Review of the Fbi Use of Exigent Letters and Other Requests for Phone Records 2010 Partf
Download original document:
Document text
Document text
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
that the only documentation of a request for these records sent to the carrier rior to the date of the application was an "exigent situation" letter dated that was signed by a Special Agent assigned to the FBI office in The letter stated that the request was made pursuant to an emergency situation and that the FBI would provide "required legal process by the end of the next business day." 156 However, the subsequent NSL was dated over 2 months after the FISA order had been issued. In August 2008, as a result of this review, the NSD notified the FISA Court of the inaccurate statement in the declaration, stating that the NSD and the FBI considered the inaccurate statement to be "non-material" for purposes of Rule 10(b) of the FISA Court Rules of Procedure." C. FISA Case No.3 In this c ~ e n tfiled an emergency application with the FISA Court on _ for electronic surveillance in connection with a counterterrorism investigation. The supporting declaration by an FBI SSA stated that the FBI had verified the subscriber information through information obtained in r e s ~served on a carrier. The FISA Court's order was issued o n _ However, working with the NSD and the FBI, we determined that the FBI had obtained the subscriber information from the carrier, prior to the filing of the FISA application for electronic surveillance, in response to an FBI field agent's oral request for telephone records, not in response to an NSL as was asserted in the application to the FISA Court. FBI records showed that the NSL s~er information for the telephone number was not drafted until _ and was served on the carrier on in 2 weeks after the inaccurate FISA application was filed. On response to this NSL, the carrier gave the FBI the identical information that had been described in the declaration supporting the application. In August 2008, as a result of this review, the NSD notified the FISA Court of the inaccurate statement in the declaration, stating that the NSD and the FBI considered the statement to be "non-material" for purposes of Rule 10(b) of the FISA Court Rules of Procedure." 156 The letter was a fonn from the carrier that contained a recital tracking the standard for emergency voluntary disclosure of non-content telephone records in 18 U.S.C. § 2702(c)(4). We were unable to detennine the identity of the employee who signed the letter. 125 D. FISA Case No.4 In this case, the Department filed an emergency application with the FISA Court for electronic surveillance on four telephone numbers in connection with a counterterrorism investigation. First Inaccurate Statement: The supporting declaration by an FBI SSA stated that the FBI had obtained telephone calling activity information from records obtained in r ~ e r v e don a carrier. The FISA Court's order was issued o n _ However, working with the NSD and the FBI, we determined that the only NSL served on the carrier seeking records on three telephone numbers c o n n e ~ t h einvestigation referenced in the application was dated _ the day after the FISA Court had issued its order, and the only NSL served on the carrier ~ h o n enumber also connected to the target was dated 2 months after the FISA Court issued its order. We determined that the calling activity information on which the Department relied in its FISA Court a p ~ n e din response to an exigent letter to the carrier dated _ In November 2008, as a result of this review, the NSD notified the FISA Court of the inaccurate statement in the declaration, noting that the NSD and the FBI considered the statement to be "non-material for purposes of Rule 10(b) of the FISA Court Rules of Procedure.» Second Inaccurate statement: The declaration in this application inaccurately stated that pursuant to a grand jury subpoena the FBI had received records from a communications carrier on an unspecified date confirming subscriber information for two telephone numbers. In response to . ~iry, the FBI located a grand jury subpoena to the carrier dated _ _ _ for one of the telephone numbers, but said that neither the FBI nor the pertinent U.S. Attorney's Office could locate any grand jury subpoena for the second telephone number. IS7 However, the declaration also stated that the 157 The declaration also stated that the FBI had received subscriber information on an unspecified date for two of the four telephone numbers discussed in Case No.4 above from a carrier, but did not specify the legal process or other basis for this assertion. We found that the FBI served an exigent letter on the carrier dated seeking records for the four tele hone numbers discussed above in Case No.4, including a request for a community of interest for a 24-month period. The only NSL or other rocess we identified that was served on the carrier for this information was an NSL dated seekin toll billing records and subscriber information, and included a community of interest _ for two of the four telephone 126 FBI had obtained subscriber infonnation for the second telephone number (the one for which a grand jury subpoena could not be located) from a trash cover. In November 2008, as a result of this review, the NSD notified the FISA Court of the inaccurate statement in the declaration regarding the second telephone number, stating that the NSD and the FBI considered the statement to be "non-material" for purposes of Rule lO(b) of the FISA Court Rules of Procedure." E. OIG Analysis Based on our concern that the FBI may have used records obtained from exigent letters and other infonnal methods to seek FISA Court orders, we examined a small sample of the FISA Court applications that referred to telephone numbers for which records had been requested from the on-site communications service providers. Our investigation showed that FBI personnel had filed inaccurate sworn declarations with the FISA Court about the source of subscriber or calling activity infonnation referenced in applications seeking electronic surveillance or pen register/trap and trace orders. While the declarations signed by 4 FBI SSAs in the 37 applications the NSD and the FBI reviewed stated that the information relied upon in seeking Court orders had been obtained in response to NSLs or a grand jury subpoena, in fact the infonnation was obtained in response to exigent letters, an emergency disclosure letter, and a verbal request to the communications service providers. ISS Moreover, as detailed above, several of the NSLs referred to in the four applications were served at least 2 months after the FISA Court issued the requested orders. (VI The NSD asserted that the inaccurate statements made in these FBI declarations were non-material because there is no exclusionaI)' rule for statutory violations of the ECPA.IS9 numbers listed in the exigent letter. We were not able to determine how many days or weeks after the date of the NSL that the NSL was served on the carrier. 158 According to the NSD's letter to the FISA Court, the FBI obtained the subscriber information underlying the fifth misstatement through a trash cover. 159 See 18 U.S.C. § 2708 ("the remedies and sanctions described in this chapter are the only judicial remedies and sanctions for nonconstitutional violations of this chapter"); see also United States v. Perrine, 518 F.3d 1196, 1202 (10th Cir. 2008); United States v. Steiger, 318 F.3d 1039, 1049 (11th Cir. 2003). 127 Mter reviewing a draft of this report, NSD officials stated that in addition to concluding that the ECPA did not provide for exclusion of evidence for violations of the statute, the NSD also examined each of the applications addressed in FISA Cases 1, 2, 3, and 4 and determined that the inaccurate information was not substantive in nature but rather concerned only the manner in which information was obtained. The NSD officials stated that they concluded that the misstatements were non-material because the underlying substantive information provided in the misstatements was correct and that only the procedural manner in which it was obtained was misstated (e.g., in FISA Case 1 the declaration stated that subscriber information was obtained from an NSL rather than from an exigent letter). We agree with the NSD that the inaccurate statements were non-material for purposes of Rule 10(b) of the FISA Court Rules of Procedure. However, while the NSD deemed these statements "non-material" for purposes of the FISA Court Rules of Procedure, we believe that inaccurate statements to the FISA Court are serious matters. They also affect the credibility of representations made by the government. It is also important to note that we reviewed only a small percentage of the FISA Court applications that may have relied upon information derived from exigent letters or other informal means. Based on our results in these cases we believe there are likely to be other similar inaccurate statements in other applications. Moreover, no one in the FBI and the NSD who reviewed these applications prior to their submission to the Court had identified the inaccurate statements. Thus, our review also concluded that the FBI and the NSD failed to provide adequate supervision and oversight to ensure the accuracy of the FBI's declarations filed in support of applications seeking FISA Court orders. After reviewing a draft of this