[House Hearing, 110 Congress] [From the U.S. Government Publishing Office] THE INSPECTOR GENERAL'S INDEPENDENT REPORT ON THE FBI'S USE OF NATIONAL SECURITY LETTERS ======================================================================= HEARING BEFORE THE COMMITTEE ON THE JUDICIARY HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS FIRST SESSION __________ MARCH 20, 2007 __________ Serial No. 110-21 __________ Printed for the use of the Committee on the Judiciary Available via the World Wide Web: http://judiciary.house.gov ______ U.S. GOVERNMENT PRINTING OFFICE 34-175 WASHINGTON : 2007 _____________________________________________________________________________ For Sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512�091800 Fax: (202) 512�092250 Mail: Stop SSOP, Washington, DC 20402�090001 COMMITTEE ON THE JUDICIARY JOHN CONYERS, Jr., Michigan, Chairman HOWARD L. BERMAN, California LAMAR SMITH, Texas RICK BOUCHER, Virginia F. JAMES SENSENBRENNER, Jr., JERROLD NADLER, New York Wisconsin ROBERT C. SCOTT, Virginia HOWARD COBLE, North Carolina MELVIN L. WATT, North Carolina ELTON GALLEGLY, California ZOE LOFGREN, California BOB GOODLATTE, Virginia SHEILA JACKSON LEE, Texas STEVE CHABOT, Ohio MAXINE WATERS, California DANIEL E. LUNGREN, California MARTIN T. MEEHAN, Massachusetts CHRIS CANNON, Utah WILLIAM D. DELAHUNT, Massachusetts RIC KELLER, Florida ROBERT WEXLER, Florida DARRELL ISSA, California LINDA T. SANCHEZ, California MIKE PENCE, Indiana STEVE COHEN, Tennessee J. RANDY FORBES, Virginia HANK JOHNSON, Georgia STEVE KING, Iowa LUIS V. GUTIERREZ, Illinois TOM FEENEY, Florida BRAD SHERMAN, California TRENT FRANKS, Arizona ANTHONY D. WEINER, New York LOUIE GOHMERT, Texas ADAM B. SCHIFF, California JIM JORDAN, Ohio ARTUR DAVIS, Alabama DEBBIE WASSERMAN SCHULTZ, Florida KEITH ELLISON, Minnesota [Vacant] Perry Apelbaum, Staff Director and Chief Counsel Joseph Gibson, Minority Chief Counsel C O N T E N T S ---------- MARCH 20, 2007 OPENING STATEMENT Page The Honorable John Conyers, Jr., a Representative in Congress from the State of Michigan, and Chairman, Committee on the Judiciary...................................................... 1 The Honorable Lamar Smith, a Representative in Congress from the State of Texas, and Ranking Member, Committee on the Judiciary. 2 The Honorable Jerrold Nadler, a Representative in Congress from the State of New York, and Member, Committee on the Judiciary.. 4 The Honorable Trent Franks, a Representative in Congress from the State of Arizona, and Member, Committee on the Judiciary....... 5 The Honorable Robert C. Scott, a Representative in Congress from the State of Virginia, and Member, Committee on the Judiciary.. 6 The Honorable J. Randy Forbes, a Representative in Congress from the State of Virginia, and Member, Committee on the Judiciary.. 6 WITNESSES Mr. Glenn A. Fine, Inspector General, U.S. Department of Justice Oral Testimony................................................. 7 Prepared Statement............................................. 10 Ms. Valerie Caproni, General Counsel, Federal Bureau of Investigation Oral Testimony................................................. 215 Prepared Statement............................................. 219 APPENDIX Material Submitted for the Hearing Record Prepared Statement of the Honorable Sheila Jackson Lee, a Representative in Congress from the State of Texas, and Member, Committee on the Judiciary..................................... 272 Prepared Statement of the Honorable Linda T. Sanchez, a Representative in Congress from the State of California, and Member, Committee on the Judiciary............................. 279 Response to Post-hearing questions from Glenn A. Fine, Inspector General, U.S. Department of Justice............................ 281 Post-hearing questions posed to Valerie Caproni, General Counsel, Federal Bureau of Investigation, from Chairman John Conyers, Jr............................................................. 286 Letter from Richard C. Powers, Assistant Director, Office of Congressional Affairs, Federal Bureau of Investigation......... 289 Prepared Statement of Caroline Frederickson, Director, Washington Legislative Office, American Civil Liberties Union (ACLU)...... 290 Letter requesting additional information submitted to Valerie Caproni, General Counsel, Federal Bureau of Investigation...... 295 Press release by the Department of Justice from March 9, 2007, submitted by the Honorable Howard Coble, a Represenative in Congress from the State of North Carolina, and Member, Committee on the Judiciary..................................... 297 Article entitled ``Official Alerted F.B.I. to Rules Abuse 2 Year Ago, Lawyer Says,'' The New York Times, submitted by the Honorable John Conyers, Jr..................................... 299 THE INSPECTOR GENERAL'S INDEPENDENT REPORT ON THE FBI'S USE OF NATIONAL SECURITY LETTERS ---------- TUESDAY, MARCH 20, 2007 House of Representatives, Committee on the Judiciary, Washington, DC. The Committee met, pursuant to notice, at 9:40 a.m., in Room 2141, Rayburn House Office Building, the Honorable John Conyers, Jr. (Chairman of the Committee) presiding. Present: Representatives Conyers, Berman, Boucher, Nadler, Scott, Watt, Lofgren, Jackson Lee, Waters, Delahunt, Sanchez, Cohen, Johnson, Schiff, Davis, Wasserman Schultz, Ellison, Smith, Sensenbrenner, Coble, Goodlatte, Chabot, Lungren, Keller, Issa, Forbes, King, Feeney, Franks, and Gohmert. Staff Present: Perry Apelbaum, General Counsel and Staff Director; Robert Reed, Oversight Counsel; Joseph Gibson, Minority Chief Counsel; Caroline Lynch, Minority Counsel; Ameer Gopalani, Majority Counsel. Mr. Conyers. Good morning. The Committee will come to order. We are here for a hearing on the Inspector General's Independent Report on the FBI's Use of National Security Letters. Nearly 6 years ago, in the immediate aftermath of September 11th, the Department of Justice told us that they needed significantly enhanced authority, while promising the Members of this Committee in no uncertain terms that these new tools would be carefully and appropriately used. Two years ago, when the PATRIOT Act was reauthorized, they promised us there was not a single instance in which the law had been abused. Now, to underscore the importance of the reasons that we are holding this hearing, many of us remember the times in the past when the power of our Government has been abused. One war led to the suspension of Habeas Corpus; in another war, the notorious Palma raids; in World War II, the internment of Japanese Americans; in the Vietnam War, secret spying and enemy lists. In my view, we are now in a period where we risk a continuation of these deplorable acts and effect genuine harm to the Constitution and to the rule of law. One week ago, the Inspector General told us that the exact opposite was true of the promise that had been made that there was not a single instance, when the PATRIOT Act was being reauthorized, that the law had been abused. One tool in particular, the National Security Letters, essentially secret subpoenas issued without any court review, was used repeatedly to invade the privacy of law-abiding Americans outside the law and proper legal process. This was a serious breach of trust. The Department had converted this tool into a handy shortcut to illegally gather vast amounts of private information while at the same time significantly underreporting its activities to Congress. We learned that the number of National Security Letter requests had increased from 8,500 in the year 2000 to in excess of 143,000 from the 3-year period between 2003 and 2005. The Department of Justice consistently provided inaccurate information to Congress concerning the National Security Letters, failing to identify at least 4,600 security letter requests to us. The security letters were routinely issued without proper authorization and outside statutory and regulatory requirements. The Inspector General found that more than 60 percent of the investigatory files they looked at included one or more violations of FBI policy; but worse, the Inspector General found even more widespread abuses concerning the so-called Exigent Letters: that is, emergency requests for telephone and other data. An Exigent Letter, as opposed to a National Security Letter is meant to obtain information in an extreme emergency like a kidnapping when the Bureau has already sought subpoenas for the requested information. But the FBI issued these letters in nonemergencies as a means to bypass the requirements of the National Security Letter procedure, and so, as if it were not troubling enough, in many instances, the Bureau attempted to issue after the fact National Security Letters to cover their tracks on their use of Exigent Letters. The Inspector General specifically found that the Exigent Letters were ordinarily issued when there was no emergency present and very often when there was not even a pending investigation. More often than not, the letters were issued based on promises that subpoenas were in the process of being issued, when that was not the case and even though some subpoenas were never issued at all. The Federal Bureau of Investigation made numerous factual misstatements in the letters which were frequently issued in violation of the statute as well as the Attorney General and FBI guidelines. The recordkeeping was so poor that it was impossible for the IG to document how and why all of these problems occurred, and what disturbs me most is that the abuse and misuse of these security letters is not an isolated instance. It appears to be a part of a pattern in which the Department of Justice has violated not only our trust but the very laws which they are charged with enforcing, and so from the approval of the notorious torture memos to warrantless, illegal surveillance to the wrongful smearing of able U.S. Attorneys, this Department of Justice has squandered its reputation for independence and integrity. The Attorney General needs to understand that with power comes responsibility and with authority must come accountability. I would like now to turn to the distinguished gentleman from Texas, the Ranking Member of this Committee, Mr. Lamar Smith. Mr. Smith. Thank you, Mr. Chairman. Mr. Chairman, I appreciate your holding this hearing on the Inspector General's report on the FBI's use of National Security Letters. The Inspector General should be commended for conducting a thorough audit as directed by Congress and the PATRIOT Act reauthorization. The report raises concerns as to the FBI's internal recordkeeping and guidelines for the use of NSLs and terrorism and espionage investigations. It is clear from the report that these deficiencies are the result of the poor implementation and administration of National Security Letter authority. In other words, the problem is enforcement of the law, not the law itself. Timely corrected measures by the FBI and effective oversight by the Justice Department and Congress will ensure proper use of this important law. The Inspector General's report found that the FBI's database for tracking NSLs significantly underestimated the number of NSL requests, resulting in inaccurate reports to Congress on the FBI's use of NSLs. From 2003 to 2005, the FBI issued a total of 143,074 NSLs. This compares to 739 Exigent Letters to three telephone companies issued contrary to national security investigation guidelines. The Exigent Letters represent 1/200th of the National Security Letters issued. Although the use of these unauthorized letters is disconcerting, the FBI discontinued this practice last year. The Inspector General makes two other very important findings. First, there is no evidence that anyone at the FBI intended to violate the law or internal policy. This is a significant finding because it confirms that FBI agents acted in good faith and sought to comply with the law even as they worked under severe time constraints and with an urgent desire to thwart terrorist activities. Second, as detailed by the Inspector General, NSLs are a critical tool in fighting terrorism and in keeping our country safe. The information acquired through NSLs is valuable to international terrorism and espionage investigations and has allowed the FBI and intelligence agencies to identify terrorists and spies, the sources of their financing and their plans to attack or harm our national security. In addition, the FBI shares important information gathered through NSLs with other intelligence agencies, joint terrorism task forces and State and local law enforcement agencies. To do their job, the FBI must be able to collect important information about suspected terrorist and spies while complying with the law and freely share such information with key partners. In response to extensive oversight efforts conducted last Congress, the PATRIOT Reauthorization Act added critical new safeguards. For instance, an NSL recipient can challenge the request in court. Nondisclosure orders require supervisory approval, and the recipient may disclose the NSL to an attorney. I applaud the Administration's response to the Inspector General's report and expect the Administration to follow through on its promise to act quickly to remedy the deficiencies identified by the Inspector General. Mr. Chairman, on September 11, 2001, the United States was attacked. More than 3,000 people lost their lives. Members of Congress overwhelmingly approved important new counterterrorism tools for our Nation's law enforcement personnel and updated existing authorities to meet the terrorist threat. We must continue to demonstrate responsible leadership on the NSLs and other important national security issues. Of course, we need to be vigilant to make sure these problems are fixed, that the Inspector General's recommendations are implemented and that our civil liberties and privacy are protected. Mr. Chairman, I yield back the balance of my time. Mr. Conyers. I thank the gentleman for his statement. I would like now to recognize the Chairman of the Constitution Subcommittee, Jerry Nadler, for 2\1/2\ minutes. Mr. Nadler. I thank the Chairman. I would like to thank Chairman Conyers for holding this important hearing on the FBI abuses of National Security Letters. We are here today in response to the Department of Justice Inspector General report that found widespread abuses of the FBI's authority to issue National Security Letters. An NSL can be issued to a third party such as a health insurance company or an Internet service provider, ordering them to reveal all of their information about you and your transactions, and the third party is prohibited from telling you or anyone else about the order. That is the so-called ``gag order provision'' so you cannot object to an NSL directed at your information in court as you could to a subpoena, because you do not know about it and the third party may have no interest in going to court to protect your rights or your privacy. While last year's reauthorization of the PATRIOT Act did make some changes to the NSL provisions, these changes were essentially meaningless. For example, the court is now authorized to modify and set aside the gag order only if it finds there is no reason to believe that disclosure would endanger national security, diplomatic relations or anyone's life or safety, but the court must accept the Government's assertion of harm as conclusive, so this protection is meaningless. Some of us had predicted that the unrestricted authority of the FBI to issue NSLs would be abused, and unfortunately, our worst fears have now been realized. The IG's NSLs have been used by the FBI to collect and retain private information about American citizens who are not reasonably suspected of being involved in terrorism. During the last Congress, we predicted that unchecked power would lead to rampant abuse. That is why I proposed the Stop Self-Authorized Secret Searches Act 2 years ago. This bill would have restored some pre-PATRIOT Act provisions that an NSL could not be issued unless the FBI made a factual, individualized showing that the records sought pertained to a suspected terrorist or spy. It would have given the recipient of a National Security Letter an opportunity to obtain legal counsel, the right to challenge the letter and the nondisclosure requirement, a real right to challenge it. It would have given notice to the target of the NSL if the Government later seeks to use the records obtained from the NSL against him or her in a subsequent proceeding. It would have given the target an opportunity to receive legal counsel and challenge the use of those records. The bill would also have authorized the FBI to obtain documents that it legitimately needs while protecting the privacy of law-abiding American citizens. The abuses by the DOJ and by the FBI have proven that these legislative fixes are a necessary check on the investigatory power. We do not trust Government always to be run by angels, especially not this Administration. It is not enough to mandate that the FBI fix internal management problems in recordkeeping because the statute itself authorizes the unchecked selection of information on innocent Americans. Congress must act now to fix the statute authorizing the abuses revealed in the IG report and to hold those responsible for these abuses and violations accountable. Thank you. I yield back. Mr. Conyers. Thank you. The Chair recognizes the distinguished gentleman from Arizona, the Ranking minority Member of the Constitution Subcommittee, Trent Franks, for 2\1/2\ minutes. Mr. Franks. Well, thank you, Mr. Chairman. Mr. Chairman, today our task is a vital one, to check and balance our sister branch of Government through oversight and to ensure citizens' rights are being properly safeguarded. Today's subject is somewhat delicate because we must all walk a fine line. In our great and critical responsibility to prevent jihadist attacks upon American citizens, we must also be careful to strike the proper balance between vigilance and fighting the enemy on the one side of the scales and the preservation of citizens' rights on the other. The report of the Inspector General's that we review today is hopeful. We see that, while there are human imperfections in the FBI's operation, there is an overall finding that the FBI is, indeed, carrying out its duties responsibly, there being no evidence of any intentional or deliberate act to violate the law. The NSLs are performing their vital function as a valuable tool in national security investigations. To put today's hearing in perspective, we should keep in mind that the issuance of NSLs under the PATRIOT Act is a relatively new process given that the PATRIOT Act is only a few years old and that this new use of NSLs will necessarily require a careful examination of their best and most appropriate use in this early period. Certainly, we will have to work out the kinks given that we are most likely in the business of fighting terror for a long time to come. While the FBI's practices have had their shortcomings, it appears that these are problems that can be easily resolved, and this is good news. Many of the issues that we must review today are administrative in nature and, to some extent, unavoidable. Government is a human institution, and it is therefore by definition imperfect. Those of us who have run corporations know that a perfect audit is a very rare occurrence, particularly on the first go-around. Most businesses do internal audits, perhaps many, many internal audits, to discover where human judgment has fallen short and where to improve before being audited by an outside source. This is an arduous but necessary task and one that I hope we do well here today and prospectively. The FBI has vowed that it will make all of the adjustments that Mr. Gonzalez and Ms. Caproni have recommended. We look forward to the realization of this goal. With that, I thank the witnesses for joining us today, and we look forward to hearing your testimony. Thank you, Mr. Chairman. Mr. Conyers. Thank you. The Chair recognizes the distinguished gentleman from Virginia, Bobby Scott, Chairman of the Crime Subcommittee, for 2\1/2\ minutes. Mr. Scott. Thank you, Mr. Chairman. Mr. Chairman, we all believe that it is important to be aggressive in fighting terrorism and also aggressive in maintaining privacy and freedoms, and I do not believe we should operate on the premise that we always have to give up freedom in order to obtain security, but for us to provide appropriate oversight we have to have accurate information. Unfortunately, there are indications that we have received clearly inaccurate reports after the significant use of secret, invasive processes that do not appear to be necessary to advance terrorism-related investigations. Whether it is a secret NSA wiretapping in violation of the FISA law or the inappropriate use of the National Security Letters, we are discovering that what is actually occurring is quite different from what we were being told, and we cannot evaluate the ongoing need for NSA letters without accurate information. There is also a clear indication of intentional misuse of the word ``exigent'' letters to telephone companies as emergency information when in fact no emergency existed. Somebody obviously knew that was a problem that would affect reports to Congress and oversight boards, and we need to find out who these people are. With these disturbing indications, Mr. Chairman, I hope the testimony of the witnesses today will reveal who is responsible for these abuses and who should be held accountable for false reports to Congress. Thank you, Mr. Chairman. I yield back. Mr. Conyers. Thank you so much. Another Virginian, the Ranking minority Member of the Crime Subcommittee, Mr. Randy Forbes. Mr. Forbes. Mr. Chairman, I would like to thank you and the Ranking Member, Congressman Smith, for holding this important hearing today, and also for our witnesses for being here. You know, the subject matter of this hearing makes for great theater, but when the show is over we have the task of finding the facts and making sure the proper balance is struck and implemented to protect our citizens. That we will do, and hopefully, we will do it without the negativism and the emotionalism that seems so prevailing in public policy today. Pounding our fists makes great sound bites, but does not stop terrorists or protect the privacy rights of our citizens. It is clear that National Security Letters are important tools in international terrorism and espionage investigations conducted by the FBI. The Inspector General's report, which details the audit of 77 case files in four field offices, shows a disturbing pattern. In 60 percent of those cases, the FBI's files were found to be in violation of the FBI's internal control policies for issuing National Security Letters. While the audit conducted concluded that there was no evidence of any intentional or deliberate act to violate the law, it is also clear that changes need to be made to the FBI's procedures so that they reflect the scope and intent of the law rather than the evolution of general practice. I look forward to hearing from the FBI about what procedures were in place during the time of the Inspector General's audit and how, given the inadequacies identified by the Inspector General, the FBI plans to correct these. Mr. Chairman, I yield back the balance of my time. Mr. Conyers. Thank you. All other opening statements will be included in the record. Mr. Glenn A. Fine, Inspector General at the Department of Justice, a post held since he was confirmed by the Senate on December 15, 2000. Mr. Fine has worked for the Department's Office of Inspector General in a variety of capacities since January 1995. He has had several years in private practice and has also served as an Assistant United States Attorney in Washington, D.C. We are also privileged to have with us the General Counsel of the Federal Bureau of Investigation, Ms. Valerie Caproni, a position she has held since August 2003. Prior to that, Ms. Caproni served as an Assistant United States Attorney in the Eastern District of New York, as a supervisor at the Securities and Exchange Commission and has also worked in private practice. All of your statements will be made a part of the record in their entirety, and we will have a 5-minute time for each of you, and we ask Inspector General Glenn A. Fine to begin our testimony. Welcome to the Committee. TESTIMONY OF GLENN A. FINE, INSPECTOR GENERAL, U.S. DEPARTMENT OF JUSTICE Mr. Fine. Mr. Chairman, Congressman Smith and Members of the Committee on the Judiciary, thank you for inviting me to testify about two reports issued by the Department of Justice Office of the Inspector General regarding the FBI's use of National Security Letters and its use of section 215 orders to obtain business records. The PATRIOT Reauthorization Act required the OIG to examine the FBI's use of these authorities, and on March 9th we issued reports detailing our findings. Today, I will summarize the key findings from our reviews, focusing my comments on the National Security Letter report. Under five statutory provisions, the FBI can use National Security Letters (NSLs), to obtain without review by a court records such as customer information from telephone companies, Internet service providers, financial institutions, and consumer credit companies. Although most of the statutory provisions regarding NSLs existed prior to the enactment of the PATRIOT Act, the Act significantly broadened the FBI's authority to use NSLs in two primary ways. First, it eliminated the requirement that the information sought must pertain to a foreign power or an agent of a foreign power and substituted the standard that the information requested must be relevant to or sought for an investigation to protect against international terrorism or espionage. Second, the PATRIOT Act significantly expanded approval authority for NSLs beyond a limited number of FBI headquarters officials to the heads of all FBI field offices. Our review examined the FBI's use of NSLs from 2003 through 2005. The OIG will conduct another review examining the FBI's use of NSLs in 2006, which we are required to issue by the end of this year. In sum, our review found widespread and serious misuse of the FBI's National Security Letter authorities. In many instances, the FBI's misuse violated NSL statutes, Attorney General guidelines, or the FBI's own internal policies. We also found that the FBI did not provide adequate guidance, adequate controls, or adequate training on the use of these sensitive authorities. Before describing the main findings of our report, however, I believe it is important to provide context for these findings. First, we recognize the significant challenges the FBI was facing during the period covered by our review. After the September 11th terrorist attacks, the FBI implemented major organizational changes while responding to continuing terrorist threats and conducting many counterterrorism investigations, both internationally and domestically. Second, it is also important to recognize that in most but not all of the cases we examined, the FBI was seeking information that it could have obtained properly through National Security Letters if it had followed applicable statutes, guidelines and internal policies. Third, we did not find that the FBI employees sought to intentionally misuse NSLs or sought information that they knew they were not entitled to obtain. Instead, we believe the misuses and the problems we found generally were the product of mistakes, carelessness, confusion, sloppiness, lack of training, lack of adequate guidance, and lack of adequate oversight. I do not believe that any of my observations, however, excuses the FBI's misuse of National Security Letters. When the PATRIOT Act enabled the FBI to obtain sensitive information through NSLs on a much larger scale, the FBI should have established sufficient controls and oversight to ensure the proper use of those authorities. The FBI did not do so. The FBI's failures, in my view, were serious and unacceptable. I would now like to highlight our review's main findings. Our review found that after enactment of the PATRIOT Act the FBI's use of National Security Letters increased dramatically. In 2000, the last full year prior to the passage of the PATRIOT Act, the FBI issued approximately 8,500 NSL requests. After the PATRIOT Act, the number of NSL requests increased to approximately 39,000 in 2003, approximately 56,000 in 2004, and approximately 47,000 in 2005. In total, during the 3-year period, the FBI issued more than 143,000 NSL requests. However, we believe that these numbers, which are based on information from the FBI's database, significantly understate the total number of NSL requests. During our file reviews in four FBI field offices, we found additional NSL requests in the files than were contained in the FBI database. In addition, many NSL requests were not included in the Department's reports to Congress. Our review also attempted to assess the effectiveness of National Security Letters. NSLs have various uses, including to develop links of subjects of FBI investigations and other individuals and to provide leads and evidence to allow FBI agents to initiate or close investigations. Many FBI headquarters and field personnel, from agents in the field to senior officials, told the OIG that NSLs are indispensable investigative tools in counterterrorism and counterintelligence investigations, and they provided us with examples and evidence of the importance to these investigations. The OIG review also examined whether there were any improper or illegal uses of NSL authorities. From 2003 through 2005, the FBI identified 26 possible intelligence violations involving its use of NSLs. We visited four FBI field offices and reviewed a sample of 77 investigative case files and 293 NSLs. We found 22 possible violations that had not been identified or reported by the FBI. We have no reason to believe that the number of violations we identified in the field offices was skewed or disproportionate to the number of violations in other files. This suggests that the large number of NSL-related violations throughout the FBI have not been identified or reported by FBI personnel. In one of the most troubling findings, we determined that the FBI improperly obtained telephone toll billing records and subscriber information from three telephone companies pursuant to over 700 so-called Exigent Letters. These letters generally were signed by personnel in the Communications Analysis Unit (CAU), a unit of the Counterterrorism Division in the FBI Headquarters. The Exigent Letters were based on a form letter used by the FBI's New York Field Division in the criminal investigations related to the September 11th attacks. Our review found that the FBI sometimes used these Exigent Letters in nonemergency circumstances. In addition, the FBI failed to ensure that there were authorized investigations to which the requests could be tied. The Exigent Letters also inaccurately represented that the FBI had already requested subpoenas for the information when in fact it had not. The FBI also failed to ensure that NSLs were issued promptly to telephone companies after the Exigent Letters were sent. Rather, in many instances, after obtaining records from the telephone companies, the FBI issued National Security Letters months after the fact to cover the information obtained. We concluded that the FBI's use of these Exigent Letters inappropriately circumvented the requirements of the NSL statute and violated Attorney General guidelines and FBI policies. In response to our report, we believe that the Department and the FBI are taking our findings seriously. The FBI concurred with all of our recommendations, and the Department's National Security Division will be actively engaged in oversight of the FBI's use of NSLs. In addition, the FBI's Inspection Division has initiated audits of a sample of NSLs issued by each of its 56 field offices. The FBI is also conducting a special investigation on the use of Exigent Letters to determine how and why the problems occurred. The OIG will continue to review the FBI's use of National Security Letters. In addition to issuing a second report on the use of NSLs in 2006, we intend to monitor the actions that the FBI and the Department