Vous êtes sur la page 1sur 1468

UNITED STATES OF AMERICA

V.

Prosecution Motion for Preliminary Ruling on Admissibility of Evidence (Business Records) Enclosure 2 22 June 2012

Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211

^jy
PROSECUTION E X H l B l T ^ f o r i ! * ^ *
PAGE ADt PAGE OFFERED PAGES PAGE OF

DECLARATION OF QUALIFIED PERSON CERTIFYING THE AUTHENTICITY OF DOMESTIC BUSINESS RECORDS I, Matthew Freeburg, the below-signed declarant, am employed by (Headquarters and Headquarters Company, 2d Brigade Combat Team, 10th Mountain Division (Light), Fort Drum, NY 13602) as Company Commander and in this position I am a qualified person authorized to declare and certify the attached documents in accordance with Military Rules of Evidence 803(6) and 902(11). This declaration is made in conjunction with (Headquarters and Headquarters Company, 2d Brigade Combat Team, 10th Mountain Division (Light) response to the request issued by SFC Monica Carlile, in the matter of United States v. PFC Bradley E. Manning.

As an authorized records custodian for (Headquarters and Headquarters Company, 2d Brigade Combat Team, 10th Mountain Division (Light), I certify that the following attached records are true and accurate copies of the originals: The original unit Soldier Management Individual File (SMIF) of PFC Bradley E. Manning, (b) (6), (b) (7) consisting of 144 pages.
(C)

The attached documents were made at or near the time of the occurrence of the events set forth by, or from information transmitted by, a person with knowledge of the events recorded. These records were kept in the course of the regularly conducted business activity of (Headquarters and Headquarters Company, 2d Brigade Combat Team, 10th Mountain Division (Light) and were created and maintained in the regular course of business by (Headquarters and Headquarters Company, 2d Brigade Combat Team, 10th Mountain Division (Light) as a regular practice.

I declare under penalty of perjury and pursuant to 28 U.S.C. 1746 that the foregoing information is true and correct. Executed as of the date below.

(Signature)
y ^ ^ ^
^

r
/./

(Printed Name)

2^^//
(Date)

CERTIFICATE OF AUTHENTICITY OF DOMESTIC BUSINESS RECORDS I, CPT Matthew Freeburg attest that I am employed by HHC/2BCT, 10MTN DIV (Ll), Fort Drum, NY, 13602, and that my official title is Company Commander. I am a custodian of records for HHC/2BCT, Fort Drum, NY, 13602. I certify that the attached records are the originals or true and accurate copies of the originals. I am the custodian of the attached records consisting of pages. I have provided the following: The original unit Soldier Management Individual File (SMIF) of PFC Bradley E. Manning, (b)
(b) (6), (b) (7) (C) (6)

Furthermore, the attached documents were made by, or from, information transmitted by a person with knowledge of the events recorded, were made at or near the time of the events recorded. We create and maintain these documents in the regular course of business as a regular practice.

This certification is intended to satisfy Military Rule of Evidence 902(11).

>

(Signature) Matthew Freeburg (Printed Name) 19 January 2011 (Date)

X^'/yg,

x^.

/ ? /hf^^ /^.y
(Address)
(b) (6), (b) (7)(C)

(Phone)

1
NAME: Manning, Bradley Edward SSN:(b) (6), (b)

(7)(C)
STATEMENT FOR ENLISTMENT UNITED STATES ARMY ENLISTMENT PROGRAM For use of this form, see AR 601-210: the proponent agency is ODCSPER (For instructions using this form see USAREC Reg 601-96) DATA REQUIRED BY THE PRIVACY ACT OF 1974 AUTHORITY: PRINCIPAL PURPOSE: ROUTINE USES: Title 10, United States Code. Section 275 Executive Order 9397. Basic form used to record contractual obligations to enlistees. Guarantees and annexes enlistment contract. This form becomes a part of the Enlisted Master File and Field Personnel File. All uses of this form are internal to the United States Army. Disclosure of the Social Security Number: (SSN) and other personal information is voluntary. However failure to provide the required information may result in denial of enlistment or reenlistment.

DISCLOSURE:

ACKNOWLEDGMENT: In connection with my enlistment in the Regular Army. I hereby acknowledge that: a. 1 am enlisting for the following program (s): PROGRAM 9A 9C TITLE United States ARMY Training Enlistment Program(lJNCM) United States ARMY Incentive Enlistment Program(US ARMY CASH BONUS, 4 YR ENL, US ARMY SEASONAL BONUS (HIGH PRIORITY SEAT), I-IIIA) REQUEST OPTION 03 174, 270

b. My enlistment for this program assures me that, provided I meet required prerequisites, I will receive training in the following Military Occupational Specialty (MOS) or Career Management Field (CMF)

MOS: 35F Intelligence Analyst Skill Level: 1 SQI: O NO SPECIAL QUALIFICATIONS ASI: 00 DEFAULT CODE Language: YY NONE c. I understand that the assignment location for which I have enlisted is subject to change if either my spouse or dependent child (ren) are enrolled in the Exceptional Family Member Program (EFMP) for medical reasons, meaning that one or more of my family members require medical treatment that may not be available at all military medical treatment facilities (MTF). I further understand that i f my original assignment option is changed due to that installation's MTF not being able to provide the proper care for my family member(s), 1 will be assigned to another installation where proper medical care is available, based on the Army's need for a Soldier of my military occupational specialty and rank at that installation. 1 understand that i f 1 have not enlisted for a guaranteed assignment and either my spouse or dependent child(ren) are enrolled in the EFMP, my

2007100209:33

DA form 3286, April 2005 (Annex B)

Page

1 of

#
USMEPCOM SERVICE LIAISON VERIFICATION PACKET REGULAR ARMY/RIGHT SIDE
(For use of ttils form, see USMEPCOM Reg 601-23)

#
FOR OFFICIAL USE ONLY
Pags 1 of 2 Pages

SUB-PACKET NUMBER
cy cy. cy

DOCUMENTS
DA Form 32B6-series (Statement for Enlistment) and similar statements (DD Forni 4 annex) (note 2j (GCR Dynamic Annex) DA Form 4789 (Statement of Entitlement to Selective Reenlistment Bonus) USAREC Form 1127 (Statement of Enlistment (or Appointment) Anny Policy) USAREC Form 1037 (Probation Officer and/or Court Records Check) DA Form 3283-R (Statement of IVtember Removal from Temporary Disability Retired List)(DD Form 4 Annex)(note 2)** REQUEST printout USAREC Form 1232 (Loan Repayment Counseling) Request for Waiver (note 2)* USAREC Form 1104 (Enlist Eligibility Questionnaire)(note 2) DA Form 2-1 (Personnel Qualification Record)(note 2)" DA Form 2A (Personnel Qualification Record(computer printout)(note 2)* DA Form 61 (Application for Appointment)(note 2)** DA Form 705 (Army Physical Fitness Test Scorecard)(note 2*" DA Form 5585-R (Wan^nt Officer Flight Training) DA Form 55B6-R (Officer Candidate School) DA Form 873 (Certificate ot Security Clearance)(note 2)" USARbC Form 122/ (Security Clearance Questionnaire) UA l-orm 418/ (Personnel Action (KA Enlistment Delay tor AppL, with existing tVIUS)) (note 2)"' DA Form 33U (Language Ifroticiency Questionnaire)" DA Form 4886 (Issue In-Kjnd Personnel Clothing Kecord)(note 2)" Authorized miscellaneous personal documents used to venty requirements tor dependency, Birth certificate, citizenship, etc (note2) Grade determinatioti documents (note 2) SSN documentation (note 2) USAREC FL 1034 (DEP Status Change Request) and/or USAREC Ft, 1035 (Request to Change AD [Enlistment Option)(note 2)** BINS Verification Document(s)
cy NA

cy cy

NA

NA cy cy O/cy cy ey O/cy

cy NA NA NA NA cy

cy
cy cy cy O/cy cy NA NA cy

cy

NA

NOTE: Place a chock mark in the block to the left .qf thadocuments for documents that are required and included. Place an "NA" In the block to the left of the documents for documents that are not required. Place an "NP" ip.th^btock to the left of the documents for documents that are not provided. Inclusion/Sequence of Checklist Verified fied By

V"7cv^ M^J^
^
Printed Name of Service Rep

MONTGOMERY G l B I L L ACT OF 1984 (MGIB) (Chapter 30, Title 38. U.S. Code) BASIC ENROLLMENT PRIVACY ACT STATEMENT AUTHORITY: Chapter 30, Title 38, U.S. Code, Sections 3011, 3012, 3018A, and 3018B; and EO 9397. PRINCIPAL PURPOSE(S): To document the understanding of members about their eligibility or lack of eligibility for benefits under the Montgomery Gl Bill Act of 1984 (MGIB) and document a member's election to decline enrollment for benefits under the MGIB. ROUTINE USE(S): To the Department of Veterans' Affairs to ascertain an individual's eligibility to claim benefits under the MGIB. DISCLOSURE: Voluntary; however, failure to provide the requested information will result in the individual being automatically enrolled in the MGIB program. 1. SERVICE MEMBER DATA a. NAME (LAST First, Middle Initial) Manning, Bradley Edward b. SOCIAL SECURITY NUMBER (SSN)

(b) (6), (b) (7)(C)

2. STATEMENT OF UNDERSTANDING FOR INELIGIBLE MEMBERS I am NOT eligible for the MGIB because (a) I am a service academy graduate, or (b) I am an ROTC scholarship graduate who received more than the current minimum amount allowed for enrollment in MGIB, or (c) I am a prior service member who disenrolled during my previous term of active duty. a. SERVICE MEMBER SIGNATURE b. RANK/GRADE c. DATE SIGNED(TTyyA/jWDD)

3. STATEMENT OF UNDERSTANDING FOR ALL ELIGIBLE MEMBERS 1. I am automatically enrolled unless 1 exercise the option to DISENROLL by signing Item 5 below. 2. I understand that UNLESS I DISENROLL from the MGIB my basic pay will be reduced $100 per month or the current monthly rate until $1200 has been deducted; this basic pay reduction CANNOT be REFUNDED, SUSPENDED OR STOPPED this is an IRREVOCABLE DECISION. 3. I must complete 36 months of active duty service (24 months if my enlistment is for less than 36 months) before I am entitled to the current rate of monthly benefits. The MGIB provides benefits for a period of 36 months. 4. I understand 1 am eligible for an increased monthly benefit by contributing an additional amount, not to exceed $600 while on active duty. Once I separate, I cannot contribute.

5 Imust receive an HONORABLE discharge for service establishing entitlement to the MGIB. This DOES NOT include'under honorable conditions'. 6. Imust complete the requirements ofasecondary school diploma or equivalency certification,or successfully complete the equivalent ofl2semester hours inaprogram of education leading toastandard college degree before applying for benefits with the Department ofVeterans'Aflairs 7. IhavelOyears from date oflast discharge from active tluty to use MGIB benefits. 8. I f l d i e while on active duty, or within one year after discharge or release from active duty if service related,my designated beneficiary(ies)will receive the unused balance ofthe money reduced from my basic pay for the MGIB.This death benefit will be paid by the Department ofVeterans'Affairs (DVA). 9. Icannot receive any combination ofDVAeducational benefits in excess of 48 months. 10. Imust complete at least ^4 months ofa3year active duty service obligation and if my obligation is2yearslmay join and serve honorably in the Selected Reserve foraminimumof 48 months to qualify for the current active duty benefit rate.A(one)period of service CANNOT qualify me for both active and reserve MGIB benefits.

a. SERVICE MEMBER SIGNATURE

b. RANK/GRADE EOl

c. DATE SIGNEDfTTyTMMDD) 20070926

4. SERVICE UNIQUE EDUCATION ASSISTANCE OPTIONS Term of Enlistment: 4 Years, 00 Weeks, MOS: 35F

5. STATEMENT OF DISENROLLMENT I DO NOT desire to participate in MGIB. I understand the benefits of the MGIB program and that I W I L L NOTbe able to enroll at a later date. a. DATE SIGNED (YYYYMMDD) b. RANK/GRADE c. SERVICE MEMBER SIGNATURE

6. CERTIFYING OFFICIAL

a. TYPED OR PRINTED J^AME(LAST, First, Middle Initial) Jones , Mark A

b. RANK/GRADE

c. SIGNATURE

d. DATE SIGNED (YYYYMMDD) 20070926

DD FORM 2366, JUN 2002

PREVIOUS EDITION IS OBSOLETE.

#
MONTGOMERY G l B I L L ACT OF 1984 (MGIB) ("CA^g^kr JO. 7{//e 3& [/. Coc/e)

BASIC ENROLLMENT PRIVACY ACT STATEMENT AUTHORITY: Chapter 30, Title 38, U.S. Code, Sections 3011, 3012, 3018A, and 3018B; and EO 9397. PRINCIPAL PURPOSE(S): To document the understanding of members about their eligibility or lack of eligibility for benefits under the Montgomery Gl Bill Act of 1984 (MGIB) and document a member's election to decline enrollment for benefits under the MGIB. ROUTINE USE(S): To the Department of Veterans' Affairs to ascertain an individual's eligibility to claim benefits under the MGIB. DISCLOSURE: Voluntary; however, failure to provide the requested information will result in the individual being automatically enrolled in the MGIB program. 1. SERVICE MEMBER DATA a. ISlAMI. (LAST First, Middle Initial) Manning, Bradley Edward b. SOCIAL SECURITY NUMBER (SSN)

(b) (6), (b) (7)(C)

2. STATEMENT OF UNDERSTANDING FOR INELIGIBLE MEMBERS I am NOT eligible for the MGIB because (a) I am a service academy graduate, or (b) I am an ROTC scholarship graduate who received more than the current minimum amount allowed for enrollment in MGIB, or (c) I am a prior service member who disenrolled during my previous term of active duty. .: i. . ; ; : ! . . a. SERVICE MEMBER SIGNATURE b. RANK/GRADE c. DATE SIGNED (T7}TMWDD)

3. STATEMENT OF UNDERSTANDING FOR A L L ELIGIBLE MEMBERS 1. I am automatically enrolled unless I exercise the option to DISENROLL by signing Item 5 below. 2. I understand that UNLESS I DISENROLL from the MGIB my basic pay will be reduced $100 per month or the current monthly rate until $1200 has been deducted; this basic pay reduction CANNOT be REFUNDED, SUSPENDED OR STOPPED this is an IRREVOCABLE DECISION. 3. I must complete 36 months of active duty service (24 months i f my enlistment is for less than 36 months) before I am entitled to the current rate of monthly benefits. The MGIB provides benefits for a period of 36 months. 4. I understand I am eligible for an increased monthly benefit by contributing an additional amount, not to exceed $600 while on active duty. Once I separate, I cannot contribute.

^
5. Imust receive an HONORABLE discharge for service establishing entitlement to the MGIB This DOES NOT include'under honorable conditions' 6 Imust complete the requirements ofasecondary school diploma or equivalency certification,or successfttlly complete the equivalentofl2semester hours inaprogram of education leading toastandard college degree before applying for benefits with the Department ofVeterans'Affairs 7. IhavelOyears from date oflast discharge from active duty to use MGIB benefits. 8. I f l d i e while on active duty, or within one year after discharge or release from active duty if service related, my designated benefictary(ies)will receive the unused balance of the money reduced from my basic pay for the MGIB.This death benefit will be paid by the Department ofVeterans'Affairs (DVA). 9. Icannot receive any combination ofDVAeducational benefits in excess of 48 n^onths. 10. Imust complete at least 24 months ofa3year active duty service obligation and if my obligation is2yearslt^ay join and serve honorably in the Selected Reserve foraminimumof 48 rt^onths to qualify for the current active duty benefit rate.A(one)period of service CANNOT qualify me forboth active and reserveMGIB benefits.

a. SERVICE MEMBER SIGNATURE

b. RANK/GRADE EOl

c. DATE SIGNED ( m T M M D D ) 20070926

4. SERVICE UNIQUE EDUCATION ASSISTANCE OPTIONS Term of Enlistment: 4 Years, 00 Weeks, MOS: 35F

5. STATEMENT OF DISENROLLMENT I DO NOT desire to participate in MGIB. I understand the benefits of the MGIB program and that I W I L L NOTbe able to enroll at a later date. a. DATE SIGNED (YYYYMMDD) b. RANK/GRADE c. SERVICE MEMBER SIGNATURE

6. CERTIFYING OFFICIAL

# c. SIGNATURE d. DATE SIGNED (yyyyMMDD) 20070926

a. TYPED OR PRINTED NAME (LAST, First, Middle Initial) Jones , Mark A

b. RANK/GRADE

DD FORM 2366, JUN 2002

PREVIOUS EDITION IS OBSOLETE.

#
MONTGOMERY G l B I L L ACT OF 1984 (MGIB) (CAqp/er 30. 7;//e j & (7.:^. Code) BASIC ENROLLMENT PRIVACY ACT STATEMENT AUTHORITY: Chapter 30, Title 38, U.S. Code, Sections 3011, 3012, 3018A, and 3018B; and EO 9397. PRINCIPAL PURPOSE(S): To document the understanding of members about their eligibility or lack of eligibility for benefits under the Montgomery Gl Bill Act of 1984 (MGIB) and document a member's election to decline enrollment for benefits under the MGIB. ROUTINE USE(S): To the Department of Veterans' Affairs to ascertain an individual's eligibility to claim benefits under the MGIB. DISCLOSURE: Voluntary; however, failure to provide the requested information will result in the individual being automatically enrolled in the MGIB program. 1. SERVICE MEMBER DATA a. NAME (1^57; First, Middle Initial) Manning, Bradley Edward b. SOCIAL SECURITY NUMBER (SSN)

(b) (6), (b) (7)(C)

2. STATEMENT OF UNDERSTANDING FOR INELIGIBLE MEMBERS I am NOT eligible for the MGIB because (a) I am a service academy graduate, or (b) I am an ROTC scholarship graduate who received more than the current minimum amount allowed for enrollment in MGIB, or (c) I am a prior service member who disenrolled during my previous term of active duty. ;;. a. SERVICE MEMBER SIGNATURE b. RANK/GRADE c. DATE SIGNED (YYYYMMDD)

3. STATEMENT OF UNDERSTANDING FOR ALL ELIGIBLE MEMBERS 1. I am automatically enrolled unless I exercise the option to DISENROLL by signing Item 5 below. 2. I understand that UNLESS I DISENROLL from the MGIB my basic pay will be reduced $100 per month or the current monthly rate until $1200 has been deducted; this basic pay reduction CANNOT be REFUNDED, SUSPENDED OR STOPPED this is an IRREVOCABLE DECISION. 3. I must complete 36 months of active duty service (24 months i f my enlistment is for less than 36 months) before I am entitled to the current rate of monthly benefits. The MGIB provides benefits for a period of 36 months. 4. I understand I am eligible for an increased monthly benefit by contributing an additional amount, not to exceed $600 while on active duty. Once I separate, I cannot contribute.

B
5. Imust receive an HONORABLE discharge for service establishing entitlement to the MGIB This DOES NOT include'under honorable conditions' 6 Imust complete the requirements ofasecondary school diploma or equivalency certification, or successfully complete the equivalent ofl2semester hours inaprogram of education leading toastandard college degree before applying for benefits with the Department ofVeterans'Affairs. 7 IhavelOyearsfi^om date oflast discharge from active duty to use MGIB benefits 8. I f l d i e while on active duty, orwithin one year after discharge or release from active duty if service related, my designated beneficiary(ies)will receive the unused balance of the money reduced from my basic pay for theMGIB.This death benefit will be paid by the Department ofVeterans'Affairs (DVA). 9. Icannot receive any combination ofDVAeducational benefits in excess of 48 months 10 Imustcompleteatleast24monthsofa3yearactivedutyserviceobligationandifmyobligationis2yearslmayjoinandserve honorably in the Selected Reserve foraminimumof 48 months to qualify for the current active duty benefit rate.A(one)period of service CANNOT qualify me for both active and reserve MGIB benefits.

a. SERVICE MEMBER SIGNATURE

b. RANK/GRADE EOl

c. DATE SIGNED (TTyyMMDD) 20070926

4. SERVICE UNIQUE EDUCATION ASSISTANCE OPTIONS Term of Enlistment: 4 Years, 00 Weeks, MOS: 35F

5. STATEMENT OF DISENROLLMENT I DO NOT desire to participate in MGIB. I understand the benefits of the MGIB program and that I W I L L NOTbe able to enroll at a later date. a. DATE SIGNED (YYYYMMDD) b. RANK/GRADE c. SERVICE MEMBER SIGNATURE

6. CERTIFYING OFFICIAL

# a. TYPED OR PRINTED NAME (LAST First, Middle Initial) Jones , Mark A b. RANK/GRADE c. SIGNATURE

# d. DATE SIGNED (yyyyMMDZ)) 20070926

DD FORM 2366, JUN 2002

PREVIOUS EDITION IS OBSOLETE.

.,;.W'<'.i'ift.;^-A>s:---v.:?.''

USMEPCOM ACCESSIOIFVERIFICATIQN PACKET REGULAR ARMY/LEFTSIDE


(For use, see USMEPCOM Reg 601-23) DOCUMENTS Orders and any amendments DD Form 2808 (Report of Medical Examination) with waiver documents, if applicable, and all Medical supporting documents from consults etc.. DD Form 2807-1 (Report of Medical History) Audiogram USMEPCOM Form 40-1-2-R-E (Report of Medical Examination/Treatment) DD Form'2807-2 (Medical Prescreen of Medical History) ,. . 1 1, USMEPCOM Form 40-8-1-R-E (HlV Antibody Testing Acknowledgment) DD Form 2005 (Privacy Act Statement-Health Care) DD Form 1966-serles (Record of Military Processing-Armed Forces ofthe United 1 | | | 1 | 1 ' 1 j | 1

i^i^i

FOR OFFICIAL USE ONLY Page 1 of 2 Pages SUB-PACKET NUMBER

1
O/cy
0

1
1

2
7cy
cy cy

1
1

0
O/cy
0

1
1
1

N A N A N A
NA NA

'. 1 1 1

O/cy
O/cy
cy cy

.
1 i 1 1 1 1
1

States)
DD Form 4-series (Enlistment/Reenlistment Document-Armed Forces of the United States) USMEPCOM PCN 680-3ADP (See para. 8-8 if not available) SF 86 (Questionnaire for National Security Positions) or EPSQ printout version and SF 86A (Continuation Sheet for Questionnaires SF 86, SF 85P, and SF 85) ENTNAC Results/DlS Form 1 (Report Of National Agency Check) (manual
ENTNAC/NAC)

0
0
NA cy

1
1

0
cy
0

NA

1 1 I' . 1 .1 1 I, 1 1' 1 1 1 1

USMEPCOM Form 601-23-5-R-E (Introductory Pre-accession interview) note 3 USMEPCOM Fortri 601-23-4-E (Restrictions on Personal Conduct in the Armed Forces) USMEPCOM Form 40-8-R-E (Drug and Alcohol Testing Acknowledgment) DD Forrn 214 (Certificate of Release or Discharge from Active Duty), or NGB Form 22 (Report of Separation), DD Form 215, (Con-eclion to DD Form 214) and/or DD Form 220 (AD Rpt), REDD Report, discharge certificate or similar document)** DD Form 358 (Request for Conditional Release)** DD Form 369 (Police Record Check)** DD Form 372 (Request for Verification of Birth)** DQD Form 1304.12-K (ASVAB Scoring Worksheet)** DD Form 2366 (Montgomery Gl Bill (MGIB) Act of 1984) SF 1199A (Direct Deposit Program Form) DD Form 93 (Record of Emergency Data)

cy
0

c y
cy

1
j

1 O/cy

N A

1 c y
0

1
1 1 1
1
NA

1
1 1 1
1

cy
0

1
1

3cy
O

N A 0
NA

O/cy

N A

1 NOTE: Place a check mark in the block to the left ofthe documents for documents that are required and included. 1 Place an "NA" in the block to the left of the documents for documents that are not required. 1 Place an "NP" in the block to the left of the documents for documents that are not provided. 1. The Inclusion/Sequence of Checklist Verified By

1 USMEPCOM Rep Signature

Printed Name of USMEPCOM Rep

RSONAL iN NATURE

ROSTER:07275

SUB ROSTER: 8 1

LINE NO: 010

# SSN(b) (6), (b) (7) (C)

jrsday, October 4, 2007 @ 10:21 , ,M (R) Page 1 of 1

NAME: MANNING BRADLEY EDWARD PAYGRADE/CODE DATE OF RANK BASD EDUCATION SERVICE COMP BLOOD GROUPATYPE SEX MENTAL CATEGORY RACE DRIVERS LICENSE ELIGiOUS CODE/PREF E01 1 20071002 20071002 E R O M B C Y 62 P RANK: PV1 BPED: 20071002 ETS: 20111001 MOS: 35F0O DATE OFBIRTH: 19871217 MARITAL STAT/NO DEP: CITIZENSHIP: TYPE COMMITMENT: PHYSICAL CAT/PROFILE: S 0 A UNCM B 111121

ETHNIC: X HEIGHT: 62 WEIGHT: 101 EYES: B Gl BILUAFC CODE: 05 PRIOR SERVICE/YEARS: EAD DATE: 20071002 TERM OF SERVICE MONTHS: 48 MEPS CODE: A02 HIVDATE: 20070831 CONUS PREF: 06 OCONUS2 PREF: OA ASSIGNMENT CONSID:

HAIR BONUS ENLISTMENT MATH/SCIENCE DATE OF ARRIVAL TERM OF SERVICE MEP STATION PHASE RLANGID 0C0NUS1 PREF 0C0NUS3 PREF

B 9 1 20071002 4 BALTIMORE MD

OE OF

RECRUITOR SSN/NAME: (b) (6), (b) BOYLE AFQT: 00 (7)(C) GT: 123 GM: 128 EL: 127 C L 126 MM: 121 SC: 128 CO: 128 FA: 128 OF; 126 ST: 128 ENTNAC: SUBMISSION CODE/DATE: F 20070926 RESULT DATE:

HOR CURRENT LEGAL BIRTH

(b) (6), (b) (7)(C) ADDRESS ADDRESS ADDRESS ADDRESS OKLAHOMA CITY OK US

Print All Letters

^
$
APPLICANT COPY

Page 1 of 3

CONGRATULATIONS! A SUCCESSFUL RESERVATION WAS COMPLETED FOR


NAME: MANNING BRADLEY EDWARD JOB:35F1O00YY TERM: 4 YEARS 0 WEEKS OPTION: 3 ASSOC. OPTION: ASSOC. OPTION: TITLE: US ARMY TRAINING OF CHOICE 174 TITLE: US ARMY CASH BONUS, 4 YR ENL .^.-ric US ARMY SEASONAL BONUS (HIGH 270 TITLE: ppji^pj,.^ SEAT). I-IIIA TOTAL BONUS AMOUNT: 24000 SSN: XXXXX(b) %LYs7"-'-"'''"'^

(6), (b) (7) (C)

FIRST UNIT OF ASSIGNMENT: UNCM EXPECTED ARRIVAL DATE: DEP SWEAR-IN DATE:

REPORT TO THE MEPS FOR TRANSPORTATION TO YOUR TRAINING LOCATION ON 20071002. WHILE SPECIFIC TRAINING LOCATIONS ARE NOT GUARANTEED. YOU ARE TENTATIVELY SCHEDULED TO RECEIVE THE FOLLOWING TRAINING: TYPE BT ,^ ,AIT , LOCATION LWOOD HUACHUCA START DATE 20071026 20080122 ; . ' LENGTH WKS 12 -.16 , LENGTH DAYS 0 . ,. . 3 ; : , -

r TOTAL TRAINING LENGTH is 28 WEEKS AND 3 DAYS.

' IN ORDER FOR YOUR RESERVATION TO REMAIN VALID. YOU MUST REMAIN MORALLY AND PHYSICALLY QUALIFIED FOR ENLISTMENT. - PLEASE REPORT ANY CHANGES THAT AFFECT YOUR STATUS TO YOUR RECRUITER IMMEDIATELY. ^ ^ :f /

PERMANENT RESERVATION DATE; 20070926 Job Quals Reservation Report Letter Print All

'

time \

T^^JhJi
Coir^cy^^d ^ ^ ^ ^

T ca^J y / D.rf^/^ /O^y^r./^/^


J^hJD

/ /3?
/ ^ / ^ ^ /

^Ao^/^^^"^

https://dragoon.green.keystone.army.mil/http/dragoonl.green.keystone.amiy.mil/wrstage/P... 9/26/2007

Print All Letters


#

Page 2 of3

RA Applicant Data Report


Applicant SSN: XXXX(b) MEPS: A02 Name: MANNING BRADLEY EDWARD Report Date: 20070926

(6),
City: POTOMAC Gender: M Child Dependents: 0 Math: 4 GENERAL MATH Typing Words Per iMinute: Color Vision Test: N NORMAL COLOR VISION BT Completion Indicator: N STARR: N State: MD Race: C Zip: 208540000 Country: US

(b) Applicant Information


Address: (b)

(7) (6), (b)(C) (7)(C) Phone: (b) (6) DOB: 19871217


Citizenship Status: C Ethnic Code: Y NONE Driver's License Expiration: 20090215 Education Years: 12 Typing Certificate: Physical Profile: 111121 Status Obligator: Recruiting Program(s):

Citizenship: A NATIVE BORN

A PERSON WHO IS A CITIZEN OF THE UNITED STATES BY BIRTH OR NATURALIZATION Adult Dependents: Science: 4 GENERAL SCIENCE Grade: 1 Height: 62.0 MPC: E Weight: 101.0 DOS:0 Source of Commission:

Education Code: L HIGH SCHOOL DIPLOMA

Advanced Rank Reason: Physical Examination Date: Physical Examination Type: EN ENLISTMENT 20070831 Additional Physical Examination Additional Physical Examination Type: Date: GT: 123 GM: 128 EL: 127 CL: 126 MM: 121 ASVAB Scores: Predicted ASVAB Scores: GT: ASVAB Administration Date: Miscellaneous Scores: AFQT Score: 89 DLPT Score: Language Method Score Predicted AFQT: AIM Score: 0 AIM Date: Level Date SWPT Score: GM: EL: CL: MM: Language Scores:

APFT Date:

APFT Result:

SC: 128 SC:

CO: 128 CO:

FA: 128 FA:

OF: 126 OF:

ST: 128 ST:

SWPT Date:

AO Score

AO Date:

f' Level Date

Reading Method Score

Listening . Leivel Date

Speaking' Method Score :.

Held Skills Enlistment Category and Reservation


Status: R Enlist Date: 20071002 RECSTA Date: 20071022 Training Location: HUACHUCA DEP Verification Date: Pre-Training Date: Training Type: S Assignment Arrival Date: PaYS Position ID: Term: 48

Information
Reservation Type: E Training Type: S CAS: B BT Location: LWOOD Ship Date: 20071002 Out Month: 20080516 Enlist Job: 35F1O00YY UlC: ETS Date: 20111001 Perm. Reserv. Date: 20070926 ESL Weeks: 0

Enlistment Category: NPS RECSTA Location: LWOOD BAT Start Date: Ship Verification Date: Pre Training Location: Enlist CMF: 35 Reno Quantity: 0

Overrides
Policy Override: N TOS Override: N Remarks: gma WANTS 35f (me) FSR2S Override: N DEP Override: O Bat Required Override: N Accession Override: O Incentive Override: N

Incentive
Incentive: 174 Incentive: 270

Information
Amt: 4000 Amt: 20000

Credit

Information
Recruiting Station ID: 1B1A OfRce Code: 1B02 Back

Recruiter SSN: XXXXX(b)

Guidance Counselor SSN: (6),XXXXX(b)

(b) (7) (C)

(6), (b) (7) (C)

https://dragoon.green.keystone.amiy.mi1/http/dragoonl.green.keystone.army.mil/wrstage/P...

9/26/2007

Print All Letters

Page 3 of 3

JOB QUALS INFORMATION FOR


NAME: MANNING BRADLEY EDWARD SSN: XXXXX(b) JOB: 35F1O00YY INTELLIGENCE ANALYST

(6)
REMARKS: CRS LGTH 16WKS/3DS /ACASP. Intelligence analysts must possess the following qualifications: (1) A physical demands rating of heavy. (2) A physical profile of 222221. (3) Normal color vision. (4) Qualifying scores, c) A minimum score of 101 in aptitude area ST on ASVAB tests administered on and after 1 July 2004. (5) The Soldier must meet TS SCI access eligibility requirements to be awarded this MOS. For training (if required) an interim TS with SCI access granted from the CCF meets this requirement. (6) A high school graduate or equivalent prior to entry into active duty.

QUALIFICATION POLICIES: PHYS_PRFL_CMPST_CD >= 222221 AND ST_SCORE >= 101 AND CLR_VSN_TST_RSL_CD >= N AND CTZSP_ORIG_CD >= D AND CIV_ED_DSG_CD >= 9 AFQT_PCTL_NR >= 1 AFQT_PCTL_NR >= 1 AFQT_PCTL_NR >= 1

https://dragoon.green.keystone.army.mi1/http/dragoonl.green.keystone.army.mil/wrstage/P...

9/26/2007

* * * USMEPCOM PCN 6 8 ( ^ D P * * * PROCESSEE/ENLISTEE HCORD * * * PRIVACY A CT PL93-579 APPLIES * * *


7"
SSN

DAa^&)07-10-02 Tlim^013 MEPS: A02 DMDC: N ENTNAC:S DRUG: R

SSN:

(b) (6)
D A 0 B

(b) (6), (b) NAME (Last, (7)(C)


< Z MANNING BRADLEY EDWARD TYPE B CTZN CA > o i FLAG -'! Y

SPF DAR First, Middle, Suffix)

PMS:N SSN: R

DAYS: 0000 ARN: HIV: R

T
PROJ FOR: WKID RPTD:

P V

M P 7 7

V-

SSC: SS#:

o (0 cc O

P-MEPS:A02 j L-TRANS: B001B L-DOA: 2007-10-02 RID: 6 PROCESSING DATE P-SSN: X USER: TINSLEY L-SYNC: 20071002/083432 LA. Jsl P-LNAME; STREET, CITY, COUNTY, STATE, COUNTRY, ZIP CODE

>-

X X

(b) (6)
COC SEX M RACIAL ETHNIC MARITAL F D S #DEP 0 DOB 1987-12-17 REL 62 EDUC 12L F LANGUAGE 1 2

ARN A ST MD

NONE

M552098189857

EXP DATE 2009-02-15

CITY, STATE, COUNTRY OKLAHOMA CITY OK US

tn

o
C5 Z H (A

CURRENT MEDICAL INSURER NAME NONE MEDICAL INSURER ADDRESS (Street, City, State, Country,) ZIP Code)

v;CURRENT MEDICAL PROVIDER NAME


W & .

(b) (6), (b) (7)(C)

RECRUITER ID/SSN-STATION ID / 1B1A

NONE MEDICAL PROVIDER ADDRESS (Street, City, State, Country,) ZIP Code)

4^

AFQT TiD DOT ST M-SiTE 89 02E 2007-08-30 P 021992

y
u

TYPE SCORE

DOT

GS 69

AR 62

WK 62

PC 53

MK 63

Ei 70

AS 48

MC 66

AO 52

VE 59

g
U]

COMPOSITES: GT CL CO EL FA GM MM OF SC ST 123 126 128 127 128 128 121 126 128 128 ELIGIBLE DATE: 2007-09-30 SPECIMEN DOT 02167796 2007-08-31 RSLT 5B RSLT DATE 2007 09-05

ADMINISTRATOR: 000009150 , SF88: RBJ: PRESCREEN: ELiGiBiLiTY: 62. 101 BLOND 121/079 EQP: N ^ PiP: P FLNT: X AFVT: X

A_

MANUAL - AUTHORIZATION: INSP: 2007-10-02 Y PHYSICAL: 2007-08 31 V~

<

X-RAY: NXT HOT: WGT: FAT: HAIR: BP:

RIG: X

O Q

AUDIO: 05 RIGHT: 05 LEFT: 05


(E) P 1 U 1

10 20 30 40 60 05 00 00 00 00 05 10 00 00 20
H 1 E 2 S 1 X E Ol OI 02167796 2007-08-31 NNN NNN 2007 09-05

DISTANT NEAR R: 020/020 020/020 L: 020/020 020/020

EYES: BLUE/BLUE FAIL: , iCDCODE:

2007-08-31

^REFRAC: M

WVR: N

CNSLT: Y

HCG: M

DOE PADD ES RECRUITER STNiD 3 111119968 1B1A 2007-09-26 2007-10-02 PAY GRADE: EOl SERVICE ANNEX CODES: A Q. UJ O

PEF T-E MOS/AFS CACTB 35F1 MSG: 0800

WAIVER CODE YYY AD OBLIGATION: 0400

DATE

ySERVICE
REQUIRED CODES:

1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8 9 40

< REASON
SPF

1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2 3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 00 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8 9 40
4 6 9 7 4 DOE 2007-10-02 PAY GRADE EOl YOUTH OA YYO YY 3060 ADSD PED MSO WAIVER CODE AD/RC OBLIGATION 2007-10-02 2007-10-02 0800 04/00 YYY STNID PEF T-E MOS/AFS PMOS/AFS DOG ES EDUC RECRUITER 2007-10-02 1 12L 100000000 00000 CACTB 35F10 35F10 REPLACES ANNEXES UiC 368/214 STATE GUARD SERVICE ANNEX CODES B A W0V3LK N

DATE

< -<
REASON X

C3 C C

o
C O

SPF

C O C O UJ

< DATE

Q. UJ O

o o <

SERVICE REQUIRED CODES: REASON

SPF

680-3ADP

PAGE 1 of 2

INFO

%
DATE SUB 2007-08-30 RSLT R CASE # DATE RCVD 2007 09-04 FOREIGN BORN A DATE CASE # RSLT DATE CLSD USCIS INFO DATE DEATH

DEATH SOURCE

DATE RCVD

o ^ u ^

D O C C

DATE SUB L-NAME: F-NAME:

DOB

POB-CTRY

STATUS CTZN WORK

TYPE NAME PATH DATE SUB CASE # DATE CASE # RSLT AGV DATE CLSD

A
TYPE

2007-09-26
APPLY TO

70696500
DATE INTVWD DATE CLRD REMARKS

REMARKS

REASON

2
u z < cc o
C O Q Q. UJ

o WORK HISTORY
WKID BOO I B TOOOl B070P TOOOl POOOP B006S S001C B006A B002A SOOOE B080P TOOOl POOOP TOOOO B080L TOOOl B080L POOOP BODOL B050L VOOOS TOOOO B020L TOOOl 81 OOP POOOP AOOOV DOA/TIME SYNC 20071002/101319 N 20071002/065515 Y 20071002/065512 Y 20071002/055642 Y 20070928/140514 Y 20070927/052154 Y 20070926/144549 Y 20070926/144324 Y 20070926/144252 Y 20070926/144132 Y 20070926/064434 Y 20070926/052554 Y 20070925/094043 Y 20070907/074246 Y 20070907/070012 Y 20070907/053406 Y 20070906/142347 Y 20070906/095023 Y 20070905/050926 Y 20070905/050926 Y 20070904/052044 Y 20070831/150453 Y 20070831/114329 Y 20070831/060711 Y 20070830/183557 Y 20070830/094008 Y 20070830/093943 Y MEPS OWN SPF USERNAME A02 DAR TINSLEY P A02 DAR LEGRAND P A02 DAR LEGRAND P A02 P DAR LEGRAND A02 DAR PROCTOR P A02 P DAR USMIRSDB A02 DAR JACKSON P A02 P DAR JACKSON A02 DAR JACKSON P A02 DAR JACKSON P A02 P DAR LEGRAND A02 P DAR KNAUB A02 DAR PROCTOR P A02 P DAR TINSLEY DAR NEVELEFF A02 P A02 P DAR KNAUB A02 DAR ABEGAZ P A02 DAR PROCTOR P A02 DAR USMIRSDB P A02 DAR USMIRSDB P A02 DAR USMIRSDB P DAR BRANNON A02 P A02 DAR POPE P DAR BEASLEY A02 P DAR WASHINGP A02 P A02 DAR PROCTOR P A02 DAR PROCTOR P WKID DOA/TiME SYNC MEPS OWN SPF USERNAME

"

DATE:

2007-10-02

(b) (6), (b) (7) (C)

TIME: 1 0 1 3

PAGE 2 Of 2

INFO DATE SUB DATE RCVD FOREIGN BORN A DATE CASE # RSLT DATE CLSD USCIS INFO DOB

DATE RCVD

RSLT R CASE #

DATE DEATH

DEATH SOURCE
POB-CTRY STATUS CTZN WORK

o z
D

2007-08-30 DATE SUB L-NAME: F-NAIVIE:

2007-09-04

<

cc (3 ^ O

TYPE NAME PATH DATE SUB CASE # DATE CASE # RSLT AGY DATE CLSD

C Q

A
TYPE

2007-09-26
APPLY TO

70696500
DATE INTVWD DATE CLRD REMARKS

REMARKS CA UJ

REASON

Q. LU C C

z <

o
C O Q

oWORK HISTORY
WKID BOO IB TOOOl B070P TOOOl POOOP BOOBS S001C B006A B002A SOOOE B080P TOOOl POOOP TOOOO B080L TOOOi B080L POOOP BODOL B050L VOOOS TOOOO B020L TOOOl B100P POOOP" AOOOV DOA/TIME SYNC MEPS OWN 20071002/101319 N A02 P 20071002/065515 Y A02 P 20071002/065512 Y A02 P 20071002/055642 Y A02 P 20070928/140514 Y A02 P 20070927/052154 Y A02 P 20070926/144549 Y A02 P 20070926/144324 Y A02 P 20070926/144252 Y A02 P 20070926/144132 Y A02 P 20070926/064434 Y A02 P 20070926/052554 Y A02 P 20070925/094043 Y A02 P A02 P 20070907/074246 Y 20070907/070012 Y A02 P 20070907/053406 Y A02 P A02 P 20070906/142347 Y A02 P 20070906/095023 Y A02 P 20070905/050926 Y A02 P 20070905/050926 Y 20070904/052044 Y A02 P A02 P 20070831/150453 Y 20070831/114329 Y A02 P 20070831/060711 Y A02 P 20070830/183557 Y A02 P 20070830/694008 Y A02 P 20070830/093943 Y A02 P SPF DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR DAR USERNAME TINSLEY LEGRAND LEGRAND LEGRAND PROCTOR USMIRSDB JACKSON JACKSON JACKSON JACKSON LEGRAND KNAUB PROCTOR TINSLEY NEVELEFF KNAUB ABEGAZ PROCTOR USMIRSDB USMIRSDB USMIRSDB BRANNON POPE BEASLEY WASHINGP PROCTOR PROCTOR WKID
1

DOA/TIME

SYNC MEPS OWN

SPF USERNAME

DATE: 2007-10-02

(b) (6), (b) (7) (C)

TIME: 1013

PAGE 2 of 2

NAME OF ENLISTEE/REENLISTEE (Last, Fin

T^^^die)'

SECURITY NO OF ENLISTEE/REENLISTEE

MANNING BRADLEY EDWARD

(b) (6), (b) (7) (C)

F. DISCHARGE FROM DELAYED ENTRY/ENLISTMENT PROGRAM 20a. I request to be discharged from the Delayed Entry/Enlistment Program (DEP) and enlisted in the Regular Component of the United States (list branch o f service) ARMY 0 for a period of ^ years and

w e e k s . No changes have been nnade t o my enlistment options OR if changes were made they are recorded on B

Annex(es)

w h i c h replace(s) Annex(es)

b. SIGNATUREQF DELAYED ENTRY/ENLISTMENT PROGRAM ENLISTEE

c. DATE SIGNED

(YYYYMMDD)

20071002

G. A P P R O V A L A N D ACCEPTANCE BY SERVICE REPRESENTATIVE 2 1 . SERVICE REPRESENTATIVE CERTIFICATION a. This enlistee is discharged from the Reserve Component shown in item 8 and is accepted for enlistment in the Regular Component of the United States (list branch of service) ARMY
b. NAME (Last, First, Middle) c. PAY GRADE E-8 f. DATE SIGNED (YYYYMMDD)

In pay grade
d. UNIT/COMMAND NAME USA RECRUITING B A T T A L I O N

E ^

BGYeEXALVIN N 3E^/
e/SIGNATlpE

g. UNIT/COMMAND ADDRESS (City, State, ZIP Code! FT G E O R G E G M E A D E MD 20755-0000

20071002

7Z

H. CONFIRMATION OF ENLISTMENT OR REENLISTMENT

22a. IN A REGULAR COMPONENT OF THE ARMED FORCES: BRADLEY EDWARD MANNING do solemnly swear (or affirm) that I will support and defend

the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same; and that I will obey the orders of the President of the United States and the orders of the officers appointed over me, according to regulations and the Uniform Code of Military Justice. So help me God.
c. DATE SIGNED (YYYYMMDD)

20071002 23. {Eftlkl^MENT OFFICER CERTIFICA1 a. The above oath was administered, subscribed, and duly sworn to (or affirmed) before me this date.
b. NAME (Last, First, Middle) THOMAS, MICHAEL D c. PAY GRADE d. UNIT/COMMAND NAME BALTIMORE MEPS g. UNIT/COMMAND ADDRESS (City, State, ZIP Code!

0-4
f. DATE SIGNED (YYYYMMDD)

20071002
(Initials of Enlistee/Reenlistee)/^
PREVIOUS EDITION IS OBSOLETE.

FORT GEORGE G MEADE MD 20755-2995

DD Form 4 / 3 , JUL 2 0 0 7

RECORD OF MILITARY P R O ( ^ S I N G - ARMED FORCES OF THE UNI


(Read Privacy Act Statement and Instructions on back before completing this form.)

STATES

OMB No.

0704-0173 expires

OMB approval Mar 31, 2010

The public reporting burden for this collection of information is estimated to average 20 minutes per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing trie burden, to Department of Defense. Executive Services Directorate (0704-0173). Respondents should be aware that notwithstanding any other provision of law. no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a cun-entiy valid OfulB control number.

PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ORGANIZATION. A. SERVICE B. PRIOR SERVICE: C. SELECTIVE SERVICE CLASSIFICATION D. SELECTIVE SERVICE REGISTRATION NO. PROCESSING FOR Y E S \ x \ NO

ID! A

N U M B E R OF D A Y S :

NONE

NONE

SECTION I - PERSONAL DATA


1. SOCIAL SECURITY NUMBER 2. NAME (Lasf, firsf. Middle Name (and Maiden, if any), Jr., Sr., etc.)

(b) (6)
3.

| - | (b) - | (b) (6) CURRENT A DDRESS (6)

iBracjley Edward Manning; AKA Manning, Bradley Ecjward


4. H O M E O F R E C O R D A D D R E S S CStreef, City. County. State. Country. ZIP Code) 1492 Selworthy Road, Potomac, MONTGOIvlERY, M D , 20854 USA

(Street. City. County. State. Country. ZIP Code) 1492 Selworthy R o a d , P o t o m a c , fvlONTGOIVIERY, MD, 20854 USA

CITIZENSHIP fXone)
a. U.S. AT B I R T H (If this b o x is m a r k e d , also X (1) or (2)) X (1) NATIVE B O R N (2) B O R N A B R O A D OF U.S PARENT(S) A L I E N R E G I S T R A T I O N NUIUIBER (If issued) (Specify) FOREIGN NATIONAL (Specify)

6. SEX

(Xone)

7.a. RACIAL

CATEGORY

(Xone

or

more)

a. M A L E b. FEMALE

(1) AMERICAN INDIAN/ ALASKA NATIVE (2) ASIAN (3) BLACK OR AFRICAN AMERICAN

(4) NATIVE HAWAIIAN OR OTHER PACIFIC


IRI A N O F R

7.b. ETHNIC CATEGORY


(1) HISPANIC OR LATINO (2) NOT HISPANIC OR LATINO

b. U.S. N A T U R A L I Z E D c. U.S. NON-CITIZEN NATIONAL d. IMMIGRANT ALIEN

(5) WHITE

8. MARITAL STATUS (Specify)

9. NUMBER OF DEPENDENTS

e. NON-IMMIGFVNT

NEVER MARRIED
12. EDUCATION
(Yrs/Highest Ed Gr Completed) 12/L 13. PROFICIENT IN FOREIGN LANGUAGE (If Yes. specify. If No. enter NONE.)

0
1st

10. DATE OF BIRTH


(YYYYMMDD)

11. RELIGIOUS PREFERENCE


(Optional)

2nd

YI Y

1 I 9 I 8 I 7 I 1 I 2 I 1 I 7 ROMAN CTHOLC 14. VALID DRIVER'S LICENSE (Xone) 0 YES


(If Yes, list State, number, and expiration date)

NONE

NO

15. PLACE OF BIRTH (City, State and Country) , Oklahoma City, OK USA

MD, M552098189857, 2009/02/15 SECTION II - EXAMINATION AND ENTRANCE DATA PROCESSING CODES
(FOR OFFICE USE ONLY - DO NOT WRITE IN THIS SECTION - Go on to Page 2, (Question 20.) 16. APTITUDE TEST RESULTS
a. TEST ID b. TEST SCORES AFQT PERCENTILE GS AR WK PC MK El

As 0

MC

1 AO

VE

2007/08/30 17. DEP ENLISTMENT DATA


a. DATE OF ENLISTMENT - DEP (YYYYMMDD)

0| 2 1 E

8 1 9 6 1 9 6 1 2 6 1 2 5| 3
C. E S

61 37

41 8

6 1 6 1 5 1 521 9 1
f. PEF

b. PROJ ACTIVE DUTY DATE (YYYYMMDD) (2)

d . RECRUITER IDENTIFICATION

e. S T N ID

2 I 0 I 0 I 7 I ol 9 I 2 I 6
g. T-E M O S / A F S h. W A I V E R I Y

2 I 0 I 0I 7I 1I 0I 0I 2
(3) (4)

3
(5)

C IAIC I T I B 1 I 1 I B I 1 lAI 9 I 9 I 6 I 8 1 I B I 1 I A I (B) j . SVC ANNEX CODES k. MSO(YYWW) I. AD OBLIGAiwr


GRADE

3I 5I F I 1

(1) I Y Y

18. ACCESSION DATA


b. ACTIVE DUTY SERVICE DATE 1 ryyyyw^ 2 | o | o | 7 | l | o | o | 2 | 2 | f. WAIVER (2) (3) o | o | 7 | l | o | o | : (4) (5) (6)

Eloh
c. PAY ENTRY DATE (YYYYMMDD)

Al

ol8 Iol 0 oUlol 0


e. A D / R C O B L I G A T I O N (YYMMWVUDD)

TION (YYWW)

d. MSO(YYWW)

"\

Y|

YIY
STN ID
m. PEF

2 | o | o | 7 | l | o | o | 2 | o | 8 | o | o h. DATE OF GRADE (YYYYMMDD) g . P A Y GRADE

0I4I0I 0 I
. ES j.YRSVHIGHESTED GRCOIVIPL

E 0I1 I
n. T-E MOS/AFS o. PMOS/AFS

1
p. YOUTH q. OA

II|2|L

k. R E C R U I T E R I D E N T I F I C A T I O N

1I 1IBI 1IA I9 9 I 6I8 I1B|I|A|


s. S V C A N N E X C O D E S t. REPLACES ANNEXES

C I A I C I T I B3 I 5 I F I 1 I 0 3 I 5 I F I 1
10 15

Y| Y| 0

N1 Y

u. T R A N S F E R TO (UIC)

Bl

I I I I

Al
26

I
V
27

II
J_ 1
29 28

|w ol vl LI 3 I K
21

19. SERVICE REQUIRED CODES


51 52 S3

0
31 61 32

_ D _ B _ H
33 34 37 39

A
71 100 101 131 102 132 105

A
76

87 116

136

DD FORM 1966/1, MAR 2007

PREVIOUS EDITION IS OBSOLETE.

PRIVACY ACT STATEMENT AUTHORITY: Title 10 USC Sections 504, 505, 508, 12102; Title 14 USC Sections 351 and 632; Title 50 USC Appendix 451; and EO 9397 (SSAN). PRINCIPAL PURPOSE(S): DD Form 1966 is the basic form used by all the Military Services and the Coast Guard for obtaining data used in determining eligibility of applicants and for establishing records for those applicants who are accepted. ROUTINE USE(S): None. DISCLOSURE: Voluntary; however, failure to answer all questions on this form, except questions labeled as "Optional," may result in denial of your enlistment application.

WARNING Information provided by you on this form Is FOR OFFICIAL USE ONLYand will be maintained and used in strict compliance with Federal laws and regulations. The information provided by you becomes the property of the United States Government, and it may be consulted throughout your military service career, particularly whenever either favorable or adverse administrative or disciplinary actions related to you are involved. ...J , ! .

YOU CAN BE PUNISHED BY FINE, IMPRISONMENT OR BOTH IF YOU ARE FOUND GUILTY OF MAKING A KNOWING AND WILLFUL FALSE STATEMENT ON THIS DOCUMENT.

INSTRUCTIONS
(Read carefully BEFORE filling out this form.)

1. Read Privacy Act Statement above before completing form. 2. Type or print LEGIBLY all answers. If the answer is "None" or "Not Applicable," so state. "Optional" questions may be left blank. 3. Unless otherwise specified, write all dates as 8 digits (with no spaces or marks) in YYYYMMDD fashion. June 1, 2005 is written 20050601.

DD F O R M 1966/1, M A R 2007

Back of Page 1

20. NAME (LasL First, Middle initial)

SOCIAL SECURITY NUMBER

SECTION III - OTHER PERSONAL DATA

(b) (6), (b) (7)(C)


(5) GF(ADUATE YES X X NO

22. EDUCATION a. List ali high schools and colleges attended. (List dates in YYYYMM format.) (4) LOCATION (1)FR0M (3) NAME OF SCHOOL (2) TO 200109 Portfield Ave Haverford Wales, U KINGDOM 200506 Tasker Milward VC 200701 200705 MONTGOMERY COLLEGE OF ROCKVILLE 51 Mannakee St Rockville, MD

YES x b. Have you ever been enrolled in ROTC, Junior ROTC, Sea Cadet Program or Civil Air Patrol? 23. MARITAUDEPENDENCY STATUS AND FAMILY DATA (If "Yes."explain in Section VI. "Remarks.") X a. Is anyone dependent upon you for support? X b. Is there any court order or judgment in effect that directs you to provide alimony or support for children? X c. Do vou have an immediate relative (father, mother, brother, or sister) who: (1) is now a orisoner of war or is missina in action (MIA); or (2) died or became 100% permanently disabled while serving in the Armed Services? X d. Are you the only living child in your immediate family? 24. PREVIOUS MILITARY SERVICE OR EMPLOYMENT WITH THE U.S. GOVERNMENT (If "Yes."explain in Section VI. "Remarks.") X a. Are you now or have you ever been in any regular or reserve branch of the Armed Forces or in the Army National Guard or Air National Guard? X b. Have you ever been rejected for enlistment, reenlistment, or induction by any branch of the Armed Forces of the United States? X c. Are you now or have you ever been a deserter from any branch of the Armed Forces of the United States? X d. Have you ever been employed by the United States Government? X e. Are you now drawing, or do you have an application pending, or approval for: retired pay, disability allowance, severance pay, or a pension from any agency of the government of the United States? 25. ABILITY TO PERFORM MILITARY DUTIES (If "Yes," explain in Section VI. "Remarks ") X a. Are you now or have you ever been a conscientious objector? (That is, do you have, or have you ever had, a firm, fixed, and sincere objection to participation in war in any form or to the bearing of arms because of religious belief or training?) X b. Have you ever been discharged by any branch of the Armed Forces of the United States for reasons pertaining to being a conscientious objector? X c. Is there anything which would preclude you from performing military duties or participating in military activities whenever necessary (i.e., do you have any personal restrictions or religious practices wliich would restrict your availability)? 26. DRUG USE AND ABUSE (If "Yes,"explain in SecUon VI, "Remarks.") Have you ever tried, used, sold, supplied, or possessed any narcotic (to include heroin or cocaine), depressant (to include quaaludes), stimulant, hallucinogen (to include LSD or PCP), or cannabis (to include marijuana or hashish), or any mind-altering substance (to include glue or paint), or anabolic steroid, except as prescribed by a licenced physician? X

NO

DD FORM 1966/2, MAR 2007

Page 2

^7.NAME(LasL Firsf Middle initial)

Bradley Edward Manning SECTION IV - CERTIFICATION


29. CERTIFICATION OF APPLICANT (Your signature in this block must be witnessed by your recruiter.)

28. SOCIAL SECURITY NUMBER

(b) (6), (b) (7)(C)

a. I certify that the information given by me in this document is true, complete, and correct to the best of my knowledge and belief. I understand that I am being accepted for enlistment based on the information provided by me in this document; that if any ofthe information is knowingly false or incorrect, I could be tried in a civilian or military court and could receive a less than honorable discharge which could affect my future employment opportunities.
b. TYPED OR PRINTED NAME ^Lasl, First, Middle Initial) c. SIGNATURE

^
Bradley Edward Manning
30. DATA VERIFICATION a. NAME rXone) (1) BIRTH CERTIFICATE (2) OTHER (Explain) d. SOCIAL SECURITY NUMBER (SSN) (Xone) (1)SSN CARD (2) OTHER (Explain) BY RECRUITER (Enter description of the actual documents used to verify the following items.) b. AGE (X one) (1) BIRTH CERTIFICATE (2) OTHER (Explain) e. EDUCATION /X one) (1) DIPLOMA (2) OTHER (Explain)

d. DATE SIGNED

(YYYYMMDD)

20070926

c. CITIZENSHIP (X one) (1) BIRTH CERTIFICATE (2) OTHER (Explain) f. OTHER DOCUMENTS USED

31. CERTIFICATION OF WITNESS a. I certify that I have witnessed the applicant's signature above and that I have verified the data in the documents required as prescribed by my directives. I further certify that I have not made any promises or guarantees other than those listed and signed by me. I understand my liability to trial by courts-martial under the Uniform Code of Military Justice should I effect or cause to be effected the enlistment of anyone known by me to be ineligible for enlistment
b. TYPED OR PRINTED Middleinitial) NAME (Last, First, c. PAY

d. RECRUITER I D. 1BA024794

e. SIGNATURE

f. DATE SIGNED
(YYYYMMDD)

GRADE

Jones, Mark A

'

20070926
\*'

32. SPECIFIC OPTION/PROGRAM EN LIS .TED FOR, MILITARY SKILL, OR AS SIGNMENT TO A GEOGRAPHICAL AREA G lJARANTEES
a. SPECIFIC OPTION/PROGRAM ENLISTED FOR (Completed by Guidance Counselor, MEPS Liaison NCO, etc., as specified by sponsoring service.)
(Use clear text English.)

IAW AR601-210, Chapter 9, table 9-1 Program 9A United States ARMY Training Enlistment Program,, Req. OPT 03AND 90 United States ARMY Incentive Enlistment ProgramReq. OPT 174, 270, MOS 35F1O00YY 4 years 0 weeks UNCM b. 1 fully understand that i will not be guaranteed any specific military skill or assignment to a geographic area except as shown in Item 32.a. above and annexes attached to my Enlistment/Reenlistment Document (DD Fomi 4). 33. CERTIFICATION OF RECRUITER OR ACCEPTOR a. I certify that I have reviewed all information contained in this document and, to the best of my judgment and belief the applicant fulfills ali legal policy requirements for enlistment I accept him/her for enlistment on behalf of the United States (Enter Branch of Service) Army and certify that I have not made any promises or guarantees other than those listed in item 32.a. above. I further certify that service regulations governing such enlistments have been strictly complied with and any waivers required to effect applicant's enlistment have been secured and are attached to this document. b. TYPED OR PRINTED NAME (Last. First.c. PAY GRADE Middleinitial) Jones, Mark A d. RECRUITER ID OR ORGANIZATION 1BA024794
e. SIGNATURE c. APPLICANTS INITIALS

([^ g

f. DATE SIGNED
(YYYYMMDD)

20070926

SECTION V - RECERTIFICATION
34. RECERTIFICATION BY APPLICANT AND CORRECTION OF DATA AT THE TIME OF ACTIVE DUTY ENTRY a. I have reviewed all information contained in this document this date. That information is still correct and true to the best of my knowledge and belief If changes were required, the original entry has been marked "See Item 34" and the correct information is provided below.
b. ITEM NUMBER c. CHANGE REQUIRED NAME changed from Bradley Edward Manning; AKA Manning, Bradley Edward to Bradley Edward Manning; Manning, Bradley Edward

d. APPLICANT (1) SIGNAXIJRE (2) DATE SIGNED


(YYYYMMDD)

e. WITNESS

(1) TYPED OR PRINTED NAME


(Last. First. Middleinitial)

(2) RANK/ 131 SIGNATUREGRADE Page 3

20071002

Jones, Mark A

DD FORM 1966/2, MAR 2007

35. NAME (Last, First, Middle Initial)

36. SOCIAL SECURITY NUMBER

Bradley Edward Manning SECTION VI - REMARKS 26. Have you ever used marijuana? N Statement Remarks: per conversation with Mr. Driver this is a good education evaluation, and that is one of DOD recommended evaluation services.

(b) (6), (b) (7)(C)

(Specify item(s) being continued by item number Continue on separate pages if necessary.)

DD FORM 1966/5 ATTACHED? (X one)

YES NO

SECTION VII - STATEMENT OF NAME FOR OFFICIAL MILITARY RECORDS


37. NAME CHANGE. If the preferred enlistment name (name given in Item 2) is not the same as on your birth certificate, and it has not been changed by legal procedure prescribed by state law, and it is the same as on your social security number card, complete the following: a. NAME AS SHOWN ON BIRTH CERTIFICATE t). NAME AS SHOWN ON SOCIAL SECURITY NUMBER CARD

Bradley Edward Manning

Bradley Edward Manning

c. 1 hereby state that 1 have not changed my name through any court or ott er legal procedure; that 1 prefer to use the name of

Bradley Edward Manning


d. APPLICANT (1) SIGNATURE

by v vhich 1 am known in the community as a matter of convenience

person whose name is shown in Item 2. and with no criminal intent 1 further state that 1 am the same person as the

(2) DATE SIGNED (YYYYMMDD)

e. WITNESS (1) TYPED OR PRINTED NAME (Last, First, Middle Initial) (2) PAY GRADE

(3) SIGNATURE

BOYLE, MICHAEL L DD FORM 1966/4, MAR 2007

EOS
Page 4

38. N A M E

( L a s f Firsf Middle initial)

39. SOCIAL SECURITY NUMBER

Bradley Edward Manning

USE THIS DD FORM 1966 PAGE ONLY IF EITHER SECTION APPLIES TO THE APPLICANT'S RECORD OF MILITARY PROCESSING.

(b) (6), (b) (7)(C)

SECTION VIII - PARENTAL/GUARDIAN CONSENT FOR ENLISTMENT


40. PARENT/GUARDIAN STATEMENT(S) (Line out portions not applicable)

a. I/we certify that (Entername of applicant) Bradley Edward Manning has no other legal guardian other than me/us and I/we consent to his/her enlistment in the United States (Enter Branch of Service) REGULAR ARMY I/we acknowledge/understand that he/she may be required upon order to serve in combat or other hazardous situations. I/we certify that no promises of any kind have been made to me/us concerning assignment to duty, training, or promotion during his/her enlistment as an inducement to me/us to sign this consent. I/we hereby authorize the Armed Forces representatives concerned to perform medical examinations, other examinations required, and to conduct records checks to determine his/her eligibility. I/we relinquish all claim to his/her service and to any wage or compensation for such service. I/we authorize him/her to be transported unsupervised to/from the Military Entrance Processing Station via public conveyance and to stay unsupervised at a government contracted hotel facility.

b. FOR ENLISTMENT IN A RESERVE COMPONENT.

i : ,

I/we understand that, as a member of a reserve component, he/she must serve minimum periods of active duty for training unless excused by competent authority. In the event he/she fails to fulfill the obligations of his/her reserve enlistment, he/she may be recalled to active duty as prescribed by law. I/we further understand that while he/she is in the ready reserve, he/she may be ordered to extended active duty in time of war or national emergency declared by the Congress or the President or when otherwise authorized by law, and may be required upon order to serve in combat or other hazardous situations.
c. PARENT (1) TYPED OR PRINTED NAME (Last, Firsf Middle Initial)

(2) SIGNATURE

(3) DATE SIGNED (YYYYMMDD)

d. WITNESS (1) TYPED OR PRINTED NAME (Last, First, Middle Initial)

(2) SIGNATURE

(3) DATE SIGNED (YYYYMMDD)

e. PARENT (1) TYPED OR PRINTED NAME (Last, First, Middle Initial)

(2) SIGNATURE

(3) DATE SIGNED (YYYYMMDD)

f. WITNESS (1) TYPED OR PRINTED NAME (Last, First, Middle Initial)

(2) S I G N A T U R E

(3) DATE SIGNED (YYYYMMDD;

41. VERIFICATION OF SINGLE SIGNATURE CONSENT

DD FORM 1966/5, MAR 2007

Page 5

42 NAME (Lasf First, Middle initial)

43. SOCIAL SECURITY NUMBER

Bradley Edward Manning SECTION VI - REMARKS CONTINUATION

(b) (6), (b) (7)(C)

(Specify item(s) being continued by item number Continue on separate pages if necessary.)

DD FORM 1966/6, MAR 2007

Page 6

09a?rg,^
ORDERS: 8275012 NAME MANNING, BRADLEY E.

Z-^- L/

DEPARTMENT OF DEFENSE BALTIMORE MILITARY ENTRANCE PROCESSING STATION 8 50 CHISHOLM AVENUE FORT GEORGE. G. MEADE, MD 20755-2995 02 October 2007

H a v i n g e n l i s t e d , i n t h e U.S. Army under t h e p r o v i s i o n s o f AR 601-210, y o u a r e a s s i g n e d and w i l l r e p o r t t o t h e 4 3 r d A d j u t a n t General B a t t a l i o n ( R e c e p t i o n ) , F t L e o n a r d Wood, MO. MDC 1AE8. R e p o r t i n g d a t e : 02 October 2007

(b) (6), (b) (7) (C)

j.liis i s a c e n t r a l l y b i l l e d Account f o r T i c k e t FOR THE COMMANDER:

Purchase.

DISTRIBUTION: Ea i n d i v i n d i e (1) Tng s t a e n l p a c k e t (?) S p o n s o r i n g r c t g svc c d r (3) T r a v e l S e c t i o n (1) F i l e (1)

************************* * OFFICIAL COPY * * DEPARTMENT OF DEFENSE * * BALTIMORE MEPS * ************************* NKECHUroraKU U. ENWEFA ILT, US ARMY Operations O f f i c e r

*** NUMI

REC 2007240

1 4 3 e ^ ^ I E l S l l E O BLMC SSN:(b) (6), (b) (7)(C)

CIPQYAF XC:

(F-BLM ) *** UNIT:KTG PG:001

DTE:08/28/07

SOCIAL SECURITY ADMINISTRATION SOCIAL SECURITY NUMBER VERIFICATION OUR RECORDS INDICATE THAT SOCIAL SECURITY NUMBER ASSIGNED TO BRADLEY , EDWARD , MANNING , .
(b) (6), (b) (7)(C)

IS

YOUR SOCIAL SECURITY CARD I S THE OFFICIAL VERIFICATION OF YOUR SOCIAL SECURITY NUMBER. THIS PRINTOUT DOES NOT VERIFY YOUR RIGHT TO WORK I N THE UNITED STATES. PROTECT YOUR SOCIAL SECURITY NUMBER FROM FRAUD AND IDENTITY THEFT. BE CAREFUL WHO YOU SHARE YOUR NUMBER WITH.
^-:;?g%%^.:.y/"'g&)k^

"

: ; ! * ^ \ ' ^ r <

c Social Security Administration

ol5 ^Giii;].Wa8hinqtoh Street 20850


V j
8J

-^4f3<X##*HMkt.

>

n'v"

^^^^

CERTIFICATE
J"MiCL M O HO NAME pnnll Tirjr Mi^W/r

OF LIVE

BIRTH
* >

I
f

MATE OF OKLAHOMA - DEPANTNENT OF HEALTH


I CMILP
tTypf Of tmti I t A T E r i L I NO

^^'^0^3^^^
Ytm* 3. H O U R

135 2. D A T E I OF BIRTH ^ / ' J D - NAME /'/

Mvnih

Otf)

Bradley
S*. t u n B I R T H

Edward
TRIPLET Q

Manning
1,10

12

17

87 Oklahoma

1:58?

4. ( C X

Sb. I R TWIN O R T R I P L I E T , # A $ C H I L I ) B O R N

t . . COUNT Y O F B I R T H

Male

WMOLUSK

TWINQ

. M.HOSCITAL

i. O i r . TON. OR LOCATION OF BIRTH

t i lHUOE CITY LIMIT

aol m hbipiut:

fivr

ilrtr

f\4

aumttri

T. M O T H E R I

13

Oklahoma
MAIDEN NAHC

City
/'i'<l

""i^
UliJIt

""C
K ('>"

M e r c y H e a l t h Ceater
$. AGE <ai fifftt ' thts htnht of *. Bl1tlHP\,KCE ISlair ot /erritn ceunlry)

Susan
*#* R E S I D E N C E . STATE

Mary

lk COUNTY

lOc C l T V , TOWN. O R L O C A T I O N

\
II.

Oklahoma
FATHER NAME

Logan
HidiU

Brian
IMfORMAMT L I C N A T U R E OF EITHER PARENT

Edward

(b) (6), (b) Crescent (7) (C)

34
I I M . INSIDE CITY LIMIT r.j

England
! , . STREET ACDSESS

Route 1 Box 158


IJ. BIRTHPl ACE f j ( j / r or f o f t i f l counlryy

W. AGE lm limr o/
ihsi hitthj

Manning

32

111 Lnciis
u t . IF UNABwE T O O B T A I N O N E OF PARENTS SIGNATURE, STATE THEFi3RE. STATE REASON

<

>tOA/v\
IJ. M O T H E R ' S flAILINC ADDRESS

rHc^j^-rLuxc^
S t R ^ E J T . R P . O . NO P < U > O F f I CE

Z I P C O D E NO.

I*.

(b) (6), (b) (7) WAS B L O O D O F T H I S C H I L O S M O T H E R (C) FOR S Y P H I L I S '


.r^t

Crescent
TESTED

Oklahoma

73028

.\oO

&

1J A T T E N D A N T AT B I R T H 0 X X " O It.. ADDRESS OF A T T E N D A N T STREET R F D NO POSTOFFICE v j ^ * ' O.C. STATE .*! (/tft/r Oi*f tSfrrilyl

ZIP CODE NO.

4200 West M e m o r i a i - f t t a d
^ D A T E REC 0 . BY L O C A L REG

OkLahamn ^ i t y ' W ^ Oklahoma'


JI. D A T E RECEIVED BY STATE

73120
REGISTRAR

JAN 11 1989
THIS L I N E F b R USE O F S T A T E RECiSTRAR 3}..DATE CORRECTIWS MADj

viANl J ms
J3c. A U T H O R I T Y

'"^C^.-'

.M^CIERK ^

^ ^ *

"ik;.''**'^. ' * R I

A A y

November 28, 2006


#r

(b) (6), ^ -(b)-(7)^ (b) (7) (C)(7)(C) (C) (b) (6), (b)
BIRTH DATE. ' EXPIRcS. 02-15-2003
j@ sfmii Sf

&!er'S License U C # :(b) (6),


I ^

Di#

^
l^^l^l^^ ^^.^ ^^^I^^I^^O^

^.^^8^ TY^^N
1^-^ ^ ^ ^ ^

^T-^^^^

Basler, Michael SFC USAREC


From: Sent: To:
nrjvpr q y H p M r G . q i l . q A R F O

C Z Tuesday, August 21, 2007 12:35 P M ^ 181; IBIA; 1B1B; 1B1C;1B1U; I B I G ; 1B1L; 1B1W; 1B3; 1B3D; 1B3G; 1B3H; 1B3J; 1B3M; 1B3P; 1B3R; IBS; 1B5D;1B5G; 1B5H; 1B5J; 1B5K; 1B5P; 1B5T; 1B5W; 1B6; 1B6D; 1B6E; 1B6F; 1B6G; 1B6L; 1B6M; 1B6R; 1B6S; 1B7; 1B7B; 1B7C; 1B7F; 1B7H; 1B7K; 1B7IVI; 1B7S; 1B7W; 1B8; 1B8C; 1B8D; 1B8G; 1B8I; 1B8J; 1B8L; 1B8W; 1B9; 1B9A; 1B9E; 1B9H; 1B9J; 1B9L; 1B9N [U] FW: SpanTran / ARMY Foreign Credential Evaluations - $50 - One Day Turnaround UNCLASSIFIED Army Application.doc; creditcard[1].pdf; Fax Cover Sheet for Military.doc; GUIDELINES FOR SPECIAL PURPOSE LETTER.doc; SpecialPurposeLetter.pdf

Subject: Categories: Attachments:

Army creditcard[1].pdf -ax Cover Sheet forGUIDELINES FORSpeclalPurposeLett 3plicatlon.doc (27 K (283 KB) Military.d... FECIAL PURPOSE er.pdf (39 K..

UNCLASSIFIED////

FYI

(b) (7)(C), (b) (6)

O r i g i n a l Message From: Dave Cone [mailt(b) (6), (b) (7)(C) Sent: Tuesday, August 2 1 , 2007 12:21 PM To: D r i v e r , C l y d e Mr GS USAREC; Moore, C a l v i n Mr GS USAREC S u b j e c t : SpanTran / ARMY F o r e i g n C r e d e n t i a l E v a l u a t i o n s - $50

One Day Turnaround

A t t a c h e d i s a l l t h e necessary i n c l u d i n g t h e a p p l i c a t i o n , CC form and a sample purpose letter.

A few v e r y i m p o r t a n t key p o i n t s t o n o t e :

SpanTran i s a member o f NACES and i s o f f i c i a l l y on t h e approved l i s t * Our e v a l u a t i o n s f o r t h e ARMY o n l y i s $50. ~

f o r t h e ARMY

* We w i l l t u r n a r o u n d t h e e v a l u a t i o n s w i t h i n one business day assuming t h a t no v e r i f i c a t i o n i s r e q u i r e d and t h e r e q u i r e m e n t s f o r t h e g u i d e l i n e s a t t a c h e d a r e met.

We v e r y much u n d e r s t a n d t h a t w i t h t h e ARMY you p r e t t y much need e v e r y t h i n g - y e s t e r d a y w h i c h i s why we a r e f u l l y committed t o s e r v i c i n g you a t a t u r n a r o u n d and p r i c e t h a t i s b y f a r tops i n N o r t h America.

SPAJSTRAN EDUCATIONAL

SERVICESJNC.

7211 REGENCY SQUARE BLVD., SUITE 205 'HOUSTON, TEXAS 77036-3197 Tel: (713) 266-8805 Fax: (713) 789-6022 www.spantran-edu.org

SPECIAL PURPOSE LETTER


Date: 8/29/2007 SGT Michael Boyle U.S. Arnny Rockville Recruiting Station 611 Rockville Pike Suite 140 Rockville, MD 20852

Name on Application: Name on Documentation: SpanTran Number: Social Security No.: Date of Birth: Country of Birth Document Status:

Manning, Bradley E Manning, Bradley E 0708-70435 XXX-XX(b) (6), 12/17/1987 USA (b) (7) Unattested (C)

Documentation: Certificate, 06-2004, General Certificate of Secondary Education issued by Assessment and Qualifications Alliance; and General Certificate of Secondary Education, 2004 Summer Examination, issued by the Welsh Joint Education Committee Said documents indicate the following U.S. educational equivalencies: Yes N/A N/A N/A N/A N/A Diploma of high-school graduation. Completion of less than two years of tertiary transfer credit. Completion of two or more years of tertiary transfer credit. Associate degree. Completion of four or more years of tertiary transfer credit. Bachelor's degree or higher.

Prepared by: ^^-^a-^-*^^ f ^ i ^ Barbara B . Glave / JCF

SpanTran Educational Services, Inc.

| N o T E : T h e original of this form, bearing the SpanTran dry seal, is valid for the U.S. Army Rockville Recruiting Station t o which it will be mailed; all copies are invalidregardless ofthe purpose. **END OF DOCUMENT. *VAL1D ONLY WITH SPANTRAN DRY S E A L ^ ^GULAR TRANSLATIONS EDUCATIONAL EQUIVALENCIES MEMBER, NATIONAL ASSOCIATION OF CREDENTIAL EVALUATION SERVICES, INC.

'YD P W Y L L G O R ADDTSG CYMRU

WELSH JOINT EDUCATION COMMITTEE

CBAC WjEC
ySTYSGRIF G Y F F R E D I N O L ADDYSG UWCHRADEfl
ERAL CERTIFICATE OF SECONDARY EDUCATION]

Arholiad Haf 2004 Summer Examination


gyn sydd i dy.sl,io bod yjais is to certify that BRADLEY E MANNING

Z:46%AV^-MZLPK;4j^KC.^C^OOZ,, .K4P^7^07^ y^;edi cyrraeddy safon(au) a nodiryny testun(au) a ganlyn: Qjyiained the result(s) shown in the following nine subject(s):
ag
q a y4 V^n02/0 mPqi3l9 K&'?^03/2 Y^d5l/6 A46P/,.fr/2 ASTUDIiKETHAU ; BUSNBS SAESNEG BUSINESS STUDIES ENGLISH ' ' 3 HISTORY D&T:SYSTEMS&CONTROL TECHNOLOGY ENGLISH LITERATURE , GEOGRAPHY . MATHEMATICS n ; ' ; ^

ibj

14:^916/4 HANES
D&T:SYSTEMAU A THECH, RHEOLI LLENYDDIAETH SAESNEG DAEARYDDIAETH MATHEMATEG _ ' ' /C^WRS BYR) /GCSE ( SHORT COURSE) W ^ 9 l 0 / 2 CYMRASG A I L l A I T H ^ ^ / ^ g o 9 / 7 ASTUDIAETHAU CREFYDDOL . : '

WELSH SECOND LANGUAGE RELIGIOUS STUDIES


_ .B^fW***^"

C. C

' : ''A^Xa

. .4%

-^S3S'

^ ^ ^ ^ ^
CAPED^'*^'^' CB'^C

Q^yjgMAN, WJEC

CADEIRYDD, Pwyllgor Arlioliadau CHAIRMAN, Examinations Committee

PRIF WEITHREDWR,

CBAC

CHIEF EXECUTIVE, mEC

A S S E S S M E N T

and

General Certificate of Secondary Ediicatidn

Q U A L I F I C A T I O N S A L L I A N C E

I f.^

'

,\i

^ /

T t .

i.

Ll

\ ^L/

r
%)fy A(jg^ iCiy

\'i

vt.
.'((^i)

lb/

\() /i>

^( M .

I^l)

A LV \ L 'Mly

Mt.

'^b 4(1^

.o^ <^

ALty 4Q>

\k)),

\ i >

Thm is to' certify'thttirt thk ^xanlinatU}rCheld in Juiie 2004 (6 Ac^ viik v:)). 4 L i / x.^)/ A())
"Mix

/ V i V 4i:k/ 4Q> AC;). V K ,

Y^Jk V.!^ V^D-

Y^)/

'ZMy% r9t7
K^f
'<h.
Ak^y

Ali)/ AQ!>' M)> 4:;!$/ v;^ V4} ' k l x ViaV)^ 4W

v:^
AQ\

OJ
Li) '

i;^
% ^(L
\< 1

AQ)/ Y<)/ 4:1^


v:^"

'lb/ 4U>

i L
/t).
1:5-

vi:;
V{\

4t1

tyv Vl>

v t ^ AL^ ' AC;)/' :^#4!;M%4Bv### "Vl^ AC^'


'^^YAl^.

Al^

v;^

ALc> 1(1^, AQ:).' jLt) AL&y 4L4y "KK /Y:^ /CB, ". ^ty

\ ^
liU

(^L
j:;^/'

L DOUBLE A W A R D RS (One n ' CIO BU IM j lE iii . I (1) ^ i i Subject) %b \(i.v \j Aie^ \ r b :^JLV_ ^ SCIENCE: DOODLE AWARD m y / j j ; 'lix
/Vj^

'V

/Mi:

vi; * V J AfiC/ 'dL^L


'^^-^A,

^tl

Alt'*

a a

V^Qjk

'f^^
\ j
H\V

<i)
tlx ".l)-

ILL

VL(1/

( (1 tlx

vim U

IL/ *L 5 (^^^^ n /i L

V^)/ /|Q> ^ AQ^.' 4 i y A3> 4;^/ ti% ^ %^.AC^ V ) ^ AC:^ 41-^ AQiy Kb-' AO)411^ Vl)^ AQ&< ^ - l ) . ACiy 4, ^ 40) / A o y 4L;iy v ^ / 4 1 , ^ 4Lb^ A L i y V l ^ A(:}' A[<y V ) ) / Vj)/ \Q> A C ^ ^.15/ ACL^ 4(1) X ^ / V%y AO) MU;!^ 402. A ' ^ * A(b/ vt, 4Ll> ^iLl. \ t ) < ^

I t %W Wit
AC^

vty AL^' "^1/ Vi, "^^^^ *D V)\

v^/
^ ly

4(1:^ \CL\ v:^). A i : ^ /VLi) iqj^ v t ) vi>


Y^c 11:34, 41)5.

VI, ^1 1) ^

Avv

v^l^ %
ALTAI.

'F^ig

\( ' (J
4 >

\
\ 1

\S '/
\ J
'SC.'*,'

< (

' %,
4.^
I >

/kty
Vly
'^-iw.'

V; Y

(1

')/

r U \ 1/ L/ ^
^ <i

.v^ i
/V y ^ _
\i : -

^i)
V>

^i)/ \ L 1Q}/ ^ I : \.l

) '

^d
1 n

rAty

< :'.
e^
Mifse,Cresswefl, :

(t) "V.^),'' ' _


\1 A(% '

\ \ \
My\

L
\\

/VJA, 'V.^\/ Oi

^1

\ ^ >
(

CENTRE.No /CANDIDATE No 68241/2728/68Z410O22728B

WOJKOO ctHwrnam cwwcwuvn ^ Assu OjnuKxrots ajMjaAUM& MSESSfSfTfiirnOmr

Director General on behalf of the Assessment and Qualifications Alliance

Qualifications and CurrkuKim Authority

'

Rewarding Learning

THE UNITED STATES ARMY'


1. NAME;

iRUITING COMMAND FUTURE SOLDI#


(For use of this form see USAREC Reg 601-95) 2 SSN:

RE-EXECUTION CHECKLIST

Manning, Bradley E
3. MOS AND OPTION:

(b) (6), (b) (7)(C) 4. SHIP DATE: 20071002


6. RSID;

35F
5. RECRUITER OR SC:

SGT BOYLE, MICHAEL L JR

IBIA
SECTION I - MANDATORY SHIP ITEMS AND/OR TASKS

RECRUITER OR SC INITIALS AND DATE

FUTURE SOLDIER INITIALS AND DATE

ITEM OR TASK SF 1199A (Direct Deposit Sign-Up Form) (must have ATM card or checkbook to access account) Establish AKO account {Future Soldier will maintain password) Username: G f & ^ l c y , A f P AfMyfc>^.' .

%'^3oo9i'0pj
/^2,t>70^-l\

^ 3 " 2 . i ^ ^ W

^ f f ^ f o P ' ^ ^ username and password affixed to back of card)


Pass physical fitness assessment

jUSAREC Form 1134 (United States Army Future Soldier Training Program ID Card) (AKO

A(j'laty7^>11J\

^ ^ ^ C C W % ^

Push-ups Sit-ups Run

Repetitions: / ^ Repetitions: Z | Time: 7'0</

IX Go
<

Go Go

No-Go No-Go No-Go

/Y^Z<^V7^^^7
^ l . ' ^ O ' ^ l - ' '

'^'g^^PO

Hi Q^f/VfaoW

.Register for SMART (www.futuresoldiers.com/html/referrals.isp) Future Soldier has all items on packing list (no more, no less) '^ 1^7 Expiration Date: ^1 I^JT-OO ^

^Uzj^^t

!K yxw^

Current and valid Driver's License: H 6 6^

DA Form 5500-R (Body Fat Content Worksheet (Male)) or DA Form 5501-R (Body Fat Content Worksheet (Female)) (if applicable) Regular Army and Reserve Components Referral (see sec III) (if applicable)

^yi<Xno'\zr^

Transportation to MEPS verified Marriage license (if applicable)

^^ZjCOzd^lZ") -^^"Z/CiTy^^^Z-?

i ^ M IWoiia

Birth certificates (if applicable) Diploma (if applicable) other documents, including MOS specific (if applicable) other documents, including MOS specific (if applicable)

3fm

boo'^o^, il^

NOTES:

XJWffE: FUTURE SOLDIER SIGNA ^

DATE:

~y
DATE:

I have reviewed the above Fiituiei^^^iaf'S'qualifications and herebyizGnfimiand verify the readiness of this Future Soldier for initial entry training. All mandatory documents are p6nt and have been viewed by myself. All mandatory tasks have been completed. RECRUITER OR STATION COMMANDER TYPED NA^EAND SIG#TURE

jS^r ^y/^/ ^v;^^^ /

^ ^ ^ ^ ^ C ^
VhiSffe^M INCORPORATES USAREC
FORM

I ^o^Ai?
512 WHICH
IS OBSOLETE

USAREC Form 1137, Rev 1 May 2007

V7.00

ECTION II - PRE-BASIC TRAINING TASK LISTi .ISIgk SHORT-TERM TASKS: MAKE REFERRAL MILITARY TIME DRILL A N D CEREMONIES Execute the position of attention Execute the hand salute; know who and when to salute Execute rest positions

"GO^RN NO-GO A N D DATE OF COMPLETION

(not required task, recommended) (referral entered into sec III)

-T-

ARMY PHYSICAL FITNESS TEST (APFT) (Applicant must achieve 60 points each event and all APFT events must be completed Events must be performed to standards outlined in FM 21-20, Physical Fitness Training.) Push-ups Sit-ups 2-mile run Repetitions: Repetitions: Time; Points: Points; Points:

same day.

REFERRAL ENLISTMENT Referral enlists (not required task, recommended) (complete referral's information in sec III) I

* SCORE SOLD/ER A GO IF HE OR SHE PERFORMS THE TASK SUCCESSFULLY (SUSTAINMENT TimiNING IS REQUIRED DURING ALL SUCCEEDING MONTHS). * SCORE SOLBIER A NO-GO IF HE OR SHE FAILS ONE OR MORE AREAS AND WHEN THE INSTRUCTOR IS UNABLE TO CORRECT THE DEFICIENCY ON THE SPOT (RETRAINING REQUIRED AT NEXT MILITARY FORMATION) * GO REQUIRED WITH DATE ON ALL TASKS EXCLUDING REFERRAL TASKS FOR SECTION II TO BE COMPLETE. S T A T I O N C O M M A N D E R ' S T Y P E D NAME A N D SIGNATURE; DATE;

NOTE

C G C M M A N D I N G OFFICER'S T Y P E D NAME A N D SIGNATURE;

DATE;

USAREC

Form 1137, Rev 1 May

2007

Page 2 of 3

SECTION limmCTIVE ARMY AND RESERVE COMPONENTS R U B R A L SHEET PRIVACY ACT STATEMENT AUTHORITY: Collection ofthe information requested and recorded on USAREC Form 1137, section III, is authorized by Title 10, USC, Section 513, 3013(g)(3). PRINCIPAL PURPOSE: To provide such data as is required by a U S Army recruiter and/or guidance counselor to contact, process, and enlist prospects for Army service ROUTINE USES: a. Used by the recruiter to make contact with a prospective applicant for enlistment. b. Used by the guidance counselor, personnel officer, or administrative supply technician to verify that an applicant has enlisted in the FSTP, RA, ARNG, orAR. c. Used by recruiting personnel to monitor the Regular Army and Reserve Components Referral Program and to formulate market data to determine recruiting trends. EFFECT OF NOT PROVIDING INFORMATION: The disclosure ofthe information requested is entirely voluntary. Failure to provide this information, however, may result in denial of referral credit to applicant or enlistee making the referral. SPECIAL INSTRUCTIONS: Before collecting the information requested in Part II from prospective applicants for enlistment to give to your recruiter for referral, you must inform the prospective applicants of the uses for the information and the effect of not providing information as discussed in the Privacy Act Statement above. PART I: FUTURE SOLDIER INFORMATION NAME: SSN; SHIP DATE;

Manning, Bradley E
PART II: REFERRAL INFORMATION NAME; SSN;

(b) (6), (b) (7)(C)


TELEPHONE: SIGNATURE OF REFERRAL:

20070918

ENLIST DATE AND BRANCH: (completed by guidance counselor)

CERTIFICATION of recruiter; I certify that the persons identified in part II above are bona fide referrals ofthe person identified in part I above, and that the referrals have been placed in the ARS-SMART database. Printed name, rank, SSN Signature and Date

PART III: ARNG ENLISTMENT ONLY. To be completed by the personnel officer or the administrative supply technician of the ARNG unit for which enlisted and returned to the U.S. Army recruiter identified in part II above. Date referral enlisted in the ARNG; (ddmmmyyyy) ARNG unit of assignment and telephone number; CERTIFICATION: I certify that the person identified in part II enlisted in the ARNG unit identified above. Printed name, rank/grade, SSN Signature and Date

PART IV: REFERRAL ENLISTMENT CERTIFICATION. Upon referral enlistment, guidance counselor will validate referral qualifications and update Part II of this form with enlistment date and branch of service in which the referral enlisted. A ship date certification will be made by the ship counselor and signed in the block below. CERTIFICATION of guidance counselor: I certify that the persons identified in part II above are bona fide referrals of the person identified in part I above. Printed name, rank/grade, SSN USAREC Form 1137, Rev 1 May 2007 Signature and Date Page 3 of 3

(b) (6), (b) (7)(C)

USMEPCOM ACCESSION VERIFICATION PACKET R E G l ^ R ARMY/LEFT SIDE


(For use, see USMEPCOM Reg 601-23) DOCUMENTS
Ordeig^affd any ~LM' amendments

FOR OFFICIAL USE ONLY Page 1 of 2 Pages

SUB-PACKET NUMBER

o/cy
O 0

7cy
cy cy NA

Form 2808 (Report of Medical Examination) with waiver documents, if applicable, and all Medical supporting d o c u m e n t s from consults etc.. 1 ^ / d q ^ ^ m 2807-1 (Report of Medical History)

L _
1^
L

jdiogram

U S M E P C O M Form 40-1-2-R-E (Report of Medical Examination/Treatment) /DD Form 2807-2 (Medical Prescreen of Medical History) Form 40-8-1-R-E (HIV Antibody Testing Acknowledgment) (Privacy Act Statement-Health Care)

O/cy
O/cy

NA NA NA

U 'Ij^^pcciw U D ^ g f m 2005 -O U

O/cy cy
cy

JvlA. O
O NA

DETForm 1966-series (Record of Military Processing-Armed Forces of the United ^trites) DD F o r m 4-series (Enlistment/Reenlistment Document-Armed Forces of the United Sj^s) USMEg/gOM ? PCN 6 8 0 - 3 A D P (See para. 8-8 if not available)

S^>B6 (Questionnaire for National Security Positions) or EPSQ printout version and F 86A (Continuation Sheet for Questionnaires SF 86, SF 85P, and SF 85)

cy
O

cy
NA cy

w
>

ENTNAC^Results/DIS Form 1 (Report of National Agency Check) (manual ENTj^AC/NAC)

(__^ ' t J S M E P O g M Form 601-23-5-R-E (Introductory Pre-accession Interview) note 3 E P C O M Form 6 0 1 - 2 3 - 4 - E (Restrictions on Personal Conduct in the A r m e d USjCfE , ^ rrces) ce U S M E P C O M F o r m 4 0 - 8 - R - E (Drug and Alcohol Testing A c k n o w l e d g m e n t ) D Form 214 (Certificate of Release or Discharge from Active Duty), or NGB Form 22 (Report of Separation), DD F o r m 215, (Correction to DD Form 214) and/or DD Form 220 (AD Rpt), R E D D Report, discharge certificate or similar d o c u m e n t ) * * - D b F o r m 368 (Request for Conditional Release)**

cy

o
O/cy
cy

cy
NA O '

^7'

cy cy
NA

DD F o r m 369 (Police R e c o r d C h e c k ) * * ,DD F o r n i ' 3 7 2 (Request for Verification of Birth)**

s V

o
O

cy
NA O NA NA

JXf5^fF o r m ^ F 119aA J..

1304.12-K (ASVAB Scoring Worksheet)**

DD for-m 2366 (Montgomery Gl Bill (MGIB) Act of 1984) (Direct Deposit Program Form)

3cy
O

43t) F o r m 93 ( R e c o r d of E m e r g e n c y Data)

o/cy

NOTE: Place a check mark In the block to the left of the documents for documents that are required and Included. Place an " N A " in the block to the left of the documents for documents that are not required. Place an " N P " In the block to the left of the documents for documents that are not provided.

The I n c l u s i o n / S e q u e n c e of C h e c k l i s t V e r i f i e d B y

Printed Name of USMEPCOM Rep

lajna ffp/xjr

REGULAR ARMY ADDRESSES AND NOTES TABLE 8-1


Page 2 of 2 Pages

PACKET NUMBER 1 AG Battalion (Reception)/First Duty Station '. '

2 Enlistee (Applicants will receive their documents before they depart the MEPS)

NOTE: MIRS produced forms will be on plain white bond paper via laser printer. Reproduction of MIRS laser printed forms will not be used as an original. Follow DD Form 4 copy guidance in Chapter 5.

LEGEND ** denotes a document that is distributed "if applicable" . f ' O denotes an original, "cy" denotes a copy, O/cy means that an original and copy can be included in the packet 2cy denotes 2 copies cy2 denotes copy 2 NA means that distribution is not required >,

NOTES: 1. ** if applicable. " ' ' ' ' ., t:

2. Shipping of applicants will not be delayed due to non-receipt of Service unique forms and/or documents. 3. USMEPCOM Form 601-23-5-R-E is not required for reservists or National Guard. - . ' ' ' ' -

^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ . ^ ^ ^ ^ ^ ^ ^ 1 ^ . ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^

REGULAR ARMY ADDRESSES AND NOTES TABLE 8-1


Page 2 of 2 Pages

PACKET NUMBER 1, AG Battalion (Reception) /First Duty Station

2 Enlistee (Applicants will receive their documents before they depart the MEPS)

NOTE: MIRS produced forms will beion plain white bond paper via laser printer. Reproduction of MIRS laser printed forms will not be used as an original'. Follow DD Form 4 copy guidance in Chapter 5.

LEGEND ** denotes a document that is distributed "if applicable" . O denotes an original, "cy" denotes a Copy, O/cy means that an original and copy can be iricluded in the packet 2cy denotes 2 copies cy2 denotes copy 2 NA means that distribution is not required

NOTES: 1. ** if applicable. 2. , i

Shipping of applicants will not be delayed due to non-receipt of Service unique forms and/or documents.

3. USMEPCOM Form 601-23-5-R-E is not required for reservists or National Guard.

STATEMENT OF UNDERSTANDING PROHIBITED ACTIVITIES BETWEEN RECRUITING PERSONNEL AND FUTURE SOLDIER PROGRAM MEMBERS
(For use of this form see USAREC Reg 601-95)

1. I understand that the U.S. Army strictly prohibits any social activity of a personal, unofficial nature between U.S. Army Recruiting Command personnel and members ofthe Future Soldier Program. Prohibited activities include: a. Any type of romantic or sexual conduct. b. Sharing of lodging. c. Sharing of a personal vehicle. d. Drinking of alcoholic beverages. e. Personal employment, such as babysitting and maintenance work. f. Exchange of money; to include loaning, giving, receiving, or borrowing. g. Exchange of personal property; to include selling, purchasing, leasing, giving, receiving, loaning, and borrowing. 2. I understand that Future Soldier Program functions are official in nature and are not considered personal, social activity; therefore, the above rules still apply to those functions. 3. I understand that if 1 become aware of any recruiting personnel violating any of these rules, I will report it immediately to the Battalion Executive Officer whose name and telephone number are:

MAJ Ramos-Rivera
Name

(b) (6), (b) (7)


Telephone Number (C)

4. 1 understand that between recruiting personnel and Future Soldiers there will be no sex, no dating, no sleepovers, no sharing of property, no drinking of alcohol, no financial deals, no improper touching, no profane language, no verbal sexual suggestions, and no sexual harassment.

AUTHENTICATION

V1.30

..Transmission Log
-"-A Date 2007-08-28 Time 15:28 Type SCAN Job # Tuesday, Length 0:18 2007-08-28 Speed 24000 15:29 Pgs 1 Status OK - - V . 3 4 1M31 S t a t i o n Name/Number 14107615228 01079

1. DATE4FKaUESr POUCE RECORD CHECK

Fom CMS Mr. Expiret

Aptifevtt} 0704-0007 200S OCT 31,

Q tha l a m tef f w t m l n a \ntmKOoi%, w w c l & g w W n g tgureM, rflWns tf** bur4n MtimMo or any cKtm MpMt of tTM eo Itetion ^ [0704-OCM7]. RMpanMraf ftwuH M kwtr* that notwiWwn*ng *ny noWfKhct^n^mg # P U M i PO WOT RETURN Y O U * l O M I I TO T W I A l O V l OBa>MiZATO>N. BtTURN C O i m e T t B FORM TO ADDRISS SHOWH A T M T T O D I OF FORM.

SECTION I rro

eempbM

ty HKrviting

StrvictI 4. PLACE Of BIRTH

2. NAMEOF A F P U C A N T f M . n . MlMKWaimO;.

DOE, JOHN CHARGES Cmr/COVNTy/STATE CBAItOES A FEB


5. OATS OF BIRTH IVYYYMMCII

6.a. RACIAL CATEGORY fXew


( I I AMERICAN IttDIANMUMA MATIVE

a
D. SIGNATURC

b.

COIMTY

"^"AVON PARK

HIGHLANDS

' ''FL

b. ETHNIC C A T C O M Y I I I HI6PAWO OR LATINO

7. SOCIAL SECURITY NUMBER

19810305
NUMBER AND

O l UWK OH AnDCAN AMEMCAN

at nor Kismtic OR LATINO

e. ADDRESS IN ADOHESgEE S JURISDICTION 'MML TD-Uontl


fiTMrr//MftMteprTnnr no.;

B. OATV9 RCSIDCD AT THIS A D D R E U

b. cjrv

33 ELM STREET
10. PERSON MAKING THIS REQUEST
NAME ILtSt, First, Middh fJame/s})

ROCKVILLE
RANK

' MD^

"2O852

lYYYYMMDOl

20060103

(b) (6), (b) (7) (C)

BASLER. MICHAEL
SECTION II (To b6 eomphttd bv Applkmi^}

SFC

d. TITLE

U.S. ARMY RECRUITER

PRIVACY ACT STATEMENT AUTHORITY: TitiB 10 United States Code, Sections B04, SOS, 908, ind 12102; E.O. 9397. PRINCIPAL PURPOSE: To determine eligibility af a prospective enlixtee in the Armed Fofces of the United Statee. ROUTINE USES: Information collected on thix form mey be released to lew enforcement agcrtclei engaged In A e investigation or proeeeutien of a criminal act or the enforcement or implementation of a statute, rule, reguledon or order; to any component of tha Department of Justice for the purpose of representing the DoD. DISCLOSURE: Voluntary; however, failure of the applicant to complete Section II may result in refusal of anlktment in the Armed Forces of the United States. The data ara for OFFICIAL USE ONLY and wilt be maintained end used in strict confidence in aocordance with Federal law and regulations. Making a knowing and willful false statement on this DO Form 368 may be punishable by fine or imprisonment er both. All information provided by you, which possibly may reflect adversely on your past conduct and parformance, may have an adverse impact on you in your mill, tary career In situations such ae oonalderation for special asaignment, security clearance*. Court martial and admintstfatlve proceedings, etc. 1 1 . 1 HEREBY CONSENT T O RELEASE FROM YOUR FILES THE INFORMATION REOUESTED BELOW. SECTION III (To ba comfil*td by Polinf or Jyvenilv Agtncy} The person described above, who claims to have resided at the addms shown above, has applied for enlistment In tha Armed Forces of the United States. Please furnish from your files the information relativs to Section III below. A return envelope Is provided for your convenience Z. HAS THE APPLICANT A P 6 L l t { OR JUVENILf BECflRD. TO INCLUDE WlNON TRAFFIC VIOLATIONS'* tlf YES. wht wat th offvnsf or chtrge, date, itisfioaition and tttittnoe?) SIGNATURE

The following agency charges a $18.00 fee, for arrest/convictloa Infortnaiion, letter on file at the Bali. Rctg. Bn dated 16 May 0; Maryland State Police
13. IS APPUCANT NOW UNDEROOINa COURT ACTION OF ANY KIND? (If YgS, givt dttHa.l

TEJ^ CJ"
"CT
-[XJli

THIS IS TO CERTIFY THAT THE A80VS DATA AS CORRECTED ARE TRUE AND CORRECT ACCORDING TO THE RECORD ON FILE IN THIS OFFICE. THIS INFORMATION IS CONFIDENTIAL AND CANNOT BE USED IN ANY OTHER MANNER EXCEPT FOR OFFICIAL PURPOSES. 14. DATE fXyy/AWOO; I B . TITLE 16. VERIFIED BY ISIsmwnl

20061104

U.S. ARMY RECRUnHER


RECRUITING AGENCY MAIL FROM:

LAW ENFORCEMENT AGENCY MAIL TO;

[Maryland State Police 1201 Reistertown Road Plkesville, ;. MD2I208 MD2I2C

n
J

1 J
FommwAdobt PiotoMXWl 6

STATION irriNGST, ROCKVILLE RECRUrril ,40 611 ROCKVILLE PIKE, ROCKVILLE, MD 201

DD FORM 3 6 9 , O C T 2 0 0 5

FREVIOUS EDITION IS 0BS0LFT6.

"wy

.^.0%%.
Tuesday, Date 2007-08-28 Time 15:28 Type SCAN Job # 01079 Length 0:18 2007-08-28 Speed 24000 15:29 Pgs 1 Status OK V . 3 4 1M31 S t a t i o n Name/Number 14107615228

BATE Of neiUEiTPOLICE RECORD CHECK

'""imioi

Fonn Approved 0704-0007 OMB Na. Expirat Oer 3?, 200S

Tha pjblic raportir^ eVMO T O T MUvebcn of infomMt ;lwg oxiarng * sourovs^ BMharkr^g nd TWlmHT.fi; tha IISIB noodod, tnd competing OP, 'Mluding uBsanwnc fo- racucmg -.ha fr.ranT W tr Dap^rtma/Y of D a f f w . eoco:rvB Sruic OitKtofatS IO30i-(S)C7ifcispooerT-.sanoyM M awtfa tfi notwittcwndiiM any .nfernit^r, - ' ' riat diipimy aj'Tontly vmkd OMft corcrol numWf, vBion of nc pamin cSall Bo subpci to any pa^Kv f y ftllint la aftMMv witn a ootloction of 'rrTofmaiior If l( PLEASE DO NOT RETURN Y O U * FOAW TO THE ABOVE ORGANIZATION. RETURN COMPLETED FORM TO ADDRESS SHOWN AT W T T O M OF FOAM. SECTION 2. NAME \ (To 06 completed OF APPLICANT ILaer by Rfciuiiing Ssrvice} AIMf 4. P L A C E OF B I R T H

Fust. MiiJdIe Namtlsl.

DOE. JOHN CHARGES cm/COVNTY/STATE CHARGES A FEE


5. DATE OF BIRTH 6.a. RACIAL CATEGORY Womiw/w/.; IVYYVMIADDI (1} AMERICAN INOIANfALAeKA NATIVE

"^HvON P A R K

b. COUNTY

e. STATE

HIGHLANDS
NUMBER

FL

b. ETHNIC CATEQOflY (11 HISPANIC OH LATINO IA) HOT HISPANIC OH LATINO bMakI d . ZIP CODE

7. SOCIAL SECURITY

19810305
S. . ADDRESS WJMBin

IT

a i gLAGK OH AFHtCAN AMEtUCAN JURISDICTION ap^fTTtam n -MAIL TO'

IN ADDRESSEE'S AHO eTKtT fiMiudc

a. DATES RESIDED AT THIS A D 0 R 6 M

(b) (6), (b) (7)(C)


a.

ROCKVILLE

MD"

20852

(YYYrMMDDl

20060103
NamelaU

(b) (6), (b) (7) (C)

fVYYVMMOOi

1 0 . P E R S O N M A K I N G THIS REQUEST NAME (Last, Firwt. Middle

BASLER. M t C H . ^
SECTION II . (To Ac eomplttfid bv App^kar}!)

** gp^

c.

SIGNATURE

i . TITLE

U.S. ARMY RECRUITER

PRIVACY A C T S T A T E M E N T AUTHORITY: T i d s 1 0 U n i t e d S t a t e s C o d e , S e c t i o n : 5 0 4 , 5 0 5 , 5 0 8 , a n d 1 2 1 0 2 ; E.O. 9 3 9 7 . P R I N C I P A L PURPOSE: T o d e t e r m i n e e l i g i b i l i t y of a p r o s p e c t i v e enlistee in t h e A r m e d F o r c e s o f t h e U n i t e d S l a t e s . R O U T I N E U S E S : I n f o r m a t i o n c o l l e c t e d o n t h i s f o r m may be r e l e a s e d t o l a w e n f o r c e m e n t a g e n c i e s e n g a g e d in t h e i n v B E t i g a t t o n or p r o s e c u t i o n of a c r i m i n a l a c t o i t h e e n f o r c e m e n t or i m p l e m e n t a t i o n of a s t a t u t e , r u l e , r e g u l a t i o n or o r d e r ; t o a n y c o m p o n e n t o f t h e D e p a r t m e n t of J u s t i c e f o r t h e p u r p o s e of r e p r e s e n t i n g t h e D o D . D I S C L O S U R E : V o l u n t a r y ; h o w e v e r , f e i l u r e o f t h e a p p l i c a n t t o c o m p l e t a S e c t i o n 1| m a y r e s u l t in r e f u s a l of e n l i i t m a n t i n t h e A r m e d Forces o f the United States. T h B d a t a a r e f o r OFFICIAL USE O N L Y a n d w i l l be m a i n t a i n s d a n d u s e d in S t r i c t c o n f i d e n c e i n a c c o r d a n c e w i t h F e d e r a l l a w a n d r e g u l a t i o n s . M a k i n g a ten o w i n g a n d w i l l f u l false s t a t e m e n t o n t h i s DD F o r m 3 6 6 m a y be p u n i s h a b l e b y f i n e o f i m p r l a o n m e n t er b o t h . A l l i n f o r m a t i o n p r o v i d e d b y y o u , w h i c h p o s s i b l y m a y r e f l e c t a d v e r s e l y on your p a s t c o n d u c t a n d p e r f o r m a n c e , m a y h a v e an a d v e r s e i m p a c t o n y o u i n your m i l i t a r y c r r i n s i t u a l i o n a s u c h as o o n a i d e r a t i o n for special a d s i g n m t n t , s e c u r i t y c l a a r e n c e s , c o u r t m a r t i a l a n d a d m i n t s u a t i v e p r o c e e d i n g s , e t c . 11. I HEREBY CONSENT T O RELEASE F R O M YOUR THE INFORMATION REQUESTED SECTION III - fTo bo compitTtd by Pohc9 BELOW. Agtncy} FILES SIGNATURE

or Juvenih

T h e p e r s o n d e s c r i b e d a b o v e , w h o c l a i m s t o h a v e resided at t h e a d d r e s s s h o w n a b o v e , h a s a p p l i e d f o r e n l i s t m e n t In t h e A r m e d Forces o f t h e 1 1 b e l o w . A r e t u r n e n v e l o p e is p r o v i d e d f o r y o u r c o n v e n i e n c e . United Stetes Please f u r n i s h f r o m y o u r f i l e s t h e i n f o r m a t i o n r e l a t i v e t o S e c t i o n 1 12. HAS THE APPUCANT A POLICE OR JUVENILE Of chtrffe, date, tlf YES. vvAaf WAS the affansw RECORD. TO INCLUDE MINOR disfxxs/tion and santenae?) TRAFFIC VIOLATIONS?" I X I YE6 I I NO

The following agency charges a $18.00 fee, forarrcst/conviction informarioo, letter on file at the Bali. Rctg. Bn dated 16 May 0' Maryland State Police.
13. IS APPLICANT NOW UNDERGOING COURT ACTION OF ANY KIND? {If VS, ff/ve dswis.i

"CT

T H I S IS T O CERTIFY T H A T T H E A B O V E D A T A A S CORRECTED ARE T R U E A N D C O R R E C T A C C O R D I N G T O T H E R E C O R D O N FILE IN T H I S OFFICE. T H I S I N F O R M A T I O N IS C O N F I D E N T I A L A N D C A N N O T BE U S E D IN A N Y OTHER M A N N E R EXCEPT FOR O F F I C I A L P U R P O S E S . 14. DATE l Y Y v r m / D D i 15. T I T L E 16. VERIFIED BY ISisnnunl

20061104
MAIL TO;

U.S. ARMY RECRUITER


RECRUITING AGENCY MAIL FROM:

L A W ENFORCEMENT AGENCY

[Mar>'land State Police 1201 Reisteno Road Plkesville, MD 21208

n
ROCKVILLE RECRUITING STATION 611 ROCKVILLE P I K E . " 4 0 ROCKVILLE, !vID 20850

n
L

o >
TI

O tn

S g
tn g

30

PZ g
en to -0 H c c 30 (A "O

m
o o
H g

to

<sl r

0\

55
m l Z

vl O WI

c n

(> (O CO

ii
> lo

9
o o

Kl
\ o
33

~R

n
ON
-O H O O

^ i
^
(jN

m>
I

33 O

I 3
? <
w' o "O 3"

O a-

ii
>
tn tn

0
n o
z! S

^1

% o
-n 0)

!1

1
Z I

I c -< z (g n

V 30

5 q
Z H 33 Z

n z
I o m X cn - I

Is
I < D ^

gg

n
z o 6 o

>

i (/)
o

8
O D-

-D H

I w C D i 2
n

>
o
33 g

s.

o o

I
3 D >:

>
0 ^ o 1 m I C O H

- o g.;

> <
m C tn

;>

n o g g
H

z o o n
O

c n o

>
(b) (6), 0 (b) (\ (7) (C)
cn 33 cn o o

g
^ C :

cn

S nc

o tn tn z

a o

>
H X O ro n

EN

:r
3 =k CJ o o

o
% 3D

> z H C 9 33

8
O

t
, 3" cu 3

a>

-0 H O o

CA

> .5>

I
< 3"
D-

I s; S 9: o
3^2.

P
O O 3 g

5 - 2
H-O

^::<

z o 6 o

1 1
cn -t

3 if

I III
s -
? 01 o
Z o o 3 C Q. cr. t r

D H
o o

8
!

***FOR OFFICIAL USE ONLY***~


MODIFIED AUTOMATED DA FORM 5286-R INDIVIDUAL TRAINING RECORD FOR BASIC COMBA TRAINING BASIC COMBAT TRAINING (BCT)/0NE STATION UNIT TRAINING (OSUT)/ ADVANCED INDIVIDUAL TRAINING (AIT)
NAME: (LAST, FIRST, Ml): PVT Bradley J. Manning ORGANIZATION: C C O 2 - 1 0 I N NEW START: UNIT DATE TRAINING WEEK REASON INSTALLATION: Fort

(6), (b) (7) (C) Leonard Wood, MO

S S N :(b)

CONSTRUCTIVE CREDIT GIVEN/DATE: REASON: POI SUBJECTS TRAINED / TESTED: BCT / OSUT PHASE 1 - III REQUIREMENTS: (1) Pass the APFT - 150 points minimum (50 per event) BASIC COMBAT TRAINING DATE COMPLETED / SCORE

8 Mar 08 RAW POINTS SEE PT CARD SEE PT CARD SEE PT CARD 21 Feb 08 13 Mar 08 17 Mar 08 28 Feb 08 29 Feb 08 YES 30 Jan 08 1 Feb 08 20 Mar 08 25 Feb 08 25 Feb 08 21 Mar 08 27 Feb 08 NA 8 Feb 08 YES YES 10K-17 Mar 08
FTX 2 FTX 3

Pushups: Situps; Run; (2) Qualify w/ith individual weapon;

GO GO GO GO GO 00 00 00 GO 00 GO GO 00 GO GO GO GO GO 00 00 GO GO GO GO

a. Convoy Live Fire b. MDF 1/2/3 c. All BTT events to Include BTT 4 d. Arm 1-4 (3) Complete Obstacle and Confidence a. Confidence Tower; b. Confidence Obstacle c. Conditioning Obstacle Course; (4) Complete Bayonet Training; (5) Complete Pugil Training (6) Complete Hand to Hand Training (7) Throw two live Hand Grenades: (8) Negotiate the Hand Grenade Qualification (9) Complete the Protective Mask Confidence (10) Demonstrate understanding of and willingness to live the Army's seven core (11) Demonstrate capability to operate effectively as a team (12) Complete all required foot and tactical road (13) Complete all required Tactical Field Training and Field Training Exercises (FTX) (a) All STX Training 1-6 (14) Receive training to standard in all mandatory FTX 1

YES FTX 3-14 Mar 08 14 Mar 08

YES GO INDIVIDUAL HAS SATISFACTORILY COMPLETEpJFHE-flEQUIRMENTS OF THE TRAINING PROGRAM NOTED A B O V E ( ^ ^ e p t noted on this form)
Signature of Training Officer / Date

Alexandre E. Wels, CPT CM

c^t_^^==^^^\

3 Apr 08

4
DATE; 2008/01/15 13:56:44 DODAAC: W58CEV CENTRAL ISSUE FACILITY - EORTi-MoNARD WOOD -tSENERiC WORKSHEET PAGE 1 OF 1 CIF CODE; NW4500

SSN/PID:(b)

(6), (b) (7)(C)

NAME:

/V\^MMTN(j.^^ftmH'^
MENU: ACH - ACH WINTER

RANK:

PVJf

UIC;

ST

UN

NOMENCLATURE

AU

PCS TRANS SIZE CIC

ISSUE" CCA CCB TOTAL

B13907 B14729 P17415 P05813 T38070 YY1596 YY1597

BAG BARRACKS: COTTON BAG DUFFEL: NYLON DUG PONCHO WET WEATHER: C PARKA: W/ET WEATHER WO TROUSERS; WET WEATHER COATJSLISTTRNG TROUSERS JSLIST CANTEEN WATER; PLASTl CANTEEN WATER; PLASTl COVER WATER CANTEEN: COVER WATER CANTEEN: CUP WATER CANTEEN; ST CASE FIELD FIRST AID OVERSHOES BOOT COMBAT GAITER; NECK POLYPROP LINER COLD WEATHER CO MITTEN INSERTS; WOOL/ MITTEN SHELLS: COTTON SWEATER MAN'S: WOOL 0 BELT INDIVIDUAL EQUIP FIELD PACK: COMBAT NY VEST; INDIVIDUAL TACT COVER,HELMET,UNIVERSA HELMET; ADVANCED COMB FRAME FIELDPACK:W/S

N N N N N N

N
N N N N N N N

'^^Qi IGH"

A-~) C96399 4 - ^ C96536

p6rr-^"oii7
^Q-p.A^F30391 4 5 5 6 6 6 6 6 7 7 7 8 8 9 F54817 D64043 N39848 G39744 L70172 M52555 M53240 S75621 B59567 H39835 ' V02073 DA1599 H53175 H90705

1 1
T

N
N N N N N

N
N N N N

4
A

<>R
I ACKNOWLEDGE RECEIPT OF THE ITEMS LISTED HEREON. I AM AWARE OF MY RESPONSIBILITY TO MAINTAIN THESE ITEMS IN SERVICEABLE CONDITION AND THAT I MAY BE HELD PECUNIARILY LIABLE FOR ANY ITEMS WHICH ARE LOST OR DAMAGED DUE TO MY NEGLIGENCE OR MISCONDUCT

^
SIGN/TTURE & DATEI END REPORT

JAN

zy

Personal In Nature

inpVIDUAL CLOTHING RECORD


DA FORM 3078 (IRM Control Panel Version)

For Official Use Only


CUP Fort Leonard Wood Date Approved 03/04/2006 Roster Number: 021 010 Phone Number: 573-596-0286

f/diffe "sSN Grade Category

(b) (6), (b) El (7)(C)

MANNING, BRADLEY EDWARD Issued By Supply & Services I Authorized By: PAR 4-2, AR 700-84/CTA 50-900 R Approved By Denver Williams Type Issue; Template: PGC 00312 01672 01724 01834 01941 01942 02111 02113 02120 02195 02275 02276 02277 02303 02406 02601 02603 02621 02622 02624 02625 02843 02882 02926 02943 02978 02979 02980 02982 02984 02985 02989 03041 03044 03098 03140 10096 10308 17241 17264 17632 17668 26095 27783 28091 29294 93664 PHIAAFW Item Description undershirt, ctn v/hite crewneck shirt, man's, quarter length sleeve beret, man's, black gloves, men's and women's drawers, cold weather undershirt, cold weather coat, all-weather gloves, men's and women's shirt, man's trousers, men's sock liner, poly/nylon, black drawers, cold weather undershirt, cold weather shoes, men's headband, ground troops t-shirt, athlete's S/S t-shirt, athlete's US jacket, pfu pants, pfu sweat shirt sweat pants coat, man's sock, boot green,medium Boot, Combat, HW Boot, Combat, Temp trousers, acu coat,acu cap, patrol, army acu t-shirt, athlete's, sand pad elbow pad knee Coat, CW ACU belt, riggers, sand drawers, men's sand glove inserts, cold trunks, general purp necktie bag, barracks cover, id, personnel necklace. Id personnel bag, duffel towel, bath buckle, clip, end str belt, trousers, bik gold clip insignia, BofS cap, synthetic, green flag velcro Insignia Qty Authorized Issued 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 2 2 7 7 1 1 1 1 1 1 1 1 3 3 2 2 1 1 1 1 2 2 2 2 1 1 7 7 1 1 1 1 4 4 4 4 2 7 7 1 1 1 1 1 1 1 1 7 7 2 3 3 1 1 1 1 1 1 1 1 1 1 4 4 1 1 1 1 2 1 1 3 3

Size small 14 1/2 7 6c small small 38 xshort 2 15x32 30 regular 10-13/M small small 6EEE headband new small small sm reg am short small small 37 xshort medium 7 wide 7 1/2 wide xsmall short xsmall xshort 7 1/8 small xsht short xsht short SXS 40 28 S/2 medium necktie bag barracks tag cover ID necklace bag duffel towel bath buckle clip belt trouser b.o.s collar one size flag velcro

Total Prior Cost Issues Issue Date $5.20 0 03/04/2008 $25.80 0 03/04/2008 $19.70 0 03/04/2008 0 03/04/2008 $17.40 $9.15 0 10/04/2007 $8.95 0 10/04/2007 $83.95 0 03/04/2008 0 10/04/2007 $15.35 $16.50 0 03/04/2008 $71.70 0 03/04/2008 $6.65 0 10/04/2007 $10.00 0 10/04/2007 $11.55 0 10/04/2007 $36.65 0 03/04/2008 $6.72 0 10/04/2007 $18.60 0 10/03/2007 $15.70 0 10/03/2007 $53.05 0 03/04/2008 $28.15 0 03/04/2008 $13.50 0 10/03/2007 $15.70 0 10/03/2007 $95.25 0 03/04/2008 $15.75 0 10/04/2007 $74.35 0 10/04/2007 $100.70 0 10/04/2007 $142.80 0 10/04/2007 $147.20 0 10/04/2007 $13.60 0 10/04/2007 $31.15 0 10/04/2007 $1.40 0 10/04/2007 $1.05 0 10/04/2007 $65.40 0 10/04/2007 $3.15 0 10/04/2007 $12.95 0 10/04/2007 $3.20 0 10/04/2007 $31.50 0 10/03/2007 $4.40 0 03/04/2008 $8.84 0 10/03/2007 $0.22 0 10/04/2007 $0.50 0 10/04/2007 $18.00 0 10/04/2007 $10.00 0 10/03/2007 $4.55 0 03/04/2008 $2.25 0 03/04/2008 $1.94 0 03/04/2008 $4.55 0 10/03/2007 $1.65 0 10/04/2007

Name

>

SSN ^
Ljrade

Category

MANNING, BRADLEY EDWARD & Sen/ices I Issued By (b) (6), (b) # ' 2, AR 700-84/CTA 50-900 El Authorized By (7)(C) PAR4-: R Approved By Denver Williams Type Issue: 1 & 2 Template: PGC Size PHIAAFW Item Description Qty Authorized Issued

CUP Fort Leonard Wood Date Approved; 03/04/200 Roster Number: C21 010 Phone Number (b) (6), (b)

(7)(C)
Total Prior Cost Issues Issue Date

PGC

Size

Items Due Out to M e m b e r Item Description

Qty Due

Cost

SOLDIER RESPONSIBILITIES A. You will have in your possession, in a serviceable condition, at all times the items and quantities of Clothing indicated in the issue columns of this form. Safeguard your uniforms at all times. B. Retain a copy of this form, you must show proof of nonreceipt for items not issued to you, during initial processing in order to receive these items at a later date. EXCHANGES / ALTERATIONS OF MISFIT CLOTHING A. Exchanges or alterations of misfit clothing, after initial issue, must be made within 6 months of date of issue. Misfit footwear must be exchanged with 90 days of issue. B. You are discouraged from making unauthorized alterations to these uniforms. Garments that have undergone unauthorized alterations will be replaced at your expense. STATEMENT I acknowledge that I have received the articles herein, in the quantities indicated, that they are for my own personal use and I will not dispose of them by sale, gift, loan, trade or pledge to unauthorized personnel.

TOTAL VALUE OF ITEMS ISSUED TO SOLDIER Organizational Individual TOTAL

22.32 1,264.00 1,286.32

SIGNATURE OF MEMBER

DATE

3?r^
PERSONNEL INFORMATION SHEET (Please Print Clearly)
DATA REQUIRED BY THE PRIVACY ACT OF 1974: AUTHORITY: Section3013, Title 10, use. PURPOSE: Permanent historical document pertaining to the individual shown thereon during the period of assignment/attachment to this unit. ROUTINE USES: This form provides the unit clerk with personal information which, in conjuction with appropriate source documents, enable the unit clerk to prepare any personnel action on your behalf. COMPLETING THIS FORM IS VOLUNTARY, FAILURE TO DISCLOSE THIS INFORMATION WILL RESULT IN NO DESCIPUNARY ACTION.

NAME (Last, First, Middle)

RANK

SSAN

/V\Wl^(o,S(iM)LapwAH)
WEIGHT HEIGHT EYES HAIR BLOOD TYPE

el
PVT ^UM)^
PLACE OF BIRTH

(b) (6), (b) (7)(C)

ETHNIC GRO

<3>3l^&j
AGE DATE OF BIRTH

BLIK.
(Day, Month, Year)

o ?o5

CNc^$5*>^ C A T H O L I C
DRIVERS LICENSE?gWs (If yes, which stiterf DNO

OKLAHfl>iKCXT^ ^ o ^ L A H O / i A
COMPONEN^r NG ER a i RA DATE OF ENLISTMENT NUMBER YEARS ETS DATE

%ocr xoon
PRIOR SERVICE (Years)

4
LAST UNIT Phone Number and

PLACE OF ENTRY ON ACTIVE DUTY (City, State)

MM^^pm

X OcX ^off 1^3^ /?M

^K^It^adi^fAO
NG/ER HOME UNIT

DATE OF ENTRY ON A C T I V E DUTY

0. OCT
(b) (6), (b) (7)(C)

aoo^
NOTIFY (Name, Relationship,

IN CASE OF EMERGENCY

Address)

STATUS OF PARENTS Living Divorced

X 3 Separated Deceased and

NEXT OF KIN:

Mother

Father

(Name and Address)

^Ll|\iU ih|\Nv)%iJk,
Address

(b) (6), (b) (7)(C)


NO. CHILDREN COLLEGE GRAD? []Yes (If yes, degree?) B^No

NAME OF WIFE

(First, Maiden

CIVILIAN EDUCATION completed)

(Grade

ENLISTMENT GUARANTEE

HlbW^w^
DEP ID DEP ALLOTMENT

^9-H(7(X)
(Please Complete Following correctly) YOUR ID SOCIAL SECURITY CARD DOG TAGS ALLERGY TAG

i^s
CIVILIAN SKILLS " ^ ^ ^ U ^ WEAR GLASSES

YtS
NEED GLASSES

XtS
PHYSICAL DEFECTS (Continue in Remarks)

ht^WIH6E!nVT^O>H>OV\,\l^
WORK IN A LEADER- DESCRIBE LEADERSHIP POSITION SHIP POSITION

AA^-WN^K
SIGNED UP FOR AIRBORNE TRAINING

CsvJitfMx^ ^
PERSONAL PROBLEM

^VKl^T

IMMJAG^.^^

Jvim

MANAr^ri)

(Continue in Remarks)

.REMARKS

'.Continue on Reverse)

DATE

SIGNATURE

"^IJW

-7:^":^

Personal Data Sheet


AUTHORITY: PURPOSE: ROUTINE USES: VOLUNTARY. Title 5 USC, Section 301 (1970) Temporary supplemental document of SIDPERS- Personal Data Card pertaining to the individual during period of assignment for Basic Combat Training This form provides units with personal background information which enables the unit to screen the soldier for potential problems, used in recording of other personnel management data not otherwise shown elsewhere, Voluntary disclosure of SSN is to properly identify the individual. This information will not be released to 3'" parties. MANDATORY OR VOLUNTARY DISCLOSURE AND EFFECT OF FAILURE TO PROVIDE INFORMATION Lack of information or only partial information will hinder the unit's ability to aid the trainee if problems arise and the cadre is unaware of any background information. Charlie Co 82 Chem BN, S^Chem BDE 451 Colorado Ave, Unit 32 Fort Leonard Wood, Mo 65473

Print in Black Ink Only For all dates use this format dd/mmm/yy (02 Feb 02)
Name: (Last, First, Middle)

/YIMoMlNO, BRADIO ^o^m PVf


(b) (6), (b) (7)(C)
Rank Permanent Address

(b) (6), (b) (7) (C)

frW
Platoon

ONXrCD STAINS OkL4HoMK


Country and Sale of Birth

F A T H C R
Who raised you

(b) (6), (b) (7)(C)


Hpmephpue number NOK phone number Widowed

(b) (6), (b) (7)(C)


Martial Status:

BvTHi:ii
NOK relationship

(b) (6), (b) (7)(C)


Separated

Married Y ( 2 )

Children Y ( N ] ^

Child Support Y < ^

Csingl^ Married

Divorced

Dependents Names/Ages/Relationship BASD: Blood Type:

wAGender: Arrival Date: Prior MOS Date of Rank: u s Citizen Country: Religion: N Date of Birth:

og^ccr Aoo9
ETS: Previous Job:

olocr%)i 1
Weight:

Drivers license:^) N Component: State of issue: /^j^J^^y NG / Security Clearance MEPS Station

o posirrv^

MALE AR

O^ex-T^otO OaocTQoo'^ ifA


Race:

^ OEC a o o 9
Hobbies:

(V/A
Vegetarian: Y i ( g )

STAtlSo:K5
Height:

^sm*m^
Hair Color: Eye Ed Level dED^^Deg

^^LTlMofK^
Tattoos:

wWIT^
What Allergies: Military Training:

KDMLNCTblTM
jj/^V .

^^;rA
Glasses:

(oAlk$ BIOAA
Op^^^erts: *EM

i&

Y/(B)

Allergies: Y %

g)N

Degree / Credit Mrs

NQ^S.
National Guard Unit Address

*JofJ[
Guarantees: Ranger / Airborne / Station of Choice Station of Choice: ^ ^ ^ ^ ^

Split Option: SPI / SP2 RECLASS

AR / NG State

K)o(J
Do Do Do Do you you you you have have have have

^jk

p/A
i^m
YKR>
YA / Do Do Do Do you you you you

your ID Tags Allergy Tags ID Card your Optical Inserts

have have have have

your Ear Plugs your lET Handbook (Volume 1 and II) a Flashlight two pair of military glasses

CY^N
N

07 N Y/(fg,

Have you ever been assigned to the PTRP Have you ever been assigned to FTU For What event: Are you a single parent Are you married to another service member Are they your next of kin Are you enrolled in the Married Army Couples Program Have you applied for Joint Domicile Spouses Rank / Name: ti/N Spouses Duty Station: (j/fk Spouses Unit: U/A Spouses SSN: (!J//V

YI0 Ym YCS yKm


Y<?^

Have you ever served in the military before Did you receive an administrative discharge What type of discharge: ELS/EPTS/CH15/CH13/CH17/OTHER Have you ever been convicted of a felony If so for what Are there any warrants for your arrest Do you have any unpaid speeding tickets Have you ever been treated in a mental facility If so so tor for what: what: It Do you have any diagnosed phobias If so what:

Y/SJ> YW Y<S) Y/(S> ^

Did you bring with you a Cellular Phone? Did you enroll into the Penn Laundry Program? Do you have any JROTC/ROTC experience? Do you have any family members on Active Duty? Do you have any family members deployed to OIF/OEF? Are you enrolled on AKO and what is your username? Did you enroll in TRICARE and what version? Do you own a car and did you bring it with you? Do you have any custody issues with your family? Are you missing any luggage from your trip to FLW?

(J/ N

Model:

^AAfJOlJ 6 ^

QtJ W iJAWW

Y / E x p l a i n : Y Y /(fi^ Y N Y Y^SJ Y Yifi) Explain: Explain: Explain: Print: Explain: Explain: Expla Explain U^f^kiOiVK}

In the Space provided below will be utilized to record information about the soldier, which the chain of command can use to better, evaluate the individual soldier. As a Minimum the following information will be provided: Name and Age Any personal or emotional problems that you have Home city and state encountered A little information about yourself and your upbringing Your reason for joining the military A little information about you family Your short term and long term goals during your training

hAwmf^At>i-iH 1 LohS

fbroiu^c MAftYMKfe AMO cficscm' ojrLjM^ot^d' f^f^^\Lf /^oi>f Uo*^&) TO 6KLArHawA-j@$^^^ LTUgp Tf-}iP-6 DtoTFL T U / A 5

n . Ttiiti r f^iuEo f.med wirw y^v /?D7j4/Ff^ /^pTiVFK TS> r?, Ts> rHri rHf^ ouim) /cro /crtvcsAo.^
DOD^ f\tir\^ if^ BACK ^ ' j o h i k Xi^ c A/ftxr^Ak''^,
V?ngj Lo 4(^(3 MiL4 ^ ^illf-cn_r<^ ir-^g, ^ -Co

r^gS
Aor4

LxsA
feQf

//^,v>j
fcr^o/f

yty

% Uio.n'i- i-o

bg

i\ ^ e H ^

0,^^^)^ A fAe 54oM- i^p/^

/.g. wor<? hu'MA/,

Did y o u b r i n g w i t h y o u a Cellular P h o n e ?

(?)/ N Y ^'I Y/ ( ^ Y 1^) N Y

Model: Explain: Explain: Explain: Explain: Print: Explain; Explain:

^ f i ^ f ^ S o f J ^ ^

H pOWJ

Did y o u enroll i n t o the P e n n Laundry P r o g r a m ? Do y o u have any J R O T C / R O T C e x p e r i e n c e ? Do y o u have any f a m i l y m e m b e r s o n A c t i v e Duty? Do y o u have any f a m i l y m e m b e r s d e p l o y e d to OIF/OEF? Are you enrolled on AKO and what is your username?

U^j^kiOU^KJ

Did y o u enroll in T R I C A R E and what v e r s i o n ? Do y o u o w n a car a n d d i d y o u b r i n g it w i t h y o u ? Do y o u have any c u s t o d y i s s u e s w i t h y o u r f a m i l y ? Are y o u m i s s i n g a n y l u g g a g e from y o u r t r i p to FLW?

Yl(^ Y/(j^

Explain: Explain

In the Space p r o v i d e d below will be utilized to r e c o r d i n f o r m a t i o n a b o u t the soldier, w h i c h t h e c h a i n of c o m m a n d can u s e to better, evaluate the i n d i v i d u a l soldier. A s a M i n i m u m the f o l l o w i n g i n f o r m a t i o n w i l l be p r o v i d e d : Name a n d A g e A n y p e r s o n a l o r e m o t i o n a l p r o b l e m s that y o u have H o m e city a n d state encountered A little i n f o r m a t i o n about y o u r s e l f a n d y o u r u p b r i n g i n g Your r e a s o n f o r j o i n i n g the m i l i t a r y A little i n f o r m a t i o n about y o u f a m i l y Your s h o r t t e r m a n d l o n g term g o a l s d u r i n g y o u r t r a i n i n g

MXUWK^KAt)LV

PoTOtiiK MAfty/l/iMo AMP

CSltScm'

I l M 4 o v i h k ^ ^ L j /Moiyf

lt>wWr 1 w/^S jjpR^) TO 6KLAHawA-jgg^%^ LTua? ffls'^^ D p T n f U/AL5 n , TH^Kl r f,TUo u T H j m T H f f l TtO T H f l OKDlTA) /CW&Do^
vC'M*^fr
Lq

BACK
j^'/p/l

-T*^

Doo5;"^/^i
f^^Cjl-Ar^^,

g^txS

//y^

/x^

')g>/ng^

4ttg

t^'l!i-c(r<\

lo

Ao [4

fetif-

/ti/>

-f-cr^o/'f

4^

yy\gs$
% Ujo.ni

rp
i-p

tf^cj
be

li'-Ge/^
e\ isH^ p,,r^ oL^r^lT A /Ae 5Aort":hr^

i.e. t^oCd

hu/yiA/i

DEPARTMENT OF THE ARMY United States Army Intelligence Center and Fort Huachuca Fort Huachuca, Arizona 85613-6000

ORDERS 193-00006 MANNING BRADLEY E (b) (6), (b) Huachuca, AZ 85613-6000(7)(C)

11 July 2008 PV2 USAICFH CO D 305TH (STU) (W1E818) Fort

The following MOS Action is directed. Awarded: PMOS 35F1O00YY Withdrawn: N/A Effective date: 14 AUGUST 2008 or upon completion of MOS training and approval of security clearance as required for your MOS IAW DA PAM 611-21. Reclassification Control Number: N/A Additional Instructions: (A) You are entitled to an enlistment bonus of $24,000.00 IAW AR 610-210, PARA 5-99 Format: 310 FOR THE COMMANDER:

DISTRIBUTION: IMWE-HUA-HRMR(l) CDR, USAICFH CO D 305TH (STU) (1) CDR, USAICFH CO D 305TH (STU) (PAC) (1) PV2 MANNING BRADLEY E (1)

^%?CA#

(b) (6), (b) (7) (C)

2s
o o

I I
a 3 2 m e- m c
tc -

tn
z

O) g

II O

<n UJ X

< 2

o - ^

>< J5 :

(b) ^ 1^ (6), (b) ^ (7) (C)


^

03

< z o o

u
il
i
0)

5 5

>,
tr 0)
0)

ID

.Q

Q:

o O g

E 3 i
H I O tn lii X
111

2
< Q E

<
z


o o
h- D.

o <
Q

Q:

IB
u o ra Q u <
Q)

1<n
LU IW d) UJ

Q:

ID
h- in X 111 12 X

o
u CO

(/)
0) (A U) 0)

I-

z H tZ
-1

< o

CO

Si

o
N

lU
z

ii
to
in

!y|

ra u >.
JZ
(A

in in

/o

; <r

n
o o

N
%

^<

^ t
to

g%

cn o> en
til Z 3

a. >, E
^
K I O cn LU X

#<c^
b
1^

o to

6 z

ii
n . CO 3 3 CL CO

_9
^

to

o o

< i
U UJ UJ a a. UJ

K O
Q

u. <

3f
C O

in

< on
3 s o o

>lAa O

H
o o

&
H

iS
X

to
LU

V
C O

?T?7
e- " > c

^ III s

<
o
C O O , 0. 0 E S

1 1 1 2

o
C O

u z

o - ^ < gl
>,j2

z o o

oD
Q O

g 3 o o
H

u
g >. .a
o
o
3

5 5

a.

<
S

UJ LU X Q

jo
!
z

C C C O

<

cr o a:


Q :
o o
03 I UJ C O X O 03

:"

tr

5 <

o
C O

: D
5 a

5=5
i- < Q E

<
Q

z z o
C O

.
o o

Z)

<
O
o o
UJ Q

<
Q CO UJ t-

ra a eu o o C O
+J

tH C A UJ H

<

Q:
o

co
CO UJ

5
a
I UJ

C A 0)

o:

<

< o
CO

K
C A C A

ii
z

a > c
UJ C O

<

^
2 O CJ


>
a o

o 5 cP A

5
(5"

^<

& t 5
a>
at CO

ra o
C A
Z

>.

o
Q

^ <

:[]
z

a> UJ

>. E

s
P

i!
Q. CO 3 3 CL CO

z
3 o

lO M

o ^

<

Z3 %o

CJ

O UJ UJ o CL UJ
CO

< i
-I

S a: o
LL

<

REQUEST AND^FHORfTY FOR LEAVE


This form is subject to the Privacy Act of 1974. For use of this fotm, see AR 600-8-10. The proponent agency is Dossier. (See InstnjctKins on Reverse)

1. CONTROL NUMBER

PART 1
1 NAME ^Las(, First, Middle Initial) 3 SSN 4. RANK

ri6' qsi^L
5. DATE

Manning, Bradley E.
( LEAVE ADDRESS (Street City State. ZIP Code and

(b) (6), (b) (7)(C)


7. TYPE OF LEAVE ORDINARY EMERGENCY OTHER

PV2
8 O R G N , STATION, AND PHONE NO

honeNo.) (b) (6), (b) (7)(C)

PERMISSIVE TOY

PCS/LEAVE
NUMBER DAYS LEAVE aACCRUED b REQUESTED cADVANCED d EXCESS

D CO 305th Ml BN FT. Huachuca, AZ 85613 520-533-8875


10. a FROM DATES b TO

14
12 SUPERVISOR RECOMMENDATION/SIGNATURE M A P P R O V A L ^ ^ ^ ^ p DISAPP|(^VAL^

14 AUG 08
13. SIGNATURE J APPg(c/lNAUT/l

27 AUG 08

TITLE OF

PT, M I , CMD
DEPARTURE b TIME c NAME/riTLE/SIGNATURE OF DEPARTURE AUTHORITY

ISTC gr>.
a. DATE b.TIME 16 a DATE b.TIME

H. Mjr.y/

EXTENSION c. NAME/TITLE/SIGNATURE OF APPROVAL AUTHORITY

RETUR SIGNATURE OF RETURN

17.REMARKS

7^/^<(2a^\ INS

r^c^(( V \
Chargeable leave is frotn to

SM IS Authorized 1 Day(s) of travel. In case d|f ah mergency, 1 will cont t my Company at1-520-533-8875 and then BN Staff Duty at 1-800-533-1533. My travel sche&iln s been submitted an any changes to my travel schedule will be provided to my unit as promptly as possible. \J

PART II - EMERGENCY LEAVE TRANSPORTATION AND TRAVEL


1 8 . Y o u ans authorized to proceed o n official travel in connection with emergency leave and upon completion of your leave and travel will return lo home station (prlocation ) designated by military ordeis. You are directed lo report to the Aerial Port of Embarkation (APOE) for onward movement to the authorized international airport designated in your travel documents. All additional travel is chargeable to leave. Do not depart the installation without resen/ations or tickets for authorized space required transportation. File a no-pay travel voucher with a copy of your travel documents or boarding pass within 5 working days after your return. Submit request for leave extensions to your commander. The A m e r i c a n Red Cross can assist you in notifying your commander of your request for extension of leave. 9 . I N S T R U C T I O N S FOR SCHEDULING R E T U R N TRANSPORTATION:

For retum military travel reservations in CONUS call the MAC Passenger Reservation Center (PRC): Should )ou require other assistance call PAP: 20.DEPARTEDUNrr 21. ARRIVED APOD 22. ARRIVED APOE (return only) 23. ARRIVED HOME UNIT

PART III - DEPENDENT TRAVEL AUTHORIZATION


25 I I (Space available or required cash reimbursable) I I ONEWAY I I ROUND TRIP (Space required) TRANSPORTATION AUTHORIZED FOR DEPENDENTS USTED IN BLOCK NO 25 DEPENDENT INFORMATION a DEPENDENTS (Lastname, Hrst, Ml) b. RELATIONSHIP c DATES OF BIRTH (Children) d. PASSPORT NUMBER

PART IV - AUTHENTICATION FOR TRAVEL AUTHORIZATION


26 DESIGNATION AND LOCATION OF HEADQUARTERS !8 DATE ISSUED 29. TRAVEL ORDER NUMBER 27. ACCOUNTING CfTATION 30. ORDER AUTHORIZING OFFICIAL (Title and signature) ORAUTHENTICATION

DA FORM 3 1 , SEP 93

EDITION OF 1 AUG 75 IS OBSOLETE

ORIGINAL 1

UMPPC V4.00

Manning, Bradley Edward

J ^ I / PEI Report - SF86

SSN: (b) (6), (b) (7)


(C)

Page 1 of 12

O f f i c e o f P e r s o n n e l Management SECURITY CLEARANCE APPLICATION Date: 09/26/2007 Standard Form 86, Sep. 95 Manning, B r a d l e y Edward

EPSQ v e r s i o n 2.2 O.M.B. No. 3206-0007 Time: 11:18 AM

SSN: (b) (6), (b) (7) (C)

1. Personal Information
Name: Manning B r a d l e y Edward B i r t h Date: 1987/12/17 Place o f B i r t h : Oklahoma C i t y , OK County: OKLAHOMA UNITED STATES Maiden Name: Work/Day Phone: Height: 5 - 2 Weight: 101.00 /\ Sex: MALE

Home/Evening Phone: (b) (6), (b) (7) H a i r C o l o r : BLOND Eye (C)C o l o r : BLUE

2. Other Names Used


NO Have you ever used o r been known by a n o t h e r name?

3. Citizenship
C u r r e n t C i t i z e n s h i p : U.S. CITIZEN AT BIRTH, NATIVE BORN Mothers Maiden Name: (b) (6), (b) (7)(C)

NO

A r e y o u now o r were you a d u a l c i t i z e n o f t h e U.S. and a n o t h e r c o u n t r y ? Passport Issuance Date: ^.

P a s s p o r t Number:

PAi-3M-f
4. Where You Have Lived
FROM TO ADDRESS (b) (6), (b) (7)(C)

1.

2006/07/10

PRES

Person Who Knows--TOtrv (b) (6), (b) (7)(C)

Phone: (b) (6) NO I s t h i s r e s i d e n c e address h a r d t o f i n d ? (b) (6)

2.

2006/04/10

2006/07/09

http://arisstleas.usarec.army.mil:8080/GC/jsp/GcPaiPeiReport.jsp

9/26/2007

Manning, Bradley Edward

^ ^ 1 / P E I Report - SF86

SSN: (b) (6)

Page 2 of 12

Person Who (b) (6), (b) (7)(C) Phone: (b) (6)

Kjxowsvou;

Pu^

NO I s t h i s r e s i d e n c e address h a r d t o f i n d ? (b) (6)

3.

2005/09/10

2006/04/09

Person WhoIfenpwa. You: (b) (6), (b) (7)(C)

Phone: (b) (6) NO I s t h i s r e s i d e n c e address hard t o f i n d ? (b) (6)

4.

2001/11/10

2005/09/09

(b) (6), (b) (7)(C) Phone: (b) (6) NO I s t h i s r e s i d e n c e address hard t o f i n d ? (b) (6)

5.

2000/01/09

2001/11/09

Person Who ) Knowa--OTr:x ^ (b) (6), (b) (7)(C) Phone: (b) (6) NO I s t h i s r e s i d e n c e address h a r d t o f i n d ?

5. Where You Went To School


YES Have you a t t e n d e d school beyond J u n i o r High School w i t h i n t h e l a s t 5 years? FROM TO TYPE/ADDRESS

HIGH SCHOOL DIPLOMA Award Date: 2005/06/09 6400 Rock S p r i n g Dr Bethesda, MD 20814-1913 \\^

g(7

http://arisstleas.usarec.army .mil:8080/GC/jsp/GcPaiPeiReport.jsp

9/26/2007

Manning, Bradley Edward


# Person Who Knows You (b) (6), (b) (7)(C) Phone (b) (6) 2. 2007/01/09

1/ PEI Report - SF86

SSN:(b) (6)

Page3ofl2

O t ^t);/-) / W^

fOCK/^

2007/05/10

HIGH SCHOOL C MILTON WRIGHT HIGH SCHOOL 13 01 N FOUNTAIN GREEN RD BEL AIR, MD 21015-2505

Degree/Diploma/Other

Award Date:
P e r s o n Who KnoWs YotT

(b) (6), (b) (7)(C)


P h o n e : (b) (6)

6. Your Employment Activities


FROM 1. 2007/01/10 TO TYPE OF EMPLOYMENT

PRES

OTHER

Your P o s i t i o n : Employer Name: Employer Address: Emp1oyer Phone: S u p e r v i s o r Name: S u p e r v i s o r Phone:

Barista Starbucks 7911 Tuckerman Lane Potomac, MD 2 0 854 O i l 301-765-a556 _ (b) (6), (b) (7)(C)

NO I s t h e j o b address d i f f e r e n t from t h e employer's address? NO I s t h e s u p e r v i s o r ' s address d i f f e r e n t from t h e j o b l o c a t i o n address? PREVIOUS PERIODS OF ACTIVITY: NO Have you worked f o r t h i s o r g a n i z a t i o n p r e v i o u s l y ? 2. 2006/06/10 2007/01/09 UNEMPLOYMENT (INCLUDE NAME OF PERSON WHO CAN VERIFY)

Your P o s i t i o n : Employer Name: Employer Addressi Employer Phone:

Unemployed (b) (6), (b) (7)(C)

3.

2006/04/10

2006/06/09

OTHER

http://arisstleas.usarec.amiy.mil:8080/GC/jsp/GcPaiPeiReport.jsp

9/26/2007

Manning, Bradley Edward

^^^1/PEI Report - SF86 ^^I/PEIReport

SSN: SSN(b) (6), (b)


(7)(C)

Page 4 of 12

Your P o s i t i o n : Employer Name: Employer Address: Employer Phone:

A s s t Manager FYE 7021 S Metr^c^rial D r i v e Tulsa, OK 74133 O i l 918 252 7399

S u p e r v i s o r Name: (b) (6), (b) (7)(C) S u p e r v i s o r Phone: ^

NO I s t h e j o b address d i f f e r e t ^ t from t h e employer's address? NO I s t h e s u p e r v i s o r ' s address d i f f e r e n t from t h e j o b l o c a t i o n address? PREVIOUS PERIODS OF ACTIVITY: NO Have y o u worked f o r t h i s o r g a n i 2 : a t i o n p r e v i o u s l y ? 4. 2006/02/10 2006/04/09 OTHER

Your P o s i t i o n : Employer Name: Employer Address: Employer Phone: S u p e r v i s o r Name: S u p e r v i s o r Phone:

I n t e r n Programer Zoto I n c 123 Shudson Oklahoma C i t y , OK 73102 O i l 650 641 0108 (b) (6), (b) (7)(C) (b) (6), (b) (7)(C)

^
NO I s t h e j o b address d i f f e r e t ^ t from t h e employer's address? NO I s t h e s u p e r v i s o r ' s address d i f f e r e n t from t h e j o b l o c a t i o n address? PREVIOUS PERIODS OF ACTIVITY: NO Have y o u worked f o r t h i s o r g a n i z a t i o n p r e v i o u s l y ? 5. 2005/09/10 2006/02/09 OTHER

Your P o s i t i o n : Employer Name: Employer Address: Employer Phone:

Server I n c r e d i b l e P i ^ z a Co 8314 E 71St T u l s a , OK 74133 O i l 918 294 8671

S u p e r v i s o r Name: (b) (6), (b) (7)(C) S u p e r v i s o r Phone: NO I s t h e j o b address d i f f e r e n t from t h e employer's address? NO I s t h e s u p e r v i s o r ' s address d i f f e r e n t from t h e j o b l o c a t i o n address? PREVIOUS PERIODS OF ACTIVITY: NO Have y o u worked f o r t h i s t ^ r g a n i z a t i o n p r e v i o u s l y ? 6. 1997/01/01 2005/09/09 UNEMPLOYMENT (INCLtlDE NAME OF PERSON WHO CAN

bttp://arisstleasusarecamiy.nTil:8080/GC/^^p/GcPaiPeiReportjsp

9/26/2007

Manning, Bradley Edward

J ^ I / PEI Report - SF86


# VERIFY)

SSN: (b) (6), (b) (7)(C)

Page 5 of 12

Your P o s i t i o n : (b) (6), (b) (7)(C) Emp1oye r Name: Employer Address: Employer Phone:

NO Were y o u i n t h e Federal C i v i l S e r v i c e p r i o r t o t h e l a s t 10 years?

7. People Who Know You Well


FROM 1. 2000/01/09 TO REFERENCE NAME/ADDRESS (b) (6), (b) (7)(C) (b) (6), (b) (7)(C)

PRES Home Address: Evening Phone:

2.

1993/09/10

PRES Home Address: Evening Phone:

(b) (6), (b) (7)(C)

3.

1993/08/10

PRES Home Address: Evening Phone:

(b) (6), (b) (7)(C)

8. Your Spouse
What i s y o u r c u r r e n t m a r i t a l s t a t u s ? NEVER MARRIED

9. Your Relatives and Associates


RELATIONSHIP NAME/ADDRESS (b) (6), (b) (7)(C)

1. MOTHER

DOB: (b) (6), (b) (7)(C) 2. FATHER

POB: UNITED KINGDOM Country o f C i t i z e n s h i p : UNITED KINGDOM Manning

http://arisstleas.usarec.army.mil:8080/GC/jsp/GcPaiPeiReport.jsp

9/26/2007

Manning, Bradley Edward

^^^1/PEI ^ ^ 1 / PEI Report - SF86


(b) (6), (b) (7)(C)

SSN: (b) (6), (b)


(7)(C)

Page 6 of 12

DOB: (b) (6), (b) (7)(C) 3. SISTER

POB: UNITED STATES Country o f C i t i z e n s h i p : UNITED STATES (b) Casey Manning (6), (b) (6), (b) (7)(C) (b) (7) (C) POB: UNITED STATES Country o f C i t i z e n s h i p : UNITED STATES

DOB: (b) (6), (b) (7)(C)

iO. Citizenship ofYour Relatives and Associates


RELATIONSHIP NAME

1. MOTHER DOB: (b) (6), (b) (7)(C) Type: OTHER C e r t i f i c a t e Number: Court: City/State: , null Comments: Mother i s n o t a c i t i z e n

(b) (6), (b) (7)(C)

C i t z . Date:

^ i Your l^ilitar^ History

N^I^ave you ever served in tbemilitary7(^If yes, provide in clironological order your military history: begin with the most recent period and include Reserves, National Guard, Merchant Marines, and Foreign Military Service.^ I^^YourEorei^n Activities Property N^E^o you have Ioreignproperty,business connections, or Itnancialinterests7 13 Your Eorei^n Activities Employment N^jAre you now or have you ever been employed by or acted asaconsultantloralbreign government, Itrm,oragency7 I ^ Your Eorei^n Activities Contact with I^orei^n governments

http://arisstIeasusarecarmy.mil:8080/GC/^sp/GcPaiPeiReport^sp

9/26/2007

Manning, Bradley Edward

^^ ^1 E I Report - SF86 ^ 1 / PPEI

SSN:(b) (6), (b)


(7)(C)

Page 7 of 12

NO Have you ever had any contact with a foreign government, its establishments (embassies or consulates), or its representatives, whether inside or outside the U.S., other than on official U.S. Government business? (Does not include routine visa applications and border crossing contacts.) 15. Your Foreign Activities - Passport NO In the past 7 years, have you had an active passport that was issued by a foreign government? 16, Foreign Countries You Have Visited YES Have you traveled outside the United States on other than official U.S. Government orders in the last 7 years? (Travel as a dependent or contractor must be listed.) Do not repeat travel covered in modules 4, 5, and 6. (Lived, worked, attended school)
FROM/COUNTRY TO/PURPOSE

1. 1999/08/01 UNITED KINGDOM

2004/08/01 EDUCATION

17 Your l^ilitary Record N^^ave you ever received other than an honorable discharge Irom the military^ 18 Your Selective Service Record YES Are youamale bom alter I^ecember31,19597
YES I f yes, have you r e g i s t e r e d w i t h t h e S e l e c t i v e S e r v i c e System? S e l e c t i v e S e r v i c e Number: (b) (6), (b) (7)(C)

i9^Yourl^edieal Record N ^ In the last7years, have you consultedamental health prolessional (^psychiatrist, psychologist, counselor, etc.^or have you consulted with another health care provider aboutamental health related conditions

http://arisstleas.usarec.army.mil:8080/GC/jsp/GcPaiPeiReport.jsp

9/26/2007

Manning, Bradley Edward

^ ^ 1 / PPEI E I Report - SF86

SSN: (b) (6), (b)


(7)(C)

Page 8 of 12

20. Your Employment Record


NO Has any o f t h e f o l l o w i n g happened t o you i n t h e p a s t 7 years? - Fired from job, - Q u i t a j o b a f t e r b e i n g t o l d y o u ' d be f i r e d , - L e f t a j o b by mutual agreement f o l l o w i n g a l l e g a t i o n s o f misconduct, - L e f t a j o b by mutual agreement f o l l o w i n g a l l e g a t i o n s o f u n s a t i s f a c t o r y performance; or - L e f t a j o b f o r o t h e r reason under u n f a v o r a b l e c i r c u m s t a n c e s

21. Your Police Record - Felony Offenses NO Have you ever been charged with or convicted of any felony offense? (Include those under the Uniform Code of Military Justice.) For this item, report information regardless ofwhether the record in your case has been "sealed" or otherwise stricken from the record. The single exception to this requirement is for certain convictions under the Federal Controlled Substances Act for which the court issued an expungement order under the authority of 21 U.S.C. 844 or 18 U.S.C. 3607. 22. Your Police Record - Firearms/Explosives Offenses NO Have you ever been charged with or convicted of a firearms or explosives offense? For this item, report information regardless ofwhether the record in your case has been "sealed" or otherwise stricken from the court record. The single exception to this requirement is for certain convictions under the Federal Controlled Substances Act for which the court issued an expungement order under the authority of 21 U.S.C. 844 or 18 U.S.C. 3607. 23. Your Police Record - Pending Charges NO Are there currently any charges pending against you for any criminal offense? For this item, report information regardless ofwhether the record in your case has been "sealed" or otherwise stricken from the record. The single exception to this requirement is for certain convictions under the Federal Controlled Substances Act for which the court issued an expungement order under the authority of 21 U.S.C. 844 or 18 U.S.C. 3607. 24. Your Police Record - Alcohol/Drug Offenses NO Have you ever been charged with or convicted of any offense(s) related to alcohol or drugs? For this item, report information regardless of whether the record in your case has been "sealed" or otherwise stricken from the record. The single exception to this requirement is for certain convictions under the Federal Controlled Substances Act for which the court issued an expungement order under the authority of 21 U.S.C. 844 or 18 U.S.C. 3607.

http://arisstleas.usarec.army.mil:8080/GC/jsp/GcPaiPeiReport.jsp

9/26/2007

Manning, Bradley Edward

^^ ^1 E I Report - SF86 ^ 1 / PPEI

SSN:(b) (6), (b)


(7)(C)

Page 9 of 12

25.Your Police Record l^ilitary Court NO In the last7years, have you been subject to court martial or other disciplinary proceedings under the Uniterm CodeofMilitaryJustice?(include nonjudicial,Captain^s mast, etc.)For this item, report inlbrmation regardless ofwhether the record in your case has been "sealed" or otherwise stricken from the record. The single exception to this requirement is lor certain convictions under the Federal Controlled Substances Act tor which the court issued an expungement order under the authority of21 U S C 8 4 4 o r l 8 U S C 3607 26. Your Police Record Other Offenses NO In the last7years, have you been arrestedfr^r,charged with, or convicted of any ofIense(s)not listed in modules21,22,23,24,or 25? (Leave out trafficfinesoflessthan^l50 unless the violation was alcohol or drug related.)For this item, report inlbrmationregardlessofwhether the record in your case has been "sealed" or otherwise stricken from the record. The single exception to this requirement is tor certain convictions under the Federal Controlled Substances Actfr^rwhich the court issued an expungement orderunderthe authority o f 2 I U S C 844orI8U.S.C. 3607 27. YourUseoflllegalI^rugsandl^rugAetivitylllegalUseofl^rugs NO Since the age o f I 6 o r in the last7years, whichever is shorter, have you illegally used any controlled substance, frir example, marijuana, cocaine, crack cocaine, hashish, narcotics(opium, morphine, codeine, heroin, etc.), phetamines, depressants (barbiturates, methaqualone, franquili:^ers, etc.), hallucinogenics (LSD,PCP,etc.),orprescription drugs? 28. Your Use oflllegall^rugs and l^rugActivityLlse in Sensitive Positions NO Have you EVER illegally usedacontrolled substance while employed asalawenfr^rcement officer, prosecutor, or courtroom officials while possessingasecurity clearances orwhileinaposition directly and immediately aflecting public sa^ty? 29. YourUseofIllegalI^rugsandl^rugA^tivity I^rugAetivity NO In the last7years, have you been involved in the illegal purchase, manulacture, trafficking, production, transler, shipping, receiving, or saleof any narcotic, depressant, stimulant, hallucinogen, or cannabis for your own intended profit or that of another? 30. Your Use of Alcohol

http://arisstIeasusarec.armymil:8080/GC/^sp/GcPaiPeiReport.^sp

9/26/2007

Manning, Bradley Edward

/ PEI Report - SF86 ^^ 0^.11

SSN: (b) (6), (b)


(7)(C)

Page 10 of 12

NO In the last7years has your useof alcoholic beverages(such as liquor, beer,wine)resulted in any aleoholrelated treatment or counseling(such as tor alcohol abuse or alcoholism)? Do not repeat information reported in EPS^Modulel9(Section21 from the SF86). 31. Your Investigation Record Investigations/Clearances C^ranted

NO Has the United States Government ever ittvestigated your background and/or granted youasecurity clearance?(If you can^t recall the investigating agency and/or the security clearance received,enter (Y) cs and lollow instructions in the help text Ibr the fields on the next screen. If you can^t recall whether you^ve been investigated or cleared, enter (N^.) 32. Your Investigation Record Clearance Actions NOToyour knowledge have you ever hadaclearance or access authorisation denied, suspended, or revoked, or have you ever been debarred from government employment? (Note: An administrative downgrade or termination ofasecurity clearance is notarevocation.) 33.Your Financial Record^^anl^ruptcy NO In the last7years, have you filedapetition under any chapter of the bankruptcy code (to include Chapter 13)? 34. Your Financial Record Wage C^arnishments NO In the last7years, have you had your wages garnished Ibr any reason? 35. Your Financial Record Repossessions NO In the last7years, have you had any property repossessed Ibr any reason? 36. Your Financial Record Ta^ Lien NO In the last7years, have you hadalien placed against your property Ibr tailing to pay taxes or other debts? 37.Your Financial Record Unpaid judgements

http://arisstleasusarecarmy.mil:8080/GC/^sp/GcPaiPeiReport^sp

9/26/2007

Manning, Bradley Edward

^^I/PEIReport SF86

SSN: (b) (6), (b) (7)


(C)

Pagellofl2

NO In the last7years, have you had any judgements against you that have not been paid? 38. Your Financial ^delinquencies 180 l^ays NO In the last7years, have you been overl80 days delinquent on any debt(s)? 39. Your Financial ^delinquencies 90 l^ays NO Are you currently over 90 days delinquent on any debt(s)? 40. Public Record Civil Court Actions NO In the last7years, have you beenaparty to any public record civil court actions not listed elsewhere onthistbrm? 41. Your Association Record l^emhership NO Have you ever been an officer oramember or madeaconfribution to an organisation dedicated to the violent overthrow ofthe United States Government and which engages in illegal activities to that end, knowing that the organisation engages in such activities with the specific intent to further such activities? 42.YourAssociation Record Activities NO Have you ever knowingly engaged in any acts or activities designed to overthrow the United States Government by Ibrce? 43.C^eneralRemarl^s NO Do you have any additional remarks to enter in your application? C^o Sul^^ect Report
RELATIONSHIP NAME

1. MOTHER POB: UNITED KINGDOM

(b) (6), (b) (7)(C)

http://arisstIeasusarec.armymil:8080/GC/jsp/GcPaiPeiReport^sp

9/26/2007

Manning, Bradley Edward

^^1/PEI ^ p i / PEI Report - SF86

SSN:

(b) (6), (b) (7)(C)

Page 12 of 12

Deceased? NO Address: (b) (6), (b) (7)(C) C o u n t r y o f C i t i z e n s h i p : UNITED KINGDOM

http://arisstIeas.usarecarmymil:8080/GC/^sp/GcPaiPeiReportjsp

9/26/2007

Standard Form 86 Format Revised September 1995 U.S. Office of Personnel Management 5 CFR Part 731, 732, and 736

Form approved: O.M.B. No. 3206-0005 NSN 7540-00-634-4036 86-111

UNITED STATES OF AMERICA


After completing Parts 1 and 2 of this form and any attachments, you should review your answers to all questions to make sure the form is complete and accurate, and then sign and date the following certification and sign and date the release on Page 10.

Certification That My Answers Are True


My statements on this form, and any attachments to it, are true, complete, and correct to the best of my knowledge and belief and are made in good faith. 1 understand that a knowing and willful false statement on this form can be punished by fine or imprisonment or both. (See Section 1001 of title 18, United States Code).
Signature (Sign in ink) Full Name (Type or Print Legibly) Manning, Bradley E Social Security Number Date Signed

20070926

(b) (6), (b) (7)(C)

standard Form 86 Format Revised September 1995 U.S. Office of Personnel Management 5 CFR Parts 731, 732, and 736

Form approved: O.M.B. No 3206-0005 NSN 7540-00-634-4036 86-111

UNITED STATES OF AMERICA


AUTHORIZATION FOR RELEASE OF MEDICAL INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink. Instructions for Completing this Release This is a release for the investigator to ask your health practitioner(s) the three questions below concerning your mental health consultations. Your signature will allow the practitioner(s) to answer only these questions. I am seeking assignment to or retention in a position with the Federal government which requires access to classified national security information or special nuclear information or material. As part of the clearance process, I hereby authorize the investigator, special agent, or duly accredited representative of the authorized Federal agency conducting my background investigation, to obtain the following information relating to my mental health consultations:

Does the person under investigation have a condition or treatment that could impair his/her judgement or reliability, particularly in the context of safeguarding classified national security information or special nuclear information or material?

If so, please describe the nature of the condition and the extent and duration of the impairment or treatment. What is the prognosis?

I understand the information released pursuant to this release is for use by the Federal Government only for purposes provided in the Standard Form 86 and that it may be redisclosed by the Government only as authorized by law. Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization is valid for 1 year from the date signed or upon termination of my affiliation with the Federal Government, whichever is sooner.
Signature (Sign in ink) Full Name (Type or Print Legibly) Manning, Bradley E Date Signed 20070926 Social Security Number

t ^ % ^ " l ^
Other Names Used

(b) (6), (b) (7)(C)

Current Address (Street, City)

State

ZIP Code

Home Telephone Number (Include Area Code)

(b) (6), (b) (7)(C)

(b) (6), (b) (7)(C)

(b) (6), (b) (7)(C)

Standard Form 86 Format Revised September 1995 U.S. Office of Personnel Management 5 CFR Part 731, 732, and 736

Form approved: O.M.B. No. 3206-0005 NSN 7540-00-634-4036 86-111

UNITED STATES OF AMERICA


AUTHORIZATION FOR RELEASE OF INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink. I Authorize any investigator, special agent, or other duly accredited representative of the authorized Federal agency conducting my background investigation, to obtain any information relating to my activities from individuals, schools, residential management agents, employers, criminal justice agencies, credit bureaus, consumer reporting agencies, collection agencies, retail business establishments, or other sources of information. This information may include, but is not limited to, my academic, residential, achievement, performance, attendance, disciplinary, employment history, criminal history record information, and financial and credit information. I authorize the Federal agency conducting my investigation to disclose the record of my background investigation to the requesting agency for the purpose of making a determination of suitability or eligibility for a security clearance. I Understand that, for financial or lending institutions, medical institutions, hospitals, health care professionals, and other sources of information, a separate specific release will be needed, and 1 may be contacted for such a release at a later date. Where a separate release is requested for information relating to mental health treatment or counseling, the release will contain a list of the specific questions, relevant to the job description, which the doctor or therapist will be asked. I Further Authorize any investigator, special agent, or other duly accredited representative of the U.S. Office of Personnel Management, the Federal Bureau of Investigation, the Department of Defense, the Defense Investigative Service, and any other authorized Federal agency, to request criminal record information about me from criminal justice agencies for the purpose of determining my eligibility for access to classified information and/or for assignment to, or retention in, a sensitive National Security position, in accordance with 5 U.S.C. 9101. 1 understand that I may request a copy of such records as may be available to me under the law. I Authorize custodians of records and sources of information pertaining to me to release such information upon request of the investigator, special agent, or other duly accredited representative of any Federal agency authorized above regardless of any previous agreement to the contrary. I Understand that the information released by records custodians and sources of information is for official use by the Federal Government only for the purposes provided in this Standard Form 86, and that it may be redisclosed by the Government only as authorized by law. Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization is valid for five (5) years from the date signed or upon termination of my affiliation with the Federal Government, whichever is sooner. Read, sign and date the release on the next page if you answered "Yes" to the question 21.

Signature (Sign in ink)

Full Name (Type or Print Legibly) Manning, Bradley E

Date Signed 20070926 Social Security Number

Other Names Used

(b) (6), (b) (7)(C)

Current Address (Street, City)

State

ZIP Code

Home Telephone Number (Include Area Code)

(b) (6), (b) (7)(C)

(b) (6), (b) (7)(C)

(b) (6), (b) (7)(C)

UNITED STATES OF AMERICA


CREDIT CHECK AUTHORIZATION Fair Credit Reporting Act of 1970, as amended

PLEASE TAKE NOTICE THAT ONE OR MORE CONSUMER CREDIT REPORTS MAY BE OBTAINED FOR EMPLOYMENT PURPOSES PURSUANT TO THE FAIR CREDIT REPORTING ACT, AS AMENDED, 15 U. S. C , 1681, ET SEQ. SHOULD A DECISION TO TAKE ANY ADVERSE ACTION AGAINST YOU BE MADE, BASED EITHER IN WHOLE OR IN PART ON THE CONSUMER CREDIT REPORT, THE CONSUMER REPORTING AGENCY THAT PROVIDED THE REPORT PLAYED NO ROLE IN THE AGENCY'S DECISION TO TAKE SUCH ADVERSE ACTION.
Information provided by you on this form will be furnished to the consumer reporting agency in order to obtain information in connection with an investigation to determine your (1) fitness for Federal employment, (2) clearance to perform contractual service for the Federal Government, and/or (3) security clearance or access. The information obtained may be redisclosed to other Federal agencies for the above purposes and in fulfillment of official responsibilities to the extent that such disclosure is permitted by law. I hereby authorize the United States Army agency for employment purposes. to obtain such report(s) from any consumer/credit reporting

Manning. Bradley E

(Print Name)

(b) (6), (b) (7)(C)

SSN)

(Signature)

^0070926

(Date)

TMENT ELIGIBILITY
(For use of this form see USAREC Reg 601-96)

APPLICANT NAME (LAST. FIRST, Ml): Manning, Bradley E


PRIVACY A C T STATEMENT AUTHORITY:

APPLICANT SSN:

(b) (6), (b) (7)(C)

ROUTINE USES: Information collected on this form will be used to determine eligibility for enlistment into the United States Army. It may be released to law enforcement agencies engaged in the investigaPRINCIPAL To determine eligibility of a prospection or prosecution of a criminal act or the enforcement or implePURPOSE: tive enlistee in the United States mentation of a statute, rule, regulation, or order, to any component Army. of the Department of Justice for the purpose of representing DOD. DISCLOSURE: Voluntary; however, failure to answer the question may result in refusal of enlistment into the United States Army. The data are for OFFICIAL USE ONLY and will be maintained and used in strict confidence in accordance with Federal law and regulations. Making a knowing and willful false statement on this form may be punishable by fine or imprisonment or both. All information provided by you which possibly may reflect adversely on your past conduct and performance, may have an adverse impact on you in your military career in situations such as consideration for special assignment, security clearances, court marital, or administrative proceedings, etc.
All YES answers must be explained cximpletely in the remarks section. If the answers include no additional information than what is listed on the SF 86 (Questionnaire for National Security Positions), write "See SF 86 Item # " in the space for "NAME AND LOCATION OF UK\N ENFORCEMENT AGENCY."

Title 10, United States Code, Sections 504, 508, and 12102.

YES

NO

1.

Have you ever been arrested, charged, cited, held, or detained in any way by any law enforcement agency (to include Juvenile Authorities, Polit Officers, Sheriff, Department of Natural Resources, Fish and Game Wardens, military police, etc.,) regardless of disposition (whether the case resulted in no charges filed, fine, probation, dismissal, or other disposition)? (This includes traffic tickets.)

DATE OF OFFENSE

NAME OF OFFENSE

NAME AND LOCATION OF LAW ENFORCEMENT AGENCY

NAME AND LOCATION OF COURT

DISPOSITION OF CASE

Have you been told by anyone (judge, lawyer, any Army personnel, family, friends, etc.,) that you do not have to list a charge because the charge(s) were dropped, dismissed, not filed, expunged, stricken from the record or were juvenile related? Have you been subject to any type of proceedings under the Uniform Code of Military Justice? (This includes courts martial, Nonjudicial Punishment, Captain's Mast, and Article 15's.) Have you ever been charged with any crime that has not been listed in any of the above questions or asked on the SF 86 (Questionnaire for National Security Positions)?

REMARKS Use the space below to explain all yes answers that have not been explained in detail on the SF 86 (Questionnaire for National

TYPED NAME OF APPLICANT (LAST,FIRST,MI)

APPLICANT SIGNATURE

DATE (YYYYMMDD)

-y

Manning, Bradley E
TYPED NAME AND RANK OF RECRUITER (LAST,FIRST,MI) RECRUITER SIGNATURE

20070926
DATE (YYYYMMDD)

Jones, Mark A
USAREC Fm 1104-R-E, Rev 1 Apr 97 (Previous editions are obsolete)

20070926 VI .00

APPLICANT NAME (LAST, FIRST, Ml):

APPLICANT SSN:

Manning, Bradley E

(b) (6), (b) (7)(C)

USAREC FORM 1104 - REMARKS CONTINUATION

USAREC FORM 1104 Remarks Continuation

Page 2

DEPARTMENT OF THE ARMY United States Army Intelhgence Center and Fort Huachuca Fort Huachuca, Arizona 85613-6000 ORDERS 193-00013 11 July 2008

MANNING BRADLEY EDWARD (b) (6), (b) PV2 USAICFH CO D (STU) 305 (W1E818) (7)(C) United States Army Intelligence Center and Fort Huachuca, Fort Huachuca, AZ 85613-6000 You will proceed on permanent change of station as shown. Assigned to: 2^ 10 DIV REPL DET (WBDAAB) FT DRUM N Y 13602 Reporting date: 14 SEPTEMBER 2008 Additional instructions: (a) Dependents: NO (b) If you ship personal property at Government expense, contact the Transportation Office at your new duty station immediately after arrival to arrange for delivery. (c) You are required to report to the Family Housing/Housing Referral Office serving your new duty station before you make housing arrangements for renting, leasing, or purchasing any off-post housing. (d) Soldier is authorized up to 14 days permissive temporary duty to participate in the Hometown Recruiter Assistance Program if indicated on an approved DA 31 signed by a LTC or above. . , (e) You are responsible for reporting to your next duty station/school in satisfactory physical condition, able to pass the Army Physical Fitness Test and meet weight standards. (f) You will submit a travel voucher for this travel to the custodian of yourfinancerecords within 15 days after completion of travel. (g) Report to building 61820, Davis Hall, room 149 (back entrance), with 15 copies of your PCS orders within 5 days of receipt to aixange for transportation appointments. (h) Leave data as stated on Department of the Army Form 31. (i) All Soldiers being reassigned are required to clear through the Housing Office. Soldiers residing in Government quarters are required to report to the Termination Section, Housing Division, Building 1415, Rhea Street, within, five days after receipt of this order. (j) You are to contact commander of gaining organization not later than 10 days after receipt of ' orders i f any special requirements exist for medical, dental, or educational facilities at next duty station. (k) You are required to forward a DA form 3955 (change of address card) with your new home address to your PERSCOM assignment manager within 30 days of arrival at your new duty. (1) Travel by privately owned conveyance is authorized from Ft. Huachuca, AZ to new duty station, (m) Early report date is authorized. (n) Losing Command/Soldier should ensure transportation arrangements are made to final destination of Watertown Int'l Airport, Watertown, NY. (o) When a CTO is available but the traveler arranges transportation through a non contract travel agent or common carrier direct purchase, reimbursement is limited to the amount the Government would have paid i f the arrangements had been made directly through a CTO.

You will start in-processing on:

At 1300 report to Clark Hall Room Al-39

1
United States Army Intelligence Center and Fort Huachuca ORDERS 193-00013 . 11 M y 2008
(p) In the event you need emergency assistance (leave extension, change in port call, family travel problems, etc) you should contact the Army travelers' assistance center at (800) 582-5552. Do not contact your losing or gaining unit.

FOR ARMY USE: Auth: N/A MDC: 1XE8 Enl/REENLB indie: NA PPD: NA PMOS/SSI: 35F1O00YY Proj specialty: NA Format; 410 FOR THE COMMANDER:

Pers con no: 99200809N090 PEBD: NA Asgd to mgt dsg: 35F1O00YY Con specialty: NA Pers scty code: NA

S^l^^^

DISTRIBUTION: IMSW-HUA-HRMR (1) CDR, USAICFH CO D (STU) 305 (1) CDR, USAICFH CO D (STU) 305 PAC (1) CDR, 2^'^ 10 DIV REPL DET FT DRUM NY 13602 (1) PV2 MANNING BRADLEY EDWARD (I)

United States Army Inielligence Center and Fort Huachuca ORDERS 193-00013

11 July 2008

(p) In the event you need emergency assistance (leave extension, change in port call, family travel problems, etc) you should contact the Army travelers' assistance center at (800) 582-5552. Do not contact your losing or gaining unit.

FOR ARMY USE: Auth: N/A MDC: 1XE8 Enl/REENLB indie: NA PPD: NA PMOS/SSI: 35F1O00YY Proj specialty: NA Format: 410 FOR THE COMMANDER:

Pers con no: 99200809N090 PEBD: NA Asgdtomgtdsg: 35F1O00YY Con specialty: NA Pers scty code: NA

t\fAMEL4AT adjutant General


% ^

DISTRIBUTION: vOGn^TlW^ IMSW-HUA-HRMR (1) ^ U Ur^., > CDR, USAICFH CO D (STU) 305 (1) CDR, USAICFH COD (STU) 305 PAC (1) CDR, 2^^ 10 DIV REPL DET FT DRUM NY 13602 (1) PV2 MANNING BRADLEY EDWARD (1)

RECOROOFEMER^E^CYOATA
PRIVACY ACT STATEMENT AUTI^ORITY: 5 U S C 5 5 ^ 10USC855.1475 to14^0^nd^771.3^USC1570.44 USC3101.andFO53^7(SSN) PRINCIPAL PURPOSES: This form is used by military personnel and Oepartment of Oefenset^ivilian and contractor personnel. t:ollectively referred to a5 civilians when applicable For military personnel, it is used to designate beneficiaries for certain benefits in the event of the Service member s death It is a l s o a g u i d e for disposition of that members pay and allowances if captured.missing or interned It also shows names and addresses of the person(s) the Service member desires to be notified in case of emergency or death For civilian personnel it is used to expedite the nt^tification process in the event of an emergency and^or the death of the member The purpose of soliciting the SSN is to provide positive identification All items may not be applicable ROUTINEUSES: None DISCLOSURE: Voluntary however.failure to provide accurate personal identifier information and other solicited information will delay notification and the processing of benefits to designated beneficiaries if applicable. INSTRUCTIONS TO SERVICE H^E^^ER This extremely important form is to be used by you to show the names and addressesofyourspouse.children.parents.and any other person(s)you would like notified if ^out^ecomeacasualty (other family members or fiant^e). and. to designate beneficiaries for certain benefits if you die ITISYOUF^ RESPONSIBILITY tt^ keep your Record of Emergency Oata up to date to show your desires as to beneficiaries to receive certain death payments, and to show changes in your family or other personnel listed.tor example.asaresult ofmarriage civil court action death or address change INSTRUCTIONS TO CIVILIANS This extremely important form is to be used by you to show the names and addresses of your spouse, children, parents and any other person(s) you would like notified if you becomeacasualty Not every item on this form is applicable to you This form is tised by t h ^ O e p a r t m e n t of O^fen^e(OoO) t o expedite notification in f h e o a s e o f e m e r ^ e n t ^ l e ^ o r d e ^ t h . It does not havealegai impact on other forms you may have completed with the OoO or your employer

IMPORTANT: This f o r m is divided into two sections: Section 1 - Emergency Contact Information and Section 2 - Benefits Related Information. READ THE INSTRUCTIONS ON PAGES 3 AND 4 BEFORE COMPLETING THIS FORM. SECTION 1 - EMERGENCY CONTACT INFORMATION 1. NAME (Las;. F/rs( Middleinitial) 2. SSN

M ANIM ING. BRADLEY. E


3a. SERVICE/CIVILIAN CATEGORY ^ ARMY NAVY MARINE CORPS AIR FORCE | i DoD CIVILIAN ^ CONTRACTOR

(b) (6), (b) (7)(C)


b. REPORTING UNIT CODE/DUTY STATION

WBDAAB

4a. SPOUSE NAME (If applicable) (Last. First, Middle Initial)

b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER

SINGLE

DIVORCED

WIDOWED b. RELATIONSHIP c. DATE OF BIRTH (YYYYMMDD) d. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER

CHILDREN NAME (Last. First Middle Initial)

6a. FATHER NAME (Last. First. Middle Initial)

(b) (6), (b) (7)(C)

b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER

MANNING. BRIAN. E
7a. MOTHER NAME (Last. First. Middle Initial) b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER

(b) (6), (b) (7)(C)


b. NOTIFY INSTEAD

MANNING. SUSAN. M
8a. DO NOT NOTIFY DUE TO ILL HEALTH

9a. DESIGNATED

PERSON(S) (Military only)

b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER

10. CONTRACTING

AGENCY AND TELEPHONE NUMBER (Contractors only)

DD FORM 93, JAN 2008

PREVIOUS EDITION IS OBSOLETE

APD PE vi D O E S

S E C T I 0 N 2 - e E N E F I T S RELATED INFORMATION 11a. BENEFICIARY(IES) FOR DEATH GRATUITY (Military only) b. RELATIONSHIP c. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER d. PERCENTAGE

MANNING, BRIAN. E

FATHER

(b) (6), (b) (7)(C)

100

(b) (6), (b) (7)(C)

12a. BENEFICIARY(IES) FOR UNPAID PAY/ALLOWANCES (Military only) NAME AND RELATIONSHIP

b. ADDRESS (fncfude ZiP Code) AND TELEPHONE NUMBER

c. PERCENTAGE

(b) (6), (b) (7)(C)

100

(b) (6), (b) (7)(C)

13a. PERSON AUTHORIZED TO DIRECT DISPOSITION (PADD) (Military only) NAME AND RELATIONSHIP

(b) (6), (b) (7)(C)

b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER

14. CONTINUATION/REMARKS

15. SIGNATURE or grade if a/iplic,

BER/CIVILIAN (Include rank, rate,

16. SIGNATURE OF WITNESS (Include rank rate, or grade as apprdfjriate)

17. DATE SIGNED (YYYYMMDDl

")
DD FORM 93 ( B X C K ) , JAN 2008

^'./^'Y-^

'^et%c<\ c\
APD PE vl DOES

SERVICEMEN'S GROUP LH^NSURANCE ELECTION AND CEBfitFICATE

^p7|

Page 1 of

Please read the instructions before completing this form

Servicemembers' Group Life Insurance Election and Certificate


Use this form to (check all that apply) ^ Name or update your beneficiary Reduce the amount of your insurance coverage Decline insurance coverage First name Last name BRADLEY MANNING Branch of Service(Do not abbreviate) Army Middle name Suf EDWARD Current Duty Location WBDAAB Rank, title or grade PV2 Important: This form, is for use by Active Duty and Reserve members. This form does not apply to and cannot be used for any other Government Life Insurance.

(b) (6), (b) (7) (C)

Number

Amount of Insurance By law. you are automatically insured for $400,000. If y o u want $400,000 o f insurance, skip to Beneficiary(ies) and Payment Options. If y o u want less than $400,000 of insurance, please check the appropriate block below and write the amount desired and your initials.Coverage is available in increments of $50,000. If y o u do n o t want any insurance', check the appropriate block below and write (in your own handwriting). "I do not want insurance at this time." Declining SGLI coverage also cancels all family coverage under the SGLI program. I want coverage in the amount of $ Your initials

(Write "I do not want Insurance at this time.") Note; Reduced or refused insurance can only be restored by completing form SGLV 8285 with proof of good health and compliance with other requirements. Reduced or refused insurance will also affect the amount of VGLI you can convert to upon separation from service.

Beneficiary(ies) and Payment Options


I designate the following beneficiary(ies) to receive payment of my insurance proceeds I understand that the principal beneficiary(ies) will receive payment upon my death. If all principal beneficiaries predecease me. the insurant:^ will be paid to the contingent beneficiary(ies) Payment Option Share to each Social Security (Lump sum or 35 beneficiary Complete Name (first, middle, last) and Address of each Relationship to Number equal monthly (Use %, S amounts beneficiary you (If known) payments) or fractions) Principal FATHER 100% LUMP SUM

(b) (6), (b) (7)(C)


Contingent I . . . .

HAVE READ AND UNDERSTAND the instructions on pages 2 and 3 of this f o r m . I ALSO UNDERSTAND that: This form cancels any prior beneficiary or payment instructions. The proceeds will be paid to beneficiaries as stated in #6 on page 3 of this fonn. unless otherwise stated above, If I have legal questions about this form, I may consult with a military attorney al no expense to me, I cannot have combined SGLLaod VGLI coverages at the sarne time for more than $400,000.

SIGN HERE IN INK

^ Date: (Your Signature. Do not print. Do not write-Hr<pace below. For official use o n l ~ WITNESSED AND RECHVED BY: ORGANIZATION RANK, TITLE OR GRADE /

20080902^

J.

DATE RECEIVED

SGLV-8286 (E)

:x-

.3L6^C,C

https:,//emilpo.ahis.army.mil/loadSgliReport.do?disableToken=l

9/2/2008

see Army Directive 2007-02; the proponent agency is DCS, G-1 For use of this' ;hl^^. s

MENT CYCLE SUPPORT (DCS) CHECKLIS

DATA REQUIRED BY THE PRIVACY ACT OF 1974


AUTHORITY 10 USC Section 3013, Secretary of the Army; Department of the Arniy Deployment Cycle Support (SSN). PURPOSE: ROUTINE USES: DISCLOSURE:

m
AGR RET

( D C S ) Directive; and EO 9397

To provide a standardized means to evaluate readiness posture and validate military and non-military personnel for deployment, The "Blanket Routine Uses" set forth at the beginning of the Army compilation of systems of records notice apply. Voluntary. However, failure to update and confirm Information is correct may impede processing time and deployability status.

The Deployment Cycle Support Checklist Is filed In the Deployment Packet to complete the action. A copy remains at the losing organization .
'ATE (yYYWMDD)

2. NAME (Last, First, toddle)

S^wO^G^I
4. SERVICE AFFILIATION

OOt^iJIhtG,

DRML<-H\

EP^ftfiP
6. STATUS

(b) (6), (b) (7)(C)


7. PAY PLAN/GRADE

3. SSN

)g

USA

USMC USCG PHS

NOAA

5. COMPONENT '^'ACTIVE
GUARD RESERVE AAFES OTHER (Specify)

NON-MILITARY

TPU IRR IMA


10. TRAVEL STATUS a. UNO" ORDER b. INDIVIDUAL

USN USAF

n
^

NG32

&-?
8. MOBILIZATION DEPLOYMENT CENTER

NG10
11. DATE OF BIRTH (YYYYMMDD)

9. NON-MILITARY STATUS

DOD DAC

CONTRACTOR RED GROSS

12. ARMY COMMANDS

13. DATE ARRIVED IN THEATER

(YYYYMMDD)

CITIZENSHIP COUNTRY

PO^^CO^
15. REDEPLOYMENT DATE (YYYYMMDD) 16. REFRADDATE (YYYYMMDD) ( i s ^ A R E N T UIC 19.}DUIC [20. lUNIT DSN PHONE NUMBER

UNiT:.D ^ f t r t $
i DEPLOYMENT COUNTRY

rpAQ
21. CONUS REPLACEMENT CENTER

W^QAAA
22. STATUS OF EACH DCS STAGE a. TRAIN-UP/PREP ] C ' NC

WBD AC^A
and COMMANDER'S b. MOBILIZATION C RECONSTITUTION NC

^ n.qig^<\ooi
VALIDATION MEMO (C= Completed; NC = Not Compbted) e. REDEPLOYMENT NC \ \ C I NC c. DEPLOYMENT C NC d.'EMPLOYMENT C

f. POST-DEPLOYMENT

h. CDR VALIDATION MEMO NCO C

IC

1 NC

NC

SECTION I - DCS VALIDATION Part A - A c c u r a c y Statement: document is correct and current. 1, SIGI l understand I am certified for reconstitution and, to the best of my knowledge, all information contained in this

2. RANK

PH^C
6. TITLE

3. TfTLE

P a r t B - P f r S f t t n e L e ad e r / i m m e d l a t e S u p e r v i s o r ' s 'AUtherfltCallOir' 4 PRINTED NAME (Supervisor) 5, RANK

^mave authentlcaied'the information coritalneJIh this checklist as correct and current. 7. SIGNATURE

8. DATE (YYYYMMDD)
11. PHONE NUMBER

9, UNIT

10. ADDRESS

12. E-MAIL ADDRESS

13. DSN

14. FAX PHONE NUMBER

Part C - Commander's Acknowledgment: (Commanders may approve an individual for reconstitution based on the certifying ofTicial's recommendation, criticality, and mission needs, unless othenn/ise indicated.) i acknowledge the checklist findings.
15. PRINTED NAME (CDR or AG) 17. TITLE 18. SIGNATURE

19, DATE (YYYYMMDD)


22 PHONE NUMBER

20, UNIT

21,

ADDRESS

23. E-MAIL ADDRESS

24. DSN NUMBER

25. FAX NUMBER

Part D - DCS Validation:

A L L D E P L O Y M E N T C Y C L E S U P P O R T requirements are updated and all DCS requirements completed. 27. RANK 28. TrtLE 26 SIGNATURE

RINTED NAME

(Validationq Official)
3 1 . UNIT

^-S>V\/x-rvrr)
30. DATE (YYYYMmDb) 33, PHONE NUMBER 34. E-MAIL ADDRESS

32.

ADDRESS

Dps

YC\CO

^
36. FAX NUMBER

35. DSN NUMBER

DA FORM 7631, MAR 2007

Page 1 of 14 APD PE vi .00

# QUALIFICATION TO POSSESS FIREARMS OR AMMUNITION


PRIVACY A C T S T A T E M E N T AUTHORITY: 18 U.S.C. 922(g)|9); E.O. 9 3 9 7 .

PRINCIPAL PURPOSE(S): To obtain information to determine it you have been convicted of a crime of domestic violence which would disqualify you from shipping, transporting, possessing or receiving either Government-issued or private firearms or ammunition and to determine if reassignment, reclassification, detail or other administrative action is warranted. Your Social Security Number is solicited solely for purposes of verifying your identity. ROUTINE USE(S): To the Department of Justice so that such information can be included in the National Instant Criminal Background Check System which may be used by firearm licensees (importers, manufacturers or dealers) to determine whether individuals are qualified to receive or possess firearms and ammunition. DISCLOSURE: Mandatory for all personnel who are required to certify. Failure to provide the information may result in 11) (military only) the imposition of criminal or administrative penalties for failing to obey a lawful order, and (2) (civilian only) the imposition of administrative penalties, to include removal from Federal service. However, neither your answers nor information or evidence gained by reason of your answers can be used against you in any criminal prosecution for a violation of Title 18, United States Code, Section 922(g)|9), including (military only) prosecutions under the Uniform Code of Military Justice, based on a violation of Section 922(g)|9), for conduct which occurred prior to the completion of this form. The answers you furnish and any information resulting therefrom, however, may be used against you in a criminal or administrative proceedings if you knowingly and willfully provide false statements or information. SECTION I - INSTRUCTIONS An amendment to the Gun Control Act of 1968 (18 U.S.C. 922) makes it a felony for anyone who has been convicted of a misdemeanor crime of domestic violence to ship, transport, possess, or receive firearms or ammunition. It is also a felony for any person to sell or otherwise dispose of a firearm to any person so convicted. The Department of Defense has, by policy, expanded the prohibitions contained in Title 18 Section 922(g)(9| to those military or civilian personnel who have felony convictions for crimes of domestic violence. Convictions of crimes of domestic violence do not include summary court-martial convictions, the imposition of nonjudicial punishment (Article 15, UCMJ), or deferred prosecutions (or similar alternative dispositions) in civilian courts. Furthermore, a person shall not be considered as having committed a "crime of domestic violence" for purposes of the firearms restriction of the Gun Control Act unless all of the following elements are present: (1) the person was convicted of a crime; (2) the offense has as its factual basis the use or attempted use of physical force, or threatened use of a deadly weapon; (3) the convicted offender was at the time of the offense: (a) a current or former spouse, parent or guardian of the victim, (b) a person with w h o m the victim shared a child in common, Ic) a person who was cohabiting with or has cohabited with the victim as a spouse, parent, or guardian, or (d) a person who was similarly situated to a spouse, parent, or guardian of the victim; 14) the convicted offender was represented by counsel, or knowingly and intelligently waived the right to counsel; (5) if entitled to have the case tried by jury, the case was actually tried by jury or the person knowingly and intelligently waived the right to have the case tried by jury; 16) the conviction has not been expunged or set aside, or the convicted offender has not been pardoned for the offense or had civil rights restored, unless the pardon, expungement, or restoration of civil rights provides that the person may not ship, transport, possess or receive firearms. If you have ever received a domestic violence conviction: (1) you may not possess any firearm or ammunition; and (2) you must return any Government-issued firearm or ammunition to your commander or immediate supervisor; and (3) you must take steps to relinquish possession of any privately o w n e d firearms or ammunition. Furthermore, any previously issued authorization to possess a firearm or ammunition is revoked. If you have any questions, or you are uncertain if you have such a conviction, you may wish to contact a legal assistance attorney, if eligible, or a private attorney, at your o w n expense.

SECTION

II - QUALIFICATION

INQUIRY

(Complete and return to your commander or immediate

supervisor

within

10 days of

receipt)

1. HAVE YOU EVER BEEN CONVICTED OF A CRIME OF DOMESTIC VIOLENCE AS DESCRIBED ABOVE: YES I DON'T KNOW (Provide explanation on reverse)

(Initial and date)

2. IF YOU ANSWERED "YES" T O T H E FIRST QUESTION, PROVIDE THE FOLLOWING INFORMATION WITH RESPECT TO THE CONVICTION: a. COURT/JURISDICTION b. DOCKET/CASE NUMBER

c.

STATUTE/CHARGE

d. DATE SENTENCED

(YYYYMMDD)

CERTIFICATION. I hereby certify that, to the best of my information and belief, all of the information provided by me is true, correct, complete, and made in good faith. I understand that false or fraudulent information provided herein may be grounds for criminal and/or administrative proceedings, to include (if civilian) adverse action, up to and including removal, and (if military) disciplinary action under the Uniform Code of Military Justice. I further understand that I have a continuing obligation to inform my Commander or Supervisor should I be convicted of a crime of domestic violence in the future. a. NAME (Last, First, Middle Initial) b. RANK/GRADE c. SOCIAL SECURITY NUMBER

mAWwtWC, GmAV)Lf 91
d. ORGANIZATION

pre
e. SIGNATURE PREVIOUS EDITION IS q ^ g O t f T E .

(b) (6), (b) (7)(C)


f. DATE SIGNED (YYYYMMDDl

Hue 3L%c
DD FORM 2760, DEC 2002

Z%

^LQO'^fQ'ai
Adobe Professional 7.0

QUALIFICATION TO POSSESS EIREARMSORAMMUNITION


PRIVACY A C T S T A T E M E N T AUTHORITY: 18 U-S.C. 922(g)(9); E.O. 9 3 9 7 .

PRINCIPAL PORPOSE(S): To obtain information to determine if you have been convicted of a crime of domestic violence which w o u l d d i s q u a l i f y y o u f r o m shipping, transporting, possessing or receiving either Government-issued or private firearms or ammunition and to determine I r e a s s i g n m e n t , reclassification, detail or other administrative action is warranted. Your Social Security Number is solicited solely for purposes o f v e r i f y i n g y o u r identity. R O U T I N E USE(S): T o the Department of Justice so that such information can t>c included in the National Instant Criminal Background Check S y s t e m w h i c h m a y be used b y firearm licensees (importers, manufacturers or dealers) to determine whether individuals are qualified t o receive o r possess firearms and a m m u n i t i o n . DISCLOSURE: Mandatory for all personnel w h o are required to certify. Failure t o provide the information may result in (1) (military only) the i m p o s i t i o n o f criminal or administrative penalties for failing to obey a lawful order, and (21 (civilian only) the imposition of administrative nenalties t o incjudo removal f r o m Federal service. However, neitfier your answers nor information or evidence gained by reason of your a n s w e r s c a n t>e used against y o u in any criminal prosecution for a violation of Title 1 8 , United States Code, Section 922(g)(9), including ( m i l i t a r y only) prosecutions under the Uniform Code of Military Justice, based o n a violation of Section 922(g)(9), for conduct w h i c h occurred Drier t o the completion of this f o r m . The answers you furnish and any information resulting therefrom, however, may be used against y o u in a c r i m i n a l or administrative proceedings if you knowingly and willfully provide false statements or information. SECTION I - INSTRUCTIONS A n a m e n d m e n t to the Gun Control A c t of 1968 (18 U.S.C. 9 2 2 ) makes it a felony for anyone w h o fias been convicted of a misdemeanor c r i m e of domestic violence to sfiip, transport, Dossess or receive firearms or ammunition. It is also a felony for a n y p e r s o n t o sell o r otfierwise dispose of a firearm to any person so convicted. T f i e Department of Defense fias, b y policy, expanded the prohibitions contained in Title 18 Section 922(g)(9) to those m i l i t a r y or civilian personriel w f t o have felony convictions for c r i m e s o f domestic violence. Convictions of crimes of domestic violecice do n o t include summary court-martial convictions, the i m p o s i t i o n o f nonjudicial punisfiment (Article 15, UCMJ), or d e f e r r e d prosecutions (or similar alternative dispositions) in civilian c o u r t s Furthermore, a person shall n o t be considered as having c o m m i t t e d a "crime of domestic v i o l e n c e " for purposes of the f i r e a r m s restriction of the Gun Control A c t unless all of tfie f o l l o w i n g elements are present: (1) t h e person w a s c o n v i c t e d o f a c r i m e ; (2) t h e offense has as its factual basis the use or attempted use o f physical f o r c e , or tfveatened use of a deadly weapon; (3) t h e c o n v i c t e d offender w a s a t t f i e time of the offense: (a) a current or former spouse, parent or guardian of the victim, (b) a person w i t h w t i o m t h e v i c t i m shdred a cfWId in common. SECTION 1 II - QUALIFICATION INQUIRY (c) a person w h o w a s cohabiting w i t h or has cohabited w i t h the v i c t i m as a spouse, parent, or guardian, or (dl a person w h o w a s similarly situated to a spouse, parent, or guardian of the victim; (4) the convicted offender was represented by counsel, or knowingly and intelligently w a i v e d the right to counsel; (5) if entitled t o have the case tried by jury, tfte case w a s actually tried by jury or the person knowit^gly and intelligently w a i v e d the right to have t h e case t r i e d b y jury; (61 the conviction has n o t been expunged or set aside, or the convicted offender has n o t been pardoned for the offense or ftad civil rights restored, unless t h e pardon, expungement, or restoration of civil rights provides t h a t t h e person may not ship, transport, possess or receive firearms. If y o u have ever received a domestic violerce c o n v i c t i o n : (1) you m a y n o t possess any firearm or ammunition; and (2) y o u m u s t return any Government-issued firearm or ammunition t o your commander or immediate supervisor; and (3) you must take steps t o relinquish possession o f any privately o w n e d firearms or a m m u n i t i o n . Purifier more, any previously issued authorization t o possess a firearm or ammunition is revoked. If y o u have a n y questions, or y o u are uncertain if y o u have such a c o n v i c t i o n , y o u m a y w i s h to contact a legal assistance attorney, if eligible, or a private attorney, at yotir o w n expense.

(Complete and retum to your commander

or immediate

supervisor

days of receipt)

H A V E Y O U e y g f l BEEN CONVICTED OF A CRIME OF DOMESTIC VIOLENCE A S DESCRIBED ABOVE I DON'T KNOW explanation on (Provide reverse)

YES I?

IF Y O U ANSWERED " Y E S - TO T H E FIRST QUESTION, PROVIDE THE FOLLOWING INFORMATION W I T H RESPECT TO THE CONVICTION: COURT/JURISDICTION I b. DOCKET/CASE NUMBER

STATUTE/CHARGE

d. DATE SENTENCED

(YYYYMMDD)

I hereby certify that, to the best of my information and belief, all of the information provided by me is true, correct, 3 . CERTIFICATION. complete, and made in good faith. I understand that false or fraudulent information provided hierein may be grounds for criminal and/or administrative proceedings, to include (if civilian) adverse action, up to and including removal, and (if military) disciplinary action under the Uniform Code of Military Justice. I further understand that I have a continuing obligation to inform my Commander or Supervisor should I be convicted of a crime of domestic violence in the future. Initial) a. UMAE (Last. First. Middle c. SOCIAb-SECURITY NUMBER b. RANK/GRADE

fV)BMNlKJ6 , e AAPLW ^
Id. ORGANIZATION

PV9./ ^-2
PREVIOUS EDITION IS OBSOLETE.

(b) (6), (b) (7)(C)


f. DATE SIGNED

D D FORM 2 7 6 0 . DEC 2 0 0 2

^^-0

(YYYYMMDD)

d^CD^C%2(c

1 ri
5

o c
cr
^
,"^,

> 0

f !
ra
O

c ra O O
UJ H

>. <

< Q

01 Ol ra

}ii o z o z
M Ul

in UJ

o z

UJ
UJ

UJ

u.
Ul Q

ill

It
UJ

H
': z
:1 O

1 tr ^
V V

|dg

i!S
Ul h:

I
K W

tc <n

: Z ii

IS i

. O

: O

iii
;F I u
UJ

Iw

^
o.

<

Q to CL o Q. CD O c OL 0)

(A UJ K

s
K

i i u
a I
m S
Ul t-

tc.
o z < s s o o tz
3 UJ

tn S
Ul t-

<^
. n

It

cc
CL

o <! o o
I

z < S S o o
H Z 3

UJ O

o I
o m I
I

I
o
Q. UJ

>

o z
OT UJ

o o

< m

< n z

i &2
^ MC O

g
a>
O
JZ O) in

z o

a.

\o

_ ra c

ra 0 . 0)

6 Ig >' ; =
3 S ra

2 a _

C O

s. 5
o
c

!l E i

i f S i
Vi

6
i

JJTL

Bit?

ra u.

u> 5

Q.

8 '5.

III
Ij < i! m

Ii? !

X -

a . s " 5

Lii 8S I El:
w > ;

^1 5 ow a-

go

5" H
ra ra O

!l

J
!

85 ,

B
Q
1 Verifi

o MPC

X
NOI

Re s
=L CO 1o:

< . s ^, o

u z

(b) (6), (b) (7) (C)

81209

Spo use SSI

ddres;

ergenicy Da

Q E Co

ling

3 O T3 z<

E tn UJ

> I

O C C Q

MT

2^

s~

o
5 YR

<

<

e LastPhot

SEC

E g

irks

^g:^^^
(b) (6) , (b) (7) (C)
oooo
LLLZLL^ mmmu) to f i Ci V

UJUJUJ

zzz zzz
. 0 0 0

Gwujuj
tfOLOLOLLULU

UJ U. C Q

C O

o
Q:

is
%

zooomm <zzz=

il
5 g

m%^^
m w H O O O r f r f 0 0 0 0 0 0 : ll.U.l-1-l-HI-

o o
a

LU Q UJ I(O UJ

Is

Js Q

zzzzgg

inininin
3 = > 3 3

a i K K K g

siSSSSi

iiis2|
1-1-1-1-1-1- =

u oo: m
W

in OQL OIUJ O X E

iiii
03 CD T- t - ^ O ^

gggggss
o o

Q i

fefe S0 . 0 . 0 . Q.CLQ.CLD_Q_CLQ_Q_Q.CLQ.Q.CLa.CLQ_Q.Q_Q.D.
D. 3 O ^SSSSSSSSS-BSSSSS-^'ui'^''^-^ '5ir5Si^5o)0?^?g?5^iHSi^Sa50'i-^o5^

I1

u_ e

REQUEST AND AUTHORITY FOR LEAVE


This form is subject to the Privacy Act of 1974. For use of this form, see AR 600-8-10.

1. CONTROL NUMBER

PART -1
2. NAME (Lasf, First, Middle Initial) 3 SSN 4. RANK 5. DATE

MANNING, BRADLEY E (b) (6), (b) (7)(C)

(b) (6), (b) (7)(C)


7. TYPE OF LEAVE ORDINARY PERMISSIVE TDY

PFC
EMERGENCY OTHER

15 JUL 09
ORGN, STATION, AND PHONE NO.

6. LEAVE ADDRESS (Street, City, State, ZIP Code and Phone No.)

PASS
NUMBER DAYS LEAVE a. ACCRUED b. REQUESTED 10.

HHC2BCT, 10MTN DIV BLDG10200 FORT DRUM, NY 13602 315.774.2505


DATES

c . ADVANCED
12. 0 APPR^/AL

d. EXCESS

a. FROM

b. TO

N/A

N/A

11. SIGNATURE OF REQUESTOR

N / A SUPERVISOR

N / A
RECOMMENDATION/SIGNATURE DISAPPROVAL

13. APPROVraGUT^

22 JUL 09 D VTLE/SF 1 7" SIGNAAUME AND

19 JUL 09

M."
a. DATE 15. a. NUMBER DAYS

b. TIME

DEPARTURE c. NAME/TITLE/SIGNATURE OF DEPARTURE AUTHORITY DEPARTURE c. NAME/TITLE/SIGNATURE OF APPROVAL AUTHORITY DEPARTURE c. NAME/TITLE/SIGNATURE OF RETURN AUTHORITY

^U/

b. DATE APPROVED

16.
a. DATE 17. REMARKS b. TIME

Chargeable leave is from

to

PART II - EMERGENCY LEAVE TRANSPORTATION AND TRAVEL


18. You are authorized to proceed on official travel in connection with emergency leave and upon completion of your leave and travel will return to home station (or location) designated by military orders. You are directed to report to the Aerial Port of Embarkation (APOE) for onward movement to the authorized international airport designated in your travel documents. All additional travel is chargeable to leave. Do not depart the installation without reservations or tickets for authorized space required transportation. File a no-pay travel voucher with a copy of your travel documents or boarding pass within 5 working days after your return. Submit request for leave extensions to your commander. The American Red Cross can assist you in notifying your commander of your request for extension of leave. 19. INSTRUCTIONS FOR SCHEDULING RETURN TRANSPORTATION:

For return military travel reservations in CONUS call the MAC Passenger Reservation Center (PRC):
S h n i i l r l v n i i r p n i i i r p o t h p r aggigfanr^p r a i l P A P

20. DEPARTED UNIT 24. 25, Q

21. ARRIVED APOD

22. ARRIVED APOE (retum only)

23 ARRIVED HOME UNIT

PART III - DEPENDENT TRAVEL AUTHORIZATION

(Space available or required cash reimbursable) D ONEWAY D ROUND TRIP (Space required) TRANSPORTATION AUTHORIZED FOR DEPENDENTS LISTED IN BLOCK NO. 25 DEPENDENT INFORMATION b. RELATIONSHIP c. DATES OF BIRTH (Children) d. PASSPORT NUMBER a. DEPENDENTS (Lasf name, firsf, Ml)

PART IV - AUTHENTICATION FOR TRAVEL AUTHORIZATION


26. DESIGNATION AND LOCATION OF HEADQUARTERS 27. ACCOUNTING CITATION

28. DATE ISSUED

29. TRAVEL ORDER NUMBER

30. ORDER AUTHORIZING OFFICIAL (Title and signature) OR AUTHENTICATION EDITION OF 1 AUG 75 IS OBSOLETE ORIGINAL 1

DA FORM 31, SEP 93

DEPARTMENT OF THE ARMY United States Array Intelligence Center and Fort Huachuca Fort Huachuca, Arizona 8 5 613 -6000 ORDERS 193-00013 11 July 2008

MANNING BRADLEY EDWARD (b) (6), (b) PV2 USAICFH CO D (STU) 305 (W1E8I8) - (7)(C) United States Army Intelligence Center and Fort Huachuca, Fort Huachuca, AZ 85613-6000 You will proceed on permanent change of station as shown. Assigned to: 2^ 10 DIV REPL DET (WBDAAB) FT DRUM N Y 13602 Reporting date: 14 SEPTEMBER 2008 Additional instructions: (a) Dependents: NO (b) I f you ship personal property at Government expense, contact the Transportation Office at your new duty station iinmediately after arrival to arrange for delivery. (c) You are required to report to the Family Housing/Housing Referral Office serving your new duty station before you make housing arrangements for renting, leasing, or purchasing any off-post housing. (d) Soldier is authorized up to 14 days permissive temporary duty to participate in the Hometown Recruiter Assistance Program if indicated on an approved DA 31 signed by a LTC or above. ^ (e) You are responsible for reporting to your next duty station/school in satisfactory physical condition, able to pass the Army Physical Fitness Test and meet weight standards. (f) You will submit a travel voucher for this travel to the custodian of yourfinancerecords within 15 days after completion of travel. (g) Report to building 61820, Davis Hall, room 149 (back entrance), with 15 copies of your PCS orders within 5 days of receipt to arrange for transportation appointments, (h) Leave data as stated on Department of the Army Form 31. (i) All Soldiers being reassigned are required to clear through the Housing Offline. Soldiers residing in Goverrunent quarters are required to report to the Termination Section, Housing Division, Building 1415, Rhea Street, withiri.five days after receipt of this order. (j) You are to contact commander of gaining organization not later than 10 days after receipt of ' orders i f any special requirements exist for medical, dental, or educational facilities at next duty station. (k) You are required to forward a DA form 3955 (change of address card) with your new home address to your PERSCOM assignment manager within 30 days of arrival at your new duty. (1) Travel by privately owned conveyance is authorized from Ft. Huachuca, AZ to new duty station, (m) Early report date is authorized. (n) Losing Command/Soldier should ensure transportation arrangements are made to final destination of Watertown Int'l Airport, Watertown, NY. (o) When a CTO is available but the traveler arranges transportation through a non contract travel agent or common carrier direct purchase, reimbursement is limited to the amount the Government would have paid i f the arrangements had been made directly through a CTO.

You ^ H l start in-processmg on:

At 1300 report to Clark Hall Room Al-39

AFDR-BBA-HC ^ ^ 3 JULY 2008 SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).

HHC BDE, 2D BCT Personal Data Sheet

Name: (Last, First, Middle)


(b) (6), (b) (7)(C)

1 ^ fi^W N) T K l C r ^ B ^ ^ O L f * ^ . Grade: f . QL

^ DOR: 3. A P f i 0 5

SSN: BASD: DOB: Religion: ETS: I O C T i n p e c SH^ Q f ^ A i J Ct^THoLlC 3SF" / DEROS: Airborne:

II Race: CWCMIA^T^ Marital Status: Blood Type: _ O P O S

STt-^CrL^ Separate Rations:

Primary MOS: ASI: PBED: Air Assault: /

Secondary MOS: / / / /

Ranger:

BIB: (^SG^GED

CIB:

GT Score:

l<33 )

Combat Life Saver@N (date: H ^ T f ^ B ^ Colleage Semister hrs: Security Clearance: Tsj^CX" type Promotable Y/N ACU/T: / status

CollegeN (# C r e d i t s : ^ Degree:

College Degree Y / Q

Army Knowledge Online Account: t'CM. fn^>f>fS\00^(5^ J account a d d r ^

Sequence Number: ACU/B: X S \ ( S Hat: 1 ' / ^ Boot: ^ k Glove: ^ Inserts

(S/N

o H e i g h t : W e i g h t : jSkO

Eye Color: BLUj

Hair Color: QLW^Dt Glasses^N

Place of Birth: OKL^MCV^A c m . O K l Local Address: Street: Zip Code: Cell Phone #:
(b) (6), (b) (7)(C)

Home of Record: ^ o T a ^ A ( ^

City: Home Phone #: Beeper #:

10

AFDR-BBA-HC ^ ^ 3 JULY 2008 SUBJECT: Personnel In-processing Standard Operating Procedures (SOP). HHC BDE Company PersongI Data Sheet cont.

Next of Kin (parents and/or grandparents) Mother Name: Street: State: Area Code and Phone #: Area Code and Cell #: Father Name: Street: State:
(b) (6), (b) (7)(C) (b) (6), (b) (7) Zip Code: (C)

SufAN

YVK^NKjlK^Q City: Zip Code:


(b) (6), (b) (7)(C)

9ft.XfiU
(b) (6), (b) (7)(C)

SOwAdP

mAwwlWO^
(b) (6), (b) (7)(C)

City:

Area CocJe and Phone #:


(b) (6), (b) (7)(C)

Area Code and Cell #:

Wife Name: Children Names and DOB:

k)/^A
/V/ A

Area Code and Home #: Area Code and Cell #:

11

AFDR-BBA-HC ^ 3 JULY 2008 SUBJECT: Personnel In-processing Standard Operating Procedures (SOP). HHC BDE Company Personal Data Sheet cont.

Awards/Decorations:

Military Schools and Dates graduated:

^.LJS>

Pg-Vp (D^C^

Past Duty Assignments:

Date of last APFT:

1 Jv;uO

APFT Score:

QL^H-

Weapon Qualification A@ O O - l b Score/Rating: Score/Rating: Score/Rating: Score/Rating: Date: Date: 31 / S O Date:^^) F S B Date:

Weapon Type: Weapon Type: SRM: SRM:

POV Information Model: Year: _ State: Expiration: state: Policy*:. Expiration Date:

Make: Color: License Plate #: Post Decal #: Drivers Liscense #:_ Insurance CO:

12

^ AFDRBBA-HC ^ ^ 3JULY2008 SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).

HHC BDE Company Personal Data Sheet cont. ^ Military Licenses^ Date Issued: Date Issued: Date Issued: Date Issued: Date Issued: Date Issued: Date Issued: Date Issued: Date Issued: Date Issued:

Equipment: Equipment: Equipment: Equipment: Equipment: Equipment: Equipment: Equipment: Equipment: Equipment:

13

DEPARTMENT OF THE ARMY HEADQUARTERS AND HEADQUARTERS 2D BCT, 10^" MOUNTAIN DIVISION (LI) FORT DRUM, NEW YORK 13602

AFDR-BBA-HC

3 JULY 2008

MEMORANDUM FOR All 2D BCT, HHC BDE Company Personnel SUBJECT: Commander's Policy Letter # 5 Personnel In-processing Standard Operating Procedures (SOP).

1. Purpose. Identify what is required for the reception and in-processing of all incoming soldiers. 2. Basic Philosophy. Our soldiers are a valuable asset. One of the best things that we can do to set them up for success is to give them plenty of time initially to take care of anything which they need to update, settle, or fix. We will give them all the needed "authorized sham time" up front even if this causes them to miss important training events. We may have to send them to qualify or briefings, but after that they will continue getting settled. The bottom line is that we will give them plenty of time (up to two weeks) up front and then we will work them long and hard for several years after that. 3. Mandatory requirements before any soldier is allowed to perform any duties in the company are as follows. a. Complete all in-processing for the installation, BN, and the company. b. Initial counseling from the chain of command. c. Family settled in a house, with all household goods, and provided time to get everything unpacked. d. All equipment issued and set-up IAW (In Accordance With) current SOPs. e. Provided an opportunity to review and understand all policies and SOPs. 4. Responsibilities, a. 1SG (1) Manage the distribution and allocation of enlisted personnel within HHC BDE, Assign incoming soldiers to a section. (2) Ensure the incoming soldier meets with the commander within the first five working days. (3) Initial Brief on all off limits areas, NY State DUI/BWI, Passes, Co Area, Discipline, Barracks.

AFDR-BBA-HC ^ ^ 3JULY2008 SUBJECT: Personnel In processing Standard Operating Procedures (SOP). (4)NCO'swillbebriefedonCO,BNSDNCOandaddedtoDA-^ b PSO^ Section Sergeants (^)Manage the distribution and allocation of enlisted personnel within their platoons Section Assign incoming soldierstoadutyposition (2) Ensuretheincomingsoldiermeetswiththecommanderwithinthefirstfive working days (3) Assign the soldierabarracks room if he is single or unaccompanied Oeographicalbachelorswillberequiredtofindaplaceoffpost (4) Ensurethesoldierhasthebasicnecessitiesforduty uniforms,etc l^inen, shaving kit, proper

(5) AdministeradiagnosticAPFT to thesoldierandconductaWeighin'within the first30daysofassignmenttothecompany Ifthiswasconductedatreplacementthisis acceptable (^) Inspect the soldier'sPO^,IAW applicable regulations,within the first week of assignment File inspection results in the soldier'scounseling packet c. Section Leader, Within the first five working days of assignment, instruct the soldier on basic section tactical SOPs (The soldier'sposition in different tactical movementformations, squad lineardangerarea techniques, hand and arm signal SOPs,etc ) Execute afterduty hours,if required,to meet five day standard. d Squad l^eaders (^)Withinthefirsttwodaysofasoldier'sassignmentto HHC BDE, the squad leaderwillinventorythesoldier'sTA-50issuefromCIFandallotherOrganizational Clothing and Individual Equipment(OCIE) Ensurethatallequipmentthesoldiersigned for is present. Within the first five days,the squad leader will check allTA50 for appropriate markings IAW Co SOP (Name tapes, ^cat eyes', etc ) (2) Issue the soldier an updated alert roster. (3) Withinthe firstthreedutydaysof assignment, the newsoldier'ssquad leader willconducttheinitialcounselingofthesoldier^erifyinthecounselingthatthesoldier has read and fully understands the Company policy letters. 3 HHC BOECompanyinprocessing packet confainsthe following: a b c d. Packet Cover Sheet Personal Data Sheet Supply In processing Sheet Initial Counseling Checklist

AFDR-BBA-HC ^ ^ 3JULY2008 SUBJECT: Personnel In-processing Standard Operating Procedures (SOP). 4 Coordinating Instructions a. New soldiers will report immediately to the^SO'soffice The Company Commanderwillnormallyspeakwith incoming soldiers immediafelyfollowingthe^SO, but certainly before five working days. b Anew soldier'sfirst line supervisor(normally his squad leader) will escort him through the inprocessing stepstoensurethathecompleteseach item on the inprocessing checklist c Packetcoversheet The training room will fill outthecoversheet header The Training Room NCO,Armorer,NBC NCO,and each member of the soldier'schain of command initials nextto each task undertheappropriate heading once the taskis complete In process in the order of the cover sheet d Personal Data Sheet The soldier will complete the personal data sheet His Squad leader(orfirst line supervisor) will check it and ensure accuracy The training room is responsibleforenteringthe information intothecompanydatabase e Supply In processing Sheet Follow the instruction on the sheet. f Initial Counseling Checklist The incoming soldier'sfirst line supervisorwill review and complete the checklist with the soldier The soldierwill read the Company policy letters, and sign thechecklistalongwith the firstline supervisor 5 The POCforthis memorandum isthe undersigned at4-2430

EDWARDSWALTER CPT,MI Commanding

AFDR-BBA-HC ^ ^ 3 JULY 2008 SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).
HHC BDE. 2D BCT IN-PROCESSING COVER SHEET Name and Rank: P ^ A N U i N G , B R^CXj^ & \ PV^ ^SG ANXC/^ Platoon:

Sponsor's Name and Rank: Squad Leader: Team Leader: 1. 2. 3. 4. 5. 6. Training Room S56

MTC^ ^ /i\

Establish HHC BDE primary folder for soldier File SRP Packet Retain 1 copy of assignment orders Retain 1 copy of ERB/ORB Update HHC BDE Database Retain or initiate APFT card

7. _

Initiate reenlistment card Retain copy of last Qualification Copy of latest NCOER/OER . Issue single soldiers Room Key _ Obtain Mailbox for single soldiers

8. _ 9. _ 10.. 11.

Note: Chain of Command must assign the soldier a weapon, weapon number, NVD number, and any other arms room equipment the soldier is responsible for. 1. 2. 13. Arms Room Initiate required equipment cards Issue sensitive item Bll to individual soldiers NBC Assign Mask Conduct PATs testing, Suppiv (SEE ATTACHED SHEET) Chain of Command Briefings 4. 5. First Sergeant Commander 2. _ 4. _ Order Optical Inserts if required Measure for J-S List.

1. |Wu(/^quad Leader 2. W ^ A Section Sergeant 3.

Signature of Training NCO (When Completed),

Section Leader

AFDR-BBA-HC ^ ^ 3 JULY 2008 SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).
HHC BDE Company Personal Data Sheet HHC BDE. 2D BCT SUPPLY IN-PROCESSING SHEET (WITHIN 72 HOURS) Supply Sergeant Initials Action Turn in copy of CIF print out (unit copy) Complete inspection of personal clothing DA form 3078 Complete inspection of CIF issue DA forM 3645-1A Complete and turn in high dollar value item sheet Issue linen if required Issue the following items: Blank adaptor 7 magazines Assault pack Knee pads Elbow pads BLIPS or SPECS Cleaning kit Luminous Tape Team Leader Initials Date:

* Soldiers must turn in CIF unit copy, DA Form 3078, and DA Form 3645-1A before supply will issue items.

AFDR-BBA-HC ^ ^ 3JULY2008 SUBJECT: Personnel In processing Standard Operating Procedures (SOP). OOE, 20 OCT ^^^T^^LCO0^8E^^^OC^EC^^^8T AFDRBBAHC 3JUI^Y2008

808^ECT^Personnel Inprocessing Standard Operating Procedure 1 The following outline is to be used asachecklist for NewSoldier Reception and Integrationcounseling 2 Squad Leaders (first line supervisors)will discuss the following checklist with their newSoldierAftereach section iscomplete, the incoming soldierwill initial nextto the number Once the counseling session is complete, the soldierwill read the Company policy letters and sign the appropriate line on the last pageofthis packet AOrugAbuse^Useof controlled substances Llllegaldrugsareeasilyavailable 2 No second chancesfordruguse^ drug use^recommendationforseparation 3ReviewCID investigation of^The Dungeon" andtheBattalionCommander'sletter to soldiers 4Reviewarticle"DrugAbuserl^ooksBackatBad Choices" 5 Urinalysis: ^ 0 0 ^ at least once every other months ^ 0 ^ twice per month ^ Narcotic Detection Dog Inspections B. Alcohol Abuse LMost misconduct is alcohol related 2Drinking underage is prohibited in and out ofthe barracks 3 Drinking and driving: zero tolerance 4Breathalyzertesting:refusingtotakeitisnotanoption^refusing^disobeyinga
lawful order

5. Alcohol abuse leads to many other problems 6. Alcohol related incident will warrant entry into ADAPCP C Local Orientation LBrief local area issues to include "off limits"establishments 2Swimming and watersports, drowning,buddysystem O.l^i^itarya^pear^ooo^ military ^eario^^aoc^o^i^ooo^uot LHaircut 2 Uniform: ACU'sPT,andClassA 3. Courtesy to NCOs^ discipline 4 Courtesy to officers^ stand at attention until told otherwise 5ReviewhistoricalAr^icle15listing

AFDR-BBA-HC ^ ^ 3 JULY 2008 SUBJECT: Personnel In-processing Standard Operating Procedures (SOP). 6. Overweight program E. Counseling and promotions 1. Monthly performance counseling 2. Review time-in-grade/ time-in-service promotion chart 3. Promotion Waiver boards 4. Promotion boards/soldier of the month boards F. Indebtedness 1. Determine if the Soldier is having any pay problems 2. Bad check writing is prohibited; possible UCMJ offense 3. Separation from the military for extreme indebtedness 4. Government Credit Card Policies G. Barracks visitation policy 1. Sign-in roster at Battalion staff duty desk 2. Time standards: Night before duty days, out by 2300; Weekends 0200 H. Physical Training 1. Review company policy letter 2. APFT failure policy 3. The foundation of their job 4. Diagnostic APFT (within 7 days) 5. Record APFT (after 90 days) I. Military Schools 1. Review company policy letter 2. Most schools related to APFT J. Equal Opportunity Program 1. Review company policy letter 2. Monthly Heritage Celebrations K. Open Ooor Policy 1. Review Company Policy L Families 1. HHC BDE Company Family Readiness Group 2. DEERS 3. Delta Dental 4. Wills and power of attorney ^

AFDRBBAHC ^ ^ 3JULY2008 SUBJECT: Personnel In-proccssing Standard Operating Procedures(SOP). 6 7 8. 9 Family Care Plan^EFMP Command sponsorship procedures Domestic violence Status of Housing/^Ouarters Inspection (within 72 hours)

M. Orientation toward the L^nit LUnit History andTraditions 2 Missions and Activities 3. Chain of Command and NCO Support Channel 4Soldiers Duty assignmentandit'simportance to the unit 5Currenttrainingcycleandwhatnormallyoccursduring each training cycle 6 Equipment SOP 7TiedownSOP 8 Battle Drill SOP 9. Weapons Familiarization^PMI l^.l^eave and Pass Policies ^. Mileage passes past Syracuse 2 CanadaS2brief 3 Privilege notaright O. Daily and weekly recurring events LDaily - 0545 sick call - 0700 PT Formation - 0 9 3 0 Work Call Formation Inspections DAILY - launch typicallyfrom1130-1300 - 1700 Closeout formation 2Weekly Mondays will be command maintenance WednesdaysareFootmarchdaysand Sergeant's TimeTraining P.89f6ty LPO^safety^lnspection (within 72 hours) 2 Privately Owned Weapons; registered^stored in the Arms Room 3. Hot/^Cold weather injuries 4 B^00Y SYSTEM USE ITII 0. Policy betters LRead all Policy l^etters 2 Ouestions7 2 lhave been thoroughly briefed and counseled on what is expected of me asa 8

AFDR-BBA-HC ^ ^ 3 JULY 2008 SUBJECT: Personnel In-processing Standard Operating Procedures (SOP). Soldier assigned to HHC BDE. I fully understand everything that has been discussed above and will accept responsibility for my actions. Nari)^/_^aDk^/^Signa^^
^ ^ ' ^ ^ ^ ^ ^ ^ ^ = ^

Date ^

Name / Rank / Signature of Counselor / Date

^sc X 4n/a

S S C ^^a^^Htir

0y

"^^0 REQUEST AND AUTHORITY FOR LEAVE


is form is subject to the Privacy Act of 1974, For use of this form, see AR 600-8-10, (See instructions on reverse.) The proponent agency is DCS, G-1,

1. CONTROL NUMBER

-s^
2, NAME (Last, First, Middle Initial) 3. SSN

PART I 4 RANK

MANNING, BRADLEY E.

(b) (6), (b) (7)(C) (b) (6), (b) (7)(C)


a. ACCRUED

6. LEAVE ADDRESS Phone No.)

(Sfreef, City, State, ZIP Code and

7.

(b) (6), (b) TYPE OF LEAVE (7)(C)


ORDINARY I J EMERGENCY ""1 OTHER PERMISSIVE TDY

PV2
8

20081204
ORGN, STATION, AND PHONE NO.

HHC, 2 BCT, 10 MTN DIV FORT DRUM, NEW YORK (315)772-7347


10. a. FROM DATES b TO

NUMBER DAYS LEAVE b REQUESTED C . ADVANCED

d. EXCESS

\ l

8 Y ^ ^

12
RyiSOgfRECOMMENDATION/SIGNATURE DISAf^ROVAL

20081222

20090102

13. SIGNATURE AND TITLE OF APPROVING AUTHORITY

V /z^
14 a, DAT DEPARTURE b, TIME c, ^ M E / T I T L E / S I G N A T U R E OF DEPARTURE A U T M ^ I ^ T ^ ^

<r
6 0 Ku/;%IV!!

15. a

r^orco^
NUMBER DAYS

G '0
b. DATE APPROVED

r^NWtsrtt.fAvlt
EXTENSION

C, NAME/TITLE/SIGNATURE OF APPROVAL AUTHORITY

16. a. DATE b, TIME c

RETURN NAME/TITLE/SIGNATURE OF F^TURN AUTHORITY

0Z
17. REMARKS

povAAiD oN \?e'<;/sTf/e. x^7M<J ^or /tf/f//<^P /j/ bO^(o


Chargeable leav^ is from

c P P ^ O < ^ ,^ c:^ 5 6 ( ^ 6 ^

PART II - EMERGENCY LEAVE TRANSPORTATION AND TRAVEL 18. You are authorized to proceed on official travel in connection with emergency leave and upon completion of your leave and travel will return to home station (or location) designated by military orders. You are directed to report to the Aerial Port of Embarkation (APOE) lor onward movement to the authorized international airport designated in your travel documents. All additional travel is chargeable to leave. Do not depart the installation without reservations or tickets for authorized space required transportation. File a no-pay travel voucher with a copy of your travel documents or boarding pass within 5 working days after your return. Submit request for leave extension to your commander. The American Red Cross can assist you in notifying your commander of your request for extension of leave. 19 INSTRUCTIONS FOR SCHEDULING RETURN TRANSPORTATION:

For return military travel reservations in CONUS call the MAC Passenger Reservation Center (PRC): Should you require other assistance call PAP: 20. DEPARTED UNIT 21 ARRIVED APOD 22, ARRIVED APOE (return only) 23, ARRIVED HOME UNIT

24

PART III - DEPENDENT TRAVEL AUTHORIZATION (Space available or required cash (Space required) reimbursable)

25.

LJ

ONE WAY

ROUND TRIP

TRANSPORTATION AUTHORIZED FOR DEPENDENTS LISTED IN BLOCK NO 25 DEPENDENT INFORMATION

a. DEPENDENTS

(Last name, First. Ml)

b. RELATIONSHIP

DATES OF BIRTH (Children)

PASSPORT NUMBER

PART IV - AUTHENTICATION FOR TRAVEL AUTHORIZATION 26 28 DESIGNATION AND LOCATION OF HEADQUARTERS DATE ISSUED 29 TRAVEL ORDER NUMBER 27 ACCOUNTING CITATION 30. ORDER AUTHORIZING OFFICIAL (Title and signature) ORAUTHENTICATION

DA FORM 3 1 , SEP 1993

EDITION OF 1 AUG 75 IS OBSOLETE

Page 1 of 2 APD PE v5,02ES

Copy 1

Circle the appropriate copy designator Copy 3 Copy 2

Copy 4

PERSONNEL ACTION
For use of this form, see AR 600-8-6 and DA PAM 600-8-21; the proponent agency is ODCSPER DATA REQUIRED BY THE PRIVACY ACT OF 1974 AUTHORITY: PRINCIPAL PURPOSE: ROUTINE USES: DISCLOSURE: 1. THRU Title 5, Section 3012; Title 10, USC, E.O. 9397. Used by soldier In accordance with DA PAM 600-8-21 when requesting a personnel action on his/her own behalf (Section III), To initiate the processing of a personnel action being requested by the soldier. Voluntary. Failure to provide social security number may result in a delay or error in processing of the request for personnel action. 2. TO (Include ZIP Code) 3. FROM (Include ZIP Code)

(Include ZIP Code)

Commander 2BCT, 10th MTN DIV (LI) FORT DRUM, NY


SECTION I - PERSONAL IDENTIFICATION 4. NAME (Last, First, Ml) 5. GRADE OR RANK/PMOS/AOC

Commander HHC 2BCT, 10th MTN DIV (LI) FORT DRUM., NY

6. SOCIAL SECURITY NUMBER

MANNING, BRADLEY E

E-2/PV2/35F
SECTION II DUTY STATUS CHANGE (AR 600-8-6)

(b) (6), (b) (7)(C)

7. The above soldier's duty status is changed from

to effective hours.

SECTION III - REQUEST FOR PERSONNEL ACTION 8. I request the following action; Service School (Enl only) ROTC or Reserve Component Duty Volunteering For Oversea Service Ranger Training Reassignment Extreme Family Problems Exchange Reassignment Airborne Training. 9. SIGNATURE OF SOLDIER (When required) (Enl only) (Check as appropriate) Special Forces Training/Assignment On-the-Job Training (Enl only) Retesting in Army Personnel Tests Reassignment Married Army Couples Reclassification Officer Candidate School Asgmt of Pers with Exceptional Family Members Identification Card Identification Tags Separate Rations Leave - Excess/Advance/Outside CONUS Change of Name/SSN/DOB

Other (Specify)

Advancement to PFC
(YYYYMMDD)

10. DATE

20090114
SECTION IV - REMARKS (Applies to Sections II, III. and V) (Continue on separate sheet) REQUEST FOR: ADVANCEMENT TO PRIVATE FIRST CLASS ACTION: a. RANK APPOINTED TO: PFC b. MOS AWARDED: N/A c. MOS WITHDRAWN: N/A d. EFFECTIVE DATE: 20081002 e. DATE OF RANK: 20081002 f. AUTHORITY: AR 600-8-19 g. ADDITIONAL INSTRUCTIONS: TIS/TIG WAIVER HAS BEEN GRANTED

SECTION V - CERTIFICATION/APPROVAUDISAPPROVAL 11. 1 certify that the duty status change (Section II) or that the request for personnel action (Section III) ::ontained herein HAS BEEN VERIFIED RECOMMEND APPROVAL RECOMMEND DISAPPROVAL

X IS APPROVED

1 IS DISAPPROVED (YYYYMMDD)

12. COMMANDER/AUTHORIZED REPRESENTATIVE

13 SIGNATURE

14. DATE

V
EDWARD S. WALTER CPT, MI, CMD DA FORM 4187, JAN 2000

^^^^^^^^^^^^^^^^^
PREVIOUS EDITIONS ARE OBSOLETE

^ /
APD PE V1.00ES

^ ^

1^
^ ^ ^ ^

TJ <V
M

CZ)

_s
(D

^ ^

^ ^

tf
(D u u
3
LA LA LA LA

O u

s o U

LT)

2
V : %
pfi

^ ^

a s H Q
PN

oo

o o

(N H

Cl^
^

03

o U

g 3
Kfl

*o (N
n3 C O) >

PRE DEPLOYMENT

p F C rhANNTNG, 6(SA0LtY

H HC a t r tooo
MEDICAL SRC CHECKLIST
^RC/MOB

There are 9 stations you will need to see today

1) Check In:

Jenine Parker MSA, SRC R. Drum, NY

2) Screener:

Jenine Parker MSA, SRC Ft. Driim^ MV

f^i^'y
3) Lab:

Ft Drum, NY 13602 Ricijard Lashwav I.PN/SRP Lm/SRC Ft Drum,NY 13602

4) Immunizations:

5) Vision: By Screener

Optometry Not Cleared


Or Optometry

fm^m>
6) Hearing:

ltDmmNY136ro

7) Provider:

%^'^=^.KPAC f t Drum, NY 13602

Ethel O'Neal MRT, SRC Fi Drum.


8) CHOS.

9) Final Out:,

MCID-SRC FM 854-R, OCT 2008

GAHCvl.00

Name:

Rank:

SSN:

Unit:

FT. DRUM MEDICAL SRC SOLDIER CHECKLIST


Please provide checklist to every Soldier a week before arriving at the Medical SRC processing site. Soldiers must bring the following items to the medical SRC site during processing: 1. 2 3. 4. 5. 6. 7. 8. DD 2766 Deployment Record Medical Record Any Profiles Yellow Shot Card PHS 731 Two pairs of glasses and one pair of inserts Medical warning tags (in applicable) Hearing aids with one year supply of batteries (if applicable) Two pairs of glasses and 1 set of mask inserts (if applicable)

Notes: *Must have in hand two pair of glasses and one set of gas mask inserts or soldier will not be cleared, * Annual Hearing Exam -Soldiers need annual hearing exam to clear SRC ""FEMALES - pregnancy test will be done at SRC. Females must have results from pap smear within one year of deploying. Medical SRC Contact Number: 772-0063

1
a >
V

si
a ' o >. e ^

gI
00
<

>> W)

a
8
to

I
u
(M

1
o
o ^
(S 4)

1
o
CD

# o

"B.

z
u

il
3

%a s
a w c

fS

Ii
3 S

I i
'.a

cs

11 .1 5 u ^ ii!
B

21

II
Z
V

II
o

i!
2

il
s?
o

u o

>

> _o "5 a

1
a

ll 5 2
B > O
V V
V)

< S

a SI I

a.i
O I I
DC ^

w a 5 K o cr ^ .a x: a u .ti S = 5

ts

i 11
C O 'S

= 6

#f i l il

>^ 8

r* <o
IJ-

o
V)

r- ro \o
If)

5 6

3 O ^ > (w O

2 5

t
Ifl

L.

% a w o

a <

II

II
t'&B

kn

m
<N

m
fS

"<1- -qm m (S (S

o 7l a S 5^ (2%

ll

n
S

" s

il
U O

S |

K
%
M

si

<n

O J3 M o

>

s
5o
J3

"O

a.
o

_c > %
ja

2.
a %
3
4>
N

% sI

U)

s.
3

'Ml
.!2 "O

1a cr
M

a o

k. bl

I
i

c
V)

.S aS g) ^ R

5 2 I3 5 8
u

u o ^

-56.8

111.1 itil
eiri

^afl s Fili op o .a
" 2

o .*i jd u

2 I
^.

I "III E g
i y% g g ^ ^
V) rj-

~J " ^
w

.S3 II (S m ^ V) w ., II II a a w L. V (0 o

m
(N

g
^

i|fi
H ^ > Z

3 O

a
u

(N

%
M

6 ^

>..s#

O JS OtI B

>

cn

% % a
cc

i I

I E

III I ir
o ^Si a w C O
i>

.III
Is
ts ^
00

a > b e > _

i.a
3

u o
J3 , >

I
%
o w
w

e a %

w _a % a o

't-i

I
!

l>'|

:tj
Ou cw O

o a

o- 8

f!

=3

11.1
^ ao o
-a O T. >>

Q
V

& < % ,

I I
i
V)

% eg

if" l
5 S ^
t cs &
a u

Ll I 11 I
u

M
<n

:
S .2 K

ii IIH
ts M

ll 1 I
:s:2
o

S3 0)

1)

B-e 3

^ o

M s ^
s|
00 o

^ o >\ T3
u
3

|i I I
II II (N m

cr m
(N

m
fS

H
i ! ^

8 ^ M< S

II. II u
.a 2 K o
\o

cj 5

it
C O C O

" .22 < u

s a

b ^

I. IfIS !
o B. r"o

a
in

u
3

g
a o c ^

u
C (D

g. a a
w
3

la
a.

I III e
3
<J

i
rS

O w
a c^ o a

^ a a

t
rS
cs

ll
< s

11
IM -W

P 2

bO

g
^ U o ~
Crt

o
B

1!
u rS

0 R S W D

E a

"IK 6 1

SrS

_ 3 !

I
o.
es Q,

II

II !l

Si i! 15
5 n
J3 U

Ofl o

<s m

ill

5
a. : <u a "
03

tl

Ii
<A

b S a

30 3
u

i=fi

3s
(2 2

o o

.E < S
~ J3 u.

3 O

(N
T3 O P 00

I I 2 E
*
.>> <D

I
g8
8
Xl o

a o
i.

DO

II
p

00

cs

>
o a.

cs
00 C

S.S

^
00

JS

- !s

II
,P -a p

58 ^ 3
0)

s g
^
a
il

i''"^
K k a & c

o u

c I 'i u " a

_e ra u

1 2 .5
o

00

1=
i
o
3 O

5
_a
J3 3

>,
u

CL
U _U

u oo .X

o
e 5
a
p
ti

_p

> K < u x: ?
a
p

# Le m ^
p

o. oo
^.o X

ir
U X3 o >

: 8

,p 5 %

3 O

eta

.g) s

E B ^ " "
ll
P .

PP 1
P. Q

S 5 .2
O

g %
it! 3

J3

cs
C S

il
u
"O u J= U .>

I "i
2

i f i .sis
tn 00

5 _c
_o

o *^

tn u >

&

B
00 p

Si
a
p u

_p

1 a
C O

g.^
c s g

>

s^
< u E > -a IS %
00 o

I:
= 4)

g
O"

I?

"s^^ >B r u Ia < ^ S ts S iI ^ &o


% u

^1

u
K

z
ID

5 o 5 o "

<- -a Q
o cs
V

& < !
u
X

I
(U

p p

.s
g
o

II
? >
I) -*
IU o-%

r-^
3

T3

o lU P 3 Xi a ' u D. u

>
ja

cs

5l
^

:S t5 2 a^ 2

#g

I If
a (u a T3 o-

u
u

o 00

^ ga 0 > u Jo g 3
w-i

g kg o u ^^Sz
2 2 R
<

>,

cs

%
cs J3

1
in Tj-

I^IA
% ^ '

^
m
(N

1 al

I
-q-

ill
>\ -c

'U
6 .52

^1
m rs

^ K

feb
cs

^ 1 2i g
> 2 Z J' O 3 E
o

oo o

1 1
0\

11
00
P

z>

3 P

"

I gc^

I -5

s#l g
p

f!) g S I

f
C O

I
l> S

i .1
S
c P a

Q
u

V p

31
M 3 P

a.

. 0 0 cs U

j C O

-o oo a

t^

u a ^tS. N'#

B
c cs

3 S
4> 'C

Ji
E T) 4)

S O" 3 3 a't; C S o oo P

> a o a.

a
B a o
CS 3

K
a

is o.
p

o c
p

3 a % S %
;

( S
C O a,

.1^ 1
M JJ

i ll i'!:;
aZ ^

i ^ 51 !1 a (u
W J3

IS I I f . l in Ic2 >\
a a >

1 ^
V

" o b
3

i
. _

x> >

^ % 8:^

It
C O

l^z,^
-

es

N -S
u u u cs
Q-

o a to

>
u
^ cs

i ll g
s

.11
IU ) ~

"es i_

i3

II I f
M O

% o^ 5-:
g-^
>\

N 8 ^1 a a.
p

y
g.:
q : u a

If
u
O *3

HI
3 '5
O o u g
p Q,
C O

5 ^1
^ S
W

p S u 'ts

Ji
<j

u 5" < u u
a a M a u a

a"

ll II

Eig . . .
3, p .5 c =; J 3
c3 00

gcS
^

II tl

ill
' ( N

^ P es u

III i l
> a
p o T (N u P
OJ

Sg
n

U= t
1 1 '# o a j X) c S e :?? ^'
H '
00 3 a a P ( N K U O

5 .a Z c Q

cs

i|5
vo ^

ll

c s a. a u

. 3 ^

I 6 a
o >^
o

RECORD OF EMERCENCYDATA

Page 1 of2

NAME: MANNING, BRADLEY EDWARD SSN: (b)

(6), RECORD OF EMERGENCY DATA (b) (7) (C)

PRIVACY ACT STATEMENT AUTHORITY: 5 USC 552, 10 USC 655, 1475 to 1480 and 2771, 38 USC 1970, 44 USC 3101, and EO 9397 (SSN). PRINCIPAL PURPOSES: This form is used by military personnel and Department of Defense civilian and contractor personnel, collectively referred to as civilians, when applicable. For military personnel, it is used to designate beneficiaries for certain benefits in the event of the Service member's death. It is also a guide for disposition of that member's pay and allowances if captured, missing or interned. It also shows names and addresses of the person(s) the Service member desires to be notified in case of emergency or death. For civilian personnel, it is used to expedite the notification process in the event of an emergency and/or death of the member. The purpose of soliciting the SSN is to provide positive identification. All items may not be applicable. ROUTINE USES: None. DISCLOSURE: Voluntary; however, failure to provide accurate personal identifier information and other solicited information will delay notification and the processing of benefits to designated beneficiaries if applicable. INSTRUCTIONS TO SERVICE MEMBER This extremely important form is to be used by you to show the names and addresses of your spouse, children, parents, and any other person(s) you would like notified if you become a casualty (other family members or fiance), and, to designate beneficiaries for certain benefits if you die. IT IS YOUR RESPONSIBILITY to keep your Record of Emergency Data up to date to show your desires as to beneficiaries to receive certain death payments, and to show changes in your family or other personnel listed, for example, as a result of marriage, civil court action, death, or address change. INSTRUCTIONS TO CIVILIANS < 3 be used by you to show the This extremely important form is t names and addresses of your spouse, children, parents, and any other person(s) you would like notified if you become a casualty. Not every item on this form is applicable to you. This form is used by the Department of Defense (DoD) to expedite notification in the case of emergencies or death. It does not have a legal impact on other forms you may have completed with the DoD or your employer.

IMPORTANT: This form is divided into two sections: Section 1 - Emergency Contact Information and Section 2 - Benefits Related Information. READ THE INSTRUCTIONS ON PAGES 3 AND 4 BEFORE COMPLETING THIS FORM.

SECTION 1 - EMERGENCY CONTACT INFORMATION

1. NAME (Last First. Middle Initial) MANNING, BRADLEY EDWARD 3a. SERVICE/CIVILIAN CATEGORY
ARMY NAVY MARINE CORPS

2. SSN

(b) (6)
b. REPORTING UNIT CODE/DUTY STATION CONTRACTOR WBDAAA / FT DRUM

4a. SPOUSE NAME (if applicable (Last, First, Middle Initial) SINGLE 5. CHILDREN a. NAME (Last, First Middle Initial) None. 6a. FATHER NAME (Last, First, Middle Initial) BRIAN EDWARD MANNING 7a. MOTHER NAME fi-ast. First, Middle Initial) SUSAN MARY MANNING 8a. DO NOT NOTIFY DUE TO ILL HEALTH None. 9a. DESIGNATED PERSON(S) (Military Only) None. b. RELATIONSHIP

b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER

c. DATE OF BIRTH (YYYYMMDD)

d. ADDRESS (include ZIP Code) AND TELEPHONE NUMBER

b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER

(b) (6), (b) (7)(C)


b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER

(b) (6), (b) (7)(C)


b. NOTIFY INSTEAD

b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER

10. CONTRACTING AGENCY AND TELEPHONE NUMBER (Contractors only) DD FORM 93 (E), JAN 2008 NAME: MANNING, BRADLEY EDWARD SSN:(b) PREVIOUS EDITION IS OBSOLETE

(6)
SECTION 2 - BENEFITS RELATED INFORMATION

11a. BENEFICIARY(IES) FOR DEATH GRATUITY (Military only) TYLER RAYMOND WATKINS

b. RELATIONSHIP c. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER OTHER

d. PERCENTAGE

(b) (6)
b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER

100 C. PERCENTAGE

12a. BENEFICIARY(IES) FOR UNPAID PAY/ALLOWANCES (Military only) NAME AND RELATIONSHIP BRIAN EDWARD MANNING (FATHER) 13a. PERSON AUTHORIZED TO DIRECT DISPOSITION (PADD)

(b) (6)

100

b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER

RECORD OF EMERGENCY DATA

Fage2of2

NAME: MANNING, BRADLEY EDWARD SSN: (b) (Military only) NAME AND RELATIONSHIP

(6) (b) (6)

(b) (6), (b) (7)(C)


14. CONTINUATION/REMARKS 15. SIGNATURE OF SERVICE MEMBER/CIVILIAN (Includerank, rate, or ^grade if applicable)

16. SIGNATURE OF WITNESS (Include rank, rate or grade as appropriate)

17. DATE SIGNED (YYYYMMDD)

^
DD FORM 93 (E)(BACK),JAN 2008

SERVICEMEN'S GROUP LIFE INSURANCE ELECTION AND CERTIFICATE

Page 1 of 1

Please read the instructions before completing this form

Servicemembers' Group Life Insurance Election and Certificate


Use this form to: (check all thai apply) Name or update your beneficiary Reduce the amount of your insurance coverage Decline insurance coverage Last name First name BRADLEY MANNING Branch of Service(Do not abbreviate) Army Middle name Suf. EDWARD Current Duty Location WBDAAA Rank, title or grade PFC Social Security Number Important: This form is for use by Active Duty and Reserve members. This form does not apply to and cannot be used for any other Government Life Insurance.

(b) (6), (b) (7) (C)

A m o u n t of Insurance By law, you are automatically insured for $400,000. If y o u want $400,000 o f insurance, skip to Beneficiary(ies) and Payment Options. If y o u want less than $400,000 of insurance, please check the appropriate block below and write the amount desired and your initials.Coverage is available in increments of $50,000. If y o u do not want any insurance', check the appropriate block below and write (in your own handwriting), "I do not want insurance at this time." Declining SGLI coverage also cancels all family coverage under the SGLI program. I want coverage in the amount of $ Your initials

(Write "I do not want Insurance at this time.") 'Note: Reduced or refused insurance can only be restored by completing form SGLV 8285 with proof of good health and compliance with other requirements. Reduced or refused insurance will also affect the amount of VGLI you can convert to upon separation from service.

Beneficiary(ies) and Payment Options


I designate the following beneflciary(ies) to receive payment of my insurance proceeds. I understand that the principal beneficlary(ies) will receive payment upon my death. If all principal beneficiaries predecease me, the insurance will be paid to the contingent beneficiarv(ies). Share to each Payment Option Social Security Complete Name (first, middle, last) and Address of each Relationship to beneficiary (Lump sum or 36 Number (Use %, $ amounts equal monthly beneficiary you (If known) or fractions) payments) Principal OTHER 100% LUMPSUM

(b) (6), (b) (7)(C) (b) (6), (b) (7)(C)


I . . . Contingent

AUNT

100%

LUMP SUM

HAVE READ AND UNDERSTAND the instructions on pages 2 and 3 of this f o r m . I ALSO UNDERSTAND that: This form cancels any prior beneficiary or payment instructions. The proceeds will be paid to beneficiaries as stated in #6 on page 3 of this form, unless othenwise stated above. If I have legal questions about this form, I may consult with a military attorney at no expense to me. I cannot have combined SGLI aoiiMQL\ coverages at the same time for more than $400,000. Date: (Your Signature. Do not print.
D o n o t w r i t e i n s p a c e b e l o w . F o r o f f i c i a l u s e onl^

SIGN HERE IN INK

20090821

TNESSED AN0TRECEIVED BY:

RANK, TITLE OR GRADE

ORGANIZATION

DATE RECEIVED

^ / ^ ^
V-R28B IF\ SGLV-8286 (E)

^
I

//^^ ^

2^f^Z//

I ^ l ^ ^ l ^ l ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ - ^

^c.^^^^^oo-..^o^c^.^c^^^c^cooo-^o^c^.^c.^^ ^ ^ c : ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ . ^ ^c^-o ' ' i : ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ - o

> _ ^ :^^^ ^ H ^^^^^^ ^^^^ ^^^^

si
S
z z p w
D r m m o O

l> z

^^^^^^^ ^^^^^^
|P^55
0 ^ ^ ^ ^ ^

?
<

^^^^
^^5^

I
o

5^^^
^amo;^ e o

^ m -o

<
I TI O

^ ^ ^ ^^ ^^ ^^ ^^ ^^ ^ ^OOO^^e::^ ^^^^^^^
^;:i^^^a

s
a'
3

r
01 3 C

j (/) H

m z

c c c c CACAcncn HHHHH-n-n 3 0 0 0 0 0 0 g | COS

c
01 mJIQ

O 71

m o m o

ggiiip

z z z z z > mmCC>nz mm-DTj"D> ntrrirTin T i T i T i to totnen. COO Z Z Z z z z r r r

o C D

). CJ CO

cntntncn mriTin OOOO

CO

m I 3 ;

V>

m O
H

f
(b) (6), (b) (7) (C)

% m
C O

V c

>z

IS
C O S. S Q

8 a. g C

(b ) (6 ), (b ) (7 ) (C )

o z
70

m
3 u
3r (A

o s

>

DEPLOYMENT CYCLE SUPPORT (DCS) CHECKLIST


For use of this form, see Army Directive 2007-02; the proponent agency is DCS, G-1. DATA REQUIRED BY THE PRIVACY ACT OF 1974 AUTHORITY: PURPOSE: ROUTINE USES: DISCLOSURE: 10 USC Section 3013, Secretary ofthe Army; Department of the Army Deptoyment Cycle Support (DCS) Directive; and EO 9397 ^SSA^I. To provide a standardized means to evaluate readiness posture and validate military and non-military personnel for deployment. The "Blanket Routine Uses" set forth at the beginning of the Army compilation of systems of records notice apply. Voluntary. However, failure to update and confinn information is correct may impede processing time and deployability status. The Deployment Cycle Support Checklist is filed in the Deployment Packet to complete the action. A copy remains at the losing organization. 1. DATE (YYYYMMDD) 2. NAME (Last, First, Middle)

^ o \ o o 3 3L0
4. SERVICE AFFILIATION USA USMC USN USAF USCG PHS

nnAhJNrwCr, SA-APLH 8. &DwAQD 5. COMPONENT STATUS


ACTIVE 1 ^ GUARD RESERVE AAFES OTHER (Specify) NON-MILITARY TPU IRR IMA 10. TRAVEL STATUS a. UNIT ORDER b. INDIVIDUAL AGR RET NG10

(b) (6), (b) (7)(C)


7. PAY PLAN/GRADE

3. SSN

NOAA

NG32 8. MOBILIZATION DEPLOYMENT CENTER

9. NON-MILITARY STATUS DOD DAC CONTRACTOR RED CROSS

11. DATE OF BIRTH CyYYYMMDDj

poRT Okor\

MM n %y
17. DEPLOYMENT COUNTRY 21. CONUS REPLACEMENT CENTER

12. ARMY COMMANDS 15. REDEPLOYMENT DATE (YYYYMMDD)

13. DATE ARRIVED IN THEATER (YYYYMMDD) 14. CITIZENSHIP COUNTRY

l a OCT "a (710


18. PARENT UIC 19. DUIC

^oio

16. REFRAD DATE (YYYYMMDD) 20. UNIT DSN PHONE NUMBER

wO^ AAA
22. STATUS OF EACH DCS STAGE and COMMANDER'S VALIDATION MEMO (C= Completed; NC = Not Completed) a. TRAIN-UP/PREP

C I

I NC

b. MOBILIZATION NC C g. RECONSTITUTION

c. DEPLOYMENT NC C h. CDR VALIDATION MEMO

d. EMPLOYMENT NC C

e. REDEPLOYMENT C NC

f. POST-DEPLOYMENT C NC

I NC

IN C

SECTION I - DCS VALIDATION Part A - Accuracy Statement: I understand I am certified for reconstitution and, to the best of my knowledge, all information contained in this document is correct and cun-ent. 1. SIGNA 2. RANK 3. TITLE

5 PC /Jd10. ADDRESS

tWT<Lu_I(,fh/CE At^cuy^r

PartB -^iret Lli Line Leader/Immediate Supervisor's Authentication I have authenticated the information contained in this checklist as correct and cun-ent. 4. PRINTED NAME (Supen/isor) 5. RANK 6. TITLE 7. SIGNATURE

/iPtL^sL
8. DATE fyyyyMMDD; 11. PHONE NUMBER

HuUhtP'^on
9. UNIT 12. E-MAIL ADDRESS

,^ . 13. L^O DSN

n 14. FAX PHONE NUMBER

y^^^y^rr

f3l

t/a^^^^

r)^^oH

(b I ^liHItLf ) for reconstitution based on the certifying official's Part C - Commander's Acknowledgment: (Commanders may approve an individual recommendation, criticality, and mission needs, unless otherwise indicated.) I acknowledge the checklist findings. (6 16. R ^ ^ 17. TITLE ^ 18. SIGNATURE ), ,^^.^i 'It/ f^ftebvLV (b 19. DATE (YYYYMMDD) 20. UNI^ 21. ADDRESS _ _ ) (7 22. PHONE NUMBER 23. E-MAIL ADDRESS 25. FAX NUMBER (b) (6), (b) (7)(C) ) (b) (6), (b) (7)(C) (C Part D - DCS Validation: ALL DEPLOYMENT CYCLE SUPPORT requirements re ) updated and all DCS requirements completed.

(b) (6), (b) (7)(C)

#r ^

/^^i/A^-y^r

26. PRINTED NAME (Validationg Official)

27. RANK 32. ADDRESS

28. TITLE

, /

29. SIGNATURE

t)4.f\iel't
33. PHONE NUMBER

Sdoy^r/
1. UNIT

30. DATE ('YYVYM/WDDJ

5&r

HHC Z f^a
34 E-MAIL ADDRESS

fol
[p.

(b) (6), (b) (7)(C) 307 DA FORM 7631, MAR 2007

hhyr^^er QIZQ^ (b) (6), (b) (7) (b) (6), (b) (7)(C) (C)

36. FAX NUMBER Page 1 of 14


APD VI .00

T'

#
SSN

NAME (Last, First Middle)

fviBNWXvGr,
1

gi^Apc<LS

CQ^p,^9

(b) (6), (b) (7)(C)


DCS VALIDATION
COMPLETED COMPLETED

Deployment Cycle Supp ort Tasks

NOT

NA

DATE CYYYVMMDDj

SECTION IV - Employment

Stage

(Continued) Legal Assistance Office

Counseling on civil matters provided, as required Tax classes / information for spouses provided, as required DEERS / RAPIDS / ID Card Office ID Cards / ID Tags updated, as required DEERS / RAPIDS enrollment completed, as required DEERS / RAPIDS data entry and date for residential address completed, as required SECTION V - Redeployment Stage Unit Commander / Unit Leadership Single Soldiers identified and support ensured Unit Refresher / Army Sexual Assault Prevention and Response training completed Leave schedule published Investigations (e.g. Line of Duty, AR 15-6) initiated and completed, as required Disciplinary and adverse administrative actions finalized, as required Soldiers counseled on requirement to provide financial support to family while deployed OERs, NCOERs, civilian evaluations, and awards completed, as required Soldier counseling conducted, as required Soldiers identified with potential financial issues referred to financial training or assistance Personnel Reporting System updated CIVTRACKS for DA civilians updated RDC provided with updated redeployment rosters Risk Reduction Reintegration Tip Card utilized Plan and coordinate reunion and homecoming ceremonies Soldiers who PCS and TCS complete the DCS process, as required Unit Ministry Team / Installation Chaplain Suicide Awareness and Prevention training conducted Families with reported stress and separation issues identified, as required Small group discussions on deployment experiences facilitated Operation READY Reunion / Reintegration training for Soldier's conducted Communication with Spouses, Families, and Children training conducted Spouses provided opportunity to take marital assessment SIGNATURE OF CERTIFYING OFFICIAL 8b. E-MAIL ADDRESS

X X X
^

X
X
^(

X X
X

y
X X

X y X
X

X X X
X
X

Y X X

DATE

(YYYYMMDD)

DA FORM 7631 MAR 2007

( (b) (6), (b) (7)(C) b ) ( 6 ), ( b

APD VI.00

#
NAME (Last, First Middle)
SSN

Mi^iuiJfNG ^

eou/AP-p
Deployment Cycle Support Tasks

(b) (6)

a
1UJ UJ _l 0.

yUJ

o! s

NA

DATE (YYYYMMDD)

8
SECTION I - Train-up / Preparation Stage Unit Commander / Unit Leadership
Single Soldiers identified and support ensured Leave schedule published Investigations (e.g. Line of Duty, AR 15-6) initiated and completed, as required Individual career counseling provided, as required Disciplinary and adverse administrative actionsfinalized,as required Sexual Assault Prevention and Response h'aining (Host Country, risk reduction factors) conducted DA Form 5305-R (Family Care Plan) completed FRG assessed, trained, and resourced RDC has completed all U^aining prior to unit deployment Family readiness plan including unit readiness goals updated Soldiers counseled on requirement to provide financial support to family while deployed OERs, NCOERs, civilian evaluations, and awards completed, as required Soldier counseling conducted, as required Soldiers identified with potentialfinancialissues referred tofinancialtraining or assistance Command Climate Survey conducted Soldiers who PCS and TCS complete the DCS process, as required Soldiers encouraged to communicate with family throughout tiie deployment cycle Conduct UnitRisk Inventory <URI> NLT-3Q^days prioHo deployment

SIGNATURE OF CERTIFYING OFFICIAL

8b. E-MAIL ADDRESS

DATE

(YYYYMMDD)

DA FORM 7631, MAR 2007

Page 2 of 14 APD PE vi .00

#
NAME (Last, First Middle)
SSN

(b) (6)

MAMWlN(c, (^R(\PLts

eOu/AAD
DCS VALIDATION a a
LLI

Deployment Cycle Support Tasks

1COMI
LU _l

SECTION I - Train-up / Preparation Stage (Continued) Unit Ministry Team / Installation Chaplain
Families identified with reported predeployment stress, as required Spouses provided opportunity to take marital assessment instrument, as required Soldiers provided opportunity to complete marital assessment instnjment. as required Opportunity to attend voluntary marriage education/enrichment woricshops provided, as required Predeployment Battlemind training for leaders conducted Predeployment Battlemind training for junior enlisted Soldiers conducted

(wlS^D^iiwHeaithi^
Leader training on identifying symptoms of distress and suicide tendencies conducted s conducted Individuals screened for profile for permanent geographic or climate duty limitation, as required Preventative Medicine briefing to defeat disease and non-battle Injuries conducted DD Form 2795 (Pre-Deployment Healtti Assessment Questionnaire) completed ""^^^Ik ^

jDental Non-Dep*oy^^*T^/f
^ / / D I I T T

Current status of DoD charge card holders reviewed Travel advance provided for Soldiers with TCS orders

CTTegal Assistance Office.:?


Wills updated Power of Attorney providedTniinKAtrrig orTriuil m a t t a r g p r n u i r t o f T "

Legal assistance to RC Soldiers provided, as required Tax class / infomiation for spouses provided, as required

Arm:
Installation Management Command

Family Readiness staff shortages (ACS / FAC) identified, as required AA and RC Family Readiness Groups educated on available services Families educated about services provided through Military OneSource Predeployment Battlemind training for spouses conducted Operation READY Deployment and Children training Conduct Financial Management Planning for Deployments training

DEERS / RAPIDS / ID Card Office


ID Cards / ID Tags updated, as required DEERS / RAPIDS enrollment completed, as required DEERS / RAPIDS data entry and date for residential address completed, as required SIGNATURE OF CERTIFYING OFFICIAL 8b. E-MAIL ADDRESS

COMI

sS

NA

DATE (YYYYMMDD)

W\Q%'2\
DATE (YYYYMMDD)

DA FORM 7631, MAR 2007

Page 3 of 14 APD PE vi .00

NAME (Last, First Middle)

SSN

nANHrwc, &R^c?u'tv rptv/vAx?


COMPLETED

(b) (6)
DCS VALIDATION
COMPLETED

Deployment Cycle Support Tasks

NOT

NA

DATE (YYYYMMDD)

SECTION V - Redeployment Stage (Continued) Personnel Service Center MMRB, MEB, PEB conducted, as required Medical / Dental Health Teams Leader training on symptoms of distress and suicide tendencies conducted Individuals screened for medical profile geographic or climate duty limitation, as required Behavioral Health Assessments conducted Soldiers with behavioral or health issues referred Potential family issues identified Health Threat briefing for childcare providers conducted Health Threat briefing for spouses conducted Behavioral Health Threat briefing to alert families conducted Medical Threat briefing for Soldiers and DA civilians conducted Negative health-related behaviors treated and documented (DD Forni 2796) Legal Assistance Office Provide counseling to families on civil matters, as required Personnel informed on legal rights under Servicemember's Civil Relief Act (SCRA), as required. Legal assistance to RC Soldiers provided, as required Continue to provide tax classes / information to spouses, as required Installation Management Command Family Readiness staff shortages (ACS / FAC) identified, as required Families with major problems requiring special assistance identified, as required AA and RC Family Readiness Groups educated on available services Families educated about services provided through Military OneSource, as required Families identified and referred who have experienced major problems Reunion / Reintegration training provided to Soldier's spouses FAP program managers and SFPD directors reestablish case continuity Employers involved in home station activities Education and information materials provided to IRR / IMA families DCS infomnation provided to family members Communication with Spouses, Families, and Children training DEERS / RAPIDS / ID Card Office ID Cards / ID Tags updated, as required DEERS / F5APIDS enrollment completed SIGNATURE OF CERTIFYING OFFICIAL 8b. E-MAIL ADDRESS

X X X X X X X X X X X X

y
X X X X

X X X X X

X
X

r
X X
DATE (YYYYMMDD)

(b) (6), (b) (7)(C)

.i 1

#
NAME fLasf, First Middle)

$
SSN

DCS VALIDATION
COMPLETED COMPLETED

Deployment Cycle Support Tasks

NOT

NA

DATE (YYYYMMDD)

SECTION VI - Post - Deployment Stage Unit Commander / Unit Leadership Unit Refresher / Army Sexual Assault Prevention and Response training, as required Individual career counseling provided, as required Investigations (e.g. Line of Duty, AR 15-6) initiated and completed, as required Disciplinary and adverse administrative actions finalized, as required OERs, NCOERs, civilian evaluations, and awards completed, as required Soldier counseling conducted, as required Soldiers identified with potential financial issues referred to financial training or assistance Personnel Reporting System Updated CIVTRACKS for DA civilians updated Substance Abuse briefing conducted Risk Reduction Reintegration Tip Card utilized, as required Execute reunion and homecoming ceremonies Safety briefings conducted on POV, etc. Operator Licenses, registrations, insurance policies, and safety inspections verified Preseparation counseling (DD Form 2648-1) for RC Soldiers conducted ACAP services provided to affected Soldiers Soldiers who PCS and TCS complete the DCS process, as required Soldiers encouraged to commuicate with family throughout the deployment cycle Personnel Service Center DD Form 93 (Record of Emergency Data) updated, as required VA Fonm SGLV 8285, (Request for Insurance (SGLI)) completed, as required VA Form SGLV 8286, (Service Member's Group Life Insurance) completed, as required VA Form SGLV 8285A, (Request for Family Coverage (SGLI)) completed, as required VA Form SGLV 8286A, (Family Coverage Election (SGLI)) completed, as required Eligibility for overseas deployment (AR 614-30, Overseas Service) verified, as required Soldiers and family members educated regarding the impact of personnel policies Ensured all Soldiers processed con-ectly RC Soldiers advised of 18-year sanctuary RC Soldiers reenrolled in MGIB and state tuition assistance programs MMRB, MEB, PEB conducted, as required SIGNATURE OF CERTIFYING OFFICIAL 8b. E-MAIL ADDRESS DATE (YYYYMMDD)

DA FORM 7631, MAR 2007

Page 10 of 14
APD VI.00

NAME (Lasf, First Middle)

SSN

DCS VALIDATION
COMPLETED COMPLETED

Deployment Cycle Support Tasks

NOT

NA

DATE (YYYYMMDD)

SECTION VI - Post - Deployment Stage (Continued) Unit Ministry Team / Installation Chaplain Suicide Awareness and Prevention training conducted, as required Families with reported stress and separation issues identified, as required Small group discussions on deployment experiences facilitated, as required Spouses provided opportunity to take marital assessment Soldiers complete marital assessment instrument Post-Deployment Battlemind training for Soldiers conducted Medical / Dental Health Teams Individuals screened for medical profile geographic or climate duty limitations, as required Medical record review conducted TRICARE benefits briefing conducted Soldiers with behavioral or health issues refen-ed, as required Medical Threat briefing conducted, as required Negative health-related behaviors treated and documented (DD Form 2796), as required Health care extended to DA civilians for deployment related conditions DA Form 3349 (Medical Profile) completed Initial TB Test completed Serum specimens drawn at return to home station (AA) / and DEMOB Station (RC) Permanent health record updated with deployment health record Military Pay Office Current status of DoD charge card holders reviewed Travel advance provided for Soldiers with TCS orders Financial briefings conducted Allotment changes expedited BAH for AGR Soldiers adjusted Entitlements / Special Pay reviewed

SIGNATURE OF CERTIFYING OFFICIAL

8b. E-MAIL ADDRESS

DATE (YYYYMMDD)

DA FORM 7631, MAR 2007

Page 11 of 14
APD VI.00

NAME (Last, First Middle)

SSN

DCS VALIDATION
COMPLETED COMPLETED

Deployment Cycle Support Tasks

NOT

NA

DATE (YYYYMMDD)

SECTION VI - Post - Deployment Stage (Continued) Legal Assistance Office Wills updated, as required Power of Attorney Provided, as required Counseling on civil matters provided, as required Personnel informed on legal rights under Servicemember's Civil Relief Act (SCRA), as required RC personnel informed on legal rights under SCRA Legal assistance to RC Soldiers provided, as required Tax classes / information for spouses provided, as required Claims for personal property submitted Installation Management Command Family Readiness staff shortages (ACS / FAC) identified, as required AA and RC Family Readiness Groups educated on available services, as required Families educated about services provided through Military OneSource, as required Families identified and refen-ed who have experienced major problems, as required DA civilians referred to the Employee Assistance Program Coordinator, as required DA civilians informed ofthe Office of Worker's Compensation Programs process Operation READY Reunion / Reintegration training for Soldiers and spouses Operation Ready Communication with Spouses, Families, and Children training Operation Ready Post-Deployment Battlemind training for families completed DEERS / RAPIDS / ID Card Office ID Cards / ID Tags updated, as required DEERS / RAPIDS enrollment completed, as required

SIGNATURE OF CERTIFYING OFFICIAL

8b. E-MAIL ADDRESS

DATE (YYYYMMDD)

DA FORM 7631, MAR 2007

Page 12 of 14
APD VI.00

DEPARTMENT OF THE ARMY US ARMY INSTALLATION MANAGEMENT COMMAND HEADQUARTERS, UNITED STATES ARMY GARRISON, FORT DRUM 10000 10^" MOUNTAIN DIVISION DRIVE FORT DRUM, NEW YORK 13602-5000 ORDER 222-720 10 AUGUST 2009

2 ^ BRIGADE COMBAT TEAM (WBDAAA) FORT DRUM, NEW YORK 13602-5000 THE FOLLOWING UNIT ACTION IS DIRECTED: GROUP TRAVEL AND TRANSPORTATION ACTION: The above Organization is DEPLOYED in a temporary change of station (TCS) as shown below in Support of OPERATION IRAQI FREEDOM and are to return to your permanent station upon completion ofthe duties in support of this operation. You will submit a reviewed voucher for this travel to the finance office within 5 working days after retum to home station. ASSIGNED TO: 2^^ BRIGADE COMBAT TEAM (WBDAAA) UNITED STATES CENTRAL COMMAND AREA OF RESPONSIBILITY (IRAQ EFFECTIVE DATE: 1 OCTOBER 2009 DEPLOYMENT PERIOD: 365 DAYS OR UNTIL MISSION COMPLETION ACCOUNTING CLASSIFICATION: SEE ATTACHED ANNEX FOR ACCOUNTING CLASSIFICATIONS (FY10/11 AVAILABILITY IS CONTINGENT ON CONGRESS ENACTING APPROPRIATIONS OR AUTHORIZING OPERATIONS UNDER A CONTINUING RESOLUTION) IMCOM ISSUED CONTROL NUMBER: SEE ATTACHED ANNEX CIC: SEE ATTACHED ANNEX MOVEMENT DESIGNATOR CODE: PME10/PMO10 ADDITIONAL INSTRUCTIONS: (A) This is a temporary change of station (TCS). Normal PCS entitlements, allowances and relocation of family members are not authorized. Consolidated Personnel Policy Guidance (PPG) for operations Iraqi Freedom, and Enduring Freedom is on the DCS, G-1 web site: http://wvm.armvq1.armv.mil/militarvpersonoel/policv.asp (B) Soldiers are authorized 4 duffle bags- (1) one personal bag, (2) two issued bags of OCIE and 1 standard carry-on bag that meets AMC/Contracted flights standards. Size maximum 25x42 or Ruck size 15x10x22; with a maximum weight of 50 pounds. When AMC or contracted transportation is not available, reimbursement of authorized checked baggage on commercial flights weighing more than 50 pounds to a max of 70 pounds per bag authorized as excess baggage. Upon redeployment from theater Soldiers issued additional OCIE under the Rapid Fielding Initiative (RFI) are authorized a shipment of one additional bag not to exceed 70 pounds, if not transported as part of a Military shipment Each Soldier will bring only those Items specified by the PPG or other appropriate authority. You will be provided a list of those items from your company. This is the maximum quantity of authorized baggage; however, fewer bags can be taken if Soldier can fit equipment and personal items into a lower number of duffle bags. Each duffle bag must not exceed 70 pounds. No footlockers or commercial suitcases are authorized for movemeot. Soldier will only bring those items specified in chapter 6 of the PPG. Soldier will be provided a list of those items from unit Commander. Reimbursement of authorized checked baggage on commercial flights weighing more than 50 pounds to a max of 70 pounds per bag authorized as excess baggage. (C) Government quarters and dining facilities will be used at the Replacement activity and during deployment. Essential unit mess has been declared by the Assistant Secretary of the Anmy (Manpower and Reserve Affairs) ASA (M&RA) For the Mobilization and Demobilization Sites not to exceed (10) Days. MOSQ location will provide quarters and mess. The Installation Commander will make separate determinations as to the availability of mess and quarters and as a last resort will issue a Statement of Non-availability Statement/Certificate of Non-availability. Per Diem payable is $3.00 per day for CONUS and $3.50 per day for OCONUS. Per Diem will normally be paid for the travel to gaining station, or Replacement activity unless prohibited by travel circumstances. (D) For Active Duty Soldiers, basic allowance for housing (BAH) is based upon permanent duty station. For Reserves and Retired members called or ordered to active duty BAH is based on their principal place of residence wtien called or ordered to the tour of active duty. Pay entitlements will be based on location IAW DODFMR and applicable messages and regulations. (E) Unit is required to submit PERSTEMPO Information using flight manifest data. Do not submit departure transactions on unit deployed. Ensure MDC of "PM" is included. (F) During period of deployment, gaining/deployed unit Commander has responsibility for personnel service support to include awards and decorations; UCMJ, and all other forms of personnel and legal administration support except Reserve Component promotion authority. (G) Temporary storage of HHG may be authorized, at Government expense for period of contingency operations as provided by paragraph U4770-A, Joint Federal Travel Regulation for single personnel (both AC and RC), Soldier married to another Soldier when both are deployed and single Soldier parents when a childcare plan requires dependents to leave the residence. Contact the local transportation office for assistance. This may impact on the authorization for BAH. Storage of one privately owned vehicle may be authorized. Soldier must contact the supporting installation transportation officer for requirements. Soldier must complete arrangements requiring personal presence. Temporary duty (TDY) household goods weight allowance is authorized for CONUS and OCONUS based on personnel that are on active duty for a period greater than 200 days, excluding those areas designated as hostile fire/imminent danger pay areas. Contact the Installation Transportation Office, Clark Hall, 2d floor, at 772-6384 for assistance.

ORDER 222-720 t^SAIMCOM HO USAGFORTDRUM,NEWYORI^1^502-5000^ DATED 10 AUG 0^ (H) Soldier Readiness Processing will be accomplished priorto departure from losing installation/home station as stated inAR 61430 (Overseas Service),AR 600 8-10^ (In-Outand Mobilization Processing)ANDDCS,G1PersonnelPolicyGuidancelftheregulations conflict, follow instructions inAR 614-30 unless otherwise directed by the DCS,G1 PPG.Commanderwill ensure that the completion of the Readiness Processing requirements and Deployment Checklistwill be included in every 8oldiers Deployment packeL This requirement includes Soldiers departing onTCS orders individually or asaunlL Soldierwill hand carry out-processing packet; Field Military Personnel Records Jacket (MPRJ)along with associated transfer documents,records and deployment packet to the gaining PSC or deployment activity.Deployment packet must contain documents as outlined in the PPG. All Soldiers DD Form 93 and SGLV must be reviewed and updated as required priorto deployment as stated inAR 600-8-1.MPRJ,Medical and Dental records will not be forwarded orcan-ied to theater of operations.These records will be maintained atthe servicing home station PSB/MPD. (I) Passports and VISA are not rec|uired,however,Soldiers9re encouraged to deploy with passport iftheycun-ently have them. (J)Airtravelan-angements/bookings in conjunction with these orders must be arranged throughaGovernmentTransportation Officer. Returning Soldiers traveling commercial under emergence conditions must haveaDA FORM 31 annotated that MAC transportation is notavailableandlssignedbytheTransportation Officer in theater. (1^) The theaterwill publish amendments to unit and individual orders anytimeaSoldier changes their location out ofthe theater of operation. Soldiers who have to medically evacuate to Genriany for injury or sickness, orders must be issued to reflect ^n^loc^ili^^^ changes. IfaSoidier is evacuated to Germany for treatment and then further evacuated to CONUS for additional treatment, the hospital in Germany must then publish orders.The immediate Command authority who controls the Soldier must publish orders to keep track of SoldieBsmovemenL In addition to orders,aLine of Duty investigation must be initiated to cover injury/sickness to ensure Soldiers receive con-ect entitlements. (L) The return ofwartrophies to the states is prohibited. Soldiers will not accept^ANY SOLDIER MAIL"fortransport to theater of operations. (M) Use of leave during this deployment is recommended for all Soldiers Acopy of the leave record will be submitted upon completion of this operation during this period with the final settlement voucher.lf Unable to take leave during this period,apayment of unused leave is authorized with no impact to career leave sell back of60 days. FORMAT:745 FOR THE COMMANDER:

* OFFICIAL *FORTORllM,NY*
ic -k ie -k if -k -k -k -k JAMES A. SWORDS CHIEF, MILITARY PERSONNEL DIVISION

DISTRIBUTION INDIV (187) CDR, 2D BCT, ATTN: S I , FORT DRUM, NY(1) DIRECT INQUIRIES CONCERNING THIS ORDER TO PERSONNEL SERVICE BRANCH, FORT DRUM, NEW YORK DSN: 772-5631.

