Uploaded by bpgavigan

jewel-bonanni-redacted

advertisement
TOP S ECR-ETI~-+>->¥~-w.
2
3
4
5
6
7
8
9
10
MICHAEL F. HERTZ
Acting Assistant Attorney General
DOUGLAS N. LETTER
Terrorism Litigation Counsel
JOSEPH H. HUNT
Director, Federal Programs Branch
VINCENT M. GARVEY
Deputy Branch Director
ANTHONY J. COPPOLINO
Special Litigation Counsel
U.S. Department of Justice
Civil Division, Federal Programs Branch
20 MassachusettsAvenue, NW
Washington, D.C. 20001
Phone: (202) 5 14-4782
Fax: (202) 616-8460
II
12
13
Attorneys for the United Scates and
Government Defendants Sued in their
Official Capacities
J4
UNITED STATES DISTRICT COURT
15
NORTHERN DISTRICT OF CALIFORNIA
16
CAROLYN JEWEL, et al.
P laintiffs,
18
19
v.
)
NATIONAL SECURITY AGENCY eta/.
)
)
20
21
22
) No. 08-cv-4873~VRW
)
) CLASSIFIED DECLARATION
) OF DEBORAH A. BONANNI,
) NA TlONAL SECURITY AGENCY
17
EX PARTE, IN CAMERA
SUBMISSION
)
Defendants.
23
24
)
)
)
)
Date: June 25, 2009
Time: 2:30p.m.
Courtroom 6, l tb Floor
Chief Judge Vaughn R. Walker
25
26
27
28
Derived From· NSAICSSM 1-5
Datod: 2009040
Declassify On: 2034040
Classified In Camera, Ex Parte Declaration of Deborah A. Bonanni. Na1ional Security Agency
Carolyn Jewel. e/ nl.
1'.
Nntio11al SP.curity Agency, et a/. (No.~~~} ~ _
W.P£ ECR-El~//TSPN8 1~~
(U) Table of Contents
2
3
l.
(U) Introduction
4
II.
(U) Summary
5
Ill.
(U) Classification of Declaration
IV.
(U) Background Information
6
7
A.
8
B.
C.
9
10
II
(U) The National Security Agency
(U) September 11 , 2001 and the al Qaeda Threat.
(U) Summary ofNSA Activities After 9/11 to Meet al Qaeda Threat
V.
(U) NSA Information Protected by Privilege Assertions
VI.
(U) Description aflnfonnation Subject to Privilege and the Harm of Disclosure
12
A.
13
(U) Information That May Tend to Confirm or Deny Whether or Not the Plaioti
Have Been Subject to the AJleged NSA Activities
14
15
(U) Information Related to NSA Activities, Sources, and Methods Implicated by
Plaintiffs ' Allegations
!6
1.
B.
(U) Plaintiffs' Allegations of a Communications Dragnet
17
(a) (U) Information Related to Terrorist Surveillance Program
18
(b) (U) Plaintiffs' Allegations Concerning the Collection of
Communication Records
19
20
2.
fF&ISIIIOCfNF) lnfonnation Concerning Current FISA Authorized
Activities and Specific FISC Orders.
3.
(U) Plaintiffs' Allegations that AT&T Provided Assistance to the NSA
with the Alleged Activities
21
22
23
24
25
Risks of Allowing Litigation to Proceed
VII.
(U)
VIII.
(U) Swnmary and Conclusion
26
27
28
Classified In Camero, £.x Parte Declaration of Dcboroh A. Bonanni, Nctional Security Agency
carolyn Jewe(. er of. v. Nartonaf Secunl)> AgMcy. el ol. (
W)
TOP SECRET/IT8.PNS+-
·roP8ECR ET/lT8~~
CLASSIFIED DE CLARATJON OF DEBORAH A. BONANNI
NATIONAL SECURITY AGENCY
(U)
I, Deborah A. Bonanni, do hereby state and declare as follows:
I. (U) Introduction
4
5
6
I.
(U) I am the Chief of Staff for the National Security Agency (NSA), an
intel ligence agency within the Department of Defense. I have held this position since February
7
8
9
10
IJ
2006. As the Chief of Staff, under our internal regulations, and in the absence of the Deputy
Director and the Director, I am responsible for directing the NSA, overseeing the operaHons
undertaken to carry out its mission and, by specific charge of the President and the Director of
National Intelligence, protecting NSA activities and intelligence sources and methods. I have
12
been designated an originaJ TOP SECRET classification authority under Executive Order No.
13
14
15
12958, 60 Fed. Reg. 19825 (1995), as amended on March 25,2003, and Department of Defense
Directive No. 5200.1 -R. Information Security Program Regulation, 32 C.F .R. § l59a.l2 (2000).
16
2.
(U) The purpose of this declaration is to support an assertion of the military and
17
18
state secrets privilege (hereafter "state secrets privilege") by the Director ofNationallntelligence
19
("DNI") as the head of the intelligence comml.l.Ility, as well as the DNI's assertion of a statutory
20
privilege llllder the National Security Act, to protect infonnation related to NSA activities
2!
described herein below. Lieutenant General Keith Alexander, the Director of the National
22
23
Security Agency, has been sued in his official and individual capacity in the above captioned cas
24
and has recused himself from the decision ofwhether to assert the statutory privilege in his
25
officjaJ capacity. As the Deputy Director is currently out of the office on temporary duty, by
26
operation of our intemal regulations and by specific delegatjon of the Director, 1 am authorized t
27
review the materials associated with this litigation, prepare whatever declarations I detennine are
28
appropriate, and determine whether to assert the NSA 's statutory privilege. Through this
Cla..;s iflerl/n CnmeM. E.x Parll! Declaration of Deborah A. Bonanni, National Security Agency
Carolyn Jl!wel. et a/. v. Nallona/ SectJrlty Agency, ~~ ~'·. ~~ ~ ~W)
+OP SE(;RGTI! F~R~
declaration, 1 hereby invoke and assert the NSA 's statutory privilege set forth in Section 6 of the
2
National Security Agency Act of 1959, Public Law No. 86-36 (codified as a note to 50 U.S.C.
3
§ 402) ("NSA Act"), to protect the infonnation related to NSA activities described herein below.
The statements made herein are based on my personal knowledge ofNSA activities and
5
operations, and on infonnation made available to me as the ChiefofStaffofthe NSA.
6
II. (U) Summary
7
8
9
3.
(U) In the course of my official duties, l have been advised of this litigation and I
have reviewed the allegations in the Complaint in this case. In sum, plaintiffs allege that, after
10
the 9/11 attacks, the NSA received presidential authorization to engage io surveillance activities
II
12
far broader than the publ icly acknowledged "Terrorist Surveillance Program'' ("TSP"), which
13
involved the interception of specific international communications involving persons reasonably
14
believed to be associated with a! Qaeda and affiliated terrorist organizations. Plaintiffs allege
15
that the NSA , with the assistance of telecommunication comp anies including AT&T, has
16
indiscriminately intercepted the content and obtained the communications records of millions of
17
18
ordin ary Americans as part of an alleged presidentially-authorized "Program" after 9/11. See
19
Complaint at~ 2-13; 39-97. l cannot disclose on the public record the nature of ar~y NSA
20
information implicated by the p)aintiffs' allegations. However, as described further below, the
~I
disclosure of information related to the NSA 's activities, sources and methods implicated by the
22
plaintiffs' allegations reasonably could be expected to cause exceptionally grave damage to the
23
24
national security of the United States and, for this reason, are encompassed by the DNI's state
2.S
secrets and statutory privilege asSertions,
26
privilege, and should be protected from disclosure io this case. In addition, it js my judgment
as well as by my assertion of U1e NSA statutory
27
that sensit ive state secrets are so central to the subject matter of the litigation that any attempt to
28
proceed in the case risks the disclosure of the classi fied privileged national securi ty information
Cla5sified In Camero. Ex Parle Declaration of .Deborah A Bonanni, National So:rurity Agency
· RW)
TOP &~ET/ffSfWS+.
tGRCONINGFGR-N
Carolyn Jewel. et a/. v. National Security Agency, et a/. (No.-
'J'OP SE€-ORC-eNfN.G.f:@R:.N
described herein and exceptionally grave damage to the national security of the United States.
2
4.
(TSI!FSPHSI/IOCINF) The allegations in th.is lawsuit put at issue the disclosure
3
of info.nnation concerning several highly classified and critically important NSA intelligence
4
activities that commenced after th~ 9/J I terrorist attacks, but which are now conducted pursuant
to authority of the Foreign lntelligence Surveillance Act ("FISA"), including ongoing activities
6
7
conducted under orders approved by the Foreign Intelligence Surveillance Court ("FISC").
8
Plaintiffs' allegation that the NSA undertakes indiscriminate surveillance of the content 1 of
9
millions of communications sent or received by people inside the United States---under the now
10
defunct-TSP or otherwise---is false, as discussed below. The NSA's collection of the content of
1l
communications under the TSP was directed at international communications in which a
12
13
participant was reasonably believed to be associated with al Qaeda or an affiliated organization
14
and did not constitute the kind of dragnet collection of the content of millions of Americans'
IS
telephone or Internet communications that the plaintiffs allege. Although the existence of the
16
TSP has been acknowledged, the details of that program remain highly classified, along with
17
18
details of related content surveillance activities undertaken after the TSP pursuant to orders of
19
the FISC. This information could not be disclosed to address or disprove or otherwise litigate
20
the plaintiffs' allegation of a content dragnet without causing exceptional harm to NSA 's sources
21
and methods of gathering intelligence---including methods currently used to detect and prevent
22
further terrorist attacks under the authority of the FISA.
23
5.
24
(TS/rfSIV/SII/OCINFt Jn addition, as the Court should also be aware from prior
25
classified declarations submirted by the NSA in related proceedings, the NSA has collected,
26
pursuant to presidentiaJ authorization and currently under subsequent FISC orders, non-content
27
28
1
(fS/1811/0CfNF) The term "content" is used herein to refer to the substance, meaning,
or purport of a communication, as defined in 18 U.S.C. § 2510(8), as opposed to the type of
addressing or routing info.nnation referred throughout this declaration as "meta data."