are taking to address the problems we found in that review. Finally, I want to note that the FBI and the Department cooperated fully with our reviews, agreed to declassify information in the report, and appears to be committed to addressing the problems we identified. We believe that significant efforts are necessary to ensure that the FBI's use of National Security Letters is conducted in full accord with the statutes, Attorney General guidelines, and FBI policy. That concludes my testimony, and I will be pleased to answer any questions. [The prepared statement of Mr. Fine follows:] Prepared Statement of Glenn A. Fine Mr. Chairman, Mr. Smith, and members of the Committee on the Judiciary: Thank you for inviting me to testify about two recent reports issued by the Department of Justice Office of the Inspector General (OIG) regarding the Federal Bureau of Investigation's (FBI) use of national security letters and the FBI's use of Section 215 orders to obtain business records. In the Patriot Reauthorization Act, enacted in 2006, Congress directed the OIG to examine the FBI's use of these two important authorities. The reviews were directed to examine, among other things, the number of times these authorities were used, the importance of the information obtained, how the information was utilized, any improper or illegal uses of these authorities, and other noteworthy facts or circumstances related to their use. On March 9, 2007, we issued separate reports on the FBI's use of national security letters and Section 215 orders. We publicly released two unclassified reports, with only limited information redacted (blacked out) which the Department or the FBI considered to be classified. We also provided to Congress, including this Committee, copies of the full classified reports that contain some additional classified information on the FBI's use of the two authorities. However, the OIG's main findings and conclusions are included in the unclassified versions that were publicly released. In this written statement, I will summarize the key findings from our reports, focusing most of my comments on the national security letters report. I will first provide brief background on national security letters and how we conducted our review. I will then provide a few observations to put our findings in context. Next, I will highlight the main findings of our national security letter report. After that, I will briefly summarize our report on the FBI's use of Section 215 orders to obtain business records. I. THE OIG'S NATIONAL SECURITY LETTER REPORT A. Background on National Security Letters Under five statutory provisions, the FBI can use national security letters (NSLs) to obtain--without a court order or any review by a court--records such as customer information from telephone companies, Internet service providers, financial institutions, and consumer credit companies. Most of these statutory provisions regarding NSLs existed prior to enactment of the USA PATRIOT Act (Patriot Act) in October 2001. Prior to the Patriot Act, the FBI could obtain information using a national security letter only if it had ``specific and articulable facts giving reason to believe that the customer or entity whose records are sought [was] a foreign power or agent of a foreign power.'' In addition, NSLs could only be issued by a limited number of senior FBI Headquarters officials. The Patriot Act significantly broadened the FBI's authority to use NSLs by both lowering the threshold standard for issuing them and by expanding the number of FBI officials who could sign the letters. First, the Patriot Act eliminated the requirement that the information sought must pertain to a foreign power or an agent of a foreign power. Instead, it substituted the lower threshold standard that the information requested must be relevant to or sought for an investigation to protect against international terrorism or espionage. Consequently, the Patriot Act authorized the FBI to issue national security letters to request information about persons other than the subjects of FBI national security investigations, so long as the requested information is relevant to an authorized national security investigation. In addition, the Patriot Act permitted Special Agents in Charge of the FBI's 56 field offices to sign national security letters, which significantly expanded approval authority beyond a limited number of FBI Headquarters officials. Finally, the Patriot Act added a new authority allowing NSLs to be used to obtain consumer full credit reports in international terrorism investigations. B. The OIG Review As directed by the Patriot Reauthorization Act, the OIG's report examined the FBI's use of national security letters during the time period from 2003 through 2005. As required by the Reauthorization Act, the OIG will conduct another review examining the use of NSLs in 2006, which we are required to issue by the end of this year. During our review, a team of OIG staff conducted interviews of over 100 FBI and Department of Justice employees, including personnel at FBI Headquarters, the FBI Office of the General Counsel (OGC), FBI Counterterrorism and Counterintelligence Divisions, FBI personnel in four field divisions, and officials in the Department's Criminal Division. In addition, the OIG reviewed a sample of FBI case files that contained national security letters at four FBI field divisions: Chicago, New York, Philadelphia, and San Francisco. These field divisions were selected from among the eight FBI field divisions that issued the most NSL requests during the review period. During our field work at the four field divisions, we examined a sample of 77 investigative case files that contained 293 national security letters. An investigative case file can contain a large number of documents, and some of the case files we reviewed consisted of the equivalent of 20 or 30 boxes of documents. We used a judgmental sample in selecting which files to review and included in our sample both counterterrorism and counterintelligence cases, cases in which the NSLs were issued during preliminary investigations and full investigations, and opened and closed FBI cases. The OIG also analyzed the FBI OGC's national security letter tracking database, which the FBI uses for collecting information to compile the Department's required reports to Congress on NSL usage. Finally, we distributed an e-mail questionnaire to the counterintelligence and counterterrorism squads in the FBI's 56 field divisions in an effort to determine the types of analytical products the FBI developed based on NSLs, the manner in which NSL-derived information was disseminated, and the occasions when such information was provided to law enforcement authorities for use in criminal proceedings. C. Findings of the OIG Review Our review found widespread and serious misuse of the FBI's national security letter authorities. In many instances, the FBI's misuse of national security letters violated NSL statutes, Attorney General Guidelines, or the FBI's own internal policies. We also found that the FBI did not provide adequate guidance, adequate controls, or adequate training on the use of these sensitive authorities. In many respects, the FBI's oversight of the use of NSL authorities expanded by the Patriot Act was inconsistent and insufficient. 1. Background to OIG Findings However, before detailing the main findings of our report, I believe it is important to provide context for these findings and also to note what our review did not find. First, in evaluating the FBI's misuse of national security letters, it is important to recognize the significant challenges the FBI was facing during the period covered by our review. After the September 11 terrorist attacks, the FBI implemented major organizational changes to prevent additional terrorist attacks in the United States. These changes included overhauling and expanding its counterterrorism operations, expanding its intelligence capabilities, attempting to upgrade its information technology systems, and seeking to improve coordination with state and local law enforcement agencies. These changes occurred while the FBI and its Counterterrorism Division had to respond to continuing terrorist threats and conduct many counterterrorism investigations, both internationally and domestically. Second, it is important to recognize that in most--but not all--of the cases we examined in this review, the FBI was seeking information that it could have obtained properly through national security letters if it had followed applicable statutes, guidelines, and internal policies. Third, national security letters are important tools that can provide critical evidence in counterterrorism and counterintelligence investigations. Many Headquarters and field personnel--from agents to senior officials--believe these tools are indispensable to the FBI's mission to detect and deter terrorism and espionage. Fourth, we did not find that that FBI agents sought to intentionally misuse the national security letters or sought information that they knew they were not entitled to obtain through the letters. Instead, we believe the misuses and the problems we found were the product of mistakes, carelessness, confusion, sloppiness, lack of training, lack of adequate guidance, and lack of adequate oversight. Yet, I do not believe that any of these observations excuse the FBI's widespread and serious misuse of its national security letter authorities. When the Patriot Act enabled the FBI to obtain sensitive information through NSLs on a much larger scale, the FBI should have established sufficient controls and oversight to ensure the proper use of these authorities. The FBI did not do so. The FBI's failures, in my view, were serious and unacceptable. I would now like to highlight our review's main findings, which are detailed in the OIG's 126-page report. 2. OIG Findings Our review found that, after enactment of the Patriot Act, the FBI's use of national security letters increased dramatically. In 2000, the last full year prior to passage of the Patriot Act, the FBI issued approximately 8,500 NSL requests. It is important to note that one national security letter may request information about multiple telephone numbers or e-mail addresses. Because the FBI's semiannual classified reports to Congress provide the number of requests rather than the number of letters, we also focused on the total number of requests. After the Patriot Act, the number of NSL requests issued by the FBI increased to approximately 39,000 in 2003, approximately 56,000 in 2004, and approximately 47,000 in 2005. In total, during the 3-year period covered by our review, the FBI issued more than 143,000 NSL requests. However, we believe that these numbers, which are based on information from the FBI's database, understate the total number of NSL requests issued by the FBI. During our review, we found that the FBI database used to track these requests is inaccurate and does not include all NSL requests. First, when we compared information from the database to the documents contained in investigative case files in the 4 FBI field offices that we visited, we found approximately 17 percent more NSL letters and 22 percent more NSL requests in the case files than we could find in the FBI database. In addition, we determined that many NSL requests were not included in the Department's reports to Congress because of the FBI's delays in entering NSL information into its database. We also found problems and incorrect data entries in the database that caused NSLs to be excluded from the Department's reports to Congress. Therefore, based on shortcomings in the FBI's NSL database and its reporting processes, we concluded that the Department's semiannual classified reports to Congress on NSL usage were inaccurate and significantly understated the total number of NSL requests during the review period. Our report also provides breakdowns on the types of NSLs used by the FBI. We determined that, overall, approximately 73 percent of the total number of NSL requests were used in counterterrorism investigations and 26 percent in counterintelligence cases. In addition, our review found that the percentage of NSL requests that related to investigations of U.S. persons increased from about 39 percent of all NSL requests in 2003 to about 53 percent in 2005. As directed by the Patriot Reauthorization Act, our review attempted to assess the effectiveness of national security letters. NSLs have various uses, including to develop evidence to support applications for orders issued under the Foreign Intelligence Surveillance Act (FISA), develop links between subjects of FBI investigations and other individuals, provide leads and evidence to allow FBI agents to initiate or close investigations, and corroborate information obtained by other investigative methods. FBI personnel told the OIG that NSLs are indispensable investigative tools in many counterterrorism and counterintelligence investigations, and they provided us with examples and evidence of their importance to these investigations. We determined that information obtained from NSLs is also used in FBI analytical intelligence products that are shared within the FBI and with DOJ components, Joint Terrorism Task Forces, other federal agencies, and other members of the intelligence community. In addition, information obtained from NSLs is stored in FBI databases such as its Automated Case Support system and its Investigative Data Warehouse. However, because information is not tagged or identified in FBI files or databases as derived from NSLs, we could not determine the number of times that NSLs were used in such analytical products, shared with other agencies, or used in criminal cases. As also directed by the Patriot Reauthorization Act, the OIG review examined whether there were any ``improper or illegal uses'' of NSL authorities. We found that from 2003 through 2005, the FBI identified 26 possible intelligence violations involving its use of NSLs, 19 of which the FBI reported to the President's Intelligence Oversight Board (IOB). Of the 26 possible violations, 22 were the result of FBI errors, while 4 were caused by mistakes made by recipients of the NSLs. These possible violations included the issuance of NSLs without proper authorization, improper requests under the statutes cited in the NSLs, and unauthorized collection of telephone or Internet e-mail transactional records. For example, in three of these matters the FBI obtained the information without issuing national security letters. One of these three matters involved receipt of information when there was no open national security investigation. In another matter, the FBI issued national security letters seeking consumer full credit reports in a counterintelligence investigation, which the NSL statutes do not permit. In other matters, the NSL recipient provided more information than was requested in the NSL, or provided information on the wrong person, either due to FBI typographical errors or errors by the recipients of NSLs. In addition to the possible violations reported by the FBI, we reviewed FBI case files in four field offices to determine if there were unreported violations of NSL authorities, Attorney General Guidelines, or internal FBI policies governing the approval and use of NSLs. Our review of 293 national security letters in 77 files found 22 possible violations that had not been identified or reported by the FBI. The violations we found fell into three categories: improper authorization for the NSL, improper requests under the pertinent national security letter statutes, and unauthorized collections. Examples of the violations we identified include issuing NSLs for consumer full credit reports in a counterintelligence case, which is not statutorily permitted; issuing an NSL for a consumer full credit report when the FBI Special Agent in Charge had approved an NSL for more limited credit information under a different NSL authority; issuing an NSL when the investigation had lapsed; and obtaining telephone toll billing records for periods in excess of the time period requested in the NSL due to third-party errors. Thus, it is significant that in the limited file review we conducted of 77 investigative files in 4 FBI field offices, we identified nearly as many NSL-related violations (22) as the total number of possible violations that the FBI had identified (26) in reports from all FBI Headquarters and field divisions over the entire 3-year period. Moreover, 17 of the 77 files we reviewed, or 22 percent, had 1 or more violations. We have no reason to believe that the number of violations we identified in the four field offices we visited was skewed or disproportionate to the number of possible violations in other files. This suggests that a large number of NSL-related violations throughout the FBI have not been identified or reported by FBI personnel. Our examination of the violations we identified did not reveal deliberate or intentional violations of the NSL statutes, the Attorney General Guidelines, or FBI policy. We believe that some of these violations demonstrated FBI agents' confusion and unfamiliarity with the constraints on national security letter authorities. We also believe that many of the violations occurred because FBI personnel do not consistently cross check the NSL approval documentation with the proposed NSLs, or verify upon receipt that the information supplied by the recipient matches the request. Other violations demonstrated inadequate supervision over use of these authorities. We examined the FBI investigative files in the four field offices to determine whether FBI case agents and supervisors had adhered to FBI policies designed to ensure appropriate supervisory review of the use of NSL authorities. We found that 60 percent of the investigative files we examined contained one or more violations of FBI internal policies relating to national security letters. These included failures to document supervisory review of NSL approval memoranda and failures to include in NSL approval memoranda required information, such as the authorizing statute, the status of the investigative subject, or the number or types of records requested. In another finding, our review determined that the FBI Headquarters Counterterrorism Division generated over 300 NSLs exclusively from ``control files'' rather than from ``investigative files,'' in violation of FBI policy. When NSLs are issued from control files, the NSL documentation does not indicate whether the NSLs are issued in authorized investigations or whether the information sought in the NSLs is relevant to those investigations. This documentation is necessary to establish compliance with NSL statutes, Attorney General Guidelines, and FBI policies. In addition, we found that the FBI had no policy requiring the retention of signed copies of national security letters. As a result, we were unable to conduct a comprehensive audit of the FBI's compliance with its internal control policies and the statutory certifications required for NSLs. In one of the most troubling findings, we determined that from 2003 through 2005 the FBI improperly obtained telephone toll billing records and subscriber information from 3 telephone companies pursuant to over 700 so-called ``exigent letters.'' These letters generally were signed by personnel in the Communications Analysis Unit (CAU), a unit of the Counterterrorism Division in FBI Headquarters, and were based on a form letter used by the FBI's New York Field Division in the criminal investigations related to the September 11 attacks. The exigent letters signed by the CAU typically stated: Due to exigent circumstances, it is requested that records for the attached list of telephone numbers be provided. Subpoenas requesting this information have been submitted to the U.S. Attorney's Office who will process and serve them formally to [information redacted] as expeditiously as possible. These letters were signed by CAU Unit Chiefs, CAU special agents, and subordinate personnel, none of whom were delegated authority to sign NSLs. Our review found that that the FBI sometimes used these exigent letters in non-emergency circumstances. In addition, the FBI failed to ensure that there were duly authorized investigations to which the requests could be tied. The exigent letters also inaccurately represented that the FBI had already requested subpoenas for the information when, in fact, it had not. The FBI also failed to ensure that NSLs were issued promptly to the telephone companies after the exigent letters were sent. Rather, in many instances, after obtaining records from the telephone companies the FBI issued national security letters many months after the fact to ``cover'' the information obtained. As our report describes, we were not convinced by the legal justifications offered by the FBI during our review for the FBI's acquisition of telephone toll billing records and subscriber information in response to the exigent letters without first issuing NSLs. The first justification offered was the need to reconcile the strict requirements of the NSL statute with the FBI's mission to prevent terrorist attacks. While the FBI's counterterrorism mission may require streamlined procedures to ensure the timely receipt of information in genuine emergencies, the FBI needs to address the problem by expediting the issuance of national security letters or by seeking legislative modification to the voluntary emergency disclosure provision in the Electronic Communications Privacy Act (ECPA), not through these exigent letters. Moreover, the FBI's justification for the exigent letters was undercut because they were used in non- emergency circumstances, not followed in many instances within a reasonable time by the issuance of NSLs, and not catalogued in a fashion that would enable FBI managers or anyone else to review the practice or the predication required by the NSL statute. In sum, we concluded that the FBI's use of these letters inappropriately circumvented the requirements of the NSL statute, and violated Attorney General Guidelines and FBI policies. As directed by the Patriot Reauthorization Act, our report also describes several other ``noteworthy facts or circumstances'' we identified in the review. For example, we found that the FBI did not provide clear guidance describing how FBI case agents and supervisors should apply the Attorney General Guidelines' requirement to use the ``least intrusive collection techniques feasible'' during national security investigations to the use and sequencing of national security letters. In addition, we saw indications that some FBI lawyers in field offices were reluctant to provide an independent review of NSL requests because these lawyers report to senior field office managers who already had approved the underlying investigations. D. Recommendations To help the FBI address these significant findings, the OIG made a series of recommendations, including that the FBI improve its database to ensure that it captures timely, complete, and accurate data on NSLs; that the FBI take steps to ensure that it uses NSLs in full accord with the requirements of national security letter authorities; and that the FBI issue additional guidance to field offices that will assist in identifying possible violations arising from use of NSLs. The FBI concurred with all of the recommendations and agreed to implement corrective action. We believe that the Department and the FBI are taking the findings of the report seriously. In addition to concurring with all our recommendations, the FBI and the Department have informed us that they are taking additional steps to address the problems detailed in the report. For example, the FBI's Inspection Division has initiated audits of a sample of NSLs issued by each of its 56 field offices. It is also conducting a special inspection of the exigent letters sent by the Counterterrorism Division to three telephone companies to determine how and why that occurred. The FBI's Office of the General Counsel is also consolidating its guidance on NSLs, providing additional guidance and training to its field-based Chief Division Counsel on their role in approving NSLs, and working to develop a new web-based NSL tracking database. In addition to the FBI's efforts, we have been told that the Department's National Security Division will be actively engaged in oversight of the FBI's use of NSL authorities. As required by the Patriot Reauthorization Act, the OIG will continue to review the FBI's use of national security letters. We are required by the Act to issue another report by the end of this year on the FBI's use of NSLs in 2006. In addition, we intend to monitor the actions that the FBI and the Department have taken and are taking to address the problems we found in our first review. II. THE OIG'S SECTION 215 REPORT In the last section of my statement, I want to summarize briefly the OIG's second report, which examined the FBI's use of Section 215 orders to obtain business records. Section 215 of the Patriot Act allows the FBI to seek an order from the FISA Court to obtain ``any tangible thing,'' including books, records, and other items, from any business, organization, or entity provided the item or items are for an authorized investigation to protect against international terrorism or clandestine intelligence activities. Section 215 of the Patriot Act did not create new investigative authority, but instead significantly expanded existing authority found in FISA by broadening the types of records that could be obtained and by lowering the evidentiary threshold to obtain a Section 215 order for business records. Public concerns about the scope of this expanded Section 215 authority centered on the ability of the FBI to obtain library records, and many public commentators began to refer to Section 215 as the ``library provision.'' Our review found that the FBI and the Department's Office of Intelligence Policy and Review (OIPR) submitted to the FISA Court two different kinds of applications for Section 215 orders: ``pure'' Section 215 applications and ``combination'' Section 215 applications. A ``pure'' Section 215 application is a term used to refer to a Section 215 application for any tangible item which is not associated with an application for any other FISA authority. A ``combination'' Section 215 application is a term used to refer to a Section 215 request that was added to a FISA application for pen register/trap and trace orders, which identify incoming and outgoing telephone numbers called on a particular line. In a combination order, the Section 215 request was added to the pen register/trap and trace application in order to obtain subscriber information related to the telephone numbers. We found that from 2002 through 2005 the Department, on behalf of the FBI, submitted to the FISA Court a total of 21 pure Section 215 applications and 141 combination Section 215 applications. We found that the first pure Section 215 order was approved by the FISA Court in spring 2004, more than 2 years after enactment of the Patriot Act. The FISA Court approved six more pure Section 215 applications that year, for a total of seven in 2004. The FISA Court approved 14 pure Section 215 applications in 2005. Examples of the types of business records that were obtained through pure Section 215 orders include driver's license records, public accommodations records, apartment records, and credit card records. We also determined that the FBI did not obtain Section 215 orders for any library records from 2002 through 2005 (the time period covered by our review). The few applications for Section 215 orders for library records that were initiated in the FBI during this period were withdrawn while undergoing the review process within the FBI and the Department. None were submitted to the FISA Court. With respect to how information from Section 215 orders was used, we found no instance where the information obtained from a Section 215 order resulted in a major case development such as disruption of a terrorist plot. We also found that very little of the information obtained in response to Section 215 orders has been disseminated to intelligence agencies outside the DOJ. However, FBI personnel told us they believe that the kind of intelligence gathered from Section 215 orders is essential to national security investigations. They also stated that the importance of the information is sometimes not known until much later in an investigation, when the information is linked to some other piece of intelligence. FBI officials and Department attorneys also stated that they believe Section 215 authority is useful because it is the only compulsory process for certain kinds of records that cannot be obtained through alternative means. We did not identify any instances involving ``improper or illegal use'' of a pure Section 215 order. We did find problems with two combination Section 215 orders. In one instance, the FBI inadvertently collected information from a telephone number that no longer belonged to the target of the investigation. In another instance, the FBI received information from a telephone that was no longer connected to the subject because of a mistake by the telephone company. We also found that the FBI has not used Section 215 orders as effectively as it could have because of legal, bureaucratic, or other impediments to obtaining these orders. For example, after passage of the Patriot Act in October 2001, neither the Department nor the FBI issued implementing procedures or guidance with respect to the expansion of Section 215 authority for a long period of time. In addition, we found significant delays within the FBI and the Department in processing requests for Section 215 orders. We also determined through our interviews that FBI field offices do not fully understand Section 215 orders or the process for obtaining them. III. CONCLUSION In sum, our review of national security letters revealed that, in various ways, the FBI violated the national security letter statutes, Attorney General Guidelines, or FBI internal policies governing their use. While we did not find that the violations were deliberate, we believe the misuses were widespread and serious. Finally, I also want to note that the FBI and the Department cooperated fully with our review. In addition, the FBI and the Department agreed to declassify important aspects of the report to permit a full and fair airing of the issues we describe in the report. They have also acknowledged the problems we found and have not attempted to cover up the deficiencies. The FBI and the Department also appear to be taking the findings of the report seriously, and appear committed to correcting the problems we identified. We believe that these serious and ongoing efforts are necessary to ensure that the FBI's use of national security letter authorities to obtain sensitive information is conducted in full accord with the NSL statutes, Attorney General Guidelines, and FBI policies. That concludes my testimony, and I would be pleased to answer any questions. ATTACHMENTMr. Conyers. Thank you, Attorney General. Will the person in the back row, standing up, please sit down or leave this Committee room? I am now pleased to welcome the General Counsel for the Federal Bureau of Investigation, Ms. Valerie Caproni. Welcome to our Committee. TESTIMONY OF VALERIE CAPRONI, GENERAL COUNSEL, FEDERAL BUREAU OF INVESTIGATION Ms. Caproni. Thank you. Good morning. Mr. Chairman, Ranking Member Smith and Members of the Committee, it is my pleasure to appear before you today to discuss the recent report by the Department of Justice Office of Inspector General regarding the FBI's use of National Security Letters. I have submitted a detailed written statement, and in the interest of time, I will stress only a few points. The IG's report is a fair report that acknowledges the importance of National Security Letters to the ability of the FBI to keep the country safe and the difficult environment in which our employees have been working since 9/11. The IG found no deliberate or intentional misuse of the National Security Letter authorities, AG guidelines or FBI policy. Nevertheless, the IG review identified several areas of inadequate auditing and oversight of these vital investigative tools as well as