olf review reddiitieni. the section teeamhles: .FBl?intema?onf?il terrorism investigations commomyastea as example 5- ?stellaritrindf?s contribution to countertermrism Statesezs Lastly, Section of this chaptercontains the GIGS-analysis. Impact on FBI operations; process group of FBI. employees, gm 1 as 10;? fullietime- to the. NBA the ?Steller Windi'pmgram?gg? i130, Was described its. as ?curtain? be-tWeen :S?teller?l?lindend? the 141131., in 10?s chief reisppn?Sib?itywas to disseminate:- Stellar Windj?derived information to, "field of?ces disclosingthat the Was sf the the; NBA acquiiredth'e information. - ?1 from Team 10 initially was staffed With-two{FEE-special agents" (bne?Df W.th served as superVis?e?r); and two analysm; subsecmentiy replaced one agent position with a; analyst-.7 later-addedba fourth analyst. At the NSA, Team 10: Was 'oonl?eceted :in? :a tangmpen. Space-with eczema- of NSA and. other Intelligence personnel assigned to the Stellar Wind. pro gram?. Each team member wasprov-ided a computer with direct access to NSA information ass?OCiated?With Stellar-Wind- tolci the OIG that Team 10 members werke?d at the NSA under the authority of the NSA Director and as such Were required to adhere to SA minimization rules and attend the same training employees. Tea-In 10 members also were provided access to Stellar Windwrelated systems and 323 As noted above, our report examines the role in the Stellar Wind program, does not review the use of the-program byethe'r ag?ncies,. such as the CIA, 329 The CAU is organized into ten teen-131 nineof whiCh are responsible for providing communications analysis suppert to speci?c field of?ces and (Legat). According to an. FBI organizational Chart, Tear-r110 Supperts ?OE-Site, Intelligence Community Special Projects.? Team 110 was exclusively responsible for managi b1,.b3, b7E bl, b3, b7E b1, b3, b7E b1, b3, b7E data-5136s, had. access 'ftQm' the-ii" comp . automated Case Slippert (ACES) ?SYStem-a'n process unde l'rmatieh was the FBI eStahlished under the ?escribed in _'jh-apter Three. In short, the NSA providedTop. Secret: joorhpartinented "Stella-r Wind. reports-to Teams 10?, Wh'? . converted the information into Secret nonwcompiartmented electronic e0? I EC) and?di$eeminatedg the comm .Ingerred,_to as tippers,? to FBI field of?ces for appropr-1ate aetion?a? The grocess was applied, with some differences, to, each three "?t?nasliets?J 'of information. The vast majority of Stellar Wind reports involved the NSA?sanalysis of telephony meta data thati?sl, ?hasieginformationsueh- as date, time, and duration, about contacts between foreign domestic telephone?. numbers .forwhich the NSA determinedthere was a reasonable articula'ble suspicion to believe were related to. Qaedaor an affiliated gC?ir1c11,Ided a paragraph that summariZed the ?rejeet?farid explained that the GAU Could not disclose the source. 0, enformation cont ?'ned' in the EC, but that the information cattleefromra. ?Sensitive and highly reliable? Source. Each EC also-ineludeda' 131,133, :etidvisingthe?eld of?ces that the infermation provided by the NE 7 ource. could he used for??1e?ad purpoSes only? and .oould'not-bie era into any d?davit, court proceeding, FISA application or unclassified? In addition each ?lead? "that instruCte'd the ?eldaoffiee what invest steam-?ding ?ie informationprovided; further desCribe Ends- of?ces? handling of them in 55051011 of Before disseminated Stellar Wind-ideriwd information to ?eld of?ces, an analyst. queried FBI databases for relevant information abouttheJ eemail'address, or individual (in ?iercaseof mutant repert) "identi?ed in the Stellar Wind report; These queries often identified, example, subscriber information the FBI previously obtained? for ?Stollar Wind. telephone numbers as part of a prior FBI 'inVe?stigation, :or active Cc'u'riterterrori'Sm inve stigati'ons in which the subscriber to a Stellar .Windatargetecl number was the'subject or whiCh the number, and :snmetinies?qe-subscriber, Were referenCed. Team 10 also checked and commercial databases, most. commonly in conneCtio 1* "-Th as Checks sometimes identified and domain names the User. b1, b3, b7E *informaaon?ream lOloeat I a cellar .telephOne-number-Or eama'ii address was included in the Comment? to _-d_1f I provided by the Stellar. Wind source.?2 as a Comment? 0r arr-?Analyst rate the FBI. information from the inferrn-ation Overtime, Team 10 began to do more than: receive and disseminate; programederived inferrnation. For example, Team 10 occasionally submitted telephone ,rijurnbers. to the NSA for" possible querying against the database containing the bulk telephony meta. data collected under Stellar Wind.333 3-32 In this respect, Team 10 handled Stellar Wind content reports.differently-from meta data. reports. Team. 10 typically did not perform additional analytical work b1, b3, on the information provided in Stellar Wind content reports other than to identify any FBI b7E cases towhich the information was relevant. For example, a content report might summarize intercepted communications indicating that an acquaintance of the subject of an FBI investigation is traveling to Or from the United States. The connection between this Wind information and the relevant FBI investigation would be reported in 333 As described in previous chapters, the purpose of the bulk collection elf-meta. data under Stellar:Wind was. to allow the NSA to use analytical tools such as contact chaining to identify known and, unknown individuals associated with a1 Qae?daor-anal Qaeda-affihate. The technique involves querying the telephony or email database with a-nur'nber or address for which an analyst had a ?reasonable articulahle sus'p'icion?lto beli'eVe Was used by persons involved in al Qaeda Oran al Qaeda affiliate, and then examining any cont-acts with that number or address..~ Theit?ephone numbers Tea-m 120-previ"eatypiea11y were-obtained from the. de?mes?e and ensue-1.1 'as?a I . Li?umberide?tificd during a monitored-under FISH a. number addre?Ss beck of a -suhjeiit-arrestedabroadr The: Nsa - - ?e'enduetedz-independent analysiete . (or 'eema? addresses) provided by: tom-er ther-queryingetandard'y . by. the -Pre8identiel Authorizations gamma.? Stellar Wine to believe. that communicatiens telephone, number relate to a1 Qaed'a or Team 1-0 contributed to the Winderepo'rt?s. Telephone numbers and "E-I??aill addresses identi?ed through contained; the bulk teletahony and email-meta. data were reviewed by .N-SA to determine "whether ?re-contacts sliauld'bewreportedto the FBI-inn Stellar W'indrepert. ?10? this: process byreviewing draft reports and. providing any reiteration from FBI databases-that might be relevant to this - - weretold that-one. of the'benefits 95f? l'Ov?S?preSenCe. at the. its invalvement in the Stellar. Wind report. drafting; process Was: restatement. in? the: quality of the? infonnatien disseminated to F1 field. offices; the FBI Supervisory Special Ager?i Who- 'suspervi'SediTeam 10- from April ?2'0'0'52?tddu1y520i6teldthe OLIG that he tried b1, b3, ?59 the reporting of telephone numbers that. were-several. hops b7E removed from thepte?letahone "number linked-to Qaeda or an af?liated, terrorist group. He. saidthat he wanted Team 103tof ?di?sseminate;?ssolid numbers value,? not numbers with. iquestionable: valuesueh-as?high ublic telephones,- for'eicamplie) an The FBI SSA- Said thatthe NSAeXpre?sse?d the-Concern 334 Team 10 submitted such telephone numbers to the NBA electmnic'a?ly thr0ugh ?Requests for Information,? or RFIs, which is the formal process by which the FBI and other agencies provide leads and request information from the Stella-r FBI indicate that from April 2002 to January 2006 the FBI directed to for possible analysis under Stellar Wind. The recordsdo not indieate ?thedisposition of each RFI. 335 The SA deVelopedformal ?checklists? to guide the Stellar Wind report drafting process for telephony Thetcheckli'sts include over 30 steps that NSA were required to complete, and a supervisor had to approve, before a report could be distributed to the FBI or any other Stellar Wind customers (the CIA and National- A signi?cant feature. of the checklist from the perspectiVe was the requirement that NSA. check any telephone numbers and emailL addresses inja draftrep'ort with the FBI and ?make best effort to include FBI . . . data that itcourld not faresee whether any particular-Contact;although. remote, peeve nut-the next; terrorist attack, and sides: .t'o'i *findgiteelf- 11:1: i-the position tat-defending its decision not to pass that number tattle However, she- said t' fimprove-the-quslity of! information such as for the domestic. ceritacts that were eludmg'ana?lyneali Judgm "ms about the: e_ontaets:336 AS: discussed? in: Chapter Five,- the acternmentitansitioned Stellar Winds. bulk email meta. data - Collection;(basket 3) to FISA July the-Pen, REgis?ter/Trap Trace Order, hulkgtelep?hony ineta 22) inMay 2006 with the: -'Sect~ion 21 Business - Records order, and content-collection {basket in January'2'007 Whenthe granted the government?s domestic-andsforeignse'leCtors applications. However, after transitionwas to produce reports-within? the stellar Wind to pres-gem Customers, ever-1. though the information- e'cpntairnedtainnthe; reports was; derived fromithe FISH?authorized. collectio?act?ivities. the-FBI continuedito disseminate the mformatibri process, The-current Team 10 supervisor told us that this on, after?eonsu-Itation with the. Office of the Grineral/Counsel (OGG) made to adhere to the. FISA Court?s centi-nuingrequirement that international terrorism applications he s?Crub-bed for Stellarth infermation (the procedure for which is described in.aSection.I5II.-of this The; NSA received permission to begin thelprOCCSS to close, or ?Fdewcornpartmentf? the Stellar Wind program after Act. as passed in- August 2007. In midi?2008, the NBA Of?cially clo-Sed the pregram and discontinued issuing- ?Stellar Win? 2008, F131 initiated a new investigative file, dieseminate the NSAt?s-FISA?derived infOrmat-ion.337 b1, b3, b7E 1? was b1, b3, b7E The Team 1-0 supervisor 335 The NSA told us that one of the difficulties it faced with the Stellar Wind program was that the NSA was serving two customers -.- the FBI and the CIA but had just on set of reporting guidelines. This was so because the NSA traditibnall doesvnot. rovi'memorandum explaining the pro b1,b3, dumstat?d thatas of Au b7E national Security inVestigations-related if individualsb'elieved to be associated. w. toldusftha thee-*IFBI? Whattioepmted. nude. I difference?is that. the; FISAe'd?erived report ens-ate ?at the b1 b3 b7E level, nut subj?eCt; Wind "si?nati'om :si 1 operational ?standnointe elacat-?naonlyinduc: information ause the FRY-s,primary-seornputer for: ?eannot?b? used {for Toast-30m? - field of, we now request-?actessito diditi?onalihf?tmetid?513W .. . ., ., agent?s hate the appropriate?clearanee' .AS?diS'cus ed fin-Chapter Three. and addressed below, the chiefer-?itieiSm-l I detailed inform-mien that could bei?proVidedato ?eld about tippers because- thefhigltl'y compartmented Hammad/Stellar Fromaugtmt. 2003 tor'No-x'reember: ?partvof?th process-the CommunicationsgAnalysis espensi from-the. afield-offioes for reuestin? ?Natie?al ebtain- 131,133, subscriber information for emphatic-numberi?pperse?g T113 - b7E were: gut-horned by the Fate; faridi?TISSued pursua?tto the projecr. As discussed below? hammer, 'applicable'FBI investigative because as opened :asz-a noneiavestigative ?le and therefore iunder not haire- been used as the basis for issuing The FBI uses NSLs to obtain information thirdi?p'arties suchas telephone companies, financial'ilnstitutions, Internet service providers, consumer credit agencies. authorized by'?'fiVe speei'ficlprovis?ions contained in four federal statutes, direct third parties to provi?dercustomer account information and transactional records" Such as telephone toll billing i b1, b3, 3-33 Field of?ces remained-resan for in'COnnection e?rnajl b7E addreSS-' tippers, which Wasulikel'y ?f'tt-cibutableito the comparatively low enmail tippers and the ability of field offitesto?handle ?iemexpeditiOHSIy; record?S?SQ issueid'two revisits, in 2.007 and 2008 examining the:- (U) Justice. Department investigative-guidelines isSued by Attorney: General, govern the: whiCh the FBI may. use NSLS. The. Attorney General ,zguidel?i?nes in effect. ?ring?th Stellar Wind-program relevant t9 and. authorized national security ?lirn'n'estig'aticn;341 Further, internal policy. ?investigative?les? and nominvestig?ative ?ijad'miriiStrative files? referred to as ?control files?); This is Hit a mere te?ehnic'ality. Investigative files, in. the national security context, are opened based on evidence that a person, group, or organiZation is involVed in international terrOrism. From Gctober $2003 to September 12008, the Attorney General Guidelines required the FBI to provide summary reports to the Justice Department at'the end of each'y'ear theElectronic:Communications Privacy 31:8 9.709?; '5 (2000). NSLsistued undo "'under?fthe FCI guidelines) requires only a showmg of are the, Right to Financial Privacy Act, 12, b1 b3 and. the National security Act,- 501 b7E elied- othhe 'ECPAIStatu-te, Which. prQVid'esithat the-FBI. may?cbtain subseriber information frein a cemmunications service?- prGVid'erfif the FBI certifies that?the? inferrnation. Sought is E1211: :CifeditReporting-Act, 15 use 1681 et seq.- tel?e?vant to an authorized investigation to protect against international terrorism Or clandestine intelligence. actiVities'iprovided that Such an inVesti'gation Of-a United States, persOn is- not conducted $01er on the basis of activitiespmtected by. anio?dndent to the ConstitthiOIl of the- United States. 85' Supp. Iv 2005). Thestatute also permits access to ?ton: billing: .reeomls? or; ?electronic communication transactional records,? 18 but,:requiresua warranticr access to the content of telephone communications. See ?18 25311 (Wiretap Act). and'3121 (Pen Register Act); see alSo 1-8 2702(1))(8), (U) 340 The 010?s ?rst report o?n NSLS, issued in March 2007, was entitled,AReyiew of the Use?of National Security Letters. The second in.Marel-1. 2008, was entitled, A Review of the Use .eantional Security Letters: Assessment of Cbrrecn'ue Actions and Examination Usage-i712006. (U) From March 8, 1999, through October 31, 2003, national security investigations Were governed by the Attorney Generalis Guidelines for FBI Foreign Intelligence Collection and Foreign Counterintelligenc?e Investigations (FCI Guidelines). The FCI Guidelines Were replaced, effective October 31, 2003, with the Attorney General?s Guidelines for FBI National Security Investigations and Foreign Intelligence Collection (NSI Guidelines), (U) Theevidentiary standard .forinitiating an investigation is the same un iid?elines. Too en a full investiation theFBI'isIe b1, b3, b7E (if-such invoIVem'ent. See NSI Guidelines, Section?II?. (OCtob?e'r- 31, 2003'); FCI Guidelines, 'Section 111.13. (March so, 1999). - ?aticnel investigation,ca?tinues. These- reiqUirsmems helped. ensure-mat there was suf?cient;dojcumentedi Pf?d.ifcati013l.f0r inves?gativeg activities FBI agents-sought to as requesting Central ?les, contrast, ?separate files -estab1i5h'e'd:for the. 07f administering speci?c pha's'es'iofa? ihEVeS-?iga?ve matter or The files don'O-t requirezany ?pl?ediCation andremain open b1, b3, indefi?itely without any reportihg krequii??m??ngts :for national security b7E 1316., th? S?ptemb?rQOQZ EC requcs?hgihata ?adediic?ia Con 0 . or ?fhis?pl?ojieotwill better-Ema the-apaci?bneedsof - spits project and will. additional. layer of: Security for the soiirCB.? The. ?le has remained open since September 200.2 ?withojut (As discussed below, in Investigative file; however, 3342 Thus, in 1?9 was FBI "to issue N?SLs-fro Stellar Wind The March 2007 .NSL report identified th 0113 of-tWQE circumstances Where the FBI was using (30 .de-?lQeied?i and affiliated groups or to open new preliminary. or full in?estigations. in compliance with JHSti'ce D?eparttnent mvesti?gati?ve gaidelines. '1 {part of our-reviewof the'FBFs participation in is the? ?136 under We?? I ildathe Purpose of having; the inStead? of the.fie1d??efficee Stain approval 51701" ?theviesuanc preliminary inquiry wasconjducted for the. US telephone numbers reported by this b7E ?eldfo?ffices sad-teased most tippers - by-C?Ond?cting ?threat: asses sments?? to dietermin whether the: dipper "had: a nexus "terrorismrand The b1_ b3 subscriber information;- for? a tippe?r?is so; purposes-?of eofnpleting b7E Thesameis true f0. tippers; ?andthecurrent? Tea-magicsupervisor told us that it Would no he Fi?g'ogod??bus?inesa? practice 0911th transactionelrreeords on. saniiS. sti?ed field cities initiating its oWn preliminary runs inveStigatiOn::of - - Webelieve the: FBI should have opened investigative: ?le. in July 2003? and used it to "issue NSLs related to Stellar Wind information. The Justice Department investigative guidelines in: effect at that time-authorized the FBI to-open full investigatiOn's 90f groups for-Which thereiwerespecific andar'ticul'able facts to believe were involved-in international terrorism, such as alQ'a'e'dar HoWeverithe'FBl decided to issue-Stellar Wind NSLS from ere-stingContro?l?file?, Which was centrary' to F1 internal-policy. -. i" 7 b1, b3, b7E W?s-did not ?ndievidence that-officials from CAU and'OGCin-volved decision to. existing to issue. related-tot Stellar Wind information deliberately tried to circumvent FBI) guidelines. The July EDGE-rationale: for issuing the NSLS out of the centre-1 relationship between the Stellar Wind. program and the ongoing 131,133, investigations of al Qaeda and af?liated groups; essentially was the b7E reasoningused in November 2006 he investigativei?le in November 2008 to Openth A?s Weifound in-Jo?uri March 2007 use-of 'the-CAUand OGC-officials involved in the decision; to issue NSLsifrorn the control. file Conclude - in g, . od that? the FBI had-l-Sufficien-t medication either to connect NSLS with existing?preliminary or full inVestigatiions of 'al. Qae?cia-anaeamliated groups. orto' open-new preliminary or full inVestigations in compliance with Justice Department investigative guidelines. Nevertheless, the decision violated FBI internal poliCydiscussed in Chapter Three, the Department implemented a process imposed by the MBA Conrt to ?scr?u PISA applications to account for Stellar Wind-derived information. The objectives of the initial scrubbing pr'oCess were to determine whether any information contained in international terrorism FISA applications was derived from Stellar'Wind and Whether any of the facilities (telephone numbers or e?mail addresses) targeted by international terrorism FISA applications were also targeted for collection refer-redto asadu'ail coverage), . The: scrubbing process was coordinated try-the: Justice; Department; N-SAJTbegir-rning in February after Judge: Lamb erth read? into. stellar-Wind, In May-2002}, Judge. KollarsKotel-ly? succeeded Jildge Lambs-rm Pres?i y: in?g. Judge of the Court and.=ccntinued rtheascnubbing; procedures. However, whereas Ju'd'ge" Lamberth-requiredohly that hsgbe of?app'IiCatiQns thattconta'ined?SItellar Win61. ?I?ollar??hote?y required that such informatiOn be remoVed. in Chapter Four, on March 14, 2004:, QIPR Counsel Batter briefed Judge Kollar-Kotellyjabout thevaresideI-lt?s decision to sign. use march 11,2004, Presidential Au?iorization-Without the, Justice Department?s certification as to form legalim about Subseq? -, ent Changes'the Authorization made "to "the Stellar Wind 1' - . According .a handeitt?n IEtter?Judg?e Kollars'Kotelly?drafted to ?Bjalgeriifd tthe Stem 'ra Deputy Attorney General-agreed: to certify the pm -_r_am asm formand?lgga?t? and memorandum "regarding-Ema legality of Stellar Wind?itoreplaCe November 2001 m?mbrandum-au?iored by?Y'oo, . 1 Judge Kollar?Kotelly?s letter marked the first time her .exPectatiOns conciernin?g the Department? use of Stellar ?Wind inferrnationin FISA applications was communicated in writing to OIPR. Judge Koll?ar4Kotelly wrote, Although the Court has every confidence in the oral representations of Jim Baker [and] does not have any reason to question his honesty or credibility with the FISC or this judge, I am requesting that representations, previously done orally, now be. put in writing that relate to [Stellar Wind] and FISA applications so that there are, no misunderstandings. I want to emphasize my positiOn which. has been consistent since I came on the FI-SC in May 2002, the [Stellar Wind] program and. ISA applications are to be kept separate, and no information direct or indirect, derived?orr?Obtainedjfrorn [Stellar Wind] should included applicatien?s. Only-in'thi's the integrity of theprocess and intelligence collected- Lhrieugh FI?SAapp?ca?bns be maintained. {rs-,1 ,?r-srre?; am on," Judge Koll?ar?Kotelly also wrote that she would. not sign applications that contained- substantive information from! Stellar? . 'Wi?dageneraed tips or any-applicationswhere: the iStellar Wind tip" Wee-the sol-e "principal factor: for" an agencyinitiating 171-16:- underlying:investigation, ?eyensif- the investigation Was conducted ind?ep?endently'iof the tip from [Stellar Windlf? - Baker told us that this 1ett.erWas..Judge .Kolalar-Kotelly?s preliminary response to the changes in the Stellar Wind program. ThrOugh subsequent jisen?ss?ieriis between Baker, and bet-Ween Baker endotherepartment FBI officials, a more ?eXigble-arrangement was. ureaehed on Sembb?in?g that addressed Judge Keillar?eKotellyisiconeerns Without imposmg an absolUte prohibition on including- certain Stellar Wine?derived,informationin appliCations;347 In short,- the. scrubbing precedures' implemented in Marcht2004, and that.ljeon?nue to the present day, substantially expandedthe procedures OIPRLor-?igin-ally developed in February=2002i?48 Inaddi?onro determining Whether SA intermation contained in international terrorism applieationsxwasderived from Stellar Wi-nd-and-Whether there was?any-dual b1 b3 Coveragey-Judge Kollar?Kotelly required the FBI todetermine whether b7?E facility (teleph'one?nunlber or email: address) that appeared in? a PISA application also appeared in a Stellar Wind report and, if soywhether the FBI had developed, independent of Stella ?Wind an investigative interest in the faCility befOreit was the subject of Ian 't?ipperr??is? This? 347 FBI OGC said that it was not until th'esediscussions that the FBI was aware of the scrubbing procedures OIPR had implemented in approximately FEbruary 2002 after Judge Lamberth was read into the Stellar Wind program. . 343 The scrubbing procedures described here. apply both to NSA information derived from the Stellar Wind program and to information derived from the FISA Court?s PR T?T?and Section 215 bulk meta data orders. Until mid-2008 when the Stellar Wind program of?cially was closed, leads the SA developed from the FISA-authorized bulk meta data collections were disseminated under the Stellar Wind compartment. 349 As discussed in Chapter Three, Baker did not believe in May 2002, when he ?rst discussed the subject with udge ?Kollaer'otelly, that such a scrub was possible. Baker told us that'bly Marsh 2004 he better understood the and precass for disVSern'inating'Stellar Wind information and the agencies? ability to track program?derived tips in a timely manner.wa Scrub-is eqordinatcd 1a I . 4. Ji requires its compile alistcram}??facilities??a telephone Humbert; see-mail addresses that appeared any --draft 'i'ntethatidnal . terrorism PISAapplicationsgm Greedygfor'?ling with then-Court and is: provided teen attomeyiin read. into-the Stellar Windisprograrny The? attorney in the facilities-"list tori?Tee?m 1,0 at'th?'NSA, Team ?10 Checkeeach facility against the NSA?s-Stellar? Wind report-s database to determine Whethera list?ec?i? faeilitsirt'is centained in any-StellarWindgreports and, if soy-Whether-the in the tearline portion'of a report that was further disseminated to FBI ?eld Of?ces. If both: *inquir'iesare ?pOSitive, 'T?eam 10: notes the date of the relevant Stellar? Wind report andssearches ?ieiFBITh AutomatedCase?Support System (A03) to they-facility appears in and, ,ifso, the date the FPS 10 reports the results of '?ieserchecks to ?the: attOrney for review. The attorney takes one of two? steps at this stage. If Team 10?s checksefrfesnegative=~ meaning none of the faoilities are-"contained in a report or contained? in informationfbelow- the tearline of a StellarfWind report the N-S-LB-ecrab attomey'netisfies- OIPRat?tomey and FBI case agent that the FISA application be cleared for presentation. to the Flea-Court and that the'applicatimi; can preceed to ?nal processing; If 3both cheeks-on a facility are positive, attorney to determine if there .iisa "basis information in the- application based On the theories, diSCuss-ed in further detail-below, that the. FBI had an inor would'haVe inevitaly discovered. the: facility in question. To determine this, the NSLB attorney research-es FBI databases, analyzes irecords, and attempts to craft an .axgumentunder one of?these theories. The attorney then provides. this information to OIPR for presentation the Court. If the SLR-attorney cannot find a basis for including the: information under either of the theories, and the facility is not essential to the showing of probable cause for the requested FISA coverage, the facility is excised from the FISA application, and processing- continues. If the information is important to the probable cause showing, attorney discusses with whether to make the argument to the appropriate FISA Court judge (initially wt and (new, the judge. assigned to case) that the facility neiferthe-lesscan remain in the application. - i. - .Accer?dihg to the Deputy General the argument to keep 'qu'ch. information in an applicatiOn is "based-on ?standard Fourth Amendment [cite-lusionary rule] analysis.? The ?excmsionaryrule? generally helds? that'where the government obtains evidence in- vielation of the Fourth. Amendment, the court-will Suppress, or eXGlude, the evidence'frorn the prescsutor?s caseeinmchief in a-criminal. triall- Under the: ?fruit of the poisonous? tree? doctrine, a corollary to the. exclusionary rule, any evidence obtained directly er. derivatively from the government?s impr?Oper? conduct is also excluded, However, there are several exceptions to the exclusionary rule, tire of which were relevant to scrubbing: independent sOu?rce and inevitable discovery. The independent source exception holds that the rule. does not. bar the use of evidence obtained in violation of thethurth Amendment if there is also an independent, "legal source for the e'vlidenCe?Sl The inevitable discovery exception applies when evidence obtained violation of the Fourth Amendment. would have been obtained independently had the illegal search not Occurred, which the government. must pt'oVe a preponderance of the evidence.352 Thus, in the scrubbing context, the issue is Whether the Stellar Wind informatidnconetained in a FISA application, should not. be excluded, either be?caus? the FBI had an investigative basis independent of Stellar Wind fer including; the information in the application or because the FBI inevitably Would',zhave ,discovered the infermation in the absence of Stellar Wind. More speci?cally, under'the independent inVestigative basis exception, if Team 10?s seamh shows that a facility came. to the attention before the facility appeared in a Stellar Wind report, this fact establishes that the FBI has an independent, non-Stellar Wind factual basis to include the facility in the application?S3 SLB Deputy General Counsel Thomas told 'us that in her experience the FBI already is aware of the facility meaning it appears in ACS or other FBI databases min nearly every instance that a facility contained in a application also appears in 'a Stellar Wind report. 