SSN ANNEX ORDER 222-720, DTD 10 AUGUST 2009 HHC 2D BCT


NAME ABEL DANIEL BENJAMIN ADAMS JASON DELACE ADKINS PAUL DAVID AIKEY ADAM JASON APPLEWHITE LORNCE LAMONT JR ARMSTRONG SHAWNE PATRICK BAKER ERIC STEPHEN BALDWIN MELVIN JAMES BALONEK KYLE JACOB BARNETT CLIFTON C BENJAMIN JAMAL JONATHAN BENTHAL JOSEPH MATTHEW BLUE SHERLONDA LAJUNE BOURNE RICHARD ALLEN BOUVIA PETER HOWARD BRYAN BRANDON MARCEL BURRETT JENNIE MARIE BUSH HAROLD MARK CALLAGHAN JOSEPH MICHAEL CALZADA ROBERTO CARDOZO FELIPE ANTHONY CAUDLE SHAWN MAURICE CHAMPAGNE ROBERT THOMAS CHARITY HERBERT NELSON CHRABOT MICHAEL PETER CLAUSEN CLIFFORD DALE COBBS JOE EDDIE COLLINS BETH ANN COLLINS COUNTEE III SSN GRADE SPC MAJ MSG SGT SGT MAJ PFC SSG SSG 2LT SFC SGT SFC SGT SGT SPC SGT SSG SGT SSG CW2 SFC SPC LTC SPC MAJ MSG SPC PFC PFC MAJ 2LT SGM SPC SPC SGT PFC CPT SPC W01 W01 SPC CPL 2LT MAJ CPT CPT CPL SFC SGT CW4 UIC WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA UNIT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT

(b) (6)

(b) (7)(C), (b) DALBEY JOHN DRYDEN (6)


DEAN EARL CLAYTON JR DEBLOIS ROBERT RICHARD DELAPAZ CARLOS MANUEL JR DISILVIO MICHAEL

DOLLARHIDE ERIC JAMES DOUGLAS DUSTIN JAMgS DREHER ELIJAH ARUNDEL EARLY WILLIAM DOUGLAS EASTEP CHAD EVERICK EHRESMAN JOSHUA DAVID ELDER FIANDALL PAUL ERICKSON SETH JOSEPH FIELDS ELIZABETH A FORD ROLAND CLAYTON 1 1 1 FORSYTH JOHN ANDREW FREEBURG MATTHEW WAYNE GERHARDT BRANDON SCOTT GORDON KEITH D JR GRAHAM HOOD DAMESHA LASHAWN GRAHAM WILLIAM ROGER

Page 1 of 4

SSN ANNEX ORDER 222-720, DTD 10 AUGUST 2009 HHC 2D BCT


NAME GUERRERO DORIAN GUERTIN ANDREW DAVID GUTIERREZ DAVID MANUEL HACK HONDO JUSTIN HAGY DANIEL AARON HAMBLETON JOSEPH MICHAEL HANSEN THOMAS RANDALL HEATON RALPH DAVID HICKS CODY DALE HOLLINGSWORTH KOHLBY ANTHON HORN KEVIN SCOTT II HOYER BRODIE K HYDE TIMOTHY ALAN IRISH ERIC LEE JANDA JAMES ANDREW JOHNSON BRANDON RAY JOHNSON PAULINE ADELL JOHNSON SUMMER PAIGE JONES JOSHUA G HENR JOY DAN TODD KARST WAYNE ALLEN KEETON JEREMIAH LEE KELLEHER JAMES ANDREEW KERNS BRIAN DOMENIC KJELSHUS SHERWIN H KLUMP DARYL PAUL KOOL JASON ELLIOT KUBIC MICHAEL ALLEN LANDON JEREMY WILLIAM LEARY CRAIG PAUL LEELOY DANIEL JAMESROUSSEAU LEWIS ANDREW R LEWIS JAMIE LEE LEWIS SCOTT JOSEPH LIGGETT CLAYTON EDWARD LINDSAY CHADD JOSEPH LIPPINCOTT KEVIN ALAN LODER THOMAS ANDREW LONG FREDRICK JEROME LONG JAMES ROBERT II LOPEZ ELIZABETH LAUREL LUSKJEREMY ALAN LYONS ALFRED BENJAMIN MACKLIN CARLA LA VERNE MACLEAN KEVIN RICHARD MAGESTRO MARK LOUIS MALINOWSKI MARK JOSEPH MANIBUSAN CARL JOHN MANNING BRADLEY EDWARD MARIUR JENSON CHADDY MARSHALL KYRA JAREE SSN GRADE PV2 PFC SGT CW2 SGT PFC SFC MAJ SPC PFC PFC CPT MAJ SFC MAJ SGT SPC PV2 SGT PV2 SSG SSG SGT MAJ CW2 SGT SFC PFC PFC PFC PFC CPT SGT SPC SGT SSG SSG SGT SFC SGT CPT SGT CW2 SFC SSG SGT SSG SSG PFC SGT SPC UIC WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA UNIT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT

(b) (6)

Page 2 of 4

SSN ANNEX ORDER 222-720, DTD 10 AUGUST 2009 HHC 2D BCT


NAME MATTEO DAVID YOUNG MAY KIMBERLEIGH ANNE MCCANN CECILIA AGNES MCFARLANE JUSTIN AARON MCPHEETERS JOSEPH PATRICK MILLER DAVID MATTHEW MILLER JONATHAN PAUL MILLER RUSSELL RAY MINCKLER RYAN E SSN GRADE SFC PFC CW2 SPC CPL COL MAJ SGT CPT SGT PFC CW2 CSM MAJ SGT MAJ PFC SGT MAJ SGT SPC PFC SSG PFC PV2 SGT PFC PFC PFC SGT CW2 SFC PFC PFC MSG SSG CW3 SFC SSG PFC PFC SPC SFC SPC SGT SPC MAJ MAJ PV2 UIC WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA UNIT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT

(b) (6)

(b) (6)
MITCHELL XAVIER MOLL MICHAEL BRYAN MONTGOMERY LATONYA WATNETOR MONTOUR JOSEPH ALLEN MOORE JON PATRICK MOORE MICHAEL RAY MORGAN RYAN JOSEPH MORRIS BRYAN JOHNSTONE MORRIS WATEMON MAURICE JR MORROW JASON ANDREW MOY CHRISTOPHER RYAN NAYLOR WILLIAM E III NIVEN JAMES RANDALL OAKLEY BRYAN KELLY OWENS MICHAEL JOSEPH PARKER MARCUS THOMAS PARSONS MATTHEW AARON PATE CAITLYN NOEL PAYNE DOMINIQUE DEAIRA PEARSON BRANDON MICHAEL PEDIGO JOSEPH ALEXANDER PENAFIEL JOE CARLO MCBRIDE PERALTA JOHNNY FRANKIE PERSON KENNETH ANDREW PINKINS AKEYRA SHARMAINE PITRE SAMARA LYN PRICE TERRELL LEE PROCHNIAK SCOTT EDWARD RIDER STEVEN MICHAEL RIGGINS CORY DEMOND RIVERA DAGOBERTO LOPEZ RIVERA KHRYSTIARFIA BROOKE ROQUE JAZEL AGNI ROSE MICHAEL GLEN RUSHING NATASCHA RACHEL SACCOMEN FRANK TONY III SALAZAR KENNETH ALLEN SAMUELSEN ROBERT ERLING 1 1 SAVAGE ALAN THOMAS SCHMAL JOSHUA MICHAEL

(b) (6)

Page 3 of 4

SSNANNEXORDER222 720, DTD 10AUGUST 2009 HHC 2D BCT


NAME SCHWIND JEFFREY SCOTT SEXTON JACKIE RAY SHAKESPEARE ERICSEVERT SHARPEBRANDYLYNN SHEPPARD DANIELLE ERICKA SHOWMAN JIHRLEAHWITTNEY SMITH ADAM RICHARD SMITH JAMES LORENZO SMITH LEROYOLANZO STEELE HEIDI MIRANDA STOLLKEVINJOSEPH STONERTODDJAMES SULLIVAN MAUREEN BROOKE SUTFIN JOSEPH WILLIAM TAUAJULIAMARIE TAYLOR WANDLYND TILLMAN WILLIAM JOSEPH TITUS JASONANDREW TRAUTWEIN ALEX JAMES TREECE RICKY NEAL TRUDELBRANDONDARRYL URIBE JORGE UVALDO USBECKERIC HELMUT WALSH SHERI MICHELLE WARYWILLIAM FRANKLIN JR WATERMANAARON JAMES WEBB NATHEN DARIN WEBER THOMAS ROBERT WILCOX JUSTIN ROBERT WILLIAMS ALLAN GLENN WILLIAMS LATOYADANIELLE WILSON DARYL DAVID JR YOUNGS MICHAEL THERONJR ZHAO MING SSN GRADE SFC PFC SSG SGT SGT SPC SSG SPC SSG CPT MAJ SSG PFC SPC SSG CPT SGT PFC PFC SFC SGT SFC 1SG PFC SSG PV2 SPC PV2 SGT SGM SSG PFC SFC SPC UIC WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA UNIT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT
HHC2BCT

(b) (6)

HHC2BCT HHC2BCT

Page4of4

If'ill'St

L,
E

(b) (6)

o o

o o o c

>

3 > z
z

5^ 9
o

> c
o c
tfl

rn*

(b ) (6 )

(b) (6)

SI :
l o o t

o o o c z

>

5
> z
o

S 3
71

io i
o3 >
Ioo < c o c

C O

^#

(b ) (6 )

(b) (6)

>
o o o c z

I
z o
I

^ jw i^

ii

8; q 9
o c o c cn

>

WlMjL:

^^^ ^

CD CO CO CO cc

KK

a oDca

^c:^^^c:^^^^^^
to CD <D (D (D ^ CO r r c CD

^^^^^^^^^^

^ ^ ^ 1 ^ ^ ^ ID ^ ^ (O ^ CD ^C O

O C3 O O o O O O O CIS _ _ ^ O O O O O O O O O O

i c b o c b c b o t b o i i i

(b) (6)
N ^ , , _

o o o o o o o o o

S5 o o o c z z

ro t o

>

2 g s s s sFslf
t i o o o - ' c o l v j r o

3 >

o o o ro to M ro ro N)

71

o o o o o o o o o o o o o o o o o o o o o o o o o o " " " " " o o o o o o .


_ 0 0 0 0 0 ' ~ ' ~ *

o SSS o

ii
o K n o

o o o o o O D 03 03 D D C7 m C D 03 C D 03 C D 0] C D C i O O O O O O O O C i
W W W C J W W W W W Ln Ul tn c/i'

-I r3h3f3r3f3f3r3f3

c o c cn

>

s s
C O CD W O o

g g

IS) N) ro M N) O g l O O O O

NJ fO

<[i\< < < <


7 ) 7 ) 7 ^ 7 1 = =:^^

D D D D , ^ S S a

2222
IV t i !S

m m m N> |v

RECOMMENDATION FOR A^ARD


For use of this form,see HODA Letter 600 06 1;the proponent agency is D C S , G l .

For valor/iieroism/wartime and all awards higher than MSM, refer to special instructions in Chapter 3, AR 600-8-22.
1.T0 2. FROM 3. DATE (YYYYMMDD)

CDR, 2nd BSTB, 10th MTN DIV (LI) APO AE 09308


4. NAME (Lasf, First, Middle Initial)

CDR, HHC, 2nd BCT, 10th MTN DIV (LI) APO AE 09308
PART I - SOLDIER DATA 5. RANK 6. SSN

MANNING, BRADLEY E.
7. ORGANIZATION

SPC
8. PREVIOUS AWARDS

(b) (6), (b) (7)(C)

HHC, 2nd BCT, 10th MTN DIV (LI) (WBDAAA) APO AE 09308
9. BRANCH OF SERVICE

NO AWARDS
10. RECOMMENDED AWARD a. FROM 11. PERIOD OF AWARD b. TO

AAM
12. REASON FOR AWARD 12a. INDICATE REASON 12b. INTERIM AWARD IF YES, STATE AWARD GIVEN YES

20091012

20100601
DATE

NO

12c. POSTHUMOUS YES Q NO ^

13. PROPOSED PRESENTATION (YYYYMMDD)

SVC
14. NAME (Last, First. Middle Initial)

20100630

PART II - RECOMMENDER DATA 15. ADDRESS 17. RANK

ADKINS, PAUL D.
16. TITLE/POSITION

HHC, 2nd BCT, 10th MTN DIV (LI) APO AE 09308


19. SIGNATURE

S2 NCOIC
18. RELATIONSHIP TO AWARDEE

MSG

SUPERVISOR
PART III - JUSTIFICATION AND CITATION DATA

J/c:>.

(Use specific bullet examples of meritorious acts or service)

20. ACHIEVEMENTS ACHIEVEMENT #1 SPC Manning worked as the night shiti Violent Extremist Analytical Team Lead. In this capacity, he assisted in the Brigade Commander better understanding the Promise Day Brigade in Zafraniyah. His research and efforts led to the identification of the structure in which this particular group conducted operations and how they targeted United States Forces. His research greatly assisted the subordinate unit with accurate information that led to the disruption of the organization.
ACHIEVEMENT #2

SPC Manning's persistence led to the disruption of Former Special Groups (FSG) in the New Baghdad area. SPC Manning's tracking of targets led to the identification of enemy support zones that were previously unknown. His analysis led to heavy targeting of insurgent leaders in the area. This effort consistently disrupted their operations. SPC Manning's dedication led to the detention of a Tier-2 level FSG individual within the Commando OE.
ACHIEVEMENT #3

SPC Manning labored to unravel the Tactics, Techniques and Procedures of the enemy smuggling lines from Iran into Commando OE. SPC Manning identified key routes that were being utilized as well as support zones that aided in the transportation of explosively-formed penetrators (EFPs), Katyusha rockets and various small arms. His analysis aided subordinate units in their plans to disrupt these operations and minimize the flow of these systems into Baghdad.
ACHIEVEMENT #4

SPC Manning was instrumental in assisting the Brigade S2 and S3 plans sections in regards to mission analysis. SPC Manning produced 20 products for three briefings on topics including enemy situation, future enemy operations and current threat assessments. SPC Manning's in-depth analysis of the areas he covered provided the Brigade S2 and S2 Planner vital information required to lead ground forces to successful mission accomplishment.
2 1 . PROPOSED CITATION

FOR EXCEPTIONALLY MERITORIOUS SERVICE BETWEEN 11 October 2009 AND 15 July 2010. SPECIALIST BRADLEY E. MANNING'S OUTSTANDING DEDICATION TO SERVICE, PROFESSIONALISM AND EXCEPTIONAL DUTY PROFICIENCY CONTRIBUTED GREATLY TO THE SUCCESS OF COMMANDO BRIGADE'S MISSION. HIS ACTIONS ARE IN KEEPING WITH THE FINEST TRADITIONS OF MILITARY SERVICE AND REFLECT GREAT CREDIT UPON HIMSELF, HEADQUARTERS AND HEADQUARTERS COMPANY, SECOND BRIGADE COMBAT TEAM, UNITED STATES DIVISION - CENTER, AND THE UNITED STATES ARMY.

DA FORM 638, APR 2006

REPLACES DA FORM 638-1. PREVIOUS EDITIONS OF DA FORM 638 ARE OBSOLETE.

Page 1 of 3
APD PE V2.00ES

NAME (Lasf, First, Middle Initial) M A N N I N G , B R A D L E Y E.

SSN

PART IV - RECOMMENDATIOrIS/APPROVAL/DISAPPROVAL 22a. SIGNATURE . 22. / certify that this individual is eligible for an award in accordance with AR 600-8-22; and that the information contained in Part 1 is correct. 23. INTERMEDIATE AUTHORITY a. TO CDR, 2nd B S T B , 10th M T N D I V ( L I ) A P O A E 09308 DISAPPROVAL

(b) (6), (b) (7)(C)


22b. DATE (YYYYMMDD) C. DATE (YYYYMMDD)

b. FROM CDR, H H C , 2nd B C T , 10th M T N A P O A E 09308 UPGRADE TO: f. RANK

\A nu!:^

d. RECOMMEND: ?^ APPROVAL e. NAME (Last, First. Middle Initial)

DOWNGRADE TO:

FREEBURG, MATTHEW W.
g. TITLE/POSITION

CPT
h. SIGNATURE

COMPANY COMMANDER
i. COMMENTS

VXiMlW) U O . - \ r r \ j i r \
SV

24. INTERMEDIATE AUTHORITY

a. TO

b. FROM

C. DATE (YYYYMMDD)

d. RECOMMEND: APPROVAL e. NAME (Lasf, First. Middle Initial) g. TITLE/POSITION i. COMMENTS

DISAPPROVAL

UPGRADE TO: f. RANK h. SIGNATURE

DOWNGRADE TO:

25. INTERMEDIATE AUTHORITY

a. TO

b. FROM

C. DATE (YYYYMMDD)

d. RECOMMEND: APPROVAL e. NAME fLasf, First, Middle Initial) g. TITLE/POSITION i. COMMENTS

DISAPPROVAL

UPGRADE TO: f. RANK h. SIGNATURE

DOWNGRADE TO:

26. APPROVAL AUTHORITY

a. TO ORDERS ISSUING A U T H O R I T Y

b. FROM CDR, 2nd B S T B , 10th M T N D I V ( L I ) C. DATE (YYYYMMDD) A P O A E 09308 DOWNGRADE TO:

d. % APPROVED e. NAME (Last. First. Middle Initial) W A L T E R , P A U L R. g. TITLE/POSITION

DISAPPROVED

RECOMMEND UPGRADE TO: f. RANK

LTC
h. SIGNATURE / / y , y - " ^ // "

BATTALION COMMANDER
i. COMMENTS

yZiX^X^^
PART V - ORDERS DATA 27b. PERMANENT ORDER NO.

27a. ORDERS ISSUING HQ

31. DISTRIBUTION 1-FiIe 1-OMPF 1-Unit 3-Individual

2nd B R I G A D E SPECIAL TROOPS B A T T A L I O N , 10th M O U N T A I N DIVISION 28a. NAME OF ORDERS APPROVAL AUTHORITY 28b. RANK

HOLMAN, JAMES E.
28c. TITLE/POSITION

ILT
29. APPROVED AWARD

ADJUTANT
28d. SIGNATURE DA FORM 638, APR 2006 30. DATE (YYYYMMDD) Page 2 of 3
APD PE V2.00ES

n o
X

O H

C/3 o

> 2 2 S.m H to
70

11
C/3

C/3

> Z t X

> ; _ < o o 3s o u> o o 00 <

g z X m o > C/3 ^ o _ > H O O mo Sm 2o 2 5 H c GO o > 2 > -0 TO


O

1/3 m H JO

m
X
A

% g
M o

> Z

TI

O < m ?o tn H c 7) O C/3 < ( / ] c/) n tn m tn 70 ?3

3
m
Ti in
> Z

5 > I
3

o
H X w o

> z
D

1^

< m Z

JO

o
H O
CO

a > < o n
C Z o

73 to o o \o H O

rn

rn -n r m n H O

tn C O

< o n X n ^ PI >
D

^ 1
n ^ S 5
W 5 ""-1 M 3 g 3 M ]
% H : X > =

S H

o tn 5 c > C/3 Z
(/]

:g

ifi

g > r n P %X 2
m n

O 7!

H p] pq

m
to

c z

m
to o

C-

m r "n >

X ^

^z

O 7^ O tn tn
TJ

2 o n ^ m H z n X < H ? DX n > tn
Z
H

<
> z o
X
tn
> n n tn 0 H H O

I o
n
>

IS
C O

I
> r O G H

O >

13 ?0

o PI n o 2 CO >
H H pq

^ 2 5 X
^

c ^
; =

i]j
w /

>

g
> Z

Z
H

tn H
Ol

2 5 c a

H tn

(b) (6)

* (b) (6)

(b) (6)

(b) (6)

RECORD o r rAOCEEDINGS UNDER ARTICLE


NAME ft SSN GRADE UNIT ft LOCATION

UCMJ
MONTHLY BASE PAY

For use of this fonn. ae AR 27-10. Chapter 3: th proponent agency is uTJAO-CL

HHC. 2d BCT. (b) (6) COS Hammer. Iraq APO AE 09308 I I sm considering whether you should be punished under Aiticie 15.1ICMJ. for ihe following misconduct:
E4

MANNING. Bradley E.

$2,086.30

In that you, did. al COS Hammer. Iraq on or about 8 May 2010. unlawfully strike SPC Jihrlcah Shoman in the face with a closed fist. This is in violation of A r t k k 128. UCMJ (END OF CHARGES)

2. Page three of this form lists your rights and the maximum punishment thai may be imposed. In deciding what to du. you have therightto consult with legal counsel located si USA Trial Defense Service. Camp Liberty. Iraq APO AE 09344 You now hsvc 4* hours to decide what to du.
DATE
NAME. RANK. ANO ORGANIZATION OF COMMANDER

SIGNATURE

MAn HEW W. FREEBURG. CPT. HHC. 2D BCT

W ^ f ^ X'X . - ^ / ^ t ^

3. Having been affoided the opportunity lo consult with counsel and understanding my rights listed on page three of thisform,my decision is as M\ovi%iJbiiiia( apprfipriair MiKkx. JaHf. amlsinn) a. te^*4emaad trial by court-manial. b. |y^<] I do not demand trial by court-martial and in the Article 15 proceedings: % ^/H request the hearing be L_JOpen. losed. r.?; A person to speak in my behalf r~~| Is ^ y j ^ ^ l s not requested. (3) Matters in defense, extenuation, and/or mitigatioa: [Are not presented. ^ , J Are attached. |, I Will be presented inperson.
DATE ^ ANO RANK OF SERVICE MEMBER
SK3NATURE

AjAJ

,C

BRADLEY E. MANNING. SPL

"27
B

4a. In a(nl | | Open n y f Closed hearing, having considered all mstten presented, I hereby make the Mm wing findings: fr7]^*ftuih\-of All [~~| (iuitl) of Some Spccifkalionx I j \ol Uullly of All SpLX-ltkations (line <xit all l/> Spccilicstions | | (line out Not <iuilt> Spccidcstions) | | SpecificalinnN and Mgn below) Based on my findings. I impose the punishments thai arc officially recorded in Item 6 of this form ^ r N A as Soldier was an F,-4 or below al start of 4b. I direct thst this DA Fonn 2627 be filed in the Restrictedficheofthe OMPF. Performance flchc proceedings. OMPK. 4c. You ofthe are advised of your right lo appeal to the next superior authority: Cdr. 2d BSTB within five (5) calendar days. An appeal made after that lime may be rejected as untimely. Punishment Is effective immediately unless otherwise staled in Item 6. DATE
NAME. RANK. ANO ORGANIZATION OF COMMANDER SIGNATURE

MATTHEW W FREEBURG. CPI. HHC, 2D BCT tInilMiappropriufe Mock lialc. and.^ign) Vft ^ . I 1 I appeal but do nol submit additional M So not appeal. ^

I appeal and suhmii additional matters.


SIGI

lo

NAME OF SERVICE MEMBER

BRADLEY E. MANNING

DA FORM 2C27 (T#*t) NOV 04 Pag* 1

NAME ft SSN

(b) (6)

HHC. 2d BC I . COS Hammer. Iraq APO AE 09308 6. The following punishment is imposed: Reduction to the Grade of E3: Forfeiture of S446.00 pay per month for one month.

MANNING. Bradley I . .

GRADE 1-4

UNrr ft LOCATION

7 I have considered the appeal and il is my opinion thai:

DATE

NAME RANK AND ORGANIZATION OF REVIEWING JUDGE ADVOCATE

SIGNATURE

8. After consideration of all natters presented in the appeal, the appeal is:

1 i Denied.

1 J

Granted as follows:

DATE

NAME RANK. AND ORGANIZATION OF COMMANDER

SIGNATURE

Q. 1 have seen the action taken on my appeal.


DATE NAME OF SERVKE MEMBER SIGNATURE

10. ALUEDDOCUMENTSANOiORCOMMENTS: 1. DA Form 4856 2. DA Form 2823 (x 4) W/M

3. DA Form 3881 4. Flag 5. I RR

DA FORM 2627 ( T M t ) NOV 04 P a g * 2

ARTICLE 15 PUNISHMENT WORKSHEET Soldier's Data: SPC MANNING. Bradley E.. HHC. 2d BC I . COS Hammer. Iraq APO AE09308 Imposing Commander: CPT Matthew W. Freeburg Type of Article 15: Company Cirade Artick 15 Redaction: Soldier may be reduced to H3.

Forfeiture: Maximum of 7 days' pay for one month, not to exceed the following: If no reduction imposed: $486.00 If Soldier reduced to E3 (whether or not suspended): $446.00 Deprivation of Liberty Punishments: Extra Daty: Maximum of 14 di^s. May be combined with Restriction. Restrictioa: Maximum of 14 days. May be combined with Extra Duty. When combined, the maximum period cannot exceed the maximum period allowed for Extra Duty. Reprimand: May be an oral or written reprimand. Any punishment may be suspended for up to 180 days. PUNISHMENT IMPOSED: Reduction to the Grade of: ^ 3 suspended for Cirade of k j ^ Forfeiture of $ ^ ^ ^ A ^ ^ tHh... _ (kys). Extra Duty for wA If suspended, then (suspended for ^jA^ days). NJA days) or (reduction below the

(suspend $ N A

of the forfeiture for the number of months selected for a period of days).

days, (suspended for MA-

Restriction for t j A days, (suspended for .>A days). (Normal limits are Company area, Dining/Medical Facility, Place of Worship, and Place of Duty) Reprimand |JA (Oral voA )(Written tyj A ) (Reprimands for enlisted Soldiers may be oral or written and oral is typically appropriate. Reprimands of commissioned or warrant officers must be in writing.) Dale Pwmhment Im/M.sed: '^'^^ P (DmmanJer \ Initials: JUiwF

Cp
DD^D
DEPARTMENT OF THE ARMY
THEATER FIELD CONFINEMENT FACILITY CAMP ARIFJAN, KUWAIT APO AE 09366

K i
D ^ 3> ^ /> C -7 ^ ^ ^ 6 0

l-gSD
REPLY TO ATTENTION OF

ACEN-ASG-KU-TFCF-CDR MEMORANDUM FOR DISTRIBUTION

I October 2009

SUBJECT: Theater Field Confinement Facility (TFCF) requirements for processing U.S. Military/DoD Prisoners 1. The purpose of this memorandum is to facilitate the processing of U.S. military prisoners to the TFCF. TFCF's primary mission is to detain, confine, protect, and sustain both Pre- and Post-Trial U.S. military prisoners, as well as to assist Commanders throughout the CENTCOM AOR in maintaining good order and discipline within their units. Commanders ordering a Service Member (SM) to confinement shall familiarize themselves with unit responsibilities as outlined in AR 27-10, Military Justice, and AR 190-47, The Army Corrections Systems. It is highly recommended that Commanders also consult with their respective Staff Judge Advocates (SJA) prior to transporting SM's to Camp AriQan for confinement. 2. Unit Commanders shall ensure the SM ordered to confinement has been screened by medical personnel and the results documented in blocks 9 and 10 on their DD Form 2707 (Sep 2005), Confinement Order, within 5 days of reporting to the TFCF indicating the SM isfitfor confinement. Female SM's must have a pregnancy test completed within 48 hours prior to arriving at the TFCF and the results annotated on the Confinement Order. In the event of a positive test, Commanders must contact the TFCF Prisoner Services Branch (PSB) immediately to arrange transfer to an appropriate medical facility. 3. Direct coordination between the SJA representing the Command and the TFCF PSB prior to the escorts departure fi-om the unit is mandatory as directed by AR 190-47. Commands shall also electronically scan and email all required intake documentation to the TFCF PSB points of contact listed in paragraph 9 prior to the escorts' departure. Escorts arriving at the TFCF with missing, incomplete, and/or incorrect documentation will likely result in delaying the acceptance and processing of the prisoner. NOTE: An error-free Confinement Order (with original signatures and no whiteout corrections) is required for prisoner acceptance and will be retained by the TFCF. 4. Commands shall provide complete Unit Contact Information (enclosure 1) in order to ensure reliable communication throughout the confinement process. In the event a prisoner is transferred to a CONUS facility, the TFCF PSB will provide a copy of their reassignment orders to the parent command once the move is completed. 5. The following documentation is required prior to the SM being accepted for confinement: a. Pre-Trial *^ 1) DD Form 2707 (Sep 2005), Confinement Order, as described in paragraph 2 above AM 2) DD Form 458 (May 2000), Charge Sheet 3) DA Form 5112 (Sep 2002), Checklist for Pre-Trial Confinement. If supporting documentation is referenced on the DA 5112, it must be included ^ 4) 48/72 Hour Review Memorandum, if completed 5) Magistrates Findings Memorandum, if completed v' 6) Unit Contact Information \ / 7) SM's PCS/TCS Orders into theater y/ 8) Original Medical/Dental Records *

ACEN ASG I^U TFCF SUBJECT: TFCF requirements lor processing U.S. Militaty/DoD Prisoners

1 October 2009

^ 9) ER6 or Persottnel Record Files ^ 10) Conrinement Extension Requests for Pre-Trial SM's shall be in accordance with USARCENT T^eaterConfinementPoIicy, dated 17 January 2007. b. Post-Trial (regardless of sentence length) 1) DD Form 2707 (Sep 2005)^ Confinement Order, as described in paragraph 2 above 2) DD Form 458 (May 2000)^ Charge Sheet 3) DA Fonttt 4430 (Sep 2002), Result ofTrial (or service-specific equivalent) with DNA and Sex Offender Registration information 4) DDEorm2329(Augl984), Record of Trial by Summary Court MartiaL if ^plic^ble 5) Pre-TrialAgreement^^0f^r to Plead Guilty, if applicable 6) Lnit Contact Information 7) DD Form 2704 (Mar 1999), Victims Witness Certification and Election. Must include full mailingaddress, phi^e number with area codes (DSN or VOIP, ifapplicable) lor all victims and witnesses listed. Vict^ms^ witnesses listed on any other documents must be listed on the 2704 If there are no victims/wimesses^ Section 11 must be completed. 8) SM's PCS^T'CS Orders into theater c. Post-Trial (sentences over 30 days and/or punitive discharge) 1) ERBcr Personnel Record Piles ^ 2) Original MedicalT)ental Records^ 3) Results ofInvestigation(ROI)indicatingMPI/CID/lnvestigating Officer, if applicable ^IfPersonneLMedical, and/or Dental Records are not available ^^^^er, an MPR must be provided identi^ingthelocationof the records and a point ofcontact in the event they must be retrieved (provide email address, commercial phone number, DSN phone number, and mailing address). 6. Unit Commanders will e^ure that the prisoner arrives at the TFCF with the recommended items listed below. Unaulhori^d equipment at:d^or personal property will be returned to the SM's escorts. a. Body Armor (Pre-Trial and prisoners with 30 day or less sentences ONLY) ^ 1) 1BA 2) Helmet ^ lOAandHelmetwillberetumed to escorts fii^r all Post Trial prisoners who will be transferred CONUS. bClodnn^ ^)DCU/ACU(2 3sets) ^)DCU Boots (1 pair) 3) Black or Green Socks (6-10 pairs) 3 4) White PT Socks (6 10 pairs) ^ 5 ) Underwear (6-10 pairs)-Browtt requited ft^rtrattsli^ CONUS ^ -6)T-Shirt:^(6-10each) Brown, Sand, or Green only. No Under Armor or comparable brands ^7) Prescription Glasses, if applicable (2 pairs) 8) Sunglasses (1 pair) v9) Shower Shoes (1 pair)-Basic black, no designs YIO) Brown towels.^washcloths (2 each) ^ I ) Military-issued Belt (1 each)

ACEN ASG l^U TFCF SUBJECT: TFCF requirements ^ r processing U.S. Military/DoD Prisoners

1 October 2009

^12) Work Gloves (I pair)-Black. Grey, or Tan only ^13) Physical Training Unilotnt (3 shirts. 3 shorts, long pants^ jacket, and running shoes) ^I4)ColdWeatherClothing^ifappropriate(polyttndershirts/underwear, gloves,fieldjacket, etc.) ^15) Cott^^ervative Civilian Attire (1 pair pants and I shirts c. Health and Com^rt Items ^ ^ ^ ^ 1) Personal Hygiene Bag (1 each) ^^2) Tooth Paste (max 2 tubes) ^) Tooth Brush (max 2 each)-No electric devices ^) Deodorant (max 2 each)-No aerosol cans ^ . ^ ^ ) Shampoo (max I bottle) ^6) Bar Soap (max 4 each)-No liquids ^ ) Shaving l^it No electric razors, unlesson permanent shaving profile ^8) Shaving Cream (max 2 cans) ^^^^ ^ ^ 9 ) Disposable Razors/Blades (max 12 each) ^^.^^^^ ^0) Lip Balm (max 2 each) 11) Fingernail Clippers(1 each)-Nofiles ^^^^^^ 12) Feminine Hygiene Products, if applicable (min 2-w eek supply ) ^13) Pictures (max 10)-No magazine or newspaper cutouts ^14) Books (max 2 each^ including a bible) 15) MOS Study Material (max 2 manuals)^^-^^ ^6) Pre Paid Phone Card 17) Approximately $50.00 Cash^^^^^^ ^ ^ ^ ^ d. Prohibited Item^^ 1) Tools or Sharp Objects (knives, multi tools,fingernailfiles,etc ) 2) Jewelry(withtheexceptionof I wedding band without stones and 1 cottservative religious medallion) 3) Tobacco Products (includes smt^eless tobacco) 4) Notebooks or Three-Ring Binders 5) Matches or Lighters 6) Cosmetic Products 7) Glass Containers 8) EIectronicEquipment(iPods, computers, cameras, thumb drives, and cell phones) mother items may bedeemeddangerons/inappropriate by the Facility staff upon intake. 7. Escorts shall acquire bus ticketsfi^omthe serviee specific LNO (Tent 2) upon arrival at Ali AlSaleem and notify the TFCF ECPoftheirapproxitttate departure time before proceeding to Camp Arif^an. Normal intake hotu^ are ^om 0700 to 2000 unless prior arrangements have been ntade with PSB Sta^ 8 Facility points of contact are listed below: a. PSB NCOIC DSN (b) (6), (b) (b) (6), (b) b. PSB NCO DSN(7)(C) (7)(C) c PSB Cell COMM (b) (6), (6), (b) d ECP DSN (b)(b) (7)(C) (b) (6), (b) e. Commander DSN (7)(C) (6), (b) f Deputy DSN (b) (7)(C) (7)(C) (b) (6), (b) (7)(C) (b) (6), (b) (7)(C) Available^4/7 Available 247

ACEN-ASG-KU-TFCF SUBJEC T: TFCF requirements for processing U.S. Military/DoD Prisoners DSN (b) (6), (b) (b) (7) (6) 9. Point of contact for this memorandum is (C) , MAC Michael Cunningham, PSB NCOIC. (b) (7) (C) g. SEL

1 October 2009

^ JJ

1 Encl

Richard N. Mauldin CDR, USN Commanding

CONFINEMENT ORDER
1. PERSON TO BE CONFINED a. NAME (Last, First, Middle) M A N N I N G , Bradley E. BRANCH OF SERVICE d. GRADE e. MILITARY b. SSN 2. DATE (YYYYMMDD)

(b) (6), (b) (7)(C) ORGANIZATION (From):

20100529

.Armv

E-3

HHC, 2d BCT, 10th MTN DIV (Ll), COS Hammer. Iraq. APO AE 09308
TYPE OF CONFINEMENT

3.a, PRE-TRIAL

NO

YES

b. RESULT OF NJP

XNO

YES

c. RESULT OF COURT MARTIAL; TYPE: Q S C M

X] N O
SPCM I

[21 Y E S
I GCM [ 2 j VACATED SUSPENSION

IS X

d. DMA PROCESSING

IS NOT REQUIRED UNDER 10 U.S.C. 1565.

4 . OFFENSES/CHARGES OF UCMJ ARTICLES VIOLATED:

Article 128: Assault Consummated by a Battery: Article 134 (18 U.S.C. jj 793: Wrongful Transmission of Defense information)
5. SENTENCE ADJUDGED: b. ADJUDGED DATE (YYYYMMDD):

6. IF THE SENTENCE IS DEFERRED, THE DATE DEFERMENT IS TBIMINATED: 7. PERSON DIRECTING CONFINEMENT a. TYPED NAME. GRADE AND TITLE: M A T T H E W W. FREEBURG CPT. .AD. Commanding b. SIGNATURE c. DATE (YYYYMMDD)

d. TIME

^
URE:

0100529
c. DATE rrYYYMMDDI

S.a. NAME. GRADE, TITLE OF LEGAL REVIEW AND APPROVAL CHRISTOPHER D. GOREN CP L JA. Trial Counsel MEDICAL CERTIFiCA 9 a . The above n a m e d inmate w a s examined by m e at for c o n f i n e m e n t . I [will 1 ^ 3 - ^ rrimel

20100529

on ( i l o ) 6 O S % ^ lYYYYMMDD)

and f o u n d to be

Fit |

| Unfit

I c e r t i f y that f r o m this e x a m i n a t i o n t h e e x e c u t i o n o f t h e foregoing sentence t o confinement

w i l l n o t produce serious injury t o t h e i n m a t e ' s health. irregularities were noted during the examination (If none, so state):

b. The following

c. HIV Test administered on (YYYYMMDOJ:

j / K t O ^ CS^

^V*-*^

t>1 fytN/A

d. Pregnancy t e s t administered o n (YYYYMMDD):

10. EXAMINER a. TYPED NAI^j^gg^gg^fggJgTLE:

b. SIGNATURE

err, MC U S A * 2BCTSw,mMTND
AND TIME: lYYYYMMDD) b. PERSON RECEIPTING FOR INMATE TYPED NAME. GRADE AND TITLE: (Time)

c. DATE (YYYYMMDDl

d. TIME

2^'Ut>^(<.rT.i^c
l<ECEIpf FOR INMATE

mole aS^T-'i

O i T

11.a. THE INMATE NAMED ABOVE HAS BEEN RECEIVED FOR CONFINEMENT AT: (Facility Name and Location)

c. SIGNATURE:

d. DATE (YYYYMMDD)

e. TIME

DD FORM 2707, SEP 2005

PREVIOUS EDITION IS OBSOLETE.

Adobe Pitjfesstonal 7.0

CHECKLIST FOR PRETRIAL CONFINEMENT


For use o( ttiis form, se AR 27-10; ttie proponent agency is OTJAG NAME Manning, Bradley E. AGE ETS GRADE UNIT

E-3 20111001
WIFE-HUSBAND IN LOCAL AREA

HHC, 2d BCT, 10th MTN DIV (Ll)


TOTAL SERVICE TO DATE

22
MARRIED YES NO

2 Years, 7 Months
NUMBER OF CHILDREN X OTHER 0 (SpecifyT~~ X NO NUMBER OF ARTICLE 15's: I PUNISHMENT Reduction to Private First Class (l>3): and Forfeiture of $446.00.

: YES

DATE 24 May 2010

OFFENSE .Article 12S - Assault Consummated by a Battery

NUMBER OF PREVIOUS CONVICTIONS: TYPE OF COURT DATE ARTICLE PUNISHMENT

NUMBER OF PRESENT OFFENSES: ARTICLE Article 134 (18 U .S.C. S 793) Article 128 DATE DESCRIPTION OF OFFENSE (If AWOL, from-to, etc., and whether surrendered or apprehended) Wrongful Transmission of Defense Information Assault Consummated by a Battery

28 May 2010
8 May 2010

PRETRIAL CONFINEMENT IS APPROPRIATE BECAUSE: a. There Is probable cause to believe an offense tias been committed by the accused. (UsI specific reasons why it is believed an offense has been committed by the accused.) See attached 72-hour memorandum, dated 29 May 2010.

DA FORM 5112, SEP 2002

DA FORM 5112-R. MAR 86. IS OBSOLETE

APD PE vi 01

b. To ensure the accused's presence at trial, pretrial hearing or investigation (List specific reasons why it is believed the accused may not be present and summarize the conduct of Ihe accused which warrants pretrial confinement and tends to indicate the accused is not likely to be available for trial, pretnal hearing or investigation.) See attached 72-hour memorandum, dated 29 May 2010.

c. To prevent foreseeable serious criminal misconduct including any efforts at obstructing justice. (List specitic reasons why it is believed the accused may commit acts ol serious criminal misconduct if not incarcerated, particularly if these acts pose a threat to others the command or natkinal security, and summarize the conduct ol the accused which warrants pretrial confinement and tends to Indicate the accused may commit future acts of serious criminal misconduct,) See attached 72-hour memorandum, dated 29 May 2010.

d. Lesser forms of restraint are inadequate. (List fhe alternatives that have proven inadequate or summarize the reasons why It is believed such alternatives would be inadequate.) See attached 72-hour memorandum, dated 29 Mav 2010.

DATE (YYYYMMDD)

TYPED NAME, RANK, AND ORGANIZATION OF COMVIANDER

SIGNATURE

MATT HEW W. FREEBURG. CPT. HHC, 2D BCT

f
DECISION OF MILITARY MAGIS-TRATE TO: (Addressee(s))

On ^^CJS^i I i

ZOtOfi^-^C) (Date) (YYYYMMDD) /?it/iDt^Y (Name) f^^AlMlfJrj

_. 1 reviewed the circumstances concerning the continued pretrial confinement of . Based upon this review, 1. (Check appropriate statement)

Determined that continued pretrial confinement is warranted. Determined that continued pretrial confinement Is not warranted and order his/her release from pretrial confinement.

TYPED NAME. GRADE. AND BRANCH OF MILITARY MAGISTRATE

SIGNATURE

te-y^tn c^r^ JA
DA FORM 5112, SEP 2002

Le^
APD PE vl 01

U N I T CONTACT LNFOR.MATION

Prisoner Name:

Unit:

I PrC f^YM\\vC) %n^\f4\


Higher Unit: ' J V-oS'iSuiM OCONUS .Address'Pnone: [Depcy-Q

Htv:,2_%:T,\0'- )j(YKi'biv [ i f ^
Redeployment Date:

Avc^ (O
CONUS Address'Phonc:

t^c,aa)\d^Mu%Wj4
Ccr, kk^'ff-.
Commander: C?T f i i t f v o .

fie

(b) (6), (b) (7)(C) D)W(b) (6), L (b) (7)(C)


I Email:

( b AKOKmail: ) ((b) (6), (b) (7)(C) 6 ), Email: ( (b) b (6), (b) (7)(C) ) Email: AKO ( (b) (6), (b) (7)(C) 7 ) ( Email: (b)C (6), (b) (7)(C) )
AKOlmail:

(b) (6), (b) (7)(C)

DSN A CeiTPhonc:

(b) (6), (b) (7)(C)

FiTsi Sergeant: |5(i DSK & Cell Phone: S.

ojr^

(b) (6), (b) (7) (C)


?.] NCOIC:

j'lASC', P t T ( % , SAiTV&KA L "DSN & Cell'Phone:


(b) (6), (b) (7)(C)

'

(b) (6), (b) (7)(C)

AG Representative;

Email:

C7T C k n s
DSN & Cell Phone:

^licnEAJ

DSN & Cell Phone:

(b) (6) , Defense Renrcsentative; (b) ~! \(7) P \ CP' V (C) O i / i ^ t - ^

<,%?(].(
b ) ( 6 ) , ( b ) ( 7 ) (

( (b) (6), (b) (6), (b) (7)(C) b(b) (7)(C) AKO Email: (b) (6), (b) (7)(C) ) (6), (b) (7)(C) (b) ( 6 ), Email: ( b ) Email: AKO (b) ( (6), ( (b) (7)(C) 7 b ) ) ( ( C 6 ) ) Enclosure , ( b ) ( 7 ) (

DEPARTMENT OF THE ARMY US ARMY INSTALLATION MANAGEMENT COMMAND HEADQUARTBRS, UNITED STATES ARMY GARRISON, FORT DRUM 10000 10 MOUNTAIN DIVISION DRIVE FORT DRUM, NEW YORK 13602-5000 ORDER 222-720 2 * " BRIGADE COMBAT TEAM (WBDAAA) FORT DRUM, NEW YORK 13602-5000 THE FOLLOWING UNIT ACTION IS DIRECTED: GROUP TRAVEL AND TRANSPORTATION ACTION: The above Organization Is DEPLOYED In a temporary change of station (TCS) as shown below in Support of OPERATION IRAQI FREEDOM and are to retum to your pemianent station upon completion of the duties In support of this operation, You will submit a reviewed voucher k r M s trav^ to the linance ofNce within 5 working days after return to home station. ASSIGNED TO: 2^ BRIGADE COMBAT TEAM (WBDAAA) UNITED STATES CENTRAL COMMAND AREA OF RESPONSIBILfrY (IRAQEFFECTIVE DATE; 1 OCTOBER 2009 . . DEPLOYMENT PERIOD: 365 DAYS OR UNTIL MISSION COMPLETION ACCOUNTING CLASSIFICATION: SEE ATTACHED ANNEX FOR ACCOUNTING CLASSIFICATIONS {FY10/11 AVAILABIUTY IS CONTINGENT ON CONGRESS ENACTING APPROPRIATIONS OR AUTHORING OPBUTIONS UNDER A CONTINUING RESOLUTION) WCOM ISSUED CONTROL NUMBER: SEE ATTACHED ANNEX CIC: SEE ATTACHED ANNEX MOVEMENT DESIGNATOR CODE: PME10/PMO10 ADDITIONAL INSTRUCTIONS: (A) This is a temporary change of station (TCS). Nomriai PCS entitlements, allowances and relocation of femily members are not authorized. Consolidated Personnel Policy Guidance (PPG) for operations Iraqi Freedom, and Enduring Freedom is on the DCS, G-1 web site; http:/Nyvw.arwvq1.armv.fnil/militarvpersonnel/policv.asp (B) Soldiers are authorized 4 duffle bags- (1) one personal bag, (2) two issued bags of OCIE and 1 standard carry-on bag that meets AMC/Contracted flights standards. Size maximum 25x42 or Ruck size 15x10x22; with a maximum weight of 50 pounds. When AMC or contracted transportation is not available, reimbursement of authorized checked baggage on commercial flights waghing more than 50 pounds to 3 max of 70 pounds per bag authorized as excess baggage. Upon redeployment from theater Soldiers issued additional OCIE iHider the Rapid Fielding Inttiafive (RFI) are authorized a shipment of one additional bag not to exceed 70 pounds, if not transported as pari; of a Military shipment. Each Soldier vM\ bring only iose items specified by ttie PPG or other appropriate auOiority. You will be provided a list of those Items from your company. This Is the maximum quantity of authorized baggage; however, fewer bags can be taken if Soldier can fit equipment and personal Hems into a lower number of duflle bags. Each duffle bag must not exceed 70 poiaids. No footlockers or commercial suitcases are authorized for movement Soldier will only bring those items specified in chapter 6 of the PPG. Soldier will be provided a list of those items from unit Commander. Reimbursement of authorized checked baggage on commercial flights weighing more than 50 pounds to a max of 70 pounds per bag authorized as excess baggage. (C) Government quariBrs and dining facilities will be used at the Replacement acflvity and during deployment Essential uriit mess has been declared by the Assistant Secretery of the Amiy (Manpower and Reserve Affairs) ASA (M&RA) For the Mobilization and Demobilization Sites not to exceed (10) Days. MOSQ location will provWe quarters and mess. The Installation Commander will make separate determinations as to the availability of mess and quarters and as a last resort will issue a Statement of Non availability Statement/Certificate of Non-availability. Per Diem payable is $3.00 per day for CONUS and $3.50 per day for OCONUS. Per Diwn will normally be paid for the travel to gaining station, or Replacement activity unless prohibited by travel circumstances. (D) For Active Duty SoWiers, basic allowance for housng (BAH) is based upon pennanent duty station. For Reserves and Retired memba-s called or ordered to active duty BAH is based on their principal place of residence when called or ordered to the tour of active duty. Pay entitlements will be based on locafion IAW DODFMR and applicable messages and regulations. (E) UnK is required to submit PERSTEMPO information using flight manifest data. Do not submit departure transactions on unit deployed. Ensure MDC of "PM" is included. (F) During period of deployment gaining/deployed unit Commander has responsibility for personnel service support to include avranls arvd decorations; UCMJ, and all other forms of personnel and legal administration support except Reserve Component promotion authority. (G) Temporary storage of HHG may be authorized, at Government expense for period of contingency operations as provided by paragraph U4770-A, Joint Federal Travel Regulation for single personnel (both AC and RC), Soldier married to another Soldier when both are deployed and single SoWier parents when a childcare plan requires dependents to leave Ae residence. Contact the k)cal transportation office for assistance. This may impact on the authorization for BAH. Storage of one privately owned vehicle may be authorized. Soldier must contact the supporting installation transportation officer for requirements. Soldier must complete arrangements requiring personal presence. Temporary duty (TDY) household goods weight allowance is authorized for CONUS and OCONUS based on personnel that are on active duty for a period greater than 200 days, excluding those areas designated as hostile fire/imminent darker pay areas. Contact the Installation Transportation Office. Clari< Hall, 2d floor, at 772-6384 for assistance. 10 AUGUST 2009

j I i j I

; [ I \ \ f \ I I \

(b) (6), (b) (7)(C)

SSN ANNEX ORDER 222-720. DTD 10 AUGUST 2009 HHC 2D BCT NAME
GUERRERO DORIAN GUERTIN ANDREW D A V I D GUTIERREZ DAVID MANUEL HACK HONDO JUSTIN HAGY DANIEL AARON HAMBLETON JOSEPH MICHAEL HANSEN THOMAS RANDALL HEATON RALPH DAVID HICKS CODY DALE ANTHON HORN KEVIN SCOTT II HOYER BRODIE K HYDE TIMOTHY ALAN IRISH ERIC LEE JANDA JAMES ANDREW JOHNSON BRANDON FtAY JOHNSON PAULINE ADELL JOHNSON SUMMER PAIGE JONES JOSHUA G HENR JOY DAN TODD KARST WAYNE ALLEN KEETON JEREMIAH LEE KELLEHER JAMES ANDREW KERNS BRIAN DOMENIC KJELSHUS SHERWIN H KLUMP DARYL PAUL KOOL JASON ELLIOT KUBIC MICHAEL ALLEN LANDON JEREMY WILLIAM LEARY CRAIG PAUL LEELOY DANIEL JAMESROUSSEA LEWIS ANDREW R LEWIS JAMIE LEE LEWIS SCOTT JOSEPH UGGETT CLAYTON EDWARD UNDSAY CHADD JOSEPH UPPINCOTT KEVIN ALAN LODER THOMAS ANDREW LONG FREDRICK JEROME LONG JAMES ROBERT II LOPEZ ELIZABETH LAUREL LUSK JEFtEMY ALAN LYONS ALFRED BENJAMIN MACKLIN CARLA LAVERNE MACLEAN KEVIN RICHARD MAGESTRO MARK LOUIS MAUNOWSKI MARK JOSEPH MANIBUSAN CARL JOHN MANNING BRADLEY EDWARD MARIUR JENSON CHADDY MARSHALL KYRA JAREE SSN GRADE PV2 PFC SGT CW2 SGT PFC SFC MAJ SPC PFC PFC CPT MAJ SFC MAJ SOT SPC PV2 SGT PV2 SSG SSG SGT MAJ CW2 SGT SFC PFC PFC PFC PFC CPT SGT SPC SGT SSG SSG SGT SFC SGT CPT SGT CW2 SFC SSG SGT SSG SSG PFC SGT SPC UIC WBOAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBOAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA WBDAAA UNIT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC28CT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC2BCT HHC 2BCT HHC 2BCT HHC 2BCT HHC 2BCT

(b) (6), (b) (7)(C)

Page 2 of 4

2 2
51
(D tP

T) 5 2P T3 5 T! T ; T! T I TJ T! T) T! Ti TJ TJ T l TITJ T) U
(D(D{D(D(D0^CDOC5(DCDCD(D<D(DCPA(II

< < < < < < <

< c < < < < : c < < < < < < < <

0 9

Kg

^^^^^^ ^^^^^^^
^^.^^^Coo^

3:

21S

o o a.
H ~

^
0) lO' 3

^^^^^^^
sxn mio

3
c* 3 3

o
m o

if
c m 7) m

=S

o
TOO n

=8
zajnn

ii" psg kss


g
HS

ml* i oltD

C O

m o H 5 z
x|<
I

-Hrr-riao

m z
r-|0

f-

1 1 1 1 1 1 1
Sai^jac >-i-<-n-n-n TIOOOOOO >oz
3 O

ra >
3

a *o

w H m a

25555^
H-IH-Hmm

Si &SWl

S o
73 O

7}

n;

SSgg%
Z Z Z Z Z s

m 2
m n

(nnimrTi>s rammmco
5 N

* w w w w
^UiUlUt

oooo

(b) (6) , (b) (7) (C)

i
(b) (6), (b) (7) (C) I

III
f
5%
5 Iff, 2

o z

TJ

8 & m | g f g 8

UNITED STATES OF AMERICA

Prosecution Motion for Preliminary Ruling on Admissibility of Evidence (Business Records) Enclosure 3 22 June 2012

Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211

^
p^SZ^""'^""-^''^;^'"-PA(:P

or

UNITED STATES OFFICE OF PERSONNEL MANAGEMENT

Federal Investigative Services

April 17,2012

Mr. Arthur D. Ford Criminal Law Division Office ofthe Staff Judge Advocate US Army Military District of Washington 103 3"^ Street, Building 32, Suite 100 Fort Lesley J. McNair, Washington, DC 20319

Dear Mr. Ford: Enclosed is the Attestation Certificate on Bradley Edward Manning. If you have any questions regarding this response, contact the Freedom of hiformation Privacy Act office at 724-794-5612, extension 7000. Please reference tracking number 2012-06555. Sincerely,

LWCZZA-OjULL^:^
Pamela S. Crawford FOI/PA Specialist Enclosure

www.opm.gov

Recruit, Retain and Honor a World-Class Workforce to Serve the American People

www.usajobs.gov

UNITED STATES OFFICE OFPERSONNEL MANAGEMENT

Federal Investigative Services

ATTESTATION CERTIFICATE

This document is intended t o meet the requirements set forth in Military Rules of Evidence Rule 902(11), addressing certified records of regularly conducted activity. I swear or affirm that each of the following is true regarding the Single Scope Background Investigation and Entrance National Agency Check Investigation, on Private First Class Bradley Edward Manning mailed t o Mr. Arthur D. Ford at the US Army Military District of Washington, Office o f t h e Staff Judge Advocate on February 1, 2012, to the best of my knowledge and belief: 1. 2. 3. 4. 5. I am the custodian of these records. The records were made at or near the time of the occurrences of the matters set forth by or from information transmitted by, people with knowledge of these matters; The records were kept in the course of regularly conducted business activity; It was the regular practice of the business activity to make the records; and The records are a true, accurate, and complete copy of the original documents.

U.S. Office of Personnel Management, Federal Investigative Services, Freedom of Information and Privacy Act (FOI/PA) office Organization < Z ^ t ^ Signature Lisa M. Alleman Print or Type Name v/-A_ LAx^rv^ D9te Supervisory FOI/PA Specialist Title - 1 7 2_o I 2 -

(b) (6), (b) (7)(C)


Business Telephone

(b) (6), (b) (7)(C)

Business Address

Commonwealth of Pomsylvania
^ County of Jlitij COMMONWEALTH pP PENNSYLVANIA Notarial Seal Cynthia L. Painter, Notary Public Cherry Twp.,Buder County My coiwntelon Explfes Dec 13,2015
M B n , PENNSYLVANIA ASSOCIATION OF NOTARIES

Sworn to and subscribed beter* ms Ws_a^ayofi/i/-iL'^

www.opm.gov

Recruit, Retain and Honor a World-Class Workforce to Serve the American People

www.usajobs.gov

U. S. Office of Personnel Management Federal Investigative Services Division PO Box 618 Boyers, PA 16020

Manifest Number: Destination:

USIS903776 CERT UPS

Manifest Date:

2/3/2012

Line Number i

Case Number

Case Name MANNING

Item Type Certified Mailout

(b) (6), (b) (7) (C)

Please verify all items manifested as being received. If there are discrepancies with this shipment, please contact FISMailRoomOversight@opm.gov.

DATE: 01/15/2008 UNITED S T A T E S OFFICE O FP E R S O N N E L M A N A G E M E N T INVESTIGATIONS SERVICE **************** C A S E CLOSING TRANSMITTAL C L O S E D : 01/15/2008 C A S E #: 08F18704 TYPE/SERVICE: SBI - P R T E X T R A C O V E R A G E : N A M E : M A N N I N G , B R A D L E Y E D W A R D SSN: ###-9(b) DOB: # # / 1 9 8 7 POSITION: MILITARY

P A G E :

************************

(6), O *************** *************** MAIL T S O N : 676G (b) * SOI: A334 (7) D E P A R T M E N TO FT H EA R M Y * D E P A R T M E N TO FT H E A R M Y SA R M Y (C) RECRUITING C O M M A N D ( U S A R E C )* C E N T R A LP E R S O N N E L SECURITY C L E A R A N C E H O SU
1307 3 R D AVE. R O C M 3008 ATTN: APRIL HABIB FT K N O X , K Y 40121 A G E N C Y DATA: O P M ADJUDICATION: S E EA T T A C H E D INV F O R M 79A T H E ITEM INFORMATION S U M M A R I Z E DB E L O W , A N DA N YR E P O R T S O F INVESTIGATION, INQUIRY F O R M S A N D / O RO T H E RA T T A C H M E N T S WITH THIS "TRANSMITTAL, C C H P L E T ET H E INVESTIGATION R E Q U E S T E DO NT H E P E R S O N IDENTIFIED A B O V E . * FACILITY * F O R TG E O R G EG .M E A D E , M D 20755 * ***************************************

THIS C A S EH A SB E E N ELECTRONICALLY TRANSMITTED B Y OPIS

****************************** ITEM INFORMATION ****************************** ITM T Y P E ITEM IDENTIFICATION/LOCATION


*** *** ******************************************

C M R E S U L T S
** ***********************

001 PRSI F O R T L E O N A R D W O O D F O R TL E O N A R D W O O D , M O 002 RESI 1492 S E L W O R T H Y R O A D POTOftC, M D 003 RESI 8020 N W 119TH S T R E E T O K L A H O M A CITY, O K 004 RESI 5607 71ST P L A C EE A S T APT 1005 TULSA, O K 005 E D U C M O N T G O M E R YC O L L E G EO F ROCKVILLE ROCKVILLE, M D 006 E M P LE M P L O Y E R -S T A R B U C K S P O T O M A C , M D
007 EMPL EMPLOYER - FYE TULSA, O K

P ISSUE(S) P A C C E P T A B L E P N O T C O N T A C T E D P ISSUE(S) P A C C E P T A B L E P A C C E P T A B L E R R E F E R R E D R N O T C O N T A C T E D

008 E M P LE M P L O Y E R-Z O T O INC O K L A H O M A CITY, O K

DATE: 01/15/2008

P A G E :

R T C A S E #: 08F18704 TYPE/SERVICE: SBI - P E X T R A C O V E R A G E : NAME:^&ma^, B R A D L E Y E D W A R D (b) /1987 POSITION: MILITARY

(6),
im T Y P E ITEM (b) IDENTIFICATION/LOCATION E S U L T S C M R R R E F E R R E D R R R P R R R R R

*** **** ****************************************** ** *********************** (7)(C)


009 E M P LE M P L O Y E R - INCREDIBLE PIZZA C O TULSA, O K 010 L A W E M A R Y L A N DS T A T E W I D E L A W , M D 011 L A W E TULSA, O K 012 L A W EO K L A H O M A CITY, O K 013 G E N LK A R A M. B A R R E T T O K L A H O M A CITY, O K 014 L A W EO K L A H O M A CITY, O K 015 L A W EO K L A H O M A CITY, O K 016 L A W EF T . L E O N A R DW O O D , M O 017 L A W ES T . R O B E R T S , M O 018 E M P LE M P L O Y E R- P E R S O N N E L TRAINEE DIVISION F T . L E O N A R DW O O D , M O 019 RESI COMJNITY SERVICE F T . L E O N A R DW O O D , M O 020 G E N L MILITARY P E R S O N N E L R E C O R D F T . L E O N A R DW O O D , M O 021 E M P LE M P L O Y E R- T R A N S W O R L D E N T E R T A I N M E N T ALBANY, N Y 022 L A W E ROCKVILLE, M D ~023~ THPT EHPESffiSJT RECORD - STARBtTCKS
BETHESDA, M D

N O R E C O R D N O R E C O R D N O R E C O R D A C C E P T A B L E N O R E C O R D N O R E C O R D N O R E C O R D N O R E C O R D A C C E P T A B L E

O R E C O R D R N R A C C E P T A B L E R A C C E P T A B L E R N O R E C O R D R A C C E P T A B L E R A C C E P T A B L E R A C C E P T A B L E O R E C O R D R N R N O R E C O R D R N O R E C O R D P ISSUE(8) P N O TC O N T A C T E D P ISSUE(S) P A C C E P T A B L E P ISSUE(S) P ISSUE(S) L L L L L N O PERTINENT N O R E C O R D N O PERTINENT N O R E C O R D ISSUE (S)

M P L O Y E R - U. S . A R M Y 024 EMPL E FT. L E O N A R DW O O D , M O E R S O N N E L TRAINEE DIVISIW 025 GENL P FT. L E O N A R DW O O D , M O A R R A C K S C 8 2 N D 026 RESI B FT. L E O N A R DW O O D , M O 027 L A W E FT. L E O N A R DW O O D , M O A W E ST. R 028 L O B E R T , M O E N L PRIVATE (b) (6), (b) 029 G F O R T L E O N A R DW O O D , M O (7)(C) 030 R E F E THCmS (b) (6), (b) E D M O N D , O K (7)(C) 031 G E N L (b) (6), (b) (7)(C) P O T O M A C , M D 032 G E N (b) (6), (b) (7)(C) P O T O M A C , M D 033 G E N L(b) (6), (b) (7)(C) O K L A H O M A CITY, O K 034 G E N L(b) (6), (b) (7)(C) E D M O N D , O K AOl SII BOl FBIF COl FBIN DOI DCII EOl C H M EQUIFAX R E DO BALTIMORE, M D

DATE: 01/15/2008

P A G E :

CASEH: 08F18704 TYPE/SERVICE: SBI-PRT E X T R A C O V E R A G E : NAME:MANNING, B R A D L E Y E D W A R D 8SN: ^1^1^1 DOB: ^11^/1987 POSITION: MILITARY (b) ITM T Y P E ITEM IDENTIFICATION/LOCATION C M R E S U L T S (b) *** **** ****************************************** ** *********************** (7) FOl SESESELECTIVESER L A C C E P T A B L E (C) G R E A T LAKES, IL

(6),

*********************** E^ C A S E CLOSINGTRANSMITTAL ***********************

UNITED STATES OFFICE O FP E R S O N N E L M A N A G E M E N T INVESTIGATIONS SERVICE WASHINGTON,DC 20415 F INVESTIGATION CERTIFICATION O

DATE: 01/15/2008 SUBMITTING OFFICE: SON-676G D E P A R T M E N T OF T H E A R M Y C E N T R A LP E R S O N N E L SECURITY C L E A R A N C E FACILITY F O R TG E O R G E G . M E A D E , M D 20755 N A M E : MANNING,BRADLEY E D W A R D SECURITY OFFICE: S0I-A33^

(b) (6),
SSN: 1^^^111(b) (7) C A S E TYPE: SBI (C) E X T R A C O V E R A G E : POSITION CI^E :/ DOB:^^^^^1987 POSITION: MILITARY CLOSING DATE: 01/15/2008 OPMCASEH: 08F18704

S C H E D U L E D DATE: 10/10/2007 O N D U C T E D FROM:SF 86 INVESTIGATION C

THIS CERTIFIES THATABACKGRDUNDINVESTIGATION O NT H E PERSIA IDENTIFIED A B O V E H A SB E E NC O M P L E T E D . T H ER E S U L T S OF THIS INVESTIGATION W E R E S E N TT OT H E SECURITY OFFICE FORASECURITY/SUITABILITY DETERMINATION.

******************************************************************************* A G E N C Y CERTIFICATION: T H ER E S U L T SO F THISINVESTIGATION H A V EB E E N REVIEWED, A N D AFINAL DETERMINATION H A SB E E N M A D E .

A G E N C Y CERTIFYING OFFICIAL

| D A T E I I

FILETHISCERTIFICATEONTHE P E R M A N E N T SIDEOFTHEPERSON^S OFFICIAL P E R S O N N E L F O L D E R AFTER T H E FINAL A G E N C Y DETERMINATION IS M A D E .

A G E N C Y U S EB L O C K( R E Q U E S T ID 2665639) e-QIP Version 2

F E D E R A L INVESTIGATIONS P R O C E S S I N GC E N T E R (FIPC) D A T A FIPC C O D E S : T Y P EO F INVESTIGATION C O D E : 30

SERVICE: A O V E R A G E E X T R A C E X T R AC O V E R A G E CODE(S): SENSITIVITY LEVEL RISK: 4

A D P R E Q U I R E M E N T : A C C E S S LEVEL: 3

ADDITIONAL C O M M E N T S : ^ N A T U R EO F ACTM? C O D E : MIL D A T EO F ACTION DATE: / / G E O G R A P H I C LOCATION W O R L D W I D E C O D E : POSITION C O D E


CODE:

POSITION TITLE TITLE: Military SUBMITTING OFFICE N U M B E R S O N #: 676G LOCATION O F OFFICE P E R S O N N E LF O L D E R . LOCATION C O D E : Other O T H E R A D D R E S S N A M E : H QU S A R E C G 3 Operations A D D R E S S : 1307 Third Ave

FT. Knox K Y 40121

SECURITY OFFICE IDENTIFIER SOIil:A334 LOCATION O F SECURITY F O L D E R LOCATION C O D E : N^ne O T H E RA D D R E S S N A M E : A D D R E S S : NoneProvided O P A C A L C N U M B E R C O D E : D A T R A D A C C O U N T I N GD A T AA N D / O R A G E N C YC A S E N U M B E R C O D E : R E Q U E S T I N G OFFICIAL NAME:HQUSARECG3 TITLE: P H O N E : (502) 626-1515 Ext: ^^i^^^^l^ 10/10/2007 P R O C E S S O R N A M E : P H O N E : ext:

SPECIAL HANDLING HANDLING INFORMATION: ISP C U S T O M FIELDl VALUE: ISP C U S T O M FIELD2 VALUE:

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN #Hm#-9(b) (6), (b) (7) (C)

Page 1 of 29 Generated Copy

Electronic Questionnaires for Investigations Processing (e-QIP) Investigation Request #2665639 GENERATED FROM EXTERNALLY SUBMITTED DATA

The information contained in this (document represents (data submittecJ for Bradley Edward Manning (Applicant) for the e-QIP Investigation Request #2665639. This Investigation Request contains the following (documents: Page 1: Investigation Request Cover Sheet Page 2-29: Questionnaire for National Security Positions (SF86 Format) Note: To conserve paper only the first entry in multiple-entry lists (displays completion instructions. The completion instructions for the first entry also applies to each a(dditional entry unless otherwise noted.

Generated

on 2 0 0 7 - 1 0 - 1 0

00:22:35.226

PRIVACY ACT INFORMATION

Data Hash Code: 8 4 2 0 8 e d e 2 5 b 8 8 1 5 1 2 d 8 f c f 4 a f 8 f f 5 e e e 0 5 d l 9 8 8 a

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2655639 f o r Applicant SSN 4HHP (b) (6), (b) (7)(C)

Page 2 o f 29 Generated Copy

Form Completion Instructions Questionnaire for National Security Positions (SF86 Format)
OMB No. 3206-0005 Follow instructions fully or we cannot process your form. If you have any questions, call the office that gave you the form.

Purpose of this Form


The United States Government conducts background investigations and reinvestigations to establish that military personnel, applicants for or incumbents in national security positions, either employed by the Government or working for Government contractors, licensees, certificate holders, and grantees, are eligible for a required security clearance. Information from this form is used primarily as the basis for investigation for access to classified information or special nuclear information or material. Complete this form only after a conditional offer of employment has been made for a position requiring a security clearance. Giving us the information we ask for is voluntary. However, we may not be able to complete your investigation, or complete it in a timely manner, if you don't give us each item of information we request. This may affect your placement or security clearance prospects.

Authority to Request this Information


Uependmg upon the purpose of your investigation, the United States Government is authorized to ask for this information under Executive Orders 10450, 10865, 12333, and 12356; sections 3301 and 9101 of title 5, United States Code; sections 2165 and 2201 of title 42, United States Code; sections 781 to 887 of title 50, United States Code; and parts 5, 732, and 736 of Title 5, Code of Federal Regulations. Your Social Security number is needed to keep records accurate, because other people may have the same name and birth date. Public Law 104-134 (April 26, 1996), as amended in title 31, section 7701, also asks Federal agencies to use diis number to help identify individuals in agency records.

The Investigative Process


Background investigations for national security positions are conducted to develop information to show whether you are reliable, trustworthy, of good conduct and character, and loyal to the United States. The information that you provide on this form is confirmed during the investigation. Investigation may extend beyond the time covered by this form when necessary to resolve issues. Your current employer must be contacted as part of the investigation, even if you have previously indicated on applications or other forms that you do not want this. In addition to the questions on this form, inquiry also is made about a person's adherence to security requirements, honesty and integrity, vulnerability to exploitation or coercion, falsification, mis-representation, and any other behavior, activities, or associations that tend to show the person is not reliable, trustworthy, or loyal.

Your Personal Interview


Some investigations will include an interview with you as a normal part of Ihe investigative process. This provides you the opportunity to update, clarify, and explain information on your form more completely, which often helps to complete your investigation faster. It is important that the interview be conducted as soon as possible after you are contacted. Postponements will delay the processing of your investigation, and declining to be interviewed may result in your investigation being delayed or canceled.

G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0

00:22:35.226

PRIVACY ACT INFORMATION

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r Applicant SSN^I^I||^^11^(b) (6), (b) (7) (C)

Page 3 of 29 Generated Copy

You will be asked to bring identification with your picture on it, such asavalid State driver'slicense, to the interview.There are other documents you may be asked to bring to verify your identity a^welL^'hese include documentation of any legal name change. Social Security card, and/or birth certificate. You may also be asked to bring documents about information you provided on the form or other matters requiring specific attention.These matters include alien registration,delinquent loans or taxes, bankruptcy,^udgments, liens, or other financial obligations, agreements involving child custody or support, alimony orproperty settlements, arrests, convictions, probation, and/orparole.

Organisation of this Porm


This form has two parts. Partlasks for background information, including where you have lived, gone to schooL and worked. Part2asks about your activities and such matters as firings froma)ob, criminal history record, use of illegal drugs, and abuse of alcohoL In answering all questions on this form, keep in mind that your answers are considered together with the information obtained in the investigation to reach an appropriate adjudication.

InstructionsforOom^letingthisPorm
1. Follow the instructions given to you by the person who gave you the form and any other clarifying instructions furnished by that person to assist you in completion of the form.You should retainacopy of the completed form for your records. 2. All questions on this form must be answered. If no response is necessary or applicable, indicate this on the form by checking the associated "Not Applicable'box. If you need to eslimaleadale, an "estimated" box will be available after each
^^t^^^ti-ybl^^k

3 Do not abbreviate the names of cities or foreign countries.Whenever you are asked to supplya'"Country'" name, you may select the country name by using the country list feature. Touse the "Country"'list feature, click on ihe'List" link beside the "Country"'title toopenalisting of country names ina separate window.Find the desired country name and use your web browser's "Copy" and "Paste'features to copy the country name into the ""Country"'text field If the country name is not in the list, manually enter the country name into the "Country " text field When enteringaUnited States address or location, select the state or territory from the "States" pulldown list.Selectinga state/territory implies "United Slates " as the country, so you do not need to enter it into the ""Country" text field. For locations outside of the United States and its territories, enter the name of the country into the "Country" text field and leave the '"State" field blank. 4. The5digit postal ^IP codes are needed to speed the processing of your investigation. The office that provided the form win assist you in completing the ^IP codes. 5. For telephone numbers in the United Slates, be sure to include the area code, and use one of the following formats; (123^456 7890or 1234567890 6 All dates provided on this form must be in Month/Oay/Year or Month/YearformaL Use the pull down lists lo select the month and day.^^e year should he entered as all four numbers,ie,1978 or 2001.If you find that you cannot report an exact date, approximate or estimate Ihe dale to the best of your ability and indicate this by checking the "Fsl."box.

Pinal

OeterminationonYour^ligihility

Final determination on your eligibility for access locla^^ified information is the responsibility of the Federal agency that requested yotir investigation. You may be provided the opportunity personally to explain, refute, or clarify any information beforeafinal decision is made.
Generatedon 2007 10 10 0 0 : 2 2 : 3 5 226 PRIVACY ACTINPORMATION

Data Hash Code:

84208ede25b881512d8fcf4af8ff5eee05dl^88a

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r Applicant SSN ^1^|||^|1^^li (b) (6), (b) (7) (C) Penalties for Inaccurate or Palse statements

Page 4 o f 29 Generated Copy

The United States Criminal Code^title 18, section 100I)provides that knowingly falsifying or concealingamaterial fact isa felony which may result in fines of up to^lO,000,and/or5years imprisonment, or both. In addition. Federal agencies generallyfire, do not grantasecurity clearance, or disqualify individuals who have materially and deliberately falsified these forms, and this remainsapart of the permanent record for fnture placements.Because the position for which you are being considered isasensitive one, your trustworihinessisaveryimporiant consideration in deciding your eligibility forasecurity clearance.Yourprospects of placement or security clearance are better if you answer all questions truthfully and completely. You willhave adequate opportunity to explain any information yougive us on the form and to make your comments part of the record.

Disclosure of Information
The information you give us is for the purpose of investigating you foranational security positions we will protect it from unauthorized disclosure.The collection, maintenance, and disclosure ofbackground investigative information is governed by the Privacy AcLThe agency which requested the investigation and the agency which conducted the investigation have published notices in die Federal Register describing the systems ofrecords in which yourrecords will be maintained.You may obtain copies of the relevant notices from the person who gave you this form. fhe information on this form, and information we collect during an investigation may be disclosed without your consent as permitted by the Privacy Act (5 USC552a(b))andasfollowsbelow

P^I^ACYACTROOTIN^OS^S
1. Tothe Department of justice when;(a) the agency or any component thereof; or (b)any employee of the agency in h i s ^ her official capacity; or(c)any employee of the agency in his or her individual capacity where the Department of justice has agreed to represent the cmploy^^: or (d)th^ United States Government, isaparty to litigation or has interest in such litigation, and by careful review,the agency determines that the records are both relevant and necessary to the litigation and the use of such records by the Department of justice is therefore deemed by the agency to be forapurpose that is compatible with the purpose for which the agency collected the records. 2. Toacourt or adjudicative body inaproceedingwhen;(a) the agency orany component thereof; or (b)any employee of the agency in his or her official capacity; or(c)any employee of the agency in his or her individual capacity where the Department of .lustice has agreed to represent Ihe employee; or(d) the United States GovemmenLisaparty to litigation or has interest in such litigation, and by careful review,the agency determines that the records are both relevant and necessary to the litigation and the use of such records is therefore deemed by the agency to be forapurpose that is compatible with the purpose for which the agency collected the records. 3. Fxcept as noted in O^estion 24, whenarecord on its face, or in conjunction with otherrecords,indicatesaviolation or potential violation oflaw,whetherciviLcriminaL or regulatory in namre, and whether arising by general statute, particular program statute, regulation, rule, or order issued pursuant diereto, Ihe relevant records may be disclosed to the appropriate Federal,foreign. State, locaL tribal, or other public authority responsible for enforcing, investigating orprosecuting such violation or charged with enforcing or implementing the statute, rule, regulation, or order. 4. Toany source orpotential source from which information is requested in the course of an investigation concerning the hiring orretention of an employee or other personnel action, or the issuing or retention ofasecurity clearance, contract, grant, license, or other benefit, to the extent necessary lo identify the individual, inform the source of the namre and purpose of the investigation, and to identify the type of information requested. 5. ToaFederaL State, locaL foreign, tribal, or olherpublic authority the fact that this system of records contains information relevant to the retention of an employee, or the retention ofasecurity clearance, contract, license, grant, or other benefiLThe other agency or licensing organization may then makearequest supported by written consent of the individual for the entire record if it so chooses. No disclosure will be made unless the information has been determined to be sufficiently reliable to supportareferral to another office within the agency or to another Federal agency for criminal, civiL administrative, personneL or regulatory action.

Generatedon

2007

10 10 0 0 : 2 2 : 3 5 . 2 2 6

PRIVACY ACT INFORMATION

Dat^

Hash Code: 8 4 2 0 8 e d e 2 5 b 8 8 1 5 1 2 d 8 f c f 4 a f 8 f f 5 e e e 0 5 d l 9 8 8 a

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN ^^^^^1^1 (b) (6), (b) (7) (C)

Page 5 o f 29 Generated Copy

6. Tocontractors, grantees, experts, consultants, or volunteers when necessary to performafunction or service related to this record for which they have been engaged.Such recipients shall be required to comply with the Privacy Act ofl974, as amended. 7. Tothe news media or the general public,factual information the disclosun^ of which would be in the public interest and which would not constitute an unwarranted invasion of personal privacy. 8. ToaFederaL State, or local agency,or other appropriate entities or individuals, or through established liaison channels to selected foreign governments, in order to enable an intelligence agency to carry out its responsibilities under the National Security Act of 1947 as amended, the CIA Act ofl949 as amended, Executive Order 12333 or any successor order, applicable national security directives, or classified implementing procedures approved by the Attorney General and promulgated pursuant to such statutes, orders or directives. 9. ToaMember of Congress or loaCongressional staff member in response to an inquiry of the Congressional office made at the written request ofthe constituent about whom the record is maintained. 10. Tothe National Archives and Records Adntinistration for records management inspections conducted under 44 USC 2904and2906 11. Tothe Office ofManagement and Budget when necessary to the review of private relieflegislation.

Pt^BLIOB^RD^N INFORMATION
Public Burden reporting for this collection of information is estimated to average 90 minutes per response, including time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed and completing and reviewing the collection ofinformation.Send comments regarding the burden ^^li^^t^^r^^y^tl^^r^^^^t^l^tl^i^ ^^11^^^^ of information, including suggestions forreducing this burden to OPM Forms Officer, United States Office of Personnel Management,1900FStreetNW,WashingtonfX^20415 7900 L^notsend your completed form to this address. TheOMB No. 3206^0005 is currently valid. OPM may not collect this information and you are not required to respond unless this number is displayed.

E^0^^2^^8Ri^erfortl^eS^8^
executive Ordert2^68 Rider fortheOuestionnaire for National Security Positions ^SP^^)
Some questions on the current SF86specifyatime1rume of seven years.which is not consistent with Executive Order 12968. Untilarevised form is in place, interim instructions are needed for some of the items on the current SF86 when an SSBI is required.These questions should be answered withaten(lO) year lime frame for the case to meet the new standard; Section 9: WhereYoullave Lived Section IO:W^ereYouWent to School SeclionlLYour Employment Activities Section 22;Your Employment Record Section 23,questionseandfYour Police Record Section 29; Public Record CivilCourt Actions If you have questions, please contact the official that gave you access to the e-OIPSystem.

Sections^-^^ Your Identifying Information


Provide the following information about your tdenltty.

G e n e r a t e d on 2007

10 10 00 : 2 2 3 5 . 2 2 6

PRIVACYAC^ INFORMATION

Data Hash Gode:

84208ede25b881512d8fcf4af8ff5eee05dl988a

BB

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN #gm#- (b) (6), (b) (7)(C)

Page 6 o f 2 9 Generated Copy

Section 1: Full Name If you have nofirstname or middle name, select No First Name (NFN) or No Middle Name (NMN), as appropriate. If you have only initials in your name, enter the initial(s) (without the period) and select Initial Only (10). If you are a "Jr.,"" "Sr.," "II," etc., enter this under Suffix. Full Name Last: Manning First: Bradley Middle: Edward Suffix: Section 2: Date of Birth Date of Birth Month/Day/Year#MK/ia8Z Section 3: Place of Birth Place of Birth City: Oklahoma City County: OKLAHOMA State: QK Country: Section 5: Other Names Used Give other names you have used and the period of time you used them (for example: maiden name, name(s) by a former marriage, former name(s), alias(es), nickname(s)). If the other name is your maiden name, check the "nee" box. utner Names usea ( Not Applicable: { x } ) (No Entry Provided) Section 6: Other Identifying Information Height

Feet:
Inches: 2 Weight (Pounds): ULL Hair Color: BLOND Eye Color: BLUE Sex Male: { x } Female: { }

Section 7: Telephone Numbers


Provide your telephone numhiers and die time of die day that you are most likely available at these numbers. Include the Area Code and extension, where applicable. Work Telephone
G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0 0 0 : 2 2 : 3 5 . 2 2 6 PRIVACY A C T INFORMATION

Data Hash Code: 84208ede25b881512d8fof4af8ff5eee05dl988a

/I

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) (b) (6), I n v e s t i g a t i o n Request #2665639 f o r Applicant SSN ^11^1^^1^1 (b) (7)(C) Nurr^ber: Time: HomeTelephone Number:(b) (6), (b) (7) (C)

Page 7 of 29 Generated Copy

Time:

Section 8^ Citizenship
Itema
Mark the box that refiects your current citizenship status, and follow its instructions.

Citizenship Status laiTiaUSciti^en or riatiorial by t^irthiiT the LISoi'US territory/possession (Arisvveri1eiTisl:iaridd):^x lamaLIS.Citizen, butlwas NOT born in the LIS^Answer items b,oandd):^^ lam nolaU.S. citizen.(Answer itemsbande):^ ^ Itemh Your Mother's Maiden Name:(b) (6), Itemed United States Citizenship (b) (7) If you tu^aU^S^eiti^:eri^but^were not born in the us,provide iiiforitialiou about oti^ormor^ ofthe following pro^ (C) citizenship. Naturalisation Certificate (Where were you naturalised^) Court: Location City: Stale: Certifioate Number: i^ale Issued Month/Oav/Year:^/^/^ Citizenship Certificate (Where was the certificate issued^) Place Issued City: State: Certificate Number: Oate Issued l^or^th/Oav/Year:-^/^/^ State Oepartment Form 240 l9eport of Birth/abroad ofaCiti^en ofthe United States
Give Ihe date the form was prepared and give an explanation i f needed. G e n e r a t e d on 2 0 0 7 - 1 0 - ^ 0 00:22:35.226 PRIVACY ACTINFORMATION

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN ^^1^1^11^ (b) (6), (b) (7) (C) Date Form Prepared Month/Oav/Year:^/^/-^ Explanation

Page 8 of 29 Generated Copy

U.SPassport This may be eitheracurrentorprevious U.S.Passport. Passport Number: (b) (6), (b) (7)(C) Oate Issued Month/Oav/Year:08/2^/2005 Item d^ Dual Citizenship If you are(orwere)aduaI citizen of the UnitedStates and another country,provide the name of that country. Country(ies)ofOualCiti^enship(NotApplioable:^x^ ) (^^o^^^r^^rov^t^^^ Itemed Alien If you are an alien, provide the following information; Place You Entered the United States City: State: Oate You EnteredUS Month/Oay/Year:^/-^/-^ Alien Flegistration Number: Country(ies) of Citizenship /^o^r^^r^^rov-^c^eo^

Section ^^^here You l^aveLive^


Provideadetailed entry for each place you have lived in the 1ast7years. All periods must be accounted for in your lisLOo not listapermanent address when you were actually living ataschool address, etc.You may omit temporary military duty locations under90 days (list your permanent address instead).

Provide Ihe requested information about this place where you have lived. Be sure to indicate die actual physical location of your residence; do not useapost office box as an address, do not list apermanent address when you were actually living ataschool address, etc. Be sure to specify your location as closely as possible; for example, do not list only your base or ship, list your barracks number or home port.

Generated

on 2 0 0 7 - 1 0 - 1 0

00:22:35.226

PRIVACY

ACTINFORMATION

Data Hash Code: 84208ede25b881512d8fc;f4af8ff5eee05dl988a

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2565639 f o r A p p l i c a n t SSN 4im#*- (b) (6), (b) (7) (C)

Page 9 of 29 Generated Copy

For temporary military duty locations under 90 days, list your permanent address instead. You should use your APO/FPO address if you lived overseas. For addresses in the last five years, if this address is "General Delivery," a Rural or Star Route, or may be difficult to locate, provide directions for locating the residence under Additional Comments below. Dates of Activity From (Month/Year): 07/2006 To (Month/Year): Present Street Address Street:(b) (6) City: (b) (6)

State: (b) Country: Zip Code:(b) (6) (6) Person Who Knew You

For any address in the last 5 years, list a person who knew you at this address, and who preferably still lives in that area (do not list people for residences completely outside this 5-year period, and do not list your spouse, former spouses, or other relatives). Name:(b) (6) Street Address Street: (b) (6) City:(b) (6)
TftlftphnnR Niimhmr

State:(b) (6)

Country: Zip Code:(b) (6)

Number:(b) (6) 2Dates of Activity From (Month/Year): 04/2006 To (Month/Year): 07/2006 Street Address Street: (b) (6) City: (b) State: (b) Country: Zip Code (b) (6) (6) (6) Person Who Knew You Name: (b) (6) Street Address Street: (b) (6) City: (b) State:(b) Country: Zip Code:(b) (6) (6) (6) Telephone Number Number: (b) (6) 3 Dates of Activity From (Month/Year): 09/2005 To (Month/Year): 04/2006 Street Address Street: (b) (6) City:(b) (6)

State: (b) Country: Zip Code: (b) (6) (6)


PRIVACY ACT INFORMATION

G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0

00:22 :35 .226

Data Hash Code:

84208ede25b881512d8fcf4af8ff5eee05dl988a

/s

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN ^MM|fr(b) (6)

Page 10 of 29 Generated Copy

Person Who Knew You Name:(b) (6) Street Address Street:(b) (6) City: (b) State:(b) Country: Zip Code:(b) (6) (6) (6) Telephone Number Number: (b) (6) 4 Dates of Activity From (Month/Year): 11/2001 To (Month/Year): 09/2005 Street Address Street: (b) (6) City:(b) (6) Person Who Knew You Name: (b) (6) Street Address Street: (b) (6) Cityr(b) (6) Stater(b) Couiiliy. (6) Telephone Number Number: (b) (6)

: Country:(b) (6)

Zip Code:

Zip Cudw:(b) (6)

Additional Comments In West Wales Postal Code SA611 HS 5Dates of Activity From (Month/Year): 01/1992 To (Month/Year): 11/2001 Street Address Street:(b) (6) City: (b) (6)

State:(b) Countr/: Zip Code:(b) (6) (6) Person Who Knew You

Name: (b) (6) Street Address Street: (b) (6) City:(b) (6) Telephone Number Number: (b) (6)

State: (b) Country: Zip Code:(b) (6) (6)

(End of List)

Generated

on 2 0 0 7 - 1 0 - 1 0

00:22:35.226

PRIVACY ACT

INFORMATION

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

/O

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2565639 f o r Applicant SSN <H0Hv(b) (6)

Page 11 o f 29 Generated Copy

Section 10: Where You Went To School


List the schools you have attended, beyond Junior High School, in the last 7 years. If all of your education occurred more than 7 years ago, list your most recent education beyond high school, no matter when that education occurred.

Schools Attended ( Not Applicable: { } )


" 1 Provide the requested information about this school you attended. For correspondence schools and extension classes, provide the address where die records are maintained.

Dates of Activity From (Month/Year): 09/2001 To (Month/Year): 06/2005 School Type High School: { X } College/University/Military College: { } Vocational/Technical/Trade School: { } School Name: Tasker Milward VC Street Address Street: Portfield Ave Haverford City: Wales Stalfi Cniintrv: UNlTEaKlNGDQM-2i&Cod;
Provide a detailed entry for each degree, diploma, etc. you received from this school.

Degree/Diploma/Other
1 Date Awarded Month/Year: 06/2005 Degree/Diploma/Other: HIGH SCHOOL DIPLOMA
(End ol Degree/Diploma/Other List)

Person Who Knew You


For schools you attended in the last 3 years, list a person who knew you at school (an instructor, student, etc.). Do not list people for education completely outside this 3-year period.

Name: (b) (6) Street Address Street: (b) (6) City: (b) (6) State; (b) Country: Zip Code (b) (6) (6) Telephone Number Number:(b) (6)

G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0

00:22 :35.226

PRIVACY ACT INFORMATION

Data Hash Code:

84208ede25b881512d8fcf4af8ff5eee05dl988a

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN 11^11^1111 (b) (6)

Page 12 o f 29 Generated Copy

Dates of Activity From(Month/Year^:01/2007To(Month/Year^:05/2007 SchoolType HighSchool:^^ College/University/Military College:^x^ Vocational/Technioal/TradeSchool:^^ SchoolNameMONTGOMERY COLLEGE OFROCKV1LLE Street Address Street: 51 Mannakee St Citv: Rockville Stale MDCotmtrv: Degree/Diploma/Other (^^o8^r^^r^P^rov/t:/ed) Person Who K n e w Y o u Name (b) (6) Street Address Street: (b) (6) Citv:(b) (6) Telephone Number Number:(b) (6)

ZioCode:20850-1101

State:(b) (6)

Country: ZioCode(b) (6)

(i5^^^^^^^r,)

Sectiont1:Your Employment Activities


Provideadetailed entry for each of your employment activities for the last7years.You should list all fulltime work, parttime work, mihtary service, temporary military duty Iocationsover90 days, self-employment, otherpaid work, and all periods of unemployment. The entire7yearperiod must be accounted for without breaks, but you need not list employments before your 16th birthday.E^CEPTION; Show all Federal civilian service, whetherit occurred within the last7yearsornot.

Dates of Activity From (Month/Year): 01/2007To(Month/Yearl: Present Use one of the codes listed below to identify the type of employment; Type of Employment Active military duty stations:^^ National Guard/I9eserve:^^ U.S.P.H.S. Commissioned Corps:^^ Other Federal employment:^^ State Government ^NonFederalemployment):^^ Selfemployment:^^ Unemployment:^^

G e n e r a t e d on 2007 10 10 0 0 : 2 2 : 3 5 226

PRIVACY ACTINFORMATION

Data Hash Code: 84208ede25b881512d8fc;f4af8ff5eee05dl988a

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2565639 f o r Applicant SSN ^ 1 1 1 1 1 ^ 1 1 1 (b) (6)

Page 13 of 29 Generated Copy

Federal Contractor:^ ^ Other:^x^ Employer Name: Starbucks Your Position Title: Barista Employer's Street Address Street: 7911Tuckerman Lane City: Potomac State: MD Country: ZipCode:20854 Employer'sTelephone Number Number:f301^765 0556 dob Location Street Address (ifdifferentthan employer address) StreeL City: State: Country: Zip Code: dob Location Telephone Number Number: Supervisors Name:(b) (6) Supervisor's StreetAddress (if different than iob location) Street: City: State: Country: Zip Code: Supervisor'sTelephone Number Number: Provide Previous Periods of Activity if you worked for this employer on more than one occasion at the same location. After entering the most recent period of employment above, provide previous periods of employment at the same location on die additional lines provided. For example, if you worked at ^ Y Plumbing in Denver, CO, during3 separate periods of time, you would enter dates and information concerning the most recent period of employment above, and provide dates, position titles, and supervisors for the two previous periods of employment on die lines below. Previous Periods Of Activi1y(NotApplicable:^x^ ) /^oE^r7^^^^ov^t^ec^,) ^ Dates of Activity From (Month/Year^:06/2006To(Month/Year^: 01/2007 Type of Employment Active military duty stations:^^ National Guard/f^eserve:^^ U S P H S Commissioned Corps:^^ Other Federal employment:^^ State Government (Non-Federal employment):^ ^ Selfemployment:^^ UnemploymenL^x^ Federal Contractor:^^ Other:^^ List the name of the person who can verify your unemployment.
G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0 00:22:35.226 PRIVACY ACTINFORMATION

Data Hash Code:

84208ede25b881512d8fcf4af8ff5eee05dl988a

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN ^l^l^^|^li(b) (6)

Page 14 of 29 Generated Copy

Verifier Name:(b) (6) VerifieBs Street Address Street:(b) (6) City: (b) (6) State:(b) (6) Verifier'sTelephone Number Number: (b) (6) ^-

Country:

Z i p C o d (b) (6)

Dates of Activity From(Month/Yearl:04/2006To(Month/Year^:06/2006 Type of Employment Aotive military duty stations:^^ National Guard/^eserve:^^ t^.S.P.H.S.Commissioned(^orps:^ ^ Other Federal employment:^ ^ State Government (NonFederalemployment):^^ Self employment:^ ^ Unemployment:^^ Federal Contractor:^^ Other:^x^ Employer Name: FYE Your Position Title: Asst Manager Employer's Street Address Street:7021 SMemoriai Drive Ci1y:Til1^State:^Country: Zip Code: 7 4 1 ^ Employer'sTelephone Number Number: (b) (6) dob Looation Street Address (if different than employer address) Street: City: State: Country: Zip Code: dob LocationTelephone Number Number: Supervisor's Name: (b) (6) Supervisor's Street Address (if different than iob location) Street: City: State: Country: Zip Code: Supervisor'sTelephone Number Number: Provide Previous Periods of Activity if you worked for this employer on more than one occasion at the same location. After entering the most recent period of employment above, provide previous periods of employment at the same location on Ihe additional lines provided.For example, if you worked at ^ Y Plumbing in Denver, CO, during3 separate periods of time, you would enter dates and information concerning the most recent period of employment

Generated

on 2 0 0 7 - 1 0 - 1 0

00:22 : 35.226

PRIVACY

ACTINFORMATION

Data Hash Code:

84208ede25b881512d8fcf4af8ff5eee05dl988a

^(:^

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2565639 f o r Applicant SSN #@|@NNk (b) (6)

Page 15 o f 29 Generated Copy

above, and provide dales, position titles, and supervisors for the two previous periods of employment on die lines below. Previous Periods of Activity ( Not Applicable: { x } ) (No Entry Provided) 4. Dates of Activity From (Month/Year): 02/2006 To (Month/Year): 04/2006 Type of Employment Active military duty stations: { } National Guard/Reserve: { } U.S.P.H.S. Commissioned Corps: { } Other Federal employment: { } State Government (Non-Federal employment): { } Self-employment: { } Unemployment: { } Federal Contractor: { } Other: { x } Employer Name: Zoto Inc Your Position Title: Intern Programer

-Employer^s-Street-AddressStreet: 123 South Hudson Street City: Oklahoma City State: QK Country: Zip Code: 73102 Employer's Telephone Number Number: (650) 641-0108 Job Location Street Address (if different than employer address) Street: City: State: Country: Zip Code: Job Location Telephone Number Number: Supervisor's Name: (b) (6) Supervisor's Street Address (if different than job location) Street: City: State: Country: Zip Code: Supervisor's Telephone Number Number: Provide Previous Periods of Activity if you worked for this employer on more than one occasion at the same location. After entering the most recent period of employment above, provide previous periods of employment at the same location on the additional lines provided. For example, if you worked at XY Plumbing in Denver, CO, during 3 separate periods of time, you would enter dates and information concerning die most recent period of employment atiove, and provide dales, position titles, and supervisors for the two previous periods of employment on the lines below.

Generated on 2007-10-10 00:22:35.226 Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

PRIVACY ACT INFORMATION

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN 4#MM##(b) (6)

Page 16 o f 29 Generated Copy

Previous Periods of Activity ( Not Applicable: { x } ) (No Entry Provided) 5Dates of Activity From (Month/Year): 09/2005 To (Month/Year): 02/2006 Type of Employment Active military duty stations: { } National Guard/Reserve: { } U.S.P.H.S. Commissioned Corps: { } Other Federal employment: { } State Government (Non-Federal employment): { } Self-employment: { } Unemployment: { } Federal Contractor: { } Other: { x } Employer Name: Incredible Pizza Co Your Position Title: Server Employer's Street Address Street: 8314 E 71 St City: l u i s a State: OK Country: Zip Code: 74132 Employer's Telephone Number Number: (918) 294-8671 Job Location Street Address (if different than employer address) Street: City: State: Country: Zip Code: Job Location Telephone Number Number: Supervisor's Name:(b) (6) Supervisor's Street Address (if different than job location) Street: City: State: Country: Zip Code: Supervisor's Telephone Number Number: Provide Previous Periods of Activity if you worked for this employer on more than one occasion at the same location. After entering the most recent period of employment above, provide previous periods of employment at the same location on die additional lines provided. For example, if you worked at XY Plumbing in Denver, CO, during 3 separate periods of time, you would enter dates and information concerning the most recent period of employment above, and provide dates, position titles, and supervisors for the two previous periods of employment on die lines below. Previous Periods of Activity ( Not Applicable: { x } ) (No Entry Provided)

Generated

on 2 0 0 7 - 1 0 - 1 0

00:22:35.226

PRIVACY ACT

INFORMATION

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

-u

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r Applicant SSN < M l H H d(b) (6)

Page 17 o f 29 Generated Copy

Dates of Activity From (Month/Year): 08/1988 To (Month/Year): 09/2005 Type of Employment Active military duty stations: { } National Guard/Reserve: { } U.S.P.H.S. Commissioned Corps: { } Other Federal employment: { } State Government (Non-Federal employment): { } Self-employment: { } Unemployment: { x } Federal Contractor: { } Other: { } List the name of the person who can verify your unemployment. Verifier Name: (b) (6) Verifier's Street Address Street: (b) (6) City:(b) (6) State: (b) Country: Zip Code: (b) (6) (6) Verifier's Telephone Number Number:(b) (6)
(End of List)

Section 12: People Who Know You Well


List three people who know you well and live in the United States. They should be good friends, peers, colleagues, college roommates, etc., whose combined association widi you covers as well as possible the last 7 years. Do not list your spouse, former spouses, or other relatives, and try not to list anyone who is listed elsewhere on this form.

'

Dates Known From (Month/Year): 01/1996 To (Month/Year): Present Name: (b) (6) Home or Work Address Street: (b) (6) State:(b) Country: Zip Code: (b) (6) City: (b) (6) (6) Telephone Number Number:(b) (6) Time: Night

2-

Dates Known From (Month/Year): 09/1993 To (Month/Year): Present Name:(b) (6)

G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0

00:22:35.226

PRIVACY ACT INFORMATION

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2555539 f o r A p p l i c a n t SSN #####^(b) (6)

Page 18 of 29 Generated Copy

Home or Work Address Street: (b) (6) City:(b) (6) State:(b) Country: Zip Code:(b) (6) (6) Telephone Number Number:(b) (6) Time: Night 3Dates Known From (Month/Year): 08/1993 To (Month/Year): Present (b) (6) Name: Home or Wor(b) (6) Stre(b) (6) 4701(b) fee Creek Road (b) (6) City: Edmond State:(6) QK Country: Zip Code: 73034 Telephone Number Number: ((b) (6) Time: Night
(EndofUst)

Section 13/15: Your Spouse


Mark one item to show your current marital status. Marital Status Never Married: { x } Married: { } Separated: { } Legally Separated: { } Divorced: { } Widowed: { } Other: { } Current Spouse ( Not Applicable: { x } ) (No Entry Provided) Former Spouse(s) ( Not Applicable: { x } ) (No Entry Provided)

Section 14/15: Your Relatives and Associates


Give the full name, correct code, and other requested information for each of your relatives and associates, living or dead, specified below. 1. 2. 3. 4.
Generated

Mother Fadier Stepmother Stepfather


on 2 0 0 7 - 1 0 - 1 0 00:22:35.226 PRIVACY ACT INFORMATION

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

IV

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665539 f o r A p p l i c a n t SSN ^^1^111^^1 (b)

Page 19 o f 29 Generated Copy

(6)
5. 6. 7 8. 9 10. 11. 12 13. 14. 15. 16. 17 18. 19 Foster Parent Child(Adopted and Foster Child also) Stepchild Brother Sister Stepbrodier Stepsister Halfbrother Halfsister Father-inlaw Mothertnlaw Guardian Other Relatives Associated Adult Currently Living widiYou

mother Relative-include only foreign national relatives not listed i n l - 1 6 w i d i whom you or your spouse are bound by affection, obligation,or close and continuing contact Associate-include only foreign national associates with whom you or your spouse are bound by affection, obligation, or close and continuing contact.

Relationship Type: Mother Full Name Last:(b) Deceased

First: Susan Middle: Mary Suffix:

(6)

Yes:^^No:^x^
DateofBirth Month/Day/Year: Country of Birth CountrvUNITEDKINGDOM Country(ies)of Citizenship ^ Country; UNITED KINGDOM

(^^^^i^^Co^^r^^i^^,)^^Ci^i.^^^s^^^^^^r,)
Provide the following information if this person is living. Current Address

(b) (6)

Citv: Haverfordwest State: Country: UNITED KINGDOM Section15: Citizenship o f Y o u r Relatives and Associates If your mother, 1ather,sister, brother, child, or person with whom you haveaspouse-like relationship isaU.S.citizen by other than birdi, or an alien residing in the U.S.,provideaProof of Citizenship Status entry below. Proof of Citizenship Status

G e n e r a t e d on 2007 10 10 00 :22:35 226 Data Hash Code: 8 4 2 0 8 e d e 2 5 b 8 8 1 5 1 2 d 8 f c f 4 a f 8 f f 5 e e e 0 5 d l 9 8 8 a

PRIVACY ACTINFORMATION

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN ^^1^^11111 (b) (6)

Page 20 o f 29 Generated Copy

Provide one or more of die following to identify proof of citizenship status.

Naturalisation Certificate
Certificate Number: Provide the date issued and the location where the person was naturahzed (Court, City and State). Date Issued Month/Dav/Year:^/^/^ Court: Location City: State: Citizenship Certificate Certificate Number: Provide the date and location issued (City and State). Date Issued Location Month/Dav/Year:^/^/^ Issued City: State: Alien Registration Registration Number: Provide the date and place where the person entered theU.S.(City and State). Date EnteredUS Month/Dav/Year:-/^/Place EnteredU S City: State: Other Provide an explanation in the space below. Explanation Mother is n o t a c i t i z e n o f t h e United States but i s a c i t i z e n o f t h e UK

2^

RelationshipType: Father Full Name Last: Manning First: Brian Middle: Edward Suffix: Deceased

Generatedon 2007 10 10 00:22:35 226 Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

PRIVACY A C T I N F O R M A T I O N

^(^

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r Applicant SSN ##### (b) (6)

Page 21 o f 29 Generated Copy

Yes: { } No: { X } Date of Birth Month/Day/Year:t Country of Birth Country: UNITED STATES Country(ies) of Citizenship 1 Country: UNITED STATES
(End ot Country(ies) of Citizenship List)

Current Addr Street (b) (6) City:(b) (6)

State:(b) Country: (6) Section 15: Citizenship of Your Relatives and Associates Proof of Citizenship Status (No Entry Provided)

3-

Relationship Type: Sister Full Name Last: Major First: Casey Middle: Manning Suffix: Deceased Yes: { } No: { X } Date of Birth Monlh/Day/Year:J Country of Birth Country: UNITED STATES Country(ies) of Citizenship 1 Country; UNITED STATES
(End of Country(ies) of Citizenship List)

Current Address Street: (b) (6) City:(b) (6)

State:(b) Country: (6) Section 15: Citizenship of Your Relatives and Associates Proof of Citizenship Status (No Entry Provided)
(End of List)

Generated

on 2 0 0 7 - 1 0 - 1 0

00 : 2 2 : 3 5 . 2 2 5

PRIVACY A C T

INFORMATION

Data Hash Code: 8 4 2 0 8 e d e 2 5 b 8 8 1 5 1 2 d 8 f c f 4 a f 8 f f 5 e e e 0 5 d l 9 8 8 a

^7

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN (b) (6)

Page 22 o f 29 Generated Copy

Section 16: Your Military History


Answer the following questions. a. Have you served in the United States military? Yes: { } No: { X } b. Have you served in the United States Merchant Marine? Yes: { } No: { X } List all of your military service below, including service in Reserve, National Guard, and U.S. Merchant Marine. If you had a break in service, each separate period should be listed. If your service was with other than the U.S. Armed Forces, identify the country for which you served. Military History ( Not Applicable: { x } ) (No Entry Provided)

Section 17: Your Foreign Activities


Answer ihe following questions. a. Do you have any foreign property, business connections, or financial interests? Yes: { } No: { X } b. Are you now or have you ever been employed by or acted as a consultant for a foreign government, firm or agency? Yes: { } No: { X } c. Have you ever had any contact with a foreign government, its establishments (embassies or consulates), or its representatives, whether inside or outside the U.S., other than on official U.S. Government business? (Does not include routine visa applications and border crossing contacts.) Yes: { } No: { X } d. In the last 7 years, have you had an active passport that was issued by a foreign government? Yes: { } No: { X } If you answered " Yes"' to one or more of the questions above, provide a detailed entry for each period of foreign activity.

(No Entry Provided)

Section 18: Foreign Countries You Have Visited


List foreign countries you have visited, except on travel under official Government orders, working back 7 years. ( Travel as a
G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0 00:22:35.226 PRIVACY ACT INFORMATION

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

20

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665539 f o r A p p l i c a n t SSN MMMV^9(b) (6)

Page 23 o f 29 Generated Copy

dependent or contractor must be listed.)Include short trips to Canada or Mexico. If you lived nearaborder and have made short(one day or less) trips to the neighboring country, you do not need to list each trip. Do not repeat travel covered in sections 9,10, o r l l . Foreign Travels ( Not Applicable: { } ) 1 Indicate the purpose of your visit. If you lived near a border and have made short (one day or less) trips to the neighboring country, provide the time period, purpose, country and check the " Many Short Trips" box. Dates of Activity From (Month/Year): 03/2006 To (Month/Year): 03/2006 Purpose of Visit Business: { } Pleasure: { x } Education: { } Other: { } Countries Visited 1 Country: UNITED KINGDOM
(End of Countries Visited List)

Many Short Trips: { } ^ Dates of Activity From (Month/Year): 11/2001 To (Month/Year): 09/2005 Purpose of Visit Business: { } Pleasure: { } Education: { } Other: { x } Countries Visited Country: UNITED KINGDOM
(End ol Countries Visited List)

Many Short Trips: { } 3 Dates of Activity From (Month/Year): 10/2004 To (Month/Year): 10/2004 Purpose of Visit Business: { } Pleasure: { x } Education: { } Other: { } Countries Visited 1Country: JAPAN
(End of Countries Visited List)

Generated

on

2007-10-10

00 : 2 2 : 3 5 . 2 2 6

PRIVACY A C T

INFORMATION

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN #MMN#(b) (6)

Page 24 of 29 Generated Copy

Many Short Trips: { }


(EndofUst)

Section 19: Your Military Record


Answer the following question. Have you ever received other than an honorable discharge from the military? Yes: { } No: { X }
If "Yes," provide the date of discharge and type of discharge below.

Date Of Discharge Month/Year: - 1 ~ Type of Discharge:

Section 20: Your Selective Service Record


Answer the foltowing question. a. Are you a male born after December 31,1959? Yes: { X } No: { }

If you answered "Yes" to question a, answer the following question. b. Have you registered with the Selective Service System? Yes: { X } No: { }
If you answered "Yes"" to question b, provide your registration number. If "No," show the reason for your legal exemption.

Registration Number: (b) (6) Legal Exemption Explanation ( I Do Not Know: { } )

Section 21: Your Medical Record


Answer the following question. In the last 7 years, have you consulted with a mental health professional (psychiatrist, psychologist.

G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0

00:22:35.226

PRIVACY ACT INFORMATION

Data Hash Code:

84208ede25b881512d8fcf4af8ff5eee05dl988a

30

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN^1^111^11^^ (b) (6)

Page 25 o f 29 Generated Copy

counselor,etc.)or have you consulted with another health care provider aboutamental health related condition? Yes:^^No:^x^ If you answered''Yes,"provide an entry for each treatment to report,unless the consultation(s)invoIved only maritaL family, or grief counseling, not related to violence by you. (^/Vo^^t^P^oiB/ded)

Section 22: Your Employment Record


Answerthefollowingquestion Has anyofthe following happened to you in the Iast7years? t. 2. 3. 4 5 Fired fromajob. Ouitajob after being told you'd be fired Leftajob by mutual agreement following allegations of misconducL Leftajob by mutual agreement following allegations of unsatisfactory performance Leftajob for other reasons under unfavorable circumstances

Yes:^^No:^x^
If you answered "Yes,"provideadetailed entry for each occurrence to report.

(^/Vo^nfry/^r^ov/c(ed)

Section 23: Your Police Record


For this item, report information regardless of whether the record in your case has been''sealed"or otherwise stricken from the court record. The single exception to this requirement is for certain convictions under the Federal Controlled Substances Act for which the couri issued an expungement orderunderthe authority of21 U.S.C. 844 or 18 u s e . 3607. Answerthefollowingquestions a. Have you ever been charged with or convicted of any felony offense? (Include those unCer Uniform Code of Military Justice) Yes:^^No:^x^ b Have you ever been charged with or convicted ofafirearms or explosives offense? Yes:^^No:^x^ c Are there currently any Charges pending against you for any criminal offense? Yes:^^No:^x^ d. Have you ever been charged with or convicted of any offense(s) related to alcohol or drugs? Yes:^^No:^x^ Generated on 2007-10-10 00:22: 35.226 Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a PRIVACY A C T I N F O R M A T I O N

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r Applicant SSN^il1l^11^l1111ll (b) (6)

Page 26 o f 29 Generated Copy

e. In the Iast7years,have you been subjectto court martial or other disciplinary proceedings underthe Uniform Code of Military Justice? (Include non judicial. Captain's mast, etc.) Yes:^^No:^x^ f In the Iast7years, have you been arrested for,charged with,or convictedof any offense(s) not listed in response to a, b,c,d,oreaboye? (Leave out traffic fines of less than ^150 unless the violation was alcohol or drug related )

Yes:^^No:^x^
If you answered "Yes"to a, b,c,d,e,orfabove, provide an entry for each occurrence to report. (^O^B^^^^FOiB/ded)

Section 24: Your ^se of Illegal Orugs and Orug Activity


The following questions pertain to the illegal use of drugs or drug activity. You are required to answer the questions fully and truthfully, and your failure to do so could be grounds for an adverse employment decision or action against you, but neither your truthful responses nor information derived from your responses will be used as evidence against you in any subsequent criminal proceeding. Answerthefollowingquestions a. Since the age o f t ^ o r in the Iast7years.whichever is shorter.have you illegally used any controlled substance, for example, marijuana, cocaine, crack cocaine, hashish, narcotics (opium, morphine, codeine, heroin, etc ), amphetamines, depressants (barbiturates, methaqualone, tranquilizers, etc ), hallucinogenics (LSD, PCP, etc), orprescription drugs? Yes:^^No:^x^ b Have you ^ y ^ illegally usedacontrolled substance while employed asalaw enforcement officer, prosecutor,or courtroom official: while possessingasecurity clearance: or while inaposition directly and immediately affecting the public safety? Yes:^^No:^x^ c. In the Iast7years,have you been involved in the illegal purchase,manufacture,trafficking, production, transfer,shipping,receiving, or sale of any narcotic, depressant, stimulanL hallucinogen,or cannabis for your own intended profit or that of another? Yes:^^No:^x^

If you answered "Yes"toaorbabove, provide an entry for each controlled substance orprescription drug used.

^^oE^r^fr^^rov^ded)

Section 25: Your l^se of Alcohol


Answerthefollowingquestion Generatedon 2007 10 10 00 :22 35.226 Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a PRIVACY A C T I N F O R M A T I O N

^2

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN 4HMHI-(b) (6)

Page 27 of 29 Generated Copy

In the last 7 years, has your use of alcoholic beverages (such as liquor, beer, wine) resulted in any alcohol-related treatment or counseling (such as for alcohol abuse or alcoholism)? Yes: { } No: { X } If you answered "Yes," provide an entry for each Ureatment to report. Do not repeat information reported in response to section 21. (No Entry Provided)

Section 2^: Your Investigations Record


Answerthefollowingquestion. a.Has the United States Government ever investigated your background and/or granted youasecurity clearance? If your response is "NoB'or you don't know or can't recall if you were investigated and cleared, check the'^No^^ box. Yes:^^No:^x^ If you answered "Yes," provide the requested information below. (No Entry Provided) Answer the following question. b. To your knowledge, have you ever had a clearance or access authorization denied, suspended, or revoked, or have you ever been debarred from government employment? (An administrative downgrade or termination of a security clearance is not a revocation.) Yes: { } No: { X } If you answered "Yes," provide the requested information below.

(No Entry Provided)

Section 27: Your Financial Record


Answer the following questions. a. In the last 7 years, have you filed a petition under any chapter of the bankruptcy code (to include Chapter 13)?

Yes: { } No: { X }
b. In the last 7 years, have you had your wages garnished or had any property repossessed for any reason?

Yes: { } No: { X }
Generated on 2007-10-10 00:22:35.226 Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a PRIVACY ACT INFORMATION

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN ^1^ilill1^^1(b) (6)

Page 28 of 29 Generated Copy

c. In the Iast7years,have you hadalien placed against your propertyforfailing to pay taxes or other debts? Yes:^^No:^x^ d In the Iasl7years,have you had any judgments against you that have not been paid? Yes:^^No:^x^ If you answered "Yes" to a, b,c, or d, provide an entry for each occurrence to report. (^^o^^tr^P^oiB/dec^

Section 28: Your Financial Oelinguencies


Answerthefollowingquestions a. In the Iast7years,have you been over 180 days delinquent on any debt(s)? Yes:^^No:^x^ b Are you currently over90 days delinquent on any debt(s)? Yes:^^No:^X^ If you answered "Yes" toaorb, provide an entry for each occurrence to report.

(/VoE/7tr^^^oi^^dec^

Section 29: Pul^lic Record Civil Court Actions


Answerthefollowingquestion In the Iast7years,have you beenaparty to any public record civil court actions not listed elsewhere on this form? Yes:^^No:^x^ If you answered "Yes,"provide the information about each public record civil court action.

(^oE^r^f^^^oiB^ded)

Section 30: Your Association Record


Answerthefollowingquestions. a Have you ever been an officer oramember or madeacontribution to an organization dedicated to the
Generatedon 2007 10 10 00 : 2 2 : 3 5 . 2 2 6 PRIVACY ACT INFORMATION

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP) I n v e s t i g a t i o n Request #2655539 f o r A p p l i c a n t SSN #####-9(b)

Page 29 o f 29 Generated Copy

(6)
violent overthrow of the United States Government and which engages in illegal activities to that end, knowing that the organization engages in such activities with the specific intent to further such activities? Yes:^^No:^x^ b. Have you ever knowingly engaged in any acts or activities designed to overthrow the United States Government by force? Yes:^^No:^x^

Ifyouanswered "Yes" toaorb, explain in the space below.

Explanation

Additional Comments
Use the space below to continue answers to all otheritems and any information you would like to add. Additional Comments

CertificatioiT^lTat^My^Answers^ATe^True
My statements on this form, and any attachments to it, are true, complete, and correct to die best of my knowledge and belief and are made in good faith.Iunderstandthataknowing and willful false statement on this form can be punished by fine or imprisonment or bodi. (See section 1001 of title 18, United States Code). Signature (^^^^n^^^r^^^ (Signature on file-see investigation Request ^ 6 6 5 6 3 9 Signature Forms) Date

Expected attachments
If you need to submit additional documents with your request, giveabrief title or description of each attachment you plan to provide(eg.,map with directions to residence).Providing this list is optional; however, doing so may assist the processing offices in accounting for all attachments.Include each attachmcntspage count.(One sheet widi content on front and back is two pages.) Write your social security number and Ihe Investigation Request number on the margin of each attachment you submit. Expected Attachments ^^c^^t^^^ci^^d^d)

G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0

00 : 2 2 : 3 5 . 2 2 6

PRIVACY ACT INFORMATION

Data Hash Code: 8 4 2 0 8 e d e 2 5 b 8 8 1 5 1 2 d 8 f c f 4 a f 8 f f 5 e e e 0 5 d l 9 8 8 a

3s'

standard Form 86 Format Revised September 1995 U.S. Office of Personnel Management 5 CFR Part 731, 732, and 736

Form approved: O.M.B. No. 3206-0005 NSN 7540-00-634-4036 86-111

UNITED STATES OF AMERICA


After completing Parts 1 and 2 of this form and any attachments, you should review your answers to all questions to make sure the f o r m is complete and accurate, and then sign and date the f o l l o w i n g certification and sign and date the release o n Page 10.

Certification That My Answers Are True


My Statements on this form, and any attachments to it, are tme, complete, and correct to the best of my knowledge and belief and are made in good faith. I understand that a knowing and willful false statement on this form can be punished by fine or imprisonment or txith. (See Section 1001 of title 18, United States Code).
Signature (Sign in ink) Full Name (Type or Print Legibly) Manning, Bradley E Date Signed

jO
Social Security Number

20070926

MHI-9(b)
(6)

30

Standard Form 86 Format Revised September 1995 U.S. Office of Personnel Management 5 CFR Pan 731, 732, and 736

Ii
08F18704

Form approved: O.M.B. No. 3206-0005 NSN 754040-634-4036 86-111

UNITED STATES OF AMERICA


AUTHORIZATION FOR RELEASE OF INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink. I Authorize any investigator, special agent, or other duly accredited representative of the authorized Federal agency conducting my background investigation, to obtain any information relating to my activities from individuals, schools, residential management agents, employers, criminal justice agencies, credit bureaus, consumer reporting agencies, collection agencies, retail business establishments, or other sources of information. This information may include, but is not limited to, my academic, residential, achievement, performance, attendance, disciplinary, employment history, criminal history record information, and financial and credit information. I authorize the Federal agency conducting my investigation to disclose the record of my background investigation to the requesting agency for the purpose of making a determination of suitability or eligibility for a security clearance. I Understand that, for financial or lending institutions, medical institutions, hospitals, health care professionals, and other sources of information, a separate specific release will be needed, and I may be contacted for such a release at a later date. Where a separate release is requested for information relating to mental health treatment or counseling, the release will contain a list of the specific questions, relevant to the job description, which the doctor or therapist will tie asked. I Further Authorize any investigator, special agent, or other duly accredited representative of the U.S. Office of Personnel Management, the Federal Bureau of Investigation, the Department of Defense, the Defense Investigative -Service, and any other authorized fedeial aguncy, to request cnminai record information atxxit me from criminal justice agencies for the purpose of determining my eligibility for access to classified information and/or for assignment to, or retentton in, a sensitive National Security position, in accordance with 5 U.S.C. 9101. I understand that I may request a copy of such records as may be available to me under the law. I Authorize custodians of records and sources of information pertaining to me to release such information upon request of the investigator, special agent, or other duly accredited representative of any Federal agency authorized atx3ve regardless of any previous agreertient to the contrary. I Understand that the information released by records custodians and sources of information is for official use by the Federal Government only for the purposes provided in this Standard Form 86, and that it may be redisclosed by the Government only as authorized by law. Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization is valid for five (5) years from the date signed or upon termination of my affiliation with the Federal Government, whichever is sooner. Read, sign and date the release on the next page if you answered "Yes" to question 21.

Signature (Sign in ink)

Full Name (Type or Print Legibly) Manning, Bradley E

Date Signed 20070926 Social Security Number

other Names Used

4Nky(b)
(6)
Current Address (Street, City) State ZIP Code Home Telephone Number (Include Area Code)

(b) (6)

(b) (6)

(b) (6)

(b) (6)

T ' r\ "7 T T n ir L_ !v 'V L i- v ^

^7

Slandanj Form 36 Format Revised Septemtier 1995 U.S. Office of Personnel Management 5 CFR Part 731, 732, and 736

Form approved: O.M.B. No. 3206-0005 NSN 7540-00-634-4036 86-111

UNITED STATES OF AMERICA


AUTHORIZATION FOR RELEASE OF INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink. I Authorize any investigator, special agent, or other duly accredited representative of the authorized Federal agency conducting my background investigation, to obtain any information relating to my activities from individuals, schools, residential management agents, employers, criminal justice agencies, credit bureaus, consumer reporting agencies, collection agencies, retail business establishments, or other sources of information. This information may include, but is not limited to, my academic, residential, achievement, performance, attendance, disciplinary, employment history, criminal history record information, and financial and credit information. I authorize the Federal agency conducting my investigation to disclose the record of my background investigation to the requesting agency for the purpose of making a determination of suitability or eligibility for a security clearance. 1 Understand that, for financial or lending institutions, medical institutions, hospitals, health care professionals, and other sources of information, a separate specific release will be needed, and I may be contacted for such a release at a later date. Where a separate release is requested for information relating to mental health treatment or counseling, the release will contain a list of the specific questions, relevant to the job description, which the doctor or therapist will be asked. 1 Further Authorize any investigator, special agent, or other duly accredited representative of the U.S. Office of Personnel Management, the Federal Bureau of Investigation, the Department of Defense, the Defense Investigative Service, and any other authorized Federal agency, to request criminal record information about me from criminal justice agencies for the purpose of determining my eligibility for access to classified infomiation and/or for assignment to, or retention in, a sensitive National Security position, in accordance with 5 U.S.C. 9101. I understand that I may request a copy of such records as may be available to me under the law. 1 Authorize custodians of records and sources of information pertaining to me to release such information upon request of the investigator, special agent, or other duly accredited representative of any Federal agency authorized above regardless of any previous agreement to the contrary. I Understand that the information released by records custodians and sources of information is for official use by the Federal Government only for the purposes provided in this Standard Form 86, and that it may be redisclosed by the Government only as authorized by law. Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization is valid for five (5) years from the date signed or upon termination of my affiliation with the Federal Government, whichever is sooner. Read, sign and date the release on the next page if you answered "Yes" to question 21.

Signature (Sign in ink)

Full Name (Type or Print Legibly) Manning, Bradley E

Date Signed 20070926 Social Security Number

/:^^==^--^s^
other Names Used Current Address (Street, City)

(b) (6)
Home Telephone Number (Include Area Code)

State

ZIP Code

(b) (6)

(b) (6)

(b) (6)

(b) (6)

30

Standard Form 86 Format Revised September 1995 U.S. Office of Personnel Management 5 CFR Parts 731, 732. and 736

08F18704

Form approved: O.M.B. No. 3206-0005 NSN 7540-00-634-4036 86-111

UNITED STATES OF AMERICA


AUTHORIZATION FOR RELEASE OF MEDICAL INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink. Instructions for Completing this Release This is a release for the investigator to ask your health practitioner(s) the three questions below conceming your mental health consultations. Your signature will allow the practitioner(s) to answer only these questions. I am seeking assignment to or retentbn in a position with the Federal government which requires access to classified national security information or special nuclear information or material. As part of the clearance process, I hereby authorize the Investigator, special agent, or duly accredited representative of the authorized Federal agency conducting my background investigation, to obtain the following information relating to my mental health consultations:

Does the person under investigation have a condition or treatment that could impair his/her judgement or reliability, particulady in the context of safeguarding classified national security information or special nuclear information or material?

If so, please describe the nature of the condition and the extent and duration of the impairment or treatment. What is the prognosis?

I understand the information released pursuant to this release is for use by the Federal Government only for purposes provided in the Standard Form 86 and that it may be redisclosed by the Government only as authorized by law. Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization is valid for 1 year from the date signed or upon termination of my affiliation with the Federal Government, whichever is sooner.
Signature (Sign in ink) Full Name (Type or Print Legibly) Dale Signed 20070926 Social Security Number # # # . 9 (b)

^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
other Names Used

^ ^ ^ ^

Manning, BradioyE

(6)
CurrentAddress (Street,City) Home Telephone Number (Include Area Code)

State

ZIP Code

(b) (6)

(b ) (6)

(b) (6)

(b) (6)

I T > r\ r\ -r T T r^, T ' L yL ' < j ' < j " v "

e#

standard Form 86 Format Revised September 1995 U.S. Office of Personnel Management 5 CFR Parts 731, 732, and 736

Form approved:
O.M.B. No. 3206-0005 NSN 7540-00-634-4036 86-111

UNITEDSTATESOF AMERICA
AUTHORIZATION FORRELEASEOFMEOICALINFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink. lnstrut:^tions for Completing t h i ^ release This isarelease for the investigator to ask your health practitioner(s)the three questions below concerning your mental health consultations. YoLir signature will allow the practitioner^s)to answer onlythese questions. l a m seeking assignmentto or retention inaposition with the Federal govemmentwhich requires access to classified nationalsecurityinformationor special nuclear information or material. As partof theclearanceprocess, Iherel^^ aut1^orizetheinvestigator,specialagent,ordulyaccreditedrepresentativeoftheauthorizedFederalagencyconducting mybackground investigation, toobtainthefollowing infomnation relatingtomymentalhealthconsultations:

Doesthe person under investigation haveaconditionortreatmentthat could impairhis/herjudgementor reliability, particularly in the context of safeguarding classified national security information or special nuclear information or material?

If so, please describe the nature of the condition and the extent and duration of the impairment or treatment.

Whatistheprognosis?

lunderstand the information released pursuant to this release is for use by the Federal Government only for purposes provided in the Standard Fonn 86 and that it may be redisclosed by the Government only as authorized by law. Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization is valid f o r l y e a r from the date signed or upon termination of my affiliation with the Federal Government, whichever is sooner.
Signature (Sign in ink) Full Name (Type or Print Legibly) Manning, Bradley E Date Signed

^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
other Names Used

20070926
Social Security Number

# # # 9 (b)

(6)

Cun-ent Address (Street, City)

State

ZlPCode

Home Telephone Number (Include Area Code)

(b) (6)

(b) (6)

(b) (6)

(b) (6)

N A M E M A N N I N G , B R A D L E YE D W A R D

jCASE # 08F18704

IPAGE 1

D A T E SO F INVESTIGATION 10/16/07 - 10/25/07 j SID N075 | O R G ID C39 j R E P O R T # 01

TESTIMONIES

ITEM: 018 S O U R C E : 001 N A M E P E R S O N N E L TRAINEE DIVISION, BUILDING 470, F T . L E O N A R DW O O T , M O 65473 P E R S O N N E L R E C O R D P R O V I D E RT C MB E R E N , B T ASSIQIMENT C L E R K A C C E P T A B L E N A M E VERIFIED S S N VERIFIED D O B VERIFIED P O B VERIFIED E M P L O Y M E N T D A T E S 10/07 - 10/07 S T A T U S FULL TIME W O R K S I T EA D D R E S S C O C - 82 B A R R A C K S , F T . L E O N A R DW O O D , M O 65473 POSITION TRAINEE REHIRE S T A T U SN O T S H O W N E M P L O Y M E N TS T A T U SC H A N G EN O T APPLICABLE

ITEM: 019 S O U R C E : 002 N A M E B A R R A C K S M A N A G E M E N T , C O M M U N I T Y SERVICE C E N T E R , BUILDING 470, F T . L E O N A R D WOO), M O 65473 R E N T A L R E C O R D P R O V I D E R JUANITA LACK, LEAD I N S P E C T O R N O R E C O R D TRAINEES A R ER E Q U I R E DT O LIVE IN T H EB A R R A C K S , N OR E S I D E N C E R E C O R D S A R E MAINTAINED. ITEM: 019 INVESTIGATOR'S N O T E S O U R C E : 003

TRAINEES A R ER E Q U I R E DT O LIVE IN T H EB A R R A C K S WHILE IN BASIC TRAINING. THIS IS A L S OT H ES A M E LOCATION AS T H E TRAINEES E M P L O Y M E N T . T H E TRAINEES E M P L O Y M E N T R E C O R D LOCATION IS U N D E R S T O O DT OB ET H ES A M E A S T H E TRAINEES RESIDENTIAL LOCATIW.

ITEM: 020 S O U R C E : 004 N A M E MILITARY P E R S O N N E L DIVISION, BUILDING 470, F T . L E O N A R DW O O D , M O 65473 MILITARY R E C O R D OBTAINED B Y INVESTIGATOR A C C E P T A B L E N A M E VERIFIED SSN VERIFIED D O B VERIFIED P O B VERIFIED

B R A N C H O F SERVICE U S A D A T EE N T E R E D SERVICE 10/07 R E P O R T O F INVESTIGATION P R O P E R T Y O F U.S. OFFICE O FP E R S O N N E L M A N A G E M E N T (IS) W ,W A S H I N G T O N , D . C . 20415-4000 1900 E ST, N

N A M E MANNING, B R A D L E YE D W A R D

| C A S E # 08F18704

IPAGE 2

D A T E SO F INVESTIGATION 10/16/07 - 10/25/07 j SID N075 | O R G ID C39 | R E P O R T# 1

D U T YS T A T U S ACTIVE

G R A D E El

**** E N DO FR E P O R T ** TRANSMITTED: 10/25/07 PRINTED: 01/16/08

N A M E MANNING, B R A D L E Y

ICASEII08F18704

^ P A G E 1

D A T E SO F INVESTIGATION 01/04/08-01/09/08 | SIDQ394 IORGIDC48 | REPORTHOl

TESTIMONIES ITEM: 030 INVESTIGATOR'S N O T E S O U R C E : 001

A T T E M P T ST OC O N T A C T P A D E NR A D F O R D , IN P E R S O N , A N D VIA TELEPHONE,MET WITH NEGATIVE RESULTS.

ITEM: 033 N A M E BRIAN E.MANNING, P R O G R A M M A N A G E R (b) (6), (b) (7)(C)

S O U R C E : 002 O K

(b)
T E L E P H O N E T E S T I M O N Y (6), ISSUE(S) 11 (7) P R I M A R Y ASSOCIATION F A T H E R (C) A V E R A G EE K T E N T O FC O N T A C T R E G U L A R S P A NO FC O N T A C T 12/17/1987 T O P R E S E N T RECO^NDS BRIAN M A N N I N G INDICATED HIS SON, B R A D L E Y MANNING, LIVED WITH HIM FRCt^ BIRTH UNTIL 2000, E^CT D A T EN O T RECALLED. BRIAN M A N N I N G INDICATED H E O T H E RW E R E D I V O R C E D A N D HIS E^-WIFE W A S FRC^ W A L E S . A N DB R A D L E Y ' SM W H E N T H E Y DIVORCED,BRADLEY M A N N I N GM O V E DT OW A L E S WITH HIS I^THER IN 2000,WHERE H E LIVED UNTIL 2005, E K A C TD A T EN O T RECALLED. BRIAN M A N N I N G INDICATED B R A D L E YM A N N I N G LIVED WITH HIM FRC^ T H E TIME B R A D L E Y M O V E D B A C KT OT H E UNITED S T A T E S UNTIL 04/2006,WHEN B R A D L E YM O V E D T O TULSA, O K L A H O M A , W H E R E B R A D L E YW O R K E D F O R INCREDIBLE P I ^ ^ . BRIAN M A N N I N G INDICATED B R A D L E YM O V E DT O MARYLANDIN 2006,EKACT D A T E S N O T RECALLED, T O LIVE WITH HIS AUNT, D E B O R A H M A N N I N G V A N A L S T Y N E .M A N N I N G INDICATED B R A D L E Y ATTENDEDA^IOR C O L L E G E IN M A R Y L A N D , E K A C TN A M E O F INSTITUTION N O T RECALLED. B R A D L E YM A N N I N GW A SU N E M P L O Y E DD U R I N G THIS PERIOD, ASHE WASAFULLTIME S T U D E N T , UNTIL H EC O I N E DT H E MILITARY, E^CT D A T EN O T RECALLED. BRIAN M A N N I N G INDICATED H E MAINTAINS C O M M U N I C A T I O N S WITH B R A D L E Y , VIA T E L E P H O N E , E V E R YT W OW E E K S O N A V E R A G E . 8^IANMANNINCINDICAT^t^BRA0t,EYMANNINCCRADt^ATE0FRCM HIGH S C H O O L IN WALES,UNITED KIN^^X^, 2005. M A N N I N GA L S OT R A V E L E DT O CHINA, E K A C T D A T E SN O T RECALLED,WITH HIS CLASS, WHILE G O I N GT OS C H O O L IN W A L E S . N OO T H E R DETAILS P R O V I D E D . B R A D L E YM A N N I N G IS C U R R E N T L Y IN B O O T C A M P , E K A C T LOCATION U N K N O W N . B R A D L E YM A N N I N GG R A D U A T E DF R O M HIGH S C H O O L IN WALES,UNITED K I N ^ ^ X ^ M . B R A D L E YM A N N I N G ' S INTEREST INCLUDE MUSIC A N DC ^ ^ t P U T E R S . BRIAN M A N N I N G INDICATED B R A D L E YM A N N I N GD O E S N O TG E TA L O N G WITH HIS R E P O R T O F INVESTIGATION P R O P E R T Y OFU.S. OFFICE O FP E R S O N N E LM A N A G E M E N T (IS) 1900EST,NW,WASHINGTON,D.C. 20415-4000

(b)

N A M E MANNING, B R A D L E Y

|CASElt08F18704

^ P A G E 2

R G ID 048 | REPORTS 1 DATES O F INVESTIGATION 01/04/08-01/09/08 | SIDQ394 1 O S T E P M O T H E R , A N D T H EF E E L H ^ G SA R EM U T U A L . N OO T H E R DETAILS PROVIDED. 8RIAN M A N N I N G IS N O TA W A R E O F ANYTHING IN B R A D L E YM A N N I N G ' SC H A R A C T E R A C K G R O U N D WHICH C O U L DS E R V EA ST H E BASIS F O R BLACKMAIL O R O RB C O E R C I O N . 1T^: 033 INSTIGATOR'S N O T E S O U R C E : 003

01/09/2008,BRIAN M A N N I N GW A S INTERVIEWED VIA T E L E P H O N E , A SP E R HIS REQUEST,DUE T O HIS S C H E D U L E . ITEM: 033 INVESTIGATOR'SNOTE S O U R C E : 004

BRIAN M A N N I N G IS St^^CT, B R A D L E YM A N N I N G ' SF A T H E R . F A T H E R W A S INTERVIEWED, AS F A T H E RW A S LISTED VERIFIER F O R LISTED PERIOD O F U N E M P L O Y M E N T .

ITEM: 034 N A M E(b) (6)

,W A L M A R T ASSOCIATE,(b) (6)

S O U R C E : 005 ,

(b) (6)
ISSUE(S) 11
PRIMARY ASSOCIATION FRIEND AVERAGE E^tTENT OF CONTACT REGULAR SPAN OF CONTACT 1992 TO PRESENT RECOI^NDS

(b) (6)

M E TB R A D L E YM A N N I N G IN KINDERGARTEN, 1992. (b) A N t ^ M A N N I N GA T T E N D E DS C H O O L T H R O U G HT H E EIGHTH GRADEIN C R E S C E N T , (6) OKLAHC^. (b) INDICATED M A N N I N GM O V E DT OW A L E S , UNITED KIN^OM,DUE T O HIS P A R E N T S DIVORCE, A N O HIS M O T H E R BEING FR^ W A L E S (b) (6) (6) MAINTAINEDINFREQUENT C O N T A C T WITH MANNING,VIA E-MAIL,WHILE M A N N I N G LIVEDIN W A L E S , E X A C T NUMBEROFE-MAILS N O T RECALLED. M A N N I N G M O V E D BACKTOOKLAHC^, 11/2005, ANDLIVEO WITH HIS F A T H E R . (b) INDICATED F R E Q U E N C Y OF C O N T A C T O N E TIME P E RW E E K , UNTIL M A N N I N GM O V E DT O TULSA, (6) OKLAHO^. (b) SINDICATED M A N N I N G MOVEDIN WITH(b) F O R APPROXIMATELY H R E ET OF O U R W E E K S B E T W E E N LIVING N D (6) T (6)WITH HIS FATHER A M O V I N GT O TULSA, A N DF R E Q U E N C Y OF C O N T A C TI N C R E A S E DT O DAILY C O N T A C T DURING THEPERIOD. (b) S INDICATEDHE W A S LIVINGINTLILSA AT THETIME A N DM A N N I N G LIVED WITH EC O U L D FIND HIS O W N P L A C ET O LIVE. (6) HIM UNTIL H M A N N I N GA N D(b) W O R K E D AT INCREDIBLE P I ^ ^ F O RA P P R O X I M A T E L Y T W O M O N T H S . (b) (6) S INDICATED M A N N I N G LEFT INCREDIBLE PI^^A A N D TOOKA^OB WITH FYE, 06/2006. SOCIAL C^ACT CONSISTED O F EATING DINNER A N D (6) W A T C H I N G TELEVISION, T H R E ET OF O U R TIMES P E RW E E K . M A N N I N G^ ^ O I N E DT H E MILITARY 11/2007, A N DC O N T A C T H A SB E E N LIMITED,DUE T OM A N N I N G BEING IN B O O T C A M P . INDICATED M A N N I N G LIVED IN WALES,UNITED K I N G D O M , A N D T R A V E L E D R E P O R T O F INVESTIGATION P R O P E R T YO F U.S. OFFICE O FP E R S O N N E LM A N A G E M E N T (IS) 1900EST,NW,WASHINGTON,DC. 20415-4000

(b) (6)

N A M E M A N N I N G , B R A D L E Y

|CASE||08F18704

IPAGE 3

D A T E SO F INVESTIGATION 01/04/08-01/09/08 1 SIDQ394 IORGIDC48 | REPORTS 1 T H R O U G H O U T T H E UNITED KIN^OM AS W E L L AS E U R O P E , T O INCLUDE F R A N C E . M A N N I N GH A S ALSO T R A V E L E D T OT O K Y O , ^ A P A N . M A N N I N G IS C U R R E N T L Y SERVING IN T H E UNITED STATES A R M Y . M A N N I N G ' S INTEREST INCLUDE MUSIC A N D C ^ ^ ^ t P U T E R S . O TA W A R E O F ANYTHINGIN M A N N I N G ' SC H A R A C T E RO R BACKGROU^ (b) IS N W H I C HC O U L DS E R V EA ST H E BASIS F O R BLACKMAIL O RC O E R C I O N . (6) ^^^^ E N DO FR E P O R T ^^^^ TRANSMITTED: 01/09/08 PRINTED: 01/16/08

N A M E MANNING, B R A D L E YE D W A R D

1CASEII08F18704

IPAGE 1

D A T E SO F INVESTIGATION 10/22/07 - 11/29/07 | SIDT393 IORGIDW30 | R E P O R T 1103

TESTIMONIES

ITEM: 002 N A M E(b) (6), (b) (7) ,REALTOR (b) (6), (b) (7)(C) INTERVIEWED AT 7821 T U C K E R M A N LANE, POT^C,MD 20854 (C) A C C E P T A B L E P R I M A R Y ASSOCIATION N E I G H B O R A V E R A G EE X T E N TO F C^ACT R E G U L A R S P A NO FC O N T A C TA P P R O X . 2006 T O P R E S E N T RECOt^NDS

S O U R C E : 001

(b) (6), FIRST MET "BRADLEY" APPROXIMATELY IN 2006 W H E N THE SUB^CT MOVEDINTO O O R T O T H E (b) (7)(C) HIS AUNT'S HOt^SE, WHICH IS LOCATED NEXT D
S O U R C E ' S H O M E , THE S O U R C E A N DT H E SUB^CT H A V EN E I G H B O R L YT Y P E O F C O N T A C T , T H ES O U R C E S E E ST H E SUB^CT^ADAILY BASIS, A N D ONCEAWEEK H A V ES M A L L C^^^RSATIONS WITH THE SUB^CT. T H ES O U R C E A N DT H E SUB^CT H A V EH A DN O SOCIAL C O N T A C T WITH E A C HO T H E R . T H E R EH A V EB E E NN O B R E A K S INTHECONTACTBETWEENTHE S O t ^ R C E ANDTHE SUB^CT. THE SUB^CT RESIDES AT (b) (6), (b) (7)(C) . T H E SUB^CT A T T E N D E D M O N T G C ^ R YC O L L E G E , A N D DID N O TG R A D U A T E FRO^ T H E R E . THE SUB^CT W A SE M P L O Y E D AT A B A C R O M B I E A N D FITCH (DISCREPANT)AND S T A R B U C K S .T H E SUB^CT M A YH A V E COINED THE A R M Y . T H ES O U R C E THINKS T H A T THE SUB^CTEN^YS W O R K I N GO NC O M P U T E R S A N D LISTENING TO MUSIC IN HIS F R E E TIME. T H ES O U R C E H A SN OK N O W L E D G E O FT H E SUB^CT'SFOREI^ T R A V E L ACTIVITIES. THEREIS N O T H I N G IN THE SUB^CT'S B A C K G R O U N D T H A T WOt^ LEAVE HIM SUSCEPTIBLE TO BLACKMAIL O R C O E R C I O N .

ITEM: 002 N A M E(b) (6), (b) (7)

S O U R C E : 002 G E N E R A LC O N T R A C T O R /H^ I M P R O V E M E N T S (b) (6), (b) (7)

(b) (6), (b) (7)(C) (C)


A C C E P T A B L E P R I M A R Y ASSOCIATION N E I G H B O R A V E R A G EE X T E N TO FC O N T A C TM O D E R A T E S P A NO FC O N T A C T SPRING O F 2006 T OO C T O B E R 20O7 D O E S N O TK N O WW E L LE N O U G H T O RECO^ND

(C)

(b) (6), FIRST MET "BRADLEY"IN APPROXIMATELY T H E SPRING O F 2006 W H E N SUB^CTMOVEDINTO THE H O U S E N E X T D O O RT O THE S O U R C E ' S H O M E . T H E (b)THE (7)(C)
E P H E W O F THE S O U R C E ' S N E X TD O O R N E I G H B O R . T H E S O U R C E SUB^CT IS THE N A N DT H E SUB^CT H A V EH A DN E I G H B O R L YT Y P EO FC O N T A C T , SAYING H E L L O T O H ES O U R C ES A W THE SUB^CTONADAILY BASIS, E A C HO T H E R IN PASSING. T B U T REALLY O N L YH A DC O N V E R S A T I O N S WITH T H E SU^^CT O NA V E R A G E ONCEA R E P O R TO F INVESTIGATION P R O P E R T Y OFU.S. OFFICE O FP E R S O N N E LM A N A G E M E N T (IS) 1900EST,NW,WASHINGTON,D.C. 20415-4000

N A M E M A N N I N G , B R A D L E Y E D W A R D

|CASEi108F18704

| P A G E 2

D A T E SO F INVESTIGATION 10/22/07-11/29/07 | SIDT393 1 ORGIDW30 | REPORTS 3 M O N T H . T H E SUB^CT A S K E DT H ES O U R C E F O RH E L P W H E N HIS E L D E R L Y RELATIVE FELL IN T H EH O U S E A N DT H E SUB^CT C O U L DN O T LIFT H E R LIP. THIS E V E N T HAPPENEDIN S E P T E M B E RO F 2007. T H ES O U R C E A N DT H E SUB^CT H A V EH A D N O SOCIAL C O N T A C T WITH E A C HO T H E R . T H E R EH A SB E E NB R E A K S IN T H E C O N T A C T H ES O U R C E A N DT H E SUB^CT. T H E LAST C O N T A C TT H ES O U R C E H A D B E T W E E NT WITH T H E SUB^CT W A S AT T H EE N DO FS E P T E M B E RO RT H E BEGINNING O F O C T O B E R 2007. T H E SUB^CT RESIDED IN T H EH O t ^ S E N E X T DOOR(IF FACING T H ES O U R C E ' S H O M E T H EH O U S E O NT H E LEFT) TOTHESUB^CT'SHOME. T H E SUB^CT W O R K E D AT S T A R B U C K S , T H ES O U R C E H A SN OK N O W L E D G E O F W H A T T H E SUB^CT E N J O Y E D DOING IN HIS F R E E TIME. T H ES O U R C E H A DN OK N O W L E D G E O FT H E SUB^CT'S FOREI^ T R A V E L ACTIVITIES. T H ES O U R C E H A DN OK N O W L E D G E O F ANYTHING IN T H E SUB^CT'S B A C K G R O U N DT H A TW O U L DL E A V E HIM SUSCEPTIBLE T O BLACKMAIL O R C O E R C I O N .

ITEM: 005 S O U R C E : 003 N A M E MONTG^RYCOLLE, 51 M A N N A K E E STREET, SV-114, ROCKVILLE, M D 20850 EDUCATI^ R E C O R D P R O V I D E R ALICE S U M M E R S , TRANSCRIPT E V A L U A T O R SF R E L E A S E A C C E P T A B L E N A M E VERIFIED S S N VERIFIED D O B VERIFIED P O BN O T S H O W N

D A T E S O FA T T E N D A N C E N O TS H O W N C A M P U S LOCATION S A M E AS A B O V E MA^OR(S) SCIENCE-PHYSICS DEGREE(S) AWARDED^DATE N O T APPLICABLE

(PART TIME)

T H E^Y D A T E INDICATED O NT H E SUB^CT'S TRANSCRIPT W A S SPRING 2007.

ITEM: 005 S O U R C E : 004 N A M E M O N T G O M E R Y C O L L E G E , 51 M A N N A K E E STREET,MT6TH F L O O R , ROCKVILLE,MD 20850 OISCIPLINA^yR^CORO P R O V I D E R M A R L E N E PHILLIPS, S R . ADMIN. AIDE SF RELEASE. N O R E C O R D ITEM: 005 INVESTIGATOR'SNOTE S O U R C E : 005

H E SPRING 2007 S E M E S T E R AT T H E SUB^^CTWASAPARTTIME S T U D E N TF O RT M O N T G O M E R Y C O L L E G E IN ROCKVILLE,MARYLAND. ITEM:005 INVESTIGATOR'SNOTE S O U R C E : 006

R E P O R TO F INVESTIGATION P R O P E R T Y OFU.S. OFFICE O FP E R S O N N E LM A N A G E M E N T (IS) 1900EST,NW,WASHINGTON, D C 20415-4000

^7

N A M E MANNING, B R A D L E YE D W A R D

ICASEII08F18704

| P A G E 3

D A T E SO F INVESTIGATION 10/22/07 - 11/29/07 | SIDT393 | ORGIDW30 | R E P O R T 1103

E C O R DP R O V I D E R INDICATED T H A T THE 2007 SPRING S E M E S T E R F O R THE R M O N T G O M E R Y C O L L E G E , ROCKVILLE C A M P U S , R A NF R O M ^ ^ A N U A R Y 2007 T O M A Y O F 2007. ITEM: 006 INVESTIGATOR'SNOTE SOURCE:007

M P L O Y M E N T R E C O R D S A R E MAINTAINED. T H EC O M P A N Y U S E S AN N O LOCAL E AUT^TED S Y S T E MF O RE M P L O Y M E N T VERIFICATION.

S O U R C E : 008 ITEM: 006 N A M E(b) (6), (b) (7) , S T O R EM A N A G E R , 5438 W E S T B A R D AVENUE,BETHESDA,MD 20816 (C) A C C E P T A B L E P R I M A R Y ASSOCIATION SI^ERVISOR A V E R A G EE X T E N TO FC O N T A C T R E G U L A R S P A NO FC O N T A C TJ A N U A R Y 2007 T OS E P T E M B E R 2007 RECO^NDS

(b) (6), FIRST M E TB R A D M A N N I N G IN ^ ^ t A N U A R Y 2007 W H E N THE SUB^CT APPLIED FORA^OB AT S T A R B U C K S .T H ES O U R C E B E C A M ET H E SUB^CT'S SUPERVISOR. (b) (7)(C)
THE S O U R C E A N DT H E SU^CT H A DW O R K R E L A T E DC O N T A C TT W OT OF O U R TIMES AWEEK, A S B O T H THE S O U R C E A N DT H E SUB^CT W O R K E D DIFFERENT SHIFTS, S O M E O F THE SHIFTS WOt^ O V E R L A P A N DT H A T IS W H E N THE S O U R C E A N D T H E SUB^CT H A DW O R K R E L A T E DC O N T A C T . T H E SUB^CT W O R K E D ASABARISTA A N D THE S O U R C E W A ST H ES T O R EM A N A G E R . T H ES O U R C E A N DT H E SUB^CT H A D N O SOCIAL C O N T A C T OUTSIDE O F W O R K . T H E R E W E R E N O BREAK8IN THE C O N T A C T B E T W E E N THE S O U R C E A N DT H ES U B 4 I E C T AT S T A R B U C K S . T H ES O U R C E ' S LAST C O N T A C T WITH THE SUB^CT W A S AT THE E N DO FS E P T E M B E R 2007. THE SUB^CT A T T E N D E D MONTGt^RY C O L L E G E . T H E SUB^CT W A S PREVIOUSLY ^:M^L0Y^0A'^AaAO^C^^^ANt^^:^TCH(DISCREPANT) ANDAMUSICS'^RE B E F O R E S T A R B U C K S .T H ES O U R C E H A S N OK N O W L E D G E OF WHAt^THESUB^CT E N V O Y S DOINGINHISFREETIME. T H ES O U R C EH A DN OI ^ N O W L E D G EO F THE SUB^CT'S FOREIGN TRAVEL ACTIVITIES. T H E R E IS NOTHING IN THE SUB^CT'S B A C K G R O U N DT H A T W O U L D L E A V E HIM SUSCEPTIBLE T O BLACKMAIL O R C O E R C I O N .

ITEM: 006 NAME (b) (6), (b) (7) 20854 (C)

S O U R C E : 009 S T O R EM A N A G E R , 7911TUCKERMANLANE, P O T O M A C , M D

A C C E P T A B L E P R I M A R Y ASSOCIATION St^ERVISOR A V E R A G EE X T E N TO FC O N T A C T R E G U L A R S P A NO FC O N T A C TJ A N U A R Y 2007 T OS E P T E M B E R 2007 D O E S N O TK N O WW E L LE N O U G H T O R E C O M M E N D R E P O R TO F INVESTIGATION P R O P E R T Y OFU.S.OFFICE O FP E R S O N N E L M A N A G E M E N T (IS) 1900EST,NW,WASHINGTON,D.C. 20415-4000

N A M E M A N N I N G , B R A D L E YE D W A R D

iCASEii08F18704

| P A G E 4

D A T E SO F INVESTIGATION 10/22/07 - 11/29/07 1 SIDT393 |ORGIDW30 | REPORTS 3

(b) (6), FIRST M E TB R A D L E Y OR"BRAD" IN4rANUARY 2007 WHE^THESUBi^CT T A R T E D WORKATSTARBUCKS. T H ES O U R C E A N DT H E SUBilECT H A D DAILY W O R K (b) S (7)(C)
R E L A T E DC O N T A C T . T H ES O U R C E A N DT H E SUB^CT H A DN O SOCIAL C O N T A C T OUTSIDE OF W O R K . T H E R E W E R E N O BREAKSIN THE C O N T A C TB E T W E E N T H E S O U R C E A N DT H E SUB^CT. T H E SUB^CT LEFT S T A R B U C K S AT T H EE N D O F S E P T E M B E RT O ^OIN T H E UNITED S T A T E S A R M Y . T H E SUB^CT A T T E N D E D MONTG^RY C O L L E G E BUT DID N O TG R A D U A T E . T H E SUB^CT W A SE M P L O Y E D AT S T A R B U C K S . T H E SUB^CTISIN T H E UNITED S T A T E S A R M Y . T H E SUB^CT E N V O Y SW O R K I N GO NC ^ ^ ^ I P U T E R S A N D MUSIC IN HIS F R E E TIME. T H ES O U R C E H A DN OI ^ N O W L E D G EO FT H E SUB^CT'S FOREIGN T R A V E L ACTIVITIES. T H E R E IS NOTHING IN T H E SUB^CT'S B A C K G R O U N DT H A T W O U L D LEAVE HIM SUSCEPTIBLE T O BLACKMAIL O R COERCI^.

ITEM: 022 S O U R C E : 010 N A M E M O N T G O M E R Y C O L L E G E , 51 M A N N A K E E STREET,ROCKVILLE,MD 20850 L A WE N F O R C E M E N T O T H E R P R O V I D E R (b) (6), (b) (7) , SECURITY OFFICER SF R E L E A S E (C) N O R E C O R D

^^^^ E N DO FR E P O R T ^^^^ TRANSMITTED: 11/29/07 PRINTED: 01/16/08

N A M E MANNING, B R A D L E YE D W A R D

1CASEII08F18704

IPAGE 1

DATES O F INVESTIGATION 12/06/07^12/07/07 | SID 0414 |ORGIDC39 | REPORTHOl

TESTIMONIES

ITEM: 001 P E R S O N A L SUB^CT INTERVIEW S O U R C E : 001 INTERVIEW C O N D U C T E D U N D E R U N S W O R N DECLARATION O N 12/06/07 R H U BARRACKS,FIRST O O M , F O R T L E O N A R DW O O D , M O 65473 F L O O R MEETING R ISSUE CODE(S) 11 12 SINCE H EH A D 4^INED T H EA R M YH EH A SB E E ND I A G N O S E D WITHANERVE R O M P R O P E R L Y PHYSICALLY P E R F O R M I N G HIS D I S O R D E RT H A T PROHIBITS HIM F DUTIES IN T H EU . S . A R M Y . F O R THIS R E A S O NH E WILL B ED I S C H A R G E D F R O M THEARMYSOON. HEHASNOTBEENGIVENADATETHATHEWILLBE D I S C H A R G E D . H EH A SN O TH A DA N Y DISCIPLINARY P R O B L E M S SINCE H E H A S B E E N IN T H EA R M Y . HIS PHYSICAL INABILITY T OP E R F O R M HIS DUTIES ASA SOLDIER IS C ^ ^ ^ I M O N K N O W L E D G E T OE V E R Y O N E IN HIS UNIT A N D HIS FAMILY. INFORMATION C O N C E R N I N G THIS COUI^ N O TB EU S E D AGAINST HIM A S BLACKMAIL O R COERCION, HIS S T E P I ^ ^ O T H E R ,(b) (6), (b) (7)(C) DID N O TG E TA L O N G WITH HIM WHILE H E LIVED WITH H E RA N D HIS FATHER,BRIAN M A N N I N G AT 8020 NW119TH O T LIKE S T R E E T IN OKLAHC^ CITY, OKLAHO^. (b) (6), (b) (7)(C) DID N HIM B E C A U S EH EW A S T H ES O N HIS F A T H E R , A N DH E RE S T R A N G E D H U S B A N D , N D(b) (6), (b) W E R E HAVING (b) (6), (b) . (b) (6), (b) (7)(C) A MARITAL P R O B L E M S , A N D (b) (6), (b) (7)(C) R E S E N T E D HIM STRICTLY F O R (7)(C) (7)(C) T H A TR E A S O N . O N ED A Y IN 4/06, (b) (6), (b) (7)(C) CALLED T H E O K L A H O M A CITY POLICE D E P A R T M E N T , U N B E K N C W S TT O HIM. W H E N T H EO K L A H O M A CITY POLICE D E P A R t ^ ^ E N T ARRIVED S H EA L L E G E D THAT H EH A DT H R E A T E N E D(b) ED O E S N O TK N O W H O W S H EA L L E G E DT H A TH ET H R E A T E N E D (b) (6), (b) . H (6), H E R . H E W A S N O T IN T H E R O O M W H E N S H E M A D E T H E S E ALLEGATIONS T O T H E (7)(C) (b) POLICE. S H ER E Q U E S T E DT OT H E POLICE THAT H EB EM A D E T OL E A V E T H E (7) R E S I D E N C EP E R M A N E N T L Y . T H E POLICE DID ASK HIM T OL E A V EA N DH E DID N O T OB^CT. H EG A T H E R E D HIS B E L O N G I N G SA N D LEFT T O HIS SISTER'S (C) H O U S E . H ES T A Y E D WITH HISSISTER, C A S E YM A N N I N G MA^ORFORAFEW D A Y S B E F O R E H E MOVEDTO M A R Y L A N D . HEDOES N O T RECALL HISSISTER'S P H O N E N U M B E R . H E DID N O TM A K E A N YT H R E A T S AGAINST(b) (6), (b) (7)(C) . H ED O E S N O T K N O W IF A N Y POLICE R E P O R T S W E R E M A D E AGAINST HIM O RN O T . H E N E V E R H E A R D ANYTHING F U R T H E RF R O M T H E POLICE O RA N YC O U R T . H ED O E S N O T BELIEVE H EW A SE V E RC H A R G E D W1THACRIME. H EN E V E RH A DA N Y P R O B L E M S WITH T H E POLICE PRIOR T O THIS INCIDENT. H E DID N O TH A V EA N Y O T H E R P R O B L E M S WHILE H E LIVED T H E R E . HIS P A R E N T S , HIS SISTER A N D B R O T H E R I N L A WA R EA W A R E O F THIS INCIDENT. INFORMATION C O N C E R N I N G HIS S T E P M O T H E R ' S DISLIKE O F HIM A N D ACCUSATION O FT H R E A T SC O U L DN O T B E U S E D AGAINST HIM IN A N YW A Y AS BLACKMAIL O R C O E R C I O N . H E LIVED AT(b) (6), (b) (7)(C) ^ F R O M 11/01TO9/05. H E DID N O T LIVE AT THIS R E S I D E N C ET OH E L P WITH CITIZENSHIP R E Q U I R E M E N T SO FA N Y FOREIGN C O U N T R Y . H EM O V E D T O THIS RESIDENCE IN 11/01 B E C A U S E HIS M O T H E R , M O V E DT H E R E AFTER (b) (6), R E P O R T OF INVESTIGATION P R O P E R T YO FU . S . OFFICE O FP E R S O N N E LM A N A G E M E N T (IS) 1900EST,NW,WASHINGTON, D . C . 20415-4000

(b) (7)(C)

N A M E MANNING, B R A D L E YE D W A R D

^CASEll08F18704

^ P A G E 2

D A T E SO F INVESTIGATION 12/06/07-12/07/07 | SID 0414 | ORGIDC39 | REPORTS 1 S H E DIVORCED HIS F A T H E R IN 2001. H E D O E S N O T RECALL M O R E PRECISELY W H E N S H EM O V E D B A C KT OT H E UNITED KIN^^X^. HEWASAMINORCHILDAT THIS TIME A N D HIS M O T H E RH A DC U S T O D Y O F HIM. H EH A SN O CONTINUED C O N T A C T S WITH FOREIGN NATIONALS D U ET O HIS RESIDENCE IN E N G L A N D . HIS M O T H E R ,(b) (6), (b) (7) , W A S ORIGINALLY B O R N IN T H E UNITED K I N G D O M O N H^l^H^ANDACITI^EN O F T H E UNITED KINGDt^. HISI^^^^THER, (b) (C) EW A S STATIONEDIN H E (b) MET HIS FATHER, BRIAN MANNING, WHILE H (6), T UNITED KIN^^^ WITH T H E U . S . N A V Y , LIVEDIN T H E UNITED (b) (6), (6), (b) (7) U S T A T E SF O RA B O U T T W E N T Y Y E A R S WITH HIS F A T H E R , ONAGREENCARD, B T (b) (7) (b) (C)KINGDI^ N E V E R BECAMEAU.S. CITIZEN. (b) (6), R E T U R N E DT OT H E UNITED (C) (7) IN 11/01. (b) (6) H A SN O TO C C U P A T I O N O RE M P L O Y E R . (b) (6) IS (b) (7) (C) U N E M P L O Y E D D U E TOADISABILITY.(b) (6), (b) H A SN O AFFILIATION WITH A N Y (C) FOREII^ G O V E R N M E N T . H ED O E S N O TH A V EA N YF U R T H E R ASSOCIATION WITH (7)(C) FOREI^ NATIONALS ASARESULT O F HIS ASSOCIATION WITH HIS M O T H E R .H E S A W HIS M O T H E R ONADAILY BASIS IN T H EU . SF R O M HIS BIRTH IN 1987 UNTIL 11/01. H ES A W HIS M O T H E R ONADAILY BASIS STILL AFTER THEIR M O V E T OT H E UNITED KINGD^FR^ll/OlUNTIL H E LEFT T H E UNITED KIN^OM T O LIVE WITH HIS F A T H E R IN 9/05. SINCE 9/05 H EH A SK E P T IN T O U C H WITH HIS M O T H E R ,(b) (6), B YT E L E P H O N E ONCEAWEEK. H EA L S O VISITED H E R O N C E FORAWEEK IN 3/06, THIS TRIP W A S FINANCED B Y HIS F A T H E R .H E (b) (7)(C) A N D HIS SISTER,CASEY M A N N I N G M A ^ O RW E N T T H E R ET O VISIT HIS M O T H E RA N D HELP H E R WHILE S H EW A S ILL. HIS M O T H E R ,(b) (6), STILL LIVES A (b 31 X IS N O T (b) (6), (b) (7)(C) (b) (7) ) A W A R E T H A TH E IS U N D E R G O I N G CONSIDERATION FORANATIONAL SECURITY (C) O (6 C L E A R A N C E . (b) (6), H A SN E V E R SOLICITED HIM F RA N YA C C E S S T O ), CLASSIFIEDINFORMATION. H E H A S N O T D E V E L O P E D A N Y SYMPATHIES, (b) (7) (b P R E F E R E N C E S O R ALLIANCES F O R A N Y FOREI^ C O U N T R Y AS R E S U L TO F HIS (C) ASSOCIATI^ WITH HIS M O T H E R . )

(7
H EA T T E N D E DT A S K E RM I L W A R DV C (SCHOOL) F R O M 12/OlTO 6/05. H E D O E )S N O TH A V E A N Y LASTING C O N T A C T WITH A N Y FOREIGN NATIONS F R O M THIS (C S C H O O L .

H ET R A V E L E DT O^ A P A NF O RT W O WEEKSIN 10/04. H ET O O K THIS TRIP WITH T W E N T Y O T H E RS T U D E N T S A N DS P O N S O R S FR^ T A S K E RM I L W A R D VC. THIS TRIP W A S EDUCATIONAL SIGHTSEEING TRIP OF^APAN. H EA N D T H EG R O U P VISITED TOKYO,^APAN. THIS TRIP W A S FINANCED B Y HIS M O T H E R . DURING A N YO F HIS FOREIGN TRAVEL: T OE N G L A N D FRI^ll/OlTO 9 / 0 5 , - T O E N G L A N DF O RO N EW E E K IN 3 / 0 6 , -A N DT O^ A P A NF O RT W OW E E K S IN 10/04. H E H A SN O TH A DA N YP R O B L E M S TOINCLUDE: H E DID N O TH A V EA N Y P R O B L E M S WITH FOREI^ G O V E R N M E N T OFFICIALS, L A W E N F O R C E M E N T , O RC U S T O M S .H E DID N O TM A K E A N Y LASTING C O N T A C T WITH A N Y FOREIGN NATIONALS. H E DID N O T NOTICE A N Y EVIDENCE OF A N Y MONITORING BYAFOREIGN G O V E R N M E N T .H E DID N O T VISIT A N Y EMBASSIES O RC O N S U L A T E S . H EW A SN O T DETAINED O R A R R E S T E DB YA N Y FOREIGN L A W E N F O R C E M E N T . H E DID N O TC O M M I T A N Y ILLEGAL O R CI^ROMISING BEHAVIOR WHILE INAFOREI^ C O U N T R Y . H E DID N O TS T R A YF R O M A N Y OFFICIAL T O U R S O R VISIT A N Y RESTRICTED A R E A S .H E DID N O TH A V E HIS P A S S P O R T CONFISCATED O R LOST. H E DID N O TH A V E A N Y R E P O R T OF INVESTIGATION P R O P E R T Y OFU.S. OFFICE O FP E R S O N N E L M A N A G E M E N T (IS) 1900EST,NW,WASHINGTON,D.C. 20415-4000

N A M E MANNING, B R A D L E Y E D W A R D

1CASEII08F18704

IPAGE 3

D A T E SO F INVESTIGATION 12/06/07-12/07/07 | SID 0414 |ORGIDC39 IREPORT^ 1 P R O P E R T Y CONFISCATED. H E DID N O TH A V E A N Y SEEMINGLY ACCIDENTAL MEETINGS WITH A N Y FOREIGNERS. H EW A SN O TA P P R O A C H E DB YA N Y FOREI^RS P P A R E N T R E A S O N . T O DEVELOPAFRIENDSHIP F O RN OA H EW A S FIRED F R O M FYEIN 6/06 F O RN O T MEETING HIS SALES G O A L S . (DISCREPANT) H E FAILED TO LIST THIS FIRING F R O M FYE O N HIS SF 86 AS AN OVERSIGHT. H EW A S GIVENAVERBALWARNING,WRITTEN W A R N I N G A N DT H E N FIRED F O RN O T MEETING HIS SALES EXPECTATIONS. H EC O U L D N O T ESTIMATE M O R E PRECISE D A T E ST H A TT H E S E THINGS H A P P E N E D . H EW A S FIRED,VERBALLY W A R N I N GA N D WRITTEN UP ALL B YR O D N E YS T E W A R T . H E DID N O TH A V E A N Y O T H E RP R O B L E M S AT THIS E M P L O Y M E N T . H ED O E S N O T RECALL ANYt^ ELSE T H A T W O U L D BE A W A R E OF THIS. INFORMATION C O N C E R N I N G THIS FIRING C O U L D N O T BE U S E D AGAINST HIM AS BLACKMAIL O RC O E R C I O N . H ED O E S N O T THINK T H A TH EW O U L D BE ELIGIBLE F O R REHIRE. N D STYLE T H A N HIS H E HADADIFFERENCE IN PROFESSIONAL OPINION A SUPERVISOR,(b) (6), (b) (7) , AT ^OTOI^C. H E ULTIMATELY LEFT ^ O T O F O R THIS R E A S O N . H E A N D H A D DIFFERENCES IN OPINIO W H E N IT C A M E (b) (6), (C) T O STYLES IN WRITING (b) S O F T W A R E . H E DID N O T LIKE(b) (6), (b) STYLE,BUT (7) H E ULTIMATELY DID IT HIS W A YB E C A U S EH EW A S THE(7)(C) B O S S A N D C E O OF T H E (C) CI^ANY. THIS DIFFERENCE IN STYLES DID NOT R E S U L T IN A N Y DISCIPLINARY ACTIONS O RP O O RW O R K EVALUATI^S. H E (b) (6), (b) C A M E TOAMUTUAL A G R E E M E N T T H A T IT W O U L D BE B E S T IF H E (7)(C) P U R S U E D A N O T H E R^ O B . H EW A S N O T FIRED. H E LEFT I ^ O T O VOLUNTARILY. H EW A SN O TT O L DT O QUIT. H E D O E S N O T THINK T H A TH EW O U L D BE ELIGIBLE F O R REHIRE D U ET O HIS DIFFERENCE IN STYLE WITH T H EC E OO F THE C O M P A N Y . T H E R E ARE N OH A R D FEELINGS B E T W E E N HIM A N D(b) (6), . A N Y O N ET H A T W A S AT T H EC O M P A N Y AT T H A T TIME (SMALL C O M P A N Y (b) 0F8PE0PLE)W0ULD B EA W A R E O F THEIR DIFFERENCE IN (7) STYLES A N DT H ER E A S O NF O R HIS D E P A R T U R E . INFORMATION C O N C E R N I N G THIS (C) C O U L D N O T BE U S E D AGAINST HIM IN A N YW A Y AS BLACKMAIL O RC O E R C I O N . ALL OF T H E INFORMATION INCLUDED O N HIS SF 86 A N D PROVIDED DURING HIS P E R S O N A L SUB^CT INTERVIEW IS T R U EA N D C^LETE WITH T H E F O L L O W I N G EXCEPTIONS: HIS W O R K P H O N E N U M B E R IS (301)765-0556. (DISCREPANT) H ED O E S N O T K N O W W H Y HIS SF 86 DID N O TS H O W A W O R KP H O N E N U M B E R . SINCE H E FILLED O U T HIS SF 86 H EH A SB E E N ACTIVE D U T Y ENLISTEDIN T H E U.S. A R M Y SINCE 10/07. (DISCREPANT) SINCE 10/07, H EH A S B E E N STATIONED AT F O R T L E O N A R D WOOD,MISSOURI F O R BASIC TRAINING. HEDGES N O TK N O W AN A D D R E S SO RP H O N E N U M B E R OF HIS E M P L O Y E R AT F O R T L E O N A R D W O O D . HEISAPRIVATE,E01, INTELLIGENCE ANALYST. HIS SUPERVISOR IS DRILL S E R G E A N T ROBINSON. H ED O E S N O TI ^ N O W AN A D D R E S S , P H O N E N U M B E R O R FIRST N A M E OF DRILL S E R G E A N T ROBINSON. H EH A SA L S O LIVEDIN T H E B A R R A C K S AT F O R T L E O N A R D WOOD,MISSOURI SINCE H E ARRIVED F O R BASIC TRAINING IN 10/07. (DISCREPANT) H ED O E S N O TK N O W AN A D D R E S S O F T H E B A R R A C K ST H A TH EH A S STAYEDIN. HIS BATTLE B U D D Y , PRIVATE A N D R E W D U F F E YC A N VERIFY HIS C O N D U C T A N D ACTIVITIES SINCE H EH A S LIVED IN T H E B A R R A C K S AT F O R T L E O N A R DW O O D . H ED O E S N O TK N O W AN A D D R E S S , O R P H O N E R E P O R T OF INVESTIGATION P R O P E R T Y OFU.S. OFFICE O FP E R S O N N E L M A N A G E M E N T (IS) 1900EST,NW,WASHINGTON,D.C. 20415-4000

N A M E MANNING, B R A D L E YE D W A R D

1CASEII08F18704

IPAGE 4

D A T E SO F INVESTIGATION 12/06/07-12/07/07 | SID 0414 1ORGID039 | REPORTS 1 N U M B E RF O R PRIVATE D U F F E Y . H E LIVED AT 5607 71ST P L A C E EAST, A P A R I M E N T 1005, IN TULSA, OKLAH^ F R O M 4/06 T O 7/06. H ED O E S N O T RECALL A N YN E I G H B O R S AT THIS RESIDENCE. H ED O E S N O T THINK T H A T A N YN E I G H B O R SW O U L D R E C A L L HIM AT THIS RESIDENCE,BECAUSE THIS A P A R T M E N TC O M P L E XW A SV E R Y TRANSIENT. T H EO N L YP E R S O NT H A TH EC O U L D RECALL T H A T VISITED HIM T H E R EW A S HIS FRIEND, (b) (6), (b) .(b) (6), (b) S LIVES AT (b) (6), (b) (7)(C) .(b) (6) C A NB ER E A C H E D O N (b) (6), (7)(C) (b) (7)(C) (7)(C) HIS CELL P H O N E N U M B E R AT(b) (6), (b) .

(7)(C)
H E LIVED WITH HIS F A T H E RA N DS T E P M O T H E R AT(b) (6), (b) (7)(C) F R O M 9/05 T O 4/06. H ED O E S N O TR E C A L L A N Y (b) (6), (b) (7)(C) N E I G H B O R S AT THIS RESIDENCE. H ED O E S N O TK N O W IF A N YO FT H E N E I G H B O R S W O U L D K N O W O F HIM LIVING T H E R EO R NOT. H E DID N O TH A V EA N Y VISITORS AT THIS RESIDENCE. T H EO N L YP E O P L ET H A TC A N VERIFY THIS R E S I D E N C E A R E HIS F A T H E RA N DS T E P M O T H E RW H O STILL LIVE T H E R E . HIS F A T H E R (b) (6), C A N BE R E A C H E DO N HIS CELL P H O N E AT(b) (6), (b) . (b) D (b) (b) (7) LIVES AT . (b) (6) (b) (6), (b) (7)(C) (6), (7)(C) (6) (C) E C A NB ER E A C H E DB YT E L E P H O N E AT (b) (6), (b) . H (b) (6), (b) (7) (b) D O E S N O TK N O W A N YO T H E RC O N T A C T INFORMATION (b) (6), (b) (7)(C) . (C) (7)(C)

(7)(C)

H E LIVED AT(b) (6), (b) (7)(C) ^F R O M 11/01 T O 9/05. (DISCREPANT) H ED O E S N O TK N O WW H Y HIS SF 86 S A Y S T H A T H E LIVED IN H A V E R F O R D , UNITED KIN^^X^ INSTEAD O FH A V E R F O R D W E S T , UNITED KINGD^. H E LIVED AT(b) (6), (b) (7)(C) F R O M 11/00 T O 11/01. (DISCREPANT) H ED O E S N O TI ^ N O WW H Y HIS SF 86 H A ST H E W R O N G STARTING D A T EF O R THIS RESIDENCE. F R O M 1/92 UNTIL ll/OO H E LIVED AT(b) (6), (b) (7)(C) ED O E S N O TI ^ N O WW H Y THIS R E S I D E N C E W A S (b) . (DISCREPANT) H CI^LETELYLEFTOFFHISSF86. H ED O E S N O TK N O W A M O R E PRECISE (6), A D D R E S S F O R THIS RESIDENCE. H ED O E S N O TK N O W IF THIS A D D R E S S ISA (b) PHYSICAL A D D R E S S O R N O T . (7) (C) H E ATTE^ED T A S K E RM I L W A R D VCFR^12/01TO 6/05. (DISCREPANT) AS AN OVERSIGHT, H E E ^ R ^ T ^ W R O N G STA^TINCDAT^^HISSF82FO^^^IS EDUCATION. H E DID N O T EARNADEGREEFR^MONTG^RY C O L L E G EO F ROCKVILLE. E DID N O TI ^ N O W T H A TH EW A SR E Q U I R E DT O ENTER"N/A"FOR (DISCREPANT) H N O T APPLICABLE F O RA N Y QUESTION O N HIS SF 86 T H A T DID N O T APPLY T O HIM. T H E R E F O R E , M O N T H / Y E A RD E G R E E A W A R D E D O N HIS SF 86 A L S OD O E S N O T APPLY. (DISCREPANT) H EW O R K E D P A R T TIME AT S T A R B U C K S FR^ 1/07 T O 5/07 WHILE ALSO G O I N GT OS C H O O L FULL TIME AT M O N T G O M E R Y C O L L E G E O F ROCKVILLE. H EW A SU N E M P L O Y E D F R O M 6/06 T O 1/07. H ES P E N T HIS TIME L O O K I N G FORA

R E P O R T O F INVESTIGATION P R O P E R T Y OFU.S. OFFICE O FP E R S O N N E LM A N A G E M E N T (IS) 1900EST,NW,WASHINGTON,D.C. 20415-4000

N A M E MANNING, B R A D L E YE D W A R D

1CA8Eil08F18704

| P A G E 5

R G ID 039 1 REPORTS 1 D A T E SO F INVESTIGATION 12/06/07-12/07/07 | SID 0414 | O ^ O BA N D LOOKING AT C O L L E G E ST O ATTEND. H E ALSO S P E N T HIS TIME PLAYING ONHISCt^^lPUTER. H EW A SS U P P O R T E D FINANCIALLY B Y HIS AUNT,(b) (6), C A N VERIFY HIS ACTIVITIES A N D (7) (b) (6), (b) (7)(C) (b) FINANCIAL S U P P O R T DURING THIS PERI^ O FU N E M P L O Y M E N T .(b) (6), (b) (C) (b) N LIVES AT (b) (6), (b) (7)(C) (7)(C) C A N BE R E A C H E D B Y T E L E P H O N E AT (b) (b) (6), (b) (6),(6),

(b) (7)(C) (7)(C) H EW O R K E D AT INCREDIBLE P I ^ ^ C O FRO^ 5/06 T O 7/06, (DISCREPANT) H E (7) D O E S N O TI ^ N O WW H Y HIS SF 86 S A Y ST H A TH EW O R K E D AT THIS EMPLOYMEI^ (C) F R O M 9/05 T O 2/06. THISIS I N C O R R E C T . H E DID N O TE N T E RT H E S E D A T E S
F O R THIS E M P L O Y M E N T . H EW O R K E D AT INCREDIBLE PI^:^ C O WHILE A L S O W O R K I N GP A R T TIME AT FYE F R O M 5/06 T O 6/06. H ED O E S N O T RECALL A N Y O N E O T H E RT H A NT H E LISTED VERIFIERS F O R HIS E M P L O Y M E N T S AT ^OTO, F Y E A N D INCREDIBLE P1^^ C O . N E M P L O Y E DF R O M 8/88 T O 2/06. H ES P E N T HIS TIME T H E R E F O R EH EW A SU G O I N GT OS C H O O L FULL TIME, LOOKING FORA^B O N C E H EG O TO U TO F HI^ S C H O O L ,A N DW A T C H I N G TELEVISION. H EW A SS U P P O R T E D FINANCIALLY B Y HIS P A R E N T S . HIS FATHER (b) (6), (b) (7) CAN VERIFY HIS ACTIVITIES AND FINANCIAL S U P P O R T WHILE EW A SU N E M P L O Y E D DURING THIS TIME.(b) (C) H LIVES AT(b) (6), (b) (7)(C) (b) (6), A N BE R E A C H E DB YT E L E P H O N E AT((b) (6) . (b) . HIS FATHER C (6)

(6)

(b) (7) H ED O E S N O TK N O WW H YT H E QUESTION PERTAINING T O CITIZENSHIP(C) O F HIS

RELATIVES (ill5)0N HIS SF 86 W A SN O TA N S W E R E D . N O N E OF HIS RELATIVES A R E U.S. CITIZENS B YO T H E RT H A N BIRTH,OR ALIENS RESIDING WITHIN T H E U . S . (DISCREPANT) HIS M O T H E R U S E DT OB E AN ALIEN RESIDING IN T H E U . S .U P UNTIL T H E YM O V E DT OT H E UNITED K I N G D O M IN 11/01. WHILE S H E LIVED in T H E U.S. S H E HADAGREEN C A R D . H ED O E S N O TI ^ N O W A N Y F U R T H E R INFORMATION C O N C E R N I N GH E RG R E E N C A R D PRIOR T O 11/01. T H EO N L YP E O P L ET H A TH E SOCIALI^S WITH IN HIS S P A R E TIME A R E (b) N G O E SB Y(b) (b) (THIRD LISTED REFERENCE^HISSF 86),(b) (6) ( (6)) (6) E F E R E N C EO N HIS SF 86),AND (b) (6) H E (b) (6), (FIRST LISTED R (6) O O E S N O T^ ^ N O W AN A D D R E S S ORPHIC N U M B E RF O E C O N D (b) (6), (b) . HIS S (b) (7) LISTEOR^FERENCEONHISSF86, (b) (6), (b) (7) RDISTHE F A T H E RO F HIS (7)(C) (C) FIRST LISTED R E F E R E N C E ,(b) (6),(C) ED O E S N O TI ^ (b) (7) H (b) (6), (b) (7) A SW E L L AS (b) (6), (b) (C) (b) (6), (b) (b) (6), (b) (7) . (C) (7)(C) (7)(C) (C) A S AN O V E R S I G H TH EF O R G O T T O INCLUDE HIS S T E P M O T H E R ,(b) (6), (b) N D E R THE RELATIVES SECTION. (DISCREPANT) N HIS SF 86 U (b) (6), O (b) (7)(C) ED O E S N O TK N O W(b) (6), (b) (6), (6), (b) NGISAU.S. CITIZEN. H (b) (7) RC O U N T R Y O F BIRTH. (b) (6), (b) (6) DATE OF BIRTH O (b) (7)(C) (b) (7)(C) (7)(C) (C) LIVES WITH HIS FATHER, (b) (6), (b) AT (b) (6), (b) (7)(C) (7) (b) (6), (b) (7)(C) (7)(C) . (C) T H E R E IS NOTHING IN HIS B A C K G R O U N DT H A TC O U L DB EU S E D AGAINST HIM AS BLACI^IL O R C O E R C I O N .

ITEM: 029

S O U R C E : 002 R E P O R T O F INVESTIGATION P R O P E R T YO F U.S.OFFICE O FP E R S O N N E LM A N A G E M E N T (IS) 1900EST,NW,WASHINGTON,D.C. 20415-4000

N A M E MANNING, B R A D L E YE D W A R D

^CASEli08F18704

| P A G E 6

D A T E SO F INVESTIGATION 12/06/07-12/07/07 | SID 0414 | O R G ID 039 | REPORTS 1 N A M E A N D R E W ^.DUFFEY,CANNON C R E WM E M B E R (b) (6), (b) (7)(C) C A

(b) INTERVIEWED H UB A R R A C K S , FIRST F L O O R MEETING R O O M , F O R T L E O N A R D W O O D , (6), AT R M D 65473 (b) (7) 12 ISSUE(S) (C) O W O R K E R P R I M A R Y ASSOCIATION C
A V E R A G EE X T E N TO FC O N T A C T R E G U L A R S P A NO FC O N T A C T 10/07-PRESENT REOO^NDS A N D R E W D U F F E YM E TB R A D L E YM A N N I N GW H E N T H E YS T A R T E D BASIC TRAINING IN T H EA R M Y AT F O R T L E O N A R DW O O D , MISSOURI. D U F F E YH A SS E E N HIM ONA DAILY BASISIN TRAINING ANDIN T H EB A R R A C K S . THIS C O N T A C T C O N T I N U E S UNTIL T H E P R E S E N T , H E WILL B E DISCHARGEDFRCM T H EA R M Y F O R MEDICAL R E A S O N S . D U F F E Y D O E S N O TI ^ N O WW H E N H E WILL B ED I S C H A R G E D . D U F F E Y IS N O TS U R E W H O K N O W S A B O U T HIS P R O B A B L E MEDICAL D I S C H A R G EF R O MT H EA R M Y . D U F F E YD O E S N O T THINK T H A T THIS INFORMATION C O U L DB EU S E D AGAINST HIM IN A N YW A Y AS BLACI^IL. H EH A S BEE^ IN T H EA R M Y SINCE 10/07. H EH A SN O TH A DA N Y DISCIPLINARY P R O B L E M S WHILE H EH A SB E E N IN T H EA R M Y . D U F F E YH A SN O R E S E R V A T I O N S A B O U T CO^INUING T OW O R K WITH HIM IN T H E F U T U R E . DUFFEYIS N O TA W A R E O F ANYTHING IN HIS B A C K G R O U N DT H A TC O U L D BE U S E D AGAINST HIM AS BLAC^IL O R C O E R C I O N .

^^^^ E N DO FR E P O R T ^^^^ REVISED: 01/11/08 PRINTED: 01/16/08

N A M E M A N N I N G , B R A D L E YE D W A R D

|CASEll08F18704

IPAGE 1

DATES O F INVESTIGATION 10/12/07-10/18/07 ISID0721 IORGIDC48 IREPORTHOl

TESTIMONIES ITEM: 003 INVESTIGATOR'SNOTE S O U R C E : 001

D U ET OT H E TRANSIENCE O F THE NEIGHBORHO^, ALL A T T E M P T ST O OBTAIN K N O W L E D G E A B L EP E R S O N A LS O U R C E S M E T WITH NEGATTIVE RESULTS. F O U R N E I G H B O R S W E R E C O N T A C T E D AT 8016 ( 1ST H O U S E EAST-SAME STREETSIDE), 8100 (2ND H O U S E WEST-SAME STREETSIDE), 8017 (1ST H O U S E NORTHDIRECTLY A C R O S S STREET),AND AT 8021 (2ND H O U S E NW-ACROSS STREET) NW119THST,0KLAH^CITY,0KLAH^, ALL WITH NEGATIVE RESULTS. ALL F O U R OF T H EN E I G H B O R S C O N T A C T E D MOVEDINTO THEIR H^S AFTER 9/06. N O N E OF T H EP E O P L EC O N T A C T E D H A V EK N O W L E D G E O F SUB^CT A N DW E R E U N A B L E T O PROVIDE A N Y INFORMATION. T W OH O U S E S AT 8024 (1ST H O U S E WEST-SAME STREETSIDE) A N D AT 8025 (3RD H O U S E NW-ACROSS STREET) A R E B O T H V A C A N T . A T T E M P T ST OC O N T A C T LISTED S O U R C E IN TULSA,OKLAH0MA,BY T E L E P H O N E M E T WITH NEGATIVE RESULTS. A T T E M P T S W E R E M A D EO N 10/12 (FRI), 10/13 (SAT),10/14 (MON) A N DO N 10/17/07 (WED),ALL WITH N O A N S W E R . N OF U R T H E R INFORMATION IS AVAILABLE. ITEM:008 INVESTIGATOR'SNOTE S O U R C E : 002

A T T E M P T ST O OBTAIN SUB^CT'S R E C O R D INFORMATION M E T WITH NEGATIVE W OP E R S O N N E L IN T H E OFFICE PROVIDED INFORMATION T H A T RESULTS. T H ET R E C O R D INFORMATI^ IS N O T MAINTAINED AT T H E 2-PERS^ OFFICE IN O K L A H O M A CITY,OKLAHOMA,AND B O T H W E R E U N A B L ET O PROVIDE A N Y ADDITIONAL INFORMATION. T H E LISTED S O U R C ET R A N S F E R R E DT O S A N FRANCISCO, CALIFORNIA IN 8/07. A T T E M P T ST OC O N T A C TS O U R C E B Y TELEPHt^ M E T WITH NEGATIVE RESULTS. MESSA^S W E R E LEFT AT S O U R C E ' S TELEPH^ N U M B E R O N 10/12 (FRI), 10/15(MON), 10/16 (TUE),AND O N 10/18/07 ( THU) ALL WITH N OR E S P O N S E . N OF U R T H E R INFORMATI^ IS AVAILABLE.

ITEM: 013 S O U R C E : 003 N A M E(b) (6), (b) (7) , DESIGNER, ^ O T O , I N C O R P O R A T E D , 123 SOt^ H U D S O N S T R E E T , O K L A H O M A CITY, O K 73102 (C) A C C E P T A B L E P R I M A R Y ASSOCIATION C O W O R K E R A V E R A G EE X T E N T OF C O N T A C T R E G U L A R S P A NO FC O N T A C T 11/05-4/06 RECO^NDS E G A N (b) (6), MET BRADLEY MANNING IN 11/05 (DISCREPANT),WHEN BARRETT B E M P L O Y M E N T AT ^ O T O , I N C O R P O R A T E D , OKLAHI^ CITY, OKLAH^, W H E R E (b) (7) M A N N I N GW A SE M P L O Y E D ASAFULL TIME P R O G R A M M E R/ D E V E L O P E R (b) (6), (C) W O R K E D I ^ THE S A M E2 P E R S O N OFFICE WITH M A N N I N GA N DH A D DAILY W O R K (b) (7)(C) C O N T A C T WITH M A N N I N GF R O M 11/05-4/06.MANNING E N D E D HIS E M P L O Y M E N T IN 4/06 A N D(b) (6), H A SN O TH A DC O N T A C T WITH M A N N I N G SINCE 4/06.

(b) (7) (C)

R E P O R T O F INVESTIGATI^ P R O P E R T Y OFU.S. OFFICE O FP E R S O N N E L M A N A G E M E N T (IS) 1900EST,NW,WASHINGTON,D.C. 20415-4000

N A M E M A N N I N G , B R A D L E Y E D W A R D

1CASEII08F18704

IPAGE 2

D A T E SO F INVESTIGATION 10/12/07-10/18/07 | SID 0721 10RGIDC48 IREPORT^ 1 O TH A V E SOCIAL C O N T A C T WITH M A N N I N G . B A R R E T T DID N SUB^CTISAFRIENDLY, E A S Y GOING, A N DP L E A S A N TP E R S O NT OW O R K WITH. HEIS T H O R O U G H , DETAIL ORIENTED, A N D CONSCIENTIOUS. SUB^CTISATEAM P L A Y E RA N DW O R K E D W E L L WITH S O U R C E . HEIS H O N E S T , T R U S T W O R T H Y A N D S T R A I G H T F O R W A R D . SUB^CT IS POLITE, C O U R T E O U S ,A N DR E S P E C T F U L . H E IS E V E NT E M P E R E DA N DS O U R C E EN^YED W O R K I N G WITH SUB^CT. S O U R C E H A S N O K N O W L E D G E O F SUB^CT'S OUTSIDE INTERESTS O R LEISURE TIME ACTIVITIES. S O U R C E IS N O TA W A R E O F ANYTHING IN SUB^CT'S B A C K G R O U N D T H A TC O U L D B E O RC O E R C I O NO R BLAC^IL. U S E D AGAINST SUB^CT F

^^^^ E N DO FR E P O R T ^^^^ TRANSMITTED:10/18/07 PRINTED: 01/16/08

^^^^

N A M EM A N N I N G , B R A D L E YE D W A R D

1CASEII08F18704

IPAGE 1

DATES OF INVESTIGATION 10/29/07-11/12/07 | SID 2994 1 O R G ID 039 | REPORTHOl

TESTIMONIES

ITEM: 024 S O U R C E : 001 N A M E P E R S O N N E L TRAINEE DIVISION, BUILDING 470, FT. L E O N A R D W O O D , M O 65473 P E R S O N N E L R E C O R D PROVIDER T O M BERENS,B. T.ASSI^^NT C L E R K A C C E P T A B L E N A M E VERIFIED SSN NOT S H O W N DOB NOT S H O W N E M P L O Y M E N T D A T E S 10/07-PRESENT S T A T U S FULL TIME W O R K S I T EA D D R E S S N O TS H O W N POSITION TRAOtEEPVl E M P L O Y M E N TS T A T U SC H A N G E NOT APPLICABLE P O B NOT S H O W N

ITEM: 025 S O U R C E : 002 N A M E P E R S O N N E L TRAINEE DIVISION,BUILDING 470, FT. L E O N A R D W O O D , M O 65473 MILITARY R E C O R D OBTAINED BY O^STIGATOR A C C E P T A B L E N A M E VERIFIED SSN VERIFIED DOB VERIFIED P O B VERIFIED

B R A N C H OF SERVICE USA D A T EE N T E R E D SERVICElO/07 D U T YS T A T U S ACTIVE G R A D E PVl

ITEM: 026 S O U R C E : 003 N A M E B A R R A C K S MANAGEMENT,BUILDING 470, FT. L E O N A R D W O O D , M O 65473 R E N T A L R E C O R D P R O V I D E R HANITA LACK, LEADINSPECTOR N O R E C O R D TRAINEES ARE R E Q U I R E D TO LIVEIN B A R R A C K S . N O RESIDENTIAL R E C O R D S ARE MAINTAINED. ITEM: 026 INVESTIGATOR'SNOTE S O U R C E : 004

TRAINEES ARE R E Q U I R E D TO LIVE IN B A R R A C K S WHILE IN BASIC TRAINING. L S O THE S A M E LOCATI^ AS THE TRAINEES' E M P L O Y M E N T . T H E THIS IS A TRAINEES' E M P L O Y M E N T R E C O R D LOCATION IS U N D E R S T O O D TO BE THE S A M E A S THE TRAINEES' RESIDENTIAL LOCATION.

R E P O R T OF INVESTIGATION P R O P E R T Y OF U.S. OFFICE OF P E R S O N N E L M A N A G E M E N T (IS) 1900EST,NW,WASH1NGTON,DC 20415-4000

N A M E M A N N I N G , B R A D L E YE D W A R D

jCASE # 08F18704

| P A G E 2

D A T E SO F INVESTIGATION 10/29/07 - 11/12/07 | SID 2994 | O R G ID C39 | R E P O R T # 01

**** E N DO F R E P O R T ** TRANSMITTED: 11/12/07 PRINTED: 01/16/08

N A M E MANNING, B R A D L E YE D W A R D

^CASEll08F18704

IPAGE 1

DATES O F INVESTIGATION 12/18/07-12/27/07 | SID 4737 | ORGIDW30 1 REPORTHOl

TESTIMONIES

ITEM: 031 N A M E (b) (6), (b) (7) , (b) (6), (b) (7)(C) ISSUE(S) 11 P R I M A R Y ASSOCIATION RELATIVE A V E R A G EE X T E N TO FC O N T A C T R E G U L A R O N T A C T 12/1987 T O P R E S E N T S P A NO FC REC^^NDS

S O U R C E : 001

(C)

H E N T H E SUB^CT W A SB O R N (b) (6), IS (b) (6), MET BRADLEY MANNING W M A N N I N G ' SA U N T . M A N N I N G LIVEDIN OKLAH^ F R O M 12/1987 (b) T O (7)(C) 12/2001 (b) (7) W H E N HIS P A R E N T S DIVORCED.(b) (6), S A WM A N N I N G ^CEAYEAR DURING (C) T H A T PERIOD. M A N N I N G LIVED(b) IN (7) E N G L A N D WITH HIS M O T H E R F R O M 12/2001 TILL A P P R O X I M A T E L Y 10/2005. (C) A DN O C^ACT WITH M A N N I N GF R O M 12/2001 T OA P P R O X I M A T E L Y 2004 (b) (6), H W H E N T H E YA T T E N D E DT H E SUB^CT'S SISTER'S W E D D I N G . M A N N I N G C O M P L E T E D (b) (7) HIGH S C H O O L IN ENGLANDIN 07/2005 A N D MOVEDIN WITH HIS F A T H E R IN (C) O K L A H O M A IN A P P R O X I M A T E L Y 10/2005. M A N N I N G LIVED WITH HIS F A T H E RA N D P P R O X I M A T E L Y 07/2006 W H E N H EM O V E D IN WITH T H E S T E P M O T H E R TILL A S O U R C E . ALSTYNE S P O K E WITH M A N N I N GO N E TIME WHILE H E LIVED WITH HIS F A T H E R , BUT S A WM A N N I N G DAILY WHILE H E LIVED WITH T H E S O U R C E . M A N N I N G LIVED WITH (b) (6), TILL 10/2007 W H E N H EC O I N E DT H EU S A R M Y . M A N N I N G ^CEAWEEKSOtCE 10/2007. (b) (6), SPEAKS WITH (b) (7) (b) (7) (C) M A N N I N G LIVED IN E N G L A N D FR^ 12/2001 T O APPROXIMATELY 10/2005. T H E (C)

S O U R C E IS U N A W A R E O FA N YP R O B L E M S WITH FOREI^ OFFICIALS ASARESULT O F THIS TIME E N G L A N D . M A N N I N G STILL H A SC O N T A C T WITH HIS M O T H E R A N D At^S(b) , 80^^CITI^^NS0F^^ tlN:t^OK^NC^OM, EVERY3-4W^EKS B Y T E L E P H O N E . (6),

M A N N I N G ALSO TOOKASCHOOLTRIP T O ^AN IN A P P R O X I M A T E L Y 2004 F0R2 (7)(C) N W E E K S . HEHAD OP R O B L E M S ANDHAS N O CONTINUING C O N T A C T WITH A N Y FOREIGN NATIONALS F R O M THIS VISIT. M A N N I N GW A SU N E M P L O Y E D WHILE LIVING WITH THESOURCE F R O M 07/2006 T O 12/2006. H ES P E N T HIS TIME R E S E A R C H I N GC O L L E G E SA N DW A SS U P P O R T E D FINANCIALLY B YT H ES O U R C E . H EW O R K E DF O RS T A R B U C K S FR^ 12/2006 T O 10/2007. M A N N I N GA L S OT O O K 3-4 C L A S S E S AT M O N T G O M E R Y C O L L E G E F R O M 01/2007 T O 06/2007. M A N N I N GE N V O Y S COMPUTERS,READING A N D M^SIC. ITEM: 031 INVESTIGATOR'SNOTE S O U R C E : 002

(b)

R E P O R T O F INVESTIGATION P R O P E R T YO F U.S. OFFICE O FP E R S O N N E LM A N A G E M E N T (IS) 1900EST,NW,WASHINGTON,DC 20415-4000

N A M E M A N N I N G , B R A D L E YE D W A R D

|CASEliO8F18704

I P A G E 2

DATES O F INVESTIGATION 12/18/07 - 12/27/07 1 SID 4737 IORGIDW30 IREPORTHOl

S O U R C E WASINTERVIEWED D U ET OL A C KO F RESIDENTIAL A N D U N E M P L O Y M E N T C O V E R A G E .

ITEM: 032 N A M E (b) (6), (b) 20854 (7)(C)

S O U R C E : 003 BARISTA, S T A R B U C K S , 7911TUCKERMANLANE, POT^C,MD

A C C E P T A B L E P R I M A R Y ASSOCIATION S U P E R V I S O R O N T A C T R E G U L A R A V E R A G EE X T E N TO FC S P A NO FC O N T A C T A P P R O X 02/2007 T OA P P R O X 09/2007 N OR E A S O NN O TT O R E C O M M E N D R A DM A N N I N GW H E N M A N N I N GB E G A NW O R K I N G WIT (b) T MET B (b) T AT S T A R B U C K S , (b) W A ST H E SUB^CT'S TRAINER A N DS U P E R V I S O RA N DS A W (6), (6), M A N N I N G 3-4 (6), DAYSAWEEK AT W O R K UNTIL M A N N I N G LEFT IN A P P R O X I M A T E L Y (b) (b) 09/2007. T H E YA L S O LIVEDIN T H ES A M E NEIGHBORHO^ A N DS A WE A C H O T H E R (b) (7) (7) ONCEAWEEK A N DS P O K E IN T H EN E I G H B O R H O O D O NT H O S EO C C A S I O N S ,T H E R E (7) (C) W E R E N OG A P S IN C O N T A C T (b) (6), T H A SH A DN OC O N T A C T(C) WITH M A N N I N G (C) SINCE A P P R O X I M A T E L Y 09/2007. (b) (7) (C) M A N N I N G LIVED WITH HIS A U N TO F FO F FALLS R O A D IN P O T O M A C , M D .H E COINED T H EU SA R M Y IN A P P R O X I M A T E L Y 09/2007. M A N N I N GA T T E N D E D HIGH S C H O O L IN E N G L A N D . T H E SOURCEIS U N A W A R E O FT H ER E A S O NF O R T H E EDUCATION O U TO FT H EU . S . O RA N Y DETAILS R E G A R D I N GT H A T TIME PERIOD.

M A N N I N GE N V O Y S M A T H , SCIENCE A N D MUSIC.

^^^^ E N DO FR E P O R T ^^^^ TRANSMITTED: 12/27/07 PRINTED: 01/16/08

N A M E M A N N I N G , B R A D L E YE D W A R D

1CASEII08FI8704

IPAGE 1

DATES O F INVESTIGATION 10/16/07 - 11/28/07 1 SID 6885 IORGIDC49 | R E P O R T 1102

TESTIMONIES

ITEM: 004 N A M E O O O P E R M I L L A P A R T M E N T S , 5607 71ST P L A C E E., TULSA,OK R E N T A L R E C O R D P R O V I D E R (b) (6), (b) B O O K K E E P E R SF R E L E A S E (7)(C) ISSUE(S) 03A N A M E VERIFIED S S N N O TS H O W N D O B N O TS H O W N

S O U R C E : 001

P O BN O T S H O W N

R E N TD A T E S 04/06-07/06 R E N T E R SB R A D L E Y M A N N I N G

RENTPAYME^SEEISSUES

UNIT 5607 71ST P L A C E E., A P A R T M E N T 1005, TULSA,OK H O W N F O R W A R D I N GA D D R E S SN O T S OCCUPANT(S) S A M E AS R E N T E R S R E C O R D S INDICATE SUB^OT M O V E D INTO A P A R T M E N TA L O N E t ^ 4/18/06 A N D SKIPPED^7/12/06. 4/15/06 PAID ^155 5/1/06 PAID^TIME ^349.00 L U S LATE F E E S ^50 6/12/06 PAID ^349 P 7/12/06 B O O K K E E P E R (b) (6), (b) D I S C O V E R E DA P A I ^ T M E N T W A SE M P T Y WITH K E Y SO N COUNTER.EXACT D A T E O F D E P A R T U R E N O T K N O W N . (7)(C) C U R R E N T A M O U N T O W E D : ^1,472.51 F O RP A S T RENT, CLEANING,DAMAGES, A N D TERMINATION FEE. N OO T H E R D E R O G A T O R Y It^RMATION IN FILE. ITEM: 004 INVESTIGATOR'SNOTE S O U R C E : 002

NOPERSONALTESTIMONY POSSIBLE A SP E RB O O K K E E P E R ^OLINE A B B E Y O F C O O P E R M I L LA P A R T M E N T SW H OI N F O R M E D INVESTIGATOR T H A T ALL C U R R E N T RESIDENCES IN T H E VICINITY O F THE A P A R T M E N T MOVEDIN A F T E R SUB^CT M O V E D O U TO FT H E A P A R T M E N T , ITEM: 007 INVESTIGATOR'SNOTE S O U R C E : 003

FYE D O E S N O T MAINTAIN E M P L O Y M E N T R E C O R D S . ALL E M P L O Y M E N T R E C O R D S M U S T B E OBTAINED T H R O U G H T R A N S W O R L D ENTERTAINMENT. ITEM F O R T R A N S W O R L D E N T E R T A I N M E N T W A S OBTAINED A N D R E P O R T E D . ITEM: 009 INVESTIGATOR'SNOTE S O U R C E : 004

R E P O R T O F INVESTIGATION P R O P E R T Y OFU.S. OFFICE O FP E R S O N N E LM A N A G E M E N T (IS) 1900EST,NW,WASHINGTON,DC 20415-4000

N A M E M A N N I N G , B R A D L E YE D W A R D

|CASEll08F18704

| P A G E 2

DATES O F INVESTIGATION 10/16/07-11/28/07 1 SID 6885 1 O R G ID 049 | REPORT^02

INVESTIGATOR W A SU N A 8 L ET O OBTAIN E M P L O Y M E N T R E C O R D D U ET O CONFLICT O F INFORMATION. S O U R C E UNIT DIRECTOR,(b) (6), (b) I N F O R M E D INVESTIGATOR T H A T R E C O R D S A R EN O PERSO^L R E C O R D S F O R PREVIOUS E M P L O Y E E S A N D T H A T ALL R E C O R D S (7)(C) A R EK E P T AT T H EC O R P O R A T E OFFICE.(b) (6), PROVIDEDINVESTIGATOR WITH P H O N E N U M B E R O FC O R P O R A T E OFFICE. (b) (7)

(C) ALSO INFORMEDINVESTIGATOR T H A TT H E R EA R EC U R R E N T L Y N O (b) E M P L O Y E E S W O R K I N G AT INCREDIBLE PI^^A W H O W O U L D H A V E W O R K E D WITH (6), SUB^OT. (b) (7)(C) INVESTIGATOR M A D EP H O N EC O N T A C T WITH T H EC O R P O R A T E OFFICE,NAME O F
P E R S O N N O T OBTAINED, INFORMEDINVESTIGATOR T H A TE A C HS T O R E K E E P S THEIR O W N R E C O R D S . INVESTIGATOR M A D E PH^ C O N T A C T WITH LISTED S U P E R V I S O (b) (6), (b) K N O W NA S (b) (6), (b) (7)(C) I N F O R M E D INVESTIGATOR E (b) , (7)(C)THAT H DID N O TR E C A L L SUB^CT D U ET O HAVING S E V E R A LE M P L O Y E E S , B O T HP A S T A N D (6), P R E S E N T . (b) (7) (C) 021 ITEM: S O U R C E : 005 N A M E T R A N S W O R L D ENTERTAI^NT, 38 C O R P O R A T E CIRCLE, ALBANY, N Y 12203 PERS^^L R E C O R D P R O V I D E R (b) (6), (b) HR SF R E L E A S E (7)(C) T E L E P H O N E TESTIM^ A C C E P T A B L E N A M E VERIFIED S S N VERIFIED D O BN O TS H O W N P O BN O T S H O W N

E M P L O Y M E N T D A T E S 05/06-06/06 S T A T U S FULL TO^ W O R K S I T EA D D R E S S W O O D L A N D HILLS MALL, TULSA,OK POSITION L E A DA S S O C I A T E / M A N A G E M E N T


^ 1 ^ 1 ^ S^ATt^SNO^S^CWN

E M P L O Y M E N TS T A T U SC H A N G E N O T S H O W N E M P L O Y M E N T D A T E S 5/24/06 T O 6/10/06 N OO T H E R INFORMATION AVAILABLE DUETOPOLICY A N D P R O C E D U R E . ITEM: 021 INVESTIGATOR'SNOTE S O U R C E : 006

INFORMATION W A S OBTAINED B YT E L E P H O N E WITH INVESTIGATOR C A L L E D T O OBTAIN P R O C E D U R E POLICY F O R OBTAINING E M P L O Y M E N T R E C O R D S .

R E P O R T O F INVESTIGATION P R O P E R T Y OFU.S, OFFIOE O FP E R S O N N E LM A N A G E M E N T (IS) 1900EST, N W , W A S H I N G T O N , D C 20415-4000

N A M E M A N N I N G , B R A D L E YE D W A R D

ICASE # 08F18704

jPAGE 3

D A T E SO F INVESTIGATION 10/16/07 - 11/28/07 | SID 6885 | O R G ID C49 | R E P O R T # 02

*** E N DO FR E P O R T **** TRANSMITTED: 11/28/07 PRINTED: 01/16/08

09

N A M E MANNING, B R A D L E YE D W A R D

ICASE 1108F18704

| P A G E 1

DATES O F INVESTIGATION 11/02/07 - 11/09/071 SID 7296 IORGIDA06 IREPORTHOl

TESTIMONIES

ITEM: 023 S O U R C E : 001 N A M E T H EW O R K N U M B E R , S T A R B U C K SC O F F E E C O M P A N Y , W W W . T H E W 0 R K N U M B E R . C O M , P E R S O N N E L R E C O R D OBTAINED BY INVESTIGATOR T E L E P H O N E T E S T I M O N Y A C C E P T A B L E N A M E VERIFIED S S N VERIFIED D O BN O T S H O W N P O BN O TS H O W N

E M P L O Y M E N T D A T E S 01/07-10/07 S T A T U SN O T S H O W N W O R K S I T E A D D R E S S N O T S H O W N POSITION BARISTA REHIRE S T A T U S N O T S H O W N E M P L O Y M E N TS T A T U SC H A I i l G EN O T S H O W N ITEM: 023 INVESTIGATOR'SNOTE S O U R C E : 002

R E C O R D INFORMATII^ OBTAINED FR^ T H EW O R KN U M B E R VIA THEINTERNET.

^^^^ E N D OF R E P O R T ^^^^ TRANSMITTED:ll/09/07 PRINTED: 01/16/08

DATE: 02/02/12

REQUESTOR ID: FOV K115 PAGE: 1 UNITED STATES OEEICE OF PERSONNEL MANAGEMENT INVESTIGATIONS SERVICE CASE CLOSING TRANSMITTAL ************************

*************************

CLOSED: 10/02/2007 CASE #: 70696500 TYPE/SERVICE: ENTNAC - PRT EXTRA COVERAGE: NAME: MANNING, BRADLEY EDWARD SSN: M m i - 9 (b) DOB: # # # # 1 9 8 7 POSITION:
(6),

SON: A02M (b) COMMANDER (7)(C) BALTIMORE MEPS 850 CHISHOLM AVENUE, STOP 2995 FT MEADE, MD 20755 AGENCY DATA:

SOI: DD70 DEPARTMENT OF DEFENSE HQ USMEPCOM ATTN: MOP-AD 2834 GREEN BAY ROAD NORTH CHICAGO, I L 60064

OPM ADJUDICATION: F - NO ISSUES - REVIEW LEVEL 1 THE ITEM INFORMATION SUMMARIZED BELOW, AND ANY REPORTS OF INVESTIGATION, INQUIRY FORMS AND/OR OTHER ATTACHMENTS WITH THIS TRANSMITTAL, COMPLETE THE INVESTIGATION REQUESTED ON THE PERSON IDENTIFIED ABOVE. THIS CASE HAS BEEN ELECTRONICALLY TRANSMITTED TO THE AGENCY ****************************** ITM
***

ITEM INFORMATION

****************************** CM RESULTS
** ***********************

TYPE ITEM IDENTIFICATION/LOCATION


**** * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

AOl BOl COl DOI

SII FBIF FBIN DCII END CASE CLOSING TRANSMITTAL

L L L L

NO NO NO NO

RECORD RECORD PERTINENT RECORD

***********************

***********************

PRINTED: 02/02/201^ REQLIE^STOR ID: E07 ^115 UNITED STATES OFFICE OF PERSONNEL MANAGEMENT INVESTIGATIONS SERVICE WASHINGTON, DC 20415 Cei^t^i^lc^t^^on In^e^t^i^^^t^^^cm

CLOSED: 10/02/2007 SUBMITTING OFFICE: SON - A02M DEPARTMENT OF DEFENSE HQ U8MEPC0M ATTN: MOP-AD 283^ GREEN BAY ROAD NORTH CHICAGO, I L 60064-3094 NAME: MANNING, BRADLEY EDWARD SSN: 4##1#11(b) (6) CASE TY^PE: ENTNAC EXTRA COVERAGE: POSITION CODE : / DOB: ##1^/1987 ^ POSITION: OPM CASE ^: 70696500 SECURITY^ OFFICE: SOI - DD70

SCHEDULED DATE: 09/26/2007 INVESTK^ATION CONDUCTED FROM: 7 THIS CERTIFIES THAT A BACKGROUND INVESTIGATION ON THE PERSON IDENTIFIED ABOVE HAS BEEN COMPLETED. THE RESULTS OF THIS INVESTIGATION WERE SENT TO THE SECURITY OFFICE FOR A SECURITY/SUITABILITY DETERMINATION.
*******************************************************************************

AGENCY C^ERTIFICATION: THE RESULTS OF THIS INVESTIGATION HAVE BEEN REVIEWED, AND A FINAL DETERMINATION HAS BEEN MADE. AGENCY CERTIFYING OFFICIAL . DATE

FILE THIS CERTIFICATE ON THE PERMANENT SIDE OF THE PERSON^S OFFICIAL PERSONNEL FOLDER AFTER THE FINAL AGENCY DETERMINATION I S MADE.

Prosecution Exhibit 1 Oa 5 pages classified "CONFIDENTIAL" ordered sealed for Reason 3 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

Prosecution ExhihitlOh ^pages classified "CONEIDENTIAE" ordered sealedf^rReason3 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

Prosecution ExhihitlOc ^pages classified "CONEIDENTIAE" ordered sealed forReason3 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

Prosecution ExhihitlOd ^pages classified "CONTIDENTIAE" ordered sealed for Reason3 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

Prosecution ExhihitlOe ^pages classified "CONEIDENTIAE" ordered sealed for Reason3 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

Prosecution ExhihitlOf ^pages classified "CONEIDENTIAE" ordered sealed for Reason3 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

ProsecutionExhihitlOg ^pages classified ^^CONEIDENTIAE" ordered sealedf^orReason3 Military Judge's Seal Order dated20August2013 stored in the classified supplementto the original Record ofTrial

Prosecution ExhihitlOh ^pages classified "CONEIDENTIAE" ordered sealed for Reason3 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

IKg
VO*-^

,n
Seagate
S/N: 9VS25G5M

Barracuda 7200.11 1500 Gbytes

lllllllllllllllllllllllllllllilllllllllllllllll
ST31500341AS

lllllllllllillllllillllllillllllllllllllllllllllHIIIIIIIIIIIIII
P/N: 9JU138-302

iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
Firmware: CC1H

+ 5V0.72A + 12V 0.52A Product ol Thailand

w a s

S,.0.:T

Caution. Product warranty is void il any seal or label is removed, or il the drive experiences STX-720011 (B) shock in excess ol 350 Gs. Need Support? Visit www.Seagale.com.

Installation Summary

Disk Utililv in m e uiilitiMl2^

This medium is Classified

SECRET
U.S. Government Property Protect it from unauthorized disclosure in compliance with apoiicable executive orders, statutes, and regulations. \

i '
This medium is

. s- -^

UNCLASSIFIED
U.S. Government Property SF 710 (1-87)

Substitute for Prosecution Exhibit 11

0 ^
PAGE OFFERED: PAGE ADMITTED: PAGE OF PAGES

riii

10^..

Ttiis medium IS classified

E#

SECRET j
u s. Government Properly ; Protect It from unauthorized \ disclosure in compliance with; applicable executive orders. \ statutes, and regulations. \
S C O n o

ODI

11
1

1 x l HI

^1 0 ]
ml .VJB
X)| H I

Substitute for Prosecution Exhibit 12

EVIDENCE/PROPERTY TAG
For use of this forni, see AR 95-5, the proponent agency is DCb,G-i

I*X

IN

IM.ILWO

KVNO

2 3 4 ; ,

MPR/CID CONTROL NUMBER

"
iiiiiI!i.J5SJISli2JS,JflL'-'-9 '"^'i o o K x m o i RoHS compiiance

6Ogg~)6-Cr022.Mblf7
I

IIMIIIIIIIII
" " '

ITEM slUMBER

Q : ^ ^ ^ h

I
TIME

O F
DATE

ITEM INITIALS

5>I n u U Sfll/U. D A T C A U T I O N P t E A S E A T T A C HA L L CAKES S E C U H L V FM PKMR c o K a r m OtM g i g a k r t ( O B ) BOM b i l l i o n b y t e a . acc**itl# Bpclty " i l l b* nd actiMl c a p a c i t y d a p i u U on th* cp#r*tlng anvlronMnl and f o n a t t i n q I'S0OO0OC04|-':GS4C

FKL-HHY2120BH<B>
FuJllM Utm lU.

0%

OiOO
REMARKS

[2JvlX> Kb

pspe

M.f^. f ^ c { ( z j , n ^ A ^ L^oy^cf l - W ^ O i ' s K Dr^me


S^SZ'iiPiL K^V/S-WVu

iimiiiiiiiiiiiiiiiiiiii ^ M n r z i QOIQ
This medium is classltied

k^o^T^lS^F^O

DA FORM 4002, JUL 92


Replaces DA Form 4002,1 JUL 76 which is obsolete.

ll
^^OSEcTTT^

SECRET
U.S. Government Property Protect it from unauthorized disclosure in compliance with applicable executive orders, statutes, and regulations.

HggewTBH

Substitute for Prosecution Exhibit 13

^i^ j^^ 4
/

PROSECUTION EXHIBIT/^for idAcation PAGE OFFERED: PAGE ADNpfrED PAGE_OF_PAGES

EVIDENCE/PROPERTY TAG
For use of this form, see AR 195-5, the proponent agency is DCS, G-3

MPR/CID CONTROL NUMBER

Q^?-fc:^-<M)22 f- iGl 17

II

ITEM NUMBER

i
TIME

OF DATE

DZoS
REMARKS

I ^ Ju^lD A,LcjAvCS
Cai^ip^x^i

/Y\R.- AcirtiV^
Ly>^}^^

l\f ihi^x k>i2i,r^\ pcoeie $-t.^pl

w/

UNCLASSIFIED
U.S. Government Property SF 710 (1-

Substitution for Prosecution Exhibit 14

Prosecution Exhibit 15 has been entered into the record as a CD/DVD and will be maintained with the original Record of Trial

ManningB_00527547

This medium is

UNCLASSIFIED
U S Government Property SF 710 (1-87)

tsois ^

PE 15b - Substitute for Apache CD

<^

^ 0028-10-CID221-10117 0160-10-CID899-14463
1 2

For Official Use Only Law Enforcement Sensitive

1
3 O" "O CO CD

il

o o
K

c o> 13 .P _ O) O OJ a> C * E CO to D O

^ as 0) ^ g%

Ii

cr

X < m CO X

oo
CVJ

<

O C

o
CD

b z

tf)
o O
_i

S- i l l |5 < IP i l u.oi
CO

O
c o H

o o

O o p

(fi

lu
Ul
_l

CO HI

LL IU

o o
u.
Q. O)

i xog gnf I
Q LU G O
tf)

ill iii
-t > 0)

UJ Q m

H eo >

LL

c
43

8 (0 z 2 S
x
c m Ho

O Q. 0)

o
JC * 0) CO O) 3

E
3 Q.

= i

II
SP c c o
c

3 O TJ

u ro

Q.

o
0^

o u c o

m z . a >
c c

I
JC O) 3

"3 ro in <n ro

Ii

3 CL

E
Q Q-

8 o Q.
m

8
iS

a > c c c o o .c c
Q.

I
-D

S
XI

a>
(U

O J a

u> Q

-2 n

ro
_3

>

a <
<

0)

5 3 o " (J O) UJ LU .5 od o Q uj

Q x:

s= ^ c o 5
0)

o o

ro O

u.

For Official Use Only Law Enforcement Sensitive


ManningB_00000285

Exhibit c2(g>
/5<2^ ^

PROSECUTION hXMmiT U J(>r :6gf<tification PAGKOFFER^iD: PAG^AbivarTED: PAGE OF PAGES

9|:90:SI eo-90-IOc

For Official Urn* Only Law Enforcement Sensitive

0028-10-CID221-10117 0160.10-CIO8M-14483

o o
it

b z
z z

2
Q. O*

u
^ -a > > 3 0 o Q

2
C O

rm 1 5c
o m
C O Q >

g
o a ui u. O
For Official Use Only Law Enforcement Sensitive
r U I )<| < I ' I ' i 10285 Mannlni nlrggjpOOl I'Aul III i I . i M l'.\UL i r I'M ' t 4

O m r~i d X TI ?q o X >

ff^ 0

31 rn &
O a
M

Exhibit. W L/nHt-aiinm / I ^ L - ^ m D:

I* o

o
3

For Official Use O ^ y

Enforcement Sensitive

0028-10-CID221-10117 0160-10-CID899-14463
g #

3 CT Ti

il
CO

CD

ro (u

5
dl

E%
O O)

O) C

"S tc-"9- cr

ro (/)
ID

95
0 J5 6 U T o

is

lo
^
< >
C O W)

0 C Q) O CO

12
O in O O ut

X X LU

g o

il
p u- o

E c o
Ui

CD UJ

If

\il
IU _l

Ul

UJ O C UJ (O >

UJ

c
4-*

o
W)

<

> >-1 z z

-1 M
O UJ UJ w

a o
0) ^ C O O)
3

S I
u.
Q:

&2

IfrJ l I
< 3 CL

o
QE:
<<D 3 Q)r. 0) 3 ~

E o o

OL

E
o

cc
CL U)

8 o

I I
U) c o z c g o
O

m O
UJ

s
o
<

8
o
ffi

ManningB_00000273

For Official Use Only Law Enforcement Sensitive

Exhibit

-3

ManningB_00000344

rMOOOOC 86uiuue/\j

,:,jai#w#<i#iiiiirin,iiii iiir inii Nmaaawaww

y)-^
PROSECU PAGE o r r PAGE Or
f';;;-J^ntHlcalion

;. .Cinu)r-irrTED:
rAGnb

2013-06-03 14:58:43

rnOCiOOu atrtuijue^^

PROSECUTION EXHIBIT J ^ f o r i d e n ^ a t L PAGE OFFERED: PAGE ADMIT^D' PAGE OF PAGES

2013-06-03 15:02:13

^M^i^i^li^^^^COCOO^C^

8C:8C:tl [0-90-ElOC

n C)
^'3

o
:'i
"1

r.

( "
C O

Ufi)

s>

'

^l*^
o
3

M a n n i n a B '')0'

ManningB_00000304

gbjiuuB^

PROSECUTION EXHIBIT ^Oo^fbr id , ^GE ADMIl mcation PAGE OFFERED: PAGE OF PAGES

2013-06-03 14:41:17

UNITED STATES OF AMERICA


V.

STIPULATION OF EXPECTED TESTIMONY SGT Mary Amiatu

Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211

DATED:

May 2013

It is iiereby agreed by tlie Accused, Defense Counsel, and Trial Counsel, that if SGT Mary Amiatu were present to testify during the merits and pre-sentencing phases of this court-martial, she would testify substantially as follows. 1. I am currently the S-1 NCO for the 6th Engineer Battalion at Fort Richardson, Alaska. I have held this position for two months. Previously, I was the Strength Accounting Clerk for U.S. Army Central Command G-1 at Camp Arifjan, Kuwait. I held that position from October of 2011 until October of 2012. In that position, I helped account for personnel coming in and out of theater, moving from place to place within theater, and changing duty status. I provided battle management update briefs and worked with the Deployed Theater Accounting System (DTAS). I also worked with the Joint Asset Movement Management System (JAMMS). 2. With regard to this particular investigation, I provided investigators from the Army Criminal Investigation Command (CID) a print-out from JAMMS on PFC Bradley Manning. JAMMS is a system that captures movement and location information about operating forces, govemment civil servants, and govemment contractors through data collection points established in specified operational theaters. These collection points are, for example, dining facilities, ports of debarkation, and fuel points. Operational theaters include Kuwait, Afghanistan, and Iraq. As such, JAMMS would capture the dates on which PFC Manning scanned himself in and out of Department of Defense (DOD) facilities using his CAC card, such as dining facilities (DFACs) and points of debarkation into and out of Iraq (APOD/SPOD). When providing this report, I also signed and had notarized an attestation certificate (identified at BATES Number 00412522) regarding the authenticity of the information. 3. As a former Strength Accounting Clerk, I am familiar with JAMMS reports. I have read them before. I, therefore, understand this JAMMS report I provided (identified at BATES Numbers 00412523 00412532) to show that the Service Member named "Manning, Bradley", whose last four social security number digits are 9504, came into and out of Iraq several times. For example, on page 9 of this document, it shows that on 26 October 2010, PFC Manning signsd into the DFAC on Camp Buehring in Kuwait, but by 28 October 2010, was using the DFAC in Iraq. Page 8 shows Bradley Manning departed Iraq on 22 January 2010 and then entered again, via Kuwait, on 11 February 2010. Gaps like this are normal when a soldier leaves a deployed environment, such as for mid-tour leave. Page 8 further shows that PFC Manning was using the FOB Hammer DFAC by 14 Febmary 2010. Lastly, Page 1 shows that PFC Manning boarded an outbound flight from Iraq on 30 May 2010.

ANGEL M./OyERGAARD CPT, JA Assistant Trial Counsel

THOMAS F. HURLEY MAJ.JA Defense Counsel

BRADLEY E. MANNING PFC, USA Accused

PROSECUTION FXHTBiT 7,\ for idp^fification PAGE OFFEREDC.^/vDMiTTED: PAGE OF PAGES

.^.^

UNITED STATES OF AMERICA


V.

STIPULATION OF EXPECTED TESTIMONY SA Calder Robertson DATED: "5 June 2013

Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if Special Agent Calder Robertson were present to testify during the merits and pre-sentencing phases of this court martial, he would testify substantially as follows: 1. I am a Special Agent (SA) for the Computer Crime Investigative Unit (CCIU) of the U.S. Army Criminal Investigation Command (CID). I have been with CCIU since March 2006. In February 2010,1 became the Special Agent-in-Charge (SAC) of the Europe Branch Office of CCIU. In my current capacity, I am responsible for conducting and overseeing the conduct of large-scale complex criminal investigations associated with high technology, including insider threat and computer intrusions into the critical information architecture of the U.S. Army. Among other things, this work includes: conducting interviews, executing search warrants, processing crime scenes, collecting and handling physical evidence, obtaining forensic images of digital evidence, conducting forensic examinations, and preparing comprehensive reports for supported officials and prosecutors. I have testified several times injudicial proceedings. Because I am in charge of the Europe Branch Office of CCIU, I have responsibility for investigating cyber crime incidents in Europe and Africa, as well as providing rapid response to Southwest Asia (Iraq and Afghanistan). Additionally, I was recently selected to establish the Pacific Branch Office of CCIU, with responsibility for investigating U.S. Army cyber crime incidents in the Pacific area of operations. From April 1998 to November 2003,1 held a variety of other positions within CID and was responsible for investigating criminal offenses with an Army nexus. 2. I received a B S. in Psychology in 2006 and have been a Certified Computer Crime Investigator through the Defense Cyber Crime Center (DCS) since 2007. In 2010,1 was awarded the U.S. Army Achievement Medal for Distinguished Civilian Service as a civilian Special Agent for Army CID. I have received numerous other awards in my civilian and military capacities. 3. I have received extensive training from the Defense Cyber Investigations Training Academy (DCITA), which is part of DC3. Through DCITA, I have attended the following courses relevant to my current work: Live Network Investigations (2009), Mobile Electronics Forensics Training (2008), Advanced Log Analysis (2008), Forensics and Intrusions in a Windows Environment (2007), Macintosh Forensic Examinations (2007), Wireless Technology (2007), Windows Forensic Examinations with EnCase (2007), Introduction to Networks and Computer Hardware (2006), and Introduction to Computer Search and Seizure (1999). Additionally, I attended Computer Forensics II with EnCase in 2009, a course put on by Guidance Software, the 1

' ySX

PROSECUTION EXHIBIT for idepfification PAGE OFFERED: PAGE ADMITTED: PAGE OF PAGES

makers ofEnCase. In 2011,lalso attended DCITA^sLarge Data Set Acquisition course as well as the Army Criminal Investigation Laboratory^sEvidence Management Certification Course. These courses focused on the collection and handling ofphysical and digital evidence. ^. On 27 May 2010,Ibecame involved with the investigation ofPFC Bradley Manning after receiving preliminary information on misconduct that required downrange investigation. As the SACofthe Europe Branch Office ofCCIU and the closest CCIU agent to Iraq,Iwas tasked by CCIU Headquarters, then at Fort Belvoir,Virginia, to provide support to the Camp Liberty CID office. Itraveled to Camp Liberty in Baghdad and stayed there for three days at the end ofMay 2010. Istayed at Camp Liberty because, at that time, it was too dangerous to travel to FOB Hammer. Additionally,the evidence collection team already at the crime scene on FOB Hammer had sufficient personnel to complete their mission such that my physical presence was unnecessary. My role in the investigation was to assess and provide expert assistance with the collection, preservation, and imaging of computer evidence as well as to perform preliminary analysis ofthe digital evidence. Apreliminary forensic examination isabrief review taking no more thanacoupleofhours,whereasaftill forensic examination may take anywhere from an entire day to several weeks, depending on the amount ofrecoverable information. Iconducted preliminary forensic examinations onanumberofitems of evidence seized in this case. Evidence collected from FOB Hammer and delivered to me at Camp Liberty included: two Supply Annex computers,arewriteableCD,an Apple brand personal laptop, an external hard disk drive, and three Sensitive Compartmented InformationFacility(SCIF) computers. ^. Ifollow several general procedures when handling evidence. Ireview the custody document and always ensure the description ofthe evidence matches the evidence attached. Icheck,for example, that recorded serial numbers, markings for identification, and condition description match the associated evidence. lensure that the necessary information, such as date and time, are properly and accurately recorded. Lastly,Imaintain secure custody ofthe evidence prior to transferring it to another individual. In addition to following these procedures,when transferring to or receiving evidence from another person,Iam also sure to properly sign, date, and note the reason forthe transfer. 6. With regard to each item ofphysicalevidencelreceived in this case,Ifollowed these same procedures. When receiving whole computers,IaIso checked to ensure they did not contain any suspicioushardwareorremovable data storage devices such as SD cards and thumb drives. Prior to powering on or accessing the contents of any device,Iimaged each item ofphysical evidence Ireceived in order to preserve the contents ofthe data on the item. Aforensic image of an item of digital media is an exact, bitforbit copy ofthe data on the digital media. limaged these items ofevidence so that the data on the device can be forensically examined without manipulating the data contained on the original evidence. This is standard practice by digital forensic examiners. The software forensic examiners use to image the digital evidence has built in procedures to verify that the item has been successfully duplicated. For example, the program will note the MD^ Hash or Secure Hash Algorithml(SHAl)hash value of an item of digital evidence before imaging(acquisition hash value)and after imaging the item(verification hash value). Ifthe two hash values match, the item has been successfully duplicated bit-for-bit. The hash value is determined by mathematical algorithm and is displayed asanumber^letter identifier unique to every item ofelectronically stored information. It is similartoadigital fingerprint,

although more unique. When the hash value is generated, the entire hard drive will haveahash value, as well as each individual file on the hard drive. Ifthere is any alteration to the hard drive or to any file on the hard drive, the acquisition and verification hash values will not match. The alteration can beasmall as addingasingle space intoatext document or savingafileina different format (i.e. savinga^^.doc^^asa^^.pdf^). In this case,Iused EnCase forensic software to complete this imaging process. EnCase forensic sofl^are is widely used by digital forensic examiners. Aslstatedearlier,lhave received training on EnCase forensic software and have used it in my other cases involving digital forensic examinations. lencountered no errors while conducting the imaging ofthe evidence at issue in this case. 7. Between 30 May 2010andl.Iune2010,Iprocessed the following itemsofphysical evidence: a. IprocessedaHitachi brand laptop computer,with the serial number 070817DP0C10DSG2JlDP,which was collected from the SupplyOfficeor Annex, 2ndBrigade CombatTeam,10th Mountain Division, FOB Hammer, Iraq. This computer was marked ^^UNCLASSIFIED^^ and was seized because PFC Manning had temporarily worked in the Supply Office in May 2010and used this computer. Ireceived this evidence from SA Thomas Smith. I followed proper evidence handling procedures to receive and handle this evidence, and made sure the evidence matched its noted description before beginning work. Upon taking possession, lunsealed this computer and obtained an EnCase forensic image ofthe hard drive contained within this computer. The resulting forensic image, with the SHAI hash value of 309df^9f068ft^a2e81aae03dla93d471cde90bf0, was verified to bean exact, bitforbitcopy of the hard drive throughacomparison ofthe acquisition and verification hash values. Ididnot examine this image further. IreviewedDN073-10in preparation forthis case. Thisitem^s forensic image is located on I t e m l o f D N 073 10. Iknowthisbecauselcollectedltemlas evidence. b. ^processedaSeagate brand computer hard drive, with the serial number CN0MN922 21232 793 002L, which wascollected from the SupplyOffice^Annex,2ndBrigade CombatTeam,10thMountain Division, FOB Hammer, Iraq. This computer was connected to the SIPRNET and the hard drive was seized because PFC Manning had temporarily worked in the Supply Office in May 2010and used this computer. Ireceived this evidence from SA Smith. Ifi;^llowed proper evidence handling procedures to receive and handle this evidence, anLl made sure the evidence matched its noted description before beginning work. Upon taking possession, lunsealed this hard drive and obtained an EnCase fc^rensic image ofthe hard drive. The resulting forensic image,with the SHAI hash value of cf6d703f0023773e b9e30eeb318660ac0dl8f40^,was verified to be an exact, bit-for-bit copy ofthe hard drive throughacomparison ofthe acquisition and verification hash values. Ididnot examine this image fiirther. IreviewedDN073-10in preparation for this case. This item^sforensic image is located on Item2ofDN 073 10. IknowthisbecauseIcollectedItem2as evidence. c. Iprocessedarewriteable compact disc(CD-RW), with the serial number LD623M^0^18^038B16, which wascollected from thequartersofPFCManning,Room^C93, LSA Dragon, FOB Hammer, Iraq. ACDRWis differentfromacommerciallyproducedCD with content already loaded onto it (i.e. fromamusic store), becauseaCDRW allows the userto v^ite content to the CD,along with edit or delete information on the CD. ThisCDRWhada

^^SECRET^stickeronitandwaslabeled^^I2.Iul07C^ENGAGEMENT^ONE30GC^^ This CD-RWwas collected with three Arabic language CDs inamultidisc case. Ireceived this evidence from SA Smith. Ifollowed proper evidence handling procedures to receive and handle this evidence, and made sure the evidence matched its noted description before beginning work. Upon taking possession,Iunsealed the multidisc case and obtained an EnCase forensic image of the aforementioned CDRW. The resulting forensic image,with the MD^ hash valueof ^c993ee62Ib036^82bael3^3f844322f,wasverifiedto bean exact, bitforbitcopyoftheCD RWthroughacomparison ofthe acquisition and verification hash values. After imaging this CDRW,Iconductedapreliminary forensic examination ofthis image. TheCDRWcontained two files with identical names. One file contained no data and the other file,^^I2 Jul 07 C^ ENGAGEMENT ^ONE 30 GC,^^containedavideo. The video appeared to have been burned to the disc on 27April20I0using Macintosh disc creation software. IreviewedDN073^I0in preparation for this case. This item^sf^rensic image is located on Item2ofDN 073 10. Iknow this becauseIcoIlectedItem2as evidence. d. Iprocessed an Apple brand laptop computer,with the serial number W8939A^066E, which was collected from the quarters ofPFC Manning, Room 4C93,LSA Dragon, FOB Hammer, Iraq. Ireceived this evidence from SA Smith. Ifollowed proper evidence handling procedures to receive and handle this evidence, and made sure the evidence matched its noted description before beginning work. Upon taking possession,Iunsealed the Macintosh computer, removedaFu^itsu brand hard drive from the laptop, and obtained an EnCase forensic image of the hard drive. The serial number ofthe hard drive was ^9^DT9829WPY. The resulting forensic image ofthe hard drivelobtained from this computer, with the SHAI hash value of 3cfl07db8b386^a^e3ebfce^00baelda9691ft^^9, was verified to bean exact, bitforbitcopy of the hard drive throughacomparison ofthe acquisition and verification hash values. Thereafter,! conductedapreliminary forensic examination ofthis image. Idetermined that the hard drive had aMacintosh operating system installed and hadauser account resembling PFC Manning^sname, althoughldidnotnotethemachine^susemameinmyAgent^sInvestigationReport(AIR). A review ofthe device logs contained on the hard drive revealed some form ofoptical disc (i.e. CD-RW drive)activity occurred, like deleting or burning CDRWs, on or around 27April 2010. lalso reviewed the ^ ^ u s e r ^ ^filesassociated with the account resembling PFC Manning^sname and located several files containing text that was specifically referenced in the chat logs received by U.S.Army CID during the initial phases ofthe investigation, thoughldid not specifically note which text was referenced in the chat logs in my AIR. Ireviewed DN 073 lOin preparation for this case. This item^sforensie image is located on I t e m l o f D N 073-10. Iknow this becausel collected Itemlas evidence. e. !processedaSeagate brand external hard disk drive (HDD),with the serial number 2GEWJ^J,which was collected from the quarters ofPFC Manning, Room 4C93,LSA Dragon, FOB Hammer, Iraq. Ireceived this evidence from SA Smith. Ifollowed proper evidence handling procedures to receive and handle this evidence, and made sure the evidence matched its noted description before beginning work. Upon taking possession,Iunsealed the external HDD case and ftirther removed the internal HDD,also Seagate brand(serialnumber9VSlS2T^), becauseldid not haveapower adapter that could safely and reliably power the Seagate brand external HDD. Ithen obtained an Encase forensic image ofthe internal Seagate HDD with the SHAI hash valueofl^ll83^63c^b^8^1a811^627bf^le8d9e7^abb^8Theresultingforensic 4

image was verified to be an exact, bitforbit copy ofthe Seagate HDD throughacomparison of the acquisition and verification hash values. After imaging the Seagate HDD,Iconducteda preliminary forensic examination ofthis image. Ifoundafile containing the contact information ofamemberoftheWikiLeaksteam,Mr.JulianAssange. This contact information appeared to have been produced and released by the WikiLeaks team and did not appear to be ofapersonal nature. Ireviewed DN 073 lOin preparation forthis case. This item^sforensic image is located on I t e m l o f D N 073-10. Iknow this becauselcollected Itemlas evidence. f Iprocessed an Alienware brand laptop computer,with the serial number N^^900TA6D0066I, which was collected from the Sensitive Compartmented Information Facility (SCIF) ofthe 2nd Brigade CombatTeam,10th Mountain Division, FOB Hammer, Iraq. This computerwas connected to the SIPRNET and the hard drive was seized because PFC Manning had worked in the SCIF in November 2009 to May 2010and used this computer.! received this evidence from SA Smith. Ifollowed proper evidence handling procedures to receive and handle this evidence, and made sure the evidence matched its noted description before beginning work. Upon taking possession,IunseaIed the Alienware laptop computer, removed the Seagate brand hard drive from the laptop, and obtained an EnCase fc^rensic image of the hard drive. The serial number ofthe hard drive was 3MH036M1. The resulting forensic image ofthe hard drivelobtained from this computer,with the SHAI hash value of C7^00fbed0b4db68a^82a^8^eeaa3^abla62cd64, was verified to be an exact, bit for bit copy of the hard drive throughacomparison ofthe acquisition and verification hash values. Thereafter,! conductedapreliminary forensic examination ofthis image. Idetermined that PFC Manning hadauser account on this laptop computer. Ifound several items ofinterest to this investigation, including copies ofthe Apache video made publically available by WikiLeaks and called ^^CollateralMurder.^^ lalso found an archive file that contained approximatelyll,000 sensitive and classified documents, downloaded in HyperText Markup Language (HTML)format, though Ididnot note the exact number. Ireviewed DN 073 lOin preparation forthis case. Thisitem^s forensic image is located on Item2ofDN 073 10. Iknow this becauselcollected Item2as evidence. g. IprocessedaDell brand laptop computer,with the serial number HLVJ(^FI,which was collected from the Sensitive Compartmented InformationFacility (SCIF) ofthe 2nd Brigade CombatTeam, 10th Mountain Division, FOB Hammer, Iraq. This computer was connected to the SIPRNET and the hard drive was seized because PFC Manning had worked in the SCIF in November 2009 to May 2010and used this computer.Ireceived this evidence from SA Smith. Ifollowed proper evidence handling procedures to receive and handle this evidence, and made sure the evidence matched its noted description before beginning work. Upon taking possession, lunsealed the Dell laptop computer, removed an unknown brand hard drive from the laptop, and obtained an EnCase forensic imageofthe hard drive. The serial number ofthe hard drive was ^MHOHWI^N. The resulting forensic image ofthe hard drivelobtained from this computer, withtheSHAl hashvalueofc3^73c3dfldI31e0022f^c^6bfc^6087e9d^l^0f,wasverifiedtobe an exact, bit-for-bit copy ofthe hard drive throughacomparison ofthe acquisition and verification hash values. Thereafter,Iconductedapreliminary forensic examination ofthis image. Idetermined that PFC Manning hadauser account on this laptop computer. Ireviewed DN 073-lOin preparation for this case. This item^sforensic image is located on Item2ofDN 073 10. Iknow this becauselcollected Item2as evidence.

h. IprocessedaDell brand laptop computer,with the serial number 93H^(^D1,which was collected from the Sensitive Compartmented InformationFacilify (SCIF) ofthe 2nd Brigade CombatTeam,10th Mountain Division, FOB Hammer, Iraq. This NIPRNET laptop had been located near the work area ofPFC Manning. Ireceived this evidence from SA Smith. Ifollowed proper evidence handling procedures to receive and handle this evidence, and made sure the evidence matched its noted description before beginning work. Upon taking possession,! unsealed the Dell laptop computer, removed an unknown brand hard drive from the laptop, and obtained an EnCase forensic image ofthe hard drive. The serial number ofthe hard drive was ^MH0TB78. The resulting forensic image ofthe hard drivelobtained from this computer, with the SHAI hash Valueofe2b49bd3ed0e2f^d798ab4^febaac3bl^d0070be,wasverifiedto bean exact, bitforbit copy ofthe hard drive throughacomparison ofthe acquisition and verification hash values. Ididnot examine this image fiirther. IreviewedDN 073 lOin preparation for this case. This item^sforensic image is located on I t e m l o f D N 073 10. Iknow this becausel collected Itemlas evidence. 8. As!statedearlier,Iused the EnCase forensic software to obtain the images of each item of evidencelprocessed. In this case,Iattached each device(except the CDRW) toawrite blocker, and then aftached the writeblocker to my laptop computer,which had the EnCase forensic software loaded. Av^ite-blockerisadevice that allows you to acquire information on an item ofdigital media without accidentally damaging or altering the contents ofthe original item of digital media. In short, the write-blocker ensures that noneofthe original data on the item ofevidence is manipulated in any way. Ididnot use the writeblocker when processing the CRRW,as that device was not at risk of alteration. Computers do not alter data on CDRWs without specific instructions to do so. Aslneither intended nor actually issued such instructions, there was no need to useawrite-blocker with regards to the CD-RW. After securing the v^ite blocker as appropriate,!then used EnCase to createaforensic image of each item. Aslstated earlier,EnCase creates an acquisition hash value that is later compared to the verification hash value once the image has been created. Isaved the forensic images of each devicelprocessed onto sterile hard drives. Ilater transferred these forensic images to the hard drives recorded as ItemsIand2onDN073 10. The forensic image is not altered by being transferred between storage devices. When you open the forensic image in EnCase, EnCase itselfverifies that the forensic image isatrue copy. 9. I t e m l o f D N 073 10, serial number 9VS2^G^M,isaSeagate brand hard disk drive containing the individual forensic images ofthe devices listed above that were initially determinedtobe^^UNCLASSIFIEDBItem2ofDN073 10,serialnumber^VGI826C,isa Seagate brand hard disk drive containing the individual forensic images ofthe devices listed above that were initially determined to be classified ^^SECRET.^^ On^June2010,IcoIIected Itemsland2as evidence becauselhad previously transferred the forensic images ofthe various deviceslprocessed to these two hard disk drives. Icollected this evidence at the CID office on Camp Liberty. Idid this to consolidate the evidencelprocessed for ease ofreview by subsequent forensic examiners. This process is consistent with best computer forensic practices. In the forensic community,it is common for investigators to consolidate the forensic images of multiple devices on one hard drive and then collect the resulting hard drive as evidence. Afterl collected Itemsland2asevidence,Itransferred custody ofthis evidence to SA Jeremy Drews.

10. During the above forensic examinations,Irecorded my notes, including descriptions ofthe evidence and their associated hash values on an AIR, dated^June 2010, and marked for this courtmartial with bates numbers: 0002167^ 00021683. This AIR accompanied the evidencel transferred to SA Drews. 11. Prosecution Exhibitllfor Identification is the Seagate brand hard disk drive with serial number9VS2^G^M ( I t e m l o f D N 073 10). ProsecutionExhibit 12 for Identificationis the Seagate brandhard disk drive with serialnumber^VG1826C(Item2ofDN 073 10).

JEAN :PT, J A

MORROW

Assistant Trial Counsel

.^U,<n/i^<^ ^ . ' ^ ^ L ' ^ - , THOMAS F. HURLEY MAJ, JA Defense Counsel

ING PFC, USA Accused

You can currently contact our investigations editor directly in Iceland 1 3 5 4 862 3481 ; 24 hour service; ask for "Julian Assange".

i)"^
ManningB_00125284 PROSECUTION EXHIBIT 2 4 for W6ntificat:on PAGE OFFERED: TAGE ADfVfiTTED: PAGE OF PAGES

C> UJ
C O

(L
^

2,
C
^

o
D Q

0) C O

> >

03

u z
3

PROSECUTION EXHIBIT 25"for KWntid%%on PAGE OFFERED: PAGE ADMrFTED: PAGE OF PAGES

b
m
13

S S
C O
g w ro .o Em o o

\^s>

m.si
o g
o
C c 0)

o o o

2
Q _ U

ill

o o

UJ C O d
o
LU

C O ..

Q)

ol *i a B^
C 0

(/)

igf
M_ C D

1.^
^

0) C

C/)

o o

i i ^1
4 O

qj o (/)

2g

B E .2
=
I

C D 03 C D
I I I

si

IS DL LL Z

O .2 3 ro

O E
tf) Q)
_c

62

g Isl
^ O
(/) C U

I, l i i j i
o I- _j z y 2 u
. I l l I .9 I I

^ ^ ^

^
^ ^ ^ ^ ^

C B ^

^E

t/^ cu
^
I I I

D (^ C D C
CB^Z

3 ^

^
^ ^ ^

t/^
^ ^ ^

^
^

^
^ ^

0
^

^
^

^
^

^
^

^ 1 ^ ^

2
(TJ
u z

tf)

S 2
3 Q

2
%3
<

O 3 O

cr LJJ CI O CL h. . o . . .

xmi .iillil

B ^
<

(/) 0

I o o ro
X

(TJ
^ ^

UJ
^ ^

C^ C^
^

c ^ z
3 ^

E^
C O 0 03 0
^ ^ ^ ^

^
0 3
^ ^

^
0 ^
^

^ ^
^

0 03
^

^ ^ ^ ^
^
1

^^5cn
0
^

0 Z C ^
I I ^

^ ^ ^ ^ ^
I I I I

(f>
^

-1

^s
^ 0 C D ^

z
3
(/)
0 0 ^ C ^ ^ 0
^

c
0

c^ ^
^ ^ ^

g i

#o
C "D

^ ^ ^ u ^
^ ^ ^ ^ ^ ^ ^ ^

ii
I I

(/>

(0

5
V

o z
3

3 O

UNITED STATES OF AMERICA STIPULATION OF EXPECTED TESTIMONY Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211 SA Antonio Edwards

DATED: 3 June 2013

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if Special Agent (SA) Antonio Edwards were present to testify during the merits and pre-sentencing phases of this court-martial, he would testify substantially as follows. 1. Since March of 2012,1 have been employed as a Special Agent ("SA") of Homeland Security Investigations ("HSI"), Department of Homeland Security ("DHS") in the Atlanta Field Office, empowered by law to investigate and to make arrests for offenses involving the unlawful export of goods and technology to destinations outside the United States. Prior to working for HSI, fi-om March 2008 to March 2012,1 was employed as an SA with the United States Army Criminal Investigation Command ("USACIDC"), Computer Crime Investigative Unit ("CCIU") at Fort Belvoir, Virginia. In this capacity, I was responsible for the investigation of violations pertaining to computer intrusions and to other types of malicious computer activity directed against the U.S. Army (18 U.S.C. 1030). As a USACIDC SA, 1 was also authorized to investigate crimes involving all violations of the Uniform Code of Military Justice and other applicable federal and state laws where there is a U.S. Army or Department of Defense (DoD) interest. I have participated in and conducted investigations of violations of United States laws and regulations pertaining to computer intrusions and I have participated in the execution of search warrants on individuals and companies. 2. Before working for USACIDC, from November 2007 to November 2008,1 was employed as an SA with the Bureau of Industry and Security (BIS), Office of Export Enforcement. And, from May 2003 to October 2006,1 was a Deputy Prosecutor for Morgan County, Indiana. From August 2000 to August 2005, 1 served in the Monroe County, Indiana Reserve Deputy Sheriffs Department as a Deputy Sheriff, where I received training in evidence collection. Further, I am a graduate of the Federal Law Enforcement Training Center's Criminal Investigator Training Program, where 1 also received training in evidence collection. In addition to being employed as a Special Agent, I currently serve in the Inactive Ready Reserves (IRR) as a Judge Advocate in the United States Army National Guard, District of Columbia. 3. In 2003,1 received a Juris Doctorate from Indiana University and was subsequently admitted to the Indiana bar. 1 have a Bachelor of Arts in Psychology from the University of North Florida, and a Doctorate of Jurisprudence from Indiana University - Bloomington School of Law. I am currently licensed to practice law in Indiana. 4. My experience as a State Law Enforcement Officer, a State Prosecutor, and a Special Agent has included the investigation of cases involving violent and non-violent crimes as well as the use of computers. I have also received training and gained experience in: interviewing and interrogation techniques, arrest procedure, crime scene examination, evidence collection, search warrant applications, the execution of searches and seizures, and other criminal laws and procedures. Further, I have completed the Department of Defense Cyber Investigations Training Academy courses: "Introduction to Computer Hardware", "Computer Incident Responders Course", and "Windows Forensic Examinations - EnCase". PROSECUTION EXHIBIT 16 for x ^ ) ^ lO^Ucauon

PAGE OFFERED: PAGE ADMITTED: PAGE OF PAGES

Together, this afforded me certification asaDepartmentofDefense "Certified Digital Media Collector" and "Certified DigitalForensic Examiner". 5. Ifollow several general procedures when handling evidence. Ireview the custody document and always ensure the description ofthe evidence matches the evidence attached. Icheck, for example, that recorded serial numbers, markings for identification, and condition description match the associated evidence, lensure that the proper information, such as date and time, are properly and accurately recorded. Lastly,lmaintain secure custody of the evidence prior to transferring it to another individual. 6. In this particular investigation,lassisted with witness interviews and the handling of evidence. In so doing,lworked with SA Charles Clapper and Mr. GaronYoung. On 12June2010,lreceived several pieces of electronic evidence related to this investigation from the hands ofMr.AdrianLamo and with his consent. On 12June 2010, Mr. Adrian Lamo also gave signed consent to law enforcement personnel on two separate CID Forms 87REto search his electronic devices for "^alll information in any form, pertaining to communications which may be in the form: ofemails, instant messaging chats, documents, data, computer code, log files, drawings, photographs, or any other data; in encrypted, plain text, or any other format; relating to PFC Bradley E. MANNING and^or the disclosure of classified information or information which is the property of theU.S.Govemment." The first piece ofevidence collected and further handled wasaLenovo Laptop computer withaFuiitsu computer hard drive(serial number: K404T812MF4D)recorded as ltemlonaDAForm4137 marked as document number (DN) 7610, and known as "Lamo Ubuntu Hard Drive". It was collected from Mr.Adrian Lamo in Sacramento, California onl2June2010. The second piece ofevidence collected and hirther handled was an HP Mini Brand computer(computer serial number: CNU90513VT)withaSeagate computer hard drive (hard drive serial number: 5RE2C1(^K) recorded as ltemlonaDAForm4137 marked as document number (DN) 77-10, and known as "Lamo HP Hard Drive". It was collected from Mr.Adrian Lamo in Carmichael,Califomia on 12 June 2010 7. Using the DAForm4137,Iproperly released these pieces of evidence to SA Clapper. Onl4June2010, Iproperly regained possession from SA Clapper before properly releasing them to the Evidence Custodian, Mr. GaronYoung, on 15 June 2010, which is documented onaDAForm4137. While in possession of these items,lmaintained control over them, stored them properly,and allowed no one else access to them. Idid not alter the evidence in any way. lhave no reason to believe this evidence was damaged or contaminated in any way. After releasing the evidence to Mr.Young,lhad no fiirther interaction with the evidence. 8. I^rosecution Exhibit 13 for Identification is the Lamo Ubuntu Hard Drive ( I t e m l o f D N 76-10). Prosecution Exhibitl4for Identification is the Lamo HP Hard Drive ( I t e m l o f D N 77-10).

^^^^^^^^^^^^^^^^^^^^^^

ASHDENFEIN MAJ,JA Trial Counsel

THOMASF.HURLEY MAJ,JA Defense Counsel

BRAD^^EMANN^ PFC, USA Accused

UNITED STATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Manning, Bradley E. PFC,U.S.Arn^y, HHC, U.S. Arn^y Garrison, JointBaseMyerHendersonHall FortMyer,Virginia 22^11 SACi^^^IesCIa^^er DATED: ^ J u n e 2(^13

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel,that ifSpecial Agent(SA)Charles Clapper were present to testify during the merits and presentencing phases of this court-martial, he would testify substantially as follows. 1. lamaSpecial Agent (SA)fortheU.S.Army Criminal Investigation Division(CID). Specifically,Iwork forthe CID, Computer Crimes Investigation Unit(CCIU). My current job title is Special Agent in Charge (SAC) ofthe Arizona Branch Office located atFort Huachuca, Arizona. As the SAC,Irunatwoman office that handles exclusively computer crimes. My job also entails serving as CID'sliaison officer for NETCOM. Additionally,Iam the liaison officer to the Regional Computer Emergency ResponseTeam(RCERT CONUS) and to theTheater Network Operations and Security Center (TNOSC). lhave served in Arizona as an SA for five years andlhave been the SACforthreeofthefiveyears. 2. Froml986 1999,Iwas an enlisted Military Police oflicer (MP). Iserved as an Evidence Custodian forthe Investigation Section at Fort Lewis,Washington from 1993-1994. After becomingaCID agent in 1999,from 1999-2002,Iserved as the Computer Crimes Coordinator for the ^th MP Baftalion in !^aiserslaughtem, Germany. Iwas also the Evidence Custodian for the !^aiserslaughtem CID Office from 2001 2002. Iserved as the Detachment Sergeant and as an Evidence Custodian from 200^-2006 at CCIU on Fort Belvoir,Virginia. In2007,Iwasan INSCOM contractor performing forensics for the Army'sComputer Emergency ResponseTeam (Army CERT) in the Forensics and Malware Analysis department. Ibecameacivilian Special Agent in Arizona in 2008, and currently serve in this capacify. 3. IreceivedaB^chelorofScience degree in Liberal Arts from Regents College located in New York. lhave had extensive training in evidence collection and handling.This includes having attended thel7week Apprentice Special Agents Course. lhave also aftended the Advanced Crime Scene Investigation class atFort LeonardWood and the SALTSpecial Agent Course at the Army Crime Lab located atFort Gillem, Georgia. In terms of computer and forensic fraining,! have taken numerous courses at the Defense Cyber InvestigativeTraining Academy in Linthicum, Maryland. Itook these courses between the years 2000 and 2008. They coveredafull range of computer forensics and digital media collection issues. Between 2003 and 2006,Iattended two courses at Guidance Software in Reston,Virginia. This company manufactures the forensic imaging software EnCase. In 2012,Iattended the Federal Law Enforcement Training Center Computer Network Intrusion Training program in Glynco, Georgia. These courses all discussed the collection and handling of digital evidence. ^. IhaveaDepartmentofDefense Cyber Crime Investigation Certificate from the Department of Defense Cyber Crime Center,which is the highest certification that one can receive in the field. PROSECUTION E X I ^ ^ ^ i T ^ ^ l ^ r i d ^ n t ^ c ^ ^ ^ ^ PAGEOFFEREO^ ^PAGEAO^^T^^^^^ PAG^ OP PAGE^

The certification must be renewed every two years. Ireceived my first certification in 2006 and last renewed it in October of2012. In addition to my training and certifications,Ihave worked more thanlOO cases in my current duty position and somewhere betweenlOO-200 cases in my previous capacities. ^. Ifollow several general procedures when handling evidence. Ireview the custody document and always ensure the description ofthe evidence matches the evidence aftached. Icheck, for example, that recorded serial numbers, markings for identification, and condition description match the associated evidence. lensure that the appropriate information, such as date and time, are properly and accurately recorded. Lastly,Imaintain secure custody ofthe evidence prior to transferring it to another individual. 6. In this particular investigation,Iworked with SAAntonio Edwards and assisted with witness interviews and the handling ofevidence. On 12 June 2010,Ireceived evidence related to this investigation from SA Edwards. lalso received two Consent to Search forms(CID Forms 87RE), signed by Mr.Adrian Lamo on 12 June 2010,which gave signed consent to law enforcement personnel to search his electronic devices for "l^ajll information in any form, pertaining to communications which may be in the form: ofemails, instant messaging chats, documents, data, computer code, log files, drawings, photographs, or any other data-in encrypted, plain text, or any other format-relating to PFC Bradley E.MANNING and^or the disclosureof classified information or information which is the property oftheU.S.Govemment." The first piece of evidence collected and further handled wasaLenovo Laptop computer withaFti^itsu computer hard drive(serial number: ^^0^T812MF4D)recordedasItemlonaDAForm4137,markedas document number (DN) 76-10, and known as "Lamo Ubuntu Hard Drive". It was collected from Mr.Adrian Lamo in Sacramento, California on 12 June 2010. The second piece ofevidence collected and further handled was an HP Mini Brand computer(computer serial number: CNU90^13VT)withaSeagate computer hard drive(serial number: ^RE2C1(^!^) recorded as ItemlonaDAForm4I37,marked as document number (DN) 7710, and known as ^Tamo HP Hard Drive". It was collected from Mr. Adrian Lamo in Carmichael, California on 12 June 2010. 7. limaged both pieces of evidence using standard forensic imaging sofl^are,which does not alterthe original evidence in any way. Aforensic image isabit-for-bit or exact copy ofthe original information on the hard drive. Using theDAForm4137,Iproperly released the original evidence back to SA Edwards on l^June 2010. While in possession of these items,Imaintained control over them. Iretumed the items in the same condition thatlreceived them and have no reason to believe that the evidence was damaged or contaminated in any way. After releasing the evidence to SAEdwards,Ihad no fiirther interaction with the evidence.

.^^^^^^^^^^^^^^^^^^.^.^^.^

ANGELM^VERGAARO CPT,JA Assistant Trial Counsel

THOMASFHURLEY MAJ,JA Defense Counsel

BRADL^YEMANNlNG PFC, USA Accused

UNITEDSTATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Mr.GaronYoung DATED: ^June2013

Manning, Bradley E. PFC,U.S.Arniiy, HHC, U.S. Arn^y Garrison, JointBaseMyerHendersonHall FortMyer,Virginia 22211

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifMr. GaronYoung were present to testify during the merits and pre-sentencing phases ofthis courtmartial, he would testify substantially as follows: 1. lam currently the Criminal Intelligence Program Manager for theU.S.Army Computer Crime Investigative Unit(CCIU) ofthe Criminal Investigative Division(CID). lhave been with CCIU for lOyears. This position primarily entails reviewing cases for intelligence data and entering them into our database. Additionally,Ireview reports, serve as the security manager, and act as alternate evidence custodian. lhave held this position for lOyears. 2. lhave an Associate'sdegree from CentralTexas College and began my law enforcement career in 1980 asaMilitary Policeman. In 1987IbecameaMilitary Police Investigator. From 1989 tol992,Iwas the Chief oflnvestigationsinWuerzburg, Germany. During this time(1989 ^1991),Iwas also the evidence custodian. Ijoined CID in 1993 and from 1994 tol995 was the alternate evidence custodian while stationed in !^orea. From 1995 to 1998,Iwas the detachment sergeant atFort LeonardWood. In this capacity,Iwas the senior enlisted advisor and primary evidence custodian. From 1998 untillretired in 2000,Iworked at CID Headquarters on Fort Belvoir. After3yearsofworking for the Florida Department ofRevenue, in 2003,Iretumed to criminal investigations by joining CCIU. lhave worked in my current position since then^ serving from 2003 to 2006 as the altemate and occasionally primary evidence custodian at various times. Throughout my years in law enforcement,Ihave worked more than 800 cases. 3. In 1996,Itook the Medical Legal Death InvestigationsTraining by the Armed Forces Institute ofPathoIogy held at Fort Lewis. In 2005,laftended the Evidence Management Course at the United States Army Crime Lab inFortGiIIem,GA. And in 2007,Iretumed to Fort Gillem for the Army Crime Lab'sSpecial Agent LaboratoryTraining. These courses do cover physical and digital evidence collection and handling. 4. Ifollow several general procedures when handling evidence as evidence custodian. The first timelreceiveapiece of evidencelcheck the accompanyingDAForm4137 evidence custody document to make sure the evidence matches the description and that the marked-foridentification number on the evidence matches what is recorded on the form. lalso check to make sure the form has been appropriately filled out. Whenlsign the evidence into the evidence room,Isign in the ^^received" column. Ithen log it in the evidence book and the database before placing it in the evidence room. When someone asks to receiveastored piece of evidence,lpull the voucher number and locate the evidence in its appropriate location. Icheck to make sure the evidencelam handing over matches the description on the form and thenlrelease it to the

PROSECUTIONEXHIBIT^^forid^ification PAGEOFFERED: ^PAGEADMi^ED: PAGE OF PAGES

Special Agent or Forensic Examiner who has requested it. Isign thatlhave released it and the individual receiving it signs that(s)he has received it. Each timelrelinquish or assume custody of evidence,Icheck the description to make sure the evidence being transferred matches the forms used to transfer it. 5. In my capacity as evidence custodianlhave worked with SA^irk Ellis, SAAntonio Edwards, and Ms.TamaraMairena. When Ms.Mairena came on board as the primary evidence custodian,Itrainedher. She works as the primary andlas the altemate evidence custodian. It is normal for her to sign evidence out ofthe evidence room and for me to sign it back in(or vice versa). 6. lam involved in the present case because ofmyrole in assisting the investigation team with the secure storage ofthe evidence they collect. lhave received evidence from both SA Edwards andSAEllis 7. On 15 June 2010,Ireceived evidence related to this investigation from SA Edwards. Itook custody ofaLenovo Laptop computerwithaFti^itsu computer hard drive(serial number: 1^404T812MF4D), collectedfromMr.AdrianLamo while in Sacramento, CA on 12June 2010, recorded as Item1onaDAForm4137 marked as document number (DN) 7610, and knov^ as: "Lamo Ubuntu Harddrive". lalso took custody of an HP Mini Brand computer(computer serial number: CNU90513VT)withaSeagate computer hard drive (hard drive serial number: 5RE2C1(^!^), collected from Mr. Adrian Lamo in Carmichael, CA on 12 June 2010, recorded as ItemlonaDAForm4137 marked as DN 77-10, and known as "Lamo HP Harddrive". Upon taking possession ofthis evidencellogged it in to the evidence room using the proper proceduresljust described. Inever logged it back out. 8. On 15 June 2010,Ialso received evidence related to this investigation from SA Ellis. Itook custody ofaDVD(Marked"0028 I0cid22II0117DeptofStateServerLogs, 199 56 188.73"), seized from the Department ofState on 15 June 2010, recorded as ItemlonaDAForm4137 marked as DN 78 10, and knov^ as ^^DoS Server Logs". Upon taking possession ofthis evidence,Ilogged it into the evidence room using the properproceduresldescribed earlier. I never logged it back out.

^^^^^^^^^

^^^^^^^^

ASHDENFEIN MAJ,JA Trial Counsel

THOMASFHURLEY MAJ,JA Defense Counsel

BRA PFC, USA Accused

UNITED STATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Manning, Bradley E. PFC,U.S.Arn^y, HHC, U.S. Arn^y Garrison, JointBaseMyerHendersonHall Fort Myer, Virginia 22211 Ms. Tan^ara Mairena DATED: ^ June2013

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifMs. Tamara Mairena were present to testify during the merits and pre-sentencing phases ofthis court martial, he would testify substantially as follows: 1. lam the primary evidence custodian at the Computer Crimes Investigative Unit(CCIU) of the U.S.Army Criminal Investigation Command(CID)in^uantico,Virginia. lhave held this position since 2006. In this position,Itrack and catalog evidence maintained by our CCIU office. 2. lhave beenaCertified Evidence Custodian since January of2006. Ireceived this certification from theU.S.Army Criminal Investigation Laboratory. Since January 2010,Ihav^e also beenaDepartmentofDefense(DOD)CyberInvestigationsTrainingAcademy certified digital media collector. 3. Ifollow several general procedures when handling evidence as evidence custodian. The first timelreceiveapiece of evidence,Icheck the accompanyingDAForm4137 evidence custody document to make sure the evidence matches the description and that the marked-foridentification number on the evidence matches what is recorded on the form. lalso check to make sure the form has been appropriately filled out. Whenlsign the evidence into the evidence room,Isign in the "received" column. Ithen log it in the evidence book and the database before placing it in the evidence room. When someone asks to receiveastored piece of evidence,Ipull the voucher number and locate the evidence in its appropriate location. Icheck to make sure the evidencelam handing over matches the description on the form and thenlrelease it to the Special Agent or Forensic Examiner who has requested it. Isign thatlhave released it and the individual receiving it signs that(s)he has received it. Each timelrelinquish or assume custody of evidence,Icheck the description to make sure the evidence being transferred matches the forms used to transfer it. 4. Ifirst became involved in the present case because ofmyrole in assisting the investigation team with the secure storage ofevidence they collect. Isigned several pieces of evidence from the investigating agents and forensic examiners into the evidence room and would release evidence back to them when they needed it fortheir investigation or examinations. In my role as evidence custodian,Ihave worked with and received evidence from Special Agent ^irk Ellis, Special Agent Antonio Edwards, Special Agent David Shaver, Special Agent Calder Robertson, Special Agent JohnWilbur, and Special Agent Mark Mander. lalso know Mr. GaronYoung. He used to be the primary evidence custodian and trained me whenlbegan working for Army PROSECUTION EXHIBIT 2.1 for idegRfication PAGE OFFERED: PAGE ADMITTED:

PAGE

OF

PAGES

CCIU. Mr.Young currently serves as the altemate evidence custodian. As such, it is normal for him to sign something out ofthe evidence room and for me to sign it back in(or vice versa). 5. OnI8June2010,IsignedaLenovo laptop computer with Fujitsu computer hard drive(serial number: ^404T812MF4D), collected from Mr.Adrian Lamo in Sacramento, Califomia on 12 June 2010, recorded as ItemlonaDAForm4137 marked as document number (DN) 7610, and knov^ as "Lamo Ubuntu Harddrive" out ofthe evidence room to SA Dave Shaver for forensic examination. lalso signed out an HP Mini Brand computer(computer serial number: CNU905I3VT)withSeagateharddrive(serialnumber:5RE2CI(^I^),collectedfromMr Adrian Lamo in Carmichael, California on 12 June 2010, recorded as ItemlonaDAForm 4137,marked as DN 77-10, and known as "Lamo HP Harddrive" to SA Shaver forthe same reason. He retumed these items later that same day. Ireceived and released this evidence according to the proper proceduresljust described. Idid not alter this evidence in any way. 6. On18October2010,Ireceived evidence related to this investigation from SAWilbur, recorded as ItemlonaDAForm4137 marked as DN 151-10. Itook custody ofaCD(marked "WikileaksDoS Firewall Logsl30ctlO") collected from the Department ofState on 15 October 2010, and known as "DoS Firewall Logs". Upon receiving this evidence,Iproperly logged it into the evidence room using the same procedures described earlier. OnlNovember 2010,Iproperly released it to SA Shaver for examination. He retumed it later that same day. I received and released this evidence according to the properproceduresldescribed earlier. Idid not alter this evidence in any way. 7. On3November2010,Ireceived nineteen pieces of evidence from SA Mander, collected from the home ofMs.DebraVanAlystne in Potomac, Maryland on2November 2010, recorded asltemsl 19onaDAForm4137 marked as DN 162 10. Item2onthisDAForm4137wasan SDmemory card(seriaInumber:BE0915514353G), known as "SDCard"On10December 2010,Iproper1y released the "SD Card" to SA Shaver for examination. He retumed it laterthat same day. Iproperly received the evidence back in to the evidence room according to the proper proceduresldescribed earlier. Idid not alter this evidence in any way.

ANGEL M./UVERGAARD CPT, JA Assistant Trial Counsel

THOMAS F. HURLEY MAJ, JA Defense Counsel

BRADlMY E. MAI PFC, USA Accused

Prosecution Exhibit 30 50 pages classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

IN

J i r

^1!
Vl

!! (
js !

m mi
III!
i - 1 ?i

^a;:

ii n,
_w
O

DO

hi

/ ^ ^

8
0051: 7869

PROSECUTION EXHIBIT J i for idcimfication PAGE OFFERED: PAGE ADMITTED: PAGE OF PAGES

s:
CL CO LO

C J

Offs 37870

^
^ ^ f^ ^ ^ ^

^ ^ ^ ^
^

L^ ;:::;i

iB:i ..^^^^i^^i^i^^

1^

^ ^ ^ ^ ^ ^ ^ ^ ^ ^^^^^ ^

^ ^ ^ ^ ^ ^ n ^ im ^

^ ^ ^ fPO-^'^'"''' Pr : C:\

^^^^I^B

ManningB_00504479

PAGE

> >S
DOO m tn

-C3 -0

On

CL

^ o
bO

ro

S
iS"

B
l
S ||
3 I I aI i E i

.
<S I

: % f 2;

11! Si-" ill ill


I*
4J
e i!

3 2 -

ill iii
^JS

Ill I i m$ I
s j

^i:

II
! *
i* %
I
E

#i! M

is'i 8 Nf; i*e


SRS

lit ill
:IS

!i

#1
:

8gR;

IS

#i3 *i ggU ; *!

iii;

00527871

PROSECUTION EXHIBIT 31-for id^ PAGE OFFERED: PAGE ADMI5 PAGE OF PAGES ED:

J.t

LO r\j LO ) Tiro
VCN

CO

^ ^
^^^^^^^^i^^^^^^-^in^^^^^^^

w*' 'mm

m w
ID LD M 00

'4%

O m
3

Ul M
4_

ro +-'
LO
Jad!

ro
(U

3
o
U (U

'HitM^i CI
4_(

!L*Ai' ' '

MannlngB_00504480

PRO'^^'"~'" PAGEGry-;iHGPAGE OF

Tr^lB:-!^

O^

Draft:The Most Wanted Leaks of 2009-sort - WikiLeaks

Page 1 of 12

DraftiThe Most Wanted Leaks of 2009-sort


From WikiLeaks Jump to: navigation, search Somewhat sorted entries of the most-wanted list. Work in progress, TODO: Add brief, entity and date for each entry.

Contents
[hide] 1 Austria 2 Australia 3 Bahrain 4 Belgium 5 China 6 Colombia 7 Finland 8 France 9 Germany 10 Greece 11 Guatemala 12 Italy 13 Kenya 14 Libya 15 Madagascar 16 Mali 17 Mexico 18 Niger 19 Norway 20 Poland 21 Puerto Rico 22 Rwanda 23 Russia 24 Slovenia 25 Sudan 26 Syria 27 Switzerland 28 Swaziland 29 Trinidad and Tobago 30 Uganda 31 United Kingdom 32 United Nations 33 United States 34 Vatican 35 International organizations

1 . 1
F Q

it 4 tz
t<=

CO

Ul

Austria

UJ LU U] O Austrian e-Voting system used in students elections. a: " Date: 18 May 2009 CL " Brief: We seek for details about Austrian voting system used in students elections, which includes but is not limited to source code and certifications. " Entity: Scytl (programming) " Entity: Austrian Federal Computation Center (hosting) Entity: Ministry of Science (initiator) " Entity: Robert Krimmer (consulting) E-Mail traffic between Josef Proll and Christian Konrad. > Date: ??? Brief: E-Mail traffic between minister of finance Josef Proll and Christian Konrad, who is advocate general of Raiffeisen bank.

z ta tt. O O X F D tu uO

X Q u OJ

I 1

00527888
http://wikileaks.Org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01, 2013 15:39:36 PM

DraWhe MOS. wanted Leaks of 2 0 ^ . W i k , L e a k s


" Entity: Josef Proll (josefproell(g^Blgv.at) " Entity: Christian Konrad

Page2on2

E-Mail traffic of Anton Mahdalik with Michael Haupl and/or Michael Ludwig - Date:??? " Brief: E-Mail traffic of FPO delegate Anton Mahdalik with Viennese mayor Michael Haupl and/or deputy mayor Michael Ludwig containing threats when renting municipal ground to the Viennese traitor park ("Wagenplatz Wien"). ' Entity: Anton Mahdalik (toni.mahdalik@^oe.at) " Entity: Michael Haupl (michael.haeupl@wien.gv.at)

Australia
ACMA URL blacklist " Date: 19 March 2009 and later " Brief: Versions of the ACMA URL blacklist newer than 19 March 2009. WikiLeaks previously released three versions of the list, two of which included WikiLeaks or its subpages. " Entity: Australian Communications and Media Authority Censorship technology in Australia ' Date: 2009 Entity: Australian Communications and Media Authority " Entity: Enex Testlabs " Entity: Watchdog NZ " Entity: [www.iwf.org.uk Internet Watch Foundation] " Entity: Exetel ISP " Brief: Full details of filtering hardware/software vendors participating in government-sponsored ISP-level censorship technology trials, including (but not limited to): Any and all communications between filter vendors and govemment departments prior to, during, and after the trials Any and all transactions, contracts, and otherfinancialarrangements involving filter vendors Details: URL blacklist(s) used during above trials. Alleged (by govemment) to be ACMA URL blacklist. Full statistical breakdown of results of above trials (in the event that Enex Testlabs do not make them publicly available). URL blacklist as used by Watchdog NZ during private censorship technology trial by ISP Exetel in May 2009. Alleged (by Watchdog) to have been IWF list (see United Kingdom). Full statistical breakdown of results of Watchdog/Exetel's censorship technology trial - Exetel's official response seems lacking. Annual NSW Police test " Brief: Written exam NSW police officers must take annually before they can be issued with Tasers. " Entity: NSW Police

Bahrain
Documents regarding changes to country's demography. " Brief: Documents disclosing the number of citizenships that have been granted in the last few years, in an effort to change the country's demography. See Political naturalisation! 11.

Belgium
Document regarding quality audits of Belgian hospitals Brief: Documents disclosing the fatality rates of specific procedures and illnesses per hospital. Indicating statistically significant differences in survival chances between hospitals.

China
Golden Shield Project " Brief: A list of URLs and keywords censored filtered by the Golden Shield Project (Great Firewall of China). WikiLeaks has previously released related information, for example, watch lists, policies and several thousand URLs for CCTV and Baidu, but not for general http filtering. " Entity: Ministry of public security Genocide Olympics campaign Date: 28th March 2007 " Brief: Policy options on Darfur formulated in response to the so-called Genocide Olympics campaign led by American actress, Mia Farrow, and notes of meetings in 2007 between Stephen Spielberg and Chinese Foreign Ministry officials prior to Spielberg's resignation as Artistic Director of the 2008 Beijing Olympics.

00527889
http://wikileaks.Org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort

^
Sattirday, June 01, 2013 15:39:36 PM

Draft:The Most Wanted Leaks of 2009^sort - WikiLeaks

Page 3 of 12

Colombia
Surveillance of citizens and organisations Brief: The DAS (Departamento Administrativo de Seguridad) is reported to have surveilled a wide array of public officials, private citizens, and organizations. Documents wanted: contracts to supply software for internet surveillance to Colombian policy agencies and details of the software supplied. o Entity: DAS

Finland
Tiitisen Lista Brief: The so called Tiitisen Lista, the list of 18 persons claimed to have been in active contact with East German security services (Stasi). The list was received from the West German intelligence services (BND) in 1990 and since classified by the order of President Koivisto as adviced by the head of the Finnish Security Police (Suojelupoliisi), Seppo Tiitinen. It is rumoured that several current or former top Finnish politicians appear on the list. Entity: Stasi " Entity: Koivisto Entity: Suojelupoliisi

France
Nicholas Sarkozy' health report Brief: The Monthly Health Report of President Nicolas Sarkozy, as promised by himself during the last presidential elections.

Germany
Censorship in Germany o Details: The censorship filter list for the proposed national, mandatory censorship system. The list will be compiled by German federal criminal police BKA and distributed to intemet service providers. The contents of the contract between the BKA and some ISPs that has already been signed, but is kept secret due to "public safety" and copyright concerns (see http://blog.fefe.de/?ts=b4fa8af8). The List of Media Harmful to Young People (the censorship system already in place). The "virtual media" part of this list is distributed to search engine providers and is illegal to publish. It probably could be reverse engineered using the differences between google.com and google.de search results. Also, if you want to know if a specific medium is on the list, you can send an enquiry to listefS.bundespruefstelle.de ("Bundesprufstelle" is the agency responsible for keeping the list). Entity: Bundesprufstelle Entity: BKA Politician's Stasi files The Stasi files of Federal Chancellor Angela Dorothea Merkel (maiden name Kasner) and other leading politicians, which are known to exist, but withheld from public Operation Gladio o Brief: The Stasi files relating to operation Gladio / stay behind organisations in relation to right-wing terrorism in Germany, as per a parliamentary request by the Green party. Atlas Der Wut o Brief: The so called "Atlas der Wut", a document about the risk of riots in different german regions. The list is said to be updated regulary and was first written in 2005. The list of NPD party members

Greece
The Athens Affair Brief: Documents related to the Athens phone tapping affair that have yet to be released (including those from countries other than Greece) Context

Guatemala
Plan Victoria 82, Plan Sofia and Plan Fermeza 83 Brief: All documents on Plan Victoria 82, Plan Sofia and Plan Firmeza 83. " Detail:

00527890
http://wikileaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Saturday, June 01, 2013 15:39:36 PM

Draft:The Most Wanted Leaks of 2009-sort - WikiLeaks

Page 4 of 12

Within the process of trying to b ^ ^ ^ i l i t a r y personal involved in human rights violai^^^nd massacres that happen during the civil war in Guatemala to justice, the rmUtary have been required to declassify many war documents. In a case, that went all the way to the Supreme Court of Guatemala, the Court dictated a sentence that confirmed the obligation of the Ministry of Defense of Guatemala to hand over the official documentation of four specific military operations: Campana Sofia 82, Victoria 82, Firmeza 83 and Operacion Ixil. The Supreme Court sentence indicated that the archives had to be declassified. These military operations were carried out in the 80s. According to the CEH, Historical Clarification Commission of Guatemala final report contained in "Guatemala: Memory of Silence", these military operations resulted in massacres and severe human rights violations. The Minister of Defense Abraham Valenzuela only delivered partial information about plans Victoria 82 and Firmeza 83, two of the four requested plans. He indicated that he had no knowledge of the other two plans before he became Minister of Defense and that he ignores where the documentation could be. He stated that he could not deliver the complete plans "Victoria 82" y "Firmeza 83" because certain information was considered state secret and a concern of national security. "Plan Sofia", a derivative of "Plan Victoria 82", was of special concern to human rights activists; this plan was conceived in July 1982, four months after General Efrain Rios Montt came into power. The CEH archives Brief: Final report of United Nations' Historical Clarification Commission (CEH) into the killing of 200,000 Mayan people and the involvement ofthe US govemment and American corporations. The report official sources (military interviews, campaign plans, etc) are kept secret by the UN in NYC. Detail: The United Nations' Historical Clarification Commission (CEH) for Guatemala issued a report where the US govemment and several American corporations were accused of complicity in the genocide of nearly 200,000 Mayan people during Guatemala?s bloody 36-year civil war. The final 3,600-page CEH report cleariy places the blame for most of the 200,000 deaths on the "racist" policy of the Guatemalan govemment and holds the country?s military and paramilitary forces responsible for the actual killings, tortures and disappearances. However, it accuses the US of directly and indirectly supporting a "fratricidal confrontation" by providing sustained training, arms and financial aidThe report is based on the testimony of 9,200 people from all sides of the conflict and other documents*, classified and Secret, protected in the UN headquarters in NYC. The CEH investigated 42,000 human rights violations, 29,000 of which resulted in deaths or disappearances and therefore, the documents under UN custody are fundamental for the prosecution of those responsible of the crimes. Goldcorp affair " Brief: * Documents on Canadian corporation named Goldcorp with a mining operation in Guatemala, especially information on where the Gold they extract is processed and who is buying the gold (we think it might be a Swiss company). Detail: A Canadian corporation named Goldcorp has a mining operation in Guatemala with poor environmental conditions and harming health of many workers and a community as a whole. Where the Gold they extract is processed? Who is buying the gold (we think it might be a Swiss company)?

Italy
Italian censorship list - Brief: The f u l l Italian censorship, of which Wikileaks currently only has a subset.

Kenya
Reports on high level corruption in Kibaki government " Brief: The international investigative firm Kroll associates produced at least four reports on high level Kenyan corruption after first term of the Kibaki govemment. A draft version of one of the reports The looting of Kenya, was previously published by WikiLeaks. The reports were given to selected members of President Kibaki's cabinet at the time and are likely still held by http://www.kroll.com.uk/. notably lead investigator Andrew Marshall. " Entity: President Kibaki " Entity: Kroll

Libya
Arrangements with the Sudanese government Brief: Documents indicating arrangements with the Sudanese govemment to grant land in Darftir to Arab settlers from Libya (Civilians and adminisrators on the gruond in Darfur indicate this has been taking place).

Madagascar
Both sides ofthe political conflict in Madagascar are crying fouls about the deals made by their counterparts with foreign entities. The release of the official documents with respect to confract negotiations about:

00527891
http://wikileaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01,2013 15:39:36 PM

Draft:The Most Wanted Leaks of 2009=sort ) 0 ^ c - WikiLeaks

Page 5 of 12

Oil exploitation in the region of Bemon^y( j ^ P South of Madagascar) by Total & others Detail: Oil and Gas in Madagascar - Industry Overview, infos on Total licensing an obvious one but the proposed final contract before rejection of the land deal with Daewoo Logistics. The recent agreement with Saudi investment group on staple products and proposed $2 billion USD investment. The revised mining exploitation agreement with Sheritt in Ambatovy and Rio Tinto in Fort-Dauphin. Least but not last, the complete list of current political prisoners and the charges against them.

Mali
Arrangements with the Sudanese government Brief: Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers from Mali (Civilians and adminisrators on the gruond in Darfur indicate this has been taking place).

Mexico
Agreements between USA and Peter Herlihy Brief: Zapotec indigenous people demand transparency from U.S. Scholar and frill disclosure of all the agreements between U.S. Govemment and their agencies and U.S. geography scholar Peter Herlihy, especially confidential agreements with Foreign Military Studies Office. Prof Herlihy failed to mention that he received fiinding from the Foreign Military Studies Office of the U.S. Armed Forces on the research of "Mexico Indigena" project. Mexico Indigena Project forms part of the Bowman Expeditions, a more extensive geographic research project backed and financed by the FMSO, among other institutions. The FMSO inputs information into a global database that forms an integral part of the Human Terrain System (HTS), a United States Army counterinsurgency sfrategy designed by Foreign Military Studies Office and applied within indigenous communities, among others. " Entity: FMSO " Entity: Peter Herlihy Ruta Maya 2002 Isuzu Challenge Brief Documents to unveil the real purpose of "Ruta Maya 2002 Isuzu Challenge". The convoy was commanded by Ben Nun Avihu, Israeli militar and Moshe Savir, geography expert and around 50 tourists in 40 Isuzu Jeep. Some communities linked the incursion with biopiracy. The terrain they explored is controled by the EZLN. " Entity: Ben Nun Avihu Entity: Moshe Savir Entity: EZLN Corruption around FOBAPROA " Brief Documents related with the fraud and cormption around FOBAPROA (Fondo Bancario de Proteccion al Ahorro). - Entity: FOBAPROA 12 Financial operations before crisis " Documents offinancialoperations just before the financial crisis of 1994 (some say the govemment knew before that the crisis was coming and took advantage of the information protecting their interests). World Bank credit " Brief Documents related with the World Bank credit and application of the budget to combat swine flu. ' Entity: World Bank Renault program Brief Documents related with the technology currently used in cellphones in Mexico to implement the RENAUT program Information about the security technology used to protect data collected from users. Plan Merida " Brief Documents related to the transparency of Plan Merida

Niger
Arrangements with the Sudanese government " Brief Documents indicating arrangements with the Sudanese government to grant land in Darfiir to Arab settlers from Niger (Civilians and adminisrators on the gmond in Darfur indicate this has been taking place).

Norway
Court case between Lyse Tele and Simonsen Brief The secret verdict in the court case between the ISP Lyse Tele and the law firm Simonsen, decided the 5th of May 2009, where Simonsen demanded Lyse Tele disclose the identity information of a file sharer suspected of uploading a copy of the movie Max Manus to thefile-sharingcommunity. Entity: Lyse Tele Entity: Simonsen.

00527892
http://wikileaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01, 2013 15:39:36 PM

Draft:The Most Wanted Leaks of 2009j^sort - WikiLeaks

Page 6 of 12

Poland
IPN Files o Brief: IPN (Instytut Pami^ci Narodowej) is an organisation created for investigation and gathering of informations regarding crimes against polish citizens in the timeline of 22 july 1944 to 31 december 1989. Gathered documents are often related to politicans, highranked military, priests et cetera, but for some reason are not available for anyone; they are instead used as political weapon against one's enemies, revealing working as an agent for SB (Stuzba Bezpieczenstwa) in the above timeline. For two main reasons ALL data should be available FOR ANYONE. First, it would no longer be used as political weapon; second, all people would know about past of all public people. Transparency is the key for healthy govemment. Entity: IPN 0 Entity: SB

Puerto Rico
FBI surveillance of Puerto Rico citizens Brief The FBI has not yet finished declassifying all the secret files related to surveillance of Puerto Rican individuals and organizations from the 1930-70's http://www.pr-secretfiles.net/index.htnil (not to mention, large sections of the files are blacked out by the FBI). In addition, there are thousands of secret files produced by Puerto Rican police that were only briefly made available to individuals themselves, and have now been closed off to the public. These documents provide evidence of quite a significant spying and intimidation operation by the United States and local police against leftists and independence movement leaders. " Entity: FBI

Rwanda
Financial aid for Laurant Nkunda " Brief Documentation offinancialassistance given by the Rwandan government to General Laurant Nkunda for operations in the DRC. Entity: Laurent Nkunda

Russia
VRVAN crisis documentation Brief Documents related to the VRYAN crisis, especially political documents, analyses of intelligence, and specific steps taken. Information on the mindset of the Politburo, as well as intelligence services, and what exactly they feared, and how credible they believed their fear to be. Maps for Kremlin and military hideouts " Brief Maps, floor plans, and blueprints of Mount Yamantaw and Kosvinsky Mountain. Technology analysis Brief Technical plans, manuals, and blueprints for the SS-27 Sickle B (Topol-M), along with the Bulava. " Brief: Documents relating to nuclear warplans of the Soviet Union and Russia. Brief: Documents relating to orbital weapons systems, and whether the Soviets ever deployed them (or still deploy them) such as orbital HANE devices. Brief: A list and description ofthe various agents prepared by the various Soviet and Russian bioweapons programs. Indications of whether they developed recombinant DNA based agents, and what those are specifically. Weaponization of agents, including re-entry vehicle mounting. Doctrine for use, including deniable use. Vaccines and treatments for affected personnel.

