Review of the Fbi Use of Exigent Letters and Other Requests for Phone Records 2010 Partb
Download original document:
Document text
Document text
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
The on-site Company A analyst told us that he therefore began to provide records in response to a letter from the FBI called an "exigent letter" - which stated that exigent circumstances had prompted the request and that subpoenas requesting this information have been submitted to the U.S. Attorney's Office who will process and serve them formally to Company A as expeditiously as possible. According to the SSA who signed the first of these exigent letters in November 2002, the exigent letters were issued as "placeholders" to enable the FBI to secure the records promptly. However, the letters still committed the FBI to serve grand jury subpoenas on Company A after the records were provided, which the FBI did. We identified a total of 37 exigent letters issued by the New York Field Division between November 2002 and April 2003. 15 The SSA who signed the first exigent letter and 11 other exigent letters issued on New York Field Division letterhead said that he signed these letters because he understood that the concept had been approved by Company A attorneys and he never thought about the legal authority for the letters. A Company A analyst told us that the exigent letter was drafted by someone in the FBI, and that Company A thereafter accepted the letters. However, we were not able to determine who initially drafted or approved the New York Field Division's use of these fIrst exigent letters. In 2002, the FBI reassigned several SSAs who had been working in the New York Field Division to temporary duty assignments at FBI Headquarters to help set up the CAU as a new unit in the FBI Headquarters' Counterterrorism Division (CTD). In 2003, one of the Company A analysts who had worked at the FBI's New York Field Division's offices was also reassigned to work in the CAU. The overlap in Company A personnel who worked in the New York Field Division and later at FBI Headquarters contributed to the migration of the exigent letter practice to FBI Headquarters in 2003. 1S New York Field Division personnel issued at least 20 additional exigent letters from October 2004 to September 2006. Although an SSA assigned to work in the New York Field Division estimated that he signed at least 50 to 60 exigent letters, the OIG identified only 19 exigent letters signed by this SSA. Based on this statement and other information developed in our investigation, we believe more exigent letters than the 798 we identified in our investigation were issued by the FBI. However, because of the FBI's inadequate record keeping practices, we could not determine how many more were issued. 13 The Work of the Communications Analysis Unit (CAUl and the FBI's Contracts with the Three Communications Service Providers B. As part of a reorganization of the CTD following the September 11 attacks, the FBI created the Communications Exploitation Section (CXS) in 2002. The mission of the CXS was to support the FBI's investigative and intelligence missions by analyzing terrorist communications. As noted in Chart 2.1 one of the four units created within the CXS was the CAU. J 14 CHART 2.1 Organizational Chart of Communications Exploitation Section Executive Assistant Director for Counterterrorism and Counterintelligence I Counterterrorism Division (CTD) Operations II (OPS II) Communications Exploitation Section (CXS) Document Exploitation Unit (DocEx) Electronic Communication Analysis Unit (ECAU) Communication Analysis Unit (CAUl Electronic Surveillance Operations & Sharing Unit (EOPS) *The Document Exploitation Unit became the Diji{ital Media Exploitation Unit (DMXj on March 26. 2006. 15 In 2003, the FBI entered into a contract with Company A pursuant to which a Company A analyst was located in the CAU's office space. The FBI also entered into separate contracts in 2003 with Company C and in 2004 with Company B to locate one of their analysts in the CAU's office space. We determined that a CAU SSA issued the CAU's first exigent letter to the Company A analyst, then still located at the New York Field Division, on March 14,2003. When the three communications service providers' employees were located in the CAU, CAU personnel issued similar exigent letters to these individuals. These exigent letters issued by CAU personnel were for the most part identical to the exigent letters issued by the New York Field Division in its criminal investigations after the September 11 attacks. As described below, we determined that from March 14, 2003, through November 13, 2006, CAU personnel issued a total of 722 exigent letters to the 3 on-site communications service providers. 1. The CAU's Mission and Organizational Structure The CAU's mission is to analyze telephone communications and provide actionable intelligence to the appropriate operational units in the FBI.16 The CAU was established as an "operational support unit" rather than an operational unit. Under FBI internal policy, as operational support components, neither the CXS nor CAU personnel could initiate national security investigations or sign NSLs. From 2003 through 2006, the CAU was organized into teams, each of which was led by an SSA and included other SSAs, Supervisory Intelligence Analysts, Intelligence Analysts, and Technical Information Specialists. Each team supported specific FBI field and Headquarters operational divisions, legal attaches, and classified special projects. Following its establishment in late 2002, the CAU initially was supervised by Acting Unit Chiefs. Two SSAs served as the Acting Unit Chiefs from September 2002 to March 2003. In March 2003, Glenn Rogers was appointed as the first permanent CAU Unit Chief. 16 The CAU's mission was described in a January 6,2003, FBI Electronic Communication (EC). This EC, which was drafted by the CAU's Acting Unit Chief and sent to all FBI divisions, described the CAU's mission: CAU facilitates the prevention and prosecution of international and domestic terrorism activities through the relevant collation, incisive analysis, and timely dissemination of high-quality intelligence identified through telephone calling activity. 16 In November 2004. Rogers was promoted to Assistant Section Chief for the CXS.17 Bassem Youssef succeeded Rogers as the CAU Unit Chief and remained the CAU's Unit Chief throughout the period covered by our review. Chart 2.2 shows the personnel who held key positions in the FBI's senior leadership, the FBI Office of the General Counsel (FBI OGC), and the Counterterrorism Division during the period covered by our review. 