NSA-FOIACASELOG-2016.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

NSA-FOIACASELOG-2016.Pdf This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 100503A 4 April 2017 JOHN GREENEWALD Dear Mr. Greenewald: This responds to your Freedom of Information Act (FOIA) request dated 1 January 2017 which was received by this office on 2 January 2017, for "a copy of the FOIA case log for calendar year 2016." For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. Since processing fees were minimal, no fees were assessed. Your request has been processed under the FOIA, and the logs for calendar year 2016 are enclosed, along with a FOIA Case Dispositions reference sheet that explains the final case dispositions. Please be advised that the logs do not contain the number of pages released. They contain a final disposition if the case was closed at the time the logs were created. If there is no final disposition, the case was still pending at the time the logs were created. Certain information has been deleted from the enclosures. This Agency is authorized by various statutes to protect certain information concerning its activities, as well as the names of its employees. We have determined that such information exists in these documents. Accordingly, those portions are exempt from disclosure pursuant to the third exemption of the FOIA, which provides for the withholding of information specifically protected from disclosure by statute. The specific statute applicable in this case is Public Law 86-36 (50 U.S. Code 3605). Personal information regarding other individuals has been deleted from the enclosures in accordance with 5 U.S.C. 552 (b)(6). This exemption protects from disclosure information which would constitute a clearly unwarranted invasion of personal privacy. In balancing the public interest for the information you request against the privacy interests involved, we have determined that the privacy interests sufficiently satisfy t~e requirements for the application of the (b)(6) exemption. In most cases requesters seeking the FOIA logs agree to omit Privacy Act or first-party requests from the logs. Please be advised, therefore, that when processing our FOIA logs, we typically remove first party requests as non-responsive, since they represent requests from individuals seeking information on themselves. Those entries, in addition to being exempt under (b)(6), are also marked as non-responsive. FOIA Case: 100503A Since these deletions may be construed as a partial denial of your request, you are hereby advised of this Agency's appeal procedures. You may appeal this decision. If you decide to appeal, you should do so in the manner outlined below. • The appeal request must be in writing and addressed to: NSA/CSS FOIA/PA Appeal Authority (P132) National Security Agency 9800 Savage Road STE 6932 Fort George G. Meade, MD 20755-6932 • The request must be postmarked no later than 90 calendar days of the date of this letter. Decisions appealed after 90 days will not be addressed. • Please include the case number provided above. • Please describe with sufficient detail why you believe the denial of information was unwarranted. • NSA will endeavor to respond within 20 working days of receiving your appeal, absent any unusual circumstances. You may also contact our FOIA Public Liaison at foialo({l{nsa.gov for any further assistance and to discuss any aspect of your request. Additionally, you may contact the Office of Government Information Services (OGIS) at the National Archives and Records Administration to inquire about the FOIA mediation services they offer. The contact information for OGIS is as follows: Office of Government Information Services National Archives and Records Administration 8601 Adelphi Rd- OGIS College Park, MD 207 40 ogis@nara. gov (877) 684-6448 (202) 741-5770 Fax(202) 741-5769 JOHN R. CHAPMAN Chief, FOIA/PA Office NSA Initial Denial Authority Ends: ajs UNCLASSIFIED FOIA Case Dispositions lSpOSl ton: D escnptton: Administratively Closed (AC) Administratively closed by the FOIA Office when the requester has not complied with the law or established regulations or policies (the request was not perfected). Includes failure to verify continued interest in a request. Records Not Reasonably Described Requester does not respond to a request for (CLARIFY) clarification of what he/she is seeking. Duplicate Request (DUPE) Duplicate request; e.g., either a mailed copy of an earlier faxed request, or multiple internet requests because requester hits the submit button more than once Fee Related Reason (FEE) Requester does not agree to pay, or chooses not to · pay, for a records search; or a requester does