Manning Prosecution Exhibits
Manning Prosecution Exhibits
Manning Prosecution Exhibits
V.
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
Prosecution Motion
for Preliminary Ruling on
Admissibility of Evidence
(Business Records)
Enclosure 2
22 June 2012
^jy
PROSECUTION E X H l B l T ^ f o r i ! * ^ *
PAGE OFFERED
PAGE OF
PAGE ADt
PAGES
DECLARATION OF QUALIFIED PERSON CERTIFYING
THE AUTHENTICITY OF DOMESTIC BUSINESS RECORDS
I , Matthew Freeburg, the below-signed declarant, am employed by (Headquarters and
Headquarters Company, 2d Brigade Combat Team, 10th Mountain Division (Light), Fort Drum,
NY 13602) as Company Commander and in this position I am a qualified person authorized to
declare and certify the attached documents in accordance with Military Rules of Evidence 803(6)
and 902(11). This declaration is made in conjunction with (Headquarters and Headquarters
Company, 2d Brigade Combat Team, 10th Mountain Division (Light) response to the request
issued by SFC Monica Carlile, in the matter of United States v. PFC Bradley E. Manning.
As an authorized records custodian for (Headquarters and Headquarters Company, 2d Brigade
Combat Team, 10th Mountain Division (Light), I certify that the following attached records are
true and accurate copies of the originals:
The original unit Soldier Management Individual File (SMIF) of PFC Bradley E.
Manning, consisting of 144 pages.
The attached documents were made at or near the time of the occurrence of the events set forth
by, or from information transmitted by, a person with knowledge of the events recorded. These
records were kept in the course of the regularly conducted business activity of (Headquarters and
Headquarters Company, 2d Brigade Combat Team, 10th Mountain Division (Light) and were
created and maintained in the regular course of business by (Headquarters and Headquarters
Company, 2d Brigade Combat Team, 10th Mountain Division (Light) as a regular practice.
I declare under penalty of perjury and pursuant to 28 U.S.C. 1746 that the foregoing
information is true and correct. Executed as of the date below.
r
(Signature)
y ^ ^ ^ ^
(Printed Name)
2^^// /./
(Date)
(b) (6), (b) (7)
(C)
CERTIFICATE OF AUTHENTICITY OF DOMESTIC BUSINESS RECORDS
I, CPT Matthew Freeburg attest that I am employed by HHC/2BCT, 10MTN DIV (Ll), Fort Drum,
NY, 13602, and that my official title is Company Commander. I am a custodian of records for
HHC/2BCT, Fort Drum, NY, 13602. I certify that the attached records are the originals or true
and accurate copies of the originals. I am the custodian of the attached records consisting of
pages. I have provided the following:
The original unit Soldier Management Individual File (SMIF) of PFC Bradley E. Manning,
Furthermore, the attached documents were made by, or from, information transmitted by a
person with knowledge of the events recorded, were made at or near the time of the events
recorded. We create and maintain these documents in the regular course of business as a
regular practice.
This certification is intended to satisfy Military Rule of Evidence 902(11).
>
(Signature)
Matthew Freeburg
(Printed Name)
19 January 2011
(Date)
X^'/yg, x^.
/ ? / hf ^ ^ / ^. y
(Address)
(Phone)
(b)
(6)
(b) (6),
(b) (7)
(C)
(b) (6), (b) (7)(C)
1
NAME: Manning, Bradley Edward SSN:
STATEMENT FOR ENLISTMENT
UNITED STATES ARMY ENLISTMENT PROGRAM
For use of this form, see AR 601-210: the proponent agency is ODCSPER
(For instructions using this form see USAREC Reg 601-96)
DATA REQUIRED BY THE PRIVACY ACT OF 1974
AUTHORITY: Title 10, United States Code. Section 275 Executive Order 9397.
PRINCIPAL
PURPOSE:
Basic form used to record contractual obligations to enlistees. Guarantees and annexes
enlistment contract.
ROUTINE USES: This form becomes a part of the Enlisted Master File and Field Personnel File. Al l uses of
this form are internal to the United States Army.
DISCLOSURE: Disclosure of the Social Security Number: (SSN) and other personal information is
voluntary. However failure to provide the required information may result in denial of
enlistment or reenlistment.
ACKNOWLEDGMENT: In connection with my enlistment in the Regular Army. I hereby acknowledge that:
a. 1 am enlisting for the following program (s):
PROGRAM
9A
9C
TI TLE
United States ARMY Training Enlistment Program(lJNCM)
United States ARMY Incentive Enlistment Program(US ARMY CASH
BONUS, 4 YR ENL, US ARMY SEASONAL BONUS (HIGH PRIORITY
SEAT), I - I I I A)
REQUEST OPTION
03
174, 270
b. My enlistment for this program assures me that, provided I meet required prerequisites, I will receive training in the following
Military Occupational Specialty (MOS) or Career Management Field (CMF)
MOS: 35F Intelligence Analyst
Skill Level: 1
SQI: O NO SPECIAL QUALIFICATIONS
ASI: 00 DEFAULT CODE
Language: YY NONE
c. I understand that the assignment location for which I have enlisted is subject to change i f either my spouse or dependent child
(ren) are enrolled in the Exceptional Family Member Program (EFMP) for medical reasons, meaning that one or more of my
family members require medical treatment that may not be available at all military medical treatment facilities (MTF). I
further understand that i f my original assignment option is changed due to that installation's MTF not being able to provide
the proper care for my family member(s), 1 will be assigned to another installation where proper medical care is available,
based on the Army's need for a Soldier of my military occupational specialty and rank at that installation. 1 understand that i f
1 have not enlisted for a guaranteed assignment and either my spouse or dependent child(ren) are enrolled in the EFMP, my
2007100209:33 DA form 3286, April 2005 (Annex B) Page 1 of 8
(b) (6), (b)
(7)(C)
#
USMEPCOM SERVICE LIAISON VERIFICATION PACKET
REGULAR ARMY/RIGHT SIDE
(For use of ttils form, see USMEPCOM Reg 601-23)
#
FOR OFFICIAL USE ONLY
Pags 1 of 2 Pages
SUB-PACKET NUMBER
DOCUMENTS
DA Form 32B6-series (Statement for Enlistment) and similar statements (DD Forni 4
annex) (note 2j (GCR Dynamic Annex)
cy
DA Form 4789 (Statement of Entitlement to Selective Reenlistment Bonus) cy.
USAREC Form 1127 (Statement of Enlistment (or Appointment) Anny Policy) cy
USAREC Form 1037 (Probation Officer and/or Court Records Check)
cy
NA
DA Form 3283-R (Statement of IVtember Removal from Temporary Disability Retired
List)(DD Form 4 Annex)(note 2)**
cy
REQUEST printout NA
USAREC Form 1232 (Loan Repayment Counseling) cy
Request for Waiver (note 2)* cy
USAREC Form 1104 (Enlist Eligibility Questionnaire)(note 2) O/cy cy
DA Form 2-1 (Personnel Qualification Record)(note 2)"
cy
NA
DA Form 2A (Personnel Qualification Record(computer printout)(note 2)*
ey
NA
DA Form 61 (Application for Appointment)(note 2)**
NA
DA Form 705 (Army Physical Fitness Test Scorecard)(note 2*" O/cy NA
DA Form 5585-R (Wan^nt Officer Flight Training) cy
DA Form 55B6-R (Officer Candidate School)
DA Form 873 (Certificate ot Security Clearance)(note 2)"
cy
USARbC Form 122/ (Security Clearance Questionnaire)
cy
NA
UA l-orm 418/ (Personnel Action (KA Enlistment Delay tor AppL, with existing tVIUS)) (note 2)"'
cy
DA Form 33U (Language Ifroticiency Questionnaire)"
cy
DA Form 4886 (Issue In-Kjnd Personnel Clothing Kecord)(note 2)"
cy
Authorized miscellaneous personal documents used to venty requirements tor dependency, Birth certificate,
citizenship, etc (note2)
O/cy NA
cy
Grade determinatioti documents (note 2)
cy
SSN documentation (note 2) cy
USAREC FL 1034 (DEP Status Change Request) and/or USAREC Ft, 1035 (Request to Change AD
[Enlistment Option)(note 2)**
NA
BINS Verification Document(s) NA
NOTE: Place a chock mark in the block to the left .qf thadocuments for documents that are required and included.
Place an "NA" In the block to the left of the documents for documents that are not required.
Place an "NP" ip.th^btock to the left of the documents for documents that are not provided.
Inclusion/Sequence of Checklist Verified By fied By /
V"7cv^ M^J^
Printed Name of Service Rep
^
#
MONTGOMERY Gl BI LL ACT OF 1984 (MGIB)
(Chapter 30, Title 38. U.S. Code)
BASIC ENROLLMENT
PRIVACY ACT STATEMENT
AUTHORITY: Chapter 30, Title 38, U.S. Code, Sections 3011, 3012, 3018A, and 3018B; and EO 9397.
PRINCIPAL PURPOSE(S): To document the understanding of members about their eligibility or lack of eligibility for benefits
under the Montgomery Gl Bill Act of 1984 (MGIB) and document a member's election to decline enrollment for benefits under the
MGIB.
ROUTINE USE(S): To the Department of Veterans' Affairs to ascertain an individual's eligibility to claim benefits under the MGIB.
DISCLOSURE: Voluntary; however, failure to provide the requested information will result in the individual being automatically
enrolled in the MGIB program.
1. SERVICE MEMBER DATA
a. NAME (LAST First, Middle Initial) b. SOCIAL SECURITY NUMBER (SSN)
Manning, Bradley Edward
2. STATEMENT OF UNDERSTANDING FOR INELIGIBLE MEMBERS
I am NOT eligible for the MGIB because (a) I am a service academy graduate, or (b) I am an ROTC scholarship graduate who
received more than the current minimum amount allowed for enrollment in MGIB, or (c) I am a prior service member who
disenrolled during my previous term of active duty.
a. SERVICE MEMBER SIGNATURE b. RANK/GRADE c. DATE SIGNED(TTyyA/jWDD)
3. STATEMENT OF UNDERSTANDING FOR ALL ELIGIBLE MEMBERS
1. I am automatically enrolled unless 1 exercise the option to DISENROLL by signing Item 5 below.
2. I understand that UNLESS I DISENROLL from the MGIB my basic pay will be reduced $100 per month or the current monthly
rate until $1200 has been deducted; this basic pay reduction CANNOT be REFUNDED, SUSPENDED OR STOPPED this is an
IRREVOCABLE DECISION.
3. I must complete 36 months of active duty service (24 months i f my enlistment is for less than 36 months) before I am entitled to
the current rate of monthly benefits. The MGIB provides benefits for a period of 36 months.
4. I understand 1 am eligible for an increased monthly benefit by contributing an additional amount, not to exceed $600 while on
active duty. Once I separate, I cannot contribute.
(b) (6), (b)
(7)(C)
^
5 Imust receive an HONORABLE discharge for service establishing entitlement to the MGIB. This DOES NOT include'under
honorable conditions'.
6. Imust complete the requirements ofasecondary school diploma or equivalency certification,or successfully complete the
equivalent ofl2semester hours inaprogram of education leading toastandard college degree before applying for benefits with
the Department ofVeterans'Aflairs
7. IhavelOyears from date oflast discharge from active tluty to use MGIB benefits.
8. I f l di e while on active duty, or within one year after discharge or release from active duty i f service related,my designated
beneficiary(ies)will receive the unused balance ofthe money reduced from my basic pay for the MGIB.This death benefit will be
paid by the Department ofVeterans'Affairs (DVA).
9. Icannot receive any combination ofDVAeducational benefits in excess of 48 months.
10. Imust complete at least ^4 months ofa3year active duty service obligation and i f my obligation is2yearslmay join and serve
honorably in the Selected Reserve foraminimumof 48 months to qualify for the current active duty benefit rate.A(one)period of
service CANNOT qualify me for both active and reserve MGIB benefits.
a. SERVICE MEMBER SIGNATURE b. RANK/GRADE c. DATE SIGNEDfTTyTMMDD)
EOl 20070926
4. SERVICE UNIQUE EDUCATION ASSISTANCE OPTIONS
Term of Enlistment: 4 Years, 00 Weeks, MOS: 35F
5. STATEMENT OF DISENROLLMENT
I DO NOT desire to participate in MGIB. I understand the benefits of the MGIB program and that I WI LL NOTbe able to enroll at a
later date.
a. DATE SIGNED (YYYYMMDD) b. RANK/GRADE c. SERVICE MEMBER SIGNATURE
6. CERTIFYING OFFICIAL
# #
a. TYPED OR PRINTED
J^AME(LAST, First, Middle
Initial)
Jones , Mark A
b. RANK/GRADE c. SIGNATURE d. DATE
SIGNED
(YYYYMMDD)
20070926
DD FORM 2366, JUN 2002 PREVIOUS EDITION IS OBSOLETE.
#
MONTGOMERY Gl BI LL ACT OF 1984 (MGIB)
("CA^g^kr JO. 7{//e 3& [/. Coc/e)
BASIC ENROLLMENT
PRIVACY ACT STATEMENT
AUTHORITY: Chapter 30, Title 38, U.S. Code, Sections 3011, 3012, 3018A, and 3018B; and EO 9397.
PRINCIPAL PURPOSE(S): To document the understanding of members about their eligibility or lack of eligibility for benefits
under the Montgomery Gl Bi l l Act of 1984 (MGIB) and document a member's election to decline enrollment for benefits under the
MGIB.
ROUTINE USE(S): To the Department of Veterans' Affairs to ascertain an individual's eligibility to claim benefits under the MGIB.
DISCLOSURE: Voluntary; however, failure to provide the requested information will result in the individual being automatically
enrolled in the MGIB program.
1. SERVICE MEMBER DATA
a. ISlAMI. (LAST First, Middle Initial)
Manning, Bradley Edward
b. SOCIAL SECURITY NUMBER (SSN)
2. STATEMENT OF UNDERSTANDING FOR INELIGIBLE MEMBERS
I am NOT eligible for the MGIB because (a) I am a service academy graduate, or (b) I am an ROTC scholarship graduate who
received more than the current minimum amount allowed for enrollment in MGIB, or (c) I am a prior service member who
disenrolled during my previous term of active duty. . : i. . ; ; : ! . .
a. SERVICE MEMBER SIGNATURE b. RANK/GRADE c. DATE SIGNED (T7}TMWDD)
3. STATEMENT OF UNDERSTANDING FOR ALL ELIGIBLE MEMBERS
1. I am automatically enrolled unless I exercise the option to DISENROLL by signing Item 5 below.
2. I understand that UNLESS I DISENROLL from the MGIB my basic pay will be reduced $100 per month or the current monthly
rate until $1200 has been deducted; this basic pay reduction CANNOT be REFUNDED, SUSPENDED OR STOPPED this is an
IRREVOCABLE DECISION.
3. I must complete 36 months of active duty service (24 months i f my enlistment is for less than 36 months) before I am entitled to
the current rate of monthly benefits. The MGIB provides benefits for a period of 36 months.
4. I understand I am eligible for an increased monthly benefit by contributing an additional amount, not to exceed $600 while on
active duty. Once I separate, I cannot contribute.
(b) (6), (b)
(7)(C)
^
5. Imust receive an HONORABLE discharge for service establishing entitlement to the MGIB This DOES NOT include'under
honorable conditions'
6 Imust complete the requirements ofasecondary school diploma or equivalency certification,or successfttlly complete the
equivalentofl2semester hours inaprogram of education leading toastandard college degree before applying for benefits with
the Department ofVeterans'Affairs
7. IhavelOyears from date oflast discharge from active duty to use MGIB benefits.
8. I f l di e while on active duty, or within one year after discharge or release from active duty i f service related, my designated
benefictary(ies)will receive the unused balance of the money reduced from my basic pay for the MGIB.This death benefit will be
paid by the Department ofVeterans'Affairs (DVA).
9. Icannot receive any combination ofDVAeducational benefits in excess of 48 n^onths.
10. Imust complete at least 24 months ofa3year active duty service obligation and i f my obligation is2yearslt^ay join and serve
honorably in the Selected Reserve foraminimumof 48 rt^onths to qualify for the current active duty benefit rate.A(one)period of
service CANNOT qualify me forboth active and reserveMGIB benefits.
a. SERVICE MEMBER SIGNATURE b. RANK/GRADE c. DATE SIGNED ( mTMMDD)
EOl 20070926
4. SERVICE UNIQUE EDUCATION ASSISTANCE OPTIONS
Term of Enlistment: 4 Years, 00 Weeks, MOS: 35F
5. STATEMENT OF DISENROLLMENT
I DO NOT desire to participate in MGIB. I understand the benefits of the MGIB program and that I WI LL NOTbe able to enroll at a
later date.
a. DATE SIGNED (YYYYMMDD) b. RANK/GRADE c. SERVICE MEMBER SIGNATURE
6. CERTIFYING OFFICIAL
#
#
a. TYPED OR PRINTED b. RANK/GRADE c. SIGNATURE
NAME (LAST, First, Middle
Initial)
Jones , Mark A
d. DATE
SIGNED
(yyyyMMDD)
20070926
DD FORM 2366, JUN 2002 PREVIOUS EDITION IS OBSOLETE.
#
MONTGOMERY Gl BI LL ACT OF 1984 (MGIB)
(CAqp/er 30. 7;//e j & (7.:^. Code)
BASIC ENROLLMENT
PRIVACY ACT STATEMENT
AUTHORITY: Chapter 30, Title 38, U.S. Code, Sections 3011, 3012, 3018A, and 3018B; and EO 9397.
PRINCIPAL PURPOSE(S): To document the understanding of members about their eligibility or lack of eligibility for benefits
under the Montgomery Gl Bi l l Act of 1984 (MGIB) and document a member's election to decline enrollment for benefits under the
MGIB.
ROUTINE USE(S): To the Department of Veterans' Affairs to ascertain an individual's eligibility to claim benefits under the MGIB.
DISCLOSURE: Voluntary; however, failure to provide the requested information will result in the individual being automatically
enrolled in the MGIB program.
1. SERVICE MEMBER DATA
a. NAME (1^57; First, Middle Initial)
Manning, Bradley Edward
b. SOCIAL SECURITY NUMBER (SSN)
2. STATEMENT OF UNDERSTANDING FOR INELIGIBLE MEMBERS
I am NOT eligible for the MGIB because (a) I am a service academy graduate, or (b) I am an ROTC scholarship graduate who
received more than the current minimum amount allowed for enrollment in MGIB, or (c) I am a prior service member who
disenrolled during my previous term of active duty. ; ; .
a. SERVICE MEMBER SIGNATURE b. RANK/GRADE c. DATE SIGNED (YYYYMMDD)
3. STATEMENT OF UNDERSTANDING FOR ALL ELIGIBLE MEMBERS
1. I am automatically enrolled unless I exercise the option to DISENROLL by signing Item 5 below.
2. I understand that UNLESS I DISENROLL from the MGIB my basic pay will be reduced $100 per month or the current monthly
rate until $1200 has been deducted; this basic pay reduction CANNOT be REFUNDED, SUSPENDED OR STOPPED this is an
IRREVOCABLE DECISION.
3. I must complete 36 months of active duty service (24 months i f my enlistment is for less than 36 months) before I am entitled to
the current rate of monthly benefits. The MGIB provides benefits for a period of 36 months.
4. I understand I am eligible for an increased monthly benefit by contributing an additional amount, not to exceed $600 while on
active duty. Once I separate, I cannot contribute.
(b) (6), (b) (7)(C)
B
5. Imust receive an HONORABLE discharge for service establishing entitlement to the MGIB This DOES NOT include'under
honorable conditions'
6 Imust complete the requirements ofasecondary school diploma or equivalency certification, or successfully complete the
equivalent ofl2semester hours inaprogram of education leading toastandard college degree before applying for benefits with
the Department ofVeterans'Affairs.
7 IhavelOyearsfi^om date oflast discharge from active duty to use MGIB benefits
8. I f l di e while on active duty, orwithin one year after discharge or release from active duty i f service related, my designated
beneficiary(ies)will receive the unused balance of the money reduced from my basic pay for theMGIB.This death benefit will be
paid by the Department ofVeterans'Affairs (DVA).
9. Icannot receive any combination ofDVAeducational benefits in excess of 48 months
10 Imustcompleteatleast24monthsofa3yearactivedutyserviceobligationandifmyobligationis2yearslmayjoinandserve
honorably in the Selected Reserve foraminimumof 48 months to qualify for the current active duty benefit rate.A(one)period of
service CANNOT qualify me for both active and reserve MGIB benefits.
a. SERVICE MEMBER SIGNATURE b. RANK/GRADE c. DATE SIGNED (TTyyMMDD)
EOl 20070926
4. SERVICE UNIQUE EDUCATION ASSISTANCE OPTIONS
Term of Enlistment: 4 Years, 00 Weeks, MOS: 35F
5. STATEMENT OF DISENROLLMENT
I DO NOT desire to participate in MGIB. I understand the benefits of the MGIB program and that I WI LL NOTbe able to enroll at a
later date.
a. DATE SIGNED (YYYYMMDD) b. RANK/GRADE c. SERVICE MEMBER SIGNATURE
6. CERTIFYING OFFICIAL
#
#
a. TYPED OR PRINTED b. RANK/GRADE c. SIGNATURE
NAME (LAST First, Middle
Initial)
Jones , Mark A
d. DATE
SIGNED
(yyyyMMDZ))
20070926
DD FORM 2366, JUN 2002 PREVIOUS EDITION IS OBSOLETE.
.,;.W'<'.i'ift.;^-A>s:---v.:?.''
i^i^i USMEPCOM ACCESSIOIFVERIFICATIQN PACKET
REGULAR ARMY/LEFTSIDE
(For use, see USMEPCOM Reg 601-23)
FOR OFFICIAL USE ONLY
Page 1 of 2 Pages
SUB-PACKET NUMBER
DOCUMENTS |
1 1 2 1
Orders and any amendments 1
O/cy 1 7cy 1
DD Form 2808 (Report of Medical Examination) with waiver documents, if applicable, ' 1
and all Medical supporting documents from consults etc.. j
0 cy
DD Form 2807-1 (Report of Medical History) |
0 j
cy
Audiogram 1
0 1
NA '. 1
USMEPCOM Form 40-1-2-R-E (Report of Medical Examination/Treatment)
O/cy
NA 1
DD Form'2807-2 (Medical Prescreen of Medical History) 1 0
NA 1
,. . USMEPCOM Form 40-8-1-R-E (HlV Antibody Testing Acknowledgment) | O/cy 1 NA
1 DD Form 2005 (Privacy Act Statement-Health Care) | O/cy 1
NA
1, DD Form 1966-serles (Record of Military Processing-Armed Forces ofthe United |
. States)
cy
0 1
1 DD Form 4-series (Enlistment/Reenlistment Document-Armed Forces of the United 1
i States)
cy
0 1
1 USMEPCOM PCN 680-3ADP (See para. 8-8 if not available)
0 NA
1 SF 86 (Questionnaire for National Security Positions) or EPSQ printout version and
1 SF 86A (Continuation Sheet for Questionnaires SF 86, SF 85P, and SF 85) cy
cy
1 ENTNAC Results/DlS Form 1 (Report Of National Agency Check) (manual
1 ENTNAC/ NAC)
0 NA 1
1 USMEPCOM Form 601-23-5-R-E (Introductory Pre-accession interview) note 3
cy
cy 1
USMEPCOM Fortri 601-23-4-E (Restrictions on Personal Conduct in the Armed
1 Forces)
0 cy
I ' . USMEPCOM Form 40-8-R-E (Drug and Alcohol Testing Acknowledgment)
1 O/cy 1 NA j
1 .- DD Forrn 214 (Certificate of Release or Discharge from Active Duty), or NGB Form
1 22 (Report of Separation), DD Form 215, (Con-eclion to DD Form 214) and/or DD
1 Form 220 (AD Rpt), REDD Report, discharge certificate or similar document)**
1 cy
1 1
I , DD Form 358 (Request for Conditional Release)** 0
1 1
1 DD Form 369 (Police Record Check)**
1 cy
NA
1' DD Form 372 (Request for Verification of Birth)** 0
1 1
1 DQD Form 1304.12-K (ASVAB Scoring Worksheet)**
1 0
1 NA 1
1 DD Form 2366 (Montgomery Gl Bill (MGIB) Act of 1984) 1 3cy 1 0 1
1 SF 1199A (Direct Deposit Program Form) O
1 NA 1
1 DD Form 93 (Record of Emergency Data)
1 O/cy
NA
1 NOTE: Place a check mark in the block to the left ofthe documents for documents that are required and included.
1 Place an "NA" in the block to the left of the documents for documents that are not required.
1 Place an "NP" in the block to the left of the documents for documents that are not provided.
1 . The Inclusion/Sequence of Checklist Verified By
1 USMEPCOM Rep Signature Printed Name of USMEPCOM Rep
RSONAL iN NATURE
#
jrsday, October 4, 2007 @ 10:21 , ,M (R)
Page 1 of 1
ROSTER:07275 SUB ROSTER: 81
NAME: MANNING BRADLEY EDWARD
LINE NO: 010
SSN
PAYGRADE/CODE E01 1 RANK: PV1
DATE OF RANK 20071002 BPED: 20071002
BASD 20071002 ETS: 20111001
EDUCATION E MOS: 35F0O
SERVICE COMP R DATE OFBIRTH: 19871217
BLOOD GROUPATYPE O P MARITAL STAT/NO DEP: S 0
SEX M CITIZENSHIP: A
MENTAL CATEGORY B TYPE COMMITMENT: UNCM
RACE C PHYSICAL CAT/PROFILE: B 111121
DRIVERS LICENSE Y ETHNIC: X
ELIGiOUS CODE/PREF 62 HEIGHT: 62
WEIGHT: 101
HAIR B EYES: B
BONUS ENLISTMENT 9 Gl BILUAFC CODE: 05
MATH/SCIENCE 1 PRIOR SERVICE/YEARS:
DATE OF ARRIVAL 20071002 EAD DATE: 20071002
TERM OF SERVICE 4 TERM OF SERVICE MONTHS: 48
MEP STATION BALTIMORE MD MEPS CODE: A02
PHASE HIVDATE: 20070831
RLANGID CONUS PREF: 06
0C0NUS1 PREF OE OCONUS2 PREF: OA
0C0NUS3 PREF OF ASSIGNMENT CONSID:
RECRUITOR SSN/NAME: BOYLE AFQT: 00
GT: 123 GM: 128 EL: 127 CL 126 MM: 121 SC: 128 CO: 128 FA: 128 OF; 126 ST: 128
ENTNAC: SUBMISSION CODE/DATE: F 20070926 RESULT DATE:
HOR ADDRESS
CURRENT ADDRESS
LEGAL ADDRESS
BIRTH ADDRESS OKLAHOMA CITY OK US
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)(C)
(b) (6), (b)
(7)(C)
Print All Letters ^ Page 1 of 3
$
APPLICANT COPY
CONGRATULATIONS! A SUCCESSFUL RESERVATION WAS COMPLETED FOR
NAME: MANNING BRADLEY EDWARD SSN: XXXXX
JOB:35F1O00YY %L Y s 7 " - ' - " ' ' ' " ' ^
TERM: 4 YEARS 0 WEEKS
OPTION: 3 TITLE: US ARMY TRAINING OF
CHOICE
ASSOC. OPTION: 174 TITLE: US ARMY CASH BONUS, 4 YR ENL
.^.-ric US ARMY SEASONAL BONUS (HIGH
ASSOC. OPTION: 270 TITLE: ppj i ^pj ,.^ SEAT). I-IIIA
TOTAL BONUS AMOUNT: 24000
FIRST UNIT OF ASSIGNMENT: UNCM
EXPECTED ARRIVAL DATE:
DEP SWEAR-IN DATE:
REPORT TO THE MEPS FOR TRANSPORTATION TO YOUR TRAINING LOCATION ON 20071002.
WHILE SPECIFIC TRAINING LOCATIONS ARE NOT GUARANTEED. YOU ARE TENTATIVELY SCHEDULED TO RECEIVE THE
FOLLOWING TRAINING:
TYPE LOCATION START DATE LENGTH WKS LENGTH DAYS
BT LWOOD 20071026 12 0
,^ ,AIT , HUACHUCA 20080122 -.16 , . ,. . 3
r TOTAL TRAINING LENGTH is 28 WEEKS AND 3 DAYS. ; . ' ; : , -
' IN ORDER FOR YOUR RESERVATION TO REMAIN VALID. YOU MUST REMAIN MORALLY AND PHYSICALLY QUALIFIED FOR ENLISTMENT.
- PLEASE REPORT ANY CHANGES THAT AFFECT YOUR STATUS TO YOUR RECRUITER IMMEDIATELY. ^ ^ :f /
PERMANENT RESERVATION DATE; 20070926 '
Job Quals Reservation Report Letter Print All
time \
T^^JhJi
Coir^cy^^d ^ ^ ^ ^
T ca^J y /
D.rf^/^ /O^y^r./^/^
J^hJD
/ / 3?
/ ^ / ^ ^ /
^Ao^/^^^"^
https://dragoon.green.keystone.army.mil/http/dragoonl.green.keystone.amiy.mil/wrstage/P... 9/26/2007
(b)
(6),
(b)
(7)
(C)
Print Al l Letters
#
Page 2 of3
RA Applicant Data Report
Name: MANNING BRADLEY EDWARD Applicant SSN: XXXX
MEPS: A02
Applicant Information
Address: City: POTOMAC State: MD
Phone: DOB: 19871217 Gender: M Race: C
Citizenship Status: C A PERSON WHO IS A CITIZEN OF THE UNITED STATES BY BIRTH OR NATURALIZATION
Ethnic Code: Y NONE Child Dependents: 0 Adult Dependents:
Driver's License Expiration: 20090215 Math: 4 GENERAL MATH Science: 4 GENERAL SCIENCE
Report Date: 20070926
Zip: 208540000 Country: US
Citizenship: A NATIVE BORN
Education Years: 12
Typing Certificate:
Physical Profile: 111121
Status Obligator:
Recruiting Program(s):
Advanced Rank Reason:
Physical Examination Date:
20070831
Additional Physical Examination
Date:
Education Code: L HIGH SCHOOL DIPLOMA
Typing Words Per iMinute: Grade: 1
Color Vision Test: N NORMAL COLOR VISION
BT Completion Indicator: N STARR: N
ASVAB Scores:
Predicted ASVAB Scores: GT:
ASVAB Administration Date:
Miscellaneous Scores:
AFQT Score: 89 Predicted AFQT:
DLPT Score: Reading
Language Method Score Level
Physical Examination Type: EN ENLISTMENT
Additional Physical Examination Type:
GT: 123 GM: 128 EL: 127 CL: 126 MM: 121
GM: EL: CL: MM:
Language Scores:
Height: 62.0
MPC: E
APFT Date:
Weight: 101.0
DOS:0
Source of Commission:
APFT Result:
SC: 128
SC:
CO: 128
CO:
FA: 128
FA:
OF: 126
OF:
ST: 128
ST:
AIM Score: 0 AIM Date: SWPT Score: SWPT Date: AO Score
Listening
Date Method Score . Leivel Date
AO Date: f '
Speaking'
Method Score :. Level Date
Held Skills
Enlistment Category and Reservation Information
Enlistment Category: NPS
Term: 48
RECSTA Location: LWOOD
BAT Start Date:
Status: R
Enlist Date: 20071002
RECSTA Date: 20071022
Training Location: HUACHUCA
DEP Verification Date:
Pre-Training Date:
Training Type: S
Assignment Arrival Date:
PaYS Position ID:
Overrides
Policy Override: N
TOS Override: N
Remarks: gma WANTS 35f (me)
Incentive Information
Incentive: 174
Incentive: 270
Credit Information
Recruiter SSN: XXXXX
Reservation Type: E Training Type: S CAS: B
Perm. Reserv. Date: 20070926 ESL Weeks: 0
BT Location: LWOOD
Ship Verification Date:
Pre Training Location:
Enlist CMF: 35
Reno Quantity: 0
FSR2S Override: N
DEP Override: O
Ship Date: 20071002
Out Month: 20080516
Enlist Job: 35F1O00YY
Bat Required Override: N
Accession Override: O
ETS Date: 20111001
UlC:
Incentive Override: N
Amt: 4000
Amt: 20000
Recruiting Station ID: 1B1A OfRce Code: 1B02
Guidance Counselor SSN: XXXXX
Back
https://dragoon.green.keystone.amiy.mi1/http/dragoonl.green.keystone.army.mil/wrstage/P... 9/26/2007
(b)
(6),
(b)
(7)
(C)
(b) (6), (b) (7)(C)
(b) (6)
(b)
(6),
(b)
(7)
(C)
(b)
(6),
(b)
(7)
(C)
Print Al l Letters ^ Page 3 of 3
JOB QUALS INFORMATION FOR
NAME: MANNING BRADLEY EDWARD SSN: XXXXX JOB: 35F1O00YY INTELLIGENCE ANALYST
REMARKS: CRS LGTH 16WKS/3DS /ACASP. Intelligence analysts must possess the following qualifications: (1) A physical demands rating
of heavy. (2) A physical profile of 222221. (3) Normal color vision. (4) Qualifying scores, c) A minimum score of 101 in aptitude
area ST on ASVAB tests administered on and after 1 July 2004. (5) The Soldier must meet TS SCI access eligibility requirements
to be awarded this MOS. For training (if required) an interim TS with SCI access granted from the CCF meets this requirement.
(6) A high school graduate or equivalent prior to entry into active duty.
QUALIFICATION POLICIES:
PHYS_PRFL_CMPST_CD >= 222221 AND ST_SCORE >= 101 AND CLR_VSN_TST_RSL_CD >= N AND CTZSP_ORIG_CD >= D AND
CIV_ED_DSG_CD >= 9 AFQT_PCTL_NR >= 1 AFQT_PCTL_NR >= 1 AFQT_PCTL_NR >= 1
I I
https://dragoon.green.keystone.army.mi1/http/dragoonl.green.keystone.army.mil/wrstage/P... 9/26/2007
(b)
(6)
* * * USMEPCOM PCN 6 8 ( ^ D P * * *
PROCESSEE/ENLISTEE HCORD
* * * PRIVACY A CT PL93-579 APPLIES * * *
DAa^&) 07- 10- 02
T l i m^ 0 1 3
MEPS: A02
SSN:
7" T V-
<
Z
o
(0
cc
O
SSN SPF
DAR
NAME (Last, First, Middle, Suffix)
MANNING
BRADLEY
EDWARD
PMS:N DAYS: 0000
SSN: R ARN:
HIV: R
DMDC: N
ENTNAC:S
DRUG: R
>-
P
V
PROJ FOR:
WKID RPTD:
M
P
7
7
D
A
0
B
SSC:
SS#:
Jsl
P-SSN:
P-LNAME;
P-MEPS:A02 j L-TRANS: B001B L-DOA: 2007-10-02 RID: 6
X USER: TINSLEY L-SYNC: 20071002/083432
XX
PROCESSING DATE
LA.
TYPE
B
STREET, CITY, COUNTY, STATE, COUNTRY, ZIP CODE
CTZN
CA
ARN
A
COC SEX RACIAL ETHNIC MARITAL #DEP DOB REL EDUC F LANGUAGE
M F D S 0 1987-12-17 62 12L 1 2 NONE
> o i FLAG ST
- ' ! Y MD M552098189857
EXP DATE
2009-02-15
CITY, STATE, COUNTRY
OKLAHOMA CITY OK US
RECRUITER ID/SSN-STATION ID
/ 1B1A
tn
z
o
CURRENT MEDICAL INSURER NAME
NONE
MEDICAL INSURER ADDRESS (Street, City, State, Country,) ZIP Code)
v;
4^
CURRENT MEDICAL PROVIDER NAME
NONE
MEDICAL PROVIDER ADDRESS (Street, City, State, Country,) ZIP Code)
W & .
C5
Z
H
(A
O
AFQT TiD DOT ST M-SiTE
89 02E 2007-08-30 P 021992
y
u
g
U]
A_
TYPE SCORE DOT GS
69
AR
62
WK
62
PC
53
MK
63
Ei
70
AS
48
MC
66
AO
52
VE
59
COMPOSITES: GT CL CO EL FA GM MM OF SC ST
123 126 128 127 128 128 121 126 128 128
ADMINISTRATOR: 000009150
MANUAL - AUTHORIZATION: ELIGIBLE DATE: 2007-09-30
<
O
Q
O
, SF88: PRESCREEN: PHYSICAL: 2007-08 31 INSP: 2007-10-02
Y
RBJ: ELiGiBiLiTY:
V ~
X-RAY: NXT EQP: N
HOT: 62.
WGT: 101
FAT:
HAIR: BLOND
EYES: BLUE/BLUE
BP: 121/079
^ PiP: P
FLNT: X
AFVT: X
RIG: X
DISTANT NEAR
R: 020/020 020/020
L: 020/020 020/020
^REFRAC: M
AUDIO: 05 10 20 30 40 60
RIGHT: 05 05 00 00 00 00
LEFT: 05 05 10 00 00 20
P
(E) 1
U
1
H
1
E
2
S
1
X
E
WVR: N CNSLT: Y HCG: M
SPECIMEN DOT RSLT RSLT
02167796 2007-08-31 5B 2007
DATE
09-05
02167796 2007-08-31 NNN NNN 2007 09-05
Ol
O I
2007-08-31 N
FAIL:
, iCDCODE:
Q.
UJ
O
O
Z
o
CO
CO
UJ
o
o
<
o
y
DOE PADD ES RECRUITER STNiD PEF T-E MOS/AFS
2007-09-26 2007-10-02 3 111119968 1B1A CACTB 35F1
PAY GRADE: EOl SERVICE ANNEX CODES: A MSG: 0800
WA I V E R CODE
YYY
AD OBLIGATION: 0400
SERVICE
REQUIRED CODES:
1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8 9 40
< REASON
1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2 3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90
1 2 3 4 5 6 7 8 9 00 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8 9 40
4 6 9 7 4 3 0 6 0
DOE
2007-10-02
PAY GRADE
EOl
YOUTH OA
YYO YY
ADSD PED MSO AD/RC OBLIGATION WA I V E R CODE
-<
y
2007-10-02 2007-10-02 0800
DOG ES EDUC RECRUITER
2007-10-02 1 12L 100000000
STATE GUARD SERVICE ANNEX CODES
B
04/00 YYY
STNID PEF T-E MOS/AFS PMOS/AFS
00000 CACTB 35F10 35F10
REPLACES ANNEXES UiC 368/214
A W0V3LK N
SERVICE
REQUIRED CODES:
DATE
SPF
DATE
REASON
SPF
< DATE
REASON
SPF
C3
CC
<
X
o
CO
5
Q.
UJ
O
680-3ADP PAGE 1 of 2
(b) (6), (b)
(7)(C)
(b) (6)
(b) (6)
(b) (6),
(b) (7)(C)
INFO
%
w
DATE RCVD
DATE SUB
2007- 08- 30
RSLT
R
DATE RCVD
2007 09- 04
FOREIGN BORN
A
DATE DEATH DEATH SOURCE
D
O
CC
o
^
u
^
DATE SUB
L-NAME:
F-NAME:
CASE #
DATE CASE # RSLT DATE CLSD DOB
USCIS INFO
POB-CTRY STATUS
CTZN WORK
PATH DATE SUB CASE #
A 2007-09-26 70696500
DATE CASE # RSLT AGV DATE CLSD
TYPE NAME
TYPE APPLY TO DATE INTVWD DATE CLRD REMARKS
2
u
z
<
Q.
UJ
cc
o
CO
Q
O
REMARKS
REASON
o WORK HISTORY
WKID DOA/TIME SYNC MEPS OWN SPF USERNAME WKID DOA/TiME SYNC MEPS OWN SPF USERNAME
BOO I B 20071002/101319 N A02 P DAR TINSLEY
TOOOl 20071002/065515 Y A02 P DAR LEGRAND
B070P 20071002/065512 Y A02 P DAR LEGRAND
TOOOl 20071002/055642 Y A02 P DAR LEGRAND
POOOP 20070928/140514 Y A02 P DAR PROCTOR
B006S 20070927/052154 Y A02 P DAR USMIRSDB
S001C 20070926/144549 Y A02 P DAR JACKSON
B006A 20070926/144324 Y A02 P DAR JACKSON
B002A 20070926/144252 Y A02 P DAR JACKSON
SOOOE 20070926/144132 Y A02 P DAR JACKSON
B080P 20070926/064434 Y A02 P DAR LEGRAND
TOOOl 20070926/052554 Y A02 P DAR KNAUB
POOOP 20070925/094043 Y A02 P DAR PROCTOR
TOOOO 20070907/074246 Y A02 P DAR TINSLEY
B080L 20070907/070012 Y A02 P DAR NEVELEFF
TOOOl 20070907/053406 Y A02 P DAR KNAUB
B080L 20070906/142347 Y A02 P DAR ABEGAZ
POOOP 20070906/095023 Y A02 P DAR PROCTOR
BODOL 20070905/050926 Y A02 P DAR USMIRSDB
B050L 20070905/050926 Y A02 P DAR USMIRSDB
" VOOOS 20070904/052044 Y A02 P DAR USMIRSDB
TOOOO 20070831/150453 Y A02 P DAR BRANNON
B020L 20070831/114329 Y A02 P DAR POPE
TOOOl 20070831/060711 Y A02 P DAR BEASLEY
81 OOP 20070830/183557 Y A02 P DAR WASHINGP
POOOP 20070830/094008 Y A02 P DAR PROCTOR
AOOOV 20070830/093943 Y A02 P DAR PROCTOR
DATE: 2007- 10- 02
TI ME: 1013
PAGE 2 Of 2
(b) (6), (b) (7)
(C)
INFO DATE RCVD
o
z
D
o
cc
(3
^
O
<
CQ
O
DATE SUB
2007- 08- 30
RSLT
R
DATE RCVD
2007-09-04
FOREIGN BORN
A
DATE DEATH DEATH SOURCE
DATE SUB
L-NAME:
F-NAIVIE:
CASE # DATE CASE # RSLT DATE CLSD DOB
USCIS INFO
POB-CTRY STATUS
CTZN WORK
PATH DATE SUB CASE #
A 2007-09-26 70696500
DATE CASE # RSLT AGY DATE CLSD
TYPE NAME
4
TYPE APPLY TO DATE INTVWD DATE CLRD REMARKS
CA
UJ
O
z
<
Q.
LU
CC
o
CO
Q
REMARKS
REASON
oWORK HISTORY
WKID DOA/TIME SYNC MEPS OWN SPF USERNAME WKID DOA/TIME SYNC MEPS OWN SPF USERNAME
BOO IB 20071002/101319 N A02 P DAR TINSLEY 1
TOOOl 20071002/065515 Y A02 P DAR LEGRAND
B070P 20071002/065512 Y A02 P DAR LEGRAND
TOOOl 20071002/055642 Y A02 P DAR LEGRAND
POOOP 20070928/140514 Y A02 P DAR PROCTOR
BOOBS 20070927/052154 Y A02 P DAR USMIRSDB
S001C 20070926/144549 Y A02 P DAR JACKSON
B006A 20070926/144324 Y A02 P DAR JACKSON
B002A 20070926/144252 Y A02 P DAR JACKSON
SOOOE 20070926/144132 Y A02 P DAR JACKSON
B080P 20070926/064434 Y A02 P DAR LEGRAND
TOOOl 20070926/052554 Y A02 P DAR KNAUB
POOOP 20070925/094043 Y A02 P DAR PROCTOR
TOOOO 20070907/074246 Y A02 P DAR TINSLEY
B080L 20070907/070012 Y A02 P DAR NEVELEFF
TOOOi 20070907/053406 Y A02 P DAR KNAUB
B080L 20070906/142347 Y A02 P DAR ABEGAZ
POOOP 20070906/095023 Y A02 P DAR PROCTOR
BODOL 20070905/050926 Y A02 P DAR USMIRSDB
B050L 20070905/050926 Y A02 P DAR USMIRSDB
VOOOS 20070904/052044 Y A02 P DAR USMIRSDB
TOOOO 20070831/150453 Y A02 P DAR BRANNON
B020L 20070831/114329 Y A02 P DAR POPE
TOOOl 20070831/060711 Y A02 P DAR BEASLEY
B100P 20070830/183557 Y A02 P DAR WASHINGP
POOOP" 20070830/694008 Y A02 P DAR PROCTOR
AOOOV 20070830/093943 Y A02 P DAR PROCTOR
DATE: 2007-10-02
TIME: 1013
PAGE 2 of 2
(b) (6), (b) (7)
(C)
NAME OF ENLISTEE/REENLISTEE (Last, Fin
MANNI NG BRADLEY EDWARD
T^^^die)'
#
SECURITY NO OF ENLISTEE/REENLISTEE
F. DISCHARGE FROM DELAYED ENTRY/ENLISTMENT PROGRAM
20a. I request to be discharged from the Delayed Entry/Enlistment Program (DEP) and enlisted in the Regular Component of the
United States (list branch of service) ARMY for a period of ^ years and
0 weeks. No changes have been nnade t o my enl i stment opti ons OR if changes were made they are recorded on
Annex(es) B
whi ch replace(s) Annex(es)
b. SIGNATUREQF DELAYED ENTRY/ENLISTMENT PROGRAM ENLISTEE
^
c. DATE SIGNED (YYYYMMDD)
20071002
G. APPROVAL AND ACCEPTANCE BY SERVICE REPRESENTATIVE
21. SERVICE REPRESENTATIVE CERTIFICATION
a. This enlistee is discharged from the Reserve Component shown in item 8 and is accepted for enlistment in the Regular
Component of the United States (list branch of service) ARMY In pay grade E ^
b. NAME (Last, First, Middle)
BGYeEXALVIN N
3E^ /
c. PAY GRADE
E-8
d. UNIT/COMMAND NAME
USA RECRUI TI NG BAT T AL I ON
e/ SI GNATl pE f. DATE SIGNED
(YYYYMMDD)
20071002
g. UNIT/COMMAND ADDRESS (City, State, ZIP Code!
FT GEORGE G MEADE
MD 2 0 7 5 5 - 0 0 0 0
7Z
H. CONFI RMATI ON OF ENLI STMENT OR REENLISTMENT
22a. IN A REGULAR COMPONENT OF THE ARMED FORCES:
BRADLEY EDWARD MANNING
do solemnly swear (or affirm) that I will support and defend
the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the
same; and that I will obey the orders of the President of the United States and the orders of the officers appointed over me,
according to regulations and the Uniform Code of Military Justice. So help me God.
c. DATE SIGNED (YYYYMMDD)
20071002
23. {Eftl kl ^MENT OFFICER CERTIFICA1
a. The above oath was administered, subscribed, and duly sworn to (or affirmed) before me this date.
b. NAME (Last, First, Middle)
T H O M A S , MI CHAEL D
c. PAY GRADE
0-4
d. UNIT/COMMAND NAME
BALTI MORE MEPS
f. DATE SIGNED
(YYYYMMDD)
20071002
g. UNIT/COMMAND ADDRESS (City, State, ZIP Code!
FORT GEORGE G MEADE
MD 20755-2995
(Initials of Enlistee/Reenlistee)/^
DD Form 4/ 3, JUL 2007
PREVIOUS EDITION IS OBSOLETE.
(b) (6), (b) (7)
(C)
RECORD OF MILITARY PRO( ^SI NG - ARMED FORCES OF THE UNI
(Read Privacy Act Statement and Instructions on back before completing this form.)
STATES
OMB No. 0704-0173
OMB approval expires
Mar 31, 2010
The public reporting burden for this collection of information is estimated to average 20 minutes per response, including the time for reviewing instructions, searching existing data sources, gathering
and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,
including suggestions for reducing trie burden, to Department of Defense. Executive Services Directorate (0704-0173). Respondents should be aware that notwithstanding any other provision of law.
no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a cun-entiy valid OfulB control number.
PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ORGANIZATION.
A. SERVICE
PROCESSING FOR
I D! A R
B. PRIOR SERVICE:
YES \ x \ NO
NUMBER OF DAYS:
C. SELECTIVE SERVICE CLASSIFICATION
NONE
D. SELECTIVE SERVICE REGISTRATION NO.
NONE
SECTION I - PERSONAL DATA
1. SOCIAL SECURITY NUMBER 2. NAME (Lasf, firsf. Middle Name (and Maiden, if any), Jr., Sr., etc.)
| - | - | iBracjley Edward Manning; AKA Manning, Bradley Ecjward
3. C U R R E N T A D D R E S S
(Street. City. County.
State. Country. ZIP Code)
1492 Sel worthy Road, Pot omac, fvlONTGOIVIERY, MD, 20854
USA
4. H O M E OF RECORD A D D R E S S
CStreef, City. County. State.
Count ry. ZI P Code)
1492 Sel wort hy Road, Potomac, MONTGOI vl ERY, MD, 20854 USA
CITIZENSHIP fXone)
a. U.S. AT BI RTH (If this box i s mar ked, al so X (1) or (2))
X (1) NATI VE BORN (2) BORN ABROAD OF U.S
b. U.S. NATURALI ZED
c. U.S. NON-CI TI ZEN
NATI ONAL
PARENT( S)
ALI EN REGI STRATI ON NUIUIBER
(If issued)
d. IMMIGRANT ALIEN (Specify)
e. NON-IMMIGFVNT FOREIGN NATIONAL (Specify)
6. SEX (Xone)
a. MALE
b. FEMALE
7.a. RACIAL CATEGORY (Xone or more)
(1) AMERICAN INDIAN/
ALASKA NATIVE
(2) ASIAN
(3) BLACK OR AFRICAN
AMERICAN
(4) NATIVE HAWAIIAN
OR OTHER PACIFIC
IRI ANOFR
(5) WHITE
8. MARITAL STATUS (Specify)
NEVER MARRIED
7.b. ETHNIC
CATEGORY
(1) HISPANIC OR
LATINO
(2) NOT HISPANIC
OR LATINO
9. NUMBER OF DEPENDENTS
0
10. DATE OF BIRTH
(YYYYMMDD)
1 I 9 I 8 I 7 I 1 I 2 I 1 I 7
11. RELIGIOUS
PREFERENCE
(Optional)
ROMAN CTHOLC
12. EDUCATION
(Yrs/Hi ghest Ed
Gr Compl et ed)
1 2 / L
13. PROFICIENT IN FOREIGN
LANGUAGE (If Yes. specify.
If No. enter NONE.)
NONE
1st
Y I Y
2nd
14. VALID DRIVER'S LICENSE (Xone) 0 YES NO
(If Yes, list State, number, and expiration date)
MD, M552098189857, 2009/02/15
15. PLACE OF BIRTH (City, State and Country) ,
Oklahoma City, OK USA
SECTION II - EXAMINATION AND ENTRANCE DATA PROCESSING CODES
(FOR OFFICE USE ONLY - DO NOT WRITE IN THIS SECTION - Go on to Page 2, (Question 20.)
16. APTITUDE TEST RESULTS
a. TEST ID b. TEST SCORES
AFQT
GS AR WK PC MK El As MC 1 AO VE
0| 2 1 E 2007/08/30
PERCENTILE
8 1 9 6 1 9 6 1 2 6 1 2 5| 3 6 1 3 7 0 4 1 8 6 1 6 1 5 1 2 5 1 9 1
17. DEP ENLISTMENT DATA
a. DATE OF ENLISTMENT - DEP
(YYYYMMDD)
2 I 0 I 0 I 7 I ol 9 I 2 I 6
b. PROJ ACTIVE DUTY DATE
(YYYYMMDD)
2 I 0 I 0 I 7 I 1 I 0 I 0 I 2
C. ES
3
d. RECRUI TER I DENTI FI CATI ON
1 I 1 I B I 1 l AI 9 I 9 I 6 I 8
e. STN ID
1 I B I 1 I A I
f. PEF
C I A I C I T I B
g. T-E MOS/ AFS
3 I 5 I F I 1
h. WAI VER
(1) I I
Y Y Y
(2) (3) (4) (5) (B)
i w r
GRADE
El oh
j . SVC ANNEX CODES
Al
k. MSO(YYWW)
ol8 Iol 0
I. AD OBLIGA-
TION (YYWW)
oUlol 0
18. ACCESSION DATA
b. ACTIVE DUTY SERVICE DATE
1 r y y y y w ^
2 | o | o | 7 | l | o | o | 2 | 2 | o | o | 7 | l | o | o | :
c. PAY ENTRY DATE (YYYYMMDD) d. MSO(YYWW)
2 | o | o | 7 | l | o | o | 2 | o | 8 | o | o
e. AD/ RC OBLI GATI ON (YYMMWVUDD)
0 I 4 I 0 I 0 I
f. WAIVER (2)
" \ I
Y| Y I Y
(3) (4) (5) (6)
g. PAY GRADE
E 0 I 1 I
h. DATE OF GRADE (YYYYMMDD) . ES
1
j.YRSVHIGHESTED
GRCOIVIPL
I I | 2 | L
k. RECRUI TER I DENTI FI CATI ON
1 I 1 I B I 1 I A I 9 9 I 6 I 8
STN ID
I 1 B | I | A |
m. PEF
C I A I C I T I B
n. T-E MOS/ AFS
3 I 5 I F I 1 I 0
o. PMOS/ AFS
3 I 5 I F I 1 O
p. YOUTH q. OA
Y | Y | 0 N 1 Y
m
s. SVC ANNEX CODES
Bl I I I I
t. REPLACES ANNEXES u. TRANSFER TO (UIC)
Al I I I |w ol vl LI 3 I K
19. SERVICE
REQUIRED
CODES
26
V J_
27 28
1
29
0
31 32
_D
33
_B_
34
10
H
37 39
15
A
21
A
51 52 S3 61 71 76
87 100 101 102 105
116 131 132 136
DD FORM 1966/1, MAR 2007
PREVIOUS EDITION IS OBSOLETE.
(b) (6) (b)
(6)
(b) (6)
PRIVACY ACT STATEMENT
AUTHORITY: Title 10 USC Sections 504, 505, 508, 12102; Title 14 USC Sections 351 and 632; Title 50
USC Appendix 451; and EO 9397 (SSAN).
PRINCIPAL PURPOSE(S): DD Form 1966 is the basic form used by all the Military Services and the
Coast Guard for obtaining data used in determining eligibility of applicants and for establishing records
for those applicants who are accepted.
ROUTINE USE(S): None.
DISCLOSURE: Voluntary; however, failure to answer all questions on this form, except questions
labeled as "Optional," may result in denial of your enlistment application.
WARNING
Information provided by you on this form Is FOR OFFICIAL USE ONLYand will be maintained and
used in strict compliance with Federal laws and regulations. The information provided by you becomes
the property of the United States Government, and it may be consulted throughout your military service
career, particularly whenever either favorable or adverse administrative or disciplinary actions related to
you are involved. ...J , ! .
YOU CAN BE PUNISHED BY FINE, IMPRISONMENT OR BOTH IF YOU ARE FOUND GUILTY OF
MAKING A KNOWING AND WILLFUL FALSE STATEMENT ON THIS DOCUMENT.
INSTRUCTIONS
(Read carefully BEFORE filling out this form.)
1. Read Privacy Act Statement above before completing form.
2. Type or print LEGIBLY all answers. If the answer is "None" or "Not Applicable," so state. "Optional"
questions may be left blank.
3. Unless otherwise specified, write all dates as 8 digits (with no spaces or marks) in YYYYMMDD
fashion. June 1, 2005 is written 20050601.
DD FORM 1 9 6 6 / 1 , MAR 2007 Back of Page 1
20. NAME (LasL First, Middle initial) SOCIAL SECURITY NUMBER
SECTION III - OTHER PERSONAL DATA
22. EDUCATION
a. List ali high schools and colleges attended. (List dates in YYYYMM format.) (5) GF(ADUATE
(1)FR0M (2) TO (3) NAME OF SCHOOL (4) LOCATION YES NO
200109 200506 Tasker Milward VC Portfield Ave Haverford Wales, U KINGDOM X
200701 200705 MONTGOMERY COLLEGE OF ROCKVILLE 51 Mannakee St Rockville, MD X
b. Have you ever been enrolled in ROTC, Junior ROTC, Sea Cadet Program or Civil Air Patrol?
YES NO
b. Have you ever been enrolled in ROTC, Junior ROTC, Sea Cadet Program or Civil Air Patrol?
x
23. MARITAUDEPENDENCY STATUS AND FAMILY DATA
(If "Yes."explain in Section VI. "Remarks.")
a. Is anyone dependent upon you for support?
X
b. Is there any court order or judgment in effect that directs you to provide alimony or support for children?
X
c. Do vou have an immediate relative (father, mother, brother, or sister) who: (1) is now a orisoner of war or is missina
in action (MIA); or (2) died or became 100% permanently disabled while serving in the Armed Services?
X
d. Are you the only living child in your immediate family?
X
24. PREVIOUS MILITARY SERVICE OR EMPLOYMENT WITH THE U.S. GOVERNMENT
(If "Yes."explain in Section VI. "Remarks.")
a. Are you now or have you ever been in any regular or reserve branch of the Armed Forces or in the Army National Guard
or Air National Guard?
X
b. Have you ever been rejected for enlistment, reenlistment, or induction by any branch of the Armed Forces of the United
States?
X
c. Are you now or have you ever been a deserter from any branch of the Armed Forces of the United States?
X
d. Have you ever been employed by the United States Government?
X
e. Are you now drawing, or do you have an application pending, or approval for: retired pay, disability allowance, severance
pay, or a pension from any agency of the government of the United States?
X
25. ABILITY TO PERFORM MILITARY DUTIES
(If "Yes," explain in Section VI. "Remarks ")
a. Are you now or have you ever been a conscientious objector? (That is, do you have, or have you ever had, a firm, fixed,
and sincere objection to participation in war in any form or to the bearing of arms because of religious belief or training?)
X
b. Have you ever been discharged by any branch of the Armed Forces of the United States for reasons pertaining to being a
conscientious objector?
X
c. Is there anything which would preclude you from performing military duties or participating in military activities whenever
necessary (i.e., do you have any personal restrictions or religious practices wliich would restrict your availability)?
X
26. DRUG USE AND ABUSE (If "Yes,"explain in SecUon VI, "Remarks.")
Have you ever tried, used, sold, supplied, or possessed any narcotic (to include heroin or cocaine), depressant (to include
quaaludes), stimulant, hallucinogen (to include LSD or PCP), or cannabis (to include marijuana or hashish), or any
mind-altering substance (to include glue or paint), or anabolic steroid, except as prescribed by a licenced physician?
X
DD FORM 1966/2, MAR 2007
Page 2
(b) (6), (b)
(7)(C)
^7.NAME(LasL Firsf Middle initial)
Bradley Edward Manning
m
28. SOCIAL SECURITY NUMBER
SECTION IV - CERTIFICATION
29. CERTIFICATION OF APPLICANT (Your signature in this block must be witnessed by your recruiter.)
a. I certify that the information given by me in this document is true, complete, and correct to the best of my
knowledge and belief. I understand that I am being accepted for enlistment based on the information
provided by me in this document; that if any ofthe information is knowingly false or incorrect, I could be
tried in a civilian or military court and could receive a less than honorable discharge which could affect my
future employment opportunities.
b. TYPED OR PRINTED NAME ^Lasl, First, Middle Initial)
Bradley Edward Manning
c. SIGNATURE
^
d. DATE SIGNED (YYYYMMDD)
20070926
30. DATA VERIFICATION BY RECRUITER (Enter description of the actual documents used to verify the following items.)
a. NAME rXone) b. AGE (X one) c. CITIZENSHIP (X one)
(1) BIRTH CERTIFICATE
(2) OTHER (Explain)
(1) BIRTH CERTIFICATE
(2) OTHER (Explain)
(1) BIRTH CERTIFICATE
(2) OTHER (Explain)
d. SOCIAL SECURITY NUMBER (SSN) (Xone) e. EDUCATION /X one)
f. OTHER DOCUMENTS USED
(1)SSN CARD
(2) OTHER (Explain)
(1) DIPLOMA
(2) OTHER (Explain)
31. CERTIFICATION OF WITNESS
a. I certify that I have witnessed the applicant's signature above and that I have verified the data in the documents required as prescribed by my
directives. I further certify that I have not made any promises or guarantees other than those listed and signed by me. I understand my liability to trial
by courts-martial under the Uniform Code of Military Justice should I effect or cause to be effected the enlistment of anyone known by me to be
ineligible for enlistment
b. TYPED OR PRINTED NAME (Last, First,
Middleinitial)
Jones, Mark A
c. PAY
GRADE
d. RECRUITER I D.
1BA024794
e. SIGNATURE
'
f. DATE SIGNED
(YYYYMMDD)
20070926
32. SPECIFIC OPTION/PROGRAM EN LIS .TED FOR, M ILITARY SKILL, OR AS SIGNMENT TO A GEOGRAPHICAL AREA Gl JARANTEES
a. SPECIFIC OPTION/PROGRAM ENLISTED FOR (Completed by Guidance Counselor, MEPS Liaison NCO, etc., as specified by sponsoring service.) \*'
(Use clear text English.)
IAW AR601-210, Chapter 9, table 9-1 Program 9A United States ARMY Training Enlistment Program,, Req. OPT 03AND 90 United States ARMY
Incentive Enlistment ProgramReq. OPT 174, 270, MOS 35F1O00YY 4 years 0 weeks UNCM
b. 1 fully understand that i will not be guaranteed any specific military skill or assignment to a geographic area except
as shown in Item 32.a. above and annexes attached to my Enlistment/Reenlistment Document (DD Fomi 4).
c. APPLICANTS
INITIALS
([^ g
33. CERTIFICATION OF RECRUITER OR ACCEPTOR
a. I certify that I have reviewed all information contained in this document and, to the best of my judgment and belief the applicant fulfills ali legal
policy requirements for enlistment I accept him/her for enlistment on behalf of the United States (Enter Branch of Service)
Army and certify that I have not made any promises or guarantees other than those listed in item 32.a.
above. I further certify that service regulations governing such enlistments have been strictly complied with and any waivers required to effect
applicant's enlistment have been secured and are attached to this document.
b. TYPED OR PRINTED NAME (Last. First.
Middleinitial)
Jones, Mark A
c. PAY
GRADE
d. RECRUITER ID OR
ORGANIZATION
1BA024794
e. SIGNATURE f. DATE SIGNED
(YYYYMMDD)
20070926
SECTION V - RECERTIFICATION
34. RECERTIFICATION BY APPLICANT AND CORRECTION OF DATA AT THE TIME OF ACTIVE DUTY ENTRY
a. I have reviewed all information contained in this document this date. That information is still correct and true to the best of my knowledge and
belief If changes were required, the original entry has been marked "See Item 34" and the correct information is provided below.
b. ITEM NUMBER c. CHANGE REQUIRED
NAME changed from Bradley Edward Manning; AKA Manning, Bradley Edward to Bradley Edward Manning; Manning, Bradley Edward
d. APPLICANT e. WITNESS
(1) SIGNAXIJRE (2) DATE
SIGNED
(YYYYMMDD)
20071002
(1) TYPED OR PRINTED NAME
(Last. First. Middleinitial)
Jones, Mark A
(2) RANK/
GRADE
131 SIGNATURE-
DD FORM 1966/2, MAR 2007
Page 3
(b) (6), (b)
(7)(C)
35. NAME (Last, First, Middle Initial)
Bradley Edward Manning
36. SOCIAL SECURITY NUMBER
SECTION VI - REMARKS
(Specify item(s) being continued by item number Continue on separate pages if necessary.)
26. Have you ever used marijuana? N
Statement Remarks:
per conversation with Mr. Driver this is a good education evaluation, and that is one of DOD
recommended evaluation services.
DD FORM 1966/5 YES
ATTACHED? (X one) NO
SECTION VII - STATEMENT OF NAME FOR OFFICIAL MILITARY RECORDS
37. NAME CHANGE.
If the preferred enlistment name (name given in Item 2) is not the same as on your birth certificate, and it has not been changed by legal procedure
prescribed by state law, and it is the same as on your social security number card, complete the following:
a. NAME AS SHOWN ON BIRTH CERTIFICATE
Bradley Edward Manning
t). NAME AS SHOWN ON SOCIAL SECURITY NUMBER CARD
Bradley Edward Manning
c. 1 hereby state that 1 have not changed my name through any court or ott
Bradley Edward Manning by v
er legal procedure; that 1 prefer to use the name of
vhich 1 am known in the community as a matter of convenience
person whose name is shown in Item 2. and with no criminal intent 1 further state that 1 am the same person as the
er legal procedure; that 1 prefer to use the name of
vhich 1 am known in the community as a matter of convenience
person whose name is shown in Item 2.
d. APPLICANT
(1) SIGNATURE
(2) DATE SIGNED (YYYYMMDD)
e. WITNESS
(1) TYPED OR PRINTED NAME (Last, First, Middle Initial)
BOYLE, MICHAEL L
(2) PAY GRADE
EOS
(3) SIGNATURE
DD FORM 1966/4, MAR 2007
Page 4
(b) (6), (b)
(7)(C)
38. NAME ( Lasf Fi rsf Mi ddl e initial)
Bradley Edward Manning
39. SOCIAL SECURITY NUMBER
USE THIS DD FORM 1966 PAGE ONLY IF EITHER SECTION APPLIES TO THE APPLICANT'S RECORD OF MILITARY PROCESSING.
SECTION VIII - PARENTAL/GUARDIAN CONSENT FOR ENLISTMENT
40. PARENT/GUARDIAN STATEMENT(S) (Line out portions not applicable)
a. I/we certify that (Entername of applicant) Bradley Edward Manning
has no other legal guardian other than me/us and I/we consent to his/her enlistment in the United States
(Enter Branch of Service)
REGULAR ARMY
I/we acknowledge/understand that he/she may be required upon order to serve in combat or other hazardous
situations. I/we certify that no promises of any kind have been made to me/us concerning assignment to duty, training,
or promotion during his/her enlistment as an inducement to me/us to sign this consent. I/we hereby authorize the Armed
Forces representatives concerned to perform medical examinations, other examinations required, and to conduct
records checks to determine his/her eligibility. I/we relinquish all claim to his/her service and to any wage or
compensation for such service. I/we authorize him/her to be transported unsupervised to/from the Military Entrance
Processing Station via public conveyance and to stay unsupervised at a government contracted hotel facility.
b. FOR ENLISTMENT IN A RESERVE COMPONENT. ^ i : ,
I/we understand that, as a member of a reserve component, he/she must serve minimum periods of active duty for
training unless excused by competent authority. In the event he/she fails to fulfill the obligations of his/her reserve
enlistment, he/she may be recalled to active duty as prescribed by law. I/we further understand that while he/she is in
the ready reserve, he/she may be ordered to extended active duty in time of war or national emergency declared by the
Congress or the President or when otherwise authorized by law, and may be required upon order to serve in combat or
other hazardous situations.
c. PARENT
(1) TYPED OR PRINTED NAME (Last, Fi rsf Middle Initial) (2) SIGNATURE
(3) DATE SIGNED
(YYYYMMDD)
d. WITNESS
(1) TYPED OR PRINTED NAME (Last, First, Middle Initial) (2) SIGNATURE
(3) DATE SIGNED
(YYYYMMDD)
e. PARENT
(1) TYPED OR PRINTED NAME (Last, First, Middle Initial) (2) SIGNATURE
(3) DATE SIGNED
(YYYYMMDD)
f. WITNESS
(1) TYPED OR PRINTED NAME (Last, First, Middle Initial) (2) SI GNATURE
(3) DATE SIGNED
(YYYYMMDD;
41. VERIFICATION OF SINGLE SIGNATURE CONSENT
DD FORM 1966/5, MAR 2007
Page 5
(b) (6), (b)
(7)(C)
42 NAME (Lasf First, Middle initial)
Bradley Edward Manning
43. SOCIAL SECURITY NUMBER
SECTION VI - REMARKS CONTINUATION
(Specify item(s) being continued by item number Continue on separate pages if necessary.)
DD FORM 1966/6, MAR 2007
Page 6
(b) (6), (b)
(7)(C)
09a?rg,^
Z-^- L/
DEPARTMENT OF DEFENSE
BALTIMORE MILITARY ENTRANCE PROCESSING STATION
8 50 CHISHOLM AVENUE
FORT GEORGE. G. MEADE, MD 20755-2995
ORDERS: 8275012 02 October 2007
Having e n l i s t e d , i n the U.S. Army under the p r o v i s i o n s of AR 601-210, you are
assigned and w i l l r e p o r t t o the 43rd Adjutant General B a t t a l i o n (Reception),
Ft Leonard Wood, MO. MDC 1AE8. Reporting date: 02 October 2007
NAME
MANNING, BRADLEY E.
j . l i i s i s a c e n t r a l l y b i l l e d Account f o r Ticket Purchase.
FOR THE COMMANDER:
DISTRIBUTION:
Ea i n d i v i n d i e (1)
Tng s t a e n l packet (?)
Sponsoring r c t g svc cdr (3)
T r a v e l Section (1)
F i l e (1)
*************************
* OFFICIAL COPY *
* DEPARTMENT OF DEFENSE *
* BALTIMORE MEPS *
*************************
NKECHUroraKU U. ENWEFA
ILT, US ARMY
Operations O f f i c e r
(b) (6), (b) (7)
(C)
*** REC 2007240 143e^^IElSllEO BLMC CIPQYAF
NUMI DTE:08/28/07 SSN: XC: UNIT:KTG
(F-BLM ) ***
PG:001
SOCIAL SECURITY ADMINISTRATION
SOCIAL SECURITY NUMBER VERIFICATION
OUR RECORDS INDICATE THAT SOCIAL SECURITY NUMBER IS
ASSIGNED TO BRADLEY , EDWARD , MANNING , .
YOUR SOCIAL SECURITY CARD IS THE OFFICIAL VERIFICATION OF YOUR SOCIAL SECURITY
NUMBER. THIS PRINTOUT DOES NOT VERIFY YOUR RIGHT TO WORK IN THE UNITED STATES.
PROTECT YOUR SOCIAL SECURITY NUMBER FROM FRAUD AND IDENTITY THEFT. BE CAREFUL
WHO YOU SHARE YOUR NUMBER WITH.
^-:;?g%%^.:.y/"'g&)k^
T
c
" :;!*^\'^r<
Social Security Administration
ol 5 ^Giii;].Wa8hinqtoh Street
20850
V j 8 J
- ^ 4f 3<X##* HMkt .
\
> n' v"
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
^
^^^^
J " M i C L M O HO
CERTIFICATE OF LIVE BIRTH I
* > f
MATE OF OKLAHOMA - DEPANTNENT OF HEALTH ^^'^0^3^^^
135 -
I t A T E r i L I NO I ^ /
&
^
^ *
I CMILP
tTypf Of pnnll
NAME Tirjr Mi^W/r tmti
Br adl ey Edward Manning
4. ( CX
Mal e
S* . t u n B I R T H
WM O L U S K TWINQ TRIPLET Q
i . O i r . T O N . OR L OC A T I ON O F B I RT H
Okl ahoma C i t y
13
2. DAT E
OF
BI RT H
Mvnih Otf) Ytm*
12 17 87
Sb. I R TWI N OR T R I P L I E T , # A $ CHI L I ) BORN
1 , 1 0 . ' J D
T. MOT HER I MAI DEN NAHC / ' i ' < l
Susan
t i l H U OE CI TY L I MI T
" " i ^ " " C
3. HOUR
1:58?
#
t . . COUNT Y OF BI RT H
Oklahoma
M.HOSCITAL - NAME /'/ aol m hbipiut: fivr ilrtr f \ 4 aumttri
* #* RESI DENCE . ST AT E
\ Okl ahoma
I I . F A T H E R
lk COUNTY
Logan
UliJIt
Mary
K ( ' > "
Mer cy Heal t h Ceater
$. AGE <ai fifftt of
' thts htnht
34
l Oc Cl T V , TOWN. OR L O C A T I O N
Crescent
NAME HidiU
I Mf OR MA MT L I C N A T U R E OF EI T HER P A R E N T
Br i an Edward Manning
I I M. INSIDE CI TY
LI MI T
r . j
*. Bl1tlHP\,KCE ISlair ot /erritn ceunlry)
England
! , . STREET ACDSESS
Route 1 Box 158
W. AGE lm limr o/
ihsi hitthj
32
>t OA/ v\ r H c ^ j ^ - r L u x c ^
I J . MOT HER' S flAILINC ADDRESS St R^ EJ T . R P. O. NO P< U> OF f I
IJ. BIRTHPl ACE f j ( j / r or f o f t i f l counlryy
111 Lnci i s
u t . I F UNABwE T O OB T A I N ONE OF
P A RE NT S SI GNATURE, STATE REASON
T HE F i 3 RE .
CE
Crescent
STATE ZI P CODE NO.
Oklahoma 73028
I * . WAS B L OOD OF THI S CHI L O S MOT HER T E S T E D
FOR S Y P H I L I S '
.r^t .\oO
1J A T T E NDA NT AT BI RTH
0 X X " O O.C. .*! (/tft/r Oi*f tSfrrilyl
I t . . ADDRESS OF A T T E N D A N T STREET R F D NO P OS T OF F I C E v j ^ * ' STATE ZI P CODE NO.
4200 West Memor i ai - f t t ad OkLahamn ^ i t y ' W^ Oklahoma' 73120
^ D A T E REC 0 . BY L O C A L REG
JAN 11 1989
THI S L I N E F b R
USE OF S T A T E
RE Ci S T RA R
3 } . . D A T E C O R R E C T I WS MADj J3c. AUT HORI T Y
J I . DAT E RECEI VED BY STATE REGI STRAR
viANl J ms
'"^C^.-'
. M ^ C I E R K
I ^
i -
<
y
X
8
" i k; . ' ' * * ' ^ . ' * RI
A y *
A A y
November 28, 2006
# r
(b)
(6),
(b)
(7)
(C)
(b) (6),
(b) (7)
(C)
D i #
I ^
&!er'S License
UC#:
^ - - ^
BIRTH DATE. '
EXPIRcS. 02-15-2003
j@ sfmii Sf
^
l^^l^l^^ ^^. ^
^^^I^^I^^O^
^ . ^ ^ 8 ^
TY^^N
1^-^ ^ ^ ^ ^
^ T - ^ ^ ^ ^
(b) (6), (b) (7)(C)
(b) (6),
(b) (7)
(C)
(b) (6),
(b) (7)
(C)
# #
Basler, Michael SFC USAREC
From:
Sent:
To:
Subject:
Categories:
Attachments:
nr j vpr q y Hp Mr G. q i l . q ARF O
CZ Tuesday, August 21, 2007 12:35 P M ^
181; I BI A; 1B1B; 1B1C;1B1U; I BI G; 1B1L; 1B1W; 1B3; 1B3D; 1B3G; 1B3H; 1B3J; 1B3M;
1B3P; 1B3R; IBS; 1B5D;1B5G; 1B5H; 1B5J; 1B5K; 1B5P; 1B5T; 1B5W; 1B6; 1B6D; 1B6E;
1B6F; 1B6G; 1B6L; 1B6M; 1B6R; 1B6S; 1B7; 1B7B; 1B7C; 1B7F; 1B7H; 1B7K; 1B7IVI; 1B7S;
1B7W; 1B8; 1B8C; 1B8D; 1B8G; 1B8I; 1B8J; 1B8L; 1B8W; 1B9; 1B9A; 1B9E; 1B9H; 1B9J;
1B9L; 1B9N
[U] FW: SpanTran / ARMY Foreign Credential Evaluations - $50 - One Day Turnaround
UNCLASSIFIED
Army Application.doc; creditcard[1].pdf; Fax Cover Sheet for Military.doc; GUIDELINES FOR
SPECIAL PURPOSE LETTER.doc; SpecialPurposeLetter.pdf
Army creditcard[1].pdf -ax Cover Sheet forGUIDELINES FORSpeclalPurposeLett
3plicatlon.doc (27 K (283 KB) Military.d... FECIAL PURPOSE er.pdf (39 K..
UNCLASSI FI ED/ / / /
FYI
O r i g i n a l Message
From: Dave Cone [mailt
Sent: Tuesday, August 21, 2007 12:21 PM
To: D r i v e r , Clyde Mr GS USAREC; Moore, C a l v i n Mr GS USAREC
Subject: SpanTran / ARMY Foreign Credential Evaluations - $50
One Day Turnaround
Attached i s a l l the necessary i n c l u d i n g the a p p l i c a t i o n , CC form and a sample purpose
l e t t e r .
A few v e r y i m p o r t a n t key p o i n t s t o note:
SpanTran i s a member of NACES and i s o f f i c i a l l y on the approved l i s t f o r the ARMY
* Our e v a l u a t i o n s f o r the ARMY only i s $50. ~
* We w i l l turnaround the evaluations w i t h i n one business day assuming t h a t no
v e r i f i c a t i o n i s r e q u i r e d and the requirements f o r the g u i d e l i n e s attached are met.
We very much understand t h a t w i t h the ARMY you p r e t t y much need everything- yesterday which
i s why we are f u l l y committed t o s e r v i c i n g you at a turnaround and p r i c e t h a t i s by f a r
tops i n North America.
(b) (7)(C), (b) (6)
(b) (6), (b) (7)(C)
SPAJSTRAN EDUCATIONAL SERVICESJNC.
7211 REGENCY SQUARE BLVD., SUITE 205 'HOUSTON, TEXAS 77036-3197
Tel: (713) 266-8805 Fax: (713) 789-6022
www.spantran-edu.org
SPECIAL PURPOSE LETTER
Date: 8/29/2007
SGT Michael Boyle
U.S. Arnny Rockville Recruiting Station
611 Rockville Pike Suite 140
Rockville, MD 20852
Name on Application:
Name on Documentation:
SpanTran Number:
Social Security No.:
Date of Birth:
Country of Birth
Document Status:
Manning, Bradley E
Manning, Bradley E
0708-70435
XXX-XX
12/17/1987
USA
Unattested
Documentation: Certificate, 06-2004, General Certificate of Secondary Education issued by Assessment and
Qualifications Alliance; and General Certificate of Secondary Education, 2004 Summer Examination, issued by the
Welsh Joint Education Committee
Said documents indicate the following U.S. educational equivalencies:
Yes Diploma of high-school graduation.
N/A Completion of less than two years of tertiary transfer credit.
N/A Completion of two or more years of tertiary transfer credit.
N/A Associate degree.
N/A Completion of four or more years of tertiary transfer credit.
N/A Bachelor's degree or higher.
Prepared by:
^ ^ - ^ a - ^ - * ^ ^ f ^ i ^
Barbara B. Glave / JCF
SpanTran Educational Services, Inc.
| NoTE: The original of this form, bearing the SpanTran dry seal, is valid for the U.S. Army Rockville Recruiting
Station t o which it will be mailed; all copies are invalidregardless ofthe purpose.
**END OF DOCUMENT. *VAL1D ONLY WITH SPANTRAN DRY S E A L ^
TRANSLATIONS EDUCATIONAL EQUIVALENCIES
^GULAR MEMBER, NATIONAL ASSOCIATION OF CREDENTIAL EVALUATION SERVICES, INC.
(b)
(6),
(b)
(7)
(C)
'YD
P WYLLGOR ADDTSG CYMRU WELSH JOINT EDUCATION COMMITTEE
CBAC
WjEC
ySTYSGRIF GYFFREDI NOL ADDYSG UWCHRADEfl
ERAL CERTIFICATE OF SECONDARY EDUCATION]
Arholiad Haf 2004 Summer Examination
BRADLEY E MANNING
gyn sydd i dy.sl,io bod
yjais is to certify that
Z:46%AV^-MZLPK;4j^KC.^C^OOZ,, .K4P^7^07^
y^;edi cyrraeddy safon(au) a nodiryny testun(au) a ganlyn:
Qjyiained the result(s) shown in the following nine subject(s):
ag
q a y 4 ASTUDIiKETHAU ; BUSNBS
V^ n 0 2 / 0 SAESNEG
14:^916/4 HANES
mP q i 3 l 9 D&T:SYSTEMAU A THECH,
K&' ?^03/2 LLENYDDIAETH SAESNEG
Y^ d 5 l / 6 DAEARYDDIAETH
A46P/,.fr/2 MATHEMATEG
- _
' - '
BUSINESS STUDIES
ENGLISH ' '
HISTORY
RHEOLI D&T:SYSTEMS&CONTROL TECHNOLOGY
ENGLISH LITERATURE
, GEOGRAPHY .
MATHEMATICS n;';^
3 i b j
/C^WRS
BYR) /GCSE ( SHORT COURSE)
W^ 9 l 0 / 2 CYMRASG A I L l AI TH
^^/ ^go9/ 7 ASTUDIAETHAU CREFYDDOL
. : '
WELSH SECOND LANGUAGE
RELIGIOUS STUDIES
C. C
_ . B^f W***^"
' : ''A^Xa
. .4%
CAPED^'*^'^' CB'^C
Q^yjgMAN, WJEC
CADEIRYDD, Pwyllgor Arlioliadau
CHAIRMAN, Examinations Committee
-^S3S'
^ ^ ^ ^ ^
PRIF WEITHREDWR, CBAC
CHIEF EXECUTIVE, mEC
A S S E S S M E N T a n d
Q U A L I F I C A T I O N S
A L L I A N C E
General Certificate of
Secondary Ediicatidn
I V
'
, \ i ^ /
T t .
f . ^
vt .
\
r
\'i
L l
^ L / . ' ((^i )
%)fy
i.
l b /
\ ( )
/ i >
^( M.
I ^ l )
A LV
' Mly
\ L Mt . ' ^ b
4 ( 1 ^
. o^
< ^
ALt y
4Q>
Thm is to' certify' thttirt thk ^xanlinatU}rCheld in Juiie 2004
( 6 Ac^ viik v:)). 4Li / x.^)/ A())
OJ
Li ) '
i L
1:5-
\ ^
l i U
(^L
j : ; ^ / '
' V
a
a
<i)
t l x
".l)-
(
( 1
t l x
I L/
* L
5
(^^^^
n /-
i L
A(jg^
K^f
i Ci y '<h.
Ak^y
vi : ;
t yv %
/ t ) . V { \
Vl > ^(L
4t1 \< 1
"Mix
' ZMy%
i;^
: ^#4! ; M%4Bv###
' ^ ^ Y- A l ^ .
' I BI Mj l i i i . I ^i i %b \(i.v
:^JLV_ ^
L DOUBLE A WA R D COURSE (One (1) Subject) n
\ j Aie^ \ r b
SCIENCE: DOODLE AWARD my / j j ; 'lix
/ Vj ^ ^ t l V Al t ' *
/ Mi :
V^Qjk
v i ; * V J
AfiC/ 'dL^L
'^^-^A,
'f^^
\ j
I LL
VL-
H\ V
( 1 /
vim
U V
vt ^
< ^
41- ^
411^
A l ^
V^ ) /
^
AL^ ' AC;)/'
"Vl^ AC^'
% ^ . A C ^
AQi y
Vl )^ AQ&<
^ - l ) . ACi y
4, ^
\( ' \
( J
\S
\ 1
4 >
' / <
( 1 \ J r
V ' ) /
U
< :'.
'SC.'*,'
(
\ k ) ) , \ i >
/ Vi V 4i : k/
4Q>
AC;). V K ,
r9t7
4:;!$/ v; ^
AQ)/
Y<)/ 4:1^
v : ^ " 4 W
v;^
/ | Q> ^
4 i y A 3 > 4 ; ^ /
V ) ^
K b - ' AO)-
I t %W
4 0 ) /
A o y 4L;i y v ^ /
4Lb^
V l ^
A[ <y V) ) /
Vj ) / \ Q>
AC^ ^.15/
ACL^ 4(1) X ^ /
AO) MU;!^ 402.
A( b / v t ,
4Ll > ^i Ll .
4(1:^ \CL\
v:^). Ai : ^
/VLi) i qj ^ vt )
vi >
Y^c
Av v 11:34,
41) 5. ^
v^l^ %
ALTAI.
' F ^ i g
Y^Jk V.!^
V^D-
Al i )/ AQ!>'
M)>
V4} ' kl x
Via-
V ) ^
ALc>
AQ^.' 1(1^,
t i % AQ:).'
AC: ^ jLt)
AL&y
Wit
AC^
4 1 , ^
ALi y v t y
A(:}' A L ^ '
* D
V%y
A' ^* ^ l y
V I ,
\ t ) ^1 1)
^
Y^ ) /
v:^
AQ\
' l b /
4U>
4L4y
"KK
/ Y: ^
/ CB, " .
^ t y
" ^ 1 /
V i ,
"^^^^
V ) \
v^/
^
^ <i
L/
?
' %, / kt y V ;
4 . ^ ^ i ) / \ L )
1Q}/ ^ I : ^ d Y
.v^
^ i ) V l y r At y
( t )
I > i V >
'^-iw.' \ . l "V.^),'' ' _ '
\ 1/ -
\ ^ 1 \
1 n
\ 1 ,
/V y
\ \
/VJA,
^ >
A(% '
%
L ^ _
\\ \i : - My\
'V.^\/
O i
(
!
CENTRE.No /CANDIDATE No 68241/2728/68Z410O22728B
e- ^
Mifse,Cresswefl, :
Director General
on behalf of the Assessment and Qualifications Alliance
Qualifications and
CurrkuKi m Aut hori t y
WOJKOO
ct Hwr nam
cwwcwuvn ^ Assu
Oj nuKxrot s
ajMjaAUM&
' MSESSfSfTfiirnOmr
Rewarding Learning
THE UNITED STATES ARMY' iRUITING COMMAND FUTURE SOLDI
(For use of this form see USAREC Reg 601-95)
# RE-EXECUTION CHECKLIST
1. NAME;
Manning, Bradley E
2 SSN:
3. MOS AND OPTION:
35F
4. SHIP DATE:
20071002
5. RECRUITER OR SC:
SGT BOYLE, MICHAEL L JR
6. RSID;
IBIA
SECTION I - MANDATORY SHIP ITEMS AND/OR TASKS
RECRUITER OR SC
INITIALS AND DATE
FUTURE SOLDIER
INITIALS AND DATE
ITEM OR TASK
%'^3oo9i'0pj
SF 1199A (Direct Deposit Sign-Up Form) (must have ATM card or checkbook to access account)
/^2,t>70^-l\
Establish AKO account {Future Soldier will maintain password)
Username: Gf &^ l c y , A f P Af Myf c>^. ' .
^ 3 " 2 . i ^ ^ W ^f f ^f oP' ^^
jUSAREC Form 1134 (United States Army Future Soldier Training Program ID Card) (AKO
username and password affixed to back of card)
A(j'laty7^>11J\
^ ^ ^ C C W % ^
Pass physical fitness assessment
Push-ups Repetitions: / ^
Sit-ups Repetitions: Z |
Run Time: 7 ' 0 < /
IX Go No-Go
< Go No-Go
X
Go No-Go
/Y^Z<^V7^^^7 ' ^' g^^PO
Hi
.Register for SMART (www.futuresoldiers.com/html/referrals.isp)
^ l . ' ^ O ' ^ l - ' '
Q^f/VfaoW
!K yxw^
Future Soldier has all items on packing list (no more, no less)
^Uzj^^t
Current and valid Driver's License: H 6 6^ ' ^ 1^7 Expiration Date: ^1 I^JT-OO ^
DA Form 5500-R (Body Fat Content Worksheet (Male)) or DA Form 5501-R (Body Fat Content
Worksheet (Female)) (if applicable)
Regular Army and Reserve Components Referral (see sec III) (if applicable)
^yi<Xno'\zr^
Transportation to MEPS verified
Marriage license (if applicable)
i ^ M
^ ^ Z j C O z d ^ l Z " )
IWoi i a
Birth certificates (if applicable)
- ^^" Z/ Ci Ty^^^Z- ?
3fm
boo'^o^,
Diploma (if applicable)
i l ^
other documents, including MOS specific (if applicable)
other documents, including MOS specific (if applicable)
NOTES:
FUTURE SOLDIER SIGNA XJWffE:
^
~y
DATE:
I have reviewed the above Fiituiei^^^iaf'S'qualifications and herebyizGnfimiand verify the readiness of this Future Soldier for initial entry training.
All mandatory documents are p6nt and have been viewed by myself. All mandatory tasks have been completed.
RECRUITER OR STATION COMMANDER TYPED NA^EAND SI G#TURE
jS^r ^y/^/ ^v;^^^ / ^ ^ ^ ^ ^ C ^ I ^ o ^ Ai ?
USAREC Form 1137, Rev 1 May 2007 VhiSffe^M INCORPORATES USAREC FORM 512 WHICH IS OBSOLETE
DATE:
V7.00
(b) (6), (b)
(7)(C)
SHORT- TERM TASKS:
#
ECTION II - PRE-BASIC TRAINING TASK LISTi . I SI gk
" GO^RN NO-GO AND DATE OF COMPLETION
MAKE REFERRAL (not required task, recommended) (referral entered into sec III)
MI LI TARY TI ME
DRI LL AND CEREMONI ES
Execute the position of attenti on
-T-
Execute the hand sal ute; know who and when to salute
Execute rest positions
ARMY PHYSICAL FITNESS TEST (APFT) (Applicant must achieve 60 points each event and all APFT events must
Events must be performed to standards outlined in FM 21-20, Physical Fitness Training.)
be completed same day.
Push-ups Repeti ti ons: Points:
Sit-ups Repeti ti ons: Points;
2-mile run Ti me; Points:
REFERRAL ENLI STMENT
Referral enlists (not required task, recommended) (complete referral's information in sec III) I
* SCORE SOLD/ER A GO IF HE OR SHE PERFORMS THE TASK SUCCESSFULLY (SUSTAINMENT TimiNING IS REQUIRED DURING ALL SUCCEEDING MONTHS).
* SCORE SOLBIER A NO-GO IF HE OR SHE FAILS ONE OR MORE AREAS AND WHEN THE INSTRUCTOR IS UNABLE TO CORRECT THE DEFICIENCY ON THE
SPOT (RETRAINING REQUIRED AT NEXT MILITARY FORMATION)
* GO REQUIRED WITH DATE ON ALL TASKS EXCLUDING REFERRAL TASKS FOR SECTION II TO BE COMPLETE.
STATI ON COMMANDER' S TYPED NAME AND SI GNATURE; DATE;
NOTE
C GC MMA N D I N G OFFI CER' S TYPED NAME AND SI GNATURE; DATE;
USAREC Form 1137, Rev 1 May 2007 Page 2 of 3
SECTION limmCTIVE ARMY AND RESERVE COMPONENTS R U B R A L SHEET
PRIVACY ACT STATEMENT
AUTHORITY: Collection ofthe information requested and recorded on USAREC Form 1137, section III, is authorized by Title 10, USC, Section 513,
3013(g)(3).
PRINCIPAL PURPOSE: To provide such data as is required by a U S Army recruiter and/or guidance counselor to contact, process, and enlist
prospects for Army service
ROUTINE USES:
a. Used by the recruiter to make contact with a prospective applicant for enlistment.
b. Used by the guidance counselor, personnel officer, or administrative supply technician to verify that an applicant has enlisted in the FSTP, RA,
ARNG, orAR.
c. Used by recruiting personnel to monitor the Regular Army and Reserve Components Referral Program and to formulate market data to
determine recruiting trends.
EFFECT OF NOT PROVIDING INFORMATION: The disclosure ofthe information requested is entirely voluntary. Failure to provide this information,
however, may result in denial of referral credit to applicant or enlistee making the referral.
SPECIAL INSTRUCTIONS: Before collecting the information requested in Part II from prospective applicants for enlistment to give to your recruiter
for referral, you must inform the prospective applicants of the uses for the information and the effect of not providing information as discussed in the
Privacy Act Statement above.
PART I: FUTURE SOLDIER INFORMATION
NAME:
Manning, Bradley E
SSN;
SHIP DATE;
20070918
PART II: REFERRAL INFORMATION
NAME; SSN; TELEPHONE: SIGNATURE OF REFERRAL: ENLIST DATE AND BRANCH:
(completed by guidance counselor)
CERTIFICATION of recruiter; I certify that the persons identified in part II above are bona fide referrals ofthe person identified in part I above, and that
the referrals have been placed in the ARS-SMART database.
Printed name, rank, SSN Signature and Date
PART III: ARNG ENLISTMENT ONLY. To be completed by the personnel officer or the administrative supply technician of the ARNG unit for which
enlisted and returned to the U.S. Army recruiter identified in part II above.
Date referral enlisted in the ARNG;
(ddmmmyyyy)
ARNG unit of assignment and telephone number;
CERTIFICATION: I certify that the person identified in part II enlisted in the ARNG unit identified above.
Printed name, rank/grade, SSN Signature and Date
PART IV: REFERRAL ENLISTMENT CERTIFICATION. Upon referral enlistment, guidance counselor will validate referral qualifications and update
Part II of this form with enlistment date and branch of service in which the referral enlisted. A ship date certification will be made by the ship counselor
and signed in the block below.
CERTIFICATION of guidance counselor: I certify that the persons identified in part II above are bona fide referrals of the person identified in part I
above.
Printed name, rank/grade, SSN Signature and Date
USAREC Form 1137, Rev 1 May 2007 Page 3 of 3
(b) (6), (b)
(7)(C)
USMEPCOM ACCESSI ON VERIFICATION PACKET
R E G l ^ R ARMY/ LEFT SIDE
(For use, see USMEPCOM Reg 601-23)
FOR OFFI CI AL USE ONLY
Page 1 of 2 Pages
SUB-PACKET NUMBER
~LM'
DOCUMENTS
Ordei g^af f d any amendment s
o/cy 7cy
Form 2808 (Report of Medi cal Exami nati on) wi t h wai ver document s, if appl i cabl e,
and all Medi cal support i ng document s from consul t s etc..
1 ^ / d q ^ ^ m 2807-1 (Report of Medi cal History)
O
cy
L _
0
cy
j di ogr am NA
1^
USMEPCOM Form 40-1-2-R-E (Report of Medi cal Exami nat i on/ Treat ment )
/ DD
O/cy
NA
L
Form 2807-2 (Medi cal Prescreen of Medi cal Hi story)
' I j ^^pcci w
NA
U
Form 40-8-1-R-E (HI V Anti body Test i ng Acknowl edgment )
D ^ gf m
O/cy
NA
U
2005 (Pri vacy Act St at ement -Heal t h Care)
DETForm 1966-seri es (Record of Mi l i tary Processi ng-Armed Forces of the Uni ted
^t r i t es)
O/cy
JvlA.
-O
cy
O
?
DD For m 4-seri es (Enl i st ment / Reenl i st ment Document -Armed Forces of t he Uni t ed
S j ^ s )
cy
O
U
USMEg/ gOM PCN 680- 3ADP (See para. 8-8 if not available)
NA
S^>B6 (Quest i onnai re for Nat i onal Securi ty Posi ti ons) or EPSQ pri ntout versi on and
F 86A (Cont i nuat i on Sheet for Quest i onnai res SF 86, SF 85P, and SF 85)
w
cy
cy
ENTNAC^Resul t s/ DI S Form 1 (Report of Nati onal Agency Check) (manual
ENTj ^AC/ NAC)
O
NA
(__^ ' t JSMEPOgM Form 601-23-5-R-E (Introductory Pre-accessi on Intervi ew) note 3
USjCfE
> , ^ r c e
cy cy
EPCOM Form 601- 23- 4- E (Rest ri ct i ons on Personal Conduct in t he Ar med
rces)
^7'
o cy
USMEPCOM For m 40- 8- R- E (Drug and Al cohol Test i ng Acknowl edgment ) O/cy NA
D Form 214 (Certi fi cate of Rel ease or Di scharge from Acti ve Duty), or NGB Form
22 (Report of Separ at i on) , DD For m 215, (Correcti on to DD Form 214) and/ or DD
Form 220 (AD Rpt ), REDD Report , di scharge certi fi cate or si mi l ar document ) **
cy O '
- Db For m 368 (Request f or Condi t i onal Rel ease)**
cy
^
s
DD For m 369 (Pol i ce Recor d Check) **
cy
NA
V
,DD For ni ' 372 (Request for Veri f i cat i on of Bi rt h)**
JXf5^f
o
cy
For m 1304. 12-K ( ASVAB Scori ng Worksheet )** O NA
DD f or-m 2366 (Mont gomery Gl Bill (MGIB) Act of 1984)
^
3cy
O
F 119aA (Di rect Deposi t Program Form)
J . .
43t) For m 93 ( Recor d of Emer gency Data)
O NA
o/cy NA
NOTE: Pl ace a check mark In the bl ock t o the left of the documents f or document s that are required and Incl uded.
Pl ace an " NA" in the bl ock to the left of the documents for documents t hat are not requi red.
Place an " NP" In the bl ock to the l eft of the documents for documents t hat are not provi ded.
The I ncl usi on/ Sequence of Checkl i st Ver i f i ed By
lajna ffp/xjr
Printed Name of USMEPCOM Rep
(b) (6), (b) (7)(C)
REGULAR ARMY ADDRESSES AND NOTES
TABLE 8-1
Page 2 of 2 Pages
PACKET NUMBER
1 AG Battalion (Reception)/First Duty Station '. '
2 Enlistee (Applicants will receive their documents before they depart the MEPS)
NOTE: MIRS produced forms will be on plain white bond paper via laser printer. Reproduction of MIRS laser printed forms will
not be used as an original. Follow DD Form 4 copy guidance in Chapter 5.
LEGEND
** denotes a document that is distributed "if applicable" . f '
O denotes an original, "cy" denotes a copy,
O/cy means that an original and copy can be included in the packet
2cy denotes 2 copies
cy2 denotes copy 2
NA means that distribution is not required > ,
NOTES:
1. ** if applicable. " ' ' ' ' ., t:
2. Shipping of applicants will not be delayed due to non-receipt of Service unique forms and/or documents.
3. USMEPCOM Form 601-23-5-R-E is not required for reservists or National Guard. - . ' ' ' ' -
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ . ^ ^ ^ ^ ^ ^ ^ 1 ^ . ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
REGULAR ARMY ADDRESSES AND NOTES
TABLE 8-1
Page 2 of 2 Pages
PACKET NUMBER
1, AG Battalion (Reception) /First Duty Station
2 Enlistee (Applicants will receive their documents before they depart the MEPS)
NOTE: MIRS produced forms will beion plain white bond paper via laser printer. Reproduction of MIRS laser printed forms will
not be used as an original'. Follow DD Form 4 copy guidance in Chapter 5.
LEGEND
** denotes a document that is distributed "if applicable" .
O denotes an original, "cy" denotes a Copy,
O/cy means that an original and copy can be iricluded in the packet
2cy denotes 2 copies
cy2 denotes copy 2
NA means that distribution is not required
NOTES:
1. ** if applicable. , i
2. Shipping of applicants will not be delayed due to non-receipt of Service unique forms and/or documents.
3. USMEPCOM Form 601-23-5-R-E is not required for reservists or National Guard.
STATEMENT OF UNDERSTANDING
PROHIBITED ACTIVITIES BETWEEN RECRUITING PERSONNEL AND
FUTURE SOLDIER PROGRAM MEMBERS
(For use of this form see USAREC Reg 601-95)
1. I understand that the U.S. Army strictly prohibits any social activity of a personal, unofficial nature between U.S. Army
Recruiting Command personnel and members ofthe Future Soldier Program. Prohibited activities include:
a. Any type of romantic or sexual conduct.
b. Sharing of lodging.
c. Sharing of a personal vehicle.
d. Drinking of alcoholic beverages.
e. Personal employment, such as babysitting and maintenance work.
f. Exchange of money; to include loaning, giving, receiving, or borrowing.
g. Exchange of personal property; to include selling, purchasing, leasing, giving, receiving, loaning, and
borrowing.
2. I understand that Future Soldier Program functions are official in nature and are not considered personal, social
activity; therefore, the above rules still apply to those functions.
3. I understand that if 1 become aware of any recruiting personnel violating any of these rules, I will report it immediately
to the Battalion Executive Officer whose name and telephone number are:
MAJ Ramos-Rivera
Name Telephone Number
4. 1 understand that between recruiting personnel and Future Soldiers there will be no sex, no dating, no sleepovers, no
sharing of property, no drinking of alcohol, no financial deals, no improper touching, no profane language, no verbal
sexual suggestions, and no sexual harassment.
AUTHENTICATION
V1.30
(b) (6), (b) (7)
(C)
..Transmission Log
- " - A Tuesday, 2007- 08- 28 15: 29
Da t e Ti me Type J ob # Le n g t h Speed S t a t i o n Name/Number Pgs St a t u s
2007- 08- 28 15: 28 SCAN 01079 0: 18 24000 14107615228 1 OK - - V. 3 4 1M31
POUCE RECORD CHECK
1. DATE4FKaUESr
Fom Aptifevtt}
CMS Mr. 0704-0007
Expiret OCT 31, 200S
Q tha l am tef f wt ml na \ntmKOoi%, wwcl &g wWng tgureM,
rflWns tf** bur4n MtimMo or any cKtm MpMt of tTM eo Itetion ^
[0704-OCM7]. RMpanMraf ftwuH M kwt r* that notwiWwn*ng *ny noWfKhct^n^mg #
P U M i PO WOT RETURN YOU* l OMI I TO TWI A l O V l OBa>MiZATO>N. BtTURN C Oi me T t B FORM TO ADDRI SS SHOWH AT MTTODI OF FORM.
SECTION I rro eempbM ty HKrviting StrvictI
2. NAMEOF AFPUCANTf M. n . MlMKWaimO;.
DOE, JOHN CHARGES
Cmr/COVNTy/STATE CBAItOES A FEB
5. OATS OF BIRTH
IVYYYMMCII
19810305
a
6.a. RACIAL CATEGORY fXew
( I I AMERICAN IttDIANMUMA MATIVE
4. PLACE Of BIRTH
"^"AVON PARK
X
Ol UWK OH AnDCAN AMEMCAN
e. ADDRESS IN ADOHESgEE S JURISDICTION 'MML TD-Uontl
b. COI MTY
HIGHLANDS
b. ETHNIC CATCOMY
I I I HI6PAWO OR LATINO
at nor Kismtic OR LATINO
NUMBER AND fiTMrr//MftMteprTnnr no. ;
33 ELM STREET
b. cj rv
ROCKVILLE
10. PERSON MAKING THIS REQUEST
' MD^ "2O852
' ''FL
7. SOCIAL SECURITY
NUMBER
B. OATV9 RCSIDCD AT THIS ADDREU
l YYYYMMDOl
20060103
NAME ILtSt, First, Middh fJame/s})
BASLER. MICHAEL
SECTION II (To b6 eomphttd bv Applkmi^}
RANK D. SIGNATURC
SFC
d. TITLE
U.S. ARMY RECRUITER
PRIVACY ACT STATEMENT
AUTHORITY: TitiB 10 United States Code, Sections B04, SOS, 908, i nd 12102; E.O. 9397.
PRINCIPAL PURPOSE: To determine eligibility af a prospective enlixtee in the Armed Fofces of the United Statee.
ROUTINE USES: Information collected on thix form mey be released to lew enforcement agcrtclei engaged In Ae investigation or proeeeutien
of a criminal act or the enforcement or implementation of a statute, rule, reguledon or order; to any component of tha Department of Justice
for the purpose of representing the DoD.
DISCLOSURE: Voluntary; however, failure of the applicant to complete Section II may result in refusal of anlktment in the Armed Forces of
the United States.
The data ara for OFFICIAL USE ONLY and wilt be maintained end used in strict confidence in aocordance with Federal law and regulations.
Making a knowing and willful false statement on this DO Form 368 may be punishable by fine or imprisonment er both. All information pro-
vided by you, which possibly may reflect adversely on your past conduct and parformance, may have an adverse impact on you in your mill,
tary career In situations such ae oonalderation for special asaignment, security clearance*. Court martial and admintstfatlve proceedings, etc.
11. 1 HEREBY CONSENT TO RELEASE FROM YOUR FILES
THE I NFORMATI ON REOUESTED BELOW.
SECTION III (To ba comfil*td by Polinf or Jyvenilv Agtncy}
SIGNATURE
The person described above, who claims to have resided at the addms shown above, has applied for enlistment In tha Armed Forces of the
United States. Please furnish from your files the information relativs to Section III below. A return envelope Is provided for your convenience
TEJ^ CJ"
Z. HAS THE APPLICANT A P6Ll t { OR JUVENILf BECflRD. TO INCLUDE WlNON TRAFFIC VIOLATIONS'*
tlf YES. wht wat th offvnsf or chtrge, date, itisfioaition and ttti ttnoe?)
The following agency charges a $18.00 fee, for arrest/convictloa Infortnaiion, letter on file at the Bali. Rctg. Bn dated 16 May 0;
Maryland State Police
13. IS APPUCANT NOW UNDEROOINa COURT ACTION OF ANY KIND? (If YgS, givt dttHa.l
"CT
-[XJli
THIS IS TO CERTIFY THAT THE A80VS DATA AS CORRECTED ARE TRUE AND CORRECT ACCORDING TO THE RECORD ON FILE IN THIS
OFFICE. THIS INFORMATION IS CONFIDENTIAL AND CANNOT BE USED IN ANY OTHER MANNER EXCEPT FOR OFFICIAL PURPOSES.
14. DATE fXyy/AWOO; I B. TI TLE
20061104 U.S. ARMY RECRUnHER
LAW ENFORCEMENT AGENCY
MAIL TO;
[Maryland State Police
1201 Reistertown Road
Plkesville, MD2I208
L
;. MD2 I 2 C
#
n
J
16. VERIFIED BY ISIsmwnl
RECRUITING AGENCY
MAIL FROM:
r
ROCKVILLE RECRUrril
611 ROCKVILLE PIKE,
ROCKVILLE, MD 201
L
irriNGST, STATION
,40
1
J
DD FORM 3 6 9 , OCT 2 0 0 5 FREVIOUS EDITION IS 0BS0LFT6. FommwAdobt PiotoMXWl 6
(b) (6),
(b) (7)
(C)
m # "wy
.^.0%%.
Tuesday, 2007- 08- 28 15: 29
Da t e Ti me Type Job # Le n g t h Speed S t a t i o n Name/Number Pgs St a t u s
2007- 08- 28 15: 28 SCAN 01079 0: 18 24000 14107615228 1 OK V. 34 1M31
POLICE RECORD CHECK
BATE Of neiUEiT-
' " " i mi oi
Fonn Approved
OMB Na. 0704-0007
Expirat Oer 3?, 200S
Tha pjblic raportir^ eVMO TOT MUvebcn of infomMt
BMharkr^g nd TWlmHT.fi; tha IISIB noodod, tnd competing
.nferni t^r, - ' '
;lwg oxiarng * sourovs^
OP, 'Mluding uBsanwnc fo- racucmg -.ha fr.ranT W tr Dap^rtma/Y of Daf f w. eoco:rvB Sruic OitKtofatS IO30i-(S)C7i fcispooerT-.s anoyM M awtfa tfi notwittcwndiiM any
vBion of nc pamin cSall Bo subpci to any pa^Kv f y ftllint la aftMMv witn a ootloction of 'rrTofmaiior If l( riat diipimy aj'Tontly vmkd OMft corcrol numWf,
PLEASE DO NOT RETURN YOU* FOAW TO THE ABOVE ORGANIZATION. RETURN COMPLETED FORM TO ADDRESS SHOWN AT WT T OM OF FOAM.
SECTION \ (To 06 completed by Rfciuiiing Ssrvice}
2. NAME OF APPLICANT ILaer Fust. MiiJdIe Namtlsl. AIMf
DOE. JOHN CHARGES
cm/COVNTY/STATE CHARGES A FEE
5. DATE OF BIRTH
IVYYVMIADDI
19810305
6. a. RACI AL CATEGORY Wo m i w / w / . ;
(1} AMERICAN INOIANfALAeKA NATIVE
a i gLAGK OH AFHtCAN AMEtUCAN
4 . PLACE OF BI RTH
"^HvON PARK
I T
S. ADDRESS IN ADDRESSEE'S JURISDICTION -MAIL TO' bMakI
b. COUNTY e. STATE
HIGHLANDS FL
b. ETHNIC CATEQOflY
(11 HISPANIC OH LATINO
IA) HOT HISPANIC OH LATINO
. WJMBin AHO eTKtT fiMiudc ap^fTTtam n
ROCKVILLE MD"
d. ZIP CODE
20852
10. PERSON MAKI NG THI S REQUEST
7. SOCI AL SECURI TY
NUMBER
a. DATES RESIDED AT THIS AD0R6M
(YYYrMMDDl
20060103
fVYYVMMOOi
a. NAME (Last, Firwt. Middle NamelaU
BASLER. Mt CH. ^
** gp^
SECTION II . (To Ac eomplttfid bv App^kar}!)
c. SIGNATURE i . TITLE
U.S. ARMY RECRUITER
PRI VACY ACT STATEMENT
AUTHORI TY: Ti ds 10 Uni t ed St at es Code, Sec t i on: 504, 5 0 5 , 5 0 8 , and 1 2 1 0 2 ; E.O. 9 3 9 7 .
PRI NCI PAL PURPOSE: To det er mi ne el i gi bi l i t y of a pr ospect i ve enl i st ee in t he Ar me d For ces of t he Uni t ed Sl at es.
ROUTI NE USES: I nf or mat i on col l ect ed on t hi s f or m may be rel eased t o l aw enf or c ement agenci es engaged in t he i nvBEt i gat t on or pr osecut i on
of a cr i mi nal act oi t he enf or cement or i mpl ement at i on of a st at ut e, r ul e, r egul at i on or or der ; t o any component o f t he Depar t ment of Just i ce
f or t he pur pose of r epr esent i ng t he DoD.
DI SCLOSURE: Vol unt ar y; however , f ei l ur e of t he appl i cant t o compl et a Sect i on 1| may r esul t in r ef usal of e n l i i t ma n t i n t he Ar med Forces of
t he Uni t ed St at es.
ThB dat a ar e f or OFFI CI AL USE ONLY and wi l l be mai nt ai nsd and used in St r i ct conf i dence i n accor dance wi t h Feder al l a w and r egul at i ons.
Maki ng a ten owi ng and wi l l f ul f al se st at ement on t hi s DD For m 3 6 6 may be puni shabl e by f i ne of i mpr l aonment er bot h. Al l i nf or mat i on pr o-
vi ded by y ou, whi ch possi bl y may r ef l ect adver sel y on your past conduct and per f or manc e, may have an adver se i mpac t on you i n your mi l i -
t ar y cr r i n si t ual i ona such as oonai der at i on f or speci al adsi gnmt nt , secur i t y cl aar ences, cour t mar t i al and admi nt s uat i v e pr oceedi ngs, et c.
1 1 . I HEREBY C ON S E N T T O RE L E A S E F R O M YOUR FI LES
T H E I N F O R MA T I O N R E Q U E S T E D B E L OW.
SECTION III - fTo bo compitTtd by Pohc9 or Juvenih Agtncy}
SI GNATURE
The per son descr i bed above, wh o cl ai ms t o have resi ded at t he addr ess s h o wn above, has appl i ed f or enl i st ment In t he A r me d Forces of t he
Uni t ed St et es Pl ease f ur ni sh f r om your f i l es t he i nf or mat i on r el at i ve t o Sect i on 111 bel ow. A r et ur n envel ope is pr ovi ded f o r your conveni ence.
I X I YE6 I I NO
12. HAS THE APPUCANT A POLICE OR JUVENILE RECORD. TO INCLUDE MINOR TRAFFIC VIOLATIONS?"
tlf YES. vvAaf WAS the affansw Of chtrffe, date, disfxxs/tion and santenae?)
The following agency charges a $18.00 fee, forarrcst/conviction informarioo, letter on file at the Bali. Rctg. Bn dated 16 May 0'
Maryland State Police.
13. IS APPLICANT NOW UNDERGOING COURT ACTION OF ANY KIND? {If VS, ff/ve dswis.i
"CT
THI S IS TO CERTIFY THAT THE ABOVE DAT A AS CORRECTED ARE TRUE A ND CORRECT ACCORDI NG TO THE RECORD ON FILE IN THI S
OFFI CE. THI S I NFORMATI ON IS CONFI DENTI AL AND CANNOT BE USED IN A NY OTHER MANNER EXCEPT FOR OFFI CI AL PURPOSES.
14. DATE l YYv r m/ DDi 15. T I T L E
20061104 U.S. ARMY RECRUITER
L AW ENFORCEMENT AGENCY
MAI L TO;
[Mar>'land State Police
1201 Reisteno Road
Plkesville, MD 21208
L
n
J
16. VERIFIED BY ISisnnunl
RECRUI TI NG AGENCY
MAI L FROM:
ROCKVILLE RECRUITING STATION
611 ROCKVILLE P I K E . " 4 0
ROCKVILLE, !vID 20850
L
n
(b) (6),
(b) (7)
(C) (b) (6), (b)
(7)(C)
o
>
TI
o
30
v l
O
WI
(>
(O
CO
S g
O tn
tn g
P g
Z
en
H
30
c
n
to -0
c c
(A "O
ii
> l o
ii
V 30
I c
-< z
(g
n
>
tn
tn
o
>
o
33
g
>
<
m
C
t n
3 D > :
- o g.;
D
;>
g
^ C :
S nc
:r
o
3 %
=k CJ
o o
3D
a>
t
I
D-
< , 3" cu 3 3"
I s ;S 9: o
3 ^ 2 .
5 - 2
H-O
^ : : <
3 i f
I III
s -
? 01 o
Z o o
3 C
Q. cr. t r
I
m
n z
o o
g o
g n E
N
O
H
o
cn
tn
tn
z
>
H
C
33
o
o
9
o
o
n
H
g
ON
0
-O H
O O
n z!
o S
n
z
o
6
o
5 q
Z 33
H Z
>
-D H
o o
cn
o
z
9
a
o
H Z
>
H
5
X
O
ro
n
-0 H
O o
P
O 3
O g
z
o
6
o
D H
o o
P
to
<sl
Kl
\ o
33
^1
r
( j N g
^ !
^ i
^
0 \ 55
m l
~R
Z
^
O a-
1
Z I
n z
I o
m X
cn - I
8
O D-
s
I
0 ^
1 o
m I
CO H
8
O
8
s
11
cn -t
8
1
8
!
m
o
33
>
I O
I 3
? <
w' " O
o 3 "
! 1
% o
-n 0)
g g
I s
I <D
^
i (/)
o
I
w CD
i 2
s.
n
P
0
(\
CA
2
>
>
cn
33
cn
o
o
>
.5-
>
X
n
(b)
(6),
(b)
(7)
(C)
***FOR OFFICIAL USE ONLY***~
MODIFIED AUTOMATED DA FORM 5286-R
INDIVIDUAL TRAINING RECORD FOR BASIC COMBA TRAINING
BASIC COMBAT TRAINING (BCT)/0NE STATION UNIT TRAINING (OSUT)/
ADVANCED INDIVIDUAL TRAINING (AIT)
NAME: (LAST, FIRST, Ml): PVT Bradley J. Manning SSN:
ORGANIZATION: C C O 2 - 1 0 I N INSTALLATION: Fort Leonard Wood, MO
NEW START:
UNIT DATE TRAINING WEEK REASON
CONSTRUCTIVE CREDIT GIVEN/DATE:
REASON:
POI SUBJECTS TRAINED / TESTED: BASIC COMBAT TRAINING
BCT / OSUT PHASE 1 - III REQUIREMENTS: DATE COMPLETED / SCORE
(1) Pass the APFT - 150 points minimum (50 per event)
RAW POINTS
Pushups:
Situps;
Run;
8 Mar 08
SEE PT CARD
SEE PT CARD
SEE PT CARD
GO
GO
GO
(2) Qualify w/ith individual weapon;
a. Convoy Live Fire
b. MDF 1/2/3
c. All BTT events to Include BTT 4
d. Arm 1-4
21 Feb 08
13 Mar 08
17 Mar 08
28 Feb 08
29 Feb 08
GO
GO
0 0
0 0
0 0
(3) Complete Obstacle and Confidence
a. Confidence Tower;
b. Confidence Obstacle
c. Conditioning Obstacle Course;
YES
30 Jan 08
1 Feb 08
20 Mar 08
GO
0 0
GO
GO
(4) Complete Bayonet Training; 25 Feb 08 0 0
(5) Complete Pugil Training 25 Feb 08 GO
(6) Complete Hand to Hand Training 21 Mar 08 GO
(7) Throw two live Hand Grenades: 27 Feb 08 GO
(8) Negotiate the Hand Grenade Qualification NA GO
(9) Complete the Protective Mask Confidence 8 Feb 08 GO
(10) Demonstrate understanding of and willingness to live the Army's seven core YES 0 0
(11) Demonstrate capability to operate effectively as a team YES 0 0
(12) Complete all required foot and tactical road 10K-17 Mar 08 GO
(13) Complete all required Tactical Field Training and
Field Training Exercises (FTX) FTX 1 FTX 2 FTX 3
(a) All STX Training 1-6
YES
FTX 3-14 Mar 08
14 Mar 08
GO
GO
GO
(14) Receive training to standard in all mandatory YES GO
INDIVIDUAL HAS SATISFACTORILY COMPLETEpJFHE-flEQUIRMENTS OF THE TRAINING
PROGRAM NOTED ABOVE( ^^ept noted on this form)
Signature of Training Officer /
Alexandre E. Wels, CPT CM c^t _^^==^^^\
Date
3 Apr 08
(b) (6), (b) (7)
(C)
DATE; 2008/01/15 13:56:44
DODAAC: W58CEV
SSN/PID: NAME:
CENTRAL ISSUE FACILITY - EORTi-MoNARD WOOD
-tSENERiC WORKSHEET
/ V\ ^MMTN( j . ^^f t mH' ^
MENU: ACH - ACH WINTER
RANK:
PVJf
4
PAGE 1 OF 1
CIF CODE; NW4500
UIC;
B13907
B14729
P17415
P05813
T38070
YY1596
YY1597
A-~) C96399
4-^ C96536
'^^Qi
IGH"
p6r r - ^ " oi i 7
^ Q- p . A ^ F 3 0 3 9 1
ST UN NOMENCLATURE
BAG BARRACKS: COTTON
BAG DUFFEL: NYLON DUG
PONCHO WET WEATHER: C
PARKA: W/ET WEATHER WO
TROUSERS; WET WEATHER
COATJSLISTTRNG
TROUSERS JSLIST
CANTEEN WATER; PLASTl
CANTEEN WATER; PLASTl
COVER WATER CANTEEN:
COVER WATER CANTEEN:
4 F54817 CUP WATER CANTEEN; ST
5 D64043 CASE FIELD FIRST AID
5 N39848 OVERSHOES BOOT COMBAT
6 G39744 GAITER; NECK POLYPROP
6 L70172 LINER COLD WEATHER CO
6 M52555 MITTEN INSERTS; WOOL/
6 M53240 MITTEN SHELLS: COTTON
6 S75621 SWEATER MAN'S: WOOL 0
7 B59567 BELT INDIVIDUAL EQUIP
7 H39835 FIELD PACK: COMBAT NY
7 ' V02073 VEST; INDIVIDUAL TACT
8 DA1599 COVER,HELMET,UNIVERSA
8 H53175 HELMET; ADVANCED COMB
9 H90705 FRAME FIELDPACK:W/S
<>R
AU PCS
TRANS
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
SIZE CIC
ISSUE"
CCA
11
T
4
A
CCB
1
TOTAL
%
a
I ACKNOWLEDGE RECEIPT OF THE ITEMS LISTED HEREON. I AM AWARE OF MY RESPONSIBILITY TO MAINTAIN THESE ITEMS IN
SERVICEABLE CONDITION AND THAT I MAY BE HELD PECUNIARILY LIABLE FOR ANY ITEMS WHICH ARE LOST OR DAMAGED DUE TO
NEGLIGENCE OR MISCONDUCT
MY
SIGN/TTURE & DATEI
zy
^ JAN
END REPORT
(b) (6), (b) (7)(C)
f/diffe
"sSN
Grade
MANNING, BRADLEY EDWARD
Issued By
El
Category R
Authorized By:
Approved By
Type Issue;
Personal In Nature
inpVIDUAL CLOTHING RECORD
DA FORM 3078 (IRM Control Panel Version)
Supply & Services I
PAR 4-2, AR 700-84/CTA 50-900
Denver Williams
For Official Use Only
CUP Fort Leonard Wood
Date Approved 03/04/2006
Roster Number: 021 010
Phone Number: 573-596-0286
Template: PHIAAFW
Qty Total Prior
PGC Size Item Description Authorized
Issued Cost Issues
Issue Date
00312 small
undershirt, ctn v/hite crewneck
2 2 $5.20 0 03/04/2008
01672 14 1/2
shirt, man's, quarter length sleeve
2 2 $25.80 0 03/04/2008
01724 7
beret, man's, black
a
2 $19.70 0 03/04/2008
01834 6c
gloves, men's and women's
1 1 $17.40 0 03/04/2008
01941 small
drawers, cold weather
1 1 $9.15 0 10/04/2007
01942 small
undershirt, cold weather
1 1 $8.95 0 10/04/2007
02111 38 xshort
coat, all-weather 1 1 $83.95 0 03/04/2008
02113 2
gloves, men's and women's
1 1 $15.35 0 10/04/2007
02120 15x32
shirt, man's 1 1 $16.50 0 03/04/2008
02195 30 regular
trousers, men's
2 2 $71.70 0 03/04/2008
02275 10-13/M
sock liner, poly/nylon, black
7 7 $6.65 0 10/04/2007
02276 small
drawers, cold weather
1 1 $10.00 0 10/04/2007
02277 small
undershirt, cold weather
1 1 $11.55 0 10/04/2007
02303 6EEE
shoes, men's
1 1 $36.65 0 03/04/2008
02406 headband new
headband, ground troops
1 1 $6.72 0 10/04/2007
02601 small
t-shirt, athlete's S/S 3 3 $18.60 0 10/03/2007
02603 small
t-shirt, athlete's US
2 2 $15.70 0 10/03/2007
02621 sm reg
jacket, pfu 1 1 $53.05 0 03/04/2008
02622 am short
pants, pfu
1 1 $28.15 0 03/04/2008
02624 small
sweat shirt
2 2 $13.50 0 10/03/2007
02625 small
sweat pants 2 2 $15.70 0 10/03/2007
02843 37 xshort
coat, man's
1 1 $95.25 0 03/04/2008
02882 medium
sock, boot green,medium
7 7 $15.75 0 10/04/2007
02926 7 wide
Boot, Combat, HW
1 1 $74.35 0 10/04/2007
02943 7 1/2 wide
Boot, Combat, Temp 1 1 $100.70 0 10/04/2007
02978 xsmall short
trousers, acu
4 4 $142.80 0 10/04/2007
02979 xsmall xshort
coat,acu
4 4 $147.20 0 10/04/2007
02980 7 1/8
cap, patrol, army acu
a
2 $13.60 0 10/04/2007
02982 small
t-shirt, athlete's, sand
7 7 $31.15 0 10/04/2007
02984 xsht short
pad elbow 1 1 $1.40 0 10/04/2007
02985 xsht short
pad knee
1 1 $1.05 0 10/04/2007
02989 SXS
Coat, CW ACU 1 1 $65.40 0 10/04/2007
03041 40
belt, riggers, sand
1 1 $3.15 0 10/04/2007
03044 28
drawers, men's sand
7 7 $12.95 0 10/04/2007
03098 S/2
glove inserts, cold
a
2 $3.20 0 10/04/2007
03140 medium
trunks, general purp 3
3 $31.50 0 10/03/2007
10096 necktie
necktie 1 1 $4.40 0 03/04/2008
10308 bag barracks
bag, barracks
1 1 $8.84 0 10/03/2007
17241 tag cover ID
cover, id, personnel 1
1 $0.22 0 10/04/2007
17264 necklace
necklace. Id personnel
1 1 $0.50 0 10/04/2007
17632 bag duffel
bag, duffel 1
1 $18.00 0 10/04/2007
17668 towel bath
towel, bath
4 4 $10.00 0 10/03/2007
26095 buckle clip
buckle, clip, end str 1 1 $4.55 0 03/04/2008
27783 belt trouser
belt, trousers, bik gold clip
1 1 $2.25 0 03/04/2008
28091 b.o.s collar
insignia, BofS
2
a
$1.94 0 03/04/2008
29294 one size
cap, synthetic, green
1 1 $4.55 0 10/03/2007
93664 flag velcro
flag velcro Insignia
3 3 $1.65 0 10/04/2007
(b) (6), (b)
(7)(C)
Name
>
SSN ^
Ljrade
Category
MANNING, BRADLEY EDWARD
Issued By
El Authorized By
R Approved By
Type Issue: 1 & 2
Template: PHIAAFW
PGC Size
# '
PAR4-:
CUP Fort Leonard Wood
& Sen/ices I
2, AR 700-84/CTA 50-900
Denver Williams
Item Description
Date Approved;
Roster Number:
Phone Number
Authorized
Qty
Issued
03/04/200
C21 010
Total
Cost
Prior
Issues
Issue Date
PGC Size
Items Due Out t o Member
Item Description Qty Due Cost
SOLDIER RESPONSIBILITIES
A. You will have in your possession, in a serviceable condition, at all times the items and quantities of
Clothing indicated in the issue columns of this form. Safeguard your uniforms at all times.
B. Retain a copy of this form, you must show proof of nonreceipt for items not issued to you, during
initial processing in order to receive these items at a later date.
EXCHANGES / ALTERATI ONS OF MISFIT CLOTHI NG
A. Exchanges or alterations of misfit clothing, after initial issue, must be made within 6 months of date of issue.
Misfit footwear must be exchanged with 90 days of issue.
B. You are discouraged from making unauthorized alterations to these uniforms. Garments that have
undergone unauthorized alterations will be replaced at your expense.
STATEMENT
I acknowledge that I have received the articles herein, in the quantities indicated, that they are for my own
personal use and I will not dispose of them by sale, gift, loan, trade or pledge to unauthorized personnel.
TOTAL VALUE OF ITEMS
ISSUED TO SOLDIER
Organizational 22.32
Individual 1,264.00
TOTAL 1,286.32
SIGNATURE OF MEMBER DATE
(b) (6), (b)
(7)(C)
(b) (6), (b)
(7)(C)
3?r^
PERSONNEL INFORMATION SHEET
(Please Print Clearly)
DATA REQUIRED BY THE PRIVACY ACT OF 1974: AUTHORITY: Section3013, Title 10, use. PURPOSE: Permanent historical document pertaining to the individual shown thereon during the
period of assignment/attachment to this unit. ROUTINE USES: This form provides the unit clerk wi th personal information which, in conjuction with appropriate source documents, enable the
unit clerk to prepare any personnel action on your behalf. COMPLETING THIS FORM IS VOLUNTARY, FAILURE TO DISCLOSE THIS INFORMATION WILL RESULT IN NO DESCIPUNARY
ACTION.
NAME (Last, First, Mi ddl e)
/V\Wl^(o,S(iM)LapwAH)
RANK
e l
PVT
SSAN
WEIGHT HEIGHT
<3>3l^&j
EYES
BLI K.
HAIR
^UM) ^
BLOOD TYPE
o ?o5
ETHNIC GRO
CNc^$5*>^ CATHOLI C
AGE DATE OF BIRTH (Day, Month, Year) PLACE OF BIRTH
OKLAHfl>iKCXT^ ^ o^ LAHO/ i A
DRIVERS LICENSE?gWs DNO
(If yes, which stiterf
MM^^pm
COMPONEN^r
NG ai RA
ER
DATE OF ENLISTMENT
%ocr xoon
NUMBER YEARS
4
ETS DATE
X OcX ^off
PLACE OF ENTRY ON ACTI VE DUTY
(Ci ty, St at e)
^K^It^adi^fAO
DATE OF ENTRY ON ACTI VE DUTY
0. OCT a o o ^
PRIOR SERVICE
(Years)
LAST UNIT
1^3^ /?M
NG/ER HOME UNIT
IN CASE OF EMERGENCY NOTIFY (Name, Relationship, Phone Number and Address)
/
STATUS OF PARENTS X
Li vi ng 3 Separated
Di vorced Deceased
NEXT OF KIN: U Mother Father (Name and Address)
^Ll|\iU ih|\Nv)%iJk,
NAME OF WIFE (First, Maiden and Address NO. CHILDREN COLLEGE GRAD? []Yes B^No
(If yes, degree?)
CIVILIAN EDUCATION (Grade
completed)
Hl bW^ w^
ENLISTMENT GUARANTEE
^9-H(7(X)
(Please Complete Fol l owi ng correctl y)
DEP ID DEP ALLOTMENT YOUR ID
i^s
SOCIAL SECURITY CARD
YtS
DOG TAGS
XtS
ALLERGY TAG
CIVILIAN SKILLS " ^ ^ ^ U ^
ht^WIH6E!nVT^O>H>OV\,\l^
WEAR GLASSES NEED GLASSES PHYSICAL DEFECTS (Continue in Remarks)
WORK IN A LEADER-
SHIP POSITION
AA^-WN^K
DESCRIBE LEADERSHIP POSITION
CsvJitfMx^ ^ ^VKl ^T I MMJAG^. ^^ J v i m MANAr^ri )
SIGNED UP FOR AIR-
BORNE TRAINING
PERSONAL PROBLEM (Continue in Remarks)
.REMARKS '.Continue on Reverse)
DATE
"^IJW
SIGNATURE .
- 7 : ^ " : ^
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
Personal Data Sheet
AUTHORITY:
PURPOSE:
ROUTINE
USES:
VOLUNTARY.
Title 5 USC, Section 301 (1970)
Temporary supplemental document of SIDPERS- Personal Data Card pertaining to the individual during period of
assignment for Basic Combat Training
This form provides units with personal background information which enables the unit to screen the soldier for
potential problems, used in recording of other personnel management data not otherwise shown elsewhere, Voluntary
disclosure of SSN is to properly identify the individual. This information wi l l not be released to 3'" parties.
MANDATORY OR VOLUNTARY DISCLOSURE AND EFFECT OF FAILURE TO PROVIDE INFORMATION
Lack of information or only partial information will hinder the unit's ability to aid the trainee if problems arise and the
cadre is unaware of any background information.
Print in Black Ink Only For all dates use this format dd/mmm/yy (02 Feb 02)
/YIMoMlNO, BRADIO ^o^m
Name: (Last, First, Middle)
PVf
Rank
Charlie Co 82Chem BN, S^Chem BDE
451 Colorado Ave, Unit 32
Fort Leonard Wood, Mo 65473
frW
Platoon
ONXrCD STAINS
OkL4HoMK
Country and Sale of Birth Permanent Address
FATHCR
Who raised you
BvTHi:ii
NOK relationship
Hpmephpue number
NOK phone number
Married Y ( 2 ) Children Y( N] ^ Child Support Y < ^
Martial
Status:
Dependents Names/Ages/Relationship
wA-
Csingl^ Married Divorced Widowed Separated
BASD:
og^ccr Aoo9
Blood Type:
o posirrv^
Gender:
MALE
Arrival Date:
O^ex-T^otO
Date of Rank:
OaocTQoo' ^
Date of Birth:
^ OEC aoo9
ETS:
olocr%)i 1
Drivers l i cense: ^) N
State of issue: / ^j ^J^^y
Component:
NG / AR
Prior MOS
ifA
us Citizen N
Country:
Hobbies:
(V/A
Previous Job:
STAtlSo:K5
Security Clearance
^sm*m^
MEPS Station
^^LTlMofK^
Race:
wWI T^
Religion:
KDMLNCTblTM
Vegetarian: Yi ( g)
Height:
^^;rA
Weight:
(oAlk$
Hair Color:
BIOAA
Eye
i&
Tattoos:
Y/(B)
Allergies:
Y %
What Allergies: j j / ^ V
Glasses:
g)N
Op^^^erts:
*EM
Ed Level
dED^ ^ Deg
Degree / Credit Mrs
NQ^S.
Military Training: .
*Jof J[
Split Option: AR / NG State National Guard Unit Address Guarantees: Ranger / Airborne / Station of Choice
SPI / SP2
RECLASS
K)o(J
^jk
p/A
Station of Choice: ^ ^ ^ ^ ^
Do you have your ID Tags
i^m
Do you have Allergy Tags
Do you have ID Card
Do you have your Optical Inserts
YKR>
Have you ever been assigned to the PTRP Y A /
Have you ever been assigned to FTU
For What event:
YI0
Are you a single parent Y m
Are you married to another service member
YCS
Are they your next of kin
yKm
Are you enrolled in the Married Army Couples Program Y<?^
Have you applied for Joint Domicile
Spouses Rank / Name: t i / N
Spouses Duty Station: (j/fk
Spouses Unit: U/A
Spouses SSN: (!J//V
Do you have your Ear Plugs CY^N
Do you have your lET Handbook (Volume 1 and II) N
Do you have a Flashlight
07 N
Do you have two pair of military glasses Y/(fg,
Have you ever served in the military before
Did you receive an administrative discharge
What type of discharge: ELS/EPTS/CH15/CH13/CH17/OTHER
Have you ever been convicted of a felony
Y/SJ>
If so for what
Are there any warrants for your arrest
Y W
Do you have any unpaid speeding tickets
Y<S)
Have you ever been treated in a mental facility
If so for what:
It so tor what:
Do you have any diagnosed phobias
If so what:
Y/(S>
^
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
Did you bring wi th you a Cellular Phone? ( J / N Model: ^ A A f J Ol J 6 ^ QtJ W iJAWW
Did you enroll into the Penn Laundry Program? Y / E x p l a i n :
Do you have any JROTC/ROTC experience? Y Explain:
Do you have any family members on Active Duty? Y / ( f i ^ Explain:
Do you have any family members deployed to OIF/OEF? Y Explain:
Are you enrolled on AKO and what is your username? N Print: U^f^kiOiVK}
Did you enroll in TRICARE and what version? Y Explain:
Do you own a car and did you bring it wi th you? Y^SJ Explain:
Do you have any custody issues wi th your family? Y Expla
Are you missing any luggage from your tri p to FLW? Y i f i ) Explain
hAwmf^At>i-iH fbroiu^c MAftYMKfe AMO cfi cscm' ojrLjM^ot^d' f^f^^\Lf /^oi>f
In the Space provided below will be utilized to record information about the soldier, which the chain of command can use to better,
evaluate the individual soldier. As a Minimum the following information will be provided:
Name and Age Any personal or emotional problems that you have
Home city and state encountered
A little information about yourself and your upbringing Your reason for joining the military
A little information about you family Your short term and long term goals during your training
1 LohS Uo*^&) TO 6KLArHawA-j@$^^^ LTUgp Tf-}iP-6 DtoTFL T U/ A5
r?, Ttiiti r f^iuEo wirw /?D7j4/Ff^ Ts> rHf^ ouim) /crtvcsAo.^ n. Ttiiti r f.med wirw y^v /^pTiVFK TS> rHri ouim) /cro
BACK Xi^ DOD^ r^gS LxsA //^,v>j yty
f\tir\^ if^ ^' j ohi kc A/ftxr^Ak''^,
V?ngj 4(^(3 ^illf-cn_r<^ -Co Aor 4 feQf f c r ^ o / f
Lo MiL4 i r - ^g, ^
^
% Uio.n'i- i-o bg i\ ^ e H ^ 0,^^^)^ A fAe 54oM- i^p/^
/.g. wor<? hu'MA/,
Di d you br i ng wi t h you a Cel l ul ar Phone? ^ ( ?) / N Model : ^ f i ^ f ^ S o f J ^ ^ H p OWJ
Di d you enr ol l i nt o t he Penn Laundry Pr ogr am? Y Expl ai n:
Do you have any JROTC/ ROTC exper i ence? ^ ' I Expl ai n:
Do you have any f ami l y member s on Act i ve Dut y? Y / ( ^ Expl ai n:
Do you have any f ami l y member s depl oyed to OIF/OEF? Y 1 ^ ) Expl ai n:
Are you enrolled on AKO and what is your username? N Print: U^j^kiOU^KJ
Di d you enr ol l i n TRI CARE and what ver si on? Y Expl ai n;
Do you own a car and di d you br i ng it wi t h you? Expl ai n:
Do you have any cust ody i ssues wi t h your f ami l y? Y l ( ^ Expl ai n:
Ar e you mi ssi ng any l uggage f rom your t r i p t o FLW? Y / ( j ^ Expl ai n
In t he Space pr ovi ded bel ow wi l l be ut i l i zed t o r ecor d i nf or mat i on about t he sol di er, whi c h t he chai n of c ommand can use to better,
eval uat e t he i ndi vi dual sol di er. As a Mi ni mum t he f ol l owi ng i nf or mat i on wi l l be pr ovi ded:
Name and Age Any per sonal or emot i onal pr obl ems that you have
Home ci t y and st at e encount er ed
A l i ttl e i nf or mat i on about your sel f and your upbr i ngi ng Your r eason f or j oi ni ng t he mi l i t ar y
A l i ttl e i nf or mat i on about you f ami l y Your shor t t er m and l ong t erm goal s dur i ng your t r ai ni ng
MXUWK^KAt)LV PoTOtiiK MAfty/l/iMo AMP CSltScm' I l M4 o v i h k ^ ^Lj /Moiyf
lt>wWr
1 w/^S jjpR^) TO 6KLAHawA-jgg^%^ LTua? ffls'^^ DpTn f U/AL5
n , TH^Kl r f,TUo uTHj mTHf f l TtO THf l OKDlTA) /CW&Do^
vC' M*^f r BACK -T*^ Doo5; "^/ ^i g^txS / / y ^ / x ^
Lq j^'/p/l f^^Cjl-Ar^^,
X ')g>/ng^ 4t t g t^'l!i-c(r<\ l o Ao [4 fetif- /ti/> -f-cr^o/'f 4 ^
yy\gs$ r p tf^cj li' -Ge/^
% Ujo.ni i-p be e\ isH^ p,,r^ oL^r^lT A /Ae 5Aort":hr^
i.e. t^oCd hu/yiA/i
DEPARTMENT OF THE ARMY
United States Army Intelligence Center and Fort Huachuca
Fort Huachuca, Arizona 85613-6000
ORDERS 193-00006
11 July 2008
MANNING BRADLEY E PV2 USAICFH CO D 305TH (STU) (W1E818) Fort
Huachuca, AZ 85613-6000
The following MOS Action is directed.
Awarded: PMOS 35F1O00YY
Withdrawn: N/A
Effective date: 14 AUGUST 2008 or upon completion of MOS training and approval of
security clearance as required for your MOS IAW DA PAM 611-21.
Reclassification Control Number: N/A
Additional Instructions: (A) You are entitled to an enlistment bonus of $24,000.00 IAW AR
610-210, PARA 5-99
Format: 310
FOR THE COMMANDER:
DISTRIBUTION:
IMWE-HUA-HRMR(l)
CDR, USAICFH CO D 305TH (STU) (1)
CDR, USAICFH CO D 305TH (STU) (PAC) (1)
PV2 MANNING BRADLEY E (1)
^ % ? C A #
(b) (6), (b)
(7)(C)
(b)
(6),
(b)
(7)
(C)
^
1^
^
^
^
<
z
3 O
ra
u
Q)
o
u
CO
(/)
0)
(A
U)
0)
c
ra
u
(A
>.
JZ
a.
>,
E
u
o
Q
<
Q:
o
N
^
s
tn
z
I - <n
I UJ
O X
ID
H t n
I l i i
O X
IB
z
ID
h- in
X 111
12 X
Si
lU
z
i n
in
K cn
I LU
O X
o
o
#<c^
b
/o
_9
^
to
; <r
1^
to
2 s
o o
03
< z
o o
111
2
o o
h- D.
i
I -
in
n
o o
N
o
to
6
z
o
o
c
t - -
O) g
o - ^
< 2
>< J5
u
i l
0)
i
>,
. Q
o
0)
I I
a 3 2
m e- m c
: E
5 5
tr
0)
Q:
o O g
E 3 i
< Q E
z
D
S
Q:
o
<
Q
1-
<n
LU
I -
W
d)
UJ
z
H
tZ
- 1
<
o
CO
i i
! y |
^ <
^ t
g%
%
< i
U UJ
UJ a
a. UJ
to
ii
n. CO
3 3
CL CO
cn
o>
en
ti l
Z
3
K
O
u.
<
Q
(b)
(6),
(b)
(7)
(C)
ra
a
eu
o
o
CO
+ J
CA
0)
K
CA
CA
a>
c
ra
o
CA
>.
>.
E
on
3
&
H
to
LU
CO
<
<
o
UJ
LU
X
o
<
Q
<
CC
CO
<
Q
O
t -
H
CA
UJ
H
CO
<
UJ
Q
<
Z
o
UJ
CO
<
Q
<
<
Q
s
o
o
>-
l A a
O
3f
iS
-
CO X
u
z
z
o Q
O
S
o
oD
z
j o
!
z
03
I UJ
CO X
O
z
Q:
o
o
03
5
<
t r
z
o
o
o
.
-
I UJ
a I
o
Q:
o
5
<
o:
^
^
s
2
O
CJ
>
a
o
z
o
A
: [ ]
z
-
P
o
^
Z3
%o CJ
z
5 cP
5
(5"
in
H
o o
111
2
V
CO
o
CO
g 3
o o
H a.
o
CO
o o
g
>.
.a
o
o
3
cr
o
a:
?T?7
e- "> c
^ I I I s
O, 0. 0 E S
o - ^
< g l
> , j 2 :
u
5 5
: "
: D
5 a
5 = 5
i - < Q E
z
Z)
<
Q
CO
UJ
t -
co
CO
UJ
z
<
o
CO
i i
^ <
& t
5
CO
i!
Q. CO
3 3
CL CO
< i
O UJ
UJ o
CL UJ
CO - I
a>
at
a>
UJ
z
3
l O
o
M
S
a:
o
LL
<
Q
REQUEST AND^FHORf TY FOR LEAVE
This form is subject to the Privacy Act of 1974. For use of this fotm, see AR 600-8-10.
The proponent agency is Dossier. (See InstnjctKins on Reverse)
1. CONTROL NUMBER
ri 6' qsi^L
PART 1
1 NAME ^Las(, First, Middle Initial)
Manning, Bradley E.
3 SSN 4. RANK
PV2
5. DATE
( LEAVE ADDRESS (Street City State. ZIP Code and
honeNo.)
7. TYPE OF LEAVE
ORDINARY EMERGENCY
PERMI SSI VE TOY OTHER
PCS/LEAVE
8 ORGN, STATION, AND PHONE NO
D CO 305th Ml BN
FT. Huachuca, AZ 85613
520-533-8875
NUMBER DAYS LEAVE 10. DATES
aACCRUED b REQUESTED
14
cADVANCED d EXCESS a FROM
14 AUG 08
b TO
27 AUG 08
12 SUPERVISOR RECOMMENDATION/SIGNATURE
MA P P R O V A L ^ ^ ^ ^ p DISAPP|(^VAL^
13. SIGNATURE J
APPg(c/l NAUT/l
TITLE OF
PT, MI , CMD
DEPARTURE
b TIME c NAME/riTLE/SIGNATURE OF DEPARTURE AUTHORITY
ISTC gr>. H. Mjr.y/
EXTENSION
a. DATE b.TIME c. NAME/TITLE/SIGNATURE OF APPROVAL AUTHORITY
16 RETUR
r^c^(
a DATE
7^/^<(2a^\ INS
b.TIME SIGNATURE OF RETURN
J
( V\
17.REMARKS
SM IS Authorized 1 Day(s) of travel. In case d|f ah
Staff Duty at 1-800-533-1533. My travel sche&iln
provided to my unit as promptly as possible. \J
mergency, 1 will cont
s been submitted an
t my Company at1-520-533-8875 and then BN
any changes to my travel schedule will be
Chargeable leave is frotn to
PART II - EMERGENCY LEAVE TRANSPORTATION AND TRAVEL
18. You ans authorized to proceed on offi ci al travel in connecti on with emergency leave and upon compl eti on of your leave and travel will
ret urn lo home station (prl ocat i on ) desi gnat ed by military ordei s. You are directed lo report to the Aerial Port of Embarkati on (APOE) for
onward movement to the authorized international airport designated in your travel documents. All additional travel is chargeabl e to l eave. Do
not depart t he installation without resen/ations or tickets for authorized space required transportati on. File a no-pay travel voucher wi th a copy
of your t ravel documents or boardi ng pass within 5 working days after your return. Submit request for leave extensi ons to your commander.
The Amer i can Red Cross can assist you in notifying your commander of your request for extensi on of l eave.
9. I NSTRUCTI ONS FOR SCHEDULI NG RETURN TRANSPORTATI ON:
For retum military travel reservations in CONUS call the MAC Passenger Reservation Center (PRC):
Should )ou require other assistance call PAP:
20.DEPARTEDUNrr 21. ARRIVED APOD 22. ARRIVED APOE (return only) 23. ARRIVED HOME UNIT
PART III - DEPENDENT TRAVEL AUTHORIZATION
I I (Space available or required cash reimbursable) I I ONEWAY I I ROUND TRIP
(Space required) TRANSPORTATION AUTHORIZED FOR DEPENDENTS USTED IN BLOCK NO 25
25
DEPENDENT INFORMATION
a DEPENDENTS (Lastname, Hrst, Ml) b. RELATIONSHIP c DATES OF BIRTH (Children) d. PASSPORT NUMBER
PART IV - AUTHENTICATION FOR TRAVEL AUTHORIZATION
26 DESIGNATION AND LOCATION OF HEADQUARTERS 27. ACCOUNTING CfTATION
!8 DATE ISSUED 29. TRAVEL ORDER NUMBER 30. ORDER AUTHORIZING OFFICIAL (Title and signature) ORAUTHENTICATION
DA FORM 31, SEP 93 EDITION OF 1 AUG 75 IS OBSOLETE ORIGINAL 1
UMPPC V4.00
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
Manning, Bradley Edward J ^ I / PEI Report - SF86 SSN:
O f f i c e of Personnel Management
SECURITY CLEARANCE APPLICATION
Date: 09/26/2007
Standard Form 86, Sep. 95
Manning, Bradley Edward
Page 1 of 12
EPSQ v e r s i o n 2.2
O.M.B. No. 3206-0007
Time: 11:18 AM
SSN:
1. Personal Information
Name: Manning
Bradley Edward
B i r t h Date: 1987/12/17
Place of B i r t h : Oklahoma C i t y , OK
County: OKLAHOMA
UNITED STATES
Maiden Name:
Work/Day Phone:
Height: 5 - 2 Weight: 101.00
/\
Sex: MALE
Home/Evening Phone:
Hair Color: BLOND Eye Color: BLUE
2. Other Names Used
NO Have you ever used or been known by another name?
3. Citizenship
Current C i t i z e n s h i p : U.S. CITIZEN AT BIRTH, NATIVE BORN
Mothers Maiden Name:
NO Are you now or were you a dual c i t i z e n of the U.S. and another country?
Passport Number: Passport Issuance Date: ^ .
PAi-3M-f
4. Where You Have Lived
FROM TO ADDRESS
1. 2006/07/10
PRES
Person Who Knows--TOtrv
Phone:
NO I s t h i s residence address hard t o f i n d ?
2. 2006/04/10 2006/07/09
http://arisstleas.usarec.army.mil:8080/GC/jsp/GcPaiPeiReport.jsp 9/26/2007
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6)
(b) (6)
Manning, Bradley Edward ^^1/ PEI Report - SF86 SSN: Page 2 of 12
Person Who Kjxowsvou;
Phone:
Pu^
NO I s t h i s residence address hard t o f i n d ?
3. 2005/09/10 2006/04/09
Person WhoIfenpwa. You:
Phone:
NO I s t h i s residence address hard t o f i n d ?
4. 2001/11/10 2005/09/09
Phone:
NO I s t h i s residence address hard t o f i n d ?
5. 2000/01/09 2001/11/09
) Knowa--OTr:x ^ Person Who
Phone:
NO I s t h i s residence address hard t o f i n d ?
5. Where You Went To School
YES Have you attended school beyond Junior High School w i t h i n the l a s t 5 years?
FROM TO TYPE/ADDRESS
HIGH SCHOOL DIPLOMA g(7
6400 Rock Spring Dr \\^
Award Date: 2005/06/09 Bethesda, MD 20814-1913
http://arisstleas.usarec.army .mil:8080/GC/jsp/GcPaiPeiReport.jsp 9/26/2007
(b) (6)
(b) (6), (b) (7)(C)
(b) (6)
(b) (6)
(b) (6), (b) (7)(C)
(b) (6)
(b) (6)
(b) (6), (b) (7)(C)
(b) (6)
(b) (6)
(b) (6)
(b) (6), (b) (7)(C)
Manning, Bradley Edward
#
1/ PEI Report - SF86 SSN:
Page3ofl2
Person Who Knows You
t ^t);/-)
W^
/O
fOCK/^
Phone
2. 2007/01/09 2007/05/10
Degree/Diploma/Other
Award Date:
Per s on Who KnoWs YotT
Phone:
HIGH SCHOOL
C MILTON WRIGHT HIGH SCHOOL
13 01 N FOUNTAIN GREEN RD
BEL AIR, MD 21015-2505
6. Your Employment Activities
FROM TO TYPE OF EMPLOYMENT
1. 2007/01/10
PRES OTHER
Your P o s i t i o n :
Employer Name:
B a r i s t a
Starbucks
Employer Address: 7911 Tuckerman Lane
Potomac, MD 2 0 854
O i l 301-765-a556 _ Emp1oyer Phone:
Supervisor Name:
Supervisor Phone:
NO I s the j o b address d i f f e r e n t from the employer's address?
NO I s the supervisor's address d i f f e r e n t from the j o b l o c a t i o n address?
PREVIOUS PERIODS OF ACTIVITY:
NO Have you worked f o r t h i s o r g a n i z a t i o n p r e v i o u s l y ?
2. 2006/06/10 2007/01/09 UNEMPLOYMENT (INCLUDE NAME OF PERSON WHO CAN
VERIFY)
Your P o s i t i o n :
Employer Name:
Employer Addressi
Employer Phone:
Unemployed
3. 2006/04/10 2006/06/09
OTHER
http://arisstleas.usarec.amiy.mil:8080/GC/jsp/GcPaiPeiReport.jsp 9/26/2007
(b) (6), (b) (7)(C)
(b) (6)
(b) (6), (b) (7)(C)
(b) (6)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6)
Manning, Bradley Edward ^^^1/PEI Report - SF86 SSN: Page 4 of 12
^^I/PEIReport SF86 SSN
Your P o s i t i o n : Asst Manager
Employer Name: FYE
Employer Address: 7021 S Metr^c^rial Drive
Tulsa, OK 74133
Employer Phone: O i l 918 252 7399
Supervisor Name:
Supervisor Phone: ^
NO I s the j o b address d i f f e r e t ^ t from the employer's address?
NO I s the supervisor's address d i f f e r e n t from the job l o c a t i o n address?
PREVIOUS PERIODS OF ACTIVITY:
NO Have you worked f o r t h i s organi2:ation previously?
4. 2006/02/10 2006/04/09 OTHER
Your P o s i t i o n : I n t e r n Programer
Employer Name: Zoto Inc
Employer Address: 123 Shudson
Oklahoma C i t y , OK 73102
Employer Phone: O i l 650 641 0108
Supervisor Name:
^
Supervisor Phone:
NO I s the j o b address d i f f e r e t ^ t from the employer's address?
NO I s the supervisor's address d i f f e r e n t from the job l o c a t i o n address?
PREVIOUS PERIODS OF ACTIVITY:
NO Have you worked f o r t h i s o r g a n i z a t i o n previously?
5. 2005/09/10 2006/02/09 OTHER
Your P o s i t i o n : Server
Employer Name: I n c r e d i b l e Pi^za Co
Employer Address: 8314 E 71St
Tulsa, OK 74133
Employer Phone: O i l 918 294 8671
Supervisor Name:
Supervisor Phone:
NO I s the j o b address d i f f e r e n t from the employer's address?
NO I s the supervisor's address d i f f e r e n t from the j o b l o c a t i o n address?
PREVIOUS PERIODS OF ACTIVITY:
NO Have you worked f o r t h i s t^rganization previously?
6. 1997/01/01 2005/09/09 UNEMPLOYMENT (INCLtlDE NAME OF PERSON WHO CAN
bttp://arisstleasusarecamiy.nTil:8080/GC/^^p/GcPaiPeiReportjsp 9/26/2007
(b) (6), (b) (7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)(C)
Manning, Bradley Edward J ^ I / PEI Report - SF86 SSN:
#
VERIFY)
Your P o s i t i o n :
Emp1oye r Name:
Employer Address:
Employer Phone:
Page 5 of 12
NO Were you i n the Federal C i v i l Service p r i o r t o the l a s t 10 years?
7. People Who Know You Well
FROM TO REFERENCE NAME/ADDRESS
1. 2000/01/09
2. 1993/09/10
3. 1993/08/10
PRES
Home Address:
Evening Phone:
PRES
Home Address:
Evening Phone:
PRES
Home Address:
Evening Phone:
8. Your Spouse
What i s your c u r r e n t m a r i t a l status? NEVER MARRIED
9. Your Relatives and Associates
RELATIONSHIP NAME/ADDRESS
1. MOTHER
DOB:
2. FATHER
POB: UNITED KINGDOM
Country of C i t i z e n s h i p : UNITED KINGDOM
Manning
http://arisstleas.usarec.army.mil:8080/GC/jsp/GcPaiPeiReport.jsp 9/26/2007
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b)
(7)(C)
Manning, Bradley Edward ^^^1/PEI Report - SF86 SSN: Page 6 of 12
^ ^ 1 / PEI Report - SF86 SSN:
DOB: POB: UNITED STATES
Country of C i t i z e n s h i p : UNITED STATES
3. SISTER
Casey Manning
DOB: POB: UNITED STATES
Country of C i t i z e n s h i p : UNITED STATES
iO. Citizenship ofYour Relatives and Associates
RELATI ONSHI P NAME
1. MOTHER
DOB:
Type: OTHER C i t z . Date:
C e r t i f i c a t e Number:
Court:
C i t y / S t a t e : , n u l l
Comments: Mother i s not a c i t i z e n
^ i Your l^ilitar^ History ^
N^I^ave you ever served in tbemilitary7(^If yes, provide in clironological order your military history:
begin with the most recent period and include Reserves, National Guard, Merchant Marines, and
Foreign Military Service.^
I^^YourEorei^n Activities Property
N^E^o you have Ioreignproperty,business connections, or Itnancialinterests7
13 Your Eorei^n Activities Employment
N^jAre you now or have you ever been employed by or acted asaconsultantloralbreign government,
Itrm,oragency7
I ^ Your Eorei^n Activities Contact with I^orei^n governments
http://arisstIeasusarecarmy.mil:8080/GC/^sp/GcPaiPeiReport^sp 9/26/2007
(b) (6), (b) (7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b)
(7)(C)
(b)
(6),
(b) (7)
(C)
Manning, Bradley Edward ^^1/ PEI Report - SF86 SSN: Page 7 of 12
^ ^ 1 / PEI Report - SF86 SSN:
NO Have you ever had any contact with a foreign government, its establishments (embassies or
consulates), or its representatives, whether inside or outside the U.S., other than on official U.S.
Government business? (Does not include routine visa applications and border crossing contacts.)
15. Your Foreign Activities - Passport
NO In the past 7 years, have you had an active passport that was issued by a foreign government?
16, Foreign Countries You Have Visited
YES Have you traveled outside the United States on other than official U.S. Government orders in the
last 7 years? (Travel as a dependent or contractor must be listed.) Do not repeat travel covered in
modules 4, 5, and 6. (Lived, worked, attended school)
FROM/COUNTRY TO/PURPOSE
1. 1999/08/01 2004/08/01
UNITED KINGDOM EDUCATION
17 Your l^ilitary Record
N^^ave you ever received other than an honorable discharge Irom the military^
18 Your Selective Service Record
YES Are youamale bom alter I^ecember31,19597
YES I f yes, have you r e g i s t e r e d w i t h the S e l e c t i v e Service System?
S e l e c t i v e Service Number:
i9^Yourl^edieal Record
N ^ In the last7years, have you consultedamental health prolessional (^psychiatrist, psychologist,
counselor, etc.^or have you consulted with another health care provider aboutamental health related
conditions
http://arisstleas.usarec.army.mil:8080/GC/jsp/GcPaiPeiReport.jsp 9/26/2007
(b) (6), (b)
(7)(C)
(b) (6), (b)
(7)(C)
Manning, Bradley Edward ^^1/ PEI Report - SF86 SSN: Page 8 of 12
PEI Report - SF86 SSN:
20. Your Employment Record
NO Has any of t he f o l l o wi n g happened t o you i n t he past 7 years?
- Fi r e d f r om j ob,
- Qui t a j ob a f t e r bei ng t o l d you' d be f i r e d ,
- L e f t a j ob by mut ual agreement f o l l o wi n g a l l e ga t i ons of mi sconduct ,
- L e f t a j ob by mut ual agreement f o l l o wi n g a l l e ga t i ons of uns a t i s f a c t or y
performance; or
- L e f t a j ob f o r ot her reason under unf avor abl e ci rcumst ances
21. Your Police Record - Felony Offenses
NO Have you ever been charged with or convicted of any felony offense? (Include those under the
Uniform Code of Military Justice.) For this item, report information regardless ofwhether the record in
your case has been "sealed" or otherwise stricken from the record. The single exception to this
requirement is for certain convictions under the Federal Controlled Substances Act for which the court
issued an expungement order under the authority of 21 U.S.C. 844 or 18 U.S.C. 3607.
22. Your Police Record - Firearms/Explosives Offenses
NO Have you ever been charged with or convicted of a firearms or explosives offense? For this item,
report information regardless ofwhether the record in your case has been "sealed" or otherwise stricken
from the court record. The single exception to this requirement is for certain convictions under the
Federal Controlled Substances Act for which the court issued an expungement order under the authority
of 21 U.S.C. 844 or 18 U.S.C. 3607.
23. Your Police Record - Pending Charges
NO Are there currently any charges pending against you for any criminal offense? For this item, report
information regardless ofwhether the record in your case has been "sealed" or otherwise stricken from
the record. The single exception to this requirement is for certain convictions under the Federal
Controlled Substances Act for which the court issued an expungement order under the authority of 21
U.S.C. 844 or 18 U.S.C. 3607.
24. Your Police Record - Alcohol/Drug Offenses
NO Have you ever been charged with or convicted of any offense(s) related to alcohol or drugs? For this
item, report information regardless of whether the record in your case has been "sealed" or otherwise
stricken from the record. The single exception to this requirement is for certain convictions under the
Federal Controlled Substances Act for which the court issued an expungement order under the authority
of 21 U.S.C. 844 or 18 U.S.C. 3607.
http://arisstleas.usarec.army.mil:8080/GC/jsp/GcPaiPeiReport.jsp 9/26/2007
(b) (6), (b)
(7)(C)
Manning, Bradley Edward ^^1/ PEI Report - SF86 SSN: Page 9 of 12
^ ^ 1 / PEI Report - SF86 SSN:
25.Your Police Record l^ilitary Court
NO In the last7years, have you been subject to court martial or other disciplinary proceedings under
the Uniterm CodeofMilitaryJustice?(include nonjudicial,Captain^s mast, etc.)For this item, report
inlbrmation regardless ofwhether the record in your case has been "sealed" or otherwise stricken from
the record. The single exception to this requirement is lor certain convictions under the Federal
Controlled Substances Act tor which the court issued an expungement order under the authority of21
USC 844or l 8USC 3607
26. Your Police Record Other Offenses
NO In the last7years, have you been arrested fr^r, charged with, or convicted of any ofIense(s)not
listed in modules21,22,23,24,or 25? (Leave out traffic fines oflessthan^l50 unless the violation was
alcohol or drug related.)For this item, report inlbrmationregardlessofwhether the record in your case
has been "sealed" or otherwise stricken from the record. The single exception to this requirement is tor
certain convictions under the Federal Controlled Substances Act fr^r which the court issued an
expungement orderunderthe authority of 2I USC 844orI8U.S.C. 3607
27. YourUseoflllegalI^rugsandl^rugAetivitylllegalUseofl^rugs
NO Since the age of I 6or in the last7years, whichever is shorter, have you illegally used any
controlled substance, frir example, marijuana, cocaine, crack cocaine, hashish, narcotics(opium,
morphine, codeine, heroin, etc.), phetamines, depressants (barbiturates, methaqualone, franquili:^ers,
etc.), hallucinogenics (LSD,PCP,etc.),orprescription drugs?
28. Your Use oflllegall^rugs and l^rugActivityLlse in Sensitive Positions
NO Have you EVER illegally usedacontrolled substance while employed asalawenfr^rcement officer,
prosecutor, or courtroom officials while possessingasecurity clearances orwhileinaposition directly
and immediately aflecting public sa^ty?
29. YourUseofIllegalI^rugsandl^rugA^tivity I^rugAetivity
NO In the last7years, have you been involved in the illegal purchase, manulacture, trafficking,
production, transler, shipping, receiving, or saleof any narcotic, depressant, stimulant, hallucinogen, or
cannabis for your own intended profit or that of another?
30. Your Use of Alcohol
http://arisstIeasusarec.armymil:8080/GC/^sp/GcPaiPeiReport.^sp 9/26/2007
(b) (6), (b)
(7)(C)
Manning, Bradley Edward ^ ^ ^ 1 / PEI Report - SF86 SSN: Page 10 of 12
^ 0 . 1 PEI Report - SF86 SSN:
NO In the last7years has your useof alcoholic beverages(such as liquor, beer,wine)resulted in any
aleoholrelated treatment or counseling(such as tor alcohol abuse or alcoholism)? Do not repeat
information reported in EPS^Modulel9(Section21 from the SF86).
31. Your Investigation Record Investigations/Clearances C^ranted
NO Has the United States Government ever ittvestigated your background and/or granted youasecurity
clearance?(If you can^t recall the investigating agency and/or the security clearance received,enter (Y)
cs and lollow instructions in the help text Ibr the fields on the next screen. If you can^t recall whether
you^ve been investigated or cleared, enter (N^.)
32. Your Investigation Record Clearance Actions
NOToyour knowledge have you ever hadaclearance or access authorisation denied, suspended, or
revoked, or have you ever been debarred from government employment? (Note: An administrative
downgrade or termination ofasecurity clearance is notarevocation.)
33.Your Financial Record^^anl^ruptcy
NO In the last7years, have you filedapetition under any chapter of the bankruptcy code (to include
Chapter 13)?
34. Your Financial Record Wage C^arnishments
NO In the last7years, have you had your wages garnished Ibr any reason?
35. Your Financial Record Repossessions
NO In the last7years, have you had any property repossessed Ibr any reason?
36. Your Financial Record Ta^ Lien
NO In the last7years, have you hadalien placed against your property Ibr tailing to pay taxes or other
debts?
37.Your Financial Record Unpaid judgements
http://arisstleasusarecarmy.mil:8080/GC/^sp/GcPaiPeiReport^sp 9/26/2007
(b) (6), (b)
(7)(C)
Manning, Bradley Edward ^^I/PEIReport SF86 SSN: Pagel l of l 2
NO In the last7years, have you had any judgements against you that have not been paid?
38. Your Financial ^delinquencies 180 l^ays
NO In the last7years, have you been overl80 days delinquent on any debt(s)?
39. Your Financial ^delinquencies 90 l^ays
NO Are you currently over 90 days delinquent on any debt(s)?
40. Public Record Civil Court Actions
NO In the last7years, have you beenaparty to any public record civil court actions not listed elsewhere
onthistbrm?
41. Your Association Record l^emhership
NO Have you ever been an officer oramember or madeaconfribution to an organisation dedicated to ^
the violent overthrow ofthe United States Government and which engages in illegal activities to that
end, knowing that the organisation engages in such activities with the specific intent to further such
activities?
42.YourAssociation Record Activities
NO Have you ever knowingly engaged in any acts or activities designed to overthrow the United States
Government by Ibrce?
43.C^eneralRemarl^s
NO Do you have any additional remarks to enter in your application?
C^o Sul^^ect Report
RELATIONSHIP NAME
1. MOTHER
POB: UNITED KINGDOM
http://arisstIeasusarec.armymil:8080/GC/jsp/GcPaiPeiReport^sp 9/26/2007
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)(C)
Manning, Bradley Edward ^^1/PEI Report - SF86 SSN: Page 12 of 12
^ p i / PEI Report - SF86 SSN:
Deceased? NO
Address:
Country of C i t i z e n s h i p : UNITED KINGDOM
http://arisstIeas.usarecarmymil:8080/GC/^sp/GcPaiPeiReportjsp 9/26/2007
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
Standard Form 86 Format
Revised September 1995
U.S. Office of Personnel Management
5 CFR Part 731, 732, and 736
Form approved:
O.M.B. No. 3206-0005
NSN 7540-00-634-4036
86-111
UNITED STATES OF AMERICA
After completing Parts 1 and 2 of this form and any attachments, you should review your answers to all questions to make sure the form is
complete and accurate, and then sign and date the following certification and sign and date the release on Page 10.
Certification That My Answers Are True
My statements on this form, and any attachments to it, are true, complete, and correct to the best of my knowledge and
belief and are made in good faith. 1 understand that a knowing and willful false statement on this form can be punished
by fine or imprisonment or both. (See Section 1001 of title 18, United States Code).
Signature (Sign in ink) Full Name (Type or Print Legibly)
Manni ng, Bradley E
Date Signed
20070926
Social Security Number
(b) (6), (b) (7)(C)
standard Form 86 Format
Revised September 1995
U.S. Office of Personnel Management
5 CFR Parts 731, 732, and 736
Form approved:
O.M.B. No 3206-0005
NSN 7540-00-634-4036
86-111
UNITED STATES OF AMERICA
AUTHORIZATION FOR RELEASE OF MEDICAL INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink.
Instructions for Completing this Release
This is a release for the investigator to ask your health practitioner(s) the three questions below concerning your mental
health consultations. Your signature will allow the practitioner(s) to answer only these questions.
I am seeking assignment to or retention in a position with the Federal government which requires access to classified
national security information or special nuclear information or material. As part of the clearance process, I hereby
authorize the investigator, special agent, or duly accredited representative of the authorized Federal agency conducting
my background investigation, to obtain the following information relating to my mental health consultations:
Does the person under investigation have a condition or treatment that could impair his/her judgement or
reliability, particularly in the context of safeguarding classified national security information or special
nuclear information or material?
If so, please describe the nature of the condition and the extent and duration of the impairment or
treatment.
What is the prognosis?
I understand the information released pursuant to this release is for use by the Federal Government only for purposes
provided in the Standard Form 86 and that it may be redisclosed by the Government only as authorized by law.
Copies of this authorization that show my signature are as valid as the original release signed by me. This
authorization is valid for 1 year from the date signed or upon termination of my affiliation with the Federal Government,
whichever is sooner.
Signature (Sign in ink) Full Name (Type or Print Legibly) Date Signed
t ^ % ^ " l ^
Manni ng, Bradley E 20070926
Other Names Used Social Security Number
Current Address (Street, City) State ZIP Code
Home Telephone Number
(Include Area Code)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C) (b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
Standard Form 86 Format
Revised September 1995
U.S. Office of Personnel Management
5 CFR Part 731, 732, and 736
Form approved:
O.M.B. No. 3206-0005
NSN 7540-00-634-4036
86-111
UNITED STATES OF AMERICA
AUTHORIZATION FOR RELEASE OF INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink.
I Authorize any investigator, special agent, or other duly accredited representative of the authorized Federal agency
conducting my background investigation, to obtain any information relating to my activities from individuals, schools,
residential management agents, employers, criminal justice agencies, credit bureaus, consumer reporting agencies,
collection agencies, retail business establishments, or other sources of information. This information may include, but
is not limited to, my academic, residential, achievement, performance, attendance, disciplinary, employment history,
criminal history record information, and financial and credit information. I authorize the Federal agency conducting my
investigation to disclose the record of my background investigation to the requesting agency for the purpose of making
a determination of suitability or eligibility for a security clearance.
I Understand that, for financial or lending institutions, medical institutions, hospitals, health care professionals, and
other sources of information, a separate specific release will be needed, and 1 may be contacted for such a release at a
later date. Where a separate release is requested for information relating to mental health treatment or counseling, the
release will contain a list of the specific questions, relevant to the job description, which the doctor or therapist will be
asked.
I Further Authorize any investigator, special agent, or other duly accredited representative of the U.S. Office of
Personnel Management, the Federal Bureau of Investigation, the Department of Defense, the Defense Investigative
Service, and any other authorized Federal agency, to request criminal record information about me from criminal justice
agencies for the purpose of determining my eligibility for access to classified information and/or for assignment to, or
retention in, a sensitive National Security position, in accordance with 5 U.S.C. 9101. 1 understand that I may request a
copy of such records as may be available to me under the law.
I Authorize custodians of records and sources of information pertaining to me to release such information upon request
of the investigator, special agent, or other duly accredited representative of any Federal agency authorized above
regardless of any previous agreement to the contrary.
I Understand that the information released by records custodians and sources of information is for official use by the
Federal Government only for the purposes provided in this Standard Form 86, and that it may be redisclosed by the
Government only as authorized by law.
Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization
is valid for five (5) years from the date signed or upon termination of my affiliation with the Federal Government,
whichever is sooner. Read, sign and date the release on the next page if you answered "Yes" to the question 21.
Signature (Sign in ink) Full Name (Type or Print Legibly) Date Signed
Manni ng, Bradley E
20070926
Other Names Used
Social Security Number
Current Address (Street, City) State ZIP Code
Home Telephone Number
(Include Area Code)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C) (b) (6), (b) (7)(C)
UNITED STATES OF AMERICA
CREDIT CHECK AUTHORIZATION
Fair Credit Reporting Act of 1970, as amended
PLEASE TAKE NOTICE THAT ONE OR MORE CONSUMER CREDIT REPORTS MAY BE
OBTAINED FOR EMPLOYMENT PURPOSES PURSUANT TO THE FAIR CREDIT REPORTING
ACT, AS AMENDED, 15 U. S. C, 1681, ET SEQ. SHOULD A DECISION TO TAKE ANY
ADVERSE ACTION AGAINST YOU BE MADE, BASED EITHER IN WHOLE OR IN PART ON THE
CONSUMER CREDIT REPORT, THE CONSUMER REPORTING AGENCY THAT PROVIDED
THE REPORT PLAYED NO ROLE IN THE AGENCY'S DECISION TO TAKE SUCH ADVERSE
ACTION.
Information provided by you on this form will be furnished to the consumer reporting agency in order to obtain
information in connection with an investigation to determine your (1) fitness for Federal employment, (2) clearance to
perform contractual service for the Federal Government, and/or (3) security clearance or access. The information
obtained may be redisclosed to other Federal agencies for the above purposes and in fulfillment of official
responsibilities to the extent that such disclosure is permitted by law.
I hereby authorize the United States Army to obtain such report(s) from any consumer/credit reporting
agency for employment purposes.
Manning. Bradley E (Print Name) SSN)
(Signature) ^0070926
(Date)
(b) (6), (b) (7)(C)
TMENT ELIGIBILITY
(For use of this form see USAREC Reg 601-96)
APPLICANT NAME (LAST. FIRST, Ml):
Manning, Bradley E
APPLICANT SSN:
PRIVACY ACT STATEMENT
AUTHORITY:
PRINCIPAL
PURPOSE:
Title 10, United States Code, Sec-
tions 504, 508, and 12102.
To determine eligibility of a prospec-
tive enlistee in the United States
Army.
ROUTINE USES: Information collected on this form will be used to determine
eligibility for enlistment into the United States Army. It may be
released to law enforcement agencies engaged in the investiga-
tion or prosecution of a criminal act or the enforcement or imple-
mentation of a statute, rule, regulation, or order, to any component
of the Department of Justice for the purpose of representing DOD.
DISCLOSURE: Voluntary; however, failure to answer the question may result in
refusal of enlistment into the United States Army.
The data are for OFFICIAL USE ONLY and will be maintained and used in strict confidence in accordance with Federal law and regulations.
Making a knowing and willful false statement on this form may be punishable by fine or imprisonment or both. All information provided by you
which possibly may reflect adversely on your past conduct and performance, may have an adverse impact on you in your military career in
situations such as consideration for special assignment, security clearances, court marital, or administrative proceedings, etc.
All YES answers must be explained cximpletely in the remarks section. If the answers include no additional information than
what is listed on the SF 86 (Questionnaire for National Security Positions), write "See SF 86 Item # " in the space for
"NAME AND LOCATION OF UK\N ENFORCEMENT AGENCY."
YES NO
1.
Have you ever been arrested, charged, cited, held, or detained in any way by any law enforcement agency (to include
Juvenile Authorities, Polit Officers, Sheriff, Department of Natural Resources, Fish and Game Wardens, military police,
etc.,) regardless of disposition (whether the case resulted in no charges filed, fine, probation, dismissal, or other
disposition)? (This includes traffic tickets.)
X
DATE OF
OFFENSE
NAME OF OFFENSE NAME AND LOCATION OF LAW
ENFORCEMENT AGENCY
NAME AND LOCATION
OF COURT
DISPOSITION OF CASE
Have you been told by anyone (judge, lawyer, any Army personnel, family, friends, etc.,) that you do not have to list a
charge because the charge(s) were dropped, dismissed, not filed, expunged, stricken from the record or were juvenile related?
Have you been subject to any type of proceedings under the Uniform Code of Military Justice? (This includes courts
martial, Nonjudicial Punishment, Captain's Mast, and Article 15's.) X
Have you ever been charged with any crime that has not been listed in any of the above questions or asked on the SF
86 (Questionnaire for National Security Positions)?
REMARKS
Use the space below to explain all yes answers that have not been explained in detail on the SF 86 (Questionnaire for National
TYPED NAME OF APPLICANT
(LAST,FIRST,MI) APPLICANT SIGNATURE
-y
DATE
(YYYYMMDD)
Manning, Bradley E
20070926
TYPED NAME AND RANK OF RECRUITER
(LAST,FIRST,MI) RECRUITER SIGNATURE
DATE
(YYYYMMDD)
Jones, Mark A
20070926
USAREC Fm 1104-R-E, Rev 1 Apr 97 (Previous editions are obsol ete) VI .00
(b) (6), (b) (7)(C)
APPLICANT NAME (LAST, FIRST, Ml): APPLI CANT SSN:
Manning, Bradley E
USAREC FORM 1104 - REMARKS CONTINUATION
USAREC FORM 1104 Remarks Continuation Page 2
(b) (6), (b) (7)(C)
DEPARTMENT OF THE ARMY
United States Army Intelhgence Center and Fort Huachuca
Fort Huachuca, Arizona 85613-6000
ORDERS 193-00013
11 July 2008
MANNING BRADLEY EDWARD PV2 USAICFH CO D (STU) 305 (W1E818)
United States Army Intelligence Center and Fort Huachuca, Fort Huachuca, AZ 85613-6000
You wi l l proceed on permanent change of station as shown.
Assigned to: 2^ 10 DIV REPL DET (WBDAAB) FT DRUM NY 13602
Reporting date: 14 SEPTEMBER 2008
Additional instructions: (a) Dependents: NO
(b) I f you ship personal property at Government expense, contact the Transportation Office at your
new duty station immediately after arrival to arrange for delivery.
(c) You are required to report to the Family Housing/Housing Referral Office serving your new
duty station before you make housing arrangements for renting, leasing, or purchasing any
off-post housing.
(d) Soldier is authorized up to 14 days permissive temporary duty to participate in the
Hometown Recruiter Assistance Program i f indicated on an approved DA 31 signed by a LTC or
above. . ,
(e) You are responsible for reporting to your next duty station/school in satisfactory physical
condition, able to pass the Army Physical Fitness Test and meet weight standards.
(f) You will submit a travel voucher for this travel to the custodian of your finance records within
15 days after completion of travel.
(g) Report to building 61820, Davis Hall, room 149 (back entrance), with 15 copies of your PCS
orders within 5 days of receipt to aixange for transportation appointments.
(h) Leave data as stated on Department of the Army Form 31.
(i) Al l Soldiers being reassigned are required to clear through the Housing Office. Soldiers residing
in Government quarters are required to report to the Termination Section,
Housing Division, Building 1415, Rhea Street, within, five days after receipt of this order.
(j) You are to contact commander of gaining organization not later than 10 days after receipt of '
orders i f any special requirements exist for medical, dental, or educational facilities at next duty
station.
(k) You are required to forward a DA form 3955 (change of address card) with your new home
address to your PERSCOM assignment manager within 30 days of arrival at your new duty.
(1) Travel by privately owned conveyance is authorized from Ft. Huachuca, AZ to new duty station,
(m) Early report date is authorized.
(n) Losing Command/Soldier should ensure transportation arrangements are made to final
destination of Watertown Int'l Airport, Watertown, NY.
(o) When a CTO is available but the traveler arranges transportation through a non contract travel
agent or common carrier direct purchase, reimbursement is limited to the amount the Government
would have paid i f the arrangements had been made directly through a CTO.
You will start in-processing on:
At 1300 report to Clark Hal l
Room Al-39
(b) (6), (b)
(7)(C)
1
United States Army Intelligence Center and Fort Huachuca
ORDERS 193-00013 . 11 My 2008
(p) In the event you need emergency assistance (leave extension, change in port call, family travel problems,
etc) you should contact the Army travelers' assistance center at (800) 582-5552. Do not contact your losing or
gaining unit.
FOR ARMY USE:
Auth: N/A
MDC: 1XE8 Pers con no: 99200809N090
Enl/REENLB indie: NA PEBD: NA
PPD: NA Asgd to mgt dsg: 35F1O00YY
PMOS/SSI: 35F1O00YY Con specialty: NA
Proj specialty: NA Pers scty code: NA
Format; 410
FOR THE COMMANDER:
S ^ l ^ ^ ^
DISTRIBUTION:
IMSW-HUA-HRMR (1)
CDR, USAICFH CO D (STU) 305 (1)
CDR, USAICFH CO D (STU) 305 PAC (1)
CDR, 2^'^ 10 DIV REPL DET FT DRUM NY 13602 (1)
PV2 MANNING BRADLEY EDWARD (I)
United States Army Inielligence Center and Fort Huachuca
ORDERS 193-00013 11 July 2008
(p) In the event you need emergency assistance (leave extension, change in port call, family travel problems,
etc) you should contact the Army travelers' assistance center at (800) 582-5552. Do not contact your losing or
gaining unit.
FOR ARMY USE:
Auth: N/A
MDC: 1XE8 Pers con no: 99200809N090
Enl/REENLB indie: NA PEBD: NA
PPD: NA Asgdtomgtdsg: 35F1O00YY
PMOS/SSI: 35F1O00YY Con specialty: NA
Proj specialty: NA Pers scty code: NA
Format: 410
FOR THE COMMANDER:
t \ f AMEL4AT
adjutant General
% ^
DISTRIBUTION: v O G n ^ T l W ^
IMSW-HUA-HRMR (1) ^ U Ur^., > -
CDR, USAICFH CO D (STU) 305 (1)
CDR, USAICFH COD (STU) 305 PAC (1) -
CDR, 2^^ 10 DIV REPL DET FT DRUM NY 13602 (1)
PV2 MANNING BRADLEY EDWARD (1)
RECOROOFEMER^E^CYOATA
PRIVACY ACT STATEMENT
AUTI^ORITY: 5USC55^ 10USC855. 1475 t o14^0^nd^771. 3^USC1570. 44 USC3101. andFO53^7( SSN)
PRINCIPAL PURPOSES: This form is used by military personnel and Oepartment of Oefenset^ivilian and contractor personnel. t:ollectively referred to
a5 civilians when applicable For mi l i t ary personnel , it is used to designate beneficiaries for certain benefits in the event of the Service member s
death It is al soagui de for disposition of that members pay and allowances if captured.missing or interned It also shows names and addresses of
the person(s) the Service member desires to be notified in case of emergency or death For ci vi l i an personnel it is used to expedite the nt^tification
process in the event of an emergency and^or the death of the member The purpose of soliciting the SSN is to provide positive identification All items
may not be applicable
ROUTINEUSES: None
DISCLOSURE: Voluntary however.failure to provide accurate personal identifier information and other solicited information will delay notification and
the processing of benefits to designated beneficiaries if applicable.
INSTRUCTIONS TO SERVICE H^E^^ER
This extremely important form is to be used by you to show the names and
addressesof yourspouse. chi l dren. parent s. and any other person(s)you
would like notified if ^out ^ecomeacasual t y (other family members or fiant^e).
and. to designate beneficiaries for certain benefits if you die ITISYOUF^
RESPONSIBILITY tt^ keep your Record of Emergency Oata up to date to show
your desires as to beneficiaries to receive certain death payments, and to
show changes in your family or other personnel listed.tor exampl e. asaresul t
ofmarri age civil court action death or address change
INSTRUCTIONS TO CIVILIANS
This extremely important form is to be used by you to show the
names and addresses of your spouse, children, parents and any
other person(s) you would like notified if you becomeacasual ty
Not every item on this form is applicable to you This f orm is tised
by t h^Oepar t ment of O^f en^e(OoO) t o expedi t e not i f i cat i on in
f heoas eof emer ^ ent ^ l e^ or de^ t h. It does not haveal egai impact
on other forms you may have completed with the OoO or your
employer
IMPORTANT: Thi s f or m i s di vi ded i nto t wo sect i ons: Secti on 1 - Emergency Cont act I nf ormat i on and Secti on 2 - Benef i t s Related
I nf ormat i on. READ THE INSTRUCTIONS ON PAGES 3 AND 4 BEFORE COMPLETING THIS FORM.
SECTION 1 - EMERGENCY CONTACT INFORMATION
1. NAME (Las;. F/rs( Middleinitial)
M ANIM ING. BRADLEY. E
2. SSN
3a. SERVICE/CIVILIAN CATEGORY
^ ARMY NAVY MARINE CORPS AIR FORCE | i DoD CIVILIAN ^ CONTRACTOR
b. REPORTING UNIT CODE/DUTY STATION
WBDAAB
4a. SPOUSE NAME (If applicable) (Last. First, Middle Initial)
X
SINGLE DIVORCED WIDOWED
b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER
CHILDREN
NAME (Last. First Middle Initial)
b. RELATIONSHIP
c. DATE OF BIRTH
(YYYYMMDD)
d. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER
6a. FATHER NAME (Last. First. Middle Initial)
MANNING. BRIAN. E
b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER
7a. MOTHER NAME (Last. First. Middle Initial)
MANNING. SUSAN. M
b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER
8a. DO NOT NOTIFY DUE TO ILL HEALTH b. NOTIFY INSTEAD
9a. DESIGNATED PERSON(S) (Military only)
b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER
10. CONTRACTING AGENCY AND TELEPHONE NUMBER (Contractors only)
DD FORM 93, JAN 2008
PREVIOUS EDITION IS OBSOLETE
APD PE vi DOES
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
SECTI 0N2- eENEFI TS RELATED INFORMATION
11a. BENEFICIARY(IES) FOR DEATH GRATUITY
(Military only)
MANNING, BRIAN. E
b. RELATIONSHIP
FATHER
c. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER
d. PERCENTAGE
100
12a. BENEFICIARY(IES) FOR UNPAID PAY/ALLOWANCES
(Military only) NAME AND RELATIONSHIP
b. ADDRESS (fncfude ZiP Code) AND TELEPHONE NUMBER c. PERCENTAGE
100
13a. PERSON AUTHORIZED TO DIRECT DISPOSITION (PADD)
(Military only) NAME AND RELATIONSHIP
b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER
14. CONTINUATION/REMARKS
15. SIGNATURE
or grade if a/iplic,
BER/CIVILIAN (Include rank, rate,
DD FORM 93 ( B X C K ) , JAN 2008
" )
16. SIGNATURE OF WITNESS (Include rank rate, or grade
as apprdfjriate)
^' . / ^' Y- ^
17. DATE SIGNED
(YYYYMMDDl
'^et%c<\ c\
APD PE vl DOES
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
SERVICEMEN'S GROUP LH^NSURANCE ELECTION AND CEBfitFICATE
^p7|
Page 1 of
Please read the i nstructi ons before compl et i ng thi s f orm
Servicemembers' Group Life Insurance Election and Certificate
Use this form to (check all that apply)
^ Name or update your beneficiary
Reduce the amount of your insurance coverage
Decline insurance coverage
I mport ant : This form, is for use by Active Duty and
Reserve members. This form does not apply to and
cannot be used for any other Government Life
Insurance.
Last name
MANNING
First name
BRADLEY
Middle name
EDWARD
Suf Rank, title or grade
PV2
Number
Branch of Service(Do not abbreviate)
Army
Current Duty Location
WBDAAB
Amount of Insurance
By law. you are automatically insured for $400,000. If you want $400,000 of i nsurance, skip to Beneficiary(ies) and Payment Options.
If you want l ess t han $400,000 of insurance, please check the appropriate block below and write the amount desired and your
initials.Coverage is available in increments of $50,000. If you do not want any i nsurance' , check the appropriate block below and write (in
your own handwriting). "I do not want insurance at this time."
Decl i ni ng SGLI coverage also cancels all fami l y coverage under the SGLI program.
I want coverage in the amount of $ Your initials
(Write "I do not want Insurance at this time.")
Note; Reduced or refused insurance can only be restored by completing form SGLV 8285 with proof of good health and compliance with other
requirements. Reduced or refused insurance will also affect the amount of VGLI you can convert to upon separation from service.
Beneficiary(ies) and Payment Options
I designate the following beneficiary(ies) to receive payment of my insurance proceeds I understand that the principal beneficiary(ies) will receive
payment upon my death. If all principal beneficiaries predecease me. the insurant:^ will be paid to the contingent beneficiary(ies)
Complete Name (first, middle, last) and Address of each
beneficiary
Pri nci pal
Cont i ngent
Social Security
Number
(If known)
Relationship to
you
FATHER
Share to each
beneficiary
(Use %, S amounts
or fractions)
100%
Payment Option
(Lump sum or 35
equal monthly
payments)
LUMP SUM
I HAVE READ AND UNDERSTAND the i nstructi ons on pages 2 and 3 of t hi s f or m. I ALSO UNDERSTAND t hat :
. This form cancels any prior beneficiary or payment instructions.
. The proceeds will be paid to beneficiaries as stated in #6 on page 3 of this fonn. unless otherwise stated above,
. If I have legal questions about this form, I may consult with a military attorney al no expense to me,
. I cannot have combined SGLLaod VGLI coverages at the sarne time for more than $400,000.
^
SIGN HERE IN INK
/
(Your Signature. Do not print.
J.
Date: 20080902^
Do not write-Hr<pace bel ow. For offi ci al use o n l ~
WITNESSED AND RECHVED BY: RANK, TITLE OR GRADE
:x-
ORGANIZATION DATE RECEIVED
. 3 L 6 ^ C , C Q
SGLV-8286 (E)
https:,//emilpo.ahis.army.mil/loadSgliReport.do?disableToken=l 9/2/2008
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)(C)
D
For use of this'
#
; h l ^ ^ . s
MENT CYCLE SUPPORT (DCS) CHECKLIS
see Army Directive 2007-02; the proponent agency is DCS, G-1
m
DATA REQUIRED BY THE PRIVACY ACT OF 1974
AUTHORI TY 10 USC Section 3013, Secretary of the Army; Department of the Arniy Deployment Cycle Support
( SSN) .
PURPOSE: To provide a standardized means to evaluate readiness posture and validate military and non-military personnel for deployment,
ROUTI NE USES: The "Blanket Routine Uses" set forth at the beginning of the Army compilation of systems of records notice apply.
DI SCL OSURE: Voluntary. However, failure to update and confirm Information is correct may impede processing time and deployability status.
( DCS) Directive; and EO 9397
The Deployment Cycle Support Checklist Is filed In the Deployment Packet to complete the action.
A copy remains at the losing organization .
'ATE ( y Y Y WM D D )
S^wO^G^I
2. NAME (Last, First, toddle)
OOt^iJIhtG, DRML<-H\ EP^ftfi P
3. SSN
4. SERVICE AFFILIATION
USA
)g
USN
USAF
USMC
USCG
PHS
NOAA
5. COMPONENT
'^'ACTIVE
NON-MILITARY
GUARD
RESERVE
6. STATUS
TPU AGR
IRR RET
IMA NG10
n
NG32
7. PAY PLAN/GRADE
&- ?
8. MOBILIZATION
DEPLOYMENT CENTER
9. NON-MILITARY STATUS
DOD
DAC
CONTRACTOR
RED GROSS
AAFES
OTHER (Specify)
10. TRAVEL STATUS
a. UNO" ORDER
b. INDIVIDUAL
11. DATE OF BIRTH (YYYYMMDD)
12. ARMY COMMANDS
PO^^CO^
13. DATE ARRIVED IN THEATER
(YYYYMMDD)
^ CITIZENSHIP COUNTRY
UNiT:.D ^ f t r t $
15. REDEPLOYMENT DATE (YYYYMMDD) 16. REFRADDATE (YYYYMMDD)
( i s ^ ARENT UIC
W^ QAAA
[20. lUNIT DSN PHONE NUMBER
^ n.qig^<\ooi
i DEPLOYMENT COUNTRY
r pAQ
19.}DUIC
WBD AC^A
21. CONUS REPLACEMENT CENTER
22. STATUS OF EACH DCS STAGE and COMMANDER'S VALIDATION MEMO (C= Completed; NC = Not Compbted)
a. TRAIN-UP/PREP
] C ' NC
b. MOBILIZATION
C NC
c. DEPLOYMENT
C NC
d.' EMPLOYMENT
C NC
e. REDEPLOYMENT
\ \ C I NC
f. POST-DEPLOYMENT
I C I 1 NC
RECONSTITUTION
C NCO
h. CDR VALIDATION MEMO
C
NC
SECTI ON I - DCS VAL I DAT I ON
Par t A - A c c u r a c y St at ement : l understand I am certified for reconstitution and, to the best of my knowledge, all information contained in this
document is correct and current.
1, SIGI
Par t B - P f r S f t t n e Lea
2. RANK
PH^C
3. TfTLE
d e r / i mme d l a t e Su p e r v i s o r ' s ' AUt her f l t Cal l Oi r ' ^mave authentlcaied'the information coritalneJIh this checklist as correct and
current.
4 PRINTED NAME (Supervisor) 5, RANK 6. TITLE 7. SIGNATURE
8. DATE (YYYYMMDD)
9, UNIT 10. ADDRESS
11. PHONE NUMBER 12. E-MAIL ADDRESS 13. DSN 14. FAX PHONE NUMBER
Part C - Commander's Acknowledgment: (Commanders may approve an individual for reconstitution based on the certifying ofTicial's
recommendation, criticality, and mission needs, unless othenn/ise indicated.) i acknowledge the checklist findings.
15. PRINTED NAME (CDR or AG) 17. TITLE 18. SIGNATURE
19, DATE (YYYYMMDD)
20, UNIT 21, ADDRESS
22 PHONE NUMBER 23. E-MAIL ADDRESS 24. DSN NUMBER 25. FAX NUMBER
Par t D - DCS Va l i d a t i o n : AL L DE P L OY ME NT CY CL E S UP P ORT requirements are updated and all DCS requirements completed.
E
B
R
e
Q
o X
M
P
C
1
V
e
r
i
f
i
N
O
I
s
Q 1 - o:
d
d
r
e
s
;
u
s
e
S
S
I
Q
i
c
y
D
a
S
E
C
o
=
L
C
O
t
P
h
o
t
<
u
s
e
S
S
I
E
e
r
g
e
n
5
<
e
L
a
s
l
i
n
g
S
p
o
C
o
e
r
g
e
n
Y
R
M
T
e
L
a
s
E
>
O
Z
s
tn UJ I CC Q
UJ
U.
CQ
CO
is
o
Q:
o
o
LU
Q
a
UJ
I -
(O
UJ
Q i
u_ e
I 1
W
u oo:
%
Is
i l
5 g
Js
m w
Q
m
l
^g:^^^
oooo
L L L Z L L ^
mmmu )
to f i Ci V
UJUJUJ
z z z
z z z
. 0 0 0
Gwuj uj
tfOLOLOLLULU
zooomm
<zzz=
m%^^
H O O O r f r f
z z z z g g
0 0 0 0 0 0 :
l l . U . l - 1 - l - H I -
inininin
3 = > 3 3
a i K K K g
siSSSSi
iiis2|
1 - 1 - 1 - 1 - 1 - 1 - =
in
OQL
OI U J
O X E
i i i i
03 CD T- t - ^ O ^
g g g g g s s
S
D. 3
O
o o
fefe
0 . 0 . 0 . Q.CLQ.CLD_Q_CLQ_Q_Q.CLQ.Q.CLa.CLQ_Q.Q_Q.D.
^ S S S S S S S S S - B S S S S S - ^ ' u i ' ^ ' ' ^ - ^
' 5 i r 5 Si ^ 5 o ) 0 ? ^ ? g ? 5 ^ i HSi ^ Sa 5 0 ' i - ^ o 5 ^
(b)
(6)
,
(b)
(7)
(C)
(b)
(6),
(b)
(7)
(C)
PART -1
2. NAME (Lasf, First, Middle Initial)
MANNING, BRADLEY E
3 SSN 4. RANK
PFC
5. DATE
15 JUL 09
REQUEST AND AUTHORITY FOR LEAVE
This form is subject to the Privacy Act of 1974. For use of this form, see AR 600-8-10.
1. CONTROL NUMBER
6. LEAVE ADDRESS (Street, City, State, ZIP Code and
Phone No.)
7. TYPE OF LEAVE
ORDINARY
PERMISSIVE TDY
PASS
EMERGENCY
OTHER
ORGN, STATION, AND PHONE NO.
HHC2BCT, 10MTN DIV
BLDG10200
FORT DRUM, NY 13602
315.774.2505
NUMBER DAYS LEAVE 10. DATES
a. ACCRUED
N/A
b. REQUESTED
N/A
c. ADVANCED
N/A
d. EXCESS
N/A
a. FROM
19 JUL 09
b. TO
22 JUL 09
D VTLE/SF 1 7"
^U/
11. SIGNATURE OF REQUESTOR 12. SUPERVISOR RECOMMENDATION/SIGNATURE
0 APPR^/ AL DISAPPROVAL
13. SIGNAAUME AND
APPROVr aGUT^
M."
DEPARTURE
a. DATE b. TIME c. NAME/TITLE/SIGNATURE OF DEPARTURE AUTHORITY
15. DEPARTURE
a. NUMBER DAYS b. DATE APPROVED c. NAME/TITLE/SIGNATURE OF APPROVAL AUTHORITY
16.
DEPARTURE
a. DATE b. TIME c. NAME/TITLE/SIGNATURE OF RETURN AUTHORITY
17. REMARKS
Chargeable leave is from to
PART II - EMERGENCY LEAVE TRANSPORTATION AND TRAVEL
18. You are authorized to proceed on official travel in connection with emergency leave and upon completion of your leave and travel will
return to home station (or location) designated by military orders. You are directed to report to the Aerial Port of Embarkation (APOE) for
onward movement to the authorized international airport designated in your travel documents. All additional travel is chargeable to leave.
Do not depart the installation without reservations or tickets for authorized space required transportation. File a no-pay travel voucher with
a copy of your travel documents or boarding pass within 5 working days after your return. Submit request for leave extensions to your
commander. The American Red Cross can assist you in notifying your commander of your request for extension of leave.
19. INSTRUCTIONS FOR SCHEDULING RETURN TRANSPORTATION:
For return military travel reservations in CONUS call the MAC Passenger Reservation Center (PRC):
Shni i l r l vni i r pni i i r p ot hpr aggi gf anr^p r ai l P A P
20. DEPARTED UNIT 21. ARRIVED APOD 22. ARRIVED APOE (retum only) 23 ARRIVED HOME UNIT
24.
PART III - DEPENDENT TRAVEL AUTHORIZATION
25, Q (Space available or required cash reimbursable) D ONEWAY D ROUND TRIP
(Space required) TRANSPORTATION AUTHORIZED FOR DEPENDENTS LISTED IN BLOCK NO. 25
DEPENDENT INFORMATION
a. DEPENDENTS (Lasf name, firsf, Ml) b. RELATIONSHIP c. DATES OF BIRTH (Children) d. PASSPORT NUMBER
PART IV - AUTHENTICATION FOR TRAVEL AUTHORIZATION
26. DESIGNATION AND LOCATION OF HEADQUARTERS 27. ACCOUNTING CITATION
28. DATE ISSUED 29. TRAVEL ORDER NUMBER 30. ORDER AUTHORIZING OFFICIAL (Title and signature) OR AUTHENTICATION
DA FORM 31, SEP 93
EDITION OF 1 AUG 75 IS OBSOLETE ORIGINAL 1
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
DEPARTMENT OF THE ARMY
United States Array Intelligence Center and Fort Huachuca
Fort Huachuca, Arizona 8 5 613 -6000
ORDERS 193-00013 11 July 2008
MANNI NG BRADLEY EDWARD PV2 USAICFH CO D (STU) 305 (W1E8I8) - -
United States Army Intelligence Center and Fort Huachuca, Fort Huachuca, AZ 85613-6000
You wi l l proceed on permanent change of station as shown.
Assigned to: 2^ 10 DI V REPL DET (WBDAAB) FT DRUM NY 13602
Reporting date: 14 SEPTEMBER 2008
Additional instructions: (a) Dependents: NO
(b) I f you ship personal property at Government expense, contact the Transportation Office at your
new duty station iinmediately after arrival to arrange for delivery.
(c) You are required to report to the Family Housing/Housing Referral Office serving your new
duty station before you make housing arrangements for renting, leasing, or purchasing any
off-post housing.
(d) Soldier is authorized up to 14 days permissive temporary duty to participate in the
Hometown Recruiter Assistance Program i f indicated on an approved DA 31 signed by a LTC or
above. ^
(e) You are responsible for reporting to your next duty station/school in satisfactory physical
condition, able to pass the Army Physical Fitness Test and meet weight standards.
(f) You will submit a travel voucher for this travel to the custodian of your finance records within
15 days after completion of travel.
(g) Report to building 61820, Davis Hall, room 149 (back entrance), with 15 copies of your PCS
orders within 5 days of receipt to arrange for transportation appointments,
(h) Leave data as stated on Department of the Army Form 31.
(i) Al l Soldiers being reassigned are required to clear through the Housing Offline. Soldiers residing
in Goverrunent quarters are required to report to the Termination Section,
Housing Division, Building 1415, Rhea Street, withiri.five days after receipt of this order.
(j) You are to contact commander of gaining organization not later than 10 days after receipt of '
orders i f any special requirements exist for medical, dental, or educational facilities at next duty
station.
(k) You are required to forward a DA form 3955 (change of address card) with your new home
address to your PERSCOM assignment manager within 30 days of arrival at your new duty.
(1) Travel by privately owned conveyance is authorized from Ft. Huachuca, AZ to new duty station,
(m) Early report date is authorized.
(n) Losing Command/Soldier should ensure transportation arrangements are made to final
destination of Watertown Int'l Airport, Watertown, NY.
(o) When a CTO is available but the traveler arranges transportation through a non contract travel
agent or common carrier direct purchase, reimbursement is limited to the amount the Government
would have paid i f the arrangements had been made directly through a CTO.
You ^Hl start in-processmg on:
At 1300 report to Cl ark Hal l
Room Al -39
(b) (6), (b)
(7)(C)
AFDR-BBA-HC ^ ^ 3 JULY 2008
SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).
HHC BDE, 2D BCT
Personal Data Sheet
Name: (Last, First, Middle) 1 ^ fi^W N) TKl Cr ^ B^ ^ OL f * ^ . ^
SSN: Grade: f . QL DOR: 3. APf i 0 5
BASD: ETS: I OCT I I
DOB: i n p e c S H- Race: CWCMIA^T^ Blood Type: _OPOS
Religion: ^ Qf ^ Ai J Ct ^THoLl C Marital Status: STt-^CrL^ Separate Rations:
Primary MOS: 3 S F " Secondary MOS:
ASI: / / / / / /
PBED: DEROS:
Air Assault: Airborne: Ranger: BIB: CIB: GT Score: l <33
Combat Life Saver@N (date: H ^ T f ^ B ^ ( ^ SG^ GED CollegeN (# C r e d i t s : ^ )
Colleage Semister hrs: College Degree Y / Q Degree:
Security Clearance: Tsj^CX" / Army Knowledge Online Account: t'CM. fn^>f>fS\00^(5^ J
type status account a d d r ^
Promotable Y/N Sequence Number:
ACU/T: ACU/B: XS\ ( S Hat: 1 ' / ^ Boot: ^ k Glove: ^
o
H e i g h t : W e i g h t : jSkO Eye Color: BLUj Hair Color: QLW^Dt Gl asses^N Inserts
(S/N
Place of Birth: OKL^MCV^A c m . O K l Home of Record: ^ o T a ^ A ( ^
Local Address:
Street: City:
Zip Code: Home Phone #:
Cell Phone #: Beeper #:
10
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
AFDR-BBA-HC ^ ^ 3 JULY 2008
SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).
HHC BDE Company PersongI Data Sheet cont.
Next of Kin (parents and/or grandparents)
Mother
Name: S u f A N YVK^NKjlK^Q
Street: City:
State: Zip Code:
Area Code and Phone #:
Area Code and Cell #:
Father
Name: 9 f t . Xf i U SOwAd P m A w w l WO ^
Street: City:
State: Zip Code:
Area CocJe and Phone #:
Area Code and Cell #:
Wife
Name: k)/^A
Children
Names and DOB:
/V/ A
Area Code and Home #:
Area Code and Cell #:
11
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
AFDR-BBA-HC ^ 3 JULY 2008
SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).
HHC BDE Company Personal Data Sheet cont.
Awards/Decorations:
Military Schools and Dates graduated: ^.LJS> C Pg-Vp (D^C^
Past Duty Assignments:
Date of last
APFT: 1 J v ; u O
APFT Score:
QL^H-
Weapon Qualification -
Weapon Type: A@ OO- l b Score/Rating: 31 / SO Date:^^) FSB
Weapon Type: Score/Rating: Date:
SRM: Score/Rating: Date:
SRM: Score/Rating: Date:
POV Information -
Make:
Color:
License Plate #:
Post Decal #:
Drivers Liscense #:_
Insurance CO:
Model:
Year: _
State:
Expiration:
state:
Policy*:. Expiration Date:
12
^ AFDRBBA-HC ^ ^ 3JULY2008
SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).
HHC BDE Company Personal Data Sheet cont.
^ Military Licenses^
Equipment: Date Issued:
Equipment: Date Issued:
Equipment: Date Issued:
Equipment: Date Issued:
Equipment: Date Issued:
Equipment: Date Issued:
Equipment: Date Issued:
Equipment: Date Issued:
Equipment: Date Issued:
Equipment: Date Issued:
13
DEPARTMENT OF THE ARMY
HEADQUARTERS AND HEADQUARTERS
2D BCT, 10^" MOUNTAIN DIVISION (LI)
FORT DRUM, NEW YORK 13602
AFDR-BBA-HC 3 JULY 2008
MEMORANDUM FOR All 2D BCT, HHC BDE Company Personnel
SUBJECT: Commander's Policy Letter # 5 Personnel In-processing Standard Operating
Procedures (SOP).
1. Purpose. Identify what is required for the reception and in-processing of all
incoming soldiers.
2. Basic Philosophy. Our soldiers are a valuable asset. One of the best things that we
can do to set them up for success is to give them plenty of time initially to take care of
anything which they need to update, settle, or fix. We will give them all the needed
"authorized sham time" up front even if this causes them to miss important training
events. We may have to send them to qualify or briefings, but after that they will
continue getting settled. The bottom line is that we will give them plenty of time (up to
two weeks) up front and then we will work them long and hard for several years after
that.
3. Mandatory requirements before any soldier is allowed to perform any duties in the
company are as follows.
a. Complete all in-processing for the installation, BN, and the company.
b. Initial counseling from the chain of command.
c. Family settled in a house, with all household goods, and provided time to get
everything unpacked.
d. All equipment issued and set-up IAW (In Accordance With) current SOPs.
e. Provided an opportunity to review and understand all policies and SOPs.
4. Responsibilities,
a. 1SG
(1) Manage the distribution and allocation of enlisted personnel within HHC BDE,
Assign incoming soldiers to a section.
(2) Ensure the incoming soldier meets with the commander within the first five
working days.
(3) Initial Brief on all off limits areas, NY State DUI/BWI, Passes, Co Area,
Discipline, Barracks.
AFDR-BBA-HC ^ ^ 3JULY2008
SUBJECT: Personnel In processing Standard Operating Procedures (SOP).
(4)NCO' swi l l bebri efedonCO,BNSDNCOandaddedtoDA-^
b PSO^ Section Sergeants
(^)Manage the distribution and allocation of enlisted personnel within their platoons
Section Assign incoming soldierstoadutyposition
(2) Ensuretheincomingsoldiermeetswiththecommanderwithinthefirstfive
working days
(3) Assign the soldierabarracks room if he is single or unaccompanied
Oeographicalbachelorswillberequiredtofindaplaceoffpost
(4) Ensurethesoldierhasthebasicnecessitiesforduty l^inen, shaving kit, proper
uniforms,etc
(5) AdministeradiagnosticAPFT to thesoldierandconductaWeighin'within the
first30daysofassignmenttothecompany Ifthiswasconductedatreplacementthisis
acceptable
(^) Inspect the soldier'sPO^,IAW applicable regulations,within the first week of
assignment File inspection results in the soldier'scounseling packet
c. Section Leader, Within the first five working days of assignment, instruct the
soldier on basic section tactical SOPs (The soldier'sposition in different tactical
movementformations, squad lineardangerarea techniques, hand and arm signal
SOPs,etc ) Execute afterduty hours,if required,to meet five day standard.
d Squad l^eaders
(^)Withinthefirsttwodaysofasoldier'sassignmentto HHC BDE, the squad
leaderwillinventorythesoldier'sTA-50issuefromCIFandallotherOrganizational
Clothing and Individual Equipment(OCIE) Ensurethatallequipmentthesoldiersigned
for is present. Within the first five days,the squad leader will check al l TA50 for
appropriate markings IAW Co SOP (Name tapes, ^cat eyes', etc )
(2) Issue the soldier an updated alert roster.
(3) Withinthe firstthreedutydaysof assignment, the newsoldier'ssquad leader
willconducttheinitialcounselingofthesoldier^erifyinthecounselingthatthesoldier
has read and fully understands the Company policy letters.
3 HHC BOECompanyinprocessing packet confainsthe following:
a Packet Cover Sheet
b Personal Data Sheet
c Supply In processing Sheet
d. Initial Counseling Checklist
AFDR-BBA-HC ^ ^ 3JULY2008
SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).
4 Coordinating Instructions
a. New soldiers will report immediately to the^SO'soffice The Company
Commanderwillnormallyspeakwith incoming soldiers immediafelyfollowingthe^SO,
but certainly before five working days.
b Anew soldier'sfirst line supervisor(normally his squad leader) will escort him
through the inprocessing stepstoensurethathecompleteseach item on the in-
processing checklist
c Packetcoversheet The training room will fill outthecoversheet header The
Training Room NCO,Armorer,NBC NCO,and each member of the soldier'schain of
command initials nextto each task undertheappropriate heading once the taskis
complete In process in the order of the cover sheet
d Personal Data Sheet The soldier will complete the personal data sheet His
Squad leader(orfirst line supervisor) will check it and ensure accuracy The training
room is responsibleforenteringthe information intothecompanydatabase
e Supply In processing Sheet Follow the instruction on the sheet.
f Initial Counseling Checklist The incoming soldier'sfirst line supervisorwill review
and complete the checklist with the soldier The soldierwill read the Company policy
letters, and sign thechecklistalongwith the firstline supervisor
5 The POCforthis memorandum isthe undersigned at4-2430
EDWARDSWALTER
CPT,MI
Commanding
AFDR-BBA-HC ^ ^ 3 JULY 2008
SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).
HHC BDE. 2D BCT
IN-PROCESSING COVER SHEET
Name and Rank: P ^ A N U i N G , B R^ CXj ^ & \ P V ^ Platoon:
Sponsor's Name and Rank: ^ S G A N X C / ^
Squad Leader: S56 MTC^
Team Leader: ^ / i \
Training Room
1. Establish HHC BDE primary folder for soldier 7. _
2.
3.
4.
5.
6.
File SRP Packet
Retain 1 copy of assignment orders
Retain 1 copy of ERB/ORB
Update HHC BDE Database
Retain or initiate APFT card
8. _
9. _
10..
11.
Initiate reenlistment card
Retain copy of last Qualification
Copy of latest NCOER/OER
. Issue single soldiers Room Key
_ Obtain Mailbox for single soldiers
Note: Chain of Command must assign the soldier a weapon, weapon number, NVD
number, and any other arms room equipment the soldier is responsible for.
Arms Room
1. Initiate required equipment cards
2. Issue sensitive item Bll to individual soldiers
NBC
1- Assign Mask 2. _
3. Conduct PATs testing, 4. _
Order Optical Inserts if required
Measure for J-S List.
Suppiv (SEE ATTACHED SHEET)
Chain of Command Briefings
1. | Wu(/^quad Leader
2. W^A Section Sergeant
4.
5.
First Sergeant
Commander
3.
r
Section Leader
Signature of Training NCO (When Completed),
AFDR-BBA-HC ^ ^ 3 JULY 2008
SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).
HHC BDE Company Personal Data Sheet Date:
HHC BDE. 2D BCT
SUPPLY IN-PROCESSING SHEET
(WITHIN 72 HOURS)
Supply Sergeant
Initials
Action Team Leader
Initials
Turn in copy of CIF print out (unit copy)
Complete inspection of personal clothing DA form
3078
Complete inspection of CIF issue DA forM 3645-1A
Complete and turn in high dollar value item sheet
Issue linen if required
Issue the following items:
- Blank adaptor
- 7 magazines
- Assault pack
- Knee pads
- Elbow pads
- BLIPS or SPECS
- Cleaning kit
- Luminous Tape
* Soldiers must turn in CIF unit copy, DA Form 3078, and DA Form 3645-1A before supply
will issue items.
AFDR-BBA-HC ^ ^ 3JULY2008
SUBJECT: Personnel In processing Standard Operating Procedures (SOP).
OOE, 20 OCT
^^^T^^LCO0^8E^^^OC^EC^^^8T
AFDRBBAHC 3JUI^Y2008
808^ECT^Personnel Inprocessing Standard Operating Procedure
1 The following outline is to be used asachecklist for NewSoldier Reception and
Integrationcounseling
2 Squad Leaders (first line supervisors)will discuss the following checklist with their
newSoldierAftereach section iscomplete, the incoming soldierwill initial nextto the
number Once the counseling session is complete, the soldierwill read the Company
policy letters and sign the appropriate line on the last pageofthis packet
AOrugAbuse^Useof controlled substances
Llllegaldrugsareeasilyavailable
2 No second chancesfordruguse^ drug use^recommendationforseparation
3Revi ewCID investigation of^The Dungeon" andtheBattalionCommander'sletter
to soldiers
4Reviewarticle"DrugAbuserl^ooksBackatBad Choices"
5 Urinalysis: ^00^ at least once every other months ^ 0 ^ twice per month
^ Narcotic Detection Dog Inspections
B. Alcohol Abuse
LMost misconduct is alcohol related
2Drinking underage is prohibited in and out ofthe barracks
3 Drinking and driving: zero tolerance
4Breathalyzertesting:refusingtotakeitisnotanoption^refusing^disobeyinga
l awful order
5. Alcohol abuse leads to many other problems
6. Alcohol related incident will warrant entry into ADAPCP
C Local Orientation
LBri ef local area issues to include "off limits"establishments
2Swimming and watersports, drowning,buddysystem
O.l^i^itarya^pear^ooo^ military ^eario^^aoc^o^i^ooo^uot
LHaircut
2 Uniform: ACU' sPT,andClassA
3. Courtesy to NCOs^ discipline
4 Courtesy to officers^ stand at attention until told otherwise
5ReviewhistoricalAr^icle15listing
AFDR-BBA-HC ^ ^ 3 JULY 2008
SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).
6. Overweight program
E. Counseling and promotions
1. Monthly performance counseling
2. Review time-in-grade/ time-in-service promotion chart
3. Promotion Waiver boards
4. Promotion boards/soldier of the month boards
F. Indebtedness
1. Determine if the Soldier is having any pay problems
2. Bad check writing is prohibited; possible UCMJ offense
3. Separation from the military for extreme indebtedness
4. Government Credit Card Policies
G. Barracks visitation policy
1. Sign-in roster at Battalion staff duty desk
2. Time standards: Night before duty days, out by 2300; Weekends 0200
H. Physical Training
1. Review company policy letter
2. APFT failure policy
3. The foundation of their job
4. Diagnostic APFT (within 7 days)
5. Record APFT (after 90 days)
I. Military Schools
1. Review company policy letter
2. Most schools related to APFT
J. Equal Opportunity Program
1. Review company policy letter ^
2. Monthly Heritage Celebrations
K. Open Ooor Policy
1. Review Company Policy
L Families
1. HHC BDE Company Family Readiness Group
2. DEERS
3. Delta Dental
4. Wills and power of attorney
AFDRBBAHC ^ ^ 3JULY2008
SUBJECT: Personnel In-proccssing Standard Operating Procedures(SOP).
6 Family Care Plan^EFMP
7 Command sponsorship procedures
8. Domestic violence
9 Status of Housing/^Ouarters Inspection (within 72 hours)
M. Orientation toward the L^nit
LUni t History andTraditions
2 Missions and Activities
3. Chain of Command and NCO Support Channel
4Soldiers Duty assignmentandit'simportance to the unit
5Currenttrainingcycleandwhatnormallyoccursduring each training cycle
6 Equipment SOP
7Ti edownSOP
8 Battle Drill SOP
9. Weapons Familiarization^PMI
l^.l^eave and Pass Policies
^. Mileage passes past Syracuse
2 CanadaS2brief
3 Privilege notaright
O. Daily and weekly recurring events
LDai l y
- 0545 sick call
- 0700 PT Formation
- 0930 Work Call Formation Inspections DAILY
- launch typicallyfrom1130-1300
- 1700 Closeout formation
2Weekly
Mondays will be command maintenance
WednesdaysareFootmarchdaysand Sergeant's TimeTraining
P.89f6ty
LPO^safety^lnspection (within 72 hours)
2 Privately Owned Weapons; registered^stored in the Arms Room
3. Hot/^Cold weather injuries
4 B^00Y SYSTEM USE ITII
0. Policy betters
LRead all Policy l^etters
2 Ouestions7
2 lhave been thoroughly briefed and counseled on what is expected of me asa
8
AFDR-BBA-HC ^ ^ 3 JULY 2008
SUBJECT: Personnel In-processing Standard Operating Procedures (SOP).
Soldier assigned to HHC BDE. I fully understand everything that has been discussed
above and will accept responsibility for my actions.
Nari)^/_^aDk^/^Signa^^ Date ^ ^
^ ^ ' ^ ^ ^ ^ ^ ^ ^ = ^
Name / Rank / Signature of Counselor / Date
^sc X 4n/a SSC ^^a^^Htir ^ 0y
-s^
"^^0 REQUEST AND AUTHORITY FOR LEAVE
is form is subject to the Privacy Act of 1974, For use of this form, see AR 600-8-10,
The proponent agency is DCS, G-1, (See instructions on reverse.)
1. CONTROL NUMBER
PART I
2, NAME (Last, First, Middle Initial)
MANNING, BRADLEY E.
3. SSN
4 RANK
PV2 20081204
6. LEAVE ADDRESS (Sfreef, City, State, ZIP Code and
Phone No.)
7. TYPE OF LEAVE
ORDINARY I J
PERMISSIVE TDY
EMERGENCY
" " 1 OTHER
8 ORGN, STATION, AND PHONE NO.
HHC, 2 BCT, 10 MTN DIV
FORT DRUM, NEW YORK
(315)772-7347
NUMBER DAYS LEAVE 10. DATES
a. ACCRUED
\ 8
b REQUESTED
12
C. ADVANCED
l Y ^ ^
d. EXCESS a. FROM
20081222
b TO
20090102
Ryi SOgfRECOMMENDATION/SIGNATURE
DI SAf ^ROVAL
V /z^
13. SIGNATURE AND TITLE OF
APPROVING AUTHORITY
<r 14 DEPARTURE
c, ^ME/ TI TLE/ SI GNATURE OF DEPARTURE A U T M^ I ^ T ^ ^
r^NWtsrtt.fAvl t 60 Ku/;%IV!!
a, DAT
r^orco^
b, TIME
G '0
15. EXTENSION
a NUMBER DAYS b. DATE APPROVED C, NAME/TITLE/SIGNATURE OF APPROVAL AUTHORITY
16. RETURN
a. DATE
0Z
b, TIME c NAME/TITLE/SIGNATURE OF F^TURN AUTHORITY
17. REMARKS
povAAiD oN \?e'<;/sTf/e. x^7M<J ^or /tf/f//<^P /j/ bO^(o
Chargeable l eav^ is from
cPP^ O<^ ,^ c:^ 56( ^6^
PART II - EMERGENCY LEAVE TRANSPORTATION AND TRAVEL
18. You are authorized to proceed on official travel in connection with emergency leave and upon completion of your leave and travel will
return to home station (or location) designated by military orders. You are directed to report to the Aerial Port of Embarkation (APOE) lor
onward movement to the authorized international airport designated in your travel documents. All additional travel is chargeable to leave.
Do not depart the installation without reservations or tickets for authorized space required transportation. File a no-pay travel voucher with a
copy of your travel documents or boarding pass within 5 working days after your return. Submit request for leave extension to your
commander. The American Red Cross can assist you in notifying your commander of your request for extension of leave.
19 INSTRUCTIONS FOR SCHEDULING RETURN TRANSPORTATION:
For return military travel reservations in CONUS call the MAC Passenger Reservation Center (PRC):
Should you require other assistance call PAP:
20. DEPARTED UNIT 21 ARRIVED APOD 22, ARRIVED APOE (return only) 23, ARRIVED HOME UNIT
24 PART III - DEPENDENT TRAVEL AUTHORIZATION
25. (Space available or required cash reimbursable)
L J
ONE WAY n ROUND TRIP
(Space required) TRANSPORTATION AUTHORIZED FOR DEPENDENTS LISTED IN BLOCK NO 25
DEPENDENT INFORMATION
a. DEPENDENTS (Last name, First. Ml) b. RELATIONSHIP c DATES OF BIRTH (Children) d PASSPORT NUMBER
PART IV - AUTHENTICATION FOR TRAVEL AUTHORIZATION
26 DESIGNATION AND LOCATION OF HEADQUARTERS 27 ACCOUNTING CITATION
28 DATE ISSUED 29 TRAVEL ORDER NUMBER 30. ORDER AUTHORIZING OFFICIAL (Title and signature) ORAUTHENTICATION
DA FORM 31, SEP 1993 EDITION OF 1 AUG 75 IS OBSOLETE
Page 1 of 2
APD PE v5,02ES
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
Copy 1
Circle the appropriate copy designator
Copy 2 Copy 3 Copy 4
PERSONNEL ACTION
For use of this form, see AR 600-8-6 and DA PAM 600-8-21; the proponent agency is ODCSPER
DATA REQUIRED BY THE PRIVACY ACT OF 1974
AUTHORITY:
PRINCIPAL PURPOSE:
ROUTINE USES:
DISCLOSURE:
Title 5, Section 3012; Title 10, USC, E.O. 9397.
Used by soldier In accordance with DA PAM 600-8-21 when requesting a personnel action on his/her own behalf
(Section III),
To initiate the processing of a personnel action being requested by the soldier.
Voluntary. Failure to provide social security number may result in a delay or error in processing of the request for
personnel action.
1. THRU (Include ZIP Code) 2. TO (Include ZIP Code)
Commander
2BCT, 10th MTN DIV (LI)
FORT DRUM, NY
3. FROM (Include ZIP Code)
Commander
HHC 2BCT, 10th MTN DIV (LI)
FORT DRUM., NY
SECTION I - PERSONAL IDENTIFICATION
4. NAME (Last, First, Ml)
MANNING, BRADLEY E
5. GRADE OR RANK/PMOS/AOC
E-2/PV2/35F
6. SOCIAL SECURITY NUMBER
SECTION II DUTY STATUS CHANGE (AR 600-8-6)
7. The above soldier's duty status is changed from to
effective hours.
SECTION III - REQUEST FOR PERSONNEL ACTION
8. I request the following action; (Check as appropriate)
Service School (Enl only) Special Forces Training/Assignment Identification Card
ROTC or Reserve Component Duty On-the-Job Training (Enl only) Identification Tags
Volunteering For Oversea Service Retesting in Army Personnel Tests Separate Rations
Ranger Training Reassignment Married Army Couples Leave - Excess/Advance/Outside CONUS
Reassignment Extreme Family Problems Reclassification Change of Name/SSN/DOB
M
Exchange Reassignment (Enl only) Officer Candidate School
Airborne Training. Asgmt of Pers with Exceptional Family Members
Other (Specify)
Advancement to PFC
9. SIGNATURE OF SOLDIER (When required) 10. DATE (YYYYMMDD)
20090114
SECTION IV - REMARKS (Applies to Sections II, III. and V) (Continue on separate sheet)
REQUEST FOR: ADVANCEMENT TO PRIVATE FIRST CLASS
ACTION:
a. RANK APPOINTED TO: PFC
b. MOS AWARDED: N/A
c. MOS WITHDRAWN: N/A
d. EFFECTIVE DATE: 20081002
e. DATE OF RANK: 20081002
f. AUTHORITY: AR 600-8-19
g. ADDITIONAL INSTRUCTIONS: TIS/TIG WAIVER HAS BEEN GRANTED
SECTION V - CERTIFICATION/APPROVAUDISAPPROVAL
11. 1 certify that the duty status change (Section II) or that the request for personnel action (Section III)
HAS BEEN VERIFIED RECOMMEND APPROVAL RECOMMEND DISAPPROVAL
::on
X
tained herein -
IS APPROVED 1 1 IS DISAPPROVED
12. COMMANDER/AUTHORIZED REPRESENTATIVE
V
EDWARD S. WALTER CPT, MI, CMD
13 SIGNATURE
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
14. DATE (YYYYMMDD)
^ /
DA FORM 4187, JAN 2000
PREVIOUS EDITIONS ARE OBSOLETE APD PE V1.00ES
(b) (6), (b) (7)(C)
^
^
1 ^
^
^
^
Cl^
^
^
^ ^
^ ^
^ ^
LT)
TJ
<V
M
(D
CZ)
_ s
t f
s
o
U
- 2
V
:
%
a
P N
HQ
O
u
LA
LA
(D
u
u
3
LA
LA
pf i
s
o
03 U
oo
o
o
(N
H
g3
Kfl
*o
(N
n3
C
O)
>
u
#
PRE
DEPLOYMENT
p F C r hANNTNG, 6( SA0Lt Y
H HC a t r
tooo
MEDICAL SRC CHECKLIST
^RC/ MOB
There are 9 stations you will need to see today
1) Check In:
Jenine Parker
MSA, SRC
R. Drum, NY
Jenine Parker
MSA, SRC
2) Screener: Ft. Driim^ MV
f^i^'y
Ft Drum, NY 13602
3) Lab:
4) Immunizations:
Ricijard Lashwav
I.PN/SRP
NY 13602
Lm/SRC
Ft Drum,
5) Vision:
By Screener
Optometry Not Cleared
Or Optometry
fm^m>
ltDmmNY136ro
6) Hearing:
% ^ ' ^ = ^ . K P A C
7) Provider: f t Drum, NY 13602
Ethel O'Neal
MRT, SRC
Fi Drum.
8) CHOS.
9) Final Out:,
MCID-SRC FM 854-R, OCT 2008
GAHCvl.00
#
Name: Rank: SSN: Unit:
FT. DRUM MEDICAL SRC SOLDIER CHECKLIST
Please provide checklist to every Soldier a week before arriving at the Medical SRC
processing site.
Soldiers must bring the following items to the medical SRC site during processing:
1. DD 2766 Deployment Record
2 Medical Record
3. Any Profiles
4. Yellow Shot Card PHS 731
5. Two pairs of glasses and one pair of inserts
6. Medical warning tags (in applicable)
7. Hearing aids with one year supply of batteries (if applicable)
8. Two pairs of glasses and 1 set of mask inserts (if applicable)
Notes:
*Must have in hand two pair of glasses and one set of gas mask inserts or soldier will not be
cleared,
* Annual Hearing Exam -Soldiers need annual hearing exam to clear SRC
""FEMALES - pregnancy test will be done at SRC. Females must have results from pap smear
within one year of deploying.
Medical SRC Contact Number:
772-0063
I
1
a
>
"B.
i
I
I
i
'.a
1
a
a.i
O I
DC ^
I
V
cs
K
V)
s i
5
i l
3
o
r
a '
o
>.
e
2
^
% s
w
c
.1
5
B
i
>
_o
"5
a
B
O
V
a
cr
.a
u
2
L.
t
Ifl
a
<
a
a
2 1
11
u ^
i !
<S
l l
V
K
^
>
5 2
w
5 o
x: a
.ti
S= 5
% a
w o
I I
>>
W)
I
00 <
g
o
I I
I I
V o
Z
ts
>^ 8
II
3
r*
<o
I J -
m
<N
o
V)
m
f S
r- r-
o \o
I f ) k n
"<1- -q-
m m
(S (S
a
8
to
#
z
u
fS
a
o
I
I
i
5 6
l l
a S
(2%
I
1
u
( M
o
o ^
(S 4)
I i
3 S
i!
SI
= 6
a
2 d
11
CO ' S
3
O
>
S
o
5
^
(w
O
7l
5 ^
1
o
CD
il
s?
i l
o
#f
2 S
i l
n
" s
i l
U O
S |
s i
u
o
>
o
o
s
5- a.
o
J3
2.
N
a
%
3
4>
U)
I
i
o
g
s.
3
?
I
.!2 "O c
.S aS g)
^ R
- 56. 8
s
F i l i
111.1
i t i l
ei ri
t'&B
%s I
'Ml
V)
^ a f l
op o .a
" 2
~ J -"^
w
a
K
%
M
a
I
<n
>
O
J3
M
"O
_c
>%
j a
a
o
1-
a
cr
M
a
I
5 2
5 3
o .*i
j d
u
8
u
i
a
w
V
(0
3
f
I "I
i
y%
.S3 II
a w
L.
o
g
^
k.
bl
A
u
o
2 I
^ ^.
I I Eg
g g ^ ^
., II II
(S m ^ V)
V)
r j -
m
( N
-
i | f i
H ^ > Z
3
O
%
M
>
O
JS
OtI
B
cn
i.a
% 3
o
w
_a
%
a
o
ea
%
cc
a
't-i
o- 8
f!
=3
11.1
-a O
o T.
>>
o
w
^ ao
Ll
if"
5
S ^
w
Q
I
u
l
| i
I I
II II
(N m
V
&
<
%
,
11
I
I
i
V )
cr
m
(N
%
u
I
%
g
I
%
eg
M
<n
m
fS
i
I
a
I
!
.
:
S .2
K
H
i ! ^
o cj 5
a
u
6
^
I
E
(N
ir
u o
J3 , >
l>'|
ii
S3 0)
B-e
M
8 ^
3
^
o
s ^
M <S
s |
00 o
it
a>
>..s#
b e > _
.III
III I
o ^ Si
a w CO
Is
i>
00
: t j
l l
ts ^
:s:-
Ou
1
ts
o
a
cw
O
I
M
II
2
o
II.
H
^
>\
1)
I I
o
T3
u
u
3
K
\o
J
.a 2 o
g
" .22 <u
s a
a
O
t
cs
&
a
a
in
u
3
g.
a
a
w
3
^
a
w
a c^
o a
11
I M - W
0 R
S WD
E a
Si
i !
1 5
5 J3
n U
II
I I
u
E
g
g
a
o
c
^
3
i
rS
l l
-
C
(D
a.
t
cs
rS
e
P 2 ^
"IK
bO
<s
^
I
Ofl o
o
!l
Crt U
o ~
6 1 ^
ill
<s m
N
5
<u
03
a. :
a
I i
g
o
B
SrS
I
" m
<A
t l
CO CO
b ^
I I I
B. r"o
o
. f S!
I III
la
u
3
<J
e u ^
1!
i
u
rS
_
3
!
i
%
I
o.
i=-
b S a
3 0 3
u
3 s
(2 2
es Q,
f i
g
o
o
I I
2 E
* cs
S.S
. >> 00
<D C
- !s
1 =
i
o
S5 .2
g %
O
it! 3
i f i
.sis
t n 00
#g
I If
a (u a
T3 o-
1 a l
i l l
>\ -c f
.E
<S
~ J 3 u.
I
g 8
8
o
o
Xl
o
II
,P -a
>,
u
3
O
cs
J 3
CS
o
5
_c
>
_o
5 o
u
o u
00
>
o
J 3
^
0
u
w-i
I
-q-
p
CL
U
_U
u
oo .X
i l
"O U
J= .>
o *^
u u
s ^
5 o
"
<u E
> -a
IS %
00 o
g a
g
'U
6 .52
3
o
ti
e
5
a
p
tn
u
>
3
O
DO
a
o
i .
^
o
JS
00
_e
ra
u
5
_a
%
J 3
a
_p
I "i
2
u
&
I :
= 4)
2
u
K
<- -a Q
2 2 R
^ ^ S
o
cs
V
u
I^IA
% ^ '
p
z
ID
!
u
g
o
z
u
&
<
X
kg
< M
u
B
00
p
p
p
%
cs
J3
^
m
(N
T3
O
P
00
58
^
3
0)
>
K
<u
x:
?
a
p
u
Si
a
p
u
I
(U
>
cs
ja
>,
1
h
^1
i n
Tj-
m
rs
p
o
u
#
Le
m
^
p
1
a
_p
CO
g
O"
.s
g
o
^
K
11
II
o
s g
^
a 00
12 .5
il o
o. oo
^ . o
X
o
eta
g.^
cs g
I?
II
?>
I) -*
o-%
cs
IU
feb
cs
^
i
I gc^
0 \ P
>
o
a.
E
ir
U o
X3 >
.g) s
^1
% u
I ^
a <u
& o
5l
^
s
z>
11
00 o
I -5
00
cs
i ' ' "^
K k &
c I ' i "
: 8
,p 5
a
c
u
a
3
O
%
EB^""
ll
"s^^
P . Q
P 1
P
P.
r S
> B
ts Si I ^
r-^
o
3 T3
P
lU 3
Xi
u
a' u D.
:S t5
2 a ^ 2
^ 1 2i g
o oo o "
> 2 Z
J ' O 3
3
P
E
p
p
g
s#l
f!) g S I
(N
CO
I
I
l>
S
K
a
B
CS
3
o
a
a>
a a
I I
i ^
5 1
!1
a (u
W J 3
I t
Ji
<j
ll
II
CO
O
i
.1
S
c
P
a
a
o
a.
IS
f . l I in c2
>\
"ob
3 . _
^ % 8:^
2 >
- es
i
l ^z,^
a"
gcS
u 5" <u u
a M u
a a a
Eig . . .
3, p - ^
c3 00
.5
c =;
J 3
V
p
Q
u
-o
oo
a
a
p
is
o.
p
1^
V
x>
N
-S
u
u
u
cs
Q-
U
>
o
a
to u
i 3
"es ^
i_ cs s
i l l
a
II
t l
' ( N
3
P
t^
B
c
cs
>
o
c
(S
p ;
CO a ,
i
l l
II
p S ^
u 'ts P
III
p o T
g
u
a
M )
O ~
I f
>\
es u
S g
i l
u
>
a
OJ
(N n
P
u
31
M . 00
a.
u a
N' #
S O"
a ' t ;
oo P
3 a
S %
cs j
U CO
.1^
M JJ
.11
% o
IU
g-^
5 - : ^
^1
a a.
p
U
1 1
a j
ll
^tS.
3 S
4> ' C
3 3
CS o
% e
1
y
N 8
g.:
q :
= t
u a
'#
X) o
: ^ '
cS
e ??
a K a
P ( N
H '
cs a.
00 3
U O
a u
cs
Ji
E T) 4)
i l l
i ' ! : ;
a Z ^
I f
HI
3 '5
5 ^1
u
O *3
O o u
g
^ S
p
Q,
5 .a Z
c
Q
W CO
i | 5
. 3 ^
I 6 a
^ o vo
o >^
RECORD OF EMERCENCYDATA Page 1 of2
NAME: MANNING, BRADLEY EDWARD SSN:
RECORD OF EMERGENCY DATA
PRIVACY ACT STATEMENT
AUTHORITY: 5 USC 552, 10 USC 655, 1475 to 1480 and 2771, 38 USC 1970, 44 USC 3101, and EO 9397 (SSN).
PRINCIPAL PURPOSES: This form is used by military personnel and Department of Defense civilian and contractor personnel, collectively referred to
as civilians, when applicable. For military personnel, it is used to designate beneficiaries for certain benefits in the event of the Service member's
death. It is also a guide for disposition of that member's pay and allowances if captured, missing or interned. It also shows names and addresses of
the person(s) the Service member desires to be notified in case of emergency or death. For civilian personnel, it is used to expedite the notification
process in the event of an emergency and/or death of the member. The purpose of soliciting the SSN is to provide positive identification. All items
may not be applicable.
ROUTINE USES: None.
DISCLOSURE: Voluntary; however, failure to provide accurate personal identifier information and other solicited information will delay notification and
the processing of benefits to designated beneficiaries if applicable.
INSTRUCTIONS TO SERVICE MEMBER
This extremely important form is to be used by you to show the names and
addresses of your spouse, children, parents, and any other person(s) you
would like notified if you become a casualty (other family members or fiance),
and, to designate beneficiaries for certain benefits if you die. IT IS YOUR
RESPONSIBILITY to keep your Record of Emergency Data up to date to show
your desires as to beneficiaries to receive certain death payments, and to
show changes in your family or other personnel listed, for example, as a result
of marriage, civil court action, death, or address change.
INSTRUCTIONS TO CIVILIANS
This extremely important form is t<3 be used by you to show the
names and addresses of your spouse, children, parents, and any
other person(s) you would like notified if you become a casualty.
Not every item on this form is applicable to you. This form is used
by the Department of Defense (DoD) to expedite notification in
the case of emergencies or death. It does not have a legal impact
on other forms you may have completed with the DoD or your
employer.
IMPORTANT: This form is divided into two sections: Section 1 - Emergency Contact Information and Section 2 - Benefits Related
Information. READ THE INSTRUCTIONS ON PAGES 3 AND 4 BEFORE COMPLETING THIS FORM.
SECTION 1 - EMERGENCY CONTACT INFORMATION
1. NAME (Last First. Middle Initial)
MANNING, BRADLEY EDWARD
3a. SERVICE/CIVILIAN CATEGORY
ARMY NAVY MARINE CORPS
4a. SPOUSE NAME (if applicable (Last, First, Middle Initial)
SINGLE
2. SSN
b. REPORTING UNIT CODE/DUTY STATION
CONTRACTOR WBDAAA / FT DRUM
b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER
5. CHILDREN
a. NAME (Last, First Middle Initial)
b. RELATIONSHIP c. DATE OF BIRTH d. ADDRESS (include ZIP Code) AND TELEPHONE
(YYYYMMDD) NUMBER
None.
6a. FATHER NAME (Last, First, Middle Initial)
BRIAN EDWARD MANNING
7a. MOTHER NAME fi-ast. First, Middle Initial)
SUSAN MARY MANNING
8a. DO NOT NOTIFY DUE TO ILL HEALTH
None.
9a. DESIGNATED PERSON(S) (Military Only)
None.
10. CONTRACTING AGENCY AND TELEPHONE NUMBER (Contractors only)
b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER
b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER
b. NOTIFY INSTEAD
b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER
DD FORM 93 (E), JAN 2008 PREVIOUS EDITION IS OBSOLETE
NAME: MANNING, BRADLEY EDWARD SSN:
SECTION 2 - BENEFITS RELATED INFORMATION
11a. BENEFICIARY(IES) FOR DEATH GRATUITY
(Military only)
TYLER RAYMOND WATKINS
b. RELATIONSHIP c. ADDRESS (Include ZIP Code) AND TELEPHONE
NUMBER
OTHER
12a. BENEFICIARY(IES) FOR UNPAID PAY/ALLOWANCES
(Military only) NAME AND RELATIONSHIP
BRIAN EDWARD MANNING (FATHER)
13a. PERSON AUTHORIZED TO DIRECT DISPOSITION (PADD)
b. ADDRESS (Include ZIP Code) AND TELEPHONE
NUMBER
b. ADDRESS (Include ZIP Code) AND TELEPHONE NUMBER
d. PERCENTAGE
100
C. PERCENTAGE
100
(b) (6)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6)
(b) (6)
(b) (6)
(b) (6),
(b) (7)
(C)
RECORD OF EMERGENCY DATA
Fage2of2
NAME: MANNING, BRADLEY EDWARD SSN:
(Military only) NAME AND RELATIONSHIP
14. CONTINUATION/REMARKS
15. SIGNATURE OF SERVICE MEMBER/CIVILIAN (Includerank, rate, or 16. SIGNATURE OF WITNESS (Include rank, rate or 17. DATE SIGNED
^grade if applicable) grade as appropriate) (YYYYMMDD)
^ ^ ^ ^ B ^ ^ ^ ^ ^ ^ ^
DD FORM 93 (E)(BACK),JAN 2008
(b) (6)
(b) (6)
(b) (6), (b) (7)(C)
SERVICEMEN'S GROUP LIFE INSURANCE ELECTION AND CERTIFICATE Page 1 of 1
Please read the i nst ruct i ons before compl et i ng thi s f orm
Servicemembers' Group Life Insurance Election and Certificate
Use this form to: (check all thai apply)
Name or update your beneficiary
Reduce the amount of your insurance coverage
Decline insurance coverage
I mport ant : This form is for use by Active Duty and
Reserve members. This form does not apply to and
cannot be used for any other Government Life
Insurance.
Last name
MANNING
First name
BRADLEY
Middle name
EDWARD
Suf. Rank, title or grade
PFC
Social Security Number
Branch of Service(Do not abbreviate)
Army
Current Duty Location
WBDAAA
Amount of Insurance
By law, you are automatically insured for $400,000. If you want $400,000 of i nsurance, skip to Beneficiary(ies) and Payment Options.
If you want l ess than $400,000 of insurance, please check the appropriate block below and write the amount desired and your
initials.Coverage is available in increments of $50,000. If you do not want any i nsurance' , check the appropriate block below and write (in
your own handwriting), "I do not want insurance at this time."
Decl i ni ng SGLI coverage al so cancel s all f ami l y coverage under the SGLI program.
I want coverage in the amount of $ Your initials
(Write "I do not want Insurance at this time.")
' Note: Reduced or refused insurance can only be restored by completing form SGLV 8285 with proof of good health and compliance with other
requirements. Reduced or refused insurance will also affect the amount of VGLI you can convert to upon separation from service.
Beneficiary(ies) and Payment Options
I designate the following beneflciary(ies) to receive payment of my insurance proceeds. I understand that the principal beneficlary(ies) will receive
payment upon my death. If all principal beneficiaries predecease me, the insurance will be paid to the contingent beneficiarv(ies).
Complete Name (first, middle, last) and Address of each
beneficiary
Pri nci pal
Conti ngent
Social Security
Number
(If known)
Relationship to
you
OTHER
AUNT
Share to each
beneficiary
(Use %, $ amounts
or fractions)
100%
100%
Payment Option
(Lump sum or 36
equal monthly
payments)
LUMPSUM
LUMP SUM
I HAVE READ AND UNDERSTAND the i nst ruct i ons on pages 2 and 3 of t hi s f or m. I ALSO UNDERSTAND that:
. This form cancels any prior beneficiary or payment instructions.
. The proceeds will be paid to beneficiaries as stated in #6 on page 3 of this form, unless othenwise stated above.
. If I have legal questions about this form, I may consult with a military attorney at no expense to me.
I cannot have combined SGLI aoiiMQL\ coverages at the same time for more than $400,000.
SIGN HERE IN INK Date: 20090821
(Your Signature. Do not print.
Do not wr i t e i n s pac e b e l o w. For of f i ci al use onl ^
TNESSED AN0TRECEIVED BY: RANK, TITLE OR GRADE ORGANIZATION DATE RECEIVED
^ / ^ ^ ^ / / ^ ^ ^ 2 ^ f ^ Z / /
V-R28B IF\ I SGLV-8286 (E)
(b) (6),
(b) (7)
(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
I ^ l ^ ^ l ^ l ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ - ^
^ c. ^ ^ ^ ^ ^ oo- . . ^ o^ c^ . ^ c^ ^ ^ c^ cooo- ^ o^ c^ . ^ c. ^ ^
^ ^ c : ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ . ^
' ' i : ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ - o
^ c ^ - o
:^^^
^ ^ ^ ^ ^ ^
^ ^ ^ ^
^ ^ ^ ^
^ ^ ^ ^ ^ ^ ^
^ ^ ^ ^ ^ ^
eo
^
m
^
-o
^ ^ ^ ^
| P^ 5 5
0 ^ ^ ^ ^ ^
^ ^ 5 ^
5^ ^ ^
^amo;^
^ ^ ^ ^ ^ ^ ^
^ ^ ^ ^ ^ ^ ^
^OOO^^e: : ^
^ ^ ^ ^ ^ ^ ^
^ ; : i ^ ^ ^ a
c c c c
CACAcncn
HHHHH-n-n
3 0 0 0 0 0 0
ggi i i p
z z z z z >
mmCC>nz
mm- DTj " D>
ntrrirTin
to
Ti Ti Ti
totnen.
COO
Z Z Z
z z z
r r r
). CJ CO CO
cntntncn
mr i Ti n
O O O O
> _
^ ^
H
i
m I
3 ;
V>
m
O
H
o
z
f
70
m
3
u
3r
(A
t
g |
8 a.
g C
COS
V
c
%
m
CO
O
<
I
TI
O
s
a'
3
r
01
3
C
c
01
mJIQ
O
CO S.
> z
IS
S Q
o
s
>
si
S
l>
z
z
z
p
w
?
D
r
m
<
m
o
I
o
m
z
j
(/)
H
m
o
m
o
O
71
o
CD
2
m
(b
)
(6
),
(b
)
(7
)
(C
)
(b)
(6),
(b)
(7)
(C)
DEPLOYMENT CYCLE SUPPORT (DCS) CHECKLIST
For use of this form, see Army Directive 2007-02; the proponent agency is DCS, G-1.
DATA REQUIRED BY THE PRIVACY ACT OF 1974
AUTHORITY: 10 USC Section 3013, Secretary ofthe Army; Department of the Army Deptoyment Cycle Support (DCS) Directive; and EO 9397
^SSA^I.
PURPOSE: To provide a standardized means to evaluate readiness posture and validate military and non-military personnel for deployment.
ROUTINE USES: The "Blanket Routine Uses" set forth at the beginning of the Army compilation of systems of records notice apply.
DISCLOSURE: Voluntary. However, failure to update and confinn information is correct may impede processing time and deployability status.
The Deployment Cycle Support Checklist is filed in the Deployment Packet to complete the action.
A copy remains at the losing organization.
1. DATE (YYYYMMDD)
^ o \ o o3 3L0
2. NAME (Last, First, Middle)
nnAhJNrwCr, SA-APLH &DwAQD
3. SSN
4. SERVICE AFFILIATION
USA
USN
USAF
USMC
USCG
PHS
NOAA
5. COMPONENT
ACTIVE 1 ^ NON-MILITARY
GUARD
RESERVE
8. STATUS
TPU AGR
IRR RET
IMA NG10
NG32
7. PAY PLAN/GRADE
8. MOBILIZATION
DEPLOYMENT CENTER
poRT Okor\
9. NON-MILITARY STATUS
DOD
DAC
CONTRACTOR
RED CROSS
AAFES
OTHER (Specify)
10. TRAVEL STATUS
a. UNIT ORDER
b. INDIVIDUAL
11. DATE OF BIRTH CyYYYMMDDj
MM n %y
12. ARMY COMMANDS 13. DATE ARRIVED IN THEATER (YYYYMMDD)
l a OCT ^ o i o
14. CITIZENSHIP COUNTRY
15. REDEPLOYMENT DATE (YYYYMMDD)
"a (710
16. REFRAD DATE (YYYYMMDD) 17. DEPLOYMENT COUNTRY
18. PARENT UIC 19. DUIC
wO^ AAA
20. UNIT DSN PHONE NUMBER 21. CONUS REPLACEMENT CENTER
22. STATUS OF EACH DCS STAGE and COMMANDER'S VALIDATION MEMO (C= Completed; NC = Not Completed)
a. TRAIN-UP/PREP
C I I NC
b. MOBILIZATION
C NC
c. DEPLOYMENT
C NC
d. EMPLOYMENT
C NC
e. REDEPLOYMENT
C NC
f. POST-DEPLOYMENT
C NC
g. RECONSTITUTION
C I I NC
h. CDR VALIDATION MEMO
C I I NC
SECTION I - DCS VALIDATION
Part A - Accuracy Statement: I understand I am certified for reconstitution and, to the best of my knowledge, all information contained in this
document is correct and cun-ent.