Cla~ificd
In Camera. Ex Parte Declaration of Deborah A. Bonanni. No.tional Securiry Agency
Carolyn Jewel. e1 al. Y. Naliomll SecurUy Agency. et at. (No.~RW)
TOP SECRE~-/BRGGN+NGffiR..N
information (i.e., meta data) about telephone
2
highly sophisticated analytical tools that can uncover the cootacts
3
members or agents o
4
As noted above and detailed
below, the content surveillance subject to presidential authorization after 9/ll was not the
5
content dragnet surveillance that plaintiffs allege, and the co1lection of .non-content information,
6
7
while significant in scope remains a highly classified matter currently under FISA authorization.
8
For the NSA to attempt to explain, clarify, disprove, or otherwise litigate plaintiffs' allegations
9
regarding a communications dragnet would require the NSA to confirm the existence of, or
10
disclose facts concerning, intelligence sources and methods for the co11ection of non-content
ll
12
13
14
15
information related to communications, as well as current NSA operations under FISC Orders--disclosures that would cause exceptional harm to national security.
6.
telecommunications carriers, in particular AT&T, assisted the NSA in alleged intelligence
16
activities cannot be confirmed or denied without risking exceptionally grave harm to national
17
18
19
security. Because the NSA has not undertaken the alleged dragnet collection of communications
content, no carrier has assisted in that alleged activity.
20
21
22
23
24
25
26
27
Cln.ssilicd In Camera, Ex Parte Oeolaralion of Dcbomh A. Bonanni, National Security Agency
Carolyn Jew€1, el al. v. National Security Aseney, eta/. (N
VRW)
+OP SEGRET,. ·.,~~l:-0¥-llRrl--
2
3
4
5
would cause exceptionaJly grave damage to the
7
8
9
10
national security.
7.
statutory privilege assertions, and my own statutory privilege assertion, seek to protect against
the disclosure of the highly classified intelligence sources and methods put at issue in this case
II
and vital to the national security of the United States, including: (1) any information that would
12
13
tend to con finn or deny whether particular individuals, including the named plaintiffs, have been
14
subject to the alleged NSA intelligence activities; {2) information concerning NSA intelligence
IS
sources and methods, including facts demonstrating that the content collection under the TSP
16
was limited to specific al Qaeda and associated terrorist-related international communications
[7
18
and was not a content surveillance dragnet as plaintiffs allege; (3) facts that would tend to
19
confirm or deny the existence of the NSA's bulk meta data coUection and use, and any
20
information about those activities; and (4) the fact that
21
TI1e fact that there has been public speculation
22
about alleged NSA activities does not diminish the need to protect intelligence sources and
23
24
methods from further expoS'Ure. Official confirmation and disclosure of the classified privileged
25
national security information described herein would cause exceptionally grave damage to the
26
national security. for these reasons, as set forth further below, 1 request that the Court uphold
27
the state secrets and statutory privilege assertions that the DNI and I now make, and protect the
28
information describtXJ in this declaration from disclosure.
Classified Jn Camera, Ex Parte Declaration of Deborah A Bona~~oi, National Security Agency
Caroly11Jewel, eta!. v. NationaiSecuriryAgency, eta/. (No.
q::efLS-Eb-t+l~.l-1-h-t'-fft.rt-
-YRW)
::r..gp &EC'RET/f f S P / / S I - Y N e m
III. {U) Classification of Declaration
2
8.
3
4
-tSf/81:1/NFt This declaration is classified TOP SECRET/ITSP//SI-ECI
CON/NOFORN pursuant to the standards in Executive Order No. I 2958, as amended
by Executive Order No. 13292. Under Executive Order No. 12958, information is classified
5
"TOP SECRET" if unauthorized disclosure of the information reasonably could be expected to
6
7
cause exceptionally grave damage to the national security ofthe United States; "SECRET" if
8
unauthorized disclosure of the information reasonably could be expected to cause serious
9
damage to national security; and "CONFIDENTIAL" if unauthorized disclosure of the
10
information reasonably could be expected to cause identifiable damage to national security. At
11
1'2
the beginning of each paragraph of this declaration, the letter or letters in parentheses
13
designate(s) the degree of classification of the information the paragraph contains. When used
[4
for this purpose, the letters ''U," "C," "S," and "TS" indicate respectively that the information is
15
either UNCLASSIFIED, or is classified CONFIDENTIAL, SECRET, or TOP SECRE~.
16
9.
(SN81HNF} Additionally, this declaration also contains Sensitive Compartmented
17
18
Infonnation (SCI), which is "information that not only is classified for natjonal security reasons
\9
as Top Secret, Secret, or Confidential, but aJso is subject to special access and handling
20
requirements because it involves or derives from particularly sensitive intelligence sources and
21
methods." 28 C.F.R. § 17.18(a). Because of the exceptional sensitivity and vulnerability of such
22
infonnation, these safeguards and access requirements exceed the access standards that are
23
24
25
26
27
28
Clas.llif..,.J In Camera, Ex Parte Dccluration of Dclx>rah A BQnanni, National Security Agency
Corol)m JI!WCI, eta/. v. Nal•onal ~urity Aseney, cl a!. (No...,RW}
+OP £bGR6TiffSPUSI
/ORCO~VNGFORN
TOP SECRETNTSP//SI ,lQRCON/NOFORN
normally required for infonnation of the sam~tion level. Specifically, this declaration
2
references communications intelligence (COMfNT), also referred to as special intelligence (Sl),
3
which is a subcategory of SCI. COM TNT or SI identifies SCI that was derived from ex.pJoiting
4
cryptographic systems or other protected sources by applying methods or techniques, or from
5
intercepted foreign communications.
6
7
l 0.
&
related to or derived from the Terrorist Surveillance Program (TSP), a controlled access signals
9
intelligence program under presidential authorization in response to the attacks of September 11,
10
2001. Although TSP was publicly acknowledged by then-President Bush in December 2005,
II
12
details about the program remain highly classified and strictly compartmented. Jnfonnation
13
pertaining to this program is denoted with the special marking "TSP" and requires more
14
restrictive handling.
15
16
17
18
19
20
21
22
It.
-{SHSIHNF) In addition to the fact that classified infonnation contained herein
23
24
may not be revealed to any person without authorization pursuant"to Executive Order 12958, as
25
amended, this declaration contains information that may not be released to foreign governments,
26
foreign nationals, or non-U.S. citizens without pennission of the originator and in accordance
27
28
Classified in Camera, Ex Pane Declaration of Oebo~ A. Bonanni, National Security Agency
Carolyn Jewel. et al. v. NatioTUtl Security Agency, ~~ at. (No.. . . .RW)
+OP 8EGRET//T&P//SJ
/GRCONlNOFORN
TOP--8ECRET/A'SPI/SI /ORGON/Jl.JOFOR-N
with DNI policy. This jnformation is labeled "NOFORN." The "ORCON" designator means
2
that the originator of the iofonnation controls to whom jt is released.
IV. {U) Background Information
J
4
A.
(U) The NationaJ Security Agency
5
12.
(U) The NSA was established by Presidential Directive in 1952 as a separately
6
7
organized agency within the Department of Defense. The NSA's foreign intelligence mission
8
includes the responsibility to collect, process, analyze, produce, and disseminate signals
9
intelligence (SIGINT) information, of which communications intell igence ("~OMINT") is a
10
significant subset, for (a) national foreign intelligence purposes, (b) counterintelligence purposes
11
and (c) the support ofmilitary operations. See Executive Order 12333, § 1.7(c), as amended.
5
12
13
14
15
13.
ffSNSI) Signals intelligence (SIGINT) cons1sts of three subcategories:
(1) communications intelligence (CO MINT)~ (2) electronic intelligence (ELINT); and (3) foreign
instrumentation signals intelligence (FISINT). Communications intelligence (COMTNT) is
16
defined as "all procedures and methods used in the interception of communications and the
17
18
obtaining of infonnation from such communications by other than the intended recipients." 18
19
U.S.C. § 798. COMINT includes information derived from the interception of foreign and
20
international communications, such as voice, facsimi le, and computer-to-computer information
21
conveyed via a number of means
22
Electronic intelligence (ELINT) is technical intelligence information derived from
2.3
24
foreign non-communications electromagnetic radiations except atomic detonation or radioactive
25
sources-in essence, radar systems affiliated with military weapons platforms (e.g., anti-ship) and
26
civilian systems (e.g., shipboard and air traffic control radars). Foreign instrumentation signals
27
28
5
(U) Section 1.7(c) ofE.O. J 2333, as amended, specifically authorizes the NSA to
"Collect (including through clandestine means), process, analyze, produce, and disseminate
signals intelligence information for foreign intelligence and counterintelligence purposes to
support national and departmental missions."
Classilicd In Camera, Ex P(lrte Declaration of Deborah A. Bonanni. National Security Agency
Carolyn Jewel. er ol. v Narionn/ Securiry Agency. eta/. (N
VRW)
intelligence (FlSfNT) is derived from non-U.S. aerospace surfaces and subsurface systems whic
2
3
4
may have either military or civilian applications.
14.
(SHSI/fN ~
The NSA 's SJGINT responsihilities jnclude establishing and
operating an effective unified organization to conduct SIGINT activities set forth in Executive
5
Order No. 123 33, § l.l2(b), as amended. In performing its S1GTNT mission, NSA has
6
7
developed a sophisticated worldwide SIGINT collection network that acquires, among other
8
things , foreign and international electroni c communications and related information. The
9
technological infrastructure that supports the NSA ' s foreign intelligence information collection
10
network has taken years to develop at a cost of bitlions of dollars and untold human effort. It
JI
12
13
14
15
relies on sophisticated collection and processing technology.
15.
(U) There are two primary reasons for gathering and analyzing foreign
intelligence information. The first, and most important, is to gain infonnation required to direct
U.S. resources as necessary to counter external tlueats and in support of military operations. The
16
second reason is to obtain information necessary to the formulation ofU.S. foreign policy.
