Ali redacted information exempt under andlor except aS otherwise noted. Approved for Public Release emf -. [t r? L. ta. w' mu?: i' tit-4?" Hv UNITED STATES 3:132? L5H. a FOREIGN INTELLIGENCE SURVEILLANCE conga; 3 3-: WASHINGTON, DC. II #t a; fl it?: t- t. 9" eta taint! 1hrIf?. CHM 55:. 1 zit/?J U: taunt es;- GOVERNMENTS EX PARTE SUBMISSION 0E REAUTHORIZATION CERTIFICATIONS AND RELATED PROCEDURES, EX PARTE SUBMISSION OF ADIENDED CERTIFICATIONS, AND REQUEST FOR AN ORDER APPROVING SUCH CERTIFICATIONS AND AMENDED CERTIFICATIONS (SHOW In accordance with subsection 702(g)(1)(A) of the Foreign Intelligence Surveillance Act of 1978, as amended (PISA or "the Act?), the United States of America, by and through the undersigned Department of Justice attorney, hereby submits ex parte- and under seal the attached certifications- All redacted information exempt under andlor except as otherwise noted. Approved for Public Release -u?n a These certi?cations reauthorize eXpire on September 10, 2014. Attached as Exhibits the targeting and minimization procedures to be used under these certifications.1 -130 include amendments to the certi?cations bemg reauthorized, - nd their predecessors.2 Speci?cally, these amendments authorize the use of the minimization procedures attached herewith as Exhibits B, D, and to in connection with foreign intelligence information acquired in accordance with- 1 (SW Speci?cally, the targeting procedures to be used by the National Security Agency (NBA) and Federal Bureau of Investigation (FBI) are attached as Exhibits A and C, respectively. The minimization procedures to be used by NSA, the FBI, the Central Intelligence Agency (CIA), - and the National Counterterrorism Center (NCTC) are attached as .E?iibits B, D, E, and G, respectively. The NCTC minimization rooedures attached as E>d1ibitG were submitted in connection wt 11 July 31, 2013?r and Were approved by the Court on August 30, 2013. The remaining targeting and minimization procedures are being submitted with? for approval by the Court. sot All redacted informati on exempt under andlor . . . (3), except a hemise noted. Approved for Public Release .- . i i the exception of the NCTC minimization procedures attached as Exhibit G, thetargeting and minimization procedures being wid- a of We is targeting and minimization procedures approved for use under the predecessor certifications. To aid the Court in its review of the targeting and minimization procedures, below is a discussion of certain of these changes. Also included below is an update to the description of the process that NSA uses to resolve - . indicating that a tasked electronic communications?may have been accessed from inside the United States. The NCTC minimization procedures attached herewith as Exhibit (3 are identical to the NCTC minimization procedures that already have been approved for use this Court in connection with forei intelli ence information ac uired in accordance with Thus, with respect to those . I procedures, no amendments are necessary. WSW All redacted information exempt under andlor except as otherwise noted. Approved for Public Release A. _l Targeting Procedures The NSA targeting procedures submitted as Exhibit A to- _c0ntain anew provision that clarifies the intended scope of the procedures. Specifically, the SA targetihg procedures state that NSA is required under its current targeting proceduxes to detask facilities from section 702 acquisitien when?, infer glitz, NSA believes that a user? of that faCility is inside the United States or is a United States person. To date, the Government has been applying this requirement even in circumstances to date the failure to detask the account prior to such access has been considered a' compliance incident. Such incidents have involved,- fer example, All redacted information exempt under andlor except as otherwise noted. Approved for Public Release :1 In?. .- (-SHQGINB Section 702 permits the Director of National Intelligence (DNI) and the Attorney General (AG) to authorize the "targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information,? 50 U.S.C. 1881a(a). As previously explained by the Government-the ?targeting? of a person to acquire foreign intelligence information under section 702 is accomplished through the tasking of a facility that he/she uses._ Sec, sag,? _ovemment?s Mammary Responses to Certain Questions Posed by the Court (filed Aug. 26, .2008), at 3. Such acquisitions cannot intentionally target U.S. persons. 50 U.S.C. 1881 The Government respectfully suggests that ivhen All redacted information exempt under (b (1) andlor exce herwise noted. Approved for Public Refease The Government therefore respectfully suggests that this change to the NBA targeting procedures is consistent with the requirements of the statute and the Fourth Amendment. (8) The Government does not believe that this change to targeting procedures will affect the amount of time NSA takes to resolve- concerning section 702?tasked electronic communications that may have been accessed from inside the United States. All redacted information exempt under andlor except as otherwise noted. Approved for Public Release - .P - ?21- IL Lll= The NBA targeting procedures submitted as Exhibit A to All redacted information exempt under (330(1), and Approved for Public Release 63)- Targeting Procedures Ail redacted information exempt under I I . '1 - 7' 3). and Approved for Public Release (89?13131? Mnimization Procedures Government has filed with the Court a proposed motion to amend the Standard Minimization Procedures that the FBI applies in matters involving - These proposed? amendments contain provisions governing the provision