1. SIGNA
PartB -^iret Lli
2. RANK
5 PC
3. TITLE
tWT<Lu_I(,fh/CE At^cuy^r
Line Leader/Immediate Supervisor's Authentication I have authenticated the information contained in this checklist as correct and
cun-ent.
4. PRINTED NAME (Supen/isor)
/iPtL^sL HuUhtP'^on
5. RANK 6. TITLE
/ Jd-
7. SIGNATURE
8. DATE fyyyyMMDD; 9. UNIT
y ^ ^ ^ y ^ r r
10. ADDRESS ,^ n
f3l t/a^^^^ r)^^oH
11. PHONE NUMBER 13. DSN 12. E-MAIL ADDRESS . L^O
I ^liHItLf
14. FAX PHONE NUMBER
Part C - Commander's Acknowledgment: (Commanders may approve an individual for reconstitution based on the certifying official's
recommendation, criticality, and mission needs, unless otherwise indicated.) I acknowledge the checklist findings.
,^^.^i
'It/ f^ftebvLV
^
16. R ^ ^ 17. TITLE ^ 18. SIGNATURE
19. DATE (YYYYMMDD) 20. UNI
# r ^
21. ADDRESS _ _
/^^i/A^-y^r
22. PHONE NUMBER 23. E-MAIL ADDRESS
25. FAX NUMBER
Part D - DCS Validation: ALL DEPLOYMENT CYCLE SUPPORT requirements re updated and all DCS requirements completed.
26. PRINTED NAME (Validationg Official)
t)4.f\iel't Sdoy^r /
27. RANK
5&r
28. TITLE , / 29. SIGNATURE
30. DATE ('YYVYM/WDDJ 1. UNIT 32. ADDRESS
HHC Z f^a fol hhyr^^er QIZQ^
33. PHONE NUMBER 34 E-MAIL ADDRESS [ p .
307 T'
36. FAX NUMBER
DA FORM 7631, MAR 2007
Page 1 of 14
APD VI .00
(b) (6), (b) (7)(C)
(b) (6),
(b) (7)(C)
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C) (b
)
(6
),
(b
)
(7
)
(C
)
# #
NAME (Last, First Middle)
fviBNWXvGr, gi^Apc<LS CQ^p,^9
SSN
1
Depl oyment Cycle Supp
DCS VALIDATION
1
Depl oyment Cycle Supp ort Tasks
C
O
M
P
L
E
T
E
D
N
O
T
C
O
M
P
L
E
T
E
D
NA DATE CYYYVMMDDj
SECTION IV - Employment Stage (Continued)
Legal Assi stance Offi ce
Counseling on civil matters provided, as required
X
Tax classes / information for spouses provided, as required
X
DEERS / RAPIDS / ID Card Offi ce
ID Cards / ID Tags updated, as required
X
DEERS / RAPIDS enrollment completed, as required
^
DEERS / RAPIDS data entry and date for residential address completed, as required
X
SECTION V - Redepl oyment Stage
Uni t Commander / Unit Leadershi p
Single Soldiers identified and support ensured
X
Unit Refresher / Army Sexual Assault Prevention and Response training completed
^(
Leave schedule published
X
Investigations (e.g. Line of Duty, AR 15-6) initiated and completed, as required
X
Disciplinary and adverse administrative actions finalized, as required
X
Soldiers counseled on requirement to provide financial support to family while deployed
y
OERs, NCOERs, civilian evaluations, and awards completed, as required
X
Soldier counseling conducted, as required
X
Soldiers identified with potential financial issues referred to financial training or assistance
X
Personnel Reporting System updated
y
CIVTRACKS for DA civilians updated
X
RDC provided with updated redeployment rosters
X
Risk Reduction Reintegration Tip Card utilized
X
Plan and coordinate reunion and homecoming ceremonies
X
Soldiers who PCS and TCS complete the DCS process, as required
X
Unit Mi ni stry Team / Instal l ati on Chaplain
Suicide Awareness and Prevention training conducted
X
Families with reported stress and separation issues identified, as required
X
Small group discussions on deployment experiences facilitated
X
Operation READY Reunion / Reintegration training for Soldier's conducted
Y
Communication with Spouses, Families, and Children training conducted
X
Spouses provided opportunity to take marital assessment
X
SIGNATURE OF CERTIFYING OFFICIAL 8b. E-MAIL ADDRESS
DATE (YYYYMMDD)
DA FORM 7631 MAR 2007
APD VI.00
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C) (
b
)
(
6
),
(
b
)
(
7
)
(
C
)
#
NAME (Last, First Middle)
Mi^iuiJfNG ^ eou/AP-p
Deployment Cycle Support Tasks
SSN
1-
UJ
_ l
0 .
S
8
a
UJ
y-
UJ
o!
s
8
NA
DATE (YYYYMMDD)
SECTION I - Train-up / Preparation Stage
Unit Commander / Unit Leadership
Single Soldiers identified and support ensured
Leave schedule published
Investigations (e.g. Line of Duty, AR 15-6) initiated and completed, as required
Individual career counseling provided, as required
Disciplinary and adverse administrative actions finalized, as required
Sexual Assault Prevention and Response h'aining (Host Country, risk reduction factors) conducted
DA Form 5305-R (Family Care Plan) completed
FRG assessed, trained, and resourced
RDC has completed all U^aining prior to unit deployment
Family readiness plan including unit readiness goals updated
Soldiers counseled on requirement to provide financial support to family while deployed
OERs, NCOERs, civilian evaluations, and awards completed, as required
Soldier counseling conducted, as required
Soldiers identified with potential financial issues referred to financial training or assistance
Command Climate Survey conducted
Soldiers who PCS and TCS complete the DCS process, as required
Soldiers encouraged to communicate with family throughout tiie deployment cycle
Conduct UnitRisk Inventory <URI> NLT-3Q^days prioHo deployment
SIGNATURE OF CERTIFYING OFFICIAL
8b. E-MAIL ADDRESS
DATE (YYYYMMDD)
DA FORM 7631, MAR 2007
Page 2 of 14
APD PE vi .00
(b) (6)
#
NAME (Last, First Middle)
MAMWl N(c, (^R(\PLts eOu/AAD
Deployment Cycle Support Tasks
SSN
DCS VALIDATION
a
m
a
LLI
1-
LU
_ l sS
NA
DATE (YYYYMMDD)
C
O
M
I
^
C
O
M
I
SECTION I - Train-up / Preparation Stage (Continued)
Unit Ministry Team / Installation Chaplain
Families identified with reported predeployment stress, as required
Spouses provided opportunity to take marital assessment instrument, as required
Soldiers provided opportunity to complete marital assessment instnjment. as required
Opportunity to attend voluntary marriage education/enrichment woricshops provided, as required
Predeployment Battlemind training for leaders conducted
Predeployment Battlemind training for junior enlisted Soldiers conducted
Leader training on identifying symptoms of distress and suicide tendencies conducted
(wlS^D^iiwHeaithi^ jDental Non-Dep*oy^^*T^/f
s conducted " " ^ ^ ^ I k ^ ^ / / D I I T T
Individuals screened for profile for permanent geographic or climate duty limitation, as required
Preventative Medicine briefing to defeat disease and non-battle Injuries conducted
DD Form 2795 (Pre-Deployment Healtti Assessment Questionnaire) completed
Current status of DoD charge card holders reviewed
Travel advance provided for Soldiers with TCS orders
CTTegal Assistance Office.:?
Wills updated
Power of Attorney provided-
TniinKAtrrig orTri ui l mat t ar g pr nui r t of T"
Legal assistance to RC Soldiers provided, as required
Arm:
Tax class / infomiation for spouses provided, as required
Instal l ati on Management Command
Family Readiness staff shortages (ACS / FAC) identified, as required
AA and RC Family Readiness Groups educated on available services
Families educated about services provided through Military OneSource
Predeployment Battlemind training for spouses conducted
Operation READY Deployment and Children training
Conduct Financial Management Planning for Deployments training
DEERS / RAPIDS / ID Card Office
ID Cards / ID Tags updated, as required
DEERS / RAPIDS enrollment completed, as required
DEERS / RAPIDS data entry and date for residential address completed, as required
W\Q%'2\
SIGNATURE OF CERTIFYING OFFICIAL
8b. E-MAIL ADDRESS
DATE (YYYYMMDD)
DA FORM 7631, MAR 2007 Page 3 of 14
APD PE vi .00
(b) (6)
# #
NAME (Last, First Middle)
nANHrwc, &R^c?u'tv rptv/vAx?
SSN
Deployment Cycle Support Tasks
DCS VALIDATION
Deployment Cycle Support Tasks
C
O
M
P
L
E
T
E
D
N
O
T
C
O
M
P
L
E
T
E
D
NA DATE (YYYYMMDD)
SECTION V - Redeployment Stage (Continued)
Personnel Service Center
MMRB, MEB, PEB conducted, as required
X
Medical / Dental Health Teams
Leader training on symptoms of distress and suicide tendencies conducted
X
Individuals screened for medical profile geographic or climate duty limitation, as required
X
Behavioral Health Assessments conducted
X
Soldiers with behavioral or health issues referred
X
Potential family issues identified
X
Health Threat briefing for childcare providers conducted
X
Health Threat briefing for spouses conducted
X
Behavioral Health Threat briefing to alert families conducted
X
Medical Threat briefing for Soldiers and DA civilians conducted
X
Negative health-related behaviors treated and documented (DD Forni 2796)
X
Legal Assistance Office
Provide counseling to families on civil matters, as required
y
Personnel informed on legal rights under Servicemember's Civil Relief Act (SCRA), as required.
X
Legal assistance to RC Soldiers provided, as required
X
Continue to provide tax classes / information to spouses, as required
X
Installation Management Command
Family Readiness staff shortages (ACS / FAC) identified, as required
X
Families with major problems requiring special assistance identified, as required
r
AA and RC Family Readiness Groups educated on available services
X
Families educated about services provided through Military OneSource, as required
X
Families identified and referred who have experienced major problems
X
Reunion / Reintegration training provided to Soldier's spouses
X
FAP program managers and SFPD directors reestablish case continuity
X
Employers involved in home station activities
X
Education and information materials provided to IRR / IMA families
X
DCS infomnation provided to family members
X
Communication with Spouses, Families, and Children training
r
DEERS / RAPIDS / ID Card Office
ID Cards / ID Tags updated, as required
X
DEERS / F5APIDS enrollment completed
X
SIGNATURE OF CERTIFYING OFFICIAL 8b. E-MAIL ADDRESS
.i 1
DATE (YYYYMMDD)
(b) (6)
(b) (6), (b) (7)(C)
# $
NAME fLasf, First Middle) SSN
Deployment Cycle Support Tasks
DCS VALIDATION
Deployment Cycle Support Tasks
C
O
M
P
L
E
T
E
D
N
O
T
C
O
M
P
L
E
T
E
D
NA
DATE (YYYYMMDD)
SECTION VI - Post - Deployment Stage
Unit Commander / Unit Leadership
Unit Refresher / Army Sexual Assault Prevention and Response training, as required
Individual career counseling provided, as required
Investigations (e.g. Line of Duty, AR 15-6) initiated and completed, as required
Disciplinary and adverse administrative actions finalized, as required
OERs, NCOERs, civilian evaluations, and awards completed, as required
Soldier counseling conducted, as required
Soldiers identified with potential financial issues referred to financial training or assistance
Personnel Reporting System Updated
CIVTRACKS for DA civilians updated
Substance Abuse briefing conducted
Risk Reduction Reintegration Tip Card utilized, as required
Execute reunion and homecoming ceremonies
Safety briefings conducted on POV, etc.
Operator Licenses, registrations, insurance policies, and safety inspections verified
Preseparation counseling (DD Form 2648-1) for RC Soldiers conducted
ACAP services provided to affected Soldiers
Soldiers who PCS and TCS complete the DCS process, as required
Soldiers encouraged to commuicate with family throughout the deployment cycle
Personnel Service Center
DD Form 93 (Record of Emergency Data) updated, as required
VA Fonm SGLV 8285, (Request for Insurance (SGLI)) completed, as required
VA Form SGLV 8286, (Service Member's Group Life Insurance) completed, as required
VA Form SGLV 8285A, (Request for Family Coverage (SGLI)) completed, as required
VA Form SGLV 8286A, (Family Coverage Election (SGLI)) completed, as required
Eligibility for overseas deployment (AR 614-30, Overseas Service) verified, as required
Soldiers and family members educated regarding the impact of personnel policies
Ensured all Soldiers processed con-ectly
RC Soldiers advised of 18-year sanctuary
RC Soldiers reenrolled in MGIB and state tuition assistance programs
MMRB, MEB, PEB conducted, as required
SIGNATURE OF CERTIFYING OFFICIAL 8b. E-MAIL ADDRESS DATE (YYYYMMDD)
DA FORM 7631, MAR 2007 Page 10 of 14
APD VI.00
NAME (Lasf, First Middle) SSN
Deployment Cycle Support Tasks
DCS VALIDATION
Deployment Cycle Support Tasks
C
O
M
P
L
E
T
E
D
N
O
T
C
O
M
P
L
E
T
E
D
NA DATE (YYYYMMDD)
SECTION VI - Post - Deployment Stage (Continued)
Unit Ministry Team / Installation Chaplain
Suicide Awareness and Prevention training conducted, as required
Families with reported stress and separation issues identified, as required
Small group discussions on deployment experiences facilitated, as required
Spouses provided opportunity to take marital assessment
Soldiers complete marital assessment instrument
Post-Deployment Battlemind training for Soldiers conducted
Medical / Dental Health Teams
Individuals screened for medical profile geographic or climate duty limitations, as required
Medical record review conducted
TRICARE benefits briefing conducted
Soldiers with behavioral or health issues refen-ed, as required
Medical Threat briefing conducted, as required
Negative health-related behaviors treated and documented (DD Form 2796), as required
Health care extended to DA civilians for deployment related conditions
DA Form 3349 (Medical Profile) completed
Initial TB Test completed
Serum specimens drawn at return to home station (AA) / and DEMOB Station (RC)
Permanent health record updated with deployment health record
Military Pay Office
Current status of DoD charge card holders reviewed
Travel advance provided for Soldiers with TCS orders
Financial briefings conducted
Allotment changes expedited
BAH for AGR Soldiers adjusted
Entitlements / Special Pay reviewed
SIGNATURE OF CERTIFYING OFFICIAL 8b. E-MAIL ADDRESS DATE (YYYYMMDD)
DA FORM 7631, MAR 2007
Page 11 of 14
APD VI.00
NAME (Last, First Middle) SSN
Deployment Cycle Supp
DCS VALIDATION
Deployment Cycle Supp ort Tasks
C
O
M
P
L
E
T
E
D
N
O
T
C
O
M
P
L
E
T
E
D
NA DATE (YYYYMMDD)
SECTION VI - Post - Deployment Stage (Continued)
Legal Assistance Office
Wills updated, as required
Power of Attorney Provided, as required
Counseling on civil matters provided, as required
Personnel informed on legal rights under Servicemember's Civil Relief Act (SCRA), as required
RC personnel informed on legal rights under SCRA
Legal assistance to RC Soldiers provided, as required
Tax classes / information for spouses provided, as required
Claims for personal property submitted
Installation Management Command
Family Readiness staff shortages (ACS / FAC) identified, as required
AA and RC Family Readiness Groups educated on available services, as required
Families educated about services provided through Military OneSource, as required
Families identified and refen-ed who have experienced major problems, as required
DA civilians referred to the Employee Assistance Program Coordinator, as required
DA civilians informed ofthe Office of Worker's Compensation Programs process
Operation READY Reunion / Reintegration training for Soldiers and spouses
Operation Ready Communication with Spouses, Families, and Children training
Operation Ready Post-Deployment Battlemind training for families completed
DEERS / RAPIDS / ID Card Office
ID Cards / ID Tags updated, as required
DEERS / RAPIDS enrollment completed, as required
SIGNATURE OF CERTIFYING OFFICIAL 8b. E-MAIL ADDRESS DATE (YYYYMMDD)
DA FORM 7631, MAR 2007 Page 12 of 14
APD VI.00
DEPARTMENT OF THE ARMY
US ARMY INSTALLATION MANAGEMENT COMMAND
HEADQUARTERS, UNITED STATES ARMY GARRISON, FORT DRUM
10000 10^" MOUNTAIN DIVISION DRIVE
FORT DRUM, NEW YORK 13602-5000
10 AUGUST 2009
ORDER 222-720
2 ^ BRIGADE COMBAT TEAM (WBDAAA) FORT DRUM, NEW YORK 13602-5000
THE FOLLOWING UNIT ACTION IS DIRECTED: GROUP TRAVEL AND TRANSPORTATION
ACTION: The above Organization is DEPLOYED in a temporary change of station (TCS) as shown below in Support of OPERATION IRAQI
FREEDOM and are to return to your permanent station upon completion ofthe duties in support of this operation. You will submit a reviewed
voucher for this travel to the finance office within 5 working days after retum to home station.
ASSIGNED TO: 2^^ BRIGADE COMBAT TEAM (WBDAAA) UNITED STATES CENTRAL COMMAND AREA OF RESPONSIBILITY (IRAQ
EFFECTIVE DATE: 1 OCTOBER 2009
DEPLOYMENT PERIOD: 365 DAYS OR UNTIL MISSION COMPLETION
ACCOUNTING CLASSIFICATION: SEE ATTACHED ANNEX FOR ACCOUNTING CLASSIFICATIONS
(FY10/11 AVAILABILITY IS CONTINGENT ON CONGRESS ENACTING APPROPRIATIONS OR AUTHORIZING OPERATIONS UNDER A
CONTINUING RESOLUTION)
IMCOM ISSUED CONTROL NUMBER: SEE ATTACHED ANNEX
CIC: SEE ATTACHED ANNEX
MOVEMENT DESIGNATOR CODE: PME10/PMO10
ADDITIONAL INSTRUCTIONS:
(A) This is a temporary change of station (TCS). Normal PCS entitlements, allowances and relocation of family members are not
authorized. Consolidated Personnel Policy Guidance (PPG) for operations Iraqi Freedom, and Enduring Freedom is on the DCS, G-1
web site: http://wvm.armvq1.armv.mi l /mi l i tarvpersonoel /pol i cv.asp
(B) Soldiers are authorized 4 duffle bags- (1) one personal bag, (2) two issued bags of OCIE and 1 standard carry-on bag that meets
AMC/Contracted flights standards. Size maximum 25x42 or Ruck size 15x10x22; with a maximum weight of 50 pounds. When AMC or
contracted transportation is not available, reimbursement of authorized checked baggage on commercial flights weighing more than 50
pounds to a max of 70 pounds per bag authorized as excess baggage. Upon redeployment from theater Soldiers issued additional
OCIE under the Rapid Fielding Initiative (RFI) are authorized a shipment of one additional bag not to exceed 70 pounds, if not
transported as part of a Military shipment Each Soldier will bring only those Items specified by the PPG or other appropriate authority.
You will be provided a list of those items from your company. This is the maximum quantity of authorized baggage; however, fewer
bags can be taken if Soldier can fit equipment and personal items into a lower number of duffle bags. Each duffle bag must not exceed
70 pounds. No footl ockers or commerci al suitcases are authori zed for movemeot. Soldier will only bring those items specified in
chapter 6 of the PPG. Soldier will be provided a list of those items from unit Commander. Reimbursement of authorized checked
baggage on commercial flights weighing more than 50 pounds to a max of 70 pounds per bag authorized as excess baggage.
(C) Government quarters and dining facilities will be used at the Replacement activity and during deployment. Essential unit mess has
been declared by the Assistant Secretary of the Anmy (Manpower and Reserve Affairs) ASA (M&RA) For the Mobilization and
Demobilization Sites not to exceed (10) Days. MOSQ location will provide quarters and mess. The Installation Commander will make
separate determinations as to the availability of mess and quarters and as a last resort will issue a Statement of Non-availability
Statement/Certificate of Non-availability. Per Diem payable is $3.00 per day for CONUS and $3.50 per day for OCONUS. Per Diem will
normally be paid for the travel to gaining station, or Replacement activity unless prohibited by travel circumstances.
(D) For Active Duty Soldiers, basic allowance for housing (BAH) is based upon permanent duty station. For Reserves and Retired
members called or ordered to active duty BAH is based on their principal place of residence wtien called or ordered to the tour of active
duty. Pay entitlements will be based on location IAW DODFMR and applicable messages and regulations.
(E) Unit is required to submit PERSTEMPO Information using flight manifest data. Do not submit departure transactions on unit
deployed. Ensure MDC of "PM" is included.
(F) During period of deployment, gaining/deployed unit Commander has responsibility for personnel service support to include awards
and decorations; UCMJ, and all other forms of personnel and legal administration support except Reserve Component promotion
authority.
(G) Temporary storage of HHG may be authorized, at Government expense for period of contingency operations as provided by
paragraph U4770-A, Joint Federal Travel Regulation for single personnel (both AC and RC), Soldier married to another Soldier when
both are deployed and single Soldier parents when a childcare plan requires dependents to leave the residence. Contact the local
transportation office for assistance. This may impact on the authorization for BAH. Storage of one privately owned vehicle may be
authorized. Soldier must contact the supporting installation transportation officer for requirements. Soldier must complete arrangements
requiring personal presence. Temporary duty (TDY) household goods weight allowance is authorized for CONUS and OCONUS based
on personnel that are on active duty for a period greater than 200 days, excluding those areas designated as hostile fire/imminent
danger pay areas. Contact the Installation Transportation Office, Clark Hall, 2d floor, at 772-6384 for assistance.
ORDER 222-720 t^SAIMCOM HO USAGFORTDRUM,NEWYORI^1^502-5000^ DATED 10 AUG 0^
(H) Soldier Readiness Processing will be accomplished priorto departure from losing installation/home station as stated inAR 61430
(Overseas Service),AR 600 8-10^ (In-Outand Mobilization Processing)ANDDCS,G1PersonnelPolicyGuidancelftheregulations
conflict, follow instructions inAR 614-30 unless otherwise directed by the DCS,G1 PPG.Commanderwill ensure that the completion of
the Readiness Processing requirements and Deployment Checklistwill be included in every 8oldiers Deployment packeL This
requirement includes Soldiers departing onTCS orders individually or asaunlL Soldierwill hand carry out-processing packet; Field
Military Personnel Records Jacket (MPRJ)along with associated transfer documents,records and deployment packet to the gaining
PSC or deployment activity.Deployment packet must contain documents as outlined in the PPG. All Soldiers DD Form 93 and SGLV
must be reviewed and updated as required priorto deployment as stated inAR 600-8-1.MPRJ,Medical and Dental records will not be
forwarded orcan-ied to theater of operations.These records will be maintained atthe servicing home station PSB/MPD.
(I) Passports and VISA are not rec|uired,however,Soldiers9re encouraged to deploy with passport iftheycun-ently have them.
(J)Airtravelan-angements/bookings in conjunction with these orders must be arranged throughaGovernmentTransportation Officer.
Returning Soldiers traveling commercial under emergence conditions must haveaDA FORM 31 annotated that MAC transportation is
notavailableandlssignedbytheTransportation Officer in theater.
(1^) The theaterwill publish amendments to unit and individual orders anytimeaSoldier changes their location out ofthe theater of
operation. Soldiers who have to medically evacuate to Genriany for injury or sickness, orders must be issued to reflect ^n^loc^ili^^^
changes. IfaSoidier is evacuated to Germany for treatment and then further evacuated to CONUS for additional treatment, the hospital
in Germany must then publish orders.The immediate Command authority who controls the Soldier must publish orders to keep track of
SoldieBsmovemenL In addition to orders,aLine of Duty investigation must be initiated to cover injury/sickness to ensure Soldiers
receive con-ect entitlements.
(L) The return ofwartrophies to the states is prohibited. Soldiers will not accept^ANY SOLDIER MAIL"fortransport to theater of
operations.
(M) Use of leave during this deployment is recommended for all Soldiers Acopy of the leave record will be submitted upon completion
of this operation during this period with the final settlement voucher.lf Unable to take leave during this period,apayment of unused
leave is authorized with no impact to career leave sell back of60 days.
FORMAT:745
FOR THE COMMANDER:
* OFFICIAL
*FORTORllM,NY*
ic -k ie -k if -k -k -k -k
JAMES A. SWORDS
CHIEF, MILITARY
PERSONNEL DIVISION
DISTRIBUTION
INDIV (187)
CDR, 2D BCT, ATTN: SI , FORT DRUM, NY(1)
DIRECT INQUIRIES CONCERNING THIS ORDER TO PERSONNEL SERVICE BRANCH, FORT DRUM, NEW YORK DSN: 772-5631.
SSN ANNEX ORDER 222-720, DTD 10 AUGUST 2009
HHC 2D BCT
m
NAME SSN GRADE UIC UNIT
ABEL DANIEL BENJAMIN SPC WBDAAA HHC 2BCT
ADAMS JASON DELACE MAJ
WBDAAA HHC 2BCT
ADKINS PAUL DAVID
MSG WBDAAA HHC 2BCT
AIKEY ADAM JASON
SGT WBDAAA HHC 2BCT
APPLEWHITE LORNCE LAMONT JR SGT
WBDAAA HHC 2BCT
ARMSTRONG SHAWNE PATRICK MAJ WBDAAA HHC 2BCT
BAKER ERIC STEPHEN
PFC WBDAAA HHC 2BCT
BALDWIN MELVIN JAMES
SSG WBDAAA HHC 2BCT
BALONEK KYLE JACOB
SSG WBDAAA HHC 2BCT
BARNETT CLIFTON C
2LT
WBDAAA HHC 2BCT
BENJAMIN JAMAL JONATHAN
SFC WBDAAA HHC 2BCT
BENTHAL JOSEPH MATTHEW
SGT WBDAAA HHC2BCT
BLUE SHERLONDA LAJUNE
SFC WBDAAA HHC2BCT
BOURNE RICHARD ALLEN
SGT WBDAAA HHC2BCT
BOUVIA PETER HOWARD
SGT WBDAAA HHC 2BCT
BRYAN BRANDON MARCEL
SPC WBDAAA HHC 2BCT
BURRETT JENNIE MARIE SGT
WBDAAA HHC2BCT
BUSH HAROLD MARK
SSG WBDAAA HHC 2BCT
CALLAGHAN JOSEPH MICHAEL SGT WBDAAA HHC 2BCT
CALZADA ROBERTO SSG WBDAAA HHC 2BCT
CARDOZO FELIPE ANTHONY CW2 WBDAAA HHC 2BCT
CAUDLE SHAWN MAURICE SFC WBDAAA HHC 2BCT
CHAMPAGNE ROBERT THOMAS SPC WBDAAA HHC 2BCT
CHARITY HERBERT NELSON LTC WBDAAA HHC2BCT
CHRABOT MICHAEL PETER
SPC WBDAAA HHC 2BCT
CLAUSEN CLIFFORD DALE MAJ WBDAAA HHC 2BCT
COBBS JOE EDDIE MSG WBDAAA HHC 2BCT
COLLINS BETH ANN SPC WBDAAA HHC 2BCT
COLLINS COUNTEE III PFC WBDAAA HHC 2BCT
PFC WBDAAA HHC 2BCT
DALBEY JOHN DRYDEN MAJ WBDAAA HHC2BCT
DEAN EARL CLAYTON JR 2LT WBDAAA HHC 2BCT
DEBLOIS ROBERT RICHARD SGM WBDAAA HHC 2BCT
DELAPAZ CARLOS MANUEL JR SPC WBDAAA HHC 2BCT
DISILVIO MICHAEL SPC WBDAAA HHC 2BCT
DOLLARHIDE ERIC JAMES SGT WBDAAA HHC 2BCT
DOUGLAS DUSTIN JAMgS PFC WBDAAA HHC 2BCT
DREHER ELIJAH ARUNDEL CPT WBDAAA HHC 2BCT
EARLY WILLIAM DOUGLAS SPC WBDAAA HHC 2BCT
EASTEP CHAD EVERICK W01 WBDAAA HHC 2BCT
EHRESMAN JOSHUA DAVID W01 WBDAAA HHC2BCT
ELDER FIANDALL PAUL SPC WBDAAA HHC2BCT
ERICKSON SETH JOSEPH CPL WBDAAA HHC 2BCT
FIELDS ELIZABETH A 2LT WBDAAA HHC 2BCT
FORD ROLAND CLAYTON 111 MAJ WBDAAA HHC 2BCT
FORSYTH JOHN ANDREW CPT WBDAAA HHC 2BCT
FREEBURG MATTHEW WAYNE CPT WBDAAA HHC 2BCT
GERHARDT BRANDON SCOTT
CPL WBDAAA HHC 2BCT
GORDON KEITH D JR
SFC WBDAAA HHC 2BCT
GRAHAM HOOD DAMESHA LASHAWN
SGT WBDAAA HHC 2BCT
GRAHAM WILLIAM ROGER
CW4 WBDAAA HHC2BCT
Page 1 of 4
(b) (6)
(b) (7)(C), (b)
(6)
SSN ANNEX ORDER 222-720, DTD 10 AUGUST 2009
HHC 2D BCT
NAME SSN GRADE UIC UNIT
GUERRERO DORIAN
PV2 WBDAAA HHC 2BCT
GUERTIN ANDREW DAVID
PFC WBDAAA HHC 2BCT
GUTIERREZ DAVID MANUEL SGT
WBDAAA HHC 2BCT
HACK HONDO JUSTIN
CW2 WBDAAA HHC 2BCT
HAGY DANIEL AARON
SGT
WBDAAA HHC 2BCT
HAMBLETON JOSEPH MICHAEL
PFC
WBDAAA HHC 2BCT
HANSEN THOMAS RANDALL
SFC WBDAAA HHC 2BCT
HEATON RALPH DAVID
MAJ WBDAAA HHC2BCT
HICKS CODY DALE
SPC WBDAAA HHC 2BCT
HOLLINGSWORTH KOHLBY ANTHON PFC WBDAAA HHC 2BCT
HORN KEVIN SCOTT II
PFC WBDAAA HHC 2BCT
HOYER BRODIE K
CPT WBDAAA HHC 2BCT
HYDE TIMOTHY ALAN
MAJ WBDAAA HHC 2BCT
IRISH ERIC LEE SFC WBDAAA HHC 2BCT
JANDA JAMES ANDREW MAJ
WBDAAA HHC2BCT
JOHNSON BRANDON RAY SGT
WBDAAA HHC 2BCT
JOHNSON PAULINE ADELL SPC WBDAAA HHC 2BCT
JOHNSON SUMMER PAIGE PV2 WBDAAA HHC2BCT
JONES JOSHUA G HENR SGT WBDAAA HHC 2BCT
JOY DAN TODD PV2
WBDAAA HHC 2BCT
KARST WAYNE ALLEN SSG WBDAAA HHC 2BCT
KEETON JEREMIAH LEE SSG WBDAAA HHC 2BCT
KELLEHER JAMES ANDREEW SGT WBDAAA HHC 2BCT
KERNS BRIAN DOMENIC MAJ WBDAAA HHC 2BCT
KJELSHUS SHERWIN H CW2 WBDAAA HHC 2BCT
KLUMP DARYL PAUL SGT WBDAAA HHC 2BCT
KOOL JASON ELLIOT SFC WBDAAA HHC 2BCT
KUBIC MICHAEL ALLEN PFC WBDAAA HHC 2BCT
LANDON JEREMY WILLIAM PFC WBDAAA HHC2BCT
LEARY CRAIG PAUL PFC WBDAAA HHC 2BCT
LEELOY DANIEL JAMESROUSSEAU PFC WBDAAA HHC 2BCT
LEWIS ANDREW R CPT WBDAAA HHC 2BCT
LEWIS JAMIE LEE SGT WBDAAA HHC2BCT
LEWIS SCOTT JOSEPH SPC WBDAAA HHC2BCT
LIGGETT CLAYTON EDWARD SGT WBDAAA HHC2BCT
LINDSAY CHADD JOSEPH SSG WBDAAA HHC 2BCT
LIPPINCOTT KEVIN ALAN SSG WBDAAA HHC 2BCT
LODER THOMAS ANDREW SGT WBDAAA HHC 2BCT
LONG FREDRICK JEROME SFC WBDAAA HHC 2BCT
LONG JAMES ROBERT II SGT WBDAAA HHC2BCT
LOPEZ ELIZABETH LAUREL CPT WBDAAA HHC 2BCT
LUSKJEREMY ALAN SGT WBDAAA HHC 2BCT
LYONS ALFRED BENJAMIN CW2 WBDAAA HHC2BCT
MACKLIN CARLA LA VERNE SFC WBDAAA HHC 2BCT
MACLEAN KEVIN RICHARD SSG WBDAAA HHC 2BCT
MAGESTRO MARK LOUIS SGT WBDAAA HHC2BCT
MALINOWSKI MARK JOSEPH
SSG WBDAAA HHC2BCT
MANIBUSAN CARL JOHN
SSG WBDAAA HHC 2BCT
MANNING BRADLEY EDWARD
PFC WBDAAA HHC 2BCT
MARIUR JENSON CHADDY
SGT WBDAAA HHC2BCT
MARSHALL KYRA JAREE
SPC WBDAAA HHC 2BCT
Page 2 of 4
(b) (6)
SSN ANNEX ORDER 222-720, DTD 10 AUGUST 2009
HHC 2D BCT
NAME SSN GRADE UIC UNIT
MATTEO DAVID YOUNG SFC WBDAAA HHC 2BCT
MAY KIMBERLEIGH ANNE PFC WBDAAA HHC 2BCT
MCCANN CECILIA AGNES
CW2 WBDAAA HHC 2BCT
MCFARLANE JUSTIN AARON
SPC WBDAAA HHC 2BCT
MCPHEETERS JOSEPH PATRICK
CPL WBDAAA HHC2BCT
MILLER DAVID MATTHEW
COL WBDAAA HHC2BCT
MILLER JONATHAN PAUL MAJ
WBDAAA HHC 2BCT
MILLER RUSSELL RAY
SGT WBDAAA HHC 2BCT
MINCKLER RYAN E
CPT WBDAAA HHC2BCT
WBDAAA HHC 2BCT
MITCHELL XAVIER
SGT WBDAAA HHC2BCT
MOLL MICHAEL BRYAN
PFC WBDAAA HHC2BCT
MONTGOMERY LATONYA WATNETOR CW2 WBDAAA HHC 2BCT
MONTOUR JOSEPH ALLEN CSM WBDAAA HHC 2BCT
MOORE JON PATRICK
MAJ WBDAAA HHC 2BCT
MOORE MICHAEL RAY SGT WBDAAA HHC2BCT
MORGAN RYAN JOSEPH MAJ WBDAAA HHC 2BCT
MORRIS BRYAN JOHNSTONE PFC WBDAAA HHC 2BCT
MORRIS WATEMON MAURICE JR SGT WBDAAA HHC 2BCT
MORROW JASON ANDREW MAJ
WBDAAA HHC 2BCT
MOY CHRISTOPHER RYAN SGT
WBDAAA HHC 2BCT
NAYLOR WILLIAM E III SPC WBDAAA HHC 2BCT
NIVEN JAMES RANDALL
PFC WBDAAA HHC 2BCT
OAKLEY BRYAN KELLY SSG WBDAAA HHC 2BCT
OWENS MICHAEL JOSEPH PFC WBDAAA HHC 2BCT
PARKER MARCUS THOMAS PV2 WBDAAA HHC 2BCT
PARSONS MATTHEW AARON SGT WBDAAA HHC2BCT
PATE CAITLYN NOEL PFC WBDAAA HHC 2BCT
PAYNE DOMINIQUE DEAIRA PFC WBDAAA HHC 2BCT
PEARSON BRANDON MICHAEL PFC WBDAAA HHC 2BCT
PEDIGO JOSEPH ALEXANDER SGT WBDAAA HHC2BCT
PENAFIEL JOE CARLO MCBRIDE CW2 WBDAAA HHC 2BCT
PERALTA JOHNNY FRANKIE SFC WBDAAA HHC 2BCT
PERSON KENNETH ANDREW PFC WBDAAA HHC 2BCT
PINKINS AKEYRA SHARMAINE PFC WBDAAA HHC 2BCT
PITRE SAMARA LYN MSG WBDAAA HHC 2BCT
PRICE TERRELL LEE SSG WBDAAA HHC 2BCT
PROCHNIAK SCOTT EDWARD CW3 WBDAAA HHC 2BCT
RIDER STEVEN MICHAEL SFC WBDAAA HHC 2BCT
RIGGINS CORY DEMOND SSG WBDAAA HHC 2BCT
RIVERA DAGOBERTO LOPEZ PFC WBDAAA HHC 2BCT
RIVERA KHRYSTIARFIA BROOKE PFC WBDAAA HHC 2BCT
ROQUE JAZEL AGNI SPC WBDAAA HHC2BCT
ROSE MICHAEL GLEN SFC WBDAAA HHC 2BCT
RUSHING NATASCHA RACHEL SPC WBDAAA HHC2BCT
SACCOMEN FRANK TONY III
SGT WBDAAA HHC 2BCT
SALAZAR KENNETH ALLEN SPC WBDAAA HHC 2BCT
SAMUELSEN ROBERT ERLING 11
MAJ WBDAAA HHC 2BCT
SAVAGE ALAN THOMAS
MAJ WBDAAA HHC 2BCT
SCHMAL JOSHUA MICHAEL
PV2 WBDAAA HHC 2BCT
WBDAAA HHC 2BCT
Page 3 of 4
(b) (6)
(b) (6)
(b) (6)
SSNANNEXORDER222 720, DTD 10AUGUST 2009
HHC 2D BCT
NAME SSN GRADE UIC UNIT
SCHWIND JEFFREY SCOTT SFC WBDAAA HHC2BCT
SEXTON JACKIE RAY PFC WBDAAA HHC2BCT
SHAKESPEARE ERICSEVERT SSG WBDAAA HHC2BCT
SHARPEBRANDYLYNN SGT WBDAAA HHC2BCT
SHEPPARD DANIELLE ERICKA SGT
WBDAAA HHC2BCT
SHOWMAN JIHRLEAHWITTNEY SPC WBDAAA HHC2BCT
SMITH ADAM RICHARD SSG WBDAAA HHC2BCT
SMITH JAMES LORENZO SPC WBDAAA HHC2BCT
SMITH LEROYOLANZO SSG WBDAAA HHC2BCT
STEELE HEIDI MIRANDA CPT WBDAAA HHC2BCT
STOLLKEVINJOSEPH MAJ WBDAAA HHC2BCT
STONERTODDJAMES SSG WBDAAA HHC2BCT
SULLIVAN MAUREEN BROOKE PFC WBDAAA HHC2BCT
SUTFIN JOSEPH WILLIAM SPC WBDAAA HHC2BCT
TAUAJULIAMARIE SSG WBDAAA HHC2BCT
TAYLOR WANDLYND CPT WBDAAA HHC2BCT
TILLMAN WILLIAM JOSEPH SGT WBDAAA HHC2BCT
TITUS JASONANDREW PFC WBDAAA HHC2BCT
TRAUTWEIN ALEX JAMES PFC WBDAAA HHC2BCT
TREECE RICKY NEAL SFC WBDAAA HHC2BCT
TRUDELBRANDONDARRYL SGT WBDAAA HHC2BCT
URIBE JORGE UVALDO SFC WBDAAA HHC2BCT
USBECKERIC HELMUT 1SG WBDAAA HHC2BCT
WALSH SHERI MICHELLE PFC WBDAAA HHC2BCT
WARYWILLIAM FRANKLIN JR SSG WBDAAA HHC2BCT
WATERMANAARON JAMES PV2 WBDAAA HHC2BCT
WEBB NATHEN DARIN SPC WBDAAA HHC2BCT
WEBER THOMAS ROBERT PV2 WBDAAA HHC2BCT
WILCOX JUSTIN ROBERT SGT WBDAAA HHC2BCT
WILLIAMS ALLAN GLENN SGM WBDAAA HHC2BCT
WILLIAMS LATOYADANIELLE SSG WBDAAA HHC2BCT
WILSON DARYL DAVID JR PFC WBDAAA HHC2BCT
YOUNGS MICHAEL THERONJR SFC WBDAAA HHC2BCT
ZHAO MING SPC WBDAAA HHC2BCT
Page4of4
(b) (6)
If'ill'St
L,
rn*
o o
E
>
o
o
o
c
3
>
z
z
5^
9
o
>
c
o
c
tfl
(b) (6)
S I :
l o o t
>
o
o
o
c
5
>
z
z
S3
o
71
i i
o
o 3
I o o <
>
c
o
c
CO
^#
(b) (6)
(b
)
(6
)
I
j ^i w^
>
o
o
o
c
z
H
I
z
o
X
i i
8 ;
q
9
o
>
c
o
c
cn
WlMjL:
(b) (6)
(b
)
(6
)
^
^ ^ ^ ^
^ ^ ^ ^ ^ ^ ^ ^ ^ ^
^c:^^^c:^^^^^^
^ ^ ^ 1 ^ ^ ^ ^ ^ ^ ^ to CD <D (D (D
^ CO r r c CD
a o D c a
CD CO CO CO cc
ID (O CD CO
O C3 O O o
O O O O CIS _ _ ^
O O O O O O O O O O
i c b o c b c b o t b o i i i
N ^ , , _
o o o o o o o o o
M ro t o M
SSS
K K
2 g s s s sFsl f
t i o o o - ' c o l v j r o
o o o o ro to
M ro ro N)
o o o o o
o o o o o
o o o o o o o o o
o o o o o o o o o
" " " " " o o o o o o .
_ 0 0 0 0 0 ' ~ ' ~ *
o o o o o
OD 03 03 DD C7
m CD 03 CD 03 CD 0] CD
C i O O O O O O O O C i
W W W C J W W W W W
Ln Ul t n c/i'
r 3 h 3 f 3 r 3 f 3 f 3 r 3 f 3
s s
CO CD W O
IS) N) ro M N) o
O g l O O O O NJ fO
<[i\< < < <
7 ) 7 ) 7 ^ 7 1 = =: ^^
D D D D , ^ S S a
2 2 2 2
IV t i !S
m m m N> |v
S 5
g g
>
o
o
o
c
3
>
z
z
o
71
i i
o K
n
o
>
c
o
c
cn
- I
(b) (6)
RECOMMENDATION FOR A^ARD
For use of this f orm, see HODA Letter 600 06 1;the proponent agency is DCS , Gl .
For valor/iieroism/wartime and all awards higher than MSM, refer to special instructions in Chapter 3, AR 600-8-22.
1. T0
CDR, 2nd BSTB, 10th MTN DIV (LI)
APO AE 09308
2. FROM
CDR, HHC, 2nd BCT, 10th MTN DIV (LI)
APO AE 09308
3. DATE (YYYYMMDD)
PART I - SOLDIER DATA
4. NAME (Lasf, First, Middle Initial)
MANNING, BRADLEY E.
5. RANK
SPC
6. SSN
7. ORGANIZATION
HHC, 2nd BCT, 10th MTN DIV (LI) (WBDAAA)
APO AE 09308
8. PREVIOUS AWARDS
NO AWARDS
9. BRANCH OF SERVICE 10. RECOMMENDED AWARD
AAM
11. PERIOD OF AWARD
a. FROM
20091012
b. TO
20100601
12. REASON FOR AWARD
M
12a. INDICATE REASON
SVC
12b. INTERIM AWARD YES
IF YES, STATE AWARD GIVEN
NO 12c. POSTHUMOUS
YES Q NO ^
13. PROPOSED PRESENTATION DATE
(YYYYMMDD)
20100630
PART II - RECOMMENDER DATA
14. NAME (Last, First. Middle Initial)
ADKINS, PAUL D.
16. TITLE/POSITION
S2 NCOIC
17. RANK
MSG
15. ADDRESS
HHC, 2nd BCT, 10th MTN DIV (LI)
APO AE 09308
18. RELATIONSHIP TO AWARDEE
SUPERVISOR
19. SIGNATURE
J/c:>.
PART III - JUSTIFICATION AND CITATION DATA (Use specific bullet examples of meritorious acts or service)
20. ACHIEVEMENTS
ACHIEVEMENT #1
SPC Manning worked as the night shiti Violent Extremist Analytical Team Lead. In this capacity, he assisted in the Brigade Commander
better understanding the Promise Day Brigade in Zafraniyah. His research and efforts led to the identification of the structure in which
this particular group conducted operations and how they targeted United States Forces. His research greatly assisted the subordinate unit
with accurate information that led to the disruption of the organization.
ACHIEVEMENT #2
SPC Manning's persistence led to the disruption of Former Special Groups (FSG) in the New Baghdad area. SPC Manning's tracking of
targets led to the identification of enemy support zones that were previously unknown. His analysis led to heavy targeting of insurgent
leaders in the area. This effort consistently disrupted their operations. SPC Manning's dedication led to the detention of a Tier-2 level
FSG individual within the Commando OE.
ACHIEVEMENT #3
SPC Manning labored to unravel the Tactics, Techniques and Procedures of the enemy smuggling lines from Iran into Commando OE.
SPC Manning identified key routes that were being utilized as well as support zones that aided in the transportation of explosively-formed
penetrators (EFPs), Katyusha rockets and various small arms. His analysis aided subordinate units in their plans to disrupt these
operations and minimize the flow of these systems into Baghdad.
ACHIEVEMENT #4
SPC Manning was instrumental in assisting the Brigade S2 and S3 plans sections in regards to mission analysis. SPC Manning produced
20 products for three briefings on topics including enemy situation, future enemy operations and current threat assessments. SPC
Manning's in-depth analysis of the areas he covered provided the Brigade S2 and S2 Planner vital information required to lead ground
forces to successful mission accomplishment.
21. PROPOSED CITATION
FOR EXCEPTIONALLY MERITORIOUS SERVICE BETWEEN 11 October 2009 AND 15 July 2010. SPECIALIST BRADLEY E.
MANNING'S OUTSTANDING DEDICATION TO SERVICE, PROFESSIONALISM AND EXCEPTIONAL DUTY PROFICIENCY
CONTRIBUTED GREATLY TO THE SUCCESS OF COMMANDO BRIGADE'S MISSION. HIS ACTIONS ARE IN KEEPING WITH
THE FINEST TRADITIONS OF MILITARY SERVICE AND REFLECT GREAT CREDIT UPON HIMSELF, HEADQUARTERS AND
HEADQUARTERS COMPANY, SECOND BRIGADE COMBAT TEAM, UNITED STATES DIVISION - CENTER, AND THE UNITED
STATES ARMY.
DA FORM 638, APR 2006
REPLACES DA FORM 638-1.
PREVIOUS EDITIONS OF DA FORM 638 ARE OBSOLETE.
Page 1 of 3
APD PE V2.00ES
(b) (6), (b) (7)(C)
NAME (Lasf, First, Middle Initial)
MANNI NG, BRADLEY E.
SSN
PART IV - RECOMMENDATIOr IS/APPROVAL/DISAPPROVAL
22. / certify that this individual is eligible for an award in accordance with
AR 600-8-22; and that the information contained in Part 1 is correct.
22a. SIGNATURE .
\A nu!:^
22b. DATE (YYYYMMDD)
23. INTERMEDIATE
AUTHORITY
a. TO CDR, 2nd BSTB, 10th MT N DI V ( LI )
APO AE 09308
b. FROM CDR, HHC, 2nd BCT, 10th MTN
APO AE 09308
C. DATE (YYYYMMDD)
d. RECOMMEND:
?^
APPROVAL DISAPPROVAL UPGRADE TO: DOWNGRADE TO:
e. NAME (Last, First. Middle Initial)
FREEBURG, MATTHEW W.
f. RANK
CPT
g. TITLE/POSITION
COMPANY COMMANDER
h. SIGNATURE
VXi Ml W) UO. - \ r r \ j i r \
i. COMMENTS SV
24. INTERMEDIATE
AUTHORITY
a. TO b. FROM C. DATE (YYYYMMDD)
d. RECOMMEND: APPROVAL DISAPPROVAL UPGRADE TO: DOWNGRADE TO:
e. NAME (Lasf, First. Middle Initial) f. RANK
g. TITLE/POSITION h. SIGNATURE
i. COMMENTS
25. INTERMEDIATE
AUTHORITY
a. TO b. FROM C. DATE (YYYYMMDD)
d. RECOMMEND: APPROVAL DISAPPROVAL UPGRADE TO: DOWNGRADE TO:
e. NAME fLasf, First, Middle Initial) f. RANK
g. TITLE/POSITION h. SIGNATURE
i. COMMENTS
26. APPROVAL
AUTHORITY
a. TO ORDERS I SSUI NG AUTHORI TY b. FROM CDR, 2nd BSTB, 10th MT N DI V ( LI )
APO AE 09308
C. DATE (YYYYMMDD)
d. % APPROVED DISAPPROVED RECOMMEND UPGRADE TO: DOWNGRADE TO:
e. NAME (Last. First. Middle Initial)
WALTER, PAUL R.
f. RANK
LTC
/ /
g. TITLE/POSITION
BATTALION COMMANDER
h. SIGNATURE y y " /
yZiX^X^^
i. COMMENTS / / , - - ^ "
PART V - ORDERS DATA
27a. ORDERS ISSUING HQ
2nd BRI GADE SPECI AL TROOPS BATTALI ON, 10th MOUNTAI N
DI VI SI ON
27b. PERMANENT ORDER NO. 31. DISTRIBUTION
1-FiIe
1-OMPF
1-Unit
3-Individual
28a. NAME OF ORDERS APPROVAL AUTHORITY
HOLMAN, JAMES E.
28b. RANK
I LT
31. DISTRIBUTION
1-FiIe
1-OMPF
1-Unit
3-Individual
28c. TITLE/POSITION
ADJUTANT
29. APPROVED AWARD
31. DISTRIBUTION
1-FiIe
1-OMPF
1-Unit
3-Individual
28d. SIGNATURE 30. DATE (YYYYMMDD)
31. DISTRIBUTION
1-FiIe
1-OMPF
1-Unit
3-Individual
DA FORM 638, APR 2006 Page 2 of 3
APD PE V2.00ES
(b) (6), (b)
(7)(C)
n
o
C/3 o
X
>
2
2
m
70
;
o
o
o
u>
o
00
11
S.-
H t o
>
_ <
3s
o
<
o
<
m
Z
H
X
w
o
a
>
<
o
n
C
Z
m
t o
o
T I
O
o
H
O
CO
rn
73
t o
o
o
\ o
H
O
c
z
m
to
o
1/3 m
H
>
H
m
GO
>
JO
C/3
O
o
2
- 0
>
Z <
t n
7)
<
C/3 O
^
2 5
?o m
C- "n
? D
>
Z
H
g
>
Z
o
n
m
>
z
D
JO
rn
-n
r
m
n
H
O
g
P%
m n
>
n
H
O
z
m
r >
X ^
^ z
O 7^
O tn
t n
TJ
Z
o
^
H
X
H
X
t n
n
Z
tn
Ol
H
O
c
H
C/3
H
>
Z
g
z
o
o _
S m
i
H
O
( / ]
tn
70
1^
2
H
o
TO
O
c
C/3
c/)
t n
?3
<
n
n ^
t n CO
tn 5
C/3 Z
( / ]
>
r
Xn
2
>
z
o
t n
X
n
t n
- 0
H
I
>
r
O
G
H
<
13
?0
O
2
n
m
z
n
<
n
i
H
2
5
c
H
t n
a
X
m
>
O
o
c
>
3
m
Ti
in
>
Z
o
X
PI
>
D
o
c
>
H
pq
7!
i f i p ]
O
o
I S
CO
O
>
o
PI
n
o
2
CO
>
H
H
pq
>
t X
% g
M o
> I
3
S H
^ 1
> =
n ^
S 5
W 5
""-1
M 3
g 3
M ]
% :
H X
^ 2
5 X
c ^
^ ;
^
m
5
X
A
:g
I o
n
>
i ] j
= w /
(b) (6)
*
(b) (6)
(b) (6)
(b) (6)
RECORD o r rAOCEEDINGS UNDER ARTICLE UCMJ
For use of this fonn. ae AR 27-10. Chapter 3: th proponent agency is uTJAO-CL
NAME ft SSN
MANNING. Bradley E.
GRADE
E4
UNIT ft LOCATION
HHC. 2d BCT.
COS Hammer. Iraq APO AE 09308
MONTHLY BASE PAY
$2,086.30
I I sm considering whether you should be punished under Aiticie 15.1ICMJ. for ihe following misconduct:
In that you, did. al COS Hammer. Iraq on or about 8 May 2010. unlawfully strike SPC Jihrlcah Shoman in the face with a
closed fist. This is in violation of Ar t kk 128. UCMJ
(END OF CHARGES)
2. Page three of this form lists your rights and the maximum punishment thai may be imposed. In deciding what to du. you have the right to
consult with legal counsel located si USA Trial Defense Service. Camp Liberty. Iraq APO AE 09344 You now hsvc 4* hours to decide
what to du.
DATE NAME. RANK. ANO ORGANIZATION OF COMMANDER
MAn HEW W. FREEBURG. CPT. HHC. 2D BCT W ^ f ^ X' X . - ^ / ^ t ^
SIGNATURE
3. Having been affoided the opportunity lo consult with counsel and understanding my rights listed on page three of this form, my decision is as
M\ovi%iJbiiiia( apprfipriair MiKkx. JaHf. amlsinn)
a. te^*4emaad trial by court-manial.
b. |y^<] I do not demand trial by court-martial and in the Article 15 proceedings:
% ^/H request the hearing be L_JOpen. losed.
r.?; A person to speak in my behalf r~~| Is ^ y j ^ ^ l s not requested.
(3) Matters in defense, extenuation, and/or mitigatioa:
[Are not presented. ^ , J Are attached. |, I Will be presented in person.
DATE
^ AjAJ ,C
ANO RANK OF SERVICE MEMBER
BRADLEY E. MANNING. SPL
SK3NATURE
"27
4a. In a(nl | | Open n y f Closed hearing, having considered all mstten presented, I hereby make the Mm wing findings:
fr7]^*ftuih\-of All [~~| (iuitl) of Some Spccifkalionx I j \ ol Uullly of All SpLX-ltkations (line <xit all
l / > Spccilicstions | | (line out Not <iuilt> Spccidcstions) | | SpecificalinnN and Mgn below)
Based on my findings. I impose the punishments thai arc officially recorded in Item 6 of this form
4b. I direct thst this DA Fonn 2627 be filed in the
Performance flchc
ofthe OMPK.
Restricted fiche ofthe OMPF.
B
^ r NA as Soldier was an F,-4 or below al start of
proceedings.
4c. You are advised of your right lo appeal to the next superior authority: Cdr. 2d BSTB within five (5) calendar days.
An appeal made after that lime may be rejected as untimely. Punishment Is effective immediately unless otherwise staled in Item 6.
DATE
7
NAME. RANK. ANO ORGANIZATION OF COMMANDER
MATTHEW W FREEBURG. CPI. HHC, 2D BCT
SIGNATURE
%
tInilMiappropriufe Mock lialc. and.^ign)
Vft ^ . I 1 I appeal but do nol submit additional
M So not appeal. ^
I appeal and suhmii additional matters.
lo
NAME OF SERVICE MEMBER
BRADLEY E. MANNING
SIGI
DA FORM 2C27 (T#*t) NOV 04 Pag* 1
(b) (6)
NAME ft SSN
MANNING. Bradley I . .
GRADE
1-4
UNrr ft LOCATION
HHC. 2d BC I .
COS Hammer. Iraq APO AE 09308
6. The following punishment is imposed: Reduction to the Grade of E3: Forfeiture of S446.00 pay per month for one month.
7 I have considered the appeal and il is my opinion thai:
DATE NAME RANK AND ORGANIZATION OF REVIEWING JUDGE ADVOCATE SIGNATURE
8. After consideration of all natters presented in the appeal, the appeal is:
1 i Denied. 1 J Granted as follows:
DATE NAME RANK. AND ORGANIZATION OF COMMANDER SIGNATURE
Q. 1 have seen the action taken on my appeal.
DATE NAME OF SERVKE MEMBER SIGNATURE
10. ALUEDDOCUMENTSANOiORCOMMENTS:
1. DA Form 4856
2. DA Form 2823 (x 4)
3. DA Form 3881
4. Flag
5. I RR
W/ M
DA FORM 2627 ( TMt ) NOV 04 Pag* 2
(b) (6)
ARTICLE 15 PUNISHMENT WORKSHEET
Soldier's Data: SPC MANNING. Bradley E.. HHC. 2d BC I . COS Hammer. Iraq APO AE09308
Imposing Commander: CPT Matthew W. Freeburg Type of Article 15: Company Cirade Artick 15
Redaction: Soldier may be reduced to H3.
Forfeiture: Maximum of 7 days' pay for one month, not to exceed the following:
If no reduction imposed: $486.00
If Soldier reduced to E3 (whether or not suspended): $446.00
Deprivation of Liberty Punishments:
Extra Daty: Maximum of 14 di^s. May be combined with Restriction.
Restrictioa: Maximum of 14 days. May be combined with Extra Duty. When combined, the maximum
period cannot exceed the maximum period allowed for Extra Duty.
Reprimand: May be an oral or written reprimand.
Any punishment may be suspended for up to 180 days.
PUNISHMENT IMPOSED:
Reduction to the Grade of: ^ 3 If suspended, then (suspended for N J A days) or (reduction below the
Cirade of k j ^ suspended for ^jA^ days).
Forfeiture of $ ^ ^ ^ A ^ ^ (suspend $ N A of the forfeiture for the number of months selected for a period of
t Hh. . . _ (kys).
Extra Duty for w A days, (suspended for MA- days).
Restriction for t j A days, (suspended for .>A days).
(Normal limits are Company area, Dining/Medical Facility, Place of Worship, and Place of Duty)
Reprimand |JA (Oral voA )(Written tyj A )
(Reprimands for enlisted Soldiers may be oral or written and oral is typically appropriate. Reprimands of
commissioned or warrant officers must be in writing.)
Dale Pwmhment Im/M.sed: ' ^' ^^ P (DmmanJer \ Initials: JUiwF
Cp
DD^D
DEPARTMENT OF THE ARMY K i
THEATER FIELD CONFINEMENT FACILITY D ^ 3> ^
CAMP ARIFJAN, KUWAIT /> C -7 ^
APO AE 09366 ^ ^ 6 0
l-gSD
REPLY TO
ATTENTION OF
ACEN-ASG-KU-TFCF-CDR I October 2009
MEMORANDUM FOR DISTRIBUTION
SUBJECT: Theater Field Confinement Facility (TFCF) requirements for processing U.S. Military/DoD Prisoners
1. The purpose of this memorandum is to facilitate the processing of U.S. military prisoners to the TFCF. TFCF's
primary mission is to detain, confine, protect, and sustain both Pre- and Post-Trial U.S. military prisoners, as well as
to assist Commanders throughout the CENTCOM AOR in maintaining good order and discipline within their units.
Commanders ordering a Service Member (SM) to confinement shall familiarize themselves with unit responsibilities
as outlined in AR 27-10, Military Justice, and AR 190-47, The Army Corrections Systems. It is highly
recommended that Commanders also consult with their respective Staff Judge Advocates (SJA) prior to transporting
SM's to Camp AriQan for confinement.
2. Unit Commanders shall ensure the SM ordered to confinement has been screened by medical personnel and the
results documented in blocks 9 and 10 on their DD Form 2707 (Sep 2005), Confinement Order, within 5 days of
reporting to the TFCF indicating the SM is fit for confinement. Female SM's must have a pregnancy test completed
within 48 hours prior to arriving at the TFCF and the results annotated on the Confinement Order. In the event of a
positive test, Commanders must contact the TFCF Prisoner Services Branch (PSB) immediately to arrange transfer
to an appropriate medical facility.
3. Direct coordination between the SJA representing the Command and the TFCF PSB prior to the escorts departure
fi-om the unit is mandatory as directed by AR 190-47. Commands shall also electronically scan and email all
required intake documentation to the TFCF PSB points of contact listed in paragraph 9 prior to the escorts'
departure. Escorts arriving at the TFCF with missing, incomplete, and/or incorrect documentation will likely result
in delaying the acceptance and processing of the prisoner.
NOTE: An error-free Confinement Order (with original signatures and no whiteout corrections) is required
for prisoner acceptance and will be retained by the TFCF.
4. Commands shall provide complete Unit Contact Information (enclosure 1) in order to ensure reliable
communication throughout the confinement process. In the event a prisoner is transferred to a CONUS facility, the
TFCF PSB will provide a copy of their reassignment orders to the parent command once the move is completed.
5. The following documentation is required prior to the SM being accepted for confinement:
a. Pre-Trial
*^ 1) DD Form 2707 (Sep 2005), Confinement Order, as described in paragraph 2 above
AM 2) DD Form 458 (May 2000), Charge Sheet
3) DA Form 5112 (Sep 2002), Checklist for Pre-Trial Confinement. If supporting documentation
is referenced on the DA 5112, it must be included
^ 4) 48/72 Hour Review Memorandum, if completed
5) Magistrates Findings Memorandum, if completed
v' 6) Unit Contact Information
\ / 7) SM's PCS/TCS Orders into theater
y/ 8) Original Medical/Dental Records *
ACEN ASG I^U TFCF 1 October 2009
SUBJECT: TFCF requirements lor processing U.S. Militaty/DoD Prisoners
^ 9) ER6 or Persottnel Record Files ^
10) Conrinement Extension Requests for Pre-Trial SM's shall be in accordance with USARCENT
T^eaterConfinementPoIicy, dated 17 January 2007.
b. Post-Trial (regardless of sentence length)
1) DD Form 2707 (Sep 2005)^ Confinement Order, as described in paragraph 2 above
2) DD Form 458 (May 2000)^ Charge Sheet
3) DA Fonttt 4430 (Sep 2002), Result ofTrial (or service-specific equivalent) with DNA and Sex
Offender Registration information
4) DDEorm2329(Augl984), Record of Trial by Summary Court MartiaL i f ^plic^ble
5) Pre-TrialAgreement^^0f^r to Plead Guilty, if applicable
6) Lnit Contact Information
7) DD Form 2704 (Mar 1999), Victims Witness Certification and Election. Must include full
mailingaddress, phi^e number with area codes (DSN or VOIP, ifapplicable) lor all victims and
witnesses listed. Vict^ms^ witnesses listed on any other documents must be listed on the 2704 If
there are no victims/wimesses^ Section 11 must be completed.
8) SM's PCS^T'CS Orders into theater
c. Post-Trial (sentences over 30 days and/or punitive discharge)
1) ERBcr Personnel Record Piles ^
2) Original MedicalT)ental Records^
3) Results ofInvestigation(ROI)indicatingMPI/CID/lnvestigating Officer, i f applicable
^IfPersonneLMedical, and/or Dental Records are not available ^^^^er, an MPR must be provided
identi^ingthelocationof the records and a point ofcontact in the event they must be retrieved (provide email
address, commercial phone number, DSN phone number, and mailing address).
6. Unit Commanders will e^ure that the prisoner arrives at the TFCF with the recommended items listed below.
Unaulhori^d equipment at:d^or personal property will be returned to the SM's escorts.
a. Body Armor (Pre-Trial and prisoners with 30 day or less sentences ONLY) ^
1) 1BA
2) Helmet
^ lOAandHelmetwillberetumed to escorts fii^r all Post Trial prisoners who will be transferred CONUS.
bClodnn^
^)DCU/ACU(2 3sets)
^) DCU Boots (1 pair)
3) Black or Green Socks (6-10 pairs)
3 4) White PT Socks (6 10 pairs)
^ 5 ) Underwear (6-10 pairs)-Browtt requited ft^rtrattsli^ CONUS
^ -6)T-Shirt:^(6-10each) Brown, Sand, or Green only. No Under Armor or comparable brands
^7) Prescription Glasses, if applicable (2 pairs)
8) Sunglasses (1 pair)
v9) Shower Shoes (1 pair)-Basic black, no designs
YIO) Brown towels.^washcloths (2 each)
^ I ) Military-issued Belt (1 each)
ACEN ASG l^U TFCF 1 October 2009
SUBJECT: TFCF requirements ^r processing U.S. Military/DoD Prisoners
^12) Work Gloves (I pair)-Black. Grey, or Tan only
^13) Physical Training Unilotnt (3 shirts. 3 shorts, long pants^ jacket, and running shoes)
^I4)ColdWeatherClothing^ifappropriate(polyttndershirts/underwear, gloves, field jacket, etc.)
^15) Cott^^ervative Civilian Attire (1 pair pants and I shirts
c. Health and Com^rt Items
^ ^ ^ ^ 1) Personal Hygiene Bag (1 each)
^^2) Tooth Paste (max 2 tubes)
^) Tooth Brush (max 2 each)-No electric devices
^) Deodorant (max 2 each)-No aerosol cans
^ . ^ ^ ) Shampoo (max I bottle)
^6) Bar Soap (max 4 each)-No liquids
^ ) Shaving l^it No electric razors, unlesson permanent shaving profile
^8) Shaving Cream (max 2 cans)
^^^^ ^^9) Disposable Razors/Blades (max 12 each) ^^.^^^^
^0) Lip Balm (max 2 each)
11) Fingernail Clippers(1 each)-Nofiles ^^^^^^
12) Feminine Hygiene Products, if applicable (min 2-w eek supply )
^13) Pictures (max 10)-No magazine or newspaper cutouts
^14) Books (max 2 each^ including a bible)
15) MOS Study Material (max 2 manuals)^^-^^
^6) Pre Paid Phone Card
17) Approximately $50.00 Cash^^^^^^ ^^^^
d. Prohibited Item^^
1) Tools or Sharp Objects (knives, multi tools, fingernail files, etc )
2) Jewelry(withtheexceptionof I wedding band without stones and 1 cottservative religious
medallion)
3) Tobacco Products (includes smt^eless tobacco)
4) Notebooks or Three-Ring Binders
5) Matches or Lighters
6) Cosmetic Products
7) Glass Containers
8) EIectronicEquipment(iPods, computers, cameras, thumb drives, and cell phones)
mother items may bedeemeddangerons/inappropriate by the Facility staff upon intake.
7. Escorts shall acquire bus tickets fi^om the serviee specific LNO (Tent 2) upon arrival at Ali AlSaleem and notify
the TFCF ECPoftheirapproxitttate departure time before proceeding to Camp Arif^an. Normal intake hotu^ are
^om 0700 to 2000 unless prior arrangements have been ntade with PSB Sta^
8 Facility points of contact are listed below:
a. PSB NCOIC DSN
b. PSB NCO DSN
c PSB Cell COMM Available^4/7
d ECP DSN Available 247
e. Commander DSN
f Deputy DSN
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b)
(7)(C) (b) (6), (b)
(7)(C)
(b) (6),
(b) (7)(C)
(b) (6), (b)
(7)(C) (b) (6), (b)
(7)(C)
(b) (6), (b)
(7)(C)
ACEN-ASG-KU-TFCF 1 October 2009
SUBJEC T: TFCF requirements for processing U.S. Military/DoD Prisoners
g. SEL DSN
9. Point of contact for this memorandum is MAC Michael Cunningham, PSB NCOIC.
^ JJ
1 Encl Richard N. Mauldin
CDR, USN
Commanding
(b) (6),
(b) (7)
(C)
(b)
(6)
,
(b)
(7)
(C)
CONFINEMENT ORDER
1. PERSON TO BE CONFINED
a. NAME (Last, First, Middle)
MA NNI NG, Bradl ey E.
b. SSN
2. DATE (YYYYMMDD)
20100529
BRANCH OF SERVICE
.Armv
d. GRADE
E-3
e. MILITARY ORGANIZATION (From):
HHC, 2d BCT, 10th MTN DIV (Ll), COS Hammer. Iraq. APO AE 09308
TYPE OF CONFINEMENT
3.a, PRE-TRIAL
NO X YES b. RESULT OF NJP
XNO
YES
c. RESULT OF COURT MARTIAL;
TYPE: Q S C M
SPCM
X] NO [21 YES
I I GCM [ 2 j VACATED SUSPENSION
d. DMA PROCESSING IS X IS NOT REQUIRED UNDER 10 U.S.C. 1565.
4. OFFENSES/CHARGES OF UCMJ ARTICLES VIOLATED:
Article 128: Assault Consummated by a Battery: Article 134 (18 U.S.C. jj 793: Wrongful Transmission of Defense information)
5. SENTENCE ADJUDGED: b. ADJUDGED DATE
(YYYYMMDD):
6. IF THE SENTENCE IS DEFERRED, THE DATE DEFERMENT IS TBIMINATED:
7. PERSON DIRECTING CONFINEMENT
a. TYPED NAME. GRADE AND TITLE:
MATTHEW W. FREEBURG
CPT. .AD. Commanding
b. SIGNATURE
^
c. DATE
(YYYYMMDD)
0100529
d. TIME
S.a. NAME. GRADE, TITLE OF LEGAL REVIEW AND APPROVAL
CHRISTOPHER D. GOREN
CP L JA. Trial Counsel
URE: c. DATE
rrYYYMMDDI
20100529
MEDICAL CERTIFiCA
9a. The above named i nmat e was exami ned by me at 1 ^ 3 - ^ on ( i l o ) 6 OS %^ and f ound to be Fit | |
rrimel lYYYYMMDD)
f or conf i nement . I cer t i f y t hat f r om t hi s exami nat i on t he execut i on of t he f oregoi ng sent ence t o conf i nement
I [ wi l l wi l l not produce seri ous i nj ury t o t he i nmat e' s heal t h.
b. The following irregularities were noted during the examination (If none, so state):
c. HIV Test admi ni st ered on (YYYYMMDOJ: j / K t O ^ CS^ ^ V * - * ^ t > 1
d. Pregnancy t est admi ni st ered on (YYYYMMDD): f y t N / A
Unf i t
10. EXAMINER
a. TYPED NAI^j^gg^gg^fggJgTLE:
err, MC USA*
b. SIGNATURE ^
2^'Ut>^(<.rT.i^c
c. DATE
(YYYYMMDDl
mole aS^T-'i
d. TIME
O i T
2BCTSw,mMTND
l<ECEIpf FOR INMATE
11.a. THE INMATE NAMED ABOVE HAS BEEN RECEIVED FOR CONFINEMENT AT:
AND TIME:
(Facility Name and Location)
lYYYYMMDD) (Time)
b. PERSON RECEIPTING FOR INMATE
TYPED NAME. GRADE AND TITLE:
c. SIGNATURE: d. DATE
(YYYYMMDD)
e. TIME
DD FORM 2707, SEP 2005 PREVIOUS EDITION IS OBSOLETE. Adobe Pitjfesstonal 7.0
(b) (6), (b)
(7)(C)
CHECKLIST FOR PRETRIAL CONFINEMENT
For use o( ttiis form, se AR 27-10; ttie proponent agency is OTJAG
NAME
Manning, Bradley E.
GRADE
E-3
UNIT
HHC, 2d BCT, 10th MTN DIV (Ll)
AGE
22
ETS
20111001
TOTAL SERVICE TO DATE
2 Years, 7 Months
MARRIED
YES NO
WIFE-HUSBAND IN LOCAL AREA
: YES X NO
NUMBER OF CHILDREN
X OTHER 0
(SpecifyT~~
NUMBER OF ARTICLE 15's: I
DATE
24 May 2010
OFFENSE
.Article 12S - Assault Consummated by a Battery
PUNISHMENT
Reduction to Private First Class (l>3): and
Forfeiture of $446.00.
NUMBER OF PREVIOUS CONVICTIONS:
TYPE OF COURT DATE ARTICLE PUNISHMENT
NUMBER OF PRESENT OFFENSES:
ARTICLE
Article 134 (18 U .S.C. S 793)
Article 128
DATE
28 May 2010
8 May 2010
DESCRIPTION OF OFFENSE (If AWOL, from-to, etc.,
and whether surrendered or apprehended)
Wrongful Transmission of Defense Information
Assault Consummated by a Battery
PRETRIAL CONFINEMENT IS APPROPRIATE BECAUSE:
a. There Is probable cause to believe an offense tias been committed by the accused. (UsI specific reasons why it is believed an offense has been committed by
the accused.)
See attached 72-hour memorandum, dated 29 May 2010.
DA FORM 5112, SEP 2002
DA FORM 5112-R. MAR 86. IS OBSOLETE APD PE vi 01
b. To ensure the accused's presence at trial, pretrial hearing or investigation (List specific reasons why it is believed the accused may not be present and
summarize the conduct of Ihe accused which warrants pretrial confinement and tends to indicate the accused is not likely to be available for trial, pretnal hearing or
investigation.)
See attached 72-hour memorandum, dated 29 May 2010.
c. To prevent foreseeable serious criminal misconduct including any efforts at obstructing justice. (List specitic reasons why it is believed the accused may commit
acts ol serious criminal misconduct if not incarcerated, particularly if these acts pose a threat to others the command or natkinal security, and summarize the
conduct ol the accused which warrants pretrial confinement and tends to Indicate the accused may commit future acts of serious criminal misconduct,)
See attached 72-hour memorandum, dated 29 May 2010.
d. Lesser forms of restraint are inadequate. (List fhe alternatives that have proven inadequate or summarize the reasons why It is believed such alternatives
would be inadequate.)
See attached 72-hour memorandum, dated 29 Mav 2010.
DATE (YYYYMMDD)
f
TYPED NAME, RANK, AND ORGANIZATION OF COMVIANDER
MATT HEW W. FREEBURG. CPT. HHC, 2D BCT
SIGNATURE
^
DECISION OF MILITARY MAGIS-TRATE
TO: (Addressee(s))
On
ZOtOfi^-^C) _. 1 reviewed the circumstances concerning the continued pretrial confinement of
(Date) (YYYYMMDD)
^^C- /?it/iDt^Y f^^AlMlfJrj . Based upon this review, 1. (Check appropriate statement)
(Name)
JS^i Determined that continued pretrial confinement is warranted.
I i Determined that continued pretrial confinement Is not warranted and order his/her release from pretrial confinement.
TYPED NAME. GRADE. AND BRANCH OF MILITARY MAGISTRATE
te-y^tn Le^
c^r^ JA
SIGNATURE
DA FORM 5112, SEP 2002 APD PE vl 01
UNI T CONTACT LNFOR. MATI ON
Prisoner Name: Unit:
I PrC f^YM\\vC) %n^\f4\
Higher Unit: ' J
V-oS'iSuiM
Htv:,2_%:T,\0'- )j(YKi'biv [ i f ^
OCONUS .Address'Pnone: [Depcy-Q
t^c,aa)\d^Mu%Wj4
Ccr, kk^'ff-. c fie D)W L
Redeployment Date:
Avc^ (O
CONUS Address'Phonc:
Commander:
C?T f i i t f v o .
DSN A CeiTPhonc:
L
I Email:
AKOKmail:
FiTsi Sergeant:
| 5( i S.
DSK & Cell Phone:
Email:
ojr^
AKO Email:
?.] NCOIC:
j'lASC', Pt T( %, SAiTV&KA L
"DSN & Cell'Phone:
Email:
AKOlmail: '
I |
AG Representative;
C7T Ckns ^licnEAJ
DSN & Cell Phone:
Email:
AKO Email:
F
Defense Renrcsentative;
CP'
~! \ P \
V Oi / i ^ t - ^
i
DSN & Cell Phone:
<,%?(].
Email:
AKO Email:
Enclosure
(b) (6), (b) (7)(C)
(
b
)
(
6
),
(
b
)
(
7
)
(
C
)
(b) (6), (b) (7)(C)
(b) (6),
(b) (7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C) (b) (6), (b) (7)(C)
(b)
(6)
,
(b)
(7)
(C)
(b) (6),
(b) (7)(C)
(
b
)
(
6
),
(
b
)
(
7
)
(
C
)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(
b
)
(
6
)
,
(
b
)
(
7
)
(
C
)
(
b
)
(
6
)
,
(
b
)
(
7
)
(
C
)
(b) (6), (b) (7)(C)
DEPARTMENT OF THE ARMY
US ARMY INSTALLATION MANAGEMENT COMMAND j
HEADQUARTBRS, UNITED STATES ARMY GARRISON, FORT DRUM I
10000 10 MOUNTAIN DIVISION DRIVE i
FORT DRUM, NEW YORK 13602-5000 j
ORDER 222-720 10 AUGUST 2009 I
2*" BRIGADE COMBAT TEAM (WBDAAA) FORT DRUM, NEW YORK 13602-5000
THE FOLLOWING UNIT ACTION IS DIRECTED: GROUP TRAVEL AND TRANSPORTATION
ACTION: The above Organization Is DEPLOYED In a temporary change of station (TCS) as shown below in Support of OPERATION IRAQI ;
FREEDOM and are to retum to your pemianent station upon completion of the duties In support of this operation, You will submit a reviewed [
voucher k r Ms trav^ to the linance ofNce within 5 working days after return to home station. I
ASSIGNED TO: 2^ BRIGADE COMBAT TEAM (WBDAAA) UNITED STATES CENTRAL COMMAND AREA OF RESPONSIBILfrY (IRAQ- \
EFFECTIVE DATE; 1 OCTOBER 2009 . . \
DEPLOYMENT PERIOD: 365 DAYS OR UNTIL MISSION COMPLETION f
ACCOUNTING CLASSIFICATION: SEE ATTACHED ANNEX FOR ACCOUNTING CLASSIFICATIONS \
{FY10/11 AVAILABIUTY IS CONTINGENT ON CONGRESS ENACTING APPROPRIATIONS OR AUTHORING OPBUTIONS UNDER A I
CONTINUING RESOLUTION) I
WCOM ISSUED CONTROL NUMBER: SEE ATTACHED ANNEX \
CIC: SEE ATTACHED ANNEX
MOVEMENT DESIGNATOR CODE: PME10/PMO10
ADDITIONAL INSTRUCTIONS:
(A) This is a temporary change of station (TCS). Nomriai PCS entitlements, allowances and relocation of femily members are not
authorized. Consolidated Personnel Policy Guidance (PPG) for operations Iraqi Freedom, and Enduring Freedom is on the DCS, G-1
web site; http:/Nyvw.arwvq1.armv.fnil/militarvpersonnel/policv.asp
(B) Soldiers are authorized 4 duffle bags- (1) one personal bag, (2) two issued bags of OCIE and 1 standard carry-on bag that meets
AMC/Contracted flights standards. Size maximum 25x42 or Ruck size 15x10x22; with a maximum weight of 50 pounds. When AMC or
contracted transportation is not available, reimbursement of authorized checked baggage on commercial flights waghing more than 50
pounds to 3 max of 70 pounds per bag authorized as excess baggage. Upon redeployment from theater Soldiers issued additional
OCIE iHider the Rapid Fielding Inttiafive (RFI) are authorized a shipment of one additional bag not to exceed 70 pounds, if not
transported as pari; of a Military shipment. Each Soldier vM\ bring only iose items specified by ttie PPG or other appropriate auOiority.
You will be provided a list of those Items from your company. This Is the maximum quantity of authorized baggage; however, fewer
bags can be taken if Soldier can fit equipment and personal Hems into a lower number of duflle bags. Each duffle bag must not exceed
70 poiaids. No footlockers or commercial suitcases are authorized for movement Soldier will only bring those items specified in
chapter 6 of the PPG. Soldier will be provided a list of those items from unit Commander. Reimbursement of authorized checked
baggage on commercial flights weighing more than 50 pounds to a max of 70 pounds per bag authorized as excess baggage.
(C) Government quariBrs and dining facilities will be used at the Replacement acflvity and during deployment Essential uriit mess has
been declared by the Assistant Secretery of the Amiy (Manpower and Reserve Affairs) ASA (M&RA) For the Mobilization and
Demobilization Sites not to exceed (10) Days. MOSQ location will provWe quarters and mess. The Installation Commander will make
separate determinations as to the availability of mess and quarters and as a last resort will issue a Statement of Non availability
Statement/Certificate of Non-availability. Per Diem payable is $3.00 per day for CONUS and $3.50 per day for OCONUS. Per Diwn will
normally be paid for the travel to gaining station, or Replacement activity unless prohibited by travel circumstances.
(D) For Active Duty SoWiers, basic allowance for housng (BAH) is based upon pennanent duty station. For Reserves and Retired
memba-s called or ordered to active duty BAH is based on their principal place of residence when called or ordered to the tour of active
duty. Pay entitlements will be based on locafion IAW DODFMR and applicable messages and regulations.
(E) UnK is required to submit PERSTEMPO information using flight manifest data. Do not submit departure transactions on unit
deployed. Ensure MDC of "PM" is included.
(F) During period of deployment gaining/deployed unit Commander has responsibility for personnel service support to include avranls
arvd decorations; UCMJ, and all other forms of personnel and legal administration support except Reserve Component promotion
authority.
(G) Temporary storage of HHG may be authorized, at Government expense for period of contingency operations as provided by
paragraph U4770-A, Joint Federal Travel Regulation for single personnel (both AC and RC), Soldier married to another Soldier when
both are deployed and single SoWier parents when a childcare plan requires dependents to leave Ae residence. Contact the k)cal
transportation office for assistance. This may impact on the authorization for BAH. Storage of one privately owned vehicle may be
authorized. Soldier must contact the supporting installation transportation officer for requirements. Soldier must complete arrangements
requiring personal presence. Temporary duty (TDY) household goods weight allowance is authorized for CONUS and OCONUS based
on personnel that are on active duty for a period greater than 200 days, excluding those areas designated as hostile fire/imminent
darker pay areas. Contact the Installation Transportation Office. Clari< Hall, 2d floor, at 772-6384 for assistance.
(b) (6), (b) (7)(C)
SSN ANNEX ORDER 222-720. DTD 10 AUGUST 2009
HHC 2D BCT
NAME
SSN GRADE UIC UNIT
GUERRERO DORIAN PV2 WBOAAA HHC2BCT
GUERTIN ANDREW DAVI D PFC WBDAAA HHC 2BCT
GUTIERREZ DAVID MANUEL SGT WBDAAA HHC 2BCT
HACK HONDO JUSTIN CW2 WBDAAA HHC 2BCT
HAGY DANIEL AARON SGT WBDAAA HHC2BCT
HAMBLETON JOSEPH MICHAEL PFC WBDAAA HHC 2BCT
HANSEN THOMAS RANDALL SFC WBDAAA HHC 2BCT
HEATON RALPH DAVID MAJ WBDAAA HHC 2BCT
HICKS CODY DALE SPC WBDAAA HHC 2BCT
ANTHON PFC WBDAAA HHC 2BCT
HORN KEVIN SCOTT II PFC WBDAAA HHC 2BCT
HOYER BRODIE K CPT WBDAAA HHC 2BCT
HYDE TIMOTHY ALAN MAJ WBDAAA HHC 2BCT
IRISH ERIC LEE SFC WBDAAA HHC 2BCT
JANDA JAMES ANDREW MAJ WBDAAA HHC2BCT
JOHNSON BRANDON FtAY SOT WBDAAA HHC 2BCT
JOHNSON PAULINE ADELL SPC WBDAAA HHC 2BCT
JOHNSON SUMMER PAIGE PV2 WBOAAA HHC 2BCT
JONES JOSHUA G HENR SGT WBDAAA HHC 2BCT
JOY DAN TODD PV2 WBDAAA HHC 2BCT
KARST WAYNE ALLEN SSG WBDAAA HHC 2BCT
KEETON JEREMIAH LEE SSG WBDAAA HHC 2BCT
KELLEHER JAMES ANDREW SGT WBDAAA HHC2BCT
KERNS BRIAN DOMENIC MAJ WBDAAA HHC2BCT
KJELSHUS SHERWIN H CW2 WBDAAA HHC2BCT
KLUMP DARYL PAUL SGT WBDAAA HHC2BCT
KOOL JASON ELLIOT SFC WBDAAA HHC2BCT
KUBIC MICHAEL ALLEN PFC WBDAAA HHC 2BCT
LANDON JEREMY WILLIAM PFC WBDAAA HHC 2BCT
LEARY CRAIG PAUL PFC WBDAAA HHC 2BCT
LEELOY DANIEL JAMESROUSSEA PFC WBDAAA HHC28CT
LEWIS ANDREW R CPT WBDAAA HHC 2BCT
LEWIS JAMIE LEE SGT WBDAAA HHC 2BCT
LEWIS SCOTT JOSEPH SPC WBDAAA HHC 2BCT
UGGETT CLAYTON EDWARD SGT WBDAAA HHC 2BCT
UNDSAY CHADD JOSEPH SSG WBDAAA HHC 2BCT
UPPINCOTT KEVIN ALAN SSG WBDAAA HHC2BCT
LODER THOMAS ANDREW SGT WBDAAA HHC 2BCT
LONG FREDRICK JEROME SFC WBDAAA HHC 2BCT
LONG JAMES ROBERT II SGT WBDAAA HHC 2BCT
LOPEZ ELIZABETH LAUREL CPT WBDAAA HHC2BCT
LUSK JEFtEMY ALAN SGT WBDAAA HHC 2BCT
LYONS ALFRED BENJAMIN CW2 WBDAAA HHC 2BCT
MACKLIN CARLA LAVERNE SFC WBDAAA HHC 2BCT
MACLEAN KEVIN RICHARD SSG WBDAAA HHC 2BCT
MAGESTRO MARK LOUIS SGT WBDAAA HHC 2BCT
MAUNOWSKI MARK JOSEPH SSG WBDAAA HHC2BCT
MANIBUSAN CARL JOHN SSG WBDAAA HHC 2BCT
MANNING BRADLEY EDWARD PFC WBDAAA HHC 2BCT
MARIUR JENSON CHADDY SGT WBDAAA HHC 2BCT
MARSHALL KYRA JAREE SPC WBDAAA HHC 2BCT
Page 2 of 4
(b) (6), (b)
(7)(C)
51 T) 5 2P T3 5 T! T ; T! TI TJ T! T) T! Ti TJ TJ Tl TI TJ T) U
(D tP ( D ( D { D ( D ( D 0 ^ C D OC 5 ( D C D C D ( D < D ( D C P A ( I I
< < < < < < < < c < < < < : c < < < < < < < <
^ ^ ^ ^ ^ ^
^ ^ ^ ^ ^ ^ ^
^ ^ . ^ ^ ^ C o o ^
^ ^ ^ ^ ^ ^ ^
s x n
m i o
if
i i "
cm
7)
m
g
=8
z a j n n
psg
kss
HS
- H r r - r i a o
1111111
Sai ^ j ac
>- i - <- n- n- n
TIOOOOOO
25555^
H - I H - H m m
SSgg%
Z Z Z Z Z s
(nnimrTi>s
rammmco
5 N
* w w w w
^ U i U l U t
o o o o
0 9
21S
3:
=S
o
2
o
>oz
3
O
Si
&-
ml*
i oltD
TOO
SWl
n;
n
CO
m
o
H
5
z
x | <
I
r - | 0
r-
a>
3
a
*o
o a.
H ~
^
0)
l O'
3
3
c*
3
3
o
2 2
Kg
m
o
m
o
i
X
o
m
z
f -
w
H
m
a
7}
S
o
73
O
m
2
m
n
I
5 %
5 I f f ,
2
f
III
8 &
g f
m |
g 8
1
o
i
TJ
o
z
(b)
(6)
,
(b)
(7)
(C)
(b)
(6),
(b)
(7)
(C)
UNITED STATES OF AMERICA
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
Prosecution Motion
for Preliminary Ruling on
Admissibility of Evidence
(Business Records)
Enclosure 3
22 June 2012
^
p^SZ^""'^""-^''^;^'"--
PA(:P or
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT
Federal Investigative
Services
April 17,2012
Mr. Arthur D. Ford
Criminal Law Division
Office ofthe Staff Judge Advocate
US Army Military District of Washington
103 3"^ Street, Building 32, Suite 100
Fort Lesley J. McNair, Washington, DC 20319
Dear Mr. Ford:
Enclosed is the Attestation Certificate on Bradley Edward Manning. If you have any questions
regarding this response, contact the Freedom of hiformation Privacy Act office at 724-794-5612,
extension 7000. Please reference tracking number 2012-06555.
Sincerely,
LWCZZA-Oj ULL^: ^
Pamela S. Crawford
FOI/PA Specialist
Enclosure
www.opm.gov Recruit, Retain and Honor a World-Class Workforce to Serve the American People www.usajobs.gov
Federal Investigative
Services
UNITED STATES OFFICE OFPERSONNEL MANAGEMENT
ATTESTATION CERTIFICATE
This document is intended t o meet the requirements set forth in Military Rules of Evidence Rule
902(11), addressing certified records of regularly conducted activity.
I swear or affi rm that each of the fol l owi ng is true regarding the Single Scope Background Investigation
and Entrance National Agency Check Investigation, on Private First Class Bradley Edward Manni ng
mailed t o Mr. Arthur D. Ford at the US Army Mi l i tary District of Washington, Office of t he Staff Judge
Advocate on February 1, 2012, to the best of my knowledge and belief:
1. I am the custodian of these records.
2. The records were made at or near the ti me of the occurrences of the matters set f ort h by or
f rom i nformati on transmi tted by, people wi t h knowledge of these matters;
3. The records were kept in the course of regularly conducted business activity;
4. It was the regular practice of the business activity to make the records; and
5. The records are a true, accurate, and compl ete copy of the original documents.
U.S. Office of Personnel Management, Federal Investigative Services, Freedom of Informati on and
Privacy Act (FOI/PA) office
Organization
< Z ^ t ^ v/ - A_ L A x ^ r v ^
- 1 7 - 2_o I 2-
Signature D9te
Lisa M. Alleman Supervisory FOI/PA Specialist
Print or Type Name Title
Business Tel ephone Business Address
Commonwealth of Pomsylvania
County of Jlitij ^
Sworn to and subscribed beter* ms
Ws _ a ^ a y o f i / i / - i L ' ^
COMMONWEALTH pP PENNSYLVANIA
Notarial Seal
Cynthia L. Painter, Notary Public
Cherry Twp.,Buder County
My coiwntelon Explfes Dec 13,2015
MB n , PENNSYLVANIA ASSOCIATION OF NOTARIES
www.opm.gov Recruit, Retain and Honor a World-Class Workforce to Serve the American People www.usajobs.gov
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
U. S. Office of Personnel Management
Federal Investigative Services Division
PO Box 618
Boyers, PA 16020
Manifest Number:
Destination:
USIS903776
CERT UPS
Manifest Date:
2/3/2012
Line Number
i
Case Number
Case Name
MANNING
Item Type
Certified Mailout
Please verify all items manifested as being received. If there are discrepancies with this shipment, please contact
[email protected].
(b)
(6),
(b)
(7)
(C)
DATE: 01/15/2008 PAGE: 1
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT
INVESTIGATIONS SERVICE
**************** CASE CLOSING TRANSMITTAL ************************
CLOSED: 01/15/2008
CASE #: 08F18704 TYPE/SERVICE: SBI - PRT
EXTRA COVERAGE:
NAME: MANNING, BRADLEY EDWARD
SSN: ###-9 DOB: ##/1987 POSITION: MILITARY
*************** MAIL TO ***************
SON: 676G * SOI: A334
DEPARTMENT OF THE ARMY * DEPARTMENT OF THE ARMY
HOS US ARMY RECRUITING COMMAND(USAREC) * CENTRAL PERSONNEL SECURITY CLEARANCE
1307 3RD AVE. ROCM 3008 * FACILITY
ATTN: APRIL HABIB * FORT GEORGE G. MEADE, MD 20755
FT KNOX, KY 40121 *
***************************************
AGENCY DATA:
OPM ADJUDICATION: SEE ATTACHED INV FORM 79A
THE ITEM INFORMATION SUMMARIZED BELOW, AND ANY REPORTS OF
INVESTIGATION, INQUIRY FORMS AND/OR OTHER ATTACHMENTS WITH THIS
"TRANSMITTAL, CCHPLETE THE INVESTIGATION REQUESTED ON THE PERSON
IDENTIFIED ABOVE.
THIS CASE HAS BEEN ELECTRONICALLY TRANSMITTED BY OPIS
****************************** ITEM INFORMATION ******************************
ITM TYPE ITEM IDENTIFICATION/LOCATION CM RESULTS
* * * *** * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * ** * * * * * * * * * * * * * * * * * * * * * * *
001 PRSI FORT LEONARDWOOD
FORT LEONARDWOOD, MO
002 RESI 1492 SELWORTHY ROAD
POTOftC, MD
003 RESI 8020 NW 119TH STREET
OKLAHOMA CITY, OK
004 RESI 5607 71ST PLACE EAST APT 1005
TULSA, OK
005 EDUC MONTGOMERY COLLEGE OF ROCKVILLE
ROCKVILLE, MD
006 EMPL EMPLOYER - STARBUCKS
POTOMAC, MD
007 EMPL EMPLOYER - FYE
TULSA, OK
008 EMPL EMPLOYER - ZOTO INC
OKLAHOMA CITY, OK
P ISSUE(S)
P ACCEPTABLE
P NOT CONTACTED
P ISSUE(S)
P ACCEPTABLE
P ACCEPTABLE
R REFERRED
R NOT CONTACTED
/
(b)
(6),
(b)
(7)
(C)
DATE: 01/15/2008
PAGE:
CASE #: 08F18704 TYPE/SERVICE: SBI - PRT
EXTRA COVERAGE:
NAME:^&ma^, BRADLEY EDWARD
/1987 POSITION: MILITARY
i m TYPE ITEM IDENTIFICATION/LOCATION
*** **** ******************************************
009 EMPL EMPLOYER - INCREDIBLE PIZZA CO
TULSA, OK
010 LAWE MARYLAND STATEWIDE LAW, MD
011 LAWE TULSA, OK
012 LAWE OKLAHOMA CITY, OK
013 GENL KARA M. BARRETT
OKLAHOMA CITY, OK
014 LAWE OKLAHOMA CITY, OK
015 LAWE OKLAHOMA CITY, OK
016 LAWE FT.LEONARD WOOD, MO
017 LAWE ST.ROBERTS, MO
018 EMPL EMPLOYER - PERSONNEL TRAINEE DIVISION
FT.LEONARD WOOD, MO
019 RESI COMJNITY SERVICE
FT.LEONARD WOOD, MO
020 GENL MILITARY PERSONNEL RECORD
FT.LEONARD WOOD, MO
021 EMPL EMPLOYER - TRANSWORLD ENTERTAINMENT
ALBANY, NY
022 LAWE ROCKVILLE, MD
~023~
024
025
026
027
028
029
030
031
032
033
034
AOl
BOl
COl
DOI
EOl
THPT
EMPL
GENL
RESI
LAWE
LAWE
GENL
REFE
GENL
GEN
GENL
GENL
SII
FBIF
FBIN
DCII
CRED
EHPESffiSJT RECORD - STARBtTCKS
BETHESDA, MD
EMPLOYER - U. S. ARMY
FT. LEONARD WOOD, MO
PERSONNEL TRAINEE DIVISIW
FT. LEONARD WOOD, MO
BARRACKS C-82ND
FT. LEONARD WOOD, MO
FT. LEONARD WOOD, MO
ST. ROBERT, MO
PRIVATE
FORT LEONARD WOOD, MO
THCmS
EDMOND, OK
POTOMAC, MD
POTOMAC, MD
OKLAHOMA CITY, OK
EDMOND, OK
OHM EQUIFAX
BALTIMORE, MD
CM RESULTS
** ***********************
R REFERRED
R NO RECORD
R NO RECORD
R NO RECORD
P ACCEPTABLE
R NO RECORD
R NO RECORD
R NO RECORD
R NO RECORD
R ACCEPTABLE
R NO RECORD
R ACCEPTABLE
R ACCEPTABLE
R NO RECORD
R ACCEPTABLE
R ACCEPTABLE
R ACCEPTABLE
R NO RECORD
R NO RECORD
R NO RECORD
P ISSUE(8)
P NOT CONTACTED
P ISSUE(S)
P ACCEPTABLE
P ISSUE(S)
P ISSUE(S)
L NO PERTINENT
L NO RECORD
L NO PERTINENT
L NO RECORD
L ISSUE (S)
I
(b)
(6),
(b)
(7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
DATE: 01/15/2008 PAGE:
CASEH: 08F18704 TYPE/SERVICE: SBI-PRT
EXTRA COVERAGE:
NAME:MANNING, BRADLEY EDWARD
8SN: ^1^1^1 DOB: ^11^/1987 POSITION: MILITARY
ITM TYPE ITEM IDENTIFICATION/LOCATION CM RESULTS
*** **** ****************************************** ** ***********************
FOl SESESELECTIVESER L ACCEPTABLE
GREAT LAKES, IL
*********************** E^ CASE CLOSINGTRANSMITTAL ***********************
^
(b)
(6),
(b)
(7)
(C)
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT
INVESTIGATIONS SERVICE
WASHINGTON,DC 20415
CERTIFICATION OF INVESTIGATION
DATE: 01/15/2008
SUBMITTING OFFICE: SON-676G SECURITY OFFICE: S0I-A33^
DEPARTMENT OF THE ARMY
CENTRAL PERSONNEL SECURITY CLEARANCE
FACILITY
FORT GEORGE G.MEADE,MD 20755
NAME: MANNING,BRADLEY EDWARD
SSN: 1^^^111 DOB:^^^^^1987 POSITION: MILITARY
CASE TYPE: SBI CLOSING DATE: 01/15/2008 OPMCASEH: 08F18704
EXTRA COVERAGE:
POSITION CI^E :/
SCHEDULED DATE: 10/10/2007
INVESTIGATION CONDUCTED FROM:SF 86
THIS CERTIFIES THATABACKGRDUNDINVESTIGATION ON THE PERSIA IDENTIFIED ABOVE
HAS BEEN COMPLETED. THE RESULTS OF THIS INVESTIGATION WERE SENT TO THE SECURITY
OFFICE FORASECURITY/SUITABILITY DETERMINATION.
*******************************************************************************
AGENCY CERTIFICATION: THE RESULTS OF THISINVESTIGATION HAVE BEEN REVIEWED, AND
AFINAL DETERMINATION HAS BEEN MADE.
AGENCY CERTIFYING OFFICIAL | DATE
I
I
FILETHISCERTIFICATEONTHE PERMANENT SIDEOFTHEPERSON^S OFFICIAL PERSONNEL
FOLDER AFTER THE FINAL AGENCY DETERMINATION IS MADE.
^
(b) (6),
(b) (7)
(C)
AGENCY USE BLOCK (REQUEST ID 2665639) e-QIP Version 2
FEDERAL INVESTIGATIONS PROCESSING CENTER (FIPC) DATA
FIPC CODES:
TYPE OF INVESTIGATION
CODE: 30
SERVICE: A
EXTRA COVERAGE
EXTRA COVERAGE CODE(S):
SENSITIVITY LEVEL
RISK: 4
ADP REQUIREMENT:
ACCESS
LEVEL: 3
ADDITIONAL COMMENTS:
^NATURE OF ACTM?
CODE: MIL
DATE OF ACTION
DATE: //
GEOGRAPHIC LOCATION
WORLDWIDE CODE:
POSITION CODE
CODE:
POSITION TITLE
TITLE: Military
SUBMITTING OFFICE NUMBER
SON #: 676G
LOCATION OF OFFICE PERSONNEL FOLDER .
LOCATION CODE: Other
OTHER ADDRESS
NAME: HQ USAREC G3 Operations
ADDRESS: 1307 Third Ave
FT. Knox KY 40121
s
SECURITY OFFICE IDENTIFIER
SOIil:A334
LOCATION OF SECURITY FOLDER
LOCATION CODE: N^ne
OTHER ADDRESS
NAME:
ADDRESS: NoneProvided
OPAC-ALC NUMBER
CODE: DA-TRAD
ACCOUNTING DATA AND/OR AGENCY CASE NUMBER
CODE:
REQUESTING OFFICIAL
NAME:HQUSARECG3
TITLE:
PHONE: (502) 626-1515 Ext:
^ ^ i ^ ^ ^ ^ l ^
10/10/2007
PROCESSOR
NAME:
PHONE: ext:
SPECIAL HANDLING
HANDLING INFORMATION:
ISP CUSTOM FIELDl
VALUE:
ISP CUSTOM FIELD2
VALUE:
Electronic Questionnaires for Investigations Processing (e-QIP) Page 1 of 29
Investigation Request #2665639 for Applicant SSN #Hm#-9 Generated Copy
Electronic Questionnaires for Investigations Processing (e-QIP)
Investigation Request #2665639
GENERATED FROM EXTERNALLY SUBMITTED DATA
The information contained in this (document represents (data submittecJ for Bradley Edward Manning
(Applicant) for the e-QIP Investigation Request #2665639.
This Investigation Request contains the following (documents:
Page 1: Investigation Request Cover Sheet
Page 2-29: Questionnaire for National Security Positions (SF86 Format)
Note: To conserve paper only the first entry in multiple-entry lists (displays completion instructions.
The completion instructions for the first entry also applies to each a(dditional entry unless otherwise
noted.
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 0 0 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8f cf 4af 8f f 5eee05dl 988a
(b)
(6),
(b)
(7)
(C)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 2 of 29
Investigation Request #2655639 f o r Applicant SSN 4HHP Generated Copy
Form Completion Instructions
Questionnaire for National Security Positions (SF86 Format)
OMB No. 3206-0005
Follow instructions fully or we cannot process your form. I f you have any questions, call the office that gave you the form.
Purpose of this Form
The United States Government conducts background investigations and reinvestigations to establish that military personnel,
applicants for or incumbents in national security positions, either employed by the Government or working for Government
contractors, licensees, certificate holders, and grantees, are eligible for a required security clearance. Information from this
form is used primarily as the basis for investigation for access to classified information or special nuclear information or
material. Complete this form only after a conditional offer of employment has been made for a position requiring a security
clearance.
Giving us the information we ask for is voluntary. However, we may not be able to complete your investigation, or complete
it in a timely manner, if you don't give us each item of information we request. This may affect your placement or security
clearance prospects.
Authority to Request this Information
Uependmg upon the purpose of your investigation, the United States Government is authorized to ask for this information
under Executive Orders 10450, 10865, 12333, and 12356; sections 3301 and 9101 of title 5, United States Code; sections
2165 and 2201 of title 42, United States Code; sections 781 to 887 of title 50, United States Code; and parts 5, 732, and 736
of Title 5, Code of Federal Regulations.
Your Social Security number is needed to keep records accurate, because other people may have the same name and birth
date. Public Law 104-134 (April 26, 1996), as amended in title 31, section 7701, also asks Federal agencies to use diis
number to help identify individuals in agency records.
The Investigative Process
Background investigations for national security positions are conducted to develop information to show whether you are
reliable, trustworthy, of good conduct and character, and loyal to the United States. The information that you provide on this
form is confirmed during the investigation. Investigation may extend beyond the time covered by this form when necessary
to resolve issues. Your current employer must be contacted as part of the investigation, even if you have previously indicated
on applications or other forms that you do not want this.
In addition to the questions on this form, inquiry also is made about a person's adherence to security requirements, honesty
and integrity, vulnerability to exploitation or coercion, falsification, mis-representation, and any other behavior, activities, or
associations that tend to show the person is not reliable, trustworthy, or loyal.
Your Personal Interview
Some investigations will include an interview with you as a normal part of Ihe investigative process. This provides you the
opportunity to update, clarify, and explain information on your form more completely, which often helps to complete your
investigation faster. It is important that the interview be conducted as soon as possible after you are contacted. Postponements
will delay the processing of your investigation, and declining to be interviewed may result in your investigation being
delayed or canceled.
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 0 0 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
^
(b) (6),
(b) (7)(C)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 3 of 29
Investigation Request #2665639 for Applicant SSN^I^I||^^11^ Generated Copy
You will be asked to bring identification with your picture on it, such asavalid State driver'slicense, to the interview.There
are other documents you may be asked to bring to verify your identity a^welL^'hese include documentation of any legal
name change. Social Security card, and/or birth certificate.
You may also be asked to bring documents about information you provided on the form or other matters requiring specific
attention.These matters include alien registration,delinquent loans or taxes, bankruptcy,^udgments, liens, or other financial
obligations, agreements involving child custody or support, alimony orproperty settlements, arrests, convictions, probation,
and/orparole.
Organisation of this Porm
This form has two parts. Partlasks for background information, including where you have lived, gone to schooL and
worked. Part2asks about your activities and such matters as firings froma)ob, criminal history record, use of illegal drugs,
and abuse of alcohoL
In answering all questions on this form, keep in mind that your answers are considered together with the information obtained
in the investigation to reach an appropriate adjudication.
InstructionsforOom^letingthisPorm
1. Follow the instructions given to you by the person who gave you the form and any other clarifying instructions furnished
by that person to assist you in completion of the form.You should retainacopy of the completed form for your records.
2. All questions on this form must be answered. If no response is necessary or applicable, indicate this on the form by
checking the associated "Not Applicable'box. If you need to eslimaleadale, an "estimated" box will be available after each
^^t ^^^t i -ybl ^^k
3 Do not abbreviate the names of cities or foreign countries.Whenever you are asked to supplya'"Country'" name, you may
select the country name by using the country list feature.
Touse the "Country"'list feature, click on ihe'List" link beside the "Country"'title toopenalisting of country names ina
separate window.Find the desired country name and use your web browser's "Copy" and "Paste'features to copy the country
name into the ""Country"'text field If the country name is not in the list, manually enter the country name into the "Country "
text field
When enteringaUnited States address or location, select the state or territory from the "States" pulldown list.Selectinga
state/territory implies "United Slates " as the country, so you do not need to enter it into the ""Country" text field. For locations
outside of the United States and its territories, enter the name of the country into the "Country" text field and leave the '"State"
field blank.
4. The5digit postal ^IP codes are needed to speed the processing of your investigation. The office that provided the form
win assist you in completing the ^IP codes.
5. For telephone numbers in the United Slates, be sure to include the area code, and use one of the following formats;
(123^456 7890or 1234567890
6 Al l dates provided on this form must be in Month/Oay/Year or Month/YearformaL Use the pull down lists lo select the
month and day.^^e year should he entered as all four numbers,ie,1978 or 2001.If you find that you cannot report an exact
date, approximate or estimate Ihe dale to the best of your ability and indicate this by checking the "Fsl."box.
Pinal OeterminationonYour^ligihility
Final determination on your eligibility for access locla^^ified information is the responsibility of the Federal agency that
requested yotir investigation. You may be provided the opportunity personally to explain, refute, or clarify any information
beforeafinal decision is made.
G e n e r a t e d o n 2007 10 10 0 0 : 2 2 : 3 5 226 P R I V A C Y A C T I N P O R M A T I O N
Data Hash Code: 84208ede25b881512d8f cf 4af 8f f 5eee05dl ^88a
(b) (6),
(b) (7)
(C)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 4 of 29
Investigation Request #2665639 for Applicant SSN ^1^|||^|1^^li Generated Copy
Penalties for Inaccurate or Palse statements
The United States Criminal Code^title 18, section 100I)provides that knowingly falsifying or concealingamaterial fact isa
felony which may result in fines of up to^lO,000,and/or5years imprisonment, or both. In addition. Federal agencies
generallyfire, do not grantasecurity clearance, or disqualify individuals who have materially and deliberately falsified these
forms, and this remainsapart of the permanent record for fnture placements.Because the position for which you are being
considered isasensitive one, your trustworihinessisaveryimporiant consideration in deciding your eligibility forasecurity
clearance.Yourprospects of placement or security clearance are better i f you answer all questions truthfully and completely.
You willhave adequate opportunity to explain any information yougive us on the form and to make your comments part of
the record.
Disclosure of Information
The information you give us is for the purpose of investigating you foranational security positions we will protect it from
unauthorized disclosure.The collection, maintenance, and disclosure ofbackground investigative information is governed by
the Privacy AcLThe agency which requested the investigation and the agency which conducted the investigation have
published notices in die Federal Register describing the systems ofrecords in which yourrecords will be maintained.You
may obtain copies of the relevant notices from the person who gave you this form. fhe information on this form, and
information we collect during an investigation may be disclosed without your consent as permitted by the Privacy Act (5
USC552a(b))andasfollowsbelow
P^I^ACYACTROOTIN^OS^S
1. Tothe Department of justice when;(a) the agency or any component thereof; or (b)any employee of the agency in h i s ^
her official capacity; or(c)any employee of the agency in his or her individual capacity where the Department of justice has
agreed to represent the cmploy^^: or (d)th^ United States Government, isaparty to litigation or has interest in such
litigation, and by careful review,the agency determines that the records are both relevant and necessary to the litigation and
the use of such records by the Department of justice is therefore deemed by the agency to be forapurpose that is compatible
with the purpose for which the agency collected the records.
2. Toacourt or adjudicative body inaproceedingwhen;(a) the agency orany component thereof; or (b)any employee of the
agency in his or her official capacity; or(c)any employee of the agency in his or her individual capacity where the
Department of .lustice has agreed to represent Ihe employee; or(d) the United States GovemmenLisaparty to litigation or
has interest in such litigation, and by careful review,the agency determines that the records are both relevant and necessary to
the litigation and the use of such records is therefore deemed by the agency to be forapurpose that is compatible with the
purpose for which the agency collected the records.
3. Fxcept as noted in O^estion 24, whenarecord on its face, or in conjunction with otherrecords,indicatesaviolation or
potential violation oflaw,whetherciviLcriminaL or regulatory in namre, and whether arising by general statute, particular
program statute, regulation, rule, or order issued pursuant diereto, Ihe relevant records may be disclosed to the appropriate
Federal,foreign. State, locaL tribal, or other public authority responsible for enforcing, investigating orprosecuting such
violation or charged with enforcing or implementing the statute, rule, regulation, or order.
4. Toany source orpotential source from which information is requested in the course of an investigation concerning the
hiring orretention of an employee or other personnel action, or the issuing or retention ofasecurity clearance, contract,
grant, license, or other benefit, to the extent necessary lo identify the individual, inform the source of the namre and purpose
of the investigation, and to identify the type of information requested.
5. ToaFederaL State, locaL foreign, tribal, or olherpublic authority the fact that this system of records contains information
relevant to the retention of an employee, or the retention ofasecurity clearance, contract, license, grant, or other benefiLThe
other agency or licensing organization may then makearequest supported by written consent of the individual for the entire
record if it so chooses. No disclosure will be made unless the information has been determined to be sufficiently reliable to
supportareferral to another office within the agency or to another Federal agency for criminal, civiL administrative,
personneL or regulatory action.
G e n e r a t e d o n 2007 10 10 0 0 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Dat ^ Hash Code: 84208ede25b881512d8f cf 4af 8f f 5eee05dl 988a
(b)
(6),
(b)
(7)
(C)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 5 of 29
Investigation Request #2665639 for Applicant SSN ^^^^^1^1 Generated Copy
6. Tocontractors, grantees, experts, consultants, or volunteers when necessary to performafunction or service related to this
record for which they have been engaged.Such recipients shall be required to comply with the Privacy Act ofl 974, as
amended.
7. Tothe news media or the general public,factual information the disclosun^ of which would be in the public interest and
which would not constitute an unwarranted invasion of personal privacy.
8. ToaFederaL State, or local agency,or other appropriate entities or individuals, or through established liaison channels to
selected foreign governments, in order to enable an intelligence agency to carry out its responsibilities under the National
Security Act of 1947 as amended, the CIA Act ofl 949 as amended, Executive Order 12333 or any successor order,
applicable national security directives, or classified implementing procedures approved by the Attorney General and
promulgated pursuant to such statutes, orders or directives.
9. ToaMember of Congress or loaCongressional staff member in response to an inquiry of the Congressional office made
at the written request ofthe constituent about whom the record is maintained.
10. Tothe National Archives and Records Adntinistration for records management inspections conducted under 44 USC
2904and2906
11. Tothe Office ofManagement and Budget when necessary to the review of private relieflegislation.
Pt^BLIOB^RD^N INFORMATION
Public Burden reporting for this collection of information is estimated to average 90 minutes per response, including time for
reviewing instructions, searching existing data sources, gathering and maintaining the data needed and completing and
reviewing the collection ofinformation.Send comments regarding the burden ^^l i ^^t ^^r^^y^t l ^^r^^^^t ^l ^t l ^i ^ ^^11^^^^
of information, including suggestions forreducing this burden to OPM Forms Officer, United States Office of Personnel
Management,1900FStreetNW,WashingtonfX^20415 7900 L^notsend your completed form to this address. TheOMB
No. 3206^0005 is currently valid. OPM may not collect this information and you are not required to respond unless this
number is displayed.
E^0^^2^^8Ri^erfortl^eS^8^
executive Ordert2^68 Rider fortheOuestionnaire for National Security Positions ^SP^^)
Some questions on the current SF86specifyatime1rume of seven years.which is not consistent with Executive Order 12968.
Untilarevised form is in place, interim instructions are needed for some of the items on the current SF86 when an SSBI is
required.These questions should be answered withaten(lO) year lime frame for the case to meet the new standard;
Section 9: WhereYoullave Lived
Section IO:W^ereYouWent to School
SeclionlLYour Employment Activities
Section 22;Your Employment Record
Section 23,questionseandfYour Police Record
Section 29; Public Record CivilCourt Actions
If you have questions, please contact the official that gave you access to the e-OIPSystem.
Sections^-^^ Your Identifying Information
Provide the following information about your tdenltty.
Ge n e r a t e d on 2007 10 10 00 : 22 35. 226 P R I V A C Y A C ^ I N F O R M A T I O N
Data Hash Gode: 84208ede25b881512d8f cf 4af 8f f 5eee05dl 988a
BB
(b) (6),
(b) (7)
(C)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 6 of 2 9
Investigation Request #2665639 f o r Applicant SSN #gm#- Generated Copy
Section 1: Full Name
If you have no first name or middle name, select No First Name (NFN) or No Middle Name (NMN), as appropriate. If you
have only initials in your name, enter the initial(s) (without the period) and select Initial Only (10). If you are a "Jr.,"" "Sr.,"
"II, " etc., enter this under Suffix.
Full Name
Last: Manning First: Bradley Middle: Edward Suffix:
Section 2: Date of Birth
Date of Birth
Month/Day/Year#MK/ia8Z
Section 3: Place of Birth
Place of Birth
City: Oklahoma City County: OKLAHOMA State: QK Country:
Section 5: Other Names Used
Give other names you have used and the period of time you used them (for example: maiden name, name(s) by a former
marriage, former name(s), alias(es), nickname(s)). If the other name is your maiden name, check the "nee" box.
utner Names usea ( Not Applicable: { x } )
(No Entry Provided)
Section 6: Other Identifying Information
Height
Feet:
Inches: 2
Weight (Pounds): ULL
Hair Color: BLOND
Eye Color: BLUE
Sex
Male: { x } Female: { }
Section 7: Telephone Numbers
Provide your telephone numhiers and die time of die day that you are most likely available at these numbers. Include the Area
Code and extension, where applicable.
Work Telephone
Gener at ed on 2007- 10- 10 00: 22: 35. 226 PRI VACY ACT I NFORMATI ON
Data Hash Code: 84208ede25b881512d8fof4af8ff5eee05dl988a
/I
(b) (6),
(b) (7)(C)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 7 of 29
Investigation Request #2665639 for Applicant SSN ^11^1^^1^1 Generated Copy
Nurr^ber: Time:
HomeTelephone
Number: Time:
Section 8^ Citizenship
Itema
Mark the box that refiects your current citizenship status, and fol l ow its instructions.
Citizenship Status
laiTiaUSciti^en or riatiorial by t^irthiiT the LI Soi ' US territory/possession (Arisvveri1eiTisl:iaridd):^x
lamaLIS.Citizen, butlwas NOT born in the LIS^Answer items b, oandd): ^^
lam nolaU.S. citizen.(Answer itemsbande):^ ^
I t emh
Your Mother's Maiden Name:
Itemed United States Citizenship
If you tu^aU^S^eiti^:eri^but^were not born in the us,provide iiiforitialiou about oti^ormor^ ofthe following pro^
citizenship.
Naturalisation Certificate (Where were you naturalised^)
Court:
Location
City: Stale:
Certifioate Number:
i^ale Issued
Month/Oav/Year:^/^/^
Citizenship Certificate (Where was the certificate issued^)
Place Issued
City: State:
Certificate Number:
Oate Issued
l^or^th/Oav/Year:-^/^/^
State Oepartment Form 240 l9eport of Birth/abroad ofaCiti^en ofthe United States
Give Ihe date the form was prepared and give an explanation i f needed.
Ge n e r a t e d on 2 0 0 7 - 1 0 - ^ 0 0 0 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
(b) (6),
(b) (7)(C)
(b) (6), (b) (7)
(C)
(b)
(6),
(b)
(7)
(C)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 8 of 29
Investigation Request #2665639 f o r Applicant SSN ^^1^1^11^ Generated Copy
Date Form Prepared
Month/Oav/Year:^/^/-^
Explanation
U.SPassport
This may be eitheracurrentorprevious U.S.Passport.
Passport Number:
Oate Issued
Month/Oav/Year:08/2^/2005
Item d^ Dual Citizenship
If you are(orwere)aduaI citizen of the UnitedStates and another country,provide the name of that country.
Country(ies)ofOualCiti^enship(NotApplioable:^x^ )
(^^o^^^r^^rov^t^^^
Itemed Al i en
If you are an alien, provide the following information;
Place You Entered the United States
City: State:
Oate You EnteredUS
Month/Oay/Year:^/-^/-^
Alien Flegistration Number:
Country(ies) of Citizenship
/^o^r^^r^^rov-^c^eo^
Section ^^^here You l^aveLive^
Provideadetailed entry for each place you have lived in the 1ast7years. All periods must be accounted for in your lisLOo
not listapermanent address when you were actually living ataschool address, etc.You may omit temporary military duty
locations under90 days (list your permanent address instead).
T Provide Ihe requested information about this place where you have lived.
Be sure to indicate die actual physical location of your residence; do not useapost office box as an address, do not list
apermanent address when you were actually living ataschool address, etc. Be sure to specify your location as closely
as possible; for example, do not list only your base or ship, list your barracks number or home port.
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 0 0 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8fc;f4af8ff5eee05dl988a
(b) (6), (b)
(7)(C)
(b)
(6),
(b)
(7)
(C)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 9 of 29
Investigation Request #2565639 for Applicant SSN 4im#*- Generated Copy
For temporary military duty locations under 90 days, list your permanent address instead. You should use your
APO/FPO address if you lived overseas.
For addresses in the last five years, if this address is "General Delivery," a Rural or Star Route, or may be difficult to
locate, provide directions for locating the residence under Additional Comments below.
Dates of Activity
From (Month/Year): 07/2006 To (Month/Year): Present
Street Address
Street:
City: State: Country: Zip Code:
Person Who Knew You
For any address in the last 5 years, list a person who knew you at this address, and who preferably still lives in that area
(do not list people for residences completely outside this 5-year period, and do not list your spouse, former spouses, or
other relatives).
Name:
Street Address
Street:
City: State: Country: Zip Code:
TftlftphnnR Niimhmr
Number:
2- Dates of Activity
From (Month/Year): 04/2006 To (Month/Year): 07/2006
Street Address
Street:
City: State: Country: Zip Code
Person Who Knew You
Name:
Street Address
Street:
City: State: Country: Zip Code:
Telephone Number
Number:
3 Dates of Activity
From (Month/Year): 09/2005 To (Month/Year): 04/2006
Street Address
Street:
City: State: Country: Zip Code:
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 00: 22 : 35 . 226 P R I V A C Y A C T I N F O R MA T I O N
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
/s
(b) (6)
(b) (6) (b)
(6)
(b) (6)
(b) (6)
(b) (6)
(b) (6) (b)
(6)
(b) (6)
(b) (6)
(b) (6),
(b) (7)
(C)
(b) (6)
(b) (6) (b)
(6)
(b)
(6)
(b) (6)
(b) (6)
(b)
(6)
(b)
(6)
(b) (6)
(b) (6)
(b) (6)
(b) (6) (b)
(6)
(b) (6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 10 of 29
Investigation Request #2665639 for Applicant SSN ^MM|fr Generated Copy
Person Who Knew You
Name:
Street Address
Street:
City: State: Country: Zip Code:
Telephone Number
Number:
4 Dates of Activity
From (Month/Year): 11/2001 To (Month/Year): 09/2005
Street Address
Street:
City: : Country: Zip Code:
Person Who Knew You
Name:
Street Address
Street:
Cityr Stater Couiiliy. Zip Cudw:
Telephone Number
Number:
Additional Comments
In West Wales Postal Code SA611 HS
5- Dates of Activity
From (Month/Year): 01/1992 To (Month/Year): 11/2001
Street Address
Street:
City: State: Countr/: Zip Code:
Person Who Knew You
Name:
Street Address
Street:
City: State: Country: Zip Code:
Telephone Number
Number:
(End of List)
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 0 0 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
/O
(b) (6)
(b) (6)
(b) (6)
(b)
(6)
(b)
(6)
(b) (6)
(b) (6)
(b) (6)
(b) (6) (b) (6)
(b) (6)
(b) (6)
(b) (6) (b)
(6)
(b) (6)
(b) (6)
(b) (6)
(b) (6) (b)
(6)
(b) (6)
(b) (6)
(b) (6)
(b) (6) (b)
(6)
(b) (6)
(b) (6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 11 of 29
Investigation Request #2565639 for Applicant SSN <H0Hv Generated Copy
Section 10: Where You Went To School
List the schools you have attended, beyond Junior High School, in the last 7 years. If all of your education occurred more
than 7 years ago, list your most recent education beyond high school, no matter when that education occurred.
Schools Attended ( Not Applicable: { } )
"1 Provide the requested information about this school you attended. For correspondence schools and extension classes,
provide the address where die records are maintained.
Dates of Activity
From (Month/Year): 09/2001 To (Month/Year): 06/2005
School Type
High School: { X }
College/University/Military College: { }
Vocational/Technical/Trade School: { }
School Name: Tasker Milward VC
Street Address
Street: Portfield Ave Haverford
City: Wales Stalfi Cniintrv: UNlTEaKlNGDQM-2i&Cod;
Provide a detailed entry for each degree, diploma, etc. you received from this school.
Degree/Diploma/Other
1 Date Awarded
Month/Year: 06/2005
Degree/Diploma/Other: HIGH SCHOOL DIPLOMA
(End ol Degree/Diploma/Other List)
Person Who Knew You
For schools you attended in the last 3 years, list a person who knew you at school (an instructor, student, etc.). Do not
list people for education completely outside this 3-year period.
Name:
Street Address
Street:
City: State; Country: Zip Code
Telephone Number
Number:
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 00: 22 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8f cf 4af 8f f 5eee05dl 988a
n
(b) (6)
(b) (6)
(b) (6)
(b) (6)
(b)
(6)
(b) (6)
(b) (6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 12 of 29
Investigation Request #2665639 f o r Applicant SSN 11^11^1111 Generated Copy
2 Dates of Activity
From(Month/Year^:01/2007To(Month/Year^:05/2007
SchoolType
HighSchool:^^
College/University/Military College:^x^
Vocational/Technioal/TradeSchool:^^
SchoolNameMONTGOMERY COLLEGE OFROCKV1LLE
Street Address
Street: 51 Mannakee St
Citv: Rockville Stale MDCotmtrv: ZioCode:20850-1101
Degree/Diploma/Other
(^^o8^r^^r^P^rov/t:/ed)
Person Who KnewYou
Name
Street Address
Street:
Citv: State: Country: ZioCode
Telephone Number
Number:
(i5^^^^^^^r,)
Sectiont1:Your Employment Activities
Provideadetailed entry for each of your employment activities for the last7years.You should list all fulltime work,
parttime work, mihtary service, temporary military duty Iocationsover90 days, self-employment, otherpaid work, and all
periods of unemployment. The entire7yearperiod must be accounted for without breaks, but you need not list employments
before your 16th birthday.E^CEPTION; Show all Federal civilian service, whetherit occurred within the last7yearsornot.
t Dates of Activity
From (Month/Year): 01/2007To(Month/Yearl: Present
Use one of the codes listed below to identify the type of employment;
Type of Employment
Active military duty stations:^^
National Guard/I9eserve:^^
U.S.P.H.S. Commissioned Corps:^^
Other Federal employment:^^
State Government ^NonFederalemployment):^^
Selfemployment:^^
Unemployment:^^
Gener at ed on 2007 10 10 00: 22: 35 226 PRI VACY ACT I NF ORMAT I ON
Data Hash Code: 84208ede25b881512d8fc;f4af8ff5eee05dl988a
(b)
(6)
(b) (6)
(b) (6)
(b) (6) (b)
(6)
(b) (6)
(b) (6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 13 of 29
Investigation Request #2565639 for Applicant SSN ^11111^111 Generated Copy
Federal Contractor:^ ^
Other:^x^
Employer Name: Starbucks
Your Position Title: Barista
Employer's Street Address
Street: 7911Tuckerman Lane
City: Potomac State: MD Country: ZipCode:20854
Employer'sTelephone Number
Number:f301^765 0556
dob Location Street Address (ifdifferentthan employer address)
StreeL
City: State: Country: Zip Code:
dob Location Telephone Number
Number:
Supervisors Name:
Supervisor's StreetAddress (if different than iob location)
Street:
City: State: Country: Zip Code:
Supervisor'sTelephone Number
Number:
Provide Previous Periods of Activity if you worked for this employer on more than one occasion at the same location.
After entering the most recent period of employment above, provide previous periods of employment at the same
location on die additional lines provided. For example, if you worked at ^Y Plumbing in Denver, CO, during3
separate periods of time, you would enter dates and information concerning the most recent period of employment
above, and provide dates, position titles, and supervisors for the two previous periods of employment on die lines
below.
Previous Periods Of Activi1y(NotApplicable:^x^ )
/^oE^r7^^^^ov^t^ec^,)
^ Dates of Activity
From (Month/Year^:06/2006To(Month/Year^: 01/2007
Type of Employment
Active military duty stations:^^
National Guard/f^eserve:^^
USPHS Commissioned Corps:^^
Other Federal employment:^^
State Government (Non-Federal employment):^ ^
Selfemployment:^^
UnemploymenL^x^
Federal Contractor:^^
Other:^^
List the name of the person who can verify your unemployment.
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 0 0 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
(b) (6)
(b) (6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 14 of 29
I n v e s t i g a t i o n Request #2665639 f o r Applicant SSN ^l^l^^|^li Generated Copy
Verifier Name:
VerifieBs Street Address
Street:
City: State: Country: Zi pCod
Verifier'sTelephone Number
Number:
^- Dates of Activity
From(Month/Yearl:04/2006To(Month/Year^:06/2006
Type of Employment
Aotive military duty stations:^^
National Guard/^eserve:^^
t^.S.P.H.S.Commissioned(^orps:^ ^
Other Federal employment:^ ^
State Government (NonFederalemployment):^^
Self employment:^ ^
Unemployment:^^
Federal Contractor:^^
Other:^x^
Employer Name: FYE
Your Position Title: Asst Manager
Employer's Street Address
Street:7021 SMemori ai Drive
Ci 1y: Ti l 1^St at e: ^Count ry: Zip Code: 7 4 1 ^
Employer'sTelephone Number
Number:
dob Looation Street Address (if different than employer address)
Street:
City: State: Country: Zip Code:
dob LocationTelephone Number
Number:
Supervisor's Name:
Supervisor's Street Address (if different than iob location)
Street:
City: State: Country: Zip Code:
Supervisor'sTelephone Number
Number:
Provide Previous Periods of Activity if you worked for this employer on more than one occasion at the same location.
After entering the most recent period of employment above, provide previous periods of employment at the same
location on Ihe additional lines provided.For example, if you worked at ^Y Plumbing in Denver, CO, during3
separate periods of time, you would enter dates and information concerning the most recent period of employment
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 00: 22 : 35. 226 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
^ ( : ^
(b)
(6)
(b) (6)
(b) (6)
(b) (6) (b)
(6)
(b) (6)
(b) (6)
(b) (6)
(b) (6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 15 of 29
I n v e s t i g a t i o n Request #2565639 for Applicant SSN #@|@NNk Generated Copy
above, and provide dales, position titles, and supervisors for the two previous periods of employment on die lines
below.
Previous Periods of Activity ( Not Applicable: { x } )
(No Entry Provided)
4. Dates of Activity
From (Month/Year): 02/2006 To (Month/Year): 04/2006
Type of Employment
Active military duty stations: { }
National Guard/Reserve: { }
U.S.P.H.S. Commissioned Corps: { }
Other Federal employment: { }
State Government (Non-Federal employment): { }
Self-employment: { }
Unemployment: { }
Federal Contractor: { }
Other: { x }
Employer Name: Zoto Inc
Your Position Title: Intern Programer
-Employer^s-Street-Address-
Street: 123 South Hudson Street
City: Oklahoma City State: QK Country: Zip Code: 73102
Employer's Telephone Number
Number: (650) 641-0108
Job Location Street Address (if different than employer address)
Street:
City: State: Country: Zip Code:
Job Location Telephone Number
Number:
Supervisor's Name:
Supervisor's Street Address (if different than job location)
Street:
City: State: Country: Zip Code:
Supervisor's Telephone Number
Number:
Provide Previous Periods of Activity if you worked for this employer on more than one occasion at the same location.
After entering the most recent period of employment above, provide previous periods of employment at the same
location on the additional lines provided. For example, if you worked at XY Plumbing in Denver, CO, during 3
separate periods of time, you would enter dates and information concerning die most recent period of employment
atiove, and provide dales, position titles, and supervisors for the two previous periods of employment on the lines
below.
Generated on 2007-10-10 00:22:35.226 PRIVACY ACT INFORMATION
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
^
(b) (6)
(b) (6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 16 of 29
Investigation Request #2665639 for Applicant SSN 4#MM## Generated Copy
Previous Periods of Activity ( Not Applicable: { x } )
(No Entry Provided)
5- Dates of Activity
From (Month/Year): 09/2005 To (Month/Year): 02/2006
Type of Employment
Active military duty stations: { }
National Guard/Reserve: { }
U.S.P.H.S. Commissioned Corps: { }
Other Federal employment: { }
State Government (Non-Federal employment): { }
Self-employment: { }
Unemployment: { }
Federal Contractor: { }
Other: { x }
Employer Name: Incredible Pizza Co
Your Position Title: Server
Employer's Street Address
Street: 8314 E 71 St
City: l ui sa State: OK Country: Zip Code: 74132
Employer's Telephone Number
Number: (918) 294-8671
Job Location Street Address (if different than employer address)
Street:
City: State: Country: Zip Code:
Job Location Telephone Number
Number:
Supervisor's Name:
Supervisor's Street Address (if different than job location)
Street:
City: State: Country: Zip Code:
Supervisor's Telephone Number
Number:
Provide Previous Periods of Activity if you worked for this employer on more than one occasion at the same location.
After entering the most recent period of employment above, provide previous periods of employment at the same
location on die additional lines provided. For example, if you worked at XY Plumbing in Denver, CO, during 3
separate periods of time, you would enter dates and information concerning the most recent period of employment
above, and provide dates, position titles, and supervisors for the two previous periods of employment on die lines
below.
Previous Periods of Activity ( Not Applicable: { x } )
(No Entry Provided)
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 0 0 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
-u
(b) (6)
(b) (6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 17 of 29
Investigation Request #2665639 for Applicant SSN <MlHHd Generated Copy
Dates of Activity
From (Month/Year): 08/1988 To (Month/Year): 09/2005
Type of Employment
Active military duty stations: { }
National Guard/Reserve: { }
U.S.P.H.S. Commissioned Corps: { }
Other Federal employment: { }
State Government (Non-Federal employment): { }
Self-employment: { }
Unemployment: { x }
Federal Contractor: { }
Other: { }
List the name of the person who can verify your unemployment.
Verifier Name:
Verifier's Street Address
Street:
City: State: Country: Zip Code:
Verifier's Telephone Number
Number:
(End of List)
Section 12: People Who Know You Well
List three people who know you well and live in the United States. They should be good friends, peers, colleagues, college
roommates, etc., whose combined association widi you covers as well as possible the last 7 years. Do not list your spouse,
former spouses, or other relatives, and try not to list anyone who is listed elsewhere on this form.
' Dates Known
From (Month/Year): 01/1996 To (Month/Year): Present
Name:
Home or Work Address
Street:
City: State: Country: Zip Code:
Telephone Number
Number: Time: Night
2- Dates Known
From (Month/Year): 09/1993 To (Month/Year): Present
Name:
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 0 0 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
(b)
(6)
(b) (6)
(b) (6)
(b) (6) (b)
(6)
(b) (6)
(b) (6)
(b) (6)
(b) (6)
(b) (6) (b)
(6)
(b) (6)
(b) (6)
(b) (6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 18 of 29
Investigation Request #2555539 f o r Applicant SSN #####^ Generated Copy
Home or Work Address
Street:
City: State: Country: Zip Code:
Telephone Number
Number: Time: Night
3- Dates Known
From (Month/Year): 08/1993 To (Month/Year): Present
Name:
Home or Wor
Stre 4701 fee Creek Road
City: Edmond State: QK Country: Zip Code: 73034
Telephone Number
Number: ( Time: Night
(EndofUst)
Section 13/15: Your Spouse
Mark one item to show your current marital status.
Marital Status
Never Married: { x }
Married: { }
Separated: { }
Legally Separated: { }
Divorced: { }
Widowed: { }
Other: { }
Current Spouse ( Not Applicable: { x } )
(No Entry Provided)
Former Spouse(s) ( Not Applicable: { x } )
(No Entry Provided)
Section 14/15: Your Relatives and Associates
Give the full name, correct code, and other requested information for each of your relatives and associates, living or dead,
specified below.
1. Mother
2. Fadier
3. Stepmother
4. Stepfather
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 0 0 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
I V
(b)
(6)
(b) (6)
(b) (6) (b)
(6)
(b) (6)
(b) (6)
(b) (6)
(b) (6)
(b) (6) (b)
(6)
(b) (6)
(b) (6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 19 of 29
Investigation Request #2665539 for Applicant SSN ^^1^111^^1 Generated Copy
5. Foster Parent
6. Child(Adopted and Foster Child also)
7 Stepchild
8. Brother
9 Sister
10. Stepbrodier
11. Stepsister
12 Halfbrother
13. Halfsister
14. Father-inlaw
15. Mothertnlaw
16. Guardian
17 Other Relatives
18. Associated
19 Adult Currently Living widiYou
mother Relative-include only foreign national relatives not listed i nl - 16wi di whom you or your spouse are bound by
affection, obligation,or close and continuing contact Associate-include only foreign national associates with whom you or
your spouse are bound by affection, obligation, or close and continuing contact.
^ Relationship Type: Mother
Full Name
Last: First: Susan Middle: Mary Suffix:
Deceased
Yes:^^No:^x^
DateofBirth
Month/Day/Year:
Country of Birth
CountrvUNITEDKINGDOM
Country(ies)of Citizenship
^ Country; UNITED KINGDOM
(^^^^i^^Co^^r^^i^^,)^^Ci^i.^^^s^^^^^^r,)
Provide the following information if this person is living.
Current Address
Citv: Haverfordwest State: Country: UNITED KINGDOM
Secti on15: Citizenship of Your Relatives and Associates
If your mother, 1ather,sister, brother, child, or person with whom you haveaspouse-like relationship isaU.S.citizen
by other than birdi, or an alien residing in the U.S.,provideaProof of Citizenship Status entry below.
Proof of Citizenship Status
Generat ed on 2007 10 10 00 : 22: 35 226 PRI VACY ACT I NF ORMAT I ON
Data Hash Code: 84208ede25b881512d8f cf 4af 8f f 5eee05dl 988a
(b)
(6)
(b)
(6)
(b) (6)
Electronic Questionnaires f o r Investigations Processing (e-QIP) Page 20 of 29
Investigation Request #2665639 f o r Applicant SSN ^^1^^11111 Generated Copy
Provide one or more of die following to identify proof of citizenship status.
Naturalisation Certificate
Certificate Number:
Provide the date issued and the location where the person was naturahzed (Court, City and State).
Date Issued
Month/Dav/Year:^/^/^
Court:
Location
City: State:
Citizenship Certificate
Certificate Number:
Provide the date and location issued (City and State).
Date Issued
Month/Dav/Year:^/^/^ Location Issued
City: State:
Alien Registration
Registration Number:
Provide the date and place where the person entered theU.S.(City and State).
Date EnteredUS
Month/Dav/Year:-/^/-
Place EnteredU S
City: State:
Other
Provide an explanation in the space below.
Explanation
Mother is not aci t i zen of t he United States but i saci t i zen of t he UK
2^ RelationshipType: Father
Full Name
Last: Manning First: Brian Middle: Edward Suffix:
Deceased
Generatedon 2007 10 10 00:22:35 226 PRIVACY ACTI NFORMATI ON
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
^ ( ^
(b)
(6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 21 of 29
I n v e s t i g a t i o n Request #2665639 for Applicant SSN ##### Generated Copy
Yes: { } No: { X }
Date of Birth
Month/Day/Year:t
Country of Birth
Country: UNITED STATES
Country(ies) of Citizenship
1 Country: UNITED STATES
(End ot Country(ies) of Citizenship List)
Current Addr
Street
City: State: Country:
Section 15: Citizenship of Your Relatives and Associates
Proof of Citizenship Status
(No Entry Provided)
3- Relationship Type: Sister
Full Name
Last: Major First: Casey Middle: Manning Suffix:
Deceased
Yes: { } No: { X }
Date of Birth
Monlh/Day/Year:J
Country of Birth
Country: UNITED STATES
Country(ies) of Citizenship
1 Country; UNITED STATES
(End of Country(ies) of Citizenship List)
Current Address
Street:
City: State: Country:
Section 15: Citizenship of Your Relatives and Associates
Proof of Citizenship Status
(No Entry Provided)
(End of List)
G e n e r a t e d o n 2 0 0 7 - 1 0 - 1 0 00 : 2 2 : 3 5 . 2 2 5 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8f cf 4af 8f f 5eee05dl 988a
^7
(b) (6)
(b) (6)
(b) (6) (b)
(6)
(b) (6)
(b) (6) (b)
(6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 22 of 29
Investigation Request #2665639 f o r Applicant SSN Generated Copy
Section 16: Your Military History
Answer the following questions.
a. Have you served in the United States military?
Yes: { } No: { X }
b. Have you served in the United States Merchant Marine?
Yes: { } No: { X }
List all of your military service below, including service in Reserve, National Guard, and U.S. Merchant Marine. If you had a
break in service, each separate period should be listed. If your service was with other than the U.S. Armed Forces, identify
the country for which you served.
Military History ( Not Applicable: { x } )
(No Entry Provided)
Section 17: Your Foreign Activities
Answer ihe following questions.
a. Do you have any foreign property, business connections, or financial interests?
Yes: { } No: { X }
b. Are you now or have you ever been employed by or acted as a consultant for a foreign government,
firm or agency?
Yes: { } No: { X }
c. Have you ever had any contact with a foreign government, its establishments (embassies or
consulates), or its representatives, whether inside or outside the U.S., other than on official U.S.
Government business? (Does not include routine visa applications and border crossing contacts.)
Yes: { } No: { X }
d. In the last 7 years, have you had an active passport that was issued by a foreign government?
Yes: { } No: { X }
If you answered " Yes"' to one or more of the questions above, provide a detailed entry for each period of foreign activity.
(No Entry Provided)
Section 18: Foreign Countries You Have Visited
List foreign countries you have visited, except on travel under official Government orders, working back 7 years. ( Travel as a
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 0 0 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
20
(b)
(6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 23 of 29
Investigation Request #2665539 for Applicant SSN MMMV^9 Generated Copy
dependent or contractor must be listed.)Include short trips to Canada or Mexico. If you lived nearaborder and have made
short(one day or less) trips to the neighboring country, you do not need to list each trip. Do not repeat travel covered in
sections 9,10, or l l .
Foreign Travels ( Not Applicable: { } )
1 Indicate the purpose of your visit. If you lived near a border and have made short (one day or less) trips to the
neighboring country, provide the time period, purpose, country and check the " Many Short Trips" box.
Dates of Activity
From (Month/Year): 03/2006 To (Month/Year): 03/2006
Purpose of Visit
Business: { } Pleasure: { x } Education: { } Other: { }
Countries Visited
1 Country: UNITED KINGDOM
(End of Countries Visited List)
Many Short Trips: { }
^ Dates of Activity
From (Month/Year): 11/2001 To (Month/Year): 09/2005
Purpose of Visit
Business: { } Pleasure: { } Education: { } Other: { x }
Countries Visited
Country: UNITED KINGDOM
(End ol Countries Visited List)
Many Short Trips: { }
3 Dates of Activity
From (Month/Year): 10/2004 To (Month/Year): 10/2004
Purpose of Visit
Business: { } Pleasure: { x } Education: { } Other: { }
Countries Visited
1- Country: JAPAN
(End of Countries Visited List)
G e n e r a t e d o n 2 0 0 7 - 1 0 - 1 0 00 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
(b)
(6)
Electronic Questionnaires f o r Investigations Processing (e-QIP) Page 24 of 29
Investigation Request #2665639 f o r Applicant SSN #MMN# Generated Copy
Many Short Trips: { }
Section 19: Your Military Record
Answer the following question.
(EndofUst)
Have you ever received other than an honorable discharge from the military?
Yes: { } No: { X }
If "Yes," provide the date of discharge and type of discharge below.
Date Of Discharge
Month/Year: - 1 ~
Type of Discharge:
Section 20: Your Selective Service Record
Answer the foltowing question.
a. Are you a male born after December 31,1959?
Yes: { X } No: { }
If you answered "Yes" to question a, answer the following question.
b. Have you registered with the Selective Service System?
Yes: { X } No: { }
If you answered "Yes"" to question b, provide your registration number. If "No," show the reason for your legal exemption.
Registration Number:
Legal Exemption Explanation ( I Do Not Know: { } )
Section 21: Your Medical Record
Answer the following question.
In the last 7 years, have you consulted with a mental health professional (psychiatrist, psychologist.
Ge n e r a t e d on 2 0 0 7 - 1 0 - 1 0 0 0 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8f cf 4af 8f f 5eee05dl 988a
30
(b) (6)
(b) (6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 25 of 29
Investigation Request #2665639 for Applicant SSN^1^111^11^^ Generated Copy
counselor,etc.)or have you consulted with another health care provider aboutamental health related
condition?
Yes : ^^No: ^x^
If you answered''Yes,"provide an entry for each treatment to report,unless the consultation(s)invoIved only maritaL family,
or grief counseling, not related to violence by you.
(^/Vo^^t^P^oiB/ded)
Section 22: Your Employment Record
Answerthefollowingquestion
Has anyofthe following happened to you in the Iast7years?
t. Fired fromajob.
2. Ouitajob after being told you'd be fired
3. Leftajob by mutual agreement following allegations of misconducL
4 Leftajob by mutual agreement following allegations of unsatisfactory performance
5 Leftajob for other reasons under unfavorable circumstances
Yes:^^No:^x^
If you answered "Yes,"provideadetailed entry for each occurrence to report.
(^/Vo^nfry/^r^ov/c(ed)
Section 23: Your Police Record
For this item, report information regardless of whether the record in your case has been''sealed"or otherwise stricken from
the court record. The single exception to this requirement is for certain convictions under the Federal Controlled Substances
Act for which the couri issued an expungement orderunderthe authority of21 U.S.C. 844 or 18 us e. 3607.
Answerthefollowingquestions
a. Have you ever been charged with or convicted of any felony offense? (Include those unCer Uniform
Code of Military Justice)
Yes: ^^No: ^x^
b Have you ever been charged with or convicted ofafirearms or explosives offense?
Yes: ^^No: ^x^
c Are there currently any Charges pending against you for any criminal offense?
Yes: ^^No: ^x^
d. Have you ever been charged with or convicted of any offense(s) related to alcohol or drugs?
Yes: ^^No: ^x^
Generated on 2007-10-10 00:22: 35.226 PRIVACY ACTI NFORMATI ON
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
^
(b) (6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 26 of 29
Investigation Request #2665639 f o r Applicant SSN^il1l^11^l1111ll Generated Copy
e. In the Iast7years,have you been subjectto court martial or other disciplinary proceedings underthe
Uniform Code of Military Justice? (Include non judicial. Captain's mast, etc.)
Yes : ^ ^ No: ^ x ^
f In the Iast7years, have you been arrested for,charged with,or convictedof any offense(s) not listed in
response to a, b,c,d,oreaboye? (Leave out traffic fines of less than ^150 unless the violation was
alcohol or drug related )
Yes:^^No:^x^
If you answered "Yes"to a, b,c,d,e,orfabove, provide an entry for each occurrence to report.
(^O^B^^^^FOiB/ded)
Section 24: Your ^se of Illegal Orugs and Orug Activity
The following questions pertain to the illegal use of drugs or drug activity. You are required to answer the questions fully and
truthfully, and your failure to do so could be grounds for an adverse employment decision or action against you, but neither
your truthful responses nor information derived from your responses will be used as evidence against you in any subsequent
criminal proceeding.
Answerthefollowingquestions
a. Since the age of t ^or in the Iast7years.whichever is shorter.have you illegally used any controlled
substance, for example, marijuana, cocaine, crack cocaine, hashish, narcotics (opium, morphine,
codeine, heroin, etc ), amphetamines, depressants (barbiturates, methaqualone, tranquilizers, etc ),
hallucinogenics (LSD, PCP, etc), orprescription drugs?
Yes : ^ ^ No: ^ x ^
b Have you ^ y ^ illegally usedacontrolled substance while employed asalaw enforcement officer,
prosecutor,or courtroom official: while possessingasecurity clearance: or while inaposition directly and
immediately affecting the public safety?
Yes : ^^No: ^x^
c. In the Iast7years,have you been involved in the illegal purchase,manufacture,trafficking, production,
transfer,shipping,receiving, or sale of any narcotic, depressant, stimulanL hallucinogen,or cannabis for
your own intended profit or that of another?
Yes : ^ ^ No: ^ x ^
If you answered "Yes"toaorbabove, provide an entry for each controlled substance orprescription drug used.
^^oE^r^fr^^rov^ded)
Section 25: Your l^se of Alcohol
Answerthefollowingquestion
Generatedon 2007 10 10 00 :22 35.226 PRIVACY ACTI NFORMATI ON
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
^ 2
(b)
(6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 27 of 29
Investigation Request #2665639 for Applicant SSN 4HMHI- Generated Copy
In the last 7 years, has your use of alcoholic beverages (such as liquor, beer, wine) resulted in any
alcohol-related treatment or counseling (such as for alcohol abuse or alcoholism)?
Yes: { } No: { X }
If you answered "Yes," provide an entry for each Ureatment to report. Do not repeat information reported in response to
section 21.
(No Entry Provided)
Section 2^: Your Investigations Record
Answerthefollowingquestion.
a.Has the United States Government ever investigated your background and/or granted youasecurity
clearance? If your response is "NoB'or you don't know or can't recall if you were investigated and
cleared, check the'^No^^ box.
Yes: ^ ^ No: ^ x^
If you answered "Yes," provide the requested information below.
(No Entry Provided)
Answer the following question.
b. To your knowledge, have you ever had a clearance or access authorization denied, suspended, or
revoked, or have you ever been debarred from government employment? (An administrative downgrade
or termination of a security clearance is not a revocation.)
Yes: { } No: { X }
If you answered "Yes," provide the requested information below.
(No Entry Provided)
Section 27: Your Financial Record
Answer the following questions.
a. In the last 7 years, have you filed a petition under any chapter of the bankruptcy code (to include
Chapter 13)?
Yes: { } No: { X }
b. In the last 7 years, have you had your wages garnished or had any property repossessed for any
reason?
Yes: { } No: { X }
Generated on 2007-10-10 00:22:35.226 PRIVACY ACT INFORMATION
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
(b)
(6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 28 of 29
Investigation Request #2665639 f o r Applicant SSN ^1^ilill1^^1 Generated Copy
c. In the Iast7years,have you hadalien placed against your propertyforfailing to pay taxes or other
debts?
Yes : ^ ^ No: ^ x ^
d In the Iasl7years,have you had any judgments against you that have not been paid?
Yes : ^ ^ No: ^ x ^
If you answered "Yes" to a, b,c, or d, provide an entry for each occurrence to report.
(^^o^^tr^P^oiB/dec^
Section 28: Your Financial Oelinguencies
Answerthefollowingquestions
a. In the Iast7years,have you been over 180 days delinquent on any debt(s)?
Yes : ^ ^ No: ^ x ^
b Are you currently over90 days delinquent on any debt(s)?
Yes: ^ ^ No: ^ X^
If you answered "Yes" toaorb, provide an entry for each occurrence to report.
(/VoE/7tr^^^oi^^dec^
Section 29: Pul^lic Record Civil Court Actions
Answerthefollowingquestion
In the Iast7years,have you beenaparty to any public record civil court actions not listed elsewhere on
this form?
Yes : ^ ^ No: ^ x ^
If you answered "Yes,"provide the information about each public record civil court action.
(^oE^r^f^^^oiB^ded)
Section 30: Your Association Record
Answerthefollowingquestions.
a Have you ever been an officer oramember or madeacontribution to an organization dedicated to the
G e n e r a t e d o n 2007 10 10 00 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a
(b)
(6)
Electronic Questionnaires for Investigations Processing (e-QIP) Page 29 of 29
Investigation Request #2655539 for Applicant SSN #####-9 Generated Copy
violent overthrow of the United States Government and which engages in illegal activities to that end,
knowing that the organization engages in such activities with the specific intent to further such activities?
Yes: ^ ^ No: ^ x^
b. Have you ever knowingly engaged in any acts or activities designed to overthrow the United States
Government by force?
Yes: ^ ^ No: ^ x^
Ifyouanswered "Yes" toaorb, explain in the space below.
Explanation
Additional Comments
Use the space below to continue answers to all otheritems and any information you would like to add.
Additional Comments
CertificatioiT^lTat^My^Answers^ATe^True
My statements on this form, and any attachments to it, are true, complete, and correct to die best of my knowledge and belief
and are made in good faith.Iunderstandthataknowing and willful false statement on this form can be punished by fine or
imprisonment or bodi. (See section 1001 of title 18, United States Code).
Signature (^^^^n^^^r^^^ Date
(Signature on fi l e-see investigation Request ^665639 Signature Forms)
Expected attachments
If you need to submit additional documents with your request, giveabrief title or description of each attachment you plan to
provide(eg.,map with directions to residence).Providing this list is optional; however, doing so may assist the processing
offices in accounting for all attachments.Include each attachmcntspage count.(One sheet widi content on front and back is
two pages.)
Write your social security number and Ihe Investigation Request number on the margin of each attachment you submit.
Expected Attachments
^^c^^t^^^ci^^d^d)
Ge n e r a t e d on 2007- 10- 10 00 : 2 2 : 3 5 . 2 2 6 P R I V A C Y A C T I N F O R M A T I O N
Data Hash Code: 84208ede25b881512d8f cf 4af 8f f 5eee05dl 988a
3s'
(b)
(6)
standard Form 86 Format
Revised September 1995
U.S. Office of Personnel Management
5 CFR Part 731, 732, and 736
Form approved:
O.M.B. No. 3206-0005
NSN 7540-00-634-4036
86-111
UNITED STATES OF AMERICA
After compl et i ng Parts 1 and 2 of thi s f orm and any attachments, you shoul d review your answers to all quest i ons to make sure the f or m i s
compl et e and accurate, and then si gn and date the f ol l owi ng certi fi cati on and si gn and date the release on Page 10.
Certification That My Answers Are True
My Statements on this form, and any attachments to it, are tme, complete, and correct to the best of my knowledge and
belief and are made in good faith. I understand that a knowing and willful false statement on this form can be punished
by fine or imprisonment or txith. (See Section 1001 of title 18, United States Code).
Signature (Sign in ink) Full Name (Type or Print Legibly)
Manning, Bradley E
Date Signed
20070926
jO
Full Name (Type or Print Legibly)
Manning, Bradley E
Date Signed
20070926
Social Security Number
MHI-9
30
(b)
(6)
Standard Form 86 Format
Revised September 1995
U.S. Office of Personnel Management
5 CFR Pan 731, 732, and 736
Ii
08F18704
UNITED STATES OF AMERICA
Form approved:
O.M.B. No. 3206-0005
NSN 754040-634-4036
86-111
AUTHORIZATION FOR RELEASE OF INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink.
I Authorize any investigator, special agent, or other duly accredited representative of the authorized Federal agency
conducting my background investigation, to obtain any information relating to my activities from individuals, schools,
residential management agents, employers, criminal justice agencies, credit bureaus, consumer reporting agencies,
collection agencies, retail business establishments, or other sources of information. This information may include, but
is not limited to, my academic, residential, achievement, performance, attendance, disciplinary, employment history,
criminal history record information, and financial and credit information. I authorize the Federal agency conducting my
investigation to disclose the record of my background investigation to the requesting agency for the purpose of making
a determination of suitability or eligibility for a security clearance.
I Understand that, for financial or lending institutions, medical institutions, hospitals, health care professionals, and
other sources of information, a separate specific release will be needed, and I may be contacted for such a release at a
later date. Where a separate release is requested for information relating to mental health treatment or counseling, the
release will contain a list of the specific questions, relevant to the job description, which the doctor or therapist will tie
asked.
I Further Authorize any investigator, special agent, or other duly accredited representative of the U.S. Office of
Personnel Management, the Federal Bureau of Investigation, the Department of Defense, the Defense Investigative
-Service, and any other authorized fedeial aguncy, to request cnminai record information atxxit me from criminal justice
agencies for the purpose of determining my eligibility for access to classified information and/or for assignment to, or
retentton in, a sensitive National Security position, in accordance with 5 U.S.C. 9101. I understand that I may request a
copy of such records as may be available to me under the law.
I Authorize custodians of records and sources of information pertaining to me to release such information upon request
of the investigator, special agent, or other duly accredited representative of any Federal agency authorized atx3ve
regardless of any previous agreertient to the contrary.
I Understand that the information released by records custodians and sources of information is for official use by the
Federal Government only for the purposes provided in this Standard Form 86, and that it may be redisclosed by the
Government only as authorized by law.
Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization
is valid for five (5) years from the date signed or upon termination of my affiliation with the Federal Government,
whichever is sooner. Read, sign and date the release on the next page if you answered "Yes" to question 21.
Signature (Sign in ink) Full Name (Type or Print Legibly)
Manni ng, Bradley E
Date Signed
20070926
Full Name (Type or Print Legibly)
Manni ng, Bradley E
Date Signed
20070926
other Names Used
Social Security Number
4Nky
Current Address (Street, City) State ZIP Code
Home Telephone Number
(Include Area Code)
T ' r\ "7 T T n
ir L_ !v 'V L i- v ^
^ 7
(b)
(6)
(b) (6)
(b) (6) (b) (6)
(b)
(6)
Slandanj Form 36 Format
Revised Septemtier 1995
U.S. Office of Personnel Management
5 CFR Part 731, 732, and 736
Form approved:
O.M.B. No. 3206-0005
NSN 7540-00-634-4036
86-111
UNITED STATES OF AMERICA
AUTHORIZATION FOR RELEASE OF INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink.
I Authorize any investigator, special agent, or other duly accredited representative of the authorized Federal agency
conducting my background investigation, to obtain any information relating to my activities from individuals, schools,
residential management agents, employers, criminal justice agencies, credit bureaus, consumer reporting agencies,
collection agencies, retail business establishments, or other sources of information. This information may include, but
is not limited to, my academic, residential, achievement, performance, attendance, disciplinary, employment history,
criminal history record information, and financial and credit information. I authorize the Federal agency conducting my
investigation to disclose the record of my background investigation to the requesting agency for the purpose of making
a determination of suitability or eligibility for a security clearance.
1 Understand that, for financial or lending institutions, medical institutions, hospitals, health care professionals, and
other sources of information, a separate specific release will be needed, and I may be contacted for such a release at a
later date. Where a separate release is requested for information relating to mental health treatment or counseling, the
release will contain a list of the specific questions, relevant to the job description, which the doctor or therapist will be
asked.
1 Further Authorize any investigator, special agent, or other duly accredited representative of the U.S. Office of
Personnel Management, the Federal Bureau of Investigation, the Department of Defense, the Defense Investigative
Service, and any other authorized Federal agency, to request criminal record information about me from criminal justice
agencies for the purpose of determining my eligibility for access to classified infomiation and/or for assignment to, or
retention in, a sensitive National Security position, in accordance with 5 U.S.C. 9101. I understand that I may request a
copy of such records as may be available to me under the law.
1 Authori ze custodians of records and sources of information pertaining to me to release such information upon request
of the investigator, special agent, or other duly accredited representative of any Federal agency authorized above
regardless of any previous agreement to the contrary.
I Understand that the information released by records custodians and sources of information is for official use by the
Federal Government only for the purposes provided in this Standard Form 86, and that it may be redisclosed by the
Government only as authorized by law.
Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization
is valid for five (5) years from the date signed or upon termination of my affiliation with the Federal Government,
whichever is sooner. Read, sign and date the release on the next page if you answered "Yes" to question 21.
Signature (Sign in ink) Full Name (Type or Print Legibly)
Manning, Bradley E
Date Signed
20070926
/ : ^^==^- - ^s^
Full Name (Type or Print Legibly)
Manning, Bradley E
Date Signed
20070926
other Names Used
Social Security Number
Current Address (Street, City) State
ZIP Code
Home Telephone Number
(Include Area Code)
30
(b) (6)
(b)
(6)
(b)
(6)
(b) (6)
(b) (6)
Standard Form 86 Format
Revised September 1995
U.S. Office of Personnel Management
5 CFR Parts 731, 732. and 736
08F18704
Form approved:
O.M.B. No. 3206-0005
NSN 7540-00-634-4036
86-111
UNITED STATES OF AMERICA
AUTHORIZATION FOR RELEASE OF MEDICAL INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink.
Instructions for Completing this Release
This is a release for the investigator to ask your health practitioner(s) the three questions below conceming your mental
health consultations. Your signature will allow the practitioner(s) to answer only these questions.
I am seeking assignment to or retentbn in a position with the Federal government which requires access to classified
national security information or special nuclear information or material. As part of the clearance process, I hereby
authorize the Investigator, special agent, or duly accredited representative of the authorized Federal agency conducting
my background investigation, to obtain the following information relating to my mental health consultations:
Does the person under investigation have a condition or treatment that could impair his/her judgement or
reliability, particulady in the context of safeguarding classified national security information or special
nuclear information or material?
If so, please describe the nature of the condition and the extent and duration of the impairment or
treatment.
What is the prognosis?
I understand the information released pursuant to this release is for use by the Federal Government only for purposes
provided in the Standard Form 86 and that it may be redisclosed by the Government only as authorized by law.
Copies of this authorization that show my signature are as valid as the original release signed by me. This
authorization is valid for 1 year from the date signed or upon termination of my affiliation with the Federal Government,
whichever is sooner.
Signature (Sign in ink) Full Name (Type or Print Legibly)
Manni ng, Bradi oyE
Dale Signed
20070926
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
Full Name (Type or Print Legibly)
Manni ng, Bradi oyE
Dale Signed
20070926
other Names Used Social Security Number
# # # . 9
CurrentAddress (Street,City) State
ZIP Code
Home Telephone Number
(Include Area Code)
I T > r\ r\ -r T T r^, T
' L y L ' < j ' < j " v "
e #
(b)
(6)
(b) (6)
(b
)
(6)
(b)
(6)
(b) (6)
standard Form 86 Format
Revised September 1995
U.S. Office of Personnel Management
5 CFR Parts 731, 732, and 736
Form approved:
O.M.B. No. 3206-0005
NSN 7540-00-634-4036
86-111
UNITEDSTATESOF AMERICA
AUTHORIZATION FORRELEASEOFMEOICALINFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink.
lnstrut:^tions for Completing t hi ^ rel ease
This i sarel ease for the investigator to ask your health practitioner(s)the three questions below concerning your mental
health consultations. YoLir signature will allow the practitioner^s)to answer onlythese questions.
l am seeking assignmentto or retention i naposi t i on with the Federal govemmentwhich requires access to classified
nati onal securi tyi nformati onor special nuclear information or material. As part of thecl earanceprocess, I her el ^^
aut1^orizetheinvestigator,specialagent,ordulyaccreditedrepresentativeoftheauthorizedFederalagencyconducting
mybackground investigation, toobtai nthefol l owi ng infomnation relatingtomymentalhealthconsultations:
Doesthe person under investigation haveacondi ti onortreatmentthat could impairhis/herjudgementor
reliability, particularly in the context of safeguarding classified national security information or special
nuclear information or material?
If so, please describe the nature of the condition and the extent and duration of the impairment or
treatment.
Whati stheprognosi s?
lunderstand the information released pursuant to this release is for use by the Federal Government only for purposes
provided in the Standard Fonn 86 and that it may be redisclosed by the Government only as authorized by law.
Copies of this authorization that show my signature are as valid as the original release signed by me. This
authorization is valid f or l year from the date signed or upon termination of my affiliation with the Federal Government,
whichever is sooner.
Signature (Sign in ink) Full Name (Type or Print Legibly) Date Signed
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
Manning, Bradley E 20070926
other Names Used Social Security Number
# # # 9
Cun-ent Address (Street, City) State
ZlPCode
Home Telephone Number
(Include Area Code)
^
(b)
(6)
(b) (6)
(b)
(6)
(b)
(6)
(b) (6)
NAME MANNING, BRADLEY EDWARD jCASE # 08F18704 IPAGE 1
DATES OF INVESTIGATION 10/16/07 - 10/25/07 j SID N075 | ORG ID C39 j REPORT # 01
TESTIMONIES
ITEM: 018 SOURCE: 001
NAME PERSONNEL TRAINEE DIVISION, BUILDING 470, FT.LEONARD WOOT, MO 65473
PERSONNEL RECORD
PROVIDER TCM BEREN, B-T ASSIQIMENT CLERK
ACCEPTABLE
NAME VERIFIED SSN VERIFIED DOB VERIFIED POB VERIFIED
EMPLOYMENT DATES 10/07 - 10/07
STATUS FULL TIME
WORKSITE ADDRESS CO-C- 82 BARRACKS, FT.LEONARD WOOD, MO 65473
POSITION TRAINEE
REHIRE STATUS NOT SHOWN
EMPLOYMENT STATUS CHANGE NOT APPLICABLE
ITEM: 019 SOURCE: 002
NAME BARRACKS MANAGEMENT, COMMUNITY SERVICE CENTER, BUILDING 470,
FT.LEONARD WOO), MO 65473
RENTAL RECORD
PROVIDER JUANITA LACK, LEAD INSPECTOR
NO RECORD
TRAINEES ARE REQUIRED TO LIVE IN THE BARRACKS, NO RESIDENCE RECORDS
ARE MAINTAINED.
ITEM: 019 INVESTIGATOR'S NOTE SOURCE: 003
TRAINEES ARE REQUIRED TO LIVE IN THE BARRACKS WHILE IN BASIC TRAINING.
THIS IS ALSO THE SAME LOCATION AS THE TRAINEES EMPLOYMENT. THE
TRAINEES EMPLOYMENT RECORD LOCATION IS UNDERSTOOD TO BE THE SAME AS
THE TRAINEES RESIDENTIAL LOCATIW.
ITEM: 020 SOURCE: 004
NAME MILITARY PERSONNEL DIVISION, BUILDING 470, FT.LEONARD WOOD, MO 65473
MILITARY RECORD
OBTAINED BY INVESTIGATOR
ACCEPTABLE
NAME VERIFIED SSN VERIFIED DOB VERIFIED POB VERIFIED
BRANCH OF SERVICE USA
DATE ENTERED SERVICE 10/07
REPORT OF INVESTIGATION
PROPERTY OF U.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900 E ST, NW, WASHINGTON, D.C. 20415-4000
^
NAME MANNING, BRADLEY EDWARD |CASE # 08F18704 IPAGE 2
DATES OF INVESTIGATION 10/16/07 - 10/25/07 j SID N075 | ORG ID C39 | REPORT # 1
DUTY STATUS ACTIVE GRADE El
**** END OF REPORT **
TRANSMITTED: 10/25/07 PRINTED: 01/16/08
%
NAME MANNING, BRADLEY ICASEII08F18704 ^PAGE 1
DATES OF INVESTIGATION 01/04/08-01/09/08 | SIDQ394 IORGIDC48 | REPORTHOl
TESTIMONIES
ITEM: 030 INVESTIGATOR'S NOTE SOURCE: 001
ATTEMPTS TO CONTACT PADEN RADFORD, IN PERSON, AND VIA TELEPHONE,MET
WITH NEGATIVE RESULTS.
ITEM: 033 SOURCE: 002
NAME BRIAN E.MANNING, PROGRAM MANAGER OK
TELEPHONE TESTIMONY
ISSUE(S) 11
PRIMARY ASSOCIATION FATHER
AVERAGE EKTENT OF CONTACT REGULAR
SPAN OF CONTACT 12/17/1987 TO PRESENT
RECO^NDS
BRIAN MANNING INDICATED HIS SON, BRADLEY MANNING, LIVED WITH HIM FRCt^
BIRTH UNTIL 2000, E^CT DATE NOT RECALLED. BRIAN MANNING INDICATED HE
AND BRADLEY'S MOTHER WERE DIVORCED AND HIS E^-WIFE WAS FRC^ WALES.
WHEN THEY DIVORCED,BRADLEY MANNING MOVED TO WALES WITH HIS I^THER IN
2000,WHERE HE LIVED UNTIL 2005, EKACT DATE NOT RECALLED. BRIAN
MANNING INDICATED BRADLEY MANNING LIVED WITH HIM FRC^ THE TIME BRADLEY
MOVED BACK TO THE UNITED STATES UNTIL 04/2006,WHEN BRADLEY MOVED TO
TULSA, OKLAHOMA, WHERE BRADLEY WORKED FOR INCREDIBLE PI^^. BRIAN
MANNING INDICATED BRADLEY MOVED TO MARYLANDIN 2006,EKACT DATES NOT
RECALLED, TO LIVE WITH HIS AUNT, DEBORAH MANNING-VANALSTYNE. MANNING
INDICATED BRADLEY ATTENDEDA^IOR COLLEGE IN MARYLAND, EKACT NAME OF
INSTITUTION NOT RECALLED. BRADLEY MANNING WAS UNEMPLOYED DURING THIS
PERIOD, ASHE WASAFULLTIME STUDENT, UNTIL HE COINED THE MILITARY,
E^CT DATE NOT RECALLED. BRIAN MANNING INDICATED HE MAINTAINS
COMMUNICATIONS WITH BRADLEY, VIA TELEPHONE, EVERY TWO WEEKS ON
AVERAGE.
8^IANMANNINCINDICAT^t^BRA0t,EYMANNINCCRADt^ATE0FRCM HIGH SCHOOL IN
WALES,UNITED KIN^^X^, 2005. MANNING ALSO TRAVELED TO CHINA, EKACT
DATES NOT RECALLED,WITH HIS CLASS, WHILE GOING TO SCHOOL IN WALES.
NO OTHER DETAILS PROVIDED.
BRADLEY MANNING IS CURRENTLY IN BOOT CAMP, EKACT LOCATION UNKNOWN.
BRADLEY MANNING GRADUATED FROM HIGH SCHOOL IN WALES,UNITED KIN^^X^M.
BRADLEY MANNING'S INTEREST INCLUDE MUSIC AND C^^tPUTERS.
BRIAN MANNING INDICATED BRADLEY MANNING DOES NOT GET ALONG WITH HIS
REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000
^
(b) (6), (b) (7)(C)
(b)
(6),
(b)
(7)
(C)
NAME MANNING, BRADLEY |CASElt08F18704 ^PAGE 2
DATES OF INVESTIGATION 01/04/08-01/09/08 | SIDQ394 1 ORG ID 048 | REPORTS 1
STEP-MOTHER,AND THE FEELH^GS ARE MUTUAL. NO OTHER DETAILS PROVIDED.
8RIAN MANNING IS NOT AWARE OF ANYTHING IN BRADLEY MANNING'S CHARACTER
OR BACKGROUND WHICH COULD SERVE AS THE BASIS FOR BLACKMAIL OR
COERCION.
1T^: 033 INSTIGATOR'S NOTE SOURCE: 003
01/09/2008,BRIAN MANNING WAS INTERVIEWED VIA TELEPHONE, AS PER HIS
REQUEST,DUE TO HIS SCHEDULE.
ITEM: 033 INVESTIGATOR'SNOTE SOURCE: 004
BRIAN MANNING IS St^^CT, BRADLEY MANNING'S FATHER. FATHER WAS
INTERVIEWED, AS FATHER WAS LISTED VERIFIER FOR LISTED PERIOD OF
UNEMPLOYMENT.
ITEM: 034 SOURCE: 005
NAME , WAL-MART ASSOCIATE, ,
ISSUE(S) 11
PRIMARY ASSOCIATION FRIEND
AVERAGE E^tTENT OF CONTACT REGULAR
SPAN OF CONTACT 1992 TO PRESENT
RECOI^NDS
MET BRADLEY MANNING IN KINDERGARTEN, 1992. ANt^
MANNING ATTENDED SCHOOL THROUGH THE EIGHTH GRADEIN CRESCENT,
OKLAHC^. INDICATED MANNING MOVED TO WALES, UNITED KIN^OM,DUE
TO HIS PARENTS DIVORCE, ANO HIS MOTHER BEING FR^ WALES
MAINTAINEDINFREQUENT CONTACT WITH MANNING,VIA E-MAIL,WHILE MANNING
LIVEDIN WALES, EXACT NUMBEROFE-MAILS NOT RECALLED. MANNING MOVED
BACKTOOKLAHC^, 11/2005, ANDLIVEO WITH HIS FATHER. INDICATED
FREQUENCY OF CONTACT ONE TIME PER WEEK, UNTIL MANNING MOVED TO TULSA,
OKLAHO^. SINDICATED MANNING MOVEDIN WITH FOR
APPROXIMATELY THREE TO FOUR WEEKS BETWEEN LIVING WITH HIS FATHER AND
MOVING TO TULSA, AND FREQUENCY OF CONTACT INCREASED TO DAILY CONTACT
DURING THEPERIOD. S INDICATEDHE WAS LIVINGINTLILSA AT THETIME
AND MANNING LIVED WITH HIM UNTIL HE COULD FIND HIS OWN PLACE TO LIVE.
MANNING AND WORKED AT INCREDIBLE P I ^ ^ FOR APPROXIMATELY TWO
MONTHS. S INDICATED MANNING LEFT INCREDIBLE PI^^A AND TOOKA^OB
WITH FYE, 06/2006. SOCIAL C^ACT CONSISTED OF EATING DINNER AND
WATCHING TELEVISION, THREE TO FOUR TIMES PER WEEK. MANNING ^^OINED THE
MILITARY 11/2007, AND CONTACT HAS BEEN LIMITED,DUE TO MANNING BEING
IN BOOT CAMP.
INDICATED MANNING LIVED IN WALES,UNITED KINGDOM, AND TRAVELED
REPORT OF INVESTIGATION
PROPERTY OF U.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,DC. 20415-4000
(b) (6) (b) (6)
(b) (6)
(b) (6)
(b)
(6)
(b)
(6)
(b) (6)
(b)
(6)
(b)
(6)
(b)
(6)
(b)
(6)
(b)
(6)
(b)
(6)
(b)
(6)
NAME MANNING, BRADLEY |CASE||08F18704 IPAGE 3
DATES OF INVESTIGATION 01/04/08-01/09/08 1 SIDQ394 IORGIDC48 | REPORTS 1
THROUGHOUT THE UNITED KIN^OM AS WELL AS EUROPE, TO INCLUDE FRANCE.
MANNING HAS ALSO TRAVELED TO TOKYO, ^APAN.
MANNING IS CURRENTLY SERVING IN THE UNITED STATES ARMY.
MANNING'S INTEREST INCLUDE MUSIC AND C^^^tPUTERS.
IS NOT AWARE OF ANYTHINGIN MANNING'S CHARACTER OR BACKGROU^
WHICH COULD SERVE AS THE BASIS FOR BLACKMAIL OR COERCION.
^^^^ END OF REPORT ^^^^
TRANSMITTED: 01/09/08 PRINTED: 01/16/08
^
(b)
(6)
NAME MANNING, BRADLEY EDWARD 1CASEII08F18704 IPAGE 1
DATES OF INVESTIGATION 10/22/07 - 11/29/07 | SIDT393 IORGIDW30 | REPORT 1103
TESTIMONIES
ITEM: 002 SOURCE: 001
NAME ,REALTOR
INTERVIEWED AT 7821 TUCKERMAN LANE, POT^C,MD 20854
ACCEPTABLE
PRIMARY ASSOCIATION NEIGHBOR
AVERAGE EXTENT OF C^ACT REGULAR
SPAN OF CONTACT APPROX. 2006 TO PRESENT
RECOt^NDS
FIRST MET "BRADLEY" APPROXIMATELY IN 2006 WHEN THE SUB^CT
MOVEDINTO HIS AUNT'S HOt^SE, WHICH IS LOCATED NEXT DOOR TO THE
SOURCE'S HOME, THE SOURCE AND THE SUB^CT HAVE NEIGHBORLY TYPE OF
CONTACT, THE SOURCE SEES THE SUB^CT^ADAILY BASIS, AND ONCEAWEEK
HAVE SMALL C^^^RSATIONS WITH THE SUB^CT. THE SOURCE AND THE SUB^CT
HAVE HAD NO SOCIAL CONTACT WITH EACH OTHER. THERE HAVE BEEN NO BREAKS
INTHECONTACTBETWEENTHE SOt^RCE ANDTHE SUB^CT.
THE SUB^CT RESIDES AT . THE
SUB^CT ATTENDED MONTGC^RY COLLEGE, AND DID NOT GRADUATE FRO^ THERE.
THE SUB^CT WAS EMPLOYED AT ABACROMBIE AND FITCH (DISCREPANT)AND
STARBUCKS . THE SUB^CT MAY HAVE COINED THE ARMY. THE SOURCE THINKS
THAT THE SUB^CTEN^YS WORKING ON COMPUTERS AND LISTENING TO MUSIC IN
HIS FREE TIME. THE SOURCE HAS NO KNOWLEDGE OF THE SUB^CT'SFOREI^
TRAVEL ACTIVITIES. THEREIS NOTHING IN THE SUB^CT'S BACKGROUND THAT
WOt^ LEAVE HIM SUSCEPTIBLE TO BLACKMAIL OR COERCION.
ITEM: 002 SOURCE: 002
NAME GENERAL CONTRACTOR/ H ^ IMPROVEMENTS
ACCEPTABLE
PRIMARY ASSOCIATION NEIGHBOR
AVERAGE EXTENT OF CONTACT MODERATE
SPAN OF CONTACT SPRING OF 2006 TO OCTOBER 20O7
DOES NOT KNOW WELL ENOUGH TO RECO^ND
FIRST MET "BRADLEY"IN APPROXIMATELY THE SPRING OF 2006 WHEN
THE SUB^CTMOVEDINTO THE HOUSE NEXT DOOR TO THE SOURCE'S HOME. THE
SUB^CT IS THE NEPHEW OF THE SOURCE'S NEXT DOOR NEIGHBOR. THE SOURCE
AND THE SUB^CT HAVE HAD NEIGHBORLY TYPE OF CONTACT, SAYING HELLO TO
EACH OTHER IN PASSING. THE SOURCE SAW THE SUB^CTONADAILY BASIS,
BUT REALLY ONLY HAD CONVERSATIONS WITH THE SU^^CT ON AVERAGE ONCEA
REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000
^
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)(C)
(b) (6),
(b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)(C)
(b) (6),
(b) (7)(C)
NAME MANNING, BRADLEY EDWARD |CASEi108F18704 |PAGE 2
DATES OF INVESTIGATION 10/22/07-11/29/07 | SIDT393 1 ORGIDW30 | REPORTS 3
MONTH. THE SUB^CT ASKED THE SOURCE FOR HELP WHEN HIS ELDERLY RELATIVE
FELL IN THE HOUSE AND THE SUB^CT COULD NOT LIFT HER LIP. THIS EVENT
HAPPENEDIN SEPTEMBER OF 2007. THE SOURCE AND THE SUB^CT HAVE HAD NO
SOCIAL CONTACT WITH EACH OTHER. THERE HAS BEEN BREAKS IN THE CONTACT
BETWEEN THE SOURCE AND THE SUB^CT. THE LAST CONTACT THE SOURCE HAD
WITH THE SUB^CT WAS AT THE END OF SEPTEMBER OR THE BEGINNING OF
OCTOBER 2007.
THE SUB^CT RESIDED IN THE HOt^SE NEXT DOOR(IF FACING THE SOURCE'S HOME
THE HOUSE ON THE LEFT) TOTHESUB^CT'SHOME. THE SUB^CT WORKED AT
STARBUCKS, THE SOURCE HAS NO KNOWLEDGE OF WHAT THE SUB^CT ENJOYED
DOING IN HIS FREE TIME. THE SOURCE HAD NO KNOWLEDGE OF THE SUB^CT'S
FOREI^ TRAVEL ACTIVITIES. THE SOURCE HAD NO KNOWLEDGE OF ANYTHING IN
THE SUB^CT'S BACKGROUND THAT WOULD LEAVE HIM SUSCEPTIBLE TO BLACKMAIL
OR COERCION.
ITEM: 005 SOURCE: 003
NAME MONTG^RYCOLLE, 51 MANNAKEE STREET, SV-114, ROCKVILLE, MD 20850
EDUCATI^ RECORD
PROVIDER ALICE SUMMERS, TRANSCRIPT EVALUATOR
SF RELEASE
ACCEPTABLE
NAME VERIFIED SSN VERIFIED DOB VERIFIED POB NOT SHOWN
DATES OF ATTENDANCE NOT SHOWN (PART TIME)
CAMPUS LOCATION SAME AS ABOVE
MA^OR(S) SCIENCE-PHYSICS
DEGREE(S) AWARDED^DATE NOT APPLICABLE
THE ^Y DATE INDICATED ON THE SUB^CT'S TRANSCRIPT WAS SPRING 2007.
ITEM: 005 SOURCE: 004
NAME MONTGOMERY COLLEGE, 51 MANNAKEE STREET,MT6TH FLOOR, ROCKVILLE,MD
20850
OISCIPLINA^yR^CORO
PROVIDER MARLENE PHILLIPS, SR. ADMIN. AIDE
SF RELEASE.
NO RECORD
ITEM: 005 INVESTIGATOR'SNOTE SOURCE: 005
THE SUB^^CTWASAPARTTIME STUDENT FOR THE SPRING 2007 SEMESTER AT
MONTGOMERY COLLEGE IN ROCKVILLE,MARYLAND.
ITEM:005 INVESTIGATOR'SNOTE SOURCE: 006
REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON, DC 20415-4000
^7
NAME MANNING, BRADLEY EDWARD ICASEII08F18704 |PAGE 3
DATES OF INVESTIGATION 10/22/07 - 11/29/07 | SIDT393 | ORGIDW30 | REPORT 1103
THE RECORD PROVIDER INDICATED THAT THE 2007 SPRING SEMESTER FOR
MONTGOMERY COLLEGE, ROCKVILLE CAMPUS, RAN FROM ^^ANUARY 2007 TO MAY OF
2007.
ITEM: 006 INVESTIGATOR'SNOTE SOURCE:007
NO LOCAL EMPLOYMENT RECORDS ARE MAINTAINED. THE COMPANY USES AN
AUT^TED SYSTEM FOR EMPLOYMENT VERIFICATION.
ITEM: 006 SOURCE: 008
NAME , STORE MANAGER, 5438 WESTBARD AVENUE,BETHESDA,MD
20816
ACCEPTABLE
PRIMARY ASSOCIATION SI^ERVISOR
AVERAGE EXTENT OF CONTACT REGULAR
SPAN OF CONTACT JANUARY 2007 TO SEPTEMBER 2007
RECO^NDS
FIRST MET BRAD MANNING IN ^^tANUARY 2007 WHEN THE SUB^CT APPLIED
FORA^OB AT STARBUCKS. THE SOURCE BECAME THE SUB^CT'S SUPERVISOR.
THE SOURCE AND THE SU^CT HAD WORK RELATED CONTACT TWO TO FOUR TIMES
AWEEK, AS BOTH THE SOURCE AND THE SUB^CT WORKED DIFFERENT SHIFTS,
SOME OF THE SHIFTS WOt^ OVERLAP AND THAT IS WHEN THE SOURCE AND THE
SUB^CT HAD WORK RELATED CONTACT. THE SUB^CT WORKED ASABARISTA AND
THE SOURCE WAS THE STORE MANAGER. THE SOURCE AND THE SUB^CT HAD NO
SOCIAL CONTACT OUTSIDE OF WORK. THERE WERE NO BREAK8IN THE CONTACT
BETWEEN THE SOURCE AND THE SUB4IECT AT STARBUCKS. THE SOURCE'S LAST
CONTACT WITH THE SUB^CT WAS AT THE END OF SEPTEMBER 2007.
THE SUB^CT ATTENDED MONTGt^RY COLLEGE. THE SUB^CT WAS PREVIOUSLY
^:M^L0Y^0A'^AaAO^C^^^ANt^^:^TCH(DISCREPANT) ANDAMUSICS'^RE BEFORE
STARBUCKS. THE SOURCEHAS NO KNOWLEDGE OF WHAt^THESUB^CT ENVOYS
DOINGINHISFREETIME. THE SOURCE HAD NO I^NOWLEDGE OF THE SUB^CT'S
FOREIGN TRAVEL ACTIVITIES. THERE IS NOTHING IN THE SUB^CT'S
BACKGROUND THAT WOULD LEAVE HIM SUSCEPTIBLE TO BLACKMAIL OR COERCION.
ITEM: 006 SOURCE: 009
NAME STORE MANAGER, 7911TUCKERMANLANE, POTOMAC,MD
20854
ACCEPTABLE
PRIMARY ASSOCIATION St^ERVISOR
AVERAGE EXTENT OF CONTACT REGULAR
SPAN OF CONTACT JANUARY 2007 TO SEPTEMBER 2007
DOES NOT KNOW WELL ENOUGH TO RECOMMEND
REPORT OF INVESTIGATION
PROPERTY OFU.S.OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000
^
(b) (6), (b) (7)
(C)
(b) (6),
(b) (7)(C)
(b) (6), (b) (7)
(C)
NAME MANNING, BRADLEY EDWARD iCASEii08F18704 |PAGE 4
DATES OF INVESTIGATION 10/22/07 - 11/29/07 1 SIDT393 |ORGIDW30 | REPORTS 3
FIRST MET BRADLEY OR"BRAD" IN4rANUARY 2007 WHE^THESUBi^CT
STARTED WORKATSTARBUCKS. THE SOURCE AND THE SUBilECT HAD DAILY WORK
RELATED CONTACT. THE SOURCE AND THE SUB^CT HAD NO SOCIAL CONTACT
OUTSIDE OF WORK. THERE WERE NO BREAKSIN THE CONTACT BETWEEN THE
SOURCE AND THE SUB^CT. THE SUB^CT LEFT STARBUCKS AT THE END OF
SEPTEMBER TO ^OIN THE UNITED STATES ARMY.
THE SUB^CT ATTENDED MONTG^RY COLLEGE BUT DID NOT GRADUATE. THE
SUB^CT WAS EMPLOYED AT STARBUCKS. THE SUB^CTISIN THE UNITED STATES
ARMY. THE SUB^CT ENVOYS WORKING ON C^^^IPUTERS AND MUSIC IN HIS FREE
TIME. THE SOURCE HAD NO I^NOWLEDGE OF THE SUB^CT'S FOREIGN TRAVEL
ACTIVITIES. THERE IS NOTHING IN THE SUB^CT'S BACKGROUND THAT WOULD
LEAVE HIM SUSCEPTIBLE TO BLACKMAIL OR COERCI^.
ITEM: 022 SOURCE: 010
NAME MONTGOMERY COLLEGE, 51 MANNAKEE STREET,ROCKVILLE,MD 20850
LAW ENFORCEMENT-OTHER
PROVIDER , SECURITY OFFICER
SF RELEASE
NO RECORD
^^^^ END OF REPORT ^^^^
TRANSMITTED: 11/29/07 PRINTED: 01/16/08
^
(b) (6),
(b) (7)(C)
(b) (6), (b) (7)
(C)
NAME MANNING, BRADLEY EDWARD 1CASEII08F18704 IPAGE 1
DATES OF INVESTIGATION 12/06/07^12/07/07 | SID 0414 |ORGIDC39 | REPORTHOl
TESTIMONIES
ITEM: 001 PERSONAL SUB^CT INTERVIEW SOURCE: 001
INTERVIEW CONDUCTED UNDER UNSWORN DECLARATION ON 12/06/07 RHU BARRACKS,FIRST
FLOOR MEETING ROOM, FORT LEONARD WOOD,MO 65473
ISSUE CODE(S) 11 12
SINCE HE HAD 4^INED THE ARMY HE HAS BEEN DIAGNOSED WITHANERVE
DISORDER THAT PROHIBITS HIM FROM PROPERLY PHYSICALLY PERFORMING HIS
DUTIES IN THE U.S. ARMY. FOR THIS REASON HE WILL BE DISCHARGED FROM
THEARMYSOON. HEHASNOTBEENGIVENADATETHATHEWILLBE
DISCHARGED. HE HAS NOT HAD ANY DISCIPLINARY PROBLEMS SINCE HE HAS
BEEN IN THE ARMY. HIS PHYSICAL INABILITY TO PERFORM HIS DUTIES ASA
SOLDIER IS C^^^IMON KNOWLEDGE TO EVERYONE IN HIS UNIT AND HIS FAMILY.
INFORMATION CONCERNING THIS COUI^ NOT BE USED AGAINST HIM AS BLACKMAIL
OR COERCION,
HIS STEP-I^^OTHER, DID NOT GET ALONG WITH HIM WHILE
HE LIVED WITH HER AND HIS FATHER,BRIAN MANNING AT 8020 NW119TH
STREET IN OKLAHC^ CITY, OKLAHO^. DID NOT LIKE
HIM BECAUSE HE WAS THE SON HIS FATHER, AND HER ESTRANGED HUSBAND,
. AND WERE HAVING
MARITAL PROBLEMS,AND RESENTED HIM STRICTLY FOR
THAT REASON. ONE DAY IN 4/06, CALLED THE OKLAHOMA
CITY POLICE DEPARTMENT,UNBEKNCWST TO HIM. WHEN THE OKLAHOMA CITY
POLICE DEPARt^^ENT ARRIVED SHE ALLEGED THAT HE HAD THREATENED
. HE DOES NOT KNOW HOW SHE ALLEGED THAT HE THREATENED
HER. HE WAS NOT IN THE ROOM WHEN SHE MADE THESE ALLEGATIONS TO THE
POLICE. SHE REQUESTED TO THE POLICE THAT HE BE MADE TO LEAVE THE
RESIDENCE PERMANENTLY. THE POLICE DID ASK HIM TO LEAVE AND HE DID NOT
OB^CT. HE GATHERED HIS BELONGINGS AND LEFT TO HIS SISTER'S HOUSE.
HE STAYED WITH HISSISTER, CASEY MANNING MA^ORFORAFEW DAYS BEFORE
HE MOVEDTO MARYLAND. HEDOES NOT RECALL HISSISTER'S PHONE NUMBER.
HE DID NOT MAKE ANY THREATS AGAINST . HE DOES NOT
KNOW IF ANY POLICE REPORTS WERE MADE AGAINST HIM OR NOT. HE NEVER
HEARD ANYTHING FURTHER FROM THE POLICE OR ANY COURT. HE DOES NOT
BELIEVE HE WAS EVER CHARGED W1THACRIME. HE NEVER HAD ANY PROBLEMS
WITH THE POLICE PRIOR TO THIS INCIDENT. HE DID NOT HAVE ANY OTHER
PROBLEMS WHILE HE LIVED THERE. HIS PARENTS, HIS SISTER AND
BROTHER-IN-LAW ARE AWARE OF THIS INCIDENT. INFORMATION CONCERNING HIS
STEP-MOTHER'S DISLIKE OF HIM AND ACCUSATION OF THREATS COULD NOT BE
USED AGAINST HIM IN ANY WAY AS BLACKMAIL OR COERCION.
HE LIVED AT ^ FROM
11/01TO9/05. HE DID NOT LIVE AT THIS RESIDENCE TO HELP WITH
CITIZENSHIP REQUIREMENTS OF ANY FOREIGN COUNTRY. HE MOVED TO THIS
RESIDENCE IN 11/01 BECAUSE HIS MOTHER, MOVED THERE AFTER
REPORT OF INVESTIGATION
PROPERTY OF U.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON, D.C. 20415-4000
^
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)(C) (b) (6), (b)
(7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b)
(7)(C)
(b)
(6),
(b)
(7)
(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6),
(b) (7)(C)
NAME MANNING, BRADLEY EDWARD ^CASEll08F18704 ^PAGE 2
DATES OF INVESTIGATION 12/06/07-12/07/07 | SID 0414 | ORGIDC39 | REPORTS 1
SHE DIVORCED HIS FATHER IN 2001. HE DOES NOT RECALL MORE PRECISELY
WHEN SHE MOVED BACK TO THE UNITED KIN^^X^. HEWASAMINORCHILDAT
THIS TIME AND HIS MOTHER HAD CUSTODY OF HIM. HE HAS NO CONTINUED
CONTACTS WITH FOREIGN NATIONALS DUE TO HIS RESIDENCE IN ENGLAND.
HIS MOTHER, ,WAS ORIGINALLY BORN IN THE UNITED KINGDOM
ON H^l^H^ANDACITI^EN OF THE UNITED KINGDt^. HISI^^^^THER,
MET HIS FATHER, BRIAN MANNING, WHILE HE WAS STATIONEDIN THE
UNITED KIN^^^ WITH THE U.S. NAVY, LIVEDIN THE UNITED
STATES FOR ABOUT TWENTY YEARS WITH HIS FATHER, ONAGREENCARD, BUT
NEVER BECAMEAU.S. CITIZEN. RETURNED TO THE UNITED KINGDI^
IN 11/01. HAS NOT OCCUPATION OR EMPLOYER. IS
UNEMPLOYED DUE TOADISABILITY. HAS NO AFFILIATION WITH ANY
FOREII^ GOVERNMENT. HE DOES NOT HAVE ANY FURTHER ASSOCIATION WITH
FOREI^ NATIONALS ASARESULT OF HIS ASSOCIATION WITH HIS MOTHER. HE
SAW HIS MOTHER ONADAILY BASIS IN THE U.S FROM HIS BIRTH IN 1987
UNTIL 11/01. HE SAW HIS MOTHER ONADAILY BASIS STILL AFTER THEIR
MOVE TO THE UNITED KINGD^FR^ll/OlUNTIL HE LEFT THE UNITED KIN^OM
TO LIVE WITH HIS FATHER IN 9/05. SINCE 9/05 HE HAS KEPT IN TOUCH WITH
HIS MOTHER, BY TELEPHONE ONCEAWEEK. HE ALSO VISITED HER
ONCE FORAWEEK IN 3/06, THIS TRIP WAS FINANCED BY HIS FATHER. HE
AND HIS SISTER,CASEY MANNING MA^OR WENT THERE TO VISIT HIS MOTHER AND
HELP HER WHILE SHE WAS ILL. HIS MOTHER, STILL LIVES A 31
X IS NOT
AWARE THAT HE IS UNDERGOING CONSIDERATION FORANATIONAL SECURITY
CLEARANCE. HAS NEVER SOLICITED HIM FOR ANY ACCESS TO
CLASSIFIEDINFORMATION. HE HAS NOT DEVELOPED ANY SYMPATHIES,
PREFERENCES OR ALLIANCES FOR ANY FOREI^ COUNTRY AS RESULT OF HIS
ASSOCIATI^ WITH HIS MOTHER.
HE ATTENDED TASKER MILWARD VC (SCHOOL) FROM 12/OlTO 6/05. HE DOES
NOT HAVE ANY LASTING CONTACT WITH ANY FOREIGN NATIONS FROM THIS
SCHOOL.
HE TRAVELED TO ^APAN FOR TWO WEEKSIN 10/04. HE TOOK THIS TRIP WITH
TWENTY OTHER STUDENTS AND SPONSORS FR^ TASKER MILWARD VC. THIS TRIP
WAS EDUCATIONAL SIGHTSEEING TRIP OF^APAN. HE AND THE GROUP VISITED
TOKYO,^APAN. THIS TRIP WAS FINANCED BY HIS MOTHER.
DURING ANY OF HIS FOREIGN TRAVEL: TO ENGLAND FRI^ll/OlTO 9/05,- TO
ENGLAND FOR ONE WEEK IN 3/06,- AND TO ^APAN FOR TWO WEEKS IN 10/04. HE
HAS NOT HAD ANY PROBLEMS TOINCLUDE: HE DID NOT HAVE ANY PROBLEMS
WITH FOREI^ GOVERNMENT OFFICIALS, LAW ENFORCEMENT,OR CUSTOMS. HE
DID NOT MAKE ANY LASTING CONTACT WITH ANY FOREIGN NATIONALS. HE DID
NOT NOTICE ANY EVIDENCE OF ANY MONITORING BYAFOREIGN GOVERNMENT. HE
DID NOT VISIT ANY EMBASSIES OR CONSULATES. HE WAS NOT DETAINED OR
ARRESTED BY ANY FOREIGN LAW ENFORCEMENT. HE DID NOT COMMIT ANY
ILLEGAL OR CI^ROMISING BEHAVIOR WHILE INAFOREI^ COUNTRY. HE DID
NOT STRAY FROM ANY OFFICIAL TOURS OR VISIT ANY RESTRICTED AREAS. HE
DID NOT HAVE HIS PASSPORT CONFISCATED OR LOST. HE DID NOT HAVE ANY
REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000
^
(b) (6), (b) (7)
(C)
(b)
(6),
(b) (7)
(C)
(b)
(6),
(b)
(7)
(C)
(b) (6),
(b) (7)
(C)
(b) (6),
(b) (7)
(C)
(b) (6) (b) (6)
(b) (6), (b)
(7)(C)
(b) (6),
(b) (7)(C)
(b) (6),
(b) (7)
(C)
(b
)
(6
),
(b
)
(7
)
(C
)
(b) (6), (b) (7)(C)
(b) (6),
(b) (7)
(C)
NAME MANNING, BRADLEY EDWARD 1CASEII08F18704 IPAGE 3
DATES OF INVESTIGATION 12/06/07-12/07/07 | SID 0414 |ORGIDC39 IREPORT^ 1
PROPERTY CONFISCATED. HE DID NOT HAVE ANY SEEMINGLY ACCIDENTAL
MEETINGS WITH ANY FOREIGNERS. HE WAS NOT APPROACHED BY ANY FOREI^RS
TO DEVELOPAFRIENDSHIP FOR NO APPARENT REASON.
HE WAS FIRED FROM FYEIN 6/06 FOR NOT MEETING HIS SALES GOALS.
(DISCREPANT) HE FAILED TO LIST THIS FIRING FROM FYE ON HIS SF 86 AS
AN OVERSIGHT. HE WAS GIVENAVERBALWARNING,WRITTEN WARNING AND THEN
FIRED FOR NOT MEETING HIS SALES EXPECTATIONS. HE COULD NOT ESTIMATE
MORE PRECISE DATES THAT THESE THINGS HAPPENED. HE WAS FIRED,VERBALLY
WARNING AND WRITTEN UP ALL BY RODNEY STEWART. HE DID NOT HAVE ANY
OTHER PROBLEMS AT THIS EMPLOYMENT. HE DOES NOT RECALL ANYt^ ELSE
THAT WOULD BE AWARE OF THIS. INFORMATION CONCERNING THIS FIRING COULD
NOT BE USED AGAINST HIM AS BLACKMAIL OR COERCION. HE DOES NOT THINK
THAT HE WOULD BE ELIGIBLE FOR REHIRE.
HE HADADIFFERENCE IN PROFESSIONAL OPINION AND STYLE THAN HIS
SUPERVISOR, , AT ^OTOI^C. HE ULTIMATELY LEFT ^OTO FOR
THIS REASON. HE AND HAD DIFFERENCES IN OPINIO WHEN IT CAME
TO STYLES IN WRITING SOFTWARE. HE DID NOT LIKE STYLE,BUT
HE ULTIMATELY DID IT HIS WAY BECAUSE HE WAS THE BOSS AND CEO OF THE
CI^ANY. THIS DIFFERENCE IN STYLES DID NOT RESULT IN ANY DISCIPLINARY
ACTIONS OR POOR WORK EVALUATI^S. HE CAME TOAMUTUAL
AGREEMENT THAT IT WOULD BE BEST IF HE PURSUED ANOTHER ^OB. HE WAS NOT
FIRED. HE LEFT I^OTO VOLUNTARILY. HE WAS NOT TOLD TO QUIT. HE DOES
NOT THINK THAT HE WOULD BE ELIGIBLE FOR REHIRE DUE TO HIS DIFFERENCE
IN STYLE WITH THE CEO OF THE COMPANY. THERE ARE NO HARD FEELINGS
BETWEEN HIM AND . ANYONE THAT WAS AT THE COMPANY AT THAT TIME
(SMALL COMPANY 0F8PE0PLE)W0ULD BE AWARE OF THEIR DIFFERENCE IN
STYLES AND THE REASON FOR HIS DEPARTURE. INFORMATION CONCERNING THIS
COULD NOT BE USED AGAINST HIM IN ANY WAY AS BLACKMAIL OR COERCION.
ALL OF THE INFORMATION INCLUDED ON HIS SF 86 AND PROVIDED DURING HIS
PERSONAL SUB^CT INTERVIEW IS TRUE AND C^LETE WITH THE FOLLOWING
EXCEPTIONS:
HIS WORK PHONE NUMBER IS (301)765-0556. (DISCREPANT) HE DOES NOT
KNOWWHY HIS SF 86 DID NOT SHOWAWORK PHONE NUMBER.
SINCE HE FILLED OUT HIS SF 86 HE HAS BEEN ACTIVE DUTY ENLISTEDIN THE
U.S. ARMY SINCE 10/07. (DISCREPANT) SINCE 10/07, HE HAS BEEN
STATIONED AT FORT LEONARD WOOD,MISSOURI FOR BASIC TRAINING. HEDGES
NOT KNOW AN ADDRESS OR PHONE NUMBER OF HIS EMPLOYER AT FORT LEONARD
WOOD. HEISAPRIVATE,E01, INTELLIGENCE ANALYST. HIS SUPERVISOR IS
DRILL SERGEANT ROBINSON. HE DOES NOT I^NOW AN ADDRESS, PHONE NUMBER OR
FIRST NAME OF DRILL SERGEANT ROBINSON. HE HAS ALSO LIVEDIN THE
BARRACKS AT FORT LEONARD WOOD,MISSOURI SINCE HE ARRIVED FOR BASIC
TRAINING IN 10/07. (DISCREPANT) HE DOES NOT KNOW AN ADDRESS OF THE
BARRACKS THAT HE HAS STAYEDIN. HIS BATTLE BUDDY, PRIVATE ANDREW
DUFFEY CAN VERIFY HIS CONDUCT AND ACTIVITIES SINCE HE HAS LIVED IN THE
BARRACKS AT FORT LEONARD WOOD. HE DOES NOT KNOW AN ADDRESS,OR PHONE
REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000
^
(b) (6), (b) (7)
(C)
(b) (6),
(b) (7)
(C)
(b) (6), (b)
(7)(C)
(b) (6), (b)
(7)(C)
(b) (6),
(b) (7)
(C)
NAME MANNING, BRADLEY EDWARD 1CASEII08F18704 IPAGE 4
DATES OF INVESTIGATION 12/06/07-12/07/07 | SID 0414 1ORGID039 | REPORTS 1
NUMBER FOR PRIVATE DUFFEY.
HE LIVED AT 5607 71ST PLACE EAST, APARIMENT 1005, IN TULSA, OKLAH^
FROM 4/06 TO 7/06. HE DOES NOT RECALL ANY NEIGHBORS AT THIS
RESIDENCE. HE DOES NOT THINK THAT ANY NEIGHBORS WOULD RECALL HIM AT
THIS RESIDENCE,BECAUSE THIS APARTMENT COMPLEX WAS VERY TRANSIENT.
THE ONLY PERSON THAT HE COULD RECALL THAT VISITED HIM THERE WAS HIS
FRIEND, . S LIVES AT
. CAN BE REACHED ON
HIS CELL PHONE NUMBER AT .
HE LIVED WITH HIS FATHER AND STEP-MOTHER AT
FROM 9/05 TO 4/06. HE DOES NOT RECALL ANY
NEIGHBORS AT THIS RESIDENCE. HE DOES NOT KNOW IF ANY OF THE NEIGHBORS
WOULD KNOW OF HIM LIVING THERE OR NOT. HE DID NOT HAVE ANY VISITORS
AT THIS RESIDENCE. THE ONLY PEOPLE THAT CAN VERIFY THIS RESIDENCE ARE
HIS FATHER AND STEP-MOTHER WHO STILL LIVE THERE. HIS FATHER
CAN BE REACHED ON HIS CELL PHONE AT . D
LIVES AT .
CAN BE REACHED BY TELEPHONE AT . HE
DOES NOT KNOW ANY OTHER CONTACT INFORMATION .
HE LIVED AT ^ FROM
11/01 TO 9/05. (DISCREPANT) HE DOES NOT KNOW WHY HIS SF 86 SAYS THAT
HE LIVED IN HAVERFORD, UNITED KIN^^X^ INSTEAD OF HAVERFORD WEST,
UNITED KINGD^.
HE LIVED AT FROM 11/00 TO
11/01. (DISCREPANT) HE DOES NOT I^NOW WHY HIS SF 86 HAS THE WRONG
STARTING DATE FOR THIS RESIDENCE.
FROM 1/92 UNTIL ll/OO HE LIVED AT
. (DISCREPANT) HE DOES NOT I^NOW WHY THIS RESIDENCE WAS
CI^LETELYLEFTOFFHISSF86. HE DOES NOT KNOWAMORE PRECISE
ADDRESS FOR THIS RESIDENCE. HE DOES NOT KNOW IF THIS ADDRESS ISA
PHYSICAL ADDRESS OR NOT.
HE ATTE^ED TASKER MILWARD VCFR^12/01TO 6/05. (DISCREPANT) AS AN
OVERSIGHT, HEE^R^T^ WRONG STA^TINCDAT^^HISSF82FO^^^IS
EDUCATION.
HE DID NOT EARNADEGREEFR^MONTG^RY COLLEGE OF ROCKVILLE.
(DISCREPANT) HE DID NOT I^NOW THAT HE WAS REQUIRED TO ENTER"N/A"FOR
NOT APPLICABLE FOR ANY QUESTION ON HIS SF 86 THAT DID NOT APPLY TO
HIM. THEREFORE,MONTH/YEAR DEGREE AWARDED ON HIS SF 86 ALSO DOES NOT
APPLY. (DISCREPANT) HE WORKED PART TIME AT STARBUCKS FR^ 1/07 TO
5/07 WHILE ALSO GOING TO SCHOOL FULL TIME AT MONTGOMERY COLLEGE OF
ROCKVILLE.
HE WAS UNEMPLOYED FROM 6/06 TO 1/07. HE SPENT HIS TIME LOOKING FORA
REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000
^
(b) (6), (b)
(7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C) (b) (6)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6),
(b) (7)
(C)
(b)
(6)
(b)
(6),
(b)
(7)(C)
(b) (6)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)
(C)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
(b)
(6),
(b)
(7)
(C)
NAME MANNING, BRADLEY EDWARD 1CA8Eil08F18704 |PAGE 5
DATES OF INVESTIGATION 12/06/07-12/07/07 | SID 0414 | ORG ID 039 1 REPORTS 1
^OB AND LOOKING AT COLLEGES TO ATTEND. HE ALSO SPENT HIS TIME PLAYING
ONHISCt^^lPUTER. HE WAS SUPPORTED FINANCIALLY BY HIS AUNT,
CAN VERIFY HIS ACTIVITIES AND
FINANCIAL SUPPORT DURING THIS PERI^ OF UNEMPLOYMENT.
N LIVES AT
CAN BE REACHED BY TELEPHONE AT
HE WORKED AT INCREDIBLE P I ^ ^ CO FRO^ 5/06 TO 7/06, (DISCREPANT) HE
DOES NOT I^NOW WHY HIS SF 86 SAYS THAT HE WORKED AT THIS EMPLOYMEI^
FROM 9/05 TO 2/06. THISIS INCORRECT. HE DID NOT ENTER THESE DATES
FOR THIS EMPLOYMENT. HE WORKED AT INCREDIBLE PI^:^ CO WHILE ALSO
WORKING PART TIME AT FYE FROM 5/06 TO 6/06. HE DOES NOT RECALL ANYONE
OTHER THAN THE LISTED VERIFIERS FOR HIS EMPLOYMENTS AT ^OTO, FYE AND
INCREDIBLE P1^^ CO.
THEREFORE HE WAS UNEMPLOYED FROM 8/88 TO 2/06. HE SPENT HIS TIME
GOING TO SCHOOL FULL TIME, LOOKING FORA^B ONCE HE GOT OUT OF H I ^
SCHOOL, AND WATCHING TELEVISION. HE WAS SUPPORTED FINANCIALLY BY HIS
PARENTS. HIS FATHER CAN VERIFY HIS ACTIVITIES AND
FINANCIAL SUPPORT WHILE HE WAS UNEMPLOYED DURING THIS TIME.
LIVES AT
. HIS FATHER CAN BE REACHED BY TELEPHONE AT( .
HE DOES NOT KNOW WHY THE QUESTION PERTAINING TO CITIZENSHIP OF HIS
RELATIVES (ill5)0N HIS SF 86 WAS NOT ANSWERED. NONE OF HIS RELATIVES
ARE U.S. CITIZENS BY OTHER THAN BIRTH,OR ALIENS RESIDING WITHIN THE
U.S. (DISCREPANT) HIS MOTHER USED TO BE AN ALIEN RESIDING IN THE
U.S. UP UNTIL THEY MOVED TO THE UNITED KINGDOM IN 11/01. WHILE SHE
LIVED in THE U.S. SHE HADAGREEN CARD. HE DOES NOT I^NOW ANY FURTHER
INFORMATION CONCERNING HER GREEN CARD PRIOR TO 11/01.
THE ONLY PEOPLE THAT HE SOCIALI^S WITH IN HIS SPARE TIME ARE N
(THIRD LISTED REFERENCE^HISSF 86), (GOES BY )
(FIRST LISTED REFERENCE ON HIS SF 86),AND HE
OOES NOT ^^NOW AN ADDRESS ORPHIC NUMBER FO . HIS SECOND
LISTEOR^FERENCEONHISSF86, RDISTHE FATHER OF HIS
FIRST LISTED REFERENCE, HE DOES NOT I^
AS WELL AS .
AS AN OVERSIGHT HE FORGOT TO INCLUDE HIS STEP-MOTHER,
ON HIS SF 86 UNDER THE RELATIVES SECTION. (DISCREPANT)
NGISAU.S. CITIZEN. HE DOES NOT KNOW
DATE OF BIRTH OR COUNTRY OF BIRTH.
LIVES WITH HIS FATHER, AT
.
THERE IS NOTHING IN HIS BACKGROUND THAT COULD BE USED AGAINST HIM AS
BLACI^IL OR COERCION.
ITEM: 029 SOURCE: 002
REPORT OF INVESTIGATION
PROPERTY OF U.S.OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000
(b) (6),
(b) (7)
(C)
(b) (6), (b) (7)(C)
(b) (6), (b)
(7)(C)
(b)
(6),
(b)
(7)
(C)
(b) (6), (b) (7)(C)
(b) (6),
(b) (7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)
(C)
(b)
(6),
(b) (7)
(C)
(b)
(6)
(b) (6), (b) (7)(C)
(b)
(6)
(b) (6)
(b)
(6)
(b)
(6)
(b) (6) (b) (6)
(b) (6),
(b) (7)
(C)
(b) (6)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)
(C)
(b) (6), (b)
(7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)
(C)
(b) (6), (b)
(7)(C)
(b) (6),
(b) (7)
(C)
(b) (6), (b)
(7)(C)
(b) (6)
(b) (6), (b)
(7)(C)
(b)
(6),
(b)
(7)
(C)
(b) (6), (b) (7)(C)
(b) (6), (b)
(7)(C)
(b) (6), (b) (7)(C)
(b) (6), (b) (7)(C)
NAME MANNING, BRADLEY EDWARD ^CASEli08F18704 |PAGE 6
DATES OF INVESTIGATION 12/06/07-12/07/07 | SID 0414 | ORG ID 039 | REPORTS 1
NAME ANDREW ^.DUFFEY,CANNON CREW MEMBER CA
INTERVIEWED AT RHU BARRACKS, FIRST FLOOR MEETING ROOM, FORT LEONARD WOOD,
MD 65473
ISSUE(S) 12
PRIMARY ASSOCIATION COWORKER
AVERAGE EXTENT OF CONTACT REGULAR
SPAN OF CONTACT 10/07-PRESENT
REOO^NDS
ANDREW DUFFEY MET BRADLEY MANNING WHEN THEY STARTED BASIC TRAINING IN
THE ARMY AT FORT LEONARD WOOD, MISSOURI. DUFFEY HAS SEEN HIM ONA
DAILY BASISIN TRAINING ANDIN THE BARRACKS. THIS CONTACT CONTINUES
UNTIL THE PRESENT,
HE WILL BE DISCHARGEDFRCM THE ARMY FOR MEDICAL REASONS. DUFFEY DOES
NOT I^NOW WHEN HE WILL BE DISCHARGED. DUFFEY IS NOT SURE WHO KNOWS
ABOUT HIS PROBABLE MEDICAL DISCHARGE FROM THE ARMY. DUFFEY DOES NOT
THINK THAT THIS INFORMATION COULD BE USED AGAINST HIM IN ANY WAY AS
BLACI^IL.
HE HAS BEE^ IN THE ARMY SINCE 10/07. HE HAS NOT HAD ANY DISCIPLINARY
PROBLEMS WHILE HE HAS BEEN IN THE ARMY. DUFFEY HAS NO RESERVATIONS
ABOUT CO^INUING TO WORK WITH HIM IN THE FUTURE.
DUFFEYIS NOT AWARE OF ANYTHING IN HIS BACKGROUND THAT COULD BE USED
AGAINST HIM AS BLAC^IL OR COERCION.
^^^^ END OF REPORT ^^^^
REVISED: 01/11/08 PRINTED: 01/16/08
^
(b) (6), (b) (7)(C)
(b)
(6),
(b)
(7)
(C)
NAME MANNING, BRADLEY EDWARD |CASEll08F18704 IPAGE 1
DATES OF INVESTIGATION 10/12/07-10/18/07 ISID0721 IORGIDC48 IREPORTHOl
TESTIMONIES
ITEM: 003 INVESTIGATOR'SNOTE SOURCE: 001
DUE TO THE TRANSIENCE OF THE NEIGHBORHO^, ALL ATTEMPTS TO OBTAIN
KNOWLEDGEABLE PERSONAL SOURCES MET WITH NEGATTIVE RESULTS. FOUR
NEIGHBORS WERE CONTACTED AT 8016 ( 1ST HOUSE EAST-SAME STREETSIDE),
8100 (2ND HOUSE WEST-SAME STREETSIDE), 8017 (1ST HOUSE NORTH-
DIRECTLY ACROSS STREET),AND AT 8021 (2ND HOUSE NW-ACROSS STREET)
NW119THST,0KLAH^CITY,0KLAH^, ALL WITH NEGATIVE RESULTS. ALL
FOUR OF THE NEIGHBORS CONTACTED MOVEDINTO THEIR H^S AFTER 9/06.
NONE OF THE PEOPLE CONTACTED HAVE KNOWLEDGE OF SUB^CT AND WERE UNABLE
TO PROVIDE ANY INFORMATION. TWO HOUSES AT 8024 (1ST HOUSE WEST-SAME
STREETSIDE) AND AT 8025 (3RD HOUSE NW-ACROSS STREET) ARE BOTH
VACANT. ATTEMPTS TO CONTACT LISTED SOURCE IN TULSA,OKLAH0MA,BY
TELEPHONE MET WITH NEGATIVE RESULTS. ATTEMPTS WERE MADE ON 10/12
(FRI), 10/13 (SAT),10/14 (MON) AND ON 10/17/07 (WED),ALL WITH NO
ANSWER.NO FURTHER INFORMATION IS AVAILABLE.
ITEM:008 INVESTIGATOR'SNOTE SOURCE: 002
ATTEMPTS TO OBTAIN SUB^CT'S RECORD INFORMATION MET WITH NEGATIVE
RESULTS. THE TWO PERSONNEL IN THE OFFICE PROVIDED INFORMATION THAT
RECORD INFORMATI^ IS NOT MAINTAINED AT THE 2-PERS^ OFFICE IN
OKLAHOMA CITY,OKLAHOMA,AND BOTH WERE UNABLE TO PROVIDE ANY
ADDITIONAL INFORMATION. THE LISTED SOURCE TRANSFERRED TO SAN
FRANCISCO, CALIFORNIA IN 8/07. ATTEMPTS TO CONTACT SOURCE BY TELEPHt^
MET WITH NEGATIVE RESULTS. MESSA^S WERE LEFT AT SOURCE'S TELEPH^
NUMBER ON 10/12 (FRI), 10/15(MON), 10/16 (TUE),AND ON 10/18/07 (
THU) ALL WITH NO RESPONSE.NO FURTHER INFORMATI^ IS AVAILABLE.
ITEM: 013 SOURCE: 003
NAME , DESIGNER, ^OTO, INCORPORATED, 123 SOt^ HUDSON
STREET,OKLAHOMA CITY, OK 73102
ACCEPTABLE
PRIMARY ASSOCIATION COWORKER
AVERAGE EXTENT OF CONTACT REGULAR
SPAN OF CONTACT 11/05-4/06
RECO^NDS
MET BRADLEY MANNING IN 11/05 (DISCREPANT),WHEN BARRETT BEGAN
EMPLOYMENT AT ^OTO, INCORPORATED, OKLAHI^ CITY, OKLAH^, WHERE
MANNING WAS EMPLOYED ASAFULL TIME PROGRAMMER /DEVELOPER
WORKED I ^ THE SAME 2-PERSON OFFICE WITH MANNING AND HAD DAILY WORK
CONTACT WITH MANNING FROM 11/05-4/06.MANNING ENDED HIS EMPLOYMENT
IN 4/06 AND HAS NOT HAD CONTACT WITH MANNING SINCE 4/06.
REPORT OF INVESTIGATI^
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000
^
(b) (6), (b) (7)
(C)
(b) (6),
(b) (7)
(C)
(b) (6),
(b) (7)(C)
(b) (6),
(b) (7)
(C)
NAME MANNING, BRADLEY EDWARD 1CASEII08F18704 IPAGE 2
DATES OF INVESTIGATION 10/12/07-10/18/07 | SID 0721 10RGIDC48 IREPORT^ 1
BARRETT DID NOT HAVE SOCIAL CONTACT WITH MANNING.
SUB^CTISAFRIENDLY, EASY GOING, AND PLEASANT PERSON TO WORK WITH.
HEIS THOROUGH, DETAIL ORIENTED, AND CONSCIENTIOUS. SUB^CTISATEAM
PLAYER AND WORKED WELL WITH SOURCE. HEIS HONEST, TRUSTWORTHYAND
STRAIGHTFORWARD. SUB^CT IS POLITE, COURTEOUS, AND RESPECTFUL. HE IS
EVEN TEMPERED AND SOURCE EN^YED WORKING WITH SUB^CT. SOURCE HAS NO
KNOWLEDGE OF SUB^CT'S OUTSIDE INTERESTS OR LEISURE TIME ACTIVITIES.
SOURCE IS NOT AWARE OF ANYTHING IN SUB^CT'S BACKGROUND THAT COULD BE
USED AGAINST SUB^CT FOR COERCION OR BLAC^IL.
^^^^ END OF REPORT ^^^^
TRANSMITTED:10/18/07 PRINTED: 01/16/08
^^^^
NAME MANNING, BRADLEY EDWARD 1CASEII08F18704 IPAGE 1
DATES OF INVESTIGATION 10/29/07-11/12/07 | SID 2994 1 ORG ID 039 | REPORTHOl
TESTIMONIES
ITEM: 024 SOURCE: 001
NAME PERSONNEL TRAINEE DIVISION, BUILDING 470, FT. LEONARD WOOD,MO 65473
PERSONNEL RECORD
PROVIDER TOM BERENS,B. T.ASSI^^NT CLERK
ACCEPTABLE
NAME VERIFIED SSN NOT SHOWN DOB NOT SHOWN POB NOT SHOWN
EMPLOYMENT DATES 10/07-PRESENT
STATUS FULL TIME
WORKSITE ADDRESS NOT SHOWN
POSITION TRAOtEEPVl
EMPLOYMENT STATUS CHANGE NOT APPLICABLE
ITEM: 025 SOURCE: 002
NAME PERSONNEL TRAINEE DIVISION,BUILDING 470, FT. LEONARD WOOD,MO 65473
MILITARY RECORD
OBTAINED BY O^STIGATOR
ACCEPTABLE
NAME VERIFIED SSN VERIFIED DOB VERIFIED POB VERIFIED
BRANCH OF SERVICE USA
DATE ENTERED SERVICElO/07
DUTY STATUS ACTIVE GRADE PVl
ITEM: 026 SOURCE: 003
NAME BARRACKS MANAGEMENT,BUILDING 470, FT. LEONARD WOOD,MO 65473
RENTAL RECORD
PROVIDER HANITA LACK, LEADINSPECTOR
NO RECORD
TRAINEES ARE REQUIRED TO LIVEIN BARRACKS. NO RESIDENTIAL RECORDS ARE
MAINTAINED.
ITEM: 026 INVESTIGATOR'SNOTE SOURCE: 004
TRAINEES ARE REQUIRED TO LIVE IN BARRACKS WHILE IN BASIC TRAINING.
THIS IS ALSO THE SAME LOCATI^ AS THE TRAINEES' EMPLOYMENT. THE
TRAINEES' EMPLOYMENT RECORD LOCATION IS UNDERSTOOD TO BE THE SAME AS
THE TRAINEES' RESIDENTIAL LOCATION.
REPORT OF INVESTIGATION
PROPERTY OF U.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASH1NGTON,DC 20415-4000
^
NAME MANNING, BRADLEY EDWARD jCASE # 08F18704 |PAGE 2
DATES OF INVESTIGATION 10/29/07 - 11/12/07 | SID 2994 | ORG ID C39 | REPORT # 01
**** END OF REPORT **
TRANSMITTED: 11/12/07 PRINTED: 01/16/08
^
NAME MANNING, BRADLEY EDWARD ^CASEll08F18704 IPAGE 1
DATES OF INVESTIGATION 12/18/07-12/27/07 | SID 4737 | ORGIDW30 1 REPORTHOl
TESTIMONIES
ITEM: 031 SOURCE: 001
NAME ,
ISSUE(S) 11
PRIMARY ASSOCIATION RELATIVE
AVERAGE EXTENT OF CONTACT REGULAR
SPAN OF CONTACT 12/1987 TO PRESENT
REC^^NDS
MET BRADLEY MANNING WHEN THE SUB^CT WAS BORN IS
MANNING'S AUNT. MANNING LIVEDIN OKLAH^ FROM 12/1987 TO 12/2001
WHEN HIS PARENTS DIVORCED. SAW MANNING ^CEAYEAR DURING
THAT PERIOD. MANNING LIVED IN ENGLAND WITH HIS MOTHER FROM 12/2001
TILL APPROXIMATELY 10/2005.
HAD NO C^ACT WITH MANNING FROM 12/2001 TO APPROXIMATELY 2004
WHEN THEY ATTENDED THE SUB^CT'S SISTER'S WEDDING. MANNING COMPLETED
HIGH SCHOOL IN ENGLANDIN 07/2005 AND MOVEDIN WITH HIS FATHER IN
OKLAHOMA IN APPROXIMATELY 10/2005. MANNING LIVED WITH HIS FATHER AND
STEPMOTHER TILL APPROXIMATELY 07/2006 WHEN HE MOVED IN WITH THE
SOURCE. ALSTYNE SPOKE WITH MANNING ONE TIME WHILE HE LIVED WITH HIS
FATHER, BUT SAW MANNING DAILY WHILE HE LIVED WITH THE SOURCE.
MANNING LIVED WITH TILL 10/2007 WHEN HE COINED THE US ARMY.
SPEAKS WITH MANNING ^CEAWEEKSOtCE 10/2007.
MANNING LIVED IN ENGLAND FR^ 12/2001 TO APPROXIMATELY 10/2005. THE
SOURCE IS UNAWARE OF ANY PROBLEMS WITH FOREI^ OFFICIALS ASARESULT
OF THIS TIME ENGLAND. MANNING STILL HAS CONTACT WITH HIS MOTHER
AND At^S , 80^^CITI^^NS0F^^ tlN:t^OK^NC^OM, EVERY3-4W^EKS
BY TELEPHONE.
MANNING ALSO TOOKASCHOOLTRIP TO ^AN IN APPROXIMATELY 2004 F0R2
WEEKS. HEHAD NO PROBLEMS ANDHAS NO CONTINUING CONTACT WITH ANY
FOREIGN NATIONALS FROM THIS VISIT.
MANNING WAS UNEMPLOYED WHILE LIVING WITH THESOURCE FROM 07/2006 TO
12/2006. HE SPENT HIS TIME RESEARCHING COLLEGES AND WAS SUPPORTED
FINANCIALLY BY THE SOURCE. HE WORKED FOR STARBUCKS FR^ 12/2006 TO
10/2007. MANNING ALSO TOOK 3-4 CLASSES AT MONTGOMERY COLLEGE FROM
01/2007 TO 06/2007.
MANNING ENVOYS COMPUTERS,READING AND M^SIC.
ITEM: 031 INVESTIGATOR'SNOTE SOURCE: 002
REPORT OF INVESTIGATION
PROPERTY OF U.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,DC 20415-4000
(b) (6), (b) (7)
(C)
(b) (6), (b) (7)(C)
(b) (6),
(b) (7)
(C)
(b) (6),
(b) (7)(C)
(b) (6),
(b) (7)
(C)
(b) (6),
(b) (7)
(C)
(b) (6),
(b) (7)
(C)
(b) (6),
(b) (7)
(C)
(b)
(6),
(b)
(7)(C)
NAME MANNING, BRADLEY EDWARD |CASEliO8F18704 IPAGE 2
DATES OF INVESTIGATION 12/18/07 - 12/27/07 1 SID 4737 IORGIDW30 IREPORTHOl
SOURCE WASINTERVIEWED DUE TO LACK OF RESIDENTIAL AND UNEMPLOYMENT
COVERAGE.
ITEM: 032 SOURCE: 003
NAME BARISTA, STARBUCKS, 7911TUCKERMANLANE, POT^C,MD
20854
ACCEPTABLE
PRIMARY ASSOCIATION SUPERVISOR
AVERAGE EXTENT OF CONTACT REGULAR
SPAN OF CONTACT APPROX 02/2007 TO APPROX 09/2007
NO REASON NOT TO RECOMMEND
T MET BRAD MANNING WHEN MANNING BEGAN WORKING WIT T AT
STARBUCKS, WAS THE SUB^CT'S TRAINER AND SUPERVISOR AND SAW
MANNING 3-4 DAYSAWEEK AT WORK UNTIL MANNING LEFT IN APPROXIMATELY
09/2007. THEY ALSO LIVEDIN THE SAME NEIGHBORHO^ AND SAW EACH OTHER
ONCEAWEEK AND SPOKE IN THE NEIGHBORHOOD ON THOSE OCCASIONS, THERE
WERE NO GAPS IN CONTACT T HAS HAD NO CONTACT WITH MANNING
SINCE APPROXIMATELY 09/2007.
MANNING LIVED WITH HIS AUNT OFF OF FALLS ROAD IN POTOMAC,MD. HE
COINED THE US ARMY IN APPROXIMATELY 09/2007. MANNING ATTENDED HIGH
SCHOOL IN ENGLAND. THE SOURCEIS UNAWARE OF THE REASON FOR THE
EDUCATION OUT OF THE U.S.OR ANY DETAILS REGARDING THAT TIME PERIOD.
MANNING ENVOYS MATH, SCIENCE AND MUSIC.
^^^^ END OF REPORT ^^^^
TRANSMITTED: 12/27/07 PRINTED: 01/16/08
(b) (6), (b)
(7)(C)
(b)
(6),
(b)
(7)
(C)
(b)
(6),
(b)
(7)
(C)
(b)
(6),
(b)
(7)
(C)
(b) (6),
(b) (7)
(C)
NAME MANNING, BRADLEY EDWARD 1CASEII08FI8704 IPAGE 1
DATES OF INVESTIGATION 10/16/07 - 11/28/07 1 SID 6885 IORGIDC49 | REPORT 1102
TESTIMONIES
ITEM: 004 SOURCE: 001
NAME OOOPERMILL APARTMENTS, 5607 71ST PLACE E., TULSA,OK
RENTAL RECORD
PROVIDER BOOKKEEPER
SF RELEASE
ISSUE(S) 03A
NAME VERIFIED SSN NOT SHOWN DOB NOT SHOWN POB NOT SHOWN
RENT DATES 04/06-07/06 RENTPAYME^SEEISSUES
RENTERS BRADLEY MANNING
UNIT 5607 71ST PLACE E., APARTMENT 1005, TULSA,OK
FORWARDING ADDRESS NOT SHOWN
OCCUPANT(S) SAME AS RENTERS
RECORDS INDICATE SUB^OT MOVED INTO APARTMENT ALONE t ^ 4/18/06 AND
SKIPPED^7/12/06.
4/15/06 PAID ^155
5/1/06 PAID^TIME ^349.00
6/12/06 PAID ^349 PLUS LATE FEES ^50
7/12/06 BOOKKEEPER DISCOVERED APAI^TMENT WAS EMPTY WITH
KEYS ON COUNTER.EXACT DATE OF DEPARTURE NOT KNOWN.
CURRENT AMOUNT OWED: ^1,472.51 FOR PAST RENT, CLEANING,DAMAGES, AND
TERMINATION FEE.
NO OTHER DEROGATORY It^RMATION IN FILE.
ITEM: 004 INVESTIGATOR'SNOTE SOURCE: 002
NOPERSONALTESTIMONY POSSIBLE AS PER BOOKKEEPER ^OLINE ABBEY OF
COOPERMILL APARTMENTS WHO INFORMED INVESTIGATOR THAT ALL CURRENT
RESIDENCES IN THE VICINITY OF THE APARTMENT MOVEDIN AFTER SUB^CT
MOVED OUT OF THE APARTMENT,
ITEM: 007 INVESTIGATOR'SNOTE SOURCE: 003
FYE DOES NOT MAINTAIN EMPLOYMENT RECORDS. ALL EMPLOYMENT RECORDS MUST
BE OBTAINED THROUGH TRANSWORLD ENTERTAINMENT. ITEM FOR TRANSWORLD
ENTERTAINMENT WAS OBTAINED AND REPORTED.
ITEM: 009 INVESTIGATOR'SNOTE SOURCE: 004
REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,DC 20415-4000
(b) (6), (b)
(7)(C)
(b) (6), (b)
(7)(C)
NAME MANNING, BRADLEY EDWARD |CASEll08F18704 |PAGE 2
DATES OF INVESTIGATION 10/16/07-11/28/07 1 SID 6885 1 ORG ID 049 | REPORT^02
INVESTIGATOR WAS UNA8LE TO OBTAIN EMPLOYMENT RECORD DUE TO CONFLICT OF
INFORMATION.
SOURCE UNIT DIRECTOR, INFORMED INVESTIGATOR THAT RECORDS
ARE NO PERSO^L RECORDS FOR PREVIOUS EMPLOYEES AND THAT ALL RECORDS
ARE KEPT AT THE CORPORATE OFFICE. PROVIDEDINVESTIGATOR WITH
PHONE NUMBER OF CORPORATE OFFICE.
ALSO INFORMEDINVESTIGATOR THAT THERE ARE CURRENTLY NO
EMPLOYEES WORKING AT INCREDIBLE PI^^A WHO WOULD HAVE WORKED WITH
SUB^OT.
INVESTIGATOR MADE PHONE CONTACT WITH THE CORPORATE OFFICE,NAME OF
PERSON NOT OBTAINED, INFORMEDINVESTIGATOR THAT EACH STORE KEEPS THEIR
OWN RECORDS.
INVESTIGATOR MADE PH^ CONTACT WITH LISTED SUPERVISO
,KNOWN AS INFORMED INVESTIGATOR THAT HE
DID NOT RECALL SUB^CT DUE TO HAVING SEVERAL EMPLOYEES, BOTH PAST AND
PRESENT.
ITEM: 021 SOURCE: 005
NAME TRANSWORLD ENTERTAI^NT, 38 CORPORATE CIRCLE, ALBANY, NY 12203
PERS^^L RECORD
PROVIDER HR
SF RELEASE
TELEPHONE TESTIM^
ACCEPTABLE
NAME VERIFIED SSN VERIFIED DOB NOT SHOWN POB NOT SHOWN
EMPLOYMENT DATES 05/06-06/06
STATUS FULL TO^
WORKSITE ADDRESS WOODLAND HILLS MALL, TULSA,OK
POSITION LEAD ASSOCIATE/MANAGEMENT
^ 1 ^ 1 ^ S^ATt^SNO^S^CWN
EMPLOYMENT STATUS CHANGE NOT SHOWN
EMPLOYMENT DATES 5/24/06 TO 6/10/06
NO OTHER INFORMATION AVAILABLE DUETOPOLICY AND PROCEDURE.
ITEM: 021 INVESTIGATOR'SNOTE SOURCE: 006
INFORMATION WAS OBTAINED BY TELEPHONE WITH INVESTIGATOR CALLED TO
OBTAIN PROCEDURE POLICY FOR OBTAINING EMPLOYMENT RECORDS.
REPORT OF INVESTIGATION
PROPERTY OFU.S, OFFIOE OF PERSONNEL MANAGEMENT (IS)
1900EST, NW,WASHINGTON, DC 20415-4000
^
(b) (6), (b)
(7)(C)
(b) (6), (b)
(7)(C)
(b) (6),
(b) (7)
(C)
(b)
(6),
(b)
(7)(C)
(b) (6), (b)
(7)(C)
(b)
(6),
(b)
(7)
(C)
(b) (6), (b) (7)(C)
NAME MANNING, BRADLEY EDWARD ICASE # 08F18704 jPAGE 3
DATES OF INVESTIGATION 10/16/07 - 11/28/07 | SID 6885 | ORG ID C49 | REPORT # 02
*** END OF REPORT ****
TRANSMITTED: 11/28/07 PRINTED: 01/16/08
09
NAME MANNING, BRADLEY EDWARD ICASE 1108F18704 |PAGE 1
DATES OF INVESTIGATION 11/02/07 - 11/09/071 SID 7296 IORGIDA06 IREPORTHOl
TESTIMONIES
ITEM: 023 SOURCE: 001
NAME THE WORK NUMBER, STARBUCKS COFFEE COMPANY,WWW.THEW0RKNUMBER.COM,
PERSONNEL RECORD
OBTAINED BY INVESTIGATOR
TELEPHONE TESTIMONY
ACCEPTABLE
NAME VERIFIED SSN VERIFIED DOB NOT SHOWN POB NOT SHOWN
EMPLOYMENT DATES 01/07-10/07
STATUS NOT SHOWN
WORKSITE ADDRESS NOT SHOWN
POSITION BARISTA
REHIRE STATUS NOT SHOWN
EMPLOYMENT STATUS CHAIilGE NOT SHOWN
ITEM: 023 INVESTIGATOR'SNOTE
SOURCE: 002
RECORD INFORMATII^ OBTAINED FR^ THE WORK NUMBER VIA THEINTERNET.
^^^^ END OF REPORT ^^^^
TRANSMITTED:ll/09/07 PRINTED: 01/16/08
REQUESTOR ID: FOV K115
DATE: 02/02/12 PAGE: 1
UNITED STATES OEEICE OF PERSONNEL MANAGEMENT
INVESTIGATIONS SERVICE
************************* CASE CLOSING TRANSMITTAL ************************
CLOSED: 10/02/2007
CASE #: 70696500 TYPE/SERVICE: ENTNAC - PRT
EXTRA COVERAGE:
NAME: MANNING, BRADLEY EDWARD
SSN: M m i - 9 DOB: # # # # 1 9 8 7 POSITION:
SON: A02M SOI: DD70
COMMANDER DEPARTMENT OF DEFENSE
BALTIMORE MEPS HQ USMEPCOM
850 CHISHOLM AVENUE, STOP 2995 ATTN: MOP-AD
FT MEADE, MD 20755 2834 GREEN BAY ROAD
NORTH CHICAGO, I L 60064
AGENCY DATA:
OPM ADJUDICATION: F - NO ISSUES - REVIEW LEVEL 1
THE ITEM INFORMATION SUMMARIZED BELOW, AND ANY REPORTS OF
INVESTIGATION, INQUIRY FORMS AND/OR OTHER ATTACHMENTS WITH THIS
TRANSMITTAL, COMPLETE THE INVESTIGATION REQUESTED ON THE PERSON
IDENTIFIED ABOVE.
THIS CASE HAS BEEN ELECTRONICALLY TRANSMITTED TO THE AGENCY
****************************** ITEM INFORMATION ******************************
ITM TYPE ITEM IDENTIFICATION/LOCATION CM RESULTS
*** **** ****************************************** * * ***********************
AOl S I I L NO RECORD
BOl FBIF L NO RECORD
COl FBIN L NO PERTINENT
DOI DCII L NO RECORD
*********************** END CASE CLOSING TRANSMITTAL ***********************
(b)
(6),
(b)
(7)(C)
PRINTED: 02/02/201^
REQLIE^STOR ID: E07 ^115
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT
INVESTIGATIONS SERVICE
WASHINGTON, DC 20415
Cei^t^i^lc^t^^on In^e^t^i^^^t^^^cm
CLOSED: 10/02/2007
SUBMITTING OFFICE: SON - A02M SECURITY^ OFFICE: SOI - DD70
DEPARTMENT OF DEFENSE
HQ U8MEPC0M
ATTN: MOP-AD
283^ GREEN BAY ROAD
NORTH CHICAGO, I L 60064-3094
NAME: MANNING, BRADLEY EDWARD
SSN: 4##1#11 DOB: ##1^/1987 POSITION:
CASE TY^PE: ENTNAC ^ OPM CASE ^: 70696500
EXTRA COVERAGE:
POSITION CODE : /
SCHEDULED DATE: 09/26/2007
INVESTK^ATION CONDUCTED FROM: 7
THIS CERTIFIES THAT A BACKGROUND INVESTIGATION ON THE PERSON IDENTIFIED ABOVE
HAS BEEN COMPLETED. THE RESULTS OF THIS INVESTIGATION WERE SENT TO THE SECURITY
OFFICE FOR A SECURITY/SUITABILITY DETERMINATION.
*******************************************************************************
AGENCY C^ERTIFICATION: THE RESULTS OF THIS INVESTIGATION HAVE BEEN REVIEWED, AND
A FINAL DETERMINATION HAS BEEN MADE.
AGENCY CERTIFYING OFFICIAL . DATE
FILE THIS CERTIFICATE ON THE PERMANENT SIDE OF THE PERSON^S OFFICIAL PERSONNEL
FOLDER AFTER THE FINAL AGENCY DETERMINATION IS MADE.
(b) (6)
Prosecution Exhibit 1 Oa
5 pages
classified
"CONFIDENTIAL"
ordered sealed for Reason 3
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
Prosecution ExhihitlOh
^pages
classified
"CONEIDENTIAE"
ordered sealedf^rReason3
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution ExhihitlOc
^pages
classified
"CONEIDENTIAE"
ordered sealed forReason3
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution ExhihitlOd
^pages
classified
"CONTIDENTIAE"
ordered sealed for Reason3
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution ExhihitlOe
^pages
classified
"CONEIDENTIAE"
ordered sealed for Reason3
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution ExhihitlOf
^pages
classified
"CONEIDENTIAE"
ordered sealed for Reason3
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
ProsecutionExhihitlOg
^pages
classified
^^CONEIDENTIAE"
ordered sealedf^orReason3
Military Judge's Seal Order
dated20August2013
stored in the classified
supplementto the original
Record ofTrial
Prosecution ExhihitlOh
^pages
classified
"CONEIDENTIAE"
ordered sealed for Reason3
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
,n
IKg
V O * - ^
Seagate
S/N: 9VS25G5M
lllllllllllllllllllllllllllllilllllllllllllllll
ST31500341AS
lllllllllllillllllillllllillllllllllllllllllllllHIIIIIIIIIIIIII
P/N: 9JU138-302
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
Firmware: CC1H
w a s S,.0.:T
Caution. Product warranty is void il any seal
or label is removed, or il the drive experiences
Barracuda 7200.11
1500 Gbytes
+ 5V0.72A
+ 12V 0.52A
Product ol Thailand
shock in excess ol 350 Gs.
STX-720011 (B)
Need Support? Visit www.Seagale.com.
This medium is
UNCLASSIFIED
\
i '
Installation Summary
! # # # # ! ! :
Disk Utililv in me uiilitiMl2^
This medium is Classified
SECRET
U.S. Government Property
Protect it from unauthorized
disclosure in compliance with
apoiicable executive orders,
statutes, and regulations.
. s- -^
. . ,
U.S. Government Property
SF 710 (1-87)
Substitute for
Prosecution Exhibit 11
0 ^
PAGE OFFERED: PAGE ADMITTED:
PAGE OF PAGES
r i i i
E#
10^..
Ttiis medium IS classified 1
SECRET j
u s. Government Properly ;
Protect It from unauthorized \
disclosure in compliance with;
applicable executive orders. \
statutes, and regulations. \
S CO n o
11
ODI
1
1
xl
H I
^1
0 ]
ml
.VJB
X)|
H I
Substitute for
Prosecution Exhibit 12
EVIDENCE/PROPERTY TAG
For use of this forni, see AR 95-5,
the proponent agency is DCb,G-i
MPR/CID CONTROL NUMBER
6Ogg~)6-Cr022.Mbl f7
ITEM slUMBER
I OF f
ITEM
TIME
Oi OO
DATE
REMARKS
[2JvlX> Kb
INITIALS
pspe
M.f^. f ^c{ ( zj , n^ A ^ L^oy^cf
l - W^Oi ' sK Dr^me
S^SZ'iiPiL K^V/S-WVu
k^o^T^lS^F^O
DA FORM 4002, JUL 92
Replaces DA Form 4002,1 JUL 76 which is obsolete.
I * X IN IM.ILWO KVNO 2 3 4 ; ,
"
iiiiiI!i.J5SJISli2JS,JflL'-'-9 ' "^' i ooKxmoi
IIMIIIIIIIII
I " " '
Q : ^ ^ ^ h
5>I n u U Sfll/U. DAT
CAUTION PtEASE ATTACH ALL CAKES
SECUHLV FM PKMR c o Ka r m
RoHS compiiance
8
OtM g i g a k r t ( OB)
BOM b i l l i o n byt e a .
a c c * * i t l # B p c l t y
" i l l b* nd a c t i Ml
c a p a c i t y dapi uU on
t h * c p # r * t l n g a n v l r o n Mn l
and f o n a t t i n q
I'S0OO0OC04|-':GS4C
#
0%
FKL-HHY2120BH<B>
FuJllM Utm lU.
\
iimiiiiiiiiiiiiiiiiiiii
^Mnr zi QOIQ
ll
This medium is classltied
SECRET
U.S. Government Property
Protect it from unauthorized
disclosure in compliance with
applicable executive orders,
statutes, and regulations.
^^OSEcTTT^
HggewTBH
Substitute for
Prosecution Exhibit 13
^i j ^^^
4
/
PROSECUTION EXHIBIT/^for idAcation
PAGE OFFERED: PAGE ADNpfrED
PAGE_OF_PAGES
II
EVIDENCE/PROPERTY TAG
For use of this form, see AR 195-5,
the proponent agency is DCS, G-3
MPR/CID CONTROL NUMBER
Q^?-fc:^-<M)22 f- iGl 17
ITEM NUMBER
i OF
TIME
DZoS
DATE
I ^ Ju^l D
REMARKS
/Y\R.- AcirtiV^ A,LcjAvCS
Ly>^}^^ Cai^ip^x^i
l\f ihi^x k>i2i,r^\ w/
pcoeie $-t.^pl
UNCLASSIFIED
U.S. Government Property
SF 710 (1-
Substitution for
Prosecution Exhibit 14
Prosecution Exhibit 15
has been entered into
the record as a CD/DVD
and will be maintained
with the original
Record of Trial
ManningB_00527547
This medium is
UNCLASSIFIED
U S Government Property
SF 710 (1-87)
t s o i s ^
PE 15b - Substitute for Apache CD
<^
For Official Use Only Law Enforcement Sensitive
o
o
K
tf)
b
z
o
u.
Q.
O)
c
43
O
Q.
0)
o
JC
o
*
0)
CO
O)
3
o
0^
^
0028-10-CID221-10117
0160-10-CID899-14463
12
1
3
O"
"O
i l
as 0)
g%
. P O) X
o
i xog gnf I
i LL
Q
LU
GO
tf)
b
i
Ii
o
O
_ i
CO
HI
CO
CD
^
^
o>
OJ
CO
D
O
o
CD
13 _c
a> CO
E *
to
I i
S-
i l
LL IU
m CO
cr
2
i l l
IP
O o p
u. oi
i l l
- t > 0)
oo
CVJ
o
CO
o
o
<
X
<
OC
O
c
o
H
<
( f i
| 5
lu
UJ Q m
iii
H eo >
Ul
_ l
8
(0
z 2
S
x
c
m
Ho
3
Q.
E
o
u
c
o
3
CL
E
8
Q.
Q
Q-
m
0)
a
<
= i
I I
SP
c
c
o
a
c
8
o
OJ
a
iS
I
o
.5
m
m
z
.a>
c
c
a>
c
o
.c
Q .
a>
(U
ro
_3
"53
(J
3
O
TJ
I
JC
O)
c
c
o
c
3
u>
Q
>
Q
t c
u
ro
Q.
"3
ro
i n
<n
ro
I
-D
-2
n
X X
o
XI
x:
O)
LU
I
UJ
o
o
X
S
s=
^
c
o
5
0)
E
ro
O
< od o Q uj u. O
For Official Use Only Law Enforcement Sensitive
ManningB_00000285
Exhibit c2(g>
PROSECUTION hXMmiT U J(>r :6gf<tification / 5<2^
PAGKOFFER^iD: PAG^AbivarTED: ^
PAGE OF PAGES
9| : 90: SI eo- 90- I Oc
^ -a
> > 3
0 o Q
rm
1 5 c
O m d
TI ?q o
r~i
X
X
>
o
m
CO
Q
>
ff^
0
31
rn &
O a
I* o
M
For Official Urn* Only Law Enforcement Sensitive
o
o
it
m
b
z
z
z
2
Q.