17
18
Foreign intelligence information provided by the NSA is thus relevant to a wide range of
19
important issues, including military order of battle; threat warnings and readiness; arms
20
proliferation; international terrorism; counter-intelligence; and foreign aspects of international
21
narcoti<.:S trafficking.
22
16.
1SNSIIINF} The NSA 's ability to produce foreign intelligence information
23
24
depends on its access to foreign and international electronic communications. Foreign
25
intelligence produced by COMINT activities is an extremely important part of the overall forei
26
inteJligence information available to the United States and is often unobtainable by other means.
27
Public disclosure of either the capability to collect specific commtmications or the substance of
28
the information derived from such collection itself can easily alert targets to the vulnerabi lity of
Classified In Camera. £x Parte Dech~rntion ofDebornh A. Bonanni. National Security Agency
Carolyn Jew<:/. ef at. v. Na11onal Securl(v Agency eta/. (No ~RW)
+GP-&EG~TI/TSP//8-1- -teR-GQN+NOFOR N
I)
TOP
SECR&~.'ORGONfll.IOFORN
their communications. Disclosure of even a single communication holds the potential of
2
revealing intell\gence collection techniques that are applied against targets around the world.
3
Once alected, targets can frustrate CO MINT collection by using different or new encryption
4
techniques, by disseminating disinformation, or by utilizing a different communications link.
Such evasion techniques may inhibit access to the target's communications and therefore deny
6
7
the United States access to information crucial to the defense of the United States both at home
8
and abroad. COMINT is provided special statutory protection under 18 U.S.C. § 798, which
9
makes it a crime to knowingly disclose to an unauthori?.ed person classified information
10
"concerning the communication intelligence activities of the United States or any foreign
II
government."
12
13
14
15
B.
(U) September 11, 2001 and the al Qaeda Threat.
17.
(U) On September 11, 200l , the a1 Qaeda terrorist network launched a set of
coordjnated attacks along the East Coast of the United States. Four commercial jetliners, each
16
carefully selected to be fully loaded with fuel for a transcontinental flight, were hijacked by al
17
18
Qacda operatives. Those operatives targeted the Nation's financial center in New York with two
19
of the jetliners, which they deliberately flew into the Twin Towers of the World Trade Center.
20
AI Qaeda targeted the headquarters of the Nation's Armed Forces, the Pentagon, with the third
21
jetliner. AI Qaeda operatives were apparently headed toward Washington, D.C. with the fourth
22
jetliner when passengers struggled with the hijackers and the plane crashed in Shanksville,
23
24
Pennsylvania. The intended target of this fourth jetliner was most evidently the White House or
25
the Capitol, strongly suggesting that al Qaeda's jntended mission was to strike a decapitation
26
blow to the Government of the United States- to kill the President, the Vice President, or
27
Members of Congress. The attacks of September 1I resulted in approximately 3,000 deaths-
28
the highest single-day death toll from hostile foreign attacks in the Nation's history. In addition,
CIO$Si fic:d In Cameru, Ex Porte De<:laration of Dliborah A. Bonanni, National Security Agency
Cffrnlyn Jewel, ~I a/. "· Nalional Securily Agency,
1:1
a/. (N
·YRW)
these attacks shut down air travel in the United States, disrupted the Nation' s financial markets
2
and government operations, and caused billions of dollars of damage to the economy.
3
18.
(U) On St:ptember 14, 200 I, a national emergency was declared ''by reason of the
terrorist attacks at the World Trade Center, New York, New York, and the Pentagon, and the
5
continuing and immediate threat of further attacks on the United States." Presidential
6
7
Proclamation No. 7463, 66 Fed. Reg. 48199 (Sept. 14, 2001). The United States also
immediately began plans for a mil itary response directed at al Qaeda's training grounds and
9
\0
havens in Afghanistan. On September 14, 200 I, both Houses of Congress passed a Joint
Resolut ion authorizing the President of the United States "to use all necessary and appropriate
ll
force against those nations, organizations, or persons he determines plarmed, authorized,
12
13
committed, or aided the tenorist attacks'' of September 11. Authorization for Use of Military
14
Force, Pub. L. No. I 07-40 § 21 (a), 115 Stat. 224, 224 (Sept. 18, 200 I) ("Cong. Auth.").
15
Congress also ex.pressty acknowledged that the attacks rendered it "necessary and appropriate"
16
for the United States to exercise jts right "to protect United States citizens both at bome and
17
18
abroad," and acknowledged in particular that "the President has authority under the Constitution
19
to take action to deter and prevent acts of international terrorism against the United States." !d.
20
pmbl.
21
19.
(U) Also after the 9/11 attacks, a Military Order was issued stating that the attacks
22
of September II "created a state of anned conflict," see Military Order by the President § 1(a),
23
24
66 Fed. Reg. 57833, 57833 (Nov. 13, 2001), and that al Qaeda terrorists "possess both the
2S
capability and the intention to undertake further terrorist attacks against the United States that, if
26
not detected and prevented, will cause mass deaths, mass injuries, and massive destruction of
27
pt'operty, and may place at risk the continuity of the operations of the United States
28
Govenunent," and concluding that "an extraordinary emergency exists for national defense
CIMI'Iifivd In Camera.
ex rarre [)(:x;lanuion of Debornh A. Bonanni. National Security Agency
Care~lyn Jewel, et al. v. National Security Agency, ct ~~. ~~·~ R~ ___ . •
TOP SCGRBT/ffS -NQ.JiGl~N
purposes." Military Order,§ l(c), (g), 66
. Reg. at 57833-34. Indeed, shortly after the
2
attacks, on October 2, 200 l, NATO took the unprecedented step of invoking Article 5 of the
3
North At lantic Treaty, which provides that an "anned attack against one or more of [the parties]
4
shall be considered an attack against them all." North Atlantic Treaty, Apr. 4, 1949, art. 5, 63
5
Stat. 2241,2244, 34 U.N.T.S. 243,246.
6
7
20.
(U) As a result of the unprecedented attacks of September II, 2001, the United
8
States found itself immediately propelled into a worldwide war against a network of terrorist
9
groups, centered on and affiliated with al Qaeda, that possesses the evolving capability and
10
intention of inflicting further catastrophic attacks on the United States. That war is continuing
II
12
today, at home as well as abroad. Moreover, the war against a\ Qaeda and its allies is a different
13
kind of war, against a very different enemy, than any other war or enemy the Nation has
14
previously faced. AI Qaeda and its supporters operate not as a traditional nation-state but as a
15
diffuse, decentralized global network of individuals, cells, and loosely associated, often dis
16
groups, that act sometimes in concert, sometimes independentl y, and sometimes in the United
17
18
States, but always in secret-and their mission is to destroy lives and to disrupt a way of life
19
through terrorist acts. AJ Qaeda works in the shadows; secrecy is essential to a1 Qaeda's success
20
in plotting and executing its terrorist attacks.
21
21.
~The
Classified In Camera, Ex Parte Declaration of Admiral Dennis
22
C. Blair, Director of National Intelligence, details the particular facets of the continuing aJ Qaeda
23
24
threat and, thus, the exigent need for the NSA intelligence activities described here. The NSA
25
26
27
28
Global telecommunications networks, especially the Internet, have
Classtfioo /11 Comero . fix Parte Dedal1ltion nf Debornh A. Boo aMi. National Security Agency
Carolyu Jewel. et al. v. National Secunty t1 gency. eta/. (No~ ~!'] _
~<;;EC RET/(f'SP//SI ~8N/NOF OKN
developed in recent years into a loosely interconnected system-a network of networks-that is
2
ideally suited for the secret communications needs of loosely affiliated terrorist cells. HWldreds
3
of Internet service providers, or "ISPs," and other providers of communications services offer a
4
wide variety of global communications options, often free of charge.
5
6
7
8
9
10
11
12
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Classified /n Camera, Ex Pa,te Declaration of Deborah A. Bonanni. National Security Agency
Carotyu Jewel. er at. v Nactonflf Secvrify Agency. eta(.
TOP SECRE1,
-VRW)
23.
2
3
4
fFSIISJHOCfNF) Our efforts against al Qaeda and its affiliates therefore present
critical challenges for the Nation's communications intelligence capabilities. First, in this new
kind of war, more than in any other we have ever faced, communications intelligence is essential
5
to our ability to identify the enemy and to detect and disrupt its plans for further attacks on the
6
7
United States. Communications intelligence often is the only means we have to learn the
identities of particular individuals who are involved in terrorist activities and the existence of
9
10
particular terrorist threats. Second, at the same time that communications intelligence is more
important than ever, the decentralized,
non~hierarchica l
nature of the enemy and their
ll
12
sophistication in exploiting the agility of modern telecommunications make successful
13
communjcations intelligence more difficult than ever. It is against this backdrop that the risks
14
presented by this litigation should be assessed, in particular the risks of disclosing particular
15
NSA sources and methods implicated by the claims.
16
C.
(U) Summary ofNSA Activities After 9/11 to Meet al Qaeda ThreaL
17
18
24.
(=F8N811/0CINF) After the September 11 attacks, the NSA received presidential
19
authorization and direction to detect and prevent further terrorist attacks within the United States
20
by intercepting the content of telephone and Internet communications for wh ich there were
2l
reasonable grounds to believe that (1) such communications originated or tenninated outside the
22
United States and (2) a party to such communication was a member or agent of al Qaeda or an
23
24
affiliated terrorist organization. The existence of this activity was disclosed by then-President
25
Bush in December 2005 (and subsequently referred to as the "Terrorist Surveillance Program'' or
26
"TSP"). 7
27
28
7
{lJ) On January 17, 2007, the Attorney General made public the general facts that new
orders of the Foreign Intelligence Surveillance Court had been issued that authorized the
Government to target for collection international communications into or out of the United States
Cla.ssifitd In Camera. Ex Parle Declaration of Ot:borah A. Bonanni, National Security Agency
Carolyn Jewel, e1 af. v. National Securily Agency, e1 al. (N
W)
25.
