[Senate Hearing 113-334]
[From the U.S. Government Publishing Office]




For sale by the Superintendent of Documents, U.S. Government Printing Office, 
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, U.S. Government Printing Office. Phone 202�09512�091800, or 866�09512�091800 (toll-free). E-mail, [email protected].  

 
88-671 PDF

2014

                                                        S. Hrg. 113-334

 STRENGTHENING PRIVACY RIGHTS AND NATIONAL SECURITY: OVERSIGHT OF FISA 
                         SURVEILLANCE PROGRAMS

=======================================================================

                                HEARING

                               before the

                       COMMITTEE ON THE JUDICIARY
                          UNITED STATES SENATE

                    ONE HUNDRED THIRTEENTH CONGRESS

                             FIRST SESSION

                               __________

                             JULY 31, 2013

                               __________

                          Serial No. J-113-25

                               __________

         Printed for the use of the Committee on the Judiciary

                       COMMITTEE ON THE JUDICIARY

                  PATRICK J. LEAHY, Vermont, Chairman
DIANNE FEINSTEIN, California         CHUCK GRASSLEY, Iowa, Ranking 
CHUCK SCHUMER, New York                  Member
DICK DURBIN, Illinois                ORRIN G. HATCH, Utah
SHELDON WHITEHOUSE, Rhode Island     JEFF SESSIONS, Alabama
AMY KLOBUCHAR, Minnesota             LINDSEY GRAHAM, South Carolina
AL FRANKEN, Minnesota                JOHN CORNYN, Texas
CHRISTOPHER A. COONS, Delaware       MICHAEL S. LEE, Utah
RICHARD BLUMENTHAL, Connecticut      TED CRUZ, Texas
MAZIE HIRONO, Hawaii                 JEFF FLAKE, Arizona
                 Kristine Lucius, Chief Staff Director
              Kolan Davis, Republican Chief Staff Director
                            C O N T E N T S

                              ----------                              

                    STATEMENTS OF COMMITTEE MEMBERS

                                                                   Page

Leahy, Hon. Patrick J., a U.S. Senator from the State of Vermont.     1
    prepared statement...........................................    47
Grassley, Hon. Chuck, a U.S. Senator from the State of Iowa......     3

                               WITNESSES

Witness List.....................................................    45
Cole, Hon. James M., Deputy Attorney General, U.S. Department of 
  Justice, Washington, DC [with adjunct testimony from John C. 
  Inglis, Deputy Director, National Security Agency, Washington, 
  DC; Robert S. Litt, General Counsel, Office of the Director of 
  National Intelligence, Washington, DC; and Sean M. Joyce, 
  Deputy Director, Federal Bureau of Investigation, Washington, 
  DC]............................................................     5
    prepared statement...........................................    49
Inglis, John C., Deputy Director, National Security Agency, 
  Washington, DC, prepared statement.............................    54
Carr, Hon. James G., Senior Judge, U.S. District Court for the 
  Northern District of Ohio, Toledo, Ohio........................    34
    prepared statement...........................................    60
Jaffer, Jameel, Deputy Legal Director, American Civil Liberties 
  Union Foundation, New York, New York...........................    36
    prepared statement...........................................    62
Baker, Stewart A., Partner, Steptoe & Johnson LLP, Washington, DC    37
    prepared statement...........................................    85

                               QUESTIONS

Questions submitted by Senator Leahy for James M. Cole...........   101
Questions submitted by Senator Leahy for John C. Inglis..........   102
Questions submitted by Senator Leahy for Jameel Jaffer...........   104
Questions submitted by Senator Grassley for James M. Cole........   105
Questions submitted by Senator Grassley for John C. Inglis.......   107
Questions submitted by Senator Grassley for Robert S. Litt.......   109
Questions submitted by Senator Grassley for Sean M. Joyce........   111
Questions submitted by Senator Grassley for James G. Carr........   114
Questions submitted by Senator Grassley for Jameel Jaffer........   115
Questions submitted by Senator Grassley for Stewart Baker........   118

                         QUESTIONS AND ANSWERS

Responses of James M. Cole to questions submitted by Senators 
  Leahy and Grassley [NOTE: Some responses of James M. Cole are 
  classified and therefore not printed as a part of this 
  hearing.]......................................................   121
Responses of John C. Inglis to questions submitted by Senators 
  Leahy and Grassley [NOTE: The responses of John C. Inglis are 
  classified and therefore not printed as a part of this 
  hearing.]......................................................   125
Responses of Robert S. Litt to questions submitted by Senator 
  Grassley.......................................................   126
Responses of Sean M. Joyce to questions submitted by Senator 
  Grassley.......................................................   127
Responses of James G. Carr to questions submitted by Senator 
  Grassley.......................................................   131
Responses of Jameel Jaffer to questions submitted by Senators 
  Leahy and Grassley.............................................   137
Responses of Stewart Baker to questions submitted by Senator 
  Grassley.......................................................   149

                MISCELLANEOUS SUBMISSIONS FOR THE RECORD

Op Ed, ``A Better Secret Court'', New York Times, James G. Carr, 
  July 22, 2013..................................................   159
Walton, Reggie B., Presiding Judge, U.S. Foreign Intelligence 
  Surveillance Court, Washington, DC, July 29, 2013, letter......   162
Group Coalition letter, July 30, 2013............................   192
Joint transparency letter, July 16, 2013.........................   196
Zwillinger, Marc J., Founder, ZwillGen PLLC, statement...........   199
The Constitution Project, Virginia E. Sloan, President, July 30, 
  2013, letter...................................................   206
U.S. Department of Justice, February 2, 2011, letter.............   208
U.S. Department of Justice, December 14, 2009, letter............   210

 
 STRENGTHENING PRIVACY RIGHTS AND NATIONAL SECURITY: OVERSIGHT OF FISA 
                         SURVEILLANCE PROGRAMS

                              ----------                              -
----


                        WEDNESDAY, JULY 31, 2013

                                       U.S. Senate,
                                Committee on the Judiciary,
                                                    Washington, DC.
    The Committee met, pursuant to notice, at 9 a.m., in Room 
SH-216, Hart Senate Office Building, Hon. Patrick J. Leahy, 
Chairman of the Committee, presiding.
    Present: Senators Leahy, Feinstein, Durbin, Whitehouse, 
Klobuchar, Franken, Blumenthal, Grassley, Sessions, Cornyn, 
Lee, and Flake.

OPENING STATEMENT OF HON. PATRICK J. LEAHY, A U.S. SENATOR FROM 
                      THE STATE OF VERMONT

    Chairman Leahy. Good morning. Today, the Judiciary 
Committee will scrutinize Government surveillance programs 
conducted under the Foreign Intelligence Surveillance Act, or 
FISA. In the years since September 11th, Congress has 
repeatedly expanded the scope of FISA and has given the 
Government sweeping new powers to collect information on law-
abiding Americans, and we must carefully consider now whether 
those laws may have gone too far.
    Last month, many Americans learned for the first time that 
one of these authorities--Section 215 of the USA PATRIOT Act--
has for years been secretly interpreted--secretly interpreted--
to authorize the collection of Americans' phone records on an 
unprecedented scale. Information was also leaked about Section 
702 of FISA, which authorizes the NSA to collect the 
communications of foreigners overseas.
    Now, first, let me make it very clear. I do not condone the 
way these and other highly classified programs were disclosed, 
and I am concerned about the potential damage to our 
intelligence-gathering capabilities and national security. It 
is appropriate to hold people accountable for allowing such a 
massive leak to occur. We need to examine how to prevent this 
type of breach in the future.
    In the wake of these leaks, the President said that this is 
an opportunity to have an open and thoughtful debate about 
these issues. And I welcome that statement because this is a 
debate that several of us on this Committee in both parties 
have been trying to have for years. Like so many others, I will 
get the classified briefings, but then, of course, you cannot 
talk about them. There are a lot of these things that should be 
and can be discussed. And if we are going to have the debate 
that the President called for, the executive branch has to be a 
full partner. We need straightforward answers, and I am 
concerned that we are not getting them.
    Just recently, the Director of National Intelligence 
acknowledged that he provided false testimony about the NSA 
surveillance programs during a Senate hearing in March, and his 
office had to remove a fact sheet from its website after 
concerns were raised about its accuracy. And I appreciate that 
it is difficult to talk about classified programs in public 
settings, but the American people expect and deserve honest 
answers.
    It also has been far too difficult to get a straight answer 
about the effectiveness of the Section 215 phone records 
program. Whether this program is a critical national security 
tool is a key question for Congress as we consider possible 
changes to the law. Some supporters of this program have 
repeatedly conflated the efficacy of the Section 215 bulk 
metadata collection program with that of Section 702 of FISA, 
even though they are entirely different. Now, I do not think 
that is a coincidence when we have people in Government make 
that comparison, but it needs to stop. I think the patience of 
the American people is beginning to wear thin, but what has to 
be of more concern in a democracy is the trust of the American 
people is wearing thin.
    I asked General Alexander--and I understand he cannot be 
here today because he is at a convention in Las Vegas, I guess 
for hackers. But I asked General Alexander about the 
effectiveness of the Section 215 phone records program at an 
Appropriations Committee hearing last month, and he agreed to 
provide a classified list of terrorist events that Section 215 
helped to prevent, and I have reviewed that list. Although I 
agree that it speaks to the value of the overseas content 
collection implemented under Section 702, it does not do the 
same for Section 215. The list simply does not reflect dozens 
or even several terrorist plots that Section 215 helped thwart 
or prevent--let alone 54, as some have suggested.
    These facts matter. This bulk collection program has 
massive privacy implications. The phone records of all of us in 
this room--all of us in this room--reside in an NSA database. I 
have said repeatedly that just because we have the ability to 
collect huge amounts of data does not mean that we should be 
doing so. In fact, it has been reported that the bulk 
collection of Internet metadata was shut down because it failed 
to produce meaningful intelligence. We need to take an equally 
close look at the phone records program. If this program is not 
effective, it has to end. And so far I am not convinced by what 
I have seen.
    I am sure that we will hear from witnesses today who will 
say that these programs are critical in helping to identify and 
connect the so-called dots. But there are always going to be 
dots to collect, analyze, and try to connect. The Government is 
already collecting data on millions of innocent Americans on a 
daily basis based on a secret legal interpretation of a statute 
that does not on its face appear to authorize this kind of bulk 
collection. So what is going to be next? And when is enough 
enough?
    I think Congress has to carefully consider the powerful 
surveillance tools that we grant to the Government. We have to 
ensure that there is stringent oversight, accountability, and 
transparency. This debate should not be limited to those 
surveillance programs about which information was leaked. That 
is why I have introduced a bill that addresses not only Section 
215 and Section 702, but also national security letters, roving 
wiretaps, and other authorities under the PATRIOT Act. As we 
have seen in the case of ECPA reform, the protection of 
Americans' privacy is not a partisan issue. I thank Senator Lee 
of Utah and others for their support of my FISA bill, and I 
hope other Senators will join that effort.
    So I look forward to the testimony of the Government 
witnesses. I am particularly grateful for the participation of 
Judge Carr, a current member of the judiciary and a former 
judge of the FISA Court. I hope this will give us an 
opportunity for an open debate about the law, the policy, and 
the FISA Court process that led us to this position.
    I yield first, of course, to Senator Grassley, and then we 
will call on the first panel with James Cole. We will put 
General Inglis' statement in the record. It did not arrive in 
time to be given, so his statement will be made part of the 
record and he will answer questions.
    [The prepared statement of Mr. Inglis appears as a 
submission for the record.]
    Chairman Leahy. Senator Grassley.

 OPENING STATEMENT OF HON. CHUCK GRASSLEY, A U.S. SENATOR FROM 
                       THE STATE OF IOWA

    Senator Grassley. Mr. Chairman, I thank you for holding 
this hearing, and I think it is very important that Congress do 
its oversight work, which this hearing is part of. But it is 
even more important, the more secret a program, the more 
oversight that Congress has. And as you said, probably more 
about this program could be told to the public, and the more 
that could be told, maybe more understanding and less 
questioning on the part of the public.
    The Foreign Intelligence Surveillance Act provides the 
statutory framework for electronic surveillance in the context 
of the foreign intelligence gathering. Investigating threats to 
our national security gives rise to a tension between the 
protections of citizens' privacy rights and the Government's 
legitimate national security interests. Congress through this 
legislation has sought--and I hope successfully--to strike a 
balance in this sensitive area, but whether it is the right 
balance, of course, is one of the reasons we are having this 
hearing.
    The reports in the media have raised important questions 
regarding exactly what information about American citizens is 
being collected by the Government, whether the programs are 
being conducted as Congress intended, and whether there are 
sufficient safeguards to ensure that they cannot be abused by 
this or any future administration. In short, the reports have 
raised questions about whether the proper balance has been 
struck.
    We need to look no further than the recent IRS scandal to 
see what can happen when an unchecked executive branch 
bureaucracy with immense power targets political opponents. 
These actions trampled many citizens' most basic rights to 
fully participate in our democratic process. This kind of abuse 
cannot be permitted to occur in our national security agencies 
as well, and maybe even more importantly.
    Oversight by Congress will play an important role as we 
move forward in evaluating the wisdom and value of the 
intelligence programs. However, Congress needs accurate 
information in order to conduct oversight responsibilities that 
the Constitution demands that we do under our checks and 
balances of Government. That is why it was especially 
disturbing to see that the Director of National Intelligence 
was forced to apologize for inaccurate statements he made last 
March before the Senate Intelligence Committee. Those 
statements concerned one of the very important programs that we 
will be hearing about this very day. Nothing can excuse this 
kind of behavior from a senior administration official of any 
administration, especially on matters of such grave importance.
    We have a constitutional duty to protect Americans' 
privacy. That is a given. We also have an equal constitutional 
responsibility to ensure that the Government provides a strong 
national defense. That is a given. Intelligence gathering is, 
of course, a necessary and vital part of that defense. We have 
a duty to ensure that the men and women of our military, our 
intelligence, and our counterterrorism communities have the 
tools that they need to get the job done.
    I understand officials contend that the programs authorized 
under FISA that we will discuss today are critical tools that 
have assisted them in disrupting attacks both here and abroad. 
To the extent that possible in this unclassified setting, I 
look forward to hearing how these programs have made our Nation 
safer.
    I want to emphasize that this is an equally important part 
of the balance that we have to strike. And as we consider 
whether reform of these intelligence programs is necessary or 
desirable, we must also make sure that we do not overreact and 
repeat the mistakes of the past.
    We know that before 9/11 there was a wall erected under the 
Clinton administration between intelligence gathering and law 
enforcement. That wall contributed to our failure to be able to 
connect the dots and prevent 9/11. None of the reforms that we 
consider should effectively rebuild that wall.
    Additionally, while the intelligence and the law 
enforcement communities need to share information in a lawful 
way, any reform we consider should not confuse the differences 
between these two contacts.
    For example, no reform should be based on the misguided 
legal theory that foreign terrorists on foreign soil are 
entitled to the same constitutional rights that Americans 
expect here at home.
    Finally, increased transparency is a worthy goal in 
general, and as I suggested before, whenever we can talk about 
these programs, I think there are less questions out there in 
the minds of people, and we have probably created some public 
relations problems for us and for this program and for our 
national security community because maybe we have not made 
enough information available. I say that understanding that we 
cannot tell our enemies what tools we use.
    But if we consider any reform that may bring more 
transparency to the FISA process, we should keep in mind then 
that every piece of information we make available to the public 
will be read by a determined adversary, and that adversary has 
already demonstrated the capacity to kill thousands of 
Americans even on our own soil.
    I welcome the panel witnesses and look forward to engaging 
them as we seek to strike the difficult and sensitive balance 
between privacy and security.
    Thank you, Mr. Chairman.
    Chairman Leahy. Thank you very much.
    Our first witness will be James Cole. He first joined the 
Department of Justice in 1979. He served for 13 years in the 
Criminal Division, later becoming the Deputy Chief of the 
Division's Public Integrity Section. He went into private 
practice, sworn in as Deputy Attorney General on January 3, 
2011. Of course, Mr. Cole is no stranger to this Committee.
    Please go ahead, sir.