351 See Segura U. United States, 468 US. 796, 805 (1984). (U) 353 See Nix E). Williams, 467 US. 431, 443 {1984). (U) 353 For example, in one case the NSLB attorney?s review of the underlying investigative ?le showed that the FBI had obtained the telephone number at issue in response to an SL Letter. Because the NSL was dated earlier than ?the'Stellar Wind report that?also Contained the telephone number, the had an independent investigative basis for inchiding the number in the FI-SA application. WSW inevitable exception in. the scrubbing context-applies 101?s check indicates the Was-notaware of- fertility before rheud?at'e of the Stellar Wind report Containing-the facility, Under this approach? attorney attempts to demonstrate that normal in-vestigatiVe steps in the underlying; investigation inevitably would have :id?e?ntified the facility in question. The serubbi-nggattorneyanalyzes- such case eVidenee iascl'ose associates and other relationships of. the subjects of the: investigation that could? logically'lead -.investigators through NSLS, for ?to the facility contained in the Stellar Wind report.;3s4 Until January 2006, when the full was rea?into Stellar 'Wind, Judge KeltlaraKo-telly required that all. applicationsthe FBI deter-mined contained facilities or information that also appeared in Stellar Wind reports belie-leared- her before being filed with the Court; she wrotein a 12, 2005,: letter to OI-PR, want to ensure? that, tothe extent possible, [Stellar Wind] informmion is extoluded from applications submitted .toetlrije that,_ ifit isnecessary to include such information, itis specificallyidentified to the FISC as derived from {Stellar Wind] collection when the application is preSented.? .OIPR DeputyCounSel Skelly-"Nele-n who was read into Stellar Wind on March 12, 2004., but who had. been involved in the scrubbing 2001 was responsible, alo?g?with Beheaffor- co?ordinating aspect-of the scrubbing process and, when warranted, for presenting the argument to the judge that an application containing information that Was?the subject of a Stellar Wind-report to the- FBI Should: nevertheless be approved for filing. . Skelly-Nolen Characterized the applications she presented to Judge. KollarA-Kotellyas either ?vanilla? or Vanilla applications were those for which Skelly?Nolen could con?dently represent that the FBI had. independent investigative basis for the facility identi?ed in the application that Was the su 'ject of a Stellar Wind report (ferexample, a facility the FBI learned of through FISA coverage that premdated the "Stellar Wind report). Skelly?Nolen told. us that over time Judge Kollar?Kotelly allowed the vanilla applications to be handled telephonically in an unclassi?ed manner, a departure from her general requirement that the discussions be held in judge?s chambers. Non?vanilla applications typically involved those cases that required Skelly-Nolan to demonstrate that the FBI 354 Fer example, in one case a telephone number of. a particular business did not appear in an FBI database prior to the date it appeared in a Stellar Wind report. HOWever, the subject of the underlyinginvestigation was" the target of an FBI national security investigation, and argued that the telephone number inevitably would have been Connected to the subject through the. ?natural course of the investigation,? possibly from tell records associated with other telephonenurnbers used by the subject, trash coVers and Open source information, or physical surveillance. discussed ud-th Judge- Kcllaerotelly in person. inevitably wouldhave dissovered the facilityri-n questionrduring the normal course of. investigation. Skelly?Nolen said theseucases were_v;always told Us, that there were Judge Iiollaerotelly requested additional intimation 150 Support the prC?ffmd theory'foir including Stellar Wind information in the application" In sende- eases, Jildge-Kollar-Kotelly simply struck a line through the paragraphs in the filed application that contained the StellaryWindderived 'infOrrnatiOn and annotated in the margin, ?This-sectiOn (strike) not :?onsidered'in evaluation of probable cause,? followedby?her signature and the: date. Skelly?Nolen also :said that in one or two cases Judge Iidllareliotelly required that-certain Stellar Wind information arguably necelsSary for eStab'lishing probable cause be removed from the applicatidn-s.355 However, in general Judge Kollar4K'otelly aece?pted and? the FPS assessment that there was anon?.?Ste?llar Wind?in-vestigatiVe basis: forthe informatiOn in question, or that the informatiOn inevitably would been discovered even in the absence of Stellar Wind?derived-tips "t0; the FBI. After operatingunder the eXpanded scrubbing-procedures for approximately 6 montherudge?Kollar?KOtelly agreed in November 2004 to- ,allow other Gourtjud'ges who. had not yet been read into thel?Stellar Wind program to handle scrubbed international. terrorism applications. However, Judge Kbllar-?Kotelly Still requiredthat Ske11y~No1en bring to her attention all vanilla and nonnvanilla applications so they could be ?cleared? ?b?efOre. being formal-1y filed. As notedabove, it Was not untilJ?anuaIy' 2006, When the.qu Court was read into Stellar Wind, that Skelly?Nolen Was able to discuss such cases with other judges. i i it. Since that time, the basic scrubbing procedure described above has continued. The Office of Intelligence attorney primarily responsible for ?the process told us that each new application that references a facility that Was disseminated under Stellar Wind is brought to-the attention of the judge assigned to the case.355 HoweVer, with limited exceptions, the FISA COurt judges do not require that the government inform them of renewal applications that contain such facilities so long as they were previously brought to the Court?s attention in the initiation application or prior renewal applications. The Office of Intelligence attorney told us that the government 355 According to Skelly-Nolen, Judge K'ollar?Kotelly nevertheless allowed OIPR, to the these applications and approved them. 305? The Of?ce of Intelligence Policy and Review (OIPR) became a part of the Department?s National Security Division, which was. created in September 2006. As of "April 2008, OIPR was renamed the Office of Intelligence. (U) i . relies- jo?n independentinvestigative 'i?terest the 10f easesgsin Whichlit-seeks to keep an application; The attorney? also said that ,frcimthe. perspective?of? the -Office-of:jlntelligenee the serubbi?ng presses: more-manageable today, past because proce'Ss' is. be'tterorganized; additional personnel havecbeen readz?in-to the Amendments net-of.zoos-extended the periodoff'time the gdvernment'must bring emergency applications to Ceurtifrom 72 ?honrsto (days. Homver, from: then-FEES perspectiveggthe ,scrubbing: precessrcontinuesfto be burdensomemquires a: ?eXp?nditUIc Cf tithe-ianduother 7 IV. impaet of Stellar Wind on, Countertermrism Efforts seetion exarriines the-impact of the information obtained from Stellar-Wind ongFBI counterten?orisrn efforts. It?rst provides ?istatis?tios of tippers from Stellar Windfinfomiati?on tele horn" resmail, and content disseminated to b1= b3> itdesCr-ibe? ??ld .o'f?mgmera?r WE . . .. tippetsl-and?letypical resultsao'f?theinVSS?sationS. seetioni two statisticalsurVeys of mfeta-datatipp?ers. conducted in 2006 to assess the value of Stellar Wind to FBI operations, aridfdesge-ribefs' obserVatiOns about the to us by FBI officiais mid employees in GIG?.intei?rieWs and contained in 'taiined during the course of this review. Finally, the; section eXamine?s I 331 international terrorismiinvestigations commonly citedaslexarnples o?ertelilar?Wind?s contributionfto counterterrorism ef??rts in "the United States. - b1,b3, b7E A. Stellar-Wind .. We reviewed FBI and .NSA statistics relating to the-Stellar Wind. program. Awarding to an. NSA document from October 1, 2001, to b1, February 28, 2006, the NSA provided elephone numbers and b3, e?Inail? addresses under the Stellar Wind program. The FBI disseminated b7E moSt of these as tippers to field offices. Chart 6-.1 depicts the distribution of the telephone numbers and e?mail addresses the SA provided the FBI by type. -. . Chapter Three, the NSA- provided ratings, or foreth telephone runner email address to help. the; FBI prioritize: "e tippers being disseminated. to ?eld offices. The FBI ede?n in-ECs disseminated to field offices in the following- . manner: am 10 began to. make independent- on that basis, FBI included these rankings Equi-ltil early 2003. At that tim?, Te assessments about tippers? priority for the FE generally IdisGOntin-ued including the ratings in As '31: b3: dismissed Chapter, Team 10 usually set Action leads for telephone b7E numbers email addresses the FBI did not already know and Discretionary leads fOr those the FBI was aware of in connection with closed or ongoing cases. I We Could not compare the relationship between the and the leads because the FBI did not maintain statistics about the lead type for each tipper that Team 10 disseminated. However, in connection with our visits to the Detroit and Seattle field offices, we b1 b3 eXami?ned the number of individual telephone numbers and email 137% addreSSes previde?d to those offices and the type of lead assigned for each. We.- determined that FBI Headquarters asSined A 'on leads for approximately '50 percent of th ead-s sent to. these offices. As depicted in Chart 6.2, ofth 7 field of?ce from December 2001 to December 2006 Action leads. During this same period, of th the fact-that wily-.5 percuemni- the 'S.eatt1? field .offi'ce, aSAc?on leads. Theserfiguresa, I I metada?ta leads the from October to 33131711217137 2006, Were. at; indicate What FBI ?eld offices Ware required to ihVESt'igatea 'zvoluni 17 - addresses. that NSA had-rated connections to -- qiL??dW-pesffm?Detroittand Seattle (January2001:120Mav'20071 of Communications the b1, b3, b7E b1, b3, b7E offices.? major b1,_ b3, b7E eads- wererdistljibuted. unevenly . .o'f'tippers-Were disseminated tb' large pf?-mSWith s" ?bst?antial .co?nterterrorism? pngrams, such as NgW?Yeork, alld?Los Angeles,hand to-dfficeswhose territh MiddleEastem p0 'ulatio ?strait. For kids. rat-lords. indicate that of th?? di??s?eminatgd in 20,05, pares-ht wereassig-rx?d st? '7fi: 1d. office?s. Table :?depiCtsz-the ?di'Stribution- of In 2005- 'amoli'g? FBI '1 - I also found the; b1, b3, b7E 111 these ?gures does not equate to a ?smg?le-telephpne number dre? naJl address; gash :1 lead could contain severaletel numbers or Email b7E seminate?dvunde 359 Rather, the "type of lead that the assigned Action, Discretio" f; Information governed a b1? b3? ??eld Office?s response to a tipper;360 *ontent tippers, which b7E 359 As diesussed in Chapter Three, the practice under the first severalweeks of the Stellar Wind program was to set Action leads for all telephone number tippers. This I I a 1pper b1: 133? inaSte?ar'Windre or: b7E 3?50 An Action. lead instructs a field office to take a particular action in response to the EC. An Action lead is ?covered? when the field of?ce takes the specified action or conducts investigation to address the information in the EC. A Discretionary lead allot-Vs the. field of?ce to make a determination whether the information provide cl warrants investigative action, A ?eld office that receiVes a ?For Information? lead is not expected to'a?ny Specific act-ion in response to the EC, other than possibly route the (Cont?d.) Emma-d? information derived from communications of telephone numbers ?ndeama? addresses under Surveillance generally assigned::Discrettona? merinf?rmation in these tippersnsualilxy related to} b1, and was provided to; b3, ?fo those Castes email address iipe?rsisenerally b7E leads t?Q-?f-ie?ld toffi'cesunless the information was Utg-e?t? AS-??o?ted above, content dd" ?Cpmparati?v?dY-Sma? Portion of the": 1 . - diesen?i-inated by Team 10. . I Theva-st majority of FBI invest v-ity related to Stella-r Wind intermation involved responding teleph-onenumber tippers that assigned Action leads. Team 130 general-131r assigned Action leadsfor bla numbers. that the FBI- .di'd net previously know or that Team 10, b3? such as a number thathad a relationship b7E I investigation..351 From approximately (when Was created) to July 2003, Action leads instructed field offices to- obtaingsub?sc liber inferrnation ifor the. telephone numberswithin its toconductany ?logical investigation to determine terrorist connections,? ?H?oWeVei-?a some agents complained that these Action leads ab'ontihtho make use of ?the tippers, partieularly given th Commuriications provided insuf?cient to: open national security investigations. rm changes in 2003 addressed some of these. complaints. First, in 2-0032the assumed responsibility from field offices for "issuing b1, b3, NSLs, Section Il'abOVe. .Secdnd, in October 2-003 the 1371; Attorney General issued new guidelines for FBI national security ?threat assessment. - (A) communication to the offiCe personnel whose investigations or duties the information concerns?{S7445me 351 Discretionary leads were assigned to telephone numbers that already were knownto the FBI, meaning the number or the number?s subscriber was referenced in an active FBI investigation. These leads identified the case number of the related investigation and advised receiving field offices to ?use the information as deemed appropriate? to bring the-information to the-attention of the appropriate case agent. 352 As noted earlier, the October 2003 guidelines, entitled Attorney General?s Guide-lines for-FBI National Security Investigations and Foreign Intelligence. Colloction (NSI guidelines), replaced the Attorney'General Guidelines-for FBI Foreign. Intelligence CollectiOn and Foreign Counterintelligence Investigations. In September 2008', the Attorney General issued Guidelines for Domestic FBI Operations that replaced the October 2003- NSI guidelines with reapect to domestic operations. Theseptember 2008? guidelines use the term ?assessment? instead of ?threatassessment.? (U) bl, b3, b7E number? telp?ers instructedfieldoffices to conduct teat assessment; During our review, we isi" "the Detroit and Seattlefield. offices to reviewthte'ir'hanldlieng o? eads, In addition, Wei-interviewed several superViSo'ry Special agentsaat FBI Headquarters who had-experience. handling-etheleads in their respec?ve field offices before being real "Ce Ingeneral, these agentsfand experien,cewith I eadsr was unremarkable.- A. thre at by "these agents typically involved querying-Several FBI, publicj and commercial databases for any information about. the tipped telephone reque sting that Staite?aind local ,gavernmententities conduct queries. Sometimes these queries identified the, substirib er to telephone earner befotethe?CAU obtained the-intermation With other-cases, the threat Continuedsafter?the field office received results-.353 i i bl, b3, b7E asesut-iliz'ed . in their threat as sessment's- {Examples of the dataib -- "i - is the Automated bl, b3, b7E databases; and Too mmerci'al suCh The. results of their cheeks of these databases eoul sometimes be extensivC and include personal information not only abOuet the subscriber to the tipped telephone number, but also about individuals residing in the subseriber?s residence or other acquaintances. In other eaSes, checks were negative or revealed little information about the number or the subscriber. 353 We were told that it sometimes-tool orfield of?ces to "receiVe subscriber information from the A Team field offices frequently- bl, b3, contacted the CAU about the status of outstanding SL5 because the usefulness of threat b7E assessments conducted on a telephone number were limited without the identity of' the subscriber. The agents. and midway-reviewed the. results of these database t9 determine Whetheradditional investigativie steps under the; threatra-ssessment were warranted cor-whether: the-re. Was :pr'edlication to open; preliminary: inquiry; None- of theeagents: we: interviewed? could? recall initiating- any inves?tigationsvbaSed. on ath' . I eat. of an upper?? "They said: they? frequentlyelosw b1,'b3, b7E 0 0 sandman-gs threat aSSESSment interviews mavens-$015 be: ariddetermimng that-there was no nexus 'to terrorism or threat to'natigna} security the leadswere: Closedrbasee 30161373 On the results cleanses Checks; agents were not ?9 rmnted to explain tozrs' bsoribersvhowthey b1: b3: Obtained the-information that caused thein to seek-an mtemew. Instead, b7E agent's: simply asked subscribersgabout their contacts invzeertain countries with specific telep'honeanumbers. Agents told us that subscribers generally ECiOrisentt'ed to these interviewS and were cosperative and? forthcoming. In a few cases; subscribersre?ised therequest' or sought the advice Of. Conn-361.355 7 - 7 354 Prior tovthe GAG-?stuly 2003 decision; to assume re'spOnsibility for issuing NSLs, agents in F131 ?eld of?ees often opened investigations in order to issue to obtain subscriber information. These oases :uSually Were closed after the agents Conducted investigations and determined the domestic?telephone number tipper did not have-a nexus to" tetr?dr?iSm. $.55 On September 29, 2008, the Attorney General issued new guidelines for FBI 0 era-titans which includes national security'investigatiens; Thesegu-idelines b1, b3, b7E .. . . Compare ener s. m, emes or . ope atim sec (Septemb?r 29?, 2008), with Attorney General?s Guidehnes- for FBI National Security Investigations and Foreign Intelligence Collection, Section (October 31, 2003'). 355 Several of the threat'assessment interviews that agents described to us and that we reviewed in FBI documents provided examples of how some domestic telephone numbers appeared on their face to be in contact with an individual involved in terrorism. In the Seattle field office, several interviews revealed thatthe foreign telephone Calls placed todonie?stic numbers Were made using a pro?paid telephone serviCe from local stores because the callers, often relatives of the domestic contacts, did not have telephone service at their residences. Thus, while the intelligence indicating that an individual inVolVed in- teri'Orism used the foreign telephone number might have been accUrate,_ the number also was need about whom there-was no reason to believe were involved in terror-ism. FBI-field assesses-mate the in most-of the E65 we reviewed: the?eld-ef?ees reported: all Of the information that? was locatedabout the idle-phone. numbers, .inei?udi-agthe details or any subscriber interviews, and then stated that-the office determined the 9 tipped telephone number-did notiihave; a nexus ito-terjrorisin and considered the-lead closed. less frequently, ?sld . offices reperth that preliminanr investigation- was Opened to: eten'id?uct Regardlesszof Whether anyfl'inlss, toti?t?l?riatiOnal WEE?jidenti?ed, "the reSult?s off-any threat andthe: aroma-son that was collected about subsoribers..gjenerally Werer'eported'1n communications to FBI Headquarters and uploaded into'FB-I dataases-v C. atistical Survey set Meta Datae?iT-iapsrs b1The 131. made several attempts, bath, informal and rnorezformall', to assess value-pf Stellar Wind to FBIacotmtert-errorisnr efforts? The first Was infernal attempt by the OGC. FBI General COu?nsel Valerie- ;Gapre?ni; early 7204 sheepoke with the, UnitChief' and Chieffor' the Communications Exploitation Sentienanon-timing; te assess-the value efi Stellar Wind. informati'On. According to iCaproni,? the. on anecdotal and insformal?feedb'ackfrom FBI fieldadfficiesj, the telephony meta data tippers were the most- valuable intelligence from the?prograrn for agents Working on counterterrorism Homer, Capronito?ld us it was difficult to conduet'any meanihg?? of the program-is value in ear1y12004 becauseFBI? ?eld of?ces-tatthat time were?not required 'to report to FBI Headquarters the atiVe results of'thefStellar Wind leads disseminated funds BIL Headquarters did- nOt' make such reporting mandatory-until Oct b?cr'QO?s. as a result, Caprioniis discussions with the FBI manager's did not reenlt' in any Written assessment of the program. b1, b3, b7E 35" The advised field offices that investigative feedback abou 7. tippers was important because it. informed the ?reliable source's? (the assessment of Whether to continue analyzing the ?foreign entity? that caused the tippers to be disseminated. An NSA of?cial told us that such information was also important to b1 b3 b7E the analytiCal princess, but he said it was sometimes dif?cult to obtain suChiee'dhack. A CAU Unit Chief told us that the NSA expressed particular concern about from the FBI regarding investigative result the tippers? nexus to terrOrism. He said this Was-a dif?cult situation in tha, bes?en?dingout high value information about known links to terrorism, ?uncomfortable? to receive little feedback from field offices other than, ?You?re sending us garbage.? MEmbe'rs of?Team '10 told us that efforts to improve field office icedback overtime had mixed results. TheFBlis: second? informal assessment?of the value of; Stella-1?- Wind came-after 2-005 articles t-hat'puliely- ,disiglosed the Content collection?aspeetef titles-teller Wind'pifbgrem; Capreni . said that in preparation testimony at .?eon?gre sisional, hearings 2006 on; theissue, shej attempted to evaluate timers-teller Wind. (program. Capr?Oni stated that becausei'NSA'Di-recmr Hayden asserted; public-1y that thepregfam was. identify, if-plos'sihle, any i-nVeSti'gations that illustrated 7 centriibution ?to the, FEM counterterrao'rismefforts; caproni- this effort wascomplicated by the: fact that ,Muelleris' teetimenyweuldbe limited only torthe aspen of- the proigram :in-xthe New {York Times article and, sub'Sequently con?rmed by the President - the content collection baSke.t. As discussed this; aspectefthe I b?eca se I I as comparatively small}. cevefaget'tjn these I-ajl?ready. C-aproni told;usfth-atjultimatelyShe was ableto identify.- ecouple? ?ofcoiitent tippers that. contributed to that-there were:not-Inany; 7 above, Caproni said that fiel . 1: of?ces: did not ?nd hon me Irate. ta The FBI subsequently conducted. th0 more; snort-s to the-Stellar program?s ire-act on FBI . or nations study 'Sampi?led? t-h ijpp?ers the. FBI- had Stellar-Wind from 2001 ithrough200'5 The second study reviewe Bell-18.11 tippers the NBA provided the FBI from Augusteoezi through January 2006, In both of. these. studies, the to, determine pereentage of tippers resulted in to: the ientifiea'tion of terrorist subjects or aactiyity? on soilr? We deseribe? in: the next sections the ?ndings of these two studies. b1, b3, b7E ll. Early 2006 Survey 37 and email b1, b3, b7E Meta Data Tippers "r Telepth -15" Following the December 2005 New York Times article publicly disclosing the content collection aspect of Stellar Wind, additional members of the Senate and House Intelligence Committees were read into the program. During this time, the NSA proVided to cleared members of Congress Substantive briefings about Stellar ?Wind, and the FBI Was asked to testify about, its participation in the program. In preparation for these briefings and testimony, the FBI sought tom'quantify the Value of Stellar Wind intelligence for FBI counterterrorism- ope-rations. The conducted a statistical study for this purpose, and in May 2006 the FBI provided a copy ?nducted during-a 1,-Week- in JanuaryQOGE; . :niquetelephone numbers and?eems? addresses-the b1 b3- '1 - Fla from the inception of the Stellar Winds-program B733 2005.353 The Study soughtro? determine What percentage (?fths; tippersresulted'in ?significant ('30 ~t"buti?onf ?to the identification of king: or activ . 