O*
c
u
2
CO
a
g
0028-10-CID221-10117
0160.10-CIO8M-14483
Mannlni
nlrggjpOOl
For Official Use Only Law Enforcement Sensitive
r UI )<| < I ' I ' i i r I'M ' t 4
10285 I ' Aul I I I i I .
o a ui u. O
Exhi bi t . W
L/nHt-aiinm / I ^L- ^
m D:
l ' .\UL i M
o
3
For Official Use O^y Enforcement Sensitive 0028-10-CID221-10117
0160-10-CID899-14463
0
C
Q)
O
CO
o
E
c
o
Ui
c
4 - *
o
a
o
Q
0)
^
CO
O)
3
o
QE:
CO
CD
5
dl
O)
9 5
0 J5
6 U
T o
1 2
O in
O
O
ut
g
#
D
3
CT
Ti
i l
ro (u
E%
O O)
"S tc-
C -"9-
ro (/)
cr
2
is ID
l o
^
p u- o
P
If
i l
CD
UJ
<
W)
>
CO
o
Ul
\il
UJ OC
UJ
(O >
I U
_ l
<
o
W)
2
go
X
X
LU
< <- )r.
3
CL
E
o
o
cc
CL
U)
<D 0)
3 ~
Q-
E
8 o
I I
U) z
0)
3
OL
E
o
UJ
>
>-1
- 1 M
z z
O UJ
UJ w
SI
u. Q:
&2
If
rJ l I
m
O
UJ
s
o
c
o
8
o
c
g
s
o
< ffi O
ManningB_00000273
For Official Use Only Law Enforcement Sensitive Exhibit - 3
ManningB_00000344
rMOOOOC 86uiuue/\j
,:,jai#w#<i#iiiiirin,iiii iiir inii Nmaaawaww
PROSECU
PAGE or r
y ) - ^
f';;;-J^ntHlcalion
;. .Cinu)r-irrTED:
PAGE Or rAGnb
2013-06-03 14:58:43
rnOCiOOu atrtuijue^^
PROSECUTION EXHIBIT J ^ f o r i den^at L
PAGE OFFERED: PAGE ADMIT^D'
PAGE OF PAGES
2013-06-03 15:02:13
^M^i^i^li^^^^COCOO^C^
8C:8C:tl [0-90-ElOC
C)
("-
c
r.
n
^'3
o
:'i
"1
CO
H
Ufi)
s>
'
^l *^
o
3
Manni naB '')0'
r ManningB_00000304
gbj i uuB^
PROSECUTION EXHIBIT ^Oo^fbr id
,
mcation
PAGE OFFERED: ^GE ADMIl
2013-06-03 14:41:17
PAGE OF PAGES
UNITED STATES OF AMERICA
V.
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
SGT Mary Amiatu
DATED: May 2013
It is iiereby agreed by tlie Accused, Defense Counsel, and Trial Counsel, that if SGT Mary
Amiatu were present to testify during the merits and pre-sentencing phases of this court-martial, she
would testify substantially as follows.
1. I am currently the S-1 NCO for the 6th Engineer Battalion at Fort Richardson, Alaska. I have held
this position for two months. Previously, I was the Strength Accounting Clerk for U.S. Army Central
Command G-1 at Camp Arifjan, Kuwait. I held that position from October of 2011 until October of
2012. In that position, I helped account for personnel coming in and out of theater, moving from place to
place within theater, and changing duty status. I provided battle management update briefs and worked
with the Deployed Theater Accounting System (DTAS). I also worked with the Joint Asset Movement
Management System (JAMMS).
2. With regard to this particular investigation, I provided investigators from the Army Criminal
Investigation Command (CID) a print-out from JAMMS on PFC Bradley Manning. JAMMS is a system
that captures movement and location information about operating forces, govemment civil servants, and
govemment contractors through data collection points established in specified operational theaters. These
collection points are, for example, dining facilities, ports of debarkation, and fuel points. Operational
theaters include Kuwait, Afghanistan, and Iraq. As such, JAMMS would capture the dates on which PFC
Manning scanned himself in and out of Department of Defense (DOD) facilities using his CAC card, such
as dining facilities (DFACs) and points of debarkation into and out of Iraq (APOD/SPOD). When
providing this report, I also signed and had notarized an attestation certificate (identified at BATES
Number 00412522) regarding the authenticity of the information.
3. As a former Strength Accounting Clerk, I am familiar with JAMMS reports. I have read them before.
I , therefore, understand this JAMMS report I provided (identified at BATES Numbers 00412523 -
00412532) to show that the Service Member named "Manning, Bradley", whose last four social security
number digits are 9504, came into and out of Iraq several times. For example, on page 9 of this
document, it shows that on 26 October 2010, PFC Manning signsd into the DFAC on Camp Buehring in
Kuwait, but by 28 October 2010, was using the DFAC in Iraq. Page 8 shows Bradley Manning departed
Iraq on 22 January 2010 and then entered again, via Kuwait, on 11 February 2010. Gaps like this are
normal when a soldier leaves a deployed environment, such as for mid-tour leave. Page 8 further shows
that PFC Manning was using the FOB Hammer DFAC by 14 Febmary 2010. Lastly, Page 1 shows that
PFC Manning boarded an outbound flight from Iraq on 30 May 2010.
ANGEL M./OyERGAARD
CPT, JA
Assistant Trial Counsel
THOMAS F. HURLEY
MAJ.JA
Defense Counsel
BRADLEY E. MANNING
PFC, USA
Accused
. ^ . ^
PROSECUTION FXHTBiT 7,\ for idp^fification
PAGE OFFERED- C.^/vDMiTTED:
PAGE OF PAGES
UNITED STATES OF AMERICA
V.
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
SA Calder Robertson
DATED: "5 June 2013
It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that i f Special
Agent Calder Robertson were present to testify during the merits and pre-sentencing phases of
this court martial, he would testify substantially as follows:
1. I am a Special Agent (SA) for the Computer Crime Investigative Unit (CCIU) of the U.S.
Army Criminal Investigation Command (CID). I have been with CCIU since March 2006. In
February 2010,1 became the Special Agent-in-Charge (SAC) of the Europe Branch Office of
CCIU. In my current capacity, I am responsible for conducting and overseeing the conduct of
large-scale complex criminal investigations associated with high technology, including insider
threat and computer intrusions into the critical information architecture of the U.S. Army.
Among other things, this work includes: conducting interviews, executing search warrants,
processing crime scenes, collecting and handling physical evidence, obtaining forensic images of
digital evidence, conducting forensic examinations, and preparing comprehensive reports for
supported officials and prosecutors. I have testified several times injudicial proceedings.
Because I am in charge of the Europe Branch Office of CCIU, I have responsibility for
investigating cyber crime incidents in Europe and Africa, as well as providing rapid response to
Southwest Asia (Iraq and Afghanistan). Additionally, I was recently selected to establish the
Pacific Branch Office of CCIU, with responsibility for investigating U.S. Army cyber crime
incidents in the Pacific area of operations. From April 1998 to November 2003,1 held a variety
of other positions within CID and was responsible for investigating criminal offenses with an
Army nexus.
2. I received a B S. in Psychology in 2006 and have been a Certified Computer Crime
Investigator through the Defense Cyber Crime Center (DCS) since 2007. In 2010,1 was awarded
the U.S. Army Achievement Medal for Distinguished Civilian Service as a civilian Special
Agent for Army CID. I have received numerous other awards in my civilian and military
capacities.
3. I have received extensive training from the Defense Cyber Investigations Training Academy
(DCITA), which is part of DC3. Through DCITA, I have attended the following courses
relevant to my current work: Live Network Investigations (2009), Mobile Electronics Forensics
Training (2008), Advanced Log Analysis (2008), Forensics and Intrusions in a Windows
Environment (2007), Macintosh Forensic Examinations (2007), Wireless Technology (2007),
Windows Forensic Examinations with EnCase (2007), Introduction to Networks and Computer
Hardware (2006), and Introduction to Computer Search and Seizure (1999). Additionally, I
attended Computer Forensics II with EnCase in 2009, a course put on by Guidance Software, the
1
' ySX
PROSECUTION EXHIBIT for idepfification
PAGE OFFERED: PAGE ADMITTED:
PAGE OF PAGES
makers ofEnCase. In 2011,lalso attended DCITA^sLarge Data Set Acquisition course as well
as the Army Criminal Investigation Laboratory^sEvidence Management Certification Course.
These courses focused on the collection and handling ofphysical and digital evidence.
^. On 27 May 2010,Ibecame involved with the investigation ofPFC Bradley Manning after
receiving preliminary information on misconduct that required downrange investigation. As the
SACofthe Europe Branch Office ofCCIU and the closest CCIU agent to Iraq,Iwas tasked by
CCIU Headquarters, then at Fort Belvoir,Virginia, to provide support to the Camp Liberty CID
office. Itraveled to Camp Liberty in Baghdad and stayed there for three days at the end ofMay
2010. Istayed at Camp Liberty because, at that time, it was too dangerous to travel to FOB
Hammer. Additionally,the evidence collection team already at the crime scene on FOB
Hammer had sufficient personnel to complete their mission such that my physical presence was
unnecessary. My role in the investigation was to assess and provide expert assistance with the
collection, preservation, and imaging of computer evidence as well as to perform preliminary
analysis ofthe digital evidence. Apreliminary forensic examination isabrief review taking no
more thanacoupleofhours,whereasaftill forensic examination may take anywhere from an
entire day to several weeks, depending on the amount ofrecoverable information. Iconducted
preliminary forensic examinations onanumberofitems of evidence seized in this case.
Evidence collected from FOB Hammer and delivered to me at Camp Liberty included: two
Supply Annex computers,arewriteableCD,an Apple brand personal laptop, an external hard
disk drive, and three Sensitive Compartmented InformationFacility(SCIF) computers.
^. Ifollow several general procedures when handling evidence. Ireview the custody document
and always ensure the description ofthe evidence matches the evidence attached. Icheck,for
example, that recorded serial numbers, markings for identification, and condition description
match the associated evidence. lensure that the necessary information, such as date and time,
are properly and accurately recorded. Lastly,Imaintain secure custody ofthe evidence prior to
transferring it to another individual. In addition to following these procedures,when transferring
to or receiving evidence from another person,Iam also sure to properly sign, date, and note the
reason forthe transfer.
6. With regard to each item ofphysicalevidencelreceived in this case,Ifollowed these same
procedures. When receiving whole computers,IaIso checked to ensure they did not contain any
suspicioushardwareorremovable data storage devices such as SD cards and thumb drives. Prior
to powering on or accessing the contents of any device,Iimaged each item ofphysical evidence
Ireceived in order to preserve the contents ofthe data on the item. Aforensic image of an item
of digital media is an exact, bitforbit copy ofthe data on the digital media. limaged these
items ofevidence so that the data on the device can be forensically examined without
manipulating the data contained on the original evidence. This is standard practice by digital
forensic examiners. The software forensic examiners use to image the digital evidence has built
in procedures to verify that the item has been successfully duplicated. For example, the program
will note the MD^ Hash or Secure Hash Algorithml(SHAl)hash value of an item of digital
evidence before imaging(acquisition hash value)and after imaging the item(verification hash
value). Ifthe two hash values match, the item has been successfully duplicated bit-for-bit. The
hash value is determined by mathematical algorithm and is displayed asanumber^letter identifier
unique to every item ofelectronically stored information. It is similartoadigital fingerprint,
although more unique. When the hash value is generated, the entire hard drive will haveahash
value, as well as each individual file on the hard drive. Ifthere is any alteration to the hard drive
or to any file on the hard drive, the acquisition and verification hash values will not match. The
alteration can beasmall as addingasingle space intoatext document or savingafileina
different format (i.e. savinga^^.doc^^asa^^.pdf^). In this case,Iused EnCase forensic software
to complete this imaging process. EnCase forensic sofl^are is widely used by digital forensic
examiners. Aslstatedearlier,lhave received training on EnCase forensic software and have
used it in my other cases involving digital forensic examinations. lencountered no errors while
conducting the imaging ofthe evidence at issue in this case.
7. Between 30 May 2010andl.Iune2010,Iprocessed the following itemsofphysical evidence:
a. IprocessedaHitachi brand laptop computer,with the serial number
070817DP0C10DSG2JlDP,which was collected from the SupplyOfficeor Annex, 2ndBrigade
CombatTeam,10th Mountain Division, FOB Hammer, Iraq. This computer was marked
^^UNCLASSIFIED^^ and was seized because PFC Manning had temporarily worked in the Supply
Office in May 2010and used this computer. Ireceived this evidence from SA Thomas Smith. I
followed proper evidence handling procedures to receive and handle this evidence, and made
sure the evidence matched its noted description before beginning work. Upon taking possession,
lunsealed this computer and obtained an EnCase forensic image ofthe hard drive contained
within this computer. The resulting forensic image, with the SHAI hash value of
309df^9f068ft^a2e81aae03dla93d471cde90bf0, was verified to bean exact, bitforbitcopy of
the hard drive throughacomparison ofthe acquisition and verification hash values. Ididnot
examine this image further. IreviewedDN073-10in preparation forthis case. Thisitem^s
forensic image is located on I t eml of DN 073 10. Iknowthisbecauselcollectedltemlas
evidence.
b. ^processedaSeagate brand computer hard drive, with the serial number CN-
0MN922 21232 793 002L, which wascollected from the SupplyOffice^Annex,2ndBrigade
CombatTeam,10thMountain Division, FOB Hammer, Iraq. This computer was connected to
the SIPRNET and the hard drive was seized because PFC Manning had temporarily worked in
the Supply Office in May 2010and used this computer. Ireceived this evidence from SA Smith.
Ifi;^llowed proper evidence handling procedures to receive and handle this evidence, anLl made
sure the evidence matched its noted description before beginning work. Upon taking possession,
lunsealed this hard drive and obtained an EnCase fc^rensic image ofthe hard drive. The
resulting forensic image,with the SHAI hash value of cf6d703f0023773e
b9e30eeb318660ac0dl8f40^,was verified to be an exact, bit-for-bit copy ofthe hard drive
throughacomparison ofthe acquisition and verification hash values. Ididnot examine this
image fiirther. IreviewedDN073-10in preparation for this case. This item^sforensic image is
located on Item2ofDN 073 10. IknowthisbecauseIcollectedItem2as evidence.
c. Iprocessedarewriteable compact disc(CD-RW), with the serial number
LD623M^0^18^038B16, which wascollected from thequartersofPFCManning,Room^C93,
LSA Dragon, FOB Hammer, Iraq. ACDRWi s different fromacommerciallyproduced CD
with content already loaded onto it (i.e. fromamusic store), becauseaCDRW allows the userto
v^ite content to the CD,along with edit or delete information on the CD. ThisCDRWhada
^^SECRET^stickeronitandwaslabeled^^I2.Iul07C^ENGAGEMENT^ONE30GC^^ This
CD-RWwas collected with three Arabic language CDs inamultidisc case. Ireceived this
evidence from SA Smith. Ifollowed proper evidence handling procedures to receive and handle
this evidence, and made sure the evidence matched its noted description before beginning work.
Upon taking possession,Iunsealed the multidisc case and obtained an EnCase forensic image of
the aforementioned CDRW. The resulting forensic image,with the MD^ hash valueof
^c993ee62Ib036^82bael3^3f844322f,wasverifiedto bean exact, bitforbitcopyoftheCD
RWthroughacomparison ofthe acquisition and verification hash values. After imaging this
CDRW,Iconductedapreliminary forensic examination ofthis image. TheCDRWcontained
two files with identical names. One file contained no data and the other file,^^I2 Jul 07 C^
ENGAGEMENT ^ONE 30 GC,^^containedavideo. The video appeared to have been burned to
the disc on 27April20I0using Macintosh disc creation software. IreviewedDN073^I0in
preparation for this case. This item^sf^rensic image is located on Item2ofDN 073 10. Iknow
this becauseIcoIlectedItem2as evidence.
d. Iprocessed an Apple brand laptop computer,with the serial number W8939A^066E,
which was collected from the quarters ofPFC Manning, Room 4C93,LSA Dragon, FOB
Hammer, Iraq. Ireceived this evidence from SA Smith. Ifollowed proper evidence handling
procedures to receive and handle this evidence, and made sure the evidence matched its noted
description before beginning work. Upon taking possession,Iunsealed the Macintosh computer,
removedaFu^itsu brand hard drive from the laptop, and obtained an EnCase forensic image of
the hard drive. The serial number ofthe hard drive was ^9^DT9829WPY. The resulting
forensic image ofthe hard drivelobtained from this computer, with the SHAI hash value of
3cfl07db8b386^a^e3ebfce^00baelda9691ft^^9, was verified to bean exact, bitforbitcopy of
the hard drive throughacomparison ofthe acquisition and verification hash values. Thereafter,!
conductedapreliminary forensic examination ofthis image. Idetermined that the hard drive had
aMacintosh operating system installed and hadauser account resembling PFC Manning^sname,
althoughldidnotnotethemachine^susemameinmyAgent^sInvestigationReport(AIR). A
review ofthe device logs contained on the hard drive revealed some form ofoptical disc (i.e.
CD-RW drive)activity occurred, like deleting or burning CDRWs, on or around 27April 2010.
lalso reviewed the ^^user^^ files associated with the account resembling PFC Manning^sname and
located several files containing text that was specifically referenced in the chat logs received by
U.S.Army CID during the initial phases ofthe investigation, thoughldid not specifically note
which text was referenced in the chat logs in my AIR. Ireviewed DN 073 lOin preparation for
this case. This item^sforensie image is located on I t eml of DN 073-10. Iknow this becausel
collected Itemlas evidence.
e. !processedaSeagate brand external hard disk drive (HDD),with the serial number
2GEWJ^J,which was collected from the quarters ofPFC Manning, Room 4C93,LSA Dragon,
FOB Hammer, Iraq. Ireceived this evidence from SA Smith. Ifollowed proper evidence
handling procedures to receive and handle this evidence, and made sure the evidence matched its
noted description before beginning work. Upon taking possession,Iunsealed the external HDD
case and ftirther removed the internal HDD,also Seagate brand(serialnumber9VSlS2T^),
becauseldid not haveapower adapter that could safely and reliably power the Seagate brand
external HDD. Ithen obtained an Encase forensic image ofthe internal Seagate HDD with the
SHAI hash valueofl^ll83^63c^b^8^1a811^627bf^le8d9e7^abb^8Theresultingforensic
4
image was verified to be an exact, bitforbit copy ofthe Seagate HDD throughacomparison of
the acquisition and verification hash values. After imaging the Seagate HDD,Iconducteda
preliminary forensic examination ofthis image. Ifoundafile containing the contact information
ofamemberoftheWikiLeaksteam,Mr.JulianAssange. This contact information appeared to
have been produced and released by the WikiLeaks team and did not appear to be ofapersonal
nature. Ireviewed DN 073 lOin preparation forthis case. This item^sforensic image is located
on I t eml of DN 073-10. Iknow this becauselcollected Itemlas evidence.
f Iprocessed an Alienware brand laptop computer,with the serial number
N^^900TA6D0066I, which was collected from the Sensitive Compartmented Information
Facility (SCIF) ofthe 2nd Brigade CombatTeam,10th Mountain Division, FOB Hammer, Iraq.
This computerwas connected to the SIPRNET and the hard drive was seized because PFC
Manning had worked in the SCIF in November 2009 to May 2010and used this computer.!
received this evidence from SA Smith. Ifollowed proper evidence handling procedures to
receive and handle this evidence, and made sure the evidence matched its noted description
before beginning work. Upon taking possession,IunseaIed the Alienware laptop computer,
removed the Seagate brand hard drive from the laptop, and obtained an EnCase fc^rensic image of
the hard drive. The serial number ofthe hard drive was 3MH036M1. The resulting forensic
image ofthe hard drivelobtained from this computer,with the SHAI hash value of
C7^00fbed0b4db68a^82a^8^eeaa3^abla62cd64, was verified to be an exact, bit for bit copy of
the hard drive throughacomparison ofthe acquisition and verification hash values. Thereafter,!
conductedapreliminary forensic examination ofthis image. Idetermined that PFC Manning
hadauser account on this laptop computer. Ifound several items ofinterest to this investigation,
including copies ofthe Apache video made publically available by WikiLeaks and called
^^CollateralMurder.^^ lalso found an archive file that contained approximatelyll,000 sensitive
and classified documents, downloaded in HyperText Markup Language (HTML)format, though
Ididnot note the exact number. Ireviewed DN 073 lOin preparation forthis case. Thisitem^s
forensic image is located on Item2ofDN 073 10. Iknow this becauselcollected Item2as
evidence.
g. IprocessedaDell brand laptop computer,with the serial number HLVJ(^FI,which
was collected from the Sensitive Compartmented InformationFacility (SCIF) ofthe 2nd Brigade
CombatTeam, 10th Mountain Division, FOB Hammer, Iraq. This computer was connected to
the SIPRNET and the hard drive was seized because PFC Manning had worked in the SCIF in
November 2009 to May 2010and used this computer.Ireceived this evidence from SA Smith.
Ifollowed proper evidence handling procedures to receive and handle this evidence, and made
sure the evidence matched its noted description before beginning work. Upon taking possession,
lunsealed the Dell laptop computer, removed an unknown brand hard drive from the laptop, and
obtained an EnCase forensic imageofthe hard drive. The serial number ofthe hard drive was
^MHOHWI^N. The resulting forensic image ofthe hard drivelobtained from this computer,
withtheSHAl hashvalueofc3^73c3dfldI31e0022f^c^6bfc^6087e9d^l^0f,wasverifiedtobe
an exact, bit-for-bit copy ofthe hard drive throughacomparison ofthe acquisition and
verification hash values. Thereafter,Iconductedapreliminary forensic examination ofthis
image. Idetermined that PFC Manning hadauser account on this laptop computer. Ireviewed
DN 073-lOin preparation for this case. This item^sforensic image is located on Item2ofDN
073 10. Iknow this becauselcollected Item2as evidence.
h. IprocessedaDell brand laptop computer,with the serial number 93H^(^D1,which
was collected from the Sensitive Compartmented InformationFacilify (SCIF) ofthe 2nd Brigade
CombatTeam,10th Mountain Division, FOB Hammer, Iraq. This NIPRNET laptop had been
located near the work area ofPFC Manning. Ireceived this evidence from SA Smith. Ifollowed
proper evidence handling procedures to receive and handle this evidence, and made sure the
evidence matched its noted description before beginning work. Upon taking possession,!
unsealed the Dell laptop computer, removed an unknown brand hard drive from the laptop, and
obtained an EnCase forensic image ofthe hard drive. The serial number ofthe hard drive was
^MH0TB78. The resulting forensic image ofthe hard drivelobtained from this computer, with
the SHAI hash Valueofe2b49bd3ed0e2f^d798ab4^febaac3bl^d0070be,wasverifiedto bean
exact, bitforbit copy ofthe hard drive throughacomparison ofthe acquisition and verification
hash values. Ididnot examine this image fiirther. IreviewedDN 073 lOin preparation for this
case. This item^sforensic image is located on I t eml of DN 073 10. Iknow this becausel
collected Itemlas evidence.
8. As!statedearlier,Iused the EnCase forensic software to obtain the images of each item of
evidencelprocessed. In this case,Iattached each device(except the CDRW) toawrite
blocker, and then aftached the writeblocker to my laptop computer,which had the EnCase
forensic software loaded. Av^ite-blockerisadevice that allows you to acquire information on
an item ofdigital media without accidentally damaging or altering the contents ofthe original
item of digital media. In short, the write-blocker ensures that noneofthe original data on the
item ofevidence is manipulated in any way. Ididnot use the writeblocker when processing the
CRRW,as that device was not at risk of alteration. Computers do not alter data on CDRWs
without specific instructions to do so. Aslneither intended nor actually issued such instructions,
there was no need to useawrite-blocker with regards to the CD-RW. After securing the v^ite
blocker as appropriate,!then used EnCase to createaforensic image of each item. Aslstated
earlier,EnCase creates an acquisition hash value that is later compared to the verification hash
value once the image has been created. Isaved the forensic images of each devicelprocessed
onto sterile hard drives. Ilater transferred these forensic images to the hard drives recorded as
ItemsIand2onDN073 10. The forensic image is not altered by being transferred between
storage devices. When you open the forensic image in EnCase, EnCase itselfverifies that the
forensic image isatrue copy.
9. I t eml of DN 073 10, serial number 9VS2^G^M,isaSeagate brand hard disk drive
containing the individual forensic images ofthe devices listed above that were initially
determinedtobe^^UNCLASSIFIEDBItem2ofDN073 10,serialnumber^VGI826C,isa
Seagate brand hard disk drive containing the individual forensic images ofthe devices listed
above that were initially determined to be classified ^^SECRET.^^ On^June2010,IcoIIected
Itemsland2as evidence becauselhad previously transferred the forensic images ofthe various
deviceslprocessed to these two hard disk drives. Icollected this evidence at the CID office on
Camp Liberty. Idid this to consolidate the evidencelprocessed for ease ofreview by
subsequent forensic examiners. This process is consistent with best computer forensic practices.
In the forensic community,it is common for investigators to consolidate the forensic images of
multiple devices on one hard drive and then collect the resulting hard drive as evidence. Aft erl
collected Itemsland2asevidence,Itransferred custody ofthis evidence to SA Jeremy Drews.
10. During the above forensic examinations,Irecorded my notes, including descriptions ofthe
evidence and their associated hash values on an AIR, dated^June 2010, and marked for this
courtmartial with bates numbers: 0002167^ 00021683. This AIR accompanied the evidencel
transferred to SA Drews.
11. Prosecution Exhi bi t l l for Identification is the Seagate brand hard disk drive with serial
number9VS2^G^M ( I t eml of DN 073 10). ProsecutionExhibit 12 for Identificationis the
Seagate brandhard disk drive with serialnumber^VG1826C(Item2ofDN 073 10).
J E A N M O R R O W
: PT, J A
Assistant Trial Counsel
.^U,<n/i^<^ ^ . ' ^^L' ^- ,
THOMAS F. HURLEY
MAJ, JA
Defense Counsel
ING
PFC, USA
Accused
You can currently contact our investigations editor directly in Iceland -1-354 862
3481 ; 24 hour service; ask for "Julian Assange".
i)"^
ManningB_00125284 PROSECUTION EXHIBIT 24 for W6ntificat:on
PAGE OFFERED: TAGE ADfVfiTTED:
PAGE OF PAGES
D Q
C>
UJ
CO
(L
2,
^
C
^
o
0)
CO
> >
03
D
u
z
3 Q
PROSECUTION EXHIBIT 25"for KWntid%%on
PAGE OFFERED: PAGE ADMrFTED:
PAGE OF PAGES
b
m
S
S
13
CO
g w
ro .o
E m
o o
\^s>
m
C c
o o o
i l l
.si
o g
0) o
2
Q_ U
o
UJ
CO
d
o
m
Q)
Q
o
LU
CO . .
o l
* i
a B
C 0
(/)
o o
2 g
si
0)
C
1.^
^ igf
C/) M_ CD
qj o (/)
i i ^1
4 O ^
B E .2
= CD 03 CD
IS DL LL Z
I I I I
3 O
tf)
Q)
g
O .2
3 ro
O E
_c
6 2
g I s l
^ O (/) CU ^
I, l i i j i
o I- _j z y 2 u
. I l l I . 9 I I
^
^
^
^
^
^
^ E
(^ CD
CB^ Z
t/^ cu
CD ^
^ CB^
^ ^ ^
I I I I
3 ^
^
^ t/^ ^
^ ^ ^ ^ ^ ^
^ ^ 0 ^ ^ ^ ^
^ ^ ^ ^ ^ ^ ^
^ 1 ^ ^
u
z
3 Q
tf)
2
(TJ
S2
2
%3
<
O
z
3 O
xmi
. i i l l i l
cr LJJ CI O CL h-
. . o . . .
B ^
(/) 0
I o
o ro
< X
^
(TJ
^
^
^
UJ
^
^
E ^ ^ ^
CO
0 ^ ^ 0 0 0
^ ^ ^ ^ ^ ^ 5 c n
03 0 ^ 3 ^ 03 0
^ ^ ^ ^ ^ ^ ^ ^ ^ ^
^ 0 Z C ^ ^ ^ ^ ^ ^
1 I I ^ I I I I
C^
C^
^
c^
z
3 ^
^s
^ CD
0 ^
m
^ ^ ^ u ^
^ ^ ^ ^
^ ^ ^ ^
0 ^
C ^ ^ 0
c^ ^ ^
^ ^ ^ ^
g i
(/) c
0 0
#o
C "D
i i
I I
(f>
^
-1
O
z
3 O
V
(/>
(0
5
o
z
3 O
3 O
UNITED STATES OF AMERICA
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
SA Antonio Edwards
DATED: 3 June 2013
It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that i f Special Agent (SA)
Antonio Edwards were present to testify during the merits and pre-sentencing phases of this court-martial,
he would testify substantially as follows.
1. Since March of 2012,1 have been employed as a Special Agent ("SA") of Homeland Security
Investigations ("HSI"), Department of Homeland Security ("DHS") in the Atlanta Field Office, empowered
by law to investigate and to make arrests for offenses involving the unlawful export of goods and
technology to destinations outside the United States. Prior to working for HSI, fi-om March 2008 to March
2012,1 was employed as an SA with the United States Army Criminal Investigation Command
("USACIDC"), Computer Crime Investigative Unit ("CCIU") at Fort Belvoir, Virginia. In this capacity, I
was responsible for the investigation of violations pertaining to computer intrusions and to other types of
malicious computer activity directed against the U.S. Army (18 U.S.C. 1030). As a USACIDC SA, 1 was
also authorized to investigate crimes involving all violations of the Uniform Code of Military Justice and
other applicable federal and state laws where there is a U.S. Army or Department of Defense (DoD)
interest. I have participated in and conducted investigations of violations of United States laws and
regulations pertaining to computer intrusions and I have participated in the execution of search warrants on
individuals and companies.
2. Before working for USACIDC, from November 2007 to November 2008,1 was employed as an SA
with the Bureau of Industry and Security (BIS), Office of Export Enforcement. And, from May 2003 to
October 2006,1 was a Deputy Prosecutor for Morgan County, Indiana. From August 2000 to August 2005,
1 served in the Monroe County, Indiana Reserve Deputy Sheriffs Department as a Deputy Sheriff, where I
received training in evidence collection. Further, I am a graduate of the Federal Law Enforcement Training
Center's Criminal Investigator Training Program, where 1 also received training in evidence collection. In
addition to being employed as a Special Agent, I currently serve in the Inactive Ready Reserves (IRR) as a
Judge Advocate in the United States Army National Guard, District of Columbia.
3. In 2003,1 received a Juris Doctorate from Indiana University and was subsequently admitted to the
Indiana bar. 1 have a Bachelor of Arts in Psychology from the University of North Florida, and a Doctorate
of Jurisprudence from Indiana University - Bloomington School of Law. I am currently licensed to
practice law in Indiana.
4. My experience as a State Law Enforcement Officer, a State Prosecutor, and a Special Agent has
included the investigation of cases involving violent and non-violent crimes as well as the use of
computers. I have also received training and gained experience in: interviewing and interrogation
techniques, arrest procedure, crime scene examination, evidence collection, search warrant applications, the
execution of searches and seizures, and other criminal laws and procedures. Further, I have completed the
Department of Defense Cyber Investigations Training Academy courses: "Introduction to Computer
Hardware", "Computer Incident Responders Course", and "Windows Forensic Examinations - EnCase".
x ^ ) ^
PROSECUTION EXHIBIT 16 for lO^Ucauon
PAGE OFFERED: PAGE ADMITTED:
^ PAGE OF PAGES
^
Together, this afforded me certification asaDepartmentofDefense "Certified Digital Media Collector"
and "Certified DigitalForensic Examiner".
5. Ifollow several general procedures when handling evidence. Ireview the custody document and
always ensure the description ofthe evidence matches the evidence attached. Icheck, for example, that
recorded serial numbers, markings for identification, and condition description match the associated
evidence, lensure that the proper information, such as date and time, are properly and accurately recorded.
Lastly,lmaintain secure custody of the evidence prior to transferring it to another individual.
6. In this particular investigation,lassisted with witness interviews and the handling of evidence. In so
doing,lworked with SA Charles Clapper and Mr. GaronYoung. On 12June2010,lreceived several
pieces of electronic evidence related to this investigation from the hands ofMr.AdrianLamo and with his
consent. On 12June 2010, Mr. Adrian Lamo also gave signed consent to law enforcement personnel on
two separate CID Forms 87REt o search his electronic devices for "^alll information in any form,
pertaining to communications which may be in the form: ofemails, instant messaging chats, documents,
data, computer code, log files, drawings, photographs, or any other data; in encrypted, plain text, or any
other format; relating to PFC Bradley E. MANNING and^or the disclosure of classified information or
information which is the property of theU.S.Govemment." The first piece ofevidence collected and
further handled wasaLenovo Laptop computer withaFuiitsu computer hard drive(serial number:
K404T812MF4D)recorded as ltemlonaDAForm4137 marked as document number (DN) 7610, and
known as "Lamo Ubuntu Hard Drive". It was collected from Mr.Adrian Lamo in Sacramento, California
onl2June2010. The second piece ofevidence collected and hirther handled was an HP Mini Brand
computer(computer serial number: CNU90513VT)withaSeagate computer hard drive (hard drive serial
number: 5RE2C1(^K) recorded as ltemlonaDAForm4137 marked as document number (DN) 77-10,
and known as "Lamo HP Hard Drive". It was collected from Mr.Adrian Lamo in Carmichael,Califomia
on 12 June 2010
7. Using the DAForm4137,Iproperly released these pieces of evidence to SA Clapper. Onl4June2010,
Iproperly regained possession from SA Clapper before properly releasing them to the Evidence Custodian,
Mr. GaronYoung, on 15 June 2010, which is documented onaDAForm4137. While in possession of
these items,lmaintained control over them, stored them properly,and allowed no one else access to them.
Idid not alter the evidence in any way. lhave no reason to believe this evidence was damaged or
contaminated in any way. After releasing the evidence to Mr.Young,lhad no fiirther interaction with the
evidence.
8. I^rosecution Exhibit 13 for Identification is the Lamo Ubuntu Hard Drive ( I t eml of DN 76-10).
Prosecution Exhibitl4for Identification is the Lamo HP Hard Drive ( I t eml of DN 77-10).
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
ASHDENFEIN THOMASF.HURLEY ^ B R A D ^ ^ E M A N N ^
MAJ,JA MAJ,JA PFC, USA
Trial Counsel Defense Counsel Accused
UNITED STATESOF AMERICA
Manning, Bradley E.
PFC,U.S.Arn^y,
HHC, U.S. Arn^y Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22^11
STIPULATION OF
EXPECTEDTESTIMONY
SACi^^^IesCIa^^er
DATED: ^June 2(^13
It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel,that ifSpecial
Agent(SA)Charles Clapper were present to testify during the merits and presentencing phases of
this court-martial, he would testify substantially as follows.
1. lamaSpecial Agent (SA)fortheU.S.Army Criminal Investigation Division(CID).
Specifically,Iwork forthe CID, Computer Crimes Investigation Unit(CCIU). My current job
title is Special Agent in Charge (SAC) ofthe Arizona Branch Office located atFort Huachuca,
Arizona. As the SAC,Irunatwoman office that handles exclusively computer crimes. My job
also entails serving as CID'sliaison officer for NETCOM. Additionally,Iam the liaison officer
to the Regional Computer Emergency ResponseTeam(RCERT CONUS) and to theTheater
Network Operations and Security Center (TNOSC). lhave served in Arizona as an SA for five
years andlhave been the SACforthreeofthe five years.
2. Froml986 1999,Iwas an enlisted Military Police oflicer (MP). Iserved as an Evidence
Custodian forthe Investigation Section at Fort Lewis,Washington from 1993-1994. After
becomingaCID agent in 1999,from 1999-2002,Iserved as the Computer Crimes Coordinator for
the ^th MP Baftalion in !^aiserslaughtem, Germany. Iwas also the Evidence Custodian for the
!^aiserslaughtem CID Office from 2001 2002. Iserved as the Detachment Sergeant and as an
Evidence Custodian from 200^-2006 at CCIU on Fort Belvoir,Virginia. In2007,Iwasan
INSCOM contractor performing forensics for the Army'sComputer Emergency ResponseTeam
(Army CERT) in the Forensics and Malware Analysis department. Ibecameacivilian Special
Agent in Arizona in 2008, and currently serve in this capacify.
3. IreceivedaB^chelorofScience degree in Liberal Arts from Regents College located in New
York. lhave had extensive training in evidence collection and handling.This includes having
attended thel7week Apprentice Special Agents Course. lhave also aftended the Advanced
Crime Scene Investigation class atFort LeonardWood and the SALTSpecial Agent Course at the
Army Crime Lab located atFort Gillem, Georgia. In terms of computer and forensic fraining,!
have taken numerous courses at the Defense Cyber InvestigativeTraining Academy in Linthicum,
Maryland. Itook these courses between the years 2000 and 2008. They coveredafull range of
computer forensics and digital media collection issues. Between 2003 and 2006,Iattended two
courses at Guidance Software in Reston,Virginia. This company manufactures the forensic
imaging software EnCase. In 2012,Iattended the Federal Law Enforcement Training Center
Computer Network Intrusion Training program in Glynco, Georgia. These courses all discussed
the collection and handling of digital evidence.
^. IhaveaDepartmentofDefense Cyber Crime Investigation Certificate from the Department of
Defense Cyber Crime Center,which is the highest certification that one can receive in the field.
PROSECUTION EXI ^^^i T^^l ^r i d^nt ^c^^^
^ PAGEOFFEREO^ ^PAGEAO^^T^^^^^
PAG^ OP PAGE^
The certification must be renewed every two years. Ireceived my first certification in 2006 and
last renewed it in October of2012. In addition to my training and certifications,Ihave worked
more thanlOO cases in my current duty position and somewhere betweenlOO-200 cases in my
previous capacities.
^. Ifollow several general procedures when handling evidence. Ireview the custody document
and always ensure the description ofthe evidence matches the evidence aftached. Icheck, for
example, that recorded serial numbers, markings for identification, and condition description
match the associated evidence. lensure that the appropriate information, such as date and time,
are properly and accurately recorded. Lastly,Imaintain secure custody ofthe evidence prior to
transferring it to another individual.
6. In this particular investigation,Iworked with SAAntonio Edwards and assisted with witness
interviews and the handling ofevidence. On 12 June 2010,Ireceived evidence related to this
investigation from SA Edwards. lalso received two Consent to Search forms(CID Forms 87R-
E), signed by Mr.Adrian Lamo on 12 June 2010,which gave signed consent to law enforcement
personnel to search his electronic devices for "l^ajll information in any form, pertaining to
communications which may be in the form: ofemails, instant messaging chats, documents, data,
computer code, log files, drawings, photographs, or any other data-in encrypted, plain text, or any
other format-relating to PFC Bradley E.MANNING and^or the disclosureof classified
information or information which is the property oftheU.S.Govemment." The first piece of
evidence collected and further handled wasaLenovo Laptop computer withaFti^itsu computer
hard drive(serial number: ^^0^T812MF4D)recordedasItemlonaDAForm4137,markedas
document number (DN) 76-10, and known as "Lamo Ubuntu Hard Drive". It was collected from
Mr.Adrian Lamo in Sacramento, California on 12 June 2010. The second piece ofevidence
collected and further handled was an HP Mini Brand computer(computer serial number:
CNU90^13VT)withaSeagate computer hard drive(serial number: ^RE2C1(^!^) recorded as
ItemlonaDAForm4I37,marked as document number (DN) 7710, and known as ^Tamo HP
Hard Drive". It was collected from Mr. Adrian Lamo in Carmichael, California on 12 June 2010.
7. limaged both pieces of evidence using standard forensic imaging sofl^are,which does not
alterthe original evidence in any way. Aforensic image isabit-for-bit or exact copy ofthe
original information on the hard drive. Using theDAForm4137,Iproperly released the original
evidence back to SA Edwards on l^June 2010. While in possession of these items,Imaintained
control over them. Iretumed the items in the same condition thatlreceived them and have no
reason to believe that the evidence was damaged or contaminated in any way. After releasing the
evidence to SAEdwards,Ihad no fiirther interaction with the evidence.
^ .^^^^^^^^^^^^^^^^^^.^.^^.^
ANGELM^VERGAARO THOMASFHURLEY BRADL^YEMANNlNG
CPT,JA MAJ,JA PFC, USA
Assistant Trial Counsel Defense Counsel Accused
UNITEDSTATESOF AMERICA
Manning, Bradley E.
PFC,U.S.Arniiy,
HHC, U.S. Arn^y Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
Mr.GaronYoung
DATED: ^June2013
It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that i fMr.
GaronYoung were present to testify during the merits and pre-sentencing phases ofthis court-
martial, he would testify substantially as follows:
1. lam currently the Criminal Intelligence Program Manager for theU.S.Army Computer
Crime Investigative Unit(CCIU) ofthe Criminal Investigative Division(CID). lhave been with
CCIU for lOyears. This position primarily entails reviewing cases for intelligence data and
entering them into our database. Additionally,Ireview reports, serve as the security manager,
and act as alternate evidence custodian. lhave held this position for lOyears.
2. lhave an Associate'sdegree from CentralTexas College and began my law enforcement
career in 1980 asaMilitary Policeman. In 1987IbecameaMilitary Police Investigator. From
1989 tol992,Iwas the Chief oflnvestigationsinWuerzburg, Germany. During this time(1989
^1991),Iwas also the evidence custodian. Ijoined CID in 1993 and from 1994 tol995 was the
alternate evidence custodian while stationed in !^orea. From 1995 to 1998,Iwas the detachment
sergeant atFort LeonardWood. In this capacity,Iwas the senior enlisted advisor and primary
evidence custodian. From 1998 untillretired in 2000,Iworked at CID Headquarters on Fort
Belvoir. After3yearsofworking for the Florida Department ofRevenue, in 2003,Iretumed to
criminal investigations by joining CCIU. lhave worked in my current position since then^
serving from 2003 to 2006 as the altemate and occasionally primary evidence custodian at
various times. Throughout my years in law enforcement,Ihave worked more than 800 cases.
3. In 1996,Itook the Medical Legal Death InvestigationsTraining by the Armed Forces
Institute ofPathoIogy held at Fort Lewis. In 2005,laftended the Evidence Management Course
at the United States Army Crime Lab inFortGiIIem,GA. And in 2007,Iretumed to Fort Gillem
for the Army Crime Lab'sSpecial Agent LaboratoryTraining. These courses do cover physical
and digital evidence collection and handling.
4. Ifollow several general procedures when handling evidence as evidence custodian. The first
timelreceiveapiece of evidencelcheck the accompanyingDAForm4137 evidence custody
document to make sure the evidence matches the description and that the marked-for-
identification number on the evidence matches what is recorded on the form. lalso check to
make sure the form has been appropriately filled out. Whenlsign the evidence into the evidence
room,Isign in the ^^received" column. Ithen log it in the evidence book and the database before
placing it in the evidence room. When someone asks to receiveastored piece of evidence,lpull
the voucher number and locate the evidence in its appropriate location. Icheck to make sure the
evidencelam handing over matches the description on the form and thenlrelease it to the ^
PROSECUTIONEXHIBIT^^forid^ification
PAGEOFFERED: ^PAGEADMi^ED:
PAGE OF PAGES
Special Agent or Forensic Examiner who has requested it. Isign thatlhave released it and the
individual receiving it signs that(s)he has received it. Each timelrelinquish or assume custody
of evidence,Icheck the description to make sure the evidence being transferred matches the
forms used to transfer it.
5. In my capacity as evidence custodianlhave worked with SA^irk Ellis, SAAntonio
Edwards, and Ms.TamaraMairena. When Ms.Mairena came on board as the primary evidence
custodian,Itrainedher. She works as the primary andlas the altemate evidence custodian. It is
normal for her to sign evidence out ofthe evidence room and for me to sign it back in(or vice
versa).
6. lam involved in the present case because ofmyrole in assisting the investigation team with
the secure storage ofthe evidence they collect. lhave received evidence from both SA Edwards
andSAEllis
7. On 15 June 2010,Ireceived evidence related to this investigation from SA Edwards. Itook
custody ofaLenovo Laptop computerwithaFti^itsu computer hard drive(serial number:
1^404T812MF4D), collectedfromMr.AdrianLamo while in Sacramento, CA on 12June 2010,
recorded as Item1onaDAForm4137 marked as document number (DN) 7610, and knov^ as:
"Lamo Ubuntu Harddrive". lalso took custody of an HP Mini Brand computer(computer serial
number: CNU90513VT)withaSeagate computer hard drive (hard drive serial number:
5RE2C1(^!^), collected from Mr. Adrian Lamo in Carmichael, CA on 12 June 2010, recorded as
ItemlonaDAForm4137 marked as DN 77-10, and known as "Lamo HP Harddrive". Upon
taking possession ofthis evidencellogged it in to the evidence room using the proper
proceduresljust described. Inever logged it back out.
8. On 15 June 2010,Ialso received evidence related to this investigation from SA Ellis. Itook
custody ofaDVD(Marked"0028 I0cid22II0117DeptofStateServerLogs, 199 56 188.73"),
seized from the Department ofState on 15 June 2010, recorded as ItemlonaDAForm4137
marked as DN 78 10, and knov^ as ^^DoS Server Logs". Upon taking possession ofthis
evidence,Ilogged it into the evidence room using the properproceduresldescribed earlier. I
never logged it back out.
^ ^ ^ ^ ^ ^ ^ ^ ^ ^^^^^^^^
ASHDENFEIN THOMASFHURLEY BRA
MAJ,JA MAJ,JA PFC, USA
Trial Counsel Defense Counsel Accused
UNITED STATESOF AMERICA
Manning, Bradley E.
PFC,U.S.Arn^y,
HHC, U.S. Arn^y Garrison,
JointBaseMyerHendersonHall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
Ms. Tan^ara Mairena
DATED: ^ June2013
It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that i fMs.
Tamara Mairena were present to testify during the merits and pre-sentencing phases ofthis court
martial, he would testify substantially as follows:
1. lam the primary evidence custodian at the Computer Crimes Investigative Unit(CCIU) of the
U.S.Army Criminal Investigation Command(CID)in^uantico,Virginia. lhave held this
position since 2006. In this position,Itrack and catalog evidence maintained by our CCIU
office.
2. lhave beenaCertified Evidence Custodian since January of2006. Ireceived this
certification from theU.S.Army Criminal Investigation Laboratory. Since January 2010,Ihav^e
also beenaDepartmentofDefense(DOD)CyberInvestigationsTrainingAcademy certified
digital media collector.
3. Ifollow several general procedures when handling evidence as evidence custodian. The first
timelreceiveapiece of evidence,Icheck the accompanyingDAForm4137 evidence custody
document to make sure the evidence matches the description and that the marked-for-
identification number on the evidence matches what is recorded on the form. lalso check to
make sure the form has been appropriately filled out. Whenlsign the evidence into the evidence
room,Isign in the "received" column. Ithen log it in the evidence book and the database before
placing it in the evidence room. When someone asks to receiveastored piece of evidence,Ipull
the voucher number and locate the evidence in its appropriate location. Icheck to make sure the
evidencelam handing over matches the description on the form and thenlrelease it to the
Special Agent or Forensic Examiner who has requested it. Isign thatlhave released it and the
individual receiving it signs that(s)he has received it. Each timelrelinquish or assume custody
of evidence,Icheck the description to make sure the evidence being transferred matches the
forms used to transfer it.
4. Ifirst became involved in the present case because ofmyrole in assisting the investigation
team with the secure storage ofevidence they collect. Isigned several pieces of evidence from
the investigating agents and forensic examiners into the evidence room and would release
evidence back to them when they needed it fortheir investigation or examinations. In my role as
evidence custodian,Ihave worked with and received evidence from Special Agent ^i rk Ellis,
Special Agent Antonio Edwards, Special Agent David Shaver, Special Agent Calder Robertson,
Special Agent JohnWilbur, and Special Agent Mark Mander. lalso know Mr. GaronYoung.
He used to be the primary evidence custodian and trained me whenlbegan working for Army
PROSECUTION EXHIBIT 2.1 for idegRfication
PAGE OFFERED: PAGE ADMITTED:
PAGE OF PAGES
CCIU. Mr.Young currently serves as the altemate evidence custodian. As such, it is normal for
him to sign something out ofthe evidence room and for me to sign it back in(or vice versa).
5. OnI8June2010,IsignedaLenovo laptop computer with Fujitsu computer hard drive(serial
number: ^404T812MF4D), collected from Mr.Adrian Lamo in Sacramento, Califomia on 12
June 2010, recorded as ItemlonaDAForm4137 marked as document number (DN) 7610,
and knov^ as "Lamo Ubuntu Harddrive" out ofthe evidence room to SA Dave Shaver for
forensic examination. lalso signed out an HP Mini Brand computer(computer serial number:
CNU905I3VT)withSeagateharddrive(serialnumber:5RE2CI(^I^),collectedfromMr
Adrian Lamo in Carmichael, California on 12 June 2010, recorded as ItemlonaDAForm
4137,marked as DN 77-10, and known as "Lamo HP Harddrive" to SA Shaver forthe same
reason. He retumed these items later that same day. Ireceived and released this evidence
according to the proper proceduresljust described. Idid not alter this evidence in any way.
6. On18October2010,Ireceived evidence related to this investigation from SAWilbur,
recorded as ItemlonaDAForm4137 marked as DN 151-10. Itook custody ofaCD(marked
"WikileaksDoS Firewall Logsl30ctlO") collected from the Department ofState on 15
October 2010, and known as "DoS Firewall Logs". Upon receiving this evidence,Iproperly
logged it into the evidence room using the same procedures described earlier. OnlNovember
2010,Iproperly released it to SA Shaver for examination. He retumed it later that same day. I
received and released this evidence according to the properproceduresldescribed earlier. Idid
not alter this evidence in any way.
7. On3November2010,Ireceived nineteen pieces of evidence from SA Mander, collected
from the home ofMs.DebraVanAlystne in Potomac, Maryland on2November 2010, recorded
asltemsl 19onaDAForm4137 marked as DN 162 10. Item2onthisDAForm4137wasan
SDmemory card(seriaInumber:BE0915514353G), known as "SDCard"On10December
2010,Iproper1y released the "SD Card" to SA Shaver for examination. He retumed it laterthat
same day. Iproperly received the evidence back in to the evidence room according to the proper
proceduresldescribed earlier. Idid not alter this evidence in any way.
ANGEL M./UVERGAARD THOMAS F. HURLEY BRADlMY E. MAI
CPT, JA MAJ, JA PFC, USA
Assistant Trial Counsel Defense Counsel Accused
Prosecution Exhibit 30
50 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
IN
O
Vl
2
_w
DO
0051:
8
7869
js !
ii
!! (
^a;:
M
n,
hi
J i r
^1!
m
a
mi
III!
i -
1 ?i
f a
/ ^ ^
for idcimfication PROSECUTION EXHIBIT J i
PAGE OFFERED: PAGE ADMITTED:
PAGE OF PAGES
CJ
s:
CL
CO
LO
i
Offs 37870
^
^
^
f ^
^
^
^
L^
;:::;i
^
^
^
^
iB:i
^
1 ^
^
^
^
^
8
^
^
^
^
^
^
^
^
^
..^^^^i^^i^i^^
^^^^^^ni ^m^
^^^^^
^
^ ^ ^ ^ I ^ B
ManningB_00504479
fPO-^'^'"'''
Pr : C:\
PAGE
D -C3 -0
> > S
D O O
m tn
On
;
B
S | |
3 2 -
11!
ill
e i!
I*
#i!
M
4J
00527871
Si-"
ill
is'i 8
Nf ;
i *e
S R S
3 I
I a I
i E i
:%
ill
i i i
^JS
! *
lit
i l l
: I S
<S I
f 2;
m$ I
s j
Ill
I I
i* %
I
E
8
IS
g R ;
l
.
I i
!i
#i3
* i
ggU
; *!
PROSECUTION EXHIBIT 31-for id^
PAGE OFFERED: PAGE ADMI5
PAGE OF PAGES
^i :
#1
:
iii;
J.t
ED:
CL
^
o
bO
ro
S
iS"
LO
r \ j
LO
) Ti -
r o
VCN
CO
^
^
^ ^ ^ ^ ^ ^ ^ ^ i ^ ^ ^ ^ ^ ^ - ^ i n ^ ^ ^ ^ ^ ^ ^
m
w
I D
LD
M
00
O
m
Ul
M
3
4_
ro
+-'
LO
Jad!
ro
(U
%
3
o
U
(U
CI
4_(
MannlngB_00504480
w * '
'mm
' 4%
'HitM^i
! L* Ai ' ' '
PRO'^^'"~'"
PAGEGry-;iHG-
PAGE OF
Tr^l B: -!^
O ^
Draft:The Most Wanted Leaks of 2009-sort - WikiLeaks Page 1 of 12
DraftiThe Most Wanted Leaks of 2009-sort
Fr om Wi ki Leaks
Jump to: navigation, search
Somewhat sorted entries of the most-wanted list. Work in progress, TODO: Add brief, entity and date for each entry.
Contents
[hide]
1 Austria
2 Australia
3 Bahrain
4 Belgium
5 China
6 Colombia
7 Finland
8 France
9 Germany
10 Greece
11 Guatemala
12 Italy
13 Kenya
14 Libya
15 Madagascar
16 Mali
17 Mexico
18 Niger
19 Norway
20 Poland
21 Puerto Rico
22 Rwanda
23 Russia
24 Slovenia
25 Sudan
26 Syria
27 Switzerland
28 Swaziland
29 Trinidad and Tobago
30 Uganda
31 United Kingdom
32 United Nations
33 United States
34 Vatican
35 International organizations
Austria
1.1
F Q
it
t<=
4
tz
5
S
X
u
z
O
F
D
u
UJ
O
a:
CL
CO
Ul
I
Q
OJ
tt.
ta O
X
t u
O
LU U]
Austrian e-Voting system used in students elections.
" Date: 18 May 2009
" Brief: We seek for details about Austrian voting system used in students elections, which includes but is not limited to source code and
certifications.
" Entity: Scytl (programming)
" Entity: Austrian Federal Computation Center (hosting)
Entity: Ministry of Science (initiator)
" Entity: Robert Krimmer (consulting)
E-Mail traffic between Josef Proll and Christian Konrad.
> Date: ???
Brief: E-Mail traffic between minister of finance Josef Proll and Christian Konrad, who is advocate general of Raiffeisen bank.
00527888
http://wikileaks.Org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01, 2013 15:39:36 PM
1
DraWhe MOS. wanted Leaks of 20^. Wi k, Leaks - Page2on2
" Entity: Josef Proll (josefproell(g^Blgv.at)
" Entity: Christian Konrad
E-Mail traffic of Anton Mahdalik with Michael Haupl and/or Michael Ludwig
- Date:???
" Brief: E-Mail traffic of FPO delegate Anton Mahdalik with Viennese mayor Michael Haupl and/or deputy mayor Michael Ludwig
containing threats when renting municipal ground to the Viennese traitor park ("Wagenplatz Wien").
' Entity: Anton Mahdalik (toni.mahdalik@^oe.at)
" Entity: Michael Haupl ([email protected])
Australia
ACMA URL blacklist
" Date: 19 March 2009 and later
" Brief: Versions of the ACMA URL blacklist newer than 19 March 2009. WikiLeaks previously released three versions of the list, two of
which included WikiLeaks or its subpages.
" Entity: Australian Communications and Media Authority
Censorship technology in Australia
' Date: 2009
Entity: Australian Communications and Media Authority
" Entity: Enex Testlabs
" Entity: Watchdog NZ
" Entity: [www.iwf.org.uk Internet Watch Foundation]
" Entity: Exetel ISP
" Brief: Full details of filtering hardware/software vendors participating in government-sponsored ISP-level censorship technology trials,
including (but not limited to):
Any and all communications between filter vendors and govemment departments prior to, during, and after the trials
Any and all transactions, contracts, and other financial arrangements involving filter vendors
Details:
URL blacklist(s) used during above trials. Alleged (by govemment) to be ACMA URL blacklist.
Full statistical breakdown of results of above trials (in the event that Enex Testlabs do not make them publicly available).
URL blacklist as used by Watchdog NZ during private censorship technology trial by ISP Exetel in May 2009. Alleged (by
Watchdog) to have been IWF list (see United Kingdom).
Full statistical breakdown of results of Watchdog/Exetel's censorship technology trial - Exetel's official response seems lacking.
Annual NSW Police test
" Brief: Written exam NSW police officers must take annually before they can be issued with Tasers.
" Entity: NSW Police
Bahrain
Documents regarding changes to country's demography.
" Brief: Documents disclosing the number of citizenships that have been granted in the last few years, in an effort to change the country's
demography. See Political naturalisation! 11.
Belgium
Document regarding quality audits of Belgian hospitals
Brief: Documents disclosing the fatality rates of specific procedures and illnesses per hospital. Indicating statistically significant
differences in survival chances between hospitals.
China
Golden Shield Project
" Brief: A list of URLs and keywords censored filtered by the Golden Shield Project (Great Firewall of China). WikiLeaks has previously
released related information, for example, watch lists, policies and several thousand URLs for CCTV and Baidu, but not for general http
filtering.
" Entity: Ministry of public security
Genocide Olympics campaign
Date: 28th March 2007
" Brief: Policy options on Darfur formulated in response to the so-called Genocide Olympics campaign led by American actress, Mia
Farrow, and notes of meetings in 2007 between Stephen Spielberg and Chinese Foreign Ministry officials prior to Spielberg's
resignation as Artistic Director of the 2008 Beijing Olympics.
00527889 ^
http://wikileaks.Org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01, 2013 15:39:36 PM
Draft:The Most Wanted Leaks of 2009^sort - WikiLeaks
Colombia
Page 3 of 12
Surveillance of citizens and organisations
Brief: The DAS (Departamento Administrativo de Seguridad) is reported to have surveilled a wide array of public officials, private
citizens, and organizations. Documents wanted: contracts to supply software for internet surveillance to Colombian policy agencies and
details of the software supplied.
o Entity: DAS
Finland
Tiitisen Lista
Brief: The so called Tiitisen Lista, the list of 18 persons claimed to have been in active contact with East German security services
(Stasi). The list was received from the West German intelligence services (BND) in 1990 and since classified by the order of President
Koivisto as adviced by the head of the Finnish Security Police (Suojelupoliisi), Seppo Tiitinen. It is rumoured that several current or
former top Finnish politicians appear on the list.
Entity: Stasi
" Entity: Koivisto
Entity: Suojelupoliisi
France
Nicholas Sarkozy' health report
Brief: The Monthly Health Report of President Nicolas Sarkozy, as promised by himself during the last presidential elections.
Germany
Censorship in Germany
o Details:
The censorship filter list for the proposed national, mandatory censorship system. The list will be compiled by German federal
criminal police BKA and distributed to intemet service providers.
The contents of the contract between the BKA and some ISPs that has already been signed, but is kept secret due to "public
safety" and copyright concerns (see http://blog.fefe.de/?ts=b4fa8af8).
The List of Media Harmful to Young People (the censorship system already in place). The "virtual media" part of this list is
distributed to search engine providers and is illegal to publish. It probably could be reverse engineered using the differences
between google.com and google.de search results. Also, i f you want to know i f a specific medium is on the list, you can send an
enquiry to listefS.bundespruefstelle.de ("Bundesprufstelle" is the agency responsible for keeping the list).
Entity: Bundesprufstelle
Entity: BKA
Politician's Stasi files
The Stasi files of Federal Chancellor Angela Dorothea Merkel (maiden name Kasner) and other leading politicians, which are known to exist,
but withheld from public
Operation Gladio
o Brief: The Stasi files relating to operation Gladio / stay behind organisations in relation to right-wing terrorism in Germany, as per a
parliamentary request by the Green party.
Atlas Der Wut
o Brief: The so called "Atlas der Wut", a document about the risk of riots in different german regions. The list is said to be updated
regulary and was first written in 2005.
The list of NPD party members
Greece
The Athens Affair
Brief: Documents related to the Athens phone tapping affair that have yet to be released (including those from countries other than Greece)
Context
Guatemala
Plan Victoria 82, Plan Sofia and Plan Fermeza 83
Brief: All documents on Plan Victoria 82, Plan Sofia and Plan Firmeza 83.
" Detail:
00527890
http://wikileaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Saturday, June 01, 2013 15:39:36 PM
Draft:The Most Wanted Leaks of 2009-sort - WikiLeaks Page 4 of 12
Within the process of trying to b^^^i l i t ar y personal involved in human rights vi ol ai ^^^nd massacres that happen during the civil
war in Guatemala to justice, the rmUtary have been required to declassify many war documents. In a case, that went all the way to the
Supreme Court of Guatemala, the Court dictated a sentence that confirmed the obligation of the Ministry of Defense of Guatemala to
hand over the official documentation of four specific military operations: Campana Sofia 82, Victoria 82, Firmeza 83 and Operacion
Ixil. The Supreme Court sentence indicated that the archives had to be declassified.
These military operations were carried out in the 80s. According to the CEH, Historical Clarification Commission of Guatemala final
report contained in "Guatemala: Memory of Silence", these military operations resulted in massacres and severe human rights
violations.
The Minister of Defense Abraham Valenzuela only delivered partial information about plans Victoria 82 and Firmeza 83, two of the
four requested plans. He indicated that he had no knowledge of the other two plans before he became Minister of Defense and that he
ignores where the documentation could be. He stated that he could not deliver the complete plans "Victoria 82" y "Firmeza 83" because
certain information was considered state secret and a concern of national security.
"Plan Sofia", a derivative of "Plan Victoria 82", was of special concern to human rights activists; this plan was conceived in July 1982,
four months after General Efrain Rios Montt came into power.
The CEH archives
Brief: Final report of United Nations' Historical Clarification Commission (CEH) into the killing of 200,000 Mayan people and the
involvement ofthe US govemment and American corporations. The report official sources (military interviews, campaign plans, etc) are
kept secret by the UN in NYC.
Detail:
The United Nations' Historical Clarification Commission (CEH) for Guatemala issued a report where the US govemment and several
American corporations were accused of complicity in the genocide of nearly 200,000 Mayan people during Guatemala?s bloody 36-year
civil war. The final 3,600-page CEH report cleariy places the blame for most of the 200,000 deaths on the "racist" policy of the
Guatemalan govemment and holds the country?s military and paramilitary forces responsible for the actual killings, tortures and
disappearances.
However, it accuses the US of directly and indirectly supporting a "fratricidal confrontation" by providing sustained training, arms and
financial aidThe report is based on the testimony of 9,200 people from all sides of the conflict and other documents*, classified and
Secret, protected in the UN headquarters in NYC. The CEH investigated 42,000 human rights violations, 29,000 of which resulted in
deaths or disappearances and therefore, the documents under UN custody are fundamental for the prosecution of those responsible of the
crimes.
Goldcorp affair
" Brief: * Documents on Canadian corporation named Goldcorp with a mining operation in Guatemala, especially information on where
the Gold they extract is processed and who is buying the gold (we think it might be a Swiss company).
Detail: A Canadian corporation named Goldcorp has a mining operation in Guatemala with poor environmental conditions and harming
health of many workers and a community as a whole. Where the Gold they extract is processed? Who is buying the gold (we think it
might be a Swiss company)?
Italy
Italian censorship list
- Brief: The f ul l Italian censorship, of which Wikileaks currently only has a subset.
Kenya
Reports on high level corruption in Kibaki government
" Brief: The international investigative firm Kroll associates produced at least four reports on high level Kenyan corruption after first term
of the Kibaki govemment. A draft version of one of the reports The looting of Kenya, was previously published by WikiLeaks. The
reports were given to selected members of President Kibaki's cabinet at the time and are likely still held by http://www.kroll.com.uk/.
notably lead investigator Andrew Marshall.
" Entity: President Kibaki
" Entity: Kroll
Libya
Arrangements with the Sudanese government
Brief: Documents indicating arrangements with the Sudanese govemment to grant land in Darftir to Arab settlers from Libya (Civilians
and adminisrators on the gruond in Darfur indicate this has been taking place).
Madagascar
Both sides ofthe political conflict in Madagascar are crying fouls about the deals made by their counterparts with foreign entities. The release of the
official documents with respect to confract negotiations about:
00527891
http://wikileaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01,2013 15:39:36 PM
Draft:The Most Wanted Leaks of 2009=sort - WikiLeaks _ Page 5 of 12 ) 0^c
j ^ P Oil exploitation in the region of Bemon^y( South of Madagascar) by Total & others
Detail: Oil and Gas in Madagascar - Industry Overview, infos on Total licensing
an obvious one but the proposed final contract before rejection of the land deal with Daewoo Logistics.
The recent agreement with Saudi investment group on staple products and proposed $2 billion USD investment.
The revised mining exploitation agreement with Sheritt in Ambatovy and Rio Tinto in Fort-Dauphin.
Least but not last, the complete list of current political prisoners and the charges against them.
Mali
Arrangements with the Sudanese government
Brief: Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers from Mali (Civilians
and adminisrators on the gruond in Darfur indicate this has been taking place).
Mexico
Agreements between USA and Peter Herlihy
Brief: Zapotec indigenous people demand transparency from U.S. Scholar and frill disclosure of all the agreements between U.S.
Govemment and their agencies and U.S. geography scholar Peter Herlihy, especially confidential agreements with Foreign Military
Studies Office. Prof Herlihy failed to mention that he received fiinding from the Foreign Military Studies Office of the U.S. Armed
Forces on the research of "Mexico Indigena" project. Mexico Indigena Project forms part of the Bowman Expeditions, a more extensive
geographic research project backed and financed by the FMSO, among other institutions. The FMSO inputs information into a global
database that forms an integral part of the Human Terrain System (HTS), a United States Army counterinsurgency sfrategy designed by
Foreign Military Studies Office and applied within indigenous communities, among others.
" Entity: FMSO
" Entity: Peter Herlihy
Ruta Maya 2002 Isuzu Challenge
Brief Documents to unveil the real purpose of "Ruta Maya 2002 Isuzu Challenge". The convoy was commanded by Ben Nun Avihu,
Israeli militar and Moshe Savir, geography expert and around 50 tourists in 40 Isuzu Jeep. Some communities linked the incursion with
biopiracy. The terrain they explored is controled by the EZLN.
" Entity: Ben Nun Avihu
Entity: Moshe Savir
Entity: EZLN
Corruption around FOBAPROA
" Brief Documents related with the fraud and cormption around FOBAPROA (Fondo Bancario de Proteccion al Ahorro).
- Entity: FOBAPROA 12
Financial operations before crisis
" Documents of financial operations just before the financial crisis of 1994 (some say the govemment knew before that the crisis was
coming and took advantage of the information protecting their interests).
World Bank credit
" Brief Documents related with the World Bank credit and application of the budget to combat swine flu.
' Entity: World Bank
Renault program
Brief Documents related with the technology currently used in cellphones in Mexico to implement the RENAUT program Information
about the security technology used to protect data collected from users.
Plan Merida
" Brief Documents related to the transparency of Plan Merida
Niger
Arrangements with the Sudanese government
" Brief Documents indicating arrangements with the Sudanese government to grant land in Darfiir to Arab settlers from Niger (Civilians
and adminisrators on the gmond in Darfur indicate this has been taking place).
Norway
Court case between Lyse Tele and Simonsen
Brief The secret verdict in the court case between the ISP Lyse Tele and the law firm Simonsen, decided the 5th of May 2009, where
Simonsen demanded Lyse Tele disclose the identity information of a file sharer suspected of uploading a copy of the movie Max Manus
to the file-sharing community.
Entity: Lyse Tele
Entity: Simonsen.
00527892
http://wikileaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01, 2013 15:39:36 PM
Draft:The Most Wanted Leaks of 2009j^sort - WikiLeaks
Poland
Page 6 of 12
IPN Files
o Brief: IPN (Instytut Pami^ci Narodowej) is an organisation created for investigation and gathering of informations regarding crimes
against polish citizens in the timeline of 22 july 1944 to 31 december 1989. Gathered documents are often related to politicans, high-
ranked military, priests et cetera, but for some reason are not available for anyone; they are instead used as political weapon against
one's enemies, revealing working as an agent for SB (Stuzba Bezpieczenstwa) in the above timeline. For two main reasons ALL data
should be available FOR ANYONE. First, it would no longer be used as political weapon; second, all people would know about past of
all public people. Transparency is the key for healthy govemment.
Entity: IPN
0 Entity: SB
Puerto Rico
FBI surveillance of Puerto Rico citizens
Brief The FBI has not yet finished declassifying all the secret files related to surveillance of Puerto Rican individuals and organizations
from the 1930-70's http://www.pr-secretfiles.net/index.htnil (not to mention, large sections of the files are blacked out by the FBI). In
addition, there are thousands of secret files produced by Puerto Rican police that were only briefly made available to individuals
themselves, and have now been closed off to the public. These documents provide evidence of quite a significant spying and
intimidation operation by the United States and local police against leftists and independence movement leaders.
" Entity: FBI
Rwanda
Financial aid for Laurant Nkunda
" Brief Documentation of financial assistance given by the Rwandan government to General Laurant Nkunda for operations in the DRC.
Entity: Laurent Nkunda
Russia
VRVAN crisis documentation
Brief Documents related to the VRYAN crisis, especially political documents, analyses of intelligence, and specific steps taken.
Information on the mindset of the Politburo, as well as intelligence services, and what exactly they feared, and how credible they
believed their fear to be.
Maps for Kremlin and military hideouts
" Brief Maps, floor plans, and blueprints of Mount Yamantaw and Kosvinsky Mountain.
Technology analysis
Brief Technical plans, manuals, and blueprints for the SS-27 Sickle B (Topol-M), along with the Bulava.
" Brief: Documents relating to nuclear warplans of the Soviet Union and Russia.
Brief: Documents relating to orbital weapons systems, and whether the Soviets ever deployed them (or still deploy them) such as orbital
HANE devices.
Brief: A list and description ofthe various agents prepared by the various Soviet and Russian bioweapons programs. Indications of
whether they developed recombinant DNA based agents, and what those are specifically. Weaponization of agents, including re-entry
vehicle mounting. Doctrine for use, including deniable use. Vaccines and treatments for affected personnel.
Slovenia
Taped conversations between Slovenian opposition leader and Croatian PM
" Brief Taped conversations between Slovenian opposition leader Janez Jansa and Croatian prime minister Ivo Sanader, recorded by
Slovenian intelligence service SOVA.
" Date: Summer 2004
" Entity: Janez Jansa
Entity: Ivo Sanader
" Entity: SOVA
Sudan
Salah Gosh and the CIA
Date: 2005
Documents detailing discussions during 2005 meeting between Salah Gosh and the CIA (for which the CIA flew Gosh on private jet
from Khartoum to CIA HQ). See: http://www.sudantribune.com/article.php3?id article^ 10205
Mali case
00527893
http://wikileaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort
1^^^
Sattirday, June 01, 2013 15:39:36 PM
Draft:TheMostWantedLeaksof200^ort WikiLeaks Page7ofl2
^ Brief Documents indicating arra^^ients with the Sudanese govemment to grant lan^^Jarfrir to Arab settlers from Mali(Civilians
and adminisrators on the gruond in Darfur indicate this has been taking place).
^ Libya case
^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers from Libya(Civilians
and adminisrators on the gruond in Darftjr indicate this has been taking place).
^ Niger case
^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers from Niger(Civilians
and adminisrators on the gruond in Darftir indicate this has been taking place).
Syria
^ AssasinationofMehdiBenBarka
^ Brief Al l the documents related to the assasination, in 1965,ofMehdi Ben Barka still held in France, USA, Israel and Morocco. In
1976, thanks to the Freedom ofinformation Act, the US govemement recognized that the CIA had aboutl800 classified documents
about his assassination.Theses documents are still classified.
Switzerland
^ Gomu Report
^Br i ef The frill ComuReportSeehttp://enwikipediaor^/wiki/Projekt26*The^Comu^Report
Swaziland
^ Expense accounts ofKi ng Mswati, the ^ueen Mother and the King's wives.
^ Memos from Ministry ofDefense or Police
^ Brief Intelligence memos from the Ministry ofDefence or Police about the prodemocracy organization, PUDEMO.
^ Entity: Pudemo
^ Entity: Ministry ofDefense
Trinidad andTobago
^Commission ofEnquiry reports
^ Brief The Report on the Commission ofEnquiry into the construction of the new PiarcoAirport.This identified corrupt practices in the
spending of public funds.The Commission's report was delivered in August 2003.Nearly6years later, its findings have not been made
public.
^ Brief Report of the findings ofthe current Ci^^^^,^,^^^^^^^^^^^^^^^^^^^^^^!^^^^^^^^^
^ Entity: Commission Enquiry
^ Entity: Piarco airport
^ Caroni Bridge collapse
^ Brief The Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafew years ago; again the public has not
been made aware ofthe report's findings.
^ Date^^n^August^^^S
^ Waterfront Development Project
^ Brief Acopy of the contract for the billiondollar Waterfront Development Project.
^Entity: ?udecott?
^Scholarshipssponsored by Ministry ofCulture
^ Brief: List of recipients and amounts of scholarships sponsored by Ministry of Culture for study abroad.
^ Entity: Ministry ofCulturc
^ Detail:
As far asTrinidad andTobago goes, our government tends to pay lip service to the principles of transparency and accountability.For
instance, there isaFreedom ofinformation Act which, by law,allows the public to seek information from govemment departments.But
quite ofren,when such attempts are made by the citizenry,the govemment bars full disclosure.Depending on how importantapiece of
information is to Joe Public, he may actually have to tum to the courts to "force" the govemment to reveal facts that should be disclosed
voluntarily.Followingareafew examples of documents that should be made public, but have not been:
^ The Report on the Commission ofEnquiry into the construction ofthe new Piarco Airport This identified corrupt practices in the spending of
public ftjnds The Cormnission's report was delivered in August 2003.Nearly6years later, its findings have not been made public.
^ The Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafew years ago; again the public has not been made
aware ofthe report's findings.
0052789^ ^
http://wikiIcaks.Org/wiki/Draft:Thc Most Wanted_Leaks_of^2009 sort Sattirday,June01,2013 15:39:36PM
Draft:The Most Wanted Leaks of 2009-sort - WikiLeaks Page 8 of 12
The Opposition recently brought up i n^^^ment the issue of taxpayers' money being used attomeys by state. Although the public has
a right to know how much of its funds were used in paying said attomeys, the Attomey General refiised to disclose the sums, saying it would
be an invasion of the lawyers' privacy.
The same goes for a recent request in Parliament, whereby *the Minister of Planning and Development was asked to produce a copy ofthe
contract for the billion-dollar Waterfront Development Project*. The Minister's response was that she could not produce said confract for
public discussion because there was a confidentiality clause contained therein (for a project being built with public funds).
The Ministry of Culture recently awarded scholarships for students to study abroad - when asked in Parliament to disclose the list of recipients
and the dollar value of the scholarships, the response was that this was private information.
Uganda
Ugandan profit-sharing agreements with oil companies in south-western Uganda
Brief: The govemment of Uganda has recently signed a number of profit-sharing agreements with several oil companies that are
conducting explorations in southwestem Uganda. Releasing these documents would be a major step in increased fransparency with
respect to the country's emerging oil industry.
United Kingdom
Censorship in UK
" Brief: List of current and expired D-Notices
Entity: dnotice
" Brief secret gag orders, injunctions and legal threats sent to UK newspapers
Entity: legal contact addresses at the Guardian, Daily Mail, Times, Independent, Evening Standard, etc.
" Brief Censorship list for the United Kingdom's "voluntary" filter system. Known to be held by The Intemet Watch Foundation.
Companies and their subsidiaries which are currently being supplied with the IWF list. Most ISP's in the UK have a copy of the IP's on
the list.
' Entity: The Intemet Watch Foundation
Iraq war planning
Brief The secret cabinet minutes and legal advice pertaining to the allegedly illegal war and ongoing occupation of Iraq.
Roger Mollis surveillance
Brief UK Govemment documentation into the investigation of Roger Hollis, head of MI5 between 1956 and 1965, including the report
by Lord Trend, into the serious but apparently unproven allegations of being a Russian Spy.
Entity: M15
Wythenshawe intelligence centre
Brief Documents detailing the information stored and collected by the Wythenshawe intelligence cenfre. [2]
Police surveillance on climate change protestors
Brief A copy of the police intelligence handed to E ON about climate change protestors. 3]
Entity: E ON
MP expenses
" Brief The full MP expenses data; how much the Telegraph paid for them.
" Entity: Daily Telegraph
Entity: UK Parliament
Allan Cappelow murder
Brief: Documents revealing why the trial of Wang Yam, who was convicted of killing Allan Chappelow, was held in camera, the first
UK murder trial ever heard behind closed doors without access by press or publicMl
Nationalisation of Northern Rock and Bradford & Bringley
" Brief: The proper reasons for nationalisation of Northern Rock and Bradford & Bingley, and the subsequent sale of the latter's savings
buisiness to Santander.
" Brief Records of events during the twelve months leading up to the nationalisation of Bradford & Bingley.
Brief: Information regarding the valuation process to determine compensation for fromer shareholders of Northem Rock and Bradford
& Bingley, that is, the information the independent valuer uses to determine the final value of the comapanies.
Entity: B&B
Entity: Northem Rock
HBOS takeover
" Brief Copies of govemment minutes of meetings between Gordon Brown and/or Alistair Darling and representatives of Lloyds Bank
relating to the proposed takeover of HBOS.
Investigation into Daveport Lyons
Brief Documents from Solicitors Regulation Authority's investigation into Davenport Lyons threatening letters related to filesharing.
00527895
http://wiki1eaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01,2013 15:39:36 PM
Draft:The MostWanted Leaks of2009^ort WikiLeaks Page9ofl2
United Nations
^ Security Council and Darfur
^ Brief Requests to the Security Council in 2003 that the Security Council look at what was happening in Darfur, and any notes of
discussions leading to the decision not to look at the situation.
^Date:2003
^ Entity: UN Security Council
United States
Important bulk databases
^ Intellipedia
^ Brief Classified intelligence community site as ofll/1/2008, including article history.
^ opensource.gov
^ Brief: The complete CIA Open Source Center analytical database.The database is extensive, unclassified, nonpublic,but relatively
accessible to certain outsiders afterjumping through hoops. Despite its name, you need to be govemment official to gain access to i f
^ Entity: opensource.gov
^ Pacer database
^ Brief The completePACERdatabase.ThePACER database contains extensive US federal court records.They are public documents,
currently behindapaywalL See http://arstechnica.com/techpolicy/news/2009/04/caseagainst-pacer.ars
^Entity: PACER
Federal politics
^ The missing five millionWhite House emails possibly no longer in existence.
^ Chenney and Rumsfeld Archives
^ The White House visitor's list
^ Minutes or notes for VP Cheney's Energy Conference.
^ Thel l 41 pages ofACTAbackground documents not released to the EFF by the USTradeRepresentatiye(see[51)
^ Alist of all Whitehouse and senior federal govemment employees holding dual citizenship and the countries they represent.
Military and Intelligence
^TheSIOP
^OPLAN/CONPLAN 8022,2003 revision
^OPLAN/CONPLAN 8044, 2007 revision ^
^ CIA detainee interrogation videos.While the CIA claims to have destroyed 92 of the videos, others are known to remain.
^ The US "Black Budget",from inception to present, with line items, hopefully annotated and explained.
^ Detainee abuse photos withheld by the Obama administration.
^WiretappingprogramledbyNSA
^ Brief Correspondence between the National Security Agency and American telecom companies such asAT^T,Verizon, and Qwest,
regarding the warrantless wiretapping program.Correspondence involving telecoms who cooperated with the NSA(e.g.AT^T) may
give different information than telecoms who refused(e.g. Qwest),but both types would better shed light on the NSA'sprogram.The
existenceofthis correspondence is well documented in the media, for example that Qwest's lawyers refused to cooperate because the
FlSAC:ourt had not signed off on it.
^Entity: NSA
^ Entity: Owest
^Ent i t y: AT^T
^ Entity: Verizon
^ Unredacted copy ofDept of Justice's Office ofInspectorGeneral's"AReview of the FBI'sActions Connection With Allegations Raised By
Confract Linguist Sibel Edmonds" July l,2004^redacted version here http://wwwwbez.org/FILES/sibel.pdf^
^ Camp Delta(Guantanamo)Standard Operating Procedure 2005 2009.
^IraqUSArmyRulesofEngagement2007 2009(SECRET)
^ Unredacted Inquiry into theTreatmentofDetainees in USCustody.20Nov2008.
^ Memorandum between the CIA and the Departtnent ofState detailing any constraints on Darfr^policy caused by actual or anticipated
Sudanese govemment cooperation on counter terrorism, including CIA request to USUN that Salah Gosh be removed from the UN Panel of
Experts list ofthose recommended for sanction. See: http://www.sudantribune.com/article.php3?id article^l0205
^ Department ofState and CIA confributions to the Obama Adminisfration's 2009 Sudan Policy Review,in particular with respect to: a)
Whether to support the ICC arrest warrant against Sudanese President Bashir; b)whether to takeaconfrontational or an appeasement approach
to the Sudanese govemment on the issue ofDarfrir.
^ Camp Delta(Guantanamo)Standard Operating Procedure 2005 2009.
^ Camp Delta(Guantanamo)Interrogation Standard Operating Procedure 2003 2009.
^ Correspondence between the National Security Agency and American telecom companies such asAT^T,Verizon, and Qwest, regarding the
warrantless wiretapping program.Correspondence involving telecoms who cooperated with the NSA(e.g.AT^T) may give different
information than telecoms who refused(e.g. Qwest), but both types would better shed light on the NSA's program. The existence ofthis
correspondence is well documented in the media, for example that Qwest's lawyers refijsed to cooperate because the EISA Court had not
0 ^ ^ ^ 9 ^ ^
http://wikileaks.org/wiki/Draft:The_MostWanted_Leaksof^2009 sort Sattirday,June01,2013 15:39:36 PM
Draft:The Most Wanted Leaks of 2009-sort - WikiLeaks ^ Page 10 of 12
l U ^ O
3^Np:
Iraq and Aflianistan US Army Rules ol^gkgement 2007-2009 (SECRET).
CIA/DIA/NGA/NSA analyses of the VRYAN crisis of 1983.
Technical specifications of the KH-11 and follow-on satellites with similar capabilities.
The contents of the Football, and how they changed over the years during the different Administrations.
What Pollard stole and gave to the Mossad, the ftill text.
US psychological profiles and political analyses of Soviet leaders.
Documents relating to orbital weapons systems, and whether the US ever deployed them (or sfill deploy them) such as orbital HANE devices.
Information about the PAN satellite and the agency responsible for it http://spaceflightnow.com/news/n0905/26milspace/
Commander Directed Report of Investigation Conceming an Unauthorized Transfer of Nuclear Warheads Between Minot AFB, North Dakota
and Barksdale AFB, Louisiana - 30 August 2007 (S//FRD//MR)
Investigation into the Shipment of Sensitive Missile Components to Taiwan (ADM Donald Report) - 22 May 2008 (S//FRD//NOFORN)
Air Force Comprehensive Assessment of Nuclear Sustainment (CANS) - July 2008 (S//FRD//NOFORN)
General Order Number One issued by commanders in Iraq and Afghanistan
Reports about Colombian 'falsos positives'
Unredacted copy of Dept of Justice's Office of Inspector General's "A Review of the FBI's Actions Connection With Allegations Raised By
Confract Linguist Sibel Edmonds" July 1, 2004 (redacted version here http://www.wbez.org/FILES/sibel.pdf)
" Al l secret annexes for, attachments to, unredacted versions of and documents implicitly or explicitly referenced in the following
documents, which may be partially available in unclassified form:
National Security Presidential Directive 51, "National Continuity Policy", May 9, 2007, also known as Homeland Security
Presidential Directive 20
Federal Preparedness Circular 65, "Federal Executive Branch Continuity of Operations (COOP)", July 26, 1999
Federal Response Plan [FEMA 9230.1-PL], April 1999
Presidential Decision Directive 67, "Enduring Constitutional Govemment and Continuity of Govemment Operations", October
21, 1998
Presidential Decision Directive 63, "Critical Infrastmcture Protection (CIP)", May 22, 1998
Presidential Decision Directive 62, "Protection Against Unconventional Threats to the Homeland and Americans Overseas", May
22, 1998
FPC 65 Federal Response Planning Guidance 01-94, "Continuity of Operations (COOP)", December 4, 1994
FDD 67 National Security Directive 69, "Enduring Constitutional Govemment", June 2, 1992
FPC 65 Federal Preparedness Circular 61, "Emergency Succession to Key Positions of the Federal Departments and Agencies",
August 2, 1991
Federal Preparedness Circular 62, "Delegation of Authorities for Emergency Situations", August I , 1991
Federal Preparedness Circular 60, "Continuity of the Executive Branch of the Federal Govemment at the Headquarters Level
During National Security Emergencies", November 20,1990
National Security Directive 37, "Enduring Constitutional Govemment", April 18, 1990
Executtve Order 12656, "Assignment of Emergency Preparedness Responsibilities", November 18, 1988
Executive Order 12472, "Assignment of National Security and Emergency Preparedness Telecommunications Functions", April 3,
1984
NSD 69 NSDD 55, "Enduring National Leadership" September 14, 1982
Executive Order 12148, "Federal Emergency Management", July 20, 1979
" A list of the actual facilities in the Federal Relocation Arc, as of the present time, along with their locations.
Blueprints, maps, and floor plans of MWEOC.
Blueprints, maps, and floor plans of Site R (Raven Rock).
Blueprints and floor plans of all unmentioned facilities in the Federal Relocation Arc, including historical ones.
Banking
The complete list of identities of the 52,000 wealthy American clients suspected of hiding $15 billion at UBS to avoid taxes, including the
names of any elected or appointed govemment or former govemment officials.
The complete details of Goldman, Sachs & Co.'s counterparty exposure to AIG prior to the Federal bailout of AIG in September, 2008.
Environment
Monsanto's intemal evaluations of GMO products including safety and pollen drift.
Media
The Editorial Guidelines for Fox News
Emails relating to suppressed GQ Magazine article on Putin's rise by Scott Anderson mentioned at [61
Religion
Mormons Church records
" With recent leak of 1999/2006 Church Handbook of Instructions, pertinent documents and covertly photographed artifacts in the vault at
Church Office building or subsidy in Salt Lake City, Utah which expose and negate Mormon Church's claim of divinity and its
monopoly on "truth." I.e. the concealed remnants of diaries and letters written by former early Mormon apostle William McLellin JT].
McLellin diary and documents was the main point of interest for convicted double murderer/bomber Mark Hofmann's planned forgery
attempt to deceive Mormon leaders to obtain in fraud by deception monetary reward to suppress truth of early Mormon history
unfavorable to current Mormon religion. For more info, 18].
00527897 ^
http://wiki1eaks.Org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01,2013 15:39:36 PM
Draft:The Most WantedLeaksof2009 sort WikiLeaks Pa ge l l of l 2
^ Documents ofMormonChurch' ^^^ndollar investment in City Creek Mall and Co^^^^nium in SLC,which may put Mormon
Church's IRS tax-exempt status in ^eopardy i f there is verification of the allegation the Church used tithe and offering monetary
confributions by the members to frind the projectunder the umbrella of tax exempted religious freedom.
^ Mormon Church leadership's involvement in politics, such as correspondence to ecclesiastical subordinates (bishopric)on policy and
attitude towards same-sex civil rights^other sensitive issues relevant and conceming to the leaders.As well as recorded
correspondences between Mormon members ofUtah legislation and Church leaders on sensitive political issuB^^^^^^^^^^es for legislation
purposes which may confravene the separation ofchurch and state.
^ Uncovered film or audio recording featuring the play with the actor portraying Protestant minister encouraged by Satati/Lucifer
(porfrayed by actor) to spread false docfrines to attack all religions outside ofMormon religion as "abominable" which was exhibited for
qualified "temple recommend" audiences in all of the existing temples prior to removal in 1990(almost like leaked Scientology
orientation video)|91.
^ Unearthed secret audio or video recording inside Mormon temple with the temple members swearing "blood oath" before removal in
1990 1101
^Documented Churchleaders'andlayclergy'scoverupofphysical/sexualabuseandrapeofminorsbymissionariesandmembers
without reporting to law enforcement in some cases[111.
^ Older editions of Church Handbooks oflnstmctions from the first edition up ]T2] for comparison to recent leakedl968(tmncated),
I999and2006editions.
Vatican
^ Vatican secret archives
^ Brief The Index of the Vatican Secret Archive. At presentpre-screned scholars are allowed to see it butnot copy it(under scholar mle
*I6http://asv.vatican.va^en^fond/amm.htm)
^Vatican'sdocumentsonnaziGermany
^ Brief B^^^documents pertaining to Nazi Germany and the Vatican, as well as those relating to the post-warrat line to Argentina. Refer to
http://ncws.bbc.co.Uk/2/hi/europe/2611847.stm
International organisations
^ Bilderberg Group
^ Brief Bilderberg Group meeting minutes, papers and annual reports of since 1954.WikiLeaks has some years already.Bilderber^ is an
annual off the record conference offransatlantic political, economic and ideological agenda setters. As an historically important
confidential document collection it is probably only equaled by Cabinet minutes and high level intelligence and diplomatic assessments.
Leads:There are some older, previously unnoticed records in boxes at Unioflllinois
http://www.library.illinois.edu/archives/uasfa/1535051.pdf 1^1956 1970^ the George Bush library.
http://bushlibrary.tamu.edu/research/finding aids/pdfs/08 0379-F.pdf and the Eisenhower Library in Kansas
http://www.eisenhower.utexas.edu/Research/Finding Aids/PDFs/Jackson CD Records.pdf
^ Entity: Bilderberg Group
^ Alliance Base
^ Brief Documents regarding the founding and operation of Alliance Base.
Retrieved from "http://^^w.wikileaks.org/wiki/Draft:The Most Wanted Leaks of 2009 sort"
Categories: BulgarialCzechRepublic^Denmark^Estonia^France^Gemiany^lceland^Italy^LatyialLithuania^Netherlands^Norway^Poland^
Romania^Slovenia^Spain|Turkey^UnitedKingdom|Switzerland^Sweden^Malta^Portugal^Luxembourg|Finland^Belgium^Cypms^Canada
^Slovakia^United States
vi^^^
discuss
View source
Personal tools
Log in
Main Page
Country index
Follow us
I Go I I Seatjj
What links here
Related changes
Special pages
-Pdntable ^rsj pn.
http://wikileaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01, 2013 15:39:36 PM
Draft:The Most Wanted Leaks of 2009^ort - WikiLeaks Page 12 of 12
Permanent link
Flattr profile
Follow us on Twitter
Check our Reddit
Digg this page
Twitter this
00527899
http://wiki1eaks.Org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01, 2013 15:39:36 PM
l O
00527900
|iU
00527901
^
r v
^
ro
o
ro
ro
o
rM
w
CN
00527902
^
ro
o
ro
ro
00
ro
z 5
00527903
I
I
\
I
1
f
!
I
s
I
I
.1
1 3
1 %
i i s
III!
i 1 1 s
a
&
I
Z:
I I
I s
i
t i l l *
g ^ JS i s
;H
t
IS
5 S
i l
h
II
^ s
3 I
i l
s.
11
i l
I I
Ii
1
11
!l
I f
5. J,
f 11
i I i
I ^ 1
l 111
Mi!
8 I I S
111 i I
I 111 f
I
I
I
3 S
l i s
3 S
i i i
l-v
ro
o
ro
f O
s
i
f
I
00527904
00527905
00527906
I
i
1
I
I
111
-I 1
s
8! |
.i I
8
ro
ro
LO
00
I V
11
00527907
-s- %
3 I
00527908
00
00
Prosecution Exhibit 34
has been entered into
the record as
Prosecution Exhibit 110
UI^IT^DSTAT^SOF AMERICA ^
^ STIPULATION OF
^ ^XP^CT^DT^STIMONY
^
Ma^mn^, Bradley^. ^ SSOAIe^a^droMari^
PFCU.SArmy, ^
HHCU^SArmyOarrison, ^
JointBaseMyerHendersonHall ^ DAT^D: May 2013
FortMyer,Virginia 22211 ^
It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifSSO Alejandro
Marin were present to testify duringthe merits and pre-sentencing phases of this courts martial, he
would testify substantially as follows.
1. I , SSO Alejandro Marin, am currently deployed to Afghanistan asaCounterintelligence
Analyst in the 0-2(Inte11igence)section forthe 333d Military Police Brigade. My Military
Occupation Specialty (MOS) is 35L, Counterintelligence Agent. My responsibilities in this
position include gathering tactical intelligence in our Area of Operation.
2. From 2002-^2006,Iwas enlisted in the United States Marine Corps with an MOS oflnfantry.
In July 2007,Ienlisted in the United States Army Reserve with an MOS of l l B, Infantry. In early
2008,lreclassified with anMOSof35F,All-Source Intelligence Analyst. From April 2008 until
August 2008,Iattended the Intelligence Analyst Course at Advanced IndividualTraining (AIT) in
Fort I^uachuca, Arizona. Iwas assigned to the 305th Military Intelligence Battalion.
3. PFC Bradley Manning andlattended AIT together. PFC Manning andlwereinall of the
same classes together atAIT and received the same instruction. The class consisted of
approximately 20-25 students, two ofwhom were PFC Manning and me. linteracted with PFC
Manning onadaily basis. Troy Moul was our AITinstructor.
4. AtAIT,Iwas trained on pattern analysis, which is the study ofthe enemy^s Tactics,
Techniques, and Procedures (TPPs)to determine any patterns in enemy activity. Iwas also
trained on how to collectintelligence products and howto map enemy activity as part of pattern
analysis. Iwas also trained extensively on the use ofSignificantActivities(SIOACTs), which are
stored in the Combined Information Data Network F^xchange(CIDNF^) database on the Secure
Internet Protocol Router Network (SIPRNF^T),aclassified network. Iwas also trained that
SIOACTsconsistoftroop location. Improvised F^xplosive Device (IBD)attacks, and
assassinations. Additionally,Iwas trained on how to research, review, and pull SIOACTsand
plot them onamap for pattern analysis.
5. AtAITIwas trained on the targeting process. Iwas also trained on howto collect information
on I^ighValueTargets(l^VTs), to include which databases to use and what type ofinformation is
helpful to the targetingprocess. Iwas also trained that the intelligence we provided on these
I^Ts may be employed to carry out military operations to capture these persons. During this
instruction,Iwas also trained on howto use Intelink,asearch engine on the SIPRNET similar to
Ooogle.
PROSECUTION EXHIBIT for iMitificatioif
PAGEOFFERED: _ P; UlTADMITTED: ^
PAGE OF PAGES
6. At AITIwastt^ained on Information Security (INFOSEC). Iwas also trained on the meaning
ofclassification, to include the difterent levels of classification. Specifica1ly,Iwas trained that the
unauthorized disclosure ofinformation classified at the SECRET level reasonably could be
expected to cause serious damage to the national security and that the unauthorized disclosure of
information classified at the CONFIDENTIAL level reasonably could be expected to cause
damage to the national security. Iwas also trained on the meaning ofinformation marked For
OfficialUseOnly(FOUO) Iwasalsotrainedtoproperlymarl^notonlyclassifieddocumentsat
the top and bottom ofeach document, but also classified media devices with the approved label. I
was fiirthertrained that we hadapersonal responsibility to safeguard classified information. Iwas
also trained that access to classified information is limited to those persons with the proper
security clearance, signed NonDisclosure Agreement, andaneed-to^know. Iwas also trained
how to store, transmit, and otherwise handle classified information consistent with Army
Regulation 380 5.
7. At AIT,Iwas trained on Operational Security(OPSEC). Iwas trained not to publicly disclose
anything that could be useful to our adversaries, both foreign and domestic. Iwasalso trained on
the dangers ofputting information on the Intemet, to include social media websites. Iwasalso
trained on how the enemies ofthe United States, including AlO^^da, use the Internet by
searching websites for many purposes, such as to collect intelligence on the United States and for
use as propaganda and asarecruiting tool. Iwas trained that OPSEC applies to unclassified
information, such as information relating to training schedules and unit morale. AtAIT,Iwas
aware that PFC Manning had to giveafive minute brief on OPSEC.
8. WithregardstoBATESnumbers0000735I^00007426, 00007450 00007586, 00007629^
00007789,00007983 00008087,00008152 00008288,00008331 00008522,00008853^00009046,
00009802-000I0037,and000I0722^00010843,Ihavereviewedalloftheseslides.The formatting
ofthe slides is very recognizable to me. Aslreviewed the slides, my memory makes me believe
that these were the slides that were given to us at AIT The slides were multiple classes in one
presentation. Tothe best of my knowledge, these slides appear to be the ones used for our classes
becauseofthe formatting and content contained in the slideshow. Iremember being trained on the
content of these slides at AIT,such as memorizing the ^^CARVERSUP^^ mnemonic device at
BATES number000I0767. Ilowever,Icannot say for certain that these are the actual slides orthe
actual infortr^ation from the slides ^ivet^ to us due to the length oftime that has ^one by. It has
beenfive years sincelhave seen theslides.Ialsocannotsayfbrcertain that these aretheslides
because not all of the slides were used in all the classes due to time constraints oraclass being
shortened. Ataminimum, these slides are very similarto the slidesIreceivedduringAIT.
9. AtAIT,PFCManningparticipatedinaFie1dTrainingExercise(FTX),duringwhichPFC
Manning created various intelligence products, such as targeting packets on HVTs. Iwasateam
leader duringthis FTX and had the opportunity to review PFC Manning^swork product. PFC
Manning^s strengths included computer-related tasks, such as pulling data from databases
containingintelligence products.
10. Iwas an All^Source Intelligence Analyst for approximately fburyears. In2012,Ireclassified
with anMOSof35L, Counterintelligence Agent.
jTMywi-iL
CPT, JA
Assistant Trial Counsel
xihX
HYTE
THOMAS F. HURLEY
Military Defense Counsel
BRADLEY E. MANNING
PFC, USA
Accused
Prosecution Exhibit 37
have been entered into
the record as a CD/DVD
and will be maintained
with the original
Record of Trial
Attachment B
CAP 0028-10-C1D361
ROl 0028-10-C1D221-10117
Sender Account Sender Alias Date-Time Message Text
[email protected] Nathaniel Frank 2010-03-05 00:56:32 5-6 hours for total upload?
[email protected] Nobody 2010-03-05 03:32:57 uploaded
[email protected] Nobody 2010-03-05 03:33:31 no, it was like 5 minutes
[email protected] Nobody 2010-03-05 03:36:21 ping
[email protected] Nobody 2010-03-05 03:37:36 ping
[email protected] Nobody 2010-03-05 03:38:54 anyway... should be good to go with that...
[email protected] Nobody 2010-03-05 05:39:50 news?
[email protected] Nobody 2010-03-05 05:41:22
[email protected] Nobody 2010-03-05 21:07:12 hi
[email protected] Nathaniel Frank 2010-03-05 21:07:49 hiya
[email protected] Nathaniel Frank 2010-03-05 21:08:15 11 ke debates.
[email protected] Nathaniel Frank 2010-03-05 21:09:27 Just finished one on the IMMl, and crushed some
wretch from the journalists union.
[email protected] Nobody 2010-03-05 21:11:01 vid?
[email protected] Nathaniel Frank 2010-03-05 21:11:24 Ofthis?
[email protected] Nobody 2010-03-05 21:11:37 yeah
[email protected] Nathaniel Frank 2010-03-05 21:11:56 Not videotaped, i think.
[email protected] Nobody 2010-03-05 21:12:04 ah
[email protected] Nathaniel Frank 2010-03-05 21:12:24 Very satisfying though
[email protected] Nobody 2010-03-05 21:12:38 >nod<
[email protected] Nathaniel Frank 2010-03-05 21:12:44 Source here just gave me 10Gb of banking docs.
[email protected] Nobody 2010-03-05 2f:13TlO lb?
[email protected] Nathaniel Frank 2010-03-05 21:13:11 He leaked some before, was exposed by the husband
ofthe wretch.
[email protected] Nathaniel Frank 2010-03-05 21:13:27 cross-bank, was an it consultant.
[email protected] Nathaniel Frank 2010-03-05 21:13:39 got anested two weeks ago
[email protected] Nathaniel Frank 2010-03-05 21:13:50 Had is bank accounts frozen.
[email protected] Nathaniel Frank 2010-03-05 21:14:02 and has been offered 15 million kroner to shut up
[email protected] Nathaniel Frank 2010-03-05 21:14:09 /is/his
[email protected] Nobody 2010-03-05 21:14:26 mmm
[email protected] Nathaniel Frank 2010-03-05 21:15:04 needed to offload them so they'd stop going
after him
[email protected] Nobody 2010-03-05 21:17:31 >:yawn<:
[email protected] Nathaniel Frank 2010-03-05 21:19:26 tired?
[email protected] Nobody 2010-03-05 21:20:54 waking up =)
[email protected] Nathaniel Frank 2010-03-05 22:53:22 ping
[email protected] Nathaniel Frank 2010-03-05 23:41:17 ping
[email protected] Nobody 2010-03-06 00:31:55 here
[email protected] Nobody 2010-03-06 00:32:52 pong
[email protected] Nobody 2010-03-06 00:39:19 ...and zero reply status =P
[email protected] Nobody 2010-03-06 06:40:54 ping
[email protected] Nathaniel Frank 2010-03-06 06:41:22 ping
[email protected] Nobody 2010-03-06 06:41:27 pong
[email protected] Nathaniel Frank 2010-03-06 06:41:34 can you tell me more about these files?
[email protected] Nathaniel Frank 2010-03-06 06:41:41 or the status of the issue?
[email protected] Nobody 2010-03-06 06:41:58 uhmm... no new information... everybody is focused
on the election
[email protected] Nathaniel Frank 2010-03-06 06:42:07 what's the caps thing?
[email protected] Nobody 2010-03-06 06:42:15 caps?
[email protected] Nathaniel Frank 2010-03-06 06:42:22 CAPS
[email protected] Nathaniel Frank 2010-03-06 06:42:38 who's the author?
[email protected] Nathaniel Frank 2010-03-06 06:42:39 and are all these releasable?
[email protected] Nobody 2010-03-06 06:42:42 so much going on... ahhhh
[email protected] Nathaniel Frank 2010-03-06 06:42:46 what about the english translation?
[email protected] Nathaniel Frank 2010-03-06 06:42:55 yes
[email protected] Nobody 2010-03-06 06:42:55 everything Is notes
[email protected] Nobody 2010-03-06 06:43:02 minus the photos
[email protected] Nobody 2010-03-06 06:43:13 the photos are releasable
[email protected] Nathaniel Frank 2010-03-06 06:43:29 ok, what about the incident report?
ManningB_00124388
Forensic report Personal Computer
of PFC MANNING
l^fSI^^^'^^'^^^^T'"
PAGE OF PAGES '
Attachment B
CAP 0028-10-C1D361
ROl 0028-10-C1D221-10117
Sender Account Sender Alias Date-Time Message Text
[email protected] Nobody 2010-03-06 06:43:52 cant release the original, but the information can be
scraped from it
[email protected] Nobody 2010-03-06 06:44:08 i.e. sources indicate this happened at this place at this
time
[email protected] Nathaniel Frank 2010-03-06 06:44:17 yup
[email protected] Nathaniel Frank 2010-03-06 06:44:38 it looks 1 ke a MiTT report?
[email protected] Nobody 2010-03-06 06:44:39 translation is super not releasable
[email protected] Nathaniel Frank 2010-03-06 06:45:01 ok. be sure to tell me these things as soon as
possible
[email protected] Nobody 2010-03-06 06:45:03 yes, came from federal police into US hands
[email protected] Nathaniel Frank 2010-03-06 06:45:07 and better yet in the submission Itself
[email protected] Nobody 2010-03-06 06:45:12 yes, sorry
[email protected] Nathaniel Frank 2010-03-06 06:45:59 i'm not the only one to process this stuff and
also will forget details if publication is delayed a long
time due to the flood of other things
[email protected] Nobody 2010-03-06 06:46:02 though... who knows... everybody is ninning around
like headless chickens
[email protected] Nathaniel Frank 2010-03-06 06:46:28 malaki is expected to win again though?
[email protected] Nobody 2010-03-06 06:46:33 basically
[email protected] Nobody 2010-03-06 06:46:39 lose a few seats maybe
[email protected] Nobody 2010-03-06 06:46:42 but win overall
[email protected] Nobody 2010-03-06 06:46:56 probably have to form a new coalition
[email protected] Nobody 2010-03-06 06:48:47 blah, sorry about the craziness... gonna give release a
shot?
[email protected] Nathaniel Frank 2010-03-06 06:58:20 yes
[email protected] Nobody 2010-03-06 06:58:37 cool
[email protected] Nathaniel Frank 2010-03-06 06:58:40 lack of detail may be problematic, but we&apos:ll see
[email protected] Nathaniel Frank 2010-03-06 06:59:09 i.e ":easier": stories for press to get
[email protected] Nobody 2010-03-06 06:59:10 im sure you can try to confirm SOMETHING... there is
a hotel called the Hotel Ishtar nearby to that location
[email protected] Nathaniel Frank 2010-03-06 06:59:36 does it have grid refs?
[email protected] Nobody 2010-03-06 06:59:46 grid references within the document, yes
[email protected] Nobody 2010-03-06 07:00:01 that was were the an-ests took place
[email protected] Nobody 2010-03-06 07:00:11 morocco publishing company
[email protected] Nobody 2010-03-06 07:00:24 gives coordinates (in the military report)
[email protected] Nobody 2010-03-06 07:01:19 i figured it would make it look more like a journalist
acquired it... if the hotel was mentioned
[email protected] Nobody 2010-03-06 07:01:55 [popular among gays, oddly]
[email protected] Nobody 2010-03-06 07:02:38 <div><a href=http://travel.yahoo.com/p-hotel-2514619-
hotel_ishtar-i" style="background-color; #ffffff; font-
family: Helvetica: font-size:
12pt;">http://travel.yahoo.com/p-hotel-2514619-
hotel_ishtar-i</a></div></message>
[email protected] Nathaniel Frank 2010-03-06 07:02:42 haha
[email protected] Nathaniel Frank 2010-03-06 07:03:19 l'm surprised there are any left.
[email protected] Nobody 2010-03-06 07:03:25 foreign
[email protected] Nobody 2010-03-06 07:03:27 that is
[email protected] Nathaniel Frank 2010-03-06 07:03:33 full transcript for video is now complete
[email protected] Nathaniel Frank 2010-03-06 07:03:43 evil work
[email protected] Nobody 2010-03-06 07:03:43 iraq themed releases?
[email protected] Nobody 2010-03-06 07:04:08 yes, the transcripts say a lot about attitudes
[email protected] Nobody 2010-03-06 07:05:30 might also be known as Sheraton Ishtar
[email protected] Nobody 2010-03-06 07:05:41 <div><a
href=http://en.wikipedia.org/wiki/Sheraton_lshtar"
style= "background-color: #ffffff; font-family: Helvetica;
font-size:
12pt;">http://en.wikipedia.org/wiki/Sheraton_lshtar</a
></div></message>
ManningB_00124389
Forensic report Personal Computer
OfPFC MANNING
Attachment B
CAF 0028-10-C1D361
ROl 0028-10-C1D221-10117
Sender Account Sender Al i as Date-Time Message Text
[email protected] Nobody 2010-03-06 07:06:13 its somewhere In that general area... "Morocco
Publishing"... its been too crazy for me to try and
find
[email protected] Nobody 2010-03-06 07:07:14 anyway, gotta dash... should be back in a few hours
[email protected] Nobody 2010-03-06 07:07:21 good luck
[email protected] Nathaniel Frank 2010-03-06 07:07:34 you too
[email protected] Nathaniel Frank 2010-03-06 07:07:49 um, transcripts?
[email protected] Nathaniel Frank 2010-03-06 07:07:53 ah, yes, sorry.
[email protected] Nobody 2010-03-06 07:08:11 its a HUGE jumble xD
[email protected] Nobody 2010-03-06 07:08:12 =P
[email protected] Nathaniel Frank 2010-03-06 07:08:17 plural confused me.
[email protected] Nobody 2010-03-06 07:08:25 muh bad
[email protected] Nobody 2010-03-06 07:08:34 gotta go fo' realz =P
[email protected]
[email protected]
Nobody 2010-03-06 07:08:37 ciaoness [email protected]
[email protected] Nobody 2010-03-06 07:10:28 oh, it was on the EAST side of the tigris... thats
important
[email protected] Nobody 2010-03-06 07:11:01 the arrest location
[email protected] Nobody 2010-03-06 07:11:03 that is
[email protected] Nathaniel Frank 2010-03-06 07:11:36 why important?
[email protected] Nobody 2010-03-06 07:11:46 i think hotel is on the west side
[email protected] Nobody 2010-03-06 07:12:21 ah, im all over the place... clearing logs...
[email protected] Nobody 2010-03-06 07:12:43 not logging at all... safe
[email protected] Nobody 2010-03-06 07:12:50 i just wanted to be certain
[email protected] Nobody 2010-03-06 09:25:55 any more questions?
[email protected] Nobody 2010-03-06 10:59:53 i have a quick question
[email protected] Nobody 2010-03-06 12:48:15 busy day for you ?
[email protected] Nobody 2010-03-06 14:37:11 ping
[email protected] Nobody 2010-03-07 07:03:53 ping
[email protected] Nathaniel Frank 2010-03-07 07:08:29 brb, checking flights
[email protected] Nobody 2010-03-07 07:11:49 k
[email protected] Nobody 2010-03-07 07:14:56 i have a quick question?
[email protected] Nathaniel Frank 2010-03-07 07:15:36 sure...lots of time pressure atm though so answer will
be brief
[email protected] Nobody 2010-03-07 07:16:00 how valuable are JTF GTMO detention memos
containing summaries, background info, capture info,
etc?
[email protected] Nathaniel Frank 2010-03-07 07:16:18 time period?
[email protected] Nobody 2010-03-07 07:16:25 2002-2008
[email protected] Nathaniel Frank 2010-03-07 07:17:35 quite valuable to the lawyers of these guys who are
trying to get them out, where those memos suggest
their innocence/bad proceedure
[email protected] Nathaniel Frank 2010-03-07 07:18:12 also valuable to merge into the general history,
politically gitmo is mostly over though
[email protected] Nobody 2010-03-07 07:18:20 yeah
[email protected] Nathaniel Frank 2010-03-07 07:18:28 although transfers to afghanistan might rise it again
[email protected] Nobody 2010-03-07 07:18:38 >%oPNG
[email protected] Nobody 2010-03-07 07:18:43 ill get back to that later
[email protected] Nathaniel Frank 2010-03-07 07:19:29 depends on definition of valuable of course..
there's been a fair bit of inflation the last few
months :)
[email protected] Nobody 2010-03-07 07:19:39 i noticed
[email protected] Nathaniel Frank 2010-03-07 07:19:51 BTW
[email protected] Nathaniel Frank 2010-03-07 07:20:12 WE won the referendum - only 1.4% voted against.
[email protected] Nobody 2010-03-07 07:20:17 i saw
[email protected] Nathaniel Frank 2010-03-07 07:20:25 How cool is that?
[email protected] Nathaniel Frank 2010-03-07 07:20:54 First referendum in Icelandic history, ever.
ManningB_00124390
Forensic report Personal Computer
OfPFC MANNING
Attachment B
CAF 0028-10-C1D361
ROl 0028-10-CID221-10117
Sender Account Sender Alias Date-Time Message Text
[email protected] Nobody 2010-03-07 07:20:56 not sure how much influence you actually had...
though im sure you had an impact of some kind
[email protected] Nathaniel Frank 2010-03-07 07:21:13 by 'we' i mean everyone worthing towards
it
[email protected] Nobody 2010-03-07 07:21:20 ah, been there before
[email protected] Nobody 2010-03-07 07:21:28 im wary of referenda
[email protected] Nobody 2010-03-07 07:21:51 democracy sounds good... until you realize
you're a vulnerable minority...
[email protected] Nathaniel Frank 2010-03-07 07:21:57 but quite possibly swung it., there was lots of stuff
going on behind the scenes here.
[email protected] Nobody 2010-03-07 07:22:09 case in point: proposition 8 in California
[email protected] Nathaniel Frank 2010-03-07 07:22:21 Yes. This is democracy in the negative though, which
is usually great.
dawgnetwori(@jabber ccc.de Nobody 2010-03-07 07:22:34 indeed it is
[email protected] Nathaniel Frank 2010-03-07 07:22:51 I.e vetoing bills [go back and do it again!]
[email protected] Nathaniel Frank 2010-03-07 07:23:32 call is bad, 1 agree, anyone with some $ has a syringe
right into the heart of the state constitution
[email protected] Nobody 2010-03-07 07:23:40 >nod<
[email protected] Nathaniel Frank 2010-03-07 07:23:52 bbk
[email protected] Nobody 2010-03-07 07:23:58 gotta nin too
[email protected] Nobody 2010-03-07 07:23:59 ttyl
[email protected] Nobody 2010-03-07 10:53:48 so when is the site coming back?
dawgnetwori(@jabber.ccc.de Nobody 2010-03-08 05:46:56 hello
[email protected] Nathaniel Frank 2010-03-08 05:48:43 heyal
[email protected] Nathaniel Frank 2010-03-08 05:48:50 how goes?
[email protected] Nobody 2010-03-08 05:49:22 not bad
[email protected] Nathaniel Frank 2010-03-08 05:52:19 vid has been enhanced and rendered now. subtitles
done for english
[email protected] Nobody 2010-03-08 05:52:30 nice
[email protected] Nathaniel Frank 2010-03-08 05:52:47 it looks good, the stills are very moving
[email protected] Nobody 2010-03-08 05:53:03 the stills taken from the wide angle?
dawgnelwori(@jabber.ccc.de Nobody 2010-03-08 05:53:31 dropped camera
[email protected] Nathaniel Frank 2010-03-08 05:53:42 no..
[email protected] Nobody 2010-03-08 05:53:51 ah, the video stills then
[email protected] Nathaniel Frank 2010-03-08 05:53:52 from the video cam
[email protected] Nobody 2010-03-08 05:54:14 sounds good
[email protected] Nobody 2010-03-08 05:55:54 still all over the place, here
[email protected] Nathaniel Frank 2010-03-08 05:56:10 After the contrast enhancement, something about the
lack of resolution / smoke gives a film-noir quality
[email protected] Nathaniel Frank 2010-03-08 05:56:16 yeah, i've heard.
[email protected] Nobody 2010-03-08 05:56:25 heard?
[email protected] Nathaniel Frank 2010-03-08 05:56:29 outcome yet?
[email protected] Nobody 2010-03-08 05:56:43 busy few weeks
[email protected] Nobody 2010-03-08 05:57:02 no... wont be for weeks... it was very quiet
[email protected] Nobody 2010-03-08 05:57:09 expected a lot more
[email protected] Nathaniel Frank 2010-03-08 05:58:05 people can get worthed up internally...
[email protected] Nathaniel Frank 2010-03-08 05:58:59 somethings are encouraged to be said, others not,
and after they flow around long enough, there's
a lack of grounding.
da wg network@ja bber.ccc.de Nobody 2010-03-08 06:04:09 lalala
[email protected] Nathaniel Frank 2010-03-08 06:04:54 jesus
Nobody 2010-03-08 06:05:05 mm?
[email protected] Nathaniel Frank 2010-03-08 06:05:22 looks like we have the last 4 mothers of all audio to all
phones in the is pariiament
[email protected] Nathaniel Frank 2010-03-08 06:05:29 s/mothers/months
[email protected] Nobody 2010-03-08 06:05:46 interesting
[email protected] Nobody 2010-03-08 06:06:09 *had nothing to do with this one*
ManningB_00124391
Forensic report Personal Computer
OfPFC MANNING
AttachmentB
^
CAF 0028 10 C1O361
ROI0028 10-C1O221-101
Sender Account Sender Al i as Date-Tin^e MessageText
[email protected] Nobody 2010 03 08 06:08:49 im sending one last archive of intersting stuff... should
be in t hexf ol der at some point in the next 24 hours
[email protected] Nathaniel Frank 2010 03 08 06:10:08 ok.greati
[email protected] Nobody 2010 03 08 06:10:09 74b3*t arbz2
dawgnetwori^@jabber.ccc.de Nobody 201003 08 06:10:50 you^apos:ll need to figure out what to do with it all...
[email protected] Nathaniel Frank 2010 03 08 06:11:03 al ot of odd things are happening lately
[email protected] Nobody 2010 03 08 06:11:08 such as?
[email protected] Nathaniel Frank 2010 03 08 06:11:48 it^apos:s hard to descr be without going through them
all
[email protected] Nathaniel Frank 2010^3 08 06:11:53 but there^apos:s something in t h^ air.
dawgnetwork@j abbercccde Nobody 2010 03 08 06:12:07 in Iceland, or globally
[email protected] Nathaniel Frank 2010 03 08 06:12:40 this is what l^apos:m trying to determine people in
germany say the same thing
[email protected] Nathaniel Frank 2010 03 08 06:12:49 and there^apos:s some evidence of t hat
[email protected] Nobody 2010 03 08 06:13:13 such as... (i hate to inquire too much, but im benign)
[email protected] Nathaniel Frank 201003 08 06:13:36 it may be more readily vis ble in is due to less inertia
[small economy]
dawgnetwork@j abbercccde Nobody 2010 03 08 06:14:09 definitely feel something odd here...
[email protected] Nathaniel Frank 201003 08 06:14:38 some recent things... in denmari^ the main newspaper
printed an entire book in afghanistan that was about to
be Injuncted suddenly in its Sunday paper
[email protected] Nathaniel Frank 201003 0806:14:50 to subvert the injunction
pressassociation@jabbercccde Nathaniel Frank 201003 08 06:14:55 [about afghanistan, not in]
[email protected] Nathaniel Frank 201003 08 06:15:04 injunction came from dep of defence
[email protected] Nathaniel Frank 2010 03 08 06:15:25 fox news editorialized to say, give money to Wl^
[email protected] Nathaniel Frank 2010 03 0806:15:42 .nl government just fell over afghanistan
[email protected] Nobody 2010 03 08 06:15:49 indeed
pressassociation@jabbercccde Nathaniel Frank 201003 08 06:16:00 german constitutional court just struck down data
retention
dawgnetwork@j abbercccde Nobody 2010 03 08 06:16:07 yep
[email protected] Nathaniel Frank 2010 03 08 06:16:34 wl actions that were considered totally radi cal 3years
ago are now courted
[email protected] Nobody 2010^3 0806:17:06 i tol d you before,government/organizations cant
control infonnation... the harder they try, the more
violently the information wants to get out
[email protected] Nathaniel Frank 201003 08 06:17:22 2500 articles in is referendum in the past 15hours,
despite it bei ngasunday
[email protected] Nobody 2010 03 08 06:17:34 you^apos:re like the first pin to popabal l oon
[email protected] Nathaniel Frank 2010 03 08 06:17:52 many other things like this
[email protected] Nathaniel Frank 2010 03 08 06:18:13 restrict suppl y- val ue Increases,yes
[email protected] Nobody 2010 03 08 06:18:21 oh yeah...osc went haywire digging into is
pressassociation@jabbercccde Nathaniel Frank 2010 03 08 06:18:37 us dod has another tact though, dump billions in free
^quot:news^quot: content
[email protected] Nathaniel Frank 2010^3 08 06:18:44 yeah?
[email protected] Nathaniel Frank 201003 08 06:18:56 that^apos:s something we want to mine entirely, btw
pressassoclation@jabbercccde Nathaniel Frank 201003 08 06:19:10 l had an account there, but changed ips too quickly
dawgnetwork@j abbercccde Nobody 2010 03 08 06:19:16 usually its pretty dull reading, one or two things on is
aday. . . but i t sl ke 20-25 fortoday alone
[email protected] Nathaniel Frank 2010 03 08 06:19:40 just F^IS or analysis included?
[email protected] Nobody 2010 03 08 06:19:54 no analysis, too eariy...
[email protected] Nobody 2010 03 08 06:20:03 24-48 hours it takes for analysis if done
l^afii^iFigB_00124392
Forensic report Personal Computer
OfPFC MANNING
Attachment B
CAF 0028-10-CID361
ROl 0028-10-CID221-10117
Sender Account Sender Alias Date-Time Message Text
[email protected] Nobody 2010-03-08 06:22:01 anyway, im throwing everything i got on JTF GTMO at
you now... should take awhile to get up tho
[email protected] Nobody 2010-03-08 06:23:22 summary / history / health conditions / reasons for
retaining or transfer of nearly every detainee (about
95%)
[email protected] Nathaniel Frank 2010-03-08 06:24:01 ok, great!
[email protected] Nathaniel Frank 2010-03-08 06:24:15 what period does it cover for each internment?
[email protected] Nobody 2010-03-08 06:24:48 2002-2009...
[email protected] Nathaniel Frank 2010-03-08 06:25:21 so initial medical evaluation to exit evaluation?
dawgnetwori(@jabber.ccc.de Nobody 2010-03-08 06:25:37 no, just summaries...
[email protected]. de Nathaniel Frank 2010-03-08 06:25:52 but summaries of that?
[email protected] Nathaniel Frank 2010-03-08 06:26:26 i.e from entry to exit?
[email protected]
[email protected]
Nobody
Nobody
2010-03-08 06: 26^
20i0-03-08 06:26:33"
not quite [email protected]
[email protected]
Nobody
Nobody
2010-03-08 06: 26^
20i0-03-08 06:26:33" gaps
[email protected] Nathaniel Frank 2010-03-08 06:26:50 where do the gaps come from?
dawgnetwori(@jabber.ccc.de Nobody 2010-03-08 06:26:58 Memos such asSUBJECT: Recommendation to
Retain under DoD Control (DoD) for Guantanamo
Detainee,<br />1SN: US9AS-000002DP
[email protected] Nobody 2010-03-08 06:27:51 i have a csv that organizes the info as much as
possible
[email protected] Nathaniel Frank 2010-03-08 06:27:55 1 hate these gitmo guys
[email protected] Nathaniel Frank 2010-03-08 06:28:29 OFAFBU sums up the sort of people they ended up
with
[email protected] Nathaniel Frank 2010-03-08 06:28:48 [one flight away from being ugly] aka "gitmo
cute"
[email protected] Nobody 2010-03-08 06:28:56 haha
[email protected] Nobody 2010-03-08 06:30:57 anyway, gotta run, have a nice day
[email protected] Nathaniel Frank 2010-03-08 06:31:14 you too. and take care!
[email protected] Nobody 2010-03-08 06:31:42 after this upload, thats all i really have got left
pressassociation @jabber.ccc.de Nathaniel Frank 2010-03-08 06:32:15 curious eyes never run dry in my experience
[email protected] Nobody 2010-03-08 06:32:18 1 sat on it for a bit, and figured, eh, why not
dawgnetwori(@jabber.ccc.de Nobody 2010-03-08 06:32:52 ive already exposed quite a bit, just no-one knows yet
[email protected] Nobody 2010-03-08 06:33:34 ill slip into daricness for a few years, let the heat die
down
[email protected] Nathaniel Frank 2010-03-08 06:34:05 won't take a few years at the present rate of
change
[email protected] Nobody 2010-03-08 06:34:08 true
[email protected] Nathaniel Frank 2010-03-08 06:34:19 almost feels 1 ke the singularity is coming
there's such acceleration
[email protected] Nobody 2010-03-08 06:34:52 yes... and considering just how much one source has
given you, i can only imagine the overlad
[email protected] Nathaniel Frank 2010-03-08 06:35:05 yes
[email protected] Nobody 2010-03-08 06:35:15 load
[email protected] Nobody 2010-03-08 06:35:30 c ya
[email protected] Nathaniel Frank 2010-03-08 06:35:34 1 just hope we can do justice to it all.
[email protected] Nathaniel Frank 2010-03-08 06:35:57 We have the numbers, just need to figure out how to
scale the management.
[email protected] Nathaniel Frank 2010-03-08 06:36:04 night!
[email protected] Nobody 2010-03-08 11:13:06 hi
[email protected] Nathaniel Frank 2010-03-08 11:44:16 hoi
[email protected] Nathaniel Frank 2010-03-08 11:44:27 short sleep?
[email protected] Nobody 2010-03-08 12:19:56 wasnt asleep... going to sleep soon
[email protected] Nobody 2010-03-08 12:20:21 upload is at about 36%
[email protected] Nathaniel Frank 2010-03-08 12:21:39 ETA?
[email protected] Nobody 2010-03-08 12:22:05 11-12 hours... guessing since its been going for 6
already
[email protected] Nathaniel Frank 2010-03-08 12:22:33 how many mb?
[email protected] Nobody 2010-03-08 12:22:50 about 440mb
ManningB_00124393
Forensic report Personal Computer
OfPFC MANNING
Attachment B
CAF 0028-10-C1D361
ROl 0028-10-C1D221-10117
Sender Account Sender Al i as Date-Time Message Text
dawgnetwori(@jabber.ccc.de Nobody 2010-03-08 12:24:46 a lot of scanned pdf's
dawgnetwori(@jabber.ccc.de Nobody 2010-03-08 14:38:00 what are you at donation-wise?
dawgnetwori(@jabber.ccc de Nobody 2010-03-08 15:55:28 any good at Im hash cracking?
[email protected] Nathaniel Frank 2010-03-08 16:00:29 yes
[email protected] Nathaniel Frank 2010-03-08 16:00:44 donations; not sure.
[email protected] Nathaniel Frank 2010-03-08 16:00:55 something in order of .5M
[email protected] Nathaniel Frank 2010-03-08 16:01:30 but we lost our CC processor, so this is making
matters somewhat painful.
[email protected] Nathaniel Frank 2010-03-08 16:02:23 we have rainbow tables for Im
[email protected] Nobody 2010-03-08 16:04:14 80c11049faebf441d524fb3c4cd5351c
[email protected] Nobody 2010-03-08 16:05:07 i think its Im -t- Imnt
[email protected] Nobody 2010-03-08 16:05:38 anyway...
[email protected] Nobody 2010-03-08 16:06:08 need sleep >yawn>
[email protected] Nobody 2010-03-08 16:09:06 not even sure if thats the hash... i had to hexdump a
SAM file, since i dont have the system file...
[email protected]
[email protected]
Nathaniel Frank
Nathaniel Frank
2010-03-08 16:10:06
2010-03-08 16:10:19
what makes you think it's Im? [email protected]
[email protected]
Nathaniel Frank
Nathaniel Frank
2010-03-08 16:10:06
2010-03-08 16:10:19 its from a SAM?
[email protected] Nobody 2010-03-08 16:10:24 yeah
[email protected] Nathaniel Frank 2010-03-08 16:11:26 passed it onto our Im guy
[email protected] Nobody 2010-03-08 16:11:40 thx
[email protected] Nobody 2010-03-08 21:31:59 got about an hour to go on that upload
[email protected] Nobody 2010-03-10 03:44:06 hi
[email protected] Nobody 2010-03-10 03:45:05 did you get what i sent?
[email protected] Nobody 2010-03-10 03:45:11 via sftp
[email protected] Nathaniel Frank 2010-03-10 03:46:04 hey a!
[email protected] Nobody 2010-03-10 03:46:24 MDS (74b3*.tar.bz2) = c36e31ab*
[email protected] Nathaniel Frank 2010-03-10 03:47:39 will check
dawgnetwori(@jabber.ccc.de Nobody 2010-03-10 03:47:47 sweet
[email protected] Nathaniel Frank 2010-03-10 03:47:54 somewhat distracted with all sorts of intrigues
[email protected] Nobody 2010-03-10 03:48:01 heh, im sure
[email protected] Nobody 2010-03-10 03:48:13 imma get intrigued with my hot chocolate =)
[email protected] Nathaniel Frank 2010-03-10 03:48:24 we now have the last 4 months of audio from
telephones at the .is pariiament
dawg network@jabber. ccc.de Nobody 2010-03-10 03:48:29 bbl
[email protected] Nobody 2010-03-10 03:48:35 yes, you said eariier
[email protected] Nathaniel Frank 2010-03-10 03:48:51 it was a "might* before
[email protected] Nobody 2010-03-10 03:48:55 somebody's bad... =)
[email protected] Nobody 2010-03-10 03:49:11 ttyl
[email protected] Nathaniel Frank 2010-03-10 03:49:16 yup. nixon tapes got nothing on us
[email protected] Nathaniel Frank 2010-03-10 04:25:37 hmm
[email protected] Nathaniel Frank 2010-03-10 04:25:42 there's a username in the gitmo docs
[email protected] Nathaniel Frank 2010-03-10 04:25:58 i assume i should filter it out?
[email protected] Nobody 2010-03-10 05:40:47 theres a username?
[email protected] Nobody 2010-03-10 05:42:16 any usernames should probably be filtered, period
[email protected] Nobody 2010-03-10 05:42:38 but at the same time, theres a gazillion of them
[email protected] Nathaniel Frank 2010-03-10 05:45:56 is this ordered by country?
[email protected] Nobody 2010-03-10 05:46:00 yes
[email protected] Nobody 2010-03-10 05:46:48 ... gazillion pdf's that is</span>
[email protected] de Nobody 2010-03-10 05:47:15 anything useful in there?
[email protected] Nathaniel Frank 2010-03-10 05:50:54 no time, but have someone on it
[email protected] Nathaniel Frank 2010-03-10 05:51:00 there surely will be
[email protected] Nathaniel Frank 2010-03-10 05:51:12 and these sorts of things are always motivating to
other sources too
[email protected] Nobody 2010-03-10 05:51:22 >nod<
[email protected] Nobody 2010-03-10 05:51:33 inflation
[email protected] Nobody 2010-03-10 05:51:34 =P
[email protected] Nobody 2010-03-10 05:51:43 from an economic standpoint
[email protected] Nathaniel Frank 2010-03-10 05:52:08 heh
[email protected] Nathaniel Frank 2010-03-10 05:52:29 1 was thinking more inspiration
[email protected] Nobody 2010-03-10 05:52:38 i know =)
MannlngB_00124394
Forensic report Personal Computer
of PFC MANNING
Attachment B
CAF 0028-10-CID361
ROl 0028-10-C1D221-10117
Sender Account Sender Alias Date-Time Message Text
[email protected] Nathaniel Frank 2010-03-10 05:53:08 gitmo=bad,leakers=enemy of gitmo,leakers=good
[email protected] Nathaniel Frank 2010-03-10 05:54:03 Hence the feeling is people can give us stuff for
anything not as "dangerous as gitmo" on
the one hand, and on the other, for people who know
more, there's a desire to eclipse. ..
dawgnetwori(@jabber.ccc.de Nobody 2010-03-10 05:54:41 true
[email protected] Nobody 2010-03-10 05:55:05 ive crossed a lot of those "danger" zones,
so im comfortable
[email protected] Nobody " 2010-03-10 05755:25 learned a lot from the Iceland cable on my side
[email protected] Nathaniel Frank 2010-03-10 05:55:32 oh?
[email protected] Nobody 2010-03-10 05:55:55 and that is... everyone is too busy to investigate too
deeply...
[email protected] Nobody 2010-03-10 05:56:02 or clean up the mess
[email protected] Nathaniel Frank 2010-03-10 05:56:03 yes
[email protected] Nathaniel Frank 2010-03-10 05:56:13 unless they think there's a real promotion in it
[email protected] Nobody 2010-03-10 05:56:19 indeed
[email protected] Nathaniel Frank 2010-03-10 05:56:35 after a few days, no one gives a damn, generally
dawgnetwori(@jabber.ccc.de Nobody 2010-03-10 05:56:41 yep
[email protected] Nathaniel Frank 2010-03-10 05:56:46 especially now with the pace of change so high
[email protected] Nobody 2010-03-10 05:56:51 oh yeah
[email protected] Nobody 2010-03-10 05:56:58 its nuts
[email protected] Nobody 2010-03-10 05:57:28 ive given up on trying to imagine whats next
[email protected] Nathaniel Frank 2010-03-10 05:57:53 i predict its nothing i can predict
[email protected] Nathaniel Frank 2010-03-10 05:58:21 actually...
[email protected] Nathaniel Frank 2010-03-10 05:58:29 gave an Intel source here a list of things we wanted
[email protected] Nathaniel Frank 2010-03-10 05:58:39 1-5
[email protected] Nathaniel Frank 2010-03-10 05:59:06 1 was "something we have no idea of yet. hard
to find, but the most likely to be important"
[email protected] Nathaniel Frank 2010-03-10 05:59:30 and they came back with the last 4 months of
pariiament
[email protected] Nobody 2010-03-10 05:59:47 xD
dawgnetwori(@jabber.ccc.de Nobody 2010-03-10 05:59:49 hilarious
[email protected] Nobody 2010-03-10 06:00:40 thats a wtf... who did this kind of moment
[email protected] Nobody 2010-03-10 06:00:54 fall-out =P
[email protected] Nathaniel Frank 2010-03-10 06:00:55 So, that's what 1 think the future is 1 ke ;)
[email protected] Nathaniel Frank 2010-03-10 06:01:15 yes
[email protected] Nobody 2010-03-10 06:01:57 now that humans are getting more and more
integrated into this information society... a level of
transparency never imagined or even truly desired is
coming into play
[email protected] Nobody 2010-03-10 06:02:18 it makes us more human if anything
[email protected] Nobody 2010-03-10 06:03:13 we've created states, governments, religious
institutions, corporations... all these organizations to
hide behind...
[email protected] Nobody 2010-03-10 06:03:26 but at the end of the day, we're just guys and
giris
MannlngB_00124395
Forensic report Personal Computer
OfPFC MANNING
Attachment B
CAF 0028-10-CID361
ROl 0028-10-C1D221-10117
Sender Account Sender Alias Date-Time Message Text
[email protected] Nathaniel Frank 2010-03-10 06:04:02 WikiLeaks is looking for donations, but what itsT<,
founders should do, is call upon script writers to make
a, pertiaps reality based, dramatized, thriller movie of
one of the wikileaks cases, with corruption, infiltration,
espionage, hitmen, sabotage, etc. and call the movie
"WikiLeaks!"</span><br /><br /><span
style=font-family: Helvetica; font-size: 12pt;">l see
great potential for such a movie, and massive money
and advertising it would generate would establish
them firmly. l'd then support by seeing the
movie. Hollywood would likely support."
[email protected] Nathaniel Frank 2010-03-10 06:04:04 haha
[email protected] Nathaniel Frank 2010-03-10 06:04:35 yes. its very healthy
[email protected] Nathaniel Frank 2010-03-10 06:04:47 but then, there is farmville...
[email protected] Nobody 2010-03-10 06:04:59 the masquerade ball
[email protected] Nobody 2010-03-10 06:05:22 this is gonna be one hell of a decade
[email protected] Nobody 2010-03-10 06:05:45 it feels like 2010 should be ending soon...
[email protected] Nobody 2010-03-10 06:05:50 but we just got started
[email protected] Nathaniel Frank 2010-03-10 06:05:51 sense deceptions to suck $ out of people
[email protected] Nathaniel Frank 2010-03-10 06:06:06 lt's as old as lipstick and the guitar of course,
but mmorpg are evil in a whole new way
[email protected] Nobody 2010-03-10 06:06:39 voluntary matrix-style society?
[email protected] Nathaniel Frank 2010-03-10 06:06:46 yes
[email protected] Nobody 2010-03-10 06:07:08 hmm
[email protected] Nathaniel Frank 2010-03-10 06:07:25 might be ok in the end
[email protected] Nathaniel Frank 2010-03-10 06:07:53 mmorpg's that have long term users are
incentivised to keep them profitable
[email protected] Nathaniel Frank 2010-03-10 06:08:59 but 1 imagine they'll merge into hybrid revenue
modes, where congnitive tasks and freelabor are done
using sense deception incentives
dawgnetwori(@jabber.ccc.de Nobody 2010-03-10 06:09:48 like the "video games" from toys?
[email protected] Nathaniel Frank 2010-03-10 06:10:12 haven't seen that
[email protected] Nathaniel Frank 2010-03-10 06:10:34 but it sure isn't a decade to be a gull ble idiot:)
[email protected] Nobody 2010-03-10 06:11:24 basic gist: retired general takes over a toy company,
invests in video games for kids to "play",
but they're actually training to remotely use little
toy sized weapons
[email protected] Nobody 2010-03-10 06:11:40 former toy owner tries to stop him
[email protected] Nobody 2010-03-10 06:11:52 *company
[email protected] Nathaniel Frank 2010-03-10 06:12:11 heh. that's the example 1 was going to use for
mmorpg (with drones) but decided it was too
grotesque
[email protected] Nobody 2010-03-10 06:12:47 its not... its logical in frightening ways
[email protected] Nobody 2010-03-10 06:13:04 i think like that... i dont know how it happened, but i
think that way
[email protected] Nathaniel Frank 2010-03-10 06:13:32 i predict war will tum into a continuous spectnim of
spying and violence
[email protected] Nobody 2010-03-10 06:13:32 "how can i take advantage of two things that
most people wouldn't think are
connected"
[email protected] Nathaniel Frank 2010-03-10 06:15:50 with companies doing a lot of the lower end
{spying/violence} for their own reasons and a totally
seem less crossover (as is happening with the us)
between contractors/military to the degree that its not
clear who is tasking who
[email protected] Nobody 2010-03-10 06:16:12 wow, dead on
MannlngB_00124396
Forensic report Personal Computer
OfPFC MANNING
Attachment B
CAF 0028-10-CID361
ROl 0028-10-CID221-10117
Sender Account Sender Alias Date-Time Message Text
[email protected] Nathaniel Frank 2010-03-10 06:16:57 everywhere, greater degrees of freedom, more fluidity
and mixing.
[email protected] Nobody 2010-03-10 06:17:23 always an interesting discussion =)
[email protected] Nobody 2010-03-10 06:17:26 ttyl
[email protected] Nathaniel Frank 2010-03-10 06:17:31 night!
[email protected] Nobody 2010-03-10 20:58:03 hello
[email protected] Nathaniel Frank 2010-03-10 20:59:41 heya!
[email protected] Nobody 2010-03-10 20:59:52 whats new?
[email protected] Nathaniel Frank 2010-03-10 21:00:22 350Gb of audio intercepts. But you knew already.
dawgnetwoM(@jabber.ccc.de Nobody 2010-03-10 21:00:30 mhmm
dawgnelwori(@jabber.ccc de Nobody 2010-03-10 21:00:57 is that the only thing?
[email protected] Nathaniel Frank 2010-03-10 21:01:22 lots of smaller scale material
dawgnetwori(@jabber.ccc.de Nobody 2010-03-10 21:01:28 >:nod<
[email protected] Nathaniel Frank 2010-03-10 21:01:44 e g bbc legal defense against trafigura which was
censored
[email protected] Nathaniel Frank 2010-03-10 21:02:15 a jazeera doing another segment on WL
[email protected] Nathaniel Frank 2010-03-10 21:02:35 Canadian detainee docs
dawgnetwori<@jabber.ccc.de Nobody 2010-03-10 21:02:43 Canadian?
[email protected] Nathaniel Frank 2010-03-10 21:03:00 some russian and Chinese stuff that 1 can't read
dawgnelwori(@jabber.ccc.de Nobody 2010-03-10 21:03:08 ha ha ha
[email protected] Nathaniel Frank 2010-03-10 21:03:09 heh
[email protected] Nathaniel Frank 2010-03-10 21:03:17 and a list of ALL the tea party volunteers
[email protected] Nathaniel Frank 2010-03-10 21:03:42 from glen beck's email
dawgnetwori(@jabber.ccc.de Nobody 2010-03-10 21:03:48 jesus fucking Christ
[email protected] Nobody 2010-03-10 21:04:13 whats the big deal with that? because some people
take that seriously
[email protected] Nathaniel Frank 2010-03-10 21:04:26 an analysis of the greenhouse gas output of
Australia's "earth hour" firewori(s
[email protected] Nathaniel Frank 2010-03-10 21:04:32 (46 tonnes)
[email protected] Nathaniel Frank 2010-03-10 21:04:57 The lea party thing? ll's weird, but it should be
taken seriously
[email protected] Nobody 2010-03-10 21:05:21 yeah, its one of those... grey areas tietween reality
and entertainment and ick
[email protected] Nathaniel Frank 2010-03-10 21:05:33 lt's the right wing overclass (fox) organization of
the righwing underclass. Think of them as brown
shirts.
dawgnetwort(@jabber.ccc.de Nobody 2010-03-10 21:05:39 stays in reality*
dawgnetwoM(@jabber.ccc.de Nobody 2010-03-10 21:06:23 well, i dont know what posting a list from glenn
beck's email will do... but hey. Its transparency
[email protected] Nathaniel Frank 2010-03-10 21:06:37 They're Important because their organized free
labor.
[email protected] Nathaniel Frank 2010-03-10 21:06:54 And they may or may not break fi-ee of their masters.
[email protected] Nobody ToTo^3-10 21:07:04 ah
[email protected] Nobody 2010-03-10 21:07:50 is it 1 ke the entire worid is uploading to you?
[email protected] Nathaniel Frank 2010-03-10 21:08:24 some hungarian finance things
[email protected] Nathaniel Frank 2010-03-10 21:08:31 Scientology in haiti...
[email protected] Nathaniel Frank 2010-03-10 21:08:52 lots of german stuff i don't understand, but we
have people who do
[email protected] Nobody 2010-03-10 21:08:58 >nod<
[email protected] Nobody 2010-03-10 21:09:08 wow...
dawgnetwort(@jabber.ccc.de Nobody 2010-03-10 21:09:15 im gonna leave you to work than
[email protected] Nobody 2010-03-10 21:09:50 get back up and online... get Immi passed... and start
publishing whatever you can... =)
[email protected] Nathaniel Frank 2010-03-10 21:10:08 heh
[email protected] Nathaniel Frank 2010-03-10 21:10:16 a jazeera will also have a new WL doco
[email protected] Nathaniel Frank 2010-03-10 21:10:31 by the same producer who did IMMI piece
[email protected] Nathaniel Frank 2010-03-10 21:11:36 agreement between the royal mail and its union
ManningB_00124397
Forensic report Personal Computer
OfPFC MANNING
10
Attachment B
CAF 0028-10-CID361
ROl 0028-10-C1D221-10117
Sender Account Sender Alias Date-Time Message Text
[email protected] Nathaniel Frank 2010-03-10 21:11:49 oh, this one is nice
[email protected] Nathaniel Frank 2010-03-10 21:11:55 entire romanian police database
[email protected] Nathaniel Frank 2010-03-10 21:12:31 israeli's OECD application docs
[email protected] Nobody 2010-03-10 21:15:45 its like you're the first "lntelligence
Agency" for the general public
[email protected] Nobody 2010-03-10 21:16:39 downside is you get so much stuff in a single day that
its hard to prioritize
[email protected] Nathaniel Frank 2010-03-10 21:16:54 yes
[email protected] Nathaniel Frank 2010-03-10 21:17:05 that's just a matter of growth, though
[email protected] Nathaniel Frank 2010-03-10 21:17:39 did you read our bulgarian shadow state doc?
dawgnetwori(@jabber.ccc.de Nobody 2010-03-10 21:17:45 well, fuck you do everything an Intel agency does...
minus the anonymous sourcing
[email protected] Nobody 2010-03-10 21:17:58 not really
[email protected] Nathaniel Frank 2010-03-10 21:18:15 The original WL about reads: "...will be the first
intelligence agency of the people. .."
[email protected] Nobody 2010-03-10 21:18:43 might have missed that, but its absolutely tme
[email protected] Nobody 2010-03-10 21:19:31 anyway, gotta run... ttyl
[email protected] Nathaniel Frank 2010-03-10 21:19:47 Wikileaks described itself as "the first
intelligence agency of the people. Better principled
and less parochial than any governmental intelligence
agency, it is able to be more accurate and relevant. It
has no commercial or national interests at heart; its
only interest is the revelation of the truth. Unlike the
covert activities of state intelligence agencies,
Wikileaks relies upon the power of overt fact to enable
and empower citizens to bring feared and corrupt
governments, and corporations to justice."
[email protected] Nathaniel Frank 2010-03-10 21:20:14 ok. later!
[email protected] Nathaniel Frank 2010-03-10 23:30:54 any more hints about this lm hash?
[email protected] Nathaniel Frank 2010-03-10 23:31:03 no luck so far
[email protected] Nobody 2010-03-16 18:23:35 hi
[email protected] Nathaniel Frank 2010-03-16 18:32:42 hoi
[email protected] Nobody 2010-03-16 22:29:42 whats up?
[email protected] Nathaniel Frank 2010-03-16 22:34:13 just about to go out
[email protected] Nathaniel Frank 2010-03-16 22:34:14 all systems nominal
[email protected] Nobody 2010-03-16 22:34:24 good to know
[email protected] Nobody 2010-03-16 22:34:36 ttyl
[email protected] Nathaniel Frank 2010-03-16 22:35:52
:)
[email protected] Nathaniel Frank 2010-03-16 22:35:52 take care
[email protected] Nobody 2010-03-16 22:36:04 will do... donations coming in good?
[email protected] Nathaniel Frank 2010-03-16 22:37:09 not sure
[email protected] Nathaniel Frank 2010-03-16 22:37:21 experience in the past is that they don&apos:t tend to
In response to stories like this
[email protected] Nobody 2010-03-16 22:37:28 meh
[email protected] Nathaniel Frank 2010-03-16 22:37:32 makes people scared to donate
[email protected] Nobody 2010-03-16 22:37:34 too bad
[email protected] Nobody 2010-03-16 22:37:52 i would've
[email protected] Nobody 2010-03-16 22:37:59 if i saw that
[email protected] Nathaniel Frank 2010-03-17 22:32:26 what&apos:d your source say it was?
[email protected] Nobody 2010-03-17 22:39:49 it was very general
[email protected] Nobody 2010-03-17 22:46:62 organization-wide
[email protected] Nathaniel Frank 2010-03-17 22:40:17 interesting
[email protected] Nathaniel Frank 2010-03-17 22:40:35 what was the approach and motivation?
[email protected] Nathaniel Frank 2010-03-17 22:41:17 i wonder if this didn't stir up some intemal
dissent
[email protected] Nathaniel Frank 2010-03-17 22:41:42 must be some people not too happy about cracking
down on whistleblowers and following the Chinese...
dawgnetwori(@jabber.ccc.de Nobody 2010-03-17 22:41:55 indeed
ManningB_00124398
Forensic report Personal Computer
of PFC MANNING
i t
Attachment B
CAF 0028-10-C1D361
ROl 0028-10-CID221-10117
Sender Account Sender Alias Date-Time Message Text
[email protected] Nobody 2010-03-17 22:42:11 90% of the effort is on Chinese exfiltration of
documents
[email protected] Nobody 2010-03-17 22:42:22 it was a blog posting
[email protected] Nathaniel Frank 2010-03-17 22:43:01 well, that is a genuine problem
[email protected] Nathaniel Frank 2010-03-17 22:43:16 Israeli and russian exfiltration too
[email protected] Nathaniel Frank 2010-03-17 22:44:02 trench as well
[email protected] Nobody 2010-03-17 22:44:06 It warned about not visiting the blogs, because the
document and its contents is still classified
[email protected] Nobody 2010-03-17 22:44:17 gave a link the to the report through proper channels
[email protected] Nathaniel Frank 2010-03-17 22:44:31 although knowledge tends to be stabalizing
[email protected] Nathaniel Frank 2010-03-17 22:44:34 if you take a big picture perspective
[email protected] Nobody 2010-03-17 22:45:17 it almost pleaded people not to send anonymous
documents, mentioning courage and personal trust...
and told people to go through proper channels if they
have an issues
[email protected] Nathaniel Frank 2010-03-17 22:45:24 open skies policy was stabalizing
[email protected] Nathaniel Frank 2010-03-17 22:45:44 so perhaps an open net policy is called for;)
[email protected] Nathaniel Frank 2010-03-17 22:46:23 that's reasonable, though doesn't work in
practice...
[email protected] Nathaniel Frank 2010-03-17 22:46:27 what'd they say about courage?
[email protected] Nobody 2010-03-17 22:46:38 i can send a copy
[email protected] Nathaniel Frank 2010-03-17 22:46:40 that it'5 contagious? ;)?
[email protected] Nobody 2010-03-17 22:46:53 but its non-rel
[email protected] Nathaniel Frank 2010-03-17 22:47:00 yes
[email protected] Nathaniel Frank 2010-03-17 22:47:32 subsys is really good these days
[email protected] Nathaniel Frank 2010-03-17 22:48:09 please mari^ non-release, found on usb stick
[email protected] Nobody 2010-03-17 22:48:55 k
[email protected] Nathaniel Frank 2010-03-17 22:49:00 outed another spy this afternoon
[email protected] Nobody 2010-03-17 22:49:16 ??
[email protected] Nathaniel Frank 2010-03-17 22:49:27 local
[email protected] Nobody 2010-03-17 22:49:34 gotchya
[email protected] Nathaniel Frank 2010-03-17 22:49:38 police, watching one of my hotels
[email protected] Nathaniel Frank 2010-03-17 22:49:50 insider also confirmed
[email protected] Nathaniel Frank 2010-03-17 22:49:58 we have access to the fieet tracking system ;)
[email protected] Nathaniel Frank 2010-03-17 22:50:41 just got hold of 800 pages of interrogations docs and
another 40gb of .is privatization / banking stuff
[email protected] Nathaniel Frank 2010-03-17 22:50:51 this country is going to melt...
[email protected] Nathaniel Frank 2010-03-17 22:50:55 saw the film today
[email protected] Nathaniel Frank 2010-03-17 22:51:04 it'5 looking great
[email protected] Nobody 2010-03-17 22:51:31 what film?
[email protected] Nathaniel Frank 2010-03-17 22:51:50 projectb
[email protected] Nathaniel Frank 2010-03-17 22:51:58 the massacre
[email protected] Nobody 2010-03-17 22:52:01 gotchya
[email protected] Nobody 2010-03-17 22:52:32 uploaded file
[email protected] Nobody 2010-03-17 22:53:01 marked as requested
[email protected] Nathaniel Frank 2010-03-17 22:53:11 thanks
[email protected] Nobody 2010-03-17 22:53:18 nip
[email protected] Nathaniel Frank 2010-03-17 22:53:20 you're great
[email protected] Nathaniel Frank 2010-03-17 22:54:03 is there some way i can get a cryplophone to you?
[email protected] Nobody 2010-03-17 22:54:14 not at this fime
[email protected] Nathaniel Frank 2010-03-17 22:54:40 actually...
[email protected] Nathaniel Frank 2010-03-17 22:54:47 probably best if you Just order one?
[email protected] Nathaniel Frank 2010-03-17 22:54:57 or rather some friend
[email protected] Nathaniel Frank 2010-03-17 22:55:14 bit pricy though
[email protected] Nathaniel Frank 2010-03-17 22:55:26 hmm
[email protected] Nathaniel Frank 2010-03-17 22:55:29 actually never mind
[email protected] Nobody 2010-03-17 22:55:38 yes, i dont have access at present
ManningB_00124399
Forensic report Personal Computer
OfPFC MANNING
12
Attachment B
CAF 0028-10-CID361
ROl 0028-10-C1D221-10117
Sender Account Sender Alias Date-Time Message Text
[email protected] Nathaniel Frank 2010-03-17 22:56:35 these things are good for urgent contact, but it's
safer to avoid due to location tracking possibilities
[email protected] Nobody 2010-03-17 22:56:47 i know that very well
pressassociation @Ja bber. CCC. de Nathaniel Frank 2010-03-17 22:56:56 although there is a satphone module
[email protected] Nobody 2010-03-17 22:57:21 forget the idea for now
[email protected] Nathaniel Frank 2010-03-17 22:57:45 yes. you just contact us
[email protected] Nathaniel Frank 2010-03-17 22:57:52 but don't disappear without saying why for an
extended period or l&apo5;ll get womed ;)
[email protected] Nobody 2010-03-17 22:58:03 i wont
dawgnetwori<@jabber.ccc.de Nobody 2010-03-17 22:58:16 you'll know if something&aposis wrong
[email protected] Nathaniel Frank 2010-03-17 22:58:39 ok
[email protected] Nathaniel Frank 2010-03-17 22:58:57 you can just tell me "all the ships came in"
[email protected] Nathaniel Frank 2010-03-17 22:59:09 via email or any other mechanism
[email protected] Nobody 2010-03-17 22:59:15 >nod<
[email protected] Nathaniel Frank 2010-03-17 22:59:44 will be doing an investigative joumo conf in norway
this week end, so may be out of contact most of the
time
[email protected] Nobody 2010-03-17 22:59:55 its good
[email protected] Nathaniel Frank 2010-03-17 23:00:17 ok.
[email protected] Nathaniel Frank 2010-03-17 23:00:27 off to do some work.
[email protected] Nobody 2010-03-17 23:00:43 k, but def read the reflection 1 sent
[email protected] Nathaniel Frank 2010-03-17 23:00:53 i will
[email protected] Nathaniel Frank 2010-03-17 23:01:01 now
[email protected] Nobody 2010-03-17 23:01:03 toodles
[email protected] Nathaniel Frank 2010-03-17 23:12:56 heh
[email protected] Nathaniel Frank 2010-03-17 23:13:15 i like it. free advertising to just the right market
[email protected] Nobody 2010-03-17 23:23:14 >nod<
[email protected] Nobody 2010-03-17 23:23:30 the tone is what interests me the most
[email protected] Nathaniel Frank 2010-03-17 23:23:45 yes
[email protected] Nobody 2010-03-17 23:23:47 its not really a threat, its a plead
[email protected] Nathaniel Frank 2010-03-17 23:23:55 slight desperation
[email protected] Nathaniel Frank 2010-03-17 23:24:00 yes
[email protected] Nathaniel Frank 2010-03-17 23:24:08 interesting approach
[email protected] Nobody 2010-03-17 23:24:21 l ow, no-one knows what to do
[email protected] Nathaniel Frank 2010-03-17 23:24:40 threats wori< better with most, but perhaps they see
that our sources are resistant to them anyway...
[email protected] Nathaniel Frank 2010-03-17 23:24:54 so pleading is the only thing left
[email protected] Nobody 2010-03-17 23:25:34 im sure it was brought on by discussions that showed
slight sympathy
[email protected] Nathaniel Frank 2010-03-17 23:27:28 yes
[email protected] Nathaniel Frank 2010-03-17 23:27:46 i think your intuition is correct
[email protected] Nobody 2010-03-17 23:28:32 "if we can't scare them, lets ask
nicely"
dawgnetwori(@jabber.ccc.de Nobody 2010-03-17 23:33:39 the hackers that these governments hire, the good
ones... they&apo5;re the cats that can only be herded
by food... but when the cat food runs out, or they get
treated rough... they'd be the first to dissent
[email protected] Nobody 2010-03-17 23:34:21 food meaning money, of course... and treatment
being, well, treatment
[email protected] Nobody 2010-03-17 23:34:42 weird analogy, i know... lol
[email protected] Nathaniel Frank 2010-03-17 23:38:21 yes
[email protected] Nathaniel Frank 2010-03-17 23:38:34 that's possible
[email protected] Nathaniel Frank 2010-03-17 23:39:09 and there are social vales that arise out of the internet
that have evolved beyond those inside the isolated
military-contractor complex
ManningB_00124400
Forensic report Personal Computer
of PFC MANNING
13
Attachment B
CAF 0028-10-CID361
ROl 0028-10-C1D221-10117
Sender Account Sender Alias Date-Time Message Text
[email protected] Nobody 2010-03-18 00:04:31 its like a classroom run by an overbearing teacher...
when a kid strikes back anonymously by sabotaging
the desk... the other kids get a little excited and
rowdy, because they wanted too, but were afraid of
getting caught... the teacher is embarassed and cant
control the kids, so the teacher just makes an
announcement that the students should continue
working quiety after they have a look at the mess on
the desk that the teacher is cleaning up
dawgnetwort(@Jabber. ccc. de Nobody 2010-03-18 00:05:11 i think thats a better analogy
[email protected] Nobody 2010-03-18 00:37:17 <div><a
href=http://freedomincluded.com/index"><span
style="background-color: #ffffff; font-family: Helvetica;
font-size:
12pt;">http://freedomincluded.com/index</span></a>
<span style="background-color: #ffffff; font-family:
Helvetica; font-size: 12pt;"> <- recommend: fi-ee (as
in freedom) hardware vendor"
[email protected] Nobody 2010-03-18 08:39:52 wtf is wrong with LTC Packnett xD
[email protected] Nobody 2010-03-18 08:40:59 you don't confirm, or even come off as poss bly
confirming shit...
[email protected] Nobody 2010-03-18 08:41:22 lol, slipped up in your favor, i guess
[email protected] Nathaniel Frank 2010-03-18 08:41:31 eh?
[email protected] Nobody 2010-03-18 08:42:06 NYT article has LTC Packnett allegedly confirming the
authenticity ofthe 2008 report posted on 15th
[email protected] Nathaniel Frank 2010-03-18 08:42:17 yes
[email protected] Nathaniel Frank 2010-03-18 08:42:19 hilarious
[email protected] Nobody 2010-03-18 08:42:57 i dont think he's going to continue to be the Ml
spokesperson
[email protected] Nathaniel Frank 2010-03-18 08:43:04 they do break these mles though when being
hammered
[email protected] Nobody 2010-03-18 08:43:15 im sure
[email protected] Nathaniel Frank 2010-03-18 08:43:41 refijsing to confirm does make them look shadowy
and untrustworthy
[email protected] Nobody 2010-03-18 08:43:45 i just didnt realize how little it takes for them to cave...
[email protected] Nobody 2010-03-18 08:43:55 true, but... im shocked
[email protected] Nathaniel Frank 2010-03-18 08:44:12 yeah., but remember., rules are just for the grunts :P
[email protected] Nathaniel Frank 2010-03-18 08:44:32 like no spying on citizens at the nsa
[email protected] Nobody 2010-03-18 08:44:43 which is common
[email protected] Nobody 2010-03-18 08:45:57 "oh fuck, this might be a US citizen...
shouldn&apo5;t we get this checked by the
FBI..." "Fuck that, FBI is slow as fuck,
we'll just keep listening in, capture him, and
then tum him over"
[email protected] Nathaniel Frank 2010-03-18 08:48:27 i prefer Jen. also, too masculine looking
[email protected] Nathaniel Frank 2010-03-18 08:48:57 heh
[email protected] Nathaniel Frank 2010-03-18 08:48:59 nevermine
MannlngB_00124401
Forensic report Personal Computer
OfPFC MANNING
14
Volumes.txt 12/17/2010
/Volumes/100215 0621/B9817BE2-
FDDC-102D-60B3478 6952A5C90/12_0950D_JUL_07_SAF_ATTK_ON_l-8...CAV_IN_NEW_BAGHD.i^D.
ppt
/Volumes/100215_0621/B9817BE2-FDDC-102D-60B34786952A5C90/12 JUL 07 CZ
ENGAGEMENT ZONE 3 0 GC Anyone.avi
/Volumes/100215 0621/B9817BE2-FDDC-102D-60B347869 52A5C90/B9817BE2-
FDDC-102D-G0B34786952A5C90.zip
/Volumes/100215_0621/i1/10REYKJAVIK13.txt
/Volumes/100215_0621/il/persons/Sigurdardottir.pdf
/Volumes/100215_0621/il/persons/Skarphedinsson.pdf
/Volumes/100215_0621/il/wl/c3.txt
/Volumes/100215_0621/il/10REYKJAVIK9.txt
/Volumes/100215_0621/il/10REYKJAVIK4.txt
/Volumes/100215_062l/il/10REYKJAVIK3.txt
/Volumes/A 00215_0621/il/persons/Jonsson.pdf
/Volumes/100215_0621/il/09REYKJAVIK228.txt
/Volumes/100215_0621/il/wl/IIR 5 391 0014 08 C l a s s i f i e d Documents on
Wikileaks.pdf
/Volumes/100221_0141/7b3If6a.zip
/Volumes/100224.0301/
/Volumes/100302_0316/d5463a29.zip
/Volumes/100304_2258/20100304-propaganda_notes.txt
/Volumes/100304_2258/20100227-0900_arrest.pptx
/Volumes/100304_2258/20100227 090038SMB4642086890-arrest.txt
/Volumes/100304_2258/photos/SDC10153.JP
/Volumes/100304_2258/photos/SDCl0150.JPG
/Volumes/100304_2258/photos/SDClOlSl.JPG
/Volumes/100304_2258/photos/SDC10148.JPG
/Volumes/100304_2258/photos/SDC10156.JPG
/Volumes/10030'1_22 58/photos/SDC10155 .JPG
/Volumes/I00304_2258/photos/SDClOl54.JPG
/Volumes/I00304_2258/photos/SOCIO153.JPG
/Volumes/100304_22 58/photos/SDC10152.JPG
/Volumes/100304_2258/photos/SDC10149.JPG
/Volumes/100304._2258/20100304-propaganda_translation.pdf
/Volumes/100308_0142/74b39ef6.zip
/Volumes/100308_0925/
/Volumes/100311...0856/success, zip
/Volumes/1003221255/blah.zip
/Volumes/100324.1156/6e34680e.zip
/Volumes/100328.1723/05000.zip
/Volumes/100330_1737/
/Volumes/100330.1852/
/Volumes/100331.1015/
/Volumes/100331.1542/export.CSV
/Volumes/100331.1542/split.zip
/Volumes/100401 1754/
/Volumes/100401.1948/105000.zip
/Volumes/100405._1225/dirf i l e . zip
/Volumes/100407.1250/split.zip
/Volumes/100407.1250/split_2.zip
/Volumes/100408.1833/
/Volumes/100410.1330/
/Volumes/100411.0918/farah.zip
/Volumes/100411.0918/split.zip
/Volumes/100412.1907/overall.zip
/Volumes/100419.1656/20100419-receipt.reguest.pdf
/Volumes/100423.1851/1 2 JUL 07 CZ ENGAGEMENT ZONE 30 GC.avi
/Volumes/100427.2030/12 JUL 07 CZ ENGAGEMENT ZONE 30 GC Anyone.wmv
/Volumes/100427.2030/cia.blah.txt
/Volumes/1005041845/files.zip
39
ManningB_00378176 PROSECUTm^'HX -
PAGE OFFn;\ . ADM; j I'EL
PAGE OF PAGES
%
ManningB_00199454
PROSECUTION EXHIBIT for ideptificaf^n
PAGE OFFERED: PAGE ADMITTED:
PAGE OF PAGES
110922\MANNING.SDCard\E1\AttC\yada.tar.b22.nc
Items of Historical Significance for Two Wars:
Iraq and Afghanistan Significant Activities (SIGACTs) between 0000 on 01 JAN 2004 and
2359 on 31 DEC 2009 (Iraq local time, and Afghanistan local time)
CSV extracts are from the Department of Defense (DoD) Combined Information and Data
Exchange (CIDNE) Database.
It's already been sanitized ofany source identifying information.
You might need to sit on this infonnation, perhaps 90-180 days, to figure out how best to
release such a large amount of data, and to protect source.
This is possibly one of the more significant documents of our time, removing the fog of war,
and revealing the true nature of 21st century asymmetric warfare.
Have a good day.
p-
ManningB.00199473 r / \ u i i _OP____PAGES' README.txt
SECRET/ / >J0F0RN
UNCLASSIFIED//FOR OFFICIAL USE ONLY
07 Jan 2010
(U) MARFOREUR G-2 TRIP REPORT'
(U) Traveler: Staff Sergeant Matthew Hosburgh
(U) Purpose: Chaos Communication Congress 26C3 Here Be Dragons Conference
(U) Dates: 26-30 December 2009
(U) Location: Berlin, Germany
(U) Executive Summary. The Chaos Communication Congress conference is an annual
event that attracts hackers, security researchers, computer hobbyists and malicious
computer users. This yeaf s conference marked the 26* year anniversary of the congress.
The conference title was Here Be Dragons which is a reference to medieval times where
explorers would put dragons or other serpents to mark dangerous or uncharted territories-
-an attempt to explain the conference's purpose in exposing"uncharted territories in
computer, phone, and other systems. The conference began on 27 December 2009 and
lastW until 30 December 2009. There were some good talks about security and some
rather alarming developments in the"uncharted territory!' A majority of the security
discussions were in German which prevented attendance because of the language barrier;
however, a large amount of the discussions were in English and catered to the
international audience. I personally attended the following talks: Lightning Talks-Day 1;
Why Net Neutrality Matters?; WikiLeaks Release 1.0; Exposing Crypto Bugs through
reverse engineering; Tor and censorship: lessons learned; SCCP hacking, attacking the
SS7 & SIGTRAN applications on step further and mapping the phone system; DDoS /
botnet mitigation & hosting online communities; Using OpenBSC for fuzzing of GSM
handsets;'Yes We Can't!'-on kleptography and cryptovirology; Black Ops of PKI.. A
detailed explanation, assessment and countermeasure (if applicable) can be found below.
1. (U) Lightning Talks - Day 1. Lightning Talks were a two hour forum where
basically members of the hacking community could present a topic or announce
an event for approximately four minutes. During this talk, there were
MARFOREUR AC/S G-2 Comment: This paper has been declassified on 05 March 2012 in
accordance with the procedures set forth in DoD Instruction 5200.1-R (Infonnation Security Program;
January 1997). Prior to declassification, this paper was reviewed by the MARFOREUR AC/S G-2 (Senior
Intelligence Officer), MARFOREUR AC/S G-6 (Senior Communications Officer/Chief Information
Officer), USEUCOM J2 (Cyber Intelligence Division), USEUCOM Foreign Disclosure Officer, and
USEUCOM SSO (INFOSEC Branch), all of whom concurred that the information contained herein does
not exceed a level of UNCLASSIFIED//FOR OFFICIAL USE ONLY. The paper's author, SSgt Matthew
Hosburgh, was dischared from the United States Marine Corps in June 2010 and therefore was not
available to participate in this declassification review.
SECRET/ / N0F0RN
UNCLASSIFIED//FOR OFFICIAL USE ONLY
I^-
PROSECUTION EXHIBIT MC> for id/htificatioi
A rw/narTRn-
_^ ification
Mai n. e. oo4. . e ;^:g:5A(!'^''''''''''
^ECRET/ ZNOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
presentations onT^-Be-Gone(auniversaI remote that can tum offtelevisionsets
^omadistance),andafewotherprcjectsthatwerenotofmuchsigni^cance.
a. (II) Analysis: This forum seemed varyinert. There was alsoalack of
speakers fi:^r dayoneasthe Intemet ^rthe conference centerwas down
andalotofthepresentations were stored onawebsiteon the Intemet.
b. (^^Countermeasure: N/A
2. (ll)^hyNetNeutralityl^atters7Netneutralityisfastbecomingahottopicin
theintormationtechnologyworld. Essentially,this talk presented what it isaway
^r an ISP companies to more tightlyregulate levels ofservice to the user. This
could be in the form ofmakingusers pay for exactly what they need on the
Intemet. For example, an ISP could provideacustomerwith three packages to
choose 8^om,sayl-3. Packagelcould cost ^30 per month and only allow
access to Google searching and news websites. Package2could allow more
access fi:^r^Opermonth including email, web browsing, and access to banking
sites. Pa^age3couId be the ^^pr^ium package''as it would allow access to
music,YouTube and othermedia sites (to include packagesl-2). The ISPs
would be able to regulate the intemet content and not just bandwidth. This is the
core issue: limiting access to content and not bandwidth. The talk made the case
the Intemet should be kept open and ^ee. Jeremie2^immermanwasthepresenter
(aPrench citizen) and he said his organization had been lobbyingthe French
politicians to keep the Intemet open. Hispleatoeveryoneattheconfi^rencewas
to lobbyinourrespective countries to keep the Intemetthe way it is today.
a. ^(S^/NF)(ll//FOLIO) Analysis: I^eepingthelntemetneutralhas its
benefits. It allows the ^eeexchangeofideas which promotes global
communications. Basically,the Intemet is the same no matterwhereone
is in the worId(relativeIy speaking). Taking the openness out ofthe
Intemet would hinder global communications and business. On the
flipside, the Intemet, as it stands today,isaplaygroundfi:^r malicious users
(creating viruses, cyber ^aud, child pomography,and other crimes).
Further, the Intemet is an essential communication tool fi:^r terrorists.
Terrorists cells can use the Intemet toobscuretheirtraflic, as well as,
other tools to enerypt, hide and send messages. By filtering the Intemet,
this problem may be minimised, but atthe cost oflostrevenueand
8^eedom of speech.
b. (1^ Countermeasure: N/A
3. (11^) WikiLeaks l^eleasel.^. Wikileaks.org, isapublicly accessible Intemet
Website where individuals can contact with leaked information and have it
publishedtothepublicanonymouslywithout fear ofbeing held legally liable.
The infi:^rmation that can be leaked includes, but is not limited to, classified
infom:iation,tradesecrets, corporate information, personally identifiable
information, and even operational data. The goal is to promote ^^open-ness" and
OECRET^^NOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
l^afioifigB_0041^547
SECRET/ / NOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
toensurethepublicis^^wellinfdmied" to what'sreaIlygoingon.The founders of
WikiLeaks claim that they have not had any oftheir sources compromised or
uncovered. Oneofthe most alarming pieces ofthe talk was that WikiLeaks was
se^ingto obtain^^off shore" storage and dataprocessingoftheir site so that they
wouldnot be bound toU.S. law. This concept is similarto that oftheprovei:biaI
^^Swiss bank account."
a. (l^^i^P) (11//F0110) Analysis.WikiLeaksrepresentsapotentiaIfi:^rce
protection, counterintelligence, operational security(OPSEC), and
infomiationsecurity(INFOSEC)threattoMARFOREUR/AF.The
intentional orunintentional leaking and posting ofUS Marine Corps
sensitive or classified infi:^i:mation to Wikileaks.org posesalargethreatnot
only ^om the external disclosure, but 8^om the insider. Theinsiderwould
be able to easily leak information without fear of any direct, individual,
repercussions. Further, when the off-shore storage is implemented,
WikiLeaks will have more latitude to distributeand publish leaked
information as it will not be bound byU.S. law.
b. (F0110)C^untermeasure:ForMARFOREUR/AF,ensurethat
employees aregiven annual securitytraining. Remind cleared individuals
oftheir agreement to safeguard 9nd not disclose classified orsensitive
infi:^rmation. Enfi:^rce document accountability. Ensure that classified
infi:^rmation that is no longerneeded is properly disposed of Recommend
implementingacontrol to ensurethatwhoeverprints, the document and
userisIoggedfbralIsystems(unclass-SCI).Enforcethesecureprint
feature fbrtheprinters in the hallway,that is, where uncleared individuals
maybe in contactwiththeprinters.
(11) Exposing Crypto Bugsthroughreverseenglneerlng^This talk was given
by Philippe OechslinofObjectifSecurite. HeisalsoaFrench citizen. His talk
was aimed at explaining how poorcodingofprograms could beawaytoattacka
system vice tryingto break theencryption algorithm. Essentially, exploiting bugs
tobreak-in/manipulateadeviceorsystemvicetryingtoexploittheencryption
algorithm, such as AES or 3DES.T^e devices he demo'dwere the MXI Stealth
(aFIPSI42-3IeveI2certified USB flash drive), the EISSTE-Capsule(an
electronic safe for data), and the Data BeekerI^rivate^afe(anothereleetronie
safe). Duringhis demo, he showed how he could break^in to the devices, by
reverse engineering the code using publically available Hex Editors and
commercial tools. He used the poorly written code to obtain access to the
devices.
a. ^i^F)(l^//F01^0) Analysis. Based on thedemonstration, standard
crypto algorithms, such as, AESand3DES are very secure ifimplemented
correctly. Theywill thwart any currenttypeofbrute force attack.
However,iftheprogrammer does not implement the crypto correctly,the
deviceorprogram can beexploited or access can beobtained. The crypto
SECRET/ / NOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
l^aofiifigB_0041^54^
5 ECRET/ / N0 F0 RN
UNCLASSIFIED//FOROFFICIALUSEONLY
will remain unbroken, but the device or software can be broken because of
poorimpl^entation and reverse engineering,
b. (^//NF)(1^//F01^0) Countermeasure. EnsurethatUSB devices, that
are relied on to provideadegreeofsecurityusing crypto, are certified by
the NSA or other agencytoensurethatthey are indeed secure and ^ee
^mbeingreverseengineered. Simplybuyinga^^secureUSB"device
^ m the PX is not an option i f i t not approved. Guard the keys to decrypt
the device likeapassword and do not write them down. Use complex
passphrases to secure the device andnot an easily guessable word or
phrase.
(1^) T^ran^eens^rshi^: lessons leame^.Toris an acronym forthe The Onion
Router." It isanetwork spread across theglobe and its aim is to provide
anonymity and obscurityto its users. There are seven ^^oot" servers that are
maintained by staffmembersoftor and otherrelaynetworks hubs that users can
setup to host an instance ofTor at their location. Toris becoming ^uite popular
today among many censored users, for example: China and Iran. Because China
and Iran block and filter content,Tor is used to circumventtheserestrictions.Tor
isfurtherbecomingmoreofahard-to-pin-downanonymizer. RogerDingledine
was the speaker. He gave the current state ofTor in the world and how it was
being utilized. Even af^er China attempted to blockTor, the network evolved as
is still able to function despite the blockage. An alarming statement made by one
ofhis colleagues was that ^^e"^^shouIdgetjobs at Cisco, Symantec and other
securitycompaniestofindoutwhattheirintentionsareforbuildingthesesecurity
appliances(firewalls, IDS, etc) and leak them to WikiLeaks." His colleague
blamed the securityvendorsfi:^rmaking it easy fi:^r governments to censorits
people and thus the need to find out why and how theyweregoingto develop the
next device to make filtering easier for an organization. Hefi^erw^tontosay
that knowing why and how they are filtering will allow ^^the community" to
respond by catering securityappliances toward organizations (businesses)and not
governments fi:^r censorship.
a. ^^(l^i^i^^^(I^/^01^0) Analysis.TorisanefIectivetoolthatp^^^
browser anonymity and obscurity on the Intemet. It is 8^ee software
available to the world. The threat it poses is that it makes itverydif^cult
to know wherecertain traffic is coming 8^om. ForexampIe,amalicious
attacker could useitto obscure his or her IP address.
MARFOREUR/AF's systems could be attacked by China and we would
not know where they are coming ^om. The threat posed by this is not
necessarily and insider one, it is primarily an outside threat. It would
make it very difficult to monitor traflic of an individual/organization
utilizingTor.
b. ^(^(ll//FOUO)C^untermeasure. Atthis point, there is notmuch in
the way of defenseas the ^^standard" filtering ofTortrafl^ccan be
circumvented by way of usingarelaycircuitwithintheTornetwoi^.
^ECRETZ/ NOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
^aofiifigB^0041^54^
^^ECRET/ ZNOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
Educate the users and the IA personnel on the power ofTorto hide where
attacks may be coming ^om.
(U^SCCPhaeking^attackingtheSS7^SlGTl^ applications ousted
further an^ mapping the ^h^ne system. In this talk, Philippe Langolis
discussed the current state ofthe phone system. Hesaid,^^SS7 is like TCP/IP in
thel990s.Itused to be i^uiteasecure network because nobody outside the
organizations (here, the mobile operators and telecom companies) were connected
to it. Now it^s getting interconnected to new actors which are not that trustworthy.
He fi^erwent on to saythat the Blue Box (used togenerate tones which can
access the ^^supervisory" function ofthephonesystem. From there, additional
tonescanbeused to generate desired eflects) is makingacome back. There^sa
world beyond pure SS7: the phone system applications themselves and most
notably what transforms phonenumbers into telecom addresses(also known as
Point Codes, DPCs and OPCs; Subsystem Numbers, SSNs and othervarious
fun.), and that^s called Global Title Translation. Few peopleactuallyrealize that
thenumbers they arepunching on theirphoneareactuallythe same digits that are
used fi:^rthis critical translation fiinction, and translate these into themythical
DPCs, SSNs and IMSIs.Moreandmoredatais now goingthrough the phone
netwo^, creatingmore entry point forregular attars to happen: injections,
overflow,DoS by overloading capacities. The mobile part is openingup, thanks
to involuntary support 8^om Motorola, Apple and Android."
a. (U^Analysis.Theattack surface for GSM is increasing daily. With more
entry points, the technology is at the tip ofthe security nightmare iceberg.
More securityproblems will ensue in the next few years.
b. (1^ Countermeasure. N/A.
7. (l^)DD^S/b^tnetmitigation^hostingonlineeommunities.ThistaIk
discussed the ^^business" of running an online community,suchas,asocial
network, newsgroup, etc. The discuss honed in on what needs to happen while
experiencingaDenialofService (DoS) attack. Essentially,the speaker stressed
the need to haveagood relationship with the ISP orwebhosting service incase
something out ofthe ordinary should happen.
a. (^Analysis.This discussion was relatively inert; however, it does go to
show that the sophistication ofsome ofthe ^^derground" online
communities are looking at hosting as more ofabusinessin such to keep
their communities up incaseofadisaster or attack.
b. (1^ Countermeasure. N/A.
^. ( f us i ng OpenBSCforfu:^ng of GSM^han^sets. More tools are available to
attackers looking to exploitingtheGSM netwoi^.Thisdiscussionpainted the
picture as to the current state ofthe GSM attack surface. The GSM protocol stack
^^ECRETZ/ NOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
l^aiifiifigB^00412550
5 ECRET/ / N0 F0 RN
UNCLASSIFIED//FOROFFICIALUSEONLY
isacommunications protocol stack like any other. There are many layers of
protocols, headers, TL^^s, length fields that can ^^accidentally^^ be longer or
shorterthan the actual content. There are timers and statemachines.Wrong
messages can triggerinvalid state transitions. This protocol stack inside the
telephoneis implemented inCIanguageon the baseband processoronareal-time
operating system without anymemoryprotection. This flaw means that the attack
surface is increased; especiaIIy,becauseofOpenBSC. OpenBSC isatool that is
^eelyavailable that can be used for GSM protocolhacking.
a. ^^^(8i^i^^(l^//F01^0)Analysis.GSMnetworkshave,forthemos^
been offlimits for attackers(phreakers)historicalIy speaking. With the
release ofthese^eelyavailableGSM protocol tooIs(OpenBSC), the
avenues for attacking GSM hasgreatlyincreased. This could bea
precursor forasecurity nightmare on the GSM network. Expecttosee
moreattacks on the GSM network in the nearfuture.
b. ^(S//NF)(ll//F01^0)Countermeasure.Enfi:^rcingOPSECand
INFOSEC training isamust. As the GSM network can be attacked by
anyone not only fi:^reavesdropping, but for denying service. Consider
using secure Iridium phones whenever practical.
9 (II) ^^Yes^eCan^tl^-onldleptographyan^ cryptovirology. What is
kleptogr^hpy and cryptovirology? IGeptography(the art of employing public key
cryptographymaliciouslyaspartofamalwareatta^,suchasinransomware)and
thereIatedcryptoviroIogy(the art of embedding cryptographic Trojans inside
tamper-proof cryptosystems). Duringthis talk Dr. MotiYung discussed some of
therealitiesofthese threats. Hedidn't go into detail ofhow to employ the two,
but he did underscorethesecuritythreatthatthe two malicious attacks can
present.Thisisaninstancewheresomethingthatwasdevelopedtobringsecurity
and peaceofmindhasbeenmanipulated into somethingthat an attacker can use
to blackmail and/or attack withoutmuchefldrt.
c. (l^)Analysis.These two attacks are veryserious and can be difficult to
attack and remedy. Traditional virus signatures will haveahard time
recognizing cryptovirology. Phishing attacks, especially brought on by
poorOP^ECandPII practices, make this attaekeasierto be
conducted.
d. ^(^(l^//F01^0) Countermeasure. Ensure that users are briefed about
phishing and spearfishing attacks. I^eep virus definitions up-to-date and
ensure that email signatures are being utilized within MARFOREUR/AF.
At home, do not open email that you do not know the sender. Beweary,if
adeal sounds toogood to be true, it most likely is.
10. (11) Black Ops ofPl^.This talk wasgiven by Dan l^^aminsky. He isa
penetration tester ^rasecurity company in the US. He made the case fi:^r the
insecurity ofPI^I on the Intemet. Mainly, because ofthe lack oftrusted
SECRET/ / NOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
l^afifiifigB_0041^551
^ECRETZ/ NOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
certificateauthoritiesit is fartooeasytoobtaina^^alid" certificate. Further, he
explained some ofthe common ways tomas^ueradeasavalidcertificatein
several different web browsers (IntemetExpIorer being one). He went on to
praisetheDoD for havingaworkingPI^I system. Fortheopen Intemet, he said
he had hope in Secure DNS inhopefuIIycu:ibingthenumberof
invalid/unauthorized certificateauthorities.BasicaIIy,makingitharderto obtain
acertificateand makingP^I more secure.
a. (1^ Analysis. Secure DNS will help with the issueofcertif^cateauthority
on the Intemet. It is scheduled to be released within about six months.
The current state is that Pinion the Intemet should not be considereda
means to identify an entity oruser is who they saytheyare.The DoD
should continueto implement and secure the PI^ICAs to ensure the
in^astructure validity.
b. (11^ Countermeasure. Ensure thatusers at MARFOREUR/AFareaware
that the Pinion the Intemet is notthesameasPI^I within the DoD. It is
notsecure,so do not trust it like you wouldatwork. Not to say it cannot
be trusted, it justneeds to be scrutinized more.
(l^Conelusion.The Chaos Communication Congress 26C3 Here Be Dragons
conferencewasagood security conference to attend. It explored the ^^out-of-band"
securityissues faced bysystems currently employed bythe world and specifically, the
DoD(MARFOEUR/AF). Theconfi^renceprovidedagood means to observe the hacker
communityinEurope. Thetalksprovidedinterestingandthoughtprovokingsecurity
discussions which can be used to provide awareness at MARFOREUR/AF. FromwhatI
gathered, there were no impending direct attacks (hacks)on US Persons or
MARFOREURattheconference.
M. J. HOSBURGH
SECRET/ / NOFORN
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ManningB_00412552
Prosecution Exhibit 44
7 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
prosecution Exhihit 4^
^2 pages
classified
"SECRET"
ordered sealed for Reason2
military ^udge^s Seal ^rder
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
prosecution Exhihit 4^
has heen entered into
the record asaCT^^T^^T^
and will he maintained
with the original
Record ofTrial
prosecution Exhihit 4^
has heen entered into
the record asaCT^^^^T^
and will he maintained
with the original
Record ofTrial
prosecution Exhihit 4^
ICT^
classified
"SECRET"
ordered sealed for Reason2
military ^udge^s Seal ^rder
dated20August201^
stored in the classified
supplement to the original
Record ofTrial
! - flame
Lat
I I MI t en
.-E.: {3w^aJE53uBBBB%. . . . .
_j afg.everts.csv 01/03/10 12:47:50AM
j J fq_evefi*s.csv Ol/OS/1002.S6:iaW
README txt 01/09/10 03:16:04AM
.J^EADME.brt 01/09/10 03:16:04AM
ManningB_00125328
PROSECUTION EXHIBIT 56 for identification
PAGE OFFERED: PAGE ADMITTED:
PAGE OF ^PAGES
G LOO LOOO aGuiuuei/M
<a
3"
Q)
3
3
3"
^
Oi
o-
o
c
3^
0) <D
3 (D
C 3
s- S
! M 5r (D
K)
K)
(D
^ H l
<
w"
^ H l
o
3
O
w
Q)
3
o
(D
o
o
3 _
(D 2
5 3
<D 5 ^
3 <D 0
3 S ^!
i l l
0)
<
<D
^ H l
o
w
D)
3
a
o
(D
3
3
o
(D
(D
3 (Q
(D O
3
(f i
m
X
PROSECUTION EXHIBIT SjLfori^tificatim!
PAGE OFFERED: PAGE ADI/lTTED'
PAGE ^OF PAGES
^ LOO LOOO aBu!UUB|/\|
N>
w
(D
o
o
3
3
( Q
O
& )
a
(D (D
S QI
i 3
a . 3
CO %
^ S i
(D (D - h
o. O
o
Q.
VB
(0
m
3
(D
3
< D '
(fi
m
3
Q. ~
Q CD
=1 3
I I
CD
O Q)
S i
o" o
9 LOO LOOO a6u!UUB|/M
ro
(D
F ^ O
- I i
g-oT?
fi)
l l
^
0) %
3 ?
(/)
(/)
(5*
o
fi)
(/)
c
O"
(Q
"U
W)
fi)
(D
o H 3
O (D fi)
c q a:
3 o o
S" =5
*< (/) fi)
I?
< 5
2,3
< . 2 .
3 </)
cog
g - "
?
3
m
m
#
o
Q
o
3
o
3
fi)
3
O
3
(D
(D
fi) O fi) U S
C 57<Q 3.
Q. 3 fi) O 0)
(5 ' o. 5 ' 3 3
3 <D (/) 2
Slit
(D 3 ff
fi) S Q.
(O O -
(D 3"o
3 S-O
(?S5.s:
si i :
C rt^*<
^Si g
i " !
5 (?<
I' s
I I I
Hi
(D fi)"0
3 <D
0( QZ3
Sfa
3 t
^ " O fi)
(^(D
o a
CD
N>
N>
CD
si
o
o
Q.
CD
3.
3
o
CO o
CD - h
2, (g
o
M
(3)
CJl
9 LOO LOOO aGuiuuei/M
I
w
If
It
o ^
S>
(A
<f>
^
tf)
0) 0) 0)
3
<D
3
<
O
<
0)
^
tf)
Li
tf)
H
y
3
y
(D (D (D
(D
m
3
(D
3
o
tf)
w
& )
3
w'
va
tf)
"D
(D
O
(D
ru
CD
3-3
CQ "D
I
9L o
O
&i
m 6'
g's
LOO LOOO sGuiuuBi/M
(g
W
(D
0)
C
"O
"O
o
5
z
^
(D
<
(D
1
(D
<
3
<
o
p
u
!
<o
$
Q.
(O
3"
O 3
c
fi)
"O 3
0)
<
(n r
(D o
q o
i s
< CO
fi) ?
?s
(D 9
fi)
Q. ^
O ^
S5 <D
N3
O)
(D
(5'
^ 11
o
c
( / )
o
(D
fi)
3
O
(D
(D
(0 rn
fiT a
3 0
3
(D
( / )
^
fi)
fi)
O"
i >
57 Q)
I CD
o CL
(B Q)
m
3
^ ^ ^ ^
^LOOLOOOa^^^^^^l^
I I
3 3
CO CO
z
3 (D
fi)
n
ro
- >j
CJ
o
CO
c
o l ^ H I o. (D
. a, s
N r
2 5-
5 ^
$ a-
i^mm
o
9L
I
D
fi)
(D
a
fi)
90
^ ^ ^
^ ^
^ Oa
O 3
^ ^
^ ^
^ ^
^
o
^
^
o
co^
^
fi)
3
^
CO
o
o
^
c^
s^
^ I
^ ^
^
^
^
6 LOO LOOO aGuiuuei/M
>-o
l l
0)
3 CD
O ^ .
8=* 0)
N>
CO
CD
O
s
I "
Q) CD
g CO
co" ^
CD CO
" I
0) : ^
O
0)
Sg^ m
E. CD co_ q
^ ^ i ^
3 -o M
" i l l
^( o' : <
5
CD >
CO Q)_ ^
0) ' CO
5 Q)
wS g
^sl
i . g o'
o m
CO
_j CD
m 3
CD
CD
0)
3
>
CO
>i
w
0300 LOOO g6u!UUB|/\|
o
o
CD
3 >
j l
>^i -
o S fi)
fl) 0 T
CD O. ^
Q- ^ ^
fl) O g
5' o- 3.
_ (D
fl) 3
-Q CD
m
i t
s =
Q.
CD
o
CD
CO
n -0 I
O O fi)
=: CO
8 2.
cog
W fi)
CD a
O Q)
c o
3 . ^
< ^
m
aO
I\)
CO
i i
O 3
C fi)
"O
O "O,
CO
CO
fi)
(D
CO
O
SL
I
O
fi)
CD
o.
fi)
I f
Q) CD
Q- Q)
=7 fl)
fl) CD
-Q Q_
fl)
CD
- 1
o
X3
CD
co'
3
fi)
o
<
go
m Q_
_. fl)
fl)
_Q 3 -
^ fl)
>
D ^
^ m
H flT
Q) Q.
CL 73
^ %
c_ ^
5: 3
fl)
CL D
> DD
D J)
N " "
UJ
fi)
(O
L300L000 g6u!UUB|/M
m
X
eaOOLOOO a6u!UUB|/M
(fi
fi) fi)
S. 3
8S
X
(fi
(fi
l\)
hJ
O <D
Z 3
O (fi
a 3 </)
o
5. (D
(D
X
(D "O
g o
fi) 5 :
3 3 '
(Q
CO
<D
EZOOLOOO aGuiuuBj/M
o
3
CD
3
fi)
CD
O
$
U"
CD
3
CO
CD
O
^
O-
^300 LOOO a6u!UUB|/\|
3
CO
CO
CD
3
O
<
CO
"D
(A
3" fi)
O <
O *
? 3
- <
3
^. o
c <
3 ?
"O
CD 3"
Oa CD
? 5"
O CO
ll
?> w ^
D)
CD i
TT
(fi
<D &
I!
c
%
CJ
3
CQ
o
fi) - o
CO z j t
g CD ^
H?
Ill
<D p tf)
c
8 f w
3 3"
< fi)
w
#
7]
CD
O
3
CO
9200 LOOO a6u!UUB|/\|
I I I
O 7J
CD O =
< CQ 5
CD o ' ~
CQ
Q) (/)
m O
3 C
CD *<
CD
"D
Q}
3
o
( / )
CD
a
o
o
3
"U
(D
X
<j)
CD
m
3
CO
m
CD
O Q)
C T- i
CQ
CD
m
CD
K)
K)
Ul
CD
CO
S"
I
k 3
Q) CD
5 3.
o
o
0)
o
3
^ tfj.
CD Q)
I I
W
3
o
o
CD m
C/)
0)
Q.
CD
CD
CO
H
CD
3-g
3 CD
O =
3 3
CQ
CO
CD
CQ
3'
CD
CO
(3.
CD
CD
3
CO
CD _
i s
9
9300 LOOO a6u!UUB|/\|
CQ
CO
3
CD
CO
B
CD
CO
CD
CO
CD
3.
3
CO
w (fi
B
CD CQ
0) 3 '
3 ^
CO g :
O CD
CQ
0
0)
(D
Q.
rel
M m
Oi 73
Oi
>
T 3
E 2
Oi -t
3 SL
I
(fi
Oi
m
CO
B
CD
2300 LOOO a6u!UUB|/\|
ill
c o 3
i i |
h ^
CO C
I I I
| i
3- s; ^
w' "
(Q
a?
i l l
I f l
' i i
ST 3
<D
(D
I
3
O
?
Q.
5"
(Q
(D
A) ;^
(fi-
a
i^-
& )
(fi
3-
(D
g
3-
(D
o
3-
5
( % "
i
M S
=
(D C
O 0)
O ^
n
m
a
Q)
3
(fi
I
m
CO
B
CD
8300 LOOO aBu!UUB|/\|
M
N)
>!
o
m
CO
O
0)
o
>
o ^
w
_ Q)
fi)
cp|
3
3
fi)
fi) >
Z D
(fi fi)
gS.
3 fi)
CD
a
<D
(D
<D _
$ &
O
c
"O
( / )
CO
o
> >
(Q
CQ
m
(0
E
o
0) i n
CO d)
c 00
O CO
C^
<
CO
ManningB_00007351
^)
1^
PROSECUTION EXHIBIT 5% fbr idcjXmcation
PAGE OFFERED: PAGE ADiVdiyTED-
PAGE OF PAGES
^^U^^
CM
o
U)
o
CD
I ^ H
CO
CO
CO
U)
c
I ^ H
o
0
2
o . CO
o
s s
5 ^
O CO
c
' C (0
11
^ E
0)
2 I
Z cs
O
u
m
I
o
00
T3 CO
.S> a:
^ <
CO "O
aJS C
O CO
TJ .2
0) "O
11
E .2
=1
ts
. > d)
O 0
(/> o
i l
H <D
il
<
.I"!
^.s
s "o
o @
Q. S
5?
CO CO
o 0
.E 0
G)
0
O
0
^ C
s= o
-N o
00
0
0
O)
c
>
0
- SEE
si
u
O
CO
CO
0
CO o
%.2
> 0
aO C
E
O 0
00 X
CO 0
ManningB_00007352
4^
CO
3
%
Q
"D
<
LU
Z
o
tf) I - z UJ S UJ ^ O UJ DC g: UJ u. < tf)
O
UJ
>
UJ
UJ
S
tf)
tf)
UJ
tf)
tf)
<
^
(g
0^
UJ
9
tf)
z
o
o
o
DC
>
z
UJ
m
CO
LU
Z
o
z
tf)
z
O (0
^ I
m _
3 CO
i ; ; ^
o
0)
(D
I I
CD CO
"O
3 CO
m ^
JJ o
^
o
00
E
CO
X
LU
O
CD
CO
r O
CO
LU O
o ^
LU
5
I U Q_
o
CO
CO
CO o
CD CO
^ ^
TD O
c o
CO CO
MannlngB_00007353
CD
O)
<
CO
o
CO
D)
c
J ^
CO
CO
o
CO
CO
_co
u
CD
-I
-2
o
<
o
CD
E
o
I o
LU O
I D
0)
CO
CO
_cg
U
D)
O
0)
O
DI
CO
CD
ID
CD
O
O
QI
o_
Q-
<
QQ CO
si
Lll S
g
2
0
Q_
O
O JD
^ CD
CO
O 0)
CO
E
;g
o
CD
CD
g
>
o
CO
6 S
g 3
! 0)
LU CO
ManningB_00007354
o
CD
M H H I ^
X5
o
D)
O)
c
I Q CQ c LU
CO
D)
c
\ %
t
CO
^
c
o
m
o
M
CO
CO
CO
O
I
CD
Q.
CO
o
T3
QI
CD
CD
^
f i _
o
0)
"O
s
c~
o
CO
f ~
(O
A
n
CD
z
E
3
o
O
C
T
I
D
o
< o
g
o
3
GO
E .
O CO
o ^
io 0)
^1
o c
. CD
^ E
O 3
00 o
CO _o
<l
S w
7. ^
CO -o
Z G)
O i 5
8 m
CO
c >^
0 t5
E 0)
3 b
o o
O O l O
"O
lO
"D
CD
CO O
CO
CD
CO
CO
% CO
O ID
TD T"
CD
^ or:
<
m
3
E
CO
0)
s
o
o
CN
CD
>
^ o
O).^
C JD
o
>
g
o
CO
-Q
CO
TD
CD
E
CD
O
c
CO
E
I
CD
Q.
Q
DC
<
Q
z o
g Ec
CO CO O
CD
>
O)
ManningB_00007355
CD
CO
TD
CD
O)
<
O
LU
CO
D)
C
0
I I
(0 ^
o 5
c) E
S 3
o o
I I
a a
<
o
UJ
(0
<t)
o
o
c
o
^B
0
o
I ^ H
'u>
#
0
O
0
I ^ H
0
C
o
^i
0
o
^H
"co
CO
0
U
CO
U)
c
U -Sf
c
0
E
3
O
o
o
CO
E
0
O)
O
c
o
0
0
O
CO
CO
0
o
0
o
ManningB_00007356
^ ^ ^ ^ ^
^ ^ ^ ^ ^
^
^
^
tf)
c^
C^
CJ
C^
CO
0
Oa
0
^
0
O^
a^
^
^
^
00
CO
0^
^
Q)
01
(0
5
(5
Q
0)
(Q
O
w
c 0) o ^H c o O
Q)
(0
s
(Q
Q
tf)
3
.2
c
Q>
CO
Q)
tf)
3
(0
O
2
b
Q)
( 0
s
2
CD
<Q
c
.o
Qj
Q)
O
a
0)
tf)
3
(0
O
0) Q)
o OJ
<Si
&S
O
Q)
CO
15
c
o
(0
ManningB_00007357
00
N
I
CM
0
0
O.
a
o>
0
O)
0
O.
o 5
E
o =
o
e g
( ^ 3
^ 0
If
m (/)
g (0
.E 0
.2
O) 0
c E
'ia
E.E
c
>
"O
0
2
0
o
c
(0
0
0
E
o)^ a
O 0
O.E _
* - O)
0
o o
(0 c
50 _
0 r--^
0
^ " U
CD 0
i
0 JS
0 ^
O c
. 0
0 $
o
0
O
"5)
^B
0
0
maaa
c
o
u^m
0
E
a
c
B ^ H
0
0
.i
15
0) CJ
E
o $
xiJS
0
c
C (0
o o
a 2 o
E'B
hr 0
i l
o
2 c
c
0
I
0
0
o
o
(0.S2
"0
0
N
C*^
OTJ
C
(0 0
.62 c o
i t o-c
0 - ^
0 o
0 CO
0 d)
0
i!
a'^
0 =
Q 0
2
o *-
0
3
0
C
3
E
o
o
0
o-d
0 0
oS
k 0
0 ( 0
0 JS
o o
0
C
o
aB
0
2 c
3 O
U CD
0 g>
La 0
II
o
0
"U
0
N
0
0
3
0
O
0 " 0
-C 0
0 %
I t
0 0
g o
o ^
" OO
o ^
0
o
ii
K 0
ManningB_00007358
CJ)
tf)
tf)
0)
o
o
P
r
e
d
]
c
3
o
C
re
C
u o
u
(0
tf)
(0
O
N
I
CM
CO
CO
a
N
o>
0
Ui
0
Oa
^ 0
B 0
% 0
0 G) (/)
^ 0 3
"D ^ CO
^ 0 O
o o 2
b ^ 2 i
o 0 0 ^
g>-Q 0 Q)
si l l
l i i i
1
Q) 0 C N
l o ^ l
Q,"D 0
2 | | |
2 i I o)
5 m g
o "55 E
</) o "O
M
CDi S* t 15-
co o .= o 0
1^
85
l i
0
si
s i
.gc
rt
0
0
X ! =
5 21
3 O C
0 ^ 0
gs :
c u>
0)
0 C S
.115
I
I l l
O "D (0
O
CB
c E
.2 o
1
0 Q)
"D
C ^
.2 0 c
0 5. 2
.2 o
0
^S?
^ Elo
^ 3 C
.11
o g.
U Q.
>.
C 0)
p o
o 2
0
3
0
0
^
0
O)
ManningB_00007359
bo
I I
KM
CO
0
Oa
B \
IG)
0
U)
0
Oa
CO
c
O
^H
2
0
o.
O
0
K O
( / )
D
O
li
> E
w o .
^ ^ ,0
O ^ CO
a c .12
0 0) """
1 E >
^ E %)
(A O <
= 8
C
^ ) .>
I ^
= O
tf)
o O
( / )
o
OT
O
^ O)
^
0
E i ^
^ ^
^
c^ ^
^
E
^
^
^
^
C^^^
^
^. i l
O) _
o <0
~ O o
o
1 =
0
CO O
c c
O
o
0 0 ) ^
0 o
Q o^""
11
0 0 jO
Is.
0
3
O)
*2
0
CO
o $
A A A A A
OT =
i l
Ui .
2o
Q. jfi
c .2
11
0
H
CO 3
A
0
C
o
^ H
0
C
CO o
E
0
O)
5.1
CO 0
o I;
CO c
0 0
= 5 Oa
2a S
0 O
O CD
O ?
CO Q-
OT
11.
H B H .
C 3
1.1$
A
ManningB_00007360
o
lO
I
CM
as
00
I
CM
CO
CO
o.
o>
0
Ui
0
>
o
c
0
B ^ H
o
B ^ H
*0
c
B ^ H
as
^
0
o
CO ka
g
II
0 ^
8.J2
c . |
A re
O
a
n
c
y
O O l
e
n
t
o
> >
k
Ui "D
_o
c
<
l
i
e
"O
0
as
^
Q. 0
>
P
e
r
s
o
r
a
p
U
C
O
Ui
P
e
r
s
o
r
b
e
W
V
T3
O
U
S
0
o
o
n
l
y
Oa
as
>
aO
f
t
h
e
c
"O
O
c
0 c
a
0
f -
o
E
CO
CO
c
o
B ^ H
B ^ H
i
o
n
O
W
I
o
n
t
r
0
m (0
CO
B ^ H
o
L_
' W '
Oa
o
0
0
c
c
B B I H
0 r*
B O
o
c
l
a
s
s
i
^
+^
e
m
z
a
t
i
O
o
#m
l
a
s
s
i
a
t
i
o
n
t
d
e
r
e
n
t
a
n
i
r
a
i
r
S
r
w
a
t
i
o
n
t
u
n
r
e
v
O)
OT
3
E
OT
B ^ H
r
e
v
o
<D
o
^
0.
DC
o
o
A
o
A
c
B ^ B
ManningB_00007361
U)
c
^ H
^
CO
CO
o.
as
CO
CM
0
Ui
0
O.
0
o
3
O
c
CO
Ui
0
C
o
I ^ B
re
E
.2 "S
re
o
CD
E
0 ^
O 0
f c
0
> "O
0 0
C
CO 0
c
.s>8
^ ^
^ ^ ^
o o ^
^
^ ^ ^
c^
^ ^ . ^ OT ^
^ ^ ^ ^ ^
c c
c
a a
o
0 > l
B ^ H
^
tn
0
^
tn
O
^
"O
B ^ M
as
CO
0
mwmm
a a
C
l
a
s
s
i
e
a
l
a
s
s
i
O
S
l
a
s
s
i
>
l
a
s
s
i
0
o
re
l
a
s
s
i
0 0)
O
o
C^
Q
0
O
3
O
CO
o
0
0
o
ManningB_00007362
CO
^
I
%f
CO
0
O.
as
CM
CM
0
Ui
0
o.
c
o = "5
c t ; 0
0
0 N
Oa ^ 0
111
C O CO
0 CO
f l l
$ CO 0
CO >
0 aS 0
E -o
0 CO -S
^ Q) 0
l | i
0
Ui
0
Oa
CO r-
0
^ ' i
Q . ^
E
u
o
0)
o
c .
re tf)
0) <D
I I
I I
M- O
a> , ,
S.O
re
Q. o
Q) 5
S "O
l l
0 c
o O
_3 ^
O
c
^ 0
^ c o
Q
iu < ij
i i i l
X UJ E J
o ^ z o
P o -
o
.fi o
ManningB_00007363
4B>
Pi
8
ManningB_00007364
l O
CD
I
^
CO
0
Oa
as
CM
CM
0
Ui
0
Q.
CO
C
6
CO
o
0
CO CD
"5 0
C
0 ^
CO o
I I
2 ^
0 ^
O. ^
o I
Ui CO
C O)
c .
c
5) 0
E E
g)^
CO
0
c
0
0
Oa
C
O
ti^m
0
O
I a
CO
CO
0
"U
0
I Jo
a; ^
= aO O
< ^
aO
aO
0 CO
<
g
CO
Of
0
IU CO
CO
O
5
o
O z
o
^
CO
(0
2
tf)
o
ManningB_00007365
CO
I
^
CO
0
CO
CM
0
Ui
CO
o.
CO
Ui
c
0
S
c
o
B ^ H
t
o
CL
"U
c
0
o.
CO
Ui
CO
0
CL
CO
0
22 O
i2
0
c
o
0
z
c
Ui
0
o
0
b
0
CO
I
O
CO
0
aO
0
CO
0
0
0
as
0
| i
fi.
o
I
O
5
z
UJ
tf)
m
. f i
re
0) c
&'i
"2
O 0
O 0
CO 5
o.
|2
I
2"
CO
(D
UJ
^
tf)
*
(9
0)
>
m
o
0
"O
c
m
m
o
'm
(fi
jO
O
m
m
m
0)
.Q
(fi
JS
(fi
0)
D)
c
'(fi
o
o
o
*
x
<D
ManningB_00007366
Q
UJ
B ^ M
^
U_
>
tf)
Ui
tf)
c
B ^ H
<
C J
're
o
r
t
r
z
3 o
0
* ^
"O
0
0 >
CO 0
3
CO
^
B ^ H
Ui
0 c
B ^ H
JC
^
O
"co
B ^ H
CO
0) T3
re
E
r
k
e
0
e
d
E
B ^ H
>
CO
l a.
CO 0
0 0
O
O
c
0
3
.O
Oa
O
0
"O
0
o
0
0
aO
^ CD
II
o
re re
t o i
(D o
.2 E
Q. 2
2 o
a - f i
^ 1
c
<
O
0.
as
b%
12
iSsl
tf) -J
O
Q_
Q
UJ
tf)
tf)
<
Q.
o
o
UJ
tf)
3
<
O
_ o
O
z o
ManningB_00007367
00
75
re Q)
i 0 if
l 1
C O "O
C O )
c ^
:^ I
Q -o =
" Si
o E
^H
~ re
D
^H
3
O)
>%
. = V /
"5 re
P 7s
re
0
re o
"Z Q)
<D
re 3
tf)
tf) ^
11
s
Q. ;e
C (0
O tf)
re
g U
c :
I "
l l
re %
o re
(0 a> $2 U Q.
ManningB_00007368
O X LU O ^
O)
CD
C
Q.
O
CD
3
CO
D
0
CO
CO
m
u
c
o
0)
Q.
E
CO
CO
4
o
0)
CO
CO
-
B o)
1
o
o
2 CO
S^-o
g CD
. E
<D
w
$
Ri
Q_
O) g
. _ 4;
C CO
CO E
r
o c
CD
a
o
CD
CO
Q.
CO
L_
O)
CO
1_
CO
Q_
|
CO
CO
O)
c
TD
i _
O
o
o
CO
CO
0 "D ^
CO C '
O CO
Q - I -
CO
E
Ui
c
CO
CO
E
L_
o
^
i n
= ^ CO
o =
o
CO
CO
CD
S o:
S >s
I
CO o
S5
. O CD
CN O Q.
O O
'il
C r-
>
Q
CQ
<
'
CO
o
G>
^ C3)
Csl C3)
O ^
CM r-
o
L_
CO
2
CO
CO
O LU
ManningB_00007369
o
CM
UJ
OC
o
UJ
(0
Q.
o
0
o
0
15"
CO
D
0
CO
CO
0
o
o
0
Q.
E
CO
CO
o
0
5"
3
CO
t c + j
O) ^
o.
CO
$ I
CO E
Q.
D)
"E
CO
^
0
o g
0 .5
CO "E
CO l l
7 i i
0
_c _o
o_ ^
CO CO
11
L_ ^ j .
CO
Q.
o
_CZ
CO
5 i
CO o
6 =
L_
Q. J >S
P
: s 2 E
2 8
"z: u o
^5
o-p ^
;78g
CD
<
"GO
o
csT
o
C3)
^ CJ)
Csl C3)
o ^
CNI _c
_c u
o
CO
CO
CO
^ LO
"0 ^
0 . .
c
o
0
0
0
0
0
j w 0
U
CD
CD CN
CN
. . 0
c o
O 3
t !
I I
0 0
o o
UJ
Q :
o
UJ
(0
Q.
o
Manning B_00007370
CO
CO
0
o.
0
Ui
0
a
CD "U
e a
o - l
0
s i 3
CO -D
"O 0 C
0 0 ^
O "O "O
2> o 5
1.1
2 g
Csl
0
CO
>.2
E b.
< ^
0 o
0
o
5 ^ CO
SSS
I I ?
c " 0
# I i
0 _0 : g
I I I
o
0
>
0
0
c
o
I ^ H
0
O
I ^ H
CO
CO
0
o
To
c
0
"O
0
>
o
0
X
LU
0
CL
0
E
o
Ui a
' C 3
<
N
b
O
0
"U
c
0
CO
o
B ^ H
0
E
0
0)
>
CO
ManningB_00007371
o
CM
CM
o
Q)
D
3
CO
C '
CD
E
3
O
o
"O
o
Q)
^H
w
tf)
re
o
c
3
CO C>"
8,
re c
Q
UJ
(O
(O
i l l
(fi
0)
>
0)
re
o
w tf) re o CO 0) 2 re re 1
+- re
2 1
O CD
0) *- -o
(0 g>
a o c
o 0) o
H CO O
ManningB_00007372
CO
CM
C^-
C"
C^-
tf)
o
tf)
UJ
O
ManningB_00007373
o
GQ
O
O)
Ui
c
S CD LU
I D
g
CO
CO
m
U
U)
o
0)
o
tL
CO
CD
CD
O
O
QI
a.
Q-
<
o ^
CO
^ E
< 5
^.co
i s "O
CO CD
.5 E
11
% ^
CO c
u .2
in g
6 ^
00 o
CO "2
C 4=
0) CO
0 ^
7. (-)
CO -o
z ^
O i5
8 m
CD
O >
^ D)
CM
CO
CO
o
TJ +^ - A
g
I i
_C0 TD
3 "O
O) CD
0)
^ CO
CO
m
3 O
% g
CO . |
m S
'a. 2
Q. Q.
"
CD
O
0
O
O
CO I f )
CD O
g%
CO
I f )
o:
<
o <
CM CD
^ >
P' o
. E CD
o %
DL
<
Q
Z
g
CO
CO
o
"D
CD
O
O
^ 2
I 0
E Q-
ManningB_00007374
^^HC^
c^
^
^
C^
u^
^
0
B ^ ^
CO
CO
0
^
O)
c^
B ^ ^
c^
^
o
^
m
CM
CO
0
I i
o
O 0
&
fi. c
fi.
<
B a
CD
O
LU
CO
CO
0
o
CJ
<
CO
c
o
I^H
o
CO
0
"co
0
c
0
o
CO
0
"O
0
CJ
o
0
>
B ^ B
5
00
B =
c
B B B
E
"O
<
"O
c
0
>
0
C
3
O
o
o
<
0
l a a a
0
0
"O
0
CL y=
CO
CO
0
O
o
Ui
c
B ^ H
Oa
0
0
^
j )
0
CO
"O
c
0
0
O)
CO
b
0)
c:
o
B ^ H
o
3
^
0
o
CO
"O
O
0
c
0
"G
ManningB_00007375
CO
CM
CD
CO
CO
CO
CD
0
Ui
0
Oa
c
0
i
>
"O
0
c
CO
5
0
CO B ^ B
^
CO
CO
0
o
o
<
0 CO
<
1 CL
0 3
i l
re OT
0) >s
U ^
a^g
3 re
o o
a:
It
.2 o
| i
^ CO
0 0
> CL
0
^
O
c
"O
0
0
2 <
CO
0
c c
O o
CO
0 O
0
3
CO
O
o
CO
B ^ B
"O
c
O
o
Q)
C
.2* CM
tf)
OT
re
CO
tf)
0 c
(A (D
a! S
1 5)
I - <
ManningB_00007376
CM
o
0)
c
Q)
c
c
c
re
o
B
Q.
E
CO
c
o c
o
o
0)
_c
_ >
tf)
c
CD
CO
"O
0
>
B ^ H
0
O s-
L. O
O CO
o)"5
c o
BaBH ^
c ^
0
o
c
o
CJ
c
o
(D
E
as
CO
0
O
3
O
0 CO
g 8
O C
= &
B ^ H
o "S
B^
i t c
I'i
O j :
o
. f i
5 OT
T3 E
Q) CD
#
O
OT 7
. mmi
~l
*J
So
0
o c
o 2
b. f
si
0
,>=5
0 C
C 0
0 -C
0
0
CO
E
0
00
>
CO
o
o
o
tf)
CD
0)
O
UJ
O
X
> -
UJ
^
H
Z
UJ
<
D
C
re
O
O
ManningB_00007377
00
CM
(fi
>
CO
c
o
o
o
CO
U)
0 .5
( 0
0
CD
O
Q.
0
TJ
O CD
0) CO
> "O
o
CO j =
0
E
0
CO
l
O 3
(0
CO
CD
U
LU *5
i i
O
c5 CD
0 _
iu B
B %
O "D
0 2
O Q.
I CD
5g
S .22
O ^
O w
E
0)
"co
> ,
CO
o
O
o
o
CO
CO
I
<
0
o
c
0
M CD
0
c
o
o
0
0
0
O
c
0
^ .5>
^ s
re c
CO
(0
o
0
O
I
UJ
^
0
U)
CD
E
w
o
> -
Ul
^
Ul
<
CO
CO
E
0
to
>
(0
ManningB_00007378
Oi
Csl
tf)
c
o
Q.
tf)
0
DC
CO
0
Oa
0
Ui
0
Oa
<
Q
O
>
E
<
0
IO ^
c
0
E
r
0
O.
0
Q
BS
CO
0
t :
0
3
CT
"D
0
0
0
B ^ B
o
B ^ B .
O
0) L.
O O
i'i
lU
ill
iS T3 E
tf) Q) O
% re U
O C q)
I I I
O -o .S>
2 ^
^ P I
s i |
0) U *^
Q o
>
E
<
0)
0
N
0 2
c
0 >
0 3
.2%
1.1
0 0
0
t f i
2 o
Q ! E
CO
0
is
> >
.ti re
11
CO CO
O ~
CO
X
0
o. E
o
c
0
0
Ui
o c
CO
OT
i> re
.fi
' I OT OT
| - ES
8-=^
gog
ManningB_00007379
^
c^
CO
^
^
tf)
N
1
^
^
O
d
as
CD
1
tf)
^
0
2
0^
CO
^
Oa
^
as
CM
^ 0
B ^ ^
Ui
E
0
E l
0
0
c^
CD
C
re
E
E
o
o
O (D
j ; o )
^ CO
CO c
m CD
^ E
E >^
CO CD
- >
Bt
CO t
SI CD
O =
.5 >
CO CO
o-^
CO ID
CD ^
CD
w ^
C CO
CO CD
I O
g U m
CO
E
CO
O)
o
L_
Q-
o
CD
CO
c
g -o
CO CO
11
o
c
o ^
^ 3
^ - Q
O ^
O
3 CO
CO CO
CD 0^
<
0) ^
j O
0 o
1 ' 4 - '
l i t
2 s
CD CD CO
^- 1
i f $
O
CO
o
TD
CD
CD
TD
C
CO
E
J. E
0 o
Ui o
g CD
0
o
o .
.(g
> T=
3
O
CO CJ
-co ^
o
tf)
o
c
re
E
E
o
O ^
0) CO
CO
Q. CD
CD E
ManningB_00007380
CO
O
Q.
tf)
0
DC
o>
2
0
Oa
BS
CO
0
Ui
0
Oa
O
>
B =
BBBH
JD
'm
c
O
Oa
CO
0 C
o
11
o o
c c
w "
c ) ^
^
0 i t
aC CO
CO
0 0
i l
2
= *
^ 0
CO
" 3
^
0
o
N
B ^ B
OT
O
C
o
0
B H B
3 >
re
0
B ^ B
o
C
^ "co
B ^ H
>
^
0
e
n
>
^
CO
a
n
o
t
"D
c
t 0
r
e
p
o
l
e
a
d
f
i
e
d
B B H
2
3
CO
CO
^
O
0
o
CJ
0
c re
C
o +-
(A Ui
qj .5
fi.
l l
. 0
S
B =
3 +S
8 E
% ^
=5 .=
ManningB_00007381
CM
2
0
Oa
as
i n
0
Ui
0
o.
m CD
.55 CJ)
^ 0 g
0 CO 0
III
o -o g
l
D) "O
ro 0) c
^
ro
E
0 5^ I
o
D
0
CO
i f
O CO
O o
0
_ ^
CO
U
0
J
o
^
0
-f'
CO
I I -
< 1
0
0
T3
0
E
L_ E
o
CO
CO
o
0
u>
CO
CO
0 CO ^
1 I f
o m (O
2 ^ E
g
CO o ^
g) o
IS
I I
(D a:
c Q.
I i
< o
E
o
O
0
o
Q.
0
O
m
O 0
11
to
C L_
^
0 c
CM
00
CO
CO
_co
o
O
0
E
^
o
0
0
y
0
E
"O
CO sJ
.9 I
CO
0 b E
o b
o
CO c
0 '
0
CO
LU
9
0
o
o
If
< E
0
E (D
TD CO
11
o
O ^
ManningB_00007382
o
c
0
D
3
CO
c^-
tf)
E
0
w
>
(0
o
o
o
(O
CO
0
0
re
re
1
CO
CO
UJ
O
X
> -
UJ
^
UJ
8g
ManningB_00007383
CO
c
D
<
o
tf)
c
0
re 3
i
t
y
w
e
d
mmm
u
^
o
re
c
(L
3
O
o
o
<
CM
I
CD
2
0
Oa
as
CO
N
0
Ui
0
Oa
"U
c
0
c
O
B ^ H
0
E
b
c
0
b
0
CO
Oa
O
c
O
o
CO
3
O
3
C
1 *
CJ ~
i!
^ y
re
re
CO
o.
"0
o
0
>
. 0
- ^ o
0
0
E
CO
0 I
^ 2
= o
^
CO m
0
;g OT
0)
O .0
o
11
O 0
0 *5
CO g
Oa Ui
"co
I - 0
. " 3
13
0
O
O
o
0
0
aO
^aa B ^ =
^
_ 2
0 0
' C 0
0 >
l l
tf) 2
0)
0
o
11
OT o
o J2
0)
to -
"Sl
"C re
o w
c o
> ^
I I
= o-
i i
2%
0 aO
0 2^
E re
tf) 3
re
ManningB_00007384
l O
CO
"D tf)
C 0
U
= 0
I I
CM
CM
I
CD
2
0
o.
as
^
N
0
Ui
0
Oa
0
E
0
B ^ B
c
0
"3
O
u
u
c
0
0
b
0
CO
5 |
$ o
3 .5
"O
(D re
O
0 c
I I
.Q U
S TJ
1 i
r 0
c ^ h
CO
"3
c
0
0 IT)
CO ( 3
00
CO
?fi
S c
i i
"C re
to E
%
I
_ r C
^ <D
11
3
CO
"U
0
c
3
O
o
o
0
0
"3
0
C
O
o
0
aO
O
CO o
0 "3
0 s
"3
0
CO
O
Oa
I f i
MannlngB_00007385
^ ^ ^ ^ ^
^
CO
CO
^ tf)
^ 0
^ ^
II
^
CM
I
CD
2
0
Oa
as
N
0
Ui
0
Oa
O
"U CO
0 0
I I
i l
8^
(0 c
w 2
n =
0)
u
.5 o
"O
E -o
0
0
I I
II
0 2
(0 0
o.
0 o
o k
CO o .
0. c
11
O 0 ^ 6
^ = I
o
0
o
0
0
E
o
c !E
O 4_
c
g
0
E
(0
0
CL
0
CL
5> ^
c
"D
0
(0
0 -g o
BS
t
(0
CO
CO
re "O
o ^
8
re I
"o
CO i2
&g
S. '
^
I
0
0
C
o
0
o
0
0
0
0
0
O)
0
0
0
0
"O
0
c
Ui
0
0
CO
a 5
0
o
c
0
0 o
l
i | . E
^ "5
O . "D
0) 0) 0)
O) 2^
Js Js
re is re
0
E t)
a
^ o
"U
0
^
I i
i l
0 "o
O) 0
o o
g#
C O
0 ^
1-2
^1
2 i
6 O
0 o
0 o
Q <
"D
0
"D
0
0
0
0
C
I
a
0
"3
O
%
0
>
0
0
3
0^
>%
0
Q
o
00
ManningB_00007386
N
CO
CD
j )
CU
CO
D
CD
O)
CQ
O
CO
MannlngB_00007387
00
CO
CO
I
N
2
0
o.
as
00
N
0
Ui
0
Oa
0
N
11
3
0
0
0
0 8
0 o
^ 0
?1
.2 0
0 o
E 5
al
c o
o
0
"2
0
1 L
0 O
S| i
o g 3
= .5-3
o c .c
'= o
0 E 0
.2 I t
p ^
i 5
^ 3 - 0
i^i
5
tf) re
CO o
re = ;p
_: Js -Q
0) o c iS
0) c
I M
I f l
^ 0
0 0
o
0
Q.
C9 0 0
(0
0
0
E
0
0
0 ~
(0 B
o
o
Q
O
O
0
CO
E
0
<
0
- a
o lo
E
11
m^m
3 (0
CO CO
CO
0) u
O i i _
> o
^
tl
82
% -
l l
.2 0
O O)
O 0
o
< 0
ManningB_00007388
O)
CO
*22
re
CO
D
C
re
0
Ui
re
^
I
N
2
CO
Oa
as
00
N
0
Ui
0
o.
0
0
o
o
Z3
0
b
0
CO
0
a
0
^
(0
3
o
e
c
c
(0
3
o
"3 O
o
0
^
>
* i 0
O
$
c
Q.
^
0
a
0
^
E
0 c 0
<
0
Q.
CO
C
Q.
O
O 3
O
O 0
0
a
0
0
c
g
o
i i
kg
0 (0
n
C " 3
0
II
f A 0
m 0
' I
0
I I
1.1
0
<
tn
o
c
o
o
c
0
E
0
o.
Q.
3
0
C 0
; 2
.2 ^
a 8
0
0
c
0
o
c
_ o
c
o
(0
CD CO
Q. c
II
" 3
2tS
re 0)
0) Q.
O g
I .5
CO
= E
I ^
& <
g i
(0
3
O
o
a
0
_ Q
l l
i
i I
ManningB_00007389
o
"4-
o>
I
CD
2
0
Oa
as
N
CD
0
Ui
0
Oa
2 >
3 C
CO o
0 "3
Z ^
l l
CO _ a.
0 ,J2 3)
3 C BE
CO O " 3
0 = 3
I i i
111
c c
"1 i
0
O.
E s
= "55
; %
CO (J
?s
re
E
E
o
O re ^
CD
N
CO aC
sl
o o
I ?
p
W CO
re -n
CO CD
CO
^
o
0
i u
0
CO
E ^
0 2
rs-
0
O 0
1-5
o >
|2
CO
b
1o
O
DC
CO
^ CO
a- S S
1-2^
n-o
^ (fi ^
i i j
0 ^ a_
^ _ 0
CO 0 C
1 g
2 CO CO
"3 0 0
< Q. Q.
ManningB_00007390
(O
as
o
I
CD
2
0
O.
as
N
CD
0
Ui
0
O.
Ui
c
B ^ H
3
5 'I
**" O
0) c c
S o -
"co 0
g 2 g
fi. o o
2 2 =
- fl) ~
-o
g g |g
c o JS
o o
{2 3 O
0 0 * ^
Q_ C CO
< = 2
y
. 6 0
0 k .
"O 0 O
0 "3 4W
C C
3 O
w CJ
0
l i s
0
i s
I
o
2 OT
>
s. -
~ I
"D +-
.2 "5
^ S
.i
o ^
. 0
Oa
I I
0
t
0
CO
aO
O
"3
C
B ^ H
"3
0
N
0 3
C 0
0 y_
O. O
ManningB_00007391
CM
^
CD
2
0
Oa
as
^
CD
0
3)
0
Oa
re^
CO
0
o
^
0
o
" 3
c
0
0
0 0
B ^ ^
CJ
0
O
>
o
0
CO
CO
CO
0
o
0
3
CO
c
0
y_ O CO
B ^ H
o
E
0
"co
>
CO
3
CJ
0
CO
>
0
Oa
O
ba
CO
0
0
l l
0
0
aO E
3
O O
0
CO "3
> =
0
o n
< =
3
O
0
CO
>\
0
' 5 O
lo
"3
C
0
CO
T : CO
J %
^ o
o _
o u
o
Q)
2 o
MannlngB_00007392
o
CO
^
CD
2
0
Oa
as
N
CD
0
Ui
0
Oa
"3
0 >
O ^
11
0 0
^ CO
c
*i
B c
0 CO
0 0
CO *^
0 O
II
II
B i ^ m
= 8 s.
81 2
aS C O
O O "co
0
0
CO
b
>
O
O
[>
m
gj)
m
%
(oL,
^
CO
o
N
LL
CO
0
0
? w
CD
tf)
O
>
o
o
I-
0
Ul
a
^
o
0)
>
o
o
o
o
tf)
o
N
tf) tf)
ManningB_00007393
Manning B_00007394
N
U.
tn
_J o
LU LU
>
LU
LU
O
O
CO
O
u>
1
o
00
CO
z
Q
o
<
h-
<
ms
o
s
1
C4
O _c
u.
Q.
z
0
VM
3)
CO
0
CL
LU
OC
O
LU
CO
0
B H
a
0
E
c
o
is
"3 0
0 O
o 5
O "3
0 0
2 "3
0
E
^
c
0 CO
o
0
I s-
!
re -o
0 "C
E
0
"3
0
3
g
0
0
o
0
0
ManningB_00007395
ManningB_00007396
N
"4-
0
Q.
E
o
o
O
0
CO
CO
0
Ui
0
Oa
2
0
CO
0
3 O.
Ii
51
a o
2 S
O. CO
CO 0
_J Q
CO
0
"c
B ^ H
&
CO
0
c
c
0
o
CO
CO
0
B ^ H
o.
o
o
CO
0
o
0
X
0
O
"S
as
CO
as
Q ^
ii
o ">
_c c
CO G)
0 "3
U_ 0
B ^ H
OT
:g {
Q o
ManningB_00007397
CO
I
^
2
CO
o.
as
CO
CO
0
Ui
0
o.
00
o
N
LL
CO
tin)wis
l i t
s S
jO 0
0 o
j a
JS 0
%
B ^ M
i t "3
CO 0
CO o
0 0
IS.
o
N
LJ.
CO
O Q - ^
Ui
JO
"co
CO
0
ll
o E
D
0)
re
E
o
c
0
0
jO
^
0
0
3
0
o
>
0
E
0
(0
0
CO
o
N
LL
CO
00
"4-
N
LL
CO
o
Iti g
i fi
ifi I
0
JD
0
0
_a
CO
O
Q-^S ^
a = < =
cs 0 I 0
Q >%0
N
LL
CO
Csl
N
LL
CO
ManningB_00007398
o
o
c
o
o
re
0
tf) 3
re
tf)
tf)
0
E
re
0
S
re
c
^
o
^
CM
W
0
Ui
0
Oa
"O
c
o
fi.
fi.
<
B >s
g c
CO c o
Q. CO -Q
s.
0 C O
^ .o) a.
1 1 ^
5 w -
S I "2
CO o
o
CO
"O
E
o
o
<
I
0 0
| i
5 re
o Q
o
0
re
o
E
0"
re CO
ro
0
E
E
-o
ro
0 0
CO CO
CO CO
ro ro
o o
CO
0
(O
o
}= ,= ,= o
ro
E
CJ>
^
E
o
a
0
0
d
re
c
o
^H
re
0
Qi
o
ManningB_00007399
o
UO
CO
^
o
0
o
c
0
u
3
CO
tf) ^
2 re
M ^
S g
o 0
B =
c "co
O tf)
o re
0 o
> o
0 tf)
tf)
*- 0
0) o
2. O
re re
tf)
8iS
S ?2
^ (0
o
o
> tf) > t
S "S =
tf) re 3
re 3 o
Q. O 0
S"-"'
CO L.
i l
o
I
I
0
>
re
o
i l l
Sll
CO
0
tf) tf)
c o
O OC
M
I I
c
:
t -s t
re _
_ 0
re c
o o
CO (0
0 0
Q. Q.
C^-
tf)
0
Q.
E
re
X
0
0
E
o
tf)
2
re
re
1
ManningB_00007400
tf)
c^-
c^-
c^-
tf)
O
tf)
UJ
a
ManningB_00007401
^^1^^
CM
tf)
C
.2
I I
i i
!^ T3
C 0
g 4=
(0 "tf)
(0 (0
w O
c
re
CM
I
00
2
0
o>
0
Ui
0
o.
a
o
E
0)
to
CO
8
l l
(J
a
CD
N
0 O
| i
o
o
CD
CO
c
s
CD
Q
CD
U)
c
CD
CO
CO
CD
CD
O
O
"D
c
CO
E
E
o
U
"D
CD
N
"C CD
o g
^ ^
< %
I I I
g
3
O
U
g
m
E
_g
g_
b
0)
3
CO
o ^
CD
E
tl
CO
Q-
CD
CD
g
^
CD
I
CO
o
o
CO
o
l o
i
0
II
>
"o
CO
0)
CO
CD
CD
CD
>
O
I
CO
CD
CD
> >
g
Q.
E
O (O U CD CD
ManningB_00007402
CO
tf)
re
o
Q.
tf)
C
re
CO
I
CO
2
CO
Oa
as
O
Oi
0)
Ui
re
fi.
g)
O
0
CO
LU
DC
O
m
( / )
CL
O
TD
CD
>
O
Q-
QL
CO
CO
CO
CD
E
TD CO
mO
Q
^ CO
CD
sl
SCD
g m
U) 0
0) sz
CD c
g ;=
l l
CO =
CO o
m ^ g
111
CO o. m
3 m Q.
I I
f Si
o : g " ^
-c i 2 ~
3 CO
= O CO
^ C O)
^ 0 c
- 0- 5 o
2 ^ CO
.22 o <
.52 DL CO
0 ) L L (D
CD C
Q: O O
.S^l
g
CO
_ = "O
CO O c
00 45 CO
S.
S5 3
CD
E
0
to
CO
m
GO
o
o_
D)
g O
^G
^ CD
c
O)
CO o
Q . ^
^ > ^
O C
C CO
ManningB_00007403
0
CO
CO
U)
"Sf
tf)
S 3
o g
Q
11
0 ^
^ tf)
0 . (0
re
o
I
CO
2
0
Oa
as
^
o>
0
Ui
0
o.
CO
0
Q.
O
0
>
0
CL
-o
0
^
^
CO
^ D) . y
i l l
CD CL O
0
to
u
0 _g 2_
0 CO
3 0 c
CO 0 -2
o. I - to
D)
^ LU
CD Q
CJ) ==
CO LL
O
O
od
H
LU
fa
0 CO
o
LL
<
Q
v.^^
CD 0 0
^
CO o o
^ o o
0 "D "D
o # ^
CO CO CO
CO CO
0 0 0
o: U U
0 CO
ro
| i
3 .Q
S
CO "D
C 0
0 u
5 t
c >^
g-G
C 0
S (0
u c
0 0
> Q. CO
C CO 0
O 5 a_
ManningB_00007404
tfO
tf)
LU
O
CL
LU
CO
CO
" 3
O
c
B ^ H
" 3
2
o
c
0
E
3
O
o
Q
ManningB_00007405
o
CO
tf)
o
Q_
LU
CO
c
0
E
3
O
O
o
"3
0
"3
0
C
ManningB_00007406
h~
tf)
LU
LU
01
h-
0_
LU
CO
0
O.
O
>
c
LU
0
3
3"
0
O.
O
c
0
O
"c
ManningB_00007407
00
tfo
01
O
LL
Q_
LU
CO
CO
E
0
0
CO
0
Oa
. 0
ManningB_00007408
4^
cn
tf)
JlL^
LU
>
LL
CL
LU
CO
CO
E
0
0
CO
0
3
o
0
o.
. 0
ManningB_00007409
o
CO
CO
Ui
X
CO
CL
LU
CO
0
0
CJ
B B a i
"co
CO
0
U
"3
C
0
CO
(0
0
"3
"3
<
ManningB_00007410
CO
g&
c o
O Q)
l l
tf) 0
tf) c
re c
CO
2
0
CL
as
tf)
o>
0)
O)
re
fi.
tf)
tf)
0
0
> 0
g E
re
> c
^ tf)
i i
> 0
-^ Q.
O _
re
O) ^
0
o >
0 O
tf) 0
0
c
0
c
^ o
O
tf) * "
tf)
- 2 ^
"O -o <
53
A A
jO
c
0)
c
o
o
0
^ =
CO
o
tf)
tf)
re
O
OT
0
D)
A
tf)
re
<
Q
O
UJ
O .
o 0^ b
S 23 5
UiQC Z
^ SB sa
sa VB
B ^ H
^
CO
CO
B ^ H
o
o
a
CO
A
o
o
"O
o
0
I
CO
o
3
00
CO
B ^ H
o
0
Q.
CO
A
ManningB_00007411
CM
CO
LU
>
LU
CO
CL
LU
H
CO
0
CJ
0
(L ^
oa a
^ 3
S-o
0
O 0
0
C^
Oa
O
0
E g
3 LU
0 -D
La, C
3 CM
0 0
r 5
% o
c c
ManningB_00007412
CO
CO
g
LU
CL
LU
CO
c
O
I ^ H
0
E
CO
CO
2
"3
"3
<
ManningB_00007413
CO
J_
o
c
o
HHi
m
c
0
^
Q.
o
O
_c
0
>
Ui C
c
0
r
k
i
0
re
3
g
o
lo
tf)
0
D
T3
<
CO
2
CO
Oa
as
LO
o>
0
Ui
0
Oa
CO BM
^E >
5 5 =
0) O)
n
0 (D
^ %
o i
tf) o
tf) OT
CO OT
I - 0)
I
(D L.
Ui O
" O
c S
i =
c
CO
>
' C u
. 2 f ^
"o
0
O
o
Q
O
Q
" 3
2
0
0
h 6 u
0
>
O
O
"co
u^m
o
CO
0
^ BS
as
OT I
$1
CO 0
0 Oa
i=
"O. Q
b o
CO 0
0 0
"3 CO
O 0
CJ OC
0 - -
<M g
CD S
s<
sa
> -
re
A
0
3
"3
B ^ H
>
B ^ H
13
C
C
0
"3
0
CO
CO
0
"3
"3
0
0
aO
>
0
A
CO
^
CO
E
"co
CO 3
Ui CO
C 3
0 L.
E ^
go
.111
k c
CO O 0
sas
0 0 ^
Q E ^
O
c
^
A
I I
al
CO ^
MannlngB_00007414
LU
gi
3 IJ-
g| 8
O g Q
Q a; w
o> OT
Q_
LU
CO
sis
e g ^
CD
CO
CO
a
g
m
o
o
CO
CD
CO
CO
%
CD
CD
o
CO
^ CD
O CO
CD '
^
CO
^
CD
G)
CO
^ o
o.
CD
O
CD
tf)
CO
<
Q
Q. O)
S 5)
2 ^
o
Q
CD
O CO
SI
to 2
O CD
0 - W
cog'
z) o:
CD -o J2 . c
t ~ r - r \ ^
0 O
| 5
O CD
>
o
m (D
i p: O)
w (0
CO O)
CD
O
CO
>
CD c
g g
CO
E
o
o
o
D
ManningB_00007415
4^
CO
CO
o
C
0
D
3
CO
c
0
tf)
0
n
c
re
o
0
>
0
o
8 ^
l
is.
O 0
re
.C O)
g 2
^
o
0
CQ
a
c
re
0
b
0
CO
ManningB_00007416
4^
h-
co
IO
I
CO
2
0
O B
as
CO
0
Ui
0
o.
CO
>%
jO
0
: >
o
CB
(fi
C
0
E
3
U
o
"O
0
E
o
2
*
Q.
*
JC
Ol
c
CO
JC
K
3 )
C
B ^ B
" 3
"3
0
CO
o
CO
CO
O
<J
3 )
3
Q.
I
Ui
c
" N
B =
b
>
3
CL
CO
>
0
-* c
2 =
-Q
3 6 a
8 S
g %
S5
^ "JS
E
CO
iJ
i i
CO
CO o
8.=
D) Q
.5 O
>* Q)
2 5
CO Ji^
0 (0
Q 0
c n
? c
i l
o
3
to
0
"3
O
0
0
g
t
0
(J
^
CO
o>
CO
E
<
o
0
0
0
Ol
E
o
o
ManningB_00007417
00
CO
c^-
c^-
c^-
tf)
O
tf)
UJ
O
ManningB_00007418
c^
CO
c^
^
^
^
^
c^
^
LU
CO
c^
g
^
0
^
^
o
-Q
<
CO
E
CD
g
>
o
-Q
CD
CD
"D
p
b
CD
O
> >
O -c
U
< CO
o
o
3
to
_c
E
o
2
CO
CO
_co
u
c
CD
>
CD
a m
tf)
z
o
H
Q
Z
o
o
CD ^
o
0) ^
CO (D
U
CD { -
^
CO CO
n - C
o o
g JO
o
CO >
-g ^
o g
Q_ CO
. . CO
O c
^ B
< to
O m
CO 2 ^
CD
ManningB_00007419
^ ^ ^ ^
o
h~
0
C
CD
D)
<
O
LU
o
0
CO
CO
c
o
ro
0
Q.
O
o
o
LU
u
LU
CO
CL
O
o
0
CO
CO
g
ro
0
d
O
n B
0
ro
0
i
o
n
CC
o
ro
E
ro
E o
^
o
_c
0
^
3
o
CO
O
' ~
o
o
CO
TD
CO C
CD
m
Q_ >
<D
^
^
Q_
o
c
1 ^
0 O CO
c
0 ^
c
I t
^
o
^
b
X
9
_c
ManningB_00007420
^^^^^^
CJ
IU
CO
CL
C^
^
^ ^
o ^ o
^ ^
. ^ ^
^ fi.
o ^
^ ^
fi^E
E ^
^ 3
re ^
^ o
^ 0
^ ^
^ ^
i ^ ^
CO
0
o
0
3
O
o
0
o
ba
"co
3
E c
0 o
^ ^ OT"iJ ? 0) ^ -u
re
E
g
c
re ^
i i
o P
c O)
. .= c
^^'a
111
o ? f
"3
0
g
ManningB_00007421
OT
8^
CM
1^
CJ
O
^
3 )
3 )
O
^
Oa
0
0
CO
CO
2
b
c
CO
(L
o
CO
CO
0
"3
0
^ O
o o
CO
0
CO
o.
0
E
c
o
B ^ H
CO 0
11
A A
^ y_ 0 Q_
" i O > 3)
i2 i= BE
BE O m
O CO
|.i"o
l i t
III
" 3
0
CJ
o ^
^
!
c
0 aC =
ssli
I ^ H
CO c c
c
o
B ^ H
"co
E
b
c
> >
I ^ H
E
re
re
c
o
OT
O
CL
A A A A A
CQ
E
o
>
(fi
c
o
CO
MannlngB_00007422
CO
3
tf)
O
O
tf)
o
CO
LU
U
<
<
z
O
LU
CL
O
CO
CO
O
CO
Q
0
0
"3
0
2 8
0
O
_ o.
0 C
E .2
IJJ 0
>- E
Ps
0
2 ^
^ 3
CO o o
0 > 0
0 C >
> 0 -
0 0 CO
CJ
c
O 0
0
c
o
0
Q.
0
3
0
>
H ^ I 2
III ^ i t tr\
"3
3
0
0
CO
0
(0
0
>
"3 _
0 CO
o
o
LU 3
0
C
LU
0
"3
CO
3) o
0 O
Ui
o
o
0
o
5> 0
E
to LU
O La
a o
0
0
E
3
0
CO
0
0
0
to
E
3
O
Ui
H
< 2
$
o
I
0
o
o
O 0
CO -o
CL 0
? o
It
0
0
0
^ o
5 =5
A O A A A A
0
o
0
0
3
i
3
0
"3
0
0
O
0
0
O
E
0
E
0
OC
c
o
0
0
0
ManningB_00007423
^
1^
CO
^
o
0
c
0
^
3
CO
c^
^
o
re
E
re
c^
o
tf)
re I
0 0
Ui
*- re
ll
1^
*- re
JS c
o).
c re
z s
> o
c >
re E
tf) 0
Z c
0
tf)
3
0
>
O
o
0
3
tf)
O
o
tf)
i l
2 re
o. E
H
8 re
I i
X o
tf)
UJ o
CO o
CL p
o
1^
o .S>
u_ o
mwmm
o
CL
ManningB_00007424
CO
CO >^
_o o
z I
^ o
.5 o CO
c
g
to
CD
CO
CO cr
o i n
CO
CO
JO
O
0)
S
o
<
O
o
CM
0)
^
CO
<
CD
E
o
I o
LU Q
g
CO ^
o b
? 8
o
CD
CO
g
to
CD
3
O ^
lO
CO T -
CD M_
^ o
"D Csl
CD T-
O
CD
^
CO
t i
m CO 2l UJ 5
O 0
g
to
E
o
CD
g
>
o
CO
CD
CO
0
CL
o
O JD
-Q 0
CO
CD
"D
^
b
CD
CO
6 a-
g g
I CD
UJ CO
tf)
ManningB_00007425
CO
M.
C^-
C"
C^-
tf)
O
tf)
UJ
O
ManningB_00007426
Prosecution Exhibit 53
14 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
Intelligeoce Aoalyst Course
CourseA/ersion: 243-35F10 / 001
Delivery Group/Phase: A / 0
Status: Commandant Approved as of 2008-10-02
TABLE OF CONTENTS
PAGE
Lesson 1 Section I Administrative Data 4
Section II Introduction 7
Terminal Learning Objective - Identify 35F10 Course Administrative
and Academic policies 7
Section III Presentation 9
Section IV Summary 10
Section V Student Evaluation 11
Lesson 2 Section I Administrative Data 12
Section II Introduction 15
Terminal Learning Objective - Identify principles of protecting classified
information, material and media 15
Section III Presentation 17
Section IV Summary 53
Section V Student Evaluation 54
Lesson 3 Section I Administrative Data 55
Section II Introduction 58
Terminal Learning Objective - Present Intelligence Findings 58
Section III Presentation 65
Section IV Summary 461
Section V Student Evaluation 463
Lesson 4 Section I Administrative Data 464
Section II Introduction 468
Terminal Learning Objective - Perform Map Analysis and Construct
Proper Military Symbology 468
Section III Presentation 470
Section IV Summary 577
Section V Student Evaluation 578
Lesson 5 Section I Administrative Data 579
Section II Introduction 582
Terminal Learning Objective - Define the Operational Environment and
Identify U.S. Warfighting Doctrine 592
Section III Presentation 606
Section IV Summary 617
Section V Student Evaluation 618
Lesson 6 Section I Administrative Data 619
Section II Introduction 622
ManningB_00011649
X
PROSECUT ION EXKi
PAGE
PAGE
OFFERED:
OF
S ' i for idcn
_ PAGEADMI
PAGES
jr idcnfpc
Mi l T ^ : .
caMon
Terminal Learning Objective Describe the Battlefield Effects 632
Section III Presentation 645
Section IV Summary 657
SectionV Student Evaluation 658
Lesson7 SectionI Administrative Data 659
Section II Introduction 662
Terminal Learning Objective EvaluatetheThreat 662
Section III Presentation 664
Section IV Summary 670
SectionV Student Evaluation 671
Lesson8 SectionI Administrative Data 672
Section II Introduction 675
Terminal Learning Objective DetermineThreat Courses of Action
^COA^ 675
Section III Presentation 677
Section IV Summary 692
SectionV Student Evaluation 693
Lesson9 SectionI Administrative Data 694
Section II Introduction 697
Terminal Learning Objective Draft ani si c Plan 697
Section III Presentation 698
Section IV Summary 702
SectionV Student Evaluation 703
LessonIO SectionI Administrative Data 704
Section II Introduction 708
Terminal Learning Objective-ConductTargeting in Phase III and
Phase IV Operations 708
Section III Presentation 710
Section IV Summary 791
SectionV Student Evaluation 792
Lesson11 SectionI Administrative Data 793
Section II Introduction 796
Terminal Learning Objective Conduct Intelligence Analysis 796
Section III Presentation 797
Section IV Summary 807
SectionV Student Evaluation 808
Lesson 12 SectionI Administrative Data 809
Section II Introduction 812
Terminal Learning Objective Produce the products for the Mission
Analysis 812
Section III Presentation 814
Section IV Summary 821
SectionV Student Evaluation 822
Lesson13 SectionI Administrative Data 823
Manning8^00011650
Section II Introduction 827
Terminal Learning Objective Conduct Intelligence Analysis 827
Section III Presentation 829
Section IV Summary 842
SectionV Student Evaluation 843
Lesson 14 SectionI Administrative Data 844
Section II Introduction 848
Terminal Learning Objective Oualify Soldiers on Core WarriorTasl^s
and Battle Drills 848
Section III Presentation 849
Section IV Summary 851
SectionV Student Evaluation 852
Appendi ^AVi e^gr aph Masters ^I^^A^ A 1
Appendi^B Test^s^andTestSolution^s^ ^N^A^ 8 1
Appendi^C Practical Exercises and Solutions ^N^A^ C 1
Appendi^D Student Flandouts ^N^A^ D 1
Manning8^00011651
Prosecution Exhihit55
Ipage
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibit 5^
Ipage
classified
"SEC^RET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibit 5^
Ipage
classified
"SEC^RET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibit 5^
Attachment
l^pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
^ated20August2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibit 5^
2pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibit 61
2 CDs
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
Prosecution Exhibit 62
2pages
classitied
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classi^ed
supplement to the original
Record ofTrial
03
3
2
3 '
( O
' o
o
00
- vj
vj
N
O
CD
a <
e
c
o
r
d
i
e
w
Nj
^
vl -xl
^ ^
>J ->l
^ o
VI VJ v l VI v l v l v l v j v j v j v j v j v l v l v l v l v l v l v l v j v l
(/)
UU UJ UJ UJ UJ UJ UJ UJ UJ UJ UU Ul UJ OJ UJ LU UJ UJ UJ UJ UJ UU LU LU UJ LU UJ LU LU LU Ul LU
(/)
f& A f
A
f i f f i f i f i f i f i f i f i f i f i f i f i f f i f i f i f i f i f i f i f i f i f i f i
o
00 00 00 00 00 00 00 00 00 00 00 VI v l v l v l VI VI v l Vl v j v l Vl v l
cn
CTi
cn cn cn cn
CTI
cn cn o
CTI CTI Ln Ln Ln
x
f l f i
ro
NJ O LO 00 00 v l v l v j Ln M I - '
O O o
LO t o LO v l
tn cn
Ln f i LU
M O
^
M O LO
cn ro cn
O f i UJ 00 Ln UJ l- O LO M O LC 00 O
cn
ro UJ LO v l M 00 LO
> M NJ i-> NJ NJ NJ NJ NJ i-> t - ' t - '
ro
NI NJ
ro
f o ro ro ro t o M NJ ro i-> i-> NJ M NJ ro t o
ro l-
>
Ln
O
Ln
o
NJ
o ro
O f i f i f i
O
NJ
g
NJ M M O ro Nl
cn o
ro LO
cn
NJ f i t o t o t o Nl LO
v j
cn
>J
^ NJ
f i
'*
f UJ v j 00 VI
NJ g ro NJ io
Ln
H" t-
f i v j
io
LO t
ro
00
NJ ro f i NJ
LO
M UJ i ^ j
bo
I - ' i \ j NI i- NJ l-> 00 I - " Ul I - " .C> f i
l->
UJ Ln Nl 00
>-
M NJ l-
l-
M M
.