   STATEMENT OF THE HONORABLE JAMES M. COLE, DEPUTY ATTORNEY 
      GENERAL, U.S. DEPARTMENT OF JUSTICE, WASHINGTON, DC

    Mr. Cole. Thank you, Mr. Chairman, Mr. Ranking Member, and 
Members of the Committee, for inviting us here today to speak 
about the 215 business records program and Section 702 of FISA. 
With these programs and other intelligence activities, we are 
constantly seeking to achieve the right balance between the 
protection of national security and the protection of privacy 
and civil liberties. We believe these two programs have 
achieved the right balance.
    First of all, both programs are conducted under public 
statutes passed and later reauthorized by Congress. Neither is 
a program that has been hidden away or off the books. In fact, 
all three branches of Government play a significant role in the 
oversight of these programs. The judiciary--through the Foreign 
Intelligence Surveillance Court--plays a role in authorizing 
the programs and overseeing compliance; the executive branch 
conducts extensive internal reviews to ensure compliance; and 
Congress passes the laws, oversees our implementation of those 
laws, and determines whether or not the current laws should be 
reauthorized and in what form.
    Let me explain how this has worked in the context of the 
215 program. The 215 program involves the collection of 
metadata from telephone calls. These are telephone records 
maintained by the phone companies. They include the number the 
call was dialed from, the number the call was dialed to, the 
date and time of the call, and the length of the call. The 
records do not include the names or other personal identifying 
information, they do not include cell site or other location 
information, and they do not include the content of any phone 
calls. These are the kinds of records that under longstanding 
Supreme Court precedent are not protected by the Fourth 
Amendment.
    The short court order that you have seen published in the 
newspapers only allows the Government to acquire the phone 
records; it does not allow the Government to access or use 
them. The terms under which the Government may access or use 
the records is covered by another, more detailed court order 
that the DNI declassified and released today. That other court 
order, called the ``primary order,'' provides that the 
Government can only search the data if it has a ``reasonable, 
articulable suspicion'' that the phone number being searched is 
associated with certain terrorist organizations. The order also 
imposes numerous other restrictions on NSA to ensure that only 
properly trained analysts may access the data and that they can 
only access it when the reasonable, articulable suspicion 
predicate has been met and documented. The documentation of the 
analyst's justification is important so that it can be reviewed 
by supervisors before the search and audited afterwards to 
ensure compliance.
    In the criminal context, the Government could obtain the 
same types of records with a grand jury subpoena, without going 
to the court. But here, we go to the court every 90 days to 
seek the court's authorization to collect the records. In fact, 
since 2006, the court has authorized the program on 34 separate 
occasions by 14 different judges. As part of that renewal 
process, we inform the court whether there have been any 
compliance problems, and if there have been, the court will 
take a very hard look and make sure we have corrected those 
problems. As we have explained before, the 11 judges on the 
FISA Court are far from a rubber stamp; instead, they review 
all of our pleadings thoroughly, they question us, and they do 
not approve an order until they are satisfied that we have met 
all statutory and constitutional requirements.
    In addition to the judiciary, Congress also plays a 
significant role in this program. The classified details of 
this program have been extensively briefed to both the 
Judiciary and Intelligence Committees and their staffs on 
numerous occasions. If there are any significant issues that 
arise with the 215 program, we would report those to the two 
Committees right away. Any significant interpretations by the 
FISA Court would likewise be reported to the Committees under 
our statutory obligations, including opinions of any 
significant interpretation, along with any of the court orders 
that go with that.
    In addition, Congress plays a role in reauthorizing the 
provision under which the Government carries out this program 
and has done so since 2006. Section 215 of the PATRIOT Act has 
been renewed several times since the program was initiated--
including most recently for an additional 4 years in 2011. In 
connection with those recent renewals, the Government provided 
a classified briefing paper to the House and Senate 
Intelligence Committees to be made available to all Members of 
Congress. The briefing paper and a second updated version of it 
set out the operation of the programs in detail, explained that 
the Government and the FISA Court had interpreted the Section 
215 authorization to authorize the bulk collection of telephone 
metadata, and stated that the Government was, in fact, 
collecting such information. The DNI also declassified and 
released those two papers today.
    We also made offers to brief any member on the 215 program, 
and the availability of the paper and the opportunity for oral 
briefings were communicated through ``Dear Colleague'' letters 
issued by the Chairs of the Intelligence Committees to all 
Members of Congress. Thus, although we could not talk publicly 
about the program at the time--since it was properly 
classified--the executive branch took all reasonably available 
steps to ensure that Members of Congress were appropriately 
informed about the programs when they renewed it.
    I understand that there have been recent proposals to amend 
Section 215 authority to limit the bulk collection of telephone 
metadata. As the President has said, we welcome a public debate 
about how best to safeguard both our national security and the 
privacy of our citizens. Indeed, we will be considering in the 
coming days and weeks further steps to declassify information 
and help facilitate that debate, just as we have done this 
morning in releasing the primary order and the congressional 
briefing papers. In the meantime, however, we look forward to 
working with the Congress to determine in a careful and 
deliberate way what tools can best be structured and secured to 
secure the Nation and at the same time protect our privacy and 
civil liberties.
    Thank you, Mr. Chairman.
    [The prepared statement of Mr. Cole appears as a submission 
for the record.]
    Chairman Leahy. I think we can--the debate you speak of is 
starting now. The administration did declassify a FISC order. 
Of course, it does not contain any real legal analysis or 
discussion of the 215 relevance standard, so that will be part 
of our questions. But first I want to ask Deputy Director 
Inglis a question before we even go into the legality and 
usefulness of this.
    We had a huge security breach, I think we will all agree, 
committed by Edward Snowden. And a few years ago, Bradley 
Manning downloaded hundreds of thousands of classified and 
sensitive documents and passed them on to WikiLeaks.
    Now, if two data breaches of this magnitude had occurred in 
the private sector, somebody would have been held accountable 
by now. There is a lot of material kept in the private sector, 
trade secrets and so on. If they allowed this kind of leaking 
going on, in most companies somebody would be held accountable.
    Who at the NSA has taken responsibility for allowing this 
incredibly damaging security breach to occur?
    Mr. Inglis. Well, sir, that accountability must be 
considered at at least two levels: one, at the individual 
level, we have to take a hard look to see whether individuals 
exercised their responsibilities appropriately, whether they 
exercised due diligence in the exercise of those 
responsibilities----
    Chairman Leahy. Well, obviously there was not. I mean, if a 
29-year-old school dropout could come in and take out massive, 
massive amounts of data, it is obvious there were not adequate 
controls. Has anybody been fired?
    Mr. Inglis. No, sir, not yet.
    Chairman Leahy. Has anybody been admonished?
    Mr. Inglis. Sir, those investigations are underway. When 
those investigations are complete, we will have a full 
accounting within the executive branch and to the Congress of 
individual and systemic accountability. I think that at the end 
of the day we will have to look to see whether people exercised 
the responsibilities appropriately, whether they essentially 
exercised the trust that is accorded to them.
    In our system we extend top secret SCI, special 
compartmented intelligence clearances to a range of people and 
expect that they will then exercise that trust as the American 
people intended. And we will make a full accounting of that.
    Chairman Leahy. I remember President Reagan made up a 
statement, which many of us use, about trust, but verify. Don't 
you have--I realize you have to act with a certain amount of 
trust, but don't you have people double-checking what somebody 
is doing?
    Mr. Inglis. We do, sir. And----
    Chairman Leahy. Who double-checked Mr. Snowden?
    Mr. Inglis. Well, there are checks at multiple levels. 
There are checks in terms of what an individual might be doing 
at any moment in time. There are----
    Chairman Leahy. They obviously failed.
    Mr. Inglis. In this case, I think we can say that they 
failed, but we do not yet know where.
    Chairman Leahy. You ``think'' you can say they failed. I 
mean, he is sitting over at the airport in Russia with millions 
of items.
    Mr. Inglis. I would say that with the benefit of what we 
now know, they did fail.
    Chairman Leahy. Okay.
    Mr. Inglis. But we do not yet know where precisely they 
failed, and we may find that they failed at multiple points in 
the system, either in the exercise of individual responsibility 
or in the design of the system in the first place.
    Chairman Leahy. Has anybody offered--been asked to resign 
or offered to resign because of this failure?
    Mr. Inglis. No one has offered to resign. Everyone is 
working hard to understand what happened and to put in place 
the necessary mechanisms to----
    Chairman Leahy. How soon will we know who screwed up?
    Mr. Inglis. I think that we will know over weeks and months 
precisely what happened and who should then be held 
accountable, and we will hold them accountable.
    Chairman Leahy. Are you taking any steps now to make sure 
such a screw-up does not happen again?
    Mr. Inglis. We are, sir. We have instituted a range of 
mechanisms, not simply one, to ensure that we would understand 
and immediately be able to catch someone who tried to repeat 
precisely what Mr. Snowden did. But we also have to be creative 
and thoughtful enough to understand that there are many other 
ways somebody might try to beat the system.
    Chairman Leahy. You can understand why some people would 
use that old expression, ``locking the door after the horse has 
been stolen.''
    Mr. Inglis. I can, sir.
    Chairman Leahy. Okay. Thank you. I appreciate your candor. 
And I realize General Alexander is in Las Vegas, but I will ask 
you this question: Last month, he promised to provide me with 
specific examples of terrorism cases where Section 215 phone 
records collections had been used. I was led to believe by his 
answer that there were dozens of cases where Section 215 
authority has been critical to the discovery and disruption of 
terrorist plots. I have now reviewed all the classified 
material that the NSA sent, and I am far from convinced. The 
document is classified, but what was said in open testimony is 
that Section 215 helped to thwart or prevent 54 terrorist 
plots. Not by any stretch can you get 54 terrorist plots.
    In how many cases was Section 215 bulk phone records 
collection critical to preventing a terrorist plot?
    Mr. Inglis. Sir, I might answer in open session and then 
offer to provide follow-up details in a classified session.
    I would say that the administration has disclosed that 
there were 54 plots that were disrupted over the life of these 
two programs----
    Chairman Leahy. Section 215 was critical to preventing----
    Mr. Inglis. No, sir. And of those----
    Chairman Leahy [continuing]. Fifty-four plots?
    Mr. Inglis. And of those plots, 13 of those had a homeland 
nexus. The others had essentially plots that would have come to 
fruition in Europe, Asia, other places around the world.
    Chairman Leahy. How many of those----
    Mr. Inglis. Of the 13----
    Mr. Inglis. Of the 13----
    Chairman Leahy. How many of those 13 were plots to harm 
Americans?
    Mr. Inglis. Of the 13 that would have had a homeland nexus, 
in 12 of those 215 made a contribution. The question you have 
asked, though, is more precise in the sense of is there a ``but 
for'' case to be made, that but for 215 those plots would have 
been disrupted. That is a very difficult question to answer 
insomuch as that is not necessarily how these programs work. 
That is actually not how these programs work.
    What happens is that you essentially have a range of tools 
at your disposal. One or more of these tools might tip you to a 
plot. Others of these tools might then give you an exposure as 
to what the nature of that plot is. And, finally, the exercise 
of multiple instruments of power, to include law enforcement 
power, ultimately completes the picture and allows you to 
interdict that plot.
    There is an example amongst those 13 that comes close to a 
``but for'' example, and that is the case of Basaaly Moalin.
    Chairman Leahy. I have read that. I have read the material 
on that. It would be safe to say there are not 54 ``but fors''?
    Mr. Inglis. It is safe to say that, sir.
    Chairman Leahy. That is not right----
    Mr. Inglis. This capability, the 215 collection of 
metadata, is focused on the homeland. It is focused on 
detecting plots that cross the foreign to homeland domain.
    Chairman Leahy. But it was not----
    Mr. Inglis. Given that only 13 of those plots----
    Chairman Leahy. But it was not a ``but for'' in 54 cases?
    Mr. Inglis. It was not, sir.
    Chairman Leahy. Thank you.
    Mr. Inglis. Given that only 13 of those plots had a 
homeland nexus, it, therefore, only had its principal 
opportunity to make a contribution in 13 or less. In fact, it 
made a contribution to a plot that was disrupted overseas. I 
think that shows that this actually is looking not simply at 
the homeland, but it is looking at the foreign-homeland nexus.
    Chairman Leahy. And I hope we are not mixing up 215 with 
other sections.
    Mr. Inglis. We try hard not to do that, sir. They are 
distinguished but complementary tools.
    Mr. Joyce. Mr. Chairman, if I might add some insight to the 
value of 215?
    Chairman Leahy. My time is up, but go ahead. If that is 
okay with you?
    Senator Feinstein. Can't they make statements?
    Chairman Leahy. Go ahead, Mr. Joyce. No, they are just here 
to help.
    Go ahead, Mr. Joyce.
    Mr. Joyce. I just want to add, as you mentioned before, you 
know, how many dots do we need? I think we need to frame this 
by understanding who the adversary is and what they are trying 
to do. And they are trying to harm America. They are trying to 
strike America. And what we need is we need all these tools.
    So you mentioned the value of 702 versus the value of 
business records 215. They are different. And I make the 
analogy like a baseball team. You have your most valuable 
player, but you also have the players that hit singles every 
day.
    Chairman Leahy. Mr. Joyce----
    Mr. Joyce. I just want to relate to the homeland plots. So 
in Najibullah Zazi, in the plot to bomb the New York subway 
system, business record 215 played a role. It identified 
specifically a number we did not previously know of----
    Chairman Leahy. It was a critical role?
    Mr. Joyce. What I am saying, it plays a different----
    Chairman Leahy. Wasn't it some undercover work that took 
place in there?
    Mr. Joyce. Yes, there was some undercover work. But what I 
am saying, each tool plays a different role, Mr. Chairman. I am 
not saying that it is----
    Chairman Leahy. Wasn't the FBI----
    Mr. Joyce [continuing]. The most important tool----
    Chairman Leahy. Wasn't the FBI already aware of the 
individual in contact with Zazi?
    Mr. Joyce. Yes, we were, but we were not aware of that 
specific telephone number, which NSA provided us.
    Chairman Leahy. The only reason I go down this, you know, 
if we did everything, for example, we could have more security 
if we strip-searched everybody who came into every building in 
America. We are not going to do that. We would have more 
security if we closed our borders completely to everybody. We 
are not going to do that. If we put a wiretap on everybody's 
cell phone in America, if we search everybody's home--but there 
are certain things, certain areas of our own privacy that we 
Americans expect. And at some point you have to know where the 
balance is. But I have gone into other people's time. Senator 
Grassley.
    Senator Grassley. Would you, Mr. Chairman, clarify for me 
the process? We have had the testimony now, so we----
    Chairman Leahy. Yes.
    Senator Grassley [continuing]. Ask questions of all the 
people?
    Chairman Leahy. That is right--well, we were going to have 
questions of Mr. Cole and Mr. Inglis, but Mr. Litt and Mr. 
Joyce are here to be able to add if anything is necessary.
    Senator Grassley. Sure. Okay.
    Chairman Leahy. Thank you.
    Senator Grassley. I will start out with Mr. Cole, and my 
questions are kind of to emphasize, to inform, and to even be 
repetitive, because I think the public needs a greater 
understanding of what we are up to here.
    There are two legal authorities that we are discussing 
here: one, Section 702 authority. That one I am going to lay 
aside. The other authority is Section 215. Many Americans are 
concerned about the scope there. They fear that the Government 
is spying on them and prying into their personal lives. I ask 
questions to make absolutely sure that I understand the scope 
of 215.
    The first question: What information does the Government 
collect under this program? And specifically is anyone's name, 
address, Social Security number, or location collected?
    Mr. Cole. Senator Grassley, first, to answer the second 
part, name, address, location, Social Security number is not 
collected under the 215 program at all.
    Senator Grassley. Okay.
    Mr. Cole. Never has been, never will be.
    Second, the nature of the collection is really very 
dependent on this reasonable, articulable suspicion. While a 
lot of metadata does exist in a database, it cannot be accessed 
unless you go through the procedures of documenting that there 
is reasonable, articulable suspicion that the phone number you 
want to ask about is associated with terrorists. Unless you get 
that step made, you cannot enter that database and make a query 
and access any of those data.
    Senator Grassley. Okay. Again, for emphasis, is the 
Government listening in on any American phone calls through 
this program? And let me say that I just heard within the last 
week on some news media that somebody is declaring that any 
bureaucrat someplace in some intelligence agency can pick up 
the phone and listen to the conversation.
    Mr. Cole. Nobody is listening to anybody's conversations 
through this program, and through this program nobody could. No 
information like that is being collected through this program.
    Senator Grassley. Mr. Litt, Section 215 contains a 
requirement that records collected under the program provision 
be ``relevant to an authorized investigation.'' As a legal 
matter, how can you justify the assertion that phone records of 
millions of Americans who have nothing to do with terrorism are 
relevant to an authorized investigation under Section 215?
    Mr. Litt. So I would begin by noting that a number of 
judges repeatedly over the years have found that these records 
are, in fact, relevant. The reason is that the standard of 
relevance that we are talking about here is not the kind of 
relevance that you think about in the Perry Mason sense of a 
criminal trial. It is a much broader standard of relevance, and 
in a number of circumstances in the law, such as grand jury 
subpoenas or civil discovery, it is a well-accepted concept 
that if you need to get a large group of records in order to 
find a smaller group of records that actually provides the 
information you need to move forward, the larger group of 
records can be relevant. That is particularly true in this case 
because of the kinds of controls that the Deputy Attorney 
General mentioned, the fact that the queries are limited, the 
access to the data is limited, and for that reason the FISA 
Court has repeatedly found that these records are relevant.
    Senator Grassley. Is there any legal precedent that 
supports such a broad definition of relevance to an 
investigation?
    Mr. Litt. I would actually defer that to the Deputy 
Attorney General.
    Senator Grassley. Okay.
    Mr. Cole. Well, the legal precedent comes from the history 
of all the orders that have been issued, the courts having 
looked at this under the FISA law and under the provisions of 
215 and making sure that under the provisions and the ability 
to get these records relevant to a criminal--or, rather, a 
foreign intelligence--investigation, they have gone through, 
the law that Mr. Litt has described on, as I said, I believe 34 
different occasions to do this analysis. So that legal 
precedent is there.
    Senator Grassley. Okay. Mr. Joyce, one part of the balance 
that we have to strike protecting privacy of Americans, the 
other part national security. Thankfully, until the Boston 
bombing we had prevented large-scale terrorist attacks on 
American soil. I have a few questions about how valuable the 
role of Section 215 and 702 programs have played in predicting 
our national security, two questions, and then I will have to 
stop and go to our colleagues.
    Can you describe any specific situations where Section 215 
and Section 702 authorities helped disrupt a terrorist attack 
or identify individuals planning to attack, the number of 
times? And then, second, if you did not have the authority to 
collect phone records in the way that they are now under 
Section 215, how would you have effected those investigations?
    Mr. Joyce. So your first question, Senator, as far as a 
specific example of when we have utilized both of these 
programs is one I first mentioned, the first al Qaeda-directed 
plot since 9/11 in September 2009 when Najibullah Zazi and 
others conspired to plot to bomb the New York subway system. We 
initially found out about Zazi through an NSA 702 coverage, and 
he was actually talking to an al Qaeda courier who was--he was 