+9fi-&ECR6l=N1-&P.fi~OFORN
{~In mo~and classified terms, the NSA has
2
utilized a number of critically important intel1igence sources and methods to meet the threat of
3
another mass casualty terrorist attack on the United States-methods that were designed to work
4
in tandem and continue to this day under authority of the FISC. As noted above, one such
5
method involved the program publicly acknowledged by then-President Bush as the TSP, fn
6
7
which the NSA intercepted the content of telephone and Internet communications pursuant to
8
presidential authorization.8 As described further below, under the TSP, NSA did not engage in
9
plaintiffs' alleged dragnet surveillance of communication content, but intercepted the content of
10
particular communications where reasonable grounds ex.isted to believe one party involved a
member of agent oral Qaeda or affiliated terrorist organization based on particular "selectors"
12
13
(phone numbers or Internet addresses) associated with that target. In addition to collecting the
14
content of particular communications, the NSA has also collected non-content communication
15
information known as "meta data ." Specifically, after the 9/ll attacks, the NSA collected bulk
16
meta data related to telephony communications for the purpose of conducting targeted analysis to
17
18
19
20
21
22
23
24
where there is probable cause to believe that one of the communicants is a member or agent of al
Qaeda or an associated terrorist organization; that, as a result of these orders, lillY electroruc
swveillance that had been occurring as part of the TSP was then being conducted subject to the
approval of the FISA Court; and that, under these circumstances, the TSP was not reauthorized.
8
(TSfffSPHSIIfOCINF) The first presidential authorization of the TSP was on October
4, 200 I, and the TSP was reauthorized approximately every 30-60 days throughout the existence
of the program. The documents authorizing the TSP also contained the authorizations fo(' the
meta data activities described herein. The authorizations, moreover, evolved over time, and
during certain periods authorized other activities (this declaration is not intended to and
25
26
27
28
Classified Jn Camera. £x Parte Declarotion of Deborah A. Bonanni, National Security Agency
VRW)
Carolyn Jewel, et af. v. Notional Security Agency, et of. (
Telephony meta data is infonnation derived from call detail
2
records that reflect non-content information such as, but not limited to, the date, time, and
3
duration of telephone calls, as well as the phone numbers used to place and receive the calls. In
4
9
addition, since the 9/11 attacks, the NSA has collected bulk meta data related to Internet
5
communications. Internet meta data is header/router/addressing information, such as the '<to,"
6
7
8
9
10
''from," "cc," and "bcc"lines, as opposed to the body or "re" lines, of a standard email.
26.
(TSllSINOCINF} Each of the foregoing activities continues in some form under
authority of the FISA and, thus, the NSA utilizes the same intelligence sources and methods
today to detect and prevent further terrorist attacks that it did after the 9/J 1 attacks. First, as
II
12
noted above, on January 10, 2007, the FISC issued two orders authorizing the Government to
13
conduct certain electronic surveillance that had been occuning under the TSP. The FISC Orders
14
were implemented on January 17, 2007 and, thereafter, any electronic surveillance that had been
IS
16
occurring as part of the TSP became subject to the approval of the FISC and the TSP was not
reauthorized. 10
\7
18
19
20
21
22
23
24
25
26
27
28
ffSH81HOC/NF) As also described further(~ 64-67 infra), the FISC has extended
these orders with some modifications, and the Foreign Telephone and Email Order later expired
in August 2007 and was supplanted by authority enacted by Congress first under the Protect
10
Cla:l\1ilicd In Camera, & f'arte D~IM~tcon of Dcbordh A.. Bonunni, NtUionul Security Agency
~wulyn Jcwd, el a/. v. Nallonal Securiry Agency, el a/. (No~RW)
TOP SECRETNTSPI/SI
/ORCOWNOFORN
the co llection of telephony meta data,
27.
2
since May 2006 certain telecommunication providers have been required by an order of the FISC
3
to produce to the NSA on a daily basis all telephony meta data that they create ("FISC Telephon
4
Business Records Order"). The FJSC Telephone Business Records Order has been reauthorized
5
approximately every 90 days since it was first issued. Although this collection is broad in scope,
6
7
the NSA was authorized by the FISC to query the archived telephony data with identified
8
telephone numbers for which there are facts giving rise to a reasonable, articulable suspicion that
9
the number is associated with
10
ercafter referred to
as a "RAS" determination).11 Historically, only a tiny fraction of telephony meta data records
II
12
collected by the NSA has actually been presented to a trained professional for analysis. As
discussed further below (see~~ 49-57 infra), while the vast majority of records are thus never
14
15
viewed by a human at the NSA, it is still necessary to collect the meta data in bulk in order to
utilize sophisticated and vital analytical tools for tracking the contacts
16
for protecting the national security of the United States.
17
Ill
19
20
21
22
24
25
26
27
28
America Act and then the FISA Amendments Act of 2008 to authorize foreign intelligence
surveillance of targets located overseas without indivjduaJ court orders.
11
(TS/fSIHOClNF) As set forth further below (mJ 6 1-63 infra), NSA's compliance with
this limitation in the FlSC Order has been subject to further proceedings in the FISC that
commenced with a compliance report by the government on January 15, 2009, which indicated
that the NSA had also been querying incoming telephony meta data with selectors for
counterterrorism targets subj ect to NSA surveillance under Executive Order 12333, as to which
the NSA had not made a "RAS" detennination. On Marc.h 2, 2009, the FISC renewed the Order
authorizing the bulk provision to NSA of business records containing telephony meta data from
telecommunications carrie~ut subjected that activity to new limitations,
including that the NSA may query the meta data only after a motion is granted on a case-by-case
basis (unless otherwise necessary to protect against imminent threat to human life). The FISC
also required the Government to report to the FISC on its review of revisions to the meta data
collection and analysis process, and that report shall include affidavits describing the value of the
collection of telephony meta authorized by the FISC Telephone Business Records Order.
Classified In Camera. E:x fane Declaration of Deborah A. Bonl1Jl11i, N11tiooa1 St:Gurity Agency
Carolyn kwe~ et al. Y. National Security Agency, et ai. (No. . .RW)
TOP SEGRET//TSPt/81
/ORCON/NOFORN
y 2004, the collection of Internet meta
28.
2
data jn bulk has been conducted pursuant to an order of the FISC authorizing the use of a pen
3
register and trap and trace device ("FISC Pen Register Order'' or "PRTI Order"). See 18 U.S.C.
§ 3127 (defining "pen register" and ''irap and trace device"). Pursuant to the FISC Pen Register
5
Order, which has been reauthorized approximately every 90 days since it was first issued, the
6
7
NSA is authorized to col1ect, in bulk, meta data associated with electronic communications
8
9
10
11
12
Although the NSA collects email meta data in bulk
13
14
15
it has been authorized by the FISC to query the archived meta data only using email
addresses for which there are facts giving rise to a reasonable, articulable suspicion that the emai
16
address is associated with
imilar restrictions were
17
18
in place under the presidential authorization). As with buJk telephony meta data collection, bulk
19
Internet meta data collection is necessary to allow the NSA to use critical and unique analytical
20
capabi Ii ties to track the contacts (even retrospectively)
21
known
terrorists. Like telephony meta data activities, Internet meta data collection and analysis are vital
22
23
24
25
26
27
28
Classified In Camero. Ex Po1le Declaration ~fDeborah A. Bononni, National Security Asency
Carolyn Jewel. e1 al. v. Nalfonol Security Agency. e1 ol.
RW)
:rep SECRE=f/n ~~
tools for protecting the United States from
2
accordingly, information pertaining to
those activities is highly classified. 13
3
V. (U) Information Protected by Privileg~
4
29.
(U) In general and unclassified terms, the following categories of information are
5
subject to the DNI's assertion of the state secrets privilege and statutory privilege under the
6
7
National Security Act, as well as my assertion of the NSA statutory privilege:
8
A.
Information that may tend to confirm or deny whether the
plaintiffs have been subject to any alleged NSA intelligence
activity that may be at issue in this matter; and ·
B.
Any information concerning NSA intelligence activities,
9
10
sources, or methods that may relate to or be necessary to
adjudicate plaintiffs' allegations, including allegations that
the NSA, with the assistance of telecommunications
carriers such as AT&T, indiscriminately intercepts the
content of communications and also collects the
communication records of millions of Americans as part of
an alleged presidentially authorized "Program" after 9/11.
See. e.g., Complaint at m12~ l3; 39-97.
II
12
13
14
IS
16
The scope of this assertion includes but is not limited to:
17
(i) Information concerning the scope and operation
18
of the now inoperative •'Terrorist Surveillance Progcam"
C'TSP") regarding the interception of the content of certain
one-end international communications reasonably believed
to involve a member or agent of al-Qaeda or an affiliated
terrorist organization, and any other information related to
demonstrating that the NSA does not other:wise engage in
the content surveillance dragnet that the plaintiffs allege;
and
19
20
21
22
23
(ii) Infonnation concerning whether or not the NSA
obtained from telecommurucations companies such as
24
25
26
13
27
28
(TSiffSfWSJHOCINF) As the NSA has previously advised the Court in related
proceedings, and describes further below (see note 22..J!!Jj;E), the bulk collection of Internet meta
data pursuant to presidential authorization ceased in 2004. See In Camera, Ex Parte
Classified Declaration of Lt. Gen. Keith B. Alexander at, 31 n.8, MDL No. 06- J 791-VRW
(N.D. Cal.) (relating to all actions against the MCI and Verizon. Defendants) (submitted Apr. 20,
2007).
Classified Jn Comei'"O. E.r Pam Declaration of O<:borah A. Bonanni, National Securily Aseney
Cu1olyn )1!\l'f!l. at nl v. Narionol Se~curil)> Agency, er a/. (No.
RW}
TOP SBCRET/,
AT&T communication
records as alleged in
the Complaint; see, e.g., Complaint~~ 10; 82-97; and
2
(iii) Information that may tend to confirm or deny
whether AT&T (and to the extent relevant or necessary,
any other telecommunications carrier}, has provided
assistance to the NSA in connection with any aJieged
activity.
3
4
5
6
7
VI. (U) Description of Information Subject to Privilege and
A.
th~
Harm of Disclosure
8
(U) Information That May Tend to C onfirm or Deny Whether the Plaintiffs Have
Been S ubj ect to Any Alleged NSA Activities.