processes that were simply inappropriate. The FBI fully supports each of the IG's recommendations and have implemented other remedial steps not proposed by the IG. Collectively, these reforms will ensure full compliance with both the letter and the spirit of the law. NSLs generally permit us to obtain the basic building blocks of an investigation from third party businesses. Unlike grand jury subpoenas used in criminal cases, however, National Security Letter authority comes from several distinct statutes, and they have very specific rules that accompany them. The NSL authority used most frequently by the FBI is that provided by the Electronic Communications Privacy Act, or ECPA. Through an ECPA NSL, the FBI can obtain subscriber information for telephone and electronic communications and can obtain toll billing information and electronic communication transaction records. Significantly, the FBI cannot obtain the content of communications through an ECPA NSL. That requires a court order. ECPA NSLs are, by far, the most common NSL that we use. Pursuant to the Right to Financial Privacy Act and the Fair Credit Reporting Act, we also have the authority to issue different types of National Security Letters. The authority to issue an NSL lies at a senior level within the FBI. It can only be issued by an official who ranks not lower than Special Agent in Charge or Deputy Assistant Director. All such officials are career Government employees, and before an NSL can be issued such employees must certify that the information sought is relevant to an authorized national security investigation. As directed by Congress in connection with the IG's report, we endeavor to declassify as much information as possible in order to maximize the transparency of our use of this important national security tool. To that end, for the first time the public has a real sense of the frequency with which the FBI uses National Security Letters. In the period covered by the report, the number of NSL requests--that is, not letters. Remember that one letter can have multiple requests--has ranged from approximately 40,000 to 60,000 per year, and we have requested information on fewer than 20,000 persons per year. For a variety of reasons that will be discussed below, those numbers are not exact. Nevertheless, for the first time, the public can get a sense of the order of magnitude of these requests. There are three findings by the IG that were particularly disturbing to me, and it is those three findings that I wish to address at some length this morning: First, inaccurate reporting to Congress, second, the use of so-called Exigent Letters and, third, violations of law and policy with respect to the usage of NSLs. I am particularly distressed by the fact that the IG found significant inaccuracies in the numbers that we report to Congress. The responsibility to gather the data for congressional reporting lies with my division, and we did not do an acceptable job. The processes we put in place for tabulating NSLs were inadequate, and we had no auditing process in place to catch errors. Although we realized we had a problem prior to the IG's report and were working on a technological solution, that realization came later than it should have, and for that I bear responsibility. At some point several years before I arrived at the FBI, our process for congressional reporting shifted from a totally manual process to a stand-alone database. While the OGC database was a giant technological step forward from 3x5 index cards, it quickly became an unacceptable system given the increase in our use of National Security Letters since 9/11. The OGC database is not electronically connected to ACS, the system from which we derive the data. Instead, there is a manual interface between ACS and the database. An OGC employee is responsible for taking every NSL lead that is sent to OGC and manually entering the information into our database. Nearly a dozen fields must be manually entered, including the file number of the case in which the NSL was issued, which is typically at least 15 digits and letters. Needless to say, human error creeps in. Approximately a year ago when we were unable to tick and tie numbers in the database to previously reported numbers, we recognized that our technology was woefully inadequate. We began at that point to develop an automated system to improve our ability to collect this data. That system, in addition to improving data collection, will automatically prevent many of the errors in NSLs that we will discuss today by automating much of the work associated with preparing NSLs. The system will also allow us to automatically ensure that required reporting data is accurately collected. The NSL system is being designed so that the FBI employee requesting an NSL will enter data only once. For example, an agent or an analyst who wishes to get telephone toll billing records will only have to tell the system that he is seeking an ECPA NSL for toll records and type the telephone number once. The system will then automatically populate the appropriate fields in the NSL in the authorizing electronic communication. The system will ensure that the two documents match exactly, and it will minimize the opportunity for transcription errors that gave rise to unauthorized collections. Agents and analysts will still be required to provide the narrative necessary to explain why the NSL is being sought, the factual basis for making the determination that the information is relevant to an appropriately predicated national security investigation and the factual basis for any determination that the NSL should include a nondisclosure provision. We are optimistic that we will be able to pilot the system this summer and roll it out to all of the field offices by the end of the year. At that point, I will be much more confident that in the future the data we provide to Congress is as accurate as humanly possible. In the meantime, we are taking several steps to correct the numbers we have previously reported. We have discussed our methodology with the IG, and we will offer him the opportunity to review our work. We are striving to have the corrected reports to Congress as soon as possible. The next significant finding of the IG I would like to discuss this morning involves the use within one unit at headquarters of so-called Exigent Letters. These letters, which numbered in excess of 700, were provided to telephone companies with requests for toll billing information. All of the letters stated that there were exigent circumstances, and many stated the Federal grand jury subpoenas had been requested for the records even though in fact no such requests for grand jury subpoenas had been made. From an audit and an internal control perspective, the FBI did not document the nature of the emergency circumstances, did not keep copies of all of the Exigent Letters it provided to the telephone companies and did not keep records to track whether it had subsequently provided further legal process. Moreover, some employees told the IG that there was not always an emergency relating to the documents that were sought. OGC has been working with the affected unit to attempt to reconcile the documentation and to ensure that any telephone record that we have in an FBI database was obtained because it was relevant to an authorized investigation and that the appropriate legal process has now been provided. If we are unable to determine the investigation to which a number relates, it will be removed from our database, and the records will be destroyed. The IG rightfully objected to the FBI's obtaining telephone records with a letter that stated that a Federal grand jury subpoena had been requested when that was untrue. It is unclear why that happened. The Director has ordered a special inspection in order to better understand the full scope of internal control failures and to make sure that, in fact, every record obtained pursuant to a so-called Exigent Letter has been appropriately connected to a national security investigation. That review will also determine whether the practice discussed by the IG existed anywhere other than in the headquarters unit identified in the report. In response to the obvious internal control lapses this situation highlights, changes have already been made to ensure that this situation does not recur. Any agent who needs to obtain ECPA-protected records on an emergency basis must do so pursuant to 18 USC, section 2702. Section 2702 permits a carrier to provide information regarding its customers to the Government if the provider believes in good faith that there is a life or death type emergency that requires disclosure of the records. By FBI policy, a request for disclosure pursuant to that provision generally must be in writing and must clearly state that the disclosure without legal process is at the provider's option. The emergency must also be documented to our files so that the use of the letter can be audited. The policy allows for oral requests, but any oral requests have to be approved and documented to the file. The IG also examined the misuse of NSLs that had been reported and some that had not as part of the IOB process. As this Committee knows, pursuant to executive order, the President has an Intelligence Oversight Board that receives from the intelligence community the reports of intelligence activities that the agency believes may have been unlawful or contrary to executive order or presidential directive. The IG found that from 2003 to 2005 the FBI had self- reported 26 potential violations involving NSL authorities. The IG also found, however, a number of potential IOBs in the files it examined that had not been reported to OGC for adjudication. Although press accounts of this report have implied that the IG found massive abuses of the NSL authorities, a careful read of the report does not bear out the headlines. The IG examined 293 NSLs, a reasonably small, non-random sample. We do not suggest that the sample was not a fair sample but only point out that it is questionable from a statistical standpoint to attempt to extrapolate from a very small sample to an entire population. Of the 293 NSLs the IG examined, 22 were judged to have a potential unreported violation associated with them. Of that 7 percent, 10, or almost 50 percent of that group, were third party errors. That is, the NSL recipient provided the FBI with information that we did not seek. Only 12 of the NSLs examined, or 4 percent of the total group, had mistakes that the IG rightfully attributes to the FBI. Examining the 12 potential errors that were attributable to the FBI reveals a continuum of seriousness relative to the potential impact of individual rights. Four of them, or just over 1 percent of the sample, were unquestionably serious violations. Specifically, two of the violations involved obtaining full credit reports and counterintelligence investigations, which is not statutorily authorized. One involved issuing a National Security Letter when the authorization for the investigation to which it related had lapsed, and one involved issuing an NSL for information that was arguably content and, therefore, not available pursuant to NSL. The remaining eight potential errors involved lack of attention to detail and did not involve the FBI's seeking or obtaining any information to which it was not entitled. We do not excuse lack of attention to detail, and I have admonished the lawyers in the field who review NSLs that they must be careful so that they can avoid this sort of error, but we do believe that such mistakes pose different challenges and risks than seeking information to which you are not entitled. In short, approximately 1 percent of the NSLs examined by the IG had significant errors that were attributable to FBI actions and that had not been but should have been reported as potential IOB violations. A 1-percent error rate is not acceptable, and we have taken steps to reduce it. Those steps are discussed at length in my written testimony, and I will not repeat them here. But among the steps I do want to mention is that the Director has ordered a special inspection of all field offices' use of National Security Letters, an inspection that began on Friday. We offer to fully brief the Committee on the results of that inspection when it is complete. Several of the actions we are taking involve changes to FBI rules and policy. Rules will, of course, only eliminate errors if they are followed. The IG's report has painfully demonstrated for us that, while we are good at establishing policy and setting rules, we are not as good as we must be at establishing internal controls and auditing functions to make sure that the rules are followed. The full parameters of an FBI compliance program have not been set, and the inspection that is currently underway will clearly influence the parameters of the program. In short order, however, the FBI will establish a vigorous, multidisciplinary compliance program that assures as well as any compliance program can that our employees faithfully adhere to all of our rules and policies, particularly those that are designed to protect privacy and civil liberties. The FBI is acutely aware that the only way we can achieve our mission of keeping the country safe is if we are trusted by all segments of the American public. With events like the London terror attack of 2 years ago, we are all worried about the risk of a catastrophic attack from homegrown terrorists. Our single best defense against such an attack is the eyes and ears of all Americans, but particularly in those segments of the population in which the risk of radicalization is at its highest. We need people in those communities to call us when they hear or see something that looks amiss. We know that we reduce the probability of that call immeasurably if we lose the confidence of any part of the American public. Mr. Conyers. Counsel, can you wind down at this point? Ms. Caproni. Yes, sir. We will put into place a compliance program to maximize the probability that we do not lose the confidence of the American public by dint of the sort of errors highlighted in this report. I appreciate the opportunity to appear before the Committee and look forward to answering your questions. Thank you. [The prepared statement of Ms. Caproni follows:] Prepared Statement of Valerie Caproni Good morning Mr. Chairman, Ranking Member Smith, and Members of the Committee. It is my pleasure to appear before you today to discuss the recent report by Department of Justice's Office of the Inspector General (OIG) regarding the FBI's use of national security letters (NSLs). The OIG's report is a fair report that acknowledges the importance of NSLs to the ability of the FBI to conduct the national security investigations that are essential to keeping the country safe. Importantly, the OIG found no deliberate or intentional misuse of the national security letter authorities, Attorney General Guidelines or FBI policy. Nevertheless, the OIG review identified several areas of inadequate auditing and oversight of these vital investigative tools, as well as processes that were inappropriate. Although not intentionally, we fell short in our obligations to report to Congress on the frequency with which we use this tool and in the internal controls we put into place to make sure that it was used only in accord with the letter of the law. Director Mueller concluded from the OIG's findings that we must redouble our efforts to ensure that there is no repetition of the mistakes of the past in the use of these authorities and I share his commitment. I would also like to acknowledge the role of Congress and the effectiveness of congressional oversight in surfacing the deficiencies raised in this audit, which was called for in the USA PATRIOT Improvement and Reauthorization Act. The report made ten recommendations in response to the findings, designed to provide both the necessary controls over the issuance of NSLs and the creation and maintenance of accurate records. The FBI fully supports each recommendation and concurs with the Inspector General that, when implemented, these reforms will ensure full compliance with both the letter and the spirit of the authorities entrusted to the Bureau. NATIONAL SECURITY LETTERS National Security Letters generally permit us to obtain the same sort of documents from third party businesses that prosecutors and agents obtain in criminal investigations with grand jury subpoenas. Unlike grand jury subpoenas, however, NSL authority comes through several distinct statutes and they have specific rules that accompany them. NSLs have been instrumental in breaking up cells like the ``Portland Seven,'' the ``Lackawanna Six,'' and the ``Northern Virginia Jihad.'' Through the use of NSLs, the FBI has traced sources of terrorist funding, established telephone linkages that resulted in further investigation and arrests, and arrested suspicious associates with deadly weapons and explosives. NSLs allow the FBI to link terrorists together financially, and pinpoint cells and operatives by following the money. The NSL authority used most frequently by the FBI is that provided by the Electronic Communications Privacy Act (ECPA). Through an ECPA NSL, the FBI can obtain subscriber information for telephones and electronic communications and can obtain toll billing information and electronic communication transaction records. Significantly, the FBI cannot obtain the content of communications through an ECPA NSL. Although the exact numbers of ECPA NSLs remains classified, it is the most common NSL authority used. Pursuant to the Right to Financial Privacy Act (RFPA), the FBI also has the authority to issue NSLs for financial records from a financial institution. RFPA NSLs are used commonly in connection with investigations of potential terror financing. Pursuant to the Fair Credit Reporting Act, the FBI has the authority to issue three different, but related, types of NSLs to credit reporting agencies: an NSL pursuant to 15 U.S.C. 1681u(a) for the names of financial institutions with which the subject has or has had an account; an NSL pursuant to 15 U.S.C. 1681u(b) for consumer identifying information (name, address, former addresses, employment and former employment); an NSL pursuant to 15 U.S.C. 1681v for a full credit report. Of all the FBI's NSL authorities, only the last of the FCRA authorities is restricted to use only in international terrorism cases. Finally, the FBI has the authority to issue NSLs pursuant to the National Security Act in the course of investigations of improper disclosure of classified information by government employees. For the first 3 types of NSLs (ECPA, RFPA, FCRA) the NSL must include a certification by an authorized FBI employee that the material is being sought for an authorized national security investigation. That certification is slightly different in the case of a FCRA NSL for a full credit report, where the certification required is that the information is relevant to an international terrorism investigation. The authority to issue an NSL lies at a senior level within the FBI. An NSL can be issued only by an official who ranks not lower than Special Agent in Charge or Deputy Assistant Director. All such officials are career government employees who are members of the Senior Executive Service. Procedurally, an agent or analyst seeking an NSL must prepare a document (an electronic communication or EC) in which the employee lays out the factual predicate for the request. The factual recitation must be sufficiently detailed so that the approving official can determine that the material sought is relevant to an investigation. Additionally, it needs to provide sufficient information concerning the underlying investigation so that reviewing officials can confirm that the investigation is adequately predicated and not based solely on the exercise of First Amendment rights. Finally, the EC includes a ``lead'' to the Office of the General Counsel (OGC) for purposes of Congressional reporting. OIG REPORT As directed by Congress, we endeavored to declassify as much information as possible concerning our use of NSLs in order to allow the maximum amount of public awareness of the extent of our use of the NSL tool consistent with national security concerns. To that end, for the first time the public has a sense of the frequency with which the FBI makes requests for data with national security letters. In the period covered by the report, the number of NSL requests has ranged from approximately 40,000 to 60,000 per year and we have requested information on less than 20,000 persons per year. For a variety of reasons that will be discussed below, those numbers are not exact. Nevertheless, they, for the first time, allow the public to get some sense of the order of magnitude of these requests; there are a substantial number of requests, but we are not collecting information on hundreds of thousands of Americans. There are three findings by the OIG that are particularly disturbing, and it is those three findings that I wish to address this morning: (1) inaccurate reporting to Congress of various data points we are obligated to report relative to NSLs; (2) the use of so-called exigent letters that circumvented the procedures required by ECPA; and (3) known violations (both previously self-reported by FBI and not previously reported) of law and policy with regard to usage of NSLs. CONGRESSIONAL REPORTING A finding of the report that particularly distresses me is the section that addresses the inaccuracies of the numbers we report to Congress. That responsibility lies with my division, and we did not do an acceptable job. The process for tabulating NSLs simply did not keep up with the volume. Although we came to that realization prior to the OIG report and are working on a technological solution, that realization came later than it should have. At some point several years before my tenure at the FBI began, our process for tracking NSLs for Congressional reporting purposes shifted from a totally manual process, where NSL data was written on index cards, to a standalone Access database. This database is referred to in the OIG report as the OGC database. While the OGC database was a giant technological step forward from 3 x 5 index cards, it is not an acceptable system given the significant increase in use of NSLs since 9/11. First and foremost, the OGC database is not electronically connected to ACS, the system from which we derive the data. Instead, there is a manual interface between ACS and the OGC database. An OGC employee is responsible for taking every NSL lead that is sent to OGC and manually entering the pertinent information into the OGC database. Nearly a dozen fields must be manually entered, including the file number of the case in which the NSL was issued (typically 15 digits and alphanumeric identifiers). Approximately a year ago we recognized that our technology was inadequate and began developing an automated system to improve our ability to collect this data. The system, in addition to improving data collection, will automatically prevent many of the errors in NSLs that we will discuss today. We are building an NSL system to function as a workflow tool that will automate much of the work that is associated with preparing NSLs and the associated paperwork. The NSL system is designed to require the user to enter certain data before the workflow can proceed and requires specific reviews and approvals before the request for the NSL can proceed. Through this process, the FBI can automatically ensure that certain legal and administrative requirements are met and that required reporting data is accurately collected. For example, by requiring the user to identify the investigative file from which the NSL is to be issued, the system will be able to verify the status of that file to ensure that it is still open and current (e.g. request date is within six months of the opening or an extension has been filed for the investigation) and ensure that NSLs are not being requested out of control or administrative files. The system will require the user to separately identify the target of the investigative file and the person whose records are being obtained through the requested NSL, if different. This will allow the FBI to accurately count the number of different persons about whom we gather data through NSLs. The system will also require that specific data elements be entered before the process can continue, such as requiring that the target's status as a United States Person or non-United States Person be entered. The system will not permit requests containing logically inconsistent answers to proceed. The NSL system is being designed so that the FBI employee requesting an NSL will enter data only once. For example, an agent or analyst who wishes to get telephone toll billing records will only have to prompt the system that he is seeking an ECPA NSL for toll records and type the telephone number once. The system will then automatically populate the appropriate fields in the NSL and the authorizing EC. The system will then generate both the NSL and the authorizing EC for signature, thereby ensuring that the two documents match exactly and minimizing the opportunity for transcription errors that give rise to unauthorized collections that must be reported to the Intelligence Oversight Board (IOB). Agents and analysts will still be required to provide the narrative necessary to explain why the NSL is being sought, the factual basis for making a determination that the information is relevant to an appropriately predicated national security investigation, and the factual basis for a determination whether the NSL should include a non-disclosure provision. In addition, this system will have a comprehensive reporting capability. We began working with developers on the NSL system in February 2006 and we are optimistic that we will be able to pilot it this summer and roll it out to all field offices by the end of the year. At that point, I will be confident the data we provide to Congress in future reports is as accurate as humanly possible. In the meantime, we are taking several steps to correct the numbers we have previously reported. First, we are making data corrections in our database. Through a computer program, we have identified all entries that must be erroneous because there is an apparent error in the entry (e.g., there are more NSLs reported than requests; the date shows a year that is impossible (203)). We are manually reviewing those entries and making corrections. We have also started a random sampling of ten percent of the total entries in the OGC database which contains approximately 64,000 entries. Those entries will be manually checked against ACS. We will determine whether there is a significant difference between the entries in our database and the actual information in ACS. To the extent there is a difference, that will be the factor that will be used to correct our prior reporting. While not yielding an exact count, we believe that to be a statistically appropriate way of correcting prior reporting. We have discussed this methodology with the OIG and will offer it the opportunity to review our work. We are striving to have corrected reports to Congress as soon as possible. As with the other shortcomings identified by the OIG, there was no finding of an intent to deceive Congress concerning our use of NSLs. In fact, as noted, we identified deficiencies in our system for generating data prior to the initiation of the OIG's review and flagged the issue for Congress almost one year ago. While we do not know the extent of the inaccuracies in past reporting, we are confident that the numbers will not change by an order of magnitude. EXIGENT LETTERS The next significant finding of the OIG involved the use within one unit at Headquarters of so-called ``exigent letters.'' These letters, which numbered in excess of 700, were provided to telephone companies with requests for toll billing information regarding telephone numbers. All of the letters stated that there were exigent circumstances. Many of the letters stated that federal grand jury subpoenas had been requested for the records even though in fact no such request for grand jury subpoenas had been made, while others promised future national security letters. From an audit and internal control perspective, the FBI did not document the nature of the emergency circumstances that led it to ask for toll records in advance of proper legal process, did not keep copies of all of the exigent letters it provided to the telephone companies, and did not keep records showing that it had subsequently provided either the legal process promised or any other legal process. Further, based on interviews the OIG conducted, some employees indicated that there was not always any emergency relating to the documents that were sought. OGC has been working with the affected unit to attempt to reconcile the documentation and to ensure that any telephone record we have in an FBI database was obtained because it was relevant to an authorized investigation and that appropriate legal process has now been provided. As of late last week, there were still a small handful of telephone numbers that had not been satisfactorily tied to an authorized investigation. If we are unable to determine the investigation to which those telephone numbers relate, they will be removed from our database and destroyed. The OIG rightfully objected to the FBI obtaining telephone records by providing a telephone carrier with a letter that states that a federal grand jury subpoena had been requested when that was untrue. It is unclear at this point why that happened. The Director has ordered a special inspection in order to better understand the full scope of internal control lapses. We also concur with the OIG that it is inappropriate to obtain records on the basis of a purported emergency if, in fact, there is no emergency. We continue to believe, however, that providers had the right to rely on our representation that there was an emergency and that the ``exigent letters''--had they been issued only when there was an exigent circumstance and had they correctly identified the legal process that would follow--would have been an appropriate tool to use. In response to the obvious internal control lapses this situation highlights, changes have already been made to ensure that this situation does not recur. Any agent who needs to obtain ECPA-protected records on an emergency basis must now do so pursuant to 18 U.S.C. 2702. Section 2702(c)(4) permits a carrier to provide information regarding its customers to the government if the provider in good faith, believes that an emergency involving danger of death or serious physical injury to any person requires disclosure without delay of information relating to the emergency. A request for disclosure pursuant to that statute generally must be in writing and must clearly state that the disclosure without legal process is at the provider's option. The letter request must also set out the basic facts of the emergency so that the provider can make some assessment whether it concurs that there is an emergency. INTELLIGENCE OVERSIGHT BOARD PROCESS The OIG also examined misuse of NSLs that had been reported (and some that had not been reported) as part of the IOB process. As this committee knows, pursuant to Executive Order 12863 the President has an Intelligence Oversight Board that receives from the agencies in the intelligence community reports of intelligence activities that the agency believes may have been unlawful or contrary to Executive Order or Presidential Directive. This language is interpreted by the FBI and DOJ to mandate the reporting of any violation of a provision of the Attorney General's Guidelines for FBI National Security Investigations and Foreign Intelligence Collection if such provision is designed to ensure the protection of individual rights. The FBI requires its employees to report any violations of law or policy about which they are aware. We encourage employees to err on the side of reporting so that we can be sure that all violations are appropriately reported. In terms of process, all potential violations (called PIOBs--or potential intelligence oversight board violations) are reported to OGC. Lawyers