Page 59 - pclob usa freedom
P. 59

TOP SECRET//SI//NOFORN




               agency’s minimization procedures, which were adopted by the Attorney General and approved
               by the FISA court, limit when and for what purpose analysts may access USA Freedom Act
               CDR data.  287   Specifically, NSA may only grant access to personnel who are trained on the
               procedures and restrictions that govern the handling and dissemination of that data and who have
               a need to know. 288   The procedures also prohibit NSA from retaining CDRs for more than five
               years after they were delivered to NSA unless the relevant CDR contained information that
               formed the basis for a foreign intelligence report. 289

                       (U) Internal policies and guidance impose further limits. 290   Queries could only be
               initiated when “intended to determine or identify persons of foreign intelligence interest who
               may be engaged in international terrorism,” and were subject to audit. 291   These limits and
               controls played a role in mitigating the privacy risks posed by the program during its operation.

                       (U) Like other NSA activities, the USA Freedom Act CDR program was overseen by
               various elements within NSA.  The Board’s oversight, including demonstrations of NSA’s
               compliance technology, indicates that the agency has made significant investments in internal
               compliance and accountability processes.  For instance, NSA had measures in place to ensure
               that only the right people could see CDR program information on NSA’s systems and that those
               people could use the information only for authorized purposes.  Every query by an NSA analyst
               is logged and later reviewed by a human auditor familiar with the analyst’s mission, and NSA
               has deployed technology to augment the capabilities of these human auditors.  Software
               developers seek to build minimization and compliance rules into the design of the user interfaces
               that analysts use, reducing the need to rely on human recall and judgment to ensure




               that is directly relevant and necessary to accomplish the specified purpose(s)” of the collection.  The White House,
               National Strategy for Trusted Identities in Cyberspace, Appendix A (Apr. 2011),
               https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf.
               287  (U) The statute and minimization procedures limited the purposes for which data could be used.  This speaks to
               the FIPPs purpose-specification principle, which provides that entities should articulate the authority under which
               personal information is collected and the purposes for which it is intended to be used.  The White House, National
               Strategy for Trusted Identities in Cyberspace, Appendix A (Apr. 2011).
               288  (U) NSA USA Freedom Act Transparency Report at 6.  These restrictions relate to the FIPPs principle of “use
               limitation,” which provides that organizations should use personal data for the stated purposes and share it in ways
               that are compatible with such purposes,” and the principle of “data quality”, which states that steps should be taken
               to ensure that personal data is “accurate, relevant, timely, and complete.”  The White House, National Strategy for
               Trusted Identities in Cyberspace, Appendix A (Apr. 2011).
               289  (U) NSA USA Freedom Act Transparency Report at 7.
               290  (U) See Part II(A)(2).

               291  (U) NSA USA Freedom Act Transparency Report at 13.  Query limits reinforce the FIPPs principle of use
               limitation.  NSA’s training, compliance, and auditing practices address the FIPPs principle of auditing.  See The
               White House, National Strategy for Trusted Identities in Cyberspace, Appendix A (Apr. 2011).

                                                             56




                                                TOP SECRET//SI//NOFORN
   54   55   56   57   58   59   60   61   62   63   64