not pay incurred fees. Full Denial Based on Exemptions (FD) Everything that the requester sought is denied (could also pertain to a case for which parts are NR, parts FD, and parts GLOMAR) .. Neither Confirm nor Deny (GLOMAR) Response neither confirms nor denies the existence of responsive records (for the entire request) Granted in Full (GF) The requester is provided with everything requested, and no infonnation is withheld/protected; or requester agrees to accept document as previously released: Improper FOIA Request (IFR) The request does not meet the criteria to be a FOIA request (asks questions, asks for records that are not yet created, etc.). MISDIRECTED Request was not submitted to the proper DoD component and was referred to the correct component.' Not an Agency Record (NAR) Case was closed because what was requested was not an Agency record (no possession or control). No Records (NR) No records were located for all portions of the OR request. Includes requests for which only a Negative (NEG) limited search is done because the information requested is not within NSA's purview. No Agency Equities (NEQ) No NSA equities were found in other-agency documents. NOCONTACT Unable to contact the requester. Not Within Purview (NP) The subject of the request does not fall within NSA's mission (not used after 181 quarter 2009- see NR). OPSFILE NSA Operational Files are exempt from FOIA search under 50 USC 432b - no search conducted. Partial Denial/Partial Grant (PD) Part of what the requester sought is denied. PUBAVAIL All responsive documents are publicly available. REFERRED All documents located are referred to another agency for action (no NSA documents). Witpdrawn (WD) Requester advises in writing or by phone that he/she is no longer pursuing the request. No Disposition Case was not completed at the time the log was created. ~fproved for Release by NSA o~J UNCLASSIFIED 0-25-2011 FOIA Case# 43988 UNCLASSIFIED Dispositions for cases in FOIA Log reports prior to July 2008 do not always indicate that the cases were completely processed. A disposition pertaining to only one part of a request may have been selected during preliminary processing of the request; or a reviewer may have preselected a disposition while processing the request. The final disposition may have been changed when the case was completed. UNCLASSIFIED Doc ID: 6565673 FOIA LOG 1ST QTR CY2016 Case II on.tlllltlon Date Receive Dlte Requester Subject Disposition (U) Records and source code relating to Prosecutor's Management Information System (AKA Promis, PROM IS, Prom is '82, Enhanced Prom is) and derivatives thereof, and the related matter '83461 1/1/2016 1/4/2016 of lnslaw Inc. v. United States Government. Please include any records relating to the transfer and/or sale of PROM IS and/or Promis-derivatives between Robert Hanssen and his Russian handlers and the sa le of Prom is and/or Prom is-derivatives on the Ru ss ian black market (blat), MICHAEL BEST and its alleRed use bv ai -Qaeda and/or Usama bin Laden. Copy of the lntellipedia entry lfr'!m all three Wikis that make up the lntellipedia) tor the following entry(s) (Or whatever t.opic may pertain if it is slightly worded differently): 83431 1/2/2016 1/4/2016 sim il a~ JOHN GREENEWALD OPERATION ALERT No Records 83432 1/4/2016 1/4/2016 the location metadata (s pecifically latitude, longitudo and time of day for them) for the days of JUSTJN MEYERS October 31 20ll5 thm,.oh NnvPmho · ~ ?00~ fnrl NP;thPr Cnnfirm Nnr l"lPnv I ""Y d"U d" '"d"U"dO O~CWt<Y M~~"CY l"OMJ O~LUOU> "OCOU U "'lS''-"'0 V'l ' !'~ ": '~~ OU business/consulting/advisory promotions141dvertisements, contracts, agreements tg show · · · ' ' ' ..... ' .. ' ' ....· :' :':::; \ publicly between January 1,1963 and Ja nuai-, .20, 1969: 1) affiliations, ties, relations~ips .·: : between, through/for NSA Officials, agents, attorneys, clients, employees, attorneys, and/or advisors to ltek Corporation, which was on/about July 15, 1965 at 10 rvii!guire Non - Responsive 83442 1/4/2016 1/5/2016 headqu a i-t~red I I (b) ( 6) Road, Lexin gton 73, Massachu setts, Telephone number VOLUNTEER 2-6200 regarding .• . computer translation of Mainland Chinese dialects [e.g, _Mandarin] into English/Russian, · •• . .. .. · encoding of Chinese written cha racters in a computer lan'g~ age [e.g. Chicoder]. and Chine"! .. ·· . RICHARD TANSEY stenotypy. All records pertaining tol I who worked for the Naripnal Security Administration ·• . • 83471 1/7/2016 1/7/2016 •' •' ANDREW HOLTER around 1968-1969. .... Full Denial an electronic list of all National Securlty.Agency employees locate d·~ithin the Ge_orsi•, • 83472 1/6/2016 1/7/2016 Tennessee, and Alabama regions.