within OGC are responsible for ``adjudicating'' the violation--that is, determining whether the PIOB is an actual Intelligence Oversight Board violation. If it is, a report is made to the IOB, a copy is provided to DOJ and a copy is provided to the FBI's Inspection Division. If the violation involved intentional misconduct, the Inspection Division will determine whether the matter should be referred to the Office of Professional Responsibility for discipline. The OIG found that from 2003 through 2005, the FBI had self- reported 26 potential violations involving NSL authorities. Of the 26, OGC adjudicated 19 to be violations and reported them. The OIG agreed with each of those determinations. Of the 7 PIOBs that OGC determined were not violations, the OIG agreed with all but one. As to the one determination about which we disagreed, upon re-review, the FBI concurred with the OIG that it was a violation that should have been reported and it has since been reported to the IOB. These 20 violations included: third party errors (4), NSLs issued when the authority for the investigation had lapsed (3), obtaining ECPA-protected records without any legal process (3) and obtaining a full credit report in a counterintelligence case (1). The OIG also found, however, a number of potential IOBs in the files it examined that had not been reported to OGC for adjudication. Although press accounts of the reports have implied that the OIG found massive abuses of the NSL authorities by the FBI, a careful read of the report reflects a different set of facts. The OIG examined 293 NSLs--a reasonably small sample. The sample was a judgmental sample and the size was chosen because the audit was extremely labor intensive. We do not suggest that the sample was not a fair sample (although it was not random), but only that it is questionable from a statistical standpoint to attempt to extrapolate from a very small sample to an entire population. Moreover, there was wide variation in the number of purported unreported violations from different field offices. The OIG found 8 potential violations that were unreported in files in both the Philadelphia and Chicago field offices, but only 2 unreported potential violations from files in New York and 4 from San Francisco. We are doing additional follow-up work, but the wide variance between field offices may be a function of the very small sample, or it may indicate that the percentages of potential errors detected are not constant across all field offices. Setting aside questions about whether the sample is representative, I urge you to look closely at the numbers before arriving at the conclusion that there is a systemic problem concerning the use of NSLs. Of the 293 NSLs the OIG examined, 22 (7%) were judged to have potential unreported IOB violations associated with them. Moreover, of that 7%, 10--or almost 50%--were third party errors--that is, the NSL recipient provided the FBI information we did not seek. Only 12 of the NSLs examined--4%--had mistakes that the OIG rightfully attributes to the FBI. Examining the 12 potential errors that were rightfully attributed to the FBI reveals a continuum of seriousness relative to the potential impact on individual rights. Four (or just over 1% of the sample) were serious violations. Specifically, two of the violations involved obtaining full credit reports in counterintelligence investigations (which is not statutorily authorized), one involved issuing an NSL when authorization for the investigation to which it related had lapsed, and one involved issuing an NSL for information that was arguably content, and therefore not available pursuant to an NSL. (In the latter case, the ISP on which the NSL was served declined to produce the requested material so there was, in fact, no collection of information to which we were not entitled.) The balance of the 12 potential violations identified by the OIG do not, in our view, rise to the same level of seriousness as those 4. The remaining 8 involve errors that are best characterized as arising from a lack of attention to detail, and did not result in the FBI seeking or obtaining any information to which it was not entitled. Those 8 potential violations involved errors such as using the wrong certification language in an NSL (although the appropriate certification is not materially different) and having the NSL and the EC seeking the NSL not entirely consistent. We do not excuse such lack of attention to detail, but we do not believe that such mistakes result in or cause a risk to civil liberties. In short, approximately 1% of the NSLs examined by the OIG had significant errors that were attributable to FBI actions and that had not been, but should have been, reported as PIOBs. While a 1% error rate is not huge, it is unacceptable, and we have taken steps to reduce that error rate. First, we are very concerned that of all the potential IOBs involving mistakes in NSLs attributable to the FBI (whether previously reported or not), 3 involved the same mistake: namely, issuing an NSL for a full credit report in a counterintelligence investigation. In order to ensure that this particular error is fully rectified, the FBI ordered all field offices to examine all counterintelligence files in which Fair Credit Report NSLs have been issued since January 1, 2002 in order to ascertain whether the file contains a full credit report. If it does, the credit report must be removed from the file, sequestered with the field office's attorney, and a PIOB must be reported to OGC. The results from that search are due to headquarters by April 16, 2007. Several other steps we have taken will, we believe reduce the likelihood that the FBI will commit the other mistakes in the future. First, as indicated previously, the FBI is developing an automated system to prepare NSLs and their authorizing ECs. That system will reduce to zero mistakes such as having the wrong certification language or inconsistency between the NSL and the EC. It will also ensure that the investigative file out of which the NSL is being issued is open. Finally, it will ensure that an NSL for a full credit report cannot be issued out of a counterintelligence file. Other changes to FBI policy have been made that we believe will facilitate better handling of IOBs and also reduce errors that lead to IOBs. First, last fall we provided comprehensive advice to the field regarding its responsibility towards information obtained as a result of third party errors. That guidance requires all such information to be sequestered and reported to OGC as a PIOB. If the ``over collected'' information is irrelevant to the investigation (e.g., the telephone company transposed a number and provided us records on the wrong telephone account), then it will be destroyed or returned. No such information should be entered into FBI databases. If the information is relevant to the investigation but simply not within the four corners of the NSL, then the information must be sequestered until a new NSL has been issued for the extra data. After the new NSL has been issued, the information can be entered into FBI databases. Secondly, we have collected all the rules and policies on NSLs into one document which will be disseminated to the field. Those rules now mandate that, until the deployment of the automated NSL system, all NSLs and ECs be prepared from the exemplars that are provided on OGC's website. That should eliminate many of the mistakes identified by the OIG. All of these rules will, of course, only reduce or eliminate errors if they are followed. The OIG's report has highlighted for us that there must be some sort of auditing function--above and beyond the IOB process--to systematically ensure that these rules, as well as others that govern our activities in national security investigations are followed. The FBI has historically been very good at establishing policy and setting rules, but we have not been as proactive as we should have been in establishing internal controls and auditing functions. The full parameters of the compliance program have not been set, although these aspects have been: the Inspection Division with participation of DOJ's National Security Division and Privacy and Civil Liberties Office is in the process of a special inspection of NSL usage in all 56 field offices and headquarters. That inspection should uncover any other significant problems with our use of this tool but should also tell us whether there are variances between offices in terms of the numbers and types of errors. The results of the inspection will then inform the program that the Attorney General announced of having teams of DOJ lawyers, FBI lawyers and the Inspection Division periodically audit field offices' use of NSLs. That process will begin in April and should result in at least 15 offices being audited this year. We are also considering other proactive compliance programs in order to develop a program that ensures, to the maximum extent possible, that the rules and policies designed to protect privacy and civil liberties are faithfully adhered to by all of our employees, that we promptly identify and correct any violations of law or policy, and that any information collected erroneously is removed from FBI databases and destroyed. In addition, a working group co-chaired by the Office of the Director of National Intelligence and the CPCLO has been convened to examine how NSL-derived information is used and retained by the FBI. The FBI and DOJ's National Security Division will have a representative on this working group. We welcome the Committee's input as we move forward on these initiatives. The FBI is acutely aware that the only way that we can achieve our mission of keeping the country safe is if we are trusted by all segments of the American public. With events like the London terror attacks of 2 years ago and the Canadian plot to use fertilizer bombs to destroy buildings in Canada in 2006, we have all become worried about the risk of a catastrophic attack from home grown terrorists. Our single best defense against such an attack is the eyes and ears of all Americans--but particularly of those segments of the population in which the risk of radicalization is at its highest. We need people in those communities to call us when they hear or see something that looks amiss. We know that we reduce the probability of that call immeasurably if we lose the confidence of those segments of the population. That is one of the reasons that we are looking for ways to assure all Americans that we are respectful of individual rights, including privacy rights, and that we use the tools that have been provided to us consistent with the rules set out by Congress. I appreciate the opportunity to appear before the Committee and look forward to answering your questions. Mr. Conyers. Well, General Counsel Caproni, I want to thank you for your candor and forthcomingness in coming before us today, and we will include the rest of your testimony, of course. Now let me begin the questioning, and I thank both the witnesses. Inspector General Fine, I am curious as to how you have come to the conclusion that these errors that have been reported and that bring us to this chamber were sloppy--the results of sloppy bookkeeping, recordkeeping or compliance with the law, but none of it was intentional. How could that be if they have known about these excesses since the year 2004, and their Communications Analysis Unit warned them about it in early 2005, and we have something like at least over 700 Exigent Letters and somewhere in the neighborhood of 40,000 to 50,000 NSL letters for 3 years? Mr. Fine. Let me separate some of those issues. I do not believe that they intended to go out and to obtain information that they knew they could not obtain and said, ``We are going to do it anyway.'' I think what they did was complete carelessness; they did not follow the rules, did not follow appropriate procedures, and obtained information that they could have obtained properly but by taking shortcuts. Now, we did not do a review to ask everybody what was in their minds and what exactly they did, but we saw instances where people just simply did not follow the rules and did not take appropriate action. Mr. Conyers. But they were being warned. This did not just come up recently. This goes back to 2004. Mr. Fine. In 2004, it is correct that attorneys in the Office of General Counsel had concerns about the Exigent Letters and were not saying ``stop it,'' but were saying ``we need to take different measures to issue these letters.'' Mr. Conyers. Do you think that the law was so complicated that people in good faith just could not figure out what it was we were requiring? Mr. Fine. I think what they did was inappropriately take a model from another context and apply it to this context, which was wrong--it clearly was--and that they did not think carefully, and they did not take appropriate actions. Now, I know that the FBI is conducting a special inspection to look at exactly what everybody knew and when they knew it and why they took the actions that they did. We did not do that kind of review. We did not ask everybody up and down the line, and it is possible that people had motivations that were not appropriate. Mr. Conyers. But there is no way we can tell. There is no way I can tell, but there is no way you can tell either. Mr. Fine. It is true that we did not do a performance review of every individual, so I think that is an appropriate point, Mr. Chairman--I really do--and I do think it is incumbent upon the FBI to go back and look and see exactly what people were doing, at what stages, and why they did, what they did and take appropriate action to hold people accountable. Mr. Conyers. Now, do you make a distinction between the National Security Letters and the Exigent Letters in terms of the severity of the offense that brings us here today? Mr. Fine. I think I do. I think the Exigent Letters were the most troubling aspect of this. Mr. Conyers. And why is that? Mr. Fine. Because there is a process in the law to allow voluntary disclosures from these telephone companies if there is a true emergency, and we believe the FBI should have followed that voluntary process. Instead, they went with these Exigent Letters, which they used in a different context, and applied it to this context which, in our view, was inappropriate. With regard to the National Security Letters, there were many of them, and many of them did comply with the requirements of the law. We saw, and we tried to do a review to see how many did not. We found a significant number did not, but with regard to the Exigent Letters as a whole, that whole practice was very troubling to us in and of itself. Mr. Conyers. Now, are you satisfied with the steps that have been described here today by the General Counsel in terms of how we clean this mess up? Mr. Fine. Well, we have been briefed by the Department and the FBI about the steps they are taking. I think they are taking this seriously, but I am not in a position right now to say, ``I am completely satisfied. I trust all this.'' We need to see what happens with these steps, see whether there are concerted efforts over time, to see whether they really are adequately implemented. So I cannot say right now that they have done all they can, but I think they are taking important steps and taking this very seriously. Mr. Conyers. I thank you so much. I recognize Lamar Smith. Mr. Smith. Thank you, Mr. Chairman. Mr. Chairman, I am hoping my first question will not count against my time. Mr. Fine, I noticed, in reading your bio that when you were a senior in college and co-captain of the basketball team you were recruited by the San Antonio Spurs. They happen to be my hometown team. My question is this: Don't you regret not playing for the Spurs rather than becoming a Rhodes scholar and graduating from Harvard Law School? Mr. Conyers. The gentleman's time has expired. Mr. Fine. Congressman, I was drafted in the 10th round by the San Antonio Spurs, and if I were maybe a little taller than 59", I might have had a chance to play. So I do not really regret that my future was in the law rather than in professional basketball. But I tell people who do not believe I actually played basketball when they see me at 59" that before I started this job as the IG I was 69". Mr. Smith. A very good answer. Mr. Fine and Ms. Caproni, let me address a more serious question to both of you, and it is this. We have unearthed these problems that are recognized and that are being dealt with, and some of the reasons for those problems have already been seen, and the practice has been discontinued, but my question is this: Do you all feel that the problem is with how the law was enforced rather than with the law itself? In other words, if the law were carried out as intended, doesn't that solve our problem? Mr. Fine first. Mr. Fine. Congressman, I am really not in a position to say what the law should be or if there should be modifications to the law. What my job is is to look at the law and to look at the application of the law and to see the problems that occurred. I do believe that if the FBI had assiduously and carefully applied the law, we would not have seen as many problems as we have, and it really was unacceptable and inexcusable what happened here. Mr. Smith. Ms. Caproni. Ms. Caproni. From our perspective, the problem is not with the law, although I would note that unlike other areas that our agents, where they get these sorts of records, there are very specific rules, and they have to win through those rules. That, in my sense, is our responsibility as the lawyers to make sure that the agents understand what they can do and what they cannot do. Again, there is no doubt that the problem with the National Security Letters was a colossal failure on our part to have adequate internal controls and compliance programs in place. The laws, themselves, provide us with a needed tool, and it is a tool that we should use responsibly. Mr. Smith. Okay. Thank you. Mr. Fine and Ms. Caproni, why are National Security Letters important in our investigation of terrorism? Ms. Caproni. They are critical. National Security Letters provide us the basic building blocks that we need to build an investigation. For those of you who had prior criminal AUSA experience--and I know a number of you did--you are used to issuing grand jury subpoenas to obtain telephone records and banking records. Frequently in terrorism investigations, we do not have an open criminal investigation. In fact, that was one of the things that the 9/11 Commission really encouraged us to do and that this Committee encouraged us to do and the intelligence Committees, to move more--when we are thinking about a terrorism case, to move from simply a criminal mindset to thinking in an intelligence mindset. So a National Security Letter is the tool that we use in order to get the basic building blocks of those investigations, again, like phone records for almost every terrorism case, financial records when we are building terrorism financing cases. So, without National Security Letters, our national security investigations would really be stopped before they even got started. Mr. Smith. Okay. Thank you. Mr. Fine. Mr. Fine. I do think that they are important investigative tools. They can connect terrorist individuals with terrorist groups. They can find out where terrorist financing can occur. They are indispensable in counterintelligence investigations. And the FBI did tell us, from folks in the field to headquarters, how important they were to the investigations and showed us examples of that. I have said that I think they are important. There also needs to be important checks on these tools because they are intrusive, and there is information that is obtained and retained for significant periods of time, and so while they are important investigative tools, there also needs to be appropriate checks on them as well. Mr. Smith. Mr. Fine, in your conclusions--it is the second one--you say, ``In most but not all of the cases we examined in this review, the FBI was seeking information that it could have obtained properly through National Security Letters.'' What percentage would you guess is that? In other words, what percentage of the problems could have been resolved if they had obtained National Security Letters? Mr. Fine. We found instances, a few instances, where they obtained information inappropriately and could not have used a---- Mr. Smith. How many of the 739 would you guess that is? Mr. Fine. Well, the 739 is hard to tell because they could not tie them to appropriate investigations all the time, and there were many times where they could not tell us it was an emergency, so I do not know how many in the 739. That is the most troubling aspect of it. With regard to the others, the National Security Letters in the files we reviewed, I would say we found about seven where there were illegal uses of them, where the FBI was attempting to obtain information through confusion, through error, of information that they were not entitled to obtain through a National Security Letter, either an educational record or obtaining information on a full credit report in a counterintelligence case, which they are not allowed to obtain, or not using it in NSL---- Mr. Smith. You said seven times? Mr. Fine. Seven of the reviews that we found and we found in our--seven of the individual ones, and as you will recall, we did not do a review of every NSL that was issued. We did a small sample of them. Mr. Smith. Okay. Thank you, Mr. Fine. Thank you, Mr. Chairman. Mr. Conyers. Thank you very much. The gentleman from New York, Jerry Nadler. Mr. Nadler. Thank you. Well, Mr. Fine, I suppose. You state in your report that there were no intentional violations of NSL policy procedure, that these were basically carelessness but that there were no intentional violations, no crimes. Mr. Fine. Correct. Mr. Nadler. Okay, but we also read in the report that agents intentionally went around the statute to provide phony information requests to telephone companies based on false statements. For example, the FBI's Communications Analysis Unit went around the NSL statute because it felt that the statute was insufficient and contracted with the telephone companies to access information directly. These contracts were approved by the Office of General Counsel and were exploited by issuing Exigent, or emergency, Letters. Well, let me ask the General Counsel. What is the statutory basis for an Exigent Letter? As far as I can tell, there is no basis for it. Ms. Caproni. Well, under 2702, we have the authority to get records from a phone company in an emergency circumstance without a National Security Letter. The Exigent Letters were undoubtedly inappropriate shortcuts to the process, though. Mr. Nadler. Well, under 2702, if you were going to get information in an emergency, what do you have to do? Ms. Caproni. You simply have to tell the carrier that there is an emergency. We recommend that you explain to the carrier what the emergency is, and it is then up to the carrier to decide whether or not to provide us records. So it is not a compulsive system. Mr. Nadler. Not compulsive, but of course, the carrier has no particular interest in protecting--if you are looking at my records or if you want my records, for example, the phone company has no particular interest in protecting my privacy rights, and I will never find out about it, so I cannot go to court to protect them, correct? Ms. Caproni. I do not represent the carriers, but I would disagree with the theory that they have no particular interest in protecting your records. In fact---- Mr. Nadler. What is their interest? Ms. Caproni. In fact, the carriers were diligent in making sure that any record they gave to us they subsequently obtained a National Security Letter for. Mr. Nadler. Well, wait a minute. Mr. Fine's report says, in many, many instances, hundreds of instances, that that never happened. Ms. Caproni. As of right now, there are still some numbers that have not received National Security Letters to back up the requests. Mr. Nadler. But back up years later after the report, but that is backfilling, in other words, and that is certainly not evidence that the phone companies were diligent in seeking these things. That is saying that, after this report was done, someone said, ``Wow, we have got a problem on our hands. We had better go get these letters 4 years later or 3 years later.'' That is not evidence of what we are talking about. Ms. Caproni. Respectfully, even though I am not defending the practice, it is not the case that it was only after Mr. Fine's report came out that they were attempting to make sure that the paperwork documentation was appropriate for every record they obtained. Mr. Nadler. You think the paperwork documentation should be done as appropriate. Ms. Caproni. If it is not, the records will come out of our database and be destroyed. Mr. Nadler. In this morning's Washington Post, it says: Under past procedures agents sent exigent circumstances letters to phone companies seeking toll records by asserting there was an emergency. Then they were expected to issue a grand jury subpoena or national security letter which legally authorizes collection after the fact. Agents often did not follow up with that paperwork, the Inspector General's investigation found. The new instructions which, according to the Washington Post, were issued to the FBI tell agents there is no need to follow up with National Security Letters and subpoenas. The agents are also told that the new letter template is the preferred method in emergencies but that they may make requests orally with no paperwork sent to phone companies. In other words, it appears from this morning's Washington Post that instructions are now being given to the FBI not to bother with any backup documentation after an oral request to the phone company for records invading people's privacy. Ms. Caproni. Quite the contrary. The instructions are that if they get information based on an oral request--and just to give an example of when that might be appropriate, if a child has been kidnapped and the ransom call comes in---- Mr. Nadler. Obviously, in those--I am not questioning the need in an emergency like that for getting records right away. Ms. Caproni [continuing]. And to get them on an oral request. Mr. Nadler. I don't doubt it. What I am questioning is that, according to today's Washington Post, the opposite of what the two of you are saying is the case and that now they seem to be saying we will take care of this lack of follow-up of documentation by simply declaring it unnecessary. Ms. Caproni. No, Congressman, that is not the policy. The policy now is that if a request is going to be made on an emergency basis for records, that has to be documented. It has to be documented in the first instance in the request. But if there is not time to do that so that you need an oral request, then that has to be documented to the file together with the approval for it. So it is, again, an internal control to avoid the problem that was existing, which was emergency had become a flexible---- Mr. Nadler. Okay. One final question. That is to Mr. Fine. Just a quick clarification on accessibility of PIN numbers and Social Security numbers of individuals through this process. On page 73 of your report, there is a discussion of a potential Intelligence Review Board violation because an agent accessed a bank balance by getting a person's bank account and PIN number from the result of a FISA order. The agent was faulted for not using an NSL but was not faulted for the fact that the PIN number was readily available. The reason I flagged this is because this reference makes clear that through an NSO 215 order the Government can secretly obtain the PIN number for someone's debit or credit account---- Mr. Conyers. The gentleman's time has expired. Finish. Mr. Nadler. What limits are there on this and what protections on this power to get PIN numbers and credit account numbers? Mr. Fine. The FBI can get bank records and records like that. There has to be predication for it and they have to show the need for that. That is one of the tools that the FBI has used and can use, as we pointed out. That is one of the reasons there needs to be controls on this. Mr. Conyers. The gentleman's time has expired. The Chair turns to the former Chairman, Jim Sensenbrenner from Wisconsin, whose letter to the Department of Justice first triggered the inquiries that have flown from this. I congratulate him and recognize him at this time. Mr. Sensenbrenner. Thank you very much, Mr. Chairman. Just by way of background, we did some oversight when I was the Chair of the Committee and received a letter in late 2005 that indicated that there were problems with National Security Letters. The audit that the Inspector General conducted was as a result of a provision that I put in the PATRIOT Act reauthorization that required this audit to be made as well as a subsequent audit that Mr. Fine is doing that I am sure we are going to talk about extensively later when the report is issued. I would also like to point out that National Security Letters were not authorized by the initial PATRIOT Act in 2001 but have been around since 1986 in legislation that was authored by Senator Patrick Leahy of Vermont, who is the Chairman of the Judiciary Committee on the other side of the Capitol. The PATRIOT Act reauthorization put in a number of civil liberty protections relative to National Security Letters because we knew that there were problems afoot and decided that, even though NSLs were not a part of the PATRIOT Act, that they needed to have civil liberties protections. I am proud of that work that this Committee did and eventually found its way into the PATRIOT Act Reauthorization Act, which was signed by the President in March of last year. One of the things, Ms. Caproni, that I am really concerned about is that the Justice Department and the FBI in particular have come to the Congress repeatedly over the last dozen years asking for administrative subpoena authority, meaning that subpoenas could be issued without judicial supervision. This Congress has repeatedly rejected each and every one of those requests. Now a National Security Letter is kind of like an administrative subpoena, although it is limited to the type of information that can be obtained. I would like to know from both of the witnesses whether the FBI simply turned around and used NSLs to get huge amounts of information after Congress said ``no'' again to administrative subpoena authority. Ms. Caproni. No, we didn't. National Security Letters are always focused on a particular case. There is no bulk collection via National Security Letters. And while our congressional reporting numbers are off, as Mr. Fine correctly found, they are not off by an order of magnitude. That is, we reported that we collected data on less than 20,000 people a year. While that number may go up, it is not going to go up to above 200,000. Mr. Sensenbrenner. How can you account for the fact that the number of NSLs that were issued before 9/11 was about 8,000 plus per year and then it went up to 150,000? Do we have that many potential terrorists running around the country? If so, I am really worried. Ms. Caproni. I think it is a function of two things. First off, I think it is a function of the fact that post-9/11 a number of agents were moved into the counterterrorism area and the Director directed that no lead in a counterterrorism case would go unpursued. So there is a directive to agents that they must cover all counterterrorism leads. That is point one. I think point two was, because we were focusing much more on an intelligence-driven reaction to counterterrorism threats, the toolbox that we were using was focusing mostly on National Security Letters, as opposed to the prior reaction, which would have used grand jury subpoenas. Mr. Sensenbrenner. Mr. Fine. Mr. Fine. I agree with Ms. Caproni. Prior to the September 11th attacks, it was rarely used. There were delays in getting them, and they were not following the leads that they would have followed after the 9/11 attacks. After the 9/11 attacks, they are attempting to connect the dots, attempting to track down leads. When there are indications from a terrorist overseas