of information to the National Center for Missing and Exploited Children (NCMEC) and the retention of PISA?acquired information associated with litigation matters. The FBI minimization procedures submitted as Exhibit to- _ontain substantially similar provisions; described in more All redacted information exempt under and Approved for Public Release detail below.5 A. Dissemination to the National Center for Missingand Exploited Children The FBI minimization procedures submitted as Exhibit to Certifications?peth the FBI to disseminate, for law enforcement purposes, section 7027acquired information that reasonably appears to be evidence of a crime related to child exploitation material, including child pornography, to NCMEC. The FBI minimization procedures also permit the FBI to disclose to CMEC, for the purposes of obtaining technical or linguistic assistance, such - acquired information for further processing and analysis. I Through its investigations, the Government has identified and continues to identify section 702?acquired information the-Government has determined to be indicative of a crime related to child exploitation materiai, including child pornography. NCMEC, established by Congressional mandate in 19-84, is a private, nongovernmental- organization that today works in partnership with the Government to ?help law enforcement find missing children, eliminate child sexual exploitation, and prevent child victimization.? About Us Congr?ssional Authorization, NCMEC, (last visited July 17, 2014). The Government 10 All redacted information exempt under and Approved for Public Release . . .- I . . - l_ believes it has an obligation to share with NCMEC such section 702-acquired information as part of the Government?s Project Safe Childhood initiative, which seeks to combat the proliferation of technology-facilitated crimes involving the sexual exploitation of children, including through the inVestigation and prosecution of offenders and involvement in prevention and deterrence. About Project Safe Childhood, US. Dept of Justice, (last visited July 17, 2014). The Government also believes it has an obligation to share such section 702?acquired information with NCMEC as part of the Government?s National Strategy for Child Exploitation and Interdiction, which was formulated and implemented in response to the Providing Resources, Officers, and Technology to EradicateCyber Threats to Our Children Act of 2008 (the Our Children Act?). See US. Dep?t of Justice; Nat?l Strategy for Child Exploitation Prevention and Interdiction, at 8-28, 9395 (concerning NCMEC in detail); PROTECT Our Children Act of 2008, Pub. L. 110?401, 122 Stat. 4229 (2008). (SW-15413) NCMEC has partnered with the Government to prevent and interdict in the sexual exploitation of children. One of the express purposes 'of the annual grant by Congress supporting NCMEC is for NCMEC to "operate a child victim identification program in order to assist the efforts of law enforcement agencies in identifying victims of child pornography and other sexual crimes.? 42 U.S.C. 5773(b)(1)(R). All redacted information exempt under 1), and Approved for Public Release through its Child Victim Identification Program, serves as the central repository in the United States for inforrnation that relates to child victims depicted in images and videos that are sexually exploitative. Child Victim Identification Program, Nat?l Center for 'Missing and Exploited Children, (last visited luly 1'7, 2014:). The Child Victim Identification Program has a dual inission to (1) provide information relevant to child pornography investigations; and (2) assist in the identification of child victims depicted in pornographic images. Id. Law enforcement officers submit copies of seized child pornography images to law enforcement officers co?located at NCMEC on behalf of their respective agencies. Personnel at NCMEC review the seized images to determine which contain previously identified child victims. Id. NCMEC generates a Child Identification Report that includes Contact information for the law enter-cement agency that originally identified the child. See generally Michelle Collins (Vice President, Exploited Children Division and Assistant to the President of CMEC), "Federal Child Pornography Offenses,? Testimony Before the U5. Sentencing Comm?n. (Feb. 15, 2012), at 3 (describing proprietary software), (last visited July 17, . 2014). retains but does not otherwise disseminate or redistribute the images. However, with regard to any possible further disclosure by CMEC, the FBI Will advise All redacted information exempt under and Approved for Public Release WW NCIVIEC of the need to comply with the restrictions described in Section IVD of the FBI minimization procedures. I For the reasons provided, there is criminal investigative and analytic merit to the FBI sharing section 702?a?cquired information with NCMEC. As definition of "minimization procedures? makes clear, notwithstanding general protections afforded U.S. persons and US. person information, the minimization procedures may ?allow for the retention and dissemination of information that is evidence of a crime which has been, is being, or is about to be committed and that is to be retained or disseminated for law enforcement purposes.? 