asking for his help to perfect an explosives recipe. So but for 
that, we would not have known about the plot. We followed that 
up with legal process and then had FISA coverage on him and 
others as we fully investigated the plot.
    Business records 215 was also involved, as I had previously 
mentioned, where we also through legal process were submitting 
legal process for telephone numbers and other e-mail addresses, 
other selectors, but NSA also provided another number we were 
unaware of a co-conspirator, Adis Medunjanin. So that is an 
instance where a very serious plot to attack America on U.S. 
soil that we used both these programs.
    But I say, as Chairman Leahy mentioned, there is a 
difference in the utility of the programs. But what I say to 
you is that each and every program and tool is valuable. There 
were gaps prior to 9/11, and what we have collectively tried to 
do, the members of the committee, other members of the other 
oversight committees, the executive branch, and the 
intelligence community, is we have tried to close those gaps 
and close those seams. And the business record 215 is one of 
those programs that we have closed those seams.
    So I respectfully say to the Chairman that the utility of 
that specific program initially is not as valuable. I say you 
are right. But what I say is it plays a crucial role in closing 
the gaps and seams that we fought hard to gain after the 9/11 
attacks.
    As you mentioned, another instance when we used the 
business record 215 program, as Chairman Leahy mentioned, 
Basaaly Moalin. So initially the FBI opened a case in 2003 
based on a tip. We investigated that tip. We found no nexus to 
terrorism and closed the case.
    In 2007, the NSA advised us through the business record 215 
program that a number in San Diego was in contact with an Al-
Shabaab, an al Qaeda East Africa member in Somalia. We served 
legal process to identify that unidentified phone number. We 
identified Basaaly Moalin. Through further investigation we 
identified additional co-conspirators, and Moalin and three 
other individuals have been convicted and some pled guilty to 
material support to terrorism.
    So I go back to we need to remember what happened in 9/11, 
and everyone in this room remembers where they were and what 
happened----
    Chairman Leahy. Mr. Joyce, you are stating the obvious 
there. Be specific to it because we are going to have votes on 
the floor, and it is going to take us out of here. We would 
like to keep somewhat close to the time.
    Mr. Joyce. All I will say, Mr. Chairman, is, respectfully, 
you mentioned about the dots. We must have the dots to connect 
the dots.
    Chairman Leahy. Thank you. One of the advantages of this 
Committee, the members on both sides of the aisle bring a lot 
of different abilities and various areas of expertise.
    The next witness is the Chair of the Senate Intelligence 
Committee.
    Senator Feinstein. Am I a witness here?
    Chairman Leahy. The next witness? The next questioner is 
the Chair of the Senate Intelligence Committee, Senator 
Feinstein, and it is a great advantage to us to have her on 
this Committee.
    Senator Feinstein. Well, thank you very much. Thank you 
very much, Mr. Chairman.
    I would like to begin by putting a couple of letters in the 
record. These have just been declassified. The first is a 
letter to myself and Senator Chambliss on February 2, 2011, 
before this program came up before the Senate, explaining it, 
making the information available. The second is that same 
letter to the House, so we have before 2010 and 2011. I would 
also----
    Chairman Leahy. Without objection, they will be made part 
of the record.
    Senator Feinstein. Thank you.
    [The letters appear as a submission for the record.]
    Senator Feinstein. I would also like to--I just realized 
that I believe Mr. Inglis' statement makes public for the first 
time a fact, and it is an important fact. It is on page 4 of 
his letter, and what he points out I think Mr. Cole described, 
that the query, which is the search of the database, can only 
be done on reasonable, articulable suspicion and only 22 people 
have access to that, trained and vetted analysts at the NSA.
    If the numbers are run and it looks like there is a 
problem, the report is made to the FBI. And the FBI looks at 
it, and if they want to collect content, they must get a 
probable cause warrant from the Foreign Intelligence 
Surveillance Court.
    Let me quote: ``. . . in 2012, based on those fewer than 
300 selectors''--that is, queries, which actually were 288 for 
Americans--``we provided a total of 12 reports to FBI, which 
altogether `tipped' less than 500 numbers.''
    So what you are saying, if I understand it, Mr. Inglis, is 
that, maximum, there were 12 probable cause warrants. Is that 
correct?
    Mr. Inglis. I think in truth, any one of the numbers that 
were tipped could have led the FBI to develop probable cause on 
more than 12. But there were only 12 reports provided to the 
FBI across 2012, and there were less than 500 numbers in those 
reports collectively that were tipped to the FBI in 2012.
    Senator Feinstein. Let me ask Mr. Joyce this question. Can 
you tell us how many orders--how many probable cause warrants 
were issued by the FBI in 2012?
    Mr. Joyce. I cannot off the top of my head, Senator. I can 
get you those numbers, though, following the hearing.
    Senator Feinstein. Well, I think we would appreciate that. 
I think----
    Mr. Joyce. I would just add, though, you make a very good 
point. Whether it is the 702 program or the business record 
215, once that information is passed to us involving anyone in 
the United States, we must go to the FISC, the Foreign 
Intelligence Surveillance Court, and show probable cause on the 
FISC warrant basically to provide content or whatever as far as 
overhears for that specific individual.
    Senator Feinstein. Good.
    [The information referred to appears as a submission for 
the record.]
    Senator Feinstein. Now, the NSA has produced and 
declassified a chart, which I would like to make available to 
all members. It has the 54 total events. It includes Section 
702 authority and Section 215 authority, which essentially work 
together. And it shows the events disrupted based on a 
combination of these two programs: 13 in the homeland, 25 in 
Europe, 5 in Africa, and 11 in Asia.
    Now, I remember, I was on the Intelligence Committee before 
9/11, and I remember how little information we had. And the 
great criticism of the Government because of these stovepipes, 
the inability to share intelligence, the inability to collect 
intelligence, we had no program that could have possibly caught 
two people in San Diego before the event took place.
    I support this program. I think based on what I know, they 
will come after us, and I think we need to prevent an attack 
wherever we can from happening. That does not mean that we 
cannot make some changes.
    Yesterday at the Intelligence Committee, I outlined some 
changes that we might consider as part of our authorization 
bill, and let me quickly run through them: the number of 
American phone numbers submitted as queries on a regular basis 
annually from the database; the number of referrals made to the 
FBI each year based on those queries, and how many times the 
FBI obtains probable cause warrants to collect the content of a 
call, which we now know is very few times, relatively; the 
number of times that a company--this is at their request from 
the high-tech companies--that any company is required to 
provide data pursuant to FISA's business records provision.
    As you know, the companies who provide information are 
seeking to be able to speak more publicly about this, and I 
think we should. There are some changes we can make to the 
business records section. We are looking at reducing the 5-year 
retention period that NSA keeps phone records in its database 
down to 2 or 3 years. It is my understanding that the 
usefulness of it tails off as the years go on. We have to 
determine that point and then consider it.
    And requiring the NSA to send to the FISA Court for its 
review the records of each query of the database as soon as it 
is practicable so the Court can determine the propriety of the 
query under the law.
    These are things that can be done to increase transparency, 
but not to stop the program. I believe based on what I have 
seen--and I read intelligence regularly--that we would place 
this Nation in jeopardy if we eliminated these two programs.
    Thank you, Mr. Chairman.
    Mr. Litt. Mr. Chairman, may I just offer a brief response 
to that?
    Chairman Leahy. Just a moment, and then I will. Would you 
also include reporting how often NSA or anybody else goes into 
an individual's browsing history or their e-mails or social 
media activity?
    Senator Feinstein. Sure, right. And we could do that in the 
private sector, too, how often this happens.
    Chairman Leahy. I was just looking at this article in the 
Guardian today, which may or may not be accurate.
    Mr. Litt, you wanted to say something?
    Mr. Litt. Yes, thank you. I just wanted to say that I think 
that this administration is more or less in the same place that 
Senator Feinstein is. We are open to reevaluating this program 
in ways that can perhaps provide greater confidence and public 
trust that this is, in fact, a program that achieves both 
privacy protections and national security. And, in fact, the 
White House has directed the Director of National Intelligence 
to make recommendations in that area. So we will be looking 
forward to working with your Committee and this Committee to 
see whether there are changes that can be made that are 
consistent with preserving the essence of the program and yet 
provide greater public confidence.
    Chairman Leahy. Thank you. Senator Cornyn? Again, speaking 
of the diversity we have, Senator Cornyn, of course, is the 
Deputy Republican Leader, and we appreciate the amount of time 
he spends in this Committee.
    Senator Cornyn. Mr. Chairman, thank you for having this 
hearing, and thanks to each of the witnesses for your service 
to our country.
    Those of us who have been here for a little while and 
through the evolution of these programs have, I think, learned 
more than the public generally knows about how they operate, 
and I think that has helped give us confidence in what is 
occurring. But I am also sensitive to Senator Feinstein, the 
distinguished Chair of the Senate Intelligence Committee, some 
of her observations--and Mr. Litt I think reiterated that, 
too--about the importance of maintaining public confidence in 
classified programs, which is a tough thing to do.
    But I think I am also reminded of the fact that, since 
2007, we have 43 new members of the U.S. Senate, and so there 
have been some people who have come to the Senate in recent 
years who perhaps have not been able to observe through their 
regular work some of the development of these programs, and so 
I think a hearing like this and the other hearings that you 
have participated in that I have attended have been very 
important to giving everyone a foundation of information where 
they can have confidence on behalf of the people we represent.
    But I would like to ask, maybe starting with Mr. Cole and 
go down the line, to get your reaction to the criticism made of 
the operations of the Foreign Intelligence Surveillance Court 
made by former Intelligence Surveillance Court Judge James 
Robertson. And this really has to do with the nature of 
essentially ex parte proceedings before the Court. I know that 
when it comes to individualized, particularized warrants, it is 
common in our system to have essentially ex parte proceedings. 
But here, when the Foreign Intelligence Surveillance Court is 
authorizing a program, according to Judge Robertson, under this 
expanded jurisdiction, it has turned the Court into something 
of an administrative agency. And, of course, talking again 
about public confidence in the oversight of the Court, which I 
think is an important part of maintaining that confidence, 
whether you think there might be some advantage, as Senator 
Blumenthal and I have discussed informally, having more of an 
adversarial process. My experience and I trust your experience 
with the adversarial process in our courts is it usually 
produces more information that allows the judge to make a 
better decision. And I would just like to get your reaction, 
Mr. Cole, and perhaps go down the line.
    Mr. Cole. Thank you, Senator. First of all, I can tell you 
from the practice we have before the FISA Court that it is far 
more than just another administrative agency. They push back 
hard, and they make sure that they are the guardians of the law 
and the Constitution.
    The topic of having an adversary--that is one that we are 
in the process of discussing and I know is being discussed in 
the Senate and in the House, and it is one of those areas that 
I think is part of the debate that we should be having on how 
best to do this. There are obviously issues we will have to 
work through as to clearances and classifications and who would 
be there and what their role would be and things of that nature 
if there is going to be a practical way to do it. But those are 
the kinds of discussions I think we do need to have.
    As you pointed out, it is not the usual course, and in the 
criminal law context we have many search warrants, Title III 
surveillance warrants that come in, that are not done in an 
adversary way. But this is certainly part of what we would like 
to be talking about and see if this has some utility.
    Senator Cornyn. Thank you.
    Mr. Inglis, do you have anything to add?
    Mr. Inglis. My background is largely operational, not in 
the training of the law, but that said, I am more than mindful 
of the absolute obligation to ensure that these things are done 
fully consistent with the Constitution. We welcome any and all 
hard questions. Whether that comes from an adversarial process 
or the process we enjoy, we think that we should be held 
accountable to answer those questions and ensure that the 
authorities that we are granted supports the whole of the 
Constitution, not just the defense of national security but the 
defense of civil liberties.
    Senator Cornyn. Thank you.
    Mr. Litt.
    Mr. Litt. The only point that I would like to make from the 
perspective of the intelligence community is to note that we 
already--this is an unusual process to have the Court involved 
in an essentially executive branch activity, conduct of foreign 
intelligence. I do not know of any other nation in the world 
that has the degree of judicial supervision of intelligence 
activities that this country has already. And I think that to 
some extent people have a--make a mistaken analogy when they 
hear the term ``court'' and they think of this as an adversary 
proceeding, like a criminal trial or a civil trial. The 
question is: What is the best way to ensure that our 
intelligence programs are conducted in compliance with the law 
and with adequate protection for people's privacy and civil 
liberties? And if it would help to have some sort of adversary 
process built into that, I think that would be entirely 
appropriate. But we should not be trying to make this mimic a 
criminal trial because it is a very different process.
    Senator Cornyn. Mr. Joyce, do you have anything to add?
    Mr. Joyce. No. My background is operational, so I would 
defer to my lead attorney, the Deputy Attorney General.
    Senator Cornyn. Okay. Thank you very much.
    Thank you, Mr. Chairman.
    Chairman Leahy. Thank you.
    I hope, Mr. Litt, you are not saying that we have something 
that is very unusual, that we have something that can collect 
data on U.S. citizens, that you are not saying the Court should 
not be involved.
    Mr. Litt. No, no. I am not saying that.
    Chairman Leahy. I just want to make sure.
    Mr. Litt. I am not saying that at all.
    Chairman Leahy. Thank you.
    Senator Klobuchar.
    Senator Klobuchar. Thank you very much, Mr. Chairman. Thank 
you to our witnesses. As a former prosecutor, I have long 
believed that our laws must strike the right balance between 
protecting our civil liberties and protecting our national 
security.
    I think most Americans, I will say, did not expect the 
sweeping nature of the surveillance programs, and for that 
reason I think this opportunity to reexamine these programs to 
see if there are ways we can ensure that they are more 
transparent and accountable without sacrificing the benefits 
they provide to national security is very important. And I just 
got this order, the Court order, Mr. Cole, that was just hot 
off the presses here. And could you--you said in your earlier 
testimony, you talked about the metadata, which I assume is 
just the collected data we have been hearing about on domestic 
phone calls, which is not the phone conversation itself. And 
then you go down to a Category 2, which must be when you are 
investigating parts of that metadata, which is based on this 
order; and then Category 3--this is how I am thinking of it in 
terms of circles--would be when you would actually get a court 
order to start investigating a person. Is that a fair way to 
look at this?
    Mr. Cole. I think that is a very good way of looking at 
it--and the word you used I think is important here, the 
surveillance that is being done-- because the only thing we are 
actually involved in surveiling are these much smaller groups 
that we have reasonable, articulable suspicion for. We are not 
surveiling everything that is in the database. You have to go 
through some very specific requirements that are contained in 
that order before you can surveil.
    Senator Klobuchar. In this order--and you said it would 
be--there has to be a reasonable suspicion that it is a 
terrorist. That is what you said earlier?
    Mr. Cole. Reasonable suspicion that is relevant to an 
investigation of certain terrorist organizations.
    Senator Klobuchar. Okay. And so is there a percentage of 
that data that, you know, you look at when you get to the big 
metadata, then you go down to the next category, what 
percentage of the metadata is the next category that is based 
on this order?
    Mr. Cole. I think it is hard to really quantify. I have 
heard numbers anywhere from 0.0001 percent of that metadata. It 
is a very, very tiny fraction of the metadata that actually is 
accessed and----
    Senator Klobuchar. And then when you go down to the part 
there where you are actually investigating someone or you get a 
special court order to look into it, what percentage is that?
    Mr. Cole. That is then even smaller, because we then have 
to have probable cause to believe that those people are falling 
within the requirements of the Foreign Intelligence 
Surveillance Act.
    Senator Klobuchar. Okay. So given how small this is, is 
there no way of limiting the breadth of the data and 
information collected under the program that would not have 
adverse effects on our ability to effectively monitor national 
security threats?
    Mr. Cole. Well, this is what we are looking at right now 
and trying to work through. As Chairman Feinstein had noted, 
she has made some recommendations. We are in the process of 
looking through that process to see if there are other ways to 
go about doing this where we still preserve the effectiveness 
of the operation and try to limit whatever kind of privacy and 
civil liberties intrusions that come from that.
    Senator Klobuchar. Very good. And I know one idea that 
General Alexander suggested is that he is open to the idea of 
telecommunications companies holding the records rather than 
having the NSA collect them, although we know we still have 
that issue of telephone immunity anyway, as long as the 
Government could get access.
    Mr. Inglis, do you want to testify about that and answer 
that? Do you think that is a viable alternative? It seems to me 
that we may have to do more than that.
    Mr. Inglis. So I think there are multiple implementations 
that could work. I think that we need to score all of those 
implementations against a set of criteria, which would include 
at the top that they do provide protections for privacy and 
civil liberties, but they also need to have sufficient breadth 
to your question, that if you ask a question of this database, 
let us say you have the situation we had with Basaaly Moalin, 
we have a number from East Africa al Qaeda that we have 
reasonable suspicion is associated with a plot against the 
homeland, you want to check to see whether there is, in fact, a 
connection into the homeland. You need sufficient breadth in 
the database that you are about to query to have confidence 
that if you come away with no response, that you can take that 
as confidence there is not a plot; or that if you get a 
response, you have found it, whether it is in any particular 
location in the world. So the breadth is important.
    But I think that we can take a look at whether this is 
stored at the provider so long as you have some confidence you 
can do this in a timely way. We need to sometimes disrupt an 
operation that is in play, that is in progress, and so seconds, 
hours matter.
    There might be other situations where you have the time to 
perhaps take more time, but we will have to think our way 
through whether the providers can meet that standard. I think 
there are technical architectures where they can.
    Finally, to the question that Senator Feinstein has asked, 
a very thoughtful question, do we need to hold these records 
for 5 years? Our experience has shown that intelligence, writ 
large, tends to have a significant tail-off at 5 years, but 
there is a knee in the curve that might live at 2 years or 3 
years. We need to base it upon data with a rearward look, take 
a hard look at that and determine how long these things really 
are necessary and beyond that how long they are valuable.
    Senator Klobuchar. And one quick question at the end here, 
Mr. Cole. Now that this Court order has been declassified, is 
there effort underway to declassify some of the legal rationale 
behind it?
    Mr. Cole. We are still working on trying to declassify a 
number of things in this area. We are trying to get as much as 
we can out, obviously balancing the national security concerns 
with those released. But our goal is to try and get out as much 
information as we can to provide transparency on this.
    Senator Klobuchar. Thank you very much.
    Chairman Leahy. Senator Sessions.
    Senator Sessions. Thank you all very, very much. Let me ask 
this, Mr. Litt. With regard to Mr. Joyce's comments about a 
certain case that they were able to interdict and stop, dealing 
with the subway matter, he said that the collection of data 
under this program played a role in the successful culmination 
of that case.
    Just fundamentally, you were Deputy Attorney General under 
Janet Reno for 6 years in the Department of Justice. You were a 
member of the ABA's Criminal Justice Committee. You have 