17 Rogers retired from the FBI in November 2006. 17 CHART 2.2 FBI OGC, Senior Leadership, and Counterterrorism Division Officials Management (2003 through 2007) 3003 aoo4 ~ 30011 3007 JrMAMJJA80BDJrMAMJJA80.DJrMAMJJABOBDJrMAMJJA80.DJrMAMJJA80BD IUeba~ a_"....10 Mar 05 - Jan 06 D Acting • Data NOT Provided L.M. = Larry Mefford 18 J.P. = John Pistole J.B. = James Bernazzani We interviewed 15 SSAs and 10 Intelligence Analysts who were assigned to the CAD beginning in March 2003. They stated that their duties consisted chiefly of responding to requests from field divisions, legal attaches, and operational Headquarters units. These requests included asking the CAD to obtain and analyze telephone numbers related to ongoing FBI investigations and to report back to the requester with telephone records and analysis. CAD personnel analyzed the telephone numbers by obtaining information from numerous databases and other resources, including information from the three on-site communications service providers. One SSA from a CTD operational unit who frequently requested CAD support characterized the CAD's role as having "a phone database on steroids; to identify 'good' versus 'bad' numbers; to provide. charts and analysis; and to get numbers in a usable format for the field." Nearly all of the 15 SSAs we interviewed who worked in the CAD told us that when they arrived at the CAD they had little or no experience in national security investigations. 18 In addition, all but 2 of the 29 FBI employees we interviewed who were assigned to work in the CAD said they had limited or no prior experience working with NSLs. None of the SSAs we interviewed said that the FBI provided them training on the legal and internal FBI requirements for issuing NSLs until after the OIG's first NSL report was issued in March 2007. 19 2. Terminology Used in this Report for Non-Content Telephone Transactional Records As described above, the ECPA generally prohibits communications service providers from divulging "a record or other information pertaining to a subscriber to or a customer of' their services. 2o However, in authorized 18 Virtually all of these SSAs had extensive experience in conducting or supporting criminal investigations, which were governed by a different set of Attorney General Guidelines than the Attorney General's Guidelines for FBI National Security Investigations and Foreign Intelligence Collection (NSI Guidelines), which applied to the conduct of national security investigations. 19 In response to the OIG's recommendations in our fIrst NSL report, the FBI is now providing mandatory NSL training to FBI employees involved in the use of NSLs. This training, as well as the NSL guidance and other corrective actions implemented by the FBI and the Department in response to our fIrst NSL report, is described in Chapter Four of our second NSL report. 20 18 U.S.C. § 2702(a)(3). 19 international terrorism and espionage investigations, the ECPA created an exception to this general prohibition, which allows the FBI to request "the name, address, length of service, and local and long distance toll billing records of a person or entity" upon written certification by the FBI Director or his designee that the records sought are relevant to an authorized international terrorism investigation, provided that any investigation of a United States person "is not conducted solely on the basis of activities protected by the first amendment. "21 In this report we generally use the term "toll records" to refer to the non-content records of telephone calls that the three communications service providers provided to the FBI in response to exigent letters and other informal requests. 22 Toll records in this context are the date, time, duration, and the originating and terminating numbers to a telephone call. These records are also sometimes referred to as "transactional" records, as distinguished from the content of telephone calls. The FBI is not authorized to collect the content of any telephone calls through NSLs. 3. FBI Contracts with the Three Communications Service Providers In 2003 and 2004 the FBI entered into contracts with three communications service providers requiring the communications service providers to place their employees in the CAU's office space and to give these employees access to their companies' databases so they could immediately service FBI requests for telephone records. 23 These employees were also on call to the FBI after business hours. The contracts required " 18 U.S.C. § 2709(b)(I). 22 FBI personnel and employees of the on-site communications service providers sometimes referred to these records by using other industry terms such as "call records," "call detail records," "calling activity information," or "tolls." In addition, the terminology used in the contract documents to describe records provided to the FBI by the communications service providers varied, and there were somt; differences among the three providers as to the types of records available to the FBI. Accordingly, while we generally use the term "toll records," we use other terminology when quoting from contract documents or witness interviews. 23 During the period covered by our review, Company B and Company C each assigned one full-time employee to service their respective contracts with the FBI. Company A rotated four analysts through two full-time positions. 20 the providers to deliver the toll records to the FBI in a specific electronic format that was compatible with the FBI's databases. 24 CTn officials told us that the ability to have requests for toll records serviced immediately by the communications service providers and to receive the records in an electronic format that could be immediately uploaded into FBI databases improved the CAU's ability to support FBI counterterrorism investigations in a timely fashion. A CTn memorandum requesting approval to obligate funds for the contract with Company A described the contract as providing for "near real-time servicing" of legal process by Company A analysts. In 2003, the FBI entered into a contract with Com to its contract, Com an _ In addition to providing toll records, the Company A analysts could the telephone toll data for the FBL26 According to the Company A 24 A May 28, 2003, EC from the CAU described problematic delays with toll records received through conventional channels that were "often via hard copy reports that had to be retyped into FBI databases." 