U.S. SIGINT "Reforms" 2015

download U.S. SIGINT "Reforms" 2015

of 6

Transcript of U.S. SIGINT "Reforms" 2015

  • 8/9/2019 U.S. SIGINT "Reforms" 2015

    1/12

    SIGN LS

    INTELLIGENCE

    REFORM

    2015

    NNIVERS RY

    REPORT

    OVERVIEW

    OVERVIEW

    SEEKING INDEPENDENT ADVICE

    STRENGTHENING PRIVACY CIVIL LIBERTIES

    LIMITING SIGINT COLLECTION USE

    ENHANCING TRANSPARENCY

    PROTECTING WHISTLEBLOWERS

    MOVING FORWARD

    FACTSHEET

    Over the course o the past eighteen months, the United States has undertaken a comprehensive effort to

    examine and enhance the privacy and civil liberty protections we embed in our signals intelligence

    (SIGINT) collection activities.

    As part o h is process, we have sought - and benefited from - a broad cross section o views, ideas,

    and recommendations from oversight bodies , advocacy organizations, private companies, and the general

    public. This effort has resulted in strengthened privacy and civil liberty protections; new limits on signals

    intelligence collection and use ; and increased transparency.

    On January 17, 2014, President Obama signed Pres idential Policy Directive-28, Signals Intelligence

    Activities (PPD-28) and delivered an address at the Department o Justice on the steps we are taking to

    reform certa in intelligence activities. As we mark the one-year anniversary of these events it is a good

    time to report on the status of a range of ongoing reform efforts.

    • SEEKING INDEPENDENT DVICE

    • STRENGTHENING PRIV CY CIVIL LIBERTIES PROTECTIONS

    • LIMITING SIGINT COLLECTION ND USE

    • ENH NCING TR NSP RENCY

    • PROTECTING WHISTLEBLOWERS

    • MOVING FORW RD

    As this report shows, the Intelligence Community has made significant progress implementing many

    reforms. However, our work is not done. To that end , the Office o the Director o National Intelligence will

    issue another public report in 2016 about the Intelligence Community's on-going progress to implement

    these reforms.

  • 8/9/2019 U.S. SIGINT "Reforms" 2015

    2/12

  • 8/9/2019 U.S. SIGINT "Reforms" 2015

    3/12

    SIGNALS

    INTELLIGENCE

    REFORM

    2015

    ANNIVERSARY

    REPORT

    OVERVIEW

    SEEKING INDEPENDENT ADVICE

    STRENGTHENING PRIVACY & CIVIL LIBERTIES

    LIMITING SIGINT COLLECTION & USE

    ENHANCING TRANSPARENCY

    PROTECTING WHISTLEBLOWERS

    MOVING FORWARD

    FACTSHEET

    STRENGTHENING PRIVACY CIVIL LIBERTIES PROTECTIONS

    As the President said in his speech on January 17, 2014, Uhe challenges posed by threats like terrorism

    and proliferation and cyber-attacks are not going away any time soon .. . and for our intelligence

    community to be effective over the long haul, we must maintain the trust o the American people , and

    people around the world.  As a part of that effort, the President made clear that ou r signals intelligence

    activities must take into account that all persons should be treated with dignity and respect, regardless of

    their nationality or wherever they might reside .. ..

    This commitment is reflected in the direction the President issued that same day in Section 4 o

    Presidential Policy Directive-28, Signals Intelligence Activities (PPD-28), requiring all elements o the

    Intelligence Community to establish policy and procedures for safeguarding personal information collected

    from signals intelligence (SIGINT) activities. In addition, we are also seeking to provide new legislative

    remedies for potential privacy violations.

    • INTELLIGENCE COMMUNITY S IMPLEMENTATION OF SECTION 4 OF PPD-28

    • JUDICIAL REDRESS OF CITIZENS OF CERTAIN COUNTRIES

    In addition, in response to the President's direction and to the recommendations from both the President's

    Review Group on Intelligence and Communications Technology and the Privacy and Civil Liberties

    Overs ight Board , the Intelligence Community is strengthening privacy protections in our collection activities

    under Section 702 of Foreign Jntelligence Surveillance Act and the Section 215 bulk telephony metadata

    program. Moreover, as directed by the President, the FBI will amend its non-disclosure policy for National

    Security Letters.

    • NEW PRIVACY PROTECTIONS FOR INFORMATION COLLECTED UNDER SECTION 215

    • NEW PRIVACY PROTECTIONS FOR INFORMATION COLLECTED UNDER SECTION 702

    • NATIONAL SECURITY LETTERS

    INTELLIGENCE COMMUNITY S IMPLEMENTATION OF SECTION 4 OF

    PRESIDENTIAL POLICY DIRECTIVE PPD-28, SIGNALS INTELLIGENCE

    ACTIVITIES

    On January 17, 2014, the President issued Pres idential Po licy Directive-28, Signals Intelligence Activities

    (PPD-28), which articulates principles to guide why, whether, when , and how the United States conducts

    signals intelligence activities for authorized foreign intelligence and counterintelligence purposes. 

    In a speech that same day, the President made clear that the United States is committed to protecting the

    personal information of all people regardless o nationality and directed the Intelligence Community to take

    a number of steps to strengthen the privacy and civil liberty protections afforded to all people.

    PPD-28 reinforces current practices, establishes new principles, and strengthens oversight, to ensure that

    in conducting signals intelligence (SIGINT) activities, the United States takes into account not only the

    security needs

    o

    our nation and our allies, but also the privacy

    o

    people around the world.

    Section 4 of PPD-28 calls on each Intelligence Community element to update existing or issue new

    policies and procedures to implement principles for safeguarding all personal information collected through

    SIGINT, consistent with technical capabilities and operational needs.

    Over the past year, the Intelligence Community has been working to implement this requ irement within the

    framework of existing processes, resources , and capabilities, wh ile ensuring that mission needs continue

    to be met.

    In July 2014, the Director of National Intelligence provided the President an interim report on the status o

    our efforts that also evaluated, in coordination with the Department of Justice and the rest o the

    Intelligence Community, certain additional retention and dissemination safeguards that all Intelligence

    Community elements should follow as they adopt policies and procedures under PPD-28.