7 randomly selected?: tippers l?l the CAUere?teIrnined "ma. would; tie-required to obtain. statistically Signi?cant results. Approximately 30 fromtheF I?s- Counterterroris?rn Division Were-Jassigned theita-sk of-reviewin ippers to determine the; of eat:h.359 The analyer soughtto determine Whether- a partict?ar ?ripper made ai?tsignificant?l contribution .to- FBI Conn-terterrori'sm bl? 133? effort-st For purposes-of the study, a 'tipperrwasr b7E led three investigative 0an terrorist; depentation from the United States of a: suspected terrorist, orthe development; Of an asset can report terrorists? "that led to. ?eld?offite opening a preliminary Or full investigation. Was-- for pquOS'eS of-ithe?. study. . The researched each tipper?s disposition in inve, resords contained -in FBI electronic databases, beginning Witht C?thatdisserninated? the tipper to, the field. If an analyst concluded bl? b3? based; on this research thata tipper was Significant, a second analyst-Who b7E was familiar With the Stellar Wind program further reVieWed that: determination. If the analyst agreed with the initial finding, the tipper 3'53 According to the the inception of Stellar Wind, bu A had provided up since b1, b3, b7E 359 Most of the were not re and Were told that the studyrc'oncerned the dispOsition tippers reviewed b1, b3, by the approximately 1.2 percent were e?mail addresses, a with b7E the; overall ti-pper?breakdoxwl between e-mail addresses and telephone nUmbers. presented to the CA-U Unit Chief for a final - ?methodology, the study found that I.?2IperCent, Lppers were sidni?c nt.? The study extra lated?thisf: 'figure?to-the entire: ?pers and determined; that one; 3? I fin i'ppers' theZ provided the F131 underlSt?ellar Wind were sig 1fi menti'ng the study?s-findings included brief. descriptions i tippers. For example, according to the 1'6d't0 the openingof a full inVestigation that developed evidence- that the user of the tippede?Inail address had ?definite ties to Theuser wasanfes'ted and pledgu?ty'to- chargesof b1: :Anotherfti shied the b3: b7E 'Sevierallof the ?signifiCant?f tippers related .to ongoing FBI investigations. For example, information from one tipper designated as significant-was already known to the relevant FBI field office, which an. investigation :on? ?Concerning a subject aesociated- with the tipperpr?ior torreceivieg ?the? C. ACCOrd?ingto- the study-?s; brief .descriptiOn of b1, the, Case?sSignificanceljthe investigatiVe file stated that the tipper was: ?very b3, beneficialjin the. ongoing. investigation? by connecting the subject ?to 13713 terrori'sm,- Without desoribing that connection. Another tipper causedagfield office to a relitnin? ?intro-ed full investigation regarding the possible i?ll'ega The tipper indicated a connection between-one? oi- the 'iSutbjE?Ct-S "oi-the preliminary investigation and aknown tErrori'stThe study also found that 2?83percen-t tippers were never disseminated to FBI field offices for investigaticm. According. to the report, the CAU filtered out these tippers based on ?lack of significance? when they bl? were first provided to the FBI by the NSA. These. tippers were deemed non~signif1cant for purposes of the study. In addition, the study found that for 22 percent of the sample tippers, FBI field offices did not repert any 370 According to a CAU analyst closely involved with the study, establishingia fairly ?tight? criteria: to identify ?signi?Cant? tippers was necesSary in order to obtain statistically significant results within the one-Week time frame the CAU was given to complete the retiewl .The analyst told the, OIG that initially applied a broader ?significant? standard in their?revieivs of the tippers, but that it immediately became apparent that a stricter standard was required. The Unit Chief for the CAU told the. OIG that the definition of ?significant? ultimately used for the stud}r was reached by consensus among Counterterrorism Division operational and-analytical personnel. that Were set but: did natdocumEHt-?thcir workinACS. These for purposes of the: :sjtudy-Sm Th?uS, these 1W0: ?Categm?i?sl,? appl?O-?Iiima-t?y 510 percent of the tippers: reviewgdwas partdf-th'e-C-AU study-either were navel: disseminated or were disseminated I?GsultS?m' The REFS rcpcirt of the studydidnqpex? Windnwa's a; valuable i that" based?impart-on: the results 'of?th?is study, leads Were signi?cant, FBI eXecu?tive . at: prd'gram? was ?fof value.? FBI. Director Mud-1.81" Dequ .Dirgctor Pistols provided cOngress?iQnal teStimony in Fabrualy and May about the value-of-the program, which the. FBI -St?1t?d?wasabased in part on fhe. results of the study: Meta Data? Tippms 1, b3? b7E . s?authoriiy. Hawaiian as noted earlier, the addresses:ij the: tellar I This-SeCOndCistudyj, Which-reviewedeach email tippers .ptovide?d'the from January '20206,= applied the same methanol-egg for easesSiagjtsignificanee? that aged-Lin ??rst b1, tippers: was b3, ?signifieant? under this ??Standard. The :?thatiinany of. b7E eelatsd renamed email. tippersjwerestilt gagging; 'Iln?aclition, the study Observed that ?Somer-ofthe tippers reviewed had only. recently bean disseminated to ?eld dffices for: inses?tig?ation and that it Was possible investigation of? these tippers had net'been completed. set m1 D. AsseSSXnents cf Stellar Wind. information to' further-assess value?eofStellaJr Wind intermatien to; the; we. interviewed FBI- HeadquarterS Officials employees- wha- ?r?egala?y?handled Stellar Wihdninformationn Wealsor? perisennel b1 ianBI Who were pips-gm} b3? esses?fOr theirassessme?ntsaoftheimpac. o- Stellar._ b7}; infOtma-tion: We also recognize that FBIfoi?oia-ljs?? t" otherjthan hayev?hadfeXperienceswith I different-than thoseSmn-mari'Zed The-members: of Team 1 were strong :adecates of and stated th ieerb'elieire'diit' b1, contributed significantly to. FBI inter-national: terroriSm investigations b3, Several? claime that program tippers helped the FBI identify preVi0usly b7E unknown subjects, although they were not able- to identify for as any Specific eases where this occurred. Other witnesses. cited the. increased cooperation with the SA on international terrorism matters as a. side benefit of the Stellar Wind program.373 FBI officials and agents fromthe. International Terrorism and Operations Section (ITOS) expressed a more moderate assessment of Stellar Win-d. None of the ITOS of?cials we interviewedcould identify significant investigations 130 which Stellar Wind substantially contributed. HoweVer, 373 FBI Deputy-General Counsel Julie Thomas also said that Stellar Wind helped improve the relationship between the FBI. and CIA. She said. the program provided an opportunity to demonstrate the ?interoperability of different agencies? and based on-her exPerien'ee dealing with program?related matters the relationship between the FBI and. the NSA was ?better now than it has ever been.? ?fian mumram'imm Immin- win-1 rev 1mm 1 1m. 11 was. it 1 fume: 1 gammy 29311.; I the foreign mdiV-iduals allegedly involved in tetrc?sm whom- ?domestic. telephone numbers. and e~mail arddresses- Weree in Contact. However, these FBI-employeesbelieved the possibility that Such contacts b1 b3 related-to terrorism. made .inVeetigating the Some ITQS b7E Witnesses also told- Lie that 711 their experience the-FBI wasra? read-y awareaof ?a-il addresses disseminated under b1, b3, b7E ed who field offiCes. we visited. ati?o-n developed b1,b3, from} b7E Information. He said that by Simply disseminating field offices in 13303 that often provided little in the detalls FBI Headquarters effectively made the field offices ?insurance carriers,? placing 306 S?temmr?m I 164%" war I mwmea new I Imnmm 1r I . . a! anulil wnmuu I niuvu] we; I Waiw?w??ul compared; to other counterterrorismleads the: office received because they not provide su-ffiCien-t information for him the ther supervisory special agent expresseda ?similar? assessment of. stating that?he-felt-the: project ?perverted the logical iOf. rig, He that absent the leadsrispecial statusas?part or I l'QW'percentageof the tippers would-PhaVeTbeen Considered Herold us that "he 'did?not have the; freedom to. prioritize the-leads: in the lie-felt was warranted the inferm'ation provided; 13733 m. Field: Of?Ce agents who inve ofithe lack of datails contained in about the-nature of the terrOIis?t?cormection to the domestlc conta-it! or about the CO-ntact itself, as the duration or. frequency of the- cal-ling activity. Some agents. We int-Hri?ejWed hey'also occasionally Were: frustrath by prohibition. On bl, ead?s also. 1.1331 information in any judiCial princess, such as in: 133? applications, although, none- could identify an investigation which. the b7E restrict-ions adversely affected the case. Most of the agents we intervieWedsviewed . tippers as just another typeof lead that required apr?Opri?ate- attention, and the agent's- b1,? generally i'd not-handle the" leads with-any greater, Care or. Sens?eaof'urgency b3, than-non counts-rterrorism leads. b7E 'More0ver, .none? Of?the agents . edpident?i?ed an ieVese?gatiQ-n in their office in which ?.I?aYed a significant role,- 1:10?1?C01311d they recall how such a tippercontnbuted to oft-heir 131,133, tonal terrorism cases. Nevertheless, the'agent's generally vie-wed b7E I tippers as a potentially valuable source roofinrformation, noting- that :he? information de-Ve10ped from, the investigations of tippers might proveiIseful in. the future. Agents also stated that throughthe threat assessme conducted of the subscribers to tipped telephone numbers; they b1, b3, ?opened a Window? to populations within the field offices? jurisdictlon that b7E 374 The supervisor stated that ends had little investigative value to his of?ce. First, he said the leads did not prov: enough detail about the reliability of the infOrmat-ion being provided. Such details might include, for example, what other bl? individuals had acceSsto the foreign t?eleplione allegedly used by someone involved in b3: international terrorism, and how many calls were made from that. number and for what b7E durations. These details would help evaluate the threat represented- by the foreign number?s contact with the tipped domestic number. Second, the supervisor said the tippers lacked direction about?what the office should do with a tipped number aa?? threat assessment has been conducted. IanO'Oii?; FBI Deputy- Director John Pi-stol'e briefed Committee on Intelligence concerning-the partiCipa-tion in-theT-Stelflar? program. Aldocument prepared in Connection with that briefing addressed, among other subjects, {the program?s Value-inFBI national securityinvestigations. The document stated", [S]ucceSSfu@l national "security investigations: are rarer the result of agingle source .of'ithrmatiOn. Ra?ther?th'ey occur after exhaustive. hDurs of investigationand the use-of [legal?proc?ess in shits pieces of intelligence from: many Sources are gathered and combined: into a Coherent whole.? The successor effectiveness of any intelligence program Whether Stellar Wind committing else sometimes. dif?cult Jae-assess in {the abstract because of that strains or intelligence and because should neVe?r be measured terms of terrorist plots- that? have Visibly been disrupted? but also-in plots that never, form-ed becau-Se. ourririires'tigatiize actions themselves had a disruptive effect; (Italics in - - - - We interviewed Director Mueller inconnection with this review and asked him about the value of Stellar Wind to the counterterrorism program. FBI Director Mueller told us that he believes the Stellar Wind program was useful and that the FBI must follow every lead it receives in: order to prevent future terrorist attacks. He said ?communications are absOlutely essential? to this task and called meta. data the ?key? to the 375 A ?talking points? document. the FBI drafted for Director Mueller also expressed this View. The document stated: [The] impact of any single piece of intelligence or program is difficult to quantify. Combination of various information, including humint?, sigint, and elsur, is-necessaqr to address the global threat. Accordingly, it is not possible to make. an unequivocal ?but for? connection betWeen a tip and an}r particular FBI investigation that has resulted in a seizure orarrest. I?Iowever, the information hasamplified, corroborated and directh FBI investigative resources. ?analysis. Mueller also statedthat to, the. e-Xtent S?uC'h- be: gathered and used legallyi'it must "be exploited. and that ?would :pOtenCy' of aprog?ram basied on: thezpercentage 6f hits.? :ASke'd he was?familiarwith any ;spe"cifie: investigations that representStellar Mneller said thatas'. a general matter it is; difficult lid-quantify thepeffe?ctiVeness of an intelligence program Without leads that are. produced 'in?ord-er to? evaluate the role: the program in?forimatiOn played in-?a-ny investigation. Wealso aSkedl Mueller about the issue of allocating ?nite FBI re?sources?jztoresp?ond to Stellar Wind leads. Mueller-said that in ?the period ?ai?terthe September '11 terrori-St attacks, the FBI remained in a State of continuous alert fer several years. Mueller stated that he understood the President?s desire to take: every step to preventanother terroristattaek, and believes, that it-Would be wrongznot to utilize. all availaljle capabilities "to. ?Mueller also commented frustration with the Volume of described complaints of ?unidenhftedFBI ?e d? ding. the lack of information the tippers: they received unde i and how the high VOlutr-ie of?tippers neceSSitated devoting. signr icant resources. to What were: ?dry leads.?375 Mueller said that the agent-8? frustration was similar to that-expressedabout-other sources:er the: thousands of leads F131 received after September 11,, suCh'as calls from Citizens. Mueller St??tedthat he- Understood the frustration associated with expending ?nite rasources-on numerous leads unlikely ?to-have a terr?Oris-?ni nexus, but said that his philosophy after September 11 was that ?no lead goes unaddress'ed.? Moreover; he stated that frustrations can result from any Counter'terrorism pregram; art?s, regarding Fl agents? eads For example, articles b1,b3, We also intervieWed Kenneth Wainstein, the ?rst Assistant AttOrney' General for. the Justice Department?s National Security Division, which Was created in September 2006. Wainstein told .us that he was aware of ?both sides? on. the question of Stellar Wind?s value. He also said that he heard the government had not ?getten a heck of a lot out of it,? but noted that NSA Director?Hayden and FBI Director Mueller haVe stated that the program was valuable Hayden told us that and successfuh 375 See, Lowell Bergman, et al., ?Domestic?Surveillance: The Program; Spy Agency. Data After Sept. 11 Led to Dead Ends," The New York Times, January 17, 2006'. (U) the Idea easie- help intelligeneebasie, :HaydEnalso observe that the enemy may noftfhatre been the St-atesras much; Wind helped determine this, Examples" of FEE Counter-terrorism Cases Involving Stellar wit-metnrarmanon Part-0160111? review, wevsought. to identify speci??. F131 jnternatianal terrorisminvestigations .in which Stellar Wind information was usedsandfto describe the: information?s Spaci?c clozntributionSiO the We agree isr-a dif?cult- task in View-01.? the ?atma- of: mesainvestigations? Which frequently-am Predicath on. ?multiple Sources-of i?fdrmat-ionJ-To the extent Stellar Wind a rjglem an investigationrth??ps Could be one of Several O?ianI-mation edidver Altime used by the. FBI to pursuetheinvestigatioh. agents and reyigw Emu-Id? 'th Say that '?but'for? 5? Stall? Wind ?tiPPEf. axgiven- inve stisatianwou=1d. have' productive" "and they were unable-t0 recalls-Specifically?how; if Wind intelligence may have caused..,their mvestigationsl to. take a par?eular direction. Our. review did. not seek to describe We?recognize that FBI of?cialseqd 'r than-those We interviewed might ha-?Ve had exp rienee with 3 A $108.6 shatter; reporting was not idlssemmated to 'FBIfield' of?cesund'er "my contribution the information might have made to 3 FBI personnel we interviewed were familiar with might not have been acCoun-ted for in our questions about Stellar Wind an nformati?on. In View of these difficulties, we examined several investigations frequently-Citedin NBA and FBI documents the 01G obtained during this review a-s-eXarnples' of Stellar Wind information that contributed a iterteizrorijs?m efforts.377 Fer these investigations, we eXami?nej Letterhead Memo-randa describing the statue-of inveeti'g eeve activities. specific cases, Division responsest?e 011G. the role- 0' in specific. 13733 led in international terrorism prosecution-s, FBI- "materialsmv "-3.77 As listed. above, the FBI was not the only customer of Stellar Wind information. The CIA and the National Counterterrorism Center also received Stellar Wind reports potentially relevant to their operations. Pursuant to a directive in the FISA Amendments Act of 2008, Intelligence Community OIGs are examining the impact-Stellar Wind had on their respective agencies or if Stellar Wind information contributed to their agencies" operations. 373 The brie?ng materials were prepared by the Communications Exploitation Section shortly after aspects of the Stellar Wind program were publicly revealed- inra series of ?New?York Times articles in DeCember 2005. The briefing materials were prepared a at the direction of FBI General Counsel Valarie Caproni, who anticipated that Director Mueller and Deputy Director Pistols would be called to testify about the program. These brie?ng materials were intended to help prepare Mueller and Pistole for their testimony. The briefinginaterials include summaries of speci?c cases relating to Stellar Wind information that were highlighted by the NSA. WW b3; b6, . 3 b7C,? '.b7E b6, b7C, b7E b1, b3, b6, b7C, b7E Ited in the FBI initiating investigations of to'i'den?tii?y any involvement 'in errorism In that the individuals? connection was b1, b3, terrorism. However, in one case FBI b6, b7C, individUal was in contact with additional b7E engaged in. activities indicating possible b1, b3, b6, b7C, b7E l'Wh?D had-?com b7E was.? already undetinvestigaztionan 131 field foice; The caUScd? the FBI office to C'o?vgrt. its prEIiminaxj? afull invastigationsand Ob?f.? used by the: individual. The FB- - mes and issued National A I I the FBI did notidev?lo?pi'any . b1, b3, b6, b7C, b7E b1, b3, was? a natmnm e-Co-IJSPiracy 7E .0: provide materialisupport to L- - FBI 61'? Cloggd; :fi?ld offices with ?t?subd?g'Sful3 dismption Opt-:1? state; that aftg was frclated' 'i?vestigations Conducted among a ?criminal activities that We'retidenti?ed Course of the inves?gatiOns,. In] b7E b1, b3, 7D b7E came to be Known by the Co' .384 b1, b3, b7E b1, b3, b7E b1,_ . b3, b?6, b7C, b7E b1, b3, b6, b7c, b7E b1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E 335 documents we reviewed do not indicate how this information was obtained or Whether it was derived from Stellar Wind. that it could not be verified whethe b1, b3, b6, b7C, b7E 316 TEMP I 1' 1' it is 110th thata'tmth?j LhadrFISA"COVeradem . uACCOFdl?'?re dc FBI: briefing-materials state; thatthe FBI 1" t'b? surVeillanee of an 'i-nidiViduali-latei? defermined to 'be Th'reu'gho?peri 131,133, soureefinvestigation, the FBI obtained the telephone number of the b6, misidentifiEd :SUbject and. Was granted emergenCy authority-0n that 137(3) 17111 as in 'ated on the. telephone believed tebe b7E the FBI employees- located at the NBA (T621111 10) teth NSA for call 0113111ng analysis mid comider?ati?cn fer Stellar ?tasking,? or content collection. The N-SA initiated cont-erit celleetien onrt?everronetms telephone number-? the same day. Contact; number did no . targe?eteassociated numbers. 0? b1, b3, b6, b7C, 1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7D, b7E fer the; brie?ng mate-rials told. Would 'have.:fiuredout evnt b1, b3, b6, b7C, b7E b7c, b7E . bl, b3, b6, b7C, b7D, b7E According'to resenta?on about the role .ipper ?facilitate: the in a timid Tailed- toy bl? 133? 136? b7C, b7E res?lt inanoti?ca?dn to" the FBI of throughSte?iaf ind inform? suweinance I. - b1, b3, b6, b7C, b7E b1, b3, b6, b7C, ~b7E b1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E 136, 1370, b7E b1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E b1, b3, b6, b7c, b7E 1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E E31, b3, b1, b3, b6, b7C, b7E ?bl, I 333, 136,. ib7C,? b7E 1, b3, b6, b7Ca b7E he FBI applied for and obtined a PI Arorder tn b7C b7E b1, b3, b6, b7C, b7E rec?mmend?d that tha FBI cite vestigat'ion "an i?examp-le- of :Stellar contmbution to- e. Grits. The FBI brie?ng materials 211' "te that the. I -- I becoming the response to the} recluesration DiVisyi'on told 11 tha ,ased on its sea 'h nS?With'thc rcaseag?en?tsfno vestigat'ion. Accordi??'to a? investigation"?didsnot c?y lead tear-1y 15 timid? ?vidence th washujsed in the pro?secutibn of the case against and Was not into application to a court, includmg th b1, b3, I b6, b7C, b7E b1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E b6, b7C b7E b1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E "it; on analysis. (in. The?FBl..created_ the asgl'eads to] FBI is a project to- disseminate Stellar b1, I a :c and Team 10 ?bg, NSA towerk on Stellar. Will?df?ll-vtlme for this purpose. We foun?d?that b7E the coalocaticn improved the FB?I?s?knowledge about Stellar Wind I?Operaticnsx. :and,lgav_e? the NBA {better inS'iglItsabout how FBI field offices -?inVest'igated '=Steliar Wi?dx'inferrnatiorn We Weretold these benefitstrans?lated to a It? repert One of the Chan eS-the FBI implemented to attempt to improve the investigation of leads was to make FBI b1, Tin-stead of tHE'M?EIHEffices, responsible for issuing National Security b3, toobtain subscriber information on tipped telephone numbers b7E and Erma addresses. 'Thisme ted in July 2008?, Was intended to, :add-ress agent concerns that leads didnot provide sufficient [information to: initiate national security stigaticns, .aJp-rierequissite under. Departmentinvestigative guidelines-to issuing NSLs. v' Howieven we, found that the CAU issued the NSLs from the rion~investi 'ative. ?le created in September 2002- to 7 repository-foe :related communications between FBI Headquarters eld-Eeffices. Issuing the from a- control? file instead of. an file was central to internal FBI policy. The FBI fatally. b1 spacernwestigative filegfcr project-in November 2:006. b3? b7E sui?ci ?t?predicatmn either to connect th preliminary cr-full investigations of al Qaeda and af?liated groups. Or to open new preliminary or full investigations in compliance with Justice. Department? inVestigative guidelines. HoWever, we also concluded th BI vould have, and should have, opened an investigative file for th r'oject wh ion first was made to- have FBI Headquarters issue NSLs for leads. We also described in this chapter a change the FISA Court made in March 2004 to the. ?scrubbing? process used to account for Stellar Wind infermation in international terrorism FISA applications. The change b1) b3! requires the. Team 10 and FBI OGC, in coordination with the b7E Department?s Of?ce of Intelligence (formerly OIPR), to determine whether any (telephOne number. or email address) that appears in a FISA application also appeared in a Stellar Wind report and, if so, whether the FBI had deveIOped, independent of Stella Win - vestigative- interest in the facility before it was the subject of an tipper, or whether the facility would have been ?inevitably discovered.? Pres-iding-_ Judge Kallar-elCotelly imposed =this?--addit10nal scrubbing. requirement-after being. advised ofi'rnodifieations made to Stellar Wind i-nMa-rch 2004 follo?W'ing the Jusaee' fapartmentsrevised legal analysis of the program. The FBIrand. Office of Intelligence continue to expend significant resources to; comply with this HOWever, we did: no?t findany' i?nstanCeis of the reguirement causing the FBI not able: to obtain; FISA SurVeiillan?c'e corerage on t'a?rget; 31 QC j? primary focus in this chapter was to assess-the generalrol?e. of Stellar Wind information in F131 investigations and its value to the overall counterterrorism effort-s. Similar to- the FBI, we had difficulty assessing thers?peeific value ofthe program to the: FBI's counterterrorism activities, . Hewever, based on our interviews of FBI managers and agents- :our review of documents, and taking into account the substantial Volum??' Gileads the program generated .for the FBI, We concludedthat? information produced under the Stellar Wind program had Valuers some, counterterrOILism investi?gatiOns,sit played a limited role in the: FBlisioverall counterterrorisrn efforts. The-vast majority of Stellar Wind information-the. .proitidsd the; FBI related to telephone numbers-x-ande??ma?il addresses the NSA identi?ed 1?ough meta data analysisas: individuals- believed to" ME FBI agents and with experience investigatin bl? 133? b7E leads told us that most leads were determined not to have to 3?99 As noted earlier, the scrubbing procedure applies both to NSA information derived from the Stellar Wind program and to information derived from the FISA Court's and Section 215 bulk meta data orders. This is so because until mid?2008, when the Stellar Wind program officially was clOsed, leads the NSA developed fromthe FISA?authorized bulk meta data collections were disseminated under the Stellar Wind. compartment. 400 Statedanother way, the Stellar Wind program generate, 131: b3, leads for theFBI' each month from October 2001 to February 2006. b7E represses ht?l?l?OflS-I?f?lld- they. did not identify for :us any specific cases where leads; helped-litheFeiidentify previously unknowa in terrorism. ?(elthengh-several stated that this did cecur). _'Thi_s is-not surprising given: that-the vast majority cf leads sent to FBI field offices for investigation eericerned?telephone numbers ande~mail addreSsesthat. theNS?A already had determined were atibest one or two: steps. removed from numbers; addressesasu.spected of being used by individuals believed to 'beinvolved in. regrets; two statistical studies that attempted to assess the .is'igniacanae? of Stellar?Wind meta data leads to FBI connterterro?sm efforts did onclusions on the pro?ram?s usefulness. The first samples taken from meta data leads the b1, in approximately October 2001 to December .2005, 133, made ?significant? contributions. The b7E I scone: Si; ticalxistudy, which reviewed eac ?rnail tippers the NBA provided?the FBI from August 2004 thrOU'gh-January 2006, identified of ?significant? contributions" to FBI: co-un-tertermrism efforts-.401 The-E31 QGC-?toldus that FBI executive management?s statements in. congressional testimony that the Stellar Wind program had value was based in pastor: the results of the ?rst study. I While we believe Stellar Wind?s role in FBI cases was limited, asseSS'i?D?g the ~Value of the program to the FBI ?8 overall counterterrorism efforts is more complex. Some witne8ses cemmented that an- intelligence program?syalue cannot be assessed by statistical measures alone. Other Witnesses, such as General Hayden, said that the value of the program may lie in its ability to help. the Intelligence Community determine thatthe, terrorist threat embedded within the country is not as great as once feared. Witnesses alsosuggested that the value of the program should not depend on; dccumented ?success stOries,? but rather on maintaining an intelligence capability to- detect potential terrorist activity in the'future. lwe interviewed "generally were supportive of the Stellar Wind (or program, calling the information ?one tool of manyefforts that ?could help move cases forward? by, for b3, example, confirming a subject?s COntacts with individuals involved in b7E terrorism or identifying additional terrorist contacts. However, FBI personnel also. frequently noted for us the deficiencies in the Stellar Wind information disseminated to FBI field offices, such as the lack of details .As described earlier in this-chapter, the FBI considered a tipper ?significantthreeinvestigat-ive results: theidentification of a terrorist, the deportation from the'Un?ited States of a suspected terrorist, or the development of an asset that-can repert about the activities of terrorists. ?alboittg- theforeign individuals allegedly-involved 'inrterrOrism With Whom domestic telephone numbers-and email addresses were- incontac-t. Yetj these: 3131 employees also believed that tartariism'vm-ade investigating the e.mpl0yees- also Egited increased CQOrpsration international terrorisrnin'atters asta sid'e'benefitof the-Stellar Wind program. 2.) Mueller? told us that he belieVes the: S?tell'a'r- Wind program was useful-an. that the: FBI innst fellow eVely'leaclei't receives in Order to. prevent-futureterrorist attacks; are absolutely eSSential?' to this task and called meta data the-?key? communioations analysis. Mueller also stated?jthat to the extent Such information can be gathered and usedlilIEigally it mUSt be. exploited and that he ?would not dismiss the potency of. tat-program based on the percentage of hits-i? . ,2 i 7 . ?Weusought {to look beyond th?eSetcommen-ts of?gener-al support for S?tellarJWind to specific; concrete examples Qf?the program?s contributions that illustrated: thero?le Stellar information We- thei?e?fore-r?eXamined five cases frequently-eitsd indocuments We?reviewed: b1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E rrest and conviction, it value? in the c-rirni 'al investigation that led-t I security investigation that was tipper that led toth?enanon precede. nalprosecution; a The final investigation we examined 7 appear to re'Su-l-t tells-r Wind information; The 'NSAiand the FBlat times have b1? b3? :Case?as an example of the contributions of Stellar Wind to b6?b7c? b7E bl, b3, b6, b7C, b7E .. which appear-s *to- hate been. advance-<1 reporting, might-have caused theIFBl to reopen. tits iave? wewer'e unable; to describe with-the same: Certainwas investigation the extent of Stellar Wind?s contributiOn investigation,- in part bleeausc- of: differingassessments docmnents regarding the role of Stellar =Wind? this matter.