26 Company B and Company C did not perform _ provided to the CAU. 21 of the records they employees, the types of FBI were: (S) that Company A analysts performed for the • community of interest this chapter), when requested; (described later in • alerting CAD requesters if the Company A analysts noticed that the data reflected i n ~ h tmake it a priority (such as calls to or from a _ ; • evaluating telephone data to eliminate unnecessary follow-up on telephone numbers that were of no investigative value; and • preparing visual~entations such as charts showing communication _ between telephone numbers of interest. The FBI's contract with Company A significantly exceeded the scope of the services that were provided to the FBI by Company B and C ~ From 2003 to March 2007, the FBI paid Company A more than _ under this contract. In 2003, the FBI entered into a contract with Company C under which an on-site Company C employee assigned exclusively to service the CAll's requests provided toll records to the FBI on an expedited basis. From A ril 2004 to September 2008, the FBI has paid Company Cover under this contract. Similar to the Com an A contract, the Com an C In addition, the on-site Company C employee told us that he could provide to the FBI subscriber data, which consisted of names and addresses of Company C customers. Company C's contract proposal stated that it would maintain of telephone data storage. 27 In 2004, the FBI entered into a contract with Company B, under which Company B agreed to provide the CAD with the same types of records it would provide to the FBI in response to an NSL. These records included: (1) subscriber and billing information, which included telephone numbers 27 The on-site Company C em 10 ee told us in 2007 that in some instances Company C could provide records 22 and subscriber names and addresses for both listed and non-published numbers; and (2) calling records for numbers dialed long distance, collect, or third party and, if available, local calls and calling card information. The om any B contract provided for making records available As of March 2007, the FBI had paid Company B more than under this contract. K In most instances, the toll records delivered by the three communications service providers to the FBI consisted of the originating and terminating telephone numbers and the date, time, and duration of the tele hone calls. In addition, Com an A and Com an C could rovide the Company A did not provide subscriber data as part of its services under its contract with the CAU.28 Companies Band C were able to, and sometimes did, provide the CAU with subscriber data for their customers. However, the FBI typically did not obtain subscriber data from Companies B andC. Glenn Rogers, the CAU's Unit Chief from March 2003 to November 2004, told us that a significant reason for the three contracts was the speed with which the on-site employees of the three communications service providers could respond to the CAU's requests. Documents associated with the Company A and Company C contracts described additional resources and capabilities of the on-site providers, some of which were relevant to our review. For example, Company A's description of its capabilities in a March 2004 contract proposal stated that its database could "be customized specifically for the FBI based upon input data such as hot target list, significant numbers, secure data etc." This contract roposal also referred "Community of Interest." Company C's cost assessment dated Ma 23 2003 stated that Com an C The FBI's Electronic Communication (EC) seeking approval to obligate funds for the Company C 28 The on-site Company A employees told us that they referred FBI personnel seeking subscriber information to a Company A subpoena management centers. 23 contract in 2003 noted that the statement of work for the contract would allow for As described in Chapters Three, Four, and Five of this report, we found that the only FBI attorneys who reviewed the three contracts prior to late 2006 were FBI OGC attorneys who specialized in procurement law. Marion Bowman, who served as Deputy General Counsel for the FBI aGC National Security Law Branch (NSLB) when the contracts were executed, told us that he was unaware of and never reviewed the contracts. Julie Thomas, who was the NSLB Deputy General Counsel from October 2004 until December 2008, told us that she first reviewed the contracts in late 2006 after she reviewed a draft of the OIG's first NSL report. 4. Location of the Three Communications Service Providers From April 2003 through January 2008, employees of one or more of the three communications service providers were located in the CAU's office space. The CAU's office space was arranged in an open manner, with no walls or partitions to set these employees apart from CAU personnel. The work stations for the providers' employees consisted of a desk, at which the employee had access to an FBI computer, an FBI telephone, and a separately networked computer that provided access to the records of the communications service provider. These work stations were located nearest the entry door to the CAU and were immediately adjacent to the CAU Unit Chiefs office. The work stations of CAU's SSAs and Intelligence Analysts were located further inside the CAU's suite. All of the work stations in the CAU's suite, including the work stations for the three communications service providers, were integrated in one common area. The FBI issued FBI e-mail accounts to employees of the three communications service providers for their use at the FBI. The providers' employees also had access to the CAU computer share drive. 30 The FBI e-mail accounts enabled them to communicate with FBI employees inside 29 As described later in this chapter, we believe that the FBI's community of interest _ practices were inappropriate under the ECPA and FBI policy. Further, as described in Chapter Three of this report, we found that, pursuant to the FBI's contracts with Company A and Company C, the FBI impro~ed ECPA-protected calling activity information through the use of hot number _ _ 30 Employees from Company A and Company B told us that they accessed the CAU's share drive to review the exigent letter template because they were often asked about the template by FBI personnel who wanted to request records. 24 and outside the CAU. The roviders' em 10 ees also communicated. As described below, many requests for telephone records were conveyed to the communications service providers through e-mails sent on the FBI e-mail accounts. 