studied these issues and are required to make sure that laws 
are followed. But is this what was done in that case? Does it 
violate the Constitution in any way as defined by U.S. case law 
and the words of the Constitution itself?
    Mr. Litt. So, first, I thank you for the promotion, but I 
never actually served as Deputy Attorney General. I had a 
couple of positions in the Department, but----
    Senator Sessions. You were Deputy Assistant----
    Mr. Litt. Deputy Assistant Attorney General.
    Senator Sessions. We have to get all these Assistant 
Deputies and Deputy Assistants straight. Excuse me.
    Chairman Leahy. I think we can all agree he is highly 
qualified.
    Senator Sessions. Well, you are experienced in these 
matters, and I just want to raise a certain point, if you will 
give me a brief answer on that.
    Mr. Litt. I think the answer is quite clear under the 
controlling case law that a collection of this kind of 
telephone metadata from the telephone companies is not a 
violation of anyone's constitutional rights.
    Senator Sessions. And when I was a federal prosecutor--and, 
Mr. Cole, you were a prosecutor--virtually every complex case 
resulted in a subpoena to phone companies to get people's phone 
records. Is that correct?
    Mr. Cole. I would say the vast majority involved getting 
phone records in a case.
    Senator Sessions. And when you do that, you obtain their 
name, a lot of details about the call, but not the contents of 
the case.
    Mr. Cole. That is right. Many times you can get subscriber 
information--who owns the phone, what their billing address is, 
things of that nature--which we do not get under this program.
    Senator Sessions. So this haystack of information that you 
have is only numbers. It does not even have the name of the 
person connected to that number, the subscriber of that number. 
Is that correct?
    Mr. Cole. That is correct. If we find a chain that we think 
is important, we then have to do another investigation to find 
out who actually belongs to those numbers.
    Senator Sessions. Well, Chairman Leahy and others--and we 
talked when the PATRIOT Act passed, we went into great, great 
detail about all these issues. And I would say that balancing 
the constitutional rights of danger versus constitutional 
rights is not the right way to phrase this. I believe 
everything in the PATRIOT Act that we passed was consistent in 
principle to the very things that have been done by law 
enforcement for years and decades in terms of the ability to 
issue subpoenas and obtain records. Maybe a few new 
applications of it to new technologies, but essentially the 
principles were maintained. Would you agree, Mr. Cole?
    Mr. Cole. Yes, Senator. As I said at the beginning, I think 
we have struck the balance properly here, but there is always 
room for discussion and getting people's input. And times 
sometimes do change, and it is good to come back and revisit 
these things and make sure we have the balance right.
    Senator Sessions. Well, I agree with that. I think the 
questions that have been raised require us to look at that.
    Now, the data, this haystack of phone numbers, there is no 
ability to go back and listen to any of those conversations 
that occurred at a previous time, is there?
    Mr. Cole. No. We do not even capture through this any 
conversations, so there is no ability, no possibility of 
listening to conversations through what we get in this program.
    Senator Sessions. And, Mr. Litt, as an intel lawyer here, 
if you have the ability to tap a terrorist's phone call in 
Europe or Yemen, let us say, and that person calls to the 
United States, by definition of a lawful wiretap you listen to 
the persons that the individual calls. Is that right? So, I 
mean, a wiretap by definition is to listen to the conversations 
that the bad guy has with whoever he calls?
    Mr. Litt. That is correct, and under FISA the Court 
requires us to have minimization procedures to ensure that we 
do not retain or disseminate communications of Americans unless 
those are valid foreign intelligence or evidence of a crime.
    Senator Sessions. But if you want to tap a terrorist you 
have identified in the United States, you have to have a 
warrant with probable cause, do you not?
    Mr. Litt. That is correct.
    Senator Sessions. And so if you identify a person by 
surveiling a foreign terrorist, you identify phone calls to the 
United States, you would still have to have information 
sufficient to get a court to give you a Title III warrant to 
listen to that person's phone calls?
    Mr. Litt. It could be a Title III warrant. It could be an 
individual warrant under Title I of FISA. But either way there 
is a probable cause standard that has to be met.
    Senator Sessions. And it requires Court approval.
    Mr. Litt. Yes.
    Senator Sessions. Mr. Chairman, I know this Committee has 
worked hard on this. We tried to make sure that every provision 
in the Act was consistent with our constitutional and legal 
heritage. But we will listen to the concerns that are being 
raised, and if we made a mistake, I am willing to change it. 
But I am inclined to think all of these actions are consistent 
with the Constitution and laws of the United States.
    Chairman Leahy. One of the reasons we are having the 
hearing is that there are going to be some proposals for 
changes in the law, and I want to make sure that we have as 
much information as possible for it.
    Senator Franken.
    Senator Franken. Thank you, Mr. Chairman. I also want to 
thank all the witnesses here, Mr. Cole, Mr. Inglis, Mr. Litt, 
and Mr. Joyce, for your service to the country.
    I want to be clear at the outset. I think that these 
programs protect our country and have saved lives. But I do 
think there is a critical problem at the center of this debate, 
and that is the lack of transparency around these programs. The 
Government has to give proper weight to both keeping America 
safe from terrorists and protecting Americans' privacy. But 
when almost everything about these programs is secret and when 
the companies involved are under strict gag orders, the 
American public has no way of knowing whether we are getting 
that balance right. I think that is bad for privacy and bad for 
democracy.
    Tomorrow I am introducing a bill to address this, to fix 
this. It will force the Government to disclose how many 
Americans have had their information collected under key 
authorities in the Foreign Intelligence Surveillance Act, and 
it will give force--it will also force the Government to 
disclose how many Americans have had their information actually 
reviewed by federal agents.
    My bill would also allow private companies to disclose 
aggregate figures about the number of FISA orders that they are 
receiving and the number of their users that these orders have 
affected.
    Two weeks ago, a broad coalition of 63 Internet companies 
and bipartisan civil liberties groups sent a letter to the 
President asking for the reforms that my bill would make law. I 
am proud to say that I am introducing my bill with the support 
of Chairman Leahy, Senator Blumenthal, and a number of other 
Senators who are not on the Judiciary Committee. From what I 
just heard from Senator Feinstein, there may be some overlaps 
in our approaches, and I would be happy to work with her.
    I would like to focus my questions on the subject of 
transparency. Mr. Litt, in the weeks after Mr. Snowden's leaks, 
the Office of the Director of National Intelligence decided to 
declassify the fact that, in 2012, only 300 queries were run on 
the database of telephone records compiled under Section 215 of 
the PATRIOT Act. Can you tell me why the ODNI decided to 
declassify that fact?
    Mr. Litt. So, first, to be clear, what was declassified was 
the fact that there were fewer than 300 telephone numbers 
approved for queries. There can be more than one query based on 
the same telephone number if, for example, over time you want 
to check and see whether there have been any additional 
communications. So the number that was declassified was the 
number of selectors as to which reasonable, articulable 
suspicion had been established so that they could be the basis 
for a query.
    Senator Franken. Why did you decide to declassify the fact, 
and then?
    Mr. Litt. You know, what we are doing is we are looking at 
all of the information surrounding these programs, at what has 
already been revealed, because fundamentally these programs 
were classified in toto to begin with because of the feeling 
that revealing our capabilities would give our adversaries an 
edge in how to avoid those capabilities. Once the fact of the 
program became public, we began to look at all the details 
surrounding the program, such as the orders that we have 
released today and the number you mentioned there, and we are 
making an assessment as to each one of them as to whether it is 
in the public interest to release that particular fact that has 
previously been classified.
    Senator Franken. I think that I do not want the public to 
take our word for it always, and I think there is a balance 
here, and transparency is part of that balance. And I do not 
want a situation where the Government is transparent only when 
it is convenient for the Government. About an hour ago, ODNI 
declassified a FISA Court order under Section 215. That is a 
good thing. But ODNI has known for weeks that this hearing was 
coming, and yet ODNI releases material just a few minutes 
before the hearing began.
    You know, again, it is a step forward, but you get the 
feeling, when it is ad hoc transparency, that is not--that does 
not engender trust, I do not think.
    Mr. Litt. I could not agree with you more. I think we have 
an obligation to go through and look at the bad as well as the 
good and declassify what can be declassified without danger. We 
did actually have a discussion yesterday within the executive 
branch about whether we should release these documents this 
morning or not, because it is generally not a good idea to 
release things on the morning of a hearing. And I think we came 
to the conclusion that once we have made the determination that 
the documents should be declassified, there was no 
justification for holding them up any longer. And so that was--
--
    Senator Franken. Did you just start thinking about that 
decision like yesterday?
    Mr. Litt. No, but it----
    Senator Franken. When did you--I mean, you have known this 
for a long time. You might have been--you might have thought 
about this weeks ago and said, you know, maybe not the day of.
    Mr. Litt. We have been thinking about this for some time, 
and we have been processing these as quickly as we can. You 
will note that the documents that were released contain some 
redactions of information that remains classified.
    Senator Franken. Of course.
    Mr. Litt. It is a rather time-consuming interagency process 
to reach consensus on what can safely be released.
    Senator Franken. Well, my time is up, but I think we should 
create a strong permanent set of public reporting requirements 
that will empower the public to reach their own conclusions 
about the merits of these programs, and that is what the bill I 
am working on would accomplish. Again, I would love to work 
with Senator Feinstein and, Mr. Litt, I would love if you would 
work with me to make sure we get the reporting requirements 
right as we move forward with the bill. Would you do that?
    Mr. Litt. Absolutely. We would be glad to do that, sir.
    Senator Franken. Thank you.
    Thank you, Mr. Chairman.
    Chairman Leahy. Incidentally, we are going to go next to 
Senator Flake, but I do want to compliment all four of the 
witnesses who are here for their candor, and I might want to 
single out General Inglis--or ``Mr. Inglis'' I guess you go by 
now. And I have been advised and I understand from others that 
you have always been very direct, very clear, very 
straightforward. Often that is in classified sessions, but you 
have been the same way in open session, and I appreciate that.
    Senator Flake.
    Senator Flake. Thank you, Mr. Chairman, and thank you, and 
I am sorry I was not here to hear your testimony. I know that 
you have all noted in your written testimony that there are 
significant checks in the FISA system. Do you believe that 
there are insufficient checks to outweigh the concerns that 
some have about the appointment of an independent counsel? If 
you have touched on this in earlier questions, I apologize, 
but, General Cole, you mentioned that with regard to an 
independent counsel, do you think that there--in the second 
panel, Mr. Baker raises some issues and problems with 
independent counsel. Can you give me your thoughts on whether 
you think that is needed or not?
    Mr. Cole. Certainly, Senator. This is a topic that is being 
discussed both in the administration and in the Congress as one 
avenue that might be available. Traditionally, when you issue 
search warrants, when you issue wiretaps and things like that, 
in the criminal law you do not have an adversary process that 
takes place. There is not somebody on the other side. So there 
is a legal tradition that the way we have been doing it is 
certainly one that we have done in other contexts.
    We also have the Court that is involved, and that is 
unusual, as Mr. Litt had pointed out, particularly in a foreign 
intelligence context, to have the courts involved at all.
    But this is something that I think we are open to having 
discussions about as to what the utility would be, what the 
role would be, how it would work. The devil can many times be 
in the details, but we think all of these things are worth 
discussing to figure out how to make this the best program it 
can be.
    Senator Flake. If there were an independent counsel 
involved, can you foresee problems in terms of timeliness to 
have a lawyer staff cleared in time to review the sensitive 
information? If anybody else wants to address that as well.
    Mr. Cole. I will just start. It may be a little bit, but 
the Court pushes back a lot itself, and there is an enormous 
process that takes place with the Court itself to make sure 
that we have satisfied all the requirements under the law and 
under the Constitution. So if there is somebody on the other 
side doing it, I would imagine they would be doing the same 
thing on roughly the same schedule.
    Mr. Litt. If I can just add to that, there is a letter that 
the Chief Judge of the Foreign Intelligence Surveillance Court 
has written to the Chairman that I think is available on the 
Internet that outlines in some detail the procedures that the 
Court follows and I think gives a good sense for the care and 
thoroughness that the FISA Court exercises today.
    Senator Flake. There has been some criticism in that the 
process that we have for the selection of these judges may lead 
to more Republican judges being appointed than Democratic--or 
more Republicans appointing judges than Democrats appointing 
judges. Do you sense or see any difference in your experience, 
all of you, with--is that an issue that somebody ought to be 
concerned about? Or have you seen any difference in decisions 
rendered?
    Mr. Cole. From my experience I have not seen any decisions 
of the judges or judges in there being guided by the law and 
not necessarily by politics. But that is certainly a topic we 
would leave to the sound discretion of the Congress.
    Senator Flake. Any other thoughts from anybody else? Do you 
see any problems with that process, selection of judges? Mr. 
Litt.
    Mr. Litt. No, I was just going to say it is very hard to 
tell how another judge would have rendered a decision because 
you only have the one judge rendering the decision.
    Senator Flake. All right. Thank you, Mr. Chairman.
    Chairman Leahy. Senator Durbin.
    Senator Durbin. Thank you, Mr. Chairman.
    I am a liberal arts lawyer. I took some math courses, but 
it has been a long time ago, so I am going to ask the 
panelists, maybe Mr. Litt, Mr. Inglis, or whoever, to help me 
do some math here.
    In 2012, there were 300 queries that resulted in a search 
of records, and we are told that there were three hops. In 
other words, if I was the subject matter of this search and I 
called Senator Feinstein, they would accumulate all of the 
records of my telephone calls to her and others, and then all 
of the records of Senator Feinstein's telephone calls, which 
may have included Chairman Leahy, and now you have included all 
of his records as well.
    Mr. Jaffer of the ACLU will testify, at least speculate 
later, that if I had an average of 40 contacts, that would mean 
that for my name, my query, you would accumulate 2 million 
phone records--2 million for that one inquiry. Now multiply 
that in the year 2012 by 300. So we are talking about 600 
million phone records. Now multiply that times 7 years.
    So what has been described as a discrete program to go 
after people who would cause us harm, when you look at the 
reach of this program, it envelops a substantial number of 
Americans.
    So can somebody help me with the math here, if I have 
missed something along the way or perhaps should minimize that 
number?
    Mr. Inglis. Sir, if I could start, and apologizing for the 
format, the unclassified format, I will be discreet in my 
remarks but happy to follow up in any detail that you would 
prefer, either here or at NSA.
    First and foremost, the analysts are charged to provide 
information that is truly useful to the Federal Bureau of 
Investigation, and so in that regard they try to be judicious 
about choosing when to do a second hop or under the Court's 
authorization a third hop. Those are not always exercised. They 
do not always exercise a second hop for all numbers that might 
be pointed to by the first hop. And so while theoretically 40 
times 40 times 40 gets you to a large number, that is not 
typically what takes place.
    If an analyst were to see, for example, at the second hop 
that there are very significant numbers associated with one of 
those numbers, they would have to come to some deduction as to 
what that means. That could be that what you have kind of 
glommed onto is a pizza delivery man. You do not want to pursue 
that. That is not useful.
    If on that second hop you see that that has hopped to a 
foreign number already known to the intelligence community 
because it is a known terrorist, you would want to make the 
third hop to understand what is beyond that.
    Senator Durbin. I understand that part of it where you are 
trying not to waste the time or resources of our Government in 
protecting our Nation?
    Mr. Inglis. Yes, sir.
    Senator Durbin. But the potential reach of this, when we 
say 300, goes way beyond 300.
    Mr. Inglis. So I think that is a very important question. 
We have to compare the theory to the practice. We try to be 
very, very judicious in the use of this very narrowly focused 
authority. And so the reason that we declassified the numbers 
is to show that we are, in fact, judicious. Less than 300 times 
did we approve a query for selection--or a selector for query 
in 2012, and provided less than 500 numbers in 12 reports to 
the FBI in all of 2012.
    Mr. Litt. If I can just add one thing to that, it is 
important to remember that all that we are getting out of this 
is numbers--nobody's name, nobody's address, the content of no 
communications. These are all--this is nothing but a tool to 
try to identify telephone numbers that warrant further inquiry.
    Senator Durbin. I understand that. And here is the point, 
that I have offered an amendment before this Committee which 
garnered a grand total of four votes a few years ago on this 
very subject because most of the members were not aware of this 
program, the 215 program and its detail. I knew a little bit 
more than some, but obviously did not know as much as I am 
learning today. And there was a genuine concern today 
expressed. At that time because of the limited knowledge of the 
members, I got four votes.
    So here is the question I get down to, and it is asked over 
and over again. If my cell phone is in area code 217, which it 
is, and I am a suspect, I certainly think it is appropriate and 
I encourage our Government to find out who I am talking to. 
That is important. I still cannot get to the point of requiring 
every person with a 217 area code to have their records 
collected in terms of their telephone conversations.
    Now multiply that times every area code across America, and 
look at the potential reach. It seems to me that what is being 
described as a narrow program is really a very broad program in 
terms of the metadata collection on the front end. What I would 
like to ask--people have said, I have heard it from members of 
this panel, you know, we have saved lives with this. The 215 
program has saved lives, stopped terrorism. Good. That is what 
we want our Government to do.
    Could you have also saved the same number of lives and had 
the same impact if, knowing my telephone number as a suspect, 
you could search my records as opposed to collecting everyone's 
records in my area code?
    Mr. Inglis. So if I could go back to a case in point, 
perhaps that might be the best way to tease this out. I think 
that is a great question. The Basaaly Moalin case, what we knew 
at the time when we made that query was we knew a number that 
we had reasonable suspicion was affiliated with a terrorist 
group plotting against the homeland. That number was in 
Somalia. It was associated with Al-Shabaab. We had reasonable 
suspicion it was associated with something in the United 
States. We had no idea what it might have been associated with, 
and so we need to do a query. We did not know whether it would 
be associated with a 217 area code or a 303 area code, what of 
the grand set of possibilities was it associated with.
    In order to find the needle that matched up against that 
number, we needed the haystack. That is what the premise is in 
this case. And in that point, if just before somebody had made 
that query you had said this is going to connect to a number in 
San Diego, that would have been as surprising as if you had 
said that number is connected to someplace in Yemen.
    Senator Durbin. But, Mr. Inglis, I guess what it gets down 
to is this: Once establishing that number with Al-Shabaab, this 
operative from Al-Shabaab, you could certainly go after that 
person's telephone records and all of the contacts that that 
person has made. The basic question we are faced with is: Do 
you need to collect 5 years' worth of data on everyone in 
America and their telephone records so that the haystack, which 
is pretty big----
    Mr. Inglis. That is a fair question. So the question would 
be: Is it enough to look prospectively, in the future, right, 
at that particular number? It may well be that the plotting you 
are looking for occurred in the past. And if you do not have 
that person's records in the past, then you cannot determine--
--
    Senator Durbin. And a point that has been raised 