    The Director of National Intelligence is pleased to report that, as requ ired by PPD-28 , all Intelligence

    Community elements have reviewed and updated their existing policies and procedures, or have issued

    new pol icies or procedures, to provide safeguards for personal information collected through SIGINT,

    regardless o nationality and consistent with national security, our technical capabilities, and operational

    needs.

    Although similar in many respects, agency procedures are not identical. The differences reflect that not all

    agencies conduct SIGINT collection and that agencies have different mission requirements. Links to

    agency policies and procedures can be found below.

    https://leaksource.files.wordpress.com/2015/02/presidential-policy-directive-ppd-28-signals-intelligence-activities.pdfhttps://leaksource.files.wordpress.com/2015/02/presidential-policy-directive-ppd-28-signals-intelligence-activities.pdfhttps://leaksource.files.wordpress.com/2015/02/presidential-policy-directive-ppd-28-signals-intelligence-activities.pdfhttps://leaksource.files.wordpress.com/2015/02/presidential-policy-directive-ppd-28-signals-intelligence-activities.pdfhttps://leaksource.files.wordpress.com/2015/02/presidential-policy-directive-ppd-28-signals-intelligence-activities.pdfhttps://leaksource.files.wordpress.com/2015/02/presidential-policy-directive-ppd-28-signals-intelligence-activities.pdfhttps://leaksource.files.wordpress.com/2015/02/presidential-policy-directive-ppd-28-signals-intelligence-activities.pdfhttps://leaksource.files.wordpress.com/2015/02/presidential-policy-directive-ppd-28-signals-intelligence-activities.pdfhttp://leaksource.info/2014/01/17/obama-announces-nsa-reforms-w-presidential-directive-greenwald-assange-responses/http://leaksource.info/2014/01/17/obama-announces-nsa-reforms-w-presidential-directive-greenwald-assange-responses/http://leaksource.info/2014/01/17/obama-announces-nsa-reforms-w-presidential-directive-greenwald-assange-responses/http://leaksource.info/2014/01/17/obama-announces-nsa-reforms-w-presidential-directive-greenwald-assange-responses/http://leaksource.info/2014/01/17/obama-announces-nsa-reforms-w-presidential-directive-greenwald-assange-responses/http://leaksource.info/2014/01/17/obama-announces-nsa-reforms-w-presidential-directive-greenwald-assange-responses/http://tmblr.co/ZZQjsq1TMnJ3Hhttp://tmblr.co/ZZQjsq1TMnJ3Hhttp://tmblr.co/ZZQjsq1TMnJ3Hhttp://tmblr.co/ZZQjsq1TMnJ3Hhttp://tmblr.co/ZZQjsq1TMnJ3Hhttp://tmblr.co/ZZQjsq1TMnJ3Hhttp://tmblr.co/ZZQjsq1TMnJ3Hhttp://tmblr.co/ZZQjsq1TMnJ3Hhttp://tmblr.co/ZZQjsq1TMnJ3Hhttp://leaksource.info/2014/01/17/obama-announces-nsa-reforms-w-presidential-directive-greenwald-assange-responses/https://leaksource.files.wordpress.com/2015/02/presidential-policy-directive-ppd-28-signals-intelligence-activities.pdf

  • 8/9/2019 U.S. SIGINT "Reforms" 2015

    4/12

    U.S. Intelligence Community Policies & Procedures to Safeguard Personal

    Information Collected Through SIGINT

    • Office of the Director of National Intelligence 

    • Central Intelligence Agency

    • National Security Agency

    • National Reconnaissance Office

    • Federal Bureau of Investigation 

    • Department of Homeland Security 

    • Drug Enforcement Administration

    • State Department

    • Treasury Department

    • Department of Energy

    • U.S. Coast Guard

    • Other IC Elements in the Department of Defense

    What has PPD-28 changed?

    The agency policies and procedures implementing Section 4 of PPD-28 include significant changes that

    strengthen privacy and civil liberty protections for all people. It is worthwhile to highlight a few of the most

    significant changes:

    • Limits on retention: We have imposed new limitations on the retention of personal information about

    non-U.S. persons. Before PPD-28, Intelligence Community elements had disparate restrictions on how

    long information about non-U.S. persons could be retained. PPD-28 changes these retention practices

    in significant ways to afford strengthen privacy protections. Now Intelligence Community elements

    must delete non-U.S. person information collected through SIGINT five years after collection unless the

    information has been determined to be relevant to, among other things, an authorized foreign

    intelligence requirement, or if the Director of National Intelligence determines, after considering the

    views of the Office of the Director of National Intelligence Civil Liberties Protection Officer and agency

    privacy and civil liberties officials, that continued retention is in the interest of national security. This

    new retention requirement is similar to the requirements applicable to information about U.S. persons.

    Thus these new retention rules will more uniformly limit the retention of any personal information by the

    Intelligence Community.

    • Dissemination Restrictions: Intelligence Community elements have always disseminated intelligence

    information because it is relevant to foreign intelligence requirements. All agency policies implementing

    PPD-28 now explicitly require that information about a person may not be disseminated solely because

    he or she is a non-U.S. person and the Office of the Director of National Intelligence has issued a

    revised directive to all Intelligence Community elements to reflect this requirement. Intelligence

    Community personnel are now specifically required to consider the privacy interests of non-U.S.

    persons when drafting and disseminating intelligence reports.

    • Oversight, Training & Compliance Requirements: Intelligence Community elements have always

    had strong training, oversight, and compliance programs to ensure we were protecting the privacy and

    civil liberties of U.S. persons. In response to PPD-28, Intelligence Community elements have added

    new training, oversight, and compliance requirements. They are developing mandatory training

    programs to ensure that intelligence officers know and understand their responsibility to protect the

    personal information of all people, regardless of nationality. We are also adding new oversight and

    compliance programs to ensure that these new rules are being followed properly. The oversight

    program includes a new requirement to report any significant compliance incident involving personal

    information, regardless of the person's nationality, to the Director of National Intelligence.