report, NSD officials told us that they believe that even non-material representations to the Court are very serious matters. They also said that, to address these types of issues, the FBI instituted procedures in February 2006 to verify the factual accuracy of information contained in FISA applications. To ensure that these procedures are being followed, the NSD conducts on-site reviews of FBI field offices. In Chapter Six of this report we provide recommendations to address the issues identified in this portion of our review. We recommend that the FBI, in conjunction with the NSD, should determine whether any FISA Court orders for electronic surveillance or pen register/ trap and trace devices currently in place relied upon declarations containing FBI statements as to the source of subscriber information for telephone numbers listed in exigent letters or the 11 blanket NSLs. If the FBI and the NSD identify any such pending orders, we recommend that the FBI 128 and the NSD determine if any of the statements characterizing the source of subscriber information are inaccurate or incomplete. If any declarations are identified as containing inaccurate or incomplete statements, we recommend that the FBI and the NSD determine whether any of these matters should be referred to the FBI Inspection Division or the Department's Office of Professional Responsibility for further review. IV. Improper Administrative Subpoenas Issued to the On-site Providers Our investigation also uncovered abuses in the FBI's use of administrative subpoenas. 160 In some instances, the FBI received records in response to exigent letters or other informal requests prior to service of administrative subpoenas. In addition, we determined that some administrative subpoenas served on the on-site communications service providers were preceded by "sneak peek" requests through which the on-site providers' employees would first check their databases to determine if records of interest were contained in the databases, and in some cases provided information prior to the service of administrative subpoenas. We also found that in 2005 an FBI SSA in the CAU signed seven administrative subpoenas pursuant to 21 U.S.C. § 876 for toll billing records as part of the fugiti~nconducted by the FBI's _ Field Division regarding _ This statute authorizes the use of administrative subpoenas in connection with an active narcotics investigation to which the records s ~ e relevant. However, some subpoenas were issued when the FBI's _ Field Division had no active narcotics investigation to which the requested records were relevant. Rather, t h e _ Field Division wanted these records because they were relevant to locating - Additionally, we determined that all seven of these administrative subpoenas were signed by a CAU SSA who was not authorized to sign these administrative subpoenas. Moreover, three of the seven subpoenas were issued after the FBI already had obtained the records through exigent letters. We also found that two additional administrative subpoenas related to a separate case were issued by the FBI's _ Field Division after the FBI had 160 An administrative subpoena is a judicially enforceable demand for records issued by a government authority. 129 obtained the records. The FBI received the records prior to issuing the subpoenas, which violated the ECPA. In the sections that follow, we describe these improper uses of the FBI's administrative subpoena authority. The FBI's Administrative Subpoena Authority A. The Attorney General is authorized to issue administrative subpoenas in connection with the investigation of certain controlled substances (narcotics) offenses and offenses involving sexual abuse or exploitation of children and health care fraud.'6! Title 21, Section 876(a), of the U.S.C. provides that "in any investigation relating to his functions under this chapter with respect to controlled substances ... the Attorney General may ... require the production of any records ... which the Attorney General finds relevant or material to the investigation."162 The Attorney General has delegated authority to issue Title 21 administrative subpoenas to the FBI Director, who in tum has delegated the authority to FBI Special Agents in Charge, Assistant Special Agents in Charge, Senior Supervisory Resident Agents, and "those FBI Special Agent Squad Supervisors who have management responsibilities over Organized Crime/Drug Program investigations."163 This authority may not ordinarily be re-delegated. IM Finally, the ECPA recognizes an exception to the prohibition against divulging "a record or other information pertaining to a subscriber to or customer of such service ... when the governmental entity uses an administrative subpoena authorized by a Federal or State statute ...."165 161 See 21 U.S.C. § 876 (narcotics) and 18 U.S.C. § 3486 (sexual abuse or exploitation of children and health care). 162 21 U.S.C. § 876(a). The FBI's Manual ofInvestigative Operations and Guidelines (MIOG) has a corresponding provision stating that any Title 21 subpoena for the production of records must be relevant to a controlled substances investigation. MIOG, Pt. I § 281-7.1 163 See 28 C.F.R. § 0.85; see also Criminal Investigative Division, electronic communication to all field divisions, Procedure and Operational Issuances, Criminal Investigative Division; Administrative SUbpoenas; Proposed Change in the Manual of Investigative Operations and Guidelines, May 1, 2007. 1M Id. >65 18 U.S.C. § 2703(cJl2). 130 B. Administrative Subpoenas Served on the On-Site Providers We found that the FBI served over 200 administrative subpoenas for telephone records on the on-site communications service providers from 2003 to 2006. Most of these subpoenas were signed by FBI field division personnel, but some were signed by a CAU SSA. As was the case with NSLs issued after records were provided to the FBI (as described in Chapter Four), a CAU SSA told us that in some instances the communications service providers' employees gave records to the FBI in response to exigent letters prior to service of administrative subpoenas. Documentation we reviewed from the FBI and the on-site providers showed that some of the administrative subpoenas served on the on-site providers relating to the investigation were preceded by "sneak peek" requests through which the on-site providers' employees would first check their databases to detennine if records of interest were contained in the databases. In response to sneak peeks, the on-site providers in most instances infonned CAD personnel that records existed on the telephone numbers of interest, and the FBI sometimes issued administrative subpoenas for any records the FBI wanted. However, in some instances the on-site providers gave the CAD specific infonnation about calling activity, such as the date of the last call, how many calls were found, and the date range of calls identified, before any legal process was issued. l66 C. Improper Administrative Subpoenas Issued In Two FBI Investigations In two FBI criminal investigations, we found that SSAs signed administrative subpoenas that were issued to the on-site providers in circumstances that violated 21 U.S.C. § 876 and the FBI regulation governing the delegation of signature authority for Title 21 administrative subpoenas. In these instances the ECPA prohibition against divulging "a record or other infonnation pertaining to a subscriber to or customer of such service" was also violated. 1. Issuing FBI Administrative Subpoenas in the Absence of an Active Narcotics Investigation From December 2003 to September 2006, the FBI served at least 54 administrative subpoenas related to the _ Field Division's fugitive 166 We describe our finding that sneak peeks violated the ECPA in Chapter 1\vo of this report. 131 investigation of on the on-site communications service providers located in the CAU. Of that total a CAU SSA signed seven FBI administrative subpoenas for telephone toll billing records between Januaty 2005 and June 2005. At the time, this SSA served as the manager of the CAUls operational support to the FBI's _ investigation. The CAU SSA told us that no one on the _ task force told him that any of the telephone numbers listed in the seven administrative subpoenas was relevant to any drug investigation. Rather, he said he understood from the _ task force case agent and a task force Intelligence Analyst that the records were relevant to the FBI's attempts to locate _ The SSA also said that he knew that the _ in~on was classified by the FBI as a "drug case" and told us "that is what _ is wanted for." In August 2008, the OIG asked FBI aGC attorneys responsible for guidance on administrative subpoenas to describe if they believed it was appropriate to issue Title 21 FBI administrative subpoenas in a fugitive investigation where the underlying racketeering acts in the indictment included narcotics offenses. Elaine N. Lammert, FBI Deputy General Counsel for the Investigative Law Branch and Chief of Staff for the FBI aGC, told us that in order to use Title 21 administrative subpoena authority, FBI agents must have an active narcotics investigation at the time the subpoenas are issued and believe in good faith that the records requested are relevant to that investigation. FBI OGC attorneys asked the _ Field Division to provide information indicating that it had an active narcotics investigation to which telephone numbers listed in administrative