- In short, we fotmd that StellarW?indxgenerally has played role but 'thatczt?he there are cases. where Stellar Wind?iinforrnatigon had. value. For- exam-plain some, cases we Wind ?infarmation caused to action that led to useful investigatiVeresmts. However; in othersthe- conneetion. between the Stellar information and the FEES: investigative actions-Was more dif?cult to discern; .A?s diScussed in Chapter Five andiin this chapter, Stellar Windsz bulk meta data collection activities- were transitioned to PISA .author' I The FBI, under the succesi'SOr'to requires ?eld offiCes to conduct?ail? minimum, threatassessments on telephone numbers and email addresses the dEriveS-from this b1 b3 FIJSA?authorized collection that the: FBI is notalready aware of, including b7?E numbers and addresses one o'r'two ?steps remQVed from. direct contacts With? indiVidu?als? involved in. terrorism. In view 'of our findings .abOut the Stellar Wind program?scontribution to theFBl?S counterterrorism efforts we believe that the FBI should regularly assess the impac have on FBI field. offices and whether limited FBI resources should be used to investigate all of them. ,1 Ni?) Another consequence of the Stellar Wind program and the approach to assigning leads was that many threat assessments were cenducted on individuals located'in 'the'United States, including U.S. persons, who were determined not to have any nexus to terrorism or represent a threat to national security?m' These. assessments also: caused the" FBI ton-collect and retain a signifiCant amount of: personal info rmatiOn ojf --tipp_ed telephone numberseandr e?maisl addresse 'In [addition- to - individual?s name home address, Such information could" where the person. worked, records ofgfore?ign; the identity ef?familymembers. The results the information was-Collatztedwgenerally were reps-ritc?d? 'i?HCOmfniinicatiOHS-- to and; uploaded into FBI databases. The collection of per-son information in this manneris ongoingunde-r the. FISarau'thorized bulletmeta data collection. To the extent 'leads. derived from this programgenerate-reSults similar to those under Stellar Win?d,- the FBI will continue to-col?l?ect retain asignifica-nt "amount of information about individuals in the United "States, including person's, have-a nexus to terrorismyor represent? a threat to national Security. 7 7 We' recommend that as part-of th project, the-Justice Department?s- NatiOnal Security the F131, should. Collect information. about the quantity of telephone numbers and e?niail? addresses disseminated- to FBI?fiBldOf?C?S-that are assigned as Action leads that require offices to? Conductethreat assessments. The information compiled should include Whether individuals threat asseSSments are U.S. or .noneU.?S?. per-sons and-whether threat 131,133, assessments led to-?the?: opening-? of preliminary or full national security b7E investigations. With reSpect 'tothre'at ?conclude that u'Sers of tipped telephone numbers or email addresses are 'nogt'involved in terrorism and are not threats to national security, thee-Justice Department should take'st'eps to track the quantity and natLire of the person information collected and how the FBI. retains and utilizes this information. This will enable the Justice'Depar'tment and entities with oversight responsibilities, including the OIG and congressicinal committees, to assess the impaCt-this intelligence program has on the privacy interests of US. persons and to consider Whether, and for how long, such information should be retained. W) b1, b3, b7E reeom-Inend that, consistent witrh?NSDis current OVersight. as par-ital? its periodic. reviews of national security investigations..atLFBIHe"1 i and ?eld offices?, sheilld review a- b1,b3, .representative-sampiing leads t?oyth'oee Offices, b7E NS'D'ishould asSeSS- FBI compliance applicable egg-1 requiternentS-?in the-use of the lead and in any ensuing investigations, 1 particularly the requirements.governing the. CollectiOII and use ?of ?ersbninformation. its; ,1 av [00/ NF) in sum, we agree that it is dif?cult to assess or gnantify the effectiVene'ss of a particular intelligence program. HoWever, based on the inter-Vistas- we -'conducted and dOCuments We reviewed, we found?that Stellar Windin-format'ion generally played a limited role in the Counterterrorism.efforts, but that the information had valuein some oases? Ingaddition, Some witnesses said the program provides- an -"?early warning syStem?? ?tovailow the Intelligence Coinrnunit}r to detect potential terrorist. attael?cs, even if?the system has not specifically uncovered evidence-rot preparations fer sttoh an attack. Moreover, other GIG-s in the Intelligence are reViewin-g their agency?s inVOlVCmEIlt'With the program and the results-of those reviews, analyzed together, will provide a more eemprehenjs?ivegicture of the program?s overall useiulne-SS. Finally, because the bulk- meta data aSpect of the Stellar Wind. pregram continues under FISA authoring we reocmmend that the N81) take steps to gather information on the centinu'ing operations of the prOg-ra'm, ineludingithe Use and handling of vast amOunts of information perSO'ns and the effectiveness of the program in. FBI ecunterterrorism investigations SEVEN in this chapter We: discuss theug'overnrnent?s statutory and judiCial diSjcov?ery i'ohligations. in international terror-ism Cases- relating to Stellar a information, Under the Stellar 'Wintl program, the-federal government collected vast amounts of info rr'nation, including-the :-eoniten't .?of cations meta dataabouttelephone-rand eem'ail - citizen-s and non? . otentially triggering an obligation und the Fe era. 5 or al Pro edure and applicable 'caseflaw fer the _:govern-ment "to disclose certam information. to the defendant, This obligation created a tension between the need to, protectthe secrecy of the Stellar Wind program and the need to comply with legal disclosure requirements. In this chapter, we examine the process by which the Department of Justiceattemptedto resolve this tension. and meet its discovery-obligations to criminal -defen'dants.403? (U) l. ReleVant Law (U) The government?s obligation to disclo'Se Certain statements made by a defendant-and .to diisclose other information-concerning adefendant in a criminal proceeding comes primarily from two sources: Federal. Rule of Criminal Procedure 16. and the US. Supreme court case a. Maryland, 373 US. 83 (1968'). (U) Federal Rule of Criminal PrOcedure requires the gavernrnent to make various disclosures at. the request of. a criminal defendant. Among other things, the government must disclose ?any relevant written or recorded statement by the defendant if the statement is within the government?s possession, custody, or control; and the attorney for the government knoWs -- or through due diligence could know - that the statement Rule provides that, upon a defendantis request, the government must allow a defendant to inspect and copy papers, ??03 In our review, we did not seek to determine what the government disclosed in Specificca'ses. Rather, we focused on the adequacy, of the process that the Justice Department implemented to comply With its discovery obligations in cases that involved '1 Stellar Wind~derivecl information. documents, data, a-nciaother the item is witl'iinitlrie gorernmEIrtis possession, control?" and the item is material to - defense the government intends to.) use the item inst-its case-V-irrchief. at trial; or the: item?Wa?s; obtained from or'beilongs to the defendant. (U) Under Rule 16., adefendant?s statements carry a??near? presumption of: releases? a?id- Pde?uction off-1 defendant?s, statements;- has fpracti'eally lam-sitter Of right even without. asho?Wi'ngf of materiality-3? United v. Yu-ni's, 86-7 26317,; 621-22., 625 Circuit. loser?? (EU) Disclosure of a defendant?s statements is usually made by the government after receiving a request pursuant to Rule 16. HoWeVe'r?, even a. Rule 16 request,. a'defendant- has an independent rightito discovery of his statements and certain other relevant information under rady'; v; Maryland, 373 U.S. 88 (1963). Brady requires the gavernme?nt to disclose- evidence in the defendant and material to: Material be disclosed if iris exoulapatory or: if it could?bei used to impeach a witness. H'owever, according to the. memorandum, when production of the defendant?s statements or. other inefOrmation wouldreveal classified information, the government may assert a national security privilege, sometimesknown as the state-secrets privilege.405 If the government asserts a ,oo'lorable claim. in. a legal proceeding thatclass'ified information is privileged, the defendant must show that the information is-not only ?404 'See also United States v. Scarpa, 913 F.2d 993, 1011 Cir. 1990), citing United States v. McElroy, 697 F.2d 459, 464 (2nd Cir. 1982.) (?Rule 1-6 does not cover oral statements unrelated to the crime charged or completely separate from the government?s (U) 4?35 Counsel for Intelligence Policy James Baker told us the memorandum was. drafted athis request?by an Assistant U.S. Attorney Who had been detailed to (NPR. Baker said he requested the memorandum to refresh his understanding of the government?s discovery obligations in Criminal prosecutions. (U +100 The state seeretsprivilege is a common law doctrine asserted by theUnited States'government to protect claSSi'fied infermation. See generally, United States v. Reynolds, 345 U.S. (1952). (U) initially arose i mime-mt but material; the: (?e-fondant can. show materiality, some rbat-la-noe'th? defendant?s. nie?d for'diSCLQ'SuretagainSt the-government73? x-subs-?tantial inferno-St :in? protecting Sources: and methods-rassooiatod- With the S??Siti?Ve infrmation-., See United States-g1). (g?nth :Cizl? 19.88); United States-.12. Smith, 781 F.2d 1102, 19:85:) {on-bane). (U) .. 7agavernmentcangalsoinvoke Classified Information.-Procedures. Act 18M to: :pro?_SECutions. does not exlo'a-nd or ?lim'itia defendant?s diSQoVery under Ruiz- '16:.3jrather, CIPA. allowswa- court, ?upon ausu-ffi-cient showing? to authorize the government :toudelote specified. items (of-Classified information fme otherwise discoverabl?: documents, subStituteqa summary-of the information or stipulate; to re'lcvan-t facts that the classi?ed information would tend to prove. (U) As detailed. below-.Vafter- aspects "of the Stellar Were, The ?NeWYo??fTimes and canlfirmedrby Brasi'dentin- December 2005, the Ju Stice" Department invoked-0.1m 't disclosura if 11L. Casas Raise Questions about 'Gnvernment?s compliance Wit-h Discovery Obligations The. tension betwoen-tho- hi.gh1y-olassifijed nature of the Stellar Wind progr'gmand bk" atibnsincriminalpases b1,b3, .. b7E b1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E b7c, 3-35; I b7E celleCtedundE-r .?discoverable- and, more _?;g?zcn?rallyi hQ-wi the Stallar' Wind mightbe. treatedin the discovery obligations in criminal _?prosecutio?ns; Baker-said- herai-Sed these. iissueS? with Attorney General Ash-Croft, FBI Mueller and other Justice Department, FBI, and b1, a- ?rst be made b3, Wh?tihgr. t-h .. ubtained-?through? Stella-f Windam; b6, werecgptu? a fore could ?B'akerrsaid it b7c, tur:nedQL1t 7, ad underFISA-sand b7E C??lfdli bewprOdtLCed? under-that authority. rather than as a? result 0531:6113?- Baker told the that he Was relieved by this ouitbor'ne, butcontinuedfto be 'Cpncerned-abQu-t future cases? b1, b3, b6, b7C b7E b1, b3, b6, b7C, b7E b1, b3, b6,b7C, I recommended to Ashcroft that the S?tic D?eartmentvnotdis: 036 the Stellar Wind program intercepts to the MOD subsequently memorialized his advice in a b1 b3 b6 memorandum . b7C, b7E b1, b3, b6, b7C, b7E 337 True? swumm?fi isn'me 1? muss umumt/ Nu??kl?? 1 It .- I I as. may b6} b1,_ b3, b6,_ b7C, b7E b1, b3, b6, b7C, b7E b1, b3, b6, b7C, b7E i 1? @muum b7c, b7E' - . JuStice Department review of his lactiOns, Yoo has acmioi?edged that he is not well versed in criminal law. During an Department?s Office of Professional Responsibility (CPR) in cenne?ction'With its investigation concerning his legalopinions in support Voila:detaineeinterrogation program, Yoo stated that ?criminal prosecution process theDepartrnen-t was: not my Specialty,? and ?criminal law Was not my: area-Mm? I i E131. Criminal Divisioia Examines Discovery Issues (U) Folilowin? the Justice Department?s Criminal iiyii'sionwasftas ceve oping procedures for handling Rule 16 b1 b3 b6 disclosurehusbcause the issues fell within its area of expertise. As 9. Mb b?7E? Remain 0' bx? Patrick Rowan, a senior counsel in the Criminal Dirision, was, read into the program to deal With Stellar Windmrelated discovery issue?s. ROWan?s supervisor, Criminal Division Assistant Attorney General Christopher Wray, was also read into the program at the same time. b1, b3, b6, b7C, b7E to detainee interrogations. Yo'o drafted legal opinions for this program while in the Of?ce of Legal Counsel. Ploweizer', as discussed in Chapter Four, in contrast with the Stellar Wind program at least fourother OLC attorneys assisted 'Yoo with drafting the legal memoranda. also? able to consult with Criminal Division attorneys and the client agency on this matter. WW We?? th??i? 51: Department attorn?ys with criminal. IDiviSi-Gn?level for terrorism Prosecutions to instead into the. Preemie I - 1 ?Wray?tolgdl'theOIG that after-his and Rowan.?s read-win, they ?Were-kind (if left. on om? He said- that? noao'ne directed or Rowan to. continue. studying-the Rule 16 issues or'the governments Brady obligations in international terrorism proseoLitions, nor-did anyone tell to develop-any judgments of opinions on subject. (.U) Some'point after-his- readis-in he may have read Yoo? memorandum, on the Department?s discovery b1,b3, obligations] in and he instructed Rowan to review the b6, 1376, memorandum; Rowan. told- us that he Was familiar with 'Yioo?s b7E memorandum, but stated that he could not recall whether the purpose of- -Yoo?srmemsrand 'tola "Ouztfi?'ge?eral the pertinent legal issUes . document how 11. particular'was to be handled. Rowan litC?d 'havingiany Problems with the conclSusiOris. Ybo reached, . . . The ?I'nf0rmal Process? for Treat-ing- Discovery Issues in International Terrorism Cases (U) During-his interview, Rowan described the processes at the Departmentprior tothe. December 20052 disclosure of aspects of the Stellar Wind-program in The New York Times to address discOver}r obligations with respect to Stellar WindmderiVed information. He'Saidrthat the NSA was generally aware of the Justice Department?s international terrorism criminal cases, at least (in part due to ongoing Contacts with Patrick Philbin others inthe Department. AceOrding toRowan, the general awarenessof the Departments international terrorism docketamotmted to ?informal presses? for Spotting cases that may present discovery issues. RWan- stated that prosecutors in U.S. Attorney?s Offices typically Would. request the NSA to perform ?prudential searches? of its databases for any relevant information concerning their prosecutions, including fer discovery purposes, although this did not happen in every international terrorism case. Rowan stated that if the NSA located any responsive but classified information, it would be expected to notify senior Justice Department officials with the requisite Clearances about the information. said he Was confident that if Brady infermation were-known to the NSA, it would be brought to the? attention of the Department and steps Would have been taken. to dismiss the case or otherwise ensure the prOgram was not disclosed. In addition to these routine communications between Department prQSecu'tOrs and the NBA in criminal prosecutions, Rowan described other measures'that Were in place .tokeep Stellar Wind?derived information out of the criminal prosecution process. stated- that. the FBI had ?Walled off-?1' collected. from inclusion asesby tippingout: - Stellar information under 11th- a? caveat. that: the b1,- b3, i?formation in?l?i'tipper was Rowan notedithat WE had place a; scrubbing-processto deleteprogramsderived, informatian from FISAiapplieations, Rowan these was used in international? terrorism prosecutions?l?? Finally? Rowan stated that the FBI get up,? thereby-minimizing: thelrikelihooct the? database would be the sole repository of Brady material. ,1 foe/Ne,L - B. Dis n. a, COVer-E?ssaes-Raisecl he'fS?tenar Wind?Program? - I I: GI. . ed? (in-thermemorandnm? largffily ale C: ,aSionally with Rowan ?saidvitWa's .diffieultFtoWork the matteribeeause' o?fzthe secrecy surrounding- the program-and the gf'hi'sjob?iw4'15 .A?s_disc1Issed in Chapter. Six, the caveats were intended to exclude-1 at outset any Stellar- Wind?derived information from FISH appliCations and othercrimmal pleadings. The .s?crubbingprocess acts as alsecond Cheek-against ineluding information'in FISA applications. However, neither the caveats nor the scrubbing process relieved the government of its obligationsunder Brady to disclose evidence in the government?s possession favorable tothe defendant and material to either guilt or punishment. 417 The memorandum noted, ?Because there were no additional attorneys within the Criminal Division who were read into the program (andv'ery few in the Department, l, we have been Unable to assign work to others or to fully consult with others b1, b3, b6, b7C, b7E b1, b3, WE. bjl, b3, b7E- For cases in which the Intelligence Community :nagctive:involvement in the, criminal investigation, the USAM stated that thereuare two circumstances in which the prosecutor must conduct a ?guitable search? of Intelligence Community files: where the prosecutor has ?direct or reliable knowledge? that the Intelligence Community bl, b3, b6, Brady or other discovery materialeor, in the absence *of' Suits-h'lenowledgle, Where ?there nonetheless exists-any-reIi-able indication 'thatil?the Intelligence Community possesses such material anSAMi Criminal Resources Manual 22052 (20:02). The USAM stated that, I "as. augeneralrule, a prosecutor should not Seek access to Intelligence files! unless there-Tie an af?rmative obligatiOH to do. so. However, 'itnnotecl that certain types of cases, including terrorism prosecutions, fall genera-1 In. Such-case's, the .ad-Vilsed that the should conduct search.? Id. Roman Wrote that the practice in several sections Within. the Criminal: Division'- was :to ?generally go beyond. both the legal obligations-outlined [in his-memorandum] and the general rule. outlined in the USA-M, initiating: searches-out of prudence, rather than a legal obligation.? For instance, the practice of the Criminal Division?s "QjounterespiOnage Section was to search Intelligence Community files away cage, even in 'i'nstancesfinqwhich: the. Intelli emcee Cbmmunifty lad eat ig'elice? collection concerningthe defendant as"?isuggested by the faets of the 'rnatter.? He added that the searches were requested 'fOr a variety of reas0ns, including; for purposes of meeting dichVery obligations. Dionnsaid that searches also were requested to determine whetherthe defendant. has a*?re1ationship? with an intelligence agency. He noted that CES does not request prudential searches as a matter of courseito avoid making spurious requests . ion said was a. proponent 118 prosecutors With-Whom CBS Co-prosecutes? cases should have the same knowledge-as C-ES concerning the ?national security equities" involved-in each case. Dion/said this arrangement also allows for the who is often the prosecutor most familiar with the case and the jurisdictional practices, to review any Intelligence Community material fOr Rule 16 and Brady purposes. Dion acknowledged the limitations- ,tolth?is arrangement concerning strictly com-partrnented programs?such as Stellar Wind, where the NSA Understandably'would.be reluCtant to read in line prosecutors 'for?the limited purpose of screening defenSe discovery requests. "was for attorney to use the provisions of to prevent disclosure ?Offsetgi?itivefmaterial. Rowan noted that other sections within the Criminal to protect Intelligence Community ?les found 1- - When RoWan became principally responsible for coordinating the Department?s defense discovery requests as a Deputy Assistant Attorney General in the (Cont?cl.) C. Shortly before. Roiwan finished his. memorandum Principal. .e'putyzASSiStant Attorney General-Steyei-Brad ury?biecam? he: acting-head of 0L0. B'rad?bul'y told us: that hereealled-havingsome discussion with Rowan about-how:disc0very matters should be-handle "in With the Stellar Wind program. Bradbury Said that John- 'Eieenberg; later a Deputy in have discossedthe matter With 2 zeradeury? stated thathe- did not believe that followed up on RoWan"s request that it continue researching these issues. -.. b1,b3, ed the Rule 16 lss-ue With Rowaniat b6) WC, Eisenb?erg told us that he discuss. eussed theBrady issue. He, WE semezpoint, but did not I I recalled ?di?souSsing Yoo' emorandurn:With-Rowanand said-behelieyes Jens ?oepar. took pesiti'on' that theY?o?o was?icorreot, at least With. respect to Yoo?s?legal analysis in When we Showed Eisenber?g a copy of Rowan - memorandum, thathe?h?acl notip Eisenberg. tel?d?usf that 0 LC would" not-typically beresponsible for addressing disecwery issues presented in Rowants memorandum and that he was not aware of any opiniOn on ?the'subjeotvother than lino-is Eis'enbe-rg also jsaid?he-was net aware Of ferr?n?a'l proeeduresfor handling Rule ,16 disclosure requestsor the go'irernmente affirmative Brady obligations Other the. experte in camera motions practice pursued by the National Security Diyis'ion, discussed below. Chief Dion agreed that OLC would not be the appropriate entity to review discovery procedures in the context of Stellar Wind, in part because OLC attorneys-generally do not have Criminal litigation expertise. Dion suggested that if?the- Department Were to develop procedures for handling discovery of Intelligence Community files, it should. be done by the Department?s National Security Division in coordination with United States Attorneys? Offices, and it should be binding only on those two entities. Rowan, while generally agreeing with Dion, told the OIG that he believed the OLC appropriately could have analyzed the legal issue of what impact a The results. Of'tli'ese sea'rohes were produced to the coUrts ex paras saga, pursuant to CIPA. WW) The - would hairs on the government?s Brady obligations- Wray? also told us that there W'asino organized Departmental effort to establish ifOrma-l procedures for reviewinginternational terrorismr "prosecution-s to .comply'with Rule 16 diSCI'osure? requests and? Brady HE Said ?the thinkihg it'l?iait'the? memoir-ancient Was- the. "?fir?St step? toward devising, ?Some kind wof. ?SYS'tem'ati'zeid process,? for ravigws, waever,we found'nonindicati-O? request to further studytheseidiscot?rery issuestwith any, of written product. :9 T- Use Of the Classi?ed Information Procedures Act (QIPA) to ?Re3p0nd to: Disemmry Requests After publication of The New Yorkaimes article's-in December 2005; the Justice" Dapart-iment received. numerous disecw?ry requests in'coenection with international? terrorism prosecutions throughout the country. After '?e?eseiart'ioles, additional of?diails- in the- were read into the Stellar Wind program, including the new AsSistant Attorney GeneralAlice other {Senior officials, both to irass?iTSt. With: the Criminal} 'DiviJSion?s . investigation into; the - leak-sot? information to ThelNe?W York Times and: to- hand?lef'the discover-y requests fellas/ring; the public confirmatioir of the program by the President in D'e'Cei-niber 2905;493 After the National security DivisiOn was createdinSeptember 270.6,. it assumed much of ?the responsibility for-handling: therespo?Se?s to idis?oc?J?Very'requestsTypically; the defensemotions sought 'tolcompel the :goVernment to produce information concerning a defendant that had been derived-from the ?Terrorist Surveillance Program,? the termsometimes used by the government to refer to what the President con?rmed after publication of The New York Times articles. The government reoponded to the discovery requeSts by ?ling ex parte in camera responses requesting to ?delete items? from material to be produced in discovery pursuant to In the following sections we provide a brief overview of CIPA and its use in international terrorism cases potentially involving Stellar Wind?derived intelligence. ovewiewor CIPA an) The Classified Information Procedures Act. 1-8. App. 3, ?vvas. enactedin 1980 to provide proceduresfor protectingclassified: information in federal criminal-.prosecutions. When a party to a criminal proceeding .noti?esthe COurt.~that: Classified information will .be used in the course (if-the proceeding?. CIPA- requires the Court toinitiate-procedures to ?determine .the use, relevance, 'or'admissibil?ity of the classified information that would 'oth-emise.lbe made or pretrial proceeding.? 18 App. 3' Where the government holds the. claSSified- information,rit maybring? tin-smarter beforezrthe Cour-t .e'x?parte; but it also must provide notice to the defense thatclassifi?ed information is at lesue. Id. at? (U) ProteCtive procedures generally are established through a CIPA hearing-With both parties present. "The hearing may be conducted in camera if thet?government certi?es: that all in camera. hearing is necessaiy to: pro-tee: classified. information. 'Id. :at Typically, the government an order-to protect against the disclosure of any ClaSSi?edinformation tether defense.- Thegovernment may also seek to withhold produCtion o?f-the o?cl?asrsiifi-ed?information in one of three ways: (1) deletion of the Classified the) materi-aldis'closed to the defendant, (2.) summarization of the: Classified information, or admission of certain facts that the classi?ed information wouldztend to prove. Id. at 4. Based on the review-of CIPA filings related to the Stellar Wind program-, the government has only used optiOn 1 (deleting classified items? from material tobie disclosed to the defendant?) in response to defense motions for Stellar Wind information. To prevent the disclosure of classified information, the government may make an exporteshowing to the court. TO do so the government must Submit ?an affidavit of the Attorney General certifying that disclosure of classi?ed information would cause identifiable damage to the national Security 0f the United States and explaining the basis for the classification of such information.? 1d. at? If the court decides that the defendant?s right to access to the evidence. outweighs the government?s national security interests, the government can choose to dismiss the indictment rather than make a disclosure. United States v. Moussaoui, 382 F.3d 453, 466 n. 18, 474?76 (4th Cir. 2004). (U) B. Use ofClPA in International Terrorism Prosecutions Alleged to Involve Stellar Wind-Derived Information . ?reviewed the CIPA pleadings files maintained in the National Security Division relating to the Stellar Wind program. In almost every instance, the. CIPA litigation was handled by the National Security Division- the: in?olvement ofthe lingprosecutorsin the" US. Attorney?s: Offices th theunderlying'zpijosecutiens who Weren'ot read-intoThe SCOPE andnature of the defense motions initiating the litigation varied}. depending on the procedural posture of the case. For some-defense motioiis-?s?ought to compel discovery of N-SA suiiVeillance information, while others. sought 'to suppress-all government the.a1ternativ,ei have the dismissed of; memory thatillegal - a .. Ii. m'r? hefirst itista?Ce Regardless-of the varying procedural p0sture of the cases and the sco'pejxahd {nature of the defense}motions, the governmentresponses we :exatininediwere uniform, consisting of a motion to delete items 'from. ediS'Z'ooifrery', a legal .memorandumsin Support of the motion, declarations from sonic Officials, and a proposed ordera The 1ggovernme'nt?s CIPA Submissions aeserted that the information at issue ,inv?thie discovery litigation was classified and subj act to the national Security priVi?lege as codified in CIPA. They en?erally d?escribedthe types-of The-government?s. responses 'we reviewed uniformly stated that the intelligence reports had not been or would not be. evidence, and that therewas no-causal Connection between the in?the reports and any evidence. used or to housed at trial, or too attenuated from the evidence to be discoverable. The. government area-edema: because the facts concerning the NS?A?srreportingWould-not the-defense, the court need not explore the sourcesand methods need to thefi-nforjmation?. 