repeatedly, if we required the phone companies to retain the 
records for 5 years----
    Mr. Inglis. That is a very fair point, and that is 
possible.
    Senator Durbin. It would not be in the grasp of the 
Government, but accessed by the Government.
    Mr. Inglis. I agree, sir.
    Senator Durbin. Which serves the same purpose, does it not?
    Mr. Inglis. I agree. But under the current legal framing, 
the phone companies are not required to retain that for the 
benefit of the Government.
    Senator Durbin. How hard would that be?
    Mr. Inglis. I think it would require a legal change. I do 
not think that is hard.
    Senator Durbin. I do not think so either.
    Mr. Inglis. I think that you can get there from here. You 
have to then think about the rest of the attributes that are 
necessary to make this a useful venture.
    Senator Durbin. Senator Feinstein said: ``Ask him about the 
expense.''
    Mr. Inglis. I would say in a classified session I could 
give you chapter and verse on the expense. The expenses are 
different depending upon whether you choose the current 
implementation or you choose an implementation where you leave 
it at the providers. The Government, if it requires the 
providers to retain those records, should bear that expense.
    Senator Durbin. Thank you.
    Chairman Leahy. Senator Lee.
    Senator Lee. Thank you, Mr. Chairman.
    As I understand it, the NSA's collection of metadata, the 
kind of metadata that we have been discussing today, is 
accomplished pursuant to Section 215 of the PATRIOT Act. Now, 
Section 215(b)(2)(A) of the PATRIOT Act places an important 
limitation on that collection in that it limits the 
Government's ability to collect that metadata to circumstances 
where the data in question is ``relevant to an authorized 
investigation.''
    At some point--you know, relevance is a concept that is 
difficult to define in the abstract. It is a somewhat fluid 
concept, and it is one of those things that some jurist might 
say, ``I know it when I see it, but I struggle to define it.''
    Yet regardless of how difficult it might be to define in 
the abstract what relevance is, don't you think we have left 
the station of relevance long before we get to the point of 
collecting metadata on potentially 300 million Americans and 
their cell phone usage? How can one get one's mind around the 
concept of that volume of information, metadata or otherwise, 
all being relevant to an ongoing investigation?
    Mr. Cole. Well, Senator, Mr. Litt--and he can chime in--had 
noted a little bit earlier how broad, as you noted yourself, 
the concept of relevance is in civil discovery, in many 
different kinds of legal contexts. It can be things that will 
lead you to things that you need as a concept for relevance.
    Senator Lee. Right. I understand Mr. Litt's very broad 
conception of relevance, and as he recently explained in his 
comments at the Brookings Institution. But I assure you, as a 
recovering lawyer myself, there is no context in civil 
discovery or otherwise in which one may define ``relevance'' 
broadly enough to take in information regarding each and every 
single American who owns a telephone.
    Mr. Cole. The answer I would give to that, Senator, is that 
we are not really accessing or getting into all of that 
metadata that is stored in that database. We do not actually 
get to roam around in it. We do not get to look at it to our 
heart's content and then say, well, this is relevant and that 
is relevant, so let us take that.
    You have to look at it in the context of the primary order 
which was declassified and issued today that says the only way 
you can access it is if you have reasonable, articulable 
suspicion that the number you are going to query off of is, in 
fact, related to specific terrorist groups. And that has to be 
documented. And if you do not have that, you cannot get into 
this.
    So the surveillance concept I think is very important here. 
You cannot surveil this without that gate being checked 
through.
    Senator Lee. And that gate is not controlled by a warrant. 
I mean, if you want to access that, you do not have to go to 
court to get a warrant to access that. Those are controlled by 
internal procedures, correct?
    Mr. Cole. That is correct. But they are controlled by the 
Court order, and they are controlled by compliance audits that 
are done both by the executive branch and the Court looking at 
how it is implemented on a periodic basis.
    Senator Lee. Okay. Mr. Litt, do you have something to add?
    Mr. Litt. Yes, just very briefly. I just want to make clear 
that the standard of relevance that I articulated in the speech 
is not mine alone. This is one that has been approved by the 
judges of the FISA Court and was known to members of this 
Committee and the Intelligence Committee at the time that the 
Section 215 authority was renewed.
    Senator Lee. Well, I understand that. I understand that, 
and that has been part of the problem we have had, is that 
until recently most people did not have any idea about those, 
and we have significant constraints that limited our ability to 
explain why some of us had concerns with the PATRIOT Act, why 
some of us on both sides of the aisle voted against 
reauthorizing the PATRIOT Act. We were unable to speak about 
this publicly because we have secret procedures being 
undertaken pursuant to secret law, and it has been a bit of a 
problem.
    Now, what would you say, then, getting back to you, Mr. 
Cole, to my constituents? I understand what you are saying, 
that, ``We are collecting all of it but we are not looking at 
it. We are collecting it, but we are closing our eyes, so do 
not worry about it.'' What would you say to my constituents who 
say, ``I do not want the Government having that information. It 
is not the Government's information.'' It still does not make 
it relevant under the law. It still does not meet what many of 
my constituents believe to be well within their reasonable 
expectation of privacy for the Government to collect that much 
information, potentially information about 300 million 
Americans.
    Mr. Cole. Well, I would say two things. First of all, we 
have had 34 separate times a court say that it does meet the 
standard of relevance, to have it all and then have the 
restrictions. But the further thing that I would say, which I 
think is very important, is what we are doing here today, which 
is it is worth having a debate about is there a better way to 
do it. It is worth having a debate about where we are going to 
strike that balance between security for the Nation and making 
sure that people's privacy and civil liberty rights are being 
honored. And that is a tough balance to find, but it is a 
balance worth talking about, and it is the process that we are 
welcoming and engaging in right now.
    Senator Lee. Okay. Thank you. I see my time has expired. I 
just want to comment that I appreciate your insight on this. I 
do think it is worth discussing publicly, and I think it is 
also something that we need to consider from a constitutional 
standpoint. We have been relying on a 34-year-old Supreme Court 
case, Smith v. Maryland, to get at this idea that metadata is 
somehow beyond the reach of the Fourth Amendment. But we have 
to remember that Smith did not involve collection on hundreds 
of millions of Americans. It involved collection on a single 
target. It involved collection in a manner that is completely 
archaic by today's standards and that by today's standards 
would involve a minuscule amount of information.
    I think at some point when you collect that much data on 
that many people--whether it is that much data on one person, 
that might create some problem. That much data on hundreds of 
millions of people creates an even bigger problem and one that 
I think was not considered by the Supreme Court of the United 
States in Maryland v. Smith----
    Chairman Leahy. Thank you.
    Senator Lee [continuing]. One that we need to revisit. 
Thank you, Chairman.
    Chairman Leahy. Thank you, Senator Lee.
    Senator Whitehouse, again, showing the expertise here, you 
served both on this Committee and the Intelligence Committee. I 
appreciate you being here.
    Senator Whitehouse. Thank you, Chairman.
    Mr. Cole, you just said it is worth having a debate on 
these issues, and I think you are right about that. But I also 
hope that the executive branch takes a lesson from this 
experience about the value of classification or what I would 
consider overclassification. I have seen this over and over 
now. When we were fighting with the Bush administration about 
the torture program, the executive branch got to tell its side 
of the story because the executive branch were the 
declassifiers, and we were stuck with facts that we knew that 
blew up the argument that was being made by the executive 
branch, but that we could not articulate because they were 
classified.
    We have seen it on cyber where so much of the American 
public is unaware of the cyber threat that we are facing. Now, 
thankfully, we are becoming more aware, but for a long time we 
were just in the dark about what was going on because in the 
private sector companies did not want to talk about it for fear 
of aggravating their regulators, their consumers, their 
clients, even giving their competitors advantage, and the 
Government just wildly overclassified everything.
    Now we have, I think, a terrific article that Senator 
Feinstein wrote. We have, I think, very good testimony by Bob 
Mueller. We have a lot of good information out there that helps 
the American public understand these programs. But it all came 
out late. It all came out in response to a leaker. There was no 
organized plan for how we rationally declassify this so that 
the American people can participate in the debate.
    I think there is an executive branch reaction toward 
classification. I think that reaction is in part because of the 
advantage it gives the executive branch relative to the 
legislative branch, which cannot declassify. And I think over 
and over again we have found that, looking back, we are worse 
off for that effort in the first instance.
    So I would really urge you to take a look at this and, you 
know, when this thing burst, there is this old saying--I am not 
going to get it exactly right, but there is something about the 
rumor is all the way across town before the truth could even 
get its boots on. You have lived that experience in the last 
couple of months. I hope this has an effect on you, because 
this is a recurring problem and we really need to be balancing 
much more carefully the value of declassification against the 
value of classification.
    I think you guys are terribly one-sided in favor of 
classification, and then something like this comes and, pow, 
you are still trying to get your boots on because you never 
took the appropriate steps to put news out about this program 
that would have avoided, I think, a lot of this. And I would 
like to have you have a chance to react to that.
    Mr. Cole. I think you make very valid points, Senator 
Whitehouse, that these are all topics that we need to debate. 
They are not easy topics because they involve, again, that same 
balancing--the same balancing that we are trying to do between 
national security and civil liberties. And what kinds of 
programs we put into place to gain intelligence information is 
the same kind of debate we need to have about what is 
classified and what is not classified and what secrets we let 
out.
    If it was easy, we would be having these left and right. I 
do not think, at least from what I have seen, that the 
executive branch is doing it to disadvantage the legislative 
branch, but I think that may be----
    Senator Whitehouse. But it does have that effect.
    Mr. Cole. It may have that effect, and I would concede 
that. I think it is done because people are cautious, and it is 
easier to overclassify than to underclassify. It is safer to 
overclassify than to underclassify. And now we are having to 
get into the hard work of finding just where that line is, and 
that is a difficult job to do. But it is worth doing.
    Mr. Litt. Senator, could I just add----
    Senator Whitehouse. So something like this happens or the 
torture program gets exposed or we have a significant cyber 
attack, or something happens that shows that that short-term 
decision that it was easier to classify was actually the wrong 
decision.
    Mr. Litt. I just want to add on this--and I know you are 
familiar with what I am about to say, but we are having a 
public debate now, but that public debate is not without cost. 
The information that has been leaked is going to do damage to 
our ability to protect the Nation. We are going to lose 
capabilities. People are paying attention to this.
    The way that typically the Congress, both through the 
legislation it passes and through its own internal rules, has 
historically sought to achieve the balance between appropriate 
oversight of intelligence activities and the need to protect 
sources and methods is through primarily the Intelligence 
Committees but also some other committees of Congress--this 
Committee, the Armed Services Committee, the Appropriations 
Committees. And typically that is the forum that has been used 
to strike this balance. It may be----
    Senator Whitehouse. I get that, and my time has expired, so 
let me just jump in and say we all get that. My point is that 
the American public is an important part of this debate, and we 
would probably be better off if there was not such a strong 
instinct in favor of classifying and keeping things classified 
and we developed information for the American public in a way 
that minimized that intelligence collection loss and allowed us 
to have this debate.
    Thank you.
    Chairman Leahy. Senator Blumenthal.
    Senator Blumenthal. Thank you, Mr. Chairman. I want to join 
in thanking the Chairman for this hearing and for his 
legislative proposal, which I have joined, and to each of you 
for your extraordinary contribution to our Nation but also to 
the thousands of others in the intelligence community and 
special operations who have thwarted and stopped terrorist 
threats to this country and which all too often I believe have 
been ignored because the efforts to stop them have been so 
successful, and the debate, as Mr. Cole has termed it, is one 
that is very appropriate in a free society that is trying to 
protect itself from terrorism by using search and surveillance, 
which have a role, and what we are grappling to do here is to 
define how to reconcile the secrecy of search and surveillance, 
which necessarily have to be so, with privacy and civil 
liberties and all the other constitutional guarantees that make 
us unique among the nations in the world and, in fact, the 
greatest Nation in the history of the world.
    You know, I have been a litigator for close to 40 years. I 
have never doubted that the scores of judges that I have 
litigated before have a commitment to rights of privacy and all 
the constitutional rights. And I have no doubt about the FISA 
judges pushing back and having a commitment to the rule of law. 
But in appearance, this system is failing, and failing fast, to 
maintain the trust and credibility of the American people who 
want to be protected from terrorist threats, but at the same 
time also protected from the degradation of their 
constitutional rights.
    So I am introducing a bill that would change the 
appointment and selection procedure so that the appearance and 
the reality of diversity of view and aggressive protection of 
constitutional rights is maintained and enhanced. And I will be 
introducing that bill tomorrow that would involve the circuit 
court judges on our courts of appeals, chief judges, in the 
appointment process, with the continued involvement of the 
Chief Justice, and change also the FISA Court of Reviews 
selection process.
    I have found in my years that one of a judge's worst 
nightmares is incompetent counsel, and the reason is, 
especially in a criminal trial, that incompetent counsel or 
lack of counsel for the defendant means that the record on 
appeal is weaker, that the test and clash of litigation is 
diminished in quality, and that is the basic principle that I 
think should be involved in some way in the FISA Court as well.
    And so a second bill that I am proposing is for a special 
advocate to be involved not necessarily in the ex parte 
proceedings on every single warrant or surveillance or search, 
but at some point where there are significant issues of law so 
that different sides are presented, challenges are made, and 
the judge or panel has the benefit of that contention that is 
at the core of our court process. Our courts not only insist on 
but thrive on the clash and testing of different points of 
view. Whether it is debate on a legal issue or cross-
examination, that is at the essence of our litigation process.
    So I think in appearance, if not reality, the current 
design of the FISA Court stacks the deck against the protection 
of our civil liberties and can be improved and enhanced without 
sacrificing either speed or security, because those special 
advocates can be cleared beforehand for security purposes, they 
can be involved after the fact, if necessary, on appeal in 
effect to the FISA Court of Review or to the U.S. Supreme 
Court. And I hope--and this is to lead to the question--I hope, 
Mr. Cole and Mr. Litt, that you will join in this process of 
trying to improve the current FISA Court structure. And I would 
like to know whether there is active consideration of changes 
in the selection procedure and the involvement of potentially a 
special advocate or independent counsel of some kind in this 
process.
    Mr. Cole. Senator, I think at this point there is active 
consideration of a range of issues just to get at the kinds of 
things you are talking about, to make sure that the process 
works as well as it can, to balance both of those important 
issues of national security and civil liberties and privacy, 
and to make sure that it is transparent enough so that we 
maintain credibility with the American people about this 
program.
    It is a difficult issue, as we have discussed today for 
several hours, to find the right balance. But, yes, it is 
definitely something under consideration and active discussion 
in the administration.
    Senator Blumenthal. Thank you, Mr. Chairman.
    Chairman Leahy. Mr. Cole, I have a question. As I 
understand it, the Government believes that every single 
domestic phone record is relevant to terrorism investigation 
and can be obtained using Section 215 of the PATRIOT Act. And I 
understand the FISA Court agrees with that interpretation, but 
you then place restrictions on how it can be used once you have 
collected it. But I do not understand what limits there might 
be under this theory. Couldn't you invoke under this--couldn't 
you invoke Section 215 to obtain virtually all available 
commercial data? If Americans' phone records are relevant, how 
about our credit card records, what sites we go on on the 
Internet, what we may bookmark, our medical records, if we have 
it on the computer, or firearms records, we keep a list of what 
firearms we hold? Are all those things available?
    Mr. Cole. Well, I think there are two important points 
here, Mr. Chairman.
    Number one is that the only way the Court finds these 
relevant is in the context of the restrictions and in the 
context of what it is you are looking for. So you have to take 
all of those features of this phone record process into account 
of how can it be done, how reasonably can it be done, what is 
the need for speed, what is the need to integrate all the 
different records that are coming together, and finds only when 
you look at that entire mix that this kind of program, with 
these restrictions----
    Chairman Leahy. I understand----
    Mr. Cole. To your question, you would have to make that 
same showing for those other kinds of records as to the need 
for that breadth and the need for those restrictions.
    Chairman Leahy. But if our phone records are relevant, why 
wouldn't our credit card records be--wouldn't you like to know 
if somebody is buying the fertilizer used in bombs?
    Mr. Cole. I may not need to collect everybody's credit card 
records in order to do that because, again, these are--we are 
not collecting all their phone records so that we can wander 
through them. And it is only the phone records that are being 
used to look at the connections. If somebody is buying things 
that could be used to make bombs, of course, we would like to 
know that, but we may not need to do it in this fashion.
    Chairman Leahy. Well, Director Clapper said NSA would 
notify Congress before obtaining cell phone location 
information under this program. Is there any legal impediment 
to you expanding the program for cell phone location?
    Mr. Cole. I do not believe there would be a legal 
impediment, and yesterday the Fifth Circuit issued a ruling 
that goes to that issue. But the legal impediments are not the 
only issues that you take into account here.
    Chairman Leahy. I understand. Well, I want to put several 
items in the hearing record:
    Written testimony from Mark Zwillinger who represented 
Yahoo! in its challenge to a directive received under the 
PROTECT America Act; he is one of the few non-Government 
lawyers to appear before the FISA Court, so that is important 
insight;
    A letter from Judge Reggie Walton, presiding judge of the 
Foreign Intelligence Surveillance Court, responding to 
questions from Senator Grassley and myself;
    A letter from a coalition of communications companies and 
advocacy groups regarding transparency;
    A letter from a coalition of privacy and civil liberties 
groups recommending staff--a letter from the Constitution 
Project supporting S. 1215, the FISA Accountability and Privacy 
Protection Act.
    Those will all be placed in the record.
    [The information referred to appears as a submission for 
the record.]
    Chairman Leahy. If there are no further questions for this 
panel, and if there are not, I would thank all four of you. I 
know you have spent a lot of time preparing for this. I thank 
you all for being here. I know you have a lot of other things 
you should be doing and can be doing, but thank you for taking 
this time.
    We will start on the next panel. If we are interrupted by a 
vote, we will then stop until 12:30 when Senator Blumenthal has 
offered to come back and preside, but we would call up Judge 
Carr, James Carr, U.S. District Court for the Northern District 
of Ohio; Jameel Jaffer, the deputy legal director, American 
Civil Liberties Union; and Stewart Baker, a partner at Steptoe 
& Johnson. I thank you all very much.
    [Pause.]
    Chairman Leahy. I thank the witnesses who are here, and I 
apologize in advance if we end up having to recess for a period 
of time and come back. But, Judge Carr, why don't we begin with 
you, and thank you for coming here.