subpoenas issued in the _ investigation were relevant. On March 4,2009. following review of information provided by the _ Field Division, the FBI aGC notified the alG that 'while appropriate in certain aspects of the case at certain times, widespread use of administrative subpoenas in this investigation without a clear nexus to an active investigation of violations of the Controlled Substances Act could not be supported. « 2. Administrative Subpoenas were Signed by Unauthorized Personnel In addition. we determined that the CAU SSA who signed the seven administrative subpoenas in the _ case was not among the FBI officials to whom the Attorney General delegated authority to sign Title 21 administrative subpoenas. The SSA told us he believed he was authorized to sign the subpoenas because CAU Unit Chief Glenn Rogers had designated him to be the CAU program manager assigned to support the _ Field Division's_ investigation. The SSA said he would not have signed the administrative subpoenas unless he believed he was authorized. He also said that he recalled 132 that the _ task force members agreed that he could sign them. However, he said he did not recall any specific conversations with CAU Unit Chiefs Rogers or Youssef, or any FBI attorneys in which he was told he was authorized to sign the subpoenas. The CAU SSA told us that he was b an on-site Company A analyst when there was c~tivity from telephone numbers associated with _ family, friends, or attorneys. The CAU SSA told us that he used Company A's hot number:~capability in the _ investigation. Once the CAU SSA was _ to calling act~ those telephone numbers, Company A typically performed a sneak peek _ to determine if the telephone number c a l l ~call from the "hot number" was a real telephone number _ If it was a relevant telephone number, the Company A analyst notified the CAU SSA, who then signed either an exigent letter or issued an administrative subpoena addressed to Company A seeking records for those telephone numbers. The SSA subsequently issued Title 21 administrative subpoenas to cover some of the records obtained through exigent letters. FBI records show that the data provided b the exigent letters were uploaded into an database before the date of the administrative subpoenas issued by the SSA to cover the records. 3. Two Additional After-the-Fact Administrative Subpoenas We identified two additional after-the-fact administrative subpoenas in a different investigation in which the subpoenas were provided from 1 to 6 weeks after the records had already been obtained by the FBI through exigent letter or an informal request. In an organized crime/ narcotics investigation conducted by the FBI's _ Field Division, another CAU SSA signed 2 exigent letters addressed to Company A dated August 9, 2004, seeking toll billing records for a total of 24 tele hone numbers. Responsive records were uploaded in a n _ database on August 10, 2004. A ~sued an administrative subpoena to Company A, dated August 17,2004, to cover these records. 167 167 As an SSA assigned to the FBI's Criminal Enterprise Program, this SSA was authorized to sign Title 21 administrative subpoenas. 133 In connection with the same investigation, on August 11,2004, the CAU SSA asked the on-site Company C employee whether Company Chad telephone records on the 24 telephone numbers listed on the 2 August 9, 2004, exigent letters to Company A (and 46 additional numbers). In response to this verbal request, the Company C employee delivered a CD with responsive records to the FBI on August 17, 2004. The field-based SSA who had sigoed the August 17, 2004, administrative subpoenas to Company A also signed an administrative subpoena to Company C dated September 30, 2004, to cover records for 4 of the 70 telephone numbers for which Company C had already provided records in response to the informal request. 168 4. Knowledge of the Use of The Title 21 Administrative Subpoenas We determined that the FBI aGC and CAU management were unaware of these inappropriate uses of administrative subpoenas to cover records obtained through exigent letters and other informal requests. FBI General Counsel Caproni told us that she did not know that the FBI had issued administrative subpoenas to cover records obtained in response to exigent letters. NSLB Deputy General Counsel Julie Thomas also said she did not recall being informed about administrative subpoenas in these cases. CAU Unit Chief Bassem Youssef told us that he never discussed with the CAU SSA who signed the seven administrative subpoenas, Assistant Section Chief Glenn Rogers, or NSLB attorneys the SSA's authority to sign administrative sUbpoenas to cover records acquired from exigent letters. Moreover, he said he did not know that administrative subpoenas were used to cover records acquired through exigent letters. D. OIG Analysis After the aIG raised questions about the FBI's use of administrative subpoenas in the _ Field Division's _ investigation, the FBI aGC responded that, in its view, in the absence of an active narcotics investigation to which the telephone numbers in the administrative sUbpoenas were relevant the FBI is not authorized to issue Title 21 administrative subpoenas. Further, when the FBI aGC reviewed the _ Field Division's basis for issuing Title 21 administrative subpoenas in the _ case, the FBI aGC concluded that the _ Field Division did not demonstrate that it had an active narcotics investigation to which the records sought in all of the administrative subpoenas were relevant. Accordingly, the FBI concluded that the _ Field 168 We did not locate administrative subpoenas for the remaining telephone numbers referenced in the informal request. 134 Division had at times improperly issued administrative subpoenas in that investigation. Followi~ FBI OGC's review, in March 2009, the FBI General Counsel ordered the _ Field Division to immediately conduct a comprehensive review of the use of each administrative subpoena issued in this case to determine whether it was authorized pursuant to the above discussion, and if not, to purge these records from FBI systems and the case file. We agree with the FBI OGe's an~and conclusion regarding the issuance of administrative subpoenas in the _ investigation. During this investigation we also found that the FBI did not establish sufficient internal controls of the use of administrative subpoenas in the CAU. A CAU SSA who was not authorized to issue Title 21 administrative subpoenas signed seven such subpoenas, and no one in the CAU or the _ Field Division recognized the improper use of this authority. Moreover, the FBI aGC and CAU management were unaware that the CAU was using administrative subpoenas to cover records acquired from exigent letters. We found that the ECPA was violated when the FBI obtained ECPA-protected telephone records in these matters without nrst issuing appropriate legal process. The ECPA requires communications service providers to disclose local and long distance non-content telephone records 'when [the FBlj uses an administrative subpoena authorized by a Federal ... statute ... ." 18 U.S.C. § 2703(c)(2). However, the ECPA does not authorize the FBI to obtain ECPA-protected records and then serve an administrative subpoena. Accordingly, we believe that the FBI's receipt of records obtained prior to issuance of administrative subpoenas violated the ECPAI69. In Chapter Six of this report we provide recommendations designed to ensure that all FBI personnel receive training and periodic guidance on the FBI's administrative subpoena authorities and the relationship between those authorities and other federal statutes, including the ECPA, that govern the FBI's authority to seek telephone records. 169 The FBI has not asserted, and we found no evidence to support, that these were emergency voluntary disclosures pursuant to 18 U.S.C. § 2702(c)(4). 135 (pAGE LEFT INTENTIONALLY BLANK) 136 CHAPTER FOUR THE FBI'S ATTEMPTS AT CORRECTIVE ACTIONS REGARDING EXIGENT LETTERS In this chapter we describe the FBI's efforts at corrective action to address the use of exigent letters, including the FBI's efforts to provide legal process to cover records _ and often acquired in response to exigent letters or other informal requests. The chapter is divided into two time periods: (1) the initial efforts from 2003 through October 2006; and (2) the efforts, beginning in November 2006, after attorneys in the FBI Office of the General Counsel (FBI OGC) National Security Law Branch (NSLB) learned about "blanket NSLs" that Communications Analysis Unit (CAU) personnel had drafted and Counterterrorism Division (CTD) officials had signed to cover previously acquired telephone records. 170 I. The FBI's Attempts at Corrective Actions From 2003 through October 2006 We determined that CAU personnel who issued exigent letters to the on-site communications service providers for records or calling activity information, or used other informal means for requesting records without legal process, sometimes obtained after-the-fact legal process, such as NSLs, to "cover" the original requests. However, as described in Chapter Three of this report, the Electronic Communications Privacy Act (ECPA) does not authorize the FBI to obtain such records unless it first serves compulsory legal process, such as an NSL, or the provider makes a voluntary production pursuant to Section 2702's emergency disclosure provision. 