Recommended publications
  • Steganography As a Means of Attacking Information Systems
    Scientific and Practical Cyber Security Journal (SPCSJ) 2(4): 75-80 ISSN 2587-4667 Scientific Cyber Security Association (SCSA) STEGANOGRAPHY AS A MEANS OF ATTACKING INFORMATION SYSTEMS Anna Romanova 1, Sergiy Toliupa 2 1Taras Shevchenko University of Kyiv, Faculty of Information Technology, 2 Taras Shevchenko University of Kyiv, Faculty of Information Technology ABSTRACT. An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented. Keywords: steganography, TEMPEST, covert channel, information protection Cryptography is widely used as one of the most efficient and approbated methods of critical information resources protection. Nevertheless, in particular cases it might be more effective to hide the communication channel itself instead of making the information within it unreadable. Such a practice, namely concealing data within unsuspicious, innocent-looking containers, is called steganography. Any concept might have a double application. While being primarily considered a means of information protection, steganography can be used with ill intentions, as well. In fact, several high-tech attacks are based on the hidden data transmission, and contemporary methods of counteraction do not provide satisfactory level of resilience to those. These attacks are not always considered to be steganography-based, as they, for the most part, use a variety of features, characteristic for information and communication systems – physical effects, transmission protocols, communication infrastructure, specific features of software, cryptography etc. Nevertheless, the attack requires a classical statement of the task of steganography – how to transmit data so that a potential attacker could not acquire them due to not knowing about the presence of a transmission channel, even if he or she has a suspicion about one and the possible methods are known.
    [Show full text]
  • Through a PRISM, Darkly(PDF)
    NANOG 59 – October 7, 2013 Through a PRISM, Darkly Mark Rumold Staff Attorney, EFF NANOG 59 – October 7, 2013 Electronic Frontier Foundation NANOG 59 – October 7, 2013 NANOG 59 – October 7, 2013 NANOG 59 – October 7, 2013 What we’ll cover today: • Background; what we know; what the problems are; and what we’re doing • Codenames. From Stellar Wind to the President’s Surveillance Program, PRISM to Boundless Informant • Spying Law. A healthy dose of acronyms and numbers. ECPA, FISA and FAA; 215 and 702. NANOG 59 – October 7, 2013 the background NANOG 59 – October 7, 2013 changes technologytimelaws …yet much has stayed the same NANOG 59 – October 7, 2013 The (Way) Background • Established in 1952 • Twin mission: – “Information Assurance” – “Signals Intelligence” • Secrecy: – “No Such Agency” & “Never Say Anything” NANOG 59 – October 7, 2013 The (Mid) Background • 1960s and 70s • Cold War and Vietnam • COINTELPRO and Watergate NANOG 59 – October 7, 2013 The Church Committee “[The NSA’s] capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything. Telephone conversations, telegrams, it doesn't matter. There would be no place to hide.” Senator Frank Church, 1975 NANOG 59 – October 7, 2013 Reform • Permanent Congressional oversight committees (SSCI and HPSCI) • Foreign Intelligence Surveillance Act (FISA) – Established requirements for conducting domestic electronic surveillance of US persons – Still given free reign for international communications conducted outside U.S. NANOG 59 – October 7, 2013 Changing Technology • 1980s - 2000s: build-out of domestic surveillance infrastructure • NSA shifted surveillance focus from satellites to fiber optic cables • BUT: FISA gives greater protection for communications on the wire + surveillance conducted inside the U.S.
    [Show full text]
  • The Paris Apartment Is a Work of Fiction
    READI NG GROUP GU I DE PhotosOfYou_TPTextFP Epilogue 2019-11-26 15:34:54 335 AUTHOR’S NOTE The Paris Apartment is a work of fiction. While a product of my imagination, the premises and characters I’ve chosen to create are inspired by real people and real events. The characters of Sophie Seymour and Estelle Allard were shaped by the experiences and courage of Virginia Hall, Pearl Witherington Cornioley, Christine Granville, Josephine Baker, Nancy Wake, and Andrée de Jongh. Their memoirs, interviews, and stories only give us an idea of how truly extraordinary each of these women was. Sophie’s work at Bletchley Park was based on the real men and women who worked tirelessly against time and almost im- possible odds to decode Nazi encryption devices. Most of us have heard of the Enigma cipher and the remarkable work by Alan Turing and his team to break that cipher. Told less often seems to be the story of Tommy Flowers and Bill Tutte, who, together with their teams, developed Colossus—the machine that was able to break the Lorenz cipher, known as Tunny at Bletchley. The Lorenz cipher was favoured by Hitler and used by High Command—and for good reason. It was a far more powerful than the Enigma and capable of exceedingly complex en- cryptions. Additionally, unlike the Enigma, it did not depend ParisApartment_TPtext1P Author’s Note 2020-10-01 21:13:57 395 396 AUTHOR’S NOTE on Morse code. Attached to a teleprinter, it automatically encrypted outgoing messages and decrypted incoming mes- sages, allowing longer messages to be transmitted with greater ease.