    JUDICI L REDRESS FOR CITIZENS OF CERTAIN COUNTRIES

    In furtherance of its commitment to protecting privacy in the law enforcement context, the Administration is

    working with Members of Congress on legislation to give citizens of designated countries the right to seek

    judicial redress for intentional or willful disclosures of protected information, and for refusal to grant access

    or to rectify any errors in that information.

    NEW PRIVACY PROTECTIONS FOR BULK TELEPHONY METADATA

    COLLECTED UNDER SECTION 215

    Section 215 of the USA PATRIOT Act authorizes the Government to make requests to the Foreign

    Intelligence Surveillance Court (FISC) for orders requiring production of documents or other tangible things

    books, records, papers, documents, and other items) when they are relevant to an authorized national

    security investigation such as an investigation to protect against international terrorism or clandestine

    intelligence activities. The vast majority of orders issued under Section 215 do not seek information

    collected in bulk; rather, these orders require the production of a discrete and limited amount of

    information.

    This authority is also used to require certain telephone communications providers to produce in bulk

    telephony metadata, such as telephone numbers dialed and length of calls. This program was developed

    to fill an important intelligence gap identified by the report on the 9/11 attacks by allowing the Government

    to detect communications between terrorists who are operating outside the U.S. and potential operatives

    inside the U.S. This program does not permit the government to obtain or listen to the content of anyone's

    telephone calls. Nor is the Government allowed to sift indiscriminately through the telephony metadata

    obtained under this program. Rather, since its inception, this program has been subject to strict controls

    and oversight, including:

    • Requiring the metadata to be stored in secure databases accessible to only a limited number of trained

    analysts.

    • Limiting the access to, and use of, the metadata only for counterterrorism purposes.

    • Prohibiting querying the databases unless there is a reasonable, articulable suspicion that a particular

    target identifier (the seed number) is associated with particular foreign terrorist organizations.

    • Limiting the access to and use of this metadata only for identifying the telephone identifiers that are in

    contact, directly or indirectly, with the seed number.

    • Destroying the information after five years.

    https://leaksource.files.wordpress.com/2015/02/odni-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/odni-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/odni-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/odni-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/odni-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/cia-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/cia-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/nro-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/fbi-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/fbi-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/fbi-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dhs-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dhs-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dhs-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dea-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/state-ppd-28.pdfhttp://www.treasury.gov/resource-center/terrorist-illicit-finance/Pages/PPD-28-Procedures.aspxhttps://leaksource.files.wordpress.com/2015/02/doe-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/doe-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/doe-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/coast-guard-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dod-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dod-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dod-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dod-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dod-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dod-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dod-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/ics-107-1.pdfhttps://leaksource.files.wordpress.com/2015/02/ics-107-1.pdfhttps://leaksource.files.wordpress.com/2015/02/ics-107-1.pdfhttps://leaksource.files.wordpress.com/2015/02/ics-107-1.pdfhttps://leaksource.files.wordpress.com/2015/02/ics-107-1.pdfhttps://leaksource.files.wordpress.com/2015/02/ics-107-1.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-203-analytic-standards.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-203-analytic-standards.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-203-analytic-standards.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-203-analytic-standards.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-203-analytic-standards.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-203-analytic-standards.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-203-analytic-standards.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-203-analytic-standards.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-203-analytic-standards.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-203-analytic-standards.pdfhttps://leaksource.files.wordpress.com/2015/02/ics-107-1.pdfhttps://leaksource.files.wordpress.com/2015/02/dod-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/coast-guard-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/doe-ppd-28.pdfhttp://www.treasury.gov/resource-center/terrorist-illicit-finance/Pages/PPD-28-Procedures.aspxhttps://leaksource.files.wordpress.com/2015/02/state-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dea-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/dhs-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/fbi-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/nro-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/cia-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/cia-ppd-28.pdfhttps://leaksource.files.wordpress.com/2015/02/odni-ppd-28.pdf

  • 8/9/2019 U.S. SIGINT "Reforms" 2015

    5/12

    New Protections for the Current Program

    In response to the President's direction in January 2014, this program was modified by incorporating into

    the FISC orders authorizing the bulk collection two forms o enhanced privacy protection:

    • Previously, the bas is for the reasonable, articulable suspicion find ing had to be documented in writing

    and approved by specifically authorized NSA officials. The Department

    o

    Justice conducted routine

    oversighto these decisions to ensure the standard was met. Today, except in emergency

    circumstances, reasonable, articulable suspicion findings must also be approved in advance by the

    FISC. Thus, except in emergency circumstances, only court-approved identifiers may be used to query

    the database.

    • Previously, NSA was permitted to query the information out to three hops ,  or links. Today, queries are

    limited to two hops. This means NSA is permitted to develop contact chains by starting with a target

    identifier (seed number) and , using telephony metadata records, see what identifiers communicated

    with that target (first hop) and which identifiers, in tum, communicated with the first-hop identifiers

    (second hop) . The limitation to two hops reduces the numbero potential results from each query.

    In June 2014 , the Office o the Director o National Intelligence released its first annual statistical

    transparency report on the use o national security authorities covering the year 2013. Later th is year, the

    Director of National Intelligence will issue its second report covering the use o national security authorities

    in 2014 . In advance of that report, it is appropriate to note that in 2014 there were 161 target identifiers

    approved by the FISC to be queried under NSA s bulk telephony metadata program.

    ew Protections to be Established by Legislation

    In his January 17, 2014 speech, the President directed the Department of Justice and the Intelligence

    Community to develop options for a new approach that would match the capabilities and fill the gaps that

    Section 215 was designed to address without the government holding the metadata itself. The Department

    o Justice and the Intelligence Community explored a number of options, including having the metadata

    held by a thi rd party or leaving the metadata at the provider.

    Based on recommendations from the Department of Justice and the Intelligence Community, the President

    proposed that the government end bulk collection o telephony metadata under Section 215 o the USA

    PATRIOT Act, while ensuri

    ng

    that the government has access to the information it needs to meet its

    national security requirements. The Intelligence Community and the Department o Justice have since

    been working closely with Congress to develop legislation that would implement the President's proposal

    by leaving the metadata at the prov ider.