5. Relationship between CAU Personnel and the Providers' Employees We found that the on-site providers' employees regularly attended CAU unit meetings and were treated by CAU personnel as "team" members. This team identification also was evidenced by the on-site employees' e-mail communications. When the FBI established FBI e-mail accounts for the providers' employees, one of the Company A analysts created a folder entitled "TEAM USA," and many of his outgoing e-mails began with a greeting to "Team," or "Team CAU."31 CAU personnel and the on-site providers also socialized outside the office such as at "happy hour" celebrations for CAU SSAs who were transferring out of the unit. To some degree, the collegial relationship between the providers' employees and CAU personnel fostered a productive working relationship. If the FBI had properly trained its personnel on the lawful methods for obtaining telephone records from the on-site providers and if the interactions between CAU personnel and the providers' employees were properly supervised, our observations about the team identity and informal social interactions would not be remarkable. However, we found that the proximity of the on-site providers' employees to CAU personnel, combined with the lack of guidance, supervision, and oversight of their interactions with FBI employees (which we discuss in Chapters Three and Four of this report), contributed to some of the serious abuses identified in this review. III. Exigent Letters Issued by CAU Personnel We determined that CAU personnel issued at least 722 exigent letters to the 3 on-site communications service providers from March 14,2003, 31 One on-site Company A analyst signed his e-mails with the following signature block: [Name], CTD/FBIHQ, Communications Analysis Unit. 25 through November 13, 2006, the date of the last exigent letter that we found. 32 Table 2.1 shows the number of exigent letters we identified as issued by the CAU from 2003 through 2006. TABLE 2.1 Exigent Letters Issued by CAU Personnel by Calendar Year (2003 through 20061 CALENDAR IlUIIBEROF YEAR EXIGENT LETTERS 2003 70 2004 323 2005 294 2006 35 TOTAL 722 Source: Company A, Company B, and Company C Most of these letters were identical to the exigent letters that were first issued by the New York Field Division beginning in November 2002, discussed above. Table 2.2 shows the number of exigent letters CAU personnel issued to each of the three communications service providers during the 4-year period. TABLE 2.2 Exigent Letters Issued by CAU Personnel to the Three On-Site Communications Service Providers (2003 through 20061 COIiIlUNICATIOIl'B Il'UIIIIER OF PROVIDER EXIGENT LETTERS Company A 514 Company B 146 Company C 62 TOTAL 722 Source. Company A, Company B, and Company C 32 As described below, the use of exigent letters that promised future legal process was formally barred (in a directive issued by the FBI's Deputy Director) in March 2007 > when the oro issued our first NSL report. 26 In addition to the CAU personnel who signed these 722 exigent letters, from 2002 to 2006, 76 other exigent letters were signed by FBI personnel not assigned to the CAU. Fifty-eight of these exigent letters were signed by FBI personnel assigned to the FBI's New York Field Division. The remaining 18 exigent letters were signed by FBI personnel in FBI Headquarters and field divisions who told us they learned about CAU's resources either through briefings, previous assignment in the CAU, or their own initiative. Because exigent letters were primarily issued by the CAU, however, our review focused on the CAU's use of the 722 exigent letters and other informal methods of obtaining non-content telephone records from the on-site providers, rather than the use of exigent letters by other FBI offices. A. Text of the CAU Exigent Letters The 722 CAU exigent letters were all drafted on official FBI letterhead. All but 17 of the 722 exigent letters signed by CAU personnel contained the following two sentences: Due to exigent circumstances, it is requested that records for the attached list of telephone numbers be provided. Subpoenas requesting this information have been submitted to the U.S. Attorney's Office who will process and serve them formally to [the communications service provider) as expeditiously as possible. Of the 17 exigent letters that did not contain this language, 11 promised a follow-up NSL rather than a subpoena, 2 promised to follow up with either a subpoena or an NSL, and 4 did not mention any follow-up legal process. The appendix to this report includes examples of two exigent letters issued by CAU personnel during the period covered by our review. Of the 722 exigent letters, 75 specified in either the body of the letter or in an attachment to the letter the types of records sought - either toll billing or subscriber records, or both. Most of the other exigent letter requests included only the generic request for "records" quoted above. Some of the 722 exigent letters also instructed the recipient to conduct a "communi of interest" or "callin circle" A community of interest 27 Some of the 722 exigent letters also had an attachment l i s ~ categories of records requested, such as subscriber information, _ data, and community of interest reports. However, we found that, as with the case with NSLs that had similar attachments, the FBI did not consistently obtain all records listed on the attachments to the exigent letters. Of the 722 exigent letters issued by the CAU, onl 77 letters included the date range for the request, which ranged _ Several CAU SSAs and intelligence analysts told us that they sometimes requested whatever records the communications service provider had on a particular telephone number, regardless of the time period. In addition, employees of the on-site communications service providers told us that CAU requesters would often come to their work stations and tell them the specific records they needed and the date parameters for their requests. When they did so, CAU personnel sometimes provided exigent letters to cover the request at that time or at a later time if responsive records were located. For example, we reviewed entries in the .on-site Company C employee's log in which he noted references t o _ requested. However, the log also noted that the Company C employee only needed an exigent letter for those instances in which he located responsive records, not for all _ he B. Counterterrorism Division's and CAU's Recognition of the Use of Exigent Letters The first document we identified relating to the FBI's ability to obtain telephone records from the three on-site communications service providers without first serving legal process was a January 6,2003, EC from the Acting Unit Chief of the CAU that was distributed to all FBI divisions. 