    [Show full text]
  • Case 6:12-Cv-01354-MC Document 1 Filed 07/26/12 Page 1 of 8
    Case 6:12-cv-01354-MC Document 1 Filed 07/26/12 Page 1 of 8 FILED 26 JUL '12 t3rl31JSDG·OR£ UNITED STATES DISTRICT COURT THE DISTRICT OF OREGON EUGENE DIVISION Diane Roark, Plaintiff v. Violations of Constitutional Rights Return ofProperty, Rule 41(g) United States, Defendant. ... oOo ... COMPLAINT Parties 1. Plaintiff Diane Roark, filingpro se, resides in Stayton, Oregon and is a citizen of the United States. 2. The Defendant is the United States, due to actions and omissions by the National Security Agency (NSA), headquartered at Ft. George G. Meade, Maryland, and the Federal Bureau oflnvestigation (FBI) and Department of Justice (DOJ), each headquartered in Washington, D.C. Jurisdiction 3. Plaintiffs property was seized by the FBI from her residence in Stayton, Oregon, in Marion County, which falls under jurisdiction of the Eugene Division. Plaintiff was removed for improper venue from a Rule 41 (g) lawsuit filed by five parties in the United States District Court of Maryland, and was notified that the proper venue in her case is the United States District Court of Oregon. Wiebe et al. v National Security Agency et al., Roark v U.S. 1 ( Case 6:12-cv-01354-MC Document 1 Filed 07/26/12 Page 2 of 8 Civil Case No. RDB-11-3245. Facts 4. Plaintiff was employed at the House Permanent Select Committee on Intelligence, and was responsible for oversight ofNSA's operations and budget for the five years before her retirement in April, 2002. Plaintiff was suspected of providing classified government information about "warrantless wiretaps" to the New York Times (NYT), and to NYT reporter James Risen for a book on the same topic, published in December 2005 and January 2006 respectively, and/or to the Baltimore Sun.
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • I,St=-Rn Endorsedb~ Chief, Policy, Information, Performance, and Exports
    NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY 2-4 Issue Date: IO May 20 I 9 Revised: HANDLING OF REQUESTS FOR RELEASE OF U.S. IDENTITIES PURPOSE AND SCOPE This policy, developed in consultation with the Director of National Intelligence (DNI), the Attorney General, and the Secretary of Defense, implements Intelligence Community Policy Guidance I 07 .1 , "Requests for Identities of U.S. Persons in Disseminated Intelligence Reports" (Reference a), and prescribes the policy, procedures, and responsibilities for responding to a requesting entity, other than NSA/CSS, for post-publication release and dissemination of masked US person idenlity information in disseminated serialized NSA/CSS reporting. This policy applies exclusively to requests from a requesting entity, other than NSA/CSS, for post-publication release and dissemination of nonpublic US person identity information that was masked in a disseminated serialized NSA/CSS report. This policy does not apply in circumstances where a U.S. person has consented to the dissemination of communications to, from, or about the U.S. person. This policy applies to all NSA/CSS personnel and to all U.S. Cryptologic System Government personnel performing an NSA/CSS mission. \ This policy does not affect any minimization procedures established pursuant to the Foreign Intelligence Surveillance Act of 1978 (Reference b), Executive Order 12333 (Reference £), or other provisions of law. This policy does not affect the requirements established in Annex A, "Dissemination of Congressional Identity Information," of Intelligence Community Directive 112, "Congressional Notification" (Reference d). ~A General, U.S. Army Director, NSA/Chief, CSS i,st=-rn Endorsedb~ Chief, Policy, Information, Performance, and Exports NSA/CSS Policy 2-4 is approved for public release.