50 U.S.C. 1801(h); see also 50 U.S.C. 1821(4), 50 U.S.C. 1881a(e)(1). The Government respectfully submits that the FBI minimization procedures submitted as Exhibit to- ?are consistent with the needs of the Government to prevent, investigate, and potentially prosecute violations of criminal statutes, ?nd missing children, reduce the incidence of child sexual exploitation, and prevent child victimization. B. Retention of PISA?Acquired Information for Litigation-Related Reasons . The FBI minimization procedures submitted as Exhibit to certi?cations?also address the and the Government?s need to 13 All redacted information exempt under and Approved for Public Release WSW I retain certain section 702~acquired information for litigationwrelated reasons. More specifically: the _I\y section 702?acqui1'ed information associated with FBI investigative case files that the Government determines must be retained because it may be necessary for, or potentially discoverable in, pending administrative, civil, or criminal litigation. Wit-)- The FBI places FBI investigative case ?les on a "litigation hold? list-w- thus exempting them from destruction?if those case files relate to active litigation matters. In some instances, these investigative case files also contain information acquired pursuant to PISA. notwithstanding its association with investigative case ?les subject to a ?litigation hold.? To permanently address this issue, the Ail redacted information exempt under and Approved for Public Release - The Department of Iustice and the FBI have deveIOped a collaborative process to identify FISA information that should be retained for litigation?related reasons. In addition, the Government will report to the Court once per year about any PISA iniormation retained pursuant to this provision. - Similar to the the FBI minimization procedures submitted as Exhibit to Certi?cations for the retention of section 702?acquired associated with FBI investigative case files that there is a litigation-related reason to retain. The FBI section 702 minimization procedures exempt from?any section 702??acquired information that may be relevant to active litigation ?matters, and obviate the need for individual motions to the Court seeking exemption from the destruction requirements in individual cases. Any section 702-acquired information retained pursuant to the ?litigation hold? provision will be identified through a collaborative process involving the Department of Justice and FBI, will be subject to access restrictions, and will be reported to the Court once per year. AH redacted information exempt under and Approved for Public Release C. Dissemination to Private Entities and Individuals of Foreign Intelligence Information or Evidence of a Crime Involving a Matter of Serious Harm - Finally, the FBI minimization procedures submitted as Exhibit to Certifications include a nevv provision that would allow the FBI to disseminate information to a private entity or individual in those cases in which that entity or individual "is capable. of providing assistance in mitigating serious economic harm or serious physical harm to life or property.? See Exhibit D, attached herewith, section V.I., at p. 33. This provision closely mirrors section VH. of section 702 minimization procedures, 1which allows for similar disseminations to private entities and individuals who are capable of assisting in mitigating or preventing computer intrusions or attacks. The new provision addressing serious economic harm or serious harm to life or property has been added to allow the FBI to disseminate information to private entities or individuals in cases other than those involving computer intrusions or attacks, such as if the FBI discovered evidence in section 702? acquired data of credit card theft or aplot to destroy a building or monument. The Government submits that this dissemination provision is consistent with the need of the United States to obtain, produce, and disseminate foreign intelligence information and comports with the definition of minimization procedures set forth in 50 U.S.C. 1881a(e)(1). This amendment is consistent with the legislative history of PISA, which 16 All redacted information exempt under and Approved for Public Release recognizes met some situations may require disclosure of FISAFacquired information - outside of government channels. See HR. Rep. 95?1288, at 88 (1978); 8. Rep. 95-604, at 54 (1978). (8) NBA and Minimization Procedures (SW-E) As with the minimizetion procedures used by the FBI and discussed in further detail above, the Government has added language to the minimization procedures used by the NBA and CIA and submitted as Ekhibits and E, respectively, WW 17 redacted information exempt under andfor except as otherwise noted. Approved for Public Release ES) The Resolution of-Indicating that a User May Be in the United States (8741315)- Pursuant to Section II of section 702 targeting procedures, NBA conducts post?targeting analysis that includes routine checks of all section 702?tasked . electronic commwucaaons_ against available- any, of such?may have been accessed from inside the United States. As previously described to the Court in a letter filed May 21, 2010 [noted above, and attached as Attactment C) and various subsequent compliance notices, NSA process to implement and prioritize routine checks of all such tasked facilities for information indicative of potential access originating from the United States. pt as otherwise noted. Approved for Public Release ll All redacted information exempt under andfor exce The volume of-varies, but NSA reports that,- _on average more than-are typically generated each day (including from approximately lot which on average are further prioritize-s potentially indicative of access originating from the United States.5 It is important to note that a single facility may generate- -and not all-are indicative of compliance incidents.7 . i 65% SA has also implemented controls to ensure the timely and effective resolution of the . generated through the -post?tasl