Case M:06-cv VRW Document 295 Filed 05/25/2007 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHEI~N DISTRICT OF CALIFORNIA

Similar documents
Case M:06-cv VRW Document 254 Filed 04/20/2007 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA

) ) ) Case No. 08-cv-4373-JSW ) ) 30 ) ) ) ) 34. Case No. 07-cv-693-JSW ) )

Case4:08-cv JSW Document227 Filed05/05/14 Pagel of 86 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA SAN FRANCISCO DIVISION

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

National Security Agency

Case4:08-cv JSW Document300 Filed11/07/14 Page1 of 10. Case No. 4:08-ev-4373-JSW

INTRODUCTION. 1. This is an action for injunctive relief, seeking an order that would require President

Department of Defense INSTRUCTION

Department of Defense

Planning Terrorism Counteraction ANTITERRORISM

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

~ ~ No. 13-cv-3287-JSW ~ CLASSIFIED DECLARATION

CONFERENCE MATERIAL DAY ONE 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW

Case 1:17-cv APM Document 29 Filed 11/13/17 Page 1 of 8 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

il~l IL 20 I I11 AD-A February 20, DIRECTIVE Department of Defense

CHAPTER 246. C.App.A:9-64 Short title. 1. This act shall be known and may be cited as the "New Jersey Domestic Security Preparedness Act.

Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. PRIMARY ORDER. A verified application having been made by the Director of

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 304

Revision of Executive Order Privacy and Civil Liberties Information Paper 1

Overview of the Act on the Protection of Specially Designated Secrets (SDS)

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord.

December 21, 2004 NATIONAL SECURITY PRESIDENTIAL DIRECTIVE NSPD-41 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE HSPD-13

DSMA NOTICE 01. Military Operations, Plans & Capabilities

Case 1:11-mj DAR Document 1 Filed 10/25/11 Page 1 of 5 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

SEPTEMBER 11 ATTACKS

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF TEXAS DALLAS DIVISION

United States District Court

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

~ 1( t ~ Intelligence Community Continuity Program A. PURPOSE

DISA INSTRUCTION March 2006 Last Certified: 11 April 2008 ORGANIZATION. Inspector General of the Defense Information Systems Agency

v. : 18 U.S.C. 371, 951 & 2 MICHAEL RAY AQUINO, : I N D I C T M E N T a/k/a "Ninoy" The Grand Jury in and for the District of New Jersey,

OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE OFFICE OF GENERAL COUNSEL WASHINGTON, DC 20511

Use of Military Force Authorization Language in the 2001 AUMF

STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE

DoD R, December 1982

SUMMARY: The Department of Homeland Security (DHS) is revising its procedures

Intelligence Community Whistleblower Protection

The FISA Amendments Act: Q&A

Monday Warm-Up 9/12 What do you know about September 11, 2001?

University of Pittsburgh

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT

Statement of. Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department.

Attorney General's Guidelines for Domestic FBI Operations V2.0

Defense Security Service Intelligence Oversight Awareness Training Course Transcript for CI

Student Guide Course: Original Classification

Defense Security Service Academy OCA Desk Reference Guide

TOP SECRET//COMINT//NOFORN// EXHIBIT A

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

Case 1:17-cv CM Document 20 Filed 08/25/17 Page 1 of 17

Middle Eastern Conflicts

Syllabus Law 384: National Security Law. Antonin Scalia Law School Fall Profs. Darren M. Dick & Arthur Rizer

Reporting Period: June 1, 2013 November 30, October 2014 TOP SECRET//SI//NOFORN

BIODEFENSE FOR THE 21 ST CENTURY

TOP S:BCRETHCOM-I:NTh'NOFO~l

Whereas 17 minutes later, at 9:03 AM, hijacked United Airlines Flight 175 crashed into the South Tower of the World Trade Center;

Case 1:15-cv Document 1 Filed 05/28/15 Page 1 of 8 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Preserving Investigative and Operational Viability in Insider Threat

Alameda County District Attorney's Policy. for Use of Cell-Site Simulator Technology

PPD-28 Section 4 Procedures January 12, 2015

DOD DIRECTIVE INTELLIGENCE OVERSIGHT

Case 2:17-cv Document 1 Filed 11/09/17 Page 1 of 7 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE

Department of Defense DIRECTIVE. SUBJECT: Electronic Warfare (EW) and Command and Control Warfare (C2W) Countermeasures

Chapter 17: Foreign Policy and National Defense Section 2

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity

Preamble. The Czech Republic and the United States of America (hereafter referred to as the Parties ):