2
8
.
2
4
h-'
i->
n
TJ
O
M
LO
M Ln
in
i-
T
O
Ln
M
T
O
^
un
Ln
f i
ro
f
f i
i-
l->
(Tl
i->
M
LO
Ln
i-
Ln
i-
f i
i - *
f i
f i
i->
f i
Nl
ro
Ln
in
.
9
.
9
5
NJ
LU
t o
ro
l->
f i
ro
f i
i - '
f i
M
t o
.
2
8
.
2
4
LO
ro
UJ
I
P
A
d
d
n
TJ UU
a\
T
O
ivj
Ln
00
M
t-*
^
x
UJ
i - *
UJ
<n
Ln
l-
U)
Ln
t-"
NJ
NJ
NI
UJ
ro
p
i->
v l
00
UJ
ro
M
f
I - *
UJ
NJ
UJ
M
f i
LO
o
I - "
M
.
9
.
9
5
cn
00
LO
O
M
cn
NJ
LU
i - *
VI
Nl
I - *
.
2
8
.
2
4
Nl
t->
cn
00
I
P
A
d
d
r
o
UJ f o t-* Xi f i UJ
l-
U)
Ln
t-"
NJ
NJ
^
i->
io
Ln
lo
f i 00 t o H
i-
LO
o
t o Ln Ln
i - " 2
r
o
UJ Ln M UJ
cn
00
ro i - "
UU 00
O cn
f-> t o LO LO LU t o 00 LO
n
CL
6 Ln
~u
f i NJ
cn
UJ
ro
00
LU
wt
00
O
wt
C
n
rt-
71
00
o
00
1
o
LU UJ UJ UJ UJ UJ UJ Ul UJ UJ UJ UJ UJ UJ UJ UJ UJ UJ UJ UJ UJ UU UJ UJ
o
00
1
o
. .
\
-V
. \
.
~ v
. . .
LU LU UJ LU UJ UJ LU UJ
<
o
00
1
o
y-' H" t-" l-> I-> f-" M t-" h-> I - * l-> I - " I - * M I - * t-" I - " H-* l-> h-" k-*
(->
M
.
o
00
1
o
00 00 00 00 00 00 00 00 00 00
oo
00 00 00 00 00 00 00 00 00 00 00 00 00 h-> t-" t-* I - " h-" M h-"
m \ ^ \
^
V, OO 00 00 00 00 00 00 CO
m
O
o o o o o o o o o o o o o o o o o o o o o o o
OO 00
v ^
D
a
t
e
M CO 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
oo "o o o o o "o
O O
D
a
t
e
M
I - * I - * (-> h-" I - * t-* l- l-> l - * t-* t-> t-^ (-> M I - ' I - " M H l- l-> l-> M H"
00
oo
00
oo
00 00 00 00
D
a
t
e
^
I - ' l- k-* M M k-* l- l-> I - *
o o o o o o o o O o o o o o o
LO LO LO LO LO LO LO LO
D
a
t
e
(U
UU UJ UJ f\J M NJ M l-> o
Ln f i UJ UJ UJ Nl ro NJ NJ
o o o o o o
Ln Ln f i f i UJ NJ IO t o
(U
f- H* O 00 00 00 Ln ro
>-> ^
Ln UJ NI 00 v l v l NJ LT Ln Ln Ln t > LU 00
cn
UJ
o
LO 00 00 Ln
t/
> > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >
"O
S
s
S S S S S 5
s
S
s s s
2 2 5 S 2 S 2 5 ^
s
S S S S 2 S S 2 S
X
m
n
o
fD
<
a
>
a.
a.
O
IU
ro H> NJ h-> UJ NJ ro I - * ro UJ UJ ro h-" I - "
LU LO O LO VI VI v j 00 v j VI Ln Ln v j v j VI v l LO VI v l VI v l f i f i v l v l v l Ln O
o
VI LO v l
LU Ln OO Ln Ul LU UJ Ln UJ LU Ln Ln LU UJ LU LU Ln v j t o LU UJ f i f i LU LU UJ Ln ro UJ UJ 00 LU
LU UJ Nl ro Ln Ln
cn
00
cn
v l M I - " f i VI Ln Ln v l Ln v l VI ro ro
cn
00 v l VI t o f i v j 00 Ln
UJ
cn
ro LU O Ln v l
-'
k-"
cn
NJ t- LO LO 00 h-" NJ f i 00 f i IO LO f i
o
Nl 00 Ln VI Ln t-
cn
UJ
t o IO 00 M
un
O LO v l NJ Ln f i f i 00
O
f i i-
cn
Ln f i ro v l VI v l v j UJ
cn
f i I - " LU
cn
NJ
UJ 0^ h-" O 00 f i NJ LO UJ l-> LU
O
OO 00 LU
cn >-
f i
ro
Ln H
(-
LO l-> LO LD t o h-* M Ln f i
l-> l-> t - ' i- h-" H' h-" M l- M t-* t-" l- I-> H" t-> t-*
(-' I - * I - * I - * t-" I - * I - * M l->
>-> h-> l-> l- M l-
LU UJ UJ UJ LU LU LU LU LU LU UJ UJ UJ LU LU UJ LU UJ UJ LU LU UJ UJ UJ Nl Nl ro ro
ro ro ro
NJ
00 00 00 00 00 00 VI VI v l NJ NJ NJ NJ NJ
fo
NJ ro I - ' M H I- M
o
00 00 00 00 00 00 00 00
f i f i f i f i f- i - * i- M M i-
M
i - * i - * i - " -> M NJ ro
Nl NJ NJ ro LO bo bo bo bo bo bo bo bo
Ln Ln Ln Ln v l CTI LU f i f i t f i f i f i t f i f i f i f> O
o p p p o p p p
f i f i f i f i f i
Ln
NJ l- j-
UU LU UJ UU UJ UJ UJ LU
o o
P P
H Nl NJ i- i - ' M M M i - * M
LU LU I - * VI i o f i LU LO Ln Ln Nl Nl
i - " i - " i-> Ln Ln i- l-
UJ UJ LU f i Ln un Ln Ln LU LU LU
v j cn v j i-> fO
v l
Nl cn NJ LU
LO LO
8
O
NJ
ro
l- UJ UJ VI V l t o LO
io O
UJ
p v l l->
VI vJ VI
O Ln t-^ NJ
io cn
Ln M M 8 Ln LO M LU LU
i- i - " O cn l-> i-> cn O
00 M
ro
o
i- 00 00
u
I - ' ro
(->
v l Ln ro f i f i v l VI f i UJ t-*
ro o
LU v l v l
00 t o
ro
Ln Ln t-" LU i-> UJ UJ l- O LU LU
f i f i VI
M H
v j LU
ro
i-> LU l-> H
ro
v l UJ UJ LU UJ Ul ro UJ Ul LU
UJ LU UJ
o O
Ul LU UJ LU Ln LU
LO
~ v
v l
UJ
ro
^
Ul
I - "
^
t-*
LU
Vj Ln
^
v ^
UJ
t-
cn
Ln LU
LO
~ v NJ
P
V, H M O M i->
ro
v l i-> M 00 ro M
ro
NJ NJ
ro
M
ro
t o LO
cn
Nl UJ I - *
00
> ro
00 LO
cn
LO t-
\
v j 00 00 NJ UJ
cn
i- l- UJ LU LO f i I - * NJ t o
o
O 00
'
O
.
v ^
o O
o \
O
t o
.
o
00 00 O
o o
00 i-
O O
OO
O o
00
O o o O o O o O O O
O
o
00
o o o o o
00
M l-
00 00 00
o
00 00
M
00 00
I - "
00 00 00 00 LO 00 00 LO LO 00 00 00 00 00 00 00 00
M M f- LO h-* v l NJ t o
(-'
Nl
o
LO l-
ro f i Nl l->
cn
v i t o
cn cn cn
l- NJ 00 l-> t o v j v l VJ 00
UJ
LU
o
Ln UJ NJ
o
UJ
O o
M
o
NJ
ro f i l-> LU o
UJ
o
UJ i-> NJ f i
o Nl UJ Ln o f i f i
v l k-* NJ 00
un
LU 00 00 Ul
ro
Nl f i v j
ro o
00 NJ M
cn
LD i-> t o
ro cn
VI
O
LO f i LO M l-
0 > > > -o > -0
>
T3
D
> > 0 "0 D "0 o 0 > > > > > T3 > TJ T3
a
13 T3 -0 D
s
^ ^
^ 5
^
5
s
^ ^
S 5 2 5
^
s
^
z
S S S S 2
s
S S S S
s
S 2 5
<
n
^
(/)
o
>
n
m
TJ
^
O
Q.
C
n
r +
7
00
o
00
I
o
m
0)
( / I
10
<
fo'
s
>
n
n
D
5
a.
c
n
33
cm
m 00
s s
n
-a
-o
>
Q.
CL
O
OJ
0)
3
3
3 '
( Q
O
CO
^
vJ
vJ
v l v l v l v j VI VI v l v l v l VI v l VI
UU UJ LU LU LU LU LU UJ UJ UJ UJ LU
Ln Ln Ln Ln Ln un Ln Ln f i f i f i f i
O O O
o
O O O O LD LO LO LO
f i ro ro M I - * I - *
o o
CO 00 00 v l
LU M O
cn
Ln LU LO I - " 00
cn
LU Ln
l-> t-* t-*
(->
M l-> h-> l->
(-'
ro t-* Nl
f& f i f i f i f i to f i f i Ul t-" LU O
00 00 00 00 00 LD 00 00 Nl
ro
p
f i
(->
t-* I - * I - ' M UJ l-> t-* I - " f i LU ro
ro NJ ro ro ro M ro ro f i Ln
p
t-*
f i f i f ^ f i f i
LU
f i f i LU
i - l i- io
l-> l-> i-" i-" i->
LU f i to ro 00 LU
00 LO LO LO LO Ln o
P
i->
cn
LU LU UJ UJ
Ln ro Ul
p - l->
f i f i f i f i f i f i
o i-"
A
VI
o
M M
(-
Ln
-'
f i
UU LU
UJ LU LU UJ UJ UJ UJ Ul Ul UJ
^ \ ^
t-* l-
t-" M M t-* t - i
(->
t-" M t-" M 00 00
00 00 00 00 00 00 00 00 00 00
v _
. '.
v ^
v ^
v^ o
O
o
O
o o o o o o o o
00 OO
00 00 00 00 00 00 00 00 00 00
t-* t-" I - * t- t-* h-* t-" l-> l-> ro ro
LU t-> t-*
(-
M I - * l-> M
o o
Ln Ln
o
LO LD 00 00 00 f^ I - * f i ro 00 ro
TJ TJ TJ TJ TJ TJ TJ TJ TJ TJ TJ TJ
S S 2 S S S S S 2 2
s
S
00
oo
00 00 00 00 00
3D
m
n
o
^
m
<
o
>
Q.
Q.
O
OJ
UJ UJ UJ ro NJ Nl I - " t-' I - ' M ro I- )-> ro
ro NJ ro v l v l v j v l cn v l
cn
v l v l v l v l v l v l v j v j v l v l v l v l LO LO LD 00 f i v l v l VI
cn cn
O
00 00 00 Ln f i LU f i cn t-"
cn
f i Ln f i f i f i LU LU f i LU LU
cn
LU ro NJ O Ln
o
LU LU LU LU UJ Ln
Ln Ln Ln O a\
f i UJ un LU f i Ln Ln Ln Ln 00 VI ro Ln f i
o
Ln Ln Ln
cn
M v l
cn
Ln f i Ln Ln 00
Ln Ln UJ f i
p
00 LO f i Ln f i O ro f i f i f i LU f i v l 00 00
o
t-" I - " O
o
LO UJ LU LU LO f i UJ O
LU i- f i UJ
^
ro l->
cn
UJ 00 ro I - " CTi
cn cn
LU M Ln
o
Nl NJ
o
Ln NJ LU Ln f i
cn cn
00 f i
cn
Ln
00 v l M LO Ul
o
f i UJ O NJ UJ LD 00 v l
cn cn
ro Ln Ln
cn
v l cn v l LU ro f i M f i
cn
UJ 00 LD 00
K' l- M I - * I- l-> i-> M t-" M l-> l- M i- M t- i-> h-' M i- I - " l-> M l-> t-" i->
->
I - * i-> i-
f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f& f i f i f i f i f i f LU UJ LU UJ
Vl v l Vl VI VI v l v j
cn
tn
cn
t UJ UJ LU LU LU LU LU LU LU LU UJ I - " i-> t-" h-* i-> i-> LO LO to 00
ro NJ ro ro ro ro ro to LO LD
(->
v j v l v l v l Ln Ln Ln Ln t- I - ' i-> ro ro ro Nl ro Nl Nl UJ UJ UJ
un Ln Ln Ln Ln Ln Ln 00 00 00 LO Ln Ln Ln Ln V j v l v l v l v l v l v l ro Nl NJ (Tl
d\
f i f ^ f i f ^ f i f i
ro t-* I - " UJ Ln Ln Ln Ln l-> l-> t-" l->
Ln Ln Ln
p
O O O
o o o i - i I - " i-* f i
i- l- r-* i- I - * l->
o
to ro Vl
o o p
O
cn
tn
cn cn l- i-* i-
v l
^
v l v l v l v l v l 00 v l v l Ln
cn cn cn
f i f i ro
o
f i f i
p
00 00 00 00 LO l- M I - * i- i-> M I - " i->
cn
cn cn
tn
p
P
NJ v l
f i
Ln -'
v l f i
!^
f i LU
Lu
LU UJ
Ln
l- |->
Nl ro ro Nl ro Nl Nl t-* f f i
5
cn
(Tl
cn Ln Ln i - '
v l UJ O v l I - " t-" i-k k i
Ln f i i->
->
Nl
Ln Ln
v l v l v l VI tn cn cn f i
i- i- M 00 00 f i
O
f i ro v l LU LU
LU LU LU UJ LU UJ f i CT-i LU
v l v l VI v ^ UJ ro LU
,
LU UJ LU LU UJ tn v ^ i- UJ LU
cn cn
' ^
f i LU l- .
ro
ro
Nl
ro f& UJ UJ LU
^
M v j v l
tn
NJ O
Nl ro Nl h- 00
.
ro Nl
v ro
\ o o
O NJ NJ ro I - * 00
o
M
^
LU VI ro I - " 00 Nl NJ
f i f f i UJ
cn
LU un LU 00 CTI
>
f i t-> v l LO 00 l-> l-
o
v LO
o
LO
o o
O
o
~ v
00
O
o o
v ^
o o ^
O ~ v
o
o "o o o
00 00
o
O O O
o
O 00 00 00
o o o o
00 00
O O O
o
00
o o o
00
o o
O
LO LO LO 00
^
i-
00 LO to LO 00 OO
^ ^
00 00 00 00
H"
00 00 00 00
(-
00 00 00 00 00 00
t-> I - * to LD ro
o
LO ro LU UJ ro v l
(-
M M tn LO 00 LO t-" NJ Nl LU LU
cn o cn
Ln ro NJ Ln f i M
Ln ro f i NJ
o
Ln f i Ln LU M UJ O LU LU UJ NJ M
o
ro
o
NJ M LU ro
o
UJ
o
O Ln Ln O Ln UJ
NJ VI
cn
LO LO VI v l M 00 LU v l v j f i f i f i Ln v l v l f i M v l LU Ln v l LU Ln Ln f i cn 00 f i to Ln
T3
0 > >
TJ
> > > > >
-a
-o
-D -D TJ
> > > > >
TJ TJ
> > > > > > > D > >
TJ
2 1 S 2 S 1 2 2 S S Z S S S Z
2
1 2 2 2 E 2
s
S S S 2 S S
2 5
s
S
<
m'
S.
g
n
-o
o
a.
c
n
30
03
R S
I ?
T3
T3
>
a.
a.
o
OJ
m
3
3
3 '
CO
o
CO
vl
vJ
N
VI v l v l v l Vj v l v l v l v l v l v l Vj v l v j v l v l v l v l v l v l v j v l v j v l v j v l
LU LU LU UJ LU LU Ul LU LU LU LU LU LU UJ UJ LU UJ LU LU UJ LU LU LU LU UJ LU
Ln Ln Ln Ln Ln Ln un Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln
Ln Ln Ln Ln Ln
f i f i f i f i f i f i f i f i UJ UJ LU Ul LU LU UU UJ LU
ro
NJ
ro
NJ
f i
ro
I - ' i->
O to
00 VI f i f i NJ t-* l->
to
VI CTl
Ln
LU
ro ro
0
o
to
Ln LU LU
ro
Ul
Ln
f i f i f i 00 LU
Ln
I - * 0>
cn o
Ln
LO
cn
M
cn
Ln
f i 00 l-> f i LD f>
ro
M i-> h-* t-" l- t-* Nl ro ro
ro
ro M ro l-> ro ro NJ t-' ro 1-" ro NJ ro
f i f
Ln
f i Ul f i LO LD <3 (3
o o
M f i
O
f i
O ro
O NJ
ro
f i f i Nl NJ
ro
00 00 v l 00 00 00
p P
f i f i v l v l v l
p
l->
Ln ro p
00 CO CO
Nl f i
l-> i-
ro M
i-"
M Ln ro
Nl 00
bo
f i ro
i-* fo b
Ln
Ln bo
i- M h-" M Ln Ln
NJ
ro
0 NJ (T\ NJ
ro
cn p
M
Ln Ln
Lfl Ljn I - "
ro
LU
p
ro
NJ
f i f i
ro
f i
Ln
f
ro f i Nl
f-' Ln
ro
i->
f i v l
O
cn Ln i- l-> cn
f i f i
f i ro f i
i-*
ro
LU
i-"
NJ f i
i-
Ln Ln
M Nl NJ NJ v l f i f i LU UJ 0 f i
'.^
ro
p
f i
Ln
o
v l
i-^
f i
l->
Nl Vl
Ul
o
UJ
ro j->
i- UJ Ln
v l
cn cn p LU LU NJ
Ln
f i f i
i-*
to
M
ro
^
00 f i Nl
o
f i
bo i-
CTt
to
t-
cn
t-" UU
Ln
i-> LU Ln
cn
LU
o
i- v l LU i- i - i
cn
NJ v l LD O t-
LU 00 i-> 00
Ln
UJ
ro
f i v j v l
LU LU LU UJ LU UJ LU UJ LU LU LU LU LU LU LU UJ LU LU LU LU UJ UJ LU LU LU t j j
M l-> M M l-> i->
-'
M h-> l- l-> M l-> M i- M l-> I-> l-> i-> t-" M t-* M i->
to
LD
to
LO LO LD LD LO LO LO LO LO
to to
LD LO LO LO
50
00 00 00 CO 00 00 00
.
"V
50
00 00 00 00
0 0 0 O O
o
O O
o o o o
O O
o o
O O 0 0 0
o
O
o
O
o
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
v l v l VI v l v l v l v j
cn cn cn cn (n
tn Ln f i ro ro I - ' to 00 0^ Ln Ln f i LU LU
f LU ro ro ro M
o
Ln LU UJ Nl M l-> LU
o
Ln ro
o
l-> f i Nl Ln LU ro f i f i
cn
NJ v l
cn
Ul LU
tn
00 UJ i-> v l v l f i LD
(-> cn
00
to ro
t-" v l NJ NJ LU f i f i
> > > > > > > > > > > > > > > > > >
TJ TJ T3 "D TJ TJ TJ TJ
2 2
s
S S S S 2 S 2 S 2
s
2 2 2 2 S 2 S S S
^ Z S 2
30
m
n
o
7;
m
<
TJ
>
a.
Q.
O
oj
NJ ro ro NJ NJ Ul LU ro NJ
v l v l v j v l v j v l v l v l 00 v l v l v l v l v j v l v l v j v l VJ v l
cn
LU v l v l LO 00 v l v l v l v l 00 I - * l-> v l
LU UJ LU LU
Ln
UJ LU LU I - *
Ln
LU
Ln
LU LU
<n
Ul UU f i LU LO 00
ro
LU LU LU
un
LU UJ v l LU
Ln ro ro
LU
Ln un
Ln v l LD 00
Ln
f i
to to
Ln
o
Ln
00 LD
cn cn
f>
cn
cn ro
v l v l
cn
LD 00 Ln f i
Ln Ln
VI
to
00 v l
O
O O LU LO
Ln Ln to
LD
to
00 f i (3 v l Ul LO 00
o o
ro
cn
v l I - " O
o
Ln LO LU LU 00
O
00 Ul
ro
i-> M
cn
f i
cn
f i O O
cn
00 Ln f i l->
o
v l v l
o
i- 00 (3 UJ
ro
M O t-" t-" O O
to
o
f i 00
ro
O
Ln
t- LU v l
ro
LU LD UJ LD v l UJ LU
o o cn
to
0^ v j v l
to Ln
o
00 LO f i Ln LU
Ln to ro
00
cn
t->
(-
I - " t-" i - " t-* l- M I - * l-> M M i-> t- M M M l-> t- i-> I - * h-" l- i- M l-> t- M t-* t - '
f i f i f i f i f& f i f i f i f i f i f i f i f i f i f i f i f> f i f i A
t>
f i f i f i f i f i f i f i f i f i f i f i f i f i
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 CO 00 00 00 00 00 00 00 00 VI VI VI VI v j v l v l
#- (-> -
M I - ' M M I - " t-" M t-" I - " M
>->
l - *
->
l-> t- M M M I - * M ro ro ro ro ro ro ro
ro
ro
ro ro ro
ro Nl ro
ro
NJ Nl
ro
ro NJ
ro
Nl
ro ro ro ro ro
NJ
ro ro ro
Ln Ln Ln Ln Ln Ln Ln
f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i
t-" I - * t-" t-" I - " l-> I - * Nl ro ro ro
ro
ro
to to to to
LO
p p
LO
to to
LD CO 00 v l VI v l VI
cn en cn
01 CTI
cn
Ln
f i f i <3 Vl f i UJ LU O
O
00
LU LU Ul
ro ro
Ln Ln
cn cn
LU
p p P
00 v j Ln NJ
p
f i 00 00
f i f
v l
p
00
p p
f i
f i f i f i
i-" i-
Ln Ln to tn UJ O f i
*
Nl Nl NJ Nl
ro
bo
Nl
^
Nl Nl
(->
ro
i-"
Ln
o
K-*
I-
ro
^
v l f i
l- l-> i - " 00
O
cn
f i UJ v l 00 O
cn
CTI
cn on
LU LO UU CTt f i M f i NJ f i LO 00 LU
cn cn
LU
l->
Ln
LU
to to Ln
v j
f i LU f i LU
UJ LU UJ LU LU LU
LU LU UJ LU Ul LU
'
LU LU f LU LU
ro
LU LU LU Ul f i UJ VI VI LU
\
i-> M M I - * f i NJ
^
ro
V , i- M LD
\
Ln v^
-V M
.
t-*
M
ro
O NJ i-> 00
ro o
to
M f i
ro
ro
O
ro
LO 01 t-"
LD
ro
M
(->
t-* 00 LU
-'
Ln ro
Nl
ro
00 00 00 M f i LD V.
cn
LU 00
ro
o
00
\
O Ln
o
LO 00
cn
LD
00
o
to
Ln
Ln
Ln l-
Vv
o o o o o '
O
^
O
o ^ \
Vv
'.
O i->
O
o o o
00 O O 00
o
00 00
o o
00 O
o
00
o
CO
to
O
o o o
O l-> O 00
o o
O
^
O
o
00 00 00 00
I - *
00 00
l-> to l-> M
00 00
M
00 00 00
l->
LD 00 00 00 LO
o
00 00 00 OO 00 00
t-> t-" M 00 l- LO v j NJ f i M
o
LO l- ro M M ro ro ro
o
f i Ln
cn
M v l v l v l NJ LU IJ\ NJ to 00 00
l-
^
M Nl
ro
f i f i l- M f i l-> LU LU LU LU LU Ln NJ Nl l-
o
Ln Nl LU NJ Nl ro l- l- LU f i f i ro (3
LO 00 00
to
cn
LD
cn
00
ro
Ul
Ln
O (3 Nl
cn cn
f i v l Nl
Ln
v l LU LU M
to cn to f i LD
to
v l
to
0 D 0 > > > > D
T)
> > >
TJ TJ TJ
D
T) TJ T3
>
TJ TJ T3 TJ
> > >
TJ TJ
> TJ > > >
2 2
s s
2 S 2 2 2 S 2 2 2 S S
s
2
^
S
s
2 2 S
^
S ^ 2 S S 2 2 S 2 2
<
fo'
i
>
n
n
TJ
o
Q.
C
S
3J
00
s i
m ^
< ^
TJ
>
Q.
a.
O
01
0)
3
3
3 '
( Q
' o
O
CO
vJ
vJ
vJ
N)
v l VI v l VI VI VI v l v l VI v l VI VI v l VI v l v l VI VI VI v j
LU LU LU LU LU LU LU LU UJ UJ LU LU UJ LU UJ LU LU LU LU UJ
cn
01
cn cn
CT^ 01
cn en
CTI
cn cn
01 Ln
Ln Ln Ln un Ln Ln Ln
i-> I - * M i- O
O o o O o o O
LD LO LO
to
LO LO 00 00
Ln ro ro
-
v l v l v l
cn Ln ro
i-> t - i 00
cn
f i
ro O o
00 00
LO
tn
UJ
o
LO 00 f i f i
ro cn
00
cn
LU
o
f i
to
v j LD
Ln
NJ ro i->
>->
H ro ro ro i-> ro ro i- ro K' NJ ro NJ ro Kl M
O O
LU f i LU NJ
o ro Ln
NJ
ro
f i
O
f i
o ro o o
f i
Ln
Vj v l v l 00
o NJ
f i
ro
v l
Ln ro
00 f i 00
Ln Nl
VI v l CO v l
bo bo i - *
>->
to Ln Lu
un
ro p i-> Lu i-> Ln
00
bo bo i-> ro
p p
LU
ro p
Ln
p
un
ro 00 to ro p ro
Ul
p Ln ro o
v l M i-
f i
ro i->
ro
ro 00
f i f i
ro cn v l v l
f i
ro
00 LU
i - '
LU
to
ro
f i
Ol
to
i - " to bo
Nl
ro
00 CO
i-
LU
bo
l-
Nl Ln NJ I - "
(- i- ro
Ol
to
00 cn
p
IO
p
bo v l ^
p
f i
h-" UU 01
o io i->
f i
Ln l-
LU VI
Ln Ln
M M
v j M
f i
LO
f i v l t-
f i
00
to
CTI VI
ro
f i
o
v l
CTl
LU LU LU LU LU LU LU UJ LU LU UJ LU
LU LU LU LU UJ LU LU LU
- \
.
~ v i-> l-> I - l M
->
i-> l-> i- M M l-> I - "
l-> l-> M k-*
(->
I - * k-* LD LO LD LO
to
LO
to to to to
LD
to
to to
LD
to to
LO
to
LO
' '
>
LD
~ v
LO
\
LO
O o O o o O o o o o O O
o o
O
(3 o
O (3 (3 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
M -
t - ' M M t-* l-> I - * l->
(->
l-> l->
ro
M M l-> M l-> i-> M NJ IO
ro ro
M
-
l->
o o o o o
M f i UJ LU ro NJ M o Ln UJ ro ro Ln ro o f i UJ ro l- o
Ln ro
00 LU NJ
ro
LD UJ f i
o
00 v l
ro
f i
to cn
Ul
to
CTI 00
TJ TJ TJ TJ TJ TJ TJ T3 T3 TJ TJ TJ
> > > > > > > >
E 2 S S 2 2 S S
^
S 2 5 2 S
s
2 2 1 S
s
3D
n
n
o
^
n
<
-o
>
a.
a.
o
cu
ro M M NJ LU LU NJ
VI VI v l v l 00 v l v l v l v j v l v l v l v l v l v l LD
to
v j v j v l
cn
v l VI VI v l VI v l
f> O O
VI VI v j v l
LU LU LU f i
Ln
LU UJ LU f i LU LU f i f i LU LU v l vJ LU LU LU
cn
UJ f i LU LU UJ LU 00
cn Ln
CTI f i UU LU
Ln Ln Ln
01 UJ
Ln Ln cn
LU
Ln Ln
v j f i
to
v l UJ UJ
Ln cn Ln
VI VI
Ln
00
Ln
f i f i
ro
UJ
to ro
Vl
Ln Ln
00 00 00 00
(n O
LO f i
cn
LU
ro Ln
(->
O 00 UU
ro O
CTI f i 00
O to Ln Ln
00 01 i- f i
Ln
M LU
O O
00
ro
I - "
ro O <3
01 VI UU
o to
t-* LU
cn
LD
to
LO
o
LU LO LO 00 LO
ro
t o
o
VI v l I - " f i M
O to ro
Ln
f i LO
Ln
i-> l->
o
00 VI M f i
ro O
f i
Ln to
VI
to ro
f i v l LU f i LO LU f i UJ
ro
00 00
ro cn
M M
M t- M I - " i-> l- l-> K-l i-> I-> i->
->
l-> M K-l l-
-> (- -
M M l- I - l M M t - l M i-> M l- M h-l I - l l->
Ln Ln Ln Ln Ln
f i f i f i f i f i f i f i f i f i f i f i f i f i
f
f i f i f i f i f i f i f i f i f i
f
f i f i f i f i f i
v j v l v j v j LU 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Nl ro ro Nl Nl t - l M M M M M M M M M l- i- M M M
>->
l- l- M
-
M M M M M M r-' M
->
o o o o
IO ro ro ro ro
ro
Nl
fo ro i - l
f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i
w ro ro l->
l->
P
00 00
In
'*>.
f i f i f i f i f i f i f i f i f i f i ro
io Nl NJ ro
ro ro Nl ro ro
ro
io ro
f i v l v j
ro
M
Ln
IO
LU
v j
p cn p
f i f i f i f i l-> l-> f i
t
f i f i f i UJ LU
ro
Nl
O O O O
LD
f i f i p tn UU i - l
LU
v j t-> to M i - * i - l i - l i - l 01
P
io LD LD cn cn
l-> I - ' i-> LO Ln 00 00 00 00 UJ
cn
UJ LU
i-> o o
v l LO
to o
Vl Vl v l v l
cn cn
CTI
tn
M t- 00 Nl M LU LU I - ' LO U3 LD
to
f i
LD
ro
LO
ro cn Ln
l / l ( - i LU
ro ro
v j f i l- l - i t - i
O
->
i-> LU f i
tn tn
UJ f UJ LU LU M
LU UJ v ^ LU LU LU LU UJ LU LU LU v l Vj LU UJ UJ LU UJ LU
.
UJ
o
f i
-.
-V
^
M M
\
f i
'.
'
LU
NJ
LU
LU
M
UJ
ro
V.
f i
to
h-" I - * M l- M
to
NJ
ro
l- M
ro
IO NJ LU LU l->
ro
M
NJ
ro
M
ro
l-> 00 i-> LU CT\ l->
f i
O
LO
to
o
00 Vv
o
O
00 00 00
ro oo
f i
ro
\
00
o
LD f i
o
f i LO
>
00
o
'.
f i 00 CO
O
\
o
o
'
Vv
o
~ v
^
o o
~ v v..
o o
00
o
00
00
o o
00
to o
00
o o o o O o O o
00 00
o o O o o
00
o o
00
o
^
to o
^
O o ( 3
t - '
00 00
i->
00 00 00 00 00 00 00 00 00
t - i l->
00 00 00 LD 00
t-
00 00 00
to
00 00 00 00 00
o to to o
I-' M I - " VI 00
Ln Ln ro cn cn ro (3 o l- LO VI LU Ul i->
to v l ( 3 LD LU NJ LU LU f i l-> l-
CJ
UJ LU
o Ln l-> Nl f i f i Ln LU M f i ( 3 i-> f i LU
I - ' LU t-"
( 3 f i
UJ M LU f i f i f i UJ LU
(- o Ln
00 VI UJ
Ln Ln
-
f i M LU Nl
ro
v l
Ln
00 LJJ
O
f i f i LU LU
Ln ro
UJ v l
ro
M LU
Ln o f i LO Ln un to
> > > >
TJ TJ
> > >
o
TJ
>
-o -o
> > >
T)
> >
TJ TJ
> > > > >
TJ TJ
D
TJ TJ TJ TJ
2 S
^
S
s
^
E S 2
s z s
2 2 S 2 2 S S S
s
S 2 2 S 2 S S ^ E 2 2 S S
<
m'
>
n
n
TJ
O
C3.
C
n
30
CD
3*8
I i
^ %
T3
TJ
>
ca.
CL
a
01
m
3
3
3'
CO
UJ
' o
o
CO
vJ
vJ
vJ
CO
v l VI v l v l v l v l v j v l v l v l v l v l v l Vl v l v l v j v l v j v l v l v l v l v j
LU UJ LU LU UJ Ul LU UJ UJ LU LU LU LU LU LU LU LU Ul LU UJ LU LU UJ LU
cn
cn
01
cn
01
cn
cn
CTl 01 01
cn
CTI
cn
CTI
cn cn
01
cn cn cn tn
CTI
cn
CTI
v l VI v l v l v l v l CTI CTI 01 01 Ln
Ln
f i f i f i LU LU LU NJ NJ
ro ro
NJ
ro
01 CTI
cn
cn
f i h-l v l
cn
f i UJ
cn
LU v l Ln UJ
cn
01
o
LO LO 00 00 v l Ln
00 UJ
ro
I - l v l LU h-l v l h-l
ro
00 h-l 00 CTI
o
v l f i
o
cn
Ln v l LU v l v l
ro ro ro ro ro h-l ro ro ro h-l ro ro h-l ro ro ro h-l h-l ro ro ro Nl ro h-l
ro ro
0
ro
NJ CTI
ro ro ro
f i Nl
ro
f i NJ
ro o
f i t o
o
O
O ro ro
Ln
io io
v l
ro Nl
f i
io io ro
00
i - l io
CO
ro ro
p
h-l
p p
Ln VI
ro ro
v l
1-1
bo
I - l I - l
io
h-l h-l h-l i - l Ln i - l h-l h-l
Ln
io
Ln
i - l
bo
h-l h-l
ro
i - l UU
p
i - l i - l
ro
ro
t o i - l i - l ro bo 00 ro i - l t o
UJ
ro
p
f i f i f i
i - l i - l
O
ro
cn P
1-1
In O
o
ro
ro
in
ro
t o f i UJ f i
in
ro
io lu io io io cn
01
O
ro
0
cn
P
1-1 ro
UJ
ro
i - l
ro
i - l
P
o
in
ro
Nl
i - l
i - l
00
f i
i - l
Ln
H I
i - l
CO
lu
i - l
00
in
ro
ro
p
v l
h-l
f i
h-l
UJ
p
UJ
p
o
v l
p
i - l
o
cn
lu
Ln
cn
00 f i
o
f i
O
t o
t o
Ln
LD
LD LO
cn
VI h-l lu
f i
io
cn
h-l
f i
i - l
Ln
f i
i - l
Ln
f i
i - l
UJ
cn
LO 01 f i
h-l
LU UJ UJ LU Ul UU LU LU
ro NJ
.
ro
~ v
ro
LU UJ LU LU UJ LU UJ UJ LU LU UJ UJ UJ UJ
ro NJ
.
ro
ro
ro
ro ro
~ v
'
UJ UJ UJ
p
0 0
o
o
O p O ro ro
NJ
ro ro ro ro
IO Nl h-l h-l
> > o o
O O O
o o
O
o
to t o to LD LD LO LO
0 0 0
o o o o
O
.
-V
to t o to LD LO
00 00 00 00 00 00 00 00
o o o ^ o o o
O
o o o o
O O o
"o
1-1 h-l I - l 1-1 t-1 h-l h-l h J
00 00 00 CO 00 00 00 00 00 00 00 00 00 00 00 00
1-1 I - l I - l I - l I - l
o o o
t o LO 00 00 v l v j v j Ln
Ln v l 01 tn Ln Ln Ln f i
UJ LU LU LU ro
o o
LU LU
f i h-l f i LU ro O O UJ f i f i Ln LU h-l ro
t o Ln Ln Ln f i 00 LO 00 t o LU
ro
UJ h-l
ro
o
VI f i h-l f o
ro ro CTI 01 00
> > > > > > > > > > > > > > > > >
T) 13
D
TJ TJ TJ TJ
2
2
s
^ S
s s
2 2 2 S
s
5 2
2
S 2 S S S 2 S 2 S
3D
n>
JK
m
<
-o
>
a.
a.
O
tu
t o
ro ro LU ro h-l h-l h-l h-l ro
v l VI 00 v l t o LD UJ Ul v l VI 00 v l v l v l v l 00 v l LU v l v l v l
o
v l
o
v j v l O Ln v l v l v l v l v l v l
LU 01 Ln LU t o LD
ro ro
f i LU Ln LJ1 LU LU UJ
o
LU f i LU LU f i
o
LU f i Ln LU
ro cn
LU LU LU LU LU LU
f i UJ f i Ln
cn cn
h-l h-l
ro cn
VI
O
CTI f i f i LO f i f i
<n
00 O
<n Ln
CTI VI f i
ro
f i f i Ln
cn tn un
Ln
cn
00
ro
f i t o
ro
00 00 UJ h-l t o UJ V l VI
cn
f i 00 Vl
o
f i Ln V j h-l LD LD 00
tn
h-l 00 Ln NJ h-l 00 00
LU LU 00 00 v l
ro ro ro o
t o f i 00 h-l O t o h-l 00 Ln Ln h-l v j CO
o
cn
f i Ln
o
00 CTI h-l Ln 00
ro
h-l
t o 00 h-l 00 v l V j f i
ro cn un
Ln h-l LU t o
ro ro ro
cn
ro ro
v l
ro
Ln f i LU v l t o t o h-l Ln v l v l
ro
f i
h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l K l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l K l h-l h-l h-l h-l h-l h-l
to
LO LD t o LD t o LO LO LD LD LO
to
CTl CTI
cn
Ln
Ln Ln Ln Ln
Ln Ln
Ln Ln
Ln
un Ln
Ln
Ln Ln
Ln
Ln
Ln Ln
LD
to to to
00 00 00 00 00 00
ro ro
f i f i f i 00 v l v l v l v l v j VI v l v l v l v l v l v l VI v l v l v l v l v l
h-l h-l h-l t-1 Nl ro ro ro h-l h-l ro ro ro ro ro ro ro ro NJ ro ro ro ro ro IO ro ro ro ro ro ro ro NJ ro
ro ro ro ro ro ro
o o
LU LU
ro
rvi
ro
f i
ro ro
ro
ro o o o o o o
UJ Nl Nl
ro ro ro
h-l h-l
t o LO
f i f i
ro
ro
ro
NJ f i
ro
NJ
p p
00 CO
p
f i f i f i UU
ro ro ro ro ro
NJ
in
i - l i - l i - l v l v l i - l i - l LO 00 i - l i - l t o t o
P
i - l i - l f i f i i - l i - l
lu
i - l
lu f i ro
ro lu lu lu lu lu lu lu
00 01
Ln
f i f i f i
o
O
O
o
O
h-l LO NJ Nl
cn
ro
v l 00
ro
P
Ln f i
p p
Ln Ln un Ln
Ln
i - l
Nl v l NJ
LU LU
f i f i
to f i
h-l h-l
to LO LD to
v l
i - l i - l
h-l 00
i - l
CO
i - l Nl
f i
p
io i - l A f i f> io i - l
t o
Ln
i - l
lu
LO LO i - l i - l Ln LO
ro io
t o LO t o LU i - l h-l h-l
A
i - l v l i - l Ln f i i - l NJ A LU UJ h-l h-l
o
LU
UJ
ro
o
00 h-l h-l h-l h- f i f i
A
f i NJ
to
h-l 00 00 Ln
ro
Ln f i
o
f i f i f i f> f i
ro ro
00
UJ LU LU cn LU UJ h-l LU
LU f i Ln LU
Ln Ln
LU LU LU
ro
UJ UJ
^
UJ UU
Ln
LU CTl NJ LU LU LU LU UJ
^
V .
LD
to
' \
f i
ro h-l
v . h-l h-l h-l v ^ ~ v
\
f i h-l
tn
v h-l
'
v ^
h-l h-l
ro
h-l LU LU
ro
h-l h-l
o
00 h-l
ro
00
ro
LD
ro ro
LU h-l UJ 00
^
NJ 00 h-l h-l h-l h-l h-l
00 L/l UJ LD h-l h-l LU LU
cn
LO Ln UJ 00 LU v..
'
f i
Ln
00 OO
V,
ro
UU "V.
LD t o LO LD LD
~ v
~.
.
.
\ o o
V.
o
O O
-V
O
o
~ v
\
(3
-
o o o
O
o o
O O
o
O h-l
o
00 00
o o
00 00 00
O O O
o
00
o
00
o o
00
o o
O O O
00 00 00 00 00 00 00 00 00 00
O
00
h-l h-l
00 t o
h-l h-l
00 00 00 CO
h-l
00
h-l
00 00
h-l
00 00 00 00 00
LO f i 00 v l
Ln
f i
to to h-l NJ UJ 00
O
o
LO h-l h-l h-l
fo
v l
cn
Ln NJ h-l LU h-l Ln
LU h-l v l f i ro to LO
ro LU Ln
o
f i Ln Nl h-l Ln Ln h-l Ln f i
o
Ln Ln Ln h-l Ln Ln LU LU h-l Ln f i
LU LU NJ UJ ro ro Ln
UU ro
Ln
LU 00 CTl LU h-l
o
00 h-l 00 h-l v l 00 Ln 00
cn
LU
ro f i f i h-l
Ln
LU h-l
O (3
01
un
h-l v l 00 O
CTl
to
>
TJ TJ
> > > >
>
TJ TJ TJ
> > >
>
> > >
TJ
> > TJ TJ >
-a
> > > > >
TJ -a
> >
S S
s
S 2 2
2 2
^ S ^
2
^ 2
s
S
2
2 2 2 S
s
S
2
S S
2 2
2
2
2 S ^ 2
<
ro'
?
>
o
n
TJ
o
ca.
c
n
3D
03
? s
t l
^ %
T3
TJ
>
O.
a.
o
01
OJ
3
3_
3 ^
CO
' o
o
CO
N
v J
v J
v l v j v j v l VI v j v j v j v j v l v l v j v j v j v j v l VI v j VI v l VI v l
LU LU LU LU LU LU LU UJ LU LU LU LU LU LU LU UJ LU LU LU LU LU LU
CO 00 v l v j v j v j v l v l VI v l v l v j v l v j v l v j v j v l v l v l v l VJ
ro ro
00 00 00 v l
cn
Ln
Ln Ln Ln
f i f i f i f i UJ LU
ro ro ro ro
h-l
ro ro
LO LU
O
UJ
Ln
00 v j
cn
UJ 00 01 f i h-l
cn ro
00 UU LU
ro
00
LO 00 Ul LD LU LO h-l 00
o
h-l h-l LU 00
ro
NJ h-l
cn ro to 3 Ln 3
ro ro h-l h-l h-l ro h-l Nl ro ro ro ro ro h-l h-l h-l h-l ro ro ro h-l ro
ro ro
f i
ro
LU
3
LU
ro
3
ro 3
3 Nl UJ f i f i f i
ro ro
o
LU
ro
bo bo
P
00 Nl v j
ro bo
v l
ro
f i Ln
io
h-l LU
p
Vj
io f i
f i h-l
ro
ro
f i
Ln
ro
f i
Ln
i - l
bo
i - l
bo
i - l
P
p
Lu
bo
h-l
P
i - l h-l
io Ln
i - l
io
h-l
p lu ro
p
ro
f i
Ln
ro
f i
Ln
ro
f i
o
h-l
f i
LU
p
Ln
f i
UJ
P
p
Lu
p
ro
lu
h-l
p
i - l
io
NJ
h-l
f i
f i
3
vJ
H-l
ro
f i
Ln
f i
i - l
p
ro
f i
p
i - l
f i
P
i - l
ro
ro
f i
i - l
ro
A
f i
Ln
p
i - l
ro
Ln
io
UJ
p
lu
P
p
Lu
h-l
h-l
i - l
3
00
3
Ln
in
i - l
f i
h-l
Vl
cn
00
i - l
t o
ro
i - l
00
Lu
t-1
p
i - l
LO
P
i - l
VI
i - l
f i
i - l i - l
i - l
ro
Ln
00
Ln
f i h-l
cn
f i UJ
lu
i - l
t o
ro
UJ i - l
lu
o
v j h-l
h-l
Nl
h-l
I - l 00 f i f i i - l
00
h-l
f i
LU
VI
f i
f i
UJ UJ LU UJ UU
UJ LU UU UJ UJ LU UJ UJ v ^ Vv LU LU LU LU UJ LU LU LU UJ UJ UJ LU UJ
ro
Nl
ro ro ro
-V
^
NJ
ro ro ro ro ro ro
NJ h-l h-l h-l h-l h-l
ro ro ro
t o
ro ro ro ro ro
UJ UJ
~ v
ro
h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l UJ
~ v
. \ ^
O O 3 O O
* v -V.
o o
O 3
o
3 3 3
00 00 00 00 00
O 3
o o
3 3
o o o
00 00 00 00 00 CO 00 00
h-l h-l h-l h-l h-l
00 00 00 00 00 00
oo
00 00
f i f i ro 00 f i UJ
ro
h-l
ro
Nl h-l
o
3
LD LD 00 00 v l
cn cn cn
f i
h-l
h-l
3 ro h-l 3 3 UJ ro NJ 3 3 UJ h-l IO O
LU f i LU 3 ro
v l UJ v j
ro cn
UJ
3
f i
ro
f i CTI
ro cn
v j
to to
v l v j v l t o f i
TJ TJ
>
TJ TJ TJ TJ TJ
D
13
> > > > > > > > > > > >
2 S 2 2 S S S 2 2 5 2 S 2 S
s
2 <: 2 2 5 2 5
30
m
n
o
m
-<
TJ
>
ca.
ca.
D
01
h-l h-l h-l h-l h-l h-l h-l h-l h-l UJ ro h-l
v j
Ln
LU LU LU VI
Ln
v l v l v l v j
Ln
v l v j v j
3
h-l h-l v l 00 v l VJ v l UU v l VI v l v j v l VI v l v l v j v l
Ln
UJ Ln h-l 3 LU h-l LU LU LU
Ln Ln
UU LU LU UJ
to to
LU Ln LU f i 01 CTI LU 00
cn
LU f i UJ f i UJ UJ LU
00
cn
v l
Ln
Ln 00
3
00 f i f i h-l LO
Ln cn cn
Nl
to
LD
cn
CO
Ln
h-l
ro ro Ln
LO h-l
Ln
LU f i 00
cn Ln
f i
LO 01 LO f i LD 00 h-l
to
00 00
o
NJ f i LU 00 LU
to
00
ro
f i h-l VI UJ h-l 00
Ln
LD
O
01 LD f i
to 3
CTI
LU 00 00 LD v l 00
cn
LU f i f i 00 f i v j
3 ro
LU h-l f i
ro ro 3
f i UJ LD h-l VI f i h-l v j
ro
00
cn
00 LO
LO Ul v j f i LU h-l h-l 00
ro
LO f i I - l LU
O
h-l VI
Ln
00
3
Ln
ro
h-l 00
ro
Ln VI
ro
LU
Ln
h-l
cn
v l
3 cn
ro ro ro ro ro f o ro ro Nl ro ro ro h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l
o o
3 3 3 O o
o
3 3
o
3 to
LD LD
LO
LO LO LO t o
to
LD LD LD LD LO LD LD LD LO LD LO t o LO
f i f i f i f i f i f i f i f i f i f i
t
f i
p p p p
t o
p p p p p p p p p p p p p p p p p
io ro ro ro io io ro io io NJ io io
Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln
Lu
P
LU Lu LU
P
i - l p t-1
P P P
o o p o p p p p p
P
p p cn cn cn cn p p p p p p
ro t o Nl ro ro ro
io i - l h-l i - l h-l h-l i - l M
P
i - l
P
h-l f i
P
io io
P P
i - l
P
M
P
f i f i
P
p
P P
LU
h-l Vj v l v l VI V l v l v l
cn
f i LU UJ
P
f i
P
f i 00 00 f i
3
3
3
00
p
Ln f i LU LU UJ
cn in
CTI
cn cn
i - l cn
CTl
cn
01
cn
en
p p
UU f i
ro i - l i - l h-l
p
h-l h-l
p
01 CTI
p in
Lu Ln
Ln P
i - l ro
p
CO
p
CO CO
f i
P
to
P
p
P
bo p
P
f i
P P
I - l h-l v l
ro
NJ
P *
f i
io
in
LU h-l
oo
h-l Ln
io
P P P
cn
o
3
3
3 3
00 h-l 00
cn
LU
to 3
f i UJ f i f i Nl f i h-l f i
ro
00
LO
LO
to to cn
V j
cn
Ln
00
ro
00 h-l LU LU UJ LU
01 en cn
UJ UJ
cn UJ UU cn LU LU
cn CTl
en
UJ LU UU LU LU UJ UJ f i
to
LU f i LU UJ f i LU UJ
f i h-l
cn
v ^ h-l h-l h-l f& h-l
ro cn cn cn
h-l
UJ
ro
h-l
LU UJ
h-l
v l h-l h-l h-l Nl
cn ro
00 00 00 h-l h-l
O
cn
h-l
cn
h-l
ro
h-l h-l h-l f i h-l h-l
ro
00
ro ro
h-l 00
to
Nl f i
cn
f i UJ LD LD
ro
00 00 U3 00
cn
Ln LD LO
^
f i 00 CO
3
00
3
Nl
o
3 0 3
'.
3
\ o
h-l
\
3 3 3 3
o
00
3
o
00 3 00
"3
00 00
o
00
3 O
00
3 3
o
3 3
o
3 3
3
o
00
O 3 3
00 00
3
o
00
00
h-l
OO 00
h-l
00
h-l
00
h-l h-l
00
h-l
00 00
h-l
00 00 00 00
h-l
00 00 00 00 00
h-l
00 00 00
h-l h-l
00 00
h-l
h-l
o m
cn ro ro ro ro
h-l h-l
LD (3 cn
v l NJ
Ln cn en
UU h-l
ro
00 f i UJ LO h-l h-l h-l
to ro
h-l h-l h-l
3
ro LU ro ro Ln h-l Ln f i h-l t o
UJ f i Ln LU h-l ro Ln Ln ro f i h-l h-l Ln LU LU ro LU h-l h-l ro
o
LU f i 3
f i to
h-l LD
Ln
LU
Ln
00
ro
00 f i to
00 h-l Nl
3
LU
(3
00
ro
h-l v l
ro to
o
v l 00 00
to LO
00
Ln Ln
LU
TJ
>
TJ -o
D
TJ 0 -0
> >
TJ
> >
TJ TJ -D TJ
D
TJ
>
TJ
> > > > >
TJ 13
>
TJ
>
TJ -D
>
2
s
2 2 2 2 2 2 S 2 2 S 2 2 S
s
S S 2
^
s
2 2 2
s s
2 S 1 1 S 2
s
5
<
m
g
>
n
n
o
s
ca.
c
a
3D
03
g's
!i
T3
:
ca.
O
OJ
0)
3
3
3 '
CO
o
CO
vl
v J
-vl
(JI
VI VI v l v l v l v j v l v l v l v l v l VI v l Vl VI v l v l v l V j v l v l v j v l v l VI VI v l Vl v l v l v l VI v l v l
f i LU UJ LU UJ LU LU Ul LU LU LU UJ LU LU LU LU UJ UJ UJ LU LU LU LU LU LU LU LU UJ LU LU LU UJ LU UJ
3 LO 00 CO 00 00 00 00 00 00 00 00 00 00 00 00 00 00 CO 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Ln
3
LO
to
00 00 00 00 00 v l VI 01 CTl
cn cn
CTl
cn cn cn
Ln
Ln Ln
Ln Ln
Ln un
f i f i LU LU LU UJ LU
ro
v l
cn
VI LU 00 Ln f i h-l
3
LU h-l LD 00 Ln UJ
ro ro
h-l h-l
cn cn cn
Ln ro
ro
h-l h-l 3 v j Ln Ln LU O VI
VI
A
h-l 00 h-l f i
3
f i
ro 3
LU
Ln
h-l v l Ln LO f i LD Ln
to
v l f i
Ln to cn
v l
ro
UJ v l 01
O
01 v l h-l
h^i h-l ro ro IO ro ro ro ro ro h-l ro ro ro ro ro NJ NJ ro ro h-l ro l o h-l ro NJ h-l t o l o ro Nl h-l ro h-l
Ln f i
ro 3
o
3
3
3
3 3 f i
ro ro
IO
3 3 3
IO
3
3 f i
M ro
f i
ro ro
Ln
p
NJ
3
NJ f i
ro ro
v l 00
ro
f i f i v l
p
v l f i f i 00
M bo ro
v j f i f i
P
f i v l 00
P P
00
bo
P p
io p
f i
P
LU
bo
00
P
p Ln
p
io p
00 h-l
bo
Ul
P
p
h-l h-l
bo P P
h-l
P <
h-l h-l h-l
p P
f i
p
h-l
io
h-l h-l
Lu
3
Ln
bo
h-l
p
ro
f i
Ln
p
3
h-l
T
O
Ln
p
LO
h-l
Ln
h J
cn
h-l
01
h-l
ro
f i
P
p
3
h-l
i - l
f i
f i
ID
p
i - l
p
P
i - l
Ln
p
P
p
i - l
ro
f i
Nl
P
h-l
LO
ro
f i
P
f i
p
h-l
en
ro
O
i - l
f i
f i
v j
p
i - l
t o
00
p
i - l
h-l
P
3
P
i - l
ro
00
f i
f i
UJ
h-l
v l
p
v l
cn
P
UJ
V j
h-l
LU
f i
to
h-l
LO
h-l
i - l
v l
p
i - l
f i
bo
VI
i - l
f i
p
i - l
t o
3 P
i - l
3
to
h-l
LU
f i
P
p
h-l
(31
p
i - l
p
f i
P
f i
3
P
P
cn
i - l
Ln
P
f i
to
p
P
3
cn
00
P
h-l
f i
3
i - l
ro
00 i - l i - l
to
00 LU i - l
bo
i - l
i - l
v l
p
00 UJ
Ln
P
to
i - l
P Ln
LD Ln LO
cn 3 Ln 3
P
LO (31
P
v l h-l
3
LU 00 h-l IO
p
v l
cn to
3
O
Ln t o
ro A cn Ln
LU
NJ V j h^i 00
cn to
UJ h-l f i
NJ LU
UJ UJ LU LU LU LU UJ LU UJ LU
UJ UU LU UJ UJ UJ LU LU
\ .
LU UJ LU UU LU LU UJ LU UJ LU UJ Ul LU UJ UJ LU UJ UJ LU
ro
NJ
ro ro ro
Nl
ro ro ro
NJ
'.
UJ
^ .
.
NJ
ro ro ro ro ro
f o NJ IO f i f i f i f i f i f i f i
A
f i f i
ro ro
t o
ro ro
f o
ro
NJ
ro ro ro ro
NJ Nl
ro
Ln f i f f i f f i f i f i f i ~ v f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i
v.. 3
3 3
3
3 3 3 3 3
-V v ^
'
v ^ v ^
.
3 "3 3 3 3 3 3 3 3 00 00 00 00 00 OO 00 00 00 00
3 3
^
3 3 3 3 3 C 3 3
'o
3 3 3
00 00 00 00 00 00 00 00 00
h-l h-l h-l h-l h-l h-l
00 00 00 00 00 00 00 00 00 00 00 00 00 OO 00
cn cn LU Nl ro h-l h-l h-l h-l NJ NJ NJ h-l h-l h-l
3 3 3 3 to
LO
to
LO LO
LO
LO VI v j v l cn cn cn
Ln NJ
LU
3 h-l A h-l Ln f i IO h-l f i LU 3 Ln NJ 3 Ln Ln f i LU f i f i f i f i h-l h-l 3 un f i ro Ln f i ro
LU f i
h-l 00 01 00 LU
Ln
00 LU f i
ro O f i f i UJ NJ
to
Ln
ro ro to to
00 LU v l f i 00 f i CTl LU v l t o Ln
cn cn
>
TJ T3 TJ TJ TJ TJ TJ
o o
CJ
o > > > > > > > > > > > > > > > > > > > > > >
s
S S S S S S S ^ S
s s
S ^ 5 S ^ S 5 ^ 2 ^ 2 2 S
s
S S S S S 2 ^ 2
3D
m
n
O
rt)
<
13
>
ca.
ca.
O
cu
LU LU f o UJ UJ h-l h-l h-l h-l h-l h-l
LU LU v l v l v l v l v j V j v l v j VI v j VI v l VI v l v l
3
NJ
o
Vl v l LU Ln h-l
3 3 ro 3
v j VI v l v l v l
h-l h-l f i UJ UJ Ln LU UU f i f i LU LU LU UJ LU LU LU f i
O
Ln UJ LU LU UJ
3
CTl
cn
LU 00 UJ LU f i LU LU
h-l h-l
O cn
00
O
00 CO LU t-1 00 00 Ln 00 v l f i VI h-l
3
Ln f i
cn
h-l h-l NJ
cn
Ln
3 to
Ln f i h-l Ln Ln
LJJ UU VI
3
00 UJ VI
cn
f i LO 01 LU LO
cn ro
Vl Ln Ln
to
UJ LO 00 h-l f i
to
h-l v l
3 LO A
OO h-l Ln f i
h-l h-l
cn
VI
3
LO UJ h-l LO 00
ro
Ln 00
ro
LU 00 UJ LD NJ h-l VI f i
3
LO 00 Ln LD
to
Ln f i CTI
cn
v l f i
f i
3
f i f i NJ h-l
3
Ln LO v l LD
cn
UJ
A 3
Ln h-l LU f i h-l Ln 00
cn
Ln v l v l
A
h-l LU h-l 00 Ln
ro
Ln
ro NJ ro ro ro ro NJ NJ ro ro NJ ro NJ Nl ro ro t o ro ro NJ Nl ro f o ro Nl NJ Nl ro NJ ro ro NJ NJ ro
3
o
3 3 3
o
3 3 3 3 3 3 3
3 3
3
3
3 3 3 3 3
3
3 3 3 3 3 3 3 3 3 O O
Ln
Ln f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i
*
f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i
p
(3 LU
Lu
LU LU Lu
Lu
Lu LU UU LU LU LU LU LU LU
P
io M NJ p
P
io M
P P
io io
P
io p ro io
cn cn
(31
p P
(31
P
Ol cn O l O l O l
P
Ol (31
o o o o
LU UJ h-l i - l i - l i - l h-l i - l i - l i - l i - l i - l h-l h-l
P
i - l i - l bo i j i
Ln P
io io i - l h-l
P
i - l
P
h-l i - l bo
Ln
f i ro
p ro
LD LO LO t o t o LO LO t o t o t o LO t o LO 00 00 f i
p
LU h-l
o
00
en
f i f i f i f i h-l h-l Ln
P
h-l Ln
h-l h-l h-l h-l
P
3
3
O
P P
3 3
p o
i - l Ln
in P
p cn
f i
ro
p <P p
to
VI
Ln UJ
P
f o
h-l h-l
p
LO 00
P i-*
i - l
In
P
In In In
P P
p in cn
00
P P
In
M
P P P
p
P
h-l
ro
f i
P
Ln Ln Nl VI h-l LU IO 3 <Ti
cn
Ol
cn cn
LO v j
3
00
cn
Vl
t>
h-l UJ LU LU
ro ro
VI h-l
00 00 00 U3 f i
cn
h-l
ro
h-l t o NJ LO
to
h-l
00 00 LU LU LU UJ LU LU UJ LU LU UJ
UJ
00
UU UJ V.
^
UJ
,
LU ~ v UJ
cn LD cn
01
cn cn cn cn
UU UJ LU LU
h-l h-l
A ro ro ro
NJ h-l
ro
h-l NJ
A
h-l
ro
' \
h-l
00 00
ro
h-l
ro
'.
f i f i
ro cn
f i Nl
to
f i
ro
00 h-l Nl
.
00
3 ro
h-l
Ln
f i f i
to
Ln h-l 00 NJ h-l h-l
-V.
Ln LD
f i LU 00 f i h-l
01 f i v l
ro
v l
Ln
V.
LO
un to to
o o ^ ^
3
3 3
3
3
3 3
o
v ^
\
V v
3 3 v! 3 3 3 3
3
3
un
to to 3 3
o
3
00 00
O
00 00
3
00 00
O
00 00
o
3 3
00
OO 3 O 00 OO 00 00 00
3
00
O
o o
h-l H I
00 00 00 00
h-l h-l
00
h-l h-l
00
h-l h-l
00
h-l h-l
CO LO CO
h-l
^
LO 00
h-l h-l h-l h-l h-l
00
h-l
00 00 00
ro
NJ LO h-l h-l
to
Nl
3
v l
3
o
cn
h-l
3 cn O
h-l CTl h-l LU NJ
ro
Ln 00 h-l h-l h-l
3
h-l Ol h-l h-l 00
cn
ro h-l 3 h-l h-l
o
f i LU 3 h-l Ln Ln un Ln UJ LU ro UJ h-l f i Ln UJ Ln h-l ro h-l 3 LU h-l LU LU
f i 3 UJ
f to to to
f i 01
ro ro
Ln
cn
LO v l
ro Ln
v l
ro
f i f i
ro
h-l NJ Ln Ln NJ Ln 00 Nl LU t o h-l t o
o
f i UJ
TJ TJ
>
TJ TJ
>
13
> > > > > > > > > >
TJ TJ
>
TJ TJ TJ
>
TJ
> > > > > >
TJ
> >
5 S 2 5 S
s
2 2 S S S
s
2 ^ S S S S S S 2 S ^
s
S S S S
s
S S S 5 5
<
n
>
n
n
13
o
a.
c
m
TO
00
S *
I ^
T3
T5
>
ca.
CL
O
OJ
0)
3
3
3 '
CO
' o
o
CO
v J
vl
v J
CD
v j VJ v l VI v l VI v j v l v l v l v l v l v l v l VI VJ v l
f i f i f i f i f i f i f i J i f i f i f i f i f i f i f i f i f i
h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l O 3 3 3 3
LD LD 00 00 v j cn cn f i ro h-l h-l 3 00 v l cn cn 01
00 h-l
o
cn f i 00 Ln f i v j en J i f i LD cn en f i ro
v l f i ro VI h-l LU 00 00 Nl Ln 01 h-l Ln f i en LD t o
ro h-l IO IO h-l IO ro ro ro ro ro NJ ro ro ro ro ro
3 f i h-l 3 LO 3 ro ro ro 3 ro M 3 o ro ro ro
f i v l
M
v l
p p
bo f i
P
f i
P
M
v l f i
P P
M
p M f i
bo
Ln
bo
P
LU
p
h-l M h-l h-l bo
P
3 3 LU
p
Ln
p p p
Ul
P
LU
P P
3
In p
J i
p P i - l P
p p
v l
P P
f i f i Ln UJ f i f i
P
LU LU h-l
LO
3
h-l
o
f i
00
P
3
cn
UJ
J i
h-l
f i
00
P
i - l
UJ
P
LU
ID
LD
i - l
Ln
P
i - l
t o
p
P
f i
i - l
f i
LU
f i
In
UJ
P
M Ln LO ro ro Ln
p
h-l h-l t o
cn v l
f i
f i
Nl
3
h-l
un v l ro
00
UJ LU UJ
LU LU UJ LU UJ UJ LU LU LU v ^ LU LU LU LU
ro V.
LU LU
ro ro
\
01 ro ro ro NJ NJ ro ro ro NJ ro Ln Ln ro ro ro ro
cn cn cn cn en 01 Ln Ln Ln Ln Ln Ln Ln Ln
3
V.
Ln
\
\
O 3
00 3 3 3 3 3 3 3 3 3 3 00 00 o 3 3 O
00 00 00 00 00 00 00 00 00 00
h-l
00 00 00 00
o
LO LD t o 00 v l v l
cn LU h-l h-l NJ
o
LO v l v l v l
h-l f i LU ro h-l UJ h-l 3 3 f i ro ro Ln O f i LU h-l
01 v l h-l v l v j h-l h-l Ln Ln
o
00 h-l 3 t o 00 v j 00
> > >
>
>
>
> TJ
o o
TJ TJ > > > > >
s
S 2 2
s
2 2 2 2 1
^
S S S
s s
5
3D
m
a.
7:
ra
<
TJ
>
ca.
ca.
o
OJ
ro h-l ro ro LU h-l h-l h-l LU ro LU
00 3 VI v l VI v l LU VJ v j v l v l 01 v l ro Ln VI v j v l 3 3 V l 00 v l v l v l 00 v j VI V j v l v l v l v l LU
f i Nl LU f i UJ LU Ln Ln Ln f i Ul Ln f i h-l v l LU LU LU 3 LU LU ro LU LU LU 01 UJ LU cn f i Ln LU VI t o
3 cn f> 00 Ln f i ro cn Ln Ln f i 3 cn 00 h-l Ln t n Ln LU LO 00 h-l cn cn f i un Ln v l UJ LU LD Ln LU 3
UJ 3 vl CTl 3 00 LU cn h-l LD t o Ln LD 00 LD LD UJ UJ Ln LO 00
O
t o t o v j f i LU f i 00 O f i UJ cn cn
LO ro LO 3 cn 01 h-l NJ 00 ro h-l h-l cn Ln 00 f i cn IO h-l O f i 01 LD LD Ln LU VI 00 v l UJ un Ln ro 00
f i v l LU 3 cn O f i NJ cn O ro 00 Ln 00 V j f i v l Ln 3 00 3 (3 cn Ln t o LU t o LU ro LU
o
h-l 3 f i
ro ro ro Nl Nl ro ro ro ro ro ro ro ro ro ro Nl ro ro ro NJ ro NJ ro ro ro ro ro ro t o Nl NJ t o ro ro
3 3 3 3 3 3 3 3
o o
3 O 3 3 3
o
3 3 3 3 o 3 3 3 O O 3 3 3
o
3 3 3
o
VI v l v l v l v l
p
cn m
m p P p
Ln Ln Ln Ln Ln Ln
p p p
Ln
p
Ln Ln
p p
Ln Ln Ln Ln Ln Ln Ln
bo bo
bo
bo bo
LU
P Lu Lu p
LU
Ln Ln Ln Ln Ln Ln Ln
LU
Lu
i - l i - l i - l i - l i - l i - l i - l i - l i - l
b b
j 3
b
b
f i A f i f i f i cn
P
p m Ol m Ln Ln Ln f i LU LU LU t o LU
P
f i f i f i f i LU h-l
P P p
i - l i - l i - l i - l i - l t o i - l i - l i - l i - l i - l LU LU
b Lu
NJ i o i - l f i (JI i - l t o NJ i o i - l ro ro
O
h-l
m cn A
UJ
Ln UU ro ro t o
p
h-l h-l h-l h-l h-l ro ro h-l ro ro LU
p p
t o UJ LU h-l h-l ro i n f i
p
f i f i
p
ro
p p p p
3
i - l
h-l h-l p h-l
p
Lu LU h-l oo
p
Ln
h-l P
i - l
P p p
LU
p
ro
in f i i - l i - l i - l h-l i - l
P P
VI VI
p
UJ
p P P P P
00
P P
00 h-l LU Nl
P P
ID
p
ro h-l
o o
h-l h-l
v l 3 00 UJ 3 Ln t o LO LO LD LD Ln f i f i ro LU 3 Ln Ln h-l h-l h-l UJ LU Ln
00 h-l Ln Ln Ln Ln Ln f i f i Ln Ln
v l
UU LU t o LU LU LU LU f i UJ LU
f i LU v - h-l f i VI CTl
^
LU LU un LU h-l LU UJ
.
UJ f i
NJ
J i LU f i
f i cn
h-l h-l h-l f& f i UJ h-l
.
CTl
h-l v ^
^ '.
cn
UJ
h-l h-l ro
NJ
.
LD
'.
00 ro h-l 00 Ln h-l 00 ro h-l ro h-l LO ro h-l UJ
cn
t o h-l h-l h-l 00 01 h-l h-l h-l v l h-l h-l ro
Ul ro
'
00
>
v l cn 00
Vs.
00 3 00 LU f i
A
LO t o
\
LD Ln
o
LO t o Ln
3 o 3 3 v
o
3
00
3 3 3
t o
3
o
LD
3
o
Ln
o
3 00 00 3 00 00
O
3 00 00 3 00 t o
O
00 3 3 3 3 3 h-l
o
00 LO
O
00
O
00 3 3 O 3
t o 00
h-l h-l
00
h-l h-l
00 00
h-l h-l
t o
h-l h-l
00
h-l
00 00 00 00 00 3 00 00
h-l h-l
00
h-l
00
h-l
00 OO 00 t o
t o t o
o
ro h-l h-l
o
f i NJ
o
ro LU h-l h-l 01 h-l Ln t o h-l Nl h-l M CTl cn 3 h-l f i
o A
h-l Ln ro v l ro
Ln Ln LU LU LU LU Ln LU f i
ro ro Ln
LU NJ
O 3 O h-l Nl h-l f i LU f i f i
ro UJ 3 3 un h-l f i Nl LU ro
00 un Ln t o V l h-l CO h-l 00 LU ro v l Ln Ln LU LO v l ro t o f i 00 01 ro NJ ro LU h-l en f i UJ UJ 00 LO cn
> > > TJ -o >
>
TJ -0 > TJ TJ > > TJ > > TJ TJ > TJ TJ TJ D > > > > TJ > > > > TJ
2 S S 2
s
2 ^ S 2
s
2 S S 2 2 2 S 2 2 2 2 S 2 2 S 2 S 1 2 S S 2 2 2
<
n'
g
>
n
n
TJ
3
ca.
c
30
DO
O
CO
eb
cn
h-l
v l
01
>
ca.
ca.
o
01
01
3
3
3 ^
CO
' o
o
CO
vl
N
-vJ
v l v l VI v l v l o vl v l v j v l v l v l v l
f i f i f i f i f i f i
*
J i f i f i f i f i f i
cn
01 Ol
cn cn cn cn cn cn
CTl CTI
cn
CTl
00 00
cn
01
cn cn cn cn
Ln LU
ro
3 3
NJ h-l v l
Ln
h-l h-l
3 o
01 00 LD v l v l
Ln Ln
Ln LO VI
Ln Ln
h-l h-l 3 LD t o 3
h-l ro NJ ro
t o t o ro ro ro t o t o ro ro
un ro ro ro
t o
ro
M
ro
h-l
O ro ro ro
v l
P P
ro
p
M ro ro
P
v l
io ro M
p
O
p
Z
O
h-l
io
Ln
LU
00
M E
S
h-l
to
In
LU
f i
p
bo
Ln
Ln
LU
In
p
Ln
p
p
O
p
S
Z
h-l Ln Ln LU
CTl to
P
M
Lo
M
P
NJ
p
S
Z
v j 3 01
Ln ro
cn
f i
cn o
ro NJ
p
h-l
Ln
h-l f i
NJ
p
00 f i
i - l
Ln
h-l
LD
h-l
LU LU
f i f i LU Ul
~ v f i f i f i f i f i f i f i
.
LU LU
h-l h-l
v ^ UJ Ul h-l h-l
>
h-l h-l h-l h-l h-l h-l h-l
o
3 v ^ v ^
..
v.. 3 3
00 00 3 3 3 3 3 3 3 3 3 00 CO
h-l h-l
00 00 00 00 00 00 00 00 00
o
(3 00 00 v l VJ v l v l
cn Ln UU ro NJ
o
3 ro
h-l f i f i LU UJ Ln 3 3 ro NJ
Ln
3
cn cn
v l UJ f i
ro
01 f i
Ln
00
ro
> > > > > > > > > TJ TJ TJ TJ
2 ^ S 2 S 2 S ^ S S S ^
v l o v l v j v j VI v l VI v l v l v l v l v l VI
f i J i f i f i f i f i f i J i f i f i f i f i f i f i
Ln
Ln
Ln Ln Ln Ln Ln
Ln
Ln f i f i f i LU LU
to
00 00
cn
Ln f i J i f i h-l h-l 3 3 LO
cn
t o VI LU f i 3
tn
cn cn cn
LU NJ
o
h-l v l
o
Ln
LU LO
cn
00 v j
en to
3 LU t o v l
Ln
ro NJ t o Nl ro h-l h-l h-l t o h-l h-l h-l t o h-l
3
ro
p
3
p
f i f i f i
ro
f i f i f i
ro
LO
p
M
p
v l
P p
LU LU
P
00 J i 00
P p
LU h-l 3
bo
VI
P P
3
P P p
h-l
P
p
i - l
to
in
t o
Lu
LU
p
i - l
in
p
Ln
Ln
Ln
p
Ln
i - l
to
ro
f i
p
LU
ro
f i
p
f i
t o
f i
h-l
h-l
to
in
t o i - l
LU
h-l
LO
Z
O
p
P Z
O
p
i - l
f i
J i
p
P
8
9
T
i - l
v l
P
M
P
h-l f i f i f i f i f i
P
v l
8
9
T
h-l M
LO v l h-l h-l h-l
ro
v j Nl
ro
Ln
LU 00
UJ UJ
UJ LU LU LU
UJ
v ^ LU LU LU LU UJ LU LU LU
UJ
LU LU LU
LU
t o
\
h-l h-l LU UJ LU 3 3 3 ro
t o
ro
NJ 00
ro
-V
\
h-l h-l HI
' to
00
v ^
00 00 00
3 3 O 3 3
00
v ^
^
3
00 00
3
o
3 00 00 00 3 3 3 3 00 3
h-l h-l
00 00 00
h-l h-l h-l
00 00 00 00
h-l
00
3
o
LO 00 UJ h-l h-l h-l LO
en ro ro ro
LO
t o 3 LU
o
ro LU LU LU Ln A LU NJ Ln h-l
UJ UJ
cn
f i h-l f i f i f i VI Ln VI J i LU
to
> > > > > TJ TJ U > T) TJ TJ TJ >
s
2 2 2 S 2 S 2
s
2 2 S S 2
n
n .
o
7 :
m
<
>
ca.
CL
O
01
Nl ro t o ro ro h-l h-l UJ h-l
v l v j v l v l v l v l CTI f i LU UJ
to
v l v l v l v j
Ln
o
v l v l v l v l v l v l v l v l v l
cn cn
v l v l v l NJ
ro
v l
LU LU Ul LU Ul UU v l
Ln
v l VI
cn
01 f i
A
LU
cn
00 UU f i f i LU LU Ul
cn
f i UJ
o
3 CTl LU f i h-l f i LU
VI 01 Ln
Ln Ln Ln
LD 00 h-l h-l f i h-l
cn cn
VI UJ 00 00 h-l
ro
00 J i
cn
h-l Ln 00 LD LD t o
cn
3
O
3
cn
VI v l 00 00 f i f i
cn cn
00 v j h-l h-l LU 3 Ln h-l 00 Ln 01 LU 00 00 h-l
ro
CTl
cn
v l 01
ro
h-l 00
Ln
LO
ro
LU
cn cn
3 NJ h-l h-l VI
o
h-l h-l f i 00 3 vl
ro
3
cn
00 f i h-l t o
ro
LD f i LU h-l
cn
ro
v l LO LU v l 00
LO
ro Ln
00 CTI
en
v l
o cn
ro
3 t o 3 h-l 3 t o h-l LO LU
cn
J i VI
en
LU
to Ln
LO LU v j
Ln Ln cn
t o v l
ro t o ro
t o
ro ro
NJ ro NJ ro t o t o t o
ro ro
t o t o ro t o
ro t o ro t o ro t o ro Nl ro ro t o ro ro t o t o
3 3 3 3 3
o o o
3 3 3 3 3
3 o
3 3
o
3 3 3 3 3 3 O (3 3
o o
( 3 O 3 3 O
v l v j v l v l v l VI v l v j v j v l v l v l v l v l V j
O
VI
o
VI v l VI v l v l v l
o
v l v j
o
v l v j VI V j VI VI
bo bo bo bo bo bo bo bo bo bo
00
bo
00
bo bo bo bo bo bo
00
bo bo bo bo bo bo
00
bo
00
bo bo bo bo
00
Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln t . f i J i f i f i f i f i f i f i
Ln Ln Ln Ln Ln io
NJ NJ
io ro ro ro io io io
i - l i - l i - l i - l i - l i - l i - l i - l i - l i - l to to to
bo bo
fi M M
P
M
LU E
Z
M
LU E
Z
M
LU
ro h-l h-l h-l h-l h-l
cn cn
LU LU LU LU LU LU ro t o Ln Ln
p p
t o
p o M
LU E
Z
M
LU E
Z
M
LU
O HI h-l h-l h-l H i HI h-l h-l h-l
O
o
f i J i f i f i f i
P
f i
to f i A 00 cn
vl
00 00 00 00 00 f i f i f i f i f i
A
f i f i f i f i
P
v l M
P P P P P
f i f i LU 00 00
cn
LU Ln Ln
in p
LU
cn en o
3 00 00 00 v j UJ v l v l v l
<n
LU
LU h-l v l h-l h-l
<n
CTI
UJ
LU LU LU
Ln LU LU h-l LU f i LU cn CTI A
LU
LU UJ
LU LU LU
h-l
to to
f i LU v ^
ro Ln
UJ LU LU
V.
LU
CTI
-V Nl h-l t o v * LU
ro ^
Ln
^
LU
h-l h-l NJ h-l h-l
ro
NJ
o
01
ro
o
h-l h-l
'
~ v t o t o
to
h-l LU h-l h-l t o h-l t o
ro ro ro
00 h-l LU UJ f i LD LD
ro
h-l
Ln
v.
01
h-l
to
LO
to
LD
to
cn
f i f i H* h-l
ro
f i f i
cn
01
f i
to
h-l LO LD LO
o ',
cn
3 3 (3 v ^
01
o
3
o
3 3
o
O
LD LO
o
00
o o
O
3
o
3
3
^
00
o o
00 00
o
3
o o o
3
CO
o
00 (3 00 00 00 00
o
00
3 3
00
h-l
00 00 00 00 LD 00 00 00
h-l
00
oo
h-l h-l
00 00 00 00 00 00
oo
00
h-l ^
00
J_l
LD 00 00
Ul h-l LD LO
cn
01 h-l LO J i LU t o 01 Ln
h-l t o UJ UJ
to
VI t o h-l
ro
h-l 3 00 h-l 3 3 NJ ro
o
LU
f i Ln
h-l LU
Ln
t o NJ h-l
ro
h-l 3 UU LU 3
o
LU UU h-l UJ f i LU LU t o h-l f i f i
o
3 LU LU UJ LU Ln LU Ln Ln
cn
Ln
en
Ln v l v l
cn Ln
NJ
ro
LO v l f i 00 f i V l LU
to
h-l 3 UJ Ul Nl
O
f i NJ LO VI v l
Ln O
VI
Ln ro
o > > >
>
>
TJ
D o
TJ
D
TJ TJ
>
TJ TJ TJ > > TJ TJ -a TJ TJ > > > > TJ TJ > > TJ TJ
S 2 ^ 2 2 ^ S
s
S S S 2 S ^ 2 1 S
s
S E 2 S S E ^ S ^ S 2 2 2 S S S
<
ns^
S
o
>
o
n
-a
o
ca.
c
n
3D
03
3D 3
m
00 c
o
r
6
cn
ca.
h-l
v l
^ CU
CD
CU
< a
TJ
>
CL
CL
o
01
m
01
3
3
3 '
CO
' o
o
CO
vJ
vJ
N
00
o v j vJ v l v l v j v j VI O v j vl O o v l o v l o v l v j v l v l v l -o v l v l v j VI v j v l VI v l O v l
un Ln Ln Ln Ln Ln Ln Ln un Ln Ln Ln Ln Ln Ln un Ln Ln Ln
Ln
Ln Ln
Ln f i f i f i f i f i f i f i f i f i f i
cn
en
cn
CTI
Ln Ln Ln Ln Ln Ln
f i LU LU h - l h - l h - l
3 3 3
3
3 3
3 CO 00 00 v l O v l
o
O
v j
cn
f i IO
3 3
00 00 LU LU t o h - l LO LO
o
CO CTl
3
LD
cn
f i f i LU LU UJ 00
cn
f i
cn
cn
Ln Ln
LU h - l
to
3 LU UJ NJ
cn
h - l h - l
3
h - l 00
ro
LO CO Ln Ln 00 f i h - l
Ln
UJ LO CO t o 00
3
00 CO
3
00 h - l
3
h - l
cn
cn
CTI
cn
h - l LO h - l h - l
A
LD
cn
f i UJ 00 LO 00 f i
cn
f i v l LD h - l h - l
3
f i
3 cn
LO V j
cn
t o
cn
cn Ln
NJ Nl ro t o t o ro t o t o h - l Nl ro t o t o ro NJ ro NJ NJ h - l h - l ro h - l ro t o ro h - l 10 ro ro h - l h-l ro ro
t o t o h - l t o H I
ro
3 NJ f i
3 ro
p
h - l
p
t o
3 ro ro
f i f i
3
LO
ro
NJ
3
LO
ro ro
h - l f i f i
p
3
ro ro Nl ro ro t o
f i
i - l
LU
p
A
P P P p
f i
Ln Ln
00
p
f i t o
P P
0
p P
ro
P
00 00
P p
h-l f i H I f i h - l
P p
^
p
h - l f i h - l
Ln
LU
io Ln
f i
Ln
f i
P
io
P
io Ln
LU
3
bo
i - l
3
h - l f i i - l
p
h - l
Ln
to f i
p
LU
p
i - l
h - l
Ln P p
UJ i - l
Ln
p
Ln
LU
3
Ln
f i
Ln
f i
ro
Ln
p
UJ
Ln
LU ID
f i Nl
UJ
i - l to p
Nl
ro
P p
LD
IO
Ln
i - l H I i - l f i
Ln p Ln
i - l Vl i - l
in
i - l
O
O
Z
i - l
in
LU
00 i - l
Nl
UJ
CTI
CTl
ro
i - l CO
Lu
LD
IO IO J i h - l
3
J i h - l
f i
3
in
i - l
00
O
P
h - l
P
v l
v l
h - l
P
f i
(Tl
t o
Ln
00
LU
f i
O
O
Z
ro
1
8
6
.
4
8
h - l
A
to
h - l
h - l
3
in
LU
P
00
t o
3
in
00
LU
P
CTl
ro
f i
f i
f i
2
0
8
.
9
1
i - l
h - l
ro
P
00 h - l 00
cn
f i
h - l
h - l
to
Ln
ro
3
00
S
E
T
1
8
6
.
4
8
Ln
oo
i - l
LU
00
P
h - l
f i
N l v j
UJ
P
to
LU
h - l
0
i - l
v l
2
0
8
.
9
1
3
f i f i A f i f i f i f i
f i
v l
"V, f i f i f i f i J i f i f i f i f i f i f i f i f i f i f i f i f i f i f i
^
f i f i f i
A
f i f i
'
v j
v l
v j
\ -
v.
\
-V.
. ^
V s Nl V)
.
h - l
O
^
VI v l O
o
CTI
cn
V s
Ln
.
f i f i
A
f i UJ LU
>
UJ LU LU LU UJ
ro
~v V, f o NJ
ro ro
3
3 3
.
V .
Vs
CTI
cn
V s
Ln
.
~ v - V
LU
3
v ^
' ^ ^
ro
3 3
.
V s .
. 3
3 00 00 00
3 3 3 3 3 3 3 3
3
3 3 3 3
CO
3 3 3 3 3 "3
CO 00
3
3
o
3 3 3
00
OO
h-l h - l h - l
00 00 00 00 00 00 CO 00 00 00 00 00 00
h - l
00 00 00 CO 00 00 00 00 00 00 00 00
h - l
h - l t o h - l
3
LO 00 LU LU v l NJ LU f i ro
LD v j
to UJ h - l to LO
LO
oo
00 LU
fo
h - l v j
cn
CTl Nl f i h - l h - l
Ln Ln 3 Ln
o
NJ f i h - l
3 f i 3 h - l ro f i Ln UJ f i f i LU ro 3 Ln h - l LU LU 3 f i UJ ro h - l 3 f i LU
v l
Ln 3 O
h - l LD h - l
LD
v l 00 00 f i
Ln
v j 00 f i NJ
cn
Ln
LD
cn
vl
oo
Ln
LO 00 V l
o
f i v l Ln h - l
Ln
TJ TJ
>
>
>
> > > TJ T) TJ TJ -a >
>
TJ TJ >
>
> >
> >
TJ TJ
> >
> > > TJ TJ >
S S 2 2 5 2 5 S S 2 i : 2 S
^
2 S S ^ 2 S S ^
s s
S
s s
S 2 5 S S
^
3D
ro
n
O
m
<
TJ
>
CL
ca.
o
01
h - l UJ ro
o
VI 00 VI VI v j v j VI v j vl v l v l v l
o
v j v l v l v l v l v l VI v j VI
O
v j v j v j v j v l v l v j v j
ro
VI
Q
LU
Ln
cn
CTI 01
Ln Ln
Ln
Ln Ln Ln Ln Ln Ln
f k f k f i J i LU UJ LU LU LU LU LU LU UJ
Ln
f k LU LU
en
LU
o
f i f i f i f i h - l 00 00 00 00 00 00 01
Ln
Ul v l CTI LU h - l
cn
Ln
f i f i f i 01
un Ln
Ln LO h - l * k f i h - l 00
h - l O f i VI UJ f i LD 00 00 00 VI f i
3
00 v l
Ln Ln Ln
CO h - l f i LO v l v l h - l h - l LO LD 00 00 00 VI
Ln
00
00 h - l LU
oo
v l Ln
3
00 OO
o
CO Ln UJ Ol 00 00
cn
f i VI LD h - l 00 VI v j Ln h - l
3
3 h - l
cn
Ln
3 h - l Ln
cn
h - l
to Ln
t o 3 U l 00 Ln t o UJ 3
en
LO 00 01 t - 1 00 NJ h - l
3 cn
h - l
3 to
t o LO v l
cn
o
h - l 00
cn
f i
ro ro ro ro ro t o ro NJ t o NJ t o ro ro Nl ro t o t o NJ t o t o ro ro ro ro ro t o NJ ro NJ ro t o ro ro ro
ro ro
h-l h-l H I h - l h - l H I h - l h - l h - l h - l h - l h - l h - l h - l h - l h - l h - l h - l H I h - l h - l H I
O
3 3
3
3
3
3
3 3
3
h - l h - l Nl ro t o t o ro Nl t o t o t o ro t o t o ro t o t o NJ t o t o ro t o NJ IO
v l v l v l v j v l VI v l v j v j v l
UJ LU f i f i f i f i f i f i
A f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i
bo bo bo bo bo bo bo bo bo bo
f i f i
Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln
un
Ln Ln Ln Ln Ln Ln Ln Ln i n Ln Ln Ln Ln
P
f i to i - l i - l i - l i - l h - l i - l h - l i - l i - l i - l i - l i - l
i-l i - l i - l i - l i - l i - l i-l i - l i-l v j v l vl
v j v l vl
in in Ln Ln
i - l
P
i - l f i
f
f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i
00 00 00 00 00 00 00 h - l
P
M
VI UJ Ln
bo
00
P P p p p
LU LU
h-l f i h - l h - l
Ln Ln
UU UJ Nl h - l 00 00
LU f i
UJ LU Ul LU UJ f i LU LU 00
Ln
f i f i f i f i f k f i f i f i f i UU LU UJ Ul LU V v v.. LU LU
V v
.
LU LU
UJ
h - l
LU
~v \
f i f i f& f i f i
'
V v
'
h - l h - l h - l h - l h - l h - l h - l h - l
UJ
00 ~ v h - l h - l h - l
to
LO LO LO
to
v l v ^
ro ro
h - l h - l h - l 00 00 h - l h - l LO LO
3 ro
00 00
ro
Nl
h - l LO CTl
cn
f i V s Vs
to
VI f i NJ h - l 00 01
to
LO 00
V ,
LD 00
"
cn
A
~ v
3 ^
V s
>
3 3 3 3 3
~ v
O >
'. ^ \ 3 3 3
o
3 3 3
3
3
00 h - l
3 3 3
00 CO 00 00 00
3
00
3
3
3 3 3 3 3 3 3 00 00
3 3
00 00 00
3
00 00 00
^
CO
h - l 3
00 00 00
h - l h - l h - l h - l h - l
00
h-l
00 00 00 00 00 00 00 00 00
h - l h - l
00 00
h - l h - l h - l
00
h - l h - l h - l
00
to
o
h - l
ro
LO 00
ro
t o t o
ro ro to
h-l LD NJ
cn cn
v l LO t o
cn
h - l 3
3
t o Nl
3 3 3 to
h - l
3
h - l h - l
UU
3 h - l un Ln 3 Ln Ln Ln f i h - l NJ
o o
ro t o Ln Ln
LU
Ln h - l
3
t o t o h - l NJ LU ro LU NJ ro O f i Ln
f i
Ln
LU
Ln
h - l
Ln
v l t o h - l v l
cn cn o
h - l
Ln
f i
cn
t o h - l 01 f i t o v j v j
Ln
H I LU
to
00 v j 00
Ln to Ln
> > TJ TJ > > TJ TJ D tl TJ >
> >
TJ > > > > TJ > TJ
>
> TJ TJ > > > > > >
>
TJ
2 S 2 2 2 2 2 2 2 2
s
2 2
s
2 2 2 2 2 2 2 S
s
2 2 2 2 2 2 2 2 2 2 2
<
m
S
>
n
n
TJ
5
ca.
c
n
3D
03
?
s
H
TJ
>
ca.
CL
O
01
QJ
3
3
3 '
CO
' o
o
CO
vJ
vJ
vj
CD
v j v j v j v l v j VI v j v j VI v j v j vj v j V I v j v l v l v l v j VI
cn
CTl
cn
cn
cn cn
01 Ol
cn cn
CTI
cn
CTl 01 CTI Ln
Ln
Ln Ln Ln
01 f i f i UJ UJ UJ NJ t o h-l h-l h-l h-l
O
3
O
LO
to
LD t o LO
3 v j UJ
to
00 00 LU h-l
to
f i t o h-l LD 3
3
LD LO 00 Ln f i
v j 00 v l h-l v j LU LU h-l f i
Ln to
f k t o LU t o
cn
f k h-l 3 Ln
3 Ln t o LO t o 00 00 Nl t o
O
UJ
ro
Ln h-l v j LU UJ
cn
3 v l
t o NJ NJ t o Nl h-l h-l H I h-l ro ro ro ro ro H I h-l h-l ro ro t o
p
h-l h-l
ro
3 LO
to
f i U3 h-l
O
3
p
ro
f k f i f i 3 ro
3
p Nl M
P p p p
00
p
M
VI
o
P
M
p
00 00 v l
00
Ln
h-l f i f i UJ i-k i - l
Lu
i - l
P
f i
bo bo
h-l h-l i - l i - l i - l
bo (3
i - l
p p
to
P
t o h-l t o
f i
h-l
p p
p
VI t o Nl
Ln
o
ro 00 i - l i - l t o 3 f i
t o
f i
Lu i - l i - l io f i V l i n f i f i
P
o
ro 01
p
io
f i f i P
to
f i
f k
1
6
2
.
5
2
00
in
2
0
8
.
9
1
p
P
f i
t o
f i
h-l
h-l
P
f i
h-l
P
i - l
h-l
i - l
p
S
0
T
Z
6
T
00
P
i - l
h-l
f i
t-1
v l t o
1
6
2
.
5
2
2
0
8
.
9
1
h-l
h-l
f i
LU
f i
h-l
cn
h-l
Ln
LU
p
UJ
UJ
S
0
T
Z
6
T
LU
ro
3
f i f i f i f i f i f k
f i f i f i f i f i f i f i f i f i f k f i f i
Vv.
f i f i
'
h-l h-l h-l h-l h-l h-l V v
h-l h-l h-l h-l h-k h-l h-l h-l h-l h-l LU h-l h-l 3 3 3
o o
h-l h-l
v j 01
cn
Ln Ln
Ln Ln
f i f i f i h-l h-l V v
o
0
01
V v
\
3
\
3 O 3
o
3
3
3
3 3
3
3 3 3 3 3 00 3
3
CO 00 00 00 00 3
3
00 00 00 00 00 00 00 00 00 00
h-l
00 .00
h-l h-l h-l
00 00
Ln Nl LO Ln f i f i f i UU h-l 00 (3 CTI h-l t o NJ h-l H I 3 v j Ln
LU Ln Ln Ln Ln LU Ln h-l LU CJ f i
o
LU LU t o f i t o LU LU f i
0
Ln
h-l
cn
f i LU
ro to
00 Ln
O
v j
cn
f i v j LU
cn
00
O
UJ
TJ -0
> TJ TJ TJ
> -o TJ > T) TJ -o TJ TJ > >
>
>
>
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
v l VI VI v l V l v j v l vJ v l
Ln
Ln Ln Ln
Ln Ln
Ln Ln Ln
00 00 00 00 00 00 00 00 CO
LD LO 00 00 00 v l v j
cn
Ln
UJ 3 00 00 v j 00 3
ro
00
LO LU CO Ln
ro
LU LU h-l Ln
t o t o ro ro t o t o t o ro NJ
3 h-l t-1 h-l h-l h-l t o t o
ro
f i
Nl ro
P P P
p io f i
t o f i f i f i f i f i h-l
p
3
p
p
p P P P
Lu UJ
ro
i - l i - l h-l t-1 i - l f i UJ
h-l
f i f i f i f i f i h-l h-l h-l
i - l
cn
LU 00
f i
o
h-l
cn
f i f i f i f i f i f i f i f k
f i
LO LO t o LD LD
to
LO LD LO
to
V s
3
3 3 3 3 3 O 3
3 00 00 CO 00 00 00 00 00
00 h-l h-l h-l h-l h-l h-l h-l h-l
h-l
ro ro ro ro
t o h-l 3 3
t o Ln Ln Ln f k h-l f i Ul f k
f i v j
ro
h-l v l
cn
3 f i LU
TJ TJ TJ 13 -o 13 > > >
2 2 2 2 2 2 2 2 2
3D
ro
s
7:
m
-<
o
>
ca.
ca.
O
01
ro h-l h-l LU
o
v j v j v j VI VJ v l v j v l v j v j v j v l v j v j v l v l Ln v l v j v j v l v l VI v j v l
o o
to
00 v j v l v l v j
UU LU Ln Ln VI v j f k f i UJ f i f i f i UJ f k Ln UJ LU UJ LU LU UJ UJ
un
LU f i LU LU
en
v l
Ln
f i f i UJ
Ln
Ln f k v l 3
cn Ln
01 (Tl
cn cn Ln
Ln 01
cn
h-l 00
cn cn Ln cn
f i v l
cn cn Ln cn Ln
f i Ln 00 NJ NJ f k
Ln
VI LD 00 UJ
Ln
UJ
cn cn
h-l 3 LD t o 3
3 cn
LO 3
o
00 Ln LD O
ro
v l
Ln
Ln t o 00 t o
O
00 v j VI UJ
CO h-l UJ t o
o
h-l
Ln
h-l
cn
v l 00 v j
cn
v l
Ln
v l VI
cn
Ln LU
cn
t o UJ CTl
O
CTI LU LD
to O
3 00 h-l 3
UJ h-l
ro
o
01
o
LD
Ln
3
o
h-l f i f i LD 00 h-l CO
cn
h-l h-l
cn
h-l
cn
LU
cn
00 NJ v l CO 01 v l 3 3 f i
t o t o ro NJ ro ro t o t o t o t o t o ro ro ro Nl t o ro ro t o Nl Nl t o t o ro t o t o t o t o ro ro ro t o ro ro
t o f o
ro
NJ NJ t o Nl t o
ro
t o
ro ro
t o
ro
t o
ro
t o t o
ro
t o
ro ro ro
NJ t o NJ
ro ro
t o
ro
NJ
ro ro ro
ro ro ro NJ t o Nl ro
t o NJ NJ NJ ro
t o t o
ro Nl t o NJ t o
ro ro ro Nl t o ro h-l h-l H I h-l h-l Hk h-l h-l h-l
Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln i n Ln Ln t o h-l h-l h-l h-l h-l h-l Ln
Ln Ln Ln Ln Ln
Ln Ln
UJ
LU LU LU LU LU LU LU LU LU LU UJ LU LU LU UJ
p
00 00
cn
f i U l
pa
h-l h-l h-l h-l h-l Ln
V j
cn in cn Ln Ln Ln
Lu ro to to io io
P
i - l i - l h-l i - l
00
LU LU
oo
Ln
p
P
f i f i f i f i f i f i f i
P
h-l
cn
Ln LU
o o o
Ln f k t o h-l h-l h-l 3 Ln LU 3 Nl i - l h-l
io
Ln h-l
ro
f i h-l H I HI h-l 00 H I H I f k
Ln
h-l t o NJ h-l h-l
P
V j j i 00
LU
ro cn cn
LD ID 00
cn
h-l
O un
Hk
UJ UJ LU LU LU h-l Ul LU LU
LU
.
f i UJ
LU UJ
LU UJ Ul
ro
UJ LU LU f i UJ LU LU v l UJ LU LU
h-l f i f i
Ln
f k f i LU
LU UJ
LU f i
UJ
\
h-l
ro 01
Vs V s h-l f i
h-l 00 UJ
'
h-l h-l h-l h-l h-l h-l NJ h-l h-l h-l t o 00 t o VI
O
LU t o h-l LU NJ
ro
CO
to \
00 UJ
ro
o
h-l h-l
to
V v
to A^
f i
LD
H i LD
O O
h-l
o
00 f i
LU
Ln
v j v j V s
v j
3 \
o o o
to
O V s
\ 3
3 3
00
Vs 3
Ln
o
o
00 3
o
3
o
3
o
3 00 00 00
3
00
"3 0 3 O
o
O
00
3
00 00
3
3 3 3 00 h-l
^
3 00
o
00
h-l
00 00 00 00 00 00 00
h-l h-l H I
00
h-l
00 00 00 00 00 00
h-l
OO
h-l h-l
00 00 00 00 3 00 00
h-l
00
to ro
t o 00
cn
LU 00 v j
ro
t o h-l h-l h-l t o v j UJ h-l LD
to
00
ro ro ro
h-l LU 00 LU
to
fo
f i 00 00 O UJ
3 ro t o h-l f i NJ H I f i h-l t o h-l h-l 3 ro Ln h-l Nl LU f i h-l f i UJ Ln LU t o f i f i Ln Ln 3
f i NJ (3 h-l
Ln
Nl h-l 00 VI
cn cn
UJ
cn
t o UJ h-l UJ 00 00
cn
NJ
Ln
00 LU VI t o
Ln Ln
H I
ro f i cn
LD
ro
VI 00 Ln
to
> 0 13 >
>
TJ >
>
TJ TJ > > TJ TJ > TJ TJ >
> >
TJ TJ TJ
> >
> 13 > TJ TJ >
>
>
>
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
<
m'
S
o
>
o
n
D
3
CL
c
n
3D
03
3D
o
n
00
c
o
r
3
cn
ca.
h-l
o
7t
cu
m
cu
<
13
-a
>
CL
CL
s
m
01
3
3
3^
CO
o
CO
vJ
vl
-vl
t o
o
h - l h - l
o
3 LO to to LO LO LO to 00 00 00 00 00 v l v l v l VI v l VJ v l
3 3 LD to 00 tn f i to to Ln UU 3
o
3 00 00 00 v l v j v l v l
UJ 3
cn
en 00 f i
h - l
v l v l f i 3 f i
* k
LU 00 00 Nl to v l CTI Ln
Ln
h - l
to to
cn
h - l h - l 00 v l NJ LO ro 3 to 00 v l h - l ro f i Ln UJ
h - l
00 v l ro CTI
h - l
cn 3 to 00 VI 00 Ln LO 3 Ln Ln Ln CTl
v j h - l
3 cn v l v l Ln 3 VI 00
t-k h - l ro vl LO LD h - l cn 00 3 h - l cn 3
ro ro h - l h - l h - l ro ro ro ro h - l to NJ to to ro to to ro h - l ro ro
3 ro LD 10 ro 3
p
to to LO ro NJ M NJ
o
to to ro Ul ro to
p h - l
00 00 00 v l
P P M p P M ro M
v l
io M io
h - l
M M
P
LU
io p
bo
00 H k h - l h - l
i - l t - 1 h - l H I h - l 00 h - l h - l h - l ro
LO
A
M
p p p i - l P i - l
to
i - l v j i - l to p P i - l to
f i
LU p
f i
p p
ro
P
M LU f i f i J i
p
f i i - l f i fk
O
S
ro i - l p p
UU h - l
Ln i - l i - l
h - l
i - l io i - l Nl cn P i-k NJ Ln O
S
3
H I
v l NJ ro 3 Vl
Vsl
LU
h - l
LU LU LU
h - l
LU UJ
h - l
f i
h-k h - l CTl f i
cn
v l
cn cn
to
LD ID v l h - l h - l
cn
Ln
LU
o
Ln Ln Ln
Ln Ln Ln Ln Ln
V.S
ro
Ln Ln Ln Ln Ul Ln ' Ln Ln Ln fk
LU
V.S
ro
Nl
'.
V v .
Ln Ln
LU LU
LU
LU LU LD
Nl
to to ro ro h - l CTl CTl h - l h - l 01 LU
h - l h - l h - l h - l
O 00 v l V j UJ to 01 fk f i ID Ul to O
3 \ '
.
01
3
o
'.
ID
3 '.
3
o
3
o ca
00 3 3 3 3 3 3 00 00 3 "3 0 00 3 3 O
00 00 00 00 00
h - l
00 00 00 00 00 00
h - l h - l 00 00 00 h - l 00 00 00
H k to Ln f i v j ro to fk f i 00 LU h - l 3 3 UJ to UJ h - l
cn
CTI LU
ro UJ fk Ln f i L U 3 to to Ln f i LU fk 3 LU Ln ro 3 LU f k to
to f i LU
h - l h-k to
cn
UJ O 00 01 Ln v l v l LU v l UJ v l to v l CTI
TJ > > >
-o -o
> -D -D TJ TJ TJ > > 13
-n
n
> TJ >
D
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
LD
30
m
o
o
^
m
<
-o
>
Q.
cau
O
01
NJ ro ro ro h - l h - l h - l h - l LU LU
00 01 v l 00 00 Vl
Vsl
v l 3 h - l v l v l LD v l v l v l LO to VI VI v l 00 VI v l v l v l 00 Vl v l VI v l v l v l v l
h-k 00 f i LU
o
00 00 UJ to v l 00 00 f i LU LU LU Ln Ln LU UJ f i Ln UJ Ul Ln f i Ln fk
cn
fk fk UJ f i LU
o
ro
h - l
ca
fk 00 ro Ln ro to LO LO h - l v l
cn
Ol h - l h - l 00
cn
00 00 f i f i 00 Ln 00 ro Vsl 01 cn cn Ln CTI
LU v l ro to
o
v l H k NJ Ln
o
Ln NJ h - l to v l v l fk 00 LU 3 00 3 00 LD
cn
00 NJ h - l v l 01 ro h - l LD H k
VI 3 v l v l Ln Ln Ln Ln Ln
V J
Ln O 01 00
cn
f i ro fk Ln h - l 00 LD 00
cn
to LU Ln 00 ID 3 to to LD 00
v l UJ to ro LD
cn
00 to Ln LU 00 cn VI to H-l v l ro 00 3 00 f i 3 f i f i h - l UU H i h - l LU h - l 10 cn LU h - l
ro Nl to ro ro to ro ro ro ro ro ro ro ro NJ ro to ro ro ro NJ to to ro ro ro NJ NJ to NJ ro ro to NJ
ro ro ro ro ro ro NJ ro ro to ro ro ro to ro ro NJ to NJ to ro ro Nl ro to NJ to ro to to ro ro ro ro
NJ ro ro ro to ro ro ro NJ ro ro ro to to ro ro to to ro to ro ro ro to to ro to ro to ro ro ro to to
p
h - l h - l H k h-k h - l h - l h - l h-k h - l h - l h-k h - l h - l h - l h - l
p
h - l
p
3
o
p
o
p p
3
ix Ln Ln Ln Ln
tu
E
S
in Ln
P P p P p P P
Ln f i f i
P
Ln
tu
E
S
L U L U
fk f i fk f i f i f i f i f i f i LU LU LU LU UJ
o o P
ro
00 00 00 00 00 00 UU LU
f i f i io LO to io Vl v j
P P P P P P P P P P P
In
P p
ID VI ro
h - l h - l h - l h - l
cn to Ln cn cn cn Ln f i
U l UU
LU LU
U J
LU LU LU LU
h - l
ca
3 3 h - l h - l h - l O 00 00 00 v l un LU LU
LD LD to
cn cn cn
01
cn
LU f i fk
ca
f i Nl 3 h - l
un
h - l h - l
3 3
LU Ln Vl cn tn LU UJ LU LU LU UJ UU J i LU
NJ UU Ln Ln UU 00 \ . Ln LU UJ LU
V v
f i LU \ ^
to
UJ Ul UU
ro ^
h - l V s Ln '
h - l
^ to to '. \ ro ro VI v l
h - l
f i
V s s h - l h - l
,
H k
to
to
f i V s LU
UU h - l ro ro
cn
h - l h - l
Vl h - l f i f i ro ro
p
3 Nl LD
h - l
00 00 LD LU 01 01
h - l
UJ h-k h - l h - l
ca
Ln Nl fk LD 00 '. ' 00
h - l
^ ro to f i
- V
ro
en
V s h - l
,
\ h - l ID ID
O
Ln
o
3
o
3 3
3 3 O 3
o
3
h - l
3
o ca
to 3 3 3 00
o ca
3 00 00 00 00
o
O 00 00 O 3
o
00 ^
h - l
00 00 00 3 3 00 00
o o
O 00 O
h-k LO 00 00
h - l
00 00 00
h - l h - l h - l h - l 00 00
h - l h - l
00 00 00
h - l
00 3
h - l H-l h - l
00
h - l h - l h - l
00 00 00
h - l
00
h - l fk UJ LU
o
ro LU f i to ro h - l h - l to v l H k H i 00 to 01 ro LU 00 h - l ro
o
LD O to 3 v l UJ LU h - l ro
Ln f i
ca
f i fk Ln ro ro O Ln to
o o
UJ LU ro Ln to f i ro UU LU Ln f i Ln LU 3 f i O LU
o o
Ul f i
J i Ln Ln
cn
v j
vJ UJ UJ ro O Ln
cn cn
VI
un
f i
cn
f i to 00 Ln UJ v l
cn
f i
cn
f i ro f i to Ln LU ro ro
> TJ 0
-o
> TJ D
-o
TJ -0 > > > > > > > > >
-o
0 > >
-a
> > > TS > > -o D > TJ
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
<
m
g
>
n
n
o
o
CL
C
n
3J
CD
% 6
I ?
TJ
-o
>
ca.
ca.
O
01
01
3
3
3^
CO
'Z
o
CO
vJ
-vl
-vl
ro
h-l h-l h-l h-l h-l h-l h-l h-l h-l H-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-k h-l h-l h-l
un Ln Ln Ln Ln Ln Ln Ln LU LU UJ LU LU LU
ro ro ro
h-l h-l h-l h-l
ca
3 3 3
o
3
3
o
3 3 3
o
3
00 v l Ln LU UJ h-l H I h-l 00 Ln A
h-l 3 3 f i LU Ul LD 10 00 3 00
cn
CTl CTl f i UJ LU LU
ro ro ro
t o to
Ln
h-l
to
CTl h-l LU 3 3 Ln
V j f i Ln Ln h-l 3 f i 3 LO ID ID
ro
LO CTI Ln f i
cn
LD f i
ro
10 v l Ol
cn
Ln
to
LO NJ 01 f i
3
f i h-l v l LO V l f i LO Ln to v j 3 LD 00 3
to
LO h-l v l 00
to to Ln UJ v l h-l f i
ca
to
cn
00 f k 00 10 LO f i 01 00 00 Ln to
VI 3
O
to to h-l J i to 00 Ln Ln LO LD
cn 3 Ul f i 3 v l t o 00
CTl v l h-l LU Ln f i UJ h-l
ca
v l
cn
f i LU UJ
ro to h-l Ln 00 Ln v l UJ v l f i v l f i 00 h-l v l ID 00 v l v l 01
NJ ro ro ro to ro ro ro ro ro h-l to ro ro ro NJ ro h-l h-l ro t o ro ro to to h-l to h-l h-l h-l ro ro t o to
to 3 3 3 3 ro ro
3
ro
3 Ln 3 3
p
3 ro
3 LD LD
ro O
3 3 3 NJ Ln
ca
ro to ro
p
ro 3 to
P p
f i f i f i
M P
f i
P
f k v l f i f i
Nl
v l
P
f i
p p f i
f i f k f i f i
P
v j
Ln 00 to 00
io
P
vl
M
3
Ln p P P
h-l h-l M 3
p P
M
io
h-l
bo
h-l
P
In
Ln
Nl M
P
M
p
to UJ 00 Ln 00 Hk h-l
bo
h-l
v l
f i
3
P
t-1
i - l P
3
i - l p
Nl 3 3
i - l
f k
h-l
h-l
p m
00
H I h-l h-l h-l
i - l
h-l LU
O
p o
i - l
p
f i
p
LU
P
h-l h-l i - l f i f i i - l
ro i - l i - l
h-l f i
ro
f i h-l h-l i - l i - l
p
i - l i - l f k
in P
M
p
f i
io
h-l
p
h-l LU vl 00 v l Ln v l f i v l v j h-l f i 00
oo
CTl f i f k f k M LU
p p
f i
p
00 LU
ro
LU i - l
NJ
cn f i
V j cn
01
Ln p
to CTl
cn
s
cn f i p t-k P
t o
P p p P
to
M P
to
p tn P p p
O
00
Ln
LD
Ln
h-l 3
bo
ro to i - l ID
to
h-l
in
h-l
P
ro ro
M M
P
M to
P
h-l 3
p cn o
ro
P
i-k
Ln to 3 Hk 00
o
h-l 3 3
cn
ro
f i f i LU to LU LU 3 Ln 3 LU h-l 3 Ln
f i LD h-l LO t o
ro
00 h-l
cn 01 tn cn cn cn 01
^
CTI
01
cn
CTl CTl 01
cn
^
cn cn cn cn
CTl
cn
cn
01
cn
h-l
CTI
h-l h-l
CTl
h-l
h-l ^ h-l h-l
cn ^
^
01
V s
en cn cn
cn cn ro
cn
cn
LD h-l 00 v j h-l h-l h-l
cn
h-l Hk
ro
h-l h-l h-l
to ^
01
00 Ln Ln f i f k UJ v ^
cn
cn
to
ro
00
>
v l
cn cn
cn
LU to
.
to
Vs.
LO -V 00
V v
00
.
V s V s f i LU
ro ro
t o
ro ro
O
3
o
cn
3 3
vl ca
3
to
Vs.
ca
00
V v
00
3
o
O 3 3
3 V v V s
3
ca
00 3 00 00
3 3
o
00 3
o
00 3 00 OO 3 3 CO 3 3 00 00 00 00 00
o
00 3 3 3
o
00 00 3
o
h-l
00
h-l h-l
00 00 00 00 00
h-l
00
^
h-l
00 CO
h-l
00 00
h-l h-l h-l h-l h-l
00
h-l
00 00 00 00
h-l h-l
00 00
to 01 3
o
00 f i h-l NJ
to 01 h-l CTI t o
3 f i h-l
ca
cn
01 NJ Hk h-l h-l h-l LD h-l
ro
vJ Ln to
h-l
o
ID 00
O O f i LU h-l h-l i n f i ro h-l NJ Ln 3 Ln ro
LU Ln Ln ro ro h-l h-l
o
Ln Ln h-l Ln ro UJ h-l LU Ln Ln
cn
UJ LD to to v l
ca
Ln
cn
h-l to to Ln f i Ln f i LU LU
o
h-l Ln 10 00 to
en
h-l f k J i
ca to Vl LU Ln
cn
> -o > > >
-o
-o
-o
>
-D
>
-0 -o
>
-o -o
^
-o
-o
-o -o
> > > > > >
13 TJ
o
> > > >
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
3D
m
n
O
7^
n
-c
"O
>
CL
ca.
O
01
LU LU UJ ro h-l h-l h-l h-l UJ LU ro h-l h-l h-l h-l UJ
00 v l 00 00 01 CTI
cn cn Ln to to v l VI v l v l 00 v l v l UJ v l f i Ln
o
v l v j v l v l v j VI v l Ul
ro
v l 3
Ln LU
Ln ro
3 Ln f k f i h-l
ro ro
f k LU LU UJ
Ln en
LU LU Ul LU h-l
ro Ln LU LU f i LU
cn
LU 3 UJ Ln
h-l
v l f i 00 v l LU O CO 00 LU VI VI LU f i f i f i 00 v l f i h-l f i Ln 3 v l 00 f i 00 h-l 00 3 v l
h-l f i Ln 00
to
cn
to 3
cn
f i LO
cn O
00
o
LD 00 00 Vl
ro
00 00 01 LO LD f i h-l v l 01 f i 3
en
LD f i Ln v l 00 3
v l
cn
LU LU UJ v j f i LO LO
3 to h-l
cn
Ln 00 to 00 00 00 LU Ln f i 3 3 LO
O
f i
Ln to 01 3 LD H I Ln
LO LO 3 h-l LU h-l Ln to f i 00 h-l v j LD 3 00 LD ID 01 v l f i Ln LU CO LU H I UJ h-l
v l Ln 00 LU
to
h-l Ln
to NJ to Nl to ro to ro ro ro NJ ro ro to to to to to ro ro NJ to Nl ro Nl Nl to NJ NJ ro NJ ro ro to
to to Nl
ro to to to ro ro ro ro ro to ro ro ro ro ro ro ro
NJ NJ
ro
M
ro
Nl Nl
ro ro ro
NJ
ro ro ro
NJ Nl ro to ro NJ to ro ro to ro to to t o
ro to ro to ro ro Nl NJ NJ M to NJ ro ro ro ro to ro ro ro
h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l H I h-l H I H I h-k H I h-l h-l h-l h-l h-l h-l h-l h-l h-l
f k f i f i f i f i f i f i f i J i f i f i f i f i f i f i f i f i f i f i f i f i f i f k f i f i f i f k f i f i f i f i f i f k f i
h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l Hk h-l h-l h-l h-l h-l h-l h-l h-l h-k h-l h-l
00 v l v l v l
O
v l v j v l v l v l v l vJ v l Vl Vl v l v l v l v l 01
cn
CTl
cn
cn cn Ln Ln f i f k f k f k f i f i LU
o
LD VI v l ro
Hk h-l h-l h-l h-l h-l h-l Hk t-k h-l 3 3 3 00 v l 3 3
3
3 01
ro
00
cn
f i h-l h-l h-l to
h-l LU Ul LU LU f i LU LU
h-l
3 LU LU LU a\
LU LU LU h-l
cn
cn
cn
en
Ln Ln
' '.
UJ 10 CTl
en
f i UJ LU f i
Ln
- V
ro
.
cn
ro
h-l h-l h-l
ro
h-l h-l NJ to to
\
NJ h-l f i
h-l h-l h-l
Ln
00
ro
ro
ro
h-l
ro ro
00 00 00 00 h-l h-l 00 to 00 f i h-l to LD
h-l
ro Ln
f i h-l h-l h-l h-l
Ln 00
cn
O
ca
ca tn v l v l
V s
\ cn
f i
cn
00 f i
Ln
h-l to v l to
h-l
o
V s v ^
o o
3
3 3
3
o o
cn
o
3
3
o o
3
to
v ^
to
h-l
o
h-l
O to O 3
o
3
o
O
00 00 00 00 h-l 00 00
ca
00 00 3 00 00
o o
00 00
O
00 00 3 3
o
o
00
ca h-l h-l
00 00 00 00 00 00
h-l h-l h-l h-l
o
h-l Hk 10
h-l h-l
00
h-l h-l
00 00
h-l h-l
00
h-l h-l
00 00 10
LU LD
to
NJ
o
ro
h-l Hk f i f i f i to h-l h-l
O to
o
h-l h-l
ro 3
h-l h-l h-l
to v l to h-l h-l
O 3 h-l 00
ro
f i f i Ln NJ
o
h-l ro h-l h-l ro to Ln f i ro LU Ln Ln Ln t-1 LU f i Hk h-l f i Ln f k to to LU
o
O ro ro Ln
v l O Ln
00
cn
00
ro Ln
v l LU
o
LU
o
00 LU f i v l 00
3
f i LU 3 v l 3
cn
CTl h-l LU 01 NJ f i J i to
f i
-CJ
> >
TJ
>
-o 13 TJ -CJ -0 -o -o
> > > > > >
-o TJ
>
13
> > > >
13
>
-o
> >
-o
>
-o
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
<
n
>
n
n
-CJ
3
CL
c
30
CD
?
II
>
CL
CL
ZD
OJ
01
3
3
3 '
CO
'I
o
CO
vl
-vl
-vl
ro
ro
h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-k h-l h-l h-l h-l h-l H I h-k h-l h-l h-l h-l
to to
LD LD 10
to ID
ID LO
to
10
to to to to to to to
ID
to to
00 00 v j v j v l
cn cn cn cn cn Ol cn Ln
Ln Ln
Ln
Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln
Ul
Ln Ln ro ro
3
Ln Ln
00 00 00
Ln
f i f i LU LU
o
3
00
LU UJ UU LU LU UJ UJ LU LU NJ h-l h-l h-k
O O
o
3
ca Ln Ln en
00 h-l LO LD ID
o
00 00
Ln Ln to
LD CTl
00 01 01
cn Ln
f i LU LU
ro
UJ 00 f i h-l
to
ID
cn
f i f i h-l
O o
00 LO
Ln Ln ro
J i
to cn
f k LU vJ
cn
LU
VI
to
NJ
o
f i 00 f i Hk
ro
h-l f i
ro
3 h-l 3 f i vJ v j
Ln ro
LU f i
Ln
v l
Ln
3 -vl f i
to
f k
en
h-l
cn
f i
00 Ol
Ln
h-l Vsl
3
LU
ca
f i
o
00
to
f k 00 LD v l v l
cn vl
UJ
ro
CTI f i V j 00
cn
h-l
Ln to
00 LO LO UJ LD
to h-l ro ro t o to NJ ro to h-l to to to ro t o NJ Nl to h-l h-l h-l ro h-l h-l t o ro ro ro NJ h-l h-l Nl Nl t o
p
LU
to to
NJ
ro ro ro
Nl LU
to ro to
t o
ro to to ro
f i f i f i
ro
f i
to ro ro
t o
ro to
LU LU 3
ca
t o
Nl
00
ro ro ro ro to ro ro
00
NJ ro ro ro ro ro Nl to
h-l h-l h-l
f i
h-l
p
to ro NJ NJ NJ
p p
Vsl v l
P
h-l f i h-k h-l h-l h-l h-l h-l h-l j i h-l Hk h-l h-l Hk h-l h-l h-l M
io
M
io
oo
M
P
h-l h-l h-l H i h-l UU UU
bo bo 3
NJ Ln to 00 ro to 00 to ro Ln
P P Ln
to
io
to LO to
ro
o
ro
3
NJ
o
io
oo to
o
h-l
h-l h-l h-l h-l h-l to
t o f i f i
p
00 j i 00
to
00 00 LD
LO LO
f i
P
p
LU
ro
o
ro
3
NJ
o
ro
f i
to
o
P p p
f i f i f i p i - l to to
LU
P
Nl 00 NJ h-l 00 f k to v l to to M
o o
O Hk
v l v j v j
ro
f i
v l f i
Ln
Ln
i - l
P
i-l p
p
Ln Ln
P
f i
cn Ln
3
ro Ln O in
h-l 00
In ca
ca
VI V j v j
p
P P P
LU
vl ca to
h-l
3 ro ro
NJ NJ 00 h-l h-l Hk
A A
00 00 3
v l v l VI v j
00 00
en cn CTl cn 01 cn 01 cn
V l VI
vl
v l v j V l
vl vl
VI
cn
,
cn
01 cn tn
. V s
Nl ro NJ ro
vl
O v j v l vJ v l
vl
v j v l V j v l
ro ro
t o
to ro
cn
01 cn
h-l h-l h-l
NJ
ro
Nl
to
ro
to
NJ
NJ
ro
.
LU v l v l f i f i f i
ro to ro
Nl
LD to
V s
to
>
V s V s
to
NJ
ro to ro ro to
t o
to
h-l h-l 3
Vs
o 3
^
o
o
to
V s
o
3 3
ca
O O O 3 3
-V
^
v^
\
.
~ v
'.
O 3 3
3
o
o 3
^
3
3 3
00 00 00 00 00 00 00 OO 00 3 3 3 3
3
o
3
3
3
3 3 3 00 00 00 00 00 3 3 3
o o
00 00 00
Hk h-l h-l h-l h-l h-l h-l h-l h-k 00 00 00 00 00 00 00 00 00 00 00 00
h-l h-l h-l h-l
00 00 00 00 00
h-l h-l Hk
h-l h-l h-l h-l h-l h-l h-l h-l h-l
to to
00 00 00 00 00 v l v l LU LU
cn O 3
h-l h-l h-l
to h-l h-l Ln J i 3 O ro
f i LU LU
ro to to h-l
o
3 Ln to Ln
LU
ro ro
8
Ln Ln UJ NJ o f k UJ ro to 3 h-l ro 3 Ln UU Ul to
Ln
h-l 3
cn Ln 3 ro
v l f i 00 f i
cn
CTI f i
A 8 to
v l
Ln
v l LU
Ln Ln
v l
Ln cn
00 t o
Ln
f i ID LD v j h-l
> > > > > > > > > > > > > > > > > > > > >
CJ
> > > >
to TJ -0
> > > > >
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 S 2 <: 2 2 2 2
3D
m
n
O
7^
ID
-<
-o
>
ca.
CL
O
01
LU Ul ro ro ro to ro NJ LU LU
v l v j v l v l v j v l V j v j v l v l 00 00 LU v j v j
cn
v j VI v l v l VI
ro
f i v l v j 00 VI v j v l 3 v l v j VI v l
f i LU UJ LU LU LU f i UU
cn
LU
Ln Ln
v l
Ln cn
h-l UJ LU LU LU LU LD 00 H-l H-l
Ln
f i LU LU h-l UU LU Ul LU
ro Ln
00
cn
f i f i
to
f i 01 01 VI v l f k LU
o
f i
cn cn Ln
00
cn
h-l 00
LO to
00
cn
00 00 00
cn
f i
Ln cn
LU 00
Ln cn cn cn
3 VI 3
to
00 00 NJ LD 3 LU VI
ro
LU
Ln ro
Vsl 00
Ln Ln
LU 00 CTI
cn
o
cn to 3
f i
LU v l
Ln
01
cn
f i UU
vl vl O
00
Ln vl
LO LU
ro
CTI VI 3 h-k 00
Ln
LU
cn Ln
v j LU ID h-l NJ f k h-l f i
Ln
v j
o
Ln vl
VI 00 f i LU
3 to
f i CTl CO LU h-l 00 00 v l 00
vl
LU H-l
vJ
3 H-l
o
ro Ln to
LU h-l
to
f i
cn
ro to to NJ to to Nl ro ro ro ro t o ro ro ro ro t o to ro ro ro ro Nl NJ ro ro ro ro ro ro to NJ ro ro
to ro ro ro ro
NJ NJ NJ
to ro
NJ t o
ro to ro
NJ NJ
ro ro ro ro
NJ
ro
NJ
ro to ro to to to to to to to
ro
NJ
ro ro ro
NJ
ro ro Nl to to
t o
ro ro ro ro ro ro ro to to ro ro Nl ro ro ro to ro to NJ ro to to
h-l h-l h-k Hk H-l Hk H-l h-l H-l H-l h-l h-l h-l h-k h-l h-l H-l H-l H-l h-l H-l H-l H-l H-l H-l h-l H-l H-l h-l h-l h-l H-l H-l h-l
o o LD LO to to to to CO 00 00 00 vl vl Vl 01 tn Ol cn en cn Ln Ln Ln Ln Ln Ln Ln Ln f i f i f i A f k
cn
f i
ro
t o t o
ro
NJ
ro to
10 LU UJ
en
h-l
Ln o
3 3
o o v l t o H-l h-l h-l H-l h-l 00 h-l h-l h-l
h-l
ro
h-l h-k h-l H-l H-l H-l
ro to
01
cn
H-l LU LU h-l Ol CTl CTl H-l H-l f i
en
Vsl v l f i f i f i
O to
00 00 00 00
vJ f i
Ln Ln Ln Ln Ln Ln
VI v j 00 00
to ro
h-l v l
cn
CTI CTI ID ID
en
Ln
Ul h-l
to
to
to Ln A
f i LU ID
to
ID 00 v l
cn
LU
cn
Ln
Ul
to to Ln
LU LU LU
f i LU h-l LU LU LU LU
LU LU UJ LU LU V s
f i LU LU LU LD h-l LU UJ LU LU 00 ro to
f k
\
UU UU
V.S
V s
^
v ^ f i Hk
to
00 ro to
H-l
'.
ro to
UU
h-k
UU
V.S
IO h-l
ro 3
h-l h-l
en
00 h-l Hk h-l h-l NJ
o
H-l
CO
H-l h-l
to
h-l
ro ro ro to
Ol H-l f k f i
to
00
to
cn
ID f i 00 00
>
Vl 10
Ln Ln Ln
f k
to
LD 00 f i ID CO CTI cn
^
ID
o
00 O
V v v ^
O 3
V v
o o
CTI
h-l 3
o ca
ID
ca
o
O
ca
00
3
o
00 00
o
3 h-l Hk 0 3 00
3
00
^
3
3
o
CO 3 CO
^ o
00 00 00 3
ca
00
ca
O
00 00 00
h-l
00 00
h-l h-l
00 00
3 0
00 00
h-l to h-l
00 00 00 00 00 00
to to H-l H I h-l to
00 00 00
ro
ID
to O to to
o o
Ln
LU
to h-l UJ f i NJ
Ln
h-l
Ln
cn
to un UJ H-l LU ro H-l 3 NJ
o
NJ to
fo
H-l VI
ro Ln J i CO
LU
ro Ln
NJ LU ro 3 Ln LU H-l LU Hk LU h-l to O LU LU LU
CO Ln
o
O
o
f i f k UU to LU LU
O LD
LU 00
to
00 LO 00
3
h-l VI
vl
3 f i f i
Ln to
CTI vJ 00
cn
h-l
to
h-l CO H I v l f i ro h-l to to 3 to
TJ
> > > > > > >
-o TJ TJ -0 -0 -o -o TJ
>
TJ -a
>
TJ -CJ TJ TJ -o
> >
TJ
>
CJ
>
CJ TJ
>
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 <: 2
<
i5'
S
o
>
n
n
-o
o
ca.
c
n
3J
DO
3D 3
m
00
n
O
3
cn
Q. h-l
v j
^
iu
m
iu
< p
TJ
>
CL
a.
o
01
OJ
3
3
3 ^
CO
' o
o
CO
vJ
vJ
vl
M
CO
NJ Nl Nl t o t o ro ro NJ NJ ro ro h-l h-l h-l h-l h-l h-l h-l h-l H-l h-l h-l h-l h-l h-l H I Hk h-l h-l
3 3
ca
3
3
3 3 3
0
3 3 ID ID LO
to
ID LD LO
to
LD LO t o
to
ID
to
LO LD 10 ID t o
to ID to
Ln Ln Ln
Ln
Ln
Ln
in Ln Ln Ln
f i vl vl v l
o
v l v l v l v j
O
v l V j v l
Ln Ln Ln Ln Ln un
Ln
Ln i n Ln
LD 00 00 v l v l VI
cn
01
cn
Ln h-l
Ln Ln
f i f i LU LU LU LU LU
ro ro ro cn Ln
Ln
Ln
f i f k f i f k f i f i
Ln
3 3 t o h-l 3 00 v l UJ f i
Ln
t o 3 IO 00 v j LU Nl t o h-l v l V j H-l
cn
00 Nl NJ 00 Ln f i LU UJ 3
f i
Ln
f i 3
o
v j h-l v l 10 Ln LO LD 3 h-l CTl f i t o LO LO Ln
Ln
h-l
cn ro
Nl t o h-l
0 01 10 cn
f k ID
00 00 h-l i n v l
cn
Ul
ro
00 LO LU 00 H-l t o LD
Ln
IO v l J i t-1 UJ
Ln
v l h-l Ln LO h-l
3
UJ 00 NJ
cn ro
h-l h-l ro
NJ t o
ro t o ro
NJ
ro NJ t o
p
ro
ro ro h-l Hk
p
NJ ro ro t o NJ ro v l NJ v j ro ro t o
f i
00
Ul
00
ro
P
t o
P
t o
p
ro
P
p
P
t o
P
P
P z
z
3
f i
ro
i - l
p
f k
ro
P Z
Z
t o
P
f k
00
f i
00
P
f i
p
M
p
io z
z
t o
P
M
p
Z
Z
P
f i
LU
p
z
z
P
f i
ro
P
ro
ro
P
f i
P
P
i-k
ro
f i
Ln
ro
p
p
t o
H I
P
h-l
P
Hk
P
ro
p
H I
P
h-l
P
P
h-l
T
5
p
h-l
P
h-l
ro
h-l
P
P
ro
f i
p
t o
f i
ro
H I
P
NJ
p
h-l
P
h-l
P
p
p
H I
p
P
i - l
f i
h-l
io
P
h-l
p
h-l
P
t-1
f i
Lu
00 CO 00 00
P
00
p
bo
f i
p p
00
P
ro
f i
p
t o
f i
00
Lu
00 00 00 00
t-1 LU 00 i - l 00 00
P
00
ro
3
00
Ln
00
i - l io V l
P
00
v j
Ln
f i
ro Lu
P
i-k
f i f i
i - l
00
i - l i - l i - l io
P P P p p
ro
3
00 P
io cn
Ln f i h-l
cn
f i v l
P
i - l CO Ln 3 3
in 3
3
Ln
H I
cn
v l
Ln Ln
ro
3
00
Ln Ln
v l h-l Hk
cn cn CO
UJ 01
cn
v l LD f i 10 v l f i
Ln to
h-l
ro
v l
I D
h-k
cn Ln cn cn
v l
to
v l Vl v l V l v j v l v j v j VI v l v l VI o v j v l vl v j Vl v l v l v l
v j v j v j v l ~ v v ^ v l v j vl VI
o
VI VI O 0 v j v j
LU LU UJ UJ UJ UJ LU LU UJ
VI
NJ t o NJ NJ
ro
VI vj v l Vs 01 Vs
V s V. LU UJ
v ^
LU
ro ro
t o
NJ t o
v^
3 3 3 3 3 3 3 3 3 3 3 3
3
3
3
3
LU UJ
v ^
ro ro
t o
3
^
3 3 3 3
3
3
3 00 00 00 00 00 00 00 3 00 00 00 00 00 00 00 00 00 3
00
3 3 3 3 3 '3 00 00 00 00
oo
00
00 00 00 H-l h-l h-l h-l H I H I h-l 00 h-l h-l h-l H I h-l h-l h-l H-l h-l
3
00
00 OO 00 00 OO 00
h-l h-l h-l h-l
UU H I h-l NJ t o
ro ro
t o h-l
3 cn
NJ t o
ro
t o h-l
3
3
ca
3 ID
to to
UU t o t-1 H-l t o
ro
t o NJ NJ t o
Ul LU UJ LU LU NJ
ca
3 LU LU LU Ln LU UJ LU 3 f i UJ UJ h-l Ln f k 3 3 3 ro h-l Ln LU LU t-1 3
f i Ln f i v j
ro
IO LO UJ v l 3 f k t o v l f i
ro Ln
3 f i f i CO 3 00 LU h-l f i LU 00
ro cn
LU 00 00 LU
-o TJ -n -0 -CJ
-a TJ TJ
> >
-CJ TJ 0 -0 TJ
> > > > > > > >
a
-a 13 -0 -0 -o CJ CJ 13 -o
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 <:
JO
n
n
O
TC
m
<
-o
>
CL
ca.
tJ
01
00 00
H-l t o h-l t o NJ NJ t o NJ Nl t o h-l h-l h-l h-l h-l t o ro h-l ro h-l t-1 h-l t o
LD h-l ID LU 3
ro
LU 3 3 3
to
LO LD ID
to ro
3 ID t o vj
to
ID LO 3 ID
Ln
h-l Ln
cn
Ln 00 f i
to
LD LO
Ln Ln Ln Ln
Vl
cn
O
Ln Ln
f i vj v j v j v j O
f i NJ f i
cn
v l ID CTI UJ h-l h-l
cn
f i f i LU f k f i IO LU LU VI
ro
LU t o
in
UU
f i
Ln
00 LU t o
ro
3 3 00 00
cn
3 LU f i 00
ro
t o 00 00 h-l h-l h-l O 3 vl
to
LO 3
Ln
3 h-l h-l t o 00 00 t o LD
cn
00
cn
LU ID
o
f i h-l CTl
Ln
h-l
ro
f i
CO
cn
3
cn Ln
v l 00 3 00
Ln
h-l Nl NJ 3 UJ v j 3 00 H-l
cn
v j h-l
Ln
00 Ln
ro ro t o t o ro ro ro t o ro NJ t o ro ro ro t o NJ NJ NJ ro t o t o NJ t o t o ro
NJ t o
ro
NJ t o NJ
ro
NJ t o
ro
t o
ro
t o
ro
t o t o
ro
Nl Nl t o
ro
NJ t o
ro
t o
ro ro
NJ NJ
ro
t o t o IO Nl NJ ro ro t o Nl NJ ro NJ ro ro ro ro ro ro ro ro
H-l
p
H I
p p
H-l
p
h-l
p
h-l
p
h-l h-l H-l h-l
p p
h-l M
p
h-l h-l h-l h-l h-l
P
p
P
t o
P P P
p
P
t o
p
P
ro
P P
CO 00
P
00 00 00 00 00 00 00 00 00 CO 00 00 00 00 CO 00 CO 00 00
P
CO 00
P
i - l
P p P p p p
i-k p
i - l
P
p
P p P P p P P P p
VI
cn cn
Ol
cn
cn Ln Ln Ln Ln Ln Ln Ln Ln Ln
f i f i f i Hk h-l
3 CO 3
o o
h-l t o t o CO
O
Ln v l
-o
o
v l vsj
o
Nl h-l 3 00 00 v l h-l
O
ID v l f i LU LU
v l 00
Vl v j ID
o
00
to
v l VI VI v l v l v j v j 00 v j VI Vl v l
t o
',
-V v j Vs.
v l
h-l f i v l vl
ro
h-l t o
ro
v l h-l Hk h-l h-l h-l
^
NJ t o
ro
LU H-l
^
ro
h-l
.
LU 00 UJ
\
t o -Vv
to ro
V l
cn
CTI
ro
Vs. V.
ro
00 LU LU
3
o
CO
^
13
\ \
3
3
3
3
v.
3 3
^
O
3 3
00 00 CO
3
00
3 O
3
3 3
3 00 00 00 00
O 3
00 00 3
O
00
^
00 00
h-l h-l H I
00
H I
00 00 00 00 00 00
h-l h-l H I
h-l
00 00
h-l h-l
00 00
H-l
00
h-l h-l
ro ro
NJ CTl t o f k H I f i CTl
cn
UJ
ro
t o H I t o
cn cn
h-l h-l h-l ID
o
LO
o
h-l
LU
ro Ln LU UJ LU 3 h-l f i f i 3 3 H I ro LU Ln UJ f i NJ f k O h-l f i h-l 3
LU H I NJ 00
vl
00
o
t o 00
Ln
h-l LU 00 3
ro cn
00
Ln
3 H I UJ OO 00 VI
Ln
TJ TJ TJ -o TJ -0 -0 TJ TJ 13 TJ TJ TJ
>
TJ -0 -0
> > CJ
> > > > >
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
<
ri'
S
>
n
n
"O
3
CL
C
o
3J
03
3" ^
S
CL h-l
-< -s
>
CL
CL
O
OJ
01
3
3
3^
CO
' o
O
CO
vl
~vl
~vl
ro
- t i
ro NJ t o ro t o t o NJ NJ NJ t o ro ro ro t o t o t o ro ro NJ t o t o NJ NJ NJ 10 NJ ro ro ro 10 NJ ro ro ro
3 3 3
3 3 3 CO CO CO 3
3
3
3 3 3
3
3 3
3
3
3 CO CO
CO CO CO CO CO CO CO
ca
CO CO
3
00 00 00 00 00 00 00 00 - v j v l v l v j v l v l VI V j v l v l v j
0
v l v l v l v l v l v l v l v l v j v l -vl
cn cn
01
00 00 00
ro ro
t o
CO CO to
LD ID
LD
LO LD
to to
ID LO 00 00 00 00 v l v l v l v l v j v l
cn cn
Ln
10
CO
3
to
00 v j f i
ro
h-l 00
CO
LU UJ
ro ro
t o h-l h-l h-l 3 3 ID 10 00 f i 00 v l f i h-k
CO CO in
f i
ca
CO
UU t o
t o
ro ro
UJ 00 CTl NJ NJ
Ln
t o
LD
LU
ro
00 t o
3
ID 00 f i f k Ln v l 10 UU
Ln
cn
10 h-k
to
cn
10
CO
f i 3
f k
3 3 Ln
h-l t o 00 h-k
Ln
t o
3
LU
Ln
VI h-l h-l 00 LU f i t o VI
to
LU
CO ro
10
ro
Hk
CO A
00
Ln
UU
to
p
t o
p
t o h-l v l v l v j v j
p
NJ
p p p
ro
p p p
v l
p p
v j v j v j v l -vl v l v l v l v j NJ ro v j ro
P P
UJ
p p p p io
t o
p P P p P P P P p P io
io
P
io
p P p P p
10 NJ
p
ro
f i Nl f i t o f i f i f i f i f i t o f k f i f i
P
f i f i f i f i f i f i f i f i f i f i f i f i f i f i f i
P P
f i
P
P
i-k
h-l
io
00
P
P
h-l
P
LD
f k
Ln
A
t o
i - l
p
i-k
p
i-k
io
h-k
P
i - l
P
00
p
t-1
P
i - l
P
i - l
t o
p
P
h-l
P
h-l
P
h-l
P
h-l
p
h-l
P
h-l
io
h-k
p
h-k
P
h-k
P
h-k
io
h-k
P
HI
P
h-k
P
Hk
P
h-k
h-k
P
00
Hk
P
00
io
i-k
NJ
p
p
P f i
HI
i - l
00
P P
00
O Ln
Vl f k
io
CO in
p
v l 00
Ln
LU h-k
Ln
V l v j v l
v l
v j
-Vs v l V l v l -vl -vl v l
HI -vl v l v j v l v j v j v j v j v l O Vl VI VJ VI VI v j v j v j v j -0
00
V v Vs.
OO
V l v l VI
h-l HI h-l
3 O
. ^ '.
V v
00
00
00
Vs.
OO 00 Vs V v
J i f k f k 3
to to
00 00 CO
Vss
CO 00 00 00 00 00 00 00 00 00 00
V v
00 00 00
oo
V v v j v j v l
3
o .
CO
Vss
V s
'. . . .
CO CO CO CO CO
V s
3 3 3
00 00 3
CO CO
^
3
3
^ ^
3
^
3 3 "3 3 3 3
^
CO
ca
3 CO
00 00 00 00 00
CO CO
O
00 OO 00
h-l
00 00 00 00 00 00 CO 00 00 CO 00 00 00 00 00 00 00 00 00 00 00
h-k h-k h-k Hk
00 00 00
01 Ln LU t o h-l
to
10 00 00 v j
cn
Ln Ln f i f k UU LU LU LU LU UJ
ro
h-k h-k Hk H-k 10
ro ro
NJ
CO
cn
f i f i
LU 3 f i HI 3 Ln f i Ln h-k h-l LU f i t o Ln CO f k f i UU ro t o h-l f i Ln f i NJ CO Ln Ln h-k h-k H i
Ln LU NJ
v j ID ID
Ln ro
UJ h-k 10 h-k h-l 00 LU f i
3
LU UJ h-l 00 f i f i
Ln
LU
cn
LU NJ LU
to CO
v j NJ v j
ro
00 00
TJ -0 "0 TJ
> >
TJ
^
TJ
-o
-0 TJ TJ TJ
-o
TJ -0 -CT -0 -0 -CT -CT 13 -CT -CJ -CT -CT -CT -CT -CT
^
-0 TJ
o
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
30
m
TC
m
<
-CT
:
CL
O
01
h-l h-l NJ t o h-l h-l h-l h-k h-l LU h-l ro ro LU t o ro t o t o t o t o t o NJ t o ro Hk t o to h-l h-l h-l
ID
to
h-l HI
to
LD 10 10
to
h-l 00 VI LO
cn
O
00
ro
v j v l
cn cn cn
01
cn cn cn cn
cn LD
3
3
LO
to
LO
Ln Ln
NJ t o Ln Ln Ln
Ln
Ln t o
3
f i
Ln Ln to
Ln
cn
Ln LU
cn
00
cn
Ln Ln Ln Ln Ln Ln Ln
i n 00
Ln
v j
Ln
3 3
00 Hk 3
3
3 LU UJ LU f i h-l h-l CTl UJ v l LU
cn
v l h-l h-l VI
cn
01
cn cn cn cn
f i
Ln
t o LU f i LU
10 f i 00 h-l LD
cn
f i
cn
LU LO
ro
h-l h-l h-l h-l 00 v l
3 Ln
00
to 3
h-l h-l HI h-l h-l h-l
3
f i f i LU LO t o
H-l v l h-l f i 3 f i v j
3
f i
cn
00 f i
3
LU
ro
00
o
ro
cn
00 00
ro
vl LU t o t o t o t o LU
Ln
LU h-l H-l t o
00
cn
O
t o ID v l v j Hk LU t o v l
cn
f i
ro
01
Ln
f k h-l h-l
Ln
t o
ro
h-l h-l 00 LU t o
3 3 to Ln O
t o f k
NJ ro ro ro ro ro ro NJ ro ro ro ro ro t o NJ t o t o t o t o NJ NJ t o t o t o t o NJ ro ro t o t o t o t o ro t o
ro
t o
ro
t o NJ t o
ro
NJ NJ
ro ro ro ro
t o NJ t o Nl t o t o t o NJ
ro ro
t o Nl NJ Nl
ro
t o t o t o
ro ro ro
Nl t o t o t o t o ro Nl ro ro t o ro ro ro Nl NJ NJ t o NJ NJ t o ro t o NJ t o t o t o t o t o t o t o t o ro ro ro
Hk h-l Hk Hi h-l h-l h-l HI h-l
p p p p p p p
h-l
p p
h-l h-l
p
H-l h-l
p p p
h-l h-l Hk h-l h-l h-l
p
ID
P P p p P P
00
bo
P P P P
In
P
LU Ul i j j
to to
p p
UJ UU UJ
p
HI HI
p P
P
p
p p
p
p P
p
P
to to to to
p p
h-l h-l O 3
o
3
o bo bo P P
ID to ID
P p P
i - l
P P p P P P P P P P in
In f i f i
P P
o
3 H-l h-l LD 00
o Ln
LU 3
3 ro
h-l
3 3 3
3
3 3 3
v l
Ln
00
Ln
f i f i
LD
00 h-l LU
3
ID ID
to
lO U3
to
LO
LU ro v l
v j v l V j
o
Ln
LU h-l VI LU 00 f k Vv t o
h-l h-l h-l h-l h-l h-l v l VI v j v l VI
v l v l Vs.
^
o
V j v j -V
'. cn
- v v l V s
^
t o V s h-l NJ
^
V v
.
h-l
v..
"v.
to ro
^
V.
ro
t o
cn
h-l NJ LU H-l h-l h-l
o
h-l
ro 3
LU UJ LU LU LU LU t o v l
3
Nl LU
to
ro
t o
Ln ro
NJ NJ t o LU
en
Ln ro 3
o
Ln
t o
'
\
f k
3
ca
3 CO
ca
3
V s
V. Vs
.
3 3
^ ^
-V
t o
'
3
3
O 3
^
v ^
3 O 3 3 O 3
3 3
3 3
3
3
3 00 CO
3 3 3 3 3 3
h-l
3
00 00
to
ID
3 O CO 3 3 CO 3
CO 00 00 00 00 00
00 00 00 00 00 00 00
h-l H-l
10 00 00 00 LO 00
3
00
h-l h-l to ID
ID
to
10
ID
LD
00
00 v l v l t o 00 00 v j H-l h-l LU h-l h-l 00
Ln Ln
t o f i 3
fo
Nl h-l LO Ol Ln Ln Ln Ln Ln
h-l
3 t o h-l
ro h-l
t o Ln f k UJ t o 3 Ln
t o h-l f i LU Nl LU Ln to 3 LU Ln ro LU
o
f k h-l Ln f k f k f k f i Ln UJ H-l 3 UJ 3
f i v l
cn
LO f k 10
to
01 t o v l
Ln 00
01
3 Ln
v j VI
3
Nl LU
to
LU 00
3
00 J i f i LU
cn
3 Ln
v l f i f k
> > >
TJ
> > > > >
-CT T) -CT
>
TJ -CT TJ TJ
>
-CT
0 > >
TJ -CT -CT TJ TJ TJ
^ > -a > 13 >
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
<
m
S
B
n
CT
3
CL
c
3D
03
? g
ii
-o
g
CL
13
01
OJ
3
3
3 '
CO
' o
o
CO
-vl
-vl
-vl
ro
cn
ro NJ to ro ro ro ro NJ ro NJ to ro ro to ro ro to ro ro ro to ro ro ro ro to ro ro ro ro ro ro to NJ
LU LU LU UU UU LU Ul LU LU UU LU LU UJ
ro ro
to NJ NJ
ro
to h-l H-l h-l H-l h-l h-l H-l 3 3 CO 3 3 CO CO
v l
cn
01
en
Ln f i UJ LU ro NJ to NJ 3 LD 00 00
en cn cn
Ln
v j v j
to
ro
ro
ro
h-l ID to LD LD to 10 10
h-l
01 Ln
ro
Nl 01 Ln LU v l Vl
H-l Hk
LO H-l LD 3 f i
UJ H-l LU to H-l to 00 00 H-l
ro
LU LU
ro
ro
ro
h-k h-k
VI UJ v l
h-l
LU
o ro
t u v l Ln 00 00 LU
v j
ro
00
ro
VI Ln 00
o
3 3 00 00 H-l Ln h-l
ca
Ln Ln f i 00 00
Hk
Ln LD to
H-l Hk
cn
to UJ CO
ro
IO 01 Ln H-l
o
LU 3 H-l f k v l 00 f i 00 h-l f i LD
ro ro
to Ln CO 00 00
to
cn
f i to f i 00
cn
LU to Ln f i to Ln
Hk
v l 3 vl f k
cn
H-l UJ to to 00 v j
ro cn cn
3 -vl Ln f k 00 Ln
ro
to
ro
Hk
ro
NJ to h-k h-k Nl H-l h-l
p
ro
NJ
p
to
ro ro NJ to to H-l H-l NJ ro ro to ro ro NJ to ro 10
3
ro
to LD
o
to
ro
LU f i 10 to 10
io
f i
p
p
ro
f i
p
to
o ro
M to f l f i
ro
M
p ro ro ro
p p
ro to
VI
P
M
p p
io fk
00 00
io
00 00
io
f i
to io
ro
f i M M
v l
P P
f i
p
p ro io ro
P
io io
P
to
P
io
bo
H-l H-l
p
P
h-l
f i i-k
Hk
M
ro M
H i h-k t-k H-l
bo
H-l h-l
io io
h-l h-l H-l H-l H-l H-l H-l H-l Hk Hk
p M LU
h-l
p io Ln
Ln
io
3 0
M
P
p
io
ro
P
p p i - l Ln
Ln Ln
p p
ro Ln ro to H-l LO ro 10
P
H-l
00
i-k
ro
H i
j i
00
P
h-l
00
i - l
H-l
M
f i
LU
A
i-k
01
P
LU
i - l P
Ln
v l
00
p
io
00
i-k
Hk
P
Ln
P
00
i - l
LU
v l
H-l
P
M M
P
3
P
CO
CO
i - l
Ul
P
p
P
P
H-l
T
f
P
Ln
00
P
00
P
cn p
Ln LD v l
A
i-k
01
Ln
f i Ol fk LU LU h-l Hk ID 01 h-l Ln UJ to Ln Ln
fk 00 UJ LU
h-l
v l Ln 00 00 H-l ID to v j LU
v j v j
H-l
NJ LD NJ h-l H-l vl VI
ID
Ln f i
h-l H-l
en
01
f i f i
01
10 00 00 M v l Vl v l v l
to
10 LD LD
\
ID
to to
ro
00 CO CO 00 00 00 Vsl v l v l v l V j vl VI
.
v l v l
\
to
to t o 10 to
to
ro
.
V v H-l Hk
NJ
h-l h-l h-l V v
NJ
ro ro
H-l
Ln
H-l
to 10
00
ro
h-l h-k
M H-l
ro
h-l h-l LU ro
ro
NJ to h-l Hk h-l V j v l Vl h-k h-k
f i
ro ro
to
3
to ID OO Ln Ln UU UJ 3 to Ln
ro ro
h-l Ln Ul Ln to
V s
Vl -vl
cn cn
,
3 Vv.
0
o
3 3
\
to
V s 3 CO 3 3
cn
3 3 3 3 00 3 3 CO CO CO O 0 00 3
^
O 3 3 00 00 00 3 3 3 3 3 00 3 CO 00 00 00 CO CO
00 00 00 00 h-l 00 00 00 00 00 00 CO H-l OO 00 00 00 00 h-l H-l 00 00 00 00 00 CO 00 00 00
UJ
cn ro
LU 3 h-l f i Hk Ln LU to ID H I UJ f i to 01 f i H-l t-1 ro LU ID 00 v j ro NJ Ln f i NJ NJ O
cn
01
UJ LU 3 LU Ln
o
f i UU Ln
h-k to H-l LU LU LU to Ln LU f i
ro
Ln Ul f i NJ f i LU to NJ h-l H-l 3
UJ f i f i
ro
00 3 to 00 v l CO v l v j v l
o
00
cn
h-l 00 Ln
cn
vJ ID
ca
O f i
h-k
v j
cn
to h-l Ln
ro
CO
ro cn
00 i n
-CT TJ -CT
> >
TJ
>
-CT -CT -CT
> > >
T3 -CT -0 TJ TJ
> >
TJ -D
> > >
-CT "CT -CT -CT -CT "CT
>
TJ -CT
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
30
CO
CL
7=
m
<
TJ
>
CL
ca.
O
01
h-l H-l H-l Hk to ro LU UJ
o o
o
3 v l
v j
UJ v l 00 v l v l
ro
NJ
ro
to to Ln LU
cn
v l to LU UJ 00
01 Ln Ln
un
H-l
00 Ln Ln to 00 Ln Ln
f i
ro
Hk CO 00 Ul v l 00 to Ln VI H-l
v l 00 LU O Ln v l LO 00 vl
cn
to Ln
v l CTl
cn
fk to v l
f k
CTl H i f i Ln f i
to
ro ro
NJ
ro ro
NJ to to
ro ro ro
to to
ro ro ro
to NJ to
ro ro ro
NJ
to to
ro
to to NJ
ro ro ro ro
NJ to
H-l h-l H-l h-l H-l h-l H-l H-l H I H-l h-l h-l
ID
I D
to ID
v j
*
UJ LU LU
ro to O
to H-l Hk H-l 01 v l
ro
h-l H-l ro
ro
h-l
00 to ro
ro cn M
f k
H-l
o
3 H-l H-l h-l
P P
p p
P
M
f k f i M H-l
i j i cn p
ro
i - l i - l i - l
O ca iu
P
i - l LD 10
P Hk
Ln i n Ln 00 ro h-l ro
v l
Ln
ro
VI
cn
UJ LO LU
H I
UJ UJ
V s
en en en
f i to
ro ro ro
LO
h-l
ro
h-l
LU
to to to fk f i
ro
Vl fk LD
3 O
^
CO
00 3
o
3 CO O 3 LO
h-l
3
o
LD
00 00 00 00 00 00
H-l
3 00 00
h-l
O 00 00 00 LD v l to H-l OO to LD H-l
LU Ln f i LU f i to
CO fk f i fk h-l Ln
UU
cn
UJ 01 Vsl Ul 3 LU 3 00
cn
Ol
> > > > > >
TJ
> > > >
-CT
2 2 2 2 2 2 2 2 2 2 2 2
ro LU LU to ro to NJ
v j VI v l v l 3 00 v l v l
Vsl
v l v l VI v l
un
LU
tn
v l v l v l
o
VI UJ
LU Ln f i f i LD 3 v l J i fk f i f i LU LU 00 Ln CTI H-l f i v l LD LU
ro
f i
cn
UU LU
ro
LU to v l
cn
Ln LU
cn cn
fk 3 h-l Nl Ol LU
ro
Ln v l
v l f i
cn
Ln Ln to
ro cn cn
00 to Ol f i NJ CO h-l
o cn
h-l f i Ln Ln
O 3 h-l Ln LO 10 Ln
o
3 v l to VI LU 10 Ln 00 ID v l
ro o cn ca
o
Ol NJ to v l ID 3 v l Ln Ln UJ h-l 3 Ul LU Ln to Ln f i fk
cn
Ln
ro
to to
ro
to
ro
to to to ro
ro
to
ro ro ro to ro ro
to
ro ro ro
NJ NJ to
ro ro ro ro ro
to ro to
ro
to
ro
NJ to to to to to
ro
to
ro ro
to
ro ro
to
ro ro ro
ro to
ro ro ro ro
to to to to to
ro
to
H I H-l h-l h-l Hk H-l h-l h-l H-l H-l H-l h-l h-l H I h-l Hk H-l H-l h-l H-l H-l h-l
P
to
P P P
io io
P
p P p p
P P P
p
P P P P P P
lo lo
00 ijo
P
in in cn in in in in in Ln In Ln io
P
i-k H-l h-l H-l
Ln to
h-l H-l h-l
ro ro ro ro ro
to
ro ro
to to ID
o
v l CTl tn f i LU
h-l Ln to LO 00 Ln
h-l
LU Vl Ln LU UJ H-l O
vl
UJ LU Ln LU
V v
LU H-l
ro
f i LU
H I
fk
V v H-l H-l
fk f i UJ
ro
h-l
ro
f i
h-l
00
ro ro
Vl
cn cn
h-l
ro
3 to H-k
Ln ro
to
Vsl h-l
v l 00 00
ro
h-l v j 3
cn
to UJ h-l 00 v ^ LO
3
~v
o
O CO
Vs.
o
v ^ 3
.
CO
o
LO
00 3
o
3 00 00 00
^
O 00 3 00
^ o
LD 3 CO 3 CO 00 O CO
h-l 00 00 00
h-l h-k h-l 00 CO
h-l
00
H-l
00 to
H-l
to LO 00 00
H-l
00 00
3 H-l 00 V j
ro
3 h-l
cn
v l
o
ro
o
v l v j 3
cn
Ln 00 H-l
o
00 LU
O Ln ro
Ln h-l 3 o
LU LU 3 3
o
ro
Ul 3 NJ h-l to h-l LU
ca h-k
f i VI
ro
00
o
v l v l v l f i UJ to to 3 to f i ID
ca cn
h-l
cn ro
VI
>
TJ
> >
-CT
> > > > >
13
> > > > >
-CT
>
TJ
> >
-CT
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
<
n>'
i
o
>
n
n
TJ
o
CL
c
n
3D
03
3D
o
m
00 c
o
r
6
cn
CL
H-l
v l
^
cu
n
cu
<
T3
TJ
>
ca.
ca.
O
01
s
01
3
3
3^
(O
o
CO
-vl
vl
v j
IO
OJ
ro ro ro to to to NJ to to ro NJ ro to ro NJ ro to ro to to to to to ro to to ro to ro NJ ro to ro to
en cn cn
01
cn cn en
Ol 01 CTI 01
cn
01
cn
Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln fk f i f i f i J i UJ UJ
cn en
01
cn
Ln Ln Ln Ln i n Ln Ln Ln h-l 3
cn
cn
cn
Ln Ln Ln UJ UJ LU UJ UJ LU LU CO Ln LU to 3
o
v l
UU LU
h-l H-l
cn cn cn cn cn
01
cn
3 f i LU f i UJ to v l
h-l h-l
cn cn
Ln Ln Ln h-l h-l CO 00 Ln VI Vsl f i
h-l
f i f i 00
h-l h-l H I h-l h-l h-l h-l
Ln UJ tn
h-l h-l
3 i n ro h-l f i
o
LO LO 00
cn cn
00
cn
LD Ln UJ ro 00
00
cn
00 00 v l UU LU to to NJ ro H-l NJ UJ 00 NJ LO
cn
f k f i J i
cn
v l -vl LD LO LD LU v l Ln h-l f i o 3
ro UJ Ln Ln
h-l
to
h-l
00 LU ro 3 00 00 UJ to to Ln to LU 3 ro
cn o
UJ f i Ul UJ v l 3 Ln Ln h-l 00
cn
h-l h-l ro ro to to to ro ro to ro ro ro ro h-l ro ro h-l h-l h-l ro to ro ro to to ro to to ro
p
h-l to to
f i f i to
p
to Nl to NJ to to
p
3 to ro Ln 3 NJ to LU LU ro to ro to NJ to NJ ro 3 NJ
P
fk
f i to 3
cn
01
P P
'ro
P p P P P P
Ln
P P
v l O
fk
00 ro to
f i P
fk j i f k f k f i P o
to
P
fk
t-1
P
VI
to
p
LO
00
E
T
h-l
to
h-l
P
S
T
h-l
P E
T
h-l
P
E
T
E
T
Ln
P T
T
h-l
i - l
2
1
3
.
3
5
.
bo
p
P
00
bo
3
1
4
3
.
5
9
.
1
4
3
.
5
9
.
ro
00
Ln
p
P
00
P
00
P
00
P
00
p
00
h-l
h-l
bo
Ln
h-l
h-l
P
2
2
0
.
7
1
.
T
T
bo
p
t-1
to
p
2
0
4
.
4
Z
T
O
Ln
LD
O
T
O
LU
LD
VI O
T
O
O
T
O
O
T
O
O
T
O
O
T
O
E
Z
E
01
p
P
f i
h-l
v j
2
1
3
.
3
5
.
p
cn
3
P
f i
O
S
T
1
4
3
.
5
9
.
1
4
3
.
5
9
.
P
ro
i - l
Hk
P
f i
P
f i
p
f i
p
f k
p
f i
p
P
cn
T
T
Z
f k
P
01
2
2
0
.
7
1
.
v j
p
p
T
T
Z
i-k
2
0
4
.
4
LU LD to LD to ID ID v l ro to v l
h-l h-l h-l f i v j ro LO f i
Vl UJ
cn
f i
cn
to 00 00 H-l CTI LU H-l
IO Ln 3 to to
h-l h-l h-l h-l H-l
h-l h-l h-l
to ro h-l to H-l h-l h-l h-l h-l O 3
to h-l h ^ h-l h-l h-l h-l h-l H-l
ro to ro
.
to ro ro to ro h-l h-l h-l h-l
LD ID
to ro to -V
.
-V
;v to
'
Hk h-l
.
NJ to H I
h-l
CO
LD
to
NJ
\
LU UU UJ LU LU UJ LU ro h-l 00
to
to ro LO VI
t-1 h-l h-l h-l h-l h-l
ro J i vJ ro to
LU UJ to 3 3 3 3 3 3 3 00 to
>
LU NJ
Vss
ro
^
v j
h-l h-l h-l h-l
ID LD h-l 01
Vs
>
LD Ln f i
3
\
V s
to
3
.
NJ
Vss
3 3 3 V,
\
LD 01
Vs
3 3
3 3 ID 3 3 "3 3 3 3
^
3 3 3 LD 3
o
3 00 00 3 00 3 3 3 3 3 3 3 3 00 00 3 3 3
LO ID ID 10 LO LD ID to LD LD to ID h-l 00 00 00 h-l 00 h-l 00 00 00 00 00 00 00 00 Hk 00 00 00
p
ro to
cn p p p
Ln Ln Ln Ln
p p
3
p p
v l
p
3
p
h-l
p
00 00 00 v j
p
h-l
p
O h-l CTl LU f i
i-^
In
p P
i-k
Ln Ln
j i f i j i f i
Ln
i-k 3
P p i-^ P
3
p
j i
Lu
f i j i h-l 3
Ln
LU i-k j i
Lu b
Lii 3
LU
H I
LU to 00 0 3 00 f i f i UU v l Ln
cn
i n
v j
LU O to to UJ Ln Ln to 01 3
cn
ro Ln LU 00 Ln CO to
> > TJ > T) TJ TJ TJ CT -CT -CT -CT -CT
>
> TJ > -CT > > > >
>
>
>
CT -CT -CT TJ > >
>
13 -CT
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
30
m
n
o
7^
n
-c
-CT
>
CL
CL
O
01
to ro NJ h-l h-l NJ h-l LU h-l NJ NJ to ro LU LU LU LU LU LU
h-l v l v l LO to Ln Ln v l VI Vl v l VI O LU v l
v j
VI o VI v l v j vj ro to 3 3 3 3 00 00
cn
00 v j 00
VI LU LU Ln Ln 00 00 fk f i h-l f i f i f i 00 f i f i LU LU LU 01 LU f i 00 v l Ln v l
cn
Ln f i h-l 00 Ln h-l Ln
h-l f i f i CO 00 01 Ln
on
Ln ID
o
3 3 Ln Ul
cn
Ln vl Ln UU
cn
3 fk to
cn
LD 3 go 00
o
v l LU
o
ro
3 00 to h-l 01 LU LD 00
h-l
to
cn cn
Ol v l f i
cn
LD h-l LU ID Nl
cn
3 v l VI h-l to
O
LD Ln 00 3 f i LU
00
E
LU 3 ro f i
cn
h-l
cn
VI 00 Ol fk 00 NJ
H I
ro OO LU
h-l
Ul to f i Ln v l to 3 f i LU v l LU ro v j 3
LO 01 LU ro 00 LD
cn
Ln ID
cn
LO en LO 3 ID
v j h-l
3 cn to Ln to f i LU to H-l to h-l f i 3 00 f i f i f i
ro ro ro to ro to ro ro NJ to ro ro to ro to to ro ro ro ro ro to NJ ro NJ ro to NJ to to ro to ro to
ro ro ro to to to to to to NJ ro ro to ro to to to ro ro NJ ro ro to to to to NJ NJ Nl to to ro NJ to
f i f i f i f i f i UU UU LU LU LU LU LU LU UU ro to ro ro ro ro ro ro to to ro to to NJ NJ ro ro ro ro to
3
o p P P p p P p
00 CO
p
CO Ln
p p
LU LU
ro
Nl NJ to ro to to ro ro to to
tn
Ln Ln f i f i
P p P P P
to
P P p
LO IO
P
LO Ln Ln Ln Ln Ln
p
h-l t-1 3
p p p
to to v l
cn p P
to ro
cn
ro Ln ro O h-l H-l
Lu Lu P Lu
Ul f i f i f i f i
io
ro
ro i - l i - l (JI UU i - l i - l
p
vl ro LU
P P P
J i
cn
ro
P
f i
P P
LU LU 00 CX) 00 oo 00 h-l h-l h-l t-1 00 ID
LD LU f i ID LU LU i - l i - l
P p
f k f k
Ln
f i
bo
f k
P
ID f k f i f i
in in p p
to fk f i f i ro
Ln bo
f i f i
o
3 00 f i 3
H I h-l h-l
to
V j
3 fk ID to to
h-l
Ln Ln Ln 3 3 3 ro to ID
Ln NJ Ln
o
LU LU en cn to UU Vl h-l h-l
v l
'
Ln Ln f i LU LU LU
cn
UJ LU UJ fk UJ UU v l to LU NJ Ul
- V h-l h-l h-l H-l
to f i
^
f i
H-l
'
-V Nl vl
o
v l sl LU
,
LU 00 00
h-l h-l
to ID
H i
to 01 to to
h-l
to 10 NJ
h-l H-l h-l to to -V v j V v V v
LU
ro VI Ln Ln
h-l -V h-l H I LD to i n Ln LU 00
h-l h-l 10 Ln LO Ln UU CO v j V j LD
'
3 O 3 O O
>
3 v
' o ^ '. O ^
3
^
v
'
LD
'
H-l O h-l
o
00 OO
ca
3 00 00 00
o
to
o
3 3 3 3 O 00 3 3 O 3 3 ID 3 00 3 3 O h-l O CO 3 10 3
00 h-l H-l
10 ID h-l h-l h-l 00
h-l
00 00 00 00 00 00
h-l
00 00 00 00 00
h-l
00
h-l
00 00 00
o
to to
h-l h-l h-l
LU h-l
p
H I to to NJ
o p
to v l v l v j LO Ln Vl
o
f i h-l
p p
v l ro
p
ro f i f i H I
cn
ro
en
h-k 10 NJ
Lu
h-l
P p
i-ii to
b b Ln
j i f i f i
iu
j i 3 j i j i to
b Ln Ln
h-l h-l
Ln b b
ro LU
fi
f i
P Lu
f i
io
f i Ln LU to LO
H-l
cn o
VI LU v l 00 VI
cn
H I
v j
cn
f i 10
cn
3 00 LU O LU UJ 00 f i 3 3 h-l h-l to UJ
T) > -CT TJ TJ > > > > 0 > >
>
>
>
> > > > -0 -CT > -CT > -CT TJ CT CT -CT CT CT -CT > CT
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
<
m'
g
>
n
n
CT
3
CL
C
n
3D
DO
n 00
8 S
: ^
. < w
>
CL
ca.
(3
01
m
OJ
3
3
3^
CO
00
3D
m
O
O
CO
vJ
-vj
-vl
ro
N
LU
to
h-l
00
00
Ln
00
ro
3
p
In
Ln
UJ
to
HI
o
Ln
UU
CTl
ro
3
vl
00
f k
io
Ln
bo
Ln
LU
LD
cn
NJ
to
to
UU
3
cn
UJ
f i
f i
00
p
to
f i
P
to
p
i - l
f i
cn
UJ
3
UJ
vl
f i
to
ro
to
ro
f i
LU
3
UJ
Ln
LU
LU
ID
to
to
ro
ID
UJ
3
h-l
00
3
to
LU
to
ro
ro
10
Ln
00
cn
ro
00
NJ
to
f i
is
3
P
to
to
to
Ln
CO
h-l
3
ro
ro
to
ro
to
LU
ID
3
3
CO
h-l
f k
p
i - l
ro
f i
i - l
f i
00
p
NJ
00
cn
Ln
f i
LU
LU
NJ
3
Ln
to
00
Ln
LU
01
3
to
00
g
LU
10
f i
ro
3
v l
bo
f i
Ln
v j
ro
CO
LU
ID
v l
3
LU
to
to
f i
f i
P
Ln
to
00
t-1
3
UJ
v l
VI
to
to
01
CO
CTl
f i
LU
to
ro
-vl
to
cn
ro
00
v l
f i
00
01
p
to
LU
LU
to
s
Ln
LU
to
v l
o
Ln
00
00
cn
NJ
to
to
3
ro
to
Ln
cn
3
to
to
to
v l
h-l
LD
Ln
Ln
to
o
h-l
LO
to
Vl
cn
Nl
ro
P
3
P
o
ro
P
3
Ln
ro
v l
h-l
Ln
Ln
LU
3
h-l
f i
cn
ID
00
P
LO
f i
Ln
3
NJ
v j
CO
f i
h-k
to
f i
01
00
NJ
v j
ca
LU
NJ
NJ
to
CO
to
f i
CTI
to
f i
cn
to
cn
00
t-1
LO
CO
ro
ro
p
ro
H-l
Lu
3
f i
cn
ro
cn
cn
V j
3
ro
ro
to
to
TC
ro
<
TJ
>
CL
CL
cn
v l
to
8
to
Ln
>
2
en
NJ
f i
3
to
01
UJ
3
to
Ul
f i
v l
to
cn
3
LO
h-l
to
Lu
3
-CT
Ln
to
to
3
LD
Ln
ro
CT
2
to
^
to
to
f i
h-l
TJ
2
ID
Q
2
Ln
00
3
LD
v j
id UJ
LU
>
2
f i
Ln
Ln
00
f i
Ln
ro
LU
Ln
f k
Ln
cn
>
2
01
3
ID
v l
b
UJ
to
3
LO
ro
cn
v ^
3
to
LU
b
h-l
CT
2
ro
cn
3
ID
ro
LU
fk
UJ
UJ
00
>
2
3
to
>
2
ro
to
3
ID
ro
f k
3
to
f i
LU
o
tu
UJ UJ LU to LU LU LU UU LU ro to to to to NJ h-l NJ h-l LU LU NJ
o v j VI LU UJ v l 00 v l v l v j v l 00 CO v l v l OO 00 00 00 Ln Ln Ln Ln Ln Ln 00 v l vl v l Ln H-l 3 3 LU
LU UJ LU to 3 Ln i n LU Ul f k LU UJ Ln Ln Ln Ln Ln Ln 3 cn UJ LU LU UJ LU Ln UJ LU cn LU 00 LU LU LU
Ln Ln Ol 00 to vl 00 Ln Ln h-l vl LD VI f i 00 vl v l
v j 00 ro Ln Ln Ln H-l h-l 00 f k v l 00 01 LD VJ Ln Ln
NJ 3 CO to to LU NJ t o 3 f i NJ vl 00 ID Ln to 00 00 cn 3 LO 10 00 CTl cn 00
cn
CO ro f i
CO
f i LU to
o
f i to f i to 3 to UJ VI f i LU 3 00 NJ 00 h-l f i f i CO to vl o ID LO to f i Ln LO Ln f i LD ro UJ
cn
f i cn cn Ln
h-l LU 3 f i O 00 LO UJ
cn
f i Ln
en
Ul to to Ln v l UJ f i Ln UJ
cn
H-l ID 00 to Ln to ID
cn
ro ro to t o ro ro NJ NJ ro to NJ ro NJ ro to to ro ro ro ro NJ to to ro t o to t o ro t o NJ to to to to
ro ro ro t o to to ro to NJ to to ro to to to to t o NJ to ro to NJ to ro to to NJ ro ro NJ NJ to to NJ
In
Ln Ln
f i j i f i f i j i f i j i f i f i f i f i f i f i j i j i f i f i f i f i f i j i f k f i j i f i f k j i f i f i f i f i
h-l i - l i - l
p
v l
cn
p
Ln
p
Ln
p
f i
p VI vl
to to to ro to to to ro ro ro to NJ ro ro to to HI h-l h-l
to 00 00 f i f i
P P P
p t u LU 00 00 CO 00 00 00 00 00 00 00 00 00 00 00 00 00 Ln Ln Ln
P p
i - l
00 00
p
v l to f k f k f i
p
to
H-l h-l to NJ ro ro to ro to ro to ro ro to ro ro to to
h-l H-l h-l
H I
P en p P P P
O h-l f i f i f i f i f i f i f i f i f i f k f i f i ro ro t o NJ
P P p
O
LD ID Ln Ln 00 LD LU H I h-l h-l h-l
ro
v j 00
en
Ln to LD LO
en cn
h-l
LD Ln LU to UJ
to LO
to Ln
h-l
LU h-l H-l h-k h-l H-l
Ol
to
LU LU LD CO LU LU LU UJ UJ f i LU f k UJ LU UJ to to to to to h-k h-l LU UJ f i CTl Ln Ln
Vs f k f i
.
v ^ to to Vv h-l
Ln
LO
H I H I
10 h-l to
h-l h-l h-l
to NJ Ln
h-l
to h-l h-l HI to NJ h-l h-l h-l VI h-l
ro ro
h-l
00 to to
00 CO LO 00 Ol 00 00 Ln
h-l
Ln Ln Ln Ln Ln f i to h-l h-l Hk LO ID
Vs
00 3 UJ to
v.
3 3
'
3 3
^ ' \
3 3 3
3 3 00 3 to
o
h-l
3 3 3 3 to h-l 3
oo
h-l H I H I
o
3
o
3 3 3 3 00 O O 3 00 00 3 3
o
00 CO
h-l
LD
h-l
00
o
00 00 00 00 H-l
o
00
h-l 3 3 3 to 00 00 00 00 00 00 00 00 00 LD ID CO
LU h-l to Ln to to to LU h-l
cn cn
ro ro LU 3 to h-l Hk h-l v j 00 00 00 -vl
cn
O 10
f k ro h-l
fo
LU
cn
J i
ro LU LU Ln LU 3 f i f k f i 3 f i 3 3 3 f i Ln LU LU h-l H I f l f i H I 3 Ln f i to UU LU f i to f i Ln f i
h-l
3 3 h-l h-l NJ f i f i
A Ln v l 10 Vsl 00 UU 3 f i h-l v l LU Ln to
en
3
cn
Ln 00 Ln 00 LU h-l Ol to 3
TJ TJ TJ -CT CT
> >
TJ -CT -CT
> >
TJ -o
>
TJ -CT -CT CT
> > > >
CT -0 TJ
>
TJ -CT
>
CT
> CT >
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
<
n>'
g
>
n
o
CT
3
ca.
c
n
3D
03
n 00
n
TC ,
ro 01
-o
>
CL
ca.
<
o
01
01
3
3
3^
(O
o
o
CO
vj
-vl
-vl
M
00
LU UJ LU UU LU LU LU LU LU LU UJ UJ LU LU LU UJ UJ LU LU LU UU UJ UU LU UJ UJ UJ UU U l
00 00 00 00 00 00 OO 00 00 00 00 00 00 00 00
v j
Ol Ln
f i f k f i LU LU UJ tu LU LU LU LU
Ul Ln Ln Ln Ln Ln Ln Ln
f i f i
ro NJ ro
h-l 3
h-l
00 00 00 f k f i
Ln LU UJ ro to h-l Hk 3
v l v l v l v l
V j f i LU to
00 V I v l to h-l 3 00 3 v l f i NJ to NJ 3 h-l h-l 00 3 h-l Hk
ro
00 00 00 00 00 f i 3 LU to
ro
3 to 3 Ln 01 f i 00 NJ h-l
to
f i 3
cn
h-l to
cn
LU LU ro
00 Ln f i f i
ca
LU
ro
ca
LU
to UJ v l
cn
v l 00 V l LU LD v l v l V l Ln 00 3 f k 00 H-l h-l to
f i 01
U l NJ
to to
f i f k f i
Ln
h-l h-l CO 3 LD f k 00 LU to h-l h-l LU v l
cn
Ln f i f i 3 h-l
NJ ro to NJ h-l NJ NJ to to v j NJ to to ro
ro
to to to h-l h-l h-l to to to NJ NJ NJ
ro ro
p
ro
ro
N l f i h-l
p ro
NJ
p
J i
P p
3
p
NJ NJ ro
p
A LU U l
p ro
3 IO 3
ca
CO to
io io
f k f k
v l
io io io io
p
J i
io
ro
p
to f i to
io io P
Hk h-l
io io
f i
j i Ln Ln Ln
f i
h-l
p P
00
P
00
M f k to NJ NJ
io
h-l H-l i-k to
io
p
ro
NJ H-l t-1
io
to h-l h-l to
p b b
3
p
i - l
P
P
00
P
00 Ln Ln Ln
i-k Ln
io
i - l
LU f i Ln
io
p
p
Ln to ro
H-l h-k
io i - l
h-l
P P P i - l P
00 00
p
f i
P
f i
io
f i IO f k f i i - l LD j i
p
f i
P
f i
In
to
P
i - l
In
to
f i
P
OO LU UU LU
oo
LU
U l
p
f i
P
f i
2
3
8
.
2
3
P
h-l
LD
h-l
o
to
H-l
p
f i
CO h-l
In
to
2
2
9
1
7
6
UJ LU
In
to CO
cn p p p p
in in
2
3
8
.
2
3
Ln
P bo
f k v l
io
f i
Ln
j i
In
to
2
2
9
1
7
6
p P
In
to
^ in Ln
h-l i-k t-1
Ln
00 00
2
3
8
.
2
3
NJ LD CO VI h-l
ro
VI
to
3
3 to 3
2
2
9
1
7
6
P
Vl
LU
i - l
Vl
LU
cn
h-l
Ln
h-l
Ln
H-l
Ln
cn
LU h-l H-l h-l h-l h-l H-l h-l h-l s CO 00
LU LU UU UJ
Vs
LU LU to
V s h-l h-l to NJ to h-l h-l
CO O .0 to ID LD
00
^
Hk
LU LU
V v
to
V s
v. ro
h-l Vs
ID
h-l H-l
h-l h-l h-l h-l
Ln -O Ln NJ Ln
h-l h-l
to NJ Ln
H I
LU NJ to Ln to NJ H-l 00 00 to
Ln Ln Ln Ln LO h-l Ol
V v v j
f i LD f i
>
h-l
cn
3 LU LU f k UU ID Ln
Vs h-l V.S h-l h-l
'
h-l -V
3
Vs
'
Vs
3 Vv V s 3 3 CO
H-l H-l t-k H-l 3 H-l CO 3 h-l H-l
3
h-l h-l
3 3 to 3 3 3 3 3 ID 3 CO 3 3 LD LD LO
3
o o o
H-l
3
h-l h-l
3 3
h-l 3 CO to to h-l LO to to to ID
h-l
LO to ID to
h-l h-l h-l
ro
h-l h-l h-l NJ
p
h-k
p
Ol
p
M 00 h-l
p
H I to
cn
v l U l
p p
0
H I
p p p p p p
b Ln Lu Lu f i i-i Lu id j i Ln P
f i
p j i i-i
f i
Lu P
j i LU
P b P Ln Ln id P i-i iu
v l v l f i H-l
to LU h-l LU 3 to 00 CO
cn
CO VI to
Hk
to Ln
h-l
to f i 0 Ln
H-l 01 f i
to
H-l
CT
CT CT
-CT TJ -CT -CT -CT -CT
>
TJ
>
CT -CT TJ
>
CT
>
TJ
> > >
-CT -CT -CT CT
CT
CT TJ
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
2
33
m
f-l
ca
7:
fD
<
13
^
a.
a
01
NJ to Nl
^
to to to to to NJ ro to to ro h-l h-l H-l h-l h-l LU NJ
3 3
o
CO CO 3 CO CO CO 3 3 3 3
o
LD LD LD ID 10 00 to
v l
V j
v l v l v l
v j Vsl
v l v l v l v l vJ VI
cn
VI v l Ln Ln Ln
un
00
to 00 00 00 00 VI v l v j v l v l VI 01 01
o
Ln LU Ln
f k f i v l 3
3 LO LO 00 f i 00
o
f k h-l 3 CO Ln f k LU 3 to to Ln
LU
to 00
00 f i f i
Ln
v j
LD LU Ln 01 to
H-l ID
cn
f k 3 LO to
cn
f i V j VI
UJ f i to v l to LU 3 to ID NJ H-l
o
f i LU h-l f i
to LU
cn
h-l
ca
vJ v l v l v j v l VI v l -vJ v l v l v l VI V I vj V l v l VI v l v j v j VI
NJ to
ro ro
to to
ro
NJ NJ to to
ro
NJ to
ro ro
NJ
ro ro
NJ ro
f i
f k f i f k f i f i f k f k f i f i f k f i f k J i f i f k f i f i f l f k f k
io io P P io P io io io io io P io io io io io
to
io
i - l i - l
h-k Hk h-k h-l h-l h-l h-l h-k Hk H-l h-l t-k t-1 h-l h-l h-l h-l h-l h-l to to
v j V l Vl vJ V l Vl v l V j LU 00
VI v l v l Vl v j v l VI VI vl
V s V v V l Vs
Vl
-Vs
',
V s V v V s V s Vss v ^
00 00 00 00
^
LU LU NJ to h-l h-l
00 00 00 00 00 00
^
00 00
^
Vs
v l NJ
.
Ln
Vv Vs
.
V s ^
3 CO
o
3 3 3
-Vs
3 3
o
3 3
ca
CO CO CO
^ ^
00 00 00 00
^
00
oo
CO 00 00 h-l
o
00 00 00 00 00 00 00 00 00
h-k h-l h-l h-l
00
h-l h-l
00
h-l h-l CO 00
LU LU UJ LU to H-l h-l Hk h-l NJ NJ to
ro
f i to
o
h-l NJ to UJ to
UU NJ NJ h-l f i Ln f i NJ CO Ln Ln h-l h-k U l LU LU NJ U l H-l f i
ro
00 f i f k
Ln
U l
cn
LU
NJ UJ to CO v j NJ 00 VI J i LU
cn
00 to Ln
-CT CT CT CT CT
CT CT
-0 TJ -CT 13 TJ 13 -CT TJ
>
-CT CT CT -CT CT
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
h-l
v l
v j v j
VI v l v l
v j
v l VI
o
v l v l v l
f i LU f i UU LU LU LU Ln LU
ro
f i
Ln Ln
Ln vl H-l 00 00 00 00 to 00 3 LU 3 O
to Ln 01 Ln ro to LU Ln Ol CTl LU to
cn
ro oo
Ln NJ to NJ
o
3 00 Ln NJ f i h-l
to 00 00
cn
ID 00 v l 3 h-l LO Ul 0 1 f i
ro ro to ro N l to to NJ to ro ro
ro ro
to ro to to
NJ
NJ NJ
ro
NJ NJ NJ to
ro
00
w bo bo
00
bo
CO
9
00
Ln Ln P Ln
bo
LU
iu io io
NJ
P P
i - l
in bl Ln Ln
f i O l LU f k f i f i
o o
v l f i f k
Lu
UU i - l Ln Ln Ln
p p p i-k ro io i-k
ID
h-l
P p P P
h-l
bo
h-l h-l
3 ro
f i f i f i NJ h-l
to
h-k
N l
v l J i 00 3
LU UU
LU UJ
LU UJ LU LU f k LU f i
LU Vv
V s
NJ
cn
- V f^
h-k
ro
NJ
NJ NJ NJ to
h-l
f i IO
Vs LU
H-l Ol .A
LU LU J i 3 to Vl LU
ca
"Vs
> o
O
00
o o
O
^ ^
3 00
o
O 3 00
h-l
00 00 00 00 00 00 00
h-l
00 00 00
o
h-l v l to f i f i Ln v l H-l LU f i U l h-l
LU
o
H-l Hk h-l CO
UJ UJ Ln 3 Ln f i f i
ro
o
h-l f k VI f i 01 3 f i 00 f i NJ Ol
>
CT
> >
CT
CT > > > >
CT CT
>
2 2 2 2 2 2 2 2 2 2 2 2 2
<
rt>'
g
>
n
n
CT
3
ca.
c
a
3D
03
g's
II
-CT
>
CL
CL
m
m
VI
13
01
01
3
3
3^
(O
o
o
CO
v j
- v j
vj
NJ
CD
UJ LU t u UU LU LU LU LU LU LU UU LU LU UU LU UJ LU
00 00 00 00 00 00 00 00 00 00 CO 00 00 CO 00 00 00
Ln Ln Ul Ln Ln Ln Ln
un
Ln Ln Ln Ln Ln Ln Ln
un
Ln
00 00 00 00 00 00 00 00
oo
00 v l vJ vl v l vl
o o
f k LU t o t o t o
ro
h-l 3 3 3 LD t o ID LD 00 00 00
t o vl Ln LU
ro
t o vl LO h-l 3 vl v j f i H-l ID 00 00
Ln 3 h-l 3 ID 3 LD 3 LO
cn
LD h-l Ln 01 t o
en
Ln
h-l t o t o t o t o t o h-l ro h-l t o NJ v l h-l t o
p
t o t o
LO t o t o t o t o t o LU t o f i t o
ro P
f i
LD t o
P
f i
t o
ro
ID
ro t o t o Nl f i
p
io
00
i - l io
P
f i p f k
P
f i j i ro
In
p
h-l
bo
h-l h-l
p
i - l 3
p
Ln h-l
P
p
LU
p
P
h-l HI In
p
P
Ln i - l
p
i - l
P
i - l
P
p
p
LU p P P
p p f i
cn
f i f i VI h-l 00 f i f k
p
p
f i
t o h-l
3
01
i - l
f i
cn
i - l
P P
LU
p
p
h-l
P P
h-l
p
f i
LO
v j
3
01
f i
f i
cn VJ Vl t o
LU
p
00
00
i - l
f k
h-l
oo
P
Ln
j i h-l VI
ca
io
h-l
00
3
00
i - l
f k
cn
h-l
3
io
h-l
f i
LU
LU UJ LU
"Vs - v LU UJ LU LU LU LU LU LU LU LU LU UJ UU UJ
h-l HI HI
^ .
cn cn cn
h-l h-l h-l h-l h-l h-l h-l h-l h-l H-l h-l h-l H-l h-l
' '
01 Ol
cn
CTl
cn cn
Ln Ln Ln Ln Ln Ln Ln Ln
3 3 3 h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l h-l H-l h-l HI
h-l H-l h-l O
3 3 3 3 3 3 3 3 CO 3
ca
3 3
Hk h-l 3
p p
to
y?
00 Vj
f i LU LU LU
p
p
t o t o
j i
b b
Ln Ln fi i-i p
P b
j i f i
i - l
Ln Hk
b b
t o h-l f k Ln f i f i 00 LU t o
ro
v l
ro
t-1 3 t o VI v l
> > > > > > > > >
T3 13 TJ CT T3 TJ CT CT
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
3D
fO
n
Q
ca.
TC
fD
<
TJ
>
CL
ca.
o
01
UJ UU ro t o t o t o t o NJ NJ NJ ro t o t o ro NJ 10 NJ
00 00 vl f i UJ 3 3 3 3 3 CO 3 CO 3 CO CO CO
Ln f k
o
t o 3 OO 00 00 00 00 v l v j v l v l v l v j v l
o
vl f i Vj LO 00 00 t o 3 3 t o ID LO
ua
LO 10
to
00 t o h-l Ln LU LO vl h-l 00 3 LU LU NJ t o h-k h-k CO
LO t o ID HI
cn
t o t o
cn
NJ
ro
Ln t o LU t o 00 CO t o
t o Ln f k Ln Ln f i 3 t o 00 h-l i n
ro
LU Ln
vl
Hk
oo
v j v l
p
v l
p
v l v l
vl
p p
v j v l
0
v l v l v l v j
P
t o
P P
p p
P P
p
M
P
t o
P
p io io io
f i f i f i f k f k f i f k f i f i f i f k f i f i f i f i f i f i
ro
t o NJ t o t o t o f o t o t o NJ t o t o
ro
t o NJ NJ N l
h-l h-l h-l h-l h-l H-l h-l h-l h-l h-l h-l h-l h-l h-l Hk Hk Hk
h-l
O 00
UJ t o t o vl
vl
V l
'.
h-l
.
v j v j VI v l v l vj v j V l v l
h-l
ro
h-l v j 00 h-l h-l H-l
Vv v ^
Ul
cn
LD f i f i
o
LO t o 00
^
00 00 00 00 00
v. O
o .
V. ^
. h-l HI O 00 00 3
O
3 3 3 3 3 3 3
CO CO
CO
o
3 t o
h-l h-l
00 00 00 00 00 00 CO 00 00 00 00 00
ro
t o Ln h-l h-l
cn
LU LD
ro
00 00
vl Ln Ln
f i LU LU
h-l Ln Hk LU LU UJ f k un f i Ln HI h-l f i t o Ln f i f i
NJ
ro
3 00
cn
VI LO LU h-l 10 HI HI UU f i
CO
LU h-k
CT
>
CT
> >
TJ CT
>
TJ
>
TJ CT CT TJ CT CT 13
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
^
ru
g
>
n
n
-CT
3
CL
c
3D
05
? g
n
O
I i
T3
>
ca.
CL
O
01
Prosecution Exhibit 6^
l^pages
classitied
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust201^
stored in the classitied
supplement to the original
Record ofTrial
Prosecution Exhibit 66
ICE^
classiHed
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classi^ed
supplement to the original
Record ofTrial
ProsecutionExhibit67
Ipage
classi^ed
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classitied
supplementto the original
Record ofTrial
Prosecution Exhibit 6^
ICJ^
classifed
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust201^
stored in the classitied
supplement to the original
Record ofTrial
Z9PJ.Z900 geujuuBiAi
Z O
2%
i n h-k
P o
o =
CQ
-^d
(D
"0
73
o
o o
tn m
O ^
Tl
-n
Tl m
' S
o
J
o
m
C/3
n
c
d
o
z
m
2
H
2?
^1
D ^
o
&5
o'
3
T
<D
O
@
UNITED STATES OF AMERI CA
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
Mr . Stephen Buchanan
3 June 2013
It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that i f Mr . Stephen
Buchanan were present to testify during the merits and pre-sentencing phases of this court-martial, he
would testify substantially as follows:
1. I work as a contractor for the National Security Agency (NSA). I provide support to Intelink.
Intelink is a software suite operating on U.S. Government private networks which provides Internet-like
services to enable collaboration between intelligence agencies within the U.S. Govemment. Primarily,
it includes a web-based search engine of UNCLASSIFIED, SECRET, and TOP SECRET information
systems. It hosts blogs and allows for messaging, sharing files, and searching for UNCLASSIFIED,
SECRET, and TOP SECRET information across agencies, to include Intellipedia for online
collaboration and Passport account management. In my current position, I provide security for Intelink
and serve as the Information Assurance (IA) Manager. This means that I make sure the systems work as
they were intended. I work to ensure the systems are properly maintained and guard against their
misuse. I have worked in this role for five years,
2. Prior to holding my current position, from 1999-2008,1 was an Information System Security
Engineer for Intelink. In this position, I made sure the systems were built correctly to perform their
intended connection, search, and storage functions. Before that, I worked in systems support within the
Intelligence Community (IC). In total, I have worked in the IA industry supporting different agencies in
the IC since 1985.
3. I have two primary IA and information systems certifications. First, I am a Certified Information
Systems Security Professional (CISSP). This means I have heightened experience in and knowledge of
information security. CISSP is a globally recognized standard of achievement that confirms an
individual's knowledge in the field of information security. The training covers all parts of information
security, including personal and building security aspects. CISSP indicates that an individual has
attained specialized knowledge in the field of IA in accordance with standards articulated in Department
ofDefense Directive 8570. In addition to CISSP, I also have the Information Technology Infrastructure
Library (ITIL) Foundation certification. ITIL is the most widely adopted framework for IT Service
Management in the world. ITIL provides a framework on technology systems management, particularly
on how to build information management systems and manage them with a specific process.
4. In my role as IA Manager for Intelink, I am familiar with the audit logs created by Intelink. The
Intelink system obtains, manages, and stores its own audit data through the course of its day-to-day
operations. This data can be used to respond to user inquiries, troubleshoot technical problems, and
monitor and maintain Intelink usage and performance. These logs are created anytime anyone makes a
connection with a computer system. The system detects these connections from servers - tracking the
workstation making the request of the system, how the request routes through the system, and where the
request ultimately gets the information. These connection logs are made in real time and stored in data
^
PROSECUTION EXHIBIT l^f for idplfification
PAGEOFFERED: PAGE ADMITTED:
PAGE 1 OfH PAGES
files every hour. They are computer-generated and onlyavery limited number people have access to
them.
5. Intelink logs contain audit data captured from proxy servers that control access to Intelink services
and show the activities ofusers and systems that connect to and use the Intelink services while on
classified or unclassified networks, ^eknow the Intelink audit logs are accurate for several reasons.
First, they write toasecure server. Second, only limited personnel have access to them. Third, they are
reviewed by our team at least onaweekly basis to ensure that the reporting process is occurring
properly^meaning to ensure that the log data is being written properly. The log data is useful to us
because it shows us how our services are being used,whether Intelink services are functioning properly,
and whether adjustments should be made, ^ecan also use the data to solve technical issues, determine
security risks, and review data trends that help us develop our management strategies, ^ecant el l i f
there are errors because information the logs normally collect would be missing. Ifadata file had been
corrupted while being written it would not open. Missing or corrupt data files are regenerated from the
system. So, in short, the data these system logs have captured is complete and accurate.
^. l am involved in this case because we receivedarequest to pull Intelink audit logs given Intelink
could have been used to gather information that was ultimately compromised. Atthattime,wedidnot
track users by login identifiers: instead,we tracked usage by IP address. One ofthe log data requests
was for the Secure Internet Protocol Routing Network (SIPRNET) IP addresses 22.225.41.22 and
22.225.41.40 from October 2009 to .lune 2010. Intelinkauditlogsare stored onaLinux-based system.
Topull the requested log,IperformedaLinux search on the server. This means thatlissuedaline
command telling the server what informationlwanted to read, ^hen the system returns the data, the
system writes the data toafile. In reviewing the files retumed,Icould find no relevant information in
the data files for October 2009 or .lune 2010. I^owever, there was activity recorded for the relevant IP
addresses for the months November 2009 through and including May2010. Idouble checked to make
sure there was no activity from the relevant IP addresses during October 2009 and then ran the search
again to verity results. The results ofthe second search matched the results ofmy original search. The
results are saved automatically asa.txt file so that they are readable to the person running the query,
^henlreceived the response to my IP^datequery,Iopened the file to make sure it was readable and
that all the data had been reported properly. Idid not alter the file in any way. Ibumed the file toaCD
and then turned it over to Special Agent Mark Mander with Army CID. These logs are on the CD
marked Prosecution E^hihit(PE)^l for identification. The filenamesofthe Intelink logs thatI
attested to showing activity for IP address 22.225.41.22 are the following: .IFIO 22.log:
MB^MIO 22.t^t: and ND09 22.log. The filenamesofthe Intelink logs thatlattested to showing ac^tivity
for IP address 22.225.41.40 are the following: .IFI0 40.log: MAMI0 40txt:ND09 40.1og.The file
^^.IFIO 22.log''contains audit logs capturing activity for the 22,225.41.22 IP address in .lanuary and
February 20I0.The file ^^MAMI0 22.txt" contains audit logs capturing activity forthe 22,225.41 22 IP
address in March, April,and May 2010. The file ^^ND09 22.log"contains audit logs capturing activity
for the 22.225.41.22 IP address in November and December 2009. lused the same filename structure to
capture the contents ofthe audit logs associated with the 22.225.41.40 IP address.
7. The particular log datalcaptured reported several things. I wi l l use the following discrete line of
data to show,by way of example,what the Intelink logs mean:
22 225 4140--^29^ov^2009:04:50:10^0000^^^GET
^intelinkwipismcsgovgov^^ebResourceaxd7d^az7kDRRcqClt^13zGP21n02c^t^^33^2775^757031
2501^TTP^1L^200^^^5
^^http:^^wv^.intelink.sgov.gov^search^default.aspx7q^hqda^^
^^Mozilla^50^20(^indows:^20U:^20^indows^20NT^2051:^20en-
US:^20rv:I9I2)^20Gecko^20090729^20Firefox^352^^^^B^
8. The significance ofthe above line that was pulled from Intelink is the following:
(a) The ^^22.225.41.40" is the IP address. This indicates thatacomputer with that IP address
made the request for information. Essentially,it provides an electronic location for the user using
Intelink.
(b) The ^^29^ov^2009:04:50:10^0000"isthedate^time group The time zone is refiectedasthe
offset from Greenwich MeanTime(GMT). In this case,^^^0000" shows no offset.
(c) Thenextentryisthe action the user took. In this case,tor example, you see ^^GET". This
command indicates the user is seeking particular information on SIPRNET through Intelink. This action
refiects the user clicking on something in the website.
(d) The next entry is the page being requested by the action above. Flere, it is
^^^intelinkwipismcsgovgov^^ebResourceaxd7d^az7kDRRcqCltV13zGP21n02t^t^^33^2775^75703
1250 F1TTP^1.1'^^. Intelink.wip.ismc.sgov.gov is the registered name for Intelink,which is on the
SIPRNET,asecret government system.
(e) The code of numbers after the information tells you whether the user'srequest was
successful and to what degree. For example, the code ^^200" after particular information indicates that
an intemet home page (HTTP) was successfully accessed.
(t) The ^^^^^5" is the size in bytes ofthe information retumed by the query.
(g) The entry ^^http:^^v^^ww.intelink.sgov.govi^search^default.aspx7q^hqda^^ tells me that the user
searched for the term ^^hqda"on intelink.sgov.gov. ^^www.intelink.sgov.gov" is the SIPRNET internet
address for the secret govemment system on which Intelink sits. In this entry,^^search" is the specific
Intelink service used and ^^q^hqda" represents the search query entered into the search box on the
Intelink webpage on the specific computer v^ith the IP address listed above.
(h) The entr^^^Mo^illa^^.O" tells me that the user of the SIPRNLTc^omputer with an IP address
of^^22,225.41.40" was using version5of the Mozilla internet browser. Mozilla isacompany that
produced intemet browser software similar to Microsoft Intemet Explorer or Apple Safari.
(i) Theentry^^^20"representsaspace inthe line.
(^) The entry ^^(^indows:^20U:^20^indows^20NT^205 1:^20en-US:20rv:I 91^) " tells
me the user of the SIPRNETcomputer with an IP address of^^22.225.41.40" was usinga^indows NT
workstation computer.
(k)Theentry^^^20Gecko^20090729^20Firefox^352^^^^B^" tells me thatthe userofthe
SIPRNETcomputer with an IP address of^^22.225.41.40"wasusingaversion of the Firefox intemet
browser,version number ^^3.5.2". Firefox is the specific name ofthe intemet web brov^ser program
produced by the Mozilla company.
9. These Intelink logs only audit vBhat happens on the Intelink systems. So, they can only tell you what
aparticular user IP address was doing when connecting with the Intelink system. It would reveal
Intellipedia searches and other ways the user IP address used Intelink services by showing what files
within Intelink that IP address accessed. At the time, users were not required to have Intelink Passport
accounts to use most Intelink services, including the SIPRNET intemet search and browsing. A
SIPRNET Intelink Passport account isausemame and password account established to allow access to
some govemment websites. It is one ofthe many applications Intelink uses on its own internal systems
to track whatauser accesses. Auser would need an account ifhe wanted to contribute to Intelink
services or access certain websites or databases on SIPRNET,butnot^ust to conduct searches. To
create an account,auser would have to be on the SIPRNET,go to the account creation page,and insert
personal information such as name, contact, and organizational information. The user is then notified
via SlPRNETemailwithacode to use the first time he accesses the site. Other govemment
organizations with websites and databases on SIPRNET,use SIPRNET Intelink Passport accounts to
verify users before any user may access their information on SIPRNET.
10. Our Intelink organization maintains and stores the Intelink Passport account profiles of registered
Intelink users. In response toarequest by Army CID,Ilooked Bradley Manning up in our system.
Someone with the name ^^Manning, Bradley E"did have an account. The user name ofthe individual
was ^^bradley.e.manning". According to the user account,^^bradley.e.manning" was in the military,his
pay grade wasE4,and used an email address of^^bradley.manning^^us.army.smil.mil". The username
is automatically generated based on the common name which is entered by the individual setting up the
account. The user information includes each identifying factor(such as name, contact information,
security questions and answers)that the user inputted into the system at the time of account creation.
According to the Passport Account, the last time that the user logged in was 27April2010at1805:4^
^ulutime. According to the Passport Account, the registration date wasIIOctober 2008. The Passport
Account information is marked as PE ^2 for identification.
11. Isigned an attestation on 22 .lune 2012(BATESNumber:00505257)attestingto the authenticity of
the what have been marked as PE^landPE ^2 for identification and are the provided logs and the
Intelink Passport account information for ^^bradley.e.manning",contained in the file ^^manning.ldif.
L ^ ^ f W t ^ ^ .
n r \ i r \ \ i i \ c i i i i n i c \ /
ANGEL M. J OVERGAARD THOMAS HURLEY ^ BRAD
CPT, JA C/ MAJ, JA PFC, USA
Assistant Trial Counsel Defense Counsel Accused
UNITEDSTATESOF AMERICA
Manning, Bradley E^
PFCU.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer, Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
Mr.PeterArtale
^Jnne2013
^ttsh^r^l^y agreed l:^yth^Accits^d^D^f^n^^Gotms^l,andTrtalCoLtns^I, that tfMr.Pet^r
Artale were pr^^^nt to t^stttydt:irrng the r^ertt^ and pre-sentenctt^g phases ofthis coi^rt^rnarti^^^
he wot^ld testify si^bstantially as follows:
1. Ian:^cTtrrentIy employed l^y the Army Coitnter-Ir^telligence Center (AC^C) with the 902d
Mihtary Intelligence GroTiponFort Meade, Maryland. ACIC prodttces finished intelligence
products for the intelligence community. It often produces these prodi^ctshyfi^lfillingreqi^ests
torinfortT^ationfron^theArt^y. It takes finished products and dissert^inatesthen^ on SIPRNET
andJ^ICS. l ama^eh Developer and theTeam Lead ofateamoftl^ee software developers. I
ha^e worked in this capacity and fi:^r ACIC fi:^r eight years. Prior to this position,Iworked in
weh development tor the Defense Intelligence Agency (DIA)ft^r one year, then with Booz Allen
onaone year contract with National Geo-SpatialAgency.Iwasasoftware development
engineer and programmer in the Air Force tor twenty-one years. Iretired from the Air Force asa
Master Sergeant. lalso ha^e an Associate^sdegree in Computer Science.
2. Ifirst hecamein^ol^ed in this case on approximateIy17March2010after my Branch Chief,
Ms.Jessica Joht:^son, alerted me to the compromise ofU.S.Government information. Ms.
Johnson asked ifIcotrIdt:tseot:ir system to see who had ^iewedacertainprodTict. IcoTtId,asI
had de^elo^edcnstom software to track access to particrrlar products. This software captures the
viewer credentials hy recording the Internet Protocol (IP) address and date^time of access for
each user who ^iewsot^rACICworkprodt:ict. It then assignsai^niqi^e report key to the access
e^ent. This occi^rredhefore we were contacted hy law enforcement in this case, asACIC was
notified ofthe compromise ofoneofottrprodttcts in March 2010.
3. An IP address is part oftheTransmission Control ProtocoI^Intemet Protocol (TCP/IP). A
protocol is the standard langrrage^sed to communicate o^eranetwork. TCP/IP is the most
common ^^langnage" that computers Ltse to communicate overthe Intemet. And so, an IP address
is the method ofidentityingaspecific computer onanetwork. Onlyonecomprrtercanbe
assignedaspecific IP address at one time. I^owing an IP address allows tts to k^ow which
computer onagi^en network nsed our prodi^cts. Oi.ir software isac^stom product which, in
capti^ring this nser and access information, produces metrics which can he ^sed to see which of
oi^r products are most popniar and how o^rprodi^cts are ^sed. The software only logged views
ofthe document in the ^^.asp"tormat which is the standard way the prodLtctwot^Id appear on the
wehsite. asp" isacommon file tormat for web pages. This means that the software only
logged ^iews of the web version ofthe docLtment and not the ^iewsofthe^^.pdt^^or^^.doc"
version ofthe docnment. Likewise, the logs do not indicate whether the doct^ment was printed
or sa^ed^ nor do they indicate how long an indi^idnal looked at the doctrment, i f at ail. ^e
^ PR0SECUT10NEXH1B1T^(^ t or i dei ^^t i on
PAGEOFFERED: PAGEADMl ^ED:
PAOE^ PAGES
collect this data normally so we can analyze it to see where we need to allocate our development
and maintenance resources to hest support our intemal and external customers The information
produced by the tracking software is, theretore, called metrics.
4. The metrics are pnlled when an engineer runsacertainqt:iery. These qi.ieries can he
customized to p^II only the information the developer wants to see. In this case,we were
specifically interested in tracking e^ery access toaprodt^ct titled ^^^ikiLeaks.org^At:r Online
Reterence to Foreign Intelligence Services, Insurgents, orTerroristsGroi^ps7" Therefore,!
searched the prodi^ct by determining and searching tor its prodt^ct identification ni^mher,which
is^^RB080^17". The prodi^ct identification nrrmher,which is on the docirment itself and
assigned internally byACIC,isaidentifierLrniqt:te to eachACICprodi^ct.
5. ThisACICprodirct^^^ikiLeaks.org^An Online Reference to Foreign Intelligence Services,
Insurgents, orTerroristsGronps7" is honsed on our website at ^^acic.north-
inscom.army.smil.mil" and is accessible only ^iaaclassified network, sirch as SIPRNET. I
wroteacirstomqi^ery,by IP address and ^isit time, to see every time this partici^lardocirment
was polled from the weh server. Acustom query isamethodofpnIIing information fi^oma
database. Ipirlled these metrics tr^om my own workstation. The data is automatically pi^IIed into
aStr^ctnred0^^^yEang^age(SOE)tabIe. SOE isacompnter language tor extracting and
inserting information inadatabase. It isastandard computer langttage to interact with
databases. PrintontsofSOEqi^eries look like an excel spreadsheet in that it has colnmns and
rows: however, it is not as easy to search and organize as an excel spreadsheet. I , therefore,
digitally ent and pasted the information from the SOE table into an excel spreadsheet and sa^ed
the data to my desktop. Ithenorganizedthe spreadsheets intwo separate manners. The first set
is organized hy^isit date. The second is organized hy IP address and then ^isit date. Ididnot
alter the content ofthe data in any way when searching fi:or the data, moving it trom the SOE
tahle to the excel spreadsheet, or while in the ex^cel spreadsheet. Imo^edtheinfi:ormationand
organized it in two separate manners because it was easier to read. Ithen emailed the metric data
to my leadership atACIC as requested. The data is stored sectrrely on o^r servers and is only
accessihie to the other th^ee web developers on my team. Iha^e no reason to helie^e anyone
else wot:iIdha^e modified the logs in any way. This occtrrredhefore we were contacted hy
investigators in^ol-ved in this case, asACIC was notified ofthe compromise of one of ot^r
prodtrcts in March 2010.
^. In this case, theACIC document concerned was posted in 2008. Ip^lled the metric data
tracking access to this doci^menton17March 2010. The most recent access date listed in the
metric data isl^March 2010. The data retnrned included ^iew hits on the document npnntil the
morninglran the data qt^ery. The logs are hroken down by record key,IP address, and-visit
date. Specifica11y,the metrics tell me the following abont the nser IP addresses who opened the
wehsite containing the product withaprodnct identification nttmherofRB08-(^^17in the weh
page format: auser with the IP address 22.22^.41.40 opened the web page onlDecember 200^
at ^:31PM:aL^ser with the IP address 22.225.41.40 opened the weh page on 2^ December 2009
at 2:40 PM:aLtserwith the IP address 22.225.41.40 opened the weh page on1March20I0at
^:40PM:andattser with the IP address 22.225.41.22 opened the weh page on7March2010at
11:^1PM
7. The data tor these metrics is collected hyonrci:istom software automatically when someone
clicks on one ofonr links to nseoi^r ACIC work product. This system capti^res the time, date,
and IP address as well as which prodnct is being accessed and served ont to the requester, ^e
knowthis data is accnratehecatrse there is no hnman intervention into the process and becanse
-views are logged t:ising specific codes and for specific prodttcts. FinaI1y,whi1eitispossih1eto
make manttal insertions in metric data outpnt, those insertions cannot he backdated or over-
written. This means whatever ontpnt data the system produces cannot itselfhe altered.
Ft^rthermore, at the timelpt^IIed these logs,Idid not know to whom the IP addresses were
attached or the reasons for which the data was heing pulled. lhad neither the motivation nor
knowledge required to alter the docLtment. At no point prior to pulling the metric log data,whi1e
periling the information, or after securing it, didle^er alter the data in any way.
8. My Branch Chief forwarded my email with these metrics to Mr.^instonBndram,S^^ and
Chieflntormation Officer ofthe 902d MI Grotrp. Mr. Bndram forwarded the metrics to
investigators after they contacted our office. Prosecution E^hihit(PE) ^3 l^orldenti^cation is
the paper copy ofthese logs. PE ^3 for ID isaprintont ofthe complete logs thatlpniled. IpTtt
the title ^^ViewsofACICProdnctRB08^0^I7.asp" on the topofthee^ceIspreadsheet.The title
is hased on the ACIC prodnct identification numher and the fi:ormat ofthe docTtmenL On the left
side of e^ery page are the logs thatlpulled and organized by ^isit date. On the right sideof
e^ery page are the logs thatlpinlled and organized by IPAddress and then ^isit date. Ihelie^e
the intcormation on the top ofthe page (^^ViewsofACICProdnctRB08^0^17.asp": ^^Record
^ey":^^IPAddress": and ^^VisitDate"),which is the same as the title and heading information on
the spreadsheets thatlpu11ed,was automatically produced hyex^cel when the spreadsheets were
printed.
9. lam the cnstodian of the records marked as PE ^3 for ID and an employee familiar with the
marmer and process in which these records are created and maintained, hy^irttre ofmy dirties
and responsibilities. PE ^3 for ID was made at or near the time ofthe occnrrences ofthe mafters
set forth hy or from information transmitted by,people with knowledge ofthese matters. PE^3
for ID was kept in the conrseofregularlycondncted business activity. Itwastheregnlar
practiceofthe business activity to make the records. The records marked as PE ^3 for ID area
trLje,accnrate, and complete copy ofthe original documents.
^ ^ t ^ ^ ^ B ^ f ^ - ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
ANGELM^ERGAARD TffOMASffURLEY B R A D L ^ E MA N N I N ^
CPT,JA MAJ,JA PFC, USA
Assistant Trial Counsel Defense Connsel Accnsed
UNITED STATESOF AMERICA
^.
Manning, Bradley E.
PFCU.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer, Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
Mr.SeanChamherlin
^ June 2013
It is hereby agreed hy the Accused, Defense Connsel,andTrial Cottnsel, that i fMr, Sean
Chamherlin were present to testify dt^ring the merits and pre-sentencing phases ofthis courts
martial, he would testify st^hstantially as follows:
I.lamaSystems Administrator for the S^ shop ofthe 902d Military Intelligence (MI) Grottp on
Fort Meade, Maryland, The 902d MI Gronp performs counterintelligence functions. My section
is responsible for providing ITsupport tor all unit servers,In this capacity,Ihttild new servers
and maintain old ones. lhave worked in this capacity for ten years. Before thatlwas active
dTity military for nine years and wasaStaff Sergeant whenlleft the Army. For the last fi^e of
my nine years of active duty ser^ice,Ihad the Military Occupational Specialty (MOS) 33^,
which is Intercept Electronic^arfare Systems Repair. Inthatcapacity,Iwasasystems
administrator. Tofulfill my current tnnction,Iha^e received SecLirity Plus training and ha^e
certifications in nnmerons Microsoft server types. lalso holdaBachelor'sdegree in Information
Systems from the University ofPhoenix.
2. Ifirst became in^ol^ed in the present case in JTtIyof2011when my supervisor Mr. Robert
Conner, the Site Lead for InformationTechnology at the 902d MI Gronp, requested thatlpull
Microsoft Internet Inti:^rmation Services (MllS)weh server audit e^ent logs for the contacting IP
addresses 22 225,41.22 and 22 225.41 40 between thedates November 2009 and May 2010.
MIIS are application logs that are specific to the web ser-^er. Audit logs arearecord of the
activity that occnrs on the server and enahle system administrators like me to track what ^sers do
on the wehsite. Andit logs contain data that is ai.itomatica1Iy written to them onadaily basis.
Flere, the at.idit logs record file activity onaweb server from the United States Government
computer assigned to the IP address199.32.48 154,isacompi.iter dedicated to processing
classified information at the SECRET le^el. This is the IP address for theACIC wehsite on
SIPRNET
3. This data shows what IP addresses accessed onr system within that date range. An IP address
is part oftheTransmission Control ProtocoI^Intemet Protocol (TCP/IP). Aprotocolisthe
standard language used to communicate o^eranetwork. TCP/IP is the most common
^^langt^age" that compt^tersttse to commnnicate overthe Intemet. An IP address is the method of
identityingaspecific computeronanetwork.
4. An IP address allows t^s to know which computer onagi^en network accessed onrser-^er. In
this case,Ipnlled eighteen log files for the abo-^e IP address and date range. The files are named
the following: ex0911191og:ex0912011og:ex0912141og:ex0912171og:ex0912211og:
ex0912291og:ex1002071og:ex1002091og:ex100211 1og:ex100214 1og:ex1003011og:
/ ^ ^
PROSECUTION EXHIBIT 1 ( for identification
PAGE ADMITTED: PAGE OFFERED:^
PAGE 1 O F l PAGES
ex100302 1og:ex100308 Iog:ex100315 Iog:ex10031^ Iog:exI003171og, which isthe
automatic naming contention ofMicrosoft based on date. The files display in text format. The
files contain 8^ entries fcir the IP addressof22.225.41.22 and 28 entries for the IP address of ^^^
22 225 41 40 The firstentryfor 22225 41 22 or 22 225 41 40i sI9November^^^^^^^^^
5. These logs are on our external wehser^er,which is one ofthe ser^erslamresponsihle for
maintaining. The weh server and the logs are located in what is commonly referred to as the
^^DM^",which is the area between our intemal system and the SIPRNET. Ipulled the data using
asearch window and searching the IP address for the gi^en date range. Thenlsearchedtorthe
two requested IP addresses. Ithen put the files into an intemal investigation folder and had them
humedtoadisc. Ilooked at the disc to verify that they were the logs thatlpnlled.
^. lam familiar with these logs because of my work asasystems administrator. Afterlpnlled
the logs,they were ht^medontoarewritable disc by another individual. Ireviewed the contents
ofthe disc to ensure it contained the logs thatlpulled. The disc labeled ^^Log Files 902^^ MI
2011^000^" contain the logs thatlpulled. Prosecution E^hihit^^ for Identification isacopy
ofthis disc. lattested to the authenticity ofthese logs on2I June 2012(BATESni^mher:
00449439). Ipulled the logs from the server and did not alter the content ofthe logs in any way.
lhave no reason to believe anyone else would ha^e modified the logs in any way while they are
on the server as permissions to the ^^DM^" are very limited.
^ ^ ^ ^ ^ ^ ^ i ^ ^ i ^ ^ B ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
ANGELM O^RGAARD THOMAS HURLEY B R ADL ^ ^ MANN^ ^ ^
CPT,JA MAJ,JA PFC, USA
AssistantTrial Counsel Defense Counsel AccLtsed
UNITED STATES OF AMERICA
Manning, Bradley E.
PFCU.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
SAJohnWilhur
^ June 2013
It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that ifSpecial
Agent John^ilhnr were present to testify dnring the merits and pre-sentencing phases of this
court-martial, he would testify suhstantially as follows:
1. lam currently the senior Special Agent (SA)at the computer forensic unit in the office of the
Special Inspector General for theTroubled Asset ReliefProgram(TARP) at theTreasury
Department. In this position,Icollect and examine digital e-^idence to support criminal
investigations. Iha^e held this position since January of20I2. Pre^iously,IwasanSAforthe
Department ofthe Army'sCriminal Investigation Command(CID), Computer Crimes and
In^estigati-^eUnit(CCIU). Iheld that position from June of20I0to January of2012. Asa
CCIU SA,Iinvestigated the unauthorized exfiltration of classified and sensitive data and the loss
ofpersonally identifiable information (PII) data worldwide. lalso investigated intrt^sions into
Army computer systems. Icnrrentlyha^eo^er twenty years oflaw enforcement experience,
fifteen ofwhich have been primarily devoted to conducting complex criminal and administrative
cyher^related investigations.
2. Iha^e had snhstantial training to qualify me tor my position. Ireceived Department ofState
law enforcement training in 2005, CID law enforcement training in 2002, and Police Officer
training in 1990. In addition to the evidence-handling training included in these conrses,Ialso
attended the ^^Advanced Crime Scene Investigations" course at the Federal Law Enforcement
Training Center in Glynco,Georgia (May2008). At the time of my involvement in this
investigation, my cyber security and forensic evidence experience was extensive. Among other
cot^rses,Ihad attended multiple coLirses put on by Guidance Software, the makers of the EnCase
forensic tooLlhadatter^ded the ^^Sei^ed Computer Evidence Recovery Specialist Certification
Co^rse"(Octoher2001)at the Federal Law EnforcementTraining Center: andlhad attended
^^FT210,^indows Forensic Examinations" throt^gh the DefenseCyberlnvestigationsTraining
Academy (DCITA). Further,Ihad obtained training in: ^^LawEntorcementTechno1ogy"(ApriI
2002)through the University ofPittsburgh:^^Advanced Data Recovery" (March 2001)and
^^Basic Data Recovery" (Jannary2000)at the National ^hite Collar Crime Center: ^^Operational
Information Secnrityland I I " (July2000)at the Defense Information SecurityAgency: and
^^Computer Search and Seizt^re" (June 2000)through the FBI Academy. lhave continued to
develop my skills and expertise. lhave attended training in ^^^indows^Forensics" at Access
Data (December 2010), the ^^Computer Incident ResponseCourse" (April 2011)andacourse on
^^Introduction to Networks and Computer Hardware" (December 2010)through DCITA.
3. My role in this case was to assist in witness interviewing and data collection. Icollected
evidence from the United States Central Command (USCENTCOM) server and from the
PROSECUTION EXHIBIT 1 1 for i ^ t i ^ a f i o n
PAGE OFFERED: PAGE ADMITTED:
PAGE I OFJL PAGES
Department ofState (DoS) server. In collecting the USCENTCOM materials,Iworked with Mr.
Jacob Grant to collect both the server logs as well as information fromaparticular folder.
4. ^hen collecting and handling evidence,Ifollow several general procedi^res. After collection,
Ireview the evidence property ctrstodydoct^ment for the appropriate information. Ifillontthe
date^time^placeofcollection and descrihe the evidence collected. Irecord, for example,serial
mtmbers, markings tor identification, and condition description matching the associated
evidence. Frrrther,Iensi.ire that the necessary information, si.ich as date and time, are properly
and accurately recorded. Lastly,Imaintain secure cnstody of the ev^idence prior to transferring it
to another individual. In addition to following these procedures,when transferring to or
receiving evidence from another person,Iam also sure to properly sign,date,and note the reason
for the transfer.
5. FromtheUSCENTCOMserv^er, Mr. Grant andlcollected information fi-om the
USCENTCOM SharePoint site as well as the at^dit logs which track access to the site. Iwas
interested in this information so that inv^estigators could compare compromised information
regarding the Farah investigation to information on the USCENTCOM server, and so that
investigators cot^Id identify computers which were used to retriev^e potentially compromised
material. Befi:ore Mr. Grant orlcould accessed, imaged, searched for, or extracted any
information,we needed special authorization from MG Jones,Chief ofStaff, USCENTCOM.
CCIU forwardedaformal written request throLjgh the Office ofthe Staff Judge Advocate to the
USCENTOMJ-^reqi^esting release ofthis ev^idenceon9August 2010. This request was
approved on19AugList 2010. The same day,Iworked with Mr. Grant to prepare for evidence
collection by getting in order the equipment we would need for collection. Mr. Grant ensured
that the laptop, hard drive, and cables we would need were clean of any data and ready for tise.
^. The following day,Mr. Grant collected from theJ^shopaDVD containing the audit logs for
the USCENTCOM SharePoint server. The logs show,among other things, the date^time
USCENTCOM doci^ments were accessed on the SharePoint server, from Decemher 2009 Ltntil
At^gnst2010. On 20 August 2010, he signed that e-^idence over to me. Itook possession ttsing
the evidence handling proceduresldescribe herein including, bnt not limited to,documenting it
on an Ev^idence Property Custody DocumentDAForm4137 (labeled as doci^ment number (DN)
122^10(BATESnLimher: 00411111). Later that same day,IproperIy signed that evidence over
to the CCIU Evidence Custodian, Ms.Tamara Mairena. AtnopointdidlaltertheDVDorits
contents. lhave no reason to helieve it suffered damage or contamination in any way.
7. In addition to collecting the logs,Iworked further with Mr. Grant to access and collect
information from the USCENTCOM SharePoint collaboration space on the USCENTCOM
server. SharePoint isatool produced by the Microsoft Corporation to create an intemet interface
which allows users with access toaSIPRNETwebsite to collaborate, for example, by sharing
files. The USCENTCOM SharePoint itselfis only accessihlev^iaSIPRNET,soausermnst
access it via secLtre systems andapropersecttrity clearance. The server si^pporting it, from
which Mr. Grant pnlled the logs,is on virtital machines withinacltrster,inadata center, ona
storage area network (SAN). Only authorized USCENTCOM HeadquartersJ^personnel are
granted access to the facility. The data center is protected by badge access, cipher locks, video
sLtr-^eillance,and an access roster. This information was located on SIPRNET in theJAG folder
on the USCENTCOM SharePoint page. Mr. Grant assisted me in locating it on the system, ^e
sat at his workstation to pt^ll the folder contents, ^eknew where to focns our search based on
Mr.Grant'sSIPRNETwebpage address identifications ofthe information at isstre and because
investigators in the case had cause to suspect the charged information was housed in the
USCENTCOMJAG folder. In const^ltation with investigating forensic examiner SA Dave
Shaver,we determined the most forensically sot.ind way to collect the Farah information itself, as
well as information ahottt how it was accessible on SharePoint,was to navigate through the
series ofdigital folders to download the Farah file itself. As we navigated throngh the folder
str^ctt^re on the SharePoint ser^er,we took screenshots ofthe contents of each folder, hefore we
entered the snbsequent folder. Ascreenshot is the process of obtainingadigital copy of the
computer screen, similar toaphotograph.
8. Dttring the morning of20Augt^st2010,Iconnected,viaaUSBcahIe,aCCIU-issned
Voyager driiBe dock to the laptop which accessed the SharePoint serv^erviaaUSB cable. I
connecteda400GB Seagate Barracuda, SATAhard drive (Serial Nnmher:3NFODYJ1)to the
laptop using the drive dock and assigned that drive the letter ^^X^^. Using Microsoft's Intemet
ExpIorer,Inavigated to the SIPRNETwehpage^^v^^ww.nonrel.cie.centcom.smil.mil". From this
screen,IcIickedonthe^^Organization"link. Icreatedascreencaptnreofthispageandsav^edit
inafolder in the Desktop Directory called ^^screen shots". From this screen,Iclicked on the
^^SpecialStaff^^link, Icreatedascreencaptnre ofthis page and saved it in the ^^screen shots"
folder. From this screen,Iclicked on the ^^Judge Advocate" link. Icreatedascreencaptnreof
this page and sav^ed it in the ^^screen shots" folder. From this screen,lclicked on the ^^JA
Doct^ment Page" link. Icreatedascreen capture of this page and saved it in the ^^screen shots"
folder. From this screen,lclicked on the folder icon ^investigations". Icreatedascreencaptnre
ofthis page and sav^ed it in the ^^screen shots" folder. From this screen,lclicked on the folder
icon^^Farah". Icreatedascreencapttire of this page and saved it in the ^^screen shots" folder.
The folder^^Farah" contained the followingst^b-foIders,^^AdminMateriaI",^^Briefs",^^EmaiI"
^^In-^estigationsTabs",^^ReportsandEXSUMs",^^Timelines", and^^Videos". Inavigatedtoeach
of the sub^folders and createdascreen capture for each page then saved it in the ^^screen shots"
ti:older. The screen shots showed how the SharePoint portal was arranged and the path to the
^^Farah^^ folder
9. Prosecution E:^hihit(PE)^^ for Identification isacompttter printout that shows the file
names and their associated paths that we navigated. It isaprintoTitofadirectory listing showing
the filenames of each file and folder contained within the Farah folder on the USCENTCOM
serv^er with indiiBidual line numhers printed to the left ofthe listing. It lists the first lev^el of
suhfolders within the Farah folder alphabetically,and then lists the filenames of the first
st^hfolder. The document continues this process oflistingsubftolder names recnrsive1y,nntil all
files and their filenames in all suhfolders hav^e been listed.
10. Later in the day on 20 A^gnst 2010,Irecreated the folder ^^Farah"on the Desktop Directory
ofthe laptop and included all ofthe snbfolders that resided in the ^^Farah" folder. Ithen
downloaded each individLial file contained in the folder ^^Farah" into the same location inside the
recreated ^^Farah" folder on the Desktop Directory ofthe laptop compt:iter. After verifying that all
of the files downloaded correctly,IinstaIled EnCase version ^,14.3 on the laptop computer.
Using EnCase,IcreatedalogicaI evidence file of the folder ^^Farah" and all ofits sub^folders.
The logical evidence file was named ^^JA Investigations FarahFolder.LOl". AnMD5hashof
4^e11229a5d^78cabf9c3fa^839f^^2c was ohtained and recorded. The logical evidence file of
the folder ^^Farah" was placed inafolder named ^^EnCase"on the root of the ^^X^^driv^e connected
to the laptop.Ialso copied the recreated ^^Farah^^ folder and all ofthe snb^folders and placed
them onto the root ofthe ^^X^^dri-^e. St^hseqt^ent1y,the folder ^^ScreenShots^^ was then copied
and placed on the root ofthe ^^X^^ drive as well.
11. ^^enheginning the process of navigating throt^ghtheJAG folder to ohtain the Farah
contents,Iwas not reqttired to enter any login or password window on the main page. Iwas
able to navigate to any page and access all folders and documents in the document lihrary,
inclt^ding the SJAInvestigations folder and the Farah folder without ev^er entering any
anthentication or credential information. In the Farah folder, all of the ^^video"fiIes were
password protected,including theafile named ^^BE22PAX.zip^^containingavideo named
^^BE22PAX.wmv^^. ^etherefore also requested and received the password to unlock the file
named ^^BE22PAXzip" and the othervideos from USCENTCOM PE^^ for Identification is
aCD containing the file named ^^BE22PAX.zip" and the ^ideo file named ^^BE22PAX,wmv".
PE^^ for Identification contains the password for the file named ^^BE22PAX.zip" whichi
received from USCENTCOM
12. Later on 20 At:ig^st 2010,Iconnectedasecond 400GB Seagate Barracnda,SATAhard drive
(Serial Numher:3NFOHTG4) to the laptop using the drive dock and assigned that driv^e the letter
^^Y^^. Ithen recreated the processasecond time placing the folder EnCase, containing the
EnCase logical evidence file for the folder ^^Farah^^, the recreated folder ^^Farah^^, and the folder
^^ScreenShots^^ onto the root ofthe ^^Y^^ drive. The second evidence drive was created asa
hackt^p in case the first evidence dri^esnfferedafail^re.
13. Ilater collected as ev^idence two SATAhard drives. These SATAhard drives each
contained images ofthree folders (EnCase, Farah, and Screen Shots), copied from the
USCENTCOM SharePointserv^er IP address 131.24047.23, which wasdoc^mented on
Evidence^Property Ctrstody Document (EPCD),DocLimentNi^mher(DN)123^I0(identified at
BATES nt^mber: 00411113). In processing this material,Ihandled and transferred the evidence
aslha^e heen trained. Atnopointdidlalteranyevidencelcollected. lhave no reason to
helieve this ev^idence was contaminated or damaged in any way. On 20 August 2010,Iproperly
signed this evidence over to Ms.Tamara Mairena, the CCIU Evidence Custodian, Ididnot
touch this evidence again,
14. Finally,Itook possession of firewall logs from the Department ofState from SA Ron Rock.
Itook possession ofthis evidence on 150ctober 2010. He provided this information onasilver
CD marked with the words ^^^ikileaks DoS Firewall Logs 130ctober 2010" The CD hadared
U.S.Govemment SECRETsticker on it. Irecognize it as an official sticker becanselhav^e
handled classified information hefore. Ihandled this evidence consistent with procedtiresasi
have heen trained and previously described. Upon taking cttstody,Ichecked to enstrre the
ev^idencelwas receiving matched the description on the DAForm4I37,laheled as DN 151^10,
Item1(identified at BATES number: 00411151). Ichecked the date,time,and other collection
information. And finally,lsigned in the ^^Received By" column, ^hile in possession ofthis
ev^idence,Imaintained positive control. Idid not alter the information on the CD. lhave no
reason to believe this ev^idence was damaged or contaminated in any way. OnI8October2010,
Iproperly signed this evidence ov^er to Ms.Mairena, the CCIU evidence custodian, Ididnot
toTich this evidence again. PE^^ for Identification is DN 151^10, Item I .
^tuv'^^3'"^i^^'^
THOMAS F. HURLEY
ASHDEN FEIN
MAJ, JA
Trial Counsel
MAJ, JA
Military Defense Counsel
BRADLEY E. MANNING
PFC, USA
Accused
UNITED STATES OF AMERJCA
Manning, Bradley E.
PFCU.S.Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Flail
Fort Myer,Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
Mr.JamesFung
DATED: ^June2013
It is hereby agreed hy the Accttsed, Defense Counsel, andTrial Counsel,that i fMr.
JamesFung were present to testify during the merits and pre-sentencing phases of this court-
martial,he would testify substai^tially as follows:
1. Icurrently work as the supervisor ofthe Cyber Security Operations Group at Brookhaven
National Laboratory (BNL)in Upton, NewYork. This Group is responsible for the security
posture ofBNL and is constituted by one physical site where multiple BNL departments'IT
directorates centralize their security operations. As supervisor,Ioversee the daily operations of
this Group. These operations ir:iclude intrusion detection, audit log collections, andCyber
Security Incident ResponseTeam(CSIRT) activities. Audit log collection entails collecting
electronic audit 1ogs,which track the time^date and user activities ofindividuals using BNL
computers. These logs are used to analyze the BNL system for security v^ulnerabilities and also
to secure data regarding suspected security violations. TheCSIRTteamisresponsihlefor
detecting, responding to, and investigating cyber security violations as well as pursuing
allegations offraud,waste, and abuse. In its work,we collaborate with the BNL human
resources department, on-site security,and law enforcement. lhave held my supervisory
position for six yea^s. IhaveaBachelors degree in IT Management and am certified asa
Forensic Analyst by the computer security professional association Global Information
Assurance Certification(GIAC).
2. Ifirst became involved in th:^s case after CSIRTmembers,whomIsupervise, alerted me that
the desktop work station computer ofaBNL employee identified as Mr.Jason^atz had been
used contrary to BNL policy.Toinvestigate this suspected misuse, two members of the CISRT
team collected Mr. I^atz'sBNL desktop computer. Based onBNL'sreport to federal law
enforcement officials, investigators in the present case against PFC Manning became interested
in the contentsofthe BNL desktop computer assigned to Mr. ^at^,which my team collected.
No rationale for this interest was communicated to me.
3. Mr. I^atz worked asaSystems Administrator for the Physics Department atBNL. He was
hired asaJunior Systems Administrator, and was employed fromFebruaryof2009 until March
of2010. His primary responsibilities were to help maintain the computers that processed data
for our Relativistic Heavy Ion Collider (RHIC) as well as theATLAS Computing facility
(RACE). As BNL has the capacity to process large amounts of data through our super computer
systems, Mr. ^atz was further responsible for helping to manage the queue of^ohs submitted
from institutions throughout the world, who seekBNL'sassistance in processing large amounts
ofdata. For example, research universities send large amountsofresearch data to us, as our
facility can process data with the power offive hundred computers.
I PROSECUTIONEXHlBIT^foride^fi2ation
PAGEOFFERED: PAGEADMI^ED
PAGE ^ OF ^ PAGES
4. Our CSIRT team became suspiciousofMr.^atz when his desktop computer was removed
from our BNL network. This happens automatically when our system detects that the BNL
computer attached to this accou:i^t is used inaway that violates BNL user agreements, ^^ena
machine is blocked or disconnet::ted from our BNL network, it is no longer usable^including for
work purposes. Mr. ^atz approached our office to have his desktop reconnected to the
networkalleging that he had been kicked off after accidentally clickingaprohibited link in an
email on his personal account. Following this explanation,we reconnected his computer to the
network. Howev^er, upon consiLlering the matter further,Idecided this was unlikely given the
activity detected. According1y,Inotified our Laboratory Protective Division (LPD),legal
department, and human resources office ofthe suspicious activity and initiated an investigation.
Subsequently,an armed LPD officer was dispatched to Mr. ^atz'soffice. Ifurther dispatched
two members of my CSIRT team to respond. Mr.^ithers was part ofthe CSIRT team. He was
the team member to first identif^^ the suspicious activity associated with Mr. I^atz'sBNL desktop
computer. Further, given Mr.^^ithers prior BNL work in the same section as Mr.I^atz,!
considered Mr.^ithers knowledgeable about Mr. I^atz'sofficial duty position. After collecting
Mr. I^atz'scomputer,Mr.withers delivered the machine to our secure forensic laboratory to be
forensically imaged by Mr. McManus
^. Access to our forensic laboratory is secured by access key card. OnlymemhersofourCyber
Security Group have this access. Further, the lab containsasate used to house evidence
securely. This safe can only be accessed whenakey and pass code are used in conjunction.
Only two people hold this key^myse1fandacolleague,who is alsoamember of theCyber
Security Group. Only members ofthe Cyber Security Group have pass codes to the safe.
7. Later my team searched the forensic image created by Mr. McManus. Our search revealed
the presence ofpassword cracking programs,which are commonly used to break file passwords.
Tothe best ofmy knowledge, there is no reason Mr.I^atz would need these programs for work
purposes.Ilater confirmed this understanding with Mr. Ii^atz'sthensuperv^isor Mr. Chan. Ido
not recall seeing anything related to^ikiLeaks on Mr. I^atz'scomputer. This would have been
beftorelhad heard of^ikiLeaks, soldo not know i fl woul d remember it i f l di d.
8. At no point during the detection of suspicious activ^ity or the ensuing investigation and
examination didi alter Mr. I^atz'sBNL computer, its hard drive, its other components, or its
contents in any way.Furthermore,Inever altered any forensic image made from this computer in
anyway. At no point didlobserve anyone alter the computer, its hard drive, its other
components, or it contents in any way. Likewise,Ihave no reason to believe the evidence was
damaged or contaminated in any way.
^ ^ ^ B ^ ^ ^ ^ ^ i ^ ^ ^ ^ ^ ^ i B ^ ^
ASHDENFEIN THOMASFHURLEY BRA
MAJ,JA MAJ,JA PFC, USA
Trial Counsel Defense Counsel Accused
UNITED STATESOF AMERICA
Manning, Bradley E.
PFCU.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
Mr. Ale^ Withers
DATED: ^June2013
It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel, that i fMr. Alex
withers were present to testify during the merits and pre-sentencing phasesofthis court-martial,
he would testify substantially as follows:
1. Icurrently work as an Investigator in the IT Di-^isionofBrookhaven National Laboratory
(BNL)in Upton, NY. SpecificaIIy,Iam part ofaCyher Security Incident ResponseTeam
(CSIRT). lhave held this position for five years(since September of2008). Prior to that,I
worked as an AdvancedTechnology Engineer, responsible for helping to maintain the computers
that process data for our Relativistic Heav^y Ion Collider (RHIC) as well as theATLAS
Computing facility (RACE). BNL has the capacity to process large amounts of data through our
super computer systems. According1y,in my previous position,Iwasft:irther responsible for
helping to manage the queue of^obs submitted fi-om institutions thr-oughout the wor1d,who seek
BNL'sassistance in processing large amounts of data. Iheld that position for four years.
2. IholdaBachelorsandaMasters degree in Computer Science. lalso hold three certifications
fi-om the computer security professional association Global Information Assurance Certification
(GIAC)^oneinForensic Analysis, one in Incident Handling, and one in Intrusion Analysis.
3.Ifirst became involved in this case afterldiscovered suspicious activ^ity on the desktop work
station computer assigned toaBNL employee identified as Mr. Jason I^atz. Based onBNL's
report to federal law enforcement officials, investigators in the present case against PFC
Manning became interested in the contents ofthe BNL desktop computer assigned to Mr. ^atz,
whichlcollected and forensically examined.
4. In my CSIRTposition,Imonitor information system security for BNL. In early March of
2009,Idiscovered the BNL desktop machine assigned to Jason I^atzhadaFirefox extension.
An extension isaprogram that tuns within the Firefox internet hrowser and that enhances the
user'sabilities For example, an extension could allowauser to project his/her Intemet Protocol
(IP) toadifferent location, and i:-outethroughadifferent IP address,so that his/her actions on the
web would appear to have originated in that location instead ofthe user'sactual location. In this
instance, the extension on Mr. ^satz'smachine implied that Mr. ^atz had bypassed BNL proxy
serv^ers designed to monitor BNL computers'internet traffic. Ifurther inv^estigated this activity
by reviewing logs created by BNL reporting software. This review revealed that Mr. I^atz's
BNL desktop machine hadalarge amount ofSecure Shell (SSH) traffic. SSH isacomputer
protocol, or computer communication language, that facilitates secure or encrypted
communications. This information,when taken in conjunction with my review ofBNL firewall
logs, suggested that Mr. I^atz was transferring files between his BNL machine and another
PROSECUTION EXHIBIT^^^i^id^ti^^^^t^^^^
PAGEOFFERED: PAGEADMITTED:
^AGE ^ GP^ PAGES
1
computer outside his home using an SSH, or encrypted, connection.Iknowthe network to which
he connected was not his home computer, as the IP address to which this connection was made
did not match his home IP address, ^hilelcould not tell which types of files were transferred,
having previously occupiedaduty position responsible for many of the same activities as Mr.
^atz was then responsible,Iknt:iw it is possible forauser in Mr. ^atz'sposition to have hidden
files in the BNL system and to hav^e used the BNL computing power to run personal tasks. For
example, the BNL super computer power could significantly reduce the amount oftime it would
take to decrypt an encrypted file withoutapassword. lalso knowthat the BNL desktop CDR^
and USB drives would have been enabled on his work computer. These could have been used to
transfer data onto remov^able media.
5. This, and other suspicious activity,resulted in further inv^estigation. U1timately,our system
detected that Mr. ^atz'scompu^:er had accessedawebsite known to contain pirated files, ^e
were ahle to find this because Mr. ^atz upgraded toaweb browser that hadabug that allowed
me to see what websites Mr. I^atz was visiting. Pirated files are illegally obtained files. Icannot
recall all ofthe websites visited by Mr. ^atz. The only one thatlremember specifically is Pirate
Bay,awebsite that allows fi:or the improper downloading of monies and other entertainment
media. As this was against user agreement po1icy,the BNL system automatically blocked Mr.
I^atz'sdesktopcomputer^esse:oitia11y removing it from the BNL system. The ensuing
investigation included the collection ofMr.^atz' sBNL desktop computer fi:or forensic imaging
and fiirther investigation. Iknow this becauselwas part of the team to report the initial
suspicious activ^ity to my supervisor Mr. James Fung. Ithen met with and accompanied
responding law enforcement personnel to Mr.I^atz^sworkstation for the collection ofhis
computer. Mr.I^atz: was present at the time we obtained the BNL computer. ItwasaDell
Optiplex 9^0 computer withaLinux operating system, bar code number138^94. At the time of
coIIection,we checked to make sure the computer did not contain any removable media devices
such asathumb drive. Then, my CSIRTcoIleaguesandlaccompanied that computer to the
forensic laboratory for forensic imaging by Mr.James McManus. Mr. McManus is an IT
Architect atBNL.
^. Following this imaging process,our Cyber SecurityTeam further examined this forensic
image. Iknow our team examined it becauselparticipated in that examination. Our
investigation revealed that Mr. I^atz had password cracking software on his BNL desktop
computer. AdditionaIly,the computer housed at least part of an encrypted.zip file,which, it
appeared, Mr. ^atz had attempted to break into or decrypt using the brute force attack method.
The brute force attack method means usingacomputer-generated or pre-generated list of
possible passwords to crack an unknown password by running different passwords against the
file one atatimeatavery fast rate, ^edi d not hav^e the password to this file and so could not
open it. Our search also revealed movies that had been downloaded and saved to Mr.^atz's
work computer. Ido not recall whether WikiLeaks was mentioned in any way on Mr. ^atz's
computer. This was priorto my hav^ing heard of^ikiLeaks,soImay not hav^e noted its
significance at the time.
7. At no time, prior to,during, or after the collection ofMr.^atz' sBNL computer didlalter its
hard drive,its other components, or its contents in any way.Furthermore,Inever altered any
forensic image made from this computer in any way. At no point didlohserve anyone alter the
computer, its hard drive,its other components, or its contents in any way. Likewise,Ihaveno
reason to believe the evidence vt^as damaged or contaminated in any way.
ASHDEN FEIN
MAJ, JA
Trial Counsel
J-^trvvuM^- ^^^^-^^^
THOMAS F. HURLEY
MAJ, JA
Defense Counsel
Bl
PFC, USA
Accused
^
E. MANNING
UNITED STATES OF AMERICA
^.
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
Fort Myer,Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
Mr.James McManus
DATED: ^June2013
It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that i fMr.
James McManus were present to testify during the merits and pre sentencing phases of this
court-martial, he would testify substantially as follows:
1. Icurrently work as an IT Architect at Brookhav^en National Laboratory (BNL)in Upton, New
York. In this capacity,Iperform forensic imaging ofthe computers our Cyber SecurityTeam
confiscates and perform forensic analysis ofthose computers with^indows operating systems,
lalso control anti-v^irus for the approximately fiv^e-thousand computers connected to the BNL
system,and run penetration testing on BNL servers to ensure they are secure. IworkwithMr.
Alex withers. Mr. James Fung is my supervisor. lhave held this position for two years. Forthe
five preceding years, my^obtit^e was Senior Engineer: however, myresponsibilities have
remained the same. Ihav^e worked atBNL for thirty years,and have worked with the Cyber
Security Group for ten of those years. For the past five years,Ihave attended at least one
System Administration Network Security (SANS) course on network security and forensic
examination per year. The courses also cover how to handle digital evidence.
2. Ifirst became inv^olv^ed in thiscase after forensically imaging the hard driveofadesktop
work station computer ofaBNL employee identified as Mr.JasonI^atz,which had been
collected upon suspicion ofhaving been used contrary to BNL policy. Based onBNL'sreport to
federal law enforcement officials, investigators in the present case against PFC Manning became
interested in the contents of the BNL desktop computer assigned to Mr. ^atz,whichIprocessed.