34 It described the CAU's mission and processes, and stated that the CAU could obtain telephone records in "exigent circumstances" and that "[a]ppropriate legal authority (Grand Jury subpoena or NSL) must follow these requests." 33 We describe community of interest requests in more detail below. 34 This EC predated the contracts between the FBI and the three communications service providers. 28 This EC was approved by the CXS's Section Chief, the CTD's Deputy Assistant Director, and the CTD's Assistant Director. The EC made no explicit reference to exigent letters. The first EC we identified that mentioned exigent letters was an EC to CAU personnel dated November 18, 2003, approved by CAU Unit Chief Glenn Rogers. The EC described how CAU personnel processed records received from the on-site Company A analyst in response to exigent letters. The EC stated: Neither the CTD nor the CAU EC provided guidance regarding the circumstances in which these exigent letters were appropriate. C. CAU's Exigent Letters Practice This section provides further details on the exigent letters used by CAU personnel and their explanations for issuing these letters. Of the 722 exigent letters issued by CAU personnel from March 14, 2003, through November 13, 2006, 1 was signed by an Assistant Section Chief, 12 were signed by 2 CAU Unit Chiefs, 706 were signed by 15 SSAs, and 3 were signed by 3 Intelligence Analysts. 29 CHART 2.3 Exigent Letters Issued by CAU Personnel to the Three On-Site Communications Service Providers (2003 through 2006) 60 -'=='l""" 40 30 20 CO) ;:, ;;: 0) .., L-2_0_0_3~(7_0.!.....) C- c: (J) CD "0 z o < CO) ;:, ;;: CO)' 0) .., ;:, ;;: 0) .., 1_2_0_0_5~(2_9__'4)'_ 1_2_0_04----:,...(3_2-'3)'--- 30 C- 5.. en CD "0 CO) ;:, 1_2_0_06----:,...(3_5-'----) C- c: en CD "0 z o < _ Rogers, the CAU's first permanent Unit Chief, acknowledged to us that he was aware of and approved the use of exigent letters. He said that before he became the CAU Unit Chief in March 2003 he did not know about exigent letters. He said he first learned about exigent letters from an on-site Company A analyst on May 27, 2003, while the CAU was working on an investigation of a bomb threat. 35 Rogers said that the Company A analyst told him that exigent letters had been previously approved by Company A and government attorneys for use in the New York Field Division for emergency situations. Rogers said he was not sure whether the attorneys referred to by the Company A analyst were from the FBI's New York Field Division or possibly from the U.S. Attorney's Office. Rogers said he did not seek any further details about the identity of any FBI attorneys who may have approved the use of exigent letters. Rogers said that based on what the Company A analyst told him about the prior use of exigent letters by the New York Field Division, he signed the exigent letter that requested records for four telephone numbers in the bomb threat matter. We determined that Rogers personally signed 10 more exigent letters while serving as the CAU's Unit Chief and 1 exigent letter after he was promoted to Assistant Section Chief for the CXS in November 2004. In addition, we identified a total of 355 other exigent letters that were issued by CAU personnel, listing 1,375 telephone numbers, while Rogers was the CAU Unit Chief. 36 Rogers acknowledged that he was responsible for the use of exigent letters at the CAU. He said that he never established any unit policy for the use of exigent letters, and he provided only very general verbal guidance to CAU employees. Rogers stated that he told CAU personnel that if requesters "state that it's exigent," or "have circumstances they describe as 'exigent' and they promise the grand jury subpoena or NSL," then the exigent letter was authorized. Rogers said that incoming CAU employees usually learned about exigent letters when they received on-the-job training from more senior CAU employees. 35 We determined that after Rogers became the Unit Chief in March 2003, CAU personnel issued eight exigent letters, dated between May 14 and May 27, 2003, that had Rogers's name typed in the signature block. The fIrst exigent letter Rogers signed was dated May 27, 2003. 36 The 1,375 total includes some duplicate telephone numbers. We identified 15 telephone numbers that were listed on exigent letters sent to more than one of the on-site providers. 31 Rogers distinguished exigent letters from the FBI's so-called "Patriot Act" letters requesting voluntary disclosure pursuant to the ECPA emergency voluntary disclosure provision. 37 Rogers told the OIG that he had used "Patriot Act letters" to obtain voluntary disclosures in other circumstances, and that the exigent letters used by the CAU were not Patriot Act letters. He said that exigent letters were used for "something that was not routine and needed immediate attention. When asked whether he was referring to instances in which there was an emergency that involved a threat of immediate death or serious injury, he responded, "No, no it just meant ... that these were rapidly moving events ... that required immediate attention." Rogers told us that he was aware from the time he first learned about exigent letters from the on-site Company A analyst that follow-up legal process would be required whenever exigent letters were used. Rogers told us that he regularly reminded CAU personnel who issued exigent letters to stay current on securing the after-the-fact legal process owed to the providers. He also said he sometimes spoke with personnel assigned to CTD operational units and at least one field division about the importance of issuing after-the-fact legal process. Rogers asserted that he regularly checked with CAU personnel and with the on-site providers' employees to ensure that the after-the-fact legal process was being provided. In November 2004, Rogers was promoted to be Assistant Section Chief of the CTD's Communications Exploitation Section (CXS), and Bassem Youssef was appointed as the CAU Unit Chief replacing Rogers. Youssef signed 1 exigent letter, and, while he was the CAU Unit Chief, 367 exigent letters listing 2,046 telephone numbers were issued under his name. 38 37 "Patriot Act letters" was the name FBI personnel used to refer to letters requesting emergency disclosure pursuant to the ECPA. As noted previously, from April 20, 2003, to March 8, 2006, 18 U.S.C. § 2702(c)(4) authorized a provider to voluntarily release customers' records to a governmental entity if the provider "reasonably believe[d) that an emergency involving immediate danger of death or serious physical injury to any person justifie(dJ disclosure of the information." As discussed in Chapter Four, the FBI issued detailed guidance in August 2005 concerning the FBI's authority to request emergency voluntary disclosures. 