Notice of HIPAA Privacy Practices Updates

Cyber Strategy & Policy: International Law Dimensions. Written Testimony Before the Senate Armed Services Committee

(PLEASE PRINT) Sex M F Age Birthdate Single Married Widowed Separated Divorced. Business Address Business Phone Cell Phone

Recent Developments. Security Clearance Changes and Confusion in the Intelligence Reform Act of Sheldon I. Cohen *

Department of Defense DIRECTIVE. SUBJECT: Assistant Secretary of Defense for International Security Policy (ASD(ISP))

TECHNIQUES, AND PROCEDURES, AND OF MILITARY RULES OF ENGAGEMENT, FROM RELEASE UNDER FREEDOM OF

IN THE CIRCUIT COURT OF THE SEVENTEENTH JUDICIAL CIRCUIT, IN AND FOR BROWARD COUNTY, FLORIDA. Plaintiff, CASE NO.

COUNT ONE. (Conspiracy to Kill United States Nationals) date of the filing of this Indictment, al Qaeda has been an

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE

Supply Chain Risk Management

WEAPONS TREATIES AND OTHER INTERNATIONAL ACTS SERIES Agreement Between the UNITED STATES OF AMERICA and ROMANIA

Department of Defense DIRECTIVE. SUBJECT: Release of Official Information in Litigation and Testimony by DoD Personnel as Witnesses

In the United States District Court for the District of Columbia

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Initial Security Briefing

Department of Defense DIRECTIVE

FACT SHEET NATIONAL OPERATIONS SECURITY PROGRAM

President Obama and National Security

Department of Defense DIRECTIVE

Security Classification Guidance v3

Department of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public

1 Nuclear Weapons. Chapter 1 Issues in the International Community. Part I Security Environment Surrounding Japan

SAYING WHAT THE LAW SHOULD BE: JUDICIAL USURPATION IN Al-Marri v. Wright, 487 F.3d 160 (4th Cir. 2007)

THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED, AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.

s ~JF;!T;i;t i~ L,:_ ': ~. ~ ;;>.:: ; "...

NATO SECURITY INDOCTRINATION

Threats to Peace and Prosperity

Department of Defense INSTRUCTION

US Army Intelligence Activities

Transcription:

Case M:0-cv-0-VRW Document Filed 0//0 Page of 0 0 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHEI~N DISTRICT OF CALIFORNIA IN RE NATIONAL SECURITY AGENCY TELECOMMUNICATIONS RECORDS LITIGATION This Document Relates to: Shubert v. Bush, Case No. 0-. MDL Dkt. No. 0--VRW PUBLIC DECLARATION OF LT. GEN. KEITH B. ALEXANDER, DIRECTOR, NATIONAL SECURITY AGENCY Hon. Vaughn R. Walker PUBLIC DECLARATION OF LIEUTENANT GENERAL KEITH B. ALEXANDER, I, Lieutenant Gene~al Keith B. Alexander, do hereby state and declare as follows: INTRODUCTION. I am the Director of the National Security Agency (NSA, an intelligence agency within the Department of Defense. I am responsible for directing the NSA, overseeing the operations undertaken to carry out its mission and, by specific charge of the President and the Director of National Intelligence, protecting NSA activities and intelligence sources and methods. I have been designated an original TOP SECRET classification authority under Executive Order No., 0 Fed. Reg. (, as amended on March, 0, and Department of Defense Directive No. 0. l-r, Information Security Program Regulation, C.F.R. a. (00.. The purpose of this declaration is to support an assertion of the military and state secrets privilege (hereafter "state secrets privilege" by the Director of National Intelligence (DNI as the head of the intelligence community (as well as.the statutory privilege assertion by the DNI under 0 U.S.C. 0-0(. In addition, through this declaration, I also hereby invoke and assert the NSA s statutory privilege set forth in section of the National Security CASE NO. 0-; MDL NO. 0-

Case M:0-cv-0-VRW Document Filed 0//0 Page of 0 0 Agency Act of, Public Law No. - (codified as a note to 0 U.S.C. 0 ("NSA Act", to protect the information related to NSA activities described below. The statements made herein are based on my personal knowledge of NSA activities and operations, and on information available to me as Director of the NSA.. In the course of my official duties, I have been advised of this litigation and the allegations in the Plaintiffs Amended Complaint. As summarized herein and described further in my classified declaration submitted for the Court s in camera, exparte review, various classified facts related to the Plaintiffs claims are subject to the DNI s state secrets and statutory privilege assertions, as well as to my assertion of the NSA s statutory privilege. The disclosure of this information, which relates to NSA intelligence information, activities, sources, and methods, reasonably could be expected to cause exceptionally grave damage to the national security of the United States. Accordingly, as set forth further below and in my classified declaration, it is my judgment that information described in these declarations should be protected from disclosure. In addition, it is my judgment that sensitive state secrets are so central to the subject matter of the litigation that any attempt to proceed in the case risks the disclosure of the secrets described herein and in my classified declaration and, thus, exceptionally grave damage to the national security of the United States. BACKGROUND A..The National Security A~encv~. The NSA was established by Presidential Directive in as a separately organized agency within the Department of Defense. Under Executive Order,.(b, as amended, the NSA s cryptologic mission includes three functions: ( to collect, process, and disseminate signals intelligence (SIGINT information, of which COMINT is a significant subset, for (a national foreign intelligence purposes, (b counterintelligence purposes, and (c CASE NO. 0-; MDL NO. 0-

