Skip navigation
The Habeas Citebook: Prosecutorial Misconduct - Header

Review of the Fbi Use of Exigent Letters and Other Requests for Phone Records 2010 Partj

Download original document:
Brief thumbnail
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
CHAPTER SIX
CONCLUSIONS AND RECOMMENDATIONS
I.

Conclusions

The ola conducted this review of the FBI's use of exigent letters and
other informal requests for telephone records to examine the circumstances
under which they were used and to assess the accountability of FBI senior
officials, supervisors, and employees who were responsible for these
practices. This report supplements our findings on exigent letters that were
described in our first NSL report issued in March 2007, and our second NSL
report issued in March 2008.
A.

Exigent Letters and Other Informal Requests

In this report, we found widespread use of exigent letters and other
informal requests for telephone records that did not comply with legal
requirements or FBI policies governing acquisition of these records. We
determined that this practice began in 2003, when the FBI
Counterterrorism Division's (CTD) new Communications Analysis Unit
(CAU) started using exigent letters to acquire subscriber and telephone toll
billing records information from three on-site communications service
providers. Glenn Rogers, the CAU Unit Chief at the time, said he approved
the use of exigent letters in the CAU because the letters had previously been
accepted by Company A during the FBI's New York Field Division's criminal
investigations of the September 11 hijackers and because a Company A
analyst had assured him they were "approved by the lawyers." However,
Rogers did not consult with any attorneys in the FBI Office of the General
Counsel's (FBI OGq National Security Law Branch (NSLB) or other FBI
Headquarters' attorneys about whether the letters could be used in national
security investigations or other FBI investigations.
In 2003 and 2004, the FBI entered into contracts with Company A,
Company B, and Company C that established arrangements whereby these
companies placed their employees in the CAUls office space so they could
expeditiously respond to FBI requests for telephone records. For example,
pursuant to its contract with the FBI, Company A made available to the
CAU, in a readil retrievable format, toll billin records

257

We found that from March 2003 to November 2006, CAU personnel
issued 722 exigent letters for telephone records from these 3
communications service providers. One exigent letter was signed by a CXS
Assistant Section Chief, 12 were signed by CAU Unit Chiefs, 706 were
signed by CAU Supervisory Special Agents (SSA). and 3 were signed by CAU
Intelligence Analysts.

Most of the 722 CAU exigent letters stated:
Due to exigent circumstances, it is requested that records for
the attached list of telephone numbers be provided. Subpoenas
requesting this information have been submitted to the U.S.
Attorney's Office who will process and serve them formally to
[Company A, Company B, or Company C] as expeditiously as
possible.
However, in our investigation we determined that in some instances
CAU SSAs signed exigent letters even though they believed that the factual
statements in the letters were inaccurate. For example, CAU Unit Chief
Rogers and several SSAs told us they signed exigent letters even though
they recognized at the time that subpoenas requesting the records had not
been submitted to the U.S. Attorney's Office, as the letters stated.
Moreover, we found a few instances in which the signers of exigent letters
did not know whether there were exigent circumstances or signed the letters
even though they questioned the letter's accuracy about whether an
emergency existed.
When we asked FBI supervisors and employees why they issued such
letters when they knew that no subpoena had been requested, no one could
satisfactorily explain their actions. Instead, they gave a variety of
unpersuasive excuses, contending either that they thought someone else
had reviewed or approved the letters, that they had inherited the practice
and were not in a position to change it, that the communications service
providers accepted the letters, or that it was not their responsibility to follow
up with appropriate legal process.
In official memoranda distributed to all FBI personnel in January
2003, CTD managers referred to a practice whereby the CAU could obtain
records from Company A prior to service of legal process. In November
2003, Rogers issued an electronic communication to CAU personnel that
specifically mentioned exigent letters.
We determined that the FBI's use of exigent letters became so casual,
routine, and unsupervised that employees of all three communications
service providers told us that they - the company employees - sometimes
generated the exigent letters for CAU personnel to sign and return to them.

258

In fact, one of the on-site Company A analysts established an icon on his
computer desktop at the CAU so he could quickly generate exigent letters
for CAU personnel to sign.
We also found that FBI personnel routinely uploaded ~ toll
billin records obtained in response to exigent letters into a _
database where the records were available for
review and analysis by
employees throughout the
government who were authorized to access the database.
Most of the exigent letters and other infonnal requests did not include
date ranges for the records requested. Similarly, the CAU's other infonnal
requests to the on-site communications service providers (such as those
communicated bye-mail, in person, on pieces of paper, or by telephone)
frequently did not have date parameters. As a result, the FBI often obtained
substantially more telephone records, covering longer periods of time, than
FBI agents typically obtain when serving NSLs with date restrictions. In
addition, in cases where the date range established the relevance of the
infonnation sought to the investigation, its omission meant that records
were received and uploaded into a
database in violation of the ECPA's requirement that the records sought be
relevant to a national security investigation.
We also found that the FBI did not track its use of exigent letters or
even keep copies of them. When the CAU first began using exigent letters in
March 2003, it failed to establish procedures to track the letters or even
ensure that legal process was promptly obtained and served on the
providers. Instead, the CAU had to rely on the on-site providers to identify
the records for which they were still owed legal process.
In addition to exigent letters, we detennined that the FBI used other
infonnal methods to request and obtain ECPA-protected records and calling
activity infonnation from the on-site providers. These infonnal methods
included requests made bye-mail, face-to-face requests, requests on pieces
of paper (including post-it notes), and telephonic requests made without
first providing legal process or even exigent letters. As was the case with
exigent letters, these requests were not approved or signed by FBI officials
specially delegated to issue NSLs under the ECPA, were not accompanied by
the certifications required for NSLs issued under the ECPA, and were not
consistently documented or tracked in the CAU.
We concluded that the FBI's use of exigent letters and other infonnal
requests for telephone toll billing records circumvented, and in many cases
violated, the requirements of the ECPA statute.

259

As described in this report, the ECPA generally prohibits
communications service providers from disclosing toll records information
except in certain limited circumstances set forth in the statute. The
relevant exceptions require providers to disclose such infonnation in
response to legal process such as NSLs, and pennit voluntary disclosures in
emergencies involving danger of death or serious physical injury.
Yet, the exigent letters and other informal requests were not valid
legal process for compelling the disclosures pursuant to 18 U.S.C. § 2709.
Section 2709 of the ECPA authorizes the FBI to compel the production of
toll records through NSLs issued by statutorily designated high-level FBI
officials who certify that the records sought are relevant to an authorized
national security investigation. As we described in our report, the exigent
letters and verbal, e-mail, or handwritten requests routinely used by CAU
personnel to request toll billing or other calling activity infonnation from the
providers did not meet these requirements. For example, none of the
individuals who signed exigent letters issued by the CAU were among those
specially delegated officials authorized to sign NSLs.271 Further, none of the
exigent letters contained a certification that the records sought were
relevant to an authorized national security investigation or that any
investigation of a U.S. person was not conducted solely on the basis of
activities protected by the First Amendment to the Constitution of the
United States.
In response to our fmdings, the FBI asserted that its use of exigent
letters and other infonnal requests may have been justified under the
emergency voluntary disclosure provision of the ECPA, Section 2702(c)(4).
During 2003 through March 2006 - the period when most of the exigent
letters were issued - that section authorized a provider to voluntarily release
toll records infonnation to a governmental entity if the provider "reasonably

271 The ECPA NSL statute authorizes only the FBI Director or his designees in
positions not lower than Deputy Assistant Director (DAD) or field division-based Special
Agents in Charge (SAC) to sign NSLs compelling communications service providers to
produce subscriber and toll billing records information in investigations of international
terrorism or espionage. See 18 U.S.C. § 2709. As Diagram 2.2 in Chapter Two illustmtes,
by issuing exigent letters the FBI substituted a I-step process in which CAU personnel
signed requests for telephone records without supervisory review by those officials
authorized by the ECPA to approve and certify the FBI's basis for requesting these types of
records, and without the documentation of the predication for the requests that FBI policy
required.