that there might be connections to the United States, they try and follow that. Mr. Sensenbrenner. My time is running out. I just make the observation that one of the things that gets people in this town in big trouble is overreaching. I think that, given your report, Mr. Fine, the FBI has had a gross overreach. What this does is it erodes support for the function that the FBI does to protect all of us from future terrorist attacks. I hope that this would be a lesson to the FBI that they can't get away with this and expect to maintain public support for the tools that they need to combat terrorism. Given the way the FBI has acted, I have my doubts. But let this be a warning. And my time is up. Mr. Conyers. The Chair recognizes the gentleman from Virginia, Bobby Scott. Mr. Scott. Thank you, Mr. Chairman. Mr. Fine, you suggested that there is some confusion in how to work these things, as I understand it, representations that there was an emergency, when in fact there was no emergency, and representations that grand jury subpoenas had been issued, when in fact they had not been issued. Is that right? Mr. Fine. That is correct. Mr. Scott. Has anyone been sanctioned? Mr. Fine. No. The FBI, as a result of this report, is going and looking at a special inspection to look at exactly what happened with this, how the problems occurred, and to determine accountability. I think that is appropriate. Mr. Scott. To your knowledge, no one has been sanctioned so far. Mr. Fine. Not yet, no. Mr. Scott. Okay. Ms. Caproni, you indicated that we need to change our mindset from criminal investigation to intelligence gathering. Ms. Caproni. I am saying that, post-9/11, that has been what the FBI has been charged with doing--really not thinking of our terrorism investigations as wholly criminal. Mr. Scott. Now when we use these letters, are we obtaining information regarding United States citizens? Ms. Caproni. Sometimes. Mr. Scott. That is a yes? Not always, but sometimes? Ms. Caproni. Correct. About half and half. Mr. Scott. You are using this mindset against United States citizens. When you get all this information like Social Security numbers and phone records, how long is this information retained? Ms. Caproni. The issue of retaining national security--data that is obtained via National Security Letters is subject to a working group that the DNI is chairing together with the Department of Justice and that we will participate on in terms of how long we should keep it. As of right now, it is subject to the normal archive rules, so we keep it for whatever the law under our archives requires, which is typically 20 years. Mr. Scott. Twenty years. Now how many criminal convictions have you gotten from NSL letters? How much information from NSL letters has resulted in criminal convictions for terrorism- related offenses? Ms. Caproni. That was one of the questions that the IG was charged with answering, and I think deriving is very difficult. Because, while National Security Letters are typically used at the beginning of an investigation, we don't tag the data; and so tracing it through to know whether national security data started---- Mr. Scott. Mr. Fine. Mr. Fine. We try, too, but you cannot tell how many convictions as a result of that. It is not specifically segregated or tagged. When we tried to follow through the system, it was very hard to do that. So I can't give you a number. Mr. Scott. If somebody said one, would that surprise you? Could you contest that number? Ms. Caproni. I would. Mr. Fine. I would think it would be higher, but I can't tell you one way or the other. Mr. Scott. What information is obtained through NSL letters that could not have been gotten through going through the normal FISA process, even in emergencies when there is an after-the-fact process with the FISA courts? Ms. Caproni. Anything that we can obtain through a National Security Letter could be obtained from a FISA 215 order. I would tell this Committee that I think if you change the law in that way, you would be doing grave disservice. It would essentially sink the system. We issue, as you can tell from the report, thousands of National Security Letters to get information. We do not have an infrastructure in place to take every one of those to court any more than an AUSA in any district has the infrastructure in place to go to court to get every grand jury subpoena. It is simply--we don't have the infrastructure to do that. Mr. Scott. So you are not getting information you couldn't get through FISA, but just administratively you would have a judge looking at what you are doing and not having a process that lacks oversight. Ms. Caproni. Congressman, under FISA--under the FISA statute, section 215 of the PATRIOT Act gave us the authority to get an order for any type of record. Mr. Scott. That is what we are talking about. Mr. Fine, did I understand that in these cases there is an actual ongoing investigation prior to issuing these letters or there is not an identifiable investigation ongoing when they issued the letters? Mr. Fine. It has to be tied to some investigative file. They have to open an investigative file or a threat assessment or preliminary inquiry or full inquiry. It has to be tied to one of those, and can't be issued out of a control file. Mr. Scott. That is what they are supposed to be doing. Are they doing that? Mr. Fine. We found there were instances of they were issued out of a controlled file. Mr. Scott. If there is no ongoing investigation, what is the standard for deciding when to issue one and when not to issue one? Ms. Caproni. The standard is that it has to be relevant to an authorized investigation. What Mr. Fine was talking about with the control files is, while it is a difficult situation to understand, those NSLs were in fact--they related to an authorized investigation. There was a bureaucratic problem, which nobody likes to hear. There is a bureaucratic problem, but there was a huge bureaucratic problem that we believe we have worked out. None of the NSLs that were issued out of control files did not relate to an authorized investigation. They all were tied to investigations that were appropriately open. Mr. Conyers. The distinguished gentleman from North Carolina, Howard Coble. Mr. Coble. I thank the Chairman. Good to have you all with us. Mr. Fine, your report recommends a number of changes on the FBI's use and tracking of National Security Letters. The Attorney General issued a press release on March 9th responding to those recommendations; and I presume each of you is familiar with that report, are you not, the March 9th report? Let me put this question to each of you: Will those recommendations submitted by the AG restore the FBI's accountability for its use of NSLs? Mr. Fine, start with you. Mr. Fine. I believe that the response to the recommendations and what the FBI and the Department is doing is appropriate. Is it sufficient? Is it all that needs to be done? I am not sure. We will have to see what the results of those steps are. We try to provide recommendations to ensure that these very important but sensitive tools are used in full accord with National Security Letter authorities, AG guidelines, and internal control policies. They hadn't been in the past. Mr. Coble. Ms. Caproni. Ms. Caproni. I think we are going to have to work to get the trust of this Committee back, and we know that is what we have to do, and we will do it. Mr. Coble. Can the FBI implement the Attorney General's directions within the 4 months when the AG has requested Mr. Fine to report on your progress? Ms. Caproni. I hope so. There are some that are going to require some interagency work, but certainly if not all will be implemented in 4 months, we will have made substantial progress. Mr. Coble. You may have addressed this earlier, Ms. Caproni, but let me put it to you in case you did not. Does the FBI have any discrepancy or challenge with the report that Mr. Fine has issued? Ms. Caproni. No, we accept the report. To the extent we had factual quarrels, we worked those out. Mr. Coble. You may not be able to respond to this. What do you think, Ms. Caproni, are the greatest obstacles that your office faces in implementing the AG's directions? Ms. Caproni. I think that any obstacles there are the Director is going to make sure are removed. I think it is time--it is energy and effort; and we are going to do it. Mr. Coble. I thank you both for being here. Mr. Chairman, if I may, I would like to submit for the record the March 9th press release submitted by the Attorney General. Mr. Conyers. Without objection, so ordered. [The information referred to is available in the Appendix.] Mr. Coble. I thank the Chairman. I yield back my time. Mr. Conyers. I ask the lady--don't sit down now. I ask you to please excuse yourself from this hearing. No visitors can interrupt a hearing in the Congress. Just a moment. Would the officers escort this lady out, please. The Chair recognizes the other distinguished Member from North Carolina, Mr. Mel Watt. Mr. Watt. Thank you, Mr. Chairman. I thank the Chairman for convening the hearing. Mr. Fine, I am looking on page 7 of your testimony in which you indicate that you reviewed 293 National Security Letters in 77 files and found 22 possible violations that had not been identified or reported by the FBI, and I am trying to extrapolate that, although Ms. Caproni seemed to take some issue with whether that was a reliable sample. I am trying to assume for the moment that it is, without trying to figure out how many there would be of the total National Security Letters that were possible violations. My formula is I am starting with 143,000 National Security Letter requests on page 5. Would that be an appropriate place to start? Have you done the extrapolation for me? Mr. Fine. I haven't done it, but there are 143,000 requests, and, as you know, a request--there can be multiple requests in a letter, so there are approximately 45,000 letters during the time period, with 143,000 requests. I think the starting point would be about 44,000 letters during the time period. Mr. Watt. And if you extrapolated the possible violation out, what would that come to, according to your math? Mr. Fine. If you are talking about 7 percent, approximately 7 percent of the 293 had a violation, so 7 percent of 44,000 would approximately be about 3,000. Mr. Watt. So you are telling me---- Mr. Fine. That is quick math. I hope it is correct. I think it is. Mr. Watt [continuing]. That it is possible my FBI and my people who are supposed to be protecting my interest violated the law how many times? Mr. Fine. Well, I think there are possible violations of either the law, the Attorney General guidelines or the FBI's policies several thousand times, if you statistically extrapolate. It was a small sample. We didn't think it was skewed or biased. But if it held up through the entire population of files, several thousand, some more serious than others. But that is a lot. Mr. Watt. Ms. Caproni, why ought not our public be concerned about that kind of disregard of the law and internal process? Ms. Caproni. Well, I think the public should be concerned. We are concerned, and we are going to fix it. I would say, as Mr. Fine said, the sort of errors range sort of on a long continuum of seriousness. The most serious errors that Mr. Fine identified were obtaining full credit reports in counterintelligence cases. We had a---- Mr. Watt. That is 7 of the 22 files where you say they were real serious violations. Extrapolate that out for me, Mr. Fine. Mr. Fine. Well, I think in Ms. Caproni's testimony she talked about the level of seriousness and which were FBI errors and which were company errors and came up with the figure that a little bit over 1 percent of them were serious violations involving FBI errors. If you extrapolate that to the entire population, that would be about 600 cases of serious FBI misconduct. Mr. Watt. Ms. Caproni, is there some reason that this Committee and the American public shouldn't be concerned about law enforcement violating the law 600 times? Ms. Caproni. We are quite concerned about this, Congressman; and we are making every effort to figure out where those errors are, to sequester the material, to pull it out of our files and to destroy it. We will---- Mr. Watt. How many files have you all destroyed based on this investigation up to this point? Ms. Caproni. When we identify data that---- Mr. Watt. Isn't that a number rather than an explanation? Ms. Caproni. Congressman, I don't know the number. Mr. Watt. Has the FBI destroyed any files up to this point based on this investigation? Ms. Caproni. We destroy data all the time when we discover it was improperly collected. So both outside of Mr. Fine's investigation and---- Mr. Watt. Have you destroyed any files based on this investigation? Ms. Caproni. Again---- Mr. Watt. Have you destroyed any file? Ms. Caproni. Not a file. Mr. Watt. Have you destroyed any information based on this investigation? Ms. Caproni. Yes. Mr. Watt. What have you destroyed? Ms. Caproni. The full credit reports that were obtained improperly, and I think there was also some telephone data. Mr. Watt. How many is that? Ms. Caproni. It is not much. Mr. Watt. In these 600 cases that you have identified as possible real serious areas, several hundred, do you intend to prosecute anybody for violating the law? Ms. Caproni. We will have to look at what the facts are. I am not going to pre-judge. Mr. Watt. How long is it going to take you to look at that? Mr. Conyers. The gentleman's time has expired. Ms. Caproni. The inspectors are in the field now, and I think they will have completed their inspection, which is a sampling process, but they will have completed it within a week or so. Mr. Watt. You have got a more reliable sampling process than Mr. Fine. Ms. Caproni. It is bigger, and it is across all field offices. Mr. Conyers. The gentleman from California, once an attorney general for his State, Dan Lungren. Mr. Lungren. Thank you very much, Mr. Chairman. Ms. Caproni, I was one of the ones who have defended the FBI and the Justice Department in the use of these as we went through legislation the last 2 years, and to say that I am disappointed doesn't give justice to what I feel about this. Mr. Fine has said that this is the result of mistakes, carelessness, confusion, sloppiness, lack of training, lack of adequate guidance and lack of adequate oversight. That sounds like a report about a first or second grade class. We are talking about agents of the FBI, who are lawyers in many cases, who have college degrees, who have other kinds of education. We are talking about people who have gone through the FBI Academy. We are talking about people who presumably have been trained to go into this. We are how many years past 9/11? In response to the question I believe it was of Mr.--I am not sure who asked you this, but whether you could get this done in 4 months, you said you hoped so. I hope you will deliver a message that we expect it will be done. Because I don't think if you can't get it done in 4 months you are going to have to worry about improving your procedures for NSLs because you probably won't have NSL authority. I just want to convey to you how upset many of us are who have defended this program and have believed it is necessary to the protection of our country and you in the FBI have an obligation to try to find out who the potential terrorists are but also to make good on the promise we have made to the people of America that the terrorists are not going to succeed by indirection what they can't do by direction. That is, to destroy the constitution. I just--I will tell you this. I talked with Mr. Mueller yesterday. Because I have known him for 30 years. He's Mr. Fix- it. He goes in and fixes messes. He has done it all over this Government. I have seen his work in San Francisco. I have seen his work here at the Department of Justice. If I didn't know him, if I didn't know his record, if I didn't know he is the man we have put in many places to fix things, I would have no confidence in the FBI right now. So I hope you will deliver a message to all your people that it is not good enough to tell us you hope it is going to be done in 4 months. I hope you are going to deliver a message that it better be done in 4 months or you are not going to have NSLs to worry about. I have to say that as someone who supports them and will fight on the floor to have that authority given to you if there is proper oversight. But I probably won't get a majority of votes on the House floor if you don't fix it. So can you tell me you are going to do better than you hope to fix it in 4 months? Ms. Caproni. Congressman, you are absolutely right. Yes, it will be done. Mr. Lungren. I appreciate that. Now, Mr. Fine, you are the Inspector General for the FBI. I want to congratulate you on what you have done. We say we take some satisfaction in your carrying out the authority we gave you, but sometimes that doesn't happen, and we appreciate the job you have done here. Maybe you won't want to answer this question. Maybe you can help me. How do you explain carelessness, confusion, sloppiness, lack of training, lack of adequate oversight with the FBI? I just turned on television last night and watched one or two or three of these shows that always shows the FBI as being far better than local government. A little burr under my saddle, because I am a former AG of California. I appreciate the FBI, but how do you explain this? I am not sure what would be worse, frankly. At first, I was relieved that you said this and that it wasn't intentional action by the FBI. At least, we haven't found that. I would at first have been worried about that. Now, as I think about this, should I be more worried about the fact that the FBI now, in something as important as NSLs, has marks of carelessness, confusion, sloppiness, lack of training, lack of adequate guidelines and lack of adequate oversight? Is this exceptional in your experience in your oversight of the FBI? Mr. Fine. I think the FBI worked hard to get these authorities but didn't take it seriously enough putting in controls over these authorities. I think there is often a problem sort of between the receipt of the authority and the execution of that authority. That is clearly what happened here. We were very troubled by it. We have seen problems in the FBI in terms of information technology and trying to upgrade their information technology. We have seen problems, but they are--these are difficult tasks, and they are trying to do this as they are changing their mission, and, quite honestly, there really is no excuse for it. Mr. Lungren. Do you have any questions that the NSLs are of some value? Mr. Fine. Yes, I believe they are of value. Mr. Lungren. If we lost them, that would be a loss. Mr. Fine. I believe they are a valuable investigative tool to counterterrorism and counterintelligence investigations, and that is why it is so troubling. Mr. Lungren. We better fix it so we don't lose a tool that is truly effective. Mr. Fine. I think they need to fix it. Mr. Lungren. Thank you, Mr. Chairman. Mr. Conyers. The gentlelady from Texas, Sheila Jackson Lee. Ms. Jackson Lee. Mr. Chairman, again, my appreciation for your continuing effort of establishing transparency in Government. I welcome both of the witnesses here today and recount just limited history that troubles me as we find ourselves here today. I know the good intentions of the witnesses, but certainly I need not remind you of the era of McCarthyism and certainly that role law enforcement played in that misdirected era of the United States of America. As a young lawyer, I participated in the investigations into the assassination of Dr. Martin Luther King and John F. Kennedy right here in this Congress; and what was exposed was the extensiveness of the COINTELPRO of Dr. Martin Luther King-- wrongheadedness, as far as I am concerned--as relates to the utilization of protecting this country. A civil rights leader who happened to be outspoken against the heinous governmental acts of segregation, and all of a sudden he became a major target of the Federal Bureau of Investigation, with any number of officers, agents, if you will, probing and looking over paperwork that he might have generated. That smacks, as far as I am concerned, of where we are today, even though, Mr. Inspector General, you have indicated that it has been without malice, without intentions. And we all know that there is a phrase that says, a journey to a certain place is paved on that road with good intentions. So I am not very happy as to where we are today, because I argued vigorously about the extensive powers that we were giving to the President of the United States out of fear. One thing that the Constitution reminds us and certainly the Founding Fathers, who left a tyrannical society to be free, is that tyranny can get the best of us. Lack of control can get the best of us. So I ask to the General Counsel of the FBI, did you determine what percentages of those letters that were sent without National Security Letters generated into terrorist responses or terrorist incidences or terrorist prosecutions? I would be interested in that number. Why don't you just answer that yes or no. Do you have the percentage? Ms. Caproni. I do not. Ms. Jackson Lee. I would like to get the percentage, frankly. Ms. Caproni. The Director has ordered a special investigation of the whole exigent letter instance. We will brief this Committee when we have the results of that. Ms. Jackson Lee. I will join my colleague on the other side of the aisle. How quickly can you get that information? This is about protecting the Constitution and securing the homeland, two very important jurisdictional responsibilities; and I happen to serve on both Committees, Homeland Security and this. So my question is, how soon can you get those numbers? It makes a real difference to know whether you generated potential terrorist threats that would secure the homeland or whether or not the FBI was on a fishing expedition. Ms. Caproni. Congresswoman, let me assure you that the group was not on a fishing expedition. Having said that, I understand my assurance to this Committee at this point isn't worth a lot. The Inspection Division is conducting the inquiry. They know that they have to proceed quickly, but I regret I can't tell you when they are going to be done. I will make sure that the Director understands that you want it done as quickly as possible. Ms. Jackson Lee. Certainly we wish the Director well. We would have wanted to have him appear before this Committee, but we do wish him a speedy recovery. Ms. Caproni. Thank you. I will let him know that. Ms. Jackson Lee. Mr. Inspector General, I assume you will say to me that you don't speculate, but let me quickly ask you a question and will you be thinking, the General Counsel, on this question. The President signed on the PATRIOT Act a signing statement which indicated that he was going to interpret or have the Act interpreted in a manner consistent with the President's constitutional authority to supervise a unitary executive branch to withhold information. Just be thinking about that. I wanted to know, did that give you free ride. That is why I have legislation that indicates that agencies should not be running, I must say, amok because of signing statements. Mr. Inspector General, what you looked at and you said it has not been intentional--help me out--however, don't you believe there should be restraints put in place and might the PATRIOT Act be entirely too broad to even be a valuable tool that would restrain people in balancing both security and as well balancing civil liberties? Mr. Fine. I do believe that there need to be controls. I do believe that there needs to be a balance, a balance of effective tools to prevent terrorism, and at the same time effective controls on the use of those tools. What was most troubling to us was that those controls were not implemented and not followed. I share the concerns expressed by the Members of this Committee, and that is why we did the report. We were not restricted or limited in what we did, and I know there was a Presidential signing statement, but the Department did cooperate with us. We did provide the information that we had. We provided it in the most unclassified way we could, and the Department actually did unclassify a fair amount of this information so it could be fully aired. We also provided a classified report to this Committee and other Committees describing the additional information. So we did what we could to identify the problems in this program. Mr. Conyers. The gentleman from Florida. Ms. Jackson Lee. Mr. Chairman, can she answer yes or no on the signing statement? Would you indulge me? Ms. Caproni. The signing statement had absolutely no impact on how we secure letter authority. Mr. Conyers. The gentleman from Florida, Mr. Ric Keller. Mr. Keller. Thank you, Mr. Chairman. Ms. Caproni, let me begin with you. If the FBI didn't have National Security Letters as an investigative tool, you could get the same information via prosecutor through a grand jury subpoena or by going before a FISA court and getting a court order, isn't that correct? Ms. Caproni. Yes. Mr. Keller. The concern that you have with those two options is you essentially don't have the manpower. I think you said it would sort of sink the system. Ms. Caproni. I was responding to a suggestion that all of these should be obtained via court order. If that were the law, that would create substantial obstacles to our national security program. Mr. Keller. That is why you aren't using in all cases the grand jury subpoena or the FISA court orders, because you don't have the manpower power to do that and still do your investigations? Ms. Caproni. I would say it is perhaps slightly more nuanced than that. On grand jury subpoenas, there are cases where we don't have a criminal case open, so a grand jury subpoena is not an option. Further, the whole philosophy of making sure that we are thinking from an intelligence perspective rather than immediately cutting to the chase of a criminal investigation encourages agents to use national security tools versus criminal tools. Mr. Keller. Let me follow up, because the challenge we have is getting this in the strike zone. We want you to have this information that you need as an investigative tool, but we want there to be some sort of check on your authority. To use the grand jury subpoena, for example, to get my phone records, I have the ability to move to quash that subpoena and have a judge hear it. Ms. Caproni. Only if someone tells you the subpoena has been served, which is not the typical route of a grand jury subpoena. Mr. Keller. Before you went before a FISA court you would have a set of eyes through the FISA court judge looking at it, correct? Ms. Caproni. That is correct. Mr. Keller. In terms of using the National Security Letter, let's say you served it on my phone company. The phone company is not necessarily looking out for my personal privacy interests, and so there is not a set of eyes looking at it, at least from an individual perspective. Ms. Caproni. Again, that is the same as with a grand jury subpoena, correct. Mr. Keller. So all we have is our Inspector General as a check on the controls to make sure that you are applying it in an appropriate way. Ms. Caproni. I think this report has told us we internally have to do a far better job at making sure that we are maintaining internal controls over the use of this tool. I fully expect Mr. Fine to come back to visit us in future years and will dutifully take us to task if we have not accomplished that. Mr. Keller. Mr. Fine, imagine a housewife in Orlando, Florida. She does absolutely nothing relevant to terrorism or espionage, never met or spoken to a terrorist or spy. Based on your investigation, does she have any reason to worry about National Security Letters violating her privacy by looking at her phone records, bank records or Internet search records? Mr. Fine. I think that there are times when the FBI looks for telephone records of potential terrorists and looks to see who they have contacted or been in contact with. Could be advertent, could be intentional contact, could be inadvertent contact. As a result of that contact, there can be efforts to look and see what telephone numbers have been called. Now, if they had no contact whatsoever with the subject of a potential terrorist investigation, it is less likely that the records would be obtained here. Mr. Keller. In framing my question, I said, no contact, either written or spoken. So let me ask you, based on your investigation, were there any situations where you saw National Security Letters being used when there was no relevance whatsoever to international terrorism or espionage? Mr. Fine. We couldn't in our review look at all the investigative case files and say there was an adequate predicate. There wasn't. We looked at how they were used and whether on their face they were improper. So it is impossible for us to say that the relevancy standard was met. One thing we did find and I would note, this is that, in many cases, the counsel of the FBI field offices, either the Chief Division Counsel or Assistant Counsel, did not aggressively and independently look for that. And they are the ones who should be checking on that, they are the ones who need to ensure there is adequate predicate for this investigation. And we saw in many cases that that didn't happen that they acceded to the wishes or the arguments of the case agents or special agents in charge without independently and aggressively looking at that. Mr. Keller. One final question. Can you give us an example to help make your case, if you have one, as to what is a scenario where a National Security Letter is your best investigative tool because, for whatever reason, a grand jury subpoena or a FISA court order is insufficient? Ms. Caproni. Any time I would say that they were at the very beginning of an investigation; say, for example, after the London bombing when the British authorities provided us with telephone numbers of the British bombers. So we were looking to see if we have anyone in the United States that had telephone contact with the London bombers. In my view, the appropriate way to pursue that investigation is via National Security Letter. Mr. Keller. Because you wouldn't have time under the other options? Ms. Caproni. We wanted to know that very quickly; and, again, I think the American people would want us to know very quickly after the London bombings took place whether we had any cells or groups of people tightly related to the London bombers. So we needed to move very quickly; and, in fact, the investigators did move very quickly on that to figure how out who here was connected to there and was it an innocuous connection or a dangerous connection. Mr. Keller. My time has expired. Mr. Conyers. The distinguished gentlelady from Los Angeles, California, Maxine Waters. Ms. Waters. Thank you very much, Mr. Chairman. May I ask, were these witnesses sworn? Mr. Conyers. They were not. Ms. Waters. May I respectfully request that they be sworn in? Mr. Conyers. Too late. Ms. Waters. Then, Mr. Chairman, I suppose we are going to have to rely upon them, particularly the General Counsel, continuing to tell us that they are acting within the law. I shall proceed with my questions. Mr. Conyers. If the gentlelady will yield, false testimony before this Committee can constitute a violation in and of itself, a misstatement, any deliberate misstatements. Ms. Waters. Well, I would have preferred that they be under oath, but--however, the Chair has made that decision; and I shall proceed. Let me just ask about the use of these exigent letters. As I understand it, these letters are used basically to get around having to get the NSL letters; is that right, Mr. Fine? Mr. Fine. These letters were used in advance of or in lieu of National Security Letters, that is right. Ms. Waters. There was information collected as a result of these letters, particularly the operation I believe that was set up with the contract with the three telephone companies or telecommunications companies; is that correct? Mr. Fine. Well, there were contracts with the telephone companies so that they would provide information to the FBI on an expedited