    To that end , the Administration supported the USA FREEDOM Act, which, if enacted, would have

    prohibited bulk collection using (i) Section 215, (ii) the Pen Registers and Trap and Trace provisions o the

    Foreign Intelligence Surveillance Act, and (iii) National Security Letters while ma intaining critical authorities

    to conduct more targeted collection.

    The Attorney General and the Director of National Intelligence stated that, based on communications

    providers' existing data retention practices, the bill would retain the essential operational capabilities of the

    existing bulk telephone metadata program while el iminating bulk collection by the government under these

    legal authorities. The bill would also expressly authorize an independent voice in significant cases before

    the FISC.

    The Administration was disappointed that the 113th Congress ended without enacting th is legislation. This

    legislation not only satisfies the President's requirements, but also responds to the recommendations from

    the Privacy and Civil Liberties Oversight Board and the President's Review Group on Intelligence and

    Communications Technology to end the bu lk collection o telephony metadata records under Section 215

    o

    USA PATRIOT Act as it currently exists.

    The Intelligence Community encourages Congress to quickly take up and pass legislation that would allow

    the government to end bulk collection o telephony metadata records under Section 215, while ensuring

    that the government has access to the information it needs to meet its national security requirements.

    NEW PRIVACY PROTECTIONS FOR INFORMATION COLLECTED

    UNDER SECTION 7 2

    Section 702 of the Foreign Intelligence Surveillance Act (FISA), wh ich was added by the FISA

    Amendments Act o 2008, authorizes the acquisition of foreign intelligence information concerning

    non-U.S. persons reasonably believed to be located outside the United States.

    Under Section 702, the government cannot target anyone for collection unless it has a significant purpose

    to acquire foreign intelligence information , the foreign target is reasonably believed to be outs ide the

    United States, and the Government abides by FISC-approved targeting and minimization procedures.

    Section

    702

    cannot

    be

    used

    to

    intentionally target any

    U.S.

    citizen or

    any

    other U.

    S.

    person,

    to

    intentionally target any person known to be in the United States, or to target a person outside the United

    States if the purpose is to target a person inside the United States.

    Collection under Section 702 does not require individual judicial orders authorizing collection against each

    target. Instead, Section 702 requires that the FISC approve procedures to (i) ensure that only non-U.S.

    persons reasonably bel ieved to be outside the U.S. are targeted, and (ii) minimize the acquisition,

    retention, and dissemination of incidentally acquired information about

    U.S.

    persons.

    Activities authorized by Section 702 are subject to oversight by the Judicial Branch through the Foreign

    Intelligence Surveillance Court, by the Executive Branch through the Department of Justice and the Office

    o the Director o National Intelligence, and by the Legislative Branch through the Intelligence and Judiciary

    Committees of Congress. Directives requ iring the production o information to the Government can be

    challenged in the FISC by the recipients.

    In his January 17, 2014 address, the President asked the Department of Justice and the Intelligence

    Community to institute reforms with respect to the government's ability to retain , search, and use in

    criminal cases communications between Americans and foreign citizens incidentally collected under

    Section 702.

    Subsequently, in July 2014, the Privacy and Civil Liberties Oversight Board issued a report on Section 702, 

    concluding that the Section 702 program is lawful and valuable, and that at its core, the program is sound 

    and mak ing ten recommendations to help the program strike a better balance between privacy, civil rights,

    and national security.

    https://leaksource.files.wordpress.com/2015/02/2014-09-02-dni-and-ag-ltr-to-sjc-chairman-leahy-ref-usa-freedom-s-2685.pdfhttps://leaksource.files.wordpress.com/2015/02/2014-09-02-dni-and-ag-ltr-to-sjc-chairman-leahy-ref-usa-freedom-s-2685.pdfhttps://leaksource.files.wordpress.com/2015/02/2014-09-02-dni-and-ag-ltr-to-sjc-chairman-leahy-ref-usa-freedom-s-2685.pdfhttps://leaksource.files.wordpress.com/2015/02/2014-09-02-dni-and-ag-ltr-to-sjc-chairman-leahy-ref-usa-freedom-s-2685.pdfhttps://leaksource.files.wordpress.com/2015/02/2014-09-02-dni-and-ag-ltr-to-sjc-chairman-leahy-ref-usa-freedom-s-2685.pdfhttps://leaksource.files.wordpress.com/2015/02/2014-09-02-dni-and-ag-ltr-to-sjc-chairman-leahy-ref-usa-freedom-s-2685.pdfhttp://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/http://leaksource.info/2014/08/01/privacy-civil-liberties-oversight-board-section-702-surveillance-report/https://leaksource.files.wordpress.com/2015/02/2014-09-02-dni-and-ag-ltr-to-sjc-chairman-leahy-ref-usa-freedom-s-2685.pdf

  • 8/9/2019 U.S. SIGINT "Reforms" 2015

    6/12

    As noted above, in response to the President s direction and recommendations from the Privacy and Civil

    Liberties Oversight Board, the Attorney General and Director of National Intelligence are placing additional

    restrictions on the government s ability to retain, query, and use in evidence in criminal proceedings

    communications between Americans and foreign citizens incidentally collected under Section 702.

    • First,

    FBI, CIA, and NSA each are instituting new requirements for using a

    U.S. person identifier to

    query information acquired under Section 702. As recommended by the Privacy and Civil Liberties

    Oversight Board, NSA's minimization procedures will require a written statement of facts showing that a

    query is reasonably likely to return foreign intelligence information. CIA s minimization procedures will

    be similarly amended to require a statement o facts for queries o content. In addition, FBl s

    minimization procedures will be updated to more clearly reflect the FBl s standard for conducting U.S.

    person queries and to require additional supervisory approval to access query results in certain

    circumstances.

    • Second, the new policy re-affirms requirements that the government must delete communications to,

    from, or about U.S. persons acquired under Section 702 that have been determined to lack foreign

    intelligence value. In addition, the policy requires the Department of Justice and the Office of the

    Director o National Intelligence to conduct oversight over these retention decisions. This change will

    help ensure that the Intelligence Community preserves only that information that might help advance

    its national security mission.