3. On24 February 2010,Ireceiv^edaDellOptipIex 9^0 desktop computer assigned to Mr. li^atz
fromMr.AIex^ithers. After receiving the computer,Isecured it in our evidence safe in our
secure forensic evidence laboratory. The lab is accessible only to the sixBNLCyber Security
team members,who must use secure key card to gain entry. Akey and pass code are required to
open the safe. It is only accessibly ifeither Mr. Fung or his associate, who also works in our
Cyber Security Group, are present, as they are the only individuals with the required key. Only
Cyber Security Group members hav^e the required pass code.
4. On 25 February2010,whi1e in our secure forensic evidence laboratory,Iremoved the hard
drive from the Dell Optiplex 9^0 BNL desktop computer collected from Jason ^atz. lobtaineda
forensic image ofthis hard drive using the program FTI^ imager. Ifollowed standard imaging
procedures on whichlhave been trained and whichlhave used before.
5. Aforensic image of an item t:if digital media is an exact copy ofthe data on the digital media.
Digital forensic examiners image devices so that the originally collected device can be
PROSECUTION EXHIBIT ^^Ii : or
PAGEOFFERED: PAGEADM
PAGE^ GF^PAGES
identification
ITTI
^ED:
forensically ex^amined without :risking contamination ofthe original data. This is standard
practice by digital forensic examiners. The software fcirensic examiners use to image the digital
evidence has built in procedures to verify that the item has been successfiilly duplicated. For
example, the program will note the MD5 hash or Secure Hash A1gorithm1(SHA1)hash value of
an item of digital ev^idence before imaging(acquisition hash value)and after imaging the item
(verification hash value). Ifthe two hash values match, the item has been successfully
duplicated bit-for-bit. The hash value is determined by mathematical algorithm and is displayed
asanumber^letter identifier unique to every item of electronically stored information. It is the
equivalent ofadigital fingerprint, ^hen the hash value is generated, the entire hard drive will
haveahash value, as well as each individual file on the hard drive. Ifthere is any alteration to
the hard dri-^e or to any file on i:he hard drive, the acquisition and verification hash values will
not match. The alteration can be as small as addingasingle space into text document or saving
the data toadifferent size de-^ice. In this case,IusedFT^ Imager forensic software to complete
this imaging process. FTI^ Imager is similar to EnCase and is widely used by digital forensic
examiners. lalso usedawrite blocker when imaging this driv^e in order to ensure the originally
collected evidence was not altered in any way. Aslstated earlier,Ihave received training on
FTI^ Imager and have used it in my other work. lencountered no errors while conducting the
imaging ofthe evidence at issue in this case
^. IprocessedaBNL owned Dell Optiplex 9^0 desktop computer hard drive with Linux
operating system, serial numher9S^3MBE3,bar code 138^94. Imadeaforensic image of this
drive for our lab'sintemalexan^ination. In doing so,lidentified the SHAI hash value ofthe
hard drive collected to be ^0a5cd8caf580f7c1bba415f793550a7349afIbcAtno point duringmy
handling of the ev^idence in question didlalter the computer, its hard drive,its other
components,or its contents in any way. At no point didlobserve anyone alter the computer, its
hard driv^e,its other components, or its contents in any way. lhave no reason to believ^e the
evidence was damaged or contaminated in any way.
J4vnwLL
THOMAS F. HURLEY
MAJ, JA
Defense Counsel
ASHDEN FEIN
MAJ, JA
Trial Counsel
BRADLEY E. MANNING
PFC, USA
Accused
UNITED STATESOF AMEIHCA
^ k
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer, Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
SATroyM.Bettencourt
DATED:
^
June 2013
It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel, that ifSA Troy
M.Bettencourt were present to testify during the merits and pre-sentencing phases ofthis court-
martial,he would testify substantially as follows:
1. lamaSpecial Agent (SA)for the Special Inspector General for theTroubled Asset Relief
Program (SIGTARP),U.S.Department oftheTreasury. SpecificaIIy,Iworkfi:or the Computer
Forensics Unit(CFU),SIGTAFT^. My currentiob title is Senior Special Agent (SSA)andlam
located in^ashington, DC. As an SSA for the CFU,my^ob primarily entails providing digital
forensic and e-Discovery support to SIGTARP^s nationwide criminal investigations. lalso
conduct criminal inv^estigationsof crimes within SIGTARP^s investigative purview. lhave
serv^edasaSpecial Agent for SIGTARP for approximatelylandahalf years.
2. From November 2010to December 2011,IwasaSpecial Agent for theU.S.Army Criminal
Investigation Command(CID). Specifically,Iworked for the Computer Crimes Investigation
Unit(CCIU). Iwas assigned to the^ashington Metro Resident Agency,CCIU,and investigated
crimes within CCIU^s investigative purv^iew,withafocus on the PFC Manning investigation.
3. From June 2007 to November 2010,Iwas an administrator with the Punta Gorda Police
Department wherelwas responsible for accreditation, staff inspections^audits,
administrativ^e^management studies, personnel supervision, media relations, and forensic
imaging^preliminary analysis ofdigital evidence in cases ranging fi-om prostitution to homicide.
4. From May2005 to June 2007,lowned and operated my own business. From October 2001
to May2005,IwasaSpecial Agent with CCIU. Isupervisedateam of special agents
responsible for investigating crimes within CCIU^sinvestigativ^e purview. Iwas also assigned as
the CID liaison to theU.S.Army Computer Emergency ResponseTeam(ACERT) and the Joint
Task Force-Global Network Operations(JTF-GNO).
5. FromFebruary 1999-September 2001,IwasaSpecial Agent with the Hawaii Field Office,
CID,wherelserv^ed as an assistant team chief ofadrug suppression team, as well as an
investigator onageneral crimes investigative team andachildabuse^sexual crimes investigative
team.
6. I earned a Masters of Public .Administration (Criminal Justice Administration) from Troy
University located in Alabama. I have had extensive training in evidence collection and
1 PERSECUTION EXHIBIT I k for i ^ t i f k a f i ^
PAGEOFFERED
PAGE 1 OF PIPAGES
PAGE ADIVHTTED:
handling to include, but not limited to, the17-week Apprentice Special Agents Course. In terms
of computers and fi:orensics training,lhave completed multiple courses over the years. I
completed three courses at the Defense Cyber InvestigativeTraining Academy (DCITA) in
Linthicum, Maryland, between the years 2001 and 2011, which covered digital media collection
issues. From 2002-2003,lattended two courses at Guidance Software in Reston,Virginia(the
manufacturer ofEnCase). During this timelalso completed four courses at Learning Tree
InternationaI,which focused on information network security. In 2003,Icompleted the Federal
Law EnforcementTrainingCer^iterSeizedEvidence Recovery Specialist training^certification in
Glynco, Georgia. In 2009 and 2013,lattended two courses conducted byAccessData
(manufacturer ofFTI^).In 2012,Icompletedatraining^certification course on use ofthe
CellebriteUniversalForensic Extraction Device. These courses all discussed the collection,
handling, and^or forensic analysis ofdigital evidence.
7. learnedaDepartment ofDefense Certified Digital Media Collector certificate in 2011from
the Department ofDefense Cyber Crime Center (DC3),which must be renewed every two years,
lhave not renewed it asino longer work foraDepartment ofDefense entity. learned the
Federal Law Enforcement Training Center Seized Evidence Recovery Specialist certification in
2003,which did not require recertification. learned the CellebriteUniversalForensic Extraction
Device (UFED)Certification in 2012,which does not require recertification. lalso earned the
following certifications which have since lapsed: Learning Tree International Network Security
Certified Professional (2003): Guidance Software Encase Certified Examiner (2004):
AccessData Certified Examiner (2009). In addition to my training and certifications,Ihave
investigated or supervised more thanlOO investigations involving computer crime and
investigated or supervised between 200-300 criminal investigations urrrelated to computer crime.
8. On 30 August 2011,as part ofthis investigation,Idown1oaded the ^^Cablegate" archive from
^^www.wikileaks.org" based on press reports indicating that all Department ofState diplomatic
cables in the possession of^ikiLeaks had been posted on the WikiLeaks website. Thearchivel
collected contained 251,287 pur-ported Department ofState diplomatic cables or messages. The
purported cables ranged in date from19^^ to February2010. Iknow this becauselpersonally
reviewed the ^^Cablegate" archive after collection. This review ofthe contents ofthe archive
revealed that no information had been redacted from the files.
LO: ^ "h/xuv^
jpDEAN MORROW
(cPT, JA
Assistant Trial Counsel
THOMAS F. HURLEY
MAJ, JA
Military Defense Counsel
BRADLEY E. MANN
PFC, USA
Accused
UNITEDSTATESOF AMERICA
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
Fort Myer,Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
SAI^irl^Ellis
^ June 2013
It is hereby agreed hy the Accused, Defense Counsel,andTrial Counsel,that i f SA^i r k
Ellis were present to testify during the merits and pre-sentencing phases of this court martial, he
would testify substantially as follows:
1. lam currentlyaSpecial Agent (SA)criminal investigator and certified digital forensic
examiner for United States Armiy Criminal Investigation Command(CID). lam assigned to the
Rock Island Fraud Resident Agency within the Ma^or Procurement Fraud Unit and am currently
deployed to Afghanistan. In this position,Iinvestigate fraud cases asacase agent. When in the
United States,Ialso provide forensic examination services to our local field offices. lhave held
this position for about one year. Previous1y,Iworked at CID'sComputer Crimes Investigative
Unit(CCIU)asaComputer Crime Program Manager atFort Be1voir,Virginia and Marine Corps
Base-O^^^fico,Virginia. lhave also worked asacase agent with CCIU. lhave beenacivilian
SAwith CID since 2008. Before that,Iwas an active duty CID agent for three years atFort
Bragg, North Carolina.
2. lhave substantial training to qualify me for my position. lhave attended several courses run
by the Defense Cyber InvestigationsTraining Academy (DCITA)in Linthicum, Maryland. I
have used the EnCase forensic tool on multiple occasions in my line of work. lamalsoa
Department ofDefense Certified Computer Crime Investigator. Ihaveabachelor'sdegreein
multi-disciplinary studies withafocus on business and criminal^ustice from Liberty University
inLynchburg,Virginia. lhave worked more thanadozen fraud cases, approximatelyadozen
cases for CCIU, and about fifty ^:o sixty cases as an active duty CID SA.
3. Ifirst became involved in this case whenlwasacase agent with CCIU. Throughout the
course of this investigation,Iworked with several other SAs on the investigation team, including
SABowen,SAWiIhur,SA Edwards, SA Ames,and SA Mander. Primarily,my role on the
investigative team was to assist with witness questioning and with electronic data collection.
Specifically,SABowenandIcollected the Department ofState (DoS) server logs on 15June
2010. After coordinating with Mr.AIbert^^John"Janek at the DoS for authorization,we
collected the logs fromaserver room in the Harry S.Truman Building of the DoS in
Washington, DC. Wewere interested in collecting the DoS server logs so we could see users
that had accessed the servers,and what files were specifically accessed. Inthisinstance,we
collected, or copied, the logs from January2009 to June 2009,and from 30 April 2010to15
June 2010. Wewere not able to collect DoS server log files between Ju1y2009 and 30 April
2010based on an electronic recording gap. The files that were copied were placed in zip" files
and named ^^logs.zip" and ^^newlogs.zip." Icollected these log files in accordance with the
traininglhave received. The DoS gave meahost computer that could access the logs between
PROSECUTION EXHIBIT ^ ^ f o r i d e i ^ t i c ^ n
PAGEOFFERED: ^PAGEADMIT^ED:^
PAGE^ GF^PAGES
their firewalls and collected the files onaclean USB removable drive (^^thumb drive"). Itwas
my practice to wipe and formatathumb drive priorto collection. Wiping is more than^ust
deleting: it means forensically removing all information fromadrive. It ensures the device is
completely empty ofall types ofdata. Mr.Janek first possessed the thumb drive,and then
signed it over to me whenlfinished collecting the files from the host computer.
4. After Mr.Janek signed the thumb drive over to me,Ibrought the thumb drive back to CID. I
created an image ofthe information using EnCase. limaged these items of evidence so that the
data on the device can be forensically examined without exposing the actual collected contents to
examination. The imagelcreated was verified by hash value match. lencountered no errors
while conducting the imaging ofthe evidence at issue in this case. Oncelverified that the hash
values matched,Isaved the EnCase image onaDVD so that it could be examined and logged it
as evidence. Ikt:row it was clean and appropriate for evidence collection for two reasons. First,
it was the same type ofDVD our office uses to collect evidence in our standard digital evidence
collection practices. Second, it was new and factorymade. Iknowthedatalputontoithad
been unaltered because the hash value ofthe logs collected onto the clean thumb drive matched
the hash value ofthe logs afterlsaved them to theDVD. TheDVD was marked ^^0028-10-
cid221-10117Dept ofState Server Logs,199 5^ 188 73"IusedaDAForm4137,
Evidence^Property Custody Document (EPCD),Document Number (DN)78-10to describe the
evidence,and signed it over to the evidence custodian, Mr. GaronYoung. Ido not have any
reason to believe that the evidence suffered damage or contamination. Idid not touch this
evidence again. Prosecution E^hi hi t (PE)^ for Identification is DN 78-10, theDVD
containing the DoS server logs.
ASHDENFEIN
MAJ,JA
Trial Counsel
^^Oc/ vvuMr^. -^pZo^
THOMAS F. HURLEY
MAJ, JA
Military Defense Counsel
BRADfeEYE
PFC, USA
Accused
MANW&G
UNITED STATES OF AMERICA
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
SA Mark Mander
June 2013
It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if SA Mark Mander
were present to testify during the merits and pre-sentencing phases of this court-martial, he would testify
substantially as follows:
1. On 2 November 2010, SA John Wilbur and I visited Ms. Debra Van Alstyne at Ms. Van Alstyne's
residence in Potomac, Maryland. We were searching for a box that had been sent to Ms. Van Alstyne's
residence from the confinement facility in Kuwait where PFC Manning had been held. As procedure, the
confinement facility collects personal items, like your wallet or clothing, and places them in a container. I
thought those items may have some evidentiary value, but we were unable to obtain an authorization to
search the container prior to PFC Manning's departure from Kuwait. Once PFC Manning left the
confinement facility, the standard procedure is for the facility to ship the personal items to the confinee's
home of record. 1 was able to determine that the box had been signed for by PFC Manning's father at Ms.
Van Alstyne's residence, so we contacted Ms. Van Alstyne to see if she had received the box as well as to
inquire into any other items of evidentiary value in the basement room where PFC Manning had stayed.
2. When we arrived on 2 November 2010,1 noticed that many of PFC Manning's personal items that had
been strewn about in June 2010, when 1 last visited Ms. Van Alstyne, were now organized into plastic
containers. During the process of looking through the containers, we identified several items of digital
media, including digital memory cards. With Ms. Van Alstyne's consent, we collected these items of
digital media. One of the items we collected was an SD memory card, bearing the serial number
BE0915514353G. Ms. Van Alstyne identified this SD memory card as the property of PFC Manning.
3. Using standard evidence collecting procedures, I collected this SD memory card by marking it with
"2123, 2 Nov 10, MAM" for identification. I then recorded it as Item 2 on a DA Form 4137 marked as
document number (DN) 162-10. Using the DA Form 4137, I properly released this piece of evidence to
the CCIU evidence custodian, Ms. Tamara Mairena on 3 November 2010. While in possession of this
item, I maintained control over it, stored it properly, and allowed no one else access to the SD card. I did
not alter the evidence in any way. 1 have no reason to believe this evidence was damaged or
contaminated in any way.
4. Prosecution Exhi bi t ^ for Identification is the SD card (Item 2 of DN 162-10).
AN
' T, JA
Assistant Trial Counsel
JCunti^^.^^^^J^
THOMAS F. HURLEY ^
MAJ, JA
Military Defense Counsel
BRApkEY E. MANN IT
PFC, USA
Accused
PROSECUTION EXHIBIT 2i _f or i^tification
PAGE OFFERED: PAGE ADMITTED:
PAGE 1 OF] PAGES
UNITEDSTATESOF AMERICA
Manning, Bradley E.
PFC,U.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
SA Ronald Rock
^
June 2013
It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that ifSA
Ronald Rock were present to testify during the merits and pre-sentencing phases ofthis court-
martial,he would testify substantially as follows:
1. Icurrently work asaSpecial Agent with theU.S.Department ofState (DoS),Diplomatic
Security Service (DSS). Prior to becomingaSpecial Agent with the DSS,Iserved asaSergeant
on the DSS,Unifi::^rmed Division from 1999 2001. There,Iprovided oversight for over fifty
uniformed officers at nine DoS annexes inWashington,D.C.and Maryland. Igraduatedfrom
the DSS,Basic Special Agent Class in Ju1y2002wherelwon the DSS Director'saward as the
top graduate. Since then,Ihave served in the DSS Washington Field Office (2002 2004): the
Secretary ofState'sProtective Detail (2004-200^):USEmbassyBogota(CoIombia) (200^-
2008): the National Defense Intelligence College (2008-2009): the Special Investigations
Division (2009-2012). During my three years in the Special Investigations Division (SID),
wherelwas promoted to Acting Branch Chief in charge of supervising seven other special
agents, my portfolio included the responsibility f^r investigating cases of criminal and
administrative misconduct by DoS employees, their family members and contractors, as well as
employees from other agencies under Chief ofMission authority atU.S.Consulates and
Embassies worldwide. lied the investigative effi:ortftor DSS on several high profile cases
involving the unauthorized disclosureofDoS classified information. Additionally,Idraftedthe
standard operating procedure by which SID currently investigates leaks ofDoS classified
information.
2. Icurrently work at theU.S,Consulate in MazareSharif, Regional Command North,
Afghanistan. There, myteamandlare responsible for the safety and security of all American
diplomats who travel through the nine provinces comprising Northern Afghanistan.
3. In this case,Iwas involved with the coordination for evidence collection, as well as the actual
collection of evidence at the DoS.Specifically,Icoordinated with DoS Deputy Chief
Information Officer (DCIO)CharlieWisecarver to obtainaCD containing Department ofState
SIPRNET firewall logtraffic for IP addresses22225 41 40and22225 41 22 On14October
2010,IvisitedDCIOWisecarverinWashington,D.C.and collectedadisk containing the
firewall logs from the DoS classified system. The disk wasasilver CD bearing the markings
^^Wikileaks DoS Firewall Logs 13 OctlOBftboreaUS Government SECRET sticker This
disk was important to our investigation as the logs showed connections between the DoS NCD
database and the IP addresses ofthe SIPRNET machines assigned to PFC Manning.
PROSECUTION EXHIBIT l A for identification
PAGE OFFERED: PAGE ADMITTED:
PAGE \ OF 1 PAGES
4. On 15October2010,Isigned the CD marked with the words ^^WikileaksDoS Firewall Logs
13October2010"over to SA JohnWilbur. Ihandled this evidence consistent with procedures as
lhave been trained When signing over the evidence,lusedaDepartment ofthe Army Evidence
Property Document (DAForm4137) with the label DN151-10and this CD was item1(BATES
numbers: 00411151 00411152). While in possession of this evidence,Imaintained positive
control. Idid not alter the information on the CD. lhave no reason to believe this evidence was
damaged or contaminated in any way. Idid not touch this evidence again.
5. Prosecution Exhibit 68 for Identification is this CD (DN 151-10, Item 1).
RGAARD ANGEL M
CPT, JA
Assistant Trial Counsel
J ^ U H t A ^ ' ^ f - ^
THOMAS HURLEY
MAJ, JA
Defense Counsel
BRADLE
PFC, USA
Accused
UNITED STATESOF AMERICA
V.
Manning, Bradley E.
PFC,U.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
Mr.DougScliasteen
June 2013
It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that ifMr.Doug
Schastcen were present to testify during the merits and pre-sentencing phases ofthis court-martial, he
would testify substantially as follows:
I.Whilelcurrently work foraprivate software company in Seattle,Washington,1was previously the IT
Director at WillcoTechnologies. Iheld that position for six years. 1nthatposition,1tookcareofallthe
technology-related tasks and served as the main point of contact and database administrator for theU.S.
Army'sTrainingt^CertificationsTrackingSystem(ATCTS). TheU.S.Army hired WillcoTcchnologies
to build and then maintainadatabase tracking system forU.S.Army Information Assurance (IA)
certifications. Idevcloped the database and oversaw its development.
2 Irecognize Prosecution Exhibit ( PE) ^f or Identification (BATES numbers:00411400
00411401)asaprint out from thcATCTS. ATCTS is the databaselbuilt, and it tracks the activity status
ofU.S.Army personnel as well as the dates of the users'information assurance (lA)training
certifications. Irecognize PE^for ID as the one1providedon31January2012to investigators in the
present case against PFC Manning. Along with PEl ^ for lD,1providcd an attestation to its authenticity
notarized byaNotary Public and it is identified at BATES number: 00411399.
3. P E ^ f o r l D shows PFC Manning'sIA certification status. It shows that the user name: "Bradley
Manning'is no longer active in our system. All soldiers must have IA training, at least, onayearly basis.
Asasoldier, he would have an account in our system. PE^ f o r ID shows PFC Manning'sIA trainings
were dated5September 2008 and then310ctober 2009. This tells us that PFC Manning had received
the yearly IA training and associated certification necessary for computer usage through October 2010.
As ofthe timelprovided this print out in January of2012,PFC Manning had an "inactive status".
According1y,his account had been disabled and he wouldn't be able to log in. Auser attains this status
when(s)he is not in compliance with the yearly IA requirement. For users who are in compliance, their
unit identifiers show up in the lines indicating "command" and "unit".
4. This training information is collected automatically by the Army Signal Command at Fort Gordon,
GA,whenauser completes the annual IA exam online. It is then transmitted to our system for automatic
updating. Our system further tracks the extra training necessary for users who arc certified as system
administrators. Our system shows PFC Manning has not had any ofthe required system administrator
trainings.
iSHDEN FEIN
MAJ, JA
Trial Counsel
J^LgW/Ld. J^. ^A-^Z. ^
THOMAS F. HURLEY ^
MAJ, JA
Military Defense Counsel
BRADLE
PFC, USA
Accused
PROSECUTION EXHIBIT %/) for ide/ifification
PAGE OFFERED: PAGE ADMI / TED:
PAGE
PAGES
Prosecution Exhibit^l
24pages
classitied
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classitled
supplementto the original
Record ofTrial
0
0
s
> >
Ja
O O O
cn cn
00
cn
O
cn
o
O
F
E
E
:
u
T
i
Tl 73
o
cn
p
N
E
X
>
Z
G
E
-T3
v.
I
B
I
T
(/) ^
o
I
B
I
T
cn
CK^
>
D ^
I I
1L
.> L
s a
S 2.
S 5-
tn
2
CD
2
tn
S
CI
s
cn
2
cn
2
cn
2
en
2
3
I ? - I '
?
. S
S
5 s. 5 s 5 s. 5
11;
5 s s I
5 g
O 5
o a
2
o
2
o
> I
s:
.> U
o
o
> U
o a
2
o
> U
o
o
> U
3 5'
2
O
2
o
2
o
2
o
2
o
2
O o a
> L .> U > U
5 5
S
eo
BO
3
%
3
S
3
s
S
3
s
S
3
s
S
3
s
g
3
s
go
s
p
s
EO
s
go
s
BO
i
s
3
s
3
s
S
3
s
S
3
s
eo
s
S
3
s
BO
S
BO
I
=1
I
:]
I
^
%
^
%
=1
I
=1
cn
2
cn
2
cn
2
I I I I
S I
2
o
o a
? t
3 '5
s
> L
o a
.> U
2
o
3 S
i
BO
S
S
3
s
Bo
S
eo
g
go
s
BO
I
=1
I
^
%
=1
%
=1
?
I -
o a
5 s
3 5
S ^
S m
S 5
B i
s ^
S m
S 5
I |.
> u
S 3.
I I
I I
"=
I I
> t
"= 5:
3.
5
Ei
I I
3 S
3
m
5
.>
3 5-
I -
> lr
3 5
..
I -
o a
> L
3 5'
3
2.
5
o a
3
!L
5
I ^
cn
2
3
I I
3
2.
5
i i.
I
2
o
> U
3 's
2
o
> L
BO
BO
BO
cn
2
cn
2
cn
2
EE
I
I
I I.
2
o o a
2
O
> U
2
o o
o
s
3
BO
BO
BO
BO
X
=1
X
=1
s
A
UJ
o o o
o o o o
i i i i i i i i
o
cn cn cn cn cn cn cn cn tn cn cn cn cn o Q Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H H H H
O o O o o O
o o
o o
8
S 5 5
O o
s 8
5
s
o
"
h
t
t
|
"
G
E
g 3
D
,
,
1
"
G
E
"
h
t
t
cn
"
h
t
t
3
D
.
,
"
h
t
t
3
D
,
,
"
h
t
t
"
G
E
M
M
,
.
cn
"
h
t
t
"
G
E
g
"
G
E
"
h
t
t
3
D
,
,
"
h
t
t
ci
M
M
,
.
Cl
g
ci
"
h
t
t
ci
"
h
t
t
ci 5 ci
"
h
t
t
ci
-1 H H -1 H H H H H H H
n
t
e
n
t
e
s
.
w
i
n
t
e
.
w
i
n
t
e
lA
A
n
t
e
.
w
i
n
t
e
S
.
w
i
n
t
e
l
A
A
-
n
t
e
.
w
i
n
t
e
!
n
t
e
w
i
s
n
t
e
S I
M
'
n
t
e
.
w
i
n
t
e
!
A
^
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
o
^ <
1 A
O
A
O
i;
A
O
A
O
^ A
O
" g A
O
1 A
O
i;
A
O
I;
A
O
A
O
!
1 A
O
^
;
o
v
I;
A
O
I
A
O
!
; A
O
!
^ A
o
:
^ A
O
!
i
/
J
H H -1 H H H F
-
G
cn cn cn cn cn cn
F
-
G
(7) Cl
6
cn CI in C) Cl Cl tn Cl
H H -1 H H H H
8.
R Q
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
o
ft
o
ft
o
ft
o
ft
o
ft
o
ft
o
ft
o o
ft
o
ft
o ft o
o
o ft o ft o ft o ft o a
a o a o o o o o o o a o o o
ro
,3:
sr
, 5
s
5 A
s
A
s
A
s
'T3
>
I D
?
In
>
I D
A
s
'x!
? '-a
A
s
A
s
'.Q
>
1
A
s
1^
A
s
1
^
1
A
s
1
g
c
g
1
s
e
s
e
s
e
s
e
s
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
5 S
ft ft ft ft ft ft ft ft ft ft ft ft
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
BJ
g
Bj p
g
s s s
EJ
g
s s
g
BJ
3 3 3 3 3
s
3 3 3 3 3 3 3 3 3 3 3 3
o
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
o o
o
X
: j
X
: j
X
5
X
5
X
zj
X
z|
X
3
X
=1
X
3
X
=1
5
X
5
X
z|
X
g
X
: j
X
=1
X
zt
^
^
o o o
o o
o
g
3.
3
I I
IE
3
m
5
IE
3
m
5
IE
3
m
5
l i
3
I I
IE
I I
5'
1^
3
m
5
IE
3
I I
IE
I I
i f
3
I I
I I
tm o DO o
o a
- I 2.
.> u
3 5
> U > l-r
"= S
> L-
3 5
"= S
> U
3 5' 3 5'
> U
3 'E
>
3 5"
"= s:
"= 5 "= 5
> V
s
Cl
2
I
I E
3
m
5
I E
3 ^
2
o
2
o
3
2.
5
I E
o a o a
3
I I
I E
I I
5
n
4 Cl
s. 5
3
I I
I E
3
2
5
I E
3
2
5
IE
> u
3
I I
I E
I I
I E
11
5
l i
<
71 a.
Cl
o a
g
3-
cr
Cl
2
Cl
2
Cl
I
I
I
I
o
P ft o
o
> u
2
o
> I
.> L. > L > L .> U > U > U > U
3 5 3 5- 3 5'
S
"-- sr
BO
BO
BO
EO
BO
BO
BO
BO
BO
go
EO
X
=1
X
^
X
=1
X
=1
X
=1
X
:1
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
1
I
I I
2
O
2
O
2
O
o a
.> L
3 5'
5 S
BO
EO
go
EO
go
2
5
l i
3 5'
3
2
5
I E
3 5'
3
I I
I E
s
> tr
"= 5
2
5
"= 5
=i
3
6
b
Cl
2
Cl
2
Cl
2
Cl
2
Cl >
ft
3
I I
I E
5
I .
> u
o a
> U
2
o
.> U
3 '5
2
o
2
o
2
o
.> L
2
o
2
o
> L
3 5'
"= 5 ST
go
go
BO
BO
BO
BO
go
go
go
go
go
BO
X
=1
X
=1
X
=1
X
^
X
^
Cl
2
Cl
2
2
5
3
I I
o a
2
o
> L
H a
o
o
3 '5
'"z 5
EO
go
I
go
go
3
I I
> L
S
3 5
o a
> U > V
I I
5
B E
> u
3
2
5
I E
3
2
5
I E
"= s
3
2
5
II:
o a
> l r
o ft
> l-r
11
5
IE
& to
2
5
> V
Cl
2
Cl
2
>
a
o
3
2
5
I E 5 .
I
I
I
I
2
o
2
o o a o a
3 5' 3 5 3 5'
2
o
.> U
i 's
go
BO
EO
EO
go
BO
BO
X
=1
X
^
X
=1
o
o
Cl
2
Cl
2
Cl
2
Cl
2
1
Cl
2
Cl
2
Cl
2
5 5 .
I
I
I
- I 2
2
o
.> U
2
o
2
o
> U
o
a
2
o
2
o
2
o
o
o
H
ch
o
o
o
o
o
2
o
o a
2
o
> U
3 5'
s
3 3' 3 5- 3 S
S
3
gJ
3
BJ
3
EJ
3
BJ
3
go
go
BO
BO
go
EJ
3
BJ
3
go
go
go
X
:1
X
=1
X
=1
X
^
I
:i
:
X
=1
X
^
z
3.
o
=1 =1
3
o o
o
Cl cn Cl Cl o Cl Cl Cl - t
2 2 2 2 2 2 2 2 3'
H H H H H
O O O
g
O
o o o
O
o o
s o
3
D
,
,
"
h
t
t
ci
g 3
D
,
,
"
h
t
t
3
D
,
,
5 ci
"
h
t
t
"
G
E
g
ci
i
ci
"
h
t
t
ci
U
c
t
i
H H H - 1
i i ;
I
M
g-
I
M
'
n
t
e
I
M
S
.
w
i
f?
.
w
i
n
t
e
.
w
i
n
t
e
w
i
n
t
e
w
i
n
t
e
.
w
i
3 3 3 3 3 3 3 3 3
A
O
^ A
O
" A
O
- A
O
A
O
A
O
" A
O
^ A
O
I;
A
O
H H H H H H F
-
G
T
o
c
s
G
T
S_
G
T
O
C
S
G
T
O
C
S
cn
O
C
S
ch
O
C
S
ch
O
C
S
-
G
T
O
C
S
F
-
G
T
O
C
S
2 2 2 2 2 2 2 2
ft o ft O ft o ft o ft o ft o ft O ft o ft
o o o
5 5 ,37 A
s
A
s
1^
A
s
1^
g
1^
A
s
1
A
s
1
A
s
G
A
s
c
e
s
e
s
3 3 3 3 3 3 3 3
37 5
s- s: ^
or
^: s ^
5-
^
27
s
ft ft
3 3 3 3 3 3 3 3 3
BJ
EJ
BJ BJ EJ EJ
3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3
A f . t -
5
A
5 5
s
X
5
^
X
5
X
Zj
X
: j
^
X
g
X
5
X
z|
i-l
>-;
i-t i-t i-t i-t i-t i-t i-t
o o
o
g
I I
3
2
5-
IE
3
2
5
l i
s
3
I I
IE
3
2
5
IE
3
I I
IE
3
2
5
IE
3
2
5
l l
H a
i s O ft
o a o a o a i t o a
> lr
3 'E
> L > L
"= 5
> V
% s
> U
"= s
> U > U
3 5 3 5-
> ! r
3 'E
"= S
,> V
% s
> V > v
3 5 3 5 3 5
I
I
3 ^
2
o
o a
'o
BO
rl
3
Cl
2
Cl
2
i
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
I
l i
I
I
I
I
I
I
I
I E
I
I E
I
I
I
I
I E
I
I
I
' t ^
^ 3
. 2
5'
> U
2
o
.> U
2
o
> U
P ft
2
o
2
O
2
o
Cl
H
2
o
'o
> Lr
> L
3 5 3 5 3 5'
o a
> u
5
o a p a o
o
> U > L
p a
> u
3
I
3
gJ
3
gJ
3
go
go
BO
go
go
go
EO
go
BJ
3
go
3
go
go
go
go
BO
BO
EO
X
=1
X
^
X
=1
I
=1
X
=1
3
2
5
IE 5 .
3
I I
l i
3
2
5
IE
3
2
5
H
3
2
5'
IE
3
2
3'
IE
3
I I
IE
3
I I
IE
3
2
5
IE
3
11
IE
3
2
5
IE
3
2
5
IE
o a o a o a o a
> L
I s
o a
.> l-r > ! r
> U
3 5
"= 5
> u
"= 5
3 5'
> lr > l-r > lr
i 'E 3 5 3 'E
"= S
3
I I
I E
3
2
5
I E
3
2
5
I I
3
I I
I E
^ f
3
2
5
l i
3
2
5
I E
3
2
5
1^
o a o a
o ft
o a
> lr .> lr > lr
3 5'
> l-r > Ir
"= 5: "= 5
Cl
2
o
o
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
1
i
I
i
I
I
IE
IE
3
I I
IE
p ft
3 5-
2
o
^
I
2
o
g-'
o
2
o
> U
2
o
> l-r
2
o
> lr
2
O
o
o
3 5'
go
go
go
go
go
go
gJ
3
go
go
go
EO
X
=1
X
=1
X
=1
I
=1
2
> lr
Zl
3
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
>
ft
5
I
I
I
I
I
00 I
p ft
H a
2
o
> lr
o
o
> U
3 5- 3 3'
2
o
^
3
o
a
> lr.
EO
EO
EO
go
go
3
3
3
go
go
3
X
=1
X
^
X
A
I
A
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
I
I
I
I E
I
I
o a
O ft o
o
2
o
2
o
2
o
p ft
o
o
<
p ft
g
I
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
I
I
I
I E
I
I
I i
I
I
2
o
O ft
2
o
M a
o
o
o
o
2
o
o
o
p ft
? til
> u
.> lr
3 5-
.> l-r
3 '=
> u
3 'E
.> u
.> Ir .> U > lr
3 5
go
BJ
3
BJ
3
go
go
EO
gJ
3
BJ
3
BO
go
go
BJ
3
go
gJ
3
go
BO
go
go
go
go
BO
BJ
3
X
:1
X
=1
X
^
X
=1
X
:1
Cl
2
Cl
2
I
I
I I
l i
2
o
I I
_| o
-n CL
3
i s
D
&
3
I I
IE
it
g 8
m -o
> Ir
3 5
3 :
o a
H 2
J I CL
i l
g 9
3
2
3
l i
%
o a
3
2
5
IE
it
3
2
5
IE
3
2
5
IE
3
2
3-
I I
o a
p o 9
> U .> L > L > lr
3 5
"= 5
> L
3 'E
> l-r
3 5
> I
> L > lr
"= S
go
go
I
=1
3
2
3-
I I
3
2
3
IE
11
5
IE
3
I I
IE
f l
l i
11
5
IE
ff ff
o a
3 5' 3 5
% 5
> l r
3 3' 3 3'
. > l-r
3 'E
> lr
.> L > 'r-
3 'E
"= S "= S
.> lr
"= s
> '-r
3
I I
I E
ff
3
2
3
IE
3
2
5
I E
3
I I
I E
3
2
3'
I E
3
11
I E
3
I I
I E
ff .
3
2
5'
I E
3
2
3
I E
ff
3
2
5
I E
3
2
3
l i
o a o a p ft i t
g
o ft
> l-r
3 'E
o ft
> lr
3 3'
H G
i s
> l-r
3 'E 3 5
> l-r
"= 5
> Ir
3 5' 3 5
"= 5 "-. S
3 5
"= ST
^ to
"= 5
. > l-r
3 'E
"=
> lr
"= 5
Cl
2
Cl
2
I
I E
I
I
2
o
2
o
o
o
O ft
o a
g
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
I
I
I
I
I
I E
I
3
2
5
I
I
I
I
I E
I E
I
2
I I
2
o o
o
2
o
2
o
2
o
2
o
2
o
3 8
2
o
2
o o
o
o
o
o
o
.> u
3 '3
> lr > lr
> L
> I .> l-r
g 9
> U
> I
> u
.> l-r.
3 3' 3 3' 3 3' 3 '3
> U
3 '3
s ?
EJ
3
go
go
EO
EO
BO
go
go
go
go
s
go
go
go
go
go
go
go
go
BO
BO
EO
go
X
=1
X
=1
I
4
X
: ]
X
=1
I
=1
X
:|
X
n
3
I I
IE
3
2
5
IE
3
2
3
IE
ff . ff .
3
2
3'
I E
3
I I
IE
3
2
5
IE
3
2
5
I ?
p ft o a
? ^
> l-r
3 5
"-. S
> L
.> l-r > lr
"= S
> t
5
> lr
> u
.> lr
3 5 3 5
"= ZT "= S
3 'E
"= sr
.> l-r
S
> lr > lr
"= s
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
Cl
2
2
3
I
i
I
I
3
2
5
2
o
2
o
2
o
o
o
o a
2
o
2
o
2
o
A G
> lr
> u
?
? t > u
3 3' 3 5
go
go
Bo
BO
BJ
3
go
go
go
go
BO
X
:1
X
=1
3
I I
> I > lr
3
2
5'
.> l-r
3
2.
5
3 'E
3
2
5
I E
o a o a
3
2
5
I E
3 5
3
2
3
3 5
2
3
l i
o a
3
2
3
IE
3
2
3
IE
3
2
5
3
11
IE
11
3
I I
IE
ff
I I
5
IE
ff ff
3
I -
I I
3
2
3
IE
p ft o a
> l-r
3 5
o a o a o a o a
3 'E
.> lr
3 'E
> l-r
3 3 3 'E
> V
3 'E
> lr
"= S
"= s
"-- ^
"-. 5
g ^
3
2
5
i f
I I
I I
3
2
3
IE
3
2
3
IE
3
11
i l
3
2
3
IE
3
I I
IE
3
2
3
l i
3
2
3
IE
ff
3
2
3
IE
11
era o on
O r.
p ft
-t 2
3 5' 3 5
.> lr
3 5'
"= S
g 9
^ ^
> lr > lr > I
3 3' 3 3'
00
i
6
j>
NJ
"
. UJ
o o
i i i i
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2
H H H H
+ O
6
0
o o
o
ci ci ci ci ci ci ci ci ci ci
H H
^ ^
V P P. ? P V "P p p ?
3 U
J
S
3
s
m
s
m
s
m
U
J
S
s
m
3
s
m
S
a a
C! Q
a
g.
a a
R
ft ft
c
t
l
ft ft ft ft
=^ =^
3 - 3 - =1" 3 ' 3 - 3 - 3 - : r
3' 3' 3' 3' 3' 5' 3' 3' 3' 3'
ZT ZT S 5 ZT ZT 5: ? ZT ?
ft ft
3 3 3 3 3 3 3 3 3 3
BJ BJ EJ EJ gJ BJ BJ BJ
3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3
X
5
X
5
X
zj
X
3
X
3
X
5
^
I
3
X
3
X
z|
^ ^
I -t I-t I-t I-t I-t I-t I-t I-t I -t I -t
o o o o
0 0
o o
0
o
o
o
,=
o
,= ': ,= ,= ,=
'Z
S g 1
':
i
"
W
g
1
i
w
"
W
g
m
i i i 6
' = '= ,= '= ' = '= '=
6
o
i
!^ :^
i i j i
M
"
NJ NJ
^ ^
^
^
^
o
i i i i
Cl Cl Cl Cl m Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H
^
H
+ +^
o o
g
o o
o
g
g
o o
S
ci ci ci ci ci ci ci ci ci ci ci ci ch ci ci
H H
^
E
T
p
-
f
f f f f
"P. ? p. P ? p p "P p ? p ? ? ?
s
m
s
m
s
m
s
m
U
J
S
s
m
U
J
S
3 U
J
S
s
m
s
m
3
s
m
s
m
s
m
o
a a a
Q
a
R
a
5
a
S
a a a a
C3
ft ft ft ft ft ft ft ft ft ft
s
ZT ZT ZT ZT
s
ZT ZT ZT ZT ZT S
,^ =^
=r 3 - =1" , 3 -
=>"
3 - = r
^
3 - 3 - =r = r 3 -
5' 3' 3' 3' 5' 3' 3' 3' 5' 3' 3' 3' 5' 3' 3'
S S ZT 5 ZT ? ZT ZT ZT 5 ZT ZT ZT ZT ZT
ft ft ft ft ft ft
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
EJ gJ
BJ BJ
EJ BJ BJ EJ EJ BJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
o
I
z]
I
Zj
X
Zj
X
Zj
I
Zj ^
X
3
X
5
I
z|
X
z|
I
zj
X
3
X
z|
^
X
Z|
^ ^
-t I-t I-t I-t I -t I -t I-t I-t Ht I-t I -t I-t I-t I-t I-t
o o o o o
o o o o
i i
o
2 2 ^ ^ ^ ^ *t
J ^
t
i g d i S d d d d
1 1
d
i
i i ! t i i i i i * i i>;
,= ' = '= ' = '= '=
'-- '= ' = '= '= '= '=
J i A t i f i A g
M
%
i i i i A
NJ NJ NJ N,
^
^ ^ ^ ^
^
^
$ ^ ^
o o
CD O 0
o o
0
o
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl CD Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H H H H H H H
^
H - 1 H
O O O O
g
O O
o o
CD O
g g g
CD CD CD
S
CD
g g
o
ci ch ci ci ci ci ci ci ci ci ci ci ci ci ci ci Cl ci ci ci ci ci ci
H H H -H H
^
H
E
T
H
t
e
l
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
<^
Q
a
Q 0 G Q
a a a
Cl
a
G Q S
a
G
a a a a
G G
ft ft ft ft ft ft ft ft ft ft ft !
P
ft ft ft ft ft ft ft
ZT ST ZT ZT ZT ZT ZT ZT 5' S ZT ZT ZT ZT ZT 5 ZT ZT ZT ZT ZT ZT ZT
3 ' 3- =r 3 ' =r 3 - 3 - 3 - 3 - 3 - 3 - 3- 3- 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
3 3 3 3 = j D 3 = j ' 3 ' u' 3 '
D'
=>
3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 '
ZT ZT ZT ZT ZT S
s
S S S
ft ft ft ft ft ft ft ft ft ft ft ft ft ft I
P
ft ft ft ft
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
S
EJ gJ
EJ EJ
BJ BJ BJ gJ gJ
gJ gJ BJ BJ
EJ EJ BJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
0
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
o o o
g g
o
X
5
X
3
X
z|
X
3
X
Zj ^
I
5
I
5
5 1
X
: ]
X
zj
X
Zj
X
zj
^
X
g
X
zj
X
5
X
zj
X
zj
^ ^
X
5
^ ^ ^ ^
o o o
CD
o o
CD
o o
CD
o
CD O CD CD
o
CD
o
CD
o
CD
CD
A.
g 6
5
% "1 ^ ^
6
^ 1
"2 8
d d d d d d d d d d g
1
d
1
d d W d d
1
':
W
g
i i j ri i i t . i i i i i i A i i i i i i i i i i
' =
=
'= '= '= '= ' = '= '= '=
=
'= '= '= ' = '= '--
=
'= ' =
'--
,| '=
Cl
2
G_
S
go
Cl
2
Bo
X
zt
S
i i i i i i i i i i i i i i
!&
i i 6
^
" "
NJ NJ
"
^
^ < ^
$ $
0 0
CD 0
J i
Cl Cl Cl <n Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H H H - 1 H H
o o
CD
o
O 0 0
o
O CD
g
0
g g g g
O 0 CD
CD
g g
ci ci ci ci ci ch ci (h ci ch ci ci ci ci ci ci ci ci ci ci ci
H H H H H
^
H H
E
T
E
T
t
e
l
P ? p. P P ? p P ? ? p ? ? V V V V ? V P p
s
m
s
m
U
J
S
U
J
S
3
s
m
s
m
s
m
s
m
s
m
s
m
U
J
S
U
J
S
U
J
S
U
J
S
U
J
S
U
J
S
!
U
J
S
!
3 L
U
S
I
i
s
m
o
Q 0
s. s.
G G G G 8 G
a
G
a
G G G G G G G G
ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft ft
3' 3: ZT ZT ZT ZT ZT ZT 5' ZT ZT ZT ZT ZT ZT ZT ZT ZT ZT ZT
3 " | 3 - 3 " , 3 - 3 - | 3 - 3 - 3 - 3 ' 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
3_ 3 3 3 3 3 3 3 3 ' 3 ' 3 ' 3 ' 3' 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 '
ZT ZT ZT
s:
ZT ZT ZT ZT
s: ^
S
ft ft ft ft ft ft ft ft ft ft ft ft ft ft
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
S S S
BJ EJ EJ
BJ BJ BJ
BJ BJ BJ EJ BJ
EJ EJ
BJ
BJ go
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
CD
J i
X
zj
X
zj
X
Zj
X
Zj
X
Zj
I
zj
X
3
X
3
X
3
X
3
X
irj
X
zj
X
3
X
3
X
5
X
zj
X
zj
X
zj
X
Zj
X
zj
X
zj
^ ^ ^ ^ 5
o o
0 CD 0 0
CD CD 0 0 0
0
0
J
"1
1%
^
l
d
1
d d d d d d d s d
i
d w d d d d d g d
m
't^_ i i t .
i=; i i i ^ i i i i
i t i i . i i i i i i i i 'f-
'A
i i i i i i i i
s
s
i i i i ! t i i i i i i i i i i i
!c.
6 !fc 6
M NJ NJ NJ NJ NJ NJ
^
^5
CD 0
o
CD CD
CD 0
CD
b b b b
f i
Cl Cl Cl Cl Cl
<n
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl CD Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H H -1 H H
CD CD 0 0 CD 0 0 CD O 0
CD CD 0 CD O CD 0 CD
o
CD
g
CD 0 CD CD 0 CD
g
0 CD
o
0
0 0 O 0
g
0 0
o
CD
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci
H H H H H H H H H H H H H H
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
G_
G G_
G_
G_ G G_ G_ G_ G_
s.
G_ G_ G_ G_
fi. fi. fi.
ft ft ft ft ft
C
t
i
ft ft ft ft ft ft ft
ZT ZT ZT ZT ZT ZT
3- ,3- 3- 3- ,3- 3- 3- 3- 3- |3- 3- 3- 3- 3- 3- ,3- 3- 3- 3- 3- 3- 3- 3'
3' 3' 3' 3' 3' 3' 3' 3' 3' 3'
3
3' 3' 3' 3' 3' 3 3' 3' 3' 3' 3' 3
0
ZT ZT ZT ZT ZT ZT ZT
s
ft ft ft ft ft ft ft ft ft ft ft ft
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
EO go
go
EO go
go
EO EO
go go
go
go go go go
go
go
BO go BO
go
go BO
g g 0 0 0
a
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
CO
00 0
X
3
X
Zj
X
zj
X
zj
X
zj
X
3
X
3
5
I
zj
X
Zj
X
Zj
X
zj
X
3
X
zj
X
Zj
X
zj
X
3
X
zj
X
g
X
z|
X
5
X
zj
X
zj
^ ^ ^ ^ 5 ^ ^
CD
0
g g g g g g g
0
f i 0
0 0
B
0
f i 0 0
''t ,=
=
,=
g g g g
g g
g g
g
1
g
g
1 1
g" g g" g
g
% %
<
i i
i.
i i
i ^
t i . i i i i i i i i f i f i f i i i f i f i
<:
' =
:
f i
Cl
2
BJ
3
CD
Cl
3
X
:1
BJ
3
X
=1
BJ
g
X
=1
Cl
2
EJ
3
X
:1
Cl
2
EO
X
^
Cl
2
go
Cl
2
go
o
g
o
f i
s
A f i i ^
NJ NJ NJ NJ
<
^ ^
o o
CD CD CD
b o b
Cl Cl cn Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl cn
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H - 1 H H - 1 H
+
+j
o O o
o O o O O
g
CD o o CD
CD
g
o O
o
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci
H
H H H
^
? ? P ? P p P P P P ? P p P P
s
m
3 U
I
S
U
J
S
U
J
S
U
J
S
U
J
S
s
m
s
m
s
m
U
J
S
U
J
S
U
J
S
U
J
S
U
I
S
o
o
G G G G G G G G G G G G G G G
ft ft ft ft ft ft ft ft ft ft ft ft ft
ZT ZT ZT ZT ZT ZT ZT ZT ZT ZT ZT ZT
3 - 3 - 3 - 3 - 3 ' 3 - 3 - , 3 - 3 - 3 - 3 ' 3 - , 3 - 3 - 3 -
ft ft ft ft ft ft ft fl ft ft
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
gJ
gj
BJ
gJ EJ EJ
BJ
gJ
EJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
g
J i
g
A
CD
CD
X X X I X X X X X I X X X X X
1 :1 =1 =1 ^ ^ ^ ^ 4 ^ ^ ^ ^ ^ ^
o CD CD CD o
CD
to
f .
,= ,= ,= ,= ,= *t ,=
g g
w
d d
i
g
g
i d
w
g g
i
g
ro
f i i i f i f i f t f i f i
f i _
'Z ' I ' I ' I
'-
'= '=
=
'= ' = '= '=
go
X
=1
Cl
2
BJ
3
X
^
Cl
2
8
BJ
3
X
=1
Cl
2
^
I
BJ
3
X
=1
go
X
=1
EO
X
=1
Cl
2
BO
i
X
=1
Cl
2
- I
go
i i f i
*.
to
NJ NJ NJ
UJ UJ UJ UJ
^
5
CD
O
f .
Cl Cl Cl Cl Cl Cl Cl Cl Cl CD cn
2 2 2 2 2 2 2 2 2 2 2
^
H H H
o
CD
o
o
CD
o
g
CD CD
g
O
ci ci ci ci ci ci ci ci ci ci ci
H H H H
?
M
^
w
i
I
M
w
i
w
i
.
w
i
w
,
w
i
.
w
i
.
w
i
? ? p ? ? p ? "P P ? P
s
m
U
J
S
U
J
S
3
s
m
U
J
S
U
J
S
s
m
U
J
S
U
I
S
U
J
S
G G G
fi. fi. fi. fi. fi.
ft ft ft ft ft ft ft ft
3 - 3 - 3 - 3 - 3 - 3^ 3 - 3 - , 3^ 3 ' ?
3' 3' 3 ' 3' 3' 3' 3' 3' 3' 3' 3 '
ZT ZT
s
ft ft ft ft ft ft ft
3 3 3 3 3 3 3 3 3 3
ro
BJ BJ
BJ
BJ
BJ BJ
3 3 3 3 3 3 S 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3
f i f i
g
f .
5 5
o
o o
g X
5
X
3
X
3
X
5
^
X
3
X
zj
X
zj
X
5
X
Zj
X
zj
^ ^
i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t
o
CD 0 CD
g
O
o o
J i
f i
f i
g g g
1
g g g
< <
5
:>
f i f i
'= '= '=
EJ
3
EJ
3
Cl
2
3
X
=1
Cl
2
BO
X
=1
go
X
: j
go
X
=1
Cl
2
go
2
S
o
S
CD
K K
i i i i f i i i i i to i i to to
NJ NJ ND
LU
^ ^
<
^
^5
o o CD
o o
to
to
Cl Cl Cl Cl Cl CD Cl Cl Cl Cl Cl Cl Cl Cl Cl CD Cl Cl Cl Cl Cl Cl cn
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
-H H H H - 1 H H
+
o O CD o o O O
g O O o CD o o
g g g
o o CD o O
CD
g g
CD
CD
o
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ch ci ci ci ci ci
H H H M H H H H H H
^
H H
^ H H
2 2 2 2 2 2. 2 2 2 ro 2. 2 2. 2.
ro
2. 2 2 2. 2 2 2 2
w
i
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
G G G G G G G G G
s.
G G G
fi-
G G G G G G G G G
ft ft ft ft ft ft
s
ft ft
s
ft ft ft ft ft ft ft ft
ZT ZT ZT ZT
3 - | 3 - , 3 - | 3 - | 3 - 3 - 3 - 3 - | 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 ' 3 - 3 - 3 - 3 - 3 - 3 - 3 -
ZT ZT ZT ZT ZT ZT S ?
s
ft ft ft ft ft ft ft
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
S S S
BJ BJ gJ
BJ BJ BJ EJ EJ
gJ BJ BJ
gJ
go BO EO
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to to
to to to o to E E
CD
CD o
o
X
Zj
X
Zj
X
Zj
X
Zj
X
5
X
Zj
X
Zj
X
zj
X
3
X
3
X
5
X
X
zj
X
3
X
zj
X
Zj ^
X
g
X
zj
X
zj
X
5
X
zj
X
g
^ ^
^
^ 5
g g g
o o CD o o o
o o CD CD CD
O
23
to
23
"!
^ ^ ^
.
o
^ z "2 "1
to
=
,5 ,; ^
- - ': ': ': ' = ' = ' = ' = ' = =
g g g g g' g
i
g g g g
w
g
d
g g
d
M i
d
d
g
<
i i f i i i i& f i f . i i i i i i i i f i i i to f i i i f i
' = '= '= '= '= '= '= '= '= '= ' = '= '= '=
= =
'=
=
' = ,=
00
o
M M
!to
f i i i f i i i i i f i to f i f i to i i to
NJ NJ
^
^
^
^
UJ
^ $ $ ^ ^ ^ ^
^5
^
5
^ ^ ^ ^
!5
^
^ ^ ^ ^ ^ ^
o
CD
o o
CD CD
f i to
Cl Cl Cl Cl Cl Cl Cl Cl Gl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl cn
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H M H H H H H H H - 1 H
g
o o o
CD O
o
CD
o o
g g
O CD
g
O
g g
O
g
CD
g
o
o
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci
H H H H
^
M 1
3
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2. 2 2 2
P. P P P ? P P P ? P ? ? ? ? ? ? ? P P P P p
U
J
S
U
J
S
U
J
S
s
m
s
m
U
J
S
U
J
S
U
J
S
s
m
U
J
S
3 U
J
S
U
J
S
U
J
S
U
J
S
s
m
U
J
S
U
I
S
U
I
S
!
U
J
S
!
U
J
S
!
U
I
S
!
L
U
S
I
o
G G G G G G G G G G G G G G G G G G G G G G G
ft ft ft ft ft ft ft ft ft ft ft
a
ZT ZT ZT ZT ZT 5 ZT ZT ZT ZT ZT ZT 5 ZT 5 ZT ZT ZT
| 3 - ^3- 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - ^3- 3 - 3 - 3 - 3 - 3 - 3 - , 3 -
ZT
^
?
s
ft ft ft ft ft ft ft ft
a a
ft
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
S S S
EJ
EJ EJ gJ BJ
BJ EJ gJ
EJ
EJ
EJ
EJ
gJ BJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to
to
X
zj
X
Zj
X
zj
X
z|
X
zj
X
5
X
Zj
X
Zj
X
Zj
X
3
X
Zj
X
3
^ ^
X
3
X
zj
X
5
^
5
^
X
g
X
g
^
^
o o o o
CD CD
o o
o
g
CD
o
CD
o
CD
o
to to
to
CD
to
to to o to
2
w
M
g' g' g d g g d g d d g d g
1
g
i i
d d g
i
ro
i i f i !to. f i to; f i f i f i f i f i i i to f t f t f i f i i t
O O 0 0
to
s
M M
to to !to f i i i i i to f i f i
NJ NJ NJ NJ
^ ^ ^ ^ ^
$ ^ ^ ^
CD
cn Cl Cl Cl Cl Cl cn 0 Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl cn
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H - 1 H H H H - t H H H
+ + +
J o o
g
O o CD CD
o o o O
g
0
g g g g g g
o CD
CD CD
g
o
o
o
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci
H H H H
^
H
^
H H H
^
H H H
f
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
ijo ijo
o
G G
fi.
G G G G G G G G G G G G G G G G G G G G
ft ft ft ft
a
ft
a a
ft ft ft ft
3r 5 S: ZT ZT 3: 3: ZT ZT S 3: 5: 3: ZT ZT ZT ZT ZT ZT 3r ZT ZT
. 3 - 3 - 3 ' 3 - 3- 3- 3 - 3 ' 3 - 3 - 3- 3- 3 - 3 - 3 - 3- 3 - 3 - 3 - 3- 3 - , 3 - 3 -
5 ZT ZT 5: ?
s
S ? ZT 3' ZT 5: ? S 5" ZT ZT
s
3r ZT ZT ZT ZT
ft
a
ft ft ft
a
ft ft ft ft
a
ft ft
a
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
S
BJ BJ BJ BJ gJ
gJ
BJ EJ
EJ BJ
BJ BJ EJ EJ gJ BJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
g
to to to
o to CD
to
o
X
Zj
I
Zj
I
5 ^
X
Zj
X
5
X
5
X
5
X
5
^
X
Zj
X
3
X
zj
X
3
X
zj
I
3
I
zj
X
g
X
5
X
5
X
zj
X
zj
X
g
^ ^ ^5 ^ ^ ^ ^
g g
CD 0 o o CD CD CD CD o CD CD 0 CD o o
CD 0 CD CD o CD 0 O CD CD o
o
to to
5
^2
,= ' = "~;
!
,= ,=
:
,= ~i ,= ,= ,= ,= ,=
^2
g g g g g g
g '= ' =
g' d g g w
g
g
=
g g
i d
g g
g g g
c c c c c c
b r
t
/
1
.
1
1^ U
c c c
U
s
U
c c c
to to to to to to f i f i f i
' =
'_
to
ul ul
o
to !to i i i i i i
NJ NJ NJ NJ
^ ^ <
^
^ < ^
$
o o
0
0
to Ji
to to to to to
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl cn Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H - j -H H H H H H
+
+j
o
O 0 CD CD CD CD 0
g
o
O 0
g
CD O CD O
g g g g g
0 O O CD
O O
g
O
CD CD
ci ci ci ci ci ci ci ci ci ci ci ci ci ch ci ci ci ci ci ci ci ci ci
H H H
^ ^ ^ ^
1^
5
-i 1
3
H H
E
T
E
T
t
e
l
t
e
l
? ? P P ? ? P P P p ? p P P P P P p P P P P P
3 U
J
S
U
J
S
U
I
S
U
I
S
s
m
U
J
S
U
J
S
U
J
S
s
m
s
m
s
m
U
J
S
U
J
S
U
J
S
U
J
S
U
J
S
U
J
S
U
I
S
!
U
J
S
!
U
I
S
!
L
U
S
!
L
U
S
!
^ ^
o
G G G G G G G G G G
fi. fi. fi. fi.
s.
fi. fi. fi.
s.
fi. fi. fi. fi.
ft
a a
ft
a a a a a a
ft ft ft ft
ZT 3:
s s
S 3:
s
ZT 3r 3: 5 ZT ZT ZT 3: 3: 3: ZT ZT 3: ZT ZT 37
3 ' 3 - | 3 ' 3 - 3 - 3 - 3 - , 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
3_ 3 3 3 3 3 3 3 3 3 3 ' 3 ' 3 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 '
3^ 3: 3: ZT ? ZT 3: 3^ ZT ZT ZT ZT ZT
%
ZT 3: 3' ZT ZT ZT ZT 3:
ft
a a a a a a a a
ft
a
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
s
s
BJ BJ EJ EJ EJ
BJ BJ
gJ
BJ BJ EJ EJ
BJ BJ EJ BJ
BJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to to
to !to to
0 CD
to
CD CD
X
Zj
X
Zj
X
Zj
X
5
X
5
X
5
X
3
X
Zj
X
5
X
3
X
5
X
3
X
zj
X
3
X
Zj
X
Zj
^
X
g
X
Zj
X
5
X
Zj
X
Zj
I
5
^ ^ ^ ^ ^ ^ ^
g g
0 0 0 CD CD CD
g
CD 0 CD
g
l
"i 1 *^
^
~^ "1 ~i
CD
" ^
l
to
% l
g d g d
w
g'
d
g' g g g g
d d d d
g
d d d d d d
f t i t f t f t i i to i t
f t f t to f t i t to to i t i t f t to
'-
o 5
i i f i i i f i to
NJ NJ NJ
<
^ $
o O o
o o CD CD
to to
to i i i i
to to to to to to
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl cn Cl cn
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H H
o
g
o
g
O O CD O
o o g o
g
g g g g
CD
g
g
o
CD
ci ci ci ci ci ci ci ci ci ci ci ci ci ch ci ci ci ci ci ci ci ci ci
H
^
H H H
1 ^ ^
IZj
^ ^
H
E
T
2 2 2 2 2 2 2 2 2 2. 2 2 2 2 2 2 2
t
e
l
2 2 2 2 2
I
M
I
M
w
i
I
M
w
i
w
i
w
i
w
i
w
i
I
M
w
i
I
M
w
i
.
w
i
,
w
i
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
o
g
G G G G G G G G G G G G G G G G G G G G G G
fi.
ft ft
a a a a
ft
a
ft
a a
ft
c
t
ft
a
ft
a
3:
3 " | 3 " | 3 - 3 - | 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
s
3: 5:
ft
a a
ft ft
a
ft ft ft
o
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
S S S S S
EJ
gJ
gJ gJ
BJ
BJ
BJ
EJ EJ BJ BJ BO
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to
o to to
g
X
Zj
X
zj
X
zj
X
zj
X
Zj
X
Zj
X
zj
X
zj
X
3
X
Zj
X
3
X
zj
I
3
X
5
X
Zj
X
g
X
zj
^
X
Zj
X
zj
X
zj
^
X
Zj
^ ^ ^ ^ ^ ^ ^ ^
i-l i-t I-t I-t I-t i-t i-l i-t i-t i-t i-t i-t i-t i-l i-l i-l i -l i-" i -l i-l M i-l i-*
g g g
o o CD CD o
CD o CD 0
to to
-to
to o CD
5
CD o
=
% " ] '"1 ""t to "2 '"t
g' d
w
g' g g g g'
1
g g
1
d g g
d
1
w
g g
' =
d
w
g
ro ro
!to f i i t f t f t f t
' = ' = '=
= =
' =
=
'=
'-- ' = '= '= '= '= '= '= '=
= =
,=
'= '!
S
i i i i f i i i f i i i to i i
NJ NJ NJ
^ ^ ^
^ ^ ^ ^
0
CD CD
i i to to i i i i to
Cl Cl Cl Cl Cl Cl Cl Cl cn Cl Cl cn Cl Cl Cl Cl Cl Cl Cl cn
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
zi -1 H H H
+ + + +
o o 0 o 0 O CD
o o
g
o o CD O CD
g g g g
O
o
g
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci
- t H H H
'^ ^ ^
1
2
^ ^
E
T
E
T
t
e
l
P. P P P P P ? ? P P p p p P P P P P P P
3 U
J
S
3 U
J
S
s
m
s
m
U
I
S
U
I
S
U
J
S
U
J
S
U
I
S
U
J
S
U
J
S
U
I
S
U
I
S
U
I
S
s
m
i
s
m
L
U
S
!
U
J
S
!
fi. fi. fi.
G G
1
G G G G G G G G G G G
fi.
G
ft ft ft ft ft
a a a a
ft ft
a a
ft ft
a
3: 3: 3r 5 ZT ZT 3: ZT ZT 3' ZT ZT 5 3' 3: 3:
3 " | 3 - , 3 - | 3 - | 3 - 3 - 3 - 3 - | 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
5^ 3' 3' 3' 3' 3' 3' 3' 3' 5' 3 ' 3' 3' 5' 3' 3' 3 5' 3' 3'
? ZT 3Z 5 5 3: 3' 5: 5: 5: 3: ZT 3: 5:
ft ft ft ft
a a
ft
a
ft
a
ft ft
a
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
S S S
s
EJ EJ BJ BJ BJ EJ
BJ BJ gJ gJ EJ EJ EJ BJ EJ EJ EJ go
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to
X
Zj
X
Zj
X
Zj
X
Zj
X
Zj
X
zj
X
5
X
3
X
3
X
3
X
Zj
X
5
X
Zj
X
zj
X
5
X
zj
X
g
X
g
X
5
X
zj
^ 5 ^
i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t
g g g
0 CD o CD 0 o CD CD
o CD 0 0
0 to 0
5
to CD CD to to
"2 "2 ~^
to
2
=
^ "! ^ 1 2 ^
g g g' g' g'
w
g d g g' g' g d g
d d
g
d
g'
w
<^
i;:; H; j : ; j :; j :;
i j i ] ;
g
i -l i -l i -l
i -l
<^
i - l i -l
f i to i i i t f t f t f t f t f t f t f t f t f t to i i f t i t to to f i
'= '= '= '= '= ' = '= '= '= ' =
, ]
'= ' =
go
Cl
2
go
Cl
2
EJ
3
EJ
3
X
=1
s
to
s
i i to to
NJ NJ NJ
"
NJ
Ul
^ ^ ^
^
$ $ ^ $ ^
o
o CD
to to
to CD
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl cn cn
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H H H H H
+ +
0 O O CD O 0 CD
g
0 O O
g
o CD o
g g g
O o O
CD CD
g
CD
CD
Cl Cl <n Cl Cl Cl Cl cn Cl cn Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
H H H H H H H H H H H H
5
H
P. P P ? ? ? ? ? P P P ? ? P p ? P P P P P P P
U
J
S
s
m
s
m
s
m
U
J
S
U
J
S
U
J
S
I
U
S
U
I
S
U
I
S
U
I
S
L
U
S
U
I
S
s
m
U
J
S
U
I
S
s
m
U
I
S
U
I
S
s
m
U
J
S
I
U
I
S
!
3
fi.
G G G G G G G G G G
fi.
G G G G G G G G G G G
a a a
ft ft
c
t
i
c
t
i
ft ft ft ft ft
a a
ft
a
ft ft
3: ZT ZT 5 5 ZT 3: 5: 3' ZT ZT
s
3: 3Z S 3: 3: 3: ZT 5
3 - . 3 - 3 - | 3 - 3- 3- 3- 3- 3 - 3 - 3- 3- 3 - 3 - 3 - 3- 3- 3 - 3 - 3 - 3- 3- 3 -
3Z
s
3: ? 3: S
a
3
a
ft ft ft
a a
ft ft
a
ft ft
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
EJ EJ EJ EJ EJ BJ
gJ
BJ go BJ BJ EJ
BJ
EJ EJ BJ
EJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
0 o
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to to
X
Zj
X
Zj
X
3
^
X
5
^ ^ ^
X
3
X
zj
X
Zj
X
zj
^
X
Zj
X
Zj
X
3
X
zj
X
5
^ ^
X
5
X
5
X
g
^ ^ ^ ^
^
g
0
g
o
CD
g
CD
o 0
o Q
CD o 5
g
CD to to
to
"l ,- ,=
'Z
"1 *t ,= ,= ,= ,= ,= ,= ,= ,=
';
g' g' g'
w
g g g d
':
w
g
g g'
d d d
w
d d
g
g g g g
f i f i i t i t i t i t to i t i i i t i t
f t
,= ' = '= '= '= '= '=
:
'= ,= '= ,= '= ,= '= '=
=
'=
=
'= '= '=
to o
i i i i f i !to i i to i i i i to to
NJ NJ NJ NJ
LO U l LO U l
^ ^ ^
0 CD
o
b b
g
b b
cn Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
-H H H H H H H
+
O
o o o
CD CD
o
CD O
o
O O
o o o
g g
O CD O CD
g
O O
CD
o
ci ci ci ci ci
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci
H H H
^
H H H H H H H H H H
^
H H H H H w
I
M
w
i
w
i
w
i
I
M
I
M
w
i
w
i
|
M
w
i
w
i
I
M
'
I
M
'
I
M
'
!
'
.
w
i
w
i
? p p ? P P ? P ? p p P P P P p P p ? P P p
L
U
S
s
m
U
I
S
U
I
S
U
J
S
U
I
S
J
U
S
L
U
S
U
J
S
L
U
S
U
I
S
U
I
S
L
U
S
I
U
S
U
I
S
U
I
S
U
J
S
U
I
S
U
J
S
U
I
S
U
I
S
U
J
S
!
3
G G G G G G G G
fi.
s.
fi. fi. fi. fi. fi. fi. fi. fi. fi. fi. fi.
ft ft ft ft ft
a a a
ft ft
a a a
ft
a
3Z 3Z ZT S ZT 5:
s
3 - ^3- 3 - 3 - | 3 - 3 - 3 - 3 - 3 - 3 - 3 - ^3- 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
3' 3' 3' 3' 3' 3' 3' 5' 3 ' 5' 5' 3' 3' 3' 5' 5' 3' 3' 3' 5' 3' 5' 3'
o"
? ZT ZT ZT ZT ZT ZT ZT ZT ZT ZT 3" 5Z ZT ZT 3Z ZT ZT 3Z 3Z
ft
a
ft ft ft
a
ft ft ft
a
ft ft
a a
o
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
EO BO EO EO go go go BO BO BO EO go EO EO go go go go BO go go go BO
o
O O CD CD CD O CD 0 0 O D o o CD CD CD CD CD O O O
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
0
o
CD
o o
to to to to to
0
o
X X X X X X I X X X X X X X X X X X X X X X X
=1 ^ Zi =1 Zl
T
T
T
T
^ ^ ^ ^ 4 ^ ^ ^ ^ ^ ^ ^
T
T
^
T
T
^
i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i^ i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t I-t
CD
o
0 0
o
CD
o
CD CD
to
to CD
,: ,: ,= ,: 2 ,=
d g g'
d d d d 1 d d
g
d d d d
: :
d d d d d
g g g
r r !-* r r r r
to to f t f i f t f t to to i t to ^
f t
=
'= '= '= '=
= =
'= '= '= '= ' = '= '= ,= .':
=
'= '= '=
=
,=
BJ
3
1
EJ
3
Cl
2
EO
EO
X
=1
go
X
=1
Cl
2
BO
X
4
EO
X
=1
EJ
3
BJ
3
Cl
2
BO
Cl
2
go
to
to
i i i i to
NJ NJ NJ NJ
LO UJ LO UJ
o O
CD
b b b
cn Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2
-H H H H H H
+ +^
O O
o o O
g
g
O o O
O
O o
o
ci ci ci ci ci ci ci ci ci ci ci ci
H H H H H
^
w
i
I
M
w
i
w
i
w
i
? p ? ? ? P P ? P P ? P
U
I
S
U
J
S
s
m
L
U
S
U
J
S
U
I
S
U
I
S
U
J
S
U
I
S
s
m
U
I
S
U
J
S
fi.
G G G G G G G G G G G
ft
a a
ft
a a
ft ft
a
ft
ZT 3" 3' ZT ZT ZT S ZT 3' ZT
| 3 - 3 ' 3 - 3 - 3 - 3 - 3 -
'3-
3 - 3 -
s
3 -
c
t
i
a a a
fl
3 3 3 3 3 3 3 3 3 3 3 3
EJ gJ
BJ BJ EJ
BJ
BJ EJ EJ
3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3
g
to to
to
I
Zj
X
Zj
X
5
5
X
g
X
Zj
X
Zj
5
X
zj
X
3
^ ^
^ ^
o o o
o CD
CD
O
to
,=
=
^ t
1
1%
' i ' t
CD
d g
g 1 g g g g g g g g
f t
to i i to f i f i i i to
'= '= ' =
=
'=
=
2
i i i i i i i i f i f i
NJ NJ NJ NJ NJ NJ
^
o
CD
CD
o
0
o
o
CD
o
Cl Cl Cl Cl Cl CD Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl CD Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H H H H
Q o o o
O 0
o o
CD CD CD CD CD
o
O
g g g
0 0
o
O O
g
0
Q
O O
g
CD CD
0
3
g
O O
o
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci
"
G
E
T
/
ci ci ci
d
H
m
d
m
d
H H H
^
5
^
H H
5 5
^ ^
m m
d
H
"
G
E
T
/
^
5
^
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
o
g
o
G
fi.
G G G G G G G G G
fi.
G G G G
g.
G G G G G G
ft
a
ft ft ft ft ft ft ft
C
t
i
a a a
ZT
s
3Z 3Z 5Z 3Z ZT 5 3: 3' 3' ZT 5Z ZT S ZT 3Z ZT 3Z ZT ZT 3Z ZT
| 3 - | 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 r 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
ZT
o
ft
a
ft ft ft ft ft ft ft
a
ft 3
a
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
go go
EO
go
go
go go go
BO
Bo
EO EO go go go go BO go go go go go go
CD CD o CD O O 0 0 0 o a o CD CD O 0 O CD O CD CD CD CD
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to
0
o to
o o
o o
I X X X X X X X X X X X X X X X X X X X X X X T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
^
T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
T
T
P
/
^
T
T
P
/
8
CD CD
o
o
8
o o o o o
to
o
o o
,= ,= ,= ,= ,= ,= ,= ,= ,= ,= ,= ,= ,= *t ,=
g g 1
d d d d d d d d 1 d d d
g
d d d
d
d
g
d d d
2
^
5
^
5
^
'5
'^ ^
5. '2 '5
^ ^
2
2
'^
2
I - l
1-^ M M M M 1 - 1 - M M 1 -
I - l
i - i-^ i -l 1-^ i -l i-^ i -
r
i -l I - l
r
to to to to to to to to f t i i to
= =
' = '= ' = '=
'Z
' = '= '= '= '=
=
'= '= '=
=
'= ,] '=
=
,=
to to
o o o
Q
5
CD
i i to f i i i i i i i i i to to
" "
NJ NJ NJ
UJ UJ UJ UJ
o o
0 0 CD
o
o
CD CD
o
y? S? K" y? y? y}
Ul
y?
Ul
y? y? y? y? y? y?
to
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl cn Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
- t H H H H H H
o
O
o
O
o o
CD CD O 0
CD
o o
CD
o
g
0 0
O
g
o
O
o o
0 0
o
CD
g g
0
ch ci ci ci ci ci ci ci ci ci ci ci ci ci ch ci ci ci ci ci ci ci ci
H
^ ^
H
^ ^ ^
E
T
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
G G G G G G G G G G G G G G G G G G G G G G G
3 3 3
a
3
a
3 ft ft ft 3 3 3 ft ft 3
S S 5' 3Z 3: ZT 3Z ZT 3: 3Z ZT ZT 3' 3Z S 3Z S 3Z ZT ZT 3Z 3Z
| 3 - | 3 - , 3- | 3 - | 3 - 3 - | 3 - | 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
3 3 3 3 3 3 3 ' 3 ' 3 3 3 3 ' 3 ' 3 ' 3 ' 3 ' 3 3 ' 3 3 ' 3 ' 3 ' 3 '
3' 3Z 3Z 3' 3: 5Z 3' 3Z 3' 3" 3'
3 3 3 3 3 3
C
t
i
a
ft ft 3
C
t
l
3 3
c
t
i
ft
a
3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
BO
go go Bo go
BO EO EO EO EO go go go go go go BO EO EO go go go go
CD O CD CD CD 0 CD 0 CD CD 0 CD 0 0 0 0 0 g O CD o CD a
0
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to
o
0
3
X
3
X
5
X
zj
X
3
X
zj
X
Zj
X
3
X
3
X
3
X
Zj
X
3
X
zj
X
zj
X
Zj
X
3
X
3
X
Zj
X
3
X
Zj
X
zj
X
zj
X
zj
X
5
^ ZS ^ ^ ^ ^ ^ ^ ^
i -l
^
M
^
M M
^
i -l i -l i -l i -l i -l M
^
i -l
^
i -l U M u M i -l
^
o
CD CD
o o
0 0 0
o
0 0 CD CD 0 CD
o
0 CD CD CD O
o
0
o
to
CD 0
o
UJ CD
"l
2
t ~i
to
^ "2 2
~!
l
O
E
; : = = = = g = = = = = = = =
1
g g g g g g
d
g
w
g'
w
g g g g
1
g"
w w
g
g
i - l i -l
i-"
i -l
i ];
i - l i - l i -l
j:;
i -l i - l I - l i -l i -l i -l
i - l i -l i - l i -l
i -l i -l
f i !to i i i i t !to i i to to i i to
to to to
to to
^ to o
Z
Z
Z
Z
N J
f i f i f i !to to !to
N J N J N J N J N J N J
U J
^
^ ^ <
^
^ ^ ^
CD O o o o
% % to
Cl Cl cn Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H H H H H
g
o o O o CD 6 O
o
g g
o o
g g g g
o
g g
CD CD
g
o CD
o CD
o o
o S
Cl Cl Cl Cl Cl CD Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Ct Cl cn Cl Cl Cl
H H H H H
^ ^ ^ ^
1
2
H
w
i
W
i
|
w
i
w
i
w
i
I
M
w
i
w
i
w
i
I
M
w
i
I
M
I
M
I
M
I
M
'
w
i
w
i
.
w
i
.
w
i
.
w
i
w
i
.
w
i
P. p p. P P. P p ? P P P ? P P ? P P ? ? p p P ? P
U
I
S
U
I
S
U
J
S
U
I
S
U
I
S
I
U
S
U
I
S
U
I
S
U
J
S
L
U
S
U
J
S
U
J
S
s
m
U
I
S
U
J
S
U
I
S
U
I
S
U
J
S
U
J
S
s
m
U
J
S
!
i
s
m
U
I
S
!
L
U
S
I
<^
fi. fi. fi. fi.
s.
G G G
fi.
G G G G G G G G
fi.
G G G
S,
G G
ft ft ft !
P
ft
a
3
a
ft
a
3 3 ft
a
3 3
a
3 ft 3
s
ft.
ZT 3Z 3' 3" ZT 3Z 3Z 3Z 3Z ZT ZT 3Z 3Z 3Z 3Z ZT ZT ZT ZT ZT 3Z 5
| 3- 3 - 3 - 3 - 3 - 3 - 3 ' 3 - 3 - 3 ^ 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
5' 5' 3 3' 3' 3' 3' 5' 5' 3' 5' 3' 3' 5' 3' 3' 3' 3' 5' 3' 3' 3' 5' 5'
5Z 3' 3Z S 3Z 3Z 3' 3Z 3' S ? 3Z 3'
ft ft
a
3 3 3
a
3
a
ft 3 3
a
ft ft
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
S S S
EJ EJ EJ
gJ
BJ EJ EJ
BJ BJ EJ EJ EJ EJ BJ BJ EJ BJ BJ BJ EJ
3 3 3 3 3 3 3 3 3 3 3 3 B 3 3 3
3
3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
o o o to
o CD to
o o
CD
X
3
X
3
X
3
X
5
X
Zj ^
X
3
X
z|
X
3
X
3
X
3
^
X
Zj
X
g
X
Zj
X
zj
X
5
^
X
Zj
X
zj
X
z|
X
Zj ^
X
Zj
o o o CD
CD CD o
g g g g
o
to
s
to
CD
g g g g g g g g g g g g g g g g g g
<
g g g
m
< <
!to !to f i f i i i i i f t i t
to
,=
to to
8 to to
i i f i f i i i
to
NJ
" "
NJ
^
^ ^ ^
<
^ ^ $ $
o o
CD
CD
o
i i to
g g
to i i
Cl Cl Cl Cl Cl Cl Cl
cn
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
- 1 -H H H H H H H H
+^ + +
g
O O CD
g
o o
0 0
g g g g g
O CD CD
g
g
CD CD
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci
H H H H H H
^
H
^
t
e
l
t
e
l
P. ? P P. P ? P ? P ? P P ? ? P P P P P P P P ?
U
I
S
I
U
S
U
J
S
U
J
S
L
U
S
3 U
I
S
U
I
S
U
J
S
U
I
S
U
J
S
U
I
S
L
U
S
U
I
S
3 U
I
S
U
I
S
U
J
S
U
I
S
I
3
i
s
m
U
I
S
!
U
I
S
!
G G G G G
fi. fi. fi. fi. fi. fi. fi. fi. fi. fi. fi. fi. fi. fi. fi. fi. fi. fi.
ft
a
3 3 ft
a
s
a
3
a
3 3 3 3
a
3 3
3: S S 3Z 3Z ZT ZT 3Z 3Z ZT 3Z ZT 3' ZT 5 ZT ZT 3' 3:
| 3- ,3- 3" | 3- | 3 - , 3 - , 3 - , 3 - .3- 3- 3- 3 - 3 - 3 - 3- 3- 3 - 3 - 3 - 3- 3- 3 - 3 -
3 3 3 3 3 3 3 3 ' 3' 3' 3' 3 ' 3 ' 3 ' 3' 3' 3 ' 3 ' 3 3' 3' 3 ' 3 '
3' 3Z 3Z 3Z 3' 3Z 3: 3Z 3Z 3' 3Z
a
3 3
a a a
3 3 ft 3 3 ft
a
3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
S S
BJ EJ EJ EJ EJ gJ
BJ BJ EJ
BJ gJ
gJ
BJ EJ EJ
BO
3 3 3 3 3
g
3 3 3 3 3 3 3 3 3 3 3 3 3 S 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to
o to
CD
0
0
X
zj
X
Zj
X
3
X
5
X
Zj
X
zj
^ ^ ^
X
Zj
X
zj
X
zj
X
zj
^
X
g
X
3
X
zj
^
X
Zj
X
z|
X
zj
X
zj
I
zj
^
g
^
I-t i-t i-t i-t i-t i-t i-t i ^ i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t
g
o
CD 0 CD 0 CD 0
CD 0 0 0
to
to to
% % ,= l
1 ^
% 2 2 % l ~i ,= 2 l "2 "2
g'
d
g g g g
g
d
d
d
d
g
d
g'
d
g
d d
'
"
W
g
d d d d
f i i i i i f i i i
to
=
i i i i
i t
f .
to
f i i i i i i i f i f i
=
i i i i
to i i
=
'= ' =
=
'--
'= '= '= '= ' = '= '= ' = ' =
=
Cl
2
fi,
ft
EJ
3
o
g
Cl
2
BJ
3
EO
EO
Cl
2
EO
to
8
i i i i f . to i i j i i i i i to to !to
NJ NJ
"
NJ NJ
^ ^
< ^ ^ $ ^ ^
CD CD
j i i i !to !to i i
to
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl cn Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
-H H H H H H H H H
+ +
O O 0 6 CD O 0
o O O o CD 0 o
g g
o O CD o 0
O CD
g
o
CD CD
3
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci
H
^
H H M
5
m
5 5
H
^ ? !^
B
1
2
'B
1
2
IB
1
2
B
1
2
B
1
3
te
l
P P P P ? ? P p ? ? ? P P P P P P P P
U
IS
U
IS
U
J
S
U
IS
U
IS
U
IS
U
IS
U
IS
s
m
U
J
S
U
IS
U
IS
3 U
IS
U
J
S
U
J
S
U
I
S
i
U
J
S
!
i
s
m
G G G G G G G G G G G G G G G G G G G
a
ft
a
ft
a
3 ft ft ft 3
a
3: 3Z 3Z 3: 3Z 3Z ZT 3Z 3Z
s
3Z 3Z ZT 3Z 3Z 3Z ZT 3: 3Z
3 - 3 - 3 - , 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
3 3 3 3 3' 3 ' 3 ' 3 ' 3 ' 3 3 ' 3 ' 3 ' 3 ' 3 3 ' 3 3 ' 3
^
f f
0
0
0 0
ZT 3Z ZT ZT 5Z ZT 3Z S ZT 3Z 3Z 3Z 5Z 3Z
ft
a
ft 3 ft
a
ft ft
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
S S S
BJ BJ
BJ EJ
BJ EJ EJ gJ BJ
EJ EJ BJ BJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
"jj-
^ ^
-
<^
- - -
n- o- D- n- o-
-
a. Q- ij;-
^
to to to to
to to
CD
X X X X X X X X X X X X X X X X X X X
=1 =1 ^ 1 =1 =1 =1 :zj zzj =1
T
T
I
4 =1
T
T
P
B
=1 ^ ^ ^ =1
^
T
T
P
B
i-t i-t i-t i-t i-t i-t i-t
^
i-l i-" i-l i-l i-l i-l i-l i-l i-l i-l i-l
o 0 CD 0 0 0
to
O CD
Q
to 5
%
,= "1 ,=
,= ,= ^ ^ ,= "2
I " !
d
W
g
1
w w
g
g
g
d
W
g
W
g
W
g
d
d W
d
W
g
g
d d
<
i t f t f i f t i t
' =
1
1
' = .\ ' =
,-:
.':
f i
'= ,j
i t f t
i i i i i i f i i i to
NJ NJ NJ NJ
UJ
^
^ ^
ci
Ci
^ ^ ^ ^ ^ ^ c; ^ ^
s
^ ^ $ ^ ^ ^ ^
%l
^
CD o
CD o o CD CD CD o
o
Cl Cl cn Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H H H H H H H
o o o O CD O O
Q o o o o o O o o
g g g
o
g
o O O
O
g g
CD
CD
ci ci ci ci ci ci ci ci ci ci ch ci ci ci ci ci ci ci ci ci ci ci ci
H H
^
H H
^
H H H
E
T
E
T
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
t
e
l
i
2 2 2 2 2
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
fi. fi.
G G G G G G G G G G G G G G G G G G G G G
ft ft
a
3 3
a
3
a
ft
a
3
a
3
3 " | 3 - | 3 - 3^ | 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
5" 5Z ZT 3Z ZT ZT ZT 5" ZT ZT ZT 3Z ZT 3Z ZT ZT ZT ZT 3' ZT
s
8
O
I
J
D
c
t
i
o
C
t
i
o
o
i
p
o
i
p
c
t
i
o
O
I
J
D
O
i
p
O
I
J
D
C
t
i
o
C
t
i
o
C
t
i
o
c
t
i
o
c
t
i
o
C
t
i
o
c
t
i
o
c
t
i
o
c
t
i
o
O
I
J
D
C
t
i
o
i
c
t
i
o
3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
.
v
i
e
.
v
i
e
v
i
e
.
v
ie
.
v
ie
v
i
e
~
.
v
i
e
v
i
e
a
i
A
'
S' ro
s
%'
.
v
i
e
:
.
v
ie
.
:
.
v
i
e
%
S.
:
.
v
i
e
s
S S
gJ
EJ gJ
gJ
BJ gj gJ
BJ EJ BJ BJ
EJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
o
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to to
to
to
o
X
Zj
X
Zj
X
I j
X
zj
X
zj
X
Zj
X
Zj
X
Zj
X
Zj
X
Zj
X
5
X
zj
X
Zj
I
Zj
X
Zj
X
3
X
zj
X
Zj
X
Zj
X
Zj
X
g
X
g
^
^ zs ^
2
^ ^
NJ Nl
g g g
o
g g
CD
o
g g g
to to
to
2
to
2
to to
,= ,= ' = % ,= ,= ,: ^ ,= ,= ,=
1^ 'Z 'Z
"2 ,= ,= ,=
g g g'
"
W
g
d
g g
d
g' g
d d d
g
d
';
g' g
'=
w
g g g g g
< <
f i f i to f i f i f i i i f i f t i t
'= ' = ' =
' =
' =
'=
'= '= '= '=
to
to
to. to
NJ
<
^ $
o CD
o CD
b
Cl Cl Cl Cl Cl Cl Cl cn Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2
H H H H
CD o CD CD O
O o CD
CD
8
O CD
8 CD
g
O O
ci ci ci ci ci ci ci ci ci ci ci
^
3 3 3 3 3 3 3 3 3 3 3
fi. fi. fi- fi. fi. fi. fi. fi. fi. fi.
ft
a
3 3 ft !
P
ft 3 ft 3
ZT ZT 3Z ZT ZT ZT ZT ZT ZT 3: 5Z
3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3
3' 3 3' 3' 3' 3' 3' 3' 3 3' 3'
ZT ZT 5" ZT 3Z 3Z ZT ZT ZT S ZT
ft ft 3 3
a a
3 3 3 3 3 3 3 3 3 3 3
EJ EJ
BJ BJ EJ
BJ EJ BJ
3 3 3 3 3 3 3 3 3 3 3
o
3 3 3 3 3 3 3 3 3 3 3
o CD CD to
H
T
T
X
^
H
T
T
H
T
T
H
T
T
H
T
T
H
T
T
H
T
T
H
T
T
H
T
T
H
T
T
zg
i-l i-t i-t i-l i-l i-l i-l i-l i-l i-l i-l
8 8
g g
to
to
CD
3
ci ci ci ci ci ci ci ci ci ci
^
H H
^
?
? P ? ? P "P "P P ? p
U
I
S
U
I
S
U
I
S
3 3 U
J
S
U
I
S
3 U
J
S
U
I
S
G G G G
s.
fi. fi. fi. fi.
3 3
a
ft ft ft ft ft
| 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
3' 3' 3' 5' 3' 3' 3 3' 3' 3
S 3' S 3Z
3 3 3 3 3 3 3 3 3 3
BJ BJ EJ EJ BJ
BJ
3 S 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3
to
to
to
to to
X
Zj
X
g
X
zj
^
X
Zj
X
zj
X
zj
X
zj
^
X
Zj
o o o
o o CD
'= ,= "2 ~i ,=
g'
d d
g
d d
g W
g g
i i f t
to f i
'=
'
'=
to to
to i i f i i i f i i i to to
M
"
NJ NJ NJ
^
^ ^
$ ^
CD
o o o
b b
Cl CD Cl Cl cn Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H
CD o O O CD
g o o O
g g
CD CD CD
g
o
CD o
g
o
o o
ci ci ci ci ci ci ci ci ci ci ci ci ci ch ci
H H H - 1 H H
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
Q G G G G G G G G G G G G G G
3 3 ft ft ft
a
3 3 ft 3 3 ft
a
ZT ZT 3' ZT ZT ZT ZT 3Z ZT ZT ZT 3'
3 - 3 - , 3 ' 3 - 3 - 3 - 3 - 3 - 3 - , 3- 3 - 3 - 3 - 3 - 3 -
3' 3' 3' 3' 3' 5' 3' 3' 3' 3' 3' 3' 3' 3' 3'
3' 3Z 3Z 3Z 3Z 3' 3Z 3Z
ft 3 3 ft
a
3 ft ft 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
gJ
gJ gJ gJ
BJ
EJ EJ
BJ EJ EJ
gJ
BJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to
g
g o H
T
T
1
1
H
H
T
T
H
T
T
H
T
T
H
T
T
H
T
T
H
T
T
H
T
T
H
T
T
H
T
T
X
=1
H
T
T
H
T
T
H
T
T
P
B
l
.
P
B
l
P
B
l
P
B
l
P
B
l
P
B
l
P
B
l
P
B
l
P
B
l
T
B
d
P
B
l
P
B
l
P
B
l
P
B
l
I-l
I-t I-t I-t I-t
I-l 1-1 i-l I-l I-l I-l I-l
^^
I-l
CD o CD o o o o
O o CD CD 5 o o
CD 00 O o
O CD
O
o
,= ,= ,= ,= ,= ,= l
g g g g
w
d
w
g' g g g
d
g g
g
i i f i !to !to i i f t f i to
f t i t to M i i f i to.
Cl
2
go
Cl
2
8
EO
EJ
3
Cl
2
3
CD
2
BJ
3
Cl
2
EO
Cl
2
EO
X
=1
BO
X
1
go
X
^
g
3 to
i i f i
CD
o
Cl Cl Cl cn Cl Cl C l cn Cl Cl
2 2 2 2 2 2 2 2 2 2
H H
o o
CD
o
O O
o
CD
o
g g
CD
g g g
CD
ci ci ci ci ci ci ci ci ci ci
H H H H
3 3 3 3 3 3 3 3 3 3
fi. fi. fi. fi. fi. fi.
ft 3 ft ft ft
a a
3'
3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 ' 3 -
3' 3' 3' 3' 3' 3' 3' 3' 5" 3'
3:
3 3 3
a a
3 3 3 3 3 3 3 3 3 3
go go BO BO BO EO go go go go
O D CD O CD O CD O CD 0
3 3 3 3 3 3 3 3 3 3
to
o
CD
to to
o
O
o
CD
X X X X X X X X X X
^ It zl Zl ^ zj ^ : j zzj ^
ZS ZS
zs
ZS
zs ZS
g g g g g g
to
,- ,- ,- ,- ,-
1 - 1 -
,- "i *t
d
g
d d d
g'
d d
:
g g
i - l
i-*
i -l i -l i - l i -l i -l
to to to to to to to to
f i
'= '= '= '= ' =
i i i i to to j i
b b
o to
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl C l
2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H
o
CD CD
o
O O
o
CD
o
O O
o
o
CD
o
CD
g
o
CD
g g
CD
5
ci ci ci ci ci ci ci ci ci ci ci ci ch
H H H H H H H
P P P p P P P P P P P p ?
L
U
S
U
I
S
U
J
S
U
J
S
3 U
J
S
U
J
S
U
I
S
U
I
S
U
J
S
U
I
S
U
I
S
U
I
S
G G G G G G G G G G G G G
3 ft
a a a a
3 3
a
ft
3Z 3Z ZT ZT 3Z 5 S ZT ZT
| 3 - | 3 - | 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
3' 3' 3' 3' 3' 3' 3' 3' 3' 3' 3' 3' 3'
ZT
3 3
a
3 3
a a
3
3 3 3 3 3 3 3 3 3 3 3 3 3
go
go
go go BO BO go go go go go go BO
CD CD CD CD CD O CD CD O CD CD O O
3 3 3 3 3 3 3 3 3 3 3 3 3
to to
to
CD
to to to
g
CD
to
O
X X X X X X X I I X X X X
Zl =1 =1 Zl zzj ^ ^ ^ ^ ^ ^ 1
T
T
zs
zs
ZS
i-t i-t i-t i-t i ^ i-t i-t i-t i-t i ^ i-t i-t i-t
o o
CD
CD CD
o
CD
~i
1 ^
,= ,= ^ ,= ,= ,=
=
g
=
d d d d d d d
g d
g g g
ro ro
!^
M
^
i -l M
^ ^
f i -l 'f i - l
^
i -l
i i f i i i i i f t to to : t t
f i i i
i t
'= '= '= ' = '= '= ' = '=
s
0
f i i i i i
" "
NJ
^
^ ^ ^
^
^ <
$ ci ^
o
0 0
CD
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl C l Cl Cl Cl Cl cn
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
-H H H H H H H H
+
g g g o
O
o
0 0
g g
g g
CD O 0
g g g
o o
g
o
g g
ci ci ci ci ci ci ci ci ci ci ci ci ci (h ci ci ci ci oi ci ci ci ci
H H
n
H 1^
^
!H
^ q ^
H
I
M
w
i
w
i
w
i
w
i
I
M
I
M
w
i
w
i
w
i
w
i
w
i
.
w
i
.
w
i
!
M
'
? P ? ? ? ? ? P p ? ? P p p p ? ? P P P p P ?
U
I
S
s
m
U
I
S
U
I
S
U
I
S
U
J
S
I
U
S
L
U
S
s
m
s
m
U
I
S
U
I
S
U
J
S
L
U
S
s
m
U
J
S
U
I
S
U
I
S
U
I
S
3 U
J
S
I
U
I
S
!
U
I
S
!
m
g
o o
G G G
fi. fi. fi. fi. fi. fi. fi. fi.
s.
G 0
fi. fi. fi. fi.
s.
0
ft
a
3
I
P
3 3 3 ft
c
t
i
3 3 3
s
3
a a a
3
3' S 3' ZT ZT 3' S 3" ZT ZT 3Z ZT ZT ZT ZT 3Z ZT ZT ZT
13- . 3 - 3 - . 3 - | 3 - 3 - 3 - 3 - 3 ' 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
3 . 3 . 3_ 3 3 3 3 3 3 3 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3
3
3 3 " 3 ' 3 ' 3 '
3Z 3Z ZT ZT ZT ZT ZT 3Z ZT ZT ZT ZT 3Z ZT ZT ZT ZT
ft
a
3
a
3 3 3 3 3
a
3 3
a
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
S S
s
BJ EJ EJ gJ
gJ
gJ gj gJ
go
BJ EJ EJ
BJ BJ EJ EJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
g
to
o o to to 5
X
Zj
X
z|
X
zj
X
zj
X
z|
X
Zj
X
zj
X
Zj
X
5
^
X
3
X
3
^ ^ ^
X
3
X
zj
X
3
X
Zj ^ ^
X
zj
X
zj
^
CD CD
o
CD
o o
0 0 CD CD
CD 0 0 0 CD
o
0
O to
,= ,= ,=
,= ,= ,= ''- ^ ,=
M
g g g g'
w
d
d
z
d
W
w
d
'=
"
W
g
'; ' =
d
g
d d
g
g g g g g
f i to to f i to i i f i
.=
'. '_
Cl
2
BO
X
zt
to to
o
K K
to !to f i i i to
N J N J
"
N J
^
^
^ ^ ^ ^
^
<
o CD CD
o
Cl Cl Cl Cl Cl Cl Cl Cl Cl ct cn Cl Cl Cl cn Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
z l -H H H H H
+j +^ + +
g g o CD o CD O
g g
g
o
g g g g
o O
g
o
CD
g
o
o
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl 0 Cl
H H H
^ ^ ^
H
^
H H H H
E
T
^
W
t
w
i
w
i
w
i
I
M
I
M
w
i
w
i
I
M
!
M
.
w
i
w
i
P. p. p. ? ? P ? ? ? ? p p ? P P ?' ? P P P P
U
IS
L
U
S
L
U
S
U
IS
U
J
S
L
U
S
U
IS
U
IS
U
J
S
U
IS
U
J
S
U
IS
U
J
S
U
IS
U
J
S
U
IS
s
m
s
m
U
IS
U
I
S
!
3
(is (is
G G G G G G
fi. fi.
s.
fi. fi.
C
S
B
fi. fi. ^ S. fi.
G
C
S
B
fi. ^ S. fi.
o
i
p
C
t
i
o
c
t
i
o
C
t
i
o
O
I
J
D
O
I
P
c
t
i
o
o
i
p
C
t
i
o
o
i
p
o
i
p
O
I
P
o
i
p
C
t
i
o
C
t
i
o
O
I
J
D
O
I
J
D
o
i
p
C
t
i
o
3
o
i
p
i
3Z 3: 3Z 3: 3Z 3Z ZT 3Z ZT 3' S ZT 3Z 3Z ZT
s
3' ZT 3: ZT 3Z
3r 3 " 3 " 3 - | 3 - , 3 - , 3 - | 3 - | 3 - 3 - 3 ^ 3 ^ 3 - ? ? 3 ^
3-
3 ^ 3 - ? 3 -
3^ 3 5 5 3 3' 3' 3' 3' 3' 5' 3' 3' 3' 3' 3' 3' 3' 3' 3' 3'
3Z 3Z 3Z 3Z 3Z 3Z 3Z 3Z 3: 3Z 3Z
s
3' 3Z ZT
3 ft ft 3 3 3 ft 3 ft ft 3 3 ft
a a a
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
S
BJ
EJ EJ BJ BJ EJ EJ EJ go
BJ EJ EJ BJ BJ EJ go go go go
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
g
to to to to to
to CD to to o to to
o
to to
X
Zj
X
zj
X
Zj
X
5
I
5
X
3
X
3
X
5
X
5
X
3
X
zj
X
3
X
zj
X
z|
X
g
X
zj
X
Zj
X
Zj
X
zj
X
3
X
Zj
^ ^ :s ^
g
o 0 o o CD CD o o
o CD 5
to
to
to
o
^
1 ^
,= ^ , ^
'[
w g g g
d
d
d
g g g
d d
g
d
g
d
g d g
d
H; H; 1^ H; H;
i j I-l
H;
H ;
H; H;
i-l i-l
^
i-l i-l i-l i-l i-l
f t f i f t f t f t to to to f i
3
to to
to
i i i i i i f i f i
NJ NJ NJ
^ ^ ^ < ^ ^
$ $ ^
CD
o o
o o o
CD
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H H H H H H
g g
0 CD CD CD
g
g
g g
O CD CD
g g g
o o
O O CD
CD CD
g
CD
CD
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
H
^ ^
H H H H
I
w
i
w
i
w
i
I
M
'
.
w
i
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
fi.
G
fi. fi.
G G G G G G G G G
fi.
G G G G G G G G G
K'
ft
a
ft 3 3 3
a
K'
ft
S 5' ZT ZT 3: ZT ZT ZT ZT ZT 3Z 3Z 3Z ZT ZT 3Z 5: 3: ZT
3" 3- |3- 3- ,3- 3- 3^ 3- 3- 3- 3- 3- 3- 3- 3' 3- 3- 3- 3- 3- 3- 3- 3-
3' 3Z 3Z 3: 3Z 3Z 3Z 3Z 3Z 5Z 3Z
s
ft 3 ft ft 3 3 3
C
t
i
a
3 3 fl ft 3 ft ft 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
BJ BJ EJ EJ EJ EJ
BJ EJ BJ EJ EJ BJ BJ BJ EJ EJ BJ BJ EJ EJ
go
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
o
CD
to to
:s
g o
g X
Zj
X
Zj
X
Zj
I
Zj
I
3
X
zj
X
5
X
5
X
5
X
5
X
3
X
zj
X
Zj
X
Zj
X
Zj
X
3
X
zj
X
5
X
zj
I
g
X
Zj
X
zj
X
g ZS ^ ^ ^ ^ ^
g g g
o o
CD
g g
0
CD
o to
to
:
1 =
,= ,= ,= ,= "
1= ,=
=
g g g g g g g g g g g g g g g g g = g g g
:
g g g
5
<
5
f i
to
f i
to to to.
f i
to to
f i f i f i f t
it i t
f t
'= '= '= '= '= '= '-- '=
'= '= ' = '= ' = '=
'= '= '=
,=
'=
'= '= ,= .\
go
go
Cl
2
go
o to
to
i i i i i i f i i i
!to
i i
NJ NJ NJ
^
^ ^
^ ^
CD
o
i i to to
o
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
-H H H
+
+j
g
CD O
o
CD
o
g g g
CD
o
g g g
CD
o
g
CD
g g
CD
o
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci
H H H H H
^
? P ? P ? p P P P P ? ? P P P ?
U
I
S
L
U
S
U
I
S
U
I
S
L
U
S
U
J
S
L
U
S
L
U
S
U
I
S
U
J
S
L
U
S
U
J
S
U
I
S
!
U
I
S
!
U
I
S
!
L
U
S
!
lis lis
G G G G G G
a
G G G G G G
fi.
G
3 I
P
ft 3 ft I
P
a a
ft
3Z S 3Z 3Z S ZT ZT ZT 3Z 5" 3: 3Z S ZT 3Z
3 - | 3- 3 - 3 - 3 - 3 - , 3 - 3 - 3 - 3- 3- 3- 3 - 3 - 3- 3 -
3Z 3Z 3' 5Z 3'
3
c
t
i
I
J
D
a
3 ft 3 3
a
ft 3 3 3 3
o
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
gJ BJ BJ
gJ
gJ
gJ
gJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
g
to
to to
o
X
Zj
X
3
X
Zj
X
5
X
3
X
3
X
3
X
zj
X
3
X
Zj
X
zj
X
3
X
zj
X
-1
X
3
X
zj
T
P
B
g g
o o
CD
o o
CD 0
CD CD
to
o
to
O 0
%
o
% ~i
0
*:
to
M
g g'
d
g' g
d d d
g g
d
w
d d d
' =
g
< 1-1
H" H"
r r r r
I - l 1-^ 1^ I - l I - l
H- M
to
f i f i f i i i f i
to
i i f t
i t i t
'= ' = ' = '= '= '= '= '= '= '= ' = '= '= ' = ' =
,=
1
EO
EJ
3
X
=1
gJ
3
X
=t
Cl
2
BJ
3
X
Zl
Cl
2
go
X
1
Cl
2
EO
X
Zj
Cl
2
go
X
=1
Cl
2
go
X
=t
go
X
^
Cl
2
go
X
=1
go
go
X
=1
X
=1
o o
0
0
3
f i f i i i i i
NJ NJ NJ
o
CD
o o
to fi
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H H H H H H
O
o o
CD 0 0
o
o
CD
o
CD 0 0
o
O
o
CD 0 CD
g
0 0 O
0
o
CD
S
ci ch ci ci ci ci ci ci ci ci ci ci ci ci ci ci
H H H H H H H H
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
G G G G G G G G G G G G G G G G
3 ft ft 3 3 3 3 ft ft ft ft
a
3Z ZT 3: ZT 3Z S 3' 3Z 3Z 3' ZT ZT ZT S 3Z 3'
3 - | 3 - 3 - | 3 - 3 - 3 - 3 - 3 - | 3 - 3 - 3 - 3 - 3 - | 3 - 3 - 3 -
3 3 3 3 3 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 ' 3 3 ' 3
ZT ZT
ft ft 3 3 3 3 3 ft 3 3 ft ft ft
a
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
go go go
go
BO EO BO EO EO EO go go go go go go
a O CD CD CD CD O CD CD 0 CD CD CD O CD CD
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to
to to
o
CD
o
CD 0
X
zj
X
3
X
zj
X
3
X
Zj
X
Zj
X
Zj ^
X
zj
X
g
X
Zj
X
zj
X
zj
X
zj
X
Zj
X
zj
zs
^ ^ ^ !^ ^
1^
!^
1^ 1^
^ ^ ^
NJ N> NJ NJ NJ M NJ NJ NJ NJ NJ M NJ NJ
g
O 0 0 0 CD CD CD
0 0 CD O CD
g g
O
to
0
O
to
O
0
,= ,= .= ,= ,= ^ ,= ,=
g g g g g g g g g
=
g g g
=
g g
g g
c.
H; H; H; H; H; H; H; H; H;
!^
i - l i - l i -l i -l i -l
f t !et to i t i t to to i t
:
f i f i
'-
-J
to
!to f i i i i i
NJ NJ NJ NJ NJ NJ NJ
^ ^
<
$
CD o CD o
CD CD CD CD CD
i i j i i i i i to i i i i
Cl Cl Cl Cl Cl Cl cn Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl cn Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
H - 1 - 1 H H - 1 H
o CD 0 0 0 o 0
o CD 0 0 0 CD
o
g
CD 0 CD o O O CD
g
O
o CD O CD o
g g g
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci
H H H H H H H
^
H H
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
G G G G G G G G G
fi. fi. fi. fi. fi. fi. fi. fi. fi.
C
S
B
C
S
B
ft ft ft ft ft 3
a a a
ft ft
a
3Z 3' ZT ZT ZT 3' S 3: ZT ZT ZT ZT ZT ZT 3' ZT ZT ZT ZT 3Z 3Z 3Z ZT
, 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 -
3' 3" 3' 3' 3' 5' 5' 3 5' 3' 3' 3' 3' 3' 3' 3' 5' 3' 3' 3' 3' 3' 3'
ft ft ft ft ft ft ft ft ft 3 3 3 3 3 ft ft
a
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
BJ EJ EJ EJ EJ EJ
gJ gJ gJ
BJ EJ EJ
gJ
BJ BJ
EJ EJ
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 5
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
X
Zj
X
Zj
X
Zj
5
^ ^ ^
X
3
X
zj
X
3
X
Zj
X
zj
X
3
X
Zj ^ ^
I
Zj
X
3
X
Zj
X
zj
X
zj
X
zj
^
^ ^
o 0 CD CD o o CD o o 0 0 0 o CD
o o CD o CD o o CD CD CD o O CD CD
to CD
to g CD
S
*t
CD
*t "
^
"
=
] 1
=
%
g g g g g g g g g g g g g g g g g g g g g g g
^
3
^ ^ ^
J- J- 5 5 '5 '2
^ ^
'2-
^ ^ ^
'2
i ^ i - i-^ i - i-^ i - i - i -l i ^ i-l i-l i-l i-l i-^ 1-^ i - 1-^ 1- i - 1^ i-l i-l i-l
f . f i i i i i i i
" ^
*"= *S ^ *t
" ^
i i
*5
* =
i i i i i i f i f i
NJ NJ NJ NJ
s
^ ^ ^ ^ ^ ^
z^
^ ^
Z3
^
' Zj Z3 ZZj
$
ZZj
^ ^ ^
Z5 Z5
2;
CD o
o CD o
to
Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl Cl cn Cl Cl Cl Cl Cl Cl CD Cl Cl Cl Cl
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
zl H -H H H H
+
+j
+^
+j
g g g o O 0
g g g g CD CD
g g
o
g
CD
g
o
o
g
o
ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci ci
H H H
^
H
^
H
^
H H H
E
T
t
e
l
t
e
l
f ?
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
i n i n
G G G G G
fi.
G G G G G G G G G G G G G G G G
ft ft 3
s
ft ft 3 3 ft 3 3 3
a a
3 3 ft
3Z 3Z 3Z 3Z S 3: 3: ZT ZT ZT ZT ZT 3Z 3Z 3: 3Z 3' SZ ZT ZT ZT 3Z
| 3 - , 3 - 3 " | 3 - 3 " | 3 " | 3 - | 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 - 3 ' 3 - 3 - 3 -
3Z 3Z 5: ZT 3' 3Z ZT 5: 3Z ZT
s
3Z ZT 3Z ZT ZT ZT 3Z ZT ZT
8
ft
a a
3
a
3 3 3 ft ft 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
s
S S S S S
BJ EJ EJ EJ gJ BJ EJ EJ EJ
BJ
gJ BJ EJ EJ BJ BJ EJ
go go EO EO
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
to to to to
to to to to to to
0
X
3
X
3
I
3
X
3
X
3
X
3
X
zj
X
-1
X
3
X
zj
X
3
X
zj
X
g
X
Zj
X
3
X
3
X
3
X
zj
X
Zj
X
zj
X
zj
X
2j
X
2j
ZS 'ZS zs
r
p
B
^
-g g
ZS
i-t i-t Ht Ht Ht i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t i-t I-t i-t i-t i-t i-t i-t
o
g g
0 0 CD CD 0 0 0
CD CD 0 o
0
0
to to
to
g g
w
d g g g g
=
g g
d
w
d d
g' g'
d d
g g' g'
g g
s s
f t f i f t !ft f t
h
*1 * t
to
to * t
h
to f t f t
<t * t f t !ft f t
to
i i
'= '= '= ' = ' = '= '= '= .\ ' = ,= '= '= '= '= '= '= '= '=
=
'-- '= ' =
i I
I I
> L
ISJ
NJ
NJ
NJ
in
^
M
h
2
OJ
NJ
UJ
Lu
UU
' +~
o
: 3
a %
o
i l
3. 3
n_
S 3
TT
era
o
<
m
o
<
* i
3 S
CU
QJ
CU m
=r
UD 3
O TT
2 s
o
D- l / l '
" O OO
O
a.
c
g o
a s
m
01
n
3 "
Q.
CD
!U
C
J 3
II
s
>
t / 1
71
33
00
O
00
6
c n
h-l
; vj
b.
o
n
I
1
era
o
<
era
o
^
m
cu
II
cu
c
tra
O
o
era.
ro 3 -
>
5 ^
CB
0)
X -
3 B
II c
M era
eo F
=7 !U
3 Ul
11
3 - Ct)
# s
; > Q.
" g
= CD
U l
UU
O
f i
a %
73 O
3
II
3. 3
m_ = ;
5- 3
^ =;
CS
OJ
vJ
VO
o
Q.
c
o
>
C/l
TJ
33
03
O
00
6
m
H-l
;^
OJ D
! t -o
- a X
UU
o
N l
OJ
n
m'
b
o
3
3 "
CD
2 d
Ol
o
Q.
eo
00
3
n
go Ul
^ s
E%
c .5
tra (/,
O CD
o cu
I I
3
^
5 ^
^ 1 g
o
c
(TO
3
TT T3
I I
II
CD
UJ
U3
a.
i.n
o
CD
Ln
OU
o
r a %
^ s
s
CD
a_
UU
n
O
3
b 00
- 1 M
f i
U3 =
CTl CD
CD m
f l 3
^ a-
g ~<
^ S
X5 =7
II 3
g ^
^ oS
S 2
TT 00
2 <
^
3
l / l
CD
QJ
3 2
= J J 2
i %
l l
I I
. < m CD
2"
QJ U^ CD
- J >0 . Q
I I
CD C
^ F
i f
00 II
I
g =1 a
3 -R
- o
cu
(ra
CD
II
^
N l
Ln
N l
CD
OJ
*
N l
D.
UJ n
S 3
s#
era
o
<
(ra
o
^
CD
OJ
o
c
(TO
O ^
CTl - <
>J
Ol
T3
- I -
. n
X. 5
3
f T
(ra
o
<
(TO
O
% s
o <
UJ tn
K I
^ 3
00
UJ
^
^
00
O"
c n
c n
QJ
o -
vl
eo
. Q
c
era
o
o
(ra_
CD
go
CD
J 3
z
c
3
II
f i
o =
f i CD
N l m
00 3
? ^
E. -o
- eo
I t
n QJ
= %i
2 2
TT
n
3 -
fD
?l
n
QJ
n
U l
f i
O
v2>
.o
3
X-
i
-a'
era
o
<
(ra
o
<
CD
QJ
X3
X
-o
. Q
C
CD
' j ) ^
PROSECUTION EXHIBIT for idgXrHcation
PAGE OFFERED: PAGE ADMITTED:
PAGE 1 OF I PAGES
H-l c r
l i t :
3 z:>
L/ l 0 0 g 3
CD NJ 5 Ht
QJ c n g CD
Cl cn g 3 '
I I I *
era
o
<
TO
O
<
eo _
11
liD n>
i rs
g s s
l g l s %
? g
UJ CTQ
-o
o
g
CD
"5
O
O
5
M
N l CL
CD
L n I / ,
cn CD
5 ^
# g
eo Ln
LA N l
O -n
^ s-
II
S" c
-o
, o
g
CD
3
1
3
CD
g
II
O
eo
.D
^
eo
3
C
3
I I
f i
UD
cn
CD
(30
0 0
f i
Pi
t - 1 CD-
CD n
U J
g o CD O l
E S
3 H-l 3 -
U l 0 0 ? i
S K -G
3 n
Cl cn
I I I
CD
ll
i I
I D
E o
& & ( %
UD CD O
2; ^ j :
QJ 3 O
8 ^ ^
: o
00 eo
V sr
H
UJ OQ
% ?
m
gl m
l i e
g o L n = H
~ oi
' S
i.
QI
I I
cn
* i
CD
a.
CD
QT
c_
NJ
LD
NJ
f i
f i
^Ll LD
L^ ^ cn
id. gl ?
H I o 0 0
o
CD
3
I
3
CD
g
II
O
eo
o
c
7 :
-D
5;
^
^
3 g
' x -p;
< in
1
00 era
^ <
If
c n CD
N CD
S g
U l Q .
i^o
z -5-
H_ UU
I I
era
3 - m
-n n
O CD
I I
I I
s S
8 1
i i
8 &
o '
o
o
=; X
g o H-l
3 i - i
# i
H I CT
O n
3 H I
U l 0 0
CD NJ
CU O l
NJ
O
CD
0 1
L n
0 0
v J
Ci
Q- cn
3 ^ NJ
II
| H
n 3 -
g P
I i
TO tra 3'
7=. O i-f
ti
LD CD
&
QJ 3
^
: o ^
00 eo
2
g g
UJ S
S I
5,1
^ *
TO i
s i
'3 S-
^ ^
i i
0 1 CD
S ^
2 g
II <
L n H-l
f i UJ
NJ M
=R CD
H^ 15
QJ H I
F NJ g
QJ LjD
"S f i eo
go Ln
L/l NJ
% z
II 2,
Q) c
U l ^
Q. go
1 ^ o
- " O
CD
3
I
3
CD
g
II
O
go
X I
II
go
3
6 ^
i
H-l CD-
CD n
3 H I
C/1 0 0
oi
n _ O l
tf
^ ^
: l
1 0 CD
& ^
QJ 3
g 5
S &
00 eo
V m
S t
2, 5-
UJ (ra
s ?
i l
gl m
2
go Ln
O - n
3 . CL
M %
QJ C
I <o
3 i
CD
f i l l
^ 1 ^
O l
s i
00 5 -
! S 3
3= a p
^ 6 S
Z5: ? <
s (io (Kl
g K. S
5 R
1 S I
= 11
pi n
(TO
O
I ^
O
N I D
~ QJ
CD
X 'H
N O
3 5
eo
o
o
CD
3
I
3
CD
g
II
O
eo
XD
2 (5^ IL
o Iro
3- C <
:
.Q < m
c iZi n
III
3 2? 5
% zg
III
00 o '
00 o
:
' o
CD
CD
eo
3
N
H-l CT
O n
g&
3 H-l
l / l 0 0
CD N l
CD
cn
J^g
CD
QI g ?
I ^
0 0 3
O C
5 CD
6 ^
QJ 3
g s
^ 2
00 eo
V g
o
% #
UJ era
m <g
f i
s i
% s-
^ %
s g
CL
CD
O
O
L n
o
i n
O l CD
CX QJ
X I
c
E.
g o L/ l
l / l NJ
O -n
14
CD
_ U l
CD QJ
<. ^
. t i OO
5 , Hi
CD
QJ
O
i>l
CL go
1 ^ g
- TD
CD
3
1
CD
g
II
o
eo
J D
I I
g
CD
CU
TT
eo
3
C
3
rli g
LD N l
N l g o
s s
O l U l
I D c n
2 ^
^ 8
I D
f i
^ 3
n " D
3 ;
' g
g
g
5'
CD
CD
CL
CD
3 - 0 0 3
^ K m
2 01 3-
BO
X I
I I
3 "
go
(TO
Cj l
II QJ
o c
I D 0 0
(D O
f . o
QJ
0 0 CD
O go
a #
Q .
CD
I I
O
eo
0 0
CD
TD LU
5 %
i l
0 1 N l
CT , T
0 0
CD
II
S?
^
CD
a_
>
o
5 9=:
Ln
. Pi
N l
II
CD.
QI
CD
b
Ln
i i
QJ
NJ
I D
N l
. f i
CL zr "o
% 1
r
F H" ro
QJ t - 1 g
O
go
J D
I I
g
^ i
eo Ol
O m
cJo
0 0
.Pi
f i
ro
eo
.CD
I I
g
ro
QJ
T T
eo
cr
Lr t
ro
QJ
N l
o
o
M
N l
H I
ID
^
eo
3
C
O
eo
cr
CD
-t- =
g ?
ro
NJ
i n
N l
N I
+
cr
% 3
g
g
CD
8 3
(TO
O
<
Q .
CD
0 0
ro
II
as
N l
U l
NJ
3 "
as
! X
ro
eo
I D
II
s?
N l
L n
N l
N l
3
<
-I-
3
!L
5'
g
o
0 0
o
<
(jo
o
<
0 0
ro
NJ
NJ
CD.
ro
eo
J D
X
^
2 HT
NJ
o
o
f l
o
Nl
O
O
NI
Nl
Ln
CD
-I -
O
O
O
O
CD CD CD CD
% 3
a
g^
I
3 '
m
00
o
<
%
^
m
QI
t-1 - <
11
00
3
Q.
ro
00
ro
D
QI
00
ro
II
S?
NJ
Ln
Nl
3 -
s?
Q.
ro
QT
c
-a
X
eo
ro
QI
BO
CX
3
Ul
m
o
ae
UJ
O
f l
NJ
00
f l
-t-
g
5 ^
O OJ
CD
S S
cn ro_
S
Bo <
I D - .
3
(TO
O
_ <
K"!
5 %
g #:
X
CD.
o
ae
Nl
Ul
Nl
O
O
ro
TT QJ
I I I
q 3- c
.. ro
# i
Ln
f .
Nl
^
5! K
g ^
2? ->
P ID
i m
11
o
3
3
"O
~ g
2 g
^
i l
3 H-
1
o
o
: f
ro c
& T?
if
K s
XI ro
eo
(TO
CL
II
CD
I D
ro
f ;
QT
00
o
CD.
CD.
00
Nl
HI
O
Nl
"
c
00
g
g
00.
ro
BO
ro
3
ro
TD
QJ
00
ro
Nl
O
X
CD
CD
a?
8t
? c
(TO
CU
"O
X
JD
as S
K <.
Nl CL
% ^
5i S
3- |IS
g %
Ul NJ
Nl LO
CD
O
Ln
CD
Ul
cn
cx
UJ
.Pi
o
Q.
g
Z5. -
Ti !S,
% E.
ro
b Si
i<i ^
i i go
Ht o
- - g
ro
3
1
3
ro
g
II
CD
eo
XD
II
g
eo
3
Nl
O
73
CD
o
O
3
Q.
O
-I-
g
77
QI i / i '
<g -D
3
QJ
a? t
NJ QJ
t n Q
Nl
K -
CD
cx
ro
CD.
LU
S 5'
cn ro n
Kg
g
i n n
II
QJ
C
00
g
g
00.
s 11
- 5 %
00
g
<
I D
3 - C
ro ro
3 "
ro
Ln
Nl
ro
Ul
(TO
CL
.<
Nl
LD
NJ
.Pi
f i
LD
01
ro
cm
oo
f i
* i
X -o
l i
iZ 3
- ro
i!
f i 3
H-l c r
o n
3 HI
cn 00
QI
LD
g s
Nl ro
UJ
2 r
^ I .
CD -O
^1
CD
n HI
i l
I D ro
&
QJ 3
a
& ^
00 Bo
V S
HI
8%
? x>
I D QJ
UJ era
r 4
i l
gl ro
2 ^
n NJ
go Ln
l / l Nl
g - n
Zl CL
II
% E.
ro r
BO
g
a
ro
3
00
^
i
u
u g
<J c
ro
tt
3 JD
?r %
tja 3
$
% g
H
II
l i
. O Ol
C X
ro
g
II
CD
BO
XI
II
g
>
c
<
BO
y ^
Nl ro
N
Ol II
ro Ol
i i
00
H-l c r
o n
3 H-l
Ul 00
ro NJ
& 2
00 eo
sr
I - l Z l
i l
3%
cn ro
5 ^
2
n NJ
R yi
00 >
^
If
^ S M
If
I ^
o
S
<
Ul
i r
I D ro
^
QI 3
s
tn NJ
I I
o S!
i f ^
Q. go
Hi O
' -o
ro
3
I
3
ro
g
II
CD
eo
XD
eo
3
CD
$
ro
cr
73
ro
g
c
ro
iu
CL
II
7<
1^
w X
ro 50
01
I I
a . 30
ro ^
;ir -<
i l l
}l
< Nl
II
=R
M NJ
QJ C
cy n
Nl ^
I D ZZL
Nl !5L
f ^
f i go
I D rt-
cn II
ro cn
i i
oo
00
I D
I D
-Pi
NJ
LU
t-1 cr
CD n
ST a H H
cu Cl 5 fD.
Q_ CT^ 5 5'
p). CD
I I
I D ro
1 eo
OP
g
<
tm
o
<
4
^ 2
00 eo
CD era
g g
UJ (TO
r l
n
g! ro
2 g
Ln
Nl
go
I f
D K
i/^l "g
^ g
' TD
ro
g
II
o
eo
XD
II
g
00
CL ro
ro . 1 ^
I ^
" ro
QI
11
XI %
=1
< -5
t-1
^
l i
I LU
s ^
NJ
f l
f i
I D
cn
CD
(Jo
00
.Pi
f i
eo
H-l c r
CD o
g&
3 t-1
Ln 00
ro NJ
3 n
<X cn
If
I"
eo ! i
I D ro
&
QJ 3
8 4
& <!!>
00 eo
V sr
11
i f
11
gl ro
2 &
n Nl
go Ln
VI Nl
Ul ^
i i go
Ht O
- -D
ro
3
1
3
ro
g
II
CD
BO
XI
CX
ro
c
o 'J^
CD
^ ^'
^ 3
I- P
00
g
<
s ^
ro_ CL
5 ' CL
7^ II
ro
cr
33
ro
g
c
ro
JD
CD: <
g
O
CZ
g
00
CD
03
l i
Ul
eo
H-l <
Y %
f i
f i
I D
cn II
i i
f l I D
- f l ^
00
00
I D
LD
f i
CD
cr
CD 3 -
go
cr
ro
CX
UJ
t
t
p
3
ro
CX
UJ
\
in 00
g
ro
Nl
g
QI 01
g
n
cn g
3 - Nl
II
eo
3
JD
ro
PI 0
3
TT
3 -
go
=
a
u
(TO
00 00 g
cL
g
<
II g
m
CD 00 g
LO
ro
<^
ro eo
o
HI
f
a?
Nl
Ul
NJ
O
O
09
a?
Nl
Ul
Nl
O
O
CD
01 ro.
cn 5'
NJ TT
Bo <
XD s .
ro
3
JD
&I
g g
QI era
.
a qo
ro
Q.
as
Nl
Ul
Nl
O
o
o
oo
g
_ <
"1
5 %
Z QJ
3 S-
II
3" ^
?i^:
as ro
5 g.
Nl CL
I I
S- M
g %
Ul NJ
Nl LO
%l NJ
I I
E. cn
ro
vl
BO
c
33
"O TD
<
cr
Nl ro
o
s s %
"O
X
eo
g
"O
ro
3
1
3
ro
g
II
CD
eo
JD
II
g
go
3
C
3
II
E. I
i i
-O TD
H^ g
CL
NJ
I D
Nl
f .
f i
LO
cn
CD
(30
00
:
NJ ^
2 g
- K
Nl
O
Ul
as
Nl
Ul
Nl
O
Ul
LD
I-l
as
Nl
Ul
Nl
5 ? ^
3 HI Z ~
Ul 00 <
ro NJ 5
QJ cn g
q. Sl g
^gB"
l U
I "
: i
ID ro
6 S"
3
00
g
<
at)
g
<^
ro
3-
sgg
^
LU m ^
^ It
m
Ln ui'
gl ro
BJ= Ln NJ
g %i NJ
l i t
' c
ro
00
00
f i
f i
or E S
Ht ro
o %
"8
CL go
Ht O
- TD
ro
3
1
3
ro
g
II
o
BO
JD
II
g
eo
3
C
3
II
CD
ro _
CX n
UJ " T
gt
cn ro_
B^g
i
H "i? ^'
q S lig
ro g g
as m <
NJ ro 00
S 8? ^
o ro
cn XD
ro _
c
3
II
ro
as
NJ E i
Ln
f i
Nl
=R
^
Ln n
NJ 3 - c
o ro ro
5!
A
5 S
Nl
ro
o
33
ro Ln
g
Zi
n W
cu
Nl
ro
| S
-I - CL
I D
NJ
f i
f i
LD
01
ro
(30
00
f i
Pi
31
NJ ro
8 S
S 3
S 3
00
Nl
CD
S S" rr=
g&E
3 t - i < :
Ul 00 <
ro Nl 5
QJ Ol g
o 3, g
g^^-
JD m
01 14 =
s- S I
BO c 00
(TO 00 g
5; g <
II g 00
8 %
NJ cr
m
i i i
2 n =:
CZ3 01 3
5 l/l TD
CD era^
LO ro
i r
gs
00
g
<
^ sr ?
as ,.
NJ QJ
Ln C
^ 1 .
TD ro (io
as go g
Ul ro 'Dr-
NJ JD m
CD Z QJ
l i
^ K %
6 3" ^
LU (TO
i l l
Ol ro
cr QJ
11?
R a ^
II
go 3
i l l
rt QI
Ln
f i
Nl
4 ^
UJ Z^
g g
I D
x^
5:
II
Ln
f i
Nl
=R
g
7i
II
Q.
QI
ro
i zz) ..
ui "5
i i
I D
' ' Nl
g- f
^ $
C NJ
Ul LD
3 NJ
5_ Ol
ro
X
eo
g
"O
ro
3
I
3
ro
g
II
o
eo
XD
eo
3
C
00
00
f i
f i
00
Nl
D
g
c
3
ro
3
n
n
n
as
o
X
ro
ro
as
Nl
Ul
f i
ID
cn
ro
(30
00
:
CD
ro
CX
Ul
00
Nl
01
BO
JD
QJ 1C|
NJ
CD
03
ro
as
Nl
Ul
Nl
CD
O
QJ
00
g
CD
2 5
cn ro
BO <
"S -
eo
(TO
ci
II
o
LD
ro
f i
QT
00
cp
ci
CL
00
II
00
g
<
c
00
g
g
qo_
ro
eo iTr
ro CD
00
g
<
c
00
g
g
qo_
CD (TO
<
00
g
BO
NJ XD fO
O Z QJ
in
Zi
00 rt
ro OJ
CL
g
go
00
ro
II
as
Nl
Ul
Nl
c
30
X
^
"O
^ 5 &!
ze =^ C (TO
QI
3 "
as
Nl Y
5 5
Nl
M 2L
3 M
Zi g -
II (5.
ro r*
b K
"8
CL go
1 ^ g
- TD
ro
ro
g
II
o
BO
JD
II
g
ro
QJ
^
eo
3
C
3
II
f i
LO
cn
ro
C30
00
f i
f i
00
NJ
O
g
3
ro
n
n
n
as
Nl
Ul
Nl
O
X
ro
ro
as
Nl
Ul
O
cn
CL
g
X
=1
13
CD
cn
NJ
BO
JD
= : HI ?
00
g
<
(TO
g
<
Q.
ro
00
ro
o
01
00
ro
II
as
as
Nl
Ln
NJ
g 00
g g
00. <
K"!
I 2
i &
I >
go 3
C CD
33 C
TT "5-
rt iu
Q. ^
o Ln
g
- ' 01
I ^
go
JD
ro
QJ
BO
CT
3
Ul
ro
OJ
g
CD.
>
Ul
33
03
CD
00
CD
I I
3 ' X
s; z\
00
g
<
(30
g
<
CL
ro
00 3
cn ro.
01 3 '
NJ TT
eo <
"S -
?
QJ 3
c n
00
g
g
CIO.
& g
2 % c
3
00
g
<
01
E. BO
^ Ez
oo
ro
00
ro
II
as
Nl
Ln
NJ
3
TT
I I
30 c
V "g-
rt iu
g
I
Q.
II
Ln
f i
^
3 "
as
NJ
Ln
Nl
CL
ro
oT
c
BO
XD
eo
cr
7<r NJ
1/1 I D
00
g
< f i
TO S
g
<
cn
cp
(30
00
f i
f i
CD
CD
00
CD
Ln
Nl
NJ
NJ
K
f i
CD
NJ
O
s
NJ
UJ
f i
cn
CD
2
UJ o -
S | S
3 - 3 3"
CD
go cr LD go
i l
11
cr go
11
II
o
eo
cr
cr
Ul
o
CD
Ul
o
Ln
01
cr
UJ
f i
o
CL
&
13
BO
XD
?, 5
go NJ
3 BO
c ro
3 a
II JD
O j?
g
c
oo
g
g
era.
ro
e^
cu
Zi
II
3
LO
11
i S
00 m
>
Sz i :
P:
31
1
Nl <
C)
ro S
ro
cr
33
(D %
CD.
ID. 'eg
CD
CX
II
CD
LO
ro
f i as
NJ
_ Ln
00 NJ
9 2
CX ro
cn Q
NJ CD
iu
X
CL e
O
X
I I
LD BO
cr g
CD.
M_
u
-<
O
E -3. f UJ
Ln
it
CL
II
Ln
JZi
NJ
3
^ oo
g
LO
f .
o
CD.
BO
tm
UJ
>
O
as
NJ
Ul
- %
O Ul
i? ^
% 5
sr UJ
00 >
CD CL
II
H I 3
8 ' 3
IT ro
g
II
CD
00 UJ
00 00
UJ
o
cn
S UJ
11
o '
o
o
o
CD
eo
JD
II
g
cr %
U
CD
go S
3 eo
c ro
I I
o
g g
H
n J
n
Is
TO LO
O (T
I D 3 -
% g
QJ Ln
00 Nl
9 S
CD- ro
S g
Nl E
II
LD Bo
L U LO
CD
CD
01
LD
LO
3 g
s g
S
(TO (TO
CD
l i
cn CT
N ro
8 %
Ul Q-
s:
c
o
QJ
ira
CX Ol
as
cr
Ul
S "
cn
cr
Ul
f i
CD
CL
eo
(TO
CL
II
o
LD
ro
f l
oT
00
CD
us
g c 3
%j n 00
XD V m
ro
m
O
^
TD
ro X
as f i
UJ ro
>
CL
LD 00
Ol I D
i f
H I 3
8 ' 3
CT ro
g
II
CD
5
3 -
UJ
N
UJ
OJ
g
II
CD
CD
S - -
CD QJ Ol
Ln ^ f l
_ 00
ro NJ
s ?
ro
f i
n II JD
I I I
3 Qi
2 #
^ %
II
*S J
l i s
H-l 00 CO
Ra: 2
g ^
& %
QJ Ln
00 Nl
9 Z
CL ro
M f
NJ E i l
LD BO
Ul Ln
cr g
Ln 14
S ^
11
(S"^
(TO Ln
CL UJ
II >
O Ln
SS
ro NJ
00 >
CD CL
II
H-l 3
8 '3
n ro
g
II
o
CD
rt 3
-o r
s g
g I
^ (TO
jg ^
$
00 ro
f i 00
^ 8-
? S
B
Nl go
t "
s
cn LU
(D Ol
# 2
II
CD
CD
(n
cn
Ol
Ul
3
TD
CD
OJ
"8 ^'
g o
TO 3 -
^1
QJ n
a 3-
II Bo
HI 00
CD
LO
ro
f i
QT
00
cp
<i
CL
00
BO
m ro
/ i r (TO
00 .S
S ^
II TO
as
NJ < ^
ro^ g_
c S!
I D Bo
c r g
Ln ; i
o
o
Ln
CD
Ln
cn
cr
Ul
f i
o
CL
s>
TO
3" % 6
C JD 33
rt c: 33
^ B s
^ i s
II <
Ln H-l
f i UJ
3; CD
H- l
QJ H I
-I 3
D
ro
as U3
NJ Nl
O
LD
ro
f .
oT
00
CD
ci
CD.
00
UJ
>
as
>
CD.
eo
g
-o
ro
3
I
3
ro
g
II
CD
f . BO
t I
UJ
LU
cn
UJ
NJ
CD
00
00
Ln
LU
CD
^
00
t o cn
as ro
K g
Nl
Ln
CD
X
=1
-o
H-l c r
CD n
3 H-l
Ul 00
ro Nl
3 n
n cn
If
% g
!
I D ro
2; g
OJ 3
g s
k &
00 eo
V m
H"
8 %
? T l
LU (TO
^ \
n
01 ro
5 51
2 g
go Ln
g - n
rt CL
Q.
QJ c
CX go
1 ^ g
- TD
ro
o
o
Ul
CD
Ul
01
cr
UJ
f i
o
eo
XD
go
CD
00
NJ
go cn ro
S Sl 5^
3 NJ
Ul BO <
ro ro S .
ll 3
OJ
y % TO
ro CD
N
II TO
CD ro
I D II
2; g
# g
g
<
CD.
ro
f i
LO
cn
ro
(30
00
f i
f i
K
i
Ln BO
Ul g
#1
o
CD.
as iu
NJ LO
% ^
g s
F Q
ro
e. g
3
ro
g
II
CD
BO
JD
BO
3
C
TO
QI
II
O
I D
ro
00
cp
ci
CX
00
Nl
>
o
as
Ul
>
Ul
as
UJ
>
CL
BO
g
T3
ro
3
1
3
ro
g
II
CD
BO
JD
II
g
ro
QI
NJ
LO
Nl
f i
f i
I D
Ol
ro
(30
oo
f i
f i
I D go
i l
11
cr go
11
n II
- S
1/1 go
- cr
CD
cr I :
2 ^ ^
n LU
01 CD
BO
ro
S g
Ln
2
II
QJ
C
TO
g
g .
TO 3 -
l l
M 00
II a
a
QJ 5 '
TO A
ro ro
II = :
g ^
Ln eg
NJ TO
7 g
ro
OJ
CD
LO
ro
;^
00
cp
ci
CD.
00
TO
g
g ro
Ln 3
cr
Ln
CD
CD
Ul
CD
Ul
cn
cr
LU
f l
CD
CL
BO
era
ci
II
o
I D
ro
f i
QT
00
cp
CL
CL
00
NJ
t:^
o
Nl
3 %
g C
I I
Cf II
^ 2
NJ Nl
CD
eo
z
? r
II
>
e^
J
Ul N 3 -
LU 2
O QJ
as m
NJ ro
^ 83
: -
eo
g
I D
ro
3
ro
g
II
CD
BO
X3
II
g
ro
OJ.
cr
ro
CL Ln
UJ CD
- K
NJ
cn
01
go NJ
3 Bo
c ro
oo
X
=1
T3
3 NJ
^
II Ul
O Ol
go LD
m -f
eo
TO
ci
II
o
LD
ro
f i
TO g
l i
B s
00 Nl
CD ~
2 ^
n TO
3 - O
as <
Nl TO
Ln o
01
I I I
i l l
2 ^
cr g
i l l
5 S
l i t
CD > Ln
CX O f i
n so NJ
BO ^ :S
00 Ln H-l
f ^ Y
CD Ul NJ
:p % 8
6 Ln f i
g ^ &
CD CL Ol
III
H-l 3 ,
S '3
CT ro
g
II
CD
3
CD
ro. H
5'
.
w
i
g
3
TO
g
<
in
g
<
$
ro
cr
33
ro
g
c
ro
X
CX
C3_
II
7 :
H
TO
H
C
X
33
7=
ro
03
> 33
^
-<
2
z
7^
0C3
O
>
o
L.
Nl
ro
XD
00
TO'
vJ
NJ
C
n
I D
TT
BO
II
Ol
LU
LU
Ol
UJ
Nl
CD
00
00
Ln
UU
o
^
LD go
i l
s ^
i
cn
NJ
BO
ro
3
II s
ro a
5 ?
I?
CD
g S
g m
g 5-
I I
3 .
'C o
BO
cr
3
Ul
ro
g%
QJ m
(S
ro <.
M
m n
z
II eo
M TO
9 s
II
o
LD
ro
f .
oT
00
CD
ci
CL
00
CD
CD
Ln
CD
Ln
cn
cr
UJ
f i
CD
Q.
BO
(ra
Q:
II
o
LO
ro
f ^
oT
00
cp
ci
CL
00
K
3
QJ
^ TO
CX ro
Nl
9j S!
^ ^ ro
?f ^
cn
., CD-
S TO,
NJ - * i
=6 X
=1
-a
QJ
II
a_
CD
o
Nl
QJ
TD ^
BO Zl
I g =
\s 2 K
5 2 ^
UJ i
> '
O
as
NJ
Ln
UJ
>
Ul
as
Nl
Ul
Ul
>
CL
BO
g
T3
ro
3
I D
UI
cr
Ln
CD
o
Ln
CD
Ln
Ol
cr
LU
f i
CD
CX
&
13
eo
JD
00 t >
5 5
CD ro
^
00 3
CD
g g
c ro
3 S
II XD
6 JI,
^
I
iff
u g ^
Q E I S
CD IT
LD 3 -
% g
ET Ln
00 NJ
9 Z
CX ro
& ^
Nl E
5 s.
CD -CD
I I
H-l 00
4
NJ (TO
SI ,
31
I 5
D g
c
01
LD BO
UJ LO
g- g
S" A
CD
O
Ln
CD
Ln
cn
cr
UJ
f i
CD
CX
S>
(TO
CL
II
CD
LO
ro
^
oo
cp
ci
CX
00
Nl
HI
o
NJ
g CD
g iu
! S-
i l
3 JD
^ X
! #
(TO 3
? t
% g
H
II
t i
X3 cn
c X
NJ
! i
ft s
rt. CL
2
% els'
NJ ro
^ E
iS
Ol II
ro cn
11
' o
00
ID go cr
LU t , O
II
ro
CX
CD
o
CD
Ul
CD
Ul
cn
go NJ
3 eo
^ ro
3
X
n
3
II
HI
CD
BO
cr
3
Ln
ro
o
" y 2?
II
OJ
c
TO
g =^
0 n
TO 3 -
rt
01 n
Zi
II
BO
(TO
ci
II
0
LO
ro
f i
Nl ~.
Ln 3
o ?^
g
TD
XI
3
4 C
g |
^1
TD 33
\ ro
li
I I
3 ' CX
TT II
OJ Ln
00 Nl
CX
ro
TO
g
<
00
g
CL
CL
00
NJ E
if
LD Bo
cr g
\n Zi
i l
11
& g
era Ln
ci Ul
II >
CD i n
LO as
ro NJ
6 Ul
oT LU
00 >
CD CL
II
HI 3
8 ' 3
CT ro
^
JD
-<
Ul
<
g
o
rt c
g
TO
03
03
Ul
f i
Ul
si
f i BO
m "N
| i
f . LU
Pi tVJ
' CD
00
00
Ul
UJ
Nl
Nl
Ln
f i
CD
CD
CD
f i
Ol
CD
-I -
CD
CD
CD
CD
LD go CT
^i? 8
o
CD
Ln
CD
Ln
00 H-l
2 K 3
f i n ro
CD
ro Nl
CT go 8
i l l
. O O II
A g #
II
cu
c
TO
g
g
era.
ro
eo
A
Zi
H
TO
ro
as
NJ
Ul
NJ
ro
OJ
go
TO
ci
& n
LO 3 -
& %
01 Ul
00 Nl
9 Z
CL ro
&
Nl E
i l
I D Bo
CT g
Ln Zi
i l
s %
il
i g ^
(TO Ln
CL LU
II >
CD Ul
ro to
f l Ul
oT LU
00 >
CD CL
II
I - l 3
8 ' 3
CT ro
g
II
CD
CD
LD
HI
00
00
>
TO
g
<
6D
O
<
Ul 3
CT (D
g
3
CD
BO
TT
II
^
BO
f t
ET ro
^ 3
i u 01
II
ro ro
<. 5
CL go
S i
NJ II
2 |
? iD
NJ QJ
g ^
i l
UNCLASSIFIED
(U) DECLARATION
(U) 1, L1EUTF-:NANT COLONEL MARTI N C. NEHRING, declare and state: I am the subject matter expert for the
Directorate of Operations (J3) for classifications reviews. In this capacity, I reviewed documents pertaining to
United States v. Private First Class Bradley Manning, which the Manning trial team provided to USCENTCOM.
My recommendations to the Original Classification Authority (OCA) in regard to the proper classification ofthese
documents arc contained on the attached list (containing a total of seven pages) and are hereby incorporated into this
declaration.
(U) Pursuant to 28 U.S.C. 1746,1 declare under penalty of perjury that the information provided herein is true and
correct to the best of my knowledge.
Dated: October 2011 y ^ / ^
VV/ M/
MARTIN C. NEHRPMG
Lieutenant Colonel, U.S. Air Force
UNCLASSIFIED
PROSECUTION EXHIBIT ^ f o r id^tification
ClONE AWHANISTAN EVENTS ca*
Identified Document
rrfortnatton Reyealing (Per CCR
380-14) CbsaHlcatlon
Basis for Original
Cleu'ifKation t i h l ot Current Cl mHUati on
053C4989-9747-41=D-9<i:S-4BC2F788rEAD
3/2/2008 3:37
Paget Operational activities 5/REl EO 12958 !c|
CCR 38014 (0110) 1.4(c), A-
23D8
2S3C4ES!>-E469-4BaO-9FDE63A42E7E12A7
12,M/20O7
Page 4
operational / foreign government
activities S EO 12958 um
EO 13292,1.4(b), CCR 380-14
(0110) 1.4(a): A-23ln
2S62BlFF-t285-46S9-9E91-BfCBSS8S186
7/2/2007
Page 6
operational / foreign government
activities S/REL EO 12958 (a)(b)
EO 13292,1.4(b), CCR 380-14
(0110) 1.4(a): A-23I>11
295S6796-D1B2-46FO-8657.264113IMFF42
2/9/2007
Pages
operational / foreign government
activities S EO 12958 ia)lb)
EO 13292,1.4(b). CCR 380-14
(QUO) 1.4(a|: A- 23l l
2A5CA12C-9579-4DAB-KE2-33343BFE93CB
2/17/2007
Page 10
operational / foreign government
activities S EO 12958 (a)ib)
EO 13292,1.4(b), CCR 380-14
(0110) 1.4(a): A-23IH1
M261792-F927.5419-051O126F30S1B23D
6/30/2009
Page IS operational activities s
CCR 380-14 (0139).
A23,A 24; 60
13292, 1.4 (a)
CCR 380-14 (QUO) 1.4(a): A-
22X6, A23l l
<ASB0499-EB94.4F08-9DW 6E6EDC-81F4C
3/4/2007
Page 21
operational / foreign government
aaivlties S EO 12958 (a)(D)
EO 13292, 1.4(b), CCR 380 14
(0110) 1.4(a): A- 23n
4F08360B-20S3-4E90-8696-7E48D3252D7C
3/23/2007
Page 23 operational activities s EO 12958 (a)
CCR 380-14 (0110) 1.4(a): A-
22* 6. A23* l l
S13BD156-C13F-4F06 99'VF-8A1ASC1A5F64
8/1S/20O7
PageZS operational activities 5 EO 12958 (a)
CCR 380-14(0110) 1.4(a): A-
22K7, A23l l
592S531EC90B3E0E9Cl23B7B7Fi')A3A9
U/26/2009
Page 26
operational / foreign government
activities s
CCR 380-14(0109 ,
A-24;E0 13292.
1.4 (a)
EO 13292, 1.4(b), CCR 380-14
(0110) 1.4(a): A- 23l l
,'6509B14-75S8-47BJ8''=F-84A3F49UB41
2/10/2007
Page 29
operational / foreign government
activities s EO 12958 (a||b)
EO 13292,1.4(b), CCR 380-14
(0110) 14(a): A-23i rl l
8E9902SO-1372-S1CO-5901D.=3792D40F3F;
9/6/2009
Page 31 operational activities s
CCR 380-14 ( 0! r ,
A23.A-24;E0
13292.1.4 {al
CCR 380-14 (0110) 1.4(a):A-
22K7, A-23#l l
BA67D1C4-261D-4934-8C 1CF194K70226D
2/12/2007
Page 33
operational / foreign govemment
activities S EO 12958 (a)(bi
EO -.3792, 1.4(b), CCR 380-14
(0110) 1.4(a): A- 23l l
C6A6DCO5-1372-5tC0-5<iF7l3B:iO1721Cl
9/17/2009
Page 35 operational activities S/REL
CCR 380-14(0109),
A23, A-24: EO
13292, 1.4 Ja)
CCR 380-14 (0110) 1.4(a):A-
22*7, A.23II11
F87E01A4-99FS-465A-8D3B-8031D7B05933
S/9/2007
Page 37
operational / foreign government
aa'ivlties S EO 12958 (a)(bl
EO 13292, 1.4(b). CCR 380^14
(0110) 1.4(a): A-23l l
ReportKey 42BCCB0A-E93S-4296-A783-
D0884BB70E37 occurred 12/28/2007 10:30
Page 20
operational / foreign government
activities S/REL EO 12958 (a)(bl
EO 13292, 1.4(b), CCR 380-14
(0110) 1.4(a): A-23X11
ReportKey F9B227A4-28li:-4EAC A8CF-
6D28C67DA78A OateOctjrred 10/13/2006 0:00
Page 41 foreign government activities S EO 12958 lb) EO 13292,1.4(b)
ReportKey FADBDCIC-E59B-7F41.
27BEC0B99A5A32D3 DattOccurree 10/14/2008
8:50 operational activities S EO 12958 (a)
CCR 380-14 (0110) 1.4(a):A-
22*7, A. 23l l
Page 1 of 7
ManningB_00572371
ClONE IRAZI EVENTS
cas
identified Document
nformation Revealing (Per CCR
380-14) Classification
Basis for Original
Classification Basis for Current Classification
072A8443-DACC-4E47.A328-309FC84524B2
5/4/2006
Page 1
operational activities 5 EO 12958 (a)
CCR 380-14 (0110) 1.4(a):A-
23*9
CA07EE58-C792-rB6E-lF:itCn97EC38C10A
6/23/2009
Page 3 operational activities S
CCR 380 14I01OT),
A23;EO 13202. ; 4
(a)
CCR 380-14 (0110) 1.4(a):A-
22*7
1259C04A-F394-1A01-393SCA2F53BA767F
11/20/2009
Page 5 operational activities S
CCR 380-14 (0109),
A23; EO 13292.1.4
(a)
CCR 380-14 (0110) 1.4(a):A-
22*7
13O4FAC8-29OC-4623-B36C-3S40E3D;0E2C
11/30/2004
Page 5 operational activities 5 EO 12958 [a)
CCR 380-14 (0110) 1.4(a)JV
23*9
ReportKey 1019AC04-1E58 44EC-9D10-
509586E51A4F OateOctxrred 10/23/2005 0:04
Page 7
operational / foreign giDvernment
activities S/REL EO 12958 (a)(b)
EO 13292,1.4(b), CCR 380-14
(0110) 1.4(a): A-23*9
ReportKey 22A6FS8E-F618-4A1A-PF07-
29BB0S125499 DateOcciirrec; 9/14/2C05 14:48
Page 10 operational activities S EO 12958 (a)
CCR 380-14 (QUO) 1.4(a): A-
22*7
ReportKey 28628224-AB.'F-:CF4-
004SDS8D3FFF86AF
DateOccuaed 6/28/2009 20:31 Page 13 operational activities S
CCR 380-14 (0109),
A23; EO 13292, 1.4
(a)
CCR 380-14 (QUO) 1.4(a); A-
22*7
ReportKey 2974CC()0-CE79-0207-
DE92O63C5E0443C5
OateOccurred 11/24/2009 22:30 operational actlvllies 5
CCR 380-14(0109),
A 24; EO 13292,
1.4 (a)
CCR 380-14 (0110) 1.4(3): A-
23*9
ReportKey 2FBD7A50-FE40-CE03-
9401D7643A4SS299
OateOccurred 6/30/20O9 6:03 operational activities 5
CCR 380-14 (0109),
A-24; EO 13292,
14 (a)
CCR 380-14(0110) 1.4(a); A-
23*9, 11
ReportKey 31D33B9C-4210-4561-
5E60C4F966A7AC4A DatiiOtcurred 7/16/2008
21:00 operational activities S EO 12958 (a)
CCR 380 14 (QUO) 1.4(a): A-
23*9, 11
ReportKey 31FFBCOE-93A6-91A1-
8AAAFA4EE2945AC6 DatjOccurred -0/7/2009
16:32 operational activities S
CCR 380-14 (01091,
A-24; EO 13292,
1.4 (a)
CCR 380-14 (0110) 1.4(a): A-
23*9, 11
Repor t Key 4SA8BACB-42 30- 4561-
50A42ESA6516F886 OateOccurred 10/'28/2008
15:30 operational activities S EO 12958 (a)
CCR 380-14 (0110) 1.4(a), A-
23*9
ReportKey 4BF346FO-00(-817C-
7F8C9DF1692A10A0
OateOccurred 12/18/20C8 20:38 operational activities $ EO 12958 (a)
CCR 380-14 (0110) 1.4(a); A
22*7, A23l l
ReportKey 59103S:iA-92-iB-E44A-
4D802B801CF604EB OateOccurred 8/26/2009
23:29 operational activities S
CCR 380-14 (OlO'i .
A23, A-24: EO
13292.1.4 (a)
CCR 380-14 (0110) 1.4(a): A
22*7, A23*9. 11
ReportKey 5eAS6040-07 ;3-15AF-
F833103576729E32
OateOccurred 8/28/20OS 2:20 Page 31 operational activities 5
CCR 380-14 (0109),
A23, A-24; EO
13292,1.4 (a)
CCR 380 14 (0110) 1.4(3): A-
22*7, A23#l l
ReportKey 63S3OO56-Al=A-O60E-
332O4A7A0945F9PF OaisOcojrred 3/21/2039
10:38 operational activities 5
CCR 380-14 (0109).
A23, A-24; EO
13292,1.4 (a)
CCR 380-14 (0110) 1.4(a): A-
22*7. A23* l l
ReportKey 6687D323-0F:!7-A8E1-
85899AD30652S333
OateOccurred 12/6/200? 23:20 opecationai activities S
CCR 380-14 (0109).
A23, A-24; EO
13292,1.4 (a)
CCR 380-14(0110)1.4(3): A-
22*7, A2 3*11
ReportKey 682B8A77 08,\1-829B-
B6040FC885232519
OateOccurred 12/7/200? 1:28 operational activities 5
CCR 380-14 (01091,
A-24; SO 13292,
1.4 (a)
CCR 380-14 (OHO) 1.4(a):
A23#9,11
ReportKey 6BOA16AB-B/3C-FC8C-
0220277732025A48 DatiiOccurred 3/30/2009
1531 operational activities 5
CCR 380-14 (0109!.
A23, A-24; EO
13292,1.4 (a)
iZCR 380 14(0110)14(3): A-
i 27, A23* l l
ReportKey 6E901533-47.S9-4E80-940C-
4F86S1BC0DEA OateOccurred 2/7/2O05 23:45
Page 43 operational activities S EO 12958 (a)
CCR 380-14 (0110) 1.4(a):
A23*9,11
ReportKey 6EAE5BD8-O47C-0SA6-
S71O9EC60AC3523C OateOccurred iC/19/2009
2136 operational activities S
CCR 380-14 (0109),
A23, A-24; EO
13292,14 (a)
CCR 380-14 (0110) 1.4(a): A-
22*7. A23l l
ReportKey 719ABD5C-85A1-42E5-IB2-
FE334B6E469D OaieOcairred 10/15/2006 21:07
Page 46
operational activities 5 EO 12953 (a)
CCR 380-14 (0110) 1 4(a): A
22*7, A23* l l
Page 2 of 7
ManningB_00572372
CIDNE IRAQ EVI-NTS (Page 2) C03
identified Document
nformation Revealing (PerCCR
380-14) Zlassiflcatlon
iasis for Original
Zlassiflcatlon 33SIS for Current Classification
ReportKey 74S09F'm-8D/io-jFC6-8976-
D8CB96363C66 OateOccurred 10/20/2 OOS 14:00
Page 49
operational/foreign government
activities 5 EO 12958 (a)(b)
EO 13292.1.4(b). CCR 380-14
0110) 1 4(a): A23*9,11
ReportKey 78401Ef 4 FCAC-4F2D-A7CB-
e9a5E4DF825B DateOcoj.'red 13/25/2CCS 15:30
Page 51 operational activities S EO 12958 |3|
CCR 380-14 (0110)1.4(3):
A23*9
ReportKey 789FC769-C9A6-CCEA.
8B51997178603022
OateOccurred 10/21/200) 13:15 operational activities 5
CCR 380-14 (01091
A-7J1; E0 13292
1.4 (a)
CCR 380-14 (0110) 1.4(a): A-
23*8.11
ReportKey 799E74FB-10E:-4E5E-BE6C-
6A549C2A49A7
OateOccurred 10/22/200.; 2338
operational/foreign government
activities S/REL EO 12958 ls)(b)
EO 13292, 1.4(b), CCR 380-14
(0110) 1.4(3): A-239
ReportKey 7F12282C-5O55-5023-
5831E165ASAE2457
OateOccurred 5/12/2007 4:44 operational activities S EO 12953 (a)
CCR 380-14 (0110) 1.4(3): A-
22*7, A23* l l
ReportKey 818F138EB29ED68C-
1548F72F771D0191I
OateOccurred 5/27/2009 10:17 operational activities 5
CCR 380 14 101041
A23.A 24;E0
13292. 1.4 (3)
CCR 380-14 (0110) 1.4(3): A
22*7, A23*l l
ReportKey 8694704a-F336-ED65-
E1EC9S9B8746520(1
OateOccurred 7/16/2009 21:18 operational activities 5
CCR 380 14 IOCS).
A23, A-24; EO
13292, 1.4 (3)
CCR 380-14 (0110) 1.4(3): A-
22*7, A23411
ReportKey 884E3011-07li7-6BBC-
FAA6S5FBC8738OC0
OateOccurred 7/17/2009 12:00 operational 3Ctlvlties 5
CCR 380-14 (0139),
A23, A-24: EO
13292,1.4 (3)
CCR 380-14 (0110) 1.4(3): A-
22*7. A23* l l
ReportKey 808C41 l8-FC(i6-A935-
B6EOE2C6075EFCCS
OateOccurred 9/6/20091:05 operation3i3ctivltles S
CCR 380-14 1010=;,
A-24; EO 13292.
1.4 (a)
CCR 380-14 (0110) 1.4(a): A-
23*9.11
ReportKey 8EEOOS55-B6f FOE43-
SCC71098D2A929EB
OateOccurred 13/25/2003 23:04 oper3tion3i3ctivlties 5
CCR 380-14 10139), 1
A-24; EO 13292, CCR 380-14 (OHO) 1.4(a): A-
1.4(3) {23*9.11
ReportKey 99C3B6BB-F 7tiB-4FAF-
n309DAAS08lA6B:3
OateOccurred 9/8/i 009 Ll:35 operational activities S
CCR 380-14 (0109). j
A23, A-24; EO ;CCR 380-14 (0110) 1.4(3): A-
13292,1.4(3) |22*7, A23* l l
ReportKey 9A037FR6.09I)3 E779-
A3B1025D2C7A685A
OateOccurred 9/8/2009 ' . Om operational activities 5
CCR 380-14 ( 01) ,
A23, A-24; EO
13292,1.4(a)
CCR 380-14 (0110) 1.4(3): A-
22* 7, A23* l l
ReportKey A2ABlE80-AC3O-EFi9-
BFAA52006ACCEC10
OateOccurred 9/9/2009:1:23 operational activities S
CCR 380-14 (0109),
A-24.EO 13292.
1.4 (a)
CCR 380-14(0110) 1.4(3): A-
23*9.11
ReportKey A2C1B415 A2 :B 580B-
4138A3FOB7FE8C89
OateOccurred 3/12/2008 10:30 operational activities S EO 12958 (a)
CCR 380-14 (0110) 1.4(3): A-
23*8, 11
ReportKey 80680030-8654 S59E-
9C8H87491806597
OateOccurred 1/7/2009 Ll:28 operational activities S EO 12958 (a)
CCR 380-14 (0110) 1.4(a): A-
23*9,11
ReportKey B27B576F-D215-3CEC-
C70471SA7OACE230
OateOccurred 9/30/2008 9:51 operational activities S EO 12958 (a)
CCR 380-14 (0110) 1.4(3): A-
22*7. A23*l l
ReportKey B4FSA6 '9-781)2-4065-8153-
7372476EEE77
OateOccurred 10/23/20C5 0:23
operational/foreign government
activities 5 EO 12958 (a)(bj
EO 13292. 1.4(b). CCR 380-14
(0110)1.4(3): A23*9,11
ReponKey BS4C6O02-A1A2-132C-
507A500E0F4C4412
OateOccurred 9/13/2009 14:14 operational activities 5
CCR 380-14 10109'.,
A-24; EO 13292,
1.4 (3)
CCR 380-14 (0110)1.4(3): A-
23*9,11
ReportKey BE0A29E9-DC !0-456-9D31-
3DA1F1A14S3B
DateOccun'ed 3/13/200 15:08 operational activities 5 EO 12958 (a)
CCR 380-14 (0110) 1.4(a): A-
23*8
ReportKey BFaCE4i3-A3!10-F54B-
AD090F08AEF99486
OateOccurred 11/4/2009 2:16 operational activities S
CCR 380-14(0109)
A-24; EO 13292.
14 (3)
CCR 380-14 (0110) 1.4(a): A-
23*9,11
ReportKey C29 75F2-C9?iE-3B02-
B494FA60186A8078
OateOccurred 10/3/2008 9:55 operational activities 5 EO 12958 (3)
CCR 380-14 (0110) 1.4(a): A-
23*8,11
ReportKey C43B43C3-0857-43ES-8694.
627703FE38A9
OateOccurred 10/22/20C5 21:48
operatlonal/fcDreIgn government
activities S EO 12958 laKbl
EO 13292.1.4(b), CCR 380-14
(0110) 1.4(3): A2309,11
ReportKey C476C534-OEB2-E828-
1E/959612A44868F
OateOccurred 12/5S/20C9 7:16 operation3l activities S
CCR380-I4(0!ir>!
A-24; EO 13292,
1.4 (3)
CCR 380 14 (0110) 1.4(3): A-
23*9,11
P3ge 3 of 7
ManningB_00572373
CIDNE IRAQ EVENTS (Page 3) CU3
IdentlAed Document
infoiitialionR^ve^ling (PerCCR
380-14) Classification
Basis forOrigiO.il
Classification Basis for Current Ciasslflcstion
ReportKey aU6C48B-EE20 1FI19
5571AE995A6B1F63
OateOccurred 11/7/2009 2145 operational activities S
CCR 380-14 (0104;,
A-24; EO 13292,
1.4 (a)
CCR 380-14 (0110) 1.4(3): A-
23*9,11
ReportKey D637F898-f523 E5C8-
FDFA312483CB9A4H
OateOccurred 1/14/2009 5:C0 operational activities s
CCR 380-14 (0139),
A-24; EO 13292.
1.4 (a)
CCR 380-14(0110)1.4(3): A-
23*9,11
ReportKey DAAE0EB8-A4F1-C65S-
F917CFD9AC2BE71H
OateOccurred 8;'2/r0O9 8:00 operational actlvllies s
CCR 380-14 (ni os;,j
A-24, EO 13292, jCCR 380-14 (0110) 1 4(a): A-
1.4 (a) 123*9.11
ReportKey DF4783F0-905&-B43F-
60BO10DBAEBS90I4
OateOccurred 1/16/2009 7:30 operational activities s
CCR 380-14 10109;
A-24;EO 13292.
1.4 (a)
CCR 380-14 (0110) 1.4(3): A-
23*9.11
ReportKey DF6BE8CE-0SS3<2FC-
01A7E6ED190D3AFA
OateOccurred 4/25/2009 13:40 operational activities 5
CCR 380-14 lOJU'JI
A-24; EO 13292,
1.4 (a)
CCR 380-14 (0110) 1.4(3): A
23*8,11
ReportKey E30ADO?5-EinB-4020-99ES-
DAC80ECF874B
OateOccurred a,'8/20O6 11:57 operational activities 5 EO 12958 (a)
CCR 380-14 (0110) 1.4(3): A
23*11
ReportKey E7EFf3A3-AlF7-lD2B-
8D12BEB372D2AC54
OateOccurred 6/16/2009 7:59 operational activities 5
CCR 380-14 10109),
A23, A-24; EO
13292,1.4 (a)
CCR 380-14 (0110) 1.4(3); A-
22*7, A?3l l
ReportKey FtFlFEF3-B274 F785-
5A47FSC322B64FB.:
OateOccurred 9/11/20071:34 oper3tlon3l3Ctlvities 5 EO 12953 (a)
CCR 380-14(0110)1.4(3): A
23*9.11
Page 4 of 7
ManningB_00572374
OTHER 9RIEFINGS
COS
Identified Oocumert
nformation Revealing (Per CCR
380-14) Classification
Basis for Original
Classification 33sis for Current Oasslfkallon
Brief To GEN P Findings and Recs 8 lune. No
yesr found operation3{ aaivlties S/REL EO 13292,1.4 (al
CCR 380 14(0110) l.itla). A-
24*12
Ch3t Logs (CENTCOM) No
Date oper3tion3l activities S
CCR 380-14(0109}
1.4(a), A-23; EO
13292, 1.4 (3)
CCR 380-14 (0110) 1.4(a), A-
22*6
F3r3h Brief FINAL v\. 22 M3y 09 operaion3l 3ctivitles S/REl
CCR 380-14 (0109.1.
A-24; EO 13292.
1.4 (a)
CCR 380-14 (0110) 1.4(3): A-
23*11
F3r3h Brief FINAL v8 24 M3y C9 oper3tion3l 3Ctivtties S/REl
CCR 380-14 (0109;
A-24;EO 13292
1.4 (a)
CCR 380-14 (0110) 1.4(a): A-
23*11
F3rah INS Prob3bly Oeiiberstley Instigate 4 M3y
CIVCAS Incident Strategic Intel brief, ID May
2009
interim Report F3r3h CIVCAS Investigation l o Gen
Petrseus, 7S May 10
QRF SUPPORT FARAH FTT Powerpoint document
M3y 2009
FINAL ICS REPORT (05 20002 JUN 09i
(SIGNEDKminlmtecl) (3)
operational 3Ctlvltles S
CCR 380-14(0109).
A-25; EO 13292,
1.4 (a)
CCR 380-14 (0110) 1.4(a), A-
24*12
TAB A Appendix 1 (QSOTF FRAGO 02
OPERATIONAL GUIIIANCE) 29 l3a 09
operational activities S/REL EO 13292.1.4 (3)
CCR 380-14 (0110) 1.4(3), A-
24*12
APPENDIX 2 TO ANNEX C TO F.HAGO 08.003; 29
Oct 08
APPENDIX 3 TO ANNEX C FRAGO 08.OC3:29 Oct
08
APPENDIX 4 TO ANNEX C FRAGO 08.0C3; 29 Oct
08
TAB A Appendix 5 (USCENTCO.V Tactica Directive
-OEFAFG) 12 Sep 08
operational activities S EO 13292,1.4 (a)
CCR 380-14 (0110) 1.4(3), A-
24*12
TAB A Appendix 6 (PID Policy) 20 Dec 03 operational activities 5/REL 0 13292,14(9)
CCR 380-14 (0110) 1.4(a|, A-
24*12
TAB A Appendix 10 (USFOR-A ^RAGO C8-003 -
CIVCAS PROCEDURES) Sep 08 operational activities S/REl EO 13292.1.4 [3)
CCR 380-14 (0110) 1.4(a), A-
24*12
TAB 0 Appendix 6 (3213 ORF CCNO) 4 M3y 09 operational activities S
CCR 380-14 (0109).
A-24; EC U292,
14 (3)
CCR 38C-14 (0110)1.4(3), A-
23*11
TAB C Appendix 2 (Str3teglc I nt i l br ef) 10 May
09 no 13 equiies noJ3 equltes no 13 squltes
TAB 0 Appendix 7 13141 mitia: TIC Slide) 4 May 09 operational activities 5
CCR 380-14(OlC'i..
A-24; EO 13292.
1.4 (3)
CCR 380-14 (0110)1.4(3), A-
23*11
TAB A Appendix 2 (FRAGO 429-2008 COMISAF
TAC OIR) 8 Oec 08
no equities ISAF/NAFO/S
TAB A Appendix 12 (USCENTCOM
CONSOLIDATED SERIAL CNE RULES OF
ENGAGEMENT FOR OPERATION ENDURING
operational activities S EO 13292.1.4 (3)
CCR 380-14 (0110) 1.4(3), A-
26*19
VIDEO (BE 22 PAX), Way 2009 aperation3l activities s
CCR 380-14 (OHM!
A-24; EO 13292,
1.4 (3)
CCR 380 14 (0110) 1.4(a), A
23*11
Page 5 of 7
ManningB_00572375
EXTRA 20 DOCUMENTS
Identified Oocument
Information Revealing (Per CCR
380-14) Classification
Basis for OrigiPrti
Classification 335ls for Current Classification
ReportKey 08B36010-9131-1CA0-
1C5640A34263A618 D3teOccurfed S.'28,'20C8
7:55
Page 1
oper3tion3l 3Ctlvities 5 EO 12958 (3)
EO 13292. 1.4(3), CCR 380-14
(OHO) 14(3): A-23, *8, *11
ReportKey 09A6302C-D8F1-4288-
837D8BC5A3A7FC0O DateOcojrred 7/9/2008 4:42
Page 2
oper3tion3i activities S EO 12958 (3)
EO 13292, 1.4(3), CCR 380-14
(0110) 1.4(a): A-23, *8,*11
ReportKey 10CF8O28-OO20-51E8-
240C62B96F67ODD7 03teOccurred 12/7/20O8
5:12
P3ge 3
operational activities 5 EO 12958 |3|
EO 13292,1.4(a), CCR 380-14
(0110) 1.4(3): A- 23, * 8, * l l
ReportKey 1E14FD; 0- BDAF- A387-
0E6E883CD0B45042 D3teOccurred 12/9/2008
18:50
Page 5
operational activities 5 EO 12958 13)
EO 13292, 14(3), CCR 380-14
(0110) 1.4(3): A-22 *7, A-23 11
ReportKey 50BE089C-0CO9-7406-
A1BO6O9E97622EE0 OateOccurred 4/17/2008
15:22
Page 6
operational activities 5 EO 12958 (3)
EO 13292, 1.4(a), CCR 380-14
(0110) 1.4(3); A-23, 8,*11
ReportKey 61FF7036-9FF8-C7DS-
510CS9CB08EDD48S OateOccurred 11 '3/2008
8:45
Page 7
operational activities 5 EO 12958 (8)
EO 13292, 1.4(3), CCR 380-14
(0110) 1.4(3); A-23, 8,11
ReportKey 6E72B4E1FD32-8C81-
44570CFBE8563BDQ OateOccurred 7/29/2008
6:40
Page 8
operationsi activities 5 EO 12958 (3)
EO 13292, 1.4(a), CCR 380-14
(0110) 1.4(3): A-23 *11
ReportKey 72F3566A-F0F4-5689-
2390E8080BEC6557 D3teOccun'ed 7/3C/2008
2:00
Page 9
Oper3tion3i 3Ctlvities S EO 12953 (a)
EO 13292,1.4(3|. CCR 380-14
(0110) 1.4(3): A-23, *8,*11
ReportKey 73BEF45B C7FB-9501-
A667980209176352 OateOccurred 2/14/2009
6:12
Page 10
operational activities S
CCR 380-14 (0109)
1.4(3), A-23; EO
13292,1.4 (3)
EO 13292.1.4(3), CCR 380-14
(0110) 1.4(3): A-22 * 7, A-23 * ] 1
ReportKey 7515D2.12-96B3-028S-
1B8E169C2ESB6C1) DateOccu-red 7/30/2008
3:15
Page 11
operationsi 3ctlvlties S EO 12958 (3)
EO 13292, 1.4(a), CCR 380-14
(0110) 1.4(a): A-22 *7, A 23 H
ReportKey 89843A4O-0573-SF32-
20B3ADC3CE56C303 OateOccurred 4/26/2008
4:45
Page 12
operational activities S EO 12958 (3)
0 13292,1.4(3), CCR 380-14
(0110) 1.4(3): A-22 *7, A-23 *11
Page 6 of 7
ManningB_00572376
EXTRA 20 DOCUMENTS
Identified Document
nformation Revealing (Per CCR
380-14) Classification
Basis f or Ongt r r t l
Classification Basis for Current Classificstlon
ReportKey 8C5S09D2-0160-7457-
AF585B2401D5EC04 03teOccjn-ed 12,'31/2008
635
P3ge 13
operatlonsi 3ctivKles 5 FO 1295813)
0 13292,1.4(3), CCR 380-14
(0110) 1.4(3|; A-22 *7, A- 23* l l
ReportKey 9A1EC6C6-CDC9-7A05-
75AA98A9D1B62560 OateOccurred 6/18/2008
2:30
Page 14
operation3l 3ctlvlties 5 EO 12958 (a)
EO 13292.1.4(3), CCR 380-14
(0110) 1 4(31: A-22 #7, A-23 *11
ReportKey B4EDA6!:C-C714.5FA6-
42AEE13S7S5CAD7F OateOccurred 1/8/2009 4:52
Page 15
operational activities S EO 12958 la)
EO 13292,1.4(3), CCR 380-14
(0110) 1.4(3): A-22 *7, A-23 l l
ReportKey B4EDA6.5C-C714-5FA6-
42AEE13575SCAD7P OateOcoirrrd 1/8/2009 4:52
P3ge 16
oper3tion3l 3Ctivities S EO 12958 (3|
EO 13292,1.4(3), CCR 380-14
(0110) 1.4(3): A-23, *8,*11
ReportKey B552CDi)2-OEll-C493-
E62E77C8068BC090 DsteOccurred 11/19/2008
10:55
P3ge 17
oper3tion3i 3ctivlties 5 EO 12958 (a)
EO 13292. 1.4(3), CCR 380-14
(0110) 1.4(31; A-23, *8,*11
ReportKey CDBA48C6-A66B.3E95-
9C7E62077BF8D7S9 DsteOccurred 6/28/2008
4:17
P3ge 18
operational activities S EO 12953 (a)
EO 13292,1.4(3), CCR 380-14
(0110) 1.4(3): A-22 7, A-23 *11
ReportKey E43ClCJ.l-0f D1-313F-
BC405B9CFB2BA03D D3teOccurted 1/5/2009
5:30
Page 20
opcr3tlon3l 3ctivitles S EO 12953 (a)
EO 13292,1.4(3), CCR 380-14
(0110) 1.4(3): A-23, *8,*11
ReportKey FS84AAE4-C46B-36SF-
45BFCD8E63953D7F OateOccurred 10/13/2008
7:00
Page 21
operational activities S EO 12958 (a)
EO 13292,1.4(3), CCR 380-14
(0110) 14(a): A-23, *8,*11
Repor t Key FA0BDC1C-FS9B 7F41
27BEC0B99ASA32D3 OateOccurred 10/14/2008
8:50
Page 22
operational activities s EO 12958 (a)
0 13292,1 4(3), CCR 380-14
(0110) 14(3): A-22 *7, A- 23l l
P3ge7of 7
ManningB_00572377
UNCLASSIFIED
(U) DECLARATION
(U) I . LIEUTENANT Thomas Hogkins. declare K, sw: I n the subject m.Mer expert For the Dir^^or.,, of
StnUegy.PI.andPolicy(J5)forcl.incion reviews. Inlhigc.pacity.lrcviewed document, pm,inmg,o
United States v. Pnvpfm Fir^t r i ^ Br^lgy Manning which the Manning trial team provided to USCENTCOM.
My recommendation, ,o the Original ClasglRction AuAoAy (OCA) in rrgard to the proper clawincation of the,e
documen are contained on th, amichcd lia, (containing a kxa, of nineteen page) and ar. heby incorporated into
this declaration.
(U) Piir^u^, to 28 U.S.C. g ,745.1 dcchre under penalty of pcgury thatthe information provided herein ia t n. and
correct to the best ofmy knowledge.
Dated: 2J_ October 2011
- . =^ =7 - ? ^ ^
rhomas Hoskins
Lieutenant, U.S. Navy
UNCLASSIFIED
/ j ) >
or Men
PROSECUTION EXHIBIT ^foy&nt i t i cat i on
ManningB_00527378 PAGE OFFERED:_^V^E ADf^ITTED:
PAGE Q ^
g
QJ
00
CD
t o
M
a
y
D
A
D
I
n
t
e
r
-o
o
?
l
O
's
o
>
CD
CD
LD U l
3 " O
CD
3
R
e
i
O
3
CD
<
R
e
i
3
CD XJ QJ
s
t
i
g
a
t
o
r
t
,
d
o
c
I
F
i
n
s
t
i
g
a
t
-n c
Q.
o Sj 3 3 "
3 01
ro
0 0
ZT 3
NJ
NJ
C CL 3
(/ 2 S.
: ^ Ol fD
CD' "2.
^ o I 3
o
<
CD Ul
3
CD
3
s l
C 3
a.
ro
a_
o
<
3
CD
3
CD
QI
Q.
3 '
CD
It
<
CD "O
o
01
3.,
n
T j '
CU
3 '
OtJ
c
3
o
3
o n
Is
n 00
S
n
n
33
UJ
oo
o
o
n
s ^
o
n
CD
5'
5
CD
1-1
O
3
cr
<
c_
3
n>
r 3
03
o-
o n
Is
1
o
o
37
UU
^ s-S. 5
01 CD P
^ "2. 5
l l
J 3
c
01
3
_ n
3
CD
CL
CD
T3
C
Q.
E , ;
CD
3
O
<
y 3
K ;
= : ^ n
ZT. < T j '
CD "D tu
\L 5 5'
O 00
c
3
Ln ) ^
l/l _ .
3
o o
Is
n 00
G 9
o o
H I O
s :
n
t 3 "
g %
% 2
Ol - D
l i
= QJ
P+ 3
< CL
5_
QJ
f?
O.
n
n
33
UU
00
O
o n
F-l n
gs
s!
o
CD
UJ
?
o n
F-l O
s
u
>
Ul
CTl
>
D
CD
<Z. Ul
n
V -
o n
HI n
e S
S?
Q.
CD
3
CD
Q.
U
O
n
c
3
CD
3
- g
o
3
01
o'
3
3D
ro
<
CD
DJ_
5'
era
o
03
O 03
S7 OJ
5- 9
3 qo
3 '
03
03
OJ
F,- O
n
c
fD
3
ManningB_00527379
T )
OJ
00
CD
N l
O
T3 T l
o
<
D'
n
CD
>
0?
3 "
01
3
Q ^
^<sg
o o. g a
5. m
2 . <
^ 2,
J I
S
r-l- CD
01_
O
c
77
00
01
i S I
01 =
< OJ
N l 3
O
O
U )
on n n
C fD o
2 S 3
g = i
ry n 3
O Q.
3 ?
i i .
=^ f?
Q.
U l
35
ro
D
O
3
o
>
37
01
cn
(71
cu Q.
3 fD
Q. - g
o o
cr <
ro 3
? 9 -
< r f
ID y
o
3
3 3
i l
^
a Q.
O
n
w
6'
3
n
CD
3
r i _
c
a.
3 '
era
n
o
3
n
CD
T3
Q- O
CD
-> O
o -a
- * i fD
S" %
Ct o
CD 3
Ln
33
O ^
CZ
5
o n
Is
n 00
SS
-
o n
I -l n
s
n 00
n
<
r~)
>
un
5"
<
CD
N l
U l
H
s I
o
Q
fD
3
o
T3
CD
o
3
SL
n
o
Q.
fD
O f - l
5 S
VD
UU
8 9
^ s
T3 -
n
n
33
U l
g
o "
O 3
u
I I
11
01
o' S
3 3 -
o
CD
f D
3
O. 3
% s.
Ol fD O
<
fD
3
01
3
Q .
I I
C 3
a.
fD
o_
-
3
CD
3
C
Q .
f D' OO
fD
CU
CL
<
a
CD
o
$ g
o'
3
-o
01
B
n
t a'
cu
5'
era
c
3
o n
I s
PI
13 "
o n
* - i n
s
n go
el
LD l / l
3
<
fD
Otl
Ol
O
3
NJ
NJ
33
CD
D
O
a
o
a
fD
o
3
0J_
n
o
a.
f S
o n
Is
n go
D 9
Ln I -l
o n
!-> n
s :
n 00
S?
ManningB_00527380
T3
01
0 0
CD
Ul
t-1
U3
O
<
3 '
f l
CD
>
(i?
3 -
01
3
01 3 - Q,
^ < 5
c-l =
g i : CD
rt rt Ul
a o
42.
X 03
CD SL g:
%
Ol N l
l i
: 3
fD ^
00
01
g
fD 3
era
Ol
m
n
| i
Ol '
3
33
CD
T3
O
a
>
33
M
Ul
( j l
n
o
3
3
01
3
CL
| S
01
CD
o
5
z
o
c
S
U
S
w
e
I-l
S
o
I -l
N l
OI
o
a
i
n
a
b
p
o
n
s
h
a
r
a
c
d
s
.
O
p
e
r
01 QJ
3 CD
-<
Q.
5' r
e
l
a
s
t
i
e
s
3
n
O
fD
a.
c
U l
d
e
^ ZFi iO
c
l / l
>
o n
Is
1
T3 -
o n
M n
6 :
si
T l -
O
<
3 '
m
JD
>
(j?
3 "
01
3
3-
CD
<
m'
3
rt 01
3
? ^ I
5 ^ 1
6 S
3 rt
0 * ^ 0 '
3 O 3
^ i t
s i I
o o
c
O G. rt
2. CD'
rt l /l
-<
o
03
SL
01
^ !?
03 3
5^
? i
11
o Q-
?
3
3
cu
3
CL
CD
c
3
O
t o
>
33
LP
(71
| s
01
fD
> ^
1/1
33
C
t / i
>
o o
I s
It
o o
F-l O
s :
o 00
SI
T3 -
ManningB_00527381
aa
>5
cn T>
X o
I o
iq S
i
o o D
3:
O = -Tl
>
O
T3
O
33
D
O
I D
o
X
>
>
z
O O Q
rn in
n
O X
<D =
t / 1
O
> >
CD
X
>
z
g
o
-t3
o
33
O
O
LD
O O G
O m C/1
5 x 3
00 = -rl
>
o
o
O
33
O
O
LD
o
X
>
z
I
z
-a -n
QI 3 -
l <
5 5-
^
Ul CD
S
^ Q
03 5.
rt rt'
2 . - <
2,
J g
3
rt g j
SL
O
c
? r
D. rt a. (5- n SL
n
o
3
3
01
3
CL
fD 6' %
3 rt
Ul o
O 3
g
Ol '
3
31
CD
TJ
O
;:;
o_
>
33
I
o
i i
|g
01
CD ~ O <
c
I D
n 3 r
I I I 3 -
fD
O
O
CT
01
fD
rt
5'
3
9L
n
o
D.
CD
O N
T3
CL
CD
CL -O ^
fD
X
o;
CD
o
ro
fD
3
o o
cr <
bL cr. o
o
3
S 5-
fD
.O
C_
CD
a.
(0
X
CD
n
c
5
3
n O
Pi
rt c
o'
3
C
Q.
3 '
era
o
a.
CD
n
o
3
f l
CD
TJ
II
CD
3' sr"
3 r
fD
fD
O
3
3 o
cr
01
O
D
fD
O
3
cr c
QJ c/1
O t u
-h 3
CL
O
3
I
o
m
q n
=n 33
m
q O
^ 33
Cl t>3
q o
^ 33
m
m %i
q n
^ 33
y i
30
m
r-
O
3
11
n o
cn .f^
8 R
i
2 w
<Z 00
n
U
u
o o
I s
n
T3 -
o n
H-l r>
s
n oo
s ?
o n
K l n
s
89
S
o n
I -l n
sS
1
o o
I-" n
s :
n 00
o o
I-* n
n CO
u
l\/lanningB_00527382
T l
01
era
fD
Ul
o
if
00 X
b
8 g
>
X
n
01 CL
3 CD
CL -O
O O
cr <
3
CD
3
o
3
I I I
s S
S; - FT n
CD
X!
C
CD
CL
g 5 w
l l i
n ' 3 n
2 00 fD
O ^
CL O
CD - h
O
O T3
rt. fD
% g.
CL O
CD 3
n
fD
n
33
R
o :
CL 00
o 9
e s
2 R
6 :
l / l "r"
>
T3
T3
g
X
Ul
-H
O
>
z
z
m
X
n
Q.
CD
Q. a_
o o
o
X3
fD
c r ~< cu -J rt
3
fD
3
f l
fD ^
O
n
rt
5"
3
fD
X
fD
n
c
6'
3
n
o
3
O. X
3
00 CD
o H
CL O
fD
- I o
O T3
fD
cr
QI
QI
o
3
n
33
ii
o n
H-l n
I S
!
3 ^
i i
O X
O NJ
s>
X
n
01 CL
3 CD
CL TO
o o
cr -<
3
fD
O
TJ
fD
01 rt rt =
~ 3
l/l
o
3
O
3
3
00
o
o
3
n
fD
T3
Q.
fD
o
T3
CD
a Si.
O
3
l / l
un
.S
if
n
n
33
c-l o
9tt
o n
I-* n
I S
n 00
o
<
o
>
Ul
T3
33
o
n
m
O
C
33
c
l / l
- n
o
33
>
-n
33
>
cn
o
o
Cp
( 3
o
LU
Q. O
T3
O
3
01
n
o
a.
fD
i s
H
C
m
>
o
o
cn
O
n
D
Ul
n
n
33
Ul
g
n
n
33
Ul
n oo
G 9
Ul ir
ManningB_00527383
00
CD
(JI
2,
t - 1
(D
H
>
n
H
9
r
g
33
33
>
cn
o
A
Nl
I D
Nl
O
O
00
n
O
01
3
CL
Ol CL
3 fD
ca. q_
o o
cr
3
fD
3
o
3
o
c
f l
ID
CD
S3
C
CD
CL
O
T3
CD
O
S n
o- 3
3 i n
c
Q.
3 '
00
o
a.
ro
n
o
3
o
fO
TJ
cr
01
o
T3
fD
o
3
CD l ^
q n
^ 33
z
>
S ^
n
n
33
Ul
o n
I-l n
I S
R 8
is
i s
s 5
Si
1
c
2
z
cn
33 n c
c o Ul
r- z n
a s 5
O I
m o
3 ^ 2
cn m
> o
cn oo
m m
S 2
m >
n
O
s;
fD : i
S
3"
fD
n
O
3
cr
cu
S 01
E o
CD 3
O 01
- h 3
C O-
l / l
Z i g
o n
Z ZD
o
o
33
Ul
00
O
o n
I - l o
I S
n oo
S?
Si
S 5
i
c
33
cn
33
n
C -n
C
o
U l 33
I
z n
m
m
S
O
L
z O
O
S
O
L
- j
o
-n
D
n
o
E
Z >
\
S g
cn
m
o
>
O
o
cn
U l
o E
M
E
E
R
I
A
o
N l
z
r-
H
O
z
m
01 CL
3 fD
o. a_
o o
cr -<
3
CD
~ 3
VI
O
3
o
C
n
CD
0 CD
% g
1 Cl
rt rt
5' o'
00 3
3
n.
c
Q.
3 "
00
n =- c-l O
fD
X3
CD
CL
G. X
n
o
3
f l
CD
T3
CL
fD - h
o
O TJ
- h CD
S" 3
a 5-
^ 5
z tfj
O n
Z 33
o n
H-l n
il
- n
O
30
o
-D
m
33
>
O
o
z
Ul
O
o
>
c
Ul
n
o
O
o
c
2
z
cn
cn m
> o
cn m
m m
5
>
o
CD
O
3
SL
n
o
CL
fD
Z cn
O 5
Z 33
n
n
cn 33
2 UJ
00
u
o n
I-* n
8 S
S?
ManningB_00527384
T3
Ol
(30
CD
^
o
LD
CZ
^
n
O
S ^
03
C-l
CL
CD
CL - O
o o
cr <
m- 3
n CD
o
3
o
T3
CO
o
n
e
x
3 '
U l CU
o'
e
c
2"
n
e
a
n
CD
c
Q.
u
o
n
CD
o'
5'
era
f l
fD
3
1
c
i
n
o
r
d
o
7
CD
n
c o
O
3
o
TJ
3
cu
3
f
b
a
t
e
r
a
t
i
cr
rt
o
%
n>
3
cn
m
TO
q
o n
O
n
o n
O
n
l / l 33 U l 33
o
I -l
U l
00 n
o
U l
00
f - l
cp r> cp
G
H-l
G
I -l
cn
4 ^
U l
*
T3 D
o n
I -l n
gs
si
c
l / l
n
m
Z
H
n
O
2
01
n
<
c
o o
I - l n
I S
p
>
g
n
>
33
>
cn
o
N l
O I D
33 N l
m O
q g
^ S
l i
CD
^
<
fD
3
fD
o
o
3
3
c
3
n'
w
5'
3
cn z
^11
2 S
n
n
33
Ul
00
o
o n
I-" n
I S
n oo
SS
-o -
>
g
n
>
r
g
33
m
q
<
3
CL
33
>
cn
o
NJ
I D
N l
O
o
00
o
o
n
c
fD
Ol
3
CL
o o
rt,
5- CD
CD
Ol
00
fD UL cr.
3 170
CD 3
= n
oo' P
fD
3
f l
fD
o Zi
3 Ol
SL ?
CD o
? -
n
<'
CD
3
CD
z
>
p -
n
n
33
Ul
00
o
o o
M n
I S
SI
TJ -
>
O
H
n
>
g
33
m
q
<
m
Ol
3
Q.
33
>
cn
o
f
N l
I D
N l
o
o
00
n
O
^
5- g
-ii
5 S- 3 "
CD
n
O
3
cr
01
cn i
q n
33
^
i i
s,^
o o
M n
s :
s !
33
>
cn
o
N l
I D
N l
o
o
_ 00
^ s
s 1
ex.
>
n
H
n
>
r
g
33
I ^
CD
O
3
SL
I -l
o
CL
CD
cn i ^
q R
33
I
l / l
>
i i
n 9
S s
o n
i-> n
11
SS
13 -
ManningB_00527385
oo
CD
00
O
g| f i
O rt ^ CT
m n CD
era
n
3
CD
3 3
^ r S-
2. (T %
< a Z
n CL un
^ ^ 7
o
CT
01
CT
.2
01
-<
I I ^ 9
01
CT
2 ^ 0 1
=r
CD
n
O
3
CT
01
cr. o
CD 3
O 01
- h 3
C CL
un
c cn i ^
L n (33
> 33
O
33
3 s
n
n
33
Ul
sl
o
o
33
^ Ul
O 00
SS
T3 -
N l l / l 3
o cr ^
o 3
I D rt
Ol
-<
n
" ;
" 5;
g^-
3
2.
CT
^' -
CD CD
2 ^
*^
l / l
D
O
CT
tu
CT
-<
CU
N l
g
O
CD
o
3
SL
n
o
CL
fD
c cn !^
U l 00
> 33
1
c _,
n
33
q
o G
n
r>
33
Ul
00
o
o n
I-' n
sS
S?
n
o
^
o
-o
o
g
00
c
cu
3
Q.
i I g.
3
re
(So'
CD
3
n
fD
00
CD
3
n
CD
O 00
TJ
CD m
01 5
3'
01
SL f?
a
<
CD
3
rD
n Ul
t , m
z S
cn q
03 ^
>
^ c
U l
iC 33
< K
f-l 9
S s
o o
!- n
I S
n 00
S|
l i
ISI O
?l
s :
g
(JO
=; o
X I ^
OJ G 3 r
S S? 3'
_. g_ _
fD
n
O
3
CT
<U
rt
E 5'
fD 3
O Ol
rt, 3
c Q-
u i
n un
>> r r i
* s
m q
03 ^
>
^ c
l / l
o n
I-* o
I S
n oo
SS
a *
1
Ss
? :
n
O
00
] 0
o
- D
n
<
g
(JO
CL
CD
CL - O^
O O
3
fD
3
o
3
o
CD U l
p
e
r
x
e
c
i
c
l
u
o
0 1
c
CL
o
3
in
g
lo
ID
U
O
I
n
g
o
r
c
e
p
t
f l
ca.
QJ CD
o
o 3 o
TJ
3 fD
CU
3
b
a
t
r
a
t
i
o
5
JD
S
U
i
CD
s
c
n '='
CD
x>
C
3
CL
p Jfi
* 8
cn q
03
>
^ c
l / l
u
u
T3
o n
I - l n
e S
s!
ManningB_00527386
-o
CU
00
re
I O
o
l O
o
l / l
CL
re
2; s
o
3 3*
M
3 QJ
re
01
g
re
01
o n
I s
n 00
SS
t 3 -
0 n
t-* n
1 s
n 00
SS
TJ -
o n
M n
I S
8 8
cn I - l
s
I - l % - n
Ul re l / l
11
33
CJ.
o
n
c
3
re
3
>
?
X
OJ Q.
3 re
CL - O
o o
CT <
re
3
re
3
o
3
o
re
o
TJ
re
3
c
Q.
3 '
00
o
Q.
re
n
o
3
n
re
TJ
3 o
CT
01
o
TJ
re
o
3
o
33
z
^
o
33
n
O
n
33
o o
I s
SS
o n
M n
I S
8 9
i n I - l
8
HI S - n
Ul re l / l
11
33
O.
O
n
c
3
re
3
>
33
>
X
3
o
re
o
3
SL
n
o
CL
re
O
33
O
33
n
o
o
n
33
-c: Ul
O 00
o
n
33
Ul
00
o
2 ?S
.C 5 n
h-l re l / l
i a
o
3
CJ.
O
f l
c
3
re
3
>
3 J
>
X
a
n
d
1
d
e
p
f
i
t
a
c
t
i
r
e
s
o
l
a
d
o
re
X
re
i
n
c
l
u
U l
n
o o
n
c c a. o
b
j
e
c
<
rt
a.
3
b
j
e
c
3
re
I
m
c
e
s
i
n
g
U
O
I
3
00
n
re
<
3
a
n
re o
n
o
n
rt
re re
CL
o
i n
01
n
u
v
e
[
u
i
r
e
d
.
OJ
5'
:
u
m
re
o
o
T J
U
O
I
^
[
u
i
r
e
d
.
3
s
t
a
f
b
a
t
t
l
e
.
e
r
a
n
c
e
s
.
f
b
a
t
t
l
e
.
o'
3
n
33
z
o
o n
i i
n 9
^ t
-o -
o n
I - l n
I S
8 ^
c n I -l
2 O ^
re
T3
O
CJ.
O
n
c
3
re
3
l / l
c
-o
-o
O
33
-I
>
3 J
>
X
re
o
3
01
n
o
CJ.
re
O
33
n
O
n
33
O O
n
G 9
U l I -l
o n
I - l o
eS
f
ManningB_00527387
T3
01
00
re
I - l
o
o
5; t
7\
X
o
U l
<
g
m
3
>
Z
T3
re
o
3
Ol
n
o
CL
re
8 A
gs
n 00
SS
Ul
o n
I -l n
I S
8 9
r s
o -
w
I O
n
o
3
T J
O
3
re
i i
o -p
Z 33 m
^ 5
O
>
n o g
?
a. 3
% s.
01 re
TJ
o
-<
3
re
3
Ul J 2
S
C 3
re ^
_ n
g 2:
CT era
re re
TJ
re
o n
cn n
O 33
UJ
00
o
n
n
33
Ul
n' oo
o
I - l
CL _ y
5' o
I
o
3
y i
3
0 0
c
3
l i
I s
TJ re
3
o g
Z 33
<n
g
2
o
c
z
o
n
i
m
>
33
m
O
33
T3
o f''
re
OJ
6'
3
SL
n
o
Q .
re
o n
cn n
<s
s?
w
o n
I -l n
I S
n go
z S
< o
i i
33
l / l
m
^
33
n
T3
N l
Si
X
T3
2 P - o
^ l / l
SS
i i
?
c o.
l / l re re
CL
re
D_
o
-<
J 3
C
01
3
E S
3
re
3 ^
? i 1
CL
re
g_
o
-c
3
re
3
^ I
I ?
rt <
CD "O
-o
01
5.
o'
T j '
rt
5'
0 0
c
3
^ Ul
n 00
o n
I-* n
I S
O 00
o
3
g <
o o
33 m
o
33
U l
m
33
n
T3
NJ
S o
n
>
33
33
T3
X
-o
I
O
l / l
X
g
33
o
^
re
o
3
01
9
CL
re
S A
ES
R
o n
H-> n
I S
n 00
ManningB_00527388
o
Ol
00
re
M
I D
if
St
o
c
z
o
n
r
5
33
33
o
c
-n o
33
- O
o
T J
re
o
3
SL
r>
o
o.
re
S R
O 33
Ul
00
O
o n
t - 1 n
I S
SS
u -
> o
^ 3
IL
X
T3
1
o
U l
q <
C -rl
d 33
N l H
I
33
o
C CL
U l re
? ^
I I I
3
I I
-S 5
o
XI
c
<
c_
3
re
c
CL
3
o
<
re
3
re
3
CL
re
D^
o
-<
3
re
3
re CT OO
<
TJ
re
re
cu
CL " _
5' o
g I
o
3
T3
rt
5'
era
c
3
tr Ul
n CO
8 2
o n
I-l o
I S
sl
T } -
g
t o
> o
I - 3
i l
>
m
2 Nl
33
g
n
o
X
TJ
O
U l
<
m
X
>
^
za
O
^ %
re
o
3
QJ
O
o
CL
re
o n
cn o
ES
R ^
o n
I -l o
I S
n 00
<
O
o g 3
1 g
3 ^
> ^
^ S
o
o
c
z
.o
o
I
m
>
33
33
T3
C CL 3
k % s.
c^ 01 re
re' "2.
Ul X3
S
C 3
< g I - l
E n Ul
c
CJ.
i l
re Ul
i s
3 CL
CL
re
o
<
re' CT oo cr
<
T J
re
3 CJ. y
o
n
rt
6'
3
TJ
rt
5'
00
c
3
Q
q
o n
cn n
s
O 00
cn
o n
t - i n
I S
n 00
w
vo
Manni ngB_00527389
2"
%
t -
NJ
O
VO
I i i l
| s i
n S ^
i l l
X 33
>
^
33
O
re
o
3
01
9
CL
re
o n
cn n
gs
O
c n H I
UJ
o n
1-1 n
I S
SS
T l -
>
U l
I D
1
lii
" 5 >
: -
o
-<
%
m
O
C D-
cn re
7 g,
re
3
CL
re
CL
re
D_
o
-<
.o
c
01
3
< 3 3
CL
re
a_
o
<
3
re
3
I
cr <
re "o
% E
o
3
Ul
TJ
Ol
3
n
X>'
3
00
c
3
K R
as
8 9
cn M
w
o n
I-* cn
I S
n 00
SS
T3 -
z <
t ; O
P m
if
o
n
O
<
>
33
N l
O
TJ
re
o
3
SL
n
o
CL
re
R
O 33
_ UJ
<n 00
G 9
c n I-l
UJ
o n
I -l n
s S
?
i i
o
<
o
35
o
c
n
o
3
T J
o
3
re
3
n
>
33
-n o
3 J
- D
m
X
T}
r
O
U l
<
m
X
>
5
33
o
C Q-
c n re
n j i m
re l /l
a.
<
re
CL
re
TO.
o
-<
3
C
Ol
3
g
- S
3
re
e 3 3
C L
re
o
o
<
3
re
c
Q.
21 (M
T3
(U
3.
= : rt G.
re
01
Q.
3 '
re
-<
TJ
re
o
o
cu
i " %
o
3
TJ
rt
3 '
0 0
c
3
s R
<S
n 00
SS
-D -
>
is
n 0 0
>
U l
I D
Manning B_00527390
- g
01
00
re
I - l
UU
o
G 3 m
8 g ;
' i i
O Z m
IS>
i l
^
33
D
1 ^
3- o
TJ
re
o
3
SL
o
o
CL
re
o n
Ul n
SS
'
>
B
o n
t-* n
I S
n 00
SS
Tl -
S? l
o
l / l
o z
iii
2 m
33 C
n
CL 3
2 S.
QI re
^ "2.
2.-I
1
C 3
c
CL
CL
re
o_
o
<
3
re
3
re
cu
Q.
3 '
re
SL 3
CT 00
rt . <
re " o
K E
o
3
13
Ol
5,
n '
TJ'
rt
5'
00
c
3
O f - l
Is
8?
w
o n
n
gs
8?
5 X ^
TJ "O
X
T3
o
Ul
O Z m
i l l
2 m
33 CJ
n
re
O
3
01
9
CJ.
re
o (n
cn n
?S
!
o n
HI n
s
si
sg?
l i i
n m
Z > X
o % >
5
X ~
T3
33
^ s
CJ. 2
2 S.
01 re
^ "2.
1
re
3
o
<
re
3
re
3
2 I
C 3
(3.
re
o_
o
<
3
re
3
I ^
2. ^ _
cr. 01 3
re o; era
S R
gs
g8
cn H*
o n
t - i n
I S
n CO
re
o
n
rt
5'
3
- ?
5.
n '
TJ
QI
5'
00
c
3
-<
TJ
re
ManningB_00527391
T3
01
OO
re
I - l
o
? <
2
> O
N l ^
n S
X
T3
I
o
U l
33
-o
i^S
n 3
X
TJ
r
O
U l
<
m
X
>
^
33
O
y ^ o
re
o
3
CU
o
O
CJ.
re
o n
Is
n 00
SS
t 3 -
o o
H I O
I S
8
E
T3 -
l / l m
5 ^
o
O
U l
O 7
X
T3
r
O
52
<
D 3J X
> c g
HI Z o
n S -
< d S
CJ_ Zi
2 S.
01 re
ur 2.
rl
re l/l
1 I
S I
C 3
t F
I 2
Ul
I ^
I I I
= - rt 0 .
cr. < T3
re T ) QI
re
3
D- _
O
n
rt
5'
3
3
00
c
3
o n
cn n
gs
SS
"o -
Ul
o o
HI n
1
SS
i i
X
T }
r
O
10
o ^
n
<
g
>
I - l
n
< II
-n O
# M
re
CU
5'
3
SL
n
o
Q .
re
n
n
33
UJ
s!
o n
H I n
gs
?
X
T3
> ^
O
oS
i >
i l l
S s-
g. g
2 c
XJ
c
cu
3
Hf
3
3
n_
c
CL
3
o
<
re
re
3
CL
re
o_
o
-<
3
re
3
re ' CT oo ~
~' ' -6'
cu
_ <
re TJ
CL _
o
f l
rt
o'
3
3
0 0
c
3
o n
Is
n
n
o
33
UJ
0 0
o
c n H
ManningB_00527392
3"
00
re
H I
Ln
O
re
o
3
Ol
n
o
a.
re
o n
cn o
g s
8 9
cn H*
o n
HI o
I S
n 00
SI
5 . 5
>
00
n
O
<
z ^
7< TJ
i i
i o
N l
O 33
-D
S re S 1
01 re c
re' CT " 2 . y i
a a |
XJ
c
Ol
3
g -
3
^ n
3
re
3
o
<
re
3
re
3
CJ.
re
I t
y 3
K #
c
Q.
CT (TO = rt G.
o n
cn n
gs
R 8
S
.T3 -
Ul
o n
M n
I S
8 ^
V s
T3 "
>
UJ
I D
re
01
CJ. _
5' o
S 2,
o
3
-<
TJ
re
TJ
cu
5 '
oo
c
3
91
7^ 7 ;
>
03
n
O
-<
# 3
TJ
i i
> $ 6
33
33
Nl
O
n
5 2
33
T3
H
s-^
re
o
3
01
O
o
CJ.
re
o n
cn n
gs
(-1 00
S ?
o n
HI n
I S
n 00
SS
T> -
X
- d
6
un
O P
X
T3
O
cn
<
33
a
21
n
c
U l
re'
3
^
<
CJ. -Zi
2 S.
01 re
! i
1
C 3
3
o_
C
CL
T3
Ol
s- -
TJ
re CT 00 2 ^
^ rt f l
o
-<
re
3
re
QJ
Q.
3 '
re
- c
TJ
re
T J
01
8
is
?
o n
HI o
s S
S?
w
t o
o
n
rt
5'
3
3
00
ManningB_00527393
I
l-
m
o
l O
i i i l
o T3 n
5 Q fz
Ul
> X
sg
?
o
re
o
3
01
n
o
CJ.
re
o n
cn o
gs
gs
cn e
UJ
o n
M n
I S
8 9
cn HI
# ^ 3
> T3
17 r
s i l
M Z m
g 3 ?
. . T3
o 5
# 6
o z
i l
Nl
5 -
re
3
a.
-c
rt CL
OJ re
or "2.
-|
re
3
JZl
c
QJ
C 3
01
UJ
s-
T3
1 H.
2 E 5"
3 3
Ol
E era _
rt G.
o
<
01
3
CJ.
rt -C
re "5
3 OL L_
o
n
rt
6'
3
TJ
rt
5'
00
c
3
o cn
cn n
gs
n 00
>
t
o n
HI n
I S
n go
SS
T3 -
^
%
111
i l l
NJ Z m
o O
I s
o z
I ?
33
O
re
o
3
01
n
o
a.
re
o n
cn <n
l i
G 9
cn HI
o n
M n
I S
n 00
? 53
> S
^ o
<= z
^ %
> H
cn o
$
X
T3
I
o
Ln
<
m
X
>
^
33
O
O Q m
m . i i Q
C Q-
u i re
re
a.
re
a_
o
<
re
<-= I
3
3
o
<
re
3
re
3
C
y
CL
re
D.
o
-<
3
re
3
c" ^
g =
re
cu
Q.
3 '
re
a
SL 3
2; 00
rt <
re
T>
at
a
T3
rt
3 '
00
C
3
O
3
g R
gs
o o
H' n
I S
8 9
\"
.T3 -
ManningB_00527394
-o
su
00
re
t - 1
^
o
O n >
% c 2
6 g
-rr >
UJ X
n K
00
c
Ul
X
33
I I I
s ^
c ^
W
o
t - 1
N l
U
S
CJ.
re
CL
O
T3
re
re
3
o
CL
01
~C
3
5' o"
o
3
o"
< 01
n re
re
m
e
n
t
C
o
d
m
e
n
t
re
o n
cn o
O 33
U l
Ul
o n
HI n
I S
89
Ln H
w
to
O m
i s
cn
X
>
NJ
O 3
c 9
i
Ss
i l
^
o
<
3
re
3
IU
3
CL
1
C 3
re
5. S
3
re
Ul
'-ii E ?
S-c^ a
o
<
3
re
3
re
cu
CL
5' o
S I
o
3
<
TJ
re
TJ
rt
5'
00
c
3
Ul
o
n
33
UJ
00
o
o n
HI n
I S
8 9
E
-o -
%
Z <
< O
g m
> Cl
Cl
X
>
N
s ^
> X
s >
s ^
% s
o
TJ
re
o
3
SL
cn
o
a.
re
o n
cn o
gs
8 9
cn le
o n
HI n
I S
sl
T3 -
>
UJ
LO
X
TJ
m -n
^ o 8
^ O o o
o n
33
TJ
33
O
C CL
Ul re
re
CL
re
D_
o
<
3
re
3
X3
C
QJ
3
CL
re
a_
o
-<
3
re
3
I
^ I
S-ig
rt G.
re
OJ
Q.
3 '
re
<
TJ
re
rt ^ QJ
o
3
TJ
rt
5'
era
c
3
I s
00
o
n
cn
33
Ul
00
o
ManningB_00527395
T3
01
00
re
t - 1
00
o
33 X
^ P
i r O
l / l
c
U l
T3
m
n
O m
n
p
4^
cn
O
O
O
33
T3
f ^
re
n
o
CL
re
o n
cn o
gs
SS
Ul
o n
H I n
I S
89
? i
.o
m
r -
m
>
33
m
O
33
C3
=^ s
CL Z^
2 S.
01 re
I f
3
o
<
re
3
re
3
l /l XJ
2
C 3
s-
TJ '
Q.
C
CL
UJ
_ TJ
Ol
S- 3 n
S? 00 g.
5
re
3
re
cu
Q.
5'
re
-<
TJ
re
T J
rt
5'
0 0
c
3
o
3
o n
cn n
O 33
< w
n 00
w
n
n
33
Ul
00
o
O
c
n
I
m
>
33
Z
o
>
o o o O
33 iz-
n
# K
o
3
SL
n
o
CL
re
o n
cn n
gs
SS
T l -
o n
H I n
i i
>
Ul
I D
i l
03
c
U l
%
m 33
I I
s #
c '~:
o
l / l
<
m
X
>
g
33
O
CL 2
2 S.
01 re
^ "2.
I
re l /l
3 m
3 g.
rt -
2 S
C 3
i
T3 -
re
01
Q.
3 '
re
% 5.
1 S
II
d, <
re
o
s
T3
01
a
f l
5'
01
3 '
0 0
c
3
o n
I s
SS
o n
H I n
I S
O 0 0
P
>
UJ
I D
ManningB_00527396
TJ
01
00
re
H I
LO
O
LD
i i ? |
HI ( Z O r - ^
q ^ 3 o
< OJ n <: m i ; -
> ^ % ;
s<
X
c 5
" o < ^
5 O FR
Ul 2
n H
^
re
3
a.
<
CL 3
2 S.
01 re
^ "2.
l l
re l/l
3 m
3 EL
t/1 XI
2
C 3
"re I
TJ -
O
-<
re
3
I
1}
cr <
re
3 CJ. - _ y
o
n
K %
o
3
Tl
Ol
5
n]
TJ'
rt
5'
00
c
3
o cn
cn n
gs
n 00
S?
n
n
33
Ul
n oo
Sg
o -
un m
s ^ ^
5 S 5
m 33 ^
03 O
>
<
X
T3
o
l / l
33
T}
11:1
UJ 2 m
n H c;
o
^
re
o
3
SL
cn
o
CJ.
re
cn R
g S
rn 00
Ul
o n
HI n
g s
si
33 X
? m
i r P
Ul
C
Ul
Tl
m
q
X
TJ
r
O
un
<
o
p
f
cn
n
D
O
33 X
3g
n 33
O
I I I !
= T3 w rt
-
3
^ f l
3
re
2,-i
CJ.
re
TJ
C
Q.
2 : (TO
= rt G.
! i
I 2
1/1
0 '
3
cr. <
re "o
o
n
Ol
TJ
0 1
3
00
Ul
Is
SS
Ul
o n
H* cn
I S
8;
ManningB_00527397
Prosecution Exhibit 88
103 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
Prosecution Exhibit 8^
pages
classilied
"SECRET"
ordered sealed f^rReason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibit ^0
1^0 pages
classiHed
"SECRET"
ordered sealedf^rReason2
Military Judge's Seal Order
dated20August2013
stored in the classitied
supplement to the original
Record ofTrial
>
t/
(/>
m
O
553
Spo
q^fl
1
I
I
o
cn
CD
O
o
Zl
C O
g
%
o
{%
"0
ZT
o
3
i
a
c_
G
e
n
e
r
a
l
i
m
e
s
N
.
M
a
t
t
a
gg
WEBm
1
1
m
L
i
e
u
t
e
n
a
n
t
G
e
n
e
r
a
l
l
o
h
n
R
.
A
l
t
e
r
@
-<MfS^''
"k* ^
b
1^
j -
M
a
j
o
r
G
e
n
e
r
a
M
i
c
h
a
e
l
D
.
J
o
n
e
s
o
C
h
i
e
f
o
f
s
t
a
f
f
1
M
a
j
o
r
G
e
n
e
r
a
M
i
c
h
a
e
l
D
.
J
o
n
e
s
o
Bl
C
h
i
e
f
o
f
s
t
a
f
f
n ff.
C
o
m
m
a
n
d
i
e
r
g
e
a
n
t
M
a
j
o
r
r
a
n
k
A
.
G
r
i
p
p
e
o
' '-ll^^p-
UBS.
C
S
E
L
C
o
m
m
a
n
d
i
e
r
g
e
a
n
t
M
a
j
o
r
r
a
n
k
A
.
G
r
i
p
p
e
o
1 1 Il l
J"
88
g z
2
00 f o
i
D-*:
-i
?
I
SI
OL
a
8
s
&
I C/)
Q
a
z
m
03
c
>o
D Q Q
D O ^
z
m
mm
R > R
88=G
z
c
x^
(n
%
CD
i l
mg,
tn
US
m
i
i
m
f
>
i n
t/
i
>
i n
LA
m
O
CT S
M i
m
iRj
c
Q.
t o
(D
>
a.
<
o
n
Q>
I - t
n>
(A
o
R
9
^
s
I
If
m
5
v
cn
M
JiL
i il i l l
1
3 D B B B B D B W g B B B B B B B B B |
9 5 I I s g I
ff 5. 2 3. o
i i ' f l
1
.Eaw
f
3
3
c
!
ffll
i!
CO ^
t o %
Oi %
ll
i l
3 z
I
s
i
I
I I
>
tn
tn
I
K
1
I I I
S S S
^ 0
i i
t !
S
A
is
1
I
Nl
SS
%
10 O H-
o
01
* s
i i
10 Nl
w B
s s
GO O
w is
I i i I I
%
^ %
w in
i
cr o
3 I
5 1
i
m
s.
tn
tn
I f
& &
O oo
00
g
3"
Cl 3
g
II
@ ^
I d
01
!t
o
1
I
IO
I
; ^
II
I
3
3
9
I
I
cn
^
s
^ llif I
5f 3-1 Q
01
&
I
I
s
?
c l
>
t n
t n
I I
n
f
>
t n
t n
m
O
m
O
b
&
n g > ^
I ll If s -
n i l
o
k
>
t n
t n
B B B B B B B I
s s
5 5
K
1
s s w
H 3 3
f j N M N r o M W
s s
N w
?
10
O
S i
D
A
M
A
M
03 00 00 03 00 00
^ ^ ^ ^ ^ ^ ^
C C C
s g !e
c
ifi
c
S Q
V ^
z
n
s
t o
t n
m
O
l i i i l i i
s
1
s g
3 3
3' m
I
*
^
I
&
If
yi (I)
m c
I
f H S
I li B i
n i l
B B B I
03 O) CO ^ 4
B G G I
i S i
5 S S I
% S % #
K K K
S ^ ^
>
V>
V)
m
O
^ ^ ^
g g g
>
(/>
t n
m
O
s
5
c
UNCLASSIFIED
u s Government Property
SF 710 (1-87)
Substitute for
Prosecution Exhibit 92
Ar my Regul at i on 25- 2
Information Management
Information
Assurance
Rapid Action Revision (RAR) Issue Date: 23 March 2009
Headquarters
Department of the Army
Washi ngton, DC
24 October 2007
UNCLASSIFIED
ManningB_00016230
PROSECUTION EXHIBIT 9 3 for identification
PAGE OFFERED: PAGE ADl/lTTED:_
PAGE OF PAGES
SUMMARY of CHANGE
AR 25-2
Information Assurance
This rapid action r e v i s i o n , dated 23 March 2009--
o C l a r i f i e s and corrects references to Department of Defense Directive 8750.1
and Army t r a i n i n g requirements (para 4-3).
o Removes incorrect course reference to Information Assurance Manager Course
and provides correct information on C e r t i f i e d Information Systems Security
Professional modules (para 4-3) .
o Removes incorrect information regarding Fort Gordon course topics (para 4-3) .
o Removes references to the Asset and V u l n e r a b i l i t y Tracking Resource
compliance reporting database, which i s no longer used, to c o r r e c t l y
reference the Army Training and C e r t i f i c a t i o n Tracking System (para 4-3).
o Deletes incorrect reference to S k i l l p o r t f o r required information assurance
t r a i n i n g (para 4-3) .
o Changes Department of Defense Warning Banner verbiage to comply with
Department of Defense directed mandatory guidance (para 4-5) .
o Corrects references to the National Information Assurance Partnership (para
6-1) .
o Adds mandatory Department of Defense Standardized Notice and Consent User
Agreement language (app B-3) .
o Updates o f f i c e symbols and acronyms (throughout).
ManningB_00016231
Headquarters
Department of the Army
Washington, DC
24 October 2007
"Army Regulation 25-2
Effective 13 November 2007
Information Management
Information Assurance
By Order of the Secretary of the Army:
GEORGE W. CASEY, JR.
General, United States Army
Chief of Staff
Official:
(/JOYCE E. MORROW
Administrative Assistant to the
Secretary of the Army
History. This publication is a rapid action
revision (RAR). This RAR is effective 23
April 2009. The portions affected by this
RAR are listed in the summary of change.
Summary. This regulation provides In-
formation Assurance policy, mandates,
roles, responsibilities, and procedures for
implementing the Army Information As-
surance Program, consistent with today's
technological advancements for achieving
acceptable levels of security in engineer-
ing, implementation, operation, and main-
tenance for information systems
connecting to or crossing any U.S. Army
managed network.
Applicability. This regulation applies to
the Active Army, the Army National
Guard/Army National Guard of the United
States, and the U.S. Army Reserve, unless
otherwise stated. Also, it applies to all
users, information systems, and networks
at all information classification levels;
program executive officers; direct report-
ing program managers; strategic, tactical,
and non-tactical environments or installa-
tions; intemal or external organizations,
services, tenants, or agencies (for exam-
ple, DOD, sister Services, U.S. Army
Corps of Engineers (USAGE); contractors
working on Army information systems
pursuant to Army contracts; Army and
Air Force Exchange Service (AAFES);
morale, welfare, and recreation activities;
educational institutions or departments
(for example, DOD schools, the U.S. Mil-
itary Academy at West Point); and Army
affiliated or sponsored agencies (for ex-
ample, Western Hemisphere Institute for
Security Cooperation). During mobiliza-
tion, the proponent may modify chapters
and policies contained in this regulation.
Proponent and exception authority.
The proponent of this regulation is the
Chief Information Officer/G-6. The pro-
ponent has the authority to approve ex-
ceptions or waivers to this regulation that
are consistent with controlling law and
regulations. The proponent may delegate
this approval authority, in writing, to a
division chief within the proponent
agency or its direct reporting unit or field
operating agency, in the grade of colonel
or the civilian equivalent. Activities may
request a waiver to this regulation by pro-
viding justification that includes a full
analysis of the expected benefits and must
include a formal review by the activity's
senior legal officer. All waiver requests
will be endorsed by the commander or
senior leader of the requesting activity
and forwarded through their higher head-
quarters to the policy proponent. Refer to
AR 25-30 for specific guidance.
Army management control process.
This regulation contains management con-
trol provisions and identifies key manage-
ment controls that must be evaluated (see
appendix C).
Supplementation. Supplementation of
this regulation and establishment of com-
mand and local forms are prohibited with-
out prior approval from the Chief
Information Officer, G-6 (SAIS-ZA), 107
Army Pentagon, Washington DC
20310-0107.
Suggested improvements. Users are
invited to send comments and suggested
improvements on DA Form 2028 (Recom-
mended Changes to Publications and
Blank Forms) directly to HQDA, CIO/
G-6, 107 Army Pentagon, Washington
DC 20310-0107.
Distribution. Distribution of this publi-
cation is available in electronic media
only and is intended for command levels
B, C, D, and E for the Active Army, the
Army National Guard/Army National
Guard of the United States, and the U.S.
Army Reserve.
C o n t e n t s (Listed by paragraph and page number)
Chapter 1
Introduction, page 1
Purpose 1-1, page I
References 1-2, page I
Explanation of abbreviations and terms 1-3, page 1
Army Information Assurance Program 1^, page 1
'This publication supersedes AR 25-2, dated 3 August 2007. This edition publishes a rapid action revision ol AR 25-2.
ManningB_00016232
AR 25-2 24 October 2007/RAR 23 March 2009
UNCLASSIFIED
ContentsContinued
Overview 1-5, page 1
Chapter 2
Responsibilities, page 3
Chief Information Officer/G-6 2-1, page 3
Principal Headquarters, Department of the Army officials and staff 2-2, page 4
Administrative Assistant to the Secretary of the Army 2-3, page 4
Assistant Secretary of the Army for Acquisition, Logistics, and Technology 2-4, page 4
Tbe Deputy Chief of Staff, G-2 2-5, page 5
Tbe Deputy Chief of Staff, G-3/5/7 2-6, page 5
Tbe Deputy Chief of Staff, G-4 2-7, page 5
Commanders of Army Commands; Army Service Component Commands; Direct Reporting Units; U.S. Army
Reserve; Army National Guard; program executive officers; direct reporting program managers; Regional Chief
Information Officers; Functional Chief Information Officers; and the Administrative Assistant to tbe Secretary of
the Army 2-8, page 6
Commander, Information Operations Command 2-9, page 6
Commanding General, Network Enterprise Technology Command/9* Signal Command (Army) 2-10, page 7
Commanding General, U.S. Army Training and Doctrine Command 2-11, page 7
Commanding General, U.S. Army Materiel Command 2-12, page 7
Commanding General, U.S. Army Intelligence and Security Command 2-13, page 8
Commanding General, U.S. Army Criminal Investigation Command 2-14, page 8
Chief, Army National Guard 2-15, page 8
Chief, Army Reserve 2-16, page 8
U.S. Army Reserve Command Chief of Staff 2-17, page 8
U.S. Army Corps of Engineers Chief of Engineers 2-18, page 9
U.S. Army Corps of Engineers Chief Information Officer 2-19, page 9
Commanding General, Eighth Army 2-20, page 9
Commanding General, U.S. Army Europe 2-21, page 9
Commanding General, U.S. Army Medical Command 2-22, page 9
Program executive officers and direct reporting program/project managers 2-23, page 9
Commanders, directors, and managers 2-24, page 10
Garrison commanders 2-25, page 10
U.S. Army Reserve major subordinate command 2-26, page 11
Army National Guard state D0IM/J6/CI0 2-27, page 11
Regional Chief Information Officer 2-28, page 11
Army Reserve command/unit/activity G-6 2-29, page 11
Director of Information Management 2-30, page 11
Chapter 3
Army Information Assurance Program Personnel Structure, page 12
Personnel structure overview 3-1, page 12
Information assurance personnel structure 3-2, page 12
Information assurance support personnel 3-3, page 15
Chapter 4
Information Assurance Policy, page 18
Section I
General Policy, page 18
Policy overview 4-1, page 18
Funding 4-2, page 19
Information assurance training 4-3, page 20
Mission assurance category, levels of confidentiality, and levels of robustness 4-4, page 21
Minimum information assurance requirements 45, page 22
II AR 25-2 24 October 2007
ManningB_00016233
ContentsContinued
Section II
Software Security, page 29
Controls 46, page 29
Database management 47, page 29
Design and test 48, page 30
Section III
Hardware, Firmware, and Physical Security, page 30
Hardware-based security controls 49, page 30
Maintenance personnel 410, page 30
Security objectives and safeguards 4-11, page 31
Section IV
Procedural Security, page 31
Password control 4-12, page 31
Release of information regarding information system infrastructure architecture 413, page 32
Section V
Personnel Security, page 32
Personnel security standards 4-14, page 32
Foreign access to information systems 4-15, page 35
Section VI
Information Systems Media, page 37
Protection requirements 4-16, page 37
Labeling, marking, and controlling media 417, page 37
Clearing, purging (sanitizing), destroying, or disposing of media 4-18, page 38
Section VII
Network Security, page 38
Cross-domain security interoperability 4-19, page 38
Network security 4-20, page 38
Section VIII '
Incident and Intrusion Reporting, page 43
Information system incident and intrusion reporting 421, page 43
Reporting responsibilities 4-22, page 43
Compromised information systems guidance 4-23, page 43
Section IX
Information Assurance Vulnerability Management, page 44
Information assurance vulnerability management reporting process 4-24, page 44
Compliance reporting 4-25, page 44
Compliance verification 4-26, page 45
Operating noncompliant information system 4-27, page 45
Section X
Miscellaneous Provisions, page 45
Vulnerability and asset assessment programs 4-28, page 45
Portable electronic devices 4-29, page 46
Wireless local area networks 4-30, page 47
Employee-owned information systems 4-31, page 47
Miscellaneous processing equipment 4-32, page 47
AR 25-2 24 October 2007
ManningB_00016234
ContentsConti nued
Chapter 5
Certification and Accreditation, page 48
Certification and accreditation overview 5-1, page 48
Certification 5-2, page 48
Tailoring 5-3, page 49
Accreditation 5^, page 49
Recertification and re-accreditation 5-5, page 49
Accreditation documentation 5-6, page 50
Connection approval process 5-7, page 50
Designated approving authority 5-8, page 50
Lead agent of the certification authority 5-9, page 51
System owner 5-10, page 52
Chapter 6
Communications Security, page 52
Communications security overview 6-1, page 52
Protected distribution systems 6-2, page 53
Approval of protected distribution systems 6-3, page 53
Radio systems 6-4, page 54
Telecommunication devices 6-5, page 54
Chapter 7
Risk Management, page 54
Risk management process 7-1, page 54
Information operations condition 7-2, page 55
Appendi xes
A. References, page 56
B. Sample Acceptable Use Policy, page 61
C. Management Control Evaluation Checklist, page 67
Table List
Table 4-1: MDEP MS4X, Information Assurance Phased Funding Utilization Plan/Actual Execution Report (RCS;
CSIM-62)
For period ending 092009 (MMYYYY), page 19
Table 42: Investigative levels for users with privileged access (IT-I) to ISs, page 34
Table 4-3: Investigative levels for users with limited privileged access (IT-II) to ISs, page 34
Pigure List
Figure 8-1: Acceptable use policy, page 62
Figure 8-1: Acceptable use policyContinued, page 63
Figure 8-1: Acceptable use policyContinued, page 64
Figure 8-2: Information system user agreements, page 66
Figure 8-2: Information system user agreements -Continued, page 67
Glossary
iv AR 25-2 24 October 2007
Manni ngB_00016235
O^a^t er l
Introc^u^tion
1^1. Purpose
Tbisregulationestablishesinformation assurance (IA) policy, roles,and responsibilities. It assigns responsibilitiesfor
allHeadquarters,Department of the Army (HODA) staff,commanders,directors,IApersonnel,users, and developers
for achieving acceptable levels of IA in the engineering, implementation, operation, and maintenance (EIOi^M) for all
information systems (ISs) across theUS Army Enterprise Infostructtire(AEI)
1^2. References
Required and related publications and prescribed and referenced forms are listed in appendix A.
1^3. Explanation of abbreviations and terms
Abbreviations and special terms used in this regulation are explained in the glossary.
Army Information Assurance Program
^. The Army Information Assurance Program (AIAP) is aunified approach to protect unclassified, sensitive, or
classifiedinformationstored,processed,accessed,ortransmittedby ISs,andis established to consolidate andfocus
Army efforts in securing that information, including its associated systems and resources,to increase thelevel of trust
of this information and the originating source. Tbe AIAP will secure ISs through IA requirements, and does not extend
access privileges to special access programs (SAPs),classified,or compartmentalized cIata;neitherdoesit circumvent
need-to-know requirements of the data or information transmitted.
^. The AIAP isdesigned to achieve the most effectiveandeconomical policy possible forall ISs using the risk
management approach for implementingsecurity safeguards. Toattainanacceptablelevelofrisk,acombinationof
staffandfieldactionsisnecessary to developlocalpolicyandguidance,identify threats,problems andrequirements,
and adequately plan for tbe required resources.
c^. Information systems exhibit inherent security vulnerabilities. Cost-effective, timely, andproactive IA measures
and corrective actions will be established and implemented to mitigate risksbefore exploitation and to protect against
vulnerabilities and threats once they have been identified.
(1) Measures taken toattainlAobjectives willbe commensurate with theimportanceoftheoperations to mission
accomplishment, the sensitivity or criticality ofthe information being processed, and the relative risks (the combination
of threats, vulnerabilities, countermeasures,andmission impact) to thesystem. Implementation of an lAoperational
baseline will be an incremental process of protecting critical assets or data first, and then building upon those levels of
protection and trust across the enclave.
(2) Statementsof security requirements willbe included in theearliest phases(forexample,mission needs state-
ments, operational requirements document, capstone requirement document) of the system acquisition, contracting, and
development life cycles.
c^. An operationally focused lAprogram requires the implementationof innovative approaches.Tbroughthe use of
IA best business practices (88Ps) the best ideas, concepts, and methodologies acquired from industry and Army
resources will be used to define specific standards, measures, practices, or procedures necessary to meet rapidly
changing technology orlArequirements in supportof Army policy requirements. IA 88Psallowrapid transitional
implementation of IAinitiativestointegrate,use,improve,or modify technological or procedural changes as required
by policy. 88Ps are located at https://informationassurance.us.army.mil.
^. Tbe elements of tbe Defense in Depth (DiD) strategy focus on three areas: people, operations, and defense of the
environment(tbelatterofwhichencompassesthecomputingenvironment, tbenetworks, theenclaveboundaries,and
the supporting infrastructure).
^ The AIAP is notastand-alone program,but incorporates related functions from other standards or policies such
as; operations security (OPSEC), communications security (COMSEC), transmission security (TRANSEC), information
security (INFOSEC), personnel security, and physical security to achieve IA requirements.
^. Failuretoimplementproactive or correctivelAsecurity measures,guidance,policy,or procedures may prevent
system or enclave accreditation, installation, or operation and may increase system vulnerability to foreign and
domesticcomputernetworkoperation(CNO)activitiesdesignedto(Ieny service, compromise information,or permit
unauthorized access tosensitive information. lAornetworkpersonnel may blockaccess to ISs that refiect poor IA
security practices or fail to implement corrective measures.
1-5. Overview
^. The AIAP applies to ISs including, but not limited to, computers, processors, devices, or environments(operating
inaprototype,test bed, standalone, integrated, embedded,or networked configuration) that store, process, access,or
transmitdata, includingunclassified, sensitive(formerly knownassensitivebutunclassified(S8U)),andclassified
data, with or without handling codes and caveats. ISs used for teleworking, telecommuting, or similar initiatives;
contractor owned or operated ISs; ISs obtained with non-appropriated funds; automated tactical systems (ATSs);
AR 25- 2^24 October 2007 1
^anningB^000^^23^
automated weapons systems (AWSs); distributed computing environments (DCEs); and systems processing intelligence
information are required to adhere to the provisions of this regulation.
/ i . Commanders of activities requiring limited access by any local foreign national (FN) officials or personnel
(including information technology (IT) positions) will follow the provisions of this regulation.
c^. Thisregulationappliesequally to theoperation,safeguarding, andintegrity of theinfrastructures(for example,
power, water, air conditioning), including the environment in which the IS operates.
c^. Whilenoregulationorpolicyonsecurity measures caneverprovidea 100 percent solution, implementationof
the concepts, procedures, and recommendations in this regulation will drastically reduce the manageability require
ments of assets, and minimize the effects of unauthorized access or loss. The cornerstone philosophy of IA is to design,
implement, and secure access, data, ISs, and data repositories; increase trust and trusted relationships; employ technical
and operational security mechanisms; deny all unauthorized accesses; and permit necessary exceptions to support
Army, DOD, and .loint interagency and multinational (.IIM) tactical and sustaining base operations.
^. Army information constitutes an asset vitalto the effective performance ofour national security roles. While all
communication systems are vulnerable to some degree, the ready availability oflowcostIT,freely distributed attack
tools, increased system connectivity and asset distribution, and attack-standoff capabilities make computer network
attacks (CNAs) an attractive option to our adversaries. Information Assurance capabilities and actions protect and
defendnetworkavailability,protect dataintegrity, andprovide the ability toimplementeffectivecomputer network
defense (CND). Management of Army informationisimperativesothat its confidentiality, integrity,availability,and
non-repudiation can be ensured, and that users of that data can be properly identified and authenticated.
^ Tbe AEI architecture requires the establishment,verification, and maintenance of trusted enclaves,trusted connec
tivity, and trusted information and information sources along with the capability to access and distribute that informa-
tion by leveraging technology and capabilities to amplify that trust.
^. To accomplish these foundational objectives, this regulation establishes requirements as follows:
(1) Provides administrative and systems security requirements, including those for interconnected systems.
(2) Defines and mandates the use of risk assessments.
(3) Defines and mandates the DiD strategy.
(4) Promotes the use of efficient procedures and cost-effective, computer-based security features and assurances.
(5) Describes the roles and responsibilities of tbe individuals who constitute tbe IA security community and its
system users, and outlines training and certification requirements.
(6) Requires a life cycle management approach to implementing IA requirements.
(7) Introduces the concepts of mission assurance category, levels of confidentiality, and levels of robustness of
information.
(8) Implements DODD 8500 1,DODI 8500 2, and Chairman of the .loint Chiefs of StaffManual(C.ICSM) 651001
to align IA goals and requirements to support the DOD Information Management Strategic Plan.
(9) Mandatesprocedures to document the status ofaccreditationsfor all ISsfieldedby DOD organizations. Army
chartered program managers (PMs), and HODA staff proponents.
(10) Mandates that DODand Army-level designated approvingautborities(DAAs)meet tbe system accreditation
requirements ofthis regulationbefore fielding or testing any system that requires connection to an Army network.
(11) Requires the implementation of a configuration management (CM) process.
(12) Describes the Continuity of Operations Plan (COOP).
(13) Provides the foundation for the Networthiness Certification Program in AR 25 1.
^. Other policies, procedures, or directives also govern certain systems. In the event of confiicts among these
policies,procedures,or directives,the more stringent requirement will take precedence. When the most stringent policy
cannot be determined, the affected Army component will submit a request for a policy decision through their
supporting regional chief information officers/functionalchief information officers (RCIOs/FCIOs) tothe Chief Infor-
mationOfficer/G^(CIO/G6)
1. Tbe mention of commercial products inthis regulation does not imply endorsement by either DOD or the Army.
^ Military and civilian personnel may be subject to administrative and/or judicial sanctions if they knowingly,
willfully, or negligently compromise, damage, or place Army information systems at risk by not ensuring implementa
tion of DOD and Army policies andprocedures. Violations are identified in bolded text included in the following
paragraphs 3 3, 4-5, 4-6,4-12,4-13, 4-16,4-20, and 6^5.
^. These provisions may be punished as violations as follows:
(1) Sanctions for civilian personnel may include,but are not limited to,some or all of tbe following administrative
actions: oral or written warning or reprimand; adverse performance evaluation; suspension with or without pay; loss or
suspension of access to IS or networks, and classified material and programs; any other administrative sanctions
authorized by contract or agreement; and/or dismissal from employment. Sanctions for civilians may also include
prosecutioninU.S.District Court or other courts and any sentences awarded pursuant to suchprosecution. Sanctions
maybe awarded only bycivilianmanagers or military officials who have authority toimposethe specific sanction(s)
proposed.
2 AR 2 5 - 2 ^ 2 4 October 2007
^anningB^000^^237^
(2) Sanctions for military personnel may include, but are not limited to, some of the following administrative
actions:oral or written warning or reprimand; adverse performance evaluation; and loss or suspension of access to IS
or networks and classified material and programs. Sanctions for military personnel may also include any administrative
measures authorized by service directives and any administrative measures or non-judicial or judicial punishments
authorized by the Uniform Code of Military .lustice (UCM.1).
(3) Defense contractors are responsible for ensuring employees perform under the terms of the contract and
applicable directives, laws, and regulations and must maintain employee discipline. Tbe contracting officer, or
designee, is the liaison with tbedefensecontractorfordirectingorcontrollingcontractor performance. Outside the
assertion of criminal jurisdiction for misconduct, the contractor is responsible for disciplining contractor personnel.
Only thcDepartment of .lustice may prosecute misconduct under app1icableFedera11aws,absentaformaldeclaration
of war by Congress (which would subject civilians accompanying the force to UCM,1 jurisdiction). For additional
information on contractor personnel authorized to accompany U.S. Armed Forces, see DODI 3020.41.
0I ^a^t er 2
Responsibilities
2- 1. Chief Information Officer^G^
TheCI O/ C^wi l l ^
c^. Establish and issue IA policy and procedures and serve as tbe focal point for IA programs and funding.
^. Develop, review, and coordinate DA input into DOD IA policy documents.
c^. Establish and maintain Army standardized evaluations and test methodology certification procedures and security
requirements as part of tbe accreditation process.
c^. Document, develop, coordinate, present, prioritize, and defend IA resource requirements in the planning, pro-
gramming, and budgeting process.
^. CoordinatewiththeDeputyChiefofStaff,C2(DCS,G 2) for the policy,development, dissemination, support,
tactics, techniques, and procedures for the design, implementation, and operation of the key management infrastructure
(I^MI) and systems to support Army encryption requirements.
^ Provide program oversight for Army implementation of the l^MI and funding aspects of the Electronic l^ey
Management System (El^S).
^. Prepare the annual IA readiness report.
/ i . ProvidetechnicalandoperationalassistanceandsupporttotbeU.S. Army Audit Agency (USAAA)inits audits
and reviews of ISs.
1. Evaluate technological trends in IA and establish a methodology to integrate advancements.
^. Provide IA guidance to Army elements in identifying and incorporating requirements consistent with the I^MI
requirements in project development.
^. Actas the certificationandaccreditation(Cc^A) designated approvingauthority(DAA)for1Ss with theexcep
tions found in paragraph 5 8^.
7 Provideapointofcontact (POC) withtheDefenselnformation Systems Agency/Center forlnformation Systems
Security (DISA/CISS) for advice and assistance and implementation of certification tests and programs for Army
operated ISs.
^. Serve as the Army member of the Committee on National Security Systems (CNSS) and the Subcommittees for
Telecommunications Security (STS) and Information Systems Security (SISS).
^. Provide an Army voting member to the I^ey Management Executive Committee (I^MEC) and .loint I^ey
Management Infrastructure Working Group (.II^MIWG).
c^. Provide policy, guidance,andoversightontheemploymentof National Institute of Standards andTechnoIogy
(NIST) approved cryptography for the protection of unclassified and sensitive information.
^. Appoint the chairperson and altemate chairperson for theTierl System Management 8oard(TSM8),which has
operations management responsibilities for the Tri-Service EI^MS Common Tier 1 System (CTIS).
^. ParticipatewitbtheDCS,C2;U.S. Army Intelligence and Security Command (INSCOM); NetworkEnterprise
Technology Command/9th Signal Command(Anny) (NETCOM/9* SC (A); 1^^ Information Operations(LAND)
Command (1^^ 10 CMD (LAND)); and the U.S. Army Criminal Investigation Command (CID) in analyses and studies
concemingforeign intelligence threats,criminal intelligence,oroperationalvulnerabilitiesagainst which IA counter
measures will be directed.
1^. Appoint, formally,by nameandorganization theDAA forlSsthatprocess Army data,uponrequest, through
formalsignedmemoordigitally signed e-mail. This appointment willbe consistent withparagraph5 8^ throughly.
Ensure the concepts of, and strategies within, this regulation are utilized as the basis for networthiness certifica-
tion per AR 25 1.
AR 2 5 - 2 ^ 2 4 October 2007
i ^anni ngB^000^^23^
^. Provide technical and operational assistance and support to the Army Web Risk Assessment Cell (AWRAC).
1^. Provideprogramoversigbtof Communications Security Logistics Activity (CSLA) foran Army cryptographic
applications certification process (when developed).
^. Appoint tbeDirector,Office of Information Assurance and Compliance (OIAc^C), NETCOM/9* SC (A),as the
Army senior informationsecurity officer under the provisions of tbeFederal Information SystemsManagement Act
(EISMA)
11^. Coordinate with the DCS, G 2 on Cc^A issues of sensitive compartmented information (SCI) systems and
INSCOM/G^ for SIGINT systems, as applicable.
^. See additional responsibilities at paragraph 2 2, below.
2^2. Principal ^eadc^uarters, Oepartmentof the Army officials and staff
Principal HODA officials and staff wi l l
c^. Implement IA requirements within their respective functional areas.
^. Develop, coordinate, supervise, execute, and allocate the research, development, test, andevaluation(RDTc^E)
procurement resources in support of IA program requirements as required in their functional area.
c^. Participate collectively with other IA stakeholders in the enterprise planning, acquisition, and operation of IA
strategies.
c7. Integrate approved IA tools, doctrine, procedures, and techniques into all ISs under their purview.
^. Establish intemalproceduresfor reporting security incidents or violations and report incidents andevents tothe
servicing regional computer emergency response teams (RCERTs) in accordance with Section VIII, Incident and
Intrusion Reporting, consistent with paragraphs 4^21 and 4-22, below.
^ SupporttheArmy'sInformation Assurance Vulnerability Management (lAVM)Program notification and correc-
tion processes. l AVM notification and correction are DOD and Army operational requirements.
Develop andimplementlocalacceptableuse policy (AUP)forallusers authorized accesstoH0DAISs(app8
presents a sample AUP).
/ i . Ensure all systems, for which the principal HODA Army office is the system owner (SO)are accredited, annually
revalidated, and re-accredited in accordance with the interim DOD Information Assurance Certification and Accredita-
tion Process (DIACAP).
I. Ensure the Cc^A package is submitted to the Army certification authority (CA) in sufficient time forareview and
operational IA risk recommendation in support of DAA authorization decision priorto operations or tests on a live
network or with live Army data.
^'. Request appointment as the DAA for information systems, as appropriate, from the CIO/G6through the OIAc^C
consistent with paragraph 5 8.
^. Appoint appropriate IA personnel per chapter3of this regulation and provide CIO/G6acopy of the appointment
orders.
/. Identify personnel and procedures at all organizational and subordinate levels, as required, to implement a
Configuration Management 8oard (CM8) or Configuration Control 8oard(CC8) toeffect control and management
mechanisms on all ISs, devices, configurations, and IA implementations. Include IA personnel as members of tbe
board.
^. Incorporate related OPSEC, COMSEC, and INFOSEC policies and requirements into a comprehensive IA
management program.
2-3. Administrative Assistant to the Secretary of the Army
Tb e AAS Awi l l ^
c^. Serve as the commander for Pentagon Information Technology Services (ITS).
^. Request appointment, from the CIO/G6through tbe OIAc^C,as the DAA for tbe Pentagon ITS and IS connected
to the Pentagon Common 1nformationTechnology(CIT)Enterprise, associated swing space, and altemate COOP sites
through the national capital region (NCR).
c^. Appoint, once authorized, Ceneral Officer (GO), SeniorExecutiveService(SES) or equivalent within AASA
purview as DAAs,when they are the SOs or have life cycle responsibility for the IS,as appropriate.Provideacopy of
the appointments to tbe OIAc^C through iacora(^us.army.mil.
1^, Coordinate connectivity requirements to the Department of Defense Intelligence Information System (DODIIS) IT
SCI enterprise backbone within the Pentagon CIT enterprise.
^. See additional responsibilities at paragraph 2-2 and paragraph 2 8.
2-^. Assistant Secretary of the Army for Acguisition, Logistics, andTechnoIogy
Tb e AS A( ALT) wi l l ^
c^. Forward to National Security Agency (NSA) and HODA approved materiel requirements for IA tools and
equipment (including cryptographic equipment), along with requests for RDTc^E efforts to fulfill those needs.
4 AR 2 5 - 2 ^ 2 4 October 2007
l^anningB^000^^23^
^. Designate an Army materiel developer to conduct and update threat analyses as outlinedby AR 381 11.
c^. Monitor NSA, other Service COMSEC, and lARDTc^E projects that are of interest to the Army. Designate Army
program managers as defined in AR 70^1 for each project having potential application for Army use. Require the
designated manages to maintainaliaison between the developing agency and interested Army agencies of the progress
of such projects.
^. Establish coordinationwithNSAconcurrent life cycle management milestones for development of cryptographic
equipment in support of IA initiatives.
^. Conduct research and acquire basic knowledge of the techniques and the circuitry required to provide an effective
CND capability in appropriate types of Army equipment.
^Ensure application of capabilities to perform IS risk analysis, reduction, and management
^. Ensure that Army program executive officers (PEOs) and direct reporting PMs include IA in all systems
development activities.
/ i . Ensure ArmyPEOs and direct-reporting PMs obtain Cc^A approval to operate prior to system operations on the
Army network or with Army data.
1. See additional responsibilities at paragraph 2 2.
2 5 . Th e Oe p u t y Chief Of Staff, G-2
TheDCS, C2wi l l ^
c^. Coordinate the development and dissemination of DOD, national,theater, and DA-level lAthreatinformationto
tbe Army.
^. Coordinate with the CIO/G^ for the policy, development, dissemination, support, tactics, techniques, and
procedures for the design, implementation, and operation of the I^MI and systems to support Army encryption
requirements.
c^. Develop policy and approve procedures for safeguarding and controlling COMSEC and controlled cryptographic
item (CCI) material.
(7. Ensure all intelligence systems,for which tbe DCS,G-2is the Army proponent or sponsor, are accredited or re-
accredited in accordance with Director, Central Intelligence Agency Directive (DCID) 6/3.
^. Ensure that the DODIIS Program is implemented and guidance is published.
^ Serve as tbe approval authority for external IS penetration and exploitation testing of operational networks.
^ Participate with tbe CI0/G 6, INSCOM, NETC0M/9thSC (A), I^^IO CMD (LAND), and CID in analyses and
studies conceming foreign intelligence threats, criminal intelligence, or operational vulnerabilities against which IA
countermeasures will be directed.
/ i . Act as tbe Service Certifying Organization and DAA for DODIIS processing SCI on the .loint World Wide
Intelligence System (.IWWICS)
i. Act as tbe CA for SCI systems processing information at Protection Level (PL) 4.
^'. Act as tbe DAA for SCI systems processing information up to PL 3.
^. See additional responsibilities at paragraph 2-2.
2 ^ . Th e Oe p u t y Chief Of Staff, G-3^5^7
Tbe DCS, G-3/5/7 wi l l ^
c^. Support the CIO/G 6 in the accomplishment of IA responsibilities.
^. Ensure IA training is integrated and conducted throughout the Army.
c:^. Support audits and reviews of ISs and networks through operational and technical assistance, as required,
c^. Provide guidance, requirements, and oversight for information operations condition (INFOCON) alerting and
implementation measures.