 STATEMENT OF THE HONORABLE JAMES G. CARR, SENIOR JUDGE, U.S. 
 DISTRICT COURT FOR THE NORTHERN DISTRICT OF OHIO, TOLEDO, OHIO

    Judge Carr. Thank you, Senator. It is my pleasure to be 
here. I served on the Foreign Intelligence Surveillance Court 
from 2002 to 2008. I have been a United States district judge 
since 1994 and before that a magistrate judge since 1979. I am 
the author of a two-volume treatise on the law of electronic 
surveillance, which I suspect played a role in the decision to 
appoint me to the Court.
    I want to make clear, as I hope I did in my brief prepared 
remarks, that I am here solely on my own behalf. I am not here 
on behalf of the Judicial Conference, the Administrative 
Office, the judiciary generally, or the Foreign Intelligence 
Surveillance Court. And actually I think why I am here today is 
because by coincidence I happened to have an op-ed piece 
published a week ago in the New York Times in which I made a 
proposal that I am glad to be able to make in front of this 
Committee in a somewhat more public fashion.
    Chairman Leahy. And that op-ed piece will be made part of 
the record.
    Judge Carr. Thank you.
    [The op-ed appears as a submission for the record.]
    Judge Carr. Very simply put, what I propose is that 
Congress amend the Foreign Intelligence Surveillance Act simply 
to give, sort of officially give the discretion to the 
individual judges of the Foreign Intelligence Surveillance 
Court, or if they sit en banc, the ability to appoint a 
security-cleared attorney to represent the interests of the 
public and interject to some extent the adversary process at 
the level of the Foreign Intelligence Surveillance Court.
    I listened with interest to Senator Blumenthal's suggestion 
about an advocate who would become engaged at the level of the 
Court of Review. Speaking, again, solely on my own behalf, the 
origin of this thought comes from my experience as a member of 
that Court for that period.
    There were a couple of occasions--I cannot count them but 
fewer than the fingers on one hand, I am sure--in which I felt 
as a district judge that it would have been useful, when the 
Government proposed some new program some new method or means 
of acquisition, that it would have been useful to have somebody 
speak in opposition to the request and to hear the other side. 
That would, it seems to me, accomplish two things, and if that 
discretion were available to members of the Court, particularly 
when issues arose under Rule 11 of the current Rules of 
Procedure, which require that the Government notify the judge 
when something new or novel is being proposed. That is what 
they did when we were there, and that was always very useful. 
But in any event, I think my proposal would have two very 
beneficial consequences.
    One, as I believe Senator Blumenthal already alluded to, it 
would provide us with the opportunity as judges to reach more 
informed decisions, because we would have heard two points of 
view. That is what we do day in and day out in our chambers and 
in our courtrooms. We are accustomed to that, and we are 
comfortable with that.
    Second, it would create a mechanism which I think is very 
important for in instances when the Government prevails, in 
which the Foreign Intelligence Surveillance Court judge 
approves the new and novel request, because there was a lawyer 
engaged at the outset, that lawyer could seek review before the 
Foreign Intelligence Surveillance Court of Review and in turn 
before the U.S. Supreme Court.
    Today, of course, only the Government can appeal, and the 
Government has done so I believe on a couple of occasions. I am 
familiar with one. But there was nobody there on behalf of the 
other side, as it were. And as I say, I think that my proposal 
is fairly simple, straightforward, economical, and I think it 
would be very useful.
    Thank you for hearing me out, and I welcome your questions 
as to what I have to say.
    [The prepared statement of Judge Carr appears as a 
submission for the record.]
    Chairman Leahy. Thank you very much, Judge. And I should 
note you were on the FISA Court from 2002 to 2008.
    Judge Carr. Right.
    Chairman Leahy. I believe Chief Justice Rehnquist, a part-
time Vermonter, rest his soul, was the one who appointed you.
    Jameel Jaffer is the deputy legal director at the American 
Civil Liberties Union, director of the ACLU's Center for 
Democracy, currently counsel to the plaintiffs in ACLU v. 
Clapper, challenging the NSA's phone records program. He has 
litigated several cases concerning the PATRIOT Act and FISA 
Amendments Act.
    Please go ahead.