Slovenia
Taped conversations between Slovenian opposition leader and Croatian PM " Brief Taped conversations between Slovenian opposition leader Janez Jansa and Croatian prime minister Ivo Sanader, recorded by Slovenian intelligence service SOVA. " Date: Summer 2004 " Entity: Janez Jansa Entity: Ivo Sanader " Entity: SOVA

Sudan
Salah Gosh and the CIA Date: 2005 Documents detailing discussions during 2005 meeting between Salah Gosh and the CIA (for which the CIA flew Gosh on private jet from Khartoum to CIA HQ). See: http://www.sudantribune.com/article.php3?id article^ 10205 Mali case

00527893
http://wikileaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort

1^^^
Sattirday, June 01, 2013 15:39:36 PM

Draft:TheMostWantedLeaksof200^ort WikiLeaks

Page7ofl2

^ Brief Documents indicating arra^^ients with the Sudanese govemment to grant lan^^Jarfrir to Arab settlers from Mali(Civilians and adminisrators on the gruond in Darfur indicate this has been taking place). ^ Libya case ^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers from Libya(Civilians and adminisrators on the gruond in Darftjr indicate this has been taking place). ^ Niger case ^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlersfromNiger(Civilians and adminisrators on the gruond in Darftir indicate this has been taking place).

Syria
^ AssasinationofMehdiBenBarka ^ Brief All the documents related to the assasination, in 1965,ofMehdi Ben Barka still held in France, USA, Israel and Morocco. In 1976, thanks to the Freedom ofinformation Act, the US govemement recognized that the CIA had aboutl800 classified documents about his assassination.Theses documents are still classified.

Switzerland
^ Gomu Report ^ B r i e f The frill ComuReportSeehttp://enwikipediaor^/wiki/Projekt26*The^Comu^Report

Swaziland
^ Expense accounts ofKing Mswati, the ^ueen Mother and the King's wives. ^ Memos from Ministry ofDefense or Police ^ Brief Intelligence memos from the Ministry ofDefence or Police about the prodemocracy organization, PUDEMO. ^ Entity: Pudemo ^ Entity: Ministry ofDefense

Trinidad andTobago
^Commission ofEnquiry reports ^ Brief The Report on the Commission ofEnquiry into the construction of the new PiarcoAirport.This identified corrupt practices in the spending of public funds.The Commission's report was delivered in August 2003.Nearly6years later, itsfindingshave not been made public. ^ Brief Report of thefindingsofthe current Ci^^^^,^,^^^^^^^^^^^^^^^^^^^^^^!^^^^^^^^^ ^ Entity: Commission Enquiry ^ Entity: Piarco airport ^ Caroni Bridge collapse ^ Brief The Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafew years ago; again the public has not been made aware ofthe report's findings.
^ Date^^n^August^^^S

^ Waterfront Development Project ^ Brief Acopy of the contract for the billiondollar Waterfront Development Project. ^Entity: ?udecott? ^Scholarshipssponsored by Ministry ofCulture ^ Brief: List of recipients and amounts of scholarships sponsored by Ministry of Culture for study abroad. ^ Entity: Ministry ofCulturc ^ Detail: As far asTrinidad andTobago goes, our government tends to pay lip service to the principles of transparency and accountability.For instance, there isaFreedom ofinformation Act which, by law,allows the public to seek information from govemment departments.But quite ofren,when such attempts are made by the citizenry,the govemment bars full disclosure.Depending on how importantapiece of information is to Joe Public, he may actually have to tum to the courts to "force" the govemment to reveal facts that should be disclosed voluntarily.Followingareafew examples of documents that should be made public, but have not been: ^ The Report on the Commission ofEnquiry into the construction ofthe new Piarco Airport This identified corrupt practices in the spending of public ftjnds The Cormnission's report was delivered in August 2003.Nearly6years later, itsfindingshave not been made public. ^ The Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafew years ago; again the public has not been made aware ofthe report's findings.

0052789^
http://wikiIcaks.Org/wiki/Draft:Thc Most Wanted_Leaks_of^2009 sort

^
Sattirday,June01,2013 15:39:36PM

Draft:The Most Wanted Leaks of 2009-sort - WikiLeaks

Page 8 of 12

The Opposition recently brought up i n ^ ^ ^ m e n t the issue of taxpayers' money being used attomeys by state. Although the public has a right to know how much of its funds were used in paying said attomeys, the Attomey General refiised to disclose the sums, saying it would be an invasion of the lawyers' privacy. The same goes for a recent request in Parliament, whereby *the Minister of Planning and Development was asked to produce a copy ofthe contract for the billion-dollar Waterfront Development Project*. The Minister's response was that she could not produce said confract for public discussion because there was a confidentiality clause contained therein (for a project being built with public funds). The Ministry of Culture recently awarded scholarships for students to study abroad - when asked in Parliament to disclose the list of recipients and the dollar value of the scholarships, the response was that this was private information.

Uganda
Ugandan profit-sharing agreements with oil companies in south-western Uganda Brief: The govemment of Uganda has recently signed a number of profit-sharing agreements with several oil companies that are conducting explorations in southwestem Uganda. Releasing these documents would be a major step in increasedfransparencywith respect to the country's emerging oil industry.

United Kingdom
Censorship in UK " Brief: List of current and expired D-Notices Entity: dnotice " Brief secret gag orders, injunctions and legal threats sent to UK newspapers Entity: legal contact addresses at the Guardian, Daily Mail, Times, Independent, Evening Standard, etc. " Brief Censorship list for the United Kingdom's "voluntary" filter system. Known to be held by The Intemet Watch Foundation. Companies and their subsidiaries which are currently being supplied with the IWF list. Most ISP's in the UK have a copy of the IP's on the list. ' Entity: The Intemet Watch Foundation Iraq war planning Brief The secret cabinet minutes and legal advice pertaining to the allegedly illegal war and ongoing occupation of Iraq. Roger Mollis surveillance Brief UK Govemment documentation into the investigation of Roger Hollis, head of MI5 between 1956 and 1965, including the report by Lord Trend, into the serious but apparently unproven allegations of being a Russian Spy. Entity: M15 Wythenshawe intelligence centre Brief Documents detailing the information stored and collected by the Wythenshawe intelligence cenfre. [2] Police surveillance on climate change protestors Brief A copy of the police intelligence handed to E ON about climate change protestors. 3] Entity: E ON MP expenses " Brief The full MP expenses data; how much the Telegraph paid for them. " Entity: Daily Telegraph Entity: UK Parliament Allan Cappelow murder Brief: Documents revealing why the trial of Wang Yam, who was convicted of killing Allan Chappelow, was held in camera, the first UK murder trial ever heard behind closed doors without access by press or publicMl Nationalisation of Northern Rock and Bradford & Bringley " Brief: The proper reasons for nationalisation of Northern Rock and Bradford & Bingley, and the subsequent sale of the latter's savings buisiness to Santander. " Brief Records of events during the twelve months leading up to the nationalisation of Bradford & Bingley. Brief: Information regarding the valuation process to determine compensation forfromershareholders of Northem Rock and Bradford & Bingley, that is, the information the independent valuer uses to determine the final value of the comapanies. Entity: B&B Entity: Northem Rock HBOS takeover " Brief Copies of govemment minutes of meetings between Gordon Brown and/or Alistair Darling and representatives of Lloyds Bank relating to the proposed takeover of HBOS. Investigation into Daveport Lyons Brief Documents from Solicitors Regulation Authority's investigation into Davenport Lyons threatening letters related to filesharing.

00527895
http://wiki1eaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01,2013 15:39:36 PM

Draft:The MostWanted Leaks of2009^ort WikiLeaks United Nations

Page9ofl2

^ Security Council and Darfur ^ Brief Requests to the Security Council in 2003 that the Security Council look at what was happening in Darfur, and any notes of discussions leading to the decision not to look at the situation. ^Date:2003 ^ Entity: UN Security Council

United States
Important bulk databases ^ Intellipedia ^ Brief Classified intelligence community site as ofll/1/2008, including article history. ^ opensource.gov ^ Brief: The complete CIA Open Source Center analytical database.The database is extensive, unclassified, nonpublic,but relatively accessible to certain outsiders afterjumping through hoops. Despite its name, you need to be govemment official to gain access to if ^ Entity: opensource.gov ^ Pacer database ^ Brief The completePACERdatabase.ThePACER database contains extensive US federal court records.They are public documents, currently behindapaywalL See http://arstechnica.com/techpolicy/news/2009/04/caseagainst-pacer.ars ^Entity: PACER Federal politics ^ ^ ^ ^ ^ ^ The missing five millionWhite House emails possibly no longer in existence. Chenney and Rumsfeld Archives The White House visitor's list Minutes or notes for VP Cheney's Energy Conference. Thell41 pages ofACTAbackground documents not released to the EFF by the USTradeRepresentatiye(see[51) Alist of all Whitehouse and senior federal govemment employees holding dual citizenship and the countries they represent.

Military and Intelligence ^TheSIOP ^OPLAN/CONPLAN 8022,2003 revision ^OPLAN/CONPLAN 8044, 2007 revision ^ ^ CIA detainee interrogation videos.While the CIA claims to have destroyed 92 of the videos, others are known to remain. ^ The US "Black Budget",from inception to present, with line items, hopefully annotated and explained. ^ Detainee abuse photos withheld by the Obama administration. ^WiretappingprogramledbyNSA ^ Brief Correspondence between the National Security Agency and American telecom companies such asAT^T,Verizon, and Qwest, regarding the warrantless wiretapping program.Correspondence involving telecoms who cooperated with the NSA(e.g.AT^T) may give different information than telecoms who refused(e.g. Qwest),but both types would better shed light on the NSA'sprogram.The existenceofthis correspondence is well documented in the media, for example that Qwest's lawyers refused to cooperate because the FlSAC:ourt had not signed off on it. ^Entity: NSA ^ Entity: Owest ^Entity:AT^T ^ Entity: Verizon ^ Unredacted copy ofDept of Justice's Office ofInspectorGeneral's"AReview of the FBI'sActions Connection With Allegations Raised By Confract Linguist Sibel Edmonds" July l,2004^redacted version here http://wwwwbez.org/FILES/sibel.pdf^ ^ Camp Delta(Guantanamo)Standard Operating Procedure 2005 2009. ^IraqUSArmyRulesofEngagement2007 2009(SECRET) ^ Unredacted Inquiry into theTreatmentofDetainees in USCustody.20Nov2008. ^ Memorandum between the CIA and the Departtnent ofState detailing any constraints on Darfr^policy caused by actual or anticipated Sudanese govemment cooperation on counter terrorism, including CIA request to USUN that Salah Gosh be removed from the UN Panel of Experts list ofthose recommended for sanction. See: http://www.sudantribune.com/article.php3?id article^l0205 ^ Department ofState and CIA confributions to the Obama Adminisfration's 2009 Sudan Policy Review,in particular with respect to: a) Whether to support the ICC arrest warrant against Sudanese President Bashir; b)whether to takeaconfrontational or an appeasement approach to the Sudanese govemment on the issue ofDarfrir. ^ Camp Delta(Guantanamo)Standard Operating Procedure 2005 2009. ^ Camp Delta(Guantanamo)Interrogation Standard Operating Procedure 2003 2009. ^ Correspondence between the National Security Agency and American telecom companies such asAT^T,Verizon, and Qwest, regarding the warrantless wiretapping program.Correspondence involving telecoms who cooperated with the NSA(e.g.AT^T) may give different information than telecoms who refused(e.g. Qwest), but both types would better shed light on the NSA's program. The existence ofthis correspondence is well documented in the media, for example that Qwest's lawyers refijsed to cooperate because the EISA Court had not

0^^^9^
http://wikileaks.org/wiki/Draft:The_MostWanted_Leaksof^2009 sort

^
Sattirday,June01,2013 15:39:36 PM

Draft:The Most Wanted Leaks of 2009-sort - WikiLeaks lU^O


Page 10 of 12

Iraq and Aflianistan US Army Rules ol^gkgement 2007-2009 (SECRET). 3^Np: CIA/DIA/NGA/NSA analyses of the VRYAN crisis of 1983. Technical specifications of the KH-11 and follow-on satellites with similar capabilities. The contents of the Football, and how they changed over the years during the different Administrations. What Pollard stole and gave to the Mossad, the ftill text. US psychological profiles and political analyses of Soviet leaders. Documents relating to orbital weapons systems, and whether the US ever deployed them (or sfill deploy them) such as orbital HANE devices. Information about the PAN satellite and the agency responsible for it http://spaceflightnow.com/news/n0905/26milspace/ Commander Directed Report of Investigation Conceming an Unauthorized Transfer of Nuclear Warheads Between Minot AFB, North Dakota and Barksdale AFB, Louisiana - 30 August 2007 (S//FRD//MR) Investigation into the Shipment of Sensitive Missile Components to Taiwan (ADM Donald Report) - 22 May 2008 (S//FRD//NOFORN) Air Force Comprehensive Assessment of Nuclear Sustainment (CANS) - July 2008 (S//FRD//NOFORN) General Order Number One issued by commanders in Iraq and Afghanistan Reports about Colombian 'falsos positives' Unredacted copy of Dept of Justice's Office of Inspector General's "A Review of the FBI's Actions Connection With Allegations Raised By Confract Linguist Sibel Edmonds" July 1, 2004 (redacted version here http://www.wbez.org/FILES/sibel.pdf) " All secret annexes for, attachments to, unredacted versions o f and documents implicitly or explicitly referenced in the following documents, which may be partially available in unclassified form: National Security Presidential Directive 51, "National Continuity Policy", May 9, 2007, also known as Homeland Security Presidential Directive 20 Federal Preparedness Circular 65, "Federal Executive Branch Continuity of Operations (COOP)", July 26, 1999 Federal Response Plan [FEMA 9230.1-PL], April 1999 Presidential Decision Directive 67, "Enduring Constitutional Govemment and Continuity of Govemment Operations", October 21, 1998 Presidential Decision Directive 63, "Critical Infrastmcture Protection (CIP)", May 22, 1998 Presidential Decision Directive 62, "Protection Against Unconventional Threats to the Homeland and Americans Overseas", May 22, 1998 FPC 65 Federal Response Planning Guidance 01-94, "Continuity of Operations (COOP)", December 4, 1994 FDD 67 National Security Directive 69, "Enduring Constitutional Govemment", June 2, 1992 FPC 65 Federal Preparedness Circular 61, "Emergency Succession to Key Positions of the Federal Departments and Agencies", August 2, 1991 Federal Preparedness Circular 62, "Delegation of Authorities for Emergency Situations", August I , 1991 Federal Preparedness Circular 60, "Continuity of the Executive Branch of the Federal Govemment at the Headquarters Level During National Security Emergencies", November 20,1990 National Security Directive 37, "Enduring Constitutional Govemment", April 18, 1990 Executtve Order 12656, "Assignment of Emergency Preparedness Responsibilities", November 18, 1988 Executive Order 12472, "Assignment of National Security and Emergency Preparedness Telecommunications Functions", April 3, 1984 NSD 69 NSDD 55, "Enduring National Leadership" September 14, 1982 Executive Order 12148, "Federal Emergency Management", July 20, 1979 " A list of the actual facilities in the Federal Relocation Arc, as of the present time, along with their locations. Blueprints, maps, and floor plans of MWEOC. Blueprints, maps, and floor plans of Site R (Raven Rock). Blueprints and floor plans of all unmentioned facilities in the Federal Relocation Arc, including historical ones.

Banking The complete list of identities of the 52,000 wealthy American clients suspected of hiding $15 billion at UBS to avoid taxes, including the names of any elected or appointed govemment or former govemment officials. The complete details of Goldman, Sachs & Co.'s counterparty exposure to AIG prior to the Federal bailout of AIG in September, 2008. Environment Monsanto's intemal evaluations of GMO products including safety and pollen drift. Media The Editorial Guidelines for Fox News Emails relating to suppressed GQ Magazine article on Putin's rise by Scott Anderson mentioned at [61 Religion Mormons Church records " With recent leak of 1999/2006 Church Handbook of Instructions, pertinent documents and covertly photographed artifacts in the vault at Church Office building or subsidy in Salt Lake City, Utah which expose and negate Mormon Church's claim of divinity and its monopoly on "truth." I.e. the concealed remnants of diaries and letters written by former early Mormon apostle William McLellin JT]. McLellin diary and documents was the main point of interest for convicted double murderer/bomber Mark Hofmann's planned forgery attempt to deceive Mormon leaders to obtain in fraud by deception monetary reward to suppress truth of early Mormon history unfavorable to current Mormon religion. For more info, 18].

00527897
http://wiki1eaks.Org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort

^
Sattirday, June 01,2013 15:39:36 PM

Draft:The Most WantedLeaksof2009 sort WikiLeaks

Pagellofl2

^ Documents ofMormonChurch'^^^ndollar investment in City Creek Mall and Co^^^^nium in SLC,which may put Mormon Church's IRS tax-exempt status in ^eopardy if there is verification of the allegation the Church used tithe and offering monetary confributions by the members to frind the projectunder the umbrella of tax exempted religious freedom. ^ Mormon Church leadership's involvement in politics, such as correspondence to ecclesiastical subordinates (bishopric)on policy and attitude towards same-sex civil rights^other sensitive issues relevant and conceming to the leaders.As well as recorded correspondences between Mormon members ofUtah legislation and Church leaders on sensitive political issuB^^^^^^^^^^es for legislation purposes which may confravene the separation ofchurch and state. ^ Uncovered film or audio recording featuring the play with the actor portraying Protestant minister encouraged by Satati/Lucifer (porfrayed by actor) to spread false docfrines to attack all religions outside ofMormon religion as "abominable" which was exhibited for qualified "temple recommend" audiences in all of the existing temples prior to removal in 1990(almost like leaked Scientology orientation video)|91. ^ Unearthed secret audio or video recording inside Mormon temple with the temple members swearing "blood oath" before removal in 1990 1101 ^Documented Churchleaders'andlayclergy'scoverupofphysical/sexualabuseandrapeofminorsbymissionariesandmembers without reporting to law enforcement in some cases[111. ^ Older editions of Church Handbooks oflnstmctions from the first edition up ]T2] for comparison to recent leakedl968(tmncated), I999and2006editions.

Vatican
^ Vatican secret archives ^ Brief The Index of the Vatican Secret Archive. At presentpre-screned scholars are allowed to see it butnot copy it(under scholar mle *I6http://asv.vatican.va^en^fond/amm.htm) ^Vatican'sdocumentsonnaziGermany ^ Brief B^^^documents pertaining to Nazi Germany and the Vatican, as well as those relating to the post-warrat line to Argentina. Refer to http://ncws.bbc.co.Uk/2/hi/europe/2611847.stm

International organisations
^ Bilderberg Group ^ Brief Bilderberg Group meeting minutes, papers and annual reports of since 1954.WikiLeaks has some years already.Bilderber^ is an annual off the record conference offransatlantic political, economic and ideological agenda setters. As an historically important confidential document collection it is probably only equaled by Cabinet minutes and high level intelligence and diplomatic assessments. Leads:There are some older, previously unnoticed records in boxes at Unioflllinois http://www.library.illinois.edu/archives/uasfa/1535051.pdf 1^1956 1970^ the George Bush library. http://bushlibrary.tamu.edu/research/finding aids/pdfs/08 0379-F.pdf and the Eisenhower Library in Kansas http://www.eisenhower.utexas.edu/Research/Finding Aids/PDFs/Jackson CD Records.pdf ^ Entity: Bilderberg Group ^ Alliance Base ^ Brief Documents regarding the founding and operation of Alliance Base. Retrieved from "http://^^w.wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009 sort" Categories: BulgarialCzechRepublic^Denmark^Estonia^France^Gemiany^lceland^Italy^LatyialLithuania^Netherlands^Norway^Poland^ Romania^Slovenia^Spain|Turkey^UnitedKingdom|Switzerland^Sweden^Malta^Portugal^Luxembourg|Finland^Belgium^Cypms^Canada ^Slovakia^United States vi^^^

discuss View source Personal tools Log in Main Page Country index Follow us

I Go I I Seatjj
What links here Related changes Special pages -Pdntable ^rsjpn.

http://wikileaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort

Sattirday, June 01, 2013 15:39:36 PM

Draft:The Most Wanted Leaks of 2009^ort - WikiLeaks


Permanent link Flattr profile Follow us on Twitter Check our Reddit Digg this page Twitter this

Page 12 of 12

00527899
http://wiki1eaks.Org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01, 2013 15:39:36 PM

lO

00527900

|iU

00527901

rv

ro o ro ro

o rM w

CN

00527902

ro o ro ro

00

ro

z 5

00527903

l-v

I S
5 S

ro o ro

il

II
^s 3I

s
i

fO

il
s.

I
I

11

I 1

il

f
!

I
i

Ii 1
11

II

!l
If
s I
a

I
I

5. J,

I
.1
1 3

&

f 11
i I i

I
f I

1 %

II
I s

I ^1

l 111
till*

i is

III!
i 1 1 s

Mi!

3 S

g^J Si s

8I I S

lis
3 S

I
Z:

;H

111 i I

I 111 f

iii

00527904

00527905

00527906

8
ro ro

LO

I
i
00 IV

1 I

111 -I 1
s

11

8!|

.i I

00527907

00 00

-s- %

3 I

00527908

Prosecution Exhibit 34 has been entered into the record as Prosecution Exhibit 110

UI^IT^DSTAT^SOF AMERICA

^ ^ ^
^

STIPULATION OF ^XP^CT^DT^STIMONY SSOAIe^a^droMari^ DAT^D: May 2013

Ma^mn^, Bradley^. PFCU.SArmy, HHCU^SArmyOarrison, JointBaseMyerHendersonHall FortMyer,Virginia 22211

^ ^ ^ ^ ^

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifSSO Alejandro Marin were present to testify duringthe merits and pre-sentencing phases of this courts martial, he would testify substantially as follows. 1. I, SSO Alejandro Marin, am currently deployed to Afghanistan asaCounterintelligence Analyst in the 0-2(Inte11igence)section forthe 333d Military Police Brigade. My Military Occupation Specialty (MOS) is 35L, Counterintelligence Agent. My responsibilities in this position include gathering tactical intelligence in our Area of Operation. 2. From 2002-^2006,Iwas enlisted in the United States Marine Corps with an MOS oflnfantry. In July 2007,Ienlisted in the United States Army Reserve with an MOS o f l l B , Infantry. In early 2008,lreclassified with anMOSof35F,All-Source Intelligence Analyst. From April 2008 until August 2008,Iattended the Intelligence Analyst Course at Advanced IndividualTraining (AIT) in Fort I^uachuca, Arizona. Iwas assigned to the 305th Military Intelligence Battalion. 3. PFC Bradley Manning andlattended AIT together. PFC Manning andlwereinall of the same classes together atAIT and received the same instruction. The class consisted of approximately 20-25 students, two ofwhom were PFC Manning and me. linteracted with PFC Manning onadaily basis. Troy Moul was our AITinstructor. 4. AtAIT,Iwas trained on pattern analysis, which is the study ofthe enemy^s Tactics, Techniques, and Procedures (TPPs)to determine any patterns in enemy activity. Iwas also trained on how to collectintelligence products and howto map enemy activity as part of pattern analysis. Iwas also trained extensively on the use ofSignificantActivities(SIOACTs), which are stored in the Combined Information Data Network F^xchange(CIDNF^) database on the Secure Internet Protocol Router Network (SIPRNF^T),aclassified network. Iwas also trained that SIOACTsconsistoftroop location. Improvised F^xplosive Device (IBD)attacks, and assassinations. Additionally,Iwas trained on how to research, review, and pull SIOACTsand plot them onamap for pattern analysis. 5. AtAITIwas trained on the targeting process. Iwas also trained on howto collect information on I^ighValueTargets(l^VTs), to include which databases to use and what type ofinformation is helpful to the targetingprocess. Iwas also trained that the intelligence we provided on these I^Ts may be employed to carry out military operations to capture these persons. During this instruction,Iwas also trained on howto use Intelink,asearch engine on the SIPRNET similar to Ooogle.

PROSECUTION EXHIBIT for iMitificatioif PAGEOFFERED: _ P; UlTADMITTED: ^ PAGE OF PAGES

6. At AITIwastt^ained on Information Security (INFOSEC). Iwas also trained on the meaning ofclassification, to include the difterent levels of classification. Specifica1ly,Iwas trained that the unauthorized disclosure ofinformation classified at the SECRET level reasonably could be expected to cause serious damage to the national security and that the unauthorized disclosure of information classified at the CONFIDENTIAL level reasonably could be expected to cause damage to the national security. Iwas also trained on the meaning ofinformation marked For OfficialUseOnly(FOUO) Iwasalsotrainedtoproperlymarl^notonlyclassifieddocumentsat the top and bottom ofeach document, but also classified media devices with the approved label. I wasfiirthertrainedthat we hadapersonal responsibility to safeguard classified information. Iwas also trained that access to classified information is limited to those persons with the proper security clearance, signed NonDisclosure Agreement, andaneed-to^know. Iwas also trained how to store, transmit, and otherwise handle classified information consistent with Army Regulation 380 5. 7. At AIT,Iwas trained on Operational Security(OPSEC). Iwas trained not to publicly disclose anything that could be useful to our adversaries, both foreign and domestic. Iwasalso trained on the dangers ofputting information on the Intemet, to include social media websites. Iwasalso trained on how the enemies ofthe United States, including AlO^^da, use the Internet by searching websites for many purposes, such as to collect intelligence on the United States and for use as propaganda and asarecruiting tool. Iwas trained that OPSEC applies to unclassified information, such as information relating to training schedules and unit morale. AtAIT,Iwas aware that PFC Manning had to giveafive minute brief on OPSEC. 8. WithregardstoBATESnumbers0000735I^00007426, 00007450 00007586, 00007629^ 00007789,00007983 00008087,00008152 00008288,00008331 00008522,00008853^00009046, 00009802-000I0037,and000I0722^00010843,Ihavereviewedalloftheseslides.The formatting ofthe slides is very recognizable to me. Aslreviewed the slides, my memory makes me believe that these were the slides that were given to us at AIT The slides were multiple classes in one presentation. Tothe best of my knowledge, these slides appear to be the ones used for our classes becauseofthe formatting and content contained in the slideshow. Iremember being trained on the content of these slides at AIT,such as memorizing the ^^CARVERSUP^^ mnemonic device at BATES number000I0767. Ilowever,Icannot say for certain that these are the actual slides orthe actual infortr^ation from the slides ^ivet^ to us due to the length oftime that has ^one by. It has beenfive years sincelhave seen theslides.Ialsocannotsayfbrcertain that these aretheslides because not all of the slides were used in all the classes due to time constraints oraclass being shortened. Ataminimum, these slides are very similarto the slidesIreceivedduringAIT. 9. AtAIT,PFCManningparticipatedinaFie1dTrainingExercise(FTX),duringwhichPFC Manning created various intelligence products, such as targeting packets on HVTs. Iwasateam leader duringthis FTX and had the opportunity to review PFC Manning^swork product. PFC Manning^s strengths included computer-related tasks, such as pulling data from databases containingintelligence products.

10. Iwas an All^Source Intelligence Analyst for approximately fburyears. In2012,Ireclassified with anMOSof35L, Counterintelligence Agent.

CPT, JA Assistant Trial Counsel

jTMywi-iLHYTE

THOMAS F. HURLEY Military Defense Counsel

xihX

BRADLEY E. MANNING PFC, USA Accused

Prosecution Exhibit 37 have been entered into the record as a CD/DVD and will be maintained with the original Record of Trial

Attachment B
Sender Account pressassoclation@jabber.ccc.de clawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pres5association@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de
pressassociation@jabber.ccc.de

CAP 0028-10-C1D361 ROl 0028-10-C1D221-10117

Sender Alias Date-Time Nathaniel Frank 2010-03-05 Nobody 2010-03-05 Nobody 2010-03-05 Nobody 2010-03-05 2010-03-05 Nobody 2010-03-05 Nobody Nobody 2010-03-05 Nobody 2010-03-05 Nobody 2010-03-05 2010-03-05 Nathaniel Frank 2010-03-05 Nathaniel Frank 2010-03-05 Nathaniel Frank Nobody Nathaniel Nobody Nathaniel Nobody Nathaniel Nobody Nathaniel 2010-03-05 2010-03-05 2010-03-05 2010-03-05 2010-03-05 2010-03-05 2010-03-05 2010-03-05

00:56:32 03:32:57 03:33:31 03:36:21 03:37:36 03:38:54 05:39:50 05:41:22 21:07:12 21:07:49 21:08:15 21:09:27 21:11:01 21:11:24 21:11:37 21:11:56 21:12:04 21:12:24 21:12:38 21:12:44

Message Text 5-6 hours for total upload? uploaded no, it was like 5 minutes ping ping anyway... should be good to go with that... news? hi hiya 11 ke debates. Just finished one on the IMMl, and crushed some wretch from the journalists union. vid? Ofthis? yeah Not videotaped, i think. ah Very satisfying though &gt;nod&lt; Source here just gave me 10Gb of banking docs.

Frank Frank Frank Frank

Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nobody
Nathaniel Frank

2010-03-05 2f:13TlO lb? 2010-03-05 21:13:11 He leaked some before, was exposed by the husband ofthe wretch. 2010-03-05 21:13:27 cross-bank, was an it consultant. 2010-03-05 21:13:39 got anested two weeks ago 2010-03-05 21:13:50 Had is bank accounts frozen. 2010-03-05 21:14:02 and has been offered 15 million kroner to shut up 2010-03-05 21:14:09 /is/his 2010-03-05 21:14:26 mmm 2010-03-05 21:15:04 needed to offload them so they&apos;d stop going after him 2010-03-05 21:17:31 &gt:yawn&lt: 2010-03-05 21:19:26 tired? 2010-03-05 21:20:54 waking up =) 2010-03-05 22:53:22 ping 2010-03-05 23:41:17 ping 2010-03-06 00:31:55 here 2010-03-06 00:32:52 pong 2010-03-06 00:39:19 ...and zero reply status =P 2010-03-06 06:40:54 ping
2010-03-06 06:41:22 ping

dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank

2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06

06:41:27 06:41:34 06:41:41 06:41:58 06:42:07 06:42:15 06:42:22 06:42:38 06:42:39 06:42:42 06:42:46 06:42:55 06:42:55 06:43:02 06:43:13 06:43:29

pong can you tell me more about these files? or the status of the issue? uhmm... no new information... everybody is focused on the election what&apos;s the caps thing? caps? CAPS who&apos;s the author? and are all these releasable? so much going on... ahhhh what about the english translation? yes everything Is notes minus the photos the photos are releasable ok, what about the incident report?

ManningB_00124388
Forensic report Personal Computer of PFC MANNING

l^fSI^^^'^^'^^^^T'"
PAGE OF PAGES '

Attachment B
Sender Account dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de Sender Alias Nobody Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank

CAP 0028-10-C1D361 ROl 0028-10-C1D221-10117

Message Text Date-Time 2010-03-06 06:43:52 cant release the original, but the information can be scraped from it 2010-03-06 06:44:08 i.e. sources indicate this happened at this place at this time 2010-03-06 06:44:17 yup 2010-03-06 06:44:38 it looks 1 ke a MiTT report? 2010-03-06 06:44:39 translation is super not releasable 2010-03-06 06:45:01 ok. be sure to tell me these things as soon as possible 2010-03-06 06:45:03 yes, came from federal police into US hands 2010-03-06 06:45:07 and better yet in the submission Itself 2010-03-06 06:45:12 yes, sorry 2010-03-06 06:45:59 i&apos;m not the only one to process this stuff and also will forget details if publication is delayed a long time due to the flood of other things 2010-03-06 06:46:02 though... who knows... everybody is ninning around like headless chickens 2010-03-06 06:46:28 malaki is expected to win again though? 2010-03-06 06:46:33 basically 2010-03-06 06:46:39 lose a few seats maybe 2010-03-06 06:46:42 but win overall 2010-03-06 06:46:56 probably have to form a new coalition 2010-03-06 06:48:47 blah, sorry about the craziness... gonna give release a shot? 2010-03-06 06:58:20 yes 2010-03-06 06:58:37 cool 2010-03-06 06:58:40 lack of detail may be problematic, but we&apos:ll see 2010-03-06 06:59:09 i.e &quot:easier&quot: stories for press to get 2010-03-06 06:59:10 im sure you can try to confirm SOMETHING... there is a hotel called the Hotel Ishtar nearby to that location 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 06:59:36 06:59:46 07:00:01 07:00:11 07:00:24 07:01:19 does it have grid refs? grid references within the document, yes that was were the an-ests took place morocco publishing company gives coordinates (in the military report) i figured it would make it look more like a journalist acquired it... if the hotel was mentioned

dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nathaniel Frank Nobody Nobody Nobody Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody

pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nathaniel Frank Nobody Nobody Nobody Nobody Nobody

dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nobody

2010-03-06 07:01:55 [popular among gays, oddly] 2010-03-06 07:02:38 <div><a href=http://travel.yahoo.com/p-hotel-2514619hotel_ishtar-i" style="background-color; #ffffff; fontfamily: Helvetica: font-size: 12pt;">http://travel.yahoo.com/p-hotel-2514619hotel_ishtar-i</a></div></message> 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 07:02:42 07:03:19 07:03:25 07:03:27 07:03:33 07:03:43 07:03:43 07:04:08 07:05:30 07:05:41 haha l&apos;m surprised there are any left. foreign that is full transcript for video is now complete evil work iraq themed releases? yes, the transcripts say a lot about attitudes might also be known as Sheraton Ishtar <div><a href=http://en.wikipedia.org/wiki/Sheraton_lshtar" style= "background-color: #ffffff; font-family: Helvetica; font-size: 12pt;">http://en.wikipedia.org/wiki/Sheraton_lshtar</a ></div></message>

pressassociation@jabber.ccc.de pressassoclation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabberccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nobody

ManningB_00124389
Forensic report Personal Computer OfPFC MANNING

Attachment B
Sender A c c o u n t dawgnetwork@jabber.ccc.de Sender Alias Nobody

CAF 0028-10-C1D361 ROl 0028-10-C1D221-10117

Date-Time Message Text 2010-03-06 07:06:13 its somewhere In that general area... &quot;Morocco Publishing&quot;... its been too crazy for me to try and find 2010-03-06 07:07:14 anyway, gotta dash... should be back in a few hours 2010-03-06 07:07:21 good luck 07:07:34 you too 07:07:49 um, transcripts? 07:07:53 ah, yes, sorry. 07:08:11 its a HUGE jumble xD 07:08:12 =P 07:08:17 07:08:25 07:08:34 07:08:37 07:10:28 07:11:01 07:11:03 07:11:36 07:11:46 07:12:21 07:12:43 07:12:50 09:25:55 10:59:53 12:48:15 14:37:11 07:03:53 07:08:29 07:11:49 07:14:56 07:15:36 plural confused me. muh bad gotta go fo&apos; realz =P ciaoness oh, it was on the EAST side of the tigris... thats important the arrest location that is why important? i think hotel is on the west side ah, im all over the place... clearing logs... not logging at all... safe i just wanted to be certain any more questions? i have a quick question busy day for you ? ping ping brb, checking flights k i have a quick question? sure...lots of time pressure atm though so answer will be brief

dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnefwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nobody Nathaniel Nathaniel Nathaniel Nobody Nobody Nathaniel Nobody Nobody Nobody Nobody Nobody Nobody Nathaniel Frank Nobody Nobody Nobody Nobody Nobody Nobody Nobody Nobody Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody

Frank Frank Frank

Frank

2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-06 2010-03-07 2010-03-07 2010-03-07 2010-03-07 2010-03-07

2010-03-07 07:16:00 how valuable are JTF GTMO detention memos containing summaries, background info, capture info, etc? 2010-03-07 07:16:18 time period? 2010-03-07 07:16:25 2002-2008 2010-03-07 07:17:35 quite valuable to the lawyers of these guys who are trying to get them out, where those memos suggest their innocence/bad proceedure 2010-03-07 07:18:12 also valuable to merge into the general history, politically gitmo is mostly over though 2010-03-07 07:18:20 yeah 2010-03-07 07:18:28 although transfers to afghanistan might rise it again 2010-03-07 07:18:38 &gt%oPNG 2010-03-07 07:18:43 ill get back to that later 2010-03-07 07:19:29 depends on definition of valuable of course.. there&apos;s been a fair bit of inflation the last few months :) 2010-03-07 07:19:39 i noticed 2010-03-07 07:19:51 BTW 2010-03-07 07:20:12 WE won the referendum - only 1.4% voted against. 2010-03-07 07:20:17 i saw 2010-03-07 07:20:25 How cool is that? 2010-03-07 07:20:54 First referendum in Icelandic history, ever.

pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Nathaniel Frank Nobody Nathaniel Frank

pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank

dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociatlon@jabber.ccc.de pressassociation@jabber.ccc.de

Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank

ManningB_00124390
Forensic report Personal Computer OfPFC MANNING

Attachment B
Sender Account dawgnetwork@jabber.ccc.de Sender Alias Nobody

CAF 0028-10-C1D361 ROl 0028-10-CID221-10117

Message Text Date-Time 2010-03-07 07:20:56 not sure how much influence you actually had... though im sure you had an impact of some kind 2010-03-07 07:21:13 by &apos;we&apos; i mean everyone worthing towards it 2010-03-07 07:21:20 ah, been there before 2010-03-07 07:21:28 im wary of referenda 2010-03-07 07:21:51 democracy sounds good... until you realize you&apos;re a vulnerable minority... 2010-03-07 07:21:57 but quite possibly swung it., there was lots of stuff going on behind the scenes here. 2010-03-07 07:22:09 case in point: proposition 8 in California 2010-03-07 07:22:21 Yes. This is democracy in the negative though, which is usually great. 2010-03-07 07:22:34 indeed it is 2010-03-07 07:22:51 I.e vetoing bills [go back and do it again!] 2010-03-07 07:23:32 call is bad, 1 agree, anyone with some $ has a syringe right into the heart of the state constitution 2010-03-07 2010-03-07 2010-03-07 2010-03-07 2010-03-07 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 07:23:40 07:23:52 07:23:58 07:23:59 10:53:48 05:46:56 05:48:43 05:48:50 05:49:22 05:52:19 &gt;nod&lt; bbk gotta nin too ttyl so when is the site coming back? hello heyal how goes? not bad vid has been enhanced and rendered now. subtitles done for english nice it looks good, the stills are very moving the stills taken from the wide angle? dropped camera no.. ah, the video stills then from the video cam sounds good still all over the place, here After the contrast enhancement, something about the lack of resolution / smoke gives a film-noir quality

pressassociatlon@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwori(@jabber ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank

dawgnetwork@jabber.ccc.de pressassociatlon@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwori(@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnelwori(@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociatlon@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Nobody Nathaniel Frank Nobody Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank

2010-03-08 05:52:30 2010-03-08 05:52:47 2010-03-08 05:53:03 2010-03-08 05:53:31 2010-03-08 05:53:42 2010-03-08 05:53:51 2010-03-08 05:53:52 2010-03-08 05:54:14 2010-03-08 05:55:54 2010-03-08 05:56:10

pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

Nathaniel Frank
Nobody

2010-03-08 05:56:16 yeah, i&apos;ve heard.


2010-03-08 05:56:25 heard?

Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank

2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08

05:56:29 05:56:43 05:57:02 05:57:09 05:58:05 05:58:59

da wg network@ja bber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody

2010-03-08 2010-03-08 2010-03-08 2010-03-08

06:04:09 06:04:54 06:05:05 06:05:22

2010-03-08 06:05:29 2010-03-08 06:05:46 2010-03-08 06:06:09

outcome yet? busy few weeks no... wont be for weeks... it was very quiet expected a lot more people can get worthed up internally... somethings are encouraged to be said, others not, and after they flow around long enough, there&apos;s a lack of grounding. lalala jesus mm? looks like we have the last 4 mothers of all audio to all phones in the is pariiament s/mothers/months interesting *had nothing to do with this one*

ManningB_00124391
Forensic report Personal Computer OfPFC MANNING

AttachmentB
Sender Account dawgnetwork@jabber.ccc.de

CAF 0028 10 C1O361 ROI0028 10-C1O221-101

Sender Alias Nobody

Date-Tin^e MessageText 2010 03 08 06:08:49 im sending one last archive of intersting stuff... should be in thexfolder at some point in the next 24 hours 2010 03 08 06:10:08 ok.greati 2010 03 08 06:10:09 74b3*tarbz2 201003 08 06:10:50 you^apos:ll need to figure out what to do with it all... 2010 03 08 06:11:03 a l o t of odd things are happening lately 2010 03 08 06:11:08 such as? 2010 03 08 06:11:48 it^apos:s hard to descr be without going through them all 2 0 1 0 ^ 3 08 06:11:53 but there^apos:s something in t h ^ air. 2010 03 08 06:12:07 in Iceland, or globally 2010 03 08 06:12:40 this is what l^apos:m trying to determine people in germany say the same thing 2010 03 08 06:12:49 and there^apos:s some evidence ofthat 2010 03 08 06:13:13 such as... (i hate to inquire too much, but im benign) 201003 08 06:13:36 it may be more readily vis ble in is due to less inertia [small economy] 2010 03 08 06:14:09 definitely feel something odd here... 201003 08 06:14:38 some recent things... in denmari^ the main newspaper printed an entire book in afghanistan that was about to be Injuncted suddenly in its Sunday paper 201003 201003 201003 2010 03 0806:14:50 08 06:14:55 08 06:15:04 08 06:15:25 to subvert the injunction [about afghanistan, not in] injunction came from dep of defence fox news editorialized to say, give money to Wl^

pressassociation@jabberccc.de dawgnetwork@jabber.ccc.de dawgnetwori^@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabbercccde pressassociation@jabberccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabbercccde pressassociation@jabber.ccc.de

Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank

pressassociation@jabber.ccc.de pressassociation@jabbercccde pressassociation@jabber.ccc.de pressassociation@jabber.cccde pressassociation@jabberccc.de dawgnetwork@jabber.ccc.de pressassociation@jabbercccde dawgnetwork@jabbercccde pressassociation@jabber.cccde dawgnetwork@jabber.ccc.de

Nathaniel Nathaniel Nathaniel Nathaniel

Frank Frank Frank Frank

Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody

2010 03 0806:15:42 .nl government just fell over afghanistan 2010 03 08 06:15:49 indeed 201003 08 06:16:00 german constitutional court just struck down data retention 2010 03 08 06:16:07 yep 2010 03 08 06:16:34 wl actions that were considered totally radical3years ago are now courted 2 0 1 0 ^ 3 0806:17:06 itold you before,government/organizations cant control infonnation... the harder they try, the more violently the information wants to get out 201003 08 06:17:22 2500 articles in is referendum in the past15hours, despite it beingasunday 2010 03 08 06:17:34 you^apos:re like the first pin to popaballoon 2010 03 08 06:17:52 many other things like this 2010 03 08 06:18:13 restrict s u p p l y - v a l u e Increases,yes 2010 03 08 06:18:21 oh yeah...osc went haywire digging into is 2010 03 08 06:18:37 us dod has another tact though, dump billions in free ^quot:news^quot: content 2 0 1 0 ^ 3 08 06:18:44 yeah? 201003 08 06:18:56 that^apos:s something we want to mine entirely, btw 201003 08 06:19:10 l h a d an account there, but changed ips too quickly 2010 03 08 06:19:16 usually its pretty dull reading, one or two things on is aday...but i t s l k e 20-25 fortoday alone 2010 03 08 06:19:40 just F^IS or analysis included? 2010 03 08 06:19:54 no analysis, too eariy... 2010 03 08 06:20:03 24-48 hours it takes for analysis if done

pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabbercccde pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassoclation@jabbercccde dawgnetwork@jabbercccde pressassociation@jabber.ccc.de dawgnetwork@jabberccc.de dawgnetwork@jabber.cccde

Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody

l^afii^iFigB_00124392
Forensic report Personal Computer OfPFC MANNING

Attachment B
Sender Account dawgnetwork@jabber.ccc.de Sender Alias Nobody

CAF 0028-10-CID361 ROl 0028-10-CID221-10117

Message Text Date-Time 2010-03-08 06:22:01 anyway, im throwing everything i got on JTF GTMO at you now... should take awhile to get up tho 2010-03-08 06:23:22 summary / history / health conditions / reasons for retaining or transfer of nearly every detainee (about 95%) 2010-03-08 06:24:01 ok, great! 2010-03-08 06:24:15 what period does it cover for each internment? 2010-03-08 06:24:48 2002-2009... 2010-03-08 06:25:21 so initial medical evaluation to exit evaluation? 2010-03-08 06:25:37 no, just summaries... 2010-03-08 06:25:52 but summaries of that? 2010-03-08 06:26:26 i.e from entry to exit? 2010-03-08 0 6 : 2 6 ^ not quite 20i0-03-08 06:26:33" gaps 2010-03-08 06:26:50 where do the gaps come from? 2010-03-08 06:26:58 Memos such asSUBJECT: Recommendation to Retain under DoD Control (DoD) for Guantanamo Detainee,<br />1SN: US9AS-000002DP 2010-03-08 06:27:51 i have a csv that organizes the info as much as possible 2010-03-08 06:27:55 1 hate these gitmo guys 2010-03-08 06:28:29 OFAFBU sums up the sort of people they ended up with 2010-03-08 06:28:48 [one flight away from being ugly] aka &quot;gitmo cute&quot; 2010-03-08 06:28:56 haha 2010-03-08 06:30:57 anyway, gotta run, have a nice day 2010-03-08 06:31:14 you too. and take care! 2010-03-08 06:31:42 after this upload, thats all i really have got left 2010-03-08 06:32:15 curious eyes never run dry in my experience 2010-03-08 06:32:18 1 sat on it for a bit, and figured, eh, why not 2010-03-08 06:32:52 ive already exposed quite a bit, just no-one knows yet 2010-03-08 06:33:34 ill slip into daricness for a few years, let the heat die down 2010-03-08 06:34:05 won&apos;t take a few years at the present rate of change 2010-03-08 06:34:08 true 2010-03-08 06:34:19 almost feels 1 ke the singularity is coming there&apos;s such acceleration 2010-03-08 06:34:52 yes... and considering just how much one source has given you, i can only imagine the overlad 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 06:35:05 06:35:15 06:35:30 06:35:34 06:35:57 06:36:04 11:13:06 11:44:16 11:44:27 12:19:56 12:20:21 12:21:39 12:22:05 yes load c ya 1 just hope we can do justice to it all. We have the numbers, just need to figure out how to scale the management. night! hi hoi short sleep? wasnt asleep... going to sleep soon upload is at about 36% ETA? 11-12 hours... guessing since its been going for 6 already how many mb? about 440mb

dawgnetwork@jabber.ccc.de

Nobody

pressassociation@jabber.ccc.de pressassociation@iabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwori(@jabber.ccc.de pressassociation@jabber.ccc. de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwori(@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody

dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation @jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwori(@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody

pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawonetwork@jabber.ccc.de pressassoclation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nathaniel Frank Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Nobody Nathaniel Nathaniel Nobody Nobody Nathaniel Nobody Frank Frank Frank

Frank

Nathaniel Frank Nobody

2010-03-08 12:22:33 2010-03-08 12:22:50

ManningB_00124393
Forensic report Personal Computer OfPFC MANNING

Attachment B
Sender Account dawgnetwori(@jabber.ccc.de dawgnetwori(@jabber.ccc.de dawgnetwori(@jabber.ccc de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de Sender Alias Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nobody Nobody Date-Time 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08 2010-03-08

CAF 0028-10-C1D361 ROl 0028-10-C1D221-10117

12:24:46 14:38:00 15:55:28 16:00:29 16:00:44 16:00:55 16:01:30 16:02:23 16:04:14 16:05:07 16:05:38 16:06:08 16:09:06

Message Text a lot of scanned pdf&apos;s what are you at donation-wise? any good at Im hash cracking? yes donations; not sure. something in order of .5M but we lost our CC processor, so this is making matters somewhat painful. we have rainbow tables for Im 80c11049faebf441d524fb3c4cd5351c i think its Im -t- Imnt anyway... need sleep &gt;yawn&gt; not even sure if thats the hash... i had to hexdump a SAM file, since i dont have the system file...

pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwori(@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawg network@jabber. ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnelwork@jabber.ccc de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nobody Nathaniel Nobody Nobody Nobody Nobody Nobody Nathaniel Nobody Nathaniel Nobody Nathaniel Nobody Nobody Nathaniel Nobody Nobody Nathaniel Nobody Nobody Nathaniel Nathaniel Nathaniel Nathaniel Nobody Nobody Frank

Frank Frank Frank

2010-03-08 16:10:06 what makes you think it&apos;s Im? 2010-03-08 16:10:19 its from a SAM? 2010-03-08 16:10:24 yeah 2010-03-08 16:11:26 passed it onto our Im guy 2010-03-08 16:11:40 thx 2010-03-08 21:31:59 got about an hour to go on that upload 2010-03-10 03:44:06 hi 2010-03-10 03:45:05 did you get what i sent? 2010-03-10 03:45:11 via sftp 2010-03-10 03:46:04 hey a! 2010-03-10 03:46:24 MDS (74b3*.tar.bz2) = c36e31ab* 2010-03-10 03:47:39 will check 2010-03-10 03:47:47 sweet 2010-03-10 03:47:54 somewhat distracted with all sorts of intrigues 2010-03-10 03:48:01 heh, im sure 2010-03-10 03:48:13 imma get intrigued with my hot chocolate =) 2010-03-10 03:48:24 we now have the last 4 months of audio from telephones at the .is pariiament 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 03:48:29 03:48:35 03:48:51 03:48:55 03:49:11 03:49:16 04:25:37 04:25:42 04:25:58 05:40:47 05:42:16 05:42:38 05:45:56 05:46:00 05:46:48 05:47:15 05:50:54 05:51:00 bbl yes, you said eariier it was a "might* before somebody&apos;s bad... =) ttyl yup. nixon tapes got nothing on us hmm there&apos;s a username in the gitmo docs i assume i should filter it out? theres a username? any usernames should probably be filtered, period but at the same time, theres a gazillion of them is this ordered by country? yes ... gazillion pdf&apos;s that is</span> anything useful in there? no time, but have someone on it there surely will be

Frank

Frank

Frank Frank Frank Frank

Nobody Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank Nobody

2010-03-10 05:51:12 and these sorts of things are always motivating to other sources too 2010-03-10 05:51:22 &gt;nod&lt; 2010-03-10 05:51:33 inflation 2010-03-10 05:51:34 =P 2010-03-10 05:51:43 from an economic standpoint 2010-03-10 05:52:08 heh 2010-03-10 05:52:29 1 was thinking more inspiration 2010-03-10 05:52:38 i know =)

MannlngB_00124394
Forensic report Personal Computer of PFC MANNING

Attachment B
Sender Account pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

CAF 0028-10-CID361 ROl 0028-10-C1D221-10117

Date-Time Message Text Sender Alias 2010-03-10 05:53:08 gitmo=bad,leakers=enemy of gitmo,leakers=good Nathaniel Frank Nathaniel Frank 2010-03-10 05:54:03 Hence the feeling is people can give us stuff for anything not as &quot;dangerous as gitmo&quot; on the one hand, and on the other, for people who know more, there&apos;s a desire to eclipse. ..

dawgnetwori(@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwori(@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

2010-03-10 05:54:41 true 2010-03-10 05:55:05 ive crossed a lot of those &quot;danger&quot; zones, so im comfortable " 2010-03-10 05755:25 learned a lot from the Iceland cable on my side Nobody Nathaniel Frank 2010-03-10 05:55:32 oh? 2010-03-10 05:55:55 and that is... everyone is too busy to investigate too Nobody deeply... Nobody 2010-03-10 05:56:02 or clean up the mess Nathaniel Frank 2010-03-10 05:56:03 yes Nathaniel Frank 2010-03-10 05:56:13 unless they think there&apos;s a real promotion in it Nobody Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank 2010-03-10 05:56:19 indeed 2010-03-10 05:56:35 after a few days, no one gives a damn, generally 2010-03-10 05:56:41 yep 2010-03-10 05:56:46 especially now with the pace of change so high 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 05:56:51 05:56:58 05:57:28 05:57:53 05:58:21 05:58:29 oh yeah its nuts ive given up on trying to imagine whats next i predict its nothing i can predict actually... gave an Intel source here a list of things we wanted

2010-03-10 05:58:39 1-5 2010-03-10 05:59:06 1 was &quot;something we have no idea of yet. hard to find, but the most likely to be important&quot; 2010-03-10 05:59:30 and they came back with the last 4 months of pariiament 2010-03-10 05:59:47 xD 2010-03-10 05:59:49 hilarious 2010-03-10 06:00:40 thats a wtf... who did this kind of moment 2010-03-10 06:00:54 fall-out =P 2010-03-10 06:00:55 So, that&apos;s what 1 think the future is 1 ke ;) 2010-03-10 06:01:15 yes
2010-03-10 06:01:57 now that humans are getting more and more

pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwori(@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de


dawgnetwork@jabber.ccc.de

Nathaniel Frank Nobody Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank
Nobody

dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nobody

dawgnetwork@jabber.ccc.de

Nobody

integrated into this information society... a level of transparency never imagined or even truly desired is coming into play 2010-03-10 06:02:18 it makes us more human if anything 2010-03-10 06:03:13 we&apos;ve created states, governments, religious institutions, corporations... all these organizations to hide behind... 2010-03-10 06:03:26 but at the end of the day, we&apos;re just guys and giris

MannlngB_00124395
Forensic report Personal Computer OfPFC MANNING

Attachment B
Sender Account pressassociation@jabber.ccc.de

CAF 0028-10-CID361 ROl 0028-10-C1D221-10117

Sender Alias Date-Time Message Text 2010-03-10 06:04:02 WikiLeaks is looking for donations, but what itsT<, Nathaniel Frank founders should do, is call upon script writers to make a, pertiaps reality based, dramatized, thriller movie of one of the wikileaks cases, with corruption, infiltration, espionage, hitmen, sabotage, etc. and call the movie &quot;WikiLeaks!&quot;</span><br /><br /><span style=font-family: Helvetica; font-size: 12pt;">l see great potential for such a movie, and massive money and advertising it would generate would establish them firmly. l&apos;d then support by seeing the movie. Hollywood would likely support."

pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank

2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10

06:04:04 06:04:35 06:04:47 06:04:59 06:05:22 06:05:45 06:05:50 06:05:51 06:06:06

haha yes. its very healthy but then, there is farmville... the masquerade ball this is gonna be one hell of a decade it feels like 2010 should be ending soon... but we just got started sense deceptions to suck $ out of people lt&apos;s as old as lipstick and the guitar of course, but mmorpg are evil in a whole new way

dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank

voluntary matrix-style society? yes hmm might be ok in the end mmorpg&apos;s that have long term users are incentivised to keep them profitable 2010-03-10 06:08:59 but 1 imagine they&apos;ll merge into hybrid revenue modes, where congnitive tasks and freelabor are done using sense deception incentives 2010-03-10 06:09:48 like the &quot;video games&quot; from toys? 2010-03-10 06:10:12 haven&apos;t seen that 2010-03-10 06:10:34 but it sure isn&apos;t a decade to be a gull ble idiot:) 2010-03-10 06:11:24 basic gist: retired general takes over a toy company, invests in video games for kids to &quot;play&quot;, but they&apos;re actually training to remotely use little toy sized weapons 2010-03-10 06:11:40 former toy owner tries to stop him 2010-03-10 06:11:52 *company 2010-03-10 06:12:11 heh. that&apos;s the example 1 was going to use for mmorpg (with drones) but decided it was too grotesque 2010-03-10 06:12:47 its not... its logical in frightening ways 2010-03-10 06:13:04 i think like that... i dont know how it happened, but i think that way 2010-03-10 06:13:32 i predict war will tum into a continuous spectnim of spying and violence 2010-03-10 06:13:32 &quot;how can i take advantage of two things that most people wouldn&apos;t think are connected&quot; 2010-03-10 06:15:50 with companies doing a lot of the lower end {spying/violence} for their own reasons and a totally seem less crossover (as is happening with the us) between contractors/military to the degree that its not clear who is tasking who 2010-03-10 06:16:12 wow, dead on

2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10

06:06:39 06:06:46 06:07:08 06:07:25 06:07:53

dawgnetwori(@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nathaniel Frank Nathaniel Frank Nobody

dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Nobody Nobody Nathaniel Frank

dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nobody Nathaniel Frank Nobody

pressassociation@jabber.ccc.de

Nathaniel Frank

dawgnetwork@jabber.ccc.de

Nobody

MannlngB_00124396
Forensic report Personal Computer OfPFC MANNING

Attachment B
Sender Account pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwoM(@jabber.ccc.de dawgnelwori(@jabber.ccc de pressassociation@jabber.ccc.de dawgnetwori(@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwori<@jabber.ccc.de pressassociation@jabber.ccc.de dawgnelwori(@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwori(@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

CAF 0028-10-CID361 ROl 0028-10-CID221-10117

Date-Time Message Text Sender Alias 2010-03-10 06:16:57 everywhere, greater degrees of freedom, more fluidity Nathaniel Frank and mixing. 2010-03-10 06:17:23 always an interesting discussion =) Nobody 2010-03-10 06:17:26 ttyl Nobody Nathaniel Frank 2010-03-10 06:17:31 night! 2010-03-10 20:58:03 hello Nobody 2010-03-10 20:59:41 heya! Nathaniel Frank 2010-03-10 20:59:52 whats new? Nobody 2010-03-10 21:00:22 350Gb of audio intercepts. But you knew already. Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 21:00:30 21:00:57 21:01:22 21:01:28 21:01:44 21:02:15 21:02:35 21:02:43 21:03:00 21:03:08 21:03:09 21:03:17 21:03:42 21:03:48 21:04:13 mhmm is that the only thing? lots of smaller scale material &gt:nod&lt; e g bbc legal defense against trafigura which was censored a jazeera doing another segment on WL Canadian detainee docs Canadian? some russian and Chinese stuff that 1 can&apos;t read

ha ha ha heh and a list of ALL the tea party volunteers from glen beck&apos;s email jesus fucking Christ whats the big deal with that? because some people take that seriously 2010-03-10 21:04:26 an analysis of the greenhouse gas output of Australia&apos;s &quot;earth hour&quot; firewori(s

pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank

dawgnetwort(@jabber.ccc.de dawgnetwoM(@jabber.ccc.de

Nobody Nobody

2010-03-10 21:04:32 (46 tonnes) 2010-03-10 21:04:57 The lea party thing? ll&apos;s weird, but it should be taken seriously 2010-03-10 21:05:21 yeah, its one of those... grey areas tietween reality and entertainment and ick 2010-03-10 21:05:33 lt&apos;s the right wing overclass (fox) organization of the righwing underclass. Think of them as brown shirts. 2010-03-10 21:05:39 stays in reality* 2010-03-10 21:06:23 well, i dont know what posting a list from glenn beck&apos;s email will do... but hey. Its transparency 2010-03-10 21:06:37 They&apos;re Important because their organized free labor. 2010-03-10 21:06:54 And they may or may not breakfi-eeof their masters. ToTo^3-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 2010-03-10 21:07:04 21:07:50 21:08:24 21:08:31 21:08:52 21:08:58 21:09:08 21:09:15 21:09:50 21:10:08 21:10:16 21:10:31 21:11:36 ah is it 1 ke the entire worid is uploading to you? some hungarian finance things Scientology in haiti... lots of german stuff i don&apos;t understand, but we have people who do &gt;nod&lt; wow... im gonna leave you to work than get back up and online... get Immi passed... and start publishing whatever you can... =) heh a jazeera will also have a new WL doco by the same producer who did IMMI piece agreement between the royal mail and its union

pressassoclation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwort(@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nobody Nathaniel Nathaniel Nathaniel Nathaniel Frank Frank Frank Frank

2010-03-10 2010-03-10 2010-03-10 2010-03-10

ManningB_00124397
Forensic report Personal Computer OfPFC MANNING 10

Attachment B
Sender Account pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwori(@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de Sender Alias Date-Time 2010-03-10 21:11:49 Nathaniel Frank Nathaniel Frank 2010-03-10 21:11:55 Nathaniel Frank 2010-03-10 21:12:31 Nobody 2010-03-10 21:15:45 Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank 2010-03-10 21:16:39 2010-03-10 2010-03-10 2010-03-10 2010-03-10 21:16:54 21:17:05 21:17:39 21:17:45

CAF 0028-10-CID361 ROl 0028-10-C1D221-10117

2010-03-10 21:17:58 2010-03-10 21:18:15 2010-03-10 21:18:43 2010-03-10 21:19:31 2010-03-10 21:19:47

Message Text oh, this one is nice entire romanian police database israeli&apos;s OECD application docs its like you&apos;re the first &quot;lntelligence Agency&quot; for the general public downside is you get so much stuff in a single day that its hard to prioritize yes that&apos;s just a matter of growth, though did you read our bulgarian shadow state doc? well, fuck you do everything an Intel agency does... minus the anonymous sourcing not really The original WL about reads: &quot;...will be the first intelligence agency of the people. ..&quot; might have missed that, but its absolutely tme anyway, gotta run... ttyl Wikileaks described itself as &quot;the first intelligence agency of the people. Better principled and less parochial than any governmental intelligence agency, it is able to be more accurate and relevant. It has no commercial or national interests at heart; its only interest is the revelation of the truth. Unlike the covert activities of state intelligence agencies, Wikileaks relies upon the power of overt fact to enable and empower citizens to bring feared and corrupt governments, and corporations to justice.&quot;

pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociatlon@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@Jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociafion@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank

2010-03-10 2010-03-10 2010-03-10 2010-03-16 2010-03-16 2010-03-16 2010-03-16 2010-03-16 2010-03-16 2010-03-16 2010-03-16 2010-03-16 2010-03-16 2010-03-16 2010-03-16

21:20:14 23:30:54 23:31:03 18:23:35 18:32:42 22:29:42 22:34:13 22:34:14 22:34:24 22:34:36 22:35:52 22:35:52 22:36:04 22:37:09 22:37:21

ok. later! any more hints about this lm hash? no luck so far hi hoi whats up? just about to go out all systems nominal good to know ttyl

:)
take care will do... donations coming in good? not sure experience in the past is that they don&apos:t tend to In response to stories like this meh makes people scared to donate too bad i would&apos;ve if i saw that what&apos:d your source say it was? it was very general organization-wide interesting what was the approach and motivation? i wonder if this didn&apos;t stir up some intemal dissent must be some people not too happy about cracking down on whistleblowers and following the Chinese...

2010-03-16 22:37:28 2010-03-16 22:37:32 2010-03-16 22:37:34 2010-03-16 22:37:52 2010-03-16 22:37:59 2010-03-17 22:32:26 2010-03-17 22:39:49 2010-03-17 22:46:62 2010-03-17 22:40:17 2010-03-17 22:40:35 2010-03-17 22:41:17 2010-03-17 22:41:42

dawgnetwori(@jabber.ccc.de

Nobody

2010-03-17 22:41:55 indeed

ManningB_00124398
Forensic report Personal Computer of PFC MANNING

it

Attachment B
Sender Account dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de Sender Alias Nobody

CAF 0028-10-C1D361 ROl 0028-10-CID221-10117

Message Text Date-Time 2010-03-17 22:42:11 90% of the effort is on Chinese exfiltration of documents 2010-03-17 22:42:22 it was a blog posting Nobody Nathaniel Frank 2010-03-17 22:43:01 well, that is a genuine problem Nathaniel Frank 2010-03-17 22:43:16 Israeli and russian exfiltration too 2010-03-17 22:44:02 trench as well Nathaniel Frank 2010-03-17 22:44:06 It warned about not visiting the blogs, because the Nobody document and its contents is still classified 2010-03-17 22:44:17 gave a link the to the report through proper channels Nobody 2010-03-17 22:44:31 although knowledge tends to be stabalizing 2010-03-17 22:44:34 if you take a big picture perspective 2010-03-17 22:45:17 it almost pleaded people not to send anonymous documents, mentioning courage and personal trust... and told people to go through proper channels if they have an issues 2010-03-17 22:45:24 open skies policy was stabalizing 2010-03-17 22:45:44 so perhaps an open net policy is called for;) 2010-03-17 22:46:23 that&apos;s reasonable, though doesn&apos;t work in practice... 2010-03-17 22:46:27 what&apos;d they say about courage? 2010-03-17 22:46:38 i can send a copy 2010-03-17 22:46:40 that it&apos;5 contagious? ;)? 2010-03-17 22:46:53 but its non-rel 2010-03-17 22:47:00 yes 2010-03-17 22:47:32 subsys is really good these days 2010-03-17 22:48:09 please mari^ non-release, found on usb stick 2010-03-17 22:48:55 k 2010-03-17 22:49:00 outed another spy this afternoon 2010-03-17 22:49:16 ?? 2010-03-17 22:49:27 local 2010-03-17 22:49:34 gotchya 2010-03-17 22:49:38 police, watching one of my hotels 2010-03-17 22:49:50 insider also confirmed 2010-03-17 22:49:58 we have access to the fieet tracking system ;) 2010-03-17 22:50:41 just got hold of 800 pages of interrogations docs and another 40gb of .is privatization / banking stuff 2010-03-17 22:50:51 2010-03-17 22:50:55 2010-03-17 22:51:04 2010-03-17 22:51:31 2010-03-17 22:51:50 2010-03-17 22:51:58 2010-03-17 22:52:01 2010-03-17 22:52:32 2010-03-17 22:53:01 2010-03-17 22:53:11 2010-03-17 22:53:18 2010-03-17 22:53:20 2010-03-17 22:54:03 2010-03-17 2010-03-17 2010-03-17 2010-03-17 2010-03-17 2010-03-17 2010-03-17 2010-03-17 22:54:14 22:54:40 22:54:47 22:54:57 22:55:14 22:55:26 22:55:29 22:55:38 this country is going to melt... saw the film today it&apos;5 looking great what film? projectb the massacre gotchya uploaded file marked as requested thanks nip you&apos;re great is there some way i can get a cryplophone to you? not at this fime actually... probably best if you Just order one? or rather some friend bit pricy though hmm actually never mind yes, i dont have access at present

Nathaniel Frank Nathaniel Frank Nobody

pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank

pressassociation@jabber.ccc.de pressas50ciation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pre5sassociation@jabber.ccc.de pressassociation@Jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressa5sociation@Jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@Jabber.ccc.de pres5as50ciation@jabber.ccc.de dawgnetwork@Jabber.ccc.de pressassociation@jabber.ccc.de pressassoclation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@Jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody

ManningB_00124399
Forensic report Personal Computer OfPFC MANNING 12

Attachment B
Sender Account pressassociation@jabber.ccc.de

CAF 0028-10-CID361 ROl 0028-10-C1D221-10117

Message Text Sender Alias Date-Time 2010-03-17 22:56:35 these things are good for urgent contact, but it&apos;s Nathaniel Frank safer to avoid due to location tracking possibilities Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank 2010-03-17 2010-03-17 2010-03-17 2010-03-17 2010-03-17 22:56:47 22:56:56 22:57:21 22:57:45 22:57:52 i know that very well although there is a satphone module forget the idea for now yes. you just contact us but don&apos;t disappear without saying why for an extended period or l&apo5;ll get womed ;) i wont you&apos;ll know if something&aposis wrong ok you can just tell me &quot;all the ships came in&quot;

dawgnetwork@jabber.ccc.de pressassociation @Ja bber. CCC. de dawgnetwork@jabber.ccc.de pressassociation@Jabber.ccc.de pressassociation@Jabber.ccc.de

dawgnetwork@jabber.ccc.de dawgnetwori<@jabber.ccc.de pressassociation@Jabber.ccc.de pressassoclation@Jabber.ccc.de pressassociation@Jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank

2010-03-17 2010-03-17 2010-03-17 2010-03-17

22:58:03 22:58:16 22:58:39 22:58:57

dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@Jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressa550ciation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnefwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pres5a5sociation@jabber.ccc.de dawgnetwork@Jabber.ccc.de pressassociation@jabber.ccc.de pressa5sociation@jabber.ccc.de pre55association@jabber.ccc.de dawgnetwork@Jabber.ccc.de pres5association@Jabber.ccc.de

Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank

2010-03-17 22:59:09 via email or any other mechanism 2010-03-17 22:59:15 &gt;nod&lt; 2010-03-17 22:59:44 will be doing an investigative joumo conf in norway this week end, so may be out of contact most of the time 2010-03-17 22:59:55 its good 2010-03-17 23:00:17 ok. 2010-03-17 23:00:27 off to do some work. 2010-03-17 23:00:43 k, but def read the reflection 1 sent 2010-03-17 23:00:53 i will 2010-03-17 23:01:01 now 2010-03-17 23:01:03 toodles 2010-03-17 23:12:56 heh 2010-03-17 23:13:15 i like it. free advertising to just the right market 2010-03-17 23:23:14 &gt;nod&lt; 2010-03-17 23:23:30 the tone is what interests me the most 2010-03-17 23:23:45 yes 2010-03-17 23:23:47 its not really a threat, its a plead 2010-03-17 23:23:55 slight desperation 2010-03-17 23:24:00 yes 2010-03-17 23:24:08 interesting approach 2010-03-17 23:24:21 low, no-one knows what to do 2010-03-17 23:24:40 threats wori< better with most, but perhaps they see that our sources are resistant to them anyway... 2010-03-17 23:24:54 so pleading is the only thing left 2010-03-17 23:25:34 im sure it was brought on by discussions that showed slight sympathy 2010-03-17 23:27:28 yes 2010-03-17 23:27:46 i think your intuition is correct 2010-03-17 23:28:32 &quot;if we can&apos;t scare them, lets ask nicely&quot; 2010-03-17 23:33:39 the hackers that these governments hire, the good ones... they&apo5;re the cats that can only be herded by food... but when the cat food runs out, or they get treated rough... they&apos;d be the first to dissent 2010-03-17 23:34:21 food meaning money, of course... and treatment being, well, treatment 2010-03-17 23:34:42 weird analogy, i know... lol 2010-03-17 23:38:21 yes 2010-03-17 23:38:34 that&apos;s possible 2010-03-17 23:39:09 and there are social vales that arise out of the internet that have evolved beyond those inside the isolated military-contractor complex

pressassociation@Jabber.ccc.de dawgnetwork@Jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwori(@jabber.ccc.de

Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody

dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@Jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank

ManningB_00124400
Forensic report Personal Computer of PFC MANNING 13

Attachment B
Sender Account dawgnetwork@jabber.ccc.de Sender Alias Nobody

CAF 0028-10-CID361 ROl 0028-10-C1D221-10117

Date-Time Message Text 2010-03-18 00:04:31 its like a classroom run by an overbearing teacher... when a kid strikes back anonymously by sabotaging the desk... the other kids get a little excited and rowdy, because they wanted too, but were afraid of getting caught... the teacher is embarassed and cant control the kids, so the teacher just makes an announcement that the students should continue working quiety after they have a look at the mess on the desk that the teacher is cleaning up

dawgnetwort(@Jabber. ccc. de dawgnetwork@Jabber.ccc.de

Nobody Nobody

2010-03-18 00:05:11 i think thats a better analogy 2010-03-18 00:37:17 <div><a href=http://freedomincluded.com/index"><span style="background-color: #ffffff; font-family: Helvetica; font-size: 12pt;">http://freedomincluded.com/index</span></a> <span style="background-color: #ffffff; font-family: Helvetica; font-size: 12pt;"> &lt;- recommend:fi-ee(as in freedom) hardware vendor" 2010-03-18 08:39:52 wtf is wrong with LTC Packnett xD 2010-03-18 08:40:59 you don&apos;t confirm, or even come off as poss bly confirming shit... 2010-03-18 08:41:22 lol, slipped up in your favor, i guess 2010-03-18 08:41:31 eh? 2010-03-18 08:42:06 NYT article has LTC Packnett allegedly confirming the authenticity ofthe 2008 report posted on 15th 2010-03-18 08:42:17 yes 2010-03-18 08:42:19 hilarious 2010-03-18 08:42:57 i dont think he&apos;s going to continue to be the Ml spokesperson 2010-03-18 08:43:04 they do break these mles though when being hammered 2010-03-18 08:43:15 im sure 2010-03-18 08:43:41 refijsing to confirm does make them look shadowy and untrustworthy 2010-03-18 08:43:45 i just didnt realize how little it takes for them to cave... 2010-03-18 08:43:55 true, but... im shocked 2010-03-18 08:44:12 yeah., but remember., rules are just for the grunts :P 2010-03-18 08:44:32 like no spying on citizens at the nsa 2010-03-18 08:44:43 which is common 2010-03-18 08:45:57 &quot;oh fuck, this might be a US citizen... shouldn&apo5;t we get this checked by the FBI...&quot; &quot;Fuck that, FBI is slow as fuck, we&apos;ll just keep listening in, capture him, and then tum him over&quot; 2010-03-18 08:48:27 i prefer Jen. also, too masculine looking 2010-03-18 08:48:57 heh 2010-03-18 08:48:59 nevermine

dawgnetwork@Jabber.ccc.de dawgnetwork@Jabber.ccc.de dawgnetwork@Jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nobody Nobody Nathaniel Frank Nobody

pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassoclation@Jabber.ccc.de dawgnetwork@jabber.ccc.de pressas50ciation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@Jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@Jabber.ccc.de dawgnetwork@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody

pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nathaniel Frank

MannlngB_00124401
Forensic report Personal Computer OfPFC MANNING 14

Volumes.txt

12/17/2010

/Volumes/100215 0621/B9817BE2FDDC-102D-60B3478 6952A5C90/12_0950D_JUL_07_SAF_ATTK_ON_l-8...CAV_IN_NEW_BAGHD.i^D. ppt /Volumes/100215_0621/B9817BE2-FDDC-102D-60B34786952A5C90/12 JUL 07 CZ ENGAGEMENT ZONE 3 0 GC Anyone.avi /Volumes/100215 0621/B9817BE2-FDDC-102D-60B347869 52A5C90/B9817BE2FDDC-102D-G0B34786952A5C90.zip /Volumes/100215_0621/i1/10REYKJAVIK13.txt /Volumes/100215_0621/il/persons/Sigurdardottir.pdf /Volumes/100215_0621/il/persons/Skarphedinsson.pdf /Volumes/100215_0621/il/wl/c3.txt /Volumes/100215_0621/il/10REYKJAVIK9.txt /Volumes/100215_0621/il/10REYKJAVIK4.txt /Volumes/100215_062l/il/10REYKJAVIK3.txt /Volumes/A 00215_0621/il/persons/Jonsson.pdf /Volumes/100215_0621/il/09REYKJAVIK228.txt /Volumes/100215_0621/il/wl/IIR 5 391 0014 08 C l a s s i f i e d Documents on Wikileaks.pdf /Volumes/100221_0141/7b3If6a.zip /Volumes/100224.0301/ /Volumes/100302_0316/d5463a29.zip /Volumes/100304_2258/20100304-propaganda_notes.txt /Volumes/100304_2258/20100227-0900_arrest.pptx /Volumes/100304_2258/20100227 090038SMB4642086890-arrest.txt /Volumes/100304_2258/photos/SDC10153.JP /Volumes/100304_2258/photos/SDCl0150.JPG /Volumes/100304_2258/photos/SDClOlSl.JPG /Volumes/100304_2258/photos/SDC10148.JPG /Volumes/100304_2258/photos/SDC10156.JPG /Volumes/10030'1_22 58/photos/SDC10155 .JPG /Volumes/I00304_2258/photos/SDClOl54.JPG /Volumes/I00304_2258/photos/SOCIO153.JPG /Volumes/100304_22 58/photos/SDC10152.JPG /Volumes/100304_2258/photos/SDC10149.JPG /Volumes/100304._2258/20100304-propaganda_translation.pdf /Volumes/100308_0142/74b39ef6.zip /Volumes/100308_0925/ /Volumes/100311...0856/success, z i p /Volumes/1003221255/blah.zip /Volumes/100324.1156/6e34680e.zip /Volumes/100328.1723/05000.zip /Volumes/100330_1737/ /Volumes/100330.1852/ /Volumes/100331.1015/ /Volumes/100331.1542/export.CSV /Volumes/100331.1542/split.zip /Volumes/100401 1754/ /Volumes/100401.1948/105000.zip /Volumes/100405._1225/dirf i l e . z i p /Volumes/100407.1250/split.zip /Volumes/100407.1250/split_2.zip /Volumes/100408.1833/ /Volumes/100410.1330/ /Volumes/100411.0918/farah.zip /Volumes/100411.0918/split.zip /Volumes/100412.1907/overall.zip /Volumes/100419.1656/20100419-receipt.reguest.pdf /Volumes/100423.1851/1 2 JUL 07 CZ ENGAGEMENT ZONE 30 GC.avi /Volumes/100427.2030/12 JUL 07 CZ ENGAGEMENT ZONE 30 GC Anyone.wmv /Volumes/100427.2030/cia.blah.txt /Volumes/1005041845/files.zip

ManningB_00378176

PROSECUTm^'HX PAGE OFFn;\ . PAGE OF PAGES

39
ADM; j I'EL

ManningB_00199454

PROSECUTION EXHIBIT for ideptificaf^n PAGE OFFERED: PAGE ADMITTED: PAGE OF PAGES

110922\MANNING.SDCard\E1\AttC\yada.tar.b22.nc

Items of Historical Significance for Two Wars: Iraq and Afghanistan Significant Activities (SIGACTs) between 0000 on 01 JAN 2004 and 2359 on 31 DEC 2009 (Iraq local time, and Afghanistan local time) CSV extracts are from the Department of Defense (DoD) Combined Information and Data Exchange (CIDNE) Database. It's already been sanitized ofany source identifying information. You might need to sit on this infonnation, perhaps 90-180 days, to figure out how best to release such a large amount of data, and to protect source. This is possibly one of the more significant documents of our time, removing the fog of war, and revealing the true nature of 21st century asymmetric warfare. Have a good day.

pManningB.00199473 r/\uii _OP____PAGES' README.txt

SECRET//>J0F0RN UNCLASSIFIED//FOR OFFICIAL USE ONLY 07 Jan 2010 (U) MARFOREUR G-2 TRIP REPORT' (U) Traveler: Staff Sergeant Matthew Hosburgh (U) Purpose: Chaos Communication Congress 26C3 Here Be Dragons Conference (U) Dates: 26-30 December 2009

(U) Location: Berlin, Germany (U) Executive Summary. The Chaos Communication Congress conference is an annual event that attracts hackers, security researchers, computer hobbyists and malicious computer users. This yeafs conference marked the 26* year anniversary of the congress. The conference title was Here Be Dragons which is a reference to medieval times where explorers would put dragons or other serpents to mark dangerous or uncharted territories-an attempt to explain the conference's purpose in exposing"uncharted territories in computer, phone, and other systems. The conference began on 27 December 2009 and lastW until 30 December 2009. There were some good talks about security and some rather alarming developments in the"uncharted territory!' A majority of the security discussions were in German which prevented attendance because of the language barrier; however, a large amount of the discussions were in English and catered to the international audience. I personally attended the following talks: Lightning Talks-Day 1; Why Net Neutrality Matters?; WikiLeaks Release 1.0; Exposing Crypto Bugs through reverse engineering; Tor and censorship: lessons learned; SCCP hacking, attacking the SS7 & SIGTRAN applications on step further and mapping the phone system; DDoS / botnet mitigation & hosting online communities; Using OpenBSC for fuzzing of GSM handsets;'Yes We Can't!'-on kleptography and cryptovirology; Black Ops of PKI.. A detailed explanation, assessment and countermeasure (if applicable) can be found below. 1. (U) Lightning Talks - Day 1. Lightning Talks were a two hour forum where basically members of the hacking community could present a topic or announce an event for approximately four minutes. During this talk, there were
MARFOREUR AC/S G-2 Comment: This paper has been declassified on 05 March 2012 in accordance with the procedures set forth in DoD Instruction 5200.1-R (Infonnation Security Program; January 1997). Prior to declassification, this paper was reviewed by the MARFOREUR AC/S G-2 (Senior Intelligence Officer), MARFOREUR AC/S G-6 (Senior Communications Officer/Chief Information Officer), USEUCOM J2 (Cyber Intelligence Division), USEUCOM Foreign Disclosure Officer, and USEUCOM SSO (INFOSEC Branch), all of whom concurred that the information contained herein does not exceed a level of UNCLASSIFIED//FOR OFFICIAL USE ONLY. The paper's author, SSgt Matthew Hosburgh, was dischared from the United States Marine Corps in June 2010 and therefore was not available to participate in this declassification review.

SECRET//N0F0RN UNCLASSIFIED//FOR OFFICIAL USE ONLY

M a n ie .o .o 4 e .

;^:g:5A(!'^''''''''''
A rw/narTRn-

_^ ification PROSECUTION EXHIBIT MC> for id/htificatioi

I^-

^ECRET/ZNOFORN UNCLASSIFIED//FOROFFICIALUSEONLY presentations onT^-Be-Gone(auniversaI remote that can tum offtelevisionsets ^omadistance),andafewotherprcjectsthatwerenotofmuchsigni^cance. a. (II) Analysis: This forum seemed varyinert. There was alsoalack of speakers fi:^r dayoneasthe Intemet ^rthe conference centerwas down andalotofthepresentations were stored onawebsiteon the Intemet. b. (^^Countermeasure: N/A 2. (ll)^hyNetNeutralityl^atters7Netneutralityisfastbecomingahottopicin theintormationtechnologyworld. Essentially,this talk presented what it isaway ^ r an ISP companies to more tightlyregulate levels ofservice to the user. This could be in the form ofmakingusers pay for exactly what they need on the Intemet. For example, an ISP could provideacustomerwith three packages to choose 8^om,sayl-3. Packagelcould cost ^30 per month and only allow access to Google searching and news websites. Package2could allow more access fi:^r^Opermonth including email, web browsing, and access to banking sites. Pa^age3couId be the ^^pr^ium package''as it would allow access to music,YouTube and othermedia sites (to include packagesl-2). The ISPs would be able to regulate the intemet content and not just bandwidth. This is the core issue: limiting access to content and not bandwidth. The talk made the case the Intemet should be kept open and ^ee. Jeremie2^immermanwasthepresenter (aPrench citizen) and he said his organization had been lobbyingthe French politicians to keep the Intemet open. Hispleatoeveryoneattheconfi^rencewas to lobbyinourrespective countries to keep the Intemetthe way it is today. a. ^(S^/NF)(ll//FOLIO) Analysis: I^eepingthelntemetneutralhas its benefits. It allows the ^eeexchangeofideas which promotes global communications. Basically,the Intemet is the same no matterwhereone is in the worId(relativeIy speaking). Taking the openness out ofthe Intemet would hinder global communications and business. On the flipside, the Intemet, as it stands today,isaplaygroundfi:^r malicious users (creating viruses, cyber ^aud, child pomography,and other crimes). Further, the Intemet is an essential communication tool fi:^r terrorists. Terrorists cells can use the Intemet toobscuretheirtraflic, as well as, other tools to enerypt, hide and send messages. By filtering the Intemet, this problem may be minimised, but atthe cost oflostrevenueand 8^eedom of speech. b. (1^ Countermeasure: N/A 3. (11^) WikiLeaks l^eleasel.^. Wikileaks.org, isapublicly accessible Intemet Website where individuals can contact with leaked information and have it publishedtothepublicanonymouslywithout fear ofbeing held legally liable. The infi:^rmation that can be leaked includes, but is not limited to, classified infom:iation,tradesecrets, corporate information, personally identifiable information, and even operational data. The goal is to promote ^^open-ness" and OECRET^^NOFORN UNCLASSIFIED//FOROFFICIALUSEONLY

l^afioifigB_0041^547

SECRET//NOFORN UNCLASSIFIED//FOROFFICIALUSEONLY toensurethepublicis^^wellinfdmied" to what'sreaIlygoingon.The founders of WikiLeaks claim that they have not had any oftheir sources compromised or uncovered. Oneofthe most alarming pieces ofthe talk was that WikiLeaks was se^ingto obtain^^off shore" storage and dataprocessingoftheir site so that they wouldnot be bound toU.S. law. This concept is similarto that oftheprovei:biaI ^^Swiss bank account." a. (l^^i^P) (11//F0110) Analysis.WikiLeaksrepresentsapotentiaIfi:^rce protection, counterintelligence, operational security(OPSEC), and infomiationsecurity(INFOSEC)threattoMARFOREUR/AF.The intentional orunintentional leaking and posting ofUS Marine Corps sensitive or classified infi:^i:mation to Wikileaks.org posesalargethreatnot only ^om the external disclosure, but 8^om the insider. Theinsiderwould be able to easily leak information without fear of any direct, individual, repercussions. Further, when the off-shore storage is implemented, WikiLeaks will have more latitude to distributeand publish leaked information as it will not be bound byU.S. law. b. (F0110)C^untermeasure:ForMARFOREUR/AF,ensurethat employees aregiven annual securitytraining. Remind cleared individuals oftheir agreement to safeguard 9nd not disclose classified orsensitive infi:^rmation. Enfi:^rce document accountability. Ensure that classified infi:^rmation that is no longerneeded is properly disposed of Recommend implementingacontrol to ensurethatwhoeverprints, the document and userisIoggedfbralIsystems(unclass-SCI).Enforcethesecureprint feature fbrtheprinters in the hallway,that is, where uncleared individuals maybe in contactwiththeprinters. (11) Exposing Crypto Bugsthroughreverseenglneerlng^This talk was given by Philippe OechslinofObjectifSecurite. HeisalsoaFrench citizen. His talk was aimed at explaining how poorcodingofprograms could beawaytoattacka system vice tryingto break theencryption algorithm. Essentially, exploiting bugs tobreak-in/manipulateadeviceorsystemvicetryingtoexploittheencryption algorithm, such as AES or 3DES.T^e devices he demo'dwere the MXI Stealth (aFIPSI42-3IeveI2certified USB flash drive), the EISSTE-Capsule(an electronic safe for data), and the Data BeekerI^rivate^afe(anothereleetronie safe). Duringhis demo, he showed how he could break^in to the devices, by reverse engineering the code using publically available Hex Editors and commercial tools. He used the poorly written code to obtain access to the devices. a. ^i^F)(l^//F01^0) Analysis. Based on thedemonstration, standard crypto algorithms, such as, AESand3DES are very secure ifimplemented correctly. Theywill thwart any currenttypeofbrute force attack. However,iftheprogrammer does not implement the crypto correctly,the deviceorprogram can beexploited or access can beobtained. The crypto SECRET//NOFORN UNCLASSIFIED//FOROFFICIALUSEONLY

l^aofiifigB_0041^54^

5ECRET//N0F0RN UNCLASSIFIED//FOROFFICIALUSEONLY will remain unbroken, but the device or software can be broken because of poorimpl^entation and reverse engineering, b. (^//NF)(1^//F01^0) Countermeasure. EnsurethatUSB devices, that are relied on to provideadegreeofsecurityusing crypto, are certified by the NSA or other agencytoensurethatthey are indeed secure and ^ee ^mbeingreverseengineered. Simplybuyinga^^secureUSB"device ^ m the PX is not an option ifit not approved. Guard the keys to decrypt the device likeapassword and do not write them down. Use complex passphrases to secure the device andnot an easily guessable word or phrase. (1^) T^ran^eens^rshi^: lessons leame^.Toris an acronym forthe The Onion Router." It isanetwork spread across theglobe and its aim is to provide anonymity and obscurityto its users. There are seven ^^oot" servers that are maintained by staffmembersoftor and otherrelaynetworks hubs that users can setup to host an instance ofTor at their location. Toris becoming ^uite popular today among many censored users, for example: China and Iran. Because China and Iran block and filter content,Tor is used to circumventtheserestrictions.Tor isfurtherbecomingmoreofahard-to-pin-downanonymizer. RogerDingledine was the speaker. He gave the current state ofTor in the world and how it was being utilized. Even af^er China attempted to blockTor, the network evolved as is still able to function despite the blockage. An alarming statement made by one ofhis colleagues was that ^^e"^^shouIdgetjobs at Cisco, Symantec and other securitycompaniestofindoutwhattheirintentionsareforbuildingthesesecurity appliances(firewalls, IDS, etc) and leak them to WikiLeaks." His colleague blamed the securityvendorsfi:^rmaking it easy fi:^r governments to censorits people and thus the need to find out why and how theyweregoingto develop the next device to make filtering easier for an organization. Hefi^erw^tontosay that knowing why and how they are filtering will allow ^^the community" to respond by catering securityappliances toward organizations (businesses)and not governments fi:^r censorship. a. ^^(l^i^i^^^(I^/^01^0) Analysis.TorisanefIectivetoolthatp^^^ browser anonymity and obscurity on the Intemet. It is 8^ee software available to the world. The threat it poses is that it makes itverydif^cult to know wherecertain traffic is coming 8^om. ForexampIe,amalicious attacker could useitto obscure his or her IP address. MARFOREUR/AF's systems could be attacked by China and we would not know where they are coming ^om. The threat posed by this is not necessarily and insider one, it is primarily an outside threat. It would make it very difficult to monitor traflic of an individual/organization utilizingTor. b. ^(^(ll//FOUO)C^untermeasure. Atthis point, there is notmuch in the way of defenseas the ^^standard" filtering ofTortrafl^ccan be circumvented by way of usingarelaycircuitwithintheTornetwoi^. ^ECRETZ/NOFORN UNCLASSIFIED//FOROFFICIALUSEONLY

^aofiifigB^0041^54^

^^ECRET/ZNOFORN UNCLASSIFIED//FOROFFICIALUSEONLY Educate the users and the IA personnel on the power ofTorto hide where attacks may be coming ^om. (U^SCCPhaeking^attackingtheSS7^SlGTl^ applications ousted further an^ mapping the ^h^ne system. In this talk, Philippe Langolis discussed the current state ofthe phone system. Hesaid,^^SS7 is like TCP/IP in thel990s.Itused to be i^uiteasecure network because nobody outside the organizations (here, the mobile operators and telecom companies) were connected to it. Now it^s getting interconnected to new actors which are not that trustworthy. He fi^erwent on to saythat the Blue Box (used togenerate tones which can access the ^^supervisory" function ofthephonesystem. From there, additional tonescanbeused to generate desired eflects) is makingacome back. There^sa world beyond pure SS7: the phone system applications themselves and most notably what transforms phonenumbers into telecom addresses(also known as Point Codes, DPCs and OPCs; Subsystem Numbers, SSNs and othervarious fun.), and that^s called Global Title Translation. Few peopleactuallyrealize that thenumbers they arepunching on theirphoneareactuallythe same digits that are used fi:^rthis critical translation fiinction, and translate these into themythical DPCs, SSNs and IMSIs.Moreandmoredatais now goingthrough the phone netwo^, creatingmore entry point forregular attars to happen: injections, overflow,DoS by overloading capacities. The mobile part is openingup, thanks to involuntary support 8^om Motorola, Apple and Android." a. (U^Analysis.Theattack surface for GSM is increasing daily. With more entry points, the technology is at the tip ofthe security nightmare iceberg. More securityproblems will ensue in the next few years. b. (1^ Countermeasure. N/A. 7. (l^)DD^S/b^tnetmitigation^hostingonlineeommunities.ThistaIk discussed the ^^business" of running an online community,suchas,asocial network, newsgroup, etc. The discuss honed in on what needs to happen while experiencingaDenialofService (DoS) attack. Essentially,the speaker stressed the need to haveagood relationship with the ISP orwebhosting service incase something out ofthe ordinary should happen. a. (^Analysis.This discussion was relatively inert; however, it does go to show that the sophistication ofsome ofthe ^^derground" online communities are looking at hosting as more ofabusinessin such to keep their communities up incaseofadisaster or attack. b. (1^ Countermeasure. N/A. ^. ( f u s i n g OpenBSCforfu:^ng of GSM^han^sets. More tools are available to attackers looking to exploitingtheGSM netwoi^.Thisdiscussionpainted the picture as to the current state ofthe GSM attack surface. The GSM protocol stack ^^ECRETZ/NOFORN UNCLASSIFIED//FOROFFICIALUSEONLY

l^aiifiifigB^00412550

5ECRET//N0F0RN UNCLASSIFIED//FOROFFICIALUSEONLY isacommunications protocol stack like any other. There are many layers of protocols, headers, TL^^s, length fields that can ^^accidentally^^ be longer or shorterthan the actual content. There are timers and statemachines.Wrong messages can triggerinvalid state transitions. This protocol stack inside the telephoneis implemented inCIanguageon the baseband processoronareal-time operating system without anymemoryprotection. This flaw means that the attack surface is increased; especiaIIy,becauseofOpenBSC. OpenBSC isatool that is ^eelyavailable that can be used for GSM protocolhacking. a. ^^^(8i^i^^(l^//F01^0)Analysis.GSMnetworkshave,forthemos^ been offlimits for attackers(phreakers)historicalIy speaking. With the release ofthese^eelyavailableGSM protocol tooIs(OpenBSC), the avenues for attacking GSM hasgreatlyincreased. This could bea precursor forasecurity nightmare on the GSM network. Expecttosee moreattacks on the GSM network in the nearfuture. b. ^(S//NF)(ll//F01^0)Countermeasure.Enfi:^rcingOPSECand INFOSEC training isamust. As the GSM network can be attacked by anyone not only fi:^reavesdropping, but for denying service. Consider using secure Iridium phones whenever practical. 9 (II) ^^Yes^eCan^tl^-onldleptographyan^ cryptovirology. What is kleptogr^hpy and cryptovirology? IGeptography(the art of employing public key cryptographymaliciouslyaspartofamalwareatta^,suchasinransomware)and thereIatedcryptoviroIogy(the art of embedding cryptographic Trojans inside tamper-proof cryptosystems). Duringthis talk Dr. MotiYung discussed some of therealitiesofthese threats. Hedidn't go into detail ofhow to employ the two, but he did underscorethesecuritythreatthatthe two malicious attacks can present.Thisisaninstancewheresomethingthatwasdevelopedtobringsecurity and peaceofmindhasbeenmanipulated into somethingthat an attacker can use to blackmail and/or attack withoutmuchefldrt. c. (l^)Analysis.These two attacks are veryserious and can be difficult to attack and remedy. Traditional virus signatures will haveahard time recognizing cryptovirology. Phishing attacks, especially brought on by poorOP^ECandPII practices, make this attaekeasierto be conducted. d. ^(^(l^//F01^0) Countermeasure. Ensure that users are briefed about phishing and spearfishing attacks. I^eep virus definitions up-to-date and ensure that email signatures are being utilized within MARFOREUR/AF. At home, do not open email that you do not know the sender. Beweary,if adeal sounds toogood to be true, it most likely is. 10. (11) Black Ops ofPl^.This talk wasgiven by Dan l^^aminsky. He isa penetration tester ^rasecurity company in the US. He made the case fi:^r the insecurity ofPI^I on the Intemet. Mainly, because ofthe lack oftrusted SECRET//NOFORN UNCLASSIFIED//FOROFFICIALUSEONLY

l^afifiifigB_0041^551

^ECRETZ/NOFORN UNCLASSIFIED//FOROFFICIALUSEONLY certificateauthoritiesit is fartooeasytoobtaina^^alid" certificate. Further, he explained some ofthe common ways tomas^ueradeasavalidcertificatein several different web browsers (IntemetExpIorer being one). He went on to praisetheDoD for havingaworkingPI^I system. Fortheopen Intemet, he said he had hope in Secure DNS inhopefuIIycu:ibingthenumberof invalid/unauthorized certificateauthorities.BasicaIIy,makingitharderto obtain acertificateand makingP^I more secure. a. (1^ Analysis. Secure DNS will help with the issueofcertif^cateauthority on the Intemet. It is scheduled to be released within about six months. The current state is that Pinion the Intemet should not be considereda means to identify an entity oruser is who they saytheyare.The DoD should continueto implement and secure the PI^ICAs to ensure the in^astructure validity. b. (11^ Countermeasure. Ensure thatusers at MARFOREUR/AFareaware that the Pinion the Intemet is notthesameasPI^I within the DoD. It is notsecure,so do not trust it like you wouldatwork. Not to say it cannot be trusted, it justneeds to be scrutinized more. (l^Conelusion.The Chaos Communication Congress 26C3 Here Be Dragons conferencewasagood security conference to attend. It explored the ^^out-of-band" securityissues faced bysystems currently employed bythe world and specifically, the DoD(MARFOEUR/AF). Theconfi^renceprovidedagood means to observe the hacker communityinEurope. Thetalksprovidedinterestingandthoughtprovokingsecurity discussions which can be used to provide awareness at MARFOREUR/AF. FromwhatI gathered, there were no impending direct attacks (hacks)on US Persons or MARFOREURattheconference.

M. J. HOSBURGH

SECRET//NOFORN UNCLASSIFIED//FOR OFFICIAL USE ONLY

ManningB_00412552

Prosecution Exhibit 44 7 pages classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

prosecution Exhihit 4^ ^2 pages classified "SECRET" ordered sealed for Reason2 military ^udge^s Seal ^rder dated20August2013 stored in the classified supplement to the original Record ofTrial

prosecution Exhihit 4^ has heen entered into the record asaCT^^T^^T^ and will he maintained with the original Record ofTrial

prosecution Exhihit 4^ has heen entered into the record asaCT^^^^T^ and will he maintained with the original Record ofTrial

prosecution Exhihit 4^ ICT^ classified "SECRET" ordered sealed for Reason2 military ^udge^s Seal ^rder dated20August201^ stored in the classified supplement to the original Record ofTrial

! -

flame

Lat
IIMIten
.-E.: {3w^aJE53uBBBB%.. ...

_j afg.everts.csv jJ fq_evefi*s.csv README txt .J^EADME.brt

01/03/10 12:47:50AM Ol/OS/1002.S6:iaW 01/09/10 03:16:04AM 01/09/10 03:16:04AM

ManningB_00125328

PROSECUTION EXHIBIT 56 for identification PAGE OFFERED: PAGE ADMITTED: PAGE OF ^PAGES

GL O OL O O O aGuiuuei/M

3
^

o o
3 _

o
(D

3"
Oi

(D 2 5 3

< D5 ^ o<a o 3 <D 0 3" Q) c


3

3 S ^!
0)
<

3^
0) < D 3 (D C 3

ill
(D
^ H l

s- S

< D
^ H l

<

m
o
(D (D

w" o
^ H l

o
w
D)

3 O

w
Q)

3 3 o a (D (D O 3 (fi

M
K) K)

(D 5r

PROSECUTION EXHIBIT SjLfori^tificatim! PAGE OFFERED: PAGE ADI/lTTED' PAGE ^ O F PAGES

(Q 3

^ LOO LOOO aBu!UUB|/\|

(D (D (D

o S QI m 3
o 3
3
(Q

i 3

a. 3 CO %

Q. ~ Q C D

^Si
(D (D

II
VB

=1 3

o. O o
Q.

-h C D O Q)

& )

(0

3 (D

S i
o" o

3
< D '

(fi
N>

9L O OL O O O a6u!UUB|/M

(D (D

(D

o H3
O (D fi)

F^O

c q a: 3 o o

fi) O fi) U S 3. C 57<Q Q . 3 fi) O 0)

-Ii
fi) g-oT?

S"=5
*< (/) fi)

(5 ' o. 5 ' 3 3 3 < D (/) 2


C D N> N>

Slit I? (D 3 ff
2,3
< 5
<.2. 3 </)

ll
^

fi) S Q. (O O -

( D 3"o 3 S-O

cog g -"

0) %

? m
3

(?S5.s:

sii:
C rt^*<

si o
3 o o
Q. C D C D

C D

3.

3?
(/) (/)

m
#

^Sig

(5*
o c
fi)
(/)

i " !
5 (?<

C Oo

2, (g
o
M (3) CJl

-h

O" (Q "U W) fi)

o Q o 3 o 3
fi) 3 O 3 (D

I's

III
Hi
(D fi)"0 3 <D 0(QZ3

ro

Sfa
3 t ^ " O fi) (^(D

o a

9L O OL O O O aGuiuuei/M

w
&)

If

(A

<f> 0)

o ^ S>

It

3
<

0)

Li
y (D

tf) 0) 0) < D O < ^ tf) tf)


^

3
H

(D

3 w'
va

tf)

y (D (D

3 (D

"D m (D
O (D

C D

3 o

3-3
CQ "D

tf)

ru

I
9L o
O

&i
m 6'

g's

LOO LOOO sGuiuuBi/M

i>
(g
W (D 0) C "O "O

(D
1

(D
< <

(n r (D o

I C D
(D

5 7 Q)

pu!

3 o

q o

(0 rn fiT a 3 0

o CL
(B Q)
m
3

o 5

$ <o Q.

is
<

(5'
o c o
(D fi) 3 O (D
^11

(D
(/)

(O 3 "
O

C O

(/)

c "O
0)
N3 O)

fi) 3
<

?s
fi)
Q.

fi) ? (D 9

fi) fi) O"

S 5 < D
(D

^LOOLOOOa^^^^^^l^
^ ^ ^ ^

a,

c^

s^
^ I

II
3 fi)

5 ^
$ ai^mm

2 5-

^ ^

3 3 CO C O

n
ro
->j

o c

C O

(D o. o
l ^ H I

z
(D

o c o ^
^ ^ ^

o 9L D
I

Oa

fi)

^ ^ ^ ^

O
^ ^ ^ ^

3
^ ^ ^

3
^

CJ

fi)
(D

fi)

CO

90

o o
^

6L O OL O O O aGuiuuei/M

>-o

ll
s

I"

Sg^m
E. C Dc o _ q

wS g

Q) C D g C O

^sl
o

co" ^

8=* " I
0)

0) DC O 3 C D C O ^C . D O 0) :^ O 0)

^^i^
3 -o M

i . g o'
_j C D

m C O 3
C D 0) 3

>

"ill
^(o':<
C D > C O Q)_ ^ 0) ' C O
5

C D

Q)

C O

>i

w
N> CO

o
3

0300 LOOO g6u!UUB|/\|

C D

>

j>^il
o S fi)
fl) 0 C D O. Q- ^ fl) 3 _ (D -Q C D

fl) O g 5' o- 3.

T ^ ^

go
m Q_ _ . fl)
fl)
_Q 3-

it
s=
Q. C D

^
>

fl)

D ^
^ m I

n -0

o
C D C O

O fi) =: C O

8 2. cog
W fi)

ii
3 fi) "O O "O, C O C O fi) O C

(D C O
O
Q) C D Q- Q) =7 fl) fl) C D -Q Q_ fl)

If
C D

H flT
Q) Q.

CL 73
^ %

C D a
O Q)

S L I O
C D

fi)

co'

c_ 5: fl) CL >
N "

^ 3 D DD
"

c
3.
<

o
^

o.
fi)

C D
-1

fi)

o
X3

D J)
o
<

m
aO

I\)

CO

fi)
(O

UJ

L300L000 g6u!UUB|/M

m
X

eaOOLOOO a6u!UUB|/M

(fi fi) fi)

S. 3

8S
X O < D

Z 3 O (fi a o 3< / ) (fi


(fi 5. (D (D X (D "O

g o
fi) 5 : 3 3' (Q
l\) hJ

C O <D

E Z O O L O O O aGuiuuBj/M

C D 3 fi) C D
O
$

U" C D 3 CO C D O

O-

^300 LOOO a6u!UUB|/\|

3 C O

^. o 3 ?

CO c < C D 3 O "O C D 3" < Oa C D CO


O C O

? 5"

"D (A 3 " fi) O <

O *

? 3
- <

ll
D)

? >

C D i wc ^
%

TT (fi

C D O 3 CO

7]

3 < D

&

CJ

I!
c
#

fi) - o

CO z j t g C D3 ^
CQ

H?
Ill
< D p tf)

8 fw
3 <

3" fi)

9200 L O O O a6u!UUB|/\|

I I I O 7J
C D

<
Q)
3

C Q
(/)
C

C D o ' CQ ~
m O
C D *< C D

o
(/)

C D

o
o 3
"U (D X

"D
Q}

3
<j)

m
3

C D

C O

m
C D

9300 LOOO a6u!UUB|/\|

O
C

Q)
T-i

C D C O

CQ

S "3

^ tfj. C D C D C D Q) CQ

9
0
0) (D Q.

IW k33
5 3.
o o
0)

II

C D Q) C D

o o

CQ C D m C/) (3. C O Q. C C D C O D 0) C O C D C D C D

C D C O

3'

i s
B
3

CO CD

3-g 3

w (fi

m
C D

O 3 C D C O = C D 3 C D 3 CQ C O 3 . CD CQ 0) 3 ' H C 3 ^ O C O g: C D Oi O C D T CQ Oi C O

rel
Mm
>

m
C O

3 73 -t
I

E2
Oi

3S L
(fi
Oi

C D

K) K) Ul

2300 L O O O a6u!UUB|/\|

(Q

S T3

a?

i ?

3 O

< D Q. (D

M S
=

ill
c o 3

ill

ii|
h ^

Ifl
'ii
(D A) ;^
(fi-

I
a
& )

C 0) (Q 3- O ^ (D 3(D

5" (D O

o
35
(%"

i^-

C O

(fi

g Q)
m
3

III
|i
3- s; ^ w' "

(fi

m
C O

C D

8300 L O O O aBu!UUB|/\|

o
m
C O

>

o ^
w
_
fi)

C D

C O

Q)

a
(D < D < D _
$ &

O
0)

cp|
3 > 3 fi) fi) (fi fi)

Z D

> !
M N)

gS. 3 fi)
O c
"O
( / )

> >

o
(Q

0) i n

C Q

C O d)

c 00 O CO (0 C^

m
CO

<

^)

1^

ManningB_00007351

PROSECUTION EXHIBIT 5% fbr idcjXmcation PAGE OFFERED: PAGE ADiVdiyTEDPAGE OF PAGES

C M

^^U^^

o
I ^ H

C D C O C O C O U)

<

I ^ H

o
U)

c o

00 T3 CO

m I o

.I"!
^.s
Q.S
G)

. S > a:
^ <

C O "O

s "o 0 o @

2
o. C O

a J S C

TJ .2
0) "O

O C O

5?
C OC O

O 0

ss
5 ^
O C O 'C

11
E .2

o 0 .E 0
-N
o

(0

=1
ts
.> d)

s= o
0 0

00 O)

c -SEE

11
^ E
0)

si %.2
C O C OO E 0 0 00 X O C O o CO 0

>

O 0 (/> o

ManningB_00007352

u il
O
Z cs

2 I

il

>
aO

0
C

H < D

4^
LU Z

CO

m
C O
^

^ I
m _
3 C O i;; ^

00

3
%

z
LU Z

O
UJ
>

"D
<

MannlngB_00007353

g:

tf) O < u. UJ I^ S z DC


UJ UJ

C O 0) (D X LU

9
z

tf)

II

O C D

tf) tf) UJ tf) tf)


< ^

UJ

o o

m ^
JJ o

C D CO "O r O 3 C O C O

CO

LU

o O ^
o

o
>

LU C O
C O
^

DC

C D C O
^

(g
0^

z tf) UJ z
O

5
(0

C O

TD O

I U Q_

C OC O

ID 0) C O C O C O

o
C O D)

_ c g U
D) O 0) O

2
0 Q_

J^ C O

O
O JD ^ C D C O
O C O 0)

DI
C O

C D O)
<

o
C O C O

C O C D ID C D O O

_ c o

E
C D

u
C D
-I

;g o
C D

QI

-2
o

o_
Q<

g > o

C O

C D

o
ManningB_00007354

<

Q QC O

6 S

o I o LU O

si
Lll S

g 3
! 0)

LU C O

C O D)
\ %
t

C O

lO

g o
3 G O

C O
^

c 0 E 3 o

>^ t5 0) b o

o
C D
M H H I ^

o m o M
C O C O C O

E .
O C O

O O lO "O CO O CO "D C D C D CO C O

o ^ io 0)

^ or:
<

X5

o
D)

O
I

^1
o c
. C D
T3 C D
^ i_

% CO O ID

C D Q. C O

o
QI
C D
f

^ E
O 3 00 o CO _o

T D T" C D D o C m CN > 3 ^ o

O).^ C JD

C O 0)

> g o C D

ManningB_00007355

I LU C c Q Q

c
An

O)

s
CTI

0) "O c~ C O o f~ (O C D

<l

s
o

C O C O

o c

Do

o
<

3 O

C O -o Z G )

7. ^

Sw

-Q C O Q TD DC CD
<

I
>

E
C D Q.

C D
O)

z o

O i5

gEc
CO C O O

8 m

CD

C O D) C C O

0
(0 <t)

E
0
I ^ H

0
C O U) O) O

C O TD C D O)
<

II
(0
^

o o

c o
^B

U
C

S f
0 0

o
^i

O
LU

o 5
c) E

II
a a

S3
o o

o 'u>
I ^ H

c
E o o
3 O

0 O

c o

o
^H

C O C O 0

"co
C O 0

o
0

<

o
UJ

ManningB_00007356

^ ^ ^ ^ ^ ^ ^ ^ ^

^ ^ ^

C^ C O

0
Oa

tf)

c^
C^
^ ^

0
^

0 O^
a^

00 CO

0^
^

CJ

ManningB_00007357

O o o c 0) ^H


s
2
Q) (0

C D

Q) (0 (5

01

s
(Q
tf) 3

c .o

< Q

Qj
Q) O

O Q)

C O

0) (Q

Q > CO Q) tf) 3 (0

.2 c

a
0) tf) 3 (0

15
c o
(0

0)

Q)

o OJ

2 b

<Si
&S

Q) (0

00

o5 E
o = o eg
(^3 ^ 0

>

"O 0

c C (0 o oc
0 O

0 C

2
0

a
"5)
^B

2o E'B

o
aB

o
(0 0

il

hr 0

I
0 0

2 c
3 O

U C D

0 0
maaa

o o
C * ^ "0 OTJ C 0 (0 0 N

0 g>
La 0

NI C M 0 0 O.
a

If
g (0 .E 0
O 0 m (/)

u^m

c o
0

2c o (0.S2

II
0 0 0 3 0 "U O 0
N

E
0

o)^ a
_
0

a
c
B^H

i t o-c
0-^ 3 0 o 0 C 3 O 0 C
0 d)

.62 c o

0"0 -C 0
0 %

o>

O.E
* - O)

0 O) 0 O.

oo
50
(0 c
0 r--^

^"U

E o

.2 O)0 c E

.i i 15
0 JS
0 ^
0) CJ

C D_ 0

'ia
E.E
c

O c
. 0 0 $

o$
xiJS

i! a'^
o *0

0 o 0 o-d 0 0 oS
k 0
0(0

It
0 0

go
o ^
"OO

0 = o Q 0

0 JS

o ^
0

ii
K 0

ManningB_00007358

CJ)

B 0
% 0 0 G) (/) ^ 0 3 "D ^ C O ^ 0 O

1^
85
O C B

tf) tf) 0)

o o 2

li
0

c E .2 o

Pr

o o

b^2i
N
ed]
I

o 0 0 ^ g>-Q 0 Q)

si
si
.gc 0 0
X !=

1
0 Q)
"D C ^

ManningB_00007359

>
(0 tf) (0

c o a re C o> u o u 0
Ui 0

3 C

CM C O C O

sill

liii
Q,"D 0

5 rt21 ^S?
3 O C 0 ^ 0

.2 0 o

.2 0 c 0 5.2

Oa

^ Elo
^

Q) 0 C N

lo^l
2|||

gs: .115
0) c u> 0 C S

.11
3 0 o g. U Q. 0 0 C 0)

2i Io )
o" 5 5E
</) o "O
M

Ill

O "D (0

5 m g
C D i S * t 15-

p o O) o 2

co 0 o .= o

C O

c
O
^H

OT O ^

0 C

o
O)
^

2
o. O
bo I I
KM
C O

D
O

(/)

tf)

0
^

0 C C O o 0

^H

0
Oa
B\

li
^ ^

Ei^ o O o
(/)

E
^ ^ ^ ^

0 3 O)

O)

*2
0 C O

5.1
C O 0

C^^^
^

IG) 0 U) 0
Oa

> E w o ~. O O) o o
^ ^

c^ ^

^.il
_

il

C O c 0 OT = 0 = 5 Oa

o $

o I;

2 aS
0 O O C D

,0

C O

< 0 Ui .

C O

c
O

o
1 =

a c .12

Q. jfi

? 2o O C O Qc .2
OT

K 1 O E
(A
O

0) """

o
0 0)^

^ E% )
< C

>

0 o Q o^""

= 8
^ ) .>
ManningB_00007360

A A A A 0 A 0

11
jO

1111.
H B H

I ^ = O

Is.

1.1$ H
A A
C O 3

o
lO
I

O O
>>

o Ui Persor
o c
0
B ^ H

"D
lie

>

<
as

k _o c
0
>

"O Q. 0 only be ap WV UC
as

B ^ H

CM C O C O

*0
B ^ H

c
^

Oa
>

as

o
0

aO

ca

o. o>
0 Ui 0

c c o
B ^ H B ^ H

"O 0
f-

C O ka

C O C 0O
L_

'W'

rev ent em

II
0 ^

anizati

BO

S r lassi

w ation t
B ^ B

c o

#m

O)

rair

8.J2
c.|
ManningB_00007361

0.

A o

OT <D

DC A

E OT o ^ o c
B ^ H

A re

un der

c c O

Oa

BBIH

O o (0 C o 0 0 r* ^ +^
B ^ H

ion

OWI

ontr

f the US

CM as 00 I

O T3 Ui O

lent

O ncy

c^

C
I ^ B

o re

E
U)

o o^ ^
^ ^ ^

c
^H ^

.2 C "S D
re o E
C O C O

o.
CO CM
as

0 ^ O 0

o
3 O

a a

C O

Ui 0

lassi

lassi

0 Ui 0 O.

f0 c

c ^

ea

> "O tn ^ 0 0 "O as C 0 ^ . ^ OT ^ C O mwmm ^ ^ ^ ^ C O 0


>

c c 0

c
a a
B ^ H

> l

0 O

B ^ M

0 O

C O

3 O

o
0 0

OS 0 0

.s>8
ManningB_00007362

re O

C^

o 0) Q

CO

o = "5 c t; 0
0 Oa ^ 0 N 0

0)

c . re tf)

0) < D

^ I

111I I
C 0 O C O C O
as

%f C O 0 O. CM CM 0 Ui 0

fll
$

II
a> , ,

iu

< ij

M-

C O 0 C O >

S.O
re
Q ) 5 S "O

0 aS 0

iiil
X U JE J

o.

-o Q. o
0

0 C O -S

l^ '|i i
Q.^ ^ o

^C O Q) r0

.fi
ManningB_00007363

E 0 c O ^ c o o _3 ^
o O

0 Ui u 0 Oa 0

ll
c

o^zo P o o

4B>

Pi

ManningB_00007364

lO

C O C

C O

CD
I ^

C O

0
Oa
as

II
0 O. C

0 C OC D "5 0 C c 0 ^ 0 C O o 0

C O 0

<

Oa

C O
ti^m

g
CO

CM CM

2 ^

0 Ui 0
Q.

o I Ui
c c
5) 0

0 ^ IO ^ a C O C O 0 C O O) . "U 0

O f 0

tf)

IU C O C O

O
^

(0 o

O
2 o

5 o
z

C O I J o EE a; O^ = aO g)^
aO aO
< ^

0 C O

ManningB_00007365

<D

(9 0)

C O

i2 22 c o
0 0

O
0
aO

>

m o
0

Ui

S c o
CO
I ^
B ^ H

z c

Ui 0

0 C O 0 0 0
as

m .fi re
0) c

"O

c m

&'i
"2
O O 0 0

m o 'm
(fi jO

C O 0
CO CM

o
CL "U 0

|i
fi.

O m

m
m
0) .Q (fi

0 Ui

o.
C O

b
0

o
I

C O5
o.

C O

o.

Ui C O 0

C O
I

|2
I

JS
(fi 0) D)

CL
C O 0

O
C O

5
z
UJ

2"
C O

c
'(fi

(D
UJ
^

o o o
*

tf)

tf)

ManningB_00007366

UJ
B ^ M

Oa

c C 're
B ^ H

tf) Ui tf)
<

^ >

U_

O 0

O
0.
as

o z

rtr

"O 0

o
0 0

* ^

0 o 3

"O 0 0 > C O 0 3 C O ^ Ui 0 c JC ^
B ^ H B ^ H

b% 12
iSsl
tf) -J

aO

^ C D

O
Q UJ
tf) tf)
<

" c o
B ^ H

E
B ^ H

rke

re
ed

C O 0) T3 0
>

II
toi
o re re
(D o

Q_ UJ Q. tf)

o
3
<

_
O

C O la. C O 0 0 0 O O 0 c .O 3
ManningB_00007367

.2 E
Q.2

2o
a-fi

z o

^1
c
<

00

75 re Q)

i 0 if

11
s
Q. ;e
C (0 O tf)

l1
C

O "O CO)

. =

:^ I
V/

re

gU
c :

"5 -o re = Q

"Si
^H

P 7s

o E re
0 ~

ll

I"
re o % re

re
^H

"Z Q)

re o D
< D tf) 3 ^ O) re 3
tf)
>%

ManningB_00007368

U (0 a Q. >

$2

O X LU O
C O
Q.

O)

C O
L_

C D C

O C D
3 C O

D 0
C O C O

. E < D
w B
$

m u c o
0)
Q.

. _

E
C O

C O
4

r
o c

o
0)

C O

I
C O Q_ Q.

C O 1_

O)

C O c

O)
i_

TD O

S^-o
g

2 C O
C D

o o

C O C O 0 "D ^ C O C C 'O O C O
I -

C O

o o

Q-

>

Q C Q
< '
C O

o)

Ui

C O
L_

c E o
^ C O

in

G> ^ C3) Csl C3) O ^ CM r-

1 Ri
Q_ =

C O

o
L_

2
C O

o
C O C O C D

C O

O) g
4;

C O

C O E

S > s O O

S o:

'il
C O O

C D C D

C Oo
rC D Q.

C O

. CN

S 5

C O
ManningB_00007369

O LU

o
CM

0
tc +j

_c _o o_ ^
C O C O

o
0

O)

15"

UJ

OC

C O D 0 C O C O

o.
C O

11
C O
_ C Z
L_

^ j .

Q. o

UJ (0 Q.

$I
C O E
^

C O

CD
<
"GO

C3) ^ CJ) Csl C3)

UJ

o
o
0 Q.

5 i
C O o

CNI _c

Q. D) 0

6=
L_

_c u o C O
C O CD CD CN CN C O c LO O

Q :

"E
C O

E
C O

0 .5 C O "E

o g

Q. J > S o

c s T

UJ (0 Q.

..

o
3

C O o
0

5"
3

C Ol l

C O

7ii

^5
o-p ^

:s2E 2 8 "z: u o

"0 0
0 0 j0 w

c o
0 0

^ ..

t!
0

II
0

o o

;78g
Manning B_00007370

e a o-l
C D "U

Csl

si 3
C O -D "O 0 C 0 0 ^ O "O "O
CO C O

o
0
>

1.1
2 g
>.2

2 >o 5
0
0
C O

0 "O 0
>

0
I ^ H

o.
0 Ui 0

c o

E b.
< ^

I ^ H

0 O C O C O 0

0 X LU 0 CL 0

0
C O

0 o o
^

SSS

II?
c " 0

o To c Ui
'C

E o a
3
<

"U

O 0

o
B ^ H

0 0
>

c
0
CO

0)

C O

#Ii
ManningB_00007371

III

0 _0 : g

o
C C D '
(fi 0)
>

CM CM

E
3 O

0)

o
D
3
Q)

"O

o
Q)
^H

Q UJ (O (O

re o +re

C O

3 CO C>"

i l l 8,
re c

w tf) re o c

ManningB_00007372

1 re 2 o w
CO tf) 0)

(0 g >

0) *- -o

C D

H C O O

a o c o 0) o

CO CM

tf)

C^C" C^-

o
tf) UJ

ManningB_00007373

o
G Q

C D
ID

CM

g
C O C O

i s "O
C O C D

^.co

O ^

> D)

m U
U)

.5 E

C O o C O TJ +^ -A O 0

o
0)

O
O)

o
tL
C O C D C D O O

11 Ii
% ^

O O
C O If)

C D O

C O

u .2

_C0 TD

6 ^
00 o

in g

3 "O O O) C D C 0) If)
^ C O C O

g% o:
<
>

C O "2

m o <
3 O C M C D
^

Ui

C 4= 0) C O

QI

0^
o
C O

% g P'o
m S 'a. 2

a.

C O -o

7. (-)

C O . | .E C D

ManningB_00007374

S LU C D

Q<

^ i5 O

z ^

^
" DL
<

Q. Q.

o % C O o 2

^ <

E 5

Q "D C D Z CD
O O

8 m g
C O

I 0
E Q-

^^HC^

0
B ^ ^

CM

C O

0
laaa

C O C O 0
^

0
"O

0 0
"O

0
O) CJ

B ^ ^

c^ c^ ^ o

CL 0
C O C O
>
B ^ B

0
<

c^
^ ^

o
CJ
B

5
00
=

0 y= C O C O 0

O o
Ui
B ^ H

B ^ H

c: o o
3

C O 0

c
B B B

E
C O "O
<

Oa

C^

u^

Io i
O
<
B a

I^H

&
fi. c fi.

c o o
0

0 0
^

o
C O "O

"O

c
0
>

j)
0

C O

C O
"O

O
0

0
C 3

c
C O

" c o
0 0

C D

O
LU
ManningB_00007375

o o
<

0 0 O)

c
0 "G

b
0)

CO CM

0 C O
<

1 CL
0
CD C O C O CO CD

3 C O O

o O c
^

i
>

il

C O "O
B ^ B

re OT
0) >s
"O

c O

U ^

a^g

0 0

o
Q) C

"O

0 Ui 0
Oa

c
C O

a:

3 re o 2 o

<
C O 0

5
0

It

c c O o
C O

.2* C M CO tf) OT tf) re 0 c


(A (D

C O
B ^ B

.2 o

C O C O

|i
^ C O 0 0

a! S

0
<

o o

1 5) I- <

> CL

ManningB_00007376

CM

"O

0
>
B ^ H

UJ
.fi

O
X
> -

o 0)
Q)

O s- 5 OT L. O T3 E
BaBH

c
c

E c o c o o 0)
_ >

Q.

c c re o
B

o)"5 c o c (D ^ 0 o E
^

O C O Q) C D

UJ
^

C O

_c

C O o 0 CJ O c 3

as

O OT 7
. mmi

E
0
>

0 0 C O

H Z UJ
<

00 C O

o 0

C O

tf)

c C D
C O

g 8 So O C
0
=
B ^ H

~l *J
o c o 2

D
C

re O
O

o o

&

tf)
C D 0)

B^

o "S b. f
c

it

I'i ,>=5
0

si

O j : 0
ManningB_00007377

C C 0 0 -C

00 CM

(0

U)

o o
C D

0 .5
(0

E
"co
> ,

O Q.

C O

0)

^ .5>

0 0

0 O

c
0

(fi
>

C O

C D TJ O C D 0) C O > "O

U
L U *5

C O

^ s
re ^c
CO (0

o
C O j=

ii
O c5 C D

o O o o
C O C O

0 U) C D

c o

C O

E
3

UJ o

0 E w I O

l
O

o o
C O

iu B B%

I
<

> -

0 2 c O Q. 0 M C D Ul E S . 2 2 0 0 O ^ to O w

O "D 0 I C D o

Ul
^

5g

C O C O

<

(0
ManningB_00007378

>

Oi Csl

<

0
B ^ B

O
>

o
B^B.

C O 0
>

E
tf)
<

0) O

O L. O

E
<

0
IO ^

i'i
tf)

0)

.ti re

is
>

>

o
tf) 0
Q.

C O 0
Oa

c
0

DC
0 Ui 0
Oa

ill
Q) C O

lU
iS T3 E
O q)

N
0 2
0 0 > 3
C O

11
C O CO C O O ~ X

o. E c
o c

0 Ui

0 O. 0
BS

Q
C O

III
^PI
0) U

% re U

.2% o c

O -o .S>
0 2 ^

1.1
0 0
Q ! E

i> re OT .fi ' IOTOT

0 0 3 CT "D 0 0
ManningB_00007379

t:

si|
*^

t f i 8-=^
2 o gog

|-ES

Q o

c^
CO

O j ; ^ C O m

^ E
N1
^
as

(D o) C O c C D C D

^ 3 ^ - Q O

o c o ^
^

E> ^
C OC D
>

O
C D 0^ 0)

C D TD C C O

tf)
^

3 CO C O CO

E J. E

CD 1
^

0^
^ ^ ^
B ^ ^

tf) 0

Bt
o-^
C D C

C O

E
O)
L_

<
^
jO O C O

2 C O
Oa
as

C O t C O SI C D

g C D
0
3 O

0 o Ui o

c ^

ManningB_00007380

Od
0 0

EEl

C M 0 Ui 0

O = o .5 >
o

o
0
1

C OC O Q-

TD o
'4-'

o o . .(g > T=
C O CJ

D C O ID C C O C D ^
w ^

lit
2 s

re

E E o

C OC D

C C O

c g -o
C OC O

IO
U m

^-1
C D C D C O

tf) -co ^ o CO c re o

o g

1 1

if $

C D

E Q . CD E C o DE O ^
0) C O

CO

O
>
B =

BBBH

JD O

o
B H B

"3 0 N
B ^ B

'm c
Oa

OT C

O
3 0 C
^ ^ ^

C O

ot
lead

Q.

repo
^

DC CO

BS

0 Ui 0
Oa

o o c c w " c)^
^

B B H

2
3 O

aC C O C O

0 it
0

o c re
0 C

C O C O 0 CJ

o +(A Ui

S
B =

il
ManningB_00007381

fied

tf) 2 0 0 Oa

11

an
t

o>

> >

C O "D

en
c 0
+S

B ^ H

o re o

0
>
B ^ B

"co

qj .5
fi.

8E
% ^

2 = *
^ 0 C O

ll
. 0

= 5 .=

CM 00

m C D

.55 C J )

^ 0 g
0

0 0 T3 0

o m
O 0 0 0

C O 0
L_

E
E

C M

III
o -o g

o C O 0 C O u>

o
0

C O O C O C ^

0 Oa
as

o ro 0) E C O c U D
0 0

ro D ) "O

^ l05 I

11
to
C L_

y 0 E
C O sJ

"O

1 If

o m (O

^ 9I 0 c . E
0

in 0 Ui 0

if J
o
O C O

2^ E

_ c o o 0 b E b o O o C O c
0 0 '0

C O C O

C O

C O

o.

O o
_^

0
-f'

C O C O

IS II
c

E o g g) o O C O o ^
0

LU

E ( D
TD C O

9
0

II< 1 I i
ManningB_00007382

(D a:
Q.

o
Q.

11 If
o
O ^

o o

< E

< o

CO

CO

c^tf) E
0

w
>

(0

UJ

o
3

c 0 D

o o

X
> -

o
(O
CO

UJ
^

CO

0 0

UJ

8g

re re

1
ManningB_00007383

CO

re
0 0

o.
"0 0
>

C O

o
o

c
D
<

E
C O
"U

11
OT o

.0

- ^ ^ 2 = o
^

0 I

o J 2

o c
ity
m m m
^

re

tf) 0 2 3 0
as

CM I CD

C O m

13 0
O O

0)

to -

ed

Oa

3 O
<

re c (L

u o

CO N

c O o c O
B ^ H

0
;g OT 0) O .0
o
0 0
aO
B^=

"Sl "C re
o w c o
> ^

C O 3

0 Ui 0
Oa

O
3 C

o o

b
c
0

1*
CJ ~

^aa

11
C Og
.

_ ^ 2
0 'C 0 0 0 > 0

II
=

o-

b
0

C O
Oa

O
ManningB_00007384

i!
^ y
re

0 *5

ll
tf) 2
0)

ii
2%
0 aO re

Oa Ui " c o I0
"3

0 2^

E re
tf) 3

lO CO

"U 0

5 |
$ o
3 .5
"O C M C M I CD

S c c 3

ii
to E

"C re 0

o o

(D re
0
O

"D tf) C 0

U
=

2 0
o.
as

E
0
B ^ B

0 % "3

II
.Q U

0 N
0 Ui 0
Oa

c
0

S TJ

C _r C O ^ < D o

II
MannlngB_00007385

"3 O

1 ^ hi

u
0 0

u c
b

C r O 00 IT) " 3 CO ( 3 c 00 O 0 C

11
0

aO

3 O C O C O o "3

?fi

0 O "3 C

0 s

Oa

Ifi

C O

^^^^^

CO CO

O "U C O

II

^ = I E
0 0

il
^

c g
0

!E
4_ C

0 0 0

o 0

O (0

"O

"D 0 "D 0 0
"U

^ ^
^

tf) 0
^

C M I
0

8^
(0 c 0) u w2 .5 o n "O = E -o 0 0
(0

CD

2
as

E c
"D 0
C O C O

0 CL 0
CL

o
0

c
Ui 0 0
C O

5 >
^

Oa

II
ManningB_00007386

0 Ui 0
Oa

II

I
BS

a
0 0
O)

0 0 0

Ii
0 "o
O) 0

0 0 C

5 0
c
0

I i l o
o o
o

a
O

II
0 o

re 0 "O -g o o ^

(0

g# C O
0 ^

0 "3
%

8 0 2 re I (0 0 o. "o
C O i2 o k

i | . E0 O . "D E "5 t) 2 i 0) 0) 0) ^ O) 2^ a6 O J s is reJ s re


^ o 0
0 o o

0 0

l 1-2

0
>

0 0
3

^1

0^
>%

C O o.

0. c

11
^ O 6 0

&g S. '

Q <

Q o
00

N CO

CD

j)
C U

C O D
C D O) C Q O

C O

MannlngB_00007387

00 CO

0 N

"2
1 L
0

- a
o lo E

CO
I

2
as

1 1
0 0 0

S | i o g 3
o c .c '= o

= .5-3

11
0) u
O ii_

0 3 8
o 0

o.
00 N

0 ^

.2 I t
i 5
^ 3 - 0

0 E 0

3 (0 C OC O C O

m^m

?1
.2 0 0 o

p ^
0

> o ^
(0 0

0 Ui 0
Oa

E5

i^i
5
tf)

o o
0

(0

0 B 0

tl
82

al

re

Q ~

CO

% -

E
0
<

IM
ManningB_00007388

c 0) o o c o _:
0)

C9 0

C O o o re =0 ;p ^ 0 c iS Js -Q 0 0 Q.

ll
.2 0
<

o
0

O O

O) 0

Ifl

O) CO

(0
3 0 0

(0

"3 0
>

3 O
$ ^

o c o o
0

ec
O

*i

o
^

* 2 22 0 a 0 b re CO
N
Z3

0 ^ c 0 < C O C O O O

Q.

a 0

c 0 E 0
Q. Q.

3 0
C O

C O

Oa
as

D
C

00 N

C O

re

re

0 o. Ui

0 Ui 0

f A
m

a
0 0

ii
0

c
0 0 0

o 0 c _ o c o 0
(0 c C DC O

I^
& <

= E

g i
_
(0 3 O

kg
(0

'I
0

Q. c

o.
3 0 C
Q.

a
0 Q

n 1.1
C "3 0

II

c tn o

<

o 0

ManningB_00007389

II

a8

3 ; 2 "2tS re 0) 0) Q. .2 ^ O g I .5

II l l
i

i I

"4-

2 >
3 C C O o

"3

Z ^

C O

ll
C O _ a.

I?
W C O

C O
^

b
1o
O

o
0

o>
I

0 ,J2 3)
3 C BE C O O "3 0 = 3

CD

2 0

p a- S S
iu
C O ^ C O

DC

Oa
as

N CD

0 Ui 0
Oa

111 Es =" 5 5
c c
; %

Iii

re -n 0 C O

1-2^

E ^
0 2

?s C O aC
re

"1 i
E E o o o

rs0 O 0

C O C D

n-o
^
(fi

D C O (J C N

0 O.

i i j 1-5
0 ^

a_

sl

_ > ^C O 0
2

|2 1 g
C OC O

O re ^
ManningB_00007390

"3
<

Q. Q.

Ui
B ^ H

c
3

0 0

k.

"O 0 0

"3 4W

5 'I
**"

C C 3 O w CJ

(O
as

0) c

o
I

S o "co
fi. o
fl)

0
o
~

lis is
0

Oa

CD

2 0

g 2g
2 2=
-o
c o JS o o {2 3 O
0 0*^ Q_ C C O

O.
as

II I
o
2 OT

N CD 0 Ui 0 O.

g g |g < =2

s. -

> t

"3 C 0 "3 0 0 N C O
B ^ H

aO

~I
.2 "5

O
3 0
y_

0 "D +- C
0

^S .i y
0

O. O

ManningB_00007391

. 6

o ^
.

CM

CD

2
0
Oa
as

re^
0
C O

0
B ^ ^

CD

0 3) 0
Oa

o
^

3 O CJ CJ C O 0 0 C 0 C O O o
>

3 C O "3 O
> = >\

3 O 0

O 0 C O 0

>

o CO " 3 y_ c o 0
0
0

o
0

3 0 C O Oa c O

o n
< =

0 0

O C O C O
B ^ H

ba
C O

'5 O

lo
T:

"3 C 0

"co

0 0 > C O aO E

ll

J %o o

o _

C O Q)

^ o 2 o

MannlngB_00007392

o
CD

CO

"3 0 O 0

> ^
0

11
^

C O

*i
B c
0 C O 0 0 C O *^ 0 O

0 0

0 0

C O

? w
C D

b
O
>

0)
>

tf)

2
0
Oa
as

O
[>
gj)
%

O
>

m
m
(oL,
^

N CD

o
I0

0 Ui 0
Oa

II

II
Bi^m

CO

a
^

Ul

o o
tf)

N LL

o
tf) tf)

o
N

C O

= 8 s.
ManningB_00007393

81 2
O O "co
a S C O

Manning B_00007394

u> o 00
1

CO

_J o
N U.

LU LU h> < LU C O LU

o s
z

Q
<
ms

is a
BH

0 C O 0 O

"3 0 0

C4

tn

O O O

O _c . u. Q 0
VM

LU OC E o 5 0 "C c O "3 E o O o 0 0 LU 2 "3 o 0 0 0 "3 0 C O 0 0 3 E


^

CL
ManningB_00007395

3) C O 0

Is -g
!

re -o

0 0

ManningB_00007396

N "4-

"S
as

E o o

Q.

O 0

C O
as

C O
CO

Q
C O 0 0
3

2
O.

0 Ui 0
Oa

Ii 51 a o
_J
C O

C O 0
C O

0 c 2 S "c 0 o. O. C O
B ^ H B ^ H

C O 0 c 0

C O

"> o o _c c
0 X 0 C O G) 0 "3 U_ 0
B ^ H

ii
OT

&

C O

:g {
Q o

ManningB_00007397

00 N LL

IS.

CO

00

o
N LJ. C O

C O
tin)wis

N LL CO

"4-

N LL CO o
Iti g

lit

i fi
ifi I

CO
I ^

2 C O
as

Ui

o.
CO CO

JO "co
C O

0 Ui 0

sS
jO 0

o.

0
ja

JS 0
B ^ M

ll
0)

0 0 jO
^

0 JD 0

_a
C O

Q-^S ^

E %o D
i t "3
C O
0

o
>

0 0 3 0

a= < =
Q >%0
Csl

cs 0 I

C O o E O Q -o ^ 0 0

re

E
0

(0 0

N LL CO

N LL CO

ManningB_00007398

o
o

CJ>

>s o

C O c

Q. C O -Q

o re

c o

C M W

tf) 3 re tf) tf) re 0 0

0 Ui 0
Oa

E 11 ^ 0" 5 w C O o re C O S I "2
C O

o 0 0 C O re ^ .o) a. o

s.

a 0
0 d re 0 c

E o

E re S
^

"O
fi. fi.
<

c o

c o

<

E CO (O o o "O ro E o 0 -o ro E I

o
^H

0 0 0 }= ,= ,= o C O C O ro C O C O ro ro E 5 re o o o Q

|i

re 0 Qi

ManningB_00007399

o
UO

tf)

2 re
C O
^

o
0

S =c S g S"
o 0 c "co
B =

S ? 2 ^ (0 o > tf) > t


o
re 3 o
Q. O
0

8iS

tf)

C O 0 tf) tf)

tf) re 3 O OC

o
0

c
3

O tf)

u
C O

o re
0 o

0 tf) tf) *- 0 0) o 2. O

> o

o re
o

it l -s t
I
c
0
>

M I S"-"' II
C O L.
:

C^tf) 0
Q.

re
X 0 0

E
_
0

re

re re

ill Sll

tf)

re c o o
C O (0 0 0
Q. Q.

2
re re

ManningB_00007400

tf)

c^c^c^tf)

O
tf) UJ

a
ManningB_00007401

^^1^^
C

CM tf)

CD U) C D C O C O C D

g
3 O

o o
O C O C

.2

CM
I

E
0)

I I
i i
!^ C g
(0 "tf) (0 (0

C D
O O "D C O

to
C O

U g m
_g g_

00

lo

2
0

T3 0 o> 4= 0 Ui

ll
(J
N

b
3

i
0

o.
0

w O c re

a o C D
O

C D N C D "C C D C O

o U o o "D o

E E

0)

C O

^
C D

C O
C D
0)

II
O >D C C D "o C C D
> >

|a i
o

g
^ %

tl

s
I Q
C D I

^ <

E O (O U C DC D
I I

D C D C

C O Q-

g
^

D g C O C > C D O Q.

ManningB_00007402

CO
tf)

fSi
LU m O DC O Q
TD C O

re o
Q.

m
( / )

^ C O C D

o:g"^ E -c i2 ~ 0 3 C O to = O C O
^ C

O O) C

CO I CO

CL

sl
SCD g m

tf) C

2
as

^ 0 c m O -0-5 o G 2 ^ C O o o_

C O
Oa

. 2 2o<
.52 DL C O
0)LL C D

D)

re

O Oi

TD U) 0 C D 0) sz > O C D c
QQL

0) Ui
fi.

re

C O C O

.S^l l l C O = g
g ;=
C O o

Q:

O O ^G ^ C D c
O) C O o Q.^
^ > ^

(D C

g O

C O C D

m^

O g C _ = "O
C O O c

111S.

00 45 C O

S5

g)
O
0

C O o.m I 3I m Q.

C 3 O O C D C C

C O
ManningB_00007403

"Sf tf)

0
C O

CO U) CD Q CJ) == CO LL

^ LU

0 C O

o
I

CO

og
Q
^

2 0
Oa
as

O o O LL od
0 CL 0 H < Q LU

ro

|i
3 .Q

C O

11
^ 0.

o>
0 Ui 0

0
0
>

Q. O

-o to u 0
^

fa
0 C O

S C O "D
C 0

tf) (0

o.

0 0
3

re

0 c

_g C O 2_ C D 0 C O C O o -2

v.^^
o o
^
0 C

5t
c >^

C O 0
^

^ ^

g-G
C 0

o. I - to
D) . y

"D "D

o #
0 0

ill
C D CL O
ManningB_00007404

C O C O C O 0 0 O C O C O > Q. C D)

S (0 u c
C O 0

o: U U O 5 a_

tfO tf)

C O "3

LU

c
B ^ H

"3

O
CL LU C O

2 o
c
0

E
3 O

o
Q

ManningB_00007405

o
c
0

CO tf)

o
Q_ LU C O

3 O O

"3 0 "3 0 C

ManningB_00007406

h~ tf)

0 O. O

LU LU 01 h0_ LU C O

>

c
LU 0 3 3" 0 O.

O c
0 O

"c

ManningB_00007407

00

tfo

01

C O

O
LL Q_

0 0 0

C O
.0
Oa

LU C O

ManningB_00007408

4^
JlL^

cn
tf)

C O

E
LU
>

0 0 0 3

C O

LL

CL LU C O

o
0

o.
.0

ManningB_00007409

o
CO

CO Ui

X
C O CL LU C O

0 CJ
BBai

"co

C O 0

U
"3 C 0 C O (0 0 "3 "3
<

ManningB_00007410

CO

g E re
> c
tf)

0 >

jO

c c o o
0 0)
<

g& c o
O Q) CO

ll

0 CL
as

ii
-^ O

>

Q. _
^ =

tf)

Q O UJ

o o
"O 0

o
I

re O .

tf) 0 o> 0)

tf)

tf) c

re c re fi.

O)

0 O) 0^ CO o > c o 0 O tf) UiQC Z tf) 0 c tf) re ^ o O tf) C O


^ SB sa sa VB B^H

re

o 0^ b

C O

S2 3 5o
3 00 C O C O
B^H

tf)

O 0 tf) * "
tf)

OT 0 D)

B^H

- 2 ^
"O -o <

o o a

o
0

Q.

53
ManningB_00007411

C O A

C O

C M CO

CJ 0

(L

^
3

o aa
LU
>

S-o
0 Oa O O 0 C^ 0

LU C O CL LU H C O

Eg
3 LU
0 -D
La, C

3 C M 0 0

r 5
%o
c c

ManningB_00007412

CO CO

c
O
I ^ H

g
LU CL LU C O

E
C O C O

2
"3 "3
<

ManningB_00007413

C O
^

CO

J_

C O 0
^ BS

C O

o c o m c o _c
HHi

as

C O BM

^E > OT I 13 $1 C 5 C O 0 C O5 =
B ^ H B ^ H

0 3 "3
>

E
"co
Ui C O
C
0

C O

3 3

Q.

>

O CO 0 2
>
as

'C .2

o g lo
tf) 0

Ui C Oa c 0 LO 0 o> 0 3 Ui re
rki

C O 0)

"o
0 O)

(D L. u Ui O f ^ " O

Oa

L.

i=
"O.Q

C 0

E ^

o c S b C O 0
O

go

Oa

n
0
^

i= o
0 Q > c O O

O (D "co
u^m

"3

D T3
<

o hi 6 u
tf) OT C O OT I - 0)

0 o 0

< Mg
CD S

"3 0 O 0 0 C O "3 C O C O 0 0 CJ OC "3 0 - - "3 0 0


aO

.111
k c
0 C O O

sas
0 0 ^
O E ^ Q

tf) o

s<
sa

>

c
^

II
C O

>

re A

al
^

MannlngB_00007414

CD G) CO

tf) CO

^ o

o.
<

C D C O C O

C D O C D

Q. O)

LU

gi
3 IJ-

a
g o m o
C O

S 5) 2^
C D O C O 0
O

g|8
O g Q Q a; w

O
C D
>

o> OT

Q_ LU C O
sis
eg^

SI
to 2
O 0C D W

|5
o
Q
ip:

C D C O C O
%

o
O)

m (D w (0
C O O) C D > C O

C D
C D

cog' z) o: ^ C D
C D CO -o O
t~ r-

O J2
r \

D c .C c

o
C O

C D
^

'
C O

gg
^

C O

E o o
o
D

ManningB_00007415

4^
0 tf) 0

CO CO

n
0

c re o
>

o
D
3 C 0

o
0

8^

a c re
0

C Q

C O

l
is.
O 0

b
0 C O

re
.C O)

g 2
ManningB_00007416

4^
IO
I

h-

co C O
>%

jO 0
:>

C O

o
0
>

o
3

3 U

E
o

C B (fi C 0

-* c

2=
-Q

CO

"O

36 8S

0 "3 O 0 0

to

2 0
OB
as

g%
S5
o 2 *
Q.
*

g t
^

0 (J

CO

0 Ui 0

3) C "3
B ^ B

^ " J S

E
C O

CO CO

o>

"3 0

iJ
3)

E
<

o.

J C

C O

Ui

ii
C O C O o

Ol

c
3 Q.
" N
B =

o
0 0 0 Ol

o
C O C O

8.=
D) Q

C O
J C

<J

b
>

.5 O
> * Q)

C L

C O Ji^ 0 (0 Q 0

25

E o

c n

? c
ManningB_00007417

il

00 CO

c^c^c^tf)

O
tf) UJ

ManningB_00007418

c^
CO

C O

c^

g
^

c^

CD ^

0
^ ^

o o
_c

o
0) ^ C O (D

to

U
C D {-

o
-Q
^ <

-Q C D

E o

^ C O C O
nC

2
C O C O

o o o -g ^
g JO
C O >

C D C O "D

_ c o

p
C D
^ ^ ^

u
c
C D
>

g
o
>

b
C D
O
> >

o g
Q _C O
. . C O

C D
a m

c^
^

tf)

LU

O -c

z o

^ B < to
O m

C D

U
< C O

H Q Z

C O2 ^

ManningB_00007419

o o

o
^ ^ ^ ^

h~

ion

u
LU C O CL

C C

ro
^

o
o

O
C C D D)
<

o
0 C O
C O

o
0
^

_c
0 C O
C O

o
' ~

3 C O

O
LU

c o ro
0
Q.

g ro

o
C O C D Q_
^

o C O
TD C

0 0

O B

0 d

m
>

< D
Q_ O
^ ^ ^

c 0 0

1^

o
C O

o o
LU
ManningB_00007420

ro

It

c c

o _c X
9

^^^^^^ ^ ^ ^

o ^
^ ^

o
C O

re

g
c

re ^

CJ
IU C O CL

fi.
^

o
0
3 O

o ^
^

ii
^^'a 111
o?f
"3 0
c O) . .= c

fi^E
^

o P

C^

E^ o
re ^ o ^ o
^ 0
3 3 0

ba "co
0

^ ^

^ ^

i^^
ManningB_00007421

? ^ OT"iJ -u 0)

^
E c
o

C M 1^

8^ O
^

OT

C O

O 0
0
^

Oa

(L

C O

C O C O

3 C O "0

3) 3)
^

C O CJ 0

c " i O > 3) C O i2 i= BE o. BE O m
0
O C O

2^ o b y_ 0

"3 0 O
Q_

o ^

B ^ H

c o "co

C Q

E o
>

b
c
!

c
aC
=

> >
I ^ H

CJ
C O

B ^ H

c o

E |.i"o
0

(fi

re re c o

c o

11III

MannlngB_00007422

ssli lit
I ^ H

C O

C O c

OT c O

C L A A A A A

A A

CO

C O LU

o
0

U 3 tf)
<

o
C O
0 (0 0
>

2 ^
0 0

0 3

O O

<

z
O
CL _

tf)

2 8 LU
O >- E
CO Q

"3 0 0 O 0

^ 3 C O o o 0 > 0 0 C > > 0 00 CJ 0 c 0 Q. "3 Ui 3 0 o 0 0

i
3
0

c o C O

o
to E

o
0 0 0

ManningB_00007423

>

O 0 C O CO E .2 0 3 CO IJJ 0 0

o.

"3 _ O 0 0 C O C O -o 0 0 CL 0
0

"3 0
0 O 0 0 O

o o

H ^ I 2
LU III
^3 i t 0 C 3) o

Ps
O A

0 "3 C O tr\

5> 0 to L U
O

E
La

3 3 0 O C O 0 Ui 0

?o

It
0 0 0

o o A

LU 0 O

a o

5= 5 < A 2 A

0 0

E E

OC

^ 1^

0 Ui

C O
^

o
0

c
0
^

CO

c > o re E tf) tf) 0 Z c


0

ManningB_00007424

zs
2 re o. E

c ^ o *- re S c re J E o). c re re c^ > o
^

ll

*- re

o
0
3 tf)
tf) 3

tf)

1^

tf)

UJ o C O o CL p

0
>

il

1^ o. S >
u_ o o

mwmm

CL

8 re

Ire

I i X o

tf)

g
C O _o >^ o C O
^ O 0

z I ^ o

o b

O .5 C o C O c g to

? 8 C O
o

O C O C C D 0 CL

C D

C D
C O cr o in

C D 3 O ^ lO
CO

g to

o
O JD -Q 0 C O

C O

JO o O CM
0)

C O C O

C D M_

T-

"D Csl C D TO
^

^ o
C D

to E
o
C D

C D "D
^

S
o

0) C O
< ^

C D

ti

E O o
LU Q
ManningB_00007425

<

2l

m C UJ 5 O

C O

g > o

C D

C O

6 ag g
UJ C O
I C D

CO M.

tf)

C^C" C^-

O
tf) UJ

ManningB_00007426

Prosecution Exhibit 53 14 pages classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

Intelligeoce Aoalyst Course CourseA/ersion: 243-35F10 / 001 Delivery Group/Phase: A / 0 Status: Commandant Approved as of 2008-10-02 TABLE OF CONTENTS PAGE Lesson 1 Section I Administrative Data Section II Introduction Terminal Learning Objective - Identify 35F10 Course Administrative and Academic policies Section III Presentation Section IV Summary Section V Student Evaluation Lesson 2 Section I Administrative Data Section II Introduction Terminal Learning Objective - Identify principles of protecting classified information, material and media Section III Presentation Section IV Summary Section V Student Evaluation Lesson 3 Section I Administrative Data Section II Introduction Terminal Learning Objective - Present Intelligence Findings Section III Presentation Section IV Summary Section V Student Evaluation Lesson 4 Section I Administrative Data Section II Introduction Terminal Learning Objective - Perform Map Analysis and Construct Proper Military Symbology Section III Presentation Section IV Summary Section V Student Evaluation Lesson 5 Section I Administrative Data Section II Introduction Terminal Learning Objective - Define the Operational Environment and Identify U.S. Warfighting Doctrine Section III Presentation Section IV Summary Section V Student Evaluation Lesson 6 Section I Administrative Data Section II Introduction 4 7 7 9 10 11 12 15 15 17 53 54 55 58 58 65 461 463 464 468 468 470 577 578 579 582 592 606 617 618 619 622

X
ManningB_00011649

PROSECUT ION EXKi S ' i for idcn caMon jr idcnfpc PAGE OFFERED: _ PAGEADMI MilT^:. PAGE OF PAGES

Terminal Learning Objective Section III Presentation Section IV Summary SectionV Student Evaluation Lesson7 SectionI Administrative Data Section II Introduction Terminal Learning Objective Section III Presentation Section IV Summary SectionV Lesson8 Student Evaluation SectionI Administrative Data Section II Introduction Terminal Learning Objective ^COA^ Section III Presentation Section IV Summary SectionV Lesson9 SectionI Section II Student Evaluation Administrative Data Introduction

Describe the Battlefield Effects

632 645 657 658 659 662

EvaluatetheThreat

662 664 670 671 672 675

DetermineThreat Courses of Action 675 677 692 693 694 697 Draft anisic Plan 697 698 702 703 704 708 708 710 791 792 793 796 796 797 807 808 809 812 Produce the products for the Mission 812 814 821 822 823

Terminal Learning Objective Section III Presentation Section IV Summary SectionV LessonIO SectionI Student Evaluation Administrative Data

Section II Introduction Terminal Learning Objective-ConductTargeting in Phase III and Phase IV Operations Section III Presentation Section IV Summary SectionV Student Evaluation Lesson11 SectionI Administrative Data Section II Introduction Terminal Learning Objective Section III Presentation Section IV Summary SectionV Student Evaluation Lesson 12 SectionI Administrative Data Section II Introduction Terminal Learning Objective Analysis Section III Presentation Section IV Summary SectionV Lesson13 SectionI Student Evaluation Administrative Data

Conduct Intelligence Analysis

Manning8^00011650

Section II Introduction Terminal Learning Objective Section III Presentation Section IV Summary SectionV Lesson 14 SectionI Student Evaluation Administrative Data Oualify Soldiers on Core WarriorTasl^s Conduct Intelligence Analysis

827 827 829 842 843 844 848 848 849 851 852 A ^N^A^ 8 ^N^A^ C 1 1 1 1

Section II Introduction Terminal Learning Objective and Battle Drills Section III Presentation Section IV Summary SectionV Student Evaluation ^I^^A^ A p p e n d i ^ A V i e ^ g r a p h Masters Appendi^B Appendi^C Appendi^D

Test^s^andTestSolution^s^

Practical Exercises and Solutions Student Flandouts ^N^A^ D

Manning8^00011651

Prosecution Exhihit55 Ipage classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibit 5^ Ipage classified "SEC^RET" ordered sealed for Reason2 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibit 5^ Ipage classified "SEC^RET" ordered sealed for Reason2 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibit 5^ Attachment l^pages classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order ^ated20August2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibit 5^ 2pages classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibit 61 2 CDs classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

Prosecution Exhibit 62 2pages classitied "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20August2013 stored in the classi^ed supplement to the original Record ofTrial

03 3

2
3' (O

'o o

a <

00 -vj vj N O CD

Nj ^ vl UU UJ UJ f& A 00 00 00 CTI CTI Ln M O ^ NJ i-> M Ln O Ln v j cn >J M UJ i ^ j M O M LO ivj UU Ln a\ UJ UJ Ln M 6 Ln 00 TO

TO

TO

-xl ^ UJ UJ f A 00 00 Ln Ln M O NJ NJ o NJ ^ NJ I-' bo Ln i

UJ 00

>J UJ 00 fl

in

00 M fo UJ

x LO cn ro NJ NJ NJ o ro O fi ' * f i\j NI Ln M
UJ Xi UJ fi

->l UJ fi 00 fi

t-*

x i-* <n Ln
UJ 00

t-*

fi 00 NJ ro O cn i-> t - ' fi fi UJ v j i NJ ^ Ln fi un l t-" U) NJ Ln NJ

UJ f 00

^ UJ o

VI UU fi 00 O fi t-' fi 00 l-> f NI UJ UU NJ

VJ Ul fi VI LO UJ

ro O VI
00 fi

ro

vl UJ fi vl 00 00 NI NJ NJ I-"

VI OJ fi vl 00 Ln NJ

vl UJ fi vl vl UJ NJ ro I-" M LO

ro

g
Ul

cn

ro i-" ~u f i O

l-> (Tl i-> i i 00 ro ro f p i-> v l UJ M ^ i-> io Ln 00 O cn cn

vl LU fi VI vl l fo M NJ . C > Ln

vl UJ fi VI vj O ro M

io

vj UJ fi vl Ln LO ro O Ln

fi Ln l-> fi i i-* I-* UJ

lo f->

vj UJ fi Vl M M ro ro H" UJ fi fi NJ UJ fi

vj UJ fi vj I-' O to Nl t Ln

vj UJ f vl M Nl Nl ro LO to to

vj UU fi Vl NJ 00 Ln

vl LU fi vl ro ro

vl LU fi

O O O o LC 00 cn o f i vj in I-"
M H

cn LO cn
i-> LO LO M NJ LU

vl UJ fi CTi to ro i->

vl LU fi

vl UJ fi

vl LU fi

vl LU fi

i->
fi M fi 00

io >

cn t
NJ to

ro

cn LO 00 O cn i LO LO LO o
UJ

cn cn LO vl UJ NJ M NJ f i r o 00 l l o l-> r fi fi NJ M LU
LU

tn LO
NJ to NJ M

cn cn cn vl
ro to

ro
M M to Nl I-* Ln to

vj LU U l fi fi CTI Ln cn fi M 00 t o ro t o Nl f i NJ h-' LO Nl t-> Ln 00

vl LU fi

(/)

cn LU LO l LO LO i-> ro
UJ IP

o
>

<
m n o
fD

iew

ecord

i-' fi i-*
VI to

n
TJ

ro

cn 00 i-" 2 LO LU n
Add

> a. a.

. 2 8 . 2 4

.9.95

ro

wt

CL

C n rt71 00

LU
y-'

UJ H" 00

UJ t-" 00

UJ l-> 00

UJ I-> 00

UJ f-" 00

UJ

Ul

UJ

UJ

UJ
-V

UJ

UJ I-* 00

UJ

M t-" h > \ I - * l-> 00 00 00 00 oo \ ^ O o 00 o CO o 00 o 00 o 00 o 00 o 00 o 00 o 00 o 00 00 I-* I-* ( > h-" I - * t-* l- l-> l - * t-* t-> I-' l k-* M l-> I - * o o M k-* l UU UJ UJ f\J M NJ M l-> o Ln f i f H* O 00 00 00 Ln r o > > ^ > > > > > > > > > > > 00

. I-"
00

\ M

S s S S S S S 5 s S s s s 2 2 5 S 2 S 2 5 ^ s S S S S 2 S S 2 S

. . .
VI Ul Ln O VI v j LU UJ Ln cn Ln v l O LO un 00 f i NJ h-" H' h-" LU LU LU 00 00 V I f i-* i v l CTI LU f i Ln NJ VI i o f i fO v l N l Ln t-^ NJ ro o UJ 00 Ln 00 LO M LU VI M vj UJ

00

UJ ~v I - * t-" 00 00 UJ

UJ I-" 00

UJ 00

UJ 00

UJ 00

UJ

UU

UJ

UJ LU LU UJ LU UJ I-" 00 UJ LU UJ h-" CO O 00 LO to Ln

. H * . l-> .

\ o o o 00 00 00 o 00 o 00 o 00 o 00 o 00 I-' I-" M > M H t-^ ( o o o o o o O o UJ UJ UJ N l r o NJ NJ o Ln UJ N I 00 v l v l NJ LT > > > > > > > >


ro vl to Ln 00 Ln fi I-* UJ VI LU vl fi fi

h-" k-* ( M > 00 00 00 00 h > t-" OO 00 00 ^ V, o o o o o 00 00 00 00 oo "o o o l l-> l-> M H" 00 oo 00 o o o o o LO LO LO o o o o o Ln Ln f i Ln Ln Ln t > LU 00 cn UJ > > > > > > > >

. t-*
00 v^ LO fi

h-" M 00 00 O 00 LO IO 00

< 00 1

o o "o oo 00 00
LO UJ LO LO NJ 00

m o M
^

O IU

Date

(U
t /

<
fo'

o > > > > >

" O
> n n D 5 a. c n
33

n
ro
vl UJ vl 00 UJ LO l-> Nl 00 Ln Ln VI Ln LD

<

c m
m 00

ro
LU LU LU UJ to UJ l-> LU 00 fi Ln fi LU vj

H> LO Ln UJ

cn IO
0^ l-> UJ 00 fi Ln fi LU

NJ O OO Nl ro 00 h-" t-' UJ 00 fi Ln fi vj

h > LO Ln ro LU M O i UJ 00 fi Ln fi I-*

cn ' k-" cn v l NJ Ln
UJ l LU vl M l-> M LU NJ

VI LU vl

cn

i->
O

l LU cn io i
00

fi j UU LO NJ LU cn Ln

NJ Ln Ln M NJ fi LU t-* UJ NJ M LU Ln LO M 00 to

ro Ln Ln I-" t fi

O
t-" UJ NJ fi UJ Ln LO M 00

vj LU fi LO 00 OO l UJ NJ t UU Nl

vj UJ LO 00 I-> LU NJ

VI LU VI 00

O LU
H" LU

vl LU Ln h-" fi

I-* LO Ln Ln NJ i t-* LU ro M t LU

VI vj vl fi

cn
t-> UJ NJ

cn > ( '
UJ I-' NJ fi

ro
I-* LU M Nl fi

i-* i-* i-"

8
Ln fi

ro

u fi

o ro ro LO bo fi fi fi fi O o UJ UJ UJ o o H N l NJ P N l i-" i-" i-> Ln Ln P UJ UJ LU f i i l O NJ ro l- UJ UJ V I V l t o LO io O Ln LO M LU LU i-" I - ' ro ( o fi fi i vl VI O f i cn UJ > v l Ln r Ln t-" LU i-> UJ UJ >


VI

fo

vl UJ VI IO ro Ln I-* LU H NJ f>

UJ fi fi ro LO vl H t-" UJ I NJ

UJ fi fi ro fi VI

vl LU

cn o vl
LO I-* UJ

(
I-* UJ M

vl LU 00 Nl vj l-> M Nl 00

cn > >
ro 00

h-" O ro to VI fi to h > ro 00

I-" VI UJ f i vj Ln t I - " LU h-* M l-> l

o UJ

LO 00 00

cn cn Ln
M

bo bo bo p p p i i-' M Ln un Ln UJ p vl l-> cn t-* i-> l ro O

ro 00 ro 00 ro 00 bo bo bo bo o p p p M i-* M M Ln LU LU LU l-> VI vJ V I M O 00 vl vl o LU LU LU

vl LU Ln UJ NJ fi l NJ 00

^ (/)

ss

o > n m
TJ ^ O Q. C

n
-a -o

>
Q.

r+

CL

7 00
M vj vl LO ~v 00 NJ 00 M M LU k-* LU UJ vl V, H ro 00 UJ M LO v^ ro O LU UJ i-> LO Ul H

ro
I-" vl

' o 00

\ O OO O O 00 00 M o h-* v l NJ t o ( M ' Nl o UJ NJ o UJ O o UJ vl 00 00 U l ro un LU 0 > > > -o > -0 > T3 D> ^ ^ ^ 5 ^ 5 ^ ^ S


00 O l 00 f LO o Ln NJ 00

P > O

. o o o 00 00 00

^ M cn
i

ro t

^ i->
vj

Ul o v O ^ M ro LO LU cn o \ O o 00 O o o O o O o O O O 00 00 I - " 00 00 00 00 LO 00 00 LO LO 00 LO l ro f i N l l-> cn v i t o cn cn cn l M NJ ro f i l-> LU o UJ o UJ i-> NJ o N l f i v j ro o 00 NJ M cn LD i-> t o ro > 0 "0 D "0 o 0 > > > > > T3 ^ 5 2 5 ^ S S S S 2 UJ M 00 t-* 00 ro

i-> ro

LU Ul LU UJ M LU UJ

l->

H LU UJ to I-*

ro
t LO O 00 l-> NJ

LU

Ln

00
LU

o
I

Vj

Ln

00

NJ

UJ

^ ro i

NJ NJ l UJ

ro fi
O 00 NJ fi

o 00
00

cn N l UJ I - * to o O 00 . o o o o o 00 00 00 00 00
to UJ LO vj Ln fi 13 vl LO T3

o m
0) 10
O
OJ

a s S S S S s S 2 5

o Nl cn V I O > TJ T3

VJ fi M -0

00 fi l D

(/I

0)
3 3 3' (Q

m n o
O CO

3D

vJ vJ

vl

vl

vl
LU

UU UJ

vj LU

VI LU

l->

Ln Ln Ln Ln Ln O O O o O fi ro ro M I - * LU M O cn Ln
t-*

00 fi

f& f i

( > ro
00

00 t-* NJ fi

t-* fi 00 I-*

( >M fi fi
00 I-'

00 M

ro ro ro f^ f i f i

l-> LO l-> LO i-" LO i-" LO i-> LU LU UJ UJ cn fi fi fi fi fi o M M (

VI v l LU UJ UJ UJ UJ un Ln Ln f i f i f i O O LD LO LO O I-* CO 00 00 LU LO I - " 00 LU ro t-* l-> h > l-> to f i f i U l t-" LU LD 00 00 N l ro UJ l-> t-* I - " f i LU M ro ro f i Ln LU f i f i LU i - l LU f i to ro 00 VI LU

vl

vl

vl

VI LU fi

^ m <

o o

( '

cn

LO vl Ln
Nl

Ln o Ln ro U l p
fi fi

o i-" Ln

fi p ro t-* p i io LU P i-> l-> A VI '

o >
Q. Q.

UU LU UJ LU LU UJ UJ UJ UJ Ul Ul UJ

t-" 00

M 00 v_
00 t-" t-> LO TJ

o 00
t-* LU

t-* ^ M t-* t - i \ t-" ^ t-" M 00 > 00 M 00 00 00 ( 00 00 00 00 v^ v^ . ' . v^ 00 o o o o o o 00 00 o 00 00 00 o 00 o 00 00 I-* t-* LD

l 00 00
OO

O
oo
00 00 00 00 00
OJ

o TJ

( M 00 00

TJ TJ

t t-* I-* 00 TJ TJ

SS2 SSSSS2 2 s S


vl
fi fi

h-* t-" l-> M f^ I - * TJ TJ

l->

o o f i ro

ro ro Ln Ln 00 ro TJ TJ TJ TJ
l->

<
m' S.

g n
-o o a. c n
30 03

R S
vl vl vl LU LU O Ln f i cn Ln Ln Ln 00 00 o t-" I - " O cn o o o N l NJ o Ln NJ LU Ln cn v l cn v l LU ro
LU

UJ

ro

ro v l v l 00 Ln f i Ln Ln Ln O a\ Ln Ln UJ f i p
00 LU 00 K' fi Vl

UJ NJ 00

UJ

i i M

ro ro ro ro ro un Ln Ln Ln Ln Ln Ln f i f^ f i f^ fi fi i l r-* i I - * l-> f i f i ro cn cn cn NJ o tn p vl cn cn cn (Tl cn Ln Ln i-' v l

i fi vl M l fi fi vl Vl NJ ro

UJ LO M fi VI

Ul I-* fi VI

ro NJ N l v j v l cn v l LU f i cn t-" cn cn fi UJ un LU 00 LO f i Ln f i ro l-> cn UJ 00 o f i UJ O NJ
I l-> fi fi vl vj i-> fi

M fi

t-" fi

vl vl vl vl v j v j f i f i f i LU LU f i Ln Ln Ln 00 V I ro f i f i f i LU f i v l O ro I - " CTi Ln cn LU M UJ LD 00 cn v l cn cn ro Ln vl Ln Ln ro
l-> fi t UJ vj LO Ln UJ Ln Vl

vl

I - " t-' LO LO ro NJ

I-' LD

M 00 M LO
fi M fi t-" Nl Nl

ro
fi UJ

Ln

o v l

LU

vl

LU

vl

Ln f i

M fi

cn to
00

tn
LO 00 t-*

cn LD
00 I-"

( >

l M i fi fi fi UJ LU LU vl vl v l Ln Ln Ln

M fi LU
Vj

t i-> fi fi LU LU
vl t-"

Ln Ln Ln
vl l-> 00

ro

o fi
fi UJ

to
fi

ro

00

00

fi

LU

LU

v^ UJ vl VI ro f i LU l ro N l ' Nl Nl h 00 ro ro ^ f i f f i UJ LU un cn O v o o O ~O 00 o 00 o 00 i o "o LO LO LO 00 LO to ^ t-> I - * to LD ro o LO ro LU Ln ro f i NJ o Ln f i Ln LU NJ V I cn LO LO V I v l M 00 T3 0 > > TJ > > > >

vl

.
LU LU

fi

p vl Ln ' O vl
ro

o
fi I-"

Ln Ln Ln l-> o p O cn tn
t-"

h-' fi fi LU LU Ln t vl vl l-> Ln

Ln Ln

M fi LU I-' vl

i I-" f& f i UJ i-> ro vl

l-> fi I-"

fi i->

!^
i-k

fi
ki

00 LU

Ln

cn cn l i-* I-* l i M LO Ln l Nl Lu | > fi l vl >N Ln Ln LU v l LU


00 00 LU UJ i->

p vl

i i->

ro ro ro O O O ^ vl v l ro ro vl vl
M Nl VI

M l-> t-" i-> f i f h-* i-> i-> ro N l N l NJ

Ln cn LU LU cn f i cn cn

VI LU fi LO 00 UJ

ro O Ln Ln Ln 00 f i UJ O fi cn Ln 00 LD 00
I I-* UJ LO UJ I-" vl i-> LU

) > cn cn LU UJ

I?
T3

> LU
LO UJ (Tl

to
UJ

i UJ 00

o o o vl vl vl
I-" i-> Nl

i-i
00

i-* vl

d\ fi
Ln

ro N l t-* tn cn cn f i

cn

f f i

T3

>

a. a.

UJ

LU LU UJ LU LU

UJ

fi UJ

CT-i
vj

LU

ro v ro

2 1 S2 S1 2 2 SSZ SSSZ 2 1 2 2 2 E 2

f& UJ UJ LU O NJ NJ ^ ro LU 00 \ f i t-> v l CTI o o v^ O o o o o 00 o 00 00 O o O LO 00 00 00 O O ^ ^ 00 UJ ro v l tn LO 00 M M ( M UJ O LU LU UJ NJ M o LU v l v j f i f i f i Ln v l v l > -a o -D -D TJ > > >

, >
o > >
00 H" LO t-" NJ ro NJ fi M vl

UJ LU tn v ^ i cn cn NJ O I - * 00 LU V I ro I - " 00 N l NJ o M ^ LO l-> l LO LO 00 o v o o o O ~v o 00 o O O O ^ o o o O o 00 o 00 o o o 00

vl

00 Nl M LU

TJ TJ

00 00 00 ( 00 00 00 cn o cn Ln ro NJ Ln f i ro o UJ o O Ln Ln O Ln Ln v l LU Ln Ln f i cn 00 f i to > > > > > > > D> > s SSS2 SS2 5 s 00 LU LU 00 LU

00 M UJ

Ln TJ

S
o
OJ

m
3 3 3' CO 30

o
CO vl vJ N
VI LU vl LU vl LU vl UJ Vj LU vl LU vl Ul vl LU vl LU vl LU vl LU Vj LU vl LU vj UJ vl UJ vl LU vl UJ vl LU vl LU LU vl UJ vj LU vl LU vj LU vl LU vj UJ vl LU

m n o m <
7;

Ln Ln Ln Ln Ln Ln un Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln f i f i UJ UJ LU U l LU fi Ln Ln ILn Ln Ln f i f i f i f i ff ii NJ fi - ' i-> O to 00 V I f i t-* l-> to V I CTl Ln LU ro U l f i f i f i 00 LU I * 0> ro Ln Ln cn o Ln LO cn M cn M i-> h-* t-" l t-* N l ro ro ro ro M ro l-> ro ro f i f Ln f i U l f i LO LD <3 ( 3 M f i O f i O ro 00 00 v l 00 00 00 fi fi o vl o vl vl p P p l-> Ln ro M f i ro i-* fo b Ln Ln ro N l 00 b l-> i ro M i-" o NJ ro 0 NJ (T\ NJ ro M Ljn I - " ro Ln Ln Lfl p f i f i ro f i Ln f ro cn f i N l f-' Ln ro i-> f i v l O cn Ln LU fi M Nl NJ NJ v l f i f i i-* ro i-" NJ i Ln Ln Nl Vl Ul UJ ro j-> p f i Ln o v l i-^ f i l-> o i UJ f i fi M 00 Nl f i to LU ro Ln i-* ^ o fi i-> LU Ln i v l LU i i-i Ln LU cn 00 o i-> cn 00 Ln fi vj vl

CO CO N l p h-" M Ln b o i- M LU ro NJ p f i i l-> cn f i f i f i LU UJ 0 . ^ LU Ln v l cn cn ' p CTt to t bo i NJ vl LD O cn


UJ

Ln UU Ln UJ Ln LU Ln Ln NJ Ln Ln NJ Ln ro Ln ro LU LU 0 ro ro to o l-> f i 00 LD f > f i Ln ro NJ t-' ro 1-" ro NJ ro O NJ ro f i f i N l NJ ro 00


fi

Ln Ln ro
LU t-" fi

TJ

a.
Q.

>

ro
NJ UU t

ro

LU

LU

LU

UJ

LU

UJ

LU

UJ

LU

LU

LU

LU

LU

LU

LU

UJ

LU

LU

LU

LU

UJ

UJ

LU

LU

LU

tjj i-> 00
00 LU fi fi TJ

to
0 00 vl f

l-> LD

to
0 00 VI

M l-> i-> LO LO LD O 00 vl O 00 vl
00 vl M LU

'M LD LO
O 00 vj O 00

h > l LO LO LO

l-> LO

l->

LU UJ N l M l-> LU o Ln tn 00 UJ i-> v l v l f i LD cn > > > > > > > > > > > > > > 2 2 s SSSS2 S2 S2 s 2

0 00 vl LU NJ

ro ro ro v l cn U l

. o 00 o 00 o 00 o 00 cn cn cn cn (n

to to O O 00 00 tn Ln

M i M LD LO LO "V O 00 00 00 f i ro ro

l-> LO

I->

50
0 00

l-> 00

i-> 00

t-" 00

t-* M CO 00

M 00 O 00 LU fi fi TJ

O oj

o o

O 00 I-'

to

LU ro o Ln ro o l-> NJ LU ( > cn 00 to ro TJ TJ > > > > TJ 2 2 2 S2 SSS^ Z S2

0 00 00 fi t-" TJ

0 00 00 0^ Ln N l Ln v l NJ T3 "D

O 00

o 00
fi

Ln

<
fo'

> n n
TJ

o
Q. C

S
3J 00
NJ 00 I-*

vl LU

vl UJ

Ln O un O i-> ro O
t-> fi 00
00 fi

vj LU Ln O M

vl LU vl LU

vj

Ln LD

Ln
00

cn t
I-" fi 00 M

( fi fi

ro fi
t-"

# ( > ro

ro ro fi fi

to to to to LU LU U l ro ro
f i fi l l-> fi i-" 00 l->

LO fi LU t-" i - " f& f i 00 00 I-' M ro ro fi fi I-* LO

Ln Ln to to LD to Ln Ln to fi O O cn v l ro LU LD cn UJ
t-* fi 00 M Nl fi t-" l fi 00 I-" ro fi
LO

vl UJ 00

vl LU

vl LU fi

vl

M fi 00 t-"
fi

fi 00

ro fi

vl vl LU Ln Ln 00 f i 00 Ln LD v l I - * l-> fi fi 00 00 M t-" NJ N l fi fi

vl LU

Ln (3
fi UJ M fi 00 I-"

vj LU 00 vl l-> LU fi 00 ro fi vl LU Nl

vl

< n LD
Ul

vl Ul

ro fi

M fi 00 M NJ fi
VI

cn cn cn o o o o to o o cn
i-> fi 00

vj vl UU f i f> LO 00 vl vl

> >
ro fi
vl

t f> 00 l-* Nl fi
VI

M fi 00

>
00

ro ro NJ VJ v l cn LU LU LO 00 ro l cn ro v vl ro i 00 ( 3 UJ 0^ v j v l to M l-> t M fi A t> f i CO 00 00 00 l-> t M

cn

vl LU vl I-"

vl LU

cn
M

ro Ln
i-> fi 00 M NJ fi l->

o
I-* fi 00
fi I-*

NJ LO LU LD O O 00 h-" fi 00 M

Ul 00

vl LU Ln Ln t-" t-" LO f i l i fi fi 00 00 I-* M

un 00

vl UJ fi LO O Ln

Ln ro ro LU m ^ Ln Ln V I to 00 v l < ^ LU LU 00 O 00 U l O to f i 00 ro o ro LU Ln to 00 cn
l-> fi VI
Ln fi

vl vl

vl LU

LU 00

ro
I-*

NJ l->

vl

si

M fi VI
Ln fi Nl Vl f

t M fi fi VI VI

t-* fi vj
Ln fi ro O

t-' fi vl
Ln fi

fi vl Ln fi 00 fi fi LU

ro ro ro ro ro ro ro
Ln fi Ln fi LU f i UJ vl K * LO 00 Ln v j

ro ro ro ro ro fi fi fi fi fi
t-" I-" CTI
Nl fi

ro ro ro fi fi fi
fi 00 fi 00 <3 fi

i-" i O
Ln

p p Ln Ln

to to
fi UJ UJ

LD

CO 00

cn cn
O vl
fi 00

Ln Ln to tn

cn

p p P N l NJ N l * O cn CTI cn on

01 cn en v j cn Ln NJ ro bo N l ^ LU LO UU CTt LU

cn p Nl
M

Ln fi

ro ro ro

( > i-" f i NJ f i

ro

Ln

to to

p 00 p p I ro ^ vl LU cn cn

ro O

TJ

>

Q.

a.

fi LU 00 LU UJ 00 LU Ul LU

LU

fi LU

LU LU

UJ f NJ fi LU fi

LU

M 00

\ ro
M Vv
00 Nl

i-> O

' M

I-*

NJ fi

i-> 00 LD V .

O 00 00 t-> t-" l LO 00

o o 00 o 00
M M 00

o 00

l-> ro ^ to cn Ln cn 0 D 0> > > > D > > > 2 2 s s 2 S2 2 2 S2 2

O I - * 00 l LO fi LD

O 00 vj fi

o 00

l-> NJ fi l M 00 ro U l T)

ro o LU cn o o o 00 00 o l-> M 00 o 00 o 00 to M l ro fi M o LO LU
LU O TJ LU (3 TJ

to

M 00

^ ro
ro
O 00 M LU Nl TJ

ro o ' o 00
M LU

UJ LU V, i LO ro 00 O O 00 CO 00

LU

LU

LU fi UJ VI VI Nl Ln LU

ro O

M 01

ro
t-" O

LU LD

LU 00

LU

^ o

\ o to
l->

ro ro ro Ln NJ N l
fi TJ vl T3

o
l Nl

O LD fi

2 SSs 2 ^ Ss

cn cn D T)

\ ro M Ln o LO ^ \ o o 00 o 00 00 Ln cn M
Ln
vl TJ Nl LU T3

Ln v^
Vv l->

( > cn

Ul -V t-* LD 00 vl

M 00

Ln
TJ

>

> > > > TJ > > > 2 2 S^ S^ 2 SS2 2 S 2 2


O
01

O LO vl vl LU NJ N l LU M to TJ

' .O O 00
ro cn

t-* . LU ' Ln ro o to i-> Ln o 00 o O ^ OO 00


NJ fi

ro l
00 00 (3

NJ LU IJ\ l l LU to f i LD TJ TJ

to
fi

O 00 00

ro
vl

to

to

0)
3 3 3' (Q

'o
O CO

n n o

3D

vJ vJ vJ

vl LU

N)

cn en o o O v l cn Ln fi f i ro ro ro i-> o ro Ln f i ro v l bo bo i - * > un ro > to Ln Lu p p LU ro p p ro vl M i f i ro i-> ro ro 00 LU LU fi i-' to bo l- N l Ln NJ I - " ( i- ro h-" UU 01 o io i-> M t vj fi vl

cn cn i-> M Ln ro ro LO tn UJ NJ ro i-> O O LU Vj v l v l

VI LU 01 I-*

vl LU

VI VI LU LU CT^ 01 cn i O O vl vl o LO 00 H ro f i LU NJ 00 o NJ

VI LU

vl LU

vl LU

VI v l UJ UJ CTI cn

VI LU

> >

cn o o ro i-> cn 00 ro ro NJ ro Ln ro p 00 to
00 00 fi

VI LU 01

Ol

to

LO LO to cn f i ro o fi i ro K' NJ ro f i O f i o ro 00 f i 00 Ln N l i-> Lu i-> Ln 00 ro p ro U l fi f i ro cn i - " to IO bo N l ro cn bo Ln l LU V I 00 CTI V I f i

O t-i cn

vl UJ Ln LD 00 LU

VI v l LU UJ

vl LU

VI LU

VI LU

VI LU

vj UJ

^ n <

Ln Ln Ln un Ln Ln Ln LO LO 00 00 00 00 O o to v j LD Ln NJ ro K l M o o f i Ln VI v l vl
CO

bo bo i-> ro p Ln ro o v l v l f i ro 00 CO i LU
vl

-o > a.

a.

Ln

^ p Ln M
o
vl

fi M CTl

fi LO

fi

to

ro

LU LU LU LU LU UJ LU LU

LU

LU

LU

LU

LU

LU

UJ

LU

LU

UJ

LU

l->

l->

to to o o 00 00 ro
M
TJ

M LD O 00 M UJ 00 TJ

- k-* I-* ( >\ LO to to


~v

LU ~v LO (3 00 M

k-*

i-> LD

l-> I - l LO LD

M LO

(3 o 00 00
l-> LU LU TJ

M fi
TJ

ro
NJ TJ

O 00 l-> NJ

\ (3

to

Ln ro

ro
TJ

TJ TJ TJ > > > > > > > > E 2 SS2 2 SS^ S2 5 2 Ss 2 2 1 Ss

ro
VI LU VI LU vl LU vl fi 01 00 00

v l v l v l v j v l v l v l v l v l v l LD to v j v j v l cn v l VI VI v l VI LU UJ LU f i LU LU f i f i LU LU v l vJ LU LU LU cn UJ f i LU LU UJ Ln UJ LU Ln Ln v j f i to v l UJ UJ Ln cn Ln V I V I Ln 00 Ln f i Ln Ln Ln Ln LO Ln fcn 00 00 00 i cn LU ro Ln 00 UU ro O CTI f i 00 O to Ln Ln 00 (n O >O 00 ro I - " ro O <3 01 V I UU o to t-* ( LU LD to LO o LU LO LO 00 LO ro t o o cn f i LO i-> l-> 00 V I M f i f i Ln Ln o ro O Ln to V I to ro f i v l LU f i LO LU f i

. >
00 i-> M LD TJ

' O ' o O o o 00 00 00 00 00 M M t-' M M NJ IO


Ln
UJ fi T3

> i-> LO to
t-*

l->

i M

to to to to to O o o o o O O 00 00 00 00 00 00 00
l-> I-* l->

l-> LD

I-"

o
cu

UJ T3

ro ro l-> o o o o o ro ro Ln ro o f i UJ ro l- o 00 v l ro f i to cn U l to CTI 00

( > l->

l->

<
m'
> n n
TJ O C3. C

n
30 CD

3*8
LU v l f> LU 00 f i ro 01 i VI v l UJ ro M i-> fi fi 00 00 M M ro ro fi fi ro N l LU ro i-> LO LU ro v j LU NJ vj vl O O V I V I UU LU cn Ln CTI f i UJ to ro V l Ln Ln LU O O f i Ln M I-" f i M O to ro 00 00 ro cn M M

NJ

Ii
^ %
T3 TJ

t M

I-"

i->

Ln Ln Ln Ln Ln v j v l v j v j LU
N l ro o o ro N l w ro fi

cn

vl fi UJ

ro N l N l o o fo ro i - l f i ro l-> l-> P v j ro M Ln tn UU fi p LU i-> o o LD


i->

l fi 00 t-l

l-> fi 00 M
fi 00 IO i-l vl

K-l fi 00 M
fi 00 LU vj

i-> fi 00 M IO fi

I-> fi 00 M
fi

i-> fi 00 M
fi fi

> l-> fi fi
00 M fi fi fi 00 M fi fi fi i-l Vl

M fi 00 M
fi fi fi i-l vl

K-l l fi fi fi fi 00 00 00 00 l i M M
fi fi fi i-l vl fi fi l-> 01 fi fi l-> fi fi

>( M fi
00 M fi fi

00 M fi fi

M fi 00

> >
fi ro fi

l fi 00 l
fi

I-l fi 00 l
fi Nl fi

M fi 00 M
fi NJ fi l-> Nl
(-i

M fi 00


fi ro fi I-' M LU fi

t-l fi 00 M ro fi

M
00 M fi Ln I-' fi

l fi 00 M ro fi

M fi 00 M
fi ro

h-l fi 00

r-'
fi

I-l fi 00 M
fi 00

l-> fi 00

>
fi LD UJ fi

ro

In ' * > . p cn p t-> to M i-* LO to o Vl LO ro

cn cn

io

LD LD CTI tn

io t cn cn
M

ro
UJ LU

ro ro io ro Nl O O O O
00 00 00 LO U3 LD l l-i t-i

cn

t 00 Ln l / l

LU

ro

tn tn

to O

>

>

ca.
CL

UJ LU

to O
00 t-'

\ o o 00 00

UJ -V h-" I - * LO to

^ M
o
00 i->

UJ f v ^ LU M M l M to 00 V v

LU LU NJ LU LU UJ fi LU LU LU vl LU Vj LU UJ UJ LU NJ LU M UJ LU

LU

M
UJ

00 O ~ v o o 00 o o o o to ' o 00 00 00 00 00

\ ro

l M 00 00

ro ro ro oo f i ro \ o o ^ 00 o 00 o o O o O o O o 00 00 00 00 00 00 00
t-i l-> l LO VI I - ' LU t-" f i LU LU

' . NJ IO

' LU

l-> 00

M LD f i ~ v v..
LD LU

00

o to to o CJ UJ LU o Ln VI UJ Ln Ln > > > > TJ

I-'

M l->

2 S^ Ss

TJ > > > ^ E S2

I-" Nl fi

VI fi M

00 fi LU

Nl

Ln Ln ro cn cn ro (3 o Ln LU M f i ( 3 i-> f i LU ro v l Ln 00 LJJ O f i o TJ > -o -o > > > T)

s z s 2

2 S2 2 SSS


(3 fi

ro CT\ ro ro fi o o ' > . o o o 00 o o 00 o o to o ^ 00 00 00 00 t 00 to U l i-> to v l ( 3 LD LU NJ LU


l-> 00 LO i-> 00
LU UJ UJ

. M

fi V. f i l-> fi

00 00 l->

CO (3 00 l

^ 00
LU

O o
00 fi

> >

Ln ro TJ TJ

M vl

LU

ro

fi M

fi LU

fi TJ

UJ TJ

Ln o

LU fi

s S2

> > > > >

2 S2 SS^ E 2 2 SS
a
01

( o LO Ln D TJ TJ

Ln un to
TJ TJ

m
3 3 3' CO
3D

'o o

UJ

n>
m <
JK

CO vJ vJ vJ

vl LU vl 01 00

VI UJ

CO

cn cn vl vl h-l cn Icn l LU ro ro ro ro ro ro h-l ro ro 0 ro NJ CTI io io v l ro N l f i 1-1 I bo - l I - l io i - l UU p i - l i - l ro ro cn P In O ro P 0 1-1 ro ro o o cn UJ i - l i - l 00 f i f i t o cn o O to

cn

cn VI

vl LU 01 vl

vl LU

CTI UJ

vl UJ 01 vl fi vl

vl Ul

vj LU

vl UJ CTl CTI CTI v l cn h-l v l

cn

vl UJ 01 01 fi
h-l

vl LU 01 01 UJ

vl LU

cn Ln
cn 00

ro
h-l

vl vl LU LU CTI cn fi Ln LU v l h-l 00
h-l

Vl LU CTI fi Ln CTI

vl LU fi UJ

vl LU

ro ro ro ro ro ro io io ro
h-l h-l h-l

fi 00 i-l

ro ro N l ro i - l io
Ln 00 UJ i-l

to

in ro

i-l to Nl i-l Ln LD

i-l fi i-l 00 LD

ro bo
f i Ln i-l HI LO

f i NJ CO ro i - l h-l ro i - l fi CO i - l lu 00 V I h-l

ro ro ro ro o ro p
h-l

cn LU cn cn vl

to

Ln UJ

in

io ro ro p lu
fi

cn

cn cn cn tn cn ro LU NJ NJ ro LO 00 Ln o LO Ln v l vl o cn h-l h-l ro ro ro h-l f i t o o O O ro ro Ln h-l ro v l p p Ln V I ro h-l h-l ro io Ln f i if -il bo f i i-l i-l O ro p ro lu io io io cn 01 lu v l f i UJ UJ o o Ln p h-l v l h-l p i - l cn io h-l p i - l i - l i - l LO 01 f i h-l cn f i Ln Ln UJ f i f i cn

vj LU 01 LU 01 fi

vl Ul

vj vl LU UJ

vl LU

vl vl LU UJ CTI NJ ro 00 v l LU v l N l ro

vj LU CTI

-o > a. a.

LU

UJ

UJ NJ 0

LU

ro

Ul ~v

UU LU

LU UJ IO O LU Nl LU
h-l

p > 0

0 0 00
h-l I-l

o o o ^ o o 00 00 00 CO 00 00 h-l h J t o LO 00 00 v l v j o o o UJ LU LU LU ro o o LU LU f i h-l f i LU t o Ln Ln Ln f i 00 LO 00 t o LU ro UJ h-l ro > > > > > > > > > > > > > > 2 2 s ^ S s s 2 2 2 S s 5 2
1-1 1-1 I-l I-l 1-1 I-l t-1 I-l h-l

00

0 00

> o 00

.
ro
vl LU Ln fi 00 00
h-l

LU UJ LU LU UJ LU UJ ~v ro ro ro ro ro ' ro ro ro o O p O ro ro NJ O O O o o o o O o o 00 o 00 . V 00 00 vj

UJ
h-l

UJ LD

UJ LD

UJ LO LO

O
tu

o 00
ro

f i h-l 01 00 ro ro o TJ TJ > > > T) D TJ 2 S 2 S S S 2 S 2 S

O 00 Ln O VI

o to t o to o o o 00 o 00 00 00
Ln O
vl UJ 01 fi fo 13

tn
fi

O 00 Ln Ln

O 00 Ln LU CTI TJ

o 00
Ln
h-l

"o 00
fi

<
ro'

ro

?
> o n

o ca. c n
3D 03

TJ

?s
ro ro
vl LU fi

cn LU
to
h-l

VI 01 UJ 00 LU 00
h-l

00 Ln fi

to to

LD LD

UJ

Ul

ro 00
h-l h-l

cn cn ro cn t o ro 00 00 UJ h-l v l ro ro ro o t o v l V j f i ro cn un
h-l h-l h-l h-l h-l h-l

ro ro h-l h-l

vl fi

VI LU

LU 00 Ln VI to fi Ln
h-l

ro
vl vl LJ1 LU CTI O UJ V l 00 h-l h-l LU
h-l h-l

h-l

h-l

h-l

h-l

ro
Ln vl LU fi 00 CTI
h-l h-l

vl LU fi VI O to
h-l

vl UJ fi

00

o LO

fi cn t o h-l ro ro ro
h-l
Kl

v l LU LU f i fi fi 00 V l 00 Ln

vl LU

< n o Ln
h-l

vl LU 00 fi
h-l h-l

cn
h-l

ro ro

vl fi O Ln vj vl
h-l

o o <n
Vj

vl LU

Ln h-l

CO

ro
h-l

o Ln
h-l

vj Ln CTI V I LD LD fi cn f i LU

o fi

vl LU fi 00 Ln vl
h-l

ro cn ro f i tn h-l 00

vl LU Ln Ln
h-l

vl LU

vl LU

vl LU

o to

to
Kl

Ln
h-l

cn tn un NJ h-l 00 Ln 00 ro v l v l ro
h-l h-l h-l

vl LU Ln 00
h-l

tl
^ %
T3

fi
h-l

h-l

h-l

h-l

h-l

to LD
h-l

LO
h-l

LD
h-l

to
t-1

to to to
ro Nl i-l 01 Nl ro Nl i-l ro

ro UJ

ro ro ro ro o o ro ro ro h-l h-l
vl LU LO vl LU LO

LD 00 Nl ro

to 00

LO 00

LO 00

LD 00
h-l

LD 00
h-l

00 i-l to UJ

in

Ln vl
i-l

i-l fi NJ

Ln ro

lu

i-l fi fi i-l
h-l

i-l fi fi i-l
h-l

t o LO LO 00 i - l

to CTl ro ro f i ro ro ro LU LU ro f i f i ro
LO

i-l

to
Ln

fi LO

o
fi

h-l

O h-l
f>

to O

CTI fi fi r o ro rvi ro r o ro to

cn

Ln 00 fi NJ i-l
h-l

Ln Ln Ln Ln vl vl vl vl
NJ ro NJ fi Nl i-l
h-l

Ln vj

Ln VI

Ln Ln vl vl

ro ro ro ro ro f i ro
i-l f i LO NJ v l i-l i - l h-l fi fi fi

ro ro ro ro ro ro 00 CO

Ln vl IO fi fi Nl fi 00

un Ln vl vl

Ln vl

Ln Ln VI v l ro o ro lu Ln A
UJ

Ln vl

Ln vl ro o ro lu un
f>
h-l

to
to

o LO
LO

P O

00

ro io h-l h

LD to

to
LU

p p i-l i-l ro cn 00 h-l


A
fi

fi

fi

i-l NJ

vl i-l vl

lu

ro

to

i - l lu 00 ro CO i - l i - l Ln h-l 00

ro ro ro ro o f i f i UU ro r o ro lu lu Ln f i p p fi p io i - l
i-l Ln 00
NJ

ro o ro lu Ln
fi
h-l

ro o o ro NJ lu lu Ln Ln io i - l

Ln vl NJ

Ln vl

ro

ro

A Ln

LU fi

LU

>

TJ

O.

a.

UJ LU
h-l

LU UJ
h-l

LU

fi
h-l

Ln

LU
h-l

o 00 cn V. ~ . \ o o o h-l 00 00 00 O O O O o 00 o o o 00 O 00 o h-l h-l 00 o t o 00 00 o 00 00 00 00 o h-l h-l 00 00 o LO f i 00 v l Ln f i to to h-l NJ UJ 00 O o LO h-l h-l h-l fo v l cn ro LU Ln o f i Ln N l h-l Ln Ln h-l Ln f i o Ln Ln Ln h-l Ln Ln LU Ln LU 00 CTl LU h-l o 00 h-l 00 h-l v l 00 Ln 00 cn LU ro f i f i h-l > TJ TJ > > > > > TJ TJ TJ > > > > > > > TJ > > S S s S 2 2 2 2 ^ S ^ 2 ^ 2 s S 2 2 2 2 S
00

L/l

^ ro
UJ ~v

V.

Ln Ln
LU
h-l

LU LD LU

LU
h-l

LU

LU
h-l

to

LD

LU

' ro

\ h-l

fi UJ

ro

00

h-l

UJ v.

cn
h-l

LU
h-l

UJ UJ UU v^ ~v

^ h-l
00 v..

LO

Ln

ro LU

LU ro LD ro ro \ fi ' - V Ln O O 00 00 O O O 00 00 00 Ln LU

Ln

LU
h-l

CTl
fi UJ

h-l

00 OO V,

00 CO h-l NJ h-l
h-l

. .

Ln
TJ


Ln
h-l

O 00

00 o o o \ o 00 h-l 00 00 LU fi
h-l

tn ^ ro ~v

h-l LU LU NJ v h-l NJ 00 h-l UU "V. LD

LU
h-l

LU

' h-l

LU v^
h-l

UJ
h-l

(3 00
h-l h-l

to

LO LD

LD

O - O o o O 00 00 00 00 00
f i ro to LO ro ro Ln UU ro v l 00 O CTl to > TJ -a > > vl

Ln

LU

LU TJ

> > > S 2 S S 2 2 2 2 2 S ^ 2

>

O (3 -a >

LU 01

LU NJ

UJ
h-l

un


o
01

OJ 3 3_ 3^ CO

30

m
n

'o o

o
vl vj LU LU CO 00 vj vl LU LU vl vj 00 00 LO LU U l LD h-l h-l f i ro 00 i - l bo fi VI LU vj 00 vj LU vj vl UJ LO vj LU vl vj UJ vl Ln 00 00 Nl vj LU VI vl LU vl vl LU vl vj LU vj fi 00 LU vj LU vl fi 01 00 vj vj LU LU vj vl fi fi f i h-l ro NJ h-l h-l UJ f i h-l LU vl UJ vj UJ VI LU vj LU v j VI LU LU vl vl vl LU vl VI LU vl vl LU VJ h-l 00

CO N vJ vJ

m -<

ro ro ro ro LO 00 ro ro bo ro fi Ln ro
fi

O LU
h-l LU Nl i-l fi LU i-l
Nl h-l

cn Ln h-l
h-l LU

Ln Ln Ln v j cn UJ h-l h-l

ro ro bo P ro ro fi
Ln i-l

ro 3 vj bo

o ro

A
fi i-l vj

ro

o h-l Ln p

i-l h-l h-l

ro Ln

i - l P bo fi p p p UJ L u ro h-l io L np h-l
UJ 00

ro ro bo

3 vl

ro ro ro
h-l

lu
h-l i-l 3 h-l

lu Ln

fi I-l

ro cn ro 00 h-l cn ro h-l h-l ro ro ro ro Nl f i f i ro 3 3 Ln fi io p V j io i - l h-l io Ln i - l io h-l P f i v J ro Ln i - l p io h-l 3 H-l f i f i p i - l NJ f i 00 Ln i - l h-l - l Lu cn i -ol i00 V l 3 t-1 in ff ii UJ 00 t ro cn lu 00 f i f i i-l f i
00 h-l LU

ro ro ro ro to 3 Ln 3 ro ro h-l ro ro o LU ro f i f i h-l ro p lu ro fi p ro p P i-l ro f i i-l


UU LU

TJ

p P i-l
UJ

LO i - l VI i - l lu VI f i fi

i-l fi

ca. ca.

>

UJ UJ NJ UJ LU UJ ~v fi UU UJ UJ LU UJ UJ

UJ Nl h-l

LU

UJ UU v ^ V v LU

LU

LU

LU to h-l

UJ

00 fi h-l vl

ro ro ro ro ro ro NJ ro ro ro h-l h-l h-l h-l ro *v O O 3 O O . \ ^ 3 3 3 00 00 00 00 00 O 3 O 3 o 00 00 o 00 00 00 00 o 00 00 00 ro


h-l UJ
00

ro h-l
h-l

ro ro ro h-l h-l h-l


h-l h-l NJ fi h-l h-l

h-l h-l -V.


00 vl LU vl

ro ro ^ ro ro ro h-l h-l h-l

LU -V

LU LU

UJ

D 01

TJ

TJ

2 S 2 2 S S S 2 2 5 2 S 2 S s 2 <: 2 2 5 2 5

>

ro h-l ro N l 3 ro 3 3 UJ ro v j ro cn UJ 3 f i ro TJ TJ TJ TJ TJ D 13
fi

CO UJ h-l

h-l

o 00
00

3 00 3
fi vj

3 LD o 3 3 UJ CTI ro cn

LD h-l vj

00 IO

o o oo 00 cn cn cn
LU 3 v l to

o 00
fi

O to to

ro
fi

> > > > > > > > > > > >

< m g
n n o

>

s ca.
c

a
3D 03
h-l h-l LU Ln vl LO 00 vj h-l LU h-l h-l LU 3 Ln LD vl LU h-l
VI LU 00 00 00 h-l fo vl Ln h-l LU 00 3 h-l to cn LU h-l 00 vl LU fi 00 fi vl vj LU Ln f i h-l 00 f i 00 LO f i

h-l

h-l
vl vj UU LU vj LU

Ln UJ Ln 00 cn LO 01
LU LO 00 Ul

vj

Ln fi
LD fi

Ln Ln LO
NJ fi I-l

3 UJ
Nl LU LU VI h-l

h-l h-l

h-l h-l

V I ro ro ro ro ro ro ro ro ro ro N l ro ro ro h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l LD LD t o LD LO LO LD LO LO 3 3 3 O o 3 3 3 to L O to o fi o fi fi fi fi fi fi o fi fi fi o t f i p p p p t o p p p p p p p p p p io ro ro ro io io ro io io NJ io io L nL nL nL nL nL nL nL nL nL n Lu P LU Lu LU o o p o p p p p p P p p cn cn cn cn p p p p p p io i - l h-l i - l h-l h-l i - l M P i - l P h-l f i P io io P P i - l P M P f i f i P p P h-l V j v l v l V I V l v l v l cn f i LU UJ P f i P f i 00 00 f i 3 3 3 00 p Ln f in LU i - l cn CTl cn 01 cn en p p UU f i ro i - l i - l h-l p h-l h-l p 01 CTI p in Lu Ln L P I - l h-l v l ro NJ LU h-l oo h-l fi fi p P bo p P f i io P to P 00 LU P UJ f i f i P Nl * fi h-l 3 fi cn o 3 P 3 3 00 h-l to 3 cn Ln Vj 00 ro

Ln cn cn f i LU 00 v j 3 ro LU O h-l

to LD to to 00 cn to ro h-l f i ro ro 3 Ln 00 3 Ln ro

vl LU

UJ 00 v l Ln LU CO Ln f i h-l

ro
VJ fi h-l VI fi h-l h-l LD vl 01 UJ 00 h-l LD UU v l CTI LU LD

ro ro Ln UJ h-l 00
h-l Ln h-l LD

h-l VI 00 LO

vl

cn h-l
LD fi

vj LU

Ln VI

Ln O h-l
LU h-l LD

vl fi LU 01 vj

VI UJ fi LD

Ln
h-l LD

ro h-l
h-l LO

vl fi 00 fi 00

vl UJ

vj UJ

h-l LD

cn

cn Ln to 00 3 cn v l 3 cn
h-l LO h-l to h-l LO

vl LU fi CTI LO

g's

!i
T3

p p p p p p p t-1 P ir-ol p to Nl P ro P ro P ro LU P LU UJ cn in CTI cn cn i - l ro p CO p CO CO Ln io P P f i ro P 00 L O LO to to


00

h-l

LU

LU

UJ

LU

:
ca.

01 fi

h-l vl

cn

e n

to

CTl v ^ h-l h-l h-l h-l Nl

UJ Nl fi

cn
h-l

UJ LU

UJ f& UJ

cn
h-l 00

UJ UU LU LU

UU UJ UJ fi

cn to
h-l LD
LU fi LU UJ CO

LU fi LU UJ

LU

o 00
h-l

3 00
h-l

3 OO

o 00 o 00 h-l

3 00

00 cn ro fi 3 0 3 00 "3 00 00 00

h-l 00

' .3 00

h-l

cn ro ro ro ro ro ro Ln h-l Ln f i h-l LD Ln LU Ln 00 ro f i to TJ > TJ -o D TJ 0 -0 >

o m LU ro

h-l h-l h-l

h-l h-l to 00

00 LD UJ fi

h-l

ro cn cn cn h-l h-l h-l h-l O cn LD LD ro 00 00 U3 h-l \ o 3 O 00 00 3 00 3 o 3 3 00 00 00 00


vl LU h-l TJ

h-l 00

ro cn
3 00 00 h-l vl

h-l Ln

h-l LO

ro fi

(3 cn f i Ln to 00

h-l NJ h-l Nl

Ln cn en ro Ln Ln 3 LU (3
-D TJ

h-l UU h-l ro f i 00 ro

o
h-l h-l

00

ro TJ

3 00 fi

\ 3

Ln ro to

00 UJ LU

00 h-l LO h-l LU ro vl

o 00 o

^ 3

h-l fi

h-l 00

ro

h-l 00

O 3 3 00 00 00
h-l LU 00 TJ h-l h-l 00 13

ro ro 3 3 3 00 00 3 00
h-l h-l h-l

h-l 00

h-l 00

o 00
h-l fi
-D

3 00
h-l

2 s 2 2 2 2 2 2 S2 2 S2 2 Ss S

>

TJ

> >

TJ

D TJ > S2 ^

> > > > >

2 2 2

s s 2S1 1 S2 s 5
O OJ

to ro h-l ro to L O > TJ

o
>

h-l LU
TJ

3 3
LU

00

Ln Ln

>

0) 3 3 3' CO

o
CO

vl

vJ

-vl (JI

VI fi 3 Ln vl VI
h^i

VI LU LO

3 cn A
h-l

vl UJ 00 LO VI
h-l

Ln vl

TO

P h-l p
i-l

ro
00

P NJ
NJ

fi fi fi i-l vl

ro fi ro 3 00 ro f i o fi p p n io ro L p 3
h-l

vl vl LU UJ CO 00 00 to LU 00 00 h-l ro IO

vj LU 00 00 Ln fi

UJ
h-l

vl

vl

i-l
h-l Vj

cn to 3

vl cn cn Ln UJ ro ro 3 LU h-l 3 f i ro 3 LU Ln h-l v l Ln LO f i ro ro ro ro r o h-l ro ro ro ro ro NJ 3 3 3 3 3 f i ro ro IO 3 3 3 vl p v l f i f i 00 M bo ro v j f i f i h-l 00 h-l bo U l h-l p P ro P 3 i - l b f io P Ln LO Ln cn 01 p P p hJ p ID i - l P h-l h-l f i p h-l h-l f i V j LU to LO i - l to p bo i l i l P fi h-l v l
h-l h-l h-l

vl LU 00 00 fi

vl Ul 00 00

vl LU 00 00

vl
LU

00

vl LU 00 VI

VI UJ 00 01 LD

vl LU 00 CTl 00

Vl LU 00

VI LU 00

vl vl vl Vj LU U J U J UJ 00 00 00 CO CTl cn cn cn
h-l h-l

LD NJ IO

P h-l
i-l Ln i-l 3

UJ 00

LU LU

i-l 00
h^i

bo h-l

i-l IO 00

p p

fi

VI

fi 00

i-l UJ vl

Ln Ln Ln h-l un cn cn cn ro to v l f i Ln to cn v l ro ro h-l ro l o h-l ro NJ 3 f i M ro f i ro ro 3 f i v l 00 P P 00 bo P h-l h-l h-l h-l p P < p p ro N l h-l ro P f i h-l P LO p P iLU -l f i fi en P h-l p p to 3
Ln
h-l

vl LU 00 Ln

vl LU 00

vj LU 00

vl LU 00 Ln Ln

vl LU 00 Ln ro

VI LU 00

VI LU 00

vl LU 00 fi
h-l

ro
h-l

Vl UJ 00 fi 3 UJ to

Ln

cn

Ln P to cn to

i-l 3

to

p P L n O Ln
fi UJ

(31 LD

i-l Ln to

fi

P
fi

P
LO

io ro O P cn

p p io
h-l

vl LU 00 LU vj vl lo NJ
h-l

vl LU 00 LU Ln 01

vl LU 00 LU Ln

O
Nl NJ

VI UJ 00 UJ LU 01
h-l

vl LU 00 LU O vl

vl UJ 00

ro VI
h-l

<
m n
O

3D

rt)

ro 3 fi Lu

i-l fi i-l Ln

fi vj

P 3
to 00

fi LU

L n p
i-l

P to P fi p 3

i-l

cn
00

P P P f3i
h-l LO

ro h-l ro ro bo 00 bo h-l 3
(31 LU

13

>

ca. ca.

ro h-l
LU

A fi

cn 3 Ln 3 P cn Ln

UJ UJ NJ Ln 00 UU LU UJ UJ UJ LU LU IO fi

UJ

LU

LU

LU

LU UJ Nl fi

LU UJ

LU LU to fi UU LU
-V

ro ro ro ro ro f i f f i f f i
00

f o NJ fi fi v.. 00

3 "3
cn cn LU 3

3 00 LU
h-l

00 Nl

3 00

3 3
00
h-l

00

3 00
h-l h-l

ro NJ fi fi ~v 3 00 00
NJ fi NJ LU

ro fi

\ ro
fi
h-l h-l

ro fi
3 00
h-l h-l

3 3 00 00
NJ

ro ro fi A 3 3 OO 00 3 00 3 00 3 00
h-l h-l h-l h-l h-l

LU UJ . NJ ro . ro fi fi ' ro fi fi

LU fo fi

UJ

LU NJ fi

UJ

LU
v^

UJ

Ul

LU fi 00

UJ fi v^

UJ

ro ro fi fi
v^ LO LO f i h-l LU v l

ro fi
LO 00

3 3 00 00
LO fi

^ 00

3 3 3 3 00 00 00 00
L O
h-l

ro fi ' 3 C
00 VI fi

^ ro ro ro fi fi fi
3 3 00
vl

. NJ N l
3 3

ro
h-l

h-l

h-l

h-l

00

C J o o o> > > > > > > > > > > > > > > > > > > > > > s SSSSSSS^ Ss s S^ 5 S^ S5 ^ 2 ^ 2 2 Ss SSSSS2 ^ 2

>

TJ

01 T3

Ln f i IO 00 LU Ln 00 LU TJ TJ TJ TJ TJ

3
fi

fi

ro O

Ln fi

NJ UJ

3 3 3 3 to to fi 3 Ln Ln f i LU f i NJ to Ln ro ro to to 00

3 un

fi

00 00 vj vl f i ro CTl LU

'o 00
to

cn cn cn Ln f i ro
Ln

.
OO 00 Ln NJ LU f i

ro fi

O cu

. 3

<

cn cn

> n n

13

o a.
c m
TO 00

S *
LU LU
h-l h-l

LU LU
h-l h-l

fo vl fi vl UJ

LJJ
h-l

UU
h-l

fi

3
NJ

O cn O UJ VI 3 LO cn V I 3 NJ h-l
fi fi fi LU
(31

vl UJ 00 00

vl Ln

vj LU 00 VI UJ

ro 3 Ln

o Ln
(3 UJ

ro ro ro ro NJ 3 3 3 o 3 3 fi fi fi fi fi
LU

Vj vl UU f i CO LU cn f i h-l LO Ln LO NJ ro

vj fi
t-1

LO 00 vl

VI LU 00 01

ro LD

vj LU 00 LU Ln

ro NJ 3 3 3 fi fi fi Lu P
UU cn i-l to

cn LU ro ro cn A 3 ro NJ N l ro ro 3 3 3 3 3 fi fi fi fi fi
LU
Ol

VI LU Ln LO 00 UJ

vl UJ 00

VI LU vl

vl LU fi Vl 00 Ln

vl LU VI Ln UJ
h-l

3 fi
h-l

UJ NJ

Ln LD LU

O 3 to NJ
fi

Ln Ln UJ
h-l h-l

p
LU

cn
h-l

L u cn
i-l LO
h-l

LU

p
i-l to
h-l

Lu P
h-l

L u
(31

P h-l
Ln

ro
h-l h-l

LD

i-l LO
h-l

to
h-l

i-l LO

Ln

Ln p Nl
00

LO VI

00

h-l

P i-* IO
LU 00 00

P i-l
3 U3

LU Ol i-l i-l LO t o 3 3

LU
Ol

LU
Ol

LU

i-l to

h-l

h-l

LO

O P P In In In In <Ti P cn Ol cn cn

to 3 LO

P P LO
3
fi

LU Ol i-l
00

to 3 fi LU
(31

ro ro NJ 3 3 3 3 fi fi

Vl v l UJ LU f i cn LO 00 VI f i Ln 00 N l ro fi NJ

UJ LU LU
h-l h-l

h-l

Ln UJ
h-l

h-l h-l

h-l

h-l

h-l

h-l

3 cn
fo 3 fi

fi LO Ln

3 3 3 CTl cn NJ cn Ln to h-l v l 00 Ln LD vl vl A
fi

vj ro 3 00 UJ 3 to Ln 3 Ln L O fA i to h-l LU h-l LU

VI LU fi OO CTI 00

vl fi
h-l h-l

cn Ln

vl LU Ln Ln vl

ro

vl LU Ln fi fi Ln

I ^
T3

* P io
bo
fi i-l

3 fi p

ro N l NJ N l ro NJ ro ro NJ NJ ro 3 3 3 3 3 3 3 3 3 O O fi fi fi fi fi fi fi
fi fi fi

io M
i-l 00 fi
h-l

i-l 00
00

iji
Ln

P P vj

p o p in
3 cn

cn cn

L n LU P p in P 00 P Vl P t>
h-l

io io h-l o p cn ro

en ro
M UJ
h-l

In h-l

P P io i-l P f i fi fi P p <P p P LU P P LU ro
to NJ LO

io
h-l f i

P
i-l
VI

to p ro to

P
VI

io p ro io o o o o bo n f i ro h-l Ln h-l L Ln UJ P f o h-l ro f i P h-l


h-l

T5

>

ca.
CL

00

00 UU
h-l

LU UJ

LU UJ

LU

UJ NJ fi

h-l
00
h-l

00
-V.

o o to to ^ 3
HI

ro h-l ro . LU Ln LD f i ' 3 ^ 00 3 3 00 00 o 00
00
h-l

V .^ A ro ro fi fi
3 00
h-l

LU LU ~ v
h-l

LU UJ

UJ
h-l h-l

LU NJ
h-l

LU

ro ro cn 00

O 00
vl 3 Ln

3 00
h-l

ro NJ LO h-l h-l to N l 3 ro h-l 3 h-l h-l o f i LU f to to to f i 01 ro ro TJ TJ > TJ TJ > 13 >

3
h-l

5 S 2 5 S

o f i UJ TJ > > > > > > > > > > TJ TJ > TJ > > > > > > TJ > > 2 2 S S S s 2 ^ S S S S S S 2 S ^ s S S S S s S S S 5 5
cn
h-l

,
3 00
h-l

Nl fi

to
h-l h-l

ro fi
h-l

ro

00

3 00
Ln vl

3 00

3 00

O 00

3 00
h-l

v^ o 00 o h-l CO

01

LD cn 01 cn cn cn cn UU h-l UJ LU LU ro Nl 00 3 ro h-l Ln ' f i fi \ 00 NJ h-l h-l to Ln h-l f i . vl vl LO V . un to to Vv 3 3 3 v! 3 3 3 3 3 \ 00 OO 00 00 00 3 00 O 3 3 00 O O 3 O LO CO 00 00 00 o 00 o 00 cn

UJ

UJ

h-l

h-l

o Ln

cn

LO

3 cn O h-l un Ln UJ LU ro ro Ln v l ro f i

CTl h-l UJ h-l f i ro

LU fi

NJ Ln NJ

ro
UJ Ln TJ

LO Ln Ln Ln

00
h-l

h-l h-l

h-l h-l

h-l h-l

h-l

3
LU LU

h-l h-l h-l

ro
Ln TJ

h-l

3
Nl

Ol LU
h-l

h-l h-l

h-l

00

cn
UJ

NJ

00

to

LU to

fi

O
OJ

0) 3 3 3' CO

3D

'o o

CO vJ vl vJ

vj fi
h-l

VJ fi
h-l

vl fi
h-l

VI fi
h-l

vl fi
h-l

VI fi
h-l

vj fi
h-l

vl Ji
h-l

vl fi
h-l

vl fi
h-l h-l

vl fi
h-l h-l

vl fi
h-l

CD

LD 00 vl ro 3 fi p

LD
h-l

00 ro IO
h-l

00 IO 3 vl

fi
h-l

VI o cn

p p LO
3

fi vl M Ln

cn 00 LU h-l IO LO 3
h-l

vj fi

In
cn

p p P P P P h-l h-l h-l bo Ln bo P 3 i3 Ul P p In -l P p p p P P p p P LU f i f i vl UJ f i LU LU h-l P UJ P h-l 00 P h-l p o P i - l LU i - l P ID i - l P t f i 00 3 p f i f i fi J i f i P UJ LD Ln i - l o P cn M UJ Ln LO LU ro r o Ln P po h-l h-l t o vl un vl r fi 3


M fi
fi Nl
h-l

cn Ln 00 ro ro bo

fi fi 00 ro ro fi

ro vj Nl ro ro

en Ln ro 3 fi M 3 Ln

Ji 01 ro ro

3 fi
h-l

NJ M M

vl fi O 00 LD Ln ro 3 vl bo Ji fi

vl fi 3 vl cn fi ro o fi

VI fi 3 cn en en ro ro

VJ fi 3 cn fi LD ro ro

vl fi 3 01 ro to ro ro M LU

<

a. 7: ra

TJ

ca. ca.

>

00

UJ LU ro V. 01 r o cn 3 00 3 00 LO h-l f i 01 v l LU ro cn UJ ro cn LU NJ cn UJ UJ ro 01 LU ro Ln LU ro Ln NJ Ln NJ en V. 3 3 00 00 00 v l h-l UJ v j h-l

3
00 LD LU
h-l

> > >

\
o > > > > > > > > > o o S2 2 s 2 2 2 2 1 ^ SSSs s 5
00

3 00 to ro vl

3 00 vl
h-l h-l

3 00 cn 3 Ln TJ

3 00 LU 3 Ln

\ 3
00
h-l

fi

LU LU v ^ ro r o Ln Ln O 00 3 00 h-l NJ ro ro 00 h-l TJ TJ

UJ LU ro Ln LU ro Ln LU ro Ln LU ro Ln

\ ro
Ln

o
OJ

3 00
h-l

o
Ln 3

o 00 LO O to

3 00 vl fi 00

3 00 vl LU vj

O 00 vl
h-l

< n' g > n n c

TJ 3 ca.

30 DO O CO

eb
cn
h-l vl 01

r o h-l 00 3 f i Nl 3 cn UJ 3 LO r o f i vl ro ro 3 3 VI v l

o o o Ln m p P p p p p p LU Ln Ln Ln Ln Ln Ln Ln LU Lu i - l i-l b o b o b o b o P Lu Lu p fi f i cn P p m Ol m Ln Ln Ln f i LU LU LU t o LU fi fi P i-l i - l t o i - l i - l i - l i - l i - l LU LU i o i - l f i (JI i - l NJ i o Lu NJ h-l h-l h-l h-l h-l r o r o b h-l Ln to r o r o LU UJ LU p h-l Ln h-l p p h-l oo p - l h-l h-l p i-l P p p p p p p 3 iUJ p Lu LU P h-l LU N l VI VI 00 00 P P p p P P P P P P P vl 3 00 UJ 3 Ln t o LO LO LD LD Ln f i f i r o LU 3 Ln P Ln p LU
00
h-l

VI v l LU f i f > 00 vl CTl LO 3 LU 3 ro Nl 3 3 vl vl bo A f i fi i-l i-l i-l UU r o r o

VI UJ Ln 3 cn cn Nl 3 vl

vl LU fi 00 01 O ro 3

ro LU Ln ro LU
h-l

fi ro 3 cn

VJ Ln cn cn NJ NJ ro 3 m

vj Ln Ln
h-l

00 cn ro

vl fi Ln LD ro O ro

vl Ul fi to
h-l

ro 01 Ln 3 Ln
h-l

ro ro 3

00 ro O

vl fi cn LD cn Ln ro 3 Ln

LU ro
h-l

h-l

h-l

h-l

Ln vl
h-l

00 00 Ln 00 ro 3 Ln

LD 00
Vj

ro 3 Ln

VI LU Ln LD fi fi Nl

vj LU tn UJ cn vl ro 3 Ln

vl LU Ln UJ IO Ln ro 3 Ln

3 3 LU Ln
h-l

3 ro 3

3 LU LO LO O 00 NJ 3

Vl LU 00 00 fi 3 ro o

LU 00 ro
h-l

O 01
(3 NJ 3 Ln i-l fi to to

vl LU cn to LD cn ro 3

vl LU cn to LD Ln ro 3 Ln i-l

vl LU fi vj Ln to ro O Ln i-l fi i-l
h-l

ro 00 01 un fi LU LU ro O LU ro
h-l

vj UJ Ln LU VI to ro 3
h-l

p p i-l i-l p p h-l


Ln ro ro
h-l

VI LU vl fi 00 LU ro 3 Ln i-l

Vj

LU

ID

h-l

3 3 o Ln o Ln Ln b b j3 b b P P p r o O h-l m cn A UJ in f i p f i f i p ro f i i - l i - l i - l h-l i - l in r h-l h-l o h-l UJ o o LU Ln


Ln

cn UJ 00 vl ro to 3 Ln i-l

vl fi LU O UJ LU Nl

vl Ln LD fi un

vl LU Ln UJ Ln

o h-l NJ t o

vl VI LU cn ro 3 ro 3 Ln

LU LU to 3 cn 00 fi ro

Ln

Ln

Ln

Ln

Ln

fi

fi

Ln vl

ca. ca.

>

UU fi Ul cn
h-l

fi ro

LU LU v h-l h-l

to
h-l

LU f& fi cn UJ
h-l

LU
h-l h-l

LU fi
h-l

LU LU un LU LU to fi
h-l

fi UJ
h-l

UJ fi ro h-l
h-l

LU NJ vl Ji LU
h-l

VI
Vs.

CTl
h-l

00 ' r o. ' 3

00

Ln vl 3 v 00 O h-l 00 fi Ln LU CO h-l TJ

00

. ro
00

^ h-l

ro

00

o to
to Ln 00

3 00 to Ln un

00
h-l

o 00
h-l

3 00
h-l

3 00
h-l h-l

3
00 NJ fi 00 -0

o 00
h-l

3 00
h-l

LU Ln

> > >

ro LU to TJ

LU Vl -o

LU
h-l

>

2 SS2

s 2

>
o o ro
LU ro ro ro TJ

> > > > > > > > > > > > > > > ^ S2 s 2 SS2 2 2 S2 2 2 2 S2 2 S2 S1 2 SS2 2 2
o
01

3 to LU Ln vl TJ

3 00
h-l h-l

3 to
h-l h-l

00

O 00
01

LU Ln

NJ Ln

O
LU TJ

LU v^ LO r o 3 3 00 3 h-l 00 h-l Ln 3 O LO v l

LU
h-l

UJ
h-l

^ ' . cn h-l UJ
00

h-l

. h-l
01

fi ro to LD Ln

h-l

00 00
h-l

. h-l

A
h-l

LO t o

\ 3
3 ro ro

LD

Ln

3 00 to
h-l

3 00
h-l

3 00 Nl
h-l

3 00
h-l

ro TJ

Nl to TJ

fi

3 M f i LU 00 01 TJ TJ

o 00

00 CTl cn fi fi r o NJ TJ D

o LO O 00
h-l

3 00

h-l UJ LU

fi 3
h-l

00 O o h-l 00 h-l h-l A o

o
3 00 Ln
fi UJ

LO

3 en

un fi TJ

h-l

UJ

3 OO ro Nl 00

O 00 vl LU LO

3 to ro ro cn TJ

01 3 3
3^ CO

'o o

-vJ

C O vl N

vl fi

cn 00
NJ

vl fi 01 00
h-l

VI fi Ol

Ln Ln Ln Ln t o ro ro ro h-l ro NJ ro t o ro ro ro ro t o ro M ro h-l O ro ro ro un vl ro p M ro ro P v l io ro M P P p bo Ln In Ln h-l h-l In f i Ln 00 O io LU M to LU p Ln LU p p p h-l Ln Ln LU CTl to P M Lo M P vj 3 01 Ln ro ro NJ cn f i cn o h-l f i Ln p h-l 00 fi h-l i - l Ln LD


SZ ZO ES
h-l

* cn cn cn Ln cn cn 01 cn cn cn cn cn cn v l Ln h-l h-l 3 o 01 h-l h-l Ln LO V I

vl fi

vl fi

o vl fi

vl Ji

vj fi

vl fi CTl LU 00 3 to

vl vl fi fi CTI cn ro 3 LD v l LD t o t o ro

vl fi CTl 3 vl 3

vl fi Ln

o
Ji

to to

Ln 00
VI

o
3

Ln
NJ

ro

vl fi Ln 00 LU LU to

vj fi Ln fi LO Nl 3 vl

cn

vj fi Ln Ln 3

VI fi Ln fi

vl fi Ln Ji vj

VI Ji

Ln fi
h-l

vl fi Ln
h-l

vl fi fi
h-l

cn ro

tn
h-l

00 fi

cn cn cn en to
h-l

LU 3
h-l

vl fi fi 3 NJ LU
h-l

vl fi fi 3

vl fi LU LO
h-l

VI fi LU

o to
h-l

cn vl
Ln
h-l

to

vl to

<
n n . o
7:

LO p p p P p P P p h-l 3 VI h-l 3 b o P P P P p p P to to Lu p in p Ln p i - l ro p ro fi fi fi Ln i - l in LU i - l f i LU to h-l t o h-l f i p Ln Ln p i-l i-l P p Ji h-l vl M P LU LO P h-l f i f i f i f i if -il vl h-l M P P h-l h-l h-l ro v j LO vl Nl ro

p LU p

ro
M

fi LU

fi LU

ro

fi 00

fi Ji

fi 00

ro

>

ca.
CL

ZO

ZO

Ln

LU

89T

00

LU fi
h-l

LU LU
h-l

UJ UJ
h-l

fi ~v

LU fi
h-l

Ul LU Ul
h-l

UJ v^
h-l

UJ LU LU
h-l

LU LU 3

LU LU UJ LU LU NJ 00 LU 3 to 00 v^ 3 3 00 00 LO Ln A V I Ln > T)

LU LU to 00

LU UJ
h-l

LU LU HI LU 3

h-l

fi

fi
h-l

fi
h-l

fi
h-l

fi
h-l

>

h-l
3 00 00

fi v^

h-l

. UJ

00
h-l

3 00
h-l

cn Ln 3 3 ro ro h-l Ln ro 01 f i Ln 00 ro cn cn > > > > > > > > > TJ TJ TJ TJ 2 ^ S 2 S 2 S ^ S S S ^

o o

(3 3 3

3 00 00

v^ v^ 3 3 3 00 00 00 v l VJ v l f i f i LU v l UJ f i

. .3 3
00 vl UJ 00

v.. 3 00 3 3 00 00 UU Ln ro

3 CO
NJ NJ

-V 3 00
h-l

\ 3
00
h-l

' O
00
h-l h-l

3 00
LO LU

o 00
00

3 to UJ

o 3

3 00 UJ

3 00
h-l h-l

3 00
h-l h-l

ro to

ro 00
3 00

\ ro
00

O
01

^ 3
00 Ji TJ

3 00
h-l

h-l UJ cn > > > > >

o fi

ro

LU fi TJ

LU fi TJ

LU fi U

en ro LU
VI TJ

ro ro NJ Ln
LU TJ

3 00 LO
h-l

< n s ^

to

>

2 2 2 S 2 S 2

2 2 S S 2

S o
>

-a o ca. c
n
3D 03 3D 3 m 00

o n

cor

vl LU VI VI LU LO

vj LU 01 vl

vl Ul Ln 00

vl LU 00 3 00 to 3 vl

Ln

o h-l h-l o cn ro 3 NJ ro t o ro t o ro ro ro t o t o 3 3 3 3 3 3 3 o 3 V o o o 3 vj vl vj vl vl vl v l Vj O I 00 b bo b o b o b o b o bo bo b o b o bo o b o b o b o b o Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln NJ NJ i l i l io ro ro ro io io Ln Ln Ln Ln Ln io io h-l r o h-l h-l h-l h-l M M M cn O H I h-l h-l h-l H i HI h-l h-l h-l cn LU LU O LU o 00 00 00 00 00 f i f i f i f i f i A f i f i f i f i P vl LU
EZ EZ

cn cn ro Ln

N l ro v l v l CTI f i U l UU v l Ln LD 00 Ln Ln fi f i cn cn NJ h-l h-l V I CTI en v l ro ro NJ ro 3 v l VI v l v j

to LU vl
h-l

ro
UJ VI
h-l

ro
to
fi
h-l h-l

6 cn

h-l

h-l

cn

vl 01
h-l h-l

vl fi

vl

00

vj
h-l

fi to to 3 vl

cn LU 00 3 to 3 vl 00 Ln

A
3 3

cn

vj LU VI Ln vl 3

Ln
UJ
h-l

cn
ro to

00 00 00 3

o o b o b o Ln Ln
i-l LU fi M i-l LU Ji

01 00 LO LU ro t o 3 VI

vl UU 00 Ln

vl fi
h-l

vl fi

ro

cn

LU fi

vl LU 00 00
h-l

cn en o LU

P P P P 3 00 P 00 P 00 v j
h-l

3 vl 00 Ln i-l LU fi
vl

cn ro

vl vl o vl bo b o bo bo b o b o Ln Ln Ln Ln Ln t .

Ji to 3 VI

vl LU Ji 00 to VI

vl Ul
h-l

vl

ro
3

cn h-l ro cn LU ro LD en LU to Ln
to 3 vl

cn

vl fi Ln CTl fi

vl UJ 00

cn cn 3 o LD LD
vl
h-l

01

ro

to O

ro

(3

LO Nl 3 vj 00
f i

cn
LU

ro o o

o b o Ji
Ln 00

vl vl vl CTl LU f i t o cn 3 00 ro h-l v l LO ro v j Ln Ln ro t o ro (3 O v l v j VI 00

UJ NJ
h-l

h-l

Ln LU
3
Vj

cn ro

fi 3 LO vl to to 3 VI

ro

ca. h-l vl ^ U C D C cn < a ro 00


vl LU vl to

O
VI

i-l LU fi

i-l LU fi
h-l

i-l
LU

i-l ro fi fi UJ

i-l

to to to
to Ln 00 LU vl

to
fi vl

b o bo bo bo 00 f i f i f i fi fi f i M fi M b o b o to P o p p p fi A 00 cn vl Ln in p cn LU Ln LU vl
<n
CTI

h-l

TJ

>

CL CL

UJ LU -V
h-l

UJ

LU LO

LU

LU Nl
h-l

Ln
h-l h-l

LU LU v* h-l LU H* h-l fi LU
h-l

to to
to fi to fi

LU v^

h-l

LU UJ to fi v^ LU LU
h-l

fi

LU LU UJ
h-l

to

ro

o o 00
h-l h-l

h-l

to
00 LD

00 Ul
h-l

to ', O o 00 00
LO to Ln

LD

' to

~v

cn
3 00
LO
h-l

to
3 00
h-l

cn
NJ vl

3 00 01
h-l

LD
h-l

3 00 Ji

^ 00

fi fi o ro o v l cn Ln NJ fi Vl Ul Nl O f i to h-l cn Ln en TJ > TJ TJ -a TJ TJ > > > > D > > o > > > > > TJ o S 2 ^ 2 2 ^ S s S S S 2 S ^ 2 1 S s S E 2 S S E ^ S ^ S 2 2 2 S S S
h-l

LU

Ln

LU t o UU LU ro LO TJ D

o o oo
00 01 3 vl TJ

3 00
h-l h-l

ro Ln ro h-l ^ t o h-l ro f i (3 00 3 o 00 00
h-l

^ ro 01 ro ro fi cn
3 00
h-l

V . h-l
h-l

cn
h-l

CTI
h-l

A
ro ro
h-l

LU NJ LO

00

LU 00

NJ fi

LD

LD

o 00 o 00 o 00
to
fi VI LU to LU 3 TJ

to

CO

Ln

LU 00

to UU fi TJ

UJ

UJ UJ LU TJ


to UJ
h-l

ro

o oo h-l

3 3

(3 00 00

00
h-l h-l

3 00 3 LU LO

3 00

o 00
NJ UJ vl TJ

^
3 LU VI

Ln O 00
J_l

v.

01 o LD

LO 00

00

3 LD

3 NJ

Ln o LU Ln LU Ln Ln Ln O V I Ln ro TJ > > TJ TJ
LU

ro

3 00 fi

o
01

01 3 3
3' CO

'o o
CO vJ vJ
N

00

o v j vJ v l v l v j v j V I O v j vl O o vl o vl vj vl vl o vl un Ln Ln CTI Ln Ln Ln Ln Ln un Ln fLn Ln Ln Ln Ln un Ln Ln Ln Ln Ln i LU LU h - l h - l h - l 3 3 3 3 cn cn Ln Ln Ln Ln Ln Ln 3 e n f i IO 3 3 00 00 LU LU t o h - l LO LO o CO CTl 3 LD cn f i f i LU -l h-l h-l 3 LU UJ NJ 00 ro LO CO Ln Ln 00 f i h - l Ln UJ LO 3 hLD cn h-l h-l h l h-l CTI LO f i UJ 00 LO 00 f i f i v l LD cn A cn cn cn NJ N l ro t o t o ro t o t o h - l N l ro t o t o ro NJ ro NJ NJ h - l h - l ro h-l t o t o h - l t o H I ro 3 NJ f i 3 ro fi fi 3 ro ro 00 p to 3 ro ro N l ro ro t o f i i - l LU p A p P P P p fi L nL n p fi h-l h-l f i H I f i h-l h l f i ^ io io P L n L n P p p L n P 3 UJ i - l Ln p to f i p LU p i - l h - l L f i f i ro Ln p n P ip LU i - l -l Vl i-l i-l LD Ln i - l H I i - l f i L np L n in h-l IO IO J i h - l J i h - l 3 i - l O h - l v l h - l f i (Tl Ln LU ro P fi A to v l t o h-l f i P 00 P 00 3 h-l h-l 00 00 in cn hf -il to 3 i-l ro L n 00 Ln o o LU 00

vl

-o

Ln 3 LU
h-l h-l

Ln 3 UJ CO t o

LO to UJ
h-l

SET

P P p L n b o LU CTI i - l in in LU CTl 3 LU P P ro f i P P 0
io
h-l h-l

3 ro ro

fi

vl vl vj fi fi fi CO 00 00 00 fi 00 3 00 f i 3 cn t o ro h - l NJ 3 LO 0 l 3 f i iN-l ID UJ 00 i - l to 00 3 00 N l vj UJ to LU

VI fi vl

vj vl fi fi O vl

VI fi

vl fi

O vl fi fi
vj

c n

cn CO
LO 10

cn 3 Vj

o Ln Ln 00 h - l c n
to
h-l

O 3
LU

OOZ

ro ro ro ro h - l P ro P 3 h-l f i i - l to p

cn h-l
fi 00

fi 00 i-l Nl fi fi i-l vl

p ro
2 0 8 . 9 1

P p P L pn CO L u i - l ro P 3
h-l h-l

cn to c n cn Ln ro ro p 3
h-l h-l

<
ro n
O 3D

TJ

>

CL

ca.

1 8 6 . 4 8

fi fi O
vj

fi vl 3 00
h-l h-l

A
"V,

fi fi fi
V .

fi fi fi
f i

fi

fi

fi O

fi
Vs

vj

Ji

fi
V s

fi

3 Ln Ln 3 Ln v l Ln 3 O TJ TJ > >

3 00 3 O O h-l to h-l

^ 3

\ V I - vl
00 LO 00 NJ LD

00

h-l

3 00 3 3 3 3 3 00 00 00 00
LU fi
h-l

CTI cn

Ln 3 CO
LU

\ v. f i fi

TJ > > > > S S 2 2 5 2 5 S S 2 i:

> .
o
h-l h-l

LU

LD

vl 3 vl TJ

NJ fi 00 T)

.
3
00
h-l h-l h-l h-l

fi fi fi ^ fi fi fi A fi fi V s N l V) fi LU LU LU ^ LU UJ ro ~v V, f o . NJ ro ro A v ^ Vs. ~ v -V 3 3 3 ' ^ ^ . CO CO 00 3 3 3 3 3 3 3 3 3 3 3 3 3 "3 3 3 3 00 00 00 00 00 00 h - l 00 00 00 CO 00 00 00 00 o 00 00 00 00 v j v j 00 h l Nl f i h-l LD LO h l CTl LU f i ro to UJ to L O oo fo cn h-l ro f i Ln UJ f i f i LU ro 3 Ln h - l LU LU 3 f i UJ ro h - l 3 f i f i Ln v j 00 f i NJ c n Ln LD cn vl o o Ln LO 00 V l o f i v l Ln h - l TJ -a > > TJ TJ > > > > > > TJ TJ > > > > > TJ TJ 2 S ^ 2 S S ^ 2 S S ^ S S 2 5 S S fi fi fi fi fi
-V.

fi

. UJ

UJ

' h-l

o
01

3 00
h-l h-l

s s

s s

.
vj vj

h-l

o Q o
h-l

00

to Ln ro ro ro ro ro h-l h-l N l ro h-l h-l

cn ro
UJ fi

UJ V I 00 V I LU Ln fi fi fi O fi VI h-l LU oo
h-l

cn

VI v j CTI 01 f i h-l UJ f i v l Ln to 3 ro t o
HI

vj

VI 00 00 00 NJ
HI

vj

Ln Ln 00 00
LD
Ul

ro
h-l

Ln 00 00 OO Ln to
h-l

vl v l v l v l o v j v l v l v l fi Ln Ln Ln Ln Ln Ln f k f k LU 00 00 00 01 Ln U l v l CTI 00 V I f i 3 00 v l Ln Ln Ln CO Ln UJ Ol 00 00 cn f i o UJ t o 3 en LO 00 01 t - 1 00 NJ t o ro ro N l ro t o t o NJ
h-l h-l h-l h-l h-l

vl Ji
h-l

vl LU

VI UJ

vj LU

CO h - l V I LD NJ h - l to to
h-l h-l

cn

Ln
fi
h-l

VI LU f i fi LO v l 00 V I
h-l

LU fi vl
vj

vj

vj


LU

Ln > ^

< m S > n n
TJ

5 ca.
c n
3D 03

vl

vl

vj
*k

vj

LU 01
h-l

LU
h-l h-l

LU

Ln

h-l

P i-l
VI
h-l

LU fi fi UJ fi

fi Ln

to
i-l Ln

fi Ln i-l fi

to fi Ln i-l

to fi Ln

ro
fi Ln i-l fi

Nl fi Ln
h-l

to Ln i-l fi

to fi Ln
h-l

i-l

f fi

fi

fi

to fi Ln i-l fi

ro
fi Ln i-l fi

to fi Ln i-l fi

to
f i

ro
fi Ln i-l fi

Ln i-l fi

to fi Ln

i-l
fi

to fi Ln i-l fi

NJ fi Ln i-l fi

to fi Ln i-l fi

to fi Ln i-l fi

3 cn 3 to ro ro ro ro ro HI h-l h-l HI O ro t o NJ IO v l
fi

un Ln LO 3 to
LO NJ 3 vl

UJ Ln LD 3 vl

Ln LO
00
h-l

fk
h-l

LU 00
h-l

00

to 3 vl

ro 3 vj

cn Ln cn o to NJ ro
3 vl

LU fi VI 3 00

ro ro en h-l Ln h-l

? s

3 VI

3 vl

ro ro ro 3 3 3 vj vj vl

cn

VI LU 00 00 Ln fi

H
TJ

un
i-l fi

fi Ln

i-l
fi

fi Ln i-l fi

fi Ln

i-l
fi

b ob ob ob ob o ib o Ln b o Ln b o Ln b o Ln b o Ln Ln Ln Ln Ln n v j v l vl v j v l vl in in L n L n 00 00 00 00 00 00 00 M P LU LU b o 00 Ln P Ln P UU p UJ p N pl 00 00
h-l h-l h-l h-l

LU

f i

>
ca.
CL

UJ

LU fi fi
h-l

Ln
UJ
h-l

fi

fi
V s

fk

fi

fi

fi fi

fi fi v^ VI f& fi 3 00 NJ fi fi

UU LU

UJ

Ul

LU
h-l

h-l

~v

n 3 ^ Vs c 00 h - l 3 3 3 3 CO h - l 3 00 00 00 to o h - l ro LO 00 UU 3 h - l un Ln 3 f i Ln LU Ln h - l Ln > > TJ TJ > >

LU 00 ~ v LO

h-l

~v h-l
fi

CTl

3 t o N l 3 3 3 to 3 cn cn c n to NJ LU ro LU NJ ro O f i Ln ro t o Ln Ln Ln 3 vj v o o j f i v l to vl to LU to 00 v j 00 Ln to Ln 01 f i t o Ln Ln cn c no cn D tl TJ > > > TJ > > > > TJ > TJ > > TJ TJ > > > > > > > TJ TJ TJ 2 S 2 2 2 2 2 2 2 2 s 2 2 s 2 2 2 2 2 2 2 S s 2 2 2 2 2 2 2 2 2 2 2
ro ro ro to Ln Ln Ln f i h - l NJ
h-l h-l h-l

>
h-l h-l h-l h-l h-l

vl to LO V s LO to to ~ v O > 3 3 3 3 3 00 CO 00 00 00 3 00 3 00 00 to to
h-l h-l

\ LO

LD
h-l


vl

' V v ' ro ro h - l h - l NJ h - l 00 01 to LO '. ^ \ 3 3 3 3 3 00 3 00 00 00 00


LO LU
h-l

V v h-l V ,

Ul v.. LU
h-l

LU LU
h-l

UJ
V v h-l

fi

LU

LU

00

00

00

h-l

00 3 00

LD

3 3 00 00
h-l h-l

00 to

00
h-l

LU LU . h-l h-l h-l h-l LO LO 3 ro 00 00 ro N l h-l 00 " c n 3 3 3 A 3 o 3 00 3 00 00 00 ^ 3 00 00 00 00


h-l h-l h-l h-l h-l h-l h-l h-l h-l

00

3 to

HI

O
01

QJ 3 3 3' CO

3D

ro

'o o

CO vJ vJ vj

s
7: vj

cn 01
3 vj 3 to

CD

vj vj CTl cn fi fi vj UJ 00 v l Ln t o NJ NJ
h-l h-l

vl UJ
h-l

vj 00 vj to Nl 3

VI 00 LU 00
h-l

cn
to ro

cn cn UJ UJ

LO to

vj 01 NJ LU LU 00
h-l

vj

VI

vj

Ol to
h-l h-l

Nl
HI

p p

LO

S0TZ6T

P p p p UJ i-k i - l Lu i - l p p to P t o h-l 00 i - l i - l t o 3 fi 00 p fi fi P fi to f k io in vl to
h-l

to

Nl fi

M fi

fi 00 i-l to fi 2 0 8 . 9 1

cn cn h-l h-l fi to f i Ln to O h-l ro ro ro ro ro U3 h-l O 3 ro V I o p M p M P f i bo bo h-l h-l P h-l p p p Lu i - l i - l io f i V l p f i t o h-l P h-l h-l

vj v j V I CTI 01 cn CTl h-l h-l O 3 t o h-l LD 3 fk t o LU to UJ ro Ln h-l


vj

vl Ln CTI LO O LD 3 t o cn vj LU
vj HI

vl LO fk UJ
h-l

Ln to

vl Ln LD 00
h-l

h-l

fk

p i-l
VI in i-l
h-l

fi 00 i-l to fi i-l

fi 00 i-l Nl fi

cn ro ro 3 ro vl
00

vj Ln to Ln 3 3

VI Ln LO fi

vl

Ln 00
LD UJ LO to 3 fi to 3

Ln
vl to 3 Ln (3

VI Ln 00 LO 3 LU to
h-l

VI Ln 00 00 00 CO
t-1

vl Ln 00 00 00 Ln
h-l

Vl 00 vj

vj

Ln Ln 00 00
vl 00
LU

vl Ln 00
vj

vJ Ln 00

ro
to
h-l

ro ro ro
fi

to
h-l

3 LU to to

cn ro h-l ro
to

vl Ln CO Ln 00 Ln NJ

-<

ro
fi UJ
h-l

bo Ln

Nl fi

P h-l
h-l

fi fi LU

fi

fi
h-l

cn

P h-l

p Ln UJ
LU UJ

P 00 P LU

o ro
i-l
h-l

ro

01 fi t-1 3

ro h-l
i-l fi

p i-l
fi

p
i-l fi

p io P P P fi f i f i h-l p Lu p P P P h-l t-1 i - l f i UJ


fi fi fi
h-l h-l

o > ca.
ca.

1 6 2 . 5 2

cn

cn o

LU
h-l

00

fi fi
h-l vj

fi fi
h-l h-l

fi
h-l

fi
h-l

fi

fi
h-l

fi
h-l

fi
h-k

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fk
h-l h-l

fi
h-l h-l h-l

' h-l
01

Vv. h-l

fi

fk
h-l

fi

fi
Vv h-l

fi fi

fi
Vs

fi LD

fi LD

fi

fi

fi O 00
h-l

fk LO 3 00
h-l

O
01

LU 3 00
h-l

cn

Ln

Ln
Vv

3 00 Ln LU 0 TJ

3 00
Nl

Ln Ln
-0

3 3 00 00 LO Ln Ln Ln
h-l

\ 3 3 00 00
fi

Ln Ln
3 00 fi

fi

fi

fi 3 00 00

3
Vv

Ln
fi

cn

> TJ TJ

fi LU LU TJ

Ln ro

>

3 3 00 00 UU h-l h-l LU to 00 -o TJ

\ 3

CJ
Ln

>

00 .00 h-l t o CTI LU LU O v j cn f i T) TJ -o TJ (3 fi

3 O CO 00 NJ to
vj

3 00
h-l h-l

o o h-l o 3 o 00 00 3
h-l HI

LO t o 3 00
h-l

fi LU

to

cn

h-l 00 vj 3 LU LU 00 O

0 to 3 3 3 00 00
00
h-l h-l

to
3 00
h-l

LO LD 3 00
h-l

3 3 CO 00
h-l h-l

Ln fi UJ

TJ >

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

> > > >

to fi TJ

ro ro ro ro t o h-l 3 3 Ln Ln Ln f k h-l f i U l f k v j ro h-l v l cn 3 f i LU TJ TJ 13 -o 13 > > >

< m'

S
o

>

o n
c n

3 CL
3D 03 3D

00 3

cor

ro
vj o LU UU Ln f k VI CO UJ to to LD
h-l h-l
vj vj

h-l

h-l

Ln vl 00 UJ

ro t o ro f o ro ro ro ro Ln Ln Ln
LU Vj h-l LU

(Tl cn cn Ln Ln 0 1 cn Ln to 3 Ln UJ cn cn h-l 3 LD h-l Ln h-l cn v l 00 v j cn o h-l f i 01 LD Ln 3 fi o o o NJ ro ro t o t o t o t o t o ro ro NJ NJ t o N l t o ro t o ro ro t o NJ t o N l ro t o NJ NJ NJ ro t o Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln


LU LU LU LU LU LU

Ln 3 UJ to

VI VI

VJ vj

vl fk 01

vj

fi

vl UJ

vj fi

vj

fi

vj f i

vl
UJ

vj

fk

vj Ln

cn h-l 3 cn v l Ln LD 00 ro ro
to
LU

Nl to

ro Ln Ln
LU

vl vl UJ LU 00 cn LO 3 v l VI h-l CO t o ro ro t o Nl t o i n Ln
LU UJ

Ln UJ

vl LU

vj

vj

LU

UJ

LU
h-l h-l

LU

UJ

cn in cn L nL nL n cn Ln LU o o o

Lu ro to to io io
Ln fk

ro

to fi

h-l HI

h-l

P 3
h-l

HI

i-l Ln 00

i-l
LU HI

h-l

3
HI

fi cn Ln cn Ln LD o 00 LU cn cn Ln cn h-l h-l cn h-l ro t o N l N l t o t o ro t o ro ro NJ t o ro ro ro Ln t o h-l h-l h-l 00 00 cn p i - l 00 LU LU oo Nl fk i-l

un cn cn Ln cn Ln f i v l Ln Ln t o 00 ro UJ CTl LU LD O CTI cn LU cn 00 NJ v l t o ro t o t o t o t o ro NJ t o NJ ro ro N l t o ro h-l h-l H I h-l h-l h-l Ln Ln Ln Ul f i pa f i f i Ln p P h-l io Ln h-l t o NJ Ln LU ro h-l O

vl UJ vl O to

vl

VI LU

vj f i

vl LU

oo LU en

to
vl Ln to

LU 00

vj

Ln 00 O to O
CO 01

fi NJ 00 3 vl

vl fi NJ
vj

vl UJ fk VI
h-l

vj

ca.
7t

cn h-l
13

Ln Ln UJ
3 fi

m cu

ro ro ro ro ro t o ro NJ ro ro ro
h-l h-l
Hk

00 3 to
h-l h-l f i
Vj

h-l h-l f i

h-l

Ln
h-l f i h-l

Ln
h-l f i h-l

Ln
h-l f i

Ln Ln
ji 00

UJ Ln

P h-l
00

cn cn un Hk

P LD

ID

cn

UJ LU
h-l

UJ fi fi UJ UJ fk UJ fi
h-l

LU LU
h-l

LU UJ
h-l Vv

LU LU LU
h-l h-l

h-l

Ul UJ LU
h-l

LU LU fi VI 3 00
h-l

LU UJ LU to LU
h-l

.fi h-l
00 00 3 00 to to
h-l

UJ fi NJ fi O 00
h-l

Ul
h-l

o 00

to \ 3 00
h-l

Ln ro
3 00

LU
h-l

ro
h-l Hi

o 00
00
h-l

o o 00
LU NJ

h-l ' h-l to


3 00
00
HI

\ h-l
LD

to

00

to

o 00
vj fi UJ

3 00

o o 00 o 00 00
h-l

to ro 3 ro Ln N l

cn
fi VI

ro
h-l

00

> 0

TJ > > > > > > > 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 13

> >

cn cn TJ >

cn
TJ

>

to to to TJ

h-l h-l h-l

HI h-l

to 3 00
h-l

A^ LD O O Vs \ O 3 "3 0 3 00 O 00 o 00 00 3 00 OO
vj 00 00 UJ
h-l

ro O
3 00
h-l

o
3 00 00 fi

00
h-l

h-l

3 00
LU to
HI

to 00 TJ

UJ

h-l h-l

> >

3 UJ TJ

ro Ln

cn
TJ

>

Nl NJ TJ

LD LU

to
fi 00

00
h-l

Ln

LU

ro ro ro h-l f i UJ Ln LU V I t o Ln Ln
TJ TJ TJ

ro

> > >

vl 01 Vs LU 00 f i Vs 3 3 00 3 00 00 LU to f i Ln Ln f i cn LD 13 > TJ
h-l

LU

UJ
Vs

LU NJ vj

LU
h-l

fi vj

Ln
h-l

ro vj
3 00 00 NJ 00

Vs

CO

<
-a

>

CL CL

fo

3 fi

^ 00
00 fi VI

o 00 o h-l 00
O (3 Ln UJ
h-l

3 ro

to

s
m

01 3 3 3^ CO

m o o

30

o
to
CO vJ vl -vl
h-l h-l

3 o 3 3 UJ 3 Ln h - l h-l 00 3 cn ro ro 3 ro

LO to LD to en cn to to v l ro vl vl
h-l h-l

LD 10
00 00

p P LO
fi ro
HI

h-l

LU io A M vl
h-l

p p ro p p i-l p p
NJ ro LU UJ LD ID

to LO LO LO to 00 tn f i to to 00 f i h - l v l v l h-l h-l 00 v l cn CTI h - l cn 3 to Ln 3 VI 00 t - k ro ro ro ro h-l ro 3 p to to 00 v l P P M bo 00 H k h - l h - l p p i-l P i-l M LU f i f i P U U h - l Ln i - l i-l 3 Vl Vsl h-l h-k h-l fi v l h-l LU

00 Ln fi NJ 00

00 U U 3 LO VI h-l ro h-l to LO ro

p P

00 3 fi ro 00 vl NJ NJ M

00 00 3 o *k LU 3 to Ln LO LO LD to to M NJ ro M
HI

i-l t - 1 h - l to i-l v j Ji p h-l i-l io LU h - l CTl f i


h-l

h-l

vl 00 00 vl Ln h-l cn ro to to o v l io 00 h - l

vl 00 00 00 3

i-l to p fi i-l i-l Nl cn LU vl cn

cn

v l VI v l 00 v l v j Nl to v l h-l ro f i Ln Ln CTl 00 3 h - l to ro h - l to ro Ul M io h - l h-l h-l ro P i-l to f i f i fk P i-k NJ Ln LU LU to cn cn Ln

VJ vl CTI Ln
v j

vl vl Ln UJ
h-l

^ m <

cn ro ro M LU OS

3 ro to M

-o
LD

p
3

>

Q.

c a u

Ln Ln Ln Ln LU LU LU LU h-l h-l h-l h-l 3 o 3 o 00 00 00 00 Hk to Ln f i ro UJ fk Ln to f i LU h - l TJ > > >

22 2 22 222

Ln Ln V.S Ln Ln '. ro LU LD Nl to O 00 v l 3 \ 00 3 3 ca 00 h - l 00 00 v j ro to fk f i L U 3 to h-k to cn UJ o o > -D

Ln to Vj ' 3 00 fi to O D

n 22222 2222 22 2 2

.
h-l h-l

Ln ro UJ 3 00 00 Ln 00 TJ

Ul ro to 3 00 LU fi 01 TJ

Ln Ln ' h-l CTl 01 3 3 00 00 h - l h-l 3 LU fk Ln v l TJ >

Ln Ln Ln fk '. o 00 3 00 h-l 3 UJ 3 LU v l LU > 13

CTl

Vv. h-l

h-l

fi "3 00 to Ln vl

Ln ID 0 00 UJ ro UJ

-n

Ln fk Ln 01 LU Ul to O 3 '. 00 3 3 O 00 00 00 h-l h-l cn CTI LU 3 LU f k to v l to v l CTI > TJ > D

O
01

<
m

> n n o

CL C

n
3J CD

% 6
NJ ro 00 01 h-k 00 ro o LU v l VI 3 v l UJ ro Nl ro ro NJ ro 00 00 Vl LU o 00 fk 00 ca ro to o v l v l v l Ln Ln to ro LD cn to ro ro to ro ro ro ro ro ro to ro
h-l h-l
Hk

vl fi

Vsl vl 00 UJ ro Ln Hk NJ Ln Ln 00 to ro ro NJ ro ro ro h-l h-l

ro 3 to ro Ln Ln Ln ro ro NJ
h-k

ro
h-l

h-l

h-l

vl 00 LO Ln o V J Ln LU 00 ro ro to ro ro ro vl to
h-l h-l

vl 00 LO NJ O cn ro ro ro
h-k

LD v l f i LU h-l vl h-l to 01 00 VI to ro ro ro to to to
h-l h-l

vl vl LU LU Ol cn vl vl fi cn H-l vl NJ ro ro ro ro ro
h-l h-l

LO to VI Ln Ln LU h-l h-l 00 fk 00 LU ro fk Ln ro 00 3 to ro ro NJ to NJ to to ro
h-l

fk
U l

fi
UU

fk

fi

fi
UJ

fi

fi

fi

fi

LU LU LU LU UJ
h-l

P P LU P LU P P P P LU P P P LU P LU LU ca LD LD to cn cn cn 01 cn LU

In 3 P 3

h-l

h-l

h-l

fi 3

fk 3

P P p P p P U ro 00 00 00 00 00 00 U h-l h-l h-l ID VI ro O 00 00 00 v l un LU h-l ca f i Nl 3 h - l

ES

h-l

h-k

h-l

p o o P

VI v l UJ f i 00 cn 3 00 h-l 00 00 f i ro NJ to ro to ro 3 o

LU 00 Ln 00 3 LD 3 to ro ro

VI UJ fi 00 00 fi to Nl ro

vl vl Ul Ln f i 00 LD cn to cn f i h-l ro ro ro to to to

p o p p

LU v l 00 f i Ln Ln 00 00 NJ LU Ln U U Hi ro NJ NJ to ro to 3 ix P Ln LU fi h-l cn LU
h-l

Vl fk ro
h-l

00
h-l

NJ ro ro
f i

VI fk 01 v l 01 ID 3 LU h - l to NJ to to to ro

vl

cn Vsl

vl fk cn ro to 10 ro ro ro

vl vl UJ f i cn Ln h-l LD to LD cn LU ro to ro ro ro to
LU

vl LU CTI
Hk

I?
TJ

00
h-l

NJ ro to
LU

Ln Ln Ln Ln in Ln P tu f i io LO to io Vl v j
f i

to Ln cn cn cn Ln

f i

-o
ca. ca.

>

LU NJ ro ^ U U h-l O ca to 3 LO h-k h-l fk Ln f i J i Ln > TJ

22 22 2 2 2 2 2 22 2 22 222222 22 22 2 22 22 2 2 2 2 2
O
01


to O ro TJ ro h - l h - l Ln to o O Ln cn -0 > >

Ln Ln h - l Ln U U V s Ln ' h-l ro cn h - l Nl fk LD 00 3 o 00 o ca 3 00 h - l 00 00 00 LU o ro LU f i ca f i fk Ln ro ro Ln cn v j vJ UJ UJ 0 o > TJ D o U U ro Ln 3 00 UJ

Vl 00 ^ Vl h - l '. 3 00 o 00
h-l h-l h-l

cn
\ to fi ' 3 00
h-l

tn . to fi 3 00
h-l

LU UJ Ln LU '. \ ro ro ro ro p 3 00 h - l ^ 3 3 O 00 00 o 00 00 h - l h - l to v l H k H i LU ro o UJ cn VI un f i > > > >

VI ro O 00 00 Ln

>

cn

vl to 3 00 to to fi >

LU UJ h-l fi Nl LD V fi ro O 00 ^ o 00 h - l 00 01 ro LU f i ro U U to 00 Ln 0 > o

Vss h-l

UJ U U f i LU \ ^ Hk , to 00 00 LD LU 01 01 s h-l en 3 Vo h-l 3 3 h-l 00 00 00 3 3 00 3 h - l H-l h - l 00 h - l h - l 00 h - l ro o LD O to LU Ln f i Ln LU 3 f i UJ v l cn f i cn f i ro > > a > > > TS LU


h-l
V v h-l

LU LU

LU UJ Ul LU h-l UJ h-k h - l h-l \ ID o 00 o o O ca 00 00 00 00 h - l h-l 3 v l UJ LU h - l O LU o o Ul f i to Ln LU ro D > > > -o fi


V s

Ji to

UU
h-l

ID O 00 ro fi ro TJ

01 3 3 3^ CO

3D

'Z
o
CO vJ -vl -vl
h-l h-l h-l h-l h-l h-l h-l h-l h-l H-l h-l h-l h-l h-l h-l h-l h-l

m n
O

ro

Ln Ln Ln Ln Ln Ln Ln LU LU UJ LU LU LU ro ro un 00 v l Ln LU UJ h-l H I h-l 00 Ln A h-l 3 3 f i LU CTl h-l LU 3 3 Ln V j f i Ln Ln h-l 3 f i Ln h-l to NJ 01 f i 3 f i h-l v l LO V l f i LO Ln to v j to LO 00 f k 00 10 LO f i 01 00 00 Ln to V I 3 cn O to f i LU UJ CTl v l h-l LU Ln f i UJ h-l to ro ca v l cn to ro ro ro NJ NJ ro ro ro to ro ro ro ro ro h-l to 3 3 3 3 ro ro 3 ro 3 Ln 3 3 p 3 ro fi fi vl fi

ro Ul
3 3 to
h-l

h-l h-l

h-l h-l

h-l h-l

h-l h-l

h-l

h-l

h-l

h-l

h-l

h-l

h-l

h-l

h-l

h-k

h-l

h-l

h-l

LD 10 LO ID LD 00 h-l J i Ln 00

00 ID 3

ca
00 LO LO

to Ln v l
fi 00

ro to 00
to

Ln
UJ fk M

3 3 CTl CTl f i cn CTI Ln f i h-l v l 00 to Ln LO LD cn vl f i vl f i

o cn
h-l

3 UJ

3 LU
h-l

o LU
vl

3
fi vl vl

LD f i ro 10 v l to Ln UJ v l h-l Ul f i 3 3
00 ID
h-l h-l

ro ro ro Ol
00

o cn ca to
to vl to

3 to

n -c

7^

Ln
to
00 01

P p 3 Ln p P P v l f i 3 P t-1 h-l i-l LU P h-l h-l LU vl 00


LU

fi

fi

fi

h-l

i-l fi
Vj h-l

P h-l P fi
3

i-l
00

NJ

cn
LD 3

fi

cn

M 3 i-l vl 01

P
3 i-l

fk

vl

Nl

ro i - l
Ln v l

p P p Nl
fi

to Ln Ln

Ln Hk

bo 00

Ln p ro to o

to i-l
fi

3 i-l vl

io 3
h-l

h-l

i-l fi
h-l

b o fk
h-l

P h-l
h-l

ro h-l h-l ro ro ro to LD LD ro O 3 3 3 3
fi

to
NJ

P h-l
h-l

vj

ro

fi fi
h-l

p p In Ln p m h-l i - l
00
t-k

fi Nl
HI

fi

fi

h-l

CTl ID to 3 3

cn

s cn in cn

p P ro

oo

ro ro fi fi

i-l CTl to M LU
h-l

LD

fi p o if -il p h-l p i-l i-l fk M p io LU ro p LU in P f i p f i fk fk M 00 p p p to to M P p p P P p tn P p i-k p h-l M M 3 to p cn o ro LU h-l P LU LU 3 P 3 3 to P Ln Ln


h-l h-l h-l

P h-l

fi M

Ln
vj

P p i-l

to

to h-l to ro ro ro to ro ro 3 to ca 00 Ln to 00 p vl io P M UJ 00 Ln 00 Hk h-l bo h-l


LU

"O

>

ca.

CL

LO t o

ro

00

h-l

cn ^ h-l
LD

01

tn
h-l

CTI
h-l

h-l

cn
h-l

CTl CTl
h-l h-l

cn
h-l

01
h-l

O 00
h-l

to

cn > 2

00 v l cn cn cn LU 3 3 00 o 00 3 3 3 00 3 00 h-l h-l 00 00 o 00 00 00 f i h-l NJ to 01 3 o LU h-l f i ro h-l NJ Ln h-l i n O fi UJ LD to to v l ca Ln cn h-l to to Ln -o > > > -o o -o > -D > -0 -o 2 2 2 2 2 2 2 2 2 2 2 2

00

vj

>
LU 00 UJ 00

cn cn 01 cn h-l ^ h-l h-l Hk ro h-l h-l h-l cn to to 3 3 Vs. ca . 00 vl 00 OO 3 3 o 00 h-l 00 ^ h-l 00 01 h-l CTI t o fi

LO

3 CO h-l

cn cn s cn cn 01 V ^ 00 Ln to ^ Ln V 00 00 .O 3 ca V3v CO 00 o 00 00 3 00 00
h-l

CTl
Vs

cn
Vs

fi

fk

en
fi

cn

01

3 00
h-l h-l h-l

3 00
h-l h-l

f i Ln f i en h-l f k J i ca to V l > -o -o ^ -o o -o -o > > > > > > 13 TJ o> > > > 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

h-l 3 3 Ln ro

ca LU

cn

01

NJ

h-l Hk

h-l h-l h-l

o 00
LD

UJ v ^ LU ro ro Vv Vs 3 00 3 3 3 h-l 00 00 00 h-l ro v J Ln
h-l

cn cn

cn cn
to

to 3

o 00
to
UJ

00
h-l h-l h-l

cn ro cn cn ro ro ca 00 3 o 00 00
h-l

O
01

Ln Ln ro ro o LU LU o h-l Ln 10 00 to

Ln Ln

Ln ro


Ln Ln LU Ln cn
h-l h-l

o LU

ID

00

<

> n n

3 CL
c

-CJ

30 CD

LU 00

ro
01 3 LU

h-l

h-l

h-l

h-l

UJ

LU

ro
fi LU

h-l

h-l

vl

Ln LU Ln v l f i 00 to cn to v l cn LU LO LO 3 to NJ to to to N l
NJ
h-l

ro vl
3 LU
h-l

cn cn Ln to to v l V I v l v l 00 v l v l UJ v l Ln f k f i h-l ro ro f k LU LU UJ Ln en LU LU U l O CO 00 LU V I V I LU f i f i f i 00 v l f i h-l f i
CTI
fi vj
h-l

Ln
h-l

cn UJ
LU

LO fi

cn O LO LO

00

Nl
h-l

Ln N l to ro to ro to to to ro to ro NJ to
h-l h-l h-l h-l h-l

Ln 00 to 00 cn LD 3 00 LD ID to f i ro ro ro NJ ro ro to to to to ro ro ro ro ro to ro ro ro ro ro ro to ro to to t o ro to ro to 3 00 h-l
h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l

o LD vj

00

00

Vl

ro

00

00 00 01

01 00 vl

to

ro ro ro to ro
h-l h-l

Ln 3 LO LD f i LU Ln f i f i Ln LU ro NJ to ro NJ NJ ro N l NJ
HI

o ro
vl
h-l

00 vl 3 3 CO LU N l ro ro M NJ M
HI

v l vj vl vl Ln LU LU f i fi 01 LO
HI

00 fi

h-l

vj LU 00

VI

cn 3
Ln
NJ

vl LU fi 01 00

Ul 3
h-l

ro UJ
fi LD

vl 00
HI h-l

UJ 3

O UJ
Nl Nl NJ
h-l

3 fi
h-l

Nl

ro
to
HI

Ln to ro ro ro to N l ro ro ro ro ro ro ro ro ro ro to ro ro ro to
NJ
h-l h-l h-l h-l h-l h-l h-l h-l

en LD Ln to
vl

vl

Ln v l
3 LU NJ NJ

Ln h-l Ln 00
3

Ln

II
>
CL CL

h-l

HI

h-k

fk
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l vj h-l

fi
h-l

Ji
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fk
Hk

fi
h-l

fi
h-l

fi
h-l

fk
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-l

fi
h-k

fk
h-l

fi
h-l

00

vl LD

vl VI

vl

vl

O ro

vl
Hk

vl
h-l

vl
h-l

vl
h-l

vl
h-l

vJ
h-l

vl
Hk

Vl
t-k

Vl
h-l

vl 3

vl 3

vl 3

vl

01 00

cn vl

CTl 3 3

cn cn 3

Ln cn Ln 01 ro

fi 00

fk

cn

fk fi

fk
h-l

fi
h-l

fi
h-l

LU

to

h-l h-l

LU
h-l

Ul
h-l

LU 00

LU UJ
h-l h-l

fi

LU
h-l

LU 10 fi
h-l

3
NJ fi

LU

LU fi fi

LU

a\
h-l h-l

LU
h-l h-l

-V h-l

LU

LU
h-l

Ln 00

cn
h-l

LU fi

o 10 to O to o ro 3 h-l to v l to O 3 h-l ro o ro ro h-l h-l ro to Ln f i ro LU Ln Ln Ln t-1 LU f i Hk h-l f i Ln f k to to LU o O ro ro Ln o h-l 00 ro Ln v l LU LU 00 LU f i v l 00 3 f i LU 3 vl 3 CTl h-l LU 01 NJ f i fi J i to cn o o cn C J > > > -o 13 TJ -CJ -0 -o -o > > > > > > -o TJ > 13 > > > > 13 > -o > > -o > -o 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
to Ln v l O Ln
00 LD fi

ca

cn cn cn en Ln Ln ro ro . ro h-l ro ro 00 Ln 00 ro ro vl v l O ca tn ca h-l s v^ o V o 3 O to O 3 o O 00 00 o 00
h-l h-l

' . h-l ' h-l


Vs

CTl
h-l

00

00 00

ro h-l
3 00
h-l

en
to

fi

UJ
h-l

LU

00

to 00
10
h-l

o 00

3 00
h-l h-l

\ cn 3
h-l

3 00
Hk h-l

00

NJ NJ 00 TJ

h-l

Hk

00 fi

00 fi

00 fi

h-l

h-l h-l

00 00 o ca o h-l
h-l

cn
3 00

00
h-l h-l

LD 3 00
h-l h-l

00 00

ro Ln fi
3 00
h-l

to

to

\ h-l
h-l

NJ
h-l

fi

Ln
h-l

o o 00

o 00
h-l h-l

00
h-l

3 00

v l to to v ^
3 00 3 00 00

00
h-l

h-l

ZD
OJ

01 3 3 3' CO

'I
o
CO
h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-k h-l h-l h-l h-l h-l
HI

m
n O

3D

h-k

h-l

h-l

h-l

h-l

vl
-vl -vl

to to Ln Ln LU UJ

ro ro

to 10 to to to Ln Ln Ln Ln Ln Ln Ln LU LU NJ h-l h-l h-k O 00 01 LU ro UJ 00 f i h-l to Hk ro h-l f i V I to ro 3 h-l 00 Ol ca f i o 00 to f k 00 to h-l ro to h-l to to to ro ro N l LU to ro to t o pl LU 00 ro ro ro ro to ro ro 00 NJ ro ro ro N


h-l

LD LD 10 to ID Ln Ln Ln Ln Ln UU LU LU UJ UJ 01 cn Ln f i LU NJ o f i 00 f i Ln h-l Vsl 3 LU ro ro t o to NJ to to NJ ro ro
h-k h-l h-l h-l h-l

ID

LO

to U to to to Ln l Ln Ln 3 O ca o ID cn f i f i f i vJ v j 3 LD v l v l cn t o NJ N l to ro to to ro ro ro N l to
Hk

fi

h-l

h-l

ji

h-l

Hk

h-l

h-l

to ro Ln j i 00 to 00 00 L O L O fi N l 00 NJ h-l f k to P f i cn Ln 3 ro Ln O in h-l vl ca to h-l 3


NJ 00 00 00 LD 00

Ln to

ro to

P P L n p LU P v l to to
00

to
M

io o

j v j v l cn cn to to 00 00 v fi ro ro 3 Ln Ln 00 00 00 Ln 00 00 h-l LD ID LO Ln Ln en 00 LO o h-l O o J i to Ln Ln ro LU f i Ln v l Ln 3 -vl f i Ln ro vl UJ ro CTI f i V j 00 cn h-l Ln h-l h-l h-l ro h-l h-l t o ro ro ro f i f i f i ro f i to ro ro t o ro h-l h-l h-l f i h-l p to ro NJ NJ h-l h-l h-l M io M io M P h-l h-l h-l H i to LO to ro ro NJ oo to h-l h-l h-l h-l h-l o 3 o ro p if -il f i vl P fi p Ln L o O Hk v l v j v j f i o n VI P Vj ca c In a h-l h-l NJ NJ 00 ro ro v l v l VI vj ID

O l cn Ln cn cn cn f i LU LU 3 00 00 Ln Ln o to LD CTl k LU vJ cn LU cn f k en h-l cn f i to f to 00 LO LO UJ LD NJ

-<

7^ ID

to
NJ
h-l h-l

h-l LU

h-l

LU

Nl 3
Vsl

Nl

bo bo to t o f i f i fi p i - l to to i-l p p Ln Ln vj p P P P Hk A A 00 00

p p UU UU

ca vl

to to

P -o 3 > p ca. LU CL P LU
3

Vl NJ 00
Hk h-l

Vs

VI

vl
Nl

ro
3 00
h-l h-l

o
fi

3 00
h-l h-l

v j V l vl vl V I ro NJ NJ ro vl to V s V s to to O O O 3 3 -V ca 00 00 00 00 OO 00 3
h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-k h-l

vl

O vj NJ

^ 3
00

00

vl ro to v ^ to ro ro ~ v 3 \ 3 3 o 3
00 00 00 00 00 00 LU ro CTI f i 00 00

vl

vJ

vl

vj to

vl

Vj

vl

cn
LU

en cn

CTl
to fi

to

> .
o vl 8 Ln > > > > > > > > > > > > > > > > > > > >
h-l

LU

LU 3

ro to to h-l cn Ln 3 ro

3 fi

to to Ln to Ln 00 f i cn

00 00

3 3 00 00 vl vl

h-l . h-l 3 ' .3 3 3

, ro ro
vl
Vs

vl

O 3 3 00 00 00
h-l h-l h-l

cn 01 cn to ro f i f i ro o 3
00
h-l h-l

3 3 00
h-l

o 00
h-l h-l

ro A

Ln Ln to v l Ln

00 LU UJ

00 LU NJ vl

00

3 00

cn 01 cn cn tn h-l h-l . O h-l N l to ro LD to to 01 o V s o 3 3 3 ^ 00 00 00


01

3 00

o 00 o 00

h-l

h-l

Hk

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 S 2 <: 2 2 2 2

cn O 3 to Ln J i 3 O ro o f k UJ ro to 3 h-l ro 3 Ln UU U l to LU Ln Ln v l Ln cn 00 t o Ln f i ID LD v j h-l C J > > > > to TJ -0 > > > > > >
h-l

< i5'

S
o n n -o o ca. c n
3J DO 3D 3 00 m

>

vl fi

vj LU

f i cn cn to 00 00 LU V I Ln cn cn cn 3 LU v l Ln 01 cn f i UU vl vl O 00 Ln vl LO LU ro CTI vj V I 00 f i LU 3 to f i CTl CO LU h-l 00 00 Ln vl o ro to to NJ to to N l ro ro ro ro t o ro ro ro ro t o to ro ro ro ro NJ NJ NJ to ro NJ t o ro to ro NJ NJ ro NJ ro ro ro NJ ro ro N l to to t o ro ro ro ro ro

ro Ln LU 00

vl UJ 00

vl LU

vj LU fi

vl LU fi

Vj

fi

vl vl UU cn LU f i 01 01 VI 3 to
vj

LU 00

Ul 00

ro
LU vl fk NJ vj vj

Ln Ln VI v l

Ln cn LU o LD 3

ro cn h-l

vj UJ

VI LU

vl LU

h-l

h-l

h-k

Hk

H-l

Hk

H-l

h-l

H-l

cn Ln LU Ln ro VI 3 h-k v l 00 vl to ro ro ro ro ro ro ro to
H-l H-l h-l

vl LU 00

VI LU

cn ro 00
LU

ro ro to
H-l

ro to ro f i vl ro LD 00 H-l h-l 00 L O Vsl 00 Ln LU cn Ln H-l vJ 3 ro N l NJ NJ ro NJ ro ro N l


H-l H-l H-l

NJ vj
H-l

LU

00

to Ln Ln H-l

Ln
00 LU vj

VI fi

cn 00
LU

o ro ro ro ro ro to ro ro ro ro
h-l H-l

Ln cn cn cn to 3 f i h-l o NJ f k h-l f i Ln Ln to LU h-l to f i cn ro ro ro to NJ ro ro to to to to to to to to ro to NJ ro to to


H-l h-l h-l h-l H-l H-l h-l

vj LU 00 CTI ID

vl LU 00

LU 3
h-l

n 3 O cn Q. h-l
vl vj UU LU cn f i VI Ul vl LU vj

00

^ m iu < p

H-l

h-l

h-l

h-l

h-k

h-l

h-l

H-l

H-l

LD L O 00 O to to to to C cn ro t o t o ro NJ ro to 10 h-l h-l h-k h-l H-l H-l H-l ro ro to vJ f i Ln Ln Ln Ln Ln Ln V I v j f i LU ID to I D 00 v l cn

o fo i

00
LU

00
UJ

vl vl en
H-l
LU

Vl
h-l
LU h-l

tn Ln o
01 vl
h-l

01 00

00

cn

LU

Ol

to ro

cn

cn

Ol en cn Ln Ln Ln Ln Ln Ln Ln 3 3 o o v l t o H-l h-l h-l H-l h-l CTl CTl H-l H-l f i en Vsl v l f i f i f i CTI CTI ID ID Ln U l h-l

c n

Ln

fi 00

fi
h-l

fi
h-l

A
h-l

fk 00
TJ

O to to to Ln

00

00

00 A

>
CL

a.

LU LU IO LU
h-l

UJ
Vs

LU
h-l

LU LU V s
h-l

LU fi LU LU LU LD v^ h-l NJ fi

fi
Hk

LU
h-l

h-l

LU fk
H-l

LU

LU UU ID

c n o 00
TJ

ID

ro 3 fi
Vv

00 v^

00

O 00

ca 00

00
h-l

3 00

o 00

en 00 > O 3 00 00
h-l h-l

ro ID to O to to o ro Ln J i C O LU ro Ln O LD LU 00 to 00 LO

NJ 00

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 <: 2

> > > > > > >

ro to h-l Hk ^ h-l H-l H-l h-l to h-l ro ro ro to V l 10 Ln Ln Ln f k o to LD 00 f i ID C CTI cn O Vv o 3 00 o h-l Hk 0 00 3 3 3 C O 3 C O o 3 00 00 3 0 00 00 h-l to h-l ^ 00 00 00 o 00 00 00 to ^ to Ln LU to h-l UJ f i NJ Ln h-l Ln cn to un UJ H-l LU ro LU ro 3 Ln LU H-l LU Hk LU h-l to O LU LU LU C Ln O 3 h-l V I vl 3 f i f i Ln to CTI vJ 00 cn h-l to h-l CO -o TJ TJ -0 -0 -o -o TJ > TJ -a > TJ -CJ TJ TJ -o
UJ LU 00

LU

LU

LU UU
h-k
V.S

to C O

Ol
h-l

\ to ' . ro H-l fk f i
3 00
HI

o H-l
H-l

^ o a 00 00 c
h-l

to

00

to
NJ fk
h-l

o ca 00 00 ca ca 00 00
to
UU

to

o o o fi HI v l f i ro > > TJ >


NJ

3 O

to to to C J > C J

fo

H-l

LU 3 TJ

O 00 VI LU

to

>
o
01

OJ 3 3 3^ CO

'o o

n n
NJ 3 Nl 3 Nl

JO

CO vJ vJ vl M CO

Ln Ln LD 00 3 Ln f i Ln 00 00
h-l h-l

ca Ln
00 3 fi
h-l

T5

fi 00 i-k

fi

ro Ln fi ro Ln 3
ID
00

P Ln

P p p P P p t o P P P Lu 00 CO 00 00 P 00 p 00 i - l io V l j Ln P 00 v Ln f i h-l f i vl
io cn Ln v l
h-l

h-l

bo
fi

fi

ro
i-l

cn Hk

P cn

P h-l P h-l p p h-l to P ro P P ro f i 00 p p f i Lu P i-k f i f i CO Ln 3


C O
UJ 01

z z

z z

Ul 00

ro ro P ro

ZZ

ZZ

z z

to 3 Ln vl to 3 in NJ to

ro ro h-l h-l I D ID 0 3 3 f i vl vl in Ln Ln Ln h-l 01 Ln cn cn Ln Ln h-l 00 v l UJ f i Ln t o 3 1 0 Ln LO LD 3 h-l v l o v l cn U l ro 00 LO LU 00 H-l t o ro t o ro N J ro NJ t o p t o ro p t o P 3 ro p fi P fk p P P P i l HI h-l Hk ro H I h-l P


to

ro ro
3

3 Ln vl

3 Ln VI 3 vj

NJ 3

NJ

h-l

h-l

h-l

h-l

h-l

h-l

H-l

h-l

h-l

h-l

h-l

h-l

HI

Hk

h-l

h-l

LO to vl fi fi IO 00 h-l CTl t o LD r o ro ro

I D LD LO to LD vl vl vl vj O LU LU LU LU LU v j LU N l t o h-l f i t o LO LO Ln Ln IO v l J i t-1 NJ ro h-l Hk to fk f i 00 00 f i M

LO t o vl Vj

p P p
ro

HI

h-k

cn cn Ln

cn cn cn

i-l 3 vl

P p P P 00 00 00 Lu 00
i-l
fi LD

NJ

to vl ro ro ro V j vl H-l h-l cn Ln UJ Ln v l ro ro t o to p P io
h-l h-l

in 3

i-l 3 10

00 i-l

to LO LD 10 ID t o Ln Ln Ln Ln Ln Ln un Ln cn Ln Ln f i f k f i N l NJ 00 Ln f i cn 00 t o h-l 0 01 10 Nl ro h-l Ln LO h-l 3 UJ 00 NJ v j ro NJ ro v l M P LU P ro fi P p HI f i p h-l i l p P P h-l p p t-1 f i io p


00 LU 00

ID

to Ln fi LU 3 ID cn N J cn ro ro to ro P P ro f i P
ID in fi UJ fk
h-l

to Ln fk

m <

TC

i-l

00

00

io
HI

Ln vl

P P

fi

cn Ln to vl

P p vl
h-l

P P

t-1

-o
CL

>

00

Ln ro

ca.

Ln
vl

vl vj VI vj vj vl

Vl VI

vl VI

Vl

vj

vl

vj vj vl

vj
v^ 3
00
HI

o
3 00
H-l

3 00 UU Ul fi

3 00
h-l

3 00
h-l

3 00
h-l

O 0 v j Vs 3 3 3 00 00 00
h-l
HI

3 00
h-l

01
3 00

Vs

vj ~v LU

VI LU

vl UJ

vl UJ

VI UJ

o vj
UJ

3 00
h-l

3 00
h-l

3
00
h-l

Vs

vl v^ LU LU 00
H-l

vl
UJ vl LU vj UJ
v^

vj

Vl to

vl NJ

vl NJ

vl

vl
LU

VI

tJ
01

V.

NJ

3 00
HI

3 00
h-l h-l

3 00
h-l

3 00
h-l

3 00
h-l

ro ro
3 00 to 3 fi
t-1

to

ro
3

-o

LU Ln TJ

UJ fi

NJ LU
vj

to LU

ro ro
NJ IO

ro
C J

ca LO

to 3 UJ

HI h-l

3
LU 3

LU vl

-n

-0

-a TJ TJ

2 2

2 22 22 2

> > 2 2

cn NJ LU Ln fk to C J TJ

to LU vl

ro
UJ fi -0

to LU

3
fi 3

C J C J 13 -o > > > > > > > a -a 13 -0 -0 -o 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 <:


0

ro Ln TJ >

3 UJ fi

UJ fi

ca

3
h-l

3 00 ID

3 00

to
fk 00

Ln

CO 3

3 3 OO 00 UU to 3 3 LU h-l

3 '3 O O 00
H-l h-l

3 00
to Ln

^ 00
h-l

3 00
h-l

3 00
h-l

oo
h-l

3 00
to 3 LU

ro
LU

ro
LU

00

ro cn

to LU LU

NJ 00

NJ
t-1

ri'

<

00

S
> n n
CL C o 3J 03

"O

3" ^
H-l

to
h-l h-l

h-l

LD

cn to ID UJ h-l h-l cn f i Ln LU 3 00 00 ro h-l h-l LO t o 00 00 to Ln CO cn cn Ln v l 00 3 00 Ln t o ro ro ro t o ro NJ t o ro ro ro ro ro NJ t o ro NJ t o NJ ro NJ t o ro t o ro t o ro NJ NJ ro ro ro t o t o IO N l NJ ro ro t o N l


NJ
H-l

Ln fi

ID Ln fi 00 3 3 to

to LU

NJ 3 Ln vl to 3

NJ

ro 00

to LU fi CTI 3

NJ 3

Nl 3 LD

to 3 LO

h-l

h-l

h-l

h-l

h-l

to

ro
3 O IO to ID 3 NJ

h-l

ro
to 00 fi
H-l vj

h-l

t-1

to LO LD ID to ro Ln Ln Ln Ln V l cn f i f i LU f k f i cn 3 LU f i 00 ro cn t o LD cn 00 cn LU h-l N l NJ 3 UJ v j
to to NJ
h-l

ID 00 00 NJ Nl

Ln Ln LU LU o ro
Nl

fi VI
h-l h-l

to vj ro
h-l

ID vj LU
h-l

h-l t o LO 3 vj vj t o in O 3

S
ID O UU vl fi Ln

CL h-l

cn
to to

NJ to

ro
NJ

CTl Ln h-l ro v j h-l Ln 00 t o NJ t o t o ro NJ t o ro


h-l h-l h-l h-l

< -s

ro
to
h-l

00

00

CO 00 i-l V I cn h-l t o

p p H-l p h-l p to P p P P 00 P 00 00 00 00 P 00 P i-k P p P p p p O l cn cn Ln Ln Ln t o CO cn O Ln v l -o


HI

ro

ro ro ro ro ro ro ro ro
00 00

h-l

00

p P 00

h-l

h-l

to 00

CO

p i-l P p Ln Ln Ln Ln v l vsj o N l

M p p h-l p P ro P P 00 00 00 00 CO 00 CO P p P P p P P Ln Ln f i f i f i Hk h-l
H-l h-l

00

00

vl

h-l

3 C O 3 ID v l
fi

CO 00

p o o LU LU
>
CL CL

vl Vl to vj
h-l

00 ID

ro 3 00
h-l

to
C O CO
HI

\ o 00
h-l
HI

ro to

-Vv

to o 00 , vl '
h-l
Hk

vl
-V h-l

VI
h-l

VI vj
h-l

vl

vl to

vj
Vs.

vj LU
V.