^. Provide guidance, requirements, and oversight for OPSEC measures to support an IA management policy.
^ See additional responsibilities at paragraph 2-2.
2 7 . Th e Oe p u t y Chief Of Staff, G ^
TbeDCS, G^wi I I ^
c^. Develop, as tbe Army independent logistician, logisticspolicies (including integratedlogistics support policy),
concepts, procedures, and guidance for logistics support of IA equipment used in support of all Army missions.
^. Prescribe execution ofNSA or DOD logistics management directives that apply to classified COMSEC and CCI
materiel.
c^. Prescribe and supervise tbe implementation of procedures for property control and the accounting of CCI materiel
during distribution, storage, maintenance, use, and disposal. All guidance will conform to tbe security standards
developed by the DCS, G 2 for safeguarding COMSEC and CCI materiel.
c7. Supervise logistics support planning to ensure the availability of materials and publications needed for repair, test
measurement, and diagnosis of IA equipment and systems.
AR 2 5 - 2 ^ 2 4 October 2007 5
^anningB^000^^240
^. Provide continuous logistical support for fielded IA material and test equipment.
^ See additional responsibilities at paragraph 2 2.
2 ^ . Co mma n d e r s o f Army Commands^ Army Service Component Commands^Oi rect Reporting
Onits^O.S. Army Reserved Army National Guards program executive officers^ direct reporting program
managers^ Regional Chief Information Officers^ Punctional Chief Information Officers^ and the
Admi ni strati ve Assi stant to the Secretary of the Army
Commanders of ACOMs;ASCCs;DRUs;US. Army Reserve; ARNG; Chief,CAR;PEOs; direct reporting PMs;
RCIOs/FCIOs; and the AASA are responsible for ensuring that their units, activities, or installations will
d. Develop and implement an IA program with the hardware, software, tools, personnel, and infrastructure necessary
to fill the IA positions and execute the duties and responsibilities outlined in this regulation.
^. Oversee tbe maintenance, documentation, and updating of the Cc^A requirements required for the operation of all
ISs as directed in this regulation.
c^. Implement and manage IT system configurations, including performing lAVM processes as directed by this
regulation.
c^. Appoint IA and other personnel (for example, altemates)to perform the duties in chapter3of this regulation and
provideinformation assurance program manager (lAPM) and/or POCinformationtotheRCIOs, supporting RCERTs/
TheaterNetworkOperationsandSecurity Centers (TNOSCs), and the Army ComputerEmergency ResponseTeam
(ACERT). The ACOMs/ASCCsIAPMs will also provide reports to tbe RCIO of the region in which the headquarters
is physically located.
^. Appoint DAAs only as authorized in section II and paragraph 5 8.
^Establish an oversight mechanism to validate the consistent implementation of IA security policy across their
areas of responsibility.
^. Ensure annual securityeducation,training, and awareness programs are developed and conducted that addresses,
ataminimum, physical security,acceptab1e use policies, malicious content and logic,and non-standard threats such as
social engineering.
/ i . Oversee the implementation of IA capabilities.
1, Incorporate IA and security as an element of the system life cycle process.
^'. Develop and implement an acceptable use policy for privately owned equipment (for example, cell phones,
personal digital assistants (PDAs),wireless devices, and removable media) and ISs prohibited during training exercises,
deployments, and tactical operations. Incorporate, as a minimum, the prohibition of utilizing such devices or the
limitations of acceptable use, as well as the threat of operational exposure represented by these devices in garrison, pre
deployment staging, tactical, and operational areas.
^. Develop procedures for immediate notification and recall of IA personnel as assigned.
/. Adhere to and implement tbe procedures of the networthiness certification process per AR 25 1.
^. Program, execute, and report management decision packages (MDEPs)MS4X and MX5Tresource requirements.
n. See additional responsibilities at paragraph 2 2.
2- ^. Commander, 1^^ Information Operations Command
The Commander, l ^^IOCMD(LAND)wi l l ^
d. Exercise command and control of the ACERT and all of its components (including RCERTs).
^. Establish tactics,techniques, and procedures (TTPs) for the ACERT,RCERTs,and Local Computer Emergency
Response Teams (LCERTs) (if established) as required.
c^. Integrate, in conjunction with NETC0M/9tb SC (A), computer emergency response, IA, and CND service
provider activities into network operations (NETOPS), network management, and information dissemination.
^. Integrate, in coordinationwiththeDCS,C3/5/7,CND,OPSEC, and INFOCONactivitiesintoinformation
operations (10).
^. Support the Army CND service provider as the focal point for security incidents and violations.
^ Develop and publish incident response guidelines,checklists, andprocedures incoordination with lawenforce-
ment (LE) and counterintelligence (CI) agencies.
^. Provide status reports per directives on unusual activities occurring on Army networks worldwide.
/ i . Support the IA security tool repository and provide recommendations for including new tools.
1. Provide tools, methodologies, procedures, and oversight for the vulnerability assessment program and perform
vulnerability assessments through approved programs.
^. Develop and maintain an Army CND vulnerability database for trend analysis.
^. Support and maintain Army lAVM message staffing, notification, distribution, and resolution.
/. Develop TTPs for a threat warning and notification process.
^. Develop procedures to issue CND lessons leamed identified from incidents, intrusions, analyses, or other
technical processes.
8 AR 25- 2^24 October 2007
i^anningB^0001^241
^. Maintain Army computer network situational intelligence awareness, including network threat analysis and
Intemet network intelligence.
(^ Participate with tbe CI 0/ G^ , DCS, G2, INSCOM, NETC0M/9thSC (A), and CID in analyses and studies
conceming foreign intelligence threats, criminal intelligence, oroperational vulnerabilitiesagainst which IA counter-
measures will be directed.
^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-10. Commanding General,Network EnterpriseTechnologyCommand^^^^ Signal Command ^Army^
The CC, NETC0M/ 9t bSC( A) wi l l ^
c;i. Request appointment from the CIO/ C^ as the DAA for tbe Army enterprise.
^. Appoint, once authorized, the Director, Enterprise Systems Technology Activity (ESTA) as the DAA for the
Army enterprise.
c^. Operate, manage, monitor, administer, and defend the Army portion of the global information grid.
c^. Perform configuration and patch management for all Army network components and systems.
^. Execute Computer Network Defense Service Provider (CNDSP) and NETOPS missions and functions.
^ Review,coordinate,evaluate,and approve proposedpolicies,procedures,directives,standards,doctrinal publica
tions, plans, materiel requirement documents, life cycle management documents, basis-of-issue plans, and system
certification and accreditation documents for all systems fielded, or planned to be fielded, to Army installations as well
as similar documents that have implications for adherence to policy.
^. Establish TTPs to integrate 1A/CND service provider activities with system and network management and
information dissemination.
/ i . Provide timely fiows of NETOPS data to maintain an analysis view at all levels.
I. Ensure an operational assessment of IA products is conducted before incorporation into systems under NETCOM/
9th SC (A) management.
^. Maintain a repository of the status and availability of Army critical systems and networks.
^. Manage the DiD security architecture environment, strategies, connections, and configurations against un-
authorized access, manipulation, or destruction.
/. ManagetheAEITechnica1CC8responsib1efor the Army security architecture. Establishbaseline configuration
management guidelines and technical and operational TTPs; and review, approve, prioritize, and manage change to the
AEL
Conduct quarterly vulnerability assessments of toplevelarchitecture (TLA) criticalassets,devices,servers,and
IA implementecl devices.
n Participate with the CI O/ C^, DCS, G2, INSCOM, 1^^ 10 CMD (LAND), and CID in analyses and studies
conceming foreign intelligencethreats,criminal intelligence,or operational vulnerabilitiesagainst which IA counter-
measures will be directed.
CJ. See additional responsibilities at paragraph 2-2 and paragraph 2 8.
2-11. Commanding General, LI S. Army Training and Ooctrine Command
The CC. TRADOCwi l l ^
c^. Integrate approved IAtools,doctrine,procedures,legalities, and tecbniquesinto applicable programs of instruc-
tion forTRADOC schools
^. Develop timely Armywide IA trainingliteratureandtrainingaids, leveragingsecureelectronicdistributionand
remote access capabilities.
c:. Develop, test, and recommend operational and organizational concepts and doctrine to achieve IA goals.
c7. Develop and provide IA requirements to tbe materiel developers and ensure compliance with AR381-11and this
regulation.
^. Conduct or participate in operational tests of IA implementations as part of system-wide operational tests, as
directed.
^ Integrate IA practices into pre milestone A activities and events as required.
^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-12. Commanding General, LI S. Army Materiel Command
The Commanding General, U.S. Army Materiel Command wi l l
^. Provide Armywide materiel developer IA support for RDTi^E and production.
^. Assist IS functional proponents in identifyingsecurity requirements forproposedandexisting sustainingbase,
tactical, and weapons systems.
c^. Maintainarepository of tacticallA tools, and distribute tools tofieldedtacticalsystems,as needed. Coordinate
with 1st IO CMD to integrate tactical and sustaining base toolboxes into a seamless repository for Army users.
AR 25-2^24 October 2007
i ^anni ngB^000^^242
^. ProvideaDA authorized (that is,CSLA) cryptographic advisor to the certification authority (CA) throughout tbe
DIACAP process.
^. See additional responsibilities at paragraph 2 2 and paragraph 2-8.
2-13. Commandi ng General, LI S. Army Intelligence and Security Command
The Commanding Ceneral, INSCOM will
c^. Serve as the Army Service Cryptologic Element (SCE) andpoint of contact for ISs under thepurview ofthe
NSA
^. Provided support to Army elementson IA mattersandadviseaccreditationauthoritieson theforeign intelli-
gence threat.
Coordinate the Cc^A for all cryptographic systems and conduct Ci^A for all Army cryptographic systems at PL2
(DCID 6/3) and below
c7 Participate with the C10/C6,DCS,C2,l^^IO CMD (LAND), NETC0M/9thSC (A), and CID in analyses and
studies conceming foreign intelligence threats, criminal intelligence, oroperational vulnerabilities against which IA
countermeasures will be directed.
^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2 - 1 ^ . Commandi ng General, LI S. Army Criminal Investigation Command
The Commanding Ceneral, CID will
c^. Operate the Computer Crime Investigative Unit (CCIU).
^. Conduct criminal investigations involving intrusions into Army networks and computers.
c^. Provide criminal and technical intelligence analyses of vulnerabilities, methodology,tools,techniques, or practices
obtained from computer crimes or forensic intrusion analyses to support CND, Cc^A, and program developers or
managers.
c^. Participate in 1AVA Compliance Verification Team (CVT) inspections.
^. Conduct crime prevention surveys to identify crime conducive conditions involving Army networks and systems.
^ Serve as cbiefenforcer of Federal lawsgovemingtheinvestigationofcriminaloffensesinvolving networks and
systems, serve as the sole entity for LE investigation determinations, and serve as tbe sole Army interface with Federal
and civilian LE agencies.
^Participate with tbe CIO/C-6,DCS,C2, INSCOM, NETC0M/9tbSC (A), and 1st 10 CMD (LAND) in analyses
and studies conceming foreign intelligence threats, criminal intelligence, or operational vulnerabilities against which IA
countermeasures will be directed.
/ i . See additional responsibilities at paragraph 2-2 and paragraph 2 8.
2-15. Chief, Army National Guard
The Chief, ARNG wi l l ^
Cl. Request appointment as the DAA for the ARNC and CuardNet XXI from the CIO/G^.
^. Appoint,onceauthorized, the ARNC stateDirector of InformationManagement(DOIM)/.16/CIOfor individual
states in accordance with paragraph5 8.Ceneral officers within the ARNG are state employees not TitlelOorTitle 32
Soldiers,therefore,thestateDOIM/.l6/CIO will be appointed as DAAs. Provideacopy of these appointmentsto the
CIO/C6tbroughtbeOIAi^C
c^ Set the ARNC lApriorities, provide oversight, andensure the coordination and complianceof the ARNC IA
program isaccomp1ishedwiththeCC,NETCOMto1everage Army technicalauthority standards andensure compli
ance with this regulation.
^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2 - 1 ^ . Chief, Army Reserve
TbeCARwi l l ^
d. Request appointment as the DAA for tbe U.S. Army Reserve (USAR) from tbe CIO/G 6.
/ i . Appoint,onceauthorized, the Army Reserve Command(USARC)Chiefof Staff (COS)as the Army Reserve
Network (ARNET)DAAwhen the COS meets the requirements of paragraph5 8.Provideacopy of this appointment
totheCIO/C6tbrougbtbe01Ac^C
c^. Set the USAR IA priorities, provide oversight, andensure thecoordination andcompliance of theUSAR IA
program with the CC, NETCOM to leverage Army technical authority standards and ensure compliance with this
regulation.
c7. See additional responsibilities at paragraph 2 2 and paragraph 2-8.
2- 1^ . LIS. Army ReserveCommand Chief of Staff
TbeUSARCCOSwill^
^ AR 25- 2^24 October 2007
^ a n n i n g B^ 0 0 0 ^ ^ 2 4 3
c^. Request appointment as the ARNET DAA, as applicable, from the CAR.
/ i . Appoint, once authorized, tbe major subordinate command (MSC) Commander as DAA for command/unit/
activities non-ARNET system/network implementations when the MSC meets the requirements of paragraph 5 8.
Provide a copy of this appointment to tbe CIO/G^ through the OIAi^C.
c^. Ensureall ARcommands/units/activities,toinclude but notIimitedto,al1off installation Government and non
Government satellites, facilities, and buildings, meet the requirements for connecting physically, logically, and/or
virtually to the ARNET backbone.
c^. Ensure MSC Commanders implement the AR IA program in accordance with CAR priorities and the CG,
NETCOM via the applicable Army technical authority standards and ensure compliance with this regulation.
^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-18. LI S. Army Corps of Engineers Chief of Engineers
The USACE Chief of Engineers (COE) wi l l ^
d. Set IApriorities,provideoversight,andensure thecoordinationandcomplianceofthe lAprogram throughout
USAGE
^. Ensure theUSACECIO implements theUSACEIAprogramin accordance withUSACE priorities and the CC,
NETCOM via the applicable Army technical authority standards and ensure compliance with this regulation,
c^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2 - 1 ^ . LI S. Army Corps of Engineers Chief Information Officer
TheUSACE Chief Information Officer (CIO) wi l l ^
c^. Request appointment as the DAA for the USACE Wide Area Network (WAN) and all corporate IS.
^. Appoint, onceauthorized, the USACE Division Commandersas DAA forUSACE IS asapplicable, when the
DivisionCommandermeets tberequirementsofparagraph5 8. Provideacopy of thisappointmenttotheCIO/G^
throughtbeOIAc^C
c^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-20. Commandi ng General, Eighth Army
The CC, Eighth Army will
^. Request appointment as the DAA for Eighth Army from tbe HODA CIO/C^.
^. Appoint, once authorized, the Eighth Army CIO/C 6 as the DAA when tbe Eighth Army CIO/C 6 meets the
requirements of paragraph 5 8. Provide a copy of this appointment to the CIO/G^ through the OIAc^C.
c^. EnsureMSCcommandersimplementtheEighthlAprograminaccordancewithEightb Army priorities andthe
CC, NETCOM via the applicable Army technical authority standards and ensure compliance with this regulation.
c7. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2- 21. Commandi ng General, LI S. Army Europe
TheCCUSAREURwill^
Cl. Request appointment as the DAA for Army Europe from tbe CIO/G^.
^. Appoint,onceauthorized,tbeDAAs for USAREUR backbone,tenant and MSC in accordance with the require-
ments of paragraph 5 8. Provide a copy of this appointment to the CIO/G^ through the OIAc^C.
c^. Ensure tenant and MSC Commanders implement the USAREUR IA program in accordance witbUSAREUR
priorities and the CG, NETCOM via the applicable Army technical authority standards and ensure compliance with this
regulation.
c7. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-22. Commandi ngGeneral , LIS. Army Medical Command
Tbe CG, MEDCOM wi l l ^
d. Request appointment as the DAA for MEDCOM from the CIO/C^.
/ i . Appoint.once authorized,theDAAforindividualRegional Medical Commands (RMC) Commander and MSCs
in accordance with paragraph 5 8. Provide a copy ofthis appointment to the CIO/C 6 through the OlAc^C.
c^. Ensure RMC and MSC Commanders implement tbe MEDCOM IA program in accordance with MEDCOM
priorities and the CC, NETCOM via the applicable Army technical authority standards and ensure compliance with this
regulation.
c^. See additional responsibilities at paragraph 2-2 and paragraph 2 8.
2 23. Pr ogr amexecut i veof f i cer sand direct reporting program^pro^ect managers
Program executive officers (PEOs) and program/project managers (including PMs outside tbe PEO structure responsi-
ble for fielding systems to multiple Army organizations) will
AR 25- 2^24 October 2007
l^anningB^000^^244
cn. Acquire, operate, and support systems within their command or activity per this regulation.
^. Embed IA engineering and capabilities in all system RDTc^E activities,
c^. Appoint an lAPM to perform those duties listed in paragraph 3 2^.
c7. Ensure that designatedpredeploymentinformationassurancesecurityofficers(IASOs)effectcontinuouscoor-
dination with the organizational IA personnel for which the systems are demonstrated, tested, or fielded.
^ Request appointment as the DAA for named acquisition systems developed under their charter from the CIO/C^
through the OIAi^C
^ Provide the Cc^A package to the CAfor an operationallA risk recommendation supporting theDAA approvalto
operate decision prior to operational use or testing on a live network or with live Army data.
^ Ensure that the SO makes the Cc^A package available to the ACOM/ASCC, RCIO lAPM, and NETCOM, 30
days before initial operational test and evaluation (lOTc^E) and before deployment of the system.
/ i . Integrate IA, COMSEC, and TEMPEST into entire system life cycle design, development, and deployment.
1. Address and include the addition of anylT/IApersonnel (such as system administrator (SA) or network security
managersneededto operate theneworexpandedsystemor network) or accessrequirements and responsibilities for
patch management and system administration as part of the development cost of stated system or network.
^. Integrate IA practices into pre-milestone A activities and events.
^. Perform acquisition and life cycle management of materiel in support of the IA strategy.
/. ReporttoHODACIO/C 6the percentage of PEO/PM-programmedtundingallocatedtothe AIAP. Thereport
will include current and planned IA investments.
Bn. Accomplish all intelligence and threat support requirements outlined in AR 381 11 and this regulation.
^. Enforce IA standards and maintain/report an inventory of IS products, equipment, locations, and contact
information.
d. EnforceIAVMcompliancemeasures(forexample,notifications,patchmanagement)andincorporate them into
life cycle management procedures.
^. Coordinate with CSLA to ensure cryptographic life cycle equipment management is a consideration during
system design phase.
^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-24. Commanders, di rectors, and managers
Commanders, directors, and managers will
Cl. 8e responsible for implementing the AIAP in their command or activity.
/ i . Acquire, operate, and maintain systems within their command or activity per this regulation.
c^. Incorporate and define requestsfor new systems or changes to existing systems,including security requirements
necessary for the system's conceptofoperation. Once validated,include these security requirementsintothe system
design as defined in procurement contracts. Address the addition of IT/IA personnel (such as SAs or network security
managers needed to operate the new or expanded system or network) as part of the development cost of stated system
or network.
c^. Include 10 and IA requirements in submissions of commander's critical information requirements (CCIR) or
priority intelligence requirements (P1R).
^. Ensureuses of marketdriven/industry-developed (MDID), commercial-off-theshelf (COTS), orotber products
are consistent with IA requirements and do not introduce an unacceptable risk.
^ Appoint appropriate IA personnel per chapter 3 of this regulation.
^. Ensure that designated pre deployment lASOs effect continuous coordination with the organizational IA persons
nel for which the systems are demonstrated, tested, or fielded.
/ i . Ensure IA, COMSEC, and TEMPEST requirements are incorporated into life cycle planning.
I. Ensureimplementationofthisregulationisaccomplisbedincompliance withall statutory andcontractual labor
relations obligations.
^'. See additional responsibilities at paragraph 2-2 and paragraph 2 8.
2-25. Garrison commanders
Garrison commanders will
Cl. Implement the installation level lAprogram in accordance with tbe installation commander priorities and the CC,
NETCOM via the applicablecontinental United States(CONUS) RCIO Army technical authority standards and to
ensure compliance with this regulation.
^. Obtain approval to operate the garrison information systems from the first general officer or SESin the chain of
command that has obtained the appropriate DAA appointment from the CIO/C 6.
c^. Ensure the installation D01M develops the installation Ci^A package, and obtains and maintains approval to
operate the installation campus area network (1CAN) and any DOIM controlled or managed consolidated service
locations (server farms).
^0 AR 25- 2^24 October 2007
^anningB^000^^245
c7. Ensure all installation tenants, to include but not limited to, all off installation Govemment and non-Govemment
sate11ites,facilities, and buildings, meet the requirementsfor connecting physically and/or virtually totheICAN(that
is, the installation backbone).
^. Coordinate withthe supporting NETCOM/9tbSC (A) component, ACOM/ASCC,IMA,and tenant organizations
for IA implementation and compliance.
^Acquire, operate, and maintain systems within their installation or activity per this regulation
^. Maintain the CM of the garrison network and ensure that the installation level CC8/CM8 provides oversight
support to the installation commander.
/ i . Monitor andmanage the connection, access, and IA standards forstandalone andnetworked ISs down to the
workstation level across all installation and tenant organizations.
1. Manage and oversee tbe operation of the installation infrastructure throughout the system life cycle.
^'. Provide technical and functional IA guidance and assistance in support of network management.
^. Review, before adoption, proposed changes that could affect the operation of the installation infrastructure's
network security and operation (confidentiality, integrity, and availability).
/. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-2^. LIS. Army Reserve ma^orsubordi nate command
The USAR MSCwi l l ^
d. Request appointment as the non-ARNET system/network DAA, as applicable, from tbe USARC COS.
^. Implementacommand/unit/activitylevellAprogramin accordance withCARpriorities andensure compliance
with this regulation.
c^. Ensure the command/unit/activity C^ develops command/unit/activity level certification and accreditation for all
non ARNET system/network implementation.
c7 See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2 2 7 . Ar my National Guard State OOIM^J^^CIO
The ARNC State D0IM/^6/C10will-^
Cl. Request appointment as tbe ARNCState DAA, as applicable, from tbe Chief ARNG.Ceneral officers within the
ARNC are state employees not Title lOorTitle 32 Soldiers, therefore,tbe state D01M/.16/CI0 will perform the state
DAA duties once appointed.
^. Implement the ARNC lAprogram in thestate,as applicable, incoordination with the ARNC Chief to ensure
compliance with this regulation.
c^. Ensureall ARNCStatetenants,toincludebutnotlimited to, all ARNCstate government and nonCovemment
sate11ites,facilities,andbui1dings,meettherequirementsforconnectingphysica11y and/or virtually tothe ARNGstate
and ARNCbackbone (that is,CuardNet XXI).
c^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-28. Regional Chief Information Officer
The RCIO, as CC, NETCOM representative will
d. 8e responsible for ensuring tbe technical authority enterprise standards are refiected in the installation IA
priorities and implemented through coordination with the appropriate IC, garrison commander and DOIM.
^. See additional responsibilities at paragraph 2 2, paragraph 2 8, and paragraph 3 2.
2-2^. Army Reserve command^unit^activity G- ^
The USAR command/unit/activity C-6 will
c^. Implement an lAprogram as directed by the USAR MSC Commander that refiects the CAR priorities and ensure
compliance with this regulation.
^. Ensure USAR standards for connections to the ARNET are met.
c^. Develop nonARNETsystem/networkimplementations certification and accreditation,provide to the CAfor an
operational IA risk recommendation supporting the DAA approval to operate decision prior to operational use onalive
network or with live Army data.
c7. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
2-30. di rector of Information Management
TheDOIMswill^
1^. Implement an lAprogram as directed by the garrison commander that refiects the ICpriorities and with the CC,
NETCOM via the applicable Army technical authority standards and is compliant with this regulation.
^. Ensure Army standards for connection to the ICAN are met.
AR 25- 2^24 October 2007 11
i^anningB^0001^24^
c^. Developtbeinstallationcertificationandaccreditationpackage,andprovidetothe Army CAf or anoperational
IA risk recommendation in support of a DAA approval to operate decision.
ci^. Obtain and maintain approval to operate for the installation ICAN and any DOIM controlled or managed
consolidated service locations (server farms) from the appropriate DAA.
^. See additional responsibilities at paragraph 2 2 and paragraph 2 8.
Ol ^a^t er^
Arn^y Information Assi^ran^e ^ro^ram personnel Structure
3-1. Personnel structure overview
Commanders will establish an IA personnel structure to implement the AIAP. These personnel will be the focal points
for IA matters within theircommands or activities and will have the authority to enforce, with DAA concurrence,
security policies and safeguards for their systems or networks. This authority includes recommending to the DAA
suspension ofsystem operations based on an identified security deficiency,poor security practice, or unacceptable risk.
PositionthelA staff inthe organizationto ensure operations donot negate system security,except as directed by the
DAA. Tbe IA staff will be involved in tbe acquisitioning and contracting for ISs or IS services.
3-2. Information assurance personnel structure
Commanders will position IA personnel organizationally to provide a balance between security and operational
missions. Tbe following is tbe AIAP personnel structure and activities to be performed.
ci.7^C7(^.NETCOM/9thSC (A) RCIOs have the authority and responsibility t o ^
(1) Translate strategic plans and tecbnicalguidance provided into objectives, strategies,and architecturalguidance.
(2) Exercise staff supervision and technical control for all ITorganizations within their region and execute responsi
bilities for baseline services (communication and system support, visual information, documents management, IA,
INFOCON, automation), either operationally or programmatically, as well as oversight of NETOPS.
(3) Provide all personnel operating on Army installations the IT baseline services in a manner consistent with
policies and regulations.
(4) Provide administrative, financial, and managerial IT support to any Army installation located within their
geographic region.
(5) Coordinate the management of outsourced IT services.
(6) Definethebaselineandobjectives,andestablishspecificservicelevelsdetailingcontractua1arrangementsand
satisfactory contractor performance.
(7) Lead enterprise level initiatives that assure users' training requirements are considered and integrated into
processes for developing, implementing, and maintaining capabilities and systems.
(8) Act as tbe focal point for command, control, communications, and computers for information management
(C41M) leadership and coordination of IT activities within tbe region.
(9) Execute the duties assigned under theNETC0M/9tbSC (A) CONOPSfor Service Level Agreements,Configu-
ration Management, and Networthiness Certification Program.
(10) Ensure all ISs, networks, and devices are scanned quarterly as a minimum, including, but not limited to,
scanning for vulnerabilities, poor security practices, noncompliance, backdoor connections, unauthorized modems,
malicious logic, and unauthorized network connections; take actions to report all violations.
(11) Ensure implementation of AIAP policy and procedures within their region.
(12) Oversee tbe assignment of regional IA personnel and appoint a regional lAPM.
(13) Provide supported commands,organizations,and agencies with POCinformation,especiallyifgeographica11y
disbursed across several regions.
^. 7^7^.i^.The1APM will be accountable for establishing, managing, and assessing the effectiveness of all aspects of
the IA program within a region, command, or functional activity. A contractor will not fill tbe 1APM position.
(Temporary assignment ofcontractorpersonnelforaspecifiedtime, as an exception, is authorizeduntil the position
canbe properly filled.)TheIAPMmustbeaU.S.citizenandholdaU.S. Govemment security clearance and access
approval commensurate with the level of responsibility.Designate this position as information technologyl(ITI).The
1APM must be IA trained and certified, and maintain the certification. Tbe lAPM wi l l
(1) Develop, manage, and maintainaformallA security programtbat includes defining thelApersonnelstructure
andensuring theappointmentofan information assurance network manager (IANM),informationassurancenetwork
officer (lANO), information assurance manager (lAM), and an 1AS0 at subordinate levels.
(2) Enforce Army and regional IA policy, developing command unique procedures as needed.
(3) Ensure that lApersonnelimplement vulnerability remediation bulletins and advisories that affect tbe security of
tbeirISs
12 AR 25- 2^24 October 2007
^anni ngB^000^^24/ ^
(4) Ensuretbatall lApersonnelreceivetbenecessary technical(forexampIe,operatingsystem,network,security
management, and system administration) and security training to carry out their duties and maintain certifications.
(5) Serve as tbe primary point of contact for lA-related actions. This includes l AVM reporting, compliance,
vulnerability assessments, and feedback to Army staff on current and upcoming IA policies.
(6) As applicable,Regionaland Command lAPMswillprovide their supporting RCERTorTNOSCwithguidance
and priorities regarding lA/CND support to their regions, command, and subordinates.
(7) Manage the DIACAP program to ensure compliance with requirements.
(8) Ensure the development of system Ci^Adocumentation by reviewingandendorsingsuchdocumentation and
recommending action to the DAA.
(9) Enforce tbe use of Army approved procedures for clearing, purging, reusing, and releasing system memory,
media, output, and devices.
(10) Ensure DAAs maintain a repository for all systems' Cc^A documentation and modifications.
(11) Ensurethat security violations andincidents are reported to the servicingRCERTin accordance withSection
VIIL Incident and Intrusion Reporting.
(12) Ensure that RCERTdirected protective and corrective measures are implemented for vulnerabilities or incidents
remediation.
(13) Identify dataownership(includingaccountability, access, andspecial bandlingrequirements) foreachlS or
network within their authority.
(14) Conduct announced and unannounced IA assessments.
(15) Regional lAPMs will maintain liaison with appropriate Army theater and DOD activities, at a minimum
including C10/C^, RCIO, DISA, NSA, the Defenselntelligence Agency (DIA), HODA, 1st 10 CMD, ACERT,
supporting RCERT/TNOSCCID, and INSCOM elements
(16) Program, manage, execute, and report MDEPs MS4X and MX5T resource requirements.
(17) Administer an IA management control evaluation programseparate from, or in support of, Force Protection
Assessment Teams (FPATs).
(18) Serve as a member of the configuration board where one exists.
(19) IncoordinationwiththeDCS,C 3, DCS, C 2, and CIO/C 6, provide technical and non-technical information
to support a commander's INFOCON program.
(20) Ensure that program controls are in place to confirm user access requirements.
(21) The ACOM/ASCC/functional lAPMs will ensure that any ACOM/ASCC sponsored or developed unique
systems are fully accredited and certified prior to connection to the network.Ensure that any proposed distribution will
meet Networthiness certification and tbe NETC0M/9th SC (A) connection approval process, and fulfill all require-
ments as a standard PM-developed fielding prior to distribution.
c^. T^^^ic^i^di/7^/^^.The1ANM(if appointed) may serve as tbe altemate lAPM.Acontractor will not fill tbe lANM
position.(Temporary assignment of contractor personnel foraspecified period, as an exception, is authorized, until the
position can be properly filled.)Tbe1ANM must beaU.S.citizen and holdaU.S.Government security clearance and
access approval commensurate with the level of responsibility. This position will be designated IT I . The lANM must
be IA certified and maintain his or her certification. The 1ANM, under the purview of the 1APM, wi l l
(1) Provide direct support to the 1APM on matters of CND and the regional/command IA program.
(2) Develop and oversee operational (technical) IA implementation policy and guidelines.
(3) Advise the 1APM or DAA on the use of specific network security mechanisms.
(4) Evaluate threats and vulnerabilities to ascertain tbe need for additional safeguards.
(5) Assess changes in the network, its operational and support environments, and operational needs that could affect
its accreditation.
(6) Ensure procurement actions, installations, and modifications to existing infrastructure comply with Army-
approved IA architectural guidance.
(7) Develop and staff IA technical policy and procedures for all networks.
(8) Ensure that all networks on tbe installation or activity for which they are responsible, including tenant networks
accessing the host installation's infrastructure, are planned, installed, managed, accredited, maintained, and operated per
tbe security requirements of this regulation and the standards required for connectivity and classification of the network
concemed.
(9) Develop and issuenetwork security policy, guidance, and countermeasure implementation instructions to as-
signed and tenant activities.
(10) Oversee periodic use of authorized scanning and assessment tools.
(11) Assist tbe 1APM in monitoring and enforcing the l AVM and INFOCON processes.
(12) Serve as a member of tbe CM8 where one exists.
c7. 7^^. AppointlAMs at allappropriatelevelsofcommand.Thisincludes subordinate commands,posts, installa-
tions, and tactical units. Appoint an 1AM as needed for those Army activities responsible for project development,
deployment,and management of command-acquired software,operating systems, and networks. Acontractorwillnot
AR 2 5 - 2 ^ 2 4 October 2007 13
i^anningB^000^^24^
fill tbeMSC,instal1ation,or post lAMpositions and the person filling tbe position will beaU.S.citizen.Commands,
activities, or organizations with multiplelAMs will appointaseniorlAM for their command, activity, or organization.
In installations withmu1tipleIAMs,tbeInsta11ationIAM istbeSeniorlAM. Al l lAMswillholdaU.S.Government
security clearance and access approval commensurate with the level of information processed by the system. This
positionwillbedesignatedIT I , IT I I , or I T- I I I . The l AM must be IA trained and certified, and must maintain his or
her certification. Tbe 1AM wi l l
(1) Develop and enforce a formal IA security and training program.
(2) Enforce 1AVM dissemination, reporting, compliance, and verification procedures as described in CICSM
6510 01
(3) Report security violations and incidents to the servicing RCERT in accordance with SectionVIII,Incident and
Intrusion Reporting.
(4) Conduct security inspections, assessments, tests, and reviews.
(5) Manage lASOs, as required, toestablisb thescope of responsibilities and tbe technical andsecurity training
requirements.
(6) Conduct semi-annual reviews of all ISs and networks to ensure no security changes have been made to
invalidate tbe Cc^A.
(7) Negotiate Cc^A issues wi t bt beDAA, or bis or her designated representative,for incoming systems and make
recommendations to the commander on additional protection mechanisms necessary prior to operation of the incoming
ISs
(8) Maintain training and certification records for IA personnel and user IA awareness training records.
(9) Ensure the use of Army approved procedures for clearing, purging, reusing, and releasing system memory,
media, output, and devices.
(10) Review all lACc^A support documentation packages and system fielding, operations, or upgrades requirements
to ensure accuracy and completeness, and that they meet minimal risk acceptance standards.
(11) Maintainarepository for all systems Cc^A documentation and modifications,version control,and management
of GOTS, COTS, and non-developmental items (NDIs) for his or her organization or site.
(12) Identify data ownership (includingaccountability, access, and special handling requirements) foreach IS or
network within their authority.
(13) Verify that all ISs withintbe scope of responsibility are properly certified and accreditedin accordance with
DIACAP and CMpolicies and practices before operating or authorizing the use of hardware and software on an IS or
network.
(14) Serve as a member of an applicable CC8, where one exists.
(15) Ensure that IA personnel are maintaining and auditing access and log data.
(16) Assist the lAPM to identity and validate IA resource requirements.
(17) Provide input to the lAPM for management controls.
(18) Tbe Installation l AM will provide policy and guidance to all lAMs on an installation.
(19) Tenant lAMs will assist and support Installation lAMs.
(20) Installation l AMswi l l provi de reports to the RC10IAPM
^. 7^/^.i^ci^7B^/^^. Thegarrisoncommander or manager of theinstallationor activity responsibleforthenetwork
willappointan lANM for eacbinstallation or group of networks at allappropriatelevelsofcommandbelowACOM
and DA staff and field operating agencies, including subordinate commands, posts, installations, and tactical units.
AppointlANOstoassistlANMsasrequired.lANMandlANOpositionswillbedesignatedIT l o r l T I f Acontractor
wi l l not f i l l thelnstallationlANMposition. ThelANMmustbeaU.S. citizenand holdaU.S.Government security
clearance and access approvalcommensuratewiththelevelof responsibility. Each lANM and lANO must bel A and
vulnerability assessmenttechnician(VAT) certified and must maintainhis or her certification.TbelANM andlANO,
in addition to providing direct support to the l AM, wi l l
(1) Implement tbe IA program to ensure the AEI is operational and secure.
(2) Comply with and implement policy received from the appropriate network security manager or the l AM.
(3) Conduct reviews of the network architecture for vulnerabilities.
(4) Ensure measures and procedures used at network nodes support the security integrity of the network and comply
with applicable directives.
(5) Develop, issue, and implement security procedures and protocols goveming network operations per this
regulation.
(6) Prepare, disseminate, and maintain plans, instmctions, and standing operating procedures (SOPs) conceming
network security.
(7) Conduct reviews of network threats and vulnerabilities per this regulation and the l AVM process.
(8) Reportsecurity violations andincidents tothe servicingRCERTin accordance with Section VIII, Incident and
Intrusion Reporting.
(9) Review and evaluate the effects on security of changes to the network, including interfaces with other networks.
f 4 AR 25-2^24 October 2007
i^anningB^0001^24^
(10) Perform required monitoring of network resources per this regulation.
(11) Ensure tbe use of Army approved IA products from the IA Approved Products List.
(12) Implement IA and 1AVM reporting and compliance procedures as set out in dCSM 6510.01.
(13) Analyze and maintain network audit data.
(14) Ensure adequate network connectivity by making proper decisions conceming levels of confidentiality and
robustness for the system.
^ 7^,^C^.The commander or manager/director of the activity responsible for the ISs will appoint an lASO for each IS
or group of ISs. The same 1ASO may be appointed for multiple ISs. The lASO position will be designated IT I, IT-II,
orIT III.Acontractor may not fill MSC,installation, or post 1AS0 positions at IT I , i f created.Tbe 1AS0 must be IA
certified and maintain bis or her certification. Appoint pre-deployment or operational lASOs for developmental systems
with the applicable responsibilities. DOD uses the term lAO for 1AS0 responsibilities. All lASOs will
(1) Enforce IA policy, guidance, and training requirements per this regulation and identified 88Ps.
(2) Ensure implementation of lAVM dissemination, reporting, and compliance procedures.
(3) Ensure all users meet the requisite favorable security investigations,clearances, authorization,need-to-know,and
security responsibilities before granting access to the IS.
(4) Ensure users receive initial and annual IA awareness training.
(5) Ensure logfilesandauditsaremaintainedandreviewedforall systemsandthat authentication(forexample,
password) policies are audited for compliance.
(6) Prepare, distribute, and maintain plans, instructions, and SOPs conceming system security.
(7) Review and evaluate the effects on security of system changes, including interfaces with other ISs and document
all changes.
(8) Ensure that all ISs within their area of responsibility are certified, accredited and reaccredited.
(9) Maintain and document CM for IS software (including IS warning banners) and hardware.
(10) Predeployment oroperational lASOs will ensuresystemrecovery processes aremonitoredand that security
features and procedures are properly restored.
(11) Pre-deployment or operational lASOs will maintain current software licenses and ensure security related
documentation is current anci accessible to properly authorized individuals.
(12) Tenant lASOs will support and assist tenant lAMs (or the installation lAM if no tenant lAM exists).
(13) Reportsecurity violations and incidents to tbe servicing RCERT in accordance with SectionVIII,Incident and
Intrusion Reporting.
3-3. Information assurancesupport personnel
In addition to the above described IA structure, other personnel have crucial responsibilities.
c^. ^ . ^ / ^ i ^ c^^ ^^ri^c^i^^ cic^iiiiiii'.^^i^ci^cj^.^. System administrators (SAs) and network administrators (NAs) must be
designated1T-1,1T II, or IT III (see para 414). Each SA/NA must be trained, experienced, IA certified, and currently
certified on the ISs that they are required to maintain. The SA/NA shouldbe a U.S. citizen and must hold aU.S.
Govemment security clearance and local access approvals commensurate with the level of information processed on the
system or network. SA/NA responsibilities include, but are not limited to, implementing the AIAP within their
command, installation, or activity. SA/NAs will be designed on appointment orders and will
(1) Enforce thelS security guidance policies as provided by thelAM and perform lASO duties if an lASO has not
been appointed.
(2) Enforce system access, operation, maintenance, and disposition requirements.
(3) Ensure tbatpersonnel meet requiredsecurity investigation, clearance, authorization, mission requirement, and
supervisory approval before granting access to the IS.
(4) Reportsecurity violations andincidentstothe servicingRCERTin accordance with Section VIII,Incident and
Intrusion Reporting.
(5) ConductrequiredlAVMscanningandvulnerabilityassessments with approved software as authorized by their
1AM/1AS0. SAs/NAs are not limited to only lAVM scanning, but should be conducting comprehensive network
assessments of their networks as authorized.
(6) Ensure CM includes all pertinent patches and fixes by routinely reviewing vendor sites, bulletins, and notifica-
tions and proactively updating systems with fixes,patches,definitions, and service packs with lAMorlAPM approval.
(7) Ensure any system changes resulting from updating or patching are reported to the 1AM/IAS0.
(8) Record 1AVM compliance in the Asset and Vulnerability Tracking Resource (Ac^VTR) database.
(9) Maintain current anti-virus (AV) engines and definitions on all ISs.
(10) Reviewand verify currency of user accounts,accesses,andlogins. Remove departing users' accountsbefore
departure. Terminate inactive accounts verified as no longer required that exceed 45 days.
(11) Suspend user accounts for the following types of actions: actions that knowingly threaten, damage, or harm the
IS, network or communications security; revocation, suspension, or denial of security clearance or interim security
clearance investigations; or unauthorized use of IS and networks per para 45.s.
AR 25- 2^24 October 2007 15
^anni ngB^000^^250
(12) Remove or disable all default, guest, and service accounts in ISs or network devices, and rename administrative
accounts as applicable.
(13) l^aintain and use at Ieast2separate accounts for access to network resources,Ifor their privileged level
access and a separate general user, non privileged level account for routine procedures
(14) ReviewIS and network audit logs and log files,and report anomalous or suspicious information in accordance
with Section V111, Incident and Intrusion Reporting.
(15) Monitor IS performance to ensure that recovery processes, security features, and procedures are properly
restored after an IS has been rebooted.
(16) Monitor IS performance to ensure that processes, security features, and operating system configurations are
unaltered.
(17) Perform equipment custodian duties as necessary.
(18) Notify the lAM or 1APM when a system no longer processes sensitive or classified information, or when
changes occur that might affect Cc^A, to obtain disposition or resolution instructions.
(19) Ensure CM for security-relevant IS software (includinglSwamingbanners)andhardwareismaintained and
documented.
(20) Implement and test IS and data backup procedures for integrity.
(21) Prohibit attempts to strain or test security mechanisms orto perform networkline or keystroke monitoring
without authorization.
(22) Establish audit trails, conduct reviews, and create archives as directed by the lAM.
(23) Will signaPrivileged-level Access Agreement (PAA)andaNonDisclosure Agreement (NDA) asaprerequi-
site to maintaining their positions. Reference the IA 88P on PAA; AUP (https://informationassurance.us.army.mil).
^. T^d^c^ di^n^i^,^. Data owners will, at a minimum, provide guidance or feedback to the System Owner (SO)
conceming
(1) The confidentiality of information under the data owner's purview.
(2) Tbe DIACAP team'sdecision regarding the level of classification,confidentiality,integrity,availability, encryp-
tion, and protection requirements for the data at rest or in transit.
(3) Specific requirements for managing tbe owner'sdata(for example, incident response, information contamination
to other system/media, and unique audit requirements).
(4) Whether FNs may accessISs accredited under this regulation. Accessmustbe consistent with DOD,DA,and
DIA goveming directives (for example, AR 380 10 and DCIDs 1/7 and 5/6).
c^. ^^^^^cn^ii.^^!^.^. Use of Govemment ISandaccessto Govemment networksisarevocableprivilege,notaright.
Usersare thefoundationofthe DiD strategy and their actionsaffectthemostvulnerableportion ofthe AEI. Users
must haveafavorable background investigation or boldasecurity clearance and access approvals commensurate with
the level of information processed or available on tbe system. Users will
(1) Comply witb tbe command s AUP for Government owned ISs and sign an AUP prior to or upon account
activation
(2) Complete initial and/or annual IA training as defined in the IA training 88P
(https://informationassurance.us.army.mil).
(3) Markandsafeguardfiles,outputproducts,and storage mediaper the classificationlevelanddisseminatethem
only to individuals authorized to receive them with a valid need to know.
(4) Protect ISs and IS peripherals located in theirrespective areas in accordance withphysical security anddata
protection requirements.
(5) Practice safenetwork and Intemet operating principlesand take no actions that threaten the integrity of the
system or network.
(6) Obt ai npr i or approval for tbe use of any media (for exampl e, US8, Cf ^ l ^ 01^ , f l oppy di sk) f r om tbe SA/
l A l ^
(7) Scan al l files, attacbments, and media wi t b an approved and i nst al l edAVpr oduct before openi ngaf i l e or
attachment or i nt roduci ng media i nto tbe fS
(8) Report allknownor suspected spam,cbain1etters,and violations ofacceptableuse tothe SA,IAM,or1ASO.
(9) Immediately stop using an infected IS; and report suspicious, erratic, or anomalous IS operations, and missing or
added files, services, or programs to the SA/1ASO in accordance with local policy.
(10) Not disclose t bei r i ndi vi dual account passv^ord or pass phrase autbenticators
(11) Invoke passv^ord-proteeted screen locks onyour v^or kst at i on after not more than l ^ mi n u t e s o f n o n use
or i nacti vi ty
(12) Logof f ISs at tbe end of each workday
(13) Access onl y tbat data, control i nf ormat i on, softv^are, hardware, and f i r mwar e f or wbi cb tbe user is
authori zed access
(14) Access only that data that they are authorized or have a need to know.
1^ AR 2 5 - 2 ^ 2 4 October 2007
^anningB^0001^251
(15) Assume only authorized roles and privileges as assigned
(16) Users authorized CovemmentprovidedIAproducts(forexample,AVor personal firewalls) will be encouraged
toinstalland updatethese products ontheirpersonalsystems and may be required to do so as directed by theDAA
and documented in the Ci^A package for any approved remote access.
c7. CC^/^^Cc:i^,^rcic^i'c^^,^c^iic^i^.^^^c^/i^^^^r',^ci^^^/. Execute responsibilities as requiredperthisregulationand AR
380^0
^. T'^^^^^T^^^^.^u^^^/. Execute responsibilities as required in AR 381 14.
^ 7ii^^//i^^iic:^^^i^,^c^^^^/. Senior intelligenceofficers (SIOs) orcommand intel1igenceofficers(DCSINT/G2s/S2s)
wi l l ^
(1) Ensure the command statement of intelligence interest (SII) (AR381-10andAR 381 20) registers requirements
forthe receipt of validated intelligence adversely affecting the integrity and reliability of ISs.
(2) Provide assistance inthe identification of threat factors affecting the risk management approach for implement-
ing security safeguards.
^. T^di^c:^ ^^c^/^c^/icjn ci^c:^^!^,^. Execute responsibilities as required by AR 525 13.
/ i . 7ii/^i^^ci^ic^^ cj^^i^d^ic^i^.^ ci^^c^^i^.^. Execute responsibilities as required by FM 3 13.
1. C^7^,^i5'Cc:i,^c::^i^,^.Tbe primary OPSECvulnerability is information made publicly accessible throughWeb sites and
Web-enabled applications.Commanders andDirectorswilldevelopandimplementanOPSECreviewplanaspartof
tbeir inspection programs. All content placed on a Web site will be reviewed for OPSEC sensitive information.
Additionally, execute responsibilities as required per AR 530^1.
^'. T^i^^^ic^ ci,^!!^.^ c^c^^i^.^ (T^^C^.^^. Execute IA responsibilities as required per this and AR 25-1.
^. Bfc^i^i^i.^i^ici^c:i,^c:^i^.^. IncludelArequirementsintbeacquisitionphases and execute responsibilities as required by
DOD 50002 RandNSTISSPNo 11
/. 7^C^7^. Execute responsibilities per this regulation and AR 25-1.
Bn. 7^^^,^ (^^^ ^ciB'ci . ^ - 1 ^ .
(1) TheDAAwi l l ^
(dl) 8e a U.S. citizen.
(7i^ HoldaU.S. Govemment security clearance and access approvals commensurate withthelevelof information
processed by the system under his or her jurisdiction.
(c^^ 8e an employee of the U.S. Govemment and meet the grade requirements identified in paragraph 5 8.
(c^ Complete tbe DAA 8asics Computer 8ased Training prior to performing the duties of DAA.
(^^ Request appointment from the CIO/C 6 for IS by name.
(^ Ensure tbcDAApositionis designated as an IT Lbased on the duties assigned and the expected effects ontbe
Army mission.
(^ Meet training and certification requirements in accordance with NSTISS1 No. 4012.
(7i^ Tbe DAA will understand the operational need for the systems and the operational consequences of not
operating the systems.TheDAAwill have an in-depth knowledge ofDiD to drive stateof-theart acquisition,focusa
robust training program, and institute executable policy across the IA enterprise.
(2) The DAA will ensure the following as a minimum
(i^^ ProperCc^Abasedonsystemsenvironment,missionassurancecategory(MAC)leve1,confidentiality level,and
security safeguards in accordance with this regulation and the Interim DIACAP.
(^^ Issue written memo ordigitally signedemail IA Cc^A authorization statements(that is, interimapproval to
operate (lATO), interimauthorization totest(IATT), approval tooperate(ATO),denial of authorization tooperate
(DATO)), after receipt of CA recommendation.
(c^^ Maintain records (including use of IA tools) for all IS Cc^A activities under bis or her purview.
(ci^ Accomplish roles and responsibilities as outlined in this regulation during each phase ofthe accreditation process
and for each IS as required.
(^^ Ensure operational IS security policies are in place for each system, project, program, and organization or site for
which the DAA has approval authority.
(^ Incorporate security, Cc^A, and Networthiness as an element of tbe life cycle process.
( ^ Ensure data owner requirements are met before granting any FN access to the system.
(Tl) Consider and acknowledge CI and criminal intelligence activities during the Cc^A process.
(^i) Report security-relatedeventstoaffectedparties (forexample,dataowners,all involvedDAAs). DAAs must
coordinate with investigative activities (for example, CCIU, RCERT) before making notifications.
(^^ Assign written security responsibilities to the individuals reporting directly to the DAA (for example, lAM or an
lASO if an 1AM does not exist)
(^ Appoint a CA for each IS (or group of ISs) and network
(1^ Ensure CSLA certification of cryptographic applications occurs during tbe Ci^A process.
Bl. C^. Authority and responsibility for certification is vested in the ArmyFISMA Senior lAOfficer(SIAO).Tbe
AR 25- 2^24 October 2007 17
^anningB^000^^252
Director 0IAc^C,NETC EST-1, was appointed F1SMASIA0 by the CIO/G^ and will be tbe single Army certifica
tion authority (see para 5 2).
c^. Bf^^ii/ci^^/i^c:^^r^^i^c::i^^iciiic^i^^/icii^ir^(^CBf^. (Seealsopara5 9).The Army CA will maintainalistofqualified
Govemmentorganizationsand1abs,as Agents of the CA(ACA),toperformthe certification activities. Tbe ACAs,
funded by the SOs, are available to provide SOs with certification capabilities. Organizations can request appointment
as an ACA by following the process in the ACA 88P.
^. ,^C^. AGovemmentSOwillbeidentifiedforeachlSusedby or in supportof the Army.Tbe SOisresponsible
for ensuring the security of the IS as long as it remains in Army inventory, or until transferred (temporarily or
permanently) to another Govemment person or organization and such transfer is appropriately documented, and
provided as an artifact to the accreditation package (see para 5 10).
^. 77c^,^^ciiBic7/^Bic^ii^i^^.^^ciBi.^i^i/i/i^.^. Army tenant units or activitiesmustcomplywiththelArequirements of their
parent ACOM/ASCCandtheirsupportinginstallation. Army andnon-Armytenantoperationsmustcomply with the
host installation's IA policy if they connect to the installation's information infrastructure. Army tenant units or
activitiesandunitsbased inorunderoperational control (OPCON)ofan ACOM/ASCCotherthan their parent will
comply with the IA requirements ofboth parent and host commands. Address unresolved confiicts of IA policy per this
regulationthroughlocalcommand channels and RC10stoHODA,CIO/G^. UntilCIO/G 6resolvestheconfiict,the
provisions of thisregulation will apply.including those pertaining totheuseofgateways or informationmanagement
resources as pathways to connect their ISs.If the nonArmy tenant uses any part of the host installationinfrastructure,
the installation lAMwill require the use of CMcontrols consistent with the installation'sinformation management and
CM process. All tenant activities will
(1) Identify and coordinate a11systemupgrades,fie1dings,pi1ots,tests,and operations of newor upgraded systems
withtheinsta11ation1AM,DAA,andD01M
(2) Identify ISs and provide the approved Cc^A documentation to the installation 1AM.
(3) Identify their security support requirements to tbe installation 1AM and provide technical assistance, as required.
(4) Identify appropriate IA personnel to tbe installation lAM.
(5) Support installation IA efforts and requirements, and identify constraints in sufficient time to permit coordination
and preparation of a viable IS security solution.
(6) Coordinate and conduct vulnerability assessments or compliance scanning, and report completion and results as
required.
^I ^a^t er ^
Information Assurance ^ol i ^y
Section I
General Policy
^ 1 . Policy overview
Thiscbapterprovidespolicy to implement IA requirementsdeveloped torespondto tbe 1Acha11enge,as defined in
Public Law, National Security, DOD, and Army directives, policies, and regulations.
c^ Implement all security analyses, security engineering, and security countermeasures to protect ISs within the
framework of risk management and adherence to public laws, DOD directives, and Army regulations.
^. DefineasecuritypolicyandaprotectionprofileforlSsduringconceptdevelopment.Consider security require-
ments based on these items throughout tbe IS life cycle.
c:^. ThelS developer willensurethe early and continuousinvolvement of thefunctiona1proponent,threatandrisk
assessors,users,1Apersonne1,data owners,certification authorities, and DAAsindefiningandimplementing security
requirements of the IS.
c^. Statements of security requirements will be included in the acquisition and procurement specifications and
contracts for ISs, products, and services. Purchases will be in accordance with Army contracting and acquisition
guidelines, 81anket Purchase Agreements (8PAs), and lA-approved products. NIST Special Publication 800^64 REV I
may be referenced for specification, tasks, and clauses that are used in writing contracts. The statements will refiect an
initial risk assessment and will specify the required protection level per DODD 8500.1 and DODI 8500.2.
^. The ACOMs,ASCCs,DRUs, direct reporting PMs, or functional proponents will not field, and commanders will
not accept, systems
(1) That do not meet minimum security standards stated in the acquisition and procurement specifications.
(2) For which a Ci^A authorization has not been obtained from the appropriate DAA.
^ Commanders are responsiblefor ensuring that ISs under tbeir purview are operated inamanner consistent with
tbe system Cc^A package and this regulation.
f^ AR 25 2 ^ 24 October 2007
^anni ngB^0001^253
^. Development and modification to existing ISs will be performed inamanner that makes security an integral part
of the development, acquisition, fielding, anci operational processes.
^. All ISs will be subjected to the acquisition life cycle per AR 70-1.
1. AR 525-13 prescribes policies and procedures for tbe Army antiterrorism program and assigns responsibilities for
including defensive information operations.
^ 2 . Punding
HODAwill manage and provide annual IA initiatives funding guidance and support required for Management Decision
Packages (MDEPs) MS4X and MX5T,and others as appropriate.Funding guidance will change from year to year, and
CIO/G 6will publish annual guidance on the submission of IA requirements and tbe CIO/C 6validation processes of
thosesubmittedrequirements.Thisfundingandbudgetingprocess willcontinue under the Army InformationSystem
Security Program (AISSP) direction and guidance. This annual guidance provided to lAPMs and other appropriate
personnel willidentifyvalidlAsubmissionrequirements andthe type of information required.CI0/G^wi11present
validated IA requirements to the appropriate Program Evaluation Croup (PEC).
c^. T^^^cjB^^iBi^B^^^i^iB^^iBi^Bi^,^. The RCIOsand ACOMs/ASCCs willprovide tbeMDEP MS4X Report(il1ustrated in
table 4^1)totheH0DA,C1O/C6,asindicatedbe1ow^
(1) Submit fiscal year (FY)-pbased execution plans to the CIO/G^ no later than 10 August of each year.
(2) Funded commands must provide a detailed midyear and yearend actual execution report.
(cii) The midyear actual execution report is due to the CIO/G 6 not later than 10 May of each fiscal year,
(i^^ The yearend actual execution report is due to the CIO/G^ not later than 10 October of each fiscal year.
(c:i) 8oth themidyearandyearendactual executionreportsmustbetiedtophasedexecutionplansandreconciled
with tbe official Execution Database Summary (218) report.
(c^ Review execution reports for unauthorized expenditures and unauthorized fund reprogramming.
(^^ HODA, CIO/C 6 will monitor program execution on a regular basis.
(^ Commands receiving MDEP MS4X funds will submit semi-annual reports. (Reporting Requirements (RCS:
CS1M62))
Table 4-1
MDEP MS4X, Information Assurance Phased Funding Utilization Plan/Actual Execution Report (RCS: CSIM-62)
For period ending 092009 (MMYYYY)
Project execution Phased Fund Utili- Estimated cost Actual obligation Date obligated Actual execution
data zation Plan
(09/09) Item (for example,
training (what type
and number of par-
ticipants); specific
equipment items)
($000) ($000) ($000) (09/08) Remarks: (for example,
status of procurement ac-
tion, explanation for non-
execution of funds in line
with execution plan; ex-
plain what specific equip-
ment items will be used
for)
b, MDEP MX5T funds, MDEP MX5T funds are used in centralized procurement of COMSEC and IA equipment
within the Army. The following guidance is provided:
(1) Commanders are responsible for developing their respective command and combatant command-level MX5T
requirements. Inputs will be staffed through their local IA channels and provided to the RCIO and HQDA for all tbeir
sub-activities and subordinate commands.
(2) Garrison commanders and tenant activities will report INFOSEC, COMSEC, and IA requirements to their
respective RCIOs.
(3) PEOs are responsible for developing, managing, and providing input to the HQDA for all tbeir PMs.
(4) A PM that reports directly to HQDA is responsible for developing requirements and providing his or her input to
HQDA.
(5) Forecast data over a 15-year period for the purpose of short-term, mid-term, and long-term funding projections.
Provide this data to the CSLA database located at Fort Huachuca, Arizona. Provide the following minimum data:
(a) Name of INFOSEC, COMSEC, or IA system, equipment, or product needed.
(b) Name of system requiring INFOSEC, COMSEC, or IA systems, equipment, or products.
(c) Quantity of each type of INFOSEC, COMSEC, or IA equipment needed starting with the first year of the
program objective memorandum (POM).
(d) Name of the approving authority.
AR 25-2 24 October 2007
19
ManningB_00016254
(^^^ Point of contact's name, mailing address, and e-mail and Defense Message System (DMS) addresses.
(^ Name of operational requirements document (ORD) and date approved.
( ^ Short description of system.
(^^ Other information as directed b y H Q D A C I O / C ^ or DCS , G3 .
(6) Submission of un resourced requirements wi l l be to CIO/C 6, Attention: NETC ESTA I.
^ 3 . I nf or mat i on assur ance t r ai ni ng
Al l i ndi vi dual sappoi ntedas I A ornetworkoperati onspersonnel must successfully compl etean IA securi tytrai ni ng
certification course of instruction equivalent to the duties assigned to them. Individuals must also be certified in
accordance wi t h tbe DOD baseline requirements of DODD 8570.1. Personnel wi th privileged access must sign a
privileged level user agreement. Personnel in technical level positions wi l l complete the applicable computing environ
ment certifications. Methods of training are web based at https://ia.gordon.army.mil, or other Service or Agency
equivalent.
Cl. T^^^i^iB^^m^Bi^,^.
(1) I A P M w i l l ^
(c;i) Complete the Army 1AS0 course wi thi n 6 months of appointment.
(^^ Complete Army E-leaming training course for Certified Information Systems Security Professional (CISSP).
(c^^ Completion dates are automatically uploaded into the ATCTS.
(c^ Complete applicable DOD baseline management certification.
(2) I ANMwi l l ^
(^c^^ Comply wi th paragraphs ci(l)(a), ci(l)(c), and c^(l)(d), above.
(^^ Complete the SA/ NM security course (at Fort Gordon or a mirror site) wi thi n 6 months of appointment.
(3) l AM wi l l comply wi th paragraphs ci(l)(a), ci(1)(c), and ci(1)(d), above.
(4) l ANO wi l l comply wi th paragraphs cii(l)(a), c;i(1)(c), and c;i(1)(d), above.
(5) I ASOwi 1 1 ^
(d^ Complete an l ASO Course wi thi n 6 months of appointment. Methods of training are Web based (http://
ia.gordon.army.mil), DI SA Information Assurance Policy and Technology (lAPc^T) Web 8ased Training at http://
iase.disa.mil/eta/index.btm1). Army E Leami ng/C8T IA modules, command (or other Service) course
(^^ Comply wi th paragraphs ci(l)(c) and c^(l)(d), above.
(6) SAs wi 1 1 ^
(Cl) Completeintroductory training (Level I) wi t hi n6mont hs of assuming position. SAs wi l l be certified t oLev el l
asami ni mum. Met hodsof t rai ni ngareWebbased(ht t ps: / / i a. gordon. army. mi l ), DISA Information AssurancePolicy
andTechnoIogy ( I APc^T) Web8ased Training at bttp://iase.disa.mil/eta/index.html), Army ELeami ng/ C8T1A mod-
ules, or command (or other Service) courses.RCIOs or command IA personnel (as applicable) wi l l determine i f limits
on SA duties warrant certification to Level I only.
(^^ Complete technical training (Level II) SA Security Course (schedules available at http://ia.gordon.army.mil) or a
Command-equivalent course wi thi n 6 months of assuming position.
(c^) Complete advancedtraining (Level I I 1)at t heNat i ona1Guar d8ur eau( NG8) Comput er Emer gency Response
Team Operati onal Trai ni ng Experience (CERT OTE) or USARComput er Network Defense Course (CNDC) courses,
or other Service or agency equivalents as required.
(ci^ Complete applicable DOD technical and computing environment baseline certifications.
(^^ Comply wi th paragraphci(l)(c), above.
(7) Contracting officer' srepresentatives(CORs).Contracting officer'srepresentatives wi l l compare contractor quali-
ficationstothestatementofwork/performanceworkstatement requirements t oensurecont ract or-nomi nat edl Aand
SA positions meet mi ni mum requirements before acceptance for employment. I f tbe personnel provided are non-
compliant wi th the statement of work requirements, the COR wi l l notify tbe Contracting Officer for implementation of
contract remedies.
(8) l Auserawarenesst rai ni ng. I AMs, SAs, and1AS0swi l l ensur et hat auser t r ai ni ng program i s i npl ac ef or al l
users in the command. Online user training courses can be found https://ia gordon army.mil.
(i^^ Al l users must receive IA awareness training tailored to the system and information accessible before issuance of
a password for network access. The training wi l l include the fol l owi ng:
7. Threats, vulnerabilities, and risks associated wi th the system. This portion wi l l include specific information
regarding measures t oreducemal i ci ous logic tbreats,pri nci pl esofshared risk, extemal and intemal tbreatconcems,
acceptable use, privacy issues, prohibitions on loading unauthorized software or hardware devices, and the requirement
for frequent backups.
2. Information security objectives (that is, what needs to be protected).
Responsibilities and accountability associated wi th IA.
^. Information accessibility, handling, and storage considerations.
20 AR 25-2 24 October 2007/RAR 23 March 2009
l\/lanningB_00016255
Physical and environmental considerations necessary to protect the system.
1^. System data and access controls.
7. Emergency and disaster plans.
^. Authorized systems configuration and associated CM requirements.
^. Incident, intrusion, malicious logic, virus, abnormal program, or system response reporting requirements.
7(^. INFOCON requirements and definitions.
77. AUP requirements.
(^^ Users will receive annual refresher training as a minimum or as conditions warrant,
(9) Vulnerability assessment certification. lApersonnel conducting vulnerability assessmentson ISsmust achieve
VAT certification through their supporting RCERT or TNOSC. (This is not equivalent to the 1AVM program
assessment procedures.) Additional guidanceandprocedures in accordance with thepolicy can be found on the IA
88P Web site.
^ .^^^^/i^i^/i^c^iiiiBi^ Refresber training for 1APMs,1AMs,IANMs,IASOs, and SAs/NAs will be attendance at an
IA workshop every 18 24 months, attendance at DOD sponsored IA workshops, completion of modules in Army
E LeaminglAleaming path, or approved commercial courses. 8aseline certifications will be maintained in accordance
with the requirements of the certifying body.
C^. ,^1^^,^/l^l^^lCIBl.^ C^l^ ^^l ^l Vd/ ^l l C^l ^, ^.
(1) IAPMs,IAMs,IASOs, and lANMs can substitute other Service or Agency courses to fulfill these requirements.
Identify tbe substitute course, duration, and sponsor when tracking completion dates.
(2) SAs and lANMs can substitute courses to fulfill the technical training (Level II) requirement.
4-^. Mission assurancecategory, levels of confidentiality, and levels of robustness
cn. ^i.^.^iciBici.^.^i^i^ciBic^^c^c^^^^c^B^. Al l ISs will be assignedamission assurance category that refiects the importance of
tbeinformation relative tothe achievement of DODgoalsandobjectives.The ISmission assurancecategory will be
determined by the DOD or Army proponent and agreed upon by the DIACAP team. The MAC level is used to
determine the lAControls for integrity and availability in accordance with DODI 8500.2.Refer to DOD18500.2 (http:/
/iase.disa.mil/policy.html)foradditionaldetailedguidanceandproceduresfordefiningorassigningmissionassurance
categories.
(1) MACI isahighintegrity,high availability for DODISs handling informationthat is determined to be vital to
the operational readiness or mission effectivenessof deployedandcontingency forces in terms ofboth content and
timeliness.The consequences of loss of integrity or availability isunacceptable and could includetheimmediate and
sustained loss of mission effectiveness.
(2) MAC II is a high integrity, medium availability for DOD ISs handling information that is important to the
support ofdeployed and contingency forces.The consequence oflossofintegrity is unacceptable.Loss ofavailability
is clifficult to deal with and can only be tolerated for a short time.
(3) MAC III is a basic integrity, basic availability for DOD ISs handling information that is necessary for tbe
conductofday-todaybusiness,but does not materially affect support to deployedor contingency forcesintheshort-
term. The consequences of loss of integrity or availability can be tolerated or overcome without significant impacts on
mission effectiveness or operational readiness.
^. CciBi^c7^Bi^icii/ii^/^i^^/.^. Al l ISs wi l l be assignedaconfidentialitylevel based ontbe classification or sensitivity of
the information processed.The confidentialitylevelis used to establish acceptable access factors and to determine tbe
DODI 8500.2 IAControls applicable to the information system.DODhas defined the following three confidentiality
levels:
(1) Classified Information designated top secret, secret or confidential in accordance with Executive Order
12356
(2) Sensitive Information the loss, or unauthorized access to or modification of could adversely affect the
national interest or conduct ofFederal programs, or PrivacyAct information.Includes, but is not limited to For Official
Use Only (FOUO), Privacy data, unclassified controlled nuclear information, and unclassified technical data.
(3) Public Information has been reviewed and approved for public release.
c^. 7,^iB^/,^ci^B^c^/ii^.^^Bi^.^.^. Al l ISs willemploy protection mecbanismsthat satisfy criteriafor basic,medium,or high
levels of robustness per DODI 85002 and Federal Information Processing Standard (FIPS) 140^2 Each I Swi l l be
managed and operated to achieve tbe appropriate level of protection for the applicable functional security requirements.
(1) 77i^/i B^ci/ii^,^^Bi^,^.^. High robustness is tbe security services and mechanisms that provide the most stringent
protection and rigorous security countermeasures.Generally,high robustness technical solutions requireNSA-certified
highrobustness solutions for cryptography,access control and key management, and high assurance security design as
specified in NSA endorsed high robustness protection profiles, where available.
(2) ^^c7ii^BBi i^c^^i^.^^ii^.^.1^. Medium robustness is security services and mechanisms that provide for layering of
additional safeguards above good commercial practices.Medium robustness technical solutions require,ataminimum,
strong (for example, crypto-based) authenticated access control, NSA approved key management, NIST FlPS-validated
AR 25-2 24 October 2007/RAR 23 March 2009 21
ManningB_00016256
cryptography, and tbe assurance properties as specified in NSA-endorsed medium robustness protection profiles or the
Protection Profile Consistency Guidance for medium robustness.
(3) ^c^.^ic^ B'cj^i^.^/ii^.^,^. 8asic robustness is the security services and mechanisms that equate to best commercial
practices.8asic robustness technical solutions require, ataminimum, authenticated access control,NIST approved key
management algorithms,NIST FlPS-validated cryptography,and the assurance properties specified inNSA-endorsed
basic robustness protection profiles or the Protection Profile Consistency Guidance for 8asic Robustness.
c;^. 7,^v^/ci^/ci/ci/,^^,^^^Bii^.ii:^c^.^iiB^^. Theappropriatelevelofprotectionforeachfunctionalsecurity requirement will
be determined usingacombination of the mission assurance category, level of confidentiality,and level ofrobustness.
(1) EachlS will be reviewed against the mission assurance category definitions provided in DODI8500.2, Enclo-
sure 2, and assigned to a mission assurance category.
(2) Each IS will be assigned a confidentiality level basedon the classification or sensitivity ofthe information
processed, stored, or transmitted.
(3) Determine tbe applicable IA controls from DODI 8500.2.
(4) The identified controls for the level of total system exposure serve as the baselinelA requirements for Cc^Aor
reaccreditation and will be reassessed and revalidated every 3 years as a minimum.
4-5. Mi ni mum i nformati on assurance rec^uirements
All required risk analyses willevaluate and identify possible vulnerabilities and adverse security effects on associated
ISs and networks. Although manual procedures are acceptable when an automated safeguard is not feasible, IA
personnel will embed automated security safeguards into the design and acquisition of ISs to ensure a secure
infrastructure.
Cl. T^B-d/ii^i'^^c^cic^^i^i^i^,^. In addition to the prohibited activities listed in AR 25 1, the following activities are
specifically prohibited by any authorized user on a Govemment provided IS or connection:
(1) Use of ISs for unlawful or unauthorized activities sucb as file sharing of media, data, or other content that
is protected by federal or state law, including copyright or other intellectual property statutes
(2) Installation of softwares configuration of an IS, or connecting anylSstoadistributed computer environs
ment (f^C^), for example tbe S^TI project or tbe human genome research programs
(3) l^odilicationof tbelSor software,useofitinany mannerotbertban itsintendedpurpose,oradding
user configurable or unauthorized software such as, but not limited to, commercial instant messaging, commer-^
cial Internet cbat, collaborative environments, or peer to peer client applications These applications create
exploitable vulnerabilities andcircumvent normalmeans ofsecuringandmonitoringnetwork activity andprovidea
vector for theintroduction of malicious code, remote access, networkintrusions or tbe exfiltrationof protected data.
(4) Attempts to strain, test, circumvent, or bypass network or IS security mechanisms, or to perform network
or keystroke monitoring RCERTs, RedTeam, or other official activities, operating in their official capacities only,
may be exempted from this requirement.
(5) Physical relocation or changes to configuration or network connectivity of IS equipment
(6) Installation of non-Governmentowned computing systemsor devices without prior authorization ofthe
appointed f^AA including but not limited to US8 devices, external media, personal or contractor owned laptops,
andl^Cf^s
(7) Release, disclose, transfer, possess, or alter information without the consent of the data owner, the original
classificationautbority(OCA)asdefinedby AR 380 5,theindividual's supervisory chainof command, Freedomof
Information Act (FOIA) official. Public Affairs Office, or disclosure officer's approval.
(8) Sharing personal accounts and autbenticators (passwords or PINs) or permitting tbe use of remote access
capabilities through Government provided resources with any unauthorized individuaL
(9) f^isabling or removing security or protective software and other mechanisms and tbeir associated logs
from IS
^c^c^B^^c7i^ci^ic^Bi. ISs and networks will be accredited in accordance with interim DOD and Army DIACAP
documentation and Army supplemental networthiness guidance.
c^. ^c^c:^^.^.^ c^cJu^B^d/. IA personnel will implement system and device access controls using tbe principle of least
privi1ege(POLP)viaautomatedor manual means toactivelyprotectthe IS fromcompromise,unauthorizeduseor
access, and manipulation. IA personnel will immediately report unauthorized accesses or attempts to their servicing
RCERT in accordance with Section V111, Incident and Intrusion reporting. Commanders and DAAs will
(1) Enforce users'suspensions and revocation for violations of access authorization or violation in accordance with
para 3 3c^(13).
(2) Develop the approval processes for specific groups and users.
(3) Validate individualsecurity investigation (or approveinterim access) requirements before authorizingIS access
by any user.
(4) Verify systems are configured to automatically generate an auditable record or log entry for each access granted
or attempted.
22 AR 25-2 24 October 2007/RAR 23 March 2009
ManningB_00016257
(5) Validate that systems identify users through tbe user's use of unique user identifications (USERIDs).
(6) Validate that systems authenticate users through the use of the CAC asat wo-f act or authentication mechanism.
The CAC has certificates on the integrated circuit chip (ICC), and wi l l be used as tbe primary user identifier and access
authenticator to systems.
(7) Validate system configurations to authenticate user access to all systems wi t hami ni mumof aUSERI D and an
authenticator when thesystemsare incapable of CACenabl ement until theseare replaced. Anaut hent i cat ormay be
somet hi ngt heuserknows(password), something t heuserpossesses(t oken), oraphysi cal charact eri st i c (biometric).
Tbe most common authenticator is a password.
(8) Veri fy that system configurations use password-protected screen savers, screen locks, or other lockout features to
protect against unauthorized access of ISs during periods of temporary non-use. Ensure such mechanisms automatically
activate when a terminal is left unattended or unused. The DOD activation standard is established at 15 minutes.
Establisbashorter period when IS are used i namul t i nat i onal or coalition work area.In instances where the unattended
lockout featurehindersoperations, f orexampl e; standalonebriefingpresentation systems, medical triage devices, or
operating room systems st at us; t heDAA and SO can approve longer timeouts as an exception only when it imposesa
mi ni mum of risk, other control mechanisms are enabled to mitigate these risks, and documented in the Cc^A package.
However tbe timeout feature wi l l never be disabled and the system wi l l never remainunattended during this extended
use period. Exceptions wi l l never be granted f ormat t ers of convenience or ease of use.
(9) Va1idate that system configurations prohibit anonymous accesses or accounts (for example, Studentl,Student2,
Patroni , Patron2, anonymous).
(10) Prohibit the use of genericgroup accounts.Permit exceptions only onacasebycase basis when supporting an
operational oradmi ni strati verequi rement such as watch-standi ngorhel pdeskaccounts, or that requi reconti nui ty of
operations, functi ons,or capabilities. l AMs wi l l implement procedurest oi dent i f y and audit users of gr oup accounts
through other operational mechanisms such as duty logs.
(11) Veri fy that system configurations l i mi t tbe number ofuser failed log-on attempts to three before denying access
to (locking) that account, when account locking is supported by the IS or device. I f IS-supported, tbe system wi l l
prevent rapid retries when an authenticator is incorrectly entered and gives noindications or error messages that either
tbe authenticator or ID was incorrectly entered (for example, implement time delays between failed attempts).
(12) Veri fy that system configurations generate audit logs, and investigate security event violations when the
maximum number of authentication attempts is exceeded,the maximum number of attempts from onel Si s exceeded,
or the maximum number of failed attempts over a set period is exceeded.
(13) Reinstate accesses only after the appropri at e1A(f or example, SA/ NA) personnelhave verified the reasonfor
failed log-on attempts and have confirmed the access holder's identity. Permit automatic account unlocking, for
example, after an established time period has elapsed, as documented in the Cc^A package and approved by the DAA,
based on sensitivity of tbe data or access requirements.
(14) I f documented in the Cc^A package and authorized by the DAA, time-based lockouts (that is, access is
restricted based on time or access cont ro1sbasedon1Paddress, t ermi nal port , or combinations of these) andbarriers
that require some time to elapse to enable bypassing may be used. In those instances the DAA wi l l specify, as a
compensatory measure, the fol l owi ng policies:
(ci^ Implement mandatory audit trails to record all successful and unsuccessful log-on attempts.
(^^^ Wi thi n 72 hours of any failed log on and user lockout, IA personnel wi l l verify the reason for failure and
implement corrective actions or report the attempted unauthorized access.
(c^^ The SA wi l l maintain a written record of all reasons for failure for 1 year.
(15) Enforce temporary di sabl i ngof al l account sf or depl oyedf or cesongar r i son networks unless the accounts are
operationally required.
(16) Create and enforce procedures for suspending, changing, or deleting accounts and access privileges for
deployed forces in tbe event of capture, loss, or death of personnel having network privilege level access.
(17) Create and enforce access auditing, and protect physical access control events (for example, card reader
accesses)andaudi tevent logs for physical security vi ol at i onsoraccesscont rol s t osupport investigative efforts as
required.
c7. T^^ii^c^^^ c^c^c^^.^.^ (T^B^
(1) Systemsbei ng used f orremot eaccess must meet security configurations to include l AVM, certification and
accreditation standards,and wi l l employ host-based security, for exampl eaf i rewal l and I DS, wi t hAVsof t war e before
authorization to connect to any remote access server. Security configurations wi l l be reviewed quarterly.
(2) Encrypt log-in credentials as they traverse tbe network as required for tbe level of information being accessed or
required for need-to-know separation.
(3) Encrypt al l RAf or net wor kconf i gur at i on or management activities regardless of classification l evel , devi ce, or
access method.
(4) Users wi l l protect RA ISs and data consistent wi th the level of i nf or mat i on retrieved during the session.
AR 25- 2^ 24 October 2007 23
^anningB^000^^25^
(5) Disable remote device password save-ftinctionsincorporatedwithinsoftware or applicationstoprevent storage
of plain text passwords.
(6) Remote access users will read and sign security and end-user agreements for remote access annually as a
condition for continued access.
^. ^^Bud/^ c^c^c^^,^,^ ,^^r^^i^,^ (7^,^,^^.
(1) Secure remote terminal devices consistent with tbe mode of operation and sensitivity ofthe information and
implement non-repudiation measures when necessary.
(2) Any IS that provides RAS capabilities will employ host-based firewalls and intrusion detection systems to detect
unauthorized access and to prevent exploitation of network services.
(3) Any RAS being accessed remotely willemploy a^^Time-Ouf'protectionfeature that automatically disconnects
the remote device after a predetermined period of inactivity has elapsed, dependent on classification level of the
information, but no longer than 10 minutes.
(4) Remote access users will be required to authenticate all dial-in operations withauniqueUSERID and password,
compliant with the remote authentication dial-in user system (RADIUS) standard.
(5) AIIRAswill terminate atacentrally managed access point located witbinademilitarized zone (DM^) that is
configured to log user activities during a session.
(6) Prohibit all RA (that is, virtualprivate network (VPN), dial-in) to individual ISs within an enc1ave(that is,
behind the DM^ firewall).
(7) DOIMs and lAMs must ensure all remote access servers (RASs) undergo CM and Cc^A processes.
(8) Stand alone dial back modems and modem systems that authenticate using RADIUS are tbe only allowable dial-
in modems.
(9) Physical security for tbe terminal will meet the requirements for storage of data at tbe highest classification level
received at the terminal and must be implemented within a restricted access area.
(10) Databetweenthe client and theRAS willbe encryptedtoprovideconfidentiality,identification,nonrepudia
tion and authentication of the data. The CAC provides the user with an official certificate.
(11) Approved telework or telecommuting access will be in accordance with established DOIM, RCIO, and
NETC0M/9th SC (A) Cc^A access procedures from a Govemment provided system only. Ad hoc telework access
(defined as one-time, informal, or on an infrequent basis) will be through existing anci approved extemal access
methods or portals such asTerminalServerAccess Control System (TSACS) or tbe Armyl^nowledge Online (AI^O)
Web site.
(12) Outside the continentalUnited States (OCONUS)telework procedures and authorization will be approved by
tbe DAA and RCIO on a case-by-case basis and documented in the Cc^A package.
(13) Audit all RAS connections at a minimum weekly.
(14) Review RAS devices biweekly for security configuration, patches, updates, and lAVM compliance.
^ Cc^Bi^^i^c^/icjBi iBic^Bic^^^i^^n/ B^^^iiiB^^BBi^n/,^. The following policy will be the minimum used forthe CM of all
systems:
(1) All CM plans will includeamaintenance and update strategy to proactively manage all IS and networks with the
latest security or application updates.While lAVM is part ofaCMstrategy,it is not all-inclusive for every IS in use in
tbe Army. All ISs will have a vulnerability management strategy for testing and maintaining patches, updates, and
upgrades.
(2) Hardwareandsoftwarechanges to anaccredited IS, witban established baseline, willbeeffectedthrougbthe
CM process.
(3) Tbe CC8 or the CM8forasite must approve modifying or reconfiguring the hardware of any computer system.
Hardware will not be connected toany system or network witbouttheexpress written consentof tbe lAM and the
CM8 or CC8.Inthe absence ofaCC8 or CM8,the appropriate commander or manager will provide the consent on
the advice of the cognizant IA official.
(4) Modifying, installing,ordownloadingofany software on any computer systemmay affect systemCi^Aand
must be evaluated and approved by the 1AM with tbe local CM8, CC8, and DAA.
(5) Configuration management controls,including version controls,will be maintained on all software development
efforts; RDTc^Eactivities;follow-ontest andevaluation(FOTc^E)activities;and other relatedtestsby the software
designer. ACM^^baselineimage"wi11 be created,documented, kept current, and maintained by network and system
administration personnel for all ISs within their span of control. Exceptions to this baseline image will be documented
in tbe Cc^A package and approved by tbe DAA.
(6) Theminimumbaselineconfiguration for ISs willbe thepublished Security Technical ImplementationGuide
(STIC) requirements orthe common criteria protection profiles for IA products, as available or supplemented and
published by DOD and NETC0M/9thSC (A), with any changes documented STIGS are located at: http://iase.disa.mil/
stigs/index.htmL
(7) Prohibit default installations of ^^out of the box"configurations of COTSpurchased products.COTS purchased
productswill require system CM and lAVMcompliance asaminimum.Comprehensive vulnerability assessments of
24 AR 25-2^24 October 2007
^anningB^000^^25^
the test IS will be conducted and documented before and after installation of any COTS products under consideration
for CM review or approvaL
(8) Upon acceptance for operational use (whether developmental, GOTS, or COTS), keep software under close and
continuous CM controls to prevent unauthorized changes.
(9) ISsmust meet minimumlevels of total system exposure. See paragraph 4 ^ andDODI 8500.2 toestablisb IA
baseline requirements.
^. ^^.^.^^.^.^Bn^Bi^.^ Commanders will verify that lApersonnel conduct initial and continual assessments to detect IS and
network vulnerabilitiesusingapproved tools, tactics,andtechniquestofacilitate the riskmanagementprocess and to
ensure compliance withnetworkmanagement,CM, 1AVM requirements,and security policiesandprocedures. Com-
manders and IA personnel will ensure that all networks and networked ISs undergo a self assessed, vulnerability
assessment scan quarterly. Prohibit theuseofcommercial scanning services or vendors withoutthe C10/G6's chief
information security officer's (CISO) approvaL
/ i . Bfi^c^i/in^. SAs will configure ISs to automatically log all access attempts. Audits of IS will be either automated or
manual means. SAs will implement audit mechanisms for those ISs that support multiple users.
(1) Use audit servers to consolidate system audit logs for centralized review to remove tbe potential for unauthorized
editing or deletion of audit logs in the event of an incident or compromise.
(2) Commands, organizations, tenants, activities, and installations will support centralized audit server implementa-
tions in tbe enterprise.
(3) Centralized audit servers logs will be maintained for a minimum of 1 year.
(4) Conduct self-inspections by the respective SA/NA or IA manager.
(5) Enable and refine default ISlogging capabilities to identify abnormal or potentially suspiciouslocal or network
activity
(ci^ Investigate all failed login attempts or account lockouts.
(^^^ Maintain audit trails in sufficient detail to reconstruct events in determining the causes of compromise and
magnitude ofdamagesbouldamalfunctionorasecurity violation occurs. Maintain system audit logslocally for no
less than 90 days.
(c:'^ Retain classified and sensitive IS audit files for 1 year (5 years for SCI systems, depending on storage
capability).
(ci^ Provide audit logs to tbe ACERT, Army ClobalNetwork Operations and Security Center (A-GNOSC),LE,or
CI personnel to support forensic, criminal, or counter-intelligence investigations as required.
(^^ Review logs andaudit trailsat aminimum weekly,morefrequently i f required, and takeappropriate actions.
i. Ccju^iBi^^nc:'^ ^/c^Bimn^. A contingency plan is a plan for emergency response, backup operations, transfer of
operations, and post disaster recovery procedures maintained by an activity as a part of its IA security program.
Commanders will create andpractice contingency plans foreach IS (a single IS or local area netwrok (LAN)) for
critical assets as identified by the data owner or commander to support continuity of operations planning (COOP). See
DAPam25 1 2foradditionalguidance and procedures for developing contingency plans.Exercise contingency plans
annually.
^. T^d^d i i i ^ ^ ^ i ^ i i ^ .
(1) Implement safeguards to detect and minimize unauthorized access andinadvertent,malicious,or non-malicious
modification or destruction of data.
(2) Implement safeguards to ensure that security classification levels remain with the transmitted data.
(3) DAA will identify dataowners foreachdatabaseon their networks.Onlytheoriginal classification authority
(OCA) is authorized to change the data classification.
(4) DAAwi l l develop and enforce policies and procedures to routinely or automatically backup,verify,and restore
(as required) data, ISs,or devices at every level.These policies and procedures will be captured in the Cc^Apackage.
(5) Use data or data sources that have verifiable or tmsted information. Examples of trusted sources include, but are
not limited to, information published on DOD and Army sites and vendor sites that use verified source code or
cryptographic hash values.
(6) Protect data at rest (for example,databases,fi1es) tothe classification leveloftheinformationwitb authorized
encryption and strict access control measures implemented.
^. Cc^^^cuc^^di^^. TheCc^Apackage willbeavailable to thesite-assignedlASO forthe life ofeach IS or LAN,
includingoperational,prototype, test,ordeve1opmenta1systems.ThisCc^Apackagewill include ataminimumthe
System Identification Profile (SIP), Scorecard, and plan of action and milestones (POAc^M).
/. 7B^ ^i^dcB^i^c^/ cic^^i^i.^i/ic^ii. All security related COTS hardware, firmware, and software components (excluding
cryptographic modules) required to protect ISs will beacquired in accordance withpublic law and will havebeen
evaluated and validated in accordance with appropriate criteria, schemes, or protection profiles (http://www.nia-
p.nist.gov/) and this regulation. IA products listed on the IA Approved Products List (APL) available on the IA
website, will beevaluated/selectedfirst, and thenprocured through Army ComputerHardware, Enterprise, Software
andSolutionscontractvehiclesbefore other lAproducts are procured. ForPEO/PM's,the CSLA 8PArequirements
AR 25-2^24 October 2007/RAR 23 March 2009 25
^anningB^000^^2^0
only applies to tbe procurement of COMSEC devices. Al l COTS products wi l l be evaluated by NSAor in accordance
wi th NSA-approved pr ocesses. NETCOM/ 9t bSC( A) andCI O/ G- 6 may approve exceptions to l Aproduct s evaluations
when no criteria, protection profi1e,or schema exists or is under development, and tbe removal or prohibition of such
an I A product woul d significantly degrade or reduce tbe ability of personnel to secure, manage, and protect the
infrastructure.
/^cj^ic^^c^Bici^c^c^Bi.^^Bi/^i^c^c^^c7i^B^^,^. Commanders wi l l verify that all computers under t hei rcont rol , independently,
prominently and completely display tbe Notice and Consent 8anner immediately upon users' authentication to the
system, including, but not limited to, web, ftp, telnet, or other services access.
(1) Ceneral Noti fi cati on: Army users of DOD telecommunications systems or devices are advised that DOD
provides such systems and devices for conducting authorized use. Users are subject to telecommunications monitoring,
including tbeir personal communications and stored information.
(2) Using Govemment telecommunications systems and devices constitutes tbe user's consent to monitoring.
(3) Users wi l l be advised that there is no expectation of privacy while using ISs or accessing Army resources.
(4) Tbe user must take a positive action to accept the terms of t he notice and consent wami ngbanner bef or ea
successful logon is completed.
(5) Post appropriate wami ng banners and labels in accordance wi th this regulation.
(6) The fol l owi ng access wami ng banner replaces the waming banner in AR 380 53 and wi l l not be modified
fiirther. The banner to be posted on Army networks, systems, and devices wi l l state
(7) ^^YOU ARE ACCESSI NCAUS GOVERNMENT (USC) I NFORMATI ON SYSTEM (IS) THAT IS PRO
VI DEO FOR USCAUTHORI ^ ED USE 0NLYB' 8y using this IS (which includes any device attached to this IS), you
consent to tbe fol l owi ng conditions: The USC routinely intercepts and monitors communications on this IS for
purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense,
personnel misconduct ( PM) , l awenf or cement ( LE) , and counterintelligence (Cl )i nvesti gati ons. At any t i me, t heUSG
may inspect andsei zedat ast or edon this IS. Communications using, or dat ast or ed on, this IS are not private, are
subject to routine moni tori ng,i ntercepti on,and search,and may be disclosed or used for anyUSG-authorized purpose.
This IS includes security measures (e.g., authentication and access controls) to protect USC interestsnot for your
personalbenefit or privacy. Notwithstanding t heabove, usi ng this IS does not constituteconsent t o PM, LE, o r CI
investigative searching or monitoring of tbe content of privileged communications, or work product, related to personal
representation or services by attomeys, psychotherapists, or cl ergy,and tbeir assistants.Such communications and work
product are private and confidential. See User Agreement for details.
(8) For those personal computing devices such as 81ackberries and other PDAs that have technical limitations to the
ful l banner, then tbe only approved solution wi l l be: ^^1've read c^ consent to terms in IS user agreem't."
(9) For media devices, services, protocols, and other limited text input requirements other than PDA devices
requiring access, such as routers,firewalls,bannered access ports, and sof or t h. Thi s banner wi l l be^^Subject to Army
Wami ng banner in AR 25 2, 4-5BBi(7)."
Bl. ^iB^iB.^^B'ci^^c^^iciBi. Implement the virus protection guidance provided below on al l I Ss and networks,regardless of
classification or purpose
(1) Users and SAs wi l l scan all files, removable media, and software, including new ^^shrink-wrapped" COTS
software,wi th an installed and aut hori zedAVproduct before introducing them onto an IS or network.Fi l es,medi a and
software found to be infected wi th a virus wi l l be reported by users to the SA.
(2) To minimize tbe risks of viruses, implement the fol l owi ng countermeasures:
(ci) SAs wi l l configure all ISs wi t bacur r ent and supportable version of t heAVsof t war e configured to provide real^
time protection from the approved products list wi th automated updates and reporting enabled.
(^^ IA personnel should take the multilevel approach to virus detection by installing one AV package on the
workstations and a different AV package on the servers.
(^^^ SAs wi l l update virus defi ni ti onsat a mi ni mum weekly, or as di rectedby the ACERT for immediate threat
reducti on.Vi rus definition availability is based on vendors' capabi l i ti es.l Apersonnel wi l l institute automated antivirus
definition updates as published or available from authorized DOD or Army sites.
(3) I A personnel wi l l train users to recognize and report virus symptoms immediately.
(4) l AMs wi l l implement virus-reporting procedures to support DOD and Army reporting requirements.
CJ. ^ C l ^ l / ^ C^CJCI^^.
(1) Mobi l e code is executable software,transferredacrossanetwork, downloaded, and executed onal ocal system
without notification to, or explicit installation and execution by, the recipient.
(2) Mobi l e codehast hepot ent i al to severely degrade operati onsi f improperly usedor control l ed.The objective of
the mobile code security policy is to deny untrusted mobile code the ability to traverse the Army enterprise. As a
mi ni mum, tbe Army mobile code mitigation policy wi l l be implemented to support the DOD mobile code policy.
Untrusted mobile code wi l l not be allowed to traverse the enterprise unless NETC0M/ 9t b SC (A) CC8 approved
mitigating actions have been emplaced.
^ . TBcriB^B^iBi^.
26 AR 25-2 24 October 2007/RAR 23 March 2009
ManningB_00016261
(1) Layering i saprocess of implementing similar security configurations or mechanisms at multiple points in an IS
architecture. Doing so eliminates single points of failure,provides redundant capabilities,increasesaccessgranularity
and auditing, and implements an effective computer or network attack detection and reaction capability.
(2) The Army enterprise IA security Di D structure requi resal ayeri ng of security policies, procedures, and technolo-
gy, i ncl udi ng best practices such as redundant capabilities or use of altemative operating systems,to protect all network
resources wi thi n the enterprise. Layered defenses at the boundaries, for example, include, but are not limited to using
inbound and outbound proxy services, firewalls, IDSs, IPSs, and DM^s.
^. Ti'i'/^^B^iBi^. Filtering policies wi l l block ingress and egress services, content, sources, destinations, ports, and
protocols not required or authorized across the enterpriseboundary. Routerand firewall accesscontrol l i st s( ACLs)
provide a basic level of access control over network connections based on security or operational policy.
(1) Fi l t eri ngat t beent erpri seboundary is the primary responsibility of t heNETC0M/ 9t hSC( A) TN0SCs us i ng
tools and techniques applied at tbe enterprise level.
(2) At all levels subordinate t oNETCOM/ 9t h SC (A), filteringpolicies and technology wi l l be implementedand
layered throughout tbearchi tectureandenforced at all capabledevices. Audit and syst emordevi cegenerat edevent
logs wi l l be provided to NETC0M/ 9t h SC (A). These policies should be complementary.
(3) Filtering products and techniques are intended to proactively reduce ingress and egress security threats to
enterprise systems and information without targeting specific individuals. Tbe most common threats are associated wi th
malicious content,misuse,security policy vi o1ati ons,contentpo1i cyvi o1ati ons,orcri mi na1acti vi ty.Threat mitigation
policies wi l l be incorporated, conf i gur ed, andmoni t or edt or educeor identify these t hr eat sandi ncl ude, but ar enot
1i mi t edt o, ACLconf i gur at i ononr out i ngdevi cest opr event access tounauthori zed sites, AV installations,cache or
proxy servers (to maintain connection state), firewalls, mail exchange configurations (f orexampl e, autodeletion of
attachments), network monitoring software such as IDS or Intrusion Prevention System (IPS) configured to terminate
suspicious traffic, content management, or web filtering applications.
B^^^T^
(1) Commanders and Directors wi l l implement an AUP f or al l user accesses under t hei rcont rol (seethe sample
AUP at appendix 8) .
(2) Users wi l l review and sign an AUP prior to or upon account activation. Digital signatures are authorized.
(3) IA personnel wi l l maintain documented training records.
(4) DOD policy states that Federal Govemment communication systems and equipment (including Government
ownedtel ephones,facsi mi l e machines,electronicmai1, intemet systems,andcommerci al systems),whenuse of such
systems and equipment i spai df or by t heFeder al Govemment , wi l l bef or of f i ci al use and authorized purposes only.
(5) Offi ci al use includes emergency communications and communications necessary to carry out the business of the
Federal Govemment. Offi ci al use can also include other use authorized by a theater commander for Soldiers and
ci vi l i an employees deployed for extended periods away from home on offi ci al business.
(6) Authorized purposes include bri ef communications by employees while they are traveling on Govemment
business to notify family members of offi ci al transportation or schedule changes. Authorized purposes can also include
l i mi tedpersonal use established by appropri ateauthori ti esundertbegui del i nes of the .loint Et hi csRegul at i on(DOD
55007 R)
(7) Certain activities are never authorized on Army networks. AUPs wi l l include the fol l owi ng minimums as
prohibited These activities include any personal use of Govemment resources i nvol vi ng: pomography or obscene
materi al (adu1torchi 1d);copyri ght i nfri ngement(suchas the shar i ngof copyr i ght mat er i al by means of peer-topeer
software); gamb1ing;tbe transmission of chain letters; unofficial advertising, soliciting, or selling except on authorized
bulletin boards established for such use; or the violation of any statute or regulation.
^ciBii/c^B^iBi^ Bi^ri^c^B^^.
(1) Network monitoring includes any of anumber of actions by l Apersonnel aimed at ensuring proper performance
and management. When any of these monitoring activities involve intercepting(capturing in real time) tbe contents of
wi reorel ect roni ccommuni cat i ons, they must fall wi t hi nt be l i mi t sof t heser vi cepr ovi der except i on to tbeFederal
wiretap statute. The service provider exception allows system and network administrators to intercept, use, and disclose
intercepted communications as long as the actions are conducted in the normal course of employment and the SA/NA
is engaged in an activity t hat i snecessar yt okeept he service operati onal or to protectthe rights or propert yof the
service provider. Therefore, IA personnel must consult wi th legal counsel to ensure that their activities involving
systems management and protection are properly authorized.
(2) l Apersonnel performing ingress and egress network monitoring or filtering activities are authorized to use CIO/
G6appr oved automated monitoring tools maintained and configured byNETCOM/ 9t bSC (A) as network devices to
aid in the performance and management. It is important to recognize that tbe SA/ NA does not have unlimited authority
i nt he use of these network monitoring tool s.The approved tool may contain technical capabilities beyond those tasks
f or whi ch tbe tool wasapproved; as such the IA personnel must ensure that approved t ool sar eusedonl y f or t hei r
intended purpose.
AR 25- 2^ 24 October 2007 27
^anningB^000^^2^2
(3) l Aper sonnel wi l l not use unapproved I A tool s,use I A tools for unapproved purposes, or misuse auto-
mated I A tools. Violations wi l l be reported through appropriate command channels to tbe CI O/ G^. Except i ons to the
configuration of t hese devices wi l l be approved on a case-by-case basis by NETC0M/ 9t h SC (A).
(4) In general terms,l Apersonnel and SAs/NAs do not engage in blanket network monitoring of intemal communi-
cations. However, the Army reserves tbe right at any time to monitor, access, retrieve, read, or disclose intemal
communications when al egi t i mat eneedexi st st hat cannot besat i sf i edby other meanspursuanttopara45^,bel ow.
(5) As a matter of normal auditing, SAs/NAs may review web sites logs, files downloaded, ingress and egress
services andsi mi l araudi t edor related i nformati onexchangedover connected systems. Supervisors and managersmay
receive reports detailing the usage of these and other i ntemal i nformati on systems,and are responsible for determining
that such usage is both reasonable and authorized.
(6) Asamat t er of norma1audi ti ng,SAs/NAs may store all files and messagest hroughrout i nebackupst o tape,
disk, or other storage medi a.Thi s means that information stored or processed, even i f auser has specifically deleted it,
is often recoverable and may be examined at a later date by SAs/NAs and others permitted by lawful authority.
(7) SA/NAs may provide assistance to Army supervisory and management personnel, under lawful authority, to
examine archived electronic mai l , personal computer file directories, hard disk drive files, and other information stored
on I Ss. Thi si nf ormat i on may include personaldata. Such examinations aretypi cal l y performed to assure compliance
wi th intemal policies; support tbe performance of administrative investigations; and assist in tbe management and
security of data and ISs.
(8) When l Apersonnel di scover information during the course of their normal activity that i ndi catesavi ol ati on of
acceptable use or a possible criminal offense, they wi l l immediately report tbe finding to their Commander. The
commander wi l l immediately report knownorsuspect edcri mi nal activity to LE and wi l l consult wi th legal counsel
conceming activities that appear merely to violate acceptableuse. IA personnel wi l l retain andprovi de information
related to the matter to LE when required.
(9) Wi t h the exceptions of the SA/ NA as i denti fi ed below. Ar my personnel and contractors are prohi bi t ed
f r om browsi ng or accessing other user^s e-mail accounts
(10) The SA/ NA may only intercept, retrieve, or otherwise recover an e-mail message and any attachments thereto,
only under the fol l owi ng circumstances:
(cii) Wi t h consent (expressed or implied) of a party to tbe communication involved.
(^^ In response to a request for technical assistance from:
7. LE/C1 personnel pursuant to a properly authorized LE/C1 investigation.
2. A supervisor as part of a non-investigatory management search in accordance wi th paragraph 4^5/, below.
^. An investigating officer pursuant t oaproperl y authorized administrative investigation (for examp1e,apre1iminary
inquiry under Rul ef or Courts-Martial 303, ani nf or mal i nvest i gat i onunder AR 15^ , or apr el i mi nar y inquiry under
AR 380 5)
^. Information systems security monitoring personnel pursuant to properly authorized IS security monitoring
activities.
Inspector Ceneral personnel pursuant to an authorized inspection, investigation, or inquiry.
(11) Tbe SA/ NA may remove anye mai l , f i l e, or attachment that is interfering wi t ht he operation of an I Swi t hout
consent of t he originator or recipient. Tbe SA/ NA wi l l notify the originator and recipient of such actions.
(12) TheSATNA i snot aut hor i zedt ouse techniquesor software topenetrate or bypassuser's informationprotec
tions (for example, content restrictions or read-only protections used to maintain or enforce document integrity,version
control, or need-to-know enforcement).
/. /^ciBic^^^BBi^Bi^ .^^ciB^c^/i. In tbe absence of tbe user (for example, TDY, extended hospital stay, incapacitation,
emergency operational requirement), only the SA/NA is authorized limited access to the user's files to support
administrative management searches to provide tbe requested information as required for offi ci al purposes. When such
access is requested, the SA wi l l
(1) 8r i ef tbe supervisor as to the limits of accessing the user's data files.
(2) Li mi t tbe scope of t he authorized search to those files reasonably related to the objective of t he search (that i s, e-
mail access woul d not be reasonable when searching for a word clocument file).
(3) Li mi t the search to the time necessary to locate tbe required data in the most relevant file location.
(4) Inform tbe individual of requested file access as soon as possible after such requests, and document this access
in a memorandum.
(5) SAs/NAs wi l l not grant unrestricted supervisory access to individual information, data files, or accounts.
(6) SA/NAs wi l l not access individual information or data files unless conducting a management search, an
authorized administrative search, or supporting a LE/CI authorized investigation.
(7) SA/NAs may conduct an authorized investigative or management search of assigned IS upon an individuals'
termination of empl oyment , death, or other permanent departure from the organization to retrieve data and files
associated wi th the organizational mission.
2^ AR 25- 2^ 24 Octobec 2007
i^anningB^0001^2^3
Sect i on II
Sof t war e Secur i t y
4 - 6 . Co n t r o I s
d. IA personnel wi l l implement controls to protect system software from compromise, unauthorized use, or
manipulation.
^. TbeDAA, mat er i eI deve1oper , CI O, or I AM wi l l document al l sof t war eusedf or cont r ol pur posesi nt heCc^A
package as a mi ni mum.
c:. PEOs, PMs, and functional proponents wi l l require vendors seeking to support the AEI to submit SF 328
(Certificate Pertaining to Foreign Interests).
c7. Al l COTS software used on ISs wi l l be fti l l y licensed (under U.S. Copyright Law).
^. Incorporate l AVMcompl i ance, patch management, I A, andAVsof t war e into contracts wi th software developers
regardless of tbe software's purpose (for example, medical devices).
^ Program managers and DAA wi l l restrict systems used or designated as ^^test platforms" from connecting to
operationalnetwork. PMand DAAscanaut hori zet emporaryconnect i onst o conduct upgrades,downl oadpatches,or
perform vulnerability scans when off-line support capabilities are insufficient and protections have been validated.
Remove the ^^testplatform"1S immediately upon completion of the action until it has been operationally accredited and
is ful l y compliant.
^. Use of ^^shareware" or ^^freeware" is prohibitedunless specifically approved through I A personnel andby the
DAA for a specific operational mission requirement and length of time when no approved product exists. Noti fy
RCIOs and the supporting RCERT/TNOSC of local software use approvaL
/ i . Use of ^^opensource"software (for example, Red Hat Li nux) i s permitted whent he source codei s available for
exami nat i onof mal i ci ouscont ent , applicableconfiguration implementationguidance i savai l abl eand implemented,a
protection pr of i l ei si n exi st ence, or ar i sk and vulnerability assessment hasbeen conducted wi th mitigation strategies
implemented wi th DAA and CC8 approval and documentation in the Cc^A package. Noti fy RCIOs and the supporting
RCERT/TNOSC of local software use approvaL
i. Use of dataassurance and operating systems integrity products (f orexampl e, public key infrastmcture (PI^I),
Tri pwi re, Intemet protocol security (IPSec), transmission control protocol/Intemet protocol (TCP/IP) wrappers) wi l l be
included in product development and integrated into end-state production systems.
^. l AMs and developers wi l l transition higb risk services such as, but not limited to, ftp or telnet to secure
technologies and services such as secure ftp (sftp) and secure shell (ssh).
^ Ar my personnel, i ncl udi ng cont ract ors, wi l l not i ntroduce classified or sensitive i nf ormat i on i nto an IS unt i l
the data confi denti al i ty level and protecti on level of tbe IS has been certi fi ed, tbe appropri ate IS protecti on
mechani smsare operati onal , a n d t b e f ^ AA approval or wai ver hasbeen obtai ned The data owner wi l l approve
entering thedata,whereappl i cab1e. Data wi l l not exceedt besecur i t y classification level f or whi ch the IS hasbeen
approved.
database management
d. Databasesstore i nformati onand wi l l bemanaged t oensuret hat t hedat ai saccurat e, prot ect ed, accessi bI e, and
verifiable so that commanders at all levels can rely on trusted information in the decision making process.Commanders
wi l l appoint a database administrator ( D8A) for each operational database.
^. The D8A wi l l be certified through either training or experience in the database being managed.
c^. Tbe D8A wi l l develop and implement controls to protect database management systems from unauthorized
schema modifications.
c7. The D8 Awi l l develop and implement access and auditing controls to protect database management systems from
unauthorized accesses, queries, input or activity.
^. Tbe D8 Awi l l conduct weekly backups of tbe database and schema, asami ni mum, or more often as directed by
t h e l A P M o r l A M
^ The SO wi l l protect databases from direct Intemet access using filtering and access control devices (for example,
firewalls, routers, access control lists (ACLs)).
^. Dataowners wi l l identify the cl assi fi cati onor confidentiality l evel of dat ar esi di ngi n the database and special
controls, access requirements, or restrictions required to be implemented by the D8A.
/ i . The SO wi l l place databases on isolated and dedicated servers wi th restricted access controls D8As wi l l not
install other vulnerable servers or services (f orexampl e, web servers, ftp servers) that may compromise or permit
unauthorized access of the database through another critical vulnerability identified in tbe additional servers or services.
1. Databases should be hosted on trusted military IS or networks.As part of tbe Cc^A process, the CA and DAAwi l l
review and approve a detailed risk management process as documented in tbe Cc^A package before operational
implementation of databases located in contractor owned, operated, or managed networks.
AR 25- 2^ 24 October 2007 29
^anningB^000^^2^4
^ 8 e f o r e the DAA grants an approval to operate (ATO), the fol l owi ng mi ni mum requirements wi l l be addressed i na
security compliance plan:
(1) D8A certifications and experience in the proffered system(s) and application(s).
(2) Security background investigation(s) of the administrator(s) and verification procedures equivalent to tbe IT
position held by tbe D8A and tbe classification of the system.
(3) Control measures for encrypted privileged-level, root, administrator, and user accesses in accordance wi th Army
access standards.
(4) Contro1measurestoprotectdatabase(s)and management systemsfromunauthori zedqueri es, i nput , or activity
for example; data input validation and exception routines.
(5) Control measures for database(s) and server update, management, backup, andrecovery procedures.
(6) Control measures and procedures for audits, analysis, incident and intmsion response.
(7) Control measures to protect database(s) servers and interfaces from direct, unauthorized, or un-autbenticated
Intemet access using filtering and access control devices or capabilities (for example, firewalls, routers, ACLs).
(8) Control measures to protect database(s) servers and interfaces from physical access threats.
(9) Control measures to protect database(s) servers and interfaces from logical threats.
(10) Forcontractor owned, operated, or managed databases, tbe contractor wi l l conduct an initial comprehensive
vulnerability assessment of tbe configuration, security, and network upon which the servers reside, and provide the
complete results to authorized Army representatives.
(11) Forcontractor owned, operated, ormanageddatabases, the contractor wi l l conduct quarterly comprehensive
vulnerability assessments and evaluations and fi i mi sh the results to authorized Army representatives.
^. Data owners and D8As wi l l implement and support DOD data/meta-data tagging requirements as initiatives,
software, procedures, and methodologies are developed and implemented.
4- 8. Oesi gn and t est
Cl. Al l information systems wi l l be designed to meet the IA controls as identified in DODI 8500.2 and be configured
in compliance wi th the appl i cabl eDISA STIC or baselined system wi th identified changes documented as part of the
accreditation process.
^. Al l information and information-based systems wi l l i ncorporate embedded software security solutions throughout
the system life cycle.
c^. System developers wi l l contact CSLA during initial design to determine COMSEC device requirements ( i f
required) in system design.
c^. 8efore fielding,all information and information-based systems wi l l be tested per an approvedTest and Evaluation
Master Plan (TEMP) that contains current, validated threats to each IS. The systems wi l l demonstrate successful
completion o f a l l required test and evaluation events at each acquisition decision milestone.
^. Conduct vulnerability assessments on all systems before fielding or installing systems to identify residual
vulnerabilities and provide risk mitigation strategies for those vulnerabilities that are operationally required.
Sect i on III
l ^ar d^ar e, Pi r m^ ar e, and Physi cal Secur i t y
49. Har dwar e- based secur i t y cont r ol s
Consider hardware securi t y, COMSEC, and IA requirements in the concept, design, development, acqui si ti on,fi el di ng,
and support of ISs.
dl. System developers wi l l incorporate controls to protect hardware and firmware from compromise and unauthorized
use, removal, access, or manipulation.
^. After initial fielding and installation ofhardware or firmware, proposed additions must go through an Installation
configuration management board for approval before installation and operation. The CC8 Chair or responsible
Information Management ( I M) offi ci al wi l l notify the DAA, Ar my CA, mat eri el devel oper,CIO, 1AM, RCI O, DOI M,
or authorized I M officer before installation and operation, as applicable. Proposed additions may require revalidation or
re-accreditation of the system's security posture and accreditation approval.
c^. Tbe Cc^A wi l l include an inventory of all identifiable hardware, firmware, and software that areparts of t he
system.
c7. Maintain CM controls for all hardware and firmware test and evaluation, fol l ow-on test and evaluation, and other
related activities by the materiel developer.
^. 1APMs, I AMs, or system developers wi l l contact CSLA to review applicable I A8 PAs (both from DOD and the
Army) before initiating requisition actions.
4-10. Maintenance personnel
The Commander wi l l verify or validate tbe fol l owi ng:
30 AR 25- 2^ 24 October 2007
^anni ngB^000^^2^5
cn. C/^c^B^i^Bic^^.^. Maintenancepersonnel wi l l be cleared t ot he highest level of dat ahandl edby the IS. Clearance
requirements wi l l be included in maintenance contracts, statements of work, and specified on the DD Form 254
(Department of Defense (DOD) Contract Security Classification Specification), in accordance wi th AR3 8 ( ^ 9 , wh e r e
applicable.
^. 7^^,^^i^ic^^ic^Bi.^. Escort and observe uncleared maintenance personnel at all times by a cleared and technically
qualified i ndi vi dual . NonU. S. ci t i zens wi l l not perform maintenance on ISs that processTOP SECRET (TS), Sensitive
Compart ment edl nf ormat i on(SCI ), Special Intel l i gence(SI), Single IntegratedOperational Plan-Extremely Sensitive
Infonnation (SIOP ES1),or SAP information.
c^. ^.^^ci^BiciBi^.,^.c^i^i^^Bi.^. When non-US.ci ti zens are employed to maintain ISs, address such use asavul nerabi l
ity in the risk assessment and identify and employ appropriate countermeasures.
c7. ^c^iBi/^BiciBic^^^^c::/^dB^^c7^^B^.^i^BiBi^/. Personnel who perform maintenance on classified systems wi l l be cleared and
indoctrinated to tbehighest classification l evel of information processed ont be system. Appropriately cleared mainte-
nance personnel do not require an escor t . Needt oknow requirements may be inherent to adequately perform mainte-
nance or take corrective actions. An appropriatelycleared and technicallyknowledgeable employee wi l l be present or
review the system during maintenance to assure adherence to security procedures.
^. ^ciiBi^^BiciBic^^ i^iic^/^c^B^^c^ (^dB^ /di^^B^ c^/^di^^c^ ^^B^.^ciBiBi^/. I f cleared maintenance personnel are unavailable,
individuals wi th tbe technical expertise to detect unauthorized modifications wi l l moni t or al l uncleared maintenance
personneL
(1) Uncleared maintenance personnel wi l l be U.S. citizens. Outside tbe U.S., where U.S. citizens are not available to
perform maintenance, use FNs as an exception, wi th DAA approval and documentation in the Ci ^A package.
(2) 8efore maintenance by uncleared personnel, the IS wi l l
(d^ 8ecompl et el y cleared and al l nonvol ati l e data storage media removed or physically disconnected and secured,
(/i^ Whenasyst emcannot be cleared, lAM-approvedprocedures wi l l be enforced to deny the unclearedindividual
visual and electronic access to any classified or sensitive information that is contained on the system.
(3) Aseparate,unclassified copy of the operating system (for exampl e,aspeci fi c copy other than the copies used in
processing information), including any fioppy disks or cassettes that are integral to the operating system,wi l l be used
f oral l mai nt enanceoperat i onsperf ormedby unclearedpersonneL Thecopy wi l l bel abel ed^^UNCLASSI FI ED FOR
MAI NTENANCE ONLY" and protected in accordance wi th procedures established in the SSAA/System Security
Policy (SSP). Ensure that tbe media is write protected before use in classified systems.
(4) Maintenance procedures for an IS usi nganon-removabl e storage device onwhi cbt he operating system resides
wi l l be considered and approved by the 1AM on a case-by-base basis.
(5) Theuseof commer ci al data recovery services wi l l bedocument edi n the Ci ^Apackageandappr ovedby the
DAA wi th approval from the data owner and notification to the CIO/G 6 CISO.
4-11. Security objectives and safeguards
The Commander wi l l verify or validate the fol l owi ng:
d. Secure removable media that process and store classified information in an area or a container approved for
safeguarding classified media per AR 380 5.
^. Establish checks and balances to reduce the risk of one individual adversely affecting system or network
operations.
c^. Implement physical security requirements for ISs to prevent loss, damage, or unauthorized access.
c^. Prohibited storage of port abl e ISs or personal electronic devices (PEDs) that contain classified information in
personal residences.Exceptions wi l l fol l ow the guidance as prescribed i n AR 380^5, par agr aph7^, and authorized as
an exception only when an operational requirement exists.
^. Include facilities or spaces housing critical systems (f orexampl e, emai l servers, web servers) as part of the
physical security program and restrict access.
Sect i onI ^
Procedural Security
4-12. Password control
d. Implement two-factor authentication techniques as the access control mechanism in lieu of passwords. Use CAC
asthe primary access credential,or biometric or single-sign on access cont r ol devi ceswhent bel S does not support
CAC
^. Tbe l AM or designee wi l l manage the password generation, issuance, and control process. I f used, generate
passwords in accordance wi th the 88P for Army Password Standards.
c^ The holder of a password is the only authorized user of that password.
d^. The use of onet i me passwords is acceptable,but organizations must transi ti onto secure access capabilities such
as SSH or secure sockets layer (SSL). See remote access requirements in para 45c7.
AR 25- 2^ 24 October 2007 31
^anningB^000^^2^^
^. SAs will configure ISs to prevent displaying passwords in the clear unless tactical operations (for example, heads-
up displays while an aircraft is in fiight) pose risks to life or limb.
^ lAMs will approve and manage procedures to audit password files and user accounts for weak passwords,
inactivity, and change history. lAMs will conduct quarterly auditingof password files on a stand-alone or secured
system with limited access.
^. Deployed and tactical systems withlimited data input capabilities willincorporate password controlmeasures to
the extent possible.
^ l Al ^s and SAs will remove or change default, system, factory installed, function key embedded, or mainte^
nance passwords
1. lAMs and SAs will prohibit automated scripts or linkage capabilities, including, but not limited to,Web site links
that embed both account and authentication within the unencrypted link.
^. SAs/NAs, wi t hDAA approval, will implement proceduresfor user authenticationor verification before resetting
passwords or unlocking accounts in accordance with the Cc^A package.
^. SAs/NAs will conduct weekly auditing of service accounts for indications of misuse.
7 Theuse of passwordgeneratingsoftwareordevicesis authorized asamemoryaid when itrandomly generates
and enforces password length, configuration, and expiration requirements; protects from unauthorized disclosure
through authentication or access controls; and presents a minimal or acceptable risk level in its use.
4-13. Release ofinformation regarding information system infrastructurearchitecture
c^ Al l Army personnel and contractors will protect and restrict access to all documentation (for example,
maps, test andevaluation results, vulnerability assessments,audits, results,or findings)describingoperational
IS architectures, designs, eonfigurations,vulnerabilities, address listings,or user information This information is
aminimum of FOUO and will not be made publicly accessible.Evaluate Freedom of Information Act (FOIA) requests
for such documents in these categories on a case-by-case basis.
^. Al l information or IS responses that document ordisplay specific vulnerabilitiesof a system or network that
would aid attempts by an adversary to compromise those critical systems or networks are OPSEC sensitive and will be
protected,controlled,marked,or stored at the appropriate classification levelfor tbe system concemed.Thisinforma-
tion will not be made publicly available.
c^. Protect and restrict access to information that isacollection of interrelated processes, systems,and networks that
providesinformation on IA services throughout the Army;the1^M1;or the incident detection and responseinfrastruc-
ture, capabilities, orconfiguration. This informationshouldbemarked FOUOandmay beexempt from mandatory
release pursuant to the FOIA.Coordinate with your servicing FOIA or PrivacyAct office and servicing judge advocate
or legal advisor before releasing or deciding to withhold such information.
Section ^
Personnel Security
4-14. Personnel security standards
Tbefollowing standards designate positions requiring access t oI Tand for processing information within ITsystems,
These security designations are required to distinguish potential adverse effects on Army functions and operations and,
therefore, tberelativesensitivity of functionsperformedby individualshavingcertainprivileges. Thesepositionsare
referredtoasITand IT-relatedpositions. Therequirementsofthissection will be appliedtoall ITand IT related
positions,wbetber occupied byDA civilian employees,military personnel,consultants, contractor personnel,or others
affiliated with tbe DOD(forexamp1e, volunteers). Additionalguidance is available in DOD 5200.2 R.
c;i. ^c^.^ic^ B^^^i^iB^^BBi^Bi^,^.
(1) Personnel requiring access to ISs to fulfill tbeir duties must possess the required favorable security investigation,
security clearance, or formal access approvals, and fulfill any need-to-know requirements.
(2) I T I i s ^
l^d^ Definedaspersonnel in 1Apositions(for example, SAs/NAsforinfrastmcturedevices, IDSs, VPNs, routers;
SAs/NAsfor classified systems and devices) with privileged-levelaccess to control,manage,orconfigure1Atools or
devices, individual and networked IS and devices, and enclaves.
(7i^ Favorable completion of a National Agency Check (NAC) (current within 180 days).
(c^^ Initiation ofaSingle Scope 8ackground Investigation (SS81) and favorable review of SF85P(Questionaire For
Public Trust Positions), SF 86 (Questionaire For National Security Positions), and Supplemental Questionnaire.
(3) I T I I i s ^
(dl) Defined as personnel in IA positions (for example, operating system administration of common network
applications or enclaves,back-up operators) withlimited privilegedlevelaccessto control,manage,orconfigureISs
and devices, with very limited (single device) or no IA device access or management.
(^^ A favorable review of local personnel, base/military, medical, and other security records as appropriate.
(c^^ InitiationofaNational Agency Check withCredit Check and Written1nquiries(NACIC)(for civilians) or a
32 AR 25-2^24 October 2007
^anni ngB^000^^2^7^
National Agency Check with Local Agency and Credit Checks (NACLC) (for military and contractors), as appropriate
or favorable review of SF 85P and Supplemental Questionnaire.
(4) IT-III is-^
(d^ Defined as
7. Personnel in IA positions, for example, power users or a SA on individual systems for configuration or
management with limited privileged-level access to that IS(s) or device(s). This is a position of higher trust
2. Personnel with roles, responsibilities, and access authorization of normal users with non privileged level access to
the IS or device.
^. Personnel with non privileged level access authorization in tbe role of official or statutory volunteers. Tbe
provisions for statutory volunteers are covered in AR 608 1..
(^^ A favorable review of local personnel, base andmilitary, medical, andotbersecurity records, as appropriate.
(i^^ Initiation of a NAC1C (for civilians) or national agency check (NAC) (for military and contractors), as
appropriate and favorable review of SF 85P and Supplemental Questionnaire.
(5) I T I Vi s ^
(^^^ Definedaspersonnel in non-1Tpositionsthataretemporary,intermittent,or seasonal, for example, unofficial
volunteers or summer hire positions, requiring restricted user-level access to unclassified, non-sensitive ISs only.
(^^ Individual completes SF 85P and supplemental questionnaire.
(c^^ A favorable review of local personnel, base/military, medica1,andother security records asappropriate. This
investigation does not require submission to OPM.
(d^ A favorable recommendation by the organization security manager, DAA, Commander, and installation com-
mander, with notification to the RCIO/FCIO.
/ i . 7^^B^.^c^BiBi^/ .^^c^iiB^ii^ c:^ciBi^B^cj/.^.
(1) Personnel security controls,both technicaland nontechnical (forexample,separationofduties,leastprivilege
access, identification and authentication (1i^A),digitalsignatures, and audits), willbeincorporatedintothelSandlS
procedures, as appropriate.
(2) Individuals assigned to IT L IT H, or IT III positions who lose their clearance, orhave access to classified
systems suspended pending the results of an investigation,will be barred access to thelSsuntilfavorable adjudication
of that investigation. Waiversforcontinuedaccesstounclassifiedsystems willbejustifiedinawrittenrequest, with
the Commander's concurrence,totbeDAAfor approvaL AccesswillbegrantedonlyuponDAA authorization.This
request and approval will become part of the Ci^A package.Users designated in IT-Ipositions will be removed from
these positions and this denial of access is non-waiverable.
(3) WaiversprocessedforIT II and IT III personnel only are valid foraperiod not to exceed6montbs.Ifasecond
waiver extensionisrequired,onemaybegrantedaslongasanewrequestfor waiver issubmittedtothcDAAand
approved by tbe first general officer, or equivalent in position or civilian grade, in the Chain of Command.
(4) While the Commander and DAA have the discretiontoprocessthe waiver forlT-lland IT III, i t isimportant
that this discretion is not without limits. The Commander and DAA are advised to proceed carefully and deliberately in
makinga determination on whether the individual constitutes a security risk. The IT II/IT 111 rolesmustbehighly
supervised. Any access to protective devices (for example,firewalls, VPNs, intrusion detection systems (IDSs),IPSs,
and so on) will be prohibited until favorable adjudication.
(5) The servicing legal office should be consulted for advice conceming personnel, security, contract and labor
relations issues that may impact the final determination. Recheck local records to identify any issues that may be a
deciding factor in the waiver process.
(6) New,credib1e derogatory information revokes any standing waiver and resultsin immediate denialof access to
IT systems (exceptions are for military only based on immediate supervision of tbe individual while on the IS).
(7) Contractor, FN or temporary individualsassigned to any ITpositions who have their unclassifiedsystem or
network accesses revoked or suspended for derogatory reasons, will be barred access to the ISs until favorable
adjudication of that investigation. The organization's 1AS0/1AN0/1AM (as appropriate) will identify any other official
systems/networksforwhich that individual hasanaccount(for example, A1i^0)andhave ittemporarily disabledor
suspended.
(8) Tbe required investigation levels for an IT 1 position are outlined below in table 4^2.
AR 25-2^24 October 2007 33
^anningB^000^^2^^
Table 4- 2
Investi gati ve levels f or users wi t h pri vi l eged access (IT-I) to ISs
Privileged accessIT-C
User rol es Forei gn nati onal U.S. ci vi l i an U.S. mi l i tary U.S. contrac-
tor
Condi t i ons or exampl es
DAA or lAPM Not allowed SSBI SSBI Not allowed None
lANM Not allowed SSBI SSBI Conditional
SSBI
With CIO/G-6 written approval, contrac-
tors may continue as lA personnel until re-
placed
lAM Not allowed SSBI SSBI Conditional
SSBI
Contractor may not fill MSC, installation,
or post lAM position
lASO/IANO Not allowed SSBI SSBI Conditional
SSBI
Contractor may not fill MSC, installation,
or post lASO/IANO position (if created)
Monitoring or test-
ing
Not allowed SSBI SSBI SSBI None
SA/NA or Adminis-
trator (with IA priv-
ileged access) or
maintenance of IA
devices
Conditionally al-
lowedSSBI
(equivalent) ^
SSBI SSBI SSBI Examples: administration of lA devices
(for example, boundary devices, IDSs,
routers, and switches)
Notes:
' Investigative levels are delined in DOD 5200.2-R. The term 'Foreign National" (FN) refers lo all individuals who are non-U.S. citizens, including U.S. mili-
tary personnel, DOD civilian employees, and contractors
^ FNunder the immediate supervision ol a U.S. citizen with written approval of ClO/G-6.
(9) The required investigation levels for an IT-II position are outlined below in table 4-3.
Table 4- 3
Investi gati ve levels f or users wi t h l i mi ted pri vi l eged access (IT-II) to ISs
Li mi ted pri vi l eged accessIT-I I ^
User roles FN
(see note 2)
U.S. ci vi l i an U.S. mi l i tary U.S. contractor Condi t i ons or exampl es
lAM/IANM Not allowed NACI NACLC NACLC None
lANO/IASO Conditionally al-
lowedNACLC
equivalent
NACI NACLC NACLC FNwith DAA written approval, and
documentation in the C&A package,
direct or indirect hires may continue
as IA personnel until they are re-
placed, provided they serve under the
immediate supervision of a U.S. citi-
zen lAM and have no supervisory du-
ties
Supervisor of IT 1 or
IT II positions
Not allowed NACI NACLC NACLC None
Administrator (with
no IA privileged ac-
cess) or maintenance
of lA-enabled prod-
ucts
Conditionally al-
lowedNACLC
equivalent^
NACI NACLC NACLC Examples: IS administration, OS ad-
ministration, end-user administration,
and administration of common appli-
cations (for example, e-mail, word
processing)
Notes:
' Invesligalive levels are defined in DOD 5200 2-R FN refers lo all individuals who are non-U.S. citizens, including U.S. military personnel, DOD civilian
employees, and contractors.
^ FNunder the immediate supervisor ol a U.S. citizen.
34 AR 25-2 24 October 2007
ManningB_00016269
C^. .^C^C^^,^,^ Bl dBl - ^ . ^ . C^l'^l'^^Bl,^.
(1) Mi ni mi ze employment of non-US. citizens in I Tposi t i ons. However, compelling reasons may exist to grant
access t oDODI Tr esour ces in those circumstances in whi chanonU. S. ci t i zen possessesaunique or unusual ski l l or
expertise that is urgently needed f or aspeci f i cDOD requirement and for wbi cbasui t abl e U.S.citizen is not available.
Written compelling reason justification, documentation in the Cc^A package, and DAA approval are required.
(2) Access to sensitive i nf ormat i onby anon-U. S. citizen who is not a DODempl oyee wi l l only bepermi tted in
accordance wi th applicable disclosure policies (for example. National Disclosure Policy 1, DODD 5230.9, DODD
5230.25) and U.S. statutes (for example, the Arms Export Control Act, 22 USC 2551, eL seq ).
(3) I f i nf or mat i ont owbi cbt bei ncumbent wi l l have accessis authorized for f orei gndi scl osure, nonU. S. citizens
assigned to DOD IT positions are subject to the investigative requirements outlined below.
(4) Non-US. ci t i zens may hold ITposi ti ons under the conditions described in the paragraphs below and i f the DAA
that accredited the system and the dataowners approve the assignment requi rement si nwri t i ng. The written approval
must be on file andprovi ded as an artifact to the Cc^A package, before requesting the required investigation. Tbe
required investigation must be completed and favorably adjudicated before authorizing access to DOD systems or
networks. Interim access is prohibited.
(5) Assignment (includingassignments due t oaccr et i onof dut i es) of cur r ent DOD employees,military personnel,
consultants, and contractors to positions wi th different responsibilities or changed access privileges requires verification
of tbe appropriate investigative basis and authority for holding a position of that level of sensitivity.
c^. 7Bi^^B^iBBi d.^,^i^iiBBi^Bi^.^.
(1) Indi vi dual si ncl udi ng temporary,i ntermi ttent,or seasonal personnel may be assigned to unclassified IT 11 and
I T- I I I positions on an interim basis beforeafavorabl e completion of tbe required personnel security investigation only
after the conditions specified have been met
(d) Individual completes SF 85P and supplemental questionnaire.
(^^ Af avorabl e recommendation by tbe organization security manager,Commander or Director, DAA, and Installa-
tion Commander, wi th RCIO/FCIO notification.
(c'^ Initiation of security investigation has been submitted or is pending adjudication,
(d^ Interim access is not authorized for non-U S. citizens.
(2) Tbe security manager at tbe requesting activity wi l l make interim assignment approvals for civilian and military
personneL
(3) The Govemment sponsor's security manager or offi ci al wi l l make the approval for volunteer access.
(4) The i nteri massi gnmentofcontractor personnel ful fi l l i ng ITposi ti ons wi l l ber est r i ct edandi mpl ement edonl y
upondocumentation in the Cc^Apackage and acceptance of t h e DAAa n d t h e Contracting Officer evaluations o n a
case-by-case basis.
^. Bfc^'i^c^ic:d/ic^Bi.
(1) Tbe provisions of this section apply only to contractor personneL (Ci vi l i an employees, military personnel,
consultants, volunteers, and seasonal, part time, and intermittent employees wi l l be favorably adjudicated by tbe
appropriate DOD central adjudication facility.)
(2) OPM wi l l adjudicate investigations foratrustworthi ness determination using the national adjudicative guidelines
f oraccesst ocl assi f i edi nf ormat i on. 1f t headj udi cat i oni sf avor abl e, OPM wi l l i ssueal et t er of t mst wor t hi nesst ot he
requesting activity.
(3) I f af avor abl e trustworthiness is indeterminate, OPM wi l l forward tbe case to the Defense Office ofHeari ngs and
Appeals (DOHA) in Columbus, OH, for further processing under DODD 5220.6. A final unfavorable decision
precludes assignment to an IT L IL or 111 position.
(4) Enter all OPM IT trustworthiness determinations of DOD contractor personnel into the OPM Security/Suitability
Investigative Index (SII).
^ 7^^iBiiB^.^^i^d^ic^Bi. Individuals occupying an IT position wi l l be subject to a periodic reinvestigation according to
existing contract, labor relations, or personnel security policy.
4-15. Poreign access to information systems
d. To ensure standardized and appropriate access to the Unclassified but Sensitive Intemet Protocol Routing
Net wor k( N1PRNET) by foreign officials, l Apersonnel wi l l meet t herequi rement sdel i neat edbel ow. Provide each
authorized foreign offi ci a1a .mil address on the unclassified network required for executing his or her foreign official
duties as outlined i nhi sor her r espect i vecer t i f i cat i on. Foreach authorized f orei gnof f i ci al , the l ocal areanet work
administrator wi l l pl aceacaveat or marker on the user account and all outgoing e-mails from that person identifying
them asaf or ei gn offi ci al f r omaspeci f i c country. In doing so, t bel ocal area network administrator wi l l spell out the
words ^^Forei gnOffi ci al "and tbe country name of the foreign offi ci al and wi l l not use an acronym for that country. In
addi t i on, t hel ocal area administrator wi l l i ndi cat e the type of foreign offi ci al access that i sgranted.The requiredtags
for each of tbe five categories of foreign officials woul d thus read as shown below (replace each hypothetical country
name wi th the appropriate one).
AR 25- 2^ 24 October 2007 35
^anni ngB^0001^27^0
(1) Eorei gnI i ai sonof f i cer(FLO): ^^Last Name,Fi rst NameMi ddl el ni t i al -Forei gnNat i onal -Germany-FLO. "(Not e:
Local area network administrators wi l l designate FLOs representing the United l^ingdom, Canada, or Australia as
STANREPs rather than as FLOs )
(2) CooperativeProgrampersonnel (CPP): ^^Last Name, Fi rst NameMi ddl e Initial-Foreign National-Turkey-CPP".
(3) Engineer and Scientist Exchange Program (ESEP): ^^Last Name, First Name Middle Initial-Foreign National-
Israel ESEP"
(4) Standardization representative (STANREP): ^^Last Name, First Name Middle Initial-Foreign National-United
l ^i ngdomSTANREP"
(5) Mi l i tary Personne1ExchangeProgram(MPEP):^^LastName,Fi rstNameMi dd1eIni ti a1-Forei gnNati ona1-Ital y-
MPEP".
^. Li mi t access to foreign officials, exchange personnel, or representatives to computers that incorporate Army-
mandated access and auditing controls. Approval to access the NIPRNETdoes not equate to authority to exchange data
or access systems located on that network.The appropriate system DAAwi l l approve access t of orei gn officials on an
asneeded basis andupdati ng the documentation i nt he Cc^Apackage. Similarly, the designatedrelease or disclosure
authority wi l l grant access to the information on ISs to foreign officials on an as-needed basis.
c^. E mail signature blocks wi l l be automatically generated for all foreign personnel, and include the foreign
individual' s nationality and position.
1^. I f tbe organization wher eaf or ei gn offi ci al is certified determines t her ei saneedf or t hef or ei gnof f i ci al t ohave
accesst ot beN1PRNETbeyonde- mai 1access( f or exampl e, anAI ^Oaccount ) , submi t anexcept i ont opol i cy through
tbe DAA to the RC10I APM, t o be forwarded to tbe C10/ C6. Tbe approval wi l l become part of the Cc^A package for
tbe IS. This includes individuals granted access prior to the publication of this regulation. Commands wi l l immediately
evaluateeachcase andf orward thei rexcepti on recommendation. Tbeexcepti on wi l l ber evi ewedby theappropriate
HQDA Program Manager and t heNETCOM/ 9t hSC (A) Ol Ac^Cpri or to disposition.The exception must i ncl udethe
fol l owi ng information
(1) Request from the Commander that states the need to know, tied to the foreign offi ci al ' s certification and
Delegation of Disclosure Authority Letter (DDL).
(2) Statements from the installation and command' sl AM stating proper security procedures are in pl ace. TheDCS,
G 2, Foreign Disclosure and Security Directorate wi l l also review the exception before final disposition.
^. Offi ci al access to information residing on an IS or network wi l l be limited to that controlled but unclassified
information required t of ul f i l l the terms of the contract or agreement provided mi ni mum security requirements of this
section are met
^ Disclosure of classified military information t of orei gn governments and intemational organizations is limited and
wi l l be in accordance wi th AR 380^10, DODD 5230.11, and C.ICSI 5221018.
^. Intemational Mi l i tary Students(IMS) who havebeen vettedandapproved f or U. S. Army trai ni ngand Profes-
sional Mi l i tary Education (PME) attending resident training or enrolled in tbe Army Distance Education Program
(DEP) at U.S. Army and Army-managed schools/training activities wi l l agree to comply wi th all U.S. M1LDEP
requirements.They are required to sign anAUP user agreemenLThere is no requirement for background investigations
as described sincein-country U.S. of f i ci al sperf ormasecuri t yscreeni ngof eacbst udent bef ore selection approval .To
prevent inadvertent disclosure of information, international military students wi l l be identified as students in their email
address, display name and automated signature block (for example, john.i.smith.uk.stu(^xxx.army.mil).
/ i . NIPRNET access policy and procedures for FNs in non-official positions as identified above, are as follows:
(1) Components or organizations wi l l maintain records on access including the fol l owi ng i nformati on
(d) Specific mission requirements for foreign access or connection.
(^^ .lustification for each individual FN.
(^c^^ Confirmation that tbe minimum-security requirements of this section are enacted, including tbe user agreement
discussed below.
(2) 8efore authorizing FN access t oaspeci f i c IS on tbe NI PRNETor the Secret Intemet Protocol Routing Network
(SIPRNET), Army components wi l l
(d^ Ensure the information is properly processed for disclosure.
(Tl) Ensure DAAs and data owners concur wi th the access.
(c^^ Ensure the Cc^A documentation for the system is updated to refiect FN access,
(c^ Ensure security measures employed adhere to this policy.
(^^ Validate tbe identity of each FN authorizedaccess to ISs toensureaccountabi l i ty of all actions t akenby tbe
foreign user.
(^ Ensure t heFNf ol l ows appropriate security policies and procedures and that t bel ASO possesses the authority to
enforce these policies and procedures. 8efore accessing any system, an FN wi l l sign an AUP agreement that includes
7 Acknowledgment of appropriate information security policies, procedures, and responsibilities.
2. The consequences of not adhering to security procedures and responsibilities.
36 AR 25- 2^ 24 October 2007
^anningB^000^^27^^
^. Identification requirements when dealing wi thothers through oral, wri tten,and electronic communications, such
as e-maiL
^. Department of tbe Army employees or contractors who are FNs and are direct or indirect hires, currently
appointed in IA positions, may continue in these positions provided they satisfy the provisions of paragraph414,
DODD 85001, DODI 8500 2, and DOD 5200 2 R; are under the supervision of an l AM who i s a USc i t i z e n ; and are
approved in wri ti ng by the DAA and captured in the Cc^A package.
FNs assigned into IT positions wi l l be subject to the same (or equivalent) vetting as U.S. citizens.
1^. FNs may hold or be authorized access t o I T Hand IT l l l posi t i ons provided the required background investiga-
tion has been completed or favorably adjudicated.
7. Addi ti onal l y, an FN may be assigned to an IT I posi t i on only after the DAAwb o owns the system and the data
owner who owns the information si gnawai ver and the assignment has been approved by the CI O/ G^ . Tbe approvals
wi l l become part of the Cc^A package. Sign and place the waiver in the individual' s security file before requesting the
required background investigation. Tbe required background investigation must be completed and favorably adjudicated
before authorizing IT 1 access to DA systems/networks.
1^. Do n o t a s s i g n FNs t o l T L I T I I , or l T- I I I posi t i ons on ani nt er i mbasi sbef or eaf avor abl e adjudication of the
required personnel security investigation.
1. Generally, an FN or of f i ci al representative is not authorized access to the U.S. controlled SIPRNET terminal
workspace.If an authorized foreign offi ci al or national working at aU. S. Army site hasarequirement for accessing the
SIPRNET, tbe commander wi l l submit an exception to policy through the DAA to tbe RCIO 1APM, to be forwarded to
the HQDA CIO/G 6,and reviewed by the DCS, G2For ei gn Disclosure Directorate prior to di sposi t i on. C10/ G^ wi l l
coordi nat et berequest wi t ht he Army staff and forward t oDI SA. These requests wi l l be staffecl wi t ht he presumption
of deni al . Appl y the procedures of this section after DISA' s approval and any additionalguidance provided by DISA
on the connection process for FNs. E mail signature blocks wi l l be automatically generated for all FNs, and include the
foreign individual' s nationality and position. Tbe approvals wi l l become part of tbe Cc^A package.
Secti onal
Information Systems Media
4- 1^. Protection requirements
d. Al l I Sequi pment andf aci l i t i esused f orprocessi ng, handl i ng, andst ori ngc1assi f i eddat a wi l l beoper at edand
secured where applicable per the DCI D 6/ 3, AR 380^5,thi s regul ati on,or.l oi nt DODIIS Cryptologic SCIInformati on
SystemsSecurity Standards (.IDCS1SSS).
^. Al l Army personnel and contractors wi l l mark, ship, store, process, and transmit classified or sensitive informa-
tion in accorclance wi th AR 380 5.
c^. Control ISs containing non removable, non-volatile media used for processing classified information.
d^. Commanders, Directors, and IA personnel wi l l verify procedures and train users, administrators and security
personnel in processes for spillage incidents of higher-level or classified information to a lower level IS.
^. SAs wi l l configure ISs to apply security or handling markings automatically when possible or available.
^ SAs wi l l confi gure ISs to display the classification level on tbe desktop or login screen (for example,
wal l paper, spl asb screen) when the device is l ocked, t he user is logged off, or t hel S is used in spanning mul t i -
classification networks t hrough the use of a I ^Vl ^ device
^. Al l Army personnel and contractors wi l l not transmit classified information over any communication system
unl essusi ngapprovedsecuri ty proceduresandpractices inc1uding,encryption, securenetworks,secure workstations,
and ISs accredited at the appropriate classification leveL
4- 17. Label i ng, mar ki ng, and cont r ol l i ng medi a
d. Unless wri te-protectedor read-only, all personnel wi l l pr ot ect andcl assi f y media inserted into asyst emat t he
highest level thesystem is accredi t edt oprocessunt i l the dat aor medi ai s reviewed anddowngraded by t hel ASO.
^. Al l personnel wi l l clear removable media before reusing in ISs operating at the same or higher protection leveL
c:. Al l personnel wi l l mark and control all media devices, peripherals, and ISs as follows:
(1) TS or SCI or intelligence data per DCI D 6/3, DC1Dl / 7and. 1DCSI SSS as applicable
(2) Classified media per AR 380^5 requirements.
(3) FOUO media per AR 25-55 requirements.
(4) Privacy Act media per AR 340^21 requirements.
(5) NATO information per AR 380 5 requirements.
c7. Al l personnel wi l l mar kandcont r ol t bemedi aor l Saf t er det er mi nat i onof the classification l evel of the data
placed on the medi a.l mpl ement media accountability procedures based on the type of media and the classification of
tbe data as required above.
AR 25- 2^ 24 October 2007 37
^anningB^000^^2/^2
418. Cl ear i ng, pur gi ng ^sani t i ^i ng^, dest r oyi ng, or di sposi ng of medi a
d. Proceduresfor disposition of unclassified harddri ve media out si deDOD custody wi l l f ol l owcur r ent gui del i nes
addressed in the published 88P.
^. Al l personnel wi l l purge media before reuse in a different environment than tbe one in which they were
previously used(new users without a need-to-know f or t heor i gi nal dat a)or wi th dat aat adi f f er ent classification or
sensitivity level or when tbe drives have met tbe end of tbeir life cycle. Ensure custodial equipment transfer
requirements are accomplished. I A personnel wi l l verify that personnel are trained on local procedures. Purging
electronic media does not declassify the media, as declassification is an administrative process.
c^. IA personnel wi l l conduct random security inspections for violations of removable media physical security
measures quarterly.
d^. IA personnel wi l l purge unclassified media before consideration for release outside DOD control.
^. l Apersonnel wi l l destroy media that has ever contained NSAType 1 cryptographic or COMSECmateri el at end
of life cycle in accordance wi th approved destmction processes.
^ l Apersonnel wi l l dest r oySCI medi a at end of life cycl ei n accordance wi t hDCI D 6/3 f or DODI I S systems and
NSA 130^1 and 130^2 for NSA Cryptologic systems in accordance wi th approved destruction processes.
^. l Apersonnel wi l l destroy media that contained classified material or was involved i nacl assi f i ed spillage incident
at end of life cycle in accordance wi th approved destruction processes.
/ i . When it is more cost effective, or to ensure absolute security,destroy media instead of purging or declassifying in
accordance wi th approved destruction processes.
1. The l AM wi l l establish procedures to periodically verify tbe results of any purging and IS release processes.
^'. Spillage recovery procedures for data from higher-classified information to lower-classified systems are addressed
in a separately published 88P.
S e c t i o n ^ l l
Net wor k Secur i t y
4- 19. Cr oss domai n secur i t y i nt er oper abi l i t y
The DOD Global Information Gri d, Inter-connection Approval Process (GIAP) was created out of the need to provi dea
consistent way to simplify and consolidatethe various connection approval processes. Al l DODServi ces and agencies
must comply wi th these processes when connecting networks of different classification levels. The Top Secret and
8el ow Interoperability (TA81) and the Secret and 8elow Interoperability (SA81) processes provide an integrated,
comprehensive, andconsistent approach toaddressi ngtheshared riskassociated wi th the connection of net worksof
different classification levels.
d. Organizations requiring a cross domain solution must first complete the information on the C1AP Web site
(bttps://giap.disa.smil.mil).
^. Organizations requi ri ngacross-domai n solution wi l l also contact the NETCOM/ 9t hSC( A) Of f i ce of i nf ormat i on
Assurance and Compliance, Cross-Domain Solutions Office to provide notification of the cross domain process
initiation.
c^. Tbe cross-domain process follows t beDI ACAP and requires that net wor ksbef ul l ycer t i f i ed and accredited and
that all associated security devices be certified,tested, and evaluated (CTc^E) in accordance wi th the NSA compliance
standards. Approved standardized cross domain solutions wi l l be acquired through CSLA. Non-standard solutions wi l l
require an extensive engineering effort.
c^. Al l Army organizations that maintain connections between networks of different classification levels must
annually revalidate their connections in accordance wi th the SIPRNET DAA directives. Contact the SIPRNET
Connection Approval Office for current guidance and requirements.
^. Manage all interconnections of DOD ISs to continuously minimize community risk by ensuring that one system is
not undermined by vulnerabilities of other interconnected systems and that one system does not undermine other
systems Al l ISs wi thi n interconnected (or trusted networks) wi l l meet networthiness certification
4- 20. Net wor k secur i t y
d. T^B^c^c^c^c^i^i^^.^. Commanders wi l l establish procedures to manage and control access to all ISs, networks, and
networkequi pment to ensure integrity, confi denti al i ty,avai l abi l i ty, non-repudiation, and authentication,regardlessof
classification leveL
^. ^^i^i^iB^^BBi^Bi^,^. Positive IA measures ensure all users satisfy tbe requirements specified before granting an
individual access (including dial up services and Intemet access) to DOD and Army networks, systems, and stand-
alone computers.
(1) 7Bic^i^ic^i^d/. Commanderswi l l verify and l Apersonnel wi l l deny physical and logical accesstoi ndi vi dual s who
cannot meet access requirements.
(2) T^B^c^^cjBi^Bi^.^. Proponents for programs that require network services for family members, retirees, and other
individuals serviced at Army installations for example, unofficial recreational activities; l i brari es;educati oncenters;or
38 AR 25^2^24 October 2007
^anningB^000^^27^3
Army-Ai r Force Exchange Service (AAFES) kiosks, should arrange for services througbacommerci al Intemet service
provider (ISP) or other isolated connection capability. Proponents wi l l coordinate wi th the installation DOI M for
service and the 1AM for IA requirements. These connections are unofficial communications and wi l l be isolated either
logically or physically from offi ci al DOD and Army NIPRNET networks.
(3) /l^l^7^^dB^B^i,^ciBidc:/ivi/i^.^. MWR garrisonactivities dependent upon the Installation LAN for network connec-
ti vi ty in accordance wi th DODI 1015. 10andAR215 1 to provide Executive Controled Essential Command Supervi-
sion (ECECS) in support of tbe Commanders Fiduciary responsibi1ity,are authorized the use of NI PRNETconnect i vi t y
to support Commander' sMWR activities. Published 88Ps describe the standardsfor acceptable connectivity andI A
security requirements.
(4) ,77.i^Bi^r^c^B^^. .IIM networks that haveNETCOM/ 9t h SC ( A) pr ovi ded connectivity wi l l implement the most
restrictive and isolating configuration and implementation management principles (inclusive of, but not limited to,
separate enclaves and identifications, and tunnel edor dedicated connectivity) tothose that are absolutely requi redfor
military or support operations as necessary and in compliance wi th IA requirements in this and other applicable
regulations. In order to be entirely separate, .IIM networks must not
(d) Utilize Army IP numbering for their end users, servers or network devices.
(^^ Utilize army.mil as their logical extension.
(c^^ Connect to any local Army network on Army installations.
(d^ Require Army network and systems management, systems administration, or maintenance and repair support asa
standard level of service.
(^^^ Require Army to provide security oversight, management, or services from tbe Ar my asast andard level of
service.
(^ Report l AVM compliance through Army channels.
(^^ Receive Army funding for implementation at the location.
c^. ^^.^^B^ic^^ic^Bi.^. Supervisors and managers wi l l
(1) Ensure transmission of classified or sensitive information via applicable secure means.
(2) Authorize commercial ISP accounts per chapter 6, AR 25 1.
(3) Ensure there areno cross-connections directly bet weent hel nt emet and NI PRNETof ISs. For example donot
permit a modem connection (for example, multi-functional devices such as copier/fax/printer combinations) to a
commercial ISP or service while the IS is also connected to the NI PRNET. NI PRNETconnect ed systems wi l l have this
function disabled.
(4) Permit direct connections to tbe Intemet to support electronic commerce when those systems wi l l not connect to
the NI PRNETor tbe SIPRNET
c7. ,^^c^i^B^i'r^^B^ci^^c::/i'ciBi^^ri^^^Bi^Bic^/d^^,^. (that portion of the network outside the installation's or activity' s controls).
Commanders and I A Personnel wi l l utilize tbe fol l owi ng processes on routers, switches, firewalls, and other networking
devices to provide protection from extemal networks.
(1) Firewalls. Configure firewalls wi th least-privilege access controls. Layer firewalls at the boundaries between
border and extemalnetworks and as needed throughout the architecture t oi mpr ovet hel evel of assurance.NETCOM/
9th SC( A) wi l l approve firewallimplementation guidance for use wi t hi nt be Army. Every information system should
be protected by either an approved host-based or network-based (enclave) firewalL
(2) Access control lists. Update and manage access control lists (ACLs) through secure mechanisms and incorporate
a ^^deny al l , permit by exception" (DAPE) policy enforcemenL
(3) Net workconf i gurat i ons. l Apersonnel wi l l implement net workconf i gurat i onst oremove or block any unneces-
sary or unauthorized services, software, protocols, and applications such as: LanMan, gaming software,Gnute11a, IRC,
ICQ, Instant Messaging, peer-to peer.
(4) Ports, Protocols, and Services Management (PPSM). Permit only ports, protocols, and services (PPS) as
authorized. Tbe Commander and network management personnel wi l l :
(d^ Restrict enterprise andencl aveboundary firewallsandfirewalllike devices to t heusageof appr ovedPPS in
accordance wi th the DODI 8551.1 on PPSM DOD considers PPSs not listed on the DOD PPS TAG list as ^^deny by
default."
(^^ PPSs designated as ^^bigh ri sk" are unacceptable for routine use. Prohibit high-risk PPSs unless expressly
approved for a specific implementation wi th defined conditions and risk mitigation strategies.
(i^^ PPSs desi gnatedas^^medi um-ri sk"havean acceptable level of r i s k f or r out i neus e whenused wi th required
mitigation strategies.
(d^ PPSs designated as ^^low ri sk" are recommended as best security practices and advocated for use by Army
developers in future systems and applications. Not all low risk PPSs are acceptable under all implementations and may
require approvaL
(^^^ Thegoal of NETCOM/ 9t bSC( A) i st hemi gr at i onsyst ems that usebi gh- and medium-risk PPSs t ol ow- r i sk
PPSs as part of its life cycle management processes through system redesign while maintaining current standards-based
applications and requirements (for example, port 21 for ftp, port 80 for Web).
AR 25- 2^ 24 October 2007 39
^anningB^000^^27^^
(^ NETC0M/ 9t h SC (A) i sresponsi bl ef orPPS management and wi l l approveandpubl i sb Armywi demi t i gat i on
strategies for PPSs.
(5) Domain name service (DNS). TNOSCs wi l l monitor DNS servers for compliance and adherence to DNS
policies. Owning organizations wi l l provide bost based intrusion detection monitoring for these servers.
(6) Vi rtual private networks (VPNs). Vi rtual private networks wi l l require approval to connect and operate from the
RCI Ousi ngNETCOM/ 9t hSC( A) CC8- appr ovedandpubl i shedi mpl ement at i onpr ocesses( wben implemented)after
documenti ngawel l -defi ned acceptable use pol i cy,securi ty concept ofoperations, an SSAA risk analysis and manage-
ment plan, and Networthiness certification, before implementation.
(7) Storage area configurations. As developing technologies (for example, storage area networks, collaborative
environments,data sharing technol ogi es,webcasti ng,or real/near-realtime distribution capabilities) are implemented,
they must incorporate secure IA principles. Mi ni mum requirements include, but are not limited to tbe listed below
requirements. Network management personnel wi l l
(d) Obtain approval for Cc^A, CAP, and Networthiness.
(^^ Use approved NETC0M/ 9t h SC (A) configuration-management implemented processes,
(c:^ Secure the information at rest and in transit and ensure that tbe configuration does not introduce additional risks
or vulnerabilities.
(c^ Use secure communication and access protocols.
(^2^ Implement security controls and validate all user supplied i nput
(^ Implement extranet connections through a multi-tiered and layered approach requiring separate and distinct
servers across the environment for each tier, and minimally include
7. User access tier, usually through a Web site that offers static pages and wi l l be SSL enabled as a mi ni mum.
2. Application tier, authenticates authorized users, access, and interfaces between the user and the data.
^. Protection of the database or data tier (for example, fiat files, e-mail), information that is accessed by the
application on behalf of the user.
( ^ Incorporate firewalls, filtering, protective, andmoni t ori ng devices (f orexampl e, IPSs, IDSs) at each enclave
layer.
(Tl) Employ encryption, single-sign-on, tokens, or DOD authorized digital certificates equivalent to thel evel of data
accessed or available and adequately passed through the application server to access the data requested.
(i) Employ data separation and authentication ^^need to know" measures and requirements.
^. T^B^d/^c^/ic^Bici^iBi^^B^Bid/ii^ri^cjB^^. (portion of tbe network that is directly controlled by the installation or activity).
Network management personnel wi l l :
(1) Establishtmsts in accordance wi th the installation Cc^A.There wi l l be no trusted relationships established wi th
any other domains or networks until both are Networthiness certified and approved by tbe respective DAAs and
documented in the Ci ^A package.
(d) The DAAs of tbe participating ISs and the DAA of the overall network ( i f designated) wi l l si gnaMemorandum
of Understanding (MOU). Tbe MOU becomes an artifact to tbe Cc^A package.
(^^ The DAA' s approval wi l l i ncl udeadescr i pt i onof t hecl assi f i cat i onandcat egor i esof information that canbe
sent over the respective networks.
(2) Connection between accredited ISs must be consistent wi th the confidentiality level andany other restrictions
imposed by the accredited ISs.Unless the I Si s accredited for multilevel operations and can reliably separate and label
data, t hel S i sassumedt obet r ansmi t t i ngt behi gbest l evel of dat apr esent on t hesyst emduri ngnet workconnect i on.
(3) Employ identification, authentication, and encryption technologies when accessing network devices.
(4) Employ 1ayeredprotecti ve,fi 1teri ng,andmoni tori ngdevi ces (for exampl e,fi rewa11s,IDSs)atencl avebounda-
ries, managed access points, and key connection points.
(5) Scan all i nstal l ati onassetsanddevi ces, i mpl ementprotecti vemeasures,andreport noncompliance to RCIOs/
FCIOs as required (mi ni mum is semi annual).
(6) Proxy all Intemet accesses through centrally managed access points and isolate from other DOD or ISs by
physical or technical means.
^ ^BBidi'/.^^c^icB^i'r^. Al l personnel wi l l usee-mai l systemsfortransmi ssi onofcommuni cati ons equivalent t oor less
than the classification level of tbe IS.
(1) I A personnel wi l l
(d) Promotesecurity awareness.Train users t oscanal l attacbmentsroutinely bef or eopeni ngor downl oadi ngany
file from e mail.
(^./ Confi gureISs to use encryption when available or as part of tbe global enterprise to secure the content of the e-
mail to meet the protection requirements of the data.
(c^^ Implement physical security measures for any information media and servers.
(c^ Install and configure antiviral and protective software on e mail servers and client workstations.
40 AR 25- 2^ 24 October 2007
^anningB^000^^27^5
(^1^ Wam users to treat unusual e-mail messages the same way they treat unsolicited or unusual parcels; wi th
caution.
(^ Use digital signatures to authenticate a message as needed (non repudiation).
(^^ Configure ISs to prevent opening attachments or executing active code directly from mail applications.
(2) Personnel wi l l not share thei r personally assigned e-mai l accounts
(3) Commanders and Directors may allow the limited use of organizational or group e-mail accounts where
operationally warranted.
(4) Emai l passwords wi l l di f f er f r omt benet wor kpasswor d whenused,unti 1ag1oba1 P^l i ni t i at i vei savai l abl e.
(5) Al l personnel wi l l empl oy Govemment ownedor pr ovi dede- mai l syst emsor devi cesf or of f i ci al communica-
tions. Tbe use of commercial ISP or e mail accounts for offi ci al purposes is prohibited.
(6) Aut o f or war di ng of offi ci al mai l to non-offi ci al accounts or devices is prohi bi t ed
(7) Permit communications to vendors orcontractors for offi ci al business and implement encryption and control
measures appropriate for the sensitivity of the information transmitted.
(8) l APer sonnel wi l l conf i gur e systems so that authorized users who are contractors, DOD direct or indirect hires,
FNs,forei gn representatives,seasonalor temporary hires, andvolunteers have their respective affiliations or positions
displayed as part of their official accounts and e mail addresses.
^. 7Bi^^B^Bi^^, 7Bi^B^dBi^^, ^^^B'dBi^^, dBic7 ^^f f ^. ^^c: i ^i ^i r^.
(1) AR25 1 outlines requirements and pol i cyont beuse of Govemment-owned or leased comput ersf oraccesst o
the IntemeL
(2) Users are authorized to downl oadprograms, graphics, and textual information to aCovemment-owned IS as
long as doing so doesnotvi ol ateFedera1andstate1aw,regu1ati ons,acceptabl e use, and l ocal pol i ci es (for example,
CM, 1A)
(3) Govemment -ownedorl easedI Ss wi l l not use commercial 1SPs(forexampl e,CompuServe, Ameri caon Line,
Prodigy) as service provi ders,unl essaGovemment-acqui redsubscri pti onto such servi cesi si n place and the accessis
for offi ci al business or meets the criteria for authorized personal use as indicated in AR 25 1, paragraph 6 1.
(4) Net workmanagement andl Apersonnel wi l l implement appropriate access, filtering,and security control s(for
example, firewalls, restriction by IP address).
(5) Network management and l Apersonnel wi l l i mpl ement and enforcelocal area management access and security
control s.Publ i cl y accessible web sites wi l l not be installed or mnunder apr i vi l egedl evel account on any web server.
Non-public webservers wi l l besi mi l ar l yconf i gur edunl ess operationally r equi r edt or unasapr i vi l eged account, and
appropriate risk mitigation procedures have been implemented.
(6) Commercial ISP services are authorized to support those organizations identified in paragraph 4^20^(2), above,
and no cross or direct connectivity to tbe NIPRNET wi l l exist or be implemented.
(7) Al l personnel wi l l protect information not authorized to be released for public disclosure.
(8) Extranet and intranet servers wi l l provide adequate encryption and user authentication.
(9) Ext ranet serversandaccesswi l l beapproved through thei nstal l ati on 1AM, document edi n t heCc^Apackage,
and approved by the appropriate DAA.
(10) Net wor kmanager sandl Aper sonnel wi l l conf i gure allservers (including Webservers)t hat are connectedto
publicly accessible computer net workssuchas the Intemet, orprot ect ednet workssuchas the SIPRNET, t oempl oy
accessand security contro1s(for example, firewalls,routers,hostbasedIDSs)toensurethe integrity,confidentiality,
accessibility, and availability of DOD ISs and data.
(11) Commandersand supervisors wi l l comply wi t hFederal , DOD, and DA Websi t eadmi ni st rat i onpol i ci esand
implementing content-approval procedures that include OPSEC andPAO reviews before updating or posting informa-
tion on all Web sites.
(12) Network managersand l Apersonnel wi l l prot ect publicly accessible Army Web si tesby placing thembehi nd
an Army reverse Web proxy server.The reverse proxy server acts asapr oxyf r omt he intranet t ot he protected server,
brokering service requests onbebal f of the externaluser or ser ver . Thi suseof ar ever se proxy server provi desal ayer
of protection against Web page defacements by preventing direct connections to Army Web servers.
(13) Publicly accessible Web sites not protected behi ndareverse Web proxy (until moved) wi l l be onadedi cat ed
server i n a D M ^ , wi th al1unnecessaryservices,processes,or protocols disabled or removed. Remove al l sampl e or
tutori al appl i cati ons,or portions thereof, from the operational server. Support i ngRCERTsand TNOSCs wi l l conduct
periodic vulnerability assessments on al l publ i c servers and maydi r ect bl ocki ngof the site dependent ont hei nberent
risk of identified vulnerabilities. Commanders or assigned l AMs wi l l correct identified deficiencies.
(14) Al l private (non public) Army Web sites that restrict access wi th password protection or specific address
filtering wi l l i mpl ement SSL protocols ut i 1i zi ngaCI ass3D0DPI ^I certificate asami ni mum. NETC0M/ 9t bSC (A)
issues and manages these certificates.
(15) Commanders wi l l conduct annual OPSECr evi ews of allorganizational Web sites and include these resul tsi n
their annual OPSEC reports pursuant to AR 53( ^1.
(16) To verify compliance wi th Federal, DOD, and DA Web site administration policies, procedures, and best
AR 25- 2^ 24 October 2007 41
^anningB^000^^27^^
practices, tbe AWRAC will continuously review thecontent of publicly accessible U.S. Army Web sites to ensure
compliance. (See also AR 25 1 for Web site administrative policies.) AWRAC will provide results from these
assessments to commanders for corrective actions.
/i. Bf^^B-dv^d^ ^^^^c^dB-d^, iBid^^c^, ( ^ 1 ^ ^ (i^^^^ddB^c7, BBic^Bii' ^c^B^, Biicji^.^^ (7^.^/1^^ .^i^i/c/i^,^. These devices are
primarily introduced to achieve a reduction ofhardware on the desktop and do not provide any IA features.
(1) These devices are not authorized for use for cross-domain interoperability (NIPRNET to SIPRNET or
SIPRNET-toNIPRNETguardingsolution)networkconnections. See88Psdocumentationon the CIO/C 6 IA Web
site for approved items and implementation guidelines (https://informationassurance.us.army.mil).
(2) lApersonnel will configure systems to utilize screen-saver lockout mechanisms for I^VM/I^MM switch environ-
ments approved by the DAA.
1. 7Bi^B^BBid/idBid.^,^i^B^dBic^^^cici/,^. Allpersonnel willuse only IA security softwarelisted on thel Atool sl i st on Army
systems and networks. The list of Army approved IA tools is available through tbe IA Web site. Requests for
consideration and approval for additional security software packages to be added to thel Atool sl i st must be submitted
through NETC0M/9thSC (A) channels ATTN: NETC ESTL^TTN: 01Ac^C to CI O/ G^
(1) Installation l AM designated and Army-certified IA personnel may conduct tests under stringent conditions
coordinated with the installation DOIM, 1AM, TNOSC, and RCERT, at a minimum.
(2) RCIO lAPM approval, and advance notification of tbe servicing RCERT and TNOSC, is required before
certified lApersonnel may utilize public domain vulnerability assessment tools (for example, Nessus,Nmap, Saint, or
Titan)
(3) Organizational fA personnel are prohibited from conducting penetration testing attempts onISs utilizing
unauthorized hacker tools or techniques. This restriction is applicable to operational networks and does not apply to
those personnel or techniques used in a testing environment for Cc^A, vulnerability assessments of developmental
systems, or used in a training environment for personnel certifications on isolated networks.
(4) Organizational lAMs can request penetration testingof their networks. Subordinateorganizationsmay request
penetration testing through tbeir ACOM/ASCC 1AM to the installation 1AM.
(5) The use of ^^keystroke monitoring software of any kind is prohibited, except by LE/CI personnel acting
within proper legal authority
^', A^^r^cjB^^iBi^ .^^c^i^B^ii^ /dc^/.^. Tbe following policies apply to networking security tools used on ISs:
(1) Establish a security and implementation policy for each protection tool before purchase and implementation.
(2) Implement security tools within tbe security perimeter defensive architecture with NETC0M/9th SC (A)
approval.
(3) Limit login access to intemetworking devices to those individuals who operate and maintain those devices.
(4) Review configuration and audit files of security intemetworking tools weekly.
(5) TheNETC0M/9tb SC (A), in coordination wi t bCI O/ G^ and tbe ACERT,operatesdetectionandprotection
devicesfor networks connectedtotheN1PRNET.A1thougbNETCOM/9thSC (A) owns,operates,andmaintainsthe
enterprise devices, this does not preclude tbe Command, DOIM,or activity lApersonnel from managing and analyzing
local networks or data. Local management of an IDS/IPS is recommended with notification to tbe DOIM and/or
TNOSC.The notification willdocument tbe operationalrequirement,theintent of monitoring, andthe deviceutilized.
Staff the notification to the RCIO lAPM and submit to the supporting DOIM and RCERT/TNOSC. The requesting
activity is responsible for providing the hardware andsoftware necessary. All independent installationsof IDS/IPS
technologies will be configured to also support enterprise sensing and waming management activities. Coordinate the
configuration and reporting requirements with tbe supporting RCERT/TNOSC.
^. Tdc^/ic^d/ .^^.^/^BBi.^.
(1) Tactical systems, including weapon system and devices integral to weapon or weapon support systems, that
include features normally associated with an I Swi l l implement the requirements of this regulation,DODI 8500.2, and
Interim DIACAP.
(2) When one or more of tbe minimum-security requirements are impracticalor adversely impose risk of safety-of-
use because of the function and design of the system, the situation will be addressed in the Cc^A package and
considered by the CA and the DAA in determining the CA recommendation and the DAA authorization decision.
(3) Mechanisms must be available to render the IS inoperable in case of imminent capture by hostile forces.
(4) Tactical networks connecting to standard tactical entry point (STEP) sites, garrison, or other fixed networks must
be compliant with all security requirements (for example,configurations, approved software,Cc^A) before connection.
They will be protected by access controls and intrusion prevention and intrusion detection systems in the same manner
as garrison network defenses described earlier and will implement a DiD strategy.
42 AR 25-2^24 October 2007
^anningB^000^^277^
SectionVIII
Incident and Intrusion Reporting
4-21. Information system incident and intrusion reporting
Incidents may result from accidental or deliberate actions on the part of a user or extemal infiuence. Evidence or
suspicion of an incident, intmsion, or criminal activity wi l l be treated wi th care, and tbe IS maintained without change,
pending coordi nat i onwi t hI A, ACERT/ RCERT, andLE/ CI personneLCommanders and l Apersonnel wi l l enforce tbe
policies goveming unauthorized use of computer resources. Al l personnel wi l l report all potential or malicious
incidents.Time-sensitive actions are necessary to l i mi t the amount ofdamage or access.Commanders and l Apersonnel
wi l l r epor t l Si nci dent st o extemal agenciesto assist LE or investigative agencies,and assist i ncompi l i ng supporting
evidence, impact assessments,associatedcosts,containment vi abi l i t y, anderadi cat i onandreconst mct i onmeasurest o
effectively manage the breach and provide evidentiary material for prosecution.
d. Al l personnel wi l l protect IS incident reports as a mi ni mum FOUO or to the level f or whi ch tbe system is
accredited.
^. IA personnel wi l l validate IS incident reporting procedures annually for all users,
c^. Al l personnel wi l l report IS incidents or events including, but not limited t o
(1) l^nown or suspected intrusion or access by an unauthorized individual.
(2) Authorized user attempting to circumvent security procedures or elevate access privileges.
(3) Unexplained modifications of files, software, or programs.
(4) Unexplained or erratic IS system responses.
(5) Presence of suspicious files, shortcuts, or programs.
(6) Malicious logic infection (for example, virus, worm, Trojan).
(7) Receipt of suspicious e mail attachments, files, or links.
(8) Spillage incidents or violations of published 88P procedures.
c^. Aseri ous incident report (SIR) wi l l be generated and reported per AR 190-45 under the fol l owi ng conditions
(1) Tbe incident poses grave danger to tbe Army' s ability to conduct established information operations.
(2) Adverse effects on the Army' s image such as Web page defacements.
(3) Access or compromise of classified, sensitive, or protected information (for example. Soldier identification
information (SSN), medical condition or status, doctor patient, or attomey client privilege).
(4) Compromise originating from a foreign source.
(5) Compromise of systemstbat may risk saf et y, l i f e, l i mb, or hast hepot ent i al f or catastrophic effects,or contain
information for which the Army is attributable (for example, publicly accessible waterways navigational safety
information from the USACE).
(6) Loss of any IS or media containing protected or classified information.
4- 22. Repor t i ng r esponsi bi l i t i es
d. An individual who suspects or observes an unusual or obvious incident or occurrence wi l l cease all activities and
wi l l notify his or her SA/ NA, l ASO, or 1AM immediately.
^. I f tbe SA/ NA, I ASO, or 1AMi s not avai1able,the individual wi l l contact his or her supporting i nst al l at i onl AM
and theater RCERT
c^. Any SA/ NA, l ASO, or l AM whoobser vesor suspects an incident or intrusion, or receives information on an
incident,wi111ogical1y isolate the system,prohibit any additional activities on or to the system, and immediately notify
his or her supporting RCERT/TNOSC. Take no additional actions to investigate the incident until directed by the
RCERT
c7. Isol ati oni ncl udespbysi cal i sol ati on(unp1uggi ngthenetworkconnecti on),restri cti nganydi rectphysi ca1access,
and logical isolation (blocking the IP at security routers or firewalls both inbound and outbound) from the network to
the system.
^. I f the RCERT is not available then the SA or l ASO wi l l contact the ACERTdi r ect l y. I n addition, report per local
supervisory reporting policies in effecL
^ Each RCERTi sr esponsi bl ef or col l ect i ngandr ecor di ngal l t herequi redi nf ormat i on, coordi nati ngal l incident
response procedures between LE/CI personnel and the organization, and conducting all intrusion containment, eradica-
tion, and verification measures.
^. Thel Si nci dent reporting format and additional reporting requirements are available on the ACERTand support-
ing RCERT N1PRNET/SIPRNET Web sites
4- 23. Compr omi sed i r ^f or mat i on syst ems gui dance
d. When directed by RCERT, al l ISs determined to be compromised either through unauthorized access or malicious
logic wi l l ber ebui l t f r omor i gi nal medi a, pat ched, andscannedf or compl i ancebef or er ei nt r oduct i on to thenetwork.
^. l Apersonnel wi l l scan all similar ISs or devices ont be compromised net workf or configuration compliance or
AR 25- 2^ 24 October 2007 43
^anningB^000^^27^
vulnerability identification and immediately correct vulnerable systems. I f during tbe course of this assessment
additional ISs are identified as compromised, l Apersonnel wi l l report these system as compromised and take no further
action.
c^. Networks may require re accreditation, under the DI ACAP, fol l owi ng any successful compromise.
c7. Specific details and actions for a compromised system are available on the ACERT Web site.
Section 1^
Information Assurance^ulnerability Management
4-24. Information assurance vulnerability management reporting process
d. ^^Bi^B^d7 Tbe Information Assurance Vulnerability Management (1AVM) Program is the absolute mi ni mum
standard for all ISs, not the preferred end state which is a proactive methodology of maintaining, patching, and
updat i ngsyst emsbef orenot i f i cat i onor exploitation. 1AVM requi rest becompl et i onof four di sti nctphasesto ensure
compliance. These phases are
(1) Vulnerability identification, dissemination, and acknowledgemenL
(2) Application of measures to affected systems to make them compl i ant
(3) Compliance reporting.
(4) Compliance verification.
^. 7^^,^^dii,^i/ii/i^i^,^.TheCI0/G^ wi l l be tbe POC to acknowledge receipt (wi thi n five days) of DOD CERT issued
l AVMmessages,aggregate compliance andwai ver data, and report (wi thi n 30 days or as directed) t oDOD. Systems
and processes for collecting detailed information and for implementing l AVM are the responsibility of every I A
person.
c^. BfB^BBi^ iBBi^/^BBi^Bird^idBi d^7Bfl ^^. ACERT/ A GNOSC wi l l serve as the Army' s focal point for initiation of t he
1AVM process.
(1) l^ii/ii^B^d^i/iriB ici^^Bi/i^c'd^idBi, c7i,^.^^BBiiBid^idBi, dBic7 dc:^B^di^/^ci^Bii^Bi/. ACERT/ A GNOSC wi l l issue Army 1AVM
messages. Thereare t hr eet ypesof DODI A V M messages: alert ( I AVA) , bul 1et i n( I AV8) , andTecbni cal Advisory
(TA). DOD has restricted tbe use of these terms to the l AVM program only.
(d^ l AVAs wi l l establish mandatory suspense dates for acknowledgement and compliance, corrective actions to
negate vulnerabilities, and implementation of additional CND requirements.
(^^^ 1AV8s wi l l establ i sh mandatory suspense dat esf oracknowl edgement yet al l owcommandersand l Apersonnel
fiexibility for implementation of t he correctiveactions to negate vulnerabilities or implementation of CND require-
ments. Corrective actions are required to be completed, but not reported.
(c^^ Information AssuranceTechnical Tips ( I ATTs) ( Ar my designation) allow commanders and l Apersonnel fiexibil-
ity for acknowledgement and implementation to negate vulnerabilities or implement CND requirements.Acknowledge-
ment and compliance are not reported. Corrective actions are required to be completed but not reported.
Al l personnel responsible for implementing tbe l AVM process wi l l j oi n tbe Ar my l AVM Community Group on
Afi^O to receive messages.Use only offi ci al e-mail accounts for this distribution l i st l AVMmessages are available on
tbe asset and vulnerability tracking resource (Ac^VTR) Web site.
(2) 7Bf^^ c:dBBi^/idBic^^. Commanders, PEOs, PMs, and designated IA officers wi l l disseminate implementation
guidance and ensure compliance to 1AVM requirements. Commanders or IA personnel wi l l provide contractors,
contracted support, or other personnel (as necessary) l AVM i nformati on as required to support compliance
requirements.
4- 25. Compl i ance r epor t i ng
d. The RCIOs, ACOMs/ASCCs/DRUscommanders, PEOs, PMs ( or t hei r 1A officers), andgarri son commanders
wi l l ensure that messages are acknowledged,corrective actions are implemented,extensions are requested, compliance
i sver i f i ed, andr epor t i ngi nf or mat i oni sent er edi nt oAc^VTR. Wi thi n 10 calendar daysf r omt be date of t h e l AVM
message, SA/NAs wi l l conductabasel i ne assessment scan for affected assets and enter identified assets into Ai ^VTR.
RCIOs wi l l oversee 1AVM compliance reporting for their regions or commands.
^. PEOsand PMs wi l l implement correctiveactions f o r l A V M vulnerabilities that apply t osyst emsunder their
controL Tactical systems wi l l document compliancemethodology i nacl assi f i edScor ecar dand POAc^M aspart of
tbeir Cc^Apackage. DAAs wi l l r esol vecompl i ancei ssueswher ei t may result i nsaf et y or performance issues o f a
combat system that are operationally unacceptable.
c^. I f corrective actions required by issued alerts adversely affect operations, l AMs or their designated representatives
(for example, affected SAs or l ANMs) wi l l conduct ari sk assessment for the commander and contact their supporting
RCIO, l APM, or l AM Tbe RCIO, 1APM, or 1AM wi l l contact the CI O/ G^ through ACERT/ NETC0M/ 9t hSC (A) to
request an extension, not to exceedl 80 days,and to develop and implement an acceptable altemative security solution.
Tbe altemative security solutions must be coordinated wi th tbe ACERT/ NETC0M/ 9t hSC (A) before approval by the
appropriate DAA. This extensionrequest wi l l i ncl uderi skmi t i gat i onst eps taken t or educeor el i mi nat et hel AVM-
44 AR 25- 2^ 24 October 2007
^anningB^000^^279
i dent i f i edri sksunt i l an acceptablesolution is implemented.Tbe extensionrequest wi l l i ncl udea POAc^M (get well
plan) to be considered in the CA risk determination.
c7. l AVM compl i ancereporti ng wi l l beaccomplished through the Army' s Ac^VTR. To meet DOD requirements,
register specific system/asset owners and SAs, including applicable electronic addresses, in Ai ^VTR.
^. Al l I AVMcompl i ance reporting of classified, tacti cal ,or operationally sensitiveISs wi l l be through the Ac^VTR
when located on the SIPRNET.
4- 25. Compl i ance ver i f i cat i on
1AVA Compliance Verification Teams (CVTs) wi l l conduct short-notice inspections of randomly selected units to
verify compliance wi th 1AVM messages.
d. Member shi pi nt heCVTmayi nc1udeaCI 0/ C6TeamChi ef ; avul ner abi l i t yscant echni ci an; U. S. Army Audit
Agency representatives, operating under AR 36^2 and AR 36^5; and U.S. Army Criminal Investigation Command
representatives operating under AR 195 2.
^. In addition to reporting requirements under AR 36-2, AR 36^5, and AR 195 2, tbe CVT wi l l report to tbe
i nspect eduni t , t beCI O/ G^, andt heSeni or Ar my Leadership.Tbe CI O/ G^ wi 11pr ovi deacopy t ot he appropriate
ACOM, ASCC, PEO, and PMCI Os
c^. Findings require a reply by endorsement on the corrective actions taken by tbe inspected command.
4- 27. Oper at i ng noncompl i ant i nf or mat i on syst em
Commanders, organi zati ondi rectorsand responsible individuals f orexampl e; DAAs, l APMs, or l AMs, wi l l operate
noncompliant assets only wi th an approved Mitigation Acti on Plan (MAP) and POAc^M. MAPs are temporary
measuresapprovedtopermi t additional time or devel opsol ut i onst obri ngnoncompl i ant assets into compliance.The
POAi ^M identifies t heget wel l pl ani ncl udi ngt heschedul e. Noncompliantassets without anappr ovedMAP wi l l be
disconnected, blocked, or otherwise have the vulnerability mitigated. Organizations and individuals operating noncom-
pliantassets areaccepti ngri sks,accountabi l i ty,andresponsi bi l i ty for intemal andextemal impacts to thenetwork in
the event tbe system is compromised or the vulnerability is exploited.
d Establ i sbacapabi l i ty to implement or effectively mitigate the risk posed by critical vulnerabilities as identified in
1AVA notifications.
^. MAPs wi l l address specific actions taken to mitigate risks identified in l AVA messages.
c. MAPs are tracked in Ac^VTR Database. Approvals and denials are granted at the appropriate DAA, DOI M,
ACERT/ A^ NOSC, and HQDA levels, and in some instances approvals are reserved only for the DCS, C 3/5/7.
c^. MAPs focus on systems not able to comply wi thi n the period specified in the 1AVA notification message.
Organizations wi l l first use all tbei ravai l abl e resources toensure vulnerable systems are patchedbefore requesting
extensions. MAPs wi l l refiect a detailed reason, operational impact statement, efforts to bring the systems into
compliance, and a mitigation strategy.
^ First MAP requests:The DAA for the I CAN may approve MAPs up to 30 days from the compliance date on the
l AVA message and includes the number of impacted systems not able to comply wi thi n period specified in the
notification message.Tbe First MAP begins the day after tbe original l AVAcompl i ance suspense and is valid for up to
30 days. Approval wi l l be based on a sound MAP that minimizes tbe risk of compromise to Army networks.
^ Second MAPrequests: This MAP wi l l be val i dupt o 60 days after tbe enddate of thel ocal DAA approved30-
daysand wi l l r ef i ect t benumber of r emai ni ngsyst emsnot able t ocompl y after t he30day approval from the local
DAA. TbeDi r ect or , NETCOM Office of Information AssuranceandCompl i ance(OI Ac^C), approvessecond MAPs
wi th ACERT/ ACNOSC A2TACrecommendati ons
^. Thi rd MAP requests:Tbe CIO/G 6approves third MAPs. They are reserved for rare cases where circumstances
have pr event edcompl i ancewi t hanl AVAdur i ng the t i mel i nesf or f i r st or second MAPs, t oi ncl udemi ssi onrequi red
legacy systems.Third MAPs begin the day after the second MAP ends and mns f or aper i od directed by tbe approval
authority, for a maximum of 2 years.
/ i . The Ai ^VTR keeps a history file of all MAP actions. Open MAPs wi l l be reviewed and revalidated wi thi n
Ai ^VTR.
1. 1f an1AVAmessagest at es: DCS, G 3/5/7approva1 only, then the MAP can only be approved by the DCS, G 3/
5/7 wi th recommendations accepted from the local DAA, the NETCOM OlAc^C Director, and the CIO/G 6.
Secti ons
Miscellaneous Provisions
4-28. vulnerability and asset assessment programs
Several Vulnerability Assessment Programs and services are available throughout tbe Army. The ACERT/ A GNOSC
providescomprehensivesupport in t hear easof CND and IA Vulnerability Assessments; t heU. S. Communications-
El ect roni csCommand(CECOM)provi desassessment sandsupport i n the areas of platforms andI A architecture; the
AR 25- 2^ 24 October 2007 45
^anni ngB^000^^2^0
Army ResearcbLaboratory (ARL)may provide support in the areas ofsurvivabi1ityandletba1ity;andC1D provides
comprehensive crime prevention surveys.
d. Al l scans will be coordinated within AOR between the initiating or oversight component and the supporting
RCERT/TNOSC
^. Prohibit scans across network segments protected by a TNOSC security router or IDS, unless specifically
coordinated and approved byNETC0M/ 9t hSC( A)
c^. Only trained or product certified personnel will use assessment software.
c^. 8efore conducting mapping or scanning ofanetwork,war dialing, or war driving, tbe l AM will notify the DOIM
and the servicing RCERT/TNOSC with the purpose, start, type and duration of the scanning activity.
^ Personnel will provide a copy of the assessment results to tbe servicing DOIM and RCERT/'TNOSC.
^ Installations that donot have the expertise,requisitecertification1evel,orresourcestoscantheirownnetworks
may request an assessment scan through their supporting RCERT/TNOSC.
^. Commanders,lApersonnel and network management personnel will treat unannounced or unauthorized scanning
of networks as potential intrusions and report when detected. Persons conducting unauthorized scans of Army networks
may be subject to administrative actions or criminal prosecution.
/i. lAMs and lASOs will establish procedures to scan their networks quarterly to identify assets; application,
network, and operating system vulnerabilities; configuration errors; and points of unauthorized access.
1. Train all IA participantson approved scanning tools andassessors will sign an acknowledgment of complete
understanding of the ^^mles of engagement" before conducting any scanning activity. For example
(1) No reading of personal data on networks while conducting a vulnerability assessment
(2) No penetration testing.
(3) No denial-of-service attacks or tests.
(4) No scanning outside local network enclave borders.
^. UtilizetheDoitYourselfVulnerability Assessment Program (D1TYVAP) to assess configurations,comp1iance,
asset identification,unautborizedconnectivity,and security vulnerabilities within local network enclave borders.DITY
VAP assessments prohibit the use of data cormption, data manipulation, data denial, examination of data content,
denial of service, or ^^hacking" and penetration tools and techniques.
^. Information Operations VulnerabilityAssessments Division (I0VAD)81ueTeam and RedTeam Programs.Tbe
1^^ 10 CMD 10VAD offers assessment support in the areas of information management and security, in which focused
efforts assess IA through the elements of OPSEC, C00P,1NF0SEC, COMSEC, and CND In addition, 10VAD Red
Teams are available to challenge and assess readiness.
7 RCERTs andTNOSCsmay conduct nonotice remote scanning across enterprise boundaries, inc1uding,butnot
limited to, 1AVM support, threat or asset identification, or vulnerable systems and services identification, with or
without coordination with commanders or lApersonnel.Assessment scanning from authorized extemal organizations is
normally conducted from documented and readily identified systems IA personnel will implement verification proce
dures to validate,but not binder or deny,these scanning activities.RCERTsand TNOSCs may block or deny access to
vulnerable systems identified during these scans until corrections have been made.
4-29. Portable electronic devices
Portable electronic devices (PEDs) are portable ISs or devices with or without the capability of wireless or LAN
connectivity.These include, but are not limited to,cell phones, pagers, personal digital assistants (PDAs)(for example,
PalmPilots, PocketPCs),1aptops,memory sticks, thumb drives,andtwo-way radios. Currenttechno1ogies(infrared,
radio frequency, voice, video, microwave) allow tbe inclusion of numerous capabilities within a single device and
dramatically increases the risks associated with IS and network access. Management of these devices will be as
follows:
d. PEDs containing wireless communicationsorconnectivity, audio, video, recording, ortransmissioncapabilities
will be probibitedfrom areas where classifiedinformationis discussed or electronically processed,unless specifically
documented in tbe Cc^A package and permitted as an exception by the DAA and all classification, access, and
encryption restrictions are enforced for the PED as they would be for a classified device.
^. Implement identification and authentication measures at both the device and network level i f connectivity is
approved. Voice does not require DOD Pl^l IA.
c^. PEDs will support PI^Ldigital certificates,FIPS,or NSAvalidated crypto modules or data encryption standards
appropriate for the classification level of the information processed.
c7. Provide all PED users with security awareness training regarding the physical and information security vul-
nerabilities and policies of the device.
^. Contractor provided or owned PEDs (i f approved) will be stated as mission essential in contracts, and will meet
all Cc^A standards and are subject to inspections and IA requirements as any other IS.
^ Employee owned PEDs are prohibited for use in official communications or connections to Army networks.
46 AR 25-2^24 October 2007
^anningB^0001^2^^
4 - 3 0 . ^ i r e l e s s l ocal area net wor ks
Wi rel essLANs areext ensi onsof wi rednet works and wi l l implement l ApoI i ci esandprocedures inaccordance wi th
this and other applicable regulations. Non-compliant wireless LANs wi l l have migration plans documented in
POAc^Ms, that ensure thesystems wi l l meet themi ni mumrequi rements of t hi spol i cy. The DAA wi l l consider the
POAc^M in tbe authorization decision. Al l Army organizations andacti vi ti es operating wireless local area networks
( WLANs) wi l l comply wi th the fol l owi ng and as supplemented in 88Ps:
d. Pilot and fielded wireless LANs and PEDs wi th LAN connectivity wi l l meet the same Cc^A and IA security
requirements as wired LAN ISs in accordance wi th this regulation, AR 380 53, AR 25 1, and DODI 8500.2.
^. DOI Ms and l AMs wi l l verify the IA Cc^A authorization of WLANs that connect to the installation.
c^. SOs wi l l configure and install wireless solutions to preclude backdoors.
d^. Where wireless LANs are implemented or proposed, thorough analysis, testing, and risk assessments must be
done to determine the risks associated wi th potentialinformation intercepts or moni tori ng,TEMPESTemanati ons, and
network vulnerability.
^. Tbe use of AV software on wireless-capable ISs and devices is required.
^ Users wi l l be authenticated to the devices authorized for WLAN.
^. DOI Msand l AMs wi l l control, monitor, andprotect wireless accessgateways wi th firewallsand IDS devices.
/ i . Certify all wireless devices procured wi th Army funds for spectrum supportability through the Mi l i tary Communi-
cations Electronics 8oard ( MCE8) per DODD 5000.1 and AR 5 12. Submit spectmm supportability requests to
NETCOM/9th SC (A), ATTN: NETC ESTV, Sui t e 1204, 2461 Eisenhower Avenue, A1exandri a,VA 22331-0200
1. DOI Msand l AMs wi l l terminate wi r e1essaccesspoi nt sat aboundar ydevi cei nt heDM^, not in tbe intemal
enclave.
^. Certify that WLAN frequencies meet any host nation or Govemment restrictions,
4 - 3 1 . Emp l o y e e - o ^ n e d i nf or mat i on syst ems
d. Prohibit tbe use of employee owned information systems (EOISs) for classified or sensitive information.
^. Theuse of anEOI S for ad-hoc(onet i me or infrequent) processi ngof uncl assi f i edi nf ormat i oni srest ri ct ed and
only permitted wi th 1AM, DAA, or commander approvaL Requirements for use and approval are included i nAR 25 1.
c^. I f approved for ad hoc use, EOISs processing official data wi l l comply wi th all security provisions of this
regulation. Computer owners wi l l i mpl ementl Acountermeasuresrequi red by thi sregul ati on,speci fi cal l y A V a n d I A
software and updates, or be prohibited from such activity. Al l processed data wi l l be removed from the EOIS and
personnel wi l l sign compliance statements that the data was removed.
c7. Include security requirements and authorized software availability for the use and safeguarding of EOISs in
security training.
^. Contractor owned and operated ISs wi l l meet all security requirements for Govemment-owned hardware and
software when operating on tbe AEI , managing, storing, or processing Army or DOD data or information, or
conducting offi ci al communications or business.
^ Scan all data processed from an EOIS before inclusion or introduction into the network.
^. Prohibit all remote access for remote management from any EOISs.
4- 32. Mi scel l aneous pr ocessi ng ec^ui pment
There is a variety of non-COMSEC approved miscellaneous process equipment (MPE) involved wi th classified or
sensitive information. This includescopiers, facsimile machines,peripherals, electronic typewriters, wordprocessi ng
syst ems, andot bers. Act i vi t i esmust identify thosefeatures,parts,or f unct i onsusedt oprocessi nf ormat i ont hat may
retain all or part of the information. Security procedures must prescribe the appropriate safeguards, in accordance wi th
AR 380 5, chapter 7 to prevent unauthorized access to either tbe information or equipment
d. Digital copiers, printers, scanners, faxes, and similar IS devices employ embedded bard-drives or other media that
may retain residual classified or sensitive information. Include these devices as part of the Cc^A process.
^. Destroy replaced equipment parts per classification level when removed.
c^. Cleared and technically qualified personnel wi l l inspect equipment before equipment removal from protected
areas.
c7. Peripheral devices (f orexampl e, printers, copiers) are subject to 1AVM compliance and accreditation.
^. Peripheral devices (for example, printers, copiers) are subject to sanitizing, purging, or disposition restrictions as
published.
AR 25- 2^ 24 October 2007 47
^anningB^0001^252
^i^a^ter 5
certification an^ Accreditation
5 - 1 . Cer t i f i cat i on and accr edi t at i on over vi ew
d. This chapter outlines the policies goveming the Information Assurance Certification and Accreditation ( l ACc^A)
of I Ss which includes networks in accordance wi th DODD 85001, DODI 85002, P. L. 100 235, 0M8Ci r c ul ar A 130,
DODD 522022, DOD 522022M, DOD 5220 22 MSUP, a n d 44 USC 3541 as it pertains to Ci ^A The goal of I A
Cc^A is to understand the vulnerabilities, determine the risk introduced through operations or connections of the
system, and provide appropriate information f or t he DAA to consider tbe IA risk in contemplating an approval to
operate decision. This section streamlines some of the process to enable those risk determinations to be made
consistently, economically and timely.
^. Cc^A policy is found in this regulation and is supported by the guidelines located in the Cc^A 88P
(1) The l ACc ^ A Process 88P.
(2) T h e I A C c ^ A D A A 8 8 P
(3) The l ACi ^ ACer t i f i cat i on Authority ( CA) 8 8 P.
(4) T h e I ACc ^ A Agents of tbe Certification Authority ( ACA) 88P
c^. Al l ISs wi 11becer t i f i edandaccr edi t edi naccor dancewi t ht he1nt er i mDI ACAPdocument i ngcomp1i ance, at a
mi ni mum, wi t ht bi sr egu1at i on, andDOD1 8500.2 l Acont r ol s associated wi th the speci f i cMACandconf i dent i al i t y
leveL Ci ^A wi l l beper f or medaccor di ngt o the type accredi tati onprocessorbytbesi te-basedaccredi tati onprocess.
Tbe IS being accredited may be considered as a single system, system of systems, enclave or network.
c7. Army DODIISsystems wi l l be certified and accredited by t h e DCS, G- 2 f o r PL 1, 2and3 inaccordance wi th
DCI D 6/3
^. Information systems currently operat i ngunderan ATO wi l l not need to redo the accreditation underthi s new
process until such time as the approval expires or is otherwise revoked.This could be the result of 3year s expiration,
annual revalidation results, caveat in the ATO, major change in tbe system, its environment or operations, or as
required by t heDI TSCAP.
^ Tactical IS mustaddress tbeir t act i cal andgarri sonconf i gurat i onandenvi ronment ( i f they i nt endt ooper at ei n
garrison on a live network or wi th live data) during the Cc^A process.
^. Tactical I St hat are subject to deployment must havea^^fi y away" package of I A information to provide to their
network service provider as required.Refer to tbe Cc^ A88P for details ont be composition of t hef i y away package.
/ i . AGovemment SO wi l l bei dent i f i ed for each I Sus edby or in support of tbe Ar my. The SOi s responsiblefor
ensuring tbe security of t hel S as long asi t r emai nsi n Army i nventory,or until transferred (temporari l yor permanent-
1y)t oanot ber Govemment personor organization and suchtransfer is appropriately documented andprovi ded as an
artifact to the accreditation package.
1. I f t he SO cannot be identified, then the IS sbouldbedeemedunnecessary andr emovedf r om Army inventory.
^'. Wbense1ecti ngsoftware,pri ori ty sboul dbegi vent o software wi th vendor integrity statements (Vl Ss)t hat verify
that vendor software wi l l not affect the integrity of operating systems when utilizecf.
^. When selecting software priority should be given to corporations that develop, manufacture and manage software
that are U.S. owned, controlled or infiuenced.
/. Foreign-Ownership, Control, or Infiuence (FOCI) wi l l be taken into account prior to software development,
integration, or purchase and identified in tbe IS Cc^A package.
BBi. Published or established NETC0M/ 9TH SC (A) CC8 and Networthiness certification requirements wi l l be
incorporated during the Cc^A process.
5-2. Certification
d. Authority and responsibility for certification is vested in the Army Federal Information Security Management Act
(FI SMA) Senior IA Officer ( SI AO) The Director OIAc^C, NETC E S T L ^ a s appointed as the FI SMASI AO by the
DAC10/ G- 6 and wi l l be tbe single Army CA. The Army CAi s tbe single authority for CA recommendations to all
Army DAAs wi th the exception of IS completing Ci ^A under the DOD1ISS Program.
/ i . The Army CAwi l l mai nt ai nal i st of qual i f i ed Govemment organizations and l abs,astrusted Agents of tbe CA
( ACA) , t oper f or mt he certification activities. Tbereimbursable ACAs are avai l abl et oprovi deSOs wi th certification
capabilities.While the lead ACAwi l l report the results of the certification activities to the CA, only tbe CAwi l l make
tbe operational IA risk recommendation to the DAA in support of an approval to operate decision.
c:^. Organizations can request appointment as an ACA by fol l owi ng the process in tbe IA Ci ^A ACA 88P.
c7. It is the responsibility of the SO to plan and budget for IS certification and accreditation efforts.
^. It is the responsibility of tbe SO to select from the approved ACA list an ACA organization that best supports tbe
program requirements, such as those of cost and schedule.
^ IA certification considers
46 AR 25- 2^ 24 Ocfobec 2007
l^anningB^000^^2^3
(1) The IA posture of t he IS itself, that is the overall reliability and viability of t he IS plus acceptability of t he
implementation and performance of I A mechanisms or safeguards that are inherent in the system itself
(2) How the system behaves in the larger information environment (for example, does it introduce vulnerabilities to
the environment, does it correctly and securely interact wi th the information environment management and control
services).
^. The ACA certification determination is based on actual results of the validation and the risk introduced by non-
compliance wi th stated requirements.
/ i . Certification represents proof of compliance wi th this regulation and tbe DODI 8500.2 I A controls for tbe
appropriate MAC level and the Confidentiality level, at a mi ni mum. Noncompl i ance wi l l require t hecr eat i onof a
POAc^M to bring tbe IS into compliance.
1. DCS, G 2 is the Service Certifying Organization for the Army DODIIS Program up to PL 4.
5- 3. Tai l or i ng
d. The time and labor expended in the Cc^A process must be proportional to tbe system mission assurance category
( MAC) level, confidentiality level, and number of users.
^. Tbe activities defined in tbe DI ACAP are mandatory. However, implementation of these activities and their
output should be tailored as appropriate and integrated wi th other acquisition activities and documentation where
applicable.
c^. Compliance wi th Information Assurance controls is not at ai l orabl e factor. Al l applicable l Acont rol s must be met
either by incorporation, inheritance, waiver or exception.
5-4. Accreditation
d. Accredi t at i oni st heof f i ci al management aut hori zat i ont o operate a n I So r network andi sbased, i npar t , ont be
formal certification of the degree to which a system meets a prescribed set of security requirements. Tbe Cc^A
statement affixes security responsibility associated wi th operational IA risk wi th the accrediting authority.
^. Accreditation must address each operational environment of t hel Sf or both fixed and deployable configurations.
For example, anI Smay operate at one confidentiality level i nast andal onemodeandconnect t oagl obal net wor kat
another confidentiality l eveLTheCc^A must clearly establish procedures for transition between tbe two environments.
Mul ti pl e operationalenvironments can result in multiple accreditations f o r a s i n g l e l Si f different DAAs are involved.
However, in t heconcept of t beoperat i onsdocument , asi ngl eaccredi t at i on thataddressesall vari ati onsi ssuffi ci enL
Refer to the Cc^A 88Ps for further guidance and procedures on IS accreditation.
c^. Site-based accreditations are appropriate f or asi ngl e unit or f o r a L AN wi th appropriately accredited ISs generally
performing similar functions wi th similar equipmenL
c^. Type accreditations are appropri at ef orl Sf i el ded to multiple users under thePEO/direct reporting PMstructure
to multiple locations. Additional1y,type accreditations are appropriate wbeneverasi ngl e office or agency is responsible
for fielding an I St omul t i pl e Army users at mul t i pl el ocat i ons. Type accreditationsmust indicate whether they area
generic accreditation of centrally fielded IS or an operational accrecfitation of IS that are procured or obtained locally,
and whether a single identifiable system or group of similar systems is covered.
5-5. Recertification and re-accreditation
d. Information systems wi l l be recertified and reaccredited once every three years.Each of tbe l ACont rol s assigned
to the information system must be revalidated. The results of validation tests of IA Controls conducted during an
annual review may be used in tbe recertification and re-accreditation of the information system i f performed wi thi n one
year.
^. Not l esst han annually, t heSOwi l l pr ov i dea writtenstatement or digitally si gnede- mai l t ot heCAt bat ei t her
confirms the effectiveness of assigned l ACont rol s and their implementation,or recommends changes or improvements
to the implementation of assigned 1Acontro1s,the assignment of addi t i onal l Acont rol s or changes or improvements to
the design of the IS i tsel f
c^. Thi sannual revalidation may beper f or medasa selfassessmenL However, a t bi rdpart y independentevaluator
must perform the validation every 3^^year, at a mi ni mum.
c^. The CA wi l l review the written statement and make a recommendation to the DAA.
^. TheDAA wi l l eval uate the recommendation,mission, and information environment indications,and determinea
course of action.
^ The DAA may use any favorable annual review to re-authorize processing under tbe current authorization
termination date ( ATD) or adjust tbe ATD f or an additional year.
^. The DAA may use any unfavorable annual review to downgrade the accreditation status to:
(1) An l ATO and reset ATD to 180 days. Tbe SO wi l l pr epar eaPOAc^Mexecut abl e wi thi n the 180 days
(2) Denial ofauthori zati on to operate (DATO). Operat i onof the IS wi l l be halted until the IS i sbrought into
compliance.
AR 25- 2^ 24 October 2007 49
^anni ngB^000^^2^^
^. The results of the annual reviews wi l l be reported i nt he Army PortfolioManagement Sol uti on,asappropri ate,
and become part of the IS accreditation package until tbe IS is decommissioned.
5- 5. Accr edi t at i on document at i on
d. The SO wi l l f or war d to the receiving ACOM/ASCC,i nstal l ati on,and/or act i vi t yDAA and appl i cabl eNETCOM
RCI O, acopy of theaccredi tati ondeci si on,supporti ngCc^Adocumentati onandCerti fi cate of Networthiness (CON).
The DAA or representative, together wi th tbe command functional user representative and NETCOM RCIO, wi l l
review tbe Cc^A package and either accept the accreditation decision as is or implement additional measures or
procedures to meet the needs of tbeir unique operating environmenL Such additional measures wi l l be appended to the
system accreditation and provided to the CAf or consideration in the operational I A risk recommendation to tbe gaining
DAA for approval in that unique environmenL
^. SCI systems wi l l not obtain a CON, but wi l l fol l ow the DCI D 6/3 requirements.
c^. There are four potential DAA accreditation decisions: ATO, l ATO, 1ATT, and DATO.
c^. The ATO decision which wi l l specify anaut hori zat i ont ermi nat i ondat e(ATD) that is wi thi n three years of tbe
authorization date.
^. Tbel ATO decision which wi l l specify an ATD that is wi thi n 180 days ofauthori zati on, limited to no more than
one l ATO extension. l ATO requests must be accompanied by a POAc^M, wi th corrective actions funded and
achievable wi thi n tbe authorization period.
^ Tbe l ATT decision which wi l l specify an ATD the is consistent wi th the completion of the tesL Tbe l ATT
establishes tbe agreed upon test duration and any special considerations or constraints.
^. The DATO decision wi l l specify and effective date. The DATO is effective until the DAA believes the IA
posture of the IS has been raised to an acceptable leveL
5- 7. Connect i on appr oval pr ocess
d. Army organizations requiring network access to the Defense Information Systems Network (DISN) wi l l preparea
CAP package requesting connection approval. Army organizations requiring network access to t heDI SN wi l l preparea
CAP forsubmi ssi on to t hepr oper DI SA l Aof f i c e. TheDI SA l Aof f i ce wi l l review the CAP package and approve/
disapprovecustomer for access t ot he DISN. Approval wi l l begr ant ed wi t han interim authority t oconnect ( I ATC)
authority to connect (ATC) letter.
/ i . I nt erconnect i onof t wo or moreenclaves requires DAA approval through MOUs or Memoranda of Agreement
(MOAs) between all DAAs. MOUs/ MOAs wi l l address interconnection requirements as outlined in DODI 8500.2.
c^. Al l IS must obtain CONas approval to connect through the Networthiness process prior to becoming operational
wi thi n the Army.
d^. An encl ave' sMAC level and security domain remain fixed during interconnection to other enclaves; they do not
i nf i at et omat cb t heMACl ev el or s ec ur i t y domai nof an interconnectingenclave. Enclaves wi th hi gher MAC levels
connecting to enclaves wi t hl ower MACl evel s are responsiblefor ensuring that the connecti ondoesnotdegrade the
availability or integrity of the higher enclave.
^. Interconnectionsthatinclude or impact t heD1SNor . I WI CS are subject t oDI SNor . 1WI CSconnect i onmanage-
ment requirements and processes.
^ Interconnections t hat cr osssecur i t ydomai nsar esubj ect t oDODpol i cyandpr ocedur esf or cont r ol l edi nt er f aces
and cross domain solutions (CDS) as appropriate.
^. Adj unctnetworks t hat rel y on the i nst al l at i onnet wor kf or NI PRNETandSI PRNETser vi ces wi l l provi detbei r
Cc^A documentation to the installation DAA for approval prior to connecting to the I CAN.
/ i . Interconnections that include or impact the .IW1CS are subject t o DI A connection approval process management
requirements.
5-8. designated approving authority
d. The DAA is vested wi th the authority to formally assume responsibility for operating an IS at an acceptable level
of risk. The DAA must weigh the operational need for the systems capabilities, the protection of personal privacy, the
protection of t he information being processed, and the protection of the information environment, which includes
protection of the other missions and business fiinctions reliant on the shared information environmenL
^. TheDAA may rely on the Army CAoper at i onal l A risk recommendation and may authorize operationtbrough
tbe approval of anATO, 1ATO, 1ATT, or deny operations t hr ougbaDATO. Absent an accreditation decision an I Si s
considered unaccredited and wi l l not be operated wi thi n or in support of the Army.
c:. A DAA may downgradeor revoke their initial Accreditation Decision any t i mer i skcondi t i onsor concems so
warrant
c^. A DAA wi l l be identified f or each information system operating wi thi n or on behalf of t he DA, to include
outsourced business processes supportedby private sector IS and outsourced IT (f orexampl e, Govemment owned.
Contractor Operated (COCO) and Contractor Owned, Contractor Operated (COCO).
^. DAA responsibility must reside wi th tbe organization that maintains funding, management and operational control
50 AR 25- 2^ 24 October 2007
^anningB^000^^2^5
over tbe I Swhi l e in development, and once deployed, as applicable.In the instance of type accreditation these may be
different organizations but wi l l have documented MOUs when the transfer is made.
^ T h e CI O/ G^ wi l l remain the DAA for Army informationsystems, wi th tbeexcepti on of Army SCI systems.
^. Tbe CIO/C 6 wi l l appoint in wri ti ng, or di gi t al l y signed e mai l , all Army DAAs wi th the exceptions noted
below. Existing appointments or delegations wi l l become invalid wi thi n 90 days of the approval date of this AR 25-2
Cc^Aupdate. Requestsfor appointment must besubmi t t edt ot heOI Ac^Cf or pr ocessi ngdur i ngt heset hr eemont bs.
DAA responsibility can be assigned t oaposi t i on i nt he organization; however, appointments wi l l always be to named
individuals. DAA appointment wi l l be for specific named systems or networks. TheOI Ac^C, NETC EST IC, wi l l
coordinate the DAA appointments on behalf of t he CI O/ G^ .
/ i . Al l DAAs wi l l be at tbe General Officer, Senior Executive Service or equivalent level regardless of the
confidentiality l evel at whi cht hel S operates.This appointment wi l l not bef ur t her cl el egat edor appoi nt eddownwar d
except as noted below or as approved by the CIO/C 6.
1. Al l DAAs wi l l beUS. ci t i zens, DOD empl oyees, hol daU. S. Govemment security clearance and formal access
approvals commensurate wi th the level of information processed by the IS under tbeir jurisdiction, or a Secret
clearance, which ever is higher.
^ Al l DAAs wi l l baveal evel of authority commensurate wi th accepting in wri ti ng the risk of operating DA IS
under their purview.
^. Al l DAAs wi l l complete I A training consistent wi th tbe Ar myTr ai ni ng88P. Acopy of the completion training
certificate must be provided to CI O/ C^ through the OIAc^C prior to assuming DAA duties.
7 DAAappoi nt ment must ber equest edof t beCI O/ C 6. Requests for appoi ntmentsshoul dbeconsi stent wi t ht he
fol l owi ng examples when compliant wi th 5 8/i through ^, above:
(1) The Commanding Cener al ( CG) , NETCOM f or t he Army enterprise wi th the authority to appoint tbeDi rector
NETCOM ESTA for the Army enterprise.
(2) PEOs or direct reporting PM for acquisition systems developed under their charter except as noted below.
(3) Principal Army Staff officers for Army Staff unique systems that remain under that office' s control and
management after deployment, except as noted below.
(4) CAR for t heUSAR, wi t h the authority to appoint t b e USARCOSf o r the ARNET.
(5) Chief, ARNG for the ARNC and CuardNet XXL wi th tbe authority to appoint ARNG state D0I M/ ^6/ CI 0 for
individual states, as appropriate.
(6) The AASA ast he ACOM/ ASCCcommander f or Pent agonl TS, t o i ncl udel Sconnect edt ot hePent agonCI T
enterprise, associated swing space, and altemate COOP sites through the national capital region (NCR) wi th the
authority to appoint those GO, SES or equivalent wi thi n AASA purview that are tbe SOs or have life cycle
responsibility for tbe IS, as appropriate.
(7) Tbe MEDCOMCommander , wi t b the authority to appoint the MEDCOM RMC/MSC Commanders for medical,
dental and veterinary activities and treatment facilities, as appropriate.
(8) Tbe USACE CIO for tbe USACEWAN and corporate 1S,wi th the authority to appoint the USACE Division
Commanders for USACE IS, as applicable.
(9) The Commander USAREUR, wi th the authority to appoint DAAs for tenant and MSC commanders wi thi n
USAREUR, as appropriate.
BBi. The fol l owi ng Cc^A DAA positions remain in place:
(1) Tbe C1 0 / G^ for Army Special Access Programs.
(2) Tbe C1 0 / G^ for classified systems developed by DA staff agencies.
(3) Tbe D C S , G 2 f o r DODI I S processing SCI at Protection Level 1 , 2 , a n d 3
(4) The Director, National Security Agency for cryptographic solutions used to protect classified information.
(5) Tbe Director, .loint Staff is the DAA for systems that process SIOP ESI data.
(6) Commander, I NSCOM for signals intelligence (SIGINT) systems wi thi n the Army.
Bl. Questions conceming DAA requests or appointmentsshould be di rect edt ot he01Ac^Cat i acora(^us. army. mi L
d. DAAs may assign members of their staff to act as tbeir representative during the Cc^A process. However,
signature authority wi l l r emai nwi t ht bei ndi vi dual appoi nt ed by the CI O/ C^ . Following tbe chain of command the
DAAma y aut hori zeamember of his/her staff t o^^si gnf or " hi m/ her , but the si gnaturebl ockandresponsi bi l i ty wi l l
r emai nwi t ht heC10/ G6appoi nt ed individuaL Acopy of the authorization memo wi l l be submitted to the CIO/C 6
through iacora(^us.army.mil.
5-9. Lead agent of t he certification authority
d. Lead ACA and ACA organizations wi l l be designated by tbe CA through tbe process documented in the l ACc^A
A C A 8 8 P
^. The lead ACA wi l l be, at a mi ni mum, a Govemment employee, a U.S. citizen, at least a LTC, GS 14, or
equivalent, and be appropriately cleared (Secret at a mi ni mum). Refer to tbe ACA 88P for furtberdetai l s.
c^. The lead ACA wi l l be responsible f orpreparat i on, p1anni ngand conducting tbe certification testing.
AR 25- 2^ 24 October 2007 51
^anningB^000^^2^^
c7 Tbe reimbursable ACA wi l l perform the fol l owi ng, at a mi ni mum;
(1) Prepare I A Certification Event Test Plans.
(2) Conduct IA Certification Test Events and STE as appropriate.
(3) Prepare IA Certification Test Event Reports.
(4) Prepare I A Scorecards.
(5) Prepare I A Risk Assessments from tbe IA Certification Test Event findings, at a mi ni mum.
(6) Provide t hel Acer t i f i cat i on results and any supporting documentation to the Army CAf o r consideration in tbe
IA operational risk recommendation.
^. ACA organizations may perform other functions as negotiated by the SO.
^ The ACA concept does not apply to DODIIS and SIGINT systems. Certification of these systems wi l l be
conducted in accordance wi th DCI D 6/3.
5-10. System o^ner
d. AGovemment SO wi l l be identified for eachl Susedbyor in support of the Ar my. Tbe SOi s responsiblefor
ensuring the security of the IS as long as it remains in Army inventory, or until transferred (temporarily or permanent-
l y) to another Govemment person, organization or agency, and such transfer is appropriately documented and provided
as an artifact to the accreditation package.
^. Tbe SO is responsiblefor tbe certification and accr edi t at i onof t hel S and wi l l pr ovi de tbe Cc^Apackage t ot he
Army CAi nsuf f i ci ent t i mef or r evi ewand determination of oper at i onal l A risk recommendat i oni nsupport of DAA
approval to operate decision prior to operational use or testing on a live network or wi th live Army data.
c^.The SO wi l l ensure that the Cc^A package and the SSAA are provided to the ACOM/ ASCC, RCIO l APM, and
NETCOM prior to lOTc^E on/or before deployment of the system.
d^. I f tbe SO can not be identified, then tbe IS should be deemed unnecessary and removed from the Army inventory.
^. It is the responsibility of the SO to plan and budget for IS certification efforts.
^ It is the responsibility of the SO to select the ACAt hat best supports his requirements,such as those of cost and
schedule.
^. Not l esst hanannual l y all SO wi l l pr ovi dea wri t t enst at ement ordi gi t al l y si gnede-mai l to the Army CA that
either confirms the effectiveness of assigned l ACont r ol s and their implementation,recommends changes or improve-
ments to the implementation of assigned l Acont rol s, or assigns additional l Acont rol s, changes or improvements to the
design of tbe IS itself
/ i . The system owner wi l l forward to the receiving ACOM/ ASCC, installation and activity DAA a copy of t he
accreditation decision, supporting Cc^A documentation and CON.
Oi ^a^t er^
Communications securi ty
5-1. Communications security overview
This chapter provides DA policy for tbe acquisition, implementation, and life cycle management of cryptographic
systems, products, and services used to protect sensitive and classified national security information, systems, and
networks. Al l tactical ISs are considered critical to the direct ful fi l l ment of military or intelligence missions, and
therefore are regarded as national security systems. Wi th the exception of those systems approved by NSA and
endorsedby HQDA CIO/C 6, at no time wi l l U.S. classified national security information be protected by foreign
cryptographic systemsor product s, orbyaNI ST/ N1APcommoncri t eri at est i ng1aborat oryeval uat edproducL Excep-
tions wi l l be reapproved on an annual basis. Use of any unapproved product toprotect classified national security
information wi l l beconsidered asa reportablecommunications security incident under AR 38040, paragraph 7 3^
d. 7^B^c^^^c^^idBicj^c:'/d.^,^i^^d^iBi^B^BBid/idBidBic7.^^.^^^BBi,^^/i^^/i^B^Bid^
approvedcryptographic systems wi l l be used to protect classified nationalsecurity information and national security
systems.
(1) Classified national security information wi l l be protected in transmission by NSA approved cryptography.
(2) Tactical information systems wi l l be protected by NSA approved cryptography.
(3) Requirements for NSA-approved cryptographic systems wi l l be identified and validated in the AI AP and
managed by tbe Army OlAc^C.
(4) NSA cryptographic systems wi l l be centrally acquired and managed by the CSLA.
(5) Only keying material produced by NSA or generated by NSA-approved key generators wi l l be used to key
cryptographic systems that protect classified national security information.
(6) Al l cryptographic systems employed in the tactical force stmcture that protect classified national security
52 AR 25^2^24 October 2007/RAR 23 March 2009
^anningB^000^^2^7
information must be Army Electronic I^ey Management System/I^ey Management Infrastmcture (EI^MS/I^MI) compli-
anL Each approved cryptographic system wi l l have a NSA approved key management plan.
^. T^B^d^^c^/idBi cj^ iiBic^/d.^.^i^^d^dBid^.^^Bi.^1'^1'^^ I'Bi^B^BBid^idBi dBic7,^^.^^^BBi,^. NI ST/ NI AP approved cryptographic systems
wi l l only be usecf to protect Unclassified or Sensitive information. NI ST/ NI AP approved cryptographic systems or
foreign cryptographic systems t obeempl oyedi nt het act i cal f or ce stmcture wi l l be approvedonacase-bycase basis
by the HQDA CI O/ G^ . Company and 8e1ow Units may use NI ST/ NI AP approved cryptographic systems for
protecting Non Mission/Non Operational unclassified or sensitive information. Cryptographic systems or products
intended for the protection of unclassified or sensitive information or systems wi l l
(1) 8e evaluated by a N1AP/CCEVS approved Common Criteria Test Lab (CCTL) against a U.S. Government
Protection Profile for medium robustness environmenL
(2) 8e validated under the NIST Cryptographic Modul eVal i dati on Program (CMVP) t hat , at ami ni mum meet,level
2 security requirements of the Federal Information Processing Standard 140^2 (FIPS 14(^2).
(3) Products that exceed mi ni mum FIPS 140^2 security requirements and common criteria evaluation assurance
levels wi l l be given preference when considered for procuremenL
(4) NIST-approved cryptographic systems intended to protect unclassified sensitive information wi l l be identified in
the Al APand managed by tbe Army OlAc^C. Funding for these systems wi l l be the responsi bi l i tyof the organization
or activity identifying the requiremenL
(5) Al l NI ST/ NI AP approved cryptographic systems wi l l be centrally acquired and managed through CSLA.
(6) EacbNI ST/ NI AP- appr ovedcr ypt ogr aphi csyst emwi l l baveakeymanagement pl an that describes i ndet ai l all
activities involved in the handling of cryptographic keying material f or t he system, including other related security
parameters (such as IDs and passwords). The plan wi l l describe accountability over the keying material over the entire
life cycle of tbe system's keysfromgenerati on,storage,di stri buti on, and entry i nt ot hesyst emt hroughuse, del et i on,
and final destruction.
c^. T^d^d i5'Bic:B^^^idBi ,^^dBic7dB^c^ (7^^,^. Al l implementations of FIPS 46-2 DES are prohibited wi thi n tbe Army.
c^. ^d^^dBic^^d^ ^Bic^r^^^idii ,^^dBid^dB^c^(Bf^,^ Tbe implementation of AES in products intended to protect classified
nationalsecurity information and systems must be reviewed and certified byNSA, and approved by HQDACI O/ G^
prior to their acquisition through CSLA.
^. 7^11^/ic ^^^c^B^^^d^B-d^/i^ Systems that employ public key (asymmetric key) technology to protect unclassified
sensi ti veorcl assi fi ednati onal securi ty information and systems wi l l be approved by the CI O/ G^ . Asymmetri ckeys
wi l l be obtained through authorized DOD or Army certificate authorities operating under current DOD approved
Certificate Practice Statements.
^ ^^^B^diB^d^ CB^^/d^B'd^^ic^ .^.^/^BBi.^ dBid^^/^dB^i^/iBBi.^. The CSLA wi l l maintain a list of approved cryptographic
syst emsandal gor i t hmsf or usei nt be Army. Al l cryptograpbi c products must be procured through CSLAt o be valid
f or useon an Army system. CSLAmanaged Army ApprovedProduct List (APL) i savai l abl eby calling t heCSLA
customer support help desk at 1 800^62 2123 or from the CSLA Web page (when established).
5- 2. Pr ot ect ed di st r i but i on syst ems
d. Aprot ect eddi st ri but i on system(PDS) wi l l beusedonl y i f cost ef f ect i veand sufficiently cont rol l edt oprevent
covert penetration and interception.
^. Any IS that i ncl udesaPDS to transmit data wi l l not be operationally accredited until the PDS has been approved.
5- 3. Appr oval of pr ot ect ed di st r i but i on syst ems
d. PDSsmust beconst mct ed per criteria contained i nNSTI SSI No. 7003 and supplemented wi t bl Apr ocedur esi n
this regulation.
^. Authority to approve a PDS for the clear text transmission of classified information wi thi n fixed plant and
garrison installations is delegated as follows:
(1) Principal HQDA officials for activities under their staff supervision, direction, or controL
(2) Garrison commanders for tbeir organic activities.
c:. Requests for approval of aPDS to transmit TS information must include an evaluation by tbe appropriate support
elemenL Approval authorities may request technical assistance from I NSCOM, 902nd Ml Group, Fort Meade, MD
20755, in applying security criteria and processing the approval action for other PDSs.
d^. Commanders of battalion and higher echelons may approve circuits for clear text electrical transmission of
SECRET and CONFI DENTI AL information in tactical environments. Under combat conditions, commanders may
delegate thi sauthori ty to thecompany leveL Tactical PDSs wi l l not be approvedfor clear t ext t r ansmi ssi onof TS
information.
^. Once a PDS hasbeenapproved, no changes in installation, additions, or use may bemadeunt i l the approval
authority has granted approval for such changes.
^ Requests to approveaPDS wi l l be submitted through channels to the i nst al l at i onl AM and DAA.Requests wi l l be
classified at least CONFI DENTI AL and wi l l contain the fol l owi ng information:
AR 25-2 24 October 2007/RAR 23 March 2009 53
ManningB_00016288
(1) Full identification and location of t he requesting organization.
(2) A statement of the classification of information to be transmitted on tbe PDS.
(3) A copy of the building fioorplan ( or a diagram of t he field area as appropriate) designating the fol l owi ng:
(d) Proposed cable route and l ocat i onof subscriber sets,di stri buti onframes,j uncti onboxes,and anyot hercompo
nents associated wi th the circuiL
(^^ Other wi ri ng along the PDS route.
(4) Descr i pt i onof t becabl e insta11ation(for example, 24pai r sof sbieldedcable i nr i gi dst ee1condui t , 6pai r sof
shielded cable in fioor, or fiber optic cable). Indicate the cable length.
(5) Description and nomenclature of terminal and subscriber equipment to be used.
(6) Clearance of individuals having access to the circuiL
(7) Type of guards (for examp1e,U.S.mi 1i tary,U.S.ci vi l i an, foreign ci vi l i an)and their security clearance or access
authorization status.
(8) Descri pt i onof accesscont rol and surveillance of uncl earedpersonnel whomay be al l owedent r yi nt ot he area
housing any part of the PDS.
(9) I dent i f i cat i onof the power sour cet obeused for t hePDSandast at ement of the di st ancet ot he nearest point
where undetected tampering woul d be possible.
(10) A justification for using tbe proposed PDS.
(11) Ast at ement concemi nganydevi at i onsf r omt beest abl i shedPDScr i t er i a and aneval uat i onof their security
implications.
(12) For PDSs to be used wi th TS information, a copy of the security evaluation.
(13) The request and approval must become part of the Cc^A package.
5- 4. Ra d i o s y s t e ms
d. Protect all voice or data military radio systems and COTS-implemented cellular or wireless communications
devices and services to tbe level of sensitivity of the information.
^. Use electronic,auto-manual,or manualcrypto-systems to provide the needed security for existing radio systems
that donot have embeddedorel ectroni ccrypto-systems. However, al l future pr ocur ement smust compl ywi t bpar a-
graph 6^1, above.
c^. Prohibit the use of commercial non-encrypted radio systems in support of command and control functions.
c7. Radiosused for publ i csafety communications wi t hci vi l agenci es or to communicate onci vi l avi at i onchannel s
are excl udedf r omt her equi r ement sof par agr aphsdand^, above. Thi s excl usi ondoesnot apply to communications
dealing wi th aviation combat operations.
5- 5. Tel ecommuni cat i on devi ces
d Al l personnel are prohi bi t ed f r om using Government-owned receiving, t ransmi t t i ng, recordi ng, and ampl i ^
fi cati on telecommunications equi pment i n restri cted areas^ such as classified wor k areas, mission essential
vul nerabl e areas ( ^ ^ VAs ) , or staging areas before deployment unless authori zed in wr i t i ng by the commander
Tbe DAA remains the accreditation authority for telecommunication devices in restricted areas.
^. Al l personnel wi l l use NSA or CI O/ G- 6 approved secure telephones to discuss classified information
telephonically.
c^ Al l personnel are prohi bi t ed f r om possessing or using any pri vatel y owned Pl^f^ (for example, cell phones,
T ^ ^ ^ ) wi t hi n the confines of classified, restri cted, or open storage areas designated by the commander
^I ^a^t er ^
l^isi^ l^ana^ement
^ - 1 . Risk management process
d. Absolute confidence in the information accessed or available in tbe Army enterprise is unachievable; as such, the
Army and DOD wi l l approach increasing that level of tmst through tbe implementation of ar i sk management process.
Wi t h technological advances and capabilities, training, and lA-focused processes to reduce identifiable threats, the level
of tmst of information and ISs is significantly increased. Establ i shari sk management process containing the fol l owi ng
phases as ami ni mumf or all ISs. Thepr ocessout l i nedi nt hi s chapter i sbased, i npr i nci pl e, ont ber i skmanagement
doctrine as defined by FM 5 19
(1) Identify threats such as those posed by default designs or configurations, architecture deficiencies, insider access,
and foreign or nation-state interests, ownership and capabilities.
(2) Assess threats to determine risks,
(d) What information is accessib1e7
54 AR 25^2^24 October 2007
l^anningB^000^^289
(7i^ What information will be stored electronically and secured, for example self generated, prototype, research and
development, electronic forms and documents, calendars, operational logs7
(c^ What will be the stored format of t he information and the naming or identification mechanism7
(d^ Who has authorization to access and share the information7
(i^^ What is tbe potential adverse effect of loss, access, or manipulation of tbe data7
(/^ What are the OPSECissues ofdata availabi1ity7
What are tbe data owner's requirements and length of required storage or access7
(^^ What legacy operating systems or applications are required for stored information7 What hardware is required to
access and read the storage mediae
(i) What are tbe backup and disaster recovery plans7
(^^ What is the plan to migrate legacy data to current application capabilities7
(3) Develop controls and make risk management decisions. How do you protect the information access, and
infrastructure7
(4) Implement controls, countermeasures, or solutions. Choose the correct IA tools, controls and countermeasures to
defend against adversarial attacks on IS and networks.
(5) Implement a capability to monitor for compliance and success.
(6) Supervise, evaluate, review, and refine as necessary.
^. Commanders,Directors,combatdeve1opers,andmaterie1deve1opers will integrate the risk management process
in the planning, coordination, and development of ISs.
c^. Reevaluateandreissueanyriskanalysesandmitigationsplansif there isasuccessftilcompromiseofan IS or
device.
d^. Telecommunications systems that do not include tbe features normally associated with an IS and that handle
classified or sensitive information will be implemented and operated in conformance with tbe risk management process.
7-2. Information operations condi ti on
The lAPM or the command'sseniorIA person is responsible for coordinating an INFOCON plan.The LNFOCON i sa
Commander's Alert System that establishes auniform DOD and Army process forposturinganddefendingagainst
malicious activity targeting DOD ISs and networks. The countermeasures at each level will be available when
publisbedor asdirectedby thecombatant command when the command is an ACOM/ASCC. Ifthere is a confiict
between Army and combatant command directed measures, those of the combatant command take precedence. Typical
countermeasures include preventative actions and actions taken during an attack as well as damage control and
mitigation actions.
AR 25^2^24 October 2007 55
^anningB^000^^290
A^^en^i x A
l^eferences
Section I
Rei^uired Publications
A l ^ 2 ^ l
Armyl ^nowl edgeManagement and Informati onTechno1ogyManagemenL(Ci ted in paras 1 5^ 13) , 2 1.^,2 8/, 3-3^',
3 3 / , 4 - 5 d , 4 - 2 0 c ^ , 4 - 2 0 ^ , 4 - 2 9 d , 4 - 3 0 ^ )
Al ^ 3^ 0^ 5
Depart ment of t he Army Information Security Program.(Cited in paras 4- 5d( 7) , 4^5, ^( 10) ( b) 3, 4- l l d, 4- l l c^, 4^16d,
4- 16^, 4- 17c^, 4- 32)
Al ^ 3^ 0^ ^ 3
Information Systems Security Moni tori ng. (Cited in paras 4-5Bii(6), 4-29d.)
D A P a m 2 ^ l I
Information Technology Support and Services. (Cited in para 4^5i.)
Section II
Related Publications
Arel at ed publication is merel yasource of additional i nformati on.The user does not have to read it to understand this
regulation.
A I ^ ^ I 2
Army Management of tbe Electromagnetic Spectrum
A l ^ l ^ ^
Procedures for Investigating Officers and 8oards of Officers
A l ^ 2 ^ ^ 5
The Department of the Army Freedom of i nf or mat i on Act Program
Af ^ 36^ 2
Audi t Services in the Department of tbe Army
A l ^ 7 0 ^
Army Acquisition Policy
A l ^ f 9 0 ^ ^
Law Enforcement Reporting
A I ^ I 9 l ^ 5 t
Security of Unclassified Army Property (Sensitive and Nonsensitive)
A I ^ I 9 ^ 2
Criminal Investigation Activities
A I ^ 2 I ^ I
Mi l i tary Morale, Welfare, and Recreation Programs and Nonappropriated Fund Instmmentalities
Al ^ 340^21
The Army Privacy Program
Al ^ 3^0^10
Foreign Disclosure and Contacts wi th Foreign Representatives
A l ^ 3 ^ 0 ^ 0
Policy for Safeguarding and Controlling Communications Security (COMSEC) Material
56 AR 25- 2^ 24 October 2007
^anni ngB^000^^29^
A l ^ 3 ^ 0 ^ 9
Industrial Security Program
A l ^ 3 ^ 0 ^ 7
Tbe Department of the Army Personnel Security Program
A l ^ 3 ^ l 10
U.S. Army Intelligence Activities
A l ^ 3 ^ l I I
Intelligence Support to Capability Development
Al R3^ f 14
Technical Counterintelligence (TCI)
Al ^ 3^ 120
The Army Counterintelligence Program
A I ^ ^ 2 ^ I 3
Antiterrorism
Al ^ ^ 3 0 ^ l
Operations Security (OPSEC)
A l ^ 6 0 ^ l
Army Community Service Center
I ^ A P a m 2 ^ l 2
Information Technology Contingency Planning.
Chai r man of the .foint Chiefs of Staff I nst ruct i on ^221.018
Delegation of Authority to Commanders of Combatant Commands to Disclose Classified Mi l i tary Information to
Foreign Govemments and Intemational Organizations. (Available at http://www.dtic.mil/cjcs directives/.)
Chai r man of the .foint Chiefs of Staff I ^anual 65f 0. 0f
Defense-in Depth: Information Assurance (I A) and Computer Network Defense (CND). (Available at http://
www.dtic.mil/cjcs directives/.)
Common Cri t eri a Eval uati on and Val i dat i on Scheme (CCEVS)
(bttp://niap.babialab.com/cc scheme/)
Commi ttee on Nati onal Security Systems (CNSS) Instructi on 4012
Operation of tbe Defense Acquisition System. (Available at http://www.cnss.gov/instmctions.html.)
1^01^5200.2 1^
Personnel Security Program. (Available at http://www.dtic.mil/whs/directives.)
1^01^5220. 221^
National Industrial Security Program Operating ManuaL (Available at http://www.dtic.mil/whs/directives.)
1^O1^5220. 221^^UP
National Industrial Security Program Operating Manual SupplemenL(Available at bttp://www.dtic.mil/whs/directives.)
1^01^5400.7 1^
DOD Freedom of i nf or mat i on Act Program. (Available at http://www.dtic.mil/wbs/directives.)
0 0 0 5500. 71^
.loint Ethics Regulation (.lER). (Available at http://www.dtic.mil/whs/directives.)
AR 25- 2^ 24 October 2007 57
^anningB^000^^292
1^00^510.11^
Department of Defense Information Technology Security Certification and Accreditation Process (D1TSCAP)
Application ManuaL (Available at bttp://www.dtic.mil/whs/directives.)
OOOOi r ect i ve 5000.1
The Defense Acquisition System. (Available at http://www.dtic.mil/whs/directives.)
OOOOi r ect i ve 5220.6
Defense Industrial Personnel Security Clearance Review Program. (Avai l abl eat http://www.dtic.mil/whs/directives.)
DOOOi r ect i ve 5220.22
DOD Industrial Security Program. (Available at http://www.dtic.mil/whs/directives.)
OOODi r ect i ve 5230.9
Clearance of DOD Information for Public Release. (Available at http://www.dtic.mil/wbs/directives.)
OOOOi r ect i ve 5230.11
Di scl osureof Classified Mi l i tary Information to ForeignCovemments and Intemational Organizations. (Avai l abl eat
http://wvyw.dtic.mil/wbs/directives.)
OOODi r ect i ve 5230.25
Wi thhol di ng ofUncl assi fi edTechni cal Data From Public Disclosure.(Available at http;//ww^.dtic.mil/whs/directives.)
OOOOi r ect i ve ^100.2
Use of Commercial Wireless Devices, Services, and Technologies in tbe Department of Defense (DOD) Global
Information Gri d (GIG). (Available at http://www.dtic.mil/whs/directives.)
OOOOi r ect i ve ^500. 01^
Information Assurance. (Available at bttp://www.dtic.mil/whs/directives.)
OOOOi r ect i ve ^570.01
Information Assurance ( I A) Training, Certification, and Workforce ManagemenL (Available at http://www.dtic.mil/
whs/directives.)
OOOI nst r uct i on 3020.41
Contractor Personnel Authorized to Accompany the U.S. Armed Forces. (Available at http://www.dtic.mil/whs/
directives.)
OOOI nst r uct i on 5000.2
Operation of tbe Defense Acquisition System. (Available at http://wwrw.dtic.mil/whs/directives.)
OOO1nst r uct i on 5200.40
DOD Information Technology Security Certification and Accreditation Process (DITSCAP). (Available at http://
www.dtic.mil/wbs/directives.)
OOOI nst r uct i on ^100.3
Department of Def ense (DOD) Voice Networks. (Available at bttp://www,dtic.mil/whs/directives.)
OOOI nst r uct i on ^110.1
Multinational Information Shari ngNetworks Implementation. (Available at bttp://www.dtic.mil/wbs/directives.)
OOOI nst r uct i on ^500.2
Information Assurance ( I A) Implementation. (Available at http://www.dtic.mik/whs/directives.)
f ^OOI nst r uct i on 8551.1
Ports, Protocols, and Services (PPSM). (Available at http://www.dtic.mil/whs/directives.)
OOOI nst r uct i on 1015.10
Programs for Mi l i tary Morale, Welfare, and Recreation. (Available at http://www.dtic.mil/wbs/directives.)
56 AR 25- 2^ 24 October 2007
^anningB^0001^293
di r ect or , Cent ral Intelligence Agency l^ireetive 1/7
Security Controls on tbe Dissemination of Intelligence Information. (Available at bttp://www.cms.cia.sgov.gov/dci/
policy/dcid/default.htm.)
I^irector, Cent ral Intelligence Agency Oirective 5/6
Intelligence Disclosure Policy. (Available at http://www.cms.cia.sgov.gov/dci/policy/dcid/default.htm.)
Oefense Intelligence Agency l ^anual 5 0 ^
Security of Compartmented Computer Operations. (Information may be obtained from the Defense Intelligence
Agency, 200 MacDi l l 81vd, 81dg 6000, 8ol l i ngAF8, Washi ngt on, DC 20340 )
Di rector, Cent ral Intelligence Agency Oirective 6/3
Protecting Sensitive Compartmented Information wi thi n Information Systems. (Available at http://
www.cms.cia.sgov.gov/dci/policy/dcid/defau1t.htm.)
OOO l ^emo, .fuly 06, 2006, Sub^ect^ I nt er i m Oepartment of Defense ( DOD) I nf ormat i on Assurance ( I A)
Cert i f i cat i on and Accredi tati on (Cc^A) Process Guidance
(Available at https://diacap.iaportal.navy.mil.)
I^xecutive Or der 12356 ^
National Security Information
Eederal I nf ormat i on Security l ^anagement Act of 2002
Section 3541 of title 44, United States Code. (Available at http://csrc.nist.gov/policies/HR2458-fina1.pdf.)
I^ederal I nf ormat i on Processing Standards Publ i cati on 46^2
(http://www.it1.nisLgov/)
l^ederal I nf ormat i on Processing Standards Publ i cati on 140^2
Security Requirements for Cryptographic Modules. (Available at bttp://www.iti.nist.gov/.)
1^i el dl ^anua1313
Information Operations: Doctrine, Tactics, Techniques, and Procedures
l ^i el dl ^anual 5^19 ( 10014)
Composite Risk Management
.loint DODI I S
Cryptologic SCI Information Systems Security Standards. (Available at http://www.nmic.navy.smil.mil/onihome-s/
security/sso navy/policyNpubs/jdcsisss/jdcissi-r2.html.)
.IP 1^ 2
.loint Publication, Department of Def ense Dictionary of Mi l i tary and Associated Terms
. 1 TAA
.loint Technical Architecture Army. (Available via AI^O at https://www.us.army.mil.)
NSA/ CSSl ^ a n u a l 1 3 0 1
Operational Information Systems and Networks Security Policy
NSA/ CSSl ^ a n u a l 1 3 0 2
Media Declassification and Destmction Manual
NI ST Special Publ i cati on 800^ 4 I^EV.1
Security Considerations in tbe Information Systems Development Li f eCycl e (http://csrc.nist.gov/pub1ications/nistpubs/
800^64/NISTSP800 64pdf )
NSTISSINo.4012
National Training Standard for Designated Approvi ng Authority ( DAA) . (Available at http://www.cnss.gov/
instmctions.html.)
AR 25- 2^ 24 October 2007 59
^anningB^000^^29^
NSTISSINo.4015
National Training Standard for System Certifiers. (Available at http;//www.cnss.gov/instmctions.btm1.)
NSTISSINo.7003
Protective Distribution Systems. (Available at http://www.cnss.gov/instmctions.htm1.)
NST1SSPNo.11
National Information Assurance Acquisition Policy. (Available at http://w^vw.cnss.gov/instmctions.btmI.)
Office of l^anagement and budget Circular A 130
Management ofFederal Information Resources
Public Law 100 235
Computer Security Act of 1987
Public 1^aw 107 314
8ob Stump National Defense Authorization Act for Fiscal Year 2003
1^ul ef orCourt sl ^art i al 303
Preliminary inquiry
UCl^.1
Uniform Code of Military .lustice
5USC 552a
The Privacy Act of 1974
22 USC 2551
Congressional statement of purpose
22 USC 2751, et. seq.
Arms Export Control Act
44 USC 3541
Information security; Purposes
1^CSCS11V162
MDEP M54X Report
Section III
Prescribed Porms
This entry has no prescribed forms.
Sect i onI ^
Referenced Porms
DAFormsareavailableonthe Army Publishing Directorate Web site (www.apd.army.mil): DDForms are available
from the OSD Web site (http://www.dtic.mil/whs/directives/infomgt/forms/formsprogram.htm). SFs and OFs are availa-
ble from the GSA Web site (http://www.gsa.gov).
DA1^ or m1121^
Management Control Evaluation Certification Statement
DA1^orm 202^
Recommended Changes to Publications and 81ank Forms
DD1^orm254
DOD Contract Security Classification Specification
S1^85P
Questionaire For Public Tmst Positions
60 AR 25-2^24 October 2007
^anningB^000^^295
S1^^6
Questionaire For National Security Positions
S1^32^
Certificate Pertaining to Foreign Interests
A^^en^i x 8
Sample Acce^tal^ie l^se pol i cy
8 - 1 . Purpose
This appendixprovidesasample AUP that may be used byorganizationstoobtainexplicitacknowledgementsfrom
individuals on tbeir responsibilities and limitations in using ISs.
8-2. Explanation of conventions in sample acceptable use policy
Figure8-1,below,illustratesarepresentative AUP.Inthi s figure,text appearing initalicized font should be replaced
with the appropriate information pertinent to the specific AUP being executed. Army organizations may tailor the
information in the sample AUP to meet their specific needs, as appropriate.
AR 25-2^24 October 2007 51
i ^anni ngB^000^^298
Acceptable Use Policy
1. Understanding. I understand that I have the primary responsibility to safeguard the
information contained in classified network name (CNN) and/or unclassified network name (UNN)
from unauthorized or inadvertent modification, disclosure, destruction, denial of service, and use.
2. Accass. Access to this/these network(s) is for official use and authorized purposes and as set
forth in DoD 5500.7-R, "Joint Etfiics Regulation" or as further limited by this policy.
3. Revocabillty. Access to Army resources is a revocable privilege and is subject to content
monitoring and security testing.
4. Classified information processing. CNN is the primary classified IS for [insert your
organization). CNN is a US-only system and approved to process (insert classification) collateral
information as well as; (insert additional caveats or tiandling instructions). CNN is not authorized
lo process [insert classification or additional caveats or special tiandling instructions).
a. CNN provides communication to external DoD (or specify ottier appropriate U.S,
Government) organizations using Ihe SIPRNET. Primarily this is done via electronic mail and
internet networking protocols such as web, ftp, telnet (insert others as appropriate).
b. The CNN is authorized for SECRET or lower-level processing In accordance with
accreditation package number, identification, etc.
c. The classification boundary between CNN and UNN requires vigilance and attention by all
users. CNN is also a US-only system and not accredited tor transmission of NATO material.
d. The ultimate responsibiity for ensuring the protection of information lies with the user. The
release of TOP SECRET information through the CNN is a security violation and will be
investigated and handled as a security violation or as a criminal offense.
5. Unclassified Infomiation Processing. UNN is the primary unclassified automated
administration tool for the [insert your c^anization), UNN is a US-only system.
a. UNN provides unclassified communication to external DoD and other United States
Government organizations. Primarily this is done via electronk; mail and internet networking
protocols such as web, ftp, telnet (insert others as appropriate).
b. UNN is approved to process UNCLASSIFIED, SENSITIVE information in accordance with
(insert local regulation dealing witt) automated information system security management
program).
c. The UNN and the Internet, as viewed by the [insert your organization), are synonymous. E-
mail and attachments are vulnerable to interception as they traverse the NIPRNET and Internet.
Figure B-1. Acceptable use policy
62 AR 25-2 24 October 2007
Manni ngB_00016297
6. Minimum security rules and requirements. As a CNN and/or UNN system user, the
following minimum security rules and requirements apply:
a. Personnel are not permitted access to CNN and UNN unless in complete compliance with the
(insert your organization) personnel security requirement for operating in a TOP SECRET
system-high environment.
b. I have completed the user security awareness-training module. I will participate in all training
programs as required (inclusive of threat identification, physical security, acceptable use policies,
malicious content and logic identification, and non-standard threats such as social engineering)
before receiving system access.
c. I will generate, store, and protect passwords or pass-phrases. Passwords will consist of at
least 10 characters with 2 each of uppercase and lowercase letters, numbers, and special
characters. I am the only authorized user of this account. (I will not use user ID, common names,
birthdays, phone numbers, military acronyms, call signs, or dictionary words as passwords or
pass-phrases.)
d. I will use only authorized hardware and software. I will not install or use any personally owned
hardware, software, shareware, or public domain softvrare.
e. I will use virus-checking procedures before uploading or accessing infonnation from any
system, diskette, attachment, or compact disk.
f. I will not attempt to access or process data exceeding the authorized IS classification level.
g. I will not alter, change, configure, or use operating systems or programs, except as specifically
authorized.
h. I will not introduce executable code (such as, but not limited to, exe, com, vbs, or .bat files)
without authorization, nor will I write malicious code.
i. I will safeguard and mark with the appropriate classification level all information created,
copied, stored, or disseminated from the IS and will not disseminate it to anyone without a
specific need to know.
j . I will not utilize Army- or DoD-provided ISs for commercial financial gain or illegal activities.
k. ivlaintenance will be performed by the System Administrator (SA) only.
I. I will use screen locks and log off the workstation when departing the area.
m. I will immediately report any suspicious output, files, shortcuts, or system problems to the
(insert your organization) SA and/or lASO and cease all activities on the system.
n. I will address any questions regarding policy, responsibilities, and duties to (insert your
organization) SA and/or lASO.
Figure B-1. Acceptable use policyContinued
AR 25-2 24 October 2007 63
Mannl ngB_00016298 I
0. I understand that each IS is the property of the Army and is provided to me for official and
authorized uses. I further understand that each IS is subject to monitoring for security purposes
and to ensure that use is authorized. I understand that I do not have a recognized expectation of
privacy in official data on the IS and may have only a limited expectation of privacy in personal
data on the IS. I realize that I should not store data on the IS that I do not want others to see.
p. I understand that monitoring of (CNN) (UNNj will be conducted for various purposes and
information captured during monitoring may be used for administrative or disciplinary actions or
for criminal prosecution. I understand that the following activities define unacceptable uses of an
Army IS:
{insert specific criteria)
to show what is not acceptable use
to show what is acceptable during duty/non-duty hours
to show what is deemed proprietary or not releasable (key word or data identification)
t to show what is deemed unethical (e.g., spam, profanity, sexual content, gaming)
to show unauthorized sites (e.g., pornography, streaming video, E-Bay)
to show unauthorized services (e.g., peer-to-peer, distributed computing)
to define proper email use and restrictions (e.g., mass mailing, hoaxes, autofonA^ardlng)
to explain expected results of policy violations (1 ^, 2*, 3"*, etc)
(Nofe; Activity in any criteria can lead to criminal offenses.)
q. The authority for soliciting a social security number (SSN) is EO 939. The information below
will be used to identify you and may be disclosed to law enforcement authorities for investigating
or prosecuting violations. Disclosure of information is voluntary; however, failure to disclose
information could result in denial of access to (insert your organization) information systems.