Case M:0-cv-0-VRW Document Filed 0//0 Page of 0 lo the support of military operations; ( to conduct information security activities; and ( to conduct operations security training for the U.S. Government.. There are two primary reasons for gathering and analyzing foreign intelligence information. The first, and most important, is to gain information required to direct U.S. resources as necessary to counter external threats. The second reason is to obtain information necessary to the formulation of U.S. foreign policy. Foreign intelligence information provided by the NSA is thus relevant to a wide range of important issues, including military order of battle; threat warnings and readiness; arms proliferation; international terrorism; and foreign aspects of international narcotics trafficking. B. September, _.0 and the al Qaeda Threat.. On September, 0, the al Qaeda terrorist network launched a set of coordinated attacks along the East Coast of the United States. Four commercial jetliners, each carefully selected to be fully loaded with fuel for a transcontinental flight, were hijacked by al Qaeda operatives. Those operatives targeted the Nation s financial center in New York with two of the jetliners, which they deliberately flew into the Twin Towers of the World Trade Center. A Qaeda targeted the headquarters of the Nation s Armed Forces, the Pentagon, with the third jetliner. A Qaeda operatives were apparently headed toward Washington, D.C. with the fourth jetliner when passengers struggled with the hijackers and the plane crashed in Shanksville, Pennsylvania. The intended target of this fourth jetliner was most evidently the White House or the Capitol, strongly suggesting that al Qaeda s intended mission was to strike a decapitation blow to the Government of the United States--to kill the President, the Vice President, or Members of Congress. The attacks of September resulted in approximately,000 deaths-- the highest single-day death toll from hostile foreign attacks in the Nation s history. In addition, CASE NO. 0-; MDL NO. 0-

Case M:0-cv-0-VRW Document Filed 0//0 Page of 0 0 these attacks shut down air travel in the United States, disrupted the Nation s financial markets and government operations, and caused billions of dollars of damage to the economy.. On September, 0, the President declared a national emergency "by reason of the terrorist attacks at the World Trade Center, New York, New York, and the Pentagon, and the continuing and immediate threat of further attacks on the United States." Proclamation No., Fed. Reg. (Sept., 0. The United States also immediately began plans for a military response directed at al Qaeda s training grounds and haven in Afghanistan. On September, 0, both Houses of Congress passed a Joint Resolution authorizing the President "to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks" of September. Authorization for Use of Military Force, Pub. L. No. 0-0 (a, Stat., (Sept., 0 ("Cong. Auth.". Congress also expressly acknowledged that the attacks rendered it "necessary and appropriate" for the United States to exercise its right "to protect United States citizens both at home and abroad," and acknowledged in particular that "the President has authority under the Constitution to take action to deter and prevent acts of international terrorism against the United States." Id. pmbl.. As the President made clear at the time, the attacks of September "created a state of armed conflict." Military Order, l(a, Fed. Reg., (Nov., 0. Indeed, shortly after the attacks, NATO took the unprecedented step of invoking article of the North Atlantic Treaty, which provides that an "armed attack against one or more of [the parties] shall be considered an attack against them all." North Atlantic Treaty, Apr.,, art., Stat.,, U.N.T.S.,. The President also determined that al Qaeda terrorists "possess both the capability and the intention to undertake further terrorist attacks against the United States that, if not detected and prevented, will cause mass deaths, mass injuries, and CASE NO. 0-; MDL NO. 0-