'I-?he submissions also argued that the information by the SA was not included. in the governmentis PISA application, and therefore Was too attenuated from the trial evidence to ?Inerit?a' revi?ew?of then-leans by'which the intelligenceinformation was gathered. The "government asserted that the ?Causal connection? between discovery of the- de-riivatiVeIeVideHCeand the alleged illegal search ?may have become so taint.""495' It is important to note th . b1, b3, l-qr-l'lggz-IL'VI-niGovernme-ntl?trgumen?s inSpeci?c Cases (U) . WE section we describe ases that illustrate the arguments made by the government-in CIP-A litigation with respect to defendant?s requestsfor discOvery Stellar W~ind~deriVed .informatiOn. . 32several instances, the Stellar Wind information was disseminated within the FBI after the FBI already had obtained a FISA order to conduct electronic surveillance of the defendant, thus allowing the government to argue that the NSA reporting played no role in its acquisition of the evidence used or planned to be used against the defendant. ?13? Nardonev. United States, 308 US. 338, 341 (1939). The government also argued in it's Submissions that suppressing its evidence. would not serve any deterrence purposo. ?The government argued that the SA acquires, processes, and disseminates intelligence not to produce criminal prosecutions, but to protect the national security. .It assertedthat any suppression of evidence would therefore frustrate a criminal prosecution and create an incentive for the intelligence community not to share information with law enforcement, thereby harming national security. WW b1, b3, b7E ANALYSIS (U?l that the Department made little-effort to-miderstand and comply with its discovery ebligations in connection with Stellar information for the?rrst :?seVeral- years of the. pregram. "The Dsp?ar?hentls'limited initial effort was 8150- harnpere?d by the limited number cfiattomeyszw?fho were-read into the program. Asa result, OLC attorney Jaehn Ypo. alerie initially alialyZed the government?s discovery obligations in- one early case, and he produced a legal analysis that was based on an inserted understanding of- .the facts ofthe. case to which it applied. When other attorneys?from - ?ead into r?o ram ','fthe Department eventually took 'steps toadd'ress ts discovery obligations. Hewever, in ourvi'ew, it es ,prsere riot compl? and do not fully ensure that the government has met its discovery obligations regarding infermation through the Stellar Wind program. As described in this chapter, in 2002 the Department ?rst recogniZed that the Stellar Wind program could have implications for diSCovery obligations in terrorism cases. OIPR Counsel Baker raised with Department bl, b3, b6, b7C, b7E i? officials ?the Question of how the government would meet its discovery? Obligations regarding Stellar Wind information. Despite the Department took no action at this time to b1 b3 ensure that itrwasg in compliance with Rule 16 or Brady with respect to b6, Stellar-Winduderived' information. We believe that-at this point senior b7?c Department.offieials. were on. notice that, at a minimum, the?di-sc?ove merited-attention Howev? ncrete action Was taken until ear intthef-Context-of when thefDepartment had to address how Stellar?Wind: information that was not also obtained Under b1, b3, b6, b7_cerror in Yoo?S legal anaily-sis'may have resulted in part from the failure to set his memorandum to typical OLC and Department review and Because other Department attorneys were not read into the Stellarwindprogram, the risk that the Department would produce a b1, b3, factually ?awed andinadequate legal analysis of these important discovery b6, issues was escalated. As we concluded in Chapters Three and Four, we b7C, believe the lack of sufficient legal resources at the Department during this b7E early phase of the Stellar Wind program hampered its legal anal sis important issues related to the program. We believe that Yoo?t memorandum is one more manifestation of this problem. In: July 2004,, Patrick Rowan, a senior counsel in the Criminal Division; Was read into the program and conducted a more systemic - r. .L *1 358 row semi; [tree [at ll mammal itinerant? smemerandu?m, RoWan Initiated a 1equest that the is be further '1 . other than "in informal discussions with Rowan Concerning ?Yo'ois memorandum, OLC did not further examine these issues or b1, folalow?upen-Rowan?s recommendation. While we recognize that. OLC was b3, net responsible for developing litigative strategy on this issue, We believe b6, that. or another appropriate Department compenent should have. b7ci providedzguidancem this important legal issue; b7E We recommend that the Depa? assessment eithe importa that. Still! remain unresolv the legal of a plea on?thei'governments disclosure obligatiOns under Rule. 16 -and_'in. particmar Brady. We believe the: Department. should careful;lyi=eensider Whether it must reexamine past. cases to See Whether but undisclosed Rule 16 or- Brad'y material was reolleeted "the NSA, and. take appropriate stepSrto ensure that it has complied With- its discovery obligations in such cases, HeWeVer; "the Departments handling, of these motions did not re we the Department to?ider'iti?r the potentially discoverable information derived under the Stellar Wind program that may exist in other cases. We recommend that the Department, in coordination with the NSA, develOp and implement a procedure for identifying Stellar Wind?derived. information that may be associated with international terrorism eases, currently pending or likely to be brought in the future, and to evaluate such information in light of the government?s discovery obligations under Rule 16 and Brady. (Tspp} EEGHT STATEMENTS THE SURVEIELLANCE PROGRAM. '(Ul This chapter examinesAttorney General Alberto Gotmales?s'testimc?njy andspublicstatements related to the-Stellar Wind program. Aspects of this program were first disclosed publicly ina series of" articles in The New. York Time?sin'December 2005. In reaponse, the President publicly Con?rmeda portionofthe Stellar Wind program interceptiOn of the COntent Of international communications of. peeple reasonably believed to have links to. alQaeda and related organizations. ?Subsequently, Attorney General Gonzales was questioned about the program in two hearings before the Senate Judiciary Committee in February 2006 and July 2007. in between those two hearings, former Deputy Attemey General James-Conley testified before-the "Senate Judiciary" Committee about the dispute between the Department and the White House concerning the program. Gonzale?ss Corney?s differing congreSSiOnal testimony led to allegations that Gonzales had made misleading statements to Congress about the-dispute and the program itself.'43'4 (U) this chapter, we examine Whether Attorney General Gonzales made: false, inaccurate, or misleading statements related to the Stellar Wind program. 1. Summary of-the Dispute. absut the Program (U). As described in detail in Chapters Three and Four, the Stellar Wind program: is best understood as consisting of three types of collections, referred to as ?baSkets.? BaSket 1 related to the collection of email and telephone content. Initially, the Stellar Wind program. collected email and telephone content when probable cause existed to believe one of the parties to the call or e?mail was outside the United States and at least one of the communicants was a member of an international terrorist group. 434 For example, Senator Arlen Specter stated at a Senate hearing on July '24, 2007, that he did not ?nd Attorney General Gonzales?s testimony to be credible and suggesredto the Attorney General that he ?review this transcript very, Very carefully.? After this hearing Senate Judiciary Committee Chairman Patrick Leahy sent a letter to the BIG, dated August 16, 2007, asking the-01G. to review Gonzales?s statements to determine whether they Were-intentionally false, misleading, or inappropriate. Gonzales testified several times before, the S.enate and House Judiciary and Intelligence Committees about the. program, In this chapter, we focus on his February 2006 and July 2007 testimony in which he discussed the events of March 2004; (U) asket 2 involved bulk Collection. of telephony meta data, basket of email meta?data-l . i 'T-he?Se collection-swam. authorized by a Presidential Authdrization that Was, rewisjsued; atapproxirn-ately 30' to 45?day intervals. Each Au?iorization was certi?ed. as to form and legality by the Attorney General. The Attorney Generals were V-iniitia?y supported by Is gal opiriiOns from. 010 attorney ohn ?Y'oo affirming the legality of the program. ?1 mp) As discussed in Chapter 'Four,..after Jack Goldsmith was con?rmed as Assistant Attorney General for OLE in r'OGtober 2003; he, alone with Assodate Deputy Attorney General Patrick Philbin, conducted. an analysis "of legal basis-underlying eachhasket in the Stellar Wind pregram. As (if this review, he, Philbin,'and recently Confirmed:DeputyAttorney' In early March 2004-, the dispute between the Department and the White House over the Department?s revised legal analysis of?the Stellar Wind program came to a head. Deputy Attorney General Comey, who assumed the duties of the Attorney General when Attorney General Ashcroft was hospitalized, informed the White House thatthe. Department could not reCert-ify the program. This dispute culminated in the unsuccessful attempt bythemWhite House, Counsel Gonzales and White House Chief of Staff Andrew Card to get Attorney General Ashcroft to overrule Comey and reCert'ify the program while he was in the hospital. When Ashcroft refused to. certify the program and said that Comey was acting as the Attorney General, not him, the President reauthorized the program without the Attorney General?s certification. instead Gonzales, as White- Hous'e Counsel, recerfti?ed. the program. After-theWhite?HOu?se?s aetions to continue the program withoth Justice Department'-ce-rtification, Deputy AttOrney?General Conley, FBI Director ?Miae'lier?and many other senior ?Department:officials, considered we v. Presidentilearnedaof this he dime-ted the IE. New Articles and President Bush?s CO'n?rmat'iOn Regarding NSA Activities In 2004, aspects of the Stellar Wind program were disclosed to two reporters for The New York Times. The?reporters, James Risen and Eric sought to publish an- article about the program in late. 2004. HoWever, after-a series "of meetingswith Administration of?cials who argued that publicatiOn o?fithe story would harm the national security, The New. YO'rleaimes agreed to delay publishing the The New York Times eventually published a series of articles about the-program on December 16 through 19, 2005. According to one of the reporters, the Times decided to publish the articles at least in part "because the: newSpaper learned of serious concerns about the legality of the program that. had ?reached the highest levels of the Bush Administration.?435 (U) The first article, on December 16, 2005, was entitled, ?Bush Lets US. Spy on Callers Without Courts.? This article stated that ?Months after the Sept. 11 attacks, President Bush secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity without the court?approved warrants ordinarily required for domestic spying, according to government officials.? The article deserih'ed in broad terms the content collection aspect of the NSA program (basket stating that according to of?cials the NSA has ?monitored the international telephone calls of hundreds, perhaps 435 See Eric Bush?s Law (2008), p. 203. (U) thousands, offpeople inside the United States without warrants over the - in an effort to track possible ?dirty- numbers" linked to al? Qaeda.? The article stated that the NSA continued to seek warrants to monitor purely d?Omestijc The article asserted that ?reservations about. aspects of the program? had alsoi'been-eicpressecl by Senator Jay Rockefeller (the Vice Chair Of the Senate Select, Committee on Intelligence) and a judge who presided over the FI?SAiCourt. The article added, ?Some of the questiOns about the new powers led the administration to temporarily suspend the operation last yeari?and .impOSe more restrictions, officials said.? The article also stated that ?In mid?2004:, concerns about the program expressed by national security officials, government lawyers and a judge prompted the Bush administration to suspend elements of the program and revamp it.? H'QWevier, the article incorrectly tied this suspension of the pregram to Judge Colleen I{ellar?KoteUy?s concerns that information gained from the program was also :being used to seek FISA orders, rather than to the March 2004' betWeen Department officials and the White HOuse about the legality of'raspects of the program. On December 17, 20.05, the dayafter The New York Times published theaf-i-rst article, President Bush publicly acknowledged the portion of the NSA program that'Was described in- the article. President Bush deacrib?ed bread terms these electronic surveillance activities, stating; In. the weeks following the terrorist attacks on our nation, I authorized the. National Security Agency, consistent with U.S. law and the Censtitution, to intercept the international 'commUniCatiOn-s of. people with known links to al 'Qaeda and related terrorist organizations. Before we intercept these communications, the government must have information that establishes a clear link to these terrorist networks. This is a highly classified program that is crucial to our national security. Its purpose is to detect and prevent terrorist attacks against the United States, our friends and allies. Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our natiOnal security and puts our citizens. at risk. Revealing classified information is illegal, alerts our enemies, and endangers our country . . . . The activities I authorized are reviewed approximately every 45 days. Each review is based on a fresh intelligence assessment of terrorist threats to the continuity of our government and the threat of Catastrophic damage to During each. aesessment, previous :?activ'ities under the authorization'are reviewed. The. review includes approval by our nation?s top legal offioials, ineluding the: AttOrney General and the counsel tothe President. I have reauthorized the program more than '30 times since the September ?1 1th attacks, and I intend to do sc-for vas- longgas our nation faces a continuing threat from al Qaeda and related (U) TEL Other Administration. Statements (U) On January 19, 2006, the: Justice Department issued a doCtlment, informally referred to as a ?White Paper,? entitled ?Legal Authorities Activities of the National Security?Ag'ency Described by the President? The 42.~page document addressed in an unclassified form the. legal basis-for the collection. activities that in the December, 16", 2005,, New York Times article and other media reports and confirmed-by President Bush. The White Paper stated that the President asknOWledged that ?he hasauthoriz'ed the NSA to, intercept inter-natiOnal communicatiOns into and out of the United States of persons linked to al Qaed?a cr. ?Other'rela-t'ed terrorist organizations.? (U) The White Paper reiterated the legal theory advanced by the Department in Goldsmith?s May 2004 memorandum about the revised, NSA program?! which Concluded that the September 18, 2001, Congressional AuthorizatiOn' for the Use of Military Force authorized the President to employ ?Warrantless communications intelligence targeted at the enemy,? a. fundamental incident of the use. of militaryr force, pursuant to the President?s Article .11 Commander?in?Chi?ef powers. The White Paper also argued that the activities were consistent with as confirmed and supplemented by the AUMF. On January 22, 2006, the White House also issued a press release and memorandum to counter criticism of the NSA program by members of Congress. The press release was entitled ?Setting the Record Straight: Democrats Continue to Attack the Terrorist Surveillance Program.? This document was the first time we found any official use of the term ?Terrorist Surveillance Program? to apply to the NSA program or aspects of the _program.437 ?36 The full text of President Bush?s December 17, 2005, radio address can be found at lQ/print/ZOOS 1217.htm1. (U) ?137 See We- found that the term was used in the media prior to this time.- The first published reference A on J'anuaiy 23, 2006, President Bush referred to the ?terrorist surveillance. program? during :a speech at Kansas State University: Let-me talk. about one other program. . . .. something that you?ve been reading; about in the news lately. It?s What I would call a terrorist surveillance--piiogram. (H) In thez?s'p?eech, President Bush described the program as the inteirception'?of oertaii-n communications "emanating between somebody inside the United States?and outside the United States; and one of the numbers would be reasonably suspected to bean al Qaeda link or affiliate.? (U) 011 January 24,: 2006, Attorney General Gonzales delivered a speech at the G?eOrge-toWn University Lav?T Center which, according to his prepared remarks, began. by stating that his remarks?s_peak only to those activities con?rmedypublicly by the President, and not to purported activities described in press reports.? Gonzales referred to the program thronghout his, SpeeChv asieith-e?r the ?terrOr-ist surveillance program? Or ?the terrorist surveillance program.? (U) 11V. 'Jl?e'stimonyand Other Statements (U) After. the-New York Times a?rticlescliSclosed aspects of the SA program, members of Congress expressed concern that the President had eXceeded his authority by'rauthorizing electronic surveillanCe activity without FISA orders and congressional hearings were held on the issue. Gonzales testified before the Senate. Judiciary Committee on February 6, 2006;, and July 24, 2007, about the surveillance activities. We describe, in the next sections his testimony and other" statements he made about?the activities, as well as testimony by former Deputy Attorney General Corney before the Senate Judiciary Committee on May 15, 2007. we foUnd to the ?terrorist surveillance program? in connection with the NSA electronic surveillance activities was in NewsMax, an online news website, on December 22, 2005. (U) See ?Barbara Boxer: Bush Spy Hearings Before Alito," Ne'wsMaxcom, December 22, 200.5, 12/22/173255.shtm1. On January 20, 2006, the term. appeared again on another- Internet blog. called ?RedState.? See ?Making the" case for the NSA terronst surveiilance program,? at [0977. (U) Geneale?s?s February 6-, 2006, Senate Judiciary Committee Tastimonr (U) Inhis? opening statement before the Senate Judiciary Committee on February 16,, 2,006,, Gonzales began by saying that his testimony would necessarily be limited: Before going any fu?rtherJ-shOuld make clear What I can disctisS today. 1am- here to explain the Department's asgeSSment that the President's terrorist surveillance program is consistent with our laws and'ConstitutiOn. I am- not here to: discuss the operational details of that program, or any other classified activity. The President has described the terrorist surveillance. program in response to certain leaks, and my discussion in this-open forum must be limited to thosefacts the President has publicly confirmed nothing more. Many operational details of our intelligence activities remain classified unknown to our enemy and it is vital that. they. remain so. Thea-questioning; of Gonzales at this hearing focused primarily on. the nature of the. surveillance. activity and the legal basis for it.?i33 SenatOr Charles SC-humer asked? Gonzales specifically about accounts of a diSagreern'ent With-in the Justice Department over the NBA program:. SCI-IUMER: But it?s not just Republican senators who seriouslly?question the NSA program, but very high?ranking officials within the administration itself. Now, you?ve already .acknoWledged that! there were lawyers in the administration "who expressed reserVations about the NSA program. There was dissent. Is that right? ATTY GEN. GONZALES: Of course, Senator. As 1 indicated, this program implicates very difficult issues. The war on terror has generated several issues that are very, very complicated. SEN. Understood. ATTY GEN. GONZALES: Lawyers disagree. 4-33 Neither the Chairman of the Senate Judiciary Committee at the time (Senator Specmt), nor the Ranking Member (Senator Leahy), Were read into the program or provided the under-lying documents authorizing the program. Senator Lea?hy stated at the outset of the hearing that he and others had made 'a request to review the Presidential Authorizations and OLC memoranda about the program, but that these materials had not been. previd?ed to the Committee. (U) SEN. [concede all those points. Let me ask you 'ab'oiit some.specific-reperts. It?s-iibeen reported by multiple neW'S'Qu-tlets; that the former number two man, in the usti'ee- Depar-thnt, the" premier-"terrorism prosecutor, Jim Cemey, "expressed gram reservations-about? the NSA program? and at least once refused to give it his bie'Ssing. Is that true? GEN. --GON-ZALES: senator, here?s a response that I feel that I can give with?respee-tto- recent. speculation or stories about disagreements. There has not been any Serious disagreement, inc-ludin?gmand lithink this is accurate there?s. notbeen any serious disagreement about the program that "the President has confirmed. There. have been disagreement-s about other matters regarding operations, which I cannot get into. .I will also say SEN. SCHUMER: But- there was some - I?m sorry to cut you off; Buti_'there Was sOme' dissent with-in the administration, and Jim Co'mey- "did express- at some point that?s all Ii?asked you some reservation. GEN . GONZALES: The,point I want to make is that, to my knowledge, none of dealt with the program that we?re talking; about today. They dealt with operational Capabilities that we?re not talking. about today, SCHUMER: I want. to ask?you again about -- I?m just we have limited time. Yes, sir. It?s also been reported that the head of the Of?ce of?Leg'a'l Counsel, Jack Goldsmith, a respected lawyer and professor at Harvard Law School, expressed reservations about the program. Is that true? ATTY GEN. GONZALES: Senator, rather than going individual by individual SEN. SCHUMER: No, 1 think we?re this is GEN. GONZALES: let me just say that I think differing views that have been the subject of some of these stories does not did not deal with the program that I?m here testifying about today. SCI-IUMER: But you are telling us that none of these people expressed any reservations about the ultimate program. 'Is that right? 368 artery 'il are; l! Haggai}! eggm GEN, GONZALES: 'Senator,.l want to. be very. careful here, because, of course, Il?m here only testifying aboutwhat? the Ere-sident has. confirmed. And With respect to what the Pre'Si?den?t has confirmed, believe.w I do not. believe that these officials that you?re identifying had concerns about this .program.? (U) Throughclut the hearing, other? Senators asked Genzal'es questions relating to of the NSA "program, and GonZales would often: qualify his answers by stating that he was not discussing activities beyond What the President had confirmed. However, in doing so Gonzales sometimes suggested that the activities under the program were limited to What. the President had Confirmed. In one 'exchange'With Senator Lejahy, for eXample, Gonzales suggested that therelectr'onic surveillance activities the President had publicly confirmed were the. only activities. the President had authorized to beconduoted. Specifically, in response to a series of questions from Senator ?Leahy regarding what activities beyond warrant-lesselectronic surveillance Gonzales would deem legal under the Authorization for the Use of Military Force, Gonzales stated, Sir, Ill-have tried to outline for you and the. committee what the President has authorized, and that is all that he has antherized. . . There is all kinds of wild speculatiOn out there. about what the President. has authorized and what we?re actually doing. And I?m not going to get into a discussion, Senator, about 'hypo'thetiCals.439 ?39 On. February 28, 2006, Gonzales wrote to Senator Specter to provide additional respOIiSes. to questions that he had answered during his February 6 hearing and to clarify Certain responses. Gonzales Wrotethat he con?ned his letter and testimony to the specific NSA activities that have been publicly con?rmed by the President. Those activities involve the interception. by the NSA of the contents of communications "in which one party is outside the United States where there are reasonable grounds to believe that at least one party to the communication is a member or agent of al Qaeda or an af?liated terrorist organization (hereinafter, the ?Terrorist Surveillance Program?). One response Gonzales sought to clarify was this response to Senator .Leahy. Gonzales wrote: First, as I emphasized in my opening statement, in all of my testimony at the hearing I addressed with limited exceptions only the legal underpinnings- of the TerroriSt Surveillance Program, as defined above. 1 did not and could not address operational aspects of the Program or any other classified intelligence activities. So, for example, when I testi?ed in response to qties?tions- from Senator Leahy, ?Sir, I have tried tooutline for you and the Committee what the President has authorized, and that is all that he has authorized,? Tr. at 53, I Was confining my remarks to the Terrorist [Cont?d.) inresponse to Senator Saanrotvneback?s. question about: whether the ELSA-application process Vitou?ld in-Clu?de. ?even thesesOrt of operations we?re readabout: data mining operations? Would that-include those sorts; of operations, or-are' those totally a-separate-type of field?? (U) Geneales .I?m not here to talk about that, Again, let me justcaution _.eveij_zoneithat youneed to read these stories with caution. 