260

believe[d} that an emergency involving immediate danger of death or serious
physical injury justifie[d] disclosure of the information. "272
We recognize that some - but not all- of the FBI's requests may have
been made in circumstances that qualified as emergencies under the
applicable emergency voluntary disclosure provision. For example, as we
described earlier, exigent letters and other informal requests were used to
obtain records in connection with Operation Y an investi ation of a terrorist
lot in
to detonate ex losives
At
least one provider's employee told us that he was informed of the nature of
the threat in that matter. 273
However, other exigent letters and informal requests were used in
circumstances that do not appear to qualify as emergencies under Section
2702. For example, as described in Chapter Four, although CAU personnel
used exigent letters and other informal requests to obtain records from all 3
providers relating to over 400 telephone numbers in connection with
"Operation Z," the Unit Chief and an SSA of the operational unit responsible
for that high-profile counterterrorism operation told us that they did not
believe the CAU requests were made in exigent circumstances. 274 In

272 18 U.S.C. § 2702(c)(4) (Supp. 2002). In March 2006, the provision was amended
to allow voluntary disclosure "if the provider, in good faith, believes that an emergency
involving "danger of death or serious physical injury to any person requires disclosure
without delay of information relating to the emergency." USA PATRIOT Improvement and
Reauthorization Act of 2005, Pub. L. No. 109-177, § 107(b)(1)(B), 120 Stat. 192 (2006). The
legislative history of a similar amendment to Section 2702(b)'s emergency voluntary
disclosure provision for content information suggests that the belief standard was relaxed
because communications service providers "expressed concern to the Committee that the
[reasonably believes) standard was too difficult for them to meet and that, as a result,
providers may not disclose information relating to emergencies." Cyber Security
Enhancement Act of 2002, H.R. Rep. No. 107-497, at 12-13 (2002). The Committee report
that accompanied the amendments to Section 2702(b) also stated that the Section was
"aimed at protecting providers who in good faith attempt to assist law enforcement with an
emergency situation." Id. at 14. However, it also stated that the amendment "does not
change the standard or lower the standard for law enforcement behavior." Id.
273 Company B's representative said he was told by CAU personnel that "it could be
the next 9/ 11." However, Company B provided the fewest records to the FBI in connection
with this operation. In contrast, one of Company A's employees told us he received no
briefmg from the CAU regarding this operation, and the other employee stated that he
worked on the matter for several weeks before becoming aware that the records he was
providing were associated with Operation Y.
274 After reviewing a draft of this report, the FBI provided the OIG with several
contemporaneous e-mails beginning on June 12,2006, which it asserted would
demonstrate the emergency nature of Operations Z. However, we concluded that those e(Cont'd.)

261

addition, an FBI e-mail shows that the Unit Chief refused to state in the EC
that was belatedly drafted to document the predication for the CAU's
Operation Z requests that the requests were made in circumstances Judged
to be exigent. "275
Several factors make it difficult to determine whether and when the
FBI's other uses of exigent letters and informal requests satisfied Section
2702's emergency disclosure exception. First, given the FBI's lack of
internal controls over the process of requesting records by exigent letters
and other informal requests, it is difficult for the OlG or the FBI to
determine with certainty today how many of the requests were made in
circumstances satisfying Section 2702(c)(4). Indeed, the FBI has conceded
that the lack of documentation for the requests and their connection to
particular investigations has impeded its efforts to demonstrate which
requests clearly were made in Section 2702 circumstances.
Second, the FBI officials who were most familiar with the exigent letter
practice at the time the letters were in use - including Glenn Rogers,
Bassem Youssef, and the NSLB Assistant General Counsel- unequivocally
stated to us that they did not consider the letters at the time they were
made to be requests for voluntary production pursuant to Section 2702.
In addition, as described in Chapter Two, the evidence shows that
CAU personnel who made the requests did not understand "exigent
circumstances' to be synonymous with the definition of qualifying
emergencies under 2702. Although some agents and analysts said an
"exigent" matter included a life-threatening matter, others described it as an
important, pressing, fast-moving, or high-priority matter, and others said it
was a matter in which a high-level FBI official demanded the
information.
Finally, even assuming that some of the investigations associated with
the exigent letter requests were qualifying emergencies under the statute,
the evidence is insufficient to determine whether the providers had the
statutorily required belief that such emergencies justified voluntary
disclosure. Relevant factors to this issue include that the exigent letters did

mails reflected the importance of the investigation, but did not convey that emergency
circumstances existed and required disclosure without waiting for legal process. Indeed,
with regard to the earliest request for records reflected in these e-mails, we found that the
operational unit issued an NSL for the records.
275 We found other examples of use in non-emergency circumstances, such as the
exigent letters used to obtain reporters' records and records relating to a fugitive
investigation described in Chapter Three.

262

not request voluntary disclosure, but instead stated that compulsory legal
process (generally grand jury subpoenas) had already been requested and
would be served "as expeditiously as possible." In addition, employees of
the on-site providers told us they usually were given no information about
the circumstances underlYing the exigent letters or other informal requests
for records, and that they "assumed" the circumstances were exigent.
Further, at least one of the provider's employees told us he had doubts
about whether the requests were trulyexigent. 276 Under these
circumstances, it is difficult to determine whether and when the providers'
employees had the statutorily required "reasonable" or "good faith" belief
that the requisite emergency circumstances existed. 277
After reviewing a draft of this report, the FBI also asserted for the first
time that as a matter of law the FBI is not re uired to serve NSLs to obtain
"records associated
in national security
investigations. According to the FBI, the majority of exigent letter and other
informal re uests discussed in this re ort were for tele hone records.
the FBI
could have obtained these records without any legal process or qualifying
emergency through voluntary production by the communications service
providers. 278

'1:76 This provider ultimately required FBI requesters to endorse a stamped
certification that tracked the statutory language in Section 2702 before the provider would
provide records in response to exigent letters.

277 Mter reviewing a draft of this report, the FBI asserted that the legal standard of
Section 2702 could be met when an FBI employee requested telephone records in a
qualifying emergency, regardless of whether the FBI employee was aware of the statute.
The FBI also asserted that the providers could form a "reasonable" or "good faith" belief that
an emergency existed without necessarily knowing the facts surrounding the emergency.
As described above, however, with some exceptions the providers frequently received no
information about the investigation for which records were requested, or even a generalized
representation that an emergency situation existed.
278 We disagree with the FBI's statement that the majority of exigent letter and
other informal requests discussed in this report were for telephone records _
In fact, we determined, based on the FBI's records that the ma'ori of its
_
exi ent letter re uests were for toll billing records associated
We were unable to reach a conclusion concerning the percentage
requested through informal means other than
exigent letters, because the records for these requests (some of which were oral or written
on post-it notes) are incomplete and therefore unreliable.

263

The FBI did not rely on this section when it requested and obtained
the records discussed in this report. However, after reviewing a draft of the
OIG report the FBI asked the Office of Legal Counsel (OLC) for a legal
opinion on this issue. 28o When makin the re uest for an OLC 0 inion, the
FBI stated that

On January 8,2010, the OLC issued its opinion, concluding that the
ECPA "would not forbid electronic communications service roviders
In
short, the OLC agreed with the FBI that under certain circumstances
allows the FBI to ask for and obtain these records on a

279 The Stored Communications Act, codified in Chapter 121 of Title 18 at 18 U.S.C.
§§ 2701-2712, was enacted in 1986 as part of the ECPA. The Stored Communications Act
contains the relevant NSL and other FBI access to toll billing records provisions at issue in

this report.
280 The FBI presented the issue to the OLC as follows: "Whether Cha ter 121 of
Title 18 of the United States Code a lies to call detail records associated

264

voluntary basis from the providers, without legal process or a qualifying
emergency.
It is important to note that the FBI acknowledged in its July 2009

comments to a draft of this re ort that it had never considered or relied
upon
when it obtained any of the telephone
records at issue in this report. Moreover, it cannot be known at th~oint
whether an rovider would have divulged such records based on •
alone, and without the FBI's representation to the
provider that an NSL or other compulsory legal process would be
served.
For the reasons discussed below, we believe the FBI's potential use of
to obtain records has significant policy implications that
need to be considered by the FBI, the Department, and the
Congress.