  STATEMENT OF JAMEEL JAFFER, DEPUTY LEGAL DIRECTOR, AMERICAN 
      CIVIL LIBERTIES UNION FOUNDATION, NEW YORK, NEW YORK

    Mr. Jaffer. Thanks. Thank you for the invitation to 
testify.
    Over the last 2 months, it has become clear that the NSA is 
engaged in far-reaching, intrusive, and unlawful surveillance 
of Americans' telephone calls and electronic communications. 
The surveillance programs we are talking about this morning are 
the product of both defects in the law and defects in the 
current oversight system. FISA affords the Government sweeping 
power to monitor the communications of innocent people. 
Excessive secrecy has made congressional oversight difficult 
and public oversight impossible. Intelligence officials have 
repeatedly misled the public, Congress, and the courts about 
the nature and scope of the Government's surveillance 
activities. The ordinary federal courts have improperly used 
procedural doctrines to place the NSA's activities beyond the 
reach of the Constitution. And structural features of the FISA 
Court have prevented that Court from serving as an effective 
guardian of individual rights.
    Surveillance supposedly undertaken to protect our democracy 
now presents a threat to it. It is not simply that this 
surveillance has dramatic implications for individual privacy, 
though plainly it does. Pervasive surveillance is also 
poisonous for free speech and free association. People who know 
the Government could be monitoring their every move, their 
every phone call, or their every Google search will comport 
themselves differently. They will hesitate before visiting 
controversial websites. They will hesitate before joining 
controversial advocacy groups. And they will hesitate before 
exercising rights that the Constitution guarantees.
    Now, individually those hesitations may appear to be 
inconsequential, but the accumulation of those hesitations over 
time will alter the nature of our democracy. It will alter 
citizens' relationship to one another, and it will alter their 
relationship to their Government. That much is clear from the 
history of many other countries. And it is what the Church 
Committee warned of more than 30 years ago. That warning should 
have even more resonance today because in recent decades the 
intelligence agencies' resources have grown, statutory and 
constitutional limitations have been steadily eroded, and the 
technology of surveillance has become exponentially more 
powerful.
    Because the problem Congress confronts today has many 
roots, there is no single solution to it. But should take 
certain steps right away.
    First, it should amend FISA to prohibit ``dragnet'' 
monitoring of Americans' communications. Amendments of that 
kind should be made to the FISA Amendments Act, to FISA's so-
called business records provision--that is, Section 215--and to 
the national security letter authorities.
    Second, Congress should end the unnecessary and corrosive 
secrecy that has obstructed congressional and public oversight. 
It should require the Government to publish basic statistical 
information about the Government's use of foreign intelligence 
authorities. It should ensure that the gag orders associated 
with national security letters are limited in scope and 
duration and imposed only when absolutely necessary. And it 
should require the publication of FISA Court opinions that 
evaluate the meaning, scope, or constitutionality of the 
foreign intelligence laws.
    Finally, Congress should ensure that the Government's 
surveillance activities are subject to meaningful judicial 
review. It should clarify by statute the circumstances in which 
individuals can challenge Government surveillance in ordinary 
federal courts. It should provide for open and adversarial 
proceedings in the FISC, in the FISA Court, when the 
Government's surveillance applications raise those kinds of 
novel issues of statutory or constitutional interpretation. And 
it should enact legislation to ensure that the state secrets 
privilege is not used to place the Government's surveillance 
activities beyond the reach of the courts.
    Thank you again for the opportunity to testify.
    [The prepared statement of Mr. Jaffer appears as a 
submission for the record.]
    Chairman Leahy. Thank you very much.
    Mr. Baker, you are a partner, I understand, in the law firm 
of Steptoe & Johnson, but you were originally general counsel 
of the National Security Agency. You were the first Assistant 
Secretary for Policy at the Department of Homeland Security. We 
are happy to have you here, sir. Please go ahead.