'Thejrevis-alot of. mumbling mean, mi'Xing and man-gling of activitieslthat are totallyunrelated to what the President has authorized under the terrorist ?surVeil'lance program, and so I?m uncomfortable talking about other kinds of Operations that might ??'that are unrelated to the terrorist surveillance program. Comey?s May 15, 2500?, Senate Judiciary Committee Testimony Former-Deputy Attorney General Comey appeared before the Senate Committee on May '15, 2007, in a hearing Called to examine Whether the Department had politicized the firing o'f'US. Attorneys. senator-Schumen who presided over the healing, began the. questioningby askingi'Coimey about reports. injthe media. that in. March 2004 White House. counsel G0nZa1e8-'and- White House Chief of Staff Gard had visited Attorney General Ashcroft in the .hospital?in an effort to override Comey?sdec?ision, made "when he served as General, not to certify a classified program; Comey?wasasked to recount the details of the incident. (U) After prefaeing his remarks by stating that he could not discuss classified informatiOn, Comey described the. events of March 2004., ineluding theconfrontation betWeen the Department and White House officials in .Ashcroftishospital room. in describing these events, Conley referred to a single classified program. For example, Comey testified that: In the early part of 2004, the Department of Justice was engaged the Office of Legal Counsel, under my supervision, in a reevaluation both factually and legally of a particular classified program. And it was a program that was renewed on .a regular basis and required. signature by the Attorney General, Surveillance Program as described by the President, the legality of which was: the" subject of the February 6th hearing; Gonzales also attempted to clarify a response he had given to Senator Leahy about When the first Presidemial AuthOrization was signed. Gonzales wrote that ?The President first authorized the [Terrorist Surveillance} Program in DetOber 2001 . . . (.U) ee-rti'fyri'ngivto its, legality. And the and I remember the precise had to be-re'neWed by March the 11th, which wasa Thursday, And We-were engaged in a very intensive reeValuation- of the matter. (U) {Comeyalso testified that ?as Acting Attorney General, I would net I certify ?thegpro?grampas to it's legality,_sand explained our reaSoning' in. I not gointohere, nor aml confirming it?s any particular program-3? Asidetailedsin Chapter Four, Comey .then?xdescried from. his perspective;- the. incident in the .hospital room and testified that after that incident ?[t]he program was-areauthOr-ized without us, without a. signature from the Department of Justice .attesting'as to its legality . . .r (U) Gonzales?s June 5, 2007, Press Conference (H) In light of Cemey?s statements, questiOnswereraised about. the accuracy of G'onzales?s February 2006 testimony to the Senate Judiciary Committee. For example, in a press conference. on June 5, 2007, called to announce: the indictment of members of an international gang called? M8413, the ?rst question a-reporter asked Gonzales cOn-cerned Comey-?s teatimony: REPORTER: Attovriey General, last month irn Comey testified about vii-Sits, you and Andy Card made 'to John Ashcrofth hospital bed. Can: you tell us your side of the story? Why were yOuzthereran'd did Mr. Co'mey testify truthfully about it? Did he remember it correctly? GONZALES: Mr. Comey-?s testimony related to a highly classified program which the President confirmed to the: American people some time ago. Because it?s on a classified program I'm not going to comment on his testimony. (U) As discussed below, when later asked about this statement, GOnzales said that he had misspoke, and that he did not mean to say that Comey"s testimony related to the program that the President confirmed. (U) D. Gonzales?s July 24-, 2007, Senate Judiciary Committee Testimony (U) Gonzales was again called to testify before the Senate Judiciary Committee on July 24, '2007. In advance of Gonzales?s July 24 appearance, Senator Leahy sent Gonzales a letter advising him of the questions that would be askedat the hearing;440 The letter referenced Gonzales?s 440 According to the letter, Senator Leahy took this step because in Gonzales?s appearance before-the Senate Judiciary Committee on April 19, 2007, to discuss the remOVal of nine U.S. Attorneys, Gonzales had responded to an estimated 100 questions that (Cont?d.) TP sisenie'rjjse - t: HipE??hI?u?agl-?y 23006, testimony in which he. stath that Department officials. did-?Znethia-Ve ?concerns. about this. program? The letter also referenced May- ?15 testimony incident in Ashcroft?s hospital, 7 room in March 20.04. ?The letter specifically advised, Gonzales thathe v?v?Ould aSk?ede to ?provide a full. explanation for the legal authorization for the: President?s warrantles-s electronic surveillance program in March and April 23004:?? (U3) July'Q-ii hearing, Gonzales was 'I?epe?atedly questioned about allegedinconsistencies between his and Cemey?s- accounts of the events tot 'M'arc'h 200.4. and the NSA r-progriam.? For example, SEnaitor Specter asked: Let me Ineve quickly through a series of questions there?s a lOt to. cover? starting with the issue that Mr. Comey raises. You said, quote, ?There has not been. any serious disagreement ,?ab?out. the program.? Mr. Coriney?s testimony Was that Mr. Gonzales 'began'to. discuss were there to seekrapproval rand?'heithe?n Says, qtlote, Was very upset. I was angry. .I thought} had just ?witnessedan effort to take advantage of .a very Sink man.? Fir-st ofin'al'l, Mr, Attorney -'Gene_ra_l, what credibility is left for you When you say there?s no disagreement and-you?re party to going. to thefhospital to see Attorney General Ashcroft under sedation to to get. him to approve the program? GEN. GONZALES: The disagreement that occurred and thereasOn fer the visit to the hospital, Senator, was about?other intelligence activities. It was not about the terrorist surveillance program that the President announced to the-American people} (U) At etherpoints in the hearing, Gonzales stated that the dispute referred to ?other intelligence activities,? and not the ?terrorist surveillance program.? (U) Senator Schumer also questioned Gonzales about his answer in the June 5 press conference in which he stated that Comey?s testimony ?related to a highly classified program which the President confirmed to the American people some time ago.? Gonzales first responded that he would have to look at the question and his response from the press conference, and then he said ?I?m told that what I?d in fact" here in the press he ?not recall." Leahy wrote that he wanted to assist Gonzales with his preparation for" the July 24 testimony to ?avoid a repeat of that performance.? (U) Se'oriferenceiw Idicl mi?s?sjp?eak, but also went back; and Clarified it with the (3U). - Gonzales then respondedto Senator'S'chumer that ?The President Confirmed the existence ofone set of activities,? Comeyn'as. about a disagreement. that. existed with respect to other intelligence- :aetiyities. .: 'Comey?stestimonyabOut the: hospital Visit Was-about. either intelligence actii?tiesj, disagreements-over other intelligence activities. - That?s 'hoW1We7d .Cl'afify it" (U) I Other Senators-questione Gonzales?si'respons?es on this issue. For example, Senator Feingo?ld stated: With respect to, the illegal wiretapping program, last year in hearings before-this committee and the House Judiciary Committee, ?yOu stated that, quote, ?There has n?ot?been serious disagreement about the program that the? President has con?rmed .unquote, th-ata-ny disagreement that, did occur, quote, ?did not deal with the'program that I am here testifying about today,? unquote, and- that, quote, ?The. disagreement that nineted doiesu?not relate to the program the President confirmed in December to the American people,? unquote. (U) Two. months ago, you? sent a letter to me and other members of .eomrnittee defending that testimony and asserting that it. remains aeeurate?. And I believe you said that again. today. Now, as you probably know, I?m amember of the Intelligence Committee. And therefore I?m one-of the members of this committee who has been briefed on the NSA wiretapping program and other sensitive intelligence programs. I?ve had the opportunity to review the classified matters at issue here. Andi believe that your testimony was misleading, at best. I am prevented from elaborating in this setting, but I intend to send you a classified letter explaining Why I haVe wine to that conclusion. (U) Senator Whitehouse, also a member of the Intelligence Committee, similarly stated: Mr. Gonzales, let me just follow up brie?y on What. Senator Feingold was saying, because I?m also a member of both committees. And. I have to tell you, I have the exact same I 7 Gonzales also testified that he did not speak directly to the reporter (Dan Eggen, from. the Washington Post) to clarify the comment. Rather, Gonzales said he. told, a Department spokesperson to go back and clarify the statement to Eggen. (U) perCeption thathe does, and that is that if'ther?e is a kernel of truth in-what you?ve: said about the program which we. can?t discuss. but weknowlxit to bathe program. at; issue in-your? hospital visit to the Attorney General, the path to that kernel of truth is so eonvoluted and is so contrary to the plain import of What you. said, that I, really, at this point have no choice but" to believe that you intended to-deceive us. and tollead us or mislead us away from the dispute that the Deputy Attorney General subsequently brought'to our attentionhe?s- be?haifin?g, you know, in a crazy way to. even think this, bUtxat least count tWo loft-1s and takeit seriously??- (U) Gonzales also- offered to answer .a question about the terrorist surveillaneeprograrn in closed session. during this ex?chang'e with SenatOr specter; . Going back to the question about your ere'dibilityon whether there was dissent within the ,adrniniStration as tojthe terrorist surveillance program, was there any?diiStinCt-ion between- the terrorist surveillance program in existenCe on March ?10th, When you and the Chief of Staff Went to see Attorney General Ashcroft, contrasted with the terleriS'tSurveillanCe program Which President Bush made- public in December Senator, this is .aque?stion thatI shouldxanswer in aelassified frankly, because now you?re.zaski?g to- hint or: talk to hint about our Operational activities. And I?d. be happy to answer that question, but in a setting. SPECTER: Well, if you won?t answer. that question, my .suggesti?On to you, Attorney General Gonzales, is that you review. this transcript very, very carefully. 1 do not .find your testimony credible, candidly. When I look at the issue of credibility, it is my judgment that when Mr. Corney was testifying he was talking about the terrorist surveillance program and that inference arises in a number of ways, principally because it was such an important matter that led you and the Chief of Staff to Ashcroft?s hospital, room. . . . So my suggestion to you is that you review your testimony very carefully. The chairman?s already said that the committee?s Accordingto a May 17, 2006, letter from the Director of National Intelligence, two other members of?the Judiciary Committee Senators Dianne Feinstein and Orrin Hatch also had been briefed on the. NSA program. (U) I going torevi'ew your testimony, very Carefully to see if your credibility has been breached to the. point of being actionable. (U) Nearthe end of the hearing Senator Schumer questioned Gonzales regarding the meeting at the. White House with the ?Gang of Eight?- ?eongre-SSional leaders, jQuStfbefore Gonzales and Card went ?to Ashcroft?s hospital room on March 10?, 2004; SEN. OK. But you testified to ?us that you didn?t. ?belie?Ve- there-was serieus diSseri?t-on the pregratn that the ?Presid'entauthorized. And now you?re saying they knew ofthe- dissent and you didn?t? GEN. GONZALES: The dissent related to other intelligence activities. The diesen-t- was not about the terrorist Surveillance program the President confirmed and . - . You said, sir - sir, you said that they knew that there was dissent. But when; you testified before us, you has not been serious d?iSagreement. And: it?s about the same program. Itis about the same exact program. You said the President authorized. only one before. And the. diiscussiOn ?.you see, it defies-:credulity to believe that the disouSsion with Attorney General Ashcroft or with this grdup of eight; Whioh we can check on - and I hope. we-will, Mr. Chairman: that Will?bejyours and Senator 'Spe?cter?s prerogative -- was about nothing other than the TSP. And if it was about the TSP, you?re dissembling to this committee. Now was it about the TSP or not, the discussion on the eighth? ATTY GEN. GONZALES: The disagreement on the 10th was about other intelligence. activities. SEN. SCHUMER: Not about the TSP, yes or no?J ATTY GEN. GONZALES: The disagreement and the reason we had to go to the hospital had to do with other intelligence activities. SEN. SCHUMER: Not the Come on. If you say it?s about ?other,? that implies not. Now say it or not. ATP-Y GEN. GONZALES: It was not. It Was about other intelligence activities. SEN. SCI-IUMER: Was it about the Yes or no, please? That?s vital to whether you?re telling the truth to this committee. - I It Was about:otherintelligence aetitritiea (U) we interstiewed Gonzales, he stated that "there Was-neVer any toils-tide the NSA program from Congress, and he ,said- Waggbnefedson multiple occasions about the Gonzales also . 7? 1? Consetned GO?Zales said that.he?c.o1.?d not fecal Where/the term terrorist program? originated, but he the. it. referred only to the content collection .aeti?ities' the President had confirmed publicly, and that the .rest of the remained classified. Gonzales also asserted that this distinction should have been clear to those on the committee who were read into the. Stellar Wind program.- - ERIE Director Muslim?s July 26, 2007', HouserCemtnittee on. the Judiciary- Testimony (U) Two clays'after GOnzales-?s July 24, 2007, Senate uidi'c-ia-Iy committee testimony; Director-Mueller testified before the House-Judiciary Q'o'rnmi?ttee?. At this hearing, Mueller ?was asked- about his conversationwith Attorney General Ashcroft at the hospital on the evening of March 10,752,004. As di?seus?sed'in Chapter F'Ou-r of this report, Mueller arrived at the hospital just after Gonzalesand. Card left. Mueller was asked to recount what he. learned from Ashcroft concerning Ashcroft?s exchange with Gonzales and Card: earlier that evening: LEE: Could I. just say, did you haVe. an understanding- that the dii8cussion was. on MR. MUELLER: I had an understanding the discussion was on is. a NSA program, yes. REP JACKSON LEE: I guess we use we use warrantless wiretapping, so would I be comfortable in saying that those were the items that were part of the discussion? 443 Gonzales cited in particular the ?Gang of Eight? brie?ng convened on March 10, 2004, to inform congressional leaders of the Department's legal concerns about aspects of the program and the need for a legislative We also reviewed Gonzalesh testimOny before the House Permanent Select Committee on Intelligence which he provided on July 119, 2007, just a few days before his July 24 Senate. Judiciaiy Cemmittee teatimeny, In his classified testimony, Gonzales stated ?This disareement 1 with Justiee?ijepartment officials] primarily centered MUELLER: I-- the: discussion was on a national man NSA program that. has; been mush discussed, yes, (U) Werasked understanding of the 'terr'rr ?terij-?erist Surveillance- pragram,? Mneller the term was notused by. the prior-to: The New Yet-l4; Times article and?the President?s confirmation sf the-program.- Mueller said he Understood the term tosrefer tewhat thegPreis?ident publicly-confirmed as;-to content intercepts, Mueller Saidfl?te believedthe term.?TSP??wasapart: of the ?overarching?r?StellarWindi programrbutvthat is not l' F. Gonzales?s- Follawaupi?Lette?r to the: Senate Judiciary Cemmittee In effert to clarify his Senate testimony, oh August 1, sent unclassi?ed letters?to-JudiCiary Committee Chairman,gLe_ahy Senator Specter. ",Gonzales?s letter to Leahy stated that withsugge?sti?ons that his testimony was he Was-determined to address any such impression. He 9/ 1.1, the President 'authorized?the? undertakes-a number of highly c'lasSi?ed activities,? and that, ?although the base'sx?fortheSe actiVi't'ies'varied, of them were authorized "in orig. presidential order-,1. Which*was reauthorizeclvapproximatein ever-y 45 days? GonzdeerI-?ote that before December 2005 ?the term: Terrori'St Suweillance Programmes, riot used to,? refer to these activities, collectively or Otherwise. Rather?- Gonzales write that the term was first used in early 20065 ?as-part of ?the. public. debate. that followed the. unauthorized disclosure [by theNew' York Times] the President?s acknoizvledgement of ?one aspect of the NSA (ill) 444 We also interviewed an NSA of?cial who serv?sas an original as ?Gonzales also wrote in this letter that in his July 24 testimony he was discussing "only that:rparticu1ar aspect of the NSA -?acti_vities that the Pres'ident .h'asipublicly acknowledged, and that we have called the Terrorist He wrote that herreco'gnized that his use of this shorthand. 1*efer-ence to the ??program? publicly ?described by the "Pi?e?Si?dent?? may'have a?Create'd confusion.? Gonzales maintained that there .wasii?het a serious, disagreement bet-Ween the Department and the White 'l-IouseyinTMal?r-Ch 2004 aboutwhether there was a legal basis: for the particular-acting later called. the Terrorist Surveillance Program." - Gonzales also Wrote in his letter, ?That is not'to say that the legal issues raisedb'y the Terrorist Surveillance Program were insubstantial; it Was-an extraordinary activity that presented novel and difficult issues and. was, as i understand,- the subject of intense deliberations within the Department. In the-spring of 2004, after a thorough reexamination of all these-aetivities, Mr. Comey and the Office of Legal Counsel ultimately agreed that, the. President cbulcldirect the NSA to intercept international communications without a court order where the interceptions were targeted-at al?QaedaQr its affiliates. Other aspects of the activities. referenced-in the letter [attached to GonZales?s letter] did precipitate very serious disagreement.? (U) y. me Analysis (U) In this section, we assess whether Gonzales made false, inaccurate, or misleading statements during his testimony before the Senate Judiciary Committee. As discussed bel?Ow, we concluded that. Gonzales?s testimol'ly did not-Constitute a false statement under the. criminal statutes. We also cronclude'dthat he did not intend his testimony to be inaccurate, false, 01? misleading. Hewever, we found in at least two important respects his testimony was confusing, inaccurate, and had the effect of misleading those who were not read into the program. (U) At the outset, we recognize that Gonzales was in a difficult position because he was testifying in an open, unclassified forum about a highly classified program. In this setting, it would be difficult for any Witness to clearly explain the nature of the dispute between the White House and the Department while not disclosing additional details about classified activities, particularly because only certain NSA activities had been publicly con?rmed by the President. (U) However, some of this difficulty was attributable to the White House?s decision not to brief the Judiciary Committee, which had oversight of the DEpartment of Justice, about. the. program. As discussed in Chapter Four, the strict controls over the Department?s access to the program hindered the- Department?s ability 'toiadequate?ly ifulfillits legal responsibilities concerning- :pregram-through 2004. i?S-imi-larlyj, the White House?s decision hat: to allow at least the' Qhair: and Ranking Members of the House and Senate'JUdiCiary Committees to be- briefed into the program created difficulties for G?lonzaIBS-when. he testified, before? Congress about the: diSputes program. This limitation also affected the . ability to understand or adequate-lyasseSS?the program, ?espcciallyin connection- With the March 2004 dispute. We agree with Goldsmithis- cb?se'ryation about the harm? i'n-th'e' White Heusef's ?over~?secreCy? fetithiis programs as Welles-Director Mus?er?s suggestion, made in March 2'004, "that'b?riefings. on the-program should have been, given to the House and Senate Judiciary'Comrnittees. This did-?notbccur, and it made Genzales?s testimony to the Senate Judiciary Committee unusuaily difficult. I a Yet, even, given these difficulties, We belieVe that Gonzales?s testimony Was imprecise, confusing, arid-likelyto lead these not read into the prong Conclusionsabout the nature of the dispute between. White Department officials-in March 2004.. Inaddition,twoSenators- Wha had. been readsinto theiprograrn stated-that they were Confused by" Gonzales?s. testimony. .A-ltheiugh. we. echeluded that Gonzales did: not intend- te-mislead Congressrhis testimony nonetheless "had the effect of creating can-fusion and inaccurate perceptions about certain isSues centered during: his hearings. (2U) Gonzale.s,gasra participant in the March 2-004 dispute between the White House and the Justice Department and, more importantly,- as-the nations chief law enforcement. Officer", had a duty to balance his Obligation net to diaclose classified information ?Withthe need not to be misleading in his testimony about?- t'he events that nearly led to mass resignations of senior officials at the Justice Department?and the FBI. Instead, Gonzales?s testimony only deepened the confusion among members of Congress and the public about these matters. We were especially troubled by Gonzales?s testimony at the July 2007 Senate hearing because it related to an important matter of significant public interest and because he had suf?cient time to prepare for this hearing and the questions he knew he would be asked. (U) At the outset of his testimony on February 6, 2006, Gonzales explained that he was confining his remarks to the program. and the facts that the President publicly confirmed in his radio address on December 17, 2005. In those remarks, the President had, in essence, confirmed the content. cellectionlpart, or basket 1, of the NSA surveillance pregram?ts- and Gonzales, uSed the term ?terrorist surveillant?e program? "1.1-1 Connecti?oiiWith the Presidents confirmation of these SA activities. However}, askdis'Cussed it was not clear -. even. to those read into the program we. Vir'he'th?er the term ?terrs'rist' surveillance program? referred only to content collection (basket 11) or the entire program. Nevertheless, Gonzales suggested in his testimony that the dispute between ?the'W?hite House andthe. Department concerned other. intelligence unrelated to the contentcollection pertiOn. of. the program that the President had confirmed. This was not accurate. We :recegnize- that the term "terrorist. surveillance program? was .intendedi?fby Gonzales-and other Administration. officials to describe a limited activities Within the Stellar Wind program and that the term was created only in response to. public .diSCIOSures about the program. HoweVer, by using-phrasessuch- as the ?terrorist surveillance: program? or ?the program that the. President. has confirmed,? and. setting: that. program actiVities',? Gonz?ales?s testimony created apercept-ion that the two sets of aCtiVitie-s were entirely" unrelated, Which. Was not accurate. testimony suggested that the dispute thatciComey testified about Was. not related to the program that the President had-confirmed, and instead" that thedispute Concerned unrelated or ?intelligenm activities.? Thus, while Gonzales may have intended the term ?terrorist surveillance program? to cover only-content testified that. disput to? ?111716 iuribu aux. U5 - Gonzales rein-forced this m-isperception throughout his testimony. For example, when asked by Senator Leahy what activities Gonzales believed would be suppOrted under the Authorization for Use of Military Force rationale, Gonzales stated, have tried to outline for you and the committee What the President has authorized, and that is all that he has authorized.? In fact, the President had authorized two other types of collections in the same Authorization. Gonzales himself subsequently realized that his response to Senator Leahy wasproblematic. In a February 28, 2006, letter to Senators Specter and Leahy, Gonzales sought to clarify his response, Stating, Was con?ning my remarks to the Terrorist Surveillance Program as by the'Presid?ent, the legality of which was the subject ofth'e 6th 1hearincr.? However,? in. our View this attempt to clarify his remarks} not go nearly far .As- discussed below; it was not until after Gonzalesffs neat appearance before? thel?Senate JudiCialy Committee in July-2007 ,athat Gonzales acknowledgedrthat. the President had also authorizedya range of described under the Iterrorist'surve?illance program, in a single order. We. concluded that Gonzales created a ?misimpressi?on for Congress and the public-by Suggesting that the Marc112004 dispute between. the Department and the White House concerned issues Wholly unrelated to ?the program the Pre'sidcnt con?rmed,? or the terrorist surveillance program. We believe: a fairer and more accurate ch-aracterizatiOn would have been that the March: 2004 dispute concerned aspects of alarger program ofwhich the. tejrmrist surveillance program. was apart. As discussed earlier, the NSA Viei?fedtthe three types. of collections as a single- ?prograrn. The three types of collectiOIis?Were all-authOIi-?zed by. the same Presidential orderand ad??niSt?e-redi lay-a single intelligence agency. MoreoVer, all three Collections WetEka'OWIl inr'the Intelligence Community by the same Top ,e?oret/?Sensitive Information program cover term, Stellar Wind- ?When Senator Schumer asked Gonzales at the February 2006 Senate- he?arin'gwhether media accounts that Come-y ?expressed grave reservations- about: the 1N SAprogram?? were true, Gonzales responded that there was no is: ?4-5 $953- E: ma .t .Whe?nwe interviewed Gonzales, he told us that he was-trying ?to be public; testimony about discussing or characterizing a tog-ramgwith persons not read into the program, and that he?lLISe'd i I distinguish the disagreement regarding from other disagreements regarding the i program Gonzales told Usthat he believed his statement that there was; disagreementpoint of ?serious disagreement? between the-Justice and the White l-Iou~ mpared? tojzthe. more s'erious disagreement related to. 445 Gonzales-also: OIG 7 to Ashcroit?s hosljital mom. solely over and other evidence seediin __apter Four tends to eenfirm tha was not. the critical issue in the confrontatlon With - rals at thehnepital art-hat it precipitated the threat of- mags. nsi by senior Department and FBI officials. Yet, even if one agrees th* was not a7?serious. disagreement? betWeen the Department and the White 301136; Genzales?s testimony is still problematic. When Senator Schumer pressed Geneales on whether Department officials ?expressed any reservations. about the ultimate program,? Gonzales replied: ?Senator, I wanteto becvelfiy careful here, because, of course, I?m here only testifying about What. the. President has confirmed. And with respect to what the Freeident has confirmed, I believe I do not believe that these DOJ officials thatyou?re identifying had concerns about this program.? . We "underStand that it is possible to construct an argument that the accurate, it would still not account. for key' details that were omitted from- W) While. Gonzales may subjectively have believed the disagreement about this iSSue did not rise to the level of a serious disute he Was aware that Goldsmith and Addin? that Would be necessary for an accurate 10.75 thee, nation. Thane? artment. clear! (had res?f?VEttiO'I13 and f?the?ngr-am? master, Gonzales. hiniseilt contradicted -?this attempted senator Spect ?d CI . at Cem?ey, Department had eXpressed ?reserVat'ions? or: Was more isig-nl?cantithan . . the evrdence IS ear-that Corney and others had strongand- elem the eXei' of the President?s authority to, eondu These concerns had: been communiCated? to the White House 111 Several?meetings over a period of i 'i NI "0 2004, and the White Housedid not .. part. of the prsram in response to thee, However, n'zalesis te-stimony'suggested that such cancernsail'd reservations on the part of Justice Department of?cials never eXisted. To the contrary, the Department?s" firm objections to this aspect of the program were instrumental in bringing abou celle?ctionfin ?the program the President has confirmed.? the-dispute about rendering his July 24, 2007, testimony, Gonzales acknowledged in an unclassified August 2007, letter to Senator Leahy that his use of the term ?terrorist surveillance program? and his ?shorthand reference to the ?program? publicly ?described by the President? may have created confusion,? particularly for those familiar with the full range of NBA. activities authorized by the President. Gonzales wrote that he was determined to address any impression that his testimony was misleading. In this letter, Gonzales attempted to describe what he had meant by the term ?terrorist surveillance program,? stating that it covered one aspect of the NSA activities that the ?PreSid?ent had authorized. His letter also acknowledged the dispute concerned, the legal basis for certain .NSA activities that were regularly authorized in the same Presidential Authorization as the terrorist risuirvei?llance program. Gonzales also acknowledged that Corney had refused to certify a Presidential Audionzation ?because of concerns about the legal basis of certain of these NSA activities.? Yet, this-follow-up letter, while providing more context about the issues than his July 2007 statements, did not Completely address the misimpressions created by his testimony. "H?Z?GoriZalesstill suggested in. his August 114 letter ?lat'the' only dispute between ?ce?rned? aspects of the program ?We'aga-ln acknowledge. situation Gonzales about a highly Classi?ed and Controversial weihelisive Genz?i?ales adulahave-done other-things: to provide {clearer and'i'nore; accmitate-testimony Without divulging classified Similarto theimpoftiof his August 1 letter, and without providing;cp,erational details: about-these; other activities, he Could have par-tot the. distaste with the Department concerned the scope what called ?the while: another part theidispute cenCern?ed? other ?intelligence, activitiES?