00 vl
H-l

vj
h-l

VI fi vl

Vl

vl UJ

^ 3

13 00

ro ro NJ LU ro Ln
LU NJ

TJ TJ TJ

00 H I CTl t o f k LU UJ LU 00 vl 00 -o TJ -0

to ro 3 O 00 00

Vl

00 00 h-l HI f i CTl ro 3 h-l f i f i 3 o t o 00 Ln h-l LU -0 TJ TJ 13 TJ TJ

\ 3 \ 3

cn

CTI

^ ro
3 00 UJ 3

NJ

3 00

3 00

3 00
h-l

ro Vs. 3 00
HI HI

3 00
h-l

00 ro ^ v. O 3 00 00

ro h-l 3 3 00 00
h-l h-l h-l h-l

vl
LU LU 00

. LU
3 00
h-l

O 00
ID

O 00
H-l

^ 00

3 00
h-l

3 00
h-l h-l

cn

to
HI

ro
3

to LU TJ

00 TJ

Ln ro cn
-0

cn cn
UJ 00 -0

fi

Ln

NJ 3

fk
HI

22 2 22 2 2 22 2 222 222 2 2 22 2 2 2 2

>

> >

C J

^
UJ VI

LO fi OO 00

o
h-l

h-l

3 Ln

> > > > >

O OJ

01 3 3 3^ CO

30

'o
O CO

m
ro t o t o NJ NJ NJ t o ro 3 3 3 C O C O C O 3 3 00 00 00 00 00 - v j v l v l to C LD I D ro ro O C O to f i ro h-l 00 C to O LU UJ ro t o ro ro UJ 00 CTl NJ NJ Ln t o LD f k 3 3 Ln h-l t o 00 h-k Ln t o 3 ro
3 00 00
NJ 3 00 00 00 to to 3 00 00 vj

vl
~vl ~vl

ro
-ti

p P fi P
i-k

p to P Nl f i t o h-l P h-l io P P LD 00 P fi
O vl
Ln

h-l

UJ fk

Ln HI A
Vl

cn 10 NJ p p p ro p p p v j v l -vl p t p p p p p p io o p P P p P P P P p P io io P io p fi f i f i f i f i to fk f i f i fi fi fi fi fi fi fi fi fi fi fi fi fi fi fi P P P Hk t o t o p p io P p P P p P P P P p P io p P P io P P P P h-k P P P h-k H k h-k h-k i - l i-k i-k i - l 00 t-1 i - l i - l h-l h-l h-l h-l h-l h-l h-k h-k h-k h-k h-k H I 00 00 00 i-l P P fk C O in io 00 LU h-k Ln
LU vl vl vj vj

ro 3 vj LD ro LU

ro 3 vl LO to

to 3 vl LD
h-l

ro Ln

00 VI

3 Vj to to h-l h-l to 3 h-l h-l

to 3 VI

to

ro ro
3 3 vl vl ID LO 3 3 ID 00 00 LU

NJ

3 vj
00 ID fi fi vl

to 3 00 10 fk to

to

NJ

NJ

0 00

3 C O C O vl vl vl
00 v l f i 00 v l 10 to LU vj vj

00 Ln VI

NJ CO vl vl vl UU

10 CO vl vl fi

ro ro ro 10 C O C O C O C O C O vl vl vl vj vl
NJ vl
h-k

Ln C O ro

ro ro ro C O C O 3 01 cn C cn vj vl 10 3 Ln O cn cn UU t o fi C O C O in C O ca 10 h-k to 10 C fi 3 O ro Hk C O cn A 00 Ln UU to v l v l v l v j NJ ro v j ro P p P p 10 NJ p ro
NJ

ca -vl

m <

TC

fi

io
i-k

-CT P NJ p : p CL 00 p Ln

vl Vl
h-l

vj
-Vs

vj HI fk

vl HI
h-l

vl

Vl

vl
Vv

-vl
Vs.

-vl

vl Vl
Vv

-vl

vl

vj

vl

vj

vj

vj

vj 00

vl 00

O Vl

VI 00

Ji

fk

3 3 3 00 OO 00 01 Ln LU LU 3 f i
vj

3 O 3 00 o 00
to HI
h-l h-l

3 3 00

to to 00 00 CO Vss 3 C O C O 00 . 3 00 00 ^ 00 00
vj
h-l h-l

CO 00

. 00 ^ 00
Vs

^ CO ^ 00
Ln Ln
fi LU to fi

3 00
fi

^ CO
fk

3 3 "3 00 00 00

v ' . 00 00 00 V00 00 00 00 oo ' .3 3 . . 3 . 3 C O C O 00 00 00 ^ 00 00 ca 00 00 00

VJ

VI

VI

vj

vj

vj

vj

-0

00

00

OO 00

vj 00

v l VI Vs V v vj vl
Vs

01

C O 00 C O 00 C O 00 C O 00 C O 00
h-k h-k h-k
Hk

C O C O 00

o 2 2 2 2 22 2 2 2 2 2 2 22 22 22 22 2 2 222 2 2 2 2 2 2 22 2

TJ

ID -0

ID "0

to 10 00 00 3 Ln f i Ln h-k Ln ro UJ h-k 10 h-k TJ > > TJ ^ TJ

LU 00 -0

cn

Ln C O 3 LU TJ TJ TJ o

UU LU LU LU f k f i UU ro UJ h-l 00 f i C T -0 TJ -0 -

LU to fi -0

UJ

ro ro NJ C O cn f i h-l f i Ln f i NJ C O Ln Ln h-k h-k H i Ln LU Ln LU cn LU NJ LU to C O v j NJ v j ro 00 C T C T C T C T 13 C TC J C TC TC T ^ -0 TJ ro


h-k h-k
Hk

H-k

10

O 00 fi NJ 00

<
m

n 3

B
CT

CL

c
3D 03

? g
h-l h-l

NJ
h-l

ID

to Ln Ln 3 3
10
H-l

fi vl

NJ 00 00
h-l

to HI to
Hk h-l

h-l

h-l

to Ln
3 LD 3 ID

LD Ln

00 NJ Hk

vl cn ro O cn ro ro ro ro ro ro NJ ro ro ro ro ro t o t o t o NJ t o NJ NJ ro ro ro ro ro ro ro t o N l t o t o t o t o ro N l ro ro t o ro ro ro N l

fi to

cn
fi vl

h-l 10 Ln 3 fi vj vj

h-k

h-l

LU
h-l

10

Ln LU

to Ln
UJ LU fi LU

00

cn 3 Hk
HI

to LU LO

cn t o

3 fi ro 00

VI fi
h-l h-l

ro ro cn O Ln Ln to h-l CTl UJ
h-l

LO
h-l

h-l

h-l

fi

3 fi

LU

ro 01
NJ NJ NJ

LU 00 Ln vl 00 00

to

ro
vj Ln

to

to

ro cn LU
vl

Ln
to to NJ

o fk
to Nl to h-l LU HI

cn 3
ro h-l
to to NJ

vl LU vl

cn 00 cn cn cn h-l h-l cn VI
00 00

Ln
to to NJ

cn h-l

to 00
to NJ NJ

cn LD cn Ln cn Ln cn cn Ln Ln Ln Ln Ln 01 fi cn cn cn cn cn h-l HI h-l h-l h-l 3 3 h-l vl LU t o t o t o t o LU ro ro


to to
h-l h-l

to 01

to

to

NJ

to

ro

Hk

to 3 in

to 3 00

h-l

h-l

h-l

LO

Ln
NJ to to h-l

to

ro ro

ro

ID
h-l

p bo P P P p p P P 00 to to p h-l O 3 o 3 o bo b o P o 3 H-l fi

h-l

Hk

Hi

h-l

h-l

h-l

h-l

h-l p p p p p p p p p p p p h-l ijj In P UJ P P UU UJ P HI p p p P P p p p p p P p P to ID to ID P p P i - l P P P p P P P P P P P in h-l LD 00 o LU 3 Ln 3 ro h-l 3 3 3 3 3 3 3


fi

to to NJ t o H-l h-l Ul

00 to Nl to

LU NJ NJ to

to

3 ro ro N l ro
to to

to Ln f i f i LU Ln LU h-l 3 to Ln O to to to Hk to to to
h-l

Ln LU

to vj
fi LO
H-l

LO

Ln LU
to to fk to

to

ii
-o

to to to h-l

to

ro ro ro ro ro ro ro
h-l
h-l

p
Ln

LD

00

h-l

LU

ID

ID

to

lO

U3

to

LO

to to to In f i f i v l Ln

p p P P
00

g
CL

LU vj vl v l Vs. "v. to ro t o Ln ro ro V. 3 3 3 3 00 00 00 00 00 v l v l t o t o Ln f k UJ LO f i vl vl

ro

vl
h-l h-l h-l

o V. ^ NJ NJ
Vs

Vj

vj to

Vj -V

3 UJ 3 o v l f i fk to cn > 0> > > 13 > > > > TJ > > > > > 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 3 10
h-l

3 00 00 to fk

3 00
00

3 00 vj

h-l V I LU 00 f k Vv t o LU Ln o Vs v vl to V s h-l t o. cn h-l NJ LU H-l h-l ^ ro ' o h-l ro LU Ln ro 3 Ln t o en o -V 3 3 3 3 O 00 CO ^ 00 00 to 3 3 3 ^ 3 3 3 h-l ' 3 10 00 00 00 LO 00 00

h-l 3 \ 3
ID
h-l h-l

NJ

.
Ln to
to

h-l H-l to 01

H-l h-l

LU h-l h-l 00 f i LU N l LU v l Ln 00 01 C T T) C T

Ln Ln 3 TJ

3 h-l Ln t o f i 3 fo to 3 LU Ln ro Ln v j V I 3 N l C T TJ TJ > C T

Nl LU LU

to ID
LO Ol f k h-l LU 00

v.. ^ LU LU LU LU. t o v l 3 N l LU to Vs fk 3 C O 3 ca 3 v ^ ca 3 O 3 3 O 3 3 O C O^ 3 10 3 C O 3 CO 00 00 00 00 00 ID LD
LU UJ

h-l Vv

h-l

h-l

vl

VI
h-l

vj

vl

VI

to ID Ln Ln Ln Ln Ln h-l 3 t o Ln f k f k f k f i Ln UJ H-l 3 00 J i f i LU cn 3 Ln TJ C TC T TJ TJ TJ ^ > -a

h-l

ro

h-l

13
01

OJ 3 3 3' CO 30 C O

'o o

ro cn

CO -vl -vl -vl

P
H-l H-l

fk

i-k P P i - l v l fk LU LU h-l Hk ID 00 00 H-l

CO Ul

Tf

bo p

NJ to LU LU LU v l cn 01 h-l 01 Ln VI UJ v l Hk Ln LD to cn f i ro to ro 3 ro to VI P M

ro

ro ro ro NJ ro U U U U LU Ul LU LU f i UJ LU ro en Ln 01 Ln LU v l ro Nl h-l LU o ro t u v l to H-l Hk cn t o UJ to f i 00 cn LU t o Hk ro NJ to h-k h-k LD o to ro LU f i io fk 00 00 p p h-l H-l H-l f i i-k p P h-l M LU p io Ln Ln P j i H-l 00 ro 00 fi A 00 h-l i-l M i-k H i LU i-k Ln LD v l 01 cn p 00 UJ LU h-l v l NJ LD NJ Ln fi

ro

to ro ro to ro ro LU LU UJ ro ro to to NJ 3 LD 00 00 H-l Hk LO H-l LD 3 00 00 LU v j ro 00 IO 01 Ln H-l ro f i to Ln Hk v l 3 H-l h-l p ro NJ p to 10 io p p ro 00 00 io f i to io f i Hk M ro M H i h-k io 3 0 P p io Ln 00 P i-l P vl p LU f i Ol Ln Ln NJ UU NJ Vl Ln C O Ln Nl 10


h-l h-l H-l H-l

ro ro to ro ro ro ro to h-l H-l h-l H-l h-l ro Ln vj vj to ro ro en cn cn f i U J H-l LU to H-l to 00 00 VI Ln 00 o 3 3 00 00 ro 3 H-l f k v l 00 f i 00 h-l o LU vl f k cn H-l UJ to to 00 v j to ro ro NJ to to H-l H-l NJ to o ro M to f l f i ro p M M v l P P f i p p ro t-k H-l bo H-l h-l io io h-l ro P p p i - l Ln Ln Ln p Hk H-l 00 Ln 00 LU M M P
to ro NJ NJ

to
h-l

ro ro ro ro
3 3 C O ID to LD LU LU ro h-l ca Ln LD ro ro to cn cn 3 -vl ro to ro ro
H-l h-l

ro H-l
H-l

fi

ro Ln

ro ro M p ro ro ro io ro P io io h-l H-l H-l H-l H-l p ro Ln ro to


C O i-l 01 ID to
vj

ro 3 LD ro Ln Ln Ln NJ

ro
3 to

to NJ C O C O 10 10
h-k h-k

<

CL 7=

p P H-l
H-l

H-l

00 C O 00 fk 00 to ro ro p to P
Hk

ro fi

00 00 Ln
10

to

io
Hk 10

TJ CL

p P P P h-l Ln H-l

LO

ro

>

fi

fi

en

vl VI 01

P Ln Ln Ln UJ to vj vj LU

00 00

ca.

10

00 ID to H-l to ID O O 3 3 C O 00 00 00 Hk h-l f i o f i UU vl C O vl TJ > C T to to Ln C O 00 Ln Ln 10 Ln Vv. C O 00 LU


h-k

00 M 00
H-l H-l

vl 00
h-l Vsl

Vl v l

vl l .Vv v h-l vl
h-k

to

10 LD LD

NJ \ f i ro ro 3 , 3 00 00 UJ cn UJ LU ro 00 C T TJ

ro ro

ro o C T > > > > 2 2 2 222 2 22 22 2 22 22 22222 22 22 22 2 2 2 22 2 2

Ln to 3 3 3 00 00 00 h-l ro LU 3 3 LU Ln 3 to 00 C T > >

H-l

to U U O 00 to to

vj vl C T C T -

00 C O C O 00 Vv h-l h-k M 00 . ro UJ 3 to Ln ro 0 0 00 3 ^ O 3 C O H-l O O 00 00 00 ID H I UJ f i to 01 H-l LU LU LU to Ln 00 cn h-l 00 Ln cn C T -0 TJ > > T3 to

ro

3 o 3 3 00 00 00 3 00 h-l H-l 00 f i H-l t-1 ro LU LU f i ro Ln Ul vJ ID ca O f i TJ > > TJ D

ro

ro

Hk h-l

LU
h-l

vl ro Ln 3 00 ID fi
h-k

vl NJ ro Ul Ln \ 3 3 00 00 00 v j NJ f i v j cn

vl

Vj

to to Vs 3 00 ro LU to C T

NJ
h-l

vl VI
Hk

h-l

Vl 3 00 3 C O NJ Ln to NJ h-l Ln " C T C T

-vl C O 00 fi
h-l

v l Vl h-k cn C O 3 3 00 00 00 CO 00 NJ NJ O cn UJ f i H-l 3 C O ro cn 00 C T " C T > TJ

h-l Vj

h-l

O
01

cn
C O 00 01 fi in C T

<
i o
n>'

> n n TJ o CL
c n
3D 03 3D

m
CL

00
H-l

to ro 3 v l v j UJ v l o ro o o NJ to to Ln LU cn v l 01 Ln Ln un H-l 00 Ln Ln f i ro Hk C O 00 Ul v l 00 v l 00 LU O Ln v l LO 00 v l CTl cn fk to v l f k CTl to ro ro NJ ro ro NJ to to to ro ro ro to NJ to to to ro to to NJ ro ro


h-l H-l H-l
Hk

LU 00 to to to vl
Hi

UJ vl LU 00 Ln vl UJ Ln VI to Ln VI v l Ln f i U U cn f i cn 3 h-l o Ol NJ ro ro ro to to ro NJ NJ NJ to NJ to ro ro to vj LU Ln f i H-l v l Ln O fi

ro
vl fi LU Ln Ln to

ro 00

H-l

ID to ID vl to H-l Hk H-l 01 * 00 to ro ro cn M

h-l ID

H-l

h-l

H-l vj

h-l

H-l UJ

H-l LU h-l

cn fi to ro ro ro ro ro HI H-l
H-l

h-l

h-l

HI

H-l

h-l

LU

ro H-l
fi

p p P P P i - l i - l i-l
ro Hk
Ln i n Ln

fk

o M

3
H-l

ro to O ro ro h-l
H-l H-l h-l

to

lo lo
Ln to

P 00
h-l

O ca iu 00 ro

i-l P h-l ro
vl

i j i cn LD 10

ro ro ro ro ro ro ro to ro h-l Hk H-l h-l P P io io ijo P in in H-l h-l ro ro

3 00 v l LD 3 v l ro LU to Ln to ro LO 10 Ln v l ID 3 to ro to

vl Ji vl

cn o vl
to
h-l

ro ro

H-l

vl fi Ln cn 00 cn 3 vl Ln Ln to ro to ro ro ro
Vsl

fk

H-l

H-l

LU LU v l VI v l un LU f i LU LU 00 Ln LU cn cn fk 3 to Ol f i NJ C O to VI LU 10 Ln UJ h-l 3 Ul LU ro to ro ro ro to ro to ro NJ to ro ro ro ro
h-l h-l
HI

to

h-l

Hk

NJ v l v l v l o VI UJ tn CTI H-l f i v l LD LU ro h-l Nl Ol LU ro Ln v l h-l o cn h-l f i Ln Ln 00 ID v l ro o cn ca Ln to Ln f i fk cn Ln to ro ro to ro ro ro to to to to to ro to to to to to to ro to


H-l H-l h-l H-l H-l h-l

ro

to

6 cn
vl

^ cu n < T3

cor

P Ln
ro

P p P p p P P P p P P i-k P P P P H-l h-l H-l cn in in in in in Ln In Ln io P v l CTl tn f i LU ro ro ro to ro ro to to ID h-l o Ln to LO 00 Ln


TJ

ca. ca.

>

h-l

VI LU

Vl Ln UJ LU Ln fk fi

LU UJ
h-l

UJ LU
Vv

3 00 3 00 O 00 LU Ln UU cn

cn en en ro to to

o 00
00 fi UJ

> > >

C T > > > 2 22 2 2 22 2 2 2 2 2 22 222 2222 2 22 22 22 2 2 2 2 2 2

UJ LO LU en f i LO ro to fk f i ro ro O 3 C O O 3 LO 00 00 00 00 H-l 00 LD v l to H-l LU f i to C O fk 01 Vsl Ul 3 LU TJ > > > >

HI

UJ UJ

Vs

h-l

Vl
h-l

ro fk

3 O O fi 3

^ 3
00 to fk 00

V v H-l H-l to H I fk h-l LU 00 Vl cn cn LD v l ro 00 ro 00 ~v C O 3 O C O o LD 00 3 3 00 00 00 o 00 h-l h-l 00 o 00 00 h-l h-k h-l LD H-l 3 H-l 00 V j ro 3 h-l h-l Ln O Ln ro Ln h-l 3 o cn Ol f i VI ro 00 o v l v l C T C T > > > > TJ > > -

LU to 3

H-l H-l H-k

O
h-l

to Vsl h-l h-l 00 v ^ ro Vs. cn CO to v^ 3 o o . O 00 3 00 ^ o LD 3 C O 3 C O 00 ^ 00 C O h-l 00 H-l 00 to H-l to LO 00 00 H-l cn v l o ro o v l v j 3 cn Ln 00 H-l o LU LU 3 3 o ro Ul 3 NJ h-l to h-l LU v l f i UJ to to 3 to f i ID ca cn h-l cn C T > TJ > > > > 13 > > > > > -

ro vj

ro 3

Ln

ro

ro ro UJ

fi

fi

vl
h-l

LU
h-l

LO O C O 00 00 00 LU

ca ro

h-k

VI

O
01

01 3 3 3^ (O

m n o
o
CO -vl vl
vj

30

IO OJ

ro ro ro to to to NJ to to Ol 01 en cn 01 cn 01 Ln cn cn Ln en Ln Ln i n cn LU en h-l H-l cn UU cn cn cn cn f i f i 00 h-l h-l H I h-l h-l cn 00 00 00 v l UU LU to to ro cn UJ Ln Ln h-l to h-l 00 LU


h-l

fi

OTO E T

OTO E T

TT

OTO E T

h-l

OTO

OTO

OTO

EZE

OST

t-1

to

Ln
LD

vj

p i-k LU Vl UJ IO

LD VI

LD

to

LD to

ID ID

p P vl cn

h-l vj

3 fi ro to v l f i cn Ln

h-l

h-l

h-l

to 00 00 3 to to

H-l

ro LO f i CTI LU H-l

p p

h-l h-l h-l to to ro to NJ \ LU UU LU UJ to 3 3 3 3 3 ID \ 3 3 "3 LO ID ID 10 LO p ro to cn p p In p P i-k Ln i-^ LU H I LU to 00 0 > > TJ > T) TJ


h^ -V

h-l h-l

h-l

h-l H-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l HI

H-l h-l LD C O vJ ro LD Ln > 3 00 3 3 Hk 00 00 h-l CTl LU Lu b Lii 00 Ln C O > > 13 h-l

h-l

h-l

h-l

h-l

h-l

UJ 3 Vs 3 LD

C T > > > > 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

LU 3 3 ID p Ln ji Ln 3 00 TJ TJ

LU 3 3 to Ln fi fi C T

UJ 3 3 3 ^ LD LD Ln Ln ji fi fi U U C T C T -

. LU

h-l -V

ro 00 3 to

p Ln vl

ro to ; v to to h-l 00 to LU NJ 3 3 LD . 3 Vss ID h-l 00 o 00 p 3 p p i-k 3 P p Ln cn i n v j C T > > TJ

H-l

>
h-l

h-l to ro ro . h-l Hk ' ro LO VI ro 3 ^ 3 3 00 00 00 h-l vl p 3 i-^ P 3 LU O to C T > > -

to
h-l

to
t-1

ro ro to ro

vj 3 V, 3 00 3 3 00 h-l 00 00 00 p h-l p j i Lu fi to UJ Ln Ln

NJ h-l h-l h-l ID \ 3 3 3 00 00 00 00 00 v j j i h-l 3 to 01 3 C T > >

. h-l

to ro Ji LD h-l 01 Vs 3 3 3 3 00 00 00 00 p h-l p O i-k j i Ln LU ro Ln LU cn C T C T TJ >

ID to fi 3 00 fi 3 to C T

TTZ

TTZ

i-l 01 f i

p P p 00 cn P

bo
3

TT

to

ZTO E T

ST

cn p

ro ro to f i to p to 01 P P 'ro LO h-l h-l 00 to P


h-l

P p P P P P h-l h-l Ln P P P LU

ro NJ CTI 01 Ln Ln 01 cn h-l h-l NJ ro ro 3 to to ro ro to ro Nl to NJ to to p

ro to 01 cn h-l Ln 3 fi Ln UJ H-l NJ 00 00 ro ro 3 to Ln P

ro NJ Ln cn 3 LU cn fi tn h-l UJ 00 UJ to ro h-l ro Ln P vl 213.35.

ro Ln cn UJ h-l NJ to ro 3 O

bo

to ro to Ln Ln Ln Ln Ln cn to v l h-l 3 i n ro LO cn f k Ln to LU ro h-l h-l NJ to LU fk 00 ro 1 4 3 . 5 9 .

to to to to Ln Ln Ln Ln Ln UJ UJ LU h-l Ln h-l cn f i cn LO f i Ji o vl cn 3 ro cn o h-l ro to ro LU ro to ro to f i P fk ro Ln P 00 p 00 P i-l P ro Hk f i

ro Ln UJ Ln LO -vl UJ ro to ji

to Ln UJ Ln 00 LD fi to NJ

fk o h-l o P P P p h-l b P 00 00 00 h-l Ln h-l fk p p p P p 00 P fk P fi fi fi cn f i 01 vj

to ro to Ln Ln fk LU LU C O h-l h-l C O 00 cn cn LU LO LD Ul UJ v l to ro to to NJ ro fk fi P

ro fi Ln 00 cn vl 3 to 3

NJ fi LU Ln LD Ln Ln ro NJ to

ro fi to VI Ln

ro to UJ UJ vl o h-l Vsl fi UJ ro 00 h-l f i o 3 Ln h-l 00 cn to to p h-l f i to 3 P t-1 fk P VI to Ji 3 2 2 0 . 7 1 .

n -c

7^

b o -CT p >
CL CL

1 4 3 . 5 9 .

2 0 4 . 4

01

< m' g

> n n
CT

3
CL C

n
n

3D DO 00

to vl VI LU fi 3 00 00 E LO 01 ro ro ro ro fi fi
h-l h-l

ro v l LO LU Ln fi C O to h-l LU 3 LU ro ro to ro to fi fi
f i

NJ to Ln 00 01 ro 00 ro to fi

h-l

h-l

Ln 00 01 LU fi LD to to UU 3

Ln v l 00 fk Ln LD on 00 Ln ro to to UU LU

cn cn ro

h-l

NJ VI Vl v l f i h-l f i Ln ID o h-l to cn 00 cn VI LO ID cn NJ to ro to NJ ro LU LU LU

VI O fi fi 3 3 cn Ol Ol fk en LO ro to ro to LU LU

LU 00 Ln vl 00 3 ro ro UU

ro i-l i-l LD LU fi fi

tn p

Ln Ln
h-l t-1

fi P p P 3 p p p to U i-l i - l p (JI U f i ID LU LU i - l o 3 00 Ln

o p P P p p P P P to v l cn p P vl ro LU P P i-l P p f k f k f i 3 H I h-l h-l NJ Ln o

o VI v l LU LU 01 vl Ln U U cn h-l LU ID cn HI O O LU h-l vj h-l 3 cn to to ro ro ro ro to to ro ro NJ to ro ro ro ro 00 CO C O Ln p p to P ro Ln ro P to ro cn J i ro f i P cn P P fk ID Ln f i b o P V j 3 to fk


vj

vl fi Ul fi NJ ID to to ro

fi

VI LU Ln LD ro

v j vj LU f i 3 cn Nl cn Ul to Ln to ro to ro ro ro ro p LU O

P fk

NJ NJ NJ ro ro LO p h-l H-l Ul 00 Lu 00 Lu LU LU Lu C X ) P oo 00 h-l h-l fi f i in in p p to fk f i h-l Ln Ln Ln 3 ID to to 3

LU ro 00 fk 3 fi fi NJ to to LU

h-l

to vl to vl Ln LU ro to to

NJ NJ to 3 3 3 Ln v l cn LD 3 cn VI h-l to v l to 3 to H-l to NJ ro to to to NJ ro to to Nl NJ to LO IO P

ro 3 Ln go

O fi
h-l

LU 00 fi 00 LD LU fi to Nl NJ to Ln fi

LU LU LU 00 cn 00 h-l 00 Ln v l LU o Ln 00 3 v l LU ro 3 00 f i to ro to to to ro ro ro ro to ro ro Ln Ln Ln f i fi fi
h-l t-1

LU LU v j 00 h-l Ln ro o f i LU vj 3 fi fi ro to NJ to ro to to to Ln ro io 00 ID

8 S
: ^
.< w

fi 3

ro Ln b o ro to ID

CL

>

ca.

-V

LU v l ' h-l LU 00 h-l 3 00 o 00 h-l LU h-l

LU
h-l
-V

00 O O O
H-l

Lu fi
T)

h-l

Ln

p P LU
C T

>

to LU to h-l h-l to ID H i to 01 h-l H I LD 3 O O 3 3 00 00 00 > to ca 10 ID h-l h-l h-l o 00 h-l HI to to NJ o p to i-ii to b b Ln j i p to LO H-l cn o VI LU TJ TJ > > > > 0 Ln Ln
h-l H-l

en cn

UU LU fi to to i n v 3 o 00 00 vl vl fi fi v l 00 LU to Ln 3 00 vj LU UJ 10 NJ h-l h-l h-l LU 00 10 3 ' 3 O o 00 3 3 00 00 00 h-l 00 00 LO Ln Vl o f i h-l j i 3 j i j i to b iu VI cn H I v j cn f i 10 fi


H-l

Vl UJ U U ' -V H-l h-l to Ln LO Ln . O ^ 3 ' 3 00 00 00 p p vl fk vl Nl vl to - V v j U U 3 O ID ^ 3 00 h-l 00 h-l ro p ro


h-l

h-l

h-l

fi

cn UJ h-l ^ to

o
^ 3
C O 00 fi

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
01

> > > > > > > > >

Ln Ln cn 3

h-l

C T -0 -

00 LU O C T > > -

Ln LU b UJ b
C T TJ

vl Vv vj v 3 00 fi ro 00 C T

Vv Vj

sl LU

O 00
HI

LU fi C T

to ro LD ' h-l ' O C O to o to ro cn en fi P fi 3 3 h-l C T C T C T

LU NJ Ul , VI Ln Ln H-l O h-l 3 10 3
h-l h-k h-l h-l

10 NJ f i io Lu h-l to UJ C T C T > (3

3 3 3^ CO

O J

00 O
O CO vJ -vj -vl
LU UJ to to HI
h-l

ro N

00 00 Ln 00 ro 3

In

Ln U U CTl ro 3 vl

U U UJ LU 3 3 3 UJ LU cn UJ Ln LD UJ vl LU fi cn f i to LU ro ID NJ to to to f i ro to to 00 f i

Ln 00

to to h-l 10 Ln 00 Ln C O 3 00 h-l to cn 3 ro ro LU 00 ro to NJ to ro to fi

UJ 3

ro

ro to LU ID 3 3 C O

io Ln b o
Ln

fk

to fi

is
3

to 00 00 cn Ln Ln LU f i 01 LU 3 LU h-l NJ fk 3 p Ln i-l ro
fi

to ro O 00 C LU ID vl LU 3 10 LU f i to ro to 3 vl f i bo f i fi P

to 00
t-1

3 UJ vl VI to to

to cn ro
00 vl
fi

ro -vl

to vl o Ln to 00 Ln 00

to vl
h-l

to

o
h-l

ro vl
h-l

cn
NJ

cn
3 to to

00 to

to to

LD LO Ln Ln to Ln Ln Vl LU cn 3 Nl h-l ro f i

01 C O 00 f i NJ vj
h-k

NJ vj

to

cn
00
t-1

ro ro cn cn
Vj

t o ca LU fi NJ NJ to to C O
fi

P
to

ro ID

P
to

i-l fi 00

Ln Ln 01 C O
vj

p
i-l fi

p
NJ

LU CTl t o
fi

01

3 ro

p Ln LU
to LU LU

P cn 3 ID P 00 o ro P P LO 3 fi Ln Ln
3

LO C O ro ro

3 ro ro to to

<
3D

T C

p ro
H-l

TJ

>
fi

CTI to 3 fi

Lu

CL CL

cn

cn cn

cn

vl to

8
to Ln

en 01 to NJ f i UJ cn 3 3 3 LO to to h-l Ul to f i Lu
vl

Ln to to 3 LD Ln ro C T

to

to to

Ln 00 3 LD
vj

fi fi Ln Ln

ro
LU

fi

id

UJ to ro 01 cn 3 ^ 3 LO v 3 ID to vl LU

ro cn
3 ID
fk UJ UJ 00

ro LU

ro to 3 ID

ro
fk

o
tu

3 to
fi LU

<
n>'

> 2

3 C T

ID TJ Q
h-l

UJ LU

Ln 00

Ln Ln
fk

2 2

> 2

cn > 2

b
h-l

C T 2

> 2

3 to

> 2

> n o C T 3 c a . c n
3D 03

n
UJ LU UJ LU LU

00

to vl
Ul

00 00 00 Ln Ln 3 Ln Ln Ln Ln h-l v l v j 00 NJ 3 to 3 fi 00 00 cn fi UJ V I f i 3 00 NJ 00 h-l f i f i C O o fi f i cn O 00 LO UJ cn f i Ln en U l to to NJ ro to NJ ro NJ ro to to ro ro ro ro ro ro ro to NJ to to ro to to to to t o NJ to j i f i j i f i f i f i fi f i f i j i j i f i In Ln Ln p Ln p f i p V I vl to to to ro h-l i - l f i fi 00 CO 00 to 00 00 P P P p t u LU 00 to NJ ro ro P p i-l 00 00 p v l to f k f k f i p to H-l h-l HI h-l f i fi fi fi O P en p P P H I h-l h-l P h-l ro v j 00 O LD ID Ln Ln 00 LD LU h-l LD Ln LU to UJ en cn to Ln
LU UJ

o v j

UJ v l 00 to 3 Ln i n 00 to vl 00 C O to to LU NJ to f i to 3 to cn Ln h-l LU 3 to t o ro ro NJ ro t o to to ro Ln f i jv il f i f i i-l p cn

VI LU Ol

vl

vj fk

LU vl NJ LU

vl

00 UJ LD vl

LU C O vl vl O O Ln Ln Ln Ln V I f i 00 vl 00 ID Ln to
LU

LU

UU LU

ro Ln cn ro 3 to Ln ro ro
00

vl C O cn Ln LO H-l ID t o ro NJ ro fi fi fi fi ji fk f i j i f i to to to ro ro ro to NJ ro
00 fi 00 fi 00 fi 00 fi 00 fk 00 fi 00 fi 00

to to to to NJ h-l Ln Ln Ln Ln Ln 00 UJ LU LU UJ LU Ln Ln Ln Ln H-l h-l 00 LO 10 00 CTl cn 00 vl o ID LO to f i v l UJ f i Ln UJ cn NJ to to ro t o to to NJ to ro to to

NJ UJ fk

h-l

LU LU VJ fi

vl

vl LU

v l Ln H-l cn LU 00 00 01 LD ro f i C O Ln f i LD 00 to Ln t o NJ to ro NJ NJ fk j i f i ro to to
00 00 00

LU UJ ID

LU NJ 3 LU
LU

Ln Ln LU to to to
fi
h-l H-l

ro to to to
fi HI
h-l

cn cn to
NJ

n
T C , ro 01

fi
h-l h-l

Ln Ln Ln

to
fi

ro to

ro to ro ro to

ro ro to ro ro t o en Ln

to
NJ

P LD P LO p to
> CL c a .

h-l

LU
LU
HI

h-l

H-l

h-k

h-l

H-l

LU

H I 10 C O 3 v. 3 3 00 00 C O h-l LU h-l to ro LU LU h-l 3 3 h-l h-l C T TJ TJ TJ C T

00

LD C O Vs h-l to LO 3 3 to LD h-l Ln to Ln LU

LU fk 00
h-l

LU
h-l

o 00
to 3
NJ

Ol 00 h-l ' 3

o to
fi fi

00 LU fk fi

2 2 22 2 22 2 22 22 2 2222222 222 22 2 2 222 2 22 2

> >

TJ

to to to to fi h-l to NJ Ln h-l HI to NJ h-l h-l to h-l h-l . 00 Ln h-l Ln Ln Ln Ln Ln f i to h-l h-l 3 3 ^ HI HI ' 3 3 3 to h-l 3 o 3 o 3 o h-l o 00 00 00 00 H-l 00 h-l 3 3 3 to 00 00 o v j 00 00 LU h-l ro ro 3 to h-l Hk h-l cn cn f i 3 3 3 f i Ln LU LU h-l H I f l f i fi 3 A Ln v l 10 Vsl 00 UU 3 f i h-l v l LU Ln to C T > > TJ -o > TJ C T C T C T C T> > >
UJ LU UJ

LU

UJ

UJ

fi

LU

fk

v^

to

Ol
h-k h-l

to
fi

to h-l Hk LO ID Vs 00 3 3 \ 3 3 3 00 O O 00 00 00 00 00 00 -vl cn O 10 f k HI 3 Ln f i to UU en 3 cn Ln 00 Ln C T -0 TJ > TJ >

LU UJ to Vv V I h-l ro

ro
00

CTl 00 3 3 00 00
h-l h-l h-l

Ln Ln LO to to UJ to 3 3 o LD ID C O
LU fi Ol

ro
LU

fi 00 LU

fo to
h-l

cn

Ji

C T

>

C T

>

Ln f i to 3 C T >

< o
01

01 3 3 3^ (O

o
o
CO vj -vl -vl M 00 LU LU LU 00 00 00 h-l 3 ro h-l 3 00 3 Ln 01 LU v l 00 ca cn to to C O 3 LD Ln h-l NJ NJ to to v j NJ to to ro ro h-l Nl f i p ro ro p ro NJ p P ro p 3 p NJ io io f k f k v l io io io io J i h-l io H-l p to f i h-l f k M to NJ NJ to io p P P io i - l LU i-k f i Ln 00 Ln Ln Ln i-k Ln i-l P 00 f k f i f i 00 00 p P i - l LD j i p io h-l IO h-l H-l f i LU U l f i f i LD to P o vl Ln P b in in o f kO io f i 00 00 NJ LD C VI h-l to 3 ro 3 VI LU 00 Ul vl 00 00 fi NJ UJ LU U U 00 00 00 Ln Ln Ln vl vl vl 00 00 00 Ln f i f i 01 U l N J ro to N J LU LU LU 00 00 O O Ln Ln Ln Vj f i LU 00 f i 3 LU LU LU UJ UJ 00 00 00 00 00 f i f i Ln 0 ro NJ 0 VI to v l to LU to ro 3 to LU to UJ v l ro ca f i fk f i h-l h-l UJ UJ vj Ol h-l 00 3 vl f i 00 Vl LU fk 00 to to NJ ro to io ro NJ UU LU UJ LU UJ tu LU UJ ro h-l h-l 00 h-l to cn 00 3 f k v l cn Ln to to NJ IO ro 3 Hk h-l io P io io f i j i H-l t-1 h-l h-l to to io p to ro H-l h-k io i-l h-l P p Ln f i i-l In f i P O O In P P CO h-l to UJ LU to C O cn ji Ln p P ^ in Ln P i-l to 3 cn Vl Vl LU LU 229 176 LU LU LU U U UJ Ln f i f k f i LU 00 00 f k f i Ln f i NJ to N J 3 NJ h-l to f i 3 LD v l v l V l Ln LU to h-l h-l LU to h-l h-l h-l to p A LU U l p U Ul UJ UJ U LU LU LU LU to h-l Hk 3 3 h-l Hk ro LU ro cn LU H-l h-l to 00 f i f i 3 h-l NJ NJ ro ro 3 ca C O to Ln Ln Ln f i 3 b b p P P i-l P LU UU LU oo

<
m f-l ca
33 7: fD 13

^
a.

^ h-l

Ul p p 0 HI p p p f i p j i i-i f i Lu P j i LU P b P Ln Ln id Ln Lu Lu f i i-i Lu id j i Ln P b v l v l f i H-l to LU h-l LU 3 to 00 C O cn C O VI to Hk to Ln h-l to f i 0 Ln H-l 01 C T C T C T > TJ > C T C T C T C T TJ C T C T TJ > C T C T C T > TJ > > > C T C T C T2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

LU LU to V s h-l h-l LU LU V v to h-l h-l O Ln NJ Ln Ln vj LO h-l h-l h-l Ol V v fi Ln Ln Ln Vs Ln h-l V.S V h-l H-l 3 h-l h-l H-l H-l t-k H-l 3 H-l C O 3 h-l ' 3 o o o H-l 3 h-l h-l 3 3 h-l 3 C O ro h-l h-l h-l NJ p h-k p Ol p M 00 h-l LU LU U U UJ
h-l h-l h-l

Vs Hk

ro f i fk f i f i f i fk io io P P io P io io io io io P io io io io io h-k Hk h-k h-k


h-l h-l h-l h-l
Hk

NJ to 3 3 vl Vj to 00 3 LO 00 f i UJ f i vJ v l NJ to f i fk

Nl

vl vl 00 00 00 VI LO 00 f i 00 f i Ln v j LD to v l to LU v l v j v l VI ro ro to to

o vl

to to to to to NJ ro to to O 3 C O C C O C O C O 3 3 3 3 vj Vsl

238.23

p p p p h-l i-k t-1 Ln h-l h-l H-l cn Ln Ln


Ln

LU

h-l

H-l

h-l

h-l

h-l

H-l

h-l

h-l

to NJ to h-l h-l Vs HI to NJ v. Ln ro h-l LD f i cn Vs 3 3 3 to 3 3 to to h-l LO to p H I to cn v l

C O O .0
LU 3 3 to NJ LU ' 3 to

s to
h-l

C O 00
Vs

to Ln to fk LU Vs 3 3 ID 3 ID h-l LO

00 H-l NJ 00 00 to UU ID Ln Vv V s 3 3 C O C O 3 3 LD LD LO to ID to h-l h-l h-l


H-l

ID LD

ID

h-l

a
01

>
h-l H-l

p p p P i-i iu f i to H-l C T TJ C T 2 2 2

<
rt>'

> n n
C T

ca. c

a
3D 03
h-l
vj v l VI vl LU Ln LU o f i 00 to 00 ro 3 LU LU Ln Ol CTl LU 3 00 Ln NJ o v l 3 h-l LO Ul to NJ to ro ro NJ ro NJ NJ NJ 00 b o CO 9 00 Ln Ln io NJ P P i-l in bl

ro

h-l

LD v l vJ VI o VI cn Ln vl v j VI 01 01 o h-l fk C O Ln f k LU 3 o H-l fk LU Ln 01 to ID 3 LU h-l f i 3 to ID NJ H-l o cn v l -vJ v l v l v l VI V I vj V l NJ NJ to to ro N J to ro ro fk fk fk f i f i f i fk Ji f i vl vl vl vl vl 3


H-l h-l t-k t-1 h-l h-l

LD vl LU to LO
f i

vl

h-l h-l LU NJ LD ID 10 00 to v l v j v j VI Ln Ln Ln un 00 f i LU f i U U Ln f k f i v l 3 Ln vl H-l 00 to Ln LU to 00 to Ln 01 Ln V j to cn f i VI Ln NJ to oo 00 00 cn to LU cn h-l ca ro VI v l v j v j VI ro ro to ro NJ ro ro N J ro to ro to to


f i f l fk fk

vl vl LU LU 00 00 ro to to NJ ID 00 N l to N J NJ
f i f i

Ln Ln 3 O to cn h-l f i
01 f i

vl

vl

g's

00

to
h-l

io
h-l

h-l

h-l

i-l i - l to to

b o f i Lu
ID

w b o b o LU iu io O l LU f k
U U i-l
h-l

fi

o o p h-l p p P p P P o h-k b h-l f i f i NJ vl


Ln Ln Ln
to
Nl

vl

i-k
h-l

ro to P Ln f i ro io h-l
3 00 3

ro ro Ln Ln fk
i-k ro

II
-CT

Ji

CL CL

>

m m
VI

LU
vj

VI v l v l s -Vs ,V00 00 ' 00 Vv Vs 3 3 o 00 00 00 LU LU UJ UU NJ NJ 00 f i f k C T C T C T

NJ cn - V f ^ NJ N J NJ to fi IO Vs LU ro Ol LU J i 3 to Vl LU .A C O 3 O o ca o > o o O 3 00 00 00 00 00 o 00 o O ^ ^ 3 O 00 h-l h-l h-l h-l 00 00 00 00 00 00 00 h-l 00 00 00 h-l h-l C NJ to ro f i to to U J to o h-l v l to f i f i Ln v l H-l LU f i U l h-l Ln h-l h-k U l LU H-l f i O UJ UJ Ln 3 Ln f i f i ro LU o H-l Hk h-l C C O v j NJ 00 VI 00 to Ln ro o h-l f k VI f i 01 3 f i 00 f i NJ Ol 13 TJ 13 C T TJ C T C T C T> C T> > C T C T C T > C T> > > > 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
Vl

Vl v j v l VI VI vl V s Vss v ^ Vv Vs Vs 00 00 00 V 00 00 00 s ^ 3 . 00 C O C O C O ca 00 00 00 00 ^ 00 ^ 00 h-k LU to H-l h-l Hk h-l NJ h-l f i Ln f i NJ C O Ln Ln U l cn LU NJ UJ to C T C T C T C T C T -0 TJ -

Vl Vv

Vl

vJ

Vl Vs

00 00 Vs 00

^ vl ^ 00

LU 3 00

vl Vl LU NJ NJ 3 3 -Vs . C O 00 oo h-l 00 h-l o h-l NJ LU NJ U l J i LU cn C T C T > -

Vl

UU LU UJ
LU

Vj

LU 00
h-l

to h-l Ln 3 00 h-l

LU
h-k

H-l "Vs

UJ Vv NJ LU

LU LU

fk Vs h-l

LU

f i

13
01

01 3 3 3^ (O

o o
CO
vj -vj

vj NJ CD

UJ LU 00 00 Ln Ln 00 00 f k LU t o vl Ln 3 h-l t o LO t o I D ro In h-l

tu 00 Ul 00 to Ln h-l to to to

bo p P Ln p p fi 3 i-l 01 f i cn
ji

h-l

UU 00 Ln 00 to LU 3 to to to h-l i-l fi i-l VJ VI

LU 00 Ln 00 to

LU 00 Ln 00

ro ID
to to Nl h-l

o p t P P t o ro f i f i j i ro p p TJ h-l p i-l 3 p p p P h-l HI > P i-l p p LU P P p P P CL f i V I h-l 00 fk t o h-l ca. h-l h-l p LO v j fi P P LU p P P Vl to p 00 00 h-l oo Ln P LU io 3 i - l cn 3 c a io to to i-l Ln i-l fi

ro to 3 to to fi

LU 00 Ln 00 h-l vl LD h-l LU

LU 00

un 00
3 LO 3

LU 00 Ln

ro to io

3 h-l LO h-l fi 00

oo

LU 00 Ln 00 3 3

cn

UU CO Ln vl LD vl LD NJ

LU 00 Ln vJ to vj h-l vl

ro io

LU 00 Ln vl ID fi Ln h-l LD

UU CO Ln vl LD H-l 01 to to fk

LU 00 Ln vl 00 ID to

UJ 00

un o 00 o 00
00

LU 00 Ln 00 Ln to

en

<
3D fO

Q
TC fD

ca.

h-l 00

fk

h-l

h-l fi

LU UJ "Vs - v h-l HI

LU LU HI UJ LU LU LU LU LU LU LU LU LU UJ Ln UU UJ Ln Ln HI 3 to

' '
3 h-l Hk
to

cn cn cn
3 3 H-l h-l h-l 3
h-l

h-l 01 h-l

h-l Ol h-l 3

h-l

cn
h-l 3

ji fi b f P b k t o b ro v l ro T3 13 TJ > > > > > > > > >

ji

p to y? p Ln Ln fi i-i p Ln f i f i 00 LU

h-l h-l h-l h-l CTl cn cn Ln h-l h-l h-l h-l 3 3 3 3 00 V j f i

h-l Ln h-l 3 LU

h-l Ln h-l 3 LU

H-l h-l Ln Ln h-l CO LU i-l t-1 C T h-l 3

^ h-l . H-l h-l


H-l

o
01

p Ln 3
T3

c a p Hk
to TJ

h-l 3 to

b VI b vl
C T C T

ru

222 22 222 22 2 2 22 2 22

> n n

3 CL
c
3D 05

-CT

?g
UU 00 fk vl o 00 t o LO t o t o Ln vj vl to fi fi ro t o h-l h-l UJ 00 Ln

ro
vl

o fi
h-l ID fk

to fi to Vj Ln HI Ln

to UJ 3 LO LU

cn Ln

vl p p p vl p p p fk P p M P fi fi fi P fi P fk fk f i P
NJ h-l to h-l to h-l to fo H-l h-l to h-l to h-l NJ h-l

to 3 O O 00 LO to fi vl

to 3 00 00 vl to 3 vl

NJ 3 00 to h-l

cn t o

NJ 3 00 3 00 NJ 00

NJ 3 00 3 3

ro h-l

to CO 3 vl vj t o ID LU LU Ln t o i n ro vj vl to fk f i to to h-l h-l

ro

to CO vl LO NJ LU LU

ro
3 vl

ua to
to Ln vl

NJ CO vl LO h-k 00

vl
NJ Hk

10 CO vj 10 h-k CO Hk

NJ CO vl CO to

n O

to

I i
T3

oo
Nl Hk

0 vl vl vj p io io io P fi fi fi fi fi
ro
h-l
to h-l NJ Hk

>

ca.
CL

h-l
UJ to to LD

O
h-l Ul h-l

00

vl h-l vj
00 fi

' . h-l ro
cn v. HI
3 to Ln

. h-l h-l
fi

vl

Vl vj

o ro
h-l NJ C T

ro

2222 22 22 22 2 22 22 2 2
O
01

>

O to Ln Hk 3 C T

O 00 h-l h-l LU 00

o 00
h-l h-l LU

3 00

LO t o o 3 . 3 3 O 00 00 00 00 LU LD

H-l

cn
UJ VI TJ

ro

cn

> >

f k un f i LO LU h-l C T TJ

>

VI Vv 00 V. 3 00 00 00 Ln HI 10 HI TJ

vj

vl

vl 00

^ . 3 3 3 C OC O CO CO 00 00 00 00 00
vl Ln Ln
h-l HI
fi LU LU

vj v^ 00

vj 00

Vl 00

vl 00

>

C T

f i to UU f i C T TJ

Ln f i f i C O LU h-k C T C T 13

Prosecution Exhibit 6^ l^pages classitied "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust201^ stored in the classitied supplement to the original Record ofTrial

Prosecution Exhibit 66 ICE^ classiHed "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classi^ed supplement to the original Record ofTrial

ProsecutionExhibit67 Ipage classi^ed "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classitied supplementto the original Record ofTrial

Prosecution Exhibit 6^ ICJ^ classifed "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust201^ stored in the classitied supplement to the original Record ofTrial

Z9PJ.Z900 geujuuBiAi

Z
in

O
h-k

2%
P o o =

CQ

-^d
(D

T
o oo tn m
"0 73

<D @ O

' J o

Tl

c d -n o S o z m
Tl m

O n ^

C/3

2
H

2?
D

^1
^ o
&5

o'
3

UNITED STATES OF A M E R I C A

Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211

STIPULATION OF EXPECTED TESTIMONY M r . Stephen Buchanan

3 June 2013

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that ifMr. Stephen Buchanan were present to testify during the merits and pre-sentencing phases of this court-martial, he would testify substantially as follows: 1. I work as a contractor for the National Security Agency (NSA). I provide support to Intelink. Intelink is a software suite operating on U.S. Government private networks which provides Internet-like services to enable collaboration between intelligence agencies within the U.S. Govemment. Primarily, it includes a web-based search engine of UNCLASSIFIED, SECRET, and TOP SECRET information systems. It hosts blogs and allows for messaging, sharing files, and searching for UNCLASSIFIED, SECRET, and TOP SECRET information across agencies, to include Intellipedia for online collaboration and Passport account management. In my current position, I provide security for Intelink and serve as the Information Assurance (IA) Manager. This means that I make sure the systems work as they were intended. I work to ensure the systems are properly maintained and guard against their misuse. I have worked in this role for five years, 2. Prior to holding my current position, from 1999-2008,1 was an Information System Security Engineer for Intelink. In this position, I made sure the systems were built correctly to perform their intended connection, search, and storage functions. Before that, I worked in systems support within the Intelligence Community (IC). In total, I have worked in the IA industry supporting different agencies in the IC since 1985. 3. I have two primary IA and information systems certifications. First, I am a Certified Information Systems Security Professional (CISSP). This means I have heightened experience in and knowledge of information security. CISSP is a globally recognized standard of achievement that confirms an
individual's knowledge in the field of information security. The training covers all parts of information

security, including personal and building security aspects. CISSP indicates that an individual has attained specialized knowledge in the field of IA in accordance with standards articulated in Department ofDefense Directive 8570. In addition to CISSP, I also have the Information Technology Infrastructure Library (ITIL) Foundation certification. ITIL is the most widely adopted framework for IT Service Management in the world. ITIL provides a framework on technology systems management, particularly on how to build information management systems and manage them with a specific process. 4. In my role as IA Manager for Intelink, I am familiar with the audit logs created by Intelink. The Intelink system obtains, manages, and stores its own audit data through the course of its day-to-day operations. This data can be used to respond to user inquiries, troubleshoot technical problems, and monitor and maintain Intelink usage and performance. These logs are created anytime anyone makes a connection with a computer system. The system detects these connections from servers - tracking the workstation making the request of the system, how the request routes through the system, and where the request ultimately gets the information. These connection logs are made in real time and stored in data
^

PROSECUTION EXHIBIT l^f for idplfification PAGEOFFERED: PAGE ADMITTED:

PAGE 1 O f H PAGES

files every hour. They are computer-generated and onlyavery limited number people have access to them. 5. Intelink logs contain audit data captured from proxy servers that control access to Intelink services and show the activities ofusers and systems that connect to and use the Intelink services while on classified or unclassified networks, ^eknow the Intelink audit logs are accurate for several reasons. First, they write toasecure server. Second, only limited personnel have access to them. Third, they are reviewed by our team at least onaweekly basis to ensure that the reporting process is occurring properly^meaning to ensure that the log data is being written properly. The log data is useful to us because it shows us how our services are being used,whether Intelink services are functioning properly, and whether adjustments should be made, ^ecan also use the data to solve technical issues, determine security risks, and review data trends that help us develop our management strategies, ^ e c a n t e l l i f there are errors because information the logs normally collect would be missing. Ifadata file had been corrupted while being written it would not open. Missing or corrupt data files are regenerated from the system. So, in short, the data these system logs have captured is complete and accurate. ^. lam involved in this case because we receivedarequest to pull Intelink audit logs given Intelink could have been used to gather information that was ultimately compromised. Atthattime,wedidnot track users by login identifiers: instead,we tracked usage by IP address. One ofthe log data requests was for the Secure Internet Protocol Routing Network (SIPRNET) IP addresses 22.225.41.22 and 22.225.41.40 from October 2009 to .lune 2010. Intelinkauditlogsare stored onaLinux-based system. Topull the requested log,IperformedaLinux search on the server. This means thatlissuedaline command telling the server what informationlwanted to read, ^hen the system returns the data, the system writes the data toafile. In reviewing the files retumed,Icould find no relevant information in the data files for October 2009 or .lune 2010. I^owever, there was activity recorded for the relevant IP addresses for the months November 2009 through and including May2010. Idouble checked to make sure there was no activity from the relevant IP addresses during October 2009 and then ran the search again to verity results. The results ofthe second search matched the results ofmy original search. The results are saved automatically asa.txt file so that they are readable to the person running the query, ^henlreceived the response to my IP^datequery,Iopened the file to make sure it was readable and that all the data had been reported properly. Idid not alter the file in any way. Ibumed the file toaCD and then turned it over to Special Agent Mark Mander with Army CID. These logs are on the CD marked Prosecution E^hihit(PE)^l for identification. The filenamesofthe Intelink logs thatI attested to showing activity for IP address 22.225.41.22 are the following: .IFIO 22.log:
MB^MIO 22.t^t: and ND09 22.log. The filenamesofthe Intelink logs thatlattested to showing ac^tivity

for IP address 22.225.41.40 are the following: .IFI0 40.log: MAMI0 40txt:ND09 40.1og.The file ^^.IFIO 22.log''contains audit logs capturing activity for the 22,225.41.22 IP address in .lanuary and February 20I0.The file ^^MAMI0 22.txt" contains audit logs capturing activity forthe 22,225.41 22 IP address in March, April,and May 2010. The file ^^ND09 22.log"contains audit logs capturing activity for the 22.225.41.22 IP address in November and December 2009. lused the samefilenamestructure to capture the contents ofthe audit logs associated with the 22.225.41.40 IP address. 7. The particular log datalcaptured reported several things. I w i l l use the following discrete line of data to show,by way of example,what the Intelink logs mean: 22 225 4140--^29^ov^2009:04:50:10^0000^^^GET ^intelinkwipismcsgovgov^^ebResourceaxd7d^az7kDRRcqClt^13zGP21n02c^t^^33^2775^757031 2501^TTP^1L^200^^^5

^^http:^^wv^.intelink.sgov.gov^search^default.aspx7q^hqda^^ ^^Mozilla^50^20(^indows:^20U:^20^indows^20NT^2051:^20enUS:^20rv:I9I2)^20Gecko^20090729^20Firefox^352^^^^B^ 8. The significance ofthe above line that was pulled from Intelink is the following: (a) The ^^22.225.41.40" is the IP address. This indicates thatacomputer with that IP address made the request for information. Essentially,it provides an electronic location for the user using Intelink. (b) The ^^29^ov^2009:04:50:10^0000"isthedate^time group The time zone is refiectedasthe offset from Greenwich MeanTime(GMT). In this case,^^^0000" shows no offset. (c) Thenextentryisthe action the user took. In this case,tor example, you see ^^GET". This command indicates the user is seeking particular information on SIPRNET through Intelink. This action refiects the user clicking on something in the website. (d) The next entry is the page being requested by the action above. Flere, it is ^^^intelinkwipismcsgovgov^^ebResourceaxd7d^az7kDRRcqCltV13zGP21n02t^t^^33^2775^75703 1250 F1TTP^1.1'^^. Intelink.wip.ismc.sgov.gov is the registered name for Intelink,which is on the SIPRNET,asecret government system. (e) The code of numbers after the information tells you whether the user'srequest was successful and to what degree. For example, the code ^^200" after particular information indicates that an intemet home page (HTTP) was successfully accessed. (t) The ^^^^^5" is the size in bytes ofthe information retumed by the query. (g) The entry ^^http:^^v^^ww.intelink.sgov.govi^search^default.aspx7q^hqda^^ tells me that the user searched for the term ^^hqda"on intelink.sgov.gov. ^^www.intelink.sgov.gov" is the SIPRNET internet address for the secret govemment system on which Intelink sits. In this entry,^^search" is the specific Intelink service used and ^^q^hqda" represents the search query entered into the search box on the Intelink webpage on the specific computer v^ith the IP address listed above.
(h) The entr^^^Mo^illa^^.O" tells me that the user of the SIPRNLTc^omputer with an IP address

of^^22,225.41.40" was using version5of the Mozilla internet browser. Mozilla isacompany that produced intemet browser software similar to Microsoft Intemet Explorer or Apple Safari. (i) Theentry^^^20"representsaspace inthe line. (^) The entry ^^(^indows:^20U:^20^indows^20NT^205 1:^20en-US:20rv:I 9 1 ^ ) " tells me the user of the SIPRNETcomputer with an IP address of^^22.225.41.40" was usinga^indows NT workstation computer. (k)Theentry^^^20Gecko^20090729^20Firefox^352^^^^B^" tells me thatthe userofthe SIPRNETcomputer with an IP address of^^22.225.41.40"wasusingaversion of the Firefox intemet browser,version number ^^3.5.2". Firefox is the specific name ofthe intemet web brov^ser program produced by the Mozilla company.

9. These Intelink logs only audit vBhat happens on the Intelink systems. So, they can only tell you what aparticular user IP address was doing when connecting with the Intelink system. It would reveal Intellipedia searches and other ways the user IP address used Intelink services by showing what files within Intelink that IP address accessed. At the time, users were not required to have Intelink Passport accounts to use most Intelink services, including the SIPRNET intemet search and browsing. A SIPRNET Intelink Passport account isausemame and password account established to allow access to some govemment websites. It is one ofthe many applications Intelink uses on its own internal systems to track whatauser accesses. Auser would need an account ifhe wanted to contribute to Intelink services or access certain websites or databases on SIPRNET,butnot^ust to conduct searches. To create an account,auser would have to be on the SIPRNET,go to the account creation page,and insert personal information such as name, contact, and organizational information. The user is then notified via SlPRNETemailwithacode to use the first time he accesses the site. Other govemment organizations with websites and databases on SIPRNET,use SIPRNET Intelink Passport accounts to verify users before any user may access their information on SIPRNET. 10. Our Intelink organization maintains and stores the Intelink Passport account profiles of registered Intelink users. In response toarequest by Army CID,Ilooked Bradley Manning up in our system. Someone with the name ^^Manning, Bradley E"did have an account. The user name ofthe individual was ^^bradley.e.manning". According to the user account,^^bradley.e.manning" was in the military,his pay grade wasE4,and used an email address of^^bradley.manning^^us.army.smil.mil". The username is automatically generated based on the common name which is entered by the individual setting up the account. The user information includes each identifying factor(such as name, contact information, security questions and answers)that the user inputted into the system at the time of account creation. According to the Passport Account, the last time that the user logged in was 27April2010at1805:4^ ^ulutime. According to the Passport Account, the registration date wasIIOctober 2008. The Passport Account information is marked as PE ^2 for identification. 11. Isigned an attestation on 22 .lune 2012(BATESNumber:00505257)attestingto the authenticity of the what have been marked as PE^landPE ^2 for identification and are the provided logs and the Intelink Passport account information for ^^bradley.e.manning",contained in the file ^^manning.ldif.

L^^fWt^ ^. ANGEL M . J O V E R G A A R D CPT, JA C / Assistant Trial Counsel


nr\ir\\ii\c iiiini c\/ THOMAS HURLEY MAJ, JA Defense Counsel

BRAD PFC, USA Accused

UNITEDSTATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Mr.PeterArtale ^Jnne2013

Manning, Bradley E^ PFCU.S.Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall FortMyer, Virginia 22211

^ttsh^r^l^y agreed l:^yth^Accits^d^D^f^n^^Gotms^l,andTrtalCoLtns^I, that tfMr.Pet^r Artale were pr^^^nt to t^stttydt:irrng the r^ertt^ and pre-sentenctt^g phases ofthis coi^rt^rnarti^^^ he wot^ld testify si^bstantially as follows: 1. Ian:^cTtrrentIy employed l^y the Army Coitnter-Ir^telligence Center (AC^C) with the 902d Mihtary Intelligence GroTiponFort Meade, Maryland. ACIC prodttcesfinishedintelligence products for the intelligence community. It often produces these prodi^ctshyfi^lfillingreqi^ests torinfortT^ationfron^theArt^y. It takesfinishedproducts and dissert^inatesthen^ on SIPRNET andJ^ICS. l a m a ^ e h Developer and theTeam Lead ofateamoftl^ee software developers. I ha^e worked in this capacity and fi:^r ACIC fi:^r eight years. Prior to this position,Iworked in weh development tor the Defense Intelligence Agency (DIA)ft^r one year, then with Booz Allen onaone year contract with National Geo-SpatialAgency.Iwasasoftware development engineer and programmer in the Air Force tor twenty-one years. Iretired from the Air Force asa Master Sergeant. lalso ha^e an Associate^sdegree in Computer Science. 2. Ifirst hecamein^ol^ed in this case on approximateIy17March2010after my Branch Chief, Ms.Jessica Joht:^son, alerted me to the compromise ofU.S.Government information. Ms. Johnson asked ifIcotrIdt:tseot:ir system to see who had ^iewedacertainprodTict. IcoTtId,asI had de^elo^edcnstom software to track access to particrrlar products. This software captures the viewer credentials hy recording the Internet Protocol (IP) address and date^time of access for each user who ^iewsot^rACICworkprodt:ict. It then assignsai^niqi^e report key to the access e^ent. This occi^rredhefore we were contacted hy law enforcement in this case, asACIC was notified ofthe compromise ofoneofottrprodttcts in March 2010. 3. An IP address is part oftheTransmission Control ProtocoI^Intemet Protocol (TCP/IP). A protocol is the standard langrrage^sed to communicate o^eranetwork. TCP/IP is the most common ^^langnage" that computers Ltse to communicate overthe Intemet. And so, an IP address is the method ofidentityingaspecific computer onanetwork. Onlyonecomprrtercanbe assignedaspecific IP address at one time. I^owing an IP address allows tts to k^ow which computer onagi^en network nsed our prodi^cts. Oi.ir software isac^stom product which, in capti^ring this nser and access information, produces metrics which can he ^sed to see which of oi^r products are most popniar and how o^rprodi^cts are ^sed. The software only logged views ofthe document in the ^^.asp"tormat which is the standard way the prodLtctwot^Id appear on the wehsite. asp" isacommon file tormat for web pages. This means that the software only logged ^iews of the web version ofthe docLtment and not the ^iewsofthe^^.pdt^^or^^.doc" version ofthe docnment. Likewise, the logs do not indicate whether the doct^ment was printed or sa^ed^ nor do they indicate how long an indi^idnal looked at the doctrment, if at ail. ^e ^ PR0SECUT10NEXH1B1T^(^ t o r i d e i ^ ^ t i o n PAGEOFFERED: PAGEADMl^ED:

PAOE^

PAGES

collect this data normally so we can analyze it to see where we need to allocate our development and maintenance resources to hest support our intemal and external customers The information produced by the tracking software is, theretore, called metrics. 4. The metrics are pnlled when an engineer runsacertainqt:iery. These qi.ieries can he customized to p^II only the information the developer wants to see. In this case,we were specifically interested in tracking e^ery access toaprodt^ct titled ^^^ikiLeaks.org^At:r Online Reterence to Foreign Intelligence Services, Insurgents, orTerroristsGroi^ps7" Therefore,! searched the prodi^ct by determining and searching tor its prodt^ct identification ni^mher,which is^^RB080^17". The prodi^ct identification nrrmher,which is on the docirment itself and assigned internally byACIC,isaidentifierLrniqt:te to eachACICprodi^ct. 5. ThisACICprodirct^^^ikiLeaks.org^An Online Reference to Foreign Intelligence Services, Insurgents, orTerroristsGronps7" is honsed on our website at ^^acic.northinscom.army.smil.mil" and is accessible only ^iaaclassified network, sirch as SIPRNET. I wroteacirstomqi^ery,by IP address and ^isit time, to see every time this partici^lardocirment was polled from the weh server. Acustom query isamethodofpnIIing information fi^oma database. Ipirlled these metrics tr^om my own workstation. The data is automatically pi^IIed into aStr^ctnred0^^^yEang^age(SOE)tabIe. SOE isacompnter language tor extracting and inserting information inadatabase. It isastandard computer langttage to interact with databases. PrintontsofSOEqi^eries look like an excel spreadsheet in that it has colnmns and rows: however, it is not as easy to search and organize as an excel spreadsheet. I, therefore, digitally ent and pasted the information from the SOE table into an excel spreadsheet and sa^ed the data to my desktop. Ithenorganizedthe spreadsheets intwo separate manners. The first set is organized hy^isit date. The second is organized hy IP address and then ^isit date. Ididnot alter the content ofthe data in any way when searching fi:or the data, moving it trom the SOE tahle to the excel spreadsheet, or while in the ex^cel spreadsheet. Imo^edtheinfi:ormationand organized it in two separate manners because it was easier to read. Ithen emailed the metric data to my leadership atACIC as requested. The data is stored sectrrely on o^r servers and is only accessihie to the other th^ee web developers on my team. Iha^e no reason to helie^e anyone else wot:iIdha^e modified the logs in any way. This occtrrredhefore we were contacted hy investigators in^ol-ved in this case, asACIC was notified ofthe compromise of one of ot^r prodtrcts in March 2010. ^. In this case, theACIC document concerned was posted in 2008. Ip^lled the metric data tracking access to this doci^menton17March 2010. The most recent access date listed in the metric data isl^March 2010. The data retnrned included ^iew hits on the document npnntil the morninglran the data qt^ery. The logs are hroken down by record key,IP address, and-visit date. Specifica11y,the metrics tell me the following abont the nser IP addresses who opened the wehsite containing the product withaprodnct identification nttmherofRB08-(^^17in the weh page format: auser with the IP address 22.22^.41.40 opened the web page onlDecember 200^ at ^:31PM:aL^ser with the IP address 22.225.41.40 opened the weh page on 2^ December 2009 at 2:40 PM:aLtserwith the IP address 22.225.41.40 opened the weh page on1March20I0at ^:40PM:andattser with the IP address 22.225.41.22 opened the weh page on7March2010at 11:^1PM

7. The data tor these metrics is collected hyonrci:istom software automatically when someone clicks on one ofonr links to nseoi^r ACIC work product. This system capti^res the time, date, and IP address as well as which prodnct is being accessed and served ont to the requester, ^e knowthis data is accnratehecatrse there is no hnman intervention into the process and becanse -views are logged t:ising specific codes and for specific prodttcts. FinaI1y,whi1eitispossih1eto make manttal insertions in metric data outpnt, those insertions cannot he backdated or overwritten. This means whatever ontpnt data the system produces cannot itselfhe altered. Ft^rthermore, at the timelpt^IIed these logs,Idid not know to whom the IP addresses were attached or the reasons for which the data was heing pulled. lhad neither the motivation nor knowledge required to alter the docLtment. At no point prior to pulling the metric log data,whi1e periling the information, or after securing it, didle^er alter the data in any way. 8. My Branch Chief forwarded my email with these metrics to Mr.^instonBndram,S^^ and Chieflntormation Officer ofthe 902d MI Grotrp. Mr. Bndram forwarded the metrics to investigators after they contacted our office. Prosecution E^hihit(PE) ^3 l^orldenti^cation is the paper copy ofthese logs. PE ^3 for ID isaprintont ofthe complete logs thatlpniled. IpTtt the title ^^ViewsofACICProdnctRB08^0^I7.asp" on the topofthee^ceIspreadsheet.The title is hased on the ACIC prodnct identification numher and the fi:ormat ofthe docTtmenL On the left side of e^ery page are the logs thatlpulled and organized by ^isit date. On the right sideof e^ery page are the logs thatlpinlled and organized by IPAddress and then ^isit date. Ihelie^e the intcormation on the top ofthe page (^^ViewsofACICProdnctRB08^0^17.asp": ^^Record ^ey":^^IPAddress": and ^^VisitDate"),which is the same as the title and heading information on the spreadsheets thatlpu11ed,was automatically produced hyex^cel when the spreadsheets were printed. 9. lam the cnstodian of the records marked as PE ^3 for ID and an employee familiar with the marmer and process in which these records are created and maintained, hy^irttre ofmy dirties and responsibilities. PE ^3 for ID was made at or near the time ofthe occnrrences ofthe mafters set forth hy or from information transmitted by,people with knowledge ofthese matters. PE^3 for ID was kept in the conrseofregularlycondncted business activity. Itwastheregnlar practiceofthe business activity to make the records. The records marked as PE ^3 for ID area trLje,accnrate, and complete copy ofthe original documents.

^ ^ t ^ ^ ^ B ^ f ^ - ^ ^ ^ ^ ^ ^ ^ ^

^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^

ANGELM^ERGAARD CPT,JA Assistant Trial Counsel

TffOMASffURLEY MAJ,JA Defense Connsel

BRADL^EMANNIN^ PFC, USA Accnsed

UNITED STATESOF AMERICA


^.

Manning, Bradley E. PFCU.S.Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall FortMyer, Virginia 22211

STIPULATION OF EXPECTEDTESTIMONY
Mr.SeanChamherlin ^ June 2013

It is hereby agreed hy the Accused, Defense Connsel,andTrial Cottnsel, that ifMr, Sean Chamherlin were present to testify dt^ring the merits and pre-sentencing phases ofthis courts martial, he would testify st^hstantially as follows: I.lamaSystems Administrator for the S^ shop ofthe 902d Military Intelligence (MI) Grottp on Fort Meade, Maryland, The 902d MI Gronp performs counterintelligence functions. My section is responsible for providing ITsupport tor all unit servers,In this capacity,Ihttild new servers and maintain old ones. lhave worked in this capacity for ten years. Before thatlwas active dTity military for nine years and wasaStaff Sergeant whenlleft the Army. For the lastfi^eof my nine years of active duty ser^ice,Ihad the Military Occupational Specialty (MOS) 33^, which is Intercept Electronic^arfare Systems Repair. Inthatcapacity,Iwasasystems administrator. Tofulfill my current tnnction,Iha^e received SecLirity Plus training and ha^e certifications in nnmerons Microsoft server types. lalso holdaBachelor'sdegree in Information Systems from the University ofPhoenix. 2. Ifirst became in^ol^ed in the present case in JTtIyof2011when my supervisor Mr. Robert Conner, the Site Lead for InformationTechnology at the 902d MI Gronp, requested thatlpull Microsoft Internet Inti:^rmation Services (MllS)weh server audit e^ent logs for the contacting IP addresses 22 225,41.22 and 22 225.41 40 between thedates November 2009 and May 2010. MIIS are application logs that are specific to the web ser-^er. Audit logs arearecord of the activity that occnrs on the server and enahle system administrators like me to track what ^sers do on the wehsite. Andit logs contain data that is ai.itomatica1Iy written to them onadaily basis. Flere, the at.idit logs record file activity onaweb server from the United States Government computer assigned to the IP address199.32.48 154,isacompi.iter dedicated to processing classified information at the SECRET le^el. This is the IP address for theACIC wehsite on SIPRNET 3. This data shows what IP addresses accessed onr system within that date range. An IP address is part oftheTransmission Control ProtocoI^Intemet Protocol (TCP/IP). Aprotocolisthe standard language used to communicate o^eranetwork. TCP/IP is the most common ^^langt^age" that compt^tersttse to commnnicate overthe Intemet. An IP address is the method of identityingaspecific computeronanetwork. 4. An IP address allows t^s to know which computer onagi^en network accessed onrser-^er. In this case,Ipnlled eighteen log files for the abo-^e IP address and date range. The files are named the following: ex0911191og:ex0912011og:ex0912141og:ex0912171og:ex0912211og: ex0912291og:ex1002071og:ex1002091og:ex100211 1og:ex100214 1og:ex1003011og:
/ ^ ^

PROSECUTION EXHIBIT 1 ( for identification PAGE OFFERED:^ PAGE ADMITTED: PAGE 1 O F l PAGES

ex100302 1og:ex100308 Iog:ex100315 Iog:ex10031^ Iog:exI003171og, which isthe automatic naming contention ofMicrosoft based on date. The files display in text format. The files contain 8^ entries fcir the IP addressof22.225.41.22 and 28 entries for the IP address of ^^^ 22 225 41 40 The firstentryfor 22225 41 22 or 22 225 41 4 0 i s I 9 N o v e m b e r ^ ^ ^ ^ ^ ^ ^ ^ ^ 5. These logs are on our external wehser^er,which is one ofthe ser^erslamresponsihle for maintaining. The weh server and the logs are located in what is commonly referred to as the ^^DM^",which is the area between our intemal system and the SIPRNET. Ipulled the data using asearch window and searching the IP address for the gi^en date range. Thenlsearchedtorthe two requested IP addresses. Ithen put the files into an intemal investigation folder and had them humedtoadisc. Ilooked at the disc to verify that they were the logs thatlpnlled. ^. lam familiar with these logs because of my work asasystems administrator. Afterlpnlled the logs,they were ht^medontoarewritable disc by another individual. Ireviewed the contents ofthe disc to ensure it contained the logs thatlpulled. The disc labeled ^^Log Files 902^^ MI 2011^000^" contain the logs thatlpulled. Prosecution E^hihit^^ for Identification isacopy ofthis disc. lattested to the authenticity ofthese logs on2I June 2012(BATESni^mher: 00449439). Ipulled the logs from the server and did not alter the content ofthe logs in any way. lhave no reason to believe anyone else would ha^e modified the logs in any way while they are on the server as permissions to the ^^DM^" are very limited.

^^^^^^^i^^i^^B^^^^^

^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^

ANGELM O^RGAARD CPT,JA AssistantTrial Counsel

THOMAS HURLEY MAJ,JA Defense Counsel

BRADL^^ MANN^^^ PFC, USA AccLtsed

UNITED STATES OF AMERICA STIPULATION OF EXPECTEDTESTIMONY SAJohnWilhur ^ June 2013

Manning, Bradley E. PFCU.S.Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall FortMyer,Virginia 22211

It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that ifSpecial Agent John^ilhnr were present to testify dnring the merits and pre-sentencing phases of this court-martial, he would testify suhstantially as follows: 1. lam currently the senior Special Agent (SA)at the computer forensic unit in the office of the Special Inspector General for theTroubled Asset ReliefProgram(TARP) at theTreasury Department. In this position,Icollect and examine digital e-^idence to support criminal investigations. Iha^e held this position since January of20I2. Pre^iously,IwasanSAforthe Department ofthe Army'sCriminal Investigation Command(CID), Computer Crimes and In^estigati-^eUnit(CCIU). Iheld that position from June of20I0to January of2012. Asa CCIU SA,Iinvestigated the unauthorized exfiltration of classified and sensitive data and the loss ofpersonally identifiable information (PII) data worldwide. lalso investigated intrt^sions into Army computer systems. Icnrrentlyha^eo^er twenty years oflaw enforcement experience, fifteen ofwhich have been primarily devoted to conducting complex criminal and administrative cyher^related investigations. 2. Iha^e had snhstantial training to qualify me tor my position. Ireceived Department ofState law enforcement training in 2005, CID law enforcement training in 2002, and Police Officer training in 1990. In addition to the evidence-handling training included in these conrses,Ialso attended the ^^Advanced Crime Scene Investigations" course at the Federal Law Enforcement Training Center in Glynco,Georgia (May2008). At the time of my involvement in this investigation, my cyber security and forensic evidence experience was extensive. Among other cot^rses,Ihad attended multiple coLirses put on by Guidance Software, the makers of the EnCase
forensic tooLlhadatter^ded the ^^Sei^ed Computer Evidence Recovery Specialist Certification

Co^rse"(Octoher2001)at the Federal Law EnforcementTraining Center: andlhad attended ^^FT210,^indows Forensic Examinations" throt^gh the DefenseCyberlnvestigationsTraining Academy (DCITA). Further,Ihad obtained training in: ^^LawEntorcementTechno1ogy"(ApriI 2002)through the University ofPittsburgh:^^Advanced Data Recovery" (March 2001)and ^^Basic Data Recovery" (Jannary2000)at the National ^hite Collar Crime Center: ^^Operational Information Secnrityland II" (July2000)at the Defense Information SecurityAgency: and ^^Computer Search and Seizt^re" (June 2000)through the FBI Academy. lhave continued to develop my skills and expertise. lhave attended training in ^^^indows^Forensics" at Access Data (December 2010), the ^^Computer Incident ResponseCourse" (April 2011)andacourse on ^^Introduction to Networks and Computer Hardware" (December 2010)through DCITA. 3. My role in this case was to assist in witness interviewing and data collection. Icollected evidence from the United States Central Command (USCENTCOM) server and from the PROSECUTION EXHIBIT 1 1 for i ^ t i ^ a f i o n PAGE OFFERED: PAGE ADMITTED:

PAGE I OFJL PAGES

Department ofState (DoS) server. In collecting the USCENTCOM materials,Iworked with Mr. Jacob Grant to collect both the server logs as well as information fromaparticular folder. 4. ^hen collecting and handling evidence,Ifollow several general procedi^res. After collection, Ireview the evidence property ctrstodydoct^ment for the appropriate information. Ifillontthe date^time^placeofcollection and descrihe the evidence collected. Irecord, for example,serial mtmbers, markings tor identification, and condition description matching the associated evidence. Frrrther,Iensi.ire that the necessary information, si.ich as date and time, are properly and accurately recorded. Lastly,Imaintain secure cnstody of the ev^idence prior to transferring it to another individual. In addition to following these procedures,when transferring to or receiving evidence from another person,Iam also sure to properly sign,date,and note the reason for the transfer. 5. FromtheUSCENTCOMserv^er, Mr. Grant andlcollected information fi-om the USCENTCOM SharePoint site as well as the at^dit logs which track access to the site. Iwas interested in this information so that inv^estigators could compare compromised information regarding the Farah investigation to information on the USCENTCOM server, and so that investigators cot^Id identify computers which were used to retriev^e potentially compromised material. Befi:ore Mr. Grant orlcould accessed, imaged, searched for, or extracted any information,we needed special authorization from MG Jones,Chief ofStaff, USCENTCOM. CCIU forwardedaformal written request throLjgh the Office ofthe Staff Judge Advocate to the USCENTOMJ-^reqi^esting release ofthis ev^idenceon9August 2010. This request was approved on19AugList 2010. The same day,Iworked with Mr. Grant to prepare for evidence collection by getting in order the equipment we would need for collection. Mr. Grant ensured that the laptop, hard drive, and cables we would need were clean of any data and ready for tise. ^. The following day,Mr. Grant collected from theJ^shopaDVD containing the audit logs for the USCENTCOM SharePoint server. The logs show,among other things, the date^time USCENTCOM doci^ments were accessed on the SharePoint server, from Decemher 2009 Ltntil At^gnst2010. On 20 August 2010, he signed that e-^idence over to me. Itook possession ttsing the evidence handling proceduresldescribe herein including, bnt not limited to,documenting it on an Ev^idence Property Custody DocumentDAForm4137 (labeled as doci^ment number (DN) 122^10(BATESnLimher: 00411111). Later that same day,IproperIy signed that evidence over to the CCIU Evidence Custodian, Ms.Tamara Mairena. AtnopointdidlaltertheDVDorits contents. lhave no reason to helieve it suffered damage or contamination in any way. 7. In addition to collecting the logs,Iworked further with Mr. Grant to access and collect information from the USCENTCOM SharePoint collaboration space on the USCENTCOM server. SharePoint isatool produced by the Microsoft Corporation to create an intemet interface which allows users with access toaSIPRNETwebsite to collaborate, for example, by sharing files. The USCENTCOM SharePoint itselfis only accessihlev^iaSIPRNET,soausermnst access it via secLtre systems andapropersecttrity clearance. The server si^pporting it, from which Mr. Grant pnlled the logs,is on virtital machines withinacltrster,inadata center, ona storage area network (SAN). Only authorized USCENTCOM HeadquartersJ^personnel are granted access to the facility. The data center is protected by badge access, cipher locks, video sLtr-^eillance,and an access roster. This information was located on SIPRNET in theJAG folder

on the USCENTCOM SharePoint page. Mr. Grant assisted me in locating it on the system, ^e sat at his workstation to pt^ll the folder contents, ^eknew where to focns our search based on Mr.Grant'sSIPRNETwebpage address identifications ofthe information at isstre and because investigators in the case had cause to suspect the charged information was housed in the USCENTCOMJAG folder. In const^ltation with investigating forensic examiner SA Dave Shaver,we determined the most forensically sot.ind way to collect the Farah information itself, as well as information ahottt how it was accessible on SharePoint,was to navigate through the series ofdigital folders to download the Farah file itself. As we navigated throngh the folder str^ctt^re on the SharePoint ser^er,we took screenshots ofthe contents of each folder, hefore we entered the snbsequent folder. Ascreenshot is the process of obtainingadigital copy of the computer screen, similar toaphotograph. 8. Dttring the morning of20Augt^st2010,Iconnected,viaaUSBcahIe,aCCIU-issned Voyager driiBe dock to the laptop which accessed the SharePoint serv^erviaaUSB cable. I connecteda400GB Seagate Barracuda, SATAhard drive (Serial Nnmher:3NFODYJ1)to the laptop using the drive dock and assigned that drive the letter ^^X^^. Using Microsoft's Intemet ExpIorer,Inavigated to the SIPRNETwehpage^^v^^ww.nonrel.cie.centcom.smil.mil". From this screen,IcIickedonthe^^Organization"link. Icreatedascreencaptnreofthispageandsav^edit inafolder in the Desktop Directory called ^^screen shots". From this screen,Iclicked on the ^^SpecialStaff^^link, Icreatedascreencaptnre ofthis page and saved it in the ^^screen shots" folder. From this screen,Iclicked on the ^^Judge Advocate" link. Icreatedascreencaptnreof this page and sav^ed it in the ^^screen shots" folder. From this screen,lclicked on the ^^JA Doct^ment Page" link. Icreatedascreen capture of this page and saved it in the ^^screen shots" folder. From this screen,lclicked on the folder icon ^investigations". Icreatedascreencaptnre ofthis page and sav^ed it in the ^^screen shots" folder. From this screen,lclicked on the folder icon^^Farah". Icreatedascreencapttire of this page and saved it in the ^^screen shots" folder. The folder^^Farah" contained the followingst^b-foIders,^^AdminMateriaI",^^Briefs",^^EmaiI" ^^In-^estigationsTabs",^^ReportsandEXSUMs",^^Timelines", and^^Videos". Inavigatedtoeach of the sub^folders and createdascreen capture for each page then saved it in the ^^screen shots" ti:older. The screen shots showed how the SharePoint portal was arranged and the path to the ^^Farah^^ folder 9. Prosecution E:^hihit(PE)^^ for Identification isacompttter printout that shows the file names and their associated paths that we navigated. It isaprintoTitofadirectory listing showing thefilenamesof each file and folder contained within the Farah folder on the USCENTCOM serv^er with indiiBidual line numhers printed to the left ofthe listing. It lists the first lev^el of suhfolders within the Farah folder alphabetically,and then lists thefilenamesof the first st^hfolder. The document continues this process oflistingsubftolder names recnrsive1y,nntil all files and theirfilenamesin all suhfolders hav^e been listed. 10. Later in the day on 20 A^gnst 2010,Irecreated the folder ^^Farah"on the Desktop Directory ofthe laptop and included all ofthe snbfolders that resided in the ^^Farah" folder. Ithen downloaded each individLial file contained in the folder ^^Farah" into the same location inside the recreated ^^Farah" folder on the Desktop Directory ofthe laptop compt:iter. After verifying that all of thefilesdownloaded correctly,IinstaIled EnCase version ^,14.3 on the laptop computer.

Using EnCase,IcreatedalogicaI evidence file of the folder ^^Farah" and all ofits sub^folders. The logical evidence file was named ^^JA Investigations FarahFolder.LOl". AnMD5hashof 4^e11229a5d^78cabf9c3fa^839f^^2c was ohtained and recorded. The logical evidence file of the folder ^^Farah" was placed inafolder named ^^EnCase"on the root of the ^^X^^driv^e connected to the laptop.Ialso copied the recreated ^^Farah^^ folder and all ofthe snb^folders and placed them onto the root ofthe ^^X^^dri-^e. St^hseqt^ent1y,the folder ^^ScreenShots^^ was then copied and placed on the root ofthe ^^X^^ drive as well. 11. ^^enheginning the process of navigating throt^ghtheJAG folder to ohtain the Farah contents,Iwas not reqttired to enter any login or password window on the main page. Iwas able to navigate to any page and access all folders and documents in the document lihrary, inclt^ding the SJAInvestigations folder and the Farah folder without ev^er entering any anthentication or credential information. In the Farah folder, all of the ^^video"fiIes were password protected,including theafile named ^^BE22PAX.zip^^containingavideo named ^^BE22PAX.wmv^^. ^etherefore also requested and received the password to unlock the file named ^^BE22PAXzip" and the othervideos from USCENTCOM PE^^ for Identification is aCD containing the file named ^^BE22PAX.zip" and the ^ideo file named ^^BE22PAX,wmv". PE^^ for Identification contains the password for the file named ^^BE22PAX.zip" whichi received from USCENTCOM 12. Later on 20 At:ig^st 2010,Iconnectedasecond 400GB Seagate Barracnda,SATAhard drive (Serial Numher:3NFOHTG4) to the laptop using the drive dock and assigned that driv^e the letter ^^Y^^. Ithen recreated the processasecond time placing the folder EnCase, containing the EnCase logical evidence file for the folder ^^Farah^^, the recreated folder ^^Farah^^, and the folder ^^ScreenShots^^ onto the root ofthe ^^Y^^ drive. The second evidence drive was created asa hackt^p in case the first evidence dri^esnfferedafail^re. 13. Ilater collected as ev^idence two SATAhard drives. These SATAhard drives each contained images ofthree folders (EnCase, Farah, and Screen Shots), copied from the USCENTCOM SharePointserv^er IP address 131.24047.23, which wasdoc^mented on Evidence^Property Ctrstody Document (EPCD),DocLimentNi^mher(DN)123^I0(identified at BATES nt^mber: 00411113). In processing this material,Ihandled and transferred the evidence aslha^e heen trained. Atnopointdidlalteranyevidencelcollected. lhave no reason to helieve this ev^idence was contaminated or damaged in any way. On 20 August 2010,Iproperly signed this evidence over to Ms.Tamara Mairena, the CCIU Evidence Custodian, Ididnot touch this evidence again, 14. Finally,Itook possession of firewall logs from the Department ofState from SA Ron Rock. Itook possession ofthis evidence on 150ctober 2010. He provided this information onasilver CD marked with the words ^^^ikileaks DoS Firewall Logs 130ctober 2010" The CD hadared U.S.Govemment SECRETsticker on it. Irecognize it as an official sticker becanselhav^e handled classified information hefore. Ihandled this evidence consistent with procedtiresasi have heen trained and previously described. Upon taking cttstody,Ichecked to enstrre the ev^idencelwas receiving matched the description on the DAForm4I37,laheled as DN 151^10, Item1(identified at BATES number: 00411151). Ichecked the date,time,and other collection information. And finally,lsigned in the ^^Received By" column, ^hile in possession ofthis

ev^idence,Imaintained positive control. Idid not alter the information on the CD. lhave no reason to believe this ev^idence was damaged or contaminated in any way. OnI8October2010, Iproperly signed this evidence ov^er to Ms.Mairena, the CCIU evidence custodian, Ididnot toTich this evidence again. PE^^ for Identification is DN 151^10, Item I .

^tuv'^^3'"^i^^'^
ASHDEN FEIN MAJ, JA Trial Counsel THOMAS F. HURLEY MAJ, JA Military Defense Counsel BRADLEY E. MANNING PFC, USA Accused

UNITED STATES OF AMERJCA STIPULATION OF EXPECTEDTESTIMONY Mr.JamesFung DATED: ^June2013

Manning, Bradley E. PFCU.S.Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Flail Fort Myer,Virginia 22211

It is hereby agreed hy the Accttsed, Defense Counsel, andTrial Counsel,that ifMr. JamesFung were present to testify during the merits and pre-sentencing phases of this courtmartial,he would testify substai^tially as follows: 1. Icurrently work as the supervisor ofthe Cyber Security Operations Group at Brookhaven National Laboratory (BNL)in Upton, NewYork. This Group is responsible for the security posture ofBNL and is constituted by one physical site where multiple BNL departments'IT directorates centralize their security operations. As supervisor,Ioversee the daily operations of this Group. These operations ir:iclude intrusion detection, audit log collections, andCyber Security Incident ResponseTeam(CSIRT) activities. Audit log collection entails collecting electronic audit 1ogs,which track the time^date and user activities ofindividuals using BNL computers. These logs are used to analyze the BNL system for security v^ulnerabilities and also to secure data regarding suspected security violations. TheCSIRTteamisresponsihlefor detecting, responding to, and investigating cyber security violations as well as pursuing allegations offraud,waste, and abuse. In its work,we collaborate with the BNL human resources department, on-site security,and law enforcement. lhave held my supervisory position for six yea^s. IhaveaBachelors degree in IT Management and am certified asa Forensic Analyst by the computer security professional association Global Information Assurance Certification(GIAC). 2. Ifirst became involved in th:^s case after CSIRTmembers,whomIsupervise, alerted me that the desktop work station computer ofaBNL employee identified as Mr.Jason^atz had been used contrary to BNL policy.Toinvestigate this suspected misuse, two members of the CISRT team collected Mr. I^atz'sBNL desktop computer. Based onBNL'sreport to federal law enforcement officials, investigators in the present case against PFC Manning became interested in the contentsofthe BNL desktop computer assigned to Mr. ^at^,which my team collected. No rationale for this interest was communicated to me. 3. Mr. I^atz worked asaSystems Administrator for the Physics Department atBNL. He was hired asaJunior Systems Administrator, and was employed fromFebruaryof2009 until March of2010. His primary responsibilities were to help maintain the computers that processed data for our Relativistic Heavy Ion Collider (RHIC) as well as theATLAS Computing facility (RACE). As BNL has the capacity to process large amounts of data through our super computer systems, Mr. ^atz was further responsible for helping to manage the queue of^ohs submitted from institutions throughout the world, who seekBNL'sassistance in processing large amounts ofdata. For example, research universities send large amountsofresearch data to us, as our facility can process data with the power offive hundred computers.

PROSECUTIONEXHlBIT^foride^fi2ation PAGEOFFERED: PAGEADMI^ED PAGE ^ O F ^ PAGES

4. Our CSIRT team became suspiciousofMr.^atz when his desktop computer was removed from our BNL network. This happens automatically when our system detects that the BNL computer attached to this accou:i^t is used inaway that violates BNL user agreements, ^^ena machine is blocked or disconnet::ted from our BNL network, it is no longer usable^including for work purposes. Mr. ^atz approached our office to have his desktop reconnected to the networkalleging that he had been kicked off after accidentally clickingaprohibited link in an email on his personal account. Following this explanation,we reconnected his computer to the network. Howev^er, upon consiLlering the matter further,Idecided this was unlikely given the activity detected. According1y,Inotified our Laboratory Protective Division (LPD),legal department, and human resources office ofthe suspicious activity and initiated an investigation. Subsequently,an armed LPD officer was dispatched to Mr. ^atz'soffice. Ifurther dispatched two members of my CSIRT team to respond. Mr.^ithers was part ofthe CSIRT team. He was the team member to first identif^^ the suspicious activity associated with Mr. I^atz'sBNL desktop computer. Further, given Mr.^^ithers prior BNL work in the same section as Mr.I^atz,! considered Mr.^ithers knowledgeable about Mr. I^atz'sofficial duty position. After collecting Mr. I^atz'scomputer,Mr.withers delivered the machine to our secure forensic laboratory to be forensically imaged by Mr. McManus ^. Access to our forensic laboratory is secured by access key card. OnlymemhersofourCyber Security Group have this access. Further, the lab containsasate used to house evidence securely. This safe can only be accessed whenakey and pass code are used in conjunction. Only two people hold this key^myse1fandacolleague,who is alsoamember of theCyber Security Group. Only members ofthe Cyber Security Group have pass codes to the safe. 7. Later my team searched the forensic image created by Mr. McManus. Our search revealed the presence ofpassword cracking programs,which are commonly used to break file passwords. Tothe best ofmy knowledge, there is no reason Mr.I^atz would need these programs for work purposes.Ilater confirmed this understanding with Mr. Ii^atz'sthensuperv^isor Mr. Chan. Ido not recall seeing anything related to^ikiLeaks on Mr. I^atz'scomputer. This would have been beftorelhad heard of^ikiLeaks, soldo not know iflwould remember it i f l d i d . 8. At no point during the detection of suspicious activ^ity or the ensuing investigation and examination didi alter Mr. I^atz'sBNL computer, its hard drive, its other components, or its contents in any way.Furthermore,Inever altered any forensic image made from this computer in anyway. At no point didlobserve anyone alter the computer, its hard drive, its other components, or it contents in any way. Likewise,Ihave no reason to believe the evidence was damaged or contaminated in any way.

^ ^ ^ B ^ ^ ^ ^ ^ i ^ ^ ^ ^ ^ ^ i B ^ ^

ASHDENFEIN MAJ,JA Trial Counsel

THOMASFHURLEY MAJ,JA Defense Counsel

BRA PFC, USA Accused

UNITED STATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Mr.Ale^ Withers DATED: ^June2013

Manning, Bradley E. PFCU.S.Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall FortMyer,Virginia 22211

It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel, that ifMr. Alex withers were present to testify during the merits and pre-sentencing phasesofthis court-martial, he would testify substantially as follows: 1. Icurrently work as an Investigator in the IT Di-^isionofBrookhaven National Laboratory (BNL)in Upton, NY. SpecificaIIy,Iam part ofaCyher Security Incident ResponseTeam (CSIRT). lhave held this position for five years(since September of2008). Prior to that,I worked as an AdvancedTechnology Engineer, responsible for helping to maintain the computers that process data for our Relativistic Heav^y Ion Collider (RHIC) as well as theATLAS Computing facility (RACE). BNL has the capacity to process large amounts of data through our super computer systems. According1y,in my previous position,Iwasft:irther responsible for helping to manage the queue of^obs submitted fi-om institutions thr-oughout the wor1d,who seek BNL'sassistance in processing large amounts of data. Iheld that position for four years. 2. IholdaBachelorsandaMasters degree in Computer Science. lalso hold three certifications fi-om the computer security professional association Global Information Assurance Certification (GIAC)^oneinForensic Analysis, one in Incident Handling, and one in Intrusion Analysis. 3.Ifirst became involved in this case afterldiscovered suspicious activ^ity on the desktop work station computer assigned toaBNL employee identified as Mr. Jason I^atz. Based onBNL's report to federal law enforcement officials, investigators in the present case against PFC Manning became interested in the contents ofthe BNL desktop computer assigned to Mr. ^atz, whichlcollected and forensically examined. 4. In my CSIRTposition,Imonitor information system security for BNL. In early March of 2009,Idiscovered the BNL desktop machine assigned to Jason I^atzhadaFirefox extension. An extension isaprogram that tuns within the Firefox internet hrowser and that enhances the user'sabilities For example, an extension could allowauser to project his/her Intemet Protocol (IP) toadifferent location, and i:-outethroughadifferent IP address,so that his/her actions on the web would appear to have originated in that location instead ofthe user'sactual location. In this instance, the extension on Mr. ^satz'smachine implied that Mr. ^atz had bypassed BNL proxy serv^ers designed to monitor BNL computers'internet traffic. Ifurther inv^estigated this activity by reviewing logs created by BNL reporting software. This review revealed that Mr. I^atz's BNL desktop machine hadalarge amount ofSecure Shell (SSH) traffic. SSH isacomputer protocol, or computer communication language, that facilitates secure or encrypted communications. This information,when taken in conjunction with my review ofBNL firewall logs, suggested that Mr. I^atz was transferring files between his BNL machine and another PROSECUTION EXHIBIT^^^i^id^ti^^^^t^^^^ 1 PAGEOFFERED: PAGEADMITTED: ^AGE ^ G P ^ PAGES

computer outside his home using an SSH, or encrypted, connection.Iknowthe network to which he connected was not his home computer, as the IP address to which this connection was made did not match his home IP address, ^hilelcould not tell which types offileswere transferred, having previously occupiedaduty position responsible for many of the same activities as Mr. ^atz was then responsible,Iknt:iw it is possible forauser in Mr. ^atz'sposition to have hidden files in the BNL system and to hav^e used the BNL computing power to run personal tasks. For example, the BNL super computer power could significantly reduce the amount oftime it would take to decrypt an encrypted file withoutapassword. lalso knowthat the BNL desktop C D R ^ and USB drives would have been enabled on his work computer. These could have been used to transfer data onto remov^able media. 5. This, and other suspicious activity,resulted in further inv^estigation. U1timately,our system detected that Mr. ^atz'scompu^:er had accessedawebsite known to contain pirated files, ^e were ahle to find this because Mr. ^atz upgraded toaweb browser that hadabug that allowed me to see what websites Mr. I^atz was visiting. Pirated files are illegally obtained files. Icannot recall all ofthe websites visited by Mr. ^atz. The only one thatlremember specifically is Pirate Bay,awebsite that allows fi:or the improper downloading of monies and other entertainment media. As this was against user agreement po1icy,the BNL system automatically blocked Mr. I^atz'sdesktopcomputer^esse:oitia11y removing it from the BNL system. The ensuing investigation included the collection ofMr.^atz'sBNL desktop computer fi:or forensic imaging and fiirther investigation. Iknow this becauselwas part of the team to report the initial suspicious activ^ity to my supervisor Mr. James Fung. Ithen met with and accompanied responding law enforcement personnel to Mr.I^atz^sworkstation for the collection ofhis computer. Mr.I^atz: was present at the time we obtained the BNL computer. ItwasaDell Optiplex 9^0 computer withaLinux operating system, bar code number138^94. At the time of coIIection,we checked to make sure the computer did not contain any removable media devices such asathumb drive. Then, my CSIRTcoIleaguesandlaccompanied that computer to the forensic laboratory for forensic imaging by Mr.James McManus. Mr. McManus is an IT Architect atBNL. ^. Following this imaging process,our Cyber SecurityTeam further examined this forensic image. Iknow our team examined it becauselparticipated in that examination. Our investigation revealed that Mr. I^atz had password cracking software on his BNL desktop computer. AdditionaIly,the computer housed at least part of an encrypted.zip file,which, it appeared, Mr. ^atz had attempted to break into or decrypt using the brute force attack method. The brute force attack method means usingacomputer-generated or pre-generated list of possible passwords to crack an unknown password by running different passwords against the file one atatimeatavery fast rate, ^ e d i d not hav^e the password to this file and so could not open it. Our search also revealed movies that had been downloaded and saved to Mr.^atz's work computer. Ido not recall whether WikiLeaks was mentioned in any way on Mr. ^atz's computer. This was priorto my hav^ing heard of^ikiLeaks,soImay not hav^e noted its significance at the time. 7. At no time, prior to,during, or after the collection ofMr.^atz'sBNL computer didlalter its hard drive,its other components, or its contents in any way.Furthermore,Inever altered any forensic image made from this computer in any way. At no point didlohserve anyone alter the

computer, its hard drive,its other components, or its contents in any way. Likewise,Ihaveno reason to believe the evidence vt^as damaged or contaminated in any way.

ASHDEN FEIN MAJ, JA Trial Counsel

J-^trvvuM^^^^^-^^^ THOMAS F. HURLEY MAJ, JA Defense Counsel

E. MANNING Bl PFC, USA Accused

UNITED STATES OF AMERICA


^.

Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall Fort Myer,Virginia 22211

STIPULATION OF EXPECTEDTESTIMONY Mr.James McManus DATED: ^June2013

It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that ifMr. James McManus were present to testify during the merits and pre sentencing phases of this court-martial, he would testify substantially as follows: 1. Icurrently work as an IT Architect at Brookhav^en National Laboratory (BNL)in Upton, New York. In this capacity,Iperform forensic imaging ofthe computers our Cyber SecurityTeam confiscates and perform forensic analysis ofthose computers with^indows operating systems, lalso control anti-v^irus for the approximatelyfiv^e-thousandcomputers connected to the BNL system,and run penetration testing on BNL servers to ensure they are secure. IworkwithMr. Alex withers. Mr. James Fung is my supervisor. lhave held this position for two years. Forthe five preceding years, my^obtit^e was Senior Engineer: however, myresponsibilities have remained the same. Ihav^e worked atBNL for thirty years,and have worked with the Cyber Security Group for ten of those years. For the past five years,Ihave attended at least one System Administration Network Security (SANS) course on network security and forensic examination per year. The courses also cover how to handle digital evidence. 2. Ifirst became inv^olv^ed in thiscase after forensically imaging the hard driveofadesktop work station computer ofaBNL employee identified as Mr.JasonI^atz,which had been collected upon suspicion ofhaving been used contrary to BNL policy. Based onBNL'sreport to federal law enforcement officials, investigators in the present case against PFC Manning became interested in the contents of the BNL desktop computer assigned to Mr. ^atz,whichIprocessed. 3. On24 February 2010,Ireceiv^edaDellOptipIex 9^0 desktop computer assigned to Mr. li^atz fromMr.AIex^ithers. After receiving the computer,Isecured it in our evidence safe in our secure forensic evidence laboratory. The lab is accessible only to the sixBNLCyber Security team members,who must use secure key card to gain entry. Akey and pass code are required to open the safe. It is only accessibly ifeither Mr. Fung or his associate, who also works in our Cyber Security Group, are present, as they are the only individuals with the required key. Only Cyber Security Group members hav^e the required pass code. 4. On 25 February2010,whi1e in our secure forensic evidence laboratory,Iremoved the hard drive from the Dell Optiplex 9^0 BNL desktop computer collected from Jason ^atz. lobtaineda forensic image ofthis hard drive using the program FTI^ imager. Ifollowed standard imaging procedures on whichlhave been trained and whichlhave used before. 5. Aforensic image of an item t:if digital media is an exact copy ofthe data on the digital media. Digital forensic examiners image devices so that the originally collected device can be PROSECUTION EXHIBIT ^^Ii:or identification PAGEOFFERED: PAGEADM ITTI ^ED: PAGE^ G F ^ P A G E S

forensically ex^amined without :risking contamination ofthe original data. This is standard practice by digital forensic examiners. The software fcirensic examiners use to image the digital evidence has built in procedures to verify that the item has been successfiilly duplicated. For example, the program will note the MD5 hash or Secure Hash A1gorithm1(SHA1)hash value of an item of digital ev^idence before imaging(acquisition hash value)and after imaging the item (verification hash value). Ifthe two hash values match, the item has been successfully duplicated bit-for-bit. The hash value is determined by mathematical algorithm and is displayed asanumber^letter identifier unique to every item of electronically stored information. It is the equivalent ofadigital fingerprint, ^hen the hash value is generated, the entire hard drive will haveahash value, as well as each individual file on the hard drive. Ifthere is any alteration to the hard dri-^e or to any file on i:he hard drive, the acquisition and verification hash values will not match. The alteration can be as small as addingasingle space into text document or saving the data toadifferent size de-^ice. In this case,IusedFT^ Imager forensic software to complete this imaging process. FTI^ Imager is similar to EnCase and is widely used by digital forensic examiners. lalso usedawrite blocker when imaging this driv^e in order to ensure the originally collected evidence was not altered in any way. Aslstated earlier,Ihave received training on FTI^ Imager and have used it in my other work. lencountered no errors while conducting the imaging ofthe evidence at issue in this case ^. IprocessedaBNL owned Dell Optiplex 9^0 desktop computer hard drive with Linux operating system, serial numher9S^3MBE3,bar code 138^94. Imadeaforensic image of this drive for our lab'sintemalexan^ination. In doing so,lidentified the SHAI hash value ofthe hard drive collected to be ^0a5cd8caf580f7c1bba415f793550a7349afIbcAtno point duringmy handling of the ev^idence in question didlalter the computer, its hard drive,its other components,or its contents in any way. At no point didlobserve anyone alter the computer, its hard driv^e,its other components, or its contents in any way. lhave no reason to believ^e the evidence was damaged or contaminated in any way.

J4vnwLL
ASHDEN FEIN MAJ, JA Trial Counsel THOMAS F. HURLEY MAJ, JA Defense Counsel BRADLEY E. MANNING PFC, USA Accused

UNITED STATESOF AMEIHCA


^ k

STIPULATION OF EXPECTEDTESTIMONY SATroyM.Bettencourt DATED:


^

Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall FortMyer, Virginia 22211

June 2013

It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel, that ifSA Troy M.Bettencourt were present to testify during the merits and pre-sentencing phases ofthis courtmartial,he would testify substantially as follows: 1. lamaSpecial Agent (SA)for the Special Inspector General for theTroubled Asset Relief Program (SIGTARP),U.S.Department oftheTreasury. SpecificaIIy,Iworkfi:or the Computer Forensics Unit(CFU),SIGTAFT^. My currentiob title is Senior Special Agent (SSA)andlam located in^ashington, DC. As an SSA for the CFU,my^ob primarily entails providing digital forensic and e-Discovery support to SIGTARP^s nationwide criminal investigations. lalso conduct criminal inv^estigationsof crimes within SIGTARP^s investigative purview. lhave serv^edasaSpecial Agent for SIGTARP for approximatelylandahalf years. 2. From November 2010to December 2011,IwasaSpecial Agent for theU.S.Army Criminal Investigation Command(CID). Specifically,Iworked for the Computer Crimes Investigation Unit(CCIU). Iwas assigned to the^ashington Metro Resident Agency,CCIU,and investigated crimes within CCIU^s investigative purv^iew,withafocus on the PFC Manning investigation. 3. From June 2007 to November 2010,Iwas an administrator with the Punta Gorda Police Department wherelwas responsible for accreditation, staff inspections^audits, administrativ^e^management studies, personnel supervision, media relations, and forensic imaging^preliminary analysis ofdigital evidence in cases ranging fi-om prostitution to homicide. 4. From May2005 to June 2007,lowned and operated my own business. From October 2001 to May2005,IwasaSpecial Agent with CCIU. Isupervisedateam of special agents responsible for investigating crimes within CCIU^sinvestigativ^e purview. Iwas also assigned as the CID liaison to theU.S.Army Computer Emergency ResponseTeam(ACERT) and the Joint Task Force-Global Network Operations(JTF-GNO). 5. FromFebruary 1999-September 2001,IwasaSpecial Agent with the Hawaii Field Office, CID,wherelserv^ed as an assistant team chief ofadrug suppression team, as well as an investigator onageneral crimes investigative team andachildabuse^sexual crimes investigative team. 6. I earned a Masters of Public .Administration (Criminal Justice Administration) from Troy University located in Alabama. I have had extensive training in evidence collection and

PERSECUTION EXHIBIT I k for i ^ t i f k a f i ^ PAGEOFFERED PAGE ADIVHTTED: PAGE 1 OF PIPAGES

handling to include, but not limited to, the17-week Apprentice Special Agents Course. In terms of computers and fi:orensics training,lhave completed multiple courses over the years. I completed three courses at the Defense Cyber InvestigativeTraining Academy (DCITA) in Linthicum, Maryland, between the years 2001 and 2011, which covered digital media collection issues. From 2002-2003,lattended two courses at Guidance Software in Reston,Virginia(the manufacturer ofEnCase). During this timelalso completed four courses at Learning Tree InternationaI,which focused on information network security. In 2003,Icompleted the Federal Law EnforcementTrainingCer^iterSeizedEvidence Recovery Specialist training^certification in Glynco, Georgia. In 2009 and 2013,lattended two courses conducted byAccessData (manufacturer ofFTI^).In 2012,Icompletedatraining^certification course on use ofthe CellebriteUniversalForensic Extraction Device. These courses all discussed the collection, handling, and^or forensic analysis ofdigital evidence. 7. learnedaDepartment ofDefense Certified Digital Media Collector certificate in 2011from the Department ofDefense Cyber Crime Center (DC3),which must be renewed every two years, lhave not renewed it asino longer work foraDepartment ofDefense entity. learned the Federal Law Enforcement Training Center Seized Evidence Recovery Specialist certification in 2003,which did not require recertification. learned the CellebriteUniversalForensic Extraction Device (UFED)Certification in 2012,which does not require recertification. lalso earned the following certifications which have since lapsed: Learning Tree International Network Security Certified Professional (2003): Guidance Software Encase Certified Examiner (2004): AccessData Certified Examiner (2009). In addition to my training and certifications,Ihave investigated or supervised more thanlOO investigations involving computer crime and investigated or supervised between 200-300 criminal investigations urrrelated to computer crime. 8. On 30 August 2011,as part ofthis investigation,Idown1oaded the ^^Cablegate" archive from ^^www.wikileaks.org" based on press reports indicating that all Department ofState diplomatic cables in the possession of^ikiLeaks had been posted on the WikiLeaks website. Thearchivel collected contained 251,287 pur-ported Department ofState diplomatic cables or messages. The purported cables ranged in date from19^^ to February2010. Iknow this becauselpersonally reviewed the ^^Cablegate" archive after collection. This review ofthe contents ofthe archive revealed that no information had been redacted from the files.

LO:^ "h/xuv^
jpDEAN MORROW (cPT, JA Assistant Trial Counsel

THOMAS F. HURLEY MAJ, JA Military Defense Counsel

BRADLEY E. MANN PFC, USA Accused

UNITEDSTATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY SAI^irl^Ellis ^ June 2013

Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall Fort Myer,Virginia 22211

It is hereby agreed hy the Accused, Defense Counsel,andTrial Counsel,that i f S A ^ i r k Ellis were present to testify during the merits and pre-sentencing phases of this court martial, he would testify substantially as follows: 1. lam currentlyaSpecial Agent (SA)criminal investigator and certified digital forensic examiner for United States Armiy Criminal Investigation Command(CID). lam assigned to the Rock Island Fraud Resident Agency within the Ma^or Procurement Fraud Unit and am currently deployed to Afghanistan. In this position,Iinvestigate fraud cases asacase agent. When in the United States,Ialso provide forensic examination services to our local field offices. lhave held this position for about one year. Previous1y,Iworked at CID'sComputer Crimes Investigative Unit(CCIU)asaComputer Crime Program Manager atFort Be1voir,Virginia and Marine Corps Base-O^^^fico,Virginia. lhave also worked asacase agent with CCIU. lhave beenacivilian SAwith CID since 2008. Before that,Iwas an active duty CID agent for three years atFort Bragg, North Carolina. 2. lhave substantial training to qualify me for my position. lhave attended several courses run by the Defense Cyber InvestigationsTraining Academy (DCITA)in Linthicum, Maryland. I have used the EnCase forensic tool on multiple occasions in my line of work. lamalsoa Department ofDefense Certified Computer Crime Investigator. Ihaveabachelor'sdegreein multi-disciplinary studies withafocus on business and criminal^ustice from Liberty University inLynchburg,Virginia. lhave worked more thanadozen fraud cases, approximatelyadozen cases for CCIU, and about fifty ^ : o sixty cases as an active duty CID SA. 3. Ifirst became involved in this case whenlwasacase agent with CCIU. Throughout the course of this investigation,Iworked with several other SAs on the investigation team, including SABowen,SAWiIhur,SA Edwards, SA Ames,and SA Mander. Primarily,my role on the investigative team was to assist with witness questioning and with electronic data collection. Specifically,SABowenandIcollected the Department ofState (DoS) server logs on 15June 2010. After coordinating with Mr.AIbert^^John"Janek at the DoS for authorization,we collected the logs fromaserver room in the Harry S.Truman Building of the DoS in Washington, DC. Wewere interested in collecting the DoS server logs so we could see users that had accessed the servers,and whatfileswere specifically accessed. Inthisinstance,we collected, or copied, the logs from January2009 to June 2009,and from 30 April 2010to15 June 2010. Wewere not able to collect DoS server log files between Ju1y2009 and 30 April 2010based on an electronic recording gap. The files that were copied were placed in zip" files and named ^^logs.zip" and ^^newlogs.zip." Icollected these logfilesin accordance with the traininglhave received. The DoS gave meahost computer that could access the logs between PROSECUTION EXHIBIT ^ ^ f o r i d e i ^ t i c ^ n PAGEOFFERED: ^PAGEADMIT^ED:^ PAGE^ G F ^ P A G E S

their firewalls and collected the files onaclean USB removable drive (^^thumb drive"). Itwas my practice to wipe and formatathumb drive priorto collection. Wiping is more than^ust deleting: it means forensically removing all information fromadrive. It ensures the device is completely empty ofall types ofdata. Mr.Janek first possessed the thumb drive,and then signed it over to me whenlfinished collecting the files from the host computer. 4. After Mr.Janek signed the thumb drive over to me,Ibrought the thumb drive back to CID. I created an image ofthe information using EnCase. limaged these items of evidence so that the data on the device can be forensically examined without exposing the actual collected contents to examination. The imagelcreated was verified by hash value match. lencountered no errors while conducting the imaging ofthe evidence at issue in this case. Oncelverified that the hash values matched,Isaved the EnCase image onaDVD so that it could be examined and logged it as evidence. Ikt:row it was clean and appropriate for evidence collection for two reasons. First, it was the same type ofDVD our office uses to collect evidence in our standard digital evidence collection practices. Second, it was new and factorymade. Iknowthedatalputontoithad been unaltered because the hash value ofthe logs collected onto the clean thumb drive matched the hash value ofthe logs afterlsaved them to theDVD. TheDVD was marked ^^0028-10cid221-10117Dept ofState Server Logs,199 5^ 188 73"IusedaDAForm4137, Evidence^Property Custody Document (EPCD),Document Number (DN)78-10to describe the evidence,and signed it over to the evidence custodian, Mr. GaronYoung. Ido not have any reason to believe that the evidence suffered damage or contamination. Idid not touch this evidence again. Prosecution E^hihit(PE)^ for Identification is DN 78-10, theDVD containing the DoS server logs.

ASHDENFEIN MAJ,JA Trial Counsel

^^Oc/vvuMr^.-^pZo^ THOMAS F. HURLEY MAJ, JA Military Defense Counsel

BRADfeEYE MANW&G PFC, USA Accused

UNITED STATES OF AMERICA STIPULATION OF EXPECTED TESTIMONY Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211 SA Mark Mander

June 2013

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if SA Mark Mander were present to testify during the merits and pre-sentencing phases of this court-martial, he would testify substantially as follows: 1. On 2 November 2010, SA John Wilbur and I visited Ms. Debra Van Alstyne at Ms. Van Alstyne's residence in Potomac, Maryland. We were searching for a box that had been sent to Ms. Van Alstyne's residence from the confinement facility in Kuwait where PFC Manning had been held. As procedure, the confinement facility collects personal items, like your wallet or clothing, and places them in a container. I thought those items may have some evidentiary value, but we were unable to obtain an authorization to search the container prior to PFC Manning's departure from Kuwait. Once PFC Manning left the confinement facility, the standard procedure is for the facility to ship the personal items to the confinee's home of record. 1 was able to determine that the box had been signed for by PFC Manning's father at Ms. Van Alstyne's residence, so we contacted Ms. Van Alstyne to see if she had received the box as well as to inquire into any other items of evidentiary value in the basement room where PFC Manning had stayed. 2. When we arrived on 2 November 2010,1 noticed that many of PFC Manning's personal items that had been strewn about in June 2010, when 1 last visited Ms. Van Alstyne, were now organized into plastic containers. During the process of looking through the containers, we identified several items of digital media, including digital memory cards. With Ms. Van Alstyne's consent, we collected these items of digital media. One of the items we collected was an SD memory card, bearing the serial number BE0915514353G. Ms. Van Alstyne identified this SD memory card as the property of PFC Manning. 3. Using standard evidence collecting procedures, I collected this SD memory card by marking it with "2123, 2 Nov 10, MAM" for identification. I then recorded it as Item 2 on a DA Form 4137 marked as document number (DN) 162-10. Using the DA Form 4137, I properly released this piece of evidence to the CCIU evidence custodian, Ms. Tamara Mairena on 3 November 2010. While in possession of this item, I maintained control over it, stored it properly, and allowed no one else access to the SD card. I did not alter the evidence in any way. 1 have no reason to believe this evidence was damaged or contaminated in any way. 4. Prosecution E x h i b i t ^ for Identification is the SD card (Item 2 of DN 162-10).

JCunti^^.^^^^J^
AN 'T, JA Assistant Trial Counsel THOMAS F. HURLEY ^ MAJ, JA Military Defense Counsel BRApkEY E. MANN IT PFC, USA Accused

PROSECUTION EXHIBIT 2 i _ f o r i^tification PAGE OFFERED: PAGE ADMITTED: PAGE 1 OF] PAGES

UNITEDSTATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Manning, Bradley E. PFC,U.S.Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall FortMyer,Virginia 22211 SA Ronald Rock June 2013

It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that ifSA Ronald Rock were present to testify during the merits and pre-sentencing phases ofthis courtmartial,he would testify substantially as follows: 1. Icurrently work asaSpecial Agent with theU.S.Department ofState (DoS),Diplomatic Security Service (DSS). Prior to becomingaSpecial Agent with the DSS,Iserved asaSergeant on the DSS,Unifi::^rmed Division from 1999 2001. There,Iprovided oversight for over fifty uniformed officers at nine DoS annexes inWashington,D.C.and Maryland. Igraduatedfrom the DSS,Basic Special Agent Class in Ju1y2002wherelwon the DSS Director'saward as the top graduate. Since then,Ihave served in the DSS Washington Field Office (2002 2004): the Secretary ofState'sProtective Detail (2004-200^):USEmbassyBogota(CoIombia) (200^2008): the National Defense Intelligence College (2008-2009): the Special Investigations Division (2009-2012). During my three years in the Special Investigations Division (SID), wherelwas promoted to Acting Branch Chief in charge of supervising seven other special agents, my portfolio included the responsibility f^r investigating cases of criminal and administrative misconduct by DoS employees, their family members and contractors, as well as employees from other agencies under Chief ofMission authority atU.S.Consulates and Embassies worldwide. lied the investigative effi:ortftor DSS on several high profile cases involving the unauthorized disclosureofDoS classified information. Additionally,Idraftedthe standard operating procedure by which SID currently investigates leaks ofDoS classified information. 2. Icurrently work at theU.S,Consulate in MazareSharif, Regional Command North, Afghanistan. There, myteamandlare responsible for the safety and security of all American diplomats who travel through the nine provinces comprising Northern Afghanistan. 3. In this case,Iwas involved with the coordination for evidence collection, as well as the actual collection of evidence at the DoS.Specifically,Icoordinated with DoS Deputy Chief Information Officer (DCIO)CharlieWisecarver to obtainaCD containing Department ofState SIPRNET firewall logtraffic for IP addresses22225 41 40and22225 41 22 On14October 2010,IvisitedDCIOWisecarverinWashington,D.C.and collectedadisk containing the firewall logs from the DoS classified system. The disk wasasilver CD bearing the markings ^^Wikileaks DoS Firewall Logs 13 OctlOBftboreaUS Government SECRET sticker This disk was important to our investigation as the logs showed connections between the DoS NCD database and the IP addresses ofthe SIPRNET machines assigned to PFC Manning.

PROSECUTION EXHIBIT l A for identification PAGE OFFERED: PAGE ADMITTED: PAGE \ OF 1 PAGES

4. On 15October2010,Isigned the CD marked with the words ^^WikileaksDoS Firewall Logs 13October2010"over to SA JohnWilbur. Ihandled this evidence consistent with procedures as lhave been trained When signing over the evidence,lusedaDepartment ofthe Army Evidence Property Document (DAForm4137) with the label DN151-10and this CD was item1(BATES numbers: 00411151 00411152). While in possession of this evidence,Imaintained positive control. Idid not alter the information on the CD. lhave no reason to believe this evidence was damaged or contaminated in any way. Idid not touch this evidence again. 5. Prosecution Exhibit 68 for Identification is this CD (DN 151-10, Item 1).

J^UHtA^'^f-^
ANGEL M RGAARD CPT, JA Assistant Trial Counsel THOMAS HURLEY MAJ, JA Defense Counsel BRADLE PFC, USA Accused

UNITED STATESOF AMERICA


V.

Manning, Bradley E. PFC,U.S.Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall FortMyer,Virginia 22211

STIPULATION OF EXPECTEDTESTIMONY Mr.DougScliasteen June 2013

It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that ifMr.Doug Schastcen were present to testify during the merits and pre-sentencing phases ofthis court-martial, he would testify substantially as follows: I.Whilelcurrently work foraprivate software company in Seattle,Washington,1was previously the IT Director at WillcoTechnologies. Iheld that position for six years. 1nthatposition,1tookcareofallthe technology-related tasks and served as the main point of contact and database administrator for theU.S. Army'sTrainingt^CertificationsTrackingSystem(ATCTS). TheU.S.Army hired WillcoTcchnologies to build and then maintainadatabase tracking system forU.S.Army Information Assurance (IA) certifications. Idevcloped the database and oversaw its development. 2 Irecognize Prosecution Exhibit ( P E ) ^ f o r Identification (BATES numbers:00411400 00411401)asaprint out from thcATCTS. ATCTS is the databaselbuilt, and it tracks the activity status ofU.S.Army personnel as well as the dates of the users'information assurance (lA)training certifications. Irecognize PE^for ID as the one1providedon31January2012to investigators in the present case against PFC Manning. Along with P E l ^ for lD,1providcd an attestation to its authenticity notarized byaNotary Public and it is identified at BATES number: 00411399. 3. P E ^ f o r l D shows PFC Manning'sIA certification status. It shows that the user name: "Bradley Manning'is no longer active in our system. All soldiers must have IA training, at least, onayearly basis. Asasoldier, he would have an account in our system. P E ^ f o r ID shows PFC Manning'sIA trainings were dated5September 2008 and then310ctober 2009. This tells us that PFC Manning had received the yearly IA training and associated certification necessary for computer usage through October 2010. As ofthe timelprovided this print out in January of2012,PFC Manning had an "inactive status". According1y,his account had been disabled and he wouldn't be able to log in. Auser attains this status when(s)he is not in compliance with the yearly IA requirement. For users who are in compliance, their unit identifiers show up in the lines indicating "command" and "unit". 4. This training information is collected automatically by the Army Signal Command at Fort Gordon, GA,whenauser completes the annual IA exam online. It is then transmitted to our system for automatic updating. Our system further tracks the extra training necessary for users who arc certified as system administrators. Our system shows PFC Manning has not had any ofthe required system administrator trainings.

J^LgW/Ld. J^.^A-^Z.^
iSHDEN FEIN MAJ, JA Trial Counsel THOMAS F. HURLEY ^ MAJ, JA Military Defense Counsel BRADLE PFC, USA Accused

PROSECUTION EXHIBIT %/) for ide/ifification PAGE OFFERED: PAGE A D M I / T E D : PAGES PAGE

Prosecution Exhibit^l 24pages classitied "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classitled supplementto the original Record ofTrial

tn

C D

tn S

CI

cn 2

cn 2

cn 2

e n 2

3
I ?
-I '

s a
S 2. S5 -

? . S S

II

5 s . 5 s

5 s . 5

11;

5 ss I

5g 2 o

O5

oa

2 o

o
o

oa

2 o

o o

2 O

2 o

2 o

2 o

2 o

2 O

oa

. >L
0 0 > >

> I

. > U> U

>U

>U
3 5 '

> L. > U> U


S e o 5
B O

s J a OOO
cn O c n 00 cn o
:uTi N E FEE

1L
s :
5

T l 73

cn o

>

X Z
CK^

s s S s s s g S S 3 S 3 3 3 3 go

s
E O

s
go

s
B O

s
3

s 3

s s s S 3 S 3 eo

s s S 3 BO

S
B O

-T3

GE

IBIT

(/) v. ^

cn o >
D

= 1

:]

%
^

% I = 1 = 1

cn 2

cn 2

cn 2

cn 2

I I I II
S I

S ^ s ^ S 3. S m S 5 S m S 5

I I II

3. 5

3 m 5

5 s

Bi

I |. I I

Ei I I

I -I -

.. 3 3 2. !L 5 5

I I

3 2. 5

I ^

i i.

2 o

o a

o a

2 o

o a

o a o a

2 o

2 o

?t > L
3 '5 3 S

.> U
3 5

>u
" =

> t

.>

> lr

>L

>U
3 's

> L

3 S 3 5- 3 5 3 5'

"= 5:

i
BO

S 3

s
Bo

S eo

g
go

s
BO

BO

BO

BO

= 1

% % = 1 = 1

s
A

UJ

o o ii ii cn 2 H O cn 2 cn 2 o o o cn 2 H ii cn 2 H O o cn 2 H cn 2 o o

o o ii tn 2 o o cn 2 H cn 2 H O cn 2 cn 2

o o

cn 2

cn 2

cn 2

cn 2 H O

o 2

Q 2

Cl 2

Cl 2

Cl 2

s
"htt 3D,,

8
MM,.
"htt

5 o

MM,.

"htt|

"htt

"htt

"htt

"htt

"htt

"htt

"htt

-1

g 1
H
nte

cn -1

cn

H
nte .wi

H
nte

H
nte .wi

H
nte

H
nte .wi
lAA-

g

nte

ci

Cl

ci H

ci H

ci

5 ci

nte

"htt

3D,,

3D.,

3D,,

"GE

"GE

"GE

"GE

"GE

ci H

I
I I.


nte


nte .wi


nte

wi


nte


IM'


nte .wi

EE I

.wi

!
s
3 3 3
AO

S 3

3 o

1
H cn

i;
cn 2

H cn H 2

^ -1 cn -1 2

" H cn H 2

g
i/J

1
H (7) 2

i; I;
Cl H 2

^
cn H 2

Ao:

AO!

AO!

AO!

I;
C) 2

I
2 o

H 2

2 o

o a

2 O

2 o

o o

cn H 2 ft

6
2 ft

CI H 2 ft

in 2 o o

Cl ft

Cl 2 8. ft o

R ft

tn 2

Q ft

Cl 2

o
a

o
o

ft

o
a

ft

o
o

ft

o
o

ft

o
ro

ft

o
o

ft

o
o

o
o

o
o

ft

o
o

o
a

o
o

o a

>U

,3:

'T3

>
3

ID

?
3

In

>
3

ID

'x!

? '-a
3

sr

,5 As As

'.Q

5 1

s
3 3 3

>
3

1^

^
es 3

gcg 1
3 3

3 5

3 S

ft

ft

ft

ft

ft

ft

ft

ft

ft

ft

ft

ft

s
3

BO

BO

BO

BO

BJ

3
3

3
3

3
3

3
3

Bj

3
3

s
3

g 3
3

s s s 3 3 3 o
3 3 3

EJ

3
3

3
3

s s 3 3
3 3

3
3

3
3

g 3
3

BJ

3
3

o
X X

=1

= 1

X :j

X :j

5 5

X zj

z|

3
o

= 1

= 1

5 5

z|

o o X :j

= 1

zt

AO!

AO

AO

AO

AO

AO

AO

AO

AO

AO

AO

<

!A^

lAA

;ov

F-G

As

As

As

As

As

As

As es

3.

I I
IE

3 3 m m

IE IE

5 5

3 m 5

li

I I II 5' IE 1^

3 m 5

IE

I I
IE

II I I i f II

tm o D O o

- I 2.

o a

> L 3 5 3 5 '
"= S "= S

>U >U
3 5'

>

. >u
3 5 3 5 "
" =5 " =5

>U

> l-r

> V

' E

" =s :

3cr

Cl

Cl

Cl

Cl

Cl

3 3 I m 2. 5 5 I E IE IE 3 ^

3 3 3 2 2 5 5 I I I I 5 I I IE n I E IE IE 3

s. 5

3 I I I I 11 5 IE IE

I
I

I
I

li
71 Cl

<
a.

o a o a

o a g

P ft

o o

2 o

>

.> L.
3 5 3 5-

>L >L

>u

.> U

>U

>U
3 5'

>u

>U

" - sr

BO

BO

BO

EO

BO

BO

BO

BO

BO

go

EO

= 1

= 1

= 1

=1

:1

=i 3
6

b
Cl Cl Cl Cl Cl Cl Cl Cl Cl

1
I
2 5

>
ft

Cl

I I

li

I I I EI Es

3 2 5

2 5

I I I E5

I .

2 O

2 O

2 O

o a

o a

2 o

2 o

2 o

2 o

2 o

2 o

.> L
3 5' 5 S 3 5' 3 5'

> tr

> u> U

.> U
3 '5

.> L
3 5'

> L

"= 5 "= 5 "= 5

ST

BO

EO

go

EO

go

go

go

BO

BO

BO

BO

go

go

go

go

go

BO

= 1 = 1

= 1 ^

Cl

Cl

Cl

Cl

> a
o 2 5

I II I

I I
5

3 3 2 2 5 5

3 2 5

11
5

3 2 2 5 5

I EI E BE

II:

IE

I E5

I
I

o a

2 o

H a

o
o

o a

o a

o ft

2 o

2 o

o a o a

2 o

>L
3 '5
'"z 5

>L
3 5

> U> V

>u
"= s

>

lr

>

l-r

& to

> V
3 5' 3 5 3 5'

.> U

i 's

EO

go

go

go

go

BO

EO

EO

go

BO

BO

I
X X X

= 1

= 1

3.

o o
Cl Cl Cl Cl Cl Cl Cl
Cl

=1 3
o o
Cl

cn 2
H O O O

Cl

2
H

o 2 o o

Cl H O

Cl

Cl

o
H

-t

1
3D,, H

o o

H O

3'
o

s
"htt

Ucti

3D,,

3D,,

"htt

"htt

"htt

ci

g
ii;

nte

5 ci

.wi

g ci i

nte

"GE

ci
H

ci
-1

IM'

IM

5 .

IM

I
3

g-

.wi


nte .wi


nte wi wi


nte .wi

f?

AO

AO

AO

AO

AO

AO

AO

AO

"

"
H

^
H -GT

I;
H F-GT

-I

c h

o a

o
o

o o

o o

oa

cn ch ch S _ 2 2 2 2 2 2 2 2 2 o ft o ft O ft o ft o ft o ft o ft O ft o ft o o o
GT GT

. >U

>U
3 5' 3 3' 3 5 -3 S
S

>U

1^

5 1^

,37

g
3

1^

G
27

c
s

3 5

37

s-

s: ^ or ^: s ^
ft ft

5-

gJ 3

B J 3

E J 3

B J 3

go

go

B O

B O

go

E J 3

go

go

go

B J 3

BJ

3
3

3
3

EJ

3
3

3
3

BJ

BJ

EJ

EJ

3
3

3
3

3
3

3
3

3
3

5
X X X X I

A A X

f.

5
X

t-

:
X X

s ^
i-t
X X X

: 1 =1 =1

:i

= 1

5
i-l

^
>-;

5
i-t

Zj
i-t

:j
i-t

g 5
i-t i-t

z|
i-t

AO
OCS

GT

ocs

OCS

OCS

OCS

OCS

OCS

OCS

As

As

As

As

As

As

As es

3 2 5-

3 2 5

II

IE

li

2 5 I I I I IE IE IE

3 2 5

3 2 5

IE

ll

H a

is
> lr

O ft

o a

o a o a

it o a
>v
3 5 3 5 3 5

>L

>L > V

>U
3 5

> U
3 5-

> U

>

!r

,> V > V

3 'E

3 'E

"= 5

%s

"= s

"= S

%s

rl 3

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

i
I
I

3 ^

I li I

I
I

I I I IE IE

I IE

't^
^ 3 . 2 5'

o a 'o > U .> U

2 o

2 o

P ft

2 o

2 O

2 o

Cl H

2 o

'o

o a o a

p a

o
o

p a

>U
3 5 3 5 3 5'

>

Lr

> L

>u
5

>U

> L

>u

BO

gJ

gJ

go

go

BO

go

go

go

EO

go

B J 3

go

go

go

go

go

BO

BO

EO

I
X X X I X

= 1

=1

= 1

=1

2 5

IE 5

I I

3 3 2 2 5 5

3 3 2 2 5 ' 3'

3 3

li

IE H

IE IE

I II I
IE IE

3 3
2 5

3 3

11 IE IE

2 2 5 5

IE IE

oa

oa

oa

oa

Is
> lr > l-r

oa

.> l-r

>

!r

>U
3 5

>u
3 5'
" =5 " =5 "= S

>L

> lr

' E

3 5

' E

2 5 I I IE IE

3 3

3 2 5

II

I I IE
^f

3 3 2 2 5 5

3 2 5

l i IE

1^

o a

o a

ft

o a

>

lr

.> lr

> lr

> l-r

> Ir

3 5'

"= 5: "= 5

Zl

o o
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl

1
Cl

ft 5

>

i
I

3 I I I IE IE IE

I I
00
I

p ft

2 o

g-'
o

2 o

2 o

2 o

2 O

o o

p ft

H a 2 o

o o

o a

^
3 5-

>U

>

l-r

>

lr

> lr

>

lr

>U
3 53 3'

^
3

>

lr.

3 5'

go

go

go

go

go

go

gJ

go

go

go

EO

EO

EO

EO

go

go

go

go

= 1

= 1

= 1

= 1

= 1

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

I
I

I I IE I

I
I

IE

I i I

<

o a O ft

o o

2 o

2 o

2 o

p ft

o o

p ft
g

2 o

O ft

2 o

M a o o o o

2 o

o o

p ft

? til 3 5-

>u

.> lr

.> l-r

> u. >u
3 'E

.> Ir

.> U
3 5

>

lr

3 '=

go

BJ

BJ

go

go

EO

gJ

BJ

BO

go

go

go

B J 3

gJ

go

BO

go

go

go

go

BO

BJ

:1

= 1

= 1

:1

Cl

Cl

I
I

li II

II

&

I I IE
3 :

3 2 3

3 2 5

3 3 2 2 5 5

3 2 3-

li
%
2 CL

IE

IE IE

II

_|
-n

o
CL

H JI

2 o

is
> U .> L

it
g8
m -o

o a

il
g 9
> lr

o a

it

o 9

o a p

> Ir

>L

>L
3 'E

> l-r

>

>L

>

lr

3 5 3 5

3 5

"= 5

"= S

go

go

= 1

3 3 2 2 3- 3

11
5

I I IE IE

I I IE

fl li

11
5

IE

ff

ff

o a

>

lr

.> l-r

> lr

.> L
3
"= S
'E

>

'r-

.> lr

>

'-r

3 5' 3 5

3 3' 3 3'

3
"= S

'E

% 5

"= s

I I I E ff

3 2 3

3 2 5

IE

IE

2 I I 3' IE IE

11 I I IE IE

3 2 5'

3 2 3

3 2 5

3 2 3

ff .

IE

IE

ff

IE

li

o a

o a p ft

it
g
> Ir

H G

o ft

o ft

is
> lr > lr

>

l-r

>

l-r

>

l-r

^ to

.> l-r

'E 3

3 5' 3 5 3 5

'E

3
"= 5

'E

3 3'

"= 5 "= 5 "-. S

"= S T

" =

"= 5

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

I I IE I

I
I

I IE

3 2 5

I EIE I I

2 o

2 o

o o

O ft

o a
g

2 o

o o

2 o

2 o

2 o

2 2 o o g 9

2 o

2 o

38
o o

o
o

o o

. > u>
3 '3

lr

> lr

> L
3 3'

>

.> l-r

> U

>

>u

.> l-r.

>U
3 '3 ?

3 3' 3 3'

3 '3

EJ

go

go

EO

EO

BO

go

go

go

go

s
go

go

go

go

go

go

go

go

BO

BO

EO

go

= 1

= 1

:]

= 1

= 1

:|

2 5 I I IE IE

2 3

3 2 3'

IE ff

ff .

IE

I I IE

3 2 5

3 2 5

IE

I?

p ft

o a

? ^>

l-r

>L

.> l-r

> lr

> t

> lr

>u

.> lr

.> l-r

> lr

> lr

3 5
"-. S

3 5 3 5 3 'E

"= S

5 "= Z T

"= S

" = sr

"= s

Cl

Cl

Cl

Cl

Cl

Cl

Cl

2 3

I
I

3 2 5

I I

3 3 3 2 2. 2 5' 5 5

3 2 5

3 2 2 3 3

IE

IE

li

2 o

2 o

2 o

o o

o a

2 o

2 o

2 o

A G

o a o a

o a

?
> lr

>u

? t

>u
3 3' 3 5

>

>

lr

.> l-r

3 'E

3 5 3 5

go

go

Bo

BO

BJ

go

go

go

go

BO

:1

= 1

3 2 3

3 3 3
2 3 2 5

IE

IE

11 IE

I I 11 IE ff

I I 5 IE

ff ff

2 I - 3 I I IE

p ft o a

o a o a

o a o a

.> lr

>

l-r

>

l-r

> V
3
"= S
'E

> lr

'E

3 5 3 3

'E

'E

"= s

"-- ^"-.

g^
3 2 5

if

II 11 I I IE IE il
e r a o on

3 3 3 2 2 3 3

I I IE IE

3 3 2 3

3 3

2 2 3 3

3 2 3

l i IE
-t 2

ff

IE 11

O r.

p ft
g 9

.> lr

^ ^

> lr

>

lr

> I

3 5'

3 5

3 5'

3 3' 3 3'

"= S

00

j>
NJ

!^

:^

i i M

j i NJ NJ

" ^ ^ ^ ^ ^
o
ii

"

UJ

ii
Cl

ii
Cl Cl Cl Cl Cl Cl Cl Cl Cl

ii
Cl Cl Cl

Cl

2 o

2
H O

2 H + 6

2 o

2
H

2
H

2
0

2 + o

2
+^

2
o

2
H

m 2

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

2 o

2 o o

2
H

2 2 o

ci
H

ci

ci

ci

ci

ci

ci

ci

ci

ci

ci
H

ci

g
ci

ci

g
ci ci

ci

ch

ci
ET

ci
H

ci

ci

ci

ci

ci
p-f

P.

"P
UJS

^
?
UJS

V 3

P
UJS

p 3

"P.

p.

p sm

p
UJS

f
UJS

"P
3

p ? sm sm

p
3

sm

sm

sm

sm

sm

sm

sm

sm

sm

sm

sm

sm

S ft

a
ft

a
ctl

C ! ft

a
ft

g. a
ft

a
ft

a
ft

a
ft

a
ft

a
ft

a
ft

a
ft

a
ft

C 3

ft

ft

ft

s = ^
3' Z T

Z T

Z T
,3-

Z T

Z T
3-

s
=r

Z TZ T

Z T
3-

Z T
=r

Z T
=r

S
3-

= ^
3' Z T

3-

3-

=1"

3'

3-

3-

3-

:r

3'
S

3'
5

3' Z T

5' Z T

3' 5:

3'
?

3' Z T

3'
?

,^
5'
S

= ^
3'
S

=r

3-

=1"

3' Z T

3'
5

5' Z T

3'
?

3'

= > "
Z T

3' Z T

5' Z T

3-

3' 3'

3' Z T

5' Z T

3' Z T

3' Z T

5 Z T

ft

ft

ft

ft

ft

ft

ft

ft

3 3

BJ

BJ

EJ

EJ

gJ

BJ

BJ

BJ

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

EJ

3
3

gJ

3
3

3
3

BJ

BJ

3
3

3
3

3
3

EJ

BJ

BJ EJ

EJ

BJ

3
3

3
3

3 3
3 3

3
3

3
3

3
3

3
3

o
X X X X X X

5 ^
I-t

5 ^
I-t

zj
I-t

3
I-t

3
I-t

5
I-t

^
I-t

3
I-t

3
I-t

z|
I-t

z]
-t

Zj

Zj
I-t

Zj
I-t

Zj
I-t

^
I-t

^ ^
I-t

3
I-t

5
I-t

z|
Ht

z| zj
I-t I-t

3
I-t

z|
I-t

^
I-t

Z|
I-t

o o o

o o

o o

0 0

o o

o
ii

o o o

, =
S
g

1
i

':
m

, =

':

, =

, =

i
'=

w
'=

, =

'Z
"Wg

^
S

*t

J^

"Wg
i i

i
i

d
!ti

i
i i

d
ii

d
*i

d
i>;

d 1

i i

' = '=

, =

'=

'=

, =

' = '=

'=

'=

'=

'--

'=

'=

'=

'=

'=

'=

Ji M

ti

fi

%
A
NJ NJ NJ N,

ii

ii

^
o

^ $
o
O 0

^
o
Cl

^
0

CD

o
Cl Cl Cl Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl H

Cl

Cl

Cl

Cl

CD

Cl

Cl

2
H O

2
H O O

2
H O

2 o

2
H

2
H O

2
H CD C D

2
CD

2
CD CD

2
H

2
H O O

2
H

2
H

^
o

-1

2
H

g
ci

g
ch

g
ci

ci

ci
H

ci
H

ci

ci
-H

ci
H

g
ci

g
ci

ci

Cl H

ci

ci

ci
ET

ci
H
tel

ci

ci

ci

ci

ci

ci

< ^
Q

a
ft

a
ft

a
ft

Cl ft ft

a
ft

a
ft

a
ft

a
ft

ft

ft

ft

ft

ft

!P

ft

ft

ft

ft

Z T
3' 3

S T
33

Z T
=r 3

Z T
3' 3

Z T
=r
=j

Z T
3D

Z T
33

Z T
3=j'

5'
33'

S
3-

Z T
33'

Z T
3-

Z T
3-

Z T
33'

Z T
33'

5
33'

Z T
33'

Z T
33'

Z T
33'

Z T
33'

Z T
33'

Z T
33'

Z T
33'

u'

D'
Z T

Z T

Z T

Z T

Z T

ft

ft

ft

ft

ft

ft

ft

ft

ft

ft

ft

= >
S 3 3

s
ft ft ft
IP

ft

ft

ft

ft

EJ

3
3

gJ

3
3

3
3

EJ

EJ

3
3

3
3

3
3

BJ

BJ

BJ

3
3

3
3

3
3

3
3

gJ

gJ

3
3

3
3

3
3

3
3

gJ
0

3
3

3
3

gJ

3
3

3
3

BJ

BJ

3
3

3
3

EJ

EJ

BJ

3
3

3
3

3
3

o
X

o
X X

o
X X

g
Zj

g
X

o
X X X

5
o CD

3
o o

z|

3
CD O

5
o

5 ^ 1

:]

zj

Zj

zj

g ^
o

zj

5 ^
o

zj

zj

o CD
CD

o CD

o CD

CD

o CD

CD

CD

A.

d
ii

d
jri

'=

== =
g
% 6
g

"1

"2

d
ii

d
t.

d
ii

1
ii

d 1
ii

W d

d 1

8 ': g

ii

ii

ii

ii

ii

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'--

'=

'=

'--

,|

'=

S
i i ii i i i i ii ii i i

! & "

i i NJ

6 NJ

^ "

"

^ $
CD

<

$
0 0 0 Ji

Cl

Cl

Cl

Cl

Cl

2
H

2
H

<n 2
H

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

2
H

2
CD O

2 o

2
H

2
H O CD O

2
-1

2
H 0 0

2
H 0

o o

g
ci

g
ci
H

ci

ci
H

g
ci
H

g
ch

ci

(h

ci
H

ch
H

CD CD

g
ci
H

g
ci

ci

ci

ci
H
tel

ci

ci

ci
ET

ci
ET

ci

ci

P sm Q ft

? sm 0 ft

p.
UJS

P
UJS

P 3

? sm

p sm

P sm

? sm

? sm

p sm

?
UJS

?
UJS

V
UJS

V
UJS

V
UJS

V
UJS!

?
UJS!

V 3

P
LUSI

p
ism

G _

s. s.
ft ft ZT
3" 3

G ft

G ft

G ft

G ft

8 ft

G ft

a
ft

G ft

a
ft

G ft

G ft

G ft

G ft

G ft

3'
3" 3_

3:
|3-

ZT
,3-

ZT
33
|3-

ZT
33

ZT
33

ZT
3' 3'

5'
33'

ZT
33'

ZT
33'

ZT
3-

ZT
33'

ZT
33'

ZT
33'

ZT
33'

ZT
33'

ZT
33'

ZT
33'

ZT
33'

3 ZT

3'

ZT

ZT

s:
ft ft

ZT

ZT

ZT

ZT

s:
ft ft ft ft

ft

ft

ft

ft

ft

ft

ft

ft

go

Bo

BJ

EJ

EJ

3
3

3
3

3
3

3
3

BJ

BJ

BJ

3
3

3
3

3
3

3
3

BJ

BJ

BJ

EJ

BJ

3
3

3
3

3
3

3
3

3
3

3
3

EJ

EJ

3
3

3
3

3
3

BJ

3
3

3
3

S BJ

S
go

3
3 3

CD

zt

^
o

zj

zj

Zj

Zj

Zj

zj

3 ^ 3

3
0

3
CD

Ji X

irj

zj

3 ^

zj

zj

zj

Zj

zj

zj

o CD

CD

0 0

0 0 0

0 0

d 1
't^_

d
t.

d
i=;

d
i i

d
i^

d
i i

d
i i

d
it

J s
ii.

"1

1%

d
i i

i
i i

d
i i

w
i i

d
'f-

d
i i

d
i i

d
i i

i i

'A

i i

s
ii ii

s
ii ii ii ii ii

!ti

! c .
M

6
NJ NJ NJ

!fc
NJ NJ

6
NJ

^
CD

o b
fi Cl

^ 5
CD

CD

CD
0

CD Cl

b
Cl Cl

Cl

2 H
CD CD CD

2
CD CD

2
CD O CD O

b < n 2
0
CD 0

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl -1

Cl

Cl

CD

Cl

Cl

Cl

Cl

Cl

Cl

2
0

2
CD

2
C D

2
0

2
0
CD

ci
H

g
ci
H

0 0 CD 0

0 CD 0 0


ci
H

ci
H

g g
ci ci ci
H

0 0 0 0

CD CD CD 0

o o o
ci
H

ci
H

ci


ci ci

ci
H

ci
H

ci
H

ci
H

ci
H

ci

ci

ci

ci
H

ci
H

ci

G _ G
ft ft

G _ ft

G _

G _ ft ft

G
Cti

G _ ft

G _

G _

G _ ft

s. ft

G _

G _ ft

G _ ft

G _

fi. fi. fi.


ft ft

Z T
33' 0

Z T
,33'

Z T
33'

Z T
33'

Z T
,33'

Z T
33' 33' 33' 33'

|33'

33

33'

33'

33'

33'

,33'

3-

33'

33'

33'

33'

33'

3'

Z T ft

Z T ft

Z T

Z T ft ft ft

Z T ft

Z T

Z T ft ft ft ft ft

s
ft

3
BJ

EO g

go
g

go

EO 0

go 0

go a 3

EO 0

EO 0

go

go
0

go 0

go
0

go
0

go
0

go
0

go 0

go

BO
0

go 0

BO
0

go
0

go 0

BO 0

C O

3
CD 0

Zj

zj

zj

zj

3 3 ^
g

00 X

0 X

zj

Zj

Zj

zj

3 ^

zj

Zj

zj

zj

z |

5 ^

zj

zj

g
0

0
fi

g
0 0
fi

0 0 0

''t

, =

1
ii

ii

i .

ii

i^

ti.

ii

ii

ii

< :

= :
, =
g

1 1
fi

g"

g"

<
fi

fi

fi

ii

fi

'=

fi

fi

i^
NJ NJ NJ NJ

<

^
o
CD

o
CD CD

C D Cl

b
Cl Cl Cl Cl
Cl Cl

o
Cl Cl Cl Cl

b
Cl Cl Cl

2 + o o

2
H
+j

cn 2

Cl

Cl

Cl

Cl

2
H O CD

-1

2 o

-1

cn 2

Cl

g ci
H

ci

ci
H

ci
H

o o CD ci

ci

g
ci
H

o o

CD O

ci

ci

ci

o ci

ci

ci

ci

ci

? sm o G ft
3-

? 3

P
UIS

?
UJS

P
UJS

p
UJS

P
UJS

P sm

P sm

P sm

?
UJS

P
UJS

p
UJS

P
UJS

P
UIS

G ft

G ft

G ft

o G ft

G ft

G ft

G ft

G ft

G ft

G ft

G ft

G ft

ZT
333-

ZT
3'

ZT
3-

ZT
3-

ZT
,3-

ZT
3-

ZT
3-

ZT
3'

ZT
3-

ZT
,3-

ZT
3-

ZT
3-

ft

ft

ft

ft

ft

ft

ft

fl

ft

ft

B J 3

B J
g

E J 3

E O

go

go

3
3

3
3

3
3

gJ

gj

3
3

3
3

BJ

3
3

3
3

gJ

EJ

EJ

3
3

3
3

3
3

3
3

BJ

3
3

3
3

gJ

EJ

3
3

3
3

go

B J 3

CD

Ji

g
X X X

A CD X

:1

= 1 = 1 :1

:1

= 1

= 1

= 1 ^

CD

CD

CD

CD

to

,= g

, = g

,=

w
ii

d
fi

fi

'Z

'I

'I

'I

'=
f.

,= g

,=

*t

i d w
fi

ro

,= g

ft

fi

fi

fi_

'=

'=

'=

'=

'=

'=

ii

fi

*.
NJ NJ

to
NJ

UJ

UJ

^
CD O

5
Cl Cl

Cl

Cl

2 ^

Cl

Cl

2 -I

Cl

Cl

f. Cl

Cl

Cl

Cl

2 o o

2
H

2
H CD CD CD

2
H

2 o o

Cl 2

CD

cn 2

Cl

Cl

Cl

g
ci
H

ci

ci
H

ci
H

ci

ci
H

g
ci ?

CD O

ci

ci
M

ci ^

ci

.wi

,wi

.wi

.wi

IM

? sm G
3-

UJS

UJS

UJS

UJS

UJS

UIS

G ft

G ft

fi.
ft

fi.
ft

fi.
ft ft ft

fi.
ft

3-

33'

3-

3-

3^

3-

3-

,3^

3'

?
3'

3'

3'

3'

3' ZT

3' ZT

3'

3'

3'

3'

s
ft ft ft

ft

ft

ft

ft

3 ro

B J 3

B J 3

go

E O

B O

UJS

wi

wi

wi

? sm

"P sm

go

3
3

BJ

BJ

3
3

3
3

3
3

BJ

3
3

3
3

BJ

S
3

3
3

BJ

BJ

3
3

3
3

3
3

E J 3

E J 3

B O

go

go

go

i
X

fi

fi

g g
X

o
X X X

5 o o

f.

5
X X X X X X

= 1 = 1

= 1 = 1

= 1

5
i-t

3
i-t
CD

3
i-t
0

5
i-t

^ ^
i-t

3 ^
i-t
CD O

zj
i-t

zj
i-t

5
i-t

Zj
i-t

zj
i-t

1 = 1 =

:j

= 1

g
Ji fi

fi

<

<

1
fi

:> '=

fi

'=

'=

2 K
ii ii
fi

S
ii

CD

ii

to

ii
NJ

to
NJ

to
ND

LU

^ ^
o

<

^ 5
o o
Cl Cl Cl Cl H Cl H O O CD

CD

to
Cl Cl Cl Cl Cl CD Cl Cl Cl

o to
Cl CD Cl Cl Cl Cl Cl Cl

2
-H

2
H O O

2
H O

2 o o ci

2
H CD CD CD

2
-1

2 o

2 o o

cn 2

+ o g

g
ci
2
wi

g
ci
2 3

ci 2 3

g
ci
H

ci
H

ci
M

ci
H

o CD ci
H

ci
H

g
ci
H

g
ci
H

ci ^
ro 3

ci
H

ci
H

ch

CD

ci

ci
H

ci
H

o ci

ci
H

ci
H

ci
2. 3

^
2 3 2 3

2 3

2 3

2. 3

2 3

2 3

2 3

ro 3

2. 3

2 3

2. 3

2. 3

2. 3

2 3

2 3

2 3

2 3

G ft

G ft

G ft

G ft

G ft

G ft

s. s
3-

G ft

G ft

fi-

G ft

G ft

G ft

G ft

G ft

G ft

G ft

G ft

s
3-

ZT
3-

ZT
|3,3|3|3-

ZT
333|3-

ZT
3-

3-

3-

3-

3-

3'

3-

3-

3-

3-

3-

3-

ZT

ZT

ZT

ZT

ZT

ZT

s
ft ft

ft

ft

ft

ft

ft

3
3

3
3

3
3

BJ

BJ

gJ

3
3

3
3

3
3

3
3

BJ

BJ

BJ

EJ

EJ

3
3

3
3

3
3

3
3

3
3

3
3

gJ

BJ

BJ

3
3

3
3

3
3

3
3

gJ

3
3

3
3

go

BO

EO

to to
X X X

to to
X X X

to
CD X X

o o
X X X

CD X

to
X X

E o
X X

E
X X

Zj

Zj

Zj

Zj

Zj

Zj

zj

3
CD O

3
o o

5 ^
o

zj

3
o

zj

Zj

^ 5

zj

zj

zj

g
"!

o CD

CD

CD

g'

^ ': g

to

i
f.

^ ': g

. ':
g

^ '= g

'= g

g <

w
fi

d
to

"2 '= g

ii

fi

ii

i&

fi

ii

ii

ii

ii

ii

fi

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

= =
"1 '= g

'= d
fi

to

,5
g

,; =

2 3 ^

M i

ii

'=

'=

,=

00

o
M

!to

fi

ii

fi

i i

i i

fi

to

fi

fi

to
NJ

i i

to
NJ

^ ^

^ $

^ $

^ ^

UJ

^
o

^ 5
CD Cl

5
Cl

^
CD fi

^
o

!5
o
CD Cl

^
to

Cl

Cl M

Cl H

Cl H

Cl

Cl

Cl

Gl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

2
H

2 o

2
H CD

2
H O

2
H

2
H O CD

2 o

2
H

2
-1 CD O

2
H

cn 2

o o

ci 2 P.
UJS

g
ci

g
ci
H

o o

g
ci

2 P
UJS

ci 2 P
UJS

CD

ci 2 P
UJS

ci
H

ci
H

ci

ci

ci

g ci ^
2 ?
UJS

o ci

ci 2 ?
UJS

ci 2 ? sm

ci
2 ?
UJS

ci
2 P
UIS

ci
1 3

ci 2. P
UJS!

ci 2 P
UJS!

ci

ci

ci
2 P
UIS!

2 P
UJS

2 P
UJS

2 P sm

2 ? sm

2 P
UJS

2 ? sm

2 ? 3

2 ?
UJS

2 ?
UJS

2
UIS!

2 p
LUSI

G ft

G ft

G ft

G ft

G ft

G ft

G ft

G ft

G ft

G ft

G ft

ZT
|3^3-

ZT
33333-

ZT
3-

ZT
3-

ZT
3-

5
3-

ZT
3-

ZT
3-

ZT
3-

ZT
3-

ZT
^3-

ZT
3-

5
3-

ZT
3-

5
3-

ZT
3-

ZT
3-

ZT
,3-

ZT

^
ft

s
ft ft ft

ft

ft

ft

ft

ft

EJ

3
3

EJ

3
3

E J

3
3

3
3

3
3

gJ

3
3

B J

BJ

EJ

gJ

3
3

3
3

3
3

3
3

E J

3
3

3
3

EJ

3
3

3
3

E J

3
3

EJ

3
3

3
3

3
3

gJ

3
3

3
3

BJ

3
3

3
3

to
X X X X X X X X X X X X

to

zj

Zj

zj

z|

zj

5
o

Zj

Zj

Zj

^
o o
CD

Zj

3
CD CD

zj

5
CD

g
CD

o to to

g 2 g

o o

o to

CD

to to

to

to

w
i i

g'

g'
ro

d
fi

d
fi

d
fi

1
fi

i i
to
ft

d
ft

d
fi

i
it

f i

!to.

fi

to;

fi

i i

fi

0 to

s
M fi NJ NJ NJ NJ

to

to

!to

fi

ii

ii

to

fi

^ $

^ ^
CD

cn 2
H

Cl

Cl

Cl

Cl

Cl

2 + o o
-1

2
H

2
H

2
H O

cn 2
H O

Cl

Cl

Cl

Cl

Cl

Cl H

Cl H CD 0

Cl

Cl

Cl

Cl

Cl

2
-t

Cl

Cl

o o

g ci
H

g
ci
H

g
ci

ci

ci
H

g ci
H

+ o

cn 2

g
ci

J g
ci

CD

ci
H

ci

ci
H

o CD ci

CD CD

ci
H

ci

g ci

o ci
H

ci
H

ci

ci

o ci

ci
H

ci

o ci

^
3 3

^
3

3
ijo o

f 3

G ft

fi.

G ft

G ft

G ft

G ft

G ft

G ft

G ft

G ft

3r
.3-

5
3-

S:
3' 3-

ZT
3-

ZT
3-

3:
3-

3:
3'

ZT
3-

ZT
3-

S
3-

3:
3-

5:
3-

3:
3-

ZT
3-

ZT
3-

ZT
3-

ZT
3-

ZT
3-

ZT
3-

3r
3-

ZT
,3-

ZT
3-

ZT

ZT

5:

s
ft

ZT

3'

ZT

5:

5"

ZT

ZT

s a

3r

ZT

ZT

ZT

ZT

ft

ft

ft

ft

ft

ft

ft

ft

ft

BJ

BJ

BJ

BJ

gJ

3
3

3
3

3
3

3
3

3
3

3
3

3
3

gJ

3
3

3
3

BJ

EJ

3
3

3
3

3
3

EJ

BJ

3
3

3
3

3
3

3
3

3
3

BJ

BJ

EJ

EJ

gJ

S BJ

3
3

3
3

3
3

3
3

3
3

3
3

g
X I

o
to

to to X

to

to

CD X X I I X X X

Zj

Zj

^ g g
o

5
CD

^ ^
0

Zj

^5
o

5
o

5
CD CD

5
CD 0

5
CD CD

o
X

Zj

^
o o

3
CD CD

zj

3 ^
CD 0 0

zj

3
CD O

zj

g
o

zj 5 ^

zj

CD CD

CD

CD

to

, =
g g g g g g

' = "~; '= g

! '=
g
t/1.1

, =
g'

to 5

, =
g

c c c c c c
to to to to to

g r

d
U
to

w
f i

1^

c c c

'=

:
, =
~i g g
U
fi

, =

, =
g
U

, =

, =

, =

^ 2
g

= g

s
'_

i d g c c c

to

ul

to

!to

ii

ii

ii
NJ NJ NJ NJ

<

<

^
o
0

$
o
0

to
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl to Cl

Ji

to
Cl Cl

to
Cl

to
Cl

2 o o

2
H O O

2 -j + 0

-H +j

2
H 0 CD

2
H

2
CD O O

2
H CD O O O

2
H 0

2
CD O

cn 2

to

Cl

ci
H

g ci

g
ci
H

ci
H

ci ^

CD CD

CD O

ci ^

ci ^

ci

ch

ci

ci ^

ci

1 3

ci

ci 1^

g ci

ci

ci
H

ci
H

ci
tel

CD

CD

ci
ET

ci
-i

ci

ci
tel

ET

? 3

?
UJS

P
UJS

P
UIS

?
UIS

P
UJS

P
UJS

P
UJS

P
UJS

P
UJS

P
UJS

P
UJS

P
UJS

p
UJS

P
UIS!

P
UJS!

P
UIS!

P
LUS!

P
LUS!

sm

sm

sm

sm

^
o

fi.

fi.
a

fi.
a a

fi.
ft

ft

ft

s.
3:
33'

fi.
ft

fi.

fi.
ft

s.
Z T
33'

fi.
ft

Z T
3' 3_

3:
33

s
|3'

s
33

S
33

3:
33

s
33

Z T
,3-

3r
33

3:
33

5
33'

Z T
33'

Z T
33

Z T
33'

3:
33'

3:
33'

Z T
33'

Z T
33'

3:
33'

Z T
33'

37
33'

3^

3:

3:

Z T

Z T

3:

3^

Z T

Z T

Z T

Z T

Z T

Z T

3:

3'

Z T

Z T

Z T

Z T

3:

ft

ft

3
3

BJ

BJ

EJ

EJ

EJ

3
3

3
3

3
3

3
3

3
3

3
3

BJ

BJ

3
3

3
3

s 3
3

gJ 3
3

3
3

BJ

BJ

EJ

EJ

3
3

3
3

3
3

3
3

3
3

BJ

BJ

EJ

BJ

3
3

3
3

3
3

3
3

3
3

BJ
3

s 3

0 X X X X CD X

to to

to !to

CD X 3 X X X X X

to to
X X X X

CD X

Zj

Zj

Zj

5 ^
0

Zj

5
CD

5 ^

3 ^

zj

Zj

Zj

^ ^
0

g
CD

Zj

Zj

Zj

I 5

CD

g ~ ^ g "1 g ~i g
CD

CD CD

l
g

"i g

*^ g'

g g'

^
g

"

^ g

to

d
it

d
ft

w
ii

d
it

d d d d
ft

d d d d d d
it it
ft

ft

ft

to

ft

ft

to

it

to

to

to

'-

ii

fi

ii

fi NJ NJ

to
NJ

<
o o
O

o
CD CD

o to to
Cl

Cl

Cl

Cl

Cl

Cl

Cl

to
Cl Cl

ii
Cl

ii to
Cl

to to
Cl

to to
Cl Cl

to
2

Cl

Cl

Cl

Cl

Cl

Cl

2 o o

2 o

2
H

2 o o

2
H O CD

2
H O

2
CD

2
H

2
H O

cn 2

Cl

cn 2

g ci
H

g ci ^
2
IM

ci
2
wi

ci
2
IM

g
ci

g ci
H

ci
H

ci
H

ci

ci ^
2.
IM

ci

2
IM

g
ci

^
2
,wi

ci
2 3

ci 2 3

CD

ci
2 3

ci 2 3

ci
H

ci
2 3
ET

ci
2 3

ci
IZj

1
2
wi

^
2
wi

ch ^
2
.wi

ci

ci

tel

2
IM

2
wi

2
wi

2
wi

2
wi

2
wi

2 3

3 o

G
ft

G
ft

G
ft

G
ft

G
ct

G ft

G
ft

fi.
a

ft

3:
3"
|3" |3-

3-

|3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

s
ft

3:

5:

ft

ft

ft o

ft

ft

EJ

3
3

3
3

gJ

3
3

3
3

3
3

3
3

gJ

gJ

3
3

3
3

3
3

BJ

3
3

3
3

3
3

3
3

3
3

BJ

3
3

3
3

BJ

3
3

3
3

EJ

EJ

BJ

BJ

S
BO

3
3

3
3

3
3

3
3 3

o
X X X X X X

to to
X X X X X X

g
I

to
X X X X

Zj
i-l

^ g

zj

zj
I-t

zj
I-t

Zj
I-t

Zj
i-t

zj
i-l

zj
i-t

3 ^
i-t
CD CD CD CD

Zj
i-t

3
i-t

zj
i-t

5
i-l

Zj
i-l

g ^
i-l

zj
i-l

^
i-"
CD

Zj
i-l

zj
i-l

zj
M

^
i-l

Zj
i-*

i-t

i-t
CD

to

g
-to to

g
to

o o

g'
ro

d
ro

w
'=

'=

'=

= = = = =
o 5

o o

g'

g'

1
ft

= d
ft

% g

"

'"1

""t

to

"2

'"t

d
'=

w
'=

'=

d w
'= '!

!to

fi

it

ft

'=

'=

'--

'=

'=

'=

'=

'=

'=

,=

ii

ii

fi

ii

fi

ii

to

ii
NJ NJ NJ

^
ii
Cl Cl Cl

^ ^
0

^
CD

^
CD

^
ii to
Cl Cl Cl Cl Cl Cl Cl

to
Cl

to Cl

ii
Cl Cl Cl

2 zi + o o

2 + o o
-1

2
0

2 + o o

2 o

2
H 0 CD

cn 2
H O O O

Cl

Cl

cn 2
H

2
CD CD

cn 2

Cl

Cl

g
ci
-t

ci
H

g
ci

g
H

ci

ci

ci

ci

ci

g
1 2

ci

ci

ci

ci
ET

ci

ci
ET
tel

ci

ci

ci

ci

ci

ci

'^

P. 3

P
UJS

P 3

P
UJS

P sm

?
UIS

?
UIS

P
UJS

P
UJS

p
UIS

p
UJS

p
UJS

P
UIS

P
UIS

P
UIS

P sm

P
ism

P
LUS!

P
UJS!

sm

fi. fi. fi.


ft ft ft

G ft

ft

1 a

G ft

G ft

G ft

fi.

ft

3:
3"
|3-

3:
,3|3-

3r
|3-

5
333-

ZT
|3-

ZT
3-

3:
33'

ZT
3-

ZT
3-

3'
3-

ZT
3-

ZT
3-

5
3-

3'
3-

3:
3-

3:
3-

5^

3' ZT

3' 3Z

3' 5

3' 5

3' 3:

3'

3'

3'

5'

3'

3' 3'

5' 5:

3'

3' 5:

3 3:

5' ZT

3' 3:

3' 5:

5:

ft

ft

ft

ft

ft

ft

ft

ft

EJ

EJ

BJ

BJ

BJ

EJ

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

BJ

BJ

gJ

gJ

EJ

EJ

EJ

BJ

S EJ

S EJ

S EJ

s go
3

go

go

EJ

EJ

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

to
X

Zj
i-t

Zj
i-t

Zj
i-t

Zj
i-t
0

Zj
i-t

^ g
"2

zj

5 5
i-t

3
i-t
CD

3
i-t

3
i-t
CD CD

Zj
i-t
0

5
i-t

Zj
i-t

zj
i-t
CD 0

5
i-t
CD 0

zj
i-t

g
i-t

g
i-t

5
i-t

zj

= 1

i-t

i-t

g
to to

g
"2 g'
j:;
ii CD

o o to to

CD

~ ^
g'

g
i;:;
fi

g
H;
to

g'

w
ft

d
ft

to

2
g'
i];

=
g g
ft

"!

^
g

2
g'
i-l

g
ij

g'

d
i-l

g
i-l

d d
i-l i-l

d
<^
to
,]

w
<^
i-l

j:;
it

j:;
ft ft

ft

ft

ft

ft

to

ii

ft

it

to

fi

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

to

s
to
NJ NJ NJ

ii

to
NJ

"
Ul

$
o
CD

^
to
Cl

^ $

^ ^

^ $
o

to
Cl

Cl

Cl

Cl

Cl

Cl

to
Cl Cl Cl Cl Cl Cl Cl H

CD Cl

Cl

Cl

Cl

Cl

Cl

Cl

2
H

2
0 0

2
H O O

2
H O O

2
H

2 o

2
CD CD O

2
H

2
H O CD

2
0

2
CD

cn 2

cn 2

g
Cl H

g
Cl

Cl H

Cl H

cn

o o

CD Cl H

Cl H

Cl H

g
Cl H

CD Cl

Cl

Cl H

Cl H

Cl

CD

Cl

Cl

Cl

Cl H

Cl

< n

Cl

cn
H

Cl

P.
UJS

P sm G

P sm G

? sm G

?
UJS

?
UJS

?
UJS

?
IUS

P
UIS

P
U I S

P
UIS

?
LUS

?
UIS

P sm

p
UJS

?
UIS

P sm

P
U I S

P
UIS

P sm

P
UJSI

P
UIS!

P 3

fi.
a

G ft

G ft

G
cti

G
cti

G ft

G ft

fi.
ft

G ft

G ft

G ft

G ft

G ft

3:
3-

ZT
.3-

ZT
3|3-

5
33-

5
33-

ZT
3-

3:
3-

5:
3-

3'
3-

ZT
3-

ZT
3-

s
3-

3:
3-

3Z
3-

S
3-

3:
3-

3:
3-

3:
3-

ZT
3-

5
3-

3Z

s
3

3:

3:

ft

ft

ft

ft

ft

ft

ft

EJ

EJ

EJ

EJ

EJ

BJ

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3 0
3

gJ

BJ

go

BJ

BJ

EJ

3
3

3
3

3
3

3
3

3 o
3

3
3

BJ

3
3

3
3

EJ

EJ

BJ

3
3

3
3

3
3

3
3

EJ

3
3

to
X X X

to

Zj

Zj

^ ^ g

5 ^

^ ^

zj

Zj

zj

^ ^ g

Zj

Zj

zj

5 ^

5
CD

o o

CD 0 CD

"l '; g

g g' g' g'

w
it

,g

fi

fi

it

it

it

to

,=

'=

'=

'=

'=

'=

'=

: = =
o
CD

d
it

':

,=

to 'Z

"1 g

to

Q 5 to

*t

w
ii

, = g'

, =

, =

, =

,=

,=

,=

d d d wd d
'= '= '= '=

, = g

ft

it

it

'=

,=

'=

,=

'=

,=

'=

'=

to

ii

ii

fi

!to

ii

to

ii

ii

to
NJ NJ

to
NJ NJ

LO

Ul

^
b cn 2 -H + O o b
Cl

^
g
Cl

^
0 CD

b
Cl Cl

b
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl

2
H

2
H O

2
H

2 o

2 o o

2 o o

2
CD O

2
H C D CD

2 o o

2
H CD O O

2
H O CD O

g
H

g
ci
H

ci
H

ci

ci

ci
H

ci
H

ci
H

ci
H

ci
H

ci
H

g
ci
H

ci
H

ci

ci
H

ci
H

ci
H

CD

ci
H

ci
w

ci

^
wi

ci
H

ci
H

ci

ci
H

^
.wi

!'

IM'

IM'

IM'

|M

IM

IM

IM

wi

wi

wi

wi

wi

wi

wi

?
LUS

p
UIS

?
UIS

P
UJS

P
UIS

?
JUS

P
LUS

?
UJS

p
LUS

p
UIS

P
UIS

P
LUS

P
IUS

P
UIS

p
UIS

P
UJS

p
UIS

?
UJS

P
UIS

P
UIS

p
UJS!

sm
G

fi.
a a

ft

ft

ft

ft

ft

s. a

fi.
ft

fi.
ft

fi.
a a a

fi.

fi.
ft

fi.

fi.
a

3Z
3-

3Z
^3-

Z T
33-

S
|3-

Z T
33333'

5:
3-

s
3^3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3' o" ?

3'

3'

3'

3' Z T

3' Z T

3' Z T

5' Z T

5' Z T

5' Z T

3' Z T

3' Z T

3' Z T

5' 3"

5' 5Z

3' Z T

3' Z T

3' 3Z

5' Z T

3' Z T

5' 3 Z

3' 3 Z

Z T

ft o

ft

ft

ft

ft

ft

ft

ft

ft

EO

o 3

BO O

EO O

EO CD

go
CD

go
C D

go
O

BO C D

BO 0

BO 0

EO O

go
D

EO

EO

go
CD

go
C D

o 3

o 3

go CD

go CD

BO C D

go O

go O

go
O

BO

0 to X X X X

to
X

to
X I X X TT TT

0 X

to

o
X X

o o
X X

CD X

o
X

to
X X X X X X X TT TT

= 1 ^
i-t
CD

Zi
i-t

= 1
i-t

Zl
i-t

^
i-t

^
i-t
0

^
i-t
0

^
i^
o

4
i-t
CD

^
i-t
CD

^
i-t

^
i-t

^
i-t
to

^
i-t

^
i-t

^
i-t

^
i-t
CD

^
I-t

i-t

i-t

i-t

i-t

i-t

= = = = =
to
CD

,:

,:

, =

,:

g'

d d d d
r r

1
r
fi

d d
r r
ft

g r

d d d d
to to

2 :
g

, =

d d d d d
^ '= '= '=

!-*
ft

to

to

ft

it

to

ft

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

, =

.':

, =

to to

ii

ii
NJ NJ

to
NJ NJ

LO

UJ

o
CD

b
Cl

b
Cl Cl Cl Cl Cl

b
Cl Cl Cl Cl Cl

Cl

Cl

Cl

cn 2 + o
O -H

Cl

2
H O

2
H

2
H O

2
H

g
H

+^

ci ci
H

ci
H

O O

o ci

ci
H

ci

o ci

ci

ci

ci

ci

ci

IM

?
UIS

UJS

UIS

UJS

LUS

UIS

UIS

UJS

UIS

fi.
ft

G ft

G ft

G ft

G ft

ZT
|3-

3"
3-

3'
3-

ZT
3-

ZT
3-

ZT

S
3-

ZT
3-

3'

ZT
3-

3'

3-

'3-

fl

B J 3

E J

E O

E O

go

B O

E O

E J 3

B J 3

B O

go

3
3

3
3

3
3

E J

gJ

BJ

BJ

EJ

3
3

3
3

3
3

3
3

BJ

3
3

BJ

EJ

EJ

3
3

3
3

3
3

g
X X

to to
X X

to
X X X X X

= 1

= 1 4 = 1

Zj

Zj

^
o

5
CD O

5
o o

g ^
CD

Zj

Zj

zj

to

, = g

=
g

t g g

1
g

1
ft

to

ii

to

fi

fi

'=

'=

'=

= =
1%

'i
g

't

CD

ii

to

'=

UJS

wi
cti

wi

wi

wi

? sm

P sm

ii

ii

ii

ii

fi

fi NJ NJ NJ NJ NJ NJ

^
o
CD CD

o o
CD Cl

o
Cl Cl

Cl

Cl

Cl

Cl

Cl

CD

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

CD

Cl

Cl

2 Q O

2 o

2
H O CD

2
H 0 0

2
H 0 0 0

2 o Q 3 ci

2 o o

2
H CD O O O

2
H CD O O

2
H CD

2
H

2
CD

2
CD O

2 o

ci

g
ci
H

g CD
ci
H

ci
H

g
ci

ci

ci

ci

ci

ci
H

"GET/

ci

ci

ci

ci
H

ci

ci
H

ci
H

d
3 o

d
3

d
3 3 3 3

5
3

5 5
3 3

d
3

5
3

g
o G ft

fi.
a

G ft

G ft

G ft

G ft

G ft

G ft

fi.
ft

G
Cti

g.
a

ZT
|3-

s
|3-

3Z
3-

3Z
3-

5Z
3-

3Z
3-

ZT
3-

5
3-

3:
3-

3'
3-

3'
3-

ZT
3-

5Z
3-

ZT
3-

S
3r

ZT
3-

3Z
3-

ZT
3-

3Z
3-

ZT
3-

ZT
3-

3Z
3-

ZT
3-

ZT o ft

ft

ft

ft

ft

ft

ft

ft

ft

go
CD

go
CD

EO

go
CD

go O

go
O

go
0

go
0

BO 0

o 3

Bo o 3

EO

EO

go
CD

go
CD

go O

go 0

BO O

go CD

go O

go
CD

go
CD

go
CD

go CD

a 3

o 3

to o
I X X X
TTP TTP TTP TTP

o
X X X X
TTP

o o
X X X X X
TTP TTP TTP TTP

o
X X X X X X X X
TTP TTP TTP TTP TTP TTP TTP TTP

to
X X

TTP

TTP

TTP

TTP/

= = = = =
,=
o

CD

CD

o to o

, =

, =

, =

,=

, =

,=

, =

, =

, =

,=

, =

,=

*t

,=

1
M

d d d d d d d d 1 d d d
^
M M

I-l

2
1-^

5
M

1-

1-

5
M

1-

'5
I-l

'^
i-

i-^
ft

5. '2 '5 1-^


i-l i-l

d d d d d
^
i-^

i-

2
i-l

'^
I-l

d
r ,=

to

to

to

to

to

to

to

to

i i

to

'=

'=

'=

'=

'Z

'=

'=

'=

'=

'=

'=

'=

'=

'=

,]

'=

to

to o

CD

i i

to

fi

ii

i i

i i

i i

to
NJ

to
NJ NJ

"

"

UJ

UJ

o o

o
CD CD

CD

o y?
Cl

y?
Cl

S?
Cl

K"
Cl Cl Cl Cl

y?
Cl Cl

y?
Cl Cl

o y}
Cl

Ul

y?
Cl

Ul

y?
Cl Cl

y?
Cl

y?
Cl

y? to
Cl

y?
Cl

Cl

2
-t

2
H O

2 o o o

2
H O CD O

2 o o o

2 o o o

2
CD

2
CD

2
H

cn 2
H O

Cl

Cl

2
H 0 0

2
H 0 0 0

o CD
O

ch
H

g
ci

ci

ci

ci

ci

ci

CD

ci

ci

ci
H

g
ci

g
ch

ci ci

ci

ci

ci

ci
ET

ci

ci

ci

ci

ci

^
3 3 3 3 3 3 3 3 3

^
3 3

^
3

^
3

G 3

G 3

G 3

G 3

G 3

G ft

G ft

G ft

G 3

G 3

G 3

G ft

G ft

G 3

a
3Z
|3|3-

a
3Z
|3-

S
|3-

S
|3-

5'
,3-

3:
33

ZT
|3-

ZT
33

3:
33

3Z
33

ZT
33'

ZT
33'

3'
33'

3Z
33'

S
33'

3Z
3-

S
33'

3Z
33

ZT
33'

ZT
33'

3Z
33'

3Z
33'

3'

3'

3 3'

3'

3Z

3Z

3'

3:

5Z

3'

3Z

3"

3'

Cti

Ctl

cti

ft

ft

ft

BO CD

go
O

go
CD

Bo C D 3

go
CD

BO 0

EO CD

EO 0

EO CD

EO CD

go
0

go CD

go 0 3

go 0 3

go 0 3

go 0 0

BO 0

EO

EO O

go
CD

g 3

go o 3

go CD

go

a 3

to o 3
X 0 X X X X X X X X X X X X X X X X X X X X X X

3 ^
i-l

ZS

zj
M CD

^
CD

3 ^ ^
o

^
M

zj

Zj

^
M 0

3 ^ ^
0

3 ^
i-l

3
i-l

Zj
i-l

3
i-l

zj
i-l

zj
M 0

Zj

^ ^
0

3 ^ 3
i-l

Zj
i-l

3
U
CD O

Zj
M

zj

zj
M

zj
i-l

5
^

^
CD CD

o o

0 0

CD

CD CD

o o

to
UJ CD

CD

"l

2
g
i-l

t g
i]; !to

~i

to

1
i-l

g
i-l

g
i-"

d
t

g
i-l

w
j:;
i i

g'
i-l

= g

w
i-l
I-l

^ = =
g
i-l

"2
g

2 = =

1
i-l

i-l

i-l

i-l

i-l

i-l

fi

i i

i i

!to

to

to

~ !
g
i-l i-l i-l

g"

l =

OE

ww
i i

g
i-l

to

to
ZZ

to

to

to to

^
to

NJ f i f i f i

!to

to

!to
NJ NJ NJ NJ NJ NJ

UJ

^ ^
CD

^ ^

<

^ ^
O to Cl

%
Cl Cl

cn 2
H

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

2
H o

2
H

2 o

2
H O CD Cl

2
H

Cl

2 o

2 o o o o
Cl

2 6

g g
Cl

g
Cl H

g
Cl

g
Cl

Cl H

CD H

g CD
Cl

CD CD Cl

Cl H

g
Cl H

Cl

o
Cl

CD

Cl

o
Ct

o
Cl

cn
1 2

Cl

o
Cl

S
Cl H

Cl

Cl

Cl

^
I M I M

^
IM'

^
P
UIS

^
.wi

.wi

.wi

.wi

I M

IM

wi

I M

UIS!

P.
UIS

< ^

fi.
ft

fi.
ft

fi.
ft

fi.
!P

s.
ft 3'

G 3

fi.
ft

G 3

G 3

G ft

G 3

G 3

fi.
a
ZT
3 -

G 3

G ft

G 3

S,

G
ft.

a
3"
3 -

a
3Z 3Z
3 -

s
ZT
3 -

ZT
|33 -

3Z
3 3 3 -

ZT
3 '

3Z
3 -

3Z
3 -

ZT
3 -

ZT
3 -

3Z
3 -

3Z
3-

3Z
3 -

3Z
3 -

ZT
3 -

ZT
3 -

ZT
3 -

3Z
3 -

5
3 -

3 -

3^

5' 5Z

5' 3'

3' 3Z

3' S

3'

3'

5' 3Z

5' 3Z

3' 3'

5' 3Z

3' 3'

3' S

5' ?

3' 3Z

3'

3'

3'

5'

3'

3'

3' 3'

5'

5'

ft

ft

ft

ft

ft

EJ

EJ

EJ

3
3

3
3

3
3

3
3

gJ

3
3

BJ

EJ

EJ

3
3

3
3

3
3

3
3

BJ

BJ

EJ

EJ

EJ

EJ

BJ

3
3

3
3

3
3

B
3

3
3

3
3

3
3

BJ 3 3

EJ

BJ

BJ

BJ

S EJ

3
3

3
3

3
3

3
3

3
3

3
3

3
3

o
X X X

o o
X X

CD

to

to
CD

o
X X X X X

o
X X X X X

3
o

5
o
to

Zj

3
CD

z|

3
o

3
g

Zj

g
g

Zj

zj

Zj

zj

z|

Zj

Zj

CD

CD

g
CD

o
to

s
g g g g g g g

<
!to !to
f i f i

<
ii

<

g
m

ii

ft

it

to

LUSI

UJS!

U I S

I U S

UIS

U I S

U I S

UJS

UIS

UJS

UJS

UJS

LUS

U I S

U I S

UJS

UJS

UJS

wi

Wi|

wi

wi

wi

wi

wi

wi

wi

wi

p.

P.

wi

P sm

p sm

P
ism

, =

to

to to

8
ii

to

fi

fi

ii
NJ NJ

to

"

"

^
ii
Cl Cl Cl

^ ^

^
o

^
o to

^
CD CD

< $
o

$
to
Cl H Cl

g
Cl H

g
cn
H

ii
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl

Cl H

Cl

Cl

2 -1 +^

g
ci
H

g g

2 -H +

2 + O
H

2
0

2
CD

2
H

2
H

g
ci

g
ci
H

g
ci
H

CD 0 CD

ci
H

ci

ci

ci
H

ci ^
P
UIS

ci

g
ci

g
ci

ci
H

ci

ci

ci

ci

CD

CD

ci
tel

ci
H

ci

ci

ci

ci

^
tel

UIS!

G ft

fi. fi. fi. fi. fi. fi. fi. fi. fi. fi.
3 3 ft

fi. fi.
a
Z T
33'

fi.
3 3

a
S
,33 3" 3

a
3Z
33'

s
3Z
33'

a
Z T
33'

a
Z T
33'

3:
|33

S
|33
|33 ,33 ,33

3Z
,33'

3Z
.33'

Z T
33'

Z T
33'

3Z
33'

3'
33'

Z T
33'

5
33

Z T
33'

3'
33'

3:
33'

3'

3Z

3Z

3Z

3'

3Z

3:

3Z

3Z

3'

3Z

ft

ft

3
3

BJ

EJ

EJ

EJ

3
3

3
3

3
3

3
3

EJ g 3

gJ

3
3

3
3

BJ

BJ

EJ

3
3

3
3

3
3

3
3

3
3

BJ

gJ

3
3

3
3

3
3

gJ

3
3

BJ

EJ

EJ

3
3

S
3

3
3

3
3 3

BO

o
X X X X X X

to to

CD 0

zj
I-t

Zj i-t o

3 5
i-t i-t

Zj i-t

zj
i-t

^
i-t
CD

^
i^
0

^
i-t
CD

0 X

Zj i-t
0 CD

zj
i-t

zj

i-t

g i-t
CD 0

zj

^
i-t
0

g 3
i-t i-t

zj
i-t

^
i-t
0

Zj

z|
i-t

zj
i-t

zj
i-t

zj
i-t
0

i-t

= =

% g
to

% g

to to

g'

d
ii

,= g

1^

2
g

% g

~i

, =

" 2

" 2

d
ii

d
ii

d
it

d
f.

d
fi

g'

d
ii

d d
f i

d d d d
ii ii

fi

ii

fi

ii

to

to

ii

ii

fi

to

ii

'=

'=

'--

'=

'=

'=

'=

'=

'=

'=

'=

'=

UIS!

P.
UIS

?
IUS

P
UJS

P.
UJS

P
LUS

? 3

P
UIS

?
UIS

P
UJS

?
UIS

P
UJS

?
LUS

?
UIS

P
UIS

P
UIS

P
UJS

P
UISI

P
ism

' "Wg

to

8
ii ii f.

to

ii

ji

ii

ii
NJ NJ

to

to
NJ NJ

!to

"

^ <

^ ^
CD ji CD

$
ii
Cl Cl Cl Cl Cl Cl H CD 0

^
ii to cn 2

!to
Cl H O

!to
Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

2
-H

2
H O

2
H O

2
H

2
H O

2
H CD O O

2
0 CD CD

2 + 6
H

2
0 0

+ o
O

g
ci
H

g
ci

ci
H

ci
M

ci

ci

ci
H

ci
m

'B12

P
UIS

P
UIS

P
UJS

P
UIS

?
UIS

?
UIS

P
UIS

p
UIS

? sm

?
UJS

?
UIS

P
UIS

P 3

P
UIS

P
UJS

P
UJS

P
UISi

IB

B12

5 5

B12

P
UJS!

P
ism

fi,
ft

G 3

G 3

ft

ft

ft

ft

ft

3:
33

3Z
33

3Z
33

3:
,3-

3Z
3-

3Z
33'

ZT
33'

3Z
33' 0

3Z
33'

s
3-

3Z
33'

3Z
33' 0

ZT
33'

3Z
33'

3Z
33

3Z
33'

ZT
33

3:
33' 0

3Z
33 0

3'

^
ft

ZT

f 3Z
a

ZT

ZT

5Z
ft

f ZT
3

3Z
ft

ZT
a

3Z

3Z
ft

3Z

5Z

3Z

ft

EJ

BJ

EO

EO

EO

BJ

BJ

3
3

3
3

3
3

BJ

EJ

3
3

3
3

3
3

3
3

BJ

EJ

EJ

gJ

BJ

3
3

3
3 n-

3
3 o-

3
3
D-

3
3 n-

3
3 o-

EJ

EJ

BJ

S BJ

3
3

3
3

3
3 a.

3
3
Q-

3
3

3
3

"jj-

^
X

^
X

to
X

<^ X X

to X

CD X

X X TTPB

ij;-

^
X

to

to to
X X

to
X X X X X X
TTI

= 1
i-t

= 1
i-t

^
i-t

1 ^
i-t
0

= 1
i-t
CD

= 1 = 1
i-t i-t

:zj

zzj
i-l 0

= 1
i-"

4
i-l

= 1
i-l

= 1
i-l

^
i-l

^
i-l

^
i-l

= 1
i-l

^
0

i-l 0

i-l

o to

CD

to

Q 5

%
Wg it

, =
g

"1 g

, =
g

1
ft

w w 1

, =
Wg Wg

, =
Wg

<
fi ft

d
,-:

W
fi

d
'=

, =
Wg

"2 g

I"!

d d
it
ft

it

'=

'=

.\

'=

.':

,j

B13

!^

12

g ci

o o o

ci ci

ci

CD

CD

ci

ci

ci

ci

ci

ci

tel

ii

ii

ii

fi

ii

to
NJ NJ NJ NJ

UJ

ci

Ci

^ c;
CD

^
o

^ ^
CD

^
o
CD

s
Cl

^
o
CD

$
CD

^
o o

%l

Cl

Cl

2 o Q

2 o o

cn 2
H

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

2
H

2
H

2
H O

2
H

2 o

2 o

Cl

g
ci
H

g ci
H

o o

o o

ci

ci
H

ci
H

g
ci

o o

CD O

O O O

ci
2 3

c h ^
2 3

ci
H

g
ci

ci
2 3

ci
2 3

ci

ci

g ci
2 3

O CD

ci
H

ci
H
teli

ci
2 3

CD

ci
ET

ci
ET

ci
2 3

ci

ci

^
2 3

2 3 2 3

2 3

2 3

2 3

2 3

2 3

2 3

2 3

2 3

2 3

2 3

2 3

2 3

fi. fi.
ft ft

G 3

G 3

G 3

G ft

G 3

G 3

3"

|3-

|3-

3^

|3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

3-

5"

5Z

ZT

3Z

ZT

ZT

ZT

5"

ZT

ZT

ZT

3Z

ZT

3Z

ZT

ZT

ZT

ZT

3'

ZT

8
OIJD OIJD oip OIJD Oip OIJD ctio
Ctio

s
3

ctio

ictio

oip

Ctio

Ctio

Ctio

ctio

ctio

Ctio

ctio

ctio

ctio

Ctio

3
.vie

3
.vie

3
vie

3
.vie

3
.vie

3
vie

3
.vie

3
vie

3
aiA'

3
.vie

3
:.vie

3 .

3
:.vie

3 S. S

3
:.vie

~
gJ

gJ

3
3

s 3
3

3
3

3
3

3
3

EJ

3
3

3
3

3
3

3
3

gJ

S'

3
3

3
3

BJ

ro

s
gj

%'
gJ

3 o
3

3
3

3
3

3
3

3
3

BJ

EJ

BJ

BJ

3
3

3
3

3
3

3
3

% 3
3

EJ

3
3

3
3

to
to X X X X

to
X X X X X X X X X I X X X

to
X X X X X

Zj

Zj

Ij

^ g
,= g

zs
NJ Nl

zj

zj

Zj

Zj

Zj

Zj

Zj

5
o to to

zj

Zj

Zj

Zj

2
g ,= g ,= g

zj

Zj

Zj

Zj

^ ^

g
, = g <

CD

to

to

to

to

'=

% g

g'

,= g

,= g

d
f i

,: g'

^ g g

, =

1^

'Z

'Z

d d d
fi

g g

"2 '; g

,= g'

, = g

'= g

,=

"Wg

w
< '=

fi

fi

to

fi

fi

ii

ft

it

'=

'=

'=

'=

'=

'=

'=

'=

'=

to

to

to

to.

to
NJ

" $
o
CD

<

^
o o
CD

$
CD

b Cl 2
CD O CD Cl Cl Cl Cl

2 o o

2
H CD CD O CD

2
H

Cl 2

Cl H CD CD O

cn 2
H O O

Cl

Cl

Cl

Cl

Cl

Cl

CD

Cl H

Cl

Cl

Cl

Cl

Cl

2
H O

2
H

2
CD CD O

2
CD CD CD

2 6 o

2
CD O

2
CD

ci

8
ci

ci

ci

g
ci

ci

ci

ci

g
ci

ci
H

ci

ci

ci

g
ci ci

ci
H

ci

ci

ci

ci

ci

^
3 3 3 3 3 3 3 3 3 3

^
3 ?
UIS

P
UIS

?
UIS

? 3

P 3

"P
UJS

"P
UIS

P 3

?
UJS

? p
UIS

fi.
ft

fi.
a
ZT
3-

fi3

fi.
3

fi.
ft
!P

fi.
3 ft

fi.
3

G 3

G 3

G ft

ft

s.
ft

fi.

fi.
ft

fi.
ft ft

ZT
3-

3Z
3-

ZT
3-

ZT
3-

ZT
3-

ZT
3-

ZT
3-

ZT
3-

3:
3-

5Z
3
|3-

3-

3-

3-

3-

3-

3-

3-

3-

33

3' ZT

3 ZT

3' 5"

3' ZT

3' 3Z

3' 3Z

3' ZT

3' ZT

3 ZT

3' S

3' ZT

3' S

3' 3'

3'

5'

3'

3' S

3'

3' 3Z

ft

ft

EJ

EJ
3

3
3

3
3

BJ
3

BJ

EJ

3
3

3 o
3

3
3

3
3

BJ

EJ

BJ

3
3

3
3

3
3

BJ

BJ

EJ

EJ

BJ

3
3

S
3

3
3

3
3

3
3

3
3

BJ

3
3

3
3

3
3

3
3

o
HTT i-l

CD
HTT

CD
HTT HTT HTT HTT HTT HTT HTT

to
HTT

to to to
X X X

to

to
X

^
i-t

Zj

zg
i-t
i-l i-l i-l i-l i-l i-l i-l i-l

zj

Zj

zj

zj

zj

Zj

8
to to
CD

g ~
g g'
to

CD

"i g

't
g g

" ~ !

'=
g'

, =
g

"2

~i g

, =

1
ii

d
it

d
.':

d d

d
'=

ft

it

to

ft

fi

ji

ii

ft

'=

'=

'=

'=

to

fi

'=

'
'=

to

to

to

ii

fi

ii

fi

ii
M

to

to
NJ NJ

"

NJ

^
o b cn 2
H

$
CD

^
o b o

Cl

CD

Cl

Cl

Cl

Cl

Cl

Cl H O

Cl H CD O

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

2 g

2
CD

2 o o C D

2
H CD

C D

Cl

Cl

g
ci

g
ci

o CD

ci

ci

ci

ci
H

CD

o ci

g
ci
H

o o ci

ci
H

ci
-1

ci

ci

ch
H

ci
H

Q 3

G 3

G ft

G ft

G ft

G 3

G 3

G ft

G 3

G 3

G ft

a
ZT
3-

a
3'
3-

ZT
33,3'

ZT
33-

3'
3-

ZT
3-

ZT
3-

ZT
,3-

3Z
3-

ZT
3-

ZT
3-

ZT
3-

3' 3'

3'

3' 3Z

3'

3' 3Z

5'

3'

3' 3Z

3'

3' 3Z

3'

3'

3' 3'

3' 3Z

3' 3Z

ft

ft

ft

ft

gJ

3
3

gJ

3
3

3
3

gJ

gJ

3
3

BJ

3
3

3
3

EJ

EJ

3
3

3
3

3
3

BJ

EJ

EJ

3
3

3
3

3
3

3
3

gJ

BJ

go

E O

3
3

E J 3

B J 3

E O

E O

B O

go

to

g
1 1 H HTT PBl.
I-l

g
I-l

HTT PBl

HTT PBl

HTT PBl

HTT PBl

HTT PBl

TBd

HTT

HTT PBl

HTT PBl

HTT

HTT PBl

HTT PBl

HTT PBl

= 1

= 1 1

PBl

PBl

I-t

I-t

I-t

I-t

I-l

1-1

i-l

I-l

I-l

I-l

^^

I-l

CD O CD

o o
00

CD CD O O

o CD

o 5

o o
CD O

o o o

, =
g

, =
g

, =
g g

, =

, =

, =
g g g

l
g
M

w
ii

d
ft

w
fi

g'

d
ii

ii

fi

!to

!to

to

ft

it

to

fi

to.

g 3

to

ii

fi

i i

ii

to

to

ji

CD

o cn 2 cn 2
H O

o
Cl Cl Cl Cl Cl Cl Cl Cl Cl

to
Cl Cl

b
Cl

b
Cl Cl Cl

Cl

Cl

Cl

Cl

Cl

Cl

2 o

2 o

2 o

2
CD

2 o CD

2
H O

2 o o o

2
H CD CD CD

2 o o

2
H CD

2 o

2
H O O

2
H O O

2 o o CD ci
H

ci
H

g
ci

ci

ci

ci

g
ci
H

g
ci

g
ci
H

CD CD

ci
H

ci

ci

ci
H

CD CD

ci

ci

ci

g
ci
H

g
ci
H

ci

ci
H

ci
H

ci

ch
H

P
LUS

P
UIS

P
UJS

p
UJS

P 3

P
UJS

P
UJS

P
UIS

P
UIS

P
UJS

P
UIS

p
UIS

?
UIS

fi.
ft

fi.
3

fi.
ft ft

fi.
ft

fi.
a

fi.
a

G 3

G ft

G 3

G 3

G ft

3'
333333333' 3|3|3|3-

3Z
3-

3Z
33-

ZT
3-

ZT
3-

3Z
3-

5
3-

S
3-

ZT
3-

ZT
3-

3'

3'

3'

3'

3'

3'

3'

3'

5"

3' 3:

3'

3'

3'

3'

3'

3'

3'

3'

3'

3'

3'

3'

3' ZT

go O

go
D

BO CD

BO O

BO CD

EO O

go CD

go O

go CD

go 0

go CD

go
CD

go CD

go CD

BO CD

BO O

go CD

go CD

go O

go CD

go CD

go O

BO O

o o o
X X X X X

CD O X X CD X

to to
X

to

to

to to
X X CD O X

CD

to
X I I X

to
X

to
X X

g
X X X

to
X TT

It
ZS

ZS

zl

Zl

zs g

ZS

zj

zs

:j

zzj Z S

Zl
i-t

= 1
i-t
CD

= 1
i-t

Zl
i-t

zzj

zs
i^

^ zs
i-t

^
i-t

^
i-t

^
i-t

^
i^ o

^
i-t
CD CD

1
i-t

ZS
i-t

g ,,g

g ,-

g
to

g
"i

g
*t

CD

,-

,-

1 -

1 -

,-

~i

1^

,=

,=

^
g
f it

,=

,=

,=
g

d
i-l

d d d
i-* to
i-l i-l

g'
i-l

d d
i-l i-l

:
g g

=
g
ro

g
M ii

=
g
ro

d d d d
i-l

d d d
i-l

d
i-l :tt

!^
fi fi

^
i i

M ii

^
i i

^ '=

'f ft

i-l

^
to

to

to

to

to

to

to

to

fi

to

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

s
fi ii

ii
NJ

" ^ $ ^ ^ ^ ^ ^ <
o
CD 0

"

ci
0

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

2
-H

2
H

2
H

2 o CD

2
H O O

2 o o

2
H 0

2
H 0 0

2
H

2
H

cn 2

+ g

g
ci
H

ci

g g

g
ci

g g

ci
H

ci

ci
H

ci 1^

ci

ci

ci

ci

ci

n
IM

^
wi wi

ci !H

(h

g ci

g
ci

ci

ci

oi

ci

ci

ci

ci
H

^
!M'
.wi .wi

IM

IM

wi

wi

wi

wi

wi

wi

wi

?
UIS

P sm o

?
UIS

?
UIS

?
UIS

?
UJS

?
I U S

P
LUS

p sm

? sm

?
UIS

P
U I S

p
UJS

p
LUS

p sm

?
UJS

?
UIS

P
U I S

P
UIS

P 3

p
UJSI

P
UIS!

?
UIS!

G ft

G
I P

fi.
3 3

fi. fi. fi.


cti

fi. fi. fi. fi.


3 3 3

ft

s
ZT
33'

s. a
ZT
33

0 3

3'
13.3-

S
33_
.3-

3'
|3-

ZT
33 33 33

ZT
3' 3

3'
3-

S
33'

3"
33'

ZT
33'

ZT
33'

3Z
33'

ZT
33

ZT
33

3Z
33"

ZT
33'

ZT
33'

ZT
33'

3.

3.

3 ZT

3Z

3Z

ZT

ZT

ZT

ZT

3Z

ZT

ZT

ZT

ZT

3Z

ZT

ZT

ZT

ZT

ft

3
3

3
3

3
3

BJ

EJ

EJ

gJ

3
3

3
3

3
3

3
3

3
3

gJ

3
3

3
3

gJ

gj

gJ

go

BJ

EJ

EJ

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

BJ

S BJ

EJ

EJ

3
3

3
3

3
3

3
3

s 3
3

g
X X X X

o
X X

o
X X X

to

to

to

5
X X X X

Zj

z|

zj

zj

z|

Zj

^
CD

zj

Zj

5
o CD

3
0

3
0

zj

3
CD

Zj

zj

zj

CD

CD

CD 0

CD 0

to

, =
g g

, =
g

, =
g'

w
fi

d
to

d
ii

z g

, =

d
fi

wd

, =

, =

'=
g

''-

';
g

^
g

'=
g

, =

"Wg

d d

fi

to

to

. =

'.

'_

to

to

K
to
!to
f i

ii

to
NJ NJ

"

NJ

^ <
o
CD CD

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl H

ct

2
zl +j

2 +^

2 + g g

2 + g g
-H

2
H

2
H

2 o o o

2
CD

cn 2 o

Cl

Cl

Cl

2
CD

cn 2

o
Cl Cl Cl Cl Cl Cl

g
Cl H

Cl

Cl

g
Cl H

g
H

g
Cl

Cl

Cl

CD Cl

g
Cl

o o
Cl

Cl H

Cl H

Cl H

o
Cl

Cl H

Cl ET

Cl

Cl

Cl

Cl

^
I M

^
wi wi

^
I M

^
wi

.wi

I M

!M

P.
UIS

UJS

LUS

LUS

LUS

UIS!

UJS

UJS

UJS

UJS

UIS

UIS

UIS

UIS

UIS

UIS

UIS

UIS

(is

3Z
3r

3:

3Z

3:

3Z
|3-

3Z
,3-

ZT
,3-

3Z
|3-

ZT
|3-

3'
3 -

ZT

3Z
3 -

3Z ? 3' 3:

ZT ? 3'

s
3^

3'

ZT

3:
3 -

ZT ? 3' 3Z

3Z
3 -

3 "

3 "

3 -

3^

3^

33' 3Z

3^

3^

3 3Z

3' 3Z

3' 3Z

3'

3' 3Z

3' 3Z

5' 3Z

3' 3Z

3' 3Z

3' 3Z

3'

3' 3'

3' ZT

s a

ft

ft

ft

ft

ft

ft

BO

BJ

3
3

3
3

EJ

EJ

BJ

BJ

EJ

EJ

EJ

go

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

BJ

EJ

EJ

BJ

BJ

EJ

go

go

go

S
go

oipi

OIJD

oip

OIP

OIJD

OIJD

oip

oip

oip

oip

oip

OIP

Wt

wi

wi

wi

p.

p.

?'

? sm

P sm

P 3

CSB

G
Ctio ctio

G
Ctio

G
ctio

fi. fi.
Ctio

s.

fi. fi.

fi. fi.
Ctio Ctio

S. fi.
Ctio

3
3

3
3

3
3

3
3

3
3

3
3 3 3 3 3

g
X X X X X I

to to X

CD X

to to X

to to X

to

to

o o to
X

to X X to X X X

to
X X X X

zt

Zj

^ g
o

zj

Zj

^
o

5
0

5
o

3
o o

3 :s 5
CD CD

3
CD

zj

3
o

zj

z|

zj g ^

Zj

Zj

zj

Zj

to to

to
1 ^

'[

, =

^
g
H;
ft

,
g
H;

w
H;
ft

g
H;

g
1^

g
H;
f i

d
H;
ft

d
ij ft

d
I-l

g
H;

d d
H;
i-l

g
i-l

d
to

d
i-l

g
i-l

d
i-l

g
i-l

d
i-l

to

to

to

to

to

ii

ii

ii

fi NJ

fi NJ NJ

^ $

<
o

^
C D

$
o o o
Cl Cl Cl C D

^
o

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

2
H

2 g

2
H

2
H

2 o
Cl

2
0

g
Cl Cl

g
Cl

g
Cl

g g

g o
Cl

H C D O O

2
O

2
C D Cl

H C D C D

Cl


Cl Cl

Cl H

C D Cl H

Cl

g
Cl

H C D C D C D C D
Cl H

2
C D Cl

Cl

Cl


Cl Cl

Cl

Cl

Cl H

^
IM'

.wi

wi

wi

wi

I
3

fi.
ft

fi. fi.
a

G
ft

G 3

G 3

G 3

fi.

G
ft

a
Z T
3-

K '

S
3" 3-

5'
3-

Z T
3^

Z T
3-

3:
3-

Z T
3-

Z T
3-

Z T
3-

Z T
3-

3 Z
3'

3 Z
3-

3 Z
3-

Z T
3-

Z T
3-

3 Z
3-

5:
3-

3:
3-

Z T
3-

|3-

3-

,3-

3' ft

3 Z

3 Z

3:

3 Z
Cti

3 Z

3 Z

3 Z

3 Z

5 Z

3 Z ft ft

s
3 3

ft

ft

a
3

fl

ft

B J

B J

EJ

E J

EJ

E J

3
3

3
3

3
3

3
3

3
3

3
3

B J 3 3

E J

B J

E J

E J

B J

B J

BJ

E J

EJ

B J

BJ

EJ

E J

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

g o 3

o
X X X I I

C D

to
X

to
X X X X X

: s
X

Zj

Zj Z S

Zj

Zj

3
o

o X

g X
zj

zj

5 5 5 5 3
C D

Zj

X g Zj

Zj

3
g
to

zj

zj

g
I

Zj

zj

^ g

g
o
1 =

g
, =

o
to

g
C D

fi

:
g
g g

, = g

, =

, =

<
fi

" = g

1=

, =

=
g

g
5

: g

to

fi

to

to

to.

fi

to

to

fi

fi

ft

it

it

ft

' =

' =

'=

'=

' =

'=

' -

' =

' =

' =

' = '=

' = '=

' =

' =

' =

, =

' =

' =

' =

, =

.\

to

to

ii

ii

ii

fi

ii

!to
NJ NJ

ii
NJ

^
CD

^
o

^
to to
Cl Cl Cl Cl

ii
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl

Cl

Cl

2 -H + g g

2
+j

2
CD

2
H O CD C D

2 o o

2
H CD

2 o o

Cl

g
H

g
ci
H

g
ci
H

ci

ci

ci
H

ci
H

CD

g
ci

ci

ci

ci

g ci

CD

ci

ci

ci

ci

ci

^
P
LUS

UIS!

?
UIS

P
LUS

?
U I S

P
UIS

?
LUS

p
UJS

P
LUS

P
UIS

P
UJS

?
LUS

?
UJS

P
UIS!

P
UIS!

?
LUS!

lis

G 3

G
IP

G 3

a
ft

G
IP

fi.

ft

ft

3Z
3-

S
|3-

3Z
33-

3 Z
3-

S
3-

Z T
,3-

Z T
3-

Z T
3-

3Z
3-

5"
3-

3:
3-

3Z
3-

S
3-

Z T
3-

3 Z
3-

3Z
IJD

3Z

3'

5Z

3'

cti

ft

ft

o 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3

go

go

go

3
3

3
3

3
3

gJ

BJ

BJ

3
3

3
3

3
3

3
3

gJ

3
3

3
3

3
3

3
3

gJ

3
3

3
3

gJ

3
3

3
3

gJ

EO

3
3

EJ

gJ

BJ

g
X X X X X X

to to o
X X X X X X X X X

to
X X X X

Zj

3
g

Zj

3
o

3
CD

zj

Zj

zj

3
0

zj

-1

3
CD

zj

= 1

=t

Zl

TPB

o
to

o o

CD CD

%
g
1-1

to

~i g g
1-^

0 0

*:

H-

to

g'
H"

d
H" fi

g' r

g r
fi

d d d
r
ii

d wd d d
1^
I-l I-l

'=
g

r
fi

I-l

<
to

to

fi

ii

ft

it

it

'=

' = ' = '=

'=

'=

'=

'=

'=

'=

'=

'=

'=

'=

= '= ,

fi

fi

i i

ii NJ NJ NJ

CD

o o to
fi
Cl Cl Cl Cl Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

2
H O

2 o CD O

2 o o o

2
H CD 0

2
H

2
H CD

2
H

2
0

2
H 0 0 0

2
0 0

2 o

o o

ci
H

ch
H

ci

CD O

ci

ci

ci

ci

ci
H

CD CD

g S

ci
H

ci
H

ci

ci

ci
H

ci

ci

ci
H

G 3

G ft

G ft

G 3

G 3

G 3

G 3

G ft

G ft

G ft

G ft

a
3'
33

3Z
33

ZT
|3-

3:
33

ZT
|3-

3Z
33

S
33'

3'
33'

3Z
33'

3Z
|3-

3'
33'

ZT
33'

ZT
33'

ZT
33'

S
|3-

3Z
33'

3'

ZT

ZT

ft

ft

ft

ft

ft

ft

go

E O

go

go

go

go

go

go

go

go O

go CD

go
CD

BO CD

EO CD

BO O

EO CD

EO CD

EO 0

go CD

go CD

go CD

go O

go CD

go CD

a 3

to to
CD X X X X X X

to o
CD X X X X X 0 X X X

Zj

= 1 = t

= 1 = 1 = 1

zj

3
^
N> O

zj

3
!^
NJ 0 0

Zj

Zj

^
NJ

^
NJ 0

^
NJ 0 0

zs
1^
M CD

Zj

^
NJ CD O

zj 1^
NJ CD

g
NJ

Zj 1^
NJ

zj

zj

zj

Zj

zj

!^
NJ CD CD O

^
M NJ NJ

^ g

^ g
0

g
O

to to

, =
g
H;
ft

, =
g
H;
!et

.=
g
H;
to

c.
H;
it

H;

:
O

, =

, =
g
H;
it

^ = g
g

, =
g
i-l

g
i-l

, = = g
i-l

g
i-l

H;
it

H;
to

H;
to

!^
fi

i-l

fi

'-

-J to

!to

fi

ii

ii
NJ NJ NJ NJ NJ NJ NJ

< $
CD

o
CD

CD CD

o
CD CD CD

ii
Cl Cl

ji Cl

ii
Cl Cl

ii
Cl

to cn 2
H Cl Cl Cl Cl Cl Cl

ii
Cl H 0

ii
Cl Cl Cl Cl

2 o o o

2
CD CD

2
H 0 0 CD

2
-1 0 0 0

2
-1 CD

2
H O CD

2
-1 CD O

2
0

2 o

2
0

2
CD O

cn 2

Cl

Cl

Cl

Cl

ci

ci
H

ci

ci
H

ci
H

CD

ci

g
ci
H

g
ci

ci

ci
H

ci
H

ci

ci
H

ci

ci

g ci

ci ci

ci

ci

ci

ci
H

ci
H

CSB

G ft ft

G
ft

G
ft

G ft

G 3

fi. fi. fi. fi. fi. fi. fi. fi. fi.


a a a
ft ft

3Z
,3-

3'
3-

ZT
3-

ZT
3-

ZT
3-

3'
3-

S
3-

3:
33

ZT
3-

ZT
3-

ZT
3-

ZT
3-

ZT
3-

ZT
3-

3'
3-

ZT
3-

ZT
3-

ZT
3-

ZT
3-

3Z
3-

3Z
3-

3Z
3-

ZT
3-

3'

3"

3'

3'

3'

5'

5'

5'

3'

3'

3'

3'

3'

3'

3'

5'

3'

3'

3'

3'

3'

3'

ft

ft

ft

ft

ft

ft

ft

ft

ft

ft

ft

BJ

EJ

EJ

EJ

EJ

EJ

3
3

3
3

3
3

3
3

3
3

3
3

3
3

gJ

gJ

gJ

3
3

3
3

3
3

3
3

BJ

EJ

EJ

3
3

3
3

3
3

3
3

gJ

3
3

3
3

BJ

BJ

3
3

3
3

3
3

EJ

EJ

3
3

3
3

5
3

Zj

Zj

Zj

5
CD

3
CD CD

zj

3
o

Zj

zj

3 ^
o

Zj

Zj

^
0 CD 0 CD 0 CD

3
CD O

Zj

zj

zj

zj

o o

CD CD

o o to

o o
CD

o o

CD

CD

to

g S

CD

*t g ^
i^

CD

*t g
i-^
fi

" g ^
iii

^
g
i-l

" g
i-l

=
g g ^
i-

] g ^
1-^

1 g ^
i-l

=
g

g
i-^
ii

g ^
iii

g ^
i-

g
i^ *S

g
i-l

g
i-l

g ^
i-

g ^
1^
ii

3 if.

Ji-l

J- 5

5 '2 5 'i-^ 1-^


^

'2 1-

'2 i-l

^ "
* " =

*t

*5

^ "

= *
% g
i-l

ii

ii

ii

fi NJ

fi NJ NJ NJ

s
Cl

z^

^
CD

Z3 o

'Zj

Z3

ZZj

ZZj

^
CD

Z5

Z5

2;
o

o
Cl Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

Cl

2 zl +

2 g g

2
+j

2 +^

2
H

2
-H +j

2 o

2
H O CD CD

cn 2

to
Cl H 0 Cl H CD Cl Cl Cl Cl CD Cl Cl Cl Cl

g g

g
ci

g
H

g o ci
H

g g

ci
H

ci

g
ci

ci
H

ci

ci

ci

ci

g
ci

ci

ci
H

ci
H

ci
H
tel

ci

ci

ci
ET
tel

ci

ci
H

ci

ci

ci

^
3
in

^
3 3 3

^
3 3 3

f 3

? 3

G ft

G ft

G 3

fi.

G ft

G ft

G 3

G 3

G ft

G 3

G 3

G 3

G 3

G 3

G ft

s
3:
|3-

3Z
|3-

3Z
,3-

3Z
3"

3Z
|3-

S
3"

3:
|3"

ZT
|3-

ZT
3-

ZT
3-

ZT
3-

ZT
3-

3Z
3-

3Z
3-

3:
3-

3Z
3-

3'
3-

SZ
3-

ZT
3'

ZT
3-

ZT
3-

3Z
3-

3-

3Z

3Z

5:

ZT

3'

3Z

ZT

5:

3Z

ZT

3Z

ZT

3Z

ZT

ZT

ZT

3Z

ZT

ZT

8
3 3 ft ft 3 3

ft

BJ

EJ

EJ

EJ

gJ
3

BJ

EJ

EJ

EJ

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

3
3

BJ

3
3

3
3

gJ

BJ

EJ

EJ

3
3

3
3

3
3

3
3

s 3
3

BJ

BJ

EJ

go

S
go

S
EO

S
EO

3
3

3
3 3 3 3 3

to
X X I X X X X X

to to
X

to
X

to to
X

to
0 X

to
X

to
X X X X X X X

to
X X X

ZS
i-t

'ZS
i-t
Ht

3
Ht

3 zs 3
Ht

zj
i-t
0

-1

3
i-t
CD CD

zj
i-t
CD CD

3 ^
i-t

zj
i-t
0

Zj g -g 3
i-t
0 0

3 g 3
i-t i-t

zj
I-t

Zj
i-t

zj
i-t

zj
i-t

2j
i-t

2j

rpB

ZS
i-t

i-t
0

i-t

i-t
0

i-t

to

to

w
ft

d
!ft

g
ft

= g

d wd d
h '=
to
ft ft

g'

g'

d d
ft
!ft

ft

f i

'=

'=

'=

'=

h ' = '=

*1

*t

to

to

*t

<t

*t

'=

'=

.\

'=

, =

'=

'=

'=

'=

'=

'=

'=

=
to

g'

g'

s
to

ft

ii

'--

'=

'=

II

i I

>L

ISJ NJ

NJ NJ

in

h
2
OJ NJ UJ

Lu UU '+~ o

: 3
* i

3 S %
o
CU QJ

a% C S
73

CD

3. 3 n_ 2 s
S 3 o
TT
era o

il
m 01 n 3" Q. C D !U C

C U UD O

=r
3 TT

II
m_ o c o

3
OJ vJ VO

n r a% O

^ s s
X5 II

3
b -1

CD a_ UU 00 M

f i U3 CTl CD

= CD m

O CTl >J Ol T3 -I-

^ -<

fl

3. 3
=;

2d
Ol o Q. eo 00

^ S

g ~< 3 2
=7 3
=J J2

^ a3 fT
(ra o era o (ra o

00 O" cn cn QJ o-

^ ^

00 UJ

f i o f i Nl

= CD m

00

^
3 X-

. n X. 5 eo
.Q

vl

"O O

DOO go

l/l'

5- 3 ^ =;
Q.

3
n

< m a. o c < a >

era o era o

go

Ul

II cu c t / 1 tra 71 O 33 o 0 0 era. O ro 00

<

^s
c .5 tra (/, O C D o c u
3

ll S2
TT

g ^ ^ o S
00 .<

i%

i
-a' era o (ra o

>
C/l TJ 33 03 O 00

m cu 3-

E %
^
c (TO

2 < ^ QJ
3 l/l CD QJ -J

II
m U^ >0

<

<

(TO O

CD

CD .Q

2"

^
CD OJ

% s
o UJ

c era o o (ra_ C D

< <
CD QJ

<

go
C D J3 c

6 cn

>

h-l ;vj

5 ^
D -a II M c era

6 m
OJ

H-l

b. o 3 B n
J3 II

;^ ! t -o
X

if I I I5 I^
00 C D C

K Iz
^ E. 3 3 II - eo -o

tn

II

s
CB 0) X-

eo F
=7 !U
3 Ul

^ 1g
3 TT T3 UU

g = 1 a
3 -o -R
n II CD UJ U3 cu (ra C D II = %i UJ

o c (TO

It
n QJ n 3fD X3 X -o .Q C CD

11
3Ct)

II
OJ n m'

D.

2
TT

Nl

^
Nl Ln Nl C D OJ

S3

2 ?l
n QJ n Ul f i O

#s
;>
Ul UU O fQ. i

a. i.n o
CD Ln OU o

b o 3

s#

*
Nl

v 2 > .o

" g
= CD

3"

PROSECUTION EXHIBIT for idgXrHcation PAGE OFFERED: PAGE ADMITTED: PAGE 1 OF I PAGES

'j)^

C D

i
H-l

cr

lit:
3
L/l Cl CD QJ

t-1 CD go

ES
3 Ul
H-l 00

CDn CD

UJ Ol

o c C D
7:

HI

CT

O
3 Ul CD CU

n
HI 00 NJ Ol n

NJ O CD 01 Ln 00 vJ 3-

Ci

H-l CD

CDn

<o

H-l

CT

-t-

-D
3?i

3i
3 C/1 HI 00

C D
O n

C D

^
n 3 ;

3
"D 3-

z:>
00 cn N J cn g g 5 g 3 3t' H CD

S K -G ^
3 Cl n cn

5;

III* I I I
ll eo _ era
o

Q- cn ^ 3^ NJ 3 g g P 'x -p;

oi
n_ Ol

g&
3 l/l CD 1^

CD CL

C D
3

g
ro
NJ in Nl NI

C D

11
liD

< <

iE oI
QJ 3

ID

II
7=.
LD QJ

TO O

&&(%
O

UD C D O 00 era

1 |H ti 5,1
< in
TO tra
O
i-f

I i
3'

tf
^

fill s i
^ Ol

J^g
CD QI

cn

H-l 00 Nl

' g g
CD

00

g2
5'

^ K m
01 3BO
XI 3"

!L 5'

g
00

00 5

-
O

^ 3= a p

! S 3 6S
<
(io (Kl

I^
3

go
(TO Cjl II

+ cr
% 3

g o

II QJ

CD

n>

irs
gs s

2; ^ j : ^ < &
-o o

^ *
i

TO
3

l sg %l
? g
UJ
CTQ

"5
O

CD

If H
8^ ^
: o
00

:l
10 CD

^
s

Z5: ?

^ : o

V s r

eo

00 eo

'3 ^ S^

s i
2
^

&
QJ

^
3

g K. S
(TO O

6 ^fi s i
5 C D
QJ 3

C m < g

o
ID (D

c
00 O

83
(TO O

00

f.
O

QJ 00

<

(jo

<
o

CD

go

<
Q. CD

g5 S &
00 eo

5 R
N ~ ID

gs
^ 2
00 eo

% s^%

a#
Q. CD II

cn N

CD CD

Sg
Ul

gg
SI
UJ S

V m

Q.

O
CD Ln

UJ M Nl
I/,

OQ

5
cn C D

CL

%? 'S
II * i

StI 2, 5 -2
UJ (ra

1S I

sg
CL CD

eo

5 ^
LA

#g
eo Ln
O
II

-n
f i UD CD

Nl

^ sS" c
-o
, o g 1
CD 3 3 CD

mI I
H_

i. QI

i^o
z -5UU

ii
01 CD

s?
II Ln f i NJ < H-l UJ M

(5^ IL o p i Iro n
3C <

= 11
O

^
QJ

V o
O O Ln

5%
00 CD TD

% #
UJ era

in
Ol CX CD QJ XI _ CD

il
LU

00 00

cn

S ^

2 g
go Ln
NJ
L/l

il
gl m

CD Ul QJ

00 CD II

^ 01

ro

CD CT

Nl ,T

ro
II

S? a_
II CD. QI CD

Ln
.Pi Nl

E.
go l/l
L/l NJ

<. ^
-n 5,
.ti

> 5 o 9=:
b
QJ

a s
Nl Ul NJ NJ

a.
CD

cn
(30 00 f i Pi

gl m
CD
^Ll

QT

c_

lie I I
f i LD

NJ LD NJ f i

era m -n n
3-

C D % z=R H ^ 15 II 2,
c QJ HI Q)

2
go Ln
O CD 3. M QJ -n CL %

.Q c

< iZi

m n

14
CD

OO

C D

X 'H N O

Hi

NJ ID Nl .fi

3"

F
QJ ^

NJ g
LjD

L^ ^
H I go

id. gl ?

cn

Ul

o CD
I
3 3 CD

on L

0H 0 =

Q. "S go 1^ o
"O CD 3

6 ^

f i eo

oi

II
sS 81

o o I
3

eo
CD 3

III
00 o 00 o '

3 5

rli
QJ LD Nl

g
Nl go

Ln

O i>l CL go
1 ^ g TD CD 3

O CL zr "o

^ i i i eo Ol
ro

a s
!X

NJ
CD.

3 2 ?5 % z g

ss
Ol ID Ul cn

%1
F
QJ

c J o
00

ro

ro

H" ro
t-1 Nl

.Pi f i

I
3 CD

II O

II O

CD

II O XI II

g
II O

eo
.D

eo
=;
go 3

go

eo
XD

^
eo
3 C

ii
X

III

o
CD CD

CD

g
II

2^ ^ 8
ID f i

g O

eo o o .CD
II

o eo
JD II

g
QJ TT

M Nl HI

go
JD II

eo
ID II

eo
JD

ID

g
eo
3 C

s?

ro ^ eo cr ro
QJ
Lrt

Nl Ln Nl Nl

g
CD CU TT

3 <
2
-I-

^
HT
NJ

8&
H-l

go
3

3
II

# i

o o o

i-i

eo :
3

eo
3 C

'

'

eo cr

g
g

o o

f l

Nl O O NI Nl Ln

CD
-IO O O O t-1
-<

CD

CD

CD

CD

% 3 a g^

11
00

CD

ro

:f

cx ro CD
CD. LU

H-l

cr

LD
Nl UJ

&T ?

gs
ro

CD

H-l

cr

00

>

t-1

CD

CD

cr
n

p). CD

H-l CD

cr o

CD

I
3'

S S cn ro_ S
Bo <
ID -.

if Kg
n cn XI

S 5'
ro

3 cn

HI 00

2 r ^ I.
CD -O

3 Ul ro

H-l 00 NJ

^ S M
QI
n

If
Ul

S Ta H H
cu Cl 5 Q_ CT^ 5 fD. 5'

g&
3 Ln ro 3 <X

t-1 00 NJ n cn

m
00

K " s
c
ro

3 _ <
(TO O

g
a?

< % ^
m
QI

Q.

ro

o ae
Nl Ul Nl O

K"! X CD. 5 %

00 (TO g CL g II 0 0 . CD ro I D BO

eo

II Nl O i n QJ n C X C D 00 00 g g C D g 00.

^1 ^
H I 00

If
I^
ID ro 3

If
II
ID

^ ^' ^ 3 I- P
00 g

<

ro ro f;
QT
00 3

s 11
- 5%

i l i
ID ro

&
QJ 3

g# :
QJ

ro

TT

00

ro
D
QI 00

III
.. ro
3q

CD. CD. 00 Nl HI O (TO N l ro C U TD "O QJ X 00 ro JD

8t ? c

a g ro & ^ u <J c 00 Bo V S
QI /i' < g i-D

u
3 JD

ir
^

S <
$ ro cr
73

OP g tm

<
o <

ro

!eo i
ID ro 3

I"
&
QJ

<

1 eo

ro cr
33

ro
g

& s 2
00 eo

QI

c ro iu
CL II 7<

4 ^ 2
00 eo CD era

CL ro

00 ro .1^

84

ro
g

& < ! >


00 eo
ro_ 5' 7^

c ro

HI

s r
I-l
Zl

QJ

8%
? x>
ID C I D QJ UJ era

ro S?
NJ Ln Nl II

# Ln i 5 ^
O OJ f. Nl

CD O Ln CD Ul UJ .Pi

as S K <.
Nl CL

a? t
NJ tn Nl QJ Q 3-

tt
?r %

ro ro

r 4 tja

i l 1^
3% 5 ^ 2
n tn NJ NJ

I^ g g 11 11
"
QI

ro

V s rs ^
CL CL II JD

UJ (TO

r l

XI

cn cx

o
Q. g

% ^ 5i S
3-

|IS O

K Nl 3"
73 C D

3-

5! K

l Z 5 . U Nl Ti !S,

g % o
NJ LO

ro Ln
Nl Ul

il % g
Nl LD NJ .Pi

cn ro

w ro 01

X 50

s?
Q.

g^
2? -> o P ID ae i m
UJ

ro

H 2 ^
gl ro
n

II
a.

% E. ro

b Si
i<i
-

Q. (TO f i O CL LD -I- .< 0 1

go Ln
l/l g Zl II

NJ

ro
c

^
-g

QT

i i go Ht o ro
3 1 3

77

ro c m oo
fi *i

% E. ro r

Nl -n CL

-a
X

eo
ro
QI

fl NJ 00 fl -t-

11
o 3
3 "O g

a
3

BO g

ro ro

-o

II I I }l li II
o S! if ^
< Nl .O C

ll R yi i;ir -<

ro

30

nli
^
go

= 1 < -5
t-1

if
n VI

11
gl ro

2 &
go Ln ro c
Ul Ht Nl Nl CX

C D :

<
g O CZ

I f 2g
g! ro
Ln

LU

D N Kl i/^l "g

s^
NJ fl fi ID

g 00

o ^
O

'J^

g
~

ro g
II CD

li
iZ 3
- ro

> c <

Ol X

Q. go Hi O ' -o ro
3 3

^ g
' TD

i i go
- -D 3 1 3

CD 03
l i Ul

cn
C D

( J o
00 .Pi fi

ro ro g
II CD
H-l

g II
XI II

M QJ

=R

NJ C

ro cy

CD

2 g ^

BO

y
Nl

^
ro

n
^ ZZL !5L

ro g
II

<

eo
XD II

II CD XD

Nl ID Nl

Y %
fi ID cn

BO
CX 3 Ul

il
3 H-

eo f

^
go rtII

eo
XD II

BO f i XI

1
o o

eo
3

i!
f i 3

N
Ol

fi ID cn

eo
II

BO ro

II Ol

eo
3

ii

ro cn
00 ID ID -Pi NJ LU

oo

eo

ii
00

ii
fl -fl ID ^ 00 00 ID LD fi

CD

C D

C D

cr go ro cr CX
CD 3 in UJ

3-

o
HI

C D

5 ? ^
3 Ul

ro CD _ CX n
UJ

S S " rr=NJ

cr

00 Nl g ro QI 0 1 g n cn g 3II Nl JD

a ?
Nl Ul NJ

01 ro.

ro Q J

HI 00

NJ cn

Z~ <

5 g

gt

"T

g&E
3 Ul

cn ro_

eo
0

PI
300

go cL

00 g g II CD 00 LO ro 3 JD

(TO g

m g

ro eo ro

B^g o 3, g ^gB" a ? i a si ,. i l U H "i? i^' g^^s S I I " < q S lig < _ < ^ 1 .< <^ as m < <^ : i as g og S 8? ^ "1
3

cn 5'

q. Sl g

ro

t-i 00

Nl

< : <

QJ

Ol

ro

O NJ TT O Bo < 09 XD s .
Nl Ul Nl QI era O O

m
QJ

ro

NJ CD 03

O CD

cn
CL g

CD

C D

ttp

CX Ul 00 Nl 01

ro

a s
Nl Ul Nl CD QJ 00 g

2 5
cn ro
BO <

3 TT

01

JD 14

m =

BO
JD 1C|

=1 cn
13 =: HI NJ

II
3' X ? 00 g 00 g <

00

cn ro.
01 NJ 3' TT

"S -
II

BO
JD

s; z\eo
< <
QJ 00 g g
CIO.

<

00

2 n =: NJ QJ
C Z 3 0 1 3 Ln C l/l TD 5 00 g

.
Q.

oo
g

a qo ro

at) ro g

BO c (TO 00

NJ

ro

00

5 ; era^ g < CD II g 00 TD ro (io LO ro

00 g

(TO

c e o 00
g g

00 g

a s
Nl Ul Nl O

&I
gg
3"^
?i^: as ro

cn XD 5 % 6 S" 3- ro c_ Z QJ 3 as 3 So 3 II II

ID ro

ro

ro

ro

ir
^

ci 00 II o qo_ g < ro LD ro eo iTr


fi

<

00

"S - ?
c
00 g

=au
Nl Ul Nl %l "O X g "O

qo_
BO
NJ XD O Z

00 g g

00 g

<
(TO g

C D (TO

<

g g 00.

(30 g

<
g

Ul ro 'DrNJ JD CD Z II m QJ

QT
00

ro C D

<
fO QJ Q.

K"!

vl B O

sgg
^
LU m

gs

li s r?

cp ci
CL 00

I 2
ro
go C 3 C D
C

& CL

go

3
00 ro 00 rt OJ

c
33

5 g.
CL

"O

TD

m
^ It
Ln

8% ^ K% 6 3"^
LU (TO

in
CL

go

i & I >
33

c % 2

ro
01

E.

BO 3 TT

^ E z

Zi
X
"O

^ Ln
o

NJ

NJ E i
ui' Ln
fi Nl

ro

n 3-

ro

5!
A
Nl W

II s s %
Nl ro

gl ro

ill
Ol ro cr Q J

ill
4^ gg
ID C Ul rt QI

c
00

ro
II

30 ze =^ ( T O ^ C

II
30

T T "5ro
rt iu

as
Nl Ul Nl

^ 5 & !

x^

oo ro
00

V "grt iu
Q. II Ln fi

Ln UJ Z ^
fi Nl

5:
II Ln fi Nl

o
01 00

S- M

g %

II
eo
ro 3 1
3

NJ LO NJ

E. cn ro

E. I cn
fi LO

ii
NJ

-O TD H^ cr g CL

<
NJ ID Nl g %i

=R

5 S n
o
33

ro
3"

Q.

Ln

ro

B J = Ln NJ
NJ

ro
Ln N l

f.

l or i E tS | S
' ro c Ht

ro g Zi

cu
ID NJ fi fi LD 01

11?
g

= R
NJ LD

M
QI

as
Nl Zi II

2L 3 M

II

a s

g
-' 01

as
Nl Ln NJ

II

7<r 1/1 00 g <

ro

7i
II Q. QI

''

ID Nl

Y
Nl

R ga f^ ^ $
ro ro ui "5 X i i eo ro 3 I 3 ro
g "O

NJ ID
fi

5 5 g(5. f i
LO
C30 00 fi fi

NJ ID f i

5_

Ol

C D (30 00

o %

"8
ro 3 1
3

ro 00 00 fi fi

-I-

CL

ro
(30 00 fi Pi

z iz ) ..

00 00 fi fi

cn ro
(30 00

cn ro r* ro

b K "8
CL g o 1^ g - TD

Nl Ln NJ

a s

3"

as
NJ Ln Nl CL

TO S
g <

cn

c p
(30 00 fi fi

ro
c

CL g o Ht O - TD

00 Nl

00 NJ

ro

II CD

2g
- K
Nl O Ul

ro g
o
II

31
NJ ro

D g c

ro ro

O g

I
go
JD

^
g CD.

oT

g
o
II

ro
3

g
o
II

3 ro

BO
XD CD CD 00

eo
JD II

eo
XD

BO
JD II

a s
Nl Ul Nl O Ul LD I-l

g eo
3 C

8S S3
S3

n n n as
o
X

BO
JD II

g
ro
QJ

n n n

ro
QJ

>
Ul 33 03 CD 00

CD Ln

as
Nl Ul Nl O

BO
CT 3 Ul

go
3 C

e o
00 Nl 3 C

3
II

as
Nl Ul Nl

3
II

ro ro

^ e o
3 C

eo cr

ro ro

ro
OJ

a s
Nl Ul

3
II

as
Nl Ul

Nl NJ NJ

K
f i CD

NJ O

s
NJ UJ

fi cn C D

C D

B O

UJ

cr
Ul

XD

S|S
3 - 3 3"
NJ BO

eo cr %
JD II

go cr
C D
CD CD Ln II _ ^ 00 fl

LD

go CD CD

C D

o o

CD Ul Ln 01 go 3

U
eo ro
CD CD 01 LD LO

>

ro S - NJ CD QJ O l

cr
UJ fi

o
CL

3 a
II JD

ro

P: 31
1
Nl <

S z i:

go S
3 c

II
o

&
13

s g
S
(TO (TO

?, 3 5
g g

g
LO

j?

gg

c oo
era. ro

C)

e^
c u Zi
II

11
ID. 'eg II CD LO m 00

ro ro S cr 33
CD.

H
n J
%

fi I I2 # I
n II 3
H-l 00

s ?

rt

-o

ro

s g

JD

11 11 # 2
cr go
o
II OJ II

il

C D

H-l CD

cr n

o o

go

(n cn
Ol Ul

3 Ul ro 3 n

H-l 00 Nl

Ul CD Ul 01

C D
00 NJ

cr
o

3
TD

n cn

UJ fi

go cn ro

S Sl 5^
3 Ul ro NJ BO ro < S.

Qi

gI
^
(TO

eo cr
o 3-

BO m

If
%g

eo
XD

ll
OJ

ro
/ i r (TO

" 8 ^'
g TO

C D

(D CD CX

iS
ro
fi _ 00

cn Q
NJ C D

as
NJ Ln NJ

e
O X
II Ln JZi NJ

iu

9 2 CX ro E -3. f CL

u -<
O UJ

X CL CD. M_

n
Is
TO O ID

l i lis
cn N CT ro

*S J
C O

jg ^ ^ % $ II
00 ro

00 .S

!
ID ro

TO g

<

^1
QJ

S ^ 2; g II TO OJ 3 as
NJ <^

II TO CD ro ID II ro CD

3Bo 00 CD LO

gs
00

2; g

8 %
Ul Q-

ir s: a
CX Ol QJ

Ra:2 g ^ &%
QJ 00 Ln Nl

II HI

ro k &N # g
eo

CD.

ro
fi 00

QT

m ro^ g_ V H" c S! 8 %
? Tl

as iu
NJ LO

%g
QJ 00 Ln Nl

LO (T 3-

c o

cp
00

% ^

9 Z
CL ro

<i CL

3" % 6 ^ C JD 33
rt c: 33

LU (TO

gs
F K Q

\
Ln Ul

II
LD L n cr BO

g LO

9 S
3
CD-

ro

oo

cr S
U Nl

g
E

it
f.
CD.

g c 3 ro %j nX 00
X D V
m O

us

M f
NJ E
LD Ul BO Ln fi 00 ID

il

^B ^ i s s
Bo g ;i II Ln fi
H-l

cr g
Ln 14

^ 8-

cr Ln

< H-l UJ

UJ

II
cn cr
U l LD fU i L CD CL 00 00 UJ 00 UJ

S "
LO

m ro

?S

o o

3; C D
QJ HI

n
01 ro

i
BO g

#1
o
CD.

as
Bo

>
O

^
TD

BO as tm NJ

% O Ul i? ^
sr UJ
00 CD > CL

Ul

%5

1 1
o o o ' o
CD

o cn S UJ

eo
(TO CL II

5
00 ID 3UJ N UJ OJ

o as f i LD LD ro Ol f l ro oT UJ >
00 CD

(S"^
(TO CL II O ro 00 CD

1 1
S ^
Nl

B
go

Ln CD Ln

fi LO

ro

3 ro -I cn as U3 D cr NJ f N.l B O Ul

5 51 ro

cn
(30 00 fi fi

TO

e. > g
QI
II O ID

NJ LO Nl fi fi ID Ol

2g
CX g o g 1o ^ Ln g g -n rt - TD CL ro Q. QJ c 3

fi

t "

o
CL

to

as ro
UJ

tI
cn UJ LU UJ NJ CD 00 00 Ln LU CD Nl 00 Ln

ro
00

as Ul >
Ul

ro (30 oo
fi fi

s
LU Ol

s >K g cn
TO O LD f.

cp ci
CX 00 Nl

a s
UJ

>
CL

CL

S S

II
HI 3

if
HI 3

Ln UJ > Ln NJ > CL

cn (D

ro

> as >
CD.

ro

oT
00 CD

II CD

BO g T3

ro
3

B O
JD

ci

^
X

8'3
IT ro

8'3
CT ro

II
H-l

CD. 00

eo
-o ro
3 g

1 3 ro g
II CD BO JD II

CD

I
3

= 1
-o

B O
3 C

g
II CD

g
II CD

8 '3
n

ro g
II CD

ro
QI

ro

g II o

C D

ID

go

il
n 1/1 II QJ C TO g g TO

cr I 2 ^

: ^

B O cr oo
X3 II

LD 3

go

ID I D U cr ro a C Ln

ro
CL UJ Ln CD

CD
H

eo
JD

00

t>

ID

go
t, II

cr

ro.

11
cr go

K ro NJ
LU CD
OJ.

5'
.wi

n 01 BO

cn
01 NJ Bo

= 1g
T3

ro S
II a

go 3

il I?
5?

CD

11 - S
II go

ro 3

3
NJ Ul Ol

II O

TO g

s^ iII
3 Ul

g S g m cn g 5B O ro 3 s 3
NJ

5 5 C ro ^D
00 3

C D

LU

ro
CX Nl Ln

C D
o X

o
CD Ul CD Ul go

Ln CD Ln Ol

5 s.

?^

~. 3

g
TD

cr

II
'C
.
QJ ^ TO CX ro

LU fi CD CX

gg
c

CD -CD

cn
3 ^

ro

cr Ln

2
. 3-

a
TO A ro ro
II QJ 5' =:

< go LD in g
m

-f

< $
g

o B O cr

&
13

3
II

S
XD

II
H-l 00

eo ro
3

NJ

n
XI

g%
QJ m

JI,

4
NJ (TO

II HI CD BO OJ TO g 0 TO

4C

TO g

ll
M 00 CD LO

g ^ Ln eg
NJ TO

li
n 3-

ro cr 33 ro
c

ro ro < .

(S

7 g
ro
OJ TO g

eo
TO

B s
2 ^
TO O N l TO L nl o N ~

ro
X CX
C3_ II 7:

M
m
II
M

I
u g ^
CD LD 00 IT 3-

SI,
D
g

cr " y 2? II 3
c
Ln

g|
TD

ro
=^ n 3-

3 1 I 5
c
g
C D

^1
33

z
n
eo
LD

K Nl

ro

g ro
Ln 3

ci II o LD ro
fi 00 CD

9 TO s II
ro
f.

9j S! o ^ ^ ro oT
00 CD

;^
00

as <

H TO

iff i l
QEIS
3

rt 01 II

g iu

Zi

! S-

B O
(TO

II 0 LO

ci

II
3' TT TO g Ln N l 00 g CX

li
<

ro

CX II

ro
fi OJ 00

^
JD

cp ci
CD. 00

H C X

CD

eo z 3 %
cr
Ln CD CD Ul CD Ul LU f l CD CL g C

III

33 7=

ci

ro 03

CL 00

?f ^
., NJ QJ

CD-

cn
-*i

% g ET Ln !
NJ 9 Z CX ro Nl LD UJ E BO LO

JD

S TO,
=6 X
QJ ^

( T O 3

II
Cf II

> e^

?r II

ill
2
cr g

> 33 ^ -<
2 z 7^
0C3

TD

= 1

& 01 ^
gg

? t

CL CL 00

ro

NJ E

BO Zl -a
CD CD Ln CD Ln UJ fi CD Q.

% g

01

cn cr

B O era ci II o as m ID NJ ro ro U l N
QT
00 fi

J
^ L U 2 2
NJ O Nl QJ 3-

ill
5 S

L.
Nl XD

O > o

I g =
II

S" A
CD O Ln CD Ln

a_
C D

if
LD Bo
rt

-<
Ul

<
g

cr g \n Zi

oc
g TO 03 03 Ul fi Ul

ro
00

cn cr

\s 2 K 52^
UJ

cn cr
UJ fi CD CX

TO'
NJ C

lit
CD CX n 00 > O so Ln Ln fi NJ

vJ

B O (ra
Q:

> ' O as
NJ Ln UJ Ul

S > (TO
CL II CD LO

n ID
TT

o LO ro

II

>

cp

^8 3
: ro
3

B O ^

:S BO
H-l

CL CL eo 00 g NJ I D
t:^

f ^Y
CD Ul NJ

:p % 8
6 Ln fi CD CL Ol

Nl

ro

II CD

g ^ &o

II Ol LU LU Ol UJ Nl CD 00 00

oT 00 cp ci
CL 00

f^

as
Nl Ul Ul

ro

II !i ti ft s
NJ

il
II CD ro 6 oT 00 CD

1 1
era Ln c i Ul
> in NJ Ul LU > CL

X3 cn c X
rt.

&g
L O as

> CL
ro
3

oo
CX 00 Nl HI

cp ci

% els'
NJ ro

CL

si
fi BO

BO g T3

^ E iS
Ol

m "N

o
Nl

ro cn

II

o
NJ

Ln

UU

III
H-l

11
'
00

| i II
HI CT 3 ro f. Pi '

8'3

LU tVJ CD 00 00 Ul UJ

S '3 CT ro g

II CD

Nl Nl Ln

fi CD

CD CD

fi Ol

C D
-ICD CD CD CD

LD

go

CT

00

H-l

^i? 8 2 K 3
o
CD Ln CD Ln ro Nl fi n CD LD HI 00 00 ro

C D

CT go

>

ill
.O O II

TO g

6D
O

< <

A g#
II cu c TO g g TO

H
ro
Ul CT 3 (D g 3

era. ro eo

Ago
Zi
TO & LO

as
NJ Ul NJ

c i ro OJ
n 3-

& %
01 00 Ul Nl CD BO TT II E

9 Z
CL ro

&
Nl

il
ID CT Ln

BO

i l s%
ig
^

Bo g Zi

ft
ET ro
^
iu

3
01

il II
Ln LU > Ul Ul LU > CL

(TO CL II CD

<. 5
CL go

ro ro

ro to
fl oT 00 CD

Si
NJ II

II
I-l
3

2 | ? iD
NJ QJ

g^

8
CT

'3
II CD

ro

il

UNCLASSIFIED

(U) DECLARATION (U) 1,


L1EUTF-:NANT COLONEL M A R T I N C. NEHRING,

declare and state: I am the subject matter expert for the

Directorate of Operations (J3) for classifications reviews. In this capacity, I reviewed documents pertaining to United States v. Private First Class Bradley Manning, which the Manning trial team provided to USCENTCOM. My recommendations to the Original Classification Authority (OCA) in regard to the proper classification ofthese documents arc contained on the attached list (containing a total of seven pages) and are hereby incorporated into this declaration. (U) Pursuant to 28 U.S.C. 1746,1 declare under penalty of perjury that the information provided herein is true and correct to the best of my knowledge. Dated: October 2011 y ^ / ^

VV/M/
MARTIN C. NEHRPMG Lieutenant Colonel, U.S. Air Force

UNCLASSIFIED

PROSECUTION EXHIBIT ^ f o r id^tification

ClONE AWHANISTAN EVENTS Identified Document 053C4989-9747-41=D-9<i:S-4BC2F788rEAD 3/2/2008 3:37 Paget 2S3C4ES!>-E469-4BaO-9FDE63A42E7E12A7 12,M/20O7 Page 4 2S62BlFF-t285-46S9-9E91-BfCBSS8S186 7/2/2007 Page 6 295S6796-D1B2-46FO-8657.264113IMFF42 2/9/2007 Pages 2A5CA12C-9579-4DAB-KE2-33343BFE93CB 2/17/2007 Page 10 M261792-F927.5419-051O126F30S1B23D 6/30/2009 Page IS <ASB0499-EB94.4F08-9DW 6E6EDC-81F4C 3/4/2007 Page 21 4F08360B-20S3-4E90-8696-7E48D3252D7C 3/23/2007 Page 23 S13BD156-C13F-4F06 99'VF-8A1ASC1A5F64 8/1S/20O7 PageZS 592S531EC90B3E0E9Cl23B7B7Fi')A3A9 U/26/2009 Page 26 ,'6509B14-75S8-47BJ8''=F-84A3F49UB41 2/10/2007 Page 29 8E9902SO-1372-S1CO-5901D.=3792D40F3F; 9/6/2009 Page 31 BA67D1C4-261D-4934-8C 1CF194K70226D 2/12/2007 Page 33 C6A6DCO5-1372-5tC0-5<iF7l3B:iO1721Cl 9/17/2009 Page 35 F87E01A4-99FS-465A-8D3B-8031D7B05933 S/9/2007 Page 37 ReportKey 42BCCB0A-E93S-4296-A783D0884BB70E37 occurred 12/28/2007 10:30 Page 20 ReportKey F9B227A4-28li:-4EAC A8CF6D28C67DA78A OateOctjrred 10/13/2006 0:00 Page 41 ReportKey FADBDCIC-E59B-7F41. 27BEC0B99A5A32D3 DattOccurree 10/14/2008 8:50 rrfortnatton Reyealing (Per CCR 380-14) CbsaHlcatlon

ca*
Basis for Original Cleu'ifKation t i h l o t Current ClmHUation CCR 38014 (0110) 1.4(c), AOperational activities operational / foreign government activities operational / foreign government activities operational / foreign government activities operational / foreign government activities 5/REl EO 12958 !c| 23D8 EO 13292,1.4(b), CCR 380-14 (0110) 1.4(a): A-23ln EO 13292,1.4(b), CCR 380-14 (0110) 1.4(a): A-23I>11 EO 13292,1.4(b). CCR 380-14 S EO 12958 ia)lb) (QUO) 1.4(a|: A - 2 3 l l

EO 12958

um

S/REL

EO 12958 (a)(b)

operational activities operational / foreign government aaivlties

s
S

EO 13292,1.4(b), CCR 380-14 (0110) 1.4(a): A-23IH1 EO 12958 (a)ib) CCR 380-14 (0139). CCR 380-14 (QUO) 1.4(a): AA23,A 24; 60 13292, 1.4 (a) 22X6, A 2 3 l l EO 13292, 1.4(b), CCR 380 14 (0110) 1.4(a): A - 2 3 n CCR 380-14 (0110) 1.4(a): A-

EO 12958 (a)(D)

operational activities

s
5

EO 12958 (a)

22*6.A23*ll CCR 380-14(0110) 1.4(a): A-

operational activities operational / foreign government activities operational / foreign government activities

s s s
S

22K7, A 2 3 l l EO 12958 (a) CCR 380-14(0109 , EO 13292, 1.4(b), CCR 380-14 A-24;E0 13292. 1.4 (a) (0110) 1.4(a): A - 2 3 l l EO 13292,1.4(b), CCR 380-14 (0110) 14(a): A-23irll EO 12958 (a||b) CCR 380-14 ( 0 ! r , CCR 380-14 (0110) 1.4(a):AA23.A-24;E0 13292.1.4 {al 22K7, A-23#ll EO -.3792, 1.4(b), CCR 380-14 (0110) 1.4(a): A - 2 3 l l EO 12958 (a)(bi CCR 380-14(0109), A23, A-24: EO CCR 380-14 (0110) 1.4(a):A13292, 1.4 Ja) 22*7, A.23II11 EO 13292, 1.4(b). CCR 380^14 (0110) 1.4(a): A-23ll EO 13292, 1.4(b), CCR 380-14 (0110) 1.4(a): A-23X11

operational activities operational / foreign govemment activities

operational activities operational / foreign government aa'ivlties operational / foreign government activities

S/REL

EO 12958 (a)(bl

S/REL

EO 12958 (a)(bl

foreign government activities

EO 12958 lb)

EO 13292,1.4(b) CCR 380-14 (0110) 1.4(a):A22*7, A . 2 3 l l

operational activities

EO 12958 (a)

Page 1 of 7

ManningB_00572371

ClONE IRAZI EVENTS

cas
identified Document 072A8443-DACC-4E47.A328-309FC84524B2 5/4/2006 Page 1 CA07EE58-C792-rB6E-lF:itCn97EC38C10A 6/23/2009 Page 3 1259C04A-F394-1A01-393SCA2F53BA767F 11/20/2009 Page 5 13O4FAC8-29OC-4623-B36C-3S40E3D;0E2C 11/30/2004 nformation Revealing (Per CCR 380-14) operational activities Basis for Original Classification 5 Classification EO 12958 (a) CCR 380 14I01OT), A23;EO 13202. ; 4 (a) CCR 380-14 (0109), A23; EO 13292.1.4 (a) Basis for Current Classification CCR 380-14 (0110) 1.4(a):A23*9

CCR 380-14 (0110) 1.4(a):A22*7 CCR 380-14 (0110) 1.4(a):A22*7 CCR 380-14 (0110) 1.4(a)JV 23*9

operational activities

operational activities

Page 5
ReportKey 1019AC04-1E58 44EC-9D10509586E51A4F OateOctxrred 10/23/2005 0:04 Page 7 ReportKey 22A6FS8E-F618-4A1A-PF0729BB0S125499 DateOcciirrec; 9/14/2C05 14:48 Page 10 ReportKey 28628224-AB.'F-:CF4004SDS8D3FFF86AF DateOccuaed 6/28/2009 20:31 Page 13 ReportKey 2974CC()0-CE79-0207DE92O63C5E0443C5 OateOccurred 11/24/2009 22:30 ReportKey 2FBD7A50-FE40-CE039401D7643A4SS299 OateOccurred 6/30/20O9 6:03 ReportKey 31D33B9C-4210-45615E60C4F966A7AC4A DatiiOtcurred 7/16/2008 21:00 ReportKey 31FFBCOE-93A6-91A18AAAFA4EE2945AC6 DatjOccurred -0/7/2009 16:32
R e p o r t K e y 4SA8BACB-42 3 0 - 4 5 6 1 -

operational activities operational / foreign giDvernment activities

EO 12958 [a)

S/REL

EO 12958 (a)(b)

EO 13292,1.4(b), CCR 380-14 (0110) 1.4(a): A-23*9 CCR 380-14 (QUO) 1.4(a): A22*7 CCR 380-14 (QUO) 1.4(a); A22*7 CCR 380-14 (0110) 1.4(3): A23*9 CCR 380-14(0110) 1.4(a); A23*9,11

operational activities

operational activities

operational actlvllies

operational activities

EO 12958 (a) CCR 380-14 (0109), A23; EO 13292, 1.4 (a) CCR 380-14(0109), A 24; EO 13292, 1.4 (a) CCR 380-14 (0109), A-24; EO 13292, 1 4 (a)

operational activities

operational activities

CCR 380 14 (QUO) 1.4(a): AEO 12958 (a) 23*9,11 CCR 380-14 (01091, A-24; EO 13292, CCR 380-14 (0110) 1.4(a): A23*9,11 1.4 (a) CCR 380-14 (0110) 1.4(a), A23*9 CCR 380-14 (0110) 1.4(a); A 22*7, A 2 3 l l CCR 380-14 (0110) 1.4(a): A 22*7, A23*9.11 CCR 380 14 (0110) 1.4(3): A22*7, A 2 3 # l l CCR 380-14 (0110) 1.4(a): A22*7. A 2 3 * l l CCR 380-14(0110)1.4(3): A22*7, A2 3*11 CCR 380-14 (OHO) 1.4(a): A23#9,11

50A42ESA6516F886 OateOccurred 10/'28/2008 15:30 ReportKey 4BF346FO-00(-817C7F8C9DF1692A10A0 OateOccurred 12/18/20C8 20:38 ReportKey 59103S:iA-92-iB-E44A4D802B801CF604EB OateOccurred 8/26/2009 23:29 ReportKey 5eAS6040-07 ;3-15AFF833103576729E32 OateOccurred 8/28/20OS 2:20 Page 31 ReportKey 63S3OO56-Al=A-O60E332O4A7A0945F9PF OaisOcojrred 3/21/2039 10:38 ReportKey 6687D323-0F:!7-A8E185899AD30652S333 OateOccurred 12/6/200? 23:20 ReportKey 682B8A77 08,\1-829BB6040FC885232519 OateOccurred 12/7/200? 1:28 ReportKey 6BOA16AB-B/3C-FC8C0220277732025A48 DatiiOccurred 3/30/2009 1531 ReportKey 6E901533-47.S9-4E80-940C4F86S1BC0DEA OateOccurred 2/7/2O05 23:45 Page 43 ReportKey 6EAE5BD8-O47C-0SA6S71O9EC60AC3523C OateOccurred iC/19/2009 2136 ReportKey 719ABD5C-85A1-42E5-IB2FE334B6E469D OaieOcairred 10/15/2006 21:07 Page 46

operational activities

EO 12958 (a)

operational activities

$
S

operational activities

operational activities

operational activities

EO 12958 (a) CCR 380-14 (OlO'i . A23, A-24: EO 13292.1.4 (a) CCR 380-14 (0109), A23, A-24; EO 13292,1.4 (a) CCR 380-14 (0109). A23, A-24; EO 13292,1.4 (a) CCR 380-14 (0109). A23, A-24; EO 13292,1.4 (a) CCR 380-14 (01091, A-24; SO 13292, 1.4 (a) CCR 380-14 (0109!. A23, A-24; EO 13292,1.4 (a)

opecationai activities

operational activities

operational activities

iZCR 380 14(0110)14(3): Ai27, A 2 3 * l l

operational activities

operational activities

CCR 380-14 (0110) 1.4(a): A23*9,11 EO 12958 (a) CCR 380-14 (0109), CCR 380-14 (0110) 1.4(a): AA23, A-24; EO 22*7.A23ll 13292,14 (a) CCR 380-14 (0110) 1 4(a): A

operational activities

EO 12953 (a)

22*7, A 2 3 * l l

Page 2 of 7

ManningB_00572372

CIDNE IRAQ EVI-NTS (Page 2) identified Document ReportKey 74S09F'm-8D/io-jFC6-8976D8CB96363C66 OateOccurred 10/20/2 OOS 14:00 Page 49 ReportKey 78401Ef 4 FCAC-4F2D-A7CBe9a5E4DF825B DateOcoj.'red 13/25/2CCS 15:30 Page 51 ReportKey 789FC769-C9A6-CCEA. 8B51997178603022 OateOccurred 10/21/200) 13:15 ReportKey 799E74FB-10E:-4E5E-BE6C6A549C2A49A7 OateOccurred 10/22/200.; 2338 ReportKey 7F12282C-5O55-50235831E165ASAE2457 OateOccurred 5/12/2007 4:44 ReportKey 818F138EB29ED68C1548F72F771D0191I OateOccurred 5/27/2009 10:17 ReportKey 8694704a-F336-ED65E1EC9S9B8746520(1 OateOccurred 7/16/2009 21:18 ReportKey 884E3011-07li7-6BBCFAA6S5FBC8738OC0 OateOccurred 7/17/2009 12:00 ReportKey 808C41 l8-FC(i6-A935B6EOE2C6075EFCCS OateOccurred 9/6/20091:05 ReportKey 8EEOOS55-B6f FOE43SCC71098D2A929EB OateOccurred 13/25/2003 23:04 ReportKey 99C3B6BB-F 7tiB-4FAFn309DAAS08lA6B:3 OateOccurred 9/8/i009 Ll:35 ReportKey 9A037FR6.09I)3 E779A3B1025D2C7A685A OateOccurred 9/8/2009 ' . O m ReportKey A2ABlE80-AC3O-EFi9BFAA52006ACCEC10 OateOccurred 9/9/2009:1:23 ReportKey A2C1B415 A2 :B 580B4138A3FOB7FE8C89 OateOccurred 3/12/2008 10:30 ReportKey 80680030-8654 S59E9C8H87491806597 OateOccurred 1/7/2009 Ll:28 ReportKey B27B576F-D215-3CECC70471SA7OACE230 OateOccurred 9/30/2008 9:51 ReportKey B4FSA6 '9-781)2-4065-81537372476EEE77 OateOccurred 10/23/20C5 0:23 ReponKey BS4C6O02-A1A2-132C507A500E0F4C4412 OateOccurred 9/13/2009 14:14 ReportKey BE0A29E9-DC !0-456-9D313DA1F1A14S3B DateOccun'ed 3/13/200 15:08 ReportKey BFaCE4i3-A3!10-F54BAD090F08AEF99486 OateOccurred 11/4/2009 2:16 ReportKey C29 75F2-C9?iE-3B02B494FA60186A8078 OateOccurred 10/3/2008 9:55 ReportKey C43B43C3-0857-43ES-8694. 627703FE38A9 OateOccurred 10/22/20C5 21:48 ReportKey C476C534-OEB2-E8281E/959612A44868F OateOccurred 12/5S/20C9 7:16 nformation Revealing (PerCCR 380-14) operational/foreign government activities 5 Zlassiflcatlon

C03 iasis for Original Zlassiflcatlon 33SIS for Current Classification EO 13292.1.4(b). CCR 380-14 0110) 1 4(a): A23*9,11 CCR 380-14 (0110)1.4(3):

EO 12958 (a)(b)

operational activities

EO 12958 |3| CCR 380-14 (01091


A-7J1;E0 13292

A23*9

CCR 380-14 (0110) 1.4(a): A23*8.11 EO 13292, 1.4(b), CCR 380-14 (0110) 1.4(3): A-239 CCR 380-14 (0110) 1.4(3): A22*7, A 2 3 * l l CCR 380-14 (0110) 1.4(3): A 22*7,A23*ll CCR 380-14 (0110) 1.4(3): A22*7, A23411

operational activities operational/foreign government activities

1.4 (a)

S/REL

EO 12958 ls)(b)

operational activities

operational activities

operational activities

EO 12953 (a) CCR 380 14 101041 A23.A 24;E0 13292. 1.4 (3) CCR 380 14 IOCS). A23, A-24; EO 13292, 1.4 (3)

operational 3Ctlvlties

CCR 380-14 (0139), CCR 380-14 (0110) 1.4(3): AA23, A-24: EO 22*7. A 2 3 * l l 13292,1.4 (3) CCR 380-14 1010=;, CCR 380-14 (0110) 1.4(a): AA-24; EO 13292. 23*9.11 1.4 (a) CCR 380-14 10139), 1 A-24; EO 13292, CCR 380-14 (OHO) 1.4(a): A1.4(3) {23*9.11 CCR 380-14 (0109). j A23, A-24; EO ;CCR 380-14 (0110) 1.4(3): A13292,1.4(3) |22*7, A 2 3 * l l CCR 380-14 ( 0 1 ) , CCR 380-14 (0110) 1.4(3): AA23, A-24; EO 22*7,A23*ll 13292,1.4(a) CCR 380-14 (0109), CCR 380-14(0110) 1.4(3): AA-24.EO 13292. 23*9.11 1.4 (a) CCR 380-14 (0110) 1.4(3): A23*8, 11 CCR 380-14 (0110) 1.4(a): A23*9,11 CCR 380-14 (0110) 1.4(3): A-

operation3i3ctivltles

oper3tion3i3ctivlties

operational activities

operational activities

operational activities

operational activities

EO 12958 (a)

operational activities

EO 12958 (a)

operational activities operational/foreign government activities

EO 12958 (a)

22*7.A23*ll EO 13292. 1.4(b). CCR 380-14 (0110)1.4(3): A23*9,11

operational activities

EO 12958 (a)(bj CCR 380-14 10109'., CCR 380-14 (0110)1.4(3): AA-24; EO 13292, 1.4 (3) 23*9,11

operational activities

operational activities

CCR 380-14 (0110) 1.4(a): A23*8 EO 12958 (a) CCR 380-14(0109) CCR 380-14 (0110) 1.4(a): AA-24; EO 13292. 23*9,11 14 (3) CCR 380-14 (0110) 1.4(a): A23*8,11

operational activities operatlonal/fcDreIgn government activities

EO 12958 (3)

operation3l activities

EO 13292.1.4(b), CCR 380-14 (0110) 1.4(3): A2309,11 EO 12958 laKbl CCR380-I4(0!ir>! A-24; EO 13292, CCR 380 14 (0110) 1.4(3): A23*9,11 1.4 (3)

P3ge 3 of 7

ManningB_00572373

CIDNE IRAQ EVENTS (Page 3) IdentlAed Document ReportKey aU6C48B-EE20 1FI19 5571AE995A6B1F63 OateOccurred 11/7/2009 2145 ReportKey D637F898-f523 E5C8FDFA312483CB9A4H OateOccurred 1/14/2009 5:C0 ReportKey DAAE0EB8-A4F1-C65SF917CFD9AC2BE71H OateOccurred 8;'2/r0O9 8:00 ReportKey DF4783F0-905&-B43F60BO10DBAEBS90I4 OateOccurred 1/16/2009 7:30 ReportKey DF6BE8CE-0SS3<2FC01A7E6ED190D3AFA OateOccurred 4/25/2009 13:40 ReportKey E30ADO?5-EinB-4020-99ESDAC80ECF874B OateOccurred a,'8/20O6 11:57 ReportKey E7EFf3A3-AlF7-lD2B8D12BEB372D2AC54 OateOccurred 6/16/2009 7:59 ReportKey FtFlFEF3-B274 F7855A47FSC322B64FB.: OateOccurred 9/11/20071:34 infoiitialionR^ve^ling (PerCCR 380-14) Classification

CU3 Basis forOrigiO.il Classification Basis for Current Ciasslflcstion

operational activities

operational activities

s s s
5

operational actlvllies

operational activities

CCR 380-14 (0104;, A-24; EO 13292, CCR 380-14 (0110) 1.4(3): A1.4 (a) 23*9,11 CCR 380-14 (0139), A-24; EO 13292. CCR 380-14(0110)1.4(3): A1.4 (a) 23*9,11 CCR 380-14 (nios;,j A-24, EO 13292, jCCR 380-14 (0110) 1 4(a): A1.4 (a) 123*9.11 CCR 380-14 10109; A-24;EO 13292. CCR 380-14 (0110) 1.4(3): A1.4 (a) 23*9.11 CCR 380-14 lOJU'JI A-24; EO 13292, CCR 380-14 (0110) 1.4(3): A 1.4 (a) 23*8,11 CCR 380-14 (0110) 1.4(3): A EO 12958 (a) 23*11 CCR 380-14 10109), A23, A-24; EO CCR 380-14 (0110) 1.4(3); A13292,1.4 (a) 22*7, A ? 3 l l CCR 380-14(0110)1.4(3): A 23*9.11

operational activities

operational activities

operational activities

oper3tlon3l3Ctlvities

EO 12953 (a)

Page 4 of 7

ManningB_00572374

OTHER 9RIEFINGS COS nformation Revealing (Per CCR 380-14) 8 lune. No operation3{ aaivlties S/REL EO 13292,1.4 (al CCR 380-14(0109} 1.4(a), A-23; EO 13292, 1.4 (3) CCR 380-14 (0109.1. A-24; EO 13292. 1.4 (a) CCR 380-14 (0109; A-24;EO 13292 1.4 (a) Basis for Original Classification

Identified Oocumert Brief To GEN P Findings and Recs yesr found

Classification

33sis for Current Oasslfkallon CCR 380 14(0110) l.itla). A24*12

Ch3t Logs (CENTCOM)

No oper3tion3l activities S

CCR 380-14 (0110) 1.4(a), A22*6 CCR 380-14 (0110) 1.4(3): A23*11 CCR 380-14 (0110) 1.4(a): A23*11

Date

F3r3h Brief FINAL v\. 22 M3y 09

operaion3l 3ctivitles

S/REl

F3r3h Brief FINAL v8 24 M3y C9 F3rah INS Prob3bly Oeiiberstley Instigate 4 M3y CIVCAS Incident Strategic Intel brief, ID May 2009 interim Report F3r3h CIVCAS Investigation lo Gen Petrseus, 7S May 10 QRF SUPPORT FARAH FTT Powerpoint document M3y 2009 FINAL ICS REPORT (05 20002 JUN 09i (SIGNEDKminlmtecl) (3)

oper3tion3l 3Ctivtties

S/REl

operational 3Ctlvltles TAB A Appendix 1 (QSOTF FRAGO 02 operational activities OPERATIONAL GUIIIANCE) 29 l3a 09 APPENDIX 2 TO ANNEX C TO F.HAGO 08.003; 29 Oct 08 APPENDIX 3 TO ANNEX C FRAGO 08.OC3:29 Oct 08 APPENDIX 4 TO ANNEX C FRAGO 08.0C3; 29 Oct 08 TAB A Appendix 5 (USCENTCO.V Tactica Directive operational activities -OEFAFG) 12 Sep 08 TAB A Appendix 6 (PID Policy) 20 Dec 03 operational activities

S S/REL

CCR 380-14(0109). CCR 380-14 (0110) 1.4(a), AA-25; EO 13292, 24*12 1.4 (a) CCR 380-14 (0110) 1.4(3), AEO 13292.1.4 (3) 24*12

S 5/REL

EO 13292,1.4 (a) 0 13292,14(9)

CCR 380-14 (0110) 1.4(3), A24*12 CCR 380-14 (0110) 1.4(a|, A24*12 CCR 380-14 (0110) 1.4(a), A24*12

TAB A Appendix 10 (USFOR-A ^RAGO C8-003 CIVCAS PROCEDURES) Sep 08

operational activities

S/REl

EO 13292.1.4 [3)

TAB 0 Appendix 6 (3213 ORF CCNO) 4 M3y 09 TAB C Appendix 2 (Str3teglc I n t i l br ef) 10 May 09

operational activities

CCR 380-14 (0109). CCR 38C-14 (0110)1.4(3), AA-24; EC U292, 23*11 14 (3)

no 13 equiies

TAB 0 Appendix 7 13141 mitia: TIC Slide) 4 May 09 operational activities TAB A Appendix 2 (FRAGO 429-2008 COMISAF TAC OIR) 8 Oec 08 TAB A Appendix 12 (USCENTCOM CONSOLIDATED SERIAL CNE RULES OF ENGAGEMENT FOR OPERATION ENDURING VIDEO (BE 22 PAX), Way 2009

noJ3 equltes no 13 squltes CCR 380-14(OlC'i.. CCR 380-14 (0110)1.4(3), AA-24; EO 13292. 1.4 (3) 23*11

no equities operational activities

ISAF/NAFO/S S EO 13292.1.4 (3) CCR 380-14 (0110) 1.4(3), A26*19

aperation3l activities

CCR 380-14 (OHM! CCR 380 14 (0110) 1.4(a), A A-24; EO 13292, 23*11 1.4 (3)

Page 5 of 7

ManningB_00572375

EXTRA 20 DOCUMENTS Information Revealing (Per CCR 380-14) Basis for OrigiPrti Classification

Identified Oocument ReportKey 08B36010-9131-1CA01C5640A34263A618 D3teOccurfed S.'28,'20C8 7:55 Page 1

Classification

335ls for Current Classification EO 13292. 1.4(3), CCR 380-14 (OHO) 14(3): A-23, *8,*11

oper3tion3l 3Ctlvities

EO 12958 (3)

ReportKey 09A6302C-D8F1-4288837D8BC5A3A7FC0O DateOcojrred 7/9/2008 4:42 oper3tion3i activities Page 2 ReportKey 10CF8O28-OO20-51E8240C62B96F67ODD7 03teOccurred 12/7/20O8 5:12 P3ge 3
ReportKey 1 E 1 4 F D ; 0 - B D A F - A 3 8 7 -

EO 12958 (3)

EO 13292, 1.4(3), CCR 380-14 (0110) 1.4(a): A-23, *8,*11

operational activities

EO 12958 |3|

EO 13292,1.4(a), CCR 380-14 (0110) 1.4(3): A - 2 3 , * 8 , * l l

0E6E883CD0B45042 D3teOccurred 12/9/2008 18:50 Page 5 ReportKey 50BE089C-0CO9-7406A1BO6O9E97622EE0 OateOccurred 4/17/2008 15:22 Page 6 ReportKey 61FF7036-9FF8-C7DS510CS9CB08EDD48S OateOccurred 8:45 Page 7 ReportKey 6E72B4E1FD32-8C8144570CFBE8563BDQ OateOccurred 6:40 Page 8 ReportKey 72F3566A-F0F4-56892390E8080BEC6557 D3teOccun'ed 2:00 Page 9 ReportKey 73BEF45B C7FB-9501A667980209176352 OateOccurred 6:12 Page 10 ReportKey 7515D2.12-96B3-028S1B8E169C2ESB6C1) DateOccu-red 3:15 Page 11 ReportKey 89843A4O-0573-SF3220B3ADC3CE56C303 OateOccurred 4:45 Page 12 11 '3/2008

operational activities

EO 12958 13)

EO 13292, 14(3), CCR 380-14 (0110) 1.4(3): A-22 *7, A-23 11

operational activities

EO 12958 (3)

EO 13292, 1.4(a), CCR 380-14 (0110) 1.4(3); A-23, 8,*11

operational activities

EO 12958 (8)

EO 13292, 1.4(3), CCR 380-14 (0110) 1.4(3); A-23, 8,11

7/29/2008

operationsi activities

EO 12958 (3)

EO 13292, 1.4(a), CCR 380-14 (0110) 1.4(3): A-23 *11

7/3C/2008

Oper3tion3i 3Ctlvities

EO 12953 (a)

EO 13292,1.4(3|. CCR 380-14 (0110) 1.4(3): A-23, *8,*11

2/14/2009

operational activities

CCR 380-14 (0109) EO 13292.1.4(3), CCR 380-14 1.4(3), A-23; EO (0110) 1.4(3): A-22 * 7 , A-23 * ] 1 13292,1.4 (3)

7/30/2008

operationsi 3ctlvlties

EO 12958 (3)

EO 13292, 1.4(a), CCR 380-14 (0110) 1.4(a): A-22 *7, A 23 H

4/26/2008

operational activities

EO 12958 (3)

0 13292,1.4(3), CCR 380-14 (0110) 1.4(3): A-22 * 7 , A-23 * 1 1

Page 6 of 7

ManningB_00572376

EXTRA 20 DOCUMENTS
nformation Revealing (Per CCR 380-14)
Basis f o r O n g t r r t l

Identified Document ReportKey 8C5S09D2-0160-7457AF585B2401D5EC04 03teOccjn-ed 12,'31/2008 635 P3ge 13 ReportKey 9A1EC6C6-CDC9-7A0575AA98A9D1B62560 OateOccurred 6/18/2008 2:30 Page 14

Classification

Classification

Basis for Current Classificstlon 0 13292,1.4(3), CCR 380-14 (0110) 1.4(3|; A-22 *7, A - 2 3 * l l

operatlonsi 3ctivKles

FO 1295813)

operation3l 3ctlvlties

EO 12958 (a)

EO 13292.1.4(3), CCR 380-14 (0110) 1 4(31: A-22 #7, A-23 *11

ReportKey B4EDA6!:C-C714.5FA642AEE13S7S5CAD7F OateOccurred 1/8/2009 4:52 operational activities Page 15 ReportKey B4EDA6.5C-C714-5FA642AEE13575SCAD7P OateOcoirrrd 1/8/2009 4:52 oper3tion3l 3Ctivities P3ge 16 ReportKey B552CDi)2-OEll-C493E62E77C8068BC090 DsteOccurred 11/19/2008 10:55
P3ge 17

EO 12958 la)

EO 13292,1.4(3), CCR 380-14 (0110) 1.4(3): A-22 *7, A-23 l l

EO 12958 (3|

EO 13292,1.4(3), CCR 380-14 (0110) 1.4(3): A-23, *8,*11

oper3tion3i 3ctivlties

EO 12958 (a)

EO 13292. 1.4(3), CCR 380-14 (0110) 1.4(31; A-23, *8,*11

ReportKey CDBA48C6-A66B.3E959C7E62077BF8D7S9 DsteOccurred 6/28/2008 4:17 P3ge 18 ReportKey E43ClCJ.l-0f D1-313FBC405B9CFB2BA03D D3teOccurted 1/5/2009 5:30 Page 20 ReportKey FS84AAE4-C46B-36SF45BFCD8E63953D7F OateOccurred 10/13/2008 7:00 Page 21
R e p o r t K e y FA0BDC1C-FS9B 7F41

operational activities

EO 12953 (a)

EO 13292,1.4(3), CCR 380-14 (0110) 1.4(3): A-22 7, A-23 *11

opcr3tlon3l 3ctivitles

EO 12953 (a)

EO 13292,1.4(3), CCR 380-14 (0110) 1.4(3): A-23, *8,*11

operational activities

EO 12958 (a)

EO 13292,1.4(3), CCR 380-14 (0110) 14(a): A-23, *8,*11

27BEC0B99ASA32D3 OateOccurred 10/14/2008 8:50 Page 22

operational activities

EO 12958 (a)

0 13292,1 4(3), CCR 380-14 (0110) 14(3): A-22 *7, A - 2 3 l l

P3ge7of 7

ManningB_00572377

UNCLASSIFIED

(U) DECLARATION (U) I. LIEUTENANT Thomas Hogkins. declare K, sw: I n the subject m.Mer expert For the Dir^^or.,, of StnUegy.PI.andPolicy(J5)forcl.incion reviews. Inlhigc.pacity.lrcviewed document, pm,inmg,o United States v. Pnvpfm Fir^t r i ^ Br^lgy Manning which the Manning trial team provided to USCENTCOM. My recommendation, ,o the Original ClasglRction AuAoAy (OCA) in rrgard to the proper clawincation of the,e documen are contained on th, amichcd lia, (containing a kxa, of nineteen page) and ar. heby incorporated into this declaration. (U) Piir^u^, to 28 U.S.C. g ,745.1 dcchre under penalty of pcgury thatthe information provided herein ia t n . and correct to the best ofmy knowledge. Dated: 2J_ October 2011

-.=^=7-?^^
rhomas Hoskins Lieutenant, U.S. Navy

UNCLASSIFIED

ManningB_00527378

PROSECUTION EXHIBIT ^foy&ntitication or Men PAGE OFFERED:_^V^E ADf^ITTED: PAGE Q^

/j)>

DAD

-o o

May

Inter

lO's

Q.

o LD

> Ul 3
Rei

CD "O O 3

C D CD
3 CD QJ
IFin

C D 3

3 CD

>
Ul CTl

<
o
3

CD Q. U O n

XJ
ort,

stigat

doc

>
D

-n

Sj
01 ZT

c 3 ro 3

Q. 3" 00

3
C D 3

NJ NJ

CL

(/ 2 S.
:^ Ol

C D ' "2. a. ro a_ 3 o o < <

fD C

sl
3

c_
3

<

^ oI
CD

Ul

3
C D 3

3
C D 3

CD QI Q.

It
C D "O

o 01 3.,
Tj' C U
3' OtJ n

n CD

n >3 03 5' r o5
CD 1-1 O

01

s -S. 5 c
CD P CD T3 O <

J3 _ 01 3

3 C D

n C Q. n

g % % 2
Ol -D

-g

o
C D C D

^ "2. CL 5

<

3' C D

c
3

cr

ll
C D 3

E ,^ ; =:
O Ln ) ^ l/l _ . 3

3
01

ZT. < T j ' C D "D tu

li
= QJ P+ 3 < CL QJ

o'
3

y 3

\L 5 5'
00

ro 5' era
CD DJ_

3D

o
3

K;

c
3

5 _
f?
O.

<

o
03

g QJ 00 CD

o n

o n

o o

Is
n 00

to

S
n n o n
33 UJ oo

Is 1
o o
37
UU

Is
n 00

n n
33 UU 00 O UJ

O S7

03 OJ

<Z.

Ul

G9

?
o n
F-l

n
V -

5- 9
3 qo 3' 03

o o
HI O

o n
F-l

o n
HI n

s^

s:

gs

03 OJ

n
t3 "

s!

s eS S?

F,- O n c
fD 3

ManningB_00527379

T3

Tl

o
n

< >

Q ^
a
00 01

on n
C fD

n
o

D'

CD

^<sg
o 5. o. m g
2. <

2 S 3
35
O

g =i ry n 3
Q.

n < r~) >


un
Nl Ul
CD

O 3

5" <

0?
3" 01 3

^ 2,
r-l-

ro
D O

3 ?

J IiSI S
CD 01 01_ < Nl O c O O 77 U)

= OJ 3

3 o

ii.
01 U l

> =^ f? Q.
37

H
sI
o
Q fD 3

11
01

u II
o' S
3 3-

LD

el
l/l
3 fD

<

D
O a

33 CD

Otl
Ol

cn
(71

C D
fD 3

o o cr < ro 3
<

cu 3 Q.

Q. fD -g

? 9 3 3

c n a. o 3
era
3'

ri_

n
CD T3 O O

o T3
CD

II % s.
C
Ol

O.

r f

ID

il
Ln 33

n w

6'
3

QCD ->
-*i

o
3

<
3
3 O fD
fD 3

O 3 NJ NJ

C Q.

-o
01

a.
fD

o a
fD

fD'

OO

o -a
fD

o ^ 3 a Q.

n
CD

S" %
Ct
CD

n o

SL

o_ - 3
CD 3

B
n ta' cu 5' era c
3

fD CU CL

< a
CD

o
3 0J_

o
3

Q. fD

01 3 Q.

$ g
o'
3

n o a.
fS

^
CZ

T) OJ 00 CD Nl O

5
o n
O
VD

f-l

Is
n

5 S
UU

00

8 9

Is

Is
n go
Ln
I-l

SS
o
I-l

^s
T3 -

PI
13 "

D 9

n
n

n n
33 Ul

*-i

n
n

o n !-> n

s
n

00

g
o "

s
n go

s :
n

S?

00

ManningB_00527380

01

3 -

Q, : 00 01

3 fD

3' fl C D

<

^< 5
c-l rt rt Ul X 03

fD ^

g
3

g i: C D

<
3'

3C D

? ^ I ^ !? ?

era n
Ol

> (i?
301 3

a o
42.

C D SL g:

%
Ol N l

|i
Ol' 3

33 C D T3 O

n o 3 3

o
z o c

m O JD

<
2. 3 rt

G. rt m'
l/l

5^1

03

>
(j?
3" 01 3 rt 3 01

C D '

6 S

5^

3 3

cu
3 CL C D

-<
o 03

3 rt 0 * ^ 0 ' 3 O 3

?i
o Q33 LP

a
>

01 3 CL

li
we
OI SUS I-l

33 M Ul

|S
01 C D

^ i t 11 c s i I > |s o o
SL
01 3

(jl

to

(71

01 fD

S o
ds.