38 Company A records show that the CAU issued 11 exigent letters to Company A in 2006 and a total of239 exigent letters to Company A during Youssers tenure as CAU Unit Chief. We identified 367 exigent letters issued under Youssef's name as CAU Unit Chief and 1 signed by him. The total of 2,046 telephone numbers in the 367 exigent letters includes some duplicate telephone numbers. We identified 97 telephone numbers that were listed on exigent letters sent to more than one of the on-site providers. We also identified 224 (Cont'd.) 32 Youssef told us that when he became the CAU Unit Chief he inherited the exigent letter practice from Rogers and that since Rogers was still his immediate supervisor as the Assistant Section Chief of CXS, Youssef felt he was not in a position to change the exigent letters practices then in place. We asked Youssef about the one exigent letter he personally signed in November 2005. He stated that when he signed the letter he was unaware that the exigent letter he signed referred to an after-the-fact grand jury subpoena instead of an NSL, and he told us that it was not until April 2006 that he closely reviewed any exigent letter and learned of the reference to subpoenas. CAU SSAs told us that most of the exigent letters signed by CAU personnel related to international terrorism investigations. 39 As discussed in Chapter Four of this report, the FBI has determined that a majority of these record requests were covered by NSLs, not by grand jury subpoenas. The on-site providers' employees told us they were concerned only that the requests were followed up by some legal process - subpoenas or NSLs - and did not care about what type of process the letter promised. The on-site providers' employees also told us that they sometimes generated the exigent letters themselves and gave them to CAU personnel to sign and provide back to them. One of the Company A on-site analysts told us that to facilitate his preparation of exigent letters for the FBI to use, he established a short-cut in the fonn of an icon on his FBI-issued computer desktop that enabled him to quickly generate exigent letters, which he gave to the CAU employees to sign.40 additional telephone numbers that were submitted to the same provider on multiple exigent letters. 39 These statements by CAU SSAs were confrrmed by the FBI's review team that researched, under the direction of the FBI OGC, all of the telephone numbers in exigent letters and 11 blanket NSLs in order to determine whether the FBI will retain records. As described in detail in Chapter Four of this report, the review team determined that nearly all of the 4,379 telephone numbers were relevant to national security investigations, while 266 were relevant to criminal or domestic terrorism investigations. 40 None of the employees of the three on-site communications service providers or any FBI employees we interviewed said they could estimate the total number of exigent letters prepared by the three providers. 33 For much of the period when exigent letters were used, we found that there was no written guidance for CAU personnel regarding the circumstances under which exigent letters could be used. We found that there was only a general understanding among CAU employees that there had to be "exigent" or emergency circumstances for them to use an exigent letter. We also found that there was no process whereby a supervisor reviewed and approved the issuance of the exigent letters. Further, there was no requirement to document the circumstances under which the exigent letters were issued or the investigation to which the requested telephone number was related. In fact, CAU personnel were not even required to retain copies of the exigent letters and, as described below and in Chapter Four, for the most part were not required to track or otherwise account for the exigent letters issued to the on-site communications service providers. 1. Signers of Exigent Letters In the CAU We determined that three SSAs assigned to the CAU from 2003 to 2005 signed nearly 50 percent of the 722 exigent letters issued by CAU personnel. One of these 3, an SSA who signed 139 exigent letters, told us that the communications service providers' employees often gave him exigent letters to sign after he had already been given the requested records - and he simply signed the letters. This SSA also said that while he realized the exigent letters inaccurately stated that grand jury subpoenas had been submitted, he signed the letters because he "thought it was all part of the program coming from the phone companies themselves," and he assumed the letters were approved by the communications service providers' attorneys. This SSA said that each time he issued an exigent letter, it was in response to a request from a field division or headquarters unit for records, and he believed that exigent circumstances were present. Another SSA, who signed 115 exigent letters, said he learned about the letters from the same Company A analyst who initially had told Rogers about the letters. This SSA said the Company A analyst told him that the letter had been approved for use by both Company A and FBI aGC attorneys. The SSA said he went to Rogers and asked about the exigent letters, and Rogers told him that they were "standard operating procedure." This SSA also said that he knew that subpoenas had not been requested but signed the exigent letters anyway, based on the assurances of the Company A analyst and Rogers as well as his awareness that the letters were a standard practice in the CAU when he began his assignment there in September 2003. The SSA said that while most of the exigent letters he signed related to counterterrorism investigations, some were related to criminal and counterintelligence investigations. He also told us that in some instances, due to the exigent nature of the request, he did not believe there were open investigations when he issued an exigent letter. 