    [Show full text]
  • A Public Accountability Defense for National Security Leakers and Whistleblowers
    A Public Accountability Defense For National Security Leakers and Whistleblowers The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yochai Benkler, A Public Accountability Defense For National Security Leakers and Whistleblowers, 8 Harv. L. & Pol'y Rev. 281 (2014). Published Version http://www3.law.harvard.edu/journals/hlpr/files/2014/08/ HLP203.pdf Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:12786017 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP A Public Accountability Defense for National Security Leakers and Whistleblowers Yochai Benkler* In June 2013 Glenn Greenwald, Laura Poitras, and Barton Gellman be- gan to publish stories in The Guardian and The Washington Post based on arguably the most significant national security leak in American history.1 By leaking a large cache of classified documents to these reporters, Edward Snowden launched the most extensive public reassessment of surveillance practices by the American security establishment since the mid-1970s.2 Within six months, nineteen bills had been introduced in Congress to sub- stantially reform the National Security Agency’s (“NSA”) bulk collection program and its oversight process;3 a federal judge had held that one of the major disclosed programs violated the
    [Show full text]
  • Utah Data Center, As Well As Any Search Results Pages
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84688A 2 May 2017 JOHN GREENEWALD Dear Mr. Greenewald : This responds to your Freedom of Information Act (FOIA) request of 14 June 2016 for Intellipedia pages on Boundless Information and/or BOUNDLESS INFORMANT and/or Bull Run and/or BULLRUN and/or Room 641A and/ or Stellar Wind and/ or Tailored Access Operations and/ or Utah Data Center, as well as any search results pages. A copy of your request is enclosed. As stated in our previous response, dated 15 June 2016, your request was assigned Case Number 84688. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD.
    [Show full text]
  • George Thorley Class 12 Project
    SURVEILLANCE !1 Surveillance Watch The Many, To Catch The Few George J. Thorley Norwich Steiner School Author Note George J. Thorley, Level 3 Steiner School Certificate, Norwich Steiner School. This report is the piece of work required for the Steiner School Certificate Level 3 Class 12 Project. Correspondence concerning this report should be addressed to George Thorley, Norwich Steiner School, Hospital Lane, Norwich, NR1 2HW. Contact: [email protected] 11 - 05 - 2017 SURVEILLANCE !2 Contents Title 1 Summary 3 Introduction 4 Historical Context 5 9/11 7 USA PATRIOT Act 2001 8 Presidents Surveillance Program 10 The Timeline 12 Edward J Snowden 16 Prism 17 Tempora 20 Treasure Map 21 Conclusion 23 Diagrams 26 References 27 11 - 05 - 2017 SURVEILLANCE !3 Summary In this report, my main question will be: What was the extent of government mass surveillance, in particular the NSA in the United States, running from the September 11 attacks in 2001, to the Edward Snowden revelations in 2013? In answering this I will focus on how public and political feelings prompted the conditions possible for the security forces to be doing what they do in todays world. In particular, I will be looking at the National Security Agency (NSA) in the United States (US) and some of the revelations brought forward by Edward Snowden in 2013, along with the scale of involvement of the United Kingdom’s (UK) Government Communication Headquarters (GCHQ). I will then look at some of the fundamental questions that surround the world of mass surveillance, such as the effectiveness of the programs that were acted upon by security agencies, who they were really looking for, and whether, in my eyes, their methods were morally right.
    [Show full text]
  • FISCAL YEAR 2021 CONGRESSIONAL BUDGET JUSTIFICATION —And— PERFORMANCE BUDGET GOALS
    FISCAL YEAR 2021 CONGRESSIONAL BUDGET JUSTIFICATION —and— PERFORMANCE BUDGET GOALS U.S. OFFICE OF SPECIAL COUNSEL 1730 M Street, N.W., Suite 218 Washington, D.C. 20036-4505 www.osc.gov TABLE OF CONTENTS PART 1 – EXECUTIVE SUMMARY 3 Summary of Request 5 Appropriations Language 8 About the Office of Special Counsel 8 OSC’s Docket 8 Strategic Goals 11 OSC’s Efficiencies and Successes 11 OSC’s Internal Organization 13 Components of Budget Request 15 Budget by Program 16 PART 2 – FY 2021 BUDGET REQUEST – ADDITIONAL INFORMATION 17 FY 2021 Budget Request by Budget Object Class 17 Analysis of Resources Table 19 PART 3 – BUDGET PROGRAMS AND PERFORMANCE PLAN 20 FY 2019 Case Activity and Results – All Programs 20 Investigation and Prosecution of Prohibited Personnel Practices 21 USERRA 27 Alternative Dispute Resolution 30 Whistleblower Disclosure Program 32 Hatch Act 36 OSC’s Diversity, Outreach and Training Program 40 PART 4 – ENHANCEMENT OF OPERATIONS 42 Strategic Management of Human Capital 42 Improved Financial Performance 42 Competitive Sourcing 43 Maximizing Efficiencies through use of Shared Service Providers 43 IT Modernization Initiatives 44 IT Goals for FY 2020 – FY 2021 45 Improving Employee Satisfaction and Wellness 45 Telework Initiative 45 Continuity of Operations 46 Risk Management and Program Evaluation 46 APPENDICES 47 Appendix A: Statutory Background 47 Appendix B: Strategic Plan – FY 2017 to FY 2022 49 Appendix C: Goal Tables for New Strategic Plan 63 Appendix D: OSC Organizational Chart 77 U.S. Office of Special Counsel FY 2021 Congressional Budget Justification Page 2 PART 1 – EXECUTIVE SUMMARY The Office of Special Counsel (OSC) acts as the premier channel for whistleblowers and federal workers seeking redress for violations of their civil service protections, as well as safeguards the nonpartisan ethos at the core of the federal workforce.