9
30.
10
(U) The first major category of information as to which I am supporting the DNI'
assertion of privilege, and asserting the NSA' s own statutory privilege, concerns information as
II
12
to whether particular individuals, including the named plaintiffs in this lawsuit, have been
13
subject to aJ Jeged NSA intelligence activities. As set forth below, disclosure of such infonnation
14
would cause exceptionally grave hann to the national security.
15
16
31 .
(TS!ffSPJ.C~ I/IOC/NF)
The five named plaintiffs in this cas~Tash Hepting,
17
18
Gregory Hicks, Carolyn Jewel} Erik Knutzen and Joice Walton have alleged that, pursuant to a
19
presidentiall y authorized program after the 9/ll attacks, the NSA, with the assistance of AT&T,
20
has acquired and continues to acquire the content of phone calls, ernails, instant messages, text
21
messages, web and other communications, both international and domestic, of millions of
22
.23
ordinary Aroericans---"practically every American who uses the phone system or the Internet"---
24
including the plaintiffs, as well as private telephone and Internet transaction records of millions
25
of AT&T customers, again including information concerning the plaintiffs' telephone and
26
Internet communications. See, e.g., Complaint, 7, 9, 10; see also ,1139-97. As set forth
27
herein, the NSA does not engage in "dragnet" surveil lance of the content of communications as
28
pJainti ffs allege,
Classified In Camera. E.x Partt Declaration of Deborah A. Bonanni, National Secwity Agency
CarOlyn Jewel. eta/. v. Nmionat Security Agency. et al.
RW)
TO P 8ECREl/n
IGR~
2
2
4
s
6
7
8
9
10
II
12
13
14
15
16
17
I ll
19
20
21
22
23
24
25
26
27
Q~t!6l11
Camera. E.x Por-10 Declllrntion ofDebOT9h
A.
Bonanni. Nationo) Security Agency
Caro(vn Jewel. e1 at. v. NattoMl Security Agency. e1 a/. (No
RW}
2
2
3
4
5
(i
7
8
9
10
II
12
13
14
15
16
34.
(U) As a matter of course, the NSA cannot publicly con finn or deny whether any
17
18
19
individual is subject to surveillance activities because to do so would tend to reveal actuaJ
targets. For example, if the NSA were to confirm in this case and others tha1 specific individuals
20
21
22
23
24
25
26
27
28
preVlo
pnor
telephony meta data records was presented to an
, Ex Parte Declaration of Lieutenant General Keith
analyst for review, see
B. Alexander in Shubert, el al. v. Hush, et al .. (Case No. 07-cv-693) (dated May 25, 2007) 1 27,
and the scope of that disparity remains generally the same.
Classified In Camera. Ex Parte Deda:-ation of Deborah A. Bonanni, National Security Agency
Carolyn Jew~!. el o/. v. Nat!onal Securiry Agency. el a/. (No.~ ~] _
TOP SECRETifTS PHSr-~6NJNOFORN-
are not targets of surveillance, but later refuse to comment (as it would have to) in a case
2
involving ao actual target, an actual or potentiaJ adversary of the United States could easily
3
deduce by comparing such responses that the person in the latter case is a target. There can be
4
great harm in revealing targets of foreign intelligence surveillance. If an individual knows or
5
suspects he is a target of U.S. intelligence activities, he would naturally tend to alter his behavior
6
7
to take new precautions against surveillance. 1n addition, revealing who is not a target would
8
indicate who has avoided surveillance and reveal the limitations ofNSA's capabilities.
9
information could lead an actual or potential adversary, secure in the knowledge that he is not
10
Such
under surveillance, to convey information; alternatively, such a person may be unwittingly
II
12
utilized or even forced to convey information through a secure channel to a hostile foreign
\3
adven;ary. In short, revealing which channels are free from surveillance and which are not
14
would also reveal sensitive intelligence methods and thereby could help any adversary evade
15
detection and capitalize on limitations in NSA 's capabilities. 1l!
16
17
18
19
20
21
22
23
24
25
26
27
~
28
I
Classifi~d /rr
Camera. Ex far1e [k.c1arntion of Deborah A. 13onanm. National Security Agency
Carolyn Jewel. ct a/. v. National Securuy Agency.
c1 a/.
-VRW)
2
8
B.
(U) Jnfo.-mation Related to NSA Activities, Sources, or Methods Implicated by the
Plaintiffs' AJlegations and the Harm to National Security oflts Disclosure.
9
10
1.
(U) Plaintiffs' Allegations of a Co mmunicatioos Dragnet.
11
36.
(U) I am also supporting the DNJ's assertion of privilege and asserting the NSA 's
12
statutory privilege over any other facts concerning NSA intelligence activities, sources, or
13
methods that may relate to or be necessary to litigate the plaintiffs' claims and allegations,
14
IS
including that (i) the NSA is indiscriminately intercepting the content of communications of
16
millions of ordinary Americans, see, e.g., Complaint~ 7, 9, 10, and (ii) that the NSA is
17
collecting the private telephone and Internet transaction records of millions of AT&T customers,
18
19
again including infonnatioo concerning the plaintiffs' telephone and Intemct communications.
See e.g., Complaint mJ 7, 9, 10, 13, 82~97. As described above, the scope of the government's
20
21
privilege assertion includes but is not limited to : (I) facts concerning the operation of the now
22
inoperative Terrorist Surveillance Program and any other NSA activities needed to demonstrate
23
that the TSP was limited to the interception of the content of o n~end international
24
communications reasonably believed to involve a member or agent of al Qaeda or an affiliated
25
26
terrorist organization and that the NSA does not otherwise conduct the content surveillance
27
dragnet that the plaintiffs allege; and (2) infonnation concerning whether or not the NSA obtains
2&
transactional communication records from telecommunications companies such as AT&T as
Clnssifu~d In Ct.mcra, Ex Porte. D.:clamtion of Debora.h A. Bonanni, Natioual St:>eurhy A0oncy
Carolyn Jewel. et at.
u.
Nacionol Security Asency, et at.
W)
2
TOP Sf:CRE'fn"f3f /13J-! ! ! I !'ORC0tq/NQFORN
plaintiff'S allege. As set forth below, the disclosure o such in formation would cause
2
exceptionally grave hann to national security.
3
4
(a) (U) Information Related to the Terrorist Surveillance Program.
37.
(U) After the ex istence of the TSP was officially acknowledged in December
5
2005, tbe Government stated that the NSA's coJlecLion of the content of communications under
7
the TSP was directed at international communications in which a participant was reasonably
8
believed to be associated withal Qaeda or an affili ated organization. Plaintiffs' allegation that
9
the NSA has undertaken indiscriminate surveillance of the content of millions of
10
communications sent or received by people inside the United States after 9111 under the TSP is
II
12
therefore false, again as the Government has previously stated.19 But to the extent the NSA must
13
demonstrate that content swveillance under the TSP was so limited, and was not plaintiffs'
14
alleged content dragnet, or demonstrate that the· NSA has not otherwise engaged in the alleged
15
content dragnet, highly classified NSA intelligence sources and methods about the operation of
16
the TSP and NSA intelligence activities would be subject to disclosure or the risk of disclosure.
!7
18
The disclosure of whether and to what ex.tent the NSA utilizes certain intelligence sources and
19
methods would reveal to foreign adversaries the NSA's capabilities, or lack thereof, enabli.n g
20
them to either evade particular channels of communications that are being monitored, or exploit
21
channels of communications that are not subject to NSA activities---in either case risk-ing
22
exceptionally grave harm to national security.
23
24
25
26
27
38.
(U) The privileged information that must be protected from disclosure includes
the followi ng classified details co.ncem)ng content surveillance under the now inoperative TSP .
39.
(TSHTSPHSIHOCINF) First, interception of the content of communications
under lhe TSP was triggered by a r8Jlge of information, including sensitive foreign intelligence,
28
19
See, e.g., Public Declaration ofNSA Director Alexander in the Shubert action (07 -cv-
693-YRW) at~ 16.
Classtfiod In Camero, E.x Parte Dc<:laration of Dcbor<ih A. Bonnt~ni, National Security Agency
Carolyn JtW61. t!l ol. v. Nolionol ~<."1,,..;'>' Agency, e/ al. (No.~ RW)
TOP ScCR:ET/fl'Sf'l/91·
IOHCONINOFOR-N-
2
obtained or derived from various sources indicating that a particular phone number or email
2
address is reasonably believed by the U.S. intelligence Community to be associated with a
3
member or agent of aJ Qaeda or an affiliated terrorist organization. Professional intelligence
4
officers at the NSA undertook a careful but expeditious analysis of that information, and
5
considered a number of possible factors, in determining whether it would be appropriate to target
6
7
a telephone number or email address under the TSP. Those factors included whether the target
8
phone number or email address was: (1) reasonably believed by the U.S. Intelligence
9
Community, based on other authorized collection activities or other law enforcement or
10
intelligence sources, to be used by a member or agent of a1 Qaeda or an affiliated terrorist
II
12
I3
14
IS
16
17
18
19
20
21
22
23
24
25
26
27
28
C{as_qified In Crmw•o. £x P!frfe Occlaratioo of Debo~ A. Bonanni, National Security Agency
c.;nrolyn Jewel. e( of. v. Naliorraf Security Agl!ncy. e1 of. ~~o.~RW)
m:J2....~*-!-I·FF&P..f.i~~GFGR-N
40.
2
grounds to believe that the target is a member or agent of al Qaeda or an affiliated terrorist
3
organization, the NSA took steps to focus the interception on the specific a! Qaeda-related target
"
and on communications of that target that were to or from a foreign country. In this respect , the
5
NSA's collection efforts were
the NSA had
6
7
reasonable grounds to believe carry th:e "one-end" foreign communicat1ons of members or agents
8
of al Qaeda or affiliated terrorist organizations.
9
41.