    • Third, consistent with the recommendation of the Privacy and Civil Liberties Oversight Board,

    information acquired under Section 702 about a U.S. person will not be introduced as evidence against

    that person in any criminal proceeding except (1) with the approval o the Attorney General, and (2) in

    criminal cases with national security implications or certain other serious crimes. This change will

    ensure that, i the Department of Justice decides to use information acquired under Section 702 about

    a U.S. person in a criminal case, it will do so only for national security purposes or in prosecuting the

    most serious crimes.

    The Intelligence Community has also agreed to address the Privacy and Civil Liberties Oversight Board s

    other recommendations, including:

    • Revising targeting procedures to require additional documentation of the foreign intelligence value of

    each target;

    • Making available to the FISC additional information to help the Court evaluate the annual certifications

    in support of collection under Section 702;

    • Initiating studies to ensure that the Intelligence Community is using the best filtering technology and

    techniques to prevent inadvertent collection;

    • Publicly releasing the minimization procedures of the CIA, NSA, and the FBI ;

    • Evaluating whether NSA can track and publicly release additional statistics on its collection and use of

    information obtained pursuant to Section 702;

    • Supporting the Privacy and Civil Liberties Oversight Board s ongoing effort examine efforts across the

    Intelligence Community to assess the efficacy and relative value o counterterrorism programs.

    N TION L SECURITY LETTERS

    A National Security Letter is an investigative tool, similar to a subpoena, which is used by the FBI in a

    national security-related investigation to obtain limited types of information from companies, such as

    telephone records and subscriber information.

    When the FBI issues a National Security Letter, by law a senior official, such as the Special Agent in

    Charge of a field office, may require that the recipient company not disclose the existence of the letter, i

    one or more statutory standards are met - that is, when disclosure may (i) endanger the national security

    o the United States, (ii) interfere with a criminal, counterterrorism or counterintelligence investigation, (iii)

    interfere with diplomatic relations,

    or

    (iv) endanger the life or physical safety

    o

    any person.

    In his January 17, 2014 remarks, the President directed the Attorney General to amend how we use

    National Security Letters so that (their] secrecy will not be indefinite, and will terminate within a fixed time

    unless the government demonstrates a real need for further secrecy.

    In response to the President s new direction, the

    FBI

    will now presumptively terminate National Security

    Letter nondisclosure orders at the earlier o three years after the opening o a fully predicated investigation

    or the investigation s close.

    Continued nondisclosures orders beyond this period are permitted only if a Special Agent in Charge or a

    Deputy Assistant Director determines that the statutory standards for nondisclosure continue to be

    satisfied and that the case agent has justified, in writing, why continued nondisclosure is appropriate.

    https://leaksource.files.wordpress.com/2015/02/2014-cia-702-minimization-procedures.pdfhttps://leaksource.files.wordpress.com/2015/02/2014-cia-702-minimization-procedures.pdfhttps://leaksource.files.wordpress.com/2015/02/2014-nsa-702-minimization-procedures.pdfhttps://leaksource.files.wordpress.com/2015/02/2014-fbi-702-minimization-procedures.pdfhttps://leaksource.files.wordpress.com/2015/02/2014-fbi-702-minimization-procedures.pdfhttps://leaksource.files.wordpress.com/2015/02/2014-nsa-702-minimization-procedures.pdfhttps://leaksource.files.wordpress.com/2015/02/2014-cia-702-minimization-procedures.pdf

  • 8/9/2019 U.S. SIGINT "Reforms" 2015

    7/12

  • 8/9/2019 U.S. SIGINT "Reforms" 2015

    8/12

    SIGN LS

    INTELLIGENCE

    REFORM

    2 15

    NNIVERS RY

    REPORT

    OVERVIEW

    SEEKING INDEPENDENT ADVICE

    STRENGTHENING PRIVACY CIVIL LIBERTIES

    LIMITING SIGINT COLLECTION USE

    ENHANCING TRANSPARENCY

    PROTECTING WHISTLEBLOWERS

    MOVING FORWARD

    FACTSHEET

    ENH NCING TR NSP RENCY

    Transparency has been a significant focus for the Intelligence Community. We have declassified and made

    publicly available a substantial amount o information over the past 18 months, particularly regarding the

    government's use of Foreign Intelligence Surveillance Act (FJSA) authorities. This effort has included:

    • Developing IC on the Record; 

    • Releasing documents about the government's intelligence activities, including compliance and

    oversight assessments;

    • Releasing opinions and orders from the Foreign Intelligence Surveillance Court;

    • Publishing the first annual Intelligence Community transparency report disclosing statistics on the

    government's use of National Security Letters and Foreign Intelligence Surveillance Act authorities;

    • Declassifying aggregate FISA data so that communications providers can make public additional

    information about FISA orders they receive;

    • Releasing unclassified reports on NSA s implementation of Section 702 of the Foreign Intelligence

    Surveillance Act and its Civil Liberties and Privacy Protections for Targeted SIGINT Activities under 

    Executive Order 12333;

    • Establishing Principles of Intelligence Transparency for the Intelligence Community to solidify these

    practices; and

    • Making numerous speeches and appearances by Intelligence Community leadership to explain our

    activities to the public

    Since the launch of IC on the Record on August 20, 2013, the Intelligence Community has posted more

    than 250 declassified documents (comprising more than 4,500 pages) about Intelligence Community

    activities. The majority of the declassified documents relate to NSA s bulk telephony metadata program

    under Section 215 of the USA PATRIOT Act (Section 501 of FISA); Section 702 of FISA); and NSA s

    now-discontinued bulk internet metadata collection program under Section 401 o FISA (i.e., the Pen

    Register/Trap and Trace program).

    Many of the documents posted about these programs relate to proceedings before the Foreign Intelligence

    Surveillance Court, including applications by the government to authorize or reauthorize programs and

    significant court opinions. Other documents that have been posted include NSA training slides for

    personnel with access to bulk telephone metadata and U.S. District Court documents relating to legal

    challenges to the bulk telephony metadata collection program.