I-l Nl

-<

ainab

pons
rela

harac
CD sties

Oper

01 3 Q.

QJ

5' 3
n O de

fD

a.

c
Ul 1/1

ZFi iO

> ^

33

c
l/l T3 01 00 CD

C
t/i

>
o n o o
Ul t-1 U3

>

Is 1
T3 -

Is

It
o o
F-l O

6:

si
Tl -

s:
o 00

SI
T3 -

ManningB_00527381

aa 3:
>5
o
O =

o o D
-Tl >

O O Q
n
rn
t /in 1

O O G
O m
C/1

-a QI -n

3Ul

^
CD fD

O <D

X =

5x3
00 = -rl

cn T>

o O X T3 > O 33 > z
ID

> > o CD
X
-t3

l < S 5 5rt rt' 2. -<

^ Q
03 5.
rt o 3

D. rt a. (5- n

6' %

I o
iq S
~ O

D O
ID

> o 33 z O

o X o > o z O

>

2, 3
rt

3 Ul O

J g
SL
O
gj

i
<
c 3 r
fD rt T3

g
O N
fD X

O LD

I
z
CL CD

33

g ;:;
Ol' 3

31 C D TJ O

SL n o 3 3
01 3 CL

I
o

O
O LD

o_

i i

>
33

c
(0 X C D
C Q. 3'

?r

|g
01 C D

CL -O

3fD O

III
O
CT 01

o bL o cr. o n c cr <
fD .O C_

n o
3 fl

o;
C D

S 5- 5
O
rt

5'
3

o
ro
fD 3

Pi
o'
3

era TCD 3 J n o a.

II
3'
3r fD fD O -h

CD

sr"
O 3 tu 3 CL

9L
n o
D. CD

C D

C D

o D
fD

o
3

a.

cr
01

3 cr
QJ

c
c/1

O
3

m q n
=n 33

m q O
^ 33

Cl t>3

m %i

q
^

o
m
33

q
^

n
33

yi 30 m rO

I
o

1 1
cn n .f^ o

8R

i
2 w
<Z 00

n
o
Kl

U u
o I-" n o n
00

Is

o
H-l

n
r>

n
n

o
I-l

n
n

n
T3 o I-* -

o n

s
n
oo

s
89 S

sS

s :

n CO

s?

l\/lanningB_00527382

if
00 X

>
T3 T3

3^

g
X Ul -H

ii
O
O X

o c < l/l o -n > o


Ul T3 33 33

NJ

o >

8g
>
X

>
z z
m X

s>
n
o
X3 fD fD X fD n c 01 CL 3 C D CL TO O TJ fD

O C 33

n -n m

> c n o

33

n
01 CL 3 C D CL -O O O

Cp
(3

cr < 3
C D 3

I II s S
S; C D X! C
C D CL

Q.

LU

lli
n' 2n 3 00 n fD

C D Q . a_

c r ~<

cu

3
fD 3

-J fl fD

rt

n o
3 00

^
O n rt

6'
3

3
C D

o o cr -< 3
~
fD 3 l/l

01

rt

rt

= 3 00
Q.

FT

O
CL C D O rt.

^
O -h O T3 fD

O. o X

o
3

5"
3

n fD

% g.
CL C D O 3

CL O fD -I o O T3 fD QI QI

fD T3

o o 3 n

Q.

O T3

fD

cr

o
3

O 3

o
T3 C D

O 3 01

o
3

a Si.
O 3

n o a.
fD

l/l

un

n
33

n
33

.S

if
Tl 01 era fD Ul

is
H C
m

R
o : CL 00 o 9

es
2R 6 :
l/l "r"

ii
o
H-l

n n
33
c-l

o o

cn

> n n
33 Ul

9tt

D
Ul

n
n

I-*

n
n

n n
33 Ul

IS

IS
n 00

n oo G 9
Ul
ir

ManningB_00527383

> 33 > n cn
H

A Nl r I D Nl g O 33 O 00

is a s 5
is
O m I o

33 n c o r- z

c Ul n

n O

s 5

n O
01 3 CL

Ol 3

CL fD

ca. q_ o o cr 3
fD 3

o c
fl ID
C D S3 C C D CL

O T3 C D

S n o- 3
3 in

c Q. 3 3' o 00 fO o TJ a. ro

n o

2 z s; cn
fD

m S i cn > o cn oo S 2 1 c
m m m >

3 ^ 2

Si S 5 i
c
33 01 3 CL fD

n C o Ul z n m z O -j -n D n o Z > S m cn O \ > U cn l
33

-n
33

-n

m O

O
30

o o

O o -D o E m o O 33 > g > cn m o > o o cn m


m
Nl

l o U z n Ul

SOL

EME

ERIA

z H

rO

cn

z
m
0 C D

o c 2 z cn

5 >

S
S 3" fD 01

:i

o. a_ o o cr -< 3
~
C D 3 VI

o C n

% g n. n c o
1 Cl rt rt

o
C D

C D

5'
00 =-

E
C D

o
3

o
3

cr
01

T3 fD

n O 3 cr
cu

n fD X3 C D CL

Q. 3 3" fl C D o' 00 T3 c-l 3 O G. X CL fD -h


O -h TJ C D

O -h C l/l

01 3 O-

O 3

O 3

o
3 Z ig
ZD

CD ^

l^ 33

q n

z >

S" 3 a 5^ 5
Z

CL fD

SL n o

o n
Z

z tfj O n
Z 33

cn

O
Z

5
33

S ^
n n
33 Ul

00 C D (JI

2,
t-1

33 Ul 00 O

o o

cn

n n

33

UJ
00

(D

u
o

IS

I-l

n
n

I-l

n
o

H-l

n
n

I-*

n
n

R8

IS
n oo

S?

il

8S

S?

ManningB_00527384

CZ

^ n O
03 C-l

m Z H

c l/l n

>

33

g
O

>

S ^

2
01

n O

n >

cn o
Nl ID Nl

g
n > g
33

3 > 3 >

cn o
NJ ID Nl

O H

> n > g

>

33

cn o
f
Nl ID Nl

> 33 n > H cn n o >


r

33

r
m

q g ^ S

q
<
3 CL

o 00 o

o q o 00 < n m O
m
Ol 3 Q.

33

g
_

Nl ID

33

o o

Nl 00

^s
ex.

li
CL CL CD -O

s1 I ^
C D
O 3

o
T3 CO

3'

Ul

CU

o o cr < m- 3
n CD

uo

c o'
1 cin

2" n
Q.

o' < c n
CD 3 7 CD O

ex ec

C D

o
n c
fD Ol 3 CL

o
Ol C D

00

5'
ord

o
n

era o

fl fD

o o < 3 fD 3 3

rt,

5- g

ea

fD

o
3

3
cu
3

n o

TJ erati

c 3 n' w

5fD UL cr. C D 3 170 o Zi


3

-ii
3" CD n O

Ol

C D 3 = n SL ? oo' P CD o
fD 3 fl fD

5 SSL I-l o

cr
rt

5'
3

? n

3 cr
01

fbat

n>

o 3

<'

CL CD

cn

m
TO

c n

z >

C D 3 C D

cn i
33

q
T3 Ol (30 CD

^11
2 S
n n 33
Ul 00 O O Ul

q n
^

cn i ^

qR
33

p n n
33 Ul 00

I
l/l

>

^ o

no

o o l/l o
I-l f-l

n n 33
Ul 00 I-l

n n
33 Ul 00

LD

G cn
T3

cp
H-l 4^

r> cp

G Ul
D

ii ii
s,^
n 9

Ss
o

o
I-l

n
n

I-l

o
n

I-"

n
n

gs

IS

IS
n oo

IS

si

SS
-o -

SI
TJ -

s: s!

11 SS
13 -

i->

n
n

ManningB_00527385

g|f i
O rt era m n ^ CT

o cr Ol ^ o 3 -< ID rt
Z
o

Nl

l/l

< C a n D
n
3

g^l/l

3 C D
^

^ ^

CL un

"

o
-o o

3
rS-

2. (T %

CT 01 CT

2.
CT

" 5;
*^

D
O CT

li
ISI O

1 Ss
? :
n O 00 ]0

^ o

.2
01 -<

^' 2-^ -<


C D C D
CU O

tu

CT

?l
s: i I g. 3'
01 5 3 O TJ CD 00 m OJ

o
-D

<

g
00

g
(JO

(JO

CT 2 ^ 0 1

C D

UOI

II
=r n
C D O C D
O -h C

Nl

^ 9 01
cr. o
3
01 3 CL

c cu
3 Q.

o
3

re n (So' CD
C D 3

3
CT 01

S L
n o
CL fD

un

n
fD

a
C D 3

fD

n O

fD O rt,

3 Ol 3

x>
C CL

ID

00 C D 3

<
=; X o

I ^
r rt

S g S ? _ 3' _. _

CL O

CL CD -O^ O

C D

C D

U l

iclu

xec

per
01 ing

s
c

CL

01

3
fD 3

o o 3

S L f?

E 5'
c Q-

n '=' C D
lo f l QJ

CT <U

ui

o
3

3 o 3 o 3
bat
CU

ngor

cept
rati

ca. CD
TJ fD

c cn i ^
Ln >
(33 33

c cn !^
Ul > 00 33

O 33

n
33

n t,

3 s
oo
C D 00 O

1 o G
c _, n r>
33 Ul 00

z S c nq
03

Ul m

n un >> rri

* s
m q
^
03
l/l

p Jfi

* 8
cn q
03

> c
Ul

> c

l/l

> c

n n
33

iC 33

Ul

sl
o o
^ O 33 Ul 00

<K
f-l 9

Ss
o
I-'

u
o
I-*

n
n

o o !- n

n
o

SS
T3 -

sS S?

IS
n 00

IS
n oo

eS
T3

u
o
I-l

n
n

S|

SS
a *

s!

ManningB_00527386

SUi

rD

JD

s
I-l % - n U lrel / l

8
HI S - n U lrel / l
CJ.

2 ?S
.C 5 n
h-l re l / l 3 CJ. O fl

2 O^
T3 O

o
l/l CL

11
o n c > 3 33 re
3

11
O n 33 c > 3 33 re> X 3
O.

i a o > c 3 J 3 re> X 3

rel / l c -o -o O
CJ. O 33

re

?
X o TJ re o re
3

-I n c > 3 3J re> X 3

3
c
Q.

2; s
o 3 3*

lado

OJ Q . CL -O

3 re o o CT < 3 rere
3

M
3 QJ

o
Q.

TJ

UOI

3' 00

n o 3 n re

o
re

o n 3 re
3 01

c
ces

rt

re Ul X re n c a. o 3
inclu 3 00

and 1 bjec

tacti

depfi

reso

n re
rt

Im

ing

re

an uve

on

01

CT 01

UOI

re 01 g re

reo 3 o TJ re

o
3

re
in

<

SL
n o
CL

o
3

re

o
33

O n
33 33

z ^ o
CU 00 IO

n O
-o

33

O 33 n

o
o n

re

o
lO

Is
n
t3

Is

o
-c:
O

<
[uired.

reo re OJ
3

CL

5'

o reo T o J

o
3 01

:um sta nces.

n o
CJ.

f battle.

era

o'
3

re

33

n
33

O
33

z o

n O

O O

33

Ul
00

00
-

SS

ii
n 9 -o -

SS

^ t
o n
33 Ul 00

n
G9
Ul

S IS 1sI 888 9 n 00
cn I-l

0 n o n o n t-* n M n M n

o n

SS
TJ -

in

I-l

IS 8^
cn I-l

I-l

I-l

n
o

I-l

eS

ManningB_00527387

5; 7t \

< g X m 3 o > Ul
Z
T3 Z

n o 3
TJ O 3

re
33

ii
o

l i Is
o
Z

TJ re 3

o c z o n

z S < o

Si
2P
^

X T3

g < o o
33 m

-o
I o O l/l

^5
-p
m

g
33

i m

>
33

ii
33 l/l

o l/l

SS

o
33 Ul

>

g
2
J2

<n

m O
33 T3

^ 33
n
T3 Nl

m
33

>
33 33 T3

ii
?
re
D_
CL J3 C 01 3 CL

n
T3 NJ

g
33

a. 3
01 re TJ

% s. S
C 3

Ul

c
_ n

f''
re
OJ

l/l

o.
re

re

o
3 Ol

-< 3 re
3

g 2:
CT era TJ
_

re

E S

re
3^

re

^
CL

o -<

^ I -o
3

re re

6'
3 00 3

re y

?i 1

n o
CL

re

oI
3 yi

5'

c
3

SL n o
Q.

re g_ o -c 3 re
3

I?
rt

01

5.
o'
Tj'

^
re

<

C D "O

o
3 01

rt

5'
00

re

o
3

c
3

CL

9
re

T3 01 00

re I-l o o

8A

o cn
O

n n
33
UJ 00

o cn

n n
^ Ul

gs
n 00

SS
Ul

<s s?
w o
I-l

SA
n

00

ES
R

o
I-l

n
n

IS
o w
IO

n n
33 Ul

n
n

I-*

n
n

H >

n
n

8 9

n ' oo o
I-l

IS
n
go

IS
O 00

IS
n

00

r s

ManningB_00527388

if IL I
^ 3
o
Ul r

o c z o n

>

X T3 1

>
I-

o
3
33

X TJ

O c

< o
z .o o
I

q <
33 H 33

-n S t o
33

5
33

il
>
m 2

g O Ul n o

<
m X

-rl

33 -O

Nl

C Ul

CL re

o
TJ

I I ^
S5 re
o
3 3 CL

XI

c_
3

<

re
re CT

re
o
3

III
3 o < re

r> o o. re

SL

3
3

re

D^ o -< re cu 3 CL re 5 '

"_

g oI
3

< <
^ za O o
33 T3

>

o g 3 1 g 3 ^ > ^ ^ S

>
33

Nl

CL

Ul

X3

CL

OO TJ

^ % re
o
3 QJ

k % s.S
c^ 01

< E

g n

I-l Ul

re'

T3 rt

re

5' era c
3

il
re 3

"2.

re

CJ.

CL re o

re'CToo cr < T J
TJ

Ul

CJ.

CL

re

i s

o n

re y

rt

5'

00

rt 3

c
3

CL

6'

q
o
Ol 00

re

SR
O

o
cn
tr Ul n CO

n
o

cn

n
n

Ul 00 O

33

ES

M ID

82
o
I-l

R ^

s
O 00

cn

t-1

n
n

n
o

I-l

n
o

o
t-i

n
n

IS SS
u -

IS

IS
n

IS
n

00

00

sl
g
to
T} -

w vo

ManningB_00527389

Iiil
|si

ill
X

n S ^ > ^
33 33

1
: o % " 5 > -< m
O
C D-

t; P

O m

<

if
> o n O <
33

ii

lii
re
CL

cn re re re
3 CL

7 g, D_ re
o o < 3 re
3

.o c
01 3

Ul

Nl

< o
3 01

-< CL re 3 3 a_

I
3

TJ Ol

O
TJ

3
n
X>'

re

cr < re "o
o

o
3

9
CL

3 00

re

% E

c
3

n o

SL
CL

<
C cn re Qre m
l/l nji

< m o X > > < 33 o 5 35 -n 3o 33 J o -D o c


3

n o 3 TJ o 3 re n

m X
T} r Ul

re CL re

TO.

3 C Ol 3

g - S
re c
Q. 3

a.

o CL -< re 3 3 o

T3 (U

3.

re

=: rt G. 21 (M -< TJ o TJ < re rt re 3' 3 01 . re Q 00 o 3' o re cu c 3 i" % o 3

2" %
t-

NJ O VO

gs O
cn HI UJ

o cn

n n

KR

R
O _ 33 UJ

as
8 9
cn M w

<n
cn

G 9
I-l

00

sR <S SS
n 00

-D

>
UJ

o
1-1

n
n

o n I-* cn

o
I-l

n
n

IS SS
>
Ul ID Tl -

IS SS
n 00 T3 -

sS

is
n 00

>
Ul ID

Manning B_00527390

G 3 m

8g ;

S?l
o
l/l

5 X X^
TJ "O T3

o
O Z Ul m

'ii
O Z m ^ 33

lii
n Z >

sg?
m X

IS>
D

iii
2
33 C

il
3

m
3

1^
3- TJ o
re

n CL
QI

2 S.
re

^ "2.

2.-I

SL
o o
CL

< <
5

ill
2
33

o % >
X T3 33 ~

^s
2

CJ

1
C 3
CL

CJ.

c CL

Ol

13

2 S.
01 re

2 I
C
(3.

re o_ o

SL 3
CT 00
.< rt

5,
n'

re

^ "2.
re

3 re
3

re cu

re

"o

TJ'
rt

Q.

3'

re

5'

O 3 01

3 o 1 <
re

re o_ o

3 ^ _ 2. -3 ? cr. 01 re o; e r a 5. n' -< TJ

I^
re
TJ

QI

re

K o E
3

00 c 3

9
re

CJ.

re 3

3 re
3

o
n
rt

re 5'
00 c 3

5'
3

-g 01 00
I-l

re
UU

Ul

n
n

f-l

SS
' > B
o
t-*

Is
8?
w o n n

o (n cn n

?S !
o n
n

SR

gs
g8
cn H*

n
n

HI

t-i

n
n

IS SS
n 00
Tl -

gs 8?

IS
n CO

si

ManningB_00527391

2 ? >
Nl

< X T3
^ I

l/l

n S o Ul
33

X TJ r

5 ^
o D

O
Ul

< m
X

O r O Ul 52 O < 7

X T3

ii
n < g > I-l n <
Ul

X
T}

X T3

^ o ^ > o S

O 10

-o

3J X

i^S

> ^
33

> c g
HI Z o

n 3 y ^ o

n S < d
CJ_ Zi

II i l l
-n O

i>

2 S.
re

ur 2.

01

re

o
3 CU

o
O CJ.

rl I 2
D-

tF III
C 3 =rt re _ O T)

SII^

# M re
CU

S s- g. g
2 c
CL

XJ

cu 3

n_ c
CL

cr. < T3
QI 3 00

0.

5'
3

Hf
re re
3

3 o <

re
3

n
rt

c
3

n o

SL

re re ' CT oo ~ o_ ~' < ' -6' _ o re TJ cu -< 3 3 CL _ 00 re o fl 3 c


rt

re

re

l/l

1I

5'
3

Q.

re

o'
3

T3 01 OO
I-l

re

o cn

n n

Is
n

n n
33 UJ

gs
SS
"o Ul

00

SS
t3 -

s!
o
HI

Is

n
n o
33 UJ 00

o
HI

o
O

o
HI

o
n

n
n

IS
T3 -

8
E

1
SS

gs ?

o
cn H

ManningB_00527392

S I 5 .5
>
00

z
7<

^
TJ

91 # 3
7^

TJ

X -d

X T3 O cn

n O

<

ii
o
33 -D

>

7; 03

n O

-<

ii

6
un

O
33

P <

Nl

i
c yi
Ol

> 33 $ 6 33 5 2
Nl O
33 T3

n
H

3 S re S 1 XJ g c ^ n
re'

01 re CT " 2 .

c Q.

re

re

o
3 Ol

aa 3 | o
re
3

CJ.

re

CT = (TO rt re
01 CJ. _

s-^
G. TJ cu 5' oo c
3

n o a. re

< re 3 y

It
3

-< TJ
re

re o
3 01

5'

o
3

K #S 2, o

o CJ. re

<
21
n
CJ. -Zi

Ul

2 S.
01 re

1
C 3

re'
3

o_ C CL 00
rt

T3
Ol f l

!i s -o
re

CT
^

2 ^
TJ 01 3 00

-<
TJ re 3

-c
TJ

re

QJ Q. 3'

re

re

o
n

rt

5'
3

00 re

3"
HI

o cn

n o

Ln O

gs
8 9
cn H*

gs
.T3

cn

n
n

o cn

n n

R 8 S
-

gs S?
(-1

is
?
o
HI

00

Ul

o
HI

n
o

IS
n 00

IS 8^
V s
T3 "

HI

n
n

n
o

IS SS
n 00
T> -

sS S?
w
to

>
UJ ID

ManningB_00527393

iiil
o

# ^ 3T3 >
17 r

Ul

Q fz
>

T3

sil
M Z m
l g 3 N ? o 5

ill
NJ Z

111
m 33

?5 3

sg
o

. .

T3

# 6
o z

il
3

5 rt CL OJ re

re

re or "2. a. -c
3

o n o
3 01

-| sre o
T3

CJ.

01 3 CJ.

<
JZl

O o O

< < = z Ln m ^ % X > H > cn o ^ $ 33


m .ii
C ui Qre O Q O m

> S o ^ o

X T3 I

01

QJ 3

1H .
rt rt -C

Is
o z

UJ

Ol

2 E 5"
E era _ 3 3
G. TJ rt

I? re
o
3 01

re

re a. c" re a_ C o y CL

re "5 OL L_ o
n rt 3

3 I <-= o <
re 3 re
3 3

<

g^ = a
SL 3

T> at

5'
c
3

00

re

6'

n o a. re

2 ; 00 re rt < re re o -< cu 3 Q. re 3 ' re 3


D.

a
T3 rt 3' 00 C 3

O 3

I
m o
l-

o cn

n o

o cn cn n

o n cn <n

gs
gs
cn
UJ

gs
n 00

lO

li
G 9
cn HI

gR

gs

>

t
n
n

IS
cn

HI

n
n

8 9
HI

IS
n
go

IS
n 00

IS
\"
.T3

H'

o
n

SS
T3 -

8 9
-

^ %

ManningB_00527394

O n % c

> 2
00

O O m

-rr > c Ul
UJ X

6 g
n K

c 9

33

III
s^
c ^

is i cn Ss X
>
NJ

Z < g
>

< O m
Cl

-n

^ o8 ^ O o
s ^ > X s >
o

TJ

o n

Cl X

t-1 Nl

CJ.

re o

CL

T3

O
01

re
3 01

re 3
CL ~C

5'

o" o n < re re ment

re 3 3 re
3 IU 3 CL

<
^
3

il
C

>
N

s^ %s
C Ul CL re

33 TJ

33

S 1 5. re
3

Ul

re

'-ii E

?
TJ
rt

S-c^ a
< TJ
re 5'
00

TJ

o
re

o < re cu 3 CL re 5' o 3
3

o
3

re

S oI

c
3

S L cn o a. re

D_ o < CL re 3 a_ re o 3 -< re 3 OJ re Q. 3' 3 re rt ^

re

CL

X3 C QJ 3

I ^I
S-ig TJ
QJ

<
rt G. TJ

Wo

US

re

5' era c
3

rt

Cod

o
3

-o
su 00

re
t-1

o cn
O

33
Ul

n o

o n
33 UJ 00

o cn

n o

^ o

gs
89
cn le

Is
00

Ul

Ul

HI

n
n

IS
89
Ln H

IS
-o -

HI

n
n

HI

n
n

n cn
33 Ul 00

89
E

IS

w to

sl
T3 -

>

UJ LO

ManningB_00527395

33

^ P
ir O

l/l

Ul T3

n
O 33 T3 m

.o m
rm

?i
>
33 m

c
n

O
Z

il
03

c
m

Ul

o > O o
iz-

%
33

o
l/l

n
4^

33

>
o

cn
O O

33 C3

33

II
s#
c '~:
CL 2
01 re

< > g
O
33 m X

= ^s
CL Z^
01 re
l/l

f^
re

XJ

2 S. 2 C 3

Q.

UJ TJ Ol

#K

I 3f s
o

S- 3 S? 00
re ' cu
Q. TJ

C _ CL

rt - S 1S 2 S. 2 C 3

n g.

^ "2. o
3

-<
re

< re
3

TJ

5
3

TJ rt

n o
CL

3 re

re 5' re

5'
00

c
3

SL
n o
CL

I
re
l/l

i
T3 -

re
01 Q.
3'

II
d, < re o
5. s

T3 01

a
fl

5'
01 3' 00

re %

c
3

re

o
3

re

3 3

m g.

T3 01 00

re
t-1 00

o cn

n o

cn
< n
O

n
n w 00
33

cn

n
n

gs SS
Ul

gs SS
Tl -

Is

SS
o
HI

w n
n

HI

n n
33 Ul
00

o
HI

n
n

n
n

IS
89

ii
>
Ul ID

IS
O 00

P
>
UJ ID

ManningB_00527396

i i ? |
HI (Z O r^

s^ ^
5 S5
m 03 33 ^ O 33 T}

un

X T3

33 ?

X Ul m C
Ul Tl

q ^ 3 o
<: <

o
l/l

OJ m

i;-

>

% ;

s<
n
X

> <

ir

q
33

X TJ r O un

<
X

c 5 " o < ^
5 O F R 2 Ul n H
CL 01 3 re
t/1

11:1
UJ
2 m

o
f

cn n

3g
33 O

n
XI 3

c;

n D O

2 S. 2
re
C

o
Tl Ol

re

a.

TJ 01 00

<
re
3 re
l/l

1} ll
" r e I
-

^ "2.

^
o
3

III!
T3 2,-i =
CJ. w

^
3

re
rt

3fl C Q. G. TJ
01

-<
3

TJ O

n] TJ'

TJ

re

CJ. -cr _

rt < y 5' re o 00

cr. < re "o


o n
1/1

2 : (TO = rt

3 3

K % o
3

c
3

S L cn o
CJ.

!i
I 2
Ul

3 00

EL

re

Ol 0' 3

re
HI

o cn cn n

LO O LD

gs
n

gS
rn 00

cn

Is
SS
Ul

00

S?
Ul

n n
33 Ul

HI

n
n

oo

gs

Sg
o -

si

IS 8;

o n H* cn

ManningB_00527397

Prosecution Exhibit 88 103 pages classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

Prosecution Exhibit 8^ pages classilied "SECRET" ordered sealed f^rReason2 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibit ^0 1^0 pages classiHed "SECRET" ordered sealedf^rReason2 Military Judge's Seal Order dated20August2013 stored in the classitied supplement to the original Record ofTrial

Spo

1 I I
c_ imes N. Matt

q^fl

o cn
C D O

CO

o
Zl

ZT % o o 3 { % i

"0

m lohnR. Alter Jones


n

1 gg
1

General

a
@

WEBm -<MfS^''
"k* ^
Chief of staff

Lieutenant General Major Genera


Michael D. ff.

b
1^
j-

1
m f
>

> t/ (/>

Bl
' '-ll^^pUBS.

rank A. Grippe

Command iergeant Major

CSEL

in t/

m O

1 1

Ill

J"
m

553
88
g z 2
00 f o

I
SI
OL

Q DQQ a D O ^ z z m mm m
03 R > R

C D

il
mg,
tn US

i
D-*:
-i

>o

s
&

% 88=G z (n

x^
c

C/)

to (D

Q.

C T S

Mi

> a. (A < o o n R
Q> I-t

n >

m
> in LA

v cn

m O

9
M

iRj

s
If

I
JiL

i il i l l
3 D B B B B D B Wg B B B B B B B B B | 9 5 I I s g I
ff 5. 2 3.
.Eaw

f
3
c 3

ffll

ii'fl

i!
C O ^ to % Oi %

1
II II SSS
t!

ll i
il
3I 5 1
3 o z cr

S
A

I
Nl

10

SS
H-

I
m
tn tn

ss
G O O

% ^ %
w in

II
tn tn
>

o
01
10 Nl

K 1

^ 0
i i

is
1

* s w i i I

w is i i I I

s.

I f & &
O oo
00

Cl

3
Id 01

g 3"

II
@ ^

!t o

IO

^ 3 3

II I

I
cn

^ llif I
5f 3-1 Q
01

&

s
?

cl I I
tn tn
>

n f
>

tn tn

m O

m O

b
&

n g> ^

I ll If s nil
B BBBBBB I
s sw
H 3 3

ss
5 5
K
fj N

ro

ss
N M

w W

?i
O

10

DAM

AM

z
n
03 00 00 03 00 00

>

tn tn
^ ^ ^ ^ ^ ^
c
C C C

s
^
S Q
V ^

to tn m O

ifi
c

s g !e

liiilii

s g 3 3
3' m

* ^

I
& If

yi

m c

(I)

I
f HS

I li B i nil
B BB I
03 O) CO ^ 4

B G GI i S i

5 SS I % S% #
K K K

S ^ ^

> V> V)

> (/>

tn
^ ^ ^

m O

g gg

m O

s
5

UNCLASSIFIED
u s Government Property SF 710 (1-87)

Substitute for Prosecution Exhibit 92

A r m y Regulation 2 5 - 2

Information Management

Information Assurance

Rapid Action Revision (RAR) Issue Date: 23 March 2009

Headquarters Department of the Army Washington, DC 24 October 2007

UNCLASSIFIED
ManningB_00016230

PROSECUTION EXHIBIT 9 3 for identification PAGE OFFERED: PAGE ADl/lTTED:_ PAGE OF PAGES

SUMMARY of CHANGE
AR 25-2 I n f o r m a t i o n Assurance This r a p i d a c t i o n r e v i s i o n , dated 23 March 2009-o C l a r i f i e s and c o r r e c t s references t o Department of Defense D i r e c t i v e 8750.1 and Army t r a i n i n g requirements (para 4-3).

o Removes i n c o r r e c t course reference t o I n f o r m a t i o n Assurance Manager Course and provides c o r r e c t i n f o r m a t i o n on C e r t i f i e d I n f o r m a t i o n Systems S e c u r i t y Professional modules (para 4-3) . o Removes i n c o r r e c t i n f o r m a t i o n regarding Fort Gordon course t o p i c s (para 4-3) . o Removes references t o the Asset and V u l n e r a b i l i t y Tracking Resource compliance r e p o r t i n g database, which i s no longer used, t o c o r r e c t l y reference the Army T r a i n i n g and C e r t i f i c a t i o n Tracking System (para 4-3). o Deletes i n c o r r e c t reference t o S k i l l p o r t f o r r e q u i r e d i n f o r m a t i o n assurance t r a i n i n g (para 4-3) . o Changes Department of Defense Warning Banner verbiage t o comply w i t h Department of Defense d i r e c t e d mandatory guidance (para 4-5) . Corrects references t o the N a t i o n a l I n f o r m a t i o n Assurance Partnership (para 6-1) .

o Adds mandatory Department of Defense Standardized Notice and Consent User Agreement language (app B-3) . o Updates o f f i c e symbols and acronyms (throughout).

ManningB_00016231

Headquarters Department of the Army Washington, DC 24 October 2007 Information Management

"Army Regulation 25-2


Effective 13 November 2007

Information Assurance
program executive officers; direct reporting program managers; strategic, tactical, and non-tactical environments or installations; intemal or external organizations, services, tenants, or agencies (for example, DOD, sister Services, U.S. Army Corps of Engineers (USAGE); contractors working on Army information systems pursuant to Army contracts; Army and Air Force Exchange Service (AAFES); morale, welfare, and recreation activities; educational institutions or departments (for example, DOD schools, the U.S. Military Academy at West Point); and Army affiliated or sponsored agencies (for example, Western Hemisphere Institute for Security Cooperation). During mobilization, the proponent may modify chapters and policies contained in this regulation. and forwarded through their higher headquarters to the policy proponent. Refer to AR 25-30 for specific guidance. Army management control process. This regulation contains management control provisions and identifies key management controls that must be evaluated (see appendix C). Supplementation. Supplementation of this regulation and establishment of command and local forms are prohibited without prior approval from the Chief Information Officer, G-6 (SAIS-ZA), 107 Army Pentagon, Washington DC 20310-0107. Suggested improvements. Users are invited to send comments and suggested improvements on DA Form 2028 (Recommended Changes to Publications and Blank Forms) directly to HQDA, CIO/ G-6, 107 Army Pentagon, Washington DC 20310-0107. Distribution. Distribution of this publication is available in electronic media only and is intended for command levels B, C, D, and E for the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve.

By Order of the Secretary of the Army: GEORGE W. CASEY, JR. General, United States Army Chief of Staff Official:

(/JOYCE E. MORROW Administrative Assistant to the Secretary of the Army History. This publication is a rapid action revision (RAR). This RAR is effective 23 April 2009. The portions affected by this RAR are listed in the summary of change. Summary. This regulation provides Information Assurance policy, mandates, roles, responsibilities, and procedures for implementing the Army Information Assurance Program, consistent with today's technological advancements for achieving acceptable levels of security in engineering, implementation, operation, and maintenance for information systems connecting to or crossing any U.S. Army managed network.

Proponent and exception authority. The proponent of this regulation is the Chief Information Officer/G-6. The proponent has the authority to approve exceptions or waivers to this regulation that are consistent with controlling law and regulations. The proponent may delegate this approval authority, in writing, to a division chief within the proponent agency or its direct reporting unit or field operating agency, in the grade of colonel or the civilian equivalent. Activities may request a waiver to this regulation by proApplicability. This regulation applies to viding justification that includes a full the Active Army, the Army National analysis of the expected benefits and must Guard/Army National Guard of the United include a formal review by the activity's States, and the U.S. Army Reserve, unless senior legal officer. All waiver requests otherwise stated. Also, it applies to all will be endorsed by the commander or users, information systems, and networks senior leader of the requesting activity at all information classification levels;

C o n t e n t s (Listed by paragraph and page number)

Chapter 1 Introduction, page 1 Purpose 1-1, page I References 1-2, page I Explanation of abbreviations and terms 1-3, page 1 Army Information Assurance Program 1^, page 1

'This publication supersedes AR 25-2, dated 3 August 2007. This edition publishes a rapid action revision ol AR 25-2.

AR 25-2 24 October 2007/RAR 23 March 2009

ManningB_00016232

UNCLASSIFIED

ContentsContinued
Overview 1-5, page 1 Chapter 2

Responsibilities, page 3
Chief Information Officer/G-6 2-1, page 3 Principal Headquarters, Department of the Army officials and staff 2-2, page 4 Administrative Assistant to the Secretary of the Army 2-3, page 4 Assistant Secretary of the Army for Acquisition, Logistics, and Technology 2-4, page 4 Tbe Deputy Chief of Staff, G-2 2-5, page 5 Tbe Deputy Chief of Staff, G-3/5/7 2-6, page 5 Tbe Deputy Chief of Staff, G-4 2-7, page 5 Commanders of Army Commands; Army Service Component Commands; Direct Reporting Units; U.S. Army Reserve; Army National Guard; program executive officers; direct reporting program managers; Regional Chief Information Officers; Functional Chief Information Officers; and the Administrative Assistant to tbe Secretary of the Army 2-8, page 6 Commander, Information Operations Command 2-9, page 6 Commanding General, Network Enterprise Technology Command/9* Signal Command (Army) 2-10, page 7 Commanding General, U.S. Army Training and Doctrine Command 2-11, page 7 Commanding General, U.S. Army Materiel Command 2-12, page 7 Commanding General, U.S. Army Intelligence and Security Command 2-13, page 8 Commanding General, U.S. Army Criminal Investigation Command 2-14, page 8 Chief, Army National Guard 2-15, page 8 Chief, Army Reserve 2-16, page 8 U.S. Army Reserve Command Chief of Staff 2-17, page 8 U.S. Army Corps of Engineers Chief of Engineers 2-18, page 9 U.S. Army Corps of Engineers Chief Information Officer 2-19, page 9 Commanding General, Eighth Army 2-20, page 9 Commanding General, U.S. Army Europe 2-21, page 9 Commanding General, U.S. Army Medical Command 2-22, page 9 Program executive officers and direct reporting program/project managers 2-23, page 9 Commanders, directors, and managers 2-24, page 10 Garrison commanders 2-25, page 10 U.S. Army Reserve major subordinate command 2-26, page 11 Army National Guard state D0IM/J6/CI0 2-27, page 11 Regional Chief Information Officer 2-28, page 11 Army Reserve command/unit/activity G-6 2-29, page 11 Director of Information Management 2-30, page 11

Chapter 3
Army Information Assurance Program Personnel Structure, Personnel structure overview 3-1, page 12 Information assurance personnel structure 3-2, page 12 Information assurance support personnel 3-3, page 15 page 12

Chapter 4 Information Assurance Policy, page 18


Section I

General Policy, page 18 Policy overview 4-1, page 18 Funding 4-2, page 19 Information assurance training 4-3, page 20 Mission assurance category, levels of confidentiality, and levels of robustness 4-4, page 21 Minimum information assurance requirements 45, page 22

II

AR 25-2 24 October 2007

ManningB_00016233

ContentsContinued
Section II Software Security, page 29 Controls 46, page 29 Database management 47, page 29 Design and test 48, page 30 Section III Hardware, Firmware, and Physical Security, page 30 Hardware-based security controls 49, page 30 Maintenance personnel 410, page 30 Security objectives and safeguards 4-11, page 31 Section IV Procedural Security, page 31 Password control 4-12, page 31 Release of information regarding information system infrastructure architecture 413, page 32 Section V Personnel Security, page 32 Personnel security standards 4-14, page 32 Foreign access to information systems 4-15, page 35 Section VI Information Systems Media, page 37 Protection requirements 4-16, page 37 Labeling, marking, and controlling media 417, page 37 Clearing, purging (sanitizing), destroying, or disposing of media 4-18, page 38 Section VII Network Security, page 38 Cross-domain security interoperability 4-19, page 38 Network security 4-20, page 38 Section VIII ' Incident and Intrusion Reporting, page 43 Information system incident and intrusion reporting 421, page 43 Reporting responsibilities 4-22, page 43 Compromised information systems guidance 4-23, page 43 Section IX Information Assurance Vulnerability Management, page 44 Information assurance vulnerability management reporting process 4-24, page 44 Compliance reporting 4-25, page 44 Compliance verification 4-26, page 45 Operating noncompliant information system 4-27, page 45 Section X Miscellaneous Provisions, page 45 Vulnerability and asset assessment programs 4-28, page 45 Portable electronic devices 4-29, page 46 Wireless local area networks 4-30, page 47 Employee-owned information systems 4-31, page 47 Miscellaneous processing equipment 4-32, page 47

AR 25-2 24 October 2007

ManningB_00016234

ContentsContinued Chapter 5 Certification

and Accreditation,

page 48

Certification and accreditation overview 5-1, page 48 Certification 5-2, page 48 Tailoring 5-3, page 49 Accreditation 5^, page 49 Recertification and re-accreditation 5-5, page 49 Accreditation documentation 5-6, page 50 Connection approval process 5-7, page 50 Designated approving authority 5-8, page 50 Lead agent of the certification authority 5-9, page 51 System owner 5-10, page 52
Chapter 6

Communications Security, page 52 Communications security overview 6-1, page 52 Protected distribution systems 6-2, page 53 Approval of protected distribution systems 6-3, page 53 Radio systems 6-4, page 54 Telecommunication devices 6-5, page 54
Chapter 7 Risk Management, page 54

Risk management process 7-1, page 54 Information operations condition 7-2, page 55
Appendixes

A. B.

References, page 56 Sample Acceptable Use Policy, page 61

C. Management Control Evaluation Checklist, page 67


Table List

Table 4-1: MDEP MS4X, Information Assurance Phased Funding Utilization Plan/Actual Execution Report (RCS; CSIM-62) For period ending 092009 (MMYYYY), page 19 Table 42: Investigative levels for users with privileged access (IT-I) to ISs, page 34 Table 4-3: Investigative levels for users with limited privileged access (IT-II) to ISs, page 34
Pigure List

Figure 8-1: Figure 8-1: Figure 8-1: Figure 8-2: Figure 8-2:
Glossary

Acceptable use policy, page 62 Acceptable use policyContinued, page 63 Acceptable use policyContinued, page 64 Information system user agreements, page 66 Information system user agreements -Continued, page 67

iv ManningB_00016235

AR 25-2 24 October 2007

O^a^terl Introc^u^tion 1^1. Purpose Tbisregulationestablishesinformation assurance (IA) policy, roles,and responsibilities. It assigns responsibilitiesfor allHeadquarters,Department of the Army (HODA) staff,commanders,directors,IApersonnel,users, and developers for achieving acceptable levels of IA in the engineering, implementation, operation, and maintenance (EIOi^M) for all information systems (ISs) across theUS Army Enterprise Infostructtire(AEI)

1^2. References
Required and related publications and prescribed and referenced forms are listed in appendix A.

1^3. Explanation of abbreviations and terms


Abbreviations and special terms used in this regulation are explained in the glossary. Army Information Assurance Program ^. The Army Information Assurance Program (AIAP) is aunified approach to protect unclassified, sensitive, or classifiedinformationstored,processed,accessed,ortransmittedby ISs,andis established to consolidate andfocus Army efforts in securing that information, including its associated systems and resources,to increase thelevel of trust of this information and the originating source. Tbe AIAP will secure ISs through IA requirements, and does not extend access privileges to special access programs (SAPs),classified,or compartmentalized cIata;neitherdoesit circumvent need-to-know requirements of the data or information transmitted. ^. The AIAP isdesigned to achieve the most effectiveandeconomical policy possible forall ISs using the risk management approach for implementingsecurity safeguards. Toattainanacceptablelevelofrisk,acombinationof staffandfieldactionsisnecessary to developlocalpolicyandguidance,identify threats,problems andrequirements, and adequately plan for tbe required resources. c ^ . Information systems exhibit inherent security vulnerabilities. Cost-effective, timely, andproactive IA measures and corrective actions will be established and implemented to mitigate risksbefore exploitation and to protect against vulnerabilities and threats once they have been identified. (1) Measures taken toattainlAobjectives willbe commensurate with theimportanceoftheoperations to mission accomplishment, the sensitivity or criticality ofthe information being processed, and the relative risks (the combination of threats, vulnerabilities, countermeasures,andmission impact) to thesystem. Implementation of an lAoperational baseline will be an incremental process of protecting critical assets or data first, and then building upon those levels of protection and trust across the enclave. (2) Statementsof security requirements willbe included in theearliest phases(forexample,mission needs statements, operational requirements document, capstone requirement document) of the system acquisition, contracting, and development life cycles. c ^ . An operationally focused lAprogram requires the implementationof innovative approaches.Tbroughthe use of IA best business practices (88Ps) the best ideas, concepts, and methodologies acquired from industry and Army resources will be used to define specific standards, measures, practices, or procedures necessary to meet rapidly changing technology orlArequirements in supportof Army policy requirements. IA 88Psallowrapid transitional implementation of IAinitiativestointegrate,use,improve,or modify technological or procedural changes as required by policy. 88Ps are located at https://informationassurance.us.army.mil. ^. Tbe elements of tbe Defense in Depth (DiD) strategy focus on three areas: people, operations, and defense of the environment(tbelatterofwhichencompassesthecomputingenvironment, tbenetworks, theenclaveboundaries,and the supporting infrastructure). ^ The AIAP is notastand-alone program,but incorporates related functions from other standards or policies such as; operations security (OPSEC), communications security (COMSEC), transmission security (TRANSEC), information security (INFOSEC), personnel security, and physical security to achieve IA requirements. ^. Failuretoimplementproactive or correctivelAsecurity measures,guidance,policy,or procedures may prevent system or enclave accreditation, installation, or operation and may increase system vulnerability to foreign and domesticcomputernetworkoperation(CNO)activitiesdesignedto(Ieny service, compromise information,or permit unauthorized access tosensitive information. lAornetworkpersonnel may blockaccess to ISs that refiect poor IA security practices or fail to implement corrective measures. 1-5. Overview ^. The AIAP applies to ISs including, but not limited to, computers, processors, devices, or environments(operating inaprototype,test bed, standalone, integrated, embedded,or networked configuration) that store, process, access,or transmitdata, includingunclassified, sensitive(formerly knownassensitivebutunclassified(S8U)),andclassified data, with or without handling codes and caveats. ISs used for teleworking, telecommuting, or similar initiatives; contractor owned or operated ISs; ISs obtained with non-appropriated funds; automated tactical systems (ATSs);
AR 2 5 - 2 ^ 2 4 October 2007 1

^anningB^000^^23^

automated weapons systems (AWSs); distributed computing environments (DCEs); and systems processing intelligence information are required to adhere to the provisions of this regulation. /i. Commanders of activities requiring limited access by any local foreign national (FN) officials or personnel (including information technology (IT) positions) will follow the provisions of this regulation. c ^ . Thisregulationappliesequally to theoperation,safeguarding, andintegrity of theinfrastructures(for example, power, water, air conditioning), including the environment in which the IS operates. c ^ . Whilenoregulationorpolicyonsecurity measures caneverprovidea 100 percent solution, implementationof the concepts, procedures, and recommendations in this regulation will drastically reduce the manageability require ments of assets, and minimize the effects of unauthorized access or loss. The cornerstone philosophy of IA is to design, implement, and secure access, data, ISs, and data repositories; increase trust and trusted relationships; employ technical and operational security mechanisms; deny all unauthorized accesses; and permit necessary exceptions to support Army, DOD, and .loint interagency and multinational (.IIM) tactical and sustaining base operations. ^. Army information constitutes an asset vitalto the effective performance ofour national security roles. While all communication systems are vulnerable to some degree, the ready availability oflowcostIT,freely distributed attack tools, increased system connectivity and asset distribution, and attack-standoff capabilities make computer network attacks (CNAs) an attractive option to our adversaries. Information Assurance capabilities and actions protect and defendnetworkavailability,protect dataintegrity, andprovide the ability toimplementeffectivecomputer network defense (CND). Management of Army informationisimperativesothat its confidentiality, integrity,availability,and non-repudiation can be ensured, and that users of that data can be properly identified and authenticated. ^ Tbe AEI architecture requires the establishment,verification, and maintenance of trusted enclaves,trusted connec tivity, and trusted information and information sources along with the capability to access and distribute that information by leveraging technology and capabilities to amplify that trust. ^. To accomplish these foundational objectives, this regulation establishes requirements as follows: (1) Provides administrative and systems security requirements, including those for interconnected systems. (2) Defines and mandates the use of risk assessments. (3) Defines and mandates the DiD strategy. (4) Promotes the use of efficient procedures and cost-effective, computer-based security features and assurances. (5) Describes the roles and responsibilities of tbe individuals who constitute tbe IA security community and its system users, and outlines training and certification requirements. (6) Requires a life cycle management approach to implementing IA requirements. (7) Introduces the concepts of mission assurance category, levels of confidentiality, and levels of robustness of information. (8) Implements DODD 8500 1,DODI 8500 2, and Chairman of the .loint Chiefs of StaffManual(C.ICSM) 651001 to align IA goals and requirements to support the DOD Information Management Strategic Plan. (9) Mandatesprocedures to document the status ofaccreditationsfor all ISsfieldedby DOD organizations. Army chartered program managers (PMs), and HODA staff proponents. (10) Mandates that DODand Army-level designated approvingautborities(DAAs)meet tbe system accreditation requirements ofthis regulationbefore fielding or testing any system that requires connection to an Army network. (11) Requires the implementation of a configuration management (CM) process. (12) Describes the Continuity of Operations Plan (COOP). (13) Provides the foundation for the Networthiness Certification Program in AR 25 1. ^. Other policies, procedures, or directives also govern certain systems. In the event of confiicts among these policies,procedures,or directives,the more stringent requirement will take precedence. When the most stringent policy cannot be determined, the affected Army component will submit a request for a policy decision through their supporting regional chief information officers/functionalchief information officers (RCIOs/FCIOs) tothe Chief InformationOfficer/G^(CIO/G6) 1. Tbe mention of commercial products inthis regulation does not imply endorsement by either DOD or the Army. ^ Military and civilian personnel may be subject to administrative and/or judicial sanctions if they knowingly, willfully, or negligently compromise, damage, or place Army information systems at risk by not ensuring implementa tion of DOD and Army policies andprocedures. Violations are identified in bolded text included in the following paragraphs 3 3, 4-5, 4-6,4-12,4-13, 4-16,4-20, and 6^5. ^. These provisions may be punished as violations as follows: (1) Sanctions for civilian personnel may include,but are not limited to,some or all of tbe following administrative actions: oral or written warning or reprimand; adverse performance evaluation; suspension with or without pay; loss or suspension of access to IS or networks, and classified material and programs; any other administrative sanctions authorized by contract or agreement; and/or dismissal from employment. Sanctions for civilians may also include prosecutioninU.S.District Court or other courts and any sentences awarded pursuant to suchprosecution. Sanctions maybe awarded only bycivilianmanagers or military officials who have authority toimposethe specific sanction(s) proposed.

AR 2 5 - 2 ^ 2 4 October 2007

^anningB^000^^237^

(2) Sanctions for military personnel may include, but are not limited to, some of the following administrative actions:oral or written warning or reprimand; adverse performance evaluation; and loss or suspension of access to IS or networks and classified material and programs. Sanctions for military personnel may also include any administrative measures authorized by service directives and any administrative measures or non-judicial or judicial punishments authorized by the Uniform Code of Military .lustice (UCM.1). (3) Defense contractors are responsible for ensuring employees perform under the terms of the contract and applicable directives, laws, and regulations and must maintain employee discipline. Tbe contracting officer, or designee, is the liaison with tbedefensecontractorfordirectingorcontrollingcontractor performance. Outside the assertion of criminal jurisdiction for misconduct, the contractor is responsible for disciplining contractor personnel. Only thcDepartment of .lustice may prosecute misconduct under app1icableFedera11aws,absentaformaldeclaration of war by Congress (which would subject civilians accompanying the force to UCM,1 jurisdiction). For additional information on contractor personnel authorized to accompany U.S. Armed Forces, see DODI 3020.41.

0I^a^ter2 Responsibilities 2-1. Chief Information Officer^G^ TheCIO/C^will^ c ^ . Establish and issue IA policy and procedures and serve as tbe focal point for IA programs and funding. ^. Develop, review, and coordinate DA input into DOD IA policy documents. c ^ . Establish and maintain Army standardized evaluations and test methodology certification procedures and security requirements as part of tbe accreditation process. c ^ . Document, develop, coordinate, present, prioritize, and defend IA resource requirements in the planning, programming, and budgeting process. ^. CoordinatewiththeDeputyChiefofStaff,C2(DCS,G 2) for the policy,development, dissemination, support, tactics, techniques, and procedures for the design, implementation, and operation of the key management infrastructure (I^MI) and systems to support Army encryption requirements. ^ Provide program oversight for Army implementation of the l^MI and funding aspects of the Electronic l^ey Management System (El^S). ^. Prepare the annual IA readiness report. /i. ProvidetechnicalandoperationalassistanceandsupporttotbeU.S. Army Audit Agency (USAAA)inits audits and reviews of ISs. 1. Evaluate technological trends in IA and establish a methodology to integrate advancements. ^. Provide IA guidance to Army elements in identifying and incorporating requirements consistent with the I^MI requirements in project development. ^. Actas the certificationandaccreditation(Cc^A) designated approvingauthority(DAA)for1Ss with theexcep tions found in paragraph 5 8^. 7 Provideapointofcontact (POC) withtheDefenselnformation Systems Agency/Center forlnformation Systems Security (DISA/CISS) for advice and assistance and implementation of certification tests and programs for Army operated ISs. ^. Serve as the Army member of the Committee on National Security Systems (CNSS) and the Subcommittees for Telecommunications Security (STS) and Information Systems Security (SISS). ^. Provide an Army voting member to the I^ey Management Executive Committee (I^MEC) and .loint I^ey Management Infrastructure Working Group (.II^MIWG). c ^ . Provide policy, guidance,andoversightontheemploymentof National Institute of Standards andTechnoIogy (NIST) approved cryptography for the protection of unclassified and sensitive information. ^. Appoint the chairperson and altemate chairperson for theTierl System Management 8oard(TSM8),which has operations management responsibilities for the Tri-Service EI^MS Common Tier 1 System (CTIS). ^. ParticipatewitbtheDCS,C2;U.S. Army Intelligence and Security Command (INSCOM); NetworkEnterprise Technology Command/9th Signal Command(Anny) (NETCOM/9* SC (A); 1 ^ ^ Information Operations(LAND) Command (1^^ 10 CMD (LAND)); and the U.S. Army Criminal Investigation Command (CID) in analyses and studies concemingforeign intelligence threats,criminal intelligence,oroperationalvulnerabilitiesagainst which IA counter measures will be directed. 1 ^ . Appoint, formally,by nameandorganization theDAA forlSsthatprocess Army data,uponrequest, through formalsignedmemoordigitally signed e-mail. This appointment willbe consistent withparagraph5 8^ throughly. Ensure the concepts of, and strategies within, this regulation are utilized as the basis for networthiness certification per AR 25 1.

AR 2 5 - 2 ^ 2 4 October 2007

i^anningB^000^^23^

^. Provide technical and operational assistance and support to the Army Web Risk Assessment Cell (AWRAC). 1^. Provideprogramoversigbtof Communications Security Logistics Activity (CSLA) foran Army cryptographic applications certification process (when developed). ^. Appoint tbeDirector,Office of Information Assurance and Compliance (OIAc^C), NETCOM/9* SC (A),as the Army senior informationsecurity officer under the provisions of tbeFederal Information SystemsManagement Act (EISMA) 11^. Coordinate with the DCS, G 2 on Cc^A issues of sensitive compartmented information (SCI) systems and INSCOM/G^ for SIGINT systems, as applicable. ^. See additional responsibilities at paragraph 2 2, below.

2^2. Principal ^eadc^uarters, Oepartmentof the Army officials and staff


Principal HODA officials and staff will c ^ . Implement IA requirements within their respective functional areas. ^. Develop, coordinate, supervise, execute, and allocate the research, development, test, andevaluation(RDTc^E) procurement resources in support of IA program requirements as required in their functional area. c ^ . Participate collectively with other IA stakeholders in the enterprise planning, acquisition, and operation of IA strategies. c7. Integrate approved IA tools, doctrine, procedures, and techniques into all ISs under their purview. ^. Establish intemalproceduresfor reporting security incidents or violations and report incidents andevents tothe servicing regional computer emergency response teams (RCERTs) in accordance with Section VIII, Incident and Intrusion Reporting, consistent with paragraphs 4^21 and 4-22, below. ^ SupporttheArmy'sInformation Assurance Vulnerability Management (lAVM)Program notification and correction processes. lAVM notification and correction are DOD and Army operational requirements. Develop andimplementlocalacceptableuse policy (AUP)forallusers authorized accesstoH0DAISs(app8 presents a sample AUP). /i. Ensure all systems, for which the principal HODA Army office is the system owner (SO)are accredited, annually revalidated, and re-accredited in accordance with the interim DOD Information Assurance Certification and Accreditation Process (DIACAP). I. Ensure the Cc^A package is submitted to the Army certification authority (CA) in sufficient time forareview and operational IA risk recommendation in support of DAA authorization decision priorto operations or tests on a live network or with live Army data. ^'. Request appointment as the DAA for information systems, as appropriate, from the CIO/G6through the OIAc^C consistent with paragraph 5 8. ^. Appoint appropriate IA personnel per chapter3of this regulation and provide CIO/G6acopy of the appointment orders. /. Identify personnel and procedures at all organizational and subordinate levels, as required, to implement a Configuration Management 8oard (CM8) or Configuration Control 8oard(CC8) toeffect control and management mechanisms on all ISs, devices, configurations, and IA implementations. Include IA personnel as members of tbe board. ^. Incorporate related OPSEC, COMSEC, and INFOSEC policies and requirements into a comprehensive IA management program.

2-3. Administrative Assistant to the Secretary of the Army


TbeAASAwill^ c ^ . Serve as the commander for Pentagon Information Technology Services (ITS). ^. Request appointment, from the CIO/G6through tbe OIAc^C,as the DAA for tbe Pentagon ITS and IS connected to the Pentagon Common 1nformationTechnology(CIT)Enterprise, associated swing space, and altemate COOP sites through the national capital region (NCR). c ^ . Appoint, once authorized, Ceneral Officer (GO), SeniorExecutiveService(SES) or equivalent within AASA purview as DAAs,when they are the SOs or have life cycle responsibility for the IS,as appropriate.Provideacopy of the appointments to tbe OIAc^C through iacora(^us.army.mil. 1^, Coordinate connectivity requirements to the Department of Defense Intelligence Information System (DODIIS) IT SCI enterprise backbone within the Pentagon CIT enterprise. ^. See additional responsibilities at paragraph 2-2 and paragraph 2 8.

2-^. Assistant Secretary of the Army for Acguisition, Logistics, andTechnoIogy


TbeASA(ALT)will^ c ^ . Forward to National Security Agency (NSA) and HODA approved materiel requirements for IA tools and equipment (including cryptographic equipment), along with requests for RDTc^E efforts to fulfill those needs.

AR 2 5 - 2 ^ 2 4 October 2007

l^anningB^000^^23^

^. Designate an Army materiel developer to conduct and update threat analyses as outlinedby AR 381 11. c ^ . Monitor NSA, other Service COMSEC, and lARDTc^E projects that are of interest to the Army. Designate Army program managers as defined in AR 70^1 for each project having potential application for Army use. Require the designated manages to maintainaliaison between the developing agency and interested Army agencies of the progress of such projects. ^. Establish coordinationwithNSAconcurrent life cycle management milestones for development of cryptographic equipment in support of IA initiatives. ^. Conduct research and acquire basic knowledge of the techniques and the circuitry required to provide an effective CND capability in appropriate types of Army equipment. ^Ensure application of capabilities to perform IS risk analysis, reduction, and management ^. Ensure that Army program executive officers (PEOs) and direct reporting PMs include IA in all systems development activities. /i. Ensure ArmyPEOs and direct-reporting PMs obtain Cc^A approval to operate prior to system operations on the Army network or with Army data. 1. See additional responsibilities at paragraph 2 2.
2 5 . T h e O e p u t y Chief Of Staff, G-2

TheDCS,C2will^ c ^ . Coordinate the development and dissemination of DOD, national,theater, and DA-level lAthreatinformationto tbe Army. ^. Coordinate with the CIO/G^ for the policy, development, dissemination, support, tactics, techniques, and procedures for the design, implementation, and operation of the I^MI and systems to support Army encryption requirements. c ^ . Develop policy and approve procedures for safeguarding and controlling COMSEC and controlled cryptographic item (CCI) material. (7. Ensure all intelligence systems,for which tbe DCS,G-2is the Army proponent or sponsor, are accredited or reaccredited in accordance with Director, Central Intelligence Agency Directive (DCID) 6/3. ^. Ensure that the DODIIS Program is implemented and guidance is published. ^ Serve as tbe approval authority for external IS penetration and exploitation testing of operational networks. ^ Participate with tbe CI0/G 6, INSCOM, NETC0M/9thSC (A), I^^IO CMD (LAND), and CID in analyses and studies conceming foreign intelligence threats, criminal intelligence, or operational vulnerabilities against which IA countermeasures will be directed. /i. Act as tbe Service Certifying Organization and DAA for DODIIS processing SCI on the .loint World Wide Intelligence System (.IWWICS) i. Act as tbe CA for SCI systems processing information at Protection Level (PL) 4. ^'. Act as tbe DAA for SCI systems processing information up to PL 3. ^. See additional responsibilities at paragraph 2-2.
2 ^ . T h e O e p u t y Chief Of Staff, G-3^5^7

Tbe DCS, G-3/5/7 w i l l ^ c ^ . Support the CIO/G 6 in the accomplishment of IA responsibilities. ^. Ensure IA training is integrated and conducted throughout the Army. c : ^ . Support audits and reviews of ISs and networks through operational and technical assistance, as required, c ^ . Provide guidance, requirements, and oversight for information operations condition (INFOCON) alerting and implementation measures. ^. Provide guidance, requirements, and oversight for OPSEC measures to support an IA management policy. ^ See additional responsibilities at paragraph 2-2.
2 7 . T h e O e p u t y Chief Of Staff, G ^

TbeDCS,G^wiII^ c ^ . Develop, as tbe Army independent logistician, logisticspolicies (including integratedlogistics support policy), concepts, procedures, and guidance for logistics support of IA equipment used in support of all Army missions. ^. Prescribe execution ofNSA or DOD logistics management directives that apply to classified COMSEC and CCI materiel. c ^ . Prescribe and supervise tbe implementation of procedures for property control and the accounting of CCI materiel during distribution, storage, maintenance, use, and disposal. All guidance will conform to tbe security standards developed by the DCS, G 2 for safeguarding COMSEC and CCI materiel. c7. Supervise logistics support planning to ensure the availability of materials and publications needed for repair, test measurement, and diagnosis of IA equipment and systems.
AR 2 5 - 2 ^ 2 4 October 2007 5

^anningB^000^^240

^. Provide continuous logistical support for fielded IA material and test equipment. ^ See additional responsibilities at paragraph 2 2.
2 ^ . C o m m a n d e r s o f Army Commands^ Army Service Component Commands^Oirect Reporting Onits^O.S. Army Reserved Army National Guards program executive officers^ direct reporting program managers^ Regional Chief Information Officers^ Punctional Chief Information Officers^ and the Administrative Assistant to the Secretary of the Army

Commanders of ACOMs;ASCCs;DRUs;US. Army Reserve; ARNG; Chief,CAR;PEOs; direct reporting PMs; RCIOs/FCIOs; and the AASA are responsible for ensuring that their units, activities, or installations will d. Develop and implement an IA program with the hardware, software, tools, personnel, and infrastructure necessary to fill the IA positions and execute the duties and responsibilities outlined in this regulation. ^. Oversee tbe maintenance, documentation, and updating of the Cc^A requirements required for the operation of all ISs as directed in this regulation. c ^ . Implement and manage IT system configurations, including performing lAVM processes as directed by this regulation. c ^ . Appoint IA and other personnel (for example, altemates)to perform the duties in chapter3of this regulation and provideinformation assurance program manager (lAPM) and/or POCinformationtotheRCIOs, supporting RCERTs/ TheaterNetworkOperationsandSecurity Centers (TNOSCs), and the Army ComputerEmergency ResponseTeam (ACERT). The ACOMs/ASCCsIAPMs will also provide reports to tbe RCIO of the region in which the headquarters is physically located. ^. Appoint DAAs only as authorized in section II and paragraph 5 8. ^Establish an oversight mechanism to validate the consistent implementation of IA security policy across their areas of responsibility. ^. Ensure annual securityeducation,training, and awareness programs are developed and conducted that addresses, ataminimum, physical security,acceptab1e use policies, malicious content and logic,and non-standard threats such as social engineering. /i. Oversee the implementation of IA capabilities. 1, Incorporate IA and security as an element of the system life cycle process. ^'. Develop and implement an acceptable use policy for privately owned equipment (for example, cell phones, personal digital assistants (PDAs),wireless devices, and removable media) and ISs prohibited during training exercises, deployments, and tactical operations. Incorporate, as a minimum, the prohibition of utilizing such devices or the limitations of acceptable use, as well as the threat of operational exposure represented by these devices in garrison, pre deployment staging, tactical, and operational areas. ^. Develop procedures for immediate notification and recall of IA personnel as assigned. /. Adhere to and implement tbe procedures of the networthiness certification process per AR 25 1. ^. Program, execute, and report management decision packages (MDEPs)MS4X and MX5Tresource requirements. n. See additional responsibilities at paragraph 2 2.
2 - ^ . Commander, 1^^ Information Operations Command

The Commander, l^^IOCMD(LAND)will^ d. Exercise command and control of the ACERT and all of its components (including RCERTs). ^. Establish tactics,techniques, and procedures (TTPs) for the ACERT,RCERTs,and Local Computer Emergency Response Teams (LCERTs) (if established) as required. c ^ . Integrate, in conjunction with NETC0M/9tb SC (A), computer emergency response, IA, and CND service provider activities into network operations (NETOPS), network management, and information dissemination. ^. Integrate, in coordinationwiththeDCS,C3/5/7,CND,OPSEC, and INFOCONactivitiesintoinformation operations (10). ^. Support the Army CND service provider as the focal point for security incidents and violations. ^ Develop and publish incident response guidelines,checklists, andprocedures incoordination with lawenforcement (LE) and counterintelligence (CI) agencies. ^. Provide status reports per directives on unusual activities occurring on Army networks worldwide. /i. Support the IA security tool repository and provide recommendations for including new tools. 1. Provide tools, methodologies, procedures, and oversight for the vulnerability assessment program and perform vulnerability assessments through approved programs. ^. Develop and maintain an Army CND vulnerability database for trend analysis. ^. Support and maintain Army lAVM message staffing, notification, distribution, and resolution. /. Develop TTPs for a threat warning and notification process. ^. Develop procedures to issue CND lessons leamed identified from incidents, intrusions, analyses, or other technical processes.
8 AR 2 5 - 2 ^ 2 4 October 2007

i^anningB^0001^241

^. Maintain Army computer network situational intelligence awareness, including network threat analysis and Intemet network intelligence. (^ Participate with tbe C I 0 / G ^ , D C S , G 2 , INSCOM, NETC0M/9thSC (A), and CID in analyses and studies conceming foreign intelligence threats, criminal intelligence, oroperational vulnerabilitiesagainst which IA countermeasures will be directed. ^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.

2-10. Commanding General,Network EnterpriseTechnologyCommand^^^^ Signal Command ^Army^


TheCC,NETC0M/9tbSC(A)will^ c;i. Request appointment from the C I O / C ^ as the DAA for tbe Army enterprise. ^. Appoint, once authorized, the Director, Enterprise Systems Technology Activity (ESTA) as the DAA for the Army enterprise. c ^ . Operate, manage, monitor, administer, and defend the Army portion of the global information grid. c^. Perform configuration and patch management for all Army network components and systems. ^. Execute Computer Network Defense Service Provider (CNDSP) and NETOPS missions and functions. ^ Review,coordinate,evaluate,and approve proposedpolicies,procedures,directives,standards,doctrinal publica tions, plans, materiel requirement documents, life cycle management documents, basis-of-issue plans, and system certification and accreditation documents for all systems fielded, or planned to be fielded, to Army installations as well as similar documents that have implications for adherence to policy. ^. Establish TTPs to integrate 1A/CND service provider activities with system and network management and information dissemination. /i. Provide timely fiows of NETOPS data to maintain an analysis view at all levels. I. Ensure an operational assessment of IA products is conducted before incorporation into systems under NETCOM/ 9th SC (A) management. ^. Maintain a repository of the status and availability of Army critical systems and networks. ^. Manage the DiD security architecture environment, strategies, connections, and configurations against unauthorized access, manipulation, or destruction. /. ManagetheAEITechnica1CC8responsib1efor the Army security architecture. Establishbaseline configuration management guidelines and technical and operational TTPs; and review, approve, prioritize, and manage change to the AEL Conduct quarterly vulnerability assessments of toplevelarchitecture (TLA) criticalassets,devices,servers,and IA implementecl devices. n Participate with the C I O / C ^ , D C S , G 2 , INSCOM, 1^^ 10 CMD (LAND), and CID in analyses and studies conceming foreign intelligencethreats,criminal intelligence,or operational vulnerabilitiesagainst which IA countermeasures will be directed. C J . See additional responsibilities at paragraph 2-2 and paragraph 2 8.

2-11. Commanding General, LI S. Army Training and Ooctrine Command


TheCC.TRADOCwill^ c ^ . Integrate approved IAtools,doctrine,procedures,legalities, and tecbniquesinto applicable programs of instruction forTRADOC schools ^. Develop timely Armywide IA trainingliteratureandtrainingaids, leveragingsecureelectronicdistributionand remote access capabilities. c:. Develop, test, and recommend operational and organizational concepts and doctrine to achieve IA goals. c7. Develop and provide IA requirements to tbe materiel developers and ensure compliance with AR381-11and this regulation. ^. Conduct or participate in operational tests of IA implementations as part of system-wide operational tests, as directed. ^ Integrate IA practices into pre milestone A activities and events as required. ^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.

2-12. Commanding General, LI S. Army Materiel Command


The Commanding General, U.S. Army Materiel Command will ^. Provide Armywide materiel developer IA support for RDTi^E and production. ^. Assist IS functional proponents in identifyingsecurity requirements forproposedandexisting sustainingbase, tactical, and weapons systems. c ^ . Maintainarepository of tacticallA tools, and distribute tools tofieldedtacticalsystems,as needed. Coordinate with 1st IO CMD to integrate tactical and sustaining base toolboxes into a seamless repository for Army users.

AR 25-2^24 October 2007 i^anningB^000^^242

^. ProvideaDA authorized (that is,CSLA) cryptographic advisor to the certification authority (CA) throughout tbe DIACAP process. ^. See additional responsibilities at paragraph 2 2 and paragraph 2-8.
2-13. Commanding General, LI S. Army Intelligence and Security Command

The Commanding Ceneral, INSCOM will c ^ . Serve as the Army Service Cryptologic Element (SCE) andpoint of contact for ISs under thepurview ofthe NSA ^. Provided support to Army elementson IA mattersandadviseaccreditationauthoritieson theforeign intelligence threat. Coordinate the Cc^A for all cryptographic systems and conduct Ci^A for all Army cryptographic systems at PL2 (DCID 6/3) and below c 7 Participate with the C10/C6,DCS,C2,l^^IO CMD (LAND), NETC0M/9thSC (A), and CID in analyses and studies conceming foreign intelligence threats, criminal intelligence, oroperational vulnerabilities against which IA countermeasures will be directed. ^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2 - 1 ^ . Commanding General, LI S. Army Criminal Investigation Command

The Commanding Ceneral, CID will c ^ . Operate the Computer Crime Investigative Unit (CCIU).
^. Conduct criminal investigations involving intrusions into Army networks and computers.

c ^ . Provide criminal and technical intelligence analyses of vulnerabilities, methodology,tools,techniques, or practices obtained from computer crimes or forensic intrusion analyses to support CND, Cc^A, and program developers or managers. c ^ . Participate in 1AVA Compliance Verification Team (CVT) inspections. ^. Conduct crime prevention surveys to identify crime conducive conditions involving Army networks and systems. ^ Serve as cbiefenforcer of Federal lawsgovemingtheinvestigationofcriminaloffensesinvolving networks and systems, serve as the sole entity for LE investigation determinations, and serve as tbe sole Army interface with Federal and civilian LE agencies. ^Participate with tbe CIO/C-6,DCS,C2, INSCOM, NETC0M/9tbSC (A), and 1st 10 CMD (LAND) in analyses and studies conceming foreign intelligence threats, criminal intelligence, or operational vulnerabilities against which IA countermeasures will be directed. /i. See additional responsibilities at paragraph 2-2 and paragraph 2 8.
2-15. Chief, Army National Guard

The Chief, ARNG w i l l ^ Cl. Request appointment as the DAA for the ARNC and CuardNet XXI from the CIO/G^. ^. Appoint,onceauthorized, the ARNC stateDirector of InformationManagement(DOIM)/.16/CIOfor individual states in accordance with paragraph5 8.Ceneral officers within the ARNG are state employees not TitlelOorTitle 32 Soldiers,therefore,thestateDOIM/.l6/CIO will be appointed as DAAs. Provideacopy of these appointmentsto the CIO/C6tbroughtbeOIAi^C c ^ Set the ARNC lApriorities, provide oversight, andensure the coordination and complianceof the ARNC IA program isaccomp1ishedwiththeCC,NETCOMto1everage Army technicalauthority standards andensure compli ance with this regulation. ^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2 - 1 ^ . Chief, Army Reserve

TbeCARwill^ d. Request appointment as the DAA for tbe U.S. Army Reserve (USAR) from tbe CIO/G 6. /i. Appoint,onceauthorized, the Army Reserve Command(USARC)Chiefof Staff (COS)as the Army Reserve Network (ARNET)DAAwhen the COS meets the requirements of paragraph5 8.Provideacopy of this appointment totheCIO/C6tbrougbtbe01Ac^C c ^ . Set the USAR IA priorities, provide oversight, andensure thecoordination andcompliance of theUSAR IA program with the CC, NETCOM to leverage Army technical authority standards and ensure compliance with this regulation. c 7 . See additional responsibilities at paragraph 2 2 and paragraph 2-8.
2 - 1 ^ . LIS. Army ReserveCommand Chief of Staff

TbeUSARCCOSwill^

^ ^anningB^000^^243

AR 2 5 - 2 ^ 2 4 October 2007

c ^ . Request appointment as the ARNET DAA, as applicable, from the CAR. /i. Appoint, once authorized, tbe major subordinate command (MSC) Commander as DAA for command/unit/ activities non-ARNET system/network implementations when the MSC meets the requirements of paragraph 5 8. Provide a copy of this appointment to tbe CIO/G^ through the OIAi^C. c ^ . Ensureall ARcommands/units/activities,toinclude but notIimitedto,al1off installation Government and non Government satellites, facilities, and buildings, meet the requirements for connecting physically, logically, and/or virtually to the ARNET backbone. c ^ . Ensure MSC Commanders implement the AR IA program in accordance with CAR priorities and the CG, NETCOM via the applicable Army technical authority standards and ensure compliance with this regulation. ^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-18. LI S. Army Corps of Engineers Chief of Engineers

The USACE Chief of Engineers (COE) w i l l ^ d. Set IApriorities,provideoversight,andensure thecoordinationandcomplianceofthe lAprogram throughout USAGE ^. Ensure theUSACECIO implements theUSACEIAprogramin accordance withUSACE priorities and the CC, NETCOM via the applicable Army technical authority standards and ensure compliance with this regulation, c ^ . See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2 - 1 ^ . LI S. Army Corps of Engineers Chief Information Officer

TheUSACE Chief Information Officer (CIO) w i l l ^ c ^ . Request appointment as the DAA for the USACE Wide Area Network (WAN) and all corporate IS. ^. Appoint, onceauthorized, the USACE Division Commandersas DAA forUSACE IS asapplicable, when the DivisionCommandermeets tberequirementsofparagraph5 8. Provideacopy of thisappointmenttotheCIO/G^ throughtbeOIAc^C c ^ . See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-20. Commanding General, Eighth Army

The CC, Eighth Army will ^. Request appointment as the DAA for Eighth Army from tbe HODA CIO/C^. ^. Appoint, once authorized, the Eighth Army CIO/C 6 as the DAA when tbe Eighth Army CIO/C 6 meets the requirements of paragraph 5 8. Provide a copy of this appointment to the CIO/G^ through the OIAc^C. c ^ . EnsureMSCcommandersimplementtheEighthlAprograminaccordancewithEightb Army priorities andthe CC, NETCOM via the applicable Army technical authority standards and ensure compliance with this regulation. c7. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2 - 2 1 . Commanding General, LI S. Army Europe

TheCCUSAREURwill^ Cl. Request appointment as the DAA for Army Europe from tbe CIO/G^. ^. Appoint,onceauthorized,tbeDAAs for USAREUR backbone,tenant and MSC in accordance with the requirements of paragraph 5 8. Provide a copy of this appointment to the CIO/G^ through the OIAc^C. c ^ . Ensure tenant and MSC Commanders implement the USAREUR IA program in accordance witbUSAREUR priorities and the CG, NETCOM via the applicable Army technical authority standards and ensure compliance with this regulation. c7. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-22. CommandingGeneral, LIS. Army Medical Command

Tbe CG, MEDCOM w i l l ^ d. Request appointment as the DAA for MEDCOM from the CIO/C^. /i. Appoint.once authorized,theDAAforindividualRegional Medical Commands (RMC) Commander and MSCs in accordance with paragraph 5 8. Provide a copy ofthis appointment to the CIO/C 6 through the OlAc^C. c ^ . Ensure RMC and MSC Commanders implement tbe MEDCOM IA program in accordance with MEDCOM priorities and the CC, NETCOM via the applicable Army technical authority standards and ensure compliance with this regulation. c ^ . See additional responsibilities at paragraph 2-2 and paragraph 2 8.
2 23. P r o g r a m e x e c u t i v e o f f i c e r s a n d direct reporting program^pro^ect managers

Program executive officers (PEOs) and program/project managers (including PMs outside tbe PEO structure responsible for fielding systems to multiple Army organizations) will

AR 2 5 - 2 ^ 2 4 October 2007

l^anningB^000^^244

cn. Acquire, operate, and support systems within their command or activity per this regulation. ^. Embed IA engineering and capabilities in all system RDTc^E activities, c ^ . Appoint an lAPM to perform those duties listed in paragraph 3 2^. c7. Ensure that designatedpredeploymentinformationassurancesecurityofficers(IASOs)effectcontinuouscoordination with the organizational IA personnel for which the systems are demonstrated, tested, or fielded. ^ Request appointment as the DAA for named acquisition systems developed under their charter from the CIO/C^ through the OIAi^C ^ Provide the Cc^A package to the CAfor an operationallA risk recommendation supporting theDAA approvalto operate decision prior to operational use or testing on a live network or with live Army data. ^ Ensure that the SO makes the Cc^A package available to the ACOM/ASCC, RCIO lAPM, and NETCOM, 30 days before initial operational test and evaluation (lOTc^E) and before deployment of the system. /i. Integrate IA, COMSEC, and TEMPEST into entire system life cycle design, development, and deployment. 1. Address and include the addition of anylT/IApersonnel (such as system administrator (SA) or network security managersneededto operate theneworexpandedsystemor network) or accessrequirements and responsibilities for patch management and system administration as part of the development cost of stated system or network. ^. Integrate IA practices into pre-milestone A activities and events. ^. Perform acquisition and life cycle management of materiel in support of the IA strategy. /. ReporttoHODACIO/C 6the percentage of PEO/PM-programmedtundingallocatedtothe AIAP. Thereport will include current and planned IA investments. Bn. Accomplish all intelligence and threat support requirements outlined in AR 381 11 and this regulation. ^. Enforce IA standards and maintain/report an inventory of IS products, equipment, locations, and contact information. d. EnforceIAVMcompliancemeasures(forexample,notifications,patchmanagement)andincorporate them into life cycle management procedures. ^. Coordinate with CSLA to ensure cryptographic life cycle equipment management is a consideration during system design phase. ^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-24. Commanders, directors, and managers

Commanders, directors, and managers will Cl. 8e responsible for implementing the AIAP in their command or activity. /i. Acquire, operate, and maintain systems within their command or activity per this regulation. c ^ . Incorporate and define requestsfor new systems or changes to existing systems,including security requirements necessary for the system's conceptofoperation. Once validated,include these security requirementsintothe system design as defined in procurement contracts. Address the addition of IT/IA personnel (such as SAs or network security managers needed to operate the new or expanded system or network) as part of the development cost of stated system or network. c ^ . Include 10 and IA requirements in submissions of commander's critical information requirements (CCIR) or priority intelligence requirements (P1R). ^. Ensureuses of marketdriven/industry-developed (MDID), commercial-off-theshelf (COTS), orotber products are consistent with IA requirements and do not introduce an unacceptable risk. ^ Appoint appropriate IA personnel per chapter 3 of this regulation. ^. Ensure that designated pre deployment lASOs effect continuous coordination with the organizational IA persons nel for which the systems are demonstrated, tested, or fielded. /i. Ensure IA, COMSEC, and TEMPEST requirements are incorporated into life cycle planning. I. Ensureimplementationofthisregulationisaccomplisbedincompliance withall statutory andcontractual labor relations obligations. ^'. See additional responsibilities at paragraph 2-2 and paragraph 2 8.
2-25. Garrison commanders

Garrison commanders will Cl. Implement the installation level lAprogram in accordance with tbe installation commander priorities and the CC, NETCOM via the applicablecontinental United States(CONUS) RCIO Army technical authority standards and to ensure compliance with this regulation. ^. Obtain approval to operate the garrison information systems from the first general officer or SESin the chain of command that has obtained the appropriate DAA appointment from the CIO/C 6. c ^ . Ensure the installation D01M develops the installation Ci^A package, and obtains and maintains approval to operate the installation campus area network (1CAN) and any DOIM controlled or managed consolidated service locations (server farms).
^0 AR 2 5 - 2 ^ 2 4 October 2007

^anningB^000^^245

c 7 . Ensure all installation tenants, to include but not limited to, all off installation Govemment and non-Govemment sate11ites,facilities, and buildings, meet the requirementsfor connecting physically and/or virtually totheICAN(that is, the installation backbone). ^. Coordinate withthe supporting NETCOM/9tbSC (A) component, ACOM/ASCC,IMA,and tenant organizations for IA implementation and compliance. ^Acquire, operate, and maintain systems within their installation or activity per this regulation ^. Maintain the CM of the garrison network and ensure that the installation level CC8/CM8 provides oversight support to the installation commander. /i. Monitor andmanage the connection, access, and IA standards forstandalone andnetworked ISs down to the workstation level across all installation and tenant organizations. 1. Manage and oversee tbe operation of the installation infrastructure throughout the system life cycle. ^'. Provide technical and functional IA guidance and assistance in support of network management. ^. Review, before adoption, proposed changes that could affect the operation of the installation infrastructure's network security and operation (confidentiality, integrity, and availability). /. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-2^. LIS. Army Reserve ma^orsubordinate command

The USAR M S C w i l l ^ d. Request appointment as the non-ARNET system/network DAA, as applicable, from tbe USARC COS. ^. Implementacommand/unit/activitylevellAprogramin accordance withCARpriorities andensure compliance with this regulation. c ^ . Ensure the command/unit/activity C ^ develops command/unit/activity level certification and accreditation for all non ARNET system/network implementation. c 7 See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2 2 7 . A r m y National Guard State OOIM^J^^CIO

The ARNC State D0IM/^6/C10will-^ Cl. Request appointment as tbe ARNCState DAA, as applicable, from tbe Chief ARNG.Ceneral officers within the ARNC are state employees not Title lOorTitle 32 Soldiers, therefore,tbe state D01M/.16/CI0 will perform the state DAA duties once appointed. ^. Implement the ARNC lAprogram in thestate,as applicable, incoordination with the ARNC Chief to ensure compliance with this regulation. c ^ . Ensureall ARNCStatetenants,toincludebutnotlimited to, all ARNCstate government and nonCovemment sate11ites,facilities,andbui1dings,meettherequirementsforconnectingphysica11y and/or virtually tothe ARNGstate and ARNCbackbone (that is,CuardNet XXI). c ^ . See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-28. Regional Chief Information Officer

The RCIO, as CC, NETCOM representative will d. 8e responsible for ensuring tbe technical authority enterprise standards are refiected in the installation IA priorities and implemented through coordination with the appropriate IC, garrison commander and DOIM. ^. See additional responsibilities at paragraph 2 2, paragraph 2 8, and paragraph 3 2.
2-2^. Army Reserve command^unit^activity G - ^

The USAR command/unit/activity C-6 will c ^ . Implement an lAprogram as directed by the USAR MSC Commander that refiects the CAR priorities and ensure compliance with this regulation. ^. Ensure USAR standards for connections to the ARNET are met. c ^ . Develop nonARNETsystem/networkimplementations certification and accreditation,provide to the CAfor an operational IA risk recommendation supporting the DAA approval to operate decision prior to operational use onalive network or with live Army data. c 7 . See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-30. director of Information Management

TheDOIMswill^ 1^. Implement an lAprogram as directed by the garrison commander that refiects the ICpriorities and with the CC, NETCOM via the applicable Army technical authority standards and is compliant with this regulation. ^. Ensure Army standards for connection to the ICAN are met.

AR 2 5 - 2 ^ 2 4 October 2007

11

i^anningB^0001^24^

c ^ . Developtbeinstallationcertificationandaccreditationpackage,andprovidetothe Army C A f o r anoperational IA risk recommendation in support of a DAA approval to operate decision. ci^. Obtain and maintain approval to operate for the installation ICAN and any DOIM controlled or managed consolidated service locations (server farms) from the appropriate DAA. ^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.

Ol^a^ter^ Arn^y Information Assi^ran^e ^ro^ram personnel Structure 3-1. Personnel structure overview
Commanders will establish an IA personnel structure to implement the AIAP. These personnel will be the focal points for IA matters within theircommands or activities and will have the authority to enforce, with DAA concurrence, security policies and safeguards for their systems or networks. This authority includes recommending to the DAA suspension ofsystem operations based on an identified security deficiency,poor security practice, or unacceptable risk. PositionthelA staff inthe organizationto ensure operations donot negate system security,except as directed by the DAA. Tbe IA staff will be involved in tbe acquisitioning and contracting for ISs or IS services.

3-2. Information assurance personnel structure


Commanders will position IA personnel organizationally to provide a balance between security and operational missions. Tbe following is tbe AIAP personnel structure and activities to be performed. ci.7^C7(^.NETCOM/9thSC (A) RCIOs have the authority and responsibility t o ^ (1) Translate strategic plans and tecbnicalguidance provided into objectives, strategies,and architecturalguidance. (2) Exercise staff supervision and technical control for all ITorganizations within their region and execute responsi bilities for baseline services (communication and system support, visual information, documents management, IA, INFOCON, automation), either operationally or programmatically, as well as oversight of NETOPS. (3) Provide all personnel operating on Army installations the IT baseline services in a manner consistent with policies and regulations. (4) Provide administrative, financial, and managerial IT support to any Army installation located within their geographic region. (5) Coordinate the management of outsourced IT services. (6) Definethebaselineandobjectives,andestablishspecificservicelevelsdetailingcontractua1arrangementsand satisfactory contractor performance. (7) Lead enterprise level initiatives that assure users' training requirements are considered and integrated into processes for developing, implementing, and maintaining capabilities and systems. (8) Act as tbe focal point for command, control, communications, and computers for information management (C41M) leadership and coordination of IT activities within tbe region. (9) Execute the duties assigned under theNETC0M/9tbSC (A) CONOPSfor Service Level Agreements,Configuration Management, and Networthiness Certification Program. (10) Ensure all ISs, networks, and devices are scanned quarterly as a minimum, including, but not limited to, scanning for vulnerabilities, poor security practices, noncompliance, backdoor connections, unauthorized modems, malicious logic, and unauthorized network connections; take actions to report all violations. (11) Ensure implementation of AIAP policy and procedures within their region. (12) Oversee tbe assignment of regional IA personnel and appoint a regional lAPM. (13) Provide supported commands,organizations,and agencies with POCinformation,especiallyifgeographica11y disbursed across several regions. ^. 7^7^.i^.The1APM will be accountable for establishing, managing, and assessing the effectiveness of all aspects of the IA program within a region, command, or functional activity. A contractor will not fill tbe 1APM position. (Temporary assignment ofcontractorpersonnelforaspecifiedtime, as an exception, is authorizeduntil the position canbe properly filled.)TheIAPMmustbeaU.S.citizenandholdaU.S. Govemment security clearance and access approval commensurate with the level of responsibility.Designate this position as information technologyl(ITI).The 1APM must be IA trained and certified, and maintain the certification. Tbe lAPM will (1) Develop, manage, and maintainaformallA security programtbat includes defining thelApersonnelstructure andensuring theappointmentofan information assurance network manager (IANM),informationassurancenetwork officer (lANO), information assurance manager (lAM), and an 1AS0 at subordinate levels. (2) Enforce Army and regional IA policy, developing command unique procedures as needed. (3) Ensure that lApersonnelimplement vulnerability remediation bulletins and advisories that affect tbe security of tbeirISs

12

AR 2 5 - 2 ^ 2 4 October 2007

^anningB^000^^24/^

(4) Ensuretbatall lApersonnelreceivetbenecessary technical(forexampIe,operatingsystem,network,security management, and system administration) and security training to carry out their duties and maintain certifications. (5) Serve as tbe primary point of contact for lA-related actions. This includes lAVM reporting, compliance, vulnerability assessments, and feedback to Army staff on current and upcoming IA policies. (6) As applicable,Regionaland Command lAPMswillprovide their supporting RCERTorTNOSCwithguidance and priorities regarding lA/CND support to their regions, command, and subordinates. (7) Manage the DIACAP program to ensure compliance with requirements. (8) Ensure the development of system Ci^Adocumentation by reviewingandendorsingsuchdocumentation and recommending action to the DAA. (9) Enforce tbe use of Army approved procedures for clearing, purging, reusing, and releasing system memory, media, output, and devices. (10) Ensure DAAs maintain a repository for all systems' Cc^A documentation and modifications. (11) Ensurethat security violations andincidents are reported to the servicingRCERTin accordance withSection VIIL Incident and Intrusion Reporting. (12) Ensure that RCERTdirected protective and corrective measures are implemented for vulnerabilities or incidents remediation. (13) Identify dataownership(includingaccountability, access, andspecial bandlingrequirements) foreachlS or network within their authority. (14) Conduct announced and unannounced IA assessments. (15) Regional lAPMs will maintain liaison with appropriate Army theater and DOD activities, at a minimum including C10/C^, RCIO, DISA, NSA, the Defenselntelligence Agency (DIA), HODA, 1st 10 CMD, ACERT, supporting RCERT/TNOSCCID, and INSCOM elements (16) Program, manage, execute, and report MDEPs MS4X and MX5T resource requirements. (17) Administer an IA management control evaluation programseparate from, or in support of, Force Protection Assessment Teams (FPATs). (18) Serve as a member of the configuration board where one exists. (19) IncoordinationwiththeDCS,C 3, DCS, C 2, and CIO/C 6, provide technical and non-technical information to support a commander's INFOCON program. (20) Ensure that program controls are in place to confirm user access requirements. (21) The ACOM/ASCC/functional lAPMs will ensure that any ACOM/ASCC sponsored or developed unique systems are fully accredited and certified prior to connection to the network.Ensure that any proposed distribution will meet Networthiness certification and tbe NETC0M/9th SC (A) connection approval process, and fulfill all requirements as a standard PM-developed fielding prior to distribution. c ^ . T^^^ic^i^di/7^/^^.The1ANM(if appointed) may serve as tbe altemate lAPM.Acontractor will not fill tbe lANM position.(Temporary assignment of contractor personnel foraspecified period, as an exception, is authorized, until the position can be properly filled.)Tbe1ANM must beaU.S.citizen and holdaU.S.Government security clearance and access approval commensurate with the level of responsibility. This position will be designated IT I . The lANM must be IA certified and maintain his or her certification. The 1ANM, under the purview of the 1APM, will (1) Provide direct support to the 1APM on matters of CND and the regional/command IA program. (2) Develop and oversee operational (technical) IA implementation policy and guidelines. (3) Advise the 1APM or DAA on the use of specific network security mechanisms. (4) Evaluate threats and vulnerabilities to ascertain tbe need for additional safeguards. (5) Assess changes in the network, its operational and support environments, and operational needs that could affect its accreditation. (6) Ensure procurement actions, installations, and modifications to existing infrastructure comply with Armyapproved IA architectural guidance. (7) Develop and staff IA technical policy and procedures for all networks. (8) Ensure that all networks on tbe installation or activity for which they are responsible, including tenant networks accessing the host installation's infrastructure, are planned, installed, managed, accredited, maintained, and operated per tbe security requirements of this regulation and the standards required for connectivity and classification of the network concemed. (9) Develop and issuenetwork security policy, guidance, and countermeasure implementation instructions to assigned and tenant activities. (10) Oversee periodic use of authorized scanning and assessment tools. (11) Assist tbe 1APM in monitoring and enforcing the lAVM and INFOCON processes. (12) Serve as a member of tbe CM8 where one exists. c7. 7^^. AppointlAMs at allappropriatelevelsofcommand.Thisincludes subordinate commands,posts, installations, and tactical units. Appoint an 1AM as needed for those Army activities responsible for project development, deployment,and management of command-acquired software,operating systems, and networks. Acontractorwillnot
AR 2 5 - 2 ^ 2 4 October 2007 13

i^anningB^000^^24^

fill tbeMSC,instal1ation,or post lAMpositions and the person filling tbe position will beaU.S.citizen.Commands, activities, or organizations with multiplelAMs will appointaseniorlAM for their command, activity, or organization. In installations withmu1tipleIAMs,tbeInsta11ationIAM istbeSeniorlAM. All lAMswillholdaU.S.Government security clearance and access approval commensurate with the level of information processed by the system. This positionwillbedesignatedIT I , IT II, or IT-III. The lAM must be IA trained and certified, and must maintain his or her certification. Tbe 1AM will (1) Develop and enforce a formal IA security and training program. (2) Enforce 1AVM dissemination, reporting, compliance, and verification procedures as described in CICSM 6510 01 (3) Report security violations and incidents to the servicing RCERT in accordance with SectionVIII,Incident and Intrusion Reporting. (4) Conduct security inspections, assessments, tests, and reviews. (5) Manage lASOs, as required, toestablisb thescope of responsibilities and tbe technical andsecurity training requirements. (6) Conduct semi-annual reviews of all ISs and networks to ensure no security changes have been made to invalidate tbe Cc^A. (7) Negotiate Cc^A issues w i t b t b e D A A , o r bis or her designated representative,for incoming systems and make recommendations to the commander on additional protection mechanisms necessary prior to operation of the incoming ISs (8) Maintain training and certification records for IA personnel and user IA awareness training records. (9) Ensure the use of Army approved procedures for clearing, purging, reusing, and releasing system memory, media, output, and devices. (10) Review all lACc^A support documentation packages and system fielding, operations, or upgrades requirements to ensure accuracy and completeness, and that they meet minimal risk acceptance standards. (11) Maintainarepository for all systems Cc^A documentation and modifications,version control,and management of GOTS, COTS, and non-developmental items (NDIs) for his or her organization or site. (12) Identify data ownership (includingaccountability, access, and special handling requirements) foreach IS or network within their authority. (13) Verify that all ISs withintbe scope of responsibility are properly certified and accreditedin accordance with DIACAP and CMpolicies and practices before operating or authorizing the use of hardware and software on an IS or network. (14) Serve as a member of an applicable CC8, where one exists. (15) Ensure that IA personnel are maintaining and auditing access and log data. (16) Assist the lAPM to identity and validate IA resource requirements. (17) Provide input to the lAPM for management controls. (18) Tbe Installation l A M will provide policy and guidance to all lAMs on an installation. (19) Tenant lAMs will assist and support Installation lAMs. (20) Installation lAMswillprovide reports to the RC10IAPM ^. 7^/^.i^ci^7B^/^^. Thegarrisoncommander or manager of theinstallationor activity responsibleforthenetwork willappointan lANM for eacbinstallation or group of networks at allappropriatelevelsofcommandbelowACOM and DA staff and field operating agencies, including subordinate commands, posts, installations, and tactical units. AppointlANOstoassistlANMsasrequired.lANMandlANOpositionswillbedesignatedIT l o r l T I f Acontractor w i l l n o t f i l l thelnstallationlANMposition.ThelANMmustbeaU.S. citizenand holdaU.S.Government security clearance and access approvalcommensuratewiththelevelof responsibility. Each lANM and lANO must b e l A and vulnerability assessmenttechnician(VAT) certified and must maintainhis or her certification.TbelANM andlANO, in addition to providing direct support to the lAM, will (1) Implement tbe IA program to ensure the AEI is operational and secure. (2) Comply with and implement policy received from the appropriate network security manager or the l A M . (3) Conduct reviews of the network architecture for vulnerabilities. (4) Ensure measures and procedures used at network nodes support the security integrity of the network and comply with applicable directives. (5) Develop, issue, and implement security procedures and protocols goveming network operations per this regulation. (6) Prepare, disseminate, and maintain plans, instmctions, and standing operating procedures (SOPs) conceming network security. (7) Conduct reviews of network threats and vulnerabilities per this regulation and the lAVM process. (8) Reportsecurity violations andincidents tothe servicingRCERTin accordance with Section VIII, Incident and Intrusion Reporting. (9) Review and evaluate the effects on security of changes to the network, including interfaces with other networks. f4 AR 2 5 - 2 ^ 2 4 October 2007

i^anningB^0001^24^

(10) Perform required monitoring of network resources per this regulation. (11) Ensure tbe use of Army approved IA products from the IA Approved Products List. (12) Implement IA and 1AVM reporting and compliance procedures as set out in dCSM 6510.01. (13) Analyze and maintain network audit data. (14) Ensure adequate network connectivity by making proper decisions conceming levels of confidentiality and robustness for the system. ^ 7^,^C^.The commander or manager/director of the activity responsible for the ISs will appoint an lASO for each IS or group of ISs. The same 1ASO may be appointed for multiple ISs. The lASO position will be designated IT I, IT-II, orIT III.Acontractor may not fill MSC,installation, or post 1AS0 positions at IT I , i f created.Tbe 1AS0 must be IA certified and maintain bis or her certification. Appoint pre-deployment or operational lASOs for developmental systems with the applicable responsibilities. DOD uses the term lAO for 1AS0 responsibilities. All lASOs will (1) Enforce IA policy, guidance, and training requirements per this regulation and identified 88Ps. (2) Ensure implementation of lAVM dissemination, reporting, and compliance procedures. (3) Ensure all users meet the requisite favorable security investigations,clearances, authorization,need-to-know,and security responsibilities before granting access to the IS. (4) Ensure users receive initial and annual IA awareness training. (5) Ensure logfilesandauditsaremaintainedandreviewedforall systemsandthat authentication(forexample, password) policies are audited for compliance. (6) Prepare, distribute, and maintain plans, instructions, and SOPs conceming system security. (7) Review and evaluate the effects on security of system changes, including interfaces with other ISs and document all changes. (8) Ensure that all ISs within their area of responsibility are certified, accredited and reaccredited. (9) Maintain and document CM for IS software (including IS warning banners) and hardware. (10) Predeployment oroperational lASOs will ensuresystemrecovery processes aremonitoredand that security features and procedures are properly restored. (11) Pre-deployment or operational lASOs will maintain current software licenses and ensure security related documentation is current anci accessible to properly authorized individuals. (12) Tenant lASOs will support and assist tenant lAMs (or the installation lAM if no tenant lAM exists). (13) Reportsecurity violations and incidents to tbe servicing RCERT in accordance with SectionVIII,Incident and Intrusion Reporting. 3-3. Information assurancesupport personnel In addition to the above described IA structure, other personnel have crucial responsibilities. ^ ^ ^^ri^c^i^^ cic^iiiiiii'.^^i^ci^cj^.^. System administrators (SAs) and network administrators (NAs) must be c ^ . ^.^/^i^ c designated1T-1,1T II, or IT III (see para 414). Each SA/NA must be trained, experienced, IA certified, and currently certified on the ISs that they are required to maintain. The SA/NA shouldbe a U.S. citizen and must hold aU.S. Govemment security clearance and local access approvals commensurate with the level of information processed on the system or network. SA/NA responsibilities include, but are not limited to, implementing the AIAP within their command, installation, or activity. SA/NAs will be designed on appointment orders and will (1) Enforce thelS security guidance policies as provided by thelAM and perform lASO duties if an lASO has not been appointed. (2) Enforce system access, operation, maintenance, and disposition requirements. (3) Ensure tbatpersonnel meet requiredsecurity investigation, clearance, authorization, mission requirement, and supervisory approval before granting access to the IS. (4) Reportsecurity violations andincidentstothe servicingRCERTin accordance with Section VIII,Incident and Intrusion Reporting. (5) ConductrequiredlAVMscanningandvulnerabilityassessments with approved software as authorized by their 1AM/1AS0. SAs/NAs are not limited to only lAVM scanning, but should be conducting comprehensive network assessments of their networks as authorized. (6) Ensure CM includes all pertinent patches and fixes by routinely reviewing vendor sites, bulletins, and notifications and proactively updating systems withfixes,patches,definitions,and service packs with lAMorlAPM approval. (7) Ensure any system changes resulting from updating or patching are reported to the 1AM/IAS0. (8) Record 1AVM compliance in the Asset and Vulnerability Tracking Resource (Ac^VTR) database. (9) Maintain current anti-virus (AV) engines and definitions on all ISs. (10) Reviewand verify currency of user accounts,accesses,andlogins. Remove departing users' accountsbefore departure. Terminate inactive accounts verified as no longer required that exceed 45 days. (11) Suspend user accounts for the following types of actions: actions that knowingly threaten, damage, or harm the IS, network or communications security; revocation, suspension, or denial of security clearance or interim security clearance investigations; or unauthorized use of IS and networks per para 45.s.
AR 2 5 - 2 ^ 2 4 October 2007 15

^anningB^000^^250

(12) Remove or disable all default, guest, and service accounts in ISs or network devices, and rename administrative accounts as applicable. (13) l^aintain and use at Ieast2separate accounts for access to network resources,Ifor their privileged level access and a separate general user, non privileged level account for routine procedures (14) ReviewIS and network audit logs and log files,and report anomalous or suspicious information in accordance with Section V111, Incident and Intrusion Reporting. (15) Monitor IS performance to ensure that recovery processes, security features, and procedures are properly restored after an IS has been rebooted. (16) Monitor IS performance to ensure that processes, security features, and operating system configurations are unaltered. (17) Perform equipment custodian duties as necessary. (18) Notify the lAM or 1APM when a system no longer processes sensitive or classified information, or when changes occur that might affect Cc^A, to obtain disposition or resolution instructions. (19) Ensure CM for security-relevant IS software (includinglSwamingbanners)andhardwareismaintained and documented. (20) Implement and test IS and data backup procedures for integrity. (21) Prohibit attempts to strain or test security mechanisms orto perform networkline or keystroke monitoring without authorization. (22) Establish audit trails, conduct reviews, and create archives as directed by the lAM. (23) Will signaPrivileged-level Access Agreement (PAA)andaNonDisclosure Agreement (NDA) asaprerequisite to maintaining their positions. Reference the IA 88P on PAA; AUP (https://informationassurance.us.army.mil). ^. T ^ d ^ c ^ di^n^i^,^. Data owners will, at a minimum, provide guidance or feedback to the System Owner (SO) conceming (1) The confidentiality of information under the data owner's purview. (2) Tbe DIACAP team'sdecision regarding the level of classification,confidentiality,integrity,availability, encryption, and protection requirements for the data at rest or in transit. (3) Specific requirements for managing tbe owner'sdata(for example, incident response, information contamination to other system/media, and unique audit requirements). (4) Whether FNs may accessISs accredited under this regulation. Accessmustbe consistent with DOD,DA,and DIA goveming directives (for example, AR 380 10 and DCIDs 1/7 and 5/6). c ^ . ^^^^^cn^ii.^^!^.^. Use of Govemment ISandaccessto Govemment networksisarevocableprivilege,notaright. Usersare thefoundationofthe DiD strategy and their actionsaffectthemostvulnerableportion ofthe AEI. Users must haveafavorable background investigation or boldasecurity clearance and access approvals commensurate with the level of information processed or available on tbe system. Users will (1) Comply witb tbe command s AUP for Government owned ISs and sign an AUP prior to or upon account activation (2) Complete initial and/or annual IA training as defined in the IA training 88P (https://informationassurance.us.army.mil). (3) Markandsafeguardfiles,outputproducts,and storage mediaper the classificationlevelanddisseminatethem only to individuals authorized to receive them with a valid need to know. (4) Protect ISs and IS peripherals located in theirrespective areas in accordance withphysical security anddata protection requirements. (5) Practice safenetwork and Intemet operating principlesand take no actions that threaten the integrity of the system or network.
(6) O b t a i n p r i o r approval for tbe use of any media (for e x a m p l e , U S 8 , C f ^ l ^ 0 1 ^ , f l o p p y disk) f r o m tbe SA/ lAl^ (7) Scan all files, attacbments, and media witb an approved and i n s t a l l e d A V p r o d u c t before o p e n i n g a f i l e or attachment or introducing media into tbe fS

(8) Report allknownor suspected spam,cbain1etters,and violations ofacceptableuse tothe SA,IAM,or1ASO. (9) Immediately stop using an infected IS; and report suspicious, erratic, or anomalous IS operations, and missing or added files, services, or programs to the SA/1ASO in accordance with local policy.
(10) Not disclose tbeir individual account passv^ord or pass phrase autbenticators (11) Invoke passv^ord-proteeted screen locks o n y o u r v ^ o r k s t a t i o n after not more than l ^ m i n u t e s o f n o n use or inactivity (12) Logoff ISs at tbe end of each workday (13) Access only tbat data, control information, softv^are, hardware, and f i r m w a r e for wbicb tbe user is authorized access

(14) Access only that data that they are authorized or have a need to know.

1^

AR 2 5 - 2 ^ 2 4 October 2007

^anningB^0001^251

(15) Assume only authorized roles and privileges as assigned (16) Users authorized CovemmentprovidedIAproducts(forexample,AVor personal firewalls) will be encouraged toinstalland updatethese products ontheirpersonalsystems and may be required to do so as directed by theDAA and documented in the Ci^A package for any approved remote access. c7. CC^/^^Cc:i^,^rcic^i'c^^,^c^iic^i^.^^^c^/i^^^^r',^ci^^^/. Execute responsibilities as requiredperthisregulationand AR 380^0 ^. T'^^^^^T^^^^.^u^^^/. Execute responsibilities as required in AR 381 14. ^ 7ii^^//i^^iic:^^^i^,^c^^^^/. Senior intelligenceofficers (SIOs) orcommand intel1igenceofficers(DCSINT/G2s/S2s) will^ (1) Ensure the command statement of intelligence interest (SII) (AR381-10andAR 381 20) registers requirements forthe receipt of validated intelligence adversely affecting the integrity and reliability of ISs. (2) Provide assistance inthe identification of threat factors affecting the risk management approach for implementing security safeguards. ^. T^di^c:^ ^^c^/^c^/icjn ci^c:^^!^,^. Execute responsibilities as required by AR 525 13. /i. 7ii/^i^^ci^ic^^ cj^^i^d^ic^i^.^ ci^^c^^i^.^. Execute responsibilities as required by FM 3 13. 1. C^7^,^i5'Cc:i,^c::^i^,^.Tbe primary OPSECvulnerability is information made publicly accessible throughWeb sites and Web-enabled applications.Commanders andDirectorswilldevelopandimplementanOPSECreviewplanaspartof tbeir inspection programs. All content placed on a Web site will be reviewed for OPSEC sensitive information. Additionally, execute responsibilities as required per AR 530^1. ^'. T^i^^^ic^ ci,^!!^.^ c^c^^i^.^ (T^^C^.^^. Execute IA responsibilities as required per this and AR 25-1. ^. Bfc^i^i^i.^i^ici^c:i,^c:^i^.^. IncludelArequirementsintbeacquisitionphases and execute responsibilities as required by DOD 50002 RandNSTISSPNo 11 /. 7^C^7^. Execute responsibilities per this regulation and AR 25-1.
Bn. 7^^^,^ (^^^ ^ciB'ci . ^ - 1 ^ .

(1) T h e D A A w i l l ^ (dl) 8e a U.S. citizen. (7i^ HoldaU.S. Govemment security clearance and access approvals commensurate withthelevelof information processed by the system under his or her jurisdiction. (c^^ 8e an employee of the U.S. Govemment and meet the grade requirements identified in paragraph 5 8. (c^ Complete tbe DAA 8asics Computer 8ased Training prior to performing the duties of DAA. (^^ Request appointment from the CIO/C 6 for IS by name. (^ Ensure tbcDAApositionis designated as an IT Lbased on the duties assigned and the expected effects ontbe Army mission. (^ Meet training and certification requirements in accordance with NSTISS1 No. 4012. (7i^ Tbe DAA will understand the operational need for the systems and the operational consequences of not operating the systems.TheDAAwill have an in-depth knowledge ofDiD to drive stateof-theart acquisition,focusa robust training program, and institute executable policy across the IA enterprise. (2) The DAA will ensure the following as a minimum (i^^ ProperCc^Abasedonsystemsenvironment,missionassurancecategory(MAC)leve1,confidentiality level,and security safeguards in accordance with this regulation and the Interim DIACAP. (^^ Issue written memo ordigitally signedemail IA Cc^A authorization statements(that is, interimapproval to operate (lATO), interimauthorization totest(IATT), approval tooperate(ATO),denial of authorization tooperate (DATO)), after receipt of CA recommendation. (c^^ Maintain records (including use of IA tools) for all IS Cc^A activities under bis or her purview. (ci^ Accomplish roles and responsibilities as outlined in this regulation during each phase ofthe accreditation process and for each IS as required. (^^ Ensure operational IS security policies are in place for each system, project, program, and organization or site for which the DAA has approval authority. (^ Incorporate security, Cc^A, and Networthiness as an element of tbe life cycle process. (^ Ensure data owner requirements are met before granting any FN access to the system. (Tl) Consider and acknowledge CI and criminal intelligence activities during the Cc^A process. (^i) Report security-relatedeventstoaffectedparties (forexample,dataowners,all involvedDAAs). DAAs must coordinate with investigative activities (for example, CCIU, RCERT) before making notifications. (^^ Assign written security responsibilities to the individuals reporting directly to the DAA (for example, lAM or an lASO if an 1AM does not exist) (^ Appoint a CA for each IS (or group of ISs) and network (1^ Ensure CSLA certification of cryptographic applications occurs during tbe Ci^A process. Bl. C^. Authority and responsibility for certification is vested in the ArmyFISMA Senior lAOfficer(SIAO).Tbe

AR 2 5 - 2 ^ 2 4 October 2007

17

^anningB^000^^252

Director 0IAc^C,NETC EST-1, was appointed F1SMASIA0 by the CIO/G^ and will be tbe single Army certifica tion authority (see para 5 2). c ^ . Bf^^ii/ci^^/i^c:^^r^^i^c::i^^iciiic^i^^/icii^ir^(^CBf^. (Seealsopara5 9).The Army CA will maintainalistofqualified Govemmentorganizationsand1abs,as Agents of the CA(ACA),toperformthe certification activities. Tbe ACAs, funded by the SOs, are available to provide SOs with certification capabilities. Organizations can request appointment as an ACA by following the process in the ACA 88P. ^. ,^C^. AGovemmentSOwillbeidentifiedforeachlSusedby or in supportof the Army.Tbe SOisresponsible for ensuring the security of the IS as long as it remains in Army inventory, or until transferred (temporarily or permanently) to another Govemment person or organization and such transfer is appropriately documented, and provided as an artifact to the accreditation package (see para 5 10). ^. 77c^,^^ciiBic7/^Bic^ii^i^^.^^ciBi.^i^i/i/i^.^. Army tenant units or activitiesmustcomplywiththelArequirements of their parent ACOM/ASCCandtheirsupportinginstallation. Army andnon-Armytenantoperationsmustcomply with the host installation's IA policy if they connect to the installation's information infrastructure. Army tenant units or activitiesandunitsbased inorunderoperational control (OPCON)ofan ACOM/ASCCotherthan their parent will comply with the IA requirements ofboth parent and host commands. Address unresolved confiicts of IA policy per this regulationthroughlocalcommand channels and RC10stoHODA,CIO/G^. UntilCIO/G 6resolvestheconfiict,the provisions of thisregulation will apply.including those pertaining totheuseofgateways or informationmanagement resources as pathways to connect their ISs.If the nonArmy tenant uses any part of the host installationinfrastructure, the installation lAMwill require the use of CMcontrols consistent with the installation'sinformation management and CM process. All tenant activities will (1) Identify and coordinate a11systemupgrades,fie1dings,pi1ots,tests,and operations of newor upgraded systems withtheinsta11ation1AM,DAA,andD01M (2) Identify ISs and provide the approved Cc^A documentation to the installation 1AM. (3) Identify their security support requirements to tbe installation 1AM and provide technical assistance, as required. (4) Identify appropriate IA personnel to tbe installation lAM. (5) Support installation IA efforts and requirements, and identify constraints in sufficient time to permit coordination and preparation of a viable IS security solution. (6) Coordinate and conduct vulnerability assessments or compliance scanning, and report completion and results as required.

^I^a^ter^ Information Assurance ^oli^y Section I General Policy ^ 1 . Policy overview Thiscbapterprovidespolicy to implement IA requirementsdeveloped torespondto tbe 1Acha11enge,as defined in Public Law, National Security, DOD, and Army directives, policies, and regulations. c ^ Implement all security analyses, security engineering, and security countermeasures to protect ISs within the framework of risk management and adherence to public laws, DOD directives, and Army regulations. ^. DefineasecuritypolicyandaprotectionprofileforlSsduringconceptdevelopment.Consider security requirements based on these items throughout tbe IS life cycle. c : ^ . ThelS developer willensurethe early and continuousinvolvement of thefunctiona1proponent,threatandrisk assessors,users,1Apersonne1,data owners,certification authorities, and DAAsindefiningandimplementing security requirements of the IS. c ^ . Statements of security requirements will be included in the acquisition and procurement specifications and contracts for ISs, products, and services. Purchases will be in accordance with Army contracting and acquisition guidelines, 81anket Purchase Agreements (8PAs), and lA-approved products. NIST Special Publication 800^64 REV I may be referenced for specification, tasks, and clauses that are used in writing contracts. The statements will refiect an initial risk assessment and will specify the required protection level per DODD 8500.1 and DODI 8500.2. ^. The ACOMs,ASCCs,DRUs, direct reporting PMs, or functional proponents will not field, and commanders will not accept, systems (1) That do not meet minimum security standards stated in the acquisition and procurement specifications. (2) For which a Ci^A authorization has not been obtained from the appropriate DAA. ^ Commanders are responsiblefor ensuring that ISs under tbeir purview are operated inamanner consistent with tbe system Cc^A package and this regulation.

f^

AR 25 2 ^ 2 4 October 2007

^anningB^0001^253

^. Development and modification to existing ISs will be performed inamanner that makes security an integral part of the development, acquisition, fielding, anci operational processes. ^. All ISs will be subjected to the acquisition life cycle per AR 70-1. 1. AR 525-13 prescribes policies and procedures for tbe Army antiterrorism program and assigns responsibilities for including defensive information operations. ^ 2 . Punding HODAwill manage and provide annual IA initiatives funding guidance and support required for Management Decision Packages (MDEPs) MS4X and MX5T,and others as appropriate.Funding guidance will change from year to year, and CIO/G 6will publish annual guidance on the submission of IA requirements and tbe CIO/C 6validation processes of thosesubmittedrequirements.Thisfundingandbudgetingprocess willcontinue under the Army InformationSystem Security Program (AISSP) direction and guidance. This annual guidance provided to lAPMs and other appropriate personnel willidentifyvalidlAsubmissionrequirements andthe type of information required.CI0/G^wi11present validated IA requirements to the appropriate Program Evaluation Croup (PEC). c ^ . T^^^cjB^^iBi^B^^^i^iB^^iBi^Bi^,^. The RCIOsand ACOMs/ASCCs willprovide tbeMDEP MS4X Report(il1ustrated in table 4^1)totheH0DA,C1O/C6,asindicatedbe1ow^ (1) Submit fiscal year (FY)-pbased execution plans to the CIO/G^ no later than 10 August of each year. (2) Funded commands must provide a detailed midyear and yearend actual execution report. (cii) The midyear actual execution report is due to the CIO/G 6 not later than 10 May of each fiscal year, (i^^ The yearend actual execution report is due to the CIO/G^ not later than 10 October of each fiscal year. (c:i) 8oth themidyearandyearendactual executionreportsmustbetiedtophasedexecutionplansandreconciled with tbe official Execution Database Summary (218) report. (c^ Review execution reports for unauthorized expenditures and unauthorized fund reprogramming. (^^ HODA, CIO/C 6 will monitor program execution on a regular basis. (^ Commands receiving MDEP MS4X funds will submit semi-annual reports. (Reporting Requirements (RCS: CS1M62))

Table 4-1 MDEP MS4X, Information Assurance Phased Funding Utilization Plan/Actual Execution Report (RCS: CSIM-62) For period ending 092009 (MMYYYY) Project execution Phased Fund Utili- Estimated cost Actual obligation Date obligated Actual execution data zation Plan (09/09) Item (for example, ($000) ($000) ($000) (09/08) Remarks: (for example, training (what type status of procurement acand number of partion, explanation for nonticipants); specific execution of funds in line equipment items) with execution plan; explain what specific equipment items will be used for)

b, MDEP MX5T funds, MDEP MX5T funds are used in centralized procurement of COMSEC and IA equipment within the Army. The following guidance is provided: (1) Commanders are responsible for developing their respective command and combatant command-level MX5T requirements. Inputs will be staffed through their local IA channels and provided to the RCIO and HQDA for all tbeir sub-activities and subordinate commands. (2) Garrison commanders and tenant activities will report INFOSEC, COMSEC, and IA requirements to their respective RCIOs. (3) PEOs are responsible for developing, managing, and providing input to the HQDA for all tbeir PMs. (4) A PM that reports directly to HQDA is responsible for developing requirements and providing his or her input to HQDA. (5) Forecast data over a 15-year period for the purpose of short-term, mid-term, and long-term funding projections. Provide this data to the CSLA database located at Fort Huachuca, Arizona. Provide the following minimum data: (a) Name of INFOSEC, COMSEC, or IA system, equipment, or product needed. (b) Name of system requiring INFOSEC, COMSEC, or IA systems, equipment, or products. (c) Quantity of each type of INFOSEC, COMSEC, or IA equipment needed starting with the first year of the program objective memorandum (POM). (d) Name of the approving authority.

AR 25-2 24 October 2007

19

ManningB_00016254

(^^^ (^ (^ (^^

Point Name Short Other

of contact's name, mailing address, and e-mail and Defense Message System (DMS) addresses. o f operational requirements document (ORD) and date approved. description of system. information as directed b y H Q D A C I O / C ^ or D C S , G 3 .

(6) Submission of un resourced requirements will be to CIO/C 6, Attention: NETC ESTA I. ^ 3 . Information assurance training A l l individualsappointedas IA ornetworkoperationspersonnel must successfully completean IA securitytraining certification course of instruction equivalent to the duties assigned to them. Individuals must also be certified in accordance with tbe DOD baseline requirements o f D O D D 8570.1. Personnel with privileged access must sign a privileged level user agreement. Personnel in technical level positions w i l l complete the applicable computing environ ment certifications. Methods of training are web based at https://ia.gordon.army.mil, or other Service or Agency equivalent.
Cl. T^^^i^iB^^m^Bi^,^.

(1) (c;i) (^^ (c^^ (c^

IAPMwill^ Complete the Army 1AS0 course within 6 months of appointment. Complete Army E-leaming training course for Certified Information Systems Security Professional (CISSP). Completion dates are automatically uploaded into the ATCTS. Complete applicable DOD baseline management certification.

(2) I A N M w i l l ^
( ^ c ^ ^ Comply with paragraphs ci(l)(a), ci(l)(c), and c^(l)(d), above. (^^ Complete the S A / N M security course (at Fort Gordon or a mirror site) within 6 months of appointment. (3) l A M w i l l comply with paragraphs ci(l)(a), ci(1)(c), and ci(1)(d), above. (4) l A N O w i l l comply with paragraphs cii(l)(a), c;i(1)(c), and c;i(1)(d), above. (5) I A S O w i 1 1 ^ (d^ Complete an lASO Course within 6 months of appointment. Methods of training are Web based (http:// ia.gordon.army.mil), DISA Information Assurance Policy and Technology (lAPc^T) Web 8ased Training at http:// iase.disa.mil/eta/index.btm1). Army E Leaming/C8T IA modules, command (or other Service) course (^^ Comply with paragraphs ci(l)(c) and c^(l)(d), above. (6) S A s w i 1 1 ^ (Cl) Completeintroductory training (Level I) w i t h i n 6 m o n t h s of assuming position. SAs w i l l b e certified t o L e v e l l a s a m i n i m u m . MethodsoftrainingareWebbased(https://ia.gordon.army.mil), DISA Information AssurancePolicy andTechnoIogy ( I A P c ^ T ) W e b 8 a s e d Training at bttp://iase.disa.mil/eta/index.html), Army E L e a m i n g / C 8 T 1 A modules, or command (or other Service) courses.RCIOs or command IA personnel (as applicable) will determine i f limits on SA duties warrant certification to Level I only. (^^ Complete technical training (Level II) SA Security Course (schedules available at http://ia.gordon.army.mil) o r a Command-equivalent course within 6 months o f assuming position. (c^) Complete advancedtraining (Level II1)at t h e N a t i o n a 1 G u a r d 8 u r e a u ( N G 8 ) C o m p u t e r E m e r g e n c y Response Team OperationalTraining Experience (CERT OTE) or USARComputer Network Defense Course (CNDC) courses, or other Service or agency equivalents as required. (ci^ Complete applicable DOD technical and computing environment baseline certifications. (^^ Comply with paragraphci(l)(c), above. (7) Contracting officer'srepresentatives(CORs).Contracting officer'srepresentatives will compare contractor qualificationstothestatementofwork/performanceworkstatement requirements toensurecontractor-nominatedlAand SA positions meet minimum requirements before acceptance for employment. I f tbe personnel provided are noncompliant with the statement of work requirements, the COR w i l l notify tbe Contracting Officer for implementation of contract remedies. (8) lAuserawarenesstraining. I A M s , S A s , a n d 1 A S 0 s w i l l e n s u r e t h a t a u s e r t r a i n i n g program i s i n p l a c e f o r a l l users in the command. Online user training courses can be found https://ia gordon army.mil. (i^^ A l l users must receive IA awareness training tailored to the system and information accessible before issuance of a password for network access. The training will include the following: 7. Threats, vulnerabilities, and risks associated with the system. This portion w i l l include specific information regarding measures toreducemalicious logic tbreats,principlesofshared risk, extemaland intemal tbreatconcems, acceptable use, privacy issues, prohibitions on loading unauthorized software or hardware devices, and the requirement for frequent backups. 2. Information security objectives (that is, what needs to be protected). Responsibilities and accountability associated with IA. ^. Information accessibility, handling, and storage considerations.

20

AR 25-2 24 October 2007/RAR 23 March 2009

l\/lanningB_00016255

Physical and environmental considerations necessary to protect the system. 1^. System data and access controls. 7. Emergency and disaster plans. ^. Authorized systems configuration and associated CM requirements. ^. Incident, intrusion, malicious logic, virus, abnormal program, or system response reporting requirements. 7(^. INFOCON requirements and definitions. 77. AUP requirements. (^^ Users will receive annual refresher training as a minimum or as conditions warrant, (9) Vulnerability assessment certification. lApersonnel conducting vulnerability assessmentson ISsmust achieve VAT certification through their supporting RCERT or TNOSC. (This is not equivalent to the 1AVM program assessment procedures.) Additional guidanceandprocedures in accordance with thepolicy can be found on the IA 88P Web site. ^ .^^^^/i^i^/i^c^iiiiBi^ Refresber training for 1APMs,1AMs,IANMs,IASOs, and SAs/NAs will be attendance at an IA workshop every 18 24 months, attendance at DOD sponsored IA workshops, completion of modules in Army E LeaminglAleaming path, or approved commercial courses. 8aseline certifications will be maintained in accordance with the requirements of the certifying body.
C^. ,^1^^,^/l^l^^lCIBl.^ C^l^ ^ ^ l ^ l V d / ^ l l C ^ l ^ , ^ .

(1) IAPMs,IAMs,IASOs, and lANMs can substitute other Service or Agency courses to fulfill these requirements. Identify tbe substitute course, duration, and sponsor when tracking completion dates. (2) SAs and lANMs can substitute courses to fulfill the technical training (Level II) requirement.

4-^. Mission assurancecategory, levels of confidentiality, and levels of robustness


cn. ^i.^.^iciBici.^.^i^i^ciBic^^c^c^^^^c^B^. All ISs will be assignedamission assurance category that refiects the importance of tbeinformation relative tothe achievement of DODgoalsandobjectives.The ISmission assurancecategory will be determined by the DOD or Army proponent and agreed upon by the DIACAP team. The MAC level is used to determine the lAControls for integrity and availability in accordance with DODI 8500.2.Refer to DOD18500.2 (http:/ /iase.disa.mil/policy.html)foradditionaldetailedguidanceandproceduresfordefiningorassigningmissionassurance categories. (1) M A C I isahighintegrity,high availability for DODISs handling informationthat is determined to be vital to the operational readiness or mission effectivenessof deployedandcontingency forces in terms ofboth content and timeliness.The consequences of loss of integrity or availability isunacceptable and could includetheimmediate and sustained loss of mission effectiveness. (2) MAC II is a high integrity, medium availability for DOD ISs handling information that is important to the support ofdeployed and contingency forces.The consequence oflossofintegrity is unacceptable.Loss ofavailability is clifficult to deal with and can only be tolerated for a short time. (3) MAC III is a basic integrity, basic availability for DOD ISs handling information that is necessary for tbe conductofday-todaybusiness,but does not materially affect support to deployedor contingency forcesintheshortterm. The consequences of loss of integrity or availability can be tolerated or overcome without significant impacts on mission effectiveness or operational readiness. ^. CciBi^c7^Bi^icii/ii^/^i^^/.^. AllISs willbe assignedaconfidentialitylevel based ontbe classification or sensitivity of the information processed.The confidentialitylevelis used to establish acceptable access factors and to determine tbe DODI 8500.2 IAControls applicable to the information system.DODhas defined the following three confidentiality levels: (1) Classified Information designated top secret, secret or confidential in accordance with Executive Order 12356 (2) Sensitive Information the loss, or unauthorized access to or modification of could adversely affect the national interest or conduct ofFederal programs, or PrivacyAct information.Includes, but is not limited to For Official Use Only (FOUO), Privacy data, unclassified controlled nuclear information, and unclassified technical data. (3) Public Information has been reviewed and approved for public release. c ^ . 7,^iB^/,^ci^B^c^/ii^.^^Bi^.^.^. AllISs willemploy protection mecbanismsthat satisfy criteriafor basic,medium,or high levels of robustness per DODI 85002 and Federal Information Processing Standard (FIPS) 140^2 Each I S w i l l be managed and operated to achieve tbe appropriate level of protection for the applicable functional security requirements. (1) 77i^/i B^ci/i^,^^Bi^,^.^. High robustness is tbe security services and mechanisms that provide the most stringent protection and rigorous security countermeasures.Generally,high robustness technical solutions requireNSA-certified highrobustness solutions for cryptography,access control and key management, and high assurance security design as specified in NSA endorsed high robustness protection profiles, where available. (2) ^^c7ii^BBi i^c^^i^.^^ii^.^.1^. Medium robustness is security services and mechanisms that provide for layering of additional safeguards above good commercial practices.Medium robustness technical solutions require,ataminimum, strong (for example, crypto-based) authenticated access control, NSA approved key management, NIST FlPS-validated

AR 25-2 24 October 2007/RAR 23 March 2009

21

ManningB_00016256

cryptography, and tbe assurance properties as specified in NSA-endorsed medium robustness protection profiles or the Protection Profile Consistency Guidance for medium robustness. (3) ^c^.^ic^ B'cj^i^.^/ii^.^,^. 8asic robustness is the security services and mechanisms that equate to best commercial practices.8asic robustness technical solutions require, ataminimum, authenticated access control,NIST approved key management algorithms,NIST FlPS-validated cryptography,and the assurance properties specified inNSA-endorsed basic robustness protection profiles or the Protection Profile Consistency Guidance for 8asic Robustness. c ; ^ . 7,^v^/ci^/ci/ci/,^^,^^^Bii^.ii:^c^.^iiB^^. Theappropriatelevelofprotectionforeachfunctionalsecurity requirement will be determined usingacombination of the mission assurance category, level of confidentiality,and level ofrobustness. (1) EachlS will be reviewed against the mission assurance category definitions provided in DODI8500.2, Enclosure 2, and assigned to a mission assurance category. (2) Each IS will be assigned a confidentiality level basedon the classification or sensitivity ofthe information processed, stored, or transmitted. (3) Determine tbe applicable IA controls from DODI 8500.2. (4) The identified controls for the level of total system exposure serve as the baselinelA requirements for Cc^Aor reaccreditation and will be reassessed and revalidated every 3 years as a minimum.
4-5. Minimum information assurance rec^uirements

All required risk analyses willevaluate and identify possible vulnerabilities and adverse security effects on associated ISs and networks. Although manual procedures are acceptable when an automated safeguard is not feasible, IA personnel will embed automated security safeguards into the design and acquisition of ISs to ensure a secure infrastructure. Cl. T^B-d/ii^i'^^c^cic^^i^i^i^,^. In addition to the prohibited activities listed in AR 25 1, the following activities are specifically prohibited by any authorized user on a Govemment provided IS or connection: (1) Use of ISs for unlawful or unauthorized activities sucb as file sharing of media, data, or other content that is protected by federal or state law, including copyright or other intellectual property statutes (2) Installation of softwares configuration of an IS, or connecting anylSstoadistributed computer environs ment (f^C^), for example tbe S^TI project or tbe human genome research programs (3) l^odilicationof tbelSor software,useofitinany mannerotbertban itsintendedpurpose,oradding user configurable or unauthorized software such as, but not limited to, commercial instant messaging, commer-^ cial Internet cbat, collaborative environments, or peer to peer client applications These applications create exploitable vulnerabilities andcircumvent normalmeans ofsecuringandmonitoringnetwork activity andprovidea vector for theintroduction of malicious code, remote access, networkintrusions or tbe exfiltrationof protected data. (4) Attempts to strain, test, circumvent, or bypass network or IS security mechanisms, or to perform network or keystroke monitoring RCERTs, RedTeam, or other official activities, operating in their official capacities only, may be exempted from this requirement. (5) Physical relocation or changes to configuration or network connectivity of IS equipment (6) Installation of non-Governmentowned computing systemsor devices without prior authorization ofthe appointed f^AA including but not limited to US8 devices, external media, personal or contractor owned laptops, andl^Cf^s (7) Release, disclose, transfer, possess, or alter information without the consent of the data owner, the original classificationautbority(OCA)asdefinedby AR 380 5,theindividual's supervisory chainof command, Freedomof Information Act (FOIA) official. Public Affairs Office, or disclosure officer's approval. (8) Sharing personal accounts and autbenticators (passwords or PINs) or permitting tbe use of remote access capabilities through Government provided resources with any unauthorized individuaL (9) f^isabling or removing security or protective software and other mechanisms and tbeir associated logs from IS ^c^c^B^^c7i^ci^ic^Bi. ISs and networks will be accredited in accordance with interim DOD and Army DIACAP documentation and Army supplemental networthiness guidance. c ^ .^ c ^ c : ^ ^ . ^ . ^c ^ c J u ^ B ^ d / . IA personnel will implement system and device access controls using tbe principle of least privi1ege(POLP)viaautomatedor manual means toactivelyprotectthe IS fromcompromise,unauthorizeduseor access, and manipulation. IA personnel will immediately report unauthorized accesses or attempts to their servicing RCERT in accordance with Section V111, Incident and Intrusion reporting. Commanders and DAAs will (1) Enforce users'suspensions and revocation for violations of access authorization or violation in accordance with para 3 3c^(13). (2) Develop the approval processes for specific groups and users. (3) Validate individualsecurity investigation (or approveinterim access) requirements before authorizingIS access by any user. (4) Verify systems are configured to automatically generate an auditable record or log entry for each access granted or attempted.

22

AR 25-2 24 October 2007/RAR 23 March 2009

ManningB_00016257

(5) Validate that systems identify users through tbe user's use of unique user identifications (USERIDs). (6) Validate that systems authenticate users through the use of the CAC asatwo-factor authentication mechanism. The CAC has certificates on the integrated circuit chip (ICC), and w i l l be used as tbe primary user identifier and access authenticator to systems. (7) Validate system configurations to authenticate user access to all systems w i t h a m i n i m u m o f a U S E R I D and an authenticator when thesystemsare incapable of CACenablement until theseare replaced. Anauthenticatormay be somethingtheuserknows(password), something theuserpossesses(token),oraphysicalcharacteristic (biometric). Tbe most common authenticator is a password. (8) Verify that system configurations use password-protected screen savers, screen locks, or other lockout features to protect against unauthorized access of ISs during periods of temporary non-use. Ensure such mechanisms automatically activate when a terminal is left unattended or unused. The DOD activation standard is established at 15 minutes. Establisbashorter period when IS are used inamultinational or coalition work area.In instances where the unattended lockout featurehindersoperations, forexample; standalonebriefingpresentation systems, medical triage devices, or operating room systems s t a t u s ; t h e D A A and SO can approve longer timeouts as an exception only when it imposesa minimum o f risk, other control mechanisms are enabled to mitigate these risks, and documented in the Cc^A package. However tbe timeout feature w i l l never be disabled and the system will never remainunattended during this extended use period. Exceptions w i l l never be granted formatters of convenience or ease of use. (9) Va1idate that system configurations prohibit anonymous accesses or accounts (for example, Studentl,Student2, Patroni, Patron2, anonymous). (10) Prohibit the use of genericgroup accounts.Permit exceptions only o n a c a s e b y c a s e basis when supporting an operational oradministrativerequirement such as watch-standingorhelpdeskaccounts, or that requirecontinuity of operations, functions,or capabilities. l A M s w i l l implement procedurestoidentify and audit users o f g r o u p accounts through other operational mechanisms such as duty logs. (11) Verify that system configurations limit tbe number ofuser failed log-on attempts to three before denying access to (locking) that account, when account locking is supported by the IS or device. I f IS-supported, tbe system will prevent rapid retries when an authenticator is incorrectly entered and gives noindications or error messages that either tbe authenticator or ID was incorrectly entered (for example, implement time delays between failed attempts). (12) Verify that system configurations generate audit logs, and investigate security event violations when the maximum number of authentication attempts is exceeded,the maximum number of attempts from o n e l S i s exceeded, or the maximum number of failed attempts over a set period is exceeded. (13) Reinstate accesses only after the appropriate1A(for example, SA/NA) personnelhave verified the reasonfor failed log-on attempts and have confirmed the access holder's identity. Permit automatic account unlocking, for example, after an established time period has elapsed, as documented in the Cc^A package and approved by the D A A , based on sensitivity of tbe data or access requirements. (14) I f documented in the Cc^A package and authorized by the D A A , time-based lockouts (that is, access is restricted based on time or access contro1sbasedon1Paddress,terminalport,or combinations o f these) andbarriers that require some time to elapse to enable bypassing may be used. In those instances the D A A will specify, as a compensatory measure, the following policies: (ci^ Implement mandatory audit trails to record all successful and unsuccessful log-on attempts. (^^^ Within 72 hours of any failed log on and user lockout, IA personnel will verify the reason for failure and implement corrective actions or report the attempted unauthorized access. (c^^ The SA will maintain a written record of all reasons for failure for 1 year. (15) Enforce temporary d i s a b l i n g o f a l l a c c o u n t s f o r d e p l o y e d f o r c e s o n g a r r i s o n networks unless the accounts are operationally required. (16) Create and enforce procedures for suspending, changing, or deleting accounts and access privileges for deployed forces in tbe event o f capture, loss, or death of personnel having network privilege level access. (17) Create and enforce access auditing, and protect physical access control events (for example, card reader accesses)andauditevent logs for physical security violationsoraccesscontrols tosupport investigative efforts as required. c7. T^^ii^c^^^ c^c^c^^.^.^ (T^B^ (1) Systemsbeing used forremoteaccess must meet security configurations to include l A V M , certification and accreditation standards,and will employ host-based security, for exampleafirewall and I D S , w i t h A V s o f t w a r e before authorization to connect to any remote access server. Security configurations will be reviewed quarterly. (2) Encrypt log-in credentials as they traverse tbe network as required for tbe level of information being accessed or required for need-to-know separation. (3) Encrypt a l l R A f o r n e t w o r k c o n f i g u r a t i o n or management activities regardless of classification level,device,or access method. (4) Users w i l l protect RA ISs and data consistent with the level o f i n f o r m a t i o n retrieved during the session.

AR 2 5 - 2 ^ 2 4 October 2007

23

^anningB^000^^25^

(5) Disable remote device password save-ftinctionsincorporatedwithinsoftware or applicationstoprevent storage of plain text passwords. (6) Remote access users will read and sign security and end-user agreements for remote access annually as a condition for continued access. ^. ^^Bud/^ c ^ c ^ c ^ ^ , ^ , ^ ,^^r^^i^,^ (7^,^,^^. (1) Secure remote terminal devices consistent with tbe mode of operation and sensitivity ofthe information and implement non-repudiation measures when necessary. (2) Any IS that provides RAS capabilities will employ host-basedfirewallsand intrusion detection systems to detect unauthorized access and to prevent exploitation of network services. (3) Any RAS being accessed remotely willemploy a^^Time-Ouf'protectionfeature that automatically disconnects the remote device after a predetermined period of inactivity has elapsed, dependent on classification level of the information, but no longer than 10 minutes. (4) Remote access users will be required to authenticate all dial-in operations withauniqueUSERID and password, compliant with the remote authentication dial-in user system (RADIUS) standard. (5) AIIRAswill terminate atacentrally managed access point located witbinademilitarized zone (DM^) that is configured to log user activities during a session. (6) Prohibit all RA (that is, virtualprivate network (VPN), dial-in) to individual ISs within an enc1ave(that is, behind the DM^ firewall). (7) DOIMs and lAMs must ensure all remote access servers (RASs) undergo CM and Cc^A processes. (8) Stand alone dial back modems and modem systems that authenticate using RADIUS are tbe only allowable dialin modems. (9) Physical security for tbe terminal will meet the requirements for storage of data at tbe highest classification level received at the terminal and must be implemented within a restricted access area. (10) Databetweenthe client and theRAS willbe encryptedtoprovideconfidentiality,identification,nonrepudia tion and authentication of the data. The CAC provides the user with an official certificate. (11) Approved telework or telecommuting access will be in accordance with established DOIM, RCIO, and NETC0M/9th SC (A) Cc^A access procedures from a Govemment provided system only. Ad hoc telework access (defined as one-time, informal, or on an infrequent basis) will be through existing anci approved extemal access methods or portals such asTerminalServerAccess Control System (TSACS) or tbe Armyl^nowledge Online (AI^O) Web site. (12) Outside the continentalUnited States (OCONUS)telework procedures and authorization will be approved by tbe DAA and RCIO on a case-by-case basis and documented in the Cc^A package. (13) Audit all RAS connections at a minimum weekly. (14) Review RAS devices biweekly for security configuration, patches, updates, and lAVM compliance. ^ Cc^Bi^^i^c^/icjBi iBic^Bic^^^i^^n/ B^^^iiiB^^BBi^n/,^. The following policy will be the minimum used forthe CM of all systems: (1) All CM plans will includeamaintenance and update strategy to proactively manage all IS and networks with the latest security or application updates.While lAVM is part ofaCMstrategy,it is not all-inclusive for every IS in use in tbe Army. All ISs will have a vulnerability management strategy for testing and maintaining patches, updates, and upgrades. (2) Hardwareandsoftwarechanges to anaccredited IS, witban established baseline, willbeeffectedthrougbthe CM process. (3) Tbe CC8 or the CM8forasite must approve modifying or reconfiguring the hardware of any computer system. Hardware will not be connected toany system or network witbouttheexpress written consentof tbe lAM and the CM8 or CC8.Inthe absence ofaCC8 or CM8,the appropriate commander or manager will provide the consent on the advice of the cognizant IA official. (4) Modifying, installing,ordownloadingofany software on any computer systemmay affect systemCi^Aand must be evaluated and approved by the 1AM with tbe local CM8, CC8, and DAA. (5) Configuration management controls,including version controls,will be maintained on all software development efforts; RDTc^Eactivities;follow-ontest andevaluation(FOTc^E)activities;and other relatedtestsby the software designer. ACM^^baselineimage"wi11 be created,documented, kept current, and maintained by network and system administration personnel for all ISs within their span of control. Exceptions to this baseline image will be documented in tbe Cc^A package and approved by tbe DAA. (6) Theminimumbaselineconfiguration for ISs willbe thepublished Security Technical ImplementationGuide (STIC) requirements orthe common criteria protection profiles for IA products, as available or supplemented and published by DOD and NETC0M/9thSC (A), with any changes documented STIGS are located at: http://iase.disa.mil/ stigs/index.htmL (7) Prohibit default installations of ^^out of the box"configurations of COTSpurchased products.COTS purchased productswill require system CM and lAVMcompliance asaminimum.Comprehensive vulnerability assessments of

24

AR 25-2^24 October 2007

^anningB^000^^25^

the test IS will be conducted and documented before and after installation of any COTS products under consideration for CM review or approvaL (8) Upon acceptance for operational use (whether developmental, GOTS, or COTS), keep software under close and continuous CM controls to prevent unauthorized changes. (9) ISsmust meet minimumlevels of total system exposure. See paragraph 4 ^ andDODI 8500.2 toestablisb IA baseline requirements. ^. ^^.^.^^.^.^Bn^Bi^.^ Commanders will verify that lApersonnel conduct initial and continual assessments to detect IS and network vulnerabilitiesusingapproved tools, tactics,andtechniquestofacilitate the riskmanagementprocess and to ensure compliance withnetworkmanagement,CM, 1AVM requirements,and security policiesandprocedures. Commanders and IA personnel will ensure that all networks and networked ISs undergo a self assessed, vulnerability assessment scan quarterly. Prohibit theuseofcommercial scanning services or vendors withoutthe C10/G6's chief information security officer's (CISO) approvaL /i. Bfi^c^i/in^. SAs will configure ISs to automatically log all access attempts. Audits of IS will be either automated or manual means. SAs will implement audit mechanisms for those ISs that support multiple users. (1) Use audit servers to consolidate system audit logs for centralized review to remove tbe potential for unauthorized editing or deletion of audit logs in the event of an incident or compromise. (2) Commands, organizations, tenants, activities, and installations will support centralized audit server implementations in tbe enterprise. (3) Centralized audit servers logs will be maintained for a minimum of 1 year. (4) Conduct self-inspections by the respective SA/NA or IA manager. (5) Enable and refine default ISlogging capabilities to identify abnormal or potentially suspiciouslocal or network activity (ci^ Investigate all failed login attempts or account lockouts. (^^^ Maintain audit trails in sufficient detail to reconstruct events in determining the causes of compromise and magnitude ofdamagesbouldamalfunctionorasecurity violation occurs. Maintain system audit logslocally for no less than 90 days. (c:'^ Retain classified and sensitive IS audit files for 1 year (5 years for SCI systems, depending on storage capability). (ci^ Provide audit logs to tbe ACERT, Army ClobalNetwork Operations and Security Center (A-GNOSC),LE,or CI personnel to support forensic, criminal, or counter-intelligence investigations as required. (^^ Review logs andaudit trailsat aminimum weekly,morefrequently if required, and takeappropriate actions. i. Ccju^iBi^^nc:'^ ^/c^Bimn^. A contingency plan is a plan for emergency response, backup operations, transfer of operations, and post disaster recovery procedures maintained by an activity as a part of its IA security program. Commanders will create andpractice contingency plans foreach IS (a single IS or local area netwrok (LAN)) for critical assets as identified by the data owner or commander to support continuity of operations planning (COOP). See DAPam25 1 2foradditionalguidance and procedures for developing contingency plans.Exercise contingency plans annually.
^. T^d^d i i i ^ ^ ^ i ^ i i ^ .

(1) Implement safeguards to detect and minimize unauthorized access andinadvertent,malicious,or non-malicious modification or destruction of data. (2) Implement safeguards to ensure that security classification levels remain with the transmitted data. (3) DAA will identify dataowners foreachdatabaseon their networks.Onlytheoriginal classification authority (OCA) is authorized to change the data classification. (4) D A A w i l l develop and enforce policies and procedures to routinely or automatically backup,verify,and restore (as required) data, ISs,or devices at every level.These policies and procedures will be captured in the Cc^Apackage. (5) Use data or data sources that have verifiable or tmsted information. Examples of trusted sources include, but are not limited to, information published on DOD and Army sites and vendor sites that use verified source code or cryptographic hash values. (6) Protect data at rest (for example,databases,fi1es) tothe classification leveloftheinformationwitb authorized encryption and strict access control measures implemented. ^. Cc^^^cuc^^di^^. TheCc^Apackage willbeavailable to thesite-assignedlASO forthe life ofeach IS or LAN, includingoperational,prototype, test,ordeve1opmenta1systems.ThisCc^Apackagewill include ataminimumthe System Identification Profile (SIP), Scorecard, and plan of action and milestones (POAc^M). /. 7 B ^ ^i^dcB^i^c^/ cic^^i^i.^i/ic^ii. All security related COTS hardware, firmware, and software components (excluding cryptographic modules) required to protect ISs will beacquired in accordance withpublic law and will havebeen evaluated and validated in accordance with appropriate criteria, schemes, or protection profiles (http://www.niap.nist.gov/) and this regulation. IA products listed on the IA Approved Products List (APL) available on the IA website, will beevaluated/selectedfirst, and thenprocured through Army ComputerHardware, Enterprise, Software andSolutionscontractvehiclesbefore other lAproducts are procured. ForPEO/PM's,the CSLA 8PArequirements

AR 25-2^24 October 2007/RAR 23 March 2009

25

^anningB^000^^2^0

only applies to tbe procurement of COMSEC devices. A l l COTS products w i l l be evaluated by N S A o r in accordance with NSA-approved p r o c e s s e s . N E T C O M / 9 t b S C ( A ) a n d C I O / G - 6 may approve exceptions to lAproducts evaluations when no criteria, protection profi1e,or schema exists or is under development, and tbe removal or prohibition of such an I A product would significantly degrade or reduce tbe ability of personnel to secure, manage, and protect the infrastructure. /^cj^ic^^c^Bici^c^c^Bi.^^Bi/^i^c^c^^c7i^B^^,^. Commanders will verify that all computers under theircontrol, independently, prominently and completely display tbe Notice and Consent 8anner immediately upon users' authentication to the system, including, but not limited to, web, ftp, telnet, or other services access. (1) Ceneral Notification: Army users of DOD telecommunications systems or devices are advised that DOD provides such systems and devices for conducting authorized use. Users are subject to telecommunications monitoring, including tbeir personal communications and stored information. (2) Using Govemment telecommunications systems and devices constitutes tbe user's consent to monitoring. (3) Users w i l l be advised that there is no expectation of privacy while using ISs or accessing Army resources. (4) Tbe user must take a positive action to accept the terms o f t h e notice and consent w a m i n g b a n n e r b e f o r e a successful logon is completed. (5) Post appropriate waming banners and labels in accordance with this regulation. (6) The following access waming banner replaces the waming banner in AR 380 53 and will not be modified fiirther. The banner to be posted on Army networks, systems, and devices will state (7) ^^YOU ARE A C C E S S I N C A U S G O V E R N M E N T (USC) I N F O R M A T I O N SYSTEM (IS) T H A T IS PRO VIDEO FOR U S C A U T H O R I ^ E D USE 0 N L Y B ' 8 y using this IS (which includes any device attached to this IS), you consent to tbe following conditions: The USC routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct ( P M ) , l a w e n f o r c e m e n t ( L E ) , and counterintelligence (Cl)investigations. At any t i m e , t h e U S G may inspect a n d s e i z e d a t a s t o r e d o n this IS. Communications using, ordatastored on, this IS are not private, are subject to routine monitoring,interception,and search,and may be disclosed or used for anyUSG-authorized purpose. This IS includes security measures (e.g., authentication and access controls) to protect USC interestsnot for your personalbenefit or privacy. Notwithstanding theabove,using this IS does not constituteconsent t o P M , LE, o r C I investigative searching or monitoring of tbe content of privileged communications, or work product, related to personal representation or services by attomeys, psychotherapists, or clergy,and tbeir assistants.Such communications and work product are private and confidential. See User Agreement for details. (8) For those personal computing devices such as 81ackberries and other PDAs that have technical limitations to the full banner, then tbe only approved solution will be: ^^1've read c^ consent to terms in IS user agreem't." (9) For media devices, services, protocols, and other limited text input requirements other than PDA devices requiring access, such as routers,firewalls,bannered access ports, and s o f o r t h . T h i s banner will be^^Subject to Army Waming banner in A R 25 2, 4-5BBi(7)." Bl. ^iB^iB.^^B'ci^^c^^iciBi. Implement the virus protection guidance provided below on a l l I S s and networks,regardless of classification or purpose (1) Users and SAs w i l l scan all files, removable media, and software, including new ^^shrink-wrapped" COTS software,with an installed and authorizedAVproduct before introducing them onto an IS or network.Files,media and software found to be infected with a virus will be reported by users to the SA. (2) To minimize tbe risks of viruses, implement the following countermeasures: (ci) SAs w i l l configure all ISs w i t b a c u r r e n t and supportable version of t h e A V s o f t w a r e configured to provide real^ time protection from the approved products list with automated updates and reporting enabled. (^^ IA personnel should take the multilevel approach to virus detection by installing one A V package on the workstations and a different A V package on the servers. (^^^ SAs w i l l update virus definitionsat a minimum weekly, o r a s directedby the ACERT for immediate threat reduction.Virus definition availability is based on vendors'capabilities.lApersonnel w i l l institute automated antivirus definition updates as published or available from authorized DOD or Army sites. (3) IA personnel will train users to recognize and report virus symptoms immediately. (4) l A M s will implement virus-reporting procedures to support DOD and Army reporting requirements.
CJ. ^ C l ^ l / ^ C^CJCI^^.

(1) Mobile code is executable software,transferredacrossanetwork, downloaded, and executed o n a l o c a l system without notification to, or explicit installation and execution by, the recipient. (2) Mobile codehasthepotential to severely degrade operationsif improperly usedor controlled.The objective of the mobile code security policy is to deny untrusted mobile code the ability to traverse the Army enterprise. As a minimum, tbe Army mobile code mitigation policy w i l l be implemented to support the DOD mobile code policy. Untrusted mobile code w i l l not be allowed to traverse the enterprise unless NETC0M/9tb SC (A) CC8 approved mitigating actions have been emplaced.
^. TBcriB^B^iBi^.

26

AR 25-2 24 October 2007/RAR 23 March 2009

ManningB_00016261

(1) Layering isaprocess of implementing similar security configurations or mechanisms at multiple points in an IS architecture. Doing so eliminates single points of failure,provides redundant capabilities,increasesaccessgranularity and auditing, and implements an effective computer or network attack detection and reaction capability. (2) The Army enterprise IA security DiD structure requiresalayering of security policies, procedures, and technology,including best practices such as redundant capabilities or use of altemative operating systems,to protect all network resources within the enterprise. Layered defenses at the boundaries, for example, include, but are not limited to using inbound and outbound proxy services, firewalls, IDSs, IPSs, and D M ^ s . ^. Ti'i'/^^B^iBi^. Filtering policies w i l l block ingress and egress services, content, sources, destinations, ports, and protocols not required or authorized across the enterpriseboundary. Routerand firewall accesscontrol l i s t s ( A C L s ) provide a basic level o f access control over network connections based on security or operational policy. (1) Filteringattbeenterpriseboundary is the primary responsibility of t h e N E T C 0 M / 9 t h S C ( A ) T N 0 S C s u s i n g tools and techniques applied at tbe enterprise level. (2) At all levels subordinate t o N E T C O M / 9 t h SC (A), filteringpolicies and technology will be implementedand layered throughout tbearchitectureandenforced at all capabledevices. Audit and systemordevicegeneratedevent logs will be provided to NETC0M/9th SC (A). These policies should be complementary. (3) Filtering products and techniques are intended to proactively reduce ingress and egress security threats to enterprise systems and information without targeting specific individuals. Tbe most common threats are associated with malicious content,misuse,security policy vio1ations,contentpo1icyvio1ations,orcrimina1activity.Threat mitigation policies w i l l b e incorporated, c o n f i g u r e d , a n d m o n i t o r e d t o r e d u c e o r identify these t h r e a t s a n d i n c l u d e , b u t a r e n o t 1 i m i t e d t o , A C L c o n f i g u r a t i o n o n r o u t i n g d e v i c e s t o p r e v e n t access tounauthorized sites, A V installations,cache or proxy servers (to maintain connection state), firewalls, mail exchange configurations (forexample, autodeletion of attachments), network monitoring software such as IDS or Intrusion Prevention System (IPS) configured to terminate suspicious traffic, content management, or web filtering applications. B^^^T^ (1) Commanders and Directors will implement an AUP f o r a l l user accesses under theircontrol (seethe sample AUP at appendix 8 ) . (2) Users will review and sign an AUP prior to or upon account activation. Digital signatures are authorized. (3) IA personnel will maintain documented training records. (4) DOD policy states that Federal Govemment communication systems and equipment (including Government ownedtelephones,facsimile machines,electronicmai1, intemet systems,andcommercialsystems),whenuse o f s u c h systems and equipment i s p a i d f o r by t h e F e d e r a l G o v e m m e n t , w i l l b e f o r o f f i c i a l u s e and authorized purposes only. (5) Official use includes emergency communications and communications necessary to carry out the business of the Federal Govemment. Official use can also include other use authorized by a theater commander for Soldiers and civilian employees deployed for extended periods away from home on official business. (6) Authorized purposes include brief communications by employees while they are traveling on Govemment business to notify family members of official transportation or schedule changes. Authorized purposes can also include limitedpersonal use established by appropriateauthoritiesundertbeguidelines of the .loint EthicsRegulation(DOD 55007 R) (7) Certain activities are never authorized on Army networks. AUPs will include the following minimums as prohibited These activities include any personal use of Govemment resources involving: pomography or obscene material(adu1torchi1d);copyright infringement(suchas the s h a r i n g o f c o p y r i g h t m a t e r i a l b y means of peer-topeer software); gamb1ing;tbe transmission o f chain letters; unofficial advertising, soliciting, or selling except on authorized bulletin boards established for such use; or the violation of any statute or regulation. ^ciBii/c^B^iBi^ Bi^ri^c^B^^. (1) Network monitoring includes any o f a n u m b e r of actions by lApersonnel aimed at ensuring proper performance and management. When any of these monitoring activities involve intercepting(capturing in real time) tbe contents of wireorelectroniccommunications, they must fall w i t h i n t b e l i m i t s o f t h e s e r v i c e p r o v i d e r e x c e p t i o n to tbeFederal wiretap statute. The service provider exception allows system and network administrators to intercept, use, and disclose intercepted communications as long as the actions are conducted in the normal course o f employment and the SA/NA is engaged in an activity t h a t i s n e c e s s a r y t o k e e p t h e service operationalor to protectthe rights or propertyof the service provider. Therefore, IA personnel must consult with legal counsel to ensure that their activities involving systems management and protection are properly authorized. (2) lApersonnel performing ingress and egress network monitoring or filtering activities are authorized to use CIO/ G 6 a p p r o v e d automated monitoring tools maintained and configured b y N E T C O M / 9 t b S C (A) as network devices to aid in the performance and management. It is important to recognize that tbe SA/NA does not have unlimited authority i n t h e use of these network monitoring tools.The approved tool may contain technical capabilities beyond those tasks f o r w h i c h tbe tool wasapproved; as such the IA personnel must ensure that approved t o o l s a r e u s e d o n l y f o r t h e i r intended purpose.

AR 2 5 - 2 ^ 2 4 October 2007

27

^anningB^000^^2^2

(3) l A p e r s o n n e l w i l l not use unapproved I A tools,use I A tools for unapproved purposes, or misuse automated I A tools. Violations w i l l be reported through appropriate command channels to tbe C I O / G ^ . E x c e p t i o n s to the configuration ofthese devices will be approved on a case-by-case basis by NETC0M/9th SC (A). (4) In general terms,lApersonnel and SAs/NAs do not engage in blanket network monitoring o f intemal communications. However, the Army reserves tbe right at any time to monitor, access, retrieve, read, or disclose intemal communications when a l e g i t i m a t e n e e d e x i s t s t h a t c a n n o t b e s a t i s f i e d b y other meanspursuanttopara45^,below. (5) As a matter of normal auditing, SAs/NAs may review web sites logs, files downloaded, ingress and egress services andsimilarauditedor related informationexchangedover connected systems. Supervisors and managersmay receive reports detailing the usage of these and other intemalinformation systems,and are responsible for determining that such usage is both reasonable and authorized. (6) A s a m a t t e r o f norma1auditing,SAs/NAs may store all files and messagesthroughroutinebackupsto tape, disk, or other storage media.This means that information stored or processed, even i f a u s e r has specifically deleted it, is often recoverable and may be examined at a later date by SAs/NAs and others permitted by lawful authority. (7) SA/NAs may provide assistance to Army supervisory and management personnel, under lawful authority, to examine archived electronic mail, personal computer file directories, hard disk drive files, and other information stored on ISs.Thisinformation may include personaldata. Such examinations aretypically performed to assure compliance with intemal policies; support tbe performance o f administrative investigations; and assist in tbe management and security o f data and ISs. (8) When lApersonneldiscover information during the course of their normal activity that indicatesaviolation of acceptable use or a possible criminal offense, they w i l l immediately report tbe finding to their Commander. The commander w i l l immediately report knownorsuspectedcriminal activity to LE and w i l l consult with legal counsel conceming activities that appear merely to violate acceptableuse. IA personnel w i l l retain andprovide information related to the matter to LE when required. (9) W i t h the exceptions of the SA/NA as identified below. A r m y personnel and contractors are prohibited f r o m browsing or accessing other user^s e-mail accounts (10) The SA/NA may only intercept, retrieve, or otherwise recover an e-mail message and any attachments thereto, only under the following circumstances: (cii) With consent (expressed or implied) o f a party to tbe communication involved. (^^ In response to a request for technical assistance from: 7. LE/C1 personnel pursuant to a properly authorized LE/C1 investigation. 2. A supervisor as part of a non-investigatory management search in accordance with paragraph 4^5/, below. ^. A n investigating officer pursuant toaproperly authorized administrative investigation (for examp1e,apre1iminary inquiry u n d e r R u l e f o r Courts-Martial 3 0 3 , a n i n f o r m a l i n v e s t i g a t i o n u n d e r A R 1 5 ^ , o r a p r e l i m i n a r y inquiry under A R 380 5) ^. Information systems security monitoring personnel pursuant to properly authorized IS security monitoring activities. Inspector Ceneral personnel pursuant to an authorized inspection, investigation, or inquiry. (11) Tbe SA/NA may remove a n y e m a i l , f i l e , o r attachment that is interfering w i t h t h e operation of an ISwithout consent o f t h e originator or recipient. Tbe SA/NA will notify the originator and recipient of such actions. (12) TheSATNA i s n o t a u t h o r i z e d t o u s e techniquesor software topenetrate or bypassuser's informationprotec tions (for example, content restrictions or read-only protections used to maintain or enforce document integrity,version control, or need-to-know enforcement). /. /^ciBic^^^BBi^Bi^ .^^ciB^c^/i. In tbe absence o f tbe user (for example, T D Y , extended hospital stay, incapacitation, emergency operational requirement), only the SA/NA is authorized limited access to the user's files to support administrative management searches to provide tbe requested information as required for official purposes. When such access is requested, the SA w i l l (1) 8 r i e f tbe supervisor as to the limits o f accessing the user's data files. (2) Limit tbe scope o f t h e authorized search to those files reasonably related to the objective o f t h e search (that is,email access would not be reasonable when searching for a word clocument file). (3) Limit the search to the time necessary to locate tbe required data in the most relevant file location. (4) Inform tbe individual o f requested file access as soon as possible after such requests, and document this access in a memorandum. (5) SAs/NAs w i l l not grant unrestricted supervisory access to individual information, data files, or accounts. (6) SA/NAs w i l l not access individual information or data files unless conducting a management search, an authorized administrative search, or supporting a LE/CI authorized investigation. (7) SA/NAs may conduct an authorized investigative or management search o f assigned IS upon an individuals' termination ofemployment, death, or other permanent departure from the organization to retrieve data and files associated with the organizational mission.

2^

AR 2 5 - 2 ^ 2 4 Octobec 2007

i^anningB^0001^2^3

S e c t i o n II Software Security 4-6.ControIs d. IA personnel w i l l implement controls to protect system software from compromise, unauthorized use, or manipulation. ^. T b e D A A , m a t e r i e I d e v e 1 o p e r , C I O , o r I A M w i l l d o c u m e n t a l l s o f t w a r e u s e d f o r c o n t r o l p u r p o s e s i n t h e C c ^ A package as a minimum. c:. PEOs, PMs, and functional proponents w i l l require vendors seeking to support the A E I to submit SF 328 (Certificate Pertaining to Foreign Interests). c7. A l l COTS software used on ISs w i l l be ftilly licensed (under U.S. Copyright Law). ^. Incorporate l A V M c o m p l i a n c e , patch management, I A , a n d A V s o f t w a r e into contracts with software developers regardless o f tbe software's purpose (for example, medical devices). ^ Program managers and D A A will restrict systems used or designated as ^^test platforms" from connecting to operationalnetwork. P M a n d DAAscanauthorizetemporaryconnectionsto conduct upgrades,downloadpatches,or perform vulnerability scans when off-line support capabilities are insufficient and protections have been validated. Remove the ^^testplatform"1S immediately upon completion of the action until it has been operationally accredited and is fully compliant. ^. Use of ^^shareware" or ^^freeware" is prohibitedunless specifically approved through IA personnel a n d b y the D A A for a specific operational mission requirement and length of time when no approved product exists. Notify RCIOs and the supporting RCERT/TNOSC of local software use approvaL /i. Use of ^^opensource"software (for example, Red Hat L i n u x ) i s permitted whenthe source codeis available for examinationofmaliciouscontent, applicableconfiguration implementationguidance isavailableand implemented,a protection p r o f i l e i s i n existence,orarisk and vulnerability assessment hasbeen conducted with mitigation strategies implemented with D A A and C C 8 approval and documentation in the Cc^A package. Notify RCIOs and the supporting RCERT/TNOSC of local software use approvaL i. Use of dataassurance and operating systems integrity products (forexample, public key infrastmcture (PI^I), Tripwire, Intemet protocol security (IPSec), transmission control protocol/Intemet protocol (TCP/IP) wrappers) will be included in product development and integrated into end-state production systems. ^. l A M s and developers will transition higb risk services such as, but not limited to, ftp or telnet to secure technologies and services such as secure ftp (sftp) and secure shell (ssh). ^ A r m y personnel, including contractors,will not introduce classified or sensitive information into an IS until the data confidentiality level and protection level of tbe IS has been certified, tbe appropriate IS protection mechanismsare operational, a n d t b e f ^ A A approval or waiver hasbeen obtained The data owner willapprove entering thedata,whereapplicab1e. Data w i l l n o t e x c e e d t b e s e c u r i t y classification level f o r w h i c h the IS hasbeen approved.

database management
d. Databasesstore informationand w i l l b e m a n a g e d toensurethatthedataisaccurate,protected,accessibIe,and verifiable so that commanders at all levels can rely on trusted information in the decision making process.Commanders will appoint a database administrator ( D 8 A ) for each operational database. ^. The D 8 A w i l l be certified through either training or experience in the database being managed. c^. Tbe D 8 A w i l l develop and implement controls to protect database management systems from unauthorized schema modifications. c7. The D 8 A w i l l develop and implement access and auditing controls to protect database management systems from unauthorized accesses, queries, input or activity. ^. Tbe D 8 A w i l l conduct weekly backups of tbe database and schema, a s a m i n i m u m , o r more often as directed by thelAPMorlAM ^ The SO will protect databases from direct Intemet access using filtering and access control devices (for example, firewalls, routers, access control lists (ACLs)). ^. Dataowners will identify the classificationor confidentiality l e v e l o f d a t a r e s i d i n g i n the database and special controls, access requirements, or restrictions required to be implemented by the D 8 A . /i. The SO will place databases on isolated and dedicated servers with restricted access controls D 8 A s w i l l not install other vulnerable servers or services (forexample, web servers, ftp servers) that may compromise or permit unauthorized access of the database through another critical vulnerability identified in tbe additional servers or services. 1. Databases should be hosted on trusted military IS or networks.As part o f tbe Cc^A process, the CA and D A A w i l l review and approve a detailed risk management process as documented in tbe Cc^A package before operational implementation o f databases located in contractor owned, operated, or managed networks.

AR 2 5 - 2 ^ 2 4 October 2007

29

^anningB^000^^2^4

^ 8 e f o r e the D A A grants an approval to operate (ATO), the following minimum requirements w i l l be addressed i n a security compliance plan: (1) D 8 A certifications and experience in the proffered system(s) and application(s). (2) Security background investigation(s) of the administrator(s) and verification procedures equivalent to tbe IT position held by tbe D 8 A and tbe classification of the system. (3) Control measures for encrypted privileged-level, root, administrator, and user accesses in accordance with Army access standards. (4) Contro1measurestoprotectdatabase(s)and management systemsfromunauthorizedqueries, input,or activity for example; data input validation and exception routines. (5) Control measures for database(s) and server update, management, backup, andrecovery procedures. (6) Control measures and procedures for audits, analysis, incident and intmsion response. (7) Control measures to protect database(s) servers and interfaces from direct, unauthorized, or un-autbenticated Intemet access using filtering and access control devices or capabilities (for example, firewalls, routers, ACLs). (8) Control measures to protect database(s) servers and interfaces from physical access threats. (9) Control measures to protect database(s) servers and interfaces from logical threats. (10) Forcontractor owned, operated, or managed databases, tbe contractor w i l l conduct an initial comprehensive vulnerability assessment of tbe configuration, security, and network upon which the servers reside, and provide the complete results to authorized Army representatives. (11) Forcontractor owned, operated, ormanageddatabases, the contractor w i l l conduct quarterly comprehensive vulnerability assessments and evaluations and fiimish the results to authorized Army representatives. ^. Data owners and D 8 A s will implement and support DOD data/meta-data tagging requirements as initiatives, software, procedures, and methodologies are developed and implemented. 4 - 8 . Oesign and test Cl. A l l information systems w i l l be designed to meet the IA controls as identified in D O D I 8500.2 and be configured in compliance with the applicableDISA STIC or baselined system with identified changes documented as part o f the accreditation process. ^. A l l information and information-based systems willincorporate embedded software security solutions throughout the system life cycle. c^. System developers will contact CSLA during initial design to determine COMSEC device requirements ( i f required) in system design. c^. 8efore fielding,all information and information-based systems w i l l be tested per an approvedTest and Evaluation Master Plan (TEMP) that contains current, validated threats to each IS. The systems w i l l demonstrate successful completion o f a l l required test and evaluation events at each acquisition decision milestone. ^. Conduct vulnerability assessments on all systems before fielding or installing systems to identify residual vulnerabilities and provide risk mitigation strategies for those vulnerabilities that are operationally required. S e c t i o n III l^ard^are, Pirm^are, and Physical Security 49. H a r d w a r e - b a s e d s e c u r i t y c o n t r o l s Consider hardware security,COMSEC,and IA requirements in the concept, design, development, acquisition,fielding, and support o f ISs. dl. System developers w i l l incorporate controls to protect hardware and firmware from compromise and unauthorized use, removal, access, or manipulation. ^. After initial fielding and installation ofhardware or firmware, proposed additions must go through an Installation configuration management board for approval before installation and operation. The CC8 Chair or responsible Information Management ( I M ) official will notify the D A A , A r m y CA,materiel developer,CIO, 1 A M , R C I O , D O I M , or authorized I M officer before installation and operation, as applicable. Proposed additions may require revalidation or re-accreditation of the system's security posture and accreditation approval. c^. Tbe Cc^A w i l l include an inventory of all identifiable hardware, firmware, and software that areparts o f t h e system. c7. Maintain C M controls for all hardware and firmware test and evaluation, follow-on test and evaluation, and other related activities by the materiel developer. ^. 1 A P M s , I A M s , or system developers w i l l contact CSLA to review applicable I A 8 P A s (both from DOD and the Army) before initiating requisition actions.

4-10. Maintenance personnel


The Commander will verify or validate tbe following:

30

AR 2 5 - 2 ^ 2 4 October 2007

^anningB^000^^2^5

cn. C/^c^B^i^Bic^^.^. Maintenancepersonnel w i l l be cleared t o t h e highest level of datahandledby the IS. Clearance requirements w i l l be included in maintenance contracts, statements of work, and specified on the DD Form 254 (Department of Defense (DOD) Contract Security Classification Specification), in accordance with A R 3 8 ( ^ 9 , w h e r e applicable. ^. 7^^,^^i^ic^^ic^Bi.^. Escort and observe uncleared maintenance personnel at all times by a cleared and technically qualified individual.NonU.S.citizens will not perform maintenance on ISs that processTOP SECRET (TS), Sensitive Compartmentedlnformation(SCI), Special Intelligence(SI), Single IntegratedOperational Plan-Extremely Sensitive Infonnation (SIOP ES1),or SAP information. c^. ^.^^ci^BiciBi^.,^.c^i^i^^Bi.^. When non-US.citizens are employed to maintain ISs, address such use asavulnerabil ity in the risk assessment and identify and employ appropriate countermeasures. c7. ^c^iBi/^BiciBic^^^^c::/^dB^^c7^^B^.^i^BiBi^/. Personnel who perform maintenance on classified systems will be cleared and indoctrinated to tbehighest classification l e v e l o f information processed o n t b e system. Appropriately cleared maintenance personnel do not require an escort.Needtoknow requirements may be inherent to adequately perform maintenance or take corrective actions. An appropriatelycleared and technicallyknowledgeable employee w i l l be present or review the system during maintenance to assure adherence to security procedures. ^. ^ciiBi^^BiciBic^^ i^iic^/^c^B^^c^ ( ^ d B ^ /di^^B^ c^/^di^^c^ ^^B^.^ciBiBi^/. I f cleared maintenance personnel are unavailable, individuals with tbe technical expertise to detect unauthorized modifications will m o n i t o r a l l uncleared maintenance personneL (1) Uncleared maintenance personnel will be U.S. citizens. Outside tbe U.S., where U.S. citizens are not available to perform maintenance, use FNs as an exception, with D A A approval and documentation in the Ci^A package. (2) 8efore maintenance by uncleared personnel, the IS w i l l (d^ 8ecompletely cleared and allnonvolatile data storage media removed or physically disconnected and secured, (/i^ W h e n a s y s t e m c a n n o t b e cleared, lAM-approvedprocedures w i l l b e enforced to deny the unclearedindividual visual and electronic access to any classified or sensitive information that is contained on the system. (3) Aseparate,unclassified copy of the operating system (for example,aspecific copy other than the copies used in processing information), including any fioppy disks or cassettes that are integral to the operating system,will be used forallmaintenanceoperationsperformedby unclearedpersonneL Thecopy willbelabeled^^UNCLASSIFIED FOR M A I N T E N A N C E O N L Y " and protected in accordance with procedures established in the SSAA/System Security Policy (SSP). Ensure that tbe media is write protected before use in classified systems. (4) Maintenance procedures for an IS usinganon-removable storage device o n w h i c b t h e operating system resides w i l l be considered and approved by the 1AM on a case-by-base basis. (5) T h e u s e o f c o m m e r c i a l data recovery services w i l l b e d o c u m e n t e d i n the C i ^ A p a c k a g e a n d a p p r o v e d b y the D A A with approval from the data owner and notification to the CIO/G 6 CISO.

4-11. Security objectives and safeguards


The Commander w i l l verify or validate the following: d. Secure removable media that process and store classified information in an area or a container approved for safeguarding classified media per AR 380 5. ^. Establish checks and balances to reduce the risk of one individual adversely affecting system or network operations. c^. Implement physical security requirements for ISs to prevent loss, damage, or unauthorized access. c^. Prohibited storage ofportable ISs or personal electronic devices (PEDs) that contain classified information in personal residences.Exceptions w i l l follow the guidance as prescribed i n A R 3 8 0 ^ 5 , p a r a g r a p h 7 ^ , a n d authorized as an exception only when an operational requirement exists. ^. Include facilities or spaces housing critical systems (forexample, e m a i l servers, web servers) as part of the physical security program and restrict access.

SectionI^ Procedural Security 4-12. Password control


d. Implement two-factor authentication techniques as the access control mechanism in lieu of passwords. Use CAC asthe primary access credential,or biometric or single-sign on access c o n t r o l d e v i c e s w h e n t b e l S does not support CAC ^. Tbe l A M or designee will manage the password generation, issuance, and control process. I f used, generate passwords in accordance with the 8 8 P for Army Password Standards. c ^ The holder of a password is the only authorized user o f that password. d^. The use o f o n e t i m e passwords is acceptable,but organizations must transitionto secure access capabilities such as SSH or secure sockets layer (SSL). See remote access requirements in para 45c7.

AR 2 5 - 2 ^ 2 4 October 2007

31

^anningB^000^^2^^

^. SAs will configure ISs to prevent displaying passwords in the clear unless tactical operations (for example, headsup displays while an aircraft is in fiight) pose risks to life or limb. ^ lAMs will approve and manage procedures to audit password files and user accounts for weak passwords, inactivity, and change history. lAMs will conduct quarterly auditingof password files on a stand-alone or secured system with limited access. ^. Deployed and tactical systems withlimited data input capabilities willincorporate password controlmeasures to the extent possible. ^ lAl^s and SAs will remove or change default, system, factory installed, function key embedded, or mainte^ nance passwords 1. lAMs and SAs will prohibit automated scripts or linkage capabilities, including, but not limited to,Web site links that embed both account and authentication within the unencrypted link. ^. SAs/NAs, withDAA approval, will implement proceduresfor user authenticationor verification before resetting passwords or unlocking accounts in accordance with the Cc^A package. ^. SAs/NAs will conduct weekly auditing of service accounts for indications of misuse. 7 Theuse of passwordgeneratingsoftwareordevicesis authorized asamemoryaid when itrandomly generates and enforces password length, configuration, and expiration requirements; protects from unauthorized disclosure through authentication or access controls; and presents a minimal or acceptable risk level in its use.

4-13. Release ofinformation regarding information system infrastructurearchitecture


c ^ All Army personnel and contractors will protect and restrict access to all documentation (for example, maps, test andevaluation results, vulnerability assessments,audits, results,or findings)describingoperational IS architectures, designs, eonfigurations,vulnerabilities, address listings,or user information This information is aminimum of FOUO and will not be made publicly accessible.Evaluate Freedom of Information Act (FOIA) requests for such documents in these categories on a case-by-case basis. ^. All information or IS responses that document ordisplay specific vulnerabilitiesof a system or network that would aid attempts by an adversary to compromise those critical systems or networks are OPSEC sensitive and will be protected,controlled,marked,or stored at the appropriate classification levelfor tbe system concemed.Thisinformation will not be made publicly available. c ^ . Protect and restrict access to information that isacollection of interrelated processes, systems,and networks that providesinformation on IA services throughout the Army;the1^M1;or the incident detection and responseinfrastructure, capabilities, orconfiguration. This informationshouldbemarked FOUOandmay beexempt from mandatory release pursuant to the FOIA.Coordinate with your servicing FOIA or PrivacyAct office and servicing judge advocate or legal advisor before releasing or deciding to withhold such information. Section ^ Personnel Security 4-14. Personnel security standards Tbefollowing standards designate positions requiring access toITand for processing information within ITsystems, These security designations are required to distinguish potential adverse effects on Army functions and operations and, therefore, tberelativesensitivity of functionsperformedby individualshavingcertainprivileges. Thesepositionsare referredtoasITand IT-relatedpositions. Therequirementsofthissection will be appliedtoall ITand IT related positions,wbetber occupied b y D A civilian employees,military personnel,consultants, contractor personnel,or others affiliated with tbe DOD(forexamp1e, volunteers). Additionalguidance is available in DOD 5200.2 R.
c;i. ^c^.^ic^ B^^^i^iB^^BBi^Bi^,^.

(1) Personnel requiring access to ISs to fulfill tbeir duties must possess the required favorable security investigation, security clearance, or formal access approvals, and fulfill any need-to-know requirements. (2) I T I i s ^ l^d^ Definedaspersonnel in 1Apositions(for example, SAs/NAsforinfrastmcturedevices, IDSs, VPNs, routers; SAs/NAsfor classified systems and devices) with privileged-levelaccess to control,manage,orconfigure1Atools or devices, individual and networked IS and devices, and enclaves. (7i^ Favorable completion of a National Agency Check (NAC) (current within 180 days). (c^^ Initiation ofaSingle Scope 8ackground Investigation (SS81) and favorable review of SF85P(Questionaire For Public Trust Positions), SF 86 (Questionaire For National Security Positions), and Supplemental Questionnaire.

(3) I T I I i s ^
(dl) Defined as personnel in IA positions (for example, operating system administration of common network applications or enclaves,back-up operators) withlimited privilegedlevelaccessto control,manage,orconfigureISs and devices, with very limited (single device) or no IA device access or management. (^^ A favorable review of local personnel, base/military, medical, and other security records as appropriate. (c^^ InitiationofaNational Agency Check withCredit Check and Written1nquiries(NACIC)(for civilians) o r a 32 AR 25-2^24 October 2007

^anningB^000^^2^7^

National Agency Check with Local Agency and Credit Checks (NACLC) (for military and contractors), as appropriate or favorable review of SF 85P and Supplemental Questionnaire. (4) IT-III is-^ (d^ Defined as 7. Personnel in IA positions, for example, power users or a SA on individual systems for configuration or management with limited privileged-level access to that IS(s) or device(s). This is a position of higher trust 2. Personnel with roles, responsibilities, and access authorization of normal users with non privileged level access to the IS or device. ^. Personnel with non privileged level access authorization in tbe role of official or statutory volunteers. Tbe provisions for statutory volunteers are covered in AR 608 1.. (^^ A favorable review of local personnel, base andmilitary, medical, andotbersecurity records, as appropriate. (i^^ Initiation of a NAC1C (for civilians) or national agency check (NAC) (for military and contractors), as appropriate and favorable review of SF 85P and Supplemental Questionnaire. (5) I T I V i s ^ (^^^ Definedaspersonnel in non-1Tpositionsthataretemporary,intermittent,or seasonal, for example, unofficial volunteers or summer hire positions, requiring restricted user-level access to unclassified, non-sensitive ISs only. (^^ Individual completes SF 85P and supplemental questionnaire. (c^^ A favorable review of local personnel, base/military, medica1,andother security records asappropriate. This investigation does not require submission to OPM. (d^ A favorable recommendation by the organization security manager, DAA, Commander, and installation commander, with notification to the RCIO/FCIO. /i. 7^^B^.^c^BiBi^/ .^^c^iiB^ii^ c:^ciBi^B^cj/.^. (1) Personnel security controls,both technicaland nontechnical (forexample,separationofduties,leastprivilege access, identification and authentication (1i^A),digitalsignatures, and audits), willbeincorporatedintothelSandlS procedures, as appropriate. (2) Individuals assigned to IT L IT H, or IT III positions who lose their clearance, orhave access to classified systems suspended pending the results of an investigation,will be barred access to thelSsuntilfavorable adjudication of that investigation. Waiversforcontinuedaccesstounclassifiedsystems willbejustifiedinawrittenrequest, with the Commander's concurrence,totbeDAAfor approvaL AccesswillbegrantedonlyuponDAA authorization.This request and approval will become part of the Ci^A package.Users designated in IT-Ipositions will be removed from these positions and this denial of access is non-waiverable. (3) WaiversprocessedforIT II and IT III personnel only are valid foraperiod not to exceed6montbs.Ifasecond waiver extensionisrequired,onemaybegrantedaslongasanewrequestfor waiver issubmittedtothcDAAand approved by tbe first general officer, or equivalent in position or civilian grade, in the Chain of Command. (4) While the Commander and DAA have the discretiontoprocessthe waiver forlT-lland IT III,it isimportant that this discretion is not without limits. The Commander and DAA are advised to proceed carefully and deliberately in makinga determination on whether the individual constitutes a security risk. The IT II/IT 111 rolesmustbehighly supervised. Any access to protective devices (for example,firewalls, VPNs, intrusion detection systems (IDSs),IPSs, and so on) will be prohibited until favorable adjudication. (5) The servicing legal office should be consulted for advice conceming personnel, security, contract and labor relations issues that may impact the final determination. Recheck local records to identify any issues that may be a deciding factor in the waiver process. (6) New,credib1e derogatory information revokes any standing waiver and resultsin immediate denialof access to IT systems (exceptions are for military only based on immediate supervision of tbe individual while on the IS). (7) Contractor, FN or temporary individualsassigned to any ITpositions who have their unclassifiedsystem or network accesses revoked or suspended for derogatory reasons, will be barred access to the ISs until favorable adjudication of that investigation. The organization's 1AS0/1AN0/1AM (as appropriate) will identify any other official systems/networksforwhich that individual hasanaccount(for example, A1i^0)andhave ittemporarily disabledor suspended. (8) Tbe required investigation levels for an IT 1 position are outlined below in table 4^2.

AR 25-2^24 October 2007

33

^anningB^000^^2^^

Table 4 - 2 Investigative levels for users with privileged access (IT-I) to ISs Privileged accessIT-C User roles DAA or lAPM lANM Foreign national Not allowed Not allowed U.S. civilian SSBI SSBI U.S. military SSBI SSBI U.S. contractor Not allowed Conditional SSBI Conditional SSBI Conditional SSBI SSBI SSBI None With CIO/G-6 written approval, contractors may continue as lA personnel until replaced Contractor may not fill MSC, installation, or post lAM position Contractor may not fill MSC, installation, or post lASO/IANO position (if created) None Examples: administration of lA devices (for example, boundary devices, IDSs, routers, and switches) Conditions or examples

lAM lASO/IANO

Not allowed Not allowed

SSBI SSBI SSBI SSBI

SSBI SSBI SSBI SSBI

Monitoring or test- Not allowed ing SA/NA or Adminis- Conditionally altrator (with IA priv- lowedSSBI ileged access) or (equivalent) ^ maintenance of IA devices

Notes: ' Investigative levels are delined in DOD 5200.2-R. The term 'Foreign National" (FN) refers lo all individuals who are non-U.S. citizens, including U.S. military personnel, DOD civilian employees, and contractors ^ FNunder the immediate supervision ol a U.S. citizen with written approval of ClO/G-6.

(9) The required investigation levels for an IT-II position are outlined below in table 4-3.

Table 4 - 3 Investigative levels for users with limited privileged access (IT-II) to ISs Limited privileged accessIT-I I ^ User roles lAM/IANM lANO/IASO FN (see note 2) Not allowed Conditionally allowedNACLC equivalent U.S. civilian NACI NACI U.S. military NACLC NACLC U.S. contractor NACLC NACLC None FNwith DAA written approval, and documentation in the C&A package, direct or indirect hires may continue as IA personnel until they are replaced, provided they serve under the immediate supervision of a U.S. citizen lAM and have no supervisory duties None Examples: IS administration, OS administration, end-user administration, and administration of common applications (for example, e-mail, word processing) Conditions or examples

Supervisor of IT 1 or Not allowed IT II positions Administrator (with Conditionally alno IA privileged aclowedNACLC cess) or maintenance equivalent^ of lA-enabled products

NACI NACI

NACLC NACLC

NACLC NACLC

Notes: ' Invesligalive levels are defined in DOD 5200 2-R FN refers lo all individuals who are non-U.S. citizens, including U.S. military personnel, DOD civilian employees, and contractors. ^ FNunder the immediate supervisor ol a U.S. citizen.

34

AR 25-2 24 October 2007

ManningB_00016269

C^. .^C^C^^,^,^

B l d B l - ^ . ^ . C^l'^l'^^Bl,^.

(1) Minimize employment of non-US. citizens in ITpositions. However, compelling reasons may exist to grant access t o D O D I T r e s o u r c e s in those circumstances in w h i c h a n o n U . S . c i t i z e n possessesaunique or unusual s k i l l o r expertise that is urgently needed f o r a s p e c i f i c D O D requirement and for wbicbasuitable U.S.citizen is not available. Written compelling reason justification, documentation in the Cc^A package, and D A A approval are required. (2) Access to sensitive informationby anon-U.S. citizen who is not a DODemployee will only bepermitted in accordance with applicable disclosure policies (for example. National Disclosure Policy 1, D O D D 5230.9, DODD 5230.25) and U.S. statutes (for example, the Arms Export Control Act, 22 USC 2551, eL seq ). (3) I f i n f o r m a t i o n t o w b i c b t b e i n c u m b e n t w i l l h a v e accessis authorized for foreigndisclosure,nonU.S. citizens assigned to DOD IT positions are subject to the investigative requirements outlined below. (4) Non-US.citizens may hold ITpositions under the conditions described in the paragraphs below and i f the D A A that accredited the system and the dataowners approve the assignment requirementsinwriting.The written approval must be on file andprovided as an artifact to the Cc^A package, before requesting the required investigation. Tbe required investigation must be completed and favorably adjudicated before authorizing access to DOD systems or networks. Interim access is prohibited. (5) Assignment (includingassignments due t o a c c r e t i o n o f d u t i e s ) o f c u r r e n t DOD employees,military personnel, consultants, and contractors to positions with different responsibilities or changed access privileges requires verification of tbe appropriate investigative basis and authority for holding a position of that level of sensitivity.
c^. 7Bi^^B^iBBi d.^,^i^iiBBi^Bi^.^.

(1) Individualsincluding temporary,intermittent,or seasonal personnel may be assigned to unclassified IT 11 and I T - I I I positions on an interim basis beforeafavorable completion of tbe required personnel security investigation only after the conditions specified have been met (d) Individual completes SF 85P and supplemental questionnaire. (^^ Afavorable recommendation by tbe organization security manager,Commander or Director, D A A , a n d Installation Commander, with RCIO/FCIO notification. (c'^ Initiation of security investigation has been submitted or is pending adjudication, (d^ Interim access is not authorized for non-U S. citizens. (2) Tbe security manager at tbe requesting activity will make interim assignment approvals for civilian and military personneL (3) The Govemment sponsor's security manager or official will make the approval for volunteer access. (4) The interimassignmentofcontractor personnel fulfilling ITpositions w i l l b e r e s t r i c t e d a n d i m p l e m e n t e d o n l y upondocumentation in the Cc^Apackage and acceptance of t h e D A A a n d t h e Contracting Officer evaluations o n a case-by-case basis. ^. Bfc^'i^c^ic:d/ic^Bi. (1) Tbe provisions of this section apply only to contractor personneL (Civilian employees, military personnel, consultants, volunteers, and seasonal, part time, and intermittent employees w i l l be favorably adjudicated by tbe appropriate DOD central adjudication facility.) (2) OPM will adjudicate investigations foratrustworthiness determination using the national adjudicative guidelines foraccesstoclassifiedinformation. 1 f t h e a d j u d i c a t i o n i s f a v o r a b l e , O P M w i l l i s s u e a l e t t e r o f t m s t w o r t h i n e s s t o t h e requesting activity. (3) Ifafavorable trustworthiness is indeterminate, OPM w i l l forward tbe case to the Defense Office ofHearings and Appeals (DOHA) in Columbus, O H , for further processing under D O D D 5220.6. A final unfavorable decision precludes assignment to an IT L IL or 111 position. (4) Enter all OPM IT trustworthiness determinations of DOD contractor personnel into the OPM Security/Suitability Investigative Index (SII). ^ 7^^iBiiB^.^^i^d^ic^Bi. Individuals occupying an IT position will be subject to a periodic reinvestigation according to existing contract, labor relations, or personnel security policy.

4-15. Poreign access to information systems


d. To ensure standardized and appropriate access to the Unclassified but Sensitive Intemet Protocol Routing N e t w o r k ( N 1 P R N E T ) b y foreign officials, lApersonnel will meettherequirementsdelineatedbelow. Provide each authorized foreign officia1a .mil address on the unclassified network required for executing his or her foreign official duties as outlined i n h i s o r h e r r e s p e c t i v e c e r t i f i c a t i o n . Foreach authorized foreignofficial, the localareanetwork administrator w i l l p l a c e a c a v e a t or marker on the user account and all outgoing e-mails from that person identifying them a s a f o r e i g n official f r o m a s p e c i f i c country. In doing so,tbelocal area network administrator w i l l spell out the words ^^ForeignOfficial"and tbe country name of the foreign official and will not use an acronym for that country. In addition,thelocal area administrator willindicate the type of foreign official access that isgranted.The requiredtags for each o f tbe five categories of foreign officials would thus read as shown below (replace each hypothetical country name with the appropriate one).

AR 2 5 - 2 ^ 2 4 October 2007

35

^anningB^0001^27^0

(1) EoreignIiaisonofficer(FLO):^^Last Name,First NameMiddlelnitial-ForeignNational-Germany-FLO."(Note: Local area network administrators w i l l designate FLOs representing the United l^ingdom, Canada, or Australia as STANREPs rather than as FLOs ) (2) CooperativeProgrampersonnel (CPP): ^^LastName,FirstNameMiddle Initial-Foreign National-Turkey-CPP". (3) Engineer and Scientist Exchange Program (ESEP): ^^Last Name, First Name Middle Initial-Foreign NationalIsraelESEP" (4) Standardization representative (STANREP): ^^Last Name, First Name Middle Initial-Foreign National-United l^ingdomSTANREP" (5) Military Personne1ExchangeProgram(MPEP):^^LastName,FirstNameMidd1eInitia1-ForeignNationa1-ItalyMPEP". ^. Limit access to foreign officials, exchange personnel, or representatives to computers that incorporate Armymandated access and auditing controls. Approval to access the NIPRNETdoes not equate to authority to exchange data or access systems located on that network.The appropriate system D A A w i l l approve access toforeign officials on an asneeded basis andupdating the documentation i n t h e Cc^Apackage. Similarly, the designatedrelease or disclosure authority w i l l grant access to the information on ISs to foreign officials on an as-needed basis. c^. E mail signature blocks w i l l be automatically generated for all foreign personnel, and include the foreign individual's nationality and position. 1^. I f tbe organization w h e r e a f o r e i g n official is certified determines t h e r e i s a n e e d f o r t h e f o r e i g n o f f i c i a l t o h a v e a c c e s s t o t b e N 1 P R N E T b e y o n d e - m a i 1 a c c e s s ( f o r e x a m p l e , a n A I ^ O a c c o u n t ) , s u b m i t a n e x c e p t i o n t o p o l i c y through tbe D A A to the R C 1 0 I A P M , t o be forwarded to tbe C10/C6.Tbe approval will become part of the Cc^A package for tbe IS. This includes individuals granted access prior to the publication of this regulation. Commands w i l l immediately evaluateeachcase andforward theirexception recommendation. Tbeexception will b e r e v i e w e d b y theappropriate HQDA Program Manager and t h e N E T C O M / 9 t h S C (A) OlAc^Cprior to disposition.The exception must includethe following information (1) Request from the Commander that states the need to know, tied to the foreign official's certification and Delegation of Disclosure Authority Letter (DDL). (2) Statements from the installation and c o m m a n d ' s l A M stating proper security procedures are in place.TheDCS, G 2, Foreign Disclosure and Security Directorate will also review the exception before final disposition. ^. Official access to information residing on an IS or network w i l l be limited to that controlled but unclassified information required t o f u l f i l l the terms o f the contract or agreement provided minimum security requirements of this section are met ^ Disclosure of classified military information toforeign governments and intemational organizations is limited and w i l l be in accordance with A R 380^10, D O D D 5230.11, and C.ICSI 5221018. ^. Intemational Military Students(IMS) who havebeen vettedandapproved f o r U . S . Army trainingand Professional Military Education (PME) attending resident training or enrolled in tbe Army Distance Education Program (DEP) at U.S. Army and Army-managed schools/training activities will agree to comply with all U.S. M1LDEP requirements.They are required to sign a n A U P user agreemenLThere is no requirement for background investigations as described sincein-country U.S. officialsperformasecurityscreeningofeacbstudentbefore selection approval.To prevent inadvertent disclosure of information, international military students w i l l be identified as students in their email address, display name and automated signature block (for example, john.i.smith.uk.stu(^xxx.army.mil). /i. NIPRNET access policy and procedures for FNs in non-official positions as identified above, are as follows: (1) Components or organizations will maintain records on access including the following information (d) Specific mission requirements for foreign access or connection. (^^ .lustification for each individual FN. ( ^ c ^ ^ Confirmation that tbe minimum-security requirements of this section are enacted, including tbe user agreement discussed below. (2) 8efore authorizing FN access toaspecific IS on tbe N I P R N E T o r the Secret Intemet Protocol Routing Network (SIPRNET), Army components w i l l (d^ Ensure the information is properly processed for disclosure. (Tl) Ensure DAAs and data owners concur with the access. (c^^ Ensure the Cc^A documentation for the system is updated to refiect FN access, (c^ Ensure security measures employed adhere to this policy. (^^ Validate tbe identity of each FN authorizedaccess to ISs toensureaccountability of all actions takenby tbe foreign user. (^ Ensure t h e F N f o l l o w s appropriate security policies and procedures and that t b e l A S O possesses the authority to enforce these policies and procedures. 8efore accessing any system, an FN will sign an AUP agreement that includes 7 Acknowledgment of appropriate information security policies, procedures, and responsibilities. 2. The consequences of not adhering to security procedures and responsibilities.

36

AR 2 5 - 2 ^ 2 4 October 2007

^anningB^000^^27^^

^. Identification requirements when dealing withothers through oral, written,and electronic communications, such as e-maiL ^. Department of tbe Army employees or contractors who are FNs and are direct or indirect hires, currently appointed in IA positions, may continue in these positions provided they satisfy the provisions of paragraph414, D O D D 8 5 0 0 1 , D O D I 8500 2, and DOD 5200 2 R; are under the supervision of an l A M who i s a U S c i t i z e n ; and are approved in writing by the D A A and captured in the Cc^A package. FNs assigned into IT positions will be subject to the same (or equivalent) vetting as U.S. citizens. 1^. FNs may hold or be authorized access t o I T H a n d IT lllpositions provided the required background investigation has been completed or favorably adjudicated. 7. Additionally, an FN may be assigned to an IT Iposition only after the D A A w b o owns the system and the data owner who owns the information s i g n a w a i v e r and the assignment has been approved by the C I O / G ^ . T b e approvals w i l l become part of the Cc^A package. Sign and place the waiver in the individual's security file before requesting the required background investigation. Tbe required background investigation must be completed and favorably adjudicated before authorizing IT 1 access to DA systems/networks. 1^. D o n o t a s s i g n F N s t o l T L I T I I , o r l T - I I I p o s i t i o n s on a n i n t e r i m b a s i s b e f o r e a f a v o r a b l e adjudication o f the required personnel security investigation. 1. Generally, an FN o r o f f i c i a l representative is not authorized access to the U.S. controlled SIPRNET terminal workspace.If an authorized foreign official or national working a t a U . S . Army site hasarequirement for accessing the SIPRNET, tbe commander w i l l submit an exception to policy through the D A A to tbe RCIO 1APM, to be forwarded to the HQDA CIO/G 6,and reviewed by the D C S , G 2 F o r e i g n Disclosure Directorate prior to d i s p o s i t i o n . C 1 0 / G ^ will coordinatetberequestwiththe Army staff and forward t o D I S A . T h e s e requests w i l l b e staffecl w i t h t h e presumption ofdenial. Apply the procedures of this section after DISA's approval and any additionalguidance provided by DISA on the connection process for FNs. E mail signature blocks will be automatically generated for all FNs, and include the foreign individual's nationality and position. Tbe approvals will become part of tbe Cc^A package.

Sectional Information Systems Media 4-1^. Protection requirements


d. A l l I S e q u i p m e n t a n d f a c i l i t i e s u s e d forprocessing,handling,andstoringc1assifieddata w i l l b e o p e r a t e d a n d secured where applicable per the DCID 6 / 3 , A R 380^5,this regulation,or.loint DODIIS Cryptologic SCIInformation SystemsSecurity Standards (.IDCS1SSS). ^. A l l Army personnel and contractors w i l l mark, ship, store, process, and transmit classified or sensitive information in accorclance with A R 380 5. c^. Control ISs containing non removable, non-volatile media used for processing classified information. d^. Commanders, Directors, and IA personnel will verify procedures and train users, administrators and security personnel in processes for spillage incidents of higher-level or classified information to a lower level IS. ^. SAs will configure ISs to apply security or handling markings automatically when possible or available. ^ SAs w i l l configure ISs to display the classification level on tbe desktop or login screen (for example, wallpaper,splasb screen) when the device is locked,the user is logged off, or t h e l S is used in spanning m u l t i classification networks through the use of a I ^ V l ^ device ^. A l l Army personnel and contractors w i l l not transmit classified information over any communication system unlessusingapprovedsecurity proceduresandpractices inc1uding,encryption, securenetworks,secure workstations, and ISs accredited at the appropriate classification leveL 4-17. Labeling, marking, and controlling media d. Unless write-protectedor read-only, all personnel w i l l p r o t e c t a n d c l a s s i f y media inserted into a s y s t e m a t t h e highest level thesystem is accreditedtoprocessuntil the d a t a o r m e d i a i s reviewed anddowngraded by t h e l A S O . ^. A l l personnel w i l l clear removable media before reusing in ISs operating at the same or higher protection leveL c:. A l l personnel w i l l mark and control all media devices, peripherals, and ISs as follows: (1) TS or SCI or intelligence data per DCID 6/3, D C 1 D l / 7 a n d . 1 D C S I S S S as applicable (2) Classified media per A R 380^5 requirements. (3) FOUO media per A R 25-55 requirements. (4) Privacy Act media per A R 340^21 requirements. (5) N A T O information per AR 380 5 requirements. c7. Allpersonnel w i l l m a r k a n d c o n t r o l t b e m e d i a o r l S a f t e r d e t e r m i n a t i o n o f the classification l e v e l o f the data placed on the media.lmplement media accountability procedures based on the type o f media and the classification of tbe data as required above.

AR 2 5 - 2 ^ 2 4 October 2007

37

^anningB^000^^2/^2

418. C l e a r i n g , p u r g i n g ^saniti^ing^, d e s t r o y i n g , o r d i s p o s i n g o f m e d i a d. Proceduresfor disposition o f unclassified harddrive media outsideDOD custody w i l l f o l l o w c u r r e n t g u i d e l i n e s addressed in the published 8 8 P . ^. A l l personnel will purge media before reuse in a different environment than tbe one in which they were previously used(new users without a need-to-know f o r t h e o r i g i n a l data)or with d a t a a t a d i f f e r e n t classification or sensitivity level or when tbe drives have met tbe end of tbeir life cycle. Ensure custodial equipment transfer requirements are accomplished. IA personnel will verify that personnel are trained on local procedures. Purging electronic media does not declassify the media, as declassification is an administrative process. c^. IA personnel w i l l conduct random security inspections for violations of removable media physical security measures quarterly. d^. IA personnel will purge unclassified media before consideration for release outside DOD control. ^. lApersonnel will destroy media that has ever contained N S A T y p e 1 cryptographic or COMSECmateriel at end of life cycle in accordance with approved destmction processes. ^ lApersonnel w i l l d e s t r o y S C I m e d i a at end of life c y c l e i n accordance w i t h D C I D 6/3 f o r D O D I I S systems and NSA 130^1 and 130^2 for NSA Cryptologic systems in accordance with approved destruction processes. ^. lApersonnel w i l l destroy media that contained classified material or was involved inaclassified spillage incident at end of life cycle in accordance with approved destruction processes. /i. When it is more cost effective, or to ensure absolute security,destroy media instead of purging or declassifying in accordance with approved destruction processes. 1. The l A M w i l l establish procedures to periodically verify tbe results of any purging and IS release processes. ^'. Spillage recovery procedures for data from higher-classified information to lower-classified systems are addressed in a separately published 8 8 P . Section^ll Network Security 4-19. Cross domain security interoperability The DOD Global Information Grid, Inter-connection Approval Process (GIAP) was created out of the need to providea consistent way to simplify and consolidatethe various connection approvalprocesses.AllDODServices and agencies must comply with these processes when connecting networks of different classification levels. The Top Secret and 8elow Interoperability (TA81) and the Secret and 8elow Interoperability (SA81) processes provide an integrated, comprehensive, andconsistent approach toaddressingtheshared riskassociated with the connection of networksof different classification levels. d. Organizations requiring a cross domain solution must first complete the information on the C1AP Web site (bttps://giap.disa.smil.mil). ^. Organizations requiringacross-domain solution w i l l also contact the N E T C O M / 9 t h S C ( A ) O f f i c e ofinformation Assurance and Compliance, Cross-Domain Solutions Office to provide notification o f the cross domain process initiation. c^. Tbe cross-domain process follows t b e D I A C A P and requires that n e t w o r k s b e f u l l y c e r t i f i e d and accredited and that all associated security devices be certified,tested, and evaluated (CTc^E) in accordance with the NSA compliance standards. Approved standardized cross domain solutions will be acquired through CSLA. Non-standard solutions will require an extensive engineering effort. c^. A l l Army organizations that maintain connections between networks of different classification levels must annually revalidate their connections in accordance with the SIPRNET D A A directives. Contact the SIPRNET Connection Approval Office for current guidance and requirements. ^. Manage all interconnections o f D O D ISs to continuously minimize community risk by ensuring that one system is not undermined by vulnerabilities o f other interconnected systems and that one system does not undermine other systems A l l ISs within interconnected (or trusted networks) will meet networthiness certification 4-20. Network security d. T^B^c^c^c^c^i^i^^.^. Commanders will establish procedures to manage and control access to all ISs, networks, and networkequipment to ensure integrity, confidentiality,availability, non-repudiation, and authentication,regardlessof classification leveL ^. ^^i^i^iB^^BBi^Bi^,^. Positive IA measures ensure all users satisfy tbe requirements specified before granting an individual access (including dial up services and Intemet access) to DOD and Army networks, systems, and standalone computers. (1) 7Bic^i^ic^i^d/. Commanderswill verify and lApersonnel w i l l deny physical and logical accesstoindividuals who cannot meet access requirements. (2) T^B^c^^cjBi^Bi^.^. Proponents for programs that require network services for family members, retirees, and other individuals serviced at Army installations for example, unofficial recreational activities; libraries;educationcenters;or

38

AR 2 5 ^ 2 ^ 2 4 October 2007

^anningB^000^^27^3

Army-Air Force Exchange Service (AAFES) kiosks, should arrange for services througbacommercial Intemet service provider (ISP) or other isolated connection capability. Proponents w i l l coordinate with the installation D O I M for service and the 1AM for IA requirements. These connections are unofficial communications and will be isolated either logically or physically from official DOD and Army NIPRNET networks. (3) /l^l^7^^dB^B^i,^ciBidc:/ivi/i^.^. M W R garrisonactivities dependent upon the Installation L A N for network connectivity in accordance with DODI 1 0 1 5 . 1 0 a n d A R 2 1 5 1 to provide Executive Controled Essential Command Supervision (ECECS) in support of tbe Commanders Fiduciary responsibi1ity,are authorized the use ofNIPRNETconnectivity to support Commander'sMWR activities. Published 88Ps describe the standardsfor acceptable connectivity a n d I A security requirements. (4) ,77.i^Bi^r^c^B^^. .IIM networks that haveNETCOM/9th SC ( A ) p r o v i d e d connectivity will implement the most restrictive and isolating configuration and implementation management principles (inclusive of, but not limited to, separate enclaves and identifications, and tunneledor dedicated connectivity) tothose that are absolutely requiredfor military or support operations as necessary and in compliance with IA requirements in this and other applicable regulations. In order to be entirely separate, .IIM networks must not (d) Utilize Army IP numbering for their end users, servers or network devices. (^^ Utilize army.mil as their logical extension. (c^^ Connect to any local Army network on Army installations. (d^ Require Army network and systems management, systems administration, or maintenance and repair support asa standard level o f service. (^^^ Require Army to provide security oversight, management, or services from tbe A r m y asastandard level o f service. (^ Report l A V M compliance through Army channels. (^^ Receive Army funding for implementation at the location. c^. ^^.^^B^ic^^ic^Bi.^. Supervisors and managers w i l l (1) Ensure transmission of classified or sensitive information via applicable secure means. (2) Authorize commercial ISP accounts per chapter 6, AR 25 1. (3) Ensure there areno cross-connections directly betweenthelntemet and N I P R N E T o f ISs. For example d o n o t permit a modem connection (for example, multi-functional devices such as copier/fax/printer combinations) to a commercial ISP or service while the IS is also connected to the NIPRNET.NIPRNETconnected systems will have this function disabled. (4) Permit direct connections to tbe Intemet to support electronic commerce when those systems will not connect to the N I P R N E T o r tbe SIPRNET c7. ,^^c^i^B^i'r^^B^ci^^c::/i'ciBi^^ri^^^Bi^Bic^/d^^,^. (that portion of the network outside the installation's or activity's controls). Commanders and IA Personnel w i l l utilize tbe following processes on routers, switches, firewalls, and other networking devices to provide protection from extemal networks. (1) Firewalls. Configure firewalls with least-privilege access controls. Layer firewalls at the boundaries between border and extemalnetworks and as needed throughout the architecture t o i m p r o v e t h e l e v e l o f assurance.NETCOM/ 9th S C ( A ) w i l l approve firewallimplementation guidance for use withintbe Army. Every information system should be protected by either an approved host-based or network-based (enclave) firewalL (2) Access control lists. Update and manage access control lists (ACLs) through secure mechanisms and incorporate a ^^deny all, permit by exception" (DAPE) policy enforcemenL (3) Networkconfigurations.lApersonnel will implement networkconfigurationstoremove or block any unnecessary or unauthorized services, software, protocols, and applications such as: LanMan, gaming software,Gnute11a, IRC, ICQ, Instant Messaging, peer-to peer. (4) Ports, Protocols, and Services Management (PPSM). Permit only ports, protocols, and services (PPS) as authorized. Tbe Commander and network management personnel w i l l : (d^ Restrict enterprise andenclaveboundary firewallsandfirewalllike devices to t h e u s a g e o f a p p r o v e d P P S in accordance with the D O D I 8551.1 on PPSM DOD considers PPSs not listed on the D O D PPS T A G list as ^^deny by default." (^^ PPSs designated as ^^bigh risk" are unacceptable for routine use. Prohibit high-risk PPSs unless expressly approved for a specific implementation with defined conditions and risk mitigation strategies. (i^^ PPSs designatedas^^medium-risk"havean acceptable level o f r i s k f o r r o u t i n e u s e whenused with required mitigation strategies. (d^ PPSs designated as ^^low risk" are recommended as best security practices and advocated for use by Army developers in future systems and applications. Not all low risk PPSs are acceptable under all implementations and may require approvaL (^^^ T h e g o a l o f N E T C O M / 9 t b S C ( A ) i s t h e m i g r a t i o n s y s t e m s that u s e b i g h - a n d medium-risk PPSs t o l o w - r i s k PPSs as part of its life cycle management processes through system redesign while maintaining current standards-based applications and requirements (for example, port 21 for ftp, port 80 for Web).

AR 2 5 - 2 ^ 2 4 October 2007

39

^anningB^000^^27^^

(^ N E T C 0 M / 9 t h SC (A) isresponsibleforPPS management and will approveandpublisb Armywidemitigation strategies for PPSs. (5) Domain name service (DNS). TNOSCs w i l l monitor DNS servers for compliance and adherence to DNS policies. Owning organizations w i l l provide bost based intrusion detection monitoring for these servers. (6) Virtual private networks (VPNs). Virtual private networks w i l l require approval to connect and operate from the R C I O u s i n g N E T C O M / 9 t h S C ( A ) C C 8 - a p p r o v e d a n d p u b l i s h e d i m p l e m e n t a t i o n p r o c e s s e s ( w b e n implemented)after documentingawell-defined acceptable use policy,security concept ofoperations, an SSAA risk analysis and management plan, and Networthiness certification, before implementation. (7) Storage area configurations. As developing technologies (for example, storage area networks, collaborative environments,data sharing technologies,webcasting,or real/near-realtime distribution capabilities) are implemented, they must incorporate secure IA principles. Minimum requirements include, but are not limited to tbe listed below requirements. Network management personnel w i l l (d) Obtain approval for Cc^A, CAP, and Networthiness. (^^ Use approved NETC0M/9th SC (A) configuration-management implemented processes, (c:^ Secure the information at rest and in transit and ensure that tbe configuration does not introduce additional risks or vulnerabilities. (c^ Use secure communication and access protocols. (^2^ Implement security controls and validate all user supplied input (^ Implement extranet connections through a multi-tiered and layered approach requiring separate and distinct servers across the environment for each tier, and minimally include 7. User access tier, usually through a Web site that offers static pages and will be SSL enabled as a minimum. 2. Application tier, authenticates authorized users, access, and interfaces between the user and the data. ^. Protection of the database or data tier (for example, fiat files, e-mail), information that is accessed by the application on behalf of the user. ( ^ Incorporate firewalls, filtering, protective, andmonitoring devices (forexample, IPSs, IDSs) at each enclave layer. (Tl) Employ encryption, single-sign-on, tokens, or DOD authorized digital certificates equivalent to thelevel of data accessed or available and adequately passed through the application server to access the data requested. (i) Employ data separation and authentication ^^need to know" measures and requirements. ^. T^B^d/^c^/ic^Bici^iBi^^B^Bid/ii^ri^cjB^^. (portion of tbe network that is directly controlled by the installation or activity). Network management personnel w i l l : (1) Establishtmsts in accordance with the installation Cc^A.There w i l l be no trusted relationships established with any other domains or networks until both are Networthiness certified and approved by tbe respective DAAs and documented in the Ci^A package. (d) The DAAs of tbe participating ISs and the D A A of the overall network ( i f designated) w i l l signaMemorandum of Understanding (MOU). Tbe M O U becomes an artifact to tbe Cc^A package. (^^ The D A A ' s approval w i l l i n c l u d e a d e s c r i p t i o n o f t h e c l a s s i f i c a t i o n a n d c a t e g o r i e s o f information that canbe sent over the respective networks. (2) Connection between accredited ISs must be consistent with the confidentiality level andany other restrictions imposed by the accredited ISs.Unless the I S i s accredited for multilevel operations and can reliably separate and label data, t h e l S i s a s s u m e d t o b e t r a n s m i t t i n g t b e h i g b e s t l e v e l o f d a t a p r e s e n t o n thesystemduringnetworkconnection. (3) Employ identification, authentication, and encryption technologies when accessing network devices. (4) Employ 1ayeredprotective,fi1tering,andmonitoringdevices (for example,firewa11s,IDSs)atenclaveboundaries, managed access points, and key connection points. (5) Scan all installationassetsanddevices, implementprotectivemeasures,andreport noncompliance to RCIOs/ FCIOs as required (minimum is semi annual). (6) Proxy all Intemet accesses through centrally managed access points and isolate from other DOD or ISs by physical or technical means. ^ ^BBidi'/.^^c^icB^i'r^. Allpersonnel w i l l usee-mail systemsfortransmissionofcommunications equivalent t o o r less than the classification level o f tbe IS. (1) IA personnel w i l l (d) Promotesecurity awareness.Train users t o s c a n a l l attacbmentsroutinely b e f o r e o p e n i n g o r d o w n l o a d i n g a n y file from e mail. (^./ ConfigureISs to use encryption when available or as part of tbe global enterprise to secure the content of the email to meet the protection requirements of the data. (c^^ Implement physical security measures for any information media and servers. (c^ Install and configure antiviral and protective software on e mail servers and client workstations.

40

AR 2 5 - 2 ^ 2 4 October 2007

^anningB^000^^27^5

(^1^ Wam users to treat unusual e-mail messages the same way they treat unsolicited or unusual parcels; with caution. (^ Use digital signatures to authenticate a message as needed (non repudiation). (^^ Configure ISs to prevent opening attachments or executing active code directly from mail applications. (2) Personnel w i l l not share their personally assigned e-mail accounts (3) Commanders and Directors may allow the limited use of organizational or group e-mail accounts where operationally warranted. (4) Emailpasswords w i l l d i f f e r f r o m t b e n e t w o r k p a s s w o r d whenused,unti1ag1oba1 P^l initiativeisavailable. (5) A l l personnel w i l l e m p l o y G o v e m m e n t o w n e d o r p r o v i d e d e - m a i l s y s t e m s o r d e v i c e s f o r o f f i c i a l communications. Tbe use of commercial ISP or e mail accounts for official purposes is prohibited. (6) A u t o f o r w a r d i n g of official mail to non-official accounts or devices is prohibited (7) Permit communications to vendors orcontractors for official business and implement encryption and control measures appropriate for the sensitivity o f the information transmitted. (8) l A P e r s o n n e l w i l l c o n f i g u r e systems so that authorized users who are contractors, DOD direct or indirect hires, FNs,foreign representatives,seasonalor temporary hires, andvolunteers have their respective affiliations or positions displayed as part of their official accounts and e mail addresses.
^. 7Bi^^B^Bi^^, 7Bi^B^dBi^^, ^^^B'dBi^^, dBic7 ^^ff^.^^c:i^i^ir^.

(1) A R 2 5 1 outlines requirements and p o l i c y o n t b e u s e o f Govemment-owned or leased computersforaccessto the IntemeL (2) Users are authorized to downloadprograms, graphics, and textual information to aCovemment-owned IS as long as doing so doesnotviolateFedera1andstate1aw,regu1ations,acceptable use, and localpolicies (for example, CM,1A) (3) Govemment-ownedorleasedISs will notuse commercial 1SPs(forexample,CompuServe, Americaon Line, Prodigy) as service providers,unlessaGovemment-acquiredsubscriptionto such servicesisin place and the accessis for official business or meets the criteria for authorized personal use as indicated in AR 25 1, paragraph 6 1. (4) NetworkmanagementandlApersonnel w i l l implement appropriate access, filtering,and security controls(for example, firewalls, restriction by IP address). (5) Network management and lApersonnel willimplement and enforcelocal area management access and security controls.Publicly accessible web sites will not be installed or m n u n d e r a p r i v i l e g e d l e v e l account on any web server. Non-public webservers w i l l b e s i m i l a r l y c o n f i g u r e d u n l e s s operationally r e q u i r e d t o r u n a s a p r i v i l e g e d account, and appropriate risk mitigation procedures have been implemented. (6) Commercial ISP services are authorized to support those organizations identified in paragraph 4^20^(2), above, and no cross or direct connectivity to tbe NIPRNET will exist or be implemented. (7) A l l personnel w i l l protect information not authorized to be released for public disclosure. (8) Extranet and intranet servers w i l l provide adequate encryption and user authentication. (9) Extranetserversandaccesswillbeapproved through theinstallation 1AM,documentedin theCc^Apackage, and approved by the appropriate D A A . (10) N e t w o r k m a n a g e r s a n d l A p e r s o n n e l willconfigure allservers (including Webservers)that are connectedto publicly accessible computer networkssuchas the Intemet, orprotectednetworkssuchas the SIPRNET, t o e m p l o y accessand security contro1s(for example, firewalls,routers,hostbasedIDSs)toensurethe integrity,confidentiality, accessibility, and availability of DOD ISs and data. (11) Commandersand supervisors w i l l comply withFederal, DOD, and DA Websiteadministrationpoliciesand implementing content-approval procedures that include OPSEC a n d P A O reviews before updating or posting information on all Web sites. (12) Network managersand lApersonnel willprotect publicly accessible Army Web sitesby placing thembehind an Army reverse Web proxy server.The reverse proxy server acts a s a p r o x y f r o m t h e intranet tothe protected server, brokering service requests o n b e b a l f o f the externaluser or s e r v e r . T h i s u s e o f a r e v e r s e proxy server providesalayer of protection against Web page defacements by preventing direct connections to Army Web servers. (13) Publicly accessible Web sites not protected behindareverse Web proxy (until moved) will be onadedicated server i n a D M ^ , with al1unnecessaryservices,processes,or protocols disabled or removed. Remove allsample or tutorialapplications,or portions thereof, from the operational server.SupportingRCERTsand TNOSCs will conduct periodic vulnerability assessments on allpublic servers and m a y d i r e c t b l o c k i n g o f the site dependent ontheinberent risk o f identified vulnerabilities. Commanders or assigned l A M s w i l l correct identified deficiencies. (14) A l l private (non public) Army Web sites that restrict access with password protection or specific address filtering willimplement SSL protocols u t i 1 i z i n g a C I a s s 3 D 0 D P I ^ I certificate a s a m i n i m u m . N E T C 0 M / 9 t b S C (A) issues and manages these certificates. (15) Commanders w i l l c o n d u c t a n n u a l O P S E C r e v i e w s of allorganizational Web sites and include these resultsin their annual OPSEC reports pursuant to A R 5 3 ( ^ 1 . (16) To verify compliance with Federal, DOD, and D A Web site administration policies, procedures, and best

AR 2 5 - 2 ^ 2 4 October 2007

41

^anningB^000^^27^^

practices, tbe AWRAC will continuously review thecontent of publicly accessible U.S. Army Web sites to ensure compliance. (See also AR 25 1 for Web site administrative policies.) AWRAC will provide results from these assessments to commanders for corrective actions. /i. Bf^^B-dv^d^ ^^^^c^dB-d^, iBid^^c^, ( ^ 1 ^ ^ (i^^^^ddB^c7, B B i c ^ B i ^ 'c ^ B ^ , Biicji^.^^ (7^.^/1^^ .^i^i/c/i^,^. These devices are primarily introduced to achieve a reduction ofhardware on the desktop and do not provide any IA features. (1) These devices are not authorized for use for cross-domain interoperability (NIPRNET to SIPRNET or SIPRNET-toNIPRNETguardingsolution)networkconnections. See88Psdocumentationon the CIO/C 6 IA Web site for approved items and implementation guidelines (https://informationassurance.us.army.mil). (2) lApersonnel will configure systems to utilize screen-saver lockout mechanisms for I^VM/I^MM switch environments approved by the DAA. 1. 7Bi^B^BBid/idBid.^,^i^B^dBic^^^cici/,^. Allpersonnel willuse only IA security softwarelisted on thelAtoolslist on Army systems and networks. The list of Army approved IA tools is available through tbe IA Web site. Requests for consideration and approval for additional security software packages to be added to thelAtoolslist must be submitted through NETC0M/9thSC (A) channels ATTN: NETC E S T L ^ T T N : 0 1 A c ^ C to C I O / G ^ (1) Installation lAM designated and Army-certified IA personnel may conduct tests under stringent conditions coordinated with the installation DOIM, 1AM, TNOSC, and RCERT, at a minimum. (2) RCIO lAPM approval, and advance notification of tbe servicing RCERT and TNOSC, is required before certified lApersonnel may utilize public domain vulnerability assessment tools (for example, Nessus,Nmap, Saint, or Titan) (3) Organizational fA personnel are prohibited from conducting penetration testing attempts onISs utilizing unauthorized hacker tools or techniques. This restriction is applicable to operational networks and does not apply to those personnel or techniques used in a testing environment for Cc^A, vulnerability assessments of developmental systems, or used in a training environment for personnel certifications on isolated networks. (4) Organizational lAMs can request penetration testingof their networks. Subordinateorganizationsmay request penetration testing through tbeir ACOM/ASCC 1AM to the installation 1AM. (5) The use of ^^keystroke monitoring software of any kind is prohibited, except by LE/CI personnel acting within proper legal authority ^', A^^r^cjB^^iBi^ .^^c^i^B^ii^ /dc^/.^. Tbe following policies apply to networking security tools used on ISs: (1) Establish a security and implementation policy for each protection tool before purchase and implementation. (2) Implement security tools within tbe security perimeter defensive architecture with NETC0M/9th SC (A) approval. (3) Limit login access to intemetworking devices to those individuals who operate and maintain those devices. (4) Review configuration and audit files of security intemetworking tools weekly. (5) TheNETC0M/9tb SC (A), in coordination w i t b C I O / G ^ and tbe ACERT,operatesdetectionandprotection devicesfor networks connectedtotheN1PRNET.A1thougbNETCOM/9thSC (A) owns,operates,andmaintainsthe enterprise devices, this does not preclude tbe Command, DOIM,or activity lApersonnel from managing and analyzing local networks or data. Local management of an IDS/IPS is recommended with notification to tbe DOIM and/or TNOSC.The notification willdocument tbe operationalrequirement,theintent of monitoring, andthe deviceutilized. Staff the notification to the RCIO lAPM and submit to the supporting DOIM and RCERT/TNOSC. The requesting activity is responsible for providing the hardware andsoftware necessary. All independent installationsof IDS/IPS technologies will be configured to also support enterprise sensing and waming management activities. Coordinate the configuration and reporting requirements with tbe supporting RCERT/TNOSC.
^. Tdc^/ic^d/ .^^.^/^BBi.^.

(1) Tactical systems, including weapon system and devices integral to weapon or weapon support systems, that include features normally associated with an ISwill implement the requirements of this regulation,DODI 8500.2, and Interim DIACAP. (2) When one or more of tbe minimum-security requirements are impracticalor adversely impose risk of safety-ofuse because of the function and design of the system, the situation will be addressed in the Cc^A package and considered by the CA and the DAA in determining the CA recommendation and the DAA authorization decision. (3) Mechanisms must be available to render the IS inoperable in case of imminent capture by hostile forces. (4) Tactical networks connecting to standard tactical entry point (STEP) sites, garrison, or other fixed networks must be compliant with all security requirements (for example,configurations, approved software,Cc^A) before connection. They will be protected by access controls and intrusion prevention and intrusion detection systems in the same manner as garrison network defenses described earlier and will implement a DiD strategy.

42

AR 25-2^24 October 2007

^anningB^000^^277^

SectionVIII Incident and Intrusion Reporting 4-21. Information system incident and intrusion reporting
Incidents may result from accidental or deliberate actions on the part of a user or extemal infiuence. Evidence or suspicion of an incident, intmsion, or criminal activity will be treated with care, and tbe IS maintained without change, pending coordinationwithIA,ACERT/RCERT,andLE/CIpersonneLCommanders and lApersonnel w i l l enforce tbe policies goveming unauthorized use of computer resources. A l l personnel w i l l report all potential or malicious incidents.Time-sensitive actions are necessary to limit the amount ofdamage or access.Commanders and lApersonnel w i l l r e p o r t l S i n c i d e n t s t o extemal agenciesto assist LE or investigative agencies,and assist incompiling supporting evidence, impact assessments,associatedcosts,containment viability,anderadicationandreconstmctionmeasuresto effectively manage the breach and provide evidentiary material for prosecution. d. A l l personnel will protect IS incident reports as a minimum FOUO or to the level f o r w h i c h tbe system is accredited. ^. IA personnel will validate IS incident reporting procedures annually for all users, c^. A l l personnel w i l l report IS incidents or events including, but not limited to (1) l^nown or suspected intrusion or access by an unauthorized individual. (2) Authorized user attempting to circumvent security procedures or elevate access privileges. (3) Unexplained modifications of files, software, or programs. (4) Unexplained or erratic IS system responses. (5) Presence of suspicious files, shortcuts, or programs. (6) Malicious logic infection (for example, virus, worm, Trojan). (7) Receipt of suspicious e mail attachments, files, or links. (8) Spillage incidents or violations of published 8 8 P procedures. c^. Aserious incident report (SIR) w i l l be generated and reported p e r A R 190-45 under the following conditions (1) Tbe incident poses grave danger to tbe Army's ability to conduct established information operations. (2) Adverse effects on the Army's image such as Web page defacements. (3) Access or compromise of classified, sensitive, or protected information (for example. Soldier identification information (SSN), medical condition or status, doctor patient, or attomey client privilege). (4) Compromise originating from a foreign source. (5) Compromise of systemstbat may risk s a f e t y , l i f e , l i m b , o r h a s t h e p o t e n t i a l f o r catastrophic effects,or contain information for which the Army is attributable (for example, publicly accessible waterways navigational safety information from the USACE). (6) Loss of any IS or media containing protected or classified information. 4-22. Reporting responsibilities d. An individual who suspects or observes an unusual or obvious incident or occurrence will cease all activities and will notify his or her SA/NA, lASO, or 1AM immediately. ^. I f tbe SA/NA, I A S O , o r 1 A M i s not avai1able,the individual w i l l contact his or her supporting installationlAM and theater RCERT c^. Any SA/NA, lASO, or l A M w h o o b s e r v e s o r suspects an incident or intrusion, or receives information on an incident,wi111ogical1y isolate the system,prohibit any additional activities on or to the system, and immediately notify his or her supporting RCERT/TNOSC. Take no additional actions to investigate the incident until directed by the RCERT c7. Isolationincludespbysical isolation(unp1uggingthenetworkconnection),restrictinganydirectphysica1access, and logical isolation (blocking the IP at security routers or firewalls both inbound and outbound) from the network to the system. ^. I f the RCERT is not available then the SA or lASO w i l l contact the A C E R T d i r e c t l y . I n addition, report per local supervisory reporting policies in effecL ^ Each R C E R T i s r e s p o n s i b l e f o r c o l l e c t i n g a n d r e c o r d i n g a l l therequiredinformation, coordinatingall incident response procedures between LE/CI personnel and the organization, and conducting all intrusion containment, eradication, and verification measures. ^. T h e l S i n c i d e n t reporting format and additional reporting requirements are available on the A C E R T a n d supporting RCERT N1PRNET/SIPRNET Web sites 4 - 2 3 . C o m p r o m i s e d ir^formation s y s t e m s g u i d a n c e d. When directed by RCERT,all ISs determined to be compromised either through unauthorized access or malicious logic w i l l b e r e b u i l t f r o m o r i g i n a l m e d i a , p a t c h e d , a n d s c a n n e d f o r c o m p l i a n c e b e f o r e r e i n t r o d u c t i o n to thenetwork. ^. lApersonnel w i l l scan all similar ISs or devices o n t b e compromised networkfor configuration compliance or

AR 2 5 - 2 ^ 2 4 October 2007

43

^anningB^000^^27^

vulnerability identification and immediately correct vulnerable systems. I f during tbe course of this assessment additional ISs are identified as compromised, lApersonnel w i l l report these system as compromised and take no further action. c^. Networks may require re accreditation, under the DIACAP, following any successful compromise. c7. Specific details and actions for a compromised system are available on the ACERT Web site.

Section 1^ Information Assurance^ulnerability Management 4-24. Information assurance vulnerability management reporting process
d. ^^Bi^B^d7 Tbe Information Assurance Vulnerability Management (1AVM) Program is the absolute minimum standard for all ISs, not the preferred end state which is a proactive methodology o f maintaining, patching, and updatingsystemsbeforenotificationor exploitation. 1AVM requirestbecompletionof four distinctphasesto ensure compliance. These phases are (1) Vulnerability identification, dissemination, and acknowledgemenL (2) Application of measures to affected systems to make them compliant (3) Compliance reporting. (4) Compliance verification. ^. 7^^,^^dii,^i/ii/i^i^,^.TheCI0/G^ w i l l be tbe POC to acknowledge receipt (within five days) o f D O D CERT issued lAVMmessages,aggregate compliance andwaiver data, and report (within 30 days or as directed) t o D O D . Systems and processes for collecting detailed information and for implementing l A V M are the responsibility of every IA person. c^. BfB^BBi^ iBBi^/^BBi^Bird^idBi d^7Bfl^^. ACERT/A GNOSC w i l l serve as the Army's focal point for initiation o f t h e 1AVM process. (1) l^ii/ii^B^d^i/iriB ici^^Bi/i^c'd^idBi, c7i,^.^^BBiiBid^idBi, dBic7 dc:^B^di^/^ci^Bii^Bi/. ACERT/A GNOSC w i l l issue Army 1AVM messages. Thereare t h r e e t y p e s o f D O D I A V M messages: alert ( I A V A ) , b u l 1 e t i n ( I A V 8 ) , andTecbnical Advisory (TA). DOD has restricted tbe use of these terms to the l A V M program only. (d^ l A V A s w i l l establish mandatory suspense dates for acknowledgement and compliance, corrective actions to negate vulnerabilities, and implementation of additional CND requirements. (^^^ 1AV8s willestablish mandatory suspense datesforacknowledgementyetallowcommandersand lApersonnel fiexibility for implementation o f t h e correctiveactions to negate vulnerabilities or implementation o f CND requirements. Corrective actions are required to be completed, but not reported. (c^^ Information AssuranceTechnical Tips ( I A T T s ) ( A r m y designation) allow commanders and lApersonnel fiexibility for acknowledgement and implementation to negate vulnerabilities or implement C N D requirements.Acknowledgement and compliance are not reported. Corrective actions are required to be completed but not reported. A l l personnel responsible for implementing tbe l A V M process w i l l join tbe A r m y l A V M Community Group on Afi^O to receive messages.Use only official e-mail accounts for this distribution list lAVMmessages are available on tbe asset and vulnerability tracking resource (Ac^VTR) Web site. (2) 7Bf^^ c:dBBi^/idBic^^. Commanders, PEOs, PMs, and designated IA officers w i l l disseminate implementation guidance and ensure compliance to 1AVM requirements. Commanders or IA personnel w i l l provide contractors, contracted support, or other personnel (as necessary) l A V M information as required to support compliance requirements. 4-25. Compliance reporting d. The RCIOs, ACOMs/ASCCs/DRUscommanders, PEOs, P M s ( o r t h e i r 1 A officers), andgarrison commanders w i l l ensure that messages are acknowledged,corrective actions are implemented,extensions are requested, compliance i s v e r i f i e d , a n d r e p o r t i n g i n f o r m a t i o n i s e n t e r e d i n t o A c ^ V T R . Within 10 calendar d a y s f r o m t b e date of t h e l A V M message, SA/NAs will conductabaseline assessment scan for affected assets and enter identified assets into A i ^ V T R . RCIOs w i l l oversee 1AVM compliance reporting for their regions or commands. ^. PEOsand PMs w i l l implement correctiveactions f o r l A V M vulnerabilities that apply tosystemsunder their controL Tactical systems willdocument compliancemethodology i n a c l a s s i f i e d S c o r e c a r d a n d POAc^M aspart of tbeir Cc^Apackage. DAAs w i l l r e s o l v e c o m p l i a n c e i s s u e s w h e r e i t may result insafety or performance issues o f a combat system that are operationally unacceptable. c^. I f corrective actions required by issued alerts adversely affect operations, l A M s or their designated representatives (for example, affected SAs or l A N M s ) w i l l conductarisk assessment for the commander and contact their supporting RCIO, l A P M , or l A M Tbe RCIO, 1APM, or 1AM w i l l contact the C I O / G ^ through A C E R T / N E T C 0 M / 9 t h S C (A) to request an extension, not to exceedl80 days,and to develop and implement an acceptable altemative security solution. Tbe altemative security solutions must be coordinated with tbe A C E R T / N E T C 0 M / 9 t h S C (A) before approval by the appropriate D A A . This extensionrequest w i l l includeriskmitigationsteps taken t o r e d u c e o r e l i m i n a t e t h e l A V M -

44

AR 2 5 - 2 ^ 2 4 October 2007

^anningB^000^^279

identifiedrisksuntil an acceptablesolution is implemented.Tbe extensionrequest w i l l includea POAc^M (get well plan) to be considered in the CA risk determination. c7. l A V M compliancereporting will beaccomplished through the Army's Ac^VTR. To meet DOD requirements, register specific system/asset owners and SAs, including applicable electronic addresses, in A i ^ V T R . ^. A l l I A V M c o m p l i a n c e reporting of classified, tactical,or operationally sensitiveISs w i l l be through the Ac^VTR when located on the SIPRNET. 4-25. Compliance verification 1AVA Compliance Verification Teams (CVTs) will conduct short-notice inspections of randomly selected units to verify compliance with 1AVM messages. d. M e m b e r s h i p i n t h e C V T m a y i n c 1 u d e a C I 0 / C 6 T e a m C h i e f ; a v u l n e r a b i l i t y s c a n t e c h n i c i a n ; U . S . Army Audit Agency representatives, operating under A R 36^2 and A R 36^5; and U.S. Army Criminal Investigation Command representatives operating under AR 195 2. ^. In addition to reporting requirements under A R 36-2, A R 36^5, and A R 195 2, tbe C V T w i l l report to tbe i n s p e c t e d u n i t , t b e C I O / G ^ , a n d t h e S e n i o r A r m y Leadership.Tbe C I O / G ^ w i 1 1 p r o v i d e a c o p y t o t h e appropriate A C O M , ASCC, PEO, and P M C I O s c^. Findings require a reply by endorsement on the corrective actions taken by tbe inspected command. 4-27. Operating noncompliant information system Commanders, organizationdirectorsand responsible individuals forexample; D A A s , lAPMs, or l A M s , will operate noncompliant assets only with an approved Mitigation Action Plan (MAP) and POAc^M. MAPs are temporary measuresapprovedtopermit additional time or developsolutionstobringnoncompliant assets into compliance.The P O A i ^ M identifies t h e g e t w e l l p l a n i n c l u d i n g t h e s c h e d u l e . Noncompliantassets without a n a p p r o v e d M A P w i l l b e disconnected, blocked, or otherwise have the vulnerability mitigated. Organizations and individuals operating noncompliantassets areacceptingrisks,accountability,andresponsibility for intemal andextemal impacts to thenetwork in the event tbe system is compromised or the vulnerability is exploited. d Establisbacapability to implement or effectively mitigate the risk posed by critical vulnerabilities as identified in 1AVA notifications. ^. MAPs w i l l address specific actions taken to mitigate risks identified in l A V A messages. c. MAPs are tracked in Ac^VTR Database. Approvals and denials are granted at the appropriate D A A , D O I M , A C E R T / A ^ N O S C , and HQDA levels, and in some instances approvals are reserved only for the DCS, C 3/5/7. c^. MAPs focus on systems not able to comply within the period specified in the 1AVA notification message. Organizations w i l l first use all tbeiravailable resources toensure vulnerable systems are patchedbefore requesting extensions. MAPs w i l l refiect a detailed reason, operational impact statement, efforts to bring the systems into compliance, and a mitigation strategy. ^ First M A P requests:The D A A for the I C A N may approve MAPs up to 30 days from the compliance date on the l A V A message and includes the number o f impacted systems not able to comply within period specified in the notification message.Tbe First M A P begins the day after tbe original lAVAcompliance suspense and is valid for up to 30 days. Approval will be based on a sound M A P that minimizes tbe risk of compromise to Army networks. ^ Second MAPrequests: This M A P w i l l b e v a l i d u p t o 60 days after tbe enddate of thelocal D A A approved30daysand w i l l r e f i e c t t b e n u m b e r o f r e m a i n i n g s y s t e m s n o t able t o c o m p l y after t h e 3 0 d a y approval from the local D A A . T b e D i r e c t o r , N E T C O M Office of Information AssuranceandCompliance(OIAc^C), approvessecond MAPs with A C E R T / A C N O S C A2TACrecommendations ^. Third M A P requests:Tbe CIO/G 6approves third MAPs.They are reserved for rare cases where circumstances have p r e v e n t e d c o m p l i a n c e w i t h a n l A V A d u r i n g the t i m e l i n e s f o r f i r s t o r second MAPs, toincludemissionrequired legacy systems.Third MAPs begin the day after the second M A P ends and mns f o r a p e r i o d directed by tbe approval authority, for a maximum of 2 years. /i. The A i ^ V T R keeps a history file of all M A P actions. Open MAPs will be reviewed and revalidated within Ai^VTR. 1. 1 f a n 1 A V A m e s s a g e s t a t e s : D C S , G 3/5/7approva1 only, then the M A P can only be approved by the D C S , G 3/ 5/7 with recommendations accepted from the local D A A , the NETCOM OlAc^C Director, and the CIO/G 6.

Sections Miscellaneous Provisions 4-28. vulnerability and asset assessment programs


Several Vulnerability Assessment Programs and services are available throughout tbe Army. The ACERT/A GNOSC providescomprehensivesupport in t h e a r e a s o f CND and IA Vulnerability Assessments; t h e U . S . CommunicationsElectronicsCommand(CECOM)providesassessmentsandsupportin the areas of platforms a n d I A architecture; the

AR 2 5 - 2 ^ 2 4 October 2007

45

^anningB^000^^2^0

Army ResearcbLaboratory (ARL)may provide support in the areas ofsurvivabi1ityandletba1ity;andC1D provides comprehensive crime prevention surveys. d. All scans will be coordinated within AOR between the initiating or oversight component and the supporting RCERT/TNOSC ^. Prohibit scans across network segments protected by a TNOSC security router or IDS, unless specifically coordinated and approved b y N E T C 0 M / 9 t h S C ( A ) c ^ . Only trained or product certified personnel will use assessment software. c^. 8efore conducting mapping or scanning ofanetwork,war dialing, or war driving, tbe lAM will notify the DOIM and the servicing RCERT/TNOSC with the purpose, start, type and duration of the scanning activity. ^ Personnel will provide a copy of the assessment results to tbe servicing DOIM and RCERT/'TNOSC. ^ Installations that donot have the expertise,requisitecertification1evel,orresourcestoscantheirownnetworks may request an assessment scan through their supporting RCERT/TNOSC. ^. Commanders,lApersonnel and network management personnel will treat unannounced or unauthorized scanning of networks as potential intrusions and report when detected. Persons conducting unauthorized scans of Army networks may be subject to administrative actions or criminal prosecution. /i. lAMs and lASOs will establish procedures to scan their networks quarterly to identify assets; application, network, and operating system vulnerabilities; configuration errors; and points of unauthorized access. 1. Train all IA participantson approved scanning tools andassessors will sign an acknowledgment of complete understanding of the ^^mles of engagement" before conducting any scanning activity. For example (1) No reading of personal data on networks while conducting a vulnerability assessment (2) No penetration testing. (3) No denial-of-service attacks or tests. (4) No scanning outside local network enclave borders. ^. UtilizetheDoitYourselfVulnerability Assessment Program (D1TYVAP) to assess configurations,comp1iance, asset identification,unautborizedconnectivity,and security vulnerabilities within local network enclave borders.DITY VAP assessments prohibit the use of data cormption, data manipulation, data denial, examination of data content, denial of service, or ^^hacking" and penetration tools and techniques. ^. Information Operations VulnerabilityAssessments Division (I0VAD)81ueTeam and RedTeam Programs.Tbe 1^^ 10 CMD 10VAD offers assessment support in the areas of information management and security, in which focused efforts assess IA through the elements of OPSEC, C00P,1NF0SEC, COMSEC, and CND In addition, 10VAD Red Teams are available to challenge and assess readiness. 7 RCERTs andTNOSCsmay conduct nonotice remote scanning across enterprise boundaries, inc1uding,butnot limited to, 1AVM support, threat or asset identification, or vulnerable systems and services identification, with or without coordination with commanders or lApersonnel.Assessment scanning from authorized extemal organizations is normally conducted from documented and readily identified systems IA personnel will implement verification proce dures to validate,but not binder or deny,these scanning activities.RCERTsand TNOSCs may block or deny access to vulnerable systems identified during these scans until corrections have been made. 4-29. Portable electronic devices Portable electronic devices (PEDs) are portable ISs or devices with or without the capability of wireless or LAN connectivity.These include, but are not limited to,cell phones, pagers, personal digital assistants (PDAs)(for example, PalmPilots, PocketPCs),1aptops,memory sticks, thumb drives,andtwo-way radios. Currenttechno1ogies(infrared, radio frequency, voice, video, microwave) allow tbe inclusion of numerous capabilities within a single device and dramatically increases the risks associated with IS and network access. Management of these devices will be as follows: d. PEDs containing wireless communicationsorconnectivity, audio, video, recording, ortransmissioncapabilities will be probibitedfrom areas where classifiedinformationis discussed or electronically processed,unless specifically documented in tbe Cc^A package and permitted as an exception by the DAA and all classification, access, and encryption restrictions are enforced for the PED as they would be for a classified device. ^. Implement identification and authentication measures at both the device and network level if connectivity is approved. Voice does not require DOD Pl^l IA. c^. PEDs will support PI^Ldigital certificates,FIPS,or NSAvalidated crypto modules or data encryption standards appropriate for the classification level of the information processed. c7. Provide all PED users with security awareness training regarding the physical and information security vulnerabilities and policies of the device. ^. Contractor provided or owned PEDs (if approved) will be stated as mission essential in contracts, and will meet all Cc^A standards and are subject to inspections and IA requirements as any other IS. ^ Employee owned PEDs are prohibited for use in official communications or connections to Army networks.

46

AR 25-2^24 October 2007

^anningB^0001^2^^

4 - 3 0 . ^ i r e l e s s l o c a l area n e t w o r k s WirelessLANs areextensionsofwirednetworks and w i l l implement lApoIiciesandprocedures inaccordance with this and other applicable regulations. Non-compliant wireless LANs w i l l have migration plans documented in POAc^Ms, that ensure thesystems w i l l meet theminimumrequirements o f t h i s p o l i c y . The D A A will consider the POAc^M in tbe authorization decision. A l l Army organizations andactivities operating wireless local area networks ( W L A N s ) w i l l comply with the following and as supplemented in 88Ps: d. Pilot and fielded wireless LANs and PEDs with L A N connectivity w i l l meet the same Cc^A and IA security requirements as wired L A N ISs in accordance with this regulation, A R 380 53, AR 25 1, and DODI 8500.2. ^. DOIMs and l A M s w i l l verify the IA Cc^A authorization of W L A N s that connect to the installation. c^. SOs w i l l configure and install wireless solutions to preclude backdoors. d^. Where wireless LANs are implemented or proposed, thorough analysis, testing, and risk assessments must be done to determine the risks associated with potentialinformation intercepts or monitoring,TEMPESTemanations, and network vulnerability. ^. Tbe use of A V software on wireless-capable ISs and devices is required. ^ Users will be authenticated to the devices authorized for W L A N . ^. D O I M s a n d l A M s will control, monitor, andprotect wireless accessgateways with firewallsand IDS devices. /i. Certify all wireless devices procured with Army funds for spectrum supportability through the Military Communications Electronics 8oard ( M C E 8 ) per D O D D 5000.1 and AR 5 12. Submit spectmm supportability requests to NETCOM/9th SC (A), A T T N : NETC E S T V , S u i t e 1204, 2461 Eisenhower Avenue, A1exandria,VA 22331-0200 1. D O I M s a n d l A M s w i l l terminate w i r e 1 e s s a c c e s s p o i n t s a t a b o u n d a r y d e v i c e i n t h e D M ^ , n o t in tbe intemal enclave. ^. Certify that W L A N frequencies meet any host nation or Govemment restrictions, 4 - 3 1 . E m p l o y e e - o ^ n e d information systems d. Prohibit tbe use of employee owned information systems (EOISs) for classified or sensitive information. ^. Theuse o f a n E O I S for ad-hoc(onetime or infrequent) processingofunclassifiedinformationisrestricted and only permitted with 1 A M , D A A , o r commander approvaL Requirements for use and approval are included i n A R 25 1. c^. I f approved for ad hoc use, EOISs processing official data w i l l comply with all security provisions of this regulation. Computer owners will implementlAcountermeasuresrequired by thisregulation,specifically A V a n d I A software and updates, o r b e prohibited from such activity. A l l processed data will be removed from the EOIS and personnel w i l l sign compliance statements that the data was removed. c7. Include security requirements and authorized software availability for the use and safeguarding of EOISs in security training. ^. Contractor owned and operated ISs w i l l meet all security requirements for Govemment-owned hardware and software when operating on tbe A E I , managing, storing, or processing Army or DOD data or information, or conducting official communications or business. ^ Scan all data processed from an EOIS before inclusion or introduction into the network. ^. Prohibit all remote access for remote management from any EOISs. 4 - 3 2 . M i s c e l l a n e o u s p r o c e s s i n g ec^uipment There is a variety of non-COMSEC approved miscellaneous process equipment (MPE) involved with classified or sensitive information. This includescopiers, facsimile machines,peripherals, electronic typewriters, wordprocessing systems,andotbers.Activitiesmust identify thosefeatures,parts,or functionsusedtoprocessinformationthat may retain all or part of the information. Security procedures must prescribe the appropriate safeguards, in accordance with A R 380 5, chapter 7 to prevent unauthorized access to either tbe information or equipment d. Digital copiers, printers, scanners, faxes, and similar IS devices employ embedded bard-drives or other media that may retain residual classified or sensitive information. Include these devices as part o f the Cc^A process. ^. Destroy replaced equipment parts per classification level when removed. c^. Cleared and technically qualified personnel will inspect equipment before equipment removal from protected areas. c7. Peripheral devices (forexample, printers, copiers) are subject to 1AVM compliance and accreditation. ^. Peripheral devices (for example, printers, copiers) are subject to sanitizing, purging, or disposition restrictions as published.

AR 2 5 - 2 ^ 2 4 October 2007

47

^anningB^0001^252

^i^a^ter 5 certification an^ Accreditation


5 - 1 . Certification and accreditation overview d. This chapter outlines the policies goveming the Information Assurance Certification and Accreditation ( l A C c ^ A ) o f I S s which includes networks in accordance with D O D D 8 5 0 0 1 , D O D I 85002,P.L. 100 2 3 5 , 0 M 8 C i r c u l a r A 130, D O D D 522022, DOD 522022M, DOD 5220 22 M S U P , a n d 44 USC 3541 as it pertains to Ci^A The goal of IA Cc^A is to understand the vulnerabilities, determine the risk introduced through operations or connections of the system, and provide appropriate information f o r t h e D A A to consider tbe IA risk in contemplating an approval to operate decision. This section streamlines some of the process to enable those risk determinations to be made consistently, economically and timely. ^. Cc^A policy is found in this regulation and is supported by the guidelines located in the Cc^A 8 8 P (1) The l A C c ^ A Process 8 8 P . (2) T h e I A C c ^ A D A A 8 8 P (3) The l A C i ^ A C e r t i f i c a t i o n Authority ( C A ) 8 8 P . (4) T h e I A C c ^ A Agents o f tbe Certification Authority ( A C A ) 8 8 P c^. A l l ISs w i 1 1 b e c e r t i f i e d a n d a c c r e d i t e d i n a c c o r d a n c e w i t h t h e 1 n t e r i m D I A C A P d o c u m e n t i n g c o m p 1 i a n c e , a t a minimum, w i t h t b i s r e g u 1 a t i o n , a n d D O D 1 8500.2 l A c o n t r o l s associated with the s p e c i f i c M A C a n d c o n f i d e n t i a l i t y leveL Ci^A w i l l b e p e r f o r m e d a c c o r d i n g t o the type accreditationprocessorbytbesite-basedaccreditationprocess. Tbe IS being accredited may be considered as a single system, system of systems, enclave or network. c7. Army DODIISsystems w i l l be certified and accredited by t h e D C S , G - 2 f o r P L 1 , 2 a n d 3 inaccordance with DCID 6/3 ^. Information systems currently operatingunderan ATO will not need to redo the accreditation underthis new process until such time as the approval expires or is otherwise revoked.This could be the result o f 3 y e a r s expiration, annual revalidation results, caveat in the A T O , major change in tbe system, its environment or operations, or as required by t h e D I T S C A P . ^ Tactical IS mustaddress tbeir tacticalandgarrisonconfigurationandenvironment ( i f they i n t e n d t o o p e r a t e i n garrison on a live network or with live data) during the Cc^A process. ^. Tactical ISthat are subject to deployment must havea^^fiy away" package of IA information to provide to their network service provider as required.Refer to tbe C c ^ A 8 8 P for details o n t b e composition of t h e f i y away package. /i. A G o v e m m e n t S O w i l l b e i d e n t i f i e d for each I S u s e d b y o r in support of tbe A r m y . T h e S O i s responsiblefor ensuring tbe security o f t h e l S as long a s i t r e m a i n s i n Army inventory,or until transferred (temporarilyor permanent1y)toanotber Govemment personor organization and suchtransfer is appropriately documented andprovided as an artifact to the accreditation package. 1. I f t h e SO cannot be identified, then the IS sbouldbedeemedunnecessary a n d r e m o v e d f r o m Army inventory. ^'. Wbense1ectingsoftware,priority s b o u l d b e g i v e n t o software with vendor integrity statements (VlSs)that verify that vendor software w i l l not affect the integrity o f operating systems when utilizecf. ^. When selecting software priority should be given to corporations that develop, manufacture and manage software that are U.S. owned, controlled or infiuenced. /. Foreign-Ownership, Control, or Infiuence (FOCI) will be taken into account prior to software development, integration, or purchase and identified in tbe IS Cc^A package. BBi. Published or established N E T C 0 M / 9 T H SC (A) CC8 and Networthiness certification requirements will be incorporated during the Cc^A process.

5-2. Certification
d. Authority and responsibility for certification is vested in the Army Federal Information Security Management Act (FISMA) Senior IA Officer ( S I A O ) T h e Director OIAc^C, NETC E S T L ^ a s appointed as the F I S M A S I A O by the D A C 1 0 / G - 6 and w i l l be tbe single Army C A . T h e Army C A i s tbe single authority for CA recommendations to all Army DAAs with the exception o f IS completing Ci^A under the DOD1ISS Program. /i. The Army C A w i l l m a i n t a i n a l i s t o f q u a l i f i e d Govemment organizations and labs,astrusted Agents of tbe CA ( A C A ) , t o p e r f o r m t h e certification activities. Tbereimbursable ACAs are availabletoprovideSOs with certification capabilities.While the lead A C A w i l l report the results of the certification activities to the CA, only tbe C A w i l l make tbe operational IA risk recommendation to the D A A in support of an approval to operate decision. c : ^ . Organizations can request appointment as an A C A by following the process in tbe IA Ci^A A C A 8 8 P . c7. It is the responsibility of the SO to plan and budget for IS certification and accreditation efforts. ^. It is the responsibility of tbe SO to select from the approved A C A list an A C A organization that best supports tbe program requirements, such as those of cost and schedule. ^ IA certification considers

46

AR 2 5 - 2 ^ 2 4 Ocfobec 2007

l^anningB^000^^2^3

(1) The IA posture o f t h e IS itself, that is the overall reliability and viability o f t h e IS plus acceptability o f t h e implementation and performance o f IA mechanisms or safeguards that are inherent in the system itself (2) How the system behaves in the larger information environment (for example, does it introduce vulnerabilities to the environment, does it correctly and securely interact with the information environment management and control services). ^. The A C A certification determination is based on actual results of the validation and the risk introduced by noncompliance with stated requirements. /i. Certification represents proof of compliance with this regulation and tbe D O D I 8500.2 IA controls for tbe appropriate M A C level and the Confidentiality level, a t a minimum. Noncompliance w i l l require t h e c r e a t i o n o f a POAc^M to bring tbe IS into compliance. 1. DCS, G 2 is the Service Certifying Organization for the Army DODIIS Program up to PL 4. 5-3. Tailoring d. The time and labor expended in the Cc^A process must be proportional to tbe system mission assurance category ( M A C ) level, confidentiality level, and number o f users. ^. Tbe activities defined in tbe D I A C A P are mandatory. However, implementation of these activities and their output should be tailored as appropriate and integrated with other acquisition activities and documentation where applicable. c^. Compliance with Information Assurance controls is notatailorable factor. A l l applicable lAcontrols must be met either by incorporation, inheritance, waiver or exception.

5-4. Accreditation
d. Accreditationistheofficialmanagementauthorizationto operate a n I S o r network a n d i s b a s e d , i n p a r t , o n t b e formal certification o f the degree to which a system meets a prescribed set o f security requirements. Tbe Cc^A statement affixes security responsibility associated with operational IA risk with the accrediting authority. ^. Accreditation must address each operational environment of t h e l S f o r both fixed and deployable configurations. For example, a n I S m a y operate atone confidentiality level i n a s t a n d a l o n e m o d e a n d c o n n e c t t o a g l o b a l n e t w o r k a t another confidentiality leveLTheCc^A must clearly establish procedures for transition between tbe two environments. Multiple operationalenvironments can result in multiple accreditations f o r a s i n g l e l S i f different D A A s are involved. However, in theconceptoftbeoperationsdocument,asingleaccreditation thataddressesall variationsissufficienL Refer to the Cc^A 88Ps for further guidance and procedures on IS accreditation. c^. Site-based accreditations are appropriate f o r a s i n g l e unit or f o r a L A N with appropriately accredited ISs generally performing similar functions with similar equipmenL c^. Type accreditations are appropriateforlSfielded to multiple users under thePEO/direct reporting PMstructure to multiple locations. Additional1y,type accreditations are appropriate wbeneverasingle office or agency is responsible for fielding an I S t o m u l t i p l e Army users at multiplelocations.Type accreditationsmust indicate whether they area generic accreditation of centrally fielded IS or an operational accrecfitation of IS that are procured or obtained locally, and whether a single identifiable system or group of similar systems is covered.

5-5. Recertification and re-accreditation


d. Information systems w i l l be recertified and reaccredited once every three years.Each of tbe lAControls assigned to the information system must be revalidated. The results o f validation tests o f IA Controls conducted during an annual review may be used in tbe recertification and re-accreditation o f the information system i f performed within one year. ^. N o t l e s s t h a n annually, t h e S O w i l l p r o v i d e a writtenstatement or digitally s i g n e d e - m a i l t o t h e C A t b a t e i t h e r confirms the effectiveness of assigned lAControls and their implementation,or recommends changes or improvements to the implementation of assigned 1Acontro1s,the assignment of additionallAcontrols or changes or improvements to the design of the IS itself c^. Thisannual revalidation may b e p e r f o r m e d a s a selfassessmenL However,a tbirdparty independentevaluator must perform the validation every 3^^year, at a minimum. c^. The CA w i l l review the written statement and make a recommendation to the D A A . ^. T h e D A A willevaluate the recommendation,mission, and information environment indications,and determinea course of action. ^ The D A A may use any favorable annual review to re-authorize processing under tbe current authorization termination date ( A T D ) or adjust tbe A T D f o r a n additional year. ^. The D A A may use any unfavorable annual review to downgrade the accreditation status to: (1) A n l A T O and reset A T D to 180 days. Tbe SO will prepareaPOAc^Mexecutable within the 180 days (2) Denial ofauthorization to operate (DATO). Operationof the IS will be halted until the IS isbrought into compliance.

AR 2 5 - 2 ^ 2 4 October 2007

49

^anningB^000^^2^^

^. The results of the annual reviews w i l l be reported i n t h e Army PortfolioManagement Solution,asappropriate, and become part of the IS accreditation package until tbe IS is decommissioned. 5-5. Accreditation documentation d. The SO w i l l f o r w a r d to the receiving ACOM/ASCC,installation,and/or a c t i v i t y D A A and applicableNETCOM R C I O , a c o p y of theaccreditationdecision,supportingCc^AdocumentationandCertificate of Networthiness (CON). The D A A or representative, together with tbe command functional user representative and NETCOM RCIO, will review tbe Cc^A package and either accept the accreditation decision as is or implement additional measures or procedures to meet the needs o f tbeir unique operating environmenL Such additional measures w i l l be appended to the system accreditation and provided to the C A f o r consideration in the operational I A risk recommendation to tbe gaining D A A for approval in that unique environmenL ^. SCI systems will not obtain a CON, but w i l l follow the DCID 6/3 requirements. c^. There are four potential D A A accreditation decisions: ATO, l A T O , 1ATT, and D A T O . c^. The A T O decision which will specify anauthorizationterminationdate(ATD) that is within three years of tbe authorization date. ^. T b e l A T O decision which w i l l specify an A T D that is within 180 days ofauthorization, limited to no more than one l A T O extension. l A T O requests must be accompanied by a POAc^M, with corrective actions funded and achievable within tbe authorization period. ^ Tbe l A T T decision which w i l l specify an A T D the is consistent with the completion o f the tesL Tbe l A T T establishes tbe agreed upon test duration and any special considerations or constraints. ^. The D A T O decision w i l l specify and effective date. The D A T O is effective until the D A A believes the IA posture o f the IS has been raised to an acceptable leveL 5-7. Connection approval process d. Army organizations requiring network access to the Defense Information Systems Network (DISN) w i l l preparea CAP package requesting connection approval. Army organizations requiring network access to t h e D I S N w i l l preparea CAP forsubmission to t h e p r o p e r D I S A l A o f f i c e . T h e D I S A l A o f f i c e will review the CAP package and approve/ disapprovecustomer for access t o t h e DISN. Approval w i l l b e g r a n t e d w i t h a n interim authority t o c o n n e c t ( I A T C ) authority to connect (ATC) letter. /i. Interconnectionoftwo or moreenclaves requires D A A approval through MOUs or Memoranda of Agreement (MOAs) between all DAAs. MOUs/MOAs w i l l address interconnection requirements as outlined in DODI 8500.2. c^. A l l IS must obtain C O N a s approval to connect through the Networthiness process prior to becoming operational within the Army. d^. A n enclave'sMAC level and security domain remain fixed during interconnection to other enclaves; they do not i n f i a t e t o m a t c b t h e M A C l e v e l o r s e c u r i t y d o m a i n o f a n interconnectingenclave. Enclaves with h i g h e r M A C levels connecting to enclaves w i t h l o w e r M A C l e v e l s are responsiblefor ensuring that the connectiondoesnotdegrade the availability or integrity o f the higher enclave. ^. Interconnectionsthatinclude or impact t h e D 1 S N o r . I W I C S are subject toDISNor.1WICSconnectionmanagement requirements and processes. ^ Interconnections t h a t c r o s s s e c u r i t y d o m a i n s a r e s u b j e c t t o D O D p o l i c y a n d p r o c e d u r e s f o r c o n t r o l l e d i n t e r f a c e s and cross domain solutions (CDS) as appropriate. ^. Adjunctnetworks thatrely on the i n s t a l l a t i o n n e t w o r k f o r N I P R N E T a n d S I P R N E T s e r v i c e s will providetbeir Cc^A documentation to the installation D A A for approval prior to connecting to the I C A N . /i. Interconnections that include or impact the .IW1CS are subject t o D I A connection approval process management requirements.

5-8. designated approving authority


d. The D A A is o f risk. The D A A protection o f t h e protection of the vested with the authority to formally assume responsibility for operating an IS at an acceptable level must weigh the operational need for the systems capabilities, the protection o f personal privacy, the information being processed, and the protection of the information environment, which includes other missions and business fiinctions reliant on the shared information environmenL

^. T h e D A A may rely on the Army C A o p e r a t i o n a l l A risk recommendation and may authorize operationtbrough tbe approval o f a n A T O , 1 A T O , 1 A T T , o r deny operations t h r o u g b a D A T O . Absent an accreditation decision an I S i s considered unaccredited and will not be operated within or in support of the Army. c:. A D A A may downgradeor revoke their initial Accreditation Decision any t i m e r i s k c o n d i t i o n s o r c o n c e m s so warrant c^. A D A A w i l l be identified f o r e a c h information system operating within or on behalf o f t h e DA, to include outsourced business processes supportedby private sector IS and outsourced IT (forexample, Govemment owned. Contractor Operated (COCO) and Contractor Owned, Contractor Operated (COCO). ^. D A A responsibility must reside with tbe organization that maintains funding, management and operational control

50

AR 2 5 - 2 ^ 2 4 October 2007

^anningB^000^^2^5

over tbe I S w h i l e in development, and once deployed, as applicable.In the instance of type accreditation these may be different organizations but will have documented MOUs when the transfer is made. ^ T h e C I O / G ^ w i l l remain the D A A for Army informationsystems, with tbeexception of Army SCI systems. ^. Tbe CIO/C 6 w i l l appoint in writing, o r d i g i t a l l y signed e mail, all Army DAAs with the exceptions noted below. Existing appointments or delegations w i l l become invalid within 90 days of the approval date of this AR 25-2 Cc^Aupdate. Requestsfor appointment m u s t b e s u b m i t t e d t o t h e O I A c ^ C f o r p r o c e s s i n g d u r i n g t h e s e t h r e e m o n t b s . D A A responsibility can be assigned t o a p o s i t i o n i n t h e organization; however, appointments will always be to named individuals. D A A appointment will be for specific named systems or networks. T h e O I A c ^ C , NETC EST IC, will coordinate the D A A appointments on behalf o f t h e C I O / G ^ . /i. A l l DAAs w i l l be at tbe General Officer, Senior Executive Service or equivalent level regardless of the confidentiality l e v e l a t w h i c h t h e l S operates.This appointment w i l l n o t b e f u r t h e r c l e l e g a t e d o r a p p o i n t e d d o w n w a r d except as noted below or as approved by the CIO/C 6. 1. A l l D A A s w i l l b e U S . c i t i z e n s , DOD employees,holdaU.S.Govemment security clearance and formal access approvals commensurate with the level of information processed by the IS under tbeir jurisdiction, or a Secret clearance, which ever is higher. ^ A l l DAAs w i l l b a v e a l e v e l of authority commensurate with accepting in writing the risk of operating DA IS under their purview. ^. A l l DAAs w i l l complete IA training consistent with tbe A r m y T r a i n i n g 8 8 P . A c o p y of the completion training certificate must be provided to C I O / C ^ through the OIAc^C prior to assuming D A A duties. 7 D A A a p p o i n t m e n t m u s t b e r e q u e s t e d o f t b e C I O / C 6. Requests for appointmentsshouldbeconsistent w i t h t h e following examples when compliant with 5 8/i through ^, above: (1) The Commanding C e n e r a l ( C G ) , N E T C O M f o r t h e Army enterprise with the authority to appoint tbeDirector NETCOM ESTA for the Army enterprise. (2) PEOs or direct reporting PM for acquisition systems developed under their charter except as noted below. (3) Principal Army Staff officers for Army Staff unique systems that remain under that office's control and management after deployment, except as noted below. (4) CAR for t h e U S A R , w i t h the authority to appoint t b e U S A R C O S f o r the ARNET. (5) Chief, A R N G for the A R N C and CuardNet X X L with tbe authority to appoint A R N G state D 0 I M / ^ 6 / C I 0 for individual states, as appropriate. (6) The A A S A asthe A C O M / A S C C c o m m a n d e r f o r P e n t a g o n l T S , t o i n c l u d e l S c o n n e c t e d t o t h e P e n t a g o n C I T enterprise, associated swing space, and altemate COOP sites through the national capital region (NCR) with the authority to appoint those GO, SES or equivalent within A A S A purview that are tbe SOs or have life cycle responsibility for tbe IS, as appropriate. (7) Tbe M E D C O M C o m m a n d e r , w i t b the authority to appoint the M E D C O M RMC/MSC Commanders for medical, dental and veterinary activities and treatment facilities, as appropriate. (8) Tbe USACE CIO for tbe U S A C E W A N and corporate 1S,with the authority to appoint the USACE Division Commanders for USACE IS, as applicable. (9) The Commander USAREUR, with the authority to appoint DAAs for tenant and MSC commanders within USAREUR, as appropriate. BBi. The following Cc^A D A A positions remain in place: (1) Tbe C 1 0 / G ^ for Army Special Access Programs. (2) Tbe C 1 0 / G ^ for classified systems developed by DA staff agencies. (3) Tbe D C S , G 2 f o r DODIIS processing SCI at Protection Level 1 , 2 , a n d 3 (4) The Director, National Security Agency for cryptographic solutions used to protect classified information. (5) Tbe Director, .loint Staff is the D A A for systems that process SIOP ESI data. (6) Commander, INSCOM for signals intelligence (SIGINT) systems within the Army. Bl. Questions conceming D A A requests or appointmentsshould be directedtothe01Ac^Catiacora(^us.army.miL d. D A A s may assign members of their staff to act as tbeir representative during the Cc^A process. However, signature authority w i l l r e m a i n w i t h t b e i n d i v i d u a l a p p o i n t e d by the C I O / C ^ . Following tbe chain ofcommand the D A A m a y authorizeamember of his/her staff t o ^ ^ s i g n f o r " h i m / h e r , b u t the signatureblockandresponsibility will r e m a i n w i t h t h e C 1 0 / G 6 a p p o i n t e d individuaL A c o p y of the authorization memo w i l l be submitted to the CIO/C 6 through iacora(^us.army.mil.

5-9. Lead agent o f t h e certification authority


d. Lead A C A and A C A organizations w i l l be designated by tbe CA through tbe process documented in the l A C c ^ A ACA88P ^. The lead A C A w i l l be, at a minimum, a Govemment employee, a U.S. citizen, at least a LTC, GS 14, or equivalent, and be appropriately cleared (Secret at a minimum). Refer to tbe A C A 8 8 P for furtberdetails. c^. The lead A C A w i l l be responsible forpreparation,p1anningand conducting tbe certification testing.

AR 2 5 - 2 ^ 2 4 October 2007

51

^anningB^000^^2^^

c7 Tbe reimbursable A C A w i l l perform the following, at a minimum; (1) Prepare IA Certification Event Test Plans. (2) Conduct IA Certification Test Events and STE as appropriate. (3) Prepare IA Certification Test Event Reports. (4) Prepare IA Scorecards. (5) Prepare IA Risk Assessments from tbe IA Certification Test Event findings, at a minimum. (6) Provide t h e l A c e r t i f i c a t i o n results and any supporting documentation to the Army C A f o r consideration in tbe IA operational risk recommendation. ^. A C A organizations may perform other functions as negotiated by the SO. ^ The A C A concept does not apply to DODIIS and SIGINT systems. Certification of these systems will be conducted in accordance with DCID 6/3.

5-10. System o^ner


d. AGovemment SO will be identified for e a c h l S u s e d b y o r in support of the A r m y . T b e S O i s responsiblefor ensuring the security of the IS as long as it remains in Army inventory, or until transferred (temporarily or permanently) to another Govemment person, organization or agency, and such transfer is appropriately documented and provided as an artifact to the accreditation package. ^. Tbe SO is responsiblefor tbe certification and a c c r e d i t a t i o n o f t h e l S and w i l l p r o v i d e tbe Cc^Apackage t o t h e Army C A i n s u f f i c i e n t t i m e f o r r e v i e w a n d determination o f o p e r a t i o n a l l A risk recommendationinsupportof D A A approval to operate decision prior to operational use or testing on a live network or with live Army data. c^.The SO will ensure that the Cc^A package and the SSAA are provided to the ACOM/ASCC, RCIO l A P M , a n d NETCOM prior to lOTc^E on/or before deployment of the system. d^. I f tbe SO can not be identified, then tbe IS should be deemed unnecessary and removed from the Army inventory. ^. It is the responsibility o f the SO to plan and budget for IS certification efforts. ^ It is the responsibility of the SO to select the A C A t h a t best supports his requirements,such as those ofcost and schedule. ^. Not lessthanannually all SO w i l l p r o v i d e a writtenstatementordigitally signede-mail to the Army CA that either confirms the effectiveness of assigned l A C o n t r o l s and their implementation,recommends changes or improvements to the implementation of assigned lAcontrols, or assigns additional lAcontrols, changes or improvements to the design of tbe IS itself /i. The system owner will forward to the receiving ACOM/ASCC, installation and activity D A A a copy o f t h e accreditation decision, supporting Cc^A documentation and CON.

Oi^a^ter^ Communications security 5-1. Communications security overview


This chapter provides DA policy for tbe acquisition, implementation, and life cycle management o f cryptographic systems, products, and services used to protect sensitive and classified national security information, systems, and networks. A l l tactical ISs are considered critical to the direct fulfillment of military or intelligence missions, and therefore are regarded as national security systems. With the exception of those systems approved by NSA and endorsedby HQDA CIO/C 6, at no time will U.S. classified national security information be protected by foreign cryptographic systemsor products,orbyaNIST/N1APcommoncriteriatesting1aboratoryevaluatedproducL Exceptions w i l l be reapproved on an annual basis. Use of any unapproved product toprotect classified national security information w i l l beconsidered a s a reportablecommunications security incident under AR 38040, paragraph 7 3^ d. 7^B^c^^^c^^idBicj^c:'/d.^,^i^^d^iBi^B^BBid/idBidBic7.^^.^^^BBi,^^/i^^/i^B^Bid^ approvedcryptographic systems w i l l b e used to protect classified nationalsecurity information and national security systems. (1) Classified national security information will be protected in transmission by NSA approved cryptography. (2) Tactical information systems w i l l be protected by NSA approved cryptography. (3) Requirements for NSA-approved cryptographic systems will be identified and validated in the A I A P and managed by tbe Army OlAc^C. (4) NSA cryptographic systems will be centrally acquired and managed by the CSLA. (5) Only keying material produced by NSA or generated by NSA-approved key generators will be used to key cryptographic systems that protect classified national security information. (6) A l l cryptographic systems employed in the tactical force stmcture that protect classified national security

52

AR 2 5 ^ 2 ^ 2 4 October 2007/RAR 23 March 2009

^anningB^000^^2^7

information must be Army Electronic I^ey Management System/I^ey Management Infrastmcture (EI^MS/I^MI) complianL Each approved cryptographic system will have a NSA approved key management plan. ^. T^B^d^^c^/idBi cj^ iiBic^/d.^.^i^^d^dBid^.^^Bi.^1'^1'^^ I'Bi^B^BBid^idBi dBic7,^^.^^^BBi,^. NIST/NIAP approved cryptographic systems will only be usecf to protect Unclassified or Sensitive information. NIST/NIAP approved cryptographic systems or foreign cryptographic systems t o b e e m p l o y e d i n t h e t a c t i c a l f o r c e stmcture w i l l be approvedonacase-bycase basis by the HQDA C I O / G ^ . Company and 8e1ow Units may use NIST/NIAP approved cryptographic systems for protecting Non Mission/Non Operational unclassified or sensitive information. Cryptographic systems or products intended for the protection of unclassified or sensitive information or systems w i l l (1) 8e evaluated by a N1AP/CCEVS approved Common Criteria Test Lab (CCTL) against a U.S. Government Protection Profile for medium robustness environmenL (2) 8e validated under the NIST Cryptographic ModuleValidation Program (CMVP) t h a t , a t a m i n i m u m meet,level 2 security requirements o f the Federal Information Processing Standard 140^2 (FIPS 14(^2). (3) Products that exceed minimum FIPS 140^2 security requirements and common criteria evaluation assurance levels w i l l be given preference when considered for procuremenL (4) NIST-approved cryptographic systems intended to protect unclassified sensitive information will be identified in the A l A P a n d managed by tbe Army OlAc^C. Funding for these systems w i l l b e the responsibilityof the organization or activity identifying the requiremenL (5) A l l NIST/NIAP approved cryptographic systems will be centrally acquired and managed through CSLA. (6) E a c b N I S T / N I A P - a p p r o v e d c r y p t o g r a p h i c s y s t e m w i l l b a v e a k e y m a n a g e m e n t p l a n that describes indetail all activities involved in the handling of cryptographic keying material f o r t h e system, including other related security parameters (such as IDs and passwords). The plan will describe accountability over the keying material over the entire life cycle o f tbe system's keysfromgeneration,storage,distribution, and entry intothesystemthroughuse,deletion, and final destruction. c^. T^d^d i5'Bic:B^^^idBi ,^^dBic7dB^c^ (7^^,^. A l l implementations of FIPS 46-2 DES are prohibited within tbe Army. c^. ^d^^dBic^^d^ ^Bic^r^^^idii ,^^dBid^dB^c^(Bf^,^ Tbe implementation of AES in products intended to protect classified nationalsecurity information and systems must be reviewed and certified b y N S A , a n d approved by H Q D A C I O / G ^ prior to their acquisition through CSLA. ^. 7^11^/ic ^^^c^B^^^d^B-d^/i^ Systems that employ public key (asymmetric key) technology to protect unclassified sensitiveorclassifiednationalsecurity information and systems w i l l b e approved by the C I O / G ^ . Asymmetrickeys w i l l be obtained through authorized DOD or Army certificate authorities operating under current DOD approved Certificate Practice Statements. ^ ^^^B^diB^d^ CB^^/d^B'd^^ic^ .^.^/^BBi.^ dBid^^/^dB^i^/iBBi.^. The CSLA will maintain a list o f approved cryptographic s y s t e m s a n d a l g o r i t h m s f o r u s e i n t b e Army. Allcryptograpbic products must be procured through C S L A t o be valid f o r u s e o n an Army system. CSLAmanaged Army ApprovedProduct List (APL) i s a v a i l a b l e b y calling t h e C S L A customer support help desk at 1 8 0 0 ^ 6 2 2123 or from the CSLA Web page (when established). 5-2. Protected distribution systems d. Aprotecteddistribution system(PDS) will b e u s e d o n l y i f c o s t e f f e c t i v e a n d sufficiently controlledtoprevent covert penetration and interception. ^. Any IS that includesaPDS to transmit data w i l l not be operationally accredited until the PDS has been approved. 5-3. Approval of protected distribution systems d. PDSsmustbeconstmcted per criteria contained i n N S T I S S I N o . 7003 and supplemented w i t b l A p r o c e d u r e s i n this regulation. ^. Authority to approve a PDS for the clear text transmission of classified information within fixed plant and garrison installations is delegated as follows: (1) Principal HQDA officials for activities under their staff supervision, direction, or controL (2) Garrison commanders for tbeir organic activities. c:. Requests for approval o f a P D S to transmit TS information must include an evaluation by tbe appropriate support elemenL Approval authorities may request technical assistance from INSCOM, 902nd M l Group, Fort Meade, M D 20755, in applying security criteria and processing the approval action for other PDSs. d^. Commanders of battalion and higher echelons may approve circuits for clear text electrical transmission of SECRET and C O N F I D E N T I A L information in tactical environments. Under combat conditions, commanders may delegate thisauthority to thecompany leveL Tactical PDSs w i l l not be approvedfor clear t e x t t r a n s m i s s i o n o f T S information. ^. Once a PDS hasbeenapproved, no changes in installation, additions, or use may b e m a d e u n t i l the approval authority has granted approval for such changes. ^ Requests to approveaPDS w i l l be submitted through channels to the installationlAM and DAA.Requests w i l l be classified at least C O N F I D E N T I A L and will contain the following information:

AR 25-2 24 October 2007/RAR 23 March 2009

53

ManningB_00016288

(1) Full identification and location o f t h e requesting organization. (2) A statement of the classification of information to be transmitted on tbe PDS. (3) A copy of the building fioorplan ( o r a diagram o f t h e field area as appropriate) designating the following: (d) Proposed cable route and locationof subscriber sets,distributionframes,junctionboxes,and anyothercompo nents associated with the circuiL (^^ Other wiring along the PDS route. (4) D e s c r i p t i o n o f t b e c a b l e insta11ation(for example, 2 4 p a i r s o f sbieldedcable i n r i g i d s t e e 1 c o n d u i t , 6 p a i r s o f shielded cable in fioor, or fiber optic cable). Indicate the cable length. (5) Description and nomenclature o f terminal and subscriber equipment to be used. (6) Clearance of individuals having access to the circuiL (7) Type o f guards (for examp1e,U.S.mi1itary,U.S.civilian, foreign civilian)and their security clearance or access authorization status. (8) Descriptionofaccesscontroland surveillance of unclearedpersonnelwhomay be a l l o w e d e n t r y i n t o t h e area housing any part of the PDS. (9) Identificationof the power s o u r c e t o b e u s e d for t h e P D S a n d a s t a t e m e n t o f the distancetothe nearest point where undetected tampering would be possible. (10) A justification for using tbe proposed PDS. (11) A s t a t e m e n t c o n c e m i n g a n y d e v i a t i o n s f r o m t b e e s t a b l i s h e d P D S c r i t e r i a and a n e v a l u a t i o n o f their security implications. (12) For PDSs to be used with TS information, a copy of the security evaluation. (13) The request and approval must become part of the Cc^A package. 5-4. R a d i o s y s t e m s d. Protect all voice or data military radio systems and COTS-implemented cellular or wireless communications devices and services to tbe level of sensitivity of the information. ^. Use electronic,auto-manual,or manualcrypto-systems to provide the needed security for existing radio systems that d o n o t have embeddedorelectroniccrypto-systems. However,all future p r o c u r e m e n t s m u s t c o m p l y w i t b p a r a graph 6 ^ 1 , above. c^. Prohibit the use o f commercial non-encrypted radio systems in support of command and control functions. c7. Radiosused for publicsafety communications withcivilagencies or to communicate oncivilaviationchannels are e x c l u d e d f r o m t h e r e q u i r e m e n t s o f p a r a g r a p h s d a n d ^ , a b o v e . T h i s exclusiondoesnot apply to communications dealing with aviation combat operations. 5-5. Telecommunication devices d A l l personnel are prohibited f r o m using Government-owned receiving, transmitting, recording, and ampli^ fication telecommunications equipment in restricted areas^ such as classified w o r k areas, mission essential vulnerable areas ( ^ ^ V A s ) , or staging areas before deployment unless authorized in w r i t i n g by the commander Tbe D A A remains the accreditation authority for telecommunication devices in restricted areas. ^. A l l personnel w i l l use NSA or C I O / G - 6 approved secure telephones to discuss classified information telephonically. c ^ A l l personnel are prohibited f r o m possessing or using any privately owned Pl^f^ (for example, cell phones, T ^ ^ ^ ) w i t h i n the confines of classified, restricted, or open storage areas designated by the commander

^I^a^ter^ l^isi^ l^ana^ement ^ - 1 . Risk management process


d. Absolute confidence in the information accessed or available in tbe Army enterprise is unachievable; as such, the Army and D O D w i l l approach increasing that level of tmst through tbe implementation o f a r i s k management process. With technological advances and capabilities, training, and lA-focused processes to reduce identifiable threats, the level of tmst of information and ISs is significantly increased. Establisharisk management process containing the following phases a s a m i n i m u m f o r all ISs. T h e p r o c e s s o u t l i n e d i n t h i s chapter i s b a s e d , i n p r i n c i p l e , o n t b e r i s k m a n a g e m e n t doctrine as defined by FM 5 19 (1) Identify threats such as those posed by default designs or configurations, architecture deficiencies, insider access, and foreign or nation-state interests, ownership and capabilities. (2) Assess threats to determine risks, (d) What information is accessib1e7

54

AR 2 5 ^ 2 ^ 2 4 October 2007

l^anningB^000^^289

(7i^ What information will be stored electronically and secured, for example self generated, prototype, research and development, electronic forms and documents, calendars, operational logs7 (c^ What will be the stored format ofthe information and the naming or identification mechanism7 (d^ Who has authorization to access and share the information7 (i^^ What is tbe potential adverse effect of loss, access, or manipulation of tbe data7 (/^ What are the OPSECissues ofdata availabi1ity7 What are tbe data owner's requirements and length of required storage or access7 (^^ What legacy operating systems or applications are required for stored information7 What hardware is required to access and read the storage mediae (i) What are tbe backup and disaster recovery plans7 (^^ What is the plan to migrate legacy data to current application capabilities7 (3) Develop controls and make risk management decisions. How do you protect the information access, and infrastructure7 (4) Implement controls, countermeasures, or solutions. Choose the correct IA tools, controls and countermeasures to defend against adversarial attacks on IS and networks. (5) Implement a capability to monitor for compliance and success. (6) Supervise, evaluate, review, and refine as necessary. ^. Commanders,Directors,combatdeve1opers,andmaterie1deve1opers will integrate the risk management process in the planning, coordination, and development of ISs. c ^ . Reevaluateandreissueanyriskanalysesandmitigationsplansif there isasuccessftilcompromiseofan IS or device. d^. Telecommunications systems that do not include tbe features normally associated with an IS and that handle classified or sensitive information will be implemented and operated in conformance with tbe risk management process. 7-2. Information operations condition The lAPM or the command'sseniorIA person is responsible for coordinating an INFOCON plan.The LNFOCON isa Commander's Alert System that establishes auniform DOD and Army process forposturinganddefendingagainst malicious activity targeting DOD ISs and networks. The countermeasures at each level will be available when publisbedor asdirectedby thecombatant command when the command is an ACOM/ASCC. Ifthere is a confiict between Army and combatant command directed measures, those of the combatant command take precedence. Typical countermeasures include preventative actions and actions taken during an attack as well as damage control and mitigation actions.

AR 25^2^24 October 2007

55

^anningB^000^^290

A^^en^ix A l^eferences Section I Rei^uired Publications


Al^2^l Armyl^nowledgeManagement and InformationTechno1ogyManagemenL(Cited in paras 1 5 ^ 1 3 ) , 2 33/,4-5d,4-20c^,4-20^,4-29d,4-30^) 1.^,2 8/, 3-3^',

Al^3^0^5 Departmentofthe Army Information Security Program.(Cited in paras 4 - 5 d ( 7 ) , 4 ^ 5 , ^ ( 1 0 ) ( b ) 3 , 4 - l l d , 4 - l l c ^ , 4 ^ 1 6 d , 4-16^,4-17c^,4-32) Al^3^0^^3 Information Systems Security Monitoring. (Cited in paras 4-5Bii(6), 4-29d.) DAPam2^l I

Information Technology Support and Services. (Cited in para 4^5i.)