-that were eitherrelated to the terrorist surveillance program or, more aCcurately, a different sepect of Same NSA pregram. Gonzales also could have explained that different actiVitieszunder the program r'a'iSed different concerns within the Department ?beoauSev-eajc-h setof aetivities rested upon different legal . theories. 4'47 Alternatively, G'Onz?ales could have declined to discuss any aSpe'ct-of the. diSputI? at open hearingti?i?fg' 'Qr,~~Short of seeking a closed'session, GonZales could have songht White House-appron to brief the Chairs-and Houseman-12.137 Committees about ?the program so, that. they wou1d full}r understand the nature of the NSA program- s'ri'd'the Classi?ed issues surrounding the disPute.. Instead, Gonzales" gave public testimony that wast-conmsing and. inaccurate, and had the 'effeCt of misleading those who were :not' read into the program, as well as some. who were. (1U) Concerning Gonzalesis Jilly 2007 testimony in particular, the queStions-I'Gonzales would be expected to answer were clearly foreseeable, especially in light of the disparities-between his Februaiy 6, 2006, testimO'ny be?eyisi May 15, 2007', testimony. In addition, Gonzales had been provided a letter by Senator Leah?y referencing Cor?ney?s testimony and. advising Gonzales to be prepared, to discuss the legal authorization. for the ?President?s warrantless electronic surveillance program in March and April 4?13 As noted, Gonzales provided closed?session testimony before 0n gulyulg, 200.7, inwh-ich lie-described the March 0004 dis ute. between White House and ?36 Department officialsras 2.0304.? Gonzales?was therefore .on notice that tie-would be expected to bring ?clarity to the confusion that existed following Cemey?s testimony.. Rather than clarify these believe Gonzales further confused the issues _.threugh his resin-imonyi (U) Finally, .we considered whether Gonzales?s testimony constituted - false statements and concluded that his statements d?ianot. "constitute a criminal viOlatiO?n of 18 US ?53. 1001. A person viol'ates'tha't statute; ?knowing-grand" making a ?materially false, AfiCtitious, cor fraudulentstaternent or 18 U.S.C. 'We do not believe the evidence showed: that intended to mislead Congress or 'w?lfully'make a false statement. Moreover, we do not believe a prosecutor could. prove beyond a reasonable. doubt that there Was no interpretation of his words that Could be viewed as literally true, eVen if his testimony Was confusing and created misperceptions.449 (U) In sum, we belieVe that while the evidence did not show that ?Gonzailes?s statements constitute a criminal Violation, or that he intended to miSIea?d-Congress, his testimony was confusing, not accurate, and-had the effectof misleading those who Were not knowledgeable about the program, Histestimeny 'alisoundermined his credibility on this important issue-i As the AttOrney General, we believe Gonzales should have taken more care to ensure that his; testimony was as aCcur'a?te as pessible without revealing classi?ed information, particularly given the significance of this matter and the:'fa'ct that aspects of the dispute had been made public previously. (U). 449 See United States U. Milton, 8 F.3d 39?, 45 (DC. Cir. .of literal truth? applies to false statement prosecutionsunder 18 DEC. 1001), cert. denied, 513 US. 919 (1.994). See also United States v. Hsia, 24 F. Supp. 2d 33 (D.D.C. 1998), inwhich the court stated, false statement is an essential element of a prosecution under 18 11.83.. .1001, and if the statement at issueis literally true a defendant cannotbe convicted of violating Section 10.01,? Id. at 58; United States U. Hsia, 176 F.3d 517, 525 (DC. Cir. on other grourids). (U) 1 1 {@Mum? ctr-asters Nine (U) Within weeks of theterrorist attacks of September 11., 2001, the National initiated a Secret, compar?tmented program. to collect and analyze international and domestic telephoneand emailcommunications.and. related data. The. intent of theNS?A program, which used; the cover termetellar Wind, was to function as an ?early warning System? to detect and prevent future terrorist attacks Within the Unite d? States. 41?s,! my 1/ 31/ it CC 1;ng The program was authorized by the President in a series of Presidential Authorizations that were issued at approximately 30 to 45 day intervals and certified as to form and legality by the Attorney General. The Presidential Authorizations. stated that an extraordinary emergency existed permitting. the use of'el'ectronic suiveillancewithin the United States for connterteimorism purpoSes, without a court order, under Specified Circumstances. Under the program the NSA collected vast amounts of- inl?ormation through- electronic Surveillance and other intelligence?gathering techniqlles, including-intermation concerning the telephone and lei-mail communications of American citizens and other US. persons. Top Secret compartment'ed informatiOn derived from this collection Was provided-to, among other agencies, the FBI, which sent verSi'ons of the ?inforrnatiOn to FBI field offices as investigative- leads. The Stellar Wind program represented an extraordinary expansion of the signals intelligence activity and a departure from the traditional restrictions. on electronic surveillance ilnposed under the Foreign Intelligence .SurVeillaiice Act (FISA), Executive Order 12333, and other laws, Yet, the program was conducted with limited notification to Congress and without. judicial oversight, even as the program continued for years after the September 11 attacks. The White House controlled who within the Justice Department could be read into the Stellar Wind program. In particular, we found that only three Department attorneys, including the Attorney General, were read into the program and only one attorney was assigned to assess the program?s legality in its first year and a half of operation. The limited number of "Justice Department read~ins contrasted sharply with the hundreds of operational personnel who were read into the program at the FBI and other agencies involved with the program. QT I all-11;: Operatibnof the: Program Under the program,_ the-NSA initially intercepted the content of - international telephone and e?Inail communications in caseswhere :at' least one. was reasonably believed to be associated Withsany? . international?terroristgroup, These.._collecti0nsbecame known as bas?ke- eSteHarWinds row-m "TheN A also collected bulk telephony and e~mail meta data communications signaling information showing contacts between and? among telephone numbers and email addresses, but not the contents of .those?_communications. These collections became known as basket '22 (telephone, meta-data) andba-sket 3' (e~mail meta data) of the Stellar Wind rider asket 2% Collections . 50 E?mail meta data included only ?bee,? and other information, but similar to call detail records did not include the subject line or the message contents. .NSA accessed baskets 2 and 3 for analytical purposes with specific telephone numbers or e?mail addresses that satiSfied the standard ?tipped? to the irdfv'MarehQQOihad been tipped to the-FBI, the vast majority of which Were I -. for Querying the data as described in thePresidential Authorizations, A smallramountor the-cellected content and meta data was analyzed bythe; working with other membe-rsof? thelntelligence Community, to b1, ?generate-intelligence reports ab'Out suspected. terrorists and individuals b3, _po's_sib1yaseociated with them. Many-of these reports were disseminated-er b7E i er as-l'ead's to FBI field offices As 'ndiivi?diial U.S. telephone numbers to FBI field offices:er investigation or other action, The: restiltsotthese investigations were uploaded into FBI databases. The. Justice Department-had two primary roles in? the Stellar Wind program. 'FirSt,thel Attorney General was required to certify each. Presidential Authorization as to ?fo-rm?and- legality in effect, togilve the Department?sassurance that the activities the President was authorizing; the to Conduct were legal. In carrying out. this responsibility, the Attorney General was advised by the Esparitm?ent?s Of?ce of LegalCounsel As-we described in this report and discuss in the next seetion, we during the early phase of- the Stellar Wind program the Department lacked sufficient attorney resources to be applie to the legal. reviewof the program and, due in significant part to the White Hou5e?s salesmen close hold .ovEr the program, Was not able to coordinate its legal review of the prOgram with the other primary role-in Stellar Wind. was as. a meme-r ofthe Intelligence ?C?Ommunity. The FBI Was one of two main customers .of' the-intelligence produced under the program (the other being; the Working with the: NSA, a ?small team of FBI personnel converted the Top Seeret Stellar Wind intelligence reports into loads that we b1, b3, disseminated at the Secret level, under an FBI program calle b7E to FBI field-offices for appropriate action. As-detailed in Chapter 'SiXa-nd discussed below, we concluded that although the information produced under the Stellar Wind program had value in some counterterr-orism investigations, it played a limited role in the overall counterterrorism efforts. Went?) IL Of?ce of Legal Counsel?s Analysis of the Stellar Wind Program As described in Chapters Three, Four, and Five of this report, the Justice Department advised the Executive Branch, and in particular the President, .as- to the legality of the Stellar Wind program. The Departments view of the legal support for the activities conducted under the program changed otter time as more attorneys were read into the program. These changes occurred. in three phases, In the first phaSe of the program May 2008), the legality of the-program was founded on an analysis developed by Johanoo,a Deputy Assistant Attorney 'l'nth'e secondphaSe"(May 20035 through. May 2004;), the: program?S-lzegal rationale underwent Significant-review and revisiony OLC ASSistant Attorney General Jack Goldsmith, and Associate: Deputy AttOrney Patrick Philbin. In the third and finalep'hase (July- 2004 through- .- .J._ariuaiy [2007), based in part upon the legal coneerns raised by the Department, the entire pregram- Was. moved from presidential authIOri?ty to authority under with oversight by the FISA Court. In Chapters Three and Four, we examined the Department?s early role assessing the legality of the Stellar Wind program. The Justice Department?scaccess to the program Was controlled by the White Heuse, and former White House Counsel and Attorney General Alberto Gonzales told, the that the President decided whether non-?operational personnel, including Department laWyers?, couldbe?read into the program. Department FBI fficials told us that obtainingapproyal to read in Department officials FISA Court judges involved justifying the requests to- Counsel to the Vieei'Presid?ent David Ad'dington and WhiteH'ouse Counsel Gonzales, who effectively acted as gatekeepers to-the read-in process for non+0perational officials. In contrast,?acCordingto- the NBA, operational personnel at the NSA, CIA, and the FBI were read into the program 'on the atlthorit?y of the .NSA Director, who at some point delegated this authority to the Stellar Wind Program Manager. We? believe the White House?s policy of limiting access to the program for nonroperational personnel wasapplied at the Department of Justice in an unneceSSarily res-tric?ws manner prior to March 2004, and Was detrimental to; the Department?s role?. in the operation of the program from its .ineeptiOn. through that period. We also, believe that. Attorney General AshorOft, as head of the Department during; this time, was responsible for seeking to ensure that the Department had adequate attorney resources to conduct a thorough. and accurate review of the legality of the program. We believe that the circumstances as they existed as early as 2001 and 2002 called for additional Department resources to be applied to the legal review of the program. As noted in Chapter Three, Ashcroft requested to have his Chief of Staff and Deputy Attorney General Larry Thompson read into the program, but the White House did not approve this request. However, because Ashcroft did not agree to be interviewed by the OIG for this inVestigation, we. were unable to determine'the full extent of his efforts to press. the White House to read in additional Department of?cials between the program?s inception in October 2001 and the critical events of March 200.4. {assesses 7 I Wis-could not determine exactly why Yoo remained theionly Department attorney assignedto- assess the program?s legality from 2001 his departure in. May 2003, we believe that this practice represented an 'eXtraordinary and inappropriate departure from traditional .review and. resultedin significant harm to the - Department?s :01: in th?pl?ogra'm 'Iii the earliest phase of the program, Yoo advised Attorney General the, White Hou?Se that the collection activities under Stellar Wind'swe?re a l?aWiul eXercise of the President?s inherent authorities as- 4 tinder'ArtiC'l?e ll of the Constitution, subject only?to the Feurthg?rhendment?s reasonableness standard. In reaching this conclusion, Yoo dismissed as constitutionally incompatible with Presidentis'Articie II authority the FISA statUteT?s provision. that Flt-3A was; to her-the ?exclusive means? for conducting electronic surveillance. in the United States-afariforeign intelligence? purposes, and he concluded that these. provisions shouldb'e-read to avoid conflicts With the President?s- emeritutienal Cbmimndenin?hief authority. - 7) AS noted above, during the first year and a half of the Stellar Wind only?three'Department attorney's were read into the program w? Y'oo, Attorney General: Ashcroft,- and James Baker, Counsel in the Office'of' Intelligence Policy Review. Jay Bybee, the OLC Assistant. Attorney General-and Yoo-?s direct supervisor, was not read into the program and was unaware that Yoo was prOViding?ad-vice on the legal basis to support the program. Thus, Yoo was providing legal opinions on this unprecedented CXp?ahSiOn or the surveillance. authority without review by his O-LC supervisor-or any other Department attorney. Rather, Yoo worked alOne on project, and produced two major opinions supporting the legality of the program? . - When additional attorneys were read into the program in 2003-, they provided a fresh review of Yoo?s legal memoranda. Patrick Phi-lbin, an Associate Deputy Attorney General, and later Jack Goldsmith, Bybee?s replacement as the Assistant Attorney General for OLC, concluded that Yoo?s analysis was seriously ?awed, both factually and legally. Goldsmith l- cl that Yoo?s anal sis fundamentally mischar'a?cteriZed failing to address the fact that the NBA was coll?ectin and also failing to assess the legality of this activity as it was earn the NSA. Goldsmith and Ph?ilbiri also pointed to Yoo?s assertion that Congress had not sought to restrict presidential authority to conduct warrantiess searches in. the national Security area, and criticized Yoo?s omission from his analysis of a PISA provision (50 U.S.C. 1811) that addressed the President?s authority to. conduct electronic surveillance during wartime. They further noted that Yoo based his assessment of the program?s legality on an extremely _?aggressivei of the law that revolved aroundthe Constitutional primacy of the Pre's'ien't?sArticle powers, and he mayhave a faulty understanding of key elements of the program. a a . described in?hapteir. Four, Galds-mith and Philbin?s reassessment legalityle Stellar Wind began after Yea left the Department in May and*culminateda3i'n' a 1084pag'e legal memorandum issued on May 6, 20043.- memorandum superseded Yo'o?s earlier Stellar Wind opinion-s. arid the legality :of the: program?s electronic surveillance activities enfs'tatu-tOry rather than Artie-lei] constitutional As a of this new legal rationale, Department of?cials concluded that authori? .toiccinduc't? electronic surveillance of thelenem rim ease that the scope of collection under 7 waslegally' problematic arch-25004 (discussed below in Section 1:11). We agree with many of the criticisms offered by Department officials practice of alloWi'ng. a single Department attorney to develop the? legal-justi?cation fer suCh a complex: and contentious program Without critical review both within the Department and by the NSA. These of?cials told us that errors in Yoo?s. legal memoranda may have been. identified and Corrected if the NSA had been allowed to review- his work. They- also stressed the importance of adhering to traditional practice of peer reviewiof-all OLC memoranda and the need for the OLC Assistant Attorney General, as a "Senate-confirmed official, to review and approve all such epinionsj. These of?cials also stated that such review and oversight measures are especially important with regard to legal opinions on classified matters that are not subjected to outside scrutiny. We agree with these officials? comments and note that because programs like Stellar Wind are not subject to the usual external checks and balances on Executive authority, advisory role is particularly critical to the Executive?s understanding of potential statutory and Constitutional Constraints on its actions. We did not agree with. GonzaleS?s View that it was necessary fer national Security reasons to: limit the number .of Department read-ins= to those "?3th were absolutely essential,? as distinguished from the numerous. operatiOnaleread-ins Who-were necessary to the technical implementation of the program. First, thepr'ogram was as legally challenging-as it was technically. complex; Just-as a; sufficient number of operational personnel Weregreadzinto the program "to assure its proper technical implementation, (we: attorneys as necessary should have beenread' in to assure-the feundatiOn. not done during at least the ?rsr 20 months of the program. Second, we do not believe that .readinggin a few additional Department attorneys, during the .initial phase of zrould have jeopardized national security, especially given th. perational personnel whe were. cleared into the program dunng the same period.452 Intact, the highly classified .nature' Ofth'e pr-Ograrn, rather than conStitu-ting an argument; for limiting the OLC readwins to a single attorney, made the need for'careful analysis and-review Within the Department and bythe NSA more emailing; I . We alsoifound that the Expansion of legal thinking and breadth of .?eXpertiise from readinggin additional Department attorneys over time eventually?produced mere factually accurate and legally comprehensive analyses concerning the program. Increased attorney readwins also was an important factor-in grounding thegprogram on firmer legal footing under PISA. The transition of the program from presidential authority to statutory authority under PISA with judicial oversight was made possible through the Collectiye? WOrl?s: of the attorneys who finally were read into the program beginnling?in 2-004. The applications to the FISA Court to effectuate this transiti?On were produced by Department- attorneys, working with both legal and technical personnel at "the NSA, further reinforcing our View that such coordinated efforts are more likely to produce well~considered legal strategies and analysis. In addition, as discussed in Chapters Six and Seven, the increase in, the number of attorneys read into the program beginning in 2004 helped the Department to more efficiently ?scrub? Stellar Wind?derived information in PISA applications and improve the handling of Stellar Wind-related di?eCOvery issues in international terrorism prosecutions. 45-? By the end of 2003., cunt};r Yoo, fir-r. seepage Visit amdl'White cf the Program er lnChapter FOur,.we- describe'how the-Department?s reassessment of Yoois. legalTanalysis led Deputy Attorney: General James Comey,swho was exercising the. powersof the Attorney General while Ashcroft Was in: March200i4, to-zcenclude that he. could not certify the-"legality efgtheiSte-llar?Wind program. in reSpons-e, the. President sent Gonzales and ViSit Ashoroftiin- the hospital to seek his. certification o'ftherprogram, actiol'i Ashcroft refused to take. Werbelieve that the White House handled, its diSp'ute With the Department. ab?ou-tihe: pregrarn particul-arly in dispatching. Gonzales and Card to in'an attempt to override Comey?s decision was troubling. Asde'tailed inCh?apter Ecur, by March 20.04 When the Presidential Authorization in effect at that time was set. to expire, Goldsmith had already rioti'fied?the House severalmont-hs earlier about the Department?s. doubts concerning the legality of aspects-0f the Stellar Wind prorarn. Hie I WhenAttorney- General. Ashcroftwas. hospitalized and unable to fulfill his duties], Deputy Attorney General Comey assumed the Attorney General?s responsibilities, Before the, Presidential Authorization was set to; expire on 11,2004, Carney made-Clear to senior White House officials, includingViee President Cheney and .White House Counsel Gonzales, that the JuStiee Department could not certify the program as legal. The White House. disagreed with the Justice-Department?s position, and on March 10', 2.00.4, cenvened a meeting of eight} congressional leaders to brief them on the Justice Department?s [decision no-t to' the program and on the need-to continue-the program. The White House did not ask Comey or anyone from the Department to participate in this briefing, nor did it notify any Department officials that the briefing had been convened. Following this congressional briefing, at the direction of President ush, GonZales and White House Chief of Staff Andrew Card went to the hospital to Seek A-ttOrney General Asheroft?s certification of the. Authori'zatiOn. Again, the White Heuse- did not notify any Department officials, ineluding Comey, the ranking Department official at the time, that it planned to take this action. Gonzales?s and Card?s attempt to persuade Attorney General. Ashcroft, who was in. the intensive care unit recovering from surgery and according to Witnesses appeared heavily medicated, to certify the program over Comey?s opposition was unsuccessful. Ashcroft i. tarts-Ir.? toldGonzales and Card from his hospital bed that he supported the; Department?s revised legal'POSitiO?, but that many We,? he Was-mat the Attorney General at the time -. Com?ey was.?i53 - . ?7 Nil) On Marsh 11, the. following day, Gonzales certified the Presidential AuthoriZati?on as to form and legality. We-agr?ee with Director Mu'eller?s observation that the WhiteHouseis failur'eito- have Justice Department representation at the congressional brie?ng and ?thejattempt: to ersuade Ashcroft to, recertify the Authorization going through Comey ?gave the strong perception that the {White House] Was trying to do an end run around the Acting [Attorney :Gzeneral] whom they knew. to have serious concerns as to the legality of portiOns of the pro gram.? . After Mueller, Conley, and-other senior Department and FBI. officials? made known their intent to resign, the President directed that the issue be resolved, and the program was modified to address the Department?s legal. concerns. Because We were-unable to- mterview-key White. House officials, ere-could not determine 'for Certain what caused the White House to Change itsjpo'Sition modify't?he program, although we believe the prospect- of males resignations at the Department and the FBI was a significant factor in this decision. - We reached several Conclusions based on our review of the Department?s role in the legal analysis of this program and the events surrounding the dispute between the Department and the White 'HouSe. First, legal opinions supportingcornplex national security programs -- espeei-ally' classified programs that press the bounds of established law should be Collaborative products supported by sufficient legal and technical expertise and resources at the Department, working in concert with other participating agencies, with the; goal of providing the Executive Branch the most informed and accurate legal advice. By limiting access to this program as it did, the White HouSe undermined the Department?s ability to perform its critical legal function. 