    The Intelligence Community has also released documents associated with the Foreign Intelligence

    Surveillance Court of Review's opinion upholding the constitutionality o the now-discontinued surveillance

    program under the Protect America Act and a number of documents about the activities conducted under

    the previous Administration's Terrorist Surveillance Program.

    In addition to releasing documents, the Intelligence Community has posted to IC on the Record other

    information to give context to those documents. These include videos, audio recordings, and text

    transcripts

    o

    public engagements and Congressional testimony by senior Intelligence Community officials;

    fact sheets; and, recently, a live, online question-and-answer session between a senior Intelligence

    Community official and members of the public.

    The release o this information has facilitated public debate about Intelligence Community policies and

    practices, and has established a precedent for transparency going forward. In particular, the Director of

    National Intelligence has issued principles to guide our transparency efforts and has established a senior

    working group to continue these transparency efforts and proactively identify new ones.

    The Intelligence Community recognizes that continued public support for our activities to protect our nation

    and our partners requires the public trust that can only be achieved with greater transparency.

    http://icontherecord.tumblr.com/http://icontherecord.tumblr.com/http://icontherecord.tumblr.com/http://icontherecord.tumblr.com/http://icontherecord.tumblr.com/http://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2013http://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2013https://leaksource.files.wordpress.com/2015/02/nsa_report_on_section_702_program.pdfhttps://leaksource.files.wordpress.com/2015/02/nsa_report_on_section_702_program.pdfhttps://leaksource.files.wordpress.com/2015/02/nsa_report_on_section_702_program.pdfhttps://www.nsa.gov/civil_liberties/_files/nsa_report_on_section_702_program.pdfhttps://leaksource.files.wordpress.com/2015/02/nsa_clpo_report_targeted_eo12333.pdfhttps://leaksource.files.wordpress.com/2015/02/nsa_clpo_report_targeted_eo12333.pdfhttps://leaksource.files.wordpress.com/2015/02/nsa_clpo_report_targeted_eo12333.pdfhttps://leaksource.files.wordpress.com/2015/02/nsa_clpo_report_targeted_eo12333.pdfhttps://leaksource.files.wordpress.com/2015/02/nsa_clpo_report_targeted_eo12333.pdfhttps://leaksource.files.wordpress.com/2015/02/nsa_clpo_report_targeted_eo12333.pdfhttps://leaksource.files.wordpress.com/2015/02/final-transparency_poster-v1.pdfhttps://leaksource.files.wordpress.com/2015/02/final-transparency_poster-v1.pdfhttps://leaksource.files.wordpress.com/2015/02/final-transparency_poster-v1.pdfhttp://icontherecord.tumblr.com/tagged/speeches-and-interviewshttp://icontherecord.tumblr.com/tagged/speeches-and-interviewshttps://leaksource.files.wordpress.com/2015/02/final-transparency_poster-v1.pdfhttps://leaksource.files.wordpress.com/2015/02/nsa_clpo_report_targeted_eo12333.pdfhttps://leaksource.files.wordpress.com/2015/02/nsa_clpo_report_targeted_eo12333.pdfhttps://www.nsa.gov/civil_liberties/_files/nsa_report_on_section_702_program.pdfhttps://leaksource.files.wordpress.com/2015/02/nsa_report_on_section_702_program.pdfhttp://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2013http://icontherecord.tumblr.com/

  • 8/9/2019 U.S. SIGINT "Reforms" 2015

    9/12

    SIGN LS

    INTELLIGENCE

    REFORM

    2 15

    NNIVERS RY

    REPORT

    OVERVIEW

    SEEKING INDEPENDENT ADVICE

    STRENGTHENING PRIVACY & CIVIL LIBERTIES

    LIMITING SIGINT COLLECTION & USE

    ENHANCING TRANSPARENCY

    PROTECTING WHISTLEBLOWERS

    MOVING FORWARD

    FACTSHEET

    PROTECTING WHISTLEBLOWERS

    In parallel to our efforts to implement PPD-28, we have continued to work to ensure that Intelligence

    Community employees have appropriate avenues to report, without fear o reprisal, allegations of

    violations of law; waste, fraud or abuse; or a substantial and specific danger to public health or safety.

    All U.S. Government employees, including employees in the Intelligence Community, have the right to safe

    and effective methods of reporting concerns about wrongdoing without fear o retaliation. The Intelligence

    Community handles classified information, the unauthorized disclosure

    o

    which is prohibited by law and

    can cause grave harm to national security. Accordingly, there are special rules and processes, codified

    decades ago in the laws of the United States, to afford Intelligence Community employees, including

    contractors, safe channels to report concerns about wrongdoing while protecting national security.

    In October 2012 , the President issued Presidential Policy Directive -19, Protecting Whistleblowers with

    Access to Classified Information. To implement PPD-19, in May 2014, the Director o National Intelligence

    issued Intelligence Community Directive 120 . In addition, Congress recently enacted whistleblower

    provisions applicable to the Intelligence Community in Title VI of the Intelligence Authorization Act for

    Fiscal Year 2014. 

    Together with existing laws and regulations, these policies afford substantial protections to Intelligence

    Community employees. In general, Intelligence Community employees are permitted to report allegations

    o violations o aw; waste, fraud or abuse; or a substantial and specific danger to public health or safety, to

    their supervisors (or others within their management chain), the head o their agency, Inspectors General,

    and Members o Congress consistent with the Intelligence Community Whistleblower Protection Act.

    Disclosures made through these specific channels are commonly known as protected disclosures.  Once

    a protected disclosure is made, an Intelligence Community employee is protected from reprisal by law and

    regulation. Moreover, the employee's supervisors are prohibited from taking an adverse employment

    action e.g., termination, failure to promote, demotion) or

    an adverse security clearance determination

    based on the protected disclosure.

    Intelligence Community contractors are also afforded protections against reprisals for making protected

    disclosures; however, the protections necessarily apply differently to contractors because they are not

    employees of the United States government.

    If Intelligence Community employees believe that they were retaliated against based on a protected

    disclosure, they can seek a review of the personnel action under agency internal review procedures, which

    must include an independent review by their agency's Inspector General.