Case M:0-cv-0-VRW Document Filed 0//0 Page of 0! 0 massive destruction of property, and may place at risk the continuity of the operations of the United States Government," and he concluded that "an extraordinary emergency exists for national defense purposes." Military Order, l(c, (g, Fed. Reg. at -.. As a result of the unprecedented attacks of September,0, the United States found itself immediately propelled into a worldwide war against a network of terrorist groups, centered on and affiliated with al Qaeda, that possesses the evolving capability and intention of inflicting further catastrophic attacks on the United States. That war is continuing today, at home as well as abroad. Moreover, the war against al Qaeda and its allies is a very different kind of war, against a very different enemy, than any other war or enemy the Nation has previously faced. A Qaeda and its supporters operate not as a traditional nation-state but as a diffuse, decentralized global network of individuals, cells, and loosely associated, often disparate groups, that act sometimes in concert, sometimes independently, and sometimes in the United States, but always in secret--and their mission is to destroy lives and to disrupt a way of life through terrorist acts. A Qaeda works in the shadows; secrecy is essential to al Qaeda s success in plotting and executing its terrorist attacks. 0. Accordingly, after the September attacks, the President directed the NSA to detect and prevent al Qaeda-related terrorist attacks within the United States by intercepting the content of telephone and Intemet communications for which there were reasonable grounds to believe that ( such communication Originated or terminated outside the United States, and ( a party to such communication was a member or agent of a! Qaeda or an affiliated terrorist The term "content" is used herein to refer to the substance, meaning, or purport of a communication, as defined in U.S.C. 0(. CASE NO. 0-; MDL NO. 0-

Case M:0-cv-0-VRW Document Filed 0//0 Page of 0 0 organization (hereafter referred to as the "Terrorist Surveillance Program" or "TSP". The President acknowledged the existence of this program in December 0.. INFORMATION SUBJECT TO ASSERTIONS OF PRIVILEGE I understand that the Plaintiffs in this lawsuit allege that the NSA conducts a "dragnet" surveillance program involving the interception of"virtually every telephone, intemet and/or email communication that has been sent from or received within the United States since 0." Amended Compl. ~[~,. I also understand that the Plaintiffs allege that the content of their own telephone and Intemet communications were subject to "unlawful interception, search and seizure, and electronic surveillance," in connection with the alleged "dragnet" program. Id. ~. I further understand that the Plaintiffs allege ( that they are customers of Verizon and~or AT&T, and ( that those companies participate in the content surveillance dragnet that Plaintiffs allege. See id. ~-.. As set forth further below, the following categories of information are subject to the DNI s assertion of the state secrets and statutory privileges, as well as my assertion of the NSA statutory privilege, and this information should be protected from disclosure in this matter: A. Information that may tend to confirm or deny whether the Plaintiffs have been subject to any alleged NSA intelligence activity that may be at issue in this matter; and B. Information concerning NSA intelligence activities, sources, or methods, including: On January, 0, the Attorney General made public the general facts that new orders of the Foreign Intelligence Surveillance Court had been issued that authorized the Government to target for collection international communications into or out of the United State~, where there is probable cause to believe that one of the communicants is a memberor agent of al Qaeda or an associated terrorist organization; that, as a result of these orders, any electronic surveillance that was occurring as part of the TSP is now being conducted subject to the approval of the FISA Court; and that, under these circumstances, the President determined not to reauthorize the TSP. CASE NO. 0-; MDL NO. 0-

Case M:0-cv-0-VRW Document Filed 0//0 Page of 0 0 ( Information conceming the scope and operation of the Terrorist Surveillance Program, including information that may be needed to demonstrate that the TSP was limited to one-end foreign al Qaeda-related communications and that the NSA does not otherwise engage in the content surveillance dragnet that the Plaintiffs allege; and ( Any other information concerning NSA intelligence activities, sources, or methods that would be necessary to adjudicate the Plaintiffs claims, including, to the extent applicable, information that would tend to confirm or deny whether the NSA collects large quantities of communication records information; and C. Information that may tend to confirm or deny whether Verizon!MCI, AT&T, or any other telecommunications carrier has assisted the NSA with the alleged intelligence activities. HARM OF DISCLOSURE. As set forth in my classified declaration submitted for the Court s in camera, ex arte review, disclosure of information in the foregoing categories would cause exceptionally,~ ave harm to national security. I briefly summarize the harms at issue below.. The first major category of information as to which I am supporting the DNI s assertion of privilege, and asserting the NSA s own statutory privilege, concerns information as to whether particular individuals, including the Plaintiffs in this lawsuit, have been subject to alleged NSA intelligence activities. Disclosure of information that would tend to confirm or deny whether or not certain individuals have been subject to NSA intelligence activities would cause exceptionally grave harm to the national security. As a matter of course, the NSA cannot publicly confirm or deny whether any individual is subject to surveillance activities because to do so would tend to reveal actual targets. For example, if the NSA were to confirm in this case and others that specific individuals are not targets of surveillance, but later refuse to comment (as it would have to in a case involving an actual target, a person could easily deduce by comparing such responses that the person in the latter case is a target. The harm of revealing targets of CASE NO. 0-; MDL NO. 0-