Section II Related Publications


Arelated publication is merelyasource of additional information.The user does not have to read it to understand this regulation. AI^^I2 Army Management o f tbe Electromagnetic Spectrum Al^l^^ Procedures for Investigating Officers and 8oards of Officers Al^2^^5 The Department of the Army Freedom o f i n f o r m a t i o n Act Program Af^36^2 Audit Services in the Department o f tbe Army Al^70^ Army Acquisition Policy Al^f90^^ Law Enforcement Reporting AI^I9l^5t Security of Unclassified Army Property (Sensitive and Nonsensitive) AI^I9^2 Criminal Investigation Activities AI^2I^I Military Morale, Welfare, and Recreation Programs and Nonappropriated Fund Instmmentalities A l ^ 340^21 The Army Privacy Program A l ^ 3^0^10 56 Disclosure ^ a n n i n Foreign gB^000 ^^29^ AR 2 5 - 2 ^ 2 4 October 2007 and Contacts with Foreign Representatives

Al^3^0^0 Policy for Safeguarding and Controlling Communications Security (COMSEC) Material

Al^3^0^9 Industrial Security Program Al^3^0^7 Tbe Department of the Army Personnel Security Program Al^3^l 10

U.S. Army Intelligence Activities Al^3^l II

Intelligence Support to Capability Development AlR3^f 14

Technical Counterintelligence (TCI) Al^ 3^120 The Army Counterintelligence Program AI^^2^I3 Antiterrorism Al^^30^l Operations Security (OPSEC) Al^60^l Army Community Service Center I^APam2^l2 Information Technology Contingency Planning. Chairman of the .foint Chiefs of Staff Instruction ^221.018 Delegation of Authority to Commanders of Combatant Commands to Disclose Classified Military Information to Foreign Govemments and Intemational Organizations. (Available at http://www.dtic.mil/cjcs directives/.) Chairman of the .foint Chiefs of Staff I ^ a n u a l 6 5 f 0 . 0 f Defense-in Depth: Information Assurance (IA) and Computer Network Defense (CND). (Available at http:// www.dtic.mil/cjcs directives/.) Common Criteria Evaluation and Validation Scheme (CCEVS) (bttp://niap.babialab.com/cc scheme/) Committee on National Security Systems (CNSS) Instruction 4012 Operation of tbe Defense Acquisition System. (Available at http://www.cnss.gov/instmctions.html.) 1^01^5200.2 1^ Personnel Security Program. (Available at http://www.dtic.mil/whs/directives.) 1^01^5220.221^ National Industrial Security Program Operating ManuaL (Available at http://www.dtic.mil/whs/directives.) 1^O1^5220.221^^UP National Industrial Security Program Operating Manual SupplemenL(Available at bttp://www.dtic.mil/whs/directives.) 1^01^5400.7 1^ DOD Freedom o f i n f o r m a t i o n Act Program. (Available at http://www.dtic.mil/wbs/directives.) 0 0 0 5500.71^ .loint Ethics Regulation (.lER). (Available at http://www.dtic.mil/whs/directives.)

AR 2 5 - 2 ^ 2 4 October 2007

57

^anningB^000^^292

1^00^510.11^
Department of Defense Information Technology Security Certification and Accreditation Process (D1TSCAP) Application ManuaL (Available at bttp://www.dtic.mil/whs/directives.) O O O O i r e c t i v e 5000.1 The Defense Acquisition System. (Available at http://www.dtic.mil/whs/directives.) O O O O i r e c t i v e 5220.6 Defense Industrial Personnel Security Clearance Review Program. (Availableat http://www.dtic.mil/whs/directives.) D O O O i r e c t i v e 5220.22 DOD Industrial Security Program. (Available at http://www.dtic.mil/whs/directives.) O O O D i r e c t i v e 5230.9 Clearance of DOD Information for Public Release. (Available at http://www.dtic.mil/wbs/directives.) O O O O i r e c t i v e 5230.11 Disclosureof Classified Military Information to ForeignCovemments and Intemational Organizations. (Availableat http://wvyw.dtic.mil/wbs/directives.) O O O D i r e c t i v e 5230.25 Withholding ofUnclassifiedTechnical Data From Public Disclosure.(Available at http;//ww^.dtic.mil/whs/directives.) O O O O i r e c t i v e ^100.2 Use o f Commercial Wireless Devices, Services, and Technologies in tbe Department of Defense (DOD) Global Information Grid (GIG). (Available at http://www.dtic.mil/whs/directives.) OOOOirective ^500.01^ Information Assurance. (Available at bttp://www.dtic.mil/whs/directives.) O O O O i r e c t i v e ^570.01 Information Assurance ( I A ) Training, Certification, and Workforce ManagemenL (Available at http://www.dtic.mil/ whs/directives.) O O O I n s t r u c t i o n 3020.41 Contractor Personnel Authorized to Accompany the U.S. Armed Forces. (Available at http://www.dtic.mil/whs/ directives.) O O O I n s t r u c t i o n 5000.2 Operation o f tbe Defense Acquisition System. (Available at http://wwrw.dtic.mil/whs/directives.) O O O 1 n s t r u c t i o n 5200.40 DOD Information Technology Security Certification and Accreditation Process (DITSCAP). (Available at http:// www.dtic.mil/wbs/directives.) O O O I n s t r u c t i o n ^100.3 Department ofDefense (DOD) Voice Networks. (Available at bttp://www,dtic.mil/whs/directives.) O O O I n s t r u c t i o n ^110.1 Multinational Information SharingNetworks Implementation. (Available at bttp://www.dtic.mil/wbs/directives.) O O O I n s t r u c t i o n ^500.2 Information Assurance ( I A ) Implementation. (Available at http://www.dtic.mik/whs/directives.) f ^ O O I n s t r u c t i o n 8551.1 Ports, Protocols, and Services (PPSM). (Available at http://www.dtic.mil/whs/directives.) O O O I n s t r u c t i o n 1015.10 Programs for Military Morale, Welfare, and Recreation. (Available at http://www.dtic.mil/wbs/directives.)

56

AR 2 5 - 2 ^ 2 4 October 2007

^anningB^0001^293

d i r e c t o r , Central Intelligence Agency l^ireetive 1/7 Security Controls on tbe Dissemination o f Intelligence Information. (Available at bttp://www.cms.cia.sgov.gov/dci/ policy/dcid/default.htm.) I^irector, Central Intelligence Agency Oirective 5/6 Intelligence Disclosure Policy. (Available at http://www.cms.cia.sgov.gov/dci/policy/dcid/default.htm.) Oefense Intelligence Agency l^anual 5 0 ^ Security o f Compartmented Computer Operations. (Information may be obtained from the Defense Intelligence Agency, 200 M a c D i l l 8 1 v d , 8 1 d g 6000, 8 o l l i n g A F 8 , W a s h i n g t o n , DC 20340 ) Director, Central Intelligence Agency Oirective 6/3 Protecting Sensitive Compartmented Information within Information Systems. (Available at http:// www.cms.cia.sgov.gov/dci/policy/dcid/defau1t.htm.) OOO l^emo, .fuly 06, 2006, Sub^ect^ I n t e r i m Oepartment of Defense ( D O D ) Information Assurance ( I A ) Certification and Accreditation (Cc^A) Process Guidance (Available at https://diacap.iaportal.navy.mil.) I^xecutive O r d e r 12356 National Security Information ^

Eederal Information Security l^anagement Act of 2002 Section 3541 of title 44, United States Code. (Available at http://csrc.nist.gov/policies/HR2458-fina1.pdf.) I^ederal Information Processing Standards Publication 46^2 (http://www.it1.nisLgov/) l^ederal Information Processing Standards Publication 140^2 Security Requirements for Cryptographic Modules. (Available at bttp://www.iti.nist.gov/.) 1^ieldl^anua1313 Information Operations: Doctrine, Tactics, Techniques, and Procedures l ^ i e l d l ^ a n u a l 5^19 ( 1 0 0 1 4 ) Composite Risk Management .loint D O D I I S Cryptologic SCI Information Systems Security Standards. (Available at http://www.nmic.navy.smil.mil/onihome-s/ security/sso navy/policyNpubs/jdcsisss/jdcissi-r2.html.) .IP 1^2

.loint Publication, Department ofDefense Dictionary of Military and Associated Terms .1TAA .loint Technical Architecture Army. (Available via AI^O at https://www.us.army.mil.) NSA/CSSl^anual1301 Operational Information Systems and Networks Security Policy NSA/CSSl^anual1302 Media Declassification and Destmction Manual N I S T Special Publication 8 0 0 ^ 4 I^EV.1 Security Considerations in tbe Information Systems Development L i f e C y c l e (http://csrc.nist.gov/pub1ications/nistpubs/ 800^64/NISTSP800 64pdf)

NSTISSINo.4012
National Training Standard for Designated Approving Authority ( D A A ) . (Available at http://www.cnss.gov/ instmctions.html.)

AR 2 5 - 2 ^ 2 4 October 2007

59

^anningB^000^^29^

NSTISSINo.4015 National Training Standard for System Certifiers. (Available at http;//www.cnss.gov/instmctions.btm1.) NSTISSINo.7003 Protective Distribution Systems. (Available at http://www.cnss.gov/instmctions.htm1.) NST1SSPNo.11 National Information Assurance Acquisition Policy. (Available at http://w^vw.cnss.gov/instmctions.btmI.) Office of l^anagement and budget Circular A 130 Management ofFederal Information Resources Public Law 100 235 Computer Security Act of 1987 Public 1^aw 107 314 8ob Stump National Defense Authorization Act for Fiscal Year 2003 1^uleforCourtsl^artial303 Preliminary inquiry UCl^.1 Uniform Code of Military .lustice 5 U S C 552a The Privacy Act of 1974 22 USC 2551 Congressional statement of purpose 22 USC 2751, et. seq. Arms Export Control Act 44 USC 3541 Information security; Purposes 1^CSCS11V162 MDEP M54X Report

Section III Prescribed Porms


This entry has no prescribed forms.

SectionI^ Referenced Porms


DAFormsareavailableonthe Army Publishing Directorate Web site (www.apd.army.mil): DDForms are available from the OSD Web site (http://www.dtic.mil/whs/directives/infomgt/forms/formsprogram.htm). SFs and OFs are available from the GSA Web site (http://www.gsa.gov). DA1^orm1121^ Management Control Evaluation Certification Statement DA1^orm 202^ Recommended Changes to Publications and 81ank Forms DD1^orm254 DOD Contract Security Classification Specification S1^85P Questionaire For Public Tmst Positions 60 AR 25-2^24 October 2007

^anningB^000^^295

S1^^6 Questionaire For National Security Positions S1^32^ Certificate Pertaining to Foreign Interests

A^^en^ix 8 Sample Acce^tal^ie l^se policy


8 - 1 . Purpose This appendixprovidesasample AUP that may be used byorganizationstoobtainexplicitacknowledgementsfrom individuals on tbeir responsibilities and limitations in using ISs.

8-2. Explanation of conventions in sample acceptable use policy


Figure8-1,below,illustratesarepresentative AUP.Inthis figure,text appearing initalicized font should be replaced with the appropriate information pertinent to the specific AUP being executed. Army organizations may tailor the information in the sample AUP to meet their specific needs, as appropriate.

AR 25-2^24 October 2007

51

i^anningB^000^^298

Acceptable Use Policy 1. Understanding. I understand that I have the primary responsibility to safeguard the information contained in classified network name (CNN) and/or unclassified network name (UNN) from unauthorized or inadvertent modification, disclosure, destruction, denial of service, and use. 2. Accass. Access to this/these network(s) is for official use and authorized purposes and as set forth in DoD 5500.7-R, "Joint Etfiics Regulation" or as further limited by this policy. 3. Revocabillty. Access to Army resources is a revocable privilege and is subject to content monitoring and security testing. 4. Classified information processing. CNN is the primary classified IS for [insert your organization). CNN is a US-only system and approved to process (insert classification) collateral information as well as; (insert additional caveats or tiandling instructions). CNN is not authorized lo process [insert classification or additional caveats or special tiandling instructions). a. CNN provides communication to external DoD (or specify ottier appropriate U.S, Government) organizations using Ihe SIPRNET. Primarily this is done via electronic mail and internet networking protocols such as web, ftp, telnet (insert others as appropriate). b. The CNN is authorized for SECRET or lower-level processing In accordance with accreditation package number, identification, etc. c. The classification boundary between CNN and UNN requires vigilance and attention by all users. CNN is also a US-only system and not accredited tor transmission of NATO material. d. The ultimate responsibiity for ensuring the protection of information lies with the user. The release of TOP SECRET information through the CNN is a security violation and will be investigated and handled as a security violation or as a criminal offense. 5. Unclassified Infomiation Processing. UNN is the primary unclassified automated administration tool for the [insert your c^anization), UNN is a US-only system. a. UNN provides unclassified communication to external DoD and other United States Government organizations. Primarily this is done via electronk; mail and internet networking protocols such as web, ftp, telnet (insert others as appropriate). b. UNN is approved to process UNCLASSIFIED, SENSITIVE information in accordance with (insert local regulation dealing witt) automated information system security management program). c. The UNN and the Internet, as viewed by the [insert your organization), are synonymous. Email and attachments are vulnerable to interception as they traverse the NIPRNET and Internet.

Figure B-1. Acceptable use policy

62

AR 25-2 24 October 2007

ManningB_00016297

6. Minimum security rules and requirements. As a CNN and/or UNN system user, the following minimum security rules and requirements apply: a. Personnel are not permitted access to CNN and UNN unless in complete compliance with the (insert your organization) personnel security requirement for operating in a TOP SECRET system-high environment. b. I have completed the user security awareness-training module. I will participate in all training programs as required (inclusive of threat identification, physical security, acceptable use policies, malicious content and logic identification, and non-standard threats such as social engineering) before receiving system access. c. I will generate, store, and protect passwords or pass-phrases. Passwords will consist of at least 10 characters with 2 each of uppercase and lowercase letters, numbers, and special characters. I am the only authorized user of this account. (I will not use user ID, common names, birthdays, phone numbers, military acronyms, call signs, or dictionary words as passwords or pass-phrases.) d. I will use only authorized hardware and software. I will not install or use any personally owned hardware, software, shareware, or public domain softvrare. e. I will use virus-checking procedures before uploading or accessing infonnation from any system, diskette, attachment, or compact disk. f. I will not attempt to access or process data exceeding the authorized IS classification level. g. I will not alter, change, configure, or use operating systems or programs, except as specifically authorized. h. I will not introduce executable code (such as, but not limited to, exe, com, vbs, or .bat files) without authorization, nor will I write malicious code. i. I will safeguard and mark with the appropriate classification level all information created, copied, stored, or disseminated from the IS and will not disseminate it to anyone without a specific need to know. j. I will not utilize Army- or DoD-provided ISs for commercial financial gain or illegal activities. k. ivlaintenance will be performed by the System Administrator (SA) only. I. I will use screen locks and log off the workstation when departing the area. m. I will immediately report any suspicious output, files, shortcuts, or system problems to the (insert your organization) SA and/or lASO and cease all activities on the system. n. I will address any questions regarding policy, responsibilities, and duties to (insert your organization) SA and/or lASO.

Figure B-1. Acceptable use policyContinued

AR 25-2 24 October 2007

63

MannlngB_00016298

0. I understand that each IS is the property of the Army and is provided to me for official and authorized uses. I further understand that each IS is subject to monitoring for security purposes and to ensure that use is authorized. I understand that I do not have a recognized expectation of privacy in official data on the IS and may have only a limited expectation of privacy in personal data on the IS. I realize that I should not store data on the IS that I do not want others to see. p. I understand that monitoring of (CNN) (UNNj will be conducted for various purposes and information captured during monitoring may be used for administrative or disciplinary actions or for criminal prosecution. I understand that the following activities define unacceptable uses of an Army IS: {insert specific criteria) t to show what is not acceptable use to show what is acceptable during duty/non-duty hours to show what is deemed proprietary or not releasable (key word or data identification) to show what is deemed unethical (e.g., spam, profanity, sexual content, gaming) to show unauthorized sites (e.g., pornography, streaming video, E-Bay) to show unauthorized services (e.g., peer-to-peer, distributed computing) to define proper email use and restrictions (e.g., mass mailing, hoaxes, autofonA^ardlng) to explain expected results of policy violations (1 ^, 2*, 3"*, etc)

(Nofe; Activity in any criteria can lead to criminal offenses.) q. The authority for soliciting a social security number (SSN) is EO 939. The information below will be used to identify you and may be disclosed to law enforcement authorities for investigating or prosecuting violations. Disclosure of information is voluntary; however, failure to disclose information could result in denial of access to (insert your organization) information systems. 7. Acknowledgement I have read the above requirements regarding use of [insert your organization) access systems. I understand my responsibilities regarding these systems and the information contained in them. insert name fiere Directorate/Division/Branch insert name here Last Name, First, Ml * insert name here Signature insert date here Date insert Rank/Grade and SSN here Rank/Grade/ SSN insert ptione number fiere Phone Number

Figure B-1. Acceptable use policyContinued

64

AR 25-2 24 October 2007

ManningB_00016299

8-3. Standard mandatory notice and consentforall 0 0 0 information system user agreements Figure8 2,below,isinformationfromthe standard mandatory notice and consent for all DODinformationsystem useragreements.

AR 25-2 24 October 2007/RAR 23 March 2009 ManningB_00016300

65

^ i l e Anny organizations may customize their AUP to their environments the following text is mandated by OoO and iniill he included^ amended or i^med as a standalone dc^ument as part ofthe AUP prc^es9^ 8y signing this documents yot^ acknowledge and consent that when you access f^epartment of defense ^OoO) information systems; ^Yoi^ are accessing a U.^. Government (U^G^ information system ^1^^ (which includes any device attached to this information system) that is provided for U.^. Government authorized use only. ^ You consent to the following conditions; o T h e U ^ Govemment routinely intercepts and monitors communications on this information system for purposes including, but not limited to^ penetration testing, communications security ^CO^^^) monitoring^ network operations and defenses personnel misconduct ^PM)^ law enfc^cement(L^)^ and counterintelligence (Cl) investigations. o At anytime^ the U.^. Government may inspect and seize data stored on this information system. o Communications using^ or data stored on^ this information system are not priiiate^ are subject to routine mc^itoring^ interceptions and search^ and may be disclosed or used for any U.S. Government authorized purpose. o This information system includes security measures (e.g.^ authentication and access cc^trc^s) to protect U S Government interests-notfc^ your personal benefit or privacy o Notwithstanding theabove^ using an information system does not constituteconsent to personnel misconducts law enforcements or counterintelligence investigative searching or monitoring of the content of privileged cc^munications or dato (including work product) that are related to personal representation or services by attorneys^ psychotherapists^ or dergy^ and their assistants Under these circumstances, such communications and work product are private and confidential^ as further explained bek^; - Nothing in this User Agreement shall be interpreted to limit the user^s consent to, or in any otherwayrestrictoraffect^anyU.^ Govemment actions fc^pi^rposes of network administrations operations protections or defense, or for communications security. This includesall communications and data on an information systems regardless ofany applicable privilege or confidentiality. whether any particular communication or c^ta qualifies for the protection of a privileged or is coiiered by a duty ofconfidentiality^ is detenmined in accordance with established legal standards and OoO policy. Users are strongly encouraged to seek personal legal counsel on such matters prior to using an information system if the user intends to rely on the protections of a privilege or confidentiality. Users should take reasonable steps to identify such communications or data that the user assertsareprotectedbyanysuchprivilegeorconfidentiality. However, the user^s identification or assertion of a privilege or confidentiality is not sufficient to create such pmtection where none exists under established legal standards and OoO policy.

Figure B-2. information system user agreements

66

AR 25-2 24 October 2007/RAR 23 March 2009

ManningB_00016301

AuseBsfailure to take reasonable steps to identify suc:hcommunicationsor data as privileged or confidential does not waive the privilegeor confidentiality if such protec:tionsotherwise exist under established iegalstandards and f^l^policy.ltowever^in such cases the U.^.i5overnmentisauthorized to take reasonabieac^tionsto identify suchc^ommunicationordata as beingsubjec;ttoaprivilege or confidentiaiity,and such ac:tions do not negate any applicable privilege or c:onfidentiality. -These conditions preserve theconfidentiaiity ofthe communicationordata^ andthe legal protections regardingthe use and disclosure of privileged informations and thus such communications and data are private and confidential.l^urther,theU.5. Government shall take all reasonable measures to protect the content of c;aptured/^sei^ed privileged communic^ations and data to ensure they are appropriately protected. oincases when the user hasconsentedtocontent searching or monitoring of communic;ations or data for personnel misconducts law enforcement, or counterintelligenc:e investigative searching^ (i.e.^ for all communications anddata otherthan privileged c:ommunicationsor data that are related to personal representation orservices by attorneys^ psychotherapists^orclergy^and their assistants)^ the U.5. government may^soiely at its discretion and in accordanc^e with DoOpoiicy^eiecttoapplya privilege or other restriction on the U.S. (5overnment^sotherwise^authorized use or disclosureof such information. oAil of the above c:onditions apply regardless of whetherthe access or use of an information system inc^ludes the displayofaNotice and (consent banner (^banneB^).^enabannerisused^ the banner functions to remind the user oftheconditions that are set forth in this User Agreements regardless ofwhether the banner describes these c:onditions in full detail or providesasummary of such conditions^ and regardless ofwhetherthebannerexpressly references this User Agreement.

FigureB 2. Information system user agreements-Continued

A^^en^ix

l^anagement c o n t r o l evaluation ^fiecl^li^t C - 1 , Punction


The function covered by this checklist is tbe administration o f the Army Information Assurance Program. C-2. Purpose The purpose of this checklist is to assist assessable unit manager and management control administrators in evaluating the key management controls outlined below. It is not intended to cover all controls. C-3. Instructions Answers must be based on the actual testing of key management controls (for example, document analysis, direct observation, sampling, simulation, or others). Answers that indicate deficiencies must be explained and corrective action indicated in supporting documentation. These key management controls must be formally evaluated at least once every 5 years. Certification that this evaluation has been conducted must be accomplished on DA Form 11 2 R (Management Control Evaluation Certification Statement). DA F o r m l l 2 R i s available on the APD Web site (http:// www.apd.army.mil).

AR 25-2 24 October 2007/RAR 23 March 2009

67

ManningB_00016302

C-4. Test questions d. Have appropriate security personnel (for example, lAPMs, lAMs, or lASOs) been appointed^ ^. Haveriskanalysesandvulnerability assessments beenperformed for systemstbat process,access,transmit,or store Army information7 c ^ . Are the appropriateleadership and management personnel aware of the results of risk analyses and vulnerability assessments7 c7. Have vulnerability assessments been performed as per standard Army methodologies as detailed in this regulation to ensure consistency7 ^. Have countermeasures been identified based on the results of risk analyses and vulnerability assessments7 ^ Are countermeasures in place commensurate with risks and vulnerabilities7 Is there a written security plan to document implementation of countermeasures7 /i. Has leadership and management formally accepted the risk to process the information involved(or more precisely stated: ^^Are the systems accredited7" 1. Are countermeasures routinely tested (for example, user IDs, passwords, audit trails)7 ^. Are Command and subordinate organizations implementing and reporting compliance to USSTRATCOM, ,ITF CNO, DOD and Army directed solutions or actions such as Command Tasking Orders (CTOs), 1AVM, or INFOCON measures7 ^. Is Information Assurance training being performed7 7 Are ACOM, ASCC, DRU, installations, or activities identifying tbeir IA requirements under tbe appropriate MDEP7 B B I . Are security incidents and violations (for example, vimses, unauthorized access, or attempts) reported7 Bl. Have plans been developed to ensure continuedoperation in the event of majordismption (forexample, fire, natural disaster, bomb threat, or civil disorder)7 d. Has a configuration control board approved each network7 ^. Is there an appropriate security official as a member of each board7 ^. Is there a current SSAA on file foreach 1S7

C-5. Supersession
This checklist replaces the checklist previously published in AR 25 2, dated 14 November 2003.

C-5. Comments
Helptomakethisabetter toolfor evaluating management controls.Submit comments to;Chief Information Officer/ G ^ ( C I 0 / G 6 ) , 107ArmyPentagon,Wasbington, DC 20310^107

66

AR 25-2^24 October 2007

l^anningB^000^8303

^lo^^ary Section I Abbreviations


Ac^VTR Asset and Vulnerability Tracking Resource AASA Administrative Assistant to tbe Secretary o f the Army ACA Agent o f tbe Army Certification Authority (Cc^A) AC^I^T ^

Army Computer Emergency Response Team AC^


access control list ACOl^ Army Command AOP (replaced by I T ) automated data processing

AEI Army Enterprise Infostmcture AES


Advanced Encryption Standard AGNOSC Army - Global Network Operations and Security Center AIAP Army Information Assurance Program (replacement for AISSP, Army Information Systems Security Program) AISSP Army Information Systems Security Program (replaced by A I A P ) AI^O Army I^owledge Online Al^C Army Materiel Command AP approval products list A1^ Army Regulation AI^L Army Research Laboratory AI^Nl^T Army Reserve Network ASA(AI^T) AR 25 2 ^ 2 4 October 2007 Assistant Secretary o f t h e Army for Acquisition, Logistics, and Technology

l^anningB^0001830^

ASC Army Signal Command ASCC Army Service Component Command ATO Authorization Termination Date ATS Automated Tactical System ATO approval to operate AUP Acceptable Use Policy AV Anti Vims A^I^C Army Web Risk Assessment Cell AWS Automated Weapons System 88P 8est 8usiness Practices 8PA black purchase agreement C411^ Command, Control, Communications, and Computers for Information Management CA Certification Authority Cc^A certification and accreditation CAC common access card CAI^ Certification Authority Representative C8T1A computer based training 70 CC8 AR 2 5 - 2 ^ 2 4 October 2007

l^anningB^000^^305
CCI

Configuration Control 8oard

controlled common task CCTt^ cryptographic criteria lab item

CCIU
Computer Crime Investigative Unit CEI^T computer emergency response team Cl counterintelligence CIO Criminal Investigation Command C10/G^ Chief Information Officer, G 6 CISO chief information security officer C1SS Center for Information Systems Security CISSP Center for Information Systems Security Professional CIT common information technology Cl^ configuration management C1^8 Configuration Management 8oard Cl^VP Cryptographic Module Validation Program CNO computer network defense CNOC Computer Network Defense Course CNOSP Computer Network Defense Service Provider CNO computer network operations CNSS Committee on National Security Systems AR 25-2 24 October 2007 71

MannlngB_00016306
contractor owned, contractor operated COMlSI2^C communications C Certificate ON of Netv^orthiness security

COCO

CONUS
Continental United States COR contracting officer's representative COS Chief o f staff COTS commercial off-the-shelf COOP Continuity of Operations Plan CPP Cooperative Program Personnel CRO compliance reporting database CSI^A Communications Security Logistics Agency CTIS Common Tier 1 System CTc^5^ certification, test and evaluation CVT Compliance Verification Team OAA designated approving authority OAPE Deny all, permit by exception OATO Denial o f Authorization to Operate OC^ distributed computing environment 001^ Delegation of Disclosure Authority Letter OES data encryption standard 01ACAP Department ofDefense Information Assurance Certification and Accreditation Process 72 AR 2 5 - 2 ^ 2 4 October 2007 OiO Defense in Depth 01SA/C1SS Defense Information Systems Agency/Center for Infi;irmation System Security

l^anningB^000^^307

01TYVAP Do-it-Yourself Vulnerability Assessment Program 01^^ demilitarized zone ONS Domain Name Service

ooo
Department ofDefense OOOO Department ofDefense Directive 0001 Department ofDefense Instruction OOll^ Director ofinformation Management OI^U direct reporting unit 5^10c^l^ engineering, implementation, operation, and maintenance El^l^S Electronic I^ey Management System EOIS Employee Owned Information System ESEP Engineer and Scientist Exchange Program I^IPS Federal Information Processing Standard I^ISl^A Federal Information Security Management Act l^t^O foreign liaison officer EN foreign national EOC1 Foreign ownership, control, or infiuence E01A AR 25-2^24 October 2007 73

l^anningB^0001^308
EOTc^E

Freedom ofinformation Act

follow-on test and evaluation Force Protection Assessment Team EPAT

EY fiscal year GOTS govemment-off-the-shelf HQOA Headquarters, Department o f the Army li^A identification and authentication IA Information Assurance lAl^ Information Assurance Manager lANl^ Information Assurance Network Manager 1ANO Information Assurance Network Officer lAPl^ Information Assurance Program Manager lAP^T information assurance policy c^ technology 1ASO Information Assurance Security Officer 1ATC interim authority to connect lATO interim approval to operate 1ATT Information Assurance Technical Tip 1ATT Interim Authorization to Test (Cc^A) 1AVA Information Assurance Vulnerability Alert 1AV8 Information Assurance Vulnerability 8ul1etin 74 AR 2 5 - 2 ^ 2 4 October 2007 lAVl^ Information Assurance Vulnerability Management ICAN I Installation integrated CC circuit Campus chip Area Network (installation backbone)

l^anningB^000^^309

IOS Intrusion Detection System ll^A Installation Management Agency INI^OCON information operations condition 1NEOSEC information security IO information operations lOTc^E initial operational test and evaluation 10VA0 Information Operations Vulnerability Assessments Division IP Intemet Protocol IS information system ISS Information Systems Security (replaced by Information Assurance) IT information technology ITS information technology services ,11^ .loint Interagency and Multinational .fOCSISSS .loint DODIIS Cryptologic SCI Information Systems Security Standards .fl^l^l^G .loint l^ey Management Infrastmcture Working Croup l^l^EC l^ey Management Executive Committee l^l^l key management infrastmcture I^Vl^/1^1^1^ keyboard, video, mouse/keyboard, monitor, mouse AR 2 5 - 2 ^ 2 4 October 2007 75

l^anningB^000^^310
local area network I^CERT Local Computer Emergency Response Team

LAN

t^E/CI Law Enforcement/Counter Intelligence Center t^OC level o f confidentiality MIAC mission assurance category l^AP Mitigation Action Plan 1V1C0 mobile computer device 1^CE8 Military Communications Electronics 8oard l^OEP management decision package 1^010 market driven/industry developed l^EVA mission essential vulnerable area l^OA Memorandum o f Agreement l^PE miscellaneous processing equipment l^PEP Military Personnel Exchange Program l^SC major subordinate command l^^R morale, welfare, and recreation NA network administrator NAC National Agency Check NAC1C National Agency Check with Credit Check and written inquiries 76 NACI^C AR 2 5 - 2 ^ 2 4 October 2007

l^anningB^0(^0^^3^^
National Agency Check with Local Agency and Credit Checks NCR National NOI non-developmental Capital Region item

NETCOl^
Network Enterprise Technology Command NETOPS network operations NG8 National Guard 8ureau N1AP National Information Assurance Partnership NIST National Institute of Standards and Technology Nl^ network manager NSA National Security Agency NS1 National Security Information NSS National Security System OCA original classification authority OCONUS outside continental United States OlAc^C Office o f i n f o r m a t i o n Assurance and Compliance OPCON operational control OPl^ Office of Personnel Management ORO operation requirements document OTE operational training experience POA personal digital assistant POS AR 2 5 - 2 ^ 2 4 October 2007 77

l^anningB^000^^3^2
Protected Distribution System PEO personal program PEG electronic evaluation device group or portable electronic device

PEO program executive officer PIN personal identification number Pt^ public law or protection level Pl^ program manager or project manager or product manager POAc^l^ Plan of Action and Milestones POLP principle of least privilege POl^ program objective memorandum PPS ports, protocols, and services RA remote access RA01US Remote Authentication Dial in User System RAS remote access server RCERT Regional Computer Emergency Response Team RCIO regional chief information officer ROTc^E research, development, test, and evaluation ROl^ read only memory SA Systems Administrator SA81 secret and below interoperability S8U
76 AR 2 5 - 2 ^ 2 4 October 2007

l^anningB^000^^3^3
SCI

Sensitive but Unclassified (obsolete term)

sensitive strategic electronic SET1 compartmented technology information information

S1AO Senior Information Assurance Officer SII Statement of Intelligence Interest or Security/Suitability Investigations Index S10 senior intelligence officer S10PES1 Single Integrated Operational Plan-Extremely Sensitive Information SIR serious incident report SETP Secure File Transfer Protocol SISS Subcommittee for Information Systems Security SOP standard operating procedure SSAA System Security Authorization Agreement SS81 single-scope background investigation SSH secure shell SSL secure sockets layer SSN social security number SSP System Security Policy STANREP standardization representative STEP standard tactical entry point ST1G Security Technical Implementation Guide STS Subcommittee for Telecommunications Security
AR 2 5 ^ 2 ^ 2 4 October 2007 79

SO l^anningB^000^^3^^ System Owner TA technical advisory

TAG technical advisory group TOY temporary duty TEl^P Test and Evaluation Master Plan TI^A Top Layer Architecture TNOSC Theater Network Operations and Security Center TS Top Secret TSACS Terminal Server Access Control System TS1^8 Tier 1 System Management 8oard TS/SCl Top Secret/Sensitive Compartmented Information TTP tactics, techniques, and procedures URL universal resource locator USAAA United States Army Audit Agency USER10 user identification VAT vulnerability assessment technician VIS vendor integrity statement VPN virtual private network ^t^AN wireless local area network World W i d e W e b S e c t i o n II Terms Access (IS) Ability and meansto communicate with (that is,provide input to or receive output from),or otherwise make use ^

60

AR 25 2 ^24 October 2007

l^anningB^0001^3^5

of any information, resource,or component in an IS.(COMSEC) Capability and opportunity to gain knowledge or to alter information or materieL Access control The process of limiting access to the resources of an IS only to authorized users, programs, processes, or other systems. Accountability (IS) Property that enables auditing of activities on an IS to be traced to persons who may then be held responsible for their actions. (COMSEC) Principle that an individual is responsible for safeguarding and controlling of COMSEC equipment, keying materiel, and information entmsted to bis or her care and is answerable to proper authority for the loss or misuse of that equipment or information. Accreditation Oecision A n o f f i c i a l designation f r o m a D A A , in w r i t i n g o r d i g i t a l l y signede-mail, made visible to the CIO/G 6, regarding acceptance o f the risk associated with operating an IS. Expressed as A T O , l A T O , 1ATT, or D A T O . A d j u n c t Network For the purpose of Ci^A, those networks that depend on the connections to the common transport network and services o f t h e l C A N . T h e s e networks r e l y o n t h e l C A N f o r N I P R N E T a n d S I P R N E T c o n n e c t i v i t y . T h e s e m a y o r may not be u n d e r D O l M managementandusually connect to the I C A N b e l o w t h e s e c u r i t y stack. They may b e c o n t r o l l e d b y a tenant as small as an office or as large as a ACOM/ASCC headquarters. A p p r o v a l to operate Synonymous with accreditation. Army information

Information originated by or conceming the Army. Audit Independent reviewandexamination of recordsand activities toassesstheadequacy of system controls, toensure compliance with established policies andoperational procedures, and to recommend necessary changes in controls, policies, or procedures.

^
Audit trail Chronological record of system activities to enable the constmction and examination o f t h e sequence of events or c h a n g e s i n a n e v e n t ( o r b o t h ) . An audit trailmay apply t o i n f o r m a t i o n i n a n I S , t o message r o u t i n g i n a c o m m u n i c a tions system, or to the transfer of COMSEC materieL Authenticate T o v e r i f y the i d e n t i t y o f a u s e r , u s e r d e v i c e , o r other e n t i t y , o r t b e i n t e g r i t y o f d a t a stored,transmitted,or otherwise exposed topossibleunauthorizedmodification in anautomatedinformation system, or toestablisb the validity o f a transmitted message. Authentication Security measure designed to establish tbe validity ofatransmission, message, or originator, orameans of verifying an individual's identity or eligibility to receive specific categories of information or perform specific actions. Authorization to operate Authorization granted by the D A A for an information system to process, store, or transmit information. Authorization is based on acceptability o f the solution, the system architecture, implementation o f assigned IA Controls, the operational IA risk level, and tbe mission need. Auto-manual system Programmable, hand held COMSEC equipment used to perform encoding and decoding functions. Automated information system (obsolete term) (See information system (IS)) Automated Information System Application For IA purposes, the product or deliverable resulting from an acquisition program. A n Automated Information System (AIS) application performs clearly defined functions for which there are readily identifiable security considerations and

AR 2 5 - 2 ^ 2 4 October 2007

81

l^anningB^000^83^^

needs that are addressed as part o f t h e acquisition. An AIS application may be a single software application (for example, integrated consumable items support); multiple software applications that are related t o a s i n g l e mission (for example, payroll or personnel); o r a combination of software and hardware performing a specific support function acrossarange of missions (forexample, Global C o m m a n d a n d C o n t r o l System, Defense Messaging System). AIS applicationsaredeployed to enclaves foroperations,andoftenbave theiroperational security needs assumedby the enclave.Note that an AIS application is analogous toa^^majorapplication'^as defined in 0 M 8 A 130; however,this term is not used in order to avoid confusion with the DOD acquisition category of major AIS. Automated Tactical System Any IS that is used forcommunications, operations, o r a s a weapon during mobilization, deployment, o r a tactical exercise. An AutomatedTactical System (ATS) may include, but is not limited to, data processors, firmware, hardware, peripherals, sofiware or other interconnected components and devices(for example, radar equipment, global positioning devices, sensors, guidance systems for airbome platforms). Automated weapon systems Any weapons s y s t e m t b a t u t i l i z e s a c o m b i n a t i o n o f c o m p u t e r hardware and sofiware t o p e r f o r m t h e f u n c t i o n s o f a n information system (such as collecting, processing, transmitting, and displaying information) in its operation. Availability The state when data are in the place needed by the user, at the time the user needs them, and in the form needed by the user. Category Restrictivelabel that has been a p p l i e d t o b o t h classified andunclassifieddata,thereby increasing the requirementfor protectionof,andrestrictingtheaccess to, thedata. Examplesinclude sensitive compartmentedinformation,proprie tary information, and North Atlantic Treaty Organization information. Individuals are granted access to special category information only after being granted formal access authorization. Central computer facility O n e o r m o r e c o m p u t e r s with their peripheraland storage units,centra1processingunits,and communications equipment in a single controlledarea. Central computer facilities are those areas where computer(s) (otherthan personal computer(s)) are housed to provide necessary environmental, physical, or other controls. Certification Comprehensive evaluation of tbe technical and non-technical security features of an IS and other safeguards, made in support of tbe accreditation process,to establish the extent to whicbaparticular design and implementation meetsaset of specified security requirements. Certification and accreditation The standard D O D approach for identifying information security requirements, providing security solutions, and managing the security of DOD information systems. Certification authority C o v e m m e n t c i v i l i a n o r m i l i t a r y o f f i c i a l w i t h t h e authority and responsibility for formal e v a l u a t i o n o f t b e l A c a p a b i l i ties and servicesofan informationsystemandrisksassociated w i t h o p e r a t i o n o f t h e informationsystem.Tbe Army C A i s tbe Army F I S M A S I A O , the Director O l A i ^ C , NETC E S T L Certification support Those activities associated with coordination o f certification events such as preparationfor certification test activities, conduct of tbe certification event(s),preparation of tbe Certification Report,preparation o f the certification scorecard, and preparation o f the ISs risk assessmenL Certification support does not include those functions that are the responsibility of thesystem owner (forexample, InformationSystemSecurity Engineering,primary SSAA development, SSAA consolidation prior to submission for approval, or POAc^M development). Certification event An evaluation of an information system to determine compliance with l A C o n t r o l s . This m a y b e in supportof an IATO,1ATT,ATO,orDATO

62

AR 2 5 ^ 2 ^ 2 4 October 2007

l^anningB^00018317^

Classified defense information Official informationregarding national security thathasbeendesignatedtopsecret,secret,or confidential inaccordance with Executive Order 12958, as amended by Executive Orders 12972, 13142, and 13292. Clearing Removal of data from an IS,its storage devices, and other peripheral devices with storage capacity in s u c h a w a y that the data may not be reconstmcted using normal system capabilities (for example,tbrougb the keyboard). A n I S n e e d n o t b e d i s c o n n e c t e d f r o m a n y extemal networkbeforeclearing takesplace. Clearingenablesaproduct t o b e r e u s e d w i t h i n t b e sameenvironment a t t h e sameclassificationandconfidentiality leveL l t d o e s notproduceadeclassified product by itself, but may be the first step in the declassification process (see Purge). Commercial Communications Security Endorsement Program Relationship between theNationalSecurityAgency and i n d u s t r y , i n w h i c h t h e N a t i o n a l S e c u r i t y Agency provides the COMSECexpertise (that is,standards, algorithms, evaluations,and guidance) and industry provides design,development, andproduction capabilities to producea type 1 o r t y p e 2 producL Productsdeveloped under tbeCommercial COMSEC Endorsement Program may include modules, subsystems, equipment, systems, and ancillary devices. Compartmented mode IS security m o d e o f o p e r a t i o n w h e r e i n e a c b u s e r w i t h d i r e c t o r indirect accesstotbesystem, itsperipherals, remote terminals, o r r e m o t e h o s t s h a s a l l o f t h e following: (1) Valid security clearance f o r t h e m o s t restricted information processed in the system; (2) Formal access approval and signed non-disclosure agreements for that information to which a user is to have access; and (3) Valici need-to-know for information to which a user is to have access. Compromising emanations Unintentional signals that, i f intercepted and analyzed,would disclose theinformationtransmitted, received, handled, or otherwise processed by telecommunications or automated information systems equipment (see TEMPEST). Computer A m a c h i n e capable o f accepting data,performing calculations o n , o r otherwise manipulating that data, storing i t , a n d producing new data. Computer facility Physical resources that include stmctures or parts o f stmctures that support or house computer resources. The physical area where tbe equipment is located. Computer security Measures and controls that ensure confidentiality,integrity,and availability of the information processed and stored by a computer. Confidentiality Assurance that information is not disclosed to unauthorized entities or processes. Configuration control Process ofcontrolling modifications toatelecommunication or information system hardware,firmware, software, and documentation to ensure the system is protected against improper modifications prior to, during, and afier system implementation. Configuration management Tbe management of security features and assurances through control o f changes made to hardware, software, firmware, documentation,test,test fixtures,and test documentationofanlStbroughout the development and operationallife of the system. Contingency plan A p i a n maintained foremergency response,backupoperations, andpost-disaster recovery f o r a n IS, a s a p a r t of its security program,tbat will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation. Controlled access protection Log-inprocedures, audit of security-relevant events,and resourceisolation as prescribed for class C 2 i n D O D 5200. 28-STD

AR 2 5 - 2 ^ 2 4 October 2007

83

l^anningB^00018318

Controlled cryptographic item Secure telecommunications or information handling equipment, or associated cryptographic component,that is unclassified but g o v e m e d b y a s p e c i a l set of control requirements Such items are marked CONTROLLED CRYPTO GRAPHIC I T E M or, where space is limited, controlled cryptographic item.

'
Countermeasure An action, device, procedure, technique, or other measure that reduces the vulnerability o f an IS. Cryptographic Pertaining to, or concemed with, cryptography. Cryptographic equipment Equipment that embodies a cryptographic logic. Cryptography Principles, means, and methods for rendering plain information unintelligible and for restoring encrypted information to intelligible form. Oata security Protection of data from unauthorized (accidental or intentional) modification, destmction, or disclosure. Oeclassification (of magnetic storage media) A n administrative procedure resulting in a determination that classified information formerly stored on a magnetic medium has been removed or overwritten sufficiently to permit reuse in an unclassified environmenL Oefense in Oepth The D i D encompasses a physical and logical stmcture that requires a layeringofsecurity policies, procedures, and technology mechanisms to protect network resources, from the desktop to the enterprise, within and across the enterprise architecture. Layered defenses include, but are not limited to, the installation o f IA policy protections complementing the use of proxy services, firewalls, IDSs, implementation of D M ^ s , redundant filtering policies across devices, and access control and accountability. Oegauss Destroy infonnation contained in magnetic media by subjecting that media to high intensity alternating magnetic fields, following which the magnetic fields slowly decrease. Oemilitarized zone A s m a l l network or computer host that serves asa^^neutral zone" between an intemal network and the public network. A D M ^ prevents users from obtaining direct access to an intemal server that may have business data on i L A D M ^ is another approach to the use o f a firewall and can act as a proxy server i f desired. Oenial of service Result of any action or series o f actions that prevents any part of a telecommunications or IS from ftinctioning. Oesignated approving authority A general officer (GO), S E S o r e q u i v a l e n t o f f i c i a l appointedby tbe Army C 1 0 / G ^ with theautbority to formally assume responsibility for operatingasystem at an acceptable level of risk.This term is synonymous with Designated Authorization Authority and Delegated Accrediting Authority. OATO D A A determination that an information system cannot operate because of an inadequate IA design or failure to implement assigned IA controls. I f the system is already in use, operation o f the system is baited. Oigital signature An electronic rather t h a n a w r i t t e n signature used by someone to authenticate tbe identity o f a s e n d e r o f a m e s s a g e or signer o f a documenL A digital signature ensures that tbe content of a message or document is unaltered. Digital signatures can be time-stamped, cannot be imitated by another person, cannot be easily repudiated, and are transportable. Oiscretionary access control (OAC) Means o f restricting accesstoobjectsbasedontbeidentity and n e e d t o - k n o w o f users or g r o u p s t o w h i c h t h e object

64

AR 2 5 ^ 2 ^ 2 4 October 2007

l^anningB^000^^3^9

belongs.Controls are discretionary in the sense thatasubject with certain access permission is capable of passing that permission (directly or indirectly) to any other subjecL Eavesdropping Method used by an unauthorized individual to obtain sensitive information (for example, passwords, data) from a network. Eavesdropping techniquesinclude wiretapping,eavesdropping by radio,eavesdropping via auxiliary ports on aterminal,and use of software that monitors packets sent overanetwork. Vulnerable network programs are telnet and ftp Embedded cryptography Cryptography that is engineered i n t o a p i e c e ofequipment or system the basic function of which is not cryptographic. Components comprising tbe cryptographic module are inside the equipment or system and share host-device power and housing. The cryptographic function may be dispersed i f identifiable as a separate module within the bosL Embedded (computer) system Computer system that is an integral part o f a l a r g e r system or subsystem that performs or controlsafunction, either in whole or in parL

Emission security
Protection resulting from allmeasurestakento deny unauthorized personsinformation of value that might be derived fromintercept and analysis ofcompromisingemanationsfromcryptographicequipment,1Ss,andte1ecommunications systems. Enclave The c o l l e c t i o n o f c o m p u t i n g e n v i r o n m e n t s c o n n e c t e d b y o n e o r m o r e i n t e m a l n e t w o r k s , u n d e r the c o n t r o l o f a s i n g l e authority and security policy that includes personnel and physical security. Enclaves always assume the highest mission assurancecategory andsecurity classificationof the AlSapplications or outsourced IT-basedprocessesthey support, andderive tbeir security needs from thosesystems. They provide standard IA capabilitiessuchasboundary defense, incident detection and response, and key management, and also deliver common applications such as office automation and electronic mail. Enclaves may be specific to an organization o r a m i s s i o n , a n d tbe computing environments may be organized by physical proximity or by function independent of location. Examples of enclaves include local area networks and the applications they host, backbone networks, and data processing centers. Extranet A p r i v a t e network that uses Intemet protocols and tbe public telecommunications system to securely share information among selected extemal users. A n Extranet requires tbe use of firewalls, authentication, encryption, and VPNs that tunnel through the public network.

I^ile server
Computer h a r d w a r e u s e d t o p r o v i d e s t o r a g e f o r user data and software applications,processingcapabilitiesfor user workstations, and (normally) connection and control of workstations to a L A N .

Eirewall
A system or group of systems that enforces an access control policy between two networks with the properties of allowingonlyauthorizedtraffic to pass betweenthe networks from inside and outside the controlled environment and is immune to penetration.

Eirmware
Software that ispermanently stored in ahardware device that allows reading and executing the softw^are, but not writing or modifying i f Ely Away C ^ A package (tactical deployed) Tactical Cc^Apackage tbatsupportstactical IS deployment a n d c o n t a i n s t h e m i n i m u m a m o u n t o f C c ^ A information necessary for secure operations and allow connection to a network in tbeir deployed location. Eoreign exchange personnel Military members or civilian officials o f a f o r e i g n defense establishment (that i s , a D O D equivalent) who are assigned t o a D O D component in accordance with the terms o f an exchange agreement and who perform duties, prescribed b y a position description, for the D O D componenL

AR 2 5 ^ 2 ^ 2 4 October 2007

85

l^anningB^000^^320

Eoreign liaison officers A f o r e i g n govemment military or civilian employee who is authorized by his or her govemment, and is certified by tbe DODComponent, t o a c t a s a n o f f i c i a l representative of thatgovemment in itsdealing with t h e D O D component in connection with programs, projects, or agreements o f interest to the govemments. Three types of foreign liaison officers include security cooperation, operational, and national representatives. Eoreign national Non-U.S. citizens who normally reside in tbe country where employed, though they may not be citizens of that country, and who are employed by the Govemment or t h c D A to perform services or duties and are not considereda foreign official or representative of that nation.

Eoreign official
N o n - U . S . c i t i z e n s w h o m a y o r m a y not resideintbe country where employed, who are employed by theirrespective nation as an official representative of that nation in theirofficial capacity, and assigned to the Govemment or DA organizations or commands in tbe role of liaison, representative, engineer, scientist, or a member of the Military Personnel Exchange Program. Eormal access approval Documented approval by a data owner to allow access to a particular category of information. Eoreign ownership, control, or influence Acompany is considered to be under foreign ownership, control,or infiuence wbeneveraforeign interest has the direct or indirect power either throughthe ownership of the company's securities,contractual arrangements,or other means; to direct or decide matters affecting the operations of that company.Tbisinfiuence may result inunauthorized access to classified or sensitive information, information systems, or information systems architectures. Information assurance product Product or technology whose primary purpose is to provide security services (for example,confidentiality,authentication, integrity, access control, or non-repudiation o f data); correct known vulnerabilities; orprovide layered defense against various categories o f nonauthorizedor malicious penetrationsof informationsystems or networks. Examples include such products as data/network encryptors, firewalls, and intmsion detection devices. Information assurance-enabled product Product or technology whose primary role is not security, but which provides security services as an associated feature o f i t s intended operating capabilities. Examples include such products as securityenabled web browsers, screening routers, tmsted operating systems, and security-enabled messaging systems. l A A view See interconnected accredited IS view. Information owner Govemment, civilian or military official with statutory or operational authority for specified information, and responsibility forestablishing t h e c o n t r o l s f o r itsgeneration,collection,processing,disseminationanddisposaL Information owners w i l l ensure that the DA information entmsted to their care is store, processed, or transmitted only on informationsystemsthathaveobtainedlAapproval t o o p e r a t e i n a c c o r d a n c e w i t h A r m y p r o c e s s e s f o r t h e confiden tiality l e v e l o f their information.This applies to all systems,toinclude services o n C O C O systems as w e l l a s COCO systems. Interconnected accredited information system view I f a n e t w o r k c o n s i s t s o f previously accredited I S s , a M O A i s required b e t w e e n t h e D A A o f each DOD componentIS and tbe D A A responsible for tbe network The network D A A must ensure that interface restrictions and limitations are observed forconnectionsbetween DOD Component ISs. Inparticular, connections between accredited ISs must be c o n s i s t e n t w i t h t h e m o d e o f o p e r a t i o n o f e a c h l S a s w e l l a s t h e s p e c i f i c s e n s i t i v i t y l e v e l o r range of sensitivity levels foreach IS. I f a component that requires an extemal connection to perform a useful function is accredited, it must comply with any additionalinterface constraints associated w i t h t h e particular interface device used for the connection as well as any other restrictions required by the M O A . Information system Set o f information resources organized for the collection, storage, processing, maintenance, use, sharing, dissemination.

66

AR 2 5 - 2 ^ 2 4 October 2007

l^anningB^0D01^321

disposition, display, or transmission o f information. Includes AIS applications, enclaves, outsourced IT-based processes, and platform IT interconnections. Information assurance Tbe protection of systems and information in storage,processing,or transit from unauthorized access or modification; denial o f service to unauthorized users;or tbe provision of service to authorized users.It also includes those measures necessary to detect, document, and counter such threats. Measures that protect and defend information and ISs by ensuring theiravailability, integrity, authentication, confidentiality, and non-repudiation. This includesproviding for restoration of ISs by incorporating protection,detection,and reaction capabilities.This regulation designatesIA as the security discipline that encompasses COMSEC, INFOSEC, and control of compromising emanations (TEMPEST). Information Assurance Vulnerability l^anagement (1AV1V1) l A V M is the DOD program to identify and resolve identified vulnerabilities in operating systems. It requires the completion of four distinct phases to ensure compliance. Information dissemination management Activities to support the management ofinformation and data confidentiality, integrity, and availability, including document management, records management, official mail, and work-fiow managemenL Information technology ( I T ) Tbe hardware, firmware,and software used a s a p a r t of an information system to perform DOD information functions. This definition includes computers, telecommunications, automated information systems, and automatic data processing equipmenL I T i n c l u d e s a n y assembly of hardware,software,or firmware configuredto collect, create,communicate, compute, disseminate, process, store, or control data or information. Integrity The degree o f protection for data from intentional or unintentional alteration or misuse. Intelligence information Information collected and maintained in support of a U.S. intelligence mission. I n t e r i m authority to operate Temporary authorizationgrantedby t h e D A A t o o p e r a t e a n information systemundertheconditions orconstraints enumerated in the Accreclitation Decision. I n t e r i m authority to test (certification and accreditation) Temporary authorization granted by the D A A to test an information system in a specified operational information environment ( u s u a l l y a l i v e information environment or with live data) within the timeframe and under the conditions or constraints enumerated in the Accreditation Decision. Incident Assessed occurrence having actual or potentially adverse effects on an information system. Internet A g l o b a l collaboration o f data networks that are connected to each other,using common protocols (for example,TCP/ IP) to provide instant access to an almost indescribable wealth of information from computers around the world. Intranet S i m i l a r t o tbe 1ntemet,but is accessible only by the organization's employees or others with authorization. Usually intemal to a specific organization. Installation Campus Area Network Tbe common transport network provided by the responsible D O I M on everyArmy post/camp/station and the associated common network services,including network management a n d I A s e r v i c e s . T h e l C A N is often commonly referred to as the backbone network. Information system security incident (security incident) Any unexplained event that could result i n t h e l o s s , c o r m p t i o n , o r denial of access to data, as well as any event that cannot be easily dismissed or explained as normal operations of the system. Also, an occurrence involving classified or sensitive information being processed by an ISwbere there may be:adeviation from the requirements of the goveming security regulations;asuspected or confirmed compromise or unauthorized disclosure of the information;questionable

AR 2 5 - 2 ^ 2 4 October 2007

87

l^anningB^000^^322

data or information integrity (for example,unauthorizedmodification);unauthorized modification o f d a t a ; o r u n a v a i l able information f o r a p e r i o d o f t i m e . A n attempt to exploit any IS such that the actual or potential adverse effects may involvefraud, waste.or abuse; compromiseof information; l o s s o r d a m a g e o f p r o p e r t y or information; ordenial of service. Security incidents include penetration of computer systems, exploitation of technical and administrative vu1nerabi1ities,andintroductionofcomputer vimses or other forms of malicious code.(Asecurity incident may also i n v o l v e a v i o l a t i o n o f l a w . I f a v i o l a t i o n o f l a w is evidentor suspected, theincident must a l s o b e r e p o r t e d t o b o t b security and law enforcement organizations for appropriate action.) (NST1SSD 503) informationsystemseriousincident Any event that poses grave danger to the Army's ability to conduct established information operations. I^ey Information (usuallyasequence of random or pseudo-random binary digits) used initially to set up and periodically to change tbe operations performed in crypto-equipment for the purpose of encrypting or decrypting electronic signals, for determining electronic counter-measures pattems (for example,frequency hopping or spread spectmm),or for producing another key. I^ey management Process by which a key is generated, stored, protected, transferred, loaded, used, and destroyed. L^east privilege Principle that requires that each subject be granted the most restrictive set of privileges needed for the performance of authorized tasks. This also applies to system privileges that might not be needed to perform tbeir assigned job. NOTE: A p p l i c a t i o n o f this principlelimitsthe damage that can result from errors, and accidentalandunauthorized use of an IS Limited privileged access Privilegedaccess with limitedscope(forexample,autbority tochangeuser access to dataor system resourcesfora single information system or physically isolated network). Local area network A system that allows microcomputers to share information and resources within a limited (local) area. IVIachine cryptosystem Cryptosystem in which tbe cryptographic processes are performed by crypto-equipmenL l^ainframe A computer system that is characterized by dedicated operators (beyond the system users); high capacity, distinct storage devices; special environmental considerations; and an identifiable computer room or complex. IVIalicious code Sofiware or firmware capable of performing an unauthorized function on an IS. l^alicious software code Any software code intentionally created or introduced intoacomputer system for the distinct purpose ofcausing barm or loss to the computer system,itsdata,or other resources.Many users equate malicious code with computer vimses, which can lie dormant for long periods o f time until tbe computer system executes the trigger that invokes the vims to execute. Within the last several years, the Intemet has been the conduit of various types of computer vimses. However, there are other types of malicious codes used to cause havoc that are not as well publicized as tbe vims. ^issionassurancecategory Refiects the importance o f i n f o r m a t i o n relative to the achievement of DOD goals and objectives, particularly the warfigbters' combat mission. Mission assurance categories are primarily used to determine the requirements for availability and integrity. l^anual cryptosystem Cryptosystemin which tbe cryptographicprocesses are p e r f o r m e d m a n u a l l y w i t h o u t t h e u s e o f c r y p t o - e q u i p m e n t o r auto-manual devices.

66

AR 2 5 - 2 ^ 2 4 October 2007

l^anningB^000^^323

l ^ i l i t a r y information environment The environment contained within the global information environment, consisting of information systems and organizationsfriendly and adversary,military and non-military-that support, enable, or significantly infiuenceaspecific military operation. l^onitoring Monitoring i s t h e o b s e r v a t i o n o f a r e s o u r c e for the purpose ofascertainingitsstatus or operationalstate. Monitoring includes the automated, real or near-real time interception o f information transiting the system or network b y a s y s t e m o r n e t w o r k a d m i n i s t r a t o r d u r i n g t h e n o r m a l c o u r s e o f e m p l o y m e n t wbileengaged in activitiesnecessary t o k e e p t h e systemor networkoperationalandto protect tbe rights and property of the s y s t e m o r n e t w o r k o w n e r . Forexample, automated monitoring or logging of system or network events (such as by IDS, IPS, firewalls, and so on) can provide valuable information related to malicious content o f communications; unauthorized access, exceeding access or misuse of systems or networks; policy and criminal violations, etc. as well as the performance of the systems. 8ecause most electroniccommunications d o n o t invo1ves^^partiestotbeconversation,"monitoringbysystemandnetworkadministrators is not ^^electronic surveillance" as defined in A R 381 10. l^ultilevel (security) mode IS security mode o f o p e r a t i o n w h e r e i n a l l t b e following statements are satisfied conceming tbe users who have direct or indirect access to the system, its peripherals, remote terminals, or remote hosts: d. Some users do not have a valid security clearance for all the information processed in the IS. A l l users have the proper security clearance and appropriate formal access approval for that information to which they have access. c^. A l l users have a valid need to-know only for information to which they have access. Mlultilevel security Conceptofprocessinginformationwithdifferentclassificationsandcategories that simultaneously permits accessby users witbdifferent security clearances,butpreventsusersfromobtainingaccess to i n f o r m a t i o n f o r w b i c h t b e y lack authorization. National Security System (44 USC 3542) Any information system (including any telecommunications system) used or operated by an agency or byacontractor of anagency, or otherorganization o n b e b a l f o f an a g e n c y - ( i ) tbe function, operation, or use of which involves intelligence activities; involves cryptologic activities related to national security; involves command andcontrol of military forces; involves equipment that is an integral part o f a w e a p o n o r weapons system;or is critical t o t h e direct fulfillment of military or intelligence missions (excludingasystem that is to be used for routine administrative and business applications, for example, payroll, finance, logistics, and personnel management applications); or, (ii) is protectedat all timesbyproceduresestablishedforinformationtbathavebeenspecificallyauthorizedunder criteria established by anExecutive Order or an A c t o f C o n g r e s s t o b e k e p t c l a s s i f i e d i n t h e i n t e r e s t o f n a t i o n a l d e f e n s e or foreign policy. Need-to-know Approved access to, or knowledge orpossession of, specific information required to carry out official duties. Net-centricity A r o b u s t globally connected network environment (including infrastmcture, systems,processes,and people) in which data is shared timely and seamlessly among users, applications, and platforms. Net centricity enables substantially improved military situational awareness and significantly shortened decision making cycles.

Network
C o m m u n i c a t i o n s m e d i u m a n d a l l c o m p o n e n t s a t t a c h e d t o t h a t m e d i u m w h o s e f u n c t i o n i s tbe transfer of information. Components may includeISs, packet switches,telecommunications controllers,key distribution centers,and technical control devices. Network management Activities to support tbe management and support of tbe network, including the engineering of changes to the network, maintenance of the network and its components, and user support activities. Network operations The organizations and procedures required to monitor, manage, and control the global information grid. Network operations incorporate network management, IA, and information dissemination managemenL

AR 2 5 - 2 ^ 2 4 October 2007

89

l^anningB^000^^32^

Network security Protection of networks and their services from unauthorized modification, destmction, or disclosure. It provides assurance the network performs its critical functions correctly and there are no harmful side effects. Networthiness The networthiness program manages the specific risks associated with the fielding of ISs and supporting efforts, requires formal certification throughout the life cycle of all ISs that use tbe infostmcture, and sustains the health of the Army enterprise infostmcture. Networthiness certification The Army's networthiness certificationprocessincorporates and demonstratesthe completeness ofguidance,formats, and practices such as the Army knowledge enterprise; the Command, Control, Communications, Computers and Intelligence Support Plan (C4ISP); the DIACAP; and existing developmental and operational test requirements. Non-communications emitter Any device that radiateselectromagneticenergy for purposes other than communicating (for example,radar,naviga tional aids, and laser range finders). A non-communication emitter may include features normally associated with computers, in which case it must also meet tbe requirements for an IS. Non-privileged access Userlevel access; normalaccessgiventoatypicaluser. Genera11y,allaccess tosystemresourcesiscontrolledina way that does not permit those controls and mies to be changed or bypassed by a typical user. Operations Security For theDOD components,OPSECisaprocess of identifying criticalinformation and subsequently analyzing friendly actions attendant to defense acquisition, defense activities, military operations, and other activities to: d. Identify those actions that may be observed by adversary intelligence systems. ^. Determine what indicators hostile intelligence systems may obtaintbat could be interpreted or pieced together to derive critical information in time to be useful to adversaries. c:. Select and execute measures that eliminate or reduce to an acceptable level tbe vulnerabilities of friendly actions to adversary exploitation. Outsourced IT-based Process For DOD1A purposes,an outsourced IT-based processisageneral term used to refer to outsourced business processes supported by private sector information systems, outsourced information technologies, or outsourced information services. Anoutsourced ITbasedprocessperforms clearly defined functions for which there arereadily identifiable security considerations and needs that are addressed in both acquisition and operations. Password Protected or private character string used to authenticate an identity or to authorize access to data. Personal computer See information system. Personal digital assistant Ahand-held computer that allows an individual to store, access, and organize information.Most PDAs work on either a Windows-basecl or a Palm operating system. PDAs can be screen based or keyboard-based, or both. Personal electronic devices Ageneric title used to describe myriad available small electronic portable devices that employ the wireless application protocol and other ^^open standards". Personal e-mail account An e-mail account acquired by an individual for personal use. Also know as a private accounL Platform information technology interconnection For DOD IA purposes, platform IT interconnection refers to network access to platform IT.Platform IT interconnection hasreadily identifiablesecurity considerationsandneeds thatmustbeaddressedinbotbacquisition,andoperations. Platform ITrefers to computer resources, bothhardwareandsoftware, that arephysically part of, dedicated to, or essential in real time to themission performanceof special purposesystemssuch as weapons, trainingsimulators, diagnostic test and maintenance equipment, calibration equipment, equipment used in the research and development of 90 AR 25-2^24 October 2007

l^anningB^000^^325

weapons systems, medical technologies, transport vehicles, buildings, and utility distribution systems such as water and electric. Examplesof platform ITinterconnectionstbatimposesecurityconsiderationsinclude communications inter facesfor data exchanges with enclavesfor mission planning or execution, remote administration, and remote upgrade or reconfiguration. Principle of least privilege The principle of least privilege requires that a user be given no more privilege than necessary to perform a job. Ensuring least privilege requires identifying what the user'sjob is, determining the minimum set o f privileges required to perform that job, and restricting the user to a system or domain with those privileges and nothing more.

^
Private account Seepersonal e-mail accounL

Privileged access Authorized access that providesacapability to alter tbe properties,behavior,or control o f the information system or network. It includes, but is not limited to, any of the following types of access: d. ^^Superuser,"^^root,"or equivalent access,such as accesstothecontrolftinctions of theinformationsystemor network, administration of user accounts, and so forth. ^. Access to change control parameters (forexample, routing tables, path priorities, addresses) of routers, multiplexers, and other key information system or network equipment or software. c^. Ability and authority to control and change program files, and other users' access to data. c7. Direct access(a1so called unmediated access) to functions at the operating-system level that would permit system controls to be bypassed or changed. ^. Access and authority for insta11ing,configuring,monitoring,or troubleshooting the security monitoring functions of information systems or networks (for example,networkor system analyzers;intmsion detection software;firewa11s) or in performance of cyber or network defense operations. Protected Oistribution System Wire-line or fiber-optic telecommunications system that includes terminals and adequate acoustic, electrical, electromagnetic,andphysical safeguards topermit itsuse fortheunencryptedtransmissionofclassified information. Proxy server Aserver acting on behalf of another server or servers.Such an arrangement allowsasingle point o f entry or exit i n t o a TCP/IP network. A p r o x y server may also have built-in software that w i l l allow it to be configured to act a s a f i r e w a l l , cache server, or logging server.

^
Purge R e m o v a l o f d a t a from an I S , i t s storage devices,or other peripheral devices with storage capacity in s u c h a w a y that the data may not be reconstmcted. A n IS must be disconnected from any extemal network before a purge (see Clearing). RA01US Remote Authentication Dial-In User Service isaprotocol by which users can have access to secure networks througha centrally managed server.RADIUS provides authentication foravariety of services,such as login,dial-back, serial line Intemet protocol (SLIP), and point to point protocol (PPP). Remote access server A s e r v e r that is dedicated t o h a n d l i n g u s e r s t h a t a r e n o t o n a L A N , b u t need remote access t o i L T h e remote access server allowsusers to gain access tofiles and print services on t h e L A N f r o m a r e m o t e l o c a t i o n . F o r example,auser who d i a l s i n t o a n e t w o r k f r o m home using an analog modem or an I S D N c o n n e c t i o n w i l l d i a l i n t o a r e m o t e access server.Once the user is authenticated he can access shared drives and printers as i f he were physically connected to tbe office L A N . Remote terminal A terminal that is not in the immediate vicinity o f t h e IS it accesses. This is usually associated with a mainframe environment and the use of a terminaL Terminals usually cannot operate in a stand alone mode. Risk The probability thataparticular threat w i l l exploitaparticular vulnerability of an information system or telecommunications system.

AR 2 5 - 2 ^ 2 4 October 2007

91

l^anningB^000^^32^

Risk assessment Process of analyzing threats to and vulnerabilities of aninformation system, and determining potential adverse effects that the loss of information or capabilities ofasystem would have on national security and using the analysis asabasis for identifying appropriate and cost-effective countermeasures. Security guard/filter IS tmsted subsystem that enforces security policy on the data that passes through iL Security test and evaluation Examination and analysis ofthe safeguards required to protect an IS, as they havebeen applied in an operational environment, to determine tbe security posture of tbe system. Sensitive but unclassified (obsolete term) An obsolete term (in DOD) that has been replaced by sensitive information (see below). Sensitive information Any information the loss, misuse, or unauthorized access to or modification of which could adversely affect tbe national interest or the conduct ofFederal programs,or the privacy to which individuals are entitled under5USC 552a (ThePrivacyAct),butwhichhasnotbeenspecificallyauthorizedundercriteriaestablishedby executive order or an Act of Congress tobekept secret inthe interest of nationaldefense or foreignpolicy. Sensitiveinformationincludes information in routine DOD payroll, finance, logistics, and personnel management systems. Examples of sensitive information include, but are not limited to, the following categories: d. FOUO,inaccordancewitbDOD 5400.7 R,isinformationthat may be withheld from mandatory publicdisclosure under the FOIA. ^. Unclassified technical data is data related to military or dual-use technology that is subject to approval, licenses, orauthorization underthe Arms Export Control Act and withheld from public disclosure in accordance with DOD 5230 25 c ^ . Department of State(DOS) sensitivebut unc1assified(S8U) is informationoriginatingfrom the DOS that has been determined to be S8U under appropriate DOS information security polices. c7. Foreign govemment information is information originating from a foreign govemment that is not classified CONFIDENTIAL or higher but must be protectedin accordance with DOD 5200.1 R. ^. Privacy data is personal and private information (for example, individualmedical information, home address and telephone number, social security number) as defined in the Privacy Act of 1974. Social engineering Term used among crackers and security professionals for cracking techniques that rely on weaknesses in process rather than software; the aim is to trick people into revealing passwords or other information that compromises a target system'ssecurity.Classic scams include phoning upauser or helpdesk who has the required information and posing as a field service tech or a fellow employee with an urgent access problem. SPAl^ Unsolicited e-mail received on or fromanetwork,usuallytheIntemet, inthe form of bulk mail obtained from e-mail distribution lists or discussion group lists. Stand-alone information system An IS that is physically, electronically, and electrically isolated from all other IS. Survivability The ability ofacomputer communication systembased application to satisfy and to continue to satisfy certain critical requirements (for example,specificrequirements for security, reliability, realtime responsiveness,and correctness)in tbe face of adverse conditions. Susceptibility Technicalcharacteristics describing inherent limitations ofasystem that have potentialfor exploitation by the enemy. System Tbe entire computer system, including input/output devices, tbe supervisorprogram or operating system, and other included software. System administrator Asystemadministrator(SA),orsysadmin, isaprivileged-levelindividualemployedorauthorized tomaintainand

92

AR 25-2^24 October 2007

l^anningB^000^^32/^

operateacomputer systemor network. Individualresponsiblefortheinstallationandmaintenanceofaninformation system, providing effective information system utilization, adequate security parameters, and sound implementation of established information assurance policy and procedures. (CNSS Instmction No. 4009) System audit The process of auditing and spot checking to verify secure operation of a system and its support software. I f irregularities are discovered,theauditprocessincludes analysis andidentificationof the problem,performingcorrecfive actions necessary to resolve the situation, tracking open items actively, and briefingmanagement on identified security deficiencies. System of systems A t o t a l network made up o f all the interconnected computer systems, communication systems, and network components within some logical boundary. (Replaced with the term enclave.) System owner The Govemment civilian or military person or organization responsible for introduction or operation of a n I S used by o r i n s u p p o r t o f t h e Army. T h e S O isresponsibleforensuringthesecurity o f t h e IS as longas it remains in Army inventory, or until transferred (temporarily or permanently) to another Govemment person or organization and such transfer is appropriatelydocumented and provided as an artifact t o t h e accreditationpackage. Ifacontractor provides IA services toasystem with the intent of meeting some or all of the SOs IA responsibilities, the IA responsibilities do not shift from the Govemment SO to the contractor.The Govemment SO remains responsible for ensuring that the IA services are provided.Tbe Govemment SO may charge t h e l A M with authority to perform many of the S O I A d u t i e s , ifappropriate;however,finalresponsibility will remain w i t h t h e S O . T h e S O could b e a p r o d u c t , p r o g r a m or project m a n a g e r , a s t a f f o r command element that purchases or developslTequipment and s y s t e m s , a D O I M o r anyone else who is responsible for an IS. The SO is responsible for ensuring that all IA requirements are identified and included in thedesign,acquisition, installation,operation,maintenance,upgrade or replacement o f a l l D A I S inaccordance with D O D D 8500 1 T e r m i n a l Access Controller Access System A system developed by tbe Defense DataNetwork community to control access to its terminal access controllers. Technical vulnerability A hardware, firmware, communication, or software weakness that leaves a computer processing system open for potential exploitation or damage,either extemallyor internally,resulting in risk for tbe owner,user,or manager of the system. Telecommunications Preparation, transmission, communication, or related processing of information (writing, images, sounds, or other data) by electrical, electromagnetic, electromechanical, electro-optical, or electronic means. Telecommunications and information systems security Protection afforded to telecommunications and information systems to prevent exploitation through interception, unauthorized electronic access, or related technical intelligence threats and to ensure authenticity. Note: Such protection results from t h e a p p l i c a t i o n o f security measures (includingcryptosecurity, transmission security, emission security, and computer security) to systems that generate, store,process, transfer, orcommunicate information of use to an adversary,andalsoincludesthephysicalprotectionoftecbnicalsecuritymaterielandtechnicalsecurity information. Telecommunications system Any system that transmits, receives, or otherwise communicates information by electricaL electromagnetic, electromechanicaL or electro-optical means. A telecommunications system may include features normally associated with computers, in which case it must also meet the requirements for an IS. Telnet A t e r m i n a l emulation program forTCP/IP networks such as t h e l n t e m c L T e l n e t i s a c o m m o n w a y to remotely control Web servers. Terminal Any device that is used to access an IS,including^^dumb" terminals (which only functionto access an IS), as well as personal computers or other sophisticated ISs that may access other ISs as one of their functions.

AR 2 5 - 2 ^ 2 4 October 2007

93

l^anningB^0001^328

Threat Capabilities,intentions,and attack methods ofadversariestoexploit,damage,or alter informationor an information system. Also, any circumstance or event with the potential to cause harm to information or an information system. Any circumstance or event with tbe potential to adversely impact an information system through unauthorized access, destmction, disclosure, modification o f data, and/or denial of service (see CNSS Instmction No. 4009). Threat agent A means or method used to exploit a vulnerability in a system, operation, or facility. Threat analyst Designated member of the intelligence staff of the supported command of tbe D A A w h o w i l l provide the interface on behalf o f D A w i t h the DOD Intelligence C o m m u n i t y , t b e G 2 , N E T C O M / 9 t h S C (A), and tbe intelligence component of the 1st Information Operations Command (Land) to document foreign threats regarding computer network attack (CNA) and computer network exploitation (CNE) or other non-technical threats. Time bomb and logic bomb Malicious code that can be triggered byaspecific event or recur a t a g i v e n t i m e . A l o g i c bomb is triggered by an event instead o f a specific time. One example o f a logic bomb would be a set of programmed instmctions to search a company'spayroll files,checking for the presence of tbe programmer's name.Oncetbe programmer ceases employment, the logic bomb is triggered to cause damage to data or software. Trapdoor A bidden software program (potentially embedded into the hardware or firmware) mechanism that causes system protection mechanisms to bebypassed.The code canbe hidden i n t h e l o g o n sequence where users are asked toinput their user IDs and thenpasswords. I n n o r m a l circumstances, tbe inputpasswords arecbeckedagainst stored values corresponding to theuser I D ; i f thepasswordsare valid, logonproceeds. The trapdoor sofiware would check f o r a specific user ID, and whenever that user ID is checked, it bypasses the password checking routine and authorizes immediate logon. Trapdoors are sometimes built into development systems by programmers to avoid the lengthy logon procedure. T r i v i a l file transfer protocol A simple form o f t h e File transfer protocol (FTP). TFTPuses the userdatagramprotocol (UDP), a connection-less protocol that, l i k e T C P , m n s on top of IP networks.It is used primarily for broadcasting messages overanetwork and provides no security features. It is often used by servers to boot diskless workstations, X-terminals, and routers. T r o j a n horse Anon-replicating program that appears to be legitimate, but is designed to have destmctive effects on data residing in tbe computerontowhich the program was1oaded.Theseprogramscanperformvariousmaliciousactivities,suchas deleting files, changing system settings, allowing unauthorized remote access, and mnning malicious programs resulting in destmction or manipulation of data. Trojan horses require user intervention to propagate and install such as opening an e mail attachmenL

User
Person or process accessing an IS by direct connections (for example, via terminals) or indirect connections. User 10 Unique symbol or character string that is used by an IS to uniquely identify a specific user. V i r t u a l private network A p r i v a t e data network that makes use of the public telecommunication infrastmcture, maintaining privacy through tbe use o f a tunneling protocol and security procedures,

^
Virus A s m a l l program written to alter the wayacomputer operates without tbe permission or knowledge o f the u s e r . A v i m s is self replicating with a potentially malicious program segment that attaches or injects itself into an application programor other executablesystemcomponentandleaves no extemalsigns of itspresence,andusual1y programmed to damage system programs, delete files, create a denial of service, or reformat the hard disk.

94

AR 2 5 - 2 ^ 2 4 October 2007

l^anningB^000^^329

Vulnerability Weakness in an infonnation system, cryptographic system, or components o f either (for example, system security procedures, hardware design, intemal controls) that could be exploited. Vulnerability assessment Systematic examination of an IS or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict theeffectiveness of proposed security measures, and confirm the adequacy o f such measures after implementation. e a r n i n g banner A waming banner is verbiage thatauser sees or is referred to at the point of a c c e s s t o a s y s t e m w h i c h sets the right expectations for users regarding acceptable use of a computer system and its resources, data, and network access capabilities. These expectations include noticeofauthorized m o n i t o r i n g o f users' activities while they are using the system, and wamings of legal sanctions should the authorized monitoring reveal evidence of illegal activities o r a violation of security policy. ^ i d e area network A W A N coversawider geographic area t h a n a L A N , i s an integrated voice or data network, ofien uses common carrier l i n e s f o r t h e interconnectionofitsLANs,andconsistsofnodesconnectedoverpoint-to-pointchannels. Commercial examples are Intemet and public data. Govemment examples are NIPRNET and SIPRNET. ^orld^ide^eb The universeof accessible information availableon many computers spreadthrougb tbe worldandattacbed to that gigantic computer network called t h e l n t e m c L T h e W e b e n c o m p a s s e s a b o d y of sofiware,aset o f p r o t o c o l s , a n d a s e t ofdefined conventionsfor accessing tbeinformation ontbe W e b . T h e W e b useshypertext and multimediatechniques to make theWeb easy for anyone to roam,browse, and contribute t o . T h e W e b makes publishing information (that is, making that information public)as easy as creatinga^^homepage" and posting it onaserver somewhere in tbe IntemeL Also called W E 8 or W3 ^orm A n independent program that replicatesitself by copying from one s y s t e m t o a n o t h e r , u s u a l l y o v e r a n e t w o r k without the use o f a host file. Like a vims, a worm may damage data directly, or it may degrade system performance by consuming system resources or even shutting a network down, but, in contrast to vimses, does not require the spreading of an infected host file.Usually tbe worm will releaseadocument that already has the^^worm"macro inside the documenL S e c t i o n III Special Abbreviations and Terms This section contains no entries.

AR 2 5 - 2 ^ 2 4 October 2007

95

l^anningB^000^^330

UNCLASSIFIED
ManningB_00016331

PIN 08i 055-000

USAPD
ELECTRONIC PUBLISHING SYSTEM OneCol FORMATTER WIN32 Version 253 PIN: DATE: TIME: PAGES SET: DATA FILE: DOCUMENT: 081066-000 03-24-09 11:21:05 99 C:\wincomp\r25-2.fil AR 25-2 SECURITY: UNCLASSIFIED DOC STATUS: REVISION

ManningB_00016332

SE86
Questionaire For National Security Positions SE328 Certificate Pertaining to Eoreign Interests

A^^endix 8 Sample Acce^tat^le t^se policy


8 - 1 . Purpose Thisappendixprovidesasample AUP that maybeused by organizations to obtainexplicit acknowledgements from individuals on their responsibilities and limitations in using ISs. 8 - 2 . Explanation of conventions in sample acceptable use policy Figure8 1,below,illustratesarepresentative AUP.In this figure,text appearing in italicized font should be replaced with tbe appropriate information pertinent to the specific AUP being executed. Army organizations may tailor the information in the sample AUP to meet tbeir specific needs, as appropriate.

PROSECUTION EXHIBIT for identification PAGE OFFERED: PAGE ADMITTED: PAGE I OF M PAGES
AR 25-2 24 October 2007 61

MannlngB_00016296

Acceptable Use Policy 1. Understanding. I understand that I have the primary responsibilily to safeguard the information contained in classified network name (CNN) and/or unclassified network name (UNN) from unauthorized or inadvertent modification, disclosure, destruction, denial of senrice, and use. 2- Access Access to this/these network(s) is for official use and authorized purposes and as set forth in DoD 5500.7-R, "Joint Ethics Regulation" or as further limited by this policy. 3. Revocability. Access to Army resources is a revocable privilege and is subject to content monitoring and security testing. 4. Classified infomiation processing. CNN is the primary classified IS for (insert your organization). CNN is a US-only system and approved to process (insert classification) collateral information as well as; (insert additional caveats or tiandling instructions). CNN is not authorized to process [insert classification or additional caveats or special handling instructions). a. CNN provides communication to external DoD (or specify other appropriate U.S. Government organizations using the SIPRNET. Primarily this is done via electronic mail and internet networking protocols such as web, ftp, telnet (insert others as appropriate). b. The CNN is authorized for SECRET or lower-level processing In accordance with accreditation package number, identification, etc. c. The classification boundary between CNN and UNN requires vigilance and attention by all users, CNN is also a US-only system and not accredited for transmission of NATO material. d. The ultimate responsibiity for ensuring the protection of information lies with the user. The release of TOP SECRET information through the CNN is a security violation and virill be investigated and handled as a security violation or as a criminal offense. 5. Unclassified Information Processing. UNN is the primary unclassified automated administration tool for the [insert your organizathn), UNN is a US-only system. a. UNN provides unclassified communication to external DoD and other United States Government organizations. Primarily this is done via electrons mail and internet networking protocols such as web, ftp, telnet (insert others as appropriate). b. UNN is approved to process UNCLASSIFIED, SENSITIVE infonnation in accordance with (insert local regulation dealing with automated information system security management program). c. The UNN and the Internet, as viewed by the [insert your organization), are synonymous. Email and attachments are vulnerable to interception as they traverse the NIPRNET and Internet.

Figure B-1. Acceptable use policy

62

AR 25-2 24 October 2007

ManningB_00016297

5. Minimum security rules and requirements. AsaC^^and^orL^^^ system user,the following minimum security rules and requirements apply; a. Personnel are not permitted access to and unless in complete compliance with the (inseri your organization)personnel security requirement for operating inaTOPSECi^ET system-high environmenL b. lhave completed the user security awareness-training module. Iwill participate in all training programs as required (Inclusive ofthreat Identification, physical securlty,acceptable use policies, malicious content and logic identification, and non standard threats such as social engineering) before receiving system access, c Iwill generate, store, and protect passwords or pass-phrases Passwords will consist of at least 10 characters with2each of uppercase and lowercase letters,numbers, and special characters, lam the only authorized user of this accounL (Iwill not use user 10, common names, birthdays, phone numbers, military acronyms, call signs, or dictionary words as passwords or p^ss-phrases.) d. Iwill use only authorized hardware andsoftware Iwill not install or use ^ny personally owned hardware, software, shareware, or public domain software. e. Iwill use virus^hecking procedures before uploading or accessing information from any system, diskette, attachment, or compact disk, f. Iwill not attemptto access or process data exceeding the authorized IS classification leveL g. Iwill not alter,change, configure, or use operating systems or programs,except as specifically authorized. h. Iwill not Introduce executable code (such as,but not limited to,.exe,.com, vbs,or.batflles) without authorization,nor willlwrite malicious code. i Iwill safeguard and mark with the appropriate classification level all information created, copied,stored,or disseminated from the IS and will not disseminate it to anyone withouta specific need to know. j Iwill not utilize Army-or OoOprovided ISs for commercial financial gain or illegal activities. k. Maintenance will be performed by the System Administrator (SA) only L Iwill use screen locks and log off the workstation when depariing the area m. Iwill immediately report any suspicious output, files,shoricuts,or system problems to the (^^ser^ your c^gar^iza^ic^r^^SAand^orlASO and cease all activities on the system. n. Iwill address any questions regarding policy,responsibilities,and duties to (^'r^serf ^1^7 organrza^iori)SAand^orlASO.

Figure B-1. Acceptable use policyContinued

AR 25-2 24 October 2007

63

ManningB_00016298

0. I understand that each IS is the property of the Army and is provided to me for official and authorized uses. I further understand that each IS is subject to monitoring for security purposes and to ensure that use is authorized. I understand that I do not have a recognized expectation of privacy in official data on the IS and may have only a limited expectation of privacy in personal data on the IS. I realize that I should not store data on the IS that I do not want others to see, p. I understand that monitoring of (CNN) (UNN) will be conducted for various purposes and information captured during monitoring may be used for administrative or disciplinary actions or for criminal prosecution. I understand that the following activities define unacceptable uses of an Army IS: (insert specific criteria) to show what is not acceptable use to show what is acceptable during duty/non-duty hours to show what is deemed proprietary or not releasable (key word or data identification) to show what is deemed unethical (e.g., spam, profanity, sexual content, gaming) to show unauthorized sites (e.g., pornography, streaming video, E-Bay) to show unauthorized services (e.g., peer-to-peer, distributed computing) to define proper email use and restrictions (e.g., mass mailing, hoaxes, autofonwarding) to explain expected results of policy violations (1^, 2*, 3"", etc)

(Nofe. Activity in any criteria can lead to criminal offenses ) q. The authority for soliciting a social security number (SSN) is EO 939 The information below will be used to identify you and may be disclosed to law enforcement authorities for investigating or prosecuting violations. Disclosure of information is voluntary; however, failure to disclose information could result in denial of access to (insert your organization) information systems. 7. AcknowledgemenL I have read the above requirements regarding use of [insert your organization) access systems. I understand my responsibilities regarding these systems and the information contained in them. insert name here Directorate/Division/Branch insert name here Last Name, First, Ml ' insert name here Signature insert date here Dale insert Rank/Grade and SSN here Rank/Grade/ SSN insert phone number here Phone Number

Figure B-1. Acceptable use policyContinued

64

AR 25-2 24 October 2007

ManningB_00016299

Prosecution Exhibit 95 18 pages classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

Prosecution Exhibit 9^ 18pages classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibit 9^ ICT^ classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

c o
tn

c ^ tu -a H

a
H

s
k

gO
^
W k PL. O

C/3 UJ

L
I

a:

D, OH 0 .

< c<

Prosecution Exhibit 98 ICT^ classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20August2013 stored in the classified supplementto the original Record ofTrial

M O LD Ul Ul

l-

LD Ul

M O LD Ul W

t- O LD Ul NJ

I-*

LD Ul l-

M O U3 Ul

H LD lO

l-

l-

i-

kO 43. 00

o o vo LD Ji en
qq

O LD Ji Ul

i- O lO

l->

ID Ji

qq

CD

J c m
CD

g
OQ CD

m qq m CD

CD

e qq
C D

qq

C D

Oq C D

C D

oq

CD

oq oq oq
CD CD

^ g

l- O LD Ji NJ

i-

LD Ji

l- O ID Ji O

l-

o ID
OJ LD

i- O ID UJ 00

M ID OJ

t- O ID UJ

l-

vl

cn

VD OU Ul

l- O ID Ul Ji

l-

l-

l-

ID UJ UJ

ID UJ NJ

ID UJ M

i- O ID Ul

C D

oq

C D

oq
(D

oq oq
CD (D

oq

CD

oq oq
CD

C D

oq oq
(D

CD

oq

C D

oq

C D

oq

CD

oq oq oq oq
CD CD CD

o g

O ID NJ *D

!-

i- O ID NJ CO

I-*

ID NJ VJ

M O kD NJ CJl

g
OQ CD

CD

6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
o o

5;
H
NJ 00 ZT

> z > > NJ


00 NJ 3 -

s z >
Ci

> o in >

o o
c/1

m O C

o
NJ

r UU NJ Ji

n
^ 3
3-

o
O

5 O
Ou ID 00

2 z
03

:K

c >
2
3-

>
I

Ln

3
zr
T3

3
3"

a
3

Pt o 3
~v 3

o 37 3
ZT

3
3 D
3 n

ii ^ s
>
73

zo

5
l TD

c n
>
CD Ul NJ

I
I C D
Ul yj 3-

o n >

z
CD m 73 73 Ji vl

S 2 z
03

2 ^ >
H

o
03

> 73 3 ^ CD c NJ ^ > 7 > NJ


c
3D l- UJ NJ

m
M CO

> z >
NJ

o z > E > Ul
73

C
vl NJ 00 ZT

o 73 >
Ji 00

7:

5 5 z z
cn m CD m

o
O

o
C D

>

UJ

73 ID

73

> X X cn CD > 0 0 00 > > 7^ ro o

o o o o o o c O O
O

i:
m
73
i- Ul Ul

ZT

P +
T3 3

^ ? n a: 3 3o o

3
ZT

p. a.
in
0) CO OQ CD CD OQ

I Is
3 O Q.
v. 01

a. n
Q.

a
3

n
373
3

ix ZT Z T 3 3 3 Pt o 3ZT 3 3 " Pt Pt 3 T3
"O 3 T3 3

> > ix >- 3 H U l Ul 3" zr 3 3 3 O I-'


Pt
T3 3 n 3-

pi

33 za

5 2

3 3
3"

g
^

Pt
TJ 3 n

3Pt Pt 3 ZT X3 3 n T3 3

g d

^ 3

3
3" >^

Pt Pt
D
3

3-

T3
3

ZT Tl 3 o C3.

Pt
T3 vl 3 n 13. 3 n O.

T3

n a.

3 CD

% % % < ^ ^ 3 % <
OQ

n a.

T3 3

iv

n Q.

n
Q.

n
CL

3
Tl 3

% c %n a.
% <
OQ

n 3 O p. cs. n a. a. % g in n
01 ^ CD CP CD Q) tD
fl)

a. %

a.
01 CD

n ex. a.
01 CD

CD

C D

01

n cs.

dq O

% < OQ < 0 O ^ ^ % ^ 3 3 < 3 CD CD


O

<

OQ

<

oq O

% <

OQ

^ 3

01

t/1 01

oq

CD CD CD CD Z3

oq

CD CD CD 3 C D

3 CD CD CD 3 w 00 IU a > %% % % % ^
CD CD

? 2. C D
n
C D

2, ^ 5
C D 3 m

% < < tn < ^ oq O 3 % % ^ < CD ^ 3 01 % CD ^ 3 % C D 01 % 3 3 CD % % tn cT ^ 01 % (D^ 5 C D


O O
3 n CD CD 3 n C D (0 C D 3 n C D O

OQ

k a>

r?

o <

oq O

% <
OQ

% <
OQ

<

C D tn tn 01

^ < ^ 3 CD 3 CD itn n
O
CD 01 oq C D

<

oq O

%
(D^

01 OQ C D (D

QJ oq CD

% CD < % oq OQ oq OQ O o % < < < < o q o q OQ "8 "8 O O ^ ciq o q % O ^ O O % o o < < 3 3 OQ < < OQ o q ^ % CO CO 3 o o % o C D ^ 3 3 ^ < 01 a CD tn C D OQ OQ in 01 3 3 3 3 C D C D 3 % OQ ct C D 01 01 01 CD CD CD tn OQ C D % Q; % 01 01 % 01

% 2 2
(0 3

iS^ftl l^tD C D ' C D i , 2 i , 5 . . . 2 oCD .q . $ ^ (D 3 S 2 ? r s ; ?m f r 3 (D p ;CD> ! ^ , , 2, C D CD C D CD cT 3 C D 3 3


n CD

OQ

OQ

01

OQ

C D 3 o C D

%
C D (0 C D 3 n CD

CD

o o > > ^ ^ > > z Z >

S ^ CD l-

n CD

o
Ln m

ii
>

00

NJ 00 NJ

ii
o NJ
VJ

O C

s
H
NJ 00 UJ

O LO

CD O O

CD O

M O

C D i- O CD

3 CD 3

O O

ro

UJ NJ Ji

5
o
Ul ID 00

> Z >

so
z
00 m Zl 7:
i- js tn

5
UJ kD ID

o C

g; I
Cl

2 2 z z
CD CD

> H >
NJ

C
vl NJ 00

>
73

o ro
Ln X 7^

C D
l-

C D M

o
o ro
I

>

I "
g
Ul CD

> ^ I
c 2

C D

5
NJ Ul NJ

73 73 J> vl

> > l-
k- Ji 00

73 73

O ro
Ji 00

o o o n n o > > m z z > A ro ro 2 i- m m ^ ID 71 za cn 73 73 n > > c


i- Ul

z o 75 o

>

>

8 2 2 z
ro
m 73
l- Ul Ul

>

i- Ul

Ul
i- vl Cl

2 2

t )

?D
i-

w
SJ

l- 00 ID

l- 00 ID M

o 00
ip

t-> O CO (D

t->

l- 00 U3

t- 00

i- 00 CO

H O 00 CO 00 00 Ul

l-

l-

l-

l-

l-

l-

t-

o o 00 00

o o CXI 0 0
00 00

o 00
00

o 00
OO

o o CO 0 0
vl vl VP 00
NJ i- NJ M Cl tf NJ l->

o 00
vl

o 00
vl

in R w
NJ NJ M vl CO NJ O l-

^
NJ M vl vl NJ l-

iS

o
M vl

29 5
NJ Cl NJ l-> VI Ji NJ M

NJ l- vl 00 NJ l->

NJ

NJ M vl Ul NJ M

f
e w M e

en cn cn cn cn en NJ NJ NJ NJ NJ NJ
i- 00

o
NJ O I-"

cn
NJ M

NJ Cl NJ M VI UJ NJ O l->

NJ M VI NJ NJ O M O

NJ M VI M NJ O l-

NJ l- VI

s
o
NJ

w
NJ l- NJ M Cl OO NJ I-"

.f.,.. o
NJ i- vl NJ i-

Q cn
NJ l- NJ i-

H O 00 VI Ul

M vl

M vl Ul

i-

o o 00 00

o 00
vl NJ

l- O CO vl M

l-

t->

t-

l-

o o o o o o CO 0 0 00 00 00 00 vl cn en en cn o CD oo v l ) U l A w j
NJ M Ul NJ i- Ul Ul NJ l- NJ i- Ul Ji NJ O M NJ l- Ul UJ NJ NJ Cl NJ l-> Ul NJ NJ O l- NJ

NJ I-"

NJ K

NJ i- Ul to NJ

cn en cn cn en en en en en cn en en en en NJ NJ NJ NJ NJ NJ NJ NJ NJ M NJ NJ NJ Nl cn CO
NJ I-"

en en cn cn U l
NJ NJ NJ i-

en cn cn en OU N J I-* o
NJ M O NJ NJ i- NJ M

NJ Cl NJ M Ul OO NJ O l-

NJ M Ul VI NJ i-

en cn cn en cn NJ NJ NJ NJ NJ cn
NJ i->

en NJ
M 0/1 l- NJ O M O

g g g g g g g g g g g
OU

9 9
o

o o

o o

o o

o o

o o

l-

o
UJ

o
UJ

o o

o cp o o o o

h->

o o

o i- o
OU

o o

o o

o i- o
OU

o o

o o

o o
OU

o
OJ

o o

clu OU U l o o o
NJ OU I-* NJ NJ OU I-* NJ NJ NJ NJ vl

Ul

Ul

Ul

UJ

OJ

Ji OJ NJ

g g g g g g g g g g g g
UJ OU Ul UJ

? 6
f UJ

o o

o
UJ

o l- o
OU

o
OU

Ul NJ

ill

g g g g g
UJ OJ

o
NJ NJ

o
NJ l- Ji

o
NJ M UJ NJ

o
NJ M NJ UJ

o
NJ O Ji VI

o
NJ O Ji

o
NJ

o
NJ Ul

o
NJ Ul

o
NJ O OU

o
i- ID Ul VI

o
H CO UJ NJ

o
M ID NJ 00

o
t-> ID NJ VI

\ o':

NJ OU h- UJ

o
M VD

o
M O

Ul

cn

00

o o

o o

o o

OU O h-> LD NJ O O

Ul

ro

o
M CO M Ji

o
l- ID O VO

o
i- 00 Ji vl

o
i- CO Ji

o
M 00 h* 00

o
i- 00 i-

o
I-* VI

o
1-* vl Ul CJl

o
i- VI Ul CJl

o
O 00

on
00

o o o o O o ro ro ro u? 1/1 l / l
73 73

o
on

5;
&

> Z

O on

o
Ln UJ I D NJ

^ ^
00 vl

^I

s
>
-D

^ is
OU

^ ^ ^ 2 oo
Cl 00

cn

cn

s
CO

c
ko

ll
^
CO Ji

o o o o o o ro ro c/1 c/1 O E E O c o o Z ^ C D m

o X

C
LO

o X

O OU
00

H o

m m
CO UJ

^ $ $

o o

z z cn en en v l on

ii
o

<: > z
r-

I I
>
NJ

c z z

>

o z o o z
vl NJ ID

>

VI UJ

VI

en

s o
on

o ro c 2 73 m c D Z ^ LO 73 C > O o UJ > cn 73 UJ > o 73 VI o

> z

T3

o o

00 00

LO NJ

cn en

l-> NJ

3
tn

cr cr cr cr 01 01 01
01 tn tn

oo C D CD 01

tn

oo

LO C D C D 01

m
01 tn

LO

LO

C D 01

C D 01

cr
01 tn Pa nai

cr

01

cr

CD 01

C D 01

01

o- 01 er
Br idgeto

g^
c 2
QT

CX 01 in

^ c S S 3 3
z z
CD

<

<

<

ro

<
3

< ^5 ^ ^ ^ < < < ^ ^ < ro


CO Ln 01 c/1 9te t/1 9te

01

n 3

s
r+

o_
Ln

ff ^
o
3

^ CD ic? C D c
01

LO 9te

5' 5' 5'

01

zi
01

01

ff CD

ff 3 5 L o
01
3

g -< o o
3

a
X <
01

X
01 3 0)

01 3 01

ill
T) C O in H Ti p3 O _

cn

z
3C
CD

c c c c z z zz n n n n z n n ^ 6 ^ ^ LO LO LO LO

8 ^^
2

o n e 0 o z z zn
3 Z! C

D c n n c c cc n n nC c nn c z o o z z z z O O O O01 O Z c-l z z n n n n z

< < < <


LO C D

cr cr
01 01

C D

3 cr

m n

ec

ec

ec

ec

CX

ff ^ o
LO CD

01

Ii
tn E .

S9

Br 9Si

Br 9si

gp

9si

idgeto

ose

01

oq

9te

a_
01

% s ni.
QI

9L

CD

SSS

<o > <o <o

1II
> 5 5

^
m O

^
tn

U2 rn

m (n

Ln Ln

o o o
>>

n c c n n O Zz O O roz z c c-1 z n n
C D

2] 5 ^ Z! Z! Z) Z!

- rn m m m > > > O O O O

m Z H

^ 5 ^3 ^ o
LO m LO on

o o

> z O -n O

oo ra e=>

o
k

3 n

M I
n
^ ^

rr I' I =zr r> o >o o > >


O
73

So

ll

^ c
%

ii
> rC

z O -n O

73 73

z z

-n rn

n > | c
LO

o K 5' 3

O a

f8

O Z r-<

NJ Ul

NJ

on ! on
(-> , I - * (JJ I U J NJ M O CD

NJ

NJ I NJ

on on

UJ

v l ^en
NJ o M O I NJ I o i l-> : O

NJ Ul i-> OU I i-: onj NJ O

NJ on I-* UJ i- *i I NJ O

NJ UJ l- UJ

M OU M NJ

on on

NJ on OJ l-

NJ on OJ M

NJ

on on on
t-^ OJ

NJ

NJ i- UJ

(-> OU 00

o o

NJ NJ on on M M M OJ O J :

I-*
NJ

o
NJ

ID

vl

O iO 1 O i O
C l i^on 1 J i I U J NJ , NJ I NJ ' NJ O O O O I-* l-> I l- I h-i

NJ on ! OU !

NJ on ' OU

NJ i-> OJ O I-* NJ O l->

NJ OU

NJ NJ CO CO NJ

NJ NJ CO 00 NJ

NJ NJ OO

NJ NJ ID Cl NJ

NJ NJ LO

NJ NJ CO NJ NJ O

NJ NJ ID M NJ O

NJ NJ LO O NJ O

NJ NJ 00 CD

NJ I NJ 00 00

on on on on on on on M t-" i-> M i- i-
O O
M

on on on on on
Ji UJ

vl
NJ

on
NJ

O I O
l-> M

NJ ' NJ

NJ , NJ

o o w

o o

o o
OU

(b I6o UJ ! UJ
O
O

o Io o
OJ

o I o O ! O O ! O
OJ OJ UJ OU UJ OJ

O o I -o * o ! o o o

NJ : NJ

l-

l-

NJ I NJ

I-*

0 | 0

O l O
O

OJ

O
0 0 Cl

0 ! 0
0 Cl

O l O : 0 ! 0

o cn
Ln o
X
M

01

ji on

cn cn 16 iO
o

o Cl

Cl

J^ 1 NJ

NJ { NJ M ! i-^ l-> j l- I v l j M

on U, oil I M on on O vl on OU o ' ro on I X ! ro I ro 1

O Ul

O on

00

o o .-^i*o: o o

9 o cp o 6 6 6 6 i6 I6 I6 OU 6 OU OU OJ 6 (JJ 6 UJ 6 LU llJ (JJ U J I U J CD (=) (b 6 6 6 cb ! o (=) 6 ! ci3 l- 6 i- i- i- l- (- O I o o o o O o O o o


cp cp o cp
OU U J I OU j OU OU

O o o l-> 1-" M o o o

o >

O O O o o O I O ! o o , o
OU U J j OU UJ I OJ

6 61 6 6 I 6
O ' o

>
NJ NJ

2
73

O o o O o o ro C !O > I

on on ! on on oil OU l- v l on I UJ M (- I M f M M l-

OJ

OU

NJ

l-

o o
o L/l

OU

^ 5 30
>
M

OJ

Z ' C D i 7\ I

o > n > ^1^ 118 z ! ^ ro z >


NJ 00 Ji m 73 30

o o >

> oo

cn

o
00

on
UJ

ii
CD

X CD

> l- > M
Ji 00 Ji

30 3D

NJ

> ro > H

vl

on on OU N J

6 b io on J i , N J NJJ on M OU CD cn I NJ M 1-* l- U M O o o o o o 7; H H 0/1 I > n O eg O > 7; 7? X c > z CD c -< ro O < > > o m OU 3D UJ ro CO 3 0 CO > c CO H > 00 NJ s M ^
M OU NJ

on v l OJ cn

81 i n I OU

o o
NJ I NJ V l I on O

o o 00 i 7 I 0/1 > X
7;

oo oo

>

ri

on

3 3 CX cr c u as ^
X
01

cr cr
cu
< i-< tn

3 3 cr cr 01
01

IX
ct

01
, in

I Si
301

< -< 01 n o
3

jo

in

to

I to

^11
Ol
I in

cr
'r t

~ 5 S

IL
01 I

< -< < :-< |-< ro o n n ro 01 , 01 : 1^ cr 3 cr ct CD


01
to

01 , t01 o

I in

3 cr cr cr 01 01 01
to in to 01

3 cr 01
to

m m m
as in
01 in 01 lo

n c

01

as

to

n e c
n
00

n
t/>

n
00

oo oo oo i oo 00 oo oo

^15 oo oo

_,0|Z:Z|0

SVl

,, n z n n _ z'n > n

5|5:5l5EI ;^j^ g'3


l/l

O O m j 00 oo m , L/l I oo -n

< < < < <


1
T3 C

Em

Em
01

Em
CX 01 to

Em
01 in

cr cr cr cr 01 01
m
in (O (O

Em

Em

3 3 3 CX CX
01

ro

>

< TC

^ n
01

oo
00

cr o c cr

-3 < < -< \ H n -H > tn > 7 Ol 01 C O m O o 3 " 3 zr 01 ^ 3 ^ OQ " cr OQ -< O OJ (0 It as sr o I o cr cr 7! 2 OJ OJ c as 3


C-)

<

(g

_,_ n

3D

z z O Z Z O z O o n z n n z n z
FID! LAS

n c

f-l

c n c z n
FID LAS

z z z n n n
I I I

C C

C , C i c

I I

n n r

5
00 00

LAS

FID

oo oo

m Z

oo eg m Z
H
IAL

c/1 m Z -1
IAL

S 5 oo oo
oo oo

n >
o

IAL

^
O
30

O
v^ -n

O ! O O I O I O I o

O
30

o
30

o
30

o
30

O O z
3 0 I 3D

o
2

-n

O -n 3

Si
rC on m O

n >

il
O

n > c. c z ^

O -n 12

-n -n

n!
1'

>I
oo m

I n >
rC oo m

O -n 2

o 30 O -n O O 30
Z
XI

o -n
O RN

o o
30 30

o o
3 n
C -n

nn

oo oo m m

: c

Q! n > >
1 1 1

n > 1 c
m
O Z
1

Z! n I

-n

>
oo m

>
C
l/l m

C I c
o o I LO

r - . I

z ^

z ^

O O

z ^

o
z ^

z I <

C O

-<

Prosecution Exhibit 103 1 page classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

^ ^
r-j

^ 3 o <
(T>

^
C D
t/1

^
CL Ol C D t/1
X

^
CL Ol ct
t/1 t/1

^
r
Qi

^ o Ln >

^ o
73

^
LO

^ o

^ o
00

^ o >
LO

^ o >
Ul

cn

I ^

2"
TD X_
Vt

3>
yO

Ln

<

>

J> J>

LO 00

o o o
C

ro

oo >
CO -vl

CZ

CD

n o o
i

00

J> ZL O

cn

J> CTl

ro o

3
OJ

b- ?4-

O CT. cn

i.

> o cn ro > ' br g3

% O > o CO ^0 J i 0 ir ir g3_ 3.

o 00 > cn X o > o ro V3

I> 73

3 J>
73

o J>

7^

J>
j> ro \o
LD

> CO cn 3

> CO
CJ

yo

to

to

to

to

to

to

to

to

Ji

Ji

CO

Ji

-fi

3
o o

Cu

to

to

to

o
May

o
May

1
May May May
O CD ZO

eo: zo

ZZ:

OS

o\

CO

cn

vJ

CO

ro o

cr. en cn

IZO:

May : o
CD Ji

May

May: o oo
LO

May

May

May

May

May

May

May

May

o
vJ

o
-vj

O vJ

o
ro
CO CO

ro

O CTl

o o ro o ^

O O

ro
Ji

o o
cn
LD

o
O
-fi O

o
O

o
Ji CO LJ O

o
O r j vJ

Cl

CO

ro o
CO

ro

cn o

!Z
ro

ro ro
CO CO

u
8,

ro

!Z

| Z Z

PROSECUTION EXHIBITION for idi^icalion PAGEOFFERED: PAGE ADMITTED: PAGE I OF I PAGES

z d
CO
TD 0) f j

5:
a. Qi
1

z C t
CO CD 4CD \D CD CD

o ^ o
O O

LL 3
U

LD

CM CM O
I-l

ID CD O

o CO o

LT) CD CD

0)

E
< D
(M JD
N

S
t/i C ?
(D
I CM

OJ C
CM Nl -q
ID
j_i

C
>

ID
J -

^1
c

?I ^ : CD ID
>CZ

*iAi

PROSECUTION EXHIBIT I05"for identification PAGE OFFERED: PAGE ADMITTED:

PAGE I OF f PAGES

UNITED STATES OF AMERICA


V.

Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211

STIPULATION OF EXPECTED TESTIMONY Mr, Jacob Grant DATED: l^^June 2013

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if Mr. Jacob Grant were present to testify during the merits and pre-sentencing phases of this court-martial, he would testify substantially as follows: 1. I currently serve as Contract Task Lead for CCJ6, assigned to the Active Cyber Defense Branch at U.S Central Command's Headquarters (USCENTCOM) on MacDill Air Force Base (AFB) in Florida. In this capacity, I am responsible for conducting various levels of Cyber Operations for USCENTCOM and Overseas Areas of Responsibility (AOR)including Computer Network Defense (CND) activities. Computer Network Attack (CNA) planning & analysis, and the analysis and reverse engineering of Computer Network Exploitation (CNE) activities in order develop effective countermeasures. I am the lead for our "in-house" Computer Emergency Response Team (CERT). In this capacity, I perform in-depth forensic analysis of CND alerts, flow analysis, or interpretation of threat information to include security compromises, network intrusions, and malicious logic outbreaks. I have held this position for four and a half years. At the time of my involvement in this case, I was the Senior INFOSEC Analyst with the Information Assurance (IA) Branch of the J6 USCENTCOM. I have also been an IA Watch Officer, a Senior Analyst, and a Senior Engineer. I served for two years as an enlisted Airman working in technical control and network engineering. 2. I am a Certified Information Systems Security Professional (CISSP) (2008). I have a Top Secret/SCI security clearance. I have Associates degrees in Electronic Systems Technology and Avionics Systems Technology. I am a Cisco Certified Network Associate (CCNA) (2003) and a CORE Impact Certified Professional (CICP) (2013). Some of the network security and associated training I have received includes: McAfee Network Security Platform Administration (2013), ArcSight ESM Use Case Foundations (2012), EnCase Computer Forensics 1 (2012), ArcSight Logger 5.0 Administration and Operations (2011), Basic Malware Analysis Using Responder Professional (2010), Ethical Hacking (2008), McAfee Host-Based Security Systems (2007), Information Technology Service Management (ITSM) (2007), and Cisco Securing Networks w/ PIX & ASA (SNPA) (2007). 3. I became involved in this case for two reasons. From 19-20 August 2010,1 was involved in the collection and transfer of audit logs from the USCENTCOM SharePoint on the USCENTCOM SIPRNET web server. At this time, I was also involved in the identification, collection, and transfer of information housed within that SharePoint site. Our collection focused on the SharePoint because I had identified it as the location of charged documents based upon the SIPRNET webpage address of those documents. Further, Special Agent (SA) John

PROSECUTION EXHIBIT ilUtfor idep/fication PAGE OFFERpn / PAGE_i J W ^

/^P-

Wilbur, with whomlwas working, was interested in the contents of the USCENTCOMJAG folder. ^. The USCENTCOM SharePoint server isatool to create an intemet interface that allows users with access to the site on SIPRNET to collaborate, f:^r example, by sharing l^les. The SharePoint itselfis only accessible via SIPRNET,soausermust access it via secure systems. At that time, it was identil^ed at IP addresses 131.2^0.^7.23 (l^r the SharePoint database cluster), 131.2^0.^7.^, and 131.2^0.^7.7(lor the web portal fi^ont end orthe portion accessible by SIPRNETusers). The database asawhole occupied several terabytesof space. The server supporting it, IromwhichlpuIIed the logs and other information at issue, is physically housed on virtual machines withinacluster,inadata center, onastorage area network (SAN). Only authorised USCENTCOM HeadquartersJ^personnel are granted access to the l^cility. The data center is protected by badge access, cipher locks,video surveillance, and an access roster. 5. The audit logslreferenced herein are Intemet Information Systems (IIS) or Windows server log ltles,which capture the IP address of the USCENTCOM SharePoint server. The logs do not capture any remote or external IP addresses. The logs only capture the dates and times documents are accessed on the SharePoint server, as well as related activity on the SharePoint server. ^. For collection as evidence by SAWilbur, these logs were pulled by the intemet server maintenance team. Iknowthis becauselwas there when they retrieved the information. These logs saved inastandard text file, or".txt"f:^rmat. Ibumed these logs ontoahard drive and also ontoaDVD. Iknow these devices were clean of data becauselpersonally wiped all information from the hard drive and laptop, and created the image lor the hard drive on which the logs were burned. Further,Iperlormedahash value match to verily that the logs provided were saved accurately onto thediskTheDVDwasred.Imarkeditwith the title "CIEUSR DATA". ThisDVDcontainedthefiIes"CENTCOMCIESharePointHASHMD5SHAlpdf^, "CENTCOMHO CIE^SharePointHASH MD5SHAltxt","webl^ip",and"web2^ip" The lirst two liles contain the hash value inl^rmation validating the accuracy of the log inlormation collected. "Webl.^ip" contained the weblog data IromlDecember 2009 until 30 July 2010, pertainingto the USCENTCOM serverassignedIP address 131.2^0.^7.^."Web2B^ip" contained weblogdatafromlApril2010until30 July 2010, pertainingto the USCENTCOMserver assigned to IP address 131.2^0.^7.7. ProseentionE^bibit^I^orldenti^cation are these SharePoint server logs. 7. Afl:erbuming the log inf:im^ation to theDVD,Isigned the evidence to SAWilbur using the providedDAForm^l37 Evidence Property Custody Document. The disk was recorded onaDA Form^l371abeIed as document number (DN) 122-10. Irecogni^e this as BATES number: 00^11111. Iknowthis becauselsigned that f:^rm and recognise my signature on it. Iwould recognise the evidence itselfbecauselwrote the label on the disk and bumed it. Idid not alter the information or the devices on which it was housed in any way. 8. The information housed on the SharePoint server, mentioned previousIy,was accessed via SIPRNET andlocatedintheJAGfolderon the USCENTCOM SharePointpage Wecollected this information lor two reasons. First, collecting this information shows what content was

originally available onthe USCENTCOM server to SIPRNETusers. Second, this inlormation helps put the log data we collected into context. 9. lassisted SAWilbur in collecting this inf:^rmationl^om the SharePoint server. Toretrieveit, we used two blank CCIU SATAhard drives. Iknowthese are clear hard drives because, in accordance with USCENTCOM policy,Iscanned them f:^r malware and viruses belore they were used to gather the evidence. Having loundnone,Iknew they were suitable lor evidence collection. Tocollect this inlormation,we also used an approved CCIU laptop. Ihookedthis laptop to the SIPRNETusingaCCIUissued USB cable and drive dock. Wethen connected the previously scanned hard drive to the laptop. SAWilbur used that connection to recover the information at issue.

j^.'^^v.jZf^r

ASHDEN FEIN MAJ, JA Trial Counsel

THOMAS F. HURLEY MAJ, JA Military Defense Counsel

BRADLEY E. MANNING PFC, USA Accused

UNITED STATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Manning, Bradley E, PFC, U.S. Army, HHC, U S. Army Garrison, JointBaseMyerHendersonHall FortMyer, Virginia 22211 Ms^Florinda^ltite Jnne2013

It is hereby agreed by the Accused, Delense Counsel, andTrial Counsel, that ifMs. FlorindaWhite were present to testily during the merits and pre-sentencing phases of this courtmartial,she would testily substantially as lollows: 1. lam the Conliguration Management Lead lor the Distributed Common Ground System Army (DCGS-A)program. Igraduatedwithadegree in computer science inl991. Thereafler,I completed additional courses in computer science. lhave experience with Linux and Windows. AdditionaIly,Ihave experience asaprogrammer, system administrator, network administrator, and system engineering. Ispeciali^e in computer management,whichisasubspecialty of systems engineering. From2005-2010,IworkedasacontractorontheDCGSAprogramlor whichlcurrentlywork. Asacontractor,lworked as an analyst and in conliguration management. 2. Cttrrently,Iwork lor Communications-Electronics, Research, Development and Engineering Center(CERDEC)Sol^ware Engineering Directorate (SED)at Aberdeen Proving Grounds, Maryland. CERDEC is the United States Army inlormation and technologies and integrated systems center. SED provides sol^ware acquisition and software engineering support to Army tactical systems, to include creation ofconcept, concept development, demonstration of concept, production and development, and operations and maintenance, thereby developing and supporting sofl:ware systems throughout their lilecycle. SED also provides inlormation assurance and determines the requirements and necessary tools to complete tasks. Software products developed by SED supports Army war lighting eflorts. DCGS-Aisacomponentof SED. 3. DCGS-Ais the Army^sprimary system to post data, process inlormation, and disseminate intelligence, surveillance, and reconnaissance information about terrain, threats,weather, and other inlormation relevant to Servicemembers. DCGS-A is the approved system used by intelligence analysts (35F Military Occupational Specialty). DCGS-A provides commanders the ability to receive intelligence l^om multiple sources and intelligence systems. Moreover, DCGSAensures each pieceof approved hardware and sofl:ware is secure, stable, and compatible with existing systems. ^. As the Conliguration Management Lead,lensure sofiware and hardware lor each system meets approved specilications and lollows approved builds. The approved builds are also known as baselines. Each baseline consists ofapproved sofiware and hardware. The software is speciltcally listed by program and version number. Hardware is specilically approved by type

^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^

PAGE ^ O F ^ P ^ ^ i ^ ^

andmanul^cturer. Aspecilic baseline is described inaVersion Description Document (VDD). The VDD states each authorised component ofabaseline. Any sol^ware or hardware not listed in the VDD is not authorised and is not part ofthe baseline. 5. The baseline is developed throughadeliberate process. The Program Manager (PM) ofeach system approves each respective baseline that falls within the PM^ssystem. The baseline is tested lor stability. Stability means that the system itselfis stable and that the system is stable when interacting with other approved systems. Stability is important because the computer system completes important tasks lor Servicemembers and the system must work at all times, especially inadeployed environment. The baseline is also tested lor security. Security means the system is secure by itselfand when it interacts with other approved systems. Security is important because some ofthe computer systems contain classilied inlormation. The information is used by Servicemembers to complete their missions, and the systems maintain security so only authorised users can access the inlormation. Ensuring stability and security requires extensive testing. Each new baseline is accredited, and any changes to the baseline must be certiliedafl:er undergoing the vetting process. ^. Any change to the baseline requires new testing ofthe new baseline becauseasingle change can aflectasystem^ssecurity or its stability. The process to make changes to the baseline begins whenausersubmitsarequestidentilying requested capabilities. Aflerarequest has been submitted, the request goes belore the Engineer Review Board (ERB). The ERB is comprised of subject matter experts, engineers, and testers. The ERB analyses and assesses the requested changes lor eflectiveness and costs. The ERB also assesses any eflect the requested change could have on the network. The ERB providesarecommendation based on its conclusions and testing to the Conliguration Control Board(CCB). The CCB is comprised of conligtiration subject matter experts, engineers, and the relevant PM. The CCB then makesalinal determination based on the effectiveness and cost. Changes to the baseline can be approved in3 days up and tolyear depending on the complexity ofthe system and the nature ofthe requested change. The process has been designed to maintain system security and stability. 7. Aflerabaseline has been approved,acomputer image is created. This computer image is installed onto approved systems. An image is used to ensure that each system receives exactly the same sofl:ware. Using the same image ensures that the DCGS-A program only tests one image instead oftesting each system. This increases the likelihood the software will comport with the approved baseline. 8. ProseentionE^bibit(PE)^istheVDD. PE^describes the baseline loraBasic Analyst Laptop (BAL). lam lamiliar with the VDD in PE^and other VDDsbecauselwork with them daily in my position as the Conliguration Management Lead. As the Conliguration Management Lead,Iinspect images to ensure the image meets the standards set lorth in the baseline. Icheck each program individually to ensure it is the correct program and specifically the correct version ofthe program. Any sofl:ware not approved in the baseline, as reflected in the VDD,is not authorised. Specilically,evenifasof^ware program is authorised, the program cannot be added to the image unless it is an approved version fi^om approved sotirce. That is, the approved version ofthe program must be obtained Irom an authorised source. Programs obtained Irom

unauthori:^ed sources, such as the Intemet, could obtain viruses,Tro^an horses, or other malware that would^eopardi^e both system security and stability. 9. Wget isacomputer program that retrieves content Irom web servers, and is part ofthe GNU Project. Wget supports downloading via HTTP,HTTPS, and FTP protocoIs,which are common protocols used on the intemet lor webpages. Wget isali^ee network utility commonly used to retrieve liles Irom the intemet. It has been designed lor robustness over slow or unstable network connections. Ifadov^load does not complete due toanetworkprobIem,Wget will automatically try to continue the download Irom where it Iefl:olf, and repeat this until the whole Itle has been retrieved. Wget is non interactive in the sense that once started, it does not require user interaction. TomyknowIedge,Wget has never been authorised as part of any DCGS-A baseline, nor has it been requested lor approved use. As such,Wget has never been reviewed by our program andlcannot say whether it would be approved lor use or not. The VDDs created lor V3.0P17,V3.0P18,V31P3 each didnotauthori^e Wget onaDCGSAcomputerorloritto be used byaDCGS-A user.

ALEXANDER ^^^ELTEN CPT,JA AssistantTrial Counsel

THOMASFHURLEY MAJ,JA Military Delense Counsel

BRADLL^MANNING PFC, USA Accused

Prosecution Exhibition ICE^ classitied "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20August2013 stored in the classi^ed supplementto the original Record ofTrial

c o
eg

u c

Q
LU
aj H -o

H
Q

a
f-

Z
<
LU

C/]

C Q < LU

X ^ a X Q <

z o tu

LU

CL LU
LL

LU LL

LU C/ D LU LU

o a a
< <
C- C_

ManningB_00527449

DraftiThe Most Wanted Leaks

7009-sort - Wikileaks

Page 1 of 12

DraftiThe Most Wanted Leaks of 2009-sort


From Wikileaks Somewhat sorted entries of the most-wanted list. Work in progress, TODO: Add brief, entity and date for each entry.

Contents
1 Austria 2 Australia 3 Bahrain 4 China 5 Colombia 6 Finland 7 France 8 Germany 9 Greece 10 Guatemala 11 Italy 12 Kenya 13 Libya 14 Madagascar 15 Mali 16 Mexico 17 Niger 18 Norway 19 Puerto Rico 20 Rwanda 21 Russia 22 Slovenia 23 Sudan 24 Syria 25 Switzerland 26 Swaziland 27 Trinidad and Tobago 28 Uganda 29 United Kingdom 30 United Nations 31 United States 32 Vatican 33 Intemational organizations

Austria
Austrian e-Voting system used in students elections. Date: 18 May 2009 Brief: We seek for details about Austrian voting system used in students elections, which includes but is not limited to source code and certifications. Entity: Scytl (http://web.archive.org/web/2009l 105061330/http://www.scytl.com/) (programming) Entity: Austrian Federal Computation Center (http://web.archive.org/web/20091105061330/http://www.brz.gv.at/Portal.Node/brz/public? gentics am=PCP&p.contentid= 10007.17664) (hosting) Entity: Ministry of Science (http://web.archive.org/web/200911050613 30/http://www. bm wf gv at/submenue/engi ish/) (initiator) Entity: Robert Krimmer (http://web.archive.org/web/2009110506l330/http://www.e-voting.cc/topics/Team/) (consulting) E-Mail traffic between Josef Proll and Christian Konrad. Date: ??? Brief E-Mail traffic between minister of finance Josef PrOll and Christian Konrad, who is advocate general of Raiffeisen bank. Entity: .losef PrOll (josef proell@bmfgv.at) Entity: Christian Konrad

<

ManningB_00410572

http://web.archive.Org/web/20091105061330/http://wikileaks.org/wiki/Draft:The_Most...

12/6/20! I

DraftiThe Most Wanted Leaks '1009-sort- Wikileaks

Page 2 of 12

E-Mail traffic of Anton Mahdalik with Michael Haupl and/or Michael Ludwig Date: ??? Brief E-Mail traffic of FPO delegate Anton Mahdalik with Viennese mayor Michael Haupl and/or deputy mayor Michael Ludwig containing threats when renting municipal ground to the Viennese trailor park ("Wagenplatz Wien"). Entity: Anton Mahdalik (toni.mahdalik@fpoe.at) Entity: Michael Haupl (michael.haeupl@wien.gv.at)

Australia
ACMA URL blacklist Date: 19 March 2009 and later Brief Versions of the ACMA URL blacklist newer than 19 March 2009. WikiLeaks previously released three versions of the list, two of which included WikiLeaks or its subpages Entity: Australian Communications and Media Authority (http://web.archive.org/web/20091105061330/http://www.acma.gov.au/WEB/HOMEPAGE/PC=HOME) Censorship technology in Australia Date: 2009 Entity: Australian Communications and Media Authority (http://web.archive.org/web/2009l 105061330/http://www.acma.gov.au/WEB/HOMEPAGE/PC=HOME) Entity: Enex Testlabs (http://web.archive.org/web/20091105061330/http://www.testlab.com.au/) Entity: Watchdog NZ (http://web.archive.org/web/2009l 105061330/http://www.watchdog.net.nz/) Entity: [www.iwforg.uk Intemet Watch Foundation] Entity: Exetel ISP (http://web.archive.org/web/20091105061330/http://exetel.com.au/news_main.php) Brief Full details offilteringhardware/software vendors participating in government-sponsored ISP-level censorship technology trials, including (but not limited to): Any and all communications between filler vendors and govemment departments prior to, during, and after the trials Any and all transactions, contracts, and otherfinancialarrangements involving filter vendors Details: URL blacklist(s) used during above trials. Alleged (by govemment) to be ACMA URL blacklist. Full statistical breakdown of results of above trials (in the event that Enex Testlabs do not make them publicly available). URL blacklist as used by Watchdog NZ during private censorship technology trial by ISP Exetel in May 2009. Alleged (by Watchdog) to have been IWF list (see United Kingdom). Full statistical breakdown of results of Watchdog/Exetel's censorship technology trial - Exetel's official response (http://web.archive.org/web/20091105061330/http://forum.exetel.com.au/viewtopic.php?f^4tfet=31857*p244129) seems lacking. Annual NSW Police test Brief Written exam NSW police officers must take annually before they can be issued with Tasers. Entity: NSW Police (http://web.archive.org/web/20091105061330/http://www.police.nsw.gov.au/)

Bahrain
Documents regarding changes to country's demography. Brief Documents disclosing the number of citizenships that have been granted in the last few years, in an effort to change the country's demography. See Political naturalisation!I] (http://web.archive.org/web/20091105061330/http://www.ihrc.org.uk/show.php?id=2860).

China
Golden Shield Project Brief A list of URLs and keywords censoredfilteredby the Golden Shield Project (Great Firewall of China). WikiLeaks has previously released related information, for example, watch lists, policies and several thousand URLs for CCTV and Baidu, bul not for general http filtering. Entity: Ministry of public security (http://web.archive org/web/2009110506l330/http://www.mps.gov.cn/) Genocide Olympics campaign Date: 28th March 2007 Brief Policy options on Darfur formulated in response to the so-called Genocide Olympics campaign led by American actress, Mia Farrow, and notes of meetings in 2007 between Stephen Spielberg and Chinese Foreign Ministry officials prior to Spielberg's resignation as Artistic Director of the 2008 Beijing Olympics.

Colombia

l\/lanningB_00410573

http://web.archive.org/web/20091105061330/http://wikileaks.org/wiki/Draft:The Most... 12/6/2011

DraftiThe Most Wanted feak^

^009 sort Wikileaks

Page3ofl2

^ Surveillance ofcitizens and organisations ^ Brief The DAS (Departamento Administrativo de Seguridad) is reported to have surveilledawide array ofpublic officials, private citizens, and organizations Documents wanted: contracts to supply sofiware for intemet surveillance to Colombian policy agencies and detailsofthe software supplied. ^Entity: DAS (http://web.archive.Org/web/20091105061330/http://www.das.gov.co/)

Finland
^ Tiitisen Lista ^ Brief The so called Tiitisen Lista, the list ofl8persons claimed to have been in active contact with East German security services (Stasi).The list was received from Ihe West German intelligence services (BND) inl990 and since classified by the order ofPresident Koivisto as adviced by the headofthe Finnish Security Police (Suojelupoliisi),SeppoTiitinen.lt is mmoured that several current or former top Finnish politicians appear on the list. ^Entity: Stasi (http://web.archive.Org/web/2009II0506I330/http://enwikipedia.org/wiki/Stasi) ^ Entity: Koivisto (http://web.archive.Org/web/20091105061330/http://wwwvaltioneuvostofi/hakemisto/ministerikortisto/ministeritiedotasp7 nro^167) ^ Entity: Suojelupoliisi (http://web.archive.Org/web/20091l05061330/http://www.poliisi fi/supo/)

France
^ Nicholas Sarl^ozy'health report ^ Brief The Monthlyllealth Report ofPresident Nicolas Sarkozy,as promised by himselfduring the last presidential elections.

Germany
DCensorshipinGermany ^ Details: ^ The censorshipfilterlist for the proposed national, mandatory censorship system. The list will be compiled by German federal criminal police BKA and distributed to intemet service providers ^ The contentsofthe contract between the BKA and some ISPs that has already been signed, but is kept secret due to "public safety" and copyright concems(seehttp://b1og.fefe.de/'^ts^b4fa8af^). ^ The List ofMediaHarmfii1to^oungPeop1e(the censorship system already in place) The "virtual media" part ofthis list is distributed to search engine providers and is illegal to publish It probably could be reverse engineered using the differences between googlecom and googlede search results Also, ifyou want to knowifaspecific medium is ontheIist,youcansendanenc^uirytoIiste^bundespruefstel1ede(maiIto:1iste^bundespruefstel1e.de) ("Bundesprufstelle" is the agency responsible for keeping the list) ^ Entity: Bundesprufstelle (http://web archive.Org/web/2009I105061330/http://www.bundespruefste11e de/) ^Entity: BKA (http://webarchiveorg/web/20091105061330/http://wwwbkade/) ^ Politician'sStasi files ^ The Stasi (http://webarchiveorg/web/20091105061330/http://en.wikipediaorg/wiki/Stasi)filesofFederal Chancellor Angela Dorothea Merkel (maiden name Kasner) and other leading politicians, which are known to exist, but withheld from public ^ Operation Gladio ^ Brief The Stasifilesrelating to operation Gladio/stay behind organisations in relation to right-wing terrorism in Germany (http://webarchiveorg/web/20091105061330/http://wwwheisede/tp/r4/artike1/30/30390/lhtml),asperaparliamentary rec^uest by the Green party. ^ Atlas OerWut ^ Brief The so cal1ed"At1as der Wut",adocument about the risk of riots in different german regions The list is said to be updated regulary and wasters! written in 2005. ^ ^he list ofNPO party members

Greeee
^he Athens Affair ^ Brief Documents related to the Athens phone tapping affair that have yet lobe re1eased(inc1uding those from countries other thanGreece)Context(http://web.archiveorg/web/20091105061330/bttp://www.spectrum.ieee.org/telecom/security/the-athens atfair/0)

Guatemala

ManningB_00410574

http://web.archive.Org/web/20091105061330/http://wikileaks.org/wiki/Draft:The_Most... 12/6/201

Draft:The Most Wanted Leak^ ^009 sort Wikileaks


1 ^ Plan Victoria ^:^^ Plan Sofia and Plan l^erme^a^^ ^ Brief All documents on Plan Victoria 82, Plan Sofia and Plan Firmeza 83. ^Detail:

Page4ofl2

Within the processoftrying to bring military personal involved in human rights violations and massacres that happen during the civil war in Guatemala to justice,the military have been rec|uired to declassify many war documents Inacase, that went all the way to the SupremeCourtofGuatemala, the Court dictatedasentence that confirmed the obligationof the Ministry ofDefenseofGuatemala to hand over theofficialdocumentationoffour specific military operations: Campana Sofia 82,Victoria 82,Firmeza 83 and Operacion Ixil.The Supreme Court sentence indicated that the archives had lobe declassified These military operations were carried out in the 80s. According to the CEH, Historical Clarification Commission of Guatemala final report contained in "Guatemala: Memory ofSilence",these military operations resulted in massacres and severe human rights violations. The MinisterofDefenseAbrahamValenzuela only delivered partial information about plans Victoria 82 and Firmeza 83, r^o ofthe four rec|uested plans He indicated that he had no knowledge ofthe other two plans before he became Minister of Defense and that he ignores where the documentation could be. He stated that he could not deliver the complete plans "Victoria 82"y "Firmeza 83" because certain information was considered state secret andaconcem ofnational security. "Plan Sofia",aderivativeof'Plan Victoria 82",was ofspecial concern to human rights activists^ this plan was conceived in July 1982, four months al^er General Efrain Rios Montt came into power ^ The CEtt archives ^ Brief Final report ofUnited Nations" Historical Clarification Commission(CEH) into the killing of200,000 Mayan people and the involvement ofthe US govemment and American corporations.The report official sources(mi1itary interviews, campaign plans,etc)are kept secret by the UN in N^C. ^ Detaif The United Nations" Flistorical Clarification Commission(CEFl) for Guatemala issuedareport where the US govemment and several American corporations were accused ofcomplicity in the genocide of nearly 200,000 Mayan people during Guatema1a.^sbloody36-year civil war The final 3,600-page CEH report clearly places the blame for most of the 200,000 deaths on the "racist" policy ofthe Guatemalan govemment and holds the country^s military and paramilitary forces responsible for the actual killings, tortures and disappearances. However,!! accuses the US of directly and indirectly supportinga"'fratricidaIconfrontation"by providing sustained training, arms andfinancialaidThe report is based on the testimony of9,200 people from all sides ofthe confiict and other documents"^, classified and Secret, protected in the UN headc^uarters in N^C The CEH investigated 42,000 human rights violations, 29,000 ofwhich resulted in deaths or disappearances and therefore, the documents under UN custody are fundamental for the prosecutionofthoseresponsibleofIhe crimes.
^ Goldcorp affair

^ Brief ^Documents on Canadian corporation named Goldcorp withamining operation in Guatemala, especially information on where the Gold they extract is processed and who is buying the go1d(we think it might beaSwiss company). ^ DetailACanadian corporation named Goldcorp hasamining operation in Guatemala with poor environmental conditions and harming health ofmany workers andacommunity asawhole Where the Gold they extract is processed7 Who is buying the gold(we think it might beaSwiss company)^

^^^^y
^ Italian censorship list ^ Brief The^//Italian censorship, ofwhich Wikileaks currently only hasasubset.

I^enya
^ Reports on high level corruption in l^ihaki government ^ Brief The international investigative firm Kroll associates produced at least four reports on high level Kenyan corruption afterfirstterm of the Kibaki government Adratt version of oneofthe reportsThe looting ofKenya, was previously published by WikiLeaks.The reports were given to selected members ofPresident Kibaki"s cabinet at the time and are likely still held by http://wwwkrol1.comuk^,notably lead investigator Andrew MarshalL ^ Entity: President Kibaki ^ Entity: Kroll (http://web.archive org/web/20091105061330/http://www kroll com ukB)

Eihya
^ Arrangements with the Sudanese government

l^a^^ingB^004^0575

http://webarchiveorg/web/20091105061330/http://wikileaksorg/wiki/Draft:The_Most... 12/6/2011

Draft:The Most Wanted Leaks

^009 sort Wikileaks

Page5ofl2

^ Brief Documents indicating arrangements with the Sudanese government to grant land in Darfur to Arab settlers Irom Libya(Civilians and adminisrators on the gruond in Darfiir indicate this has been taking place).

Madagascar
Both sides ofthe political confiict in Madagascar are crying fouls about the deals made by their counterparts with foreign entities The releaseofthe official documents with respect to contract negotiations about: ^ Oil exploitation in the region ofBemo1anga(SouthofMadagascar)byTota1^others ^ Detail: Oil and Gas in Madagascar-Industry Overview (http://web.archive.Org/web/20091105061330/http://www.mbendi.com/indy/oilg/at/md/p0005.htm),Infos onTotal licensing (http://web.archive.org/web/20091105061330/http://www.scandoi1.com/moxie-bm2/news/tota1-farms-into-thebemolanga-heavy-oil-license-ishtml) ^ an obvious one but the proposed final contract before rejection ofthe land deal with Daewoo Logistics. ^ The recent agreement with Saudi investment group on staple products and proposed ^2 billion USD investment ^ The revised mining exploitation agreement with Sheritt in Ambatovy and RioTinto in Fort-Dauphin. ^ Least but not last, the complete list ofcurrent political prisoners and the charges against them

Mali
^ Arrangements with the Sudanese government ^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfiir to Arab settlers from Mali (Civilians and adminisrators on the gruond in Darfur indicate this has been taking place).

Me^ieo
^ Agreements between t SA and Peter Herlihy ^ Brief Zapolec indigenous people demand transparencyfi^omUSScholar and full disclosure of all the agreements between US Govemment and their agencies andU.S geography scholar Peter Herlihy,especially confidential agreements with Foreign Military Studies Office. Prof Herlihy failed to mention that he received fundingfi^omthe Foreign Military Studies Office of theU.S.ArmedForces on the research of""Mexico Indigena" project. Mexico Indigena Project forms part ofthe Bowman Expeditions, amore extensive geographic research project backed andfinancedby the FMSO, among other institutions The FMSO inputs information intoaglobal database that forms an integral part ofthe HumanTerrain System (HTS),aUnited States Army counterinsurgency strategy designed by Foreign Military Studies Office and applied within indigenous communities, among others ^ Entity: FMSO (http://web archive org/web/20091105061330/http://frnso leavenworth.army mil/) ^ Entity Peter Herlihy (http://webarchiveorg/web/20091105061330/http://www2kuedu/^geography/peop1epages/Herlihy Pshtml) ^ Ruta Maya ^0112 Isu^u Challenge ^ Brief Documents to unveil the real purpose of""Ruta Maya 2002 Isuzu Challenge".The convoy was commanded by Ben NunAvihu, Israeli militar and Moshe Savir,geography expert and around 50 tourists in 40 Isuzu Jeep. Some communities linked the incursion with biopiracy The terrain they explored is controled by the EZLN ^ Entity: Ben NunAvihu ^ Entity: Moshe Savir ^Entity: EZLN (http://web.archive.Org/web/2009110506l330/http://wwwezlnorg.mx/) ^Corruption around E08APR0A ^ Brief Documents related with the fraud and corruption around FOBAPROA (Fondo Bancario de Proteccion al Ahorro). ^Entity: F0BAPR0A1 (http://web.archiveorg/web/20091105061330/http://www.cddhcugobmx/cronica57/contenido/cont2/fobaprol.htm)2 (http://web.archive.Org/web/20091105061330/http://enwikipedia.org/wiki/Fobaproa) ^ Einancial operations hefore crisis ^ Documentsoftinancialoperationsjustbeforethefinancialcrisis of1994 (http://webarchive.org/web/20091105061330/http://enwikipediaorg/wiki/1994_economic_crisis_in_Mexico)(somesay the govemment knew before that the crisis was coming and took advantage ofthe information protecting their interests) ^ World l^ank credit ^ Brief Documents related with the World Bank credit and application ofthe budget to combat swine fiu ^ Entity:Wor1d Bank (http://web.archive.Org/web/2009110506l330/http://www.wor1dbank.org/mx) 1 ^ Renault program ^ Brief Documents related with the technology currently used in cellphones in Mexico to implement the RENAUTprogram (http://web archive org/web/20091105061330/http://www.renaut gob mx/RENAUT/) Information about the security technology used to protect data collected from users

l^ai^oiogB^004^057^

hftp://web.archive.org/web/20091I05061330/http://wikileaks.org/wiki/Draft:TheMost... 12/6/2011

DraftiThe Most Wanted Leaks

^009-sort - Wikileaks

Page 6 of 12

Plan Merida Brief Documents related to the transparency of Plan Merida (http://web.archive.Org/web/20091105061330/http://en.wikipedia.org/wiki/M%C3%A9rida_Initiative)

Niger
Arrangements with the Sudanese government Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers from Niger (Civilians and adminisrators on the gruond in Darfiir indicate this has been taking place).

Norway
Court case between Lyse Tele and Simonsen Brief The secret verdict in the court case between the ISP Lyse Tele and the law firm Simonsen, decided the 5th of May 2009, where Simonsen demanded Lyse Tele disclose the identity information of a file sharer suspected of uploading a copy of the movie Max Manus to thefile-sharingcommunity. Entity: Lyse Tele (http://web.archive.org/web/20091105061330/http://www.1yse.no/) Entity: Simonsen (http://web.archive.org/web/20091105061330/http://www.simonsen1aw.no/)

Puerto Rico
FBI surveillance of Puerto Rico citizens Brief The FBI has not yetfinisheddeclassifying all the secretfilesrelated to surveillance of Puerto Rican individuals and organizations from the 1930-70's http://www.pr-secretfiles.net/index.html (not to mention, large sections ofthefilesare blacked out by the FBI). In addition, there are thousands of secretfilesproduced by Puerto Rican police that were only briefly made available to individuals themselves, and have now been closed off to the public. These documents provide evidence of quite a significant spying and intimidation operation by the United States and local police against leftists and independence movement leaders. Entity: FBI (http://web.archive.org/web/2009l 105061330/http://www.fbi.gov/)

Rwanda
Financial aid for Laurant Nkunda Brief Documentation offinancialassistance given by the Rwandan govemment to General Laurant Nkunda for operations in the DRC. Entity: Laurent Nkunda (http://web.archive.org/web/20091105061330/)iltp://en.wikipedia.org/wiki/Laurent Nkunda)

Russia
VRYAN crisis documentation Brief Documents related to the VRYAN crisis, especially political documents, analyses of intelligence, and specific steps taken. Information on the mindset of the Politburo, as well as intelligence services, and what exactly they feared, and how credible they believed their fear to be. Maps for Kremlin and military hideouts Brief Maps,floorplans, and blueprints of Mount Yamantaw and Kosvinsky Mountain. Technology analysis Brief Technical plans, manuals, and blueprints for the SS-27 Sickle B (Topol-M), along with the Bulava. Brief Documents relating to nuclear warplans of the Soviet Union and Russia. Brief Documents relating to orbital weapons systems, and whether the Soviets ever deployed them (or still deploy them) such as orbital HANE devices. Brief A list and description of the various agents prepared by the various Soviet and Russian bioweapons programs. Indications of whether they developed recombinant DNA based agents, and what those are specifically. Weaponization of agents, including re-entry vehicle mounting. Doctrine for use, including deniable use. Vaccines and treatments for affected personnel.

Slovenia
Taped conversations between Slovenian opposition leader and Croatian PM Brief Taped conversations between Slovenian opposition leader Janez Jansa and Croatian prime minister Ivo Sanader, recorded by Slovenian intelligence service SOVA. Date: Summer 2004 Entity: Janez Jansa Entity: Ivo Sanader

ManningB_00410577

http://web.archive.org/web/20091105061330/httpi//wikileaks.org/wiki/DraftiThe_Most... 12/6/2011

DraftiThe Most Wanted Leak^ ^2009 sort Wikileaks


^Entity: SOVA

Page7ofl2

Sudan
^ Salah Gosh and the CIA DDate:2005 ^ Documents detailing discussions during 2005 meeting between Salah Gosh and the CIA(for which the CIA flew Gosh on private jet from Khartoum to CIA HO) See: http://www sudantribune.com/article php37id article^l0205 ^ Mali case ^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfiir to Arab settlers from Mali (Civilians and adminisrators on the gruond in Darfiir indicate this has been taking place) ^ Libya case ^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers from Libya(Civi1ians and adminisrators on the gruond in Darfiir indicate this has been taking place) ^ Niger case ^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers from Niger(Civi1ians and adminisrators on the gruond in Darfur indicate this has been taking place).

Syria
^ AssasinationofMehdiBenBarka ^ Brief All the documents related to the assasination, in 1965,ofMehdi Ben Barka still held in France, USA, Israel and Morocco In1976, thanks to the Freedom of information Act, the US govemement recognized that the CIA had about1800 classified documents about his assassination. Theses documents are still classified.

Switzerland
^ Cornu Report ^ Brief The full Comu Report. See http://en wikipedia.org/wiki/Projekt 26^The_Comu_Report

Swaziland
^ Expense accounts of King Mswati, the ^ueen Mother and the King'swives. ^ Memos from Ministry of Oefense or Police ^ Brief Intelligence memos from the Ministry ofDefence or Police about the pro-democracy organization, PUDEMO. ^ Entity: Pudemo (http://web.archive.Org/web/20091105061330/http://www.pudemo.org/) ^ Entity: Ministry ofDefense (http://web.archive.org/web/20091I05061330/http://www.gov.sz/home.asp7pid^59)

Trinidad andTohago
^ Commission ofEnquiry reports ^ Brief The Report on the Commission ofEnquiry into the construction ofthe new PiarcoAirport.This identified corrupt practices in the spending ofpublic funds.The Commission's report was delivered in August 2003.Near1y6years later, its findings have not been made public. ^ Brief Report ofthefindingsofthecurrent C^^B^^^.^.^/^^t^^^^^iB^ ^^1^1/^^/^^^/t:^^^^^i^^lit^^ ^ Entity: Commission Enquiry (http://web.archive.Org/web/20091105061330/http://www.constructionenquiry.gov.tt/) ^ Entity : Piarco airport (http://web.archive.Org/web/20091105061330/http://www.piarcoairport com/) ^ Caroni Bridge collapse ^ Brief The Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafew years ago^ again the public has not been made aware ofthe report's findings. i^Date: 2nd August 2008 ^ Waterfront t^evelopment Project ^ Brief Acopy ofthe contract for the billiondollarWaterfront Development Project 1 ^ Entity: 7udecott7 (http://web.archive.Org/web/20091105061330/http://www udecott com/) DScholarshipssponsoredhyMinistryofCulture ^ Brief List ofrecipients and amountsof scholarships sponsored by Ministry ofCulture for study abroad ^ Entity: Ministry ofCulture (htlp://web archiveorg/web/2009110506l330/http://wwwgov tt/) ^Detail:

l^anniogB^004^057^ httpi//webarchiveorg/web/20091105061330/httpi//wikileaks.org/wiki/DraftiThe Most... I2/6/201I

DraftiThe Most Wanted Leaks

^009 sort Wikileaks

Page8ofl2

As far asTrinidad andTobago goes, our govemment tends to pay lip service to the principlesoftransparency and accountability For instance, there isaFreedom ofinformation Act which, by 1aw,allows the public to seek information from govemment departments.But quiteoften,when such attempts are made by the citizenry,the govemment bars full disclosure Depending on how importantapiece ofinformation is to Joe Public, he may actually have to tum to the courts to "force" the govemment to reveal facts that should be disclosed voluntarily.Followingareafew examplesofdocuments that should be made public, but have not been: ^ The Report on the Commission ofEnquiry into the constructionofthe new Piarco Airport This identified corrupt practices in the spending of public funds The Commission's report wa^ delivered in August 2003 Nearly6years later, itsfindingshave not been made public ^ The Report on the Caroni Bridge Collapse Aman was killed whenabridgecollapsedafew years agoi again the public has not been made aware ofthe report's findings ^ The Opposition recently brought up in Parliament the issueoftaxpayers'money being used to pay attomeys by state.Although the public hasaright to know how much ofits fiinds were used in paying said attomeys, the Attomey General refused to disclose the sums, saying it would be an invasion ofthe lawyers'privacy ^ The same goes forarecent request in Parliament, whereby ^the Minister ofPlanning and Development was asked to producea copy of the contract for the billion-dollarWaterfront Development Pro^ect^ The Minister's response was that she could not produce said contract for public discussion because there wasaconfidentiality clause contained therein(foraproject being built with public funds) ^ The Ministry ofCulture recently awarded scholarships for students to study abroad-when asked in Parliament to disclose the list ofrecipients and the dollar value ofthe scholarships, the response was that this was private information.

Uganda
^ Ugandan profit-sharing agreements with oil companies in south-western tJganda ^ Brief The govemment ofUganda has recently signedanumberofprofit-sharing agreements with several oil companies that are conducting explorations in southwestem Uganda. Releasing these documents would beamajor step in increased transparency with respect to the country's emerging oil industry.

United I^ingdom
^ Censorship in UK ^ Brief List of curtent and expired D-Notices ^ Entity: dnotice (http://web.archive.Org/web/20091I05061330/http://www.dnotice.org.uk/the system.htm) ^ Brief secret gag orders, injunctions and legal threats sent to UK newspapers ^ Entity: legal contact addresses at the Guardian, Daily Mail, Times, Independent, Evening Standard, etc ^ Brief Censorship list for the United Kingdom's "voluntary"filtersystem.Known to be held byThe Intemet Watch Foundation (http://web.archive.Org/web/20091105061330/http://www iwf org uk/) Companies and their subsidiaries which are currently being supplied with the IWF list Most ISP's in the UK haveacopy ofthe IP's on the list ^ Entity:The Intemet Watch Foundation (http://web.archive.Org/web/20091105061330/http://www.iwf.org.uk/) 1 ^ Irac^ war planning ^ Brief The secret cabinet minutes (http://webarchive org/web/2009l10506l330/http://news.bbc.CO.uk/2/hi/uk_news/politics/7752009stm)and legal advice (http://web.archiveorg/web/20091105061330/http://news.bbccouk/2/hi/uk_news/politics/4381379.stm)pertainingtothe allegedly illegal war and ongoing occupation oflraq. ^ Roger Hollis surveillance ^ Brief UK Govemment documentation into the investigation ofRoger Hollis, head ofMI5 between 1956 and1965, including the report by LordTrend, into the serious but apparently unproven allegations ofbeingaRussian Spy. ^Entity: M15 (http://web.archive.Org/web/20091105061330/http://www.mi5.gov.uk/) ^ Wythenshawe intelligence centre ^ Brief Documents detailing the information stored and collected by the Wythenshawe intelligence centre [2] (http://web.archive.Org/web/20091l0506l330/http://wwwtimeson1inecouk/to1/trave1/news/artic1e5683677.ece) ^ Police surveillance on climate change protestors ^ Brief Acopy ofthe police intelligence handed to EON about climate change protestors.13] (http://web archive org/web/20091105061330/hltp://www guardian.co uk/uk/2009/apr/20/police-inte1ligence-e-on-berr) ^Entity:EON(http://webarchiveorg/web/20091105061330/http://wwweonukcom/) ^ MP expenses ^ Brief The fiill MP expenses data^ how much theTelegraph paid for them. ^ Entity: Dai1yTe1egraph(http://webarchiveorg/web/20091105061330/http://www.telegraph.coukB) ^Entity: UK Parliament (http://web.archive.Org/web/20091l05061330/http://www.par1iamentuk/) ^ Allan Cappelow murder

l^af^f^ii^gB^004^0579 http://web.arehive.Org/web/20091105061330/http://wikileaksorg/wiki/Draft:TheMost

12/6/201

DraftiThe Most Wanted Leaks

^009 sort Wikileaks

Page9ofl2

^ Brief Documents revealing why the trial ofWangYam, who was convicted ofkilling Allan Chappelow, was held in camera, the first UK murder trial ever heard behind closed doors without access by press or public[4j (http://web.archive.Org/web/2009110506l330/http://en.wikipedia.org/wiki/Allan_Chappe1ow) ^ Nationalisation ofNorthern Rock and Bradford^Bringley ^ Brief The proper reasons for nationalisationofNorthem Rock and Bradford t^ Bingley,and the subsequent sale ofthe latter's savings buisiness to Santander. ^ Brief Records of events during the twelve months leading up to the nationalisationofBradfordt^ Bingley. ^ Brief Information regarding the valuation process to determine compensation for fromer shareholdersofNorthem Rock and Bradford t^ Bingley, that is, the information the independent valuer uses to determine the final value ofthe comapanies. ^Entity: Bt^B(http://webarchiveorg/web/20091105061330/http://wwwbbgcouk/) ^ Entity: Northem Rock (http://web.archive.Org/web/20091105061330/http://www.northernrock.co.uk/) ^HBOS takeover ^ Brief Copies of govemment minutes of meetings between Gordon Brown and/or Alistair Darling and representativesof Lloyds Bank relating to the proposed takeover ofHBOS ^ investigation into Oaveport Lyons ^ Brief Documentsfi^omSolicitors Regulation Authority's investigation into DavenportLyons threatening letters related to filesharing.

United Nations
^Security Council and Oarfur ^ Brief Requests to Ihe Security Council in 2003 that the Security Council look at what was happening in Darfur,and any notes ofdiscussions leading to the decision not to look al the situation. DDate:2003 ^ Entity : UN Security Council

United States
Important bull^ databases ^ Intellipedia ^ Brief Classified intelligence community site as of11/1/2008, including article history. ^ opensource.gov ^ Brief The complete CIA Open Source Center analytical database The database is extensive, unclassified, non-public, but relatively accessible to certain outsiders afterjumping through hoops Despite its name,you need to be govemment official to gain access to it. ^ Entity: opensource.gov (http://web archive.Org/web/2009I105061330/http://www.opensource gov/) ^ Pacer database ^ Brief The completePACERdatabase.ThePACER database contains extensive US federal court records.They are public documents, currently behindapaywalf See http://arstechnicacom/techpolicy/news/2009/04/case-against-pacerars ^Entity:PACER(http://webarchiveorg/web/20091105061330/http://pacer.psc.uscourtsgov/) Eederal politics ^ The missing five million White House emails-possibly no longer in existence. ^ Chenney and Rumsfeld Archives ^ The While House visitor's list ^ Minutes or notes for VP Cheney's Energy Conference. ^ The114lpagesofACTAbackground documents not released to the EFF by the USTradeRepresentative(see [5] (hltp://webarchiveorg/web/2009110506l330/https://secureefforg/site/Advocacy'^cmd^displayt^page^UserActiont^id^420)) ^ Alist ofall Whitehouse and senior federal govemment employees holding dual citizenship and the countries they represent. Military and Intelligence ^TheSlOP DOPLAN/CONPLAN 8022,2003 revision DOPLAN/CONPLAN 8044,2007 revision ^ CfA detainee interrogation videos While the CIA claims to have destroyed 92 ofthe videos,others are known to remain. ^ The US "Black Budget ", from inception to present, with line items, hopefi^lly annotated and explained. ^ Detainee abuse photos withheld by the Obama administration. ^ Wiretapping program led by NSA ^ Brief Correspondence between the National Security Agency and American telecom companies such asATt^T.Verizon, and Owesi, regarding the warrantless wiretapping program Correspondence involving telecoms who cooperated wilh the

i^af^f^if^gB^004^05^0

http://web.arehive.Org/web/20091105061330/http://wikileaks.org/wiki/Draft:TheMost... 12/6/2011

DraftiThe Most Wanted Leak^ ^2009 sort Wikileaks

Pagel0ofl2

NSA(egAT.^T) may give different information than telecoms who refiised(egO^^^^)^^nt both types would better shed light on the NSAsprogram The existence ofthis correspondence is well documented in the media, for example that Owest's lawyers refiised to cooperate because the FISA Court had not signed off on it. ^Entity: NSA (http://webarchiveorg/web/20091105061330/http//wwwnsagov/) ^ Entity: Owes! (http://web.archive org/web/20091105061330/http://www.qwest.com/) ^Entity:ATt^T(http://webarchiveorg/web/20091105061330/http://wvt^attcom/) ^ Entity:Verizon (http://webarchive.Org/web/20091105061330/http://www.verizoncom/) ^ Unredacted copy ofDept of Justice's Office ofInspectorGenera1's"AReview ofthe FBI'sActions Connection With Allegations Raised By Contract Linguist Sibel Edmonds" July1,2004(redacted version here http://wwwwbezorg/FlLES/sibelpdf) ^ Camp De1ta(Guantanamo)Standard Operating Procedure 2005-2009 ^Iraq US Artny Rules ofEngagement2007 2009(SECRET) m Unredacted Inquiry into theTreatmentofDetainees in USCustody,20 Nov 2008 ^ Memorandum between the CIA and the Department ofState detailing any constraints on Darfur policy caused by actual or anticipated Sudanese government cooperation on counter-terrorism, including CIA request to USU^ that Salah Gosh be removed from the U ^ Panel ofExperts list ofthose recommended for sanction.See: http://www.sudantribune.com/artic1e.php37 idartic1e^10205 ^ Department ofState and CIA contributions to the Obama Administration's 2009 Sudan Policy Review,in particular with respect to: a) Whether to support the ICC arrest warrant against Sudanese President Bashir^b)whether to takeaconfrontational or an appeasement approach to the Sudanese govemment on the issue ofDarfur ^ Camp De1ta(Guantanamo)Standard Operating Procedure 2005 2009. ^ Camp De1ta(Guantanamo)1nterrogation Standard Operating Procedure 2003-2009. ^ Correspondence between the National SecurityAgency and American telecom companies such asATt^T,Verizon, and Owest, regarding the warrantless wiretapping program Correspondence involving telecoms who cooperated with the NSA(egATt^T) may give different information than telecoms who refused(e.g.O^^^^)^ but both types would better shed light on the NSA's program.The existence ofthis correspondence is well documented in the media, for example that Owest's lawyers refiised to cooperate because the FISA Court had not signed off on it ^Iraq and Aflianistan US Army RulesofEngagement 2007 2009 (SECRET) DCIA/DIA/NGA/NSAanalysesofthe VRYAN crisis of1983 1 ^ Technical specifications of the KH-lland follow-on satellites with similar capabilities. ^ The contents ofthe Footbafl, and how they changed over the years during the different Administrations. 1 ^ What Pollard stole and gave to the Mossad, the fiill text ^ US psychological profiles and political analysesofSoviet leaders. ^ Documents relating to orbital weapons systems, and whether the US ever deployed them(or still deploy them)such as orbital HANE devices. ^ Information about thePAN satellite and the agency responsible for it http://spaceflightnowcom/news/n0905/26mi1space/ ^ Commander Directed Report oflnvestigation Conceming an UnauthorizedTransferofNuclearWarheads Between Minot AFB, North Dakota and Barksdale AFB, Louisiana 30 August 2007 (S//FRD//MR) ^ Investigation into the Shipment ofsensitive Missile Components toTaiwan(ADM Donald Report)-22 May 2008 (S//FRD//NOFORN) ^ Air ForceComprehensiveAssessmentofNuclearSustainment(CANS)-Ju1y 2008 (S//FRD//NOFORN) ^ General Order Number One issued by commanders in Iraq and Afghanistan ^ Reports about Colombian'falsos positives' ^ Unredacted copy ofDept ofJustice's Office ofInspectorGenera1's"AReview ofthe FBI'sActions Connection With Allegations RaisedByContractLinguistSibe1Edmonds"Ju1y1,2004(redacted version here http://www.wbez.org/FILES/sibe1pdf) 1 ^ All secret annexes for,attachments to, unredacted versionsof and documents implicitly or explicitly referenced in the following documents, which may be partially available in unclassified form: ^ National Security Presidential Directive51, "National Continuity Policy",May9,2007,also known as Homeland Security Presidential Directive 20 ^ Federal Preparedness Circular 65,""Federal Executive Branch Continuity ofOperations(COOP)"",July 26, 1999 ^Federal Response Plan 1FEMA92301PL], April 1999 ^ Presidential Decision Directive 67,""Enduring Constitutional Govemment and Continuity of Govemment Operations"",October21,1998 ^ Presidential Decision Directive 63,""Critical Infi^astructureProtection(CfP)"",May 22,1998 ^ Presidential Decision Directive 62, ""Protection Against Unconventional Threats to the Homeland and Americans Overseas",May 22,1998 ^ ^T^C^ ^.^ Federal Response Planning Guidance01-94,"ContinuityofOperations(COOP)",December 4,1994 ^ B/^i^C^^Nationa1SecurityDirective69, "Enduring Constitutional Govemment", June 2, 1992 ^ /^T^C^c^.^ Federal Preparedness Circu1ar61, "Emergency Succession to Key Positions of the Federal Departments and Agencies"", August 2,1991 ^ Federal Preparedness Circular 62,""Delegation of Authorities for Emergency Situations",August I,1991 ^ Federal Preparedness Circular 60, ""Continuity ofthe Executive Branch ofthe Federal Govemment at the Fleadquarters Level During National Security Emergencies"", November 20,1990 ^ National Security Directive 37,"Enduring Constitutional Government"",Apri1I8,1990 ^ ExecutiveOrder l2656,""AssignmentofEmergencyPreparednessResponsibiIities"',November 18,1988 ^ Executive Order 12472, "Assignment ofNational Security and Emergency PreparednessTelecommunications Functions"",Apri13,1984 ^/^.^^^^ NSDD 55,""Enduring National Leadership" September 14, 1982 1 ^ Executive Order 12148,""Federa1 Emergency Management"",July 20, 1979

i^af^f^iogB^004^05^^

http://webarehiveorg/web/20091105061330/http://wikiIeaks.org/wiki/Draft:TheMost.. 12/6/2011

DraftiThe Most Wanted Leaks


^ Alist ^ ^ ^ Banking

^009 sort Wikileaks

PageIlofl2

ofthe actual facilities in the Federal Relocation Arc,as of the present time, along with their locations. Blueprints,maps, andfioorplans ofMWEOC. Blueprints, maps,and floor plansofSiteR(Raven Rock) Blueprints andfioorplans ofall unmentioned facilities in the Federal Relocation Arc, including historical ones

^ The complete list ofidentities ofthe 52,000 wealthy American clients suspected ofhiding^15billion at UBS to avoid taxes, including the namesof any elected or appointed government or former govemment officials. ^ The complete details ofGoldman, Sachs t^Co"s counterparty exposure to AIG prior to the Federal bailout of AIG in September, 2008 Environment ^ Monsanto"s intemal evaluations ofGMO products including safety and pollen drif^. Media ^ The Editorial Guidelines for Fox News ^ Emails relating to suppressed GO magazine article on Putin's rise by Scott Anderson mentioned at[6j (http://webarchiveorg/web/20091105061330/http://ww^vnprorg/temp1ates/story/storyphp7storyld^112530364) Religion Mormons Church records ^ With recent leak of1999/2006 Church Handbook oflnstructions, pertinent documents and covertly photographed artifacts in the vault at Church Office building or subsidy in Salt LakeCity,Utah which expose and negate Mormon Church's claim of divinity and its monopoly on "truth."I.e.the concealed remnantsof diaries and letters written by former early Mormon apostle William McLellin [7] (http://web.archive.Org/web/20091105061330/http://en wikipedia.org/wiki/WiI1iam E._M% 27Le11in^Persona1 writings) McLellin diary and documents was the main point ofinterest for convicted double murderer/bomber Mark Hofmann's planned forgery attempt to deceive Mormon leaders to obtain in fraud by deception monetary reward to suppress truth ofearly Mormon history unfavorable to current Mormon religion For more info, [8j (http://webarchiveorg/web/20091105061330/http://www.utlmorg/on1inebooks/trackingch3htm) ^ Documents ofMormon Church's billion-dollar investment in City Creek Mall and Condominium in SLC,which may put Mormon Church's IRS tax-exempt status injeopardy ifthere is verification ofthe allegation the Church used tithe and offering monetary contributions by the members to fund the project under the umbreflaoftax-exempted religious freedom. ^ Mormon Church leadership's involvement in politics, such as correspondence to ecclesiastical subordinates (bishopric)on policy and attitude towards same-sex civil rights^other sensitive issues relevant and concerning to the leaders.As well as recorded cortespondences between Mormon members ofUtah legislation and Church leaders on sensitive political issu/^^/^c^^^.i^^es for legislation purposes which may contravene the separation ofchurch and state ^ Uncovered film or audio recording featuring the play with the actor portraying Protestant minister encouraged by Satan/Lucifer (portrayed by actor) to spread false doctrines to attack all religions outsideofMormon religion as "abominable" which was exhibited for qualified "temple recommend" audiences in all ofthe existing temples prior to removal in 1990(a1most like leaked Scientology orientation video)19] (http://web.archive.Org/web/20091105061330/hltp://www.exmormon.org/mormon/mormon288.htm). ^ Unearthed secret audio or video recording inside Mormon temple with the temple members swearing "blood oath" before removal in 1990 ^10] (http://web.archive.Org/web/20091105061330/http://en.wikipedia.org/wiki/B1ood_oath (Latter Day Saints)) ^ Documented Church leaders" and lay clergyscover-upofphysical/sexual abuse and rapeofminors by missionaries and members without reporting to law enforcement in some cases[11] (http://web.archive.Org/web/20091105061330/http://wwwexmormon.org/mormon/mormon384.htm). 1 ^ Older editions ofChurchHandbooksoflnstructions from the first edition upl12] (http://web archive org/web/20091105061330/http://en wikipediaorg/wiki/Church Handbook_of_lnstructions"^History)for comparison to recent 1eaked1968 (truncated),1999 and 2006 editions.

Vatican
^ Vatican secret archives ^ Brief The Index ofthe Vatican Secret Archive.Al presentpre-screned scholars are allowed to see it but not copy it(under scholar ru1e^16http://asv.Vatican.va/en/fond/amm.htm) ^Vatican'sdocumentsonnaziGermany ^ Brief Bt//documents pertaining to Nazi Germany and the Vatican, as wefl as those relating to the post-war rat line to Argentina. Refer to http://news bbc co uk/2/hi/europe/2611847.stm

International organisations
^ BilderhergGroup

i^afiningB^004^05^2

http://web.archive.Org/web/20091105061330/http://wikileaks.org/wiki/Draft:The_Most... 12/6/2011

Draft:The Most Wanted Leaks

^009 sort Wikileaks

Pagel2ofl2

^ Brief Bilderberg Group meeting minutes, papers and annual reports ofsince 1954 WikiLeaks has some years already Bilderberg is an annual off-the record conference offransatlantic political,economic and ideological agenda setters As an historically important confidential document collection it is probably only equaled by Cabinet minutes and high level intelligence and diplomatic assessments.LeadsThere are some o1der,previous1y unnoticed records in boxes at Uni of Illinois http://wwwlibrary Illinois.edu/archives/uasfa/1535051 pdf(19561970) the George Bush library, http://bushlibrary tamu edu/research/finding_aids/pdfs/08 0379 F pdf and the Eisenhower Library in Kansas http://www eisenhower.utexas.edu/Research/Finding Aids/PDFs/Jackson CD Records.pdf 1 ^ Entity: Bilderberg Group (http://web.archive org/web/20091105061330/http://en wikipetjia org/wiki/Bi1derberg_Group) ^ Alliance Base ^ Brief Documents regarding the founding and operation of Alliance Base (http://webarchiveorg/web/20091105061330/http://enwikipediaorg/wiki/AI1iance_Base). Retrieved from "https://secure.wikileaks org/wiki/Draft:The_Most_Wanted Leaks of^2009 sort" Categories: Bulgaria^CzechRepublic^Denmark^Estonia^France^Germany^lcelandlltaly^Latvia^Lithuania^Netherlands^Nor^ay [Poland^Romania^Slovenia^Spain^Turkey^UnitedKingdom^Switzerland^Sweden^Malta^Portugal^Luxembourg^Finland^ Belgium^Cyprus^Canada^SlovakialUnited States

1^afinifigB^004^05^3 http://web.archiveorg/web/20091105061330/hftp://wikileaks.org/wiki/Draft:TheMost... 12/6/2011

Draft:The Most Wanted Leaks of 20v. sort - WikiLeaks

Page 1 of 12

DraftiThe Most Wanted Leaks of 2009-sort


From WikiLeaks
Jump to: navigation, search Somewhat sorted entries of the most-wanted list. Work in progress, TODO: Add brief, entity and date for each entry.

Contents
thide]
1 Austria 2 Australia 3 Bahrain 4 Belgium 5 China 6 Colombia 7 Finland 8 France 9 Germany 10 Greece 11 Guatemala 12 Italy 13 Kenya 14 Libya 15 Madagascar 16 Mali 17 Mexico ISNieer 19 Norway 20 Poland 21 Puerto Rico 22 Rwanda 23 Russia 24 Slovenia 25 Sudan 26 Syria 27 Switzerland 28 Swaziland 29 Trinidad and Tobaeo 30 Uganda 31 United Kingdom 32 United Nations 33 United States 34 Vatican 35 Intemational organizations

Austria
Austrian e-Voting system used in students elections. - Date: 18 May 2009 < Brief: We seek for details about Austrian voting system used in students elections, which includes but is not limited to source code and certifications. Entity: Scytl (programming) Entity: Austrian Federal Computation Center (hosting) " Entity: Ministry of Science (initiator) ' Entity: Robert Krimmer (consulting) E-Mail traffic between Josef PrSII and Christian Konrad. - Date:??? " Brief: E-Mail traffic between minister of finance Josef Proll and Christian Konrad, who is advocate general of Raiffeisen bank. g k g p 5 C
Q

O U < <
0. CL,

00527888
http://wiki1eaks.Org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort

^
Saturday, June 01, 2013 15:39:36 PM

Draft:TheMostWantedLeaksof20^ ^ort WikiLeaks


^ Entity: JosefPrC^fl(josef.proell^bmf.gy.at) ^ Entity: Christian Konrad

Page2ofl2

^ ^-l^ail traffic ofAntonMalidalik with MieliaelH^upl and/or Michael Ludwig ^Date:??? ^ Brief: E-Mail traffic ofFPO delegate Anton Mahdalik with Viennese mayor Michael Haupl anchor deputy mayor Michael Ludwig containing threats when renting municipal ground to the Viennese trailor park ("Wagenplatz Wien"). ^ Entity: Anton Mahdalik (toni.mahdalik^f^oe.at) ^ Entity: Michael Haupl (michael.haeupl^wien.gy.at)

Australia
^AC^LI^LIilaeklist ^Date: 19 March2009and later ^ Brief: Versions of the ACMA U ^ blacklist newer than 19March2t)09.^ii^i^^ci^7 previously released three versions of the list, two of which included WikiLeaks or its subpages. ^ Entity: Australian Communications and Media Authority ^CensorshipteelinologyinAnstralia ^Date:2009 ^ Entity: Australian Communications and Media Authority ^ Entity: EnexTestlabs ^ Entity: Watchdog NZ ^ Entity: [^www.iwf.org.uk Intemet Watch Foundation] ^Entity: Exetel ISP ^ Brief Eull details offiltering hardware/software vendors participating in government-sponsored ISP level censorship technology trials, including (but not limited to): ^ Any and all communications between filter vendors and goyemmient departments prior to, during, and after the trials ^ Any and all transactions, contracts, and other financial arrangements involving filter vendors ^ Details: ^ URL blacklist(s)used during above trials. Alleged (by government) to beACMA URL blacklist. ^ Full statistical breakdown of results of above trials (in the eventthat EnexTestlabs do not make them publicly available). ^ UI^L blacklist as used by Watchdog NZ during private censorship technology trial by ISP Exetel in May 2009.Alleged (by Watchdog) to have been IWF list(see United Kingdom). ^ Full statistical breakdown of results ofWatchdog/Exetel's censorship technology trial-Exetel's official response seems lacking. Annual l^SWPolieetest ^ Brief Written exam l^SW police officers musttake annually belore they can be issued withTasers. ^Entity: NSW Police

^ah^ain
^Ooenmentsregardlngehangestocountrysdemogra^liy. ^ Brief Documents disclosing the number ofcitizenships that have been granted in the last few years, in an effort to change the country^s demography.See Political naturalisationll].

^el^iunn
^ t^oenment regarding equality audits ofBelgian hospitals ^ Brief: Documents disclosing the fatality rates ofspecific procedures and illnesses per hospitaL Indicating statistically significant differences in survival chances between hospitals.

Chin^
^ Golden Shield Project Brief Alist ofURLs and keywords censored filtered by the Golden Shield Project(Great Firewall of China).WikiLeaks has previously released related information, for example, watch lists, policies and several thousand URLs for CCTV and Baidu, but not for general http filtering. ^ Entity: Ministry of public security ^ Genocide ^lym^ies campaign ^Date:^8thMarch^007 ^ Brief Policy options on Darfiir formulated in response to the so calledt^enocide Olympics campaign led by American actress, Mia Farrow,and notes of meetings in 2007 between Stephen Spielberg and Chinese Foreign Ministry officials prior to Spielberg's resignation as Artistic Director ofthe :^008 Beijing Olympics.

00^^7^^^
http://wiki1eaksorg/wiki/l^i^aft:TheMostWanted_Leaks_ot^2009 sort

^
Saturday,Jitne01,2013 15:39:36 PM

Di^aft:TheMostWantedLeaksof20^^ sort WikiLeaks

Page3ofl2

Colon^^i^
^ Surveillance of citi^ns and organisations ^ Brief: Tbe DAS (Departamento Administrativo de Seguridad) is reported to have surveilledawide array of public officials, private citizens, and organizations. Documents wanted: contracts to supply software for intemet suryeillance to Colombian policy agencies and B details ofthe software supplied. ^Entity: DAS

F^iuland
^ Tiitisen Lista ^ Brief The so called Tiitisen Lista, the list ofl^persons claimed to have been in active contact with East German security services (Stasi).The list was received from the West German intelligence services (B^D)iii 1990 and since classified by the order ofPresident Koivisto as adviced by the head of the Finnish Security Police (Suojelupoliisi), SeppoTiitinen.lt is rumoured that several current or formertop Finnish politicians appear on the list. ^ Entity: Stasi ^ Entity: Koivisto ^ Entity: Suojelupoliisi ^^^n^e ^ NieholasSarko^ liealth report ^ Brief The Monthly Health Report ofPresident l^icolasSarkozy,as promised by himself during the lastpresidential elections.

Gern^au^
^ Censorship in Germany ^ Details: ^ The censorship filter list for the proposed national,mandatory censorship system.Thelistwill be compiled by German federal criminal police BKA and distributed to intemet service providers. ^ The contents ofthe contract between the BKA and some ISPs that has already been signed, but is kept secret due to "public safety" andcoi:iyrightconcems(seehttri://blog.fefede/7ts^b4fa8af8). ^ The List ofMediaHarmfiiltoYoung People (the censorship system already in place).The "virtual media'^ part of this list is distributed to search engine providers and is illegal to publish. It probably could be reverse engineered using the differences between googlecom and google.de search results. Also, if you want to knowifaspecific medium is on the list, you can send an enouiry to listel^bundesnruefstelle def'Bundesprtlfstelle" is the agency responsible for keeping the list). ^ Entity: Bundesnrtifstelle ^Entity: BKA ^ PoliticiansStasifiles ^ The Stasi files ofFederal Chancellor Angela Dorothea Merkel (maiden name Kasner) and other leading politicians, which are known to exist, but withheld from public ^ Operation Gladio ^ Brief Tbe Stasi files relating to operation Gladio/stay behind organisations in relation toright-wingterrorism in C^ermany.astiera parliamentary rec^uest by the Green party. Atlas Oer Wut ^ Brief: The so called"Atlas der Wut",adocument about theriskofriotsin different german regions.The list is said to be updated regulary and was firstwritten in ^005. ^ ^lie list ofNPt^ party members

Greece
^heAtliens Affair ^ Brief Documents related to the Athens phone tapping affairthat have yetto be released (including those from countries otherthan Greece) Context

Guaten^^la
^ Plan Victoria Plan So^a and Plan Eerme^^^ ^ Brief All documents on Plan Victoria 82, Plan Sofiaand Plan Firmeza 83. ^ Detail:

0^^^7^^0
http://wikileaksorg/wikt/Oraft:The_Most_Wanted_Leaks_ol^2009 sort Saturday,June01,2013 15:39:36 PM

Dt^ft:The Most Wanted Leaks of20^^sc^rt-WikiLeaks

I^age4ofl2

Within the process oftrying to bring military personal involved in humanrightsviolations and massacres that happen during the civil warinGuatemalatojustice,themilitaiyhayebeenrec^uiredtodecla^sifymanywardocuments.fnacase,thatwentallthewaytothe SupremeCourtofGuatemala, the Court dictatedasentence that confirmed the obligation of the Ministry ofDefense of Guatemala to hand overthe official documentation of four specific military operations: Campana Sofia 82,Victoria 8^, Firmeza 83 and Operacion l^il. The Supreme Court sentence indicated that the archives had to be declassified. These military operations were carried out in the 80s.According to the CEH, Historical Clarification Commission ofGuatemala final report contained in "Guatemala: Memory ofSilence",these military operations resulted in massacres and severe human rights violations. The Minister ofDefense AbrahamValenzuela only delivered partial information about plans Victoria 8^ and Firmeza 83,two of the four requested plans. He indicated that he had no knowledge ofthe other two plans before he became Minister ofDefense and that he ignores where the documentation could be. He stated that he could not deliver the complete plans "Victoria 82"y"Firmeza 83" because certain information was considered state secret andaconcem of national security. "Plan Sofia",aderiyatiyeof"Plan Victoria 82",was of special concern to human rights activists^ this plan was conceived in July 1982, four months after General Efrain Rios Montt came into power. TlieCEt^ archives ^ Brief: Final report ofUnited Nations'Historical Clarification Commission (CEH) into the killing of200,000 Mayan people and the involvement of the US govemment and American corporations. The report official sources(military interviews, campaign plans, etc)are kept secret bythe LfN in NYC. ^ Detail: The United nations'Historical Clarification Commission(CEH) for Guatemala issuedareport where the US government and several American corporations were accused of complicity in the genocide of nearly 200,000 Mayan people during Guatemala?s bloody 36 year civil war.The final 3,600-page CEH report clearly places the blame fcir most of the 200,000 deaths on the "racist" policy of the Guatemalan govemment and holds the country?s military and paramilitary forces responsible fi:^r the actual killings, tortures and disappearances. However, it accuses the US of directly and indirectly supportinga"8^atricidal confrontation" by providing sustained training, arms and financial aidThe report is based on the testimony of9,200 people from all sides ofthe conflict and other documents"^,classified and Secret, protected in the Uf^ headquarters in NYC.The CEH investigated 42,000 human rights violations, 29,000 ofwhich resulted in deaths or disappearances and therefore, the documents under U ^ custody are fiindamental for the prosecution ofthose responsible ofthe crimes. ^ Goldcorp affair ^ Brief: "^Documents on Canadian corporation named Goldcorp withamining operation in Guatemala, especially information on where the Gold they extract is processed and who is buying the gold (we think it might beaSwiss company). ^ DetaikACanadian corporation named Goldcorp hasamining operation in Guatemala with poor environmental conditions and harming health of many workers andacommunity asawhole.Where the Gold they extract is processed? Who is buying the gold(we think it migbt beaSwiss company)?

^^^^^
Italian censorship list ^ Brief The Italian censorship, of which Wikileaks currently only hasasubset.

I^en^a
^ l^eports on high level corruption in Kibaki government ^ Brief The intemational investigative firm Kroll associates produced at least four reports on high level Kenyan corruption after first term ofthe Kibaki govemment.Adraffyersion of one of the reports The looting ofKenva. was nreviously published by WikiLeaks. The renorts were given to selected members ofPresident Kibalci's cabinet at the time and are likely still held by httn://www.krollcom.uk/. notably lead investigator Andrew MarshalL Entity: President Kibaki ^Entity: Kroll

^ib^a
^ Arrangements witli the Sudanese government ^ Brief Documents indicating arrangements with the Suc^ese government to grant land in Darfiirto Arab settlers from Libya(Civilians and adminisrators on the gruond in Darfiir indicate this has been taking place).

l^ada^as^ar
Both sides ofthe political conflict in Madagascar are crying fi:iuls about the deals made by their counterparts with foreign entities.The release ofthe official c^cumen^with respect to contract negotiations about:

00^^7^^^
http://wikileaksorg/wiki/Oraft:The_Most_Wanted_Leaks_ot^2009 sort Satut^day,June01,2013 15:39:36 PM

Dt^ft:The Most Wanted Leaksof20t^^sort WikiLeaks


^ Oil exploitation in the region ofBemolanga(SouthofMadagascar)byTotal^other^ ^ Detail: Oil and Gas in Madagascar Industry Overview.lnfosonTotal licensing ^ an obvious one but the proposed final contract before rejection ofthe land deal with Daewoo Logistics. ^ The recent agreementwith Saudi investment group on staple products and proposed ^2 billion USD investment. ^ Tbe revised mining exploitation agreement with Sheritt in Ambatovy and Rio Tinto in Fort Dauphin. ^ Least but not last, the complete list of current political prisoners and the charges against them.

Page5ofl2

l^ali
^ Arrangements with the Sudanese government Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfiir to Arab settlers from Mali(CiviIians and adminisrators on the gruond in Darfiir indicate this has been taking place).

l^e^i^o
^ Agreements between USA and Peter tterlihy ^ Brief Zapotec indigenous people demand transparency from U.S. Scholar and fiill disclosure ofall the agreements between U.S. Govemment and their agencies andU.S.geography scholar Peter Herlihy,especially confidential agreements with Foreign Military Studies Office. Prof Herlihy failed to mention that he received funding ^om the Foreign Military Studies Office oftheUS.Armed Forces on the research of'M^xico Indigena" project. Mexico Indigena Project forms part ofthe Bowman Expeditions,amore extensive geographic research project backed and financed by tbe FMSO,among other institutions.The FMSO inputs information intoaglobal database that forms an integral pari of the HumanTerrain System (FITS),aUnited States Army counterinsurgency strategy designed by Foreign Military Studies Office andappliedwithin indigenous communities, among others. ^Entity: FMSO ^ Entity: Peter Herlihy ^ ^uta Maya ^00^ I s u ^ Challenge ^ Brief Documents to unveil the real purpose of'Ruta Maya 2002 Isuzu Challenge".The convoywas commanded by Ben l^unAvihu, Israeli militar and Moshe Savir, geography expert and around 50 tourists in 40 Isuzu Jeep. Some communities linked the incursion with biopiracy.The terrain they explored is controled by the EZL^. ^ Entity: Ben NunAvihu Entity: Moshe Savir ^Entity: EZLN Corruption around F^BAPI^^A ^ Brief Documents related with the fi^ud and corruption around FOBAPROA (Fondo Bancario deProteccic^nal Ahorro). .^Entity:FOBAPROA^2 ^ Financial operations belore crisis ^ Documents of financial orierationsiust before the financial crisis ofl994 (some say the govemment knew before that the crisis was coming and took advantage ofthe information protecting their interests). ^ World Bank credit ^ Brief Documents related with the World Bank credit andapplication ofthe budgetto combat swine flu. ^Entity: World Bank ^ Renault program ^ Brief Documents related with the technology currently used in cellrihones in Mexico to imrilement the RENAUTprogram Information about the security technology used to protect data collected from users. ^ Plan Merida ^ Brief Documents related to the transparency ofPlan Merida

^^^e^
^ Arrangements with the Sudanese government ^ Brief Documents indicating arrangements with the Sudanese govemmentto grant land in Darfurto Arab settlers from Niger(Ciyilians and adminisrators on the gruond in Darfiir indicate this has been taking place).

^o^a^
^ Court case between Lyse^ele and Simonsen ^ Brief The secret verdict in the court case between the ISP LyseTele and the law firm Simonsen, decided the 5th ofMay 2009,where Simonsen demandedLyseTele disclose the identity information ofafile sharer suspected of uploadingacopy of the movie Max Manus to the file-sharing community. ^ Entity: LyseTele ^ Entity: Simonsei:!,^

00^^^^
http://wiki1eaksorg/wiki/Draft:The_Most_WantedLeaks_ot^2009 sort 5aturday,June01,2013 15:39:36 PM

Di^ft:TheMostWantedLeaksof20^^sort WikiLeaks

Page6of12

Poland
IPN Files ^ Brief IPN (Instytut Pami^cil^arodowej) is an organisation created fc^r investigation and gathering of informations regarding crimes against polish citizens in the timeline of^2 july 1944 to31decemberl989.Gathered documents are often related to politicans, highranked military,priests etcetera but for some reason are not available for anyone^ they are instead used as political weapon against one's enemies, revealing working as an agent for SB (Shi^ba Bezpieczenstwa) in the above timeline For two main reasons ALL data should be available FOR Al^YONE. First, it would no longer be used as political weapon: second, all people would know about past of all public people.Transparency is the key fcir healthy govemment. ^Entity: fPN ^Entity:^

Puerto ^ieo
^ FBI surveillance ofPuerto^cociti^ns ^ Brief The FBI has not yet finished declassifying afl tbe secret files related to surveillance ofPuerto Rican individuals and organizations from the I930 70'shtto://www.or secretfiles.net/index.html (not to mention, large sections of the files are blacked out by the FBI). In addition, there are thousands ofsecret files produced by Puerto Rican police that were only briefly made available to individuals themselves, and have now been closed off to the public.These documents provide evidence of quiteasignificant spying and intimidation operation by the United States and local police against leftists and independence movement leaders. ^Entity: FBI

Rwanda
^ Financial aid tor Laurant nkunda ^ Brief Documentation of financial assistance given by the Rwandan govemment to General Laurant l^kunda for operations in the DRC. ^ Entity: Laurent Nkunda

^nssi^
^ ^ Y A N crisis documentation ^ Brief: Documents related to the VRYAN crisis, especially political documents, analyses of intelligence, and specific steps taken. Information on the mindset of the Politburo, as well as intelligence services, and what exactly they feared, and how credible they believed their fear to be. Maps for Kremlin and military hideouts ^ Brief: Maps, floor plans, and blueprints ofMountYamantaw and Kosvinsky Mountain. Technology analysis ^ BriefTechnical plans, manuals, and blueprints forthe SS27SickleB(Topol-M),alongwith the Bulava. ^ Brief Documents relating to nuclear warplans ofthe Soviet Union and Russia. ^ Brief: Documents relating to orbital weapons systems, and whether the Soviets ever deployed them(or still deploy them) such as orbital FIANE devices. ^ Brief Alist and description of the various agents prepared by the various Soviet and Russian bioweapons programs. Indications of whether they developed recombinant DNA based agents, anci what those are specifically.Weaponization of agents, including reentry vehicle mounting. Doctrine for use, including deniable use.Vaccines and treatments for affected personneL

^lo^enia
^ Taped conversations between Slovenian opposition leader and Croatian PM ^ Brief Taped conversations between Slovenian opposition leader Janez Jansa and Croatian prime minister Ivo Sanader, recorded by Slovenian intelligence service SOVA. ^Date: Summer 2004 ^ Entity: Janez Jansa ^ Entity: Ivo Sanader ^Entity: SOVA

Sudan
^SalahGoshandtheCIA ^Date:2005 ^ Documents detailing discussions during 2005 meeting between Salah Gosh and the CIA (forwhich the CIA flew Gosh on private jet from Kfiartoum to CIA HO). See: http://www.sudantribune.com/articlc.php37id article^l0^05 ^ Mali case

00^^7^^^
http://wiki1eaksorg/wiki/Draft:The_Most_Wanted^Leaks_ot^2009 sort 5atti^day,June01,2013 15:39:36 PM

DraftiThe Most WantedLeaksof20t^^sot^

WikiLeaks

Page7ofl2

^ Brief Documents indicating arrangements with the Sudanese government to grant land in Darfiir to Arab settlers from Mali (Civilians and adminisrators on the gruond in Darfiir indicate this has been taking place). ^ Libya case ^ Brief Documents indicating arrangements with the Sudanese government to grant land in Darfiir to Arab settlers from Libya (Civilians and adminisrators on the gruond in Darfiir indicate this has been taking place). ^ Niger case ^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfiirto Arab settlers from ^iger(Civilians and adminisrators on the gruond in Darfur indicate this has been taking place).

^^t^iia
^ AssasinationofMehdiBenBarka ^ Brief All the documents related to the assasination, in 1965,ofMehdi Ben Barka still held in France, USA, Israel and Morocco. In 1976, thanks to the Freedom of information Act, the US govemement recognized that the CIA had aboutl800 classified documents about his assassination.Theses documents are still classified.

^w^t^et^Iand
^ Comu Report ^ Brief The fiill Comu Report. See http://en.wikipedia.org/wiki/Proiekt 26"^The Comu Report

^wa^ilan^
^ Eicpense accounts ofKing Mswati, the ^ueenMotlier and the Kings wives. ^ Memos from Ministry ofOefense or Police ^ Brief Intelligence memos from the Ministry ofDefence or Police about the pro-democracy organization, PtJDEMO. ^ Entity: Pudemo ^ Entity: Ministry ofDefense

T^rinidad andTobago
^ Commission of Enc^uiry reports ^ Brief The Report on the Commission ofEnquiry into the constmction of the new PiarcoAirport.This identified corrupt practices in the spending of public fiinds.The Commission's report was delivered in August 2003.Nearly6years later, its findings have not been made public. ^ Brief: Repciri ofthe findings ofthe current C^ciiiiiiii.^.^ici^ci^^^^iciB^iiilc^c^^/cic:ci/ ^ Entity: Commission Enouiry ^ Entity: Piarco airport ^ Cai^oni Bridge collapse ^ Brief The Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafewyear^ ago: again the public has not been made aware ofthe report's findings. ^Date:2ndAugust2008 ^ Waterfront development Project ^ Brief Acopy ofthe contract forthe billion-dollar Waterfront Development Project. ^Entity: ?udecott? ^ Scholarships sponsored by Ministry ofCulture ^ Brief List ofrecipients and amounts ofscholarships sponsored by ministry ofCulture for study abroad. ^ Entity: Ministry ofCulture ^ Detail: As far as Trinidad andTobago goes, our government tends to pay lip service to the principles of transparency and accountability.For instance, there isaFreedom ofinformation Actwhich, by law,allows the public to seek informationfi^omgovemment departments.But quite often, when such attempts are made by the citizenry,the govemment bars fiill disclosure. Depending on how importantapiece of information is to Joe Public, he may actually have to tum to the courts to "force" the govemment to reveal facts that sliould be disclosed voluntarily.Followingareafew examples of documents that should be made public, but have not been: ^ The Report on the Commission ofEnquiry into the constmction ofthe new Piarco Airport This identified corrupt practices in the spending of public funds.The Commission's reportwas delivered in August 2003.I^early6years later, its findings have not been made public. ^ The Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafew years ago: again the public has not been made aware ofthe report's findings.

00^^7^^^
http://wikileaks.org/wiki/Draft:The^Most_Wanted_Leaks_of^2009 sort

^
Sattirday,June01,2013 15:39:36 PM

Dt^ft:TheMostWantedLeaksof20^ sort WikiLeaks

Page^ofl2

^ The Opposition recently brought up in Parliament the issueoftaxpayers'money being used to pay attomeys by state.Although the public has aright to know how much of its fiinds were used in paying said attomeys, the Attomey General refiised to disclose the sums, saying it would be an invasion ofthe lawyers'privacy. ^ The same goes forarecent request in Parliament, whereby ^the Minister ofPlanning and Development was asked to produceacopy of the contract fcir the billiondollar Waterfront Development Projects The Minister's response was that she could not prciduce said contract for public discussion because there wasaconfidentiality clause contained therein(fc^raproject being built with public fiinds). ^ The Ministry of Culture recently awarded scholarships for students to study abroad-when asked in Parliament to disclose the list of recipients and the dollar value of the scholarships, the response was that this was private infcirmation.

Uganda
^ Ugandan profit-sharing agreements with oil companies in south-western Uganda ^ Brief: The govemment ofUganda has recently signedanumberofprofit-sharing agreements with several oil companies that are conducting explorations in southwestem Uganda. Releasing these documents would beamajor step in increased transparency with respect to the country's emerging oil industry.

united ^in^dotn
^ Censorship in UK ^ Brief: List of current and expiredDNotices ^ Entity: dnotice ^ Brief: secret gag orders, injunctions and legal threats sent to tJK newspapers Entity: legal contact addresses at the Guardian, Daily Mail,Times,lncJependent, Evening Standarcf, etc. ^ Brief Censorship list for the United Kingdom's "voluntary" filter system. Known to be held bvThe Internet Watch Foundation. Companies and their subsidiaries which are currently being supplied with the IWF list. Most ISP's in the UK haveacopy of the IP's on the list. ^ Entity:The Intemet Watch Foundation ^ Irac^ war planning ^ Brief The secret cabinet minutes and legal advice pertaining to the allegedly illegal war and ongoing occupation oflraq. ^ Roger mollis surveillance ^ Brief UK Govemment documentation into the investigation ofRoger Hollis, head ofMI5 between 1956 and 1965,including the repori by LordTrend, into the serious but apparently unproven allegations ofbeingaRussian Spy. ^Entity: M15 ^ Wythenshawe intelligence centre ^ Brief Documents detailing the information stored and collected bythe Wythenshawe intelligence centre.]^ ^ Police surveillance on climate change protestors ^ Brief Acopy ofthe police intelligence handed to E.OI^ about climate change protestors. 13] ^Entity:EON ^ MP expenses ^ Brief The fiill MP expenses data: how much theTelegraph paid forthem. ^ Entity: DailvTelegraph ^ Entity: UK Parliament ^ Allan Cappelow murder ^ Brief Documents revealing why the trial ofWangYam, who was convicted ofkilling Allan Chappelow, was held in camera, the first LfK murder trial ever heard behind closed doors without access by press or publicl4] ^ Nationalisation ofNorthem Rock and Bradford^Bringley ^ Brief The proper reasons fornationalisationofl^orthem Rock and Bradford^Bingley,and the subsequent sale of the latter's savings buisiness to Santander. ^ Brief Records of events during the twelve months leading up to the nationalisation ofBr^dfcird^Bingley. ^ Brief Information regarding the valuation process to determine compensation for fromer shareholdersofNorthem Rock and Bradford ^Bingley,that is, the information the independent valuer uses to determine the final value of the comapanies. ^Entity: B^B ^ Entity: Northem Rock ^ ^ B ^ S takeover ^ Brief Copies ofgovemment minutes ofmeetings between Gordon Brown anchor Alistair Darling and representatives ofLloyds Bank relating to the proposed takeover ofHBOS. ^ tnvestigation into Oaveport Lyons ^ Brief Documents from Solicitors RegulationAuthority's investigation into DavenportLyons threatening letters related to filesharing.

00^^7^^^
http://wiki1eaks.Org/wiki/Draft:The_Most Wanted Leaks_ot^2009 sort Satttf^day,June01,2013 15:39:36PM

Dt:aft:TheMostWantedLeaksof20^^ sort WikiLeaks

Page9ofl2

Ignited nations
^ Security Council and Oar^ur Brief Requests to the Security Council in 2003 that the Security Council look at what was happening in Darfur, and any notes of discussions leading to the decision not to look at the situation. ^Date:2003 ^ Entity: U ^ Security Council

^n^ted states
Important bulk databases ^ Intellipedia ^ Brief Classified intelligence community site as of11/1/^008, including article history. ^ opensource.gov ^ Brief: The complete CIA Open Source Center analytical database.The database is extensive, unclassified, non-public, but relatively accessible to certain outsiders afterjumping through hoops.Despite its name, you need to be govemment official to gain access to it. Entity: opensource.gov ^ Pacer database ^ Brief The completePACERdatabase.ThePACER database contains extensive US federal court records They are public documents, currently behindapaywalLSee http://arstechnica.com/techpolicy/news/2009/04/case-againstpacer.ars ^Entity: PACER Federal politics ^ ^ ^ ^ ^ ^ The missing five million Wbite House emails-^possibly no longer in existence. Chenney and Rumsfeld Archives The Wbite House visitor's list Minutes or notes for VP Cheney's Energy Conference. Thel141 pages of ACTAbackgrotmd documents not released to the EFF by the USTradeRepresentative(seel5]) Alist of all Wbitehouse and senior federal govemment employees holding dual citizenship and the countries they represent.

Military and intelligence ^TheSlOP .^OPLA^/CONPLAN 8022,2003 revision. ^OPLAN/CONPLAN 8044,2007revision ^ CIA detainee interrogation videos.While tbe CIA claims to have destroyed 92 ofthe videos, others are known to remain. ^ The US "Black Budget",from inception to present, with line items, hopefully annotated and explained. ^ Detainee abuse photos withheld by the Obama administration. ^ Wiretapping program led by NSA ^ Brief Correspondence between the National Security Agency and American telecom companies such asAT^T,Verizon, and ^west, regarding the warrantless wiretapping program. Correspondence involving telecoms who cooperated with the NSA(e.g.AT^T) may give different information than telecoms who refused(e.g.C^est), but both types would better shed light on tbe l^SA'sprogram.The existence ofthis correspondence is well documented in the media, for example that t^west's lawyers refiised to cooperate because the FISA Couri had not signed off on it. ^Entity: NSA ^ Entity: Owest ^Entity:AT^T ^ Entity: Verizon ^ Unredacted copy ofDept of Justice's Office oflnspectorGeneral's"AReyiew of the FBI'sActions Connection With Allegations Raised By Contract Linguist Sibel Edmonds" July I,2004(redacted version here bttp://www.wbezorg/F1LES/sibel.pdf) ^ Camp Delta(Guantanamo)Standard Operating Procedure ^005 2009. ^Iraq US Army Ru1esofEngagement^007 2009 (SECRET) ^ Unredacted Inouiry into theTreatmentofDetainees in US Custody,20 Nov 2008. ^ Memorandum between the CIA and the Department ofState detailing any constraints on Darfur policy caused by actual or anticipated Sudanese govemment cooperation on counter-terrorism, including CIA request to USUl^ that Salah Gosh be removed from the LJN Panel of Experts list ofthose recommended fcir sanction. See: http://www.sudantribune.coni/artic1e.plip37id artic1e^10205 ^ Department ofState and CIA contributions to tbe ObamaAdministration's20tJ9 Sudan Policy Review,inpariicularwithrespectto: a) Whether to support the ICC arrest warrant against Sudanese President Bashir:b)whether to takeaconfrontational or an appeasement approach to the Sudanese govemment on the issue ofDarfiir. ^ Camp Delta(Guantanamo)Standard Operating Procedure 2005 2009. ^ Camp Delta(Guantanamo)lnterrogation Standard Operating Procedure 2003-2009. ^ Correspondence between the National Security Agency and American telecom companies such asAT^T.Verizon,and C^est, regarding the warrantless wiretapping program.Correspondence involving telecoms who cooperated with the NSA(e.g.AT^T) may give different information than telecoms who refiised(e.g.t^est), but both types would better shed light on the NSA's program.The existence of this correspondence is well documented in the media, for example that t^west's lawyers refiised to cooperate because tbe FISA Couri had not

O^^l^^^^
http://wikiIeaks.org/wikiBDraft:TheMostWanted_Leaks_ot^2009 sort

^
Satttrday,June01,2013 15:39:36 PM

Di^ft:The Most Wanted Leaksof20t^^sort WikiLeaks

Pagel0c^fl2

^Iraq and Afhanistan US Army Rules ofEngagement 2007 2009 (SECRET). ^ClABDIA/NGA/NSAanalysesoftbe VRYAN crisisof1983. ^ Technical specifications ofthe KH-lland follow-on satellites with similar capabilities. ^ The contents ofthe Football,and how they changed overthe years during the c^iffi^rent Administrations. ^ What Pollard stole and gave to tbe Mossad, the fiill text. ^ US psychological profiles andpolitical analysesofSoviet leaders. ^ Documents relating to orbital weapons systems, and whether the US ever deployed them(or still deploy them) such as orbital HANE devices. ^ Infomnation about thePAN satellite and the agency responsible for it http://spaceflightnow.com/news/n0905/26milspace/ ^ Commander Directed Repori oflnvestigation Conceming an UnauthorizedTransferofNuclear Warheads Between Minot AFB,North Dakota andBarksdale AFB, Louisiana 30 August2007(S//FRD//MR) ^Investigation into tbe Shipment ofsensitive Missile Components to Taiwan (ADM Donald Report) 22 May 2008 (S//FRD//NOFOR^) ^ A i r ForceComprebensiveAssessmentofNuclearSustainment (CANS) July ^008(S//FRD//NOFOR^) ^ General Order Number One issued by commanders in Iraq and Afghanistan ^ Reports about Colombian'falsos positives' ^ Unredacted copy ofDept of Justice's Office oflnspectorGeneral's"AReview ofthe FBI'sActions Connection With Allegations Raised By Contract Linguist Sibel Edmonds" July 1.2004(redacted version here http://www.wbczorg/F1LES/sibel.pdf) ^ All secret annexes fcir, attachments to, unrecJacted versions of, and documents implicitly or explicitly referenced in the following documents, which may be partially available in unclassified form: ^ National Security Presidential Directiye51,"1^ational Continuity Policy",Mlay9,2007,also known as Homeland Security Presidential Directive 20 ^ Federal Preparedness Circular 65,"Federal Executive Branch Continuity ofOperations(COOP)",July 26,1999 ^FederalResponse Plan !^FEMA9230.1 PL], April 1999 ^ Presidential Decision Directive 67,"Endtn^g Constitutional Govemmentand Continuity of Govemment Operations",October 21,1998 ^ Presidential Decision Directive 63, "Critical Infrastructure Protection (CIP) ", May ^2, 1998 ^ Presidential Decision Directive 6^,""Protection Against Unconventional Threats to the Homeland and Americans Overseas"',May ^^,1998 ^^^Ci^.^ Federal Response Planning Guidance0194,"ContinuityofOperations(COOP)",December 4,1994 ^ ^B^^ational Security Directive 69,""Enduring Constitutional Govemment",June 2,1992 ^ ^^Ci5.^ Federal Preparedness Circu1ar61,"Emergency Succession to Key Positions ofthe Federal Departments and Agencies", August2,1991 ^ Federal Preparedness Circular 62,"Delegation of Authorities for Emergency Situations",August 1,1991 ^ Federal Preparedness Circular 60,"Continuity of the Executive Branch of the Federal Govemment at the Headquarters Level During national Security Emergencies",November 20,1990 ^ NationalSecurityDirectiye37,"EnduringConstitutiona1Govemment",April18,1990 ^ Executive Order 12656,"" Assignment ofEmergency Preparedness Responsibilities"',November18,1988 ^ Executive Order l^47^,"Assignment ofNational Security and Emergency PreparednessTelecommunications Functions"',April 3, 1984 ^/^.^^i^^^SDD 55, "EnduringNational Leadership" September 14, 1982 m Executive Order 12148, ""Federal Emergency Management"', July 20, 1979 ^ Alist of the actual facilities in the Federal Relocation Arc, as ofthe present time, along with their locations. ^ Blueprints, maps, and floorplans ofMWEOC. la Blueprints, maps, and floor plans ofSiteR(RavenRc^k). ^ Blueprints and floorplans ofall unmentioned facilities in the Federal Relocation Arc, including historical ones. Banking ^ The complete list ofidentities ofthe 52,000 wealthy American clients suspected ofhiding^15billion at tJBS to avoid taxes, including the names of any elected or appointed govemment or former government officials. ^ The complete details of Goldman, Sachs^Co.'s counterparty exposure to AIG prior to the Federal bailout of AIG in September, 2008. Environment ^ Monsanto's intemal evaluations ofGMO products including safety and pollen drift. Media ^ The Editorial Guidelines for Fox ^ews ^ Emails relating to suppressed G^ Magazine ariicle on Putin'sriseby ScottAnderson mentioned at ] ^ Religion ^ Mormons Church records ^ With recent leak of1999/2006 Church Handbook oflnstructions, pertinent documents and covertly photographed artifacts in the vault at Church Office building or subsidy in Salt Lake City,Utab which expose and negate Mormon Churcli's claim of divinity and its monopoly on "tmtb."l.e. the concealed remnants of diaries and letters written by former early Mormon apostle William McLellin 17]. McLellin diary and documents was the main point ofinterest for convicted double murderer/bomber Mark Hofmann's planned forgery attempt to deceive Mormon leaders to obtain in fraud by deception monetary reward to suppress truth ofearly Mormon history unfavorable to current Mormon religion. For more info. 18].

00^^^^^7
http://wikileaks.org/wiki/Draft:The_Most_Wanted Leaks of^2009 sort

^
Sattirday,June01,2013 15:39:36PM

Draft:The Most Wanted Leaks of 20o^-sort - WikiLeaks

Page 11 of 12

" Documents ofMormon Church's billion-dollar investment in City Creek Mall and Condominium in SLC, which may put Mormon Church's IRS tax-exempt status in jeopardy if there is verification of the allegation the Church used tithe and offering monetary contributions by the members to fiind the project under the umbrella of tax-exempted religious fi-eedom. Mormon Church leadership's involvement in politics, such as correspondence to ecclesiastical subordinates (bishopric) on policy and attitude towards same-sex civilrights& other sensitive issues relevant and conceming to the leaders. As well as recorded correspondences between Mormon members of Utah legislation and Church leaders on sensitive political issultalic texies for legislation purposes which may contravene the separation of church and state. Uncovered film or audio recording featuring the play with the actor portraying Protestant minister encouraged by Satan/Lucifer (portrayed by actor) to spread false doctrines to attack all religions outside ofMormon religion as "abominable" which was exhibited for qualified "temple recommend" audiences in all of the existing temples prior to removal in 1990 (almost like leaked Scientology orientation video) 9]. Unearthed secret audio or video recording inside Mormon temple with the temple members swearing "blood oath" before removal in 1990.110] " Documented Church leaders' and lay clergy's cover-up of physical/sexual abuse and rape of minors by missionaries and members without reporting to law enforcement in some cases 111]. Older editions of Church Handbooks of Instructionsfi-omthe first edition up (12] for comparison to recent leaked 1968 (truncated), 1999 and 2006 editions.

Vatican
Vatican secret archives Brief The Index ofthe Vatican Secret Archive. At present pre-screned scholars are allowed to see it but not copy it (under scholar mle '*16 http://asv.vatican.ya/en/fond/ainm.htm) Vatican's documents on nazi Germany Brief All documents pertaining to Nazi Germany and the Vatican, as well as those relating to the post-war rat line to Argentina. Refer to http://news.bbc.co.Uk/2/hi/europe/2611847.stm

International organizations
Bilderberg Group " Brief; Bilderberg Group meeting minutes, papers and annual reports of since 1954. WikiLeaks has some years already. Bilderberg is an annual off-the record conference of transatlantic political, economic and ideological agenda setters. As an historically important confidential document collection it is probably only equaled by Cabinet minutes and high level intelligence and diplomatic assessments. Leads: There are some older, previously unnoticed records in boxes at Uni of Illinois http://www.librarv.illinois.edU/archives/uasfa/1535051 pdf (1956-1970) the George Bush library, http://bush1ibrary.tamu.edu/research/finding aids/pdfs/08-0379-F.pdf and the Eisenhower Library in Kansas http://www.eisenhower.utexas.edu/Research/Finding Aids/PDFs/Jackson CD Records.pdf Entity: Bilderberg Group Alliance Base " Brief Documents regarding the founding and operation of Alliance Base. Retrieved from "http://www.wikileaks.0rg/wiki/Draft:The Most Wanted Leaks of 2009-sort"" Categories: Bulgaria | Czech Republic | Denmark | Estonia | France | Germany | Iceland | Italy | Latvia | Lithuania | Netherlands | Norway | Poland | Romania | Slovenia | Spain | Turkey | United Kingdom | Switzerland I Sweden | Malta | Portugal | Luxembourg | Finland | Belgium | Cvpms | Canada I Slovakia I United States
Views

Page discuss View source


Personal tools

Log in Main Page Country index Follow us I Go I I Search What links here Related changes Special pages

mws^8
http://wiki1eaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort

r:^^
Sattirday, June 01, 2013 15:39:36 PM

Draft:The Most Wanted Leaks of 20u, sort - WikiLeaks


Permanent link Flattr profile Follow us on Twitter Check our Reddit Digg this page Twitter this

Page 12 of 12

00527899
http://wikileaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort

^
Sattirday, June 01, 2013 15:39:36 PM

Prosecution Exhibit 111a 4 pages classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

UNITED STATESOF AMERICA STIPULATION OF EXPECTED TESTIMONY Mannings Bradley E^ PFC^U.S.Army^ HHC^ U.S. Army Garrisons JointBaseMyerHendersonHall FortMyer^Virginia 22211 LtCol (Retired^ Martin Nehring June201^

It is hereby agreed by the Accused, Delense Counsel, andTrial Counsel,that i f L t Col (Retired) Martin Nehring were present to testily during the merits and pre sentencing phases of this court martial, he would testily substantially as li:^IIows. 1. lamaretired Lieutenant Colonel in the United States Air Force. IhaveaBS in Petroleum Engineering Irom New Mexico Institute ofMining andTechnoIogy in 1982. Ireceiveda Masters ofPublic Administration IromTroy University in 1995. Ibegan serving on active duty in the United States Air Force in 1985 asasecond lieutenant. During my career,Ispent 12 years on active duty andl6years in the Calift^mia Air National Guard. Iretiredin2012. Ideployed to I^uwait in 2001 with theThird Army. lalso deployed to Kosovo in 2002 li:^r weather operations. In 2006,ldeployed to Alghanistan and ran all weather operations in Alghanistan. Throughout my career in the Air Force asatrainedmeteorologist,IpossessedaTOP SECRET clearance and handled TOP SECRET information. Ihandled classilied inlormation at the beginning ofmy service in 1985 and had training in how to handle and identily classilied inlormation. Iworked with classiljedinftormation at all times during my military career. 2. From2009to Febmary 2012,lworkedatUnitedStates Central Command (USCENTCOM). Iworked inaSensitive Compartmented InformationFacility (SCIF) at USCENTCOM. Initially, Iworked at the weather desk. After USCENTCOM discontinued the weather desk,Iwas reassigned underthe USCENTCOM Directorate ofOperations (J3)astheJ3 subject matter expert (SME)ftoridentilyingJ3classified equities within United States Govemment official documentation. In this capacity,Iwas primarily responsiblefor reviewing documents being processed under the Freedom oflnftormationAct (FOIA) which belonged to or contained information Irom USCENTCOM J3. For FOIA requests,Ireviewed the requested information for classilied information to determine whether the document could be released under the FOIA. Additionally,Iconducted review forrelease ofinformation to family members ofService Members who were kiIIed,wounded, or kidnapped within the USCENTCOM theaters of operations and the media, lalso conducted separate reviews for coalition partners because the standards were different for each. Family members and the media could only receive unclassilied information. Coalition partners could receive certain classilied information. Classilied inlormation inadocument could not be released under the FOIA even if the remainder ofthe document contained publicly available information because the information is still protected. 3 InmycapacityastheJ3SME,Irevieweddocumentstoertainin^toUnitedStatesvPrivate First Class Bradley Manning, which the prosecution provided to USCENTCOM. The documents provided by the prosecution(submitteddocuments)incIuded, among others, documents Irom the PROSECUTlONEXHlBIT^^ftorident^atio^ 1 PAGEOFFERED: PAGEADMIT^D: P A G E l O F ^ PAGES

Combined Information Data Network Exchange Iraq(CIDNEl), the Combined Information Data Network Exchange Alghanistan(ClDNEA), other documents related to the AR 156 investigation ofthe Farah incident, andalile named ^^BE22PAX.zip^^containingavideo named ^^BE22PAXwmv^^(Gharani video) 4. Iwas tasked though the J3TaskManagementTooL Ireceived the submitted documents li^om theUSCENTCOMJAGoflice. My assignment required me to determine whether the submitted documents contained classilied information at the time they were compromised. Ireviewed the documents for classilied USCENTCOM J3 equities. 5. Todetermine whether submitted documents were classilied at the time of compromise,lused three classilication guides. lusedaUSCENTCOM classilication guide dated before OPERATION IRAOIFREEDOM, the updated version ofthat USCENTCOM classilication guidedatedduringOPERATIONIRAOIFREEDOM, andthe version ofthe USCENTCOM classilication guide that was current at the timelconducted the classilication review.Idid not consider the following in making any determination:(l)what, if any,ofthis material was included in open source reporting, (2)what, if any,ofthis material was available in unclassilied publications(e.g. Army Regulations or Field Manuals), and (3)what, if any,ofthis material may have been shared at the tactical level during the key leader engagements described below. 6. lappliedaprocess-oriented approach toward applying the classilication guide to each ofthe submitted documents. First,IwouId determine the date ofthe document and use the classilication guide appropriate for each document^sdate. Iwould determine the document's classilication at the time the document was created. Documentsldetermined that were unclassilied were removed Irom the collection of submitted documents. lnfact,lapproachedthe documents witha^^FOIAmindset^^ and tried to ensure each document was not actually classilied. Idid not presume any document was classilied and reviewed each line in each document for classilied inlormation. 7. Second,Ireviewed the document to determine i f i t was classilied at the time ofit was compromised according to the appropriate security classilication guides. Ireviewed documents for USCENTCOM J3 equities. Documents containing intelligence were sent to Mr.Louis Travieso for fiirther review for USCENTCOM J2 equities. Iconductedaline by line review and reviewed each document for USCENTCOM J3 equities by applying specific paragraphs ofthe classilication guide(s)lrom the appropriate time period. Where the reviewed document contained USCENTCOM J3 equities as determined by the appropriate USCENTCOM classilication guide,lmarked the document as containing informationlbelieved to be sensitive and classilied. lannotatedthe basis for each classilication decision in my swom declaration dated 190ctober 2011,which is BATES numbers: 00527370 00527377 Prosecution E^hihit ( P E ) ^ f o r Identification is my declaration. All documents noted in the declaration contained classilication markings at the SECRET level (hereinafter ^ ^ J 3 reviewed documents^^). 8. The J3 reviewed documents consisted of documents collected Irom CIDNE I,CIDNE-A, other documents related to the Farah investigation, and the Gharani video. The reviewed documents contained military information, to include militaryplans,weapons systems, or operations: foreign govemment inlormation: signilicant activity reports (SIGACTs)^ operational code words when identilied with mission operations: SIGACTsrelated to lact of and general type oflED attack at specific location on specific date^ participating units, including types of

vulnerabilities, locations, quantities, readiness status, deployments, redeployments, and details of movements ofUS friendly forces: concept of operations(CONOPS), operation orders(OPORD), or Iragmentary orders (FRAGOs)^ vulnerabilities or capabilities of systems, installations, inlrastructures, projects, plans, or protection services relating to national security: and limitations and vulnerabilities ofUS forces in combat area. 9. CIDNEIand ClDNEAcontainedSIGACT reports The SIGACTsweremarkedas SECRET. Within the SIGACTs, several categories appeared multiple times. These categories include key leader engagements, mission report logs, reports on improvised explosive devices (lEDs)and tactics, techniques, and procedures (TTPs)in response to lEDs, and reports and responses formissions focused on duty status^whereaboutsunknown (DUSTWUN). 10. ^ey leader engagements described interactions ofmembers ofthe military with local leaders in Iraq and Alghanistan regardingabroad range oftopics. Disclosure ofthe key leader engagements would reveal foreign govemment activities, the involvement ofServicemembers with local foreign leaders, and the identities oflocal leaders. 11. Mission report logs described troop movements, activities, and engagements with hostile forces. The mission report logs describe tactics, troop Iocations,weapons and military equipment used. 12. lED reports detailed the casualties inflicted on Servicemembers, the locations ofthe attacks, and TTPs for detecting and responding to lEDaftacks. The lED reports recount the attacks of hostile forces, troop locations, and the capabilities ofUnited States forces. 13. DUSTWUN reports stated the names and other personal information ofkidnapped Servicemembers and theTTPs in response to locate the kidnapped Servicemember. The DUSTWUN reports state troop locations, tactics, encounters by military forces with hostile forces and foreign nationals. 14. The 53 CIDNEIreports that contained J3 equities are located in Appellate Exhihit(AE) ^01 andthathavethe BATES numbers: 00377912 00377918,00377921 0377933,00377935 00337938,00377940 00377949,00377952 00377958,00377960 00377963,00377965 00377980, 00377983 00377986, 00377988 00378013, and00378016 00378026 TheseCIDNE1 reports are contained within PE^^I^or ID. The 36 CIDNEAreports that contained J3 equities are locatedinAE^^l and thathave the BATES numbers: 00377846 00377846,00377849 00377856, 00377860 00377871, 00377874 00377883, 00377886-00377905, and 0037790700377910 TheseCIDNEAreportsarecontainedwithinPE^for ID 15. The J3 reviewed documents contain SIGACT reports from ClDNE-lthatldetermined contained classilied information according to the applicable security classilication guides. These SIGACT reports li^omCIDNElwere all marked ^^SECRETBAdditionally,theJ3 reviewed documents contain SIGACT reports Irom CIDNEAthatldetermined contained classilied information according to the applicable security classilication guides. These SIGACT reports li^omCIDNEIandClDNEAwereall marked ^^SECRETBTheJ3 reviewed documents within PE^Ior ID and PE^for ID contain multipleformsofmilitary information, to include but not limited to the following: (l)threat of attack in an area byaspecilic group: (2) conlirmedthata previously reliable sotirceofintelligence provided information: (3)involved direct and indirect

lire reports:(4) reported casualties:(5) reported loss of equipment:(6) stated types ofweapons encountered in an enemy engagement: (7) reported the eflectiveness oflED attacks: (8)reported the locations oflED attacks: (9) identiliedlED TTPs forresponding to lEDaftacks^(lO) identified TTPs for identilying and neutralizing IEDs:(ll)identilied by name suspects in investigations:(12)identified quick response force mobilization TTPs:(13)identified code words^(14) involved Iriendly action reports:(15) stated details of military missions^(16) named multiple enemy groups:(17) reported lack of casualties:(18)reported lack ofloss of equipments (19)identilied general enemyTTPs: (20) involved an enemy small arms fire report: (21) identified enemy target by name: (22)stated eflectiveness of enemy actions: (23)describeda military raid: (24) identified sources and methods ofintelligence collection: (25) identified responses based on intelligence gathered: (26) detailed arrest ofasuspect: (27) stated detention ofasuspect would haveasignilicant impact on military operations^ (28) described Iriendly action of linding and clearing caches: (29) involvedaborder operations report: (30)describeda civil disturbance: (31)identilied unit locations: (32)reported enemy casualties: (33)stated planned unit movements (34) stated details ofcombat patrols^ (35) described key leader engagement: (36) assessed eflectiveness oflocal outreach programs: (37) detailed kidnapping of aServicemember: and (38) described initiation ofDUSTWUN procedures. 16. Additionally,lreviewed documents Irom the AR 15-6 investigation intoamilitary operation that occurred in Farah province, Alghanistan on or about4May 2009. TheAR15-6 Investigation into the Farah incident was focused on investigating the circumstances surrounding alargescale civilian casualties(CIVCAS) incident. The incident occurred in Gharani,which is avillageinFarah Province, Alghanistan. The documents from the AR156investigation that contained J3 equities are located in A E ^ ^ l and that have the BATES numbers: 0037742500377492, 00377496 00377498, 00377627 00377637,00377674-00377675,and 00378029 00378081. These documents are contained within PE^l^or ID As noted in P E ^ ^ o r l D I found that these documents contained informationlbelieved to be sensitive classified because they reveal operational activities,weapons systems, and code words. 17. As part of my review of the Farah documents,lreviewedafile named ^^BE22PAX.zip^^ containingavideo named ^^BE22PAX.wmv^^ (hereinafter ^^Gharanivideo^^). P E l ^ f o r l D i s a CD that contains both lileslreviewed. The Gharani video depicts portions ofamilitary operation in the Farah Province, Afghanistan. The Gharani video reveals operational code words associated with the mission. The video also reveals operational activities including troop movements and weapons systems. Finally,the video includes specific information contained on the heads up display. 18. After my review ofthe above relerenced documents for USCENTCOM J3 equities,! forwarded my conclusions and recommendations to Deputy Commander, USCENTCOM an Original Classilication Authority for his final determination as to whether the information is properly classified.

Kvv'zKr
ALEXANDER VON ELTEN CPT, JA Assistant Trial Counsel

^(urviA^

l^v^^M^ BRADL'EY E. MANNING PFC, USA Accused

THOMAS F. HURLEY MAJ, JA Military Defense Counsel

UNITED STATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Mannings Bradley E. PFC^U.S.Army^ HHC^ U S Army Garrisons JointBaseMyerHendersonHall FortMyer^Virginia 22211 Ms. DehraVan Alstyne :^June2^13

!t is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifMs. DebraVan Alstyne were present to testify during the merits phase ofthis courtmartial,she would testily substantially as follows: 1. lam the Aunt ofPFC Bradley E. Manning. Brad came to live with my lamily in the summer of2006. Brad uses my home as his homeofrecord and spends his leave and holidays with us. When Brad came back li^om Iraq for his midtour leave in January of2010, he stayed with us at my house. Brad came home on Sunday,the24thofJanuary. On the night ofthe 25th ofJanuary he went to Boston to visit his Iriends. Brad retumed from Boston on Monday,the 1st of February and came back to stay with us fbr the remainder ofhis time. When Brad retumed,we got hit withabig snow storm on Friday night, the 5th ofFebmary,so we ended up not doing very much otherthan playing board games. Afterthe snow storm, we were without power until Sunday,the7thofFebmary. Irecall Brad leaving during this time by walking out to the main road and telling me thatafi^iend was going to pick him up.Ido not know where he went, as it was not my usual practice to ask him where he was going. Brad left for Iraq on the moming of the9thofFebmary. 2. On November 2nd, 2010, Special Agent (SA)Mark Mander searched my house in connection with this case. Iwillingly consented to this search. Prior to the search,Iidentilied items belonging to Brad and allowed SA Mander to search Brad^sroom in the basement. lalso identified Brad^spossessions and several boxes that contained Brad^spossessions. These boxes and the surrounding area only contained Brad^spossessions. One ofthe boxes wasabox that Brad had sent to me in April of2010lTom Iraq. The box contained two soft cover books, two MarylandT-shirts and one FOB Hammer IraqTshirt. After SA Mander finished his search, he set asideanumberofitems on Brad^sbed and asked me whether any ofthe items belonged to me or anyone else, and not Brad, lidentilied all the items as belonging to Brad. lam familiar with the items that were collected by SA Mander. He collected several ofBrad^spersonal items like books, packages, and digital media. 3. SA Mander, SA JohnWilbur, SA Ronald Rock, and SAEzioVeloso came to interview me on Junel8th,2010. The agents asked me several questions. One ofthe agents asked me about how Brad felt about the Army. Based upon our discussions,!knew that Brad was proud ofhis ^ob and ofbeing in the Army. However, Brad seemed to be very quiet when he retumed Irom Iraq for his mid tour leave. He also seemed depressed to me. The agents also asked me about the various email accounts thatlhad used overthe years and that Brad had used overthe years PROSECUTION EXHIBIT^^foride^fication PAGEOFFERED: PAGEADMITTED: PA08^ OF^PAGES

and his Facebook account. lam familiar with Brad^semail accounts. The account names that Brad used in communications with me are ^^bradley.e.manning^gmail.com^^ and ^^brad405(^earthlink.net^^. lalso told the agents the Ijvediflerent email addresses thatlhad used with Brad overthe years. Most ofthose email addresses were either Gmail or EarthLink addresses, lam also lamiliar with Brad^sFacebook account, aslfollowed Brad onFacebook and also postedamessage to hisFacebook page on his request after his arrest. Brad called me Irom Kuwait after his arrest. During our conversation, he asked me iflhad seen the apache helicopter video. Whenlsaid thatlhad not. Brad asked me to doasearch for ^^Collateral Murder.^^ Brad believed the video was going to be ^^bignews^^ and that it would makea^^big splash^^ in America. As part ofthis conversation, Brad asked me to postamessage to his Facebook account to let others know that he was alive and why he was arrested. Ipostedthe following message for Brad: ^^Someofyou may have heard thatlhave been arrested fbr disclosure ofclassilred information to unauthorized persons See http://colIateraImurder.com/.^^ 4. Irecognize the picture marked as Prosecution Exhibit (PE) 40 for Identilication. PE4^ for ID isapictureofBrad in his room oftaken while he was on his midtour leave. Iknowthis because the picture captures how Brad and his room looked around that time period.

V_x

.^(WVI/lY^ J-

ASHDEN FEIN MAJ, JA Trial Counsel

THOMAS F. HURLEY ^ MAJ, JA Military Defense Counsel

BRADfOY E. MANiffl PFC, USA Accused

UNITEDSTATESOF AMERICA
V.

STIPULATION OF EXPECTED TESTIMONY Mr. Wyatt Bora jOiJune 2013

Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that ifMr. Wyatt Bora were present to testily during the merits and pre-sentencing phases of this courtmartial, he would testily substantially as follows. 1. I am a retired Captain in the United States Air Force. I served on active duty from 1987 to 2008. I have a BS in Computer Engineering from the University of New Hampshire in 1999. I have a Masters in Computer Engineering from Rensselaer Polytechnic Institute in 2004. In the Air Force, I primarily worked as a computer engineer and a manager of other computer engineers. I also wrote computer code and created technical software solutions. I created interactive lab displays with speech control. I managed air operations system tests and development for command and control of the Air Operations Center. I also worked as a systems engineer on large information technology (IT) systems designed to manage financial transactions. As a systems engineer, I planned IT system architecture to ensure the system worked together, managed requirements and costs, and scheduled performance tests. 2. After retiring from active duty in 2008,1 began working at the Air Force Research Lab in Rome, New York, as a civilian working on acquisition of command and control IT. At the Air Force Research Lab, I managed other IT programs with a focus on command and control applications at the operational level. 3. In January 2012,1 became the Program Manager (PM) for the Combined Information Database Network Exchange (CIDNE) program. As the PM for CIDNE, I am responsible for the day-to-day management of the entire program. I am responsible for finances, to include projecting budgetary requirements and meeting the program's budget. I am also responsible for ensuring that customer needs are met. Customers submit change requests that request the addition of a fiinction or a change to current fiinctionality. I make sure customer functionality needs are met. Customers also submit problem reports that note bugs and flaws in the system. I make sure that these bugs and flaws are corrected. 4. CIDNE is a reporting and querying system. CIDNE links operations information with intelligence information and breaks the traditional stovepipe separating the two types of information. In particular, the system linking intelligence and operations systems breaks down stovepipes between the 2 (intelligence), 3 (operations), and 5 (planning) shops. This linkage of operations information and intelligence information has been designed to provide commanders with fiiller, more accurate information on which to base command decisions, particularly in the field.

y<^^
PROSECUTION EXHIBIT ))< for identification PAGE ADMITTED: PAGE OFFERED: PAGE ^ O F ^ PAGES

5. CIDNE isadirectreporting system forthe United States Central Command (USCENTCOM) and is used by USCENTCOM and its subordinate commands. In September 2007, USCENTCOM issuedFRAGO09 1290todirectalI units to useCIDNEforreport creation As areporting system, CIDNE allows users to enter information intoareport. Thereare approximately 130 types ofCIDNE reports. Some ofthe 130 types ofCIDNE reports are Human Intelligence (HUMINT) reports, HumanTerrain reports. Counter IED(CIED)reports, Targeting reports, Socio Cultural reports. Civil Affairs reports. Psychological Operations (PSYOP) reports, and Significant Activity (SIGACT) reports. One ofthe reports frequently used by Servicemembers in the field is the SIGACT reports. ASIGACTisareport created by aServicemember at the completion ofamission. The SIGACT is input into CIDNE for use by the unit that completed the mission and any other unit with authorized access to CIDNE. Ofthe approximately 130 types ofreports, the SIGACT is the most commonly used report on CIDNE. SIGACTsconstitute approximately 24^ of all reports created, depending on the reporting period. 6. For SlGACTsand other reports, CIDNE requires completeness. CIDNE has automatic quality assurance built into the database, andauser cannot completeareport without entering information into specified fields. AdditionalIy,CIDNE has manual quality control because most reports are reviewed for completeness by people engaged in quality assurance. The quality control mechanisms ensure that the reports contain sufficient inlormation for future use. Furthermore, CIDNE reports are marked according to their classification, including unclassified, confidential, and secret. 7. CIDNE is alsoaquerying system because authorized users can search the database for previous reports. Auser can search by keywords, to include terms and topics, dates, and locations. This querying system allows users to see and use any report in the CIDNE system. CIDNE uses database administrators. In 2009-10, these administrators were onsite,which means they must be present at the physical location of servers, to include Iraq, Alghanistan, and Tampa, Florida. CIDNE isacomplex system with millions oflineofprogramming code due to the volume ofdata. In particular, creating the stmcture to make the data retrievable(searchable) requires significant resources. The program has continually employed approximately 20 30 or more programmers to develop, maintain, and debug the code for CIDNE so that the database may maintain all the different reports, including SIGACTS fbr use on classified networks. In 2007,the program spent approximately ^900,000 on data management in Iraq. In 2008, the program spent approximately^l,000,000 on data management in Iraq. In 2009,the program spent approximately ^4,200,000 on data management in Afghanistan and^l,800,000 on data management in Iraq. In 2010, the program spent approximately ^3,600,000 on data management in Alghanistan. In 2011, the program spent approximately ^3,000,000 on data management in Afghanistan and ^570,0000on data management in Iraq. In 2012, the program spent approximately ^5,000,000 on data management in Alghanistan. These data management costs are directly associated with keeping the data useable on the classified networks. Ido not know the data management costs for Iraq fbr 2005,2006, 2010, and 2012,andldo not know the data management costs for Alghanistan for 2005. 8. CIDNE has undergone constant development in its existence to improve its fiinctionality. CIDNE is currently being developed to save costs by changing its configuration to permit

changes to reports withoutadeveloper'sintervention at the physical location ofthe user. Responses to change requests require new code to be added. Depending on the nature ofthe change request,which range from addinganew field to an existing report to creating an entirely new report, coding development can take anywhere from5to several hundred hours. These developments require research and incur significant costs. In 2005, the program spent approximately^!,100,000 for development and testing in Iraq and^l,800,000 in development and testing in the Continental United States(CONUS). In 2006, the program spent approximately^l,770,000 for development and testing in Iraq and ^790,000 in development and testing in CONUS. In 2007,the program spent approximately^l,320,000 for development and testing in Iraq and^l,810,000 in development and testing in CONUS. In 2008,the program spent approximately ^950,000 for development and testing in Afghanistan, ^2,690,000 for development and testing in Iraq, and ^3,610,000 in development and testing in CONUS. In 2009,the program spent approximately ^2,760,000 for development and testing in Afghanistan, ^3,280,000 for development and testing in Iraq, and ^5,500,000 in development and testing in CONUS. In 2010, the program spent approximately ^4,200,000 for development and testing in Alghanistan, ^2,650,000 for development and testing in Iraq, and ^4,980,000 in development and testing in CONUS. 9. Togain access to CIDNE,auser first needs to be authorized to access an IT system. Second, auser needs to be authorized to useanetwork domain authorized to host CIDNE. CIDNE and SIGACTswithin CIDNE are only available on classified networks. All classified domains on which CIDNE exists requireasecurity clearance to access. FinaIIy,auser must be authorized to access the database. Auser can obtain access only ifhe hasasecurity clearance andaneed to know the information accessible on CIDNE. By delault, CIDNE is read only. Auser must apply for permission to be granted the ability to create reports on CIDNE. 10. CIDNE currentlyuses 12 Centrixserversand9SIPRNET servers During2009 10, CIDNE used additional servers. Each server costs approximately ^48,000. Servers hosting CIDNE-Iraq were hosted in Iraq. CIDNE-Alghanistan servers were and are located in Alghanistan. Some servers were and are located in Tampa, Florida. In 2007,the program spent approximately ^720,000 on hardware in Iraq. In 2008, the program spent ^560,000 on hardware in Afghanistan and^l90,000 on hardware in Iraq. In 2009,the program spent approximately^l,660,000 on hardware in Afghanistan and ^520,000 on hardware in Iraq. In 2010, the program spent ^760,000 on hardware in Alghanistan. In 2011,theprogram approximately spent^l80,000 on hardware in Afghanistan. In 2012, the program spent approximately ^3,680,000 on hardware in Afghanistan. 11. Before units depIoy,they receive training. As PM,Iam responsible fbr ensuring the proper resources are in place to support the various training courses olfered for CIDNE. The courses range fromldayto2weeks. In addition, there isathree week advanced course. Also, units conducting exercises utilize CIDNE as part ofthat training, and the program supports the needs ofthe units. In 2005,the program spent approximately^!,100,000 for Iraq training. In 2006, the program spent approximately^!,180,000 for Iraq training and ^480,000 for CONUS training. In2007,theprogramspentapproximately^2,570,000 for Iraq training and^200,000forCONUS training. In 2008,the program spent approximately^!,850,000 for Alghanistan training, ^5,220,000 for Iraq training, and^!,550,000forCONUS training In2009,theprogram spent

approximately ^5,360,000 fbr Alghanistan training, ^6,370,000 for Iraq training, and ^3,660,000 for CONUS training. In 2010, the program spent approximately ^8,140,000.00 for Alghanistan training, ^5,150,000 for Iraq training, and^3,320,000forCONUS training In20!!,the program spent approximately^!8,4!0,000 for Afghanistan training, ^2,650,000 for Iraq training, and^6,!50,000 forCONUS training In20!2,theprogramspentapproximately ^8,790,000 for Afghanistan training and^2,740,000forCONUS training 12. Icannot aftributeaspecific amount ofthe costs fbr data management, development and testing, hardware, and training to any specific report. None ofthese costs include operational unit costs. 13. From2005 through20!2,theCIDNE program spentapproximately^!8!,!60,000on contracted support required to mn the program, to include development, training, data management, and hardware. In addition, Irom 2005 through 2012, the program spent approximately ^5,434,800.00 on program management support, to include govemment testing, administrative oversight, and research and development. These costs support the development and maintenanceofCIDNE,which is an information system. The hardware, to include the servers, involves significant costs. Over 25 individuals work primarily to ensure CIDNE fiinctionscorrectly,and their salaries are primarily derived Irom their work on CIDNE. The system has been designed and developed to provide robust features to provide classified information to commanders in combat environments. The information is valuable because the system accumulates different types ofinformation in one place for authorized officials to access and review. The United States govemment has dedicated significant resourcesover ^185,000,000^to CIDNE because the information has significant value to commanders. Year to year increases in spending can be attributable to increased troop presence inagiven nation. CIDNE has been designed to aid commanders in making operational decisions, and safety of operations decisions in particular, based on CIDNE data. 14. At no time was the SIGACT information charged in this case unavailable for access on the CIDNE database. Those that accessed the SIGACTdatabase before May of2010did so in the same manner after May of2010. WecontinuetousetheSIGACTschargedinthiscaseinthe CIDNE database. Tothe best ofmy knowledge, the United States Govemment has never made these databases publically available.

kvxthALEXANDER VON ELTEN CPT, JA Assistant Trial Counsel THOMAS F. HURLEY MAJ, JA Military Defense Counsel BRADL PFC, USA Accused

UNITED STATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Manning, Bradley E. PFCU.S.Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall FortMyer,Virginia 22211 Mr^PatrickHoeffel ^^Jt^ne2013

It is hereby agreed by the Accused, Delense Counsel, andTrial Counsel, that ifMr. Patrick Hoeflel were present to testily during the merits and presentencing phases ofthis courtmartial, he would testily substantially as follows. 1. lamasoftware engineer at Intelligent Software Solutions, Inc.,Colorado Springs, Colorado. Idesign and write software systems, such as the Combined Information Data Network Exchange (CIDNE) database, and manage eight other individuals who also write software code for CIDNE. In 1989,Ieamed my Bachelor ofScience degree in Computer Science li^om Catholic University inWashington,DC. During the timeIwasaftendingschool,Iworked Irom 1987 tol989 in the school computer lab as student help desk support. Also, in 1989,Iworkedforarent control apartment management company writing software. From 1989 tol997,Iworked in Columbus, Ohio, asasoftware engineer foracompany called Compuserve,which was bought by America Online(AOL). From 1997 to 1998,IadditionalIy worked asaconsultant for Compuware, contracted to MCI, which is now Verizon. 2. In 2000,Ireceived 80 hours of course instmction on the Design and Maintenance of StmcturedOttery Language (SOL)Server Databases and Systems. This instmction provided foundational knowledge fbr my work asasoftware and database engineer. From 1998 tol999,I worked at software startup company calledTribalVoice. AtTribaIVoice,Iwasasoftware engineer. 3. From 1999 to 2006,Iworkedatasoftware startup company called ConfigureSoft, in Colorado Springs, Colorado. Iworked at ConfigureSoft asasoftware engineer with an emphasis on the design of database systems. lalso designed databases and software systems to be used by systems administrators. Asadatabase and software designer,Ibecame familiar with systems administration. 4. lhave worked at Intelligent Software Solutions, Inc.since September 2006. During my time at Intelligent Software Solutions,Ihave spent two years as the lead CIDNE engineer in theater and at corporate headquarters. lhave been responsible fbr the management of daytoday CIDNE engineering operations. lhave managed approximately 20 individuals that range Irom software engineers, to database engineers, testers, and system administrators. 5. lhave no military experience, butlhave deployed asacontractor with Intelligent Software Solutions, Inc. Ideployed to Victory Base Complex (VBC), Iraq Irom September 2007 to December 2007 asasoftware engineer working on the CIDNE database. Ideployed again from

^^^^

^^^^^^^^^^^1^^^^^^^^^^^ PAGE^ OF^ P^GES

May 2009 to September 2009 to the VBC, Iraq,working asasoftware engineer on the CIDNE database. From May 2010to August 2010,ldeployed to I^abul, Alghanistan asatheater technical lead working on the CIDNE database. Ilast deployed Irom May 2011to September 2011to^abul, Afghanistan asatheater technical lead working on the CIDNE database. lhave over 25 years ofcomputer science expertise developed through courses and experience. 6. lam familiar with the CIDNE software and the database in particular becauseldeveloped the database. CIDNE isacentralized database that stores information about events, people, organizations, and lacilities, and makes that information available to users throughout Iraq, Alghanistan, and the United States. There are diflerent CIDNE databases for Iraq and Alghanistan. The Iraq server at United States Central Command (USCENTCOM) Headquarters (HO) is physically distinct Irom the Alghanistan server. The two do not share data with each other. The Iraq data is stored inaseries of servers that are positioned at various locations in Iraq, with all data being constantly copied back toaCIDNE-Iraq server at USCENTCOM HO itt Tampa, Florida, for use by interested entities. All data is the same across all Iraq servers. Alghanistan data is stored inaseries of servers that are positioned at various locations in Alghanistan, with all data copied back toaClDNE-Alghanistan server in Tampa. This setup was created to make data available as broadly as possible. 7. CIDNE can be accessed through one ofthe seven diflerent classified networks, including SIPRNET andJWICS CIDNE isonly availableon classifiednetworksCIDNEdata is accessed usingaCIDNE web site. Tosee Alghanistan data, one must openaCIDNEAweb page onaCIDNE-Alghanistan server. Likewise, Iraq data must be accessed viaaCIDNE-I server throughaCIDNEIweb site. During the 2009 2010timeft^ame one could accessa database by logging in as selfregistered or asaguest user to browse. Asoftoday,capabiIities were developed to see who views data and an enhanced log-in system was designed for access to the CIDNE database. One can no longer browse the database without logging in asasellregistereduser. Priorto the recent log-in requirements, the CIDNE databases did not track individual users'access by IP address or otherwise. 8. CIDNE reports are individual reports ofspecific unit actions. CIDNE is the USCENTCOM directed reporting tool for the majority ofoperational reporting in Iraq and Alghanistan. It isa stmctured collection ofdata with over 100 diflerent types ofreports, including Significant Activity reports(SIGACTs). SIGACTsare only one report type in CIDNE, but it is one of the most frequently used type ofreport along with Human Intelligence (HUMINT) and Counter-IED (CIED)reports. SIGACTsare often used because oftheir content. SIGACTsare summaries of actual events created at the time ofthose events. Thereports state the who,what,when, and where ofevents encountered by the unit. 9. Auser can createareport only if the user'sunit administrator grants the authority to populate reports on the system. Any userwith access to CIDNE onaclassified network could browse the information. During the 2009-2010timelrame, the CIDNE database did not record who looked at the data. Instead, CIDNE only recorded who was creating reports and what types ofreports were being created. As the theater technical lead in Alghanistan,Ilrequently worked with users who created reports and the types ofreports the users created. CIDNE requires reports have certain fields completed. The database will not acceptareport unless the required fields are

completed. Classification isamandatory field with unclassified, confidential, and secret as the options. Thus, all reports, including all SIGACTs, are marked withaclassification. Oncea report is entered into CIDNE, the database assignsaunique value calleda^^report key''that is used by the database to identity^ individual reports and allows the user to quickly query the database. 10. In August 2010,Iwas tasked to participate in the Information ReviewTaskForce(IRTF) at the Delense Intelligence Agency (DIA) based on my CIDNE expertise. My original task was to verily and confirm that the compromised data came Irom the CIDNEAdatabase, and laterlalso was tasked to review the CIDNE-I database. Asapart ofthe IRTF,Iidentified the source ofthe compromised data, the time frame in which the data was taken based on examination ofthe released data, and data in the source database. Using computer software,Icompared the compromised CIDNEAreport keys to the report keys in the original database. Based on my comparison,IconcIuded the hundreds ofthousands of compromised report keys and the original report keys on the CIDNE-A database were identicak Ispent about two weeks on the IRTF initially. Iretumed to the IRTF in November 2010after the CIDNE-I database was released. I repeated the comparison procedures for CIDNEI. Using computer software,Icompared the compromised CIDNEIreport keys to the original report keys in the database. Based on my comparison,IconcIuded the tens ofthousands of compromised report keys and the original report keys on the CIDNE-I database were identicak 11. At the bottom ofthe CIDNE database search query results screen, CIDNE allowsauser to export SIGACTS intoa^^.csv" format. CIDNE only exports one month atatime. This export fiinction is available for users to download specific information in order to use the information with other programs or systems. During my investigation,Idetermined that the last ofthe compromised CIDNE-A data was pulled from the CIDNE-A System in the 57 seconds between 11:51:30^ andll:52:27^(^ulu time). Alghanistan servers are all set to ^ulu time, and thus the reported dates are all in ^ulu time. The compromised data Irom CIDNE-Awas pulled belbre7 Jan 2010 11:52:27^ because that is the date and time ofthe first update made toareport where the update did not appear in the compromised data. The compromised data was pulled Irom the CIDNE-A system after7Jan 2010 11:51:30^ because that is the date and time ofthe last update made toareport where the update appeared in the compromised data. Every modification prior to that time appears in the compromised data. 12. The compromised Iraq data was pulled li^om the ClDNE-I system in the 14minutesand51 seconds between 04:39:13C and 04:54:04C (Iraq time). Iraq servers are set to local time and record their dates in local time, which is ^uIu^3on3Jan 2010. The compromised data Irom CIDNEIwas pulled before3Jan201004:54:04C.The first datamodificationthatdoes not appear in the compromised data occurred at3Jan201004:54:04C. Every modification priorto that time appears in the compromised data, while all modifications at this point and following do not appear in the compromised data.The compromised data Irom ClDNE-I had to have been pulled after3Jan201004:39:13C. The last modification to appear in the compromised data occurred at3Jan201004:39:13C.Every modification including and prior to that time appears in the compromised data.

13. At no time was the SIGACT information charged in this case unavailable for access on the CIDNE database. Those that accessed the SIGACTdatabase before May of2010did so in the same manner after May of2010. WecontinuetousetheSIGACTschargedinthiscaseinthe CIDNE database. Tothe best ofmy knowledge, the United States Govemment has never made these databases publicly available.

k-fVr
ALEXANDER VON ELTEN CPT, JA Assistant Trial Counsel

^Vum/iAA^~ 3 r - 1 ^ THOMAS F. HURLEY MAJ, JA Military Defense Counsel BRAD PFC, USA Accused

UNITEDSTATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Manning, Bradley E. PFCU.S.Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall FortMyer,Virginia 22211 C^^JohnLarne 10Jt^ne2013

It is hereby agreed bythe Accused, Defense Counsel,andTrial Counsel, that if CW5 John Lame were present to testify during the merits and pre-sentencing phases ofthis courtmartial, he would testify substantially as follows. 1. lam currently assigned to the Pentagon. lhave 22 years of experience flying helicopters for the United States Army. lhave beenapilot since 1984. lentered active duty in 1990. From 1990 untillJanuary 2011,Iwas an Apache helicopter pilot. AfterlJanuary2011,Ibecamea general aviation oflicer in light ofmy promotion to CW5. 2 In 1991,IwasaCobra pilot Inl993,Iqualified to flythe Apache AH64A(AH64A) In 1998,IqualifiedasaninstmctorpiIotontheAH64A. lhave flown the AH-64A in combat in Bosnia. ln2000,IqualifledtoflytheAH64D. Later in 2000,lqualified as an instmctor pilot ontheAH-64D. Ideployed to I^uwait in 2002 as part of Operation Desert Spring. Ideployed to Iraq in 2003,andlflew in combat as an AH-64D pilot in Operation Iraqi Freedom. Ideployed to Afghanistan in 2008 and flew combat missions during that deployment. Insum,Ihave approximately 3000 hours offlight time and approximately 200 hours ofcombat flight time. 3. From 2004-2008,Iworked at Army Tactics Development at Fort Rucker. In this position,! developed combat tactics. In particu!ar,Ideveloped tactics driven by equipment, especially survivability equipment. At ArmyTacticsDeve!opment,Ifle!d tested equipment,verifled the results, and developed tactics, techniques, and procedures (TTPs)in accordance with the test results. 4. From 2008-2009,Iwas the tactica! operations officer fbr the brigade aviation element ofthe 3rd Brigade CombatTeam o f l l D . As the tactica! operations officer,Imanagedal! attack and reconnaissance aircraft^ in eastem Afghanistan. 5. Since 2009,Ihave been stationed at the Pentagon and worked at Department ofthe Army MilitaryOperationsAviation(DAMOAV). AtDAMOAV,IworkintheG3/5/7,which manages Army aviation. lam the aircraft sttrvivability equipment action officer atDAMO-AV. 6. The AH 64D is an upgraded version of the AH-64A. The AH-64D uses digital displays whereas the AH-64A relies on analog displays. 7 !amfami!iarwiththevideofl!enamed^^!2JUL07C^ENGAGEMENT^ONE30GC Anyone.avi" (Apache video)because!reviewed the video. Ireviewed the Apache video fbr sensitive information, to include systems capabilities and communications. Ireliedonmy experience asapilot, instmctorpilot, and as an officerin charge of developing aviation PROSECUTION E X H I B I T ^ ^ f o r i d e PAGEOFFERED: PAGEADMIT

P^A^ ^ O P ^ PAGES

defensive technologies. lalso relied on the Noble Eagle classification guide, which set classificationstandardsforaflhelicoptervideosin OPERATION ENDURING FREEDOM and then later in OPERATION I I ^ O ^ FREEDOM. Fina!!y,Iconsidered the security classification guide for the Apache helicopter itself Idid not consider any open source reporting on this particular incident. lalso did not consider the fact thatlhave seen similar videos with the sensitive information visible on the intemet. This video is Prosecntion E x h i b i t l l f o r Identillcation. 8. The Apache video shows the display of an AH-64D. Iknow the display is of an AH-64D because it is digital, andlhave extensive experience using the AH-64D digital display. The Apache video shows the highaction display. The high action display shows the use ofalaser for ranging, altitude and air speed. The laser also shows angles ofengagement. The ranges and attack approaches areTTPs. Based onmy experience and training,TTPs are sensitive Army aviation information. Adversaria! forces who knowTTPs could be able to anticipate United States operations and the adversaria! forces will be able to plan more effective attacks asaresult. The high action display also shows the heading tape,which reveals the sensor and the sensor's acquisition oftargets and other information. This display ofthe sensorin action could be used to determine the limitations of the sensor'scapabilities. Based on my experience and training, the sensor'scapabilities are sensitive Army aviation information. The sensor also reveals the position ofthe helicopter during an operation,which could be used to determine more aspects of TTPs. TTPs areapuzzle, and revealing any piece could make solving the puzzle easier fbr an adversary. 9. Videos ofArmy helicopter combat missions are recorded regularly for training and reviewed for eflectiveness. Asahelicopterpilot,Ihave been taught not to release the videos to the public nor to reveal the sensitive information contained therein. Asahelicopter instmctor pilot,Ihave instmcted students not to release the video nor to reveal the sensitive information contained therein. 10. Helicopter units have procedures for protecting the videos and the information the videos contain. In my experience under the procedures employed by the units, all videos requiring review are turned into flight operations by pilots or support persotmeL The videos are reviewed and used again as needed. Thus, the information may be recorded over but it is not physically released. Ifavideo contains information that requires being saved, the video is ported over toa system on the SIPRNET. After the information is secured on the SIPRNET,the tape may be recorded over again. In my experience,videos that are physically released are sanitized fbr the types ofinformation described in paragraph8ofthis stipulation before the video is publicly released. The actual video footage is not classified. Coupling the video footage with thedata makes the information sensitive.

ALEXANDER VON ELTEN CPT, JA Assistant Trial Counsel

KM<4r 4 1

"iLJ^iy^
THOMAS F. HURLEY MAJ, JA Military Defense Counsel BRADLEY E. MANN* PFC, USA Accused

Prosecution Exhibit 118a 2 pages classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

UNITED STATES OF AMERICA STIPULATION OF EXPECTED TESTIMONY Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211 Ms. Jacqueline Scott

10

June 2013

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that ifMs. Jacqueline Scott were present to testify during the merits and pre-sentencing phases of this court-martial, she would testify substantially as follows: 1. 1 am employed at United States Central Command (USCENTCOM), MacDill Air Force Base, Florida. 1 am a Freedom of Information Action (FOIA) Officer and the Chief of the FOIA and Privacy Section. This entails reviewing FOIA requests and releasing information as appropriate under the FOIA. FOIA requests originate from various sources. The public submits request for information under the FOIA. Additionally, federal agencies receive requests for information under the FOIA, and those agencies may have responsive documents that contain USCENTCOM equities. Those agencies then contact USCENTCOM to review the responsive documents requested for USCENTCOM equities. 1 have worked at USCENTCOM since 1995. 1 have been doing FOIA work since 1999. I have worked exclusively on FOIA issues since 2005. 1 was previously the Branch Chief of Management, Records, and Forms, Personnel Management, FOIA, and Privacy. 2. Currently, the FOIA Office handles approximately 350 requests a year. Before 2002, the number of requests a year was approximately 40. The FOIA office does not make withholding decisions; the FOIA office only makes recommendations. As a part of the FOIA office, 1 am the first person to see the mail and requests. When a request is received, 1 determine if USCENTCOM has the information by conducting a records search. I also may have to check with the legal office to see if there is an investigation pending. Sometimes information may point the FOIA process to equities involving intelligence, special operations, and planning, among others. USCENTCOM owns the information 1 review for release under the FOIA. 3. After a FOIA request is received, a member of the FOIA office conducts a first scrub. During this scrub, any information that should not be released because it meets an exemption under the FOIA is placed in a red bracket or red box. Next, a member of the FOIA team verifies the exemption with the equity owner. The review is conducted by a subject matter expert (SME). The SME looks through any requested document for specific types of equities. For instance, one SME looks for J5 equities and another for J3 equities. A SME works exclusively on his/her branch of equities for FOIA requests. If a SME believes that information should be declassified, that information is taken to an original classification authority (OCA) with the authority to declassify. If the SME verifies a classified equity with the owner of the equity, the information is marked as not being appropriate for release. 4. Redactions are mainly used for classified information, names of DoD personnel, and anything that falls under the (b)(3) exemption of FOIA. The (b)(3) section protects personnel assigned to a sensitive overseas routinely deployed unit. Information pertaining to weapons systems is also not released. Section (b)(5) also exempts information and applies to a portion of USCENTCOM FOIA investigations. Section (b)(5) has three part: (1) pre-decisional information; (2) attorney-client documents or privileges; and (3) attomey work product. Law enforcement exemptions under section (b)(7), such as Inspector p.

/(SA"
1 PROSECUTION EXHIBIT ||M for identification PAGE OFFERED:, PAGE ADMITTED:

PAGE \ O F X PAGES

Ceneral investigations, also warrant exemptionft^omdisclosure under the FOIA. The FOIA office incorporates the factors listed in Executive Order (EO) 13526 into decisions regarding redactions of classified information. 5. There isa20 day mandate in the timeline fbr responding to FOIA requests. Onoccasion,alOday extension may be granted where coordination ofvarious equities requires additional time. After initial review the legal office reviews the information for legal sufficiency. Thelegal review isalegal opinion about the FOIA determinations. This isa^^CO/NO-CO process." lfitisa^^CO,"thenitissentbackto the FOIA office to be packaged and sent to the ChiefofStafffbr approval and signature for releasable information. I f i t isa^^NOOO,"then the legal officer states the deficiencies, if any. The FOIA office responds by correcting the deficiencies and the information is resubmitted for legal review. 6.1am familiarwith the video filenamed ^^12 JUL 07 C^E^CACEMEl^T^ONE30CCAnyoneavi" (Apache video),which is Prosecution E x h i b i t l l f o r Identification in this case because it was the subjectaFOlA request. Iwas asked to review the records related to the FOIA request fbr the Apache video. Isearched fbr the records. Ireviewed those records. Idid not find the Apache video. The records indicated that the Apache video was not released subject to any FOIA request. The AR15-6 Investigation related to the Apache video was released under the FOIA, and the investigation contained redactions in accordance with applicable FOIA exemptions. 7. The USCENTCOM FOIA office receivedarequest fbr information related to theFarah investigation. The investigation pertained toalarge scale civilian casualties(ClVCAS) incident in the Farah Province, Afghanistan. In response to the FOIA request for information related to the Farah Investigation, an unclassified executive summary was released on or aboutl8June 2009. The classified investigate officer report (BATES numbers: 0037^029 0037^065) was not released to the public. No other document or video related to the Farah investigation was released to the public in response toaFOIA request or otherwise. 8.On30July2007,CENTCOMreleasedSlCACTinformationasaFOlAreleasefbrSignificant Activity Reporty(SlOACT) dataft^om2004, 2005, 2006, and2007.1wasthe individual thatpostedthis information to the FOIA reading room. The SIOACT information released gave the date and time ofthe significant activity,the attack type, the target and the location city of the significant activity. The FOIA release did not include all ofthe information from the SlCACTs. Only that information that was declassified by an OCAwas released by my office.

^ ^ ^ ^ ^ ALEXANDER V^N ELTEN CPT,JA Assistant Trial Counsel

^^^^^^^^^^^^^^^ THOMASF.HUl^EY MAJ,JA Military Defense Counsel

^ ^ ^ ^ ^ B ^ ^ ^ ^ i ^ ^ BRADL^^.MANN^^ PFC, USA Accused

A A A
OJ 3 t - ' QJ

A 3 A ^ A A

n o
nQJ
C/2

HI r C D ?r VI
"-Fl NJ h i C 2

n o
O 3 rt D

o cr C
O

o:

cr d

o n
M

b ^

n
^
ft
O

i
q
(/I

a > n- a o m D.
rt 3 r t QJ (D H- M V

|<
QJ

0. rt D- V

V O

rt n i< V rt V D LQ V

i <7 a.

6
rt

tu
3
rt

3
SS

3 C D
II
3

M (D 1' to P- W SSS QJ

n o 4^ u, u, cs
O O
II

> 'JI n
K-'

p.
^

1' (U L O rt

W (D

O C D A 3 rt (D ^ (S> S 3 OJ i _ j . o
M QJ t-i H- D- X as O" fS> M C D l_l. V H QJ

ua (D

M p . Qj 01 QJ g 3 rt tQ H- 3

sssf
o o

rt

?@ C '4L '4L ty^


CA!

!<: n (C
II
M3 rt V M to

o o f Q i-o i-o ^ (/)


65

g
BOQ

tr n tr D n C n I-l a n C D n A n ^ 3 a QI (D 3 \ C D 3
V
-~J y-' IO <yi CO j

?
O 3

(D pr
A

5
w CD
rt
ft ft

o o II
HD vQ V

i
tj" M
tJ
M I
t_i.

o'
tD C X s

Si

s
& cr
C D
I-l

PROSECUTION EXHIBIT 1^0 for identification PAGE ADIVHTTED: PAGE OFFERED: PAGE \ OF 1 PAGES

T l hn EL- C

n Iz:
A

A A cr
QJ 3 C d

Q J vl
H- 3 QJ C D Ul V

^ BCi

V *T3 Q J

Z M n
00 00 '

QI rt 3" QI 3

NJ O

Mo a
H

C D n 01 o M 3 Q) r t W t/1 C D O QJ H S rr] OJ M r t u3 Q) 3 D 3 O C ^ 3 rt A fS) s;

II
s

QJ QJ

cr

I-i

H- cr
QI C D w. Ul I-i QJ V

g
o* o
03

cr cr

o
n D n C n M
CL

Q
0. n C D n A n

c*
c/1

3 a
QJ C D

Q
(/I

3
C D V

cr o a
^
I-l

2 o

rt O

n I-l rs
QJ

or

cr
C D I-i

O K H c V > -J . m .
<

n cn

co'o
p< rt
N

ID =5

AB

O H' H
C u ID

,9 .
O

il" ^ o rt) H I
ID O fD Ul 0 Ul ct h-* M O 01 t ) O C D . M 01 <n\ fsa H h* . kO Cn O -J q O

! '
<n . cn cn 4 #
4k
0

TI

hrl

"4 <

c*

ID iD Ul Ul V . ^ M ( "O O O 0*

B
< T .

H ft H

a% o o cn
<i
H

O O n
UJ
M

; o -O

^ (i PJ H

N) W cn Ol O d Ul | j . H 0 |~i Hi

to

^1
K J fti W H.

p< p. rt | _ j to
N

n
N

g
O

n
N N

IJ.

M
>

"6 ( r >
CTl

TJ

a <#, . Cn . cn '

S m
cu
O
t/1

N 2 &

01 M < o
ID Ul
"-s.

^ <
O C

i 1 rD \
Ul

P M
m iQ
pj

o
Lb

o th,
H ,H

h" H* O O o
itk

iii
,m m M

a I

H kO

iO
Id H CO Hi PJ H

cn
cn cn w o o o
M ID

H W Ul O UI 0
(.J

s
Om
D 73

I-i" z
m Oz
H

G H O

&
N

W
c/1

(... 0 0
44,

Bv o
ID Ul

o
o

h'rt

8
5

(ji

o
ffl Ol

I
I
U
Ok M H

O a r n M o
3

^1

o o H
M

CD Q PI

> X) cn M
H

m 3
D 'M H

s w

1-3

H Z O

G 73 Tl

> US
X

*T1 Ml

c
o t=: O "XI
fti

< m

> H n

o c/1
M

a
us
rt
QJ

3
M C D O o

C D 1

xn
Ml

Un
h-l-

n-

C D

> n

Ml

H O

Q) Hh-l

rt C D Ul

a o n c
3
C D 3 rt

^
to

Ul M > C D O o I-l I-i i < O C D C D t-i Ul I-l C D 1 QJ M 3 D.

c\ :
(7\ "
CS

r- 1 Cl

-o S
o\ 2
CO

ra

O M O (D Ul 1 M I-i
QJ

to

o o

fti Ul Ul Ht-h

ja

C D X

\Ci

Ha 'JS 1'

HC D

2a

trat

F-I)

a
3

C D

C D Ul tQ C D Ul

s Hcr

o'
n
C (/)

Si

cn

a
I

us

o cr Ul OJ o I-l
rt
O d rt
h-l

o ftj o c:.

lo

>

o c o o K
US 3" Qi M (D O H3 rt PI X

a a. t-i
C D Ul Ul

Q
in

G
M
I M

us

O O X

Ul rt

uri

n
M O

PI C D

^^ n o a

3" Ml QJ I-i O C D 3

<

C D 3 rt

3 3 r t t-1-

PI X

rt C D

n us

3 QJ 3 C D CO C D I-i

3" r t QJ QJ 3 rt tQ C D C D Ul

<

C D M

Sender Account pressassociation@jabber.ccx: de dawgnetworkcgjabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccx.de dawgnetwork@jabber ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Sender Alias Date-Time Nattianiel Frank 2010-03-05 00:56:32 2010-03-05 03:32:57 Nobody 2010-03-05 03:33:31 Nobody Nobody 2010-03-05 03:36:21 Nobody 2010-03-05 03:37:36 2010-03-05 03:38:54 Nobody 2010-03-05 05:39:50 Nobody Nobody 2010-03-05 05:41:22 2010-03-05 21:07:12 Nobody Nathaniel Frank 2010-03-05 21:07:49 2010-03-05 21:08:15 Nathaniel Frank Nathaniel Frank 2010-03-05 21:09:27 Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank Nathaniel Frank Nobody

Message Text 5-6 hours for total upload? uploaded no, it was like 5 minutes ping ping anyway... should be good to go with that... news?

hi hiya 1 like debates. Just finished one on the IMMI, and crushed some wretch from the journalists union. 2010-03-05 21:11:01 vid? 2010-03-05 21:11:24 Ofthis? 2010-03-05 21:11:37 yeah 2010-03-05 21:11:56 Not videotaped, i think. 2010-03-05 21:12:04 ah 2010-03-05 21:12:24 Very satisfying though 2010-03-05 21:12:38 &gt;nod&lt; 2010-03-05 21:12:44 Source here just gave me 10Gb of banking docs. 2010-03-05 21:13:10 lb? 2010-03-05 21:13:11 He leaked some before, was exposed by the husband of the wretch. 2010-03-05 21:13:27 cross-bank, was an it consultant. 2010-03-05 21:13:39 got arrested two weeks ago 2010-03-05 21:13:50 Had is bank accounts frozen. 2010-03-05 21:14:02 and has been offered 15 million kroner to shut up 2010-03-05 21:14:09 /is/his 2010-03-05 21:14:26 mmm 2010-03-05 21:15:04 needed to offload them so they&apos;d stop going after him 2010-03-05 21:17:31 &gt;yawn&lt; 2010-03-05 21:19:26 tired? "2010-03-05 21:20:54 waking up =) 2010-03-05 22:53:22 ping 2010-03-05 23:41:17 ping 2010-03-06 00:31:55 here 2010-03-06 00:32:52 pong 2010-03-06 00:39:19 . and zero reply status =P _ 2010-03-06 06:40:54 ping 2010-03-06 06:41:22 ping 2010-03-06 06:41:27 pong 2010-03-06 06:41:34 can you tell me more about these files? 2010-03-06 06:41:41 or the status of the issue? 2010-03-06 06:41:58 uhmm... no new infomnation... everybody is focused on the election 2010-03-06 06:42:07 what&apos:s the caps thing? 2010-03-06 06:42:15 caps? 2010-03-06 06:42:22 CAPS 2010-03-06 06:42:38 who&apos;s the author? 2010-03-06 06:42:39 and are all these releasable? 2010-03-06 06:42:42 so much going on... ahhhh 2010-03-06 06:42:46 what about the english translation? 2010-03-06 06:42:55 yes 2010-03-06 06:42:55 everything is notes 2010-03-06 06:43:02 minus the photos 2010-03-06 06:43:13 the photos are releasable 2010-03-06 06:43:29 ok, what about the incident report? 2010-03-06 06:43:52 cant release the original, but the information can be scraped from it 2010-03-06 06:44:08 i.e. sources indicate this happened at this place at this time 2010-03-06 06:44:17 yup 2010-03-06 06:44:38 it looks like a MiTT report? 2010-03-06 06:44:39 translation is super not releasable

y
PROSECUTION EXHIBIT l%)for i^nfification PAGE OFFERED: PAGE ADMITTED:

PAGE 1 OFt^ PAGES

Sender Account pressassociation@jabber.ccc:.de dawgnetwork@jabberccc.de pressassociation@jabber.ccc.de dawgnetwork@jabbercccde pressassociation@jabber.ccc.de

Sender Alias Nathaniel Frank

dawgnetwork@jabber.cccde pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabbercccde dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabbercccde dawgnetwork@jabbercccde pressassociation@jabbercccde pressassociation@jabber.ccc.de dawgnetwork@jabber.cccde

Message Text Oate-Tlme 2010 03 06 06:45:01 ok be sure to tell me these things as soon as possible Nobody 2010 03 06 06:45:03 yes, came from federal police into US hands Nathaniel Frank 2010 03 06 06:45:07 and better yet in the submission itself Nobody 2010 03 0606:45:12 yes,sorry Nathaniel Frank 2010 03 0606:45:59 i^apos:m not the only one to process this stuff and also will forget details if publication is delayedaiong time due to the flood of other things Nobody 2010 03 0606:46:02 though who knows, everybody is running around like headless chickens Nathaniel Frank 2010 03 0606:46:28 malaki is expected t o i i i ^ a g a i n though? Nobody 2010 03 0606:46:33 basically Nobody 2010 03 06 06:46:39 loseafew seats maybe Nobody 2010 03 06 06:46:42 but win overall Nobody 2010 03 06 06:46:56 probably have to f o r m a n e w coalition Nobody 2010 03 0606:48:47 blah, sorry about the craziness... gonna give release ashot? Nathaniel Frank 2010 03 06^06^8:20 yes Nobody 2010 03 0606:58:37 cool Nathaniel Frank 2010 03 06 06:58:40 lack of detail may be problematic, but we^apos:ll see Nathaniel Frank Nobody 2010 03 0606:59:09 i.e ^c^uot:easier^c:|uot: stories for press to get 2010 03 0606:59:10 im sure you can try to confimnSOM^XHINC3 . there is ahotel called the Hotel Ishtar nearby to that location 2010 2010 2010 2010 2010 2010 03 03 03 03 03 03 06 06:59:36 06 06:59:46 06 07:00:01 0607:00:11 06 07:00:24 06 07:01:19 does it have grid refs? grid references within the document, yes that was were the arrests took place morocco publishing company gives coordinates ^in the military report) ifigured it would make it look more iikeajournalist acc^uired it. if the hotel was mentioned ^popular among gays, oddiyj ^div^^ahref^http:^^travei.yahoocom^photei2514619 hotel^ishtari^^style-^background-coior:^^ffffff:font family: Helvetica: font size: 12pt:^^^http:^^traveiyahoocom^photel2514619 hotel^ishtari^^a^^^div^^^message^ haha 1^apos:m surprised there are any left, foreign that Is full transcriptfdrvideo is now complete evil work irai:| themed releases? yes,the transcripts s a y a l o t about attitudes might also be known as Sheraton Ishtar ^div^^a href^http.^^en.wikipedia.org^iki^Sheraton IshtaB^ styie-^background color:^^ffffff:font famiiy: Helvetica: fontsize: 12pt:^^^http:^^enwikipedia.org^wiki^5heraton^lshtar^^a ^^^divi^^^message^ its somewhere in that general area ..^c^uot:Morocco Pub1ishing^c|uot:... its been too crazy for me to try and find anyway,gotta dash...should be back i n a f e w hours good luck you too um,transcripts? ah,yes,sorry. itsaHt^C^^ jumble xO ^P plural confused me. muh bad gotta go fo^apos: r e a l z - P

pressassoclation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabbercccde dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabbercccde

Nathaniel Frank Nobody Nobody Nobody Nobody Nobody Noboc^y Nobody

2010 03 06 07:01:55 2010 03 06 07:02:38

pressassociation@jabbercccde pressassociation@jabber.cccde dawgnetwork@jabbercccde dawgnetwork@jabber.ccc.de pressassociation@jabberccc.de pressassociation@jabber.ccc.de dawgnetwork@jabbercccde dawgnetwork@jabberccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabbercccde

Nathaniel Nathaniel Nobody Nobody Nathaniel Nathaniel Nobody Nobody Nobody Nobody

Frank Frank

Frank Frank

2010 2010 2010 2010 2010 2010 2010 2010 2010 2010

03 03 03 03 03 03 03 03 03 03

06 07:02:42 06 07:03:19 0607:03:25 06 07:03:27 06 07:03:33 06 07:03:43 06 07:03:43 0607:04:08 0607:05:30 0607:05:41

dawgnetwork@jabber.ccc.de

Nobody

2010 03 0607:06:13

dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.cccde pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.cccde pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nobody Nathaniel Nathaniel Nathaniel Nobody Nobody Nathaniel Nobody Nobody

Frank Frank Frank

Frank

2010 2010 2010 2010 2010 2010 2010 2010 2010 2010

03 06 03 06 03 06 03-06 03 06 03 06 03 06 03 06 03 06 03 06

07:07:14 07:07:21 07:07:34 07 07:49 07:07:53 07:08:11 07:08:12 07:08:17 07:08:25 07 08:34

Sender Account dawgnetwork@jabber.ccc.de dawgnetworkcgjabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Sender Alias Nobody Nobody Nobody Nobody^ Nathaniel Frank Nobody Nobody Nobody Nobody Nobody Nobody Nobody Nobody Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody

pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Nathaniel Frank Nobody Nathaniel Frank

pressassociation@jabber.ccc.de dawgnetwork@jabber.c(x:.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank

dawgnetwork@iabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank NobqcJy Nathaniel l^rank Nobody Nobody Nobody Nobody

Message Text Date-Tinie 2010-03- 06 07:08:37 ciaoness 2010-03- 06 07:10:28 oh, it was on the EAST side ofthe tigris.. thats important 2010-03-1 -06 07 11:01 the arrest location 2010-03-1 -06 07:11:03 that is^ 2010-03-1 11:36 why irnportanl? roeoj} 2010-03-06 07 11:46 i think hotel is on the west side 2010-03-06 07:12:21 ah, im all over the place... clearing logs.. 2010-03-06 07:12:43 not logging at^alL. safe_ 1-06 07:12:50 I just wanted to be certajn J010-03-1 1-0609125:55 any more questions? 2010-03-1 1-06 10:59:53 i have a quick question 2010-03-1 2010-03-06 12:48:15 busy day for you ? 2010-03 06 14: 37:11 ping 2010-03 07 07: 03:53 ping 2010-03 07 07: 08:29 brb, checking flights 2010-03-07 07:11:49 2010-03-07 07:14:56 i have a quick question? 2010-03-07 07:15:36 sure...lots of time pressure atm though so answer will be brief 2010-03-07 07:16:00 how valuable are JTF GTMO detention memos containing summaries, background info, capture info, etc? 2010-03-07 07:16:18 time period? 2010-03-07 07:16:25 2002-2008 2010-03-07 07:17:35 quite valuable to the lawyers of these guys who are trying to get them out, where those memos suggest their innocence/bad proceedure 2010-03-07 07:18:12 also valuable to merge into the general history. politically gitmo is mostly over though 2010-03-07 07:18:20 yeah 2010-03-07 07:18:28 although transfers to afghanistan might rise it again 2010-03 07J)7:18:38 &gt%oPNG 2010-03- 07 07:18:43 j[i get backjojhat later 2610-03- 07 07:19:29 depends on definition of valuable of course.. there&apos;s been a fair bit of inflation the last few months:) 2010-03-07 07:19:39 i noticed 2010-03-07 07:19:51 BXW 2010-03-07 07: 20 M 2WE won the referendum - only 1.4% voted against. 20:17 i saw 2010-03-07 07: 20:25 How cool is that? 2010-03-07 07: 2010-03-0707:20:54 First referendum in Icelandic history, ever. 2010-03- 07 07: 20:56 not sure how much influence you actually had... though im sure you had an impact of some kind 2010-03 07 07:21:13 by &apos;we&apos: i mean everyone working towards it 2010-03-07 07:21:20 ah, been there before 2010-03-07 07:21:28 im wary of referenda 2010-03-07 07:21:51 democracy sounds good... until you realize you&apos;re a vulnerable minority... 2010-03-07 07:21:57 but quite possibly swung it., there was lots of stuff going on behind the scenes here. 2010-03-07 07:22:09 case in point: proposition 8 in California 2010-03-07 07:22:21 Yes. This is democracy in the negative though, which is usuaNy greaf^ _ 2010-03-07 07:22:34 indeed it is 2010-03-07 07:22:51 i.e vetoing bills [go back and do it again!] 2010-03-07 07:23:32 call is bad, I agree, anyone with some $ has a syringe right into the heart of the state constitution 2010-03- 07 07:23:40 &gt:nod&it: 2 _^ 2010-03- 07 07:23:52 bbk 2010-03-07 07:23:58 gotta run too 2010-03-07 07:23:59 ttyl 2010-03- 07 10:53:48 so when is the site coming back? 2010-03 08 05:46:56 hello

Sender Account pressassociation@jabber.ccc^.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabberccc.de dawgnetwork@jabbercccde pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Serider Alias Oate-Tii^e Message Text Nathaniel Frank 2010 03 0805:48:43 heyal Nathaniel Frank 2610 03^08 05:48:50 how goes? Nobody 2010 03 08 05:49:22 not bad Nathaniel Frank 2010 03 08 05:52:19 vid has been enhanced and rendered now. subtitles done for english Nobody 2010 03 0805: 52:30 nice 2010 03 0805: 52:47 it looks good, the stills are very moving Nathaniel Frank Nobody 2010 03 08 05:53:03 the stills taken from the wide angle? Nobody 20^0 03 08 05:53:31 dropped camera Nathaniel Frank 2010- ^3 08 05:53:42 Nobody 2010 03 08 05 53:51 ah, the video stills then Nathaniel Frank 2010 03 08 05 53:52 from the video cam Nobody 2010-03 08 05:54:14 sounds good Nobody 2010 03 08 05 55:54 still all oyer^heplace,here Nathaniel Frank 2010 03 6805 56:10 Afterthe contrast enhancement, something about the lack of resoiution^smokegivesafilmnoir quality Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank yeah, i^apos:ve heard. heard? outcome yet? busy few weeks no wont be for weeks... it was yeiy^ui^ ei^pectedalotmore people can get worked up internally... somethings are encouraged to be said, others not, and after they flow around long enough, there^apos:s a lack of grounding. ^01003 08 06:04:09 lalaia 2010 03 08 06:04:54 jesus 201003 0806:05:05 nini? 2010 03-0806:65:22 looks like we have the last4mothers of all audio to all phones in the is pariiament 2010 03 ^06:05:29 s^others^months 201063- 08 06:05146 interesting 2010 03-08 06:06:09 ^had nothing to do with thisone^ 20^003 6806:68:49 im sending one last archive of intersting stuff should be in thexfolder at some point in the next24 hours 2010 03 0805: 56:16 2010 03 08 05:56:25 2010 03 08 05:56:29 2010 0308 05:56:43 2010 0308 05:57:02 2010 0308 05:57:09 2010 0308 05:58:05 2010 03 08 05:58:59 2010 03 08 06 10:08 ok greati 2010 03 08 06 10:09 74b3^tarbz2 2010 03 08 06 10:56 youl^apos:ll need to figure outwhat to cio with it all,. 2010 03 08 06 11:03 a lot of odd things are happening lately 2010 03 08 06 11:08 such as? 2010 03 08 06 11:48 it^apos:s hard to describe without going through them all 2010 03 08 06 11:53 but there^apos:s something in the aii^. 2010 03 0806 12:07 in Iceland, or giobaiiy 2010 03 0806 12:40 this is what l^apos:m trying to determine, people in germany say the same thing 2010 03 08 06:12:49 and there^apos:s some evidence of that 2010-03 08 06:13:13 such as... ^i hate to inquire too much, but im benign)

pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.cccde dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

dawgnetwork@jabberccc.de pressassociation@jabber.cccde pressassociation@jabber.ccc.de pressassociation@jabber.ccc:.de dawgnetwork@jabber.ccc.de dawgnetwork@jabberccc.de dawgnetwork@jabber.ccc.de

Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody

pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.cccde pressassociation@jabber.cccde dawgnetwork@jabbercccde pressassociation@jabber.cccde pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabbercccde dawgnetwork@jabberccc.de pressassociation@jabber.ccc.de

Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel^Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank

2010 03 08 06:13:36 it may be more readily visible in is due to less inertia


[small economyj

2010 03 08 06:14:09 definitely feel something odd here. , 20l6 03 08 06:14:38some recent things in denmark the main newspaper
printed an entire book in afghanistan that was about to be injuncted suddenly in its Sunday paper

pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.cie^ pressassociation@jabber.ccc.de pressassociation@jabbercccde dawgnetwork@jabberccc.de

Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody

2010 03 08 06 14:50 2010^03^06 14^5 2010 03 08 66 15:04 2010 03 08 06 15:25 2010 03 08 06 15:42 2010 03 08 06 1549

to subvert the injunction [about afghanistan, not in] injunction^camefrom^depofdeferice fox news editorialized to say, give money to Wl^ ni government just fell over afghanistan indeed

Sender Account pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabbercccde

press9ssocl9tlon@jabber.ccc.de dawgnetwork@jabbercccde pressassociation@jabbercccde pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabbercccde pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabbercccde dawgnetwork@jabbercccde dawgnetwork@jabbercccde d9wgnetwork@jabber.ccc.de dawgnetwork@jabbercccde

Sender Alias Oate-Time MessageText Nathaniel Frank 2010 03 08 06:16:00 german constitutional courtjust struck down data retention Nobody 2010 03 08 06:16:07 yep Nathaniel Frank 2010 03 08 06:16 34 wi actions that were considered totally radical3years ago are now courted. Nobody 2010 03 08 06:17:06 itold you before,government^organizations cant control information... the harder they try, the more violently the information wants to get out Nathaniel Frank 2010 03 08 06:17:22 2500 articles in is referendum in the past15hours, despite it beingasunday Nobody 2010 03 08 06:17:34 you^apos:re like the first pin to popaballoon Nathaniel Frank 2010 03 08 06:17:52 many other things like this Nathaniel Frank 2010 03 08 06:18:13 restrict supply-value increases,yes Nobody 2010 03 08 06:18:21 oh yeah...osc went haywire digging into is Nathaniel Frank 2010 03 08 06:18:37 us dod has another tact though, dump billions in free ^quot:news^quot: content Nathaniel Frank 2010 03 08 06:18:44 yeah? Nathaniel Frank 2010 03 08 06:18:56 that^apos:s something we want to mine entirely, btw Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nobody Nobody 2010 03 08 06:19:10 lhad an account there,but changed ips too quickly 2010 03 08 06:19:16 usually its pretty dull reading, one or two things on is aday. but its like 20-25 for today alone 2010 03 08 06:19:40 just FBIS or analysis included? 2610 03 6806:19:54 no analysis, too early. 2010 03 08 06:20:03 24-48 hours it takes for analysis if done 2010 03 08 06:22:01 anyway,im throwing everythingigot on JTF GXMO at you now . should take awhile to get up tho 2010 03 0806:23:22 summary^history^heaithconditions^reasonsfor retaining or transfer of nearly every detainee ^about 95^) 2010 03 0806:24:01 ok,greati 2010 03 08 06:24:15 what period does it cover for each internment? 2010 03 08 06:24:48 2002 2009 2010 03 08 06:25:21 so initial medical evaluation to exit evaluation? 2010 03 08 06:25:37 no, just summaries... 2010 03 08 06:25:52 but summaries of that? 2010-03-08 06:26:26 iefrom entry to exit? 2010 03 08 06:26:31 not quite 2010 03 08 06:26:33 gaps 2010 03 0806:26:50 where do the gaps come from? 2010 03 08 06:26:58 Memos such asSOBJECX:l^ecommendation to l^etain under OoOC::ontrol^OoO) for Guantanamo Oetainee,^br^^lSN:US9AS 000002OP 2010 03 0806:27:51 ihaveacsv that organizes the info as much as possible 2010 03 0806:27:55 lhate these gitmo guys 2010 03 0866:28129 OFAFBU sums up the sort of people they ended up with 2010 03 0806:28:48 [one flight away from being uglyj aka ^quot:gitmo cute8^quot: 2010 03 0806:28:56 haha 2010 03 08 06:30:57 anyway,gotta run,haveanice day 2010 03 08 06:31:14 you too. and take carel 2010 03 08 06:31:42 after this upload,thats allireally have got left 2010 03 0806:32:15 curious eyes never njn dry in my experience 2010 03 0806:32:18 isat on it forabit, and figured,eh,why not 2010 03 08 06:32:52 ive already exposed quiteabit, just noone knows yet 2010 03 08 06:33:34 ill slip into darkness forafew years,let the heat die down 2010 03 0806:34:05 won^apos:ttake9few years at the present rate of change 2010-03 08 06:34:08 true 2010 03 08 06:34:19 almost feels like the singularity is coming there^apos:s such acceleration

pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabbercccde pressassociation@jabbercccde pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody

dawgnetwork@jabber.cccde press9SSOCiation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabberccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabbercccde dawgnetwork@jabber.cccde pressassociation@jabberccc.de

Nobody Nathaniel Frank Nathaniel Franic Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank

Sender Account dawgnetwork@jabber.ccc.de pressassociation@jabberccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabbercccde dawgnetwork@jabbercccde pressassociation@jabbercccde pressassociation@jabbercccde dawgnetwork@jabbercccde dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabbercccde dawgnetwork@jabbercccde dawgnetwork@jabbercccde dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabbercccde pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabbercccde dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabbercccde dawgnetwork@jabbercccde dawgnetwork@jabber.ccc.de dawgnetwork@jabbercccde dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabbercccde pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabberccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabbercccde pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.cccde dawgnetwork@jabber.cccde dawgnetwork@jabber.ccc.de pressassociation@jabberccc.de pressassociation@jabberccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabberccc.de

Sender Alias Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nobody Nobody N9th9nlelFr9nk Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nobody Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nobody

t^ate-Tlme MessageText 2010 03 0806:34:52 yes. and considering just how much one source has given you,lean only imagine the overiad 2010 03 08 06:35:05 yes 2010 03 08 06:35:15 ^load 2010 03 08 06:35:30 cya 2010 03 08 06:35:34 1 just hope we can do justice to it all 2010 03 08 06:35:57 We have the numbers, just need to figure out how to scale the management. 2010 03 08 06:36:04 nightl 2010 03 08 11:13:06 hi 2010 03 08 11:44:16 hoi 2010 03 08 11:44:27 short sleep? 2010 03 08 12:19:56 wasnt asleep.. . going to sleep soon 2010 03 08 12:20 21 upload is at about 36^ 2010 03 08 12:21:39 ETA? 2010 03 08 12:22:05 11 12hours...guessing since its been going for6 already 2010 03 08 12:22:33 how many mb? 2010 03 08 12:22:50 about 440mb 2010 03 08 12:2446 alot of scanned pdf8^apos:s 2010 03 08 14:38:00 what are you at donation-wise? 2010 03 08 15 55:28 any good at Im hash cracking? 2010 03 08 16:00:29 yes 2010 03 08 16:00:44 donations: not sure 2010 03 08 16:00:55 something in order of .5M 2010 03 08 16:01:30 but we lost our CCprocessor,so this Is making matters somewhat painful. 2010 03 08 16:02:23 we have rainbow tables for Im 2010 03 08 16:04:14 80c11049faebf441d524fb3c4cd5351c 2010 03 08 16:05:07 ithinkitsimtimnt 2010 03 08 16:05:38 anyway... 2010 03 08 16:06:08 need sleep ^gt:yawn^gt: 2010 03 08 16:09:06 not even sure if thats the hash...lhad to hexdumpa SAM file,sinceidont have the system file... 261^6-63-08^6:10:06 what makes you think it8^apos:sim? 2010 03 08 16:10:19 itsfromaSAM? 2010 03 08 16:10:24 yeah 2010 03 08 16:11:26 passed it onto our Im guy 2010 03 08 16:11:40 thx 2010 03 0821:31:59 got about an hour to go on that upload 2010 03 10 03:44:06 hi 2010 03 10 03:45:05 didyougetwhatisent? 2010 03 10 03:45:11 via sftp 2010 03 10 03:46:04 heyal 2010 03 1003:46:24 M05|^74b3^,t9r.^^2)^c36e31^^^ 2010 03 1003:47:39 will check 2010 03 1003:47:47 sweet 2010 03 1003:47:54 somewhat distracted with all sorts of intrigues 2010 03 10 03:48:01 heh, im sure 2010 03 10 03:48:13 imma get intrigued with my hot chocolate-) 2010 03 10 03:48:24 we now have the last4months of audio from telephones at the is parliament 2010 03 10 03:48:29 bbl 2010 03 10 03:48:35 yes, you said earlier 2010 03 10 03:48:51 it wasa^might^ before 2010 03 1003:48:55 somebody^apos:sbad...-) 2010 03 1003:49:11 ttyl 2010 03 1003:49:16 yup nixon tapes got nothing on us 2010 03 1004:25:37 hmm 2010 03 1004:25:42 there^apos:sausem9me in the gitmo doc^ 2010 03 1004:25:58 iassumeishould filter it out? 2010 03 1005:40:47 theresausername? 2010 03 1005:42:16 any usernames should probably be filtered, period 2610-03-1005:42:38 but at the same time,theresagazillionofthem 2010 03 1065:45:56 is this ordered by country? 2010 03 10 05:46:00 yes

Sender Account dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.cccde dawgnetwork@jabberccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.cccde pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabbercccde

dawgnetwork@jabberccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabbercccde pressassociation@jabbercccde dawgnetwork@jabbercccde dawgnetwork@jabber.cccde pressassociation@jabber.ccc.de pressassociation@jabbercccde dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabbercccde pressassociation@jabber.ccc.de press9SSOCiation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabbercccde dawgnetwork@jabber.ccc.de

Sender Alias Oate-Time Message Text 2010 03 1005:46:48 ... gazillion pdf^apos:s that is^^span^ Nobody Nobody 2010 03 1005:47:15 anything useful in there? Nathaniel Frank 2010 03 10 05:50:54 no time, but have someone on it Nathaniel Frank 2010 03 10 05:51:00 there surely will be Nathaniel Frank 2010 03 10 05:51:12 and these sorts ofthings are always motivating to other sources too Nobody ^2010 03 1005:51:22 ^gt:nod^it: Nobody 2010 03 1005:51:33 inflation Nobody 2010 03 10 05:51:34 ^P Nobody 2010 03 1005:51:43 from an economic standpoint Nathaniel Frank 2010 03 1005:52:08 heh ^ ^ Nathaniel Frank 2010 03 1005:52:29 Iwas thinking more inspiration Nobody 2010 03 1005:52:38 iknow-) Nathaniel Frank 2010 03 10 05:53:08 gitmo-bad,leakers-enemy of gitmo,leakers-good Nathaniel Frank 2610 03 10 05:54:03 Hence the feeling is people can give us stuff for anything not as ^quot:dangerous as gitmo&quot: on the one hand,and on the other,for people who know more,there^apos:sadesire to eclipse... Nobody 2010 03 10 05:54:41 true Nobody 2010 03 1005:55:05 ive crossedalot of those ^quot:danger^quot: zones, so im comfortable Nobody 2010 03 1005:55:25 iearnedalot from the Iceland cable on my side Nathaniel Frank 2010 03 1005:55:32 oh? Nobody 2010 03 10 05:55:55 and that is... everyone is too busy to Investigate too deeply... Nobody 2010 03 10 05:56:02 or clean up the mess Nathaniel Frank 2010 03 10 05:56:03 yes Nathaniel Frank 2010 03 10 05:56:13 unless they think there^apos:sareal promotion in it Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank Nobody 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 10 05:56:19 1005:56:35 1005:56:41 1005:56:46 1005:56:51 1005:56:58 1005:57:28 10 05:57:53 1005:58:21 1005:58:29 10 05:58:39 1005:59:06 indeed afterafew days,no one givesadamn,generally yep especially now with the pace of change so high oh yeah its nuts ive given up on trying to imagine whats next ipredict its nothingican predict actually... gave an Intel source herealist of things we wanted 15 Iwas ^quot:something we have no idea of yet. hard to find, but the most likely to be important&quot: and they came iiack with the 1ast4months of parliament xO hilarious thatsawtf...who did this kind of moment fail out ^P So,that^apos:swhatithink the future is like:) yes now that humans are getting more and more integrated into this information society...aievei of transparency never imagined or eveningly desired is coming into play it makes us more human if anything we^apos:ve created states, governments, religious institutions, corporations , all these organizations to hide behind... but at the end of the day, we^apos:re just guys and girls

2010 03 1005:59:30 2010 03 2610-03 2010 03 2010 03 2010-03 2010 03 2010 03 1005:59:47 1005:59:49 10 06:00:40 10 06:00:54 10 06:00:55 1006:01:15 1006:01:57

dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de

Notioc^y Nobody

2010^03-l606:62:18 2010 03 1006:03:13

dawgnetwork@jabber.ccc.de

Nobody

2010 03 1006:03:26

Sender Account pressassociation@jabber.ccc.de

Sender Alias Oate-Tlme MessageText Nathaniel Frank 2010 03 1006:04:02 Wikil^eaks is looking for donations, but what itsii^^ founders should do, is call upon script writers to make a, perhaps reality based, dramatized, thriller movie of one of the wikileaks cases, with corruption, infiltration, espionage, hitmen, sabotage, etc and call the movie 8^quot:Wikil^eakst^quot:^^span^^br^:^^br^^^span style-font famiiy: Helvetica: font size: 12pt:^^^l see great potential for suchamovie,and massive money and advertising it would generate would establish them firmly. l^apos:d then support by seeing the movie Hollywood would likely support.^^ Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank ^ 0 1 0 03-1006164:04 2010 03 1006:04:35 2010 03 1006:04:47 2010 03 10 06:04:59 2010 03 10 06:05:22 2010 03 1006:05:45 2010 03 1006:05:50 2010 03 10 06:05:51 2010 03 10 06:06:06 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 haha yes. its very healthy but then, there is farmville... the masquerade ball this is gonna be one hell ofadecade it feels like 2010should be ending soon... but we just got started sense deceptions to suck^out of people lt^apos:s as old as lipstick and the guitar of course, but mmorpg are evil inawhole new way 1006:06:39 voluntary matrix-style society? 1006:06:46 yes 1006:07:08 hmm 1006:07:25 might be ok in the end 10 06:07:53 mmorpg^apos:s that have long term users are incentivised to keep them profitable 1006:08:59 butlimaginethey^apos:ll merge into hybrid revenue modes, where congnitive tasks and freelabor are done using sense deception incentives 1006:09:48 like the ^quot,video games&quot: from toys? 1006:10:12 haven8^apos:t seen that 10 06:10:34 but it sure isn^apos:tadecade to beagullible idiot:)

pressassoci9tion@jabber.ccc.de pressassociation@jabbercccde pressassociation@jabber.ccc.de dawgnetwork@jabbercccde dawgnetwork@jabbercccde dawgnetwork@jabber.ccc.de dawgnetwork@jabberccc.de pressassociation@jabbercccde pressassociation@jabbercccde dawgnetwork@jabber.cccde pressassociation@jabber.cccde dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

dawgnetwork@jabbercccde pressassociation@jabber.cccde pressassociation@jabbercccde dawgnetwork@jabbercccde

Nobody Nathaniel Frank Nathaniel Frank Nobody

2010 03 2010 03 2010 03

dawgnetwork@jabbercccde dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Nobody Nobody Nathaniel Frank

dawgnetwork@jabberccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nobody Nathaniel Frank Nobody

pressassociation@jabber.ccc.de

Nathaniel Frank

dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nathaniel Frank Nobody Nobody Nathaniel Frank Nobody Nathaniel Frank Nobody

2010 03 1006:11:24 basic gist: retired general takes overatoy company, invests in video games for kids to ^quot:piay^quot:, but they^apos:re actually training to remotely use little toy sized weapons 2010 03 1006:11:40 former toy owner tries to stop him 2010 03 1006:11:52 ^company 2010 03 10 06:12:11 heh.that^apos:s the examplelwas going to use for mmorpg ^with drones) but decided it was too grotesque 2010 03 1006:12:47 its not... its logical in frightening ways 2010 03 10 06:13:04 ithink like that, idont know how it happened,buti think that way 2010 03 1666:13:32 ipredict warwill turn intoacontinuous spectrum of spying and violence 2010 03 1006:13:32 8^quot:howcanitake advantage of two things that most people wouldn^apos:t think are connected&quot: 2010 03 1006:15:50 with companies doingalot of the lower end ^spying^violence) for their own reasons andatotally seemless crossover ^as is happening with the us) between contractors^miiitary to the degree that its not clear who is tasking who 2010 03 1006:16:12 wow, dead on 2010 03 1006:16:57 everywhere, greater degrees of freedom, more fluidity and mixing. 2010 03 1006:17:23 always an interesting discussions) 2010 03 1006:17:26 ttyl 2010 03 1006:17:31 nightl 2010 03 1020:58:03 hello 2010 03 1020:59:41 heyal 2010 03 1020:59:52 whats new?