171 There is no provision in the ECPA authorizing the issuance of 170 FBI personnel first used the term "blanket NSL" in August 2006 to describe certain after-the-fact NSLs prepared by CAU personnel and signed by CTD officials. We also use that term in this report. 171 The ECPA NSL statute requires communications service providers to comply with requests for telephone subscriber and toll billing records information if the Director or his designee certifies in writing ... that the name, address, length of service, and toll billing records sought are relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities, provided that such an investigation of a United States person is not conducted solely on the basis of activities protected by the first amendment to the Constitution of the United States. (Cont'd.) 137 retroactive legal process. 172 Therefore, after-the-fact NSLs would not cure a prior improper receipt of records under the ECPA. As described below, from 2003 through October 2006 CAU Unit Chief Glenn Rogers and his successor Bassem Youssef took steps to request the issuance of after-the-fact NSLs from FBI operating divisions to cover these records. Because the CAU was an operational support unit, CAU personnel did not conduct investigations. CAU personnel were not authorized to issue NSLs. The unit therefore depended on field or Headquarters divisions to prepare and issue the after-the-fact NSLs. However, the operating divisions often did not respond quickly and sometimes did not respond at all to the CAU's requests for after-the-fact NSLs. As a result, during Rogers's tenure as CAU Unit Chief, a backlog developed of requests for legal process for records that had been provided by the on-site communications service providers at the CAU's request. We determined that Rogers did little to address the backlog. After Rogers left and Youssef became the Unit Chief in November 2004, Youssef began taking steps in approximately April 2005 to address the backlog of legal process owed to one provider, but did not recognize or begin to address the backlog for the other providers until October 2005. The FBI OGC also became involved in addressing the exigent letters practice during this time period. We found that in December 2004, NSLB attorneys in the FBI OGC became aware of the CAU's use of exigent letters and its difficulty in obtaining prompt after-the-fact NSLs from the operating divisions. However, NSLB attorneys failed to direct that the CAU end the practice of issuing exigent letters with the promise of legal process until March 2007, following release of the OIG's first NSL report. Moreover, beginning in January 2005, NSLB attorneys themselves became involved with the CAU in issuing after-the-fact NSLs to cover the records acquired in response to exigent letters. The NSLB attorneys also attempted to initiate a process that would ensure prompt issuance of after-the-fact NSLs predicated on open national security investigations. However, this effort was ineffective because the issuance of after-the-fact legal process would not retroactively validate an improper disclosure of records under the ECPA, even if the legal process was served a short time after receipt of the records. In any event, the proposal was never 18 U.S.C. § 2709(b). 172 See In re Application of u.s. for Nunc Pro Tunc Order, 353 F. Supp. 45, 46 (D. Mass. 2005). 138 implemented. While NSLB attorneys focused during this period on the issuance of NSLs for ongoing CAU exigent letter requests, they did not recognize and address in a timely manner the legal flaw with issuing after-the-fact NSLs. We also describe the actions of the CAU Unit Chiefs and the NSLB attorneys regarding the CAU's use of exigent letters, the backlog of promised legal process, and the actions taken to address the backlog. A. A Backlog First Develops During Rogers's Tenure as CAU Unit Chief Rogers told us that during his tenure as CAU Unit Chief from March 2003 to November 2004, he regularly reminded CAU personnel to stay current on NSLs that were owed to the providers. He also said he sometimes spoke with personnel assigned to CTD operational units about the importance of issuing after-the-fact legal process for telephone records, and on one occasion spoke with a field division about providing an after-the-fact NSL to the CAU. However, Rogers did not require CAU personnel to maintain lists of telephone numbers for which the CAU had requested information from the on-site providers, or otherwise to keep track of exigent letters to ensure that legal process followed the exigent letters. Instead, CAU personnel relied on the three on-site communications service providers to tell them whether legal process had been provided to cover the records acquired in response to exigent letters. We determined that by November 2004, the CAU had made requests for records to the on-site providers for hundreds of telephone numbers for which legal process had not been provided. The on-site Company B employee, who first came to the CAU in September 2004, told us that by November 2004 he was concerned that Company B was not receiving after-the-fact legal process for records he had provided to CAU personnel in response to exigent letters. He said he spoke to Rogers about the backlog of records requiring legal process before Rogers left the CAU in November 2004 to become the Assistant Section Chief for the CTD's Communications Exploitation Section (CXS) (the CTD Section that oversaw the CAUl. According to the Company B employee. Rogers told him "these take a little time" and "you need to stay after the guys." The Company B employee said that he was surprised by Rogers's response because he did not think he should be responsible for following up with CAU personnel. Although a backlog of record requests requiring legal process developed in the CAU, CAU personnel continued to sign and issue exigent letters to satisfy the operational support requests from FBI headquarters, the CTD's operational units, and field divisions. A significant number of these requests came from the International Terrorism Operations Section 1 139 (ITOS-I), which was responsible for addressing many of the international terrorism threats directed at the United States during this period. ITOS-I managers told us that they did not know about any CAU backlog in obtaining follow-up legal process in 2004 and 2005. Several ITOS managers told us that CAU personnel attended the daily ITOS briefings at which major terrorism investigations were discussed. At the conclusion of these briefings, the CAU was often directed to analyze telephone numbers identified in the course of these investigations to determine whether they had any U.S. connections. ITOS-I managers told us they did not know the mechanics of how the CAU accomplished its work, although most of these managers told us they were generally aware that the CAU used the resources available from the on-site communications service roviders and various FBI databases, taskings. 173 ITOS-I witnesses also told us that while they were unfamiliar with the procedures used by the CAU to analyze telephone numbers, they assumed that CAU personnel followed appropriate legal requirements. For example, Michael Heimbach, who was the CTD Assistant Section Chief over ITOS-I from February 2003 to March 2004 and the ITOS-I Section Chief from March 2005 to January 2007, told us: · .. it's their lane. It's the operational support's lane, meaning this is their job. This is their business. How, what relationships they had with Company A, Company C, and ~, I have no clue. I mean I ... wasn't in the weeds with them on it · . .. How they did it, what they were doing, what the process . · . wasn't my lane of traffic. Shortly before Rogers left the CAU in November 2004 to become the CXS Assistant Section Chief, he instructed a CAU Intelligence Analyst to implement a tracking system for records requests so that the CAU would not have to rely on the on-site providers to know whether after-the-fact legal process had been served. As discussed below, the tracking system was developed and later abandoned after Rogers left the CAU. As described in Cha ter Two of this report, CAU personnel had access to a database that CAU analysts regularly queried for records and used to perform analytical work. CAU personnel sometimes responded to requests for assistance through data analysis in this database. At other times, CAU personnel obtained data from the on-site providers, then analyzed the results once the records were uploaded into this database. 173 140 Rogers told us that when he left the CAU he was not aware that there were any record requests that still required legal process. By contrast, as described above, the Company B employee told us that he discussed the backlog with Rogers before Rogers's departure from the CAU. In addition, the Assistant General Counsel who was the NSLB point of contact for NSL-related policies and issues told us that in late 2004 or early 2005, Rogers told her that there were about 80 NSLs or telephone numbers for which after-the-fact NSLs had not been served. The Assistant General Counsel said that she was also informed at that time that the CAU was implementing a new tracking system for exigent letters and she believed that when the system was implemented the CAU would be better able to track telephone numbers requiring NSLs. We also determined that the CAU Intelligence Analyst who was responsible for implementing the tracking system requested and received lists from Company B and Company C in January 2005 identifying a total of 188 telephone numbers requiring legal process that the providers had previously _ in response to the CAU requests. These 188 telephone numbers represented approximately two-thirds of the total number of telephone numbers that CAU personnel had included in exigent letters or other informal requests to Company B and Company C in 2004. 