Case M:0-cv-0-VRW Document Filed 0//0 Page of 0 lo foreign intelligence surveillance should be obvious. If an individual knows or suspects he is a target of U.S. intelligence activities, he would naturally tend to alter his behavior to take new precautions against surveillance. In addition, revealing who is not a target would indicate who has avoided surveillance and who may be a secure channel for communication, Such information could lead a person, secure in the knowledge that he is not under surveillance, to help a hostile foreign adversary convey information; alternatively, such a person may be unwittingly utilized or evenf0rced to convey information through a secure channel. Revealing which channels are free from surveillance and which are not would also reveal sensitive intelligence methods and thereby could help any adversary evade detection.. Second, I am supporting the DNI s assertion of privilege and asserting the NSA s statutory privilege over any other facts concerning NSA intelligence sources and methods that would be needed to adjudicate this case. This includes: ( facts concerning the operation of the Terrorist Surveillance Program and any other NSA intelligence activities needed to demonstrate that the TSP was limited as the President stated to the interception of one-end foreign communications reasonably believed to involve a member or agent of al Qaeda or an affiliated terrorist organization and that the NSA does not otherwise conduct the content surveillance dragnet that the Plaintiffs allege; ( other classified facts about the operation of the TSP that would be necessary to adjudicate the lawfulness of that program, to the extent it is at issue in this case; and ( to the extent applicable, facts that would confirm or deny whether the NSA collects large quantities of communication records information. As set forth below, the disclosure of such information would cause exceptionally grave harm to national security. As noted above, in December 0, President Bush explained that, after the September attacks, he authorized the NSA to intercept the content of certain communications for which there are reasonable grounds to believe that ( such communication originated or CASE NO. 0-; MDL NO. 0-

Case M:0-cv-0-VRW Document Filed 0//0 Page of 0 0 outside the United States, and ( a party to such communication is a member or agent of al Qaeda or an affiliated terrorist organization. The President stated at the time that this activity, now referred to as the Terrorist Surveillance Program, did not involve the collection of purely domestic communications, or international communications with no al Qaeda connection, and these facts were reiterated publicly by the Attorney General and then-deputy Director of National Intelligence. As the President made clear in describing the limited scope of the TSP, Plaintiffs allegations of a content surveillance dragnet are false. But if the NSA had to demonstrate in this case that the TSP was limited as the President stated, and not a dragnet as the Plaintiffs claim, and that the NSA does not otherwise engage in the dragnet that Plaintiffs allege, sensitive and classified facts about the operation of the TSP and NSA intelligence activities would have to be disclosed. The disclosure of whether and to what extent the NSA utilizes certain intelligence sources and methods would reveal to foreign adversaries the NSA s capabilities, or lack thereof, enabling them to either evade particular channels of communications that are being monitored, or exploit channels of communications that are not subject to NSA activities, in either case risking exceptionally grave harm to national security.. Similarly, confirmation or denial of any information concerning whether the NSA collects large quantities of communication records--to the extent such allegations are relevant to this case--would also disclose information about whether or not the NSA utilizes particular intelligence sources and methods and, thus, the NSA s capabilities or lack thereof.. Finally, disclosure of any information tending to confirm or deny whether Verizon or AT&T assists the NSA with alleged intelligence activities as Plaintiffs claim would. cause exceptionally grave harm to the national security. Again, such disclosures would help foreign adversaries evade detection by revealing whether or not the NSA utilizes particular intelligence sources and methods or monitors particular channels of communications. CASE NO. 0-; MDL NO. 0-

Case M:0-cv-0-VRW Document Filed 0//0 Page 0 of 0 0. Any further elaboration on the public record concerning these matters would reveal information that would cause the very harm that my privilege assertion and the DNI s privilege assertion are intended to prevent. As noted, my separate classified declaration provides a more detailed explanation of the information and harms to national security at issue. CONCLUSION. In sum, I support the DNI s assertion of the state secrets privilege and statutory privilege to prevent the disclosure of the information described herein and detailed in my classified declaration that is available for the Court s in camera and exparte review. I also assert a statutory privilege under Section of the National Security Act with respect to the information described herein which concerns the functions of the NSA. Moreover, because proceedings in this case risk disclosure of privileged and classified intelligence-related information, I respectfully request that the Court not only protect that information from disclosure but also dismiss this case to prevent exceptional harm to the national security of the United States. I declare under penalty of perjury that the foregoing is true and correct. Director, National Security Agency CASE NO. 0-; MDL NO. 0-