The FBI has stated that it does not intend to rely on
However, that could change, and we
believe that appropriate controls on such authority should be considered now, in light of
the FBI's past practices and the OLe opinion.
283

265

284 Under 18 U.S.C. § 2709(b) the FBI may only issue NSLs to obtain such records
upon the certification that the records sought are relevant to an authorized
counterterrorism or counterintelligence investigation. In the voluntary context, the FBI
may request and obtain such records under 18 U.S.C. § 2702(c)(4) only if "the provider, in
good faith, believes that an emergency involving danger of death or serious physical
injury to any person requires disclosure without delay of information relating to the
emergency."
285 For example, requests for voluntary disclosure under the emergency
circumstances provisions of the ECPA NSL statute must be approved at a level not lower
than an Assistant Special Agent in Charge in a field office and a Section Chief at
Headquarters. See FBI aGC Electronic Communication (EC) to all Divisions (March 1,
2007), at 4. The EC also advises that approval of such requests must be in writing, even if
the initial approval was oral. The rank of the approving official for NSLs is set by statute at
Special Agent in Charge in field offices and Deputy Assistant Director at Headquarters. See
18 U.S.C. § 2709(b).
286 Under the ECPA NSL statute, the FBI is required to report to certain
congressional committees, on a semiannual basis, concerning all NSL requests made under
Section 2709(b). See 18 U.S.C. § 2709(e).
287 Moreover, other collections of similar types of records for intelligence activities
contain statutorily mandated approval, minimization, and reporting requirements. For
example, the FISA business records rovisions rovide useful com arisons as to how such
intelligence activities are regulated,
Under
these provisions, the FBI may apply to the FISA Court for an order requiring the production
(Cont'd.)

266

of business records and other tangible things "to obtain foreign intelligence information not
concerning a United States person." See 50 U.S.C. § 1861. By statute, use of this
authority is subject to extensive Attorney General-approved minimization procedures
governing how information acquired concerning U.S. persons must be retained and
disseminated. Id. at § 1861(g). The FBI is also sub'ect to com rehensive con essional
~quirementsas to all orders it obtains,
~ Id. at § 1862.
288 As discussed in this report, under the ECPA NSL statute, the FBI may only seek
toll billing records when relevant to an authorized counterterrorism or counterintelligence
investigation, provided that the investigation of a U.S. person is not conducted solely on the
basis of activities protected by the First Amendment to the Constitution. See 18 U.S.C. §
2709(b). Provisions in the FISA statute similarly protect U.S. persons with respect to FBI
applications to the FISA Court seeking orders to produce business records (50 U.S.C. §
1861(a)(2)(B)) and to conduct electronic surveillance (50 U.S.C. § 1805(a)).
289 We recognize that the FBI's Domestic Investigations and Operations Guide
(DIOG) and Executive Order 12,333, as amended, contain restrictions on how the FBI can
collect, use, and disseminate intelligence, particularly with respect to the privacy and civil
liberties interests of U.S. persons. However, these constraints are not statutory.

267

We believe that
creates a significant gap
in FBI accountability and oversight that should be examined closely by the
FBI, the Department, and Congress.
It is also important to recognize that the FBI advanced the _

only after the OIG found repeated misuses of its statutory
authority to obtain telephone records through NSLs or the ECPA's
emergency voluntary disclosure provisions. We believe that, given the
abuses described in this report, it is critical for the Department and
Congress to consider appropriate controls on an use b the FBI of
its authority to obtain records voluntarily

We also recommend that the Department notify Congress of this
issue and of the OLC opinion interpretin the sco e of the FBI's authority
under it, so that Congress can consider
and the
implications of its potential use.
B.

Other Informal Requests for Telephone Records

We found that without any documentation for the requests except
possibly e-mail messages, CAU personnel routinely asked the on-site
providers' employees to provide calling activity information in response to
what were referred to as "sneak peeks." Using sneak peeks, the FBI
requested the providers' employees _
their databases and tell the
FBI whether they had any records on specified telephone numbers. At the
FBI's request, the providers would conduct sneak peeks and sometimes give
the FBI additional information about the telephone records, such as
whether there was callin activi between specified numbers or calls to or
from certain
These sneak peeks were conducted
without any legal process whatsoever.
We also concluded that many of these sneak peeks violated the ECPA,
which prohibits communications service providers from knowingly divulging
"a record or other information pertaining to a subscriber to or customer of
such service ... to any governmental entity" except pursuant to legal
process or in certain limited circumstances set forth in the statute. 18
U.S.C. § 2702(a)(3). The relevant exceptions require providers to disclose
such records or information in response to compulsory process, such as

268

NSLs, and also permit voluntary disclosure based on the providers' good
faith-belief of a qualifying emergency.291 We concluded that the FBI did not
serve legal process under the ECPA for the information it received pursuant
to sneak peeks.
In addition, we do not believe that the sneak peek practice complied
with the ECPA's emergency voluntary disclosure provision for several
reasons. First, the practice was described to us as a routine occurrence in
the CAU and not limited to "exigent" or emergency circumstances. Second,
some of the specific instances where the sneak peek practice was used
included media leak and fugitive investigations which did not meet the
emergency voluntary disclosure provision. Third, the FBI's lack of internal
controls over the sneak peek practice has made it impossible to reliably
determine how many or in what circumstances sneak peek requests were
made, and what the providers were told or believed about the reasons for
these requests.
Our review also found that the FBI improperly asked Company A's
on-site employees to conduct "community of interest" _
In response
to a communi of interest
re uest, Com an A would retrieve
records
Although we could not
determine due to the FBI's lack of documentation how often the FBI
requested these community of interest _
or how often Company A
provided such records to the FBI, we found at least 52 exigent letters, 250
NSLs, and 350 grand jury subpoenas served on the on-site providers that
included such requests.
The FBI's community of interest _
requests were often included
in the boilerplate attachments to NSLs. We found that FBI officials who
signed NSLs that contained community of interest requests often were not
aware they were making such r e ~ In such instances, the FBI issued
NSLs with community of interest _
requests without first conducting,
or documenting in the NSL approval m e ~ECs), any
assessment of the possible relevance of _
telephone
numbers to the underlying investigation. Absent such an assessment, we
believe the FBI did not satisfy the ECPA requirement to issue NSLs in
national security investigations only upon certification by those authorized

291 As described previously, prior to March 2006, this exception required the
provider to have a "reasonable belief' that a qualifying emergency existed.

269

to sign NSLs that the records sought are relevant to authorized national
security investigations. 292
We also found that the FBI's community of interest
ractices
resulted in the FBI obtaining and uploading into a
database thousands of telephone records for
telephone numbers without the advance determination
by an SES-Ievel official that the records were relevant to an authorized
international terrorism investigation. In addition, the FBI is unable with
~ f y today which records in the database are associated with
_
numbers and whether those numbers were relevant to
the underlying investigations for which they were requested. We also
concluded that the FBI did not recognize the implications of Company A's
community of interest _
capability when Company A first posted its
analysts on-site at the CAU; did not issue written guidance in coordination
with the FBI OGC about the circumstances in which such requests were
appropriate under the ECPA; did not establish an approval process for such
requests or ensure that the predication for these requests was properly
documented in approval ECs; and did not ensure that records sought in
community of interest _
requests were included in required reports to
Congress on NSL usage.
Our review also uncovered other irregularities in the manner in which
the FBI obtained toll billing records and other information from the on-site
~ . From 2004 through 2006 Company A and Company C _
calling activity by certain "hot numbers" identified to them by CAU
_
personnel. Without serving legal process or even exigent letters, CAU
personnel requested that the companies _
the calling activity
information for a total of at least 152 of these hot telephone numbers. The
on-site Company A analyst thereafter provided the FBI (either verbally or by
e-mail) calling activity information for at least 42 hot numbers during the
period covered by our review.
Based on the Office of Legal Counsel's legal analysis of the ECPA in its
November 5, 2008, opinion, we concluded that the calling activity
information provided to the FBI on the "hot numbers" constituted "a record
or other information pertaining to a subscriber or a customer," under the
ECPA.293 Therefore, we concluded that absent valid legal process or a
qualifying emergency, the FBI was not authorized to obtain this
information.