10
II
12
13
14
15
16
17
18
19
20
21
22
2J
24
25
26
27
28
C la•sifoed In Camern, £.-.Park Oeclt~rntion ofOclx>rnh A. BoMnni, National Security Ag<!ncy
CMofyn Jf!we/. era f. v. Narwlllll Security Agency. er at. (No
73-VRW)
2
3
4
5
43.
fFSfffSPHSIHOCINF) The NSA took specific steps in the actual TSP
6
7
interception process to minimize the risk that the communications of non-targets were
8
intercepted. With respect to telephone commtmications, specific telephone numbers identified
9
through the analysis outlined above were
10
that the only communications
ll
12
13
14
15
intercepted were those to or from the targeted number of an individual who was reasonably
believed to be a member or agent of a\ Qaeda or an affiliated terrorist organization.
44.
(TS/rTSPNSlNOC/NF) For the interception of the content of Internet
communications under the TSP, the NSA used identifying information obtained through its
16
analy::;is of the target, such as email addresses
target for collection the
17
18
19
communications of individuals reasonably believed to be members or agents of al Qaeda or an
affiliated terrorist organization.
20
21
22
23
24
25
26
27
28
CI<IS5ified In Camera. Ex Parle Declaration of Deborah A. Bonanni, National Security Agency
Carolyn Jewel, el a/. v. Nalional Security Agency. eJ al. (No. - : R W )
TOP SECREl'fiT&PHSI
'/ORCONINOFORt>J
2
3
4
h "key words" other than the targeted selectors
5
themselves. Rather, the NSA targeted for collection only email addresses
6
ated with suspected members or agents of aJ Qaeda or affiliated terrorist
7
mentioned ln
8
organizations, or communications in which such
9
addition, due to technical limitations of the hardware and software, incidental collection of non-
10
target communications has occurred, and in such circumstances the NSA applies its
II
]2
minimization procedures to ensure that communications of non-targets are not disseminated. To
the extent such facts would be necessary to dispel plaintiffs' erroneous content dragnet
14
IS
allegatjons, they could not be disclosed without reveaJing highly sensitive intelligence methods.
45.
(TSfFfSPHSIHOCINF) In addition to procedures designed to ensure that the TSP
16
was limited to the international communications of al Qaeda members and affiliates, the NSA
17
18
also took additional steps to ensure that the privacy rights of U.S. persons were protected. •
19
20
21
22
23
24
25
26
27
28
Clnss1ficd In Came~o. F..r Pan11 Oecl!muion of Deborah A. Bonanni, NatiOnal Securiry Agency
Ca rofyfl Jewel. ei of. v. .'VatiOfla( Secunry Age11cy. ec at. (No.~RW)
TOP SECRETNTSPffSI-
/ORCON/NOfORN ..
3
2
3
4
5
6
7
8
9
10
\l
12
13
14
15
16
17
18
foregoing information about the targeted scope of content collection under the TSP could not be
19
disclosed, in order to address and rebut plaintiffs' allegation that the NSA, with the assistance of
20
AT&T, engaged in the alleged content dragnet, without revealing specific NSA sources and
2l
methods and thereby causing exceptionally grave damage to the national security.
22
23
24
25
26
27
28
22
(UI'FOUO) In addition, in implementing the TSP, the NSA applied the existing Legal
Compliance and Minimization Procedures applicable to U.S. persons to the extent not
inconsistent with the presidential authorization. See United States Signals Intelligeoce Directive
(USS ID) l8. These procedures require that the NSA refrain from intentionally acquiring the
communications ofU.S. persons who are not the targets of its surveillance activities, that it
destroy upon recognition any communications solely between or among persons in the U.S. that
it inadvertently acquires, and that it refrai.n from identifying U.S. persons in its intelligence
reports w1less a senior NSA official determines that the recipient of the report requires such
information in order to perform a lawful function assigned to it and the identity of the U.S.
person is necessary to understand the foreign intelligence or to assess its significance.
Classif1ed In Camera. Ex Parte Declaration of Deborah A. Bononoi, National Security Agency
Carolyn Jewel. e1 a/. v, National Security Agency. eta/. (No .•
TOP 8ECR FfJ.q SPI/SI
VRW)
90RCON/NOFORN
3
47.
2
NSA intelligence activities would be needed to address or prove that the NSA does not conduct
3
4
5
6
7
8
9
IO
ln short, there is no other ''dragnet" program authorized by the President after 9/11
II
12
under which the NSA intercepts the content of virtually all domestic and international
!3
communications as the plaintiffs allege. Again, however, information about NSA content
14
surveillance activities beyond the TSP could not be disclosed in order to address and rebut
IS
]6
plaintiffs' allegation without revealing specific NSA sources and methods and thereby causing
exceptionally grave damage to national security.23
17
(b) (U) Plaintiffs' Allegations Concerning the Collection of Communication
Records.
18
19
48. (U) As noted above, plaintiffs also allege that the NSA is collecting the private
20
21
22
telephone and Internet transaction records of millions of AT&T customers, again including
information concerrung the plaintiffs' telephone and Internet communications. See. e.g.,
23
23
24
25
26
27
28
(f&ITSPHSIHOCINF) To the extent relevant to this case, additional facts about the
operational details of the TSP and subsequent FlSA authorized content surveillance activities
also could not be disclosed without exceptional harm to national security, including for example
infonnation that would demonstrate the operational swiftness and effectiveness ofutilizi
·unction with the meta data activities. As noted
content surveillance in
TSP, in conjunction with meta
collection and analysis described herein, allowed the NSA to obtain rapidly not only the content
of a particular communication, but connections between that target and others who may fonn a
web of al Qaeda conspirators.
Classified In Camera, & Pane Declaration of Deborah A. Bonanni, National Security Agency
CCJrolyn J~el, el a/. v. National Secunty Agency. et a/.
W)
1'0P SECRFf,'·"''Q-D-1~
Complaint mJ7, 9, 10, 13, 82-97. ConfirmatiOn or denial of any information concerning whether
2
the NSA collects communication records would also disclose information about whether or not
3
the NSA utilizes particular intelligence sources and methods and, thus, the NSA's capabilities or
4
lack thereof, and would cause exceptionally grave hann to national security.
5
49.
7
(TSNS(J/OCfNF) ln addition to implicating the NSA's content collection
activities authorized after the 9/ll attacks, the plaintiffs' allegations also put directly at issue the
R
NSA 's bulk collection of non-content communication meta data. As explained above, the NSA
9
has not engaged in the alleged dragnet of communication content, and,
as now explained below,
10
to address plaintiffs' allegations concerning the bulk collection of non-content information
II
would require disclosure ofNSA sources and methods that would cause exceptional harm to
12
national security. As also explained herein, these meta data collection activities are now subject
14
15
to the orders and supervision of the FISC.
50.
16
2004 pursuant to the FISC Pen Register Order, the NSA co11ectcd bulk meta data associated with
17
18
electronic communications
19
20
21
22
23
24
25
26
27
28
Classified /n Camera, Ex Partr: Dedaration of Deborah A. Bonanni, National Securily Agency
U.rolyn Jewel. et a/. v. Natianol Sea1rity Agency. eJ at.
RW)
TOP SEE'RETiff"SP
TOP SEER ET/.'-P'rt¥J~
-pursuant to the FISC Telephone Records
~1-ttH.P..''~~·G FORN-
, certain telecommunication companies
2
provide the NSA with bulk telephony meta data in the fonn of call detail records derived from
3
information kept by those companies in the ordinary course ofbusiness. See V'IJ25, 27, supra.
4
51.
ff&HSIHOCINF} The bulk meta data collection activities that have been
5
undertaken by the NSA since 9/ll are vital tools for protecting the United States from another
6
7
catastrophic terrorist attack. Djsclosure of these meta data activities, sources, or methods would
8
cause exceptionally grave hann to national security. It is not possible to target collection solely
9
on known terrorist telephone identifiers and effectively discover the existence, location, and
10
plans of terrorist adversaries.
II
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Classified In Camera, Ex Parte Declaration of Deborah A. Bonanni, National S~rity Agency
Carolyn Jewel. ct at. v. NallOnol Security Agency. et a/. (No. 08-cv-4873- V RW)
TOP SECRET/ffSPI/SJ ~ORCON/NOFORN
3
to keep track of such operatives is through meta data collection and analysis.
4
5
t'fSttSfi Technical Details of Analytic Capabilities
6
7
52.
ffSHSIHOC/NfJ In particular, the bulk collection of Internet and telephony
8
9
10
ll
12
Contact-chaining allows the NSA to identify telephone numbers and email addresses
13
that have been in contact with kno
14
contacts can be targeted for immediate query and analysis as
15
and addresses; in tum, those
and addresses are identified. When the NSA performs a contact-chaining query on a terrorist-
16
associated telephone identifier
17
18
19
20
21
22
23
25
26
27
2R
Classified In Camera. £.x Par~ Occlaration of Deborah A. Bonanni, National Security Agency
C<1rolyt1 Jewel. e1 ol. v. NaJional Security Agency. et aL (No. 08
-VRW)
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
18
19
20
21
22
23
24
25
26
27
55.
ff'Sf~Because it is impossible to detennine in advance
which particular piece of meta data will turn out to identify a terrorist, collecting meta data in
bulk is vital for the success of contact-chaining
NSA analysts know that
t
28
terrorists' telephone calls are located somewhere in the billions of data bits; what they cannot
Classified In Carrn:ra. £x Porte Decl3.01tion of Deborah A. Bonanni, National Securily Agency
Carol.vn Jewel. et al. v. NaUonal Secunry Age~~cy. eta/.
W}
3
know ahead of time is exactly where. The ability to accumulate meta data substantially (nr.r'P.A '~"'-~1
2
NSA 's ability to detect and identify these targets. One particular advantage ofbulk meta data
3
collection is that it provides a historical perspective on past contact activity that cannot be
4
captured in the present or prospectively. Such historical links may be vital to identifying new
5
targets, because the meta data may contain links that are absolutely unique, pointing to potential
7
targets that otherwise would be missed.