Sender Account pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociatlon@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociatlon@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Sender Alias I Date-Time Message Text Nathaniel Frank 2010-03-10 21:00:22 350Gb of audio intercepts. But you knew already. 2010-03-10 21:00:30 mhmm Nobody Nobody 2010-03-10 21:00:57 is that the only thing? Nathaniel Frank 2010-03-10 21:01:22 lots of smaller scale material Nobody 2010-03-10 21:01:28 &gt;nod&lt; 2010-03-10 21:01:44 e g bbc legal defense against trafigura which was Nathaniel Frank censored Nathaniel Frank 2010-03-10 21:02:15 aljazeera doing another segment on WL Nathaniel Frank 2010-03-10 21:02:35 Canadian detainee docs Nobody 2010-03-10 21:02:43 Canadian? Nathaniel Frank 2010-03-10 21:03:00 some russian and Chinese stuff that 1 C9n&apos;t read Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nathaniel Frank 2010-03-10 21:03:08 2010-03-10 21:03:09 2010-03-10 21:03:17 2010-03-10 21:03:42 2010-03-10 21:03:48 2010-03-10 21:04:13 hahaha heh and a list of ALL the tea party volunteers from glen beck&apos;s email jesus fucking Christ whats the big deal with that? because some people take that seriously 2010-03-10 2T:04:26 an analysis of the greenhouse gas output of Australia&apos:s &quot:earth hour&quot; fireworks 2010-03-10 21:04:32 (46 tonnes) 2010-03-10 21:04:57 The teaparty thing? lt&apos;s weird, but it should be taken seriously 2010-63-T62T;65:21 yeah, its one of those... grey areas between reality and entertainment and ick 2010-03-10 21:05:33 lt&apos;s the right wing overclass (fox) organization of the righwing underclass. Think of them as brown shirts. 2010-03-10 21:05:39 "stays in reality* 2010-03-10 21:06:23 well, i dont know what posting a list from glenn beck&apos;s email will do... but hey, its transparency 2010-03-10 21:06:37 They&apos;re important because their organized free labor. 2010-03-10 21:06:54 And they may or may not break free of their masters. 2010-03-10 21:07:04 2010-03-10 21:07:50 2010-03-10 21:08:24 2010-03-10 21:08:31 2010-03-10 21:08:52 ah is It like the entire worid is uploading to you? some hungarian finance things Scientology in haiti... lots of german stuff i don&apos:t understand, but we have people who do 2010-03-10 21:08:58 &gt;nod&lt; 2010-03-10 21:09:08 wow... 2010-03-10 21:09:15 im gonna leave you to work than 2010-03-10 21:09:50 get back up and online... get immi passed... and start publishing whatever you can... =) 2010-03-10 21:10:08 heh 2010-03-10 21:10:16 aljazeera will also have a new WL doco 2010-03-10 21:10:31 by the same producer who did IMMI piece 2010-03-10 21:11:36 agreement between the royal mail and its union 2010-03-10 21:11:49 oh, this one is nice 2010-03-10 21:11:55 entire romanian police database 2010-03-10 2 l l l 2 : 3 i israeli&apos;s OECD application docs 2010-03-10 21:15:45 its like you&apos;re the first &quot:lntelligence Agency&quot; for the general public 2010-03-10 21:16:39 downside is you get so much stuff in a single day that its hard to prioritize 2010-03-10 21:16:54 yes 2010-03-10 21:17:05 that&apos;s just a matter of growth, though 2010-03-10 21:17:39 did you read our bulgarian shadow state doc? 2010-03-10 21:17:45 well, fuck you do everything an Intel agency does... minus the anonymous sourcing 2010-03-10 21:17:58 not really

dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody Nobody

pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber ccc.de dawgnetwork@jabber ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody Nathaniel Frank Nathaniel Frank Nathaniel Frank Nobody Nobody

Sender Account pressassociation@jabber.ccc.de dawgnetwork@jabbercccde dawgnetwork@jabbercccde pressassociation@jabber.ccc.de

Sender Alias Oate-Tlme MessageText Nathaniel Frank 2010 03 1021:18:15 The original WL about reads: &quot; ..will be the first intelligence agency of the people. .&quot; Nobody 2010 03 1021:18:43 might have missed that, but its absolutely true Nobody 2010 03 10 21:19:31 anyway, gotta run . ttyl Nathaniel Frank 2010 03 1021:19:47 Wikileaks described itself as &quot;the first intelligence agency of the people Better principled and less parochial than any governmental intelligence agency, it is able to be more accurate and relevant it has no commercial or national interests at heart; its only interest is the revelation ofthe truth LInlike the covert activities of state intelligence agencies, Wikileaks relies upon the power of overt fact to enable and empower citizens to bring feared and corrupt governments, and corporations to justice.&quot; Nathaniel Frank NathanielFrank Nathaniel Frank Nobody NathanielFrank Nobody NathanielFrank NathanielFrank Nobody Nobody NathanielFrank NathanielFrank Nobody NathanielFrank NathanielFrank Nobody NathanielFrank Nobody Nobody Nobody NathanielFrank Nobody Nobody NathanielFrank NathanielFrank NathanielFrank NathanielFrank Nobody Nobody Nobody NathanielFrank NathanielFrank NathanielFrank Nobody Nobody NathanielFrank NathanielFrank Nobody 2010 03 2016 63 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 1021:20:14 1023:30:54 1023:31:63 16 18:23:35 16 18:32:42 16 22:29:42 16 22:34:13 1622:34:14 1622:34:24 1622:34:36 1622:35 52 16 22:35:52 16 22:36:04 1622:37:09 1622:37:21 ok.laterl any more hints about this Im hash? no luck so far hi hoi whats up? just about to go out all systems nominal good to know ttyl

pressassoclation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabbercccde dawgnetwork@jabberccc.de pressassociation@jabber.cccde pressassociation@jabber.cccde dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabberccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabbercccde dawgnetwork@jabber.ccc.de pressassociation@jabbercccde pressassociation@jabbercccde pressassociation@jabbercccde pressassociation@jabber.ccc.de dawgnetwork@jabber,ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabberccc.de dawgnetwork@jabber.ccc.de

-)

pressassociation@jabberccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

NathanielFrank NathanielFrank NathanielFrank NathanielFrank

take care will do... donations coming in good? not sure experience in the past is that they don&apos;t tend to in response to stories like this 26l6^3-16^2:37:28 meh 2010 03-1622:37:32 makes people scared to donate 2010 03 16 22:37:34 too bad 2010 03 16 22:37:52 iwouid&apos;ve 2010-03 16 22:37159 ifisawthat 2010 03 17 22:32:26 what&apos;d your source say it was? 2010 03 17 22:39:49 it was very general 2010 03 1722:40:02 organization-wide 2010 03 1722:40:17 interesting 2010 03 1722:40:35 what was the approach and motivation? 2010 03 1722:41:17 iwonder if this didn&apos;t stir up some internal dissent 2010 03 1722:41:42 must be some people not too happy about cracking down on whistleblowers and following the Chinese... 2010 03 1722:41:55 indeed 2010 03 1722:42:11 90^ ofthe e^ort is on Chinese exfiltration of documents 2010 03 1722:42:22 it wasabiog posting 2010 03 1722:43:01 well,that isagenuine problem 2010 03 17 22:43 16 Israeli and russian exfiltration too 2010 03 17 22:44:02 frenchasweil 2010 03 1722:44:06 it warned about not visiting the blogs, because the document and its contents is still classified 2010 03 1722:44:17 gavealink the to the report through proper channels 2010 03 17 22:44:31 although knowledge tends to be stabalizing 2010 03 17 22:44:34 if you takeabig picture perspective 2010 03 17 22:45:17 it almost pleaded people not to send anonymous documents, mentioning courage and personal trust... and told people to go through proper channels ifthey have an issues 2010 03 17 22:45:24 open skies policy was stabalizing 2010 03 17 22:45:44 so perhaps an open net policy is called for;) 2010 03 17 22:46:23 that&apos;s reasonable, though doesn&apos;t work in practice... 2010 03 17 22:46:27 what&apos;d they say about courage?

Sender Account dawgnetwork@jabber.ccc.de pressassociation@jabiiercccde dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.cccde pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabbercccde pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.cccde pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabberccc.de pressassociation@jabber.cccde pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabberccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabbercccde pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabberccc.de pressassociation@jabbercccde

Sendei^ Alias Nobody NathanielFrank Nobody NathanielFrank NathanielFrank NathanielFrank Nobody NathanielFrank Nobody NathanielFrank Nobody NathanielFrank NathanielFrank NathanielFrank NathanielFrank NathanielFrank NathanielFrank NathanielFrank Nobody NathanielFrank NathanielFrank Nobody Nobody Nobody NathanielFrank Nobody NathanielFrank NathanielFrank Nobody NathanielFrank NathanielFrank NathanielFrank NathanielFrank NathanielFrank NathanielFrank Nobody NathanielFrank

Date-Tin^e 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2 6 l 6 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 03 2010 63 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03

1722:46:38 1722:46:40 17 22:46:53 1722:47:00 1722:47:32 1722:48:09 1722:48:55 1722:49:00 1722:49:16 17 22:49:27 17 22:49:34 17 22:49:38 17 22:49:50 1722:49:58 17 22:50:41

dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de

Nobody NathanielFrank Nobody NathanielFrank NathanielFrank Nobody Nobody NathanielFrank NathanielFrank NathanielFrank Nobody NathanielFrank

2010 2010 2010 2010 2010 2010 2010 2010 2010

03 03 03 03 03 03 03 03 03

MessageText icansendacopy that it&apos;s contagious?;)? butitsnonrel yes subsys is really good these days please mark non release, found on usb stick k outed another spy this afternoon ?? local gotchya police, watching one of my hotels insider also confirmed we have access to the fieet tracking system;) just got hold of 800 pages of interrogations docs and another 40gb of.is privatization^banking stuff 1722:50:51 this country is going to melt... 17 22:50:55 saw the film today 17 22:51:04 it&apos;s looking great 17 22:51:31 what film? 17 22:51:50 projectb 17 22:51:58 the massacre 17 22:52:01 gotchya 1722:52:32 uploaded file 1722:53:01 marked as requested 1722:53:11 thanks 1722:53:18 n^p 1722:53:20 you&apos;re great 17 22:54:03 is there some w a y i c a n g e t a c r y p t o p h o n e to you? 17 22:54:14 not at this time 17 22:54:40 actually... 17 22:54:47 probably best ifyou just order one? 17 22:54:57 or rather some friend 1722:55:14 bit pricy though 1722:55:26 hmm 1722:55:29 actually never mind 1722:55:38 yes,idont have access at present 1722:56:35 these things are good for urgent contact, but it&apos;s safer to avoid due to location tracking possibilities 1722:56:47 iknow that very well 1722:56:56 although there isasatphone module 1722:57:21 forget the idea for now 1722:57:45 yes. you just contact us 17 22:57:52 but don&apos;tdisappearwithout saying why for an extended period or l&apos;ll get worried;) 17 22:58:03 iwont 1722:58:16 you&apos;ll know if something&apos;s wrong 17 22:58:39 ok 1722:58 57 you can just tell me &quot;ail the ships came in&quot;

dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de

Nobody NathanielFrank NathanielFrank Nobody NathanielFrank NathanielFrank Nobody NathanielFrank NathanielFrank Nobody

2010 03 1722:59:09 via email or any other mechanism 2010 03-1722:59:15 &gt;nod&lt; 2010 03 1722:59:44 will be doing an investigativejournoconfin norway this week end,so may be out ofcontact most ofthe time 2010 03 1722:59:55 its good 2010 03 1723:00:17 ok 2010 03 1723:00:27 off to do some work. 2010 03 1723:00:43 k, but def read the refiectionisent 2010 03 1723:00:53 iwill 2010 03 1723:01:01 now 2010 03 1723:01:03 toodles 2010 03 1723:12:56 heh 2010 03 1723:13:15 Hike it. free advertising to just the right market 2010 03 1723:23:14 &gt;nod&lt;

Sender Account dawgnetwork@jabber.ccc.de pressassociation@jabberccc.de dawgnetwork@jabber.cccde pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabbercccde dawgnetwork@jabber.ccc.de pressassociation@jabbercccde pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de

MessageText Sender Alias Date-Time Nobody 2010 03 1723:23:30 the tone is what interests me the most NathanielFrank 2010 03 1723:23:45 yes 2010 03 1723:23:47 itsnotreallyathreat,itsaplead Nobody NathanielFrank 2010 03 17 23:23:55 slight desperation NathanielFrank 2010 03 17 23:24:00 yes NathanielFrank 2010 03 1723:24:68 interesting approach 2010 03 1723:24121 IOW,noone knows what to do Nobody NathanielFrank 2010 03 1723:24:40 threats work better with mosL but perhaps they see that our sources are resistant to them anyway .. NathanielFrank 2010 03 17 23:24:54 so pleading is the only thing left 2010 03 17 23:25:34 im sure it was brought on by discussions that showed Nobody slight sympathy NathanielFrank 2010 03 1723:27:28 yes NathanielFrank 2010 03 1723:27:46 ithink your intuition is correct 2010 03 1723:28:32 &quot;if we C9n&apos;t scare them, lets ask Nobody nicely&quot; Nobody 2010 03 1723:33:39 the hackers that these governments hire, the good ones. .they&apos;re the cats that can only be herded by food , but when the cat food runs out, or they get treated rough . they&apos;d be the first to dissent Nobody Nobociy NathanielFrank NathanielFrank NathanielFrank 2010 03 17 23:34:21 food meaning money, ofcourse... and treatment being,well,treatment 2010 03 1723:34:42 weird analogy,iknow..lol 2010 03 1723:38:21 yes 2010 03 17 23:38:34 that&apos;s possible 2010 03 17 23:39:09 and there are social vales that arise out of the internet that have evolved beyond those inside the isolated militarycontractor complex 2010 03 18 00:04:31 its likeaclassroom run by an overbearing teacher... whenakid strikes back anonymously by sabotaging the desk...the other kids getalittle excited and rowdy, because they wanted too, but were afraid of getting caught , the teacher is embarassed and cant control the kids, so the teacher just makes an announcement that the students should continue working quiety after they haveaiook at the mess on the desk that the teacher is cleaning up 2010 03 1800:05:11 ithink thatsabetter analogy^ 2010 03 1800:37:17 ^div^^a href^http:^^freedomincluded.com^index^^^^span style-^^background-color:^^ffffff: font-family: Helvetica; fontsize: 12pt;^^^http:^^freedomincludedcom^index^^span^^^a^ ^spanstyle-^backgroundcolor:^^ffffff;fontfamily: Helvetica;font size:12pt;^^^&1t; recommend: free (as in freedom) hardware vendor^^ 2010 03 1808:39:52 wtf is wrong withLTC Packnett xO 2010 03 18 08:40:59 you don&apos;t confirm, or even come off as possibly confirming shit... 2010 03 1808:41:22 lol,slipped up in your f9vor,iguess 2010 03 1808:41:31 eh? 2010 03 1808:42:06 NYTarticlehasLTC Packnett allegedly confirming the authenticity ofthe 2008 report posted on 15th 2010 03^8 08:42:17 yes 2010 03 18 08:42:19 hilarious 2010 03 18 08:42:57 idont think he&apos;s going to continue to be the Ml spokesperson 2010 03 1808:43:04 they do break these rules though when being hammered 2010^63^68143:15 imsure 2010 03 18 08:43:41 refusing to confirm does make them look shadowy and untrustworthy 2010 03 1808:43:45 ijust didnt realize how little it takes for them to cave...

dawgnetwork@jabberccc.de c^awgnetwork@jabbercccde pressassociation@jabberccc.de pressassociation@jabber.cccde pressassociation@jabberccc.de

dawgnetwork@jabberccc.de

Nobody

dawgnetwork@jabber.ccc.de dawgnetwork@jabbercccde

Nobody Nobody

dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabberccc.de pressassociation@jabber.cccde dawgnetwork@jabbercccde

Nobody Nobody Nobody NathanielFrank Nobody NathanielFrank NathanielFrank Nobody NathanielFrank Nobody NathanielFrank Nobody

Sender Account dawgnetwork@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de dawgnetwork@jabber.ccc.de dawgnetwork@jabber.ccc.de

Sender Alias Date-Time MessageText^ Nobody 2010 03 1808:43:55 true,but..im shocked NathanielFrank 2010 03 1808:44:12 yeah , but remember , rules are just for the grunts :P NathanielFrank Nobody Nobody 2010 03 1808:44:32 like no spying on citizens at the nsa 2010^3-1808B44:43 which is common 2010 03 1808:45:57 &quot;ohfi^ck,this might beaLIS citizen... shouldn&apos;t we get this checked by the FBi...&quot;&quot;Fuck that, FOi is slow as fuck, we&apos;ll just keep listening in, capture him, and then turn him over&quot; 2010 03 18 08:48:27 ipreferjen. also, too masculine looking 2610 03 1808:48:57 heh 2610-03 1808:48:59 nevermine

pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de pressassociation@jabber.ccc.de

NathanielFrank^ NathanielFrank NathanielFrank

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48

Disk U t i l i t y : Burn s t 3d, 5at Jan 30 23:22:50 2010 Disk U t i l i t y : Burning LO CD-R media w i t h 5AO s t r a t e g y m HL-DT-ST DVDRW GS23N 3800 v i a ATAPI. Disk U t i l i t y : Requested burn speed was max, a c t u a l burn speed i s 24x. Disk U t i l i t y : 8urn underrun p r o t e c t i o n i s supported, and enabled. Disk U t i l i t y : Burn f i n i s h e d , 5at Jan 30 23:26:28 2010 Disk U t i l i t y : V e r i f y s t a r t e d , 5at Jan 30 23:26:28 2010 Disk U t i l i t y : V e r i f y f i n i s h e d , 5at Jan 30 23:29:27 2010 Disk U t i l i t y : Burn s t a r t e d , Mon Feb 1 12:26:31 2010 Disk U t i l i t y : Burning t o CD-R media w i t h 5AO s t r a t e g y i n HL-DT-5T DVDRW G523N S800 v i a ATAPI. Disk U t i l i t y : Requested burn speed was max, a c t u a l burn speed i s 24x. Disk U t i l i t y : Burn underrun p r o t e c t i o n i s supported, and enabled. Disk U t i l i t y : Burn f i n i s h e d , Mon Feb 1 12:30:23 2010 Disk U t i l i t y : V e r i f y s t a r t e d , Mon Feb 1 12:30:23 2010 Disk U t i l i t y : V e r i f y f i n i s h e d , Mon Feb 1 12:33:36 2010 Disk U t i l i t y : Burn s t a r t e d , Mon Feb 1 13:17:13 2010 Disk U t i l i t y : Burning t o CD-R media w i t h 5A0 s t r a t e g y i n HL-DT-5T DVDRW G523N 5800 v i a ATAPI. Disk U t i l i t y : Requested burn speed was max, a c t u a l burn speed i s 24x. Disk U t i l i t y : Burn underrun p r o t e c t i o n i s supported, and enabled. Disk U t i l i t y : Burn f i n i s h e d , Mon Feb 1 13:19:57 2010 Disk U t i l i t y : V e r i f y s t a r t e d , Mon Feb 1 13:19:57 2010 Disk U t i l i t y : V e r i f y f i n i s h e d , Mon Feb 1 13:22:01 2010 Disk U t i l i t y : Erase s t a r t e d , Mon Feb 15 04:34:16 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-5T DVDRW GS23N 5800 v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d , Mon Feb 15 04:34:51 2010 Disk U t i l i t y : Erase s t a r t e d , Mon Feb 15 13:12:02 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-5T DVDRW G523N 5800 v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d , Mon Feb 15 13:20:50 2010 ITunes: Burn s t a r t e d , Mon Feb 15 13:21:15 2010 iTunes: Burning t o CD-RW media w i t h 5A0 s t r a t e g y i n HL-DT-5T DVDRW G523N 5800 v i a ATAPI. iTunes: Requested burn speed was 158x, a c t u a l burn speed i s lOx. iTunes: Burn underrun p r o t e c t i o n i s supported, and enabled. iTunes: Burn f i n i s h e d , Mon Feb 15 13:29:32 2010 Disk U t i l i t y : Erase s t a r t e d . Sun Feb 21 03:13:13 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW G523N 2600 v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d . Sun Feb 21 03:22:02 2010 Disk U t i l i t y : Erase s t a r t e d , Tue Feb 23 17:14:20 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW G523N 2600 v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d , Tue Feb 23 17:14:51 2010 iTunes: Burn s t a r t e d , Tue Feb 23 17:21:26 2010 iTunes: Burning t o CD-RW media w i t h SAO s t r a t e g y i n HL-DT-ST DVDRW GS23N 5800 v i a ATAPI. iTunes: Requested burn speed was 117x, a c t u a l burn speed i s 1 Ox. iTunes: Burn underrun p r o t e c t i o n i s supported, and enabled. iTunes: Burn f i n i s h e d , Tue Feb 23 17:27:36 2010 Disk U t i l i t y : Erase s t a r t e d . Sat Feb 27 13:19:49 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW GS23N 5800 v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d . Sat Feb 27 13:41:16 2010 Disk U t i l i t y : Erase s t a r t e d , Tue Mar 2 17:26:45 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-5T DVDRW G523N S800 v i a ATAPI. -1-

49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96

Disk U t i l i t y : Erase f ^hed, Tue Mar 2 17:48:05 2010 Disk U t i l i t y : Burn sta^c;:ed, Tue Mar 2 17:48:54 2010 Disk U t i l i t y : Burning t o CD-RW media w i t h SAO s t r a t e g y i n HL-DT-ST DVDRW GS23^ SBOO v i a ATAPI. Disk U t i l i t y : Requested burn speed was max, a c t u a l burn speed i s 4x. Disk U t i l i t y : Burn underrun p r o t e c t i o n i s supported, and enabled. Disk U t i l i t y : Burn f i n i s h e d , Tue Mar 2 17:56:50 2010 Disk U t i l i t y : V e r i f y s t a r t e d , Tue Mar 2 17:56:50 2010 Disk U t i l i t y : V e r i f y f i n i s h e d , Tue Mar 2 18:00:48 2010 Disk U t i l i t y : Erase s t a r t e d , F r i Mar 5 00:34:11 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW GS23^ 5800 v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d , E r i Mar 5 00:42:59 2010 Disk U t i l i t y : Burn s t a r t e d , Tue Mar 9 15:58:01 2010 Disk U t i l i t y : Burning t o CD-RW media w i t h non-optimal TAO s t r a t e g y i n HL-DT-ST DVDRW G523^ 5800 v i a ATAPI. Disk U t i l i t y : Requested burn speed was max, a c t u a l burn speed i s 4x. Disk U t i l i t y : Burn underrun p r o t e c t i o n i s supported, and enabled. Disk U t i l i t y : Burn f i n i s h e d , Tue Mar 9 16:05:44 2010 Disk U t i l i t y : V e r i f y s t a r t e d , Tue Mar 9 16:05:44 2010 Disk U t i l i t y : V e r i f y f i n i s h e d , Tue Mar 9 16:09:30 2010 Disk U t i l i t y : Erase s t a r t e d , Sun Mar 14 08:25:54 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW G523l^ 5800 v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d . Sun Mar 14 08:47:15 2010 Finder: Burn s t a r t e d . Sun Mar 14 09:05:30 2010 Finder: Burning t o CD-RW media w i t h SAO s t r a t e g y i n HL-DT-ST DVDRW G523^ 5800 v i a ATAPI. F i n d e r : Requested burn speed was max, a c t u a l burn speed i s 4x. F i n d e r : Burn underrun p r o t e c t i o n i s supported, and enabled. F i n d e r : Burn f i n i s h e d . Sun Mar 14 09:06:47 2010 F i n d e r : V e r i f y s t a r t e d . Sun Mar 14 09:06:47 2010 F i n d e r : V e r i f y f i n i s h e d . Sun Mar 14 09:06:52 2010 Disk U t i l i t y : Erase s t a r t e d , Sun Mar 14 12:19:23 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW 05231^ SBOO v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d . Sun Mar 14 12:29:28 2010 Disk U t i l i t y : Erase s t a r t e d , Mon Mar 22 17:01:10 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW G5231^ SBOO v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d , Mon Mar 22 17:22:37 2010 iTunes: Burn s t a r t e d . Wed Mar 24 09:31:09 2010 iTunes: Burning t o CD-RW media w i t h SAO s t r a t e g y i n HL-DT-ST DVDRW GS23l^ SBOO v i a ATAPI. iTunes: Requested burn speed was 163x, a c t u a l burn speed i s 4x. iTunes: Burn underrun p r o t e c t i o n i s supported, and enabled. iTunes: Burn f i n i s h e d . Wed Mar 24 09:49:53 2010 Disk U t i l i t y : Erase s t a r t e d . Wed Mar 24 15:32:46 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW GS23^ SBOO v i a ATAPI. Disk U t i l i t y : Erase f a i l e d . Wed Mar 24 15:32:48 2010 Disk U t i l i t y : Erase e r r o r : 0x80020040 One o f t h e volumes on t h e d i s c i s s t i l l i n use. Disk U t i l i t y : Erase s t a r t e d . Sun Mar 28 21:14:30 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW GS23I^ 5800 v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d . Sun Mar 28 21:35:48 2010 Disk U t i l i t y : Erase s t a r t e d , Tue Mar 30 22:54:20 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW GS23^ 5800 v i a ATAPI. ^-

97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146

Erase f ^hed, Tue Mar 30 23:15:43 2010 Disk U t i l i t y Erase s t a r t e d . Wed Mar 31 12:14:43 2010 Disk U t i l i t y E r a s i n g CD-RW media i n HL-DT-ST DVDRW GS23I^ SBOO v i a ATAPI. Disk U t i l i t y Erase f i n i s h e d , Wed Mar 31 12:23:33 2010 Disk U t i l i t y Erase s t a r t e d . Wed Mar 31 17:40:37 2010 Disk U t i l i t y E r a s i n g CD-RW media i n HL-DT-ST DVDRW GS23^ 5800 v i a ATAPI. Disk U t i l i t y Erase f i n i s h e d . Wed Mar 31 17:49:20 2010 Disk U t i l i t y Erase s t a r t e d , Thu Apr 1 19:27:39 2010 Disk U t i l i t y E r a s i n g CD-RW media i n HL-DT-ST DVDRW G523^ 5800 v i a ATAPI. Disk U t i l i t y Erase f i n i s h e d , Thu Apr 1 19:28:14 2010 Disk U t i l i t y Erase s t a r t e d , Thu Apr 1 23:08:53 2010 Disk U t i l i t y E r a s i n g CD-RW media i n HL-DT-ST DVDRW G523^ 5800 v i a ATAPI. Disk U t i l i t y Erase f i n i s h e d , Thu Apr 1 23:17:40 2010 Disk U t i l i t y Erase s t a r t e d . Wed Apr 7 09:33:11 2010 Disk U t i l i t y E r a s i n g CD-RW media i n HL-DT-ST DVDRW G523^ SBOO v i a ATAPI. Disk U t i l i t y Erase f i n i s h e d . Wed Apr 7 09:33:50 2010 Disk U t i l i t y Erase s t a r t e d , Thu Apr 8 14:18:26 2010 Disk U t i l i t y E r a s i n g CD-RW media i n HL-DT-ST DVDRW G523^ SBOO v i a ATAPI. Disk U t i l i t y Erase f i n i s h e d , Thu Apr 8 14:19:03 2010 Disk U t i l i t y Erase s t a r t e d . Sat Apr 10 12:18:29 2010 Disk U t i l i t y Disk U t i l i t y E r a s i n g CD-RW media i n HL-DT-ST DVDRW GS23^ SBOO v i a ATAPI. Erase f i n i s h e d . Sat Apr 10 12:19:06 2010 Disk U t i l i t y Erase s t a r t e d . Sun Apr 11 09:16:47 2010 Disk U t i l i t y E r a s i n g CD-RW media i n HL-DT-ST DVDRW 05231^ 5800 v i a ATAPI. Disk U t i l i t y Erase f i n i s h e d . Sun Apr 11 09:17:28 2010 Disk U t i l i t y Erase s t a r t e d , Mon Apr 12 17:04:16 2010 Disk U t i l i t y E r a s i n g CD-RW media i n HL-DT-ST DVDRW GS23^ 5800 v i a ATAPI. Disk U t i l i t y Erase f i n i s h e d , Mon Apr 12 17:04:52 2010 Disk U t i l i t y Finder: Burn s t a r t e d , Mon Apr 12 17:18:31 2010 Finder: Burn ^g t o DVDtRW (I^FODISC AlO) media w i t h DAO s t r a t e g y i n HL-DT-ST DVDRW GS23^ SBOO v i a ATAPI. Finder: Requested burn speed was 4x, a c t u a l burn speed i s 4x. Finder: Burn f i n i s h e d , Mon Apr 12 17:22:45 2010 Finder: V e r i f y s t a r t e d , Mon Apr 12 17:22:45 2010 Finder: V e r i f y f i n i s h e d , Mon Apr 12 17:25:49 2010 Disk U t i l i t y : Erase s t a r t e d , E r i Apr 16 22:33:44 2010 Disk U t i l i t y : E r a s i n g DVDtRW (ll^FODISC AlO) media i n HL-DT-ST DVDRW GS23^ 580^ v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d , F r i Apr 16 22:50:48 2010 Disk U t i l i t y : Erase s t a r t e d , Thu Apr 22 22:44:15 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW G523^ SBOO v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d , Thu Apr 22 22:52:59 2010 Disk U t i l i t y : Erase s t a r t e d , F r i Apr 23 23:59:23 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW G223^ 5800 v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d . Sat Apr 24 00:20:51 2010 F i n d e r : Burn s t a r t e d . Sat Apr 24 00:26:33 2010 F i n d e r : Burning t o CD-RW media w i t h SAO s t r a t e g y i n HL-DT-ST DVDRW GS23^ SBOO v i a ATAPI. Finder: Requested burn speed was max, a c t u a l burn speed i s 4x. Einder: Burn underrun p r o t e c t i o n i s supported, and enabled. Einder: Burn f i n i s h e d . Sat Apr 24 00:36:22 2010 F i n d e r : V e r i f y s t a r t e d . Sat Apr 24 00:36:22 2010 F i n d e r : DVDRW GS23^: SCSITask 948235.875000 CDB: Read ( 1 0 ) , b l o c k 92672, count:

147 148

149 150

151 152

153 154

155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170

171 172

173 174

175 176

177 178 179 180

512 f a i l e d w i t h s e r v i c^esponse ^ 1 (SERVICE^DELIVER^ ^TARGET^FAILURE), s t a t u s ^ 5 (DeliveryFailure) Finder: Retry ^ 1 Finder: DVDRW GS23^: SCSITask 948265.562500 CDB: Read ( 1 0 ) , b l o c k : 92672, count: 512 f a i l e d w i t h s e r v i c e response ^ 1 (SERVICE^DELIVER^^OR^TARGET^FAILURE), s t a t u s ^ 5 (DeliveryFailure) F i n d e r : Retry ^ 1 Finder: DVDRW GS23^: SCSITask 948280.562500 CDB: Read ( 1 0 ) , b l o c k : 92672, count: 512 f a i l e d w i t h s e r v i c e response ^ 1 (SERVICE^DELIVER^^OR^TARGET^FAILURE), s t a t u s ^ 5 (DeliveryFailure) Finder: Retry ^2 Finder: DVDRW GS23^: SCSITask 948295.562500 CDB: Read ( 1 0 ) , b l o c k : 92672, count: 512 f a i l e d w i t h s e r v i c e response ^ 1 (SERVICE^DELIVER^^OR^TARGET^FAILURE), s t a t u s - 5 (DeliveryFailure) Finder: Retry ^3 Finder: DVDRW GS23I^: SCSITask 948310.625000 CDB: Read ( 1 0 ) , b l o c k : 92672, count: 512 f a i l e d w i t h s e r v i c e response ^ 1 (SERVICE^DELIVER^^OR^TARGET^FAILURE), s t a t u s ^ 5 (DeliveryFailure) Finder: G i v i n g up Finder: V e r i f y f a i l e d . Sat Apr 24 00:39:46 2010 Finder: V e r i f y e r r o r : 0x80020063 V e r i f y i n g t h e burned data f a i l e d . Disk U t i l i t y : Erase s t a r t e d , Mon Apr 26 00:08:05 2010 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW 05231^ SBOO v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d , Mon Apr 26 00:29:21 2010 Disk U t i l i t y : Erase s t a r t e d , Tue Apr 27 23:53:21 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW GS23^ SBOO v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d . Wed Apr 28 00:02:03 2010 Finder: Burn s t a r t e d . Wed Apr 28 00:03:37 2010 Finder: Burning t o CD-RW media w i t h SAO s t r a t e g y i n HL-DT-ST DVDRW GS23^ SBOO v i a ATAPI. Finder: Requested burn speed was 4x, a c t u a l burn speed i s 4x. Finder: Burn underrun p r o t e c t i o n i s supported, and enabled. Finder: Burn f i n i s h e d . Wed Apr 28 00:13:29 2010 Finder: V e r i f y s t a r t e d . Wed Apr 28 00:13:29 2010 Finder: DVDRW GS23I^: SCSITask 1292453.250000 CDB: Read ( 1 0 ) , b l o c k : 98816, count: 512 f a i l e d w i t h s e r v i c e response ^ 1 (SERVICE^DELIVERY^OR^TARGET^FAILURE), status ^ 5 (DeliveryFailure) Finder: Retry ^ 1 Finder: DVDRW GS23^: SCSITask 1292468.375000 CDB: Read ( 1 0 ) , b l o c k : 98816, count: 512 f a i l e d w i t h s e r v i c e response ^ 1 (SERVICE^DELIVER^ OR TARGET^FAILURE), status ^ 5 (DeliveryFailure) Finder: Retry ^2 Finder: DVDRW GS23^: SCSITask 1292483.250000 CDB: Read ( 1 0 ) , b l o c k : 98816, count: 512 f a i l e d w i t h s e r v i c e response ^ 1 (SERVICE^DELIVERY^OR^TARGET^FAILURE), status - 5 (DeliveryFailure) Finder: Retry ^3 Finder: DVDRW G523^: SCSITask 1292498.375000 CDB: Read ( 1 0 ) , b l o c k : 98816, count: 512 f a i l e d w i t h s e r v i c e response ^ 1 (SERVICE^DELIVER^^OR^TARGET^FAILURE), status ^ 5 (DeliveryFailure) Finder: G i v i n g up Finder: V e r i f y f a i l e d . Wed Apr 28 00:16:14 2010 Finder: V e r i f y e r r o r : 0x80020063 V e r i f y i n g t h e burned data f a i l e d . Finder: Burn s t a r t e d , F r i Apr 30 18:28:24 2010

181 182 183 184 185 186 187 188 189 190

Finder: Burning t o CD media w i t h SAO s t r a t e g y i n HI -ST DVDRW GS23I^ 5800 v i a ATAPI. Finder: Requested burn speed was lOx, a c t u a l burn speed i s lOx. Finder: Burn underrun p r o t e c t i o n i s supported, and enabled. Finder: Burn f i n i s h e d , F r i Apr 30 18:29:03 2010 Finder: V e r i f y s t a r t e d , F r i Apr 30 18:29:03 2010 F i n d e r : V e r i f y f i n i s h e d , F r i Apr 30 18:29:07 2010 Disk U t i l i t y : Erase s t a r t e d . Wed May 5 05:23:11 2010 Disk U t i l i t y : E r a s i n g CD-RW media i n HL-DT-ST DVDRW GS23^ SBOO v i a ATAPI. Disk U t i l i t y : Erase f i n i s h e d . Wed May 5 05:31:59 2010

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53

-k-k-k-k-k-k-k-k-kt

2010-01-29 15:07:11 -0^00: Disk U t i l i t y 2010-01-29 15:07:22 -0500: Name : Macintosh HD Type : Volume

started.

disk0s2 Disk I d e n t i f i e r / Mount P o i n t : Mac OS X System Name : 10. 6 System V e r s i o n : System B u i l d : 10A432 Mac OS Extended (Journaled) F i l e System : SATA Connection Bus : lODeviceTree:/PCI0@0/5ATA@B/PRT0@0/PMP@0 Device Tree : W r i t a b l e : Yes U n i v e r s a l Unique I d e n t i f i e r : F8C8E85A-158E-33E8-9D38-87394DAA8D32 CapacitLy : 215.69 GB (215, 687, 888, 896 Bytes) Free Space : 164.4 GB (164,395,950,080 Bytes) Used : 51.29 GB (51,291,938,816 Bytes) Number o f F i l e s : 410,777 Number o f Folders : 115,717 Yes Owners Enabled : Can Turn Owners O f f : Yes Can Repair Permissions : Yes Can Be V e r i f i e d : Yes Can Be Repaired : Yes Can Be Formatted : Yes Bootable : Yes Supports J o u r n a l i n g Yes Journaled : Yes Disk Number : 0 P a r t i t i o n Number :

^k*-k*-k-k*-k-k

2010- 01 -30 23 21 39 -0500 20102010201020102010201020102010201020102010201020102010201001 -30 01 -30 01 -30 01 -30 01 -30 01 -30 01 -30 01 -30 01 -30 01 -30 01 -30 01 -30 01 -30 01 -30 01 -30 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 22 22 22 22 22 22 22 22 22 22 22 22 26 26 26 40 50 50 50 50 50 50 50 50 50 50 50 21 21 28 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500

Disk U t i l i t y

started.

Burning Image " I f s l i v e c d - x 8 6 64-6.3-r2014-nosrc.iso" Image name: " I f s l i v e c d - x 8 6 64-6.3-r2014-nosrc.iso" Burn d i s c i n : "HL-DT-ST DVDRW GS23N" Erase d i s c b e f o r e b u r n i n g : No Leave d i s c appendable: No V e r i f y burned data a f t e r b u r n i n g : Yes Eject disc a f t e r burning Preparing data f o r burn Opening s e s s i o n Opening t r a c k Writing track Closing track Closing session F i n i s h i n g burn -1-

oTV--' Jv'

PROSECUTION EXHIBIT Jl5_for identificatioh PAGE OFFERED: PAGE ADMITTED; PAGE OF PAGES

54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103

2010-01-30 23:26:28 2010-01-30 23:26:28 2010-01-30 23:29:40 2010-01-30 23:30:13 successfully. 2010-01-30 23:30:25 succeeded 2010-01-30 23:32:36
k-k-k-kkkk-k-k-k

0 -OoOO -0500 -0500

V e r i f y i n g burn... Verifying Burn completed s u c c e s s f u l l y Image " I f s l i v e c d - x 8 6 _ 6 4 - 6 . 3 - r 2 0 1 4 - n o s r c . i s o "

burned

-0500: E j e c t o f " I f s l i v e c d - x 8 6 64-6.3-r2014-nosrc.iso' -0500: Unmount o f "OTHER" succeeded started.

2010-01-30 23:33:13 -0500: Disk U t i l i t y


k - k k ^ - k k k - k k k k

2010-01-31 00:10:28 -0500: Disk U t i l i t y ********** 2010-01-31 00:38:00 -0500: Disk U t i l i t y 2010-01 -31 00:38:26 -0500 2010-01 -31 00:38:26 -0500 2010-01 -31 00:38:26 -0500 2010-01 -31 00:38:29 -0500 2010-01 -31 00:39:12 -0500 2010-01 -31 00:39:12 -0500 0.0% complete. 2010-01 -31 00:39:12 -0500 2010-01 -31 00:39:12 -0500 2010-01 -31 00:39:18 -0500 2010-01 -31 00:39:18 -0500 2010-01 -31 00:39:18 -0500 2010-01 -31 00:39:22 -0500 2010-01 -31 04:19:35 -0500 2010-01 -31 04:27:00 -0500 2010-01 -31 04:27:45 -0500 2010-01 -31 04:27:45 -0500 hours, 48 minutes. 2010-01 -31 04:27:45 -0500; 2010-01 -31 04:27:45 -0500;
k k k k k k k

started.

started. 'Macintosh HD'

Preparing 35 Pass Creating Securely Mounting

t o Secure Erase Free Space Erase Free Space temporary f i l e erasing f i l e disk

Secure Erase Free Space stopped a f t e r 43 seconds. Erase complete. P r e p a r i n g t o Secure Erase Free Space : "Macintosh HD' 7 Pass Erase Free Space C r e a t i n g temporary f i l e Securely e r a s i n g f i l e C r e a t i n g temporary f i l e Securely e r a s i n g f i l e Mounting d i s k Secure Erase Free Space completed s u c c e s s f u l l y i n 3 Erase complete. started.

2010-02 -01 12:23:46 -0500: Disk U t i l i t y 2010- 02 -01 2010- 02 -01 2010- 02 -01 2010- 02 -01 2010- 02 -01 2010- 02 -01 2010- 02 -01 2010- 02 -01 2010- 02 -01 2010- 02 -01 2010- 02 -01 2010- 02 -01 2010- 02 -01 12 12 12 12 12 12 12 12 12 12 12 12 12 26 26 26 26 26 26 26 26 26 26 26 26 30 28 31 31 31 31 31 31 31 31 31 31 31 17 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500 -0500

Burning Image " I f s l i v e c d - x 8 6 - 6 . 3 - r 2 1 4 5 - n o s r c . i s o " Image name: " I f s l i v e c d - x 8 6 - 6 . 3 - r 2 1 4 5 - n o s r c . i s o " Burn d i s c i n : "HL-DT-ST DVDRW G223N" Erase d i s c b e f o r e b u r n i n g : No Leave d i s c appendable: No V e r i f y burned data a f t e r b u r n i n g : Yes Eject disc a f t e r burning Preparing data f o r burn Opening session Opening t r a c k Writing track Closing t r a c k

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140

2010-02-01 2010-02-01 2010-02-01 2010-02-01 2010-02-01


k*k*kkk*--kk-

12 :30: 17 12 : 30: 23 12 :30: 23 12 : 30:23 12 :33: 45

1 -OuUO -0500 -0500 -0500

C l o s i n g session F i n i s h i n g burn V e r i f y i n g burn... Verifying Burn completed s u c c e s s f u l l y Disk U t i l i t y started.

2010-02-01 13 : 16:57 -0500

10 -0500 Burning Image "systemrescuecd-x86-l.3.5.iso" 2010-02-01 13 : 17 : 2010-02-01 13 : 17 :13 -0500 Image name: "systemrescuecd-x86-1.3.5.iso" 2010-02-01 13 : 17 :13 -0500 Burn d i s c i n : "HL-DT-ST DVDRW GS23N" 2010-02-01 13 : 17 :13 -0500 Erase d i s c b e f o r e b u r n i n g : No 2010-02-01 13 : 17 :13 -0500 Leave d i s c appendable: No 2010-02-01 13 : 17 :13 -0500 V e r i f y burned data a f t e r b u r n i n g : Yes 2010-02-01 13 : 17 :13 -0500 Eject disc a f t e r burning : 17 : 2010-02-01 13 13 -0500 2010-02-01 13 : 17 :13 -0500 P r e p a r i n g data f o r burn 2010-02-01 13 : 17 : 13 -0500 Opening s e s s i o n 2010-02-01 13 : 17 :13 -0500 Opening t r a c k 2010-02-01 13 : 17 :13 -0500 Writing track 2010-02-01 13 : 19:50 -0500 Closing track 2010-02-01 13 : 19:50 -0500 Closing session 57 -0500 2010-02-01 13 : 19: F i n i s h i n g burn 2010-02-01 13 : 19:57 -0500 V e r i f y i n g burn... 2010-02-01 13 : 19:57 -0500 Verifying 2010-02-01 13 :22: 08 -0500 Burn completed s u c c e s s f u l l y 2010-02-01 13 :22: 10 -0500 A d d i t i o n a l i n f o r m a t i o n can be found i n t h e - / L i b r a r y / L o g s/DiscRecording.log l o g f i l e . 2010-02-01 13 :22: 10 -0500 Image "systemrescuecd-x86-l.3.5.iso" burned successfully. 2010-02-01 13 :22: 10 -0500
k-kkkkk-kkr-k-k

2010-02-11 06 : 59:04 -1-0300

Disk U t i l i t y

started.

141 142 143 144 14 5 146 147 148

2010-02-11 06 : 59:18 -k0300 V e r i f y p e r m i s s i o n s f o r "Macintosh HD" 2010-02-11 07 :02: 31 -t-0300 User d i f f e r s on " p r i v a t e / e t c / b a s h r c " , should be user i s 501. 2010-02-11 07 :02: 31 -t-0300 Group d i f f e r s on " p r i v a t e / e t c / b a s h r c " , should be group i s 20. 2010-02-11 07 :02: 36 -t-0300 Permissions d i f f e r on "usr/share/derby", should d r w x r - x r - x , they are I r w x r - x r - x . 2010-02-11 07 :02: 56 -t-0300 Warning: SUID f i l e 'System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent' has been m o d i f i e d and w i l l not be r e p a i r e d . 2010-02-11 07:03:44 +0300 Permissions d i f f e r on "bin/rm", should be - r - x r - x r - x they are I r w x r - x r - x . 2010-02-11 07:03:48 -1-0300 2010-02-11 07:03:48 -1-0300 Permissions v e r i f i c a t i o n complete 2010-02-11 07:03:48 +0300 2010-02-11 07:03:48 +0300 2010-02-11 07:03:52 +0300; R e p a i r i n g p e r m i s s i o n s f o r "Macintosh HD" 2010-02-11 07:06:45 +0300: User d i f f e r s on " p r i v a t e / e t c / b a s h r c " , should be 0, -3-

149 150 151 152 153

154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193

user i s 501. 2010-02-11 07:06:45 +OJUO: Group d i f f e r s on " p r i v a t e / e t c / b a s h r c " , should be 0, group i s 20. 2010-02-11 07:06:45 +0300: Repaired " p r i v a t e / e t c / b a s h r c " . 2010-02-11 07:06:50 +0300: Permissions d i f f e r on "usr/share/derby", should be d r w x r - x r - x , they are I r w x r - x r - x . 2010-02-11 07:06:50 +0300: Repaired "usr/share/derby". 2010-02-11 07:07:13 +0300: Warning: SUID f i l e "System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/Mac05/ARDAgent' has been m o d i f i e d and w i l l not be r e p a i r e d . 2010- 02- 11 07 08 06 + 0300 Permissions d i f f e r on "bin/rm", should be - r - x r - x r - x they are I r w x r - x r - x 2010- 02- 11 07 08 06 + 0300 Repaired "bin/rm". 2010- 02- 11 07 08 10 + 0300 2010- 02- 11 07 08 10 + 0300 Permissions r e p a i r complete 2010- 02- 11 07 08 10 + 0300 2010- 02- 11 07 08 10 + 0300 20102010201020102010201002020202020211 11 11 11 11 11 0 11 11 11 11 11 11 11 11 11 11 11 07 07 07 07 07 07 4% 07 07 07 07 07 07 07 07 07 07 07 08 44 + 0300 08 44 + 0300 08 44 + 0300 08 48 + 0300 10 54 + 0300 10 54 + 0300 complete. 10 55 + 0300 10 55 + 0300 11 45 + 0300 11 53 + 0300 11 12 12 12 12 12 12 53 13 13 13 13 13 13 + + + + + + + 0300 0300 0300 0300 0300 0300 0300 P r e p a r i n g t o Secure Erase Free Space : "Macintosh HD" 7 Pass Erase Free Space C r e a t i n g temporary f i l e Securely e r a s i n g f i l e Mounting d i s k Secure Erase Free Space stopped a f t e r 2 minutes. Erase complete. C r e a t i n g Image "Strongbox.dmg" Unable t o c r e a t e "Strongbox.dmg." ^No space l e f t on

> . v S

2010- 022010- 022010- 022010- 02device) 2010- 022010- 022010- 022010- 022010- 022010- 022010- 02-

P r e p a r i n g t o erase : "OTHER" P a r t i t i o n Scheme: GUID P a r t i t i o n Table 1 volume w i l l be erased Name : "OTHER" Si^e : 34.03 GB Filesystem : MS-DOS (FAT)

2010- 02- 11 07 12 13 + 0300 Unmounting d i s k 2010- 02- 11 07 12 13 + 0300 E r a s i n g 2010- 02- 11 07 12 13 + 0300 512 bytes per p h y s i c a l s e c t o r / d e v / r d i s k 0 s 3 : 66425120 s e c t o r s i n 2075785 FAT32 c l u s t e r s (16384 b y t e s / c l u s t e r ) bps=512 spc=32 res=32 n f t = 2 mid=OxfO spt=32 hds=255 hid=0 bsec=66457600 bspf=16218 r d c l = 2 i n f s = l bkbs=6 20102010201020102010201020102010020202020202020211 11 11 11 11 11 11 11 07 07 07 07 07 07 07 07 12 12 12 13 13 13 14 14 13 14 14 23 24 24 17 19 + + + + + + + + 0300 0300 0300 0300 0300 0300 0300 0300 Mounting d i s k Erase complete C r e a t i n g Image 'strongbox.dmg' I n i t i a l ! zing... Creating... Formatting... Attaching.,.

194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244

2010- 02- 11 07 :14 .31 + 0 2010- 02- 11 07 :14 31 + 0jU0


*-kk^k-kk^-kkkk

Finishing... Image "strongbox.dmg" c r e a t e d Disk U t i l i t y started.

successfully.

2010- 02- 11 09 41 55 + 0300 2010- 02- 11 1 GB. 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 k k k k k k k k ** 2010- 02- 11 2010- 02- 11 6 GB. 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 k * k k k *** ** 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11
k -k kr -k k k k k k k

09 42 59 + 0300 09 09 09 09 09 09 09 09 43 43 43 43 43 43 43 44 13 20 20 50 51 51 51 00 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300

Growing p a r t i t i o n 0 o f "strongbox.dmg" from Resizing "strongbox.dmg" was s u c c e s s f u l . A t t a c h Image "strongbox.dmg" Initializing... Attaching... Mounting... Finishing... Finishing... Image "strongbox.dmg" a t t a c h e d s u c c e s s f u l l y Disk U t i l i t y started.

09 45 18 + 0300 09 45 52 + 0300 09 09 09 09 09 09 09 09 48 48 48 48 48 48 48 48 17 27 27 41 42 42 42 49 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300

Growing p a r t i t i o n 0 o f "strongbox.dmg" from Resizing "strongbox.dmg" was s u c c e s s f u l . A t t a c h Image "strongbox.dmg" Initializing... Attaching... Mounting... Finishing... Finishing... Image "strongbox.dmg" a t t a c h e d s u c c e s s f u l l y Disk U t i l i t y started.

09 53 09 + 0300 09 09 09 10 10 10 10 10 54 54 54 00 00 00 00 08 55 55 55 39 43 44 45 14 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300

C r e a t i n g Image "20100211-strongbox . cimg" Initializing... Creating... Formatting... Attaching... Finishing... Image "20100211-strongbox.dmg" c r e a t e d succ E j e c t o f "strongbox.dmg" succeeded Disk U t i l i t y started.

2010- 02- 11 10 17 58 + 0300


k k- k k k * * *

2010- 02- 11 10 22 14 + 0300 2010- 02- 11 10 24 42 + 0300


kkkkk-k-k-k-k-k

Disk U t i l i t y

started.

Unmount o f "OTHER" f a i l e d Disk U t i l i t y started.

2010- 02- 11 11 11 42 + 0300 2010- 02- 11 2010- 02- 11 2010- 02- 11 2010- 02- 11 11 11 11 11 12 12 12 12 01 45 45 45 + 0300 + 0300 + 0300 + 0300

Unmount o f "OTHER" succeeded Preparing t o erase : "Other" P a r t i t i o n Scheme: GUID P a r t i t i o n 1 volume w i l l be erased
-5-

Table

245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296

2010-02-11 11:12:45 + 1 2010-02-11 11:12:45 +OJUO 2010-02-11 11:12:45 +0300 2010-02-11 11:12:45 +0300 2010-02-11 11:12:47 +0300 2010-02-11 11:12:48 +0300 w i t h a 8192k j o u r n a l 2010-02-11 2010-02-11 2010-02-11 2010-02-11 Name : Type : 11:12:48 11:12:49 11:12:49 11:13:33 Other Volume +0300 +0300 +0300 +0300

Name Size Filesystem

"Other" 34.03 GB Mac OS Extended (Journaled)

Unmounting d i s k Erasing I n i t i a l i z e d /dev/rdisk0s3 as a 32 GB HFS Plus volume

Mounting d i s k Erase complete.

Disk I d e n t i f i e r : disk0s3 Mount P o i n t : /Volumes/Other F i l e System : Mac OS Extended (Journaled) SATA Connection Bus : Device Tree : lODeviceTree:/PCI0@0/SATA@8/PRT0@0/PMP@0 W r i t a b l e : Yes U n i v e r s a l Unique I d e n t i f i e r : CC1D74EC-E782-3E3A-8C17-9849E8A98D6C Capacity : 33.89 GB (33,892,241,408 Bytes) Free Space : 33.78 GB (33,776,410,624 Bytes) Used : 115.8 MB (115,830,784 Bytes) Number o f F i l e s : 40 Number o f F o l d e r s : Owners Enabled : No Can Turn Owners O f f Yes Can Be Formatted : Yes Bootable : Yes Supports J o u r n a l i n g Yes Journaled : Yes Disk Number : 0 P a r t i t i o n Number :

********** 2010-02-12 10:15:48 +0300: Disk U t i l i t y ********** 2010-02-12 12:26:23 +0300: Disk U t i l i t y

started.

started.

2010-02-12 12:26:42 +0300: Unmount o f "Other" f a i l e d 2010-02-12 13:45:54 +0300: Unmount of "Other" succeeded ********** 2010-02-12 16:24:15 +0300: Disk U t i l i t y 2010-02-12 2010-02-12 2010-02-12 2010-02-12 16:24:55 16:24:55 16:24:55 16:24:55 +0300 +0300 +0300 +0300 started.

P r e p a r i n g t o erase : "Images" P a r t i t i o n Scheme: GUID P a r t i t i o n 1 volume w i l l be erased Name : "Images"

Table

297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344

2010-02-12 16:24:55 + D : 2010-02-12 16:24:55 +0oU0: 2010-02-12 16:24:56 +0300 2010-02-12 16:24:57 +0300 2010-02-12 16:24:57 +0300 w i t h a 8192k j o u r n a l 2010 -02- 12 16 24 57 + 0300 2010 -02- 12 16 24 57 + 0300 2010 -02- 12 16 24 57 + 0300
k k k * k r k * k - k k

Size Filesystem

: 14.87 G E : Mac OS Extended (Journaled)

Unmounting d i s k Erasing I n i t i a l i z e d / d e v / r d i s k 0 s 3 as a 14 GB HFS Plus volume

Mounting d i s k Erase complete.

2010 -02- 14 15 30 19 + 0300 2010 -02- 14 2010 -02- 14 2010 -02- 14 2010 -02- 14 **** k kr kr -k -k k 2010 -02- 15 15 15 15 15 31 31 31 32 07 13 13 02 + 0300 + 0300 + 0300 + 0300

Disk U t i l i t y

started.

C r e a t i n g Image "video.dmg" P r e p a r i n g imaging engine... Reading whole d i s k (Apple HFS : 0), O p e r a t i o n canceled by user Disk U t i l i t y started.

04 34 01 + 0300 + 0300 +0300 +0300 +0300 +0300

2010 -02- 15 04 34 16 DVDRW GS23N" 2010-02-15 04:34:16 2010-02-15 04:34:51 2010-02-15 04:34:51 2010-02-15 04:34:51

P r e p a r i n g t o erase o p t i c a l media O p t i c a l erase option:' Quick Erase. O p t i c a l erase completed s u c c e s s f u l l y Erase complete.

i n 18 seconds.

2010-02-15 13:11:19 +0300: Disk U t i l i t y s t a r t e d . 2010-02-15 13:12:02 DVDRW GS23N" 2010-02-15 13:12:02 2010-02-15 13:20:50 2010-02-15 13:20:50 2010-02-15 13:20:50 +0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST +0300: O p t i c a l erase o p t i o n : Complete Erase. +0300: O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes. +0300: Erase complete. +0300: started.

********** 2010-02-21 02:34:57 +0300: Disk U t i l i t y 2010-02-21 03:13:13 DVDRW GS23N" 2010-02-21 03:13:13 2010-02-21 03:22:02 2010-02-21 03:22:02 2010-02-21 03:22:02 **********

+0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST +0300 +0300 +0300 +0300 O p t i c a l erase o p t i o n : Complete Erase. O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes. Erase complete.

2010-02-23 17:13:07 +0300: Disk U t i l i t y s t a r t e d . 2010-02-23 17:14:20 DVDRW GS23N" 2010-02-23 17:14:20 2010-02-23 17:14:51 2010-02-23 17:14:51 +0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e +0300 +0300 +0300 O p t i c a l erase o p t i o n : Quick Erase. O p t i c a l erase completed s u c c e s s f u l l y Erase complete. -7HL-DT-ST

i n 18 seconds

345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 37 7 378 37 9 380 381 382 383 384 385 386 387 388 389 390 391 392 393

2010-02-23 17:14:51 +
kk-kkkk-k-k-k-k

2010-02-27 12:20:18 +0300: Disk U t i l i t y s t a r t e d .


k k k r k k k k - k - k - k

2010-02-27 13:19:12 +0300: Disk U t i l i t y s t a r t e d . 2010-02-27 13:19:49 DVDRW G52 3N" 2010-02-27 13:19:49 2010-02-27 13:41:16 2010-02-27 13:41:16 2010-02-27 13:41:16 ********** +0300 +0300 +0300 +0300 +0300 P r e p a r i n g t o erase o p t i c a l media on d e v i c e 'HL-DT-ST

O p t i c a l erase o p t i o n : Complete Erase. O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes. Erase complete.

2010-03-02 17:26:23 +0300: Disk U t i l i t y s t a r t e d . 2010-03-02 17 DVDRW GS23N" 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 17 2010-03-02 18 2010-03-02 18 successfully. ********** 26:45 +0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST 26 48 48 48 48 48 48 48 48 48 48 48 48 48 48 48 56 56 56 56 56 00 24 45 05 05 05 51 54 54 54 54 54 54 54 54 54 54 54 19 19 50 50 50 54 32 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 + 0300 O p t i c a l erase o p t i o n : Complete Erase. O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes. Erase complete. Burning Image "systemrescuecd-x86-1.3.5.iso" Image name: "systemrescuecd-x86-l.3.5.iso" Burn d i s c i n : "HL-DT-ST DVDRW GS23N" Erase d i s c b e f o r e b u r n i n g : No Leave d i s c appendable: No V e r i f y burned data a f t e r b u r n i n g : Yes Eject disc a f t e r burning P r e p a r i n g data f o r burn Opening s e s s i o n Opening t r a c k Writing track Closing track Closing session F i n i s h i n g burn V e r i f y i n g burn... Veri tying Burn completed s u c c e s s f u l l y Image "systemrescuecd-x86-1.3.5.iso"

burned

2010-03-05 00:33:41 +0300: Disk U t i l i t y 2010-03-05 00:34:11 DVDRW G523N" 2010-03-05 00:34:11 2010-03-05 00:42:59 2010-03-05 00:42:59 2010-03-05 00:42:59 +0300 +0300 +0300 +0300 +0300

started. 'HL-DT-ST

P r e p a r i n g t o erase o p t i c a l media on d e v i c e O p t i c a l erase o p t i o n : Complete Erase. O p t i c a l erase completed s u c c e s s f u l l y i n Erase complete.

minutes,

*********^ 2010-03-09 15:57:47 +0300: Disk U t i l i t y s t a r t e d . -8-

394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442

2010-03-09 15:57:58 2010-03-09 15:58:01 2010-03-09 15:58:01 2010-03-09 15:58:01 2010-03-09 15:58:01 2010-03-09 15:58:01 2010-03-09 15:58:01 2010-03-09 15:58:01 2010-03-09 15:58:01 2010-03-09 15:58:01 2010-03-09 15:58:01 2010-03-09 15:58:01 2010-03-09 16:05:01 2010-03-09 16:05:16 2010-03-09 16:05:44 2010-03-09 16:05:44 2010-03-09 16:05:44 2010-03-09 16:09:37 2010-03-09 16:10:51 successfully.
k - k k r k - k k r k k k k

+OjUO +0300 +0300 +0300 +0300 +0300 +0300 +0300 +0300 +0300 +0300 +0300 +0300 +0300 +0300 +0300 +0300 +0300 +0300

Burning Image "systemrescueca-x86-1.3.5.iso" Image name: "systemrescuecd-x86-l.3.5.iso' Burn d i s c i n : "HL-DT-ST DVDRW GS23N" Erase d i s c b e f o r e b u r n i n g : No Leave d i s c appendable: No V e r i f y burned data a f t e r b u r n i n g : Yes Eject disc a f t e r burning P r e p a r i n g data f o r burn Opening s e s s i o n Opening t r a c k Writing track Closing track Closing session F i n i s h i n g burn V e r i f y i n g burn... Verifying Burn completed s u c c e s s f u l l y Image "systemrescuecd-x86-l.3.5.iso" burned

2010-03-11 10:33:10 +0300: Disk U t i l i t y s t a r t e d .


k - k k k k k k k k - k

2010-03-14 08:23:02 +0300: Disk U t i l i t y s t a r t e d . 2010-03-14 08:25:54 DVDRW GS23N" 2010-03-14 08 25:54 2010-03-14 08 47:15 2010-03-14 08 47:15 2010-03-14 08 47:15
- j l r * - ^ * * * * * - * - *

+0300: P r e p a r i n g t o erase o p t i c a l media on device : "HL-DT-ST +0300 +0300 +0300 +0300 O p t i c a l erase o p t i o n : Complete Erase. O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes. Erase complete.

2010-03-14 12:19:12 +0300: Disk U t i l i t y s t a r t e d . 2010-03-14 12:19:23 DVDRW G523N" 2010-03-14 12:19:23 2010-03-14 12:29:28 2010-03-14 12:29:28 2010-03-14 12:29:28
k k k k k k k k k k

+0300: P r e p a r i n g t o erase o p t i c a l media on device

HL-DT-ST

+0300: O p t i c a l erase o p t i o n : Complete Erase. +0300: O p t i c a l erase completed s u c c e s s f u l l y i n 9 minutes. +0300: Erase complete. +0300:

2010-03-22 17:00:57 +0300: Disk U t i l i t y s t a r t e d . 2010-03-22 17:01:10 DVDRW GS23N" 2010-03-22 17:01:10 2010-03-22 17:22:37 2010-03-22 17:22:37 2010-03-22 17:22:37
k k k - k k k ' - k k r k k

+0300: P r e p a r i n g t o erase o p t i c a l media on device : "HL-DT-ST +0300: O p t i c a l erase o p t i o n : Complete Erase. +0300: O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes. +0300: Erase complete. +0300:

2010-03-24 15:32:05 +0300: Disk U t i l i t y s t a r t e d . -9-

443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487

2010- 03 -24 15 32 46 +0300: DVDRW GS23N " 2010- 03 -24 15 32 46 +0300: 2010- 03 -24 15 32 48 +0300: w i t h an e r r o r . See t h e DiscRecording l o g informat ion 2010- 03 -24 15 32 48 +0300: 2010- 03 -24 15 32 48 +0300: k -k k k k *** 2010- 03 -28 19 48 21 +0300: 2010- 03 -28 21 DVDRW GS23N " 2010- 03 -28 21 2010- 03 -28 21 2010- 03 -28 21 2010- 03 -28 21
k - k k r - k k k k k k k

'HL-DT-ST

14 30 +0300: 14 35 35 35 30 48 48 48 +0300: O p t i c a l erase o p t i o n : Complete Erase. +0300: O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes. +0300: Erase complete. +0300:

2010- 03 -30 18 54 59 +0300: ** *** 2010- 03 -30 22 54 04 +0300: 2010- 03 -30 22 DVDRW GS23N " 2010- 03 -30 22 2010- 03 -30 23 2010- 03 -30 23 2010- 03 -30 23 2010- 03 -31 12 DVDRW G223N" 2010- 03 -31 12 2010- 03 -31 12 2010- 03 -31 12 2010- 03 -31 12 2010- 03 -31 17 DVDRW G223N " 2010- 03 -31 17 2010- 03 -31 17 2010- 03 -31 17 2010- 03 -31 17
-k-k-kkk-kk-kkk

54 20 +0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST 54 15 15 15 14 14 23 23 23 40 40 49 49 49 20 43 43 43 43 43 33 33 33 37 37 20 20 20 +0300: O p t i c a l erase o p t i o n : Complete Erase. +0300: O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes. +0300: Erase complete. +0300: +0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST +0300: O p t i c a l erase o p t i o n : Complete Erase. +0300: O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes. +0300: Erase complete. +0300: +0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST +0300: O p t i c a l erase o p t i o n : Complete Erase. +0300: O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes. +0300: Erase complete. +0300: started. 'HL-DT-ST

2010- 04 -01 19 27 29 +0300: Disk U t i l i t y 2010- 04 -01 19 DVDRW G223N " 2010- 04 -01 19 2010- 04 -01 19 2010- 04 -01 19 2010- 04 -01 19 27 39 +0300: 27 28 28 28 39 14 14 14

+0300: O p t i c a l erase o p t i o n : Quick Erase. +0300: O p t i c a l erase completed s u c c e s s f u l l y +0300: Erase complete. +0300: -10-

i n 18 seconds,

488 489 4 90 491 4 92 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534

********** 2010-04-01 23:04:29 2010-04-01 23:08:53 DVDRW GS23N" 2010-04-01 23:08:53 2010-04-01 23:17:40 2010-04-01 23:17:40 2010-04-01 23:17:40
k k k k k k k k k - k

+OJOO:

Disk U t i l i t y s t a r t e d .

+0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST +0300 +0300 +0300 +0300 O p t i c a l erase o p t i o n : Complete Erase. O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes. Erase complete.

2010-04-07 09:32:49 +0300: Disk U t i l i t y 2010-04-07 09:33:11 DVDRW GS2 3N" 2010-04-07 09:33:11 2010-04-07 09:33:50 2010-04-07 09:33:50 2010-04-07 09:33:50

started.

+0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST +0300 +0300 +0300 +0300 O p t i c a l erase o p t i o n : Quick Erase. O p t i c a l erase completed s u c c e s s f u l l y Erase complete.

i n 18 seconds.

********* 2010-04-08 14:18:05 +0300: Disk U t i l i t y s t a r t e d . 2010-04-08 14:18:26 DVDRW GS23N" 2010-04-08 14:18:26 2010-04-08 14:19:03 2010-04-08 14:19:03 2010-04-08 14:19:03 +0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST +0300 +0300 +0300 +0300 O p t i c a l erase o p t i o n : Quick Erase. O p t i c a l erase completed s u c c e s s f u l l y Erase complete.

i n 18 seconds.

********** 2010-04-09 14:32:52 +0300: Disk U t i l i t y

started.

********** 2010-04-10 12:18:12 +0300: Disk U t i l i t y s t a r t e d . 2010-04-10 12:18:29 DVDRW GS23N" 2010-04-10 12:18:29 2010-04-10 12:19:06 2010-04-10 12:19:06 2010-04-10 12:19:06 +0300: P r e p a r i n g t o erase o p t i c a l media on device : "HL-DT-ST +0300 +0300 +0300 +0300 O p t i c a l erase o p t i o n : Quick Erase. O p t i c a l erase completed s u c c e s s f u l l y Erase complete.

i n 18 seconds.

********** 2010-04-11 09:16:33 +0300: Disk U t i l i t y s t a r t e d . 2010-04-11 09:16:47 DVDRW GS23N" 2010-04-11 09:16:47 2010-04-11 09:17:28 2010-04-11 09:17:28 2010-04-11 09:17:28 +0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e +0300 +0300 +0300 +0300 O p t i c a l erase o p t i o n : Quick Erase. O p t i c a l erase completed s u c c e s s f u l l y Erase complete. 'HL-DT-ST

i n 18 seconds.

2010-04-12 17:02:56 +0300: Disk U t i l i t y s t a r t e d . 2010-04-12 17:04:16 +0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST DVDRW GS23N" -11-

535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 5 67 568 569 570 571 572 57 3 57 4 575 576 577 578 579 580 581 582

2010- 04 -12 2010- 04 -12 2010- 04 -12 2010- 04 -12 ***** ** *** 2010- 04 -16

17 17 17 17

04 04 04 04

16 52 52 52

+ 0: O p t i c a l erase o p t i o n : Quic rase. +OjOO: O p t i c a l erase completed s u c c e s s f u l l y +0300: Erase complete. +0300:

seconds. i n 18

22 33 27 +0300: Disk U t i l i t y s t a r t e d . +0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT +0300 +0300 +0300 +0300 O p t i c a l erase o p t i o n : Complete Erase. O p t i c a l erase completed s u c c e s s f u l l y i n 16 minutes. Erase complete.

2010- 04 -16 22 33 44 DVDRW GS23N" 2010-04-16 22:33:44 2010-04-16 22:50:48 2010-04-16 22:50:48 2010-04-16 22:50:48 **********

2010-04-22 22:43:54 +0300: Disk U t i l i t y 2010-04-22 22:44:15 DVDRW G523N" 2010-04-22 22:44:15 2010-04-22 22:52:59 2010-04-22 22:52:59 2010-04-22 22:52:59
k k k - k - k k * * * *

started.

+0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST +0300 +0300 +0300 +0300 O p t i c a l erase o p t i o n : Complete Erase. O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes, Erase complete.

2010-04-23 23:56:10 +0300: Disk U t i l i t y 2010-04-23 23:59:23 DVDRW G523N" 2010-04-23 23:59:23 2010-04-24 00:20:51 2010-04-24 00:20:51 2010-04-24 00:20:51 **********

started.

+0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST +0300 +0300 +0300 +0300 O p t i c a l erase o p t i o n : Complete Erase. O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes. Erase complete.

2010-04-26 00:07:49 +0300: Disk U t i l i t y s t a r t e d . 2010-04-26 00:08:05 DVDRW GS23N" 2010-04-26 00:08:05 2010-04-26 00:29:21 2010-04-26 00:29:21 2010-04-26 00:29:21 ********** +0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST +0300 +0300 +0300 +0300 O p t i c a l erase o p t i o n : Complete Erase. O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes. Erase complete.

2010-04-27 23:52:37 +0300: Disk U t i l i t y s t a r t e d . 2010-04-27 23:53:21 DVDRW GS23N" 2010-04-27 23:53:21 2010-04-28 00:02:03 2010-04-28 00:02:03 2010-04-28 00:02:03 ********** +0300: P r e p a r i n g t o erase o p t i c a l media on device : "HL-DT-ST +0300 +0300 +0300 +0300 O p t i c a l erase o p t i o n : Complete Erase. O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes. Erase complete.

2010-05-05 05:22:55 +0300: Disk U t i l i t y s t a r t e d . 2010-05-05 05:23:11 +0300: P r e p a r i n g t o erase o p t i c a l media on d e v i c e : "HL-DT-ST -12-

583 584 585 586 587

DVDRW G523N" 2010-05-05 05:23:11 2010-05-05 05:31:59 2010-05-05 05:31:59 2010-05-05 05:31:59

+O3OO +0300 +0300 +0300

O p t i c a l erase o p t i o n : Complete Erase. O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes. Erase complete.

-1^-

10 11 12 13 14 15 16 17 18 19 20 21 22

23 24 25 26 27 28 29 30 31 32

Jan 25 06:16:17 l o c a l . . Unknown[78]: Launching t h e L aage Chooser f o r an OS Install Jan 25 06:17:49 l o c a l h o s t LCA[79]: Folder Manager i s being asked t o c r e a t e a f o l d e r (each) w h i l e r u n n i n g as u i d 0 Jan 25 06:17:55 l o c a l h o s t LCA[79]: Using keyboard l a y o u t 0 Jan 25 06:17:56 l o c a l h o s t LCA[79]: Found p r i m a r y language h i n t "en" Jan 25 06:18:04 l o c a l h o s t LCA[79]: Launching t h e I n s t a l l e r u s i n g language code "English" Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] Mac 05 X I n s t a l l e r a p p l i c a t i o n s t a r t e d Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] 1 d i s p l a y ( s ) found. Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] D i s p l a y [ 1 ] i s u s i n g OpenGL acceleration. Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] @(#)PROGRAM:Install PROJECT:Install-572 Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] @(#)PROGRAM:Mac OS X I n s t a l l e r PROJECT:05Installer-255 Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] Hardware: MacBookPro5,5 @ 2.53 GHz (x 2 ) , 4096 MB RAM Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] Running OS B u i l d : Mac OS X 10.6 (10A432) Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] Env: DYLD_N0_FIX_PREBINDING=1 Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] Env: PATH=/usr/bin:/bin:/usr/sbin:/sbin Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] Env: PWD=/ Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] Env: SHLVL=1 Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] Env: OS INSTALL=1 Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] Env: _=/System/Instaliation/GDI5/LCA.app/Contents/MacOS/LCA Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] : Using i n s t a l l media product a t /System/Installation/Packages Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] : Opening O S I n s t a l l package '/System/Installation/Packages/OSInstall.mpkg'. Jan 25 06:18:08 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] : Memory s t a t i s t i c s f o r ' I n s t a l l Mac OS X' pane: Jan 25 06:18:08 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] : P h y s i c a l Memory A l l o c a t i o n : 509 MB wired, 259 MB t r a p p e d , 70 MB a c t i v e , 39 MB i n a c t i v e , 3219 MB f r e e , 3328 MB usable, 4096 MB t o t a l Jan 25 06:18:26 l o c a l host Unknown[80] : 2010-01-25 06:18:26.045 Disk U t i l i t y [ 1 6 4 : 9 0 3 ] ********** Jan 25 06:18:26 l o c a l h o s t Unknown[80] 2010-01-25 06:18:26.107 Disk U t i l i t y [ 1 6 4 : 9 0 3 ] Disk U t i l i t y s t a r t e d Jan 25 06:18:26 l o c a l h o s t Unknown[80] Jan 25 06:18:55 l o c a l h o s t Unknown[80] 2010-01-25 06:18:55.326 Disk U t i l i t y [ 1 6 4 : 9 0 3 ] E j e c t o f "Seagate FreeAgent Media" succeeded Jan 25 06:20:26 l o c a l h o s t Unknown[80]: 2010-01-25 06:20:26.774 Disk U t i l i t y [ 1 6 4 : 9 0 3 ] P r e p a r i n g t o zero d i s k : "Macintosh HD" Jan 25 06:20:26 l o c a l h o s t Unknown[80]: 2010-01-25 06:20:26.775 Disk Utility[164:903] Passes :0 Jan 25 06:37:39 greybox c o n f i g d [ 6 5 ] : subnet r o u t e _ i f _ i n d e x : can't g e t i n t e r f a c e name Jan 25 06:37:50 greybox O S I n s t a l l e r [ 1 5 4 ] A l l o w i n g machine s l e e p . Jan 25 06:37:54 greybox 0 S I n s t a l l e r l l 5 4 ] Memory s t a t i s t i c s f o r ' I n s t a l l Mac OS X' pane: Jan 25 06:37:54 greybox O S I n s t a l l e r [ 1 5 4 ] Physical Memory Allocation: 541 MB ^'^^

PROSECUTION EXHIBITl^foridentifi^OTpn PAGE OFFERED: PAGE ADMITTED; PAGE \ OF 1 PAGES

33 34 35 36 37 38 39 40 41 42 43 44

45 46 47 48 49 50

51

52 53 54 55 56 57 58 59 60

wired, 258 MB t r a p p 85 MB a c t i v e , 58 MB i n a /e, 3154 MB f r e e , 3297 MB usable, 4096 MB t o t a l Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.314 Disk U t i l i t y [ 1 6 4 : 9 0 3 ] Secure Erase completed s u c c e s s f u l l y i n 1 hour, 4 minutes. Jan 25 07:25:28 greybox Unknown[80]: Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.315 Disk U t i l i t y [ 1 6 4 : 9 0 3 ] P r e p a r i n g t o erase : "Macintosh HD" Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.316 Disk Utility[164:903] P a r t i t i o n Scheme: GUID P a r t i t i o n Table Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.316 Disk Utility[164:903] 1 volume w i l l be erased Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.317 Disk Utility[164:903] Name : "Macintosh HD" Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.319 Disk Utility[164:903] Size : 215.69 GB Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.320 Disk Utility[164:903] Filesystem : Mac OS Extended (Journaled) Jan 25 07:25:28 greybox Unknown[80]: Jan 25 07:25:28 greybox Unknown[80] 2010-01-25 07:25:28.339 Disk &j6 U t i l i t y [ 1 6 4 : 9 0 3 ] Unmounting d i s k c / 3U W Jan 25 07:25:28 greybox Unknown[80] 2010-01-25 07:25:28.375 Disk U t i l i t y [ 1 6 4 : 9 0 3 ] Erasing o a a Jan 25 07:25:32 greybox Unknown[80]: 2010-01-25 07:25:32.349 Disk U t i l i t y [ 1 6 4 : 9 0 3 ] I n i t i a l i z e d / d e v / r d i s k 0 s 2 as a 201 GB HFS Plus volume w i t h 24576k j o u r n a l Jan 25 07:25:32 greybox Unknown[80]: Jan 25 07:25:32 greybox Unknown[80] 2010-01-25 07:25:32.352 Disk U t i l i t y [ 1 6 4 : 9 0 3 ] Mounting d i s k Jan 25 07:25:33 greybox Unknown[80] 2010-01-25 07:25:33.018 Disk U t i l i t y [ 1 6 4 : 9 0 3 ] Erase complete. Jan 25 07:25:33 greybox Unknown[80] 2010-01-25 07:25:33.019 Disk U t i l i t y [ 1 6 4 : 9 0 3 ] Jan 25 07:25:45 greybox O S I n s t a l l e r [ 1 5 4 ] : A l l o w i n g machine sleep. Jan 25 07:25:48 greybox Unknown[80]: 2010-01-25 07:25:48.926 Disk U t i l i t y [ 1 6 4 : 9 0 3 ] NSDocumentController's i n v o c a t i o n o f -[NSFileManager URLForDirectory:inDomain:appropriateForURL:create:error:] returned n i l f o r N S A u t o s a v e d I n f o r m a t i o n D i r e c t o r y . Here's t h e e r r o r : Jan 25 07:25:48 greybox Unknown[80]: E r r o r Domain=N5CocoaErrorDomain Code=642 Userinf0=0x10808f14 0 "You can't save t h e f i l e "Autosave I n f o r m a t i o n " because the volume "Mac 05 X I n s t a l l DVD" i s read o n l y . " U n d e r l y i n g E r r o r = ( E r r o r Domain=NSP05IXErrorDomain Code=30 "The o p e r a t i o n c o u l d n ' t be completed. Read-only f i l e system") Jan 25 07:25:48 greybox Unknown[80]: Jan 25 07:25:52 greybox O S I n s t a l l e r [ 1 5 4 ] : P r e v e n t i n g machine sleep. Jan 25 07:25:56 greybox O S I n s t a l l e r [ 1 5 4 ] :

gZ2

Jan 25 07:25:56 greybox O S I n s t a l l e r [ 1 5 4 ] Choices s e l e c t e d f o r i n s t a l l a t i o n : Jan 25 07:25:56 greybox O S I n s t a l l e r [ 1 5 4 ] I n s t a l l : "Mac 05 X" Jan 25 07:25:56 greybox O S I n s t a l l e r [ 1 5 4 ] I n s t a l l : " E s s e n t i a l System S o f t w a r e " Jan 25 07:25:56 greybox O S I n s t a l l e r [ 1 5 4 ] BaseSystem.pkg : com.apple.pkg.BaseSystern : 10.6.0.1.1.1249291854 Essentials.pkg Jan 25 07:25:56 greybox O S I n s t a l l e r [ 1 5 4 ] : com.apple.pkg.Essentials : 10.6.0.1.1.1249291854 Jan 25 07:25:56 greybox O S I n s t a l l e r [ 1 5 4 ] : BootCamp.pkg :

1' 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50

/Volumes/1002150621, 17BE2-FDDC-102D-60B34786952A5i 12 JUL 07 CZ ENGAGEMENT ZONE 30 GC Anyone.avi /Volumes/100215_0 621/B98178E2-FDDC-102D-60834 78 6952A5C90/B98178E2-FDDC-102D-60B34 7 8 6952A5C90.zip /Volumes/100215_0621/69817BE2-FDDO-102D-60634786952A5C90/12_0950D_JUL_07_SAF_ATTK_O N_l-8_CAV_IN_NEW_8AGHDAD.ppt /Volumes/100215_062l/il/wl/c3.txt /Volumes/100215_0621/il/wl/IIR 5 391 0014 08 C l a s s i f i e d Documents on W i k i l e a k s . p d f /Volumes/100215_0621/il/09REYKJAVIK228.txt /Volumes/100215_0621/il/10REYKJAVIKl3.txt /Volumes/I00215_062l/il/10REYKJAVIK3.txt /Volumes/100215_0621/11/10REYKJAVIK4.txt /Volumes/I00215_0621/il/10REYKJAVIK9.txt /Volumes/100215_0621/il/persons/Jonsson.pdf /Volumes/I00215_0621/11/persons/Sigurdardottir.pdf /Volumes/I00215_0621/il/persons/Skarphedinsson.pdf /Volumes/10022l_0141/7b31f6a.zip /Volumes/I00224 0301/ /Volumes/100302_0316/d5463a29.zip /Volumes/100304_2258/photos/SDC10153.JP /Volumes/100304_2258/201002270900382MB4 64 20868 9 /Volumes/100304_2258/20100304-propaganda_translation /Volumes/I00304_2258/2 0100227-0900_arrest.pptx /Volumes/I00304_2258/20100304-propagandanotes. /Volumes/100304_2258/photos/SDClOl51.JPG /Volumes/100304_2258/photos/SDClOl52.JPG /Volumes/100304_2258/photos/SDC10150.JPG /Volumes/I00304_2258/photos/SOCIO153.JPG /Volumes/100304_2258/photos/5DC10154.JPG /Volumes/100304_2258/photos/SDC10149.JPG /Volumes/100304_2258/photOS/SDClOl56.JPG /Volumes/100304^2258/photOS/SDClOl55.JPG /Volumes/1003042258/photos/SDC10148.JPG /Volumes/100308_014 2/7 4b39ef6.zip /Volumes/100308_0925/ /Volumes/1003ll_0856/success.zip /Volumes/100322_1255/blah.zip /Volumes/100324_1156/6e34 680e.zip /Volumes/100328_1723/05000.zip /Volumes/100330_1737/ /Volumes/1003301852/ /Volumes/1003311015/ /Volumes/100331_1542/export.csv /Volumes/100331 1 5 4 2 / s p l i t . z i p /Volumes/100401_1754/ /Volumes/100401__1948/105000. z i p /Volumes/100405_1225/dirfile . z i p /Volumes/100407_1250/split_2.zip /Volumes/I00407_1250/split.zip /Volumes/1004081833/ /Volumes/1004101330/ /Volumes/1004110918/farah.zip /Volumes/100411 0 9 1 8 / s p l i t . z i p

PROSECUTION EXHIBIT ]Xlfor \ PAGE OFFERED: PAGE ADM' PAGE ^ OF 1 PAGES

51 52 53 54 55 56 57 58

/Volumes/100412_1907/ rail.zip /Volumes/-,100412 172 6 /Volumes/100419_1656/20100419-receipt_request.pdf /Volumes/1004231851/12 JUL 07 CZ ENGAGEMENT ZONE 30 GC.avi /Volumes/100427_2030/12 JUL 07 CZ ENGAGEMENT ZONE 30 GC Anyone.wmv /Volumes/100427_2030/cia_blah.txt /Volumes/100504_1845/files.zip

Nl

NJ

o o

Ul M

Ul

Ln LO LU

f>

C D

ci 2
H

cn

1-^ Ol

O +

LU

' I
3
C T Q

ro
Z. QJ

cr ro -<
QJ ^

<

fD .

CT-

<

QJ

fD 2. ^ 03

CT-

<

QJ fD < fD Q.

S
S S
N)

m fD o. ^

= c< 3
01 3 3 3'

QJ 3 3 3'

n ^ ;?> 3 Nl o era
31

era

o era
3

11
Nl 3

III
% 3 SS

CT Qj

< W'

a.

ct

sr ?
O" (D_ 01 OfD

II i,

cS

Q. <
QJ 3 3 3'

S.J tn CT "CT

. OJ

tn

oOJ QfD

II < n
!2. l-> fD QJ Ln 00 Ul O

CT OJ Q.

<

3 QJ - M $
. -o Q. fD fD Q.

s i
3 3 3'

i|

-< 3
01 3 3 3"

< 3
OJ 3 3

fD

fD CS.

SS
NJ

<
+
LO LU fD Q. fD 13.

QJ 3 3_

01

01

S i.

SS 31
NJ fU

o era
CT-

n ^ o n c 3 m
3

i
00

57 %
31

ii
o
03

era f

era

D
n ^ o
n c
fD 3

il
II M

O
00 OJ O

5
OQ

3' OQ

era

D
^
T3

< 3

fD

^ fD < 3

cn S S^ o
o > ^
NJ

R ri

^3 o
n c
3
fD 3 in

dr CS-

3
fD

n ^ o
n c

^
|\o

2
CD O n c

S3 1 2
n >
3

CD O -< n c

SS NJ S '5 S ^. SS f?
l/l

OJ 3 3

01 3 3

NJ

C D f
Nl Nl

< ^

3' OQ

3' OQ

3
fD 3

11
8^
Nl 3

^
NJ CD CT n (jU LD

g g
3

g g g
3

f f

o _
-1 (D.

o
3

l\J

^
NJ

g s

< <
^
NJ O Ln

QJ 3 Q.

eo
3

.sl II
O Nl

a s %

SS NJ o
QJ 3 13.

3
fD 3

^
Nl

^
Nl O OJ 3 Q.

X
NJ O 01 3 Q.

SS
NJ

p' h
fD 3

Q
fD'

g g g o
3 3 3

tn

o
QJ 3 Q.

SS NJ o
on
fD 3

Nl O QJ 3 Q.

cm
01 (0

T3 -a

Ln (0

era
01

era
01 Q.

NJ O Ln 3 fD

NJ O Ln fD 3

era
01

3" 01 5
^ 3
OQ fD

a.

^ fD < 3

-<
01 3 3 3'

fD

^ m < 3
01 3 3 3'

01 3 3 3'

01 3 3^ 3'

01 3 3 3'

era

era

-< SS NJ o
CD O n c

-< SS
Nl

era ^ -< SS
Nl O CD O

era

era

-< SS

3 m
3

o o o n c 3 n
3

n c
3

o o n
c
3
fD 3

NJ O

< ^ Nl o

CD O n c

3
fD 3

fD 3

o
o g o
01 3_

o
o g o
01 3_

o
O

CD O

S
3_

CD O

3_

S
3_ O QJ Q.

o
01

o
OJ Q.

o.

a.
QT
CL

o o

3
3'

a. oT
Q.

QT
Q.

3
3'

3.
3'

I
Nl O

n SS

< < <


^
SS
Nl
Ln rf Nl

Ss

C/1 fD

o
3

cn
fD

s I

M CT 01 LU OJ Ul NJ LU

h
fD 3 n O

o
3

Q
fD'

n
fD 3 n O

era
QJ Q. fD

era
OJ fD

is
00 03

cn
NJ LD OJ

S D. -n QJ

w ^

o.

S
O

QJ

> ^ era
Nl

era
QJ 3

era
QJ 3

QJ 3 3^ 3'

01 3 3 3'

li

QJ 3

01

era

era

fD 3 n O

n' O
3

<

o ^

o
a
fD 3 tn

o
T3 fD O Oj' QJ

era
OJ 3

-< ^

fD -o era fD n OJ

1 % *

n' O

n
QJ

Nl O

SP 2L
-h QJ

o o n c 3

K 5
$

o ^
C T
fD

3
01 3

=R

fD 3

> era n fD o
3

QJ'

n < O c
OJ fD 3 O

01

o o g o

o
o g o

n O

m 3
fD OQ 01

^ a.
fD OJ

3_

3_

01 13. 3

OJ Q.

II
Q. fD fD

c
a
X

01 ^

fD fD

<

a.
"O X

o 3

fD

3 Q. fD

3
01

I 3
QJ

era ^
QJ N l

Nl
O

if

-u

CD O n fD c 3 3

2 m > < =

Nl LU

00

Nl O

Ln 00

'ci
+
LU

Cl

CT

< p

CT

< O
O

or
OJ

<
!2.

' o 3 ts]

era O J
3 3

g f l f I S11 ' 3 o' 3


sE
3 3 00

'o 3 E

l' U n QJ a l /_ 9= f? NJ (D

ID

era Q J
3 3 00

3' OQ

<
CT-

LU

<

QJ 3 3

p CT < I g 11 K# K %' K 3 ^1 ^ i
O CT < ' o QJ

CT < ;i as Ui13.

CT

<

i_ ;n

P CT < i_ ;n
fD

S ^
3
01 3 3 3' 00

S
3
01 3 3

Id ^
3
01 3 3 3' 00

a.

era Q J
3 3 00

3
01 3 3 3" 00

3' OQ

3 3 00

3 3 OQ

3' OQ

n ^ o
n c

n ^ o
n c

3
fD 3 in

3
fD 3

n ^ o n c 3
fD 3

CD O n c

3
fD 3

n ^ o n c 3
fD 3

n ^ o
n c
3

o o
n c

n o o
n c

n ^ o
n c

n ^ o
n c
fD 3

n D o
n c

3 as ^

3
fD 3

3
fD 3

3
fD 3

3
fD 3 1/1

S S
NJ

o
01 3 Q.

S S
Nl O 1/1 CD 3

e r a
QJ Q. fD

< 3
01

3 OQ

-< ^
NJ

o o
n c

3
fD 3

CD O

3_

01

CL

o o

< < < < < <


NJ

S
O
01 3 Q.

Nl O QJ 3 13. Nl O Ln fD

Nl O OJ 3 Q.

%
NJ

QJ 3 Q.

Nl O

S R

Ln fD

S S Nl o
Ln fD

Nl O QJ 3 13.

S
NJ O 01 3 Q.

S S Nl o
01 3 Q.

^
NJ O 01 3 Q.

NJ O 01 3 Q.

S S NJ o
QJ 3 Q.

Nl O

ijn fD

Nl O Ln fD

NJ O l/l fD

S S Nl o
Ln fD 3 00

S S
Nl O
Ln fD 3 00

S S Nl o
Ln fD 3 00

Nl

o
c/1 fD

3 00

3 OQ

3 00

3 OQ

3 00

3 00

3 OQ

OJ

01 fD

01

a.

QJ CL fD

01 fD

01

a.

fD

fD

01 3 3 3' 00

< 3

01 3 3 3'

QJ 3 3 3' OQ

QJ 3 3

3 OQ

OJ 3 3^ 3' 00

^ fD < 3

QJ Q.

OJ Q.

01

-< 3
01 3 3 3' 00

fD

-< 3
OJ 3 3 3' 00

fD

^ fD -< 3
01 3 3 3' 00

01 Q.

-< 3
01 3 3_ 3" 00

fD

01 3 3

3' OQ

22, ^ < ^ NJ o
CD O n c

^ -< S S Nl o o o
fl

< ^

Nl O

< S S NJ o
CD O n c

< S S
NJ O

< S S NJ o
CD O n c

a o
n c

o o
n c

< S S Nl o o o
n c

-< ^
NJ

fD 3

fD 3

3
fD 3

O CD O n c

fD 3

fD 3

fD 3

3
fD 3

3
fD 3

o o g 3_ o 01 a.

CD O

C D O

3_

CD O

3_

3_

o o g o

CD O

3_

3_

o o g
3_

C D
O

g o

C D O

CD O

3_ QJ Q.

g o

3_ OJ Q.

3_

OJ Q.

QJ

OJ

a.

"CT 3-

a. o

01 Q.

01 13.

o
01 Q.

o
QJ Q.

o o S S Nl o o o n c fD 3 3

o o *
O

u
Ln

CT 3"

^
o o

o o

ZT

o o
Ul

O O

O O

NJ O

C D
n c
fD 3

LU NJ O

cn

b
LU

Ln
Ul

'ci
+
LU

CT-

<

'o 3 0:

s i
3 3 3' 00

gf I
f

1 o ^ o
Nl <

CT

^ i
3 3 3' 00

^'

era Q J
3 3 3 00

gf I ^
3 f

1 ic! o o

<

CT-

CT

< O

C3-

<

CT

<

CT

<

CT

<

CT-

<

OJ CS.

'o s 0:
%' 3
3 3

i
3 3 3 00

% ^ %' 3
00 QJ 3 3

s f l 11
^ i
OQ
3 3 3

K
M i
3 3 3' 00

'o 3

era O J
3' OQ

s^
3 3 00

iii

'o 3 %' 3
3 3 3 00

&
era O J
3 3 3'

S' 3

era Q J

3' OQ

OQ

f n ^ o
n c

n o o
n c 3
fD 3

n o o
n c

n o o
n c

n ^ o
n c

CD O

3
fD 3

3
fD 3

3
fD 3

3
fD 3

n c 3

n ^ o
n c

n ^ o
n c
fD 3

n ^ o
n c

n ^ o
n c
fD 3

n o o
n c

3
fD 3

3
fD 3

3
fD 3

fD 3

SS

Nl
01 3

&
Nl O 01 3 Q.

&
O

NJ OJ 3 Q-

&
NJ

^
NJ

Nl

%
Nl

S
NJ 01 3 Q.

%
Nl O 01 3 Q.

S
Nl

< < < < < < < < <


a. S S
NJ O l/l fD

SS
NJ O fD

OJ 3 CL Nl O Ln fD

OJ 3 13.

ss
NJ O l/l fD

S R

01 3 CL

SS
Nl

01 3 Q.

on

NJ O Ln fD 3

SS
Nl O
Ln fD

SS
NJ

QJ 3 C^

NJ O 01 3 13. NJ

o
3

ISJ
O Ln fD

SS
Nl

SS

on
fD

Ln fD

Ln fD

Ln fD

3 OQ

3 OQ

3 OQ

3 00

era

00

3 00

3 OQ

3 OQ

3 00

3 00

01

fD

^ fD -<

OJ

OJ

OJ

fD

QJ 3 3_ 3' 00

QJ 3 3_ 3'

^ fD -< 3

QJ CL fD

QJ

01 Q. fD

01 Q.
fD

QJ

fD

85. 2 < ^
Nl O O O

01 3 3^ 3' 00

OJ 3 3 3'

-< 3

< 3

fD

^ fD < 3

QJ

01

^ fD -< 3
01 3 3 3'

era

OJ 3 3 3' 00

QJ 3 3^

QJ 3 3

3' OQ

3' OQ

01 3 3 3' 00

OJ 3 3 3' OQ

01 3 3 3' 00

era

<

-c

SS

n c

o o o 3

NJ

^ NJ o
n c 3

< ^

NJ O

< ^

<

SS
Nl O CD O n

CD O

o o
n c

NJ

n sz
fD 3

O CD O n c

< ^ NJ o o o
n c

fD 3

fD 3

fD 3

fD 3

fD 3

fD 3

CD O

13 O

3_

3_

o o g o

o o g o

o o g o

D O

3_

3_

3_ OJ

3_

o o g o

o o g o

3_

3_

o o g 3_ o
OJ

CD O

o
o g o

3_

01 CL

01 Q.
3-

01 Q.

QJ O.

Nl O O o O n c

a. o o

01 O.

o
QJ Q. l/l

3_

o
o
3-

QJ Q. in

OJ CL

o.

01 Q.

O O

3
fD 3

o o ^ Nl o o o n 3 fD 3 c

o o

o o

3-

^
Nl

o o

O CD O n c 3 fD 3

SS NJ o CD o n c
fD 3

Ln
Nl
O

CTl

cn
(3
Nl O

C3 LD Nl

m
+
LU

1 ?
% =5' 3
era O J
3 3 3' 00

CT

< p

CT-

8 ^

%' 3
era
3 00

11 I I I sf 1 i l l i l l 11
01

3 5c!

< p

o- < p CT- < p CT < p CT ' o 3 tc! O 3 !i ' o 3 sc! O QJ

<
!c:

CT

<

s 11
O m 3 .

CT

'o S E

CL

^ i
3 3^ 3' 00

S' 3
era Q J
3 00

3
3 3 3'

s i
3 3^ 3' 00

^'

SR Q J
NJ 3

00

OQ

OJ 3 3 3' 00

o 2. ^ era NJ rg)
3 Q. fD

s i
3 00

III ill ill s i


s i
3 00 3 3 3' 00

< p CT O QJ

< P
E

CT

<

'o 3 E

f n ^ o
n c

f
rt;

n ^ o
n c

"o o
n c 3
fD 3

n ^ o
n c

n ^ o
n c

fD"

n o o
fl

n
D

3' 00 tn

S R
Nl

3
fD 3 in

3
fD 3 in

3
fD 3

3
fD 3

3
fD 3 l/l

o n c 3
fD 3

QJ

CD O n c

n ^ o
fl

n o o
fl

n ^ o
fl

3
fD 3

3
fD 3

3
fD 3

3
fD 3

S S Nl o
01 3 CL

S R
NJ O 01 3 3.

S S NJ o
QJ 3

S
O
NJ 01 3 13.

S S Nl o
Ln fD 3 00

a.

NJ O l/l fD

^
NJ O Ln fD 3 00

S S Nl o
on
fD 3 00

3 OQ

OJ

01
OL.

01

OJ

^ fD -< 3
01 3 3 3' 00

< 3
01 3 3 3' OQ

fD

a.
fD

< 3
OJ 3 3 3' 00

^ fD <
QJ 3 3

3' OQ

-< ^ Nl o o o n c 3
fD 3

-< S S
NJ

o o g 3_ o
01

a.
o o

< <
o
n c

o o

< < <


NJ 01 3 13.

S S Nl o

o ^

S S
Nl O
Ln CD

QJ 3 3.

NJ O 01 3 C3. Nl

S
NJ

S S
o
Ln fD

8|
O

NJ O 01 3 Q.

NJ O OJ 3 O.

S
NJ O 01 3 O.

vs

Nl O l/l fD

s
OS
NJ O

S S Nl o
cn
fD

NJ O l/l fD

S S
Nl O
Ln fD

3 00

3 OQ

3 OQ

00 fD

3 00

3 00

3 00

3'

OJ Q. fD

01 Q. fD

01

fD

OfQ

01

OJ

<

fD

QJ 3 3 3'

go^

01 3 3^ 3' 00

01 3 3 3' 00

^ fD < 3

? QJ
01 3 3^ 3'

^ fD < 3

^ fD < 3

OJ Q. fD

< 3

01 3 3

3' OQ

01 3 3^ 3'

E < S S
Nl

era

era

OJ 3 3 3' 00

O CD O n c

-< S S NJ o
CD O fl c

3
fD 3

3
3

ro

fD 3

C D O

CD O

3_

3_

o o g
o

o o g
3_

o o g
3_

3_

01 Q.

01 Q. l/l

QI CL

o
QJ Q.

o
QJ Q.

^ S S 3J " N o o
CD O n c

T3 3-

^
3-

3
fD 3

o S S NJ o
O

O O

O O

< <
fl

< S S NJ o o o
c

< S S
NJ O

S R
NJ

CD O n c

O C D O
fl

3
fD 3

3
fD 3

fD 3

o o g o

o o g
o

CD O

3_

3_

3_ QJ

o o g
3_

o o g
3_

o
01 Q.
"C* 3O

o
01 Q.

01 Q.

QI 13.

o. o o

3O

O O

CD n c
3 fD 3

^ Nl o o o fl c fD 3 3

S S S NS J N OJ o
o n c
fD 3

CD

Ln

en
Nl

o o o
M

en
Nl

'ci
LU

CD

cn

00

CT

<

1 ?

1 2: SS C D
ISJ <

8a
cn fD
LU ~<

O o

? 3
01

> g
a R
<

i^
3 3 00

era O J
3 3 3' 00

s i K 11 8# K s ^ %' 3 %' 3
I i
3 3 00

o< p QJ E. 'o

CT-

<

cr <
QJ E.

QJ E. o

1 ? 8 9.
era O J
3 3 00

O o

CT < p QJ E. o

CT QJ

< p E.

CT-

<

o a- <
o
QJ E.

%i K11 11
=5' 3
era
3 3 3' 00

'o 3 E

1 o
o
Ln 00

QJ CL

VI

K
sE
3 3 3' 00

5#
rt,

3 3 3' 00

3 3 OQ

01

S ^
3

< 3
01 3 3 3' 00

fD

fD 3.

3 OQ

f n ^ o
fl

NJ i i -

o <z

K ^ ^ CD
Nl

o
-c

o
fl

n o' o
n c

n ^ o
fl

n ^ o
fl

n
D O fl c

n o o
fl

n ^ o
n c

n ^ o
fl

o
o
fl

n "o o
fl

^ 3 01

3
C O 3

3
fD 3

3
fD 3

3
fD 3 l/l

3
fD 3 tn

a R
NJ O

fD 3

3
fD 3

3
fD 3

fD 3

3
fD 3

3
fD 3

S
NJ O OJ 3 (3. NJ

S
Nl

S
NJ O QJ 3 Q. NJ

LO

b SS
"C

< < < < < < < <


^
S S
O

01 3 13.

S S Nl o
QJ 3 Q.

S S NJ o
QJ 3

Nl

o
3

ISJ

CL

NJ O QJ 3 Q.

%
NJ O QJ 3 Q. NJ O Ln fD

%
ISJ

S R
NJ O QJ 3

S
NJ

NJ

Ln fD

l/l fD

3 00

on fD 3

Ln CD

Nl O Ln fD

S S NJ o
Ln fD

S S

01 3 13.

a.
Nl O

QJ 3 C3.

Nl O
fD

S R
Ln tD

01 3 Q.

on

NJ O Ln fD

NJ

on
fD

00

3' 00

3 00

3 00

3 00

3 00

3 00

3 00

3 00

3 00 tn

QJ fD

a.

^ fD < 3

QJ

01

^ fD -<
01 3 3

OJ Q.

01

a.
fD

01 Q.

QJ

fD < 3

QJ 3 3 3'

00

01 3 3 3' 00

3' 00

OJ 3 3 3'

QJ 3 3 3'

fD -< 3 01 3 3

fD

^ fD < 3

QJ

QJ

OJ

-< 3
QJ 3 3 3' 00

fD

01 Q. fD

fD

-< 3

00

era

3' OQ

01 3 3 3' 00

QJ 3 3 3' 00

QJ 3 3 3' 00

01 3 3^ 3' 00

< ^
fl

< ^
n c

-< ^
o
fl

NJ

o o
c

Nl O

o 3

ISJ O

^ < S S NJ o
CD O
fl

-< S S
Nl O

-< ^
fl

NJ O

-< ^
Nl

o o
fl

CD O
c

3
o g o

CD 3

fD 3

3
fD 3

c 3
fD 3

o o
n c
fD 3

fD 3

fD 3

C D O

C D O

3_

g
o

3_

3_

o g 3_ o
OJ

o o g o

o o g o

C D O

C D O

3_

3_ 01

3_

3_

o o g o

o o g o

o g o

3_

3_

3_

QJ Q.

01 Q.

01 Q.

cs.

01

a.
o o o o o

Q.

QJ CS.

01 CL

01 3.

QJ CL

01 Q.

3"

01 3-

a ^s
NJ l

O O

o o

O O

o o

S S NJ O o
C D O
O fl

^
Nl fl 3 fD c

a s
ISJ O O f l fD c 3

O o O

3
fD 3

C D

fl c fD 3

en
_sj_

cn en
NJ

en

on
LD
ISJ O l- O

Ln 03 NJ

on -J
Nl

Nl

o o
.F^

o o o
M

O M

l- O O 1-^

o $^ o l- cn
NJ

O
M

o
l->

o
h-

cn o
f Cl

cn o o

en 4^

cn
LU LU

"m

+
LU

s
LU

cn

m +
LU

'ci
+
LU

+
LU

O O

CT"

<

1
o
O vl LU

Ill
Sg
3 3 3' 00

QJ

QJ Q. fD

^. i_ o
o
Nl

CT < P ;i UlID -<

CT

<

'o 3 E
5' 3
3 3 00

P CT <

-< % 3
00 01 3 3 3 00

^'
00

3
01 3 3 00

i l l 11 s i K i l l
'o 3 E

p 'o

CT < p QJ E.

CT

<

? ^ o 'o 3 E 1 o o o O 3=
cn tD
vJ <

, 0

CT

<

CT
fD

CT QJ

< tn

cn fD

era Q J

S i
3 3 00

era Q J
3 3 00

%' 3

3
01 3 00

o
00

< 3
3 00

% E
3 3 00

OJ 3

^ A- 4^ < S' 3 %' 3


on
00 OJ 3 3 3' 00 00

cn

cn

9: f?" fD

QJ 3 3 3' 00

n ^ o
n c

n ^ o
n c

n ^ o
fl

n o o
fl

n ^ o
fl

o o
n c

o o
n c

n o o
fl

n o o
fl

CD O
fl

CD O n c

3
fD 3

3
fD 3

3
fD 3

3
fD 3 fD 3

3
fD 3 tn

3
fD 3

3
fD 3

3
fD 3

3
tD 3 in

3
tD 3

%
Nl O 01 3 O.

%
NJ O 01 3 CL

< < <


^
Nl O Ln fD

NJ O QJ 3 CS.

Nl O QJ 3 Q.

%
NJ O 01 3 Q.

S S NJ o
OJ 3 13.

%
ISJ O 01 3 Q.

%
Nl O 01 3 O.

^
Nl O 01 3 Q.

S R
NJ O OJ 3 13.

^
NJ

o
OJ 3 Q.

^ ISJ
O Ln fD

NJ O fD

on

S S ISJ o
on
fD

S R
NJ O fD

ISJ

on

O on
fD

S R Nl o
Ln fD

S S NJ o
on
fD

ISJ O Ln fD

^ ISJ
O Ln fD 3 00

S S
Nl O fD 3 00

on

3 00

3 OQ

3 OQ

3 OQ

QJ

QJ

OJ

01

fD

-< 3

fD

fD

< 3

CD

01 3 3 3' 00

OJ 3 3_ 3' 00

OJ 3 3 3' 00

QJ 3 3 3' 00

<
S S
Nl O

< S S
NJ O fl

< S S
O CD O
fl
ISJ

< S R
NJ O fl

o
fl

o
c

C D O
c

CD O
c

<
01 Q. fD QJ

3 OQ

3 00

3 OQ

3 OQ

3 OQ

01 3 3

< 3
01 3 3 3' 00

fD

^ CD < 3
QJ 3 3^ 3' 00

01

01

QJ Q.

OJ

01

a.

-< 3
01 3 3

fD

-< 3
01 3 3 3' 00

fD

< 3

fD

^
< 3
tD 01 3 3 3' 00

3' 00

3' OQ

01 3 3 3' 00

S R
Nl

o
fl

< S S Nl o
CD O fl

-< ^
ISJ O CD O fl

< ^
o o
fl NJ O

CD O
c

3
fD 3

3
fD 3

3
fD 3

3
fD 3

3
fD 3

3
tD 3

CD O

3_

o o g
3_

o
o g o
QI 3_

o
o g o
QJ CL 3_

CD O

CD O

C D O

3_

3_

g o

3_ QJ O.

o OJ a. o o

o
01 Q.

o
QJ O.

o
01 Q. T3 ZT

a.

3"

o
o
O in 3-

a
o
3-

a"
3"

< < <


c

fD 3

o o g
o

CD O

CD O

3_

3_

3_

o o g o

3_

01 Q.

"CT* 3-

OJ Q. tn 3"

QI Q.

01 CL

o
o o

o o tn S S Nl o D o fl c 3 3 fD

O O

o o

^ O o ISJ f Q 3 tD 3 c l

o o o fl 3 3 tD c

Nl

sJ
00

cn
00 NJ

Nl

o o o l- cn en
Nl 00

o o o i- en
4^
M ~J

"5)
+
LU

cn

cn

'ci

g ' I %f &S' s3 ^ ^ i
era Q J
3 3^ 3' 00 3 3^ 3' 00

cr < 1 ? ^ p 'o 3 E.

C3-

<

2 ^
%' 3
era Q J
3 O Q

S' 3
3 00

I f l i K 11 11 % s i K S' 3 S' 3
00

^ 1 ^ QJ o ^ 'o 3 E. 'o 3 E 'o 3 E 1 o ^ 8 fD


tD

CT

< P

CT

< P

CT

<

era O J
3 3 00

%' 3
00

QJ 3 3_ 3' 00

era O J
3 3 00

^' i
3 3 00

00

<
cn <
3

LU

CT 01

< w

Si
3 00

3
00

lg
3' O Q
QJ 3 3^

<
n o o
fl

f n ^ o
fl

1
fD"

OJ 3 3 3' 00

n "o o
fl

o o fl
c

n "a o
fl

n ^ o
fl

3
tD 3

3
fD 3

3
fD 3

3
fD 3

3
tD 3

CD O fl c

CD O fl c

n ^ o
fl

n "o o
fl

n o o
fl

3
fD 3

3
fD 3 in

3
fD 3

3
fD 3

tD 3

3
fD 3

S S NJ o
QJ 3 Q.

S S
o cu
3 3. Nl

^ ISJ
O QJ 3

S R NJ o
on
fD 3 00

OJ

a.
fD

-< 3
QJ 3 3 3' 00

< S S NJ o CD o
fl

3
tD 3

o o g
3_

o
QJ 13. O

< < < < < < < < < <
S R
Nl O tD

NJ O OJ 3

a. S S

on

3 00

Nl O Ln tD 3 00

a. S S Nl o
Ln fD

Nl O 01 3 Q.

S
NJ

01 3 CL

S R NJ o
OJ 3 3.

S
Nl

^ NJ
o
Ln tD

S S NJ o
l/l fD

S S Nl o
Ln tD

01 3 Q.

NJ O QJ 3

^ ISJ
O QJ 3 3.

^
ISJ
O OJ 3 Q.

e3.
NJ O l/l fD

S S

S S

^ ISJ
O Ln fD

S S
ISJ O Ln fD

3 O Q

3 00

3 OQ

3 00

NJ O Ln fD 3 00

3 00

3 00

3 O Q
01 Q. tD

OJ fD

a.

QJ Q. tD

01 fD

OJ

01

QJ fD

a.

fD

-< 3
OJ 3 3 3 00

<

01 3 3^ 3' 00

QJ 3 3 3' 00

^ fD <

a.

QJ 3 3

3' OQ

QJ 3 3^ 3' 00

-< 3
OJ 3 3

^ fD -< 3
QJ 3 3 3" 00

QJ

01

^ fD -< 3
QJ 3 3^ 3' 00

QJ Q. tD

<

3' OQ

01 3 3 3' 00

01 3 3 3' 00

< ^

-<

ISJ

O C D O

S S NJ o CD o
fl

<

S S Nl o
C D O fl c

n c

o o g o

fD 3

fD 3

fD 3

o o g o

C D O

g
o

3_

3_

3_
OJ Q.

o o g o

3_

QJ CL

QJ O.

QJ CL

o o g 3_ o QJ a.

C D O

C D O

3_

3_

o o g o

CD O

C D O

3_

3_

3_

QJ Q.

01 Q.

QJ Q.

QJ Q.

o QJ a.

_cn^ o
3"

o S S ISJ o
C D O
fl

o o

O O

O O

S S
NJ

o o o
fl

o o S R Nl o
D c
O fl

O O

O O

o o S S NJ o
C D O
fl

o S S NJ o
C D O
fl fD 3

o o S S Nl o
CD O fl c
fD 3

fD 3

c fD 3 3

fD 3

O o f fD 3 c 3 l

Nl

fD 3

c 3

00 ID
NJ

00

o o

o
M

M tn M 00 O

cn
M 00

Ln

'ci
+
00

b o m

cn

CT

=5' 3
era

ill
QJ 3 00

< p I_on

cr
OJ

;i

w ' o 3

<

O
l/l

CT

<

_. o

^iK
QJ 3 3^ 3' 00

i p.
% :
3 00

^' 3
00 01 3 3 3' 00

% t %11 g i K11 i l l
o QJ
SO.

id!

o 3 E. 'o 3 E
' 3
OJ 3 3 00

CT

<

,o

CT-

<

o cr <

o 3 E. 1 ^ 8 3 =

CT

<

'o 3 E. O 3

CT

<

CT

<

g
%' 3 era QJ
3 3 3' 00

S' 3
era

QJ 3 3 3' 00

era

I' i
3 3 3' 00

i
1 i
3 3 00

%' 3
era

s i
3

g iK
3 OQ

QJ 3 3 OO

n o o
fl

n "o o
n c

n ^ o
fl

n ^ o
fl

n ^ o
fl

n "o o
fl

n ^ o
fl

n o o
fl

n o o
fl

o o
fl

C D O
fl

3
tD 3

3
fD 3

3
fD 3

3
tD 3

3
fD 3

3
tD 3 in

3
fD 3

3
fD 3

3
fD 3

3
tD 3

3
fD 3

< < < < < < < <


S S NJ o
l/l fD

NJ O QJ 3 OL

^
Nl O OJ 3 O.

NJ O QJ 3

ISJ

O Ln fD

a. S S NJ o
Ln fD

Nl O 01 3 Q.

%
Nl O 01 3 Q.

S S NJ o ^
OJ 3 Q. Nl O l/l tD

NJ O QJ 3

S R
NJ

as
Nl O Ln tD

a. S S
ISJ
O on fD

NJ O OJ 3 CL

^ ISJ
O QJ 3 Q.

^
ISJ
O 01 3 Q.

^
NJ O QJ 3 CL

S S NJ o
Ln fD

S S ISJ o
on
fD

as
Nl

Ln fD

S S ISJ o
Ln fD 3 00

l/l fD

3 00

3 00

3 00

3 OQ

3 00

3 00

3 00

3 00

3 00

3 OQ

QJ

QJ

QJ Q. fD

01 tD

01

tD

tD

a.
OJ 3 3 3'

a.

-< 3
01 3 3 3' 00

< 3

fD

QJ 3 3 3' OQ

QJ 3 3 3' OQ

^ fD -< 3
01 3 3 3' 00

QJ

OJ Q. tD

01

01

OJ

e r a

OJ 3 3^ 3 00

QJ 3 3 3' 00

^ tD -< 3
OJ 3 3 3' 00

^ tD -<

OJ 3 3 3' 00

^ fD -< 3
01 3 3 3' 00

01 Q.

-<
QJ 3 3

fD

3' OQ

<

as
Nl

-< S S NJ o
C D O

O C D O
fl

n c
3
fD 3

< S S Nl o o o
fl

^ < S S
Nl O

-<

as
Nl O

< S S
NJ O CD O n c

o o
fl

D O
fl

< S S Nl o CD o
fl

tD 3

fD 3

fD 3

3
fD 3

fD 3

tD 3

C D O

g
o

C D O

3_
01

g
o

3_
01 3.

o o g o

o o g o

o o g o

C D O

3_

3_

3_

3_ O 01
CL

o o g
o

C D O

CD O

3_

3_

3_

o o g
o

CD O

3_

3_

o
OJ 3. "3 3-

a. o o

01 Q.

QJ 3.

QJ

o o

^ ZT
o

o o ^

a. S S Nl o CD o O
fl

a o

OJ Q. tn 3O

OJ CL

01 CL

QJ Q.

ZT

^
fl

Nl O

Nl

o o fl c 3 3 fD

3
tD 3

O C D O

c tD 3 3

o o S S Nl o o o fl 3 3 tD c

O O

o o
NJ

LD

O f&

o
M

cn on
ID

'ci 2
H

LO

,o cr
QJ

<
to a.

CT-

<
fD 3.

n s o <
Ln
T3 00

a.

2 I q fD
<

3
QJ 3 3 3' 00

sE
3 3 3' 00

> -< <


+
00

'il
O fD

CT
QJ Q. fD

< O

CT

<

CT

< P

CT

< p

CT-

< p

CT-

<

cr

<

'o 3

i^:

fD

a.

<
QJ 3 3^ 3' 00

11 5' 3
ra O J
3 OQ

u
3 3 3' fl

QJ ;r! m'o 3 E. ' o 3 i^: 'o 3 E. o 3 E. Q. CD fD Q.

era

01

3 3 3* 00

f n ^ o
fl

s^ ^ i

QJ 3 3 3'

ill
3 3^ 3' 00

S' 3
3 3

s i
P ^
o
fl

era Q J
3' OQ

i ^
3 3 3' 00

1 1 %i
^ i
3 3 3' 00

00

o o
fl

n "o o
fl

n ^ o
fl

P o o
fl

e r a f n o o
c

f n "o o
fl

p ^ o
n c

P o o
n c

p "o o
fl

3
fD 3 in

3
fD 3 l/l

3
fD 3 in

3
fD 3 in

3
fD 3

3
fD 3

3
tD 3

3
fD 3

3
tD 3 l/l

3
tD 3

3
tD 3

S R
NJ

S R
NJ O
QJ 3

S S NJ o
QJ 3 3.

QJ 3 O.

S S
Nl

8
fD 3 00 OJ

^ m < 3
01 3 3_ 3'

00

< S S NJ o CD o
fl

3
fD 3

o o g 3_ o 01 a. o o

< < < < < < < <


3.

NJ O 01 3 Q.

NJ O 01 3

Nl
OJ 3 3.

ISJ

NJ

S R
NJ O fD

ISJ

O Ln fD

on

S S ISJ o
l/l fD

a. S S NJ o
on
fD

OJ 3 3.

QJ 3 O.

S S NJ o
QJ 3 Q.

%
Nl O QJ 3 3. Nl O Ln fD

S
NJ

QJ 3

S S
NJ O Ln fD

ISJ
O Ln fD

S S NJ o
Ln fD

S S
o on
fD NJ

S R

a. SS
NJ O Ln fD

3 00

3 00

era

3 OQ

3 00

3 00

3 00

3 OQ

3 00

3 00

CT^

QJ Q. fD

QJ Q.

01 Q.

01 Q. fD

OJ

< 3
QJ 3 3_ 3' 00

fD -< 3 01 3 3 3"

fD -< 3 01 3 3 3'

< 3

00

00

00

01 3 3 3'

^ fD < 3

QJ Q. tD

OJ

01

^ fD <

01

OJ

a.
fD

fD

01 3 3 3'

era

QJ 3 3^ 3' OQ

OJ 3 3

<

fD

3' OQ

QJ 3 3

3' OQ

01 3 3 3' 00

QJ 3 3

3' OQ

S R NJ o o o
fl

-< ^
fl

^ < ^

Nl

ISJ

O CD O c

O C D O
fl

-< S R Nl o o o
fl

< S S
ISJ

< ^
fl

Nl

o
O fl

CD
c

C D O

fD 3

3
tD 3

fD 3

c 3

tD 3

tD 3

C D O

C D O
3_

3_

C D O

3_

o o g o

3_

01 Q.

OJ CL

QJ Q.

OJ

a.

o o g 3_ o 01 a. o o

fD 3

C D O

C D O

3_

3_

o o g o

C D O

3_

3_

o o g o

3_

QJ CL in

QJ

O.

OJ

O O

a o

Nl O
ft fD c 3

o S S NJ o o o fl c 3 3 fD

O O

3-

^ a o o

Q.
3"

QJ CL

QJ O.

O O

o
tn

O O

o o S R
NJ

O n ISJ 3 fD 3 c

S S

O CD O fl c tD 3 3

NJ

NJ

o o

o o

LU Ln 00

cn

ISJ LU

Ln LU

'ci
+
LU

"5
+
LU

cn

SS
NJ O

CT 01 CL

<

CT

<

I- S E
fD Q.
-CT

-CT TJ fD 3

> tD SS < NJ o 3 > OJ 3


3 3' 00

II
3
OJ 3 3 3' 00

'il
S' 3
3 3

CT-

<

i_

era

era O J
3 OQ

;n OJ ^ fD en < 3
OJ 3 3 3' 00

CT-

< p

CT

<
fD CL

tD Q.

2I i2I
5 ^
3 3 00

C^
QJ 3 3 3 00

il
E
3 3 00

lj ^ as ^fD 3.

M i
f

%'
era

<
p

CT

< p

CT

<

CT

a.

CO

fD 3.

o 3 E. 'o 3 E.
3

11 s l l
QJ 3 3 00

' I
g .2

fD 3.

QJ 3 3

OQ

%'

3
3 3 00

E
3 00

9: %
X sP

-h =:

3' OQ

K
as n Nl o
o
fl Ln

o
o
fl

P ^
o fl c 3

p ^
o fl c 3 ^
Nl O OJ 3 fD 3

p ^
o
fl

p o o
fl

O
SS
NJ

CD O fl c

P ^
o
fl C

P ^
o fl c 3

P ^
o
fl

3
tD 3

3
tD 3

3
fD 3 in

3
fD 3

3
fD 3

P ^ o fl
c

3
fD 3

3
tD 3

3
tD 3

tD 3

tD 3

^
Nl O QJ 3 3.

^
NJ O 01 3

%
Nl O QJ 3 3.

SS
NJ O 01 3 CL

S
NJ O 01 3

> cn
o

Tl 73

SS Nl o
QJ 3

as
NJ O QJ 3

^ ISJ
O OJ 3 3.

%
ISJ
O OJ 3 CL

SS NJ o
QJ 3 3.

Ss Nl
NJ

on o
fD rt

ISJ

a. SS
O Ln fD 3 00

ISJ

SS

8l
m
-a

OJ Q.

z o ->
>

<

tD

-< 3
OJ 3 3 3' 00

tD

gl
S^
ISJ .<
3 00

< < < < <


SS NJ o
Ln tD

a. SS NJ o
on
fD

SS NJ o
in fD

a. SS NJ o
l/l fD

ca. S R
Nl

a. SS Nl o
Ln fD

3 00

3 00

3 OQ

3 00

Ln tD 3 00

NJ O Ln fD

SS Nl o
on
fD

S R NJ o
Ln fD

3 OQ

3 OQ

3 00

3 OQ

CT QJ

U Q.
fD

01 fD

01

a.

01

11 Q.

OJ

QJ Q. fD

01 Q.

<

tD

fD

fD

QI 3 3^ 3' 00

QJ 3 3^ 3' 00

01 3 3^

-< 3

fD

tD

< 3

< 3

fD

3 00

01 3 3 3' 00

OJ 3 3

QJ 3 3

as
3 3 3'

3' OQ

3' OQ

QJ 3 3 3' 00

QJ 3 3

3' OQ

era

<

-<
O O O

as

^ ISJ
n c
3

11
BI
g &
-s ^

NJ O

o o
n c

3
tD 3

o o g
3_

^ i
OJ Q.

o
OJ 3.

OJ CT 01

O O

5
03

<
tD 3

-< ^ NJ o o o
fl

-< SS NJ o
C D O fl c

-< S R
Nl

-< S R

o
O fl

CD
c

o o n
c
3
fD 3

NJ O

-< SS NJ o o o
fl

-< S R
Nl O

< SS NJ o
CD 0
fl

o o
fl

3
fD 3

3
fD 3

c
3
tD 3

3
fD 3

3
tD 3

3
fD 3

o o g

C D O

o
o o
QJ 3.

3_

3_

g
3_

o o g
3_

o o g
3_

o
o g o
QJ 3. 3_

CD O

3_

o o g
3_

C D O

g
o

3_

o 01 a. o o

o QJ a. o o

o
01 Q.

o
QJ 3.

o
OJ

o
01 3. tn

a.

U Q.

^ ZT
o o o

^
3-

-CT ZT

^
3"

o o

o o

o
l->

o o

SS ISJ o c f fD 3 O 3 l

NJ Nl

ISJ

g
en oil
> j

4^ 00

"5)
+
LO

SS CTISJ S

cr
QJ 3.

<

SS o " NJ S

CT

<

SS CT

NJ

Nl S

^
NJ

o" <
OJ in

SS

CT

<
tD 3.

I I 5 3
QJ

< 3
as
C T
fD

tD

a s <
C T C T
fD

>

-CT CT tD

=i 3
3

o >

Nl

-!
OJ 3 3

II
Nl O

.
S R <
o >

||g
NJ

S S fD NJ o c~
Ln

9: X

00

era

3' OQ

>

9: f X rt, ^ sP =: fD
Nl

i : f

S S n
NJ C

o -CNl <Z S R n
ISJ -kl

If
S S NJ o

"CT -CT tD 3 3.

QJ - 3 3 3' 00

5 d.
tD 3

OJ 3 3

C T C T
tD 3 Q. X

>

3
QJ 3 3 3' 00

irS R
NJ O

S R " Nl 5

a s <

>

H:# S S
Nl
<3 LU

6 f
X sP

3 00

-CT -CT fD

rt,

<
fD"

9: #
X tD

00

II
tD 3

<
CT-

<

CT-

<

CT-

<

QJ

01 3.

QJ

fD

fD -< a. EU 3 3^ 3' OD

fD

|3 i
OJ 3 3

QJ 3 3

sp
X

3 OQ =;
-h

fD 3' 3 OQ

13 Z> O n
CD

tD O< J

K as "

S S
Nl

9: f
X sP

3 00

9: f
fD

9: I
X

rt,

9: f
X sp

rt, =;

S S
NJ O

rt, =:

fD

a s n
ISJ <L

c
on

C D O
fl

O C D -n O

3
fD

n cr
? NJ 01 fl QJ

i i o q
f NJ ID

ii
fD 3

o
fD

&g
> S
O
fD tn

U
o
^ 73
^
73

^(2 g

5 -

K P ^ 9.

-'

K P ? <3 > -

<;

6g

9 S S
NJ 3 CS.

as rt S as
Nl O QJ

S S o eu S S
NJ O Ln tD

NJ O 01 3 3.

8g
OJ _ 3

^ fD 3 n S S S Nl S
-D Nl

ii
iq 3.

ii
2 rt

is^ 2 S tn

if
03
-I

sg

as S g

i
O

oi
3

as " S g ? 2
5. 3
3 01

fD

1
00 NJ

S S NJ o
on
fD O 3

o .

&
OS

Nl

S S ISJ

% ^ ISJ N l O o
73 fD_
fD fD

CL

on

on

|S
Nl 0

em 3 tD

QJ 3 3.

Ms
00 2 fD OJ 3 3.

Ms
fD 3. OJ 33 3.

7 S

1
gg
o

3 3
-< S S Nl o
3 fD

Sg
SS Dl
3 OQ
00

il
OJ

ii
n

fD

CT a.

gcg

> %l n
OS

3.

s|
-p fD O -<

fD <' -< fD ^ 3 OJ

on CT

NJ

o S S
Nl O

3 3 3' 00

O S S ^
Nl NJ o o > o o -n

S NR J fD Nl 3 o O < 00 3 o ^ OJ
3 3

C
ISJ

fl

S S 3
fD 3

CD O

3_

o
QJ CL QJ CT

>

03

< <
o
n c
fl

<
^ CT

it
Nl

eu 3 tD^ era
Nl '

% g
s | S Sm
CT

3' OQ

Nl O

on

Nl 3 . O 3'
o^

% 8
fD

It
m 7r

SS 3. NJ

b % |S
O
rt

3.
-T

S S S

o 01 S S 3. _

Q.

fD"

QJ 3 3

n <

s5 3
01 3 3 3' 00

1I
^ .5 S 3 T3 as g
0 3

1
2 9: % ^

Nl

^
OJ

6 o

LO

c n

as ^
NJ O

i?

SE
3 3

3' OQ

il
T3 r

ii
3

3 3

S S NJ o o o
c

I ^
1^ NJ

ss ^
ISJ

ll
fD 7

II
g ^
S SS S NJ NJ o o
NJ fl <

S S 3 N l eu o 3 n 3 < 3' n 00 >


on

NJ

s^
0

O O

S S

1
3
a.

CT 3.

fD 3

:^ cR
g b w 3_ o
C D tD 3 O

3
tD 3

II
QJ fD 3 0

as g
o c

S S S S ISJ N J o o a CD
O fcl n 3 m fD
O C
3

73

< <
o
rt

^
ISJ
O QJ 3 O.

g: ^
NJ

< S S
NJ O Ln fD 3

S. S
SS CO NJ S

m
as

Q/ CT

eu
fD

a s3
NJ

3.

fD

8^
NJ O 3 3

ii
^

% #

1.
O NJ

00

5 < S S
Nl

o o
fl

o o
fl

CD

n ft l

-CT

o o g o

3_

o o g 3_ o
01

-CT

o o g o

3_

1 i
Nl
-h

s 3 ^
o
3_ QJ

a.

g n CT
n,. 3 Z3 O
O

3
fD

3
fD 3

C D O

3_

m C D Ln CT O
CL

73

Q# C D O O
Nl

3_

3_
O

CTl

C D O

3_

3_

QJ 3. QI CT

a.

eu

3.

01 Q.

a.

01 S.

01 3.

cu cs. as
I
CT QJ

b
3.

o
QJ

o
01 3. OJ CT

a.
I
OJ CT QJ

as
CT

OJ CT

01 CT

as
CT

5
00

I eu

01 CT

QJ CT OJ

>

03

00

03

>

>

03

5
C D O 03
fl

S S NJ o
c

5
03

5
CD

5
03

>

03

S S Nl o C c n O fD 3 3 D

00

3 ID

LU 00

Nl

o o

.>

en
LU CD LU ID

'ci

cn

cn

Cl

cn

+
LU

SS CT
NJ QJ

SS CT

o NJ > 3 -CT 01 D 3
fD 3

II
NJ

9: f SS fD

33 00

it If.
fD 3 3 00

SS
Nl O 03

SS

3 > QJ 3 C T 3 5 2.
o
ISJ

< < <


CT-

<

SR "
NJ as

QJ 3. fD

CT QJ fD

< tn'

CT-

SS CT
Nl Qj

SS
Nl O

CT

<

SS
NJ O >

CT

<

CT OJ

<

tD 3.

.Sf as <
g
ISJ O

ss S
Nl

01

fD 3.

a .

tD 3

3 00

II
NJ O t-*

9: f
Nl

-CT -CT fD 3 3.

>

eu

.a g^ s <
O

Nl

3 3 3' 00

01 3 3 3' 00

Nl

>

fD

x' SS
ISJ

I
fD"

9: f

it
NJ

CT CT fD

01 3 3 3' 00

CT CT fD 3

> ^ fD < ISJ o 3 > 01 3


SS
3 3' 00

. rt fD

SS
NJ

01 tD

a.

SS
ISJ

C T C T fD

3 > OJ
3 3

^ fD < 3

o o

>
NJ

CT QJ 3.

< in' fD 3.

SS

9: f
X rt, SS sP tD=
NJ O - . >~

3!

X sP o N^ l

9: a. r
fD

_ < era

-h =

X sP

9: f -t,
=

9: f
sP
X

QJ 3 3 3' 00

=;

-h

CT CT tD 3 3. X

>

tu 3 3 3' 00

S f
o
00

% n
ISJ O

< ;

o
fl

3
SS
NJ fD 3

sg 8 1 a sg
O m w so

O g

g 0 S g
SS
ISJ O 73 CO in "CT O 3

C D "
CD O fl

p ^ o
O c Ln
fl

cn Z> S R n
ISJ O

NJ <Z

^
<L CD O Q
3

5 n as NJ
o
-n
fl

SS Nl o
vJ

O Nl O

o S R
Nl O ZO
CO fD

as
NJ O 01 3 3.

li li
in 3

3
fD 3 tn

-LL CD O C

SS

o g t_ fl
0 c

Nl O on fD
fl

SS
NJ O

p ^ o
fl

3
fD 3 tn

^ 3
fD 3

5. K 3' g
OJ 3

E w S R as
NJ

^ S
0 tn

^
ISJ O 01 3 3.

NJ O QJ 3

15
fl CT < 3.
ISJ O QJ 3 3.

S s s^
-Q -1 fD OS Nl O

5' 3

> >
O

73

3
fD

^ 3
Nl O

73

I I gs
sp

S R -o
73 NJ O OJ 3 3.

S R
NJ O Ln fD

n c

ag
"b

II II
it
3 3
fD QJ

9; S
3 OQ
fD 01

NJ

g g o a ^ g.
NJ

NJ

% sP ^
01 C

fD

a.

NJ OJ 3. tD

n ^

L sn P fD ^

^ K 5 g ISJ L n o

SS NJ o

1 3
3 00
ISJ O

1
01 OJ 3 3 3'

3 tD 3,

^
o

3 N J OQ

^ fD -< 3
QJ 3 3^

OJ 3.

^
o

73

>

i -< 3
3
3 3

eu
3* OQ

^ tD < ^ NJ 3 O
NJ
ISJ

-n X

SS NJ o

I iSS < era NJ ' SS OJ o N J 00 o fD


CD

3' OQ

^ g Nl o 9 2 _

n < n >

VI CT 3.

<

<

as
Nl O CD O fl

as ^ NJ O
O QJ

o
-CT 3.

S
NJ O T3 TS 3.

CD O fl

fD

3
tD 3

II
i io
-CT 0.

3
o o g
fD 3

O O

o
o g
3_

g
3_

o fD 3 g o

3_

3_ QJ 3. QJ CT

o
OJ CL

o QJ a.
01 CT

3 eu
CL

as
CT

01 CT

I
CT

5
03

>
00

5
00

B
03

< < <


fl
-CT O.

< < <


as
NJ O tD

SS

% 5
Ss Nl Q_ sp

-n o cn O J
3

^ Nl NJ cn o 01
o
C T 3n'
Nl O
C 01 3 2.

fD 3 in

on

Nl O Ln tD

3 00

3 00

ll
tD 01 tn fD NJ

s^ ^
n

fD

N J as as O ISJ n O o Ln fD 3 a 3 3'
OJ 3 fD 3.

^ o on
tD 3

as NJ

fD rt rt 3

SI
3
tu 3 3 3' 00

era
3

5- %
OJ rt CT -1

CT

QJ

QJ 3.

OJ

fD

OJ 3 3 3' 00

< 3
3 3

fD

eu

^ fD -< 3
QJ 3 3 3' 00

si
a s3 OJ

CT QJ 3. tD

l/l"

S S 9:
ISJ

fD

o <
3

CL

3' 00

ST =:. < 3

s^
o o NJ
NJ O O LD

5'

Ii
CT

-< SS Nl o <o o fl c

g S R3 92
7

era

SS
NJ O

< SS
NJ O CD O fl

^ #

Nl

o o
c 3
fD 3

3
o o g o

o o o fl c
3

fD 3

3
tD 3

to

C D

o
o g

C D

3_

C D O

3_ 01 3.

3_ QJ 0.

3_

3_

o o g o

CD O

g
o

3_

3_ QJ 3.

QJ

ea.
QJ CT

01 3.

QJ 0.

QJ 3.

01 CT

QJ CT

tu CT tu

OJ CT

QJ CT

tu CT

QJ

5
NJ

O 03 O O
fl tD 3

5
03

B
CD
O f 0l3

SS Nl o

5
03

>

03

as s
NJ

c 3

fD

00 CD O f fD 3l

c 3

ts. 4^
NJ

o o .>

en 4i
M 4&

"Q

+
LU

CT

<

NJ

SS
NJ O 03

CT

<

QJ

II
-CT "CT fD

SS
ISJ O

II
3
tu 3 3 3 00 tD

s^
3. tD

^
o

03

Nl

p i
3 3 3' 00

>

CT CT fD 3 3.

C T C T
tD 3 3. X

>

<
< S R
Nl O 03
CT-

<

CT-

<

tn rt rt fD

QJ O. fD

NJ

3
fD 3.

S R -< Nl 3
O

II
Nl O CT -CT tD 3 3 X.

tu 3 3

3' OQ

> ? 2.
tD 3

01 3 3

>

OJ 3 3 3' 00

it II
fD 3

SS CT

<
tn rt fD

NJ O 03

as
NJ O

>
_

CT TJ fD

<
^
CT-

<

cr
3

OJ

NJ

< SS CT- < S R ?


NJ O 03 QJ Q. m rt fD
ISJ OS

^ ^

CT-

<

tD

II
NJ

as4g 3
01 3 3 3 00

II
o > NJ
CT CT tD

NJ O 03

QJ

01 3 3

>

f
O

Sl
o
LU

SS
NJ

Z>
: >

O C~ NJ <Z

g ^ <3 Z>
NJ

9: f
" p ^

era

9: %
SS fD Nl 0 c~
NJ < ;

3 era 0 = %
tD

3 OQ

9: f
% S R 52 fD Nl O O Nl Z> SS n
Nl <:

-CT CT tD 3 3.

01 3 3 3' 00

NJ O

g eu
3 3_ 3' 00

>

-< 3

fD 3.

<
fD"

9: f
X SS N l fD o Nl o P SS
ISJ O

Nl <3

CO

Nl Z>

x' S S
Nl

Iff
o
NJ

9: f
>^
\

-CT CT fD 3 3.

QJ 3 3 3' 00

x'
NJ O NJ

SS
ISJ

n
<J

9 o
73 3

gg

g n & g
m Q

i &g
m 2

^12
o g m Q

1 &g
m Q
rO tD 00 QJ

. .

SS
ISJ

o
-LL

o o
fl

S.
-n
H
Ln

O
fl

ii ^ % il l 9% s i 9 K g g s. ^ gg i i S #g s^ %S as !5 I i II
ET.
in
era 01 ISJ O 01 3

ii

ii
5'

i i g^
3 OS N J O tu 3 3.

SS 3
Nl O fD 3

SS n N l <L 3. O
Ln H

NJ

3 fl

3.
-n Ln

CD
3 fl

ISJ O

P ^
0 fl

^
NJ O

3
fD 3

-n

fl CL

3
fD

^
Nl O

3
fD 3

c S R 3

3
fD 3 . fl'

SS ISJ o
01 3 3.

9:
fl tu

3 cr
o OJ
3.

^
Nl O

ISJ

Q.

S S

SS

SS

^
ISJ

r-1 01 tD 3.

fD 3 Nl O 01

5' S R

a sS

^ 3 cr ISJ
tD 3. fl' OJ

o 3 ^

Nl

fD 3

EL

01 00 fD

NJ O 1/1

on

to

as K
Nl fD

Nl

g
3
fD 3

SS
NJ

fD 01

o
3 00

o
fD OJ

SS NJ o
Ln fD

9g

on
fD

NJ

fD

NJ

3'

rt

o-

5 c m o
3 C

fD

3
fD 3

3g
3 g
fD 3

P
NJ CT 3 00

Nl O DO

OJ 3 CL

SS
ISJ

O 01 3 3. NJ O

tD 3. fl' QJ_ NJ

^
ISJ O OJ 3 3.

g
fD 01

SS
on

g
3
3

S%
on
ISJ

eu
tD

01 3.

SS oOJ

3
tD

CT 3" 3

OJ Q.

n 3' 73 era n ic. SS CT 3

Q
<

500

S
NJ

S
ISJ

3 00

S era
N , -J

a: ?
QJ

O ( T 5
fl

CT

01

q
00

3.
tD <

3
T3 QJ

-< 3
tu

tD

si
2. fD

C T 9:

o
3.

^
< 3
fD OJ 3 3

tD

oi
3.

9 3
fD

1 1
f I li

fD 01

3 #
Nl
tD

to

&
CT
3.

11
E 3.
3 rt fD 3. 3 00

- 1.
3 00

CT 3.

3 3^ 3' OQ

fD 01 3< 3 3' 00

9; 3
01 3 3 3' 00

8 ^

-<

3. fD

9 3
8 ^

NJ O tD fl

S R NJ o
SR
Nl

3.

< S R
Nl O CD O fl

-< ^
Nl O CD O fl

<
SS
ISJ

<

SS

^ k
T3 3.

O C D 0
fl

o o
0 fl

Nl

i l# if g# 1
00

ii ii
CD O n c

ii
is

S R
Nl

o SS Nl o

<
SS
O on
fD
ISJ

3 00

01

tD

01 3 3 3' 00

<
CD O

fD 3

c 3
fD 3

3
fD 3

3
tD 3

O CD m 3 C T

as
3.

3
tD 3

2g
S5
Ln I in -

S R 3

3_

o o g 3_ o
3.

o o g
3_

CD O

o
0

g
o

C D O

3_ 01 3. OJ

g
3_ 3 QJ 3.

g
3

3_ 01 3. ui^ QJ CT

o o g
3_

O 3

g
o

3_ QJ 3. 01 CT

QJ 3.

eu

01 3.

o
tu 3. QJ CT CT

01 CT

QJ CT

tu CT CT

r
CT

OJ CT

<
5 "
SS

is

^
NJ

^ g
X o

g c
3
fD 3

o o g

3_ 3 tu 3.

ll
o

CD 3

g
o

3_ 01 3. 01 CT CT

-b

QJ CT

^ g g
01 CT

01 3.

>

>

00

03

5
03

^ N fD 3 c n CD o 3l

5
03

5
03

>

03

5
03

>
03

SS >l N 03 o O o
fl c fD 3

>
03

5
DO

on on
Nl O

on
NJ O

O 4^

O 4^

l->

en on
4^
LU sJ

cn
4^
M M

cn

cn
+
LU

cn

cn

cn

SS CTNJ S

SS
NJ

CT-

<

SS CTNJ

CT OJ

<

SS
Nl

CT QJ 3. fD

<

S R oNJ QJ fD 3.

CT QJ

<
in'

Qj

5 i ^ I.
CT CD

I I II II II
ISJ

^ Nl

CT

<

as
3. fD

SS 2"
NJ QJ

00

>

3 00

-CT CT fD 3 3.

9: f
X

QJ 3 3^ 3' 00

II
fD 3

NJ O

C T C T
fD 3 3. X

>

OJ -> 3 3^ 3' 00

-CT CT fD 3

SS < NJ o 3 > OJ 3
32 3 00

fD 3.

II
Nl

II
3
3
3
OJ 3 3 = 3

o
03

m 9= fD
SS
ISJ

o >

3
OJ 3 3 3'

3 -CT tD

=:

a s
ISJ

^
NJ O

9: r
o on S R Nl o

era

<
fD"

9: f era

era

CT CT fD

SS < ISJ o 3 > tu


3 _. 3 3

o >

-CT

<
< SS CT
Nl
S

O +

LU

S R
NJ O 00

CT QJ

<

: <I

OJ 3 3

:i
3

fD

> -

cn SS n
NJ <:

Iff
fD 3 in

SS
NJ

<3 O NJ

g ^ o >~
oo <r

fD

g ^
SS
NJ

3 era 9: f S R fD
Nl
C3 LO

fD 3

ZS 00

C T
fD 3

2.

3 00

^m
^

go

Ln

O
O

6g
on fl

li
3
fD 3

>~ Z> on -L:. o n c 3

^ -5: S R n
3.

g
Nl O
3.

g n & g
< 2
S= 3
OQ
fD

P o
0 fl

S R
ISJ

-. f = ^^ fD Nl o c> oo SR n
ISJ

9: f

CT CT fD 3 3. X

a. fD S R < NJ o t3 > 3u
3 3' 00

fD 3.

Iff
O Nl

SS Nl o
00

11
-CT O

^ s
Sa s
tD NJ O QJ 3 3.

S
ISJ O O

2 SS Nl o
OJ 3 3.

si

3
fD 3 X 0 tn -CT rt 01 ^ Nl o fll 3 3.

tD
3

ll
^ g
01 fl rt

;g

i
3D 3 in

I!
73 3

5 g
d 2
LU

S R _ % n

>~ C>

S R
NJ

o SS
NJ

p ^ o
fl

o 3 o tD
O
73
3

^
O
Nl 01 3 3.

II
NJ O Ln QJ fD

a s2
SS
ISJ O

s ^ 0. as
o
5'

1
3

g
-I
NJ 0 C 3

5 ^
QJ
3.

SS
Nl

fD

SS

i
on
rt 3'

on
tD

on

ia

as S S Nl
O
Ln tD

S R %

SS 3

g 5
O OQ
-1

t- era en j n

m era

s%
31 CT 3 S

IT .!C E CT

II
NJ

fD

rt

7
S. fD

3
00

ll
O

00

1 ?

11
3
O

CT

QJ fD 3 3 3' 00

-<

it
i

%f if
0 >

^1
01 3 3 3' 00

sE
f to ^
3
-CT

SS.
CT

II
0

^
01

3
OJ

01 3 3 3' 00

01 3 3 00

< < <


LU NJ OS N l O

II 1 I I
C.
Q.

6 %
tu 3 3.

> SS %
o
ISJ

tu 3 3.
ISJ O Ln

S
C
tn

ISJ O QJ 3 C3.

SS

I! 1 1
CL

NJ O

Ss tSJ O Ln fD

S R ^ NJ
NJ O 3 O Ln tD

cn
NJ O

SS 5'

tD

2% g ^ ^ s
NJ
(3.

OQ jn^

Nl O I-*

3 00

OJ 3 3 3' 00

i f

NJ O fD

SS c

o <

NJ

fD CT

g. CD ro O

ll
.

< <
fl

CD O

1I
S ^
^
: NJ

-,

^ < i.
SP

S i.
% #

11

00 3 fD 3. N CJ

2% g ^
SS
O 3 era
QJ OJ 3 3 3

^ 3' fD < 3

01

as 3
NJ O

3. fD

01 3 3 3'

o CT SS OJ N J Q. o tD ^ > SS t3 u ISJ o 3
QJ 3 CL 3 3' 00

era

SS 3
NJ

S 6S. o

< ^ o
3 fl

<

Nl

as
Nl

< SS
NJ

? CD ^ 3
Ln fl

o
c

fD 3

c 3

u
g
3
3_

fD 3

O O 3 n c

O CD O
fl

OJ

c
3

fD 3

3
tD 3

9: fD 3
CD O

CD 0
c o

o g o

o
o o

3_

o 3 g

3_ 01 3.

QJ 3. tn 01 CT

QJ 3. fD QJ CT CT

OJ 3. 01

3_ 3 01 3.

o 3 g
o

g
o

3_

3_

QJ 3. Ol CT

01 3. QJ CT

1^

OJ CT

01 CT

SS NJ
03

?
^

5
03

I
03

5 o
^
Nl

>
00

O
fl

3
03

5
03

< <
b
3. 3

^ S R Nl Nl o o o o 3 3 ^ fl ISJ c 3 _o fD

^ ISJ O < N l SS on N J ^ o
ISJ O

CD

$ o 2
> ^
NJ

o 3 g
o

o o g

3_

o 3 g
3

O m

3 00
-CT 3.

CD O

3_

3_

3_ 3 OJ 3. CU CT

tu 3.

3 01 3. 01 CT

01 3. 01 CT

01 S R

O o o CT

Nl

o
c 3 tD 3

03

5
3
fD 3 OD

n c

5 o
^ o 03 o
fl c fD 3

Nl

>
03

5
OD

cn cn
NJ

on cn
Nl

o o
4&

o o
41^

cn
LU

Nl

on
LU

on

cn

m
+
LU

Ul

S S o"

3-

CT

3-

CT

CT

3-

CT 3.

II
CT tD X

If
NJ

'o'l
CT
01_

in

fD

<

si
5 3
OJ 3 o 3 OQ

'-^ 3 ^ ^
3

rt

r ^
3 H:
-CT

3-

CT

<

CT CT

^
NJ

CT

<

eu
3

^
O O

3.
3

'^1 SI. i i . 'ii 'ii ii


O

sr' 3
3 3

-<

tD

sr' 3
O Q 3 CO

sr' 3
3 O 3 00

s^
sr' 3
3 3 00 tD

5i

3-1
^ ^

3 E.
CD 3.

^ ? <
Nl 01 ^

03
NJ

3.

S S NJ o

CTQJ

<
M fD 3.

3 era =:

g f o 52
Ln

as p ?
o Z>

n o

fD

S _ f
O =:
fD \ Cl Ln

O ( S % O 52
Ln fD

8 g
< 2

4^ 00 ID on

^ n '

n <L.
O LD NJ

O O
fl

o CD
3
fl

n o >^ t = > >r CD


ID

g f o 52 Ln fD n o ^ ^
ID Cl

9 f o 52
Ln fD

O
Ln

fl

si
n 01 00 tD

3
tD 3 tn

<L

O O 00 ID ID

n <L o
00 ID vl n

O 3

o
3
fD 3

'

>
sr' 3
3 00 in

1
B

S S
Nl O CT CT
3 3.

k
O

03 NJ
ISI

3.

<
eu 3 3 3' 00

fD

f
fD

ll
3

>

f
fD

CT CT fD 3 3.

>

=:

fD era
-sl

Ln I-l O 00 ID

o
3
fl

cn o
3
fl

~< n

a sn N ^ . ol t
n
H O

x'

NJ

x'
Nl O H'

<:

fl

^ Nl ^
OU M

a s

o
ISJ

P
fl

3
fD 3 tn

3
fD 3

S 2
3
tD 3

Mg
fD 3

^ O o ^ 3 "a tD za 3
H

3
fD 3 in

3
fD 3 tn

a s^ Sa s
3
NJ

S R Nl o
tu 3 3. NJ

S R
NJ O OJ 3 3.

S R
NJ O 01 3 3.
ISJ O Ln tD

S R
Nl O OJ 3 3.

^ s S S >
O
3 flj_ M rt 3
jn^

QJ 3 3. l/l fD

il
.5

SI

il
3. CT fD 3 3.

< S R
ISJ

O O
fl

o
c

3
fD 3

CD O

3_

3
OJ 3.

< < < < < < < <


S R o
Ln fD 3

S R NJ o
on
fD

S S

NJ O eu 3 3. NJ fD

S S Nl o
tu 3 3. Nl O on tD

^ ^

.> o
LU LU

^
OS NJ

S S
O on

Nl O QJ 3 3. NJ O Ln tD

9 3g
en
3.
3. tD

il
n

S R S R Nl
O

NJ O Ln fD

S R

eb ^ LD ISI b O Ln
3 00

S ^
m
NJ

eu
3 3.

NJ O QJ 3 3. Nl

z ^ o ^
ISJ

S a sS o
Nl

o -o
3

Ln fD

00

3 00

3 OQ

3 00

3 00

3 00

3 00

2.

Q 5'
CD m so 00 in ^

<.
3'

3 00

QI

cu a.
tD

< 3
QJ 3 3 3'

fD

< 3

^ fD <
tu 3 3

01

OJ 3. fD

eu
Q.

oj'

01

QJ

o.

01

< 3

fD

CO

tD

tD

^R O 01

01 3 3

00

3' OQ

3' 00

QJ 3 3 3' 00

eu

3 3 3' 00

QJ 3 3^ 3' 00

tu 3 3 3' 00

OJ 3 3

3' 00

sf ^I
o
NJ

>
3

S S 01 Nl ^ o fD I tD -< tu 3. 3
fD

Nl O
fD

&

QJ 3 3 3' OQ

NJ

< ^
O 3

S R
ISJ O CD 3 n c

NJ

o
fl

S R NJ o o o
n c

< S S
Nl

^
3
fl

-<

NJ

O CD 0
fl

o o
c

fD 3

S S NJ o CD o n

< ^
fl

^ #
O

% < NJ
O
3 Nl

fD 3

fD 3

c
3
fD 3

O CD 0

ISJ

NJ

ID

13

a s
o
fl

eu
3.

^R
3. C

CD 0

tD 3

fD 3

tD 3

fD 3

g 3
3.
fD 3

o 3 g
3

CD O

o
o g

3_

3_

OJ 3.

QJ

3.
01 CT

3_ 3 tu 3.

o 3 g
3

CD 0

CD O

g
3

CD O

3_

3_ QJ

3_ 01

CD O

3_ 3

g
3

3_ QJ

o 3 g
3

D 3

3_

01 3.

3_ 3
OJ

3.
QJ

3.
01

01 3.

3.
01

01 3.

3.
OJ

QJ

CT I CT

S S tu NJ CT o
CD O n c OJ QJ tD 3

01 CT

01

01

CT

CT

CT

CT

CT

OJ CT

CT

5
03

01 01

01 01

eu
01

Ol QJ

01 01

01 01

5
03

5
03

5
00

~J

Nl O

en
4& 4^
LU

'ci
+
LU

cn

CT

CT rt

CT

<

CT CT

CT

CT

CT CT

3-

CT OJ 3. tD -<

<

I-

3
3.

T3 -S

s^
I

-r X

3 in. 3. rt

g -I
^

^
| _ C T 3

^
3 01 3 3' 00

'^1
-s ^ sr' 3
QJ

tD 3.

03 NJ

CT QJ 3. m

< in' rt

CT CT

CT

CT

<

' CT- <

3-

CT tu

<

'c-l
S ^

sr' 3
3 QJ 3 3 a. 3

sr' 3
QJ

sr 3
f

d QJ

SS

ii
3 3 00 tD 1 % cn LD P sJ on ^ 3 ^ fcl 00 fD 3

-CT ZT

^ i.
3 3

E - 1.
O 3 fD

Nl

o 52 Ln fD n z

o 52
Ln fD

ii
3 o

3 3 fD era

>

sr' 3

I l3 l I l3 l
OJ

CT 3

12!

'CT

3 E.

9: H: f? ^ ^

eu
3 Q 3 00

OJ

cn p
^ o fl c

2 n
NJ
CT 00

p S' 00
vJ LU

O 3 fl C

o
3
fl

cn 0 0 g f P "o o
fl

fD 3

cn P ^
3
fl

- f x' S R tD
Nl

3 3.

ii
3 O

^ i.
g f
fD

QJ ^ 3 O 3. 3 00

sr' 3

g f
tD

ii,
O 3 00

g cn f
p "o
3
fl

3 OQ tD

cn p ^
0
fl C

g n
ISI

CD I

cn p "o
3
fl

3
fD 3 in

3
fD 3

3
tD 3

3
tD 3

3
fD 3 tn

C D 3 S R n c NJ
O

SS m
NJ 3

3
fD 3

3
fD 3

p cn "o o ID fl %' c
00 fD 3

i-> ID

3
fD 3

< < < < < <


Nl O 01 3 3.

a s
S R

S R
Nl O OJ 3 3. NJ

S R
NJ

^
o

Nl

Nl O

S R
NJ O 01 3 3. NJ O tD

o cr

^
o

OJ 3 3_ Nl O tD

QJ 3 3.

tu 3 3.

SS
ISJ

NJ O Ln to

Ln fD

on

O
fD 3

on

SS NJ o on
fD

SS
on

li
m

NJ O 01 3 3.

^
NJ O OJ 3 3. NJ O fD

S
NJ O OJ 3 3. NJ O Ln fD 3 00

NJ O

eu
3 3. NJ O Ln fD 3 00

3' 00 tn QI fD

3 00

3 00

era
01 Q. tD

3 OQ

3 OQ

1 1
rt

SS NJ o on
fD 3

SS
on
3 OQ

SS

SS

era
01

Ss
QJ rt

a.

QJ Q.

tu

01 3

fD < 3

3_

3' 00

QJ 3 3 3' 00

^ fD -< 3
00
01 3 3 3'

^ tD <

01

QJ 3 3 3' 00

01 3 3

^ fD < 3
00
01 3 3 3'

eu

^. = ?

K 3 m
fD <
3 < tD

01

OJ 3

^ tD <
01 3 3 3' 00

^
< 3
tu 3 3 3' 00 fD

eu

01

< 3

3. fD

a.
fD

3.

3' 00

01 3 3 3'

-< 3
01 3 3 3' 00

< S R
NJ

S R
Nl O

SS
Nl O

^
fl

O O 3
fl

o
3
fl

D O
fl

c
3

to CD 3

3
tD 3

3
fD 3

g
3

CD O

3_ 01 3.

3_

o 3 g
3_ 3 tu 3. QJ CT

3
QJ 3.

01 CT

OJ CT

<
c

O O 0

NJ

S R
Nl O

gk E^
3.

era

< ^ ISJ
fl

-< ^
o
fl

o
3
fl

C T

3
tD 3

NJ O CD O n

O CD O

NJ

C D 3

3
fD 3

c 3

c 3
tD 3

c 3
fD 3

fD 3

o 3 g

o 3 g

CD 3

C D O

3_ 3 tu 3. QJ

3_ 3 OJ CL OJ

3_ 3 01

3_

o 3 g
3_

CD 3

g
0

3_ 01 3.

3
01 3.

1.
01 CT

o
QJ 3. 01 CT

CT

QJ

1^

OJ CT

CT OJ QJ

CT OJ QJ QJ

OJ QJ

OJ OJ

tu QJ

SS 01 ISJ o OJ
fl

01 01

CD 0

5
03

< <
CD
3

CD 0

3_ 3 01

3_

eu

a.
01 CT

3.

01 CT

01 ^

01

N l QJ O

as

c 3 tD 3

o
fl 3 fD

3 c

S R ISJ O f 0 cl CD 3 tD 3

CO
00

Nl

g
en
ID M sJ

4i

m
+
00

cn

ill
II
Z 3

SS NJ

CT 3

< tn

SS
Nl

S | ^
ISJ
O

o ro S R
Nl O

>
CT CT fD 3 3. X

>

CT -CT fD

<
CTQJ 3.

< in' rt

SS CT- <
NJ QJ

CT

<

SS CT- <
NJ QJ

CT-

<

S
3.

<n'
rt

SS CT

CT-

<

fD

II
NJ O

as s P f e r a
Nl O

OJ 3 3 3' 00

>

< 3

fD

II II II
fD 3. Nl O

NJ

QJ 3.

-CT "CT fD 3

9: f

9: f

OJ 3 3 3' 00

OJ 3 3 3'

>

CT CT fD 3

QJ 3 3 3" 00

Nl O

CT CT
fD 3 3.

>

QJ 3 3 3' TO

II
_ fD 3 3. X TO -1

ISJ
O

o ro S R o >
3 NJ

Nl

3
QJ 3 3 3' TO

>

-I
NJ

era

CT CT fD 3

3
-

<
CT QJ 3. fD <

'

3-

<

l_

fD 3.

QJ

.11
3
OJ 3 00

QJ 3 3

fD

g C D
ISJ
O

i>
\

g ;
o
SS ISJ o
fD NJ 4^

Si
p ^
0 fl

S f o
i-

9: f

^ W g^
^

x' SS
O
NJ
ISJ ISJ

I
fo"

9: f
NJ O Nl

rt,

9: f
X

3 TO

i.
3 O

9: f
NJ

g
cn

f
tD

Zl
3 3.

C)
CD

> n

c~
Z>

S R ro"
Nl SS

^
NJ O NJ

tD ^

=^ tD

<~

n
CD O fl c

5'
NJ O

era g SS 3
eu
3 3.

3
SS
tD 3 : fD

It
ISJ
Ln fD fl 0 3 3.

S(Z g
G 2

SS f-l

S
-n Ln

o
3 fl

p ^
3 fl fD 3

S R

n
C D 3

S R
ISJ
-n OJ

n
<L
3 fl

P ^
3 fl C

ISJ .L-

o ^

S CD

on
NJ 0

S R 3
NJ O

as c 3

n c
ISJ O
fD 3. fl' QJ

S R
Nl O

fD 3

6
LU l_>

&
as Nl

ISJ

s as s
73 fD fl

3.

: g ^ g.
OS ^

SS Nl o
tu 3 3.

tn

g %
9 M

R 3
^ fD
N J 3 O 01 3 CL

% g

QJ

ISJ

NJ

OS

SS

SS
Nl 00
Nl o c 3 fD
CT CT

O l/l fD

O
O

Nl
l/l

SS NJ o
tu 3 %

SS 5

rt

ss
S R 5'
Nl
O

era jn CT QJ 3.

SS 00

00

tn 3.

Nl

in

a s3
NJ

-o
73
tu

< 3

fD

2 ^ vJ
O 4^ N M tu -

QI 3 3^ 3' OQ

^ S R fD < Nl o 3 ro
c
3

II
eu

NJ O

SS

n ^ CD

s
CT as CL

I!
^s
O OJ

3
tD 3. fl' QJ

S
ISJ
O OJ

ID 3

tD 3

3 cr
fl tu

&g
o OJ

3 cr SS
NJ

^ s. 2g
3 3

gK 9S

A a
3
tu fD T-'

JC.

^s

1?

#
NJ

<
CT

< 3
O o

<

fD

ii
cn rt 3 TO

9 3
fD O
3.

QJ 3 3

fD 3

d
OJ

I3
3
OJ 3 3 3' 00

SS

g 3
3 00

I e r a
o ^
NJ

< S R
NJ O

S R as
NJ

^1
o
NJ CD O fl

o 92. < ^ S ^
Nl O CD O fl

ii
O -n 01 as

li il 11 If g,:
^ NJ CT

II
tD

m -sc.
TO

9 3
fD fl

< <
SS
Nl g
fD

QJ 3 3.

O oCT rt tu

u
X
3 tD

3
tD 3

SS
NJ 3 tu 3 3.

SS ISJ o
OJ 3 3.

S R
o
ISJ
Ln fD

eu

11
S. TO
fD tD 3.

S R
NJ

on
fD 3 TO

fD 3

S NJ
O fD

3 TO

01 3. fD

QJ

f ^
f? 3
o
^

< 3

fD

3.

gI
5'
TO

ISJ

o
3 fl

LD

3
fD 3

3 3 -b fD 3
3.

^ R
NJ C

O C D O

< SS NJ o
CD 3 fl

? ^

3
fD 3
-CT 3.

Q
"O

n
in

3
tD 3

II
QJ_

I! -.1
fl

g ^
fl

^ NJ O

ro o CD ^ O
ISJ
O Ln

> -< I SS J > N o C D o O ^ fl


NJ O

3' TO ^

QJ 3 3 3' TO

3
fD 3

>

3
tD 3

If
-1 3.
3.

<

on 3 tD I

fl C fD 3 O 3

CD O

g
3_ 3 01 3.

o o g
3_ 3 OJ 3. QJ CT CT

O
O

9; o
3

o
3

g
3_ 3 QJ 3.

g
3_

g
3_

ll
NJ O

>
X

b 3

l/l

o g

CD O

g
3_

^ 2
o
01 3.

b
3.

o o g
3_ 3 QJ 3.

g
3_

3 tu 13.

3 QI 3.

OJ CT

01 CT CT

01 CT

ro
fD'

5
ro

5
ro

5
ro

I
ro

u5
I
tu CT CT

N_ J 3 3O QJ 3.

o
01 3. 01 CT

o
01 3.

eu
I
CT CT

QJ CT

s r
CT

tD 3

B
ro

5
ro

> ro

ro

s
ro

<
u g
3 3_ 0 QJ 3. OJ CT tu OJ

SS ISJ o f c 3 CD 3 l

ID LD

ID

Nl

o o
4^

en Ln
NJ LU LU

+
LU

CT

<

NJ 3

^ " t;. < SS NJ 3


NJ O

CT QJ 3. fD -< 3 QJ 3 33 3 TO

<

^
O
ISJ

CT-

<

S R

3-

<

CT

<

QJ

o > 3 3
tD 3

II Ill
Nl

eu
3

3
3

n ^
-CT -CT fD 3

tD 3.

n o

a s4 5 Nl
> QJ 3 S 3 2
tD 3' TO

01 3 3

o >

NJ

ll
fD 3 13

3 E
3 . tD
Sf'

^ S" < QJ ^
fD

3 TO

9: f

9: f

3 TO

ll II
3 TO

<

< <
CT-

<

NJ

cu
3 3_

II
Nl O

tD 3.

3' TO

CT CT
fD 3

>

QJ 3 3

If II
fD 3 3 TO NJ O NJ l-

S R

CT-

<

S R 2" < NJ QJ o ^ ro
SS
Nl O
fD

SS CT- < |

to

s s.
ro
tD 3 3 TO

3.

fD

CT CT tD

>

9: f

Iff
as NJ
O Ln O

Iff

I
fD"

Iff
O t-"
NJ Ln

B:"

fD 3 3 TO

9: f

3 TO fD

QJ 3 3 3 TO

as< A9: f
X

CD 3 fl c

go gP M g on g c
" fl

>^

S R
Nl

g^
i- z> ^ n

9: f fD & 53

;:r

9: f X rt. ^ tD

9: f
fD

11
rt,

gw
<3 I-* ^ <~

g n

QT

3
fD 3

S R
Nl

o
l

S
NJ

1
o =
Z m

% 3 SS g
NJ 3.

o
3 fD -CT CT

3 01

o
01 3 3.

SS Nl o
tu 3 3.

i!
Q cr ? S S
OJ 3 (3.

&g

&g
Ln TO ri c

P ^
0 n c

n c

o o

P
"o
0 fl

i r?

NJ

1
o 3-

3 3

3
tD

3
tD 3

o n
73

6g
n 2 Q m ^ 3g a^
NJ

S R "

&g

3
fD 3

sl
01

S
NJ O

o
tu 0

a s
NJ

ii
Nl
NJ Ln 73 NJ

% S
sP OS

O on rt
tD

O on as
fD NJ 3 oq tn^

as as Nl
O

rC
TS jsj

Nl O
Ln fD 3 TO

cn tD

Nl

3
CT OJ

b
3.

11
^ fD < 3
OJ 3 3 3' TO QJ

il
'NJ
L 4n ^ 73

i is i gl
O

S
NJ O tu 3 3.

n SS
Nl O
fD fD 3 TO

S
NJ O OJ 3 3.

li
rt 3

2
-

3.

S3
3.

i f if
01 3 3 3'

^ fD < 3
OJ 3 3 3' TO

OJ

i?
^ SS NJ o o
4^
fD

TO ISJ in

il
O

ro
> z
1

NJ

li
Nl O
Ln fD CT CT fD 3

NJ as o NJ O p Ln
C fD fD 3

S R
Nl O

Nl O Ln tD

on
fD

3. 3
TO OJ CT

era

SS Nl o
3 3 fD

3 TO ^ CT

QJ 3.

3
3' CT
QJ

-<
3 01 3 3' TO

p%
C

fD

s si
_ 3 3. C

CT-

sg s ^ s^
sp 3
-1 fD Nl O

ii
1=
OJ fD

ifl, 3 b 9z
3. rt,

a iOJ fD

-b % ^ < 3
QJ 3 3 3 TO

^
NJ

fD <

fD -<

go^

ISJ O l->

tu 3 3

b 3 3 3 9; 9= 3' tD TO <

S < ^
o o
0 fl

NJ

s^
s

<
SS
ISJ

o o
3 fl

< SS NJ o
CD 3
fl

<

as NJ
o
CD O
fl

i
o o
Nl
LD

3
fD 3

o
3

g
3_

p
a s i
Nl 3
QJ CT

3
g

3
fD 3

3
fD 3

tD 3

CD O
3_

CD O

b
13.

CD 0

3_ 3 OJ 3. 01 CT

g
3_ 3 OJ 3. 01 CT

3
QJ 3.

o
OJ 3. QJ CT

QJ CT

^ < < <


3

sI
>

QJ 3 3 3' TO

^ sS < ^ gE <
^ 3

o O n

Nl
QJ C OJ

3 3

1 5' >

TO SS -< ISJ SS o Nl X O 73 o c o fl ^ c

<

^
n c

S^' 11 ^
NJ fl

ISJ O CD O

O CD 3

o
0

ISJ O 73 fD 3 O

3
o g

3
fD 3

3
o g

tD 3

fD 3

g
3

b
3.

CD 0

CD 3

3_

3_

3_

3_

QJ 3.

9 i
3 3

3 01 O. OJ CT

3 QJ 3. OJ CT CT

3 tu 3.

3_ 3 QJ CL tu

iB CD
> o ro

as
QJ CT

SS OJ 3

5 11
ro
QJ 3.

'o

> ro

5
ro

Nl O

5
ro

o 0 > f l c ro

3
fD 3

5 11 ^ SR 3
c5 S ro fD r fD 3. 01 o Cl a o

sa

CT

tu S R
CT Nl

ii
ro

5
ro

5
ro

3 n > c

ro 3
fD 3

f
ro

ISJ NJ

NJ O

Nl

o o
4^

o
4&

cn Ln cn

b o m 2
H

on LU 4^ O

cn

cn

"o
+
LU

LU

SS CT NJ 3

o- < SS
m
Nl O

CT-

<

SS
(-1

CT-

<
in'

II I I I I I I I I I I S I I S 3
n
SS
Nl O
-CT -CT fD 3 TO 3.

Nl 3

NJ E o

S R oNJ 3

SS CT < SS CTNJ 3

CT3 3.

< in' tD 3.

SS CT- < S R o"


Nl

>

OJ

>

^ NJ o > 3

3 TO

CT CT fD -

QJ 3 3 3 TO

9: f X
^
NJ vJ fD

9: r) X rt. ^ fD
ISJ
O >~

o z>
^

II
Nl

CT CT fD 3 3. X

tu 3 3 3 TO

CT CT fD

s i
3 3 3' TO

>

o >

NJ

fD

S R
ISJ

f rt,
fD"

9: 1

3 C T

g: (
tD 3 3. fD

QJ 3 3 3' TO

3-

II
fD 3 3 TO

< 3
01 3 3 3' TO

fD

n ^
Nl

tu 3.

S R
NJ O

CT-

<

o >

3
QJ 3 3 3' TO

II

cn Z>
SS n Nl o 0 O n n
01 c

SS n Nl o o o

^
NJ

n
CD 3 n c

on
NJ

S R n 3 O

Iff o Z>
00 C ;

Sf
O LU

9: f

-CT -CT tD 3 3.

II
fD 3 3 TO

as
NJ

II
3
OJ 3 3^ 3' TO

o >

f ^
Z>

>~ >^

S
o
NJ

9: I

CT CT fD 3 X 3.

9: f
S R NJ o
LU NJ O

^ >Cr LU

5^
0 I-* > -

S R o
Nl

S S n
NJ 4/

as
Nl O LU M

fl

3
CD 3 in

S Nl
o

3
fD

o p
73

3
tD

SS SS NJ Nl o o -a t u o 3 C3. CT SS
fD

o cr y ^

il
> 3

3 o
m 3

o SS on
ISJ

g@ 5 '
< TO

on SS
Nl

o za 3 ro QJ
CT 3

<
3.

^ 3g
^
ISJ O Ln fD

ISJ

11
S R as
Nl QJ O % N o nl O tD 3 g CT OJ

a s cr S ^

li I^ il
QJ C 3

ER

p ^ O
fl c

g n & g
f-l

3
tD 3

NJ

^ ^ o > ^ Nl
CT O OJ

sl
n

&g
Ln Ln fl c

g n

S R

6g
^ 2 35 3 Q5
NJ cr

P ^ O
n c 3 in

% 3 S S g
n

S R 3 tD
Nl O

NJ fD

il f l as
Nl O
c rt

X C

O OJ

II
ISJ

rt,

sP

3.

^iO

i?
QJ Q. fD -<

g S S

Is
S 3
= CT

il
on tD

Nl O QJ 3 3.

2 %

S I
SS

^ S R NJ Nl o o
on Nl Ln

S R%

as CT

l a ^

01 3. tD

3 3

11 il
11
-< 3

^ fD < 3

S 3 2S 3'
N mJ CL TO fD

S R o"

^ o o

T3 3.

3 TO

tu 3 3 3' TO

as 00

< S R NJ o o
3 fl c

Sk
o <

CT 3

<

il it
01 3 TO

II i l 9=
3 3' TO

SS
Nl
LO

b
3.

<
ISJ 3.
rt_ 3 TO

II
X >

Rg
O Ln

II
fD NJ in

1g
k ^
rt,

^
o

tD 3. fi'

S S Nl S o S ro ISJ O
c 3. fD 3 Ln fD 3 TO

NJ o 3n fD TO

OJ 3. fD

S 3 5 -b ^
r^ N J Ln O

^ 8
CT fD 01

-b

3.

st
s^

> TO 3. , 73 fD rt, 73 . <


01 3 3 3 TO

01 Q.

01 3 3 3' TO

9 ^
^

-< 3
OJ 3 3

fD

^ Nl
fl

iB a s

o o 0
c
3
tD 3

51

sB
ro < S S
TO fD

3 3 :
d .

^
< NJ

<

3.

q S S

^ ISJ c
3
tD 3

lt
.s i
ID
M

<
Nl O tu 3 3. 01

S R

fD

01 3 3 3' TO

-<
SS
ISJ

<

3
fD 3

M
fl c CD 3 3 fD 3_ 3 3 tu 3. QJ CT

ii
S R E3

NJ O

b A
CL 3

fD 3

o o
g
3_ 3 QJ 3.

If
C

O CD O fl

3
fD 3 CD

ls l^
o era c

O CD O f^ l

Nl

fD 3

o 3 g 3_
3 QJ 3.

CD 3

g 3_

o
3

3 01 3. 01 CT

st
8g

g 3_

o o g
3_ 3 eu 3.

3 QJ 1. QJ CT

3_ 3 01 3. 01

01 CT

'I
ro

>
ro

ro

El
-h O 01 3.

QJ CT

QJ CT

5
ro

5
ro

s r r
fl ro

I
ro

<
3 fl

o o
c

o
CD 0 fl

c
3
tD 3

fD 3

C D O

CD 3

o
o g
3_ 3 01 3.

3_

3_

01 3. OJ

3 OJ C3. eu CT

>
ro

s
^
NJ

01 CT

ro

'#
ro

CD O f l QJ

c 3

CT fD 3

Nl LU Nl NJ O

en on
00 M 00

'ci
+
00

oo o

SS CT- <

S g.
o
Nl

SS CT NJ 3

^
o
NJ

CT-

<

CT-

<

3 E

S R o"
ISJ 3

cr
tu
3. fD -< 3 OJ 3 3 3'

QJ 3. fD

S R o" Nl 3

S R o"
Nl 3

S R
NJ

CT-

<

-CT CT fD 3

>

tu

a s <

CD
NJ

SS

3 3 3' TO rt,

9: f
X sp

II
3 TO fD 3 3.

o > 3 3
fD

II
3
QJ 3 3 3

fD 3.

.8^
^ <

a s < o 3
NJ

3 C T
fD 3

>

-l a s <

-Sf
Nl
CT CT tD 3 3. X

o
P
NJ

tu 3.

^
NJ O

CT

<

CT-

<

3 E

tD

fD 3.

<
fT

_< TO

9: f
X SP rt,

9: f X rt,
sP

QJ 3 3 3" TO

li
"CT fD 3 3.

3 TO

3
fD

f
fD

^ -Cr ISJ NJ ^ ^ z 3 fl cn c > 3 ^ fD


o
(0 NJ T3 3

K n o > p

x' SS
ISJ
NJ 00

^ p
vl

o S R

sg

SS

s 2 ^ g p
ISJ
O CD 0 fl

9: X -h
sp

II
ID 3

a s3 < >
o
OJ 3 3 3' TO

CD
NJ

os 3 a < > IU
3 C T
fD 3

I
tD"

9: I
X sp
CJ

3 3 3' TO

o > 3
CT fD

I I 5?^ 3
QJ 3

s g. a

TO

Nl

S R
Nl O
tu 3 3. NJ

II
s ^
on NJ

ro O

sg
CD 3

b gn
S g

9: f X rt,
sP

3 TO

S R
NJ

-h

9: f
tD

II
3 ^
9: f
X Sp
NJ

Sn >
o
t-

o > i- C ;

K
^
NJ

c
fD 3

3 S R
Nl O NJ Nl fD 3

^
Nl O ISJ ISJ

SS
NJ O QJ 3 3.

S
ISJ O QJ 3 3.

SS Nl o
QJ 3 3.

SS NJ o
O Ln

SS

o S R i<i M 1
Tl O 3 TO

SS NJ o
Ln ^

01 3. tD

I
01

a s^ ISJ o
^
fD 3 TO fD

S S
ISJ
O Ln

i I i l11 5 cr 11
S R Oas
NJ 01 ISJ 3 3.
ISJ O

g p
> 3

o^ o fl c
fD 3

% c
sg

rt, ^ {2 =

a S

n
Q
3

Nl

ISJ

s ^ n o
Nl tu

rt

l i^
Nl '~'

fD 3

ISJ
O m 3 3.

SS on
fD

as S R
NJ

fD

ISJ

on
^ fD

3 TO

3 TO

as S C L

i l- '
; TO

Is
|3
fD

n S R
SS
NJ 0 NJ O on tD

li II as
Nl

il
3.

cn

o K

f= 3
fl

CD

01 3 3. NJ O in to

Sg
> o
^ ' OJ

a s cr

fD 3 tn

SS

TO fD

SS

SS

C D 5'

S ?
NJ 01

as -i?
LU

S ^
eu 3.

^ <

^E S I.
Ee r a

if. - 1
^
r"

il
NJ fD

^ 01 ?
SS

3 ^ e^ ?

1 5' -E' %
CT ^

ISJ

3.
\ CT

il
Ln

o. %
3. fD

?. S
^ %
OJ fD
CL

E.^
QJ 3 3 3 TO

1|
O 3. Nl O
fD

11 <
o o
3
fl Nl

as TO 3 3^ 3' CT TO

83 <
OJ 3 3

QJ 3 3 3' TO

ll
o 01

as 9: NJ fD o < > 3
-<
in
-CT 3.

QJ

1 | -a ro
3. <
tu 3 3 3' TO

B#
D

&

3 fll_

3
n

3
00

g
9
Ln TO

QJ 3 3 3' TO

1 o 3
<
QI
fD 3 TO

fD S R <

< SS NJ o
CD 3 fl

S R

00^
NJ o CD

If
QJ TO m_

9; I.

<
SS
NJ

8 ^ ^R
CT CL

-< S R
NJ O

c 3
tD 3

O 3 g

o
3

3_ 3 01 3. 01 CT

g
3_ 3 01 3.

01 CT

<
c

fD 3

11
tD 3 O 3

D 3 n c
tD

" E .o ^
ISJ

-< SS
CD

OJ 3 3

-<
^
ISJ

3
O 3

o fl c

O C D 3
fl

3
tD 3

3
fD 3

o
3

C D O

3_ 3 OJ 3.

3_

< g S R 3_
o g
NJ 3 QJ 3.

O O g
3_ 3 01 3.

C D 3

C D O

g
3_ 3 QJ 3.

g
3_ 3 QJ 3.

3_

3 OJ 3.

o
01 3. 01 CT

OJ CT

tu CT

b
3.

'a.
ro

QJ CT
3.

01 CT

tu
CT

OJ CT

> ro

> ro

B
^
NJ O 3 fl 3 tD

$ ro

ro o

> ro

> ro

5
ro

5
ro

< <
t-*
O QJ 3 3. NJ O 00

E
sP OS NJ
O rt

3. vp ds ISJ

on

NJ

S R

3' TO

.in^

00 3

as 3 .

E g i.
O 3

S ^
9&

II
^
o
0

o
3

8i
g
3_ 3. QJ CT

3_ 3 01 3. 01 CT

fi

o eu 3

3.

^ 5
o o ro 3
n c 3 fD

Nl

>
ro

3 c

NJ

4^
NJ

LU

Nl LO LO NJ O

O 41^

Ln ID NJ

on
00

on C)

+
00

CT

<

NJ

S R o"
01 Q. fD

-SS
a s <
-CT CT tD 3

s E
33 TO 3

>

a s3
o
Nl

CT CT tD
X

>

<
S S cr < NJ o 3 E
CD
QJ 3 3^ 3' TO

cn

LU O

CT OJ 3. tD

<

S S CT- < S R o" 3 m Nl NJ 3 o 3.


CD
O

a s eu
o
NJ

CT

<

S S NJ o 3 > QJ
tD 3 3 3

II
tD ^

a s < O 3
Nl

s .
TO 9: f

C T C T fD 3
X SP

>

eu

S S -< Nl 3
C T C T
fD X sP ds Nl

tD

fD 3.

a.
tD

S S CT < NJ E o 3 3. rt

SS CT NJ 3

CT

<

a s <

CD

3 3^ 3' TO
rt,

>

9: f
X

9: f
fD

9: f
Nl Nl

01 3 3 3' TO

li
tD 3
X sP

S S ISJ o
T3 CT fD

< 3
QJ 3 3^ 3'

k <
NJ

CD
O

fD

>
-

3 TO
rt, =

CT CT fD w

>

tu

p f a s <

NJ 3 O 3. CD

SS
NJ O

CT

<

in'

a s
o
Nl

fD 3.

3 3 3' TO

S S tD NJ o cLo
NJ

rt.

f rt
ft,

9: f

9: f
X sP

TO

9: f

II
tD 3 SS TO 3 tD NJ

CT CT fD 3
X SP

>

QJ 3 3 3' TO
rt,

o ^ 3 NJ o tu
3 3

II
3 3^ 3' TO

>
fD 3 3. X

9: f

S R
NJ NJ

<;
< ,

o Z>

K m o i>
- < < ,

S R c-l 3

2 ? S

P ^ 3
fl tD TO fD 3.

#c
sg
o 2
< 3

S R n 3 o
tD 3

3 O
Nl

<3 Z> t-* "C;

S
ISJ

rt,

^n
Cl

as
NJ
ssl

as n

13 Z>
\

o Z>
\

fD ^

9: O
X

II
3. ISJ

c 3
fD 3 NJ O 01 3 3. O Ln fD

?2
% NJ
O OJ 3 3. NJ O Ln fD

o 3 ro f l O c z 3
m SS
Nl

D 3 n c

S R o n o
n c

S S n
NJ 00

o
3 fl c

p > <: rt. S R n Nl o o o


fl

K o
NJ

Z> on < ; as f-l

S S
ISJ

C D O
fl

P ^ S R 3
Nl

Ln
Nl

3
fD 3 3. ^

3
fD 3

c
C T 3.

c
3
fD

fl

S R% Nl
O

tD 3

. 3 SR n>

3
fD 3

o 01
3. 3

3
fD 3

I'i
3 fl rt

O 3

5'
3.

< < < < < <


SS

n <

o
3

SS on rsj

9
3.

Ln fD

il li
tu
Nl

o Nl
O

%
3 3.

s ^
P S S

Nl ISJ o ^ OJ NJ

Sg
C

s^
3
rt

S
ISJ O 01 3 CL
Nl O Ln fD

SI
73

SR
ISJ

SS

^K
O

S g
73 NJ NJ O 3 3.

ISJ

g S S NJ o
Tl 3

^ NJ
O 01 3 3. NJ O Ln fD

a s %
O Ln rt rt fD TO

ag
S

K g

^ g
NJ _ O
Nl O in fD

3 3.

8g
z

S S

n S S

TO ^
CT OJ

3 TO

tu

" g.

3 TO

5'

S R
l_k

01

fD

B 9. o
9 e r a fD n S S -iC.
3.

ll

il
ISJ

S^
Nl

n Ln S R ..
rt

o
3 3

3.

-b

3'

QJ

s^
OJ
fD

3.

TO

Ln ~

3 00

3 TO

CT 3.

3 TO

3 TO

tD
^

1^
fD

OJ

OJ 3 3 3' TO

< 3

fD

tD

OJ 3 3 3' TO

> CT OJ 2 3 b
3 TO

CT

9:

QJ 3. tD

TJ 3.

01 Q.

Ol 3 3 3' TO

'1

< 3
QJ 3 3 3' TO

fD

<

^ tD <

01

01

a s
Nl O 3

01

tu

1
Nl fl

QJ 3 3 3' TO

TO

3 3 3'

tu

3 3 3' TO

OJ 3 3 3' TO

< 3
QJ 3 3 3' TO

tD

< S R 3
Nl

tD

o
73 CO CT

QJ 3 3 3' TO

S R
O C D 0

<

SS
Nl

-< S R
O C D 0
ISJ

o
fl

C D O

< S S NJ o o
0 c
fl

c
3

3
to

3
o 3 g
3

n c
3
tD 3

-< S S NJ o CD o
fl

-< S R
Nl

-< S R
Nl

o 3

< ^
ISJ

C T 3.

< ^
NJ

fD 3

CD O fl c
fD 3

o
fl

CD 0

O O 3
fl

o o o
n c

fD 3

fD 3

c 3
fD 3

3
fD 3

3
fD 3

o
3

C D 3

o
0 3

o
3

o
g
3
01 3.

3_ 3 01 3.

3_

3_

C D O

3_

3_

3_

o g

o
3

o
3

C D 0

3_

01 3.

OJ 3.

QJ 3. OJ CT

3 tu 3.

3_

0 eu

3_

3_

3_

3.

tu 3.
OJ CT

3 tu 3.
01

3 tu
3.

tu 3.
OJ CT

CU CT

01 CT

OJ CT

OJ ^ CT

'a.

5
S R
NJ

O CD ro 0
fl fD c 3

5 ro

5
ro

5
ro

NJ O O O fl

01 CT

OJ CT

3.

3.

> c ro 3
tD 3

>
ro

5
ro

5
ro

'Z 5
ro

OJ CT

5
ro

5
ro

ISJ

NJ

f
_vj_ NJ O

4
Nl O

O 4a,

on

on
ID OJ 00

b
vj

"5
+
LO

cn +
00

CT- < 3 in' 3.

S R CT ^
NJ
3

<

S R CT ^
NJ
3

<

S R
NJ

< 3
tu
3 3 3' TO

tD

fD 3.

OJ S 3 3 3 > 3 3 '

.S a s <
TO fD

fD 3.

.8^
NJ

a s <
o 3

fD 3.

3 o ^
CD
tD

3 C T
fD 3

>

OJ 3 3 3' TO

S S NJ 3 o 01

>

f p
O 3 n c

9: <
X sP ID

9: f
X sP

5 ! R
ISJ

rt,

o Z>
-v;

K m C3 Z>
NJ C r

rt,

CT CT fD 3 3. X

<
CT < tD 3. 3 3 3' TO

^ ISJ
O 00

a s o
3 o

;c
sg
fD fl

S S p

3
tD 3

li
ISJ
fD NJ > -<

o cn o fl OJ ^ c Oj' 3 CT
O
tu
fD 3
3.

NJ

NJ

^
ISJ fD O OJ

01 3 3.

< S S =

3 Ln fD S S 3 as NJ O
NJ O

% ^ ISJ

tu

S R
NJ

ISJ as %

o
fD 3 TO

on

il
fD TO ^n

^ ^ Nl g 3
OJ

3 3.
NJ O

NJ O 3

ISJ

n S R^ ISJ
tD

QJ 3 3.

O on

3 TO

S S Nl o
73 fD

SR CT

^ tD <

01

sl
O ID

%
.<
-1

^
OJ
-I

tu 3 3 3' TO

ii
d
c-l

"r-

3.

3
QJ 3 3 3' TO

< <
NJ
ISJ

C D 3

ll 1 1
O O
X 3

< <
s
3 QJ fD

^ S -<
NJ

S R
NJ O

cn S S
ISJ
O

QJ 3 3 3' TO

^ ^
tu
NJ O O LD

S R

NJ O 13 3 fl

CL

fD 3

3_

o 3 g
3 tu

01 3.

g cr
Nl O

3_

o 3 g o

3_ tu 3.

s|

3.

QJ CT

% 3_

OJ CT

eu
CT

il
^

> ro

S S 5
ISJ

>

as N c n 3 o O fD 3l

o ro
13 0 f cl 3 fD 3

ro

3
CT

ns
00

o
o >
T3

> o

01

>
D

> o
i-

>

3
ID

M NJ

4^

Ln 00 Nl Ln
1/1 ID

cn
LU 00

NJ

NJ

<
ID

o
4^
vj

^
vJ

in
cn cn

cn

cn

cn

cn

cn

3 C3. fD X

cn

cn

Nl

cn

CT fD

cn J>
n

b. o
TO QJ 3

f ? ?
> %
I 3

+ n <' +
(~i

6
3

t o
ID

5'

c
Ol

o
3

-o
to

3 in

il
CT 3

o
fD

-o
fD n Ol'

n.

S[

? ^
OJ

.1
P
3

OJ

01

OJ

3;

=t

3;

=t

O in

I8 . =t
01 OJ (/,
f-l fD 3

+ 01 ro =fi
01

n
fD 3

n
fD 3 n O

n
fD 3 fl

n
fD 3 n O 1 ID TO Ol 3

n
tD 3 n O 1 fD TO 01

8
3

8
I ID TO OJ

3
I fD TO

o
ID TO OJ 3

fD TO 01 3

+ > m + + c + +

f l fD 3 m O

3
fD TO

<
ID TO 01

fD

<

<
fD

o c o
+

TO QI

o
3

o
3

o
3 OJ

o
3

01 CT

as

QJ CT

> Q. 3.
3' TO rt 3 TO rt

>
CL

>
3.

3 5'

fD TO rt

<

6 + ^
ro on

Ln

+ ^ ro

o
3

o
3

5'
3

5' < fD + ^
QJ

>

+ H >

Ln

ro

Ln T3

ro zr o

< fD +

+ +
m

+ ^ ro
Ln

3
OJ TO

ro
in

a
CT O

m 5]
H

O t-1 + ^ + ^ ro
Ln

<
ID

ro + ro "H > ro

>

5' + + _ 3 <
ID

TO rt

O 3

+ +

OJ CT ID_ Q. O

03

"C

~+ >
fD 3 3.

5' 3 +
O

+ ro

e-l

? D

z
c 3
fD N l N l NJ M NJ O
l-> LO l-> 00 i-> v j

CT
M
l-

en
M

Ln

M OO

l- NJ

a
t; o M

o >

l->

l->

|rt

> o
M

T3

o >
l-

> o
l-> 0 l-> ISJ

o > o
M

TJ
M

o >

3
O

o >
l- l-> ISJ

T3 0

(-> 0 >
|rt l-> ISJ

l-

D O

o >
I-* I-i NJ

M O

l->

ID

> o
M O
t-i ISJ

3
O

>

g
ro

l-> t- ISJ

O
l- ISJ

O
l-> ISJ

O
l-> ISJ

O
l-> NJ

Nl Ul ;vl

in
VI
t-.>

in
4^ 4^
I-" UJ M

Ln

en

tn
M

oil
4 i
l-> LU

O
i-> LO M ISJ

Ln
i- LU y-^

Ln un in LO
M LO

Ln
M M OO l- NJ

Ln

Ln 4^ Ln 00
M LU M N l

Ln 4^ Ln 4
M LO

Ln
4^

Ln 4^
LO ID
i-> OU y-^ tSJ

Ln 4^
isJ on
t-* LO i->

Ln i->
M OO

M Nl

[-
NJ 41.

NJ

6 o
v j

O
f
v j

4 4

NJ 41


N l

(->
N l

on to

NJ

0
v j

O 4^
v j

4&
4 i

4^
vJ

0 4^
v j

-p.

4^
vJ

4^ O 4a.

2 to

O 4^
v j

D J>
rt

v j

in

in

cn

in

en

^ in

en
^ m

en

cn

cn

en

> f? s H
tn

1^
C
TO 01 3 01

S' H

^
^
3
TO OJ 3 01

'> S
g
3 TO
01 3

cn
H

> g
3
TO OJ 3 OJ

O TO
01 3

1" o i^
TO 01 3^ 01

> 5 "
3 TO
01 3 01

> : H
in

~v

3 TO
01 3 01

C TO
OJ 3

E" 1^
3 TO
Ol 3 OJ OJ

O
3

>
01 rt

FI'

FJ'
01

5 3 >
n

5' 3
Ul"

3
3

o n >
01

S[ in

3 fD n

^ o tD

5' 3 In"
3 fD n
tu OJ

rt

6' 3 "in"

5'
3 ^

5' ^
3 ID n
Ol'

5'
_3^

5'
3 ^

c' 3
T3 fD OJ

m
tu

o
fD

o ID
n
fll'

3 ID n
Oj'

o ID
O

6' ^ o ID
f l
Oj'

Ol'

Ol'

OJ

oi'
OJ

OJ

01

OJ

tu

OJ

OJ

,5
.> n ID
3 0

.5
> n fD
3 f l

.5
.>
f-l fD 3

.5
> n ID
3

.5
n ID
3 f l

.5
>^
f-l
fD 3

3
> n fD
3 f l

.5
> "n ID
3 O 3 i fD TO 01

^ r? 10
3 rt O

.> n ID
3

QJ

,>
1-1 fD 3

f l

fO TO
01 3

r-

1 fD OJ

3 I
fD TO OJ
Vj

TO

fD TO OJ

< to

\ 3 < fD
01

r^
3

o 3

o 3 ( f D
TO
01
Vj

n C

3
i fD TO OJ

3 1
fD

3
fD

3
fD TO OJ

TO
OJ 3

TO
01

to"

< ID

< ID
ero'
01

TO 01

r^
3 fD

< ID
ciq'
01

< ID
cio' 01

<

< fD
ero'
01

\ 3 < ID
cio'
OJ

\ 3 < tD
era'
OJ

rt

TO
01 rt

cio'

TO'
01

< tD

era'
OJ

5" 3
tn

6 3
OJ

5' 3
-n OJ
01 CT 3 "

5' 3
-n OJ
OJ CT 3 "

5' 3
3

5' 3
01

0'
3

5' 3
OJ

5' 3
OJ

6' 3
OJ

-n 01
01 CT 3

-n

-n QI
01 CT

-n

OJ

-n

-n

-n

-n

OJ CT

-n
01

OJ CT 3 " ID

01 CT 3"

QJ CT

OJ CT

OJ CT

< 10
in rt

5" < ID
cio'
01

< fD
TO'
OJ

< fD
3

fD

5 <
OJ

<

< fD
lio'
OJ

< fD
OJ

5"

fD

5" <
OJ

fD

5 <
OJ

TO' 01 rt

TO'
01

< ID

i>5'

cio'
01

eiq'

tio'

eiS'

o 3

3
3

+ H
-o
CT

+ H
O l

> ro on o
rt

> ro

5' 3 + H > ro
T3 CT

Ln 3 3
|rt

on
- 0 CT

5' 3 + H > ro
3 3
l-

CT

-a
3 3
l->

jo n 1^ O

i d > ro Ln o CT o
3

5' 3 + H > ro
T3 CT

Ln 3 3
M

Ln
T ) ZT

5' 3 + H > ro
0 0
l-

0'
3

Ln

> ro
CT

+ H

5' 3 + H > ro
CT

-a
3
3 M 0

on -o
3 3
l-

5' 3 + H > ro
CT

Ln

5' 3 + H > ro
T3 CT

Ln 3 C
|rt

a o
t-

,o 'o o NJ
ID

O O O O

0 0 0 0
NJ ;vl

1 0
0
NJ

O |0

0 ,0 '0 0

0 0 0
NJ

ISJ 00

NJ

o o

IsJ

o o o |rt
LO T3 TO

o 1 o o M
00 T3 TO

|o 0

Ln

[->
T l TO

M vJ

o o

o
TO

3
TO

TO

TO

-o cn
TO

3
TO

a TO

z C
3
CT
10 LU LU LU ISI LU l-> OO

o
l->

NJ ID

Nl 00

NJ vj

NJ

ISJ

NJ

cn
l->

on
O
i-> l-

ISJ LO

0 O
l- K-"

01

>

o
o
M LU

T3

o >
l-> l- LU t-^ ISJ

l-> O

l-

l->

T3

>

3
l->

o > o

o >
13
t-

o >
T3 M

M O

3
l- O l- Nl

>

o >
3
l->

l-> 0

3
h-

>

>
13
l- 0 l-> ISJ

>
13
l- 0 l-> NJ

to H

g
ID

M O l-> LU

O
LU

M LU

!-.

o
M Nl

o
l- Nl

0
l- Nl

b
Ln
4^
i-> LU

cn
i- LO y-^

b o Ln cn
i-> Ul i-> isi

b o
oil 1-^ 1-*

b o b on
|rt oo

Ln
to

Ln
ID y^ Ln M LU j-" fsl O

Ln
00 LO

Ln
00
ISJ

Ln
vj vj

Ln
vJ

iu
00 M LU

4^

cn
t-> 00 M

Ln
t- 00

Lo vj
l-> LU y-' isj

oo
j->

N)

NJ

NJ

f-
Nl

[-
NJ fx

l-> Ul [- isi 4^

Ul to

(-.>
tSJ

6 o

4&
vJ

4 O 4
vj

C3 4& vj

4^
vJ

vj

4^

4
f vJ

4
vj

o i
vj

NJ f 0

in

in

in

cn

in

en

in

in

* ^ cn

4 0 4
vj

4^ 0 4
vJ

2 ID
0

cn

in

>
f?

^
S
3 TO OJ
3 01 3

> 2
?
3 TO OJ 3 OJ

^
S
3 TO OJ 3 OJ 3 3 Tl tD n OJ 01

tn "v.

O TO 01
3

i"
3
TO OJ 3 OJ 3 3 Vv 13 ID o OJ Ol

5
3 TO OJ 3 01

s ^

>
5
3 TO OJ 3 OJ

"J^

S
5
3 TO OJ 3 OJ

"

1"
3 TO 01 3 01

>
3 TO OJ 3 OJ

"

1" 1"
3 TO 01 3 OJ

>

> 5
0 3

N'
01 rt

N'

o
3

5'
in TJ fD fl

6
3 in

5'
3 T3 ID n OJ OJ

5'
3 TI ID n 01 OJ

5'
3 13 fD n Ol' OJ

5'
3 13 fD n as' as

T3 10
in rt 01

tn

6' 3 \
13 ID 0

0'
3 13 ID 0 fll' OJ

3 ID
n Ol' 01

n. m'

s
01

S'
OJ

^ ^ r?
10 3 rt fl

g >
n
fl 3 rID TO OJ fD 3

^
.>
f l fD 3 n 3 I ID TO 01

3
^ n
fl 3 fD 3

.5
>
f l fD 3 n 3 rfD TO OJ

fD 3 fl 3 i ID TO OJ

3
ID 3 n 3 i fD TO OJ

^
,>
f l fD 3 fl 3 I ID TO 01

^ >
f l fD 3 fl 3 rfD TO OJ

.5
>
f-l tD 3

^ >
f l fD 3 fl 0 rtD TO tu

> n

> n

o 3 r 10
TO 01

fl 3 i fD TO 01

3
fD TO 01

,
3

'.
3

\
3

\
3

\
3

\
3

'
3

\
3

-
3

\
3 ID

ID in
rt rt

<

< fD
cio' OJ

< fD
era' OJ

< fD
(jo' OJ

< fD
cio' QJ

< fD
eio' OJ

< ID
ero' 01

< ID
eio' OJ

< fD
eio' OJ

< ID
do' 01

<

do' 01

da' 01

5'
3 in Ol

6'
3 -n OJ OJ CT 3 ID

5'
3

5'
3 OJ

5'
3 -n OJ OJ CT 3 fD

6'
3 -n QJ OJ CT 3 fD

5'
3 -n OJ OJ CT 3 ID

6'
3 -n OJ OJ CT 3 fD

5'
3 -n OJ QJ CT 3 to

5'
3 -n OJ OJ CT 3 fD

5'
3 -n 01 01 CT 3 fD

. -n
OJ 01 CT 3 fD

01 CT 3

OJ CT 3 fD

< n M
rt

<

<

<

<

<

<

<

<

<

<

TO
01 rt

cio' 01
3
3

eio' 01

do' cu
3 3

cio' tu
3 3

do' OJ

cio' tu

cio' OJ
3 3

cio' tu
3 3

do' OJ

do' tu

O
3

+ H > ro j/i
-0 CT

+ H > ro Ln
CT

5 3 + H > ro Ln
T3 CT

+ H > ro Ln
-e3 CT

+ H > ro j/i
T3 CT 3 O
jn^ I-l O

-o

i C T3
CT

5' 3 + H > ro
3 3
l-> O

5' 3 + H > ro Ul
T3 CT

+ H > ro Ln
CT

+ H > ro on
13 CT

5' 3 + H > ro Ln
-0 CT

5' 3 + H > ro Ln
-0 CT

-o

o rt
M

o
3
M O

o
3 M

o
3
M O

o
3
l->

O
l-

3 3
l-> O

3 3
t-

0 3
M 0 | 0 0 0 LO 0

0 0
M 0 | 0 0 0 NJ

o 1 'o o LU
ID

1 'o o LU
00

o 1 o o LU
vi T3 TO

1 'o o LU en
T3 TO

1 O o LU
on

1 'o o LU
4^

O |0

o o LU
UJ T3 TO

1 o o LU
Nl T3 TO

0 |0 0 0
13 TO

00 M

o TO

o TO

o TO

o TO

TO

on 3 3 <

3
CT ID

t
M

Ul

4i NJ

I-'

UJ LO

LU 00

LU VI

LU

cn
M O

00 Ln

LO

0
|rt M M M M M

01

> 13
H"

13

>

> a
i-

o
13

>

TJ

>

13

>

M O T3

M O 13

l-> O T3

tD

T3

>

>

> c
|rt

>
l-

>

3"
10

l- l-> LU

o
M LU

o
l-> LU

l-> O M OO Ln 00

|rt

l-

o
M UJ Ln tsi O l-> LO M Nl 41^

O
M LU

l- O l- LU

l-

O
M LU LU

o
M LU LU oij f l-> Ul M Nl O f vj

O
i-^ LU oo

l- O l-> LO ISI fsl l-> l-> LU l-> ISJ Ul ID

vJ

b en
NJ vJ l-> LU M isj

on

4^

4^
NJ

t- i- LU l-

Ln
4^
i-> LU [-' isi 4^

4^
i-> oo y-^ isj

Ln
00 j-" isj

.> i->
o

cn
I-" LU M fsl O 4^ sJ

Ln
ID l-> LU

b oo
LU j-" isi

!-.
o

[->
kl

N) 4& O 4&
vJ

<
10 "O

t o
f vj

o
fx vl

4^
sJ

O 4=.
vl

4=* O

4^
vj

i>
vj

^ vj
ff H
8

4 O 4^
vJ

in

in

in

in

in

cn

in

in

in

in

in

S H
3 TO 01
3_

>
8 TO 01
3^ OJ

1^
f?
3
TO OJ 3 OJ 3 3

cn
H

S H

^
^' H
3
TO OJ 3 OJ 3 3 T3 fD fl Oj' OJ

H C
TO OJ 3 OJ

Z ? " 2
g H
3 TO 01 3 OJ

8+Ju ID

"i^
ff H
8 TO OJ 3 QJ

"i^
ff H
8 TO OJ 3 01

^
ff H
8 TO OJ 3 OJ

"l^
ff H
3 TO 01 3 tu 3

> a
3

TO tu 3 tu 3

H'
rt

O
3 in

5' 3
-D ID fl Oj' OJ

5' 3
13 fD n Ol' OJ

6' 3
13 fD n m' OJ

8
3 13 fD O OJ OJ

5' 3
13 ID o 01 01

5' 3
13 ID fl Qj' 01

c'

a'

o ID fl
S'
rt 01

fD n Oj' OJ

TJ ID fl Oj' OJ

\ T3
fD n Oj' OJ

^ >

>
n
3
fD 3

^ ,>
n
fl 3 fD 3

^ .>
f-l fD 3 fl 3 I ID TO OJ

r?
10 3

3 >
n
n O ID 3

.5
ri
ID 3 fl 8

>

^ >
fD 3 fl

.5
n
fl 8

n
8

>

3 >
fD 3 fl

3 >
n
fl fD 3

.5
>
0 C-l ID 3

ID 3

n
8

m o
I 10 TO 01 -v^ 3 10 tn rt rt

fID TO OJ 3 ID

3 1
fD TO OJ

3 1
ID TO OJ

3 r
fD TO 01

3 1
ID TO OJ Vj. 3 ID

3 rID TO OJ 3 ID

3 I
fD TO OJ 3 fD

3 i

fD TO OJ

fD TO 01 3 fD

<
o"
n 01 01 CT

<

\3 fD <
do' 01

\3 . fD <
do' OJ

\3 , ID <
rt

\3 . fD <
do' OJ
8 3 n OJ tu CT

<

<
8
3

<

\3 fD <
do' 01

<

rt

do' 01
3 jn^

do' OJ

do' tu
C 3 -n OJ OJ CT

do' 01

da' OJ

do' OJ

do' 01
8 3 -n OJ tu CT

5' 3
-n OJ OJ

5' 3
-n OJ QJ CT

5' 3
-n OJ OJ CT

5' 3
-n OJ OJ

6 3
OJ 01

5' 3
-n OJ OJ =r

01 OJ _CT

< n tn
rt rt

5"

5"

ro
Ul

5
fD

5"
fD

5"

5"

5"

5"

5"
fD

5"

fD

<
ro
ID'

<
5' 3

<
5' 3 + H
Ln

< ID
do' OJ

< fD
do' OJ

< fD
do' 01
8 3

fD

<
8 3

<
8
3

< ID
do' OJ

era' 01

do' 01
3

do' OJ

do' QJ

do' QJ

do' OJ

5" 3 + H > ro
Ul

> ro in
CT 3

6' + H

? ^
Ct m

a'
3

5' 3

+ H > ro
Ln T3 CT 3 3

> ro

+ H

Ul

> ro
-o
O l-> O

+ H > ro
Ln 13 CT 8 8 l->

Ln

+ H > ro
13 CT 8 8 l->

+ H

Ul

> ro

Ln

> ro
-e3 CT

+ H

5' 3 + H
Ln

> ro
-0 CT

o
3
|rt

CT 8

-a o

CT C 3 l-> O

-o

CT 8

T3 CT 8 8 l-> O

a a
M

a a
M 0 | 0 0 0

,o 'o o -a

O | 0


4^
00

3 3. 3 TO

I-* O O O

4
ID

o o

oi
C3. ID fl

4^
vj

o o o 4^ en
TO

o o o

Ln

4&

o o o

o
1

o
'o o
1 4

'o o

5
13 TO

4^
LU

'o o 4^
ISI TO

l-

4 0
13 TO

TO

13 TO

13 TO

TJ TO

13 TO

13 TO

z
C

3
Ul Ln

CT
ID

on
M

4>
l->

Ln oo
l->

Ln
NJ

Ln
t-

Ln O
M

Ji* LO

4 00
l-

4^

^
l->

cn
M

on
Dat
M

l-

l->

o
M

o > o

> 13
l-

13 O

>
l-

0 13 0
l- 00

O 13

0 13 0
l-> LU

0 T3 0
M LU

0 TJ 0
LU

tD

>
l-

> o
l-

>
M O
l- LU

>

>
l->

3
I-*

>

> 13
M

>
l->

3'
to

l-

O
l-> 00 i->

M Ul

l-> LO

o
M OO

0
l-> 00

0
M LU

Jf
M

y^ i-

i-j

O
LU

Ln
l-

l-j on
i-> LO

4^

Ln cn
i-> 10 M

b LO
4).
41.

b LO
y^ ID
l-> LU

b 00
Ln
i-> 00 M

b 00
l-j l-> 00 y-^

(-> b vJ
en
t-* LU l- ISJ 4^1

Ln
i-

y^ 00
i->

4i>

[- M

oo

6 o

j- isj 4^ O

M LO t-

t& vj
in

4
vj

fsJ 4^ O 4^
vj

isj

e 0
^ vl in 'Dr c ff H a
TO
01 3 01

oo [- isj 4^ O 4^
vj

oo
i- Nl

M LU

Ul

[- isi
4i

tD


NJ

0
41 vj

4i vj

4 0 4^
;vi

t. 0
fx vj

fsl

isj 4> 0

2 m
^ > 5'
3

0
vj

in

in H

in

in

en

in

in

in

^ ^

in

ff H in a il3
01

>

^
ff
8 TO
01 3

^
ff a
TO
OJ 3 OJ

c ff H
a
TO
OJ 3 OJ

>
ff H . a
OJ 3

in

ff
8
QJ 3

ff
~v

ff \8
TO
01 3 tu

ff
a
TO
01 3

" D r 2
ff
a
TO
OJ 3

TO

TO

TO
OJ 3 tu

3_

f3' 01
rt

N' 01

OJ

01

01

OJ

5" 3
-o 10 m
Ol'

a' 3
tn

a' 3
in

8
3

a'
3 tn

8
3 13 fD

a'
3

a'
3

a'
3 13 tD

5' 3
13 fD

8
3

>

13

fD fl
Oj'

13 fD n
tu OJ

TJ
fD fl
Oj'

13 n

fD 01 01

3
n

fD OJ QJ

3
n

fD
Ol'

o ID
n
01'

n
01 OJ

n
Dl'

n
01'

CT rt
01

01

OJ

OJ

01

01

01

3
^ n
3 rt fl

3
>
fl
fl fD 3

.5
^ n fD
3 fl

^ ^ >
fD 3 fl

3
fD 3 fl

.5
.> n fD
3 fl

3
3 fl

(-1

to

> n
a

.> n fD
8

.> n fD
3
f l

.5 5
fl
fD 3 fl

.5 5
f-l
fD 3
f l

.5
>
fl
fD 3
fl

o 3 1
to TO
01 3

a 3 i
ID TO
01 3

ID TO QJ
V v

a 3 t

3
fD TO 01 3 fD

fD TO 01 3 fD

3 i

fD TO OJ 3 ID

3 I

fD TO 01 3 fD

3 i

3 f
fD TO 01 3 fD

rID TO
OJ 3 fD

ID TO 01 3 ID

r-

3
ID TO
01 3 fD

3 ID

< 10
tn rt rt

< ID
do' 01

<

<

<

<

<

<

<

<

<

do' 01

do' OJ

da' 01

do' 01

do' OJ

do' 01

do' 01
8
3

do' 01
8
3

do' 01

do' OJ

5' 3 <
01 01 CT ~v

a' 3
-n
01 OJ CT 3 ID

a 3
-n
01 OJ CT 3 fD

5' 3
-n
OJ OJ CT 3 fD

5' 3
-n
01 OJ CT 3

a'
3

5' 3
01

a' 3
-n
01 01 CT 3 ID

a 3
-n
OJ OJ CT 3 fD

-n

-n
QJ QJ CT 3 fD

-n

01 OJ CT 3

01

-n

01 CT 3

OJ CT 3

< 10
rt

<

<

<

< fD
do' QJ

<

< fD
do' 01
8
3

< ID
da' OJ

< ID
era' 01

<

<

do' 01

do' QJ

do' OJ

do' OJ
8
3

do' OJ

do' OJ

do' OJ

a' 3 + H >

ro
CT O
rt

ro Ln
TS CT

5' 3 + H >
a a

a'
3

Ul

ro
TS CT

+ H >

+ H >
a

on
-0 CT

ro

a' 3 + H >
Ln T3

ro

a' 3 + H >
Ln

ro

+ H >

o
l->

a a iC,
i-

zr a
8
V, |rt

TJ CT

on D
CT

ro

a 3 + H >
8

a'
3

Ln
-0 CT

ro

+ H >

Ln -D
CT

ro

5' 3 + H >
Ln
13 CT

ro

5' 3 + H >
-0 CT

ro Ln
8 8
l->

i->

JC,
i-

!C, t->
0

a a

a a JC,
i-

a
i->

a a JC.
M

a a
0 |0 0 0

1 o
o Ln
00

1 o
o Ln
Ul

1 0
0 Ln
vj

1 0
0 Ln
Ul

o o o Ul cn
13 TO

1 '0
0

0 0 '0 0 Ln fx 13 TO

0 1

0 |0 0 0 Ln
Nl

0 |0 0 0 Ln 0 -3 TO

on Ln
0
TO

'0 0

on LU

Ul l->

s TO

13 TO

13 TO

13 TO

13 TO

T3 TO

13 TO

z c 3
CT
tD

CTI CTI
l-

en on
I-*

tn

*>
M

Ol LU

en NJ
M

tn t->

cn o
t-

Ul ID

Ln 00

Ln vJ

Ul

cn

o
M M M M M M

01

> D
M

13

o >
l->

o > o
l->

O D
l->

>

13
I-*

o >

o >
|rt

o >
T3 l->

> a
h->

>
T3 M O t- LU y^ oil NJ M LU l- fsl

o >
13 l->

o > a
i->

ID

1"
to

o
M LU M Nl M LU y^

O
l- LU M M LU

o
M LU y^ NJ

O
M UJ y^ Nl l-
trt

O
M LU y^ M

o
l-> oo M tf

O
t-> LU

o
l- LU y^ t-

o
I-i

LU y^ i- fsl vj M 00 l- isj

o (-> LU
'y-^ i-> ISJ Ul 1-" LU t-> fsJ 4^ LA 10 ID

i-j
|rt

i-j

vj

Ln cn
|rt

Ln
LU M LU j- fsl fx

4i
NJ l-> 00

Lu on
M LU fsl O 4 vj

oo H
NJ

y^ LU l-> isj

t-" LU j-> fsJ 4

LU y^ isj

LU M isj

!-
fsJ 4^ O 4 vJ

6 5

4
vJ

4 O 4^
vJ

*>
vJ

4^
v j

4 4&
v j

4*
vj

4
vJ

o i
in

O 4^
vj

4^

VJ

in

in

cn

in
/site

in
f:cT sic 1

in

in
C)

in
"Dr c ff H
8 TO
01 3

in

in

^ ff H
jn O TO 01 3

c ff H a
TO
01 3^ 01
Nl'

^
ff H

ff H

1 % " 2
ff H

a
TO
OJ 3

a
TO OJ 3 QJ

a
TO QJ 3 OJ

ff H 8
TO OJ 3 OJ 3

>
ff H

>
ff H

>
ff H
8
TO OJ 3 QJ

> 5 5' 3

a
TO 01 3 01

a
TO 01 3 01

a
TO 01 3 01

N'
01 3

OJ

OJ 3

5'
13 10
in

5'
3 in

a'
3 13 fD

8
3 13 fD fl
Oj'

a'
3 -3 fD

a'

8
3 13 fD

a'

a'
3 13 ID n Ol' 01

a'
3 13 ID n cu' 01

a'
3 13 ID n
Oj'

,
oj' OJ 01 OJ

n S'

B tD n

13 ID

n oj'

n oj'
OJ

n Ol'
OJ

n Ol'
01

T3 ID n Ol' OJ

QJ

OJ

5?
fiAlC

3
>
f l fD 3
f l

3
fD 3
f l

3
> n
f l

3
>
l~i fD 3
f l

.5
fD 3
f l

3
.> n
fD 3
f l

.5
>
f) fD 3 n

.5
.>
f l fD 3
f l

3
fD 3
fl

3
>
f l fD 3
f l

fD 3 rt fl

^ n

fD 3

> n

> n a 3

o 3 t eo TO
01 V,

i ID TO 01

a 3

i fD TO QJ

a 3

i ID TO 01

a 3

r ID TO OJ
V v

a 3

1 ID TO OJ 3

a 3

3
ID TO 01
V y

i ID TO OJ
v

a 3

a 3
fD TO OJ 3

i ID TO 01
V y

i ID TO QJ

a 3

'
3

^
3

^
3 ID

< ID

< ID
do' 01

< ID
do' OJ
8
3 -n 01 OJ CT 3 ID

< fD
do' OJ
8
3 -n 01 OJ CT 3 fD

< ID
do' OJ

< fD
do' OJ

< tD
do' 01

< ID
do' OJ
3

< fD
do' OJ
3

< ID
do' OJ
8
3 -n tu OJ CT 3 ID

<

in rt

do' 01
rt

do' 01

O 3

a'
3 -n 01 01 CT 3 ID

e' 3
-n OJ tu CT 3 fD

a'
3 -n 01 01 CT 3 fD

5' 3
-n 01 OJ CT 3 ID

a'

a'

a' 3
-n 01 OJ CT 3 fD

in

-n 01
01 CT 3

-n OJ QJ CT 3 fD

-n 01 QJ CT 3 fD

ID
rt

<

<

<

<

<

<

<

<

<

<

<

TO'
01

do' 01

do' tu

do' OJ

do' OJ

do' 01
8
3

do' 01

do' OJ
8
3

do' 01

do' QJ

do' OJ

5' 3 + H > ro Ln
-q CT

a' 3 + H > ro Ln
CT

a 3 + H > ro Ul
T3 CT

a 3 + H > ro Ul
CT

a' 3 + H > ro Ln
-Q CT

+ H > ro Ul
CT

a' 3 + H > ro Ul
T3 CT

+ H > ro Ln
T3 CT

a' 3 + H > ro Ul
-0 CT

5' 3 + H > ro Ul
TS ZT

5' 3 + H > ro Ln
13 CT

o rt o vl.
y^

-o a
8
i-

-o

8 8

8 8

a
JC,
M

JC,

\
l-

\
M

-o a a

V, M

a a JC,
M

a a JC,
i-

a a JC,
1-" 0 0 0 0 Ln 00

a JC,
l->

a JC,
i-

|0

'o o en i-

o o o o cn LU
o TO

O |0

O O

o o cn Nl
13 TO

'o o cn o
TJ TO

o o o m i->
13 TO

o o o o Ul
ID 13 TO

o 'o o tn o
13 TO

o o o o Ln
ID 13 TO

o 1 o o on o
TO

o 1 o o Ul
vj 13 TO

TO

TO

c 3
CT
ID vJ VJ

>i

en

sJ Ul

VJ

VJ

4^
I-i

oo
I-i

vj NJ

vj I-i

vJ

0
I-i

en
LO
I-i

cn
00
I-i

cn vJ

o 01
M

13 M

o >

o > o

t-i

1-i

i->

I-i

a M
M LU M Nl Ul ID
1-i LU M

TJ
I-i

o >

0
13

>

D
t-i

o >
O

O
T3

>

o > o
I-"

0
t-i

>

o >
TD
t-i

0 TJ
I-i

>

o >
13
t-i

fD

g
ID

t-i

I-i

O
M LU M LU

0
t-i LU irt ISJ

O
t-i Ul

I-i LU

t-i LO

o
I-i LU

0
I-i LU

O
I-i LU ISJ

0
I-i 00

o
I-i LU

y^ NJ

i-:i NJ

i-j
Isl

i-^i NJ

t-:* ISJ

i-^

M NJ

i-^
ISJ fsJ I-i I-i LO t-i

b vj
1-i LU M

Ln
LU
I-i LU t-i isj

Ln
1-i t-i 00 t-i ISJ

4i
I-i I-i LU I-i tsJ

oil
VJ M LU t-i

LU

iiil
NJ
t-i LU t-i NJ 4i 0

^
I-i LU t-i

Lu
ISJ I-i 00 t-i isj fx

Lo
NJ
I-i LO t-i

Ul ID

Nl

6 o 4&
vJ

isJ 6 o
f
vj

0 4
vj

4
vj

isl 4^ 4
vJ

isJ
fx

NJ

vj

4^
vj

4^ 0
fx VI

isJ
f O fx VJ

10

3
T3

f vj

4^
vj

in

in

in

in

in

in

in

in

in
3
X

in

in

z?- 2
jn O TO 01

ff H

^
in

ff H
a
01 3 Nl' 01 3

^
a
TO
OJ 3

ff H

^ ff H
a
TO
01 3

^ ff H
8 TO
OJ 3

"i^
~v.

ff H
OJ 3

> ff H
a
TO
01 3 01

^ ff H
a
TO
01 3

J ^ r cn

ff
a
TO
01 3

ff H
^
TO
01 3

^ ff H
3* TO
01 3 OJ

>
rt

TO

8 TO

8 3

3
01 rt

R'

QJ 3

OJ 3

OJ

OJ

tu

QJ

OJ

o
3 in

a' -o tD
n

a'

a'

8
3 3 fD O Ol' OJ

a'
3 13 fD O Oj' OJ

a'
3 T3 ID

a'
3 13 fD

a'
3 13 fD fl 01' OJ

a'
3 TJ ID fl Ql' 01

a'
3

D ID n S'
in 01

13

fD

5'
tn 01

Ol'

3 fD n

o ID
fl Qj' QJ

oi'
OJ

n
Ol'

n
01'

Ol

01

OJ

^ ^

3
.>
f l ID 3 fl

3
.>

3
>^
ID 3 fl

3
>
fD 3 fl

3
>
fD 3 fl

3
>
f)
tD 3 fl

>
fD 3 fl

3
>

3
>
f l fD 3 fl

3
.>
f-l fD 3

r? ID
3
rt

n ID
3 fl

n
3

n
a 3

In fD
3 fl

Q O

ID TO

Si
5" < 10
rt

ffD TO OJ 3

a 3

8
i fD TO 01 3" fD

8
t fD TO OJ 3 fD

8
i fD TO 01 3 tD

i ID 01

TO

t fD TO 01 3 fD

a 3

a 3

I QJ 3"

a 3
tD TO OJ

ID TO

r-

r fD TO OJ

a 3

n a 3
ID TO
01

< 10
rt

<

<

<

tD

5" <

<

fD

<

ID

5" <

fD

5 <

fD

5" <

1%'
01

do' OJ

do' 01

do' QJ
8
3

do' 01

do' QJ

do' 01
8
3

da' OJ

do' cu
8 3 -n OJ

do' OJ

do' 01

o
3

5'
3
-ri OJ

5'
3 01 OJ CT

a'
3 OJ

a'
3

a
3 OJ

a'
3 tu

a'
3 01

-n 01
01

tn

-n QJ
01 CT

-n

v -n OJ
01 CT

01

-n

-n

-n

-n

CT V, 3

tu CT 3

OJ CT

OJ CT 3"

OJ CT 3"

cu CT

OJ CT

cu CT

< m In
rt rt

< ID
in

fD

5" <

5" < fD
do' cu
3' 3

5" < ID
do' 01

5" < fD
do' OJ

ro

< ID
do' QJ

< ID
do' 01
-n OJ

ID

5" <

5" < fD
do'
rt

do' 01

do' 01

do' cu
8 3

da' DJ

o'
3

~v

> m on
O
M

+ H

5' 3 + H > ro Ln
-CT CT

+ H > ro Ul
13 CT

+ H > ro Ul
-CT CT

a' 3 + H > ro Ul
-CT CT

a' 3 + H > ro Ln
-CT CT

5' 3 + H > ro Ul
-CT CT

a' 3 + H > ro Ln
-CT CT 8

a' 3 + H > ro Ln

a' 3 + -i > ro Ln
-D CT

u
CT

T
Z

-0 CT

o <
Q |0

a tn
t-i

a a JC,
t-i

a a JC,
t-i

a
8

8 8

JC,
t-i

JC,
t->

a a JC,
t-i

JC,
I-i

> +"
NJ NJ

a a JC,
M

a JC.
I-i

'o
5
0^
vj

1 o o
tn
00

1 0
0

0 |0 0 0

en en
13 TO

en vj

o o o o cn Ln
13 TO

o 1 o o cn en
13 TO

0 0 0 0

1
'0 0

0 0 0 0

cn 4i
13 TO

en NJ

01

cn LU

o o 'o o cn 4^
-o TO

s do

3 TO

CT TO

13 TO

< + 0

ID

13 TO

-b

z
C

3
CT to 00 00 00 VJ 00

cn
t-x

00 Ul

00

4^
I-i

00 LU

00 NJ

00 l-x

00

o
l-x

vJ LO

vJ 00

o
l-x t-

o
M

>
O
fx

13

>

o
t-i

>
o

I-i O

13

>

o > o
l-x

t-i O

t-i 0

l-x 0

13

>
l-x l-x OO

13

>

>

t-x O

l-x

13

>

13

>

CT l-> O t-x 00

>

ID H

g
to

!-> LU
Ijf

l-x O t-i LU y-' LU

I-i

l-x OO t.:x

I-i

oo
M LU 00

t-x Ul

l-x 0 l-x 00

t-x 0 t-x LU

l-x

o
l-x Ul

l-x O t-i OO

Nl
l-x LU l-x

Ln tn
l-x LU t-x fsl fx

oo Ln 4^
M LU t-x
fsl fx

LU 4^ Ln
l-x LU t-x fsl fx O

i-:x
UJ Nl

Ul

i-:x

LU

i ^ x

Ul
fsl Nl t-x LU t-x isl fx

Hi OO

i ^ x
LU
t-x

4^
I-i LU t-i

4L
l-x LO t-x fsJ fx 0

LU vj
l-x LU l-x fsl 4^ 0

fsJ ID t-x LU t-x isl 4^ 0 fx

i ^ x on
l-x LO t-x fsl 4^ O

i.:x

Nl

fx

o 4&
;vl

fx vJ

fx vj

fx vj

fo o in

l-x LU t-x fsJ fx

m m
to

o
fx VJ

fx vJ

fx Vj

4^ ;vl

in

en

in

in

in ff

in

in

4^ vj

o 4^
in

in

in

k
in

ff

ff
tn 8 TO OJ 3 Nl' QJ

'> ff

^ H

ff

C H

> ff H
in

^
ff
8 TO 01 3 01

ff

>
ff

^ ff H
\a
TO tu 3 01 8 3 TJ ID n Ol' 01

>
ff
3 TO 01 3 01

>
rt 3

O T era 01
3

a
TO OJ 3 01 3

a
TO QJ 3 01 8 3 13 ID n OJ tu

a
TO 01 3 OJ

a
TO OJ 3 QJ

a
TO OJ 3 OJ 8 3 tn TJ fD n Ol' OJ

a
TO OJ 3 OJ

N'
01

5 3
tn

a'
3 -3 ID fl

a'

a'
3 13 fD n oj' Ol

a'
3

5' 3
T3 fD

a'
3 13 fD n

a
3 T3 ID fl Ol' OJ

"2 ID
fl

>
r*

u'

5'
OJ

13 fD n Ol' OJ

0 ID n tu
01

n OJ
OJ

QJ'
tu

^ ^ ^

3
>
n
fD 3 fl

3
>
n
fD 3 fl

3
>
n f l fD 3

3
>
n
fD 3

.>
f l ID 3 8

3
n

\ >
0 fD 3

3!

3
>
fl 8 1 fD TO 01 3 fD

3
>
fl f l fD 3

3
>
fD 3 fl

3
n
fl fD 3

.>

ID 3 rt fl

ID 3

c 10
3

TO 01

rfD TO OJ 3

i fD TO 01 3

1 fD TO OJ 3 ID

n a

1 fD TO 01 3 fD

r tD TO OJ 3 fD

1 ID TO OJ 3 ID

n a

i ID TO OJ 3 fD

i fD TO OJ 3 ID

ro TO
OJ 3 ID

10 in rt rt

<

ID in rt

<

fD

<

<

<

<

<

<

<

<

<

do' 01

TO'
OJ

do' OJ

do' QJ

do' 01

do' OJ

do' 01

do' OJ

do' OJ

do' 01

do' 01

-V,

o a in

5' 3
-n 01 01 CT 3 fD

a
3 -n OJ OJ CT 3 ID

a
3

5' 3
Tl OJ OJ CT 3 fD

a'
3 -n QJ 01 CT 3 tD

a'
3 -n OJ 01 CT 3 ID

a'
3

a'
3 -n QJ QJ CT 3 fD

a' 3 JC,
-n tu 01 CT 3 ID

a'
3 Tn 01 OJ CT 3 ID

01 n 01 CT
-V.

-n OJ
OJ CT 3 ID

-n QJ
01 CT 3 ID

< ID
in rt rt

<

<

<

<

<

<

<

<

<

<

do' 01

do' OJ

da' OJ

da' OJ

da' OJ

do' OJ

do' OJ
8 3

do' OJ

do' 01

do' 01
8 3

da' IU

5' 3

a'
3

a'
3

a'
3

5'
3

a'
3

+ H
>
o rt o
l-x

ro
Ln
"CT CT

+ H >
a a

ro Ul
-CT CT

+ H >
a a

Ln

ro

Ul

ro
-CT CT

+ H >

+ H >
Ul

ro

Ul

ro 0

+ H >

+ H >
a a

Ul

ro

5' 3 + H >
Ul

ro

5' 3 + H >
Ul

a'
3

ro

+ H >
a a

Ln

ro
13 CT

H > ro Ul
TJ CT

-CT CT

-CT CT

a a
t->

a
8
l-x O

CT 8

-CT CT

-CT CT

-CT CT

a
8
1-i 0

a
t-i 0

a a
t-x

a a o o o o tn
ID T3 TO

l-x

I-i

o ,o 'o q >j
Nl

o
'o o

l-x 0

l-x

1 o
o VJ
fx 13 TO

1 o
o vl p
13 TO

1
LU

'o o VJ
l-x

' 0 0

1
tn
Ul

1 0
0 ID TJ TO

1 0
0 sJ l-x 13 TO

en

o ,o 'o o vj o
13 TO

o 1 'o o cn 00
13 TO

TO

13 TO

13 TO

13 TO

z
c
CO I D LO 00 LO v j ID LO U l LO LO OO U3 ISJ LO l-x lO 00 LO

3
en
t-x

CT ID

4^

o
l-x t-x

O 73 O
M LU

>
l-x

o
13

l-x O

t-x

>

T3

>

13

>
o

o
13

l-x O

l-x

t-x

l-x

>

>

o
3

O
-D

>
l-x

>
l-x

CT
l-x

>

l-> O

t-i O

QJ

>
t-x t-i LU

13

>

to H

3'
ID

l-x O M LU

t-x

t-x l-x LU t-^x f x

o
t-x LU

t-x O t-x U l t.:x

l-x

l-x

O
l-x LU M

o
l-x LU Hx f x

O
M U l M

O
l-x 00

O
i-:x
f x

O
t-x LU

Hf

^ Ln
LO t-x LU l-x N l

i-j f.

i-^
4^
O

4^
f x

Ln ID
t-x LU l-x

Ln
t-x LU l-x isj

4^
vJ l-x

o
I-i

4i
O t-i LU t-x NJ

isj tn
l-x LU l-x

4^ fsl

i-:x 4
k^x LU M LO t-x

Ux
f x

i-^x

en
t-x LU t-x

o
I-i LU t-x

00 l-x

oo
t-x

oo
l-x

oo
t-x

Ln
ID

isl
f x

fsl
f x

A O 4k
v J

4^
v j

f
v j

fsl fx O
f l v j

4
v j

4 O 4^
vJ

isj fx O
f x v j

fsl 4^
O

fsJ
f x

fsJ
f x

isl
f x

2 to
^
Actii

o
41 v j

o
f l VJ

v l

VJ

in

en

in

en

in

in

en

in

in

en

in ff H

^
ff H
in

^
j n

ff H

>
ff H
8 TO Ol 3 01

^
ff H

^
ff H
tn

^ ff H
8 TO 01 3 OJ

>
ff H

"i^
ff H
8
TO QJ 3^ OJ

"J^
ff H

> Q
ff H
8 TO OJ 3 QJ

^ O
TO
01 3

u
3

a
TO 01 3 01

a
TO 01 3 OJ

a
TO OJ 3 QJ

a
TO OJ 3 01

a
TO QJ 3 QJ

a
TO OJ 3 OJ

01 rt

N'

3 *v Ul 10

5'
n 2'
tn rt 01

a' 3
3
fD

a' 3
TJ fD

5'
3 13 fD

5'
3

a'
3

a'

a'
3 13 ID

a'
3 T3 ID fl Oj'

a'
3

a
3 T3 ID O Ol'

In"
13 ID

n ID
n
Ol'

T3 fD

-o fD
n

n
Ol'

n
Ol'

o
Oj'

n
oj'

n
tu'

n
Ol'

S'
tu

OJ

01

OJ

OJ

Ol

01

01

OJ

OJ

a ^
r?
ID 3 rt f l

3
>
fl
ID 3 f l 8

3
n
tD 3 f l 8

.>

3
>
n
tD 3 f l 8 f fD TO OJ

3
>
t-1 ID 3 f l 8 f fD TO OJ v . . 3

.>
fl
ID 3 f l 8 I fD TO 01

.>
fl
fD 3

3
n
8

,>
n
fD 3 f l 8

3
n
fD 3 f l

.>

3 >
n
fD 3 f l

.>
t-1 ID 3 O

3
a 3

3
01

3
f fD TO OJ V v 3

3
1 fD TO 01

(0 TO

f fD TO 01

3
I tD TO 01

i fD TO 01

i fD TO OJ

i fD TO OJ

' , 3 < 10 in
rt

<
10 tn

\ <
3 ID

3 fD

<
tD

<
fD

<

<
=1 ID

\ <
3 fD

\ <
3 fD

do' 01
rt

do' OJ
3

do' 01
8 3

do' OJ
8 3

do' 01

da' 01
3

do' 01

do' 01
3

do' 01

do' OJ

3 in T l 01 01 CT

5'
-n
01 OJ CT 3

a'
3 T l OJ 01 CT 3

a'
-n

a'
3 OJ

a'

a
3 T l 01 01 CT 3 fD

OJ

-n

-n
OJ OJ CT 3 fD

01

-n

-fl 01 01 CT 3 fD

<
fD

\ <
3 ID

do' QJ
3

a'
3

a'

-n
OJ

tu

-n

01 CT 3 fD

OJ CT 3

OJ CT 3

OJ CT

OJ CT 3

~^ <
3 10 rt

10

<
rt

<
a' 3

<

<
fD

<
fD

<
ID

<
a
3

<

\ <
3 fD

<
ID

do' 01

do' 01

do' 01

do' 01

da' 01

da'
cu
8 3

do' OJ

da' 01

do' OJ

do' 01
8 3

do' OJ
8 3

5' a
H

a'
3

5'
3

5'
3

a'
3

a
3

> ro
U l CT CT

Ln

+ H > ro
-CT CT

on

+ H > ro
-CT CT

+ H > ro
U l -CT CT

on
8

+ > ro

Ln

> ro
-CT CT

U l

+ H > ro
-CT CT

U l

+ H > ro
-CT CT

+ H > ro
Ln
-CT CT

U l

+ H > ro

+ H > ro
U l -CT CT

-CT CT

T3 CT

o io n

rt

a a jn^
t-x O

a a JC,
t-i

a a JC,
l-x

JC,
M O

a a JC,
t-x

a a JC,
l-x

a a JC,
t-x

a a JC,
t-x

a a JC,
l-x

a a
l-x

l-x

o
'o o sJ

o
'o o v j

o
'o o v j en
13 TO

o
'o o vJ

1
o -a TO

1 'o
o vJ
00 CT TO

1
LO 13 TO

1
Isl

'o o v j

1
00

1
CTI

o o 'o o v j
U l 13 TO

|0

|0

o o vl
f x T3 TO

o o vl
LU 13 TO

1 'o
o VJ
U l 13 TO

-CT TO

13 TO

13 TO

z
c 3
l-x t-x t-x l-x l-x l-x t-x l-x t-x l-x

o
t-x

o LO
l-x

o 00
t-x

vj

o cn
l-x

O Ln
l-x

4k

LU

o NJ
l-x

t-x O t-x

l-x O

CT to

O
l-x t-x t-x l-x l-x

DJ fD

o > o
l-x

O
13

>
l-x

o >
TJ
l-x

>
13
l-x l-x LU

o >
13
l-x l-x Ul Hx

O 13
l-x

>
T3 l-x l-x Ul

>

o >
13 t-x

13
t-x

o > o

o >
13 l-x

D
t-x

o > o

i"

t-x LU

l-x LU y^

O
l-x LU

O
M Ul M Ul M

O
l-x Ul t-:x Ul t-x Ul t-x LU t-x

3
l-x LU

t-x 00

l-x LU

i.:x
Ul Ul

i-j
Ul fx LO M LU t-x

on
fx

Ln
t-x OO t-x

i-:x on oil
ID l-x 00 t-x

i-j
in

i-^x
Ul

i-^x
Ul VJ l-x LU t-x

on fsJ
LU l-x 00 t-x

i-^
t-x l-x Ul t-x

on

en
t-x LU t-x

fo
t-x t-x Ui t-x

cn
t-x LU t-x

00 l-x 00 t-x

in to

fsl
fx

fsJ

fsl
f l

fx
vj

-> o
f l vj

O
f l vj

fx O

fsl
4k vj

isl
fx

o
f l vJ

fo f l o
f l ;vi

fsJ
f l

fsl
4k

fsl
f l

fsl
f l

fsl

o
f l vj

O
f l vJ

o
41 vJ

o
f l vj

.> o
f l vj

2 to
^

in

in
1%" ff H

in ff H

in

in

in

in

in ff H

in

in

in
Actii

^ ff H
a
TO
01 3

> ff H
8 TO
01 3

^ ff H
a
TO OJ 3 OJ

"i^
ff H

'^
a
TO
01 3

ff H

ff H

ff H

ff H
8* TO
OJ 3 OJ 3

u 3

a
TO
01 3

a
TO 01 3 OJ

a
TO 01 3 Ol

a
TO
01 3

a
TO 01 3 01

a
TO QJ 3 OJ 3

OJ

OJ 3

OJ

01

OJ

a'
3 -3 fD fl

a'

a'
3 13 ID

5'
3 13 ID

a'
3 in

8
3

a'
3

a'
3 13 fD

a'
3 CT fD Ol' 01

a'

a'

13 ID

as'
OJ

01 OJ

01

Ol' OJ

ID O Ol' OJ

fD

TJ

fD

CT fD

13 fD

n as'
QJ

Ol' tu

Oj' 01

S'
tu

oi'
01

01

3 >
f)
fD 3 fl

3 ^
tD 3 fl

3
.> n
fD 3 fl

3
ID 3 fl

> n
8

3
>
f)
ID 3 fl

3
fD 3

.>
C-l
fl

.> n
fD 3 fl

3
a 3

fD 3 fl

,>
f-l

3
ID 3 fl

> n
8

3
.>
ID 3 fl

f-l

,> o
fD 3 fl

3
a 3
fD

a 3

a 3
ID TO 01 v. 3

a 3
ID TO 01 V,. 3 fD

I fD

3
ID TO OJ

r-

1 ID OJ 3

i fD 01 3 fD

i fD OJ 3 ID

1 tD 01 3

TO
OJ 3

TO

TO

TO

TO

1 tD TO 01 3 ID

a 3
fD TO OJ

TO
01 3 fD

-\
3

'
ID

',

\ <

\
fD

\
3 ID

\ <

< ID
rt

fD

<

<

fD

<

<

<

<

<

<

do' 01

do' OJ
8
3

do' 01

do' QJ

do' 01

do' tu

do' tu

do' 01
3

do' OJ

do'
cu

do' QJ

5' 3 JC,
OJ QJ CT 3

JC,
01 OJ CT 3 ID

5' 3 JC,
OJ OJ CT 3 fD

5' 3 JC,
OJ

a' 3 JC,
OJ

5' 3 JC.
-n QJ
01 CT 3

a' 3 JC,
OJ

a'

JC,
01

a' 3 JC,
OJ

5' 3 JC,
Ol OJ CT 3 ID

5' 3 JC,
TT 01 OJ CT 3

-n

-n

-n

-n

-n

tu CT 3

tu CT 3 fD

OJ CT 3

01 CT

OJ CT 3 ID

3 fD

ID
in

<

<

<

fD

<

<

fD
rt

<

tD

<

<

<

<

fD

<

do' 01

do' 01

do' Ol

do' 01
3

do' 01

do' 01

do' 01

do' OJ

do' QJ
8
3

do' QJ

do' OJ

a' 3 +, H > ro Ul
-CT CT

a' 3 +, H > ro Ln
CT CT

a' 3 +, H > ro Ln
CT CT

on

a' + H > ro
-CT CT

5' 3 + H > ro Ul
-CT CT

a' 3 + H > ro JC
-CT CT

a' 3 + H > ro in
-CT CT

a 3 + H > ro Ul
-CT CT

+ H > ro Ln
-CT CT

a' + H > ro Ln
3 CT

a' + H > ro Ul
3 -CT CT

a JC.
l-x

a a JC,
l-x

a a JC,
t-x

a a JC,
l-x

a a JC,
l-x

a a JC,
l-x

a a JC,
t-x

a a JC,
t-x

JC,
l-x

a a JC,
t-x

a a JC,
t-x

o o 'o o vi
vj

o o o o 00
f l 13 TO

o o o o 00
ISJ

o o 'o o 00
LU 13 TO

o P 'o o 00
l-x

o ,o 'o o 00
00

|0

'o o 00 o
13 TO

o ,o 'o o 00
ISJ

'o o 00
l-x 13 TO

|0

o o sJ
ID 13 TO

o ,o 'o o ^ ^
13 TO

TO

13 TO

13 TO

13 TO

z
c
M NJ l-x M ISJ
l-x t-x ID t-x l-x 00 t-x l-x vl l-x l-x t-x l-x l-x t-x f l l-x t-x LO

3
O
l-x

CT

en
l-x

on
t-x

M t-x ISJ

l-x l-x l-x

ID

o
fij l-x t-x t-x t-i t-x l-x t-x l-x

a l-x
o l-x
LU

o >

O
CT
l-x

>

> 13
1-i l-x LU

13 O

>

> 13
l-x t-x LU t-^x vj

3
CT
l-x

t3 13 O
M LU

>
O

>

O TJ

O
CT
l-x

13

>
t-x

>
l-x

>
O

CT
l-x

>

fD

g
ID

l-x t-x LU

l-x

O
l-x LU

l-x

o
t-x LU

o
t-x LU

O
l-x LO l-x

l-x

~U

i-^ vi
Lu 00
l-x LU t-x

i-^ vi
Lu LU
t-x LU t-x

i-:x
vi
t-^x LO
t-x LU t-x

oo i-^x

i-j

y^

y^

oil LO
l-x 00 H

^ M
l-x l-x LO t-x

en
t-x LU l-x

en on
to
l-x LU t-x

cn Ln
00
l-x LU t-x

en 4i
NJ
t-x LU t-x

oo i-^x tn oil

tn

en
t-x LU t-x

i ^ x
00
l-x LU t-x

Ul ID

Nl

6 8 4k
vJ

fsl fx

fsl
f l

fsl
f l

o
f l vJ

O
f l ;vl

O
f l vJ

fx

fsl
fx

4k O
f l vj

fsl

4k O fx
vj

fsJ

vj

fsl fx O 4k ;vl

fsl
fx

fsJ

isJ
fx

ID

o
f l vJ

o
f l

o
f l VJ

vi

in

en

in

en

in

in

cn

in

en

en

in

"I^
ff
V, O
TO
01 3 tn

1> 2
ff
a
TO
01 3

ff
a
TO 01 3 01

^ ff H
a
TO
01 3

^ ff H
8 TO
01 3

ff
a
TO
OJ 3 01

"i^
TO 01 3 01

ff H ' a.

2
ff
a
TO QJ 3 OJ

^
ff
tu 3

c ff H
a
TO 01 3 OJ

^ ff H
a
TO OJ 3 OJ

> A
3

a
TO

N' 01

01

OJ

01

01

5' 3
in T3 ID
fl

a' 3

a' 3
T3 fD

a 3
T3 fD

a' 3
B ID n

5' 3
tn

a'
3

8
3 13 tD

5' 3
13 fD

8
3 13 ID

a'
3 13 ID

o fD
Ol'

13

2) in
rt 01

Oj'

n QJ'
01

Ql'

fD fl Ol' OJ

13

tD

01 01

n
Oj'

n
Ol'

n cu'
OJ

n
Ql'

OJ

01

01

OJ

OJ

tu

^ a ^

^ >
f-l
ID 3 fl

3
.>
ID 3 fl

3
>
e-l
ID 3 O

3
.>
fl
ID 3 fl

3
^
fl
ID 3 fl

3
^
fl
fD 3

3
fD 3 fl

3
,>
f-l fD 3

3
>
fD 3 fl

3
fD 3 fl

R 10
a rt n

fl

>^ n
a

> n

o 3 I
10 TO

o 3 IDID TO OJ 3

SL
a

fD TO 01 3

3 i

fD TO 01 3 fD

3 i

tD TO 01 3 ID

3 i

n
3
fD TO 01 3 fD

fl

tD TO OJ 3 ID

3 i

3 l

tD TO OJ 3 tD

3 1

3 1

TO OJ 3 ID

ro

fD TO OJ 3 fD

3 1

ID TO 01 3 ID

3 1

< 10
tn rt rt

< fD
do' OJ

< fD
do' OJ

<

<

<

<

<

<

<

<

do' 01

do' 01

do' 01

do' OJ

do' 01

do' Ol

do' 01

do' 01

do' 01

5'
a tn
TT 01 01 CT

a'
3

a'
3 QJ OJ CT 3 fD

a'
3 01

a
3 TT 01 01 CT 3 ID rt

a
3 TT 01 OJ CT 3 fD

a'
3 TT 01 01 CT 3 fD

5' 3
TT OJ OJ CT 3 ID

a'
3 TT OJ OJ CT 3 ID

a'
3

a'
3 TT 01 01 CT 3 fD

-n
OJ QJ CT 3

-n

-n
01 OJ CT 3 fD

01 CT 3 fD

< ID
era' 01
rt in rt

< ID
do' OJ
8
3

<

<

<

<

<

<

<

<

<

do' OJ

do' OJ

do' 01

do' OJ

do' Ql
8
3

do' 01

do' 01

da' 01

da' 01

o
a
H

a'
3

a'
3

> o
rt

ro on
CT CT
in ~v. l-x

>
a a

+ H

+ H >
8
Ul

+ H
Ul

Ul V, -CT CT

ro

ro

ro
-CT CT

>

5' 3 + H >
Ln

a'
3

a'
3

a'
3

a'
3

a'
3

+ H
ro Ul
CT CT

ro

>

+ H
ro Ln
CT

+ H >
8 Ln
CT

>

ro
CT

>
a a o

+ H
ro
CT CT

>
a a

+ H
ro
CT CT

>
a a

+ H
ro Ln
-CT CT

Ul

Ul

-CT CT

-CT CT

CT

a
l-x

a a
M

a a
l-x

a a
l-x

a a
t-x

a in
l-x

l-x

t-x

t-x

\l-x
o ,o 'o o 00
Ul

o |0
h* 13 TO

o
'o

o
'o o 00
00 13 TO

o
'1 o o 00 cn
TJ
TO

1 o
o 00
00

1 o
o ID
O 13 TO

1 o
o 00
LD

1
3
00 vJ

,o 'o
o 00
vj
-CT TO

1 o
o 00 cn
13 TO

o |0
'o
C3 00

Ln
13 TO

TO

n TO

TO

TO

z
c
M LU Nl
t-x LU l-x l-x LU 0

3
CT M ISI ID
l-x ISI 00 t-x ISJ vJ l-x Nl

en
l-x

l-x ISJ Ln

t-x NJ -Ik

I-.X NJ LU

l-x ISJ ISJ

to

o
l-x t-x

0
C T
l-x

l-x 0

t-x 0

l-x

t-x

t-x

l-x

o
C T
t-x

> D K o
LU M

>

13

>

13

>

>
o

3
o

o >
t-x l-x LO

o
TJ

O
13

o
C T
l-x l-x Ul M 00

l-x 0

ID

>

>
t-x

> o

13

>

-CT t-x O l-x

>

H
3

0
M Ul 00 0
t-x 00 t-x

l-x 0 l-x LU

t-

M 0 l-x LU

t-x

t-x

o t-x
LU

o
l-x LU

oo
t-^x 00
l-x 00 l-x LU l-x

t-x 0 l-x 00

a ID

oo
t-^x VI

i-j Lfi

P P Ul
l-x t-x Ul l-x

y^ 00
fsl ID t-x LU t-x isj f l 0

i-:x
00
fsl 00 t-x 00 t-x isj fx 0

i-^x
00 ^:x

i-j
00
t-x l-x l-x LU t-x

i-j
00

i-j
vi

i-j
t-x l-x LU t-x

on
t-x LU t-x

b LO
l-x t-x

Ln
4k
l-x 00 t-x

4k O
t-x t-x l/l

oo
fsJ
4k O 4k vj

oo fo
4k

to

NJ

isl
fx 0 4k vj

isl
4k

6 8 4k
vJ

o
4k vJ

NJ 4k 3 41 vJ

isl
fx

fo
fx

fsl
41 0 fx vi

2 ID
" C T

o
f l vj

O
fx vj

o
f l vi

f l vl

f l VJ

in

in

in
1%" Cl

in H

in

^ ff H
in

"i^
ff
jn ~v TO OJ 3 Nl 01

ff
3 TO 01 3 01

^
ff ^
a
TO 01 3 01

ff ^ jn
TO 01 3

in 1> c

in
"i^

in

cn

ff ^
a
TO 01 3 OJ

ff a
TO Ol 3 OJ

^
ff
a
TO 01 3 rt

>
ff H a ei o OJ
3 rt

in > <^

in

> <^

>

ff ^
a era 01
3 rt

ff ^
a era QJ
3 rt

8 2 era 01 a FI'
01 rt

a
OJ

a 8
3

> i n. a ID
m

8 a

5'
3 TJ tD
Ol' tn

a'
3 TJ fD 0 01' 01

a
3 T3 fD 0 Ql' OJ

5' 3
13 fD fl Oj' OJ

a' 3
13 ID

a' 3
13 fD

5' 3
CT fD

a 3
CT fD

a'
3
-CT ID

a'
3
CT fD fl flj'

2[ tn
01

01 01

n
oj'

n
Ql'

n
OJ QJ

n
Oj'

OJ

OJ

01

01

OJ

.5
^

3
,>
f-l ID 3

3
,>
f l ID 3 fl

3
> "n fD
3 fl

3
n 3

.>
1-1 fD 3

3
fD 3 fT

D
10

> n
a

,>
fD 3 fl

3
fl

3
f l fD 3 fl

.>

3
fD 3 fl

> n
a

3
ID 3 0

> n
a

3
rs ro
3

.>
n a

a rt 0

fl 8

era

3 r ID
a

Si < ID
in

TO OJ 3

3 c to

a 3
ID TO 01 3 ID

a 3 i
ID TO OJ 3 fD

3 l
tD TO tu 3 fD

3 1
ID TO 01 3 ID

a 3
fD TO OJ 3 fD

i fD TO 01 3 fD

fID TO OJ 3 ID

3
ID TO 01 3 fD

3
fD TO OJ 3 tD

< 10
in

<

<
OJ

<
OJ

<
01

<
OJ

<
01

<
OJ

<

<

TO
01 rt

do'
OJ

do'
01 3

do'

do'

dq'

do'

do'

do'

do'
rt

do'
OJ 3

JC
Tl 01 01 CT V,

8 a

5' 3
TT OJ OJ CT 3" ID rt

a'
TT OJ OJ CT

a' 3
TT 01 OJ CT 3" fD

a' 3
TT OJ QJ CT

5' 3
-fl OJ

a' 3
TT 01 QJ 3" 3" fD

5' 3 ^ Ol
OJ ,CT

a' 3
TT QJ QJ CT 3" ID

a' 3
Tl 01 OJ CT

a'

OJ OJ CT

OJ CT

< 10 tn
01

<

5" < ID
do'
OJ 8 3

<

ID

5" <
OJ 3

ID

5" <
OJ 3

<
QJ

fD

5" <
OJ 3

<

ID

5" <
QJ

fD

5" <
rt

do'
01

do'
01

do'

do'

do'

da'

do'
01 3

do'

dq'

S C TS
CT

a' a +, d > ro

a' + 1 > ro
3 Ul
-CT CT

> ro
a a

+, H
Ln

5' 3 + -H > ro
Ul
-CT CT

a'

a'

Ln

> ro
a a
l-x

+ H

Ln
-CT CT

> ro
a a

+ H

5' 3 + H > ro
a a
l-x

a'

+ H

on
-CT CT

> ro
Ul

+ H
ro on
-CT CT

>

5' 3 + H > ro
Ul
-CT CT

a'
3

+ H

Ul

> ro
a a

C T
CT

-CT CT

T3 CT

T3 CT

a rt jP n

a a
l-x

a a
t-x

a a
l-x

a a
l-x 0

a a
KX 0 0 0 0 LO UJ
CT TO

~v. M

l-x

t-x

l-x

p '0
0 (0 00

0
' 0 0 LO Ln
CT TO

1 0
0 to 41

'0 0 ID cn
13 TO

o |0
o o
ID TJ TO

o 1 'o
ID LU
CT TO

1 0
0 ID ISJ
CT TO

o 1 o
ID l-x TO

P
'0 0 ID 0
CT TO

| 0

00 ID Tl TO

o o

S do

2 TO

z c 3
:: .> Ul
M
l-x 4k ISJ l-x f l l-x l-x 4k O t-x LU LO t-x LU 00 l-x 00 vJ l-x LU l-x

en
M O

oo
Ul

t-x 00 f l

t-x LU LU

CT ID

o > o
l-x

l-x 3

t-x

13

>

13

o >
t-x

t-x O CT l-x O t-x LU

l-x 3

t-x

t-x

t-x

t-x

>

13

>

13

o >
t-x 3 t-x LU

o >
CT l-x O l-x UJ

>
T3
l-x O l-x LU h^x LO t.:x Nl t-x LU t-x

o >
13
t-x

13

o >
l-x O l-x

l-x O

>
13
t-x O t-x LU

ID H

g
ID

o
M Ul CD

t-x O t-x LU

l-x l-x 00 M ID

i-^ LO
fx O
l-x 00 t-x

t-x LU t-:x LO

o
l-x LU

oo

i ^ x ID
isJ
00
t-x

i ^ x
LO fx
t-x LU l-x

ID Ul

i ^ x

LO

Ux

i ^ x
00 00

i-^x
00

4k
NJ
t-x LU

fsl
ID
l-x LU l-x

isJ
Ul
l-x LU t-x

isJ

i-j
t-x LU l-x

b o
t-x LU t-x

Ln
l-x LU t-x

Ln
00
l-x LU t-x

j- Nl

oo
f l

m
ID ID

I-.X

6 8 *i

fo fx o
4k vj

isl fx

fsl

fsJ
f l

o
f l vj

o
f l VJ

vJ

o ^

Nl f l 3 f l vJ

fsl 4k O
vJ

fo fx o
f l ;vl

fsl
f l O

fo
4k

isj
fx

vj

O fx
VJ

o
f l VJ

vi

in

in

in
"Dr 2 ff H

in

en

in

in

in

in

in

in

^
ff
jn "V, O

> 2 ff H
a
TO 01 3 01

1^
ff

^
ff

"i^ ff

^
ff

1^
ff

"i^ ff

> 2
ff

> ff a ei q tu
3 OJ

> ^

a 8
3

a
TO 01 3 01

a
TO tu 3 tu

a
TO OJ 3 OJ

a
TO QJ 3 01 8 3
-CT fD

a
TO tu 3 01

a
TO OJ 3 01 3 s ^

a
TO QJ 3 QJ

qp 01
3

a ei o tu
3 OJ

Fi' 01
8

a
in

a'
3

a
3 T3 fD fl Ol' OJ

a'
3 13 fD

a'
3 13 ID

a'
3 TJ ID O 01 Ql

5'

5'
3
-CT ID O Ol'

a'
3
CT fD

a
3
CT fD

o to n 2[ ^ c SL 3 ^ ^

T3 fD n
oj'

CT ID

n
tu'

n
oj'

n
OJ OJ

n
oj'

QJ'
QJ

5'
QJ

OJ

01

01

tu

01

3
,> f?
tD
3 fT 8

3
^ n
fl 8 ID 3

3
^
fl
fD 3

3 v ^
>
fl
ID 3

3
>
f)
fD 3

D
ID 3 rt

=ft '. > n


fD 3 fl

3
.> o
ID 3

,> n
ID 3

3
n 8 3

3
fD 3 O

> n

3
>
fl
ID 3

Q 8 3
10

3
I fD TO OJ

3
fD TO 01 3

a 3

r-

r-

era Si a < ID
in

1 ID TO

tu
3 fD

i fD TO 01 3 ID

a 3

n
8 1 fD TO 01 3

f fD TO 01 3 ID

a 3

fID TO 01 3 fD

a 3

i fD TO 01 3 fD

i fD TO DJ 3 ID

a 3

I fD TO QJ 3 fD

a 3

ID tn

a <

fD

<

<

<

fD

<

<

<

<

<

<

era' 01
8

do' 01
8 3 in TT OJ 01 CT 3

da 01 a'
3 TT 01 01 CT 3 ID

do' 01

do' 01

do' 01

do' 01

do' OJ

da' Ol

do' 01

do' OJ

5'
3 TT 01 01 CT 3 fD

5'
3 TT 01 OJ CT 3 ID

a'
3 OJ QJ CT 3 ID

5'
3 TT OJ

a'
3

a
3 OJ QJ CT 3 tD

a'
3 TT OJ OJ CT 3 ID

5'
3 TT OJ

in Tl 01 01

QJ

tu
3 fD

^ a < 10
do' 01
rt

CT

QJ CT 3

tu
3 fD

CT

!4

to
in

<

<

<

<

<

<

fD

<

<

<

<

do' 01

do' 01

do' OJ

do' OJ

do' 01

do' OJ

do' QJ

do' DJ

da'
rt

do'
rt

5" a + d > ro on Vv
CT CT 8 rt 8 t-x O

5' 3 + H > ro on
-CT CT

a' 3 + H > ro on
CT CT

a 3 + H > ro on
CT CT

a' 3 + H > ro Ln
-CT CT

a' 3 + H > ro Ln
CT

a' 3 + H > ro Ul
T3 CT

a' 3 + H > ro Ul
CT CT

a' 3 + H > ro Ul
-CT CT

CT

a' 3 + H > ro Ln ^
T3 CT

a' 3 + -H > ro Ln
-CT CT

a a
t-x

a a
t-x

P 'o
o o TO

o '1 o
l-x

l-x O

o '1 o o ID
vJ 13 TO

a a ^ t-x o 1 'o o LD
NJ 13 TO

a a
l-x

a a
t-x 3

a a
l-x

a a
l-x

a a
t-x

a a
l-x

a a
l-x

o 1 o
3 LO ID TJ TO

P 'o o

t-x ISJ

o P 'o o ID
00
CT TO

o P 'o o

| 0

o 3 o o ID
tn
CT TO

l-x

o o LO
ID 13 TO

4k
CT TO

o P 'o o ID
Ul TJ TO

C3

o TO

-o TO

z
c 3
M Ul 4k
l-x l-x Ul LU l-x

Ln
NJ

t-x Ul l-x

t-x Ul

o
l-x

l-x f l ID

l-x fx 00

t-x fx vJ

l-x Jk

t-x f l

cn
l-x

on
t-x

l-x 4k f l

CT ID

O
M
t-i t-x t-x t-x l-x

O
T3

>

>
CT
t-x

>

o >
CT
l-x

o >
13
l-x

a
M O M Ul Nl

> -o
t-x

CT
l-x t-x LU t-^x ID

o >

o >
13
l-x

o >
13
l-x

o >
13
t-x

CT
l-x

o >
O

tD

g
ID

t-x

O
l-x LU

O
l-x LU

O
t-x 00

O
l-x 00

l-x LU

O
l-x OO

p
M

O
t-x LU l-x

fo o b vJ
l-x

fo o b vj
l-x LU t-x

fsJ O

isj

b o
l-x 00 l-x IsJ

o b o
l-x LU t-x

KX LO

l-x Ul M LO

I-.X LO

l-x LU

i-j
ID

i-i
LO fx ID
l-x LU t-x

i-j
ID 4k Ul
l-x 00 t-x l/l ID

Ln
00
t-x LU t-x

Ln
NJ
l-x LU l-x

Ln
O
t-x LU t-x

Ln
O
l-x LU t-x

oo
t-x

isj
41

isj
f l

6 8
f l

3
f l vj

4k
sJ

4k O fx
vJ

4k O fx
vj

fo

isl
f l

io
f l

fsl
fx

fsl

O
f l

O fx
vJ

fx

fsJ fx O

fsJ

41 41

2 to

vJ

vi

f l ;vl

f l vJ

f.
vj

vi

in

in

in

in

in

in

in

in

in

in

in

^
jn

ff

>
ff

Dr 2
ff

Dr c) ff H

Dr ^
ff

Dr m ff H

Dr S
ff

Dr ff

c H

Dr ff

c H

Dr ff

c H

Dr Cl ff H

>

a 8
3

8 TO
01

a
TO
01 3 Nl' OJ 3

a
TO 01 3 OJ

a
TO OJ 3 OJ

a
TO OJ 3 OJ

a
TO
DJ 3

a
TO
OJ 3 OJ

a
TO 01 3 01

a ei o DJ
3 OJ

a ci q OJ
3 OJ

a ciq Ol
3 OJ

R'
01 rt

01

5"
in

5'
TJ fD

a
3 TJ ID

a
3 T3 ID

a'
3 T3 ID

a'
3 13 fD O tu' DJ

a'
3 13 ID

a'
3 13 ID

a
3
CT ID O Ol'

a'
3

8
3

2 ID
O

o fD
n
DJ OJ

CT
fD

2'
in rt 01

n
oj'

oj' in

QJ'
QJ

QJ'
QJ

n
oj'

QJ'
01

oi
OJ

01

OJ

OJ

OJ

3
^
10

3
,>
fl
ID 3

3
.>
f~i
fD 3 fT

.>
fD 3 fT

e-l

3
.>
fl
fD 3 fT

3
>
f-l
ID 3 O

3
> n
fl ID 3

^ > n

g >
e-l
ID 3 i ID TO OJ 3 fD

3
.> n
ID 3

3
.>
fl
ID 3

a m 8
TO

ID 3 fl

c ID

3
i ID TO 01 3

3
I fD TO OJ 3 ID

a 3
ID TO QJ 3 fD

a 3
1 fD TO QJ 3 fD

a 3
fD TO DJ 3 ID

Si a < 10
in
rt

1 ID TO 01 3 fD

a 3

I fD

a 3

a 3

a 3
fD TO DJ 3 tD

TO
OJ 3 fD

i ID TO QJ 3 fD

a 3

< ID
in

<

<

<

<

<

<

<

<

<

do' 01
8

do' OJ

do' OJ
8
3

da' OJ

do' OJ

do' OJ
8
3 TT 01 OJ CT 3 ID

do' 01

do' 01
8
3 TT OJ OJ CT 3 ID

da' OJ

do'
rt

dq'
rt

a JC.
Tl 01 -1 01 CT

a'
3 TT OJ 01 CT 3

a'
3 Tl OJ QJ CT 3 ID

a'
3 TT OJ QJ CT 3 tD

a'
3 TT OJ 01 CT

a'
3 TT 01 01 CT 3 fD

a'
3 TT 01 DJ CT 3 fD

a
3 TT

-n
OJ OJ CT 3 ID

tu
OJ CT

'
3

10
in

<

ID
in

<

<

<

<

<

ID

<

<

<

<

ID

<

iS' 01
rt

do' 01

do' 01
8
3

do' OJ

do' OJ

do' DJ

do' 01

do' OJ

dq'
OJ

dq'
01

dq'
01

5" a +. H > ro Ul
CT CT 8

a' 3 + H > ro Ul
-CT CT

+ H > ro Ul
T3 CT

a' 3 + H > ro

on
-CT CT

a' 3 + H > ro Ln
TS ZT

a' 3 + H > ro Ln
-CT CT

a' 3 + H > ro Ul
-CT CT

a' 3 + H > ro Ul
-CT CT

a 3 + H > ro Ul
-CT CT

a' 3 + H > ro
or
-CT CT

a' 3 + H > ro Ul
-CT CT

8 jn
l-x

rt

a a
t-x

a a
t-x

P
M

'o

o o o
l-x

o 1 o
l-x

P 00
13 TO

3 Ln 13 TO

o t-x
"CT TO

a a ^ t-x o o o o LD
vJ

a a
t-x

a a
l-x

a a
l-x

a a
l-x

a
3

a a JC,
l-x

a a JC,
M

l-x

o 1 o
t-x

o P 'o o f l

l-x

o P 'o

|0

|0

t-x

l-x

l-x

o o 'o

|0

t-x

t-x

o VJ
13 TO

o NJ
T3 TO

o en
13 TO

o Ul
13 TO

o LU
13 TO

o l-x
CT TO

CT TO

D TO

z
c
l-
l-x

3
cn UT
l-x

cn 41
l-x

l-x CTI LU

t-x

l-x

l-x

m
NJ
l-x

cn
t-x l-x

cn o
l-x

t-x Ul ID

t-x

I-i

on
00
t-x

on
vJ

l-x Ul

l-x

CT 10

en
l-x

on
Ln
t-x

O
l-x

01 M
t-x

13

>

O
-CT l-x

13

>

>
O

3 13

13

>
o o

>

CT
l-x

>

-CT t-x

>

TJ

>
l-x

CT
l-x

>
O

O TJ O
l-x LU

CT
l-x

>

>

to H

g
to

If O
l-x

l-x

l-x l-x LU

l-x t-x LU

l-x

Ul

l-x OO

l-x LU

o
l-x LU

o
l-x LU

o
l-x Ul

O
l-x OO

l-x LU

isj
i-

fsJ
l-x

io
t-x

fsl

fsl

b 00
l-x LU

on
M LU t-x

b NJ
M LU t-x

on

p
O

fsl O
4k NJ
l-x 00 t-x

fsJ

fvil

fsJ

cn
t-x LU I-.X

Ln
l-x LU l-x

UJ LU
t-x LU t-x

oil
t-x t-x LU t-x

fo
LU

fo o
fsJ

fo

i-^x
00
t-x LU t-x

o
l-x

l-x Nl

l-x LU t-x

Ul

oo
f l

I-.X

ID

fsl
4k

6 8

O
fx vj

i^
sJ

io fx o
4k vj

io fx o
fx ;vl

isl
f l

o
f l vJ

io f l o
f l vj

isl

isl
f l

fsl
41

fsJ

fsj
f l O f l sJ

2 ID
T3

O
f l vJ

o
fx vJ

o
f l vJ

O
f l vJ

in

in

in

in

in

in

in

in

in

in

in

> ff H
ln

Dr 2 ff H
a
TO
OJ 3 Nl 01 3

> ff H
a
TO
OJ 3 01

^ ff H
a
TO OJ 3 OJ

Dr c ff H
a
TO OJ 3 QJ 3 v
CT ID

Dr 2 ff H
a
TO OJ 3 OJ

^
ff
a
TO DJ 3 01

Dr ^ ff H
a
TO
OJ 3 01

Dr ff H
a
TO
01 3 N 01 3

Dr c ff H
a
TO OJ 3 QJ

Dr c ff H
a
TO DJ 3 QJ

>

a 8
3

qp 01 a
01 rt

N'
8

> in. a ID
m
rt 01

a'
-CT fD

a'
3

a'
3

a'

a'
3 13 ID

a'
3 13 ID

a'
3

a'
13
fD fl Oj' 01

a
3

5' 3
CT ID

\
13 ID

13

2' tn

oj'

fD fl Ol' 01

D ID n

o
01 OJ

Oj'

n cu
01

n
Dl'

n as'
01

CT ID

n
DJ DJ

oi'
QJ

QJ

OJ

01

3
^ r
10

g .>
f-l
ID 3

3
.>
fD 3

3
>
ID 3 fl

3
.>
fl tD
3 fl

3
.> n fD
3

3
>
1-1 ID 3

3
fD 3 O

3
fD 3 fl

3
>
fl
fD 3 fl

3
^
fD 3 fl

fl o

fl

> n
a

> n

fl

e o TO

r*

Si
a

tD TO OJ 3 ID

3 f

fD TO 01 3 fD

3 1

3 1
ID TO
OJ 3 fD

3
tD TO tu 3 ID

3
ID

TO
01 3 fD

fD TO 01 3 ID

3 I

tD TO 01 3

3 1

rID TO
01 3

3 1

fD TO OJ 3 ID

fD TO OJ 3 ID

< ID tn
rt rt

<

<

<

<

<

<

< ID
do' 01

< ID
do' 01

<
rt

<
rt

01

do' 01

do' OJ
8
3 TT OJ QJ CT 3 ID

do' DJ

do' 01

da' OJ

do' 01
8
3 TT 01 01 CT 3 ID

dq'

do'

5'
a
in Tl 01 01 CT

a'
3 TT OJ 01 CT 3

a
3 TT DJ OJ CT 3 fD

a
3 TT OJ OJ CT 3 ID

a'
3 TT DJ QJ CT 3 ID

a'
3 TT 01 Ol CT 3 fD

a'
3 TT QJ QJ CT

a'
3

a'
3 TT OJ OJ CT 3 fD

-n tu
OJ CT 3 ID

' a < ID
tn

< ID
do' OJ

<

<

<

<

<

<

. 3 < ID
dq'
OJ 3

<
01

<

do' 01

do' OJ

do' QJ
3

do' OJ

da' OJ

do' 01

do' OJ

dq'

da' OJ

a' a f
H

rt

a'
3

a'
3

a'

a
3

a'
3

>
a rt
8
in

^ C CT
CT
l-x

ro

+ H >
a a

ro Ul
T3 CT

+ H >
a a

Ul

ro

Ul

ro
T3 CT

+ H >

+ H >
a a
t-x

Ln

ro
CT

UT

ro

+ H >

5' 3 + H >
a a
t-x

a'
3

a'

8
3

a
3

+ H >
Ul

+ H >
a a o
on
CT CT

+ H
Ul

+ H >
a a
"M
|0
Ul

Ln

ro

ro

ro

ro
-CT CT

>

ro
-CT CT

-CT CT

CT

T3 CT

-CT CT

a a
t-x

a a
l-x

-CT CT 3

8
l-x

a a
"t^

l-x

t-x

Hi

P 'o
l-x
IDX

o
'1 o
l-x l-x t-x -CT TO

1 o
l-x l-x LU

1 o
l-x t-x

1 o
l-x l-x NJ

'o

o
t-x t-x

o
'1 o
t-x t-x ID

O |0

|0

o
I-i l-x LO

o
l-x l-x

o o 'o o

t-x

t-x

p
13 TO

C3
CT TO

ID 13 TO

UJ 13 TO

o to
13 TO

D TO

CT TO

13 TO

CT TO

13 TO

3
vl Ol
t-x vJ NJ l-x

vl
l-x

l-x vl

l-x

l-x

O
l-x

en
LD
t-x

en 00
l-x

CTI vl

OT

CT ID

cn CD as

o >

t-x

l-x

O
13

>

13

>
t-x

-o

>
l-x t-x

TJ O

>

CT
l-x

>

-CT

>

>

>

s
IDX

C T

3
ID

l-x l-x LU

l-x

O
t-x LU

o
t-x Ul

o
l-x LU IsJ t-x

Ul Ul

isi
NJ

oo

vl
M

io
t-x

Nl

b oo
l-x LU t-x

Ln vj
t-x LU t-x

isJ If oil

io
sJ

tf fsl

oo io

LU

id

i-:x
00
t-x t-x

cn
l-x LU l-x isj f l

l-x LU t-x

oo
fsJ
f l NJ O

Ul ID ISJ fl

g
fk sJ

io f l o
4k vi

isl
f l

fsl
f l

<
fD

o
fl vj

o
fx vj

o
fx VJ

o
fk vj

fl vj

^
vi

in
NJ

in

in

in

cn
O

cn +^ c
Ln TT

cn 1 ff' G <.
on a

cn

+, $ 7 a! ! lis

^ ff H
3
TO 01 3 OJ

Dr c ff H
a
TO
OJ 3 01 3

Dr S
a
TO OJ 3 01 3

ff H

in Dr c ff H
3 TO 01 3 01

in

in

^r cn ff
a
TO
01 3

cn
a
TO OJ 3

cn
8 a eio
OJ 3 3

3 I
M Ol

O
73

TO tu 3

2 e S i

TO 01 3

3 QJ

> +


3 ID rt

<

51
i

T I >
73

01

cn o
Nl

01

a' 3
13
fD

a'

a'

8
3 13 ID fl Oj' tu

a'
3
CT ID

a
3
CT ID -CT fD

13 ID n

8 %

6 ^ 2
+ + O
01

TO' OJ'

0. .,

13 ID

oj'

CT ID

QJ'
OJ

n
Ql'

Dl'

a 51 3 3 + t:^

ii
+ > + ffDli n 3 < n a

01

01

01

3 ^
^ >
n
fD 3

3
-v.