292

See 18 U.S.C. § 2709(b).

293

18 U.S.C. § 2702(a)(3).

270

We found that the FBI did not serve legal process on the providers in
advance of receiving information about hot numbers. Moreover, we found
no evidence that the FBI requested, or the providers gave the FBI, this
information pursuant to the emergency voluntary disclosure provision of the
ECPA. Instead, it appears that the information was disclosed as part of the
contractual arrangement between two of the providers and the FBI, and was
often used in connection with fugitive matters that did not qualify as
emergency situations under Section 2702.
Therefore, we concluded that the FBI's practice of requesting and
obtaining calling activity information about hot numbers without service of
legal process violated the ECPA.
We also examined whether information obtained in response to
exigent letters or other informal requests were used in applications for
electronic surveillance or pen register / trap and trace orders filed with the
Foreign Intelligence Surveillance Court (FISA Court). The Department's
National Security Division (NSD) and the FBI reviewed 37 FISA applications,
which together referenced a total of 35 unique telephone numbers, to
determine whether FBI declarations filed in support of the applications
accurately stated the basis for verifying subscriber or calling activity
information. We found five misstatements in four declarations, which were
filed under oath by FBI personnel. The declarations inaccurately stated that
the FBI had acquired subscriber or calling activity information from NSLs
when in fact the information was acquired through other means, such as
exigent letters, an emergency disclosure letter, and a verbal request to the
communications service providers. Moreover, several of the NSLs referred to
in the four applications were served at least 2 months after the FISA Court
issued the requested orders.
As a result of this review, the NSD notified the FISA Court of the
inaccurate statements. The NSD concluded that, under the ECPA, the
inaccurate statements made in the FBI declarations were non-material. Yet,
even though the inaccurate statements may have been non-material to the
FISA application, we believe that any inaccurate statements to the FISA
Court are serious and affect the credibility of representations made by the
government.
It is also important to note that we reviewed only a small percentage

of the FISA Court applications that may have relied upon information
derived from exigent letters or other improper means. Based on our results
in these cases, we believe there are likely other similar inaccurate
statements in other applications. Moreover, no one in the FBI and the NSD
who reviewed these applications prior to their submission to the Court had
identified the inaccurate statements. Thus, our review concluded that the
FBI and the NSD failed to provide adequate supervision and oversight to

271

ensure the accuracy of the FBI's declarations filed in support of applications
seeking FISA Court orders.
Our investigation also uncovered FBI misuse of administrative
subpoenas to obtain telephone records. We determined that some
administrative subpoenas served on the on-site communications service
providers were preceded by "sneak peek" requests through which the on-site
providers' employees would first check their databases to determine if
records of interest were contained in the databases. In some cases, the
providers even gave the FBI records or other calling activity information
prior to the service of administrative subpoenas.
We concluded that the ECPA was violated when the FBI obtained
ECPA-protected telephone records without first issuing appropriate legal
process. The ECPA requires communications service providers to disclose
local and long distance non-content telephone records "when [the FBI] uses
an administrative subpoena authorized by a Federal ... statute ...."294
However, the ECPA does not authorize the FBI to obtain ECPA-protected
records or information and then serve an administrative subpoena.
Accordingly, we believe that the FBI's receipt of records obtained prior to
issuance of administrative subpoenas violated the ECPA.295
We also found that from 2003 to 2006 the FBI served at least 54
administrative sUbpoenas pursuant to 21 U.S.C. § 876 for toll b i l H .
records as part of the fu~tionconducted by the FBI's
This statute authorizes the use of
Field Division regarding _
administrative subpoenas in connection with an active narcotics
investigation to which the records sought are relevant. However, some of
these sUbpoenas were issued when the FBI's _
Field Division had no
active narcotics investigation to which the requested records were relevant.
Therefore, this was an improper use of Title 21 administrative subpoenas.
Further, the CAU SSA who signed seven of the sUbpoenas was not among
those officials delegated authority under the statute to sign administrative
subpoenas.

C.

FBI Attempts at Corrective Actions

As discussed in Chapter Four of this report, from late 2003 through
March 2007 when the OIG issued its first NSL report the FBI made various

,.. 18 U.S.C. § 2703(c){2).
29S We found no evidence that these were emergency voluntary disclosures
pursuant to Section 2702.

272

attempts to address issues arising from the CAU's use of exigent letters and
other infonnal means to obtain telephone records. However, during this
time period the FBI's actions were seriously deficient and ill-conceived, and
the FBI repeatedly failed to ensure that it complied with the law and FBI
policy when obtaining telephone records from the on-site communications
service providers. For example, during this period the FBI regularly issued
after-the-fact NSLs, which were an inappropriate tool for remedying the
FBI's improper exigent letter practices. Additionally, the FBI issued 11
improper blanket NSLs to try to "cover" or validate the improperly obtained
records. These attempts were inconsistent with the ECPA NSL statute, the
Attorney General's NSI Guidelines, and FBI policy.
By contrast, after the OIG issued its first NSL report in March 2007,
the FBI took several appropriate actions to address the problems created by
exigent letters. The FBI ended the use of exigent letters; issued clear
guidance on the proper use of NSLs and the ECPA emergency voluntary
disclosure statute; and conducted an audit of NSLs issued by field and
Headquarters divisions from 2003 through 2006, the results of which were
summarized in the DIG's second NSL report released in March 2008. The
FBI also directed that its personnel be trained on NSL authorities; agreed to
the move of the communications service providers' employees off FBI
premises; and expended significant efforts to determine whether improperly
obtained records should be retained or purged from FBI databases.

1.

The FBI's Initial Attempts at Corrective Action

As detailed in Chapter Four of this report, in late-December 2004 the
CAU asked NSLB attorneys to issue an after-the-fact NSL to cover records
that had previously been provided to the CAU. By late 2004, FBI National
Security Law Branch attorneys, including Deputy General Counsel Julie
Thomas, learned about the CAU's use of exigent letters, but the NSLB failed
to examine the practice adequately to ensure that it comported with the law,
the Attorney General's NSI Guidelines, and FBI policy. Instead, the NSLB
sought to devise a process to expedite issuing after-the-fact NSLs for records
that the CAU had requested in emergency circumstances pursuant to
exigent letters.
Yet, these after-the-fact NSLs were legally flawed. Although the NSLB
accepted the CAU's use of exigent letters with the promise of future legal
process, the ECPA authorizes the FBI to compel the production of records or
other covered infonnation only upon certification in writing by specified
senior officials that the records sought "are relevant to an authorized