174 Thus, when Youssef succeeded Rogers as the CAU Unit Chief in November 2004, there was a significant backlog of telephone records requests for which legal process had been promised but not delivered. As we describe below, shortly after Rogers was promoted and Youssef became CAU Unit Chief, the Assistant General Counsel alerted her supervisors in the NSLB about the CAU's practice of using exigent letters. We determined that NSLB attempted to institute a process for issuing NSLs quickly - albeit still after-the-fact - to cover future CAU requests for records from the on-site providers in exigent circumstances. However, months passed before Youssef and the NSLB attorneys recognized and addressed ~ e backlog of requests for which the providers had _ or provided the FBI records but were still awaiting legal process. 17't The Company C employee frrst arrived at the CAU in April 2004, and the Company B employee arrived in September 2004. Company A did not give CAU personnel a list of telephone numbers requiring legal process in January 2005; however, we have no reason to believe that the CAU was any more successful in obtaining after-the-fact legal process for Company A than for the other providers. 141 B. NSLB Knowledge of Exigent Letters and Involvement in Issuing After-the-Fact NSLs We determined that although the CAU began using exigent letters in March 2003, FBI attorneys were not alerted to the practice until July 2004. On July 19, 2004, a CAU Intelligence Analyst sent an e-mail to the Assistant General Counsel stating that the CAU had a Company A analyst on-site. The e-mail described the services that Company A provided, noting that in time-sensitive threat matters the CAU could obtain information from the on-site Company A analyst by using "an exigent letter" and following up later with an NSL. However, the Assistant General Counsel told us she believed she first became aware of the use of exigent letters in December 2004. She said that she must have overlooked the reference to exigent letters in the July 19 e-mail from the CAU analyst. The Assistant General Counsel said that she recalled learning about exigent letters in December 2004 in connection with a specific request from the CAU that NSLB prepare an after-the-fact NSL. FBI e-mails reflect that in mid-December 2004, a CAU SSA asked the NSLB to prepare an NSL to cover records for telephone numbers that had been previously obtained. The CAU SSA told the Assistant General Counsel that~hone numbers included numbers that had been previously _ by Company A pursuant to the CAU "form letter" requests that promised future legal process. The Assistant General Counsel reported the CAU request to her immediate supervisor and to NSLB Deputy General Counsel Julie Thomas, in an e-mail dated December 17, 2004. 175 In that e-mail, the Assistant General Counsel informed them that in connection with the request, the CAU SSA had told her the following: • The CAU was regularly obtaining records without legal process from the on-site communications service providers. 175 In this section of the report, we rely significantly on e-mails to and from the Assistant General Counsel. She told us that because many of the issues we interviewed her about happened more than 3 years earlier, she could not recall the events with certainty. However, she stated that the e-mails accurately depicted her understanding of events at the time. 142 • The CAU often received emergency requests for records from senior FBI officials and used a "form letter" to obtain these records that promised after-the-fact legal process. • The CAU attempted to obtain after-the-fact legal process from field divisions. • Field divisions often would not respond to the CAU's requests for follow-up legal process. • The CAU was starting a "tickler system" to track follow-up legal process requests. However, at this time the Assistant General Counsel did not ask to see a copy of the "form letter" promising future legal process that the CAU SSA told her had been used to obtain records. However, she told us, and her contemporaneous e-mails confirm, that from the time she was told about the CAU obtaining records with exigent letters through late 2006 she consistently told CAU personnel that the exigent letters practice should be limited to emergency situations and that after-the-fact NSLs must follow promptly. The Assistant General Counsel said she believed that in emergency situations, after-the-fact NSLs were appropriate as long as they were issued within 24 to 48 hours of the exigent letter request. She told us that she recognized that there was "no specific provision" in the ECPA authorizing issuance of after-the-fact NSLs, but she said she believed that the legislative intent of the statute would permit prompt issuance of after-the-fact NSLs in "real emergencies ... where peoples' lives are at issue." She said that during this period, she sought to ensure that the follow-up NSLs were issued quickly, but assumed that the CAU was issuing exigent letters only in true emergencies. She also told us that she understood that her supervisors were in agreement with her analysis that after-the-fact NSLs were appropriate in emergency situations. Although the Assistant General Counsel did not object to drafting the after-the-fact NSL for the previously obtained records, in a follow-up e-mail dated December 23, 2004, to her supervisor and Thomas, the Assistant General Counsel stated that because the NSLB knew the records had already been received she thought they should phrase the NSL to reflect that fact. She also stated in the e-mail that she was "real uncomfortable doing it any other way" and that she did not think she could issue the NSL as if she were unaware the FBI already had the information. She also noted that the CAU SSA was unhappy with her suggestion that the NSL state that records had been previously provided and the SSA told her the provider was expecting "a regular NSL." 143 Thomas replied to the Assistant General Counsel's e-mail, stating that she would discuss the issue with NSLB supervisory attorneys. Thomas also asked the Assistant General Counsel for proposed language for the after-the-fact NSL. However, Thomas also did not ask to see the exigent letter that had been used to obtain the records, did not at that time (or at any time until late 2006) review the contracts with the providers, and did not ask anyone in NSLB to do so. Ultimately, Thomas signed an after-the-fact NSL dated January 18, 2005, addressed to Company A. We determined that this NSL included some telephone numbers that were listed in exigent letters dated July 13, 14, and 15, 2004, that were given to an on-site Company A analyst. Despite the misgivings expressed by the Assistant General Counsel to her supervisors about signing NSLs that did not disclose that the FBI had already received the records, the NSL and accompanying approval EC did not state that Company A had previously provided the records to the FBI. We found that Thomas signed six additional after-the-fact NSLs over the next 4 months in which the NSLs themselves and the accompanying approval ECs did not disclose that these records had previously been requested and received by the FBI. Thomas signed an NSL dated February 2, 2005, addressed to Company A, which included a list of 63 telephone numbers related to Operation "W."176 We determined that this NSL included some telephone numbers that were lis~tters given to the on-site Company A analysts as early as _ Thomas also signed an after-the-fact NSL dated February 2, 2005, addressed to Company B, which related to Operation W and listed one telephone number. The FBI had previously re uested records for this telephone number in an exigent letter dated Thomas signed two NSLs dated June 28, 2005, addressed to Company A and Company C. These NSLs sought records from each provider for 163 telephone numbers related to another ma'or FBI operation. All of these telephone numbers had previously been and records for many of them had been provided to the CAU as early as On June 30, 2005, Thomas signed at least two more after-the-fact NSLs in connection with another counterterrorism investigation. These two NSLs covered records for telephone numbers that the CAU had requested from the providers in October 2004. E-mails show that the Assistant General Counsel had informed Thomas prior to her signing the NSLs that these 176 The name of this operation is classified. 