3
.>
f l fD 3 fl

3
>
f l ID 3 fl

3
fD 3

3
fD 3 fl

11
TO OJ

ll ?!
73 a

> n fD
3

> n
n
8
i fD

> n 3 r
a

n
ID 3 fl

n
fD 3

9 Ln
CT 30

S|
o O ^

I ID

a
3 01 01

CT Q. -h

il
a
3 3

1 1
J>

I- D

O TO

i fD

01

TO
OJ 3 fD
Vj.

ID TO QJ
Vj

3 r3

a 3
i fD TO DJ 3

n a

fD TO 01
Vj

TO
01

fD TO 01 3 ID

> 5L

n m

3 <

3 ID

r^ 3
ID

ffD TO OJ 3

<

ID

<

<

<

<

<
fD TO QJ

<
ID TO DJ

z n a.
m

TO tu rt

3 < a
ID 3

z s.
"S. 0 =
-h 3 rt

da' DJ

do' QJ

do' 01

da' OJ

do' OJ
8
3 TT OJ OJ CT 3 fD

a'
3 TT QJ OJ CT 3 ID

a'
3 TT OJ OJ CT 3 ID

a
3 TT 01 Ol CT 3 fD

a
3 TT OJ DJ CT 3 ID

a
3

a
3

a'

01

<
fD TO rt

<
ID TO rt

<
ID TO OJ

<
ID TO rt

<

<

<

<

<

\CT . 3 <
ID

ID

<

do' OJ

do' 01
3

da' 01

do' QJ
8
3

do' DJ

TO tu

TO OJ

a'
3

a'
3

a'
3

a
3

a'
3

a'

+ ^ >

ro on ro + >

ro
Ul

+ ^ >

ro
Ul

+ H >

+ ^
Ul

+ H
Ul

ro

> ro
CT
CT

+ H
Ul

ro
T3 CT

>

5' 3 + H > ro
Ln
-CT CT

a'
3

a'

+ H
Ul

> ro
CT CT

+ H
ro

>

^ ro + > "+ >


TJ T3 fD 3 Q.

.> H >
ro + >
TJ -CT ID 3 3.

ro +

^ ro + >

^ > >

on
CT CT

+ ^ ro
Ln

ro Ln

+ ^

ro +

a a
t-x

a a
l-x

a a
I-.X

a a
t-x

a a o

5
ro +
13 13 ID 3

B
ro + > *+ > TJ 3
fD 3 3.

l-x

> + >

1 o
l-x l-x vi

1 o
CT TO

l-x t-x CTI

l-x t-x fx

o o o

1 'o
l-x t-x LU

|0

o o

C3

l-x l-x Ul

13 TO

13 TO

CT TO

13 TO

CT TO

T3 TO

a.

x'

3
CT ID

S 3
o

00

o
01

?
LU

o >
TJ

3
CT

>

3
ID

Ul vl
4k NJ Ln 10

Nl

NJ

s
^ en
I

fx vj

Nl fl 3
fk vJ

Nl

<
ID

4k

in

in

^ in cn cn o X o X cn

iti ^ cn +. ff
in

M# 'i 5 I ll il I i I
o ^ iS S
+ 2.
fD 01

cn

cn

cn

cn

f ff
a
X
3D f l

a
TO

S^
as 2 s'
?
ID 3 TO

f
5
TT TO

cn

cn

S #'

m + n a 3 TO DJ 3 N 01 3

cn

sl
3 Dl

gl

^ S X S
3 a
ID

O D J 3D 2 .

sl
> X + -O 30 DJ 3 N 01 3.

ro 3.
3^

ff %

ol
ID O. 3' TO

M
00 13

+ -IZ
"CT 73

? I,
3D t n fD CT

?
ID

5'
3^

5'
3 CT ID

I i
X 0.
a 01

A S
O 01

+ OJ -INJ 3 ID +
OJ fD

+ UC
f l ID 3

f i I I X Q. 3 11
a
fD UT 01

Q.

13 fD

+ VC

01

Si

t >
-f-f NJ Ul f l ID 3 O

t ff ^ -5
ro cr

c n sr
m 3
f t fD 3 n

+ a + >

TJ fD

^1
8 %
+
LU

a
CL tu

5'

sr C T
Ul
01

S. S
2i.

OJ

ro

3 n
fD 3

n 3

8 E

>
f l

n
fD

ff

%g
CT Q.

f
o
ISI

+
ITI

i. ^

II
8 >
o
o

T3 I 3. ID rt, TO tu
3

11
TO QJ_

m a m 3

3.
fl

+ a
3
00

A ^ m?
ff
fD o

TT

8 ^
^ ID T J TO 3. OJ 3 3

<
fD

5" <

It
li
a
3 01 01

ID

<
ID TO 01

^ 3
rt,

fD TO tu

!l
00

f ID TO OJ

ro o 3 CT a

2 +

tD

i ID TO OJ

iff
n

t>
3

l i I?
3 n fD a

ff
a

II
<
ID ? J erar n

^
Q. -t,

^
fD TO 3 OJ

<
fD

t-x 21
^

r
13

3
<

TO 01

TO DJ

TO tu

a
3 01

a
3 OJ DJ

a
3

a
3 01

2; %
TO rt OJ 8 OJ 3 3

a
3 01 QJ

a
3 OJ

o
CZ 3D

a 3^
3 01 OJ

a
3 01 01

b t
^ 5'
3 01 QJ

il
+ 3

11
01

3
3

01 3r

3
3 ID

as
3

<
ID TO 01

fD

<

fD

<

5" <
fD TO rt 8 3

<

ID

<

fD

<

<
ID TO OJ

fD

<

fD

<

fD

<

TO rt

TO rt

TO rt

TO rt

TO rt

TO QJ

TO rt

a
3

a'
3

5'
3

>

ro
Ln

+ H > >
ro +

+ H >

+ H >
ro
Ul

ro
Ul

ro
Ul

Ln

+ ^ ro

a' 3 + ^ ro
tn

a' 3 + ^ ro
Ul

a 3 + ^ ro
in

a
3

5! ro
Ul

a 3 + ^ ro
Ul

a 3 + ^ ro
in

5
ro

+ >

ro +

>

5
> "+ >
ro +
TJ 13 fD 3 Q. X

I
+ > "+ >
-CT CT tD 3

> >

ro + >
"H

>

ro

> *+ >

ro +

+ > V >

> ro

> ^ > ro + > "+ >


13 CT fD 3 3.

ro +

> >

ro +

>

ro

^ ro + > + >
TJ -CT fD 3 3.

> ro + > "+ >


-CT CT tD 3 3.

ro + > ^ > ro +

>

>

> >

ro +

ro +

>

s
ro

> "+ >


13 13 fD 3

5
+ > "+ >
ro
CT TJ ID 3 Q.

s
+ > *+ >
CT 13 fD 3

+ >

ro

B
ro +

CT T3 ID 3 3.

TJ -CT ID 3 3.

> >

a.

a. x'

a.

13 TJ ID 3 3.

3
CT ID UJ 00

o
o
01

>

CT

>

3
CD

Ul Ul 00

isl

Ul ID
Nl

ISJ
f l 3

NJ O

<
ID

in
iti ^? cn
a 8 eio
OJ 3 ID OJ

41 vj

fl vj

in

in
^

X ff Ln tn

00

cn
fD

cn

00

cn

cn

Ul

cn

1
Ln

ff
tn

ff

1 > cn
g

UJ

!n fD

cn

Ul

S a-

gs > i'
a
3

+ ^

^ TO > 01 X 3 + Ni' -CT 30

g-g
7 2.
T> S

?^

f
m TO

c JC

h%
as 13 CT ir' = C as 3. a 3 TJ fD

a
3 13 fD

? 2.
f l N 13 ID

3D ID_ CT fD ID OJ

fD -I-

Oj'

Sl
13

+ n > QJ'

CT ID

ID

-i-

DJ

a.

3
f l ID f l fD 3 fl

-< +
NJ 3 O LD

n
Ul fD

01

II
OJ
3.

+ Dr

i|
3. fD +

ff S'
3. a 3
QJ

5 3

QJ

3
> f l fD

CT 3.

3
ID TO

1|
fD TO 3

Is Is
CT C3.

n
fD 3

n a

&g
n n a
fD 3 I fD TO OJ 3

I ID 01

rt, OQ
3

i fD TO

H
3
+
IT
ID t>

<
II
f l in

?1.

sl
73 01

i ff rz. J C

cn iti ^ cn X ff 8
3

Sl
30 01

Cl eiq O ^
NJ

+ 2.
OJ

^ i'
-n rt UT DJ

fl
in gj

m
Z

TJ

fD

0.

f l

OJ

O uT

^ ff n 2, > + ID
OJ 3.

3 fl 8

if 11
CT f

if
^
3 rt

il
00 13

A :
O OJ

^
>
n

n
ID

T3 I

3 rt

"S 3
Ul

^ c S Z . OJ
> 5
13 CL < ID TO 01 8 3

<
fD TO 01

ID

<

<
ID

<
ID

ID

<

<
fD TO 01

il
Is
A3
CL 3 rt

ll
rn fD

13 I 3. ID - h TO CU 3

a%
+ 3 TO 13 < OJ 3. fD

I t g
a. rt a 3 QJ 3-

fD

<

TO QJ 8 3

A$

TO OJ

a
3 01

a
3 QJ as

a
3 Ol 01

a
3 OJ OJ

8 3

a
3

a
OJ

a
3 OJ

QJ as

3
3

OJ CT 3

QJ CT

3
3 ID

3
3

<
fD TO 01

ID

<

ID TO rt 8 3

<

<
fD TO rt 8 3

<
ID TO OJ

fD

<

<
ID TO OJ

<

fD

<

5" <
ID

<
ID

TO rt

TO DJ

a
3

>

in

ro

a' 3 + ^ ro
Ul

+ ^ ro
Ul

on

+ ^ ro

a 3 + ^ ro
Ul

a'
3

5 ro
Ln

5' 3 + H >
ro
Ul

a 3 + ^ ro

a 3 + ^ ro
Ul

a
3

a
3

>

ro
on

s
Ln

ro

5 ro
+ > > ro + > ~+ >

ro + > ^ > ro +

>

5 ro
+ > > + > ~+ >
TJ -CT fD 3 3.

>
ro

> ro + >

ro

> *+ >

TJ 13 fD 3 3.

-CT CT ID 3 C3.

> ro + > + >


13 13 ID 3 3.

5 ro
> >
CT CT ID 3 3.

ro + ^ ^ > ro +

>

> ro + >

ro
> ^ ro + > '+ >
a.

$ ro + > > + > "+ >


H
ro

s
ro

5
ro +

> *+ >
CT 13 ID 3

5 ro
V > TJ
CT ID 3 3.

+ >

> >

+ >

5 ro
+ > "+ >
13 CT fD 3 C3.

13 -CT fD 3

a.

13 -CT fD 3 3.

> ~+ >
CT CT ID 3 3.

ro +

3
Nl CT ID

s ?
LU lO
f l

o
01

g
00 00

3
ID

id

l/l tD

g
cn
NJ
:*'

tn

cn

cn

+ cn t-x

cn

cn

cn

Ln

eiq

3.

ll
I

?^
OJ -1 3

+ ff'

? 5 > "2 r3
01 TO

f s

5'
OJ

8f
+

+ 30 ID f j

a
3

11. Is
a
3 TJ ID n ID

r
?1.
TJ rt

15
So
g ^.
a 3^ X N

^ ^ > cn > i ff a 5 ^ 8
+
3

in

1 n
m[

II
ID n

5^
a +
3.
-CT fD O Ol'

JI
a
3

TO

fl -<

M CU

2. 3, < as

-CT TO OJ

+
01 3

<
fD'

QJ'

ff 13 I 9; >
f l ID 3 fl

si
TO rt

3
ID

ff 3
f l ID 3 fl

a. +
-CT 30

CT ID n Ol'

Dr
CT 30 -I-

^I
+ >
-CT ID n 01

a
3^
CT tD n OJ

5t
13 13 ID 3 X' 3.

T3 ID n Ol' 01 ^

J>

g OJ + 3 Z x3 a > e-l + ID 3
OJ 3 CL fl

ff 3
>

01

Ol

3
l~l ID 3

-i- 3

e-l
fD 3 O OJ -T 01 CT +

? >

NJ

f > ? = a
Ol fD o NJ

fl
IS
Ul ID

t 1
l-x

fl

CT

DJ

ff 3

i> % I :
QJ

ep j r

3
> f l fD 3 fl

i ^

I ID TO OJ 3

a 3

a 3
.2 era
13
QJ_ ^

30

a 3

fD ra

a %
3.

I ID TO 01 13 3

a 3

fD TO 01

u
fl ID TO 01 n

S n
O 3 o i ID
ID TO
3

i|

l!
01 3

il
3

en +

i fD TO

a 3

fD TO QJ

<

9; ?
fD TO OJ

if

TO tu
8 3

%I
do'
rt

<

ro do'
rt

3. a 3 <3 ^
TO 01

ID TO 01

<

fD 3 TO OJ fD

<

<

tD TO Ol

<

ID TO 01

13 3. rt,

3 < fD TO 01

TO OJ

a
3 OJ

a
3 01 OJ

a
3

5'
3

a
3

a
3

a
3

a
3

a
3

a
3 01

tu

3
3

3
3

OJ 3-

01

<

ID TO rt

<

<

5" <
ID TO rt

ID TO rt

ID TO rt

<
ID

ID TO rt

<

<

ID TO rt

fD TO OJ

<

<

fD TO rt

<

ID TO rt

<

ID TO rt

TO rt

a 3 + ^ ro
Ul

a' 3 + ^ ro
Ul

a
3

3
ro
Ul

a 3 + ^ ro on

8 3 + ^ ro on > ro + ro

6 3 + ^ ro on

8 3 + H > ro
Ul

a 3 + H > ro
Ul

a' 3 + ^ ro
Ul

5' 3 +

^ ro
Ul

> ro + ro

5
ro + ro

5
OT

9
ro + ro *+ >
T3 TJ fD 3

+ ro

s
ro + ro "+ >
13 13 fD 3 3.

3
ro + ro "+ >
13 13 fD 3 3.

5 ?
ro + ro ro + ro "+ >
TJ "CT fD 3 3.

9
ro + ro

s
ro + ro '+ >
CT 13 fD 3 CL

5
ro + ro *+ >
13 CT ID 3 3.

> ro + .> H > ro + > ~+ >


13 13 fD 3 3.

> ro + >

s
?
CT 13 ID 3 3.

5
ro + > *+ >
CT 13 tD 3 C3.

ro + > ro + > + >

> ro + > ^ ro + > + >


CT CT fD 3 3.

5
ro +

5' 3 + ^ ro or

I
ro + > + >
CT 13 fD 3

a.

a. x'

3
Nl Nl O
CT ID

o
O
01 3 13

>

> 3
tD

io
Ul

Ln fD
Nl

g
^ in iti ^ cn iti ^ cn
cn cn cn cn cn
vj
ID

<
ID

cn

cn

cn i $ G aU l JT

?( 5
rt TO 01 3

? ff'
>
~ tn

cn >

Z
3 fD
3.

TO
DJ 3
N '

TO QJ fD

TO 01 3

TO OJ 3

il
1

a
TO

M
+ m DJ 3

a
8 3

2.

if
+
3

S' 3.

5' %
a
3

+ a ro 3

a. S 3.

a. TO c' QJ % 5
rt

%
a
ID OJ 3 in CT

+
3D ID .3

QJ

A i
T3 fD

a
3

a
3 fD
oj'

ff s

o "3 ;1 2.
a
3

a'
3

i, s
+
fD

I!
01

3 S
OJ

OJ

a
T3 3.

3
1-1 ID

=1;
f-l ID 3

H 11 11 s ^
n

A ff m

3.

E
n
01

E. " S
OJ

0/

+ ff
f l fD 3 fl

OJ

fD

l>
+

n 3 ^ > + n
ro
-f

ff 3
f l ID 3 fl 8

X ff

ff ff

s ^
-l ffD >

3
f l ID 3

- 3
in 3 fl 8 f l tD 3 fT 8 f fD TO tu 3

ff 3
n
fD 3

ID

i ID TO 01 3

a 3

C JZ C T a.

a 3 n TO
3

m a 3

a
+ TO UT 01
X

n ro a
^ > Z

fD 3

2 + 3
01 TO

Iff
3
ID

leS C D as
C
CT

> r C D ro
^

3
QJ_

3D a iTi 3
X f-

n
8

3
I fD TO OJ 3

n a 3
TJ 3.

ID TO OJ

^
3.

< fD

<
ID

^ f
ID

^ I
-r"

O
Ul TJ

S
3 <

b ~v

S; %
TO 01

9; $
do'
OJ

a
3

a
3 OJ QJ OJ

tD

'I
do'
QJ

$i b ^
a.

Pc f S
01 3 fD

<
rt

<
ID TO QJ 8 3

fD

<

fD

<

<

do'
5'
3

TO OJ

a
3

a
3 01 01 DJ CT

a
3 tu OJ

OJ

a
3

a'

01

OJ CT 3" fD

tu

3 3
3 fD

as
3

<

fD

<

ID

<

<

fD

<

fD

<

<
ID TO rt

ID

<

<
ID TO rt

5" <
fD TO rt 3

<
tD TO DJ

TO OJ

TO OJ

TO rt

TO rt

a 3 + ^ ro
Ul

a 3 + ^ ro
Ul

a
3

+ ^
Ul

ro

a' 3 + ^ ro
Ln

a' 3 + ^ ro
Ul

a'
3

+ ^
Ul

ro

a' 3 + ^ ro on ro + ro

a' 3 + ^ ro
Ul

a'
3

6'

i
ro

Ul

+ ^ ro

a' 3 + ^ ro
in

B
ro + ro ro + ro ~+ >

s
B ro +
"+ > ro + ro

ro + ro

ro + ro

B
ro + ro "+ > C T 3
tD 3 3.

B
ro + ro '+ >
13 13 ID 3 3.

^ >

ro

ro + ro *+ >
CT 13 fD 3 3.

^ >

ro + ro

5
ro + ro ro + ro *+
13 13 fD 3

>

5
ro + ro $ ro + ro '+

^ >

UT

>

> >

B ro
+ ro *+
CT CT fD 3 3.

>

13 13 fD 3 3.

13 CT fD 3 3.

x'

a. x'

CT CT ID 3 3.

>

^ > ro + ro
CT TJ ID 3 3.

ro + ro

ro + ro

>

5
ro + ro *+ >
-CT T3 fD 3 3.

?
ro + ro '+
13 13 fD 3 3.

ro + ro

V >

>

3
Nl Ul
CT ID

O
01

?
LU

>
-CT

>
13

3
CD

Ul fD NJ
ISJ 4k O
fx vj

&
fk vJ

f l vi

ISJ f l 3

ISJ

3
ID

O
f l vj

fx
vj

Ul

g-

in in in cn iti ^ cn iti ^ cn io ^ cn

in
ISJ S^.

cn

cn

cn

cn

? i
H I OJ 3

y ff
I

+ cn ISJ

t m > "2
TO QJ 3 fD 3.

1
3 fD CL

ff
TO 01 3
N'

cn iti
n
30 f l

^ cn
a~
TO OJ 3

Ul -%L

I%
+

K
8
3

P S

> S
+ < a oT \3
Ul

>S
01

CT 'S

+ T
+
NJ Ln

a
in
"D ID

9, -5,
Q.
01

il
CT 3

11
CT + a 3

i ^
tu

TO ID

13 tD n

P Dr S

a 9- ^
OJ

II
TO

a
3 in 13 fD

!n 5
a
_3^

a
3

2 3.

A
fD DJ tn CT

a
3 T3 fD

QJ'

%S
a'
3 3 ta.

TO 3 fD

01

a. 3

%3 8. I ff
a u
in
I/,
3

4%
o.
e-l 30 oj' ^

& +
n <

^
13 fD O

ID 01

n
OJ OJ

3
ID 3

CT ID n

+
01 3 3. T3 3D

53'
as

i ^
TV

+ ff OJ 3
c

5
U 1 3l 3.

S|

it

c
3
e~i ID 3

n
fD 3 fl

1-1

n fD 3.
3.

- S n
a
ID TO

il

J |
CT 3.

a 3
fD TO

I In
a
3

f l tD 3

ff 3 f l
fD 3 fl

3
+
f-l

01

II
QJ ID

OJ

^ 3

a
fD TO QJ 3

<
ID TO 01

fD

<

<
ID TO 01

TO 01

II
II
C T
CL

3
ID TO

i ID TO QJ 3

I
I< S
73

I-l fD 3

a 3

la is
3
+

"

>

3 >
n +
fl

3
n
fD 3 fl

il
il
t
Ul
-v:

a
fD TO

o "S
TJ 3. TO 01

01

ID

<

<
ID TO 01

a
3 01 01

a
3 OJ OJ

a
3

a
3 OJ OJ

8 3

II

^ TO OJ

11
a
3 OJ

fD

<

F
a
3 01 13 a.

5
< fD 3

TO QJ

a
3 OJ

a
3 QJ

TO'
OJ 8 01 33

OJ OJ

OJ 3-

01 CT 3

OJ

3
3 fD

3
3 ID

3
3 fD

fD TO rt

<

ID

<

5" <
tD TO rt

3" <
fD TO rt

ID

<

fD

<

<
ID

<

<

ID

<

<

TO rt

TO OJ 8 3

TO rt 8 3

TO rt

TO rt

5' 3 + ^
ro on

a'
3

5!
ro
Ln

a' 3 + ^ ro
Ul

a 3 + ^ ro
Ul

a
3

+ ^ ro on

>

ro
Ul

a 3 + ^ ro
Ul

5' 3 + H >
ro
Ln

Ul

+ ^ ro

a' 3 + ^ ro on ro + ro

a' 3 + ^ ro
Ul

>

?
ro + ro + >
13 CT ID 3 3.

ro + ro

3
ro + ro

>

>

ro + ro

ro + ro

^ >

>

ro + ro

5
ro + ro "+

+ >

ro + ro

?
ro + ro "+

ro + ro

5
^ >
ro + ro ro + ro

>

?
ro + ro '+

ro + ro

> ^ > >

ro + ro ro + ro "+
13 CT ID 3 3.

>

?
ro + ro

ro + ro

>

>

5
ro + ro *+

?
ro + ro *+

ro + ro

13 T3 fD 3 3.

*+ >
13 13 fD 3

>

>

x'

T3 13 fD 3 3.

a.

-CT 13 ID 3 3.

"+ >
13 CT ID 3 3.

>

13 13 fD 3 3.

"+ >
-CT 13 fD 3

>

>

a.

-CT T3 ID 3 3.

13 13 ID 3 3.

Z c

g
o > o
IDX

CT ID

o
o
01

>
TJ

>
13

3
ID

LU 4k M Lii
fk

Ul ID

Nl

ifr
vj Ul Ul
ID

Nl fx

o
f l vJ

NJ 41 O

ISJ fl O

ISJ
f l O

<
to

4k vj

i^

vj

en
^ in
TO

cn
+
rt

cn
^
QJ

cn

cn
^ ci3

cn iti ^ cn

X ff

t m
on TO

in cn iu ^ cn t ff
UJ Q TO OJ 3

in
-INJ LU

fl vj

in
^ !. rt

cn

Ul

cn

^ TO 9
OJ 3

jn

X 5
I O LU

t ff
+ J?

itj o +
rt

^
ID

cn >
5
3

i 2. as
+
f l >

era "2

1 i'
^ 2
5^

A ^

^1
O LU

g's

3.
tn 13

a ^
CT fD n tu

a
3
CT fD

7 =
D
3

SI
CT ID

tu

3^

II
9, -5,
"+
m
l-x -CT 4 : . fD 3 0. + 0J_

ID
01

s% +_ n
OJ

to CT X ro fD O nn
H 01 ~

I
9, -5,
T 0
t-x f l

n
-1CT

8 a" 3 ' eio


ni

N OJ rt

^
+ g' a I9, ^
t-x 4k O +

^ +

2.

11
QJ

+ m

^ S'
+ 3
f-l fD 3

2 21
OJ

1.

in
OJ

3 ^ n
ID 3 fl
f-l ID 3

=R

? ff 5
3
t-1

3
f l fD

* n
ID 3

>

I fD TO DJ 3

a 3

fT 8

a
tD TO 01 3

ID TO DJ 3

It
3
TJ rt 3

? era
2i
^

fD

<

<

ID

<

fD

<

fD TO 01

9; ?

ll
a
3

ll
13 3.

13 fD

tn

13 ID 0, 01_ 01

,3^ 3D fD_ fD CT fD OJ

D,

s>
fl

1 & ^ >
f l tD 3

3
fx

> +

01 3 CL NJ Ul

3 < T
> f l ID

+ + LD + S QJ < +

fD

Qj'

OJ

n
01 rt fD

^ i 5 ^

Is
3

a 3

a 3
I fD

i ID TO 01

a . TO
tu

8%

il
fD TO 01

Nl 3 O LO

-CT ID

m
3 TO

fD

<

ll
a
3 OJ

u
3 fD

<

dq'

01 TO OJ

a
3 01

a
3 OJ

a
3

8 3

a'
OJ

8 3

a
3 01 tu

a
3 QJ tu

OJ

3
3

3
3

DJ CT 3

01 CT 3

OJ

01 CT
V,

DJ

3
3

<

ID TO 01

fD TO rt

<

fD TO OJ

<

fD TO rt 8 3

<

fD TO rt

<

ID TO rt

<

fD TO rt 8 3 H

<

<

ID TO rt

<

fD TO rt

fD TO rt

<

fD TO rt

<

ro Ln

>

a 3 + ^

ro in

a' 3 + ^ ro

g
ro
on

a 3 + ^

5
ro

+ ro

s
ro + ro

?
ro + ro ^ > ro + ro ~+ >

Ul

> ro + ro

?
ro + ro

UT

ro

a' 3 + ^ ro

Ln

> ro
UT

a' 3 + H >
ro Ln

a' 3 + H > ro
Ul

a' 3 + ^ ro
Ul

a' 3 + ^ ro
Ul

s
ro + ro >
ro

> ro > ro + ro "+ >


13 13 fD 3 Q.

B
ro + ro "+ >
13 13 fD 3 C3.

5
ro + ro "+ >
13 -CT fD 3 3.

5
+ ro ~+ >
13 T3 fD 3 3.

ro

> ro + ro "+ >


13 -3 fD

?
ro + ro *+ >
13 -CT ID 3 3.

> ro + ro

> ro + ro

5
ro + ro > ro + ro "+ >

> ro + > > ro + > *+ >


TJ 13 ID 3 13.

13 -CT fD 3 3.

+ ro % >
CT -CT fD 3 3.

s
ro + ro "+ >
13 13 fD 3 3.

CT TJ fD 3 3.

K
Ul

K
Nl

CT to

o
01

o >

a
LU

> -o

3
to

% NJ
Ln
Ul Ul ID

g
fk vj

NJ f l 3

fl vj

in

cn
4k

cn + vj
H
01 CT TO 01

cn ? > cn 00 rt

cn

cn

cn +

+
01

X 5

X 5

cn

cn
X a

cn
LO 4^

CTl

cn >
fl

TO Ol

cp
Ul

g " a'
a

5 2.
CJ LU OJ rt

ll
il
3

sl
m in

if
O ISI 5% a
CT 3 fD

2 a ? 3
a
3

I 9
ID a TO DJ

Ul TJ

X ff
Ln fD tn TO

a a
fD
+ > 3 0J_

3D fD T3

n 3D n +
13

^ 2.
3 5

DJ

a
in
TJ fD n oi'

ZJ.

? I.

a
3

T3

il
f l fD 3 n 8

is

3
I-l ID 3

+ <
+

f l ID 3 n

^
f l ID 3 n

a 3

^
+ ' +

3
fD TO 01

fD

4 - "2
3

r fD TO tu 3

iB 3
^ a.

l la
1 fD TO + 1 + 3

fD 3 O

II s % SK f i 8 ff
in'

gJ

rr

> ff ? ^ ^
+ 3

Ii
ID fD

S " S.
8 >
+
f-l ID 3

% s
X 01
3
f l tD 3 fl

U
^ K
3 in

11
f l fD 3
CT Q_ -h

CT

fD

a 3
tD TO DJ

a 3

II
b ID a. era
3

: ff ff 9

<
0J_ S

E5

<
ID

<
ID

It

CT Q.

a, 3
< fD
TO OJ

3 = 3

o do'
in

i $
3 f l

5
< fD TO 01

l i<
3 fD

I fD TO 01 3

a 3

ID TO QJ 3

<
fD

<
fD

fl

01

3.

11
LO 13 TO

f
n
3.

a
3 01 OJ

a
3 01 DJ

f
ID
3

^ DJ J
3 fD

ii
ID "-V

_ 3 .

a
3

a
3 DJ QJ

a
3

8 3

a
3 Ol OJ

^ 3 *

tu
as

tu OJ

tu
DJ

01 OJ

<

9" 3J <
ID TO rt

ia'
3

<
ID TO rt

ID

<

i3 ID

<

<
ID

fD

<
rt

<
ID TO rt

fD TO rt 3 3

<

< ID
TO QJ 8 3

fD

<

TO rt

TO rt

TO rt

TO

TO OJ

5' 3 + H >
ro

a'
3

+ H > ^ >
or

ro ro + ro

+ H >
Ln

ro

a 3 + ^ ro
Ln

5' 3 + ^
ro
Ul

a 3 + ^ ro

a'
3

a
3

+ ^
Ln

ro

>

+ H >
Ul

^ >

Ln

>

ro + ro

ro + ro *+
13 13 ID 3

3
>

^ > >

ro + ro "+
CT 13 ID 3 3.

S
ro + ro
NJ 13 TJ ID 3 3.

ro + ro

>

>

ro + ro

5
ro + ro
NJ
CT 13 ID 3 3.

?
ro + ro *+
CT CT ID 3 1.

ro + ro

^ >
ro + ro ro + ro
NJ

5
ro + ro

S
Ln

ro ro

ro

^ >

5
ro + ro
NJ
-CT 13 ID 3 3.

ro + ro
NJ

>

ro + ro "H > ro + ro

?
ro + ro

Ln

+ ^ ro

a' 3 + ^ ro
in

>

ro + ro

5
ro + ro *+
13 T3 fD 3

? ro
13 T3 fD 3

+ >

"+ >

>

CT TJ fD 3 3.

"+ >

"+ >

>
-CT 13 ID 3 3.

13 T3 fD

"+ >

NJ

>

+ ro V >
a. x'

a. x'

a. x'

c 3
Nl
NJ CT to

2
o > o
UJ

8 3
O

o >

I-i O

01

13

> 3
tD

:
Ul ID

g
:^
vJ

NJ fk 3 fx

Nl f l O f l vJ

NJ f l 3

<
ID

;vl

fl ;vl

in

in

in

in
^

S +
Qj QJ

cn
ID a TO OJ as a
(iq

cn

cn

h-x

i2.

cn

t s
01 CT + TO QJ 3 01 CT + TO 01 3

u
01 a 01 3

cn

cn

cn

cn

LO

cn

i
>
01 CT + TO 01 3 01 CT + TO OJ 3 TO OJ 3 ^ J>

ff
s^
TO DJ

s -i.
01 CT +

fD

cn 4- -Jv. cn > !^ ~' a + ID 5


3

oT a"
TO OJ 3

t I
QJ 1 3 ID 3 3. T3 3D

OJ

II
I!
+ -CT 3D QJ

a
3
CT ID

a
3

ff ciq
CT Ql_ + 01 3

ii.

ff =,

8 3

gI
+ OJ

g " S '
in rt

"5. a'

a
3

a.

OJ

01

01

^ 3
ro

3 eu
f l fD 3 fT 8

3
f l ID 3 n

3
n
fD 3 fl

-CT 30 H

1!
01 QJ

+ 21

QJ

It it

ff =^

+ 3 ro

3 ^
f-l fD 3

?|
ro Zz-

3
f l ID 3 fl

I sff
a
I ID TO 3

a
i fD TO OJ + 3

I fD TO OJ 3

:g
o: ff
3. a

5 >

II
01 fD

DJ

+ 21

i ff

?|
OT ^

fl

i fD TO CU

3
+ 1 + + ID TO Ol 3

Is3
a
fD TO DJ + 3 on X

5 >

Is
I tD TO 01

3
tn + +

fD

<

<
ID TO OJ

I I
cn 3. I a
l-x

?S
cn 3. a

+< 2

I ID 3

TO OJ

cn 3.
8 3

cn 3. I a

^ '2
3

s%
ID 5

5%
n
3.
CJ NJ
't^

~v

I
rt
CD in f t
dq' OJ 3.

(I
CD Ln

T -

^ I
ID

r fD TO 01 <^

Is Q. ff
in + < +

a 3

3. a 3 3 + 3

=<
TO 01

OJ

TO'

13 TO

S
3 fD TO rt

I I
CT QJ TO CT

l-x

n
ID
QJ QJ

1= li
01 TO 3 ID TO rt

ii
TO

3.

^1
a'
3 QJ

E $

I fD TO 01

01

ID

<

a
3 01 01

sf
00 LO in ' 3

5% '

r?
^ 3 fD

;g
'

ii
ID vj
CT TO

rt

TT

ff
3 ID

<

fD

<

fD

<

<
fD TO rt

<

<

<
fD TO OJ

<

<
ID TO C U

<
fD TO 01

<
fD TO m

TO rt

TO OJ

TO 01

TO DJ 8 3

5'
3

+ ^ ro
Ln

5' 3 + ^
ro

5'
3

Ul

^ ro
Ul

a 3 + ^ ro
Ul

a' 3 + ^ ro
Ul

a'
3

+ ^ >

Ul

ro ro + ro

a 3 + ^ ro
Ul

a
3

+ ^ ro
Ul

> >

ro
Ul

> OT
Ul

a' 3 + ^ ro
Ln

s
?
'+ >
13 13 fD 3 a. x'

>

ro + ro ro + ro

ro + ro

5
ro

>

ro + ro

>

>

5
'+ >
ro + ro
-CT CT tD 3 3.

>

ro + ro

^ >

ro + ro

?
CT CT fD 3 3.

ro + ro

ro + ro ro + ro

>

+ >
13 CT ID 3 3.

*+ >
CT CT fD 3

V >

ro + ro

5
"+ >
ro + ro
13 13 fD 3 C3.

?
'+ >
ro + ro
-CT 13 ID 3 3.

ro + ro

ro + ro

^ >
OT

>

^ > >

"+ >

ro + ro "+
13 TJ ID 3 3.

?
ro + ro '+

+ ro

?
ro + ro *+

ro + ro

>

>

a.

CT 13 ID 3 C3.

CT CT fD 3 C3.

TJ T3 ID 3 C3.

s
o

CT ID

O
01

?
LU

>
TJ

3
ID

Ul Nl

id

00

Ul ID
Nl NJ 4k 3

<
to

6 t

4k vj

in

tI
%
}>

cn

cn

cn

cn

cn

t m

>

i ^
_. QJ 01 rt

M
01 CT + a 01 3

^ %
+ 3

01 CT +

TO QJ 3

M
01 CT + a 01 3

cn

cn

cn

cn

cn

cn >

t ( 5
QJ CT + TO QJ 3 01 CT + TO OJ 3

M
OJ 01 CT + a
eiq OJ 3

t m
01 CT + TO OJ 3 OJ CT + TO OJ 3

a
8 3

ff eiq

a 1! II
CL + a 3 Z o/

?I

ff eiq

ff 21

I a Is.
3

8 3^

a
3

a
3

a
01 3^

a
3 ID n o/

+
OJ 3 3.
CT 3D

CT fD n

+
OJ 3

fD n

a ? ID 3
a.

ll
in

S" ffrt

a
3

a
3

TJ

f l fD 3 8 I fD TO 01 3

9; >

tl
X >
f l f l fD 3

S
OJ

QJ'
QJ 01

a.

si

+
T3 30

n o/

- a
fl

ro 3 - ^

3 - ^

-CT 3D

ff ^ 3
ro

ff ^ 3
ro

ff 3

4 fD O 3 3. 21 ff 3 9 >
f t ID 3 n

QJ

OJ

3
f l ID 3 n

3 9 >
f l fD 3 n

+_ n a a 3

a a

Is
5: ff
3. a

Is
3
tn + ' + +

fD + fD ro TO fD 0J_

0. ff 3. a

Is
tn + I +

<
ID TO OJ

eiq
ID 3

ID + ID ro TO ID flJ_

3
I fD TO 01 3

Q. ff 3. a

II
Q. ff 3. a
in + ' +
+

Is E ff
3. a
in + I +

3 3

3
in + I +

eio
tD 3

tn + ' + +

rID TO OJ 3

3 3

<

<
01

a
3 OJ 01

*l
QJ

C D TO'
Ul f l 01 rt

a
3 QJ CT QJ CT
CTT

ii
LO
"-v

cn 3. I a CT
CT 01 TO CT

f I ^ '2
ro 3^ 5" <
fD TO rt 8 3

I ID TO 3 OJ ID

3 3
OJ

<

rID TO 3

| fD TO OJ

I fD TO 01

I fD TO

i fD TO 01 + 3

E3

cn 3. a
l-x

S "2
3

f
f l

I s
Vv rt

I I
cn 3. I a E CT

3 OJ

ID

<

z
O

rt

5% '
f-|

S '2

EI
^ % cn 3. I a
l-x

rt

S % cn 3. I a
l-x

N 3?

SI
3 tD

N1

3?
5" <
ID TO rt 8 3

g3 ^
T3 3 01 3

fD

<

5" <
fD TO rt

fD

<

S < I
3 fD TO rt

CT 01 TO CT

3#
CT QJ TO CT

^ #
DJ 3

<
rt

<
fD TO rt

<
fD TO U

5" <
ID

<
ID TO OJ

TO QJ

TO

TO QJ

> $

Ul

ro ro

a' 3 + ^ ro
Ln

a 3 + ^ ro
Ul

a 3 + ^ ro
Ul

+ ^ ro on

"H > ro

f-l

f-t

CT 13 fD 3 3.

> + n "+ >


ro

^ >

+ f t '+ >
TJ -CT fD 3

ro

ro + n ^ > ro +

>

^ >

ro + ro ro + ro

>

a' 3 + ^ ro on

3
ro on

a 3 + ^ ro
Ul

a 3 + ^ ro
Ul

a
3

+ ^
Ln

ro

a 3 + ^ ro

ro + ro

>

>

>

*+ >
TJ CT ID 3

f t

$ ro +
ro *+
TJ CT fD 3

^ > ro +
~+ >
TJ 13 ID 3

ro + ro

ro + ro

ro + ro

>

?
ro + ro *+
CT CT ID 3 3.

5
ro + ro
TJ 13 ID 3 3.

ro + ro

>

>

ro + ro

?
ro + ro ro + ro
T3 CT ID 3 3.

OT

~+ >
13 T3 tD 3

ro

5
13 "CT ID 3 CL

5
13 T3 fD 3

>

>

>

+ >

*+ >

ro + ro

*+ >

ro + ro

*+ >

a.

a.

a.

a.

a.

a.

3
CT

N
Ol

ID

o
o ^
01

3
ID

LU

in
Nl

Ln
3

Ul ID
NJ NJ

<
ID

6
in

fl vj

in

T
K
Ln on
8

cn iti ^

cn

X ff
Ln tn ID fl

h
0 9
DJ TO

cn
fD

cn

X I' n J C

cn

cn

y ff'
X. tn

11
9
+ Ul

cn
00 rt

cn
+. $

Kx

cn
CT 3 TO 01 3

cn >
n

era
3

TO OJ 3

30

TO

n
f-l

w
Nl'

^
I

01

_m
+

O g'
c
01 a CT fD fl OJ +

fp_ a
CT
fo'

a ^
CT fD

^.

Ql'

ro 13

ff
3 3. c r > n
ID 3 fl

+ 3 ^ OJ < f l + fD
3 ID
3

t-x 3

-101 QJ

II It
+
cn 01

2.
OJ

ISI
LU

IISJ
41 +

in 13 fD

fl
n OJ

?l

K 3S i'

-n TO

01 3

1
-H DJ

+ era m % a. a
+ 3

?l
ID

^ s'
TJ rt

0.

1 B'
^
m

5
OJ

il
-h

S S

il
rl
NJ
ISJ

a
3 13 fD

01

3
f l fD 3 fl

ff 5
CT

OJ

3 3
^ n a 3
ID 3 fl

7 ^ 2 >

3 ff b ^ 3. c r
^
t-1 ID 3

ff 3
n
ID 3 fT

II
^ ^ n
ID 3 fl I fD TO OJ 3

H
CT

QJ

in T3 ID

it
Z
CT 3.

01 DJ

1 S'
^
m

F ff 3
f l fD 3 fl

0/

3
TO fD
-CT

%
01

b a
C3.

I fD TO 3 OJ

a 3

I fD TO 01 3

I ID TO OJ

a 3

it
iB
13
rt. rt

<

fD TO OJ

fD TO 01

<

fD TO 01

<

I ID TO OJ 3

$e % + S L o \
3
fD

I ID TO OJ 3

a 3

ffD TO tu 3

a 3

a 3

?^
S 5

7 ^

f t fD 3 fl

31

I ID TO 01 3

a 3

I ID TO QJ

a 3

<

tD TO OJ

<

fD TO OJ

fD

<

<

ID

il
> TO

ID O 8 3 TO

<

dq'
rt

a
3 QJ

a
3

a
3

a
3

a'
3

a
3 OJ

a
3 QJ

a
3 OJ

aI -b 5
3 3. 3. - t , TO OJ DJ 3

SI
O 3

01 01

as
3

01 CT 3

as
3

ff
3 fD TO OJ

ff
3

TO S
CT 3

fD TO rt

<

<

5" <
ID TO OJ

fD TO rt

<
ID TO rt

ID TO rt

<

<

ID TO rt

<

<

<

ID TO rt

ID TO rt

<

ID TO rt

<

fD TO rt 8 3

a' 3 + H > ro
Ul

5' 3 + ^ ro
Ul

e' 3 + ^ ro
Ul

a 3 + H > ro
Ln

5' 3 + ^ ro
Ln

a' 3 + ^ ro
Ln

8
3

+ H > ro
Ul

a' 3 +
H

> ro
in

a 3 + ^ ro
Ul

> ro +
f-l

> ro +
f t

5
ro +
f t

?
ro +
f t

ft

> ro +

?
ro +
f-t

$ ro +
f-l

> ro +
ft

\ ^ ro + n

a' 3 + H > ro on

+ > ro
H

5
ro + n ^ > ro + f l "+ >

Ul

> ro > ro + ro
NJ

^ > ro + P + >
13 TJ fD 3

^ > ro + f l '+ >


CT TJ fD 3

5
r> +
13 T3 fD 3 3.

ro +

5
ro + ft + >
13 13 fD 3

3
ro + f l ~+ >
13 13 fD 3

5
+ f l ~+ >
13 CT ID 3 OT

5
ro + f t '+ >
T3 CT ID 3 3.

s
ro + n '+ >
CT TJ ID 3

s
ro + *+ >
f t TJ CT fD 3 3.

>

a.

a.

a. x'

a. x'

CT CT fD 3 3.

"+ >
TJ 13 fD 3 3.

a. x'

a.

3
Nl IO vj CT ID

o
01 O TJ

>

>
u

>
TJ

3
ID

Ul
Ul LU 4k O in ID

<

g t
in +
NJ ID

tD

cn

4NJ

~v i2.

cn

cn iti
Ln JT
- i . in Ul

? ff
tn TO 01 3

? ff
in a

^ cn +
^

cn

ISJ vj

iti ^ cn
LU rt

cn io
rt

% +

"CT

:l
? a 3
O

?%

'^'g
hi.

OT Ul TO
3D

+^ +

X
H
t^

X ff on in
ff

^ cn io
\

^ cn io

^ cn

cn >

X 5
o %

a
8 3

dq
^

ff %

ff

s
> I

A ^
m ID n

^ E
Cl 5
X 01

11
ff 3 + 3

II
l/l

IS
?
TJ ID L n CT L n fD

gs
+
CT

%
+ 7;

^
in 13 OJ

il
t
+ Ln H O

+
ISJ ISJ

d.
Nl OJ

3.

il
I i
UT H O fD fl oj'

a
3 ID fl Ql' 01

Ln 3D

i
QJ

O g
c ^

$
T3 3.

Q
OJ

m
O f l

tn OJ

3 ^ b >

i l3
Ul
13

o
73

-CT

+ +

^ ff
fID TO 01 3

n a 3

S ff ?= n
a
TO 01

a. O jn

^ E
n
a
fD 3 fl

II
Ul ft
fD TO QJ 3 tD

3
f l ID 3 n 8 I ID TO

2 3
-b
3.

OJ

DJ

-I01 +

3
rs
fD 3 fl 8

l-x

+ 3 S
OJ

g ^
? ^

Nl LU t-x Ul

3
f t tD 3 n

7S S ^
il
TO

f t ID 3 fT

-< + o

ff

y
^ >

>
f l fD 3 fl 8

i ID TO 01 3

a
ID TO 13 C3. rt,

ID

3
r ID TO 01 3 <

11
fD TO 01 3

f
fD TO 3 ID 13 a. 3

a
fD TO OJ 3

^"5
3 fD

<
fD TO 01 TO 01

<
ID TO OJ

<

tD

<

<
fD TO QJ

<
ID TO 01

<
ID

ro
TO OJ

fD

<

<

dq'
rt

TO OJ

TO tu

a
3 OJ OJ

a
3 OJ

a
3 OJ OJ

a
3 OJ OJ

a
3

5'
3 01 OJ 01 CT 3

a
3 OJ OJ

a
3 QJ

a
3 DJ 01

ff
3 ID

OJ CT

ff
3 fD

<
ID TO rt

fD

<

<

fD

<

fD

<

5" <
ID TO rt

fD

<

ID

<

<
ID TO rt

<

fD

<

TO

a' 3 + ^ ro
Ul

Si a
3

TO m

TO QJ

TO QJ

TO rt

TO rt 8 3

a'
3

+ ^ ro
Ln

+ ^
ro
Ln

a' 3 + ^ ro

a
3

a'
3

a'
3

>

ro

on

5! ro
Ln

+ H >
ro
Ul

a' 3 + ^ ro
in

a'
3

a
3

s
ro

Ul

+ ^ ro
Ul

s
ro
Ln H

>
f l

ro +
"H

>

ro +

> ro + n + >
13 13 ID 3 3.

^ > ro + P +

f-l

> ro +
f l

5
ro + n

5
ro
f-i H

^ > OT +
f t

s
+ f t "+ >
ro
TJ T3 ID 3 3.

>

-CT T3 ID 3

13 TJ fD 3

> ro + f t "+ >


a.

ro +
T3 CT fD 3 3.

>

> ro +
f t

5 + ?
ro
c-l

>

>
f t

ro +
1-1

ro +

" + >

f t

+ >
13 -CT tD 3

+ ~+ >
f l
CT TJ ID 3 3.

ro

> ro + f t "+ >


13 CT fD 3 3.

?
ro + n *+ >
T3 13 fD 3 3.

5 + 5
ro
e-l

ro +
f l

>

"H

+ f t '+ >

ro

>
f t

ro +
CT CT fD 3

a.

a.

13 CT fD 3 Q.

"+ >
a.

x'

3
LU O OO

CT to

o
01

?
Ul

C T

>

3
ID

on cn

s
Nl

Ul ID
NJ f l O fx vj

<
to

^ en

in

cn

+ sr

m H

X ff
f l

CTI !.
in

cn
fD

cn

00

cn

cn

cn

cn

X ff'

NJ

sI ll
c-l

ZL Ql a 3 CT iq3

JT TO

1 1^
on + c

^3^
S

i
TO OJ 3 13

cro
01

ff 9
+_
a
CT

cn iu o ^ ID $ on a" Ul
^.

^ cn

cn

Ul

cn >
3

X ff
73 TO

5'

$ 2 .

>
+ X c

2.

f-t

Ol

3.
a

T3 13

3 S

N 2i

>

01

Ul

3D fD TJ

ff 3
I-) fD 3

it
1 OJ

ss

I I kl
^ ? > ^ "g.
n
ID 3 cu ft

if
OJ ro 21

a
3

}!
u
Z D.

TO 01

% eio +
f l 3 01

a
TO

5
OJ

n +
f-l CT

01 3
N' QJ

f l SJ a.
n

-1Ul

3.

A
13 fD

?3
^ + o
LO f l ID 3 fl

01

a
CT 3.

>
f l ID 3

3 '1 >
ID 13

tu

tu

3
f l fD 3

II
LU 3 !

il
X

5'

E. '>
rt, -S fD n
Ql'

CT tD in ID

ro c a.
ID 3

b
3.

n fD
3

fl

a 3
I fD TO 3

b
3.

I ID TO

a 3

i ID TO

% .3

-b a. e r a
3

o 3 JD"

II
li i.S
rt,

It
^ a.

fl
+
13 3.

> OJ iTi 3 3D g CT
U l 3.
f t ID 3 fl

OJ

3
f l ID 3 fT

n
ID 3

ii
3

as

3
rt

<
fD TO 01 8 3

fD

<

<
ID

<
ID TO 01

1 fD TO 3

ID TO DJ 3

I fD TO 01 3

a 3

ftD TO

a 3

a 3
ID TO OJ 3

<
ID

<
ID TO 01

fD

<

tD

<

ID

<

ID

<

TO 01

TO DJ 8 3

TO OJ

TO OJ

a
3

a
3 QJ 01

01 8 3

a
3 01

a
3 OJ

a
3 Ol

a
3 QJ QJ

a
3

01

ff
3 fD

tu
OJ

ff
3

ff
3 fD

OJ CT 3

01

ff
3

OJ 3-

OJ

<

fD

<

<
ID TO rt

<

fD

<

tD

<

<
ID

5" <
fD TO rt

<
fD TO rt

< m
do'
rt

ID

<

TO rt

TO rt

TO OJ

TO QJ

TO rt

5' 3 + ^ ro
Ul

a' 3 + ^ ro

Ln

a' 3 + ^ ro
Ul

a' 3 + ^ ro
Ul

a' 3 + ^ ro
Ul

a
3

8 3

+ ^
ro
OT

5i ro
Ln

a' 3 + ^ ro

a 3 + ^

Ln

>

ro +
ft

> ^ >

ro +
f-l

>

ro +
fl H

> ^ >

ro + n
ro

ro ft

>
+

3
ro f t > ro

^ >

13 13 ID 3 3.

$ ro + P + >

ro +
fl

>

ro + '+ >
TJ T3 fD 3

?
ro

f-l "H

ro +

> ro + n

?
+ n ^
ro

ro on

a 3 + ^ ro
Ul

a'
3

+ ^ ro or

ro ft

>
+

ro
1-1

>

*+ >
CT CT fD 3 3.

fl

+ ft '+ >

*+ >
13 13 fD 3 3.

f t

a. x'

CT 13 fD 3 3.

'+ >

fl

ro + "+ >
TJ 13 fD 3 C3.

3
ro +
ft

ft

13 13 tD 3 3.

'+ >

+ n ~+ >
CT 13 ID 3

QJ CT

5
+ n ~+ >
CT CT ID 3 3.

5
ro +
f l

ro

"+ >
CT 13 tD 3 3.

13 13 tD 3 3.

a. x'

c
Ul M IO

z 3
CT ID

o
01

o >

3
to

s
l-x LU Ul 00

in
ID

Nl

6
i^
sJ

NJ 4k 3

3
ID

:^
vj

in

cn

cn

5 ? ff
X. m

?I y I
e % <2

cn

i
NJ ISJ

3 9

ll
N 01

3.

H C T a.

% 5 3
CT fD

II
o
+ ~

SI ^1 2 %
n f t 01 3

I ^ 5# 1 I I ^
9 - n TO
+

cn

Cl

cn

cn

cn

cn > + ff'
f t jn

9
3 TO

01

fx

2.

+ a
3
-CT ID

i |
TT ID

il
3 O LO -I-ILn

l-x +

N 01

A ff
a rt

UJ E
TJ C3. tu

Dj'

si
ff 3
f t ID 3

QJ

3
1-1 fD 3

3
f l fD 3 ft

-< E + 6 ff CT + 3 Nl
f l fD 3

It
n

f I ?i ff ^
cn tn
01 3
CT fD

!l
01 13.

I 1'
a. %
OJ TO fD

it
T =.
NJ Nl

ft
i> ff'
3. in T T CT ID fD

ID

a
8
3

fl
3 QJ QJ 3

+ < +
m
3

N OJ
-CT

3.

7 5' ^

g. +
Ln
13

3 n C T
fD

i
00 ISJ l-x LU 3D 01

m S
y^ SL
OJ

11
+ P +
m >
f t fD 3

fl
TO 3 !

'5' D. CT as 21
in 3

d
ID 3 13

ll
n
fD 3 fl 8 i ID TO QJ 3

II
f l fD 8 i fD TO tu 3

tn

CL sr

+ <

n
fD 3 fl

a.

f t fD 3 fl 8 f fD TO OJ 3

fl

i fD TO QJ 3

a 3

a 3
fD TO

fID TO

a 3

% a + rsi 3 r fD g TO
QJ 01

on n

+ - ^ 21 a b 3 3 01 <
fD

I ff

fl -n m

3
I fD TO 01

3
i ID TO OJ 3

tD

<

<
ID TO OJ

^
13

7
rt

11
a
3 OJ 01 3

<
ID

fD

<

<
ID TO OJ

<
ID TO 01

<
ID TO OJ

s3 2^
t-1

01

TO QJ

9: era'
3

b TO v^
01 ID a 3 QJ

a
3

a
3 01 OJ

Si 5'

8 3

a
3 01 OJ OJ DJ

a
3 tu

a
3 01

a
3 QJ QJ 3

^ I
ff
3 fD

ff
3

ff
3 ID

fD

<

<
fD TO rt

<
ID

<
fD

ID

<

<
ID TO QJ

<
fD TO OJ

<
ID TO 01

<

ID

<

< Si
a
3

TO rt

TO

5'
3

Si
a
3

Ul

+ ^ ro

a 3 + ^ ro
in

a
3

a'
3

-i

>
ro
Ul

ro
Ul

+ H >

+ ^

ro on

>

OT OT

a 3 + ^ ro
Ul

5
ro

+ o

ro +
CD

$ ro +
CD

"H

> ro + o
ro +

$ ro + o

5
ro

5
T3 CT fD 3 3.

5
13 13 fD 3

5
+ p '+ >
ro
-CT CT ID 3 3.

5
T3 CT ID 3 3.

3
+ P "+ >
CT CT ID 3

+ o >

+ p ~+ >

ro

p "+ >
a.

ro +

OT

p "+ >

-CT CT ID 3

p "+ >
a.

ro +

> ro + o - ^ ro + p '+ >


-CT CT ID 3 3.


+ ^ ro
a' 3 + ^ ro
on
UT

TO 01

TO DJ

TO

8
3

+ >
H

ro
on

+ >
H

ro
Ul

^ ro + o

> ro + o

5
p ~+ >
a. ro + o > ro +

>

ro + o ro +

5 ro
p *+ > TJ
T3 ID 3

5
13 CT ID 3

>

+ o '+ >

ro

p ~+ >
-CT CT ID 3 3.

T3 13 ID 3

a.

a.

a.

3
Ul LU
CT ID

o
o
t-x

01

>
13

>
CT

3
ID

UJ

%
id ^
Ul ID
NJ

i^
vj

NJ fx

ISJ

3 fx
vj

4k O fl vj

ISJ fl O 4k
vJ

<
ID

+
ISJ

cn
or
fD

cn

vi

!.

cn

4k

t l
TO 01

in '+ cn

en
!.

in ^ cn

Ul
00 ^

~ cn

n <

jn^

X ff'
00 in

cn iu
Tl

X ff
tn

cn iti

^ cn iti
LU TT 01

^ cn
rt
't> a

t ff

9
z era

X 5
-1 jjT

cn > a ^ a'

5
in
TT QJ CT

TO OJ 3

TO

T QJ 2.
ISJ ISJ

+ ',

ISI

on

3. a

ff
a
3

P ^ 73 hj'
-n + OJ rt

+ JO
30 TT

LU

^ TO
01 3 rt

II
+
2i

g a

fl
fD OJ

9
Z NJ ISJ TO N OJ

a
3 TJ ID O tu DJ

3?

f t Dr
13 ID

8 i
CT ID n TJ 01'

f-t
-O T CT

a'
3 fD
Ol'

+ ^

I' a
OJ 3

? 2. S ^ ~ ID
rt

T 2.
+
3.

a
3

I|
n

^ 2
CJI fD

6^
9:

Si ^
K m

13 fD

QJ'

~ 2L

ll
Ul

g# 3
3
fD OJ Ol

QJ

o 3
>
t^

X ^
f l fD 3 fT

13

a.

ff 3
t-i tD 3

% 5
01

in
01

3
f l ID 3 fl

3
f-t fD 3

3
f-l fD 3

11
f .>
f-l fD 3

? E

-CT a.

'

ft fD 3
fl

^ s >
n
fD 3

in

^
13

a.

ff 3
ft
fD 3 fl

it
Kl SL

f-t fD 3

1.1
f l fD 3

fl

fl

a
fD TO OJ 3

1 fD TO OJ 3

a 3
tD TO OJ 3

i fD TO 01

ID TO
01 3

I fD TO OJ 3

a 3

a
ID TO

n a

a
fD TO OJ 3

fD TO
OJ 3

r-

I fD TO 01 3

ffD TO 01 3

<
fD

fD

<

<
ID TO OJ

< ID
TO 01

<
fD TO
01

<
ID TO 01

<
ID TO 01

<
ID TO 01

fD

<

fD

<

<
ID TO 01

a
3 OJ tu

a
3

a
3 Ol

a
3

a
3

a
3

a
3

a
3 OJ

a
3 01 01

a
3 OJ

8 3

OJ CT 3" fD

01

fD

<

<

ID

<

^ 3" <
fD

OJ

ff
3 fD

ff
3

<

fD

<

<
ID TO DJ

ID

<

<
fD TO 01

<
fD

<
ID TO QJ

TO QJ

TO

Si
a' 3 +

TO OJ

TO DJ

TO OJ

TO

8
3

5'
3

a
3

+ ^

ro
Ln

^ ro
Ln

UT

+ ^ ro

i
ro on

a' 3 + ^ ro
in

a'
3

Si
a' 3 + ^ ro
Ul

a'
3

a
3

a'

+ ^
ro
or

+ ^
Ul

ro

+ ^
or

ro

> ro + o

> ro + o

>

ro +
CD

3 ro
p
+

>
TJ T3 fD 3

a.

.
+ p ~+
-CT 13 ID 3

5 ro
>
a.

3 + ? ro
ro
D

$ ro + o ^ >

5
ro

^ >

Ln

+ ^ ro

i
ro
Ul

+ p *+

ro + o "+ >
13 13 fD 3 3.

> ro + p '+
CT CT fD 3 3.

? ro
+ *+

ro + o

> ro + o ^ >
ro + "+

>

ro +
CD

5
ro + o

>

ro + o

>

CT -CT fD 3

>

CT 13 ID 3

>

B ro
p
13 CT ID 3 3.

DL

a. x'

-CT 13 fD 3

>

>

+ +

5 ro
+ '+

s
ro + "+

a.

CT CT fD 3 3.

>

-CT 13 ID 3

>

ea.

T "CT fD 3J

"+ p ro a. ^ > +

3
LU LU fx CT ID

o
01 3

>

3
ID

LU

Ul IO 4k ID
LU H>

Ln to

isl

3
ID

'>
vJ

in +
lO

cn
X , fD

cn cn JC 3 9
OJ 2.

cn

>
8

TO ID

-< + a 7 o
f l +

Ul '2
3
OJ 8 3

TO

i l ^S
^
3 fl 8

+ a
8 3
-CT fD fl

_ i>^

ll
-iLi TJ

a
13

11

3 SL

3D fD TJ

II
+ d

a 3 +

01

i|
01

3
f l fD 3 o

Zr >

% ff
3
ID TO 01 3

en +

-I-

3
f l tD 3 fl

t ff

^
-< + o
01

3
ID TO 01 3

Ie S I & t 3 ^ I
3.

n
rt QJ TO OJ

_LD fD CT TO 3. 01

tD

<

fD

<

fD

<

TO 01

a
3 OJ OJ

a
3 OJ

ff
a
3 3

ff
3 fD

<
to
TO OJ

< ID
a 3 + ^ ro
Ln

< ID
8 3

<

TO 01

a' 3 + ^ ro

a'
3

UT

Ul

+ ^ ro

OT Ln

+ ^

>
+ o

ro

ro +

5
P > T3
T3 fD 3

5 ro
+ p '+
CT 3 fD 3 3.

5
ro

o ^ > OT +

ro +

ro +

> >
>

CD

CD CT
13 fD 3

>

+ >

ro + *+

a.

13 13 fD 3 3.

a.

1 o 1 d
1 1

h- O h-

C3_ C U

Q. CU

C3_ CL C U C U

Q. C U

o O

1-

m O O Cn N

s
CQ 3 C D

s s s s
CQ CQ CQ CQ 3 3 3 3 CD C D C D C D

o o O oo o O 1 o o vJ o . H I-- M o i O H O o i O o O o 1 O B^ O o 1 H ID t - o 1 O Tl O o O >' O o 1 O W Tj o t - W Tj tn 1 1 o T l TJ to o Bx TJ cs

C D CT CT C D

C D

cr cr !=r err CT CT
C D CD CD

C O

C O

in n n n n n 13. a_
C D CD

in h n n n n
'CL !3_
CD CD

1 T l B^ T l 1 00 h- TJ 1 Tl
1 hct

t> (n

TJ TJ

1 T l W TJ 1 T j Bx. T j 1 Tl Tl 1 Tl 1 H

o o o o o o

!zr o
CL

<

<

CT O Q.

<

O CT O CL

'<

O 3" O CL

cu
3CL)

cr 5 zr o cu
C O 3 CD

3 C D

<

CL

Tj IS)

ro TJ o o w TJ Tj
o

CU C U 3 3 TT TT

CD 3 TT
NO NO K J CD CD CD

1 N) Bx Tj 1 O o Tj

' O
1 1 1

Tj O Cn Tj

ro o o o o

to

o o

NJ CD CD

C3

O 03 u O T O en Tj or

OJ

cn
CO

C3 CO CD CO

to

CD CD CO CJJ CD 00

CD CD CO CD

1 T I 1- T l 1 O o Tj

1 TJ o Tj 1 TJ 1- TJ f . 1 TJ 1 TJ 1 TJ 1 Tj 1 W i 00

o o o o o

cn cn cn
C3

CD

CD

icD
CO CD

9?
CD

o o o

Tj Tj

cn
e/)

CO CD CT

CD CD CD CD i x NO f ^ CO
C3_

LJl UT

kj

CO

<

Tj v]

oo o
,m tn w

o o o o o x^: C ' < ! H H,j : w ^; ID


V

TJ TJ TJ

o
3 C O

CD 00

<

C O 3

o
=r o c/)
3 CQ

3 US

^ g
3

-vx M Cl C>
A

2 o - o
G O

5' 3 o o a_ tn
C D Z

CQ O O CL C O

3-

cu
00 3"

O
X

- M,

K
C O T3 O M tf>
C/J

n
C O

'

ft

ej!
V

n g-

' 13

g
w
ID

C D CU CL
3t/l'

3 CQ -O

-o

9 li

rr
X

CD
C3_ C

C U 3' CQ

3-

3
TJ
fj)

3
C O C D

!=t

>

s
CD"

UNITED STATES OF AMERICA STIPULATION OF EXPECTED TESTIMONY Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211 Mr. Jeffrey Motes ilfi June 2013

It is hereby agreeij by the Accused, Defense Counsel, aneJ Trial Counsel, that ifMr. Jeffrey Motes were present to testify during the merits phase of this court-martial, he would testify substantially as follows: 1. I am a senior counter-terrorism analyst in the strategic fusion cell of the J-2 section at Joint Task Force - Guantanamo Bay (JTF-GTMO), a subcomponent of the United States Southern Command (USSOUTHCOM). In this position, my responsibilities include training, and reviewing the work product of, senior and junior intelligence analysts and producing material responsive to Requests for Information (RFI), such as threat assessments on current detainees. I have worked at JTF-GTMO since 2003. Prior to joining JTF-GTMO, I served on active duty in the United States Navy as a Cryptologic Technician Interpretive and Arabic linguist. I have been in the intelligence field for more than twenty-five years, and I have been an intelligence analyst for more than ten years. 2. Around January 2004, JTF-GTMO established the Detainee Assessment Branch in response to a request from the Office for the Administrative Review of the Detention of Enemy Combatants (OARDEC) for information to determine the enemy combatant status of particular detainees. The Detainee Assessment Branch was a J-2 element tasked with providing threat intelligence analysis on the detainees at JTF-GTMO. The threat intelligence analysis included the detainee's threat to the United States and any potential intelligence value of the detainee. 3. OARDEC established two types of reviews for detainees at JTF-GTMO: (1) a Combatant Status Review Tribunal (CSRT) which conducted an initial review of the status of detainees to determine, among other things, whether the detainee was an enemy combatant: and (2) an Annual Review Board (ARB) which conducted annual reviews of the status of select detainees to determine, among other things, whether the detainee should remain at JTF-GTMO. The Detainee Assessment Branch provided initial assessments of detainees in support of the CSRT and updated assessments of detainees in support of the ARB. 4. In March 2004,1 began working in the Detainee Assessment Branch as a producing intelligence analyst. In 2005,1 became the team leader of the Detainee Assessment Branch. The Detainee Assessment Branch consisted of up to twenty senior and junior intelligence analysts, both military and civilian. My responsibilities as team leader included training the team responsible for preparing assessments on detainees, preparing assessments on detainees, and coordinating between the intelligence analysts assigned to the Detainee Assessment Branch and the United States Govemment. I worked in the Detainee Assessment Branch as the team leader until 2012, with the exception of one year from 2009-2010 when I worked at USSOUTHCOM as

B^:ms^^

aSubject Matter Expert (SME) on Sunni extremism ^ r South America. Before joining the Detainee Assessment Branch,Iwasasenior intelligence analyst onatiger team responsible for preparing detainee assessments and debriefing detainees upon arrival at JTF-GTMO. 5. The detainee assessments werearecommendation to USSOUTHCOM for the disposition of detainees,which included the detainee'sthreat level and intelligence value to the United States and its allies. lam very familiar with the detainee assessments prepared by JTF-GTMO. lam familiar with the format, letterhead, and structure ofthe detainee assessments. ^. lam very familiar with how detainee assessments were produced becauselcreated, and trained others how to create, detainee assessments. lam also very familiar with the process necessary to create the detainee assessments becauseleither was responsible lor many steps of this process orltracked the status of this process. lhave been responsible for the first four steps ofthe below process during my tenure at JTF-GTMO. ^. The process to createadetainee assessment was as f:^llows: a. First,asenior or junior intelligence analyst reviewed any previously written intelligence memoranda and any additional intelligence relating to the detainee that was stored in the Joint Detainee Information ManagementSystem(JDIMS),the classified database at JTFGTMO that stored intelligence relating to detainees. JDIMS was available on SIPRNET: however,auser could not access JDIMS without being grantedaseparate account. Further, even withaJDIMS account, the user did not have full access to all ofthe intelligence stored in JDIMS. The senior orjunior intelligence analyst also conducted additional research in multiple intelligence databases located on classified networks, outside ofJDIMS, on the particular detainee. b. Second, the senior orjunior intelligence analyst drafied the detainee assessment, which included the analysis as to the detainee'sthreat level and intelligence value to the United States and its allies. c. Third, the drafi detainee assessment was submitted to another senior orjunior intelligence analyst for peer review. The intelligence analyst reviewed the drafi detainee assessment, conducted individual research and analysis on the detainee, and provided edits and^or comments. d. Fourth, the drafi detainee assessment was submitted toasenior intelligence analyst for duality Assurance duality Control(^A^C) who conducted further research and analysis on the detainee to collect any additional intelligence and to verify the logic ofthe analysis on the detainee. The senior intelligence analyst provided edits and^or comments. e. Fifih, the drafi detainee assessment was submitted to the Officer-in-Charge(OIC)of the Detainee Assessment Branch who conducted further research and analysis on the detainee to collect any additional intelligence from the classified network and to verify the logic ofthe analysis on the detainee. The OIC provided edits and^or comments.

f Sixth, the drafi detainee assessment was submitted to the Officeofthe Staff Judge Advocate(OSJA) for legal review. The OSJAreviewed the drafi detainee assessment and provided any edits and^or comments. g. Seventh, the drafi detainee assessment was submitted to the Joint Intelligence Group (JIG)orJ-2Director. The JIG or J-2Director reviewed the drafi detainee assessment and provided any edits and^or comments. h. Eighth, the drafi detainee assessment was submitted to the Deputy Commander,JTFGTMO. The Deputy Commander,JTF-GTMO,reviewed the drafi detainee assessment and provided any edits and^or comments. i. Ninth, the drafi detainee assessment was submitted to the Commander, JTF-GTMO. The Commander, JTFGTMO,reviewed the drafi detainee assessment and provided any edits andi^or comments. Once all changes were made, the Commander, JTF-GTMO, signed the detainee assessment. j . Tenth, the signed detainee assessment was submitted toOARDEC through USSOUTHCOM ^. lam very familiar with how long the above process took to complete one detainee assessment. The first two steps of this process, having the initial intelligence analyst createa drafi detainee assessment, took no less than one week, including overtime, to complete. Tothe best of my memory,completing one drafi detainee assessment took, on average, 5055 working hours. The third step ofthis process, having another intelligence analyst conduct peer review of the drafi detainee assessment, took, on average,2working hours per assessment. The fourth step of this process, havingasenior intelligence analyst conduct^A^C of the drafi detainee assessment, took, on average,l^working hours per assessment. Each remaining step necessary to complete one detainee assessment took betweenalcw hours to one week to complete. In total, the entire process to create one detainee assessment took approximately one month and consisted of, on average, ^0-90 working hours. The most detainee assessments created in one fiscal year was approximately 520. 9. Both Servicemembers and civilian contractors were involved in the above process to create one detainee assessment. The lowest ranking Servicemember involved in this process wasE-4, Specialist. The lowest ranking civilian contractor involved in this process was equivalent toa GS-I2employee. My rank whenlwas involved in creating detainee assessments was equivalent toaGS-I3employee,and my lowest salary during this time was approximately ^^0,000 per year. 10 lam veryfamiliarwithwhattypeofintelligence was included in detaineeassessments Detainee assessments include, among other things, background information on the detainee, details of the detainee'scapture, the detainee'saffiliation with terrorist organisations, the detainee'srecruitment and travel,the reasons for the detainee'stransfer to JTFGTMO, indicators of the detainee^sthreat level and intelligence value to the United States and its allies, and the analysis of the detainee'sthreat level and intelligence value to the United States and its allies. Prosecution E^l^il^it(PE)^forIdentifieation is the classified list ofthe diflerent

sources of classified intelligence reporting from whichland the other analysts derived the inlormation used in the assessments. a. The background information on the detainee included, among other things, the detainee'sbiographical data, picture, health information, employment, religion, and family members or relatives with extremist links. This information was obtained fromavariety of intelligence sources and was included in the detainee assessments as part ofthe intelligence analysis to determine the detainee'scommitment to terrorist organi^ations,which were important actors in determining the detainee'sthreat level and intelligence value to the United States and its allies. lunderstand that all ofthis data would be known to the detainee and may be known by his associates listed. However, since we usually do not leam all ofthis informationfi-omthe detainee himself, the detainee may not understand the extent ofwhat the United States knows about his background information. b. The details ofthe detainee'scapture included, among other things, how the detainee became involved in activities that led to capture,where,how,and with whom the detainee was captured,what the detainee was doing when captured, events such as engagements with United States military forces that led to the detainee'scapture,and the date of transfer to JTF-GTMO. This information was obtained fiomavariety ofintelligence sources and was included in the detainee assessments as part ofthe analysis to determine the detainee'saffiliation and commitment to terrorist organi^ations,which were important factors in determining the detainee'sthreat level and intelligence value to the United States and its allies. lunderstand that most, ifnot all,ofthis data would be knov^ to the detainee or may be knov^ by his associates. However, since we usually do not leam all ofthis informationfi-omthe detainee himself, the detainee may not understand the extent of what the United States knows about the detailsofhis capture. c. The detainee'safiiliation with terrorist organisations included individuals the detainee associated with at the terrorist organisations and the detainee'smovements within the terrorist organi:^ations. This information was obtained fromavariety ofintelligence sources and was included in the detainee assessments as part of the analysis to determine the detainee'saffiliation and commitment to terrorist organi^ations,which were important factors in determining the detainee'sthreat level and intelligence value to the United States and its allies. lunderstand that all ofthis information would be known to the detainee and may be known by his associates listed. However, since we usually do not leam all ofthis information fiom the detainee himself, the detainee may not understand the extent ofwhat the United States knows about his affiliation with terrorist organi:^ations. I I . P E ^ f o r ID includes serialised intelligence reports published to the Intelligence Community (IC) and intelligence information. The serialised intelligence reports published to the IC include Items5,15-19,30,31,34,and35 in P E ^ f o r ID. Intelligence information is included in all of the sources in P E ^ f o r ID, except for Items I,20, 2^,and 2^. Information can be derived from all sources in P E ^ f o r ID and included in serialised intelligence reports published to the IC.

12. lam very familiar with where detainee assessments are stored. Detainee assessments are stored in three locations: (l)on the shared drive at JTF-GTMO which is located on the Secure Intemet Protocol Router Network (SIPRNET): (2) afiersigned bythe Commander, JTFGTMO, on JDIMS which is located on the SIPRNET:and(3)inadatabase accessible through the JTFGTMO Detainee Assessment Branch website on Intellipedia which is located on the SIPRNET. Intellipedia,which is analogous to^ikipedia,isawebsite on the SIPRNET that allows for the sharing ofintelligence in the IC and to analysts on SIPRNET and J^ICS. 13. In March 2009 and in response toatasking from J-2atJTF-GTM0,Icreated the database accessible through the JTF GTMO Detainee Assessment Branch website on Intellipedia. It took me approximately ^3 working hours to create this database, which included time to research the structureofthe write-up language, find and update all source documents, and link each file to the correct detainee. This database stored all detainee assessments,which totaled more than ^00. I have spent approximately 50 additional hours updating and otherwise maintaining this database. 14. Thefilenamefor each detainee assessment in this database included the Internment Serial Number (ISN) for the particular detainee, the recommendation for the detainee, and the date of the detainee assessment. The format ofthisfilenamewas as follows: ^^ISN recommendation date.'' Thefilenamewas linked toaunique, sequential document identification number (Document ID),which was the particular detainee assessment. Ifauser who accessed the database through the JTF GTMO Detainee Assessment Branch website scrolled over thefilenamewith his^er mouse, the document number would appear. 15. In my capacity as the team leader of the Detainee Assessment Branch,Ireviewed five detainee assessments pertaining to United Statesv.Private First Class Bradley Manning.which the prosecution provided to JTF-GTMO. These detainee assessments are located in A^^ellate E^l^il^it(AE)^01 andhave the BATES numbers 0037^123 0037^140 PE^forlDcontains these five detainee assessments. lam able to identily these documents as detainee assessments based on the lormat, letterhead and content ofthe documents. 1^. The five detainee assessments within P E ^ f o r ID are all marked, at the top and bottom of eachpage,^^SECRET." None ofthe five detainee assessments within P E ^ f o r ID has been made publicly available by the United States Govemment. 17. The five detainee assessments within P E ^ f o r ID identify activities related to national preparedness. These documents include the following matters: (l)United States intelligence relating to identified associates ofterrorist organisations,to include names, affiliations, and whereabouts: (2) United States intelligence relating to training activities ofthose terrorist organisations, to include the substance ofsuch training: (3) United States intelligence relating to theTactics,Techniques,and Procedures (TTPs)ofthose terrorist organisations, to include details relating to enemy movement, housing networks, and recruiting activities:(4) United States intelligence relating to enemy engagement with United States military Icirces:(5) our intelligence analysis of the detainee'scooperation and credibility,which, if released, could affect the subsequent recruitment ofthe detainee and the willingness ofcountries to accept the departing detainee:(^) United States analysis of the intelligence value ofthe detainee, to include any intelligence gaps ofthe United States relating to members ofterroristorgani:^ations.

terrorist'srecruiting activities,and future operations: and (7) United States intelligence relating to the detainee'sthreat level to the United States and its allies. lunderstand that there are portions ofthis material that would already be known to the detainee or his associates. However, neither the detainee nor his associate would know our analysis relating to the detainee. Further, neither the detainee nor his associate may understand the extent ofwhat the United States knows about the detainee. lunderstand that the detainee,if released, could share the information known by the detainee with anyone. Of that information which we learned fiom the detainee,Iam not aware ofany detainee who has shared all ofthat information. lalso understand that the associates ofthe detainee could share information relating to the detainee known by the associate with whomever they pleased, Ofthat information relating to the detainee which we leamed from an associate,Iam not aware of any associate who has shared all ofthat information relating to the detainee. 1^. lam aware that there is some inlormation pertinent to these documents available in open source material. lam also aware of the extensive litigation that happens for these detainees in federal court and the military commissions. Idid not consider those things whenlidentified the sources ofintelligencefi^rthe above detainee assessments,which was the only rolelplayed during the classification review. 19. In October of2007,lam aware that the Department ofDefense released in the FOIA reading room the Combatant Status ReviewTribunals(CSRT) and the Administrative Review Boards (ARB)documents held between July2004 and July2007. The CSRTswereaset of tribunals for confirming whether detainees held by the United States at Guantanamo had been correctly designated as ^^enemy combatants." The ARBs were used to conduct an annual review ofthe detainees to review whether they still representathreat or not to the United States. The released inlormation identified each detainee by name and their general background information for those individuals still held atJTFGTMO at that time.

^^^^^^^^^^^^^^

JBI^U^ER^H^TE CPT,JA AssistantTrial Counsel

THOMASFHURE^ MAJ,JA Defense Counsel

BRADEE^E.MA^ PFC, USA Accused

UNITEDSTATESOF AMERICA STIPULATION OF EXPECTED TESTIMONY Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211 RDML David B. Woods

June 2013

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel,that ifRear Admiral (EowerHalf^ David B.^oods were present to testity during the merits and presentencing phases ofthis court-martial,he would testily substantially as fi^llows: 1. lamaRear Admiral (Eower Halt) in the United States Navy with 32 years of active service. My current position is Commander, Strike ForccTraining Pacific, San Diego,CA. Iwas previoi^sly the ^ommander,JointTask Force Guantanamo(JTFGTMO),at Guantanamo Bay,^uba. Iheld this position from24 August 2011through 25 June 2012, and reported during that time to General Douglas Fraser, Commander, United States Southern Command (USSOUTHCOM). My time as ^ommander,JTF-GTMO was my fifih command tour as an Original Classification Authority(O^A). Igraduated fiom theU.S.Naval Academy inl9^1 and was designated asanaval fiight ofi^cer in 19^3. lalso receivedamaster'sdegree in National Security and Strategic Studies from the Naval ^arOollegeinl997 2. AsaUS Navy Oaptain,Iserved as the commander ofOarrier Air ^ i n g ( 0 V ^ ) 1 1 , a n d deployed twice in support of Operations Enduring Freedom and IraqiFreedom aboard the USS Nimitz. Additionally,as part ofajointassignment,1was the Oommander of Joint Crew composite Squadron One. Our squadron was responsible for the Multi-NationalOorps^lraq electronic warfare fight against improvised explosive devices. Afier my promotion,Iserved as the Director,Strategy and Policy Division, OhiefofNaval Operations for Operations, Plans and Strategy (N3^5) before taking command ofJTF-GTMO 3. AsCommander,JTF-GTMO,1wasanO0A. My responsibilities in that position included the review ofJTF-GTMO information for classification purposes pursuant to Executive Order (EO) 1352^ (^^Olassified National Security Information^^), and its predecessor orders. Prior to this position, Iwas an OOA while serving in the following positions: (1)05 Squadron Commander (VA0131) (199^ 2000): (2)Training Squadron OommandingOfficer(VA0 129) (2002 2004): ( 3 ) A i r ^ i n g Oommander(CV^ll)(USSNimit^)(2005-2007):and(4)OommanderofJointOrew composite Squadron One in Iraq (2007 200^). At all timeslser^ed as an 0CA,1received annual training consistent with E01352^ or previous guidance. 4. Information that requires protection in the interest ofnational security ofthe United States is designated classified national security information under Executive Order (EO)1352^, Classified National Security Information, signed by President Obama on December 29, 2009. Information is classified in levels commensurate withthe assessment that its unauthorised disclosure reasonably could be expected to cause the following damage to national security: Top Secret information is

PROSECUTION FX IJL__ kj^tification PAGE OFrJi ..- ADi'v4rfTED: PAGE O, PACES

information that could cause exceptionally grave damage to national security: Secret information is information that could cause serious damage to national security: and Confidential information is information that could cause damage to national security. 5. Unclassified information does not requireasecurity clearance for access, but nonetheless may be ofasensitive nature. The current basis for classification ofnational security information is tound in E01352^.SectionI.3 ofE01352^ authorises an OOA, such as me whenlwas Commander,JTF GTMO, to classify information owned,produced, or controlled by the United States government i f i t falls within certain classification categories. One such category,found at Section1.4(c)ofEO 1352^, concerns information that pertains to an intelligence activity (including special activities), intelligence sources or methods, or cryptology. ^. Ireviewed the five charged documents fiom the United States Southern Oommand and JTFGTMO database (BATES numbers 0037^123^0037^140)containedwithinA^^ellateE^il^it^01, and made the below determinations with respect to those documents. 7. First, all five documents were properly marked at the ^^SEORET" classification level. ^. Second, disclosure ofthe information identified in the five documents reasonably could be expected to cause serious damage to the national security ofthe United States. In making this statement regarding the classification ofinformation in this case,1relied upon my personal knowledge and experience, the information made available to me in my official capacity,the advicel received from my staffand their conclusions reached. 9. Third, in the first half of2010and at the time of the disclosures, the five documents were classified pursuant to Sectionl.4(c)ofE01352^,because they contained information concerning intelligence sources and methods, and information that, ifreleased, could cause serious damage to nationalsecurity. This information was classified at the Secret level. 10. Fourth, the five documents contained intelligence data compiled about detainees or summaries of such data. Intelligence data included descriptions ofthe detainee^s biographical inlormation,the circumstancesofhis capture,what he had in his possession when he was captured,the circumstances and date ofhis transferto Guantanamo, his travel,his affiliations with individuals and organisations ofintelligence interest, and his activities in support ofthose organisations. All ofthis information would be known to the individual detainee. The intelligence data also included information about other persons and organi^tions. Idetermined that the intelligence data contained in the documents reveal details about intelligence we have gleaned regarding individuals and organisations of intelligence interest. Additionally,this information revealed the sources of our intelligence,as well as methods and approaches for collecting intelligence. At the time oftheir creation,the documents and the intelligence data contained in them ^ere classified at the Secret level through the action of the Commander,JTF-GTMO,and remained classified at the Secret level in the first half of2010and at the time oftheir disclosure. 11. Fifth,Idetermined that the documents and information remained properly classified afier their creation, and that their release reasonably could be expected to cause serious damage to the national security because it would reveal information concerning intelligence sources, the specific information obtained from such sources, or both. Accordingly,this information was properly classified at the Secret level, pursuant to Section 1.4(c)ofE0 1352^.

12. lam aware that there may have been some information pertinent to these documents available in open source material. Idid not use this material or its publicly available status in making classification determinations. Ifthere was information that had been previously released under the authority ofthe United States government,1would consider the authorised release ofinformation by the United States government as part ofmy review ofthe classification ofthe entire document. 1am aware ofthe extensive litigation that happens for these detainees in federal court and the military commissions. Those cases did not affect the classification review for these documents. 13. In October o f 2 0 0 7 , l a m aware that the Department ofDe^nse released in the FOIA reading room the Combatant Status ReviewTribunals(CSRT) and the Administrative Review Boards (ARB)documents held between July 2004 and July 2007. The CSRTswereaset oftribunalsfi^r confirming whether detainees held by the United States at Guantanamo had been correctly designated as ^^enemy combatants." The ARBs were used to conduct an annual review ofthe detainees to review whether they still representathreat or not to the United States. The released information identified each detainee by name and their general background information for those individuals still held at JTF GTMO at that time. 14. Prosecution E ^ i l ^ i t ^ f o r Identification are those five documentsldescribed above.

^^^^^^^^^^^.^x^

^^^^^

ASHDENFEIN MAJ,JA Trial Counsel

THOMASFHURE^ MAJ,JA Delense Counsel

B PFC, USA Accused

UNCLASSIFIED

(U) DECLARATION (U) I, Mr. Louis S. Travieso declare and state: I am the subject matter expert for the Directorate ofOperations (J2) for classifications reviews. In this capacity, I reviewed documents pertaining to United States v. Private First Class Bradley Manning, which the Manning trial team provided to USCENTCOM. I found one document that contained J2 equities, and defer to other USCENTCOM Directorates in regard to the classification of the remaining documents. (U) The one document that ] found that contained J2 equities was the following: l-he Strntegic Intelligence Brief, "Farah INS Probably Deliberately Instigated 4 May CIVCAS Incident" 10 May 2009. (Hereinafter the "Document".) (U) My recommendations to the Original Classification Authority (OCA) in regard to the proper classification of the Document is as follows: The Document contains intelligence activities (including covert action), intelligence

sources or methods, or cryptology. The basis for its original classification was proper based on Executive Order 12958 as amended. Section 1.4(c). It should continue to be classified based on EO 135:?6, Section 1.4(c). (U) Pursuant to 28 L.S.C. I ''46,1 declare under penalty of perjury that the information provided herein is true and correct to the best ofmy knowledge. Dated: 2.^ October 2011

Tnformation Release Specialist

JIS S. TF

(U) I, Mr. George J. Lemire, CCJ2-EI, reviewed these documents along with Mr Louis S. Travieso. I concur with Mr. Travieso's conclusions and recommendations. (U) Pursuant to 28 U.S.C. 1746,1 declare under penalty of perjury that the information provided herein is true and correct to the best of my knowledge. Dated:2.* October 2011

GEORGE J'LEMIRE CCJ2-EI, USCENTCOM

UNCLASSIFIED

ManningB_00527398

A?^ PROSECUTION r y - ' U i fbr icVntjffcation PAGE OFFERED. IiZ ADMITTED; ^ PAGE OF PAG'io

UNITED STATES OF AMERICA STIPULATION OF EXPECTEDTESTIMONY Viee Admiral Rol^ertS Harvard June20I3

Manning, Bradley E^ PFCUSArmy, HHC, U S Army Garrison, JointBaseMyerHendersonHall FortMyer,Virginia 222II

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifVice Admiral Robert S.Harward, Jr., were present to testis during the merits and pre-sentencing phases ofthis court-martial, he would testis substantially as fi^llows. 1. lamaVice Admiral in the United States Navy with 32 years of active service. Icurrently serve as Deputy Commander, United States Central Command (USCENTCOM) at MacDill Air Force Base. 2. Ibegan my career asasurface warfare officer aboard the destroyer USS i^^c^^^ (DDG 995), and then transferred to the Naval Special^arfarecommunity.Iwas the ^^Honor Man" ofBasic Underwater Demolition (BUD)^Sea, Air, Land (SEAE)class 12^,andlhave served in both East and^est coast SEAL teams. 3. My tot^s in the Naval Special ^ a r ^ e community include: commander,SEALTeam Three: AssaultTeam leader and operations officer at Naval Special^ar^re Development Group: SEAL plans officer for Commander,AmphibiousForceU.S.7th Fleets executive officer, Naval Special^arfare Unit One: aide-de-camp to Commander, U.S.Special Operations Command: Combined Joint Special Operations Task Force(CJSOTF) deputy commander in Bosnian deputy commander Special Operations Command, Pacific^ commander, Naval Special warfare Group One: and, deputy commanding general, Joint Special Operations Conm^and. 4. My additional assignments includeatour in the Executive Office of the President at the ^ i t e House, wherelserved on the National Security Council as the directorofStrategy and Policy for the officeofCombatingTerrorism. Myfirstfiagassigrm^entwas chairman of the Joint Chiefs of Staff representative to the National Counterterrorism Center (NCTC),asamember of the Senior Interagency StrategyTeam.AdditionaIIy,Iserved as deputy commander, U.S.Joint Forces Command, and most recentlylserved as commander of Combined Joint InteragencyTask Force (CJIATF)435fi^om2009to2011inAfghanistan,CJIATFisthetaskforcededicatedtodetainee operations in A^hanistan. lhave commanded troops in Afghanistan and Iraq over six years since Sept.ll,2001. 5. lhave been the Deputy Conm^ander, USCENTCOM, sincellJuIy 2011. My responsibilities include exercising TOP SECRET and below original classification authority, which includes renderingadetermination of CENTCOM generated infi^rmation fbr classification purposes pursuant toawritten delegation from the Deputy Secretary ofDefense and under the authority ofExecutive Order (EO) 1352^. Per EO 1352^, Section1.3,the authority to classic information

PROSECUTION EXHIPTT U ^ f o r idj^ii^ation PAGE 0FFER3D G:^ ADMITTED: PAGE OF PAGES

originally may be exercised only by an OCA, and must be delegated by the President, the Vice President, or an agency head or designated official. ^. Infiormation which requires protection in the interest ofthe national security ofthe United States is designated classified national security information per E0 1352^, Classified National Security Information, signed by President BarackH.Obama on 29 December 2009,and for information classified prior to June 27,2010, according to EO 1295^ signed by President ^illiamJ.Clinton on April 17,1995,as amended by President Georges.Bush on March 25, 2003. Information is classified in levels commensurate with the assessment that unauthori:^ed disclosure could cause the following expected damage to national security: for exceptionally grave damage to national security^Top Secret: for serious damage to national security^ Secret: and for damage to national security Confidential. 7. within USCENTCOM, classified inlbrmation is handled and protected in accordance with E0 1352^(and predecessor orders)on Classified National Security Information. ^. In total, four categories of classified information, as identified in E0 1352^ and its predecessor EOs,were included in the documentslreviewed. Because the mission of USCENTCOM encompasses the conduct ofmilitary operations, USCENTCOM relies primarily upon two classification categories when protecting national security infiormation,which are identified in Section1.4ofE0 1352^ asi.4(a)(militaryplans,weapons systems,or operations) and1.4(c)(intelligence activities (including covert action), intelligence sources or methods,or cryptology). 9. Classified information should be handled and examined only under such conditions as are adequate to prevent unauthorised personsfi-omgaining access. Classified material may not be removed from designated work areas or moved from inlormation systems, e.g., classified databases, computer networks, servers, or computers, except in the performance of official duties and under special conditions which provide protection for the classified material. 10. lhave reviewed the104 charged USCENTCOM documents related to this case. The charged documents are categorized as fiollows: a. Over 3^0,000 documents were taken from the Combined Information DataNetwork Exchange(CIDNE)Iraq database. Ireviewed the 53 charged documentsfi-omthe CIDNEIraq database contained in Appellate E^l^il^it(AE) ^01 and Prosecution E^liiil^it(PE)^^. b. Over 90,000 documents were taken fiom CIDNE-Afghanistan database. Ireviewed the 37 charged documentsfi-omthe CIDNE-Afghanistan database contained in AE ^01 and PE

c. Ireviewed the 14charged documents related to the Farah investigation contained in AE^OlandPE^O d. Ireviewed the charged file named ^^BE22PAX.^ip" containing the video named ^^BE22PAXwmv"(Gharanivideo)containedinPE^^

This material was staffed through the following USCENTCOM Directorates: Intelligence(J2), Operations (J3), and the Strategy,Plans, and Policy (J5). The results ofthis staffing are PE^^, PE ^7, and P E ^ f o r ID, and these documents were provided to me and consolidated. In consultation with the subject matter experts identified above,as an OCA,Idetermine the following for each category: 11. For each of the 53 CIDNE-Iraq documents in PE^^,Ifound the following: a. First, all 53 documents were properly marked at the SECRET level and based on actual events. b. Second, disclosure ofthe information identified in the 53 documents reasonably could be expected to cause serious damage to the national security ofthe United States. In making this determination regarding the classification ofinformation in this case,Ire1y upon my personal knowledge and experience, the information made available to me in my official capacity, and the advice and recommendations received from the subject matter experts who also reviewed the documents, lam aware that there may have been some information pertinent to some ofthese documents available in open source material. Idid not use this material or its publicly available status in making classification determinations. Iflhad been aware ofinformation that had been previously released under the authority ofthe United States government,1would have considered the authorised release ofinformation by the United States government as partofmy review ofthe classification of that information, c. Third, the 53 documents and the information contained in them were classified at the SECRET level at the time oftheir creation, and remained classified at the SECRET level in the first half of2010and at the time oftheir disclosure. These documents were properly classified at the time they were generated and remained classified in the first half of2010 pursuant to SectionI.4(a)and(c)ofE0 1352^, or its predecessor EOs,because they contained information that, ifreleased, could cause serious damage to national security. 12. For each of the37 CIDNE-Afghanistan documents in PE^9,Ifound the following: a. First, all 37 documents were properly marked at the SECRET level and based on actual events. b. Second, disclosureofthe information identified in the 37documents reasonably could be expected to cause serious damage to the national security ofthe United States. In making this determination regarding the classification ofinformation in this case,Irely upon my personal knowledge and experience, the information made available to me in my official capacity,and the advice and recommendations received fi-om the subject matter experts who also reviewed the documents. 1am aware that there may have been some intbrmation pertinent to some ofthese documents available in open sottrce material. Idid not use this material or its publicly available status in making classification determinations. Iflhad been aware ofinformation that had been previously released under the authority ofthe United States government,1^ould have considered the authorised release ofinformation by the United States government as part of my review of the classification of that information.

c. Third, the 37 documents and the information contained in them were classified at the SECRET level at the time oftheir creation, and remained classified at the SECRET level in the first half of2010and at the time oftheir disclosure. These documents were properly classified at the time they were generated and remained classified in the first half of2010 pursuant to SectionI.4(a)and(c)ofE0 1352^, or its predecessor EOs,because they contained information that, ifreleased, could cause serious damage to national security, 13. For each ofthe14Farah investigation documents in PE90,Ifound the following: a. First, all14documents were properly marked at the SECRET level and based on actual events. b. Second, disclosure of the information identified in the14documents reasonably could be expected to cause serious damage to the national security ofthe United States. In making this statement regarding the classification ofinformation in this case,Irely upon my personal knowledge and experience, the information made available to me in my official capacity, and the advice and recommendations received fi-om the subject matter experts who also reviewed the documents.lam a^are that there may have been some information pertinent to some ofthese documents available in open source material. Idid not use this material or its publicly available status in making classification determinations. Iflhad been aware ofinformation that had been previously released under the authority of the United States government,lwould have considered the authorised release ofinformation by the United States government as part ofmy review ofthe classification ofthat information. c. Third, the14documents and the information contained in them were classified at the SECRET level at the time oftheir creation, and remained classified at the SECRET level in the first half of2010and at the time oftheir disclosure. These documents were classified pursuant to Section1.4(a)and(c)ofE0 1352^, or its predecessor EOs, because they contained information that, ifreleased, could cause serious damage to national security. 14. For the Gharani video in PE^^,Ifound the following: a. First, the Gharani video was only located on the SIPRNET because it was classified at theSECRETlevel b. Second, disclosure ofthe information identified in the video reasonably could be expected to cause serious damage to the national security ofthe United States. In making this statement regarding the classification ofinformation in this case,Irely upon my personal knowledge and experience, the information made available to me in my official capacity,and the advice and recommendations received fi-om the subject matter experts who also reviewed the video. lam aware that there may have been some inlormation pertinent to this video available in open source material. Idid not use this material or its publicly available status in making classification determinations. Iflhad been aware ofinformation that had been previously released under the authority ofthe Ignited States government,lwould have considered the authorised release ofinformation by the United States government as part ofmy review ofthe classification of the video.

c. Third, the video and the information contained within was classified at the SECRET level at the time ofits creation, and remained classified at the SECRET level in the first half of2010and at the time ofits disclosure. This video was classified pursuant to Section 1.4(a)and(c)ofE0 1352^, or its predecessor EOs, because it contained information that, ifreleased, could cause serious damage to national security.

j)r A ^ h A'LEXANDER vON ELTEN CPT, JA Assistant Trial Counsel

^U*y^ 3-,
THOMAS F. HURLEY^ MAJ, JA Military Defense Counsel BRADL PFC, USA Accused

Prosecution Exhibit 135b 6 pages classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

Prosecution Exhibit 136 1 CD classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

FOR OFFICIAL USE ONLY UNITEDSTATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Mr Maxwell Allen ^^June20I3

Manning, Bradley E^ PFCUSArmy, HHC, U S Army Garrison, JointBaseMyerHendersonHall Fort Myer, Virginia 222II

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel,that ifMr, Maxwell Allen were present to testis during the merits and pre-sentencing phases ofthis courtmartial,he would testily substantially as Ibllows: 1, lam currently employed with the Central Intelligence Agency(CIA)and have worked there fior six years. Before that,Iwasacontractor with Oraclefiorten years. Oracle is the largest database company in the world and is the platfiorm for the Open Source Center(OSC) database, Iwork on the contract for the OSC, lam the lead database engineer and database administrator fiortheOSC, lhave been the lead database administrator and engineer Ibr two years, Asa database engineer,lbuild and develop databases to efficiently store and retrieve data and asa database administratorlmaintain the databases. As the lead,Iam in charge of the database engineers and administrators, 2, The OSC isawebsite controlled by the Central Intelligence Agency(CIA), which requiresa userto have ariose account to access infbrmation,The website is located on the unclassified system, SIPRNET,andJ^ICS and allowsauser, once authenticated, to conduct searches of various files created by the CIA and other organisations. The OSC contains reports and translations fi'om thousands ofunclassified publications, television and radio programs, and Intemet sources around the world.
^

3, The OSC carmotcompletearequestbyauser without logging the request in the audit logs. In other words, ifthe OSC cannot log its actions, it will stop working and users will not be able to retrieve their requests and view pages on the website, ^econductamonthly check of the logs to ensttre the system isfitnctioningproperly,andwe always keep the database up to date by installing all updates, Typica11y,the purpose of checking the audit logs is to see if there are any errors in the automated process, 4, The OSC database creates three separate types oflogs: application logs, server logs, and firewall logs. In this case,Ipulled the application logs. The other logs would refiect the same basic information inadiflerentlbrmaL The logs are created every time an event occurs, Inthis case, we were asked to pull any user information for "Bradley Manning,"as well as audit logs associated with the user names on any "Bradley Marming" accounts, 5, Aslstated, an OSC account is required to access the OSC, ToapplyfioranOSCaccount,a user has to enter their personal information in the application, ^hen applying for an account on SIPRNET,the account is automatically approved upon application and confirmation of the SIPRNETemail address. Having an OSC account allows you to access the OSC website through

FOR OFFICIAL USE ONLY , ^ PROSECUTION EXHIBIT /35?fori fication PAGE OFFERED: brjiaemfn PAGE ADfvflTTED: PAGE OF PAGES

yfl-

FOR OFFICIAL USEONLY SIPRNET. Ifauser wants to access sites not within OSC,the user has to log on to those sites separately even if the user clicks onalir^fi^om within the OSC website, ^, Isearched the database for any combination ofBradley and Manning, Afier looking at the first and last names on the accounts,ldetermined that there were two accounts with the first name Bradley and the last name Marming, Both the accounts were on the SIPRNET, lopened the account information for those accounts and took screenshots ofthe account information by pressing control and enter to tak^eascreenshot, a. The first account hadauser name of"Bmanning." The name entered by the individual creating the account was Bradley Edward Marming. The phone number was (240) 7^4-0431. The secret level email given was Bradley.manning^2bct10mtn. The security question was "^atcity/towndidyougrowupin7"Theanswergivenbytheaccountuserwas"Crescent.^^ The account was opened on^November 2009 and the last login was6November 2010. Prosecution E^l^iI^it(PE^^^for Identification is the account screenshot with BATES number: 00374393. b. The second account hadauser name "bradass^7," The name entered by the individual creating the account was Bradley Edward Manning, The phone number was (312) ^48-8722, The secret level email given was bradley,manning^us,army,smil,mil. The security question was "^Vhatcity/tov^didyougrowupin7" The answer given by the account user was "Crescent," That accotmt was opened on 20 February 20IOand the last login wa^17ApriI 2010, P E l ^ f o r ID is the second accotmtscreenshot with BATES number: 00374394, 7. Topull the logs associated with the accounts with the user names "bmanning" and "bradass^7,"lv^oteasqI query and entered it into the database. Inthequery,laskedthe database to pull all the audit events by the users "bmanning" and "bradass^7." Sql isastructural query language fbr extracting and inserting inadatabase. It isastandard computer language to interact with databases. In other words, sql isatool used to perform inquires and pull data fi'om adatabase. The sql query pulled the logs and put them intoareadableformaL In order to accomplish the sql query,lwent to the black command prompt screen, typed in the query,hit enter, and the computer generated the logs. Ithen saved the logs as well as the sql querylused to pull those logs. Acomputer-generated process pulls the logs, andldid not format them as sql does it automatically. Ithen saved the logs. ^. Iwill explain the logs by column and using following line pulled from the "bradass^7 distinct export withclassifications.xls":
AUDIT EVENT ID 36135654 DATE TIME 20-FEB-lO 04.45.52.000000000 AM ACTOR bradass87 AUDIT ACTION Viewed Holding TARGET 11943026 DATA NAME TITLE DATA VALUE Daily Tells UK, Dutch To Stop 'Bullying', Accept Iceland's Compensation Offer (U)

a. Colimm 1 is the audit event identification, which is the system generated number assigned numerically to events. An event is data received, like looking at a document. Each different FOR OFFICIAL USE ONLY

FOR OFFICIAL USEONLY event hasadiflerent line on the audit data^ however, each action has the same audit event identification. Therefore, there may be several lines to describe one action,which all have the same audit event identification. In the above example line, the audit event id is 36135^54, b, CoIumn2is the Date/Time Group logs the date and time of the evenL In the above example line, thedate/timegroup is20 Feb10at04:45:52,000000000 AM, c, Co1umn3is the actor. It is the user account that is creating the event. In the above example line, the actor is "bradass87," That was the user account name foraSIPRNET OSC account with the name "Bradley Manning," d, Co1umn4is the audit action, which tells you what the user did on the OSC website, Inthe above example line, the audit action is "viewed holding," This means the document whose title appears in the data value column was opened by the "bradass^7" user accounL e, CoIutrm5is the target. The target identifies what the user was accessing on the OSC website. In the logs that we pulled forthis case, the targets were most ofien numbers that identified specific documents or other areas of the website the user clicked on, such asTopic Cotmtries, In the above example line, the target is 11945572,which isadocumenL f, CoIumn6contains the data name,which further describes the target as well as the next column, the data value column. In the above example, the data name is title. That means that the target was the document and the data value in the following column is the title ofthe documenL g, Column7is the data value, which is what the data actually is. In the above example line, the data value is the title "DailyTellsUI^,DutchToStop ^Bullying',Accept Iceland's Compensation Officer (U)," h, Tosummari:^e, the above example means that the user "bradass^7" clicked on the page with the document entitled "DailyTeIIsU^,DutchToStop ^Bullying',Accept Iceland's Compensation Officer (U)" on 20 February 2010, Iknow the page opened and the document displayed; otherwise, the action would not have logged, 9, In this case,IaIsoconductedasql search of the database for all the document titles that were viewed by the user account "bradass^7," lsavedthemas"bradass^7 sum export with classifications," Idid this as it was an easier format to view what document titles were viewed by the user, Usingtheaboveexamp1eand"bradass^7 sum export with classifications" you can match the target, which contains the holding identification with the document title. In the above example, the target(and holding identification) is 11945572, which again, matches with the title "Dai1yTellsU^,DutchToStop ^Bullying',Accept Iceland'sCompensation Officer," 10, Based upon the review ofthe audit logs, it appears that "bmanning" began using his account on 2^ November 2009 and looked at Homeland Sect^ity information. He did not conduct any activity on his account afier that date. The subsequent two dates are automatic entries to track the lapsing and expiration ofthe accounts, P E ^ f o r ID are the OSC logs for the user account "bmanning,"

3 ^ FOR OFFICIAL USE ONLY

FOR OFFICIAL USEONLY 11, Based upon the review ofthe audit logs, it appears that "bradass^7" began using the OSC on 20 February 2010and looked atavariety of documents associated with wikileaks and Iceland, The "bradass^7"accountwaslastusedonl7April2010.PE^for ID are theOSC logs forthe user account "bradass^7," 12, The informationlprovided is computer generated and only limited people have access to the information, lhave no reason to believe that the informationlprovided was not accurate. On 29 Jtme2012,lattested to the authenticity of the OSC log files, containing the following logs, with the following date ranges: "bmanning distinct export with classification,xls"(date ranged November2009to9November2010);"bradass^7 distinct export withcIassification,xls"(date range20February2010to17April2010);"bradass^7 sum export withclassification,xls"(no date range). The logs thatlattested to in this case were in the excel formaL Althoughl originally pulled the logs inadifferent format, the content was identical to the logs thatlpulled. In the same 29 June 20l2attestation,Iattested to the authenticity of the OSC user information files entitled Opensource.gov-bmanning,pdf and Opensource,gov-bradass^7,pdf. This attestation isBATESnumber005051^4.

^^^^^^^^^
ANGELM^VERGAARD CPT,JA AssistantTrial Counsel

^^^^^^^^^B^^^^^^^
THOMAS HURLEYS MAJ,JA De^nse Counsel BRADLEYEMANNING PFC, USA Accused

FOROFFICIAL USEONLY

<
D-

. ' r - < O CO

^inmmminuim'P
O O O O O O O A ( A ( A < A ( A ( A ( / ) 0 . 0 . 0 . 0 . 0 . 0 . 0 O . O . O . O . O . O . O

3 r i - 0 . 0

i
UJ
<

?a:0^???????'^

O r J "ffi

e s aus 'e 'a 'e 'e a e s ^ I z


C5
- I

y
> - u j Q Q D D Q Q Q " "

ssl

^^-'-'-'-'-i^V'SS ium(/3(nc/5(/>cn</)</)-K-3. eSDOOOOOoo o o


< U 5 I X I I X X I Q : I I :

2-

I
01 a H

^S|8|8

a 5

tn tn tn 01 tn

11

% s

5355,

r K 5 5 5 5 E 5 5 5 5 5 E E 5 c c "c c c c c c c c c c 'c U c c c c c c c c c c c c c r~(Q(Qron)(Qnin)nin]ninini(0 OEEEEEEEEEEEEE <.a.a.a.a.Q.Q.o.i3.Q.n.Qi3^ <<<<<< <<<<<<o o o o o o


o o o o o o o o o o o o o o o o o o o o o o o o 5 5 5 5 5 5

Q ) 0 > 0 ) 0 ) Q ) 0 ) 0 ) 0 ) C T O Q ) Q ) 0 )

I i
o

1 M CN CO CO o U ) i CN CN r \ j CN r rsi

d "t

o o o o o ^

g gggoo
1 - , ^ > > > > > > :>:>:>:>

:> o oo oo oo o o o o o z z z z z z z z z z o z
<h to fh th to

S
rl

ti

1 ^
i

O O O O CM O . r ^ f v , ( ^ ( v . < D a > o - c N c o m u 7 i m m m i n i n i n i D i D i D i D T r " ^ l O U 3 l O t O ( D t O ( O t O ( D ( O G ) V ICNCNCNCNCNCNfMCMCgCNintn O O O O O O O O O O O O O O i C O n c o c o c O c o c o c o r o r j t N C N (OCOCOCOCOCOCOCIOCOIOIO

,V
" [Ho for idptiSicaUon PROSECUTION n ADMITTED: PAGEOFFERED: PAGE Or P.AGES

ManningB_00374397

Prosecution Exhibitl^l pages classified "CO^EIDE^TIAE" ordered sealed for Reason3 Military Judge's Seal Order dated20August2013 stored in the classilied supplementto the original Record ofTrial

UNITEDSTATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY SSG Peter Bi^elow June 2013

Manning, Bradley E. PFCU.S.Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall FortMyer,Vir^inia 22211

It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that ifSSG Peter Bigelow were present to testity during the merits and pre-sentencing phases ofthis courtmartial, he would testily substantially as follows: 1, lam currently the Battalion S4 NCOIC for the 7^2d Brigade Support Battalion, ^2d Airborne Division, Fort Bragg, North Carolina, Irecentlylefi my position as the Supply Sergeant for the 2d NATO Signal Battalion in Italy, IhavebeenactivedutyArmy since 2004. Prior to that,1 served in the Army National Guard fi-om 1999 to 2000 and the Marine Corps fi-om19^9to1993 and again from199^to 1999. 2, Iknow PFC Marming because he came to work for me in the supply shop afier leaving the S2 shop during our deployment to Contingency Operating Base(COB)Hammer, Iraq. Helefithe S2 shop on approximate1y^May2010and joined the supply room the following day,on approximately9May2010. At that time,Iwas the Headquarters and Headquarters Company (HHC), 2d Brigade (BDE),10th Mountain Division Supply SergeanL Inthisposition,Iwas responsible for supporting the Brigade and also handling the logistical needs for the Brigade Headquarters Company and Staffconsisting ofmy Company Commander; Executive Officer; and the arms, supply,and orderly room persormel. In the supply room, PFC Marming would help out with tasks, such as moving supplies, photocopying, or running messages or paperwork to other sections, Idid not always have things for PFC Manning to do, so he typically had several hoursaday during his shifi where he did nothing but readabook or surf the intemeL 3, Ifirst became awareofthe investigation and misconduct at issue in these proceedings afier getting back fi-omasupply run toVictory Base Complex in Iraq on 27 May2010, Upon my retum,Iwas told to get PFC Manning because CID was en route to question him. That instruction came from CPT Lim, the 2dBDES2. He asked me to stay with PFC Manning until CID arrived. Afierldropped my gear,Iwent immediately to the Supply Office, got PFC Marming, and requested myArmor Sergeant watch him until otherwise instructed, 4, CID arrived that evening. They interviewed me regarding leaked material andPFC Manning'scomputer usage. ladvised the investigating agents thatPFC Marming had had access to my NIPR and personal computer, and that,whileldid not know ifPFC Manning had used my SIPRmachine,lhad seen him sitting behind iL IconsentedtoaCID agent taking my personal laptop. The CID agent also collected my GovemmentNIPRandSIPRhard drives. laskedthat the agent to take only the hard drives from the Govemment computers, because, afier CID's investigation ofthe S2shop,we were running out of computer terminals. Isigned my personal

PROSECUTION n y f x - y r - n n n c a t i o n PAGE OFFERED: . . .DivflTTED: PAGE OF

computer and the supply room NIPR and SIPRhard drives over to the agent on an evidence custody form that she supplied. 5. PFC Manning used my personal computer and my NIPR computer. Ilet him use my personal computer afierlnoticed that he was checking his personal email and surfing the web on the goverrm^ent computer. At no point didlever log into any ofPFCManning'spersonal accounts, such as Gmail, Amazon or Charles Schwab. lalso did not conduct any searches on crossdressing and did not purchaseabook on Amazon called "Facial Femini:^ation Surgery AGuide fortheTransgendered^oman." Idid not know what the Global Address List(GAL)was. I never searched for any information related to it, nor didlever download or take any actions to otherwise extract it or information related to iL lalso never searched for information relating to "Julian Assange,""^ikileaks,"or"vba outlook write text file." lalso have never nameda folder or file with the word "blah,"particularly not one on my Govemment NIPR computer.

^Wx^-^^-'^CA^
ANGEL ERGAARD CPT, JA Assistant Trial Counsel THOMAS F. HURLEY ^ MAJ, JA Military Defense Counsel

^^/y^vi^
BRADI^gY^ MANNING PFC, USA Accused

UNITEDSTATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Manning, Bradley E^ PFCU.S.Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall Fort Myer, Virginia 22211 SA Alfred Williamson June2013

It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that ifSA Alfred Williamson were present to testify during the merits and pre sentencing phases of this court-martial, he would testify substantially as follows: 1. Ibegan working for the Computer Crimes Investigation Unit(CCIU)oftheU.S.Army Criminal Investigation Command(CID)in 2006. lam currentlyacriminal investigator Special Agent (SA). In 2010and 2011,Iwasadigital forensic examiner and SA,working in the Digital Forensics and Research Branch of CCIU. SA David Shaver was my supervisor. Priorto working for CCIU,Iworkedasacomputer forensic Special Agent for the Department of Homeland Security fi'om 2002 to 2006. From 1992 to 2002,Iserved asapolice officer inTexas. 2. lhave attended and received training in multiple areas related computer forensic examination. This training includesTreasury Department computer forensic courses through the Federal Law EnforcementTraining Center, nine weeks ofintermittent training inAPlus,pre-computer evidence response, and basic computer evidence response techniques. For my work with CIIU,I have attended additional training on digital media collection and forensic examination, as well as computer crime scene investigation, fiom the Defense Cyber InvestigationsTraining Academy (DCITA), under the Detense Cyber Crime Center (DC3). lhave industry certifications from CompTIAinAPIus, Network Plus, and Security Plus. Further,IamaMicrosofi certified specialist in^indows Vista andacertified Ethical Hacker. lhave obtained all three Department ofDefense forensic examination certifications in digital media collection, digital examination, and computer crimes investigations. lam alsoacertified EnCase Examiner through Guidance Sofiware, the makers ofthe EnCase forensic tool. Fina11y,IhaveGIAC certifications in forensic examination and analysis, as well as security. 3. As part ofthis case,Iconductedaforensic examination ofProsecution Exhibit (PE) I I , a U.S.goverrm^entNIPR^ETcomputer collected from the supply armex on FOB Harrm^er, Iraq. The IP addressofthis computer was 144.107.17.19. Specifically,Iexaminedtheverified-byhash forensic image obtained by SA Calder Robertsonfi-omthe hard drive ofthis computer. The original forensic laboratory examination request camefi:omone ofthe CID agents in Iraq, SA Toni Graham. Initial examination ofthe forensic image revealed that it contained the windows XP operating system and the computer was set to Baghdad time(GMT^3:00). Before begirming my examination of the forensic image,Iperformedastandard virus scan on this computer and confirmed that it had no malicious files.

PROSECUTION n x r ; - ? r PAGEOFFERED: : PAGE OF PAGES

iHS %

. ^ ^

rstiiicauon ilED:

4. lused the EnCase forensic sofiware tool to conduct my examination. This sofiware is commonly used by forensic examiners. It verifies the hash value ofthe evidence being examined so that the examiner can be sure he is analysing an exact duplicate ofthe originally collected evidence. Ahash value isaunique identifier tbrapiece of electronic information that is made up ofaseriesofnumbers and letters. lhave used EnCase sofiware extensively. lencountered no errors during my examination. Overall, my forensic examination identified four main things of note. Iwill address each finding in tum. 5. The supply armexNIPRNETcomputer was not configured for Common Access Card(CAC) login, as the "scforceoption" value was not presenL Instead,ausemame and password were required to logon. On login to the computer byauser, the computer was set to displaya Department ofDe^nse waming banner and legal notice. The notice read: ^^ATTENTIONl^^ This is a DOD computer system. Before processing classified information, check the security accreditation level ofthis system. Do not process, store, or transmit information classified above the accreditation level of this system. This computer system, includingall related equipment, networks and networkdevices(includesIntemetaccess)areprovidedonIy for authorised U.S, Govemment use. DOD computer systems may be monitored for all lawful purposes, including ensuring that use authorised, for management of the system, tofacilitate protection against unauthorised access and to verify security procedures, survivabi1ity,and operational security. Monitoring includes, but is not limited to, active attacks by authorised DOD entities to test or verify the security ofthis system. During monitoring, information may be examined, recorded, copied, and used for authorised purposes. All information, including personal information, placed on or sent over this system may be monitored. Use of this DOD computer system, authori:^ed or unauthori^ed,constitutes consent tomonitoring, Unauthori^eduse of thisDOD computer system Evidence of may subject you to criminal prosecution. unauthorised use collected during monitoring may be used for administrative, criminal, or other adverseaction, ^^Use ofthis system constitutes consent to monitoring for all lawful purposes,^^ The DoD waming banner and legal notice did not explicitly prohibit the dov^loading of email addresses, lam not aware of any restriction or guidance that precludes one from downloading email addresses from Outlook, 6. The supply annex NIPRNETcomputerhada"bradley,manning" user accounL This account was not created untiI21May2010, My examination revealed that the user ofthe bradley,marming user account visited the website http://news,google,com and searched for "wikileaks" on21May2010. The bradley.manning user account visited websites related to nonjudicial punishment under Artic1e15on21May2010, The bradley.marming user account also visited several websites owned by Google in order to gain access toaGmail email account, also

on21 May 2010. lalso looked at the Microsofi Outlook nickname file under the bradley.marming user accounL The nickname list or file is automatically generated whenauser sends an email with Microsofi Outlook. This nickname file revealed two email addresses associated with Mr. Adrian Lamo. ^henlexamined the Recycle Bin ofthe bradley.marming user account,Ifoundatext file that contained the contents ofaPGP-encrypted email communication between PFC Manning and Mr, Adrian Lamo. The text file was named "Second Attempt". This "Second Attempt" text file was initially located under "My Documents",but was later moved by the user to the Recycle Bin, 7, Other than the items just described,1initial1y found very little ofinvestigative interest under the brad1ey,manning user accounL Ilater went back and examined the entire computer, including the other user accounts present on the computer,when Mr, Mark Johnson found re^rences to the United States Forceslraq Global Address List(GAL)during his examination of PFC Marming'spersonal computer, including extracts ofwhat appeared to beaMicrosofi Exchange GAL with thousands of email addresses. Accordingly,Iwent back and examined the entire computer, including the "peter.bigelow" user accounL ^. ^Vhenllooked at the supply armex NIPRNET again, it appeared to me that PFC Marming or someone with access to his personal accounts was operating the computer under the user account peter.bigelow, Isay this for several reasons. 9, First, examination ofthe "My Documents" folder underthe peter.bigelow user account revealedalarge text file that appeared to be an extract ofaMicrosofi Exchange GAL. The text file was named "blah.txt". "Blah" isanaming convention that was used by PFC Manning for files on his personal computer and his SIPRNETcomputer, 10, Second,Ifound five files related to the GAL in the Recycle Bin ofthe peter.bigelow user account^two text files named "blah.txt",two".^ip" archives named "blah,^ip"(each containing atext file named "blah,txt"),andatext file named "tmp,txt". All ofthese files found in the Recycle Bin appeared to have been created and deleted on 13 May 2010, and in between creating and deleting these files, the user ofthe peter,bige1ow account also viewed the bradley.e.marming Gmail account inbox. All ofthese files, text files and ,^ip archives, contained extracts ofwhat appeared to beaMicrosofiExchange GAL similar to the content of the text file found under the "My Documents" folder. Iwas not surprised to find various files, because given the huge amount of dataaGlobal Address List contains, it would be easier to manage fragments rather thanawhole intact file. 11, As stated before,Ifound two large text files named "blah,txt" contained within the",:^ip" archives in the Recycle Bin ofthe peter,bige1ow user accounL The two text files are dif^renL One contains approximate1y74,000 Exchange-formatted email addresses(emails text file), and the other contains the units, rarrks, and sections of personnel that correspond with the email addresses (names text file), PE 47 for ID isaCD containing the names text file. If fully printed, this text file would be 1,3^6 pages, P E ^ f o r ID isatwenty-page excerptfi-omthe names text file. PE 4^ for ID isaCD containing the emails text file. Iffi^IIy printed, this text file would also be 1,386 pages. P E ^ f o r ID isatwenty-page excerpt fi'om the emails text file. Idid not contact any individual who could have given me the actual Iraq GAL, nor didlcompare

the data in the files recovered from the abovefileswith the actual Iraq GAL. Idid not attempt to communicate with any ofthe email addresses located in the abovefilesand am unaware whether the listed emails were fi^nctioning. 12. Third, someone using the peter,bigelow account also searched for "wikileaks" and "julian assange", 13. Fourth, the Recycle Bin of the peter.bigelow user account containedaPDF of military documents pertaining to PFC Marming named "tmp.pdF'. 14. Fina11y,the Intemet history for the peter.bigelow user account contained web pages displaying the logged-in user as PFC Manning. Specifica11y,in the "index.dat" fi1e,Iobserved logins to PFC Marming'sArmy Knowledge Online (A^O)email account, as well as logins to the bradley.e.manning Gmail accounL "Index.dat" isafile used by windows to record website and local files accessed byauser to help speed up the loading of pages in Microsofi Intemet Explorer and windows Explorer, lalso found several temporary intemet files that were Amazon.com webpages. One of the pages displayed PFC Marming'sname and address in the "Shipping to" and "Billing" sections. There was no evidence in the "index.dat" file thatauser of the peter.bigelow account visited theTwitter or WikiLeaks websites, nor didlfind any evidence that the user visited anti-American or extremist websites. My forensic examinations produced no evidence ofa^ikileaks Most wanted list or any suspiciousfinancialtransactions. Ifound no references to Jason I^at^ during my investigation. 15. ^ i t h regards to the Global Address List information,Ia1so found evidence that the user of the peter.bigelow user account had searched for information on the intemet relating to the global address lisL Specifically,in the temporary intemet fi1es,IfoundaGoogIe search page with results for searching "global address list Microsofi excel macro". This search occurred o n l l May2010, AMicrosofi Excel macro isacomputer program used within Microsofi Excel to automate common procedures within Microsofi Excel, P E ^ f o r l D i s a p r i n t o u t of the search page from this computer showing the Google results thatlwas able to recover from the computer in the temporary internet files. P E ^ f o r ID isasearch page showing Google results fora search for"globa1 address list macro outlook". This search also occurred on11May2010and this webpage was recovered from the temporary intemet files as welL AMicrosofi Outlook Macro is similar to the description above foraMicrosofi Excel Macro, but for Microsofi Office, P E ^ f o r ID isaGoogle search page with results fi'omasearch for "vba outlook v^ite text file". This search occurred on 13 May 2010. "VBA"is short for "Visual Basic for App1ications."This Google search provided links to instructions on how to computer program inVisua1Basic,a common programming language for Microsofi Office products, that can be used to export information fi'om Outlook toa",txt" file, although emails can also be saved by clicking on "save as" in Outlook and se1ecting",txt" file type. Temporary internet files isafolder in the windows operating system used to cache or store websites visited by the user through Intemet Explorer or other web browsers. The storing or caching ofthese webpages allows these websites to load more quickly the next time they are visited by the user. They are also used typically by forensic examiners to determine what webpagesauser previously accessed.

/^^Ef^f NZRROW^
CPT, JA Assistant Trial Counsel

JiiArmA^^. ^iLJUy^
THOMAS HURLEY MAJ, JA Defense Counsel ^ BRAD PFC, USA Accused

AppeneJix L

FOUO//LES

ROl 0028-10-CID221-10117 CAF 0028-10-C1D361

AVeb

Images Videos Maps News Shopping Gmail more

Web History | Search settings | Sign in

Google

global address list microsoft excel macro Search


About 153,000 results (0.28 seconds) Advanced search

SafeSearch strict T

Everything

Looking Up Names In A G l o b a l A d d r e s s Book - E x c e l Help & E x c e l . . .


14 May 2008 ... GIVE YOURSELF OR YOUR COMPANY FREE 24/7 MICROSOFT EXCEL SUPPORT & QUESTIONS FOR LIFE ... AddressListsf G l o b a l A d d r e s s List") Set M = olApp. ... www.ozgrid.com > > HELP FORUMS > Excel and/or Email Help - Cached G l o b a l A d d r e s s L i s t Lookup From Within Workbook - M i c r o s o f t E x c e l ... - 8 Sep 2007 outlook g l o b a l a d d r e s s l i s t in listbox - E x c e l Help & E x c e l M a c r o Help - 20 Apr 2006 Open Outlook & G l o b a l A d d r e s s Book - M i c r o s o f t E x c e l Training ... - 1 Sep 2005 A d d r e s s Book in a List/Combobox - M i c r o s o f t E x c e l Training. Excel ... - 3 Aug 2004 More results from ozgrid.com

More
Show search tools

VBA Express : E x c e l - Extract Email Data From Outlook G l o b a l . . .


Dumping the G A L to E x c e l provides an list in a form that can be easily searched o r . . . While in the VBE, choose Tools - References and put a check in M i c r o s o f t CDO ... Run the m a c r o by going to Tools M a c r o M a c r o s and double-click GetGAL ... www.vbaexpress.com/kb/getarticle.php?kbJd=222 - Cached - Similar

Free e x c e l m a c r o pull g l o b a l a d d r e s s book Download - e x c e l m a c r o ...


Related searches: download g l o b a l a d d r e s s book excel m a c r o ping ip a d d r e s s .... ExcelReport is a report generator for M i c r o s o f t e x c e l that uses Microsoft... software.informer.com/getfree-excel-macro-pull-global-address-book/ - Cached

How to record a m a c r o using relative cell references in E x c e l


In M a c r o Name l i s t , click the name of the m a c r o that you recorded, ... For more information about recording m a c r o s , click M i c r o s o f t E x c e l Help on the Help ... support.microsoft.com/kb/213740 - Cached - Similar

Converting Addresses
cc:Mail distribution lists, M i c r o s o f t Exchange Server GAL, E x c e l M a c r o for Migration of ccMail Distribution Lists. cc:Mail directory and address lists ... www.slipstick.com/config/convaddr htm - Cached - Similar

Answer Box: Send e-mail messages to a group using mail merge in ...
You definitely can use your M i c r o s o f t Outlook Express A d d r e s s Book as ... Workaround To solve this problem by using m a c r o s , see WD2002: Text Form .... merged e-mail messages to recipients in your Outlook G l o b a l A d d r e s s Book ... Use an existing l i s t Click this option if you already have a data file, such as an E x c e l ... office.microsoft.com > ... > Answer Box - Cached - Similar

M i c r o s o f t E x c e l : Extracting G l o b a l A d d r e s s L i s t (GAL) - excel ...


M i c r o s o f t E x c e l : Extracting G l o b a l A d d r e s s L i s t (GAL) ... cols in order: a,c,d,b,e,f It does need to be a m a c r o , as opposed to manually doing a custom list. ... excel.itags.org/microsoft-excel/169389/ - Cached

Thread VBA Code Needed for Extracting Contacts list in G l o b a l . . .


9 posts - 4 authors Hi, Can Anyone help me to extract the contact list from g l o b a l a d d r e s s l i s t of the ... such Information through VBA code which can be written in M i c r o s o f t outlook. ... This m a c r o will export the contents of all items in the G A L with the ... boardreader.com/.../VBA_Code_Needed_for_Extracting_ContactsJqtaXe66j.html -

l\/lanningB_00210983
Report of Supply Annex NIPR F0U0//LES

^JD^

PROSECUTION EXMFIT HH fo/taentificat.v:vi PAGE ADMITTED: PAGE OFFERED: PAGE OF PAGES

Appendix L

F0U0//LES

ROl 0028-10-GID221-10117 CAF 0028-10-CID361

Cached - Similar

[SOLVED] Read details from G l o b a l A d d r e s s Book in Outlook into ...


6 posts - 2 authors MS Office Version:Microsoft Office E x c e l 2003. Posts: 130 ... AddressLists("Global A d d r e s s List") For Each AddressEntries In myAddressList.AddressEntries i = i -H 1 Debug. ... If I run my m a c r o will it only list names, nothing more. ... www.exceiforum.com/excel.../715057-read-details-from-global-address-book-inoutlook-into-excel.html - Cached

M i c r o s o f t Access tutorials - Export Exchange G l o b a l A d d r e s s L i s t


Export Exchange G l o b a l A d d r e s s L i s t to Access ... For example, it can enclose a m a c r o to a command button in a form, so the m a c r o is executed when clicking in .... M i c r o s o f t Excel(113) Microsoft Word(86) Microsoft Power Point(110)... tutorial-index.com > ... > Importing and Exporting - Cached - Similar

Searches related to g l o b a l a d d r e s s l i s t m i c r o s o f t e x c e l m a c r o
v b a global address list

modify global address list

1 2 3 4 5 6 7 8 9

10

Next

global address list microsoft excel macro Search


Search within results Search Help Give us feedback Google Home Advertising Programs Business Solutions Privacy About Google

ManningB_00210984
Report of Supply Annex NIPR F0U0//LES

Appendix L

FOUO//LES

ROl 0028-10-CID221-10117 CAF 0028-10-CID361

Web imaaea videos Macs News Shopping Gmail more


Google

Web History j Search settings j Sign in

global address list macro outlook Search! satesearchstrict T


About 174,000 results (0.32 seconds) Advanced search

Everything More
Show search tools

VBA Express : Excel - Extract Email Data From O u t l o o k G l o b a l . . .


Extract Email Data From O u t l o o k G l o b a l A d d r e s s L i s t - G A L Extracts the detailed ... Run the m a c r o by going to Tools M a c r o M a c r o s and double-click GetGAL ... www vbaexpress.com/kb/getarticle.php?kbjd=222 - Cached - Similar

[SOLVED] Read details from G l o b a l A d d r e s s Book in O u t l o o k into ...


6 posts - 2 authors A d d r e s s L i s t Set outApp = CreateObject("Outlook.Application") Set outNS = outApp. GetNamespaceC'MAPI") Set myAddressList = outNS.Session.AddressLists("Global ... www.excelforum.com/. ./715057-read-details-from-global-address-book-in-outlook-intoexcel.html - Cached

O u t l o o k M a c r o to get Exchange Info from Mail, help. FAQ, forums ...


13 Apr 2010 ... Hi, I'm working on a m a c r o in O u t l o o k 2003 SP3 that, when started, ... You can get the Exchange G l o b a l A d d r e s s L i s t as a member of the ... us.generation-nt.com/outlook-macro-get-exchange-info-mail-help-197240591.html

O u t l o o k - New Message with Completed From Field | Amset.info


Creating M a c r o s in O u t l o o k is very easy. Choose Tools, M a c r o , M a c r o s , .. is visible in the G l o b a l A d d r e s s L i s t OR is in the user's personal contacts. ... vww.amset info/outlook/newmessagemacro.asp - Similar

o u t l o o k g l o b a l a d d r e s s l i s t in listbox - Excel Help & Excel M a c r o Help


20 Apr 2006 ... I'm looking to import names from my o u t l o o k g l o b a l a d d r e s s l i s t into a list o r . . . ALWAYS run an up-to-date virus scan ancj disable m a c r o s . ... www.ozgrid.cxim > ... i Excel and/or Email Help - Cached - Similar Looking Up Names In A G l o b a l A d d r e s s Book - 14 May 2008

Opening Outlook Address Book - is Aug 2006


Open O u t l o o k & G l o b a l A d d r e s s Book - Microsoft Excel Training ... - 1 Sep 2005 import o u t l o o k contact objects from gloabal a d d r e s s l i s t to ... - 16 May 2005 More results from ozgrid com

Converting Addresses
Netscape 4/6/7; Thunderbird; Exchange GAL; O u t l o o k contacts; .... cc:Mail distribution lists, Microsoft Exchange Server GAL, Excel M a c r o for Migration of www.slipstick com/config/convaddr.htm - Cached - Similar

Accessing G l o b a l A d d r e s s L i s t details with VBA - The Code Cage Forums


11 Feb 2010 ... O u t l o o k M a c r o ' s & VBA>Accessing G l o b a l A d d r e s s L i s t details with VBA ... name in the G l o b a l A d d r e s s L i s t . The purpose is to retrieve a few ... www.thecodec%ige.com/.. o u t l o o k m a c r o s ./178691 accessing g l o b a l a d d r e s s l i s t details-visual-basic-applications.html - Cached - Similar

MS Outlook How-to Articles


OL2000 How to Assign a M a c r o to a Shortcut Key (0252427) XCLN How to Use the O u t l o o k LDAP Service to View the G l o b a l A d d r e s s L i s t (Q245830) ... www.kayodeok.btinternet.co uk/ /kbofficeoutlookhowto.htm - Cached - Similar

HELP !! Need to create an O u t l o o k Reply M a c r o - MrExcel Message Board


3 posts - 3 authors - Last post: 15 Jul 2003 HELP II Need to create an O u t l o o k Reply M a c r o Excel Questions. ... AddressLists( "Global A d d r e s s List") Application. ...

ManningB_00210985
Report of Supply Annex NIPR

F0U0//LES PROSECUTION EXH1I:: i PAGE OFFERED: P A^ PAGE OF PAGES

ntiiication FTED:

ROI0028 10 CIO22110117 Appendix 1 ^ FOUO^^I^ES CAF 0028 10 0103^1

wwwmrexcelcom^

.^Question Forums^Excel Questions-Cached

Similar

VBA/CDO

Access querying the O u t l o o k A d d r e s s Book

VBForums

4 p o s t s - 2 a u t h o r s - L a s t p o s t : 13Nov 2009 My solution was for Access to tap into the O u t l o o k GAL (Global A d d r e s s List) ...it would almost be the same as writing an O u t l o o k m a c r o . . . . www.vbforums.com/showthread.php'^t^591367 Cached

Searches related to g l o b a l a d d r e s s l i s t m a c r o o u t l o o k
global adc:lress list global address list e x c e l global address list I d a ^ i m p o r t global address list outlook e x p o r t global address list outlook u p d a t e global address list outlook outlook global address list d e f a u l t ^ r i ^ t global address list outlook

3 4

5 6

8 9 10

l^ext

global address list macro outlook Search


Search within results Search Help Give us feedback Google Home Advertising Programs Business Solutions Privacy About Google

ManningB^002^098^
Report ofSupply Annex NIPR FOIJC^^^I^ES

'

Appendix L

FOUO//LES

ROl 0028-10-CID221-10117 CAF 0028-10-CID361

Web Images videos Maps News Shopping Gmail more Google

Web History | Search settings | Sign in

vba outlook write text file


About 231,000 results (0.26 seconds)

Search
Advanced search

SafeSearch strict

Everything More All results Page previews More search tools

V B A create t x t f i l e and field lengths - Excel Help & Excel Macro Help
26 Apr 2006 ... Count' W r i t e current cell's t e x t to f i l e with quotation marks. ... O u t l o o k RSS Feed Discussions, Optimizing V B A Code, PowerPoint RSS Feed ... www.ozgrid.com > ... > HELP FORUMS > EXCEL HELP - Cached - Similar

Write Array To Text File On Single Line -14 Apr 2008


Manipulate t e x t f i l e using V B A - 15 Jul 2006 [Solved] VBA: w r i t e a line from Excel to a t e x t f i l e - 6 Oct 2003 V B A : Writing to disk - 3 Aug 2003 More results from ozgrid.com

Writing email messages to flat f i l e s in O u t l o o k with V B A - Stack ...


OpenTextFile("C:\Outputfile.txt", ForAppending, True) ts.Write(objMail. ... Browse other questions tagged o u t l o o k v b a flat-file email or ask your own ... stackoverflow com/., /writing-email-messages-to-flat-files-in-outlook-with-vba Cached - Similar

Writing V B A code for Microsoft O u t l o o k


Among the useful procedures that you can w r i t e with O u t l o o k V B A are: manipulation; How to Send a Range of Cells Using V B A - using the ... www.outlookcode.com/article.aspx?ID=40 - Cached for t e x t f i l e

Code Samples
59, VBS, V B A , Importing Contacts from a T e x t File into O u t l o o k . Updated ... The TypeText method is used to w r i t e data to the letters. ... www.helenfeddema.com/CodeSamples.htm - Cached - Similar

O u t l o o k Tips: Using V B A to Manage Your O u t l o o k Email Attachments


O u t l o o k V B A code can be distributed using COM Add-ins but this is beyond the can download a t e x t f i l e that can be imported into your host program ... www.fontstuff.com/outlook/oltut01.htm - Cached - Similar You

O u t l o o k V B A brings up addin error, help. FAQ, forums, question ...


7 May 2010 ... O u t l o o k V B A brings up addin error : I know that it is bad form to post a question ... T X T f i l e on the desktop. It runs OK on my O u t l o o k 2003, but when run on my ... ' w r i t e the unsubs to t e x t f i l e ObjFile.WriteLine obj. ... us.generation-nt com/outlook-vba-brings-up-addin-error-help-51868212.html

All projects - o u t l o o k v b a mailitem t e x t f i l e body - Freelancer.com


See more: o u t l o o k v b a extract text, v b a merge t e x t f i l e , read email body o u t l o o k v b a , .... Minor change to w r i t e t e x t f i l e (asp or other), 2, $30 . ... www.freelancer.com/.. /outlook-vba-mailitem-text-fiie-body.html - Cached

Saving O u t l o o k Email As T e x t File Extract in Programming-VBA


3 posts - 2 authors - Last post: 6 May Does anyone know how to configure O u t l o o k (VBA approach would be fine) ... be extracted to a directory as a t e x t f i l e and then the O u t l o o k ... www.microsoft.com/. ./default aspx?...outlook...vba... - Cached

Visual Basic :: MS O U T L O O K VB/VBA &gt:&lt: Pull A Person's ...


We need some V B A work that will interface with O u t l o o k or MS Exchange server and pull a person's calendar and w r i t e in a t e x t f i l e . ... www.bigresource.com/VB-MS-OUTLOOK-VB-VBA-gt-lt-pull-a-person-039-s-calendarand-write-in-a-text-file--BZChABTzzn.html - Cached - Similar

Solved: O u t l o o k Body Text to T e x t File. Scripting and Guard Issues ... ManningB_00210987
Report of Supply Annex NIPR F0U0//LES P R O S E C U T I O N E X H I H ^ T j H 6 f o r idjjrfti n c a t i o n

PAGE OFFERED: PAGE ADMITTED: PAGE OF PAGES

Appendix L

FOUO//LES

ROl 0028-10-CID221-10117 CAF 0028-10-CID361

25 May 2007 ... Solved: O u t l o o k Body Text to T e x t File, Scripting and Guard Issues . As for the 'need to approve the saveas/ file w r i t e to have access to ... www.vbaexpress.com/forum/showthread.php?t=13006 - Cached

Searches related to v b a o u t l o o k w r i t e t e x t f i l e
vba outlook m a i l i t e m vba m a c r o outlook vba e x c e l outlook vba outlook f o l d e r vba outlook a t t a c h m e n t s

vba outlook Inbox outlook automation vba


outlook vba s c r i p t

1 2 3 4 5 6 7 8 9

10

Next

vba outlook write text file


^ ' rmmfrmw

Search

Search within results Search Help Give us feedback Google Home Advertising Programs Business Solutions Privacy About Google

ManningB_00210988
Report of Supply Annex NIPR FOUO//LES

(b)(6)

(b)(6)

John MSG MNF-1 EOO C h r i s t o p h e r SPC lAAB S2 ANALYST Rayn R MAJ BUCCA JIDC OIC Guy 0 ISG 155th ICTC Ryan E SSG 306th MP BN John W SPC 328th MP CO S a l l y p o r t Lena C I T I SOFTLEIZ NCOIC M i c h a e l W SPC 4/2 HHC S6 Shawn H SPC MNC-I 86 CSH L i g h t Wheeled Mech Tasha R SSG M i s s i o n COR T r a c y H SGT PLL C l e r k Zachary J PFC 0 1 1 4 t h IN SDC Guard J e s s i c a L SGT 2 5 9 t h CSSB HR SPEC Thomas J. AlC USAF 532 ESFS S e c u r i t y Force USA Muhammad SGT 702d BSB SPO M o r t u a r y A f f a i r s Ryan V, CPO,NPOB-5 Olasunkanmi SPC Gl USO-C, B CO G-1 S t r e n g t h C l e r k I s s a F DOD MNF-1 FBI Hassan F CIV MNC-I IgATF SYColeman M i l i t a r y A v i a t i o n Adv j , T a i t u s i T LT 4 t h Royal Tonga Marines Troy 0 SGM MNFI CJ9 CPIC N i c h o l a s CPT MND-B (ICD) OSTB 0 Troop COR Jeanne M CPT 328th BSB S-4 Cesar SFC MNF-I 632 M a i n t Juan R M i c h a e l 0 MAJ MNC-I 732 ECES FED Team Robert A 126th BOB FLE Cortnee 0 SPC MNFI CJ9 STRATCOMM J o e l SPC HHC 2-25 1-14 BN RTO Thomas MIU SFC JASG-C 50TH C r a i g ISG USA 5 0 t h Eng Co Blake 0 PFC lOTH CSH A d r i e n n SGT MND-B (ICO) CMD GROUP ADMIN ASSISTANT TO CG M i c h a e l E ILT 6-8 CAV A-TRP P l a t o o n Leader M i c h a e l J LTC 30 ESC CALL USA Timothy CTR MRAP BALAO I, M i c h a e l TSgt 732 ECES DET 10 V e h i c l e M a i n t Craftsman I, M i c h a e l SGT 2-141N PSYOP Team Ray C MAJ JCCI I r a q C o n t r a c t i n g O p e r a t i o n s "Claxton T CPT USA 5 1 s t ESB B CO Commander John W J r MNSTC-I J-4 C a r l A SGT MNF-1 2510 SYSTEM SUPPORT SYSTEM SPEC. V e r o n i c a L. PFC IHBCT 310 BDE S-1 AWARDS CLERK Wesley SGT 362 PSYOP A s s i s t a n t Team Leader James CPT 54/6 MiTT 4/2SBCT Jamie R SGT HHC 56 SBCT Human Resources F r a n c i s SSG 60th ORD CO S e c t i o n C h i e f I, Eugene SFC 421st MMB M i c h a e l R SFC TF 49 82 S e n i o r I n t e l l i g e n c e A n a l y s t V e r o n i c a N PFC Finance CVS C l e r k David SGT 101 ENG BN 2nd PLT SQO LDR J u s t e e n 0 PFC 536th MC TMDE T e c h n i c i a n Dusan LTC CZR NTMI NATO
-393-

,i

PROSECUTIONI f ; ' PAGEOFFERED: PAGE OF_PAGES

|y%r

iCiT/ '<n2:on

ADtVlfTTED:

UNITED STATES OF AMERICA STIPULATION OF EXPECTED TESTIMONY Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211 Mr. James Downey June 2013

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that ifMr. James Downey were present to testify during the merits and pre-sentencing phases of this courtmartial, he would testify substantially as follows. 1. I work at Defense Information Systems Agency (DISA), Fort Meade, Maryland. Specifically, I am a part of the Program Executive Office for Mission Assurance (PEO-MA) and Network Operations. I am the program manager for attack analysis. I have held this position since 2007. I hold the Global Information Assurance Certification (GIAC) security leadership certification (GSLC), and I am a certified ethical hacker. 2. The PEO-MA department, where I currently work, provides program management for various programs that help secure the IT information within the Department ofDefense (DoD). Within PEO-MA, I work for the Community Data Center (CDC). The CDC hosts a set of tools used by people who secure DoD networks. We host enterprise level Information Assurance (IA) tools and net defense tools, which enable analysts to basically ensure the availability and integrity of the networks that DISA provides for DoD. "Enterprise tools" are those which are capable of handling the amount of data we deal with and the large and complicated networks with which we work. Since DISA is like an intemet server provider for DoD, we operate on a scale which is much larger than what the commercially available tools are designed to handle. A "tool" is just what it sounds like - something that allows us to do our network management job. Usually, it is information or a way of processing or gathering information. 3. The tool relevant to this case is the data we use called Netflow data. This is a type of data which was developed by Cisco, but which is now industry standard. With it, we can capture the Intemet Protocol (IP) addresses of two computers communicating across the system, as well as the volume of traffic which flows between them. We use YAF to collect this data. YAF stands for "yet another flow meter". This tool was developed by Carnegie Mellon and is the industry standard. Just like any meter, it measures and then creates a data record of the flow past a data collection point. A point of collection is any of the various monitoring points we have stationed at key perimeter locations throughout the network; for example, where a DoD network crosses or cormects to the commercial world. These points monitor all traffic, or computer to computer communication, crossing from one side of the router to another. Our system would "see" when someone is on a work computer browsing internet websites like yahoo while on NIPRNET or the United States Central Command Server from a computer in Iraq while on SIPRNET. The system detects the capacity being used during that communication and at that location. This information can communicate whether something is being downloaded onto that computer. We collect PROSECUTION EXlir'T JHiJc PAGE OFFERED: _ _ r \pL /^D PAGE Or VUCES

Netflow data on NIPRNETand SIPRNET. There are relatively few routers collecting Netflow data throughout the entire SIPRNET. Because this system only collects information passing from one side ofthe router to another, it does not collect Netflow data passing withinanetwork that does not cross throughacollecting router. Forexample, ifacomputer is communicating withaserver or another computer within the Iraq SIPRNETdomain, that activity would not be captured in Netflow data, because the connection and data does not cross through the Iraq SIPRNETdomain router, but rather stays within the Iraq SIPRNETdomain network. ^, Wecollect this Netflow data for several reasons, First,weusethe data to conduct traffic analysis. It allows our analysts to see where they need to deploy additional capacity in the DoD network. For example, ifone segment ofthe system is getting more traffic than another, it may needalarger router. This type ofwork falls within the purview ofthc:^se CDC analysts working on network operations and maintenance. These analysts focus on maintaining the availability, robustness, and proper ftinctioning ofthe Netflow data. They ensure that the system is collecting data correctly,that it is securely transported and stored, and that the system used to access the information is on line andfi^nctioningproperly. Another section however uses the Netflow data to defend the DoD network fiom threats. For example, ifaregular DoD user hasavirus on his/her computer that tries to connect toamalicious computer outside the network, our tools enable our analysts to detect that and take the offending computer offline. This section can investigate suspicious activity. Iwork in the section that manages the delivery of CDC capabilities. Finally,we also haveagroup using the Netflow data to do research and developmenL The Research and Development grc:^up analyses the data to try and find pattems which might help them identify behavior going on that we do not currently haveameans of detecting. For example,with older viruses it^seasy to know when something has been infected, but newer ones can be more cautious in how they operate. By looking at pattems over time, our analysts might be able to see something that helps them find compromised computers in the network before the virus infects others. ^. CENTAUR is what we call the system we use to track the Netfiowdataljust described. It is one of the systems with whichlwork in the PEOMA. ACENTAUR log is the data output from our Netflow data system. Ibecame involved in this case after DISA launched an audit initiative focused on integrating and analy;^ing multiple data sources to identify and track potential insider threats on SIPRNET. Because of my job,lam familiar with the Netflow data CENTAUR generates fbr SIPRNET. Ireceivedarequest to pull the CENTAUR logs showing communication between three SIPRNET IPs and foraspecific period oftime. The date range of interest was October 200^ to May2010. Investigators were interested in the following IP addresses: 2222^2^1^^,2222^B1122,and2222^BUB10 ^. Tolook at the CENTAUR data fiom SIPRNET,analystsuseatool developed by Camegie Melon, called SIE^^System for Intemet Eevell^nowledge. Once gathered, the CENTAUR log can show certain pieces ofinformation. Iwill explain how to read the CENTAUR logs by way ofexample with the following log:
sIP 204.37.126.39 dip 22.225.41.40 sPort 80 dPort 2641 pro 6 packets 1379 bytes 1305267 flags FS PA sTime 2009/12/19101:41:43.633 dur 112.650 eTime 2009/12/19101:43:36.283 sensor SPESMEC

a. The "sIP" is the source IP. It is the Intemet Protocol (IP) address ofthe computer that initiated the conversation that log line is tracking. A"conversation"isaset of transactions that has in common the same source and destination IPs and ports and which occurs within the same ^ timefiame. In the above example, 22.22^.^1.^0(the destination IP addressed) received ^^^^^ inlormation fiom the sending IP address,which is 20^.37.12^.3^. Proseeution Exhibit ( P E ) ^ ^ for Identifieation isalist of many of the organisations who are associated with or own the IP addresses searched bythe 22.22^.2^1^^,22.22^.^1.22, and22.22^.^1.^0 IP addresses b. The "dIP" or destination IP is the IP address for the computer that received the data fi^om thesIP ThedIPintheaboveexampleis2222^B11B10 c. The "sPort" is the port that the sIP was using to communicate. Aportitselfisawaythe computer can carry on multiple conversations onanetwork at the same time. You can think ofit likeamail slot oraparticular channel thatacomputer uses to holdaconversation. ThesPortin the above example is ^0. sPort code ^0 indicates all intemet web traffic, including browsing on the web. d. The "dPort" is the destination port. This is the port the dIP was using to communicate. Essentially it is the computer which received the conversation. The dPort in the above example is2^^E e. The log item "pro" standsfi^rprotocol. The protocol is the convention, or language, which the two computers were using to talk to one another. The number"^" is theTransmission Control Protocol (TCP). TCPisalanguage, TCP is the dominant protocol, l o w i n g the protocol is important because it tells you the kind ofconversation the two logged IP addresses were having. For example, another protocol is the number"1"forICMP. Protocols likeTCP are generally used by users to generate and receive data. Protocols like ICMP are used by computer systems to report back on status or to support other protocols. f "Packets" are the chunksacomputer breaks information up into in order to transmit it across the network. The ratio ofpackets to bytes for example can tell analysts about the nature of the conversation occurring: essentially,packets communicate complexity. Abyteissimplya unit ofmeasuring the si^e ofdata or seeing volume. Alarge number ofbytes relative to the packets meansalarge file is getting downloaded. Asmall byte count meansalower level form of communication. The packets in the above example is 137^. g. Abyte itselfis simplyaunit of measuring the sideof data or seeing volume. Beyond its relationship toapacket, in raw form, the byte tells exactly howmuch information was exchanged inagiven conversation. ^^Bytes^^provideastraight forward measurement ofhow much data was transmitted,where the packets can tell you how that data was transmitted. The bytes in the above example is 130^2^7. h. "sTime" is the time the communication between IPs started. In the above example the particular communication between 20^.37,12^.3^ and 22.22^.^1,^0 started at 200^^12^1^T01:^1:^3^33

i. The column labeled "dur" is its duration. The duration is given in seconds. I^owingthis information is important because different durations are characteristic ofdifterent kinds of conversations. This information helps analysts like me guide our inferences about the data by providing context for the communication we are seeking to understand. Theabove communication took112.^^0 seconds to complete. j . "eTime" is the timeacommunication ends. The above communication between 20^3712^3^and2222^.^1.^0endedat200^^12^1^T01:^3:3^.2^3,whichshou1dbe112.^^0 seconds afier thesTime. k. "Sensor" means the collection point used to collect the data being communicated in the log line. It identifies the router or the sensor generating the record and basically tells us where on the network the traffic the log line describes occurred. The sensor in the above example is SPESMEC 1. Together, this information allows analysts to see the IP address ofan individual computer using the system and the complexity and volume c^finformation being communicated as well as the length oftime the computer is conducting its activity.The above log tells me that the IP address2222^B^1B10received130^2^7bytesofdatafromIPaddress20^3712^3^on1^ December 200^ 7. Aslindicated earlier, the CENTAUR log data is very useful in detecting suspicious activity. While it will not automatically alert analysts in the security section of suspicious activity,part of theirjob is to schedule scripts which look for activity. DISA also deploys detection tools at multiple locations through the network with unique signatures. These look foraparticular type ofsuspicious user activity. For example, going to known blocked websites or known malware servers is sc^mething we can detect, Whenauser takes the action that fits the signature activity, this action triggers an alert to an analyst in something close to real time. Security analysts also work off oftips. These tips can come fiom digital alerts like the onesl^ust described or fiom sources such as Information Assurance groups within DoD organisations which are responsible for their own local security. Altematively,law enforcement can request informationfic^^mour system^as occurred in this case. ^. The format in which the system returns results to our queries varies depending on the query. All of these tools run fiomacommand line using text command. The answer to the query comes back inanative binary file. But then another tool translates that automatically intoaregular text file so that it is readable byahuman. The analyst then defines which information they want to see and in what order. By "information,"lamre^rring to the termsldefined earlier, such as "sIP"and"dur." An analyst then makes the report using this data. The report includes the data and may also include the analyst^sinterpretation of what that data means,whyit^simportant, and what the context is. ^. The latter occurred in this case.When asked foracertain date range of data tied to the relevant IP addresses in this case,we pulled the data. Wefound communications for the IP addressesldiscussed earlier between November of200^ and May of2010. lam not aware of any irregularities occurring, and we did some tests to ensure the data was accurate.

10. Drastic changes in the history ofalog tell me one oftwo things. Whenalogisnot consistet^t with previous behavior overalarge period oftime, it would indicate to me that either asensor was down or the relevant computer was tumed completely off. There should always be some baseline level of activity foracomputer connected toanetwork. 11. Afier collecting the data,Isavedfilesofthe log data which were then bumedtoaCD for the investigators TheCDwasmarked "^^1^^2012, UNCEASSIFIED,hub^out^dipcsv: hub out sip.csv:spe out dip.csv:spe out sip.csv." These .csv file names represent the diflerent log data that was pulled. They show activity ofthe 22.22^.2^.1^^,22.22^.^1.^0, and 22.22^.^1.22 IP addresses as the source and destination IPs. The information was sent via tracked FedEx package to Special Agent David Shaver. The tracking number was ^7^027^^1^20.PEl^for ID istheCDcontainingthe log datalcollected.lrecogni^e thedata on the CD becauselcollected it, andlrecogni^e the logs based on the column identifiers and Familiarity with CENTAUR logs,whichIdescribed earlier. Arecords custodian attested to their authenticity on 1^June2012atBATES number: 00^^^^^3 12. At no point during my collection or transport ofthese logs didlalter them in any way, I have no reason to believe any ofmy colleagues altered the data or experienced anything out of the ordinary in collecting it. And,Ihave no reason to believe the data provided or the device on which it was stored was damaged or contaminated in any way. Finally,Iam not aware of any issue in the collection, storage, or transport ofthis information which would cause it to have been incorrectly preserved.

ANGEL M. RGAARD CPT, JA Assistant Trial Counsel

J^iVHt^^. THOMAS F. HURLEY U MAJ, JA Military Defense Counsel

BRA PFC, USA Accused

UNITED STATES OF AMERICA STIPULATION OF EXPECTED TESTIMONY Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211 Ms. Tasha M. Thian l(p June 2013

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if Ms. Tasha M. Thian were present to testify during the merits and pre-sentencing phases of this courtmartial, she would testify substantially as follows: 1. I am the Agency Records Officer, Office of Informafion Programs and Services, U.S. Department of State, In this position, I set policy and procedures for the management of records within the Department. I am the Department Official responsible for Department of State records. I am the head of a division of twenty-five employees. The duties of these employees include records analysis, website management, records scheduling activities, and records review. I am a certified records manager with thirty-one years of service with the Federal Govemment. I am responsible for the Foreign Affairs Manual and Handbook sections on records management. I have been the Agency Records Officer since August 2007. 2. A cable is an official message of the Department of State. Cables can be sent between posts or between posts and State Department headquarters. When a cable is sent, a record copy of the cable is automatically captured in the State Archiving System (SAS). The SAS contains classified cables at the Secret level and below since 1973. There are approximately 400,000 new Department cables stored in the SAS annually. 3. Cables are identified by the Message Record Number (MRN) assigned to each cable. An MRN has three parts. The first part of the MRN is the two-digit year the cable was created. The second part is the name of the post that created the cable. The third part is the sequence number of the cable. For example, 05Algiersl836 would be the 1,836th cable sent by Embassy Algiers in 2005. 4. I reviewed and printed directly from the SAS the cables (BATES numbers: 0050532800505808) listed in Prosecution Exhibit (PE)t^ for Identification. On 6 December 2012,1 also attested to the authenticity of these cables in a document with the BATES numbers: 00527342-00527346. This authentication memorandum was written on Department of State letterhead and accompanied by the Department seal and the Secretary's signature verifying my authority. With this memorandum, I attested that each of the listed records was made at or near the time of the occurrences of the matters set forth therein. Each record was made by, or from information transmitted by, people with knowledge of those matters. The records were kept in the course of the Department's regularly conducted business activities, and it was the regular practice of such business activities to make these records, I also certified that the records listed in PE lS\ifor ID are true copies of the original records contained within the files of the Department of State,

/l^

ISO for icKrat'tlcation PROSECUTION EXU ,(JE /'lOIvnYl"ED: PAGEOFFERED: PAGE OF PAGES

5, P E ^ f o r ID contains the Net Centric Diplomacy version of the above referenced cables and the same cables in Appellate Exhibit (AE) ^01. The formatting ofthe cables listed in P E ^ for ID and AE ^01 is diflerent than the cables in SAS, but the text and content are the same.

-c^
ANGEL M X O V E R G A A R D CPT, J A U Assistant Trial Counsel

^(WM^^-1{-J^
THOMAS HURLEY^ MAJ, JA Defense Counsel BRADLEY E, MANNI PFC, USA Accused

SENSITIVE BUT UNCLASSIFIED UNITED STATES OF AMERICA


V.

Charged Department of State Cables by Message Record Number

Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211 05 Algiers 1836 06 Algiers 1961 06 Baghdad 2646 06 Baghdad 4205 06 Beirut 3603 06 Beirut 3604 06 Beirut 3703 06 Belgrade 1681 06 Colombo 1889 06 Kabul 5420 06 Kabul5421 06 Kabul 5435 06 Kathmandu 3023 . 06 Kathmandu 3024 06 Kuwait 4430 06 Kuwait 4438 06 Madrid 2955 06 Madrid 2956 06 Pristina 947 06 Pristina 948 06 Riyadh 8811 06 Seoul 3882 06 Seoul 3885 06 Suva 489 06 Taipei 3830 06 Tripoli 645 06 Tripoli 648 07 Addis Ababa 2197 07 Ankara 23 07 Ankara 2468 07 Ashgabat 1359 07 Baghdad 35 07 Baghdad 36 07 Baghdad 37 07 Baghdad 42 07 Baghdad 53 07 Baghdad 56 07 Baghdad 63 07 Baghdad 64 07 Baghdad 70 07 Bangkok 111 07 Basrah 3 07 Beijing 152 07 Beirut 1958 07 Bogota 101 07 Bogota 5118 07 Bratislava 665 07 Bridgetown 23 07 Buenos Aires 1341 07 Caracas 2346 07 Caracas 35 07 Dhaka 24 07 Kabul 68 07 Kingston 25 07 Kuala Lumpur 40 07 La Paz 1949 07 Lagos 719 07 Lima 2400 07 Minsk 1024 07 Moscow 5824 07 Moscow 5825 07 New Delhi 80 07 Panama 1197 07 Panama 1198 07 Paris 4722 07 Paris 4723 07 Rangoon 22 07 Reykjavik 203 07 Riyadh 21 07 Riyadh 22 07 Riyadh 23 07 San Salvador 1375 07 Santo Domingo 28 07 Suva 18 07 Tunis 47 07 USUN New York 573 07 USUN New York 575 07 USUN New York 578 07 Vientiane 12 07 Vilnius 13 08 Amman 535 08 Cairo 569 08 Dar Es Salaam 206 08 Khartoum 246

June 2013

08 Khartoum 428 09 Addis Ababa 1063 09 Baghdad 2390 09 Bamako 85 09 Bogota 2873 09 Brasilia 1112 09 Brasilia 1113 10 Brussels 382 09 Caracas 1168 10 Geneva 347 09 Lima 1309 10 Lima 333 09 Mexico 2658 09 New Delhi 267 09 Paris 217 09 Prague 88 09 Pristina 58 09 Riyadh 1156 09 Santiago 831 09 Santiago 833 09 Santiago 835 09 Santo Domingo 1017 09 State 92632 09 State 92641 09 State 92655 09 State 92657 09 Tegucigalpa 891 09 Tegucigalpa 892 10 Pretoria 636 10 Rabat 294 10 Reykjavik 13 10 Tokyo 627 99 Islamabad 495

SENSITIVE BUT UNCLASSIFIED PROSECUTION EXHIBIT PAGE OFFERED: PAGE A D PAGE OF PAGES

Prosecution Exhibit 152 has been entered into the record as a CD/DVD and w^ill be maintained with the original Record of Trial

Prosecution Exhibit 153b 2 pages classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

Prosecution Exhibit 15^ Ipage classified "SECRET" ordered sealedfDrReason2 Military Judge's Seal Order dated20August2013 stored in the classified supplementto the original Record ofTrial

Dot 22 US DEPARTMENT OF DEFENSE WARNING STATEMENT

You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS, you consent to the following conditions: The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC, monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (Cl) investigations. At any time, the USG may inspect and seize data stored on this IS. Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception and search, and may be disclosed or used for any USG authorized purpose. This IS includes security measures (e.g., authentication and access controls) to protect USG interests-not for your personal benefit or privacy. Notwithstanding the above, using this IS does not constitute consent to PM, LE, or Cl investigative searching or monitoring of the contect of priviledged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement or details.

/O^
PROSECUTION EXH!C'T PAGE OFFERED: V PAGE OF PAGES JOT idcyiiUcation /iDMlTTED:^

Dot 139

DOD Security Banner

'^'^ATTENTIONI'^'^ This isaDOD computer system.Before processing classified information, check the security accreditation level of this system. Do not process, store, or transmit information classified above the accreditation level ofthis system.This computer system, including all related equipment, networks and network devices (includes Internet access)are provided only forauthorized U.S, Government use. DOD computer systems may be monitored for all lawful purposes, including ensuring that use authorized, for management ofthe system, to facilitate protection against unauthorized accessand to verify security procedures, survivability,and operational security,Monitoring includes, but is not limited to, active attacks by authorized DOD entities to test orverify the security of this system. During monitoring, information may be examined, recorded, copied, and used for authorized purposes. All information, including personal information, placed on or sent overthis system may be monitored. Use of this DOD computer system, authorized or unauthorized, constitutes consent to monitoring. Unauthorized use of this DOD computer system may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal, or other adverse action.'^'^Use of this system constitutes consent to monitoring for all lawful purposes.'^'^

PROS^^^^T:0^^^^^^^^^^^^ PAGEOFFERED: P/B^EADMI^TED: P^GE OF PAGES

er
(D
LD 00
ISJ

cn
NJ

O O
(JI

O O
(JI

NJ

O O

NJ

NJ

NJ

ISJ

o
Ln

O O
OJ NJ

O
O

NJ

ISJ

o o
LU
NJ

O
I-'

ISJ

NJ

o
cu

O
CJl

o
CJl

o o Ln
o
LU

o
LU
NJ VJ

LU
NJ

o
CJJ

o
CJJ NJ

LU

O
CJJ

O
00 LD

O
CJJ

Ln
ISJ CJJ

'ci m

O O

NJ

l-

o
o

(JI

CjJ M

o o

l->

Ln era O f&
3"

as
Q.

< 3
3 3

ro

as

era o 3' o C P O Q r a _ f@ fD h o

ec

c era
CD 3

b"

4
-< o
fD fD

cr a c TP
S3 II

era era
CD

ora as fD n
II
CD X fD

< < < < II < < <


(JJ CJJ CJJ

NJ

>l
l-> 1^

^
o

^ o ^
O
LU

CD (JI

P Kl)
NJ

9? 9? cn cn Ln Ln Ln Ln p M l- o Isj CJJ vo N J
O

LD

M CO

LD

eo

4^
NJ

LU

o o

'ci
<

CTl

'ci S

Ln cn C)

LU

LU

Lu

LU
y^

LU

LU

Ln Ln .> o

CTl

71

cn

s
O

71

"B

2 ^

Ql

NJ O M

NJ

C D

8 Ln
O O
(JJ NJ y-^

fD

a.

CD Q.

as
Q. 01 Q.

E.
fD Q. OJ Q.

OJ

o o

l-

QL

NJ O M

NJ M

QJ

CD

O O

OJ 3 3 3'

as

as
Q. CD

LU NJ ISJ NJ

O
M

O O Ln

CD ID < < -< < 3 3 3 3 cu OJ OJ

fD

O O

eu
3 3 3'

3 3

era era era era f f

5'
ZT

3 3 3'

3 3 3'

CJJ ISJ U3

l-> era o O LU era O f ISJ f) CJJ CO

OJ 3 3 3'

(JJ NJ NJ NJ

^ CD < 3
QJ 3 3^ Z3

8
LU ISJ NJ NJ

% ^

J % ? N O l- ? ^ o o

% as ^ ^
CD

fD O.

as
Q. OJ fD

O O

l->

i1
M ^

LU NJ NJ NJ

<

+ cr < c OJ yo 3 a. CD a fD < a.
OJ

as
3 3. 3'

O
M

a.

1 f)
cr ZT

8
LU NJ

o o

CJJ

1 f
3-

3"

CU Q. fD

3J ^

NJ CO

e u ^
fD

I?

eo

^ %

cr

l
"O

HI 3 3. 3'

era f
3"

zr

g S

OJ 3 3^ 3'

_3
tn

c c c era era era ora o CD o CD fD ora 3


3
3

era f)
3"

era o o qra_
CD

I
h o 3

-c

I
g

>~

fit
fD. ll'

era %

OJ 3 3 3'

ora

20
fD

as as n 3r
"O

cr cr
fD

ix
CD 2

fD OJ

CD OJ

-73 0 0 C NJ fD < 2L

? Ti 3
h o
Ln LO QJ II

era o o 92. as h o
in CD CU

ll
73

s f

g g g

g^

era o o 02.
fD

02. n 20 NJ O fD

3^

I 3
fD

e u

(-) o 3^
Ln fD CU

11 CD 3 tn O C

cr cr cr a 3 a c Tc c -< <
D
fD fD

--^
?

C l/l fD

20
m

D o fD
fD

c g ora era
fD 3 fD fD X fD

3" "O .D II

"O S3 II

CO

"U l/l OJ II

<

n zr
"O 3;

c era
CD 3 CT fD 2

20
in

era
fD X fD

"O

n era era era fD

cr
fO

+ m
20

O c o
fD II

II CD 3 tn O

20

< / > o c
n
CD II

20
c n

era
ID tn

\3 g

II CD 3

20
in

CD 11 3" T3

g3'

11 CD 3 tn O C

era
fD CD X fD

20
m

3"

"Vj

fD 11 3"

< o \fD g
fD

cr 20 D ^ c II
fD 3

>

g
fD

cr
c

T3

II fD 3

20
fD II OJ

era

20 CO eu

73 CD

20 Ln n O

cr

fD II 3" T3 XI II

73

CD

<
c
3
Ut

O c

1
C D in
Q. II

era m era
fD CD X fD

11

a
J3 11

f?

20

eu a
ll'

e S
eo
eu

< g

ora
CD OJ

s
11

II OJ

g" 20 ora c l/l n fD ora ca.

eo 20 t n
II II

20

a
.Q II

fD II 3-

CD

20

g era
fD

20 n

b.
Ln

g era
CD

<'
fD tn OJ

>

T\

20

20

fD CD X CD

20

fD

20
Ln

20
OJ

II NJ O in OJ II

71
II i-

as

II
m

CD X CD

20

OJ 3 II

il
m

era o cn
Ln Ln
VI

+ cu

T3 fD

in

25
OJ
ll'

QJ 3 Q.

.Q_ 11

.o
ll'

20

O S ,3

.o

,3 S

20
OJ .Q II

20
in CU II

20 20 c
IU

20

20
OJ .Q_ II

m c

.o_
II

S 11

20 era

5 r-

iL

20

20

r
3 ^

.Q II

If Bk
o -g
(7)

O 20

OJ .Q 11'

era
i-

.Q II

20

era

11
00

20

era

s?
> S?
NJ

20
OJ

CJJ

.a_
20
II

> N J
-n

-n
ISJ

^
NJ

.0 11

ora
fD

Prosecution Exhibit 15^ Ipage classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20August2013 stored in the classified supplement to the original Record ofTrial

Source IP Date Number of Log Entries 22.225.41.40 13-NOV-09 1 6 22.225.41.40 14-NOV-09 22.225.41.40 15-NOV-09 6 6 22.225.41,40 29-NOV-09 22.225.41.40 12-Dec-09 6 22.225.41.40 3-Jan-lO 2 22.225.41.40 9-Jan-lO 27 22.225.41,40 12-Jan-lO 26 22,225,41,40 13-Jan-lO 18 22,225,41.40 14-Feb-lO 76 22.225,41.40 15-Feb-lO 20 22.225.41.40 19-Feb-lO 98 22.225.41.40 20-Feb-lO 96 22,225,41,40 21-Feb-lO 14 22.225.41.40 23-Feb-lO 30 22.225.41.40 24-Feb-lO 22 22.225.41.40 12-Mar-lO 4 22,225.41,40 13-Mar-lO 8

Number of Log Entries Source IP Date 145 22.225.41.22 07-Mar-lO 30 22.225.41.22 08-Mar-10 1006 22.225.41.22 09-Mar-lO 22.225.41.22 10-Mar-lO 188 22.225.41.22 11-Mar-lO 207 22.225.41.22 12-Mar-10 32 22.225.41.22 17-Mar-lO 56 22.225.41.22 18-Mar-lO 6 42 22.225.41.22 20-Mar-lO 22.225.41.22 21-Mar-lO 56 : 22.225.41.2222-Mar-10 66 22.225.41.22 26-Mar-lO _ _ 36 22.225.41.22 27-Mar-lO 219 22.225.41.22 28-Mar-lO 52135 71494 22.225.41.22 29-Mar-10 22.225.41.22 30-Mar-lO 149406 22.225.41.22 31-Mar-lO 77573 57274 22.225.41.22 01-Apr-lO 22.225.41.22 02-Apr-lO 26156 22.225.41.22 03-Apr-lO 35855 22.225.41.22 05-Apr-lO 78738 22.225.41.22 06-Apr-lO 21815 22.225.41.22 07-Apr-lO 26 22.225.41.22 08-Apr-lO 73091 22.225.41.22 09-Apr-lO 95057 22.225.41.22 03-May-lO 53440

PROSECUTION EXHIBIT l3_for idecrdfi^imn ide^ifibtition PAGE OFFERED:_ ^/ Gi: ADMITTED:. PAGE OF PAGES

om
LO 00

en 3 ' n era o o < tn era z era o


ID CD as TJ OJ

ora
in 3"

<
3

C D ora o 3 cro_ o fD < era ora era cr 3 o OJ OJ fD OJ < in 3 p 3 < 3 in era b

fD 3

ora g < CD in era cr o o qra_

^
'tn

"> -n

o cra_
C D CfQ_

o cr
era cu
C D 3

^ a 3 C D in 3 ^ D era C o 3 z < u era 3 o n < cn


3

as

OJ

.3

Z c

o(C

o o
3 (D

eo

NJ

Ln

NJ NJ vl

CJJ VI

Ln cn
00 NJ vl 00 00

OJ vl ID Ln

o cn
vl LO lO

NJ CD O 00 Ln eo O

cn Ln I D NJ o O l O t- en cn o o Vj

vl O NJ NJ 00 00

en cn LU v l OJ
Ln

NJ Ln Ol 00 NJ NJ

eo en
00 NJ I-i 00

cn o o
NJ

o o

o I-* en en
00 LD CO ISJ

^
e/i

eo o o b en on ISJ eo LO NJ 00

NJ

vJ

00

2 o cn * cn cn V I C O Lu v l Lu bo cn cn 00 cn 00 NJ

NJ Ln

NJ Vj

PROSEC^JTiON E^ir r: PAGEOFFERED: PAGE OF PAGi

l(o for

Number 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46

Dates Present Dates Missing 19-NOV-09 20-NOV-09 l-Dec-09 21-NOV-09 3-Dec-09 22-NOV-09 4-Dec-09 23-NOV-09 5-Dec-09 24-NOV-09 19-Dec-09 25-NOV-09 1-Jan-lO 26-NOV-09 2-Jan-lO 27-NOV-09 28-NOV-09 3-Jan-lO 4-Jan-lO 29-NOV-09 5-Jan-lO 30-NOV-09 6-Jan-lO 2-Dec-09 7-Jan-lO 6-Dec-09 8-Jan-lO 7-Dec-09 9-Jan-lO 8-Dec-09 11-Jan-lO 9-Dec-09 12-Jan-lO 10-Dec-09 13-Jan-lO ll-Dec-09 14-Jan-lO 12-Dec-09 16-Jan-lO 13-Dec-09 17-Jan-lO 14-Dec-09 18-Jan-lO 15-Dec-09 19-Jan-lO 16-Dec-09 20-Jan-10 17-Dec-09 21-Jan-lO 18-Dec-09 22-Jan-lO 20-Dec-09 23-Jan-lO 21-Dec-09 24-Jan-lO 22-Dec-09 25-Jan-lO 23-Dec-09 26-Jan-lO 24-Dec-09 27-Jan-lO 25-Dec-09 28-Jan-lO 26-Dec-09 29-Jan-lO 27-Dec-09 30-Jan-10 28-Dec-09 31-Jan-lO 29-Dec-09 1-Feb-lO 30-Dec-09 2-Feb-lO 31-Dec-09 3-Feb-lO 10-Jan-lO 4-Feb-lO 15-Jan-lO 5-Feb-lO 2-Apr-lO 6-Feb-lO 3-Apr-lO 7-Feb-lO 4-Apr-lO 8-Feb-lO 5-Apr-lO 9-Feb-lO 6-Apr-lO lO-Feb-lO 8-Apr-lO 11-Feb-lO 9-Apr-lO

PROSECUTION EXinn;T /4(_for idemsfication PAGEOFFERED: KT/JDMITTED: PAGE OF PAGES

Number Dates 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92

Present Dates 12-Feb-lO 13-Feb-lO 14-Feb-lO 15-Feb-lO 16-Feb-lO 17-Feb-lO 18-Feb-lO 19-Feb-lO 20-Feb-10 21-Feb-lO 22-Feb-lO 23-Feb-lO 24-Feb-lO 25-Feb-lO 26-Feb-lO 27-Feb-lO 28-Feb-lO 1-Mar-lO 2-Mar-lO 3-Mar-lO 4-Mar-lO 5-Mar-lO 6-Mar-lO 7-Mar-lO 8-Mar-lO 9-Mar-lO lO-Mar-lO 11-Mar-lO 12-Mar-lO 13-Mar-lO 14-Mar-lO 15-Mar-lO 16-Mar-lO 17-Mar-lO 18-Mar-lO 19-Mar-lO 20-Mar-10 21-Mar-lO 22-Mar-lO 23-Mar-lO 24-Mar-lO 25-Mar-lO 26-Mar-lO 27-Mar-lO 28-Mar-lO 29-Mar-lO

Missing lO-Apr-10 11-Apr-lO 12-Apr-lO 13-Apr-lO 14-Apr-lO 16-Apr-lO 17-Apr-lO 18-Apr-lO 19-Apr-lO 20-Apr-lO 21-Apr-lO 23-Apr-lO 24-Apr-lO 25-Apr-lO 26-Apr-lO 27-Apr-lO 28-Apr-lO 29-Apr-lO 1-May-lO 3-May-lO 5-May-lO 18-May-lO 20-May-10 22-May-lO 24-May-lO 26-May-lO 28-May-lO

Number Dates Present Dates Missing 93 30MarlO 94 31MarlO 95 lAprlO 96 7AprlO 97 ISAprlO 98 22AprlO 99 30AprlO 100 2MaylO 101 4MaylO 102 6MaylO 103 7MaylO 104 8MaylO 105 9MaylO 106 lOMaylO 107 llMaylO 108 12MaylO 109 13MaylO 110 14MaylO 111 ISMaylO 112 16MaylO 113 17MaylO 114 19MaylO 115 21MaylO 116 23MaylO 117 25MaylO 118 27MaylO 119 29MaylO

Prosecution Exhibitl^2b ^pages classified "SECRET" ordered sealed fDrReason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplementto the original Record ofTrial

Prosecution Exhibitl^3b ^pages classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplementto the original Record ofTrial

Prosecution Exhibitl^^ Ipage classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplementto the original Record ofTrial

Name Q osc_youtube-cnn. wmv Zone. Identifier 12 JUL 07 CZ ENGAGEMENT ZONE 30 GC Anyone.avi

File Created 06 Apr 10 18:24:16 12 Apr 10 16:06:06

Q osc_youtube-cm. wmv

PRC' !'/ C PAGE

!\^(f%a!0^ r^^i<AliTED: GF i Aui

Prosecution Exhibitl^^ 3pages classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl^^ ^pages classified "CO^EIT^E^TJ^E" ordered sealed forReason3 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibit 168 have been entered into the record as a CD/DVD and will be maintained with the original Record of Trial

Prosecution Exhibitl6^b 26 pages classified "CO^EJE^E^TJ^E" ordered sealed fDrReason3 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl6^c 126 pages classified "CO^EIE^E^TI^E" ordered sealed for Reason3 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplementto the original Record ofTrial

Prosecution Exhibitl^Ob lOpages classified "COl^EJE^E^TJ^E" ordered sealed for Reason3 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplementto theoriginal Record ofTrial

ProsecutionExhibitl^Oc LOpages classified "CO^EJE^E^TJ^E" ordered sealed for Reason3 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplementto the original Record ofTrial

Prosecution Exhibitl^lb 8pages classified "SECRET" ordered sealed fDrReason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl^lc 26 pages classified "SECRET" ordered sealed fDrReason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl^2b 5pages classified "CO^EJE^E^TJ^E" ordered sealedfDrReason3 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplementto the original Record ofTrial

Prosecution Exhibitl^2c 13 pages classified "CO^EJE^E^TJ^E" ordered sealed for Reason3 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplementto the original Record ofTrial

Prosecution Exhibitl^3b 31pages classified "SECRET" ordered sealedfDrReason3 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl^3c l^^pages classified "SECRET" ordered sealed forReason3 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl^^b 3pages classified "SECRET" ordered sealed fDrReason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl^^c 36 pages classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

UNITED STATES OF AMERICA

v.
Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort .Myer, Virginia 22211

) ) ) )

) ) ) ) )

STIPULATION OF EXPECTED TESTIMONY

llnehtlrqed t!t1blt5
DATED:

AMB Stephen Seche

June 2013

(U) It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if Ambassador (AMB) Stephen Seche were present to testify during the merits and pre-sentencing phases of this comi-mmiial, he would testify substantially as follows:

!. (SBU) Although not within PEIJsKfor ID or AE 501, I also reviewed the following cables.
2. (SBU) The next cable is 09 State 15113.

PROSECUTION EXHTPlT _l]l\Q_for identification PAGE OFFERED: __ Fi\Cil\ ADMITTED:__ PAGE_ _m__I'AGm;

6. (SBU) The next cable is 09 Doha 214.

//ORIGINAL SIGNED// ANGEL M. OVERGAARD CPT,JA Assistant Trial Counsel

//ORIGINAL SIGNED// THOMAS F. HURLEY MAJ, JA Militmy Defense Counsel

//ORIGINAL SIGNED// BRADLEY E. lviANNING PFC, USA Accused

Prosecution Exhibitl^5b 13 pages classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl^5c ^6 pages classified "SECRET" ordered sealed f^rReason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl^6b 2^pages classified "SECRET" ordered sealed fDrReason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl^6c pages classified "SECRET" ordered sealed fDrReason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

(b) (1) (B)

UNITED STATES OF AMERICA

v.
Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211

STIPULATION OF EXPECTED TESTIMONY AMB Marie Y ovanovitch

J7 June2013

(U) It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if Ambassador (AMB) Marie Yovanovitch were present to testify during the merits and presentencing phases of this court-martial, she would testify substantially as follows.

I. (U) The United States Department of State (DoS) is led by the Secretary of State. There are six Under Secretary Offices that work for the Secretary of State. One of those Under Secretaries is for Political Affairs. The Under Secretary of Political Affairs serves as the day-to-day manager of overall regional and bilateral policy issues. The Under Secretary of Political Affairs oversees seven bureaus which are headed by Assistant Secretaries. Those bureaus are African Affairs, European and Eurasian Affairs, East Asian and Pacific Affairs, Near Eastern Affairs, South and Central Asian Affairs, Western Hemisphere Affairs, and International Organizations. The Assistant Secretaries of the geographic bureaus and offices advise the Under Secretary and guide the operation of the U.S. diplomatic missions within their regional jurisdiction. They also determine and implement policy. Each bureau has a Principal Deputy Assistant Secretary (PDAS) and several Deputy Assistant Secretaries (DAS). The PDAS is the lead DAS, all of whom assist theA/Sin the development and management of U.S. policy concerning the Bureau. The DAS's review all paperwork, background information, disciplinary issues, and policy directives.
2. (U) I am the Acting Assistant Secretary (AA/S) and the PDAS of the Bureau of European and Eurasian Affairs. I have been the AA/S for European and Eurasian Affairs since March 2013. I have been the PDAS for European and Eurasian Affairs since September 2012. Before that, I served as the Bureau's DAS responsible for issues related to the Nordic, Baltic, and Central European countries from June 2011 to September 2012. From 2008 to 2011, I was the Ambassador to the Republic of Armenia. An Ambassador is the President's representative that manages employees and relations with that country. From 2005 to 2008, I was the U.S. Ambassador to Kyrgyzstan. Before that, I was the Executive Assistant for U.S. Political Affairs from 2004 to 2005. From 2001 to 2004, I was the Deputy ChiefofMission (DCM) of the U.S. Embassy in Kyiv, Ukraine. In 2000, I attended the Navy War College (NWC). From 1998 to 2000, I was Deputy Director of the Russia desk. From 1996 to 1998, I worked in Ottawa at the U.S. Embassy. From 1993 to 1996, I worked at U.S. Embassy Moscow. From 1992 to I993, I studied Russian at the Foreign Service Institute (FSI). From 1991 to 1992, I worked at the Office of European Security Affairs. From 1990 to 199I, I worked in the Operations Center, which is the nerve center ofDoS. From 1988 to 1990, I worked at the U.S. Embassy in London. From 1986 to 1988, I worked at U.S. Embassy Mogadishu. I have been with DoS since 1986. I have a Master's of Science from the NWC. 1 am also a graduate of Princeton University where I earned a Bachelor's of Arts in History and Russian studies. I have briefed Congress on
(b) (1) (B)

PROSECUTION EX!!lrliT ll"'for identification PAGE OFFERr\D: FiiCil~Ai)l'vllTTED:

PAGE_ _OF_____i;\(3ES

~ '"~

(b) (1) (B)

European and Eurasian Affairs because of my expe1tise on European and Eurasian Affairs. I also speak Russian. 3. (U) The Bureau of European and Eurasian Affairs develops and implements U.S. foreign policy in Europe and Eurasia. The Bureau promotes U.S. interests in the region on issues such as international security, NATO, coordination with the European Union and other regional organizations, support for democracy, human rights, civil society, economic prosperity, counterterrorism, and nonproliferation. The countries are our oldest allies and they are platforms for handling issues all over the world. 4. (U) The embassies communicate what is occurring in the host nations through many different means. Issuing a cable is an official communication by the Embassy or organization. Typically, the Ambassador or Deputy Chief of Mission (DCM) sign off as the originator on the cables because they are in charge of the embassy or organization. Generally, cables are issued to summarize meetings and note significant events in the host country, and often contain the analysis and comment of the author. The cables are issued with distribution captions that, to varying degrees, limit who can see them. One of those captions was SJPDIS. The SIPDIS caption indicated that a cable was approved for SIPRNET distribution for access by appropriately cleared individuals U.S. Originators can limit distribution through other captions such as STADIS, which would limit distribution to DoS personnel only, or limit distribution to the addressee of the document with a NO DIS caption. 5. (SBU) The first cable is 10 Reykjavik 13.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

9. (SBU) The next cable is 06 Belgrade 1681.

(b) (1) (B)

(b) (1) (B)

3
(b) (1) (B)

(b) (1) (B) (b) (1) (B)

(b) (1) (B)

13. (SBU) The next cable is 06 Madrid 2955.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

17. (SBU) The next cable is 06 Madl'id 2956.

(b) (1) (B)

5
(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

21. (SBU) The next cable is 06 Pristina 947.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

25. (SBU) The next cable is 06 Pristina 948.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B) (b) (1) (B)

(b) (1) (B)

(b) (1) (B)

29. (SBU) The next cable is 07 Ankara 23.


(b) (1) (B)

8
(b) (1) (B)

(b) (1) (B) (b) (1) (B)

(b) (1) (B)

(b) (1) (B)

33. (SBU) The next cable is 07 Ankara 2468.

(b) (1) (B)

9 (b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

37. (SBU) The next cable is 07 Bratislava 665.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B) (b) (1) (B)

(b) (1) (B)

41. (SBU) The next cable is 07 Minsk 1024.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

45. (SBU) The next cable is 07 Moscow 5824.

(b) (1) (B)

(b) (1) (B)

12
(b) (1) (B)

(b) (1) (B) (b) (1) (B)

(b) (1) (B)

49. (SBU) The next cable is 07 Moscow 5825.


(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

53. (SBU) The next cable is 07 Paris 4722.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

14
(b) (1) (B)

(b) (1) (B)

57. (SBU) The next cable is 07 Paris 4723.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

61. (SBU) The next cable is 07 Reykjavik 203.

15
(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

65. (SBU) The next cable is 07 Vilnius 13.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

69. (SBU) The next cable is 09 Paris 217.

(b) (1) (B)

(b) (1) (B)

(b) (1) (B) (b) (1) (B)

(b) (1) (B)

(b) (1) (B)

73. (SBU) The next cable is 09 Prague 88.


(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

77. (SBU) The next cable is 09 Pristina 58.


(b) (1) (B)

19
(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

81. (SBU) The next cable is 09 State 92632.

(b) (1) (B)

(b) (1) (B)

20

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

85. (SBU) The next cable is 09 State 92657.

(b) (1) (B)

21
(b) (1) (B)

(b) (1) (B)

(b) (2)

(b) (1) (B)

89. (SBU) The next cable is 10 Brussels 382

(b) (1) (B)

(b) (1) (B)

22
(b) (1) (B)

(b) (1) (B)

(b) (1) (B)

93. (SBU) The next cable is 10 Geneva 347.

(b) (1) (B)

(b) (1) (B)

23
(b) (1) (B)

(b) (1) (B) (b) (1) (B)

(b) (1) (B)

//ORIGINAL SIGNED// ANGEL M. OVERGAARD CPT, JA Assistant Trial Counsel

//ORIGINAL SIGNED// THOMAS F. HURLEY MAJ, JA Military Defense Counsel

//ORIGINAL SIGNED// BRADLEY E. MANNING PFC,USA Accused

(b) (1) (B)

24

Prosecution Exhibitl^^b 13 pages classified "SECRET" ordered sealed fDrReason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl^^c ^8 pages classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

UNITEDSTATESOF AMEIHCA STIPULATION OF EXPECTEDTESTIMONY Manning, Bradley E. PFCUSArmy, HHC,USArmyGarrison, JointBaseMyerHendersonHall FortMyer,Virginia 22211 Mr.NieholasM. Murphy ^June2013
^

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifSenior Advisor fbr the Office ofinformation Programs and Services Mr.NieholasM. Murphy were present to testify during the merits and pre-sentencing phases ofthis court-martial, he would testify substantially as follows. 1. lam currentlyaSenior Advisor with the Office ofinformation Programs and Services (IPS), Bureau of Administration, Department ofState (DoS).In this capacity,Iadviseor^ infornnation access with focused on the classification and declassification o f i n f o Since 1996,Ihavo served as the DoS Liaison to the Interagency Security Classification Appeals Panel (ISCAP) and, since 2005,lhave served as the altemate Department ofState Representative to the ISCAP. The ISCAP is the panel established by Executive Order 12958 to, among other fimctions, adjudicate the denial ofaccess to classified information requested under the mandatory review provisions ofthe E.O. Prior to this,IservedasaForei^n Service Officer with service inTurkey,Lebanon, Saudi Arabia, France, and Senegal, as wallas multiple postings inWashin^ton,D.C lhave been an employee oflPS or its predecessor organizations fbr twenty-four years, and have over forty-five years of experience in management of access to national security information, security,and intelligence, including serving as the State Department representative on the drafting committees forthe Executive Orders (E.O.)on classified national security information (E.O.12958 and E.O.13526), and their implementing directives. lhave been involved in the implementation ofthe Freedom ofinformation Act policies in the Department and have been working with classification and declassification issues since 1990. 2. lam also an Original Classification Authority(OCA) and have been an OCA fbr approximately twenty-three years. My responsibilities in that position include the review of Department State information fbr classification purposes pursuant to E.O.13526. Per E.O. 13526, Section1.3, the authority to classify information originally may be exercised only by an OCA, and must be delegated by the President, theVice President, or an agency head or designated official. 3. Information which requires protection in the interest ofthe national security ofthe United States is designated classified national security information per E.O.13526, Classified National Security Information, signed by President Obama on 29 December 2009,and fbr infi^rmafion classified prior to June 27,2010, according to E.O.12958 signed by President Clinton onApril 17,1995,as amended by President GeorgeW.Bush on March 25,2003. Information is classified in levels commensurate with the assessment that unauthorised disclosure could cause the following expected damage to national security: fbr exceptionally grave damage to national

PROSECUTIONEXHIBIT^7^foridon^catiott PAGEOFFERED: PAGEADMITTED: ^AGE OF PAGl^

security^Top Secret: fbr serious damage to national security nationalsecurity Confidential.

Secret; andfi^rdamage to

4. Within the Department ofState, classified information is handled and protected in accordance with: a. E.O.I3526(and predecessor orders)on Classified National Security information; b. Information Security Oversight Office (ISOO)Implementing Directive, Classified National Security Infi^rmation, 32 CFRParts 2001 and2003;and c. The 12th volumeofthe Foreign Affairs Manual (FAM), section 500, titled Information Security. 5. In total, five categories ofclassified information, as identified in E.O. 13526 and its predecessor E.O.^s,were included in the documentslreviewed. Because the mission ofthe Department ofState encompasses the conduct offbreign relations ofthe United States, the Department relies primarily upon two classification categories when protecting national security infbrmation,which are identified in Section1.4ofE.O. 13526 as1.4(b)(fbreign govemment information) and 1.4(d)(fbreign relations or foreign activities ofthe United States, including confidential sources). AdditionaI1y,asmall number of specific documents described below also require protection under classification categories1.4(a)(mi1itary plans, weapons systems or operations), 1.4(e)(scientific, technological or economic mafters)and 1.4(g), (vulnerabilities and capabilities ofsystems and installations). These classification categories apply to the documents in cases where the subject of the diplomatic discourse or communication also includeda discussion ofinformation related to these categories. The reason fbr classification of each cable is identified below. 6. Classified information should be handled and examined only under such conditions as are adequate to prevent unauthorized persons fiom gaining access. Classified material may not be removedfi^omdesignated work areas or moved fiom information systems, e.g., classified databases, computer networks, servers, or computers, except in the performance of official duties and tmder special conditions which provide protection forthe classified material. 7. Ireviewed the117charged Department ofState cables, or telegrams, related to this case. Specifically,lreviewed all of the cables contained in Appellate Exhihit 501 and with the BATES numbers: 00376954 00376959,00376964 00377030,00377033 00377044, 00377049 00377098,00377104 00377136,00377141 00377185,00377188 00377365, 00377370 00377391,00377395 00377424, 00377499 00377572, 00377638 00377653,and 00377660 0037767L ProseeutionExhihit(PE)^^^^^^^7^^^7/^^^7^^,^7^^ /7^c^^^^^^^^7^^ for Identification contains all ofthese documents. In consultation with the subject mafter experts in each ofthe relevant geographic and functional bureaus, as an OCA,ldetermine the following for each charged cable:

a. The10REYKJAVIK13 telegram is an official telegram from Embassy Reykjavik, dated January 13,2010to the Department ofState.This telegram is three pages. The telegram was properly classified CONFIDENTIAL underEO 13526 underSections14(b)and(d) atthe time it was generated and remained classified in the first half of2010. b. The 99ISLAMABAD495 telegram is an official telegram from Embassy Islamabad, dated January 25,1999 to the Department ofState. This telegram is six pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Section 1.4(d) in thefirstha1fof2010. c. The 05ALGIERS1836 telegram is an official telegram ftom Embassy Algiers, dated August 29,2005 to the Department ofState. This telegram is six pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions c^fth^telegramremainedclassifiedCONFIDENTIALunderE.O. 13526 under Sections 1.4(b) and(d) inthe firstha1fof2010 d. The 06ALGIERS1961 telegram is an official telegram ftom Embassy Algiers, dated November 12, 2006 to the Department ofState. This telegram is six pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Section 14(d) in the firstha1fof2010. e. The 06 BAGHDAD2646 telegram is an official telegram ftom Embassy Baghdad, dated July 24, 2006 to the Department ofState. This telegram is three pages. The telegram was properly classified SECRETunder E.O.12958 at the time it was generated. The telegram remained classifted SECRET underEO 13526 under Section14(d) in the firsthalfof2010 f The 06BAGITDAD4205 telegram is an official telegram ftom Embassy Baghdad, dated NovemberlO, 2006 to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENITIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under Section14(d)inthefirsthalfof20I0. g. The 06BEIR^UT3603 telegram is an official telegram ftom Embassy Beirut, dated c ^ ^ ^ ^ ^ ^ ^ ^ ^ovemberll,2006 to the Department ofState.^His telegram is six pages. The telegram was ^ ^ properly classified SECRETunder E.O.12958 at the time it was generated. The telegram remained classified SECRETunder E.O.13526 under Sections 1.4(b)and(d) in the first halfof2010 h. The 06BEIRUT3604 telegram is an official telegram ftom Embassy Beirut, dated November 12, 2006 to the Department ofState. This telegram is four pages. The telegram was properly classified SECRETunder E.O. 12958 at the time it was generated. The telegram remainedSECRETunderEO 13526underSection14(d)inthefirsthalfof2010. i. The 06BEIRUT3703 telegram is an official telegram ftom Embassy Beimt, dated November 27,2006 to the Department ofState. This telegram is fburpages. Portions ofthe

telegram were properly classified SECRETunder E.O.12958 at the time it was generated and portions ofthe telegram remained classified SECRETunder E.O.13526 under Section1.4(d) in thefirsthalfof2010 j . The 06BELGRADE1681 telegram is an official telegram ftom Embassy Belgrade, dated Octoberl7,2006 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) inthe firstha1fof2010 k. The 06COLOMB01889 telegram is an official telegram ftom Embassy Colombo, dated NovemberlO, 2006 to the Department ofState. Thistelegram is fburpages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b) and(d) inthe firstha1fof2010 1. The 06KABUL5420 telegram is an official telegram ftom Embassy Kabul, dated NovemberlO, 2006 to the Department ofState, This telegram is three pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 14(b)and(d) inthe firstha1fof2010 m. The 06KABUL5421 telegram is an official telegram fiom Embassy Kabul, dated November 10, 2006 to the Department ofState, This telegram is seven pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 14(b)and(d)inthefirstha1fof2010 n. The 06KABUL5435 telegram is an official telegram ftom Embassy Kabul, dated November 12, 2006 to the Department ofState. This telegram is six pages. The telegram was properly classifted CONFIDENTIAL under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b) and(d) inthe firstha1fof2010.
^

o. The 06KATHMANDU3023 telegram is an official telegram ftom Embassy Kathmandu, dated November 10, 2006 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections14(b)and(d)inthefirstha1fof2010. p. The 06KATHMANDU3024 telegram is an official telegram ftom Embassy Kathmandu, dated NovemberlO, 2006 to the Department ofState. This telegram is seven pages. The telegram was properly classified CONFIDENTIAL tmder E.O.12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d) in the first half of2010.

q. The 06KUWAIT4430 telegram is an official telegram ftom Embassy Kuwait, dated NovemberlO, 2006 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 14(b)and(d)inthefirstha1fof2010. r. The 06KUWAIT4438 telegram is an official telegram ftom Embassy Kuwait, dated November 12, 2006 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section I4(d)inthefirstha1fof2010 s. The 06MADRJD2955 telegram is an official telegram ftom Embassy Madrid, dated November 27,2006 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections1.4(b)and (d) inthe firstha1fof2010 L The 06MADRID2956 telegram is an official telegram ftom Embassy Madrid, dated November 27,2006 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) inthefirsthalfof2010 u. The 06PRISTfi^A947 telegram is an official telegram ftom US Office Pristina, dated Novemberll,2006 to the Department ofState. This telegram is six pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections I4(b)and(d)inthefirsthalfof2010. V. The 06PRISTfNA948 telegram is an official telegram ftom US Office Pristina, dated Novemberll,2006 to the Department ofState. This telegram is ftve pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b) and(d) inthe firsthalfof2010 w. The 06RlYADHI8811teIegram is an official telegram ftom Embassy Riyadh, dated NIovemberll,2006 to the Department ofState. This telegram is six pages. The telegram was properly classified SECRETunder E.O. 12958 at the time it was generated.The telegram remained classifted SECRETunder E.O. 13526 under Sections1.4(a),(b)and(d) in the first ha1fof2010 x. The 06SEOUL38S2tele^am is an official telegram ftom Embassy Seoul, dated I^ovember 10, 2006 tothe Department ofState. This telegram is three pages. The telegram was properly classified SECRETunder E.O.12958 at the time it was generated and portions of the telegram remained classified SECRETunder E.O. 13526 under Sections1.4(b)and(d) inthe firsthalfof2010

y. The 06SEOUL3885 telegram is an official telegram ftom Embassy Seoul, dated November 12, 2006 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections (b)and(d) in thefirstha1fof2010 ^. The 06SUVA489 telegram is an official telegram ftom Embassy Suva, dated November 12, 2006 to the Department ofState. This telegram is six pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 atthe time it was generated and portions e^ftfi^ telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b) and(d)inthefirstha1fof20I0 aa. The 06TAIPEI3830 telegram isatelegram ftom the American Institute Taiwan(AIT), Taipei, dated November 12, 2006 to the Department ofState. This telegram is two pages. The telegram was properly classified SECRET under E.O. 12958 at the time it was generated and portions of the telegram remained classified SECRETunder E.O. 13526 under Sections 1.4(b) and(d)inthefirstha1fof2010 bb. The 06TRIPOLI645 telegram is an official telegram ftom EmbassyTripoli, dated November 10, 2006 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 14(b)and(d)inthefirsthalfof2010. cc. The 06TRIPOLI648 telegram is an official telegram fiom EmbassyTripoli, dated NovemberlO, 2006 to the Department ofState. This telegram is fburpages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section 14(d)inthefirstha1fof2010. dd. The 07ADDISABABA2197 telegram is an official telegram ftom Embassy Addis Ababa, datedJuIy 13,2007 to the Department ofState. This telegram is seven pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions remained classified CONFIDENTIAL under E.O. 13526 under Section 1.4(d) in the firstha1fof2010 ee. The 07ANKARA23 telegram is an official telegram ftom Embassy Ankara, dated January 8,2007 to the Department ofState. This telegram is three pages. The telegram was classified CONFIDENTIAL under E.O. 12958 at the time it was generated andaportion ofthe telegram remained CONFIDENTIAL under E.0 13526underSection14(d) in the firsthalfof2010in thefirsthalfof2010 ff. The 07ANKARA2468 telegram is an official telegram ftom Embassy Ankara, dated October 4,2007 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and

portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 14(b)and(d)inthefirstha1fof2010 gg. The 07ASHGABAT1359 telegram is an official telegram ftom Embassy Ashgabat, dated December 14,2007 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and ortions of the fele^am remained classified CONFIDENTIAL under E.O. 13526 under Sections1.4(b) and(d) inthe firstha1fof2010 hh. The 07BAGHDAD35 telegram is an official telegram fiom Embassy Baghdad, dated January 5,2007 to the Department ofState. This telegram is four pages. The telegram was properly classified SECRETunder E.O.12958 at the time it was generated. The telegram remained classified SECRET under E.O. 13526 under Section 1.4(d) in the firsthalfof20I0. ii. The 07BAGHDAD36 telegram is an official telegram ftom Embassy Baghdad, dated January 5,2007 to the Department ofState. This telegram is four pages. The telegram was properly classifted SECRETunder E.O. 12958 at the time it was generated. The telegram remained classified SECRETunder E.O. 13526 under Sections 1.4(b)and(d) in the first half of 2010 j j . The 07BAGHDAD37 telegram is an official telegram ftom Embassy Baghdad, dated January 5,2007 to the Department ofState. This telegram is seven pages. The telegram was properly classified SECRETunder E.O. 12958 at the time it was generated. The telegram remained classified SECRETunder E.O.13526 under Sections 1.4(b)and(d) in the first half of 2010 kk. The 07BAGHDAD42 telegram is an official telegram ftom Embassy Baghdad, dated January7,2007 to the Department ofState. This telegram is four pages. The telegram was properly classifted SECRETunder E.O. 12958 at the time it was generated. The telegram remained classified SECRETunder E.O.13526 under Sections 1.4(b)and(d) in the first half of 2010 11. The 07BAGHDAD53 telegraph is an official telegram ftom Embassy Baghdad, dated January7,2007 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) inthe firstha1fof2010. mm. The 07BAGHDAD56 telegraph is an official telegram ftom Embassy Baghdad, dated January7,2007 to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under SectionI.4(d) in the firsthalfof2010. nn. The 07BAGHDAD63 telegram is an official telegram ftom Embassy Baghdad, dated January7,2007 to the Department ofState. This telegram is six pages. The telegram was properly classified SECRETunder E.O.12958 at the time it was generated. The telegram

remained classified SECRETunder E.O.13526 under Sections1.4(b)and(d) in the first half of 2010 oo. The 07BAGHDAD64 telegram is an official telegram ftom Embassy Baghdad, dated January7,2007 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and remained classified in the first half of2010. pp. 07BAGHDAD70 is an official telegram ftom Embassy Baghdad, dated January 8, 2007 to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL underE0 13526underSections14(b)and(d) in the firsthalf of 2010 qq. The 07BANGKOK111te1egraph is an official telegram ftom the Embassy in Bangkok, dated January 8,2007 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d) inthe firsthalf of2010 rr. The 07BASRAH3 telegram is an official telegram ftom Embassy Office Basrah, dated January 5,2007 to the Department ofState. This telegram is three pages. The telegram was properly classified SECRET in part under E.O. 12958 at the time it was generated and portions remained classified SECRETunder E.O. 13526 under Sections 1.4(b)and(d) in the first half of 2010 SS. The 07BE1J1NG152 telegram is an official telegram ftom Embassy Beijing, dated January 8, 2007 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the firsthalf of2010. tt.07BEIRUT1958 is an official telegramftomEmbassyBeirut, datedDecember 14, 2007 to the Department ofState. This telegram is six pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL underEO. 13526 underSection14(d) in the firsthalf of2010. UU. The 07BOGOTA101 telegram is an official telegram ftom Embassy Bogota, dated January 5,2007 to the Department ofState. This telegram is seven pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section 14(d) in the firsthalf of2010 w . The 07BOGOTA5118telegram is an official telegram ftom Embassy Bogota, dated July 13,2007 tothe Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions of

the telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and (d)in the firsthalf of2010 WW. The 07BRATISLAVA665 telegram is an official telegram ftom Embassy Bratislava, datedDecember 14,2007 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL in part under E.O.13526 under Sections14(b)and(d) in the first half of2010 XX. The 07BRIDGETOWN23 telegram is an official telegram ftom Embassy Bridgetown, dated January5,2007 to the Department ofState. This telegram isftvepages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d) inthe firsthalf of20I0 yy. The 07BUENOSAIRES1341telegram is an official telegram ftom Embassy Buenos Aires, dated July 13,2007 to the Department ofState. This telegram isft^urpages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d) inthe firsthalf of2010 z::^. The 07CARACAS2346 telegram is an official telegram ftom Embassy Caracas, dated December 14, 2007 to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under Section1.4(d) in the firsthalf of2010 aaa. The 07CARACAS35 telegram is an official telegram ftom Embassy Caracas, dated January5,2007 to the Department ofState. This telegram is six pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section 14(d) inthe firsthalf of2010 bbb. The 07DHAKA24teIegram is an official telegram ftom Embassy Dhaka, datedJanuary 7,2007 to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections1.4(b)and(d) inthe firsthalf of2010 ccc. The 07KABUL68 telegram is an official telegram ftom Embassy Kabul, dated January 7,2007. This telegram is four pages. The telegram was properly classified SECRETunder E.O. 12958 at the time it was generated. The telegram remained classified SECRETunder E.O. 13526 underSections14(b)and(d) in the firsthalf of2010 ddd. The 07KINGSTON25 telegram is an official telegram ftom Embassy Kingston, dated January5,2007 to the Department c^fSta^te.This telegram is four pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and

portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 14(b)and(d) in the firsthalf of2010 eee. The 07KUALALUMPUR40 telegram is an official telegram ftom Embassy Kuala Lumpur, dated January 8,2007 to the Department ofState. This telegram is two pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under Sections1.4(b)and(d) in the first half of2010 fff. The 07LAGOS719te1egram is an official telegram ftom Embassy Lagos, dated November 1,2007 to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions ofit remained classified CONFIDENTIAL under E.O.13526 under Section1.4(d) in the firsthalf of2010 ggg. The 07LAPA^1949te1egram is an official telegram ftom Embassy La Pa^, dated July 13,2007to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) inthe firsthalf of2010. hhh. The 07LIMA2400 telegram is an official telegram ftom Embassy Lima, dated July 13, 2007 to the National Security Council and to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E 0 13526underSection14(d) in the firsthalf of2010 iii. The 07M1NSK1024 telegraph is an official telegram ftom Embassy Minsk, dated December 14,2007 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Section 1.4(d) inthe firsthalf of2010 jjj. The 07MOSCOW5824 telegram is an official telegram ftom Embassy Moscow, dated December 14,2007 to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) inthe firsthalf of2010 kkk. The 07MOSCOW5825 telegram is an official telegram ftom Embassy Moscow,dated December 14,2007 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under Section1.4(d) in the firsthalf of210 III. The 07NEWDELHI80 telegram is an official telegram ftom Embassy New Delhi, dated January 8,2007 to the Department ofState. This telegram is three pages. The telegram was

1^

properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section 14(d) in the firsthalf of2010 nnnm. The 07PANAMA1197 telegram is an official telegram ftom Embassy Panama, dated July 13,2007 to the Department ofState. This telegram is seven pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the firsthalf of2010. rmn. The 07PANAMA1198 telegram is an official telegram ftom Embassy Panama, dated July 13,2007 to the Department ofState. This telegram is two pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the firsthalf of2010 000. The 07PARIS4722 telegram is an official telegram ftom Embassy Paris, dated December 14, 2007 to the Department ofState. This telegram is fburpages. The telegram was properly classified SECRET under E.O. 12958 at the time it was generated. The telegram remained classified SECRET under E.O. 13526 under Sections1.4(b)and(d) in the first half of2010 ppp. The 07PAR1S4723 telegram is an official telegram ftom Embassy Paris, dated December 14,2007 to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and (d)(e)in the firsthalf of2010 qqq. The 07RANGOON22 is an official telegram ftom Embassy Rangoon, dated January 8,2007 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegramremainedclassifiedCONFlDENTlALunderE.O. 13526 under Sections 1.4(b) and(d) inthe fiirstha1fof20I0. rrr. The 07REYKJAVIK203 telegram is an official telegram ftom Embassy Reykjavik, dated July 13,2007 to the Department ofState. This telegram is fburpages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions of the telegram remain CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and (d) inthe firsthalf of2010. SSS. The 07RIYADH21 telegram is an official telegram ftom Embassy Riyadh, dated January 8,2007 to the Department ofState. This telegram is two pages. The telegram was properly classified SECRETunder E.O.12958 at the time it was generated. The telegram remained classifiedSECRET underEO. 13526 underSections14(b)and(d) in the firsthalf of2010. ttt. The 07R1YADH22 is an official telegram ftom Embassy Riyadh, dated January 8, 2007 to the Department ofState. This telegram is two pages. The telegram was properly classified

11

CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram remained classified CONFIDENTIAL underEO 13526 under Sections14(b)and(d) in the firsthalf of 2010 uuu. The 07RIYADH23 telegram is an official telegram ftom Embassy Riyadh, dated January 8,2007 to the Department ofState. This telegram is two pages. The telegram was properly classified SECRETunder E.O.12958 at the time it was generated. The telegram remained classified SECRETunder E.O. 13526 under Sections1.4(b)and(d) in the first half of 2010 v w . The 07SANSALVADOR1375 telegram is an official telegram ftom Embassy San Salvador, datedJuIy 13,2007 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and portionsofthe telegram remained classified CONFIDENTIAL under E.O. 13526 underSections14(a)(d)(g) in the firsthalf of2010. v^^v^. The 07SANTODOMFNG028 telegram is an official telegram ftom Embassy Santo Domingo, dated January 8, 2007 to the Department ofState. This telegram is nine pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section1.4(d) in the first half of2010. xxx. The 07SUVA18te1egram is an official telegram ftom Embassy Suva, dated January7, 2007 to the Department ofState. This telegram is seven pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections1.4(b)and (d) inthe firsthalf of2010 yyy. The 07TUNIS47 telegram is an official telegram ftom EmbassyTunis, dated January5, 2007 to the Department ofState, This telegram is five pages. The telegram was properly classified SECRET in part under E.O.12958 at the time it was generated and portions remained classified SECRET underE0 13526 under Sections1.4(b)and(d) in the first half of2010 ^^zThe07USUNNEWYORK573 te1egramisan official telegramfrom the UnitedStates UN Mission, dated Ju1y 13,2007 to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the firsthalf of2010. aaaa. The 07USUNNEWYORK575 telegram is an official telegram ftom the US Mission to the United Nations, dated July 13,2007 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d) in the firsthalf of2010. bbbbThe07USUNNEWYORK578te1egramisan official telegramftom the US Mission to the United Nations, dated July 13,2007 to the Department ofState. This telegram is four

12

pages. The telegram was properly classifted CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E 0 13526underSections14(b)and(d) in the firsthalf of2010 cccc. The 07VIENTIANE12 is an official telegram ftom the American Embassy Vientiane, dated January 8, 2007 to the Department ofState. This telegram is nine pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 14(b)and(d)inthe firsthalf of2010 dddd. The 07VILNIUS13 telegram is an official telegram ftom Embassy Vilnius, dated January 8,2007 to the Department ofState. This telegram is four pages. The telegram was properly classifted CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 14(b)and(d) in the firsthalf of2010 eeee. The 08AMMAN535 telegram is an official telegram ftom Embassy Amman, dated February 20, 2008 to the Department ofState. This telegram is ten pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 14(b)and(d) in the firsthalf of2010 ffff. The 08CA1RO569 telegram is an official telegram ftom Embassy Cairo, dated March 23,2008 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O. 13526 under Section 1.4(d) in the firsthalf of2010 gggg. The 08DARESSALAAM206 telegram is an official telegram ftom Embassy E^^r^s Salaam, dated April 1,2008 to the Department ofState. This telegram is six pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions remained classified CONFIDENTIAL under E.O.13526 under Sections 14(b)and(d) in the firsthalf of2010. hhhh. The 08KHARTOUM246 telegram is an official telegram ftom Embassy Khartoum, datedFebruary20, 2008 to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions ofit remained CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d) in the firsthalf of2010 iiii. The 08KHARTOUM428 telegram is an official telegram ftom Embassy Khartoum, dated March 23,2008 to the Department ofState. This telegram is nine pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 tmder Sections 1.4(b)and(d) inthe firsthalf of2010

13

jjjj. The 09ADDISABABA1063 telegram is an official telegram ftom Embassy Addis Ababa, dated May7,2009 to the Department ofState. This telegram is fburpages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and portions ofit remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and (d)inthe firsthalf of2010 kkkk. The 09BAGHDAD2390 telegram is an official telegram ftom Embassy Baghdad, dated September5,2009 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d) inthe firsthalf of2010 1111. The 09BAMAl^O85 telegram is an official telegram ftom Embassy Bamako, dated February 12,2009 to the Department ofState. This telegram is seven pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 14(b)and(d) in the firsthalf of2010 mmmm. The 09BOGOTA2873 telegram is an official telegram ftom Embassy Bogota, dated September 4, 2009 to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 14(b)and(d) in the firsthalf of2010 rmnn. The 09BRASILIA1112 telegram is an official telegram ftom Embassy Brasilia, dated September4,2009 to the Department ofState. This telegram is fburpages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram remamed classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) inthe firsthalf of2010 O O O O . The 09BRASILIA1I13 telegram is an official telegram ftom Embassy Brasilia, dated September4,2009 to the Department ofState. This telegram is eight pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 tmder Sections 14(bXd) in the firsthalf of2010 pppp. The 09CARACAS1168 telegram is an official telegram ftom Embassy Caracas, dated September4,2009 to the Department ofState. This telegram is six pages. The telegram was properly classified CONFIDENTIAL in part under E.0 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section 14(d)inthe firsthalf of2010 qqqq. The 09LIMA1309 telegram is an official telegram ftom Embassy Lima, dated September 4,2009 to the Department ofState. This telegram is fburpages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O.13526 tmder Sections1.4(b)and(d) in the firsthalf of2010.

14

rrrr. The 09MEX1CO2658 telegram is an official telegram ftom Embassy Mexico City, dated September4,2009 to the Department ofState. This telegram is two pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the firsthalf of2010 ssss. The 09NEWDELH1267 telegram is an official telegram ftom Embassy New Delhi, datedFebruary 12, 2009 to the Department ofState. This telegram is six pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections14(b)and(d) in the firsthalf of2010 tttt. The 09PARIS217te1egram is an official telegram ftom Embassy Paris, dated February 12, 2009 to the Department ofState. This telegram is two pages. The telegram was properly classified CONFIDENTIA^L under E.O.12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections1.4(b)and(d) inthe firsthalf of2010. uuuu. The 09PRAGUE88 telegram is an official telegram ftom Embassy Prague, dated February 12,2009 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the firsthalf of2010 WW. The 09PRISTINA58 telegram is an official telegram ftom Embassy Pristina dated February 12,2009 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 14(b)and(d) in the firsthalf of2010 wwww. The 09RIYADH1156 is an official telegram ftom Embassy Riyadh, dated September 5,2009 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the firsthalf of2010 xxxx. The 09SANTIAGO831te1egram is an official telegram ftom Embassy Santiago, dated September4,2009 to the Department ofState. This telegram is three pages. The telegram was properly classified CONFIDENTIAL E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d) in the firsthalf of2010 yyyy. The 09SANTIAGO833 telegram is an official telegram ftom Embassy Santiago, dated September 4, 2009 to the Department ofState. This telegram is seven pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated

15

and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections14(b)and(d) in the firsthalf of2010 z^^zz. The 09SANT1AGO835 telegram is an official telegram ftom Embassy Santiago, dated September4,2009 to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section14(b)in the firsthalf of2010. aaaaa. The 09SANTODOMINGO1017teIegram is an official telegram ftom Embassy Santo Domingo, dated September 4,2009 to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections14(b)and(d) in the firsthalf of2010 bbbbb. The 09STATE92632 telegram is an official telegram ftom the Department, dated September 4, 2009 to the Embassy in Moscow. This telegram is four pages. The telegram was properly classified SECRET in part under E.O. 12958 at the time it was generated and portions of the telegram remained classified SECRETunder E.O.13526 under Section1.4(d) in the first halfof2010 ccccc. The 09STATE9264I telegram is an official telegram ftom the Department, dated September 4, 2009 to Embassy Colombo andanumber of other posts. This telegram is six pages. The telegram was properly classifted CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 underSection1.4(d) in the firsthalf of2010 ddddd. The 09STATE92655 is an official telegram ftom the Department ofState, dated September4,2009 to EmbassyTegucigalpa This telegram is five pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions c^fthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 14(b)and(d) in the firsthalf of2010 eeeee. The 09STATE92657 telegram is an official telegram ftom the Department ofState, dated September4,2009 to the Embassies in Moscow,Kyiv,andAstana. This telegram is four pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 underSections14(a)(b)and(d)(e)in the firsthalf of2010 fffff. The 09TEGUCIGALPA891 telegram is an official telegram ftom Embassy Tegucigalpa, dated September 4, 2009 to the Department ofState. This telegram isftvepages. The telegram was properly classified CONFIDENTIAL in part tmder E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 underSectionsI4(b)and(d) in the firsthalf of2010. ggggg. The 09TEGUCIGALPA892 telegram is an official telegram ftom Embassy Tegucigalpa, dated September4,2009 to the Department ofState. This telegram is two pages.

16

The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 underSection1.4(d) in the firsthalf of2010. hhhhh. The10BRUSSELS382 telegram is an official telegram ftom the US Mission to the European Union in Bmssels, dated March 30,2010to the Department ofState. This telegram is fburpages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions c^fthe telegram remained classified CONFIDENTIAL under E.O. 13526 underSections14(b)and(d) in the firsthalf of20I0. iiiii. The10GENEVA347 telegram is an official telegram ftom the US Mission in Geneva, dated March 30, 2010to the Defense Intelligence Agency (DIA) and other addressees. This telegram is thirteen pages. The telegram was properly classified SECRET in part under E.O. 12958 at the time it was generated and portions c^fthe telegram remained classified SECRET underE0 13526underSections14(b)and(d) in the firsthalf of2010 jjjjj. The10LIMA333 telegram is an official telegram ftom Embassy Lima, dated March 29, 2010to the Department ofState. This telegram is six pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Section1.4(d) in the first year of2010. kkkkk. The 10PRETORIA636 telegram is an official telegram ftom Embassy Pretoria, dated March 30, 2010to the Department ofState. This telegram is five pages. The telegram was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under Section 1.4(d) in the firsthalf of2010 mil. The10RABAT294 telegram is an official telegram ftom Embassy Rabat, dated March 30,2010to the Department ofState. This telegram is twelve pages. The telegram was properly classified SECRET in part under E.O.12958 at the time it was generated and portions ^ f t f i e telegram remained classified SECRETunder E.O.13526 under Section 1.4(d) in the first half of2010. rmnmmm. The10TOKYO627 telegram is an official telegram ftom EmbassyTokyo, dated March 29,2010to the Department ofState. This telegram is four pages. The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 14(b)and(d) in the firsthalf of2010 8. For each ofthose 96 cables listed above and classified as CONFIDENTIAL the following is true: a. First, all 96 cables were properly marked at the CONFIDEN^TIAL classification leveL b. Second, disclosure ofthe information identified in the 96 cables reasonably could be expected to cause damage to the national security ofthe United States. In making this

statement regarding the classification ofinformation in this case,lrely upon my personal knowledge and experience, the information made available to me in my official capacity,and the advice and recommendations received ftom experts within the geographic and functional bureaus. c. Third, the 96 cables and the information contained in them were classified at the CONFIDENTIAL level at the time oftheir creation, and remained classified at the CONFIDENTL^L levelin the firsthalf of2010andatthetimeoftheir disclosure These cables were classified pursuant to Section 1.4ofE.O. 13526,or its predecessor E.O.s, because they contained information that, ifreleased, could cause damage to national security. 9. For each of those21cables listed above and classified as SECRET the following is true: a. First, all21cables were properly marked at the SECRETcIassification leveL b. Second, disclosure ofthe information identified in the21cab1es reasonably could be expected to cause serious damage to the national security ofthe United States. In making this statement regarding the classification ofinformation in this case,lrelied upon my personal knowledge and experience, the information made available to me in my official capacity,and the advice and recommendations received ftom experts within the geographic and fimctional bureaus. c. Third, the21cab1es and the information contained in them were classified at the SECRET level at the time oftheir creation, and remained classified at the SECRET level in the first half of2010and at the time of their disclosure. These cables were classified pursuant to Section 1.4ofE.O.13526, or its predecessor E.O.s, because they contained information that, ifreleased, could cause serious damage to national security. 10. Of the cableslreviewed in the Net Centric Diplomacy database,aportionofthem were found to be technically deficient in terms of marking. That is, they contained no declassification date,were missing authority,or improperly cited the E.O.s. However, the presence oftechnical marking deficiencies does not mean that the cables were not classified. Moreover,Ifbund that portions of some of the cableslreviewed were no longer sensitive.

ANGELMOV^GAARD CPT,JA Assistant Trial Counsel

^^^^^t^^^^^^^^ THOMASFHURLEY MAJ,JA Military Defense Cotmsel

B^^^^^^^^^^^^^^^^ BRAD^^EM^^^^G PFC, USA Accused

18

Prosecution Exhibitl^^ ICJ^ classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplementto the original Record ofTrial

Prosecution Exhibitl^Oa 6pages classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl81a ^pages classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

(b)(1)(B)

UNITED STATESOF AMERICA STIPULATION OF EXPECTEDTESTIMONY Manning, Bradley E. PFCU.S.Army, HHCU.S.ArmyCarrison, JointBaseMyerHendersonHall FortMyer,Virginia 2221I
(b)(1)(B)

(b)(1)(B)

^^June2013

(b)(1)(B)

(b)(1)(B)

(b)(1)(B)

(U) Classification 4. (U) SectionI.1(a)ofE013526 lists three classification levels fbr national security information. Information shall be classified TOP SECRET ifits unauthorized disclosure reasonably could be expected to result in exceptionally grave damage to the national security: SECRET ifits unauthorized disclosure reasonably could be expected to result in serious damage to the national security: and CONFIDENTIAL ifits unauthorized disclosure reasonably could be expected to result in damage to the national security. 5. (U) Section 6.l(i)oftheEO defines "classified national security information" or "classified information" as "information that has been determined pursuant to this order or any predecessor order to require protection against unauthorized disclosure and is marked to indicate its classified status when in documentary form." Section 6.1(cc)oftheEO defines ^^nationalsecurity" as the "national defense or ftireign relations ofthe United States."

(b)(1)(B)

^ s ^ ^

^^OSEC^lONEXHlBIT^I^ori^^tification ^^G^OFFERED: PAGEADMITTED: ^^0^ ^^^OES

(b)(1)(B)

6. (U)Section1.4ofE013526 lists the substantive categories of national security information that are eligible fbr classification. These categories include information pertaining to intelligence activities and intelligence sources and methods, as well as information pertaining to the fbreign relations or fbreign activities ofthe United States. 7. (U) The authority to classify inft^rmation is derivedftomasuccessionofEOs,the current one being E013562. Section I.3(a)ofEO 13526 provides that the authority to classify information originally may be exercised only by the President, the Vice President, agency heads and officials designated by the President, and United States Govemment officials delegated authority pursuant tosection1.3(c), SectionI,3(c)(3)provides that TOP SECREToriginal classification authority may be delegated only by the President, the Vice President, or any agency head or official designated pursuant to sectionI,3(a)(2). 8
(b)(1)(B)

9. (U) SectionI.1(a)oftheEO provides that information may be originally classified under the terms ofthis Order only ifall ofthe following conditions are met: (l)an original classification authority is classifying the information; (2) the information is owned by,produced by or fbr, or is under the control ofthe United States Government; (3) the information falls within one or more ofthe categories ofinformation listed in section 1.4of the Order; and (4) the original classification authority determines that the unauthorized disclosure ofthe information reasonably could be expected to resuh in some level ofdamage to the national security and the original classification authority is able to identify or describe the damage.
10
(b)(1)(B)

11. (U) SectionI,1(a)(4)ofE0 13526 provides that information may only be classified if unauthorized disclosureofthe information reasonably could be expected to cause damage to the national security(which includes defense against transnational terrorism)and the original classification authority is able to identify or describe the damage. As described above, EO 13526 states that information shall be classified at one ofthree levels: TOPSECRET,SECRET, or CONFIDENTIAL depending on the damage to the national security that reasonably could be expected to result from unauthorized disclosure.
(b)(1)(B)

12

(b)(1)(B)

(b)(1)(B)

(b)(1)(B) (b)(1)(B)

13.

(b)(1)(B)

14.

(b)(1)(B)

15. (b)(1)(B)

(b)(1)(B)

(b)(1)(B) (b)(1)(B)

16.

(b)(1)(B)

17.

(b)(1)(B)

(b)(1)(B)

(b)(1)(B) (b)(1)(B)

18,

(b)(1)(B)

(b)(1)(B)

19, (b)(1)(B)

20.

(b)(1)(B)

(b)(1)(B)

(b)(1)(B)

2L

(b)(1)(B)

22

(b)(1)(B)

23. (b)(1)(B)

(b)(1)(B)

(b)(1)(B) (b)(1)(B)

24 (b)(1)(B)

//ORIGINALSIGNED// ANGELOVERGAARD CPT,JA AssistantTrial Counsel

//ORIGINALSIGNED// THOMASFHURLEY MAJ,JA Military Defense Counsel

//ORIGINALSIGNED// BRADLEYEMANNING PFC, USA Accused

UNITED STATESOF AMERICA STIPULATION OFFACT Manning, Bradley E. PFCU.S.Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall FortMyer,Virginia 22211 AdamGadahn ^^June2013

The United States and the Defense,with the express consent of the accused,stipulate that the following facts are true, susceptible ofproof, and admissible in evidence. These facts may be considered by thefinderoffact to establish the elements ofall charges and their specifications. They may be considered by the sentencing authority and on appeal in determining an appropriate sentence, even ifthe evidence ofsuch facts is deemed otherwise inadmissible. The accused expressly waives any objections he may have to the admission ofthis evidence at trial under the Military Rules ofEvidence, the Rules for Courts-Martial,theU,S,Constitution, or applicable case law, 1. Adam Gadahnisasenior leader of alQaeda (hereinafter ^^A(^"), the terrorist organization responsible for the attacks against the United States at theWorldTrade Center and Pentagon on 11September2001, AdamGadahn has beenamemberofAQsince 2004, 2, AsSahabisamedia organization operated byAQ. Onorabout3June2011,As-Sahab media releasedavideotitled,^^Thou Art Held Responsible Only fbrThyself (hereinafter ^^Gadahn video"). The Gadahn video was released simultaneously in two separate parts (referenced herein as ^^Part I " and ^^Part II" respectively). The Gadahn video features Adam Gadahn and other AQleaders as speakers. The Gadahn video serves asapropaganda and recruitment tool for AQ. 3, As-Sahab and Adam Gadahn obtained materialftomWikiLeaksand used the material ftom WikiLeaks in the Gadahn video. The Gadahn video contained excerpts ftom the WikiLeaks' editedversionofthevideofilenamed^^12JUL07CZENGAGEMENTZ^ONE30GC Anyone.avi" (hereinafter"Apache video") contained in Prosecution Exhibit ( P E ) ^ f o r Identification. P E ^ f o r ID is theWikiLeaks edited version of the Apache video that appears on the WikiLeaks web site. The Gadahn video shows the WikiLeaks web site. Between the time stamps 03:23 and 04:40 in PartLfl^^ Gadahn video shows the Apache video (PE^^^forlD)on the WikiLeaks web site, 4. PEl^^or ID is the Department ofState information in the Gadahn video obtained from WikiLeaks, In Partlof the Gadahn video ftom time stamps 43:28 until 44:38,Adam Gadahn, speaking in English, recommends using the Intemet to make ^^use of all means possible to do damage to the enemy," Referencing the Department'sinfbrmation during the same time stamps in Part I, Adam Gadahn states,^^But, by the grace of God, the enemy'sinterests are today spread all over the place and easily accessibly as the leak of America'sState Department cable on critical fbreign dependency makes so clear."Adam Gadahn also states during the same time stamps in PartL^^Andladvise every brother who wants to work fbr this religion not to

==r-^oMifc
PAGE PAGE OF PAGES

undertake any action before taking advantage ofthe wide range ofresources available today on the Intemet, particularly the various manuals, encyclopedias,and courses,which deal with the mujahideen^s operational and electronic security, and security in general." 5. In Part II from the time stamps 05:35 until 06:37, the narrator, citing Department material obtained ftomWikiLeaks, reports Arab leaders'^^collaboration" with ^^their ruler, America," giving President Obama an ^^open door" to ^^wage war on the mujahidin." The narrator in Part II of the Gadahn video ftom time stamps 06:38 until 09:01,also referencing the contentsofthe Department'smaterial obtained ftomWikiLeaks, cites reports of the ^^lewd parties put on by the American consulates in Islamic countries that aim to cormpt the minds, morals, and religion of the youth." The narrator continues,^^These documents revealed that most of the richesofthe Islamic world are spent on cortuption and waging war on Islam, while millions ofMuslims live in abject poverty." 6. Inspire Magazine isamagazine published on the Intemet by alQaeda in the Arabian Peninsula (hereinafter^AQAP"). AQAPisabranchofAQ. Inspire Magazine serves asa propaganda and recmitment tool for AQAPandAQ. On or aboutlbJanuary 2011,Inspire Magazine published issue number4(hereinafter^^Winter2010Inspire Issue") on the Internet, On pages 44-45of the Winter 2010Inspire Issue, the magazine lists activities one can do to ^^help the mujahidin in within the conftnes ofthe media sector," The Winter 2010Inspire issue lists that archiving large amountsofinformation is helpful to AQAPandAQ. The Winter 2010 Inspire Issue further lists ^^i^a^nythingusefiil ftomWikiLeaks" is useful for archiving.

^^^^^^^^^^^^^^^^^^^^^^^

ASHDENFEIN MAJ,JA Trial Counsel

THOMASFHURLEY MAJ,JA Military Defense Counsel

BRADI^ PFC, USA Accused

UNITEDSTATESOF AMERICA

Manning, Bradley E. PFCU.S.Army, HHC, U.S. Army Garrison, JointBaseMyerHendersonHall FortMyer, Virginia 22211

STIPULATION OF EXPECTEDTESTIMONY
CDRYoussefAhoul-Enein June2013

It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that if CDR YoussefAboul Enein were present to testify during the merits phase of this court-martial, he would testify substantially as follows: 1. lamaCommander in the United States Navy and an officer in the Medical Service Corps. Additionally,IamaMiddle East Foreign Area Officer. Since 2006,lhave served asaSenior CounterTerrorismAdvisor,Waming Officer, and Instructor on Militant Islamist Ideology at the Joint IntelligenceTaskForce for CombatingTerrorism(JITF-CT)inWashington DC. ladvise the House Homeland Security Committee onViolent Islamist radicalization. lam also Military AdjunctFaculty for Middle East CounterTerrorism Analysis at the National Intelligence University. lam currently assigned to the Defense Intelligence Agency (DIA)at Boiling Air Force Base, Previously,Iserved as Country Director fbr North Aftica and Egypt, Assistant Country Director fbr the Arabian Gulf, and Special Advisor on Islamist Militancy at the Office ofthe Secretary ofDefense for Intemational SecurityAffairs from 2002 2006. While at the Office ofthe Secretary ofDefense,Ihelped prepare Department ofDefense officials to engage in ministerial level talks with their counterparts ftom Morocco to the Persian Gulf 2. My education consists ofaB.B.A ftom the University ofMississippi,an M,B,A and Masters in Health Services Administration ftom the University ofArkansas, an M.S. in Strategic Intelligence from the National Defense Intelligence College, as well as an M.S. in National Resource Strategy ftom the Industrial College of the Armed Forces(Classof2009 2010). lam the author of^^/^^7^^e^^^^,^/e^^^.^^^c^^c^^c^^.L^i^c^^^,^^^^
7^^^^C^^'^B^^'.^^^^^^^/.^^^.^^^^^^'l^^.^C^^^ BI^^^

published by Naval Institute Press. lalso contributed to the counterterrorism portion ofthe May 2012editionof"PerspectivesonTerrorism." lam rated proficient in the Egyptian, Peninsular, Levantine, Modem Standard (Upper Level) and Iraqi dialects ofArabic by the Defense Language Institute. My operational tours include Liberia, Bosnia, and the Persian Gulf My personal awards include the Army Commendation Medal presented by GeneralTommy Franks, the Joint Service Achievement Medal presented by the Commandant ofthe Joint Forces Staff College, and the Defense Meritorious Service Medal (DMSM) awarded by the Secretary of Defense,asecondDMSM awarded by the DIA Directorfor Analysis, 3. lhave spent years studying Al-Qaeda(AQ). From its inception through 2011,AQwasa militant Islamist organization founded and led by Usama bin Laden (UBL). AQ'sphilosophy was ofglobal Jihad and strict interpretation ofSharia Law. Jihad isaKoranic principle, but AQ'sdefinition translated into ^^religious war against the infidels." AQ'sdefinitionof^jihad' opposed any nation or organization that did not strictly adhere to Sharia Law as ^^infidels." Thus, PROSECUTION EXHIBIT^^loi^ide^cation PAGEOFFERED: PAGEADMI^ED: PAG^ OF PAGES

ftom its inception through today,AQseeks to attack countries constituting the ^^West,"to include the United States andWestem Europe. AQalso seeks to attack Arab regimes thatAQconsiders to be allied with the United States. For the purpose of my testimony,AQwas composed ofits senior leadership and spokesmen as well as the senior leadership and spokesmen ofits declared ftanchises, like AlQaeda in the Arabian Peninsula, 4, From its inception,AQwasaterrorist organization that has been attacking the United States since the original attack on theWorldTrade Center in 1993,which killed six and wounded over one thousand. AQclaimed responsibility for the following attacks: (1)the 1998 bombing ofUS embassies in Kenya andTanzania,which killed over 200 people and injured more than 5000 others, (2) the 2000 bombing of the USS Cole,which killed17sailors and injured more than 39 others,and (3)the11September2001 attacks,which killed more than 3000 civilians and injured more than 5000 others. AQcontinued to claim responsibility for intemational bombings throughout the 2000s. AQ, or organizations loosely affiliated with it, have claimed responsibility fbr attacking US forces and their coalition partners working in Iraq and Afghanistan witha variety of direct action engagements(e.g.direct fire engagements, indirect fire engagements, and improvised explosive device attacks). AQsees itself as an enemy of the US; the 2001 Authorization for Use ofMilitary Force is read to provide the authorization for US military actions againstAQand its affiliates. 5, From its inception,AQclaimed that it would attack(and claimed responsibility for attacking) civilian or military targets with different means and degrees of complexity. The United States has defended againstAQsincethe 1990s. In 1998,UBL was indicted in federal court fbr conspiracy to murder, bomb, and maim United States citizens. The United States has employed forces againstAQworldwide, to include Aftica and the Middle East. AQ, like common criminals, required secrecy to carry out their direct action missions. As the US developed methods to respond to the stealthy tactics ofAQ, their tactics evolved in order to continue their operations. This evolution^orcreativity^compelled the same ftom the West to develop countermeasures. This cycle occurred ftom the inception ofthe defense againstAQthrough 2010 6, AQ has also become more decentralized in response to the actions ofthe United States. AQ adoptedaphilosophy of creatinga^^leaderless environment" because it makesAQterrorist cells harder to detect. This leaderless environment was bom ofnecessity considering the West's success in capturing and killingAQleadership, From the perspective ofAQ,selfradicalization aided the development ofa^^leaderless environment." AQsought to create hostility and tum the population of any given country against its secular leadership to createaleaderless environmenL Toencourageselfradica1ization,AQimp1ored all Islamists, specifically the younger generations, to take it upon themselves to fight their enemies, AQdidnothaveacentralized organizational structure,which helped in facilitating the leaderless environment in which they operate. Those individuals that responded to the calls for self radicalization would be considered ^^AQ inspired." ^^AQ inspired" are indirectly connected to AQ. 7, AlQaeda in the Arabian Pemnsula(AQAP)isaterrorist organization that formed asamerger betweenAQcells in Saudi Arabia andYemen in 2003. From its inception through the end of 2010,AQAP claimed responsibility for:(1)an attack onWestem expatriates residing on Saudi soil and (2) launching attacks against oil refineries. AQAP also claimed responsibility for the

failed ^^underwear bomber" attack of2009.AQAP was the most creative ^^ftanchise"ftomits inception through the charged time period. 8, From its inception,AQused the media to achieve its goals, gain notoriety,and inspire individuals tojoin in terrorist activities, AQused the media for fimdraising as well. This money would then be used to fund training, missions, bribes, media creation for propaganda and recruiting, and traveling. AQused its notoriety to seek facilitators who would launder money, obtain items not easily located inAQ'sarea of operation, move members ofAQto new destinations, and smuggle recruits, 9, From its inception, media perception was important to AQ, Any event that placedAQina positive light or depicts forces adversarial to AQinanegative light would have been seen as beneficial byAQ. Acknowledgement of successful attacks against enemy forces would have likely boosted morale and may have led toacorresponding increase in attacks. Events that undermined cooperation with foreign leaders would have, ftom the perspective ofAQ, increased antagonism toward those leaders and created an environment in which terrorist ideology excels. 10. Throughout the 1990s and early2000s,AQused media outlets to deliver its recorded messages toabroader audience. In time,AQdecided to release its messages directly to the Intemet through its media arm, As-Sahab. AsSahab has been designed to operate likeamedia outleL The golden As-Sahab logo in Arabic calligraphy was pattemed offthe golden logo of Aljazeera, which also features Arabic calligraphy. From its inception through 2010, As Sahab made videos to recmit and spreadAQpropaganda. Propaganda was thought byAQto be essential for these missions because it establishedAQ'scredibility as an effective terrorist organisation. 11. AQhas used the Intemet since the 1990s. AQused the Intemet as means of communication for its leaders and members. As the Intemet grew to host more information, communication through cyberspace,such as the Intemet,was the preferred method of communication because AQdidnothaveacentralized organizational stmcture andAQmembers were constantly moving in order to avoid being captured or killed by anti-AQforces. AQused the Intemet for research for potential targets, recruits, and facilitators. AQused the Intemet for research since at least the early2000s. AsAQdeveloped its ov^ resources such as As-Sahab,AQshiftedmoreofits attention onto the Intemet, AQused websites with users who were sympathetic to its goals, AQ also used all publicly available websites. AQused websites that described United States govemment resources,websites that contained United States govemment information, and websites that researched United States govemment information to gather intelligence that may be useful in planning attacks against the United States. AQalso searched fbr information related to the United States govemment that would have been used fbr propaganda to undermine the United States or its allies, especially diplomatic information.

\^Y^ih
ALEXANDER voN ELTEN CPT, JA Assistant Trial Counsel

^4<ryvi^^

'^iL&y^
BRADLEY E. MANNI PFC, USA Accused

THOMAS F. HURI JREEYL/ MAJ, JA Military Defense Counsel

Prosecution Exhibitl8^ 3pages classified "SECRET" ordered sealed for Reason2 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl85 5pages classified "CO^EJE^E^Tl^E" ordered sealedfDrReason3 Military Judge's Seal Order dated20^ugust2013 stored in the classified supplement to the original Record ofTrial

Prosecution Exhibitl86 has been entered into the record asahardbacl^bool^ and will be maintained with the original Record ofTrial

7\

o
jn i m Z
00 CO
> ^

Z
>

m no O

LO nq
h-^N

O
<

o
C D O

TD

LO

S 3g ^ 5
50

O
3
$

=:
3

^ m
D"
C O

m o
QJ ^

3
QJ_

3 "O

QJ

m
< fD

^
fD O

o-

IR
(TO rD

3 3 Q_ O Q
CO

fD QJ

C O ^ .
^

, QJ % r-h

O
O

m
>

o -n
t/1

QJ QJ

FD"

r+

fD

O
-I

fD
CO

fD Q.

L/

-o O

PROSECUTION E X U n ; ^ fg?fb!/^c,%ncRiion PAGE OFFERED: * 4 j E AD^^rrrED: PAGE OF PAGES

m H

-o O
LO

m
<

m
30

| > ^

cr r+ V) 5" fD O
-I Q_

m c
CO

o
QJ

m
'TJ

O Q g

fD

n n

O
Y Tl

^ 3* OQ OQ fD
CO

O w

3
0)

OQ fD

r+ O
CO

QJ
CO

QJ <

fD

5"

QJ 3 o ^' ^ 3" fD ^ fD

r+ 3" fD ^
(D"

< <
I-+

ha

3 QJ

r+ O

"O

3 fD

fD

n o 3
"D O 3

sav

m
^r+-

m O
h

QJ

fD
:r*

o 3 3
QJj.

CU

c
{/I

m
X

fD OJ

"

3
D_
fD O fD

3 3
QJ 3 QT5 %

<
O

T3 r+ QJ

CO

fD fD 3

cr

fD

>

y -v "a
>

GOO
tn rn C O

o
03 Ln O y^ VI O O
I-"

ii
O m H

m c? n

" SX i >!
m ;"7 S w5H
-I>

5, ^

en o p b

if
p O

e^$

3"

ii
o i?

%n

:s#
O M O

f
cn
m 21

e^ $
l/l l/l

g era eo
CD X

ns

w
o'
"f

cn

C,'

3 o o
N
r*

ro g\
%

-i _

s5J

N>

o cn

>
T3

en

>

m
TJ

>

73

> a

o w > o

o
OJ

>
TS

o w

>
"O

o Ul > o

>
D

>
-o

^ q -o

" 2 (g

ZI

u
2, 9O CJ

o
n C

o
o C

o o n
C m Z H

o o o
C m Z H
tn

C3 O O O O O
O O

c
m

c C C
H Ul

o n

D O

S 2

l/l

$ 1 o e3
> on

H l/l

m m z Z

m Z
Ln tn

$1
o o

' >

d CJ

ii
cn
X -

> <n o
U3 O O _^ Z

3
5 5

82
^ if

51

if
> z

5 5

c n

c n

c n

c n

wget-help GNU Wget 1.11.4, a non-interactive network retriever. Usage: wget [OPTION]... [URL]... Mandatory arguments to long options are mandatory for short options too. Startup: -V, --version -h, h e l p -b, background -e, --execute=COMMAND Logging and input f i l e : -o, --output-fi1e=FlLE -a, --append-output=FILE
-d, -q, -V, -nv, -i, debug --quiet --verbose --no-verbose input-file=FlLE

display the version of Wget and exit, print this help, go to background after startup, execute a .wgetrc'-style command. log messages to FILE. append messages to FILE. print lots of debugging information. quiet (no output). be verbose (this i s the default). turn off verboseness, without being quiet. download URLs found i n FILE. treat input f i l e as HTML. prepends URL to relative links i n -F - i f i l e .
s e t number o f r e t r i e s t o NUMBER (0 u n l i m i t s ) . r e t r y even i f c o n n e c t i o n i s r e f u s e d . w r i t e documents t o F I L E . s k i p downloads t h a t would download t o existing f i l e s . resume g e t t i n g a p a r t i a l l y - d o w n l o a d e d f i l e , s e l e c t progress gauge t y p e , d o n ' t r e - r e t r i e v e f i l e s unless newer than local.

-F, --force-html -B, --base=URL Download: - t , --tries=NUMBER --retry-connrefused -0, --output-document=FiLE -nc, --no-clobber -c, --continue --progress=TYPE -N, --timestamping

-S, --server-response --spi der -T, --timeout=SECONDS --dns-timeout=SECS --connect-timeout=SECS --read-timeout=SECS -w, --wait=SECONDS wai tretry=SECONDS random-wait --no-proxy -Q, --quota=NUMBER --bind-address=ADDRESS

print server response. don't download anything. set a l l timeout values to SECONDS. set the DNS lookup timeout to SECS. set the connect timeout to SECS. set the read timeout to SECS. wait S E C O N D S between retrievals. wait 1 . . S E C O N D S between retries of a retrieval. wait from 0...2*WAIT sees between retrievals. e x p l i c i t l y turn o f f proxy. set retrieval quota to NUMBER. bind to ADDRESS (hostname or IP) on local host, --1i mi t-rate=RATE l i m i t download rate to RATE. --no-dns-cache disable caching DNS lookups. - - r e s t r i ct-fi1e-names=OS r e s t r i c t chars i n f i l e names to ones OS allows, --ignore-case ignore case when matching files/directories. user=usER set both f t p and http user to USER. --password=PASS set both f t p and http password to PASS.
don't create d i r e c t o r i e s . force creation of d i r e c t o r i e s . d o n ' t c r e a t e host d i r e c t o r i e s . use p r o t o c o l name i n d i r e c t o r i e s , save f i l e s t o P R E F I X / . . .

Di r e c t o r i e s : -nd, - - n o - d i r e c t o r i e s -X, --force-directories -nH, - - n o - h o s t - d i r e c t o r i e s --protocol-di rectories -P, --directory-prefix=PREFlx - - c u t - d i rs=NUMBER

ignore N U M B E R remote directory

components.

HTTP options: --http-user=USER --http-password=PASS --no-cache

set http user to USER, set http password to PASS, disallow server-cached data. Page 1
^

PROSECUTION EXHIBIT i M for id^ntification\& PAGEOFFERED:_ PAGE ADIVHTTED: X / PAGE OF PAGES

-html-extension --ignore-length --header^STRlNC --max-redirect - proxy user^USER proxy-password^PASS referer^URL save headers -U, user-agent^ACENT --no http keep alive no cookies load cookies^FlLE save cookies^FiLE keep session cookies post data^STRiNG --post-file^FiLE content disposition auth-no-challenge

E,

wget-help save HTML documents with .html' extension, ignore Content Length' header f i e l d , insert STRINC^ among the headers, maximum redirections allowed per page, set U S E R as proxy username. set PASS as proxy password. include Referer: URL' header i n HTTP request, save the HTTP headers to f i l e , identify as AGENT instead of wgetB^ERSiON. disable HTTP keep alive (persistent connections) don't use cookies. load cookies from FILE before session, save cookies to FILE after session, load and save session (non permanent) cookies, use the POST method: ^^^d STRING as the data, use the POST method: send contents of FILE, honor the Content Disposition header when choosing local f i l e names (EXPERIMENTAL). Send Basic HTTP authentication information without f i r s t waiting for the server's challenge. choose secure protocol, one of auto, SSLv2, SSLv3, and TLSvl.
don't validate the server's c e r t i f i c a t e . client certificate f i l e . c l i e n t c e r t i f i c a t e t y p e , PEM o r DER. p r i v a t e key f i l e . p r i v a t e key t y p e , PEM o r DER. f i l e w i t h t h e bundle o f C A ' s . d i r e c t o r v where hash l i s t o f CA's i s s t o r e d . f i l e w i t h random data f o r seeding t h e SSL PRNG. f i l e naming t h e EGD socket w i t h random d a t a .

HTTPS (SSLBTLS) o p t i o n s : secure protocol^PR --no-check c e r t i f i c a t e - certificate^FlLE c e r t i f i c a t e type^TyPE p r i v a t e key^FiLE p r i v a t e key type^TyPE ca c e r t i f i c a t e ^ F i L E ca d i r e c t o r y ^ D l R --random f i l e ^ F l L E egd f i l e ^ F i L E

FTP options: f t p user^uSER s e t f t p user t o USER. --ftp-password^PASS s e t f t p password t o PASS. --no-remove l i s t i n g d o n ' t remove . l i s t i n g ' f i l e s . no glob t u r n o f f FTP f i l e name g l o b b i n g . no passive f t p d i s a b l e t h e " p a s s i v e " t r a n s f e r mode. --retr-symlinks when r e c u r s i n g , g e t l i n k e d t o f i l e s ( n o t d i r ) . preserve permissions preserve remote f i l e p e r m i s s i o n s .
Recursive download: -r, - recursive -1, level^NUMBER delete a f t e r k, convert l i n k s 1^, backup c o n v e r t e d -m, - mirror p, page r e q u i s i t e s --strict-comments

specify recursive download. maximum recursion depth ( i n f or 0 for i n f i n i t e ) , delete f i l e s locally after downloading them, make links i n downloaded HTML point to local f i l e s , before converting f i l e X, back up as X.orig. shortcut for N - r -1 i n f no remove-listing, get a l l images, etc. needed to display H T M L page, turn on s t r i c t (SGML) handling of H T M L comments. comma separated l i st of accepted extensions, comma-separated l i st of rejected extensions, comma-separated l i st of accepted domains, comma separated l i st of rejected domains, follow FTP links f rom HTML documents, comma separated l i st of followed HTML tags, comma separated l i st of ignored HTML tags, go to foreign host s when recursive. Page 2

Recursive acceptBreject: accept^LiST ^ / ^ ^ reject^LiST 1^^ domains^LlST 0, exclude domains^LiST follow-ftp follow-tags^LlST ignore tags^LlST span hosts

L, I, X, np,

relative include directories^LlST exclude d i r e c t o r i e s ^ L l S T no p a r e n t

wget-help follow relative links only. l i s t of allowed d i r e c t o r i e s . l i s t o f excluded d i r e c t o r i e s . d o n ' t ascend t o t h e p a r e n t d i r e c t o r y .

Mail bug r e p o r t s and suggestions t o ^bug w g e t ^ g n u . o r g ^ .

Page 3

> ^
e^ 1^ 1^

^
^

^
1^

^
1^

^
^

^ ^

^ ^

^
^

^ ^ ^
^ ^
ii^

^
^ ^ ^ ^ ^

^
^

^^^^^^^^^^^
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^

11^ ^

c
I-+

1^ c^ e^ e^ ^

e^ ^

1^

1 1 ^ 1 1 ^ il^ ^

e^ ^

e^ ^

1^

1^

1 1 ^ ^

1 1 ^ 1 1 ^ 1^

^
I

ic^ e^ ^
O

1^ I

^
o

^
o o o
I

^
o
I

^
O H O M

o
hO

O H O c-l

O H O

o 3

tr*

a K M o 5*
M H CO t n (0 N y O

>j

'. '
ct y ct y ct d TS ct ct d ct ct ct ts I ct ct ct TS ct ^ ^ d c s
1 1 1 1

y g g Cf* t f 1 - h - ct Ct e B H B H B y y B H y y H ct rt ft y ct ct ct tr y
ct y < ct g y ct y H ct B ct H ct

H H O O 01 o H VI M Ej O tr> ta" S C O t- H O ^ o CO 00 CO ^ W CO Cn N CD m y CO y ct

H O f

H O

Ui t-l
H

t^ < H

3* O Q O
CO

QJ ^

Ul

w w

o o H o H ,^ J t^ O 4^ N
U) H Cn H

fD n O
3 QJ r+ fD 3 QJ r+ fD Q_ O

^ u c ^ ^ ^ X ^ ts ts n n

< p B < < ID ID ^ B < < B ID ^ ID Vl Ul & & g W ID g M Vl Ul ID ID W ID V\ Ul Ul V\ e ID ID m W V> >Q >Q Ul Ul m v> w m V> M <Q ID ID V> P >a a> to >^ P ID ^ ^ ^ M M ID ID ^ H ID Q ID n ID ID n ID ^ ^ M M ID Mi Mi h| m ^ Mi M ID M M i ID ID ID ID m m M i ID ID h | H M i M i H M l ID M i M ID ID ID ID (D m h! ID ID ts ts M h| n ID ID P hi ID M ts n ID ID ts ts n m 0 ID n ID V ^ n n m ts ID n J S H ID ID n n ^ ID 1 - o o H ID "V O ^ o o 1o t-" H O H Ul U i Ul o o t-" tr> t^ < > d o t-" o M O o O o H K w a 01 Ul W o a H E j t-" Sd te o it^ o H w M ^ k CO CO O o H < n CO !ri M 00 mM Cn H H o N CO M kD Cn > H CO 00 Cn
N O
CTl CO

ct P ct ct ct v> ct V> ct ct Ct ID ID ID ID m Vf ct P ID ct Ct ct ID ct M Ul ID ID m ID ID VI >Q *Q ' Ul a a O o Ul Ul w ^ M o < < o CQ o o < O o O < H Q < < < < < a o o ' H o o <l < H ^ < J o o < Q o
O O

p ^ ^ ts ^ v.. n ^ P n p. p. ts ts n n e. 0 n 0 p. n n w Vl ct ct p. p. m p. p. p. M (D ct m Ul Ct Ct m Ul Ul VI

QJ 3 Qco

3 3

O
3

Q_

r+

ro

NJ

?
c c

3 QJ_

o"
n
QJ
ft-

Q.
CO

fD

"O QJ n fD

w PROSECUTION EXHIPIT Mo_for W^tificatic PAGEOFFERED: rAGEADf/1t.ED:__ PAGE OF ^PAGES

ft^

^
1

^
1

^
00

,o
O

c/3 CO N I N O

,o ,o
N
CO

P
1

,o ,o ,o 1 1
1

S
o
C O

r s
v>
r-f

c/3 O

ft)

f
S O -i ft ^

fD

CO

CO

c/3 N O

c/3 N O

1^ c/3

3
W)

n
o ti B B

N
O

O
o

: O

o O g
P
</}

6 e : oe o
n
fD

o O
a

6 6 6 6 6 b o
o O
C

fD

^ Cig
S c/> ^5 s
CO
fD <-+

fD

1
C/)

o o

3
fD

O rj

fD

fD

fD

(/)
05

o i/S
05

s
(/)
05

B
(/)
03

3 3 S (/)
05

o o

o cr e & ; o
^ 05

g o
I-t

05

PCO
fD
i-t

afD
r-y

e CL
CO
fD

P
CO
fD

CO

CL C/)
fD
r-f

C S CL 00
fD
(f

C S CL CO
fD
I-+

C A JO

C S
CL CO fD
I-t I-t

-t

c/1

g
CL CO fD

5"
OP Cf>
05

C J Q cn_

5'
cr
05

OP

B'
C/)

B. B
(;p
Lfl

(;p

3'
(/)_

O"
05 05

605

a.
%

fT

rT %

&

ofT

B: fT 3 05
5 ts ap
^

&

fT

B
2

3 05
t'

3 05
t'

o (TQ.
^ ^

(fQ

o CIP

3.

o ffp^
^ ^

S 3.

< !
C/)_

(JP

3'

(JQ c^.

3'

(K)

3'

5' cs
cr I-t
OP

OP
05

C/5_^

03

&

fT

Bl
fT

&

O'

fD

v:

5 05

3 05

& fT ^
03

3 a.
I'

fD

1-^

C3 (TP^

ap^

cs'

ftp

1 3"
o o g

2
D
o o
B C
fD
rjs

o o
O
^ ^ c ^ ^

^i O
o o g
0

g
o o

^.^^^^ GOO tntn^

g
fD

(3 cr
^ c^ ^ ^ c^ ^ ^ ^ ^

C/).

s 3
fD

t5 cn

g 3 rp

o o

St ^S O o o o
o
^
fD

C 3 OP,

i
o

^ ^

O
fD

S 3 fD
C S
C/5

a a o o
o
fD
C/)_,

3
Ci
C/} .

p fD

cr

(/),

cr
o o o o
'VI

o
^_

o ^

o
hj-J

o
^

t>

o
00

o
^

^ ^ O* ^

6\ o o o

o o p

o o o

cr
05

cr
05

ga

cr
05

'<b o o o cr
05

o o o o

o o

' o
< fD

cr
03

cr
03

cr
05

I
cr
05

< "
M O eo zr

a Q.
a. l/l' zr

g g g b (O

s
g g

a^

c5 V.
as 3<

o a

NJ -<

ZT

T5

eo 3

CO T3

4
o yr (O n O

e u
in 3^

5'
fO Q. eu'

g 5^

li
as era C O II

cr "o
3

i;
1^=

3 C D

Q. X 7\

(-) o

<
o 3 T3 O n O

zs' cm

C O n 3CO n a. O

3 3

it
n I , , 3" o io

ciq

eu c

ZT o

o era as_ C D 3 OJ 3 Ol

C D eu

TS Q.

3 n O 3 C O 3

eu 3 era C D

5'
zr eo

$20 n

IT 2
3 C D ea. II c l/l 20 eu as

o_ C D NJ O eo eo Q. O
era' 3"

^
c/i eu

O C/l lO

>
73 NJ o M o o Ul h-* eo o Ln cu OJ
CJO

3 ^

.a CL Tl Q.

2
eu cr II S3

^-
O O CJl NJ

NJ O

2 n T T
flj_

CX)

eo CT T3 eu era eo ei O 3 l/l b. cr

3 n II CL

<

en

i-

CJJ

IO

eo

lO

Ln

LU

PROSECUTION EXHIBIT MZ-ibr idenAfil ition PAGE OFFERED: PAGE ADMITTED: PAGE OF PAGES

?or)deT, PROSECUTION EXHIBIT !4 jjbi\k(entific@c|n ^MfFT PAGE OFFERED: PAGE AqMnTEB PAGE OF PAGES

i 1 0
'==,

tu

4 =
4

2 .52

ea

-a ^

III,
m^,
u.

a o

^'^QSlKyilP^^ EXHIBIT /^i|>f</identifiilt on PAGE OFFERE PAGES PAGE OF

PAGEOFFERED:. PAGE OF PAGES


g;
jp.

xn
00

in H irt.

g m.

w
3

tr u

I
i
m E

i
JJ

O J II

t)

5
r-i M

s
3 W

I
O

A H
Ol

li
Si
38
Q C M

ID

1
O

u JJ -w 3
JJ

ts (o e o
!

A o
u

0 (U
to
JJ

g%

a,

I!

PROSECUTION Exn:^ :!T ri^f roi MentincatiS: ADMITTED: PAGEOFFERED: PAGE PAGE OF PAGES

J V

1) Personal_Mac\0043-28May10\1 Customer\Una11ocated Clusters File Offset 25864790818


http://twitter.com/wikileaks/status/9412020034

PROSuCUTlONEYni^^Tj^^^' ' .ACE^v-.'. ^ OFFERED: A_Ljc OF DA.^-,

1) Personal_Mac\0043-28May10\1 Customer\Unallocated Clusters File Offset 25864788892


http://twitter.com/wikileaks/status/10961072669

PRORFCUTION EXHIB'T Iff^for id^tific^on FERED: rAGE ADMifrEDM J ^ PA PAGh OF ^PAGES

Prosecution Exhibit 196 1 page classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

Elizabeth L. Dibble Principal Deputy Assistant Secretary for Near Eastern Affairs Elizabeth Dibble is Principal Deputy Assistant Secretary in the Bureau ofNear Eastem Affairs. From 2010 - 2011 she was Deputy Assistant Secretary in the Bureau of European and Eurasian Affairs, where her portfolio included managing U.S. relations with the European Union and Westem Europe. As Deputy Chief ofMission and Charge' d'Affaires at the U.S. Embassy in Rome from 2008 to 2010 Ms. Dibble was the chief operating officer for the 800-person U.S. Mission to Italy. She was Principal Deputy Assistant Secretary in the Bureau of Economic, Energy and Business Affairsfrom2006 to 2008, with responsibility for day-to-day management of the bureau while also covering intemationalfinance,development and investment. Prior to that, she was Deputy Assistant Secretary in the Bureau ofNear Eastem Affairs, with responsibility for U.S. relations with Israel, the Palestinian Authority, Egypt, Jordan, Lebanon and Syria. She was a member of the State Department's Senior Seminarfrom2003 to 2004. Ms. Dibble's other overseas assignments include Damascus, Islamabad, Tunis and London. In Washington, she served as Director of the Office of Peace Process and Regional Affairs in the Bureau ofNear Eastem Affairs and as Deputy Director of the Office of Development Finance in the Economic Bureau. She also worked at the Office of the United States Trade Representative as Assistant Chief Textile Negotiator from 1986 to 1988. A New Jersey native, Ms. Dibble is a graduate of Georgetown University.

PROSECUTION EX:-'('"'T fcf ld'?/mficalion PAGE OFFERED: _ . AiZ .ADMr PAGE Of PAGES

John D. Feeley Principal Deputy Assistant Secretary Western Hemisphere Affairs - State Department John Feeley is a Senior Foreign Service officer who has focused much ofhis diplomatic career working on Westem Hemisphere issues both in Washington and in the region. He assumed his current position as Principal Deputy Assistant Secretary for Westem Hemisphere Affairs in May 2012, with responsibility for the daily management of regional policy implementation and the supervision of 50 diplomatic posts in the Americas. Previously he served as the Summit of the Americas Coordinator, overseeing the substantive preparation for Secretary Clinton's engagement in the Cartagena Summit. He was DCM in Mexico from July 2009 to March 2012, managing a 37-agency country team that implemented the $1.6 billion Merida Initiative. He has also been the Department's Director for Central American Affairs and Deputy Director for Caribbean Affairs. From 2004 to 2006 John served as a Deputy Executive Secretary in the Office of the Secretary of State, where he was responsible for managing information flow to Secretaries Powell and Rice, as well as coordinating their overseas travel. A 2004 Distinguished Graduate of the National War College, Mr, Feeley's overseas assignments include Mexico City, Santo Domingo, and Bogota, Prior to joining the State Department in 1990, Mr. Feeley served on active military duty as a helicopter pilot in the United States Marine Corps. He is a graduate of Georgetown University's School of Foreign Service and is married to a fellow career diplomat, Cherie Feeley. The couple has two sons.

^ ^.y,
prO(^^r;'-AlM EX^4m?7iiiJbr/&nni;cat]on PAGE OFFERED:_ _ r / _ Z A D ^ n 1 cO: PAGE OF ^PAGi 3

U.S. DEPARTMENT OF STATE


iini^y^ DIPLOMACY IN ACTfON
Home Under Secretary for Public Diplomacy and Public Affairs Bureau of Public Affairs Bureau of Public Affairs: Electronic Information and Publications Biographies Biographies Listed Alphabetically by Last Name Swart, Susan

Biography
Susan Swart Chief Information Officer INFORMATION RESOURCE MANAGEMENT Term of Appointment: 02/07/2008 to present Susan H. Swart, a member ofthe Senior Foreign Service with the rank of Minister Counselor, was appointed as the Chief Information Officer for the Department of State in February 2008. As CIO, she is responsible for the Department's information resources and technology initiatives and provides core information, knowledge management, and technology (IT) services to the Department of State and its 260 overseas missions. She is directly responsible for the Information Resource Management (IRM) Bureau's budget of $310 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars. Preceding her assignment as CIO, Ms. Swart was the Deputy Chief Information Officer (DCIO) for Business, Planning and Customer Service and the Chief Knowledge Officer. She has served in a number of prominent positions in the Department, including the Dean of the School of Applied Information Technology al the Foreign Service Institute. Prior to her SAIT assignment she served as Information Management Officer in Cairo, Egypt, Office Director for Customer Service in the Bureau of IRM, Deputy Executive Director in the Bureau of East Asia and Pacific Affairs (EAP), and Special Assistant in the Bureau of Administration (A). Her overseas assignments include Cairo, Egypt; Caracas. Venezuela and Lima, Pern. Ms. Swart joined the Foreign Service in 1989. She holds a Masters degree in National Security Studies from the National War College, and earned her undergraduate degree from Virginia Commonwealth University.
Qiihe/>rihta I IrtHatoe

The Office of Electronic Information, Bureau of Public Affairs, manages this site as a portal for information from the U.S. State Departmertt. External links to other Internet sites should not be construed as an endorsement of the views or privacy policies contained therein.

PROSECUTION EXHIBITZW^fbr/lentificallon PAGE OFFERED: P AGE ADlVlITTED: PAGE OF PAG una

U.S. DEPARTMENT O F STATE


DIPLOMACY IN ACTION

^4

Michael G. Kozak Acting Principal Deputy Assistant Secretary BUREAU OF DEMOCRACY, HUMAN RIGHTS, AND LABOR Term of Appointment 10/12/2012 to present

Ambassador Kozak is a charter member of the career Senior Executive Service of the United States Govemment. As such, he has served in a number of senior positions in the U.S. Executive Branch: ^^m^^^^^^K Sen/or Director on the Natiorial Security Council staff (2005-2009) with responsibility for Democracy, Human Rights, Intemational Organizations, Religious Freedom, Migration and Detainee issues. In this capacity, he chaired interagency policy coordinating committees and proposed and coordinated the implementation of events for the President of the United States. He conceived and implemented a system for achieving interagency agreement on democracy promotion strategies and prioritizing resource allocation to implement them. He authored the first National Security Presidential Directive on Democracy and Human Rights since the Carter administration. Principal Deputy Assistant Secretary of State level positions in three bureaus of the Department of State. (Democracy, Human Rights and Labor 2003-2005; Inter-American Affairs 1988-1991; Legal Adviser 1982-88). Acting Assistant Secretary of State lor extended periods. (Democracy, Human Rights and Labor 2004-5; Inter-American Affairs January 1989-July 1989.) As Acting Assistant Secretary for Democracy, Human Rights and Labor, he organized passage of a resolution on human rights in Cuba in the UN Commission on Human Rights by the largest margin in over a decade. As Acting Assistant Secretary for Inter-American Affairs, he assisted Secretary Baker in negotiating and implementing the Bipartisan Accord on Central America which was decisive in bringing a democratic end to the conflict in Nicaragua. /Embassador in Minsk, Belarus (2000-2003) and ChiefofMission in Havana, Cuba (1996-1999). Other U.S, Government Activities: U.S, negotiator with Cuba to secure the return of criminals sent to the United States during the Mariel boat crisis. Signed the first migration accord with Cuba on behalf of the United States and led implementation talks thereafter. Special Presidential envoy to negotiate the departure of General Noriega (1988). Ambassador Kozak accompanied our forces in Panama to help the new government establish the core institutions of democracy (1989), Assistant negotiator for the Panama Canal treaties (1971-1977). Was responsible for negotiating treaty text with the Panamanian negotiators and later for working with members of Congress for approval ofthe treaties and of implementing legislation (1977-81). Staff of the Middle East peace negofta/or (1982-83). Helped implement the Camp David accords and negotiate the withdrawal of the PLO from Lebanon.

State Department Superior Honor Award Presidential Ranks of Distinguished and Meritorious Executive

Younger Federal Lawyer Award Order of Balboa (presented by the president of Panama) Education: * Juris Doctor, University of California at Berkeley, 1971 (Assistant Managing Editor, Law Review) A.B , Political Science, University of California at Berkeley. 1968

For more information, visit the Bureau of Democracy, Human Rights, and Labor.

PROSECUTION EXHIBIT 2o| for idenfification PAGA O/FCRED: PAGE ADMIJ/ED:_ PAGE OF PAGES

i)^

PAKISTAN
UZBEKISTAN i DUSHANBE

Administrative Divisions
TAJIKISTAN

TURKMENISTAN

CHINA

GILGIT^^^^^BALTISTAN . KHYBER ^PAKHTUNKHWA,^^^^^ KABUL Muzaffarabad^ ^


0

AFGHANISTAN
FEDERALLY ADMINISTERED TRIBAL AREAS*

^Peshawar

KAiHl/tm

J^iy

*|

/^ISLAMABAD
ISLAMABAD CAPITAL TERRITORY' ^

NEW DELHI

BALOCHISTAN
IRAN

International boundary Province-level boundary National capital Province-level capital


Pakistan has tour provinces, one territory', anri one capital territory '*. The Pakistani-administered portion of the disputed Jammu and Kashmir region consists of two administrative entities: Azad Kashmir and Gilgit-Baltistan. AZCKS Kashmir and Gilgit-Baltistan ore not constitutionally part ol Pakistan. 200 KiloniMen

Arabian Sea

PROSECUTION E X H I B I T ^ for identification PAGE OFFERED: _ PAGEADMITTED: PAGE OF PAGES

100 Scale 1:10/100,000

200 MIk;

Prosecution Exhibit 203 20 pages classified "SECRET" ordered sealed for Reason 2 Military Judge's Seal Order dated 20 August 2013 stored in the classified supplement to the original Record of Trial

Prosecution Exhibit 20^ 2pages ordered sealed for Reasons Military Judge's Seal Order dated20August2013 stored in the original Record
GfTrial

DDDD DDDD I'd be curious to hear that story about theft from a safe Inside a DDDD locked unit... DDDD DDDD DDDD DDDD On 5/19/10 3:29 PM, Danny Clark wrote: DDDDD Short version: DDDDD (a) Can anyone recommend a hard-to-pick-but-not-insanely-expensive DDDDD padlock? Does not need to be resistant to more forceful (drilling etc) DDDDD techniques. (e,g, it is accepted that it will not actually stop a DDDDD determined attacker, but it should be obvious if it has been DDDDD defeated). DDDDD DDDDD (b) Ifyou have strong negative experience with Metropolitan, it would DDDDD help a lot of people to post a review, for instance at: DDDDD http://www,Yelp.com/biz/metropolitan-moving-and-storage-corp-cambridge-2
DDDDD

DDDDD Long version: DDDDD DDDDD So I off-handedly brought up Metropolitan Storage Warehouse in SIPB DDDDD office yesterday, and it seems that this is not true: DDDDD http://imQ227,exs,cx/imQ227/4259/ragewarehouse5ka,jpg - e.g, it is not DDDDD Ire Proof:-/ DDDDD DDDDD In quick secession from about a quarter of the small number of people DDDDD present I got horror stories regarding water damage, theft, theft from DDDDD safes *inside* locked units, and a general critique of their overall DDDDD security. DDDDD DDDDD However I was unable to find anything remotely like that from the DDDDD interwebs, specifically only these 2 sites seem to have reviews: DDDDD DDDDD http://www.bbb.org/boston/business-reviews/storage-units-household-andcommercial/metropolltan-movina-storaae-corporation-in-cambridae-ma-3494/ DDDDD (very positive) DDDDD DDDDD http://www.yelp.com/biz/metropolitan-moving-and-storage-corp-cambridge-2 DDDDD (mixes, but the negative review has nothing to do with things atxiut DDDDD the place that are nonobvious). DDDDD DDDDD So if you have had a suck experience it would be good to post there / DDDDD report it (or just reply and I'll post a summary to Yelp!). Feel free DDDDD to forward this to the original source of the stories, as a lot of DDDDD what I got was 2nd or 3rd hand I think, DDDDD DDDDD Thanks, DDDDD \|/ Daniel JB Clark j Activist; Owner DDDDD DDDDD FREEDOM -+-D INCLUDED ~ http: //freedomi nd uded .com DDDDD /|\ Free Software respecting hardware DDDD D

From:

electronic ma^

To: ^
Subject: Date:

Danny Claris ^^^rit2i^lin^iedl^Cl^ri^tian^^Terni^^^^ii:i|^^l^te^Dayidl^^^^^^


Re:^OT^ Metropolitan Storage Warehouse horror stories Thursday, May 20, 2010 5:22:02 PM

iusethe metropolitan Storage warehouse and from my limited experience With them thus far i've been happy with them, acolleague of mine storedasomewhat substantial collection of fine art and had no problems whatsoever, as for me,ijustneededaconvenient and cheap place to store my vinyl record collection nothing terribly valuable but quite heavy and fragile and climate sensitive nonetheless, based on the size, price and overall experience with their managementiwould heartily recommend them over the nearby alternative UHAUL which, if anything, is gangster central overpriced, unprofessional, and really crummy woodenwalled holes, the only thingsihave heard from others who use it were positive i've heard no horror stories ever, with respect to security whatidid notice is that the warehouse sometimes keeps its loading bay doors open during operating hours and the building is SO INCREDIBLYhuge that it would be possible for someone to sneak in and hide out inside, the building is so old that afaict they did not have extensive surveillance on the inside which is one thing that would make them substantially better, my2pence, maxinlondon On May 20, 2010, at 7:14PM, Danny Clark wrote: DYes, but there is no power,and no wifi, so it would beabit tricky,
D

DWould probably want to renew my amateur radio license:-)


D

DAlsoFYIIgot police reports forthe last2years for the Site, only one might be due to Metropolitan negligence so either this isn't reallyaproblem in practice, people are too lazy to file police reports when their stuft gets stolen, or the person doing the records check made amistake(eg perhaps the reports were filed under the person's residence address instead of the warehouse address),,.
D

D Forwarded message DFrom:DiNatale,Francine^fdinatale^cambridgepolice.orgD DDate: Thu, May 20, 2010 at 12:10 PM DSubject:RE: Getting all theft reports foracertain address? DTo: Daniel Clark^dclark^pobox.comD D D DHi Daniel,
D D

DThere were only21arceny reports from Metro. Moving^Stor, one of the thefts was an actual aquaintence that the owner left in the unit while she went and rentedatruck (that was in 2009), The other larceny that took place in March of this year is still under investigation,
D D D D

DFrancineDiNatale
D

DAdministrative Assistant Records Unit


D

D 617 349 3354


D

DFax: 349 3234


D D D

D ^1/ Daniel JBClarklActivist; Owner DFREEDOM^DlNCLUDED~http://freedomincluded.com D /l'^ Free Software respecting hardware
D D

DOn Wed, May 19, 2010 at 6:15 PM, seph ^seph^miLeduD wrote: DCan you stickavideo camera into your space?
D

Dseph
D

DEric Schmiedl ^unlocked^MIT.EDUD writes:


D

DDTwo options:
DD

DDo) Use the 8088 in parallel to theexistingpadlockanddon'ttell DDmanagement, DD DD DDo) Get one of these: DDhttps://securitysnobs,com/AbloyProtecPL321Padlock,html D D $ 2 5 f o r a l o c k that nobody will pick any time soon, DDhttps://securitysnobs,com/AbloyProtec PL 330 Padlock.html D D $ 7 0 f o r a l o c k that will put u p a b i t o f a f i g h t against forced entry,
DD

DDThen put one of these on your unit to keep out insiders: DDhttps://securitysnobscom/StantonConceptsPrivaSealTamperIndicativeSeals20Pack.html DD DD DD DD
DD

DDOn 5/19/104:51 PM, Christian J,Ternus wrote: DDDUnfortunately,Danny misheard me. lowned the "safe" in question DDDit was one of these: http://wwwamazoncom/dp/B000I^OX94/ The thief DDDsimplytookit, DDD DDDlasked the warehouse management to let US use our own locks; DDDapparently their policy forbids this. Let us know if you have better DDDluck, DDD DDD Ternus
DDD DDD

D D D C h r i s t i a n J , T e r n u s l M T r M E n g ' l l | A C 3 T | c t e r n u s , n e t l 6 1 7 710 8955


DDD DDD DDD DDD

DDDOn Wed, May 19, 2010 at 4:43 PM,Eric Schmiedl ^unlocked^miLeduD wrote: DDDDGo on eBay and get an S^G 8088 for $9 and be done with it: DDDDhttp://shop,ebay,com/i,html?nkw^saroent^oreenleaf^8088 DDDD DDDDThe lock is designed for precisely this kind of situation,,,very DDDDdifficult to defeat surreptitiously,not really resistant to forced entry.

DDDD DDDDi'd be curious to hear that Story about theftfromasafeinsidea DDDDlockedunit... DDDD DDDD DDDD DDDDOn 5/19/10 3:29 PM, Danny Clark wrote: DDDDDShort version: DDDDD(a)Can anyone recommendahardtopickbutnotinsanelyexpensive DDDDDpadlock? Does not need to be resistant to more forceful (drilling etc) DDDDDtechniques. (e.g.it is accepted that it will not actually stopa DDDDDdeterminedattacker,but it should be obvious if it has been DDDDDdefeated), DDDDD DDDDD(b) Ifyou have strong negatlveexperiencewith Metropolitan, itwould DDDDDhelpalot of people to postareview, for instance at: DDDDDhttp://wwwyelpcom/biz/metropolitanmovingandstoragecorpcambridge2 DDDDD DDDDDLong version: DDDDD DDDDDSoIoffhandedly brought up Metropolitan Storage Warehouse in SIPB DDDDDofficeyesterday,and it seems that this is not true: e.g.itisnot DDDDDhttp://img227.exs.cx/img227/4259/ragewarehouse5ka.jpg DDDDDire P r o o f : / DDDDD DDDDDin quick secession from aboutaquarter of the small number of people DDDDDpresentlgothorror stories regardingwater damage, theft, theftfrom DDDDDsafes^inside^ locked units, andageneral critique of their overall DDDDDsecurity, DDDDD DDDDDHoweverlwas unable to find anything remotely like that from the DDDDDinterwebs, specifically only these2sites seem to have reviews: DDDDD DDDDDhttp://www.bbb,org/boston/businessreviews/storageunitshouseholdand commercial/metropolitanmovinostoraoecorporationincambridoema 3494/ DDDDD(very positive) DDDDD DDDDDhttp://www.yelp,com/biz/metropolitanmovinoandstoraoecorpcambridoe2 DDDDD(mixes, but the negative review has nothing to do with things about DDDDDthe place that are nonobvious). DDDDD DDDDDSo if you have hadasuck experience it would be good to post there/ DDDDDreportit(or just reply and I'll postasummarytoYelpl),Feel free DDDDDto forward this to the original source of the stories, a s a l o t of DDDDDwhatIgotwas2ndor3rdhandIthink, DDDDD DDDDDThanks, DDDDD ^ 1 / Daniel JBClarklActivist; Owner DDDDD DDDDDFREEDOM^DlNCLUDED~http://freedomincludedcom DDDDD /^^ Free Software respecting hardware DDDD D

UNITED STATES OF AMERICA


V.

Manning, Bradley E. PFC, U.S. Army, HHC, U.S. Army Garrison, Joint Base Myer-Henderson Hall Fort Myer, Virginia 22211

STIPULATION OF EXPECTED TESTIMONY SA David Shaver 16 August 2013

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if SA David Shaver were present to testify during the presentencing phase of this court-martial, he would testify substantially as follows: 1. Prosecution Exhibit (PE) 205 is an email that I pulled from the allocated space in the accused's personal Macintosh computer. The personal Macintosh was previously admitted as PE 11. The email was located in the sent folder of the Thunderbird email client. Thunderbird email client is the program which hosts emails from the accused's gmail and earthlink email accounts. The email is entitled "Happy Thanksgiving [Belated]," and the accused sent the email to Mr. Tyler Watkins on 28 November 2009. 2. PE 206 is a summary I created of numerous emails that I found in the allocated space ofthe accused's personal Macintosh computer. To locate the emails, I searched for "Daimy Clark" or "Daniel Clark" in the accused's Thunderbird email client, both in the sent folder and the inbox folder. The filtered results showed all the emails between the accused and Mr. Clark and showed information inthe following fields: "To," "From," "Cc," "Subject," "Sent," and "Received." I then took a screenshot of the search results, which is what you see in PE 206. I discovered that there were twenty-seven messages in the 23 August 2009 to 20 May 2010 timeframe. In the "From" and "To" lines, the email recipients are typically listed by name only. The names "Danny Clark" and "Daniel Clark" correspond to the email addresses "dclark(gmit.edu," dclark(^pobox.com," and "danny@opensysadmin.com." Bradley.manning(^earthlink.net, Bradley Maiming, Brad Manning, and Bradley, are all emails or names that correspond to emails of the accused. 3. PE 207 is a screenshot of a configuration file showing encryption contacts located in the allocated space of the personal Macintosh computer. Specifically, the file was located at the following path: "\Macintosh HD\Users\bmanning\Library\Application SupportVAdium 2.0\Default\otr.fingerprints." Adium is the chat client that the accused used on his personal Macintosh computer. Off the Record (OTR) is an add-on to that chat client, which is used to encrypt chat communications while they are in transit. OTR requires both contacts or parties to share their encryption keys to enable chat communications. To complete this process, one party requests the initiation of encrypted conversation and the receiving party accepts the invitation. The parties then exchange unique encryption keys which serve as decoders to enable each computer receiving a message to translate the encrypted message into readable text. The screenshot reveals the individuals with whom the accused has shared encryption keys, which includes "danny(gopensysadmin.com." As previously stated, the email address "danny(^opensysadmin.com" corresponds to Mr. Danny Clark
1

PROSECUTION EXHIBIT ^ f b p A n t i f i c s t i o n FAGE OFFERED: FACE ADMITTED: PAGE OF PAGES

^. PE 208 isaportionofachatthatllocated and carved out of the unallocated space on the accused's personal Macintosh computer. Isearched the unallocated space for deleted chats between Mr. Clark's email address "danny(@opensysadmin.com" and the accused. Ithen formatted the results, so the inf:^rmation was easierto read. The portion of the chat thatllocated occurred onI8March2010and was between "bradley.e.manning@gmail.com" ("alias^Bradley Manning") and"danny(^opensysadmin.com"("alias^Danny Clark").

ANGEFOVERGAARD CPT,^A Assistant Trial Counsel

.lOSHUAFTOOMAN CPT,^A Military Defense Counsel

BRA PFC, USA Accused

Vous aimerez peut-être aussi