273

investigation to protect against international terrorism or clandestine
intelligence activities" and that any investigation of a U.S. person "is not
conducted solely on the basis of activities protected by the first
amendment."296 After-the-fact legal process, no matter how soon after the
fact, is not authorized either by the ECPA NSL statute, the Attorney
General's NSI Guidelines, or FBI policy. Additionally, none of the
after-the-fact NSLs cited the ECPA emergency voluntary disclosure statute
as authority for the previous _
Although the CAU began to obtain after-the-fact legal process more
quickly, the backlog of records requests persisted. The backlog began
during Glenn Rogers's tenure as CAU Unit Chief and continued after
Bassem Youssef became the CAU Unit Chief in November 2004. While some
after-the-fact NSLs were issued by FBI field and Headquarters divisions and
the NSLB to address the backlog. we found that neither Rogers nor Youssef
took appropriate steps to ensure that the CAU tracked or adequately
addressed the backlog. Neither supervisor ensured that FBI personnel who
had asked the CAU for records issued the appropriate NSLs or. if these
efforts were unsuccessful, alerted senior CTD managers to the problem. As
a result. by mid-2006 the FBI had a backlog of record requests for more
than 900 telephone numbers. In addition, neither Youssef nor any other
CAU personnel sufficiently informed NSLB attorneys of the full scope of the
problems the CAU was facing regarding the backlogged record requests.
The FBI attempted to address the backlog by issuing 11 blanket NSLs
that were designed to "cover" or validate telephone records that had been
provided to the FBI pursuant to exigent letters or other informal requests.
The FBI attached to the blanket NSLs signed by senior CTD officials lists
that included telephone numbers that had been _
by the on-site
providers as long as 3 years earlier.
However, these blanket NSLs were improper and flawed. and they did
not comply with the ECPA NSL statute, Attorney General's NSI Guidelines,
and FBI policy. As noted above, the ECPA does not authorize the FBI to
cover the prior production of telephone records or ECPA-protected calling
activity information by issuing after-the-fact NSLs. In addition, the blanket
NSLs included telephone numbers relevant to criminal or domestic
terrorism investigations for which NSLs were not an authorized technique
under the ECPA NSL statute, the Attorney General's NSI Guidelines, or FBI
policy. Additionally, the blanket NSLs were not accompanied by required
approval ECs, and most of them did not contain the required certifications

296

See 18 U.S.C. § 2709(b).

274

for NSLs imposing non-disclosure and confidentiality obligations on the
recipients. Finally, the after-the-fact blanket NSLs did not retroactively cure
any violations of the ECPA that occurred when the FBI requested and
received records without legal process and in the absence of a qualifying
emergency.

2.

Corrective Actions after the OIG's First NSL Report

By contrast, after the FBI received the OIG's first NSL report it began
to take appropriate steps to address the improper use of exigent letters and
other informal requests for telephone records. In March 2007, the FBI OGC
issued guidance directing that FBI personnel no longer use exigent letters.
The guidance explained the distinctions between the FBI's authority to
compel the production of ECPA-protected records or to request emergency
voluntary disclosures. The guidance made clear the legal avenues that were
available to FBI investigators who seek to obtain telephone records,
including a description of the legal basis for emergency voluntary disclosure
requests. In June 2007, the FBI issued comprehensive guidance to all FBI
personnel regarding the FBI's NSL authorities.
In 2007 and 2008, the FBI conducted three audits to assess the
extent of its errors in NSL usage. The FBI reviews generally confirmed the
OIG's findings in its first NSL report as to the types of errors made by FBI
agents in their use of NSL authorities as well as the unauthorized
collections caused by third parties who provided the FBI with information
that was not requested.
In December 2007 and January 2008, the employees of the three
on-site providers moved out of the FBI. These moves were also
accompanied by changes in the FBI's protocols for obtaining telephone
records from the three providers.
Additionally, the FBI developed a process to determine whether to
retain or purge telephone records obtained through exigent letters and those
listed in blanket NSLs. As part of this process, the FBI reviewed records for
the 4,379 unique telephone numbers listed in exigent letters and the 11
blanket NSLs to determine whether there was a basis to justify retention of
the records. In deciding whether to retain records based on the results of
that research, the FBI developed a 5-step "decision tree'" based upon the two
ECPA authorities for obtaining telephone records. Since the ECPA does not
authorize the FBI to compel the production of ECPA-protected records with
a promise of future legal process, the FBI's decision tree was used by the
FBI not as a basis for the original record requests, but as a basis upon
which to analyze whether the FBI would retain the records.

275

In a complex and time-consuming review, the FBI determined that it
would retain most of the records but purge others. In essence, the process
attempted to determine if the FBI could find legal process issued in
connection with the _
request, if the FBI would issue new legal process
modeled on the ECPA standard for issuing legal process, or if neither of
those options was available, if the FBI could justify retention under an
after-the-fact application of the ECPA emergency voluntary disclosure
statute.
Under the FBI's analysis, the FBI will retain records for 3,352
telephone numbers because it found either that (1) appropriate legal process
associated with the request was previously issued or could be issued for
these records; or (2) because the circumstances at the time of the requests
satisfied the statutory standard for emergency voluntary disclosures.
The FBI also concluded that it would purge records for 739 telephone
numbers because the circumstances under which the records were
requested did not meet any of the criteria for retention available in the FBI's
decision tree. In addition, the FBI concluded that it must purge a portion of
the records for 302 of these telephone numbers because the records
obtained were outside the time period specified in the legal process
identified by the FBI.
The FBI faced a difficult challenge in reviewing the records improperly
acquired from exigent letters or listed in the 11 blanket NSLs. However,
under the circumstances it created, we believe the FBI's approach to
determine which records to retain and which to purge was reasonable.
In sum, we concluded that the FBI initial attempts to cover the
improperly obtained records were deficient, ill-conceived, and poorly
executed. However, we believe its review process and other corrective
measures since issuance of our first NSL report in March 2007 have been
reasonable, given the difficult and inexcusable circumstances that its
deficient exigent letter practices created.

D.

Improper Requests for Reporters' Telephone Records or
Other Calling Activity In Three Media Leak Investigations

We also found that in three media leak investigations the FBI
requested, and in two of these instances obtained from on-site
communications service providers, telephone records or other calling
activity information for telephone numbers assigned to reporters. However,
the FBI did not comply with federal regulation and Department policy that
requires Attorney General approval before requesting such records and that
also requires a balancing of First Amendment interests and the interests of

276

law enforcement before issuing subpoenas for the production of reporters'
telephone toll billing records. 297
The fIrst leak investigation involved the disclosure of classilled
information in articles ublished by the Washin ton Post and The New York
Times in
about the
Without a request
from FBI investigators, and without the knowledge of any prosecutor, a CAU
SSA issued an exigent letter to an on-site Company A analyst for the
telephone records of the Post and Times reporters who wrote the articles
and their bureaus in _
Company A rovided the records to the
FBI, and the FBI uploaded the records into a
database.
The records remained in that database for over 3 years, unbeknownst
to the prosecutor, CTD management, and FBI OGC attorneys until 2008
when OIG investigators determined that the records had been improperly
acquired and notilled the FBI General Counsel. We concluded that the FBI's
acquisition of these records constituted a complete breakdown in the
required Department procedures for approving the issuance of grand jury
subpoenas to obtain reporters' toll billing records.

In August 2008, following the OIG's notifIcation to the FBI that it had
improperly acquired the reporters' records, the FBI informed the
newspapers and the reporters that their telephone records had been
obtained, as required b federal re lation. However the FBI's notifIcation
did not disclose that

297

See 28 C.F.R. § 50.10.

277

In the second media leak investigation an Assistant United States
Attorney (local AUSA) and a federal prosecutor approved grand jury
sub oenas that directed a communications service rovider to deliver I
This

After the subpoenas were served and records were sent to the FBI
case agent as e-mail attachments, the prosecutor realized by virtue of a
fortuitous conversation with an FBI S cial A ent that the rovider could
have iven the FBI re orters' records
requested. The
prosecutor took steps to sequester the telephone records and notified the
Department's Criminal Division of the issue. In our review, we found no
evidence
or that reporters' toll billing
records were provided to the FBI in response to the subpoenas.
Following consultations with the Office of Legal Counsel, the Criminal
Division concluded that it was not required to notify the reporters of the
subpoenas, even though the subpoenas, if fulfilled, would have resulted in
acquisition of reporters' records.