8
9
10
II
These sources and methods enable the NSA to segregate some of that very
12
13
small amount of otherwise undetectable but highly valuable infotlllation from the overwhelm1ng
14
amount of other infonnation that has no intelligence value whatsoever-in colloquial tenns, to
15
find at least some of the needles hidden in the haystack. If employed on a sufficient volume of
16
\7
18
19
20
21
22
56.
ffS//-81/INF) The foregoing discussion is not hypothetical. ~noted previously,
23
24
since inception of the first FrSC Telephone Business Records Order, NSA has provided 275
25
reports to the FBI. These reports have provided a total of 2,549 telephone identifiers as being in
26
contact w1th identifiers associated with
27
28
Classified In Camera. £x Pane Declt11111ion of Deborah A. Bonanni. National Security Agency
Carolyn Jewel. et al. v. Nauonal Security Agency. et a/.
W)
3
TOP SECRETbTSf'HSI -
'/ORCON/NOfORN-
2
)
4
57.
(TS#Sli/OC.tNFt Accordingly, adjudication of plaintiffs' allegations concerning
5
the collection of non-content meta data and records about communication transactions would ris
b
co ntacts of
7
or require disclosure of critical NSA sources and methods for
8
terrorist communications as well as the existence of current NSA activities under FISC Orders.
9
Despite media speculation about these activities, official confirmation and disclosure of the
10
NSA 's bulk collection and targeted analysis of telephony meta data would confum to aU of our
II
12
foreign adversaries
existence of these critical intelligence
13
capabilities and thereby severely undermine NSA 's ability to gather infonnation concerning
14
terrorist connections and cause exceptional harm to oational security.
15
2.
(TS.l/SIJ/OCJNF) Information Concerning Current FISA Authorized
Acdvities and Specific FISC Orden.
58.
(TSIJTSPt/SIIIOC/INF) I am also supporting the DNI's state secrets privilege
16
17
18
assertion, and asserting NSA's statutory privilege, over infonnation concerning the various
19
orders of the Foreign intelligence Surveillance Court mentioned throughout this declaration that
20
21
authorize NSA intelligence collection activities, as well as NSA surveillance activities conducted
22
pursuant to the Protect America Act ("PAA'') and current activities authorized by the FISA
23
Amendments Act of 2008. As noted herein, the three NSA intelligence activities initiated after
24
the September 11 attacks to detect and prevent a further al Qaeda attack-(i) content collection
2S
26
of targeted al Qaeda and associated terrorist-related communications under what later was called
27
the TSP; (ii) internet meta data bulk collection; and (iii) telephony meta data bulk collection-
28
have been subj ect to various orders of the FISC (as well as FISA statutory authority) and are no
Classtf•cd Jn Cam~ro. Ex Porte Declaration of Deborah A. Bonanni, National Security Agency
Carolyn Jewel. ~~ a/. v. NotiOIUJ/ Security Agency. et a/. (No.
W)
TOP
SECRC:F!!T-sPHS~BROON.£NefeR-N-
longer being conducted under presidential authorization. The bulk collection of non-content
2
transactional data for internet communications was first authorized by the FISC in the July 2004
3
FISC Pen Register Order, and the bulk collection of non-content telephony meta data was first
4
authorized by the FISC in May 2006. The existence and operational details of these orders, and
5
of subsequent FISC orders reauthorizing these activities, remain highly classified and disclosure
6
7
of this informatjon would cause exceptional hann to national security.25 In addition, while the
8
Govenunent has acknowledged tbe general existence of the January 10, 2007 FISC Orders
9
authorizing electronic survelllance similar to that undertaken i.n the TSP, the content of those
10
orders, and facts concerning the NSA sources and methods they authorize, cannot be disclosed
II
12
without likewise causing exceptional harm to national security. Subsequent content surveillance
13
sources and methods utilized by the NSA under the PAA and, currently, under the FISA
14
Amendments Act of2008 likewise cannot be disclosed. I summarize below the proceedings that
15
have occurred under authority of the FISA or the FISC.
16
59.
fFSHSIJIOCf!NP) (a) Internet Meta Data: Pursuan t to the FISC Pen Register
17
18
l9
Order, which has been reauthorized approximately every 90 days after it was first issued, NSA is
authorized to collect in bulk
meta data associated with
20
21
22
23
24
25
26
27
28
s ~ For this reason, the FISC Telephone Business Records Order and
FISC Pen Register Orders prohibit any person from disclosing to any other person that the NSA
has sought or obtained the telephony meta data, other than to (a) those persons to whom
disclosure is necessary to comply with the Order; (b) an attorney to obtain legal advice or
assistance with respect to the production of meta data in response to the Order; or (c) other
persons as permitted by the Director of the FBl or the Director's designee. The FISC Orders
further provide that any person to whom disclosure is made pursuant to (a), (b), or (c) shall be
subject to the nondisclosure requirements applicable to a person to whom the Order is directed in
the same manner as such person.
2
Classifoed Jn Comcra. Ex Partl! Declaration of Deborah A. Bonanni, National Security Agency
Carolyn Jewel, eta/. v. Nat1ona/ Security Agency. eta/. (No.
RW)
4
2
3
4
5
The NSA is authorized to query the archived
6
7
meta data collected pursuant to the FISC Pen Register Order using email addresses for which
8
there were facts giving rise to a reasonable, articulable suspicion that the email
9
address was associated wi
10
Order was most recently reauthorized on -
2009, and requires continued assistance by
II
providers through
12
13
60.
(TSHSINOCNNF) (b) Telephony Meta Data: Beginrtiog in May 2006, the NSA 's
14
bulk collection of telephony meta data, previously subject to presjdential authorization, was
15
authorized by the FISC Telephone Business Records Order. Like the FISC Pen Register Order,
16
the FISC Telephone Business Records Order was reauthorized approximately every 90 days.
17
18
Based on the finding that reasonable grounds existed that the production was relevant to efforts
19
to protect against international terrorism, the Order required
20
produce to the NSA ..call detail records" or "telephony metadata" pursuant to 50 U .S.C. §
21
to
186l[c] (authorizing the production ofbusiness records for, inter alia, an investigation to protect
22
against international terrorism). Telephony meta data was compiled from call detail data
2)
24
maintained by the providers in the ordinary course of business that reflected non-content
25
infonnation such as the date, time, and duration of telephone calls, as well as the phone numbers
26
used to place and receive the calls. The NSA was authorized by the FISC to query the archived
27
telephony meta data solely with identified telephone numbers for which there were facts giving
28
Classified In Com era. £.t Parle Declaration of Deborah A. Booanrti, National Security Agency
Carolyn Jewel, et al. v. NatiOnal Securicy A.gency. el a/.
RW)
41
TOP 3ECRE'ffff~:ONINOf0R~
rise to a reasonable, articulable suspicion that the number was associated with
a "RAS" determinati on). The FISC Telephone Business
2
3
4
Records Order was most recently reauthorized on March 2, 2009, but subject to new specific
limitations, which l summarize next.
s
61.
(TSIISIHOCHNF) As noted above (note 11 supra), on January 15, 2009, the
6
7
Department of Juslice ("DOJ") submitted a compliance incident report related to the Business
8
Records Order to the FISC, based on infonnation provided to DOJ by the NSA, which indicated
9
that the NSA 's prior reports to the FISC concerning implementation of the FISC Telephone
10
Business Records Order had not accuratel y reported the eJCtent to which NSA had been querying
II
12
the telephony meta data acquired from carriers. In sum, this compliance incident related to a
13
process whereby currently tasked telephony selectors (i.e. phone numbers) reasonably believed
14
to be associated with authorized counter terrorism foreign intelligence targets associated wi
15
Executive Order 12333 were reviewed against
16
the incoming telephony metadata to detennine if that number had been in contact with a number
17
18
19
in the United States. This process occurred prior to a formal determination by NSA that
reasonable articulable suspicion existed that the selector was associated with
20
21
was not consistent with NSA 's prior descriptions of the
process for querying telephony meta data.
22
62.
ff-Sf/81-i/OC//NF) By Order dated March 2, 2009, the FISC has directed that the
23
24
NSA may continue to acquire cal l detail records of telephony meta data in accordance with the
25
FISC Telephone Business Record Orders, but is prohibited from accessing data acquired eJCcept
26
in a limited manner. In particular, the Government may request through a motion that the FISC
27
authorize querying of the telephony meta data for purposes of obtaining foreign intelligence on a
'28
case-by-case basis (unless otherwise necessary to protect against imminent threat to human life,
Classified In Camera, £x Pane Dedaration of Deborah A. Bonanni, National Security Agency
Carolyn Jewel. el a/. v. National Securify Agency. e1 a/.
S73· V RW)
subject to report to the FISC the next business ay). In addition, the FISC imposed other
2
obligations on the Government, including to report on its ongoing review of the matter and to fit
3
affidavits de.<;cribing the continuing value of the telephony meta data collection to the national
4
security of the United States and to certify that the infonnation sought is relevant to an
authorized investigation.
6
7
63.
on this and other compliance issues to ensure that this vital intelligence too) works appropriately
9
10
and effectively. For purposes of this litigation, and the privilege assertions now made by the
DNI and by the NSA, the intelligence sources and methods described herein remain highly
11
12
13
14
15
compromise vital NSA sources and methods and result in exceptionally grave harm to national
security.
16
64.
(FS/ffSPHSIHOCHNF) (c) Content Collection: On January 10,2007, the FISC
17
I&
19
issued orders authorizing the Government to conduct certain electronic surveillance that had
been occurring under the TSP. Those Orders
20
21
22
23
24
25
26
where the Government determined that there was probable
27
28
and (2) the communication is to or from a foreign country (i.e.,
CI3SSlfied In Camera, Ex Part.e Declllration of Deborah A. Bonanni, National Security Agency
Carolyn Jewel, ct a/. v. Nalional Security Age:;_~y,;,._e~ ~~·. ~~? ~~~)
'"fOP SECRF~RCONfN9fe.R-N
4
a on~end foreign communication to or from
2
surveillance that was occurring as part of the TSP became subject to the approval of the FISA
3
Court and the TSP was not reauthorized. 27
4
65.