basis. Ms. Waters. Ms. Caproni, do you still have contracts with those telephone companies, any other telephone companies, or any other private businesses to supply you information in the manner that those companies did? Ms. Caproni. We continue to have contracts with the telephone carriers that obligate us to provide them with appropriate process to get records. I can't answer the balance of your question. I don't know if we have other contracts with other private parties. The telephone companies it made sense, because of the volume of our request. Ms. Waters. How much are the taxpayers paying the telephone companies, that they pay to provide them services to spy on us? Ms. Caproni. I don't know what the dollar value of the contracts are. Ms. Waters. You have no idea? Ms. Caproni. I actually don't. Ms. Waters. You have never heard any discussion about it? Ms. Caproni. I am sorry, I don't. I just don't know the amount. Ms. Waters. Information was collected on millions of Americans using this as a tool. Now that you know that they are were innocent, they probably should not have been under investigation. Has all of this information been purged and gotten rid of? Ms. Caproni. We did not collect records on millions of Americans? Ms. Waters. How did it work then? Ms. Caproni. The exigent letters were provided to the carriers, which promised future process. That future process, unfortunately, was not always promptly provided. Ms. Waters. What did they do? Ms. Caproni. Who do? Ms. Waters. The companies. How did they mine the information and did they mine information of innocent people? Ms. Caproni. The carriers provided us with toll billing information, which was then placed into our databases. There is no connection between their databases and our databases. The information comes out electronically and moves into ours. Again, we are talking about--I believe the number of numbers at issue, according to the Inspector General, is somewhere in the neighborhood of 3,000. It is my belief, though--again, we will have to wait and see what the special inspection finds--that all of those numbers were tied to authorized investigations. To the extent any were not, the records will be removed from our databases and destroyed. Ms. Waters. When will they be removed? How long will it take? Ms. Caproni. Again, I am anticipating that that special inspection will take a couple of weeks at least, but probably-- I just actually don't want to speculate. Ms. Waters. Didn't you have a court order relative to your contracts with these telephone companies? Ms. Caproni. No, ma'am. Ms. Waters. Was there a court decision relative to the manner in which information was obtained? Ms. Caproni. The information was obtained from the carriers pursuant to--it was supposed to be obtained pursuant to the laws of ACBA. Ms. Waters. But they were not. Ms. Caproni. Again, as Mr. Fine has indicated, there were these exigent letters that were used. What we are trying very hard to do is to unravel and to make sure that we do not have the records of anyone as to which there was not--it wasn't relevant to an authorized investigation. Ms. Waters. How long have you been trying to do this? Ms. Caproni. We began the process with them last fall and we are--we within OGC are to the point that if they cannot demonstrate to our satisfaction very quickly, then any of those records have to be removed from the database and destroyed. Ms. Waters. Certificate letters, are you still issuing certificate letters? Ms. Caproni. No. Ms. Waters. When did you stop? Ms. Caproni. Shortly after OGC learned about them, that process was stopped. We entered into discussions with the Fed over whether--Federal Reserve Bank in terms of whether or not it required a National Security Letter. There was some back and forth between lawyers, that the decision was made that they would prefer a National Security Letter, so---- Ms. Waters. So you collected information using these certificate letters. Has that information been destroyed? Ms. Caproni. No. Ms. Waters. When are you going to do it? Ms. Caproni. I don't believe we are going to do it. Ms. Waters. Why are you going to keep information that was improperly collected on financial records of innocent people? Why would you keep it? Ms. Caproni. One, they are not innocent people; and two, it wasn't improperly collected. The Federal Reserve Bank is not directly covered by the right to financial privacy. They can ask for a National Security Letter, which they now have done, and because---- Ms. Waters. Why did you stop using certificate letters if they were legal and proper? Ms. Caproni. Because we thought the better process was a National Security Letter, and the Fed asked us to provide National Security Letters. Ms. Waters. How have you determined whether or not the information you collected was on individuals who were suspicious, guilty, had committed a crime? How do you determine whether or not these people are innocent and the information should be destroyed? Mr. Conyers. The gentlelady's time has expired. Please answer the question. Ms. Caproni. Certainly. The issue is whether the information is relevant to an investigation. There are times when we gather information that is relevant to an investigation but it turns out that the person was not engaged, for example, in terrorist financing. We don't then destroy the information, though the investigation is closed. So it is much like any other information that is gathered during the course of an investigation. The issue of whether that policy will continue is a matter that is under discussion by a group that is being chaired by the DNI in terms of whether we should or we should not continue to retain information that is gathered via National Security Letters after the investigation is closed. Mr. Conyers. The gentleman from Virginia, Mr. J. Randy Forbes. Mr. Forbes. Thank you, Mr. Chairman. Mr. Chairman, I hope I can emulate your very calm manner of handling this Committee; and I just want to tell the witnesses what I said at the beginning--I want to thank you both for being here. We know you have a tough job, and we appreciate you coming in here and answering our questions today. I have listened to the Committee as we have gone through this process, and we have had testimony from the Washington Post, we have had testimony from members of the audience, testimony from Members of this Committee. You are the only witnesses we have here. I think that you get the message, both of you, you had it when you came in here, that no one on this Committee condones any of these lapses or feels that it is not urgent that they be corrected and corrected as quickly as possible. We are also grateful that this Committee requested this audit. Because, Mr. Fine, through your good work, we were able to find out what these problems were so that we can correct them. The other thing, Ms. Caproni, you have been asked to take a lot of messages back to the FBI, all of which are good and valid messages. But another one I want to ask you to take back today is that, although the FBI messed up in handling the NSLs, I want you to take a message back to those agents in the field, who I know are working around the clock; they are away from their families a lot of the time, and thank them for not messing up on what Mr. Fine said was one of their key missions and that was to detect and deter terrorism and espionage in this country. Because if you had messed up on that one, we would have a lot more people in this room and a much harsher hearing than we are having today. The other question I would like to ask either of you to respond to: Do either of you have any evidence today that anyone in a supervisory position gave instructions, either expressly or impliedly, to any person under his or her supervision to misuse the NSLs? Ms. Caproni. Not to my knowledge. Mr. Forbes. Mr. Fine. Mr. Fine. We did not find that evidence. We did not find that there was an intent by people who knew they were misusing it to misuse it. So, no. On the other hand, we did not do a thorough review of what people up and down the line knew and did, so we reported what we found. Mr. Forbes. That is being conducted, as I understand it, now, is that correct? Ms. Caproni. Correct. Mr. Forbes. And if you find that information you will present that back to the Committee, correct? Ms. Caproni. Absolutely. Mr. Forbes. The second question for either of you: Is there any evidence that any member of the FBI or the Justice Department provided any information either orally or in writing to this Committee or to Congress which they knew to be inaccurate or false? Ms. Caproni. Not to my knowledge. Mr. Forbes. Mr. Fine, you don't have any? Mr. Fine. I don't have that information, no. Mr. Forbes. Just the balance that we have talked about, we know the harm that comes from violation of privacy interests of our citizens, that is huge. But I wish you would go back--and, again, just take a minute--and talk about what Mr. Fine has put in here about--says: These tools are indispensable to the FBI's mission to detect and deter terrorism and espionage. We know there has been a lot on your plate since 9/11 and you have had to do that. Can you tell us, with as much specificity as you can, exactly how these NSL letters have helped to do and accomplish that mission? Ms. Caproni. Again, National Security Letters provide the basic building blocks of an investigation. Starting with phone records, phone records are critical to the counterterrorism agents to figuring out who was connected to whom; and that permits us to trace foreign terror acts that have occurred, obviously, since 9/11 and trace them in to individuals who are in the United States and to determine whether those individuals are up to no good or, in fact, it is just an innocent connection. But for National Security Letters, I don't know how we would do that. They have also been absolutely indispensable in the area of terrorist financing. We have done a tremendous amount of work getting bank records on individuals we believe are funneling money to foreign terrorist organizations overseas. Again, without National Security Letters, could we go through a FISA order? We probably could, but we certainly couldn't do that very efficiently. So a National Security Letter is an efficient way for us to get the basic building blocks of an investigation. Mr. Forbes. Have they stopped any terrorist attacks that you know of that could have possibly happened in the United States? You may not have that information. Ms. Caproni. I am sorry, I don't. Mr. Forbes. Thank you both. Mr. Chairman, I yield back the balance of my time. Mr. Conyers. I thank the gentleman. The Chair recognizes Stephen Cohen, the gentleman from Memphis, Tennessee. Mr. Cohen. Thank you, Mr. Chairman. Stephen, yes. You can call me Stephen. Mr. Conyers. Stephen. Mr. Cohen. Thank you, sir. Mr. Fine, did you do any study of the people whose records were looked at illegally for any similarity in demographics? Mr. Fine. No. We looked at whether they were U.S. persons or non-U.S. persons, but within those persons we did not look at the demographics of those individuals. Mr. Cohen. Ms. Caproni said they were all with investigations that were ongoing. Did you find that to be true, also? Mr. Fine. We could not verify that they were all connected to an ongoing investigation. I know the FBI is trying to do that now. But as part of our audit we could not do that, all that. Mr. Cohen. Do you think it might be a good idea to look at those people to see if there are any demographic consistencies, if there is a group of the American public that might be looked at in a closer manner than others and that might---- Mr. Fine. It is possible. That would be quite an undertaking, and one has to realize a lot are not on individuals but are on telephone numbers. There are certainly consumer credit reports and other things that do relate to individuals. So that kind of review is possible but incredibly intensive and requires additional resources while we are trying to comply with this Committee's and the Congress's directive to do a review of the use of them in 2006 according to the guidelines that were set out here. Mr. Cohen. Thank you. Ms. Caproni, you said that these were all tied to investigations, is that correct? Ms. Caproni. I said I believe that they are all tied to investigations, and that is what we are trying to work through with that unit now. Mr. Cohen. If you find that they are not tied to investigations, could you make a report to this Committee of who those individuals were and why they were--their records were sought when they weren't tied to investigations? Ms. Caproni. Yes, we will provide this Committee with what we find through the course of that special inspection. If I could just say, though, so there is no misunderstanding, the unit at issue typically gets simply a telephone number. So they don't know--that is part of with what they are charged of finding out, is who belongs to this telephone number, what are the toll billings, records for this number. So the name of the person associated with the phone number is typically not part of what CAU does. And for the exigent letters, to my knowledge--again, the special inspection will reveal much more in terms of the ins and outs of what they were doing--they were working off of telephone numbers and not off of names. Mr. Cohen. In the report, it says that some of these violations demonstrated FBI agents' confusion and unfamiliarity with the constraints on National Security Letter authorities. Other violations demonstrated inadequate supervision over the usage of these authorities. This is from Mr. Fine's statement. Ms. Caproni, do you think that these are maybe indices of a systemic problem with the FBI, where the agents have confusion and unfamiliarity with other policies and other laws? And, if so, are you doing something about it? Ms. Caproni. Congressman, that is exactly what I am concerned about. In the discussions that we have had--and I can tell you that we have had a lot of soul searching at the FBI since then. We got an F report card, and we are just not used to that. So we have had a lot of discussions about this. One concern is, are we--most of the agents grew up--the agents my age at the FBI all grew up as criminal agents in a system which is transparent, which if they mess up during the course of an investigation they are going to be cross-examined, have a Federal district judge yelling at them. The national security side occurs largely without that level of transparency. Our concern is and what this report has shown us is that we have simply got to do a better job making sure that, although the actions that are taken in national security investigations are typically taken in secret and they don't have the transparency of the criminal justice system, that that imposes upon us a far higher obligation to make sure that we have a vigorous compliance system, that we have in place the training that is necessary, that we restrain agents, that when agents are working in this area we make sure they know. Mr. Cohen. I think that is what we need. I appreciate your candor. There is some signage in the Capitol and one is a statement by Brandeis, something to the effect that the greatest threats to liberty come from insidious men of zeal, well-meaning but without knowledge or understanding. I think that you will find that if our agents, our FBI agents, even though well-meaning and zealous, don't know what they are doing, that it is a threat to people having faith in the whole system. I hope you will correct that. I feel confident you will. Ms. Caproni. You are absolutely correct. We will. Mr. Cohen. Thank you. Mr. Conyers. I thank the gentleman, Steve Cohen. The Chair recognizes now the gentleman from Virginia, Bob Goodlatte. Mr. Goodlatte. Thank you, Mr. Chairman, and thank you for holding this hearing. Ms. Caproni and Mr. Fine, thank you for your testimony today. These are very serious concerns, and we appreciate your helping us understand how they occurred, why they occurred, and what is being done to correct them. I have several questions I would like to ask, starting with you, Ms. Caproni. In Mr. Fine's report on page 8, paragraph 3, he notes, ``In addition, we found that the FBI had no policy requiring the retention of signed copies of National Security Letters. As a result, they were unable to conduct a comprehensive audit.'' Can you explain why something as important and serious as a National Security Letter would not have a signed copy retained in the records of the Bureau? Ms. Caproni. I can say that there were different processes in different field offices; but, no, I cannot. I mean, there is just no reason why there was not a policy that said you have to keep a copy of the signed copy. What we keep, which is typical of how our records are, is the carbon copy, in essence, which is typically initialed. But, no, in the world of Xerox machines, there is no reason why we had not told people to hang on to a signed copy. Mr. Goodlatte. Mr. Fine, did you draw any further conclusions from that? Do you know why they were not retained? Mr. Fine. They were not retained because there was not a clear policy that was enforced. Mr. Goodlatte. No ulterior motive that you know of? Mr. Fine. I do not believe there was an ulterior motive, but this was an example of an incredibly sloppy practice that was unacceptable. Mr. Goodlatte. I agree. Let me ask you, when did you first learn of the problem with the FBI's improper use of the exigent letters? Mr. Fine. Well, we began our audit, as required by the PATRIOT Reauthorization Act, around the beginning of 2006. As you can see from this report, there are a lot of issues, and we did interviews and document requests and field files. I think sort of the first indications where we learn about it were in the spring or summer of last year, where we had to work through those issues. Mr. Goodlatte. And who did you learn that from? Mr. Fine. We learned it from, I believe, people in the Office of General Counsel, the National Security Law Branch of the FBI, about these issues. I think they are the first people we learned it from, as well as from the review of documents and e-mails and things like that. Mr. Goodlatte. And what steps have you taken to ensure that the practice was stopped? Mr. Fine. The steps we have taken are to inform the FBI about the unacceptability of this practice, to note it, to report it, to let the people who are in charge of the FBI and the General Counsel's Office know about it, and to make a recommendation that it does stop. Mr. Goodlatte. When did you make that recommendation? Mr. Fine. I think we made the recommendation when our report was issued to the FBI in draft; and I think that was in either December or January of this year. It was December of last year or January of this year. Mr. Goodlatte. Ms. Caproni, has that practice been stopped? Ms. Caproni. Yes. Mr. Goodlatte. What steps have you taken to ensure that it does not persist in any of the offices of the FBI? Ms. Caproni. Well, first, we are trying to find out whether it did happen in any office other than the unit at headquarters, and we should know that answer probably by the end of this week or sometime next week. The second thing is that the practice of providing a letter with a promise of future legal process has been banned. And, again, we are also developing a vigorous compliance program to make sure that we do not simply make the rule, but we actually have in place some kind of process to make sure that the rules are being followed. Mr. Goodlatte. Current law authorizes a full credit report request for only counterterrorism investigations. The Inspector General discovered two instances in the same field office of a full credit report request under counterintelligence investigations. How is this being corrected? Ms. Caproni. This is being corrected by--the deputy director ordered a full audit of every counterintelligence file that has been opened since January 1, 2002. This authority went into effect in the PATRIOT Act. So, realistically, we think the earliest one that could have been issued would have been in 2002. So they have to review every file since then in which a Fair Credit Reporting Act NSL was issued and find out if they have any full credit reports. If they do, they need to remove them from their files and report it as a potential IOB violation. Those will, in turn, be reported on to the IOB. Mr. Goodlatte. One last question. In at least one instance, a National Security Letter issued under the Electronic Communications Privacy Act was determined by the Inspector General to be seeking content. How was this remedied, and what steps do your field agents take to delineate between content and transaction information? Ms. Caproni. In that case, there was no need to remedy it because the Internet service provider refused to provide us with any records, so we actually did not have an overcollection. Mr. Goodlatte. Have you remedied the request? I mean, they should not be asking for that. This was a big issue when we wrote the PATRIOT Act, and it was the subject of a great deal of discussion with the Administration about making sure that we had a clear line between what could be requested and what could not be requested. Ms. Caproni. The statute defining electronic communications transaction records actually does not define the term, and there had traditionally been the debate that says that we will leave up to the ISP what is content and what is not. We think that is a trap for the unwary. It is bad for our agents in that we do better with bright lines. And so OGC will establish--we are in the process of making sure that we have a list that makes sense of what is content and what is not. In the abstract, that seems like a very clear line; in practice, it is not. There are some difficult issues because some of the answers revolve around how the ISP keeps their records. So we are working on it. My anticipation is that, within the next week or two, we will have out to the field these records you can seek, these records you cannot seek, and it will be a very bright line. Mr. Goodlatte. Thank you, Mr. Chairman. Mr. Conyers. The gentleman from Georgia, Mr. Hank Johnson. Mr. Johnson. Thank you, Mr. Chairman. In these reports that I have read, it indicates that there were three phone companies that the FBI, particularly the FBI Communications Analysis Unit, the CAU, contracted with three telephone companies between May of 2003 and March of 2004. Who were those telephone companies? Ms. Caproni. The telephone companies were AT&T, Verizon and MCI, which has now been acquired by Verizon. Mr. Johnson. Now, are those contracts still in force at this time? Ms. Caproni. Yes, they are. Mr. Johnson. And are there any other phone companies that are contracted with the FBI through the Communications Analysis Unit or any other unit of the FBI? Ms. Caproni. Not through the Communications Analysis Unit; broader than that, I do not know. We may have contract--not for this sort of information. We may have other contracts with phone companies, but not like this. Mr. Johnson. And nobody put a gun to these telephone companies' heads and made them sign the contracts, did they? Ms. Caproni. No. Mr. Johnson. They were just simply agreements with the FBI and with the phone company? Ms. Caproni. Correct. From our perspective, because these originated--given the volume of our requests, that this permitted us to get our records very quickly. Mr. Johnson. Well, I understand. Then the phone companies received compensation for engaging in this contract with the FBI; is that correct? Ms. Caproni. That is correct. Mr. Johnson. And this compensation, was it merely for expenses or was there profit involved, or you have no way of knowing? Ms. Caproni. I do not know. Mr. Johnson. Really, you do not really care as long as you get the information, correct? Ms. Caproni. Again, from our perspective, the goal was to get the information in a form that is readily usable for us so that we do not have--some phone companies give us paper records. That requires a lot of data. Mr. Johnson. Okay. All right. I understand. Earlier in your testimony, ma'am, you stated that the phone companies were responsible for a lot of the errors that are cited in the compliance with the National Security Letters. Ms. Caproni. We do see third-party errors, correct. Mr. Johnson. You saw a substantial number, and so you are placing upon the phone company the obligation to properly document whether or not there has been a follow-up with an exigent letter? Ms. Caproni. Oh, no, sir. They are two separate things. I do not excuse our lack of recordkeeping in connection with the exigent letters. They did keep the records, which was fortunate. Mr. Johnson. And it is important to note, Mr. Fine, that your analysis of the FBI's compliance with the PATRIOT Act found that there were woefully inadequate mechanisms for the collection of data on these National Security Letters. In other words, the recordkeeping by the FBI was woefully inadequate as far as the issuance and follow-up on these National Security Letters and also the exigent letters; isn't that correct? Mr. Fine. We did find serious and widespread misuse and inadequate recordkeeping, absolutely. Mr. Johnson. Do you have any idea, Mr. Fine, how much the telecommunications companies were paid for their so-called ``contract'' with the Government? Mr. Fine. I do not know, no. Mr. Johnson. All right. Can you, Ms. Caproni, provide my office with that information, along with copies of the contracts between the CAU and the phone companies? Ms. Caproni. I have great confidence that we are going to get a number of questions for the record after this, and I am assuming that will be one of them, and we will respond appropriately. Mr. Johnson. Will it take a subpoena for us to get that information? Ms. Caproni. I do not believe so. I do not know what is in the contract, so I do not know if there are any sensitive issues. Mr. Johnson. Will you provide it to my office? Ms. Caproni. Again, we will respond to questions for the record as they come in. Mr. Johnson. All right. Why, if the NSLs are the FBI's bread-and-butter investigative technique, could the Inspector General only identify one terrorism prosecution out of the 143,074 people whose investigatory information was obtained? Ms. Caproni. Again, Mr. Fine can explain his methodology, but I think the issue and the difficulty of that question is that because there was no congressional--because we were not legally obligated to tag the data, tracing it through is difficult. Mr. Johnson. So 1 out of 143,000. How does that equate to being the bread-and-butter investigative technique for uncovering terrorism by the FBI? Ms. Caproni. Again, we disagree that in only one case did NSL data contribute to a criminal prosecution. Mr. Johnson. But would you say more than 10 or less than 10? Ms. Caproni. I do not know. It is my belief that virtually every counterterrorism case that began in its normal course of affairs is likely to have a National Security Letter used sometime during it. Mr. Johnson. And it is also---- Mr. Conyers. Your time has expired. Mr. Johnson. Thank you. Mr. Conyers. Mr. Johnson, any records that you request will come to the Committee, and then you will be advised. The Chair is pleased now to recognize the gentleman from Florida, Mr. Tom Feeney. Mr. Feeney. Thank you very much, Mr. Chairman. Earlier, Mr. Smith alluded to your illustrious basketball career. I went to the same high school as Mr. Fine. He graduated a few years before me, and I wish I had had a jump shot like Mr. Fine did, but not nearly so much as I wish I would have been able to hit a fast ball like Mr. Reggie Jackson, who graduated a few years before Mr. Fine did. But we thank you for your work. By the way, none of us is the most famous graduate because Benjamin Netanyahu, the former Prime Minister of Israel, is. I had to get that plug in. We are very grateful for your work here, because a lot of us are supporters of the PATRIOT Act, but only with some serious restrictions. And I guess the first question I want to ask you--and I want to remind people that it was the reauthorization of the PATRIOT Act that actually required the report that you have just completed; is that right? Mr. Fine. Yes. Mr. Feeney. And I hope that not just your report but the tenor of the questions from supporters of the PATRIOT Act, as well as the critics, is being listened to very carefully in the Justice Department and in the FBI. We have got to get this balance correct; and nothing could be more critical because some of the most unthoughtful critics of the PATRIOT Act candidly will be the first ones--when there is another 9/11 and when we do not get the information accurately ahead of time to stop, maybe not 3,000 or 4,000 people, but 300,000 or 400,000 people, they will be the first ones jumping on the Administration, the Justice Department and the FBI for not doing its job. But those of us trying to strike a thoughtful balance between civil liberties and the need to protect America from this new threat are very, very concerned about what we have heard, and if the FBI does not take this to heart, we will correct the problem. I do not think anybody could have said it better than Jim Sensenbrenner, who, again, is a supporter of the PATRIOT Act, who said that the overreaching that is apparent here within the FBI is going to erode support, if it has not already, for very important national security initiatives. And I would hope that everybody down at Justice is listening because these are the supporters, people like Lungren, Feeney and Sensenbrenner, who are telling you this is not right, that it cannot continue. Mr. Fine, do you have an opinion as to whether or not the serious problems that you have discovered in initial compliance with the PATRIOT Act are largely because of ambiguities or poorly structured legislation? Is it statutory language that is the problem, largely, here; or is it abuses within the FBI and compliance? Mr. Fine. I do not think it was the statutory language that was ambiguous. I think it was the execution of the policy by the FBI that was woefully inadequate. Mr. Feeney. Just to follow up, can you identify or do your report and investigation lead you to conclude that there are any important statutory improvements we can make? I realize it is not your typical arena to give us advice, but are there any specific pieces of advice that you would give the Congress in terms of oversight or statutory reforms here? Mr. Fine. Well, you are correct, it is not my arena to do that. What I try to do is present the facts to this Committee and to Congress and let the facts lead this Committee and Congress to do what they believe is appropriate. There is one section of the report that does talk about an ambiguity in the meaning of toll billing records. I think there ought to be something done about that, because that was a concern of what that meant, and it should be clarified. I do think---- Mr. Feeney. Could the AG do that, by opinion? Mr. Fine. I do not think so. It has to be done by Congress. I do think that the Committee does need to strike a balance and to sort of balance the need for protections and controls over civil liberties with the need for tools to prevent and detect and deter terrorism. And that is the difficulty in this task, and that is the real concern that we have about how the FBI implemented this. Mr. Feeney. You said you sampled 77 case files, the report indicates. How many case files are there all together, roughly? Mr. Fine. That I could not tell you. Mr. Feeney. Do you believe that the 8,850 failed reportings are systemic and that, if you would extrapolate, we would probably see that elsewhere? Mr. Fine. I do believe that the files we looked at were a fair sample and that there is no reason to believe that it was skewed or disproportionate. We did not cherry-pick them. Mr. Feeney. Do you have any reason to believe that there were more abuses in the 8,850 requests that were not properly reported? Is it any more likely for there to be abuses of civil liberties or of the law or of the AG's rules than the requests that were properly recorded? Mr. Fine. Well, we do not know how many requests were not recorded in the FBI's database. There were problems with the database structurally so that