We concluded that the way in which the Department drafted and
issued the two subpoenas in this leak investigation was deficient. The
prosecutor drafted and approved language in the subpoena attachments
that neither the FBI agent nor the prosecutor correctly understood; the local
AUSA assigned to assist the investigation in the jurisdiction where the
grand jury was empanelled initialed the grand jury subpoenas without
reviewing the attachments, which were prepared by the prosecutor and
attached after the local AUSA initialed the subpoenas; and but for a
fortuitous conversation between a Special Agent not involved in the
investigation and the prosecutor, FBI and Criminal Division attorneys would
likely not have learned about the problems with the language in the
subpoenas.
In the third media leak investigation the Department served on an
analyst a grand'u sub oena re uesting a
the FBI believed
_
for records of a
was in telephonic contact with a reporter.
~A

278

In addition, based on information provided to the Company A analyst
by an FBI Special Agent, the Company A analyst _
Company A's
database and downloaded records for ~erJs cellular phone calling
activity. After the _
which was _
without any legal process,
the Company A analyst informed the FBI Special Agent that there were no
records of calling activity between the reporter's and the _
numbers
~ the specified date range. The Company A analyst_ _ this
_
without the knowledge of the Special Agent.
Also, at the request of the CAU's Primary Relief Supervisor, without
process, the on-site Company B and Company C employees
_
their databases for calling activity by the reporter's cellular phone
number. The Company B employee found responsive records, although
Company B reported to us that the employee did not recall whether he had
provided responsive information to the FBI. We found no evidence that
these records were uploaded into FBI databases. The on-site Company C
employee detennined that Company C had no responsive records.
~

In sum, we concluded that serious lapses in training, supervision,
and oversight led to the abuses involving the FBI's improper requests for
reporters' records in these three leak investigations. CAU personnel told us
they did not know about the special approval requirements for subpoenaing
reporters' toll billing records. The federal prosecutors involved with these
matters, said they did not know the subpoenas sought reporters' records
either because they did not see or examine the attachments or because they
did not correctly understand that the tenninology used in the subpoenas or
attachments could result in the acquisition of reporters' records. The
failures in training, the diffusion of prosecutorial responsibility for the grand
jury subpoenas, and the absence of oversight within the CAU or from the
CTD or the FBI aGC resulted in the Department not following legal
requirements and its own policies for issuing subpoenas to obtain reporters'
toll billing records.

E.

OIG Findings on Management Failures and Individual
Accountability for Exigent Letters and other Improper
Requests for Telephone Records

In Chapter Five of this report, we assessed the accountability of FBI
employees, their supervisors, and the FBI's senior leadership for the use of
exigent letters and other improper practices we described in this report.
We concluded that numerous, repeated, and significant management
failures led to the FBI's use of exigent letters and other improper requests

279

for telephone transactional records over an extended period of time. These
failures began shortly after the CAU was established within the
Counterterrorism Division (CTD) in 2002, and they continued until March
2007 when the OIG issued its first NSL report describing the improper use
of exigent letters. We believe that every level of the FBI - from the most
senior FBI officials, to the FBI's Office of the General Counsel (FBI OGC), to
managers in the CTD, to supervisors in the CAU, to the CAU agents and
analysts who repeatedly signed the letters were responsible in some part for
these failures.
FBI Director Mueller, Deputy Director Pistole, and FBI General
Counsel Caproni said they were unaware until late 2006 that the CAU was
obtaining telephone records without appropriate legal process. In addition,
all but one of the CTD supervisors we interviewed said they did not know
prior to the CIG's first NSL investigation that the CAU was using exigent
letters to obtain telephone records from the on-site providers.
We found that beginning in 2003, shortly after the CAU was
established and the FBI contracted to have Company A's employees work
on-site, FBI officials failed to recognize and address clear risks for potential
misuse of the FBI's NSL and other authorities to obtain telephone records.
These risks arose from the combination of several factors, including the
FBI's expanded authority to obtain records protected by the ECPA, the close
proximity of the on-site providers' employees to FBI personnel in a common
FBI work area, and the assignment of SSAs and Intelligence Analysts to the
CAU who had no background or training in national security investigations
or in using NSLs.
At the same time, FBI officials at ali levels failed to develop a plan and
implement procedures to ensure that telephone records were properly
obtained from the on-site communications service providers. The FBI
compounded its planning failures when it did not ensure that all CAU
personnel were trained on the legal requirements for obtaining
ECPA-protected records. In particular, FBI managers - from CAU Unit
Chiefs, to the FBI CGC, to the senior leaders of the FBI - failed to ensure
that CAU personnel were properly trained to request telephone subscriber
and toll billing records information from the on-site communications service
providers in national security investigations only in response to legal
process or under limited emergency situations defined in 18 U.S.C
§ 2702(c)(4). They also failed to ensure that CAU personnel were trained to
comply with the Attorney General's NSI Guidelines and internal FBI policies
governing the acquisition of these records. They also failed to recognize the
need for, and assure adequate oversight of, the practices employed by the
CAU to obtain subscriber information, toll billing records, and other calling
activity information from the on-site providers.

280

In reviewing the FBI's responsibility for exigent letters and other
improper requests for telephone records and the performance of FBI
personnel involved in the practices covered in this review, we recognize that
the FBI was confronting major organizational and operational challenges
during the period covered by our review. As we noted in our first NSL
report, following the September 11 attacks the FBI overhauled its
counterterrorism operations, expanded its intelligence capabilities, and
began to upgrade its information technology systems. Throughout the
4-year period covered by this review, the CTD also was responsible for
resolving hundreds of threats each year, some of which, such as bomb
threats or threats to significant national events, needed to be evaluated
quickly. Many of these threats, whether linked to domestic or international
terrorism, resulted in a large number of high-priority requests to the CAU
for analysis of telephone communications associated with the threats, which
was the CAU's core mission.
Members of the FBI's senior leadership told us that they placed great
demands on the CAU and other Headquarters' units. The FBI Director
stated that he placed "tremendous pressure" on CTD personnel to respond
to terrorism threats. Other senior FBI officials stated that there were
countless "hair on fire" days when Headquarters personnel worked through
nights and on weekends to determine whether information the FBI received
from various sources presented threats to the United States. Indeed, some
of the exigent letters and other improper practices we describe in this report
were used to obtain telephone records that the FBI used to evaluate some of
the most serious terrorist threats posed to the United States in the last few
years. In our view, these circumstances do not excuse the management and
performance failures we describe in this report, but they provide important
context to the events that led to the serious abuses we found in this
review.
We also believe the management failures we described do not explain
all the deficiencies we found in this review. In this review, we concluded
that FBI supervisors and attorneys did not take sufficient action to prevent
or promptly correct the improper use of exigent letters and other informal
requests for telephone records. We also concluded that the performance of
some FBI employees who signed letters that were inaccurate on their face
was not in accord with the high standards expected of FBI and other law
enforcement personnel.
First, we found that Glenn Rogers, the CAU's first Unit Chief,
authorized the CAU's use of exigent letters without proper legal review by
the NSLB, and failed to ensure that the personnel assigned to the CAU
received proper guidance on national security investigations and using
NSLs. Rogers also personally signed 12 exigent letters without making an
effort to confirm that exigent letters were appropriate for use by the CAU in