144 records had been provided to the FBI 8 months earlier. Thomas told us that she did not recall the e-mails or these two NSLs, but she characterized the investigation to which the NSLs were related as "the greatest of emergencies. " In an interview in August 2008, Thomas acknowledged that she signed these seven after-the-fact NSLs, although she told us that she did not have a specific recollection of any of the NSLs themselves. Thomas said she has signed thousands of NSLs and therefore could not recall specific NSLs. She said that the CAV was one of nearly 100 FBI units that NSLB supported, and she noted that these NSLs were dated up to 3% years ago. She also said she relied on the accompanying approval ECs, which are reviewed by at least one and sometimes two NSLB attorneys, for the facts relating to the NSLs she signed. Thomas also said she did not recall being told that the telephone numbers listed in the NSLs had been previously _ and that records already had been provided to the CAV. When we showed her the December 23, 2004, e-mail exchange between her and the Assistant General Counsel described above, in which the Assistant General Counsel raised her concern that the NSL should document that the FBI already had the records, Thomas said she did not recall the exchange and also did not recall having any discussions about that issue with NSLB supervisors. In August 2008, Thomas also told the OIG that she did not believe that follow-up NSLs were required regarding this information because she believed during the period when these NSLs were signed that the CAU's requests to the on-site providers "were likely all emergency circumstances." Thomas said she therefore concluded that the requests the CAU made to the on-site providers fell within the emergency voluntary disclosure statute, 18 V.S.C. § 2702(c)(4), and that "follow-on NSLs would not be required." However, when probed on whether she and other FBI aGC attorneys relied on Section 2702 in 2004 and 2005, Thomas stated that she could not separate what she knew at the time of her interview from what she knew then. 177 Thomas said the reason the FBI provided follow-up NSLs in these cases was because the on-site providers wanted them. 177 As noted, prior to March 2006, 18 U.S.C. § 2702(c)(4) provided that a communications service provider could voluntarily provide telephone records to the FBI if the provider "reasonably believes that an emergency involving danger of death or serious physical injury justifies disclosure of the infonnation." We discuss in Chapter Six of this report our conclusion regarding the applicability of the emergency voluntary disclosure (Cont'd.) 145 Thomas also said that since the follow-up NSLs she signed were not legally required, she saw no need for the NSLs to document that the records requested had been previously provided. She said she was confident that the on-site providers were aware that the records had been previously provided and were not misled by the absence of any reference to this fact in the follow-up NSLs. C. NSLB Attomey Meets with CAU Personnel Regarding Exigent Letters In addition to learning about the problems in obtaining after-the-fact NSLs and addressing the request for an after-the-fact NSL, the Assistant General Counsel learned in early 2005 that in some instances CAU personnel had issued exigent letters to communications service providers in the absence of any authorized and open national security investigation. 178 The Assistant General Counsel was concerned about this practice because the ECPA NSL statute and the Attorney General's Guidelines for FBI National Security Investigations and Foreign Intelligence Collection (NSI Guidelines) required that information sought in NSLs be relevant to an "authorized investigation to protect against international terrorism or clandestine intelligence activities .... "179 The Assistant General Counsel believed that after-the-fact NSLs could not be issued unless they were relevant to an open, authorized national security investigation. On January 6, 2005, the Assistant General Counsel met with CXS Assistant Section Chief Rogers and a CAU SSA to discuss the CAU's process for obtaining records from the on-site providers.l 8o E-mail records show statute to the CAU's acquisition of ECPA-protected records from the on-site providers pursuant to exigent letters or other infonnal requests. As discussed below, FBI General Counsel Caproni and the Assistant General Counsel told us that they did not discuss amongst themselves or conclude in 2004, 2005, or 2006 that the acquisition of subscriber and toll billing records in response to exigent letters qualified as emergency voluntary disclosures pursuant to 18 U.S.C. § 2702(c)(4). 178 Many of the signers of these exigent letters told us that in these instances they were concerned about addressing the exigency and did not consider whether an investigation had yet been opened. One signer told us that he anticipated an investigation would be opened shortly after the exigent letter was issued. 179 NSI Guidelines, Section V(12}{"use of National Security Letters in conformity with ... 18 U.S.C. § 2709 (relating to subscriber infonnation, toll billing records ...... See 18 U.S.C. § 2709(b). 180 Youssef's attorney has asserted to the DIG that Youssef was "excluded" from or "not invited to" this meeting. However, Youssef's FBI e-mails show that he was invited to the meeting and that the time of the meeting was changed at his request in order to (Cont'd.) 146 that they discussed issues concerning the emergency records requests CAU personnel had been receiving, including the fact that CAU personnel were given little information about the requests. In an e-mail to Thomas on January 6 shortly after the meeting. the Assistant General Counsel reported that Rogers and the SSA told her they were "inundated" with emergency requests, including requests from Gary Bald. the Executive Assistant Director of the FBI's National Security Branch. She stated they told her that in response to Bald's requests, the CAU would obtain records from the on-site providers "with very little background as to why the telephone number is important." The Assistant General Counsel informed Thomas that she told Rogers and the SSA that they should tell Bald that they needed more information about the requests and that they could tell Bald that NSLB attorneys required predication for obtaining the information. The Assistant General Counsel added in her e-mail, "But I know that's not going to happen."ISI Bald confirmed to us that he often requested information regarding telephone numbers from the CAU. He said that the CAU provided valuable information and that he had repeatedly encouraged his subordinates in CTn operational units to utilize the CAU and the on-site providers' resources. However, he said he was unaware of the procedures the CAU used to comply with his requests. He said he did not know that the CAU used exigent letters and assumed that NSLs were issued to the providers prior to release of information to the FBI. He also said he was never told that the on-site providers were providing information to the CAU before they received an NSL. In her January 6 e-mail to Thomas. the Assistant General Counsel proposed that NSLB personnel be made available to the CAU to help get NSLs signed quickly after the FBI acquired records from the on-site providers in emergency situations. She acknowledged that under her proposal the CAU would still receive records prior to issuance of the NSLs. but stated that her plan would ensure that NSLs would be issued "very shortly after" any information was provided. 182 facilitate his attendance. However, Youssef did not attend and later apologized for missing the meeting. 181 Thomas told us that while she did not recall this particular e-mail and did not speak with Bald about this issue, she agreed with the Assistant General Counsel's advice. She said that on numerous occasions she has provided similar advice to FBI personnel so that "they can use the lawyers as the 'fall guy'." 182 The Assistant General Counsel also informed Marion Bowman, who had previously served as NSLB Deputy General Counsel, of her concern that the CAU was not (Conl'd.) 147 In mid-January 2005, Thomas agreed to a proposal from the Assistant General Counsel's supervisor that two NSLB attorneys and a paralegal serve as the NSLB points-DC-contact for the CAU to prepare after-the-fact NSLs to cover records obtained through exigent letters. Also in January 2005, the Assistant General Counsel proposed a solution to her NSLB supervisors, including Thomas, which she believed would ensure that telephone numbers listed in exigent letter requests would be relevant to open national security investigations. She proposed that CTD operational units open generic preliminary national security investigations (called "umbrella files") for various types of recurring threats to the United States. 183 The Assistant General Counsel suggested that when CAU personnel were asked by field divisions or FBI Headquarters to request telephone records from the on-site providers in cases where there was no open national security investigation to which the records were relevant, CAU personnel would associate the telephone number with one of the open umbrella files based upon the nature of the threat. As discussed below, however, this umbrella fIle proposal was never implemented. 184 On January 26, 2005, the Assistant General Counsel and the two NSLB attorneys designated as the points of contact met with CAU personnel to discuss their proposed assistance to the CAU. Both point-of-contact attorneys told us that the umbrella file idea was discussed at the meeting obtaining predication information from FBI requesters. In a November 2006 e-mail, the Assistant General Counsel informed Caproni that Bowman had spoken to "higher ups to make sure they understood that CAD needed more information when doing a request in order for the request to allow for an NSL." Bowman told us that he spoke with CTD DAD John Lewis about the Assistant General Counsel's concern, but did not raise the issue with other FBI officials. 