7. Acknowledgement I have read the above requirements regarding use of [insert your
organization) access systems. I understand my responsibilities regarding these systems and the
information contained in them.
insert name fiere insert date here
Directorate/Division/Branch Date
insert name here insert Rank/Grade and SSN here
Last Name, First, Ml * Rank/Grade/ SSN
insert name here insert ptione number fiere
Signature Phone Number
Figure B-1. Acceptable use policyContinued
64 AR 25-2 24 October 2007
Manni ngB_00016299
8-3. Standard mandatory notice and consent f oral l 000 information system user agreements
Figure8 2,below,isinformationfromthe standard mandatory notice and consent for all DODinformationsystem
useragreements.
AR 25-2 24 October 2007/RAR 23 March 2009 65
Manni ngB_00016300
^ i l e Anny organizations may customize their AUP to their environments the following text is mandated
by OoO and iniill he included^ amended or i^med as a standalone dc^ument as part ofthe AUP prc^es9^
8y signing this documents yot^ acknowledge and consent that when you access f^epartment of defense
^OoO) information systems;
^Yoi^ are accessing a U.^. Government (U^G^ information system ^1^^ (which includes any device
attached to this information system) that is provided for U.^. Government authorized use only.
^ You consent to the following conditions;
oTheU^ Govemment routinely intercepts and monitors communications on this information system
for purposes including, but not limited to^ penetration testing, communications security ^CO^^^)
monitoring^ network operations and defenses personnel misconduct ^PM)^ law enfc^cement(L^)^ and
counterintelligence (Cl) investigations.
o At anytime^ the U.^. Government may inspect and seize data stored on this information system.
o Communications using^ or data stored on^ this information system are not priiiate^ are subject to
routine mc^itoring^ interceptions and search^ and may be disclosed or used for any U.S. Government
authorized purpose.
o This information system includes security measures (e.g.^ authentication and access cc^trc^s) to
protect U S Government interests-notfc^ your personal benefit or privacy
o Notwithstanding theabove^ using an information system does not constituteconsent to personnel
misconducts law enforcements or counterintelligence investigative searching or monitoring of the
content of privileged cc^munications or dato (including work product) that are related to personal
representation or services by attorneys^ psychotherapists^ or dergy^ and their assistants Under these
circumstances, such communications and work product are private and confidential^ as further
explained bek^;
- Nothing in this User Agreement shall be interpreted to limit the user^s consent to, or in any
otherwayrestrictoraffect^anyU.^ Govemment actions fc^pi^rposes of network administrations
operations protections or defense, or for communications security. This includesall communications and
data on an information systems regardless ofany applicable privilege or confidentiality.
whet her any particular communication or c^ta qualifies for the protection of a privileged or is
coiiered by a duty ofconfidentiality^ is detenmined in accordance with established legal standards and
OoO policy. Users are strongly encouraged to seek personal legal counsel on such matters prior to using
an information system if the user intends to rely on the protections of a privilege or confidentiality.
Users should take reasonable steps to identify such communications or data that the user
assertsareprotectedbyanysuchprivilegeorconfidentiality. However, the user^s identification or
assertion of a privilege or confidentiality is not sufficient to create such pmtection where none exists
under established legal standards and OoO policy.
Figure B-2. information system user agreements
66 AR 25-2 24 October 2007/RAR 23 March 2009
ManningB_00016301
AuseBsfailure to take reasonable steps to identify suc:hcommunicationsor data as privileged
or confidential does not waive the privilegeor confidentiality if such protec:tionsotherwise exist under
established iegalstandards and f^l^policy.ltowever^in such cases the U.^.i5overnmentisauthorized to
take reasonabieac^tionsto identify suchc^ommunicationordata as beingsubjec;ttoaprivilege or
confidentiaiity,and such ac:tions do not negate any applicable privilege or c:onfidentiality.
-These conditions preserve theconfidentiaiity ofthe communicationordata^ andthe legal
protections regardingthe use and disclosure of privileged informations and thus such communications
and data are private and confidential.l^urther,theU.5. Government shall take all reasonable measures
to protect the content of c;aptured/^sei^ed privileged communic^ations and data to ensure they are
appropriately protected.
oincases when the user hasconsentedtocontent searching or monitoring of communic;ations
or data for personnel misconducts law enforcement, or counterintelligenc:e investigative searching^ (i.e.^
for all communications anddata otherthan privileged c:ommunicationsor data that are related to
personal representation orservices by attorneys^ psychotherapists^orclergy^and their assistants)^ the
U.5. government may^soiely at its discretion and in accordanc^e with DoOpoiicy^eiecttoapplya
privilege or other restriction on the U.S. (5overnment^sotherwise^authorized use or disclosureof such
information.
oAil of the above c:onditions apply regardless of whetherthe access or use of an information
system inc^ludes the displayofaNotice and (consent banner (^banneB^).^enabannerisused^ the
banner functions to remind the user oftheconditions that are set forth in this User Agreements
regardless ofwhether the banner describes these c:onditions in full detail or providesasummary of such
conditions^ and regardless ofwhetherthebannerexpressly references this User Agreement.
FigureB 2. Information system user agreements-Continued
A^ ^ en^ i x ^
l ^anagement cont r ol eval uat i on ^f i ecl ^l i ^t
C- 1, Punction
The function covered by this checklist is tbe administration of the Army Information Assurance Program.
C- 2. Pur pose
The purpose of this checklist is to assist assessable unit manager and management control administrators in evaluating
the key management controls outlined below. It is not intended to cover all controls.
C- 3. I nst r uct i ons
Answers must be based on the actual testing of key management controls (for example, document analysis, direct
observation, sampling, simulation, or others). Answers that indicate deficiencies must be explained and corrective
action indicated in supporting documentation. These key management controls must be formally evaluated at least once
every 5 years. Certification that this evaluation has been conducted must be accomplished on DA Form 11 2 R
(Management Control Evaluation Certification Statement). DA F o r ml l 2 Ri s available on the APD Web site (http://
www.apd.army.mil).
AR 25-2 24 October 2007/RAR 23 March 2009 67
Manni ngB_00016302
C-4. Test questi ons
d. Have appropriate security personnel (for example, lAPMs, lAMs, or lASOs) been appointed^
^. Haveriskanalysesandvulnerability assessments beenperformed for systemstbat process,access,transmit,or
store Army information7
c^. Are the appropriateleadership and management personnel aware of the results of risk analyses and vulnerability
assessments7
c7. Have vulnerability assessments been performed as per standard Army methodologies as detailed in this regulation
to ensure consistency7
^. Have countermeasures been identified based on the results of risk analyses and vulnerability assessments7
^ Are countermeasures in place commensurate with risks and vulnerabilities7
Is there a written security plan to document implementation of countermeasures7
/i . Has leadership and management formally accepted the risk to process the information involved(or more precisely
stated: ^^Are the systems accredited7"
1. Are countermeasures routinely tested (for example, user IDs, passwords, audit trails)7
^. Are Command and subordinate organizations implementing and reporting compliance to USSTRATCOM,
,ITF CNO, DOD and Army directed solutions or actions such as Command Tasking Orders (CTOs), 1AVM, or
INFOCON measures7
^. Is Information Assurance training being performed7
7 Are ACOM, ASCC, DRU, installations, or activities identifying tbeir IA requirements under tbe appropriate
MDEP7
BBI. Are security incidents and violations (for example, vimses, unauthorized access, or attempts) reported7
Bl. Have plans been developed to ensure continuedoperation in the event of majordismption (forexample, fire,
natural disaster, bomb threat, or civil disorder)7
d. Has a configuration control board approved each network7
^. Is there an appropriate security official as a member of each board7
^. Is there a current SSAA on file foreach 1S7
C-5. Supersession
This checklist replaces the checklist previously published in AR 25 2, dated 14 November 2003.
C-5. Comments
Hel ptomakethi sabetter toolfor evaluating management controls.Submit comments to;Chief Information Officer/
G^ ( CI 0 / G6 ) , 107ArmyPentagon,Wasbington, DC 20310^107
66 AR 25-2^24 October 2007
l^anningB^000^8303
^l o^^ar y
Section I
Abbreviations
Ac^VTR
Asset and Vulnerability Tracking Resource
AASA ^
Administrative Assistant to tbe Secretary of the Army
ACA
Agent of tbe Army Certification Authority (Cc^A)
AC^ I ^ T
Army Computer Emergency Response Team
AC^
access control list
ACOl ^
Army Command
AOP (replaced by I T)
automated data processing
AEI
Army Enterprise Infostmcture
AES
Advanced Encryption Standard
A GNOS C
Army - Global Network Operations and Security Center
AI AP
Army Information Assurance Program (replacement for AISSP, Army Information Systems Security Program)
AISSP
Army Information Systems Security Program (replaced by AI AP)
AI ^O
Army I ^owl edge Online
Al ^ C
Army Materiel Command
AP
approval products list
A1^ ^
Army Regulation
AI ^L
Army Research Laboratory
AI ^Nl ^T
Army Reserve Network
ASA(AI ^T)
Assistant Secretary of t he Army for Acquisition, Logistics, and Technology
AR 25 2 ^24 October 2007
l ^anni ngB^0001830^
ASC
Army Signal Command
ASCC
Army Service Component Command
ATO
Authorization Termination Date
ATS
Automated Tactical System
ATO
approval to operate
AUP
Acceptable Use Policy
AV
Anti Vi ms
A ^ I ^ C
Army Web Risk Assessment Cell
AWS
Automated Weapons System
88P
8est 8usiness Practices
8PA
black purchase agreement
C411^
Command, Control, Communications, and Computers for Information Management
CA
Certification Authority
Cc^A
certification and accreditation
CAC
common access card
CAI ^
Certification Authority Representative
C 8 T 1 A
computer based training
CC8
Configuration Control 8oard
CCI
controlled cryptographic item CCTt ^ common task criteria lab
70 AR 25- 2^ 24 October 2007
l^anningB^000^^305
CCIU
Computer Crime Investigative Uni t
CEI ^T
computer emergency response team
Cl
counterintelligence
CI O
Criminal Investigation Command
C 1 0 / G^
Chief Information Officer, G 6
CI SO
chief information security officer
C1SS
Center for Information Systems Security
CISSP
Center for Information Systems Security Professional
CI T
common information technology
Cl ^
configuration management
C1^8
Configuration Management 8oard
Cl ^ VP
Cryptographic Module Validation Program
CNO
computer network defense
CNOC
Computer Network Defense Course
CNOSP
Computer Network Defense Service Provider
CNO
computer network operations
CNSS
Committee on National Security Systems
COCO
contractor owned, contractor operated
COMlSI2^C
communications security CON Certificate of Netv^orthiness
AR 25-2 24 October 2007 71
MannlngB_00016306
CONUS
Continental United States
COR
contracting officer' s representative
COS
Chief of st af f
COTS
commercial off-the-shelf
COOP
Continuity of Operations Plan
CPP
Cooperative Program Personnel
CRO
compliance reporting database
CSI^A
Communications Security Logistics Agency
CTI S
Common Tier 1 System
CTc^5^
certification, test and evaluation
CVT
Compliance Verification Team
OAA ^
designated approving authority
OAPE
Deny al l , permit by exception
OATO
Denial of Authorization to Operate
OC^
distributed computing environment
001^
Delegation of Disclosure Authority Letter
OES
data encryption standard
01ACAP
Department of Def ense Information Assurance Certification and Accreditation Process
Oi O
Defense in Depth
01SA/C1SS
Defense Information Systems Agency/Center for Infi;irmation System Security
72 AR 25- 2^ 24 October 2007
l^anningB^000^^307
01TYVAP
Do-it-Yourself Vulnerability Assessment Program
0 1 ^ ^
demilitarized zone
ONS
Domain Name Service
ooo
Department ofDefense
OOOO
Department ofDefense Directive
0001
Department ofDefense Instruction
OOl l ^
Director ofinformation Management
OI^U
direct reporting unit
5^10c^l^
engineering, implementation, operation, and maintenance
El^l^S
Electronic I^ey Management System
EOIS
Employee Owned Information System
ESEP
Engineer and Scientist Exchange Program
I^IPS
Federal Information Processing Standard
I^ISl^A
Federal Information Security Management Act
l^t^O
foreign liaison officer
EN
foreign national
EOC1
Foreign ownership, control, or infiuence
E01A
Freedom ofinformation Act
EOTc^E
follow-on test and evaluation
EPAT Force Protection Assessment Team
AR 25-2^24 October 2007 73
l^anningB^0001^308
EY
fiscal year
GOTS
govemment-off-the-shelf
HQOA
Headquarters, Department of the Army
l i ^ A
identification and authentication
I A
Information Assurance
l A l ^
Information Assurance Manager
l ANl ^
Information Assurance Network Manager
1ANO
Information Assurance Network Officer
l APl ^
Information Assurance Program Manager
l A P ^ T
information assurance policy c^ technology
1ASO
Information Assurance Security Officer
1ATC
interim authority to connect
l ATO
interim approval to operate
1ATT
Information Assurance Technical Ti p
1ATT
Interim Authorization to Test (Cc^A)
1AVA
Information Assurance Vulnerability Alert
1AV8
Information Assurance Vulnerability 8ul1etin
l A V l ^
Information Assurance Vulnerability Management
I CAN
Installation Campus Area Network (installation backbone) I CC integrated circuit chip
74 AR 25- 2^ 24 October 2007
l^anningB^000^^309
IOS
Intrusion Detection System
l l ^ A
Installation Management Agency
I NI ^OCON
information operations condition
1NEOSEC
information security
I O
information operations
l OTc^E
initial operational test and evaluation
10VA0
Information Operations Vulnerability Assessments Division
I P
Intemet Protocol
IS
information system
ISS
Information Systems Security (replaced by Information Assurance)
I T
information technology
I TS
information technology services
, 11^
.loint Interagency and Multinational
.fOCSISSS
.loint DODI I S Cryptologic SCI Information Systems Security Standards
. f l ^ l ^ l ^ G
.loint l^ey Management Infrastmcture Worki ng Croup
l ^l ^EC
l^ey Management Executive Committee
l ^l ^l
key management infrastmcture
I^Vl ^/1^1^1^
keyboard, video, mouse/keyboard, monitor, mouse
LAN
local area network
I^CERT
Local Computer Emergency Response Team
AR 25- 2^ 24 October 2007 75
l^anningB^000^^310
t^E/CI
Law Enforcement/Counter Intelligence Center
t^OC
level of confidentiality
MIAC
mission assurance category
l ^AP
Mi ti gati on Acti on Plan
1V1C0
mobile computer device
1^CE8
Mi l i tary Communications Electronics 8oard
l ^OEP
management decision package
1^010
market driven/industry developed
l ^EVA
mission essential vulnerable area
l ^OA
Memorandum of Agreement
l ^PE
miscellaneous processing equipment
l ^PEP
Mi l i tary Personnel Exchange Program
l ^SC
major subordinate command
l ^ ^ R
morale, welfare, and recreation
NA
network administrator
NAC
National Agency Check
NAC1C
National Agency Check wi th Credit Check and written inquiries
NACI ^C
National Agency Check wi th Local Agency and Credit Checks
NCR
National Capital Region NOI non-developmental item
76 AR 25- 2^ 24 October 2007
l^anningB^0(^0^^3^^
NETCOl^
Network Enterprise Technology Command
NETOPS
network operations
NG8
National Guard 8ureau
N1AP
National Information Assurance Partnership
NI ST
National Institute of Standards and Technology
Nl ^
network manager
NSA
National Security Agency
NS1
National Security Information
NSS
National Security System
OCA
original classification authority
OCONUS
outside continental United States
Ol Ac^C
Office of i nf or mat i on Assurance and Compliance
OPCON
operational control
OPl ^
Office of Personnel Management
ORO
operation requirements document
OTE
operational training experience
POA
personal digital assistant
POS
Protected Distribution System
PEO
personal electronic device or portable electronic device PEG program evaluation group
AR 25- 2^ 24 October 2007 77
l^anningB^000^^3^2
PEO
program executive officer
PIN
personal identification number
Pt^
public law or protection level
Pl^
program manager or project manager or product manager
POAc^l^
Plan of Action and Milestones
POLP
principle of least privilege
POl^
program objective memorandum
PPS
ports, protocols, and services
RA
remote access
RA01US
Remote Authentication Dial in User System
RAS
remote access server
RCERT
Regional Computer Emergency Response Team
RCIO
regional chief information officer
ROTc^E
research, development, test, and evaluation
ROl^
read only memory
SA
Systems Administrator
SA81
secret and below interoperability
S8U
Sensitive but Unclassified (obsolete term)
SCI
sensitive compartmented information SET1 strategic electronic technology information
76 AR 25- 2^ 24 October 2007
l^anningB^000^^3^3
S1AO
Senior Information Assurance Officer
SII
Statement of Intelligence Interest or Security/Suitability Investigations Index
S10
senior intelligence officer
S10PES1
Single Integrated Operational Plan-Extremely Sensitive Information
SIR
serious incident report
SETP
Secure File Transfer Protocol
SISS ^
Subcommittee for Information Systems Security
SOP
standard operating procedure
SSAA
System Security Authorization Agreement
SS81
single-scope background investigation
SSH
secure shell
SSL
secure sockets layer
SSN
social security number
SSP
System Security Policy
STANREP
standardization representative
STEP
standard tactical entry point
ST1G
Security Technical Implementation Guide
STS
Subcommittee for Telecommunications Security
SO
System Owner
TA ^
technical advisory
AR 25^2^24 October 2007 79
l^anningB^000^^3^^
TAG
technical advisory group
TOY
temporary duty
TEl ^ P ^
Test and Evaluation Master Plan
TI ^A
Top Layer Architecture
TNOSC
Theater Network Operations and Security Center
TS
Top Secret
TSACS
Terminal Server Access Control System
TS1^8
Tier 1 System Management 8oard
TS/ SCl
Top Secret/Sensitive Compartmented Information
TTP
tactics, techniques, and procedures
URL
universal resource locator
USAAA
United States Army Audi t Agency
USER10
user identification
VAT ^
vulnerability assessment technician
VI S
vendor integrity statement
VPN
virtual private network
^ t ^ A N
wireless local area network
Worl d Wi deWeb
Sect i on II
Ter ms
Access
(IS) Abi l i t y and meansto communicate wi th (that i s,provi de input to or receive output f r om) , or otherwise make use
60 AR 25 2 ^24 October 2007
l^anningB^0001^3^5
of any information, resource,or component in an I S. (COMSEC) Capability and opportunity to gain knowledge or to
alter information or materieL
Access cont rol
The process of l i mi ti ng access to the resources of an IS only to authorized users, programs, processes, or other systems.
Account abi l i t y
(IS) Property that enables auditing of activities on an IS to be traced to persons who may then be held responsible for
their actions. (COMSEC) Principle that an individual is responsible for safeguarding and controlling of COMSEC
equipment, keying materiel, and information entmsted to bis or her care and is answerable to proper authority for the
loss or misuse of that equipment or information.
Accredi tati on Oecision
Anof f i ci al designation f r o ma DAA, in wr i t i ngor di gi t al l y si gnede-mai l , made visible to the CIO/G 6, regarding
acceptance of the risk associated wi th operating an IS. Expressed as ATO, l ATO, 1ATT, or DATO.
Adj unct Net work
For the purpose of Ci ^A, those networks that depend on the connections to the common transport network and services
of t hel CAN. These networks r el yont hel CANf or NI PRNETandSI PRNETconnect i vi t y. These mayor may not be
under DOl M managementandusual l y connect to the I CANbel owt hesecur i t y stack. They may becont r ol l edby a
tenant as small as an office or as large as a ACOM/ ASCC headquarters.
Appr oval to operate
Synonymous wi th accreditation.
Ar my i nf ormat i on
Information originated by or conceming the Army.
Audi t
Independent revi ewandexami nat i on of recordsand activities toassesstheadequacy of system controls, toensure
compliance wi th established policies andoperational procedures, and to recommend necessary changes in controls,
policies, or procedures.
^
Audi t t r ai l
Chronological record of system activities to enable the constmction and examination of t he sequence of events or
changesi nanevent ( or bot h) . An audit t rai l may apply t oi nf or mat i oni nanI S, t o message r out i ngi nacommuni ca-
tions system, or to the transfer of COMSEC materieL
Authenti cate
Tover i f y the i dent i t yof auser , user devi ce, or other ent i t y, or t bei nt egr i t y of dat a stored,transmi tted,or otherwise
exposed t opossi bl eunaut hori zedmodi f i cat i on in anautomatedi nformati on system, or toestablisb the validity o f a
transmitted message.
Aut hent i cat i on
Security measure designed to establish tbe validity ofatransmi ssi on, message, or originator, orameans of verifying an
individual' s identity or eligibility to receive specific categories of information or perform specific actions.
Aut hori zat i on to operate
Authorization granted by the DAA for an information system to process, store, or transmit information. Authorization
is based on acceptability of the solution, the system architecture, implementation of assigned IA Controls, the
operational IA risk level, and tbe mission need.
Aut o-manual system
Programmable, hand held COMSEC equipment used to perform encoding and decoding functions.
Aut omat ed i nf ormat i on system (obsolete t erm)
(See information system (IS))
Aut omat ed I nf ormat i on System Appl i cat i on
For IA purposes, the product or deliverable resulting from an acquisition program. An Automated Information System
(AIS) application performs clearly defined functions for which there are readily identifiable security considerations and
AR 25- 2^ 24 October 2007 81
l^anningB^000^83^^
needs that are addressed as part of t he acquisition. An AIS application may be a single software application (for
example, integrated consumable items support); multiple software applications that are related t oasi ngl e mission (for
example, payroll or personnel); o r a combination of software and hardware performing a specific support function
acrossarange of missions (f orexampl e, Global CommandandCont r ol System, Defense Messaging System). AIS
appl i cati onsaredepl oyed to enclaves f oroperat i ons, andof t enbave theiroperational security needs assumedby the
enclave.Note that an AIS application is analogous toa^^majorapplication' ^as defined in 0 M 8 A 130; however,thi s
term is not used in order to avoid confusion wi th the DOD acquisition category of major AIS.
Aut omat ed Tacti cal System
Any IS that is used forcommuni cati ons, operations, or as a weapon during mobilization, deployment, o r a tactical
exercise. An AutomatedTactical System (ATS) may include, but is not limited to, data processors, firmware, hardware,
peripherals, sofiware or other interconnected components and devices(for example, radar equipment, global positioning
devices, sensors, guidance systems for airbome platforms).
Aut omat ed weapon systems
Any weapons syst emt bat ut i l i zesacombi nat i onof comput er hardware and sofiware t oper f or mt hef unct i onsof an
information system (such as collecting, processing, transmitting, and displaying information) in its operation.
Avai l abi l i t y
The state when data are in the place needed by the user, at the time the user needs them, and in the form needed by the
user.
Category
Restrictivelabel that has been appl i edt obot h classified anduncl assi fi eddata,thereby increasing the requi rementfor
prot ect i onof , andrest ri ct i ngt heaccess to, thedata. Examplesinclude sensitive compartmentedi nformati on,propri e
tary information, and North Atlantic Treaty Organization information. Individuals are granted access to special
category information only after being granted formal access authorization.
Cent ral computer faci l i ty
Oneor mor ecomput er s wi th their peripheraland storage uni ts,centra1processi nguni ts,and communications equip-
ment in a single controlledarea. Central computer facilities are those areas where computer(s) (otherthan personal
computer(s)) are housed to provide necessary environmental, physical, or other controls.
Cert i f i cat i on
Comprehensive evaluation of tbe technical and non-technical security features of an IS and other safeguards, made in
support of tbe accreditation process,to establish the extent to whi cbapart i cul ar design and implementation meetsaset
of specified security requirements.
Cert i f i cat i on and accredi tati on
The standard DOD approach for identifying information security requirements, providing security solutions, and
managing the security of DOD information systems.
Cert i f i cat i on aut hori t y
Covemment ci vi l i anor mi l i t ar yof f i ci al wi t ht he authority and responsibility for formal eval uat i onof t bel Acapabi l i
ties and servi cesof an i nformati onsystemandri sksassoci ated wi t hoper at i onof t he i nformati onsystem.Tbe Army
C A i s tbe Army FI SMASI AO, the Director Ol Ai ^C, NETC EST L
Cert i f i cat i on support
Those activities associated wi th coordination of certification events such as preparationfor certification test activities,
conduct of tbe certification event(s),preparation of tbe Certification Report,preparation of the certification scorecard,
and preparation of the ISs risk assessmenL Certification support does not include those functions that are the
responsibility of thesystem owner (f orexampl e, Informati onSystemSecuri ty Engineering,primary SSAA develop-
ment, SSAA consolidation prior to submission for approval, or POAc^M development).
Cert i f i cat i on event
An evaluation of an information system to determine compliance wi th l ACont r ol s. This maybe in support of an
I A T O, 1 A T T , A T O, o r DA T O
62 AR 25^2^24 October 2007
l^anningB^00018317^
Classified defense i nf ormat i on
Offi ci al i nformati onregardi ng national security t hat hasbeendesi gnat edt opsecret , secret , or confidential i naccord-
ance wi th Executive Order 12958, as amended by Executive Orders 12972, 13142, and 13292.
Cl eari ng
Removal of data from an I S, i t s storage devices, and other peripheral devices wi th storage capacity in suchaway that
the data may not be reconstmcted using normal system capabilities (for example,tbrougb the keyboard). AnI Sneed
not bedi sconnect edf r omany extemal net workbef orecl eari ng takesplace. Cl eari ngenabl esaproduct t ober eused
wi t hi nt be sameenvironment at t he samecl assi fi cati onandconfi denti al i ty leveL l t does not produceadecl assi f i ed
product by itself, but may be the first step in the declassification process (see Purge).
Commerci al Communi cati ons Security Endorsement Program
Relationship between t heNat i onal Securi t yAgency and i ndust r y, i nwhi cht heNat i onal Secur i t y Agency provides the
COMSECexperti se (that is,standards, algorithms, evaluations,and guidance) and industry provides design,develop-
ment, andproducti on capabilities to producea type 1 o r t y p e 2 producL Productsdeveloped under tbeCommerci al
COMSEC Endorsement Program may include modules, subsystems, equipment, systems, and ancillary devices.
Compart ment ed mode
IS security modeof oper at i onwher ei neacbuser wi t hdi r ect or indirect accesst ot besyst em, itsperipherals, remote
terminals, or r emot ehost shasal l of t he fol l owi ng: (1) Val i d security clearance f or t hemost restricted information
processed in the system; (2) Formal access approval and signed non-disclosure agreements for that information to
which a user is to have access; and (3) Valici need-to-know for information to which a user is to have access.
Compromi si ng emanations
Unintentional signals that, i f intercepted and anal yzed,woul d disclose thei nformati ontransmi tted, received, handled,
or otherwise processed by telecommunications or automated information systems equipment (see TEMPEST).
Comput er
Amachi ne capable of accepting data,performi ng calculations on, or otherwise manipulating that data, storing i t , and
producing new data.
Comput er faci l i ty
Physical resources that include stmctures or parts of stmctures that support or house computer resources. The physical
area where tbe equipment is located.
Comput er security
Measures and controls that ensure confi denti al i ty,i ntegri ty,and availability of the information processed and stored by
a computer.
Conf i dent i al i t y
Assurance that information is not disclosed to unauthorized entities or processes.
Conf i gurat i on control
Process of cont rol l i ng modifications toatel ecommuni cati on or information system hardware,fi rmware, software, and
documentation to ensure the system is protected against improper modifications prior to, during, and afier system
implementation.
Conf i gurat i on management
Tbe management of security features and assurances through control of changes made to hardware, software, firmware,
documentation,test,test fixtures,and test document at i onof anl St broughout the development and operati onal l i fe of
the system.
Conti ngency pl an
Api an maintained foremergency response,backupoperations, andpost-disaster recovery f or an IS, asapar t of its
security program,tbat wi l l ensure the availability of critical resources and facilitate the continuity of operations in an
emergency situation.
Cont rol l ed access protecti on
Log-inprocedures, audit of security-relevant events,and resourceisolation as prescribed for class C2 i n DOD 5200.
28-STD
AR 25- 2^ 24 October 2007 83
l^anningB^00018318
Control l ed cryptographi c i tem
Secure telecommunications or information handling equipment, or associated cryptographic component,that is unclas-
sified but govemedbyaspeci al set of control requirements Such items are marked CONTROLLED CRYPTO
GRAPHIC I TEM or, where space is limited, controlled cryptographic item.
'
Countermeasure
An action, device, procedure, technique, or other measure that reduces the vulnerability of an IS.
Crypt ographi c
Pertaining to, or concemed wi t h, cryptography.
Crypt ographi c equi pment
Equipment that embodies a cryptographic logic.
Crypt ography
Principles, means, and methods for rendering plain information unintelligible and for restoring encrypted information to
intelligible form.
Oata security
Protection of data from unauthorized (accidental or intentional) modification, destmction, or disclosure.
Oeclassification (of magnetic storage media)
An administrative procedure resulting in a determination that classified information formerly stored on a magnetic
medium has been removed or overwritten sufficiently to permit reuse in an unclassified environmenL
Oefense in Oepth
The Di D encompasses a physical and logical stmcture that requires a l ayeri ngof securi t y policies, procedures, and
technology mechanisms to protect network resources, from the desktop to the enterprise, wi thi n and across the
enterprise architecture. Layered defenses include, but are not limited to, the installation of IA policy protections
complementing the use of proxy services, firewalls, IDSs, implementation of DM^s, redundant filtering policies across
devices, and access control and accountability.
Oegauss
Destroy infonnation contained in magnetic media by subjecting that media to high intensity alternating magnetic fields,
fol l owi ng which the magnetic fields slowly decrease.
Oemi l i tari zed zone
Asmal l network or computer host that serves asa^^neutral zone" between an intemal network and the public network.
A D M ^ prevents users from obtaining direct access to an intemal server that may have business data on i L A D M ^ is
another approach to the use of a firewall and can act as a proxy server i f desired.
Oenial of service
Result of any action or series of actions that prevents any part of a telecommunications or IS from ftinctioning.
Oesignated approvi ng aut hori t y
A general officer (GO), SESor equi val ent of f i ci al appoi ntedby tbe Army C1 0 / G^ wi th theautbori ty to formally
assume responsibility for operati ngasystem at an acceptable level of ri sk. Thi s term is synonymous wi th Designated
Authorization Authority and Delegated Accrediting Authority.
OATO
DAA determination that an information system cannot operate because of an inadequate IA design or failure to
implement assigned IA controls. I f the system is already in use, operation of the system is baited.
Oi gi tal signature
An electronic rather t hanawr i t t en signature used by someone to authenticate tbe identity of asender of amessage or
signer o f a documenL A digital signature ensures that tbe content of a message or document is unaltered. Digital
signatures can be time-stamped, cannot be imitated by another person, cannot be easily repudiated, and are
transportable.
Oi screti onary access cont rol ( OAC)
Means of restricting accesst oobj ect sbasedont bei dent i t y and needt o- knowof users or gr oupst owhi cht he object
64 AR 25^2^24 October 2007
l^anningB^000^^3^9
belongs.Controls are discretionary in the sense thatasubj ect wi th certain access permission is capable of passing that
permission (directly or indirectly) to any other subjecL
Eavesdroppi ng
Method used by an unauthorized individual to obtain sensitive information (for example, passwords, data) from a
network. Eavesdropping techniquesinclude wiretapping,eavesdropping by radio,eavesdropping via auxiliary ports on
at ermi nal , and use of software that monitors packets sent overanet work. Vulnerable network programs are telnet and
ftp
Embedded crypt ography
Cryptography that is engineered i nt oapi ece ofequi pment or system the basic function of which is not cryptographic.
Components comprising tbe cryptographic module are inside the equipment or system and share host-device power and
housing. The cryptographic function may be dispersed i f identifiable as a separate module wi thi n the bosL
Embedded (computer) system
Computer system that is an integral part of al ar ger system or subsystem that performs or cont rol saf unct i on, either in
whole or in parL
Emission security
Protection resulting from al l measurest akent o deny unauthorized personsinformation of value that might be derived
fromi ntercept and analysis ofcompromi si ngemanati onsfromcryptographi cequi pment,1Ss,andte1ecommuni cati ons
systems.
Enclave
The col l ect i onof comput i ngenvi r onment sconnect edbyoneor mor ei nt emal net wor ks, under the cont r ol of asi ngl e
authority and security policy that includes personnel and physical security. Enclaves always assume the highest mission
assurancecategory andsecurity cl assi fi cati onof the Al Sappl i cati ons or outsourced IT-basedprocessesthey support,
andderi ve tbeir security needs from thosesystems. They provide standard IA capabi l i ti essuchasboundary defense,
incident detection and response, and key management, and also deliver common applications such as office automation
and electronic mail. Enclaves may be specific to an organization or ami ssi on, and tbe computing environments may be
organized by physical proximity or by function independent of location. Examples of enclaves include local area
networks and the applications they host, backbone networks, and data processing centers.
Extranet
Apr i vat e network that uses Intemet protocols and tbe public telecommunications system to securely share information
among selected extemal users. An Extranet requires tbe use of firewalls, authentication, encryption, and VPNs that
tunnel through the public network.
I^ile server
Computer har dwar eusedt opr ovi dest or agef or user data and software appl i cati ons,processi ngcapabi l i ti esfor user
workstations, and (normally) connection and control of workstations to a LAN.
Eirewall
A system or group of systems that enforces an access control policy between two networks wi th the properties of
al l owi ngonl yaut hori zedt raf f i c to pass betweenthe networks from inside and outside the controlled environment and
is immune to penetration.
Eirmware
Software that i spermanentl y stored in ahardware device that allows reading and executing the softw^are, but not
wri ti ng or modi fyi ng i f
Ely Away C ^ A package (tactical deployed)
Tactical Cc^Apackage tbatsupportstacti cal IS deployment andcont ai nst hemi ni mum amount of Cc^A information
necessary for secure operations and allow connection to a network in tbeir deployed location.
Eoreign exchange personnel
Mi l i tary members or civilian officials of af or ei gn defense establishment (that i s , aDOD equivalent) who are assigned
t o a DOD component in accordance wi th the terms of an exchange agreement and who perform duties, prescribed bya
position description, for the DOD componenL
AR 25^2^24 October 2007 85
l^anningB^000^^320
Eoreign liaison officers
Af or ei gn govemment military or civilian employee who is authorized by his or her govemment, and is certified by tbe
DODComponent , t oact as anof f i ci al representative of thatgovemment in i tsdeal i ng wi th t heDOD component in
connection wi th programs, projects, or agreements of interest to the govemments. Three types of foreign liaison
officers include security cooperation, operational, and national representatives.
Eoreign nati onal
Non-U.S. citizens who normally reside in tbe country where employed, though they may not be citizens of that
country, and who are employed by the Govemment or t hc DA to perform services or duties and are not considereda
foreign offi ci al or representative of that nation.
Eoreign official
Non- U. S. ci t i zenswhomayor may not resi dei nt be country where employed, who are employed by theirrespective
nation as an offi ci al representative of that nation in t hei rof f i ci al capacity, and assigned to the Govemment or DA
organizations or commands in tbe role of liaison, representative, engineer, scientist, or a member of the Mi l i tary
Personnel Exchange Program.
Eormal access approval
Documented approval by a data owner to allow access to a particular category of information.
Eoreign ownershi p, cont rol , or influence
Acompany is considered to be under foreign ownership, control ,or infiuence wbeneveraforei gn interest has the direct
or indirect power either throughthe ownership of the company's securities,contractual arrangements,or other means;
to direct or decide matters affecting the operations of that company.Tbi si nfi uence may result inunauthorized access
to classified or sensitive information, information systems, or information systems architectures.
I nf ormat i on assurance product
Product or technology whose primary purpose is to provide security services (for example,confidentiality,authentica-
tion, integrity, access control, or non-repudiation of data); correct known vulnerabilities; orprovi de layered defense
against various categories of nonaut hori zedor malicious penetrati onsof informationsystems or networks. Examples
include such products as data/network encryptors, firewalls, and intmsion detection devices.
I nf ormat i on assurance-enabled product
Product or technology whose primary role is not security, but which provides security services as an associated feature
of i t s intended operating capabilities. Examples include such products as securityenabled web browsers, screening
routers, tmsted operating systems, and security-enabled messaging systems.
l AA view
See interconnected accredited IS view.
I nf ormat i on owner
Govemment, civilian or military offi ci al wi th statutory or operational authority for specified information, and responsi-
bi l i ty forestabl i shi ng t hecont r ol sf or i tsgenerati on,col l ecti on,processi ng,di ssemi nati onanddi sposaL Information
owners wi l l ensure that the DA information entmsted to their care is store, processed, or transmitted only on
i nf or mat i onsyst emst hat haveobt ai nedl Aappr oval t ooper at ei naccor dancewi t h Ar mypr ocessesf or t he confiden
tiality l evel of their i nformati on.Thi s applies to all systems,toi ncl ude services onCOCO systems as wel l as COCO
systems.
Interconnected accredited i nf ormat i on system view
I f anet wor kconsi st s of previously accredited I Ss , a MOAi s required bet weent heDAAof each DOD componentIS
and tbe DAA responsible for tbe network The network DAA must ensure that interface restrictions and limitations are
observed forconnecti onsbetween DOD Component ISs. Inparti cul ar, connections between accredited ISs must be
consi st ent wi t ht hemodeof oper at i onof eachl Saswel l ast hespeci f i csensi t i vi t yl evel or range of sensitivity levels
f oreach IS. I f a component that requires an extemal connection to perform a useful function is accredited, it must
comply wi th any additionalinterface constraints associated wi t ht he particular interface device used for the connection
as well as any other restrictions required by the MOA.
I nf ormat i on system
Set of information resources organized for the collection, storage, processing, maintenance, use, sharing, dissemination.
66 AR 25- 2^ 24 October 2007
l^anningB^0D01^321
disposition, display, or transmission of information. Includes AIS applications, enclaves, outsourced IT-based
processes, and platform IT interconnections.
I nf ormat i on assurance
Tbe protection of systems and information in storage,processing,or transit from unauthorized access or modification;
denial of service to unauthorized users;or tbe provision of service to authorized users.It also includes those measures
necessary to detect, document, and counter such threats. Measures that protect and defend information and ISs by
ensuring thei ravai l abi l i ty, integrity, authentication, confidentiality, and non-repudiation. This i ncl udesprovi di ng for
restoration of ISs by incorporating protection,detection,and reaction capabilities.This regulation designatesIA as the
security discipline that encompasses COMSEC, INFOSEC, and control of compromising emanations (TEMPEST).
I nf ormat i on Assurance Vul nerabi l i t y l ^anagement (1AV1V1)
l AVM is the DOD program to identify and resolve identified vulnerabilities in operating systems. It requires the
completion of four distinct phases to ensure compliance.
I nf ormat i on dissemination management
Activities to support the management of i nf or mat i on and data confidentiality, integrity, and availability, including
document management, records management, offi ci al mail, and work-fi ow managemenL
I nf ormat i on technology ( I T)
Tbe hardware, firmware,and software used asapar t of an information system to perform DOD information functions.
This definition includes computers, telecommunications, automated information systems, and automatic data processing
equipmenL I Ti ncl udesany assembly of hardware,software,or firmware confi guredto collect, create,communicate,
compute, disseminate, process, store, or control data or information.
I nt egri t y
The degree of protection for data from intentional or unintentional alteration or misuse.
Intelligence i nf ormat i on
Information collected and maintained in support of a U.S. intelligence mission.
I nt er i m aut hori t y to operate
Temporary authori zati ongrantedby t heDAA t ooper at ean information syst emundert hecondi t i ons orconstraints
enumerated in the Accreclitation Decision.
I nt er i m aut hori t y to test (certi fi cati on and accreditation)
Temporary authorization granted by the DAA to test an information system in a specified operational information
environment ( usual l yal i ve information environment or wi th live data) wi thi n the timeframe and under the conditions
or constraints enumerated in the Accreditation Decision.
Inci dent
Assessed occurrence having actual or potentially adverse effects on an information system.
Internet
Agl obal collaboration of data networks that are connected to each other,using common protocols (for exampl e,TCP/
IP) to provide instant access to an almost indescribable wealth of information from computers around the worl d.
I nt ranet
Si mi l ar t o tbe 1ntemet,but is accessible only by the organization's employees or others wi th authorization. Usually
intemal to a specific organization.
Instal l ati on Campus Area Net work
Tbe common transport network provided by the responsible DOI M on everyArmy post/camp/station and the associated
common network services,including network management andI A ser vi ces. Thel CAN is often commonly referred to
as the backbone network.
I nf ormat i on system security i nci dent (security i nci dent)
Any unexplained event that could result i nt hel oss, cor mpt i on, or denial of access to data, as well as any event that
cannot be easily dismissed or explained as normal operations of the system. Al so, an occurrence involving classified or
sensitive information being processed by an ISwbere there may be: adevi at i on from the requirements of the goveming
security regulations;asuspected or confirmed compromise or unauthorized disclosure of the information;questionable
AR 25- 2^ 24 October 2007 87
l^anningB^000^^322
data or information integrity (for exampl e,unauthori zedmodi fi cati on);unauthori zed modification of dat a; or unavai l -
able information f or aper i od of t i me. An attempt to exploit any IS such that the actual or potential adverse effects may
i nvol vef raud, waste.or abuse; compromi seof information; l ossor damageof pr oper t y or information; ordeni al of
service. Security incidents include penetration of computer systems, exploitation of technical and administrative
vu1nerabi 1i ti es,andi ntroducti onofcomputer vimses or other forms of malicious code. (Asecuri t y incident may also
i nvol vea vi ol at i onof l aw. I f a vi ol at i onof l aw is evi dent or suspected, thei nci dent must al sober epor t edt obot b
security and law enforcement organizations for appropriate action.) (NST1SSD 503)
i nf or mat i onsyst emser i ousi nci dent
Any event that poses grave danger to the Army' s ability to conduct established information operations.
I^ey
Information (usuallyasequence of random or pseudo-random binary digits) used initially to set up and periodically to
change tbe operations performed in crypto-equipment for the purpose of encrypting or decrypting electronic signals, for
determining electronic counter-measures pattems (for example,frequency hopping or spread spectmm),or for produc-
ing another key.
I^ey management
Process by which a key is generated, stored, protected, transferred, loaded, used, and destroyed.
L^east pri vi l ege
Principle that requires that each subject be granted the most restrictive set of privileges needed for the performance of
authorized tasks. This also applies to system privileges that might not be needed to perform tbeir assigned j ob. NOTE:
Appl i cat i onof this pri nci pl el i mi t st he damage that can result from errors, and accidentalandunauthorized use of an
IS
Li mi t ed pri vi l eged access
Privilegedaccess wi th l i mi t edscope(f orexampl e, aut bori t y t ochangeuser access to dat aor system resourcesf ora
single information system or physically isolated network).
Local area net work
A system that allows microcomputers to share information and resources wi thi n a limited (local) area.
IVIachine cryptosystem
Cryptosystem in which tbe cryptographic processes are performed by crypto-equipmenL
l ^ai nf rame
A computer system that is characterized by dedicated operators (beyond the system users); high capacity, distinct
storage devices; special environmental considerations; and an identifiable computer room or complex.
IVIalicious code
Sofiware or firmware capable of performing an unauthorized function on an IS.
l ^al i ci ous software code
Any software code intentionally created or introduced i nt oacomput er system for the distinct purpose ofcausi ng barm
or loss to the computer syst em, i t sdat a, or other resources.Many users equate malicious code wi th computer vimses,
which can lie dormant for long periods of time until tbe computer system executes the trigger that invokes the vims to
execute. Wi thi n the last several years, the Intemet has been the conduit of various types of computer vimses. However,
there are other types of malicious codes used to cause havoc that are not as well publicized as tbe vims.
^i ssi onassur ancecat egor y
Refiects the importance of i nf or mat i on relative to the achievement of DOD goals and objectives, particularly the
warfigbters' combat mission. Mission assurance categories are primarily used to determine the requirements for
availability and integrity.
l ^anual cryptosystem
Cryptosystemi n which tbe cryptographicprocesses are per f or medmanual l ywi t hout t heuseof cr ypt o- equi pment or
auto-manual devices.
66 AR 25- 2^ 24 October 2007
l^anningB^000^^323
l ^i l i t ar y i nf ormat i on envi ronment
The environment contained wi thi n the global information environment, consisting of information systems and organiza-
ti onsfri endl y and adversary,military and non-military-that support, enable, or significantly i nfi uenceaspeci fi c military
operation.
l ^oni t or i ng
Moni tori ng i st heobser vat i onof ar esour ce for the purpose ofascertai ni ngi tsstatus or operationalstate. Monitoring
includes the automated, real or near-real time interception of information transiting the system or network byasyst em
or net wor kadmi ni st r at or dur i ngt henor mal cour seof empl oyment wbi l eengaged in activitiesnecessary t okeept he
systemor net workoperat i onal andt o protect tbe rights and property of the syst emor net wor kowner . Forexampl e,
automated monitoring or logging of system or network events (such as by IDS, IPS, firewalls, and so on) can provide
valuable information related to malicious content of communications; unauthorized access, exceeding access or misuse
of systems or networks; policy and criminal violations, etc. as well as the performance of the systems. 8ecause most
electroniccommunications donot i nvo1ves^^part i est ot beconversat i on, "moni t ori ngbysyst emandnet workadmi ni s-
trators is not ^^electronic surveillance" as defined in AR 381 10.
l ^ul t i l evel (security) mode
IS security mode of oper at i onwher ei nal l t be fol l owi ng statements are satisfied conceming tbe users who have direct
or indirect access to the system, its peripherals, remote terminals, or remote hosts:
d. Some users do not have a valid security clearance for all the information processed in the IS.
Al l users have the proper security clearance and appropriate formal access approval for that information to which
they have access.
c^. Al l users have a valid need to-know only for information to which they have access.
Mlultilevel security
Concept of processi ngi nf ormat i onwi t hdi f f erent cl assi f i cat i onsandcat egori es that simultaneously permits accessby
users wi t bdi f f erent security cl earances,butpreventsusersfromobtai ni ngaccess to i nf or mat i onf or wbi cht bey lack
authorization.
Nati onal Security System (44 USC 3542)
Any information system (including any telecommunications system) used or operated by an agency or byacont ract or
of anagency, or otherorganization onbebal f of an agenc y - ( i ) tbe function, operation, or use of which involves
intelligence activities; involves cryptologic activities related to national security; involves command andcontrol of
military forces; involves equipment that is an integral part of aweaponor weapons system;or is critical t ot he direct
ful fi l l ment of military or intelligence missions (excl udi ngasyst em that is to be used for routine administrative and
business applications, for example, payroll, finance, logistics, and personnel management applications); or, (i i ) is
protectedat all t i mesbyproceduresest abl i shedf ori nf ormat i ont bat havebeenspeci f i cal l yaut hori zedunder criteria
established by anExecuti ve Order or an Act of Congr esst obekept cl assi f i edi nt hei nt er est of nat i onal def ense or
foreign policy.
Need-to-know
Approved access to, or knowledge orpossession of, specific information required to carry out official duties.
Net-centri ci ty
Ar obust globally connected network environment (including infrastmcture, systems,processes,and people) in which
data is shared timely and seamlessly among users, applications, and platforms. Net centricity enables substantially
improved military situational awareness and significantly shortened decision making cycles.
Network
Communi cat i onsmedi umandal l component sat t achedt ot hat medi umwhosef unct i oni s tbe transfer of information.
Components may i ncl udeISs, packet switches,telecommunications controllers,key distribution centers,and technical
control devices.
Net work management
Activities to support tbe management and support of tbe network, including the engineering of changes to the network,
maintenance of the network and its components, and user support activities.
Net work operations
The organizations and procedures required to monitor, manage, and control the global information grid. Network
operations incorporate network management, I A, and information dissemination managemenL
AR 25- 2^ 24 October 2007 89
l^anningB^000^^32^
Network security
Protection of networks and their services from unauthorized modification, destmction, or disclosure. It provides
assurance the network performs its critical functions correctly and there are no harmful side effects.
Networthiness
The networthiness program manages the specific risks associated with the fielding of ISs and supporting efforts,
requires formal certification throughout the life cycle of all ISs that use tbe infostmcture, and sustains the health of the
Army enterprise infostmcture.
Networthiness certification
The Army's networthiness certificationprocessincorporates and demonstratesthe completeness ofguidance,formats,
and practices such as the Army knowledge enterprise; the Command, Control, Communications, Computers and
Intelligence Support Plan (C4ISP); the DIACAP; and existing developmental and operational test requirements.
Non-communications emitter
Any device that radiateselectromagneticenergy for purposes other than communicating (for example,radar,naviga
tional aids, and laser range finders). A non-communication emitter may include features normally associated with
computers, in which case it must also meet tbe requirements for an IS.
Non-privileged access
Userlevel access; normalaccessgiventoatypicaluser. Genera11y,allaccess tosystemresourcesiscontrolledina
way that does not permit those controls and mies to be changed or bypassed by a typical user.
Operations Security
For theDOD components,OPSECisaprocess of identifying criticalinformation and subsequently analyzing friendly
actions attendant to defense acquisition, defense activities, military operations, and other activities to:
d. Identify those actions that may be observed by adversary intelligence systems.
^. Determine what indicators hostile intelligence systems may obtaintbat could be interpreted or pieced together to
derive critical information in time to be useful to adversaries.
c:. Select and execute measures that eliminate or reduce to an acceptable level tbe vulnerabilities of friendly actions
to adversary exploitation.
Outsourced IT-based Process
For DOD1A purposes,an outsourced IT-based processisageneral term used to refer to outsourced business processes
supported by private sector information systems, outsourced information technologies, or outsourced information
services. Anoutsourced ITbasedprocessperforms clearly defined functions for which there arereadily identifiable
security considerations and needs that are addressed in both acquisition and operations.
Password
Protected or private character string used to authenticate an identity or to authorize access to data.
Personal computer
See information system.
Personal digital assistant
Ahand-held computer that allows an individual to store, access, and organize information.Most PDAs work on either
a Windows-basecl or a Palm operating system. PDAs can be screen based or keyboard-based, or both.
Personal electronic devices
Ageneric title used to describe myriad available small electronic portable devices that employ the wireless application
protocol and other ^^open standards".
Personal e-mail account
An e-mail account acquired by an individual for personal use. Also know as a private accounL
Platform information technology interconnection
For DOD IA purposes, platform IT interconnection refers to network access to platform IT.Platform IT interconnection
hasreadily identifiablesecurity considerationsandneeds thatmustbeaddressedinbotbacquisition,andoperations.
Platform ITrefers to computer resources, bothhardwareandsoftware, that arephysically part of, dedicated to, or
essential in real time to themission performanceof special purposesystemssuch as weapons, trainingsimulators,
diagnostic test and maintenance equipment, calibration equipment, equipment used in the research and development of
90 AR 25-2^24 October 2007
l^anningB^000^^325
weapons systems, medical technologies, transport vehicles, buildings, and uti l i ty distribution systems such as water and
electric. Exampl esof platform ITi nterconnecti onstbati mposesecuri tyconsi derati onsi ncl ude communications inter
facesfor data exchanges wi th enclavesfor mission planning or execution, remote administration, and remote upgrade
or reconfiguration.
Pri nci pl e of least pri vi l ege
The principle of least privilege requires that a user be given no more privilege than necessary to perform a j ob.
Ensuring least privilege requires identifying what the user' sj ob is, determining the mi ni mum set of privileges required
to perform that j ob, and restricting the user to a system or domain wi th those privileges and nothing more.
^ ^
Pri vate account
Seepersonal e-mail accounL
Pri vi l eged access
Authorized access that provi desacapabi l i t y to alter tbe properti es,behavi or,or control of the information system or
network. It includes, but is not limited to, any of the fol l owi ng types of access:
d. ^^Superuser,"^^root,"or equivalent access,such as accesst ot hecont rol f t i nct i ons of t hei nf or mat i onsyst emor
network, administration of user accounts, and so forth.
^. Access to change control parameters (f orexampl e, routing tables, path priorities, addresses) of routers, mul ti -
plexers, and other key information system or network equipment or software.
c^. Abi l i t y and authority to control and change program files, and other users' access to data.
c7. Direct access(a1so called unmediated access) to functions at the operating-system level that woul d permit system
controls to be bypassed or changed.
^. Access and authority for insta11ing,configuring,monitoring,or troubleshooting the security monitoring functions
of information systems or networks (for exampl e,networkor system analyzers;intmsion detection software;firewa11s)
or in performance of cyber or network defense operations.
Protected Oi st ri but i on System
Wi re-l i ne or fiber-optic telecommunications system that includes terminals and adequate acoustic, electrical,
electromagnetic,andphysical safeguards t opermi t i tsuse f ort heunencrypt edt ransmi ssi onof cl assi f i ed information.
Proxy server
Aserver acting on behalf of another server or servers.Such an arrangement al l owsasi ngl e point of entry or exit i nt oa
TCP/IP network. Apr oxy server may also have bui l t-i n software that wi l l allow it to be configured to act asaf i r ewal l ,
cache server, or logging server.
^
Purge
Removal of dat a from an I S, i t s storage devices,or other peripheral devices wi th storage capacity in suchaway that
the data may not be reconstmcted. An IS must be disconnected from any extemal network before a purge (see
Clearing).
RA01US
Remote Authentication Di al -In User Service i saprot ocol by which users can have access to secure networks througha
centrally managed server.RADIUS provides authentication f or avar i et y of services,such as login,dial-back, serial line
Intemet protocol (SLIP), and point to point protocol (PPP).
Remote access server
Aser ver that is dedicated t ohandl i ngus er s t hat ar enot onaLAN, but need remote access t o i L Th e remote access
server allowsusers to gain access t of i l es and print services on t heLANf r omar emot el ocat i on. For exampl e,auser
who di al si nt oanet wor kf r om home using an analog modem or an I SDNconnect i onwi l l di al i nt oar emot e access
server.Once the user is authenticated he can access shared drives and printers as i f he were physically connected to tbe
office LAN.
Remote t ermi nal
A terminal that is not in the immediate vicinity of t he IS it accesses. This is usually associated wi th a mainframe
environment and the use of a terminaL Terminals usually cannot operate in a stand alone mode.
Risk
The probability thataparti cul ar threat wi l l expl oi taparti cul ar vulnerability of an information system or telecommuni-
cations system.
AR 25- 2^ 24 October 2007 91
l^anningB^000^^32^
Risk assessment
Process of analyzing threats to and vulnerabilities of aninformation system, and determining potential adverse effects
that the loss of information or capabilities ofasystem would have on national security and using the analysis asabasis
for identifying appropriate and cost-effective countermeasures.
Security guard/filter
IS tmsted subsystem that enforces security policy on the data that passes through iL
Security test and evaluation
Examination and analysis ofthe safeguards required to protect an IS, as they havebeen applied in an operational
environment, to determine tbe security posture of tbe system.
Sensitive but unclassified (obsolete term)
An obsolete term (in DOD) that has been replaced by sensitive information (see below).
Sensitive information
Any information the loss, misuse, or unauthorized access to or modification of which could adversely affect tbe
national interest or the conduct ofFederal programs,or the privacy to which individuals are entitled under5USC 552a
(ThePrivacyAct),butwhichhasnotbeenspecificallyauthorizedundercriteriaestablishedby executive order or an
Act of Congress tobekept secret inthe interest of nationaldefense or foreignpolicy. Sensitiveinformationincludes
information in routine DOD payroll, finance, logistics, and personnel management systems. Examples of sensitive
information include, but are not limited to, the following categories:
d. FOUO,inaccordancewitbDOD 5400.7 R,isinformationthat may be withheld from mandatory publicdisclo-
sure under the FOIA.
^. Unclassified technical data is data related to military or dual-use technology that is subject to approval, licenses,
orauthorization underthe Arms Export Control Act and withheld from public disclosure in accordance with DOD
5230 25
c^. Department of State(DOS) sensitivebut unc1assified(S8U) is informationoriginatingfrom the DOS that has
been determined to be S8U under appropriate DOS information security polices.
c7. Foreign govemment information is information originating from a foreign govemment that is not classified
CONFIDENTIAL or higher but must be protectedin accordance with DOD 5200.1 R.
^. Privacy data is personal and private information (for example, individualmedical information, home address and
telephone number, social security number) as defined in the Privacy Act of 1974.
Social engineering
Term used among crackers and security professionals for cracking techniques that rely on weaknesses in process rather
than software; the aim is to trick people into revealing passwords or other information that compromises a target
system'ssecurity.Classic scams include phoning upauser or helpdesk who has the required information and posing as
a field service tech or a fellow employee with an urgent access problem.
SPAl^
Unsolicited e-mail received on or fromanetwork,usuallytheIntemet, inthe form of bulk mail obtained from e-mail
distribution lists or discussion group lists.
Stand-alone information system
An IS that is physically, electronically, and electrically isolated from all other IS.
Survivability
The ability ofacomputer communication systembased application to satisfy and to continue to satisfy certain critical
requirements (for example,specificrequirements for security, reliability, realtime responsiveness,and correctness)in
tbe face of adverse conditions.
Susceptibility
Technicalcharacteristics describing inherent limitations ofasystem that have potentialfor exploitation by the enemy.
System
Tbe entire computer system, including input/output devices, tbe supervisorprogram or operating system, and other
included software.
System administrator
Asystemadministrator(SA),orsysadmin, isaprivileged-levelindividualemployedorauthorized tomaintainand
92 AR 25-2^24 October 2007
l^anningB^000^^32/^
operateacomputer systemor network. I ndi vi dual r esponsi bl ef or t hei nst al l at i onandmai nt enanceof ani nf or mat i on
system, providing effective information system utilization, adequate security parameters, and sound implementation of
established information assurance policy and procedures. (CNSS Instmction No. 4009)
System audi t
The process of auditing and spot checking to verify secure operation of a system and its support software. I f
irregularities are di scovered,theaudi tprocessi ncl udes analysis andi dent i f i cat i onof the probl em,performi ngcorrec-
five actions necessary to resolve the situation, tracking open items actively, and briefingmanagement on identified
security deficiencies.
System of systems
At ot al network made up of all the interconnected computer systems, communication systems, and network components
wi thi n some logical boundary. (Replaced wi th the term enclave.)
System owner
The Govemment ci vi l i an or military person or organization responsible for introduction or operation of anI S used by
or i ns uppor t of t he Army. TheSO i sresponsi bl ef orensuri ngt hesecuri t y of t he IS as l ongas it remains in Army
inventory, or until transferred (temporarily or permanently) to another Govemment person or organization and such
transfer is appropriatelydocumented and provided as an artifact t ot he accreditationpackage. I f acont r act or provides
IA services t oasyst em wi th the intent of meeting some or all of the SOs IA responsibilities, the IA responsibilities do
not shift from the Govemment SO to the contractor.The Govemment SO remains responsible for ensuring that the I A
services are provi ded.Tbe Govemment SO may charge t hel AM wi th authority to perform many of the SOI Adut i es,
i f appropri at e; however, f i nal responsi bi l i t y wi l l remain wi t ht he SO. TheSO could beapr oduct , pr ogr am or project
manager , ast af f or command element that purchases or devel opsl Tequi pment and syst ems, aDOI Mor anyone else
who is responsible for an IS. The SO is responsible for ensuring that all I A requirements are identified and included in
thedesi gn,acqui si ti on, installation,operation,maintenance,upgrade or replacement o f a l l D A I S inaccordance wi th
DODD 8500 1
Ter mi nal Access Cont rol l er Access System
A system developed by tbe Defense Dat aNet work community to control access to its terminal access controllers.
Techni cal vul nerabi l i t y
A hardware, firmware, communication, or software weakness that leaves a computer processing system open for
potential exploitation or damage,either extemal l yor internally,resulting in risk for tbe owner, user, or manager of the
system.
Tel ecommuni cati ons
Preparation, transmission, communication, or related processing of information (wri ti ng, images, sounds, or other data)
by electrical, electromagnetic, electromechanical, electro-optical, or electronic means.
Tel ecommuni cati ons and i nf ormat i on systems security
Protection afforded to telecommunications and information systems to prevent exploitation through interception,
unauthorized electronic access, or related technical intelligence threats and to ensure authenticity. Note: Such protection
results from t heappl i cat i onof security measures (includingcryptosecurity, transmission security, emission security,
and computer security) to systems that generate, store,process, transfer, orcommuni cate information of use to an
adversary, andal soi ncl udest hephysi cal prot ect i onof t ecbni cal securi t ymat eri el andt echni cal securi t y information.
Tel ecommuni cati ons system
Any system that transmits, receives, or otherwise communicates information by electricaL electromagnetic, electro-
mechanicaL or electro-optical means. A telecommunications system may include features normally associated wi th
computers, in which case it must also meet the requirements for an IS.
Telnet
At er mi nal emulation program f or TCP/ I P networks such as t hel nt emcLTel net i sacommonway to remotely control
Web servers.
Ter mi nal
Any device that is used to access an IS,i ncl udi ng^^dumb" terminals (which only f unct i ont o access an IS), as well as
personal computers or other sophisticated ISs that may access other ISs as one of their functions.
AR 25- 2^ 24 October 2007 93
l^anningB^0001^328
Threat
Capabi l i ti es,i ntenti ons,and attack methods of adver sar i est oexpl oi t , damage, or alter i nf ormat i onor an information
system. Also, any circumstance or event wi th the potential to cause harm to information or an information system. Any
circumstance or event wi th tbe potential to adversely impact an information system through unauthorized access,
destmction, disclosure, modification of data, and/or denial of service (see CNSS Instmction No. 4009).
Threat agent
A means or method used to exploit a vulnerability in a system, operation, or facility.
Threat analyst
Designated member of the intelligence staff of the supported command of tbe DAAwh o wi l l provide the interface on
behalf o f DAwi t h the DOD Intelligence Communi t y, t beG2, NETCOM/ 9t hSC (A), and tbe intelligence component of
the 1st Information Operations Command (Land) to document foreign threats regarding computer network attack
(CNA) and computer network exploitation (CNE) or other non-technical threats.
Ti me bomb and logic bomb
Malicious code that can be triggered byaspeci f i c event or recur at agi ven t i me. Al ogi c bomb is triggered by an event
instead of a specific time. One example of a logic bomb woul d be a set of programmed instmctions to search a
company' spayrol l files,checking for the presence of tbe programmer's name. Oncet be programmer ceases employ-
ment, the logic bomb is triggered to cause damage to data or software.
Tr apdoor
A bidden software program (potentially embedded into the hardware or firmware) mechanism that causes system
protection mechanisms to bebypassed.The code canbe hidden i nt hel ogon sequence where users are asked t oi nput
their user IDs and thenpasswords. I nnor mal circumstances, tbe inputpasswords arecbeckedagai nst stored values
corresponding to theuser I D; i f thepasswordsare val i d, logonproceeds. The trapdoor sofiware woul d check f or a
specific user I D, and whenever that user I D is checked, it bypasses the password checking routine and authorizes
immediate logon. Trapdoors are sometimes built into development systems by programmers to avoid the lengthy logon
procedure.
Tr i vi al file transfer protocol
A simple form of t he File transfer protocol (FTP). TFTPuses the userdatagramprotocol (UDP), a connection-less
protocol that, l i keTCP, mns on top of IP networks.It is used primarily for broadcasting messages overanet work and
provides no security features. It is often used by servers to boot diskless workstations, X-terminals, and routers.
Tr oj an horse
Anon-repl i cati ng program that appears to be legitimate, but is designed to have destmctive effects on data residing in
tbe comput er ont owhi ch the program was1oaded. Theseprogramscanperf ormvari ousmal i ci ousact i vi t i es, suchas
deleting files, changing system settings, allowing unauthorized remote access, and mnning malicious programs result-
ing in destmction or manipulation of data. Trojan horses require user intervention to propagate and install such as
opening an e mail attachmenL
User
Person or process accessing an IS by direct connections (for example, via terminals) or indirect connections.
User 10
Unique symbol or character string that is used by an IS to uniquely identify a specific user.
Vi r t ual pri vat e net work
Apr i vat e data network that makes use of the public telecommunication infrastmcture, maintaining privacy through tbe
use of a tunneling protocol and security procedures,
^
Vi rus
Asmal l program written to alter the wayacomput er operates without tbe permission or knowledge of the user . Avi ms
is self replicating wi th a potentially malicious program segment that attaches or injects itself into an application
programor other executabl esystemcomponentandl eaves no extemalsigns of itspresence,andusual1y programmed
to damage system programs, delete files, create a denial of service, or reformat the hard disk.
94 AR 25- 2^ 24 October 2007
l^anningB^000^^329
Vul nerabi l i t y
Weakness in an infonnation system, cryptographic system, or components of either (for example, system security
procedures, hardware design, intemal controls) that could be exploited.
Vul nerabi l i t y assessment
Systematic examination of an IS or product to determine the adequacy of security measures, identify security
deficiencies, provide data from which to predict theeffectiveness of proposed security measures, and confirm the
adequacy of such measures after implementation.
e a r n i n g banner
A waming banner is verbiage t hat auser sees or is referred to at the point of accesst oasyst emwhi ch sets the right
expectations for users regarding acceptable use of a computer system and its resources, data, and network access
capabilities. These expectations include not i ceof aut hori zed moni t or i ngof users' activities while they are using the
system, and wamings of legal sanctions should the authorized monitoring reveal evidence of illegal activities o r a
violation of security policy.
^ i d e area net work
A WAN coversawi der geographic area t hanaLAN, i s an integrated voice or data network, ofien uses common carrier
l i nesf or t he i nt erconnect i onof i t sLANs, andconsi st sof nodesconnect edoverpoi nt -t o-poi nt channel s. Commercial
examples are Intemet and public data. Govemment examples are NIPRNET and SIPRNET.
^ o r l d ^ i d e ^ e b
The uni verseof accessible information avai l abl eon many computers spreadthrougb tbe worl dandat t acbed to that
gigantic computer network called t hel nt emcLTheWebencompassesabody of sofi ware,aset of pr ot ocol s, andaset
of def i ned conventionsfor accessing tbei nformati on ont be Web. TheWeb useshypertext and multimediatechniques
to make t heWeb easy for anyone to roam,browse, and contribute t o. TheWeb makes publishing information (that is,
making that information publ i c)as easy as creatinga^^homepage" and posting it onaserver somewhere in tbe IntemeL
Also called WE8 or W3
^ o r m
An independent program that replicatesitself by copying from one syst emt oanot her , usual l yover anet wor k without
the use of a host file. Li ke a vi ms, a worm may damage data directly, or it may degrade system performance by
consuming system resources or even shutting a network down, but, in contrast to vimses, does not require the
spreading of an infected host file.Usually tbe worm wi l l releaseadocument that already has the^^worm"macro inside
the documenL
Sect i on III
Speci al Abbr evi at i ons and Ter ms
This section contains no entries.
AR 25- 2^ 24 October 2007 95
l^anningB^000^^330
UNCLASSI FI ED PIN 08i 055-000
ManningB_00016331
USAPD
ELECTRONIC PUBLISHING SYSTEM
OneCol FORMATTER WIN32 Version 253
PIN: 081066-000
DATE: 03-24-09
TIME: 11:21:05
PAGES SET: 99
DATA FILE: C:\wincomp\r25-2.fil
DOCUMENT: AR 25-2
SECURITY: UNCLASSIFIED
DOC STATUS: REVISION
ManningB_00016332
SE86
Questionaire For National Security Positions
SE328
Certificate Pertaining to Eoreign Interests
A^^endix 8
Sample Acce^tat^le t^se policy
8 - 1 . Purpose
Thisappendixprovidesasample AUP that maybeused by organizations to obtainexplicit acknowledgements from
individuals on their responsibilities and limitations in using ISs.
8- 2. Explanation of conventi ons in sample acceptable use pol i cy
Figure8 1,below,illustratesarepresentative AUP.In this figure,text appearing in italicized font should be replaced
with tbe appropriate information pertinent to the specific AUP being executed. Army organizations may tailor the
information in the sample AUP to meet tbeir specific needs, as appropriate.
PROSECUTION EXHIBIT for identification
PAGE OFFERED: PAGE ADMITTED:
PAGE I OF M PAGES
AR 25-2 24 October 2007 61
MannlngB_00016296
Acceptable Use Policy
1. Understanding. I understand that I have the primary responsibilily to safeguard the
information contained in classified network name (CNN) and/or unclassified network name (UNN)
from unauthorized or inadvertent modification, disclosure, destruction, denial of senrice, and use.
2- Access Access to this/these network(s) is for official use and authorized purposes and as set
forth in DoD 5500.7-R, "Joint Ethics Regulation" or as further limited by this policy.
3. Revocability. Access to Army resources is a revocable privilege and is subject to content
monitoring and security testing.
4. Classified infomiation processing. CNN is the primary classified IS for (insert your
organization). CNN is a US-only system and approved to process (insert classification) collateral
information as well as; (insert additional caveats or tiandling instructions). CNN is not authorized
to process [insert classification or additional caveats or special handling instructions).
a. CNN provides communication to external DoD (or specify other appropriate U.S.
Government organizations using the SIPRNET. Primarily this is done via electronic mail and
internet networking protocols such as web, ftp, telnet (insert others as appropriate).
b. The CNN is authorized for SECRET or lower-level processing In accordance with
accreditation package number, identification, etc.
c. The classification boundary between CNN and UNN requires vigilance and attention by all
users, CNN is also a US-only system and not accredited for transmission of NATO material.
d. The ultimate responsibiity for ensuring the protection of information lies with the user. The
release of TOP SECRET information through the CNN is a security violation and virill be
investigated and handled as a security violation or as a criminal offense.
5. Unclassified Information Processing. UNN is the primary unclassified automated
administration tool for the [insert your organizathn), UNN is a US-only system.
a. UNN provides unclassified communication to external DoD and other United States
Government organizations. Primarily this is done via electrons mail and internet networking
protocols such as web, ftp, telnet (insert others as appropriate).
b. UNN is approved to process UNCLASSIFIED, SENSITIVE infonnation in accordance with
(insert local regulation dealing with automated information system security management
program).
c. The UNN and the Internet, as viewed by the [insert your organization), are synonymous. E-
mail and attachments are vulnerable to interception as they traverse the NIPRNET and Internet.
Figure B-1. Acceptable use policy
62 AR 25-2 24 October 2007
Manni ngB_00016297
5. Minimum security rules and requirements. AsaC^^and^orL^^^ system user,the
following minimum security rules and requirements apply;
a. Personnel are not permitted access to and unless in complete compliance with the
(inseri your organization)personnel security requirement for operating inaTOPSECi^ET
system-high environmenL
b. lhave completed the user security awareness-training module. Iwill participate in all training
programs as required (Inclusive ofthreat Identification, physical securlty,acceptable use policies,
malicious content and logic identification, and non standard threats such as social engineering)
before receiving system access,
c Iwill generate, store, and protect passwords or pass-phrases Passwords will consist of at
least 10 characters with2each of uppercase and lowercase letters,numbers, and special
characters, lam the only authorized user of this accounL (Iwill not use user 10, common names,
birthdays, phone numbers, military acronyms, call signs, or dictionary words as passwords or
p^ss-phrases.)
d. Iwill use only authorized hardware andsoftware Iwill not install or use ^ny personally owned
hardware, software, shareware, or public domain software.
e. Iwill use virus^hecking procedures before uploading or accessing information from any
system, diskette, attachment, or compact disk,
f. Iwill not attemptto access or process data exceeding the authorized IS classification leveL
g. Iwill not alter,change, configure, or use operating systems or programs,except as specifically
authorized.
h. Iwill not Introduce executable code (such as,but not limited to,.exe,.com, vbs,or.batflles)
without authorization,nor willlwrite malicious code.
i Iwill safeguard and mark with the appropriate classification level all information created,
copied,stored,or disseminated from the IS and will not disseminate it to anyone withouta
specific need to know.
j Iwill not utilize Army-or OoOprovided ISs for commercial financial gain or illegal activities.
k. Maintenance will be performed by the System Administrator (SA) only
L Iwill use screen locks and log off the workstation when depariing the area
m. Iwill immediately report any suspicious output, files,shoricuts,or system problems to the
(^^ser^ your c^gar^iza^ic^r^^SAand^orlASO and cease all activities on the system.
n. Iwill address any questions regarding policy,responsibilities,and duties to (^'r^serf ^1^7
organrza^iori)SAand^orlASO.
Figure B-1. Acceptable use policyContinued
AR 25-2 24 October 2007 63
Manni ngB_00016298
0. I understand that each IS is the property of the Army and is provided to me for official and
authorized uses. I further understand that each IS is subject to monitoring for security purposes
and to ensure that use is authorized. I understand that I do not have a recognized expectation of
privacy in official data on the IS and may have only a limited expectation of privacy in personal
data on the IS. I realize that I should not store data on the IS that I do not want others to see,
p. I understand that monitoring of (CNN) (UNN) will be conducted for various purposes and
information captured during monitoring may be used for administrative or disciplinary actions or
for criminal prosecution. I understand that the following activities define unacceptable uses of an
Army IS:
(insert specific criteria)
to show what is not acceptable use
to show what is acceptable during duty/non-duty hours
to show what is deemed proprietary or not releasable (key word or data identification)
to show what is deemed unethical (e.g., spam, profanity, sexual content, gaming)
to show unauthorized sites (e.g., pornography, streaming video, E-Bay)
to show unauthorized services (e.g., peer-to-peer, distributed computing)
to define proper email use and restrictions (e.g., mass mailing, hoaxes, autofonwarding)
to explain expected results of policy violations (1^, 2*, 3"", etc)
(Nofe. Activity in any criteria can lead to criminal offenses )
q. The authority for soliciting a social security number (SSN) is EO 939 The information below
will be used to identify you and may be disclosed to law enforcement authorities for investigating
or prosecuting violations. Disclosure of information is voluntary; however, failure to disclose
information could result in denial of access to (insert your organization) information systems.
7. AcknowledgemenL I have read the above requirements regarding use of [insert your
organization) access systems. I understand my responsibilities regarding these systems and the
information contained in them.
insert name here insert date here
Directorate/Division/Branch Dale
insert name here insert Rank/Grade and SSN here
Last Name, First, Ml ' Rank/Grade/ SSN
insert name here insert phone number here
Signature Phone Number
Figure B-1. Acceptable use policyContinued
64 AR 25-2 24 October 2007
Manni ngB_00016299
Prosecution Exhibit 95
18 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
Prosecution Exhibit 9^
18pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibit 9^
ICT^
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
c
o
tn
o
c
tu
-a
Q
^
H
a
H
5
s
g
C/3
UJ
O
^
L
<c <
W k
PL. O
k I
o
o
a:
D, OH 0.
Prosecution Exhibit 98
ICT^
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplementto the original
Record ofTrial
0
M l- M t- I - * M H l- l - i- i- l-> l- i- l- l- i- M t- l- l- l- l- l- i-
!-
i- I - * M
O
o
O O
o
O
o o o o
O O
o
O
o
O
o
O
o
O
o
O O O o
O O O
o
O
LD LD LD LD LD U3 LD kO
vo
LD LD l O I D LD LD I D I D I D I D I D VD I D I D I D I D I D I D I D I D kD
U l U l U l U l U l U l 43. J i J i J i J i J i J i OJ UJ OJ UJ OU U l UJ UJ UJ U l NJ NJ NJ NJ
U l W NJ l-
o
l O 00
en
U l
^ w
NJ O LD 00
vl cn
U l J i UJ NJ M
o
* D CO VJ CJl
S
J
g
?
e
g g g g g g g g g g g g g g g g g g g g g g g g
qq cm
OQ
m qq qq qq
Oq
qq oq oq oq oq oq oq oq oq oq oq oq oq oq oq oq oq oq oq oq oq OQ
CD CD CD
m
CD CD CD CD CD CD CD CD CD CD (D CD (D CD CD CD (D CD CD CD CD CD CD CD CD CD
6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
o
5;
H
>
z
>
NJ
00
o
>
s
z
>
NJ
00
NJ
o o
i n CD
>
X
^
ZT 3 -
3 3
zr 3 "
a
Pt
T3
o
~ v
3 3
n n
p. a.
in
CD 0)
CD CO
OQ OQ
O o
< <
dq OQ
O 0
^ ^
3 3
CD CD
t/1
01 01
oq oq
CD CD
CD CD
CD CD
CD CD
Z3 3
m n
CD CD
>
Ci
o
NJ
o
37 3
3 ZT
I I
v . 3
n
a.
o
c/1
m
O
C
r
UU
NJ
J i
o
>
^
>
Z
^
00
3
O
Q.
s
01 CD
%
<
OQ
O
^
3
CD
oq
O
<
%
<
3
3 w
% %
% ^
? 2. 5
o
>
^
>
z
>
NJ
00
NJ
CD CD
CD m
S ^
CD l-
i i
> X
i i
o
NJ
VJ
o
o o
n
i i
3 ^
3
D
3
n
a.
3
3 -
P+
T3
3
n
Q.
% %
%
<
^
^
3
CD
00
IU
%
%
<
OQ
O
^
3
CD
a>
%
CD
3
o
Ln
m
O
C
UJ
NJ
J i
o
2
z
03
m
zo
73
>
^ s
3
^ ?
a: 3
o
O
5
O
Ou
I D
00
2, ^ t
o
s
H
>
Z
>
NJ
00
UJ
% c %
%
<
OQ
O
^
3
CD
01
%
3
cT
CD
3
n
CD
OQ
O
<
%
^
3
CD
%
%
O
LO
o
5
o
U l
I D
00
3 -
a
T3
3
n
a.
3 -
n
o
o
:K
c
>
5
l
c
2
TD
c
3D
l-
UJ
NJ
%
<
<
CD
3
n
^
M
O
s
z
00
m
Z l
7 :
>
i-
js
t n
O
5
o
UJ
kD
I D
O
>
Ln
I
cn
>
CD
^
NJ
U l
NJ
ZT
3
ZT
n
T3 3 -
a
73
3
n
a.
k
a>
t n
oq
O
<
%
^
3
CD
tn
3
n
p.
in
01
I
I
CD
>
CD
^
NJ
U l
y j
3 -
3
3 -
3
T3
3
n
cs.
o
n
>
z
CD
m
73
73
>
J i
v l
ix
3
3 "
Pt
"O
i v
3
n
a.
o
2
z
03
m
73
73
>
M
CO
ZT
3
ZT
Pt
T3
3
O
a.
S
ZT
Pt
o
3
n
Q.
O
^
H
>
z
>
NJ
2
>
3 -
Pt
T3
3
n
a.
% g %
^ CP Q) fl)
CD CD tD r ?
%
<
%
^
3
CD
01
%
%
<
OQ
O
<
CD
t n
t n
01
%
^ % 5
01
OQ
CD
%
<
OQ
O
^
3
CD
QJ
oq
CD
OQ
o
<
^
3
CD
oq
O
<
oq
O
<
CD
t n
i n
01
oq
CD
03
C
v l
NJ
00
ZT
3
zr
Pt
TJ
3
n
a.
01
CD
%
<
^
^
3
CD
t n
01
OQ
CD
o
z
>
73
o
J i
00
o
o
>
73
>
UJ
o
E
U l
I
7 :
3 3 3
ZT
Pt
X3
ID
pi
ix
3
3 -
Pt
T3
O O
5 5
z z
c n CD
m m
73 73
33 za
> >
>- H
U l U l
O I - '
o o o
O CD O
> >
cn
7^
o
5
2
c
CD
>
3 "
3 d 3
g ^ 3
%
<
ciq
O
^
3
CD
01
%
3
n
ex.
01
CD
oq
O
<
oq
O
<
01
OQ
CD
3
n
a.
01
m
OQ
o
<
%
<
3
CD
in
01
%
ZT
Pt
T l
3 3
o n
C3. O .
3
n
13.
% CD
o
<
oq oq
o o
OQ oq
o o
3 3
CD CD
01 01
OQ OQ
OQ
O
<
%
^
3
CD
"8 "8
%
<
3 %
iS^ftl l ^t D CD' CD i , 2 i , 5 . . . 2 . . $ ^
3 S 2 ? r s ; ? f r 3 p ; > ! ^
% Q;
01 OQ
oq
CD
01
%
CD
(0
(0
3
(D^ (D^ (D (D
2 2 cT
CD
3
n
CD
CD
3
n
CD
CD CD H
O O
g;
o
C
>
^
I
c
2
t )
c
?D
i-
w
SJ
I
Cl
>
CD
5
NJ
U l
NJ
O O
2 2
z z
CD CD
H >
o
>
73
73
>
l-
J>
v l
73
73
>
k-
J i
00
I "
NJ
g
s
U l
CD
CD
C
v l
NJ
00
m (D CD
CD
3
n
CD
i-
O
Z
>
73
O
ro
J i
00
o
CD
3
n
CD
Z
o
ro
Ln
X
7^
m
A
i-
I D
cn
, , 2, CD
CD
3 3
CD
3
CD CD
l- M
o o
n n
> >
z z
ro ro
m m
71 za
73 73
> >
i- i-
U l U l
O
o
ro
>
z
o
75
o
2
2
o
o
>
2
^
n
c
Ul
i-
v l
C l
o
o
O
X
>
o
o
O
X
> 00 00
o
3 3
3 " 3 -
Pt Pt
D T3
o
i:
ro
m
73
g
i-
U l
U l
3 " > ^
T3 v l
3 3 ^
n n 3
Q. CL T l
CD CD
oq OQ
O O
3 3
CO CO
01 a
OQ OQ
CD CD
CD
3
o
CD
O
O
o
I
>
3
n
cs.
%
<
OQ
o
^
3
ct
tn
01
%
CD
(0
CD
3
n
CD
ro
8 2
o
2
z
ro
m
73
?
l-
U l
U l
in
M l - l - t-> t-> l - t- i- H l- l- M l- l- l- l- t- H M M i- l- l- t-> t- M l- M
o o o
O
o o o o
O
o o o o o o o o o o
O
o o o
O
o o o o o o
00 00 00 CO 00 00 00 00 00 00
t CXI 00 00 00 CO 00 00 00 00 00 00 00 CO CO 00 00 00 00 00
i p
I D I D ( D
iS
00
29
CO CO 00 00 00 00 OO
v l v l
v l v l V I v l v l v l v l v l
cn en en
)
cn
R w
M
^ o
U3
5
U l
s
w
.f.,.. o
VP 00
Q cn
U l U l NJ M
o
CD
oo v l
)
U l
f
e
w
t
M
e
\
o':
Awj
NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ
en cn cn cn cn en
Cl C l
cn en cn cn en en en en en cn en en en en
C l
en cn cn en cn
C l
en
NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ M NJ NJ NJ N l NJ NJ NJ NJ NJ NJ NJ NJ
i- M l- M M M l-> M M M l- l- M i- i- i- M l- i- I - " K i- M M M i- i- l- l-> M
00 v l v l v l v l v l V I V I V I V I V I
cn
C l
en en cn
C l
en cn cn en
U l U l Ul U l U l U l U l U l 0/1
o
CO 00 v l
cn
U l J i UJ NJ M
o
CO OO v l
cn
U l tf OU NJ I - *
o
to OO V I
cn
U l J i UJ NJ l -
NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ
O O
o o o o o
O O O
o o o o o o o o o o o o
O
o o o
O
o
O O
I - " l- l-> l- M M M l-> M l- l- I - " I - " h-> i- i- l-> M i- i- M l- i- i-> l- M l- l- M
9 9
o o o o o o
O
o o
cp
o o o o o
O
o o o o o o
?
o o o o
O
g g g g g g g g g g g
o
J i g g g g g g g g g g g g
6
f g g g g g
OU clu OU U l U l U l U l UJ UJ UJ OJ OJ U l UJ OU OU U l UJ OU i l l OU OU OJ U l UJ UJ UJ OU OU OJ
o o o o o o o o o o o o o o o o o o o o
O
o o o o o o o o o
NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ NJ i- H M t-> h-> M l- i- i- M i- I - * 1- * i-
OU OU OU NJ NJ l- M M O O
o o o o o
I D CO I D I D LD CO I D 00 CO 00 00 V I v l V I
h- I - * I - * NJ
o J i UJ NJ J i J i M M o o o O U l UJ NJ NJ NJ M O J i J i h * o on U l U l
UJ NJ NJ v l U l
cn
NJ UJ V I
o
VD O 00 U l U l OU V I NJ 00 V I O J i VO v l
o
00 i - 00 CJl CJl
ro
i l l
_ T)
O in
Ti p3
cn
3C
C
H
O
z
i
m
oo
CD
ra e=>
ll
O a
o
K
5'
3
k
o
ro
73
^
o
ro
73
5;
o o
ro u?
^ is
OU
cn
&
>
Z
o
Ln
O
1/1
o
l / l
^
o
on
O
on
^ ^ ^ ^
UJ I D
NJ
00
v l
cn
oo
C l
00
^ I
2
s
o
s
>
-D
c
H
O
00
o
CO ko OU
o o
ll
m m
^ ^
CO CO
J i UJ
o en
o o
ro ro
E E
o o
CD m
o o
$ $
z z
en cn
vl on
o o
c/1 c/1
O
Z
i i
o
m m m m
oo tn oo LO
m m m LO LO m m
3 3 3 3
CD
e
c
e
c
CD
3 3 3
e
c
e
c
3 3
cr cr cr cr cr cr cr o- er
01 01 01 01 CD CD CD CD 01 01 01 CD CD 01 01
tn tn tn 01 01 01 01 tn tn 01 01
< < < < ^5 ^ ^ ^ < < < ^ ^ < <
B
r
B
r
ro
S
9
P
a
n
s
o_
ro
B
r
9
S
i
9
s
i
9
s
i
3
CO Ln c/1 t / 1
n
a
i
3
g
p
LO Ln
i
d
g
e
t
o
i
d
g
e
t
o
o
s
e
n
a
i
i
d
g
e
t
o
i
d
g
e
t
o
5' 5' 5'
o
s
e
01
ff
01
CD
9
t
e
9
t
e
zi
01
01
r +
o
9
t
e
9
t
e
i
d
g
e
t
o
i
d
g
e
t
o
9
t
e
9
t
e
g g
o
3
g ^
c 2
QT 01
ff ^
o
c c c c
z z z z
n n n n
LO LO LO LO
8 ^ ^
z n n
^ 6 ^ ^
2
SSS
<o > <o <o
o n e
0 o z
z z n
3 Z! C
1 I I
> 5 5
o
3
n
^
c
%
i
M
I
n
^
c
^
i
o
O
c
^
m
<:
>
r-
>
V I
UJ
en
3
CX
01
in
^
c
01
ff
3
L
01
o
X
I
z
>
NJ
o
VI
c n n c c c c
z o o z z z z
c-l z z n n n n
^ 5 6 ^ ^ ^ ^
U2 rn m (n Ln Ln tn
2] 5 ^ Z! Z! Z) Z!
m - rn m m m
O > > O O O O
O
C
LO
c
z
z
o
X
I
z
s
o
on
>
5
o
z
o
o
z
v l
NJ
I D
O
00
o
>
z
73
>
cn
UJ
o
o
T3
o
o
CD
O
73
00
00
^ S S 3 3
CD
ic? CD
c
z
z
CD
g
-<
o
cr cr
01 01
5 a
o
3
X
01
s
3
0)
o
3
X
01
<
01
3
01
<
CD
c
01
a_
01
LO
CD
n
CD
ff
^
o
3
cr
01
< <
LO 01 oq
% s i.
n
QI
CD
n n n n
O O O O
o o
> > >
z
o
m
Z
H
>
n
O
o
ro
c
m
Z
o
>
73
m
LO
cn
en
NJ
2
^
UJ
73
c
LO
>
VI
l->
NJ
n
3
CX
m
<
ro
c
CD
3
o
m n
I i
tn E.
^ %
9L
CD
3
c n c c
Z O Z z
c-1 z n n
^ 5 ^ ^
LO m LO on
n
O
z
n
O
z
o o
rr I' I =- zr r-
> o > o o > >
S o
i i
>
r-
C
f8
i
z z
O O
-n -n
O O
73 73
z z
O
73
O
-n
rn
n
>
|
c
LO
m
O
Z
r-
-<
NJ
U l
UJ
M
NJ NJ
on ! on
(-> , I - *
(JJ I UJ
NJ M
O CD
NJ ' NJ
O I O
l -> M
o o
o
w
o
cn
Ln
M
o
X
>
NJ
NJ
cn
o o
o
OU
NJ I NJ
on on
vl ^en
NJ I NJ
o I o
M i l->
O : O
(b I 6
UJ ! UJ
NJ NJ
U l o n
i-> I - *
OU I UJ
i - : i -
o n j * i I
NJ NJ
O O
NJ M
on on
UJ OU
l - M
UJ NJ
NJ , NJ
O O
NJ NJ
o n o n
OJ OJ
l - M
I-* o
NJ NJ
o o
o I o o o ! o
I - *
o
NJ NJ
on on
t - ^ (->
OJ OU
o o
I D 0 0
NJ : NJ
O O
NJ
on
i -
UJ
o
v l
o o o
o o
OJ OJ
o I o
OJ OJ
O ! O
UJ OU
O ! O
UJ OJ
0 | 0 O O l O O O 0 ! 0 O l O : 0 ! 0
o
0 1
j i
on
O O
cn cn
16 iO
J^ 1 NJ
o o
2
^ 5
30
73
>
M
on
UJ
o 0 0 0
C l C l C l C l
NJ { NJ M ! i - ^
l-> j l - I v l j M
o o
on U,
on on
on OU
O O
U l o n
oil I M
O v l
O O
o o
C ! O
OJ
o
ro
> I
Z '
CD i
7\ I
o
2
0 0
o
2
ro I ro
o '
ro
on I
X !
1
NJ NJ NJ NJ
o n o n o n o n
M M M ! - '
OJ OJ : OU ! OU
O i O 1 O i O
C l i ^on 1 J i I UJ
NJ , NJ I NJ ' NJ
O O O O
I - * l-> I l- I h-i
cp cp o cp
6 i 6 I 6 I 6
l l J (JJ UJ I UJ
cb ! o (=) 6 ! ci3
o o
. -^i *-
o : o
00 l-
o o
^1^
ii
CD
O I o o
OU UJ I OU j
on on ! on
v l on I UJ
(- I M f M
118
o
>
z
>
NJ
0 0
J i
>
! ^
m
73
30
>
M
J i
0 0
NJ NJ NJ NJ NJ NJ NJ
on on on on on on on
i-> M t - " i-> M i - i -
OJ OU NJ NJ NJ NJ NJ
O
O
CO CO OO I D LO
I - * O
CO 0 0
v l
C l
on
NJ M NJ NJ NJ NJ NJ
O O O O
o
O
o
l-> l - l - I - * l-> 1- " M
9
o cp o o o o
6 6 6 6 6 6 6
OU OU OU OJ (JJ UJ LU
(=) 6 6 (b
CD
6 6
l - i - i - i - l -
(-
o o
O
o
O
o o
OU OU
w
OJ OU NJ l -
on oil OU
6 b io on
M OU
NJJ
on
M OU CD
M l - 1- * M l -
U
M
o o
O
o o o o
n > >
7 ;
H
n
H
>
oo
eg c O >
O
z
X X
>
7?
z
7 ;
ro
CD CD
c -< ro
m
<
m
> > > o
ro
m
O
30
ro ro
UJ 3D OU
3D
> > c
CO 30 CO
>
H H
s
CO
>
0 0
l - NJ NJ M
J i
on on
v l
OU NJ
^
on
M
OU
NJ
E
m
E
m
E
m
E
m
m
3
m
3
m
3
CX
cr cr cr cr
CX CX
01 01 01 01
as
01 01
i n (O i n i n
t o i n
m
(O l o
<
< <
< < -<
<
C-)
> >
7 \ H
n
-H
Ol
m
tn C O 01
O
3 3 "
zr
01
^
3
^
cr
OQ OQ
sr -<
O"
<
(0 OJ
as
o
I t
o
cr cr
I
2
OJ OJ
c 7!
3
as
T3
C
n c C f -l
c n c
O Z Z O
z
O
z
z n n z n z n
F
I
D
!
L
A
S
S
V
l
F
I
D
L
A
S
F
I
D
L
A
S
m oo eg
m c/1 m
^
Z Z Z
d
H - 1 I
A
L
O o
I
A
L
3
I
A
L
o
v ^
z
-n
o
z
O
30
o
-n -n
O
O
O
30
Z
X I
R
N
n
>
1
c
m
O
Z
1
-<
NJ NJ NJ
on on on
NJ NJ NJ
CO I D LO
NJ NJ I
on on
NJ NJ
0 0 00
J i UJ NJ M O CD 00
NJ NJ NJ
O O O
NJ I NJ
O O
o
>
O O O o o
O I O ! o
OU UJ j OU
6 61 6
O ' o
J i , NJ
cn I NJ
o
o
81
o
0/1 I
on i n I OU
v l OJ cn
o o o
L/l 00 0/1
o , o
UJ I OJ
6 I 6
o
o
NJ I NJ
V l I o n
O
>
i 7 I > oo oo
X
7 ;
r i
3
CX
as
^
X
01
3
cr
cu
I
X
I Si
< i - <
cr cr
cu 01
t n , i n
< -<
n o
3
cr
01
jo
01
3
3- cr
01 r t
n
ct '
~ 5 S
n n o n
^15
IL
3
cr
01
i n
< -<
^11
Ol 01 , 01
t o I t o I i n I i n
t o
:-< |-<
01 I
0 0
oo
t / > 0 0
oo i oo
o o
oo oo oo
00 oo oo
O
O
30
o
-n
2
Si
r-
C
on
m
O
z
^
O
30
O
-n
3
n
>
il
O
z
^
n
ro o
01 , 01
3
01
t o
n
c
t o
<
n n ro
: 1^
cr cr
ct CD
01
3
cr
01
t o
<
_ >
g'3
E
m
E
m
cr cr
01 01
i n t o
<
<
z
TC
01 01
cr
o c
cr
as
n e c n
_ , 0 | Z : Z | 0 _ , _
, , n z n n z ' n n
5 | 5 : 5 l 5 EI ; ^ j ^
l/l OO m j 00 oo m , L/l I oo
C C ( g C
n
3D
^
-n
o
30
O
-n
12
n
>
c . c
oo oo
m m
O O
z z
^ ^
o
30
o
-n
-n
n !
> I
1'
: c
oo
m
o
z
^
o
3 0
O
-n
2
I n
>
r-
C
oo
m
O
z
I
<
3
cr
01
t o
^
n
01
1
C C
z z
o n
oo oo
O O
30 I 3D
n n
Q! n
> >
1 11
C I c
o o I LO
01
-3
o
ro
>
oo
0 0
<
C C C
z z z
n n n n
I I I I I r
C , C i c
n n
S 5
oo oo
oo oo
n
5
0 0
0 0
n
>
O ! O O I O I O I o o
o o
30 30
o o
-n -n
3 Z!
n n I
> >
r - . I
C C
o o l / l
m m
C O
z
Prosecution Exhibit 103
1 page
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
^
r-j
cn
n
I ^
3
o
<
(T>
CD
t/1
CL
Ol
CD
t/1
X
CL
Ol
ct
t/1
t/1
<
r
Qi
n
2"
TD
X_
Vt
X
3>
yO
Ln
>
o
Ln
>
z
J>
J>
LO
00
ro
o
73
o
o
o
C
oo
>
CO
-vl
LO
CD
CZ
I
ro
o
3 b- ?4-
o
n
o
i
o
3
OJ
O
CT.
cn
i . 3 g- g-
o o o
00 00 00
J> J>
>
cn
CTl
cn
ZL
%
X
O O
o
> > >
o o o
cn
CO
ro
ro ^
V3
>'
00 J i
br i r i r
3 3_ 3.
o
>
LO
3
I >
73
>
CO
cn
o
>
Ul
3
J>
73
>
o
J>
z
7^
J>
yo
j >
CO r o
CJ \ o
LD
3 3 ?
t
o
o
J i
o
J i t
o
t
o
o
CO
t
o
t
o
t
o
o
t
o
t
o
o
J i
o
- f i t
o
t
o
t
o
M
a
y
:
M
a
y
M
a
y
:
M
a
y
M
a
y
M
a
y
M
a
y
3
Cu
M
a
y
M
a
y
M
a
y
M
a
y
M
a
y
M
a
y
M
a
y
M
a
y
M
a
y
o o o o O o o o O o o O O o O CD o
CD v J oo - vj v J
ro
CO
o
ro
o
O
ro
o
O
z
o
o O
ro
o
ro Z
O
O
J i
o
ro LO
cn
O
CTl
o
v J
CO
cr.
o
CO
I
Z
O
:
cn
LD
- f i
O e
o
:
J i
CO
o
CO
!Z
ro
ro
r j
v J
o\
CO
O
S
CO
ro
o
en
cn ^
cn
o
J i
o ro Z
Z
:
!Z
L J
O o
ro CO
CO
|ZZ
1
Cl
u
8,
m
PROSECUTION EXHIBITION for idi^icalion
PAGEOFFERED: PAGE ADMITTED:
PAGE I OF I PAGES
TD
0) f j
LL 3
U
0)
E
<D
*iAi
z
5:
z
d
a. Ct
CO
Q i
CO
o
1
CD
^ CM 4-
o
CM CD
LD O \D
O
I - l
CD
O O CD
ID
o
LT)
CD CO CD
O
o
CD
(M
N
JD
S
t/i
C OJ
? C C
(D CM
I Nl >
CM - q
c ^ ^ 1
ID ID
J - j _ i c
? ^ :
I CD ID
- >- CZ
a
PROSECUTION EXHIBIT I05"for identification
PAGE OFFERED: PAGE ADMITTED:
PAGE I OF f PAGES
UNITED STATES OF AMERICA
V.
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
Mr, Jacob Grant
DATED: l^^June 2013
It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that i f Mr. Jacob
Grant were present to testify during the merits and pre-sentencing phases of this court-martial, he
would testify substantially as follows:
1. I currently serve as Contract Task Lead for CCJ6, assigned to the Active Cyber Defense
Branch at U.S Central Command's Headquarters (USCENTCOM) on MacDill Air Force Base
(AFB) in Florida. In this capacity, I am responsible for conducting various levels of Cyber
Operations for USCENTCOM and Overseas Areas of Responsibility (AOR)including
Computer Network Defense (CND) activities. Computer Network Attack (CNA) planning &
analysis, and the analysis and reverse engineering of Computer Network Exploitation (CNE)
activities in order develop effective countermeasures. I am the lead for our "in-house" Computer
Emergency Response Team (CERT). In this capacity, I perform in-depth forensic analysis of
CND alerts, flow analysis, or interpretation of threat information to include security
compromises, network intrusions, and malicious logic outbreaks. I have held this position for
four and a half years. At the time of my involvement in this case, I was the Senior INFOSEC
Analyst with the Information Assurance (IA) Branch of the J6 USCENTCOM. I have also been
an IA Watch Officer, a Senior Analyst, and a Senior Engineer. I served for two years as an
enlisted Airman working in technical control and network engineering.
2. I am a Certified Information Systems Security Professional (CISSP) (2008). I have a Top
Secret/SCI security clearance. I have Associates degrees in Electronic Systems Technology and
Avionics Systems Technology. I am a Cisco Certified Network Associate (CCNA) (2003) and a
CORE Impact Certified Professional (CICP) (2013). Some of the network security and
associated training I have received includes: McAfee Network Security Platform Administration
(2013), ArcSight ESM Use Case Foundations (2012), EnCase Computer Forensics 1 (2012),
ArcSight Logger 5.0 Administration and Operations (2011), Basic Malware Analysis Using
Responder Professional (2010), Ethical Hacking (2008), McAfee Host-Based Security Systems
(2007), Information Technology Service Management (ITSM) (2007), and Cisco Securing
Networks w/ PIX & ASA (SNPA) (2007).
3. I became involved in this case for two reasons. From 19-20 August 2010,1 was involved in
the collection and transfer of audit logs from the USCENTCOM SharePoint on the
USCENTCOM SIPRNET web server. At this time, I was also involved in the identification,
collection, and transfer of information housed within that SharePoint site. Our collection
focused on the SharePoint because I had identified it as the location of charged documents based
upon the SIPRNET webpage address of those documents. Further, Special Agent (SA) John
/^P-
PROSECUTION EXHIBIT i l Ut f or idep/fication
PAGE OFFERpn /
PAGE_i J W ^
Wilbur, with whomlwas working, was interested in the contents of the USCENTCOMJAG
folder.
^. The USCENTCOM SharePoint server isatool to create an intemet interface that allows users
with access to the site on SIPRNET to collaborate, f:^r example, by sharing l^les. The SharePoint
itselfis only accessible via SIPRNET,soausermust access it via secure systems. At that time,
it was identil^ed at IP addresses 131.2^0.^7.23 (l^r the SharePoint database cluster),
131.2^0.^7.^, and 131.2^0.^7.7(lor the web portal fi^ont end orthe portion accessible by
SIPRNETusers). The database asawhole occupied several terabytesof space. The server
supporting it, IromwhichlpuIIed the logs and other information at issue, is physically housed on
virtual machines withinacluster,inadata center, onastorage area network (SAN). Only
authorised USCENTCOM HeadquartersJ^personnel are granted access to the l^cility. The
data center is protected by badge access, cipher locks,video surveillance, and an access roster.
5. The audit logslreferenced herein are Intemet Information Systems (IIS) or Windows server
log ltles,which capture the IP address of the USCENTCOM SharePoint server. The logs do not
capture any remote or external IP addresses. The logs only capture the dates and times
documents are accessed on the SharePoint server, as well as related activity on the SharePoint
server.
^. For collection as evidence by SAWilbur, these logs were pulled by the intemet server
maintenance team. Iknowthis becauselwas there when they retrieved the information. These
logs saved inastandard text file, or".txt"f:^rmat. Ibumed these logs ontoahard drive and also
ontoaDVD. Iknow these devices were clean of data becauselpersonally wiped all information
from the hard drive and laptop, and created the image lor the hard drive on which the logs were
burned. Further,Iperlormedahash value match to verily that the logs provided were saved
accurately onto thediskTheDVDwasred.Imarkeditwith the title "CIEUSR DATA".
ThisDVDcontainedthefiIes"CENTCOMCIESharePointHASHMD5SHAlpdf^,
"CENTCOMHO CIE^SharePointHASH MD5SHAltxt","webl^ip",and"web2^ip" The
lirst two liles contain the hash value inl^rmation validating the accuracy of the log inlormation
collected. "Webl.^ip" contained the weblog data IromlDecember 2009 until 30 July 2010,
pertainingto the USCENTCOM serverassignedIP address 131.2^0.^7.^."Web2B^ip" contained
weblogdatafromlApril2010until30 July 2010, pertainingto the USCENTCOMserver
assigned to IP address 131.2^0.^7.7. ProseentionE^bibit^I^orldenti^cation are these
SharePoint server logs.
7. Afl:erbuming the log inf:im^ation to theDVD,Isigned the evidence to SAWilbur using the
providedDAForm^l37 Evidence Property Custody Document. The disk was recorded onaDA
Form^l371abeIed as document number (DN) 122-10. Irecogni^e this as BATES number:
00^11111. Iknowthis becauselsigned that f:^rm and recognise my signature on it. Iwould
recognise the evidence itselfbecauselwrote the label on the disk and bumed it. Idid not alter
the information or the devices on which it was housed in any way.
8. The information housed on the SharePoint server, mentioned previousIy,was accessed via
SIPRNET andlocatedintheJAGfolderon the USCENTCOM SharePointpage Wecollected
this information lor two reasons. First, collecting this information shows what content was
originally available onthe USCENTCOM server to SIPRNETusers. Second, this inlormation
helps put the log data we collected into context.
9. lassisted SAWilbur in collecting this inf:^rmationl^om the SharePoint server. Toretrieveit,
we used two blank CCIU SATAhard drives. Iknowthese are clear hard drives because, in
accordance with USCENTCOM policy,Iscanned them f:^r malware and viruses belore they
were used to gather the evidence. Having loundnone,Iknew they were suitable lor evidence
collection. Tocollect this inlormation,we also used an approved CCIU laptop. Ihookedthis
laptop to the SIPRNETusingaCCIUissued USB cable and drive dock. Wethen connected the
previously scanned hard drive to the laptop. SAWilbur used that connection to recover the
information at issue.
j ^.' ^^v.j Zf^r
THOMAS F. HURLEY
MAJ, JA
Military Defense Counsel
ASHDEN FEIN
MAJ, JA
Trial Counsel
BRADLEY E. MANNING
PFC, USA
Accused
UNITED STATESOF AMERICA
Manning, Bradley E,
PFC, U.S. Army,
HHC, U S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer, Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
Ms^Florinda^ltite
Jnne2013
It is hereby agreed by the Accused, Delense Counsel, andTrial Counsel, that ifMs.
FlorindaWhite were present to testily during the merits and pre-sentencing phases of this court-
martial,she would testily substantially as lollows:
1. lam the Conliguration Management Lead lor the Distributed Common Ground System Army
(DCGS-A)program. Igraduatedwithadegree in computer science inl991. Thereafler,I
completed additional courses in computer science. lhave experience with Linux and Windows.
AdditionaIly,Ihave experience asaprogrammer, system administrator, network administrator,
and system engineering. Ispeciali^e in computer management,whichisasubspecialty of
systems engineering. From2005-2010,IworkedasacontractorontheDCGSAprogramlor
whichlcurrentlywork. Asacontractor,lworked as an analyst and in conliguration
management.
2. Cttrrently,Iwork lor Communications-Electronics, Research, Development and Engineering
Center(CERDEC)Sol^ware Engineering Directorate (SED)at Aberdeen Proving Grounds,
Maryland. CERDEC is the United States Army inlormation and technologies and integrated
systems center. SED provides sol^ware acquisition and software engineering support to Army
tactical systems, to include creation ofconcept, concept development, demonstration of concept,
production and development, and operations and maintenance, thereby developing and
supporting sofl:ware systems throughout their lilecycle. SED also provides inlormation
assurance and determines the requirements and necessary tools to complete tasks. Software
products developed by SED supports Army war lighting eflorts. DCGS-Aisacomponentof
SED.
3. DCGS-Ais the Army^sprimary system to post data, process inlormation, and disseminate
intelligence, surveillance, and reconnaissance information about terrain, threats,weather, and
other inlormation relevant to Servicemembers. DCGS-A is the approved system used by
intelligence analysts (35F Military Occupational Specialty). DCGS-A provides commanders the
ability to receive intelligence l^om multiple sources and intelligence systems. Moreover, DCGS-
Aensures each pieceof approved hardware and sofl:ware is secure, stable, and compatible with
existing systems.
^. As the Conliguration Management Lead,lensure sofiware and hardware lor each system
meets approved specilications and lollows approved builds. The approved builds are also known
as baselines. Each baseline consists ofapproved sofiware and hardware. The software is
speciltcally listed by program and version number. Hardware is specilically approved by type
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
PAGE ^ OF ^ P ^ ^ i ^ ^
andmanul^cturer. Aspecilic baseline is described inaVersion Description Document (VDD).
The VDD states each authorised component ofabaseline. Any sol^ware or hardware not listed
in the VDD is not authorised and is not part ofthe baseline.
5. The baseline is developed throughadeliberate process. The Program Manager (PM) ofeach
system approves each respective baseline that falls within the PM^ssystem. The baseline is
tested lor stability. Stability means that the system itselfis stable and that the system is stable
when interacting with other approved systems. Stability is important because the computer
system completes important tasks lor Servicemembers and the system must work at all times,
especially inadeployed environment. The baseline is also tested lor security. Security means
the system is secure by itselfand when it interacts with other approved systems. Security is
important because some ofthe computer systems contain classilied inlormation. The
information is used by Servicemembers to complete their missions, and the systems maintain
security so only authorised users can access the inlormation. Ensuring stability and security
requires extensive testing. Each new baseline is accredited, and any changes to the baseline
must be certiliedafl:er undergoing the vetting process.
^. Any change to the baseline requires new testing ofthe new baseline becauseasingle change
can aflectasystem^ssecurity or its stability. The process to make changes to the baseline begins
whenausersubmitsarequestidentilying requested capabilities. Aflerarequest has been
submitted, the request goes belore the Engineer Review Board (ERB). The ERB is comprised of
subject matter experts, engineers, and testers. The ERB analyses and assesses the requested
changes lor eflectiveness and costs. The ERB also assesses any eflect the requested change
could have on the network. The ERB providesarecommendation based on its conclusions and
testing to the Conliguration Control Board(CCB). The CCB is comprised of conligtiration
subject matter experts, engineers, and the relevant PM. The CCB then makesalinal
determination based on the effectiveness and cost. Changes to the baseline can be approved in3
days up and tolyear depending on the complexity ofthe system and the nature ofthe requested
change. The process has been designed to maintain system security and stability.
7. Aflerabaseline has been approved,acomputer image is created. This computer image is
installed onto approved systems. An image is used to ensure that each system receives exactly
the same sofl:ware. Using the same image ensures that the DCGS-A program only tests one
image instead oftesting each system. This increases the likelihood the software will comport
with the approved baseline.
8. ProseentionE^bibit(PE)^istheVDD. PE^describes the baseline loraBasic Analyst
Laptop (BAL). lam lamiliar with the VDD in PE^and other VDDsbecauselwork with them
daily in my position as the Conliguration Management Lead. As the Conliguration Management
Lead,Iinspect images to ensure the image meets the standards set lorth in the baseline. Icheck
each program individually to ensure it is the correct program and specifically the correct version
ofthe program. Any sofl:ware not approved in the baseline, as reflected in the VDD,is not
authorised. Specilically,evenifasof^ware program is authorised, the program cannot be added
to the image unless it is an approved version fi^om approved sotirce. That is, the approved
version ofthe program must be obtained Irom an authorised source. Programs obtained Irom
unauthori:^ed sources, such as the Intemet, could obtain viruses,Tro^an horses, or other malware
that would^eopardi^e both system security and stability.
9. Wget isacomputer program that retrieves content Irom web servers, and is part ofthe GNU
Project. Wget supports downloading via HTTP,HTTPS, and FTP protocoIs,which are common
protocols used on the intemet lor webpages. Wget isali^ee network utility commonly used to
retrieve liles Irom the intemet. It has been designed lor robustness over slow or unstable
network connections. Ifadov^load does not complete due toanetworkprobIem,Wget will
automatically try to continue the download Irom where it Iefl:olf, and repeat this until the whole
Itle has been retrieved. Wget is non interactive in the sense that once started, it does not require
user interaction. TomyknowIedge,Wget has never been authorised as part of any DCGS-A
baseline, nor has it been requested lor approved use. As such,Wget has never been reviewed by
our program andlcannot say whether it would be approved lor use or not. The VDDs created
lor V3.0P17,V3.0P18,V31P3 each didnotauthori^e Wget onaDCGSAcomputerorloritto
be used byaDCGS-A user.
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
ALEXANDER ^^^ELTEN THOMASFHURLEY BRADLL^MANNI NG
CPT,JA MAJ,JA PFC, USA
AssistantTrial Counsel Military Delense Counsel Accused
Prosecution Exhibition
ICE^
classitied
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classi^ed
supplementto the original
Record ofTrial
c
o
eg
u
Q
LU
H
H
Z
Q
<
LU
a
CQ <
X ^
X
LU
z
o
c
aj
-o
a
f-
Q
LU
t - LU
C/]
LU
a
<
CL
u
LU
LL
O
LL
o
C/D LU LU
o a a
< <
C- C_
ManningB_00527449
DraftiThe Most Wanted Leaks 7009-sort - Wikileaks Page 1 of 12
DraftiThe Most Wanted Leaks of 2009-sort
From Wikileaks
Somewhat sorted entries of the most-wanted list. Work in progress, TODO: Add brief, entity and date for each entry.
Contents
1 Austria
2 Australia
3 Bahrain
4 China
5 Colombia
6 Finland
7 France
8 Germany
9 Greece
10 Guatemala
11 Italy
12 Kenya
13 Libya
14 Madagascar
15 Mali
16 Mexico
17 Niger
18 Norway
19 Puerto Rico
20 Rwanda
21 Russia
22 Slovenia
23 Sudan
24 Syria
25 Switzerland
26 Swaziland
27 Trinidad and Tobago
28 Uganda
29 United Kingdom
30 United Nations
31 United States
32 Vatican
33 Intemational organizations
Austria
Austrian e-Voting system used in students elections.
Date: 18 May 2009
Brief: We seek for details about Austrian voting system used in students elections, which includes but is not limited to
source code and certifications.
Entity: Scytl (http://web.archive.org/web/2009l 105061330/http://www.scytl.com/) (programming)
Entity: Austrian Federal Computation Center
(http://web.archive.org/web/20091105061330/http://www.brz.gv.at/Portal.Node/brz/public?
gentics am=PCP&p.contentid= 10007.17664) (hosting)
Entity: Ministry of Science (http://web.archive.org/web/200911050613 30/http://www. bm wf gv at/submenue/engi ish/)
(initiator)
Entity: Robert Krimmer (http://web.archive.org/web/2009110506l330/http://www.e-voting.cc/topics/Team/) (consulting)
E-Mail traffic between Josef Proll and Christian Konrad.
Date: ???
Brief E-Mail traffic between minister of finance Josef PrOll and Christian Konrad, who is advocate general of Raiffeisen
bank.
Entity: .losef PrOll (josef [email protected])
Entity: Christian Konrad
<
ManningB_00410572
http://web.archive.Org/web/20091105061330/http://wikileaks.org/wiki/Draft:The_Most...
12/6/20! I
DraftiThe Most Wanted Leaks '1009-sort- Wikileaks Page 2 of 12
E-Mail traffic of Anton Mahdalik with Michael Haupl and/or Michael Ludwig
Date: ???
Brief E-Mail traffic of FPO delegate Anton Mahdalik with Viennese mayor Michael Haupl and/or deputy mayor Michael
Ludwig containing threats when renting municipal ground to the Viennese trailor park ("Wagenplatz Wien").
Entity: Anton Mahdalik ([email protected])
Entity: Michael Haupl ([email protected])
Australia
ACMA URL blacklist
Date: 19 March 2009 and later
Brief Versions of the ACMA URL blacklist newer than 19 March 2009. WikiLeaks previously released three versions of
the list, two of which included WikiLeaks or its subpages
Entity: Australian Communications and Media Authority
(http://web.archive.org/web/20091105061330/http://www.acma.gov.au/WEB/HOMEPAGE/PC=HOME)
Censorship technology in Australia
Date: 2009
Entity: Australian Communications and Media Authority
(http://web.archive.org/web/2009l 105061330/http://www.acma.gov.au/WEB/HOMEPAGE/PC=HOME)
Entity: Enex Testlabs (http://web.archive.org/web/20091105061330/http://www.testlab.com.au/)
Entity: Watchdog NZ (http://web.archive.org/web/2009l 105061330/http://www.watchdog.net.nz/)
Entity: [www.iwforg.uk Intemet Watch Foundation]
Entity: Exetel ISP (http://web.archive.org/web/20091105061330/http://exetel.com.au/news_main.php)
Brief Full details of filtering hardware/software vendors participating in government-sponsored ISP-level censorship
technology trials, including (but not limited to):
Any and all communications between filler vendors and govemment departments prior to, during, and after the trials
Any and all transactions, contracts, and other financial arrangements involving filter vendors
Details:
URL blacklist(s) used during above trials. Alleged (by govemment) to be ACMA URL blacklist.
Full statistical breakdown of results of above trials (in the event that Enex Testlabs do not make them publicly
available).
URL blacklist as used by Watchdog NZ during private censorship technology trial by ISP Exetel in May 2009.
Alleged (by Watchdog) to have been IWF list (see United Kingdom).
Full statistical breakdown of results of Watchdog/Exetel's censorship technology trial - Exetel's official response
(http://web.archive.org/web/20091105061330/http://forum.exetel.com.au/viewtopic.php?f^4tfet=31857*p244129)
seems lacking.
Annual NSW Police test
Brief Written exam NSW police officers must take annually before they can be issued with Tasers.
Entity: NSW Police (http://web.archive.org/web/20091105061330/http://www.police.nsw.gov.au/)
Bahrain
Documents regarding changes to country's demography.
Brief Documents disclosing the number of citizenships that have been granted in the last few years, in an effort to change
the country's demography. See Political naturalisation!I]
(http://web.archive.org/web/20091105061330/http://www.ihrc.org.uk/show.php?id=2860).
China
Golden Shield Project
Brief A list of URLs and keywords censored filtered by the Golden Shield Project (Great Firewall of China). WikiLeaks
has previously released related information, for example, watch lists, policies and several thousand URLs for CCTV and
Baidu, bul not for general http filtering.
Entity: Ministry of public security (http://web.archive org/web/2009110506l330/http://www.mps.gov.cn/)
Genocide Olympics campaign
Date: 28th March 2007
Brief Policy options on Darfur formulated in response to the so-called Genocide Olympics campaign led by American
actress, Mia Farrow, and notes of meetings in 2007 between Stephen Spielberg and Chinese Foreign Ministry officials prior
to Spielberg's resignation as Artistic Director of the 2008 Beijing Olympics.
Colombia
l\/lanningB_00410573
http://web.archive.org/web/20091105061330/http://wikileaks.org/wiki/Draft:The Most... 12/6/2011
DraftiThe Most Wanted feak^ ^009 sort Wikileaks Page3ofl2
^ Surveillance ofcitizens and organisations
^ Brief The DAS (Departamento Administrativo de Seguridad) is reported to have surveilledawide array ofpublic officials,
private citizens, and organizations Documents wanted: contracts to supply sofiware for intemet surveillance to Colombian
policy agencies and detailsofthe software supplied.
^Entity: DAS (http://web.archive.Org/web/20091105061330/http://www.das.gov.co/)
Finland
^ Tiitisen Lista
^ Brief The so called Tiitisen Lista, the list ofl8persons claimed to have been in active contact with East German security
services (Stasi).The list was received from Ihe West German intelligence services (BND) inl990 and since classified by
the order ofPresident Koivisto as adviced by the headofthe Finnish Security Police (Suojelupoliisi),SeppoTiitinen.lt is
mmoured that several current or former top Finnish politicians appear on the list.
^Entity: Stasi (http://web.archive.Org/web/2009II0506I330/http://enwikipedia.org/wiki/Stasi)
^ Entity: Koivisto
(http://web.archive.Org/web/20091105061330/http://wwwvaltioneuvostofi/hakemisto/ministerikortisto/ministeritiedotasp7
nro^167)
^ Entity: Suojelupoliisi (http://web.archive.Org/web/20091l05061330/http://www.poliisi fi/supo/)
France
^ Nicholas Sarl^ozy'health report
^ Brief The Monthlyllealth Report ofPresident Nicolas Sarkozy,as promised by himselfduring the last presidential
elections.
Germany
DCensorshipinGermany
^ Details:
^ The censorship filter list for the proposed national, mandatory censorship system. The list will be compiled by
German federal criminal police BKA and distributed to intemet service providers
^ The contentsofthe contract between the BKA and some ISPs that has already been signed, but is kept secret due to
"public safety" and copyright concems(seehttp://b1og.fefe.de/'^ts^b4fa8af^).
^ The List ofMediaHarmfii1to^oungPeop1e(the censorship system already in place) The "virtual media" part ofthis
list is distributed to search engine providers and is illegal to publish It probably could be reverse engineered using
the differences between googlecom and googlede search results Also, ifyou want to knowifaspecific medium is
ontheIist,youcansendanenc^uirytoIiste^bundespruefstel1ede(maiIto:1iste^bundespruefstel1e.de)
("Bundesprufstelle" is the agency responsible for keeping the list)
^ Entity: Bundesprufstelle (http://web archive.Org/web/2009I105061330/http://www.bundespruefste11e de/)
^Entity: BKA (http://webarchiveorg/web/20091105061330/http://wwwbkade/)
^ Politician'sStasi files
^ The Stasi (http://webarchiveorg/web/20091105061330/http://en.wikipediaorg/wiki/Stasi) files ofFederal Chancellor Angela
Dorothea Merkel (maiden name Kasner) and other leading politicians, which are known to exist, but withheld from public
^ Operation Gladio
^ Brief The Stasi files relating to operation Gladio/stay behind organisations in relation to right-wing terrorism in Germany
(http://webarchiveorg/web/20091105061330/http://wwwheisede/tp/r4/artike1/30/30390/lhtml),asperaparliamentary
rec^uest by the Green party.
^ Atlas OerWut
^ Brief The so cal1ed"At1as der Wut",adocument about the risk of riots in different german regions The list is said to be
updated regulary and wasters! written in 2005.
^ ^he list ofNPO party members
Greeee
^he Athens Affair
^ Brief Documents related to the Athens phone tapping affair that have yet lobe re1eased(inc1uding those from countries other
thanGreece)Context(http://web.archiveorg/web/20091105061330/bttp://www.spectrum.ieee.org/telecom/security/the-athens
atfair/0)
Guatemala
ManningB_00410574
http://web.archive.Org/web/20091105061330/http://wikileaks.org/wiki/Draft:The_Most... 12/6/201
Draft:The Most Wanted Leak^ ^009 sort Wikileaks Page4ofl2
1^ Plan Victoria ^:^^ Plan Sofia and Plan l^erme^a^^
^ Brief All documents on Plan Victoria 82, Plan Sofia and Plan Firmeza 83.
^Detail:
Within the processoftrying to bring military personal involved in human rights violations and massacres that happen
during the civil war in Guatemala to justice,the military have been rec|uired to declassify many war documents Inacase,
that went all the way to the SupremeCourtofGuatemala, the Court dictatedasentence that confirmed the obligationof the
Ministry ofDefenseofGuatemala to hand over theofficialdocumentationoffour specific military operations: Campana
Sofia 82,Victoria 82,Firmeza 83 and Operacion Ixil.The Supreme Court sentence indicated that the archives had lobe
declassified
These military operations were carried out in the 80s. According to the CEH, Historical Clarification Commission of
Guatemala final report contained in "Guatemala: Memory ofSilence",these military operations resulted in massacres and
severe human rights violations.
The MinisterofDefenseAbrahamValenzuela only delivered partial information about plans Victoria 82 and Firmeza 83,
r^o ofthe four rec|uested plans He indicated that he had no knowledge ofthe other two plans before he became Minister of
Defense and that he ignores where the documentation could be. He stated that he could not deliver the complete plans
"Victoria 82"y "Firmeza 83" because certain information was considered state secret andaconcem ofnational security.
"Plan Sofia",aderivativeof'Plan Victoria 82",was ofspecial concern to human rights activists^ this plan was conceived in
July 1982, four months al^er General Efrain Rios Montt came into power
^ The CEtt archives
^ Brief Final report ofUnited Nations" Historical Clarification Commission(CEH) into the killing of200,000 Mayan people
and the involvement ofthe US govemment and American corporations.The report official sources(mi1itary interviews,
campaign plans,etc)are kept secret by the UN in N^C.
^ Detaif
The United Nations" Flistorical Clarification Commission(CEFl) for Guatemala issuedareport where the US govemment
and several American corporations were accused ofcomplicity in the genocide of nearly 200,000 Mayan people during
Guatema1a.^sbloody36-year civil war The final 3,600-page CEH report clearly places the blame for most of the 200,000
deaths on the "racist" policy ofthe Guatemalan govemment and holds the country^s military and paramilitary forces
responsible for the actual killings, tortures and disappearances.
However,!! accuses the US of directly and indirectly supportinga"'fratricidaIconfrontation"by providing sustained
training, arms and financial aidThe report is based on the testimony of9,200 people from all sides ofthe confiict and other
documents"^, classified and Secret, protected in the UN headc^uarters in N^C The CEH investigated 42,000 human rights
violations, 29,000 ofwhich resulted in deaths or disappearances and therefore, the documents under UN custody are
fundamental for the prosecutionofthoseresponsibleofIhe crimes.
^ Goldcorp affair
^ Brief ^Documents on Canadian corporation named Goldcorp withamining operation in Guatemala, especially
information on where the Gold they extract is processed and who is buying the go1d(we think it might beaSwiss
company).
^ DetailACanadian corporation named Goldcorp hasamining operation in Guatemala with poor environmental conditions
and harming health ofmany workers andacommunity asawhole Where the Gold they extract is processed7 Who is
buying the gold(we think it might beaSwiss company)^
^^^^y
^ Italian censorship list
^ Brief The^//Italian censorship, ofwhich Wikileaks currently only hasasubset.
I^enya
^ Reports on high level corruption in l^ihaki government
^ Brief The international investigative firm Kroll associates produced at least four reports on high level Kenyan corruption
after first term of the Kibaki government Adratt version of oneofthe reportsThe looting ofKenya, was previously
published by WikiLeaks.The reports were given to selected members ofPresident Kibaki"s cabinet at the time and are
likely still held by http://wwwkrol1.comuk^,notably lead investigator Andrew MarshalL
^ Entity: President Kibaki
^ Entity: Kroll (http://web.archive org/web/20091105061330/http://www kroll com ukB)
Eihya
^ Arrangements with the Sudanese government
l^a^^ingB^004^0575
http://webarchiveorg/web/20091105061330/http://wikileaksorg/wiki/Draft:The_Most... 12/6/2011
Draft:The Most Wanted Leaks ^009 sort Wikileaks Page5ofl2
^ Brief Documents indicating arrangements with the Sudanese government to grant land in Darfur to Arab settlers Irom
Libya(Civilians and adminisrators on the gruond in Darfiir indicate this has been taking place).
Madagascar
Both sides ofthe political confiict in Madagascar are crying fouls about the deals made by their counterparts with foreign entities The
releaseofthe official documents with respect to contract negotiations about:
^ Oil exploitation in the region ofBemo1anga(SouthofMadagascar)byTota1^others
^ Detail: Oil and Gas in Madagascar-Industry Overview
(http://web.archive.Org/web/20091105061330/http://www.mbendi.com/indy/oilg/at/md/p0005.htm),Infos onTotal
licensing (http://web.archive.org/web/20091105061330/http://www.scandoi1.com/moxie-bm2/news/tota1-farms-into-the-
bemolanga-heavy-oil-license-ishtml)
^ an obvious one but the proposed final contract before rejection ofthe land deal with Daewoo Logistics.
^ The recent agreement with Saudi investment group on staple products and proposed ^2 billion USD investment
^ The revised mining exploitation agreement with Sheritt in Ambatovy and RioTinto in Fort-Dauphin.
^ Least but not last, the complete list ofcurrent political prisoners and the charges against them
Mali
^ Arrangements with the Sudanese government
^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfiir to Arab settlers from Mali
(Civilians and adminisrators on the gruond in Darfur indicate this has been taking place).
Me^ieo
^ Agreements between t SA and Peter Herlihy
^ Brief Zapolec indigenous people demand transparency fi^omUS Scholar and full disclosure of all the agreements between
US Govemment and their agencies andU.S geography scholar Peter Herlihy,especially confidential agreements with
Foreign Military Studies Office. Prof Herlihy failed to mention that he received funding fi^om the Foreign Military Studies
Office of theU.S.ArmedForces on the research of""Mexico Indigena" project. Mexico Indigena Project forms part ofthe
Bowman Expeditions, amore extensive geographic research project backed and financed by the FMSO, among other
institutions The FMSO inputs information intoaglobal database that forms an integral part ofthe HumanTerrain System
(HTS),aUnited States Army counterinsurgency strategy designed by Foreign Military Studies Office and applied within
indigenous communities, among others
^ Entity: FMSO (http://web archive org/web/20091105061330/http://frnso leavenworth.army mil/)
^ Entity Peter Herlihy
(http://webarchiveorg/web/20091105061330/http://www2kuedu/^geography/peop1epages/Herlihy Pshtml)
^ Ruta Maya ^0112 Isu^u Challenge
^ Brief Documents to unveil the real purpose of""Ruta Maya 2002 Isuzu Challenge".The convoy was commanded by Ben
NunAvihu, Israeli militar and Moshe Savir,geography expert and around 50 tourists in 40 Isuzu Jeep. Some communities
linked the incursion with biopiracy The terrain they explored is controled by the EZLN
^ Entity: Ben NunAvihu
^ Entity: Moshe Savir
^Entity: EZLN (http://web.archive.Org/web/2009110506l330/http://wwwezlnorg.mx/)
^Corruption around E08APR0A
^ Brief Documents related with the fraud and corruption around FOBAPROA (Fondo Bancario de Proteccion al Ahorro).
^Entity: F0BAPR0A1
(http://web.archiveorg/web/20091105061330/http://www.cddhcugobmx/cronica57/contenido/cont2/fobaprol.htm)2
(http://web.archive.Org/web/20091105061330/http://enwikipedia.org/wiki/Fobaproa)
^ Einancial operations hefore crisis
^ Documentsoftinancialoperationsjustbeforethe financial crisis of1994
(http://webarchive.org/web/20091105061330/http://enwikipediaorg/wiki/1994_economic_crisis_in_Mexico)(somesay
the govemment knew before that the crisis was coming and took advantage ofthe information protecting their interests)
^ World l^ank credit
^ Brief Documents related with the World Bank credit and application ofthe budget to combat swine fiu
^ Entity:Wor1d Bank (http://web.archive.Org/web/2009110506l330/http://www.wor1dbank.org/mx)
1^ Renault program
^ Brief Documents related with the technology currently used in cellphones in Mexico to implement the RENAUTprogram
(http://web archive org/web/20091105061330/http://www.renaut gob mx/RENAUT/) Information about the security
technology used to protect data collected from users
l^ai^oiogB^004^057^
hftp://web.archive.org/web/20091I05061330/http://wikileaks.org/wiki/Draft:TheMost... 12/6/2011
DraftiThe Most Wanted Leaks ^009-sort - Wikileaks Page 6 of 12
Plan Merida
Brief Documents related to the transparency of Plan Merida
(http://web.archive.Org/web/20091105061330/http://en.wikipedia.org/wiki/M%C3%A9rida_Initiative)
Niger
Arrangements with the Sudanese government
Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers from
Niger (Civilians and adminisrators on the gruond in Darfiir indicate this has been taking place).
Norway
Court case between Lyse Tele and Simonsen
Brief The secret verdict in the court case between the ISP Lyse Tele and the law firm Simonsen, decided the 5th of May
2009, where Simonsen demanded Lyse Tele disclose the identity information of a file sharer suspected of uploading a copy
of the movie Max Manus to the file-sharing community.
Entity: Lyse Tele (http://web.archive.org/web/20091105061330/http://www.1yse.no/)
Entity: Simonsen (http://web.archive.org/web/20091105061330/http://www.simonsen1aw.no/)
Puerto Rico
FBI surveillance of Puerto Rico citizens
Brief The FBI has not yet finished declassifying all the secret files related to surveillance of Puerto Rican individuals and
organizations from the 1930-70's http://www.pr-secretfiles.net/index.html (not to mention, large sections ofthe files are
blacked out by the FBI). In addition, there are thousands of secret files produced by Puerto Rican police that were only
briefly made available to individuals themselves, and have now been closed off to the public. These documents provide
evidence of quite a significant spying and intimidation operation by the United States and local police against leftists and
independence movement leaders.
Entity: FBI (http://web.archive.org/web/2009l 105061330/http://www.fbi.gov/)
Rwanda
Financial aid for Laurant Nkunda
Brief Documentation of financial assistance given by the Rwandan govemment to General Laurant Nkunda for operations
in the DRC.
Entity: Laurent Nkunda (http://web.archive.org/web/20091105061330/)iltp://en.wikipedia.org/wiki/Laurent Nkunda)
Russia
VRYAN crisis documentation
Brief Documents related to the VRYAN crisis, especially political documents, analyses of intelligence, and specific steps
taken. Information on the mindset of the Politburo, as well as intelligence services, and what exactly they feared, and how
credible they believed their fear to be.
Maps for Kremlin and military hideouts
Brief Maps, floor plans, and blueprints of Mount Yamantaw and Kosvinsky Mountain.
Technology analysis
Brief Technical plans, manuals, and blueprints for the SS-27 Sickle B (Topol-M), along with the Bulava.
Brief Documents relating to nuclear warplans of the Soviet Union and Russia.
Brief Documents relating to orbital weapons systems, and whether the Soviets ever deployed them (or still deploy them)
such as orbital HANE devices.
Brief A list and description of the various agents prepared by the various Soviet and Russian bioweapons programs.
Indications of whether they developed recombinant DNA based agents, and what those are specifically. Weaponization of
agents, including re-entry vehicle mounting. Doctrine for use, including deniable use. Vaccines and treatments for affected
personnel.
Slovenia
Taped conversations between Slovenian opposition leader and Croatian PM
Brief Taped conversations between Slovenian opposition leader Janez Jansa and Croatian prime minister Ivo Sanader,
recorded by Slovenian intelligence service SOVA.
Date: Summer 2004
Entity: Janez Jansa
Entity: Ivo Sanader
ManningB_00410577
http://web.archive.org/web/20091105061330/httpi//wikileaks.org/wiki/DraftiThe_Most... 12/6/2011
DraftiThe Most Wanted Leak^ ^2009 sort Wikileaks Page7ofl2
^Entity: SOVA
Sudan
^ Salah Gosh and the CIA
DDate:2005
^ Documents detailing discussions during 2005 meeting between Salah Gosh and the CIA(for which the CIA flew Gosh on
private jet from Khartoum to CIA HO) See: http://www sudantribune.com/article php37id article^l0205
^ Mali case
^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfiir to Arab settlers from Mali
(Civilians and adminisrators on the gruond in Darfiir indicate this has been taking place)
^ Libya case
^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers from
Libya(Civi1ians and adminisrators on the gruond in Darfiir indicate this has been taking place)
^ Niger case
^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfur to Arab settlers from
Niger(Civi1ians and adminisrators on the gruond in Darfur indicate this has been taking place).
Syria
^ AssasinationofMehdiBenBarka
^ Brief All the documents related to the assasination, in 1965,ofMehdi Ben Barka still held in France, USA, Israel and
Morocco In1976, thanks to the Freedom of information Act, the US govemement recognized that the CIA had about1800
classified documents about his assassination. Theses documents are still classified.
Switzerland
^ Cornu Report
^ Brief The full Comu Report. See http://en wikipedia.org/wiki/Projekt 26^The_Comu_Report
Swaziland
^ Expense accounts of King Mswati, the ^ueen Mother and the King'swives.
^ Memos from Ministry of Oefense or Police
^ Brief Intelligence memos from the Ministry ofDefence or Police about the pro-democracy organization, PUDEMO.
^ Entity: Pudemo (http://web.archive.Org/web/20091105061330/http://www.pudemo.org/)
^ Entity: Ministry ofDefense (http://web.archive.org/web/20091I05061330/http://www.gov.sz/home.asp7pid^59)
Trinidad andTohago
^ Commission ofEnquiry reports
^ Brief The Report on the Commission ofEnquiry into the construction ofthe new PiarcoAirport.This identified corrupt
practices in the spending ofpublic funds.The Commission's report was delivered in August 2003.Near1y6years later, its
findings have not been made public.
^ Brief Report ofthe findingsofthe current C^^B^^^.^.^/^^t^^^^^iB^ ^^1^1/^^/^^^/t:^^^^^i^^lit^^
^ Entity: Commission Enquiry (http://web.archive.Org/web/20091105061330/http://www.constructionenquiry.gov.tt/)
^ Entity : Piarco airport (http://web.archive.Org/web/20091105061330/http://www.piarcoairport com/)
^ Caroni Bridge collapse
^ Brief The Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafew years ago^ again the
public has not been made aware ofthe report's findings.
i^Date: 2nd August 2008
^ Waterfront t^evelopment Project
^ Brief Acopy ofthe contract for the billiondollarWaterfront Development Project
1^ Entity: 7udecott7 (http://web.archive.Org/web/20091105061330/http://www udecott com/)
DScholarshipssponsoredhyMinistryofCulture
^ Brief List ofrecipients and amountsof scholarships sponsored by Ministry ofCulture for study abroad
^ Entity: Ministry ofCulture (htlp://web archiveorg/web/2009110506l330/http://wwwgov tt/)
^Detail:
l^anniogB^004^057^
httpi//webarchiveorg/web/20091105061330/httpi//wikileaks.org/wiki/DraftiThe Most... I2/6/201I
DraftiThe Most Wanted Leaks ^009 sort Wikileaks Page8ofl2
As far asTrinidad andTobago goes, our govemment tends to pay lip service to the principlesoftransparency and
accountability For instance, there isaFreedom ofinformation Act which, by 1aw,allows the public to seek information
from govemment departments.But quiteoften,when such attempts are made by the citizenry,the govemment bars full
disclosure Depending on how importantapiece ofinformation is to Joe Public, he may actually have to tum to the courts
to "force" the govemment to reveal facts that should be disclosed voluntarily.Followingareafew examplesofdocuments
that should be made public, but have not been:
^ The Report on the Commission ofEnquiry into the constructionofthe new Piarco Airport This identified corrupt practices in the
spending of public funds The Commission's report wa^ delivered in August 2003 Nearly6years later, its findings have not been
made public
^ The Report on the Caroni Bridge Collapse Aman was killed whenabridgecollapsedafew years agoi again the public has not
been made aware ofthe report's findings
^ The Opposition recently brought up in Parliament the issueoftaxpayers'money being used to pay attomeys by state.Although
the public hasaright to know how much ofits fiinds were used in paying said attomeys, the Attomey General refused to disclose
the sums, saying it would be an invasion ofthe lawyers'privacy
^ The same goes forarecent request in Parliament, whereby ^the Minister ofPlanning and Development was asked to producea
copy of the contract for the billion-dollarWaterfront Development Pro^ect^ The Minister's response was that she could not
produce said contract for public discussion because there wasaconfidentiality clause contained therein(foraproject being built
with public funds)
^ The Ministry ofCulture recently awarded scholarships for students to study abroad-when asked in Parliament to disclose the list
ofrecipients and the dollar value ofthe scholarships, the response was that this was private information.
Uganda
^ Ugandan profit-sharing agreements with oil companies in south-western tJganda
^ Brief The govemment ofUganda has recently signedanumberofprofit-sharing agreements with several oil companies
that are conducting explorations in southwestem Uganda. Releasing these documents would beamajor step in increased
transparency with respect to the country's emerging oil industry.
United I^ingdom
^ Censorship in UK
^ Brief List of curtent and expired D-Notices
^ Entity: dnotice (http://web.archive.Org/web/20091I05061330/http://www.dnotice.org.uk/the system.htm)
^ Brief secret gag orders, injunctions and legal threats sent to UK newspapers
^ Entity: legal contact addresses at the Guardian, Daily Mail, Times, Independent, Evening Standard, etc
^ Brief Censorship list for the United Kingdom's "voluntary" filter system.Known to be held byThe Intemet Watch
Foundation (http://web.archive.Org/web/20091105061330/http://www iwf org uk/) Companies and their subsidiaries
which are currently being supplied with the IWF list Most ISP's in the UK haveacopy ofthe IP's on the list
^ Entity:The Intemet Watch Foundation (http://web.archive.Org/web/20091105061330/http://www.iwf.org.uk/)
1^ Irac^ war planning
^ Brief The secret cabinet minutes
(http://webarchive org/web/2009l10506l330/http://news.bbc.CO.uk/2/hi/uk_news/politics/7752009stm)and legal advice
(http://web.archiveorg/web/20091105061330/http://news.bbccouk/2/hi/uk_news/politics/4381379.stm)pertainingtothe
allegedly illegal war and ongoing occupation oflraq.
^ Roger Hollis surveillance
^ Brief UK Govemment documentation into the investigation ofRoger Hollis, head ofMI5 between 1956 and1965,
including the report by LordTrend, into the serious but apparently unproven allegations ofbeingaRussian Spy.
^Entity: M15 (http://web.archive.Org/web/20091105061330/http://www.mi5.gov.uk/)
^ Wythenshawe intelligence centre
^ Brief Documents detailing the information stored and collected by the Wythenshawe intelligence centre [2]
(http://web.archive.Org/web/20091l0506l330/http://wwwtimeson1inecouk/to1/trave1/news/artic1e5683677.ece)
^ Police surveillance on climate change protestors
^ Brief Acopy ofthe police intelligence handed to EON about climate change protestors.13]
(http://web archive org/web/20091105061330/hltp://www guardian.co uk/uk/2009/apr/20/police-inte1ligence-e-on-berr)
^Entity:EON(http://webarchiveorg/web/20091105061330/http://wwweonukcom/)
^ MP expenses
^ Brief The fiill MP expenses data^ how much theTelegraph paid for them.
^ Entity: Dai1yTe1egraph(http://webarchiveorg/web/20091105061330/http://www.telegraph.coukB)
^Entity: UK Parliament (http://web.archive.Org/web/20091l05061330/http://www.par1iamentuk/)
^ Allan Cappelow murder
l^af^f^ii^gB^004^0579
http://web.arehive.Org/web/20091105061330/http://wikileaksorg/wiki/Draft:TheMost 12/6/201
DraftiThe Most Wanted Leaks ^009 sort Wikileaks Page9ofl2
^ Brief Documents revealing why the trial ofWangYam, who was convicted ofkilling Allan Chappelow, was held in
camera, the first UK murder trial ever heard behind closed doors without access by press or public[4j
(http://web.archive.Org/web/2009110506l330/http://en.wikipedia.org/wiki/Allan_Chappe1ow)
^ Nationalisation ofNorthern Rock and Bradford^Bringley
^ Brief The proper reasons for nationalisationofNorthem Rock and Bradford t^ Bingley,and the subsequent sale ofthe
latter's savings buisiness to Santander.
^ Brief Records of events during the twelve months leading up to the nationalisationofBradfordt^ Bingley.
^ Brief Information regarding the valuation process to determine compensation for fromer shareholdersofNorthem Rock
and Bradford t^ Bingley, that is, the information the independent valuer uses to determine the final value ofthe comapanies.
^Entity: Bt^B(http://webarchiveorg/web/20091105061330/http://wwwbbgcouk/)
^ Entity: Northem Rock (http://web.archive.Org/web/20091105061330/http://www.northernrock.co.uk/)
^HBOS takeover
^ Brief Copies of govemment minutes of meetings between Gordon Brown and/or Alistair Darling and representativesof
Lloyds Bank relating to the proposed takeover ofHBOS
^ investigation into Oaveport Lyons
^ Brief Documents fi^om Solicitors Regulation Authority's investigation into DavenportLyons threatening letters related to
filesharing.
United Nations
^Security Council and Oarfur
^ Brief Requests to Ihe Security Council in 2003 that the Security Council look at what was happening in Darfur,and any
notes ofdiscussions leading to the decision not to look al the situation.
DDate:2003
^ Entity : UN Security Council
United States
Important bull^ databases
^ Intellipedia
^ Brief Classified intelligence community site as of11/1/2008, including article history.
^ opensource.gov
^ Brief The complete CIA Open Source Center analytical database The database is extensive, unclassified, non-public, but
relatively accessible to certain outsiders afterjumping through hoops Despite its name,you need to be govemment official
to gain access to it.
^ Entity: opensource.gov (http://web archive.Org/web/2009I105061330/http://www.opensource gov/)
^ Pacer database
^ Brief The completePACERdatabase.ThePACER database contains extensive US federal court records.They are public
documents, currently behindapaywalf See http://arstechnicacom/techpolicy/news/2009/04/case-against-pacerars
^Entity:PACER(http://webarchiveorg/web/20091105061330/http://pacer.psc.uscourtsgov/)
Eederal politics
^ The missing five million White House emails-possibly no longer in existence.
^ Chenney and Rumsfeld Archives
^ The While House visitor's list
^ Minutes or notes for VP Cheney's Energy Conference.
^ The114lpagesofACTAbackground documents not released to the EFF by the USTradeRepresentative(see [5]
(hltp://webarchiveorg/web/2009110506l330/https://secureefforg/site/Advocacy'^cmd^displayt^page^UserActiont^id^420))
^ Alist ofall Whitehouse and senior federal govemment employees holding dual citizenship and the countries they represent.
Military and Intelligence
^TheSlOP
DOPLAN/CONPLAN 8022,2003 revision
DOPLAN/CONPLAN 8044,2007 revision
^ CfA detainee interrogation videos While the CIA claims to have destroyed 92 ofthe videos,others are known to remain.
^ The US "Black Budget ", from inception to present, with line items, hopefi^lly annotated and explained.
^ Detainee abuse photos withheld by the Obama administration.
^ Wiretapping program led by NSA
^ Brief Correspondence between the National Security Agency and American telecom companies such asATt^T.Verizon,
and Owesi, regarding the warrantless wiretapping program Correspondence involving telecoms who cooperated wilh the
i^af^f^if^gB^004^05^0
http://web.arehive.Org/web/20091105061330/http://wikileaks.org/wiki/Draft:TheMost... 12/6/2011
DraftiThe Most Wanted Leak^ ^2009 sort Wikileaks Pagel0ofl2
NSA(egAT.^T) may give different information than telecoms who refiised(egO^^^^)^^nt both types would better shed
light on the NSAsprogram The existence ofthis correspondence is well documented in the media, for example that
Owest's lawyers refiised to cooperate because the FISA Court had not signed off on it.
^Entity: NSA (http://webarchiveorg/web/20091105061330/http//wwwnsagov/)
^ Entity: Owes! (http://web.archive org/web/20091105061330/http://www.qwest.com/)
^Entity:ATt^T(http://webarchiveorg/web/20091105061330/http://wvt^attcom/)
^ Entity:Verizon (http://webarchive.Org/web/20091105061330/http://www.verizoncom/)
^ Unredacted copy ofDept of Justice's Office ofInspectorGenera1's"AReview ofthe FBI'sActions Connection With Allegations
Raised By Contract Linguist Sibel Edmonds" July1,2004(redacted version here http://wwwwbezorg/FlLES/sibelpdf)
^ Camp De1ta(Guantanamo)Standard Operating Procedure 2005-2009
^Iraq US Artny Rules ofEngagement2007 2009(SECRET)
m Unredacted Inquiry into theTreatmentofDetainees in USCustody,20 Nov 2008
^ Memorandum between the CIA and the Department ofState detailing any constraints on Darfur policy caused by actual or
anticipated Sudanese government cooperation on counter-terrorism, including CIA request to USU^ that Salah Gosh be removed
from the U^ Panel ofExperts list ofthose recommended for sanction.See: http://www.sudantribune.com/artic1e.php37
idartic1e^10205
^ Department ofState and CIA contributions to the Obama Administration's 2009 Sudan Policy Review,in particular with respect
to: a) Whether to support the ICC arrest warrant against Sudanese President Bashir^b)whether to takeaconfrontational or an
appeasement approach to the Sudanese govemment on the issue ofDarfur
^ Camp De1ta(Guantanamo)Standard Operating Procedure 2005 2009.
^ Camp De1ta(Guantanamo)1nterrogation Standard Operating Procedure 2003-2009.
^ Correspondence between the National SecurityAgency and American telecom companies such asATt^T,Verizon, and Owest,
regarding the warrantless wiretapping program Correspondence involving telecoms who cooperated with the NSA(egATt^T)
may give different information than telecoms who refused(e.g.O^^^^)^ but both types would better shed light on the NSA's
program.The existence ofthis correspondence is well documented in the media, for example that Owest's lawyers refiised to
cooperate because the FISA Court had not signed off on it
^Iraq and Aflianistan US Army RulesofEngagement 2007 2009 (SECRET)
DCIA/DIA/NGA/NSAanalysesofthe VRYAN crisis of1983
1^ Technical specifications of the KH-lland follow-on satellites with similar capabilities.
^ The contents ofthe Footbafl, and how they changed over the years during the different Administrations.
1^ What Pollard stole and gave to the Mossad, the fiill text
^ US psychological profiles and political analysesofSoviet leaders.
^ Documents relating to orbital weapons systems, and whether the US ever deployed them(or still deploy them)such as orbital
HANE devices.
^ Information about thePAN satellite and the agency responsible for it http://spaceflightnowcom/news/n0905/26mi1space/
^ Commander Directed Report oflnvestigation Conceming an UnauthorizedTransferofNuclearWarheads Between Minot AFB,
North Dakota and Barksdale AFB, Louisiana 30 August 2007 (S//FRD//MR)
^ Investigation into the Shipment ofsensitive Missile Components toTaiwan(ADM Donald Report)-22 May 2008
(S//FRD//NOFORN)
^ Air ForceComprehensiveAssessmentofNuclearSustainment(CANS)-Ju1y 2008 (S//FRD//NOFORN)
^ General Order Number One issued by commanders in Iraq and Afghanistan
^ Reports about Colombian'falsos positives'
^ Unredacted copy ofDept ofJustice's Office ofInspectorGenera1's"AReview ofthe FBI'sActions Connection With Allegations
RaisedByContractLinguistSibe1Edmonds"Ju1y1,2004(redacted version here http://www.wbez.org/FILES/sibe1pdf)
1^ All secret annexes for,attachments to, unredacted versionsof and documents implicitly or explicitly referenced in the
following documents, which may be partially available in unclassified form:
^ National Security Presidential Directive51, "National Continuity Policy",May9,2007,also known as Homeland
Security Presidential Directive 20
^ Federal Preparedness Circular 65,""Federal Executive Branch Continuity ofOperations(COOP)"",July 26, 1999
^Federal Response Plan 1FEMA92301PL], April 1999
^ Presidential Decision Directive 67,""Enduring Constitutional Govemment and Continuity of Govemment
Operations"",October21,1998
^ Presidential Decision Directive 63,""Critical Infi^astructureProtection(CfP)"",May 22,1998
^ Presidential Decision Directive 62, ""Protection Against Unconventional Threats to the Homeland and Americans
Overseas",May 22,1998
^ ^T^C^ ^.^ Federal Response Planning Guidance01-94,"ContinuityofOperations(COOP)",December 4,1994
^ B/^i^C^^Nationa1SecurityDirective69, "Enduring Constitutional Govemment", June 2, 1992
^ /^T^C^c^.^ Federal Preparedness Circu1ar61, "Emergency Succession to Key Positions of the Federal Departments and
Agencies"", August 2,1991
^ Federal Preparedness Circular 62,""Delegation of Authorities for Emergency Situations",August I,1991
^ Federal Preparedness Circular 60, ""Continuity ofthe Executive Branch ofthe Federal Govemment at the
Fleadquarters Level During National Security Emergencies"", November 20,1990
^ National Security Directive 37,"Enduring Constitutional Government"",Apri1I8,1990
^ ExecutiveOrder l2656,""AssignmentofEmergencyPreparednessResponsibiIities"',November 18,1988
^ Executive Order 12472, "Assignment ofNational Security and Emergency PreparednessTelecommunications
Functions"",Apri13,1984
^/^.^^^^ NSDD 55,""Enduring National Leadership" September 14, 1982
1^ Executive Order 12148,""Federa1 Emergency Management"",July 20, 1979
i^af^f^iogB^004^05^^
http://webarehiveorg/web/20091105061330/http://wikiIeaks.org/wiki/Draft:TheMost.. 12/6/2011
DraftiThe Most Wanted Leaks ^009 sort Wikileaks PageIlofl2
^ Alist ofthe actual facilities in the Federal Relocation Arc,as of the present time, along with their locations.
^ Blueprints,maps, and fioor plans ofMWEOC.
^ Blueprints, maps,and floor plansofSiteR(Raven Rock)
^ Blueprints and fioor plans ofall unmentioned facilities in the Federal Relocation Arc, including historical ones
Banking
^ The complete list ofidentities ofthe 52,000 wealthy American clients suspected ofhiding^15billion at UBS to avoid taxes,
including the namesof any elected or appointed government or former govemment officials.
^ The complete details ofGoldman, Sachs t^Co"s counterparty exposure to AIG prior to the Federal bailout of AIG in September,
2008
Environment
^ Monsanto"s intemal evaluations ofGMO products including safety and pollen drif^.
Media
^ The Editorial Guidelines for Fox News
^ Emails relating to suppressed GO magazine article on Putin's rise by Scott Anderson mentioned at[6j
(http://webarchiveorg/web/20091105061330/http://ww^vnprorg/temp1ates/story/storyphp7storyld^112530364)
Religion
Mormons Church records
^ With recent leak of1999/2006 Church Handbook oflnstructions, pertinent documents and covertly photographed artifacts
in the vault at Church Office building or subsidy in Salt LakeCity,Utah which expose and negate Mormon Church's claim
of divinity and its monopoly on "truth."I.e.the concealed remnantsof diaries and letters written by former early Mormon
apostle William McLellin [7] (http://web.archive.Org/web/20091105061330/http://en wikipedia.org/wiki/WiI1iam E._M%
27Le11in^Persona1 writings) McLellin diary and documents was the main point ofinterest for convicted double
murderer/bomber Mark Hofmann's planned forgery attempt to deceive Mormon leaders to obtain in fraud by deception
monetary reward to suppress truth ofearly Mormon history unfavorable to current Mormon religion For more info, [8j
(http://webarchiveorg/web/20091105061330/http://www.utlmorg/on1inebooks/trackingch3htm)
^ Documents ofMormon Church's billion-dollar investment in City Creek Mall and Condominium in SLC,which may put
Mormon Church's IRS tax-exempt status injeopardy ifthere is verification ofthe allegation the Church used tithe and
offering monetary contributions by the members to fund the project under the umbreflaoftax-exempted religious freedom.
^ Mormon Church leadership's involvement in politics, such as correspondence to ecclesiastical subordinates (bishopric)on
policy and attitude towards same-sex civil rights^other sensitive issues relevant and concerning to the leaders.As well as
recorded cortespondences between Mormon members ofUtah legislation and Church leaders on sensitive political
issu/^^/^c^^^.i^^es for legislation purposes which may contravene the separation ofchurch and state
^ Uncovered film or audio recording featuring the play with the actor portraying Protestant minister encouraged by
Satan/Lucifer (portrayed by actor) to spread false doctrines to attack all religions outsideofMormon religion as
"abominable" which was exhibited for qualified "temple recommend" audiences in all ofthe existing temples prior to
removal in 1990(a1most like leaked Scientology orientation video)19]
(http://web.archive.Org/web/20091105061330/hltp://www.exmormon.org/mormon/mormon288.htm).
^ Unearthed secret audio or video recording inside Mormon temple with the temple members swearing "blood oath" before
removal in 1990 ^10] (http://web.archive.Org/web/20091105061330/http://en.wikipedia.org/wiki/B1ood_oath
(Latter Day Saints))
^ Documented Church leaders" and lay clergyscover-upofphysical/sexual abuse and rapeofminors by missionaries and
members without reporting to law enforcement in some cases[11]
(http://web.archive.Org/web/20091105061330/http://wwwexmormon.org/mormon/mormon384.htm).
1^ Older editions ofChurchHandbooksoflnstructions from the first edition upl12]
(http://web archive org/web/20091105061330/http://en wikipediaorg/wiki/Church Handbook_of_lnstructions"^History)for
comparison to recent 1eaked1968 (truncated),1999 and 2006 editions.
Vatican
^ Vatican secret archives
^ Brief The Index ofthe Vatican Secret Archive.Al presentpre-screned scholars are allowed to see it but not copy it(under
scholar ru1e^16http://asv.Vatican.va/en/fond/amm.htm)
^Vatican'sdocumentsonnaziGermany
^ Brief Bt//documents pertaining to Nazi Germany and the Vatican, as wefl as those relating to the post-war rat line to
Argentina. Refer to http://news bbc co uk/2/hi/europe/2611847.stm
International organisations
^ BilderhergGroup
i^afiningB^004^05^2
http://web.archive.Org/web/20091105061330/http://wikileaks.org/wiki/Draft:The_Most... 12/6/2011
Draft:The Most Wanted Leaks ^009 sort Wikileaks Pagel2ofl2
^ Brief Bilderberg Group meeting minutes, papers and annual reports ofsince 1954 WikiLeaks has some years already
Bilderberg is an annual off-the record conference offransatlantic political,economic and ideological agenda setters As an
historically important confidential document collection it is probably only equaled by Cabinet minutes and high level
intelligence and diplomatic assessments.LeadsThere are some o1der,previous1y unnoticed records in boxes at Uni of
Illinois http://wwwlibrary Illinois.edu/archives/uasfa/1535051 pdf(19561970) the George Bush library,
http://bushlibrary tamu edu/research/finding_aids/pdfs/08 0379 F pdf and the Eisenhower Library in Kansas
http://www eisenhower.utexas.edu/Research/Finding Aids/PDFs/Jackson CD Records.pdf
1^ Entity: Bilderberg Group (http://web.archive org/web/20091105061330/http://en wikipetjia org/wiki/Bi1derberg_Group)
^ Alliance Base
^ Brief Documents regarding the founding and operation of Alliance Base
(http://webarchiveorg/web/20091105061330/http://enwikipediaorg/wiki/AI1iance_Base).
Retrieved from "https://secure.wikileaks org/wiki/Draft:The_Most_Wanted Leaks of^2009 sort"
Categories: Bulgaria^CzechRepublic^Denmark^Estonia^France^Germany^lcelandlltaly^Latvia^Lithuania^Netherlands^Nor^ay
[Poland^Romania^Slovenia^Spain^Turkey^UnitedKingdom^Switzerland^Sweden^Malta^Portugal^Luxembourg^Finland^
Belgium^Cyprus^Canada^SlovakialUnited States
1^afinifigB^004^05^3
http://web.archiveorg/web/20091105061330/hftp://wikileaks.org/wiki/Draft:TheMost... 12/6/2011
Draft:The Most Wanted Leaks of 20v. sort - WikiLeaks Page 1 of 12
DraftiThe Most Wanted Leaks of 2009-sort
From WikiLeaks
Jump to: navigation, search
Somewhat sorted entries of the most-wanted list. Work in progress, TODO: Add brief, entity and date for each entry.
Contents
thide]
1 Austria
2 Australia
3 Bahrain
4 Belgium
5 China
6 Colombia
7 Finland
8 France
9 Germany
10 Greece
11 Guatemala
12 Italy
13 Kenya
14 Libya
15 Madagascar
16 Mali
17 Mexico
ISNieer
19 Norway
20 Poland
21 Puerto Rico
22 Rwanda
23 Russia
24 Slovenia
25 Sudan
26 Syria
27 Switzerland
28 Swaziland
29 Trinidad and Tobaeo
30 Uganda
31 United Kingdom
32 United Nations
33 United States
34 Vatican
35 Intemational organizations
Austria
Austrian e-Voting system used in students elections.
- Date: 18 May 2009 g
< Brief: We seek for details about Austrian voting system used in students elections, which includes but is not limited to source code and k
certifications. g
Entity: Scytl (programming) p
Entity: Austrian Federal Computation Center (hosting)
" Entity: Ministry of Science (initiator) 5
' Entity: Robert Krimmer (consulting) C
Q
E-Mail traffic between Josef PrSII and Christian Konrad.
- Date:???
" Brief: E-Mail traffic between minister of finance Josef Proll and Christian Konrad, who is advocate general of Raiffeisen bank.
00527888 ^
http://wiki1eaks.Org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Saturday, June 01, 2013 15:39:36 PM
O U
< <
0. CL,
Draft:TheMostWantedLeaksof20^ ^ort WikiLeaks Page2ofl2
^ Entity: JosefPrC^fl(josef.proell^bmf.gy.at)
^ Entity: Christian Konrad
^ ^-l^ail traffic ofAntonMalidalik with MieliaelH^upl and/or Michael Ludwig
^Date:???
^ Brief: E-Mail traffic ofFPO delegate Anton Mahdalik with Viennese mayor Michael Haupl anchor deputy mayor Michael Ludwig
containing threats when renting municipal ground to the Viennese trailor park ("Wagenplatz Wien").
^ Entity: Anton Mahdalik (toni.mahdalik^f^oe.at)
^ Entity: Michael Haupl (michael.haeupl^wien.gy.at)
Australia
^AC^LI ^LI i l aekl i s t
^Date: 19 March2009and later
^ Brief: Versions of the ACMA U ^ blacklist newer than 19March2t)09.^ii^i^^ci^7 previously released three versions of the list, two of
which included WikiLeaks or its subpages.
^ Entity: Australian Communications and Media Authority
^CensorshipteelinologyinAnstralia
^Date:2009
^ Entity: Australian Communications and Media Authority
^ Entity: EnexTestlabs
^ Entity: Watchdog NZ
^ Entity: [^www.iwf.org.uk Intemet Watch Foundation]
^Entity: Exetel ISP
^ Brief Eull details offiltering hardware/software vendors participating in government-sponsored ISP level censorship technology trials,
including (but not limited to):
^ Any and all communications between filter vendors and goyemmient departments prior to, during, and after the trials
^ Any and all transactions, contracts, and other financial arrangements involving filter vendors
^ Details:
^ URL blacklist(s)used during above trials. Alleged (by government) to beACMA URL blacklist.
^ Full statistical breakdown of results of above trials (in the eventthat EnexTestlabs do not make them publicly available).
^ UI^L blacklist as used by Watchdog NZ during private censorship technology trial by ISP Exetel in May 2009.Alleged (by
Watchdog) to have been IWF list(see United Kingdom).
^ Full statistical breakdown of results ofWatchdog/Exetel's censorship technology trial-Exetel's official response seems lacking.
Annual l^SWPolieetest
^ Brief Written exam l^SW police officers musttake annually belore they can be issued withTasers.
^Entity: NSW Police
^ah^ain
^Ooenmentsregardlngehangestocountrysdemogra^liy.
^ Brief Documents disclosing the number ofcitizenships that have been granted in the last few years, in an effort to change the country^s
demography.See Political naturalisationll].
^el^iunn
^ t^oenment regarding equality audits ofBelgian hospitals
^ Brief: Documents disclosing the fatality rates ofspecific procedures and illnesses per hospitaL Indicating statistically significant
differences in survival chances between hospitals.
Chin^
^ Golden Shield Project
Brief Alist ofURLs and keywords censored filtered by the Golden Shield Project(Great Firewall of China).WikiLeaks has previously
released related information, for example, watch lists, policies and several thousand URLs for CCTV and Baidu, but not for general http
filtering.
^ Entity: Ministry of public security
^ Genocide ^lym^ies campaign
^Date:^8thMarch^007
^ Brief Policy options on Darfiir formulated in response to the so calledt^enocide Olympics campaign led by American actress, Mia
Farrow,and notes of meetings in 2007 between Stephen Spielberg and Chinese Foreign Ministry officials prior to Spielberg's
resignation as Artistic Director ofthe :^008 Beijing Olympics.
00^^7^^^ ^
http://wiki1eaksorg/wiki/l^i^aft:TheMostWanted_Leaks_ot^2009 sort Saturday,Jitne01,2013 15:39:36 PM
Di^aft:TheMostWantedLeaksof20^^ sort WikiLeaks Page3ofl2
Colon^^i^
^ Surveillance of citi^ns and organisations
^ Brief: Tbe DAS (Departamento Administrativo de Seguridad) is reported to have surveilledawide array of public officials, private
citizens, and organizations. Documents wanted: contracts to supply software for intemet suryeillance to Colombian policy agencies and
details ofthe software supplied. B
^Entity: DAS
F^iuland
^ Tiitisen Lista
^ Brief The so called Tiitisen Lista, the list ofl^persons claimed to have been in active contact with East German security services
(Stasi).The list was received from the West German intelligence services (B^D)iii 1990 and since classified by the order ofPresident
Koivisto as adviced by the head of the Finnish Security Police (Suojelupoliisi), SeppoTiitinen.lt is rumoured that several current or
formertop Finnish politicians appear on the list.
^ Entity: Stasi
^ Entity: Koivisto
^ Entity: Suojelupoliisi
^ ^ ^ n^ e
^ NieholasSarko^ liealth report
^ Brief The Monthly Health Report ofPresident l^icolasSarkozy,as promised by himself during the lastpresidential elections.
Gern^au^
^ Censorship in Germany
^ Details:
^ The censorship filter list for the proposed national,mandatory censorship system.Thelistwill be compiled by German federal
criminal police BKA and distributed to intemet service providers.
^ The contents ofthe contract between the BKA and some ISPs that has already been signed, but is kept secret due to "public
safety" andcoi:iyrightconcems(seehttri://blog.fefede/7ts^b4fa8af8).
^ The List ofMediaHarmfiiltoYoung People (the censorship system already in place).The "virtual media'^ part of this list is
distributed to search engine providers and is illegal to publish. It probably could be reverse engineered using the differences
between googlecom and google.de search results. Also, if you want to knowifaspecific medium is on the list, you can send an
enouiry to listel^bundesnruefstelle def'Bundesprtlfstelle" is the agency responsible for keeping the list).
^ Entity: Bundesnrtifstelle
^Entity: BKA
^ PoliticiansStasifiles
^ The Stasi files ofFederal Chancellor Angela Dorothea Merkel (maiden name Kasner) and other leading politicians, which are known to exist,
but withheld from public
^ Operation Gladio
^ Brief Tbe Stasi files relating to operation Gladio/stay behind organisations in relation to right-wing terrorism in C^ermany.astiera
parliamentary rec^uest by the Green party.
Atlas Oer Wut
^ Brief: The so called"Atlas der Wut",adocument about the risk of riots in different german regions.The list is said to be updated
regulary and was firstwritten in ^005.
^ ^lie list ofNPt^ party members
Greece
^heAtliens Affair
^ Brief Documents related to the Athens phone tapping affairthat have yetto be released (including those from countries otherthan Greece)
Context
Guaten^^la
^ Plan Victoria Plan So^a and Plan Eerme^^^
^ Brief All documents on Plan Victoria 82, Plan Sofiaand Plan Firmeza 83.
^ Detail:
0^^^7^^0
http://wikileaksorg/wikt/Oraft:The_Most_Wanted_Leaks_ol^2009 sort Saturday,June01,2013 15:39:36 PM
Dt^ft:The Most Wanted Leaks of20^^sc^rt-WikiLeaks I^age4ofl2
Within the process oftrying to bring military personal involved in human rights violations and massacres that happen during the civil
warinGuatemalatojustice,themilitaiyhayebeenrec^uiredtodecla^sifymanywardocuments.fnacase,thatwentallthewaytothe
SupremeCourtofGuatemala, the Court dictatedasentence that confirmed the obligation of the Ministry ofDefense of Guatemala to
hand overthe official documentation of four specific military operations: Campana Sofia 82,Victoria 8^, Firmeza 83 and Operacion
l ^i l . The Supreme Court sentence indicated that the archives had to be declassified.
These military operations were carried out in the 80s.According to the CEH, Historical Clarification Commission ofGuatemala final
report contained in "Guatemala: Memory ofSilence",these military operations resulted in massacres and severe human rights
violations.
The Minister ofDefense AbrahamValenzuela only delivered partial information about plans Victoria 8^ and Firmeza 83,two of the
four requested plans. He indicated that he had no knowledge ofthe other two plans before he became Minister ofDefense and that he
ignores where the documentation could be. He stated that he could not deliver the complete plans "Victoria 82"y"Firmeza 83" because
certain information was considered state secret andaconcem of national security.
"Plan Sofia",aderiyatiyeof"Plan Victoria 82",was of special concern to human rights activists^ this plan was conceived in July 1982,
four months after General Efrain Rios Montt came into power.
TlieCEt^ archives
^ Brief: Final report ofUnited Nations'Historical Clarification Commission (CEH) into the killing of200,000 Mayan people and the
involvement of the US govemment and American corporations. The report official sources(military interviews, campaign plans, etc)are
kept secret bythe LfN in NYC.
^ Detail:
The United nations'Historical Clarification Commission(CEH) for Guatemala issuedareport where the US government and several
American corporations were accused of complicity in the genocide of nearly 200,000 Mayan people during Guatemala?s bloody 36 year
civil war.The final 3,600-page CEH report clearly places the blame fcir most of the 200,000 deaths on the "racist" policy of the
Guatemalan govemment and holds the country?s military and paramilitary forces responsible fi:^r the actual killings, tortures and
disappearances.
However, it accuses the US of directly and indirectly supportinga"8^atricidal confrontation" by providing sustained training, arms and
financial aidThe report is based on the testimony of9,200 people from all sides ofthe conflict and other documents"^,classified and
Secret, protected in the Uf^ headquarters in NYC.The CEH investigated 42,000 human rights violations, 29,000 ofwhich resulted in
deaths or disappearances and therefore, the documents under U^ custody are fiindamental for the prosecution ofthose responsible ofthe
crimes.
^ Goldcorp affair
^ Brief: "^Documents on Canadian corporation named Goldcorp withamining operation in Guatemala, especially information on where
the Gold they extract is processed and who is buying the gold (we think it might beaSwiss company).
^ DetaikACanadian corporation named Goldcorp hasamining operation in Guatemala with poor environmental conditions and harming
health of many workers andacommunity asawhole.Where the Gold they extract is processed? Who is buying the gold(we think it
migbt beaSwiss company)?
^^^^^
Italian censorship list
^ Brief The Italian censorship, of which Wikileaks currently only hasasubset.
I^en^a
^ l^eports on high level corruption in Kibaki government
^ Brief The intemational investigative firm Kroll associates produced at least four reports on high level Kenyan corruption after first term
ofthe Kibaki govemment.Adraffyersion of one of the reports The looting ofKenva. was nreviously published by WikiLeaks. The
renorts were given to selected members ofPresident Kibalci's cabinet at the time and are likely still held by httn://www.krollcom.uk/.
notably lead investigator Andrew MarshalL
Entity: President Kibaki
^Entity: Kroll
^ib^a
^ Arrangements witli the Sudanese government
^ Brief Documents indicating arrangements with the Suc^ese government to grant land in Darfiirto Arab settlers from Libya(Civilians
and adminisrators on the gruond in Darfiir indicate this has been taking place).
l^ada^as^ar
Both sides ofthe political conflict in Madagascar are crying fi:iuls about the deals made by their counterparts with foreign entities.The release ofthe
official c^cumen^with respect to contract negotiations about:
00^^7^^^
http://wikileaksorg/wiki/Oraft:The_Most_Wanted_Leaks_ot^2009 sort Satut^day,June01,2013 15:39:36 PM
Dt^ft:The Most Wanted Leaksof20t^^sort WikiLeaks Page5ofl2
^ Oil exploitation in the region ofBemolanga(SouthofMadagascar)byTotal^other^
^ Detail: Oil and Gas in Madagascar Industry Overview.lnfosonTotal licensing
^ an obvious one but the proposed final contract before rejection ofthe land deal with Daewoo Logistics.
^ The recent agreementwith Saudi investment group on staple products and proposed ^2 billion USD investment.
^ Tbe revised mining exploitation agreement with Sheritt in Ambatovy and Rio Tinto in Fort Dauphin.
^ Least but not last, the complete list of current political prisoners and the charges against them.
l^ali
^ Arrangements with the Sudanese government
Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfiir to Arab settlers from Mali(CiviIians
and adminisrators on the gruond in Darfiir indicate this has been taking place).
l^e^i^o
^ Agreements between USA and Peter tterlihy
^ Brief Zapotec indigenous people demand transparency from U.S. Scholar and fiill disclosure ofall the agreements between U.S.
Govemment and their agencies andU.S.geography scholar Peter Herlihy,especially confidential agreements with Foreign Military
Studies Office. Prof Herlihy failed to mention that he received funding ^om the Foreign Military Studies Office oftheUS.Armed
Forces on the research of'M^xico Indigena" project. Mexico Indigena Project forms part ofthe Bowman Expeditions,amore extensive
geographic research project backed and financed by tbe FMSO,among other institutions.The FMSO inputs information intoaglobal
database that forms an integral pari of the HumanTerrain System (FITS),aUnited States Army counterinsurgency strategy designed by
Foreign Military Studies Office andappliedwithin indigenous communities, among others.
^Entity: FMSO
^ Entity: Peter Herlihy
^ ^uta Maya ^00^ I su^ Challenge
^ Brief Documents to unveil the real purpose of'Ruta Maya 2002 Isuzu Challenge".The convoywas commanded by Ben l^unAvihu,
Israeli militar and Moshe Savir, geography expert and around 50 tourists in 40 Isuzu Jeep. Some communities linked the incursion with
biopiracy.The terrain they explored is controled by the EZL^.
^ Entity: Ben NunAvihu
Entity: Moshe Savir
^Entity: EZLN
Corruption around F^BAPI^^A
^ Brief Documents related with the fi^ud and corruption around FOBAPROA (Fondo Bancario deProteccic^nal Ahorro).
.^Entity:FOBAPROA^2
^ Financial operations belore crisis
^ Documents of financial orierationsiust before the financial crisis ofl994 (some say the govemment knew before that the crisis was
coming and took advantage ofthe information protecting their interests).
^ World Bank credit
^ Brief Documents related with the World Bank credit andapplication ofthe budgetto combat swine flu.
^Entity: World Bank
^ Renault program
^ Brief Documents related with the technology currently used in cellrihones in Mexico to imrilement the RENAUTprogram Information
about the security technology used to protect data collected from users.
^ Plan Merida
^ Brief Documents related to the transparency ofPlan Merida
^^^e^
^ Arrangements with the Sudanese government
^ Brief Documents indicating arrangements with the Sudanese govemmentto grant land in Darfurto Arab settlers from Niger(Ciyilians
and adminisrators on the gruond in Darfiir indicate this has been taking place).
^o^a^
^ Court case between Lyse^ele and Simonsen
^ Brief The secret verdict in the court case between the ISP LyseTele and the law firm Simonsen, decided the 5th ofMay 2009,where
Simonsen demandedLyseTele disclose the identity information ofafile sharer suspected of uploadingacopy of the movie Max Manus
to the file-sharing community.
^ Entity: LyseTele
^ Entity: Simonsei:!,^
0 0 ^ ^ ^ ^
http://wiki1eaksorg/wiki/Draft:The_Most_WantedLeaks_ot^2009 sort 5aturday,June01,2013 15:39:36 PM
Di^ft:TheMostWantedLeaksof20^^sort WikiLeaks Page6of12
Poland
IPN Files
^ Brief IPN (Instytut Pami^cil^arodowej) is an organisation created fc^r investigation and gathering of informations regarding crimes
against polish citizens in the timeline of^2 july 1944 to31decemberl989.Gathered documents are often related to politicans, high-
ranked military,priests etcetera but for some reason are not available for anyone^ they are instead used as political weapon against
one's enemies, revealing working as an agent for SB (Shi^ba Bezpieczenstwa) in the above timeline For two main reasons ALL data
should be available FOR Al^YONE. First, it would no longer be used as political weapon: second, all people would know about past of
all public people.Transparency is the key fcir healthy govemment.
^Entity: fPN
^Ent i t y: ^
Puerto ^ieo
^ FBI surveillance ofPuerto^cociti^ns
^ Brief The FBI has not yet finished declassifying afl tbe secret files related to surveillance ofPuerto Rican individuals and organizations
from the I930 70'shtto://www.or secretfiles.net/index.html (not to mention, large sections of the files are blacked out by the FBI). In
addition, there are thousands ofsecret files produced by Puerto Rican police that were only briefly made available to individuals
themselves, and have now been closed off to the public.These documents provide evidence of quiteasignificant spying and
intimidation operation by the United States and local police against leftists and independence movement leaders.
^Entity: FBI
Rwanda
^ Financial aid tor Laurant nkunda
^ Brief Documentation of financial assistance given by the Rwandan govemment to General Laurant l^kunda for operations in the DRC.
^ Entity: Laurent Nkunda
^nssi^
^^YAN crisis documentation
^ Brief: Documents related to the VRYAN crisis, especially political documents, analyses of intelligence, and specific steps taken.
Information on the mindset of the Politburo, as well as intelligence services, and what exactly they feared, and how credible they
believed their fear to be.
Maps for Kremlin and military hideouts
^ Brief: Maps, floor plans, and blueprints ofMountYamantaw and Kosvinsky Mountain.
Technology analysis
^ BriefTechnical plans, manuals, and blueprints forthe SS27SickleB(Topol-M),alongwith the Bulava.
^ Brief Documents relating to nuclear warplans ofthe Soviet Union and Russia.
^ Brief: Documents relating to orbital weapons systems, and whether the Soviets ever deployed them(or still deploy them) such as orbital
FIANE devices.
^ Brief Alist and description of the various agents prepared by the various Soviet and Russian bioweapons programs. Indications of
whether they developed recombinant DNA based agents, anci what those are specifically.Weaponization of agents, including reentry
vehicle mounting. Doctrine for use, including deniable use.Vaccines and treatments for affected personneL
^lo^enia
^ Taped conversations between Slovenian opposition leader and Croatian PM
^ Brief Taped conversations between Slovenian opposition leader Janez Jansa and Croatian prime minister Ivo Sanader, recorded by
Slovenian intelligence service SOVA.
^Date: Summer 2004
^ Entity: Janez Jansa
^ Entity: Ivo Sanader
^Entity: SOVA
Sudan
^SalahGoshandtheCIA
^Date:2005
^ Documents detailing discussions during 2005 meeting between Salah Gosh and the CIA (forwhich the CIA flew Gosh on private jet
from Kfiartoum to CIA HO). See: http://www.sudantribune.com/articlc.php37id article^l0^05
^ Mali case
00^^7^^^
http://wiki1eaksorg/wiki/Draft:The_Most_Wanted^Leaks_ot^2009 sort 5atti^day,June01,2013 15:39:36 PM
DraftiThe Most WantedLeaksof20t^^sot^ WikiLeaks Page7ofl2
^ Brief Documents indicating arrangements with the Sudanese government to grant land in Darfiir to Arab settlers from Mali (Civilians
and adminisrators on the gruond in Darfiir indicate this has been taking place).
^ Libya case
^ Brief Documents indicating arrangements with the Sudanese government to grant land in Darfiir to Arab settlers from Libya (Civilians
and adminisrators on the gruond in Darfiir indicate this has been taking place).
^ Niger case
^ Brief Documents indicating arrangements with the Sudanese govemment to grant land in Darfiirto Arab settlers from ^iger(Civilians
and adminisrators on the gruond in Darfur indicate this has been taking place).
^^t^iia
^ AssasinationofMehdiBenBarka
^ Brief All the documents related to the assasination, in 1965,ofMehdi Ben Barka still held in France, USA, Israel and Morocco. In
1976, thanks to the Freedom of information Act, the US govemement recognized that the CIA had aboutl800 classified documents
about his assassination.Theses documents are still classified.
^w^t^et^Iand
^ Comu Report
^ Brief The fiill Comu Report. See http://en.wikipedia.org/wiki/Proiekt 26"^The Comu Report
^wa^ilan^
^ Eicpense accounts ofKing Mswati, the ^ueenMotlier and the Kings wives.
^ Memos from Ministry ofOefense or Police
^ Brief Intelligence memos from the Ministry ofDefence or Police about the pro-democracy organization, PtJDEMO.
^ Entity: Pudemo
^ Entity: Ministry ofDefense
T^rinidad andTobago
^ Commission of Enc^uiry reports
^ Brief The Report on the Commission ofEnquiry into the constmction of the new PiarcoAirport.This identified corrupt practices in the
spending of public fiinds.The Commission's report was delivered in August 2003.Nearly6years later, its findings have not been made
public.
^ Brief: Repciri ofthe findings ofthe current C^ciiiiiiii.^.^ici^ci^^^^iciB^iiilc^c^^/cic:ci/
^ Entity: Commission Enouiry
^ Entity: Piarco airport
^ Cai^oni Bridge collapse
^ Brief The Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafewyear^ ago: again the public has not
been made aware ofthe report's findings.
^Date:2ndAugust2008
^ Waterfront development Project
^ Brief Acopy ofthe contract forthe billion-dollar Waterfront Development Project.
^Entity: ?udecott?
^ Scholarships sponsored by Ministry ofCulture
^ Brief List ofrecipients and amounts ofscholarships sponsored by ministry ofCulture for study abroad.
^ Entity: Ministry ofCulture
^ Detail:
As far as Trinidad andTobago goes, our government tends to pay lip service to the principles of transparency and accountability.For
instance, there isaFreedom ofinformation Actwhich, by law,allows the public to seek information fi^om govemment departments.But
quite often, when such attempts are made by the citizenry,the govemment bars fiill disclosure. Depending on how importantapiece of
information is to Joe Public, he may actually have to tum to the courts to "force" the govemment to reveal facts that sliould be disclosed
voluntarily.Followingareafew examples of documents that should be made public, but have not been:
^ The Report on the Commission ofEnquiry into the constmction ofthe new Piarco Airport This identified corrupt practices in the spending of
public funds.The Commission's reportwas delivered in August 2003.I^early6years later, its findings have not been made public.
^ The Report on the Caroni Bridge Collapse.Aman was killed whenabridgecollapsedafew years ago: again the public has not been made
aware ofthe report's findings.
00^^7^^^ ^
http://wikileaks.org/wiki/Draft:The^Most_Wanted_Leaks_of^2009 sort Sattirday,June01,2013 15:39:36 PM
Dt^ft:TheMostWantedLeaksof20^ sort WikiLeaks Page^ofl2
^ The Opposition recently brought up in Parliament the issueoftaxpayers'money being used to pay attomeys by state.Although the public has
aright to know how much of its fiinds were used in paying said attomeys, the Attomey General refiised to disclose the sums, saying it would
be an invasion ofthe lawyers'privacy.
^ The same goes forarecent request in Parliament, whereby ^the Minister ofPlanning and Development was asked to produceacopy of the
contract fcir the billiondollar Waterfront Development Projects The Minister's response was that she could not prciduce said contract for
public discussion because there wasaconfidentiality clause contained therein(fc^raproject being built with public fiinds).
^ The Ministry of Culture recently awarded scholarships for students to study abroad-when asked in Parliament to disclose the list of recipients
and the dollar value of the scholarships, the response was that this was private infcirmation.
Uganda
^ Ugandan profit-sharing agreements with oil companies in south-western Uganda
^ Brief: The govemment ofUganda has recently signedanumberofprofit-sharing agreements with several oil companies that are
conducting explorations in southwestem Uganda. Releasing these documents would beamajor step in increased transparency with
respect to the country's emerging oil industry.
united ^in^dotn
^ Censorship in UK
^ Brief: List of current and expiredDNotices
^ Entity: dnotice
^ Brief: secret gag orders, injunctions and legal threats sent to tJK newspapers
Entity: legal contact addresses at the Guardian, Daily Mail,Times,lncJependent, Evening Standarcf, etc.
^ Brief Censorship list for the United Kingdom's "voluntary" filter system. Known to be held bvThe Internet Watch Foundation.
Companies and their subsidiaries which are currently being supplied with the IWF list. Most ISP's in the UK haveacopy of the IP's on
the list.
^ Entity:The Intemet Watch Foundation
^ Irac^ war planning
^ Brief The secret cabinet minutes and legal advice pertaining to the allegedly illegal war and ongoing occupation oflraq.
^ Roger mollis surveillance
^ Brief UK Govemment documentation into the investigation ofRoger Hollis, head ofMI5 between 1956 and 1965,including the repori
by LordTrend, into the serious but apparently unproven allegations ofbeingaRussian Spy.
^Entity: M15
^ Wythenshawe intelligence centre
^ Brief Documents detailing the information stored and collected bythe Wythenshawe intelligence centre.]^
^ Police surveillance on climate change protestors
^ Brief Acopy ofthe police intelligence handed to E.OI^ about climate change protestors. 13]
^Entity:EON
^ MP expenses
^ Brief The fiill MP expenses data: how much theTelegraph paid forthem.
^ Entity: DailvTelegraph
^ Entity: UK Parliament
^ Allan Cappelow murder
^ Brief Documents revealing why the trial ofWangYam, who was convicted ofkilling Allan Chappelow, was held in camera, the first
LfK murder trial ever heard behind closed doors without access by press or publicl4]
^ Nationalisation ofNorthem Rock and Bradford^Bringley
^ Brief The proper reasons fornationalisationofl^orthem Rock and Bradford^Bingley,and the subsequent sale of the latter's savings
buisiness to Santander.
^ Brief Records of events during the twelve months leading up to the nationalisation ofBr^dfcird^Bingley.
^ Brief Information regarding the valuation process to determine compensation for fromer shareholdersofNorthem Rock and Bradford
^Bingley,that is, the information the independent valuer uses to determine the final value of the comapanies.
^Entity: B^B
^ Entity: Northem Rock
^^B^S takeover
^ Brief Copies ofgovemment minutes ofmeetings between Gordon Brown anchor Alistair Darling and representatives ofLloyds Bank
relating to the proposed takeover ofHBOS.
^ tnvestigation into Oaveport Lyons
^ Brief Documents from Solicitors RegulationAuthority's investigation into DavenportLyons threatening letters related to filesharing.
00^^7^^^
http://wiki1eaks.Org/wiki/Draft:The_Most Wanted Leaks_ot^2009 sort Satttf^day,June01,2013 15:39:36PM
Dt:aft:TheMostWantedLeaksof20^^ sort WikiLeaks Page9ofl2
Ignited nations
^ Security Council and Oar^ur
Brief Requests to the Security Council in 2003 that the Security Council look at what was happening in Darfur, and any notes of
discussions leading to the decision not to look at the situation.
^Date:2003
^ Entity: U^ Security Council
^n^ted states
Important bulk databases
^ Intellipedia
^ Brief Classified intelligence community site as of11/1/^008, including article history.
^ opensource.gov
^ Brief: The complete CIA Open Source Center analytical database.The database is extensive, unclassified, non-public, but relatively
accessible to certain outsiders afterjumping through hoops.Despite its name, you need to be govemment official to gain access to it.
Entity: opensource.gov
^ Pacer database
^ Brief The completePACERdatabase.ThePACER database contains extensive US federal court records They are public documents,
currently behindapaywalLSee http://arstechnica.com/techpolicy/news/2009/04/case-againstpacer.ars
^Entity: PACER
Federal politics
^ The missing five million Wbite House emails-^possibly no longer in existence.
^ Chenney and Rumsfeld Archives
^ The Wbite House visitor's list
^ Minutes or notes for VP Cheney's Energy Conference.
^ Thel141 pages of ACTAbackgrotmd documents not released to the EFF by the USTradeRepresentative(seel5])
^ Alist of all Wbitehouse and senior federal govemment employees holding dual citizenship and the countries they represent.
Military and intelligence
^TheSlOP
.^OPLA^/CONPLAN 8022,2003 revision.
^OPLAN/CONPLAN 8044,2007revision
^ CIA detainee interrogation videos.While tbe CIA claims to have destroyed 92 ofthe videos, others are known to remain.
^ The US "Black Budget",from inception to present, with line items, hopefully annotated and explained.
^ Detainee abuse photos withheld by the Obama administration.
^ Wiretapping program led by NSA
^ Brief Correspondence between the National Security Agency and American telecom companies such asAT^T,Verizon, and ^west,
regarding the warrantless wiretapping program. Correspondence involving telecoms who cooperated with the NSA(e.g.AT^T) may
give different information than telecoms who refused(e.g.C^est), but both types would better shed light on tbe l^SA'sprogram.The
existence ofthis correspondence is well documented in the media, for example that t^west's lawyers refiised to cooperate because the
FISA Couri had not signed off on it.
^Entity: NSA
^ Entity: Owest
^Entity:AT^T
^ Entity: Verizon
^ Unredacted copy ofDept of Justice's Office oflnspectorGeneral's"AReyiew of the FBI'sActions Connection With Allegations Raised By
Contract Linguist Sibel Edmonds" July I,2004(redacted version here bttp://www.wbezorg/F1LES/sibel.pdf)
^ Camp Delta(Guantanamo)Standard Operating Procedure ^005 2009.
^Iraq US Army Ru1esofEngagement^007 2009 (SECRET)
^ Unredacted Inouiry into theTreatmentofDetainees in US Custody,20 Nov 2008.
^ Memorandum between the CIA and the Department ofState detailing any constraints on Darfur policy caused by actual or anticipated
Sudanese govemment cooperation on counter-terrorism, including CIA request to USUl^ that Salah Gosh be removed from the LJN Panel of
Experts list ofthose recommended fcir sanction. See: http://www.sudantribune.coni/artic1e.plip37id artic1e^10205
^ Department ofState and CIA contributions to tbe ObamaAdministration's20tJ9 Sudan Policy Review,inpariicularwithrespectto: a)
Whether to support the ICC arrest warrant against Sudanese President Bashir:b)whether to takeaconfrontational or an appeasement approach
to the Sudanese govemment on the issue ofDarfiir.
^ Camp Delta(Guantanamo)Standard Operating Procedure 2005 2009.
^ Camp Delta(Guantanamo)lnterrogation Standard Operating Procedure 2003-2009.
^ Correspondence between the National Security Agency and American telecom companies such asAT^T.Verizon,and C^est, regarding the
warrantless wiretapping program.Correspondence involving telecoms who cooperated with the NSA(e.g.AT^T) may give different
information than telecoms who refiised(e.g.t^est), but both types would better shed light on the NSA's program.The existence of this
correspondence is well documented in the media, for example that t^west's lawyers refiised to cooperate because tbe FISA Couri had not
O^^l ^^^^ ^
http://wikiIeaks.org/wikiBDraft:TheMostWanted_Leaks_ot^2009 sort Satttrday,June01,2013 15:39:36 PM
Di^ft:The Most Wanted Leaksof20t^^sort WikiLeaks Pagel0c^fl2
^Iraq and Afhanistan US Army Rules ofEngagement 2007 2009 (SECRET).
^ClABDIA/NGA/NSAanalysesoftbe VRYAN crisisof1983.
^ Technical specifications ofthe KH-lland follow-on satellites with similar capabilities.
^ The contents ofthe Football,and how they changed overthe years during the c^iffi^rent Administrations.
^ What Pollard stole and gave to tbe Mossad, the fiill text.
^ US psychological profiles andpolitical analysesofSoviet leaders.
^ Documents relating to orbital weapons systems, and whether the US ever deployed them(or still deploy them) such as orbital HANE devices.
^ Infomnation about thePAN satellite and the agency responsible for it http://spaceflightnow.com/news/n0905/26milspace/
^ Commander Directed Repori oflnvestigation Conceming an UnauthorizedTransferofNuclear Warheads Between Minot AFB,North Dakota
andBarksdale AFB, Louisiana 30 August2007(S//FRD//MR)
^Investigation into tbe Shipment ofsensitive Missile Components to Taiwan (ADM Donald Report) 22 May 2008 (S//FRD//NOFOR^)
^Ai r ForceComprebensiveAssessmentofNuclearSustainment (CANS) July ^008(S//FRD//NOFOR^)
^ General Order Number One issued by commanders in Iraq and Afghanistan
^ Reports about Colombian'falsos positives'
^ Unredacted copy ofDept of Justice's Office oflnspectorGeneral's"AReview ofthe FBI'sActions Connection With Allegations Raised By
Contract Linguist Sibel Edmonds" July 1.2004(redacted version here http://www.wbczorg/F1LES/sibel.pdf)
^ All secret annexes fcir, attachments to, unrecJacted versions of, and documents implicitly or explicitly referenced in the following
documents, which may be partially available in unclassified form:
^ National Security Presidential Directiye51,"1^ational Continuity Policy",Mlay9,2007,also known as Homeland Security
Presidential Directive 20
^ Federal Preparedness Circular 65,"Federal Executive Branch Continuity ofOperations(COOP)",July 26,1999
^FederalResponse Plan !^FEMA9230.1 PL], April 1999
^ Presidential Decision Directive 67,"Endtn^g Constitutional Govemmentand Continuity of Govemment Operations",October
21,1998
^ Presidential Decision Directive 63, "Critical Infrastructure Protection (CIP) ", May ^2, 1998
^ Presidential Decision Directive 6^,""Protection Against Unconventional Threats to the Homeland and Americans Overseas"',May
^^,1998
^^^Ci ^. ^ Federal Response Planning Guidance0194,"ContinuityofOperations(COOP)",December 4,1994
^ ^B^^ational Security Directive 69,""Enduring Constitutional Govemment",June 2,1992
^ ^^Ci5.^ Federal Preparedness Circu1ar61,"Emergency Succession to Key Positions ofthe Federal Departments and Agencies",
August2,1991
^ Federal Preparedness Circular 62,"Delegation of Authorities for Emergency Situations",August 1,1991
^ Federal Preparedness Circular 60,"Continuity of the Executive Branch of the Federal Govemment at the Headquarters Level
During national Security Emergencies",November 20,1990
^ NationalSecurityDirectiye37,"EnduringConstitutiona1Govemment",April18,1990
^ Executive Order 12656,"" Assignment ofEmergency Preparedness Responsibilities"',November18,1988
^ Executive Order l^47^,"Assignment ofNational Security and Emergency PreparednessTelecommunications Functions"',April 3,
1984
^/^.^^i^^^SDD 55, "EnduringNational Leadership" September 14, 1982
m Executive Order 12148, ""Federal Emergency Management"', July 20, 1979
^ Alist of the actual facilities in the Federal Relocation Arc, as ofthe present time, along with their locations.
^ Blueprints, maps, and floorplans ofMWEOC.
la Blueprints, maps, and floor plans ofSiteR(RavenRc^k).
^ Blueprints and floorplans ofall unmentioned facilities in the Federal Relocation Arc, including historical ones.
Banking
^ The complete list ofidentities ofthe 52,000 wealthy American clients suspected ofhiding^15billion at tJBS to avoid taxes, including the
names of any elected or appointed govemment or former government officials.
^ The complete details of Goldman, Sachs^Co.'s counterparty exposure to AIG prior to the Federal bailout of AIG in September, 2008.
Environment
^ Monsanto's intemal evaluations ofGMO products including safety and pollen drift.
Media
^ The Editorial Guidelines for Fox ^ews
^ Emails relating to suppressed G^ Magazine ariicle on Putin's rise by ScottAnderson mentioned at ] ^
Religion
^ Mormons Church records
^ With recent leak of1999/2006 Church Handbook oflnstructions, pertinent documents and covertly photographed artifacts in the vault at
Church Office building or subsidy in Salt Lake City,Utab which expose and negate Mormon Churcli's claim of divinity and its
monopoly on "tmtb."l.e. the concealed remnants of diaries and letters written by former early Mormon apostle William McLellin 17].
McLellin diary and documents was the main point ofinterest for convicted double murderer/bomber Mark Hofmann's planned forgery
attempt to deceive Mormon leaders to obtain in fraud by deception monetary reward to suppress truth ofearly Mormon history
unfavorable to current Mormon religion. For more info. 18].
00^^^^^7 ^
http://wikileaks.org/wiki/Draft:The_Most_Wanted Leaks of^2009 sort Sattirday,June01,2013 15:39:36PM
Draft:The Most Wanted Leaks of 20o^-sort - WikiLeaks Page 11 of 12
" Documents ofMormon Church's billion-dollar investment in City Creek Mall and Condominium in SLC, which may put Mormon
Church's IRS tax-exempt status in jeopardy i f there is verification of the allegation the Church used tithe and offering monetary
contributions by the members to fiind the project under the umbrella of tax-exempted religious fi-eedom.
Mormon Church leadership's involvement in politics, such as correspondence to ecclesiastical subordinates (bishopric) on policy and
attitude towards same-sex civil rights & other sensitive issues relevant and conceming to the leaders. As well as recorded
correspondences between Mormon members of Utah legislation and Church leaders on sensitive political issultalic texies for legislation
purposes which may contravene the separation of church and state.
Uncovered film or audio recording featuring the play with the actor portraying Protestant minister encouraged by Satan/Lucifer
(portrayed by actor) to spread false doctrines to attack all religions outside ofMormon religion as "abominable" which was exhibited for
qualified "temple recommend" audiences in all of the existing temples prior to removal in 1990 (almost like leaked Scientology
orientation video) 9].
Unearthed secret audio or video recording inside Mormon temple with the temple members swearing "blood oath" before removal in
1990.110]
" Documented Church leaders' and lay clergy's cover-up of physical/sexual abuse and rape of minors by missionaries and members
without reporting to law enforcement in some cases 111].
Older editions of Church Handbooks of Instructions fi-om the first edition up (12] for comparison to recent leaked 1968 (truncated),
1999 and 2006 editions.
Vatican
Vatican secret archives
Brief The Index ofthe Vatican Secret Archive. At present pre-screned scholars are allowed to see it but not copy it (under scholar mle
'*16 http://asv.vatican.ya/en/fond/ainm.htm)
Vatican's documents on nazi Germany
Brief All documents pertaining to Nazi Germany and the Vatican, as well as those relating to the post-war rat line to Argentina. Refer to
http://news.bbc.co.Uk/2/hi/europe/2611847.stm
International organizations
Bilderberg Group
" Brief; Bilderberg Group meeting minutes, papers and annual reports of since 1954. WikiLeaks has some years already. Bilderberg is an
annual off-the record conference of transatlantic political, economic and ideological agenda setters. As an historically important
confidential document collection it is probably only equaled by Cabinet minutes and high level intelligence and diplomatic assessments.
Leads: There are some older, previously unnoticed records in boxes at Uni of Illinois
http://www.librarv.illinois.edU/archives/uasfa/1535051 pdf (1956-1970) the George Bush library,
http://bush1ibrary.tamu.edu/research/finding aids/pdfs/08-0379-F.pdf and the Eisenhower Library in Kansas
http://www.eisenhower.utexas.edu/Research/Finding Aids/PDFs/Jackson CD Records.pdf
Entity: Bilderberg Group
Alliance Base
" Brief Documents regarding the founding and operation of Alliance Base.
Retrieved from "http://www.wikileaks.0rg/wiki/Draft:The Most Wanted Leaks of 2009-sort""
Categories: Bulgaria | Czech Republic | Denmark | Estonia | France | Germany | Iceland | Italy | Latvia | Lithuania | Netherlands | Norway | Poland |
Romania | Slovenia | Spain | Turkey | United Kingdom | Switzerland I Sweden | Malta | Portugal | Luxembourg | Finland | Belgium | Cvpms | Canada
I Slovakia I United States
Views
Page
discuss
View source
Personal tools
Log in
Main Page
Country index
Follow us
I Go I I Search
What links here
Related changes
Special pages
mws^8
http://wiki1eaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort
r:^^
Sattirday, June 01, 2013 15:39:36 PM
Draft:The Most Wanted Leaks of 20u, sort - WikiLeaks Page 12 of 12
Permanent link
Flattr profile
Follow us on Twitter
Check our Reddit
Digg this page
Twitter this
00527899 ^
http://wikileaks.org/wiki/Draft:The_Most_Wanted_Leaks_of_2009-sort Sattirday, June 01, 2013 15:39:36 PM
Prosecution Exhibit 111a
4 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
UNITED STATESOF AMERICA
Mannings Bradley E^
PFC^U.S.Army^
HHC^ U.S. Army Garrisons
JointBaseMyerHendersonHall
FortMyer^Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
Lt Col (Retired^ Martin Nehring
June201^
It is hereby agreed by the Accused, Delense Counsel, andTrial Counsel,that i f Lt Col
(Retired) Martin Nehring were present to testily during the merits and pre sentencing phases of
this court martial, he would testily substantially as li:^IIows.
1. lamaretired Lieutenant Colonel in the United States Air Force. IhaveaBS in Petroleum
Engineering Irom New Mexico Institute ofMining andTechnoIogy in 1982. Ireceiveda
Masters ofPublic Administration IromTroy University in 1995. Ibegan serving on active duty
in the United States Air Force in 1985 asasecond lieutenant. During my career,Ispent 12 years
on active duty andl6years in the Calift^mia Air National Guard. Iretiredin2012. Ideployed
to I^uwait in 2001 with theThird Army. lalso deployed to Kosovo in 2002 li:^r weather
operations. In 2006,ldeployed to Alghanistan and ran all weather operations in Alghanistan.
Throughout my career in the Air Force asatrainedmeteorologist,IpossessedaTOP SECRET
clearance and handled TOP SECRET information. Ihandled classilied inlormation at the
beginning ofmy service in 1985 and had training in how to handle and identily classilied
inlormation. Iworked with classiljedinftormation at all times during my military career.
2. From2009to Febmary 2012,lworkedatUnitedStates Central Command (USCENTCOM).
Iworked inaSensitive Compartmented InformationFacility (SCIF) at USCENTCOM. Initially,
Iworked at the weather desk. After USCENTCOM discontinued the weather desk,Iwas
reassigned underthe USCENTCOM Directorate ofOperations (J3)astheJ3 subject matter
expert (SME) ftoridentilyingJ3 classified equities within United States Govemment official
documentation. In this capacity,Iwas primarily responsiblefor reviewing documents being
processed under the Freedom oflnftormationAct (FOIA) which belonged to or contained
information Irom USCENTCOM J3. For FOIA requests,Ireviewed the requested information
for classilied information to determine whether the document could be released under the FOIA.
Additionally,Iconducted review forrelease ofinformation to family members ofService
Members who were kiIIed,wounded, or kidnapped within the USCENTCOM theaters of
operations and the media, lalso conducted separate reviews for coalition partners because the
standards were different for each. Family members and the media could only receive
unclassilied information. Coalition partners could receive certain classilied information.
Classilied inlormation inadocument could not be released under the FOIA even i f the remainder
ofthe document contained publicly available information because the information is still
protected.
3 InmycapacityastheJ3SME,Irevieweddocumentstoertainin^toUnitedStatesvPrivate
First Class Bradley Manning, which the prosecution provided to USCENTCOM. The documents
provided by the prosecution(submitteddocuments)incIuded, among others, documents Irom the
PROSECUTlONEXHlBIT^^ftorident^atio^
1 PAGEOFFERED: PAGEADMIT^D:
PAGEl OF^ PAGES
Combined Information Data Network Exchange Iraq(CIDNEl), the Combined Information
Data Network Exchange Alghanistan(ClDNEA), other documents related to the AR 156
investigation ofthe Farah incident, andalile named ^^BE22PAX.zip^^containingavideo named
^^BE22PAXwmv^^(Gharani video)
4. Iwas tasked though the J3TaskManagementTooL Ireceived the submitted documents li^om
theUSCENTCOMJAGoflice. My assignment required me to determine whether the submitted
documents contained classilied information at the time they were compromised. Ireviewed the
documents for classilied USCENTCOM J3 equities.
5. Todetermine whether submitted documents were classilied at the time of compromise,lused
three classilication guides. lusedaUSCENTCOM classilication guide dated before
OPERATION IRAOIFREEDOM, the updated version ofthat USCENTCOM classilication
guidedatedduringOPERATIONIRAOIFREEDOM, andthe version ofthe USCENTCOM
classilication guide that was current at the timelconducted the classilication review.Idid not
consider the following in making any determination:(l)what, i f any,ofthis material was
included in open source reporting, (2)what, i f any,ofthis material was available in unclassilied
publications(e.g. Army Regulations or Field Manuals), and (3)what, i f any,ofthis material may
have been shared at the tactical level during the key leader engagements described below.
6. lappliedaprocess-oriented approach toward applying the classilication guide to each ofthe
submitted documents. First,IwouId determine the date ofthe document and use the
classilication guide appropriate for each document^sdate. Iwould determine the document's
classilication at the time the document was created. Documentsldetermined that were
unclassilied were removed Irom the collection of submitted documents. lnfact,lapproachedthe
documents witha^^FOIAmindset^^ and tried to ensure each document was not actually classilied.
Idid not presume any document was classilied and reviewed each line in each document for
classilied inlormation.
7. Second,Ireviewed the document to determine i f i t was classilied at the time ofi t was
compromised according to the appropriate security classilication guides. Ireviewed documents
for USCENTCOM J3 equities. Documents containing intelligence were sent to Mr.Louis
Travieso for fiirther review for USCENTCOM J2 equities. Iconductedaline by line review and
reviewed each document for USCENTCOM J3 equities by applying specific paragraphs ofthe
classilication guide(s)lrom the appropriate time period. Where the reviewed document
contained USCENTCOM J3 equities as determined by the appropriate USCENTCOM
classilication guide,lmarked the document as containing informationlbelieved to be sensitive
and classilied. lannotatedthe basis for each classilication decision in my swom declaration
dated 190ctober 2011,which is BATES numbers: 00527370 00527377 Prosecution E^hihit
( PE) ^f or Identification is my declaration. All documents noted in the declaration contained
classilication markings at the SECRET level (hereinafter ^^J3 reviewed documents^^).
8. The J3 reviewed documents consisted of documents collected Irom CIDNE I,CIDNE-A,
other documents related to the Farah investigation, and the Gharani video. The reviewed
documents contained military information, to include militaryplans,weapons systems, or
operations: foreign govemment inlormation: signilicant activity reports (SIGACTs)^ operational
code words when identilied with mission operations: SIGACTsrelated to lact of and general
type oflED attack at specific location on specific date^ participating units, including types of
vulnerabilities, locations, quantities, readiness status, deployments, redeployments, and details of
movements ofUS friendly forces: concept of operations(CONOPS), operation orders(OPORD),
or Iragmentary orders (FRAGOs)^ vulnerabilities or capabilities of systems, installations,
inlrastructures, projects, plans, or protection services relating to national security: and limitations
and vulnerabilities ofUS forces in combat area.
9. CIDNEIand ClDNEAcontainedSIGACT reports The SIGACTsweremarkedas
SECRET. Within the SIGACTs, several categories appeared multiple times. These categories
include key leader engagements, mission report logs, reports on improvised explosive devices
(lEDs)and tactics, techniques, and procedures (TTPs)in response to lEDs, and reports and
responses formissions focused on duty status^whereaboutsunknown (DUSTWUN).
10. ^ey leader engagements described interactions ofmembers ofthe military with local leaders
in Iraq and Alghanistan regardingabroad range oftopics. Disclosure ofthe key leader
engagements would reveal foreign govemment activities, the involvement ofServicemembers
with local foreign leaders, and the identities oflocal leaders.
11. Mission report logs described troop movements, activities, and engagements with hostile
forces. The mission report logs describe tactics, troop Iocations,weapons and military
equipment used.
12. lED reports detailed the casualties inflicted on Servicemembers, the locations ofthe attacks,
and TTPs for detecting and responding to lEDaftacks. The lED reports recount the attacks of
hostile forces, troop locations, and the capabilities ofUnited States forces.
13. DUSTWUN reports stated the names and other personal information ofkidnapped
Servicemembers and theTTPs in response to locate the kidnapped Servicemember. The
DUSTWUN reports state troop locations, tactics, encounters by military forces with hostile
forces and foreign nationals.
14. The 53 CIDNEIreports that contained J3 equities are located in Appellate Exhihit(AE)
^01 andthathavethe BATES numbers: 00377912 00377918,00377921 0377933,00377935
00337938,00377940 00377949,00377952 00377958,00377960 00377963,00377965
00377980, 00377983 00377986, 00377988 00378013, and00378016 00378026 TheseCIDNE-
1 reports are contained within PE^^I^or ID. The 36 CIDNEAreports that contained J3 equities
are locatedinAE^^l and thathave the BATES numbers: 00377846 00377846,00377849
00377856, 00377860 00377871, 00377874 00377883, 00377886-00377905, and 00377907-
00377910 TheseCIDNEAreportsarecontainedwithinPE^for ID
15. The J3 reviewed documents contain SIGACT reports from ClDNE-lthatldetermined
contained classilied information according to the applicable security classilication guides. These
SIGACT reports li^omCIDNElwere all marked ^^SECRETBAdditionally,theJ3 reviewed
documents contain SIGACT reports Irom CIDNEAthatldetermined contained classilied
information according to the applicable security classilication guides. These SIGACT reports
li^omCIDNEIandClDNEAwereall marked ^^SECRETBTheJ3 reviewed documents within
PE^Ior ID and PE^for ID contain multipleformsofmilitary information, to include but not
limited to the following: (l)threat of attack in an area byaspecilic group: (2) conlirmedthata
previously reliable sotirceofintelligence provided information: (3)involved direct and indirect
lire reports:(4) reported casualties:(5) reported loss of equipment:(6) stated types ofweapons
encountered in an enemy engagement: (7) reported the eflectiveness oflED attacks: (8)reported
the locations oflED attacks: (9) identiliedlED TTPs forresponding to lEDaftacks^(lO)
identified TTPs for identilying and neutralizing IEDs:(ll)identilied by name suspects in
investigations:(12)identified quick response force mobilization TTPs:(13)identified code
words^(14) involved Iriendly action reports:(15) stated details of military missions^(16) named
multiple enemy groups:(17) reported lack of casualties:(18)reported lack ofloss of equipments
(19)identilied general enemyTTPs: (20) involved an enemy small arms fire report: (21)
identified enemy target by name: (22)stated eflectiveness of enemy actions: (23)describeda
military raid: (24) identified sources and methods ofintelligence collection: (25) identified
responses based on intelligence gathered: (26) detailed arrest ofasuspect: (27) stated detention
ofasuspect would haveasignilicant impact on military operations^ (28) described Iriendly
action of linding and clearing caches: (29) involvedaborder operations report: (30)describeda
civil disturbance: (31)identilied unit locations: (32)reported enemy casualties: (33)stated
planned unit movements (34) stated details ofcombat patrols^ (35) described key leader
engagement: (36) assessed eflectiveness oflocal outreach programs: (37) detailed kidnapping of
aServicemember: and (38) described initiation ofDUSTWUN procedures.
16. Additionally,lreviewed documents Irom the AR 15-6 investigation intoamilitary operation
that occurred in Farah province, Alghanistan on or about4May 2009. TheAR15-6
Investigation into the Farah incident was focused on investigating the circumstances surrounding
alargescale civilian casualties(CIVCAS) incident. The incident occurred in Gharani,which is
avillageinFarah Province, Alghanistan. The documents from the AR156investigation that
contained J3 equities are located in AE^^l and that have the BATES numbers: 00377425-
00377492, 00377496 00377498, 00377627 00377637,00377674-00377675,and 00378029
00378081. These documents are contained within PE^l^or ID As noted in P E^ ^ o r l DI
found that these documents contained informationlbelieved to be sensitive classified because
they reveal operational activities,weapons systems, and code words.
17. As part of my review of the Farah documents,lreviewedafile named ^^BE22PAX.zip^^
containingavideo named ^^BE22PAX.wmv^^ (hereinafter ^^Gharanivideo^^). PEl ^f or l Di s a
CD that contains both lileslreviewed. The Gharani video depicts portions ofamilitary
operation in the Farah Province, Afghanistan. The Gharani video reveals operational code words
associated with the mission. The video also reveals operational activities including troop
movements and weapons systems. Finally,the video includes specific information contained on
the heads up display.
18. After my review ofthe above relerenced documents for USCENTCOM J3 equities,!
forwarded my conclusions and recommendations to Deputy Commander, USCENTCOM an
Original Classilication Authority for his final determination as to whether the information is
properly classified.
Kvv'zKr
ALEXANDER VON ELTEN
CPT, JA
Assistant Trial Counsel
^(urviA^ ^ l^v^^M^
THOMAS F. HURLEY
MAJ, JA
Military Defense Counsel
BRADL'EY E. MANNING
PFC, USA
Accused
UNITED STATESOF AMERICA
Mannings Bradley E.
PFC^U.S.Army^
HHC^ U S Army Garrisons
JointBaseMyerHendersonHall
FortMyer^Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
Ms. DehraVan Alstyne
:^June2^13
!t is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that i fMs.
DebraVan Alstyne were present to testify during the merits phase ofthis courtmartial,she
would testily substantially as follows:
1. lam the Aunt ofPFC Bradley E. Manning. Brad came to live with my lamily in the summer
of2006. Brad uses my home as his homeofrecord and spends his leave and holidays with us.
When Brad came back li^om Iraq for his midtour leave in January of2010, he stayed with us at
my house. Brad came home on Sunday,the24thofJanuary. On the night ofthe 25th ofJanuary
he went to Boston to visit his Iriends. Brad retumed from Boston on Monday,the 1st of
February and came back to stay with us fbr the remainder ofhis time. When Brad retumed,we
got hit withabig snow storm on Friday night, the 5th ofFebmary,so we ended up not doing
very much otherthan playing board games. Afterthe snow storm, we were without power until
Sunday,the7thofFebmary. Irecall Brad leaving during this time by walking out to the main
road and telling me thatafi^iend was going to pick him up.Ido not know where he went, as it
was not my usual practice to ask him where he was going. Brad left for Iraq on the moming of
the9thofFebmary.
2. On November 2nd, 2010, Special Agent (SA)Mark Mander searched my house in connection
with this case. Iwillingly consented to this search. Prior to the search,Iidentilied items
belonging to Brad and allowed SA Mander to search Brad^sroom in the basement. lalso
identified Brad^spossessions and several boxes that contained Brad^spossessions. These boxes
and the surrounding area only contained Brad^spossessions. One ofthe boxes wasabox that
Brad had sent to me in April of2010lTom Iraq. The box contained two soft cover books, two
MarylandT-shirts and one FOB Hammer IraqTshirt. After SA Mander finished his search, he
set asideanumberofitems on Brad^sbed and asked me whether any ofthe items belonged to
me or anyone else, and not Brad, lidentilied all the items as belonging to Brad. lam familiar
with the items that were collected by SA Mander. He collected several ofBrad^spersonal items
like books, packages, and digital media.
3. SA Mander, SA JohnWilbur, SA Ronald Rock, and SAEzioVeloso came to interview me on
Junel8th,2010. The agents asked me several questions. One ofthe agents asked me about
how Brad felt about the Army. Based upon our discussions,!knew that Brad was proud ofhis
^ob and ofbeing in the Army. However, Brad seemed to be very quiet when he retumed Irom
Iraq for his mid tour leave. He also seemed depressed to me. The agents also asked me about
the various email accounts thatlhad used overthe years and that Brad had used overthe years
PROSECUTION EXHIBIT^^fori de^fi cat i on
PAGEOFFERED: PAGEADMITTED:
PA08^ OF^PAGES
and his Facebook account. lam familiar with Brad^semail accounts. The account names that
Brad used in communications with me are ^^bradley.e.manning^gmail.com^^ and
^^brad405(^earthlink.net^^. lalso told the agents the Ijvediflerent email addresses thatlhad used
with Brad overthe years. Most ofthose email addresses were either Gmail or EarthLink
addresses, lam also lamiliar with Brad^sFacebook account, aslfollowed Brad onFacebook
and also postedamessage to hisFacebook page on his request after his arrest. Brad called me
Irom Kuwait after his arrest. During our conversation, he asked me i fl had seen the apache
helicopter video. Whenlsaid thatlhad not. Brad asked me to doasearch for ^^Collateral
Murder.^^ Brad believed the video was going to be ^^bignews^^ and that it would makea^^big
splash^^ in America. As part ofthis conversation, Brad asked me to postamessage to his
Facebook account to let others know that he was alive and why he was arrested. Ipostedthe
following message for Brad: ^^Someofyou may have heard thatlhave been arrested fbr
disclosure ofclassilred information to unauthorized persons See http://colIateraImurder.com/.^^
4. Irecognize the picture marked as Prosecution Exhibit (PE) 40 for Identilication. PE4^
for ID isapictureofBrad in his room oftaken while he was on his midtour leave. Iknowthis
because the picture captures how Brad and his room looked around that time period.
V_x . ^( WVI / l Y^ J-
ASHDEN FEIN THOMAS F. HURLEY ^ BRADfOY E. MANiffl
MAJ, JA MAJ, JA PFC, USA
Trial Counsel Military Defense Counsel Accused
UNITEDSTATESOF AMERICA
V.
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
Mr. Wyatt Bora
jOiJune 2013
It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that i fMr.
Wyatt Bora were present to testily during the merits and pre-sentencing phases of this court-
martial, he would testily substantially as follows.
1. I am a retired Captain in the United States Air Force. I served on active duty from 1987 to
2008. I have a BS in Computer Engineering from the University of New Hampshire in 1999. I
have a Masters in Computer Engineering from Rensselaer Polytechnic Institute in 2004. In the
Air Force, I primarily worked as a computer engineer and a manager of other computer
engineers. I also wrote computer code and created technical software solutions. I created
interactive lab displays with speech control. I managed air operations system tests and
development for command and control of the Air Operations Center. I also worked as a systems
engineer on large information technology (IT) systems designed to manage financial
transactions. As a systems engineer, I planned IT system architecture to ensure the system
worked together, managed requirements and costs, and scheduled performance tests.
2. After retiring from active duty in 2008,1 began working at the Air Force Research Lab in
Rome, New York, as a civilian working on acquisition of command and control IT. At the Air
Force Research Lab, I managed other IT programs with a focus on command and control
applications at the operational level.
3. In January 2012,1 became the Program Manager (PM) for the Combined Information
Database Network Exchange (CIDNE) program. As the PM for CIDNE, I am responsible for the
day-to-day management of the entire program. I am responsible for finances, to include
projecting budgetary requirements and meeting the program's budget. I am also responsible for
ensuring that customer needs are met. Customers submit change requests that request the
addition of a fiinction or a change to current fiinctionality. I make sure customer functionality
needs are met. Customers also submit problem reports that note bugs and flaws in the system. I
make sure that these bugs and flaws are corrected.
4. CIDNE is a reporting and querying system. CIDNE links operations information with
intelligence information and breaks the traditional stovepipe separating the two types of
information. In particular, the system linking intelligence and operations systems breaks down
stovepipes between the 2 (intelligence), 3 (operations), and 5 (planning) shops. This linkage of
operations information and intelligence information has been designed to provide commanders
with fiiller, more accurate information on which to base command decisions, particularly in the
field.
y <^ ^
PROSECUTION EXHIBIT ))< for identification
PAGE OFFERED:
PAGE ^ OF ^ PAGES
PAGE ADMITTED:
5. CIDNE isadirectreporting system forthe United States Central Command (USCENTCOM)
and is used by USCENTCOM and its subordinate commands. In September 2007,
USCENTCOM issuedFRAGO09 1290todirectalI units to useCIDNEforreport creation As
areporting system, CIDNE allows users to enter information intoareport. Thereare
approximately 130 types ofCIDNE reports. Some ofthe 130 types ofCIDNE reports are
Human Intelligence (HUMINT) reports, HumanTerrain reports. Counter IED(CIED)reports,
Targeting reports, Socio Cultural reports. Civil Affairs reports. Psychological Operations
(PSYOP) reports, and Significant Activity (SIGACT) reports. One ofthe reports frequently
used by Servicemembers in the field is the SIGACT reports. ASIGACTisareport created by
aServicemember at the completion ofamission. The SIGACT is input into CIDNE for use by
the unit that completed the mission and any other unit with authorized access to CIDNE. Ofthe
approximately 130 types ofreports, the SIGACT is the most commonly used report on CIDNE.
SIGACTsconstitute approximately 24^ of all reports created, depending on the reporting
period.
6. For SlGACTsand other reports, CIDNE requires completeness. CIDNE has automatic
quality assurance built into the database, andauser cannot completeareport without entering
information into specified fields. AdditionalIy,CIDNE has manual quality control because most
reports are reviewed for completeness by people engaged in quality assurance. The quality
control mechanisms ensure that the reports contain sufficient inlormation for future use.
Furthermore, CIDNE reports are marked according to their classification, including unclassified,
confidential, and secret.
7. CIDNE is alsoaquerying system because authorized users can search the database for
previous reports. Auser can search by keywords, to include terms and topics, dates, and
locations. This querying system allows users to see and use any report in the CIDNE system.
CIDNE uses database administrators. In 2009-10, these administrators were onsite,which
means they must be present at the physical location of servers, to include Iraq, Alghanistan, and
Tampa, Florida. CIDNE isacomplex system with millions oflineofprogramming code due to
the volume ofdata. In particular, creating the stmcture to make the data retrievable(searchable)
requires significant resources. The program has continually employed approximately 20 30 or
more programmers to develop, maintain, and debug the code for CIDNE so that the database
may maintain all the different reports, including SIGACTS fbr use on classified networks. In
2007,the program spent approximately ^900,000 on data management in Iraq. In 2008, the
program spent approximately^l,000,000 on data management in Iraq. In 2009,the program
spent approximately ^4,200,000 on data management in Afghanistan and^l,800,000 on data
management in Iraq. In 2010, the program spent approximately ^3,600,000 on data management
in Alghanistan. In 2011, the program spent approximately ^3,000,000 on data management in
Afghanistan and ^570,0000on data management in Iraq. In 2012, the program spent
approximately ^5,000,000 on data management in Alghanistan. These data management costs
are directly associated with keeping the data useable on the classified networks. Ido not know
the data management costs for Iraq fbr 2005,2006, 2010, and 2012,andldo not know the data
management costs for Alghanistan for 2005.
8. CIDNE has undergone constant development in its existence to improve its fiinctionality.
CIDNE is currently being developed to save costs by changing its configuration to permit
changes to reports withoutadeveloper'sintervention at the physical location ofthe user.
Responses to change requests require new code to be added. Depending on the nature ofthe
change request,which range from addinganew field to an existing report to creating an entirely
new report, coding development can take anywhere from5to several hundred hours. These
developments require research and incur significant costs. In 2005, the program spent
approximately^!,100,000 for development and testing in Iraq and^l,800,000 in development
and testing in the Continental United States(CONUS). In 2006, the program spent
approximately^l,770,000 for development and testing in Iraq and ^790,000 in development and
testing in CONUS. In 2007,the program spent approximately^l,320,000 for development and
testing in Iraq and^l,810,000 in development and testing in CONUS. In 2008,the program
spent approximately ^950,000 for development and testing in Afghanistan, ^2,690,000 for
development and testing in Iraq, and ^3,610,000 in development and testing in CONUS. In
2009,the program spent approximately ^2,760,000 for development and testing in Afghanistan,
^3,280,000 for development and testing in Iraq, and ^5,500,000 in development and testing in
CONUS. In 2010, the program spent approximately ^4,200,000 for development and testing in
Alghanistan, ^2,650,000 for development and testing in Iraq, and ^4,980,000 in development
and testing in CONUS.
9. Togain access to CIDNE,auser first needs to be authorized to access an IT system. Second,
auser needs to be authorized to useanetwork domain authorized to host CIDNE. CIDNE and
SIGACTswithin CIDNE are only available on classified networks. All classified domains on
which CIDNE exists requireasecurity clearance to access. FinaIIy,auser must be authorized to
access the database. Auser can obtain access only ifhe hasasecurity clearance andaneed to
know the information accessible on CIDNE. By delault, CIDNE is read only. Auser must apply
for permission to be granted the ability to create reports on CIDNE.
10. CIDNE currentlyuses 12 Centrixserversand9SIPRNET servers During2009 10, CIDNE
used additional servers. Each server costs approximately ^48,000. Servers hosting CIDNE-Iraq
were hosted in Iraq. CIDNE-Alghanistan servers were and are located in Alghanistan. Some
servers were and are located in Tampa, Florida. In 2007,the program spent approximately
^720,000 on hardware in Iraq. In 2008, the program spent ^560,000 on hardware in Afghanistan
and^l90,000 on hardware in Iraq. In 2009,the program spent approximately^l,660,000 on
hardware in Afghanistan and ^520,000 on hardware in Iraq. In 2010, the program spent
^760,000 on hardware in Alghanistan. In 2011,theprogram approximately spent^l80,000 on
hardware in Afghanistan. In 2012, the program spent approximately ^3,680,000 on hardware in
Afghanistan.
11. Before units depIoy,they receive training. As PM,Iam responsible fbr ensuring the proper
resources are in place to support the various training courses olfered for CIDNE. The courses
range fromldayto2weeks. In addition, there isathree week advanced course. Also, units
conducting exercises utilize CIDNE as part ofthat training, and the program supports the needs
ofthe units. In 2005,the program spent approximately^!,100,000 for Iraq training. In 2006,
the program spent approximately^!,180,000 for Iraq training and ^480,000 for CONUS training.
In2007,theprogramspentapproximately^2,570,000 for Iraq training and^200,000forCONUS
training. In 2008,the program spent approximately^!,850,000 for Alghanistan training,
^5,220,000 for Iraq training, and^!,550,000forCONUS training In2009,theprogram spent
approximately ^5,360,000 fbr Alghanistan training, ^6,370,000 for Iraq training, and ^3,660,000
for CONUS training. In 2010, the program spent approximately ^8,140,000.00 for Alghanistan
training, ^5,150,000 for Iraq training, and^3,320,000forCONUS training In20!!,the
program spent approximately^!8,4!0,000 for Afghanistan training, ^2,650,000 for Iraq training,
and^6,!50,000 forCONUS training In20!2,theprogramspentapproximately ^8,790,000 for
Afghanistan training and^2,740,000forCONUS training
12. Icannot aftributeaspecific amount ofthe costs fbr data management, development and
testing, hardware, and training to any specific report. None ofthese costs include operational
unit costs.
13. From2005 through20!2,theCIDNE program spentapproximately^!8!,!60,000on
contracted support required to mn the program, to include development, training, data
management, and hardware. In addition, Irom 2005 through 2012, the program spent
approximately ^5,434,800.00 on program management support, to include govemment testing,
administrative oversight, and research and development. These costs support the development
and maintenanceofCIDNE,which is an information system. The hardware, to include the
servers, involves significant costs. Over 25 individuals work primarily to ensure CIDNE
fiinctionscorrectly,and their salaries are primarily derived Irom their work on CIDNE. The
system has been designed and developed to provide robust features to provide classified
information to commanders in combat environments. The information is valuable because the
system accumulates different types ofinformation in one place for authorized officials to access
and review. The United States govemment has dedicated significant resourcesover
^185,000,000^to CIDNE because the information has significant value to commanders. Year
to year increases in spending can be attributable to increased troop presence inagiven nation.
CIDNE has been designed to aid commanders in making operational decisions, and safety of
operations decisions in particular, based on CIDNE data.
14. At no time was the SIGACT information charged in this case unavailable for access on the
CIDNE database. Those that accessed the SIGACTdatabase before May of2010did so in the
same manner after May of2010. WecontinuetousetheSIGACTschargedinthiscaseinthe
CIDNE database. Tothe best ofmy knowledge, the United States Govemment has never made
these databases publically available.
kvxth-
ALEXANDER VON ELTEN
CPT, JA
Assistant Trial Counsel
THOMAS F. HURLEY
MAJ, JA
Military Defense Counsel
BRADL
PFC, USA
Accused
UNITED STATESOF AMERICA
Manning, Bradley E.
PFCU.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
Mr^PatrickHoeffel
^^Jt^ne2013
It is hereby agreed by the Accused, Delense Counsel, andTrial Counsel, that i f Mr .
Patrick Hoeflel were present to testily during the merits and presentencing phases ofthis court-
martial, he would testily substantially as follows.
1. lamasoftware engineer at Intelligent Software Solutions, Inc.,Colorado Springs, Colorado.
Idesign and write software systems, such as the Combined Information Data Network Exchange
(CIDNE) database, and manage eight other individuals who also write software code for CIDNE.
In 1989,Ieamed my Bachelor ofScience degree in Computer Science li^om Catholic University
inWashington,DC. During the timeIwasaftendingschool,Iworked Irom 1987 tol989 in the
school computer lab as student help desk support. Also, in 1989,Iworkedforarent control
apartment management company writing software. From 1989 tol997,Iworked in Columbus,
Ohio, asasoftware engineer foracompany called Compuserve,which was bought by America
Online(AOL). From 1997 to 1998,IadditionalIy worked asaconsultant for Compuware,
contracted to MCI, which is now Verizon.
2. In 2000,Ireceived 80 hours of course instmction on the Design and Maintenance of
StmcturedOttery Language (SOL)Server Databases and Systems. This instmction provided
foundational knowledge fbr my work asasoftware and database engineer. From 1998 tol999, I
worked at software startup company calledTribalVoice. AtTribaIVoice,Iwasasoftware
engineer.
3. From 1999 to 2006,Iworkedatasoftware startup company called ConfigureSoft, in
Colorado Springs, Colorado. Iworked at ConfigureSoft asasoftware engineer with an emphasis
on the design of database systems. lalso designed databases and software systems to be used by
systems administrators. Asadatabase and software designer,Ibecame familiar with systems
administration.
4. lhave worked at Intelligent Software Solutions, Inc.since September 2006. During my time
at Intelligent Software Solutions,Ihave spent two years as the lead CIDNE engineer in theater
and at corporate headquarters. lhave been responsible fbr the management of daytoday
CIDNE engineering operations. lhave managed approximately 20 individuals that range Irom
software engineers, to database engineers, testers, and system administrators.
5. lhave no military experience, butlhave deployed asacontractor with Intelligent Software
Solutions, Inc. Ideployed to Victory Base Complex (VBC), Iraq Irom September 2007 to
December 2007 asasoftware engineer working on the CIDNE database. Ideployed again from ^ ^ ^ ^
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ 1 ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
PAGE^ OF^ P^GES
May 2009 to September 2009 to the VBC, Iraq,working asasoftware engineer on the CIDNE
database. From May 2010to August 2010,ldeployed to I^abul, Alghanistan asatheater
technical lead working on the CIDNE database. Ilast deployed Irom May 2011to September
2011to^abul, Afghanistan asatheater technical lead working on the CIDNE database. lhave
over 25 years ofcomputer science expertise developed through courses and experience.
6. lam familiar with the CIDNE software and the database in particular becauseldeveloped the
database. CIDNE isacentralized database that stores information about events, people,
organizations, and lacilities, and makes that information available to users throughout Iraq,
Alghanistan, and the United States. There are diflerent CIDNE databases for Iraq and
Alghanistan. The Iraq server at United States Central Command (USCENTCOM) Headquarters
(HO) is physically distinct Irom the Alghanistan server. The two do not share data with each
other. The Iraq data is stored inaseries of servers that are positioned at various locations in Iraq,
with all data being constantly copied back toaCIDNE-Iraq server at USCENTCOM HO itt
Tampa, Florida, for use by interested entities. All data is the same across all Iraq servers.
Alghanistan data is stored inaseries of servers that are positioned at various locations in
Alghanistan, with all data copied back toaClDNE-Alghanistan server in Tampa. This setup
was created to make data available as broadly as possible.
7. CIDNE can be accessed through one ofthe seven diflerent classified networks, including
SIPRNET andJWICS CIDNE isonly availableon classifiednetworksCIDNEdata is
accessed usingaCIDNE web site. Tosee Alghanistan data, one must openaCIDNEAweb
page onaCIDNE-Alghanistan server. Likewise, Iraq data must be accessed viaaCIDNE-I
server throughaCIDNEIweb site. During the 2009 2010timeft^ame one could accessa
database by logging in as selfregistered or asaguest user to browse. Asoftoday,capabiIities
were developed to see who views data and an enhanced log-in system was designed for access to
the CIDNE database. One can no longer browse the database without logging in asasell-
registereduser. Priorto the recent log-in requirements, the CIDNE databases did not track
individual users'access by IP address or otherwise.
8. CIDNE reports are individual reports ofspecific unit actions. CIDNE is the USCENTCOM
directed reporting tool for the majority ofoperational reporting in Iraq and Alghanistan. It isa
stmctured collection ofdata with over 100 diflerent types ofreports, including Significant
Activity reports(SIGACTs). SIGACTsare only one report type in CIDNE, but it is one of the
most frequently used type ofreport along with Human Intelligence (HUMINT) and Counter-IED
(CIED)reports. SIGACTsare often used because oftheir content. SIGACTsare summaries of
actual events created at the time ofthose events. Thereports state the who,what,when, and
where ofevents encountered by the unit.
9. Auser can createareport only i f the user'sunit administrator grants the authority to populate
reports on the system. Any userwith access to CIDNE onaclassified network could browse the
information. During the 2009-2010timelrame, the CIDNE database did not record who looked
at the data. Instead, CIDNE only recorded who was creating reports and what types ofreports
were being created. As the theater technical lead in Alghanistan,Ilrequently worked with users
who created reports and the types ofreports the users created. CIDNE requires reports have
certain fields completed. The database will not acceptareport unless the required fields are
completed. Classification isamandatory field with unclassified, confidential, and secret as the
options. Thus, all reports, including all SIGACTs, are marked withaclassification. Oncea
report is entered into CIDNE, the database assignsaunique value calleda^^report key''that is
used by the database to identity^ individual reports and allows the user to quickly query the
database.
10. In August 2010,Iwas tasked to participate in the Information ReviewTaskForce(IRTF) at
the Delense Intelligence Agency (DIA) based on my CIDNE expertise. My original task was to
verily and confirm that the compromised data came Irom the CIDNEAdatabase, and laterlalso
was tasked to review the CIDNE-I database. Asapart ofthe IRTF,Iidentified the source ofthe
compromised data, the time frame in which the data was taken based on examination ofthe
released data, and data in the source database. Using computer software,Icompared the
compromised CIDNEAreport keys to the report keys in the original database. Based on my
comparison,IconcIuded the hundreds ofthousands of compromised report keys and the original
report keys on the CIDNE-A database were identicak Ispent about two weeks on the IRTF
initially. Iretumed to the IRTF in November 2010after the CIDNE-I database was released. I
repeated the comparison procedures for CIDNEI. Using computer software,Icompared the
compromised CIDNEIreport keys to the original report keys in the database. Based on my
comparison,IconcIuded the tens ofthousands of compromised report keys and the original
report keys on the CIDNE-I database were identicak
11. At the bottom ofthe CIDNE database search query results screen, CIDNE allowsauser to
export SIGACTS intoa^^.csv" format. CIDNE only exports one month atatime. This export
fiinction is available for users to download specific information in order to use the information
with other programs or systems. During my investigation,Idetermined that the last ofthe
compromised CIDNE-A data was pulled from the CIDNE-A System in the 57 seconds between
11:51:30^ andll:52:27^(^ulu time). Alghanistan servers are all set to ^ulu time, and thus the
reported dates are all in ^ulu time. The compromised data Irom CIDNE-Awas pulled belbre7
Jan 2010 11:52:27^ because that is the date and time ofthe first update made toareport where
the update did not appear in the compromised data. The compromised data was pulled Irom the
CIDNE-A system after7Jan 2010 11:51:30^ because that is the date and time ofthe last update
made toareport where the update appeared in the compromised data. Every modification prior
to that time appears in the compromised data.
12. The compromised Iraq data was pulled li^om the ClDNE-I system in the 14minutesand51
seconds between 04:39:13C and 04:54:04C (Iraq time). Iraq servers are set to local time and
record their dates in local time, which is ^uIu^3on3Jan 2010. The compromised data Irom
CIDNEIwas pulled before3Jan201004:54:04C.The first datamodificationthatdoes not
appear in the compromised data occurred at3Jan201004:54:04C. Every modification priorto
that time appears in the compromised data, while all modifications at this point and following do
not appear in the compromised data.The compromised data Irom ClDNE-I had to have been
pulled after3Jan201004:39:13C. The last modification to appear in the compromised data
occurred at3Jan201004:39:13C.Every modification including and prior to that time appears in
the compromised data.
13. At no time was the SIGACT information charged in this case unavailable for access on the
CIDNE database. Those that accessed the SIGACTdatabase before May of2010did so in the
same manner after May of2010. WecontinuetousetheSIGACTschargedinthiscaseinthe
CIDNE database. Tothe best ofmy knowledge, the United States Govemment has never made
these databases publicly available.
k-fVr
ALEXANDER VON ELTEN
CPT, JA
Assistant Trial Counsel
^Vum/iAA^~ 3r - 1^
THOMAS F. HURLEY
MAJ, JA
Military Defense Counsel
BRAD
PFC, USA
Accused
UNITEDSTATESOF AMERICA
Manning, Bradley E.
PFCU.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
C^^JohnLarne
10Jt^ne2013
It is hereby agreed bythe Accused, Defense Counsel,andTrial Counsel, that i f CW5
John Lame were present to testify during the merits and pre-sentencing phases ofthis court-
martial, he would testify substantially as follows.
1. lam currently assigned to the Pentagon. lhave 22 years of experience flying helicopters for
the United States Army. lhave beenapilot since 1984. lentered active duty in 1990. From
1990 untillJanuary 2011,Iwas an Apache helicopter pilot. AfterlJanuary2011,Ibecamea
general aviation oflicer in light ofmy promotion to CW5.
2 In 1991,IwasaCobra pilot Inl993,Iqualified to flythe Apache AH64A(AH64A) In
1998,IqualifiedasaninstmctorpiIotontheAH64A. lhave flown the AH-64A in combat in
Bosnia. ln2000,IqualifledtoflytheAH64D. Later in 2000,lqualified as an instmctor pilot
ontheAH-64D. Ideployed to I^uwait in 2002 as part of Operation Desert Spring. Ideployed to
Iraq in 2003,andlflew in combat as an AH-64D pilot in Operation Iraqi Freedom. Ideployed
to Afghanistan in 2008 and flew combat missions during that deployment. Insum,Ihave
approximately 3000 hours offlight time and approximately 200 hours ofcombat flight time.
3. From 2004-2008,Iworked at Army Tactics Development at Fort Rucker. In this position,!
developed combat tactics. In particu!ar,Ideveloped tactics driven by equipment, especially
survivability equipment. At ArmyTacticsDeve!opment,Ifle!d tested equipment,verifled the
results, and developed tactics, techniques, and procedures (TTPs)in accordance with the test
results.
4. From 2008-2009,Iwas the tactica! operations officer fbr the brigade aviation element ofthe
3rd Brigade CombatTeam of l l D. As the tactica! operations officer,Imanagedal! attack and
reconnaissance aircraft^ in eastem Afghanistan.
5. Since 2009,Ihave been stationed at the Pentagon and worked at Department ofthe Army
MilitaryOperationsAviation(DAMOAV). AtDAMOAV,IworkintheG3/5/7,which
manages Army aviation. lam the aircraft sttrvivability equipment action officer atDAMO-AV.
6. The AH 64D is an upgraded version of the AH-64A. The AH-64D uses digital displays
whereas the AH-64A relies on analog displays.
7 !amfami!iarwiththevideofl!enamed^^!2JUL07C^ENGAGEMENT^ONE30GC
Anyone.avi" (Apache video)because!reviewed the video. Ireviewed the Apache video fbr
sensitive information, to include systems capabilities and communications. Ireliedonmy
experience asapilot, instmctorpilot, and as an officerin charge of developing aviation
PROSECUTION EXHI BI T^^f or i de
PAGEOFFERED: PAGEADMIT
P^A^ ^OP^ PAGES
defensive technologies. lalso relied on the Noble Eagle classification guide, which set
classificationstandardsforaflhelicoptervideosin OPERATION ENDURING FREEDOM and
then later in OPERATION I I ^O^ FREEDOM. Fina!!y,Iconsidered the security classification
guide for the Apache helicopter itself Idid not consider any open source reporting on this
particular incident. lalso did not consider the fact thatlhave seen similar videos with the
sensitive information visible on the intemet. This video is Prosecntion Exhi bi t l l f or
Identillcation.
8. The Apache video shows the display of an AH-64D. Iknow the display is of an AH-64D
because it is digital, andlhave extensive experience using the AH-64D digital display. The
Apache video shows the highaction display. The high action display shows the use ofalaser for
ranging, altitude and air speed. The laser also shows angles ofengagement. The ranges and
attack approaches areTTPs. Based onmy experience and training,TTPs are sensitive Army
aviation information. Adversaria! forces who knowTTPs could be able to anticipate United
States operations and the adversaria! forces will be able to plan more effective attacks asaresult.
The high action display also shows the heading tape,which reveals the sensor and the sensor's
acquisition oftargets and other information. This display ofthe sensorin action could be used to
determine the limitations of the sensor'scapabilities. Based on my experience and training, the
sensor'scapabilities are sensitive Army aviation information. The sensor also reveals the
position ofthe helicopter during an operation,which could be used to determine more aspects of
TTPs. TTPs areapuzzle, and revealing any piece could make solving the puzzle easier fbr an
adversary.
9. Videos ofArmy helicopter combat missions are recorded regularly for training and reviewed
for eflectiveness. Asahelicopterpilot,Ihave been taught not to release the videos to the public
nor to reveal the sensitive information contained therein. Asahelicopter instmctor pilot,Ihave
instmcted students not to release the video nor to reveal the sensitive information contained
therein.
10. Helicopter units have procedures for protecting the videos and the information the videos
contain. In my experience under the procedures employed by the units, all videos requiring
review are turned into flight operations by pilots or support persotmeL The videos are reviewed
and used again as needed. Thus, the information may be recorded over but it is not physically
released. Ifavideo contains information that requires being saved, the video is ported over toa
system on the SIPRNET. After the information is secured on the SIPRNET,the tape may be
recorded over again. In my experience,videos that are physically released are sanitized fbr the
types ofinformation described in paragraph8ofthis stipulation before the video is publicly
released. The actual video footage is not classified. Coupling the video footage with thedata
makes the information sensitive.
41
KM<4r
ALEXANDER VON ELTEN
CPT, JA
Assistant Trial Counsel
"iLJ^iy^
THOMAS F. HURLEY
MAJ, JA
Military Defense Counsel
BRADLEY E. MANN*
PFC, USA
Accused
Prosecution Exhibit 118a
2 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
UNITED STATES OF AMERICA
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
Ms. Jacqueline Scott
10
June 2013
It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that ifMs. Jacqueline
Scott were present to testify during the merits and pre-sentencing phases of this court-martial, she would
testify substantially as follows:
1. 1 am employed at United States Central Command (USCENTCOM), MacDill Air Force Base, Florida.
1 am a Freedom of Information Action (FOIA) Officer and the Chief of the FOIA and Privacy Section.
This entails reviewing FOIA requests and releasing information as appropriate under the FOIA. FOIA
requests originate from various sources. The public submits request for information under the FOIA.
Additionally, federal agencies receive requests for information under the FOIA, and those agencies may
have responsive documents that contain USCENTCOM equities. Those agencies then contact
USCENTCOM to review the responsive documents requested for USCENTCOM equities. 1 have worked
at USCENTCOM since 1995. 1 have been doing FOIA work since 1999. I have worked exclusively on
FOIA issues since 2005. 1 was previously the Branch Chief of Management, Records, and Forms,
Personnel Management, FOIA, and Privacy.
2. Currently, the FOIA Office handles approximately 350 requests a year. Before 2002, the number of
requests a year was approximately 40. The FOIA office does not make withholding decisions; the FOIA
office only makes recommendations. As a part of the FOIA office, 1 am the first person to see the mail
and requests. When a request is received, 1 determine i f USCENTCOM has the information by
conducting a records search. I also may have to check with the legal office to see i f there is an
investigation pending. Sometimes information may point the FOIA process to equities involving
intelligence, special operations, and planning, among others. USCENTCOM owns the information 1
review for release under the FOIA.
3. After a FOIA request is received, a member of the FOIA office conducts a first scrub. During this
scrub, any information that should not be released because it meets an exemption under the FOIA is
placed in a red bracket or red box. Next, a member of the FOIA team verifies the exemption with the
equity owner. The review is conducted by a subject matter expert (SME). The SME looks through any
requested document for specific types of equities. For instance, one SME looks for J5 equities and
another for J3 equities. A SME works exclusively on his/her branch of equities for FOIA requests. If a
SME believes that information should be declassified, that information is taken to an original
classification authority (OCA) with the authority to declassify. I f the SME verifies a classified equity
with the owner of the equity, the information is marked as not being appropriate for release.
4. Redactions are mainly used for classified information, names of DoD personnel, and anything that
falls under the (b)(3) exemption of FOIA. The (b)(3) section protects personnel assigned to a sensitive
overseas routinely deployed unit. Information pertaining to weapons systems is also not released.
Section (b)(5) also exempts information and applies to a portion of USCENTCOM FOIA investigations.
Section (b)(5) has three part: (1) pre-decisional information; (2) attorney-client documents or privileges;
and (3) attomey work product. Law enforcement exemptions under section (b)(7), such as Inspector p.
/(SA"
PROSECUTION EXHIBIT ||M for identification
PAGE OFFERED:, PAGE ADMITTED: 1
PAGE \ O F X PAGES
Ceneral investigations, also warrant exemption ft^om disclosure under the FOIA. The FOIA office
incorporates the factors listed in Executive Order (EO) 13526 into decisions regarding redactions of
classified information.
5. There isa20 day mandate in the timeline fbr responding to FOIA requests. Onoccasion,alOday
extension may be granted where coordination ofvarious equities requires additional time. After initial
review the legal office reviews the information for legal sufficiency. Thelegal review isalegal opinion
about the FOIA determinations. This isa^^CO/NO-CO process." lfitisa^^CO,"thenitissentbackto
the FOIA office to be packaged and sent to the ChiefofStafffbr approval and signature for releasable
information. I f i t isa^^NOOO,"then the legal officer states the deficiencies, i f any. The FOIA office
responds by correcting the deficiencies and the information is resubmitted for legal review.
6.1am familiarwith the video filenamed ^^12 JUL 07 C^E^CACEMEl^T^ONE30CCAnyoneavi"
(Apache video),which is Prosecution Exhi bi t l l f or Identification in this case because it was the
subjectaFOlA request. Iwas asked to review the records related to the FOIA request fbr the Apache
video. Isearched fbr the records. Ireviewed those records. Idid not find the Apache video. The records
indicated that the Apache video was not released subject to any FOIA request. The AR15-6 Investigation
related to the Apache video was released under the FOIA, and the investigation contained redactions in
accordance with applicable FOIA exemptions.