281

national security investigations. Moreover, he signed and allowed his
subordinates to sign letters that inaccurately stated that subpoenas
requesting the telephone records had been submitted to the U.S. Attorney's
Office and would be served expeditiously. He also instructed subordinates
who questioned him about using such inaccurate letters to continue to use
them. In addition, Rogers failed to implement a system for tracking the use
of exigent letters, which resulted in a growing backlog of _
of records
for which the providers were promised follow-up legal process. These
failures led to the routine use of exigent letters and after-the-fact NSLs, as
well as the use of sneak peeks and other improper practices detailed in this
report. Finally, Rogers failed to ensure that Bassem Youssef, his successor
as CAU Unit Chief, was adequately briefed on the unit's methods and
procedures, including the specific methods the CAU used for obtaining
records from the providers.
Second, we found that Bassem Youssef inherited the improper
practices that were in place during Rogers's tenure but that he, too, did not
do all he could have, and should have, to address the improper use of
exigent letters and other informal requests for telephone records. Youssef
failed to understand or adequately assess, in coordination with CTD
management and the NSLB, the various methods by which CAU personnel
were obtaining records from the on-site providers. Youssef told us that he
was unaware of the details of the CAU's requests for community of interest
_
sneak peek requests, hot number _
and the unauthorized
use of administrative subpoenas. In addition, Youssef personally signed 1
exigent letter, although he did not review or read the exigent letter for more
than 5 months after he signed the letter and 18 months after he became the
CAU Unit Chief.
Third, we believe Julie Thomas did not properly perform her duties as
the NSLB Deputy General Counsel with respect to the CAU's use of exigent
letters. Many of the improper practices described in this report pre-dated
Thomas's tenure in the NSLB. However, after she became the NSLB Deputy
General Counsel and became aware of exigent letters, she did not
adequately review and assess the legality of their use in a timely fashion,
halt their use, ensure in coordination with CTD officials that CAU personnel
understood the lawful methods for obtaining records from the on-site
communications service providers, or ensure that the NSLs that she
personally signed complied with the ECPA NSL statute.
We found that the Assistant General Counsel, an FBI senior line
attorney who was the NSLB point-of-contact for NSL-related policies and
issues, did not recognize that exigent letters promising future legal process
were an improper tool for obtaining ECPA-protected records and that
after-the-fact NSLs also were unauthorized. The Assistant General Counsel
also provided inaccurate guidance on the use of exigent letters, and she did

282

not review a copy of any exigent letter until May 2006, more than 18
months after first learning of their use in the CAU. After reviewing an
exigent letter, she merely revised the letter to substitute the term "NSL" for
the inaccurate reference to after-the-fact issuance of grand jury subpoenas,
and she advised the CAU that it could continue to use the revised exigent
letter. The Assistant General Counsel also did not recognize that many of
the exigent requests that came to the CAU qualified for emergency voluntary
disclosure requests under the ECPA. By these actions and inaction, the
Assistant General Counsel allowed the FBI's improper use of exigent letters
and after-the-fact NSLs to continue. Although the Assistant General
Counsel kept her supervisors informed of the advice she was giving and the
actions she was taking, we believe based on her experience in national
security investigations and the senior policy position she held in the NSLB
that she should have directly confronted the legal deficiencies in the use of
exigent letters and, through her supervisors in the NSLB and in conjunction
with CTD managers, ensured that the use of exigent letters ended.
As described in Chapter Four of this report, we found that 4 senior
CTD officials - Joseph Billy, Jr., Arthur Cummings 1Il, Michael Heimbach,
and Jennifer Smith Love - signed a total of 11 improper blanket NSLs in
2006. Each of these NSLs had multiple deficiencies. None of them was
accompanied by required approval Electronic Communications (EC)
documenting the predication for the requests, and some were issued
without the required ECPA certifications. While we recognize that each of
these four officials had other significant responsibilities in the FBI and that
they each worked in a high-pressure environment in furtherance of the
FBI's counterterrorism mission, we believe they should have taken more
care to ensure that the NSLs they signed complied with the ECPA, the
Attorney General's NSI Guidelines, and FBI policy. In signing these
improper NSLs, we believe that these CTD senior officials contributed to
misuses of NSL authorities.
As described in Chapter Two of this report, we determined that many
CAU employees signed the inaccurate and improper exigent letters issued by
the CAU. In evaluating the accountability of the CAU employees who signed
these exigent letters, we asked them whether they knew when they signed
the letters that the factual statements they contained were inaccurate. We
specifically asked whether they knew that exigent circumstances existed at
the time they signed the letters and whether they knew that requests for
grand jury subpoenas had been submitted to the U.S. Attorney's Office, as
specifically stated in the letters.
With few exceptions the CAU employees who signed the letters said
they believed exigent circumstances were present. However, most of the
CAU SSAs we interviewed told us they did not know whether grand jury
subpoenas had been requested at the time they signed the exigent letters,

283

although some said they recognized that the letters inaccurately described
the process for obtaining grand jury subpoenas. Some CAU employees
explained their signing the letters by stating they "thought it was all part of
the program coming from the phone companies themselves," and they
assumed the letters were approved by the FBI or communications service
providers' attorneys. Another CAU employee said that he knew that
subpoenas had not been issued but signed the exigent letters anyway
because he saw the letter used by other CAU personnel as a standard
practice and he received assurances from CAU Unit Chief Rogers that the
exigent letter was okay to use. Other CAU employees said they said that
they did not pay much attention to and were not concerned about the
reference to a grand jury subpoena. Still others told us that when they
signed the letters they did not know for sure what type of after-the-fact legal
process would be used by the field division or Hedquarters unit that
initiated the request. Others said that they considered the reference to
grand jury subpoenas to broadly include all categories of legal process, such
as NSLs. And others told us that they never read the exigent letters closely
enough to notice any of the statements they contained.
It is important to recognize several mitigating factors regarding these
CAU signers of exigent letters. For example, CAU Unit Chief Rogers and the
NSLB approved the use of exigent letters, the FBI failed to train CAU
personnel on the authorized means of requesting records from the on-site
providers, and the communications service providers readily accepted the
exigent letters.

However, we believe that none of these factors excuses FBI employees
who signed an exigent letter from not making the effort to confirm the
factual accuracy of the letter or, knowing the letter was inaccurate, not
raising concerns about the letter's accuracy to FBI supervisors. Simply put,
we do not believe employees of the FBI should sign their names to letters
making a statement that is not true, even if the letters are approved by
management, sanctioned by FBI attorneys, part of an established practice,
or accepted by the recipients.
We also recognize that a few SSAs raised concerns about the exigent
letters to their supervisor, CAU Unit Chief Rogers, and that he instructed
them to continue using the letters without changing the wording. Even in
this circumstance, we believe that FBI employees confronted with this
problem had options other than to simply sign the letters. They could have
sought further guidance from more senior managers in the FBI, either
directly or anonymously. They could have complained to a senior CTD
official or the FBI Inspection Division. They could have contacted the OIG.
None of them took any of these steps. Instead, they continued to sign
inaccurate exigent letters.

284

Finall~iscussed

requests to _

above, FBI personnel were involved with

reporters' toll billing records in three different media leak

investigations, without first complying with Departmental regulation or
obtaining the required Attorney General approvals. We believe that these
matters involved some of the most serious abuses of the FBI's authority to
obtain telephone records. As described in Chapter Five of this report, we
recommend that the FBI consider appropriate action for the FBI employees

who sought to obtain these records without first obtaining the required
Attorney General approval.
II.

Recommendations

As discussed above. after we issued our first NSL report in March
2007 the FBI ended the use of exigent letters and took other corrective

actions to address the improper use of exigent letters. However, as a result
of further deficiencies we uncovered in this review, we believe the FBI and
the Department need to take additional action to ensure that FBI personnel
comply with the statutes, guidelines, regulations, and policies governing the
FBI's authority to request and obtain telephone records. We therefore
provide the following recommendations to the FBI and the Department:
1. The FBI should assess this report and the information we
developed in this review to determine whether administrative or other
personnel action is appropriate for the individuals involved in the use of
exigent letters and other improper requests for telephone records.
2. The FBI should issue periodic guidance and conduct periodic
training of FBI Headquarters and field personnel engaged in national
security investigations regarding the authorities available to the FBI under
the Electronic Communications Privacy Act (ECPA) and other federal statutes
to obtain telephone subscriber and toll billing records information and other
information protected by the ECPA. Such training should cover not only the
provisions of the ECPA, but also other federal statutes and regulations
governing the FBI's authority to obtain to such records, including the Pen
Register Act, the federal regulation governing subpoenas for toll billing
records of reporters, and the FBI's administrative subpoena authorities.
3. The FBI should periodically review its existing guidance and
directives to determine if clarifications or updates are needed to describe the
authority of FBI personnel serving in "acting" positions (whether appointed
or on temporary duty assignments) to sign documents or approve activities
for which signature or approval authority is delegated by the FBI Director.
As described in Chapter Four of this report, CTD officials signed improper
blanket NSLs while serving as Acting Deputy Assistant Directors. At the
time these NSLs were signed, the FBI had not issued guidance on whether