STATEMENT OF STEWART A. BAKER, PARTNER, STEPTOE & JOHNSON LLP, 
                         WASHINGTON, DC

    Mr. Baker. Thank you, Mr. Chairman. It is a pleasure to 
appear before you and the other members of the Committee again. 
Just two points about this program I think are important to 
begin with.
    First, the kind of information that is being gathered 
here--phone numbers, phone records, billing records, in 
essence--is the sort of information for which a million 
subpoenas a year are served by law enforcement on phone 
companies today. This is not data that is kept out of the hands 
of Government by existing procedures and not the kind of data 
that has been abused in obvious ways since they have been doing 
this since the beginning of billing records almost a century 
ago. So this is not extraordinarily sensitive information.
    And neither is this an unchecked program. I think, having 
looked at the order that was declassified this morning and 
having heard the procedures that have been described in the 
past, it is pretty clear that the people who are reviewing 
these records are subject to more scrutiny, more checks, more 
discipline than any of the other law enforcement agencies that 
have subpoenaed a million records from the phone companies each 
year.
    The problem, obviously, from the discussion here is that 
the Government gathered the information and put it in a 
database first, and that is an unusual step. The question is: 
What could we do other than that? If we leave this with the 
phone companies and try to gather the information from the 
phone companies, first, they will get rid of this information 
when they choose to, when it is no longer of interest to them, 
which would be in a matter of months. We have no guarantee it 
will be there when we need it. We have no ability to search 
across the records of each of those phone companies to do the 
kind of analysis that we need to do to find the folks that have 
been found with this program.
    And, finally, I suppose we could pay them to put it in a 
format and keep it for a period of time that we thought was 
necessary to run this program, but then you have created a 
database that every divorce lawyer in America is going to say, 
``Well, that is AT&T's data. I am just going to subpoena it.'' 
This is not something that we really want to do. Who is going 
to search it? Is the phone company going to search it? Are we 
going to ask China Mobile to do searches for national security 
targets on the data that they are storing? Or are we going to 
give the Government access to the servers? Which is, of course, 
what caused the flap over the 702 program in the first place.
    So I think there are real problems with leaving this in the 
hands of the private companies, and that is why as a practical 
matter the Government chose the route that it did.
    The other problem obviously is that this has been kept 
secret, and I have to say the fact is--and I have spent a 
lifetime doing this--you cannot do intelligence in public 
because the targets are the most interested in how you do it 
and what the limitations you have imposed on yourself may be. 
And, therefore, disclosing the limitations, arguing about 
exactly how we are going to do this reveals to the people we 
are trying to gather intelligence on, who in many cases are 
trying to kill us, exactly what it is that we are trying to do. 
So there is a big cost to doing this in public and to having 
the kinds of disclosures that we are having.
    Last thought, and I have heard Senator Blumenthal's 
proposal and Judge Carr's proposal. I have to express some 
doubts about the idea of appointing a counsel from outside the 
Government to represent--I do not know--well, that is the first 
question. Who or what is this person supposed to be 
representing? Are they representing the terrorists? Are they 
representing the Court? Are they representing some abstract 
interest in civil liberties? Or are we just going to let them 
decide?
    You know, we got rid of the independent counsel law 
precisely because we were uneasy about having private parties 
just make up their own public policy without any check from 
political decisionmakers or without any client. And I fear we 
are getting into the same situation if we start appointing 
counsel to represent something in the context of these cases.
    I will stop there and be glad to answer questions.
    [The prepared statement of Mr. Baker appears as a 
submission for the record.]
    Chairman Leahy. Thank you, and we are going to wrap up 
because the vote is going to start. But, Judge Carr, what about 
that? Your proposal was not to have counsel in every single 
case but where there were special legal issues raised. Is that 
correct?
    Judge Carr. Absolutely. It would be a probably very 
infrequently invoked opportunity that I am asking you to put in 
the hands of the individual judges when they encounter new and 
novel questions.
    Chairman Leahy. Thank you.
    Judge Carr. And if I may speak to the issue of who is the 
client, obviously there is no client in the conventional sense. 
This is, admittedly, an unorthodox procedure. In the op-ed and 
my remarks, I tried to indicate why it is important, even 
though we do not have it in Title III applications or search 
warrants.
    I think ultimately that the individual represents--that 
lawyer that I am talking about, precleared by security, set to 
go--would represent the interests of the public generally in 
seeing to it that the balance between constitutional rights, 
the Fourth Amendment, and the President's authority to conduct 
our foreign affairs is maintained and upheld and not tilted one 
way or the other. And to some extent, I would hope that if this 
process were in place, it would enhance public confidence in 
the results reached, regardless of what they were, and 
particularly those when they favored the Government, because 
the public would know somebody was in there speaking on its 
behalf generally and broadly but in opposition to the 
Government's request.
    Chairman Leahy. Thank you very much.
    Senator Blumenthal, I am going to turn it over to you, and 
then when the vote starts, we can recess. I thank you very 
much.
    Senator Blumenthal [presiding]. Thank you, Mr. Chairman. I 
think that the proposal that I will be making in my legislation 
is very similar to the suggestion you have made, and I want to 
thank, Judge Carr, for the thought that you and Judge Robertson 
have devoted to this subject and the very insightful ideas that 
you have suggested. And there are other instances, as we all 
know as lawyers, where the court essentially appoints counsel 
from time to time in both civil and criminal proceedings to 
represent, in essence, the public interest or some perhaps non-
identifiable individual who might at some point in the future 
have an interest in the proceedings. And, indeed, in this 
instance what I proposed is an Office of Special Advocate whose 
attorneys would be precleared and whose security credentials 
would be on a part with, in effect, the prosecutors or the 
Government, and on those novel or significant issues of law 
that arise from time to time could represent in essence an 
opposing point of view, a different side, as Judge Robertson 
has put it. The basic idea is that judges are accustomed to 
hearing two sides of an argument, as you have articulated so 
well.
    So I think some of the practical objections are easily 
addressed, and what I would like to ask you is whether there 
are, in fact, significant and novel issues of law that do arise 
from time to time where you think either before the FISA Court 
or on review ultimately the development of the law would be 
enhanced by having an opposing point of view represented.
    Judge Carr. I do, and I think to some extent you can look 
at Rule 11 of the Foreign Intelligence Surveillance Court Rules 
of Procedure, which requires the Government to call the judge's 
attention to something that is new and novel. So you already 
have in place sort of a flagging mechanism, and that actually 
codified the way things worked in any event when I was a member 
of the Court. The Government really was an honest broker and 
said, ``Judge, looking at paragraph 73 to 78, that is something 
you have not seen before.'' And there were times when that 
happened, when simply to hear another side, I wished or hoped 
or desired that there is somebody else picking up and giving me 
a different view.
    Let me say, Senator, I find your proposal interesting and 
very worthwhile. I would only suggest bring it down to the 
level of the FISC itself. In other words, do not wait for an 
appeal because that way you will have a fully developed record, 
the agencies would have been laid out, the judge would have 
reached hopefully a reasoned and informed decision, and written 
an opinion with reasons that then whoever is unhappy with it 
can be taken for appellate review. That is the way it works 
normally. That is the way it should work in the foreign 
intelligence surveillance context.
    Senator Blumenthal. And to some extent, you have already 
anticipated my proposal because it would, in fact, enable 
representation of two sides in the FISA Court as well as the 
Court of Review because, as you well know, a record is 
essential often to determining an issue of law simply to 
clarify what factual issues are at stake.
    And I think the important point for people to understand--
and this really goes to perhaps some of the objections to the 
proposal. In the criminal context, when a warrant is issued, it 
is almost always ex parte----
    Judge Carr. Always.
    Senator Blumenthal. Always ex parte, except sometimes in a 
grand jury if in very exceptional cases opposing counsel is 
present. But then at some point, the question of admissibility 
arises to the evidence that is garnered as a result of the 
warrant or surveillance or other means of activity by the 
Government. And at that point there is a public hearing.
    Judge Carr. And also keep in mind, certainly with an 
ordinary search, the subject learns immediately, comes home, 
the door has been broken, knocked down. But if indicted, he can 
file a motion to suppress. Even if not indicted, the subject 
can file a motion under Rule 41 for return of property: Give me 
my money back, give me my whatever it is back. But there are 
mechanisms that are available to question and to raise and to 
challenge the legitimacy of what the Government has done. And 
that is why I proposed--that is one of the purposes of my 
proposal, is to enable the opportunity to test the legitimacy 
of what the Government has done.
    Day in and day out, something I want to emphasize, the 
applications that the Foreign Intelligence Surveillance Court 
reviews, they are fact based. They have a very low standard of 
probable cause, and properly so, because as another witness 
mentioned, or one of the Senators, this represents what I 
consider to be a brilliant--the FISA represents a brilliant 
compromise reached by the legislative branch in a 
constitutionally uncertain area. I mean, where in Article II 
does it say that a court has anything to do with the 
President's conduct of foreign affairs? On the other hand, the 
Fourth Amendment applies to the President. And nobody knows how 
far either of those reach, and that is why the FISA is so 
useful and I think effective.
    Senator Blumenthal. And this proposal, while it might lend 
itself to greater transparency, would still keep secret the 
FISA Court proceeding at a stage when secrecy is paramount for 
the search and surveillance activity. It would simply enable--
and I think you have used the key word--the ``testing'' of the 
Government's claim that the surveillance or search is both 
legal and necessary.
    Judge Carr. Well, actually, if I can say, Senator, we do 
not consider--I am speaking in the past tense. I did not 
consider and I do not think the judges do consider the 
necessity for the surveillance. I think that is quite clear 
under the Act. We look at only probable cause, agent of a 
foreign government, active on behalf of foreign terrorist-based 
organization, that is it. We do not second-guess and say, gee, 
how come you are spending money on this instead of that?
    Senator Blumenthal. Mr. Baker, let me ask you, does any of 
this discussion between Judge Carr and myself allay some of 
your concerns?
    Mr. Baker. Some of the concerns, yes. Obviously if you have 
got a full audience, full office ready to go and you are 
focused on the Court of Review where the issues are teed up, it 
is easier to justify having a special counsel appointed.
    I do have to say that I question the assumption that 
creating this office will make people feel better about the 
functioning of the Court and the national security apparatus in 
general because it will necessarily be secret. And I have 
watched as the General Counsel of the National Security Agency 
tried to act as an advocate for the public interest, as the 
Inspector General of the National Security Agency was put 
forward as an advocate for the national interest. As the Office 
of Intelligence at the Justice Department said, ``We will 
represent the public interest. We are not in bed with the 
intelligence community. We will ride herd on them.'' And yet 
every time there is a fuss--well, and even the clerks who serve 
the FISA Court act as a kind of institutional second voice, and 
none of that matters at the end of the day when a scandal of 
this sort blows up.
    So I question whether people will not simply say, ``Oh, 
well, sure, this person was representing the public interest, 
but he got his security clearance from the Government, he might 
be paid, his staff is paid by the Government. It is really just 
a sham.'' So I fear that this will not have the effect that you 
are hoping it will.
    Senator Blumenthal. Well, hopefully it will improve and 
enhance the process, which, at the end of the day, gives people 
the trust and credibility in the system. And maybe I should ask 
that question of Mr. Jaffer. Would you and others with your 
very commendable and admirable commitment to civil rights and 
civil liberties be somewhat reassured--I am not saying that you 
would give it a gold star necessarily, but would it provide 
some reassurance?
    Mr. Jaffer. Absolutely. I do think it would provide some 
reassurance. I think it is important that there be some form of 
adversarial process, especially when these issues raise 
questions of constitutional interpretation or statutory 
interpretation that are new. And I think that one of the 
important roles for the special advocate is to press for 
transparency where transparency is appropriate and possible. So 
I think it would be a very significant improvement to the 
system.
    Now, I do not think it is enough. I think it has to be 
paired with some other reforms, including reforms relating to 
transparency and a narrowing of the substantive standards that 
the FISA Court is applying. But I absolutely do think that this 
would be a step in the right direction.
    Senator Blumenthal. And I would agree with you that some 
greater degree of transparency on the orders and opinions so 
that the public has some greater access to rulings of law at 
the very least, with sensitivity to the need for redacting 
details that security may require, as well as--I do not know 
whether you were here earlier, but I have a proposal to change 
the method of selecting the members of the FISA Court that 
would, in essence, give the chief judges of the courts of 
appeal a role in designating the individuals so that the Chief 
Justice of the U.S. Supreme Court would not be the sole source 
of those appointees.
    But I think moving in this direction would not only be good 
for the credibility of the Court, but good for the ultimate 
justice of the outcome and protecting rights and liberties.
    Mr. Jaffer. Just on the transparency point, Mr. Baker said 
earlier that we cannot expect the Government to do intelligence 
in public, and I think that is a fair point. But I think it is 
crucial to remember the distinction between law and policy on 
one hand and sources and methods on the other. The public has a 
right to know what the Government's policies are and what the 
legal basis is for those policies. And that is all anyone is 
asking for. Nobody is suggesting that the factual basis for the 
Government surveillance should be disclosed or that the 
surveillance targets' names should be disclosed while the 
Government is engaged in the surveillance. The debate is not 
about that. The debate is about, should the public know what 
the Government's policies are? And I think in a democracy that 
should not really be a debate at all.
    Judge Carr. Senator, if I may, I was appointed, in effect, 
by the chief judge of our circuit, Boris Martin. The way it 
worked with me is I was one of the judges appointed to the four 
positions created in the PATRIOT Act. Judge Martin had been 
well aware of my interest because of the work I had done in 
publication with regard to electronic surveillance generally. 
It is my understanding the Chief Justice called upon Ralph 
Mecham to reach out to propose somebody. It happened to be the 
Sixth Circuit's turn apparently, and Judge Martin called me and 
said, ``Jim, I got this call from Ralph Mecham. I am forwarding 
your name.''
    So at least when I was appointed 10 or more years ago, it 
seems to me that might be codifying the practice.
    Senator Blumenthal. It may be, Judge Carr, but we have no 
idea, do we?
    Judge Carr. Right.
    Senator Blumenthal. Because the process is so secretive and 
the effort to formalize what happens behind closed doors or 
behind the veils of the Chief Justice's office may enhance some 
confidence, at least cannot hurt.
    Judge Carr. Well, also, one other point on the issue. A 
role for the advocate, however you want to call it, in urging 
that portions or complete opinions both of the FISC and the 
Court of Review become public, I think that individual could--I 
had not thought about that, but I think that individual could 
also perform that role in urging the Government to be diligent 
and thorough and see to it that, to the extent that anything 
can be disclosed, that it is.
    Senator Blumenthal. Unfortunately, I have got to--I am 
probably the only Senator at this point who has not voted, and 
I have to apologetically excuse myself to do so. I think I have 
authority to close this hearing.
    The record will remain open for 1 week. I want to thank 
each of you for being here. Your testimony has been remarkably 
helpful and effective, and I will be calling on you again in 
the course of my work on this issue personally. I am sorry that 
more of my colleagues were not here to hear you themselves, but 
I am sure they will review the record of what you had to say.
    So thank you very much. This hearing is adjourned.
    [Whereupon, at 11:22 p.m., the Committee was adjourned.]
    [Questions and answers and submissions for the record 
follow.]
                            A P P E N D I X

              Additional Material Submitted for the Record

T8671.001

T8671.002

                Prepared Statement of Hon. Patrick Leahy

T8671.003

T8671.004

                  Prepared Statement of James M. Cole

T8671.005

T8671.006

T8671.007

T8671.008

T8671.009

                  Prepared Statement of John C. Inglis

T8671.010

T8671.011

T8671.012

T8671.013

T8671.014

T8671.015

                  Prepared Statement of James G. Carr

T8671.016

T8671.017

                  Prepared Statement of Jameel Jaffer

T8671.018

T8671.019

T8671.020

T8671.021

T8671.022

T8671.023

T8671.024

T8671.025

T8671.026

T8671.027

T8671.028

T8671.029

T8671.030

T8671.031

T8671.032

T8671.033

T8671.034

T8671.035

T8671.036

T8671.037

T8671.038

T8671.039

T8671.040

                  Prepared Statement of Stewart Baker

T8671.041

T8671.042

T8671.043

T8671.044

T8671.045

T8671.046

T8671.047

T8671.048

T8671.049

T8671.050

T8671.051

T8671.052

T8671.053

T8671.054

T8671.055

T8671.056

         Questions submitted by Senator Leahy for James M. Cole

T8671.057

        Questions submitted by Senator Leahy for John C. Inglis

T8671.058

T8671.059

         Questions submitted by Senator Leahy for Jameel Jaffer

T8671.060

       Questions submitted by Senator Grassley for James M. Cole

T8671.061

T8671.062

       Questions submitted by Senator Grassley for John C. Inglis

T8671.063

T8671.064

       Questions submitted by Senator Grassley for Robert S. Litt

T8671.065

T8671.066

       Questions submitted by Senator Grassley for Sean M. Joyce

T8671.067

T8671.068

T8671.069

       Questions submitted by Senator Grassley for James G. Carr

T8671.070

       Questions submitted by Senator Grassley for Jameel Jaffer

T8671.071

T8671.072

T8671.073

       Questions submitted by Senator Grassley for Stewart Baker

T8671.074

T8671.075

T8671.076

Responses of James M. Cole to questions submitted by Senators Leahy and 
                                Grassley

[note: some responses of james m. cole are classified and therefore not 
                  printed as a part of this hearing.]

T8671.077

T8671.078

T8671.079

T8671.080

 Responses of John C. Inglis to questions submitted by Senators Leahy 
                              and Grassley

[note: the responses of john c. inglis are classified and therefore not 
                  printed as a part of this hearing.]

 Responses of Robert S. Litt to questions submitted by Senator Grassley

T8671.081

 Responses of Sean M. Joyce to questions submitted by Senator Grassley









 Responses of James G. Carr to questions submitted by Senator Grassley

T8671.086

T8671.087

T8671.088

T8671.089

T8671.090

T8671.091

Responses of Jameel Jaffer to questions submitted by Senators Leahy and 
                                Grassley

T8671.092

T8671.093

T8671.094

T8671.095

T8671.096

T8671.097

T8671.098

T8671.099

T8671.100

T8671.101

T8671.102

T8671.103

 Responses of Stewart Baker to questions submitted by Senator Grassley

T8671.104

T8671.105

T8671.106

T8671.107

T8671.108

T8671.109

T8671.110

T8671.111

T8671.112

T8671.113

                Miscellaneous Submissions for the Record

T8671.114

T8671.115

T8671.116

T8671.117

T8671.118

T8671.119

T8671.120

T8671.121

T8671.122

T8671.123

T8671.124

T8671.125

T8671.126

T8671.127

T8671.128

T8671.129

T8671.130

T8671.131

T8671.132

T8671.133

T8671.134

T8671.135

T8671.136

T8671.137

T8671.138

T8671.139

T8671.140

T8671.141

T8671.142

T8671.143

T8671.144

T8671.145

T8671.146

T8671.147

T8671.148

T8671.149

T8671.150

T8671.151

T8671.152

T8671.153

T8671.154

T8671.155

T8671.156

T8671.157

T8671.158

T8671.159

T8671.160

T8671.161

T8671.162

T8671.163

T8671.164

T8671.165

T8671.166

T8671.167

T8671.168

T8671.169

T8671.170

T8671.171

T8671.172

T8671.173

T8671.174

T8671.175

T8671.176

T8671.177

T8671.178