34 A third SSA, who signed 98 exigent letters, said he learned of exigent letters from the Company A analyst shortly after he arrived at the CAU in September 2003. The SSA said he read the exigent letter but was not concerned with the reference to a subpoena being requested from the U.S. Attorney's Office. He said he assumed that the letter was a legitimate document because he saw other CAU personnel using exigent letters. The SSA also said that at one point either Rogers or a Company A analyst told him not to change the language in the exigent letter because attorneys for both Company A and the FBI had already agreed to the wording. This SSA told us that exigent letters were typically prepared by employees of the on-site communications service providers, who would forward the exigent letters to him bye-mail for his signature at the same time they furnished him the requested telephone data. 41 He said that on other occasions one of the intelligence analysts on his team would prepare the exigent letters. The SSA told us that he was not concerned with whether an incoming request was made pursuant to an open FBI investigation, because a case would eventually be opened even if it lagged behind the exigent letter process. This SSA also told us that he used exigent letters only under exigent circumstances and that he would not sign his name to letters containing false statements. When we asked him about the inaccurate statements in the exigent letters that subpoenas had been submitted to the U.S. Attorney's Office, he said the language "did not make sense" since that language did not reflect how the process to obtain records and to issue after-the-fact legal process actually worked in the CAU. Yet, although he said he thought at the time that the language in the exigent letters did not make sense, he said he nevertheless signed the letters because he thought the letter was accepted by the providers and was an established practice in the CAU. He said his overriding concern was the fear that "something would blow up in the U.S." if he did not aggressively respond to requests for telephone data in support of FBI terrorism investigations. While most SSAs told us they believed exigent circumstances were present when they signed the letters, we found contrary evidence regarding some of these letters. For example, an SSA who signed 34 exigent letters told us that he was "pretty sure" that some of the exigent letters he signed when he first joined the CAU "could be questionable" in terms of whether there were exigent circumstances. Another SSA who signed 61 exigent letters said that Intelligence Analysts on this team would sometimes describe the situations prompting the requests, but if he was busy, "they'll 41 Other CAU personnel, documents, and e-mails confIrmed that telephone records were often provided to the FBI before exigent letters were issued. 35 just hand me the letter, and ... I'll sign it." We also identified an e-mail dated April 26, 2005, in which an FBI OGC National Security Law Branch (NSLB) Assistant General Counsel (the Assistant General Counsel) who was the NSLB point of contact for NSL-related policies and issues, expressed to Youssef that "on occasion, CAU is presuming that someone who comes to them [seeking records from the on-site providers] has an emergency." The CAU SSAs who signed exigent letters gave us various descriptions about the matters for which exigent letters were used. Some said an exigent circumstance involved a life-threatening matter. Others described it as an important, pressing, or high-priority matter. Others said it was a matter related to an important case or one in which a high-level FBI official demanded the information. Most of the CAU SSAs and Intelligence Analysts who signed exigent letters also said they were unconcerned about the letters' reference to subpoenas. Some SSAs asserted that they broadly read the reference of subpoenas in the exigent letters to include grand jury subpoenas, administrative subpoenas, or NSLs. One SSA stated that "for me everything was a subpoena." Other SSAs stated that they were unaware of the type of legal process that would follow because it was the responsibility of the FBI requester, not CAU personnel, to follow up with appropriate process. A few signers, including Youssef, told us that they did not closely read the exigent letters when they signed them. Almost all of the SSAs who signed exigent letters told us that they did not give much thought to the underlying legal authority for the exigent letters. Rather, they said that they assumed the exigent letter was a legal instrument that had been reviewed by the appropriate authorities, including CTD management and attorneys from both the FBI and from the communications service providers. They stated that they used the exigent letters because they assumed that the letter was an authorized tool for requesting records from the on-site communications service providers. For example, one SSA stated that exigent letters were the "business process" in place when he came to the CAU. CAU Unit Chief Glenn Rogers (who later served as Assistant Section Chief of the Communications Exploitation Section (CXS), which supervised the CAU) told us that he signed exigent letters even though he recognized at the time that subpoenas requesting the records had not been submitted to the U.S. Attorney's Office, as the letters stated. When we asked Rogers to explain this statement in the exigent letters, Rogers said that the exigent letter was "poorly worded" and should have been revised earlier to state that NSLs would be the after-the-fact legal process to be served on the providers. Rogers also stated that nothing was done "to hide the fact that we were 36 getting stuff in advance of NSLs" and that "nobody ever told me to cease" using exigent letters. We found that the practice of obtaining records and providing after-the-fact legal process was so common in the FBI that it was mentioned in a CTn training video created in 2004. In the video, a CAU SSA speaks with a field agent by telephone and makes arrangements to provide telephone records that the SSA had already received from a communications service provider. The SSA says to the field agent, "I'll just need you to send me an NSL to cover the books." As discussed in Chapter Three of this report, we found other irregular practices concerning the CAU's interaction with the on-site providers. One of our findings in that chapter has a bearing on the issue whether signers of exigent letters knew that exigent circumstances were present. In one of three instances involving subpoenas or other requests for the toll billing records of news reporters, a CAU SSA signed an exigent letter seeking toll billing records for reporters for the Washington Post and The New York Times. Yet, the case agent told us he did not inform either the CAU SSA who signed the exigent letter or anyone in his management chain that exigent circumstances existed. Similarly, the CAU SSA said he did not recall anyone informing him that exigent circumstances were present. None of the CAU SSAs or Intelligence Analysts who signed the exigent letters received training on NSLs upon entering the