things were not in there. There were delays in entering in the database, so Congress did not get the information, and when we looked at the files, there were NSLs that were in the files that did not go into the database. Approximately--I think it was 17 percent of the ones we found were not in the database. Now, that is a significant number; and now--I know the FBI is trying to find them in the database as we speak, but we have no confidence in the accuracy of that database. Mr. Feeney. Finally, if I could, Mr. Chairman. Ms. Caproni, you alluded to the culture of the FBI, which traditionally, I find, is a crime-fighting institution. Some people have called for an N15 type of intelligence agency with a different culture, and it might be interesting that you take back the interest that some of us in Congress have, that if the FBI cannot change its culture or have a separate culture for intelligence than it has had traditionally, we very much need a different type of institution to get intelligence right, to protect this country on a day-to-day basis. Ms. Caproni. Again, I believe that we can do this. We are going to do this. We can get this right. We are going to get it right. Mr. Feeney. Mr. Chairman, I yield back the balance of my time. Mr. Conyers. Thank you. There was not any left. Mr. Feeney. That is why I did it. Mr. Conyers. I see. Okay, we are now going to recognize the gentleman from California, Mr. Adam Schiff. Mr. Schiff. Thank you, Mr. Chairman. Inspector General Fine, you have said that you did not find that any of the violations were deliberate or intentional, and yet, you also report the issuance of blanket NSLs, which, to me, appear to be an effort to cover up what was recognized to be a flawed issuance of these exigent letters. Given that NSL letters are supposed to be case-specific, the NSLs were a blanket violation of the law, weren't they? How can they be described as unintentional or anything but deliberate? Mr. Fine. I think what you are referring to, Congressman Schiff, is the issuance of what we have heard about of blanket NSLs in 2006. We have not reviewed 2006 yet. We reviewed 2003 to 2005. We have heard about this. It is past the review period, and we are concerned about it, and we will look at that. Mr. Schiff. Well, Ms. Caproni, in your briefing on the Hill last week, you acknowledged that when agents realized that they had been issuing these letters, these exigent letters, saying that subpoenas were forthcoming when they were never forthcoming, that blanket NSLs were issued as a way of basically trying to clear up or cover up or, in other words, make up for the failure to use correct processes in the past. Assuming those are the facts, Inspector, doesn't that show a level of deliberateness and intention that far exceeds what you have described in your report? Mr. Fine. It certainly shows us concern of what were they thinking. They clearly were not following the procedures. They clearly were not providing NSLs in advance or even, quite reasonably, soon thereafter; and it did give us concern. And there were a lot of people who did this. It was done as a sort of routine practice which is, in our view, completely unacceptable. But I think it is important for the FBI to look at this and to interview these people and find out what happened up and down the line. And we will be looking at it, as well, in 2006. Mr. Schiff. Well, even as to the false statements themselves, in these exigent letters that said that subpoenas were forthcoming when they were not, let me ask you, Ms. Caproni, if a local cop in the city of Burbank in my district wrote letters to the phone company, or went out and served letters on the phone company, saying that Federal grand jury subpoenas would be forthcoming, because that local cop wanted to get information that maybe he could not get another way, or could not get as quickly another way, and you learned about this practice, that cop would be under Federal investigation, wouldn't he? Ms. Caproni. Congressman, I really do not know that. I do not think you have given me enough facts to say whether that would or would not be the case. Mr. Schiff. Well, a local police officer acting under the color of Federal law, demanding records, claiming a Federal process that is nonexistent, that would not be an issue for a Federal investigation? Ms. Caproni. It would certainly be troubling, much as the practices that were taking place in the CAU unit are troubling. Mr. Schiff. Well, you know, having worked in the Corruption Section of the U.S. Attorney's Office in L.A., I can tell you it would be more than troubling. You would have FBI agents assigned to investigate that local cop. It does not seem to me to be any different to have FBI agents giving telecommunications providers letters saying that subpoenas are forthcoming when they are not. When did your office discover that these old New York form letters were being used to get information? Ms. Caproni. Sometime in 2006. Mr. Schiff. You know, there is a report in The Washington Post that indicates the head of the Communications Analysis Unit, the same unit that drafted most of these letters, warned superiors about the problems in early 2005. Do you know anything about that? Ms. Caproni. I know what I have read in the paper, and I know that the Inspection Division is going to do a full inspection of this to see what exactly the unit chief said. Mr. Schiff. Well, I am asking you to go beyond what you have read in the paper, and we all know what the IG is going to do. When did you first learn about the fact that the head of the unit that was drafting these letters had warned superiors-- do you know who those superiors are? Ms. Caproni. I do not know who he says he warned. Mr. Schiff. Were you warned by him? Ms. Caproni. No. Mr. Schiff. Do you know if anybody in your office was warned by him? Ms. Caproni. I am not sure that I even necessarily agree that there was a warning. I know that there were--and I knew generally that there were what I understood to be bureaucratic issues within that unit. That did not include---- Mr. Schiff. You keep on describing these bureaucratic issues. I find an interesting kind of mix of an acceptance of responsibility in your statement and a denial of responsibility. You seem to accept responsibility for mistakes others have made, but acknowledge very little responsibility on behalf of the office you run. It is primarily your office that is intended to advise the agents about how to comply with the law, particularly in an area where the courts are not scrutinizing it, as you pointed out, in a process that lacks transparency. Isn't that fundamentally the job of your office? Ms. Caproni. That is fundamentally the job of my office. Mr. Conyers. The time of the gentleman has expired. The Chair recognizes Louie Gohmert of Texas. Mr. Gohmert. Thank you, Mr. Chairman. I appreciate that. I am very pleased that when we renewed the PATRIOT Act, we did insert the provision that would require this Inspector General report so that we could find out this information that is so very important. In your report, your indications, Mr. Fine, were that the FBI did not provide adequate guidance, adequate controls, or adequate training on the use of these sensitive authorities; and that oversight was inconsistent and insufficient. Ms. Caproni, as I understood Director Mueller to say last week, he took responsibility for the lack of training and experience, and that troubled me a great deal. You had indicated earlier that people of, I guess, our generation and especially those in the FBI had grown up with accountability, knowing they could be cross-examined. And yet, it seems that the overzealousness that Mr. Cohen spoke of often is found in maybe new agents who do not have the time on the ground, the experience. Wouldn't you agree that is sometimes found in newer agents who lack the training and experience? Ms. Caproni. I do not know in this case if this is an issue of young agents versus old agents. I just do not know the answer to that. Mr. Gohmert. Well, are you familiar with the new personnel policy that this Director instituted in the FBI that is affectionately, or unaffectionately, called the ``up or out policy''? Ms. Caproni. Yes, sir, I am. Mr. Gohmert. You know, I appreciate the Director last week saying that we welcome more oversight; I appreciate your openness in that regard. But just in my couple years of being in Congress, it seems to me that the FBI, at the very top at least, was not interested in oversight and was set on intimidating anybody who really wanted to pursue that. I know we have one Member of Congress, a former FBI agent, who had indicated to me that--because many of us who are very familiar with many FBI agents, we have been hearing that this policy was causing the FBI to lose some of their best supervisors. The policy is basically--as I understand it, once you have been a supervisor for 5 years, then you either have to move up to Washington or move out, that you cannot be a supervisor; and that we have lost many of our best supervisors, and we just put new, inexperienced people in supervisory capacities. And this was something that Mike Rogers, a former FBI agent and a Member of Congress, wanted to talk to someone about; and when he finally was able to get somebody to agree, in a supervisory position, he goes back to his office and his whole office staff is out in the hall because the FBI has come over and done a sweep of his office that was really unnecessary, and it seemed to be more about intimidation. One of the most outspoken critics of the FBI in the last couple of years has been Curt Weldon, and we know that, back in September-October, the FBI announced, well, gee, he is under investigation just at a perfect time to get him defeated. And so it seems, when we find out that there are all of these 143,000 letters that were inappropriately requested and that, gee, somebody asked tough questions of the FBI personnel and they may very well be the 143,000 and first letter in the next batch inquiring about their own records, that there has not been this desire for oversight, but there has been quite some intimidation. So I am curious, has there been any revisiting of this up- or-out policy to get rid of the best trained and experienced supervisors since this lack of training and experience and inadequate guidance and controls have come to light? Ms. Caproni. Congressman, the period of time covered by Mr. Fine was at a period of time when those supervisors would have still been in place. What we have seen, actually, is that the 5-year up-or-out has encouraged people to bid for and seek promotion to higher positions, which has been a net positive. Now, I know that you have an interest in this, and I know that there were agents who were not happy about the policy. The Director feels very strongly that it is an appropriate policy, that it does move good supervisors up in management so that they have a greater span of control, so that we can further benefit from the skill sets that they have from their tenure at the Bureau. Mr. Gohmert. So the answer is, no, you are not revisiting the policy? Is that your answer? Ms. Caproni. That is correct. Mr. Gohmert. Okay. I just wanted to weed through and get to the answer. Thank you. Now, with regard to these letters, it is deeply troubling because we have been hearing about how important they were in order to get this information. But you know--I mean, we had assurances from everybody from the AG on down that there was adequate oversight, that there was adequate training. What suggestions--since you are not changing any personnel policies, what actual structural policies within the FBI are going to change to make sure that there would be adequate oversight just in case the NSLs were allowed in the future? Ms. Caproni. Again, we are going to do substantially more training. Agents are now being placed into career paths, and they are going to be required, after their time at Quantico, to return to Quantico for sort of a postgraduate period. That will have extensive training for those agents who are on the national security career track. We are also implementing an auditing practice that will include Department of Justice lawyers, inspectors from the FBI, and FBI lawyers to go out and methodically audit the use of the National Security Letters. More generally, we are going to create a compliance program within the Bureau that will be interdisciplinary, and it will make sure that--not just with National Security Letters. I mean, this is one tool, and it is a tool that, as indicated in this report, we need better controls on. Our concern is that there may be other things that we need to make sure that we have gotten better controls on, that we think we have given perfectly clear guidance on, but in terms of execution in the field, we have got some problems. So, again, I cannot say enough that we take this report extremely seriously. We know we have got issues. We know we have got problems. The Director and upper management are absolutely committed that we are going to fix this. Mr. Conyers. Your time has expired. Mr. Gohmert. Thank you, Mr. Chairman. Mr. Conyers. Mr. Artur Davis from Alabama is recognized. Mr. Davis. Thank you, Mr. Chairman. Ms. Caproni, give me your best legal assessment. Would the exclusionary rule apply to any evidence obtained from the improper issuance of these letters? Ms. Caproni. Probably not, but I have not, quite frankly, given that a great deal of thought. It is not a fourth amendment violation. The exclusionary rule clicks in when you have got a fourth amendment violation. These records are being held by third-party businesses, so it is not a fourth amendment problem. Mr. Davis. Well, would there not be fourth amendment implications if information were obtained as a result of the improper use of Federal statutory authority? Ms. Caproni. There would be other problems, but I do not think there is a fourth amendment problem. Mr. Davis. Well, do you think that there would be a practical problem? A classic hypothetical: If a National Security Letter were improperly issued, and it turned out later on there was perhaps a valid basis for the issuance of a warrant, wouldn't that possibly be compromised or wouldn't the emergence of a valid basis later on be compromised by the misuse of an NSL? Ms. Caproni. Again, I am always leery of responding to hypotheticals. All I can say is, there is no--we are not minimizing this. We do not want any improper use---- Mr. Davis. So you are not sure. Let me follow up on Mr. Schiff's questions. Are you familiar with the name Bassem Youssef? Ms. Caproni. Yes, sir, I am. Mr. Davis. Mr. Youssef, as I understand it, was in charge of the Communications Analysis Unit at the Bureau; isn't that right? Ms. Caproni. He was, beginning in the spring of 2005. Mr. Davis. Is it accurate that Mr. Youssef raised concerns about the misuse of the NSLs to his superiors? Ms. Caproni. That will have to be determined through the inspection. I do not know the answer to that question. Mr. Davis. Well, you know that that has been reported, and I assume, Mr. Fine, neither you nor Ms. Caproni has any basis to dispute what Mr. Youssef's lawyers are saying about his making that report. Ms. Caproni. I would note that Mr. Youssef is in litigation with the FBI. Mr. Davis. That is not what I asked you. I asked you if you had any basis to dispute this report. Ms. Caproni. I do not know one way or the other. Mr. Davis. Mr. Fine, do you have a basis to dispute that there were complaints raised by the former head of the Communications Analysis Unit? Mr. Fine. We did not review what he did, what he---- Mr. Davis. Mr. Fine, how is it possible that you did not review the fact that the former head of the unit raised questions about the misuse of the NSLs? How is it remotely possible that was not reviewed? Mr. Fine. We reviewed what happened in that unit and what was issued; and we did review the discussions that occurred between the Office of General Counsel, and that included---- Mr. Davis. Mr. Fine, the head of the unit--not a secretary, not an intern, not a line officer--but the head of the unit raised concerns. How is it possible that you did not conduct an interview of Mr. Youssef? Mr. Fine. We did interview Mr. Youssef, and we did not hear that concern from him. And, in fact, from the interview of Mr. Youssef and also from the review of the records, we saw that he had signed a letter. And many letters were signed---- Mr. Davis. Are you disputing that Mr. Youssef complained about the improper issuance of NSLs? Mr. Fine. To his superiors? Mr. Davis. Yes. Mr. Fine. I do not know that. I do know---- Mr. Davis. Did you ask him? Mr. Fine. I do not believe we--I am not sure whether we asked that question, but---- Mr. Davis. Mr. Fine, how do you possibly not ask the head of the unit if he had any concerns about whether or not the statute was followed? How does that possibly not come up as a question? Mr. Fine. We did ask him, and we questioned him extensively, our attorneys did, about the communications between the Office of General Counsel, which was that---- Mr. Davis. Well, did he say that he raised questions? Mr. Fine. Not that I am told, no. Mr. Davis. Not that you remember or not that you were told? Which one? Mr. Fine. Well, I actually did not do the interview, but let me just check. [Brief pause.] Mr. Davis. While you are working on the answer to that, Mr. Fine, the rather obvious observation is that I hope that your time to get the answer is not taken out of my time. If you have the head of the Communications Analysis Unit raising questions about how that unit does its work, it is a little bit amazing to me that you are having to search your memory as to what happened during the interview. But let me move on. Mr. Fine. Well---- Mr. Davis. Is it true--well, my time is limited, Mr. Fine. Is it true that Mr. Youssef won the Director of Central Intelligence Award in 1995 for his work infiltrating the group that tried to blow up the Trade Center in 1993? Mr. Fine. I have heard that. Mr. Davis. Do you have any reason to dispute it? Mr. Fine. No. Mr. Davis. Is it true that Mr. Youssef was the legal attache to Saudi Arabia during the time that the Khobar Towers bombing was being investigated? Mr. Fine. I have no reason to dispute that. Mr. Davis. Is it true that Mr. Youssef received outstanding personnel evaluations during that time? Mr. Fine. I have no reason to dispute that. Mr. Davis. So you have someone who was the head of a unit, who had won awards for his intelligence work, who apparently received superior evaluations, raising concerns about how his unit was being conducted; is that accurate? Mr. Fine. I am not sure it is accurate. I am not---- Mr. Davis. What is inaccurate about it? Mr. Fine. What is inaccurate is that it is not clear what concerns he raised and what he did to stop this. And we did look---- Mr. Davis. Again, Mr. Fine--I know my time is up. If the Chairman would indulge me for one question. I guess I am searching for what is opaque about this. This gentleman was in a very important position; he was in charge of the unit. You admit that you interviewed him, but your memory seems foggy as to what you asked him, and your memory seems foggy as to whether or not he raised concerns to his superiors and what the concerns were. I cannot imagine a more important interview that you could have conducted. Mr. Fine. We did conduct that interview, and we went over extensively what the concerns were between him and the General Counsel's Office and the attempts to put the exigent letters-- -- Mr. Davis. Who did he raise these concerns with? Mr. Conyers. The gentleman's time has just about expired. What I would like to do is to give the Inspector General an opportunity to fully finish his answer. Mr. Fine. We did interview Mr. Youssef, Congressman, and we did not find that, as a result of his actions, the problems were corrected. We did find, through review of the NSLs, that he signed one, that under his leadership these exigent letters continued; and we saw the efforts between the Office of General Counsel and the CAU to correct this, which did not occur, and we did not see that he put a stop to this. However, we did not do---- Mr. Davis. Was he of the power to put a stop to it? Mr. Fine. He was the head of the unit. Mr. Conyers. Just a moment. If my colleague will suspend, I want him to be able to complete his answer before we go on to the next Member. Mr. Fine. We did not see that this practice was stopped during his time. There was an attempt to sort of provide NSLs reasonably soon after the exigent letters, but the exigent letters continued. And it is important to determine who did what, when and how; and the FBI is going to do that, and we are going to look at that very carefully, as well. But our review was not to look at everybody's actions up and down the line, including his or others' to determine what steps each one of them took. What we tried to do is present the problem and the issue and make sure that it stopped as a result of it. Mr. Conyers. The gentleman's time has expired. The Chair recognizes Darrell Issa, the gentleman from California. Mr. Issa. Thank you, Mr. Chairman. I guess I will start off slowly and just follow up on Mr. Gohmert for a second. It does seem amazing that an organization of excellence, as the FBI has historically been, would adopt a ``We have got to get you to the Peter Principle achievement level with this up-or-out policy,'' and I would strongly second Mr. Gohmert, what I think he was saying, which is, if you have people who can be very good at what they do at the beat levels, so to speak, of the FBI in various positions--if they can, in fact, be superb leaders at a level that they are comfortable and, quite frankly, in a community that they are comfortable living and working in and building more capability, rapport and analysis capability and you adopt an up-or-out program--what you do is, you force them either to leave because they do not want to leave communities they are attached to or, quite frankly, you force them to a management level they may not be comfortable with. It is bad enough that the Army will not allow a great company commander to continue being a company commander and must force them to a staff position somewhere where they endlessly see papers in the hopes that they someday will get a battalion command, but there is a certain amount of history there. I strongly suggest that the FBI should not have a history that people doing a good job at a given level be forced on. Having said that, that is a management decision that the next Administration hopefully will straighten out. Speaking of management decisions, General Fine, I am a little shocked that under this Attorney General, this Administration seems to look at violations of constitutional rights for limited capabilities that we have granted from this body, as the general counsel said, ``troubling.'' If what the FBI did was done by a private sector individual, wouldn't the FBI be arresting them? Wouldn't the U.S. attorneys be prosecuting people who played fast and loose with these rules? Mr. Fine. It depends on the intent involved and what happened. Mr. Issa. Okay. Let me back up. If there were a pattern over time, as there is, of abuses piling up to where it was clear that people knew it was happening--even some people clearly made comments that it should not be happening, that it was inconsistent with the law, but it continued--isn't that a poster child for the FBI and for the U.S. Attorney's Office to criminally prosecute people who do these things? Mr. Fine. Again, if there were an intent to do that as opposed to a pattern of negligence, and also a knowledge of this, and we went in and looked at it after the fact and found all sorts of problems and compiled a 126-page report which lays it out in black and white, and it is, you know, a serious, serious abuse. But at the time, were they aware of it? Did they know about that and what their intent was? That is much harder to say. We did not find evidence of criminal misconduct, but we certainly found evidence---- Mr. Issa. Wait a second. Wait a second. Piling up evidence that crosses the guidance we allow to pile up that evidence, and you are saying that it is not criminal? Mr. Fine. Well, you have to look at the individual allegations as well. We looked at the files. We found in several files, in many files, that there were no abuses. We found in others that there were problems with them. Mr. Issa. But there are no prosecutions and no dismissals; is that correct? Mr. Fine. Well, there are no prosecutions. The FBI is looking at the evidence right now to see what people knew and what they did not, whether it was because of any intentional conduct that they knew they were doing wrong. We did not see that, but we did not do a review where we asked each individual, ``What did you do and why?'' we did a review of--an audit of this to lay out the problems for the Congress. Mr. Issa. Well, I would suspect that I join the Chairman and many Members on both sides of the aisle in saying, I have serious doubts about whether or not the Congress can continue to extend capabilities that are not 100 percent adhered to and there are no significant results when they are not adhered to, and then not feel that what we are doing is giving the FBI the ability to violate people's constitutional rights. You know, I heard today, well, geez, we would not exclude this--and Congressman Schiff brought it out--we will not exclude this information even though we played fast and loose; and we will not dismiss and we will not prosecute. Well, with all due respect, from the Attorney General on down, you should be ashamed of yourselves. We gave--we stretched what we could give in the PATRIOT Act. We stretched to try to give you the tools necessary to make America safe, and it is very, very clear that you have abused that trust, and when the reauthorization of the PATRIOT Act comes up or any bill coming down the pike, if you lose some of these tools, America may be less safe, but the Constitution will be more secure, and it will be because of your failure to deal with this in a serious fashion. I yield back. Mr. Conyers. Thank you very much. The Chair recognizes Keith Ellison, the gentleman from Minnesota. Mr. Ellison. Thank you, Mr. Chair. Mr. Fine, I want to talk to you about your report recommendations starting with the exigent letters. Wouldn't it be better simply to adopt the FBI's practice, current practice, of simply banning the use of exigent letters? I notice that in your recommendations, or in what I believe are your recommendations, your suggestion is to take steps that the FBI not improperly use the letters, but why not just say ``no exigent letters''? Mr. Fine. Well, there should not be an exigent letter of the sort that they use. There is a process under the statute to get emergency information under certain conditions, and that is the way they ought to do it. So that is a proper use of such a request. They surely should ban the way they did it in the past. Mr. Ellison. And that would be a change by statute or a rule change? Mr. Fine. Well, it does not need to be a statute. There is a statute that allows voluntary disclosure if there is an imminent threat and danger to the safety of an individual or others, and if there is that exigent circumstance, they can get the information and use such a letter. But what they should not do is combine it with an NSL the way they did it in the past. They ought to completely separate that and follow the statute. Mr. Ellison. Right. So what you are saying is that the practice in which the FBI was using the exigent letters combined with the NSL was--if the statute were properly followed, then there would not be the problem that we see today; is that right? Mr. Fine. That is correct. Mr. Ellison. Now, what sort of sanctions do you think should be applied, given the way that the FBI did use the NSL and the exigent letters? Mr. Fine. I think the FBI ought to look at this and look at the individuals involved and find out if they inappropriately and knowingly misused the authorities. They ought to take appropriate action against individuals, either management individuals who allowed it to occur or individuals in the field; and if they had poor performance, that ought to be assessed as well. So I think that ought to be something that the FBI is looking at. But I do not think they ought to say that simply because there was a misuse of the statute inadvertently that that would necessarily require misconduct charges against them. Mr. Ellison. Right. Well, you know, part of the problem here is that the very nature of the act that allows for the expanded use of the NSL is below the radar, and so it, by nature, lacks transparency, which is why people are so upset that the abuses took place. But I guess my next question is, another recommendation that you have made is that there be greater control files for the NSLs. How would you envision that working? Mr. Fine. No. There should be greater controls on the use of NSLs. They ought to make sure that the people know when they can be used and under what statute they can be used. There need to be signed copies of the NSLs so that there can be an audit trail. They have to be connected to an investigative file, not a control file. Mr. Ellison. Excuse me. I am sorry, Mr. Fine. Do you see this as essentially a training problem? Mr. Fine. I think it is a training problem. I think it is a supervision problem. I think it is an oversight problem. And I think it is a lack of adequate internal controls and is an auditing problem as well. Mr. Ellison. Now, that brings me to the few questions I had for Ms. Caproni. Ms. Caproni, do you have the staff to make all of the changes that are needed in order to have this program work properly? Ms. Caproni. I would always like more resources. Mr. Ellison. No. I am asking you--that is not my point. My question is, in order to--we could just simply go back to status quo, anti--back to pre-PATRIOT Act where NSLs were authorized, but not the expanded use of them that we have now. That could be one way to simply solve this problem. But my question is, at this time, do you have the staff to provide the training, to provide the controls that are called for by the recommendations? Ms. Caproni. I do. We are going to get some more staff that we have already discussed. We are going to get some analytic help, because we think that some of this would have been detected if we had had good analytic help so that we could see trends. But I think that we have enough lawyers. I think we can do what needs to be done. We are going to have assistance from Department of Justice lawyers for some of this, but I think we have sufficient resources. Mr. Ellison. Ms. Caproni, if you have the sufficient resources, why didn't you use them before? I mean, I guess the question that comes up in my mind is that you either do not have the resources to effectuate the changes that have been recommended or you do. And if you do, why weren't they applied? Ms. Caproni. This report told us a lot that we just did not know. I mean, I will fall on that sword again, which is that we learned a lot from this report, and we are going to make changes. I think I have got the personnel to do it. I think we have got the resources. We are going to make the resources available. This is important to us. It is important to us to regain the confidence of the American people and to regain the confidence of this Committee. You are one of our oversight Committees, and you are very important to us, and we are not-- trust me, I am not happy that we have this report and that I am in the position of saying, you know, we failed. Mr. Ellison. Ms. Caproni, if I could just go back to Mr. Fine. Mr. Fine, one of the changes that was made in the PATRIOT Act was to say that, I think, people other than headquarters officials could issue these letters. Should the authority for the issuance of the letters be retracted to what it was before the PATRIOT Act? Mr. Fine. I am not sure of that, and I do not want to necessarily give legislation that should occur. I do think it is important, if that authority is out there, that it has to be overseen; and bringing things back to headquarters may or may not be the answer. As you will recall in the September 11th attacks with