EfSNSlll0€1/NF1 The Foreign Telephone and Email Order remained in effect
until the Protect America Act (..PAA") was enacted in August 2007. Under the PAA, the FISA'
6
7
definition of"electronic surveillance" was clarified to exclude "surveillance directed at a person
reasonably believed to be located outside the United States.'' 50 U.S.C. § 1805A. The PAA
9
10
authorized the DNl and the Attorney General to jointly "authorize the acquisition of
foreign intelligence information concerning persons reasonably believed to be outside the
11
12
United States" for up to one year, id. § 1805B(a), and to issue directives to communications
13
service providers requiring them to "immediately provide the Government with all information,
14
facilities, and assistance necessary to accomplish the acquisition" of necessary intelligence
15
infom1ation, id. § 1805B(e). Such directives were ·
16
content surveillance of overseas targets unde(' the PAA
17
66.
18
tfSI/SII/OCINF7 Beginning i~ 2008, expiring directives that had been
19
issued under the PAA for content surveillance of overseas targets (including surveillance of
20
speci
overseas) were replaced by new directives for such surveillance
21
22
2l
24
25
26
27
28
Classified fn Camera. f.x Pa11e Dt::clilration of Debornh A. Bonunn~ National S~urily Agency
Carolyn Je'wel, Cl al. v. Nalifm(l/ s~curlty Agency, <U al. (No.
W)
secwity.
2
3
69.
indiscriminate dragnet of the content of domestic and international communications as the
4
5
6
7
8
9
10
II
12
13
expected to cause exceptionally grave harm to national security.
70.
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Clas_~ified
In Cumera. £.x Parle Dedararion of Deborah A. Bonanni, National Security Agency
Cnrolyr. l<!wcl, e1 al.
v.
NaliotTa/ Secunly Agency, et al. (No.~~~!']
TeP
__.. _.~ _
SECRETI/TSf'l/&1·-~0R N-
2
J
4
5
6
7
8
9
10
ll
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Classi(ic:d In Camera,
ex farce Dcclarution of Deborah A.. Bonanni, National Securil'}l Agency
Carnlyn Jc:wel, ,., al. v. Nativnal Security Agency, ~(a(..
W)
2
3
4
5
6
7
8
9
lO
ll
12
13
14
IS
16
17
18
19
20
21
22
23
24
25
26
27
28
Classified In Camera, fir Parte Declaration of Deborah A. Booanni, National Security Agency
Caro/y,. Jewel, eta/. v. National Security Agency. el a/.
RW)
73.
2
3
4
5
6
7
8
9
10
"
12
13
14
LS
16
17
18
19
20
21
22
23
24
25
26
27
28
Classificcl/n Cumera. £s. f'arte Declaration of Deborah A. Bonanni. Narional Security Agency
CArolyn Jcwd, cf a/. v. National Security (lgency. el al. (No. . .VRW)
TOP SECRF.T/tFSPI.'S I
90R CO~-
2
3
4
5
6
7
8
9
10
II
12
13
14
IS
16
17
18
19
20
21
22
23
24
25
26
27
28
Classified In Camero, Ex Pane Dcclarotion of Deborah A. Bonanni, National Security Agency
Carol.vn Jewel. e1 of v. Noz,onol Security Agency, ct a/ (No.~VRW)
TOP
StCREl7ffSi¥fSi~FeRN
2
3
5
6
7
8
9
10
II
12
13
14
IS
16
I?
18
19
20
21
22
23
24
25
26
27
28
Classified lrr Camera. Ex Parte Declaration of Deboroh A. Bonanni, National Security Agency
Carolyn kwttl, ftl a/. v. Nafiona{ Securuy Agency. era/. (No. 08-cv-41!73-VRW)
--=FGP--SEE'R:E1-h'l"SPHSt~N-/NOfORN-
5
2
4
5
6
7
8
9
10
II
12
13
14
IS
16
17
18
19
20
21
22
23
24
25
26
27
28
Classified In Camero.. Ex Parle Ooclaralion of Oeborah A. Bonanni, Na1ion111 Security Agency
Caro(m kwcol. ec al. 1t Natconu{ Security Agency. e1 at. (No.~RW)
ffifl-"sE€R-f7FfFf&PHS-~GONtN OF0R-N-
5
2
3
4
5
6
7
8
9
10
II
12
l3
14
15
16
17
18
!9
20
21
22
23
24
25
26
27
28
Class;lied ln Camera, Ex Pane ~lurotion of Ddxlrah A. Bonanni. National Security Agency
CorolynJ~~I. etal. v. NolionalSecurityAgency, et ol. (No.•
YRW)
-=tQP SECRETttTSPh'Sl-
/IORfONfNOFORN-
2
3
4
5
6
7
9
10
II
12
13
14
1.5
16
17
18
19
20
21
22
23
24
25
26
27
28
Classified In Camera. Ex Parte Declaration of Deborah A. Bonanni, Natiooal Security Agency
Carolyn Jewel. et a/. v. NaJfonal Security ARency. et of. <_No.~~W)
TeP-S-F.C-RET/ffSPH~RCONfNOFORN
2
3
4
5
VII. (U) Risks of AJJowing Litigation to Proceed
6
7
80.
8
facts, and issues raised by this case, it is my judgment that sensitive state secrets are so central to
9
the subject matter of the litigation that any attempt to proceed wiU substantially risk the
10
disclosure of the privileged state secrets described above. Although plaintiffs' alleged content
II
12
surveillance dragnet does not occur, proving why that is
13
directly implicate highly classified
14
intelligence information and activities. Similarly, attempting to address plaintiffs' allegations
15
with respect to the bulk collection of non-content information and records containing
16
transactional metn data about communications would also compromise currently operative NSA
17
18
19
sources and methods that are essential to protecting national security, including for detecting and
preventing a terrorist attack.
20
21
22
my judgment, any effort to probe the outer-bounds of such classified information would pose
23
24
2S
26
27
28
35
fFSfff&PflSIJ/OO'NF) In its prior classified declarations in this action, the NSA has
set forth specific examples of how the intelligence sources and methods utilized by the NSA
after the 9/1 1 attacks, including content surveillance under the TSP and pursuant to subsequent
FlSA authority, as well as non-content meta data collection and analysis, have led to the
development by the NSA of actionable intelligence and important counter-terrorism efforts. See.
e.g., Classifted In Camera, Ex Parte Declaration of LTG Keith B. Alexander in Shubert, et al. v.
Bush, et al., (Case No. 07-cv-693) (dated May 25, 2007) at 35-43, ~ 58-61. To the extent that
such information would be relevant to any litigation in this action, however, they could not be
disclosed without revealing specific NSA intelligence infonnation, sources, and methods, and
subject to the government's privilege assertion.
Classified In Camero, £:.):Parte Declaration of Deborah A. Bonanni, National Sc:curity Agency
Carolyn Jewel, e1 a/. v NaJ/onal Securiry Agency. eta/.
RW)
TOP SECRFf/,' :~~H·
inherent and significant risks of the disclosure of that information, including critically sensitive
Indeed, any
2
information about NSA sources, methods, operations,
3
effort merely to allude to those facts in a non-classified fashion could be revealing of classified
4
details that should not be disclosed. Even seemingly rn.lnor or innocuous facts, in the context of
5
this case or other non-classified infonnation, can tend to reveal, particularly to sophisticated
6
7
8
9
10
foreign adversaries, a much bigger picture of U.S. intelligence gathering sources and methods.
81.
fFSHSih'NF1 The United States has an overwhelming interest in detecting and
thwarting further mass casualty attacks by al Qaeda. The United States has already suffered one
attack that killed thousands, disrupted the Nation's financial center for days, and successfully
tI
12
struck at the command and control center for the Nation's military. AI Qaeda continues to
13
possess the ability and clear, stated intent to carry out a massive attack in the United States that
14
could result in a significant loss of life, as well as have a devastating impact on the U.S.
15
economy. According to the most recent intelligence analysis, attacking the U.S. Homeland
16
remains one of al Qaeda's top operational priorit ies, see Classified In Camera Ex Parte
17
18
Declaration of Admiral Dennis C. Blair, Director of National Intelligence, and a1 Qaeda will
19
keep trying for high-impact attacks as long as its central couunand structure is functioning and
20
affiliated groups are capable of furthering its intere.'>ts.
21
82.
fFSHSI/fNF:) AI Qaeda seeks to use our own communications infrastructure
22
against us as they secretly attempt to infiltrate agents into the United States, waiting to attack at a
23
24
time of their choosing. One of the greatest challenges the United States confronts in the ongoing
25
effort to prevent another catastrophic terrorist attack against the Homeland is the critical need to
26
gather intelligence quickly and effectively. Time is of the essence in preventing terrorist attacks,
27
and the government faces sigJJ ificant obstacles in finding and tracking agents of al Qaeda as they
28
manipulate modem technology in an attempt to communicate wh.ile remaining undetected. The
Classified in Camero, Ex Parte i)Qclaration of Deborah A. Bonanni, National Security Agency
Coroly11 Jewot. el ol. v. Nalionnl Sec.,·ity Agency, ct a!.. (No.~R W)
'ffiP SECR£i-fA:&p~-GRGONINOFO RN
.s
1'0f' SECJtE17't f3 Ptt31--
'tORCONfNOFORN
NSA sources, methods, and activities described herein are vital tools in this effort.
VUI. (U) Conclusion
2
3
4
83.
(U) ln sum, I support the DNl's assertion of the state secrets privilege and
statutory privilege to prevent the disclosure of the jnformation described herein and detailed
5
herein. I aJso assert a statutory privilege under Section 6 of the National Security Act with
6
7
respect to the information described herein which concerns the functions of the NSA. Moreover,
because proceedings in thi s case risk disclosure of privileged and classified intelli gence-related
9
information, 1respectfully request that the Court not only protect that information from
10
disclosure but also dismiss this case to prevent exceptional hann to the national security of the
II
12
United Scates.
J declare under penalty of perjury that the foregoing is true and correct.
13
)4
IS
16
DATE
:3~J_M9
~
DEBORAH A. BONANNI
Chief of Staff
National Security Agency
17
18
19
20
21
22
23
24
25
26
27
28
Classif1ed In Camera, f.x Parte Declaration ofDebomh A. Bonanni, National Security Agency
Carolyn Jewel. et at. v. National Security Agency. eta/. (No.
5
Download