18:) When the FBI opens an investigation, each investigation is assigned a unique file number. If implemented, the Assistant General Counsel's proposal would have resulted in the assignment of a unique file number for each type of generic threat, such as threats against transportation facilities, infrastructure, or special events. This file number would then serve as the authorized national security investigation referred to by FBI personnel in preparing the Electronic Communication lEG) seeking approval of after-the-fact NSLs. 184 The umbrella file proposal would have addressed only one aspect of the exigent letter problem - the ECPA requirement that records sought in NSLs be relevant to authorized national security investigations. See 18 U.S.C. § 2709(bJ. However, as discussed in Chapter Six of this report, the core legal problem with exigent letters was that the ECPA does not authorize the FBI to obtain telephone toll records unless it ftrst serves compulsory legal process such as an NSL, or the provider makes a voluntary production pursuant to Section 2702's emergency disclosure provision. Thus, even if there were authorized investigations to which the records sought in exigent letters were relevant, this legal problem would remain. 148 and both said they understood that they would be assisting the CAU in issuing NSLs quickly in emergency situations. They both said they understood that the NSLs they would facilitate would be issued prior to the CAU obtaining records, not after the records had already been obtained. In addition, they said that they understood that they would be working on future requests for records and that they were not aware of any backlog of requests for which legal process had been promised. One of the attorneys stated that when she left the meeting she did not expect to receive any NSL requests from the CAU until the umbrella file proposal was implemented. 18S CAU Unit Chief Youssef did not attend this meeting. He told us he did not know until 2007 that the NSLB had designated points of contact to assist the CAU with NSLs.186 However, FBI e-mails reflect that Youssef was informed in advance about the proposed NSLB assistance and about the January 26, 2005, meeting with NSLB personnel, and that he had instructed CAU personnel to attend the meeting. Both of the point-of-contact attorneys told us that in the months following the January 26 meeting they did not receive any requests for assistance from the CAU although they were included on various e-mails addressing the umbrella file issue. FBI e-mails also reflect that several months after the January meeting the Assistant General Counsel notified her supervisors that the NSLB attorneys had not received any requests for assistance from the CAU. In connection with the January 26, 2005, meeting, Youssef told us that beginning in November 2004 (when he became Unit Chief), and continuing through mid-April 2005, Rogers "specifically kept me out of several communications, several e-mails between [Rogers] and NSLB." Youssef said that, "Rogers knew about the fact that I was going to be at another meeting that day . . . . This was an indication that I was not needed at this meeting." Youssef stated that Rogers generally kept him "out of the loop" and that Youssef was not able to raise concerns he had about how the CAU was being run to Rogers because Rogers was not willing to listen to his suggestions. 185 We also reviewed various e-mails between the Assistant General Counsel and NSLB supervisors in which she expressed her opinion that without open umbrella mes the two point-of-contact attorneys and the paralegal could not assist the CAU with preparing NSLs. 186 FBI records reflect that Youssef was on sick leave the day of the meeting. 149 D. CAU Begins Implementing then Abandons a Tracking System for Legal Process In early February 2005, CAU personnel began using a new tracking system for requests to the on-site providers that Rogers had asked to be implemented. The system, known as the "Tracker Database," was designed to collect information about each records request to the on-site communications service providers. The database contained fields to identify the: • communications service provider; • request date; • CAU requester; • pertinent telephone numbers; • whether an exigent letter was issued; • type of legal process to follow (NSL or grand jury subpoena); • records receipt date; • contact information for the field or headquarters requester; and • date the CAU received legal process and served it on the provider. In an e-mail message to all CAU personnel dated February 2, 2005, the CAU Intelligence Analyst who was responsible for managing the Tracker Database wrote that at Rogers's direction all CAU personnel were required to use the database. The Intelligence Analyst also wrote that there were "about 100 pending NSL[sl" for which legal process had not yet been issued to 2 of the 3 on-site providers, Company B and Company C. 187 The Intelligence Analyst added, "using the [Tracker Database) is not optional and it's a way for us to cover ourselves in case anyone starts asking questions." 187 The e-mail message stated that a Company A analyst had not yet provided a list of record requests (telephone numbers) that required legal process. The e-mail also listed the number of "pending NSLs," not the number of telephone numbers awaiting follow-up legal process. As stated above, in January 2005 the Intelligence Analyst responsible for the tracking system had received a list of 188 telephone numbers which Company B and Company C had identified as still requiring legal process. 150 The Intelligence Analyst told us that CAU personnel showed little enthusiasm for using the Tracker Database because they did not want the responsibility for inputting the data. The Intelligence Analyst said that after she reported to Youssef several months later that the database was not being used by CAU personnel, she halted her efforts to implement the Tracker Database and no other CAU-wide tracking system for identifying the need for after-the-fact legal process was implemented. Rogers told us that when Youssef became the CAU's Unit Chief he did not provide Youssef with any guidance or instructions on how to use exigent letters or on how to track exigent letters to ensure they were followed up with after-the-fact legal process. Rogers said he never discussed exigent letters with Youssef. Youssef told us that he did not require CAU personnel to use the Tracker Database. He said that after he received the February 2, 2005, e-mail from the Intelligence Analyst, he held an "all-hands" meeting at which the Tracker Database was discussed. He said that at the meeting there was an "outcry" and that nobody in the CAU (other than the Intelligence Analyst who designed it) wanted to use the database because it was too cumbersome. He said that the database "died instantly" because he told Rogers no one wanted to use it, and Rogers did not instruct him that it had to be used. Youssef also told us that when the Tracker Database issue arose in February 2005 he did not yet know that the CAU was obtaining records prior to service of legal process. We therefore asked Youssef what he was thinking at the time about the reference in the Intelligence Analyst's February 2 e-mail to "100 pending NSLs." Youssef said he could not remember, but he may have thought "there are NSLs that we still have to serve. I mean, I did not see it as pending as in NSLs we never got. That was not my understanding and frankly I do not remember much of this here." E. CAU Unit Chief Youssef Learns that the CAU has Obtained Records in Advance of Legal Process Youssef told us that he first learned that the CAU was obtaining records before service of legal process shortly before his first meeting with the Assistant General Counsel, which we determined occurred on March 11, 2005. On that date, Youssef and two other CAU SSAs met with the Assistant General Counsel at the off-site location where she was assigned. He said that he and the SSAs were at the off-site location for another purpose, and he decided that while there he would introduce himself to her. Youssef informed Rogers in a contemporaneous e-mail that he had discussed "streamlining the NSL process" at the March 11 meeting. 