the Moussaoui case, one of the concerns was headquarters was controlling the field too much, and so there are considerations on both sides of this issue. I do think that when it does go out there, it has to be used appropriately and overseen appropriately. Mr. Ellison. But if you had a narrower route through which these letters were authorized, wouldn't you have greater accountability? Mr. Fine. You could. You could have greater accountability. On the other hand, the effect of this could be diminished significantly, so I think that is the balance that has to be struck. Mr. Conyers. The time of the gentleman has expired, but I would like to say to Mr. Ellison that he has raised a point that we need to try to figure out at this hearing: Are there in existence the resources that are required and needed to reveal all of these people who have been abused or who have been violated by this system? For this hearing to close down--the gentleman from California, Mr. Berman, will be recognized next--without our having figured out, for example, that we do not have anywhere near the resources, as I have been talking with the gentleman from California, Mr. Lungren, about, either in the Federal Bureau of Investigation or in the Office of the Inspector General. If resources do not exist here, we may end up very well correcting everything from this point on, but how many thousands of people will have been violated to whom we will all be saying, from now on, not to worry, that it is all over with? That is a troubling consideration, Mr. Lungren, that we have had under discussion, that I am still looking for the answer to. So I recognize the gentleman from California, Mr. Berman. Mr. Berman. Well, thank you very much, Mr. Chairman. Mr. Fine, section 126a of the PATRIOT Act requires that not later than 1 year after the date of enactment of this act the Attorney General shall submit to Congress a report on any initiative of the Department of Justice that uses or is intended to develop pattern-based data-mining technology. The 1-year deadline expired on March 9th of this year. To my knowledge, we have not received this report. Can you give us an update on the progress of this report? Mr. Fine. From the Attorney General, no, I cannot give you progress. That is not my office. But I certainly can bring back that question to the Department. Mr. Berman. But I thought---- Ms. Caproni. Congressman, I, unfortunately, can tell you. Yes, it was not submitted on time. I think we sent a letter indicating that it is still being worked on. I saw a draft going back across between us and the DOJ, so it is being worked on. Mr. Berman. Okay. Well, then, let me ask you. As I understand the audit that the Inspector General has undertaken, information from the National Security Letters is routinely added to the FBI's internal automated case system, which has about 34,000 authorized users; and then it is periodically downloaded into the Investigative Data Warehouse, which has approximately 12,000 users. Is it possible that other agencies of the Federal Government, or anywhere, are using information in that Investigative Data Warehouse for data-mining purposes? Ms. Caproni. For data-mining purposes, I do not know the answer to that. I mean, they could get access to it as appropriate for their agency. Mr. Berman. So it is possible? Ms. Caproni. I do not know the answer. I do not know. Mr. Berman. You do not know if it is possible, or you do not know if they are? Ms. Caproni. I do not know what they are doing with it, and I do not know what rules and restrictions govern them, so I just cannot answer that question. Mr. Berman. Well, let me get one thing clear. Is the report that we are awaiting an Inspector General's report or an Attorney General's report? Ms. Caproni. An Attorney General's. Mr. Berman. An Attorney General's report. All right. So will that report include the data-mining of information in the Investigative Data Warehouse by agencies not within the Justice Department? This report that you have seen circulating, will it include the data-mining of information by other agencies from the Justice Department's Investigative Data Warehouse? Ms. Caproni. It does not, but I do not know whether that means that no such activities are occurring or because it is not within the scope of the request. Mr. Berman. Well, since I was involved in this language, we think that since the database is under the purview of the Department of Justice, the use of it by other agencies would be included in that report under section 126a. Ms. Caproni. I will make sure that the people at DOJ understand that that is your interpretation of it. Unfortunately, I have been in the world of NSL and this report, and I have not been in the world of the data-mining report, so I just have not read it, so that is why I cannot answer your question. Mr. Berman. So you have not been personally involved in determining whether other agencies are being cooperative on how they are using the data from the--I take it you do not. Ms. Caproni. I do not. I just have not been involved in it. Mr. Berman. If you, subsequent to this hearing, could get that information and pass it on to me, I would be very grateful. Ms. Caproni. Certainly, I can. Mr. Berman. The information about whether the report will talk about other agencies' use of the Justice Department's Investigative Data Warehouse for data-mining purposes. Ms. Caproni. Again, I will make sure that the Department understands your position. Mr. Berman. Thank you. Mr. Lungren. Would the gentleman yield to me---- Mr. Berman. I would be happy to. Mr. Lungren [continuing]. So I could ask a question? Ms. Caproni, one question just came to mind, and that is, part of this testimony today has talked about how agents in the field and special agents in charge in the field did not get the proper legal advice from, I presume, people who report to you, that they were not challenged as to the legal sufficiency of the NSLs or of the exigent letters; is that correct? Ms. Caproni. I think that comment was relative to the lawyers in the field, who actually do not report to me. Mr. Lungren. Whom do they report to? Ms. Caproni. They report to the special agents in charge. They report to their field office head. That is one of the things that Mr. Fine has suggested that we look at, and that is actively under discussion at the Bureau right now, whether that reporting structure should change. Mr. Lungren. So they do not report to you at all? Ms. Caproni. No, sir, they do not. Mr. Lungren. So they were on their own in the advice they were giving of a legal nature to the agents and to the special agents in charge to whom they report? Ms. Caproni. On a reporting basis, they do not report to me. I do not supervise them. I am in charge of the legal program. So we provide the CDCs. That is their title. We provide them with substantial legal advice, and they frequently call us when they have questions, but I do not rate them, and they do not report to me. I do not hire them; I do not fire them. Mr. Lungren. I know, but what I am trying to figure out is, if these attorneys report to the SAC, does that make it more difficult for them to tell the SAC that he or she is wrong when they are asking for one of these letters? Ms. Caproni. That is the concern that Mr. Fine has raised. I mean, I---- Mr. Lungren. Well, do you share that concern? Ms. Caproni. I do share that concern. Mr. Lungren. Could that be one of the real problems we have got here? Ms. Caproni. I will say there are arguments both ways, Congressman. It is not--and the reason I say that is because I report to the Director of the FBI, and I do not have any problem telling the Director of the FBI my legal advice; and if he does not like it, it is still my legal advice. That is what the CDC should be doing, but whether they---- Mr. Lungren. My experience has been that the SACs are pretty important people in their various offices, and most people generally think they are the top dogs, and we have this problem where, apparently, good legal advice either was not given or was not accepted, and maybe that is something we ought to look at if you folks will not look at it. Ms. Caproni. Again, we are actively looking at that very question of whether the CDC reporting structure should change. Mr. Lungren. And I thank the gentleman from California for yielding, although he is not here to receive it back. Mr. Conyers. I thank you all. The gentleman from Minnesota had one last question that I have agreed to entertain, if you will. Mr. Ellison. Thank you, Mr. Chair. My question is, of all of the letters that have been issued and of all of the inaccurate and improper data that has been set forth, clearly some information came back; and in the cases where individuals' information was obtained in violation of the rules and of the statutes, what has happened? Have these individuals been notified? What recourse do they have? What is the story on the people? Ms. Caproni. The people are not notified. Their records are removed from our databases, and the records are destroyed. Mr. Fine. That is correct. Mr. Conyers. Thank you very much. Ladies and gentlemen, this has been an excellent hearing. We thank the witnesses for continuing in an extended period of examination. We will all be working together. There are 5 legislative days in which Members may submit additional questions to you and send them back as soon as you can. We also want to enter into the record Caroline Fredrickson's statement on behalf of the American Civil Liberties Union, Congressman Coble's Department of Justice facts sheet release. We also have The New York Times, which officially alerted the FBI to rules abuse 2 years ago, dated March 18th. And we also have a letter being hand-delivered to the general counsel, dated today, March 20th, which asks her for additional information. The record will be open for 5 additional days, and without any further business before the Committee, the hearing is adjourned. We thank you for your attendance. [Whereupon, at 12:45 p.m., the Committee was adjourned.] A P P E N D I X ---------- Material Submitted for the Hearing Record Prepared Statement of the Honorable Sheila Jackson Lee, a Representative in Congress from the State of Texas, and Member, Committee on the Judiciary
Prepared Statement of the Honorable Linda T. Sanchez, a Representative in Congress from the State of California, and Member, Committee on the Judiciary
Response to Post-hearing questions from Glenn A. Fine, Inspector General, U.S. Department of Justice
Post-hearing questions posed to Valerie Caproni, General Counsel, Federal Bureau of Investigation, from Chairman John Conyers, Jr.\1\ --------------------------------------------------------------------------- \1\ At the time of publication, responses to post-hearing questions posed to Valerie Caproni had not been received by the Committee on the Judiciary.
Letter from Richard C. Powers, Assistant Director, Office of Congressional Affairs, Federal Bureau of Investigation
Prepared Statement of Caroline Frederickson, Director, Washington Legislative Office, American Civil Liberties Union (ACLU) On behalf of the American Civil Liberties Union, its more than half a million members and activists, and 53 affiliates nationwide, I thank Chairman Conyers and ranking member Smith for holding today's hearing on FBI abuse of National Security Letters. Over five years ago, in the wake of the terrorist attacks of September 11, 2001 Congress passed the USA Patriot Act,\1\ giving the FBI extraordinarily broad powers to secretly pry into the lives of ordinary Americans in the quest to capture foreign terrorists. One of the changes the Patriot Act made was to expand the circumstances in which National Security Letters (NSLs) could be issued so that the information sought with such letters would no longer have to pertain to an agent of a foreign power, and would no longer be limited to the subjects of FBI investigations.\2\ An NSL is a letter that can be issued by Special Agents in Charge (SAC) of the FBI's 56 field offices--without any judicial review--to seek records such as telephone and e-mail information,\3\ financial information, and consumer credit information. --------------------------------------------------------------------------- \1\ Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, Pub. Law No 107-56, 115 Stat. 272 (2001)[Hereinafter Patriot Act]. \2\ Id., section 505. \3\ Telephone and e-mail information that can be obtained with NSLs includes historical information on calls made to and from a particular number, billing records, electronic communication transactional records and billing records (including method of payment), and subscriber information. --------------------------------------------------------------------------- The four NSL authorizing statutes include the Electronic Communications Privacy Act,\4\ the Right to Financial Privacy Act,\5\ the Fair Credit Reporting Act,\6\ and the National Security Act of 1947.\7\ Subsequent legislation expanded the types of institutions from which records could be sought using NSLs. The Intelligence Authorization Act for Fiscal Year 1996,\8\ amended the FCRA to give the FBI authority to obtain credit header information with NSLs, and a provision of the Patriot Act, expanded this power to allow the FBI and other government agencies that investigate terrorism to obtain full credit reports.\9\ The Patriot Act also reduced the standard necessary to obtain information with NSLs, requiring only that an SAC certify that the records sought are ``relevant'' to an authorized counterterrorism or counter-intelligence investigation. --------------------------------------------------------------------------- \4\ 18 U.S.C. section 2709 (1988). \5\ 12 U.S.C. section 3401 (2000). \6\ 15 U.S.C. section 1681 et seq. (1996). \7\ 50 U.S.C. section 436(a)(1)(2000). \8\ Pub. Law No. 104-93, section 601(a), 109 Stat. 961, codified at 15 U.S.C. section 1681u (Supp.V. 1999). \9\ Patriot Act section 358(g)(2001). --------------------------------------------------------------------------- The ACLU opposed these unwarranted expansions of NSL power, and opposed making provisions of that statute permanent with the Patriot Reauthorization Act of 2005,\10\ fearing these unnecessary and unchecked powers could be too easily abused. When Congress reauthorized the Patriot Act, it directed the Department of Justice Inspector General (IG) to review the effectiveness and use of these expanded authorities and one of the first of these reports, a review of the FBI's use of NSLs, was released on March 9, 2007.\11\ --------------------------------------------------------------------------- \10\ USA PATRIOT Improvement and Reauthorization Act of 2005, Pub. Law No. 109-177, 120 Stat. 192 (2006). \11\ Office of the Inspector General, A Review of the Federal Bureau of Investigation's Use of National Security Letters, March 2007, http://www.usdoj.gov/oig/reports/FBI/index.htm (Hereinafter IG Report). --------------------------------------------------------------------------- The IG's audit confirms our worst fears: that the FBI uses its NSL authorities to systematically collect private information about people who are not reasonably suspected of being involved in terrorism, and it retains this information indefinitely. The FBI ignored the scant requirements of the law and developed shortcuts to illegally gather information the FBI wanted from telecommunications companies and financial institutions. It did this without opening the investigations for which, by law, this information must be sought or be relevant to, and often without ever bothering to secure the NSLs or grand jury subpoenas it told these telecoms and financial institutions it would secure to support its claim of access to sensitive customer information.\12\ This should be of great concern to all Americans, because the IG found the FBI is increasingly using this power against U.S. persons.\13\ And despite the issuance of more than 140,000 NSL requests, the IG report documents only one terrorism conviction--for providing ``material support'' for terrorism--and only 153 ``criminal proceedings'' resulting from the extensive use of this power.\14\ ``Criminal proceedings'' is defined as all federal grand jury proceedings, as well as search warrants, indictments and trials.\15\ --------------------------------------------------------------------------- \12\ IG Report at 94. \13\ IG Report at 38. \14\ IG Report at 63, 64. \15\ IG Report, footnote 103, p. 62. --------------------------------------------------------------------------- For over five years the Federal Bureau of Investigation has collected vast troves of data in secret and without accountability. I hope this hearing is only one of many to reestablish checks and balances on the executive branch and curb its many abuses of power. The ACLU asks this committee to hold the FBI and this administration accountable for these abuses and to make statutory changes that will ensure that they cannot happen again. THE INSPECTOR GENERAL'S FINDINGS Despite statements to the contrary, the Inspector General found much more than just sloppy management and poor record keeping. The Inspector General's report documents systematic failures to meet statutory requirements, and at times, intentional refusals to comply with the law. Intentional Violation of the NSL Statute Most disturbingly, the Inspector General's report shows that the FBI's Communications Analysis Unit (CAU) declared itself unconstrained by the NSL statutes--arguing that the law was ``insufficient'' for CAU's purposes--and it contracted directly with three telephone companies to access information illegally.\16\ The information included telephone toll and call detail records and the contract specified that the telephone companies would provide ``near real-time servicing'' of these requests. The contracts were approved by the FBI's Office of General Counsel (OGC), and fulfilled by issuing so-called ``exigent'' letters that were used even when no exigent circumstances existed.\17\ The IG was able to confirm the use of 739 exigent letters to obtain information on 3,000 telephone accounts, in the clear absence of statutory authority to do so.\18\ The true number is unknown because the FBI does not keep adequate records. That FBI Office of General Counsel procurement attorneys were involved with these contracts confirms that the telecommunication companies were paid for their cooperation and silence, and confirms that contrary to the IG's assertion that the FBI's use of ``exigent'' letters was undertaken without the benefit of advance legal consultation,\19\ FBI lawyers were instrumental in establishing this illegal process. --------------------------------------------------------------------------- \16\ IG Report at 88. \17\ IG Report at 92. \18\ IG Report at 90. \19\ IG Report at 97. --------------------------------------------------------------------------- CAU staff, who were not authorized to sign NSLs, used ``exigent'' letters containing obviously false statements to obtain documents from the telephone companies when no authorizing investigation was open, when no NSLs or subpoenas had been requested, and when no emergency situation existed.\20\ They then asked FBI field offices to open investigations so NSLs could be issued without telling the field office personnel that CAU staff had already received the records,\21\ a clear indication that they knew what they were doing was improper. FBI National Security Law Branch (NSLB) attorneys were made aware of this issue in late 2004, possibly through complaints from field agents who resisted CAU's directives, and an NSLB Assistant General Counsel concluded that the practice of using ``exigent'' letters did not comply with the NSL statute. Yet, rather than prohibiting the practice outright, the NSLB attorney counseled CAU for two years regarding how and when CAU officials should use them. Regardless of this advice, CAU continued using these ``exigent'' letters, and the practice wasn't ``banned'' until the IG issued its report.\22\ Even today the FBI is unable to determine whether data requested with ``exigent'' letters was ever covered with properly issued NSLs or subpoenas.\23\ --------------------------------------------------------------------------- \20\ IG Report at 92. \21\ Id. \22\ FBI letter to Inspector General Glen Fine dated March 6, 2007 included in the appendix of the IG Report. \23\ IG Report p. 91. --------------------------------------------------------------------------- And the issuance of ``exigent'' letters was only one of the illegal methods the FBI used to circumvent the NSL statutes. Using a similar scheme, the Terrorist Financing Operations Unit issued ``Certificate Letters'' to obtain the financial records of at least 244 named individuals in violation of the Right to Financial Privacy Act.\24\ Again, agents without authority to issue NSLs used these letters to circumvent the law and gain access to private financial records, and then lied about it when confronted by NSLB attorneys. When the NSLB attorneys realized they had been misled they ordered the practice halted, but it did not stop.\25\ This sequence reveals what can only be described as clearly intentional misconduct. --------------------------------------------------------------------------- \24\ 12 U.S.C. section 3401 (2000). See IG Report at 115. \25\ IG Report at 117. --------------------------------------------------------------------------- In other instances NSLB attorneys actually signed NSLs without reference to any authorized investigation, and more than 300 NSLs were issued out of an FBI control file that was opened specifically because there was not an authorized investigation from which to issue an NSL for the data the FBI wanted.\26\ --------------------------------------------------------------------------- \26\ IG Report at 100. --------------------------------------------------------------------------- Increasing Collection of Data on U.S. persons When Congress expanded the FBI's authority to use NSLs, it required FBI officials to certify that the information sought with these letters is relevant to an authorized investigation. By instituting this requirement, Congress clearly intended for NSLs to be a targeted investigative power, rather than a broad power that could be used to cast a wide net. But, the IG report makes clear this is not how the FBI is using its NSL authorities. In one example, nine NSLs were used to obtain records for 11,000 different telephone numbers. And, agents and analysts often didn't even review the data they received from NSLs. They simply uploaded it into computers.\27\ The IG found information received from NSLs is uploaded into three separate FBI databases, where it is retained indefinitely and retrievable by tens of thousands of FBI and non-FBI personnel,\28\ even if the information exonerates the subject from any involvement in terrorism.\29\ Despite this extraordinary collection effort, the IG was able to document only one terrorism conviction resulting from the use of NSLs.\30\ Clearly NSLs are not being used as targeted investigative tools. --------------------------------------------------------------------------- \27\ IG Report at 85. \28\ IG Report at 28, 30, and 110. \29\ IG Report at 44. \30\ IG Report at 64. --------------------------------------------------------------------------- The IG also expressed concern that the FBI allows agents to use NSLs to access information about individuals who are ``two or three steps removed from their subjects without determining if these contacts reveal suspicious connections.'' \31\ The fact that NSLs are being issued from control files and ``exigent'' letters are being used by analytic units at FBI Headquarters suggests that this tool is not being used in the manner Congress intended. Despite the FBI's claims that NSLs are directed at suspected terrorists, the Inspector General found that the proportion of NSLs issued to obtain information on Americans is increasing. In fact, the majority of NSLs the FBI issued in 2005 were used to obtain information about U.S. persons (American citizens and lawful permanent residents of the U.S.).\32\ --------------------------------------------------------------------------- \31\ IG Report at 109. \32\ IG Report at 38. --------------------------------------------------------------------------- Datamining Neither the NSL statutes nor Department of Justice policy require the FBI to purge from its databases sensitive personal information about persons who are found to be innocent and not tied to foreign powers.\33\ The Inspector General confirmed that the FBI has taken advantage of this loophole and uploads all information--admittedly innocent or not--into national databases that are indefinitely maintained. The data received from NSLs is uploaded into a ``Telephone Application Database'' where a link analysis is conducted, and into an Investigative Data Warehouse where it is mixed with 560 million records from 50 different government databases.\34\ Tens of thousands of law enforcement and intelligence personnel have access to the information, which is not given a disposition, leaving innocent people associated with a terrorism investigation long after their information becomes irrelevant. Intelligence products developed from this data do not cite the origin,\35\ so errors in the information can never be checked against the source documents. Instead, errors will be compounded when intelligence products derived from this erroneous information are distributed throughout the intelligence community and to state and local law enforcement agencies. --------------------------------------------------------------------------- \33\ IG Report at 110. \34\ IG Report at 28, 30. \35\ IG Report at 54. --------------------------------------------------------------------------- Erroneous Reports to Congress and the Intelligence Oversight Board The Inspector General found that statutorily required reports to Congress excluded at least six percent of the overall number of NSLs.\36\ The number of unreported NSLs may be higher, but record keeping is so bad at the FBI, the Inspector General was unable to even confirm a final number. A review of just 77 cases from four FBI field offices found 22 percent more NSLs in case files than the FBI General Counsel knew about. More significantly, the IG found 60% of those files deficient in required paperwork, and his review doubled the number of unlawful violations that needed to be reported to the President's Intelligence Oversight Board.\37\ --------------------------------------------------------------------------- \36\ IG Report at 34. \37\ IG Report at 78. --------------------------------------------------------------------------- PROPOSED AMENDMENTS Regrettably, the Inspector General's report only included suggestions for internal changes within the FBI's discretion, and did not include recommendations for amending the underlying statute that is the source of these abuses. It is clear that the violations the Inspector General uncovered were the natural consequence of a statute that allows government agents to access sensitive information without suspicion of wrongdoing, in the absence of court oversight, and with complete secrecy compelled by a gag order with criminal consequences. In fact, even if management and technology problems identified in the IG's report are solved, hundreds of thousands of NSLs will continue to collect information on innocent Americans because that is exactly what the statute allows. The ACLU recommends three statutory changes that are absolutely necessary to ensure that the law protects privacy while permitting the collection of information necessary to investigate terrorism. Limit NSLs to Suspected Terrorists and Other Agents of Foreign Powers First, Congress must repeal the expansion of the NSL power that allows the FBI to demand information about totally innocent people who are not the targets of any investigation. The standard should return to the requirement that NSLs seek only records that pertain to terrorism suspects and other agents of foreign powers.\38\ And the FBI should not be allowed to use NSLs to investigate people two or three steps removed from any criminal or terrorist activity. --------------------------------------------------------------------------- \38\ Agent of a foreign power is defined in the Foreign Intelligence Surveillance Act of 1978, 50 U.S.C. Sec. 1801 (1978). --------------------------------------------------------------------------- Under current law, the FBI can use an NSL to obtain information that the FBI asserts is ``relevant'' to an investigation. The FBI has clearly taken advantage of this ``relevance'' standard and issued NSLs to obtain information on innocent American people with no connection to terrorism. In fact, it obtained this information without even opening an investigation to which the information must be relevant. NSLs are now issued to collect records just for the sake of building databases that can be mined later. In addition to being wholly ineffective as an investigative technique, this data collection and warehousing is an affront to the privacy of U.S. persons. Restrict the Gag Provisions and allow for Meaningful Challenges The gag provisions of the NSL statutes unconstitutionally inhibit individuals receiving potentially abusive NSLs from challenging them in court. Congress should amend the NSL statute so that gag orders are imposed only upon the authority of a court, and only where necessary to protect national security. Judicially imposed gag orders should be limited in scope and duration. Further, gags must come with a meaningful right to challenge them before a neutral arbiter. Last year's amendments created a sham court proceeding, whereby a judge is powerless to modify or overturn a gag if the federal government simply certifies that national security is at risk, and may not even conduct any review for a full year after the NSL is issued. Under the NSL statute, the federal government's certification must be treated as ``conclusive,'' rendering the ability to go before a judge meaningless. To comport with the First Amendment, a recipient must be able to go before a judge to seek meaningful redress. Court Review If there is one undeniable conclusion that Congress can draw from the Inspector General's report, it is that the FBI cannot be left to police itself. Allowing the FBI to keep self-certifying that it has met the statutory requirements invites further abuse and overuse of NSLs. Contemporaneous and independent oversight of the issuance of NSLs is needed to ensure that they are no longer issued at the drop of a hat to collect information about innocent U.S. persons. Court review will provide those checks and balances as was intended by the Constitution. CONCLUSION The Inspector General reviewed just a tiny proportion of NSLs issued by the FBI from 2003 through 2005, yet he found an extraordinary level of mismanagement, incompetence, and willful misconduct that clearly demonstrates that the unchecked NSL authorities given to the FBI in the Patriot Act must be repealed. The FBI and Department of Justice have shown that they cannot police themselves and need independent oversight. The American Civil Liberties Union applauds the Committee for holding this hearing and opening a window on these abuses, but there is more work to be done. Congress must fully investigate the FBI's abuse of power to insure that those responsible for these violations are held accountable, and the innocent people who have had their privacy invaded and their civil rights abused need to be identified and notified, and records that have been improperly or inappropriately seized should be purged from FBI databases. But most importantly, Congress needs to fix the Patriot Act, which has set the stage for all of these problems. Letter requesting additional information submitted to Valerie Caproni, General Counsel, Federal Bureau of Investigation
Press release by the Department of Justice from March 9, 2007, submitted by the Honorable Howard Coble, a Represenative in Congress from the State of North Carolina, and Member, Committee on the Judiciary
Article entitled ``Official Alerted F.B.I. to Rules Abuse 2 Years Ago, Lawyer Says,'' The New York Times, submitted by the Honorable John Conyers, Jr.
![]()