    After exhausting remedies under the agency process, they may seek review o the personnel action by an

    independent External Review Panel - a panel of three Inspectors General chaired by the Inspector

    General of the Intelligence Community. If reprisal is found , the External Review Board may recommend

    corrective actions.

    https://leaksource.files.wordpress.com/2015/02/ppd-19.pdfhttps://leaksource.files.wordpress.com/2015/02/ppd-19.pdfhttps://leaksource.files.wordpress.com/2015/02/ppd-19.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-120.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-120.pdfhttps://leaksource.files.wordpress.com/2015/02/icd-120.pdfhttp://www.archives.gov/declassification/pidb/legislation/pdfs/public-law-113-126.pdf#page=25http://www.archives.gov/declassification/pidb/legislation/pdfs/public-law-113-126.pdf#page=25http://www.archives.gov/declassification/pidb/legislation/pdfs/public-law-113-126.pdf#page=25http://www.archives.gov/declassification/pidb/legislation/pdfs/public-law-113-126.pdf#page=25http://www.archives.gov/declassification/pidb/legislation/pdfs/public-law-113-126.pdf#page=25http://www.archives.gov/declassification/pidb/legislation/pdfs/public-law-113-126.pdf#page=25http://www.archives.gov/declassification/pidb/legislation/pdfs/public-law-113-126.pdf#page=25http://www.archives.gov/declassification/pidb/legislation/pdfs/public-law-113-126.pdf#page=25http://www.archives.gov/declassification/pidb/legislation/pdfs/public-law-113-126.pdf#page=25http://www.archives.gov/declassification/pidb/legislation/pdfs/public-law-113-126.pdf#page=25https://leaksource.files.wordpress.com/2015/02/icd-120.pdfhttps://leaksource.files.wordpress.com/2015/02/ppd-19.pdf

  • 8/9/2019 U.S. SIGINT "Reforms" 2015

    10/12

    SIGNALS

    INTELLIGENCE

    REFORM

    2 15

    ANNIVERSARY

    REPORT

    MOVING FORWARD

    OVERVIEW

    SEEKING INDEPENDENT ADVICE

    STRENGTHENING PRIVACY CIVIL LIBERTIES

    LIMITING SIGINT COLLECTION USE

    ENHANCING TRANSPARENCY

    PROTECTING WHISTLEBLOWERS

    MOVING FORWARD

    FACTSHEET

    As this report shows the Intelligence Community has made significant progress implementing many

    reforms in response to among other things, the requirements in PPD-28 and the recommendations from

    many independent review groups. As we continue to implement these and other reforms we will also

    carefully review progress to identify any additional protections that might be needed. Over the next year

    we expect to focus on:

    Privacy Protections:

    Over the next year the Intelligence Community elements will continue to

    implement their PPD-28 policies and procedures. In addition, the Intelligence Community will continue to

    work to update agency guidelines under Executive Order 12333 to protect the privacy and civil liberties o

    U.S. persons.

    Section 2 5 of the US PATRIOT Act Capability: We will continue to work

    with Congress to enact legislation preserving essential capabilities of the bulk telephony metadata

    collection program without the need for the government to hold the data in bulk before Section 215 of the

    USA PATRIOT Act sunsets in June 2015.

    Transparency: We have established a senior working group to continue to identify ways the

    Intelligence Community can increase transparency without harming national security. Expect to hear more

    from us on this effort.

    Annual Report: In January of 2016 we will provide our next annual report on our progress

    implementing SIGINT reforms.

  • 8/9/2019 U.S. SIGINT "Reforms" 2015

    11/12

    SIGN LS

    INTELLIGENCE

    REFORM

    2 15

    NNIVERS RY

    REPORT

    F CTSHEET

    OVERVIEW

    SEEKING INDEPENDENT ADVICE

    STRENGTHENING PRIVACY & CIVIL LIBERTIES

    LIMITING SIGINT COLLECTION & USE

    ENHANCING TRANSPARENCY

    PROTECTING WHISTLEBLOWERS

    MOVING FORWARD

    FACTSHEET

    Over the past eighteen months, the United States has undertaken a comprehensive effort to examine and

    enhance the privacy and civil liberty protections embedded in our signals intelligence (SIGINT) collection

    activities.

    As part o th is process, we have sought - and benefited from - a broad cross section o views, ideas,

    and recommendations from oversight bodies , advocacy organizations, private companies, and the general

    public. This effort has resulted in strengthened privacy and civil liberty protections, new limits on the

    collection and use o signals intelligence, and increased transparency.

    On January 17, 2014, President Obama signed Presidential Policy Directive-28, Signals Intelligence

    ctivities (PPD-28) and delivered an address at the Department o Justice on the steps we are taking to

    reform certa in signals intelligence activities.

    To mark the one-year anniversary of these events, we have prepared an online report to update the public

    on our reform efforts, including the implementation o PPD-28 and other actions taken based upon

    recommendations from several independent review groups. Th is report is posted on IC on the Record. 

    • PPD-28 states, our signals intelligence activities must take into account that all persons should be

    treated with dignity and respect, regardless o their nationality or wherever they might reside. This

    commitment reiterates long-standing SIGINT collection principles; limits Intelligence Community

    elements' ability to use signals intelligence collected in bulk to six specific purposes; requires an

    annual Cabinet-level review of SIGINT priorities and requirements in light o potential risks to national

    security interests and re lationships abroad; and requires each Intelligence Community element to

    update or issue new policies and procedures that implement safeguards for all personal information

    collected through SIGINT, regardless o nationality, consistent with technical capabilities and

    operational needs.

    • All Intelligence Community elements have completed new policies or revisions to existing policies to

    implement the requirements o PPD-28. You can read each agency's policies on IC on the Record . The

    protections in these policies and procedures include new limits on the retention and dissemination of

    personal information for persons o all nationalities, as well as additional oversight, training, and

    compliance requirements.