285

FBI personnel serving in acting positions were authorized to sign NSLs. To
ensure that all FBI personnel serving in acting positions understand what
they are authorized or not authorized to approve or sign under various
federal statutes, Attorney General Guidelines, and FBI policies, we believe
the FBI should clarify the authorities of FBI personnel serving in various
acting positions.
4. The FBI aGe should review existing contracts between the FBI
and private entities or individuals that provide for the FBI's acquisition of
telephone records, e-mail records, financial records, or consumer credit
records to ensure that the methods and procedures used by the FBI for
requesting, obtaining, storing, and retaining these records are in conformity
with the NSL statutes and other applicable federal statutes, regulations,
Executive Orders, Attorney General Guidelines, and FBI policy.
5. The FBI should issue a directive requiring that FBI personnel,
including FBI aGe attorneys with expertise pertinent to the subject matter
of the contract, review contract proposals, responses to requests for contract
proposals, and proposed contracts or arrangements with wire or electronic
communications service providers. The objective of the review should be to
ensure that any records requested, obtained, stored, or retained pursuant to
any such contracts are done so in conformity with applicable federal
statutes, regulations, Executive Orders, Attorney General Guidelines, and
FBI policy.
As described in Chapter Two of this report, NSLB attorneys did not
review the contracts with the three on-site providers until after reviewing a
draft of the OW's fIrst NSL report. Although the FBI has stated that these
contracts did not require FBI aGe review, the FBI aGC informed the House
Judiciaty Committee that procurement attorneys reviewed certain portions
of the contract documents relating to the justification and approval of the
contacts. 298 The FBI also informed the Judiciaty Committee that FBI aGe
attorneys will be more involved in the contract review process in the future.
To ensure that FBI personnel who are familiar with the laws and policies
affected by such contracts review analyze these important contract
proposals and contracts before they are finalized, the FBI should require
that FBI personnel with relevant expertise - not just procurement attorneys

298 Letter to The Honorable John Conyers, Jr., Responses of the Federal Bureau of
Investigation Based Upon the March 20, 2007 Hearing Before the House Judiciary
Committee Regarding The FBI's Use of National Security Letters Requested by April 19,
2007 Letter (January 13, 2009), at 6-7.

286

- review contract proposals and approve the final wording of such
contracts.
6. If the FBI places employees of communications service providers in
the same work space as FBI employees, the FBI should establish
appropriate written guidance, supervisory and oversight procedures, and
appropriate training to ensure that the methods and procedures used to
obtain records from the providers conform to the ECPA and other applicable
federal statutes, regulations, Executive Orders, Attorney General
Guidelines, and FBI policy.
7. The FBI should issue guidance specifically directi~ersonnel
that they may not use the practices known as hot number _
to
obtain calling activity information from electronic communications service
providers.
8. The FBI should issue guidance regard~en FBI personnel may
issue
community of interest _
requests. As
described in Chapter Two, in November 2007 the FBI Counterterrorism
Division prepared draft
idance that would require advance determinations
of the relevance of
elephone numbers included in the
community of interest
requests. The draft guidance also would
require that senior FBI officials and a ~nt attorney approve such
requests and that telephone numbers _
pursuant to these requests
be documented for purposes of congressional reporting on NSL usage. We
recommend that the FBI finalize and issue this guidance to FBI personnel.
9. The FBI should carefully review the circumstances in which FBI
personnel asked the on-site communications service providers
on specified "hot numbers" to enable the Department to determine if the FBI
obtained calling activity information under circumstances that trigger
discovery or other obligations in any criminal investigations or
prosecutions.
10. The Department should determine if, in addition to the grand jury
subpoenas identified in this review, the Department has issued other grand
~ media leak investigations that include~tfor
_
community of interest or calling circle _
If so,
the Department should determine whether at the time the subpoenas were
issued responsible Department personnel were aware of or suspected
contacts between the target numbers in the subpoenas and members of the
news media and whether the Department obtained the toll billing records of
news reporters in compliance with Departmental regulations, including the
notification requirements.

287

11. The FBI, in conjunction with the National Security Division (NSD)
and other relevant Department com onents, should review current policies
and procedures governing
reporters by
Department personnel. We recommend that after conducting this review,
the FBI and the NSD consider under what circumstances FBI personnel
may
reporters, and specifically whether
approval by senior FBI officials at the level of an Assistant Director or higher
should be required for
12. The FBI, in conjunction with the NSD, should determine whether
any FISA Court orders for electronic surveillance or pen register/trap and
trace devices currently in place relied upon declarations containing FBI
statements as to the source of subscriber information for telephone
numbers listed in exigent letters or the 11 blanket NSLs. If the FBI and the
NSD identify any such pending orders, we recommend that the FBI and the
NSD determine if any of the statements characterizing the source of
subscriber information are inaccurate or incomplete. If any declarations are
identified as containing inaccurate or incomplete statements, we
recommend that the FBI and the NSD determine whether any of these
matters should be referred to the FBI Inspection Division or the
Department's Office of Professional Responsibility for further review.

We also recommend
that the Department notify Congress of this issue and of the OLC opinion
interpreting the sco e of the FBI's authority under it, so that Congress can
consider the
and the implications of its potential
use.
III.

OIG Conclusion on Exigent Letters and Other Improper Requests
for Telephone Records

In sum, in this review we found widespread use by the FBI of exigent
letters and other informal requests for telephone records. These other
requests were made bye-mail, face-to-face, on post-it notes, and by
telephone, without first providing legal process or even exigent letters. The
FBI also obtained telephone records through impr~neakpeeks,"
community of interest _ , and hot-number _
Many of these
practices violated FBI guidelines, Department policy, and the ECPA statute.
In addition, we found that the FBI also made inaccurate statements to the
FISA Court related to its use of exigent letters. Some of the most troubling
improper requests for telephone records occurred in media leak cases,
where the FBI sought and acquired reporters' telephone toll billing records

288

and calling activity information without following federal regulation or
obtaining the required Attorney General approval.
Our review also found that the FBI's initial attempts at corrective
action were seriously deficient, ill-conceived, and poorly executed. However,
after our first NSL report was issued in March 2007. the FBI took
appropriate action to stop the use of exigent letters and to address the
problems created by their use. Yet, we believe the FBI should take
additional action regarding the use of other improper requests for telephone
records. We therefore believe the FBI should implement the
recommendations in this report and ensure that similar abuses of exigent
letters or other improper requests for telephone records do not occur in the
future.

289

APPENDIX

U.S. Department of Justice
Federal Bureau of Investigation

FBIHQ

In Reply. Please Refer 10 File No.

935 Pennsylvania Avenue NW
Washington, DC 20535
Room
May 27, 2003

---_._---------_..._-----_...------_.-

RE:

Special Project /

Dear Mr.
Due to exigent circumstances, it is requested that
records for the attached list of telephone numbers be provided.
Subpoenas requesting this information have been submitted to the
U.S. Attorney's Office who will process and serve them formally
to
as expeditiously as possible.

l1li

Sincerely,
Glenn Rogers
Unit Chief
Communications Analysis Group

•

By:
Supervisory Special Agent

3020

"X

NSL.
~{\"{\,)1

....

..

_

:", .-,1.

u.s. Departme1l1 of Jutltl:

Wu1lin;toa. D. C. 2053S-0001

August 4, 2006

Attention:

Re: Special

Projec~

I SSA

Dear Mr.
Due to exigent circumstances, it is requeste~ that
records for the attached list of telephone numbers be
prmriaed. National Security Letters directing you
this informatio~ will be.processed and served upon
as
expeditiously as possible.
' .

rFuizovide

For the following

u.s. numbers:

Sincerely.
Bassem Youssef

tJn1t Chief

Communications Analysis unit

By:

.

.'~

~age259

~()()'H'O

 

 

Prison Phone Justice Campaign
Advertise Here 4th Ad
PLN Subscribe Now Ad