453 Gonzales stated that even if he knew that Ashcroft was aware Comey opposed .recertifying the program, Gonzales would still have wanted to speak with Ashcroft because he believed Ashcroft still, retained the authority to certify the program. Gonzales testified before the Senate Judiciary Committee in July 2007? that although there wasconcern over Asheroftfs condition, ?We would not have sought nor did We intend to get any approval from General Ashcroft if in fact he wasn?t fully competent to make that decision.? Gonzales also testified, ?There?s no governing legal principle that says that Mr. Ashcroft . If he decided he felt better, could decide, ?I?m feeling better and 1 can make this decision, and I?m goingto make this decision.? (U) believe that if traditional peer review and . procedures had been adhered to attbe outset, the prospect that aspects of the program would?have-rested on a questionable legal -- foundation for over 2 years would have been greatly mitigate-d. believe that the Department and FBI offiCialsj who resisted. the pres?suife to recertij?f the Stellar Wind program. because Jof their belief thataspeets of the program were not legally supportable acted courageously and at signi?cant professional risk. We beli?Eve'that this action by Department and FBI officials - particularly Ashcroft, Conley; Mueller, Goldsmith, Philbin, and Counsel for Intelligence Policy James Baker ?4 Was in accord With the highest professiOnal standards of the Justice We recommend that when the Department of Justice is involved with in the "future, the Attorney-General should carefullyassess whether the Department has been given adequate resetirce?s to carryout its. vital .,fimction? as'l'egal advisor to the President and should aggressively seek additional resources if they are found to be insufficient. We also believe that the White; House should allow the Department a sufficient number of read-ins whenrequested, consistent with natiOnal security considerations, to ensure. that-such sensitive programs receive .a full- and careful legal review, EV. Transition or Program to Authority 1 . i inn 7 We also examined the transition of the Stellar Wind program?s coneetion activities from presidential authority to FISA authority. We believe there were strong considerations that favored attempting to transition the program to FISA sooner than actually happened, especially as the program became less a? temporary response to the September 11 attacks and more a permanent surveillance tool. Chief among these considerations was the Stellar Wind program?s substantial effect on privacy interests of US. persons. Under Stellar Wind, the government engaged in an unprecedented collection of information concerning U.S. persons. The President authorized the NSA to intercept, withOut judicial approval or oversight, the content of international communications involving many US. persons and the SA collected massiVe arnounts of non?content data about US. persons? domestic and international telephone calls and e-mail communications. We believe that Such broad surveillance and collection activities, particularly for a signi?cant period of time, should be! cenducted pursuant to statute and I judicialoversight. We-raljso' 'beliCVe that placing these activities. under Court supervision prevides an important measure of accountability for the goviaftnnient?s conduet'thatlis? less assuredwhere the actiVities are both authorizedgand by: the Eiste'cut'ive. Branch alone. matah??y of?the legalgreasoning on which the program. rested for 'S?v?raii.?y?afs and'the subStantialrestrictions placed on FBI agents? access bf'programederived?iefOrmatiQn due to Stellar Wind?s highly classified stat-usWere-additional? reasons for transitioning Stellar Wind?s celleetion activities. {to .-FlSA::au-th0rity. We acknowledge that the transition. wouldialways have been an enormouSly complex and timewconsu-minggeffort that restedwupon'n'ovel- interpretations and uses of FISA that not all 'Cenrt?jjudges Would'authorize'. Nevertheless, the events described in this reportsdemonstratethat a full..t1*ansition to PISA authority was achievable and: in our judgment, should hairebeeh pursued earlier, .1 ?if. Impact of Stellar Wind. information on FBI Counterte?rrorism Efforts As a user. ?offStell-ar Wind, program .infOrmation the. FBI disseminated ?@3131 field foiCes. These tippers primarily consisted of espeei?e domestic telephone numbers and esmail'add'resses that bl, had determined through meta data analysis were connected to b3: individual?srinvolved at. Qa'eda or. affiliatedgroups. The tippers also [3713 included'eontent ofeommunications intercepted by the NSA based upon its determination. that there was probable cause to believe that aparty to: the communicationwas' al 'Qaeda or an affiliated Otober 2-00 1 through February 2006, the NSA provided the FB tellar Wind tippers, the vaSt majority of ?h?ieh were domestic telephone numbers. The FBl?s chief objective during the earliest months of Stellar Wind?s operation was to expeditiously disseminate program information to FBI field offices for investigation, while protecting the NSA as the source of the information and the methods used to collect the information. The FBI b1, assigned this task to a small group of personnel from the Telephone b3, Analysis Unit (TAU) at FBI Headquarters. This group developed a b7E straightforvvard process to receive the Top Secret, compartmented Stellar Wind reports from the NSA, reproduce the information in a non~CO-mpartmented-, Secret?level format, and. disseminate the information inElect-ronic- Comm ?tions- or 1303 tothe appropriate field officesfor investigation. These ECs placed restrictions on how the cOuld be used, instructing field offices that the information I i if ?17903.65 011137? and could: not be' used for any legal or j?Ildicial The FBFS- participation in Stellar'Wind evolved ove1* time as. the. program Cca?me?les'sa temporary response to the September 11 attacks; and?more. a permanent surVeillancecapabililty. As Stellar Wind continued to: be: tie-authorized, the FBI tried to improve the effectiveness-of its the program. Mest significantly, in February 2003 a team-of peiserinei(fream .10) was assigned-to won: .fullwtime'at the NSA to the Ell-31?s, participation in the preg-rarn. Team. 10?s chief responsibility was to disseminate Stellar Wind inferrnatien to FBI field offices. However, oVer time Team '10 began to partieipate. in-IStellar'Wind other ways. For example, Team 10 Submitted telephone numbers and email addresses to. the NSA for possible querying bulk meta data collected under the program, and Team 10 regularly contributed to the drafting process for Stellar Wind reports. foundthatthe-decision to assign Team 10 to the NSA rim-proved the knowledge about stellar Wind operations and gave the NSA better insight about-how FBI. field offiCes investigated Stellar Wind information. Thesebenefits-translated to. improve I tellar Wind report process, and'by extension, in leads. One of the other changes the FBI implemented to attempt to improve the process for handlingStellar Wind leads was to make the Headquarterabased Communications Analysis Unit (CAU), instead of the field responsible for issuing National Security Letters (N SL) to obtain subsCiriber information. on tipped telephone numbers and e-mail addresses. This measure, initiated- in July 2003, was intended to address agent conCerns that the leads, which reproduced the information in a Secretwlevel format, did not provide sufficient information to initiate national security investigations, a prerequisite under Department investigative guidelines to issuing NSLs. Agents complained that the E03 suffered from vagueness about the source of the information being provided and lacked factual details about the individuals allegedly involved with al Qaeda and with whom the domestic numbers being disseminated possibly were in contact. the CAU implemented this change by issuing NSLs fro?m the ontrol file, the non?investigative file created in September 2002 as a repository to ?related communications b1, b3, b7E between FBI Headquarters. and fiel uing NSLs from a control file instead. of an investigative file was contrary to internal FBI policy. In November 2006, the FBI finally opened an investigative file for the project. We believe the and OGC officials involved in the decision b1, b3, b7E the; had sufficient redic ton ither to connect.- the existing? preliminary 0 full investigations of al Qaeda and affiliated. WE. . er'eupeor?te open new preliminary or full investigatiOns in compliance with investigative guidelines. However, we concluded -1 the FBI could have,- and should have, openedan investigative filefer the decision we to: have FBI Headquartersinst?ad ?fOf ieldf? ffiCesisfsue:NSLs?forf. leads. I I "We? alSO "triedto. assess the general role of Stellar Win-d1 information :in -i?Vestig_ations and. its value to the overall Counterterror'ism.efforts; Similar toth-e FBI, We had dif?culty assessing the specific: value of the program to the counterterrorism activities. W) The-*rnaj orit-y of Stellar Wind information the NSA previded. the FBI ,reluate?dbtodeEStic telephone numbers and e?mail addresses the. NS-Ahad ,ti?ed dataanal; sis connectisto al .ae?dav-or' . b1, marinas. 3 b3, 'b7E r31 ingly-? ge ts. .nd analyst Wl?th experience ins Iga e?adsft?dldvus that most leads Were determined not to have any co: to terrorism. These a ents and did not identify for us. any ?Speei?c cases Where eads helped the FBI identifjr previously unknownsubjectsinvolved1n terrorism, although we recognize that FBI official-s agents other than those we interviewed may have had different experiences With Stellar Wind information. Two FBI statistical studies that attempted to assess the value of Stellar Wind meta data leads- to FBI counterterrorism efforts did not reach explicit conclusions on the program?s usefulness. The first study found that 1.2 percent of Stellar Wind leads made ?fsignificant? contributions.454 The second study did not identify any examples of ?significant? Stellar Wind contributions to FBI counterterrorism efforts.455 The FBI OGC told us that 45" As we described earlier in this chapter, the FBI considered a tipper ?significant? to any of three investigative results: the identification of a terrorist, the deportation from theTU-nited States of-a suspected terrorist, or the development of an asset that can report-about the activities of terrorists. 455 As described earlier in this chapter, the FBI considered a tipper ?sign'ifiCantthree investigative results: the identification of a terrorist, the deportation from the United States of a suspected terrorists or the development of an asset that can report about the activities of terrorists. Statements/by:Seiniior FBI officials in enn.gresSional testimony that the Stellar value were based in l?part'on. the results, of the: first study; Which-found that percent of the Stellar V?Wind, lead-s made significant centribmiensvito FBI casesintervieWed generally were suppertive of Stellar Wind 1, calling the information ?one tool of many.? in the. "ti?terrorism] "fforts that ?Could help move cases- forWard? by, fer-example, 131,133, with individuals involved. in terrorism er b7E identifying- additional terrorist contacts. HOWever,? FBI agents. and ?also; toldus that the Stellar Wind information dissemi-nated-to-FBI field offices: oeuld also be frustrating because it often lacked details about the foreign individuals allegedly involved in terrorism with Whom domestic telephone num 'ers and email addresses were in contact. Some agents also project failed to adequater prioritize leads sent to FBI field offiCes; i FBI Director Mueller told us that he. believes the Stellar Wind program was, gursefulanjd that the-FBIimustfollow ever-y lead it receives in :order?to- prevent future te-rrorist attacks; Herstated that to the eX-tent such infOrrnation ean begathered and used legal-1y it mustbe: exploited, and that dismi'SS the poteney of a program based? on the percentage of hits.?- Oth'er this View thatan Q?nOt-be assessed by statistical measures alone. Genera-l Hayden said that 'thejvalue of the program may lie in its ability to help the Intelligence community-determine that the terrorist threat embedded within the country isnot as, great as once feared. Some witnesses also 'believedthat the value either program should not depend on documented ?success stories,? but ratherQn maintaining an intelligence capability to detect potential terrorist activity. inthe: future. Several witnesses suggested that the program provides ?early Warning system? to allow the Intelligence Community to detectjpotential terroriSt attacks, eVen if the system has not specifically uncovered evidence of preparations for such an attack. As part of our analysis, we sought to look beyond these comments of general support for Stellar Wind to specific, concrete examples of the program?s contributions that illustrated the role Stellar Wind information either has or could play in the counterterrorism efforts. We examined five cases frequently cited in documents we reviewed and during our interviews as examples of Stellar Wind?s positive contributions to the countrirterrorism efforts. The evidence indicated that Stellar Wind information had value in some of these investigations by cansing the FBI to take aetion that led to useful investigative results. In other cases the connection between the Stellar Wind information and the investigative actions was more difficult to -- ii In the. end, we found it difficult to assess or'qu'antify the overall geffECt'iveness.of the::Stellar Wind program to the FBI"sIc?ounterterrorism activities. HoweVer, based on the inter-views condiicted and documents ire-Viewed,- we "cericlud?e?d that although Stellar Wind information had value in some counts-rterrorism investigations, itgenerally played a limited ?role in the overall Counterterrorism efforts. "Itisialso important to note that a significant consequence of the NSA program and; the approach to assigning leads. for'program.information that FBI field offices. conducted many threatassessrnents on individuals located: in the United States, including US. persons,ft-hait typically were determinedinot to have any nexus to terrorism or repreSent a threat to national security. As a result, the FBI collected and. retained a significant amount ofpersonal inferrnation about the users of tipped telephone. numbers d-euma'il addresses, Such as names and home addresses, places eterneleymem, foreign "travel, and the identity of family members. The _-resultsqof thesethreat aesessments and the information collected generally WEre-repOrted in communications to FBI Headquarters and uploaded into 'FBl'databases, I lie collection of information in this 'oing?under project, the successor FBI Irojeet to hicih ates-to'FBI field. offices lead information theNSA. erives from bulk 'd ail meta data now collected u-nderFI-SA authority. Like b1 I project requires FBI ?eld offices. to b3, assessments. on: telephone numbers and. e?mail addresses identified through 13733 the analytical- process that the FBI is not already aware of, including telephone numbers and email addresses one or two steps removed from direct Centac'ts with individuals involved in terrorism. To the: extent the leads derived from the FlSA?authOrized activities generate results similar to those under Stellar Wind, the FBI threat assessments Will?continue to result. in the collection-i and retention of a significant amount of personal information about individuals in the United States, including'US. persons, Who do not have a nexus to terrorism or represent a threat to national security. - We recommend that, as part of the project, the Justice Department?s National Security Division (NSD), working with. the FBI, should collect information about the quantity of telephone numbers and e?mail addresses disseminated to FBI ?eld offices that are assigned as 131: Action leads and that require of?ces to conduct threat assessments. The b3, b7E information compiled by the Justice Department should include whether individuals identified in threat assessments are U.S. or persons and whether the threat assessments led to the opening of preliminary or full national Security investigations. With respect to threat assessments-that conclude that users of tipped telephone numbers or e?mail addresses are ?Qt- in; terrorism and are not? threats to: national security, the Department.?shgoulitlytalce Stops to track the quantity?2and nature of" this? ?IUiS-up?l?sbn informationcollected.and how the FBI-retains and? utilizes thisihlortrratibn. Thiszwillienahl'e the J-uetiCe Department and-entities with oversight:L-responSibilities, including the 016? and Congressional committees, to, assess thesilmpact' this "intelrli?gen?Cet program, hasOn theprivacy interests of-?g?g; pgrs'gnsuahd thCOIl?SldEl? whether, and for how long, such information should retained; NF) we. Con-313mm With o-Url.? 61711: oversight activ'i 'ahdiias part Of 11$ PeriQdiCIrevieWS of national -?S?curii_ty intrastigationse at FBI He - arters and field Of?ces, l??view a bl, b3, requi?ements'i? 1115131156 'Ofi-the?lead and in any ensuing investigations: particularly Will the: the collection. and use of P3175011, information - ?1 "Discovery and ?Scrubbing? issuer?? Although Stellar Wind was and: implemented as an 'intelligenoagathering, .prOgraIn? it was inevitable that the information; from this .pmgram? Would the Department?s prosecutoifial functions, casesbrought in federal courts and in Seeking PISA orders from the ?FISA-Cotlrt. We'found that the limited number of Department read-Line ai'So had adverseeonsequences on issues related to theSe Department functions. One suCh issue concerned the Department?s compliance with- dgiscOVery obligations in, international terrorism- prosecutions,_ Which we :d?isoussinChaer Several We determined that the Department-was aware as: early as that information collected under Stella-r Wind could have: b1, b3 implicatiOns for-the Department?s litigation responsibilities under Federal Rule of Criminal Procedure 16 and Brady 1). Maryland, 373 Us. 83 [1963}. I [(137, lnrm?mm I unuvvl it Hi] I b1, b3, b6, b7C, b7E b1, b3, b6, b7c, to . to respond on aease?byecase basis, to ~b7E . Department attorneys with terrorism prosecution responsibilities. were read into the Stellar Wind program until mid?2004, as aresult' the Department continued to lack theadvice of attorneys Whowere ibest-?rrequipped to identify and examine the discovery issues in the-program. Since that ti erartment has taken Ediscovery motions .- responses involve the use of the Classi?ed Information. 9(qu 'rgg: Act! App. 3, to file expaire.in-earnera pleadings..With . - F1 HoWever; the Department of Justice continues to lack a comprehensive- process for identifying potentially discoverable Stellar Wind information in terrorism cases. In this regard, we recommend that the Department assess its discovery obligations regarding Stellar Wind?derived inferrnation in international terrorism prosecutions. We. also recommend that the Department carefully consider whether it must 1?e~examine past eases to see whether potentially discoverable but undisclosed Rule 16 or Brady material was collected by the NSA under the program, and take apprOpriate steps "to ensure that it has complied with its discovery obligations in such cases. We also recommend that the Department, in coordination with the NSA, implement a procedure to identify Stellar Wind-deriyed information that may be associated with international terrorism cases currently pending or likely to be brought in the future and evaluate whether such information should be disclosed in light of the government?sdiscovery obligations under Rule 16 and Brady. lri additiOn, :we examined the 'issu'e of. the Department?s use of. Stellar -Wi}n'dederived information in MBA applications. We} believevit was foreseeable that some Stellar Wind-derived information-Would be Contained- applications filed by'the Department?s Office Of Intelligence Counsel Bake-r believed, and we agree, that been detrimental to this relationship if the-Court learned that information .?from Stellar Wind Was included in FISA applications without the Gouritbein-gtold so in advance. As discussed in Chapter Three, White House officials initially rejected the idea of reading in members of the: FISA Court, but" after Department. officials continued to press. the issue, ultirnrately inJannaiy 2003 agreed to read, in a single judge .in Jannary 2002 (Pres?idingJ-udg?e Lamberth, followed by Presiding Judge Kollar-Kotel-ly in May2002). The ?scrubbing? procedures imposed by the Court-and implemented by Baker to account for-Stellar Wind~derivcd information; in international terrorism PISA applications Created concerns among some OIPR attorneys about?.thezrunexplained changes being made to their FI-SA applications. These Scrubbing procedures alSo substantially altered the assignment of Court judges for nearly 3 years. We concluded?, that once Stellar Wind. began to affect the functioning of the FISA process shortly rafter the program?s inception, the number of OIPR staff and PISA C0urt judges- read.'.into Stellar Wind should have increased. Instead, read~ins were limited to a single OIPR official for over two years and tothe Presiding Judge pith-eaters Court for aperiod of four years, ThezJustice Department, together with the FBI and the NSA, today continues. to apply scrubbing procedures to international terrorism FISA applications. Since January 2006, all members of the Court have been briefed on the Stellar Wind. program and all of the judges handle applications that involve Stellar Wind-derived information in applications. While we found that the government has expended considerable resources to comply with the scrubbing procedures required by the FISA Court since February 2002, we did not find any instances of the government being unable to obtain FISA surveillance coverage on a target because of this requirement. ,1 91/ Wit. Gonzales?s Statements am As part of this review, the OIG examined whether Attorney General Gonzales made false or misleading statements to Congress related to the . Stellar Wind program. We concluded that Gonzales's testimony did not "De "artment and FBI officials or the brink-of resi c?enstitute fa falseustatement and? that he did, not intend to mislead Congress, tweeter, we Concluded that his testimony? inusever-al respects was 7 7C?in?i5ing?2wn?Ot-scsursts and had the effect Qfm-isle'ading' those who-were n?i?Im?Gthgeable- about the Program. - "i Aspects of the -Stel-1ar Wian program were first..d-isclosed publicly-ins artiCIesi?ina?l?heNew York Times in. December 2005. In response, the?l'Presidentpublicly confirmedva portion of which he called surveillance-program describing itras-"the interception of the. content-cf international commu-niCations of people reaSQnably believed: to- -1injk_seto al?Qaec?la and related organizatiOns (basket 1). Subsequently, Attorney-"General Gonzales was questioned about NBA surveillance activities lilr'tWO hearing-s before the Senate Judiciary Committee in February 2006? andJuly2007. . - media accounts and former Deputy Attorney General come-yrs Senate-Judiciary Committee testimony in .May2007,. it was publicly the Department and the White House'had air-major disagreement related to; the program in March'2004.. As. dismissed in- Eour, thisdispute whitih resulted-in the visit'to Attorney General Reheroft.?slh0spital.room. by Gonzales and Card and brought several senior. nation after the. White- ?In his testimony before the Senate. Judiciary Committee, Gonzales- -.stated. that the-dispute at issue between the Department the White House. didenot' relate to the ?Terrorist Surveillance Program? that the President had. Confirmed, but rather pertained to Other intelligence We believe this testimony created the misimpressicn that the dispute concerned activities entirely Unrelated to the terrorist surveillance program, Which was not accurate. In ad?ditiOn, we believe Gonzales?s teetimony that Department attorneys did notihave ?reservations? or "cdncerns" about the program the ?President has confirmed? was incomplete and confusing because Gonzales did no . . 7_ Department?s concerns were what led to '7 7' '7 _;nd that these concerns had been conveyed to the Wh1te House riod of months prior to and including March 2004- when the issue was resolved. We recognize that Attorney General Gonzales was in the difficult position of testifying about a highly classified program in an open forum. HOWever, we also believe? that Gonzales, as a participant in the March 2004 dispute: between the White House and the Justice Department and, more importantly, as the nation?s chief law enforcement officer, had a duty'to balance his obligation not to disclose classified" information with the needy net to, he misleadingin;his-testimony about the-events that?nearly ledt'o massresignations, of the most-senior offiCials at the Just-ice Department and ?we'helieve-that Gonzales did notintend to .misl'ead i We was confusing, inaccurate, and had the ofirnisleadingthose Who were: not knowledgeable about the program. - .Conelus'ion ii?) From the inception of the Stellar. Windprogram in. October 20.01, v-aSt amounts Of information about telephone and emrr?iailcomrnumcationswere, in databases at the NSA. The NBA used this information to. conductanalysi?s and dies-eminate reports to support the efforts. We found that in. the early years of Stellar. the Department-of Justice lacked the necessary legal resources toicarry? out anadequ?ate: revier-of the legality of the TheWh-ite Hellse strictly-Controlled the Departnient?s'raccessto ?1.13 program. For the, ?rst year. a half of only ShDepartrnent. officials,werereadjinto Stellar Wind, andonly-S more officials had been read. lay-the end of 2003'. Only a single Department attorney analyzed the legal basistor therprOgram during firsitye'ar. anda half- of its. operation. after additional Department; officials were read into the-program, the Department determined-that this attorney?s initial?le'gal analysis was egg-1.1mm factually ?awed. webeli?eve thatthe strict controls over the Department?s access. to the program undermined the roleof the Justice Department in advising the President as to the. legality of the program during its early phase of operation. The Department?s comprehensive reassessment of the program?s . legality} beginning in midv20?03' resulted in a contentious di-Spute with the White House that nearly led to the mass resignation oif?the Department?s. senior leadership, In March 2004 the White House continued the program despite the Department?s contilusion that it found no legal suppOrt for aspects of the pro ram. In the face of the otential resignations, however, the White Hous Department?s legal concerns. Eventually, the entire program was transitioned, in stages, to the authorityof the FISA statute. Given the bread nature of the collection activities under the Stellar Wind program, the substantial amount of information the program collected related to US. persons, and the nevel legal theories advanced to support the program, we believe that the Department should have more carefully and thoroughly reviewed the legality of the program, in accord With its normal ?mi It?J-uu belief-operation. peer? review and oversight- practices, particularly-during its first year and a Wealso eoneluded that the Department should have begun transition the Stellar Wind program to authority earlier than March. 2004,..Twhen that .process. began, especially as Stellar Wind became less a- temporary response. to the September 11 attacks and more a permanent. surveillance teel. We believe thatsuch broad surveillance and collection activities?conducted-in the?United Statesrthat impact persons, partiallarly when they extend for such a signifiCan-t period of time, should b'ec-onducted pursuant to statute and" be subjected to judicial oversight. Placing-such activities under Court supervision, as now occurs, also protrides an important measure of accountability-for the government?s Conduct that isrless assured when the activities are authorized and supervised-by the Executive Branch alone. Finally, We. believe that the Department should carefully monitor the co'lle?Ction, 113e,, retention of the information'that is now collected under authority, given theexpansive scope of the collection activities. The Department-and other agencies should also continue to examine the value cfeollecting such information to the government?s ongoing coun?terterrdrism 'effOr-ts, mum u. .2 'drv, .5131}; SI .Irll], II).