CAU. In addition, these SSAs did not have prior national security investigation experience. Many told us that in their prior experience in criminal investigations field-based SSAs were authorized to sign administrative subpoenas for telephone toll billing records, and they therefore did not believe the exigent letter practice to be extraordinary. Three of the SSAs who together signed 114 of the 722 exigent letters issued by the CAD told us that they were concerned with the use of exigent letters and separately brought their concerns to Rogers when he was the CAU Unit Chief.'2 Two of these SSAs said that Rogers assured them that the exigent letters were proper and had been approved by "lawyers." The three SSAs told us they were directed by Rogers to continue using the exigent letters. One SSA said he had also expressed concern to Rogers about the reference in the exigent letters to follow-up subpoenas when he became aware that after-the-fact process was more often NSLs than 42 These SSAs are not the same SSAs described above who together had signed nearly 50 percent of the exigent letters signed by CAU personnel. 37 subpoenas. This SSA said Rogers told him not to change "a single word" in the letter because it had previously been reviewed and approved. 43 Rogers told us that he did not recall any of the SSAs in the CAU coming to him with concerns about the wording of the exigent letter. Rogers also said that he never spoke to any attorneys from either the FBI or the communications service providers about the use of exigent letters. Rogers said that he accepted the validity of the exigent letter based on the briefing he received from the Company A analyst who told him in May 2003 that the letter had previously been approved for use in the New York Field Division in 2002. Rogers, who signed 12 exigent letters, told us that he took "full responsibility for that letter - that it wasn't worded properly, [and] that it took so long to change the wording" to refer to NSLs rather than subpoenas. 2. CTD Supervisors In addition to our interviews of CAU personnel and supervisors, we also interviewed supervisors in the CTD who served during the 2003 through 2006 time period about the use of exigent letters. These officials included FBI Assistant Section Chiefs, Section Chiefs, Deputy Assistant Directors, and Assistant Directors who had responsibility either for oversight of the CAU or the other CTD units whose frequent requests for telephone records resulted in the CAU's issuance of the exigent letters. All but one of them told us they were unaware before the OIG's first NSL investigation that the CAU was using exigent letters to obtain telephone records from the three on-site communications service providers. The one FBI official who told us that he knew about exigent letters at the time they were used was John Chaddic, the Assistant Section Chief of CXS from June 2003 to October 2004 44 Chaddic told us that in approximately June 2003 Rogers briefed him about exigent letters and described them as a "placeholder so that we could get the toll records and analyze them while we waited on the NSL." Chaddic said he never saw an exigent letter but "wasn't surprised" when he learned about the exigent letter process because the FBI could not afford to wait for the appropriate legal process in emergency situations when lives might be at risk. Chaddic also told us that he had assumed the use of exigent letters was addressed in the FBI's contracts with the communications service providers. He also said 43 None of the other SSAs we interviewed who signed exigent letters said they brought concerns about the use of exigent letters to either Rogers or Youssef. 44 Chaddic is currently a Unit Chief in the FBI's Counterintelligence Division. 38 that the concept seemed consistent with at least one classified FBI program ongoing at the time. Chaddic added that since Rogers and most of the SSAs assigned to the CAU had previous experience with FBI drug investigations for which SSAs were authorized to obtain telephone records by signing administrative subpoenas, the exigent letter tool would not be a departure from their prior FBI experience in securing telephone records. Other CTD officials told us they were not aware of the use of exigent letters until the DIG's investigation. For example, Laurie Bennett and Jennifer Smith Love, two of the FBI officials who served as the Section Chief of the CXS from 2004 through 2006, told us that they did not know about the letters until the details of the practice emerged during the DIG's first NSL investigation in 2006. 45 Bennett, who was the CXS Section Chief from August 2004 to April 2006, told us that she expected that information from the communications service providers was obtained legally and that the CAU would have informed her if they could not obtain the information legally. Love, who was the CXS Section Chief from April 2006 to December 2006, told us that she did not know about exigent letters, although she was aware that the CAD had obtained records from the providers prior to issuing legal process, and that the CAU had ongoing problems obtaining NSLs to cover telephone records that the FBI had previously received from the on-site providers. Similarly, former CTD Deputy Assistant Directors John Lewis, Thomas Harrington, and Arthur Cummings 111 told us that they did not know about the exigent letters practice. 46 However, Lewis said he was "not surprised that Ithe FBl]lwas] dealing with the phone companies in as aggressive a manner as possible." Cummings told us that he believed the use of the letters must have been approved by the FBI. Former Assistant Directors in charge of the CTD also told us they were unaware of the exigent letter practice. LaTty Mefford served as Assistant Director of the CTD from July 2002 until July 2003 and as Executive Assistant Director of the FBI National Security Branch from July 2003 until his retirement in October 2003. Mefford said that he was 45 The official who selVed as the first Section Chief of CXS from 2002 until April 2004 has retired from the FBI and declined our request for an interview. 46 Lewis selVed as a Deputy Assistant Director in the CfD from April 2004 to June 2006, and retired from the FBI in February 2009. Harrington selVed as a Deputy Assistant Director in the CfD from December 2002 until March 2008. Harrington currently serves as the Executive Assistant Director of the FBI's Cyber Division. Cummings, who selVed as a Deputy Assistant Director in the CfD from August 2006 to November 2007, is currently the FBI's Executive Assistant Director for the National Security Branch. 39