    • In addition, the Intelligence Community, in partnership with the National Security Council, has elevated

    the process by which SIGINT requirements and priorities are identified, so that the heads of the

    relevant departments and agencies can better evaluate SIGINT collection in light o its potential risks to

    national interests and our law enforcement, intelligence, and diplomatic relationships abroad. The

    process o reviewing signals intelligence collection covered almost seven dozen countries and

    organizations and resulted in restrictions on the current signals intelligence collection posture.

    • In his remarks on January 17, 2014, the President ordered a transition that would end Section 215 bulk

    metadata program as it currently exists.

    • To begin this transition, the Intelligence Community in February 2014 began operating the

    telephony metadata collection program under new constraints directed by the President to

    provide enhanced privacy protections, including seeking advance approval from the Foreign

    Intelligence Surveillance Court for each query term (except in an emergency) and limiting the

    results

    o

    queries to two hops  (or steps removed from a phone number associated with a

    terrorist organization) instead o three, limiting the number of potential results from each query.

    • Then , based on recommendations from the Department of Justice and the Intelligence

    Community, the President proposed that the government end the bulk collection o telephony

    metadata records under Section 215 of USA PATRIOT Act, while ensuring that the government

    has access to the information it needs to meet its national security requirements. The

    Administration supported the USA FREEDOM Act as a means of enacting this proposal, and we

    continue to call on Congress to reform Section 215 in a manner consistent with the President's

    proposal.

    • In addition to the reforms announced in the President's January 17 address, the Privacy and Civil

    Liberties Oversight Board PCLOB) conducted a comprehensive review o the Intelligence

    Community's activities under Section 215 and made 12 recommendations. The Intelligence Community

    is working to address the majority of these recommendations.

    http://www.icontherecord.tumblr.com/http://www.icontherecord.tumblr.com/http://www.icontherecord.tumblr.com/http://www.icontherecord.tumblr.com/http://www.icontherecord.tumblr.com/http://www.icontherecord.tumblr.com/http://www.icontherecord.tumblr.com/http://www.icontherecord.tumblr.com/http://www.icontherecord.tumblr.com/

  • 8/9/2019 U.S. SIGINT "Reforms" 2015

    12/12

    • As noted above PPD-28 imposes limitations on the use of SIGINT collected in bulk.

    • Moreover over the past several months a committee of independent experts from top technology firms

    and academia assessed the technical feasibility of creating software-based alternatives as substitutes

    for bulk collection. The committee just released its report, which concluded that there is no

    software-based alternative which will provide a complete substitute for bulk collection in the detection

    of some national security threats, but the report suggested other steps to reduce risks to privacy and

    civil liberties, as well as to improve oversight of bulk collection activities. We are currently reviewing

    how to address these important findings.

    • Section 702 allows the government to acquire foreign intelligence information concerning non-U.S.

    persons reasonably believed to be located outside the United States. As announced by the President

    in his January 17 address we will provide additional privacy protections for U.S. persons whose

    communications are incidentally collected under Section 702. This new executive branch policy limits

    the ability to retain query and use in criminal cases this type of information.

    • In addition, in 2014, the PCLOB conducted an in-depth review of the Intelligence Community s

    activities under Section 702. The PCLOB found them to be lawful and important to national security

    and offered ten recommendations to enhance privacy and civil liberties protections for both U.S. and

    non-U.S. persons. The Intelligence Community has agreed to make changes to address all o these

    recommendations. The Intelligence Community has agreed to address all of these recommendations.

    • We have declassified and publicly released an unprecedented amount of information about current

    programs, much

    o

    which relates to the government s use of FISA authorities.

    We have published the

    first  IC Annual Transparency Report, disclosing statistics on the government s use o National Security

    Letters and FISA authorities.

    • We have also declassified certain aggregate FISA data so that communications providers can disclose

    to the public additional information about how they respond to requests they receive from the

    government. In addition, providers can now also make public additional information about the number

    of National Security Letters they receive.

    • We recently issued the Principles o Intelligence Transparency which we will implement this coming

    year to further enhance transparency while protecting intelligence sources and methods.

    • National Security Letters The FBI will amend its use o National Security Letters to ensure that the

    non-disclosure requirement placed on recipients will terminate within a fixed time period, absent a

    demonstrated need for further secrecy.

    • Judicial Redress for Citizens o Certain Countries In furtherance o its commitment to protecting

    privacy in the law enforcement context, the Administration is working with Members o Congress on

    legislation to give citizens o designated countries the right to seek judicial redress for intentional or

    willful disclosures o protected information, and for refusal to grant access or to rectify any errors in that

    information.

    • Whistleblower Protections As we have strengthened the security of our systems we have also

    reaffirmed the process by which Intelligence Community personnel can report suspected violations of

    law or other ethical and legal concerns without fear o retaliation. Within each agency there are multiple

    officials designated to receive ethical, legal or other concerns from intelligence employees. In addition,

    intelligence personnel may leverage the Inspector General for the IntelligenceCommunity the Civil

    Liberties and Privacy Officer in the Office of the Director of National Intelligence, or consistent with the

    Intelligence Community Whistleblower Protection Act speak to Members

    o

    Congress.

    As we continue to implement these and other reforms, we will also carefully review progress to identify any

    additional protections that might be needed. In particular, we expect to focus on:

    • Privacy Protections: Over the next year Intelligence Community elements will continue to implement

    the requirements their PPD-28 policies and procedures. In addition, the Intelligence Community will

    continue to work to update agency guidelines under Executive Order 12333 to protect the privacy and

    civil liberties o U.S. persons.

    • Section 215 o he USA PATRIOT Act Capability: We will continue to work with Congress to enact

    legislation preserving essential capabilities of the bulk telephony metadata collection program without

    the need for the government to hold the data in bulk before Section 215 of the USA PATRIOT Act

    sunsets in June 2015.

    • Transparency: We have established a senior working group to continue to identify ways the Intelligence

    Community can increase transparency without harming national security. Expect to hear more from us

    on this effort.

    • Annual Reports: In January o 2016 we will provide our next annual report on our progress

    implementing SIGINT reforms.

    http://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2013http://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2013http://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2013http://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2013http://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2013http://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2013http://icontherecord.tumblr.com/transparency/odni_transparencyreport_cy2013