151 Youssef said that some time before that meeting. a Company A analyst told him "in passing" of an instance in which Rogers had requested records from the analyst prior to service of legal process. The analyst informed Youssef that Rogers had told the analyst it was an emergency and that Executive Assistant Director Bald wanted the records. Youssef told us that based on this information. he informed the Assistant General Counsel at the March 11 meeting that the CAU "may be in the practice" of obtaining records without legal process and that he thought it was wrong. Youssef said that the Assistant General Counsel told him she understood that the CAU sometimes received emergency requests and obtained information before serving a legal instrument. Youssef stated that based on the Assistant General Counsel's comments at the meeting, it was clear to him that she was already aware that the CAU was obtaining records prior to the issuance of legal process. Youssef told us that he did not discuss with the Assistant General Counsel at the March 11 meeting the CAU's use of exigent letters or the backlog of records for which legal process had not been issued because he said that at the time he was unaware of these issues. He told us that he also was unaware at the time of the frequency of requests to the CAU from FBI upper management related to telephone records. Youssef said that sometime after meeting with the Assistant General Counsel, the on-site Company B employee told Youssef that he had not received NSLs that were "owed" to him. Youssef told us that he believed this conversation "probably" occurred right after his meeting with the Assistant General Counsel, in late March or early April 2005. but that it could have happened in May 2005. Youssef said that the Company B employee told him that he was owed over 100 NSLs and that the conversation alarmed him. The Company B employee confirmed that he discussed with Youssef Company B's backlog of records requiring legal process. The Company B employee said he believed that they had discussed the backlog in early 2005, shortly after Youssef arrived at the CAU. The Company B employee said that soon after speaking with Youssef about the backlog. at Youssefs request he began to send e-mails directly to CAU personnel asking for NSLs to cover the backlog. The Company B employee also said that he went back to Youssef approximately a month later because he still was not receiving legal process. He said that in response, Youssef held a unit meeting and told CAU personnel to get the proper documentation to the on-site providers. Youssef told us that after speaking with the Company B employee he asked CAU personnel about the issue and several of them said they used exigent letters to obtain records in advance of legal process. Youssef told us 152 that he had heard the term "exigent letters" before, but this was the first time he was told such letters were used to obtain records from the on-site providers. He said that the first time he actually saw an exigent letter was when he signed one in November 2005. 188 Youssef told us that within "a day or two" after learning that the CAU was using exigent letters and obtaining records prior to issuance of legal process, he had a conversation with Rogers, who at the time was his supervisor as the CXS Assistant Section Chief. Youssef said that in this conversation he told Rogers the practice was "a major issue." According to Youssef, Rogers was "nonchalant" about the matter. Youssef said that Rogers told him, "No, this is the procedure. This is how we do it. We can go get the requests from the phone companies and then we will get the NSLs later." Youssef said that after the conversation with Rogers, he concluded that, "if that is what he is telling me ... if I went against it and said we are not going to use exigent letters for example, I would have been insubordinate. " Youssef told us that he did not bring his concern about the CAU obtaining records from the on-site providers with exigent letters rather than legal process to anyone else in his supervisory chain of command, other than Rogers. 189 Rogers told us that Youssef never spoke with him about exigent letters or the backlog of NSLs. He said Youssef probably learned about exigent letters, like Rogers did, "when somebody came to him and ... told him it existed." Rogers said that he never provided any oversight or guidance to Youssef about the letters. Youssef also told us that he did not feel he could go above Rogers with his concerns to CXS Section Chief Laurie Bennett or to the Deputy Assistant 188 Youssef also told us that he did not closely read the exigent letter he signed in November 2005, and that the first time that he "really scrutinized" an exigent letter was in May 2006 when he was asked by a CAU Intelligence Analyst to sign another exigent letter. Youssef said that he then read the exigent letter and realized that it referenced a follow-up subpoena. He said because the exigent letter referenced a subpoena, he did not sign the May 2006 letter. 189 In a letter to Senator Charles E. Grassley, dated March 17, 2007, Youssef's attorney stated that in a CXS Unit Chiefs' meeting, Youssef raised the issue of the CAU's use of exigent letters to the CXS Section Chief who "was dismissive of the concern." Youssef told us that Rogers was the Acting CXS Section Chief at this meeting. 153 Director (DAD) for CTD, John Lewis. 190 He said that shortly after Bennett came to the CXS in August 2004, she expressed her dissatisfaction with his performance as a Unit Chief for the CXS Document Exploitation Unit and that "within three weeks [of her arrival at CXS], everything I did was wrong." Youssef also asserted that Bennett began expressing her dissatisfaction with his performance "within the same wee~ of when his attorney provided a list of FBI witnesses to be deposed in an connection with an Equal Employment Opportunity Commission complaint Youssef filed against the FBI. Further, Youssef said that Bennett's supervisor, DAD John Lewis, also "was after" him and was "retaliating after me mercilessly." Youssef added that he believed Lewis was "not going to pay attention to anything that I am saying." Youssef stated that he never brought his concerns about the exigent letters practice to anyone else in his chain of command because he "really did not have access to talk to anybody." F. NSLB Attorney Provides Incorrect Advice to the CAU About the Use of Exigent Letters On April 26, 2005, the Assistant General Counsel sent an e-mail to Youssef expressing concern that "on occasion, CAU is presuming that someone who comes to them [seeking records from the on-site providers] has an emergency." She instructed Youssef "not [to] assume that all people who come to you are in an emergency situation" and to ensure that CAU personnel were "instructed to ask for an NSL." She also reminded Youssef that if exigent letters were used, the CAU could ask the designated NSLB attorneys to draft the after-the-fact NSLs. She wrote that the NSLB could do the NSLs quickly and that she personally would do whatever it took to get NSLs done in a day or two. Finally, she wrote that "we are willing to allow these requests when there really are exigent circumstances ... only if it is clear ... that the requestor cannot await an NSL." The Assistant General Counsel told us that she could not recall the circumstances surrounding this e-mail. However, we determined from her contemporaneous e-mails that her concern arose from an instance in which a Headquarters operational unit obtained toll billing records from the Company C on-site analyst using the exigent letter process and then sought an after-the-fact NSL from the NSLB.191 The Assistant General Counsel was 190 Laurie Bennett was the CXS Section Chief from August 2004 to April 2006. John Lewis was the CTD DAD from May 2004 to June 2006. 191 After reviewing a draft of this report, Youssefs attorney suggested that the Assistant General Counsel's April 26, 2005, e-mail was in response to a request from Youssef for guidance. However, as described above, we determined through (Cont'd.) 154 initially uncertain about why the exigent letter process was used in this matter, and the Headquarters operational unit subsequently explained to her the exigent circumstances that led to the request. Youssef responded bye-mail on April 27, 2005, that the Assistant General Counsel was "absolutely right" and that he would instruct the CAU staff as she had requested. 192 On April 27, Youssef also forwarded the Assistant General Counsel's e-mail to all CAU personnel and the on-site communications service providers' employees, directing them to review the e-mail. Youssef added in his forwarding e-mail, "We all need to differentiate between what is an exigent request and what is not." We determined that after Youssef forwarded the Assistant General Counsel's e-mail to CAU personnel there was a decrease in the number of exigent letters issued by the CAU, as reflected in Chart 2.3 in Chapter Two of this report. However, as described in this chapter and in Chapter Two, field and Headquarters requests to the CAU for records or calling activity information continued, many of which were communicated to the on-site providers by informal means other than exigent letters, such as by sneak peek requests and requests communicated by telephone, e-mail, in-person, and on post-it notes. As also discussed below and in Chapter Six, we concluded that the Assistant General Counsel's statement that an exigent letter was appropriate when "the requester cannot await an NSL" is inconsistent with both the ECPA NSL statute and the ECPA emergency voluntary disclosure statute. G. NSLB Fails to Recognize Applicability of the ECPA's Authority for Emergency Voluntary Disclosures to Requests Sent to the CAU On August 25,2005, the FBI OGC issued a guidance memorandum to all FBI personnel, which described the circumstances in which the ECPA authorized the disclosure of the content and records of communications under 18 U.S.C. § 2702(b)(8) and 2702 (c)(4) in emergency circumstances. The guidance recognized that emergency voluntary disclosures were "outside of the compulsory process" and stated that such disclosures contemporaneous e-mails that the Assistant General Counsel's guidance was prompted by a request from another Headquarters unit, not from Youssef. 192 On April 27, 2005, the Assistant General Counsel forwarded her advice and Youssefs response to her immediate supervisor and Thomas. 155