    [Show full text]
  • News Opinion National Issues Best Countries Cartoons Photos the Report
    Pre-Snowden Whistleblower Thomas Tamm Faces Misconduct Charges, ... http://www.usnews.com/news/articles/2016-01-27/pre-snowden-whistle... News Opinion National Issues Best Countries Cartoons Photos The Report Ken Walsh's Washington Decision 2016 The Run 2016 The Chase Washington Whispers At the Edg Thomas Tamm exposed the Bush administration's warrantless wiretapping program. Fellow Justice Department whistleblower Jesselyn Radack, right, waited a decade for a misconduct complaint against her to be dismissed. By Steven Nelson Jan. 27, 2016, at 2:42 p.m. + More A whistleblower who sparked intense public debate about warrantless surveillance nearly a decade 1 of 6 4/11/2016 10:03 AM Pre-Snowden Whistleblower Thomas Tamm Faces Misconduct Charges, ... http://www.usnews.com/news/articles/2016-01-27/pre-snowden-whistle... before Edward Snowden now faces ethics charges that could result in his disbarment. Thomas Tamm, a former Justice Department attorney, told reporters in 2004 about the Bush administration bypassing standard legal procedure for intercepting Americans’ international phone calls and emails, and publicly outed himself weeks before President Barack Obama took office. Tamm’s tip helped New York Times reporters James Risen and Eric Lichtblau win a Pulitzer Prize in 2006. And under Obama, who had criticized the program, the Justice Department in 2011 announced it would not bring criminal charges against him. But on Tuesday, the D.C. Office of Disciplinary Counsel – which prosecutes disciplinary matters involving members of the D.C. Bar – unveiled ethics charges against Tamm that could result in his disbarment. The charges allege Tamm “failed to refer information in his possession that persons within the Department of Justice were violating their legal obligations to higher authority within the Department” and “revealed to a newspaper reporter confidences or secrets of his client, the Department of Justice.” [RELATED: NSA Water, Electricity Supply Safe as 'Off Now' Push Fizzles] The D.C.
    [Show full text]
  • Retroactively Classified Documents, the First Amendment, and the Power to Make Secrets out of the Public Record
    ARTICLE DO YOU HAVE TO KEEP THE GOVERNMENT’S SECRETS? RETROACTIVELY CLASSIFIED DOCUMENTS, THE FIRST AMENDMENT, AND THE POWER TO MAKE SECRETS OUT OF THE PUBLIC RECORD JONATHAN ABEL† INTRODUCTION ............................................................................ 1038 I. RETROACTIVE CLASSIFICATION IN PRACTICE AND THEORY ... 1042 A. Examples of Retroactive Classification .......................................... 1043 B. The History of Retroactive Classification ....................................... 1048 C. The Rules Governing Retroactive Classification ............................. 1052 1. Retroactive Reclassification ............................................... 1053 2. Retroactive “Original” Classification ................................. 1056 3. Retroactive Classification of Inadvertently Declassified Documents .................................................... 1058 II. CAN I BE PROSECUTED FOR DISOBEYING RETROACTIVE CLASSIFICATION? ............................................ 1059 A. Classified Documents ................................................................. 1059 1. Why an Espionage Act Prosecution Would Fail ................. 1061 2. Why an Espionage Act Prosecution Would Succeed ........... 1063 3. What to Make of the Debate ............................................. 1066 B. Retroactively Classified Documents ...............................................1067 1. Are the Threats of Prosecution Real? ................................. 1067 2. Source/Distributor Divide ...............................................
    [Show full text]