7. The USCENTCOM FOIA office receivedarequest fbr information related to theFarah investigation.
The investigation pertained toalarge scale civilian casualties(ClVCAS) incident in the Farah Province,
Afghanistan. In response to the FOIA request for information related to the Farah Investigation, an
unclassified executive summary was released on or aboutl8June 2009. The classified investigate officer
report (BATES numbers: 0037^029 0037^065) was not released to the public. No other document or
video related to the Farah investigation was released to the public in response toaFOIA request or
otherwise.
8.On30July2007,CENTCOMreleasedSlCACTinformationasaFOlAreleasefbrSignificant
Activity Reporty(SlOACT) data ft^om 2004, 2005, 2006, and2007.1wasthe individual thatpostedthis
information to the FOIA reading room. The SIOACT information released gave the date and time ofthe
significant activity,the attack type, the target and the location city of the significant activity. The FOIA
release did not include all ofthe information from the SlCACTs. Only that information that was
declassified by an OCAwas released by my office.
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ B ^ ^ ^ ^ i ^ ^
ALEXANDER V^N ELTEN THOMASF.HUl^EY B R A D L ^ ^ . M A N N ^ ^
CPT,JA MAJ,JA PFC, USA
Assistant Trial Counsel Military Defense Counsel Accused
A
n
o
3
r t
a>
o
A
A
O ^
o cr
D C
n- a
m D.
r t n i <
V r t V
V
A
A A A
cr
o:
OJ 3 d
O t - ' QJ 0.
r t 3 D-
r t QJ (D
|<
H- M V
D V QJ
3
r t
a n
CD
n
V A
n
M
^
t o 3
a
QI (D
3
\
-~J CD 3
y-' V O
I O 3
<yi
(D
CO
j
A
p
r
w o
CD f t
r t
o
f t II
H-
D
t j "
vQ M
V t J
A
n
o
3
n-
QJ
n
r t
V
M
I
t _ i .
&
cr
CD
I-l
HI
?r
o
^
f t
r
CD
VI
i
"-Fl NJ
b
h i
C2
^
n
M
O
i
<7
a.
C
C/2
q
( / I
6
rt
cs
O O
4^ u, u,
sssf
K- ' ^
o o
? @
'4L '4L ty^
o o f
i-o i-o ^
o
C
CA!
Q
(/)
65
g
B-
OQ
?
5
i
o'
tD CXs
Si
^
s
^
3
PROSECUTION EXHIBIT 1^0 for identification
PAGE OFFERED: PAGE ADIVHTTED:
PAGE \ OF 1 PAGES
(b) (6), (b) (7)
(C)
A
A A cr
QJ 3 C
QJ v l
H- 3 d
QJ CD
Ul V
V *T3 QJ
Z M n
QI CD n
r t 01 o
3" M
QI Q)
3 W
t/1
CD O
M o a
H
rr] OJ
3
r t
QJ
S
M r t u3
Q)
3 O
^ 3
A fS) s;
o
QJ QJ I-i
cr
H- cr
QI CD w .
Ul I-i QJ
V
n
3
CD
r t
cr
cr
n CD
n M
0. n
CD n
A n
3 a
QJ CD
3
CD 2
V o
cr
o
a
T l hn
EL- C
n Iz:
^ B-
Ci
0 0 '
0 0
NJ O
I I
H
s
g
o*
o
03
o
CL
Q
c*
c/1
Q
( / I
^
I-l
o
r t
O
n
I-l
rs
QJ
or
cr
CD
I-i
V
i i i
,m m M
I-i"
O m
D 73
m
O
s
o
ffl
Ol
G
H
O
z
8
z
5
H
P
^1
O a
r n
M
o
3
O K H cV>
-J . m .
n cn
< ID =5
O H' .
H
il" ^
rt) H I
Cu ID
&
P M
m iQ
o
ID
O fD Ul
0 Ul
ct h-*
M O
01 t ) O
H ft H
CD . M
01 <n\
fsa H
h* . kO
Cn O
- J
q O
; ^
( i
o PJ
-O H
n
N N
M "6
(r>
> CTl
N 01
2 M
<
o
co' o
,9
p<
r t
N
!'
O
pj
a I
ID
Ul
"-s.
O
o
Lb
H
kO
cn
cn
cn
w
o
o
o
M
I D
<n
. cn
cn
4#
4k
"4
A
B
<
0
o
c*
i
a
ID
iD Ul
Ul V.
^
M
("
O
O O
o
0*
a%
o
o cn
<i
H
to
N) W
cn Ol
O
d
Ul
| j .
0 H
| ~ i
Hi
p< p.
rt
| _ j
n
to
N
N
IJ.
0
TJ
0
a
<#, .
.
Cn
cn '
^
B
v
<
o
O
C
i
1
ID
rD
Ul
Ul
\
h"
H* O
O
o
o
itk
t h ,
o
H
o
, H
i
H
O W
I d Ul
H O
CO UI
Hi 0
PJ
( . J
H h'-
&
r t
N
N
(... 0
0
0
44,
(j i
TI hrl
I
I
U
Ok
M
H
m
O
B
<T.
OO n
UJ M
^1
KJ fti
W H.
g
O
S
m
cu
O
W
t/1
c/1
o H m s 1-3
CD
> 3 w
G
>
Q X) D H 73 US
PI
cn
'M Z Tl
X
o
M H O
o
H H
> o
c/1
M H M
< n
m
U
n
h-l-
>
Ml H Ul M
>
n- n
H CD O
o
CD O I-l I-i i
a 3
CD
1
<
CD
O
CD x
n
us
M
3
t-i Ul I-l
r t CD O Q) CD
QJ o H- 1
r t
a ^
h-l QJ
CD
o
M 3
Ul n
c
t
o
r
-
1
C
l
r
a
D.
^ 3 fti ja CD
O CD t o Ul X
M 3
o
Ul Ml
O r t
o
H-
a
H-
(D \ Ci t -h 'JS 1'
Ul
1
H-
CD
a
F
-
I
)
t
r
a
t
M
3
CD
I-i CD
s
QJ Ul H-
cn
Si
c
r
l
o
tQ
o cr
a
CD Ul OJ
us
Ul
o
I - l
I
o
c
o
o
K
US
3"
Qi
M
(D
n
O
H-
3
r t
PI
X
n
3
QJ
3
^
CD
CO
CD
I-i
<
CD
M
G
us
M
I
M
n
M
O
z
PI
CD
<
CD
3
r t
Q
r t
O
d
r t
h-l
O
O
X
uri
3 "
QJ
^^
CD
n
o
>
a
a.
t-i
CD
Ul
Ul
Ul
r t
Ml
I-i
O
3
3
r t
a
3
t - 1-
r t
CD
PI a
X
n us
3" r t
QJ QJ
3 r t
t Q CD
CD Ul
*T1 Ml
c
o t=:
O "XI
f t i
c\ :
(7\ "
CS
-o S
o\ 2
CO
2 a
o'
o
ftj
o
c:.
n
C
(/)
Q
in
Sender Account Sender Alias Date-Time Message Text
[email protected]: de Nattianiel Frank 2010-03-05 00:56:32 5-6 hours for total upload?
dawgnetworkcgjabber.ccc.de Nobody 2010-03-05 03:32:57 uploaded
[email protected] Nobody 2010-03-05 03:33:31 no, it was like 5 minutes
[email protected] Nobody 2010-03-05 03:36:21
ping
[email protected] Nobody 2010-03-05 03:37:36 ping
[email protected] de Nobody 2010-03-05 03:38:54 anyway... should be good to go with that...
[email protected] Nobody 2010-03-05 05:39:50 news?
[email protected] Nobody 2010-03-05 05:41:22
[email protected] Nobody 2010-03-05 21:07:12 hi
[email protected] Nathaniel Frank 2010-03-05 21:07:49 hiya
[email protected] Nathaniel Frank 2010-03-05 21:08:15 1 like debates.
[email protected] Nathaniel Frank 2010-03-05 21:09:27 Just finished one on the IMMI, and crushed some
wretch from the journalists union.
[email protected] Nobody 2010-03-05 21:11:01 vid?
[email protected] Nathaniel Frank 2010-03-05 21:11:24 Ofthis?
[email protected] Nobody 2010-03-05 21:11:37 yeah
[email protected] Nathaniel Frank 2010-03-05 21:11:56 Not videotaped, i think.
[email protected] Nobody 2010-03-05 21:12:04 ah
[email protected] Nathaniel Frank 2010-03-05 21:12:24 Very satisfying though
[email protected] Nobody 2010-03-05 21:12:38 >nod<
[email protected] Nathaniel Frank 2010-03-05 21:12:44 Source here just gave me 10Gb of banking docs.
[email protected] Nobody 2010-03-05 21:13:10 lb?
[email protected] Nathaniel Frank 2010-03-05 21:13:11 He leaked some before, was exposed by the husband
of the wretch.
[email protected] Nathaniel Frank 2010-03-05 21:13:27 cross-bank, was an it consultant.
[email protected] Nathaniel Frank 2010-03-05 21:13:39 got arrested two weeks ago
[email protected] Nathaniel Frank 2010-03-05 21:13:50 Had is bank accounts frozen.
[email protected] Nathaniel Frank 2010-03-05 21:14:02 and has been offered 15 million kroner to shut up
[email protected] Nathaniel Frank 2010-03-05 21:14:09 /is/his
[email protected] Nobody 2010-03-05 21:14:26 mmm
[email protected] Nathaniel Frank 2010-03-05 21:15:04 needed to offload them so they'd stop going
after him
[email protected] Nobody 2010-03-05 21:17:31 >yawn<
[email protected] Nathaniel Frank 2010-03-05 21:19:26 tired?
[email protected] Nobody "2010-03-05 21:20:54 waking up =)
[email protected] Nathaniel Frank 2010-03-05 22:53:22 ping
[email protected] Nathaniel Frank 2010-03-05 23:41:17 ping
[email protected] Nobody 2010-03-06 00:31:55 here
[email protected]
[email protected]
Nobody
Nobody
2010-03-06 00:32:52
2010-03-06 00:39:19
pong
. and zero reply status =P _
[email protected] Nobody 2010-03-06 06:40:54 ping
[email protected] Nathaniel Frank 2010-03-06 06:41:22 ping
dawgnetwork@jabber ccc.de Nobody 2010-03-06 06:41:27 pong
[email protected] Nathaniel Frank 2010-03-06 06:41:34 can you tell me more about these files?
[email protected] Nathaniel Frank 2010-03-06 06:41:41 or the status of the issue?
[email protected] Nobody 2010-03-06 06:41:58 uhmm... no new infomnation... everybody is focused
on the election
[email protected] Nathaniel Frank 2010-03-06 06:42:07 what&apos:s the caps thing?
[email protected] Nobody 2010-03-06 06:42:15 caps?
[email protected] Nathaniel Frank 2010-03-06 06:42:22 CAPS
[email protected] Nathaniel Frank 2010-03-06 06:42:38 who's the author?
[email protected] Nathaniel Frank 2010-03-06 06:42:39 and are all these releasable?
[email protected] Nobody 2010-03-06 06:42:42 so much going on... ahhhh
[email protected] Nathaniel Frank 2010-03-06 06:42:46 what about the english translation?
[email protected] Nathaniel Frank 2010-03-06 06:42:55 yes
[email protected] Nobody 2010-03-06 06:42:55 everything is notes
[email protected] Nobody 2010-03-06 06:43:02 minus the photos
[email protected] Nobody 2010-03-06 06:43:13 the photos are releasable
[email protected] Nathaniel Frank 2010-03-06 06:43:29 ok, what about the incident report?
[email protected] Nobody 2010-03-06 06:43:52 cant release the original, but the information can be
scraped from it
[email protected] Nobody 2010-03-06 06:44:08 i.e. sources indicate this happened at this place at this
time
[email protected] Nathaniel Frank 2010-03-06 06:44:17
yup
[email protected] Nathaniel Frank 2010-03-06 06:44:38 it looks like a MiTT report?
[email protected] Nobody 2010-03-06 06:44:39 translation is super not releasable
y
PROSECUTION EXHIBIT l%)for i^nfification
PAGE OFFERED: PAGE ADMITTED:
PAGE 1 OFt^ PAGES
Sender Account Sender Al i as Oate-Tlme Message Text
[email protected]:.de Nathaniel Frank 2010 03 06 06:45:01 ok be sure to tell me these things as soon as
possible
[email protected] Nobody 2010 03 06 06:45:03 yes, came from federal police into US hands
[email protected] Nathaniel Frank 2010 03 06 06:45:07 and better yet in the submission itself
dawgnetwork@jabbercccde Nobody 2010 03 0606:45:12 yes,sorry
[email protected] Nathaniel Frank 2010 03 0606:45:59 i^apos:m not the only one to process this stuff and
also will forget details if publication is del ayedai ong
time due to the flood of other things
[email protected] Nobody 2010 03 0606:46:02 though who knows, everybody is running around
like headless chickens
[email protected] Nathaniel Frank 2010 03 0606:46:28 malaki is expected t oi i i ^agai n though?
[email protected] Nobody 2010 03 0606:46:33 basically
dawgnetwork@jabbercccde Nobody 2010 03 06 06:46:39 l oseaf ew seats maybe
[email protected] Nobody 2010 03 06 06:46:42 but win overall
[email protected] Nobody 2010 03 06 06:46:56 probably have to f or manew coalition
[email protected] Nobody 2010 03 0606:48:47 blah, sorry about the craziness... gonna give release
ashot?
pressassociation@jabbercccde Nathaniel Frank 2010 03 06^06^8:20 yes
dawgnetwork@jabbercccde Nobody 2010 03 0606:58:37 cool
pressassociation@jabbercccde Nathaniel Frank 2010 03 06 06:58:40 lack of detail may be problematic, but we^apos:ll see
[email protected] Nathaniel Frank 2010 03 0606:59:09 i.e ^c^uot:easier^c:|uot: stories for press to get
[email protected] Nobody 2010 03 0606:59:10 im sure you can try to confimnSOM^XHINC3 . there is
ahotel called the Hotel Ishtar nearby to that location
[email protected] Nathaniel Frank 2010 03 06 06:59:36 does it have grid refs?
[email protected] Nobody 2010 03 06 06:59:46 grid references within the document, yes
[email protected] Nobody 2010 03 06 07:00:01 that was were the arrests took place
dawgnetwork@jabbercccde Nobody 2010 03 0607:00:11 morocco publishing company
[email protected] Nobody 2010 03 06 07:00:24 gives coordinates ^in the military report)
[email protected] Nobody 2010 03 06 07:01:19 ifigured it would make it look more iikeajournalist
acc^uired it. if the hotel was mentioned
[email protected] Noboc^y 2010 03 06 07:01:55 ^popular among gays, oddiyj
dawgnetwork@jabbercccde Nobody 2010 03 06 07:02:38 ^div^^ahref^http:^^travei.yahoocom^photei2514619
hotel^ishtari^^style-^background-coior:^^ffffff:font
family: Helvetica: font size:
12pt:^^^http:^^traveiyahoocom^photel2514619
hotel^ishtari^^a^^^div^^^message^
pressassociation@jabbercccde Nathaniel Frank 2010 03 06 07:02:42 haha
[email protected]
dawgnetwork@jabbercccde
Nathaniel Frank
Nobody
2010 03 06 07:03:19
2010 03 0607:03:25
1^apos:m surprised there are any left,
foreign
[email protected] Nobody 2010 03 06 07:03:27 that Is
[email protected] Nathaniel Frank 2010 03 06 07:03:33 full transcriptfdrvideo is now complete
[email protected] Nathaniel Frank 2010 03 06 07:03:43 evil work
dawgnetwork@jabbercccde
[email protected]
Nobody
Nobody
2010 03 06 07:03:43
2010 03 0607:04:08
irai:| themed releases?
yes,the transcripts sayal ot about attitudes
[email protected]
dawgnetwork@jabbercccde
Nobody
Nobody
2010 03 0607:05:30
2010 03 0607:05:41
might also be known as Sheraton Ishtar
^di v^^a
href^http.^^en.wikipedia.org^iki^Sheraton IshtaB^
styie-^background color:^^ffffff:font famiiy: Helvetica:
fontsi ze:
12pt:^^^http:^^enwikipedia.org^wiki^5heraton^lshtar^^a
^^^divi^^^message^
[email protected] Nobody 2010 03 0607:06:13 its somewhere in that general area ..^c^uot:Morocco
Pub1ishing^c|uot:... its been too crazy for me to try and
find
[email protected] Nobody 2010 03 06 07:07:14 anyway,gotta dash...should be back i naf ew hours
[email protected] Nobody 2010 03 06 07:07:21 good luck
[email protected] Nathaniel Frank 2010 03 06 07:07:34 you too
[email protected] Nathaniel Frank 2010 03-06 07 07:49 um,transcripts?
[email protected] Nathaniel Frank 2010 03 06 07:07:53 ah,yes,sorry.
[email protected] Nobody 2010 03 06 07:08:11 itsaHt^C^^ jumble xO
[email protected] Nobody 2010 03 06 07:08:12 ^P
[email protected] Nathaniel Frank 2010 03 06 07:08:17 plural confused me.
[email protected]
[email protected]
Nobody
Nobody
2010 03 06 07:08:25
2010 03 06 07 08:34
muh bad
gotta go fo^apos: r eal z- P
Sender Account
[email protected]
dawgnetworkcgjabber.ccc.de
Sender Alias
Nobody
Nobody
Date-Tinie
2010-03-
2010-03-
06 07:08:37
06 07:10:28
Message Text
ciaoness
oh, it was on the EAST side ofthe tigris..
important
thats
[email protected]
[email protected]
[email protected]
[email protected]
Nobody
Nobody^
Nathaniel Frank
Nobody
2010-03-1
2010-03-1
2010-03-1
-06 07
-06 07:
roeoj}
2010-03-06 07
11:01
11:03
11:36
11:46
the arrest location
that is^
why irnportanl?
i think hotel is on the west side
[email protected] Nobody 2010-03-06 07:12:21 ah, im all over the place... clearing logs..
[email protected]
[email protected]
[email protected]
[email protected]
Nobody
Nobody
Nobody
Nobody
2010-03-06 07:
1-06 07:
1-06091
1-06 10:
J010-03-1
2010-03-1
2010-03-1
12:43
12:50
25:55
59:53
not logging at^alL. safe_
I just wanted to be certajn
any more questions?
i have a quick question
[email protected] Nobody 2010-03-06 12:48:15 busy day for you ?
[email protected]
[email protected]
[email protected]
Nobody
Nobody
Nathaniel Frank
2010-03
2010-03
2010-03
06 14:
07 07:
07 07:
37:11
03:53
08:29
ping
ping
brb, checking flights
[email protected] Nobody 2010-03-07 07:11:49
[email protected] Nobody 2010-03-07 07:14:56 i have a quick question?
[email protected]
[email protected]
Nathaniel Frank
Nobody
2010-03-07 07:15:36
2010-03-07 07:16:00
[email protected] Nathaniel Frank 2010-03-07 07:16:18
sure...lots of time pressure atm though so answer will
be brief
how valuable are JTF GTMO detention memos
containing summaries, background info, capture info,
etc?
time period?
[email protected] Nobody 2010-03-07 07:16:25 2002-2008
[email protected]
[email protected]
[email protected](x:.de
Nathaniel Frank
Nathaniel Frank
Nobody
2010-03-07 07:17:35
2010-03-07 07:18:12
2010-03-07 07:18:20
quite valuable to the lawyers of these guys who are
trying to get them out, where those memos suggest
their innocence/bad proceedure
also valuable to merge into the general history.
politically gitmo is mostly over though
yeah
[email protected] Nathaniel Frank 2010-03-07 07:18:28 although transfers to afghanistan might rise it again
[email protected]
[email protected]
[email protected]
Nobody
Nobody
Nathaniel Frank
2010-03
2010-03-
2610-03-
07J)7:18:38
07 07:18:43
07 07:19:29
[email protected] Nobody 2010-03-07 07:19:39
>%oPNG
j[i get backjojhat later
depends on definition of valuable of course..
there's been a fair bit of inflation the last few
months:)
i noticed
[email protected] Nathaniel Frank 2010-03-07 07:19:51 BXW
[email protected]
[email protected]
[email protected]
[email protected]
Nathaniel Frank
Nobody
Nathaniel Frank
Nathaniel Frank
2010-03-
2010-03-
2010-03-
2010-03-
07 07:
07 07:
07 07:
0707:
20 M 2
20:17
20:25
20:54
only 1.4% voted against. WE won the referendum -
i saw
How cool is that?
First referendum in Icelandic history, ever.
[email protected]
[email protected]
[email protected]
Nobody
Nathaniel Frank
Nobody
2010-03-
2010-03
07 07:
07 07:
20:56
21:13
2010-03-07 07:21:20
not sure how much influence you actually had...
though im sure you had an impact of some kind
by 'we&apos: i mean everyone working towards
it
ah, been there before
[email protected] Nobody 2010-03-07 07:21:28 im wary of referenda
[email protected]
[email protected]
Nobody
Nathaniel Frank
2010-03-07 07:21:51
2010-03-07 07:21:57
democracy sounds good... until you realize
you're a vulnerable minority...
but quite possibly swung it., there was lots of stuff
going on behind the scenes here.
[email protected] Nobody 2010-03-07 07:22:09 case in point: proposition 8 in California
[email protected]
[email protected]
Nathaniel Frank
Nobody
2010-03-07 07:22:21
2010-03-07 07:22:34
Yes. This is democracy in the negative though, which
is usuaNy greaf^ _
indeed it is
[email protected] Nathaniel Frank 2010-03-07 07:22:51 i.e vetoing bills [go back and do it again!]
[email protected]
[email protected]
[email protected]
Nathaniel Frank
NobqcJy
Nathaniel l^rank
2010-03-07 07:23:32
2010-03-
2010-03-
07 07:23:40
07 07:23:52
call is bad, I agree, anyone with some $ has a syringe
right into the heart of the state constitution
>:nod&it: 2 _ ^
bbk
[email protected] Nobody 2010-03-07 07:23:58 gotta run too
[email protected] Nobody 2010-03-07 07:23:59 ttyl
[email protected]
[email protected]
Nobody
Nobody
2010-03-
2010-03
07 10:53:48
08 05:46:56
so when is the site coming back?
hello
)
Sender Account
[email protected]^.de
[email protected]
Serider Alias
Nathaniel Frank
Nathaniel Frank
Oate-Tii^e
2010 03 0805:48:43
2610 03^08 05:48:50
Message Text
heyal
how goes?
[email protected] Nobody 2010 03 08 05:49:22 not bad
[email protected]
[email protected]
[email protected]
Nathaniel Frank
Nobody
Nathaniel Frank
2010 03 08 05:52:19
2010
2010
03 0805:
03 0805:
52:30
52:47
vid has been enhanced and rendered now. subtitles
done for english
nice
it looks good, the stills are very moving
[email protected] Nobody 2010 03 08 05:53:03 the stills taken from the wide angle?
dawgnetwork@jabbercccde
[email protected]
[email protected]
[email protected]
Nobody
Nathaniel Frank
Nobody
Nathaniel Frank
20^0
2010-
03 08 05:
^3 08 05:
2010
2010
03 08 05
03 08 05
53:31
53:42
53:51
53:52
dropped camera
ah, the video stills then
from the video cam
[email protected] Nobody 2010-03 08 05:54:14 sounds good
[email protected]
[email protected]
[email protected]
[email protected]
Nobody
Nathaniel Frank
Nathaniel Frank
Nobody
2010
2010
03 08 05
03 6805
2010 03
2010 03
0805:
08 05:
55:54
56:10
56:16
56:25
still all oyer^heplace,here
Afterthe contrast enhancement, something about the
lack of resoiution^smokegivesafilmnoir quality
yeah, i^apos:ve heard.
heard?
[email protected] Nathaniel Frank 2010 03 08 05:56:29 outcome yet?
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
Nobody
Nobody
Nobody
Nathaniel Frank
2010 03
2010 03
2010 03
2010 03
08 05:
08 05:
08 05:
08 05:
56:43
57:02
57:09
58:05
busy few weeks
no wont be for weeks... it was yei y^ui ^
ei^pectedalotmore
people can get worked up internally...
Nathaniel Frank 2010 03 08 05:58:59 somethings are encouraged to be said, others not,
and after they flow around long enough, there^apos:s
a lack of grounding.
[email protected]
[email protected]
[email protected]
Nobody
Nathaniel Frank
Nobody
Nathaniel Frank
^01003
2010 03
201003
2010 03-
08 06:04:09
08 06:04:54
0806:05:05
0806:65:22
lalaia
jesus
nini?
looks like we have the last4mothers of all audio to all
phones in the is pariiament
[email protected]:.de
[email protected]
[email protected]
[email protected]
Nathaniel Frank
Nobody
Nobody
Nobody
2010 03
201063-
2010 03-
20^003
^06:05:29
08 06:05146
08 06:06:09
6806:68:49
s^others^months
interesting
^had nothing to do with thisone^
im sending one last archive of intersting stuff should
be in thexfolder at some point in the next24 hours
[email protected] Nathaniel Frank 2010 03 08 06 10:08 ok greati
[email protected]
[email protected]
Nobody
Nobody
2010 03 08 06
2010 03 08 06
10:09
10:56
74b3^tarbz2
youl^apos:ll need to figure outwhat to cio with it all,.
[email protected] Nathaniel Frank 2010 03 08 06 11:03 a lot of odd things are happening lately
[email protected] Nobody 2010 03 08 06 11:08 such as?
[email protected]
[email protected]
dawgnetwork@jabbercccde
Nathaniel Frank 2010 03 08 06 11:48
Nathaniel^Frank
Nobody
2010 03 08 06
2010 03 0806
11:53
12:07
it^apos:s hard to describe without going through them
all
but there^apos:s something in the aii^.
in Iceland, or giobaiiy
[email protected]
[email protected]
[email protected]
Nathaniel Frank
Nathaniel Frank
Nobody
2010 03 0806 12:40
2010 03 08 06:12:49
2010-03 08 06:13:13
this is what l^apos:m trying to determine, people in
germany say the same thing
and there^apos:s some evidence of that
such as... ^i hate to inquire too much, but im benign)
pressassociation@jabbercccde
[email protected]
[email protected]
Nathaniel Frank
Nobody
Nathaniel Frank
2010 03 08 06:13:36
2010 03 08 06:14:09
20l6 03 08 06:14:38
it may be more readily visible in is due to less inertia
[small economyj
definitely feel something odd here. ,
some recent things in denmark the main newspaper
printed an entire book in afghanistan that was about
to be injuncted suddenly in its Sunday paper
[email protected] Nathaniel Frank 2010 03 08 06 14:50 to subvert the injunction
[email protected]
[email protected]^
[email protected]
pressassociation@jabbercccde
[email protected]
Nathaniel Frank
Nathaniel Frank
Nathaniel Frank
Nathaniel Frank
2010^03^06
2010 03 08 66
2010 03 08 06
2010 03 08 06
14^5
15:04
15:25
15:42
Nobody
[about afghanistan, not in]
injunction^camefrom^depofdeferice
fox news editorialized to say, give money to Wl^
ni government just fell over afghanistan
2010 03 08 06 1549 indeed
^
Sender Account Sender Alias Oate-Time MessageText
[email protected] Nathaniel Frank 2010 03 08 06:16:00 german constitutional courtjust struck down data
retention
[email protected] Nobody 2010 03 08 06:16:07 yep
[email protected] Nathaniel Frank 2010 03 08 06:16 34 wi actions that were considered totally radical3years
ago are now courted.
dawgnetwork@jabbercccde Nobody 2010 03 08 06:17:06 itold you before,government^organizations cant
control information... the harder they try, the more
violently the information wants to get out
[email protected] Nathaniel Frank 2010 03 08 06:17:22 2500 articles in is referendum in the past15hours,
despite it beingasunday
dawgnetwork@jabbercccde Nobody 2010 03 08 06:17:34 you^apos:re like the first pin to popaballoon
pressassociation@jabbercccde Nathaniel Frank 2010 03 08 06:17:52 many other things like this
[email protected] Nathaniel Frank 2010 03 08 06:18:13 restrict supply-value increases,yes
[email protected] Nobody 2010 03 08 06:18:21 oh yeah...osc went haywire digging into is
pressassociation@jabbercccde Nathaniel Frank 2010 03 08 06:18:37 us dod has another tact though, dump billions in free
^quot:news^quot: content
[email protected] Nathaniel Frank 2010 03 08 06:18:44 yeah?
[email protected] Nathaniel Frank 2010 03 08 06:18:56 that^apos:s something we want to mine entirely, btw
[email protected] Nathaniel Frank 2010 03 08 06:19:10 lhad an account there,but changed ips too quickly
[email protected] Nobody 2010 03 08 06:19:16 usually its pretty dull reading, one or two things on is
aday. but its like 20-25 for today alone
pressassociation@jabbercccde Nathaniel Frank 2010 03 08 06:19:40 just FBIS or analysis included?
dawgnetwork@jabbercccde Nobody 2610 03 6806:19:54 no analysis, too early.
dawgnetwork@jabbercccde Nobody 2010 03 08 06:20:03 24-48 hours it takes for analysis if done
[email protected] Nobody 2010 03 08 06:22:01 anyway,im throwing everythingigot on JTF GXMO at
you now . should take awhile to get up tho
dawgnetwork@jabbercccde Nobody 2010 03 0806:23:22 summary^history^heaithconditions^reasonsfor
retaining or transfer of nearly every detainee ^about
95^)
[email protected] Nathaniel Frank 2010 03 0806:24:01 ok,greati
[email protected] Nathaniel Frank 2010 03 08 06:24:15 what period does it cover for each internment?
[email protected] Nobody 2010 03 08 06:24:48 2002 2009
[email protected] Nathaniel Frank 2010 03 08 06:25:21 so initial medical evaluation to exit evaluation?
dawgnetwork@jabbercccde Nobody 2010 03 08 06:25:37 no, just summaries...
pressassociation@jabbercccde Nathaniel Frank 2010 03 08 06:25:52 but summaries of that?
[email protected] Nathaniel Frank 2010-03-08 06:26:26 iefrom entry to exit?
[email protected] Nobody 2010 03 08 06:26:31 not quite
[email protected] Nobody 2010 03 08 06:26:33 gaps
[email protected] Nathaniel Frank 2010 03 0806:26:50 where do the gaps come from?
[email protected] Nobody 2010 03 08 06:26:58 Memos such asSOBJECX:l^ecommendation to
l^etain under OoOC::ontrol^OoO) for Guantanamo
Oetainee,^br^^lSN:US9AS 000002OP
[email protected] Nobody 2010 03 0806:27:51 ihaveacsv that organizes the info as much as
possible
[email protected]
[email protected]
Nathaniel Frank
Nathaniel Franic
2010 03 0806:27:55
2010 03 0866:28129
lhate these gitmo guys
OFAFBU sums up the sort of people they ended up
with
[email protected] Nathaniel Frank 2010 03 0806:28:48 [one flight away from being uglyj aka ^quot:gitmo
cute8^quot:
[email protected] Nobody 2010 03 0806:28:56 haha
[email protected]
[email protected]
Nobody
Nathaniel Frank
2010 03 08 06:30:57
2010 03 08 06:31:14
anyway,gotta run,haveanice day
you too. and take carel
[email protected] Nobody 2010 03 08 06:31:42 after this upload,thats allireally have got left
[email protected] Nathaniel Frank 2010 03 0806:32:15 curious eyes never njn dry in my experience
[email protected] Nobody 2010 03 0806:32:18 isat on it forabit, and figured,eh,why not
[email protected] Nobody 2010 03 08 06:32:52 ive already exposed quiteabit, just noone knows yet
[email protected] Nobody 2010 03 08 06:33:34 ill slip into darkness forafew years,let the heat die
down
pressassociation@jabbercccde Nathaniel Frank 2010 03 0806:34:05 won^apos:ttake9few years at the present rate of
change
[email protected] Nobody 2010-03 08 06:34:08 true
[email protected] Nathaniel Frank 2010 03 08 06:34:19 almost feels like the singularity is coming
there^apos:s such acceleration
^
Sender Account Sender Alias t^ate-Tlme MessageText
[email protected] Nobody 2010 03 0806:34:52 yes. and considering just how much one source has
given you,lean only imagine the overiad
[email protected] Nathaniel Frank 2010 03 08 06:35:05 yes
[email protected] Nobody 2010 03 08 06:35:15 ^load
[email protected]
[email protected]
[email protected]
Nobody
Nathaniel Frank
Nathaniel Frank
2010 03 08 06:35:30
2010 03 08 06:35:34
2010 03 08 06:35:57
cya
1 just hope we can do justice to it all
We have the numbers, just need to figure out how to
scale the management.
pressassociation@jabbercccde Nathaniel Frank 2010 03 08 06:36:04 nightl
dawgnetwork@jabbercccde Nobody 2010 03 08 11:13:06 hi
pressassociation@jabbercccde Nathaniel Frank 2010 03 08 11:44:16 hoi
pressassociation@jabbercccde Nathaniel Frank 2010 03 08 11:44:27 short sleep?
dawgnetwork@jabbercccde Nobody 2010 03 08 12:19:56 wasnt asleep.. . going to sleep soon
[email protected] Nobody 2010 03 08 12:20 21 upload is at about 36^
[email protected] Nathaniel Frank 2010 03 08 12:21:39 ETA?
[email protected] Nobody 2010 03 08 12:22:05 11 12hours...guessing since its been going for6
already
[email protected] Nathaniel Frank 2010 03 08 12:22:33 how many mb?
dawgnetwork@jabbercccde Nobody 2010 03 08 12:22:50 about 440mb
dawgnetwork@jabbercccde Nobody 2010 03 08 12:2446 alot of scanned pdf8^apos:s
dawgnetwork@jabbercccde Nobody 2010 03 08 14:38:00 what are you at donation-wise?
[email protected] Nobody 2010 03 08 15 55:28 any good at Im hash cracking?
[email protected] Nathaniel Frank 2010 03 08 16:00:29 yes
[email protected] Nathaniel Frank 2010 03 08 16:00:44 donations: not sure
pressassociation@jabbercccde Nathaniel Frank 2010 03 08 16:00:55 something in order of .5M
[email protected] Nathaniel Frank 2010 03 08 16:01:30 but we lost our CCprocessor,so this Is making
matters somewhat painful.
[email protected] Nathaniel Frank 2010 03 08 16:02:23 we have rainbow tables for Im
dawgnetwork@jabbercccde Nobody 2010 03 08 16:04:14 80c11049faebf441d524fb3c4cd5351c
[email protected] Nobody 2010 03 08 16:05:07 i thi nki tsi mti mnt
[email protected] Nobody 2010 03 08 16:05:38 anyway...
[email protected] Nobody 2010 03 08 16:06:08 need sleep ^gt:yawn^gt:
[email protected] Nobody 2010 03 08 16:09:06 not even sure if thats the hash...lhad to hexdumpa
SAM file,sinceidont have the system file...
[email protected] N9th9nlelFr9nk 261^6-63-08^6:10:06 what makes you think it8^apos:sim?
[email protected] Nathaniel Frank 2010 03 08 16:10:19 itsfromaSAM?
[email protected] Nobody 2010 03 08 16:10:24 yeah
[email protected] Nathaniel Frank 2010 03 08 16:11:26 passed it onto our Im guy
dawgnetwork@jabbercccde Nobody 2010 03 08 16:11:40 thx
dawgnetwork@jabbercccde Nobody 2010 03 0821:31:59 got about an hour to go on that upload
[email protected] Nobody 2010 03 10 03:44:06 hi
dawgnetwork@jabbercccde Nobody 2010 03 10 03:45:05 didyougetwhatisent?
[email protected] Nobody 2010 03 10 03:45:11 via sftp
[email protected] Nathaniel Frank 2010 03 10 03:46:04 heyal
dawgnetwork@jabbercccde Nobody 2010 03 1003:46:24 M05|^74b3^,t9r.^^2)^c36e31^^^
[email protected] Nathaniel Frank 2010 03 1003:47:39 will check
[email protected] Nobody 2010 03 1003:47:47 sweet
[email protected] Nathaniel Frank 2010 03 1003:47:54 somewhat distracted with all sorts of intrigues
[email protected] Nobody 2010 03 10 03:48:01 heh, im sure
dawgnetwork@jabbercccde Nobody 2010 03 10 03:48:13 imma get intrigued with my hot chocolate-)
[email protected] Nathaniel Frank 2010 03 10 03:48:24 we now have the last4months of audio from
telephones at the is parliament
[email protected] Nobody 2010 03 10 03:48:29 bbl
[email protected]
[email protected]
Nobody
Nathaniel Frank
2010 03 10 03:48:35
2010 03 10 03:48:51
yes, you said earlier
it wasa^might^ before
[email protected] Nobody 2010 03 1003:48:55 somebody^apos:sbad...-)
[email protected] Nobody 2010 03 1003:49:11 ttyl
[email protected] Nathaniel Frank 2010 03 1003:49:16 yup nixon tapes got nothing on us
[email protected] Nathaniel Frank 2010 03 1004:25:37 hmm
[email protected] Nathaniel Frank 2010 03 1004:25:42 there^apos:sausem9me in the gitmo doc^
[email protected] Nathaniel Frank 2010 03 1004:25:58 iassumeishould filter it out?
[email protected] Nobody 2010 03 1005:40:47 theresausername?
[email protected] Nobody 2010 03 1005:42:16 any usernames should probably be filtered, period
[email protected]
[email protected]
Nobody
Nathaniel Frank
2610-03-1005:42:38
2010 03 1065:45:56
but at the same time,theresagazillionofthem [email protected]
[email protected]
Nobody
Nathaniel Frank
2610-03-1005:42:38
2010 03 1065:45:56 is this ordered by country?
[email protected] Nobody 2010 03 10 05:46:00 yes
^
Sender Account Sender Alias Oate-Time Message Text
[email protected] Nobody 2010 03 1005:46:48 ... gazillion pdf^apos:s that is^^span^
[email protected] Nobody 2010 03 1005:47:15 anything useful in there?
[email protected] Nathaniel Frank 2010 03 10 05:50:54 no time, but have someone on it
[email protected] Nathaniel Frank 2010 03 10 05:51:00 there surely will be
[email protected] Nathaniel Frank 2010 03 10 05:51:12 and these sorts ofthings are always motivating to
other sources too
[email protected] Nobody ^2010 03 1005:51:22 ^gt:nod^it:
[email protected] Nobody 2010 03 1005:51:33 inflation
[email protected] Nobody 2010 03 10 05:51:34 ^P
[email protected] Nobody 2010 03 1005:51:43 from an economic standpoint
[email protected] Nathaniel Frank 2010 03 1005:52:08 heh ^ ^
[email protected] Nathaniel Frank 2010 03 1005:52:29 Iwas thinking more inspiration
[email protected] Nobody 2010 03 1005:52:38 i know-)
[email protected]
pressassociation@jabbercccde
Nathaniel Frank
Nathaniel Frank
2010 03 10 05:53:08
2610 03 10 05:54:03
gitmo-bad,leakers-enemy of gitmo,leakers-good
Hence the feeling is people can give us stuff for
anything not as ^quot:dangerous as gitmo": on
the one hand,and on the other,for people who know
more,there^apos:sadesire to eclipse...
[email protected] Nobody 2010 03 10 05:54:41 true
[email protected] Nobody 2010 03 1005:55:05 ive crossedalot of those ^quot:danger^quot: zones,
so im comfortable
dawgnetwork@jabbercccde Nobody 2010 03 1005:55:25 iearnedalot from the Iceland cable on my side
pressassociation@jabbercccde Nathaniel Frank 2010 03 1005:55:32 oh?
dawgnetwork@jabbercccde Nobody 2010 03 10 05:55:55 and that is... everyone is too busy to Investigate too
deeply...
[email protected] Nobody 2010 03 10 05:56:02 or clean up the mess
[email protected] Nathaniel Frank 2010 03 10 05:56:03 yes
pressassociation@jabbercccde Nathaniel Frank 2010 03 10 05:56:13 unless they think there^apos:sareal promotion in it
[email protected] Nobody 2010 03 10 05:56:19 indeed
[email protected] Nathaniel Frank 2010 03 1005:56:35 afterafew days,no one givesadamn,generally
[email protected] Nobody 2010 03 1005:56:41 yep
[email protected] Nathaniel Frank 2010 03 1005:56:46 especially now with the pace of change so high
[email protected] Nobody 2010 03 1005:56:51 oh yeah
[email protected] Nobody 2010 03 1005:56:58 its nuts
[email protected]
[email protected]
Nobody
Nathaniel Frank
2010 03 1005:57:28
2010 03 10 05:57:53
ive given up on trying to imagine whats next
ipredict its nothingican predict
[email protected] Nathaniel Frank 2010 03 1005:58:21 actually...
[email protected] Nathaniel Frank 2010 03 1005:58:29 gave an Intel source herealist of things we wanted
pressassociation@jabbercccde Nathaniel Frank 2010 03 10 05:58:39 15
[email protected] Nathaniel Frank 2010 03 1005:59:06 Iwas ^quot:something we have no idea of yet. hard
to find, but the most likely to be important":
[email protected] Nathaniel Frank 2010 03 1005:59:30 and they came iiack with the 1ast4months of
parliament
[email protected] Nobody 2010 03 1005:59:47 xO
[email protected] Nobody 2610-03 1005:59:49 hilarious
[email protected] Nobody 2010 03 10 06:00:40 thatsawtf...who did this kind of moment
[email protected] Nobody 2010 03 10 06:00:54 fail out ^P
[email protected] Nathaniel Frank 2010-03 10 06:00:55 So,that^apos:swhatithink the future is like:)
pressassociation@jabbercccde
[email protected]
Nathaniel Frank
Nobody
2010 03 1006:01:15
2010 03 1006:01:57
yes
now that humans are getting more and more
integrated into this information society...aievei of
transparency never imagined or eveningly desired is
coming into play
[email protected] Notioc^y 2010^03-l606:62:18 it makes us more human if anything
[email protected] Nobody 2010 03 1006:03:13 we^apos:ve created states, governments, religious
institutions, corporations , all these organizations to
hide behind...
[email protected] Nobody 2010 03 1006:03:26 but at the end of the day, we^apos:re just guys and
girls
^
Sender Account Sender Alias Oate-Tlme MessageText
[email protected] Nathaniel Frank 2010 03 1006:04:02 Wikil^eaks is looking for donations, but what itsii^^
founders should do, is call upon script writers to make
a, perhaps reality based, dramatized, thriller movie of
one of the wikileaks cases, with corruption, infiltration,
espionage, hitmen, sabotage, etc and call the movie
8^quot:Wikil^eakst^quot:^^span^^br^:^^br^^^span
style-font famiiy: Helvetica: font size: 12pt:^^^l see
great potential for suchamovie,and massive money
and advertising it would generate would establish
them firmly. l^apos:d then support by seeing the
movie Hollywood would likely support.^^
[email protected] Nathaniel Frank ^010 03-1006164:04 haha
pressassociation@jabbercccde Nathaniel Frank 2010 03 1006:04:35 yes. its very healthy
[email protected] Nathaniel Frank 2010 03 1006:04:47 but then, there is farmville...
dawgnetwork@jabbercccde Nobody 2010 03 10 06:04:59 the masquerade ball
dawgnetwork@jabbercccde
[email protected]
Nobody
Nobody
2010 03 10 06:05:22
2010 03 1006:05:45
this is gonna be one hell ofadecade
it feels like 2010should be ending soon...
[email protected] Nobody 2010 03 1006:05:50 but we just got started
pressassociation@jabbercccde Nathaniel Frank 2010 03 10 06:05:51 sense deceptions to suck^out of people
pressassociation@jabbercccde Nathaniel Frank 2010 03 10 06:06:06 lt^apos:s as old as lipstick and the guitar of course,
but mmorpg are evil inawhole new way
[email protected] Nobody 2010 03 1006:06:39 voluntary matrix-style society?
[email protected] Nathaniel Frank 2010 03 1006:06:46 yes
[email protected] Nobody 2010 03 1006:07:08 hmm
[email protected] Nathaniel Frank 2010 03 1006:07:25 might be ok in the end
[email protected] Nathaniel Frank 2010 03 10 06:07:53 mmorpg^apos:s that have long term users are
incentivised to keep them profitable
[email protected] Nathaniel Frank 2010 03 1006:08:59 butlimaginethey^apos:ll merge into hybrid revenue
modes, where congnitive tasks and freelabor are
done using sense deception incentives
dawgnetwork@jabbercccde Nobody 2010 03 1006:09:48 like the ^quot,video games": from toys?
[email protected]
pressassociation@jabbercccde
Nathaniel Frank
Nathaniel Frank
2010 03 1006:10:12
2010 03 10 06:10:34
haven8^apos:t seen that
but it sure isn^apos:tadecade to beagullible idiot:)
dawgnetwork@jabbercccde Nobody 2010 03 1006:11:24 basic gist: retired general takes overatoy company,
invests in video games for kids to ^quot:piay^quot:,
but they^apos:re actually training to remotely use little
toy sized weapons
dawgnetwork@jabbercccde Nobody 2010 03 1006:11:40 former toy owner tries to stop him
[email protected] Nobody 2010 03 1006:11:52 ^company
[email protected] Nathaniel Frank 2010 03 10 06:12:11 heh.that^apos:s the examplelwas going to use for
mmorpg ^with drones) but decided it was too
grotesque
[email protected] Nobody 2010 03 1006:12:47 its not... its logical in frightening ways
[email protected] Nobody 2010 03 10 06:13:04 ithink like that, idont know how it happened,buti
think that way
[email protected] Nathaniel Frank 2010 03 1666:13:32 ipredict warwill turn intoacontinuous spectrum of
spying and violence
[email protected] Nobody 2010 03 1006:13:32 8^quot:howcanitake advantage of two things that
most people wouldn^apos:t think are
connected":
[email protected] Nathaniel Frank 2010 03 1006:15:50 with companies doingalot of the lower end
^spying^violence) for their own reasons andatotally
seemless crossover ^as is happening with the us)
between contractors^miiitary to the degree that its not
clear who is tasking who
[email protected] Nobody 2010 03 1006:16:12 wow, dead on
[email protected] Nathaniel Frank 2010 03 1006:16:57 everywhere, greater degrees of freedom, more fluidity
and mixing.
[email protected] Nobody 2010 03 1006:17:23 always an interesting discussions)
[email protected] Nobody 2010 03 1006:17:26 ttyl
[email protected]
[email protected]
Nathaniel Frank
Nobody
2010 03 1006:17:31
2010 03 1020:58:03
nightl [email protected]
[email protected]
Nathaniel Frank
Nobody
2010 03 1006:17:31
2010 03 1020:58:03 hello
[email protected] Nathaniel Frank 2010 03 1020:59:41 heyal
[email protected] Nobody 2010 03 1020:59:52 whats new?
^
Sender Account Sender Alias I Date-Time Message Text
[email protected] Nathaniel Frank 2010-03-10 21:00:22 350Gb of audio intercepts. But you knew already.
[email protected] Nobody 2010-03-10 21:00:30 mhmm
[email protected] Nobody 2010-03-10 21:00:57 is that the only thing?
[email protected] Nathaniel Frank 2010-03-10 21:01:22 lots of smaller scale material
[email protected]
[email protected]
Nobody
Nathaniel Frank
2010-03-10 21:01:28
2010-03-10 21:01:44
>nod<
e g bbc legal defense against trafigura which was
censored
[email protected] Nathaniel Frank 2010-03-10 21:02:15 aljazeera doing another segment on WL
[email protected] Nathaniel Frank 2010-03-10 21:02:35 Canadian detainee docs
[email protected] Nobody 2010-03-10 21:02:43 Canadian?
[email protected] Nathaniel Frank 2010-03-10 21:03:00 some russian and Chinese stuff that 1 C9n't read
[email protected] Nobody 2010-03-10 21:03:08 hahaha
[email protected] Nathaniel Frank 2010-03-10 21:03:09 heh
[email protected] Nathaniel Frank 2010-03-10 21:03:17 and a list of ALL the tea party volunteers
[email protected] Nathaniel Frank 2010-03-10 21:03:42 from glen beck's email
[email protected] Nobody 2010-03-10 21:03:48 jesus fucking Christ
[email protected] Nobody 2010-03-10 21:04:13 whats the big deal with that? because some people
take that seriously
[email protected] Nathaniel Frank 2010-03-10 2T:04:26 an analysis of the greenhouse gas output of
Australia&apos:s ":earth hour" fireworks
[email protected] Nathaniel Frank 2010-03-10 21:04:32 (46 tonnes)
[email protected] Nathaniel Frank 2010-03-10 21:04:57 The teaparty thing? lt's weird, but it should be
taken seriously
[email protected] Nobody 2010-63-T62T;65:21 yeah, its one of those... grey areas between reality
and entertainment and ick
[email protected] Nathaniel Frank 2010-03-10 21:05:33 lt's the right wing overclass (fox) organization
of the righwing underclass. Think of them as brown
shirts.
[email protected] Nobody 2010-03-10 21:05:39 "stays in reality*
[email protected] Nobody 2010-03-10 21:06:23 well, i dont know what posting a list from glenn
beck's email will do... but hey, its transparency
[email protected] Nathaniel Frank 2010-03-10 21:06:37 They're important because their organized free
labor.
[email protected] Nathaniel Frank 2010-03-10 21:06:54 And they may or may not break free of their masters.
[email protected] Nobody 2010-03-10 21:07:04 ah
[email protected] Nobody 2010-03-10 21:07:50 is It like the entire worid is uploading to you?
[email protected] Nathaniel Frank 2010-03-10 21:08:24 some hungarian finance things
[email protected] Nathaniel Frank 2010-03-10 21:08:31 Scientology in haiti...
[email protected] Nathaniel Frank 2010-03-10 21:08:52 lots of german stuff i don&apos:t understand, but we
have people who do
[email protected] Nobody 2010-03-10 21:08:58 >nod<
dawgnetwork@jabber ccc.de Nobody 2010-03-10 21:09:08 wow...
dawgnetwork@jabber ccc.de Nobody 2010-03-10 21:09:15 im gonna leave you to work than
[email protected] Nobody 2010-03-10 21:09:50 get back up and online... get immi passed... and start
publishing whatever you can... =)
[email protected] Nathaniel Frank 2010-03-10 21:10:08 heh
[email protected] Nathaniel Frank 2010-03-10 21:10:16 aljazeera will also have a new WL doco
[email protected] Nathaniel Frank 2010-03-10 21:10:31 by the same producer who did IMMI piece
[email protected] Nathaniel Frank 2010-03-10 21:11:36 agreement between the royal mail and its union
[email protected] Nathaniel Frank 2010-03-10 21:11:49 oh, this one is nice
[email protected] Nathaniel Frank 2010-03-10 21:11:55 entire romanian police database
[email protected] Nathaniel Frank 2010-03-10 2l l l 2: 3i israeli's OECD application docs
[email protected] Nobody 2010-03-10 21:15:45 its like you're the first ":lntelligence
Agency" for the general public
[email protected] Nobody 2010-03-10 21:16:39 downside is you get so much stuff in a single day that
its hard to prioritize
[email protected] Nathaniel Frank 2010-03-10 21:16:54 yes
[email protected] Nathaniel Frank 2010-03-10 21:17:05 that's just a matter of growth, though
[email protected]
[email protected]
Nathaniel Frank
Nobody
2010-03-10 21:17:39
2010-03-10 21:17:45
did you read our bulgarian shadow state doc?
well, fuck you do everything an Intel agency does...
minus the anonymous sourcing
[email protected] Nobody 2010-03-10 21:17:58 not really
\
Sender Account Sender Alias Oate-Tlme MessageText
[email protected] Nathaniel Frank 2010 03 1021:18:15 The original WL about reads: " ..will be the first
intelligence agency of the people. ."
dawgnetwork@jabbercccde Nobody 2010 03 1021:18:43 might have missed that, but its absolutely true
dawgnetwork@jabbercccde Nobody 2010 03 10 21:19:31 anyway, gotta run . ttyl
[email protected] Nathaniel Frank 2010 03 1021:19:47 Wikileaks described itself as "the first
intelligence agency of the people Better principled
and less parochial than any governmental intelligence
agency, it is able to be more accurate and relevant it
has no commercial or national interests at heart; its
only interest is the revelation ofthe truth LInlike the
covert activities of state intelligence agencies,
Wikileaks relies upon the power of overt fact to enable
and empower citizens to bring feared and corrupt
governments, and corporations to justice."
[email protected] Nathaniel Frank 2010 03 1021:20:14 ok.laterl
[email protected] NathanielFrank 2016 63 1023:30:54 any more hints about this Im hash?
[email protected] Nathaniel Frank 2010 03 1023:31:63 no luck so far
[email protected] Nobody 2010 03 16 18:23:35 hi
pressassociation@jabbercccde NathanielFrank 2010 03 16 18:32:42 hoi
[email protected] Nobody 2010 03 16 22:29:42 whats up?
[email protected] NathanielFrank 2010 03 16 22:34:13 just about to go out
[email protected] NathanielFrank 2010 03 1622:34:14 all systems nominal
[email protected] Nobody 2010 03 1622:34:24 good to know
[email protected] Nobody 2010 03 1622:34:36 ttyl
[email protected] NathanielFrank 2010 03 1622:35 52
-)
[email protected] NathanielFrank 2010 03 16 22:35:52 take care
[email protected] Nobody 2010 03 16 22:36:04 will do... donations coming in good?
[email protected] NathanielFrank 2010 03 1622:37:09 not sure
[email protected] NathanielFrank 2010 03 1622:37:21 experience in the past is that they don't tend to
in response to stories like this
[email protected]
[email protected]
Nobody
NathanielFrank
26l6^3-16^2:37:28
2010 03-1622:37:32
meh
makes people scared to donate
[email protected] Nobody 2010 03 16 22:37:34 too bad
[email protected] Nobody 2010 03 16 22:37:52 iwouid've
[email protected] Nobody 2010-03 16 22:37159 ifisawthat
[email protected] NathanielFrank 2010 03 17 22:32:26 what'd your source say it was?
dawgnetwork@jabbercccde Nobody 2010 03 17 22:39:49 it was very general
[email protected] Nobody 2010 03 1722:40:02 organization-wide
pressassociation@jabbercccde NathanielFrank 2010 03 1722:40:17 interesting
pressassociation@jabbercccde NathanielFrank 2010 03 1722:40:35 what was the approach and motivation?
pressassociation@jabbercccde NathanielFrank 2010 03 1722:41:17 iwonder if this didn't stir up some internal
dissent
[email protected] NathanielFrank 2010 03 1722:41:42 must be some people not too happy about cracking
down on whistleblowers and following the Chinese...
dawgnetwork@jabber,ccc.de Nobody 2010 03 1722:41:55 indeed
[email protected] Nobody 2010 03 1722:42:11 90^ ofthe e^ort is on Chinese exfiltration of
documents
[email protected] Nobody 2010 03 1722:42:22 it wasabiog posting
[email protected] NathanielFrank 2010 03 1722:43:01 well,that isagenuine problem
[email protected] NathanielFrank 2010 03 17 22:43 16 Israeli and russian exfiltration too
[email protected] NathanielFrank 2010 03 17 22:44:02 frenchasweil
[email protected] Nobody 2010 03 1722:44:06 it warned about not visiting the blogs, because the
document and its contents is still classified
[email protected] Nobody 2010 03 1722:44:17 gavealink the to the report through proper channels
[email protected] NathanielFrank 2010 03 17 22:44:31 although knowledge tends to be stabalizing
[email protected] NathanielFrank 2010 03 17 22:44:34 if you takeabig picture perspective
[email protected] Nobody 2010 03 17 22:45:17 it almost pleaded people not to send anonymous
documents, mentioning courage and personal trust...
and told people to go through proper channels ifthey
have an issues
[email protected] NathanielFrank 2010 03 17 22:45:24 open skies policy was stabalizing
[email protected]
[email protected]
NathanielFrank
NathanielFrank
2010 03 17 22:45:44
2010 03 17 22:46:23
so perhaps an open net policy is called for;)
that's reasonable, though doesn't work in
practice...
[email protected] NathanielFrank 2010 03 17 22:46:27 what'd they say about courage?
Sender Account Sendei^ Al i as Date-Tin^e MessageText
[email protected]
pressassociation@jabiiercccde
Nobody
NathanielFrank
2010 03 1722:46:38
2010 03 1722:46:40
i cansendacopy [email protected]
pressassociation@jabiiercccde
Nobody
NathanielFrank
2010 03 1722:46:38
2010 03 1722:46:40 that it's contagious?;)?
[email protected] Nobody 2010 03 17 22:46:53 but i t snonr el
[email protected] NathanielFrank 2010 03 1722:47:00 yes
[email protected] NathanielFrank 2010 03 1722:47:32 subsys is really good these days
[email protected] NathanielFrank 2010 03 1722:48:09 please mark non release, found on usb stick
[email protected] Nobody 26l 6 03 1722:48:55 k
[email protected] NathanielFrank 2010 03 1722:49:00 outed another spy this afternoon
[email protected] Nobody 2010 03 1722:49:16 ??
[email protected] NathanielFrank 2010 03 17 22:49:27 local
[email protected] Nobody 2010 03 17 22:49:34 gotchya
pressassociation@jabbercccde NathanielFrank 2010 03 17 22:49:38 police, watching one of my hotels
[email protected] NathanielFrank 2010 03 17 22:49:50 insider also confirmed
[email protected] NathanielFrank 2010 03 1722:49:58 we have access to the fieet tracking system;)
[email protected] NathanielFrank 2010 63 17 22:50:41 just got hold of 800 pages of interrogations docs and
another 40gb of.i s privatization^banking stuff
[email protected] NathanielFrank 2010 03 1722:50:51 this country is going to melt...
[email protected] NathanielFrank 2010 03 17 22:50:55 saw the film today
[email protected] NathanielFrank 2010 03 17 22:51:04 it's looking great
[email protected] Nobody 2010 03 17 22:51:31 what film?
[email protected] NathanielFrank 2010 03 17 22:51:50 projectb
[email protected] NathanielFrank 2010 03 17 22:51:58 the massacre
[email protected] Nobody 2010 03 17 22:52:01 gotchya
[email protected]
[email protected]
Nobody
Nobody
2010 03 1722:52:32 uploaded file [email protected]
[email protected]
Nobody
Nobody 2010 03 1722:53:01 marked as requested
[email protected] NathanielFrank 2010 03 1722:53:11 thanks
[email protected] Nobody 2010 03 1722:53:18 n^p
[email protected] NathanielFrank 2010 03 1722:53:20 you're great
[email protected] NathanielFrank 2010 03 17 22:54:03 is there some wayi canget acr ypt ophone to you?
[email protected] Nobody 2010 03 17 22:54:14 not at this time
[email protected] NathanielFrank 2010 03 17 22:54:40 actually...
[email protected] NathanielFrank 2010 03 17 22:54:47 probably best i fyou just order one?
[email protected] NathanielFrank 2010 03 17 22:54:57 or rather some friend
pressassociation@jabbercccde NathanielFrank 2010 03 1722:55:14 bit pricy though
[email protected] NathanielFrank 2010 03 1722:55:26 hmm
[email protected] NathanielFrank 2010 03 1722:55:29 actually never mind
[email protected] Nobody 2010 03 1722:55:38 yes, i dont have access at present
pressassociation@jabbercccde NathanielFrank 2010 03 1722:56:35 these things are good for urgent contact, but
it's safer to avoid due to location tracking
possibilities
[email protected] Nobody 2010 03 1722:56:47 i know that very well
[email protected] NathanielFrank 2010 03 1722:56:56 although there i sasat phone module
[email protected] Nobody 2010 03 1722:57:21 forget the idea for now
[email protected] NathanielFrank 2010 03 1722:57:45 yes. you just contact us
[email protected] NathanielFrank 2010 03 17 22:57:52 but don'tdisappearwithout saying why for an
extended period or l'll get worried;)
[email protected] Nobody 2010 03 17 22:58:03 i wont
[email protected] Nobody 2010 03 1722:58:16 you'll know if something's wrong
[email protected] NathanielFrank 2010 03 17 22:58:39 ok
[email protected] NathanielFrank 2010 03 1722:58 57 you can just tell me "ail the ships came in"
[email protected]
[email protected]
NathanielFrank
Nobody
2010 03 1722:59:09
2010 03-1722:59:15
via email or any other mechanism
>nod<
[email protected] NathanielFrank 2010 03 1722:59:44 will be doing an investigativejournoconfin norway
this week end,so may be out ofcontact most of t he
time
[email protected]
[email protected]
Nobody
NathanielFrank
2010 03 1722:59:55 its good [email protected]
[email protected]
Nobody
NathanielFrank 2010 03 1723:00:17 ok
[email protected]
[email protected]
NathanielFrank
Nobody
2010 03 1723:00:27
2010 03 1723:00:43
off to do some work.
k, but def read the refiectionisent
[email protected] NathanielFrank 2010 03 1723:00:53 i wi l l
[email protected]
[email protected]
NathanielFrank
Nobody
2010 03 1723:01:01 now [email protected]
[email protected]
NathanielFrank
Nobody 2010 03 1723:01:03 toodles
[email protected] NathanielFrank 2010 03 1723:12:56 heh
[email protected] NathanielFrank 2010 03 1723:13:15 Hike it. free advertising to just the right market
[email protected] Nobody 2010 03 1723:23:14 >nod<
^
Sender Account Sender Alias Date-Time MessageText
[email protected] Nobody 2010 03 1723:23:30 the tone is what interests me the most
[email protected] NathanielFrank 2010 03 1723:23:45 yes
[email protected] Nobody 2010 03 1723:23:47 itsnotreallyathreat,itsaplead
[email protected] NathanielFrank 2010 03 17 23:23:55 slight desperation
[email protected] NathanielFrank 2010 03 17 23:24:00 yes
[email protected] NathanielFrank 2010 03 1723:24:68 interesting approach
[email protected] Nobody 2010 03 1723:24121 IOW,noone knows what to do
[email protected] NathanielFrank 2010 03 1723:24:40 threats work better with mosL but perhaps they see
that our sources are resistant to them anyway ..
pressassociation@jabbercccde NathanielFrank 2010 03 17 23:24:54 so pleading is the only thing left
[email protected] Nobody 2010 03 17 23:25:34 im sure it was brought on by discussions that showed
slight sympathy
pressassociation@jabbercccde NathanielFrank 2010 03 1723:27:28 yes
[email protected] NathanielFrank 2010 03 1723:27:46 ithink your intuition is correct
[email protected] Nobody 2010 03 1723:28:32 "if we C9n't scare them, lets ask
nicely"
[email protected] Nobody 2010 03 1723:33:39 the hackers that these governments hire, the good
ones. .they're the cats that can only be herded
by food , but when the cat food runs out, or they get
treated rough . they'd be the first to dissent
[email protected] Nobody 2010 03 17 23:34:21 food meaning money, ofcourse... and treatment
being,well,treatment
c^awgnetwork@jabbercccde Nobociy 2010 03 1723:34:42 weird analogy,iknow..lol
[email protected] NathanielFrank 2010 03 1723:38:21 yes
[email protected] NathanielFrank 2010 03 17 23:38:34 that's possible
[email protected] NathanielFrank 2010 03 17 23:39:09 and there are social vales that arise out of the internet
that have evolved beyond those inside the isolated
militarycontractor complex
[email protected] Nobody 2010 03 18 00:04:31 its likeaclassroom run by an overbearing teacher...
whenakid strikes back anonymously by sabotaging
the desk...the other kids getalittle excited and
rowdy, because they wanted too, but were afraid of
getting caught , the teacher is embarassed and cant
control the kids, so the teacher just makes an
announcement that the students should continue
working quiety after they haveaiook at the mess on
the desk that the teacher is cleaning up
[email protected] Nobody 2010 03 1800:05:11 ithink thatsabetter analogy^
dawgnetwork@jabbercccde Nobody 2010 03 1800:37:17 ^div^^a
href^http:^^freedomincluded.com^index^^^^span
style-^^background-color:^^ffffff: font-family: Helvetica;
fontsize:
12pt;^^^http:^^freedomincludedcom^index^^span^^^a^
^spanstyle-^backgroundcolor:^^ffffff;fontfamily:
Helvetica;font size:12pt;^^^&1t; recommend: free (as
in freedom) hardware vendor^^
[email protected] Nobody 2010 03 1808:39:52 wtf is wrong withLTC Packnett xO
[email protected] Nobody 2010 03 18 08:40:59 you don't confirm, or even come off as possibly
confirming shit...
[email protected] Nobody 2010 03 1808:41:22 lol,slipped up in your f9vor,iguess
[email protected] NathanielFrank 2010 03 1808:41:31 eh?
[email protected] Nobody 2010 03 1808:42:06 NYTarticlehasLTC Packnett allegedly confirming the
authenticity ofthe 2008 report posted on 15th
[email protected] NathanielFrank 2010 03^8 08:42:17 yes
[email protected] NathanielFrank 2010 03 18 08:42:19 hilarious
[email protected] Nobody 2010 03 18 08:42:57 idont think he's going to continue to be the Ml
spokesperson
[email protected] NathanielFrank 2010 03 1808:43:04 they do break these rules though when being
hammered
[email protected] Nobody 2010^63^68143:15 imsure
[email protected] NathanielFrank 2010 03 18 08:43:41 refusing to confirm does make them look shadowy
and untrustworthy
dawgnetwork@jabbercccde Nobody 2010 03 1808:43:45 ijust didnt realize how little it takes for them to cave...
Sender Account
[email protected]
[email protected]
Sender Alias
Nobody
NathanielFrank
Date-Time
2010 03 1808:43:55
2010 03 1808:44:12
MessageText^
true,but..im shocked
yeah , but remember , rules are just for the grunts :P
[email protected]
[email protected]
[email protected]
NathanielFrank
Nobody
Nobody
2010 03 1808:44:32
2010^3-1808B44:43
2010 03 1808:45:57
like no spying on citizens at the nsa
which is common
"ohfi^ck,this might beaLIS citizen...
shouldn't we get this checked by the
FBi...""Fuck that, FOi is slow as fuck,
we'll just keep listening in, capture him, and
then turn him over"
[email protected]
[email protected]
[email protected]
NathanielFrank^
NathanielFrank
NathanielFrank
2010 03 18 08:48:27
2610 03 1808:48:57
2610-03 1808:48:59
ipreferjen. also, too masculine looking
heh
nevermine
1 Disk U t i l i t y : Burn st 3d, 5at Jan 30 23:22:50 2010
2 Disk U t i l i t y : Burning LO CD-R media w i t h 5AO s t r a t e g y m HL-DT-ST DVDRW GS23N
3800 v i a ATAPI.
3 Disk U t i l i t y : Requested burn speed was max, actual burn speed i s 24x.
4 Disk U t i l i t y : 8urn underrun p r o t e c t i o n i s supported, and enabled.
5 Disk U t i l i t y : Burn f i n i s h e d , 5at Jan 30 23:26:28 2010
6 Disk U t i l i t y : V e r i f y s t a r t e d , 5at Jan 30 23:26:28 2010
7 Disk U t i l i t y : V e r i f y f i n i s h e d , 5at Jan 30 23:29:27 2010
8 Disk U t i l i t y : Burn s t a r t e d , Mon Feb 1 12:26:31 2010
9 Disk U t i l i t y : Burning t o CD-R media w i t h 5AO s t r a t e g y i n HL-DT-5T DVDRW G523N
S800 v i a ATAPI.
10 Disk U t i l i t y : Requested burn speed was max, a c t u a l burn speed i s 24x.
11 Disk U t i l i t y : Burn underrun p r o t e c t i o n i s supported, and enabled.
12 Disk U t i l i t y : Burn f i n i s h e d , Mon Feb 1 12:30:23 2010
13 Disk U t i l i t y : V e r i f y s t a r t e d , Mon Feb 1 12:30:23 2010
14 Disk U t i l i t y : V e r i f y f i n i s h e d , Mon Feb 1 12:33:36 2010
15 Disk U t i l i t y : Burn s t a r t e d , Mon Feb 1 13:17:13 2010
16 Disk U t i l i t y : Burning to CD-R media w i t h 5A0 s t r a t e g y i n HL-DT-5T DVDRW G523N
5800 v i a ATAPI.
17 Disk U t i l i t y : Requested burn speed was max, a c t u a l burn speed i s 24x.
18 Disk U t i l i t y : Burn underrun p r o t e c t i o n i s supported, and enabled.
19 Disk U t i l i t y : Burn f i n i s h e d , Mon Feb 1 13:19:57 2010
20 Disk U t i l i t y : V e r i f y s t a r t e d , Mon Feb 1 13:19:57 2010
21 Disk U t i l i t y : V e r i f y f i n i s h e d , Mon Feb 1 13:22:01 2010
22 Disk U t i l i t y : Erase s t a r t e d , Mon Feb 15 04:34:16 2010
23 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-5T DVDRW GS23N 5800 v i a ATAPI.
24 Disk U t i l i t y : Erase f i n i s h e d , Mon Feb 15 04:34:51 2010
25 Disk U t i l i t y : Erase s t a r t e d , Mon Feb 15 13:12:02 2010
26 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-5T DVDRW G523N 5800 v i a ATAPI.
27 Disk U t i l i t y : Erase f i n i s h e d , Mon Feb 15 13:20:50 2010
28 ITunes: Burn s t a r t e d , Mon Feb 15 13:21:15 2010
29 iTunes: Burning to CD-RW media w i t h 5A0 strategy i n HL-DT-5T DVDRW G523N 5800
via ATAPI.
30 iTunes: Requested burn speed was 158x, a c t u a l burn speed i s lOx.
31 iTunes: Burn underrun p r o t e c t i o n i s supported, and enabled.
32 iTunes: Burn f i n i s h e d , Mon Feb 15 13:29:32 2010
33 Disk U t i l i t y : Erase s t a r t e d . Sun Feb 21 03:13:13 2010
34 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW G523N 2600 v i a ATAPI.
35 Disk U t i l i t y : Erase f i n i s h e d . Sun Feb 21 03:22:02 2010
36 Disk U t i l i t y : Erase s t a r t e d , Tue Feb 23 17:14:20 2010
37 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW G523N 2600 v i a ATAPI.
38 Disk U t i l i t y : Erase f i n i s h e d , Tue Feb 23 17:14:51 2010
39 iTunes: Burn s t a r t e d , Tue Feb 23 17:21:26 2010
40 iTunes: Burning to CD-RW media w i t h SAO strategy i n HL-DT-ST DVDRW GS23N 5800
v i a ATAPI.
41 iTunes: Requested burn speed was 117x, a c t u a l burn speed i s 1 Ox.
42 iTunes: Burn underrun p r o t e c t i o n i s supported, and enabled.
43 iTunes: Burn f i n i s h e d , Tue Feb 23 17:27:36 2010
44 Disk U t i l i t y : Erase s t a r t e d . Sat Feb 27 13:19:49 2010
45 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW GS23N 5800 v i a ATAPI.
46 Disk U t i l i t y : Erase f i n i s h e d . Sat Feb 27 13:41:16 2010
47 Disk U t i l i t y : Erase s t a r t e d , Tue Mar 2 17:26:45 2010
48 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-5T DVDRW G523N S800 v i a ATAPI.
-1-
49 Disk U t i l i t y : Erase f ^hed, Tue Mar 2 17:48:05 2010
50 Disk U t i l i t y : Burn sta^c;:ed, Tue Mar 2 17:48:54 2010
51 Disk U t i l i t y : Burning to CD-RW media w i t h SAO s t r a t e g y i n HL-DT-ST DVDRW GS23^
SBOO v i a ATAPI.
52 Disk U t i l i t y : Requested burn speed was max, a c t u a l burn speed i s 4x.
53 Disk U t i l i t y : Burn underrun p r o t e c t i o n i s supported, and enabled.
54 Disk U t i l i t y : Burn f i n i s h e d , Tue Mar 2 17:56:50 2010
55 Disk U t i l i t y : V e r i f y s t a r t e d , Tue Mar 2 17:56:50 2010
56 Disk U t i l i t y : V e r i f y f i n i s h e d , Tue Mar 2 18:00:48 2010
57 Disk U t i l i t y : Erase s t a r t e d , F r i Mar 5 00:34:11 2010
58 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW GS23^ 5800 v i a ATAPI.
59 Disk U t i l i t y : Erase f i n i s h e d , E r i Mar 5 00:42:59 2010
60 Disk U t i l i t y : Burn s t a r t e d , Tue Mar 9 15:58:01 2010
61 Disk U t i l i t y : Burning to CD-RW media w i t h non-optimal TAO strategy i n HL-DT-ST
DVDRW G523^ 5800 v i a ATAPI.
62 Disk U t i l i t y : Requested burn speed was max, actual burn speed i s 4x.
63 Disk U t i l i t y : Burn underrun p r o t e c t i o n i s supported, and enabled.
64 Disk U t i l i t y : Burn f i n i s h e d , Tue Mar 9 16:05:44 2010
65 Disk U t i l i t y : V e r i f y s t a r t e d , Tue Mar 9 16:05:44 2010
66 Disk U t i l i t y : V e r i f y f i n i s h e d , Tue Mar 9 16:09:30 2010
67 Disk U t i l i t y : Erase s t a r t e d , Sun Mar 14 08:25:54 2010
68 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW G523l^ 5800 v i a ATAPI.
69 Disk U t i l i t y : Erase f i n i s h e d . Sun Mar 14 08:47:15 2010
70 Finder: Burn s t a r t e d . Sun Mar 14 09:05:30 2010
71 Finder: Burning t o CD-RW media w i t h SAO s t r a t e g y i n HL-DT-ST DVDRW G523^ 5800
v i a ATAPI.
72 Finder: Requested burn speed was max, actual burn speed i s 4x.
73 Finder: Burn underrun p r o t e c t i o n i s supported, and enabled.
74 Finder: Burn f i n i s h e d . Sun Mar 14 09:06:47 2010
75 Finder: V e r i f y s t a r t e d . Sun Mar 14 09:06:47 2010
76 Finder: V e r i f y f i n i s h e d . Sun Mar 14 09:06:52 2010
77 Disk U t i l i t y : Erase s t a r t e d , Sun Mar 14 12:19:23 2010
78 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW 05231^ SBOO v i a ATAPI.
79 Disk U t i l i t y : Erase f i n i s h e d . Sun Mar 14 12:29:28 2010
80 Disk U t i l i t y : Erase s t a r t e d , Mon Mar 22 17:01:10 2010
81 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW G5231^ SBOO v i a ATAPI.
82 Disk U t i l i t y : Erase f i n i s h e d , Mon Mar 22 17:22:37 2010
83 iTunes: Burn s t a r t e d . Wed Mar 24 09:31:09 2010
84 iTunes: Burning to CD-RW media w i t h SAO strategy i n HL-DT-ST DVDRW GS23l^ SBOO
via ATAPI.
85 iTunes: Requested burn speed was 163x, actual burn speed i s 4x.
86 iTunes: Burn underrun p r o t e c t i o n i s supported, and enabled.
87 iTunes: Burn f i n i s h e d . Wed Mar 24 09:49:53 2010
88 Disk U t i l i t y : Erase s t a r t e d . Wed Mar 24 15:32:46 2010
89 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW GS23^ SBOO v i a ATAPI.
90 Disk U t i l i t y : Erase f a i l e d . Wed Mar 24 15:32:48 2010
91 Disk U t i l i t y : Erase e r r o r : 0x80020040 One of the volumes on the disc i s s t i l l i n
use.
92 Disk U t i l i t y : Erase s t a r t e d . Sun Mar 28 21:14:30 2010
93 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW GS23I^ 5800 v i a ATAPI.
94 Disk U t i l i t y : Erase f i n i s h e d . Sun Mar 28 21:35:48 2010
95 Disk U t i l i t y : Erase s t a r t e d , Tue Mar 30 22:54:20 2010
96 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW GS23^ 5800 v i a ATAPI.
^-
Erase f ^hed, Tue Mar 30 23:15:43 2010
Erase s t a r t e d . Wed Mar 31 12:14:43 2010
Erasing CD-RW media i n HL-DT-ST DVDRW GS23I^ SBOO v i a ATAPI.
Erase f i n i s h e d , Wed Mar 31 12:23:33 2010
Erase s t a r t e d . Wed Mar 31 17:40:37 2010
Erasing CD-RW media i n HL-DT-ST DVDRW GS23^ 5800 v i a ATAPI.
Erase f i n i s h e d . Wed Mar 31 17:49:20 2010
Erase s t a r t e d , Thu Apr 1 19:27:39 2010
Erasing CD-RW media i n HL-DT-ST DVDRW G523^ 5800 v i a ATAPI.
Erase f i n i s h e d , Thu Apr 1 19:28:14 2010
Erase s t a r t e d , Thu Apr 1 23:08:53 2010
Erasing CD-RW media i n HL-DT-ST DVDRW G523^ 5800 v i a ATAPI.
Erase f i n i s h e d , Thu Apr 1 23:17:40 2010
Erase s t a r t e d . Wed Apr 7 09:33:11 2010
Erasing CD-RW media i n HL-DT-ST DVDRW G523^ SBOO v i a ATAPI.
Erase f i n i s h e d . Wed Apr 7 09:33:50 2010
Erase s t a r t e d , Thu Apr 8 14:18:26 2010
Erasing CD-RW media i n HL-DT-ST DVDRW G523^ SBOO v i a ATAPI.
Erase f i n i s h e d , Thu Apr 8 14:19:03 2010
Erase s t a r t e d . Sat Apr 10 12:18:29 2010
Erasing CD-RW media i n HL-DT-ST DVDRW GS23^ SBOO via ATAPI.
Erase f i n i s h e d . Sat Apr 10 12:19:06 2010
Erase s t a r t e d . Sun Apr 11 09:16:47 2010
Erasing CD-RW media i n HL-DT-ST DVDRW 05231^ 5800 v i a ATAPI.
Erase f i n i s h e d . Sun Apr 11 09:17:28 2010
Erase s t a r t e d , Mon Apr 12 17:04:16 2010
Erasing CD-RW media i n HL-DT-ST DVDRW GS23^ 5800 v i a ATAPI.
Erase f i n i s h e d , Mon Apr 12 17:04:52 2010
s t a r t e d , Mon Apr 12 17:18:31 2010
^g to DVDtRW (I^FODISC AlO) media w i t h DAO s t r a t e g y i n HL-DT-ST
DVDRW GS23^ SBOO via ATAPI.
127 Finder: Requested burn speed was 4x, a c t u a l burn speed i s 4x.
128 Finder: Burn f i n i s h e d , Mon Apr 12 17:22:45 2010
129 Finder: V e r i f y s t a r t e d , Mon Apr 12 17:22:45 2010
130 Finder: V e r i f y f i n i s h e d , Mon Apr 12 17:25:49 2010
131 Disk U t i l i t y : Erase s t a r t e d , E r i Apr 16 22:33:44 2010
132 Disk U t i l i t y : Erasing DVDtRW (ll^FODISC AlO) media i n HL-DT-ST DVDRW GS23^ 580^
v i a ATAPI.
133 Disk U t i l i t y : Erase f i n i s h e d , F r i Apr 16 22:50:48 2010
134 Disk U t i l i t y : Erase s t a r t e d , Thu Apr 22 22:44:15 2010
135 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW G523^ SBOO v i a ATAPI.
136 Disk U t i l i t y : Erase f i n i s h e d , Thu Apr 22 22:52:59 2010
137 Disk U t i l i t y : Erase s t a r t e d , F r i Apr 23 23:59:23 2010
138 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW G223^ 5800 v i a ATAPI.
139 Disk U t i l i t y : Erase f i n i s h e d . Sat Apr 24 00:20:51 2010
140 Finder: Burn s t a r t e d . Sat Apr 24 00:26:33 2010
141 Finder: Burning to CD-RW media w i t h SAO s t r a t e g y i n HL-DT-ST DVDRW GS23^ SBOO
v i a ATAPI.
142 Finder: Requested burn speed was max, actual burn speed i s 4x.
143 Einder: Burn underrun p r o t e c t i o n i s supported, and enabled.
144 Einder: Burn f i n i s h e d . Sat Apr 24 00:36:22 2010
145 Finder: V e r i f y s t a r t e d . Sat Apr 24 00:36:22 2010
146 Finder: DVDRW GS23^: SCSITask 948235.875000 CDB: Read (10), block
97 Disk U t i l i t y
98 Disk U t i l i t y
99 Disk U t i l i t y
100 Disk U t i l i t y
101 Disk U t i l i t y
102 Disk U t i l i t y
103 Disk U t i l i t y
104 Disk U t i l i t y
105 Disk U t i l i t y
106 Disk U t i l i t y
107 Disk U t i l i t y
108 Disk U t i l i t y
109 Disk U t i l i t y
110 Disk U t i l i t y
111 Disk U t i l i t y
112 Disk U t i l i t y
113 Disk U t i l i t y
114 Disk U t i l i t y
115 Disk U t i l i t y
116 Disk U t i l i t y
117 Disk U t i l i t y
118 Disk U t i l i t y
119 Disk U t i l i t y
120 Disk U t i l i t y
121 Disk U t i l i t y
122 Disk U t i l i t y
123 Disk U t i l i t y
124 Disk U t i l i t y
125 Finder: Burn
126 Finder: Burn
92672, count:
512 f a i l e d w i t h s e r v i c^esponse ^ 1 (SERVICE^DELIVER^ ^TARGET^FAILURE), status
^ 5 ( D e l i v e r y F a i l u r e )
147 Finder: Retry ^1
148 Finder: DVDRW GS23^: SCSITask 948265.562500 CDB: Read (10), block: 92672, count:
512 f a i l e d w i t h service response ^ 1 (SERVICE^DELIVER^^OR^TARGET^FAILURE), status
^ 5 ( D e l i v e r y F a i l u r e )
149 Finder: Retry ^1
150 Finder: DVDRW GS23^: SCSITask 948280.562500 CDB: Read (10), block: 92672, count:
512 f a i l e d w i t h service response ^ 1 (SERVICE^DELIVER^^OR^TARGET^FAILURE), status
^ 5 ( D e l i v e r y F a i l u r e )
151 Finder: Retry ^2
152 Finder: DVDRW GS23^: SCSITask 948295.562500 CDB: Read (10), block: 92672, count:
512 f a i l e d w i t h service response ^ 1 (SERVICE^DELIVER^^OR^TARGET^FAILURE), status
- 5 ( D e l i v e r y F a i l u r e )
153 Finder: Retry ^3
154 Finder: DVDRW GS23I^: SCSITask 948310.625000 CDB: Read (10), block: 92672, count:
512 f a i l e d w i t h service response ^ 1 (SERVICE^DELIVER^^OR^TARGET^FAILURE), status
^ 5 ( D e l i v e r y F a i l u r e )
155 Finder: Giving up
156 Finder: V e r i f y f a i l e d . Sat Apr 24 00:39:46 2010
157 Finder: V e r i f y e r r o r : 0x80020063 V e r i f y i n g the burned data f a i l e d .
158 Disk U t i l i t y : Erase s t a r t e d , Mon Apr 26 00:08:05 2010
159 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW 05231^ SBOO v i a ATAPI.
160 Disk U t i l i t y : Erase f i n i s h e d , Mon Apr 26 00:29:21 2010
161 Disk U t i l i t y : Erase s t a r t e d , Tue Apr 27 23:53:21 2010
162 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW GS23^ SBOO v i a ATAPI.
163 Disk U t i l i t y : Erase f i n i s h e d . Wed Apr 28 00:02:03 2010
164 Finder: Burn s t a r t e d . Wed Apr 28 00:03:37 2010
165 Finder: Burning t o CD-RW media w i t h SAO s t r a t e g y i n HL-DT-ST DVDRW GS23^ SBOO
via ATAPI.
166 Finder: Requested burn speed was 4x, actual burn speed i s 4x.
167 Finder: Burn underrun p r o t e c t i o n i s supported, and enabled.
168 Finder: Burn f i n i s h e d . Wed Apr 28 00:13:29 2010
169 Finder: V e r i f y s t a r t e d . Wed Apr 28 00:13:29 2010
170 Finder: DVDRW GS23I^: SCSITask 1292453.250000 CDB: Read (10), block: 98816,
count: 512 f a i l e d w i t h service response ^ 1 (SERVICE^DELIVERY^OR^TARGET^FAILURE),
status ^ 5 ( D e l i v e r y F a i l u r e )
171 Finder: Retry ^1
172 Finder: DVDRW GS23^: SCSITask 1292468.375000 CDB: Read (10), block: 98816,
count: 512 f a i l e d w i t h service response ^ 1 (SERVICE^DELIVER^ OR TARGET^FAILURE),
status ^ 5 ( D e l i v e r y F a i l u r e )
173 Finder: Retry ^2
174 Finder: DVDRW GS23^: SCSITask 1292483.250000 CDB: Read (10), block: 98816,
count: 512 f a i l e d w i t h service response ^ 1 (SERVICE^DELIVERY^OR^TARGET^FAILURE),
status - 5 ( D e l i v e r y F a i l u r e )
175 Finder: Retry ^3
176 Finder: DVDRW G523^: SCSITask 1292498.375000 CDB: Read (10), block: 98816,
count: 512 f a i l e d w i t h service response ^ 1 (SERVICE^DELIVER^^OR^TARGET^FAILURE),
status ^ 5 ( D e l i v e r y F a i l u r e )
177 Finder: Giving up
178 Finder: V e r i f y f a i l e d . Wed Apr 28 00:16:14 2010
179 Finder: V e r i f y e r r o r : 0x80020063 V e r i f y i n g the burned data f a i l e d .
180 Finder: Burn s t a r t e d , F r i Apr 30 18:28:24 2010
181 Finder: Burning to CD media w i t h SAO s t r a t e g y i n HI -ST DVDRW GS23I^ 5800
v i a ATAPI.
182 Finder: Requested burn speed was lOx, actual burn speed i s lOx.
183 Finder: Burn underrun p r o t e c t i o n i s supported, and enabled.
184 Finder: Burn f i n i s h e d , F r i Apr 30 18:29:03 2010
185 Finder: V e r i f y s t a r t e d , F r i Apr 30 18:29:03 2010
186 Finder: V e r i f y f i n i s h e d , F r i Apr 30 18:29:07 2010
187 Disk U t i l i t y : Erase s t a r t e d . Wed May 5 05:23:11 2010
188 Disk U t i l i t y : Erasing CD-RW media i n HL-DT-ST DVDRW GS23^ SBOO v i a ATAPI.
189 Disk U t i l i t y : Erase f i n i s h e d . Wed May 5 05:31:59 2010
190
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
-k-k-k-k-k-k-k-k-kt
2010-01-29 15:07:11 -0^00: Disk U t i l i t y s t a r t e d .
2010-01-29 15:07:22 -0500:
Name : Macintosh HD
Type : Volume
disk0s2
/
Mac OS X
: 10. 6
10A432
Mac OS Extended (Journaled)
: SATA
lODeviceTree:/PCI0@0/5ATA@B/PRT0@0/PMP@0
Disk I d e n t i f i e r
Mount Point :
System Name :
System Version
System B u i l d :
F i l e System :
Connection Bus
Device Tree :
Writable : Yes
Universal Unique I d e n t i f i e r : F8C8E85A-158E-33E8-9D38-87394DAA8D32
CapacitLy : 215.69 GB (215, 687, 888, 896 Bytes)
Free Space : 164.4 GB (164,395,950,080 Bytes)
Used : 51.29 GB (51,291,938,816 Bytes)
Number of F i l e s : 410,777
Number of Folders : 115,717
Owners Enabled : Yes
Can Turn Owners Off : Yes
Can Repair Permissions : Yes
Can Be V e r i f i e d :
Can Be Repaired :
Can Be Formatted :
Bootable : Yes
Supports Journaling
Journaled : Yes
Disk Number : 0
P a r t i t i o n Number :
Yes
Yes
Yes
Yes
^k*-k*-k-k*-k-k
2010- 01 -30 23 21 39 -0500 Disk U t i l i t y s t a r t e d .
2010- 01 -30 23 22 40 -0500 Burning Image " I f s l i v e c d - x 8 6 64-6.3-r2014-nosrc.iso"
2010- 01 -30 23 22 50 -0500 Image name: " I f s l i v e c d - x 8 6 64-6.3-r2014-nosrc.iso"
2010- 01 -30 23 22 50 -0500 Burn disc i n : "HL-DT-ST DVDRW GS23N"
2010- 01 -30 23 22 50 -0500 Erase disc before burning: No
2010- 01 -30 23 22 50 -0500 Leave disc appendable: No
2010- 01 -30 23 22 50 -0500 V e r i f y burned data a f t e r burning: Yes
2010- 01 -30 23 22 50 -0500 Eject disc a f t e r burning
2010- 01 -30 23 22 50 -0500
2010- 01 -30 23 22 50 -0500 Preparing data f o r burn
2010- 01 -30 23 22 50 -0500 Opening session
2010- 01 -30 23 22 50 -0500 Opening t r a c k
2010- 01 -30 23 22 50 -0500 W r i t i n g t r a c k
2010- 01 -30 23 26 21 -0500 Closing t r a c k
2010- 01 -30 23 26 21 -0500 Closing session oTV--'
2010- 01 -30 23 26 28 -0500 F i n i s h i n g burn Jv'
-1-
PROSECUTION EXHIBIT Jl5_for identificatioh
PAGE OFFERED: PAGE ADMITTED;
PAGE OF PAGES
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
2010-01-30 23:26:28
2010-01-30 23:26:28
2010-01-30 23:29:40
2010-01-30 23:30:13
s u c c e s s f u l l y .
2010-01-30 23:30:25
succeeded
2010-01-30 23:32:36
k-k-k-kkkk-k-k-k
2010-01-30 23:33:13
k - k k ^ - k k k - k k k k
0
-OoOO
-0500
-0500
V e r i f y i n g burn...
V e r i f y i n g
Burn completed s u c c e s s f u l l y
Image "Ifslivecd-x86_64-6.3-r2014-nosrc.iso" burned
-0500: Eject of " I f s l i v e c d - x 8 6 64-6.3-r2014-nosrc.iso'
-0500: Unmount of "OTHER" succeeded
-0500: Disk U t i l i t y s t a r t e d .
2010-01-31 00:10:28 -0500: Disk U t i l i t y s t a r t e d .
**********
2010-01-31 00:38:00 -0500: Disk U t i l i t y s t a r t e d .
2010-01
2010-01
2010-01
2010-01
2010-01
2010-01
2010-01
2010-01
2010-01
2010-01
2010-01
2010-01
2010-01
2010-01
2010-01
2010-01
hours,
2010-01
2010-01
k k k k k k k
2010-02
-31 00:38:26 -0500
-31 00:38:26 -0500
-31 00:38:26 -0500
-31 00:38:29 -0500
-31 00:39:12 -0500
-31 00:39:12 -0500
0.0% complete.
'Macintosh HD'
-31 00:39:12
-31 00:39:12
-31 00:39:18
-31 00:39:18
-31 00:39:18
-31 00:39:22
-31 04:19:35
-31 04:27:00
-31 04:27:45
-31 04:27:45
48 minutes.
-31 04:27:45
-31 04:27:45
-01 12:23:46
-0500
-0500
-0500
-0500
-0500
-0500
-0500
-0500
-0500
-0500
-0500;
-0500;
Preparing to Secure Erase Free Space
35 Pass Erase Free Space
Creating temporary f i l e
Securely erasing f i l e
Mounting disk
Secure Erase Free Space stopped a f t e r 43 seconds.
Erase complete.
Preparing to Secure Erase Free Space : "Macintosh HD'
7 Pass Erase Free Space
Creating temporary f i l e
Securely erasing f i l e
Creating temporary f i l e
Securely erasing f i l e
Mounting disk
Secure Erase Free Space completed successfully i n 3
Erase complete.
-0500: Disk U t i l i t y s t a r t e d .
91 2010- 02 -01 12 26 28 -0500 Burning Image "Ifslivecd-x86-6.3-r2145-nosrc.iso"
92 2010- 02 -01 12 26 31 -0500 Image name: "Ifslivecd-x86-6.3-r2145-nosrc.iso"
93 2010- 02 -01 12 26 31 -0500 Burn disc i n : "HL-DT-ST DVDRW G223N"
94 2010- 02 -01 12 26 31 -0500 Erase disc before burning: No
95 2010- 02 -01 12 26 31 -0500 Leave disc appendable: No
96 2010- 02 -01 12 26 31 -0500 V e r i f y burned data a f t e r burning: Yes
97 2010- 02 -01 12 26 31 -0500 Eject disc a f t e r burning
98 2010- 02 -01 12 26 31 -0500
99 2010- 02 -01 12 26 31 -0500 Preparing data f o r burn
100 2010- 02 -01 12 26 31 -0500 Opening session
101 2010- 02 -01 12 26 31 -0500 Opening t r a c k
102 2010- 02 -01 12 26 31 -0500 W r i t i n g t r a c k
103 2010- 02 -01 12 30 17 -0500 Closing t r a c k
104 2010-02-01 12 :30: 17 1 Closing session
105 2010-02-01 12 : 30: 23 -OuUO F i n i s h i n g burn
106 2010-02-01 12 :30: 23 -0500 V e r i f y i n g burn...
107 2010-02-01 12 : 30: 23 -0500 V e r i f y i n g
108 2010-02-01 12 :33: 45 -0500 Burn completed s u c c e s s f u l l y
109
k*k*kkk*--kk-
110 2010-02-01 13 : 16: 57 -0500 Disk U t i l i t y s t a r t e d .
111
112 2010-02-01 13 : 17 : 10 -0500 Burning Image "systemrescuecd-x86-l.3.5.iso"
113 2010-02-01 13 : 17 : 13 -0500 Image name: "systemrescuecd-x86-1.3.5.iso"
114 2010-02-01 13 : 17 : 13 -0500 Burn disc i n : "HL-DT-ST DVDRW GS23N"
115 2010-02-01 13 : 17 : 13 -0500 Erase disc before burning: No
116 2010-02-01 13 : 17 : 13 -0500 Leave disc appendable: No
117 2010-02-01 13 : 17 : 13 -0500 V e r i f y burned data a f t e r burning: Yes
118 2010-02-01 13 : 17 : 13 -0500 Eject disc a f t e r burning
119 2010-02-01 13 : 17 : 13 -0500
120 2010-02-01 13 : 17 : 13 -0500 Preparing data f o r burn
121 2010-02-01 13 : 17 : 13 -0500 Opening session
122 2010-02-01 13 : 17 : 13 -0500 Opening t r a c k
123 2010-02-01 13 : 17 : 13 -0500 W r i t i n g t r a c k
124 2010-02-01 13 : 19: 50 -0500 Closing t r a c k
125 2010-02-01 13 : 19: 50 -0500 Closing session
126 2010-02-01 13 : 19: 57 -0500 F i n i s h i n g burn
127 2010-02-01 13 : 19: 57 -0500 V e r i f y i n g burn...
128 2010-02-01 13 : 19: 57 -0500 V e r i f y i n g
129 2010-02-01 13 :22: 08 -0500 Burn completed s u c c e s s f u l l y
130 2010-02-01 13 :22: 10 -0500 A d d i t i o n a l i n f o r m a t i o n can be found i n the
-/Library/Log s/DiscRecording.log log f i l e .
131 2010-02-01 13 :22: 10 -0500 Image "systemrescuecd-x86-l.3.5.iso" burned
s u c c e s s f u l l y .
132 2010-02-01 13 :22: 10 -0500
133
k-kkkkk-kkr-k-k
134 2010-02-11 06 : 59: 04 -1-0300 Disk U t i l i t y s t a r t e d .
135
136 2010-02-11 06 : 59: 18 -k0300 V e r i f y permissions f o r "Macintosh HD"
137 2010-02-11 07 :02: 31 -t-0300 User d i f f e r s on "private/etc/bashrc", should be
user i s 501.
138 2010-02-11 07 :02: 31 -t-0300 Group d i f f e r s on "private/etc/bashrc", should be
group i s 20.
139 2010-02-11 07 :02: 36 -t-0300 Permissions d i f f e r on "usr/share/derby", should
drwxr-xr-x , they are I r w x r - x r - x .
140 2010-02-11 07 :02: 56 -t-0300 Warning: SUID f i l e
141
142
143
144
14 5
146
147
148
'System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent'
has been modified and w i l l not be repaired.
2010-02-11 07:03:44 +0300
they are I r w x r - x r - x .
2010-02-11 07:03:48 -1-0300
2010-02-11 07:03:48 -1-0300
2010-02-11 07:03:48 +0300
2010-02-11 07:03:48 +0300
2010-02-11 07:03:52 +0300;
2010-02-11 07:06:45 +0300:
Permissions d i f f e r on "bin/rm", should be - r - x r - x r - x
Permissions v e r i f i c a t i o n complete
Repairing permissions f o r "Macintosh HD"
User d i f f e r s on "private/etc/bashrc", should be 0,
-3-
user i s 501.
149 2010-02-11 07:06:45 +OJUO: Group d i f f e r s on "private/etc/bashrc", should be 0,
group i s 20.
150 2010-02-11 07:06:45 +0300: Repaired "private/etc/bashrc".
151 2010-02-11 07:06:50 +0300: Permissions d i f f e r on "usr/share/derby", should be
drwxr-xr-x , they are I r w x r - x r - x .
152 2010-02-11 07:06:50 +0300: Repaired "usr/share/derby".
153 2010-02-11 07:07:13 +0300: Warning: SUID f i l e
"System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/Mac05/ARDAgent'
has been modified and w i l l not be repaired.
154 2010- 02- 11 07 08 06 + 0300 Permissions d i f f e r on "bin/rm", should be - r - x r - x r - x
they are I r w x r - x r - x
155 2010- 02- 11 07 08 06 + 0300 Repaired "bin/rm".
156 2010- 02- 11 07 08 10 + 0300
157 2010- 02- 11 07 08 10 + 0300 Permissions r e p a i r complete
158 2010- 02- 11 07 08 10 + 0300
159 2010- 02- 11 07 08 10 + 0300
160
161 2010- 02- 11 07 08 44 + 0300 Preparing to Secure Erase Free Space : "Macintosh HD"
162 2010- 02- 11 07 08 44 + 0300 7 Pass Erase Free Space
163 2010- 02- 11 07 08 44 + 0300 Creating temporary f i l e
164 2010- 02- 11 07 08 48 + 0300 Securely erasing f i l e
165 2010- 02- 11 07 10 54 + 0300 Mounting disk
166 2010- 02- 11 07 10 54 + 0300 Secure Erase Free Space stopped a f t e r 2 minutes.
167 0 4% complete.
168 2010- 02- 11 07 10 55 + 0300 Erase complete.
169 2010- 02- 11 07 10 55 + 0300
170 2010- 02- 11 07 11 45 + 0300 Creating Image "Strongbox.dmg"
171 2010- 02- 11 07 11 53 + 0300 Unable to create "Strongbox.dmg." ^No space l e f t on
device)
172 2010- 02- 11 07 11 53 + 0300
173 2010- 02- 11 07 12 13 + 0300 Preparing t o erase : "OTHER"
174 2010- 02- 11 07 12 13 + 0300 P a r t i t i o n Scheme: GUID P a r t i t i o n Table
175 2010- 02- 11 07 12 13 + 0300 1 volume w i l l be erased
176 2010- 02- 11 07 12 13 + 0300 Name : "OTHER"
177 2010- 02- 11 07 12 13 + 0300 Si^e : 34.03 GB
178 2010- 02- 11 07 12 13 + 0300 Filesystem : MS-DOS (FAT)
179
180 2010- 02- 11 07 12 13 + 0300 Unmounting disk
181 2010- 02- 11 07 12 13 + 0300 Erasing
182 2010- 02- 11 07 12 13 + 0300 512 bytes per p h y s i c a l sector
>.-vS
183 /dev/rdisk0s3: 66425120 sectors i n 2075785 FAT32 c l u s t e r s (16384 b y t e s / c l u s t e r )
184 bps=512 spc=32 res=32 nft=2 mid=OxfO spt=32 hds=255 hid=0 bsec=66457600
bspf=16218 rdcl=2 i n f s = l bkbs=6
185
186 2010- 02- 11 07 12 13 + 0300 Mounting disk
187 2010- 02- 11 07 12 14 + 0300 Erase complete
188 2010- 02- 11 07 12 14 + 0300
189 2010- 02- 11 07 13 23 + 0300 Creating Image
190 2010- 02- 11 07 13 24 + 0300 I n i t i a l ! zing...
191 2010- 02- 11 07 13 24 + 0300 Creating...
192 2010- 02- 11 07 14 17 + 0300 Formatting...
193 2010- 02- 11 07 14 19 + 0300 Attaching.,.
'strongbox.dmg'
194 2010- 02- 11 07 : 14 . 31 + 0 Finishing...
195 2010- 02- 11 07 : 14 31 + 0jU0 Image "strongbox.dmg" created s u c c e s s f u l l y .
196
*-kk^k-kk^-kkkk
197 2010- 02- 11 09 41 55 + 0300 Disk U t i l i t y s t a r t e d .
198
199 2010-
1 GB.
02- 11 09 42 59 + 0300 Growing p a r t i t i o n 0 of "strongbox.dmg" from
200 2010- 02- 11 09 43 13 + 0300 Resizing "strongbox.dmg" was successful.
201 2010- 02- 11 09 43 20 + 0300 Attach Image "strongbox.dmg"
202 2010- 02- 11 09 43 20 + 0300 I n i t i a l i z i n g . . .
203 2010- 02- 11 09 43 50 + 0300 Attaching...
204 2010- 02- 11 09 43 51 + 0300 Mounting...
205 2010- 02- 11 09 43 51 + 0300 Finishing...
206 2010- 02- 11 09 43 51 + 0300 Finishing...
207 2010- 02- 11 09 44 00 + 0300 Image "strongbox.dmg" attached s u c c e s s f u l l y
208
k k k k k k k k
**
209 2010- 02- 11 09 45 18 + 0300 Disk U t i l i t y s t a r t e d .
210
211 2010-
6 GB.
02- 11 09 45 52 + 0300 Growing p a r t i t i o n 0 of "strongbox.dmg" from
212 2010- 02- 11 09 48 17 + 0300 Resizing "strongbox.dmg" was successful.
213 2010- 02- 11 09 48 27 + 0300 Attach Image "strongbox.dmg"
214 2010- 02- 11 09 48 27 + 0300 I n i t i a l i z i n g . . .
215 2010- 02- 11 09 48 41 + 0300 Attaching...
216 2010- 02- 11 09 48 42 + 0300 Mounting...
217 2010- 02- 11 09 48 42 + 0300 Finishing...
218 2010- 02- 11 09 48 42 + 0300 Finishing...
219 2010- 02- 11 09 48 49 + 0300 Image "strongbox.dmg" attached s u c c e s s f u l l y
220
k * k k k
*** **
221 2010- 02- 11 09 53 09 + 0300 Disk U t i l i t y s t a r t e d .
222
223 2010- 02- 11 09 54 55 + 0300 Creating Image "20100211-strongbox . cimg"
224 2010- 02- 11 09 54 55 + 0300 I n i t i a l i z i n g . . .
225 2010- 02- 11 09 54 55 + 0300 Creating...
226 2010- 02- 11 10 00 39 + 0300 Formatting...
227 2010- 02- 11 10 00 43 + 0300 Attaching...
228 2010- 02- 11 10 00 44 + 0300 Finishing...
229 2010- 02- 11 10 00 45 + 0300 Image "20100211-strongbox.dmg" created succ
230 2010- 02- 11 10 08 14 + 0300 Eject of "strongbox.dmg" succeeded
231
k -k kr -k k k k k k k
232 2010- 02- 11 10 17 58 + 0300 Disk U t i l i t y s t a r t e d .
233
234
k k- k k k * * *
235 2010- 02- 11 10 22 14 + 0300 Disk U t i l i t y s t a r t e d .
236
237 2010- 02- 11 10 24 42 + 0300 Unmount of "OTHER" f a i l e d
238
kkkkk-k-k-k-k-k
239 2010- 02- 11 11 11 42 + 0300 Disk U t i l i t y s t a r t e d .
240
241 2010- 02- 11 11 12 01 + 0300 Unmount of "OTHER" succeeded
242 2010- 02- 11 11 12 45 + 0300 Preparing to erase : "Other"
243 2010- 02- 11 11 12 45 + 0300 P a r t i t i o n Scheme: GUID P a r t i t i o n Table
244 2010- 02- 11 11 12 45 + 0300 1 volume w i l l be erased
-5-
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
Name
Size
Filesystem
"Other"
34.03 GB
Mac OS Extended (Journaled)
Unmounting disk
Erasing
I n i t i a l i z e d /dev/rdisk0s3 as a 32 GB HFS Plus volume
Mounting disk
Erase complete.
2010-02-11 11:12:45 + 1
2010-02-11 11:12:45 +OJUO
2010-02-11 11:12:45 +0300
2010-02-11 11:12:45 +0300
2010-02-11 11:12:47 +0300
2010-02-11 11:12:48 +0300
w i t h a 8192k j o u r n a l
2010-02-11 11:12:48 +0300
2010-02-11 11:12:49 +0300
2010-02-11 11:12:49 +0300
2010-02-11 11:13:33 +0300
Name : Other
Type : Volume
Disk I d e n t i f i e r : disk0s3
Mount Point : /Volumes/Other
F i l e System : Mac OS Extended (Journaled)
Connection Bus : SATA
Device Tree : lODeviceTree:/PCI0@0/SATA@8/PRT0@0/PMP@0
Writable : Yes
Universal Unique I d e n t i f i e r : CC1D74EC-E782-3E3A-8C17-9849E8A98D6C
Capacity : 33.89 GB (33,892,241,408 Bytes)
Free Space : 33.78 GB (33,776,410,624 Bytes)
Used : 115.8 MB (115,830,784 Bytes)
Number of F i l e s :
Number of Folders :
Owners Enabled :
Can Turn Owners Off
Can Be Formatted :
Bootable : Yes
Supports Journaling
Journaled : Yes
Disk Number : 0
P a r t i t i o n Number :
40
No
Yes
Yes
Yes
**********
2010-02-12 10:15:48 +0300: Disk U t i l i t y s t a r t e d .
**********
2010-02-12 12:26:23 +0300: Disk U t i l i t y s t a r t e d .
2010-02-12 12:26:42 +0300: Unmount of "Other" f a i l e d
2010-02-12 13:45:54 +0300: Unmount of "Other" succeeded
**********
2010-02-12 16:24:15 +0300: Disk U t i l i t y s t a r t e d .
2010-02-12 16:24:55 +0300
2010-02-12 16:24:55 +0300
2010-02-12 16:24:55 +0300
2010-02-12 16:24:55 +0300
Preparing to erase : "Images"
P a r t i t i o n Scheme: GUID P a r t i t i o n Table
1 volume w i l l be erased
Name : "Images"
297
298
299
300
301
302
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
2010-02-12 16:24:55 + D:
2010-02-12 16:24:55 +0oU0:
2010-02-12 16:24:56 +0300
2010-02-12 16:24:57 +0300
2010-02-12 16:24:57 +0300
w i t h a 8192k j o u r n a l
Size : 14.87 GE
Filesystem : Mac OS Extended (Journaled)
Unmounting disk
Erasing
I n i t i a l i z e d /dev/rdisk0s3 as a 14 GB HFS Plus volume
303
304 2010 -02- 12 16 24 57 + 0300 Mounting disk
305 2010 -02- 12 16 24 57 + 0300 Erase complete.
306 2010 -02- 12 16 24 57 + 0300
307
k k k * k r k * k - k k
308 2010 -02- 14 15 30 19 + 0300 Disk U t i l i t y s t a r t e d .
309
310 2010 -02- 14 15 31 07 + 0300 Creating Image "video.dmg"
311 2010 -02- 14 15 31 13 + 0300 Preparing imaging engine...
312 2010 -02- 14 15 31 13 + 0300 Reading whole disk (Apple HFS :
313 2010 -02- 14 15 32 02 + 0300 Operation canceled by user
314 ****
k kr kr -k -k k
315 2010 -02- 15 04 34 01 + 0300 Disk U t i l i t y s t a r t e d .
316
317 2010 -02- 15 04 34 16 + 0300 Preparing to erase o p t i c a l media
0),
DVDRW GS23N"
2010-02-15 04:34:16 +0300
2010-02-15 04:34:51 +0300
2010-02-15 04:34:51 +0300
2010-02-15 04:34:51 +0300
O p t i c a l erase option:' Quick Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 18 seconds.
Erase complete.
2010-02-15 13:11:19 +0300: Disk U t i l i t y s t a r t e d .
2010-02-15 13:12:02 +0300: Preparing to erase o p t i c a l media on device : "HL-DT-ST
DVDRW GS23N"
2010-02-15 13:12:02 +0300: O p t i c a l erase option: Complete Erase.
2010-02-15 13:20:50 +0300: O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes.
2010-02-15 13:20:50 +0300: Erase complete.
2010-02-15 13:20:50 +0300:
**********
2010-02-21 02:34:57 +0300: Disk U t i l i t y s t a r t e d .
2010-02-21 03:13:13 +0300: Preparing t o erase o p t i c a l media on device : "HL-DT-ST
DVDRW GS23N"
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes.
Erase complete.
2010-02-21 03:13:13 +0300
2010-02-21 03:22:02 +0300
2010-02-21 03:22:02 +0300
2010-02-21 03:22:02 +0300
**********
2010-02-23 17:13:07 +0300: Disk U t i l i t y s t a r t e d .
2010-02-23 17:14:20 +0300: Preparing to erase o p t i c a l media on device
DVDRW GS23N"
O p t i c a l erase option: Quick Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 18 seconds
Erase complete.
HL-DT-ST
2010-02-23 17:14:20 +0300
2010-02-23 17:14:51 +0300
2010-02-23 17:14:51 +0300
-7-
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
37 7
378
37 9
380
381
382
383
384
385
386
387
388
389
390
391
392
393
2010-02-23 17:14:51 +
kk-kkkk-k-k-k-k
2010-02-27 12:20:18 +0300: Disk U t i l i t y s t a r t e d .
k k k r k k k k - k - k - k
2010-02-27 13:19:12 +0300: Disk U t i l i t y s t a r t e d .
2010-02-27 13:19:49 +0300
DVDRW G52 3N"
2010-02-27 13:19:49 +0300
2010-02-27 13:41:16 +0300
2010-02-27 13:41:16 +0300
2010-02-27 13:41:16 +0300
**********
Preparing to erase o p t i c a l media on device 'HL-DT-ST
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes.
Erase complete.
2010-03-02 17:26:23 +0300: Disk U t i l i t y s t a r t e d .
2010-03-02 17
DVDRW GS23N"
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 17
2010-03-02 18
2010-03-02 18
successfully.
**********
26:45 +0300: Preparing to erase o p t i c a l media on device : "HL-DT-ST
26
48
48
48
48
48
48
48
48
48
48
48
48
48
48
48
56
56
56
56
56
00
24
45
05
05
05
51
54
54
54
54
54
54
54
54
54
54
54
19
19
50
50
50
54
32
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
+ 0300
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes.
Erase complete.
Burning Image "systemrescuecd-x86-1.3.5.iso"
Image name: "systemrescuecd-x86-l.3.5.iso"
Burn disc i n : "HL-DT-ST DVDRW GS23N"
Erase disc before burning: No
Leave disc appendable: No
V e r i f y burned data a f t e r burning: Yes
Eject disc a f t e r burning
Preparing data f o r burn
Opening session
Opening t r a c k
W r i t i n g t r a c k
Closing t r a c k
Closing session
F i n i s h i n g burn
V e r i f y i n g burn...
Veri t y i n g
Burn completed s u c c e s s f u l l y
Image "systemrescuecd-x86-1.3.5.iso" burned
2010-03-05 00:33:41 +0300: Disk U t i l i t y s t a r t e d .
2010-03-05 00:34:11 +0300
DVDRW G523N"
2010-03-05 00:34:11 +0300
2010-03-05 00:42:59 +0300
2010-03-05 00:42:59 +0300
2010-03-05 00:42:59 +0300
Preparing to erase o p t i c a l media on device
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n
Erase complete.
'HL-DT-ST
minutes,
*********^
2010-03-09 15:57:47 +0300: Disk U t i l i t y s t a r t e d .
-8-
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
2010-03-09 15:57:58 +OjUO
2010-03-09 15:58:01 +0300
2010-03-09 15:58:01 +0300
2010-03-09 15:58:01 +0300
2010-03-09 15:58:01 +0300
2010-03-09 15:58:01 +0300
2010-03-09 15:58:01 +0300
2010-03-09 15:58:01 +0300
2010-03-09 15:58:01 +0300
2010-03-09 15:58:01 +0300
2010-03-09 15:58:01 +0300
2010-03-09 15:58:01 +0300
2010-03-09 16:05:01 +0300
2010-03-09 16:05:16 +0300
2010-03-09 16:05:44 +0300
2010-03-09 16:05:44 +0300
2010-03-09 16:05:44 +0300
2010-03-09 16:09:37 +0300
2010-03-09 16:10:51 +0300
s u c c e s s f u l l y .
k - k k r k - k k r k k k k
Burning Image "systemrescueca-x86-1.3.5.iso"
Image name: "systemrescuecd-x86-l.3.5.iso'
Burn disc i n : "HL-DT-ST DVDRW GS23N"
Erase disc before burning: No
Leave disc appendable: No
V e r i f y burned data a f t e r burning: Yes
Eject disc a f t e r burning
Preparing data f o r burn
Opening session
Opening t r a c k
W r i t i n g track
Closing t r a c k
Closing session
F i n i s h i n g burn
V e r i f y i n g burn...
V e r i f y i n g
Burn completed s u c c e s s f u l l y
Image "systemrescuecd-x86-l.3.5.iso" burned
2010-03-11 10:33:10 +0300: Disk U t i l i t y s t a r t e d .
k - k k k k k k k k - k
2010-03-14 08:23:02 +0300: Disk U t i l i t y s t a r t e d .
2010-03-14 08:25:54 +0300: Preparing to erase o p t i c a l media on device : "HL-DT-ST
DVDRW GS23N"
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes.
Erase complete.
2010-03-14 08
2010-03-14 08
2010-03-14 08
2010-03-14 08
- j l r * - ^ * * * * * - * - *
25:54 +0300
47:15 +0300
47:15 +0300
47:15 +0300
2010-03-14 12:19:12 +0300: Disk U t i l i t y s t a r t e d .
2010-03-14 12:19:23 +0300: Preparing t o erase o p t i c a l media on device
DVDRW G523N"
2010-03-14 12:19:23 +0300: O p t i c a l erase option: Complete Erase.
2010-03-14 12:29:28 +0300: O p t i c a l erase completed s u c c e s s f u l l y i n 9 minutes.
2010-03-14 12:29:28 +0300: Erase complete.
2010-03-14 12:29:28 +0300:
HL-DT-ST
k k k k k k k k k k
2010-03-22 17:00:57 +0300: Disk U t i l i t y s t a r t e d .
2010-03-22 17:01:10 +0300: Preparing t o erase o p t i c a l media on device : "HL-DT-ST
DVDRW GS23N"
2010-03-22 17:01:10 +0300: O p t i c a l erase o p t i o n : Complete Erase.
2010-03-22 17:22:37 +0300: O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes.
2010-03-22 17:22:37 +0300: Erase complete.
2010-03-22 17:22:37 +0300:
k k k - k k k ' - k k r k k
2010-03-24 15:32:05 +0300: Disk U t i l i t y s t a r t e d .
-9-
443
444 2010-03 -24 15 32 46 +0300:
DVDRW GS23N
"
445 2010-03 -24 15 32 46 +0300:
446 2010-03 -24 15 32 48 +0300:
w i t h an e r r o r .
447
448 See the DiscRecording log
informat ion
449 2010-03 -24 15 32 48 +0300:
450 2010-03 -24 15 32 48 +0300:
451
k -k k k k
***
452 2010-03 -28 19 48 21 +0300:
453
454 2010-03 -28 21 14 30 +0300:
DVDRW GS23N
"
455 2010-03 -28 21 14 30 +0300:
456 2010-03 -28 21 35 48 +0300:
457 2010-03 -28 21 35 48 +0300:
458 2010-03 -28 21 35 48 +0300:
459
k - k k r - k k k k k k k
460 2010-03 -30 18 54 59 +0300:
461
462
** ***
463 2010-03 -30 22 54 04 +0300:
464
465 2010-03 -30 22 54 20 +0300:
DVDRW GS23N "
466 2010-03 -30 22 54 20 +0300:
467 2010-03 -30 23 15 43 +0300:
468 2010-03 -30 23 15 43 +0300:
469 2010-03 -30 23 15 43 +0300:
470 2010-03 -31 12 14 43 +0300:
DVDRW G223N"
471 2010-03 -31 12 14 43 +0300:
472 2010-03 -31 12 23 33 +0300:
473 2010-03 -31 12 23 33 +0300:
474 2010-03 -31 12 23 33 +0300:
475 2010-03 -31 17 40 37 +0300:
DVDRW G223N "
476 2010-03 -31 17 40 37 +0300:
477 2010-03 -31 17 49 20 +0300:
478 2010-03 -31 17 49 20 +0300:
479 2010-03 -31 17 49 20 +0300:
480
-k-k-kkk-kk-kkk
481 2010-04 -01 19 27 29 +0300:
482
483 2010-04 -01 19 27 39 +0300:
DVDRW G223N "
484 2010-04 -01 19 27 39 +0300:
485 2010-04 -01 19 28 14 +0300:
486 2010-04 -01 19 28 14 +0300:
487 2010-04 -01 19 28 14 +0300:
'HL-DT-ST
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes.
Erase complete.
Preparing to erase o p t i c a l media on device : "HL-DT-ST
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes.
Erase complete.
Preparing to erase o p t i c a l media on device : "HL-DT-ST
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes.
Erase complete.
Preparing to erase o p t i c a l media on device : "HL-DT-ST
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes.
Erase complete.
Disk U t i l i t y s t a r t e d .
'HL-DT-ST
O p t i c a l erase option: Quick Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 18 seconds,
Erase complete.
-10-
488
489
4 90
491
4 92
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
**********
2010-04-01 23:04:29 +OJOO: Disk U t i l i t y s t a r t e d .
2010-04-01 23:08:53 +0300: Preparing to erase o p t i c a l media on device : "HL-DT-ST
DVDRW GS23N"
2010-04-01 23:08:53 +0300
2010-04-01 23:17:40 +0300
2010-04-01 23:17:40 +0300
2010-04-01 23:17:40 +0300
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes.
Erase complete.
k k k k k k k k k - k
2010-04-07 09:32:49 +0300: Disk U t i l i t y s t a r t e d .
2010-04-07 09:33:11 +0300: Preparing to erase o p t i c a l media on device : "HL-DT-ST
DVDRW GS2 3N"
2010-04-07 09:33:11 +0300
2010-04-07 09:33:50 +0300
2010-04-07 09:33:50 +0300
2010-04-07 09:33:50 +0300
O p t i c a l erase option: Quick Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 18 seconds.
Erase complete.
*********
2010-04-08 14:18:05 +0300: Disk U t i l i t y s t a r t e d .
2010-04-08 14:18:26 +0300: Preparing to erase o p t i c a l media on device : "HL-DT-ST
DVDRW GS23N"
2010-04-08 14:18:26 +0300
2010-04-08 14:19:03 +0300
2010-04-08 14:19:03 +0300
2010-04-08 14:19:03 +0300
O p t i c a l erase option: Quick Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 18 seconds.
Erase complete.
**********
2010-04-09 14:32:52 +0300: Disk U t i l i t y s t a r t e d .
**********
2010-04-10 12:18:12 +0300: Disk U t i l i t y s t a r t e d .
2010-04-10 12:18:29 +0300: Preparing to erase o p t i c a l media on device : "HL-DT-ST
DVDRW GS23N"
2010-04-10 12:18:29 +0300
2010-04-10 12:19:06 +0300
2010-04-10 12:19:06 +0300
2010-04-10 12:19:06 +0300
O p t i c a l erase option: Quick Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 18 seconds.
Erase complete.
**********
2010-04-11 09:16:33 +0300: Disk U t i l i t y s t a r t e d .
2010-04-11 09:16:47 +0300: Preparing t o erase o p t i c a l media on device
DVDRW GS23N"
2010-04-11 09:16:47 +0300
2010-04-11 09:17:28 +0300
2010-04-11 09:17:28 +0300
2010-04-11 09:17:28 +0300
'HL-DT-ST
O p t i c a l erase option: Quick Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 18 seconds.
Erase complete.
2010-04-12 17:02:56 +0300: Disk U t i l i t y s t a r t e d .
2010-04-12 17:04:16 +0300: Preparing t o erase o p t i c a l media on device : "HL-DT-ST
DVDRW GS23N"
-11-
535 2010- 04 -12 17 04 16 + 0: O p t i c a l erase option: Quic rase.
536 2010- 04 -12 17 04 52 +OjOO: O p t i c a l erase completed s u c c e s s f u l l y i n 18 seconds.
537 2010- 04 -12 17 04 52 +0300: Erase complete.
538 2010- 04 -12 17 04 52 +0300:
539 ***** **
***
540 2010- 04 -16 22 33 27 +0300: Disk U t i l i t y s t a r t e d .
541
542 2010- 04 -16 22 33 44 +0300: Preparing t o erase o p t i c a l media on device : "HL-DT
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
5 67
568
569
570
571
572
57 3
57 4
575
576
577
578
579
580
581
582
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 16 minutes.
Erase complete.
DVDRW GS23N"
2010-04-16 22:33:44 +0300
2010-04-16 22:50:48 +0300
2010-04-16 22:50:48 +0300
2010-04-16 22:50:48 +0300
**********
2010-04-22 22:43:54 +0300: Disk U t i l i t y s t a r t e d .
2010-04-22 22:44:15 +0300: Preparing to erase o p t i c a l media on device : "HL-DT-ST
DVDRW G523N"
2010-04-22 22:44:15 +0300
2010-04-22 22:52:59 +0300
2010-04-22 22:52:59 +0300
2010-04-22 22:52:59 +0300
k k k - k - k k * * * *
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes,
Erase complete.
2010-04-23 23:56:10 +0300: Disk U t i l i t y s t a r t e d .
2010-04-23 23:59:23 +0300: Preparing to erase o p t i c a l media on device : "HL-DT-ST
DVDRW G523N"
2010-04-23 23:59:23 +0300
2010-04-24 00:20:51 +0300
2010-04-24 00:20:51 +0300
2010-04-24 00:20:51 +0300
**********
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes.
Erase complete.
2010-04-26 00:07:49 +0300: Disk U t i l i t y s t a r t e d .
2010-04-26 00:08:05 +0300: Preparing to erase o p t i c a l media on device : "HL-DT-ST
DVDRW GS23N"
2010-04-26 00:08:05 +0300
2010-04-26 00:29:21 +0300
2010-04-26 00:29:21 +0300
2010-04-26 00:29:21 +0300
**********
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 20 minutes.
Erase complete.
2010-04-27 23:52:37 +0300: Disk U t i l i t y s t a r t e d .
2010-04-27 23:53:21 +0300: Preparing to erase o p t i c a l media on device : "HL-DT-ST
DVDRW GS23N"
2010-04-27 23:53:21 +0300
2010-04-28 00:02:03 +0300
2010-04-28 00:02:03 +0300
2010-04-28 00:02:03 +0300
**********
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes.
Erase complete.
2010-05-05 05:22:55 +0300: Disk U t i l i t y s t a r t e d .
2010-05-05 05:23:11 +0300: Preparing to erase o p t i c a l media on device : "HL-DT-ST
-12-
583
584
585
586
587
DVDRW G523N"
2010-05-05 05:23:11 +O3OO
2010-05-05 05:31:59 +0300
2010-05-05 05:31:59 +0300
2010-05-05 05:31:59 +0300
O p t i c a l erase option: Complete Erase.
O p t i c a l erase completed s u c c e s s f u l l y i n 8 minutes.
Erase complete.
-1^-
10
11
12
13
1 4
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Mac 05 X I n s t a l l e r a p p l i c a t i o n s t a r t e d
1 d i s p l a y ( s ) found.
Display[1] i s using OpenGL
@(#)PROGRAM:Install
@(#)PROGRAM:Mac OS X I n s t a l l e r
Hardware: MacBookPro5,5 @ 2.53 GHz (x
Running OS B u i l d : Mac OS X 10.6
Env:
Env:
Env:
Env:
Env:
Env:
DYLD_N0_FIX_PREBINDING=1
PATH=/usr/bin:/bin:/usr/sbin:/sbin
PWD=/
SHLVL=1
OS INSTALL=1
Jan 25 06:16:17 l o c a l . . Unknown[78]: Launching the L aage Chooser f o r an OS
I n s t a l l
Jan 25 06:17:49 l o c a l h o s t LCA[79]: Folder Manager i s being asked to create a
f o l d e r (each) while running as u i d 0
Jan 25 06:17:55 l o c a l h o s t LCA[79]: Using keyboard layout 0
Jan 25 06:17:56 l o c a l h o s t LCA[79]: Found primary language h i n t "en"
Jan 25 06:18:04 l o c a l h o s t LCA[79]: Launching the I n s t a l l e r using language code
"English"
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
a c c e l e r a t i o n .
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
PROJECT:Install-572
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
PROJECT:05Installer-255
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
2), 4096 MB RAM
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
(10A432)
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
Jan 25 06:18:04 l o c a l h o s t OSInstaller[154]
_=/System/Instaliation/GDI5/LCA.app/Contents/MacOS/LCA
Jan 25 06:18:04 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] : Using i n s t a l l media product at
/System/Installation/Packages
Jan 25 06:18:04 localhost O S I n s t a l l e r [ 1 5 4 ] : Opening O S I n s t a l l package
'/System/Installation/Packages/OSInstall.mpkg'.
Jan 25 06:18:08 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] : Memory s t a t i s t i c s f o r ' I n s t a l l Mac OS
X' pane:
Jan 25 06:18:08 l o c a l h o s t O S I n s t a l l e r [ 1 5 4 ] : Physical Memory A l l o c a t i o n : 509 MB
wired, 259 MB trapped, 70 MB a c t i v e , 39 MB i n a c t i v e , 3219 MB f r e e , 3328
MB usable, 4096 MB t o t a l
Jan 25 06:18:26 l o c a l host Unknown[80] : 2010-01-25 06:18:26.045 Disk
U t i l i t y [ 1 6 4 : 9 0 3 ] **********
Jan 25 06:18:26 l o c a l h o s t Unknown[80]
U t i l i t y [ 1 6 4 : 9 0 3 ] Disk U t i l i t y s t a r t e d
Jan 25 06:18:26 l o c a l h o s t Unknown[80]
Jan 25 06:18:55 l o c a l h o s t Unknown[80]
U t i l i t y [ 1 6 4 : 9 0 3 ] Eject of "Seagate FreeAgent Media" succeeded
Jan 25 06:20:26 l o c a l h o s t Unknown[80]: 2010-01-25 06:20:26.774 Disk
U t i l i t y [ 1 6 4 : 9 0 3 ] Preparing to zero disk : "Macintosh HD"
Jan 25 06:20:26 l o c a l h o s t Unknown[80]: 2010-01-25 06:20:26.775 Disk
U t i l i t y [ 1 6 4 : 9 0 3 ] Passes : 0
Jan 25 06:37:39 greybox c o n f i g d [ 6 5 ] : subnet r o u t e _ i f _ i n d e x : can't get i n t e r f a c e
name
Jan 25 06:37:50 greybox OSInstaller[154]
Jan 25 06:37:54 greybox 0 S I n s t a l l e r l l 5 4 ]
X' pane:
Jan 25 06:37:54 greybox OSInstaller[154]
2010-01-25 06:18:26.107 Disk
2010-01-25 06:18:55.326 Disk
Allowing machine sleep.
Memory s t a t i s t i c s f o r ' I n s t a l l Mac OS
Physical Memory Allocation: 541 MB ^'^^
PROSECUTION EXHIBITl^foridentifi^OTpn
PAGE OFFERED: PAGE ADMITTED;
PAGE \ OF 1 PAGES
2010-01-25 07:25:28.339 Disk
2010-01-25 07:25:28.375 Disk
wired, 258 MB trapp 85 MB a c t i v e , 58 MB ina /e, 3154 MB f r e e , 3297
MB usable, 4096 MB t o t a l
33 Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.314 Disk
U t i l i t y [ 1 6 4 : 9 0 3 ] Secure Erase completed s u c c e s s f u l l y i n 1 hour, 4 minutes.
34 Jan 25 07:25:28 greybox Unknown[80]:
35 Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.315 Disk
U t i l i t y [ 1 6 4 : 9 0 3 ] Preparing to erase : "Macintosh HD"
36 Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.316 Disk
U t i l i t y [ 1 6 4 : 9 0 3 ] P a r t i t i o n Scheme: GUID P a r t i t i o n Table
37 Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.316 Disk
U t i l i t y [ 1 6 4 : 9 0 3 ] 1 volume w i l l be erased
38 Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.317 Disk
U t i l i t y [ 1 6 4 : 9 0 3 ] Name : "Macintosh HD"
39 Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.319 Disk
U t i l i t y [ 1 6 4 : 9 0 3 ] Size : 215.69 GB
40 Jan 25 07:25:28 greybox Unknown[80]: 2010-01-25 07:25:28.320 Disk
U t i l i t y [ 1 6 4 : 9 0 3 ] Filesystem : Mac OS Extended (Journaled)
41 Jan 25 07:25:28 greybox Unknown[80]:
42 Jan 25 07:25:28 greybox Unknown[80]
U t i l i t y [ 1 6 4 : 9 0 3 ] Unmounting disk
43 Jan 25 07:25:28 greybox Unknown[80]
U t i l i t y [ 1 6 4 : 9 0 3 ] Erasing
44 Jan 25 07:25:32 greybox Unknown[80]: 2010-01-25 07:25:32.349 Disk
U t i l i t y [ 1 6 4 : 9 0 3 ] I n i t i a l i z e d /dev/rdisk0s2 as a 201 GB HFS Plus volume w i t h
24576k j o u r n a l
45 Jan 25 07:25:32 greybox Unknown[80]:
46 Jan 25 07:25:32 greybox Unknown[80]
U t i l i t y [ 1 6 4 : 9 0 3 ] Mounting disk
47 Jan 25 07:25:33 greybox Unknown[80]
U t i l i t y [ 1 6 4 : 9 0 3 ] Erase complete.
48 Jan 25 07:25:33 greybox Unknown[80]
49 Jan 25 07:25:45 greybox O S I n s t a l l e r [ 1 5 4 ] : Allowing machine sleep.
50 Jan 25 07:25:48 greybox Unknown[80]: 2010-01-25 07:25:48.926 Disk
U t i l i t y [ 1 6 4 : 9 0 3 ] NSDocumentController's i n v o c a t i o n of -[NSFileManager
URLForDirectory:inDomain:appropriateForURL:create:error:] returned n i l f o r
NSAutosavedInformationDirectory. Here's the e r r o r :
51 Jan 25 07:25:48 greybox Unknown[80]: Error Domain=N5CocoaErrorDomain Code=642
Userinf0=0x10808f14 0 "You can't save the f i l e "Autosave I n f o r m a t i o n " because the
volume "Mac 05 X I n s t a l l DVD" i s read only." Underlying Error= (Error
Domain=NSP05IXErrorDomain Code=30 "The operation couldn't be completed. Read-only
f i l e system")
52 Jan 25 07:25:48 greybox Unknown[80]:
53 Jan 25 07:25:52 greybox O S I n s t a l l e r [ 1 5 4 ] : Preventing machine sleep.
54 Jan 25 07:25:56 greybox O S I n s t a l l e r [ 1 5 4 ] :
&j6
c/3 U W
o a a
gZ2
2010-01-25 07:25:32.352 Disk
2010-01-25 07:25:33.018 Disk
2010-01-25 07:25:33.019 Disk U t i l i t y [ 1 6 4 : 9 0 3 ]
55 Jan 25 07:25:56 greybox OSInstaller[154]
56 Jan 25 07:25:56 greybox OSInstaller[154]
57 Jan 25 07:25:56 greybox OSInstaller[154]
58 Jan 25 07:25:56 greybox OSInstaller[154]
com.apple.pkg.BaseSystern : 10.6.0.1.1.1249291854
59 Jan 25 07:25:56 greybox O S I n s t a l l e r [ 1 5 4 ] : Essentials.pkg
com.apple.pkg.Essentials : 10.6.0.1.1.1249291854
60 Jan 25 07:25:56 greybox O S I n s t a l l e r [ 1 5 4 ] : BootCamp.pkg :
Choices selected f o r i n s t a l l a t i o n :
I n s t a l l : "Mac 05 X"
I n s t a l l : "Essential System Software"
BaseSystem.pkg :
1' /Volumes/1002150621, 17BE2-FDDC-102D-60B34786952A5i 12 JUL 07 CZ ENGAGEMENT
ZONE 30 GC Anyone.avi
2 /Volumes/100215_0 621/B98178E2-FDDC-102D-60834 78 6952A5C90/B98178E2-FDDC-102D-60B34 7 8
6952A5C90.zip
3 /Volumes/100215_0621/69817BE2-FDDO-102D-60634786952A5C90/12_0950D_JUL_07_SAF_ATTK_O
N_l-8_CAV_IN_NEW_8AGHDAD.ppt
4 /Volumes/100215_062l/il/wl/c3.txt
5 /Volumes/100215_0621/il/wl/IIR 5 391 0014 08 C l a s s i f i e d Documents on Wikileaks.pdf
6 /Volumes/100215_0621/il/09REYKJAVIK228.txt
7 /Volumes/100215_0621/il/10REYKJAVIKl3.txt
8 /Volumes/I00215_062l/il/10REYKJAVIK3.txt
9 /Volumes/100215_0621/11/10REYKJAVIK4.txt
10 /Volumes/I00215_0621/il/10REYKJAVIK9.txt
11 /Volumes/100215_0621/il/persons/Jonsson.pdf
12 /Volumes/I00215_0621/11/persons/Sigurdardottir.pdf
13 /Volumes/I00215_0621/il/persons/Skarphedinsson.pdf
14 /Volumes/10022l_0141/7b31f6a.zip
15 /Volumes/I00224 0301/
16 /Volumes/100302_0316/d5463a29.zip
17 /Volumes/100304_2258/photos/SDC10153.JP
18 /Volumes/100304_2258/201002270900382MB4 64 20868 9
19 /Volumes/100304_2258/20100304-propaganda_translation
2 0 /Volumes/I00304_2258/2 0100227-0900_arrest.pptx
21 /Volumes/I00304_2258/20100304-propagandanotes.
22 /Volumes/100304_2258/photos/SDClOl51.JPG
23 /Volumes/100304_2258/photos/SDClOl52.JPG
2 4 /Volumes/100304_2258/photos/SDC10150.JPG
25 /Volumes/I00304_2258/photos/SOCIO153.JPG
2 6 /Volumes/100304_2258/photos/5DC10154.JPG
2 7 /Volumes/100304_2258/photos/SDC10149.JPG
28 /Volumes/100304_2258/photOS/SDClOl56.JPG
2 9 /Volumes/100304^2258/photOS/SDClOl55.JPG
30 /Volumes/1003042258/photos/SDC10148.JPG
31 /Volumes/100308_014 2/7 4b39ef6.zip
32 /Volumes/100308_0925/
33 /Volumes/1003ll_0856/success.zip
34 /Volumes/100322_1255/blah.zip
35 /Volumes/100324_1156/6e34 680e.zip
36 /Volumes/100328_1723/05000.zip
37 /Volumes/100330_1737/
38 /Volumes/1003301852/
39 /Volumes/1003311015/
40 /Volumes/100331_1542/export.csv
41 /Volumes/100331 1 5 4 2 / s p l i t . zip
42 /Volumes/100401_1754/
43 /Volumes/100401__1948/105000. zip
4 4 /Volumes/100405_1225/dirfile . zip
45 /Volumes/100407_1250/split_2.zip
4 6 /Volumes/I00407_1250/split.zip
47 /Volumes/1004081833/
48 /Volumes/1004101330/
49 /Volumes/1004110918/farah.zip
50 /Volumes/100411 0 9 1 8 / s p l i t . z i p
PROSECUTION EXHIBIT ]Xlfor \
PAGE OFFERED: PAGE ADM'
PAGE ^ OF 1 PAGES
51 /Volumes/100412_1907/ r a i l . z i p
52 /Volumes/-,100412 172 6
53 /Volumes/100419_1656/20100419-receipt_request.pdf
54 /Volumes/1004231851/12 JUL 07 CZ ENGAGEMENT ZONE 30 GC.avi
55 /Volumes/100427_2030/12 JUL 07 CZ ENGAGEMENT ZONE 30 GC Anyone.wmv
56 /Volumes/100427_2030/cia_blah.txt
57 /Volumes/100504_1845/files.zip
58
CD
' I
3
CTQ QJ
3
3
3 '
era
n
^
o
n
c
3
m
3
^
NJ
O
QJ
3
Q .
^
NJ
O
Ln
eo
3
cm
01
a.
(0
<
3
01
3
3
3 '
era
-<
SS
NJ
o
CD
O
n
c
3
m
3
o
o
g
3_
o
01
o.
o
o
ro
Z . QJ
QJ ^
ro
-<
cr <
n
^
o
m
S
n
^
Nl ;?> 3
o era
SS
N) 3 1
i
00
cn
SS
NJ
o
>
^
l \ J
g s
as %
.sl
I I
O Nl
- o
T3 Ln
-a (0
3" 5
3
OQ
01
^
fD
<
3
01
3
3 ^
3 '
era
-<
SS
Nl
o
o
o
n
c
3
n
3
o
o
g
3 _
o
01
a.
QT
CL
3
3 '
I
3
01
m
o.
fD
. QJ
^ fD
=c <
CT- <
3
01
3
3
3 '
era o
3
SS 31
NJ fU
H ^
R ri
^ 3
o
n
c
3
fD
3
in
SS
NJ
o
QJ
3
13.
SS
NJ
o
on
fD
3
era
01
^
fD
<
3
01
3
3
3 '
era
^
-<
SS
Nl
O
CD
O
n
c
3
fD
3
o
O
S
3 _
o
01
a.
oT
Q .
3
3 '
fD
2 . QJ
^ fD
03 <
CT- <
fD
Q .
11
Nl 3
o era
57 %
CT- 3 1
dr -
CS- ^
2
CD
O
n
c
3
fD
3
tn
^
N l
O
QJ
3
Q .
^
NJ
O
Ln
fD
3
era
01
Q.
fD
-<
01
3
3
3 '
era
-<
SS
NJ
O
o
o
n
c
3
fD
3
CD
O
g
3 _
o
OJ
Q .
QT
Q .
3.
3 '
I
3
QJ
III
% 3
SS
S i.
ii
o 3
03 fD
^
|\o - <
S 12
CD
O
n
c
3
n>
3
^
Nl
o
QJ
3
Q .
^
NJ
O
Ln
fD
3
era
01
^
m
<
3
01
3
3
3 '
era
<
^
Nl
o
CD
O
n
c
3
fD
3
CD
O
S
3 _
O
QJ
Q .
I
n
SS
Nl
O
CT <
Qj W'
a. ct
QJ
3
3
3 '
era
f
n
^
o
n
c
3
fD
3
^
N l
O
OJ
3
Q .
^
N l
O
C/1
fD
3
era
QJ
Q .
fD
<
3
QJ
3
3 ^
3 '
era
<
^
Nl
o
CD
O
n
c 3 fD 3
o
o
g
3 _
o
01
13.
3
<
fD
era
QJ
sr ?
O" 01
(D_ O-
fD
Q. <
s i
3
3
3 '
era
D
n
^
o
n
c
fD
3
X
NJ
O
01
3
Q .
SS
Nl
o
cn
fD
3
era
OJ
o.
fD
<
01
3
3
3 '
era
-<
^
Nl
O
o
o
n
c
3
fD
3
o
o
g
3 _
o
OJ
Q .
3
Q .
fD
Nl
O
g 3 o- <
II tn
S.J tn
CT "CT
i |
i l
S '5
i , . OJ ! 2 .
c S OJ Q-
fD
-<
3
01
3
3
3 "
era
II
SS
NJ
S ^.
SS f?
M l / l
11
8^
Nl 3
S s
L n r f
s I
i s
0 0 w
03 ^
S D.
- n QJ
S
O QJ
l i
>
^
Nl
n
fD
3
n
O
era
QJ
3
fD
era
OJ
o
^
-o
fD
n
era
01
o
3
SP 2L
K 5
- h QJ
3
$ >
n
fD
3
n
O
I I
Q . 01
fD ^
if
2 >
< =
fD
m
U l
M
cn
ci
2
H
+
L U
CT < II
n
l->
fD
QJ
L n
00
U l
O
SS
NJ 3
O 5
0 0 OQ
OJ
O
^ ^
NJ T3
CD <
f ^
N l
N l
^
NJ
CD
CT _
n - 1
(j U ( D.
n
p'
h
fD
3
OJ
Q .
fD
<
3
OJ
3
D
g
g
3
o
LD
SS
NJ
O
M
CT
01
LU
OJ
U l
NJ
LU
cn
NJ
LD
OJ
fD .
CS. - o
era
QJ
3
o
3
tn
a
fD
n
QJ
^
OJ
<
O
c
fD
fD
a.
" O
X
- u
fD
<
3
QJ
3
3_
3 '
OQ
f
g
g
g
3
o
3
Q
f D'
h
fD
3
n
O
3
Nl
o
o
U l
f>
1-^
O l
O
+
LO
NJ
O
o
L n
LO
LU
o
m
+
LU
3 - $
QJ M
Q .
fD
Q .
era
QJ
3
o
3
1%*
T3
fD
O
Oj '
QJ
=R
n
fD
3
m
O
3
fD
OQ
01
o
3
fD
Q .
fD
13.
01
^
fD
<
3
OJ
3
3
3 '
OQ
f
3
o
3
Q
f D'
n
fD
3
n
O
3
era
OJ
3
o
^
CT
fD
n
QJ'
01
^
a.
fD
OJ
c
a
X
01
^
fD
<
3
01
3
3
3 '
OQ
f
g
g
g
3
o
3
01
<
n'
O
3
n '
O
N l
LU
Nl
O
L n
0 0
'ci
+
LU
O CT <
' o 3 ts]
g f l
o' 3
era OJ
3
3
3 '
OQ
f
n
^
o
n
c
3
fD
3
i n
SS
NJ
o
01
3
Q .
SS
N l
O
1/1
CD
3
era
QJ
Q .
fD
<
3
01
3
OQ
-<
^
NJ
O
o
o
n
c
3
fD
3
CD
O
g
3 _
o
01
CL
o
o
p CT <
'o 3 E
f I
s E
3
3
0 0
f
n
^
o
n
c
3
fD
3
S
NJ
O
01
3
Q .
*
Nl
O
Ln
fD
3
00
OJ
^
fD
<
3
01
3
3
3 '
0 0
<
SS
N l
o
o
o
n
c
3 fD 3
o
o
g
3 _
o
01
a.
o
o
Cl
O or <
O OJ ! 2 .
11
S' 3
era QJ
3
3
00
f
n
^
o
n
c
3
fD
3
^
N l
O
QJ
3
13.
SR
N l
O
L n
fD
3
OQ
01
a.
fD
<
3
01
3
3
3 '
22,
^
<
^
NJ
o
CD
O
n
c
3
fD
3
CD
O
g
3 _
o
OJ
Q .
"CT
3 -
c
I D
CT- <
l / l ' U n a
NJ (D
QJ _
9= f?
<
3
QJ
3
3
3 '
OQ
%
CD
O
n
c
3
fD
3
^
N l
O
OJ
3
Q .
SS
Nl
o
L n
fD
3
0 0
01
^
fD
<
3
QJ
3
3
3 '
OQ
<
*
NJ
O
CD
O
n
c
3 fD 3
CD
O
g
3 _
o
QJ
a.
o
o
g
K# K
^ 1
3
3
0 0
f
n
^
o
n
c
3
fD
3
%
NJ
O
QJ
3
Q .
^
Nl
O
i j n
fD
3
OQ
QJ
CL
fD
<
3
QJ
3
3
3
OQ
^
-<
SS
Nl
o
o
o
f l
c
3
fD
3
CD
O
g
3 _
o
OJ
a.
u
o
Ln
00
+
LU
O CT <
11
%' 3
era QJ
3
3
0 0
(
n
^
o
n
c
3
as
3
^
N l
O
QJ
3
13.
^
N l
O
L n
fD
3
0 0
01
a.
fD
<
OJ
3
3 ^
3 '
00
<
^
Nl
O
a
o
n
c
3
fD
3
o
o
g
3_
o
01
Q .
o
o
p CT <
' o QJ
K
^ i
3 3
OQ
f
o
o
n
c
3
fD
3
S
NJ
O
01
3
Q .
^
NJ
O
l / l
fD
3
0 0
01
^
fD
<
3
01
3
3
3 '
OQ
<
SS
NJ
o
CD
O
n
c
3
fD
3
CD
O
g
3 _
o
01
13.
CT
3 "
o
P CT <
I ;i Ui-
as
13.
3
01
3
3
3 '
0 0
%
n
o
o
n
c
3
fD
3
SS
Nl
o
01
3
Q .
SS
Nl
o
L n
fD
3
00
QJ
Q .
fD
-<
3
01
3
3
3 '
0 0
<
SS
NJ
O
o
o
n
c
fD
3
o
o
g
3 _
o
01
Q .
o
o
c
O CT <
i_ ;n
S ^
3
01
3
3
3 "
0 0
f
n
^
o
n
c
3
fD
3
^
NJ
O
01
3
Q .
SS
Nl
O
L n
fD
3
00
OJ
Q .
fD
-<
3
OJ
3
3
3 '
0 0
<
SS
NJ
o
CD
O
n
c
3
fD
3
CD
O
g
3 _
o
QJ
Q .
^
ZT
o
o
Ul
1 ^
S
3
01
3
3
3 '
OQ
f
n
^
o
n
c
fD
3
^
NJ
O
01
3
Q .
SS
Nl
o
L n
fD
3
00
01
^
fD
-<
3
01
3
3
3 '
0 0
<
SS
Nl
o
o
o
n
c
3
fD
3
CD
O
g
3 _
o
OJ
Q .
O
O
m
P CT <
i _ ;n
Id ^
fD
a.
3
01
3
3
3 '
00
f
n
D
o
n
c
3
fD
3
1/1
SS
NJ
o
QJ
3
Q .
^
Nl
o
c/1
fD
3
OQ
01
Q .
fD
-<
3
01
3
3_
3 "
0 0
-<
^
NJ
O
CD
O
n
c
3
fD
3
CD
O
g
3 _
o
QJ
Q .
O
O
LU
NJ
O
O
cn
b
LU
Ln
U l
'ci
+
LU
P CT- <
'o 3 0:
gf I
s i
3
3
3 '
00
f
n
o
o
n
c
3
fD
3
SS
Nl
o
01
3
a.
SS
NJ
O
l / l
fD
3
OQ
01
^
fD
<
3
QJ
3
3_
3 '
0 0
<
*
Nl
O
O
O
n
c
3
fD
3
CD
O
g
3 _
o
01
CL
O
o
1 ^ ^
o
o
N l <
^ i
3
3
3 '
00
f
n
o
o
n
c
3
fD
3
&
N l
O
01
3
Q .
SS
NJ
O
on
fD
3
OQ
OJ
^
fD
-<
QJ
3
3_
3 '
85.
2
<
^
N l
O
O
O
n
c
3
fD
3
13
O
g
3 _
o
01
Q.
^
3 -
o
p CT <
o 3 ic!
gf I
^ ' 3
era QJ
3
3
3
0 0
f
n
^
o
n
c
3
fD
3
&
NJ
O
OJ
3
Q-
ss
NJ
O
l / l
fD
3
OQ
OJ
^
fD
<
3
01
3
3 ^
3 '
0 0
<
SS
NJ
o
o
o
n
sz
3
fD
3
o
o
g
3 _
o
01
Q .
O
O
1 ?
o
o
^ i
3
3
3
0 0
f
n
o
o
n
c
3
fD
3
&
NJ
O
OJ
3
CL
SR
N l
O
L n
fD
3
00
OJ
^
fD
-<
3
OJ
3
3
3 '
era
<
^
Nl
o
o
o
n
c 3 fD 3
o
o
g
3 _
o
QJ
O .
o
o
O CT-
OJ
CS.
% ^
%' 3
0 0 QJ
3
3
3 '
OQ
f
n
^
o
n
c
3
fD
3
^
NJ
O
OJ
3
13.
^
NJ
O
L n
fD
3
era
QJ
CL
fD
-<
3
OJ
3
3
3 '
00
-c
^
NJ
o
CD
O
n
c
3
fD
3
o
o
g
3 _
o
OJ
a.
o
o
P CT <
'o s 0:
s f l
%' 3
era OJ
3
3
3 '
OQ
%
CD
O
n
c
3
fD
3
^
Nl
o
01
3
CL
SS
Nl
o
on
fD
3
00
QJ
^
fD
<
3
QJ
3
3 ^
3 '
OQ
<
^
NJ
O
o
o
n
c
3
fD
3
D
O
g
3 _
o
01
O .
o
o
O C3- <
11
^ i
3
3
3
OQ
f
n
^
o
n
c
3
fD
3
%
Nl
o
01
3
Q .
SS
Nl
O
L n
fD
3
0 0
01
Q.
fD
<
3
QJ
3
3
3 '
OQ
<
^
NJ
O
CD
O
n
c
3
fD
3
o
o
g
3 _
o
QJ
Q .
i n
o
3 -
o
O CT <
K
M i
3
3
3 '
0 0
f
n
^
o
n
c
fD
3
S
NJ
o
01
3
Q .
SS
NJ
o
L n
fD
3
OQ
01
Q.
fD
<
3
01
3
3
3 '
00
<
SS
N l
O
CD
O
n
c
3
fD
3
o
o
g
3 _
o
OJ
CL
o
o
p CT <
' o 3 i i i
K
s ^
3
3 3
0 0
f
n
^
o
n
c
3
fD
3
%
Nl
O
01
3
Q.
^
ISJ
O
L n
fD
3
OQ
QJ
^
fD
<
3
OJ
3
3
3 '
OQ
<
^
N l
O
CD
O
n
c 3 fD 3
o
o
g
3 _
o
OJ
o.
a
3 -
o
O CT <
O J -
&
S' 3
era QJ
3
3
3 '
OQ
f
n
^
o
n
c
fD
3
S
Nl
o
QJ
3
C^
SS
Nl
o
L n
fD
3
00
QJ
^
fD
<
3
01
3
3
3 '
0 0
<
^
NJ
o
o
o
n
c
3
fD
3
CD
O
g
3 _
o
QJ
Q .
l /l
o
o
p CT- <
' o 3
%' 3
era OJ
3
3
3
0 0
f
n
o
o
n
c
3
fD
3
^
NJ
O
01
3
13.
SS
NJ
o
L n
fD
3
00
01
^
fD
-<
3
01
3
3
3 '
era
<
SS
NJ
o
CD
o
n
c
3 fD 3
o
o
g
3 _
o
01
Q .
O
o
Ln
Nl
O
O
CTl
C3
LD
N l
m
+
LU
1 ?
8 ^
%
=5' 3
era OJ
3
3
3 '
00
f
n
^
o
n
c
3
fD
3
i n
SS
Nl
o
01
3
CL
SS
Nl
o
L n
fD
3
0 0
OJ
^
fD
-<
3
01
3
3
3 '
0 0
-<
^
Nl
o
o
o
n
c
3
fD
3
o
o
g
3 _
o
01
a.
o
o
O CT <
o 3 5c!
11
%' 3
era 01
3
00
f
n
^
o
n
c
3
fD
3
i n
SR
NJ
O
01
3
3.
^
NJ
O
l / l
fD
3
OQ
01
OL.
fD
<
3
01
3
3
3 '
OQ
<
SS
NJ
o
CD
O
n
c
3
fD
3
CD
O
g
3 _
o
01
Q .
^
3 "
o
p CT- <
I I I
^ i
3
3 ^
3 '
00
f
n
"o
o
n
c
3
fD
3
SS
NJ
o
QJ
3
a.
^
NJ
O
L n
fD
3
0 0
01
a.
fD
<
3
OJ
3
3
3 '
00
<
SS
NJ
o
CD
O
n
c
3 fD 3
CD
O
g
3 _
o
01
Q .
l /l
T3
3 -
o
p o- <
' o 3 tc!
sf 1
S' 3
era QJ
3 3
0 0
f
n
^
o
n
c
3
fD
3
S
NJ
O
01
3
13.
SS
Nl
o
on
fD
3
0 0
OJ
^
fD
<
QJ
3
3
3 '
OQ
-<
SS
NJ
o
o
o
n
c
3
fD
3
o
o
g
3 _
o
QI
CL
O
O
p CT- <
O 3 !i
i l l
3
3
3
3 '
OQ
f
n
^
o
n
c
3
fD
3
SS
N l
o
01
3
13.
SS
Nl
O
L n
CD
3
00
OJ
Q .
fD
<
3
QJ
3
3
3 '
go^
E
<
SS
N l
O
CD
O
n
c
3
fD
3
o
o
g
3 _
o
QJ
Q .
^
3 -
o
p CT <
' o 3 sc!
i l l
s i
3
3 ^
3 '
0 0
f
rt;
f D"
n
o
o
f l
c
3
fD
3
l /l
^
NJ
o
QJ
3
3 .
^
N l
O
l / l
fD
3
OQ
01
Q.
fD
<
01
3
3 ^
3 '
00
-<
SS
NJ
o
CD
O
f l
c
3
ro
3
o
o
g
3 _
o
QJ
Q .
O
O
p CT <
O QJ !c:
11
^ ' 3
0 0 OJ
3
3
3 '
0 0
f
n
D
o
n
c
3
fD
3
^
NJ
O
01
3
C3.
SS
N l
o
L n
fD
3
OQ
01
^
fD
<
3
01
3
3
3 '
0 0
<
^
Nl
o
o
o
f l
c 3 fD 3
o
o
g
3 _
o
01
Q .
^
3 -
O
O CT <
s 11
O 3 CL
m .
z 3
SR QJ
NJ 3
o 2.
^ era
NJ rg)
3
Q .
3 '
0 0
tn
SR
Nl
o
fD
QJ
CD
O
n
c
3
fD
3
S
NJ
8 |
O vs
s
OS o
NJ 0 0
O fD
C 3
s 3'
fD OfQ
o
^ ?
QJ
^
fD
<
3
01
3
3 ^
3 '
era
<
SS
NJ
o
CD
o
n
c
3 fD 3
o
o
g
3 _
o
QI
13.
SS
NJ
O
P CT <
'o S E
i l l
s i
3 3
0 0
f
n
^
o
f l
c
3
fD
3
^
NJ
O
01
3
Q .
SS
N l
o
cn
fD
3
00
01
^
fD
<
3
01
3
3
3 '
OQ
<
SS
NJ
o
o
o
f l
c
3
fD
3
CD
O
g
3 _
o
QJ
o.
o
o
p CT <
O QJ E
i l l
s i
3 3
0 0
f
n
o
o
f l
c
3
fD
3
^
NJ
O
OJ
3
O.
^
NJ
O
l / l
fD
3
00
OJ
^
fD
<
3
01
3
3 ^
3 '
era
<
SS
NJ
O
CD
O
n
c
3
fD
3
o
o
g
3 _
o
01
Q .
" C*
3 -
O
cn
(3
Nl
O
m
P CT <
'o 3 E
I I I
s i
3
3
3 '
0 0
f
n
^
o
f l
c
3
fD
3
S
NJ
O
01
3
O .
SS
Nl
O
L n
fD
3
00
OJ
Q .
fD
<
3
OJ
3
3
3 '
00
<
SR
NJ
O
CD
O
f l
c
3
fD
3
o
o
g
3_
o
01
Q.
O
O
L n
en
Nl
o
o
o
M
en
Nl
'ci
LU
O
00 CT <
1 2 :
SS CD
ISJ <
? 3
01
> g
aR
5 #
< rt,
NJ i i -
o <z
K ^
^
Nl
o
^
01
-c
aR
NJ
O
o
LO
b
"C
CD
o
f l
c
3
fD
3
S
NJ
O
OJ
3
( 3.
SS
NJ
o
L n
fD
3
0 0
QJ
a.
fD
<
3
QJ
3
3
3 '
00
<
^
NJ
O
O
o
f l
c 3 fD 3
CD
O
g
3_
o
QJ
Q .
01
3 -
as
N l
o
CD
1 ?
8 a
cn fD
LU ~<
i ^
3
3
0 0
%
n
^
o
f l
c
3
CO
3
S
N l
O
01
3
13.
^
Nl
o
l / l
fD
3
00
QJ
^
fD
<
3
01
3
3
3 '
0 0
<
^
NJ
O
o
o
f l
c
3
CD
3
o
o
g
3 _
o
01
Q .
O
O
O o- <
o QJ E.
s i K
%' 3
era OJ
3
3
3 '
00
f
n
o'
o
n
c
3
fD
3
S
NJ
O
QJ
3
Q .
SS
NJ
O
on
fD
3
3 '
0 0
01
^
fD
-<
01
3
3
3 '
00
<
^
Nl
O
o
o
n
c
3
fD
3
CD
O
g
3 _
o
01
Q .
o
3 "
o
p CT- <
'o QJ E.
11
I i
3
3
0 0
f
n
^
o
f l
c
3
fD
3
SS
Nl
o
QJ
3
Q .
^
ISJ
O
L n
CD
3
0 0
OJ
Q .
fD
<
3
OJ
3
3
3 '
00
-<
^
ISJ
O
O
o
f l
c
3
fD
3
o
o
g
3 _
o
OJ
cs.
o
o
o cr <
o QJ E.
8# K
I
3
3
3 '
0 0
f
n
^
o
f l
c
3
fD
3
l /l
SS
NJ
o
QJ
3
CL
^
N l
O
L n
fD
3
0 0
01
a.
fD
<
QJ
3
3
3 '
era
<
^
N l
o
o
o
f l
c 3 fD 3
o
o
g
3 _
o
01
a.
o
o
O
1 ?
8 9.
s ^
%' 3
era OJ
3
3
00
f
n
D
O
f l
c
3
fD
3
t n
^
NJ
O
QJ
3
Q .
SS
NJ
o
L n
fD
3
0 0
01
Q.
fD
-<
3
01
3
3
3 '
OQ
<
as
ISJ
O
CD
O
f l
c 3 fD 3
o
o
g
3 _
o
01
Q.
O
O
O CT <
o QJ E.
%i K
1
3
3
OQ
%
n
o
o
f l
c
3
fD
3
%
NJ
O
QJ
3
Q .
SS
NJ
O
L n
fD
3
00
QJ
^
fD
<
3
01
3
3
3 '
0 0
^
<
SS
NJ
o
CD
O
f l
c
3
fD
3
CD
O
g
3_
o
QJ
CS.
O
o
p CT <
o QJ E.
11
=5' 3
era 01
3
3
3 '
0 0
f
n
^
o
n
c
3
fD
3
%
ISJ
O
01
3
13.
^
Nl
O
on
fD
3
00
QJ
^
fD
<
3
QJ
3
3
3 '
0 0
-<
SS
Nl
O
o
o
f l
c
3
fD
3
CD
O
g
3_
o
01
CL
o
o
p CT- <
'o 3 E
11
S ^
3
3
OQ
f
n
^
o
f l
c
fD
3
SR
NJ
O
QJ
3
a.
SR
Nl
O
L n
tD
3
00
QJ
^
fD
-<
3
QJ
3
3
3 '
00
-<
^
NJ
O
CD
O
f l
c
3
fD
3
o
o
g
3_
o
01
3 .
O
o
cn
o a- <
o QJ E.
K
s E
3
3
3 '
0 0
f
o
o
f l
c
3
fD
3
S
NJ
o
QJ
3
C3.
^
NJ
O
L n
fD
3
00
OJ
^
fD
<
3
QJ
3
3
3 '
00
-<
^
Nl
O
o
o
n
c
3
fD
3
o
o
g
3 _
o
QJ
CL
O
o
1 ^
o
o
L n
0 0
QJ VI
CL
fD
<
3
01
3
3
3 '
0 0
f
n
"o
o
f l
c
3
fD
3
^
NJ
o
01
3
Q .
^
NJ
o
on
fD
3
00
tn
01
Q .
fD
-<
3
01
3
3 ^
3 '
0 0
<
SS
NJ
o
CD
O
f l
c
3
fD
3
o
o
g
3 _
o
01
Q .
O
O
fD
3.
en
_ s j _
Nl
o
o
.F^
O
M
cn
o
f
Cl
+
LU
cn
en
NJ
o
o
o
M
cn
o
o
"m
s
LU
o
O CT" <
O QJ
I l l
S g
3
3
3 '
00
f
n
^
o
n
c
3
fD
3
%
N l
O
01
3
O.
^
N l
O
L n
fD
1 ^.
o
O
vl
LU
%
0 0
3
0 0
QJ
^
fD
<
3
01
3
3
3 '
0 0
<
SS
Nl
O
o
o
f l
c
3
fD
3
CD
O
g
3_
o
OJ
a.
o
o
QJ
Q .
fD
-<
3
01
3
3
3
0 0
f
n
^
o
n
c
3
fD
3
%
NJ
O
01
3
CL
^
ISJ
O
L n
fD
3
OQ
QJ
^
fD
-<
3
OJ
3
3_
3 '
0 0
<
SS
NJ
O
CD
O
f l
c
3
fD
3
o
o
g
3 _
o
01
Q .
^
3 "
o
P CT <
i_ ;i Ul-
o
o
ID
Nl - <
^ ' 3
0 0 01
3
3
00
f
n
^
o
f l
c
3
fD
3
^
NJ
O
QJ
3
CS.
^
NJ
O
on
fD
3
OQ
OJ
^
fD
<
3
OJ
3
3
3 '
0 0
<
SS
ISJ
O
CD
O
f l
c
3
fD
3
o
o
g
3 _
o
QI
a.
a"
3 "
o
P CT <
'o 3 E
i l l
5' 3
era QJ
3
3
00
f
n
o
o
f l
c
3
fD
3
^
N l
O
QJ
3
Q .
SS
ISJ
o
on
fD
3
OQ
01
^
CD
<
3
QJ
3
3
3 '
00
<
SR
NJ
O
CD
O
f l
c
o
o
g
3 _
o
QJ
CL
O
in
P CT <
'o 3 E
11
S i
3
3
00
f
n
^
o
f l
c
fD
3
%
NJ
O
01
3
Q .
SR
NJ
O
on
fD
3
OQ
01
Q .
fD
<
01
3
3
3 '
00
<
SR
Nl
o
CD
O
f l
c
3
fD
3
CD
O
g
3 _
o
QJ
O.
o
3 -
o
cn
p CT <
'o QJ E.
s i K
%' 3
era QJ
3
3
00
f
o
o
n
c
3
fD
3
tn
SS
NJ
o
OJ
3
13.
^
ISJ
O
on
fD
3
00
QJ
^
fD
<
3
01
3
3
3 '
0 0
<
SS
Nl
o
CD
O
f l
c
3
fD
3
CD
O
g
3 _
o
01
Q.
T3
ZT
o
en
p CT <
i l l
% E
3
3
0 0
f
o
o
n
c
3
fD
3
%
ISJ
O
01
3
Q .
SR
Nl
o
L n
fD
3
OQ
01
^
CD
<
3
QJ
3
3 ^
3 '
00
-<
^
ISJ
O
CD
O
f l
c
3
tD
3
CD
O
g
3 _
o
QJ
O .
a
3 -
o
, 0 CT <
'o 3 E
on
LD
ISJ
O
l -
O
O
^
M
o
l->
en
4^
m
+
LU
L n
03
NJ
o
l -
O
O
^
1- ^
o
h-
cn
LU
LU
+
LU
on
- J
Nl
O
o
$^
o
l -
cn
NJ
^
'ci
+
LU
1 ? ^
P CT
O 3=
cn tD
v J <
o
o
3
01
3
00
f
n
o
o
f l
c
3
fD
3
%
Nl
O
01
3
O.
SS
NJ
o
on
fD
3
OQ
01
^
fD
-<
3
01
3
3
3 '
OQ
<
SS
N l
o
D
o
f l
c
3 fD 3
o
o
g
3 _
o
01
Q .
"CT*
3 -
o
o
tn
cn fD
<
3 o
00 OJ
3
3
00
f
n
o
o
f l
c
3
fD
3
^
N l
O
01
3
Q .
^
ISJ
O
L n
fD
3
OQ
QJ
Q .
fD
-<
3
01
3
3
3 '
00
<
^
ISJ O o Q f l c 3 tD 3
CD
O
g
3_
o
OJ
Q .
t n
o
3 "
o
o
o
o
cn
on
S'
00
O CT <
fD
^ A-
3
OJ
3
3
3 '
00
f
CD
O
f l
c
3
tD
3
i n
SR
NJ
O
OJ
3
13.
^
ISJ
O
L n
fD
3
00
OJ
a.
fD
<
3
01
3
3
3 '
00
<
^
NJ
O
o
o
f l
c
3
fD
3
CD
O
g
3 _
o
QI
Q.
O
O
cn
4^
%'
00
QJ t n
9: f?"
fD
<
3
QJ
3
3
3 '
00
f
CD
O
n
c
3
tD
3
^
NJ
o
OJ
3
Q .
SS
N l
O
on
fD
3
00
01
^
tD
<
3
01
3
3
3 '
0 0
<
^
N l
o
o
o
f l
c 3 tD 3
o
o
g
3 _
o
01
CL
o
o
sJ
0 0
Nl
o
o
o
l -
cn
en
N l
00
"5)
+
LU
g
%f &
^ i
3
3 ^
3 '
00
<
n
o
o
f l
c
3
tD
3
SS
NJ
o
QJ
3
Q .
SR
NJ
o
on
fD
3
0 0
OJ
a.
fD
-<
3
QJ
3
3
3 '
00
<
SS
NJ
o
CD
o
f l
c
3
tD
3
o
o
g
3_
o
QJ
13.
O
o
cn
' I
s ^
S' 3
era QJ
3
3 ^
3 '
00
f
n
"o
o
f l
c
3
fD
3
SS
N l
o
cu
3
3 .
SR
N l
O
on
tD
3
0 0
OJ
a.
fD
-<
3
OJ
3
3
3
0 0
<
SS
ISJ
o
CD
O
f l
c
3 fD 3
o
o
g
3 _
o
QJ
CL
O
o
1? ^
2 ^
%' 3
era QJ
3
OQ
f
n
^
o
f l
c
3
fD
3
^
ISJ
O
QJ
3
a.
SS
N l
O
L n
tD
3
0 0
QJ
Q .
tD
<
3
01
3
3 ^
3 '
00
<
^
ISJ
O
CD
O
n
c
3
fD
3
o
o
g
3 _
o
QJ
O.
o
o
p cr <
'o 3 E.
s i K
S' 3
3
0 0
f
n
o
o
f l
c
3
fD
3
^
NJ
O
OJ
3
a.
SS
Nl
o
L n
fD
3
OQ
01
a.
fD
<
QJ
3
3
3 '
0 0
-<
SS
NJ
o
CD
o
f l
c
3
fD
3
CD
O
g
3_
o
OJ
Q .
O
O
O C3- <
I f l
S' 3
era OJ
3
3
0 0
f
n
"a
o
f l
c
3
tD
3
^
N l
O
01
3
Q .
^
NJ
o
Ln
tD
3
0 0
OJ
^
fD
<
3
QJ
3
3
3 '
OQ
<
SS
NJ
o
o
o
f l
c
3 fD 3
o
o
g
3 _
o
QJ
CL
O
O
p CT <
'o 3 E.
i K
%' 3
0 0 QJ
3
3_
3 '
0 0
f
n
^
o
f l
c
3
fD
3
S
NJ
O
01
3
CL
SS
NJ
o
l / l
fD
3
OQ
01
^
fD
<
QJ
3
3 ^
3 '
00
<
SR
Nl
o
D
O
f l
c
3 fD 3
o
o
g
3 _
o
QJ
a.
o
o
P CT <
'o 3 E
11
S' 3
era OJ
3
3
00
1
f D"
CD
O
f l
c
3
fD
3
i n
SR
NJ
o
OJ
3
3 .
SS
Nl
o
L n
tD
3
00
QJ
a.
fD
-<
3
OJ
3
3
3 '
OQ
<
^
Nl
O o o f l c 3 fD 3
CD
O
g
3_
o
QJ
Q .
O
O
cn
P CT <
'o 3 E
11
^' i
3
3
0 0
f
CD
O
f l
c
3
fD
3
S
Nl
o
01
3
Q .
SS
NJ
O
L n
fD
3
00
QJ
^
fD
-<
3
QJ
3
3
3 "
0 0
<
SS
Nl
o
CD
O
f l
c
3
fD
3
CD
O
g
3 _
o
01
Q .
O
O
1 ^ ^
o
o
0 0
%
0 0
QJ
^
tD
<
3
OJ
3
3
3 '
0 0
f
n
^
o
f l
c
3
fD
3
^
NJ
O
QJ
3
e3.
SS
NJ
O
l / l
fD
3
00
01
^
fD
-<
3
QJ
3
3 ^
3 '
00
<
SS
NJ
o
CD
O
f l
c
3 fD 3
o
o
g
3_
o
QJ
Q .
o
o
1 ^
8
fD
cn <
S i
3
3
00
f
n
"o
o
f l
c
tD
3
^
ISJ
O
QJ
3
3 .
^
ISJ
O
L n
fD
3
0 0
QJ
Q .
tD
<
01
3
3
3 '
0 0
<
SS
NJ
o
CD
O
f l
c
3 fD 3
CD
O
g
3 _
o
QJ
Q .
_cn^
o
3 "
o
cn
00
NJ
o
o
o
i -
en
4^
M
~ J
'ci
+
LU
O CT <
3
00
01 w
l g
QJ
3
3 ^
3'
OQ
%
n
o
o
f l
c
3
fD
3
^
ISJ
O
OJ
3
Q .
SS
ISJ
O
L n
fD
3
OQ
01
Q.
tD
<
3
01
3
3
3 '
00
<
SS
N l
o
CD
O
f l
c
3 fD 3
CD
O
g
3 _
o
QJ
a.
o
o
00
I D
NJ
O
o
f
o
M
t n
M
0 0
Ln
O
'ci
+
00
p CT <
i l l
=5' 3
era QJ
3
0 0
f
n
o
o
f l
c
3
tD
3
^
NJ
O
QJ
3
OL
SS
NJ
o
l / l
fD
3
0 0
QJ
^
tD
<
3
QJ
3
3
3 '
OQ
<
as
Nl
O
CD
O
f l
c
tD
3
CD
O
g
3_
o
01
a.
o
o
p cr <
I - ; i w
_ OJ
^iK
on
QJ
3
3 ^
3 '
0 0
f
n
"o
o
n
c
3
fD
3
^
N l
O
OJ
3
O .
^
ISJ
O
L n
fD
3
0 0
QJ
^
tD
<
3
QJ
3
3
3 '
OQ
-<
SS
NJ
o
CD
O
n
c
3
fD
3
CD
O
g
3_
o
01
3 .
o
o
l / l
' o 3 _.
i p.
% :
3
0 0
f
n
^
o
f l
c
3
fD
3
^
NJ
O
QJ
3
a.
SS
NJ
o
L n
fD
3
0 0
QJ
Q .
fD
-<
3
01
3
3
3 '
0 0
<
SS
Nl
o
o
o
f l
c
3
fD
3
o
o
g
3 _
o
01
Q .
^
ZT
o
O CT <
o 3 id!
%t%
^' 3
0 0 01
3
3
3 '
00
f
n
^
o
f l
c
3
tD
3
^
N l
O
01
3
Q .
SR
NJ
o
L n
fD
3
OQ
01
a.
tD
<
3
OJ
3
3
3 '
era
<
^
Nl
O
o
o
f l
c 3 fD 3
o
o
g
3 _
o
QJ
3 .
o
o
p CT <
o 3 E.
11
S' 3
era QJ
3
3
3 '
00
f
n
^
o
f l
c
3
fD
3
%
N l
O
01
3
Q .
as
N l
O
L n
tD
3
00
01
a.
fD
<
3
OJ
3
3 ^
3
00
<
SS
Nl
o
CD
O
f l
c
3
tD
3
o
o
g
3 _
o
QJ
a.
o
o
, o CT- <
'o 3 E
gi K
' 3
era OJ
3
3
0 0
f
n
"o
o
f l
c
3
tD
3
i n
SS
NJ
o
OJ
3
Q .
^
N l
O
l / l
tD
3
00
QJ
^
fD
-<
3
01
3
3
3 '
0 0
^
<
SS
Nl
O
o
o
f l
c
3
fD
3
CD
O
g
3 _
O
01
CL
a
ZT
o
o
M
cn
M
00
b
o
m
o cr <
o QJ SO.
11
I' i
3
3
3 '
0 0
f
n
^
o
f l
c
3
fD
3
^
NJ
O
QJ
3
a.
SS
ISJ
O
o n
fD
3
0 0
OJ
Q .
tD
<
QJ
3
3
3 '
0 0
<
^
Nl
O
CD
O
f l
c
3 tD 3
o
o
g
3 _
o
OJ
Q .
t n
3
3 -
O
p CT <
o 3 E.
i l l
%' 3
era QJ
3
3
OO
f
n
o
o
f l
c
3
fD
3
^
NJ
O
OJ
3
CL
SS
NJ
o
L n
fD
3
0 0
01
^
tD
-<
3
OJ
3
3
3 '
00
-<
as
N l
O
D
O
f l
c
3
fD
3
CD
O
g
3_
o
OJ
CL
O
o
0 0
cn
1 ^
8 3=
g
%' 3
era QJ
3
3
3 '
0 0
f
n
o
o
f l
c
3
fD
3
^
ISJ
O
QJ
3
Q .
SS
ISJ
o
on
fD
3
0 0
01
^
tD
-<
OJ
3
3
3 '
00
<
SS
Nl
o
o
o
f l
c 3 tD 3
CD
O
g
3 _
o
01
CL
o
o
0 CT <
'o 3 E.
i
1 i
3
3
0 0
f
o
o
f l
c
3
tD
3
^
ISJ
O
01
3
Q .
as
Nl
o
l / l
fD
3
OQ
OJ
^
fD
-<
3
01
3
3
3 '
0 0
<
SS
NJ
O
CD
O
n
c
3
tD
3
o
o
g
3_
o
QJ
Q.
O
O
O CT <
O 3
g i K
s i
3
3
OQ
f
CD
O
f l
c
3
fD
3
^
NJ
O
QJ
3
CL
SS
ISJ
o
L n
fD
3
0 0
01
Q .
fD
-<
QJ
3
3
3 '
OQ
<
SS
Nl
o
CD
o
f l
c
3
fD
3
CD
O
g
3 _
o
OJ
3.
" 3
3 -
o
o
o
NJ
O
O
f&
o
M
cn
on
I D
'ci
2
H
+
LO
, o cr <
o
Ln
T3
0 0
QJ
a.
ns
<
3
QJ
3
3
3 '
0 0
f
o
o
f l
c
3
fD
3
i n
SR
NJ
O
QJ
3
O .
SS
Nl
8
fD
3
0 0
OJ
^
m
<
3
01
3
3_
3 '
00
<
SS
NJ
o
CD
o
f l
c
3
fD
3
o
o
g
3 _
o
01
a.
o
o
to
a .
o CT- <
2 I
q fD
<
s E
3
3
3 '
0 0
f
n
"o
o
f l
c
3
fD
3
l /l
SR
NJ
O
QJ
3
3 .
^
ISJ
O
L n
fD
fD
3 .
3
0 0
QJ
Q .
fD
<
3
QJ
3
3_
3 '
0 0
<
^
Nl
O
a
o
f t
c 3 fD 3
CD
O
g
3 _
o
01
Q .
O
O
' i l
O fD
- > <
3
era 01
3
3
3 *
0 0
f
n
^
o
f l
c
3
fD
3
i n
SS
NJ
o
QJ
3
3 .
SR
NJ
O
on
fD
3
0 0
QJ
Q .
fD
-<
3
01
3
3
3 "
00
<
SS
NJ
o
o
o
f l
c 3 fD 3
CD
O
g
3 _
o
OJ
CL
O
o
fD
a.
O CT <
QJ
Q .
fD
<
QJ
3
3 ^
3 '
00
f
n
^
o
f l
c
3
fD
3
i n
^
NJ
O
01
3
Q .
SS
ISJ
o
l / l
fD
3
era
CT^
01
Q .
fD
-<
3
01
3
3
3 '
00
<
SR
NJ
o
o
o
f l
c
3
fD
3
CD
O
g
3_
o
QJ
Q .
O
O
O CT <
' o 3 i^:
11
5' 3
ra OJ
3
OQ
f
P
o
o
f l
c
3
fD
3
^
NJ
O
01
3
a.
SS
NJ
o
on
fD
3
OQ
01
Q.
fD
<
3
01
3
3
3 '
00
-<
^
ISJ
O
CD
O
f l
c
3
tD
3
o
o
g
3 _
o
OJ
a.
^
3 -
o
u
s ^
^ i
3
3
3 '
era
f
n
o
o
f l
c
3
fD
3
^
Nl
o
OJ
3
3 .
SS
NJ
O
L n
fD
3
00
OJ
^
fD
<
3
01
3
3
3 '
era
<
SS
ISJ O O O n c 3 fD 3
o
o
g
3_
o
01
a.
o
o
+
0 0
P CT <
I ;r! m-
QJ
Q .
fD
<
CD
Q .
QJ
3
3
3 '
0 0
f
n
"o
o
f l
c
3
tD
3
^
ISJ
O
OJ
3
3 .
^
ISJ
O
L n
fD
3
0 0
QJ
Q .
tD
<
3
QJ
3
3 ^
3 '
OQ
^
<
^
Nl
O
CD
O
f l
c
3
fD
3
CD
O
g
3 _
o
QJ
CL
i n
O
O
P CT <
'o 3 E.
i l l
s i
3
3 ^
3 '
0 0
f
P
^
o
f l
c
3
fD
3
^
NJ
O
QJ
3
O.
SS
NJ
o
L n
fD
3
0 0
OJ
^
fD
<
OJ
3
3
3 '
OQ
-<
SR
Nl
o
o
o
f l
c
3
tD
3
CD
O
g
3 _
o
QJ
O.
o
t n
p CT- <
' o 3 i^:
S' 3
era QJ
3
3
3 '
OQ
f
p
^
o
n
c
3
tD
3
l /l
SS
NJ
o
QJ
3
Q .
SS
NJ
o
on
fD
3
OQ
01
^
fD
<
3
QJ
3
3
3 '
OQ
<
SS
ISJ
o
CD
O
f l
c
3
fD
3
o
o
g
3 _
o
OJ
Q.
^
a
3 "
o
o
LD
p CT- <
'o 3 E.
11
i ^
3
3
3 '
0 0
f
P
o
o
n
c
3
tD
3
%
N l
O
QJ
3
3.
SR
N l
O
L n
fD
3
0 0
01
a.
fD
<
01
3
3
3 '
0 0
<
^
Nl
o
CD
O
f l
c
3
tD
3
CD
O
g
3_
o
QJ
CL
O
O
o cr <
o 3 E.
%i K
^ i
3
3
3 '
0 0
f
p
"o
o
f l
c
3
tD
3
S
NJ
O
QJ
3
a.
SS
NJ
O
L n
fD
3
0 0
OJ
^
fD
<
3
QJ
3
3
3 '
OQ
<
SR
NJ
O
CD
O
f l
c 3 tD 3
o
o
g
3 _
o
QJ
O.
o
o
NJ
o
o
LU
cn
L n
00
'ci
+
LU
SS
NJ
O
>
NJ
o
>
-CT
TJ
fD
3
L n
O
NJ
o
o
ISJ
LU
M
^
"5
+
LU
CT <
01
CL
tD
SS <
fD
Q.
p CT <
I- S E
I I
3
OJ
3
3
3 '
0 0
-CT
era
9: %
X - h
sP = :
K
as n
N l
o
o
f l
c
3
tD
3
^
N l
O
QJ
3
3 .
o
Ss ISJ
o
on
fD
NJ rt
SS
8l
- a tD
m <
zo --
>
SS
NJ
o
Tl
73
>
cn
Nl
gl
3
> 0 0
S ^
ISJ . <
11
B I
g &
-s ^
^ i
o
OJ
Q .
OJ
CT
I
01
5
03
3
OJ
3
3
3 '
00
f
o
o
f l
c
3
tD
3
^
NJ
O
01
3
a.
SS
ISJ
O
L n
fD
3
0 0
OJ
Q .
tD
-<
3
OJ
3
3
3 '
0 0
<
as
NJ
O
o
o
n
c
3
tD
3
o
o
g
3 _
o
OJ
3 .
O
O
L n
LU
m
' i l
S' 3
era OJ
3
3
3
OQ
f
P
^
o
f l
c
3
tD
3
%
N l
O
QJ
3
3 .
SS
NJ
o
L n
tD
3
0 0
U
Q.
fD
<
3
QI
3
3 ^
3 '
0 0
<
SS
ISJ
o O o f l c 3 fD 3
o
o
g
3 _
o
01
a.
o
o
i _ ;n
en
CT- <
OJ
^
fD
<
3
OJ
3
3
3 '
0 0
f
p
^
o
f l
c
3
fD
3
^
N l
O
OJ
3
a.
SS
NJ
o
on
fD
3
0 0
01
a.
fD
<
3
QJ
3
3 ^
3 '
00
-<
^
ISJ
O
O
O
n
c
3
tD
3
CD
O
g
3 _
o
QJ
a.
o
o
tD
Q .
cn
p CT- <
2 I i
5 ^
M i
3
3
0 0
f
p
^
o
f l
c
3
fD
3
i n
SS
NJ
O
01
3
CL
SS
NJ
o
i n
fD
3
OQ
01
^
tD
<
01
3
3 ^
3
00
-<
^
NJ
o
o
o
f l
c
3
fD
3
o
o
g
3 _
o
QJ
3 .
o
o
p CT <
2 I
C ^
%' 3
era QJ
3
3
fD
CL
3
00
f
p
o
o
f l
c
3
fD
3
S
NJ
O
01
3
a.
SS
NJ
o
l / l
fD
3
00
01
^
fD
<
3
01
3
3
3 '
0 0
-<
SS
NJ
o
CD
O
f l
c
3
fD
3
o
o
g
3 _
o
01
Q .
^
ZT
o
il
E
3
3
00
fD
3 .
f
CD
O
f l
c
3
fD
3
SS
Nl
o
QJ
3
ca.
SR
Nl
o
L n
tD
3
0 0
11
Q .
fD
<
3
OJ
3
3
3 '
OQ
-<
SR
Nl
o
CD
O
f l
c
3
fD
3
o
o
g
3 _
o
QJ
3 .
^
3 -
o
l j ^ ^-
as
a.
CO
<
3
QJ
3
3
3 '
OQ
f
P
^
o
f l
C
3
fD
3
as
NJ
O
QJ
3
a.
SS
Nl
o
L n
fD
3
OQ
CT
QJ
^
fD
-<
3
QJ
3
3
3 '
OQ
-<
SR
NJ
O
o
o
n
c
3
fD
3
o
o
g
3 _
o
QJ
3 .
o
o
fD
3 .
p CT <
o 3 E.
11
3
OQ QJ
3
3
0 0
f
P
^
o
f l
c
3
tD
3
^
ISJ
O
OJ
3
3 .
^
NJ
O
L n
fD
3
OQ
OJ
^
tD
<
3
as
3
3
3 '
era
-<
SS
NJ
o
o
o
f l
c
3
tD
3
CD
O
g
3 _
o
OJ
a.
o
o
p CT <
'o 3 E.
s l l
%' 3
3
3
0 0
f
P
^
o
f l
c
3
tD
3
%
ISJ
O
OJ
3
CL
SS
Nl
o
on
fD
3
0 0
QJ
Q .
fD
<
3
QJ
3
3
3 '
0 0
-<
SR
Nl
O
o
o
f l
c
3
fD
3
o
o
g
3 _
o
01
3 .
t n
-CT
ZT
o
l->
o
O CT
' I
g .2
E
3 3
0 0
f
P
^
o
f l
c
3
tD
3
SS
NJ
o
QJ
3
3 .
SR
NJ
o
L n
fD
3
OQ
01
Q.
fD
<
3
QJ
3
3
3 '
OQ
<
SS
NJ
o
CD
0
f l
c
3
tD
3
CD
O
g
3 _
o
U
Q .
^
3 "
o
o
fD
3.
NJ
N l
ISJ
O
g
en
oil
> j
4 ^
00
"5)
+
LO
SS CT-
ISJ S
I I
5 3
>
-CT
CT
tD
9:
X
SS
NJ
o c~
L n
SS n
SS
NJ
01
f l
QJ
QJ
00
fD
NJ
C
c
on
n
CD
O
f l
c
3
fD
n cr
9 SS
? NJ
o eu
3
CS.
SS
NJ
O
L n
tD
i l
CT
fD
n
<'
fD
^
NJ
o
SS
Nl
O
O
OJ
a.
fD
-<
3
OJ
3
3
3 '
0 0
>
-n
C
SS
ISJ
SS ^
N l NJ
o o
o
o
f l
c
3
fD
3
CD
O
g
3 _
o
QJ
CL
QJ
CT
>
03
cr <
QJ
3 .
tD
<
3
as
3
3 CT =i
fD 3
3 era
9: f
X rt,
sP = : fD
^
Nl
o -C-
Nl <Z
SR n
ISJ - kl
O CD
-n O
i i
o q
as rt
S as
f N l
NJ O
I D QJ
1
00 NJ
i i
n 3.
gcg
on CT
%l
O S
NJ fD
o <
3
OJ
3
3
>
n
SR
Nl
O
o
3
0 0
^
<
SS
Nl
o CD O n c 3 fD 3
o
o
g
3 _
o
QJ
3.
QI
CT
5
00
SS o"
NJ S
as <
Nl - !
o
>
CT
CT
fD
i : f
I f
13 Z>
O
SS
NJ
o
OJ
3
3
3 '
OQ
n
CD
i i
fD
3
^
NJ
O
01
3
3 .
SS
NJ
o
on
fD
O 3
o
s |
-p fD
O -<
3
QJ
3
3
3 '
OQ
k
<
SS
NJ
o
o
o
f l
c
3
fD
3
o
o
g
3 _
o
01
a.
as
CT
$
03
NJ S
I I
Nl -
O
>
"CT
-CT
tD
3
3 .
CT <
fD
OJ
3
o
SS
SS
NJ
-CT
a.
SS CT
Nl S
.
SR <
^ o" <
NJ OJ i n
| | g
SS CT <
i r -
QJ
3
3
3 '
0 0
H:#
tD
SS
Nl
<3 O -
LU < J
as n
ISJ <L
o o
U
o
73 ^ ^
8 g
73 _
^ &
OS
Nl
. o
ISJ on
it
^ CT
SS S
Nl Q.
fD"
n <
i l
T3 3
r 3
I ^
s ^
0 1 ^
1
:^ R
c
3
tD
3
b w
CD
O
g
3 _
o
eu
3.
OJ
CT
>
00
OJ
3
3
o
>
5 d.
tD 3
3 00
6 f
X rt,
sP
K
as "
& g
> S
^ 3
n
SS
Nl
O
-D
fD
t n
%
ISJ
O
73
fD_
fD
eu
fD
SS
Nl
O
CL
^
Nl
o
on
fD
3
tD^ era
N l '
o 01
3.
SS _
s5
3
01
3
3
3 '
00
NJ ISJ
CT
3 .
O
O
o
n
c
3
tD
3
o
o
g
3 _
o
01
Q .
01
CT
>
03
NJ
o
>
CT
CT
tD
3
Q .
X
SS
Nl
3
QJ
3
3
3 '
0 0
<
f D"
^(2
g
i i
iq 3.
em QJ
3 3
tD 3 .
| S
%g
s |
SS m
Nl
0 CT
1 I
^ .5
S 3
T3 as
g
0 3
ss ^
I
I I
f l
3
Nl
QJ
fD
3
0 t n
s ^
1 i
- h 3 _
o
QJ
a.
as
CT
0 0
SR
NJ
O
>
-CT
-CT
fD
9: #
X
tD
3 .
tD
5 -
6 g
i i
2 rt
Ms
00 OJ
2 3
fD 3 .
3. SS
3 ' NJ
% 8
o ^ fD
Nl
O 3.
I t
1
2 9:
% ^
SE
m 3
7 r 3
ll
fD 7
<
SS
NJ
o
CD
O
f l
c
3 0 0 ID
-CT
a.
>
03
CD
O
g
3 _
o
01
S .
01
CT
I
eu
5
03
SR "
Nl 5
as <
II
tD 3
3 0 0
9: f
X rt,
sP = ;
K 9.
^ P
s g
if
i 2 S
s^ tn
Ms
03 OJ
- I 3
fD
3 .
3 '
OQ
3
3 .
^
Nl
O
% on
b %
O 3.
rt - T
Nl ^
O
cn
OJ
i?
i i
I I
g ^
3 <
SS SS
NJ NJ
o o
as g
NJ f l
o c
g n
n, Z3
CT
3 .
O
O
g
3 _
o
01
3 .
QJ
CT
I
OJ
5
03
CT- <
QJ
^
fD
<
3
QJ
3
3
3
- OQ
9: f
X - h
sp = ;
fD
g
i
O fD
7 S
Sg
SS Dl
| S
00
6
o
LO
as
NJ
O
SS
Nl
o
n
<
n
>
on
SS
ISJ
o
a
73
O
n
m
O
C
73
m
Ln
CT
CL
3
OQ
eu
^
fD
<
3
eu
3
3
3 '
0 0
^
<
SS
NJ
o
CD
0
f l
c
3
fD
3
CD
O
g
3_
O
cu
cs.
as
CT
I
QJ
5
CD
CT- <
01
3 .
fD
-<
EU
3
3 ^
3 '
OD
fD
a.
fD
9: I
X rt,
SS
NJ
O
-' ^
as
S g
oi
1
g g
3 o
o ^
g: ^
rt NJ
S. S
SS CO
NJ S
Q/ CT
as 3
NJ 3 .
8 ^
i i
NJ 3
O 3
^ 5
0 0
<
SS
Nl
O
o
o
f l
c
3
fD
Q#
Nl
O
o
CTl
b
3 .
CD
O
g
3 _
o
QJ
a.
OJ
CT
I
QJ
5
0 3
CT- <
QJ E
| i
3
OJ
3
3
fD 3 '
3 OQ
9: f
X rt,
sp = :
K P?
<3 > -
<;
as "
S g
? 2
5. 3
3 3
3
01
-<
SS
Nl
o
3
<
fD
^
ISJ
O
QJ
3
O .
SS
NJ
O
L n
fD
3
m
as
^
fD
% #
1.
O NJ
o
CD
o
f l
c
3
fD
3
CD
O
g
3 _
o
01
3 .
OJ
CT
>
03
LU
0 0
Nl
o
o
.>
en
LU
CD
LU
I D
'ci
+
LU
SS CT
NJ QJ
I I
NJ 3
01
3
3
o
>
-CT
D
fD 3
3 00
9: f
SS
NJ
fD
% n
ISJ
O
SS
NJ
o
SR
Nl
O
ZO
CO
n
c
fD
D
o
f l
c
3
fD
3
as
NJ
O
01
3
3 .
SR
NJ
O
L n
fD
I I
I I
i t
3 3
fD QJ
I i-
SS era
NJ '
o
OJ
00
fD
<
SS
NJ
o
CD
o
-CT
3 .
fD
O
O
g
3 _
o
OJ
CL
as
CT
5
03
cn
SS CT
it
If.
fD 3
3 00
I I
NJ
O
t - * < ;
s g
81
fD
as g
O w
m s o
5. K
3' g
OJ 3
a g
"b NJ
9; S
fD
3
OQ
01
^
fD
-<
3
QJ
3
3 ^
3 '
OQ
<
as
N l
O
CD
O
f l
c
3
fD
3
o
o
g
3 _
o
QJ
a.
01
CT
>
00
cn
SS
N l
O
03
SS
ISJ
o
>
CT
5 2.
tD 3
3 0 0
9: f
Nl
CT- <
QJ
3 .
fD
<
3
QJ
3
3
tD
3.
O g
l i
i n 3
E w
SR as
NJ NJ
g g
a^ g.
NJ s P
0 ^
n
OJ
1 3
3 . 3
tD 0 0
^ ^
ISJ
O
i 3
NJ
o
L n
fD
OJ
3 .
-<
3
eu
3
3
3*
OQ
<
as ^
NJ
O
QJ
S
NJ
O
T3
TS
3 .
O
CD
O
f l
c
3
tD
3
o
o
g
3 _
3
eu
CL
01
CT
I
CT
5
00
g
ISJ
O
>
-CT
-CT
fD
3
3 .
x'
SS
ISJ
SR "
NJ as
.Sf
as <
73
^
NJ
o
^
NJ
O
ISJ
^ g
N l
3
eu
3
3
3 '
0 0
I
f D"
g 0
S g
l i
^ S
0 t n
% ^
5 g
01 3
C 3,
sP
^ K
ISJ o
1
L n
tD
01
^
tD
<
3
OJ
3
3
3 '
o 92_
II
i i
-CT fD
0 . 3
o
o
g
3 _
o
QJ
3 .
QJ
CT
B
03
CT <
QJ t n '
fD
<
3
01
3
3
3 '
0 0
fD
3 .
9: f
O
Ln
SS
ISJ
O
73
CO
i n
"CT
O
3
fD
SS
NJ
o
p
^
o
f l
c
3
fD
3
t n
^
ISJ
O
01
3
3 .
as
NJ
O
on
tD
\ s
^
NJ
o
>
-n
X
SS
NJ
o
n
<
n
>
V I
CT
3 .
3
OQ
QJ
^
fD
<
OJ
3
3
3 '
00
<
^
NJ
O
O
O
f l
c 3 tD 3
CD
O
g
3 _
o
QJ
ea.
QJ
CT
I
QJ
5
03
O CT-
ss S
Nl a .
Nl 3
it
NJ 3 !
9 CD"
CD
O
f l
c
3
fD
3
t n
^
NJ
O
QJ
3
a.
^
N l
O
L n
tD
3
00
QJ
3 .
fD
<
3
eu
3
3
3 '
0 0
-<
SS
Nl
o
<o
o
f l
c
3
fD
3
o
o
g
3 _
o
01
3 .
01
CT
SS CT
N l Qj
. g ^
as <
Nl 3
O
>
CT
CT
fD
9: f
X rt,
sP =
01
3
3
3 '
00
tD
SS
NJ - .
O > ~
cn Z>
SR n
ISJ - LL
O CD
O
O C
^ 3
N l fD
O 3
15
f l ISJ
< O
QJ
3
3.
CT
3 .
SS
3
0 0
OJ
^
fD
-<
3
QJ
3
3
3 '
0 0
^
<
SS
NJ
O
o
o
f l
c
3
fD
3
o
o
g
3 _
o
QJ
0 .
QJ
CT
5
03
Nl
O
>
SS
ISJ
o
>
CT
CT
fD
3
a.
Cl
SS CT <
01
^
fD
<
3
01
3
3
3 '
00
. NJ
rt O
fD >
SS
ISJ
o
>
CT
CT
fD
9: r
X - h
sP =
o ^ fD
Nl
NJ <Z
o g
t _ f l
0 c
5' 3
S s
s ^
- Q OS
- 1 N l
fD O
% 5
Ss Q_
N l s p
l l
tD fD
01 rt
t n rt
fD 3
si
as 3
NJ CL
s ^
g 3
o
OJ
ST =:.
< 3
SR 92
NJ 7 o
NJ
O
O
LD
-CT
O .
<
SS
N l
o
CD
O
f l
c
3 fD
CD
O
g
3 _
o
01
3 .
t u
CT
I
t u
B
03
SS CT <
01
a.
tD
<
3
OJ
3
3 3
_< era
9: f
X - t ,
sP =
S f
o ^
00
SS n
Nl <L
O CD
on O
fD Q
f l 3
I I
gs
-n o
cn OJ
sp 3
s ^
^
n fD
SI
CT
QJ
3 .
tD
<
3
t u
3
3
3 '
0 0
<
SS
NJ
O
CD
O
f l
c
3
tD
3
CD
O
g
3 _
o
QJ
0 .
OJ
CT
5
03
CT <
OJ
^
fD
<
3
QJ
3
3
3 '
00
9: f
X - h
sP = ;
5 n
as
NJ
o
-n
>
73
>
f l
c
3
fD
O
-o
73
H
as
NJ
O
OJ
3
3 .
NJ as
ISJ
O
O
n
o
3
3
OJ
3
3 .
L n
fD
a
3 '
era
fD CT
l / l " 3
SS 9:
ISJ fD
o <
3 5'
a era
^ #
Nl
o
o
o
f l
c
3
to
3
o
o
g
3 _
o
QJ
3 .
QJ
CT
>
03
cn
SS
NJ
o
>
SS
NJ
o
>
CT
CT
tD
3
3 .
X
SS
Nl
o
v J
SS
NJ
O
73
^
N l
O
SR
N l
o
cn
01
CT
3-
n'
^
Nl
O
CT <
QJ i n '
3 .
fD
3 .
t u
3
3
3 '
00
f
p
^
o
f l
c
3
fD
3
i n
^
NJ
o
01
3
2.
as
NJ
o
on
tD
C 3
5- %
OJ CT
rt - 1
^
I i
CT 3
<
as
NJ
o
CD
O
f l c 3 fD 3
CD
O
g
3 _
o
QJ
3 .
t u
CT
s
00
ts.
4^
NJ
o
o
.>
en
4i
M
4&
"Q
+
LU
NJ S
I I
p i
CT <
-CT
"CT
fD
3
3
3 '
0 0
f
Sl
o Z>
LU : >
SS n
ISJ <J
9 o
g g
73 3
I I
s
ET. 3
i n Q .
i i
fD
as !5
NJ 3 '
S %
on ^
SS o-
ISJ OJ
q 3.
tD
0 0 <
1 1
E 3.
3 3
rt 0 0
^ k
<
^
Nl o CD o n c 3 fD 3
CD
O
g
3 _
o
QJ
3 .
fD
3 .
T3
3 .
01
CT
>
00
SS
NJ
O
03
SS
ISJ
O
>
CT
CT
fD
3
3 .
CT <
QJ E
I I
3
t u
3
3
3
0 0
tD
SS
NJ
O C~
NJ <Z
g n
& g
m Q
i i
i l
9 K
g g
= SS
01
00
fD
S
I i
eu
tD
3
tD
NJ
O
1/1
to
rt o -
01
3 .
3
T3 QJ
- 1.
3
00
<
SR
N l
O
CD
O
f l
fD
3
o
o
g
3 _
o
eu
3 .
QJ
CT
>
03
^
Nl
o
>
CT
CT
tD
3
3 .
X
s ^
03
3 . rt
tD
<
3
t u
3
3
3 '
OQ
f
< SR
t n N l
rt O
fD 03
SR
Nl
O
g ^
<3 Z>
NJ O
i
& g
m 2
i i
^ %
9 %
g g
#g
s ^
5 cm
o
CT
3 "
3
on
3
C
CT
3 .
OJ
Q .
tD
-<
3
t u
3
3^
3 '
OQ
-<
^
N l
O
CD
O
f l
c
3
fD
3
o
o
g
3 _
3
01
3 .
t u
CT
I
CT
5
03
CT- <
QJ
O .
fD
-<
3
01
3
3
>
? 2.
tD 3
3 era
9: f
" p ^
CO
^
N l
<3
Nl Z>
^12
o g
m Q
i i
i l
ISJ
O
era 01
01 3
s. ^
5' ^
% S
NJ fD
g 3
n 3'
73 era
n ic.
SS CT
si
2 . fD
fD <
3
01
3
3
3 '
0 0
<
SS
ISJ
O
CD
0
f l
c
3
fD
3
CD
O
g
3 _
o
01
3 .
OJ
r
CT
5
03
NJ 3
I I
Nl -
O
>
CT
-CT
tD
3
3 .
CT- <
fD
3.
3
OJ
3
3
3 '
0 0
9: %
fD
X
SS
Nl
0 c~
NJ < ;
1 -
& g
m Q
i i
r - 3 g ^
O OS
tD
00
QJ
NJ
O
t u
3
3.
SS
Nl
o
as K
N l fD
Q 5-
< 0 0
n
a: ?
QJ
CT 9:
9; -
3
01
3
3
3 '
0 0
<
SS
Nl
o
o
0
f l
c
3
tD
3
o
0
g
3_
3
QJ
3 .
OJ
CT
5
03
SS CT
it
I I
fD 3
3 era
0 = %
< ^
t n NJ
rt O
fD 03
as
NJ
O
>
CT
TJ
fD
tD
SS
o
o
f l
c
3
N l fD
O 3
3
fD
3 .
f l '
SS
ISJ
g
fD
01
3
fD
3
S
NJ
O
(T5
f l
o
3 .
SR
NJ
o
SS
ISJ
o
01
3
3.
SS
NJ
o
on
fD
3
0 0
01
^
fD
<
3
OJ
3
3
SR 3
N l 0 0
if
z o
O CD
m 3
a s
CT
3.
CD
O
g
3 _
3
01
3.
u i ^
QJ
CT
>
03
CT- <
OJ
^
tD
<
3
01
3
3
3
_ OQ
9: f
% 52
fD
SR
Nl
O O
Nl Z>
SS n
N l < :
S. O
-n O
L n f l
H c
^ 3
NJ fD
O 3
3 cr
9:
f l o
t u OJ
^ =
ISJ
o
3.
SS
NJ
o
L n
fD
3
0 0
fD
OJ
3
fD
3
S
ISJ
oi
tD 3 .
8 ^
i i
i
g#
o
CD
O
n
c
3
tD
3
o
o
g
3 _
o
t u
3.
QJ
CT
I
CT
5
03
cr <
NJ 3
I I
NJ
o
>
-CT
CT
tD
3
3 .
x'
SS
Nl . .
o
NJ
SS n
Nl <L
3 . O
-n 3
L n f l
H CL
^ 3
N l fD
O 3
3
tD
3.
01
3
3
3 '
0 0
<
f D"
^
N l
r-1 O
01 01
^ EL
9 g
3 g
3 g
3
era
, - CT
9 3
fD 3 .
fD
3
S
NJ
fD
-<
i i
l#
1
2 g
SR 3
S 5
L n -
I
i n
O
3
g
3_
o
QJ
3 .
01
CT
>
03
SS CT- <
NJ QJ m
O Q . rt
03 fD
as4g -
3
01
3
3
3
0 0
9: f
X
SS
Nl
o
Nl
o
SS
ISJ
O
fD
P
^
3
f l
c
3
fD
5' SR
as S
N l OJ
O 3
DO CL
P
11
NJ CT
f I
li
3
0 0
<
SS
N l
o
O
o
f l
c
3 fD 3
o
o
g
3_
3
t u
3.
QJ
CT
>
03
SR ?
ISJ OS
I I
NJ g
eu
3
3_
3 '
0 0
o
>
CT
CT
tD
9: f
Iff
o >^
NJ \
SS o
ISJ -LL
3. CD
- n 3
L n f l
H c
^ 3
N l fD
O 3
3 cr
tD
3 .
f l '
OJ
^
ISJ
O
01
3
3.
SS
NJ
O
on
SS
ISJ
g
fD
01
3
# &
Nl CT
9 3
tD 3 .
8 ^
i i
is
is
5 "
SS
ll
-b
^ g
g
^
NJ
o
01
3.
01
CT
>
03
^
NJ
O
03
^
NJ
O
>
-CT
CT
fD
3
3 .
x'
^
NJ
O
NJ
^
ISJ
O
SR
Nl
o
3
tD
3 .
f l '
QJ_
^
NJ
g
fD
01
3
to
3
^
NJ
O
tD
f l
o
3 .
SR
N l
o
SS
N l
o
CT- <
QJ E
-
3 .
fD
-<
3
QJ
3
3
3 '
0 0
f
P
^
0
f l
c
3
fD
3
^
ISJ
O
OJ
3
3.
SS
ISJ
O
on
fD
3
0 0
01
^
tD
<
3
01
3
3
3 '
00
^ g
X o
g
c
3
fD
3
CD
3
g
3 _
o
01
3 .
01
CT
I
CT
5
DO
on
on
N l
O
O
4 ^
l->
en
on
4^
cn
+
LU
SS CT-
NJ S
I I
5 i
^ I.
CT 3
CD 00
X = :
as
ISJ > -
o ^
g o
6 g
o n f l
11
^ s
S as
tD NJ
O
QJ
3
3.
-CT
O
1
O 3
t- era
en j n
11
O fD
^ -<
3
QJ
3
3
3 '
0 0
<
. ^
SS NJ
NJ
O
fD
SS
NJ
o
<
fD
CT
g. CD
o
CD
O
f l
c
3
fD
3
ro O
l l
QJ
3 .
t n
01
CT
?
03
cn
SS
NJ Qj
I I
CT- <
ISJ
O
>
-CT
CT
fD
3
3.
3
QJ
3
3 ^
3 '
00
9: f
fD
SS
Nl
o
OJ
3
3.
X
^
NJ
O
cn -
SS n
NJ < :
O
L n O
l i
3 2
fD
3
S
ISJ
O
O
g
i
- I on
SR %
NJ rt
0 3 '
m era
C
3 CT
it
i
- , 3
1 I
S ^
^
: NJ
u
c
3
fD
CD
0
g
3 _
o
QJ
3.
QJ
CT
I
CT
5
03
SS CT-
I I
I I
fD 3
3 era
9: r
Iff
o >~
on Z>
SR n
N l - L: .
o
o
o
n
c
3
fD
3
i n
^
N l
O
01
3
3.
SS
Nl
o
on
tD
SS 3
s %
31 CT
3 S
% f
0 >
^ 3
01 OJ
^ i.
SP 3
S 6S.
? ^
L n
<
SS
NJ
o
CD
3
f l
c
3
fD
3
o
o
g
3 _
o
OJ
3.
01
1 ^
I
03
CT <
NJ OJ
I I
NJ ->
O
>
CT
CT
fD
3
3 .
X
SS
NJ
<3 O-
^ -5:
SR n
NJ
3 . O
g
s i
I I
OJ
3
3 ^
3 '
0 0
<
f D"
Nl
O
as 2
NJ
O
L n
QJ
3 .
SS
ISJ
O
on
fD
g 5
O OQ
IT .!C
E CT
- 1
i f
3
01
3
3
3 '
0 0
<
^
N l
O
o
o
f l
c
3 tD 3
o
o
g
3 _
o
01
3 .
OJ
CT
5
03
SS
Nl
o
00
SS
NJ
o
>
-CT
CT <
QJ
3 .
fD
<
3
OJ
3
3
fD
3 .
CT 2
fD 3
3 0 0
g ^
o >~
oo <r
g n
& g
< 2
S= 3
OQ tD
fD 3
o
5 ^
QJ 3.
fD SS
i a
I I
NJ 0 0
1 ?
^1
01
3
3
3 '
00
<
^
Nl
o
o
3
f l
c
3
fD
3
o
3
g
3 _
3
01
3.
01
CT
>
00
LU
sJ
cn
SR o-
NJ QJ
I I
3
OJ
3
3
3 '
era
fD
3.
Nl
o
>
3
-CT
tD
9: f
X
fD
P
o
0
f l
c
3
fD
3
X ^
0 N l
t n o
-CT fll
rt 3
01 3.
as SS
Nl
O
L n
tD
fD rt
7 3
S . 0 0
fD
sE
f ^
3
01
3
-CT 3
to
0 0
<
as
N l
O
O
3
n
c
3
tD
3
o
3
g
3 _
o
QJ
3.
Ol
CT
3
03
cn
3 =
CT <
QJ i n '
I I
3
OJ
3
3
3
3 era
g ^
SS n
NJ
l l
^ g
s ^
0. as
NJ
o
t u
3
3.
SS
ISJ
O
L n
01
f l
rt
5'
l l
SS.
O CT
I I
tD
<
3
OJ
3
3
3 '
0 0
0 <
SS
NJ
O
CD
O
f l
c
9: 3
fD
3
CD
O
g
3_
o
01
3.
QJ
CT
5
03
^ CT <
Nl
o
03
SS
ISJ
o
>
CT
CT _ .
fD 3
3 era
9: f
^ m
as
3 .
fD
<
3
t u
3
3
fD
SR
Nl
C3
LO ^
SR n
ISJ
; g
i
3D 3
I I
1
C. 3
i n Q .
I!
2 %
g ^
^ s
NJ ( 3.
i f
11
S i.
% #
<
SR
Nl
O
o
o
n
c
3
fD
3
o
3
g
3 _
o
t u
3.
01
r
CT
5
OD
SS
ISJ
o
>
-CT
3
fD
3
SS 2" <
NJ QJ
m 9=
fD
<
3
OJ
3
3
ZS
00
-. f
^ =
fD
00
3
fD
3.
01
^
fD
<
3
OJ
3
3
C 3
3 era
QJ
OJ
^
Nl
o c>
oo
SR n
ISJ
I !
73 3
I I
S
C 3
t n CL
11
K 3'
2 %
g ^
SS
NJ
O
<
^
Nl
o
o
o
f l
c
3 fD 3
o
o
g
3_
3
01
3.
01
CT
5
03
SS CT
Nl S
I
: <
: i
3
CT 2.
fD 3
3 0 0
9: f
Iff
O > ~
N l C >
% n
SR _
5 g
d 2
3
6 %
LU OS
LU
Nl
O
t u
3
3.
NJ Ss
O tSJ
O
L n
fD
cn
SS 5'
NJ OQ
O j n ^
as 3
NJ 3 .
O fD
<
3
01
3
3
3 '
era
^ SR
Nl Nl
o o
o
3
^
ISJ
_o
b
3 .
o
3
f l
c
3
fD
3
o
3
g
3 _
3
01
3.
01
CT
>
03
on
NJ
O
O
4 ^
cn
4^
M
M
cn
O
+
LU
SR
NJ
O
00
SR
NJ
o
>
CT
CT
fD
3
3 .
X
SS
Nl
o
00
SR
NJ
o
SS
NJ
o
o
73
O
>
SS
ISJ
o
SR
NJ
O
3
^
N l
O
I - *
o
SS
NJ
o
^
>
SS
ISJ
o
QJ
3
CL
^
ISJ
O
Nl
on
^
ISJ
O
CT <
QJ
a.
fD
<
3
t u
3
3
3 '
00
f
p
^
o
f l
c
3
tD
3
%
ISJ
O
QJ
3
C3.
^
NJ
O
L n
tD
3
00
CT
OJ
Q.
tD
<
3
t u
3
3
3 '
00
<
SS
NJ
o
CD
o
fD
3.
$ 2
>
^
NJ
O
m
3
0 0
-CT
3.
CD
O
g
3_
3
OJ
3.
CU
CT
5
OD
cn
cn
NJ
o
o
4&
LU
on
LU
O
U l
o
SS o"
If
II
CT 3
tD era
X = :
as p?
NJ
o Z>
8 g
< 2
si
as ^
S as
- n NJ
3 o
QJ
3
3.
SS
01
0 0
tD
^ s
l / l
fD
O
>
3 rt
flj_ 3
M j n ^
i l
.5
SI
i l
3 .
fD
3
CT
3 .
<
SR
ISJ
O
O
o
f l
c
3
fD
3
CD
O
g
3 _
3
OJ
3 .
QJ
CT
I
CT
5
03
3 - CT
' o' l
i n fD
CT <
3
eu
3
01_
I
^ 3.
O 3
O
g f
o 52
L n fD
n
o \
4 ^ ^
0 0 n
I D '
o n
O
O
f l
c
3
tD
3
t n
SR
N l
o
t u
3
3.
SR
NJ
o
L n
fD
3
00
QI
^
fD
<
3
QJ
3
3
3 '
00
<
SS
NJ
o
CD
O
n
c
3
tD
3
o
3
g
3 _
3
OJ
3 .
t u
CT
OJ
QJ
3 - CT
si
5 OJ 3
'^1
3 3
o OQ
S_ f
O = :
L n fD
n <L.
O \
LD C l
o
NJ
CD
3
f l
c
3
fD
3
tn
SR
NJ
O
OJ
3
3.
SR
NJ
o
on
fD
3
00
cu
a.
tD
<
3
01
3
3
3 '
OQ
<
^
NJ
O
o
3
f l
c
3
fD
3
CD
O
g
3 _
3
QJ
3.
01
CT
01
01
CT
^ ^
sr' 3
SI.
3 3
O (
S %
O 52
L n fD
n
o >^
t=> >r
I D
CD
O
f l
c
3
fD
3
SR
NJ
O
01
3
3.
SS
ISJ
O
L n
tD
3
OQ
01
^
fD
<
t u
3
3
3 '
0 0
<
SR
ISJ
O
CD
3
n
c
3
fD
3
o
o
g
3 _
3
t u
3.
01
CT
01
01
cn
3 - CT
'-^ 3
3 . rt
3 !
^ ^
sr' 3
i i .
O 3
Q CO
g f
o 52
L n fD
n
o ^
^
I D C l
O < L
p o
S 2
3
tD
3
SR
N l
O
OJ
3
3.
^
NJ
O
L n
fD
3
0 0
OJ
3 .
fD
<
3
QJ
3
3
3 '
00
<
SR
NJ
o
o
o
n
c
3
fD
3
o
3
g
3 _
3
01
3.
01
CT
eu
01
r ^
3 H:
tD
-< -CT
sr' 3
'ii
3 3
O 0 0
9 f
o 52
L n fD
O
O
00 O
I D '
I D o
3
f l
c
3
fD
3
^
NJ
O
eu
3
3.
SS
NJ
O
on
fD
3
00
eu
Q.
fD
<
3
eu
3
3
3 '
0 0
<
SS
N l
O
CD
0
f l
c
3
tD
3
CD
0
g
3 _
3
QJ
3.
QJ
CT
Ol
QJ
3 - CT <
3 5i
s ^
sr' 3
'ii
3 3
0 0
O = :
L n tD
n <L
o
>
00 n
I D
v l
f
o
3
f l
c
3
fD
3
i n
SS
Nl
o
t u
3
3.
SR
N l
O
o n
tD
3
0 0
01
o.
CO
<
QJ
3
3 ^
3 '
00
<
^
NJ
o
o
3
f l
c
3
fD
3
CD
O
g
3 _
3
01
3 .
01
CT
01
01
CT CT
3-1
^ ^
sr' 3
ii
O 3
00
i n
f
o =
L n fD
I - l
O ~ <
00 n
I D
cn
o
3
f l
c
3
fD
3
t n
^
N l
O
QJ
3
3.
^
NJ
O
L n
tD
3
0 0
QJ
^
tD
<
3
t u
3
3
3 '
00
-<
SS
NJ
o
CD
o
n
c
3
fD
3
CD
O
g
3_
3
01
3.
01
CT
01
01
^
NJ
1
l l
B 3
fD era
. t
CT <
3 E.
CD
3.
as n
Nl ^
o
-sl
^
Nl
^
H
O
OU
M
.>
o ^
LU OS
LU NJ
9 g
3
3 .
^
I SI
O
L n
tD
n
fD
3
en
eb
LD
b
3 .
3
0 0
01
^
tD
<
OJ
3
3
3 '
00
<
^
ISJ
O
CD
0
f l
c
3
tD
3
CD
O
g
3 _
3
QJ
3.
01
CT
5
03
N l
on
cn
Nl
o
o
41^
cn
Nl
on
m
+
LU
^ ? <
01
3 .
03
NJ ^
SS
Nl
O
>
CT
CT
f
fD
3
3 .
x'
^
NJ
o <:
as
M g
il
S ^
n NJ
m o
z ^
o ^
ISJ 2 .
o 3
Q 5'
CD 0 0
m i n
s o ^
^ R-
O 01
s f
o >
NJ 3
^ I
NJ 3
^ #
O NJ
o o
I D 13
^ R
3 . C
^ 3
fD
3
o
3
g
3 _
3
01
3.
OJ
CT
5
03
SS
NJ
o
03
NJ
k
I SI
O
>
CT
CT
fD
3
3 .
x'
^
N l
O
H '
o
^
ISJ
^
"a
za
H
SR
Nl
O
eu
3
3.
as
Nl
o
-o
3
<.
3 '
n
o j '
SS
Nl
o
I
tD
t u
3.
fD
&
Nl
O
CT- <
QJ M
3.
fD
<
eu
3
3
3 '
00
f
P
O
o
f l
c
3
tD
3
SR
NJ
O
QJ
3
3.
SS
N l
o
L n
fD
3
0 0
fD
3.
01
^
fD
-<
3
QJ
3
3
3 '
OQ
fD
%
NJ
O
eu
3
3.
g
b
3.
<
as
N l
o
CD
0
f l
c
3
fD
3
D
3
g
3_
3
OJ
3.
OJ
CT
5
00
~ J
^
Nl
O
en
4&
4^
LU
^
'ci
+
LU
CT
I - 3
3. rt
T3 -S
3
ii
3 3
0 0
%
1
cn
LD
s J
on
^
00
tD
P
^
3
f l
c
fD
3
as
N l
O
01
3
3 .
SR
NJ
O
L n
t o
3
3 '
00
t n
QI
a.
fD
<
3
01
3
3_
3 '
0 0
<
SR
NJ
O
O
3
f l
c
3
to
3
CD
3
g
3 _
3
01
3.
01
CT
OJ
QJ
CT CT <
- r 3 in.
X 3. rt
3 !
s ^
sr' 3
QJ
3
3
I
-CT
ZT a .
3 3
o 52
L n fD
n
z
2 n
NJ O
3
CT f l
0 0 C
3
fD
3
i n
SR
N l
O
OJ
3
3.
^
NJ
o
L n
fD
3
00
QJ
Q.
fD
<
3
QJ
3
3
3 '
0 0
<
SR
Nl
O
o
3
f l
c
3
tD
3
CD
O
g
3 _
3
QJ
3.
OJ
CT
OJ
OJ
CT CT
g- I
^ ^
sr' 3
QJ
^ i.
3 3
o 52
L n fD
n
v J
LU
S'
00
p
o
3
f l
c
3
fD
3
SR
NJ
O
OJ
3
3_
^
N l
O
on
tD
3
00
t u
^
fD
-<
3
01
3
3
3 '
00
<
SS
N l
O
D
O
f l
c
3
fD
3
o
3
g
3 _
3
t u
3.
QJ
CT
t u
QJ
CT CT
^ ^
sr 3
| - 01
CT
3
_ 3
3 3 '
0 0
f
cn
p
^
o
f l
c
3
tD
3
^
Nl
o
QJ
3
3.
SS
ISJ
O
on
fD
3
era
01
Q.
tD
<
3
QJ
3
3
3 '
00
<
SS
ISJ
o
CD
0
f l
c
3 tD 3
o
3
g
3 _
3
t u
3.
QJ
CT
01
OJ
cn
CT CT
'^1
-s ^
sr' 3
ii
3 3
o 00
g f
cn
fD
P
"o
o
f l
c
3
tD
3
^
Nl
O
t u
3
3.
SS
NJ
o
on
fD
3
OQ
01
^
tD
<
01
3
3
3 '
00
<
^
NJ
O
O
0
f l
c
3
tD
3
o
3
g
3 _
3
OJ
CL
OJ
r
CT
OJ
QJ
3 - CT <
OJ
3 .
tD
-<
tD
3.
QJ d
QJ
E- 1.
O 3
cn
fD
P
^
3
f l
c
3
fD
3
tn
SR
NJ
O
01
3
3.
SS
NJ
O
on
tD
3
OQ
eu
^
fD
<
3
01
3
3
3 '
00
<
SR
Nl
O
o
3
f l
c
3
fD
3
CD
3
g
3 _
3
01
1.
01
CT
01
01
CT <
QJ i n '
3. rt
03
NJ m
SS
N l
o
>
3
3
3
3 .
x'
SR
Nl
o
fD era
- f
tD
g n
I SI
O
SR
NJ
CD
3
n
c
SS m
NJ 3
o cr
l i
11
m rt
Ss = -
K m
^. ?
3
QJ
rt tD
fD <
3
3 OJ
< 3
3.
g k
E ^
NJ
O
CD
O
n
c
3
fD
3
CD
O
g
3 _
3
01
3.
CT
3.
QJ
1 ^
CT
5
03
CT CT
' c- l
S ^
sr' 3
ii
3 3
O OQ
g f
cn
tD
p
"o
3
f l
c
3
fD
3
^
NJ
O
01
3
3 .
SS
NJ
o
on
fD
3
era
01
^
tD
<
01
3
3
3 '
00
<
^
ISJ
O
CD
O
f l
c
3
tD
3
o
3
g
3_
o
QJ
3.
01
CT
OJ
QJ
CT CT <
CT 3 12!
I l l
OJ 3
eu
^ i.
3 3
Q 0 0
g f
cn
fD
p
^
0
f l
C
3
fD
3
^
NJ
O
OJ
3
3.
SS
NJ
O
on
fD
3
OQ
01
^
fD
<
3
t u
3
3
3 '
00
-<
^
NJ
o
CD
3
f l
c
3
fD
3
CD
3
g
3_
0
01
3.
OJ
CT
QJ
3
' CT- <
'CT 3 E.
I l l
OJ
3
QJ
^ 3 .
3 3
O 0 0
g f
CD
I
i->
I D
cn
I D
%'
00
tD
p
"o
o
f l
c
fD
3
S
NJ
O
OJ
3
3.
SS
NJ
O
L n
fD
3
00
eu
3 .
fD
<
3
01
3
3
3 '
era
<
^
N l
O
o
0
f l
c 3 fD 3
CD
3
g
3 _
3
01
a.
01
CT
01
QJ
3 - CT <
t u
3 H: 9: f?
^ ^
sr' 3
ii,
O 3
0 0
f
cn
p
"o
3
f l
c
3
fD
3
^
NJ
O
eu
3
3.
SS
NJ
O
L n
fD
3
00
01
a.
fD
-<
3
01
3
3
3 '
0 0
<
SR
ISJ
O CD 0 f l c 3 tD 3
CD
0
g
3_
3
eu
3.
01
CT
01
as
CO
0 0
Nl
O
g
en
4i
I D
M
sJ
m
+
0 0
i l l
II
Z 3
sP era f
as
Nl
O
g CD
ISJ i >
O \
Zl C)
3
3. CD
5'
era g
SS 3
NJ fD
O 3
eu
3
3.
as
SR
Nl
O
s s
73
fD
f l
3.
^
ISJ
O
l / l
fD
SS
Nl
00 rt
SS 5
N l era
o j n
c CT
3
fD
CT
CT
QJ
3 .
fD
<
3
QI
3
3^
3 '
OQ
<
SR
NJ
O
o
3
f l
c
3
fD
3
CD
O
g
3 _
3
01
3.
ro
f D'
SS CT <
NJ 3 t n
S |
^
ISJ
O
>
CT
CT
fD
3
3 .
X
g ;
o >
NJ
4 ^
SS
ISJ
o
9: f
n
fD
6 &
LU as
l_> Nl
: g
^ g.
OS ^
NJ OS
O Nl
O l / l
s s
SR 5'
Nl 00
O t n
as 3
NJ 3 .
2 ^
t u
v J
O
4 ^
N
M -
I era
^1
SR as
NJ NJ
o o
CD
O
f l
c
3
fD
3
o
LD
^
NJ
3
-b
3.
o
o
g
3 _
3
OJ
3 .
QJ
CT
I
CT
5
ro
SS
Nl
o
ro
SR
N l
O
>
CT
-CT
fD
CT- <
QJ i n '
3. rt
fD
<
3
OJ
3
3
3 '
00
9: f
S i
p
^
0
f l
c
3
tD
3
SS
ISJ t n
SS
Nl
o
t u
3
3.
SS
SS
QJ
NJ
o
t u
3
% 3
SS 00
Nl
o
-o
73
i n
t u
^
fD
<
3
QJ
3
3
SR
Nl
o
ro
c
3
SS 3
o 92.
< ^
S ^
N l
O
CD
O
f l
c
3
fD
3
-CT
3.
O
O
g
3 _
3
QJ
3 .
OJ
CT
5
ro
SS CT- <
NJ QJ
I I NJ
O
>
-CT
"CT
fD
3
3
OJ
3
3
3 '
00
5 f
S f
o
i - < ~
^ n
CD
O
f l
c
: fD
g %
9 M
% g
II
3
<
fD
eu
^
fD
<
3 d
3 OJ
g 3
O 3
o 00
i i ^
ISJ
O
CD
O
O
- n
01
as
^ R
NJ C
Q n
< S
" O i n
9; o
3
g
3 _
3
t u
13.
01
CT
CT
5
ro
CT <
S <n'
3 . rt
fD
<
3
OJ
3
3
3 '
- I era
9: f
^ W NJ
^ ^
I t
ISJ C
R 3
L n fD
fD 3
f l
0
3
3.
^
NJ
O
n
CD
^
NJ
O
01
3
CL
SS
s
^
A a
3 JC.
t u CT
fD as
T - ' CL
I 3
3
OJ
3
3
3 '
0 0
<
SS
NJ
o
CD
3
f l
c
3
tD
3
o
3
g
3 _
3
QI
3 .
01
CT
I
I
ro
SS CT- <
NJ QJ
I I N l
O
>
CT
CT
fD
3
fD
3.
3
QJ
3
3
3 "
0 0
g ^
S(Z
g
G 2
I!
^ s
O OJ
^ s
i i
cn rt
3 TO
m -sc.
11
? ^
II
QJ_
l l
NJ NJ
O O
u
^ 3
tD
3
TO
O
o
g
3_
3
QJ
3.
t u
CT
I
CT
5
ro
NJ 3
I I
Nl -
O
>
CT
CT
fD
3
3 .
x'
SS
NJ
O c~
ISJ Z >
SS f-l
ISJ
S o
- n 3
L n f l
H c
SR 3
NJ ID
O 3
3
tD
3.
CT- <
QJ
3
3
3 '
TO
I
f o"
S
ISJ
f l ' O
QJ OJ
^ s.
2 g
3 3
# <
NJ CT
9 3
fD 3.
O ^
If
I!
-.1
f l
c
3
fD
3
CD
O
g
3 _
o
01
3 .
01
CT
B
ro
cn
SS CT
I I
II
fD - 1
3
3 .
X
SR
NJ
O
N l
SS
_ TO
9: f
- rt,
ro"
p
^
3
f l
c
Nl
on
as 3
NJ fD
0 3
3 cr
& g
f l o
t u OJ
g K
9 S
1 ?
II
NJ CT
9 3
fD 3.
f l
tD
<
i l
g,:
g ^
ro
^
ISJ
O
L n
>
o
CD
O
f l
c
3
tD
3
l / l
^ 2
o
01
3.
eu
CT
I
CT
5
ro
CT- <
QJ
3.
ISJ
O
>
CT
CT
fD
3
3
QJ
3
3
3 '
TO
9: f
X
tD
^
NJ
O
NJ ^
SR n
ISJ .L-
o
^
CD
3
n
c
3
ISJ tD
O 3
3 cr
fD
3 .
f l '
QJ
SS
NJ
o
QJ
3
3.
SR
ISJ
o
L n
fD
SS
Nl
g
fD
eu
3
fD
3
S
NJ
O
fD
l i
9 3
^ 3 '
NJ TO
O ^
>
I
3
TO
01
3 .
fD
<
>
o
^
NJ
O
on
I
>
X
b
3 .
-<
SS
NJ
o
CD
O
f l
c
3
tD
o
o
g
3 _
3
QJ
3 .
QJ
CT
>
ro
^
Nl
o
ro
SR
NJ
o
>
3
3
fD
CT <
QJ
3 .
fD
<
3
QJ
3
3
fD
3 .
3
- TO
9: f
=^
NJ
tD
SR n
ISJ <L
S CD
- n 3
OJ f l
u
o - 3
X SS
O NJ
CT t u
rt 3
t u 3.
11
3 tD
tD 3 .
S. TO
fD
f ^
f? 3
g I
o 5'
^ TO
If
- 1 f l
3. C
b 3
3. fD
3
O
3
g
3 _
o
01
3.
sr
CT
s
ro
, ' 3 - <
l_ 3 E
.11
QJ 3
OJ
i .
3 3
O 0 0
g f
cn
tD
P
^
3
f l
C
3
tD
3
SS
ISJ
o
OJ
3
3.
SR
NJ
o
on
fD
3
TO
QJ
^
fD
<
3
QJ
3
3
3 '
TO
<
SS
ISJ
o o 3 f l c 3 CD 3
u
3
g
3 _
0
QJ
3.
OJ
CT
t u
OJ
I D
LD
Nl
o
o
4^
en
Ln
NJ
LU
LU
m
+
LU
NJ 3
I I
Nl
o
>
3
CT <
3
eu
3
3 3
tD 3
3 TO
9: f
Iff
as
NJ
O
L n
O
CD
3
f l
c
QT 3
fD
3
S
NJ
o
01
3
3.
as
NJ
O
on
tD
SR
Nl
o
l
c
3
01
S
NJ
O
o
t u
0 rt
Nl 3
2 CT
OJ
- 3 .
i f
01
3
3
3 '
go^
S
<
^
NJ
o
o
0
f l
c
3
fD
3
o
3
g
3 _
3
QJ
3.
QJ
CT
5
ro
^ " <
NJ 3 t ; .
I l l
3
01
3
3
3
TO
9: f
Iff
g o
M g
1
o =
Z m
i i
Nl as
NJ NJ
O
on
fD
3
Ln oq
73 tn^
S 3
NJ 3.
i f
ISJ tu
O 3
l-> 3
s ^
s
p
as i
Nl 3
^
iB CD
11
o
QJ
3.
QJ
CT
>
ro
SS
NJ
O
n
^
NJ
o
>
-CT
CT <
QJ
3 .
fD
-<
3
QJ
3
3
tD
3.
-CT 3
fD 3
3 TO
9: f
Iff
O > ^
t-"
g P
NJ "
g
L n f l
on c
% 3
SS g
NJ 3 .
o
3
fD
-CT
CT
as
Nl
O
r-
C
TS
j s j
b
3.
SS
Nl
o
t u
3
3 .
as
Nl
O
L n
fD
3
TO
OJ
^
fD
<
3
OJ
3
3
3 '
TO
<
SS
ISJ
o
o
3
f l
c
3
tD
3
CD
O
g
3 _
o
OJ
3.
QJ
CT
>
ro
Nl
o
>
S 2
tD
^
ISJ
O
n
CT- <
QJ
^
as 45
3
QJ
3
3
3 '
TO
I
f D"
SR n
Nl
3 o
i!
Q cr
? SS
% S
OJ
3
( 3 .
^
sP OS
l cn tD
11
QJ
^
fD
<
3
OJ
3
3
3 '
TO
<
SS
NJ
o
CD
3
f l
c
3
fD
3
CD
O
g
3 _
3
OJ
3 .
01
CT
5
ro
3 - <
SR
l l
l l
fD 3
3 TO
B:"
g ^
1 3
i- z>
^ n
& g
1
o 3-
il
'NJ ^
4 ^ ISJ
i ?
L n TO
73 i n
^ 5
SS
NJ
o
o
4^
^ 3
NJ 01
QJ
3 .
fD
-<
i
Nl
o
o
LD
b
13.
3
3
3 '
TO
<
as
NJ
o
CD
O
f l
c
3
fD
3
CD
0
g
3 _
3
OJ
3.
01
CT
' o
5
ro
CT <
3 E
3. Sf'
tD
<
I I
fD 3
3 TO
9: f
& 53
fD
g n
& g
L n r i
TO c
3 3
s l
i s
01 O
i l
O NJ
ro o
> on
1 fD
g 3
z 3'
p %
C CT
b 3
9; 9=
tD
<
QJ
3
3
3 '
TO
<
as
Nl
O
o
0
f l
c
3
fD
3
o
0
g
3 _
3
QJ
3.
QJ
CT
>
ro
^ S" <
QJ
^
fD
<
3
cu
3
3_
3 '
TO
9: f
P
^
0
n
c
3
tD
s
i i
g l
OJ
^
fD
li
Nl 3 .
O 3
L n TO
fD
CT CT
CT
fD
3
^ <
9 i
3 3
SS 3
sa
ii S Cl ^ R S 3 ro fD c5 a fD r o 11 o 01 3.
OJ
CT
5
ro
NJ 3
I I
Nl
O
>
CT
CT
fD 3
3 TO
; : r
CT- <
tD
3.
QJ
3
3
fD
o
o
n
c
3
tD
3
S
NJ
O
t u
3
3 .
NJ as
o
p
C
fD
NJ
O
L n
fD
s
3
era
_ - CT-
si
3 fD
3 . <
s I
C 3
1 5'
> TO
>
SS
ISJ
o
X
73
c
^
ISJ
O
73
fD
3
O
b
3 .
-<
SS
N l
O
o
o
f l
c
3
tD
3
o
3
g
3 _
3
01
O .
OJ
CT
5
ro
I D
SR
If
I I
fD 3
3 TO
9: f
X rt.
CT- <
^
NJ
O
NJ
l-
^
NJ
o
n
73
n
SS
Nl
O
^
fD
fD
3
TO
SR
Nl
O
SS
Nl
o
3
3 ^
fD CT
ifl, 3
b 9z
3. fD
rt, - <
QJ
3
3
3 '
TO
tD
P
"o
0
f l
c
3
fD
3
S
NJ
O
OJ
3
3.
^
N l
O
L n
tD
3
TO
<
^
ISJ
O
CD
O
n
c
3
fD
3
CD
0
g
3_
3
QJ
3.
OJ
CT
I
CT
5
ro
SR 2" <
NJ
o
ro
SS
Nl
O
>
CT
CT
tD
QJ
^
fD
<
3
QJ
3
3
to
3.
3
TO
9: f
fD
i r?
6 g
n 2
Q m
^ 3-
g a^
NJ
s g
sp 3
s ^
- 1 N l
fD O
s ^
a i-
-b %
OJ
^
fD
<
3
QJ
3
3
3
TO
<
SR
Nl
O
o
3
n
c
3
fD
3
CD
3
g
3 _
3
t u
3.
tu
CT
>
ro
SS CT- < |
s s.
ro fD
as< A-
11
tD 3
3 TO
9: f
X rt,
g w
<3 ^
I - * < ~
SR "
& g
l i
rt 3
ii
1 =
s S
^ 3
g <
o
n
QJ
C
OJ
OJ
^
fD
<
^ E
Nl 3
O 3
S^'
1 1
^
NJ
O
CD
3
f l
c
3
fD
3
o
3
g
3 _
3
QJ
CL
t u
r
f
ro
ISJ
NJ
NJ
O
o
4&
cn
Ln
cn
b
o
m
2
H
+
LU
SS CT
NJ 3
I I
S 3
>
OJ
-CT
-CT
fD
3
3.
TO
9: f
fD
X
^
NJ
o z>
v J ^
SS n
Nl
o o
o
f l
c
3
CD
3
i n
SS
Nl
o
t u
3
C3.
SS
NJ
o
as
N l
O
LU
M
SS
NJ
o
-a
o
CT
fD
SS on
ISJ fD
g@
< TO
5 '
on
SS
N l
o
za
ro
CT
3
01
3 .
tD
<
3
QJ
3
3
T3 3
3. TO
<
SR
NJ
o
o
3
f l
c
3
fD
3
o
3
g
3 _
3
QJ
3.
01
CT
'I
ro
cn
^ o- <
Nl 3 m
SI I
3
TO
9: r)
X rt.
fD
^
ISJ
O > ~
cn Z>
SS n
Nl
O
n
01
3
S
Nl
o
o
0
n
c
3
fD
^
ISJ
^ g
3
3 .
^
ISJ
O
L n
fD
^i -
O w
as CT
11
i l
1 1
- < 3
as 00
S k
o <
iB as
M
f l
c
3
fD
3
CD
3
g
3_
3
t u
3.
QJ
CT
>
ro
SS
Nl
O
n
SS
N l
O
>
CT
CT
fD
CT- <
3 E
I I
3
QJ
3
3
3
- TO
I I
Nl
fD
^ n
NJ
o
p
73
CD
3
n
c
3
tD
o cr
y ^
11
SR as
N l N l
O O QJ
o n
tD
% 3
g CT
OJ
^
fD
<
3
t u
3
3
3 '
TO
<
^
Nl
o
o
0
f l
c
3
tD
3
CD
3
g
3 _
3
01
3.
01
CT
I
ro
SS
NJ
o
(-1
^
NJ
o
>
CT
CT
fD
3
3 .
X
SR
ISJ
CT- <
3 i n '
I I
3
t u
3
3
3
TO
f
rt,
f D"
on o
SR n
NJ
3 O
i l
> 3
as cr
S ^
X O
C OJ
i l
i ?
f l
as
Nl
O
c
QJ
Q .
- fD
rt - <
i l
CT 3
3 TO
51
i i
S R
E 3
s t
8 g
El
- h O
01
3 .
sr
r
f l 5 ro
SR o-
NJ 3
I I
s i
3
3
3 '
TO
>
CT
CT
fD
9: 1
Iff
o Z>
0 0 C ;
SR o
Nl
3 o
m 3
l i
i l
rt, sP
. ^
3 NJ
I I
ISJ 3.
g SS
Is
S 3
2 3'
m TO
= CT
SS 3
NJ CL
fD
01
it
s B
ro <
SS
TO NJ
fD O
o
b A
CL
3
fD
3
o
3
g
3 _
3
QJ
3.
QJ
CT
5
ro
SS CT <
NJ 3
I I
NJ -
o
>
3
CT
tD
3
3.
3
QJ
3
3
3 '
TO
g: (
fD
SS n
NJ 4 /
3 o
E R
QJ C
I ^
^ ^
o
>
CT
il
^
N l
O
OJ
o n
tD
3
3 '
TO
l a
^
SR o"
I I
i l
9 =
3
3
: ^
3. <
q SS
d . NJ
I f
C
3
fD
3 CD
3
g
3 _
3
QJ
1 .
QJ
CT
5
ro
SS CT-
I I
II
fD 3
3 TO
9: f
S f
O > ~
LU > ^
p
^
O
f l
c
3
tD
3
^
N l
O
QJ
3
3.
^ SR
NJ N l
o o
o n L n
SR %
N l rt_
3
TO
^
SS
Nl
o
o
LO
b
3 .
OJ
3 .
fD
<
01
3
3
3 '
TO
<
^
ISJ
O
CD
O
f l
c
3
tD
3
o
3
g
3 _
3
01
3 .
01
I
ro
tD
3.
CT- <
3 i n '
3 .
fD
<
3
01
3
3
3 '
TO
f
S
o >-
NJ C r
g n
& g
f - l n
sl
2 %
I I
ISJ 3.
R g
X O
> L n
S 3
st
9 ^
s^ ^
lt
.s i
M ^
o era
l l
s ^
o
I D
O
CD
O
f l
c
3
fD
3
o
o
g
3 _
3
eu
3.
QJ
CT
>
ro
SS CT- <
Nl
t u
3 .
n ^
^
Nl
o
>
-CT
-CT
tD
3
3.
3
QJ
3
3
3 '
TO
f
^ ^
LU Z >
n
& g
L n f l
L n c
% 3
SS g
S I
n SS
II
fD NJ
^ 8
NJ fD
O
5
> TO
73 -
73
i n
r ^ CT
L n
-b
3. ,
rt, . <
01
^
fD
01
3
3
3
TO
<
^
NJ
o
CD
O
f l
c
3 fD 3
CD
O
g
3 _
o
01
3.
OJ
s
QJ
CT
cn
SR o"
I I
II
fD 3
3 TO
9: I
5 ^
0 > -
I - *
g n
6 g
^ 2
35 3
Q 5
NJ cr
^
1 g
k ^
rt, NJ
o
o n
fD
3
TO
01
Q.
fD
-<
3
OJ
3
3
-<
SS
ISJ
o
o
3
f l
c
3
fD
3
CD
3
g
3 _
3
OJ
C3.
eu
CT
I
ro
Nl
o
o
4 ^
o n
LU
4 ^
O
"o
+
LU
SR
NJ
O
n
as
NJ
o
>
CT
CT
fD
3
3.
CT- <
3 E
I I
3
OJ
3
3 ^
3 '
TO
9: f
X
SR
NJ
o
LU
SR
NJ
O
SR
Nl
O
n
tD
3.
f i '
SS
N l
o
ro
c
3 .
fD
3
-b
3.
P
^
O
n
c
3
tD
3
i n
SR
N l
O
t u
3
3.
SS
ISJ
O
L n
fD
3
TO
01
^
fD
<
3
01
3
3
3 '
TO
<
^
Nl
o
CD
0
f l
c
3
tD
3
o
o
g
3 _
3
01
3.
01
CT
' #
ro
N l
LU
N l
NJ
O
en
on
0 0
M
0 0
'ci
+
0 0 oo
o
3
t u
3
3
3 '
TO
9: f
X rt,
sp
K n
o >
ISJ -Cr
p
^
3
f l
c
3
fD
3
^
NJ
^
z
cn
>
^
NJ
o
T3
(0
SS
N l
o
QJ
3
3 .
SR i<i
M 1
Tl
O
3
TO
SS CT- <
S g.
^
Nl
o
>
-CT
CT
fD
3
SR
Nl
O
t u
3
3.
SS
NJ
o
01
3 .
SS
NJ
o
L n
^ tD
^ <
^ E
S I.
E era
1 |
O Nl
3 . O
fD
O
3
g
3 _
3
01
3.
01
CT
>
ro
SS CT
NJ 3
as <
II
fD
3
3 .
x'
SS
ISJ
o
NJ
00
SR
3
TO
<
fT
p
s g
II
s ^
o n NJ
I
if.
01 TO
^ ^
r" CT
11
fD
<
as
3
3 ^
3 '
TO
<
SR
Nl
o
o
3
f l
c
3
tD
3
o
3
g
3 _
3
01
3.
01
CT
>
ro
^
NJ
o
CD
SS
NJ
o
>
3
3
fD
CT- <
3 E
I I
3
QJ
3
3
3
_< TO
9: f
X rt,
SP
^
vl
SS
Nl
^
ro
O
fD
3
^
N l
O
ISJ NJ
ISJ O
QJ
SS
SS
NJ
o
ISJ
O
o
^ on
L n fD
CT- <
QJ
3.
fD
as <
fD
3 .
3
3.
as ^
3
fD TO
as -SCL
S ?
NJ 01
- 1
QJ
3
3
3 '
TO
<
^
NJ
O
o
3
f l c 3 tD 3
o
3
g
3 _
3
OJ
3.
OJ
CT
B
ro
NJ
o
>
3
CT
fD
3
3
QJ
3
3
3 "
TO
9: f
X rt,
sP =
s
2 ^
g p
ISJ
O
CD
0
f l
c
3
fD
3
S
SR
N l
O
NJ ISJ
N l O
QJ
3
3.
SS
ISJ
O
L n
^ 3
fD TO
as -i?
S ^
LU eu
3 .
E.^
QJ
3
3
3
TO
<
SS
NJ
o
CD
3
f l
c
3
fD
3
CD
O
g
3_
3
OJ
3 .
t u
CT
'a.
5
ro
SR o"
ISJ 3
. 8^
^ <
l i
"CT
fD
3
3 .
3
TO
f
fD
s g
I i
CD 3
5 cr
SR as
NJ ISJ
O
01
3
3 .
SS
ISJ
O
on
fD
3
TO
i l
NJ fD
8 <
3
OJ
3
3
3 3
n 0 0
SR 7
<
SS
NJ
11
tD
3
<
SR
NJ
o
g
b
3.
O
3
g
3 _
3
QJ
3.
QJ
CT
I
3.
$
ro
3
fD
cr
tu
3 .
fD
-<
3
OJ
3
3
3 '
9:
X - h
sp
b
g n
S g
l i
11
Nl ISJ
11
as SR
NJ ISJ
i l
- '
; TO
SS
^ ?
01
l l
o 01
g
9 00^
8 ^
Ln NJ
TO o
CD
^ R
CT
CL
O
O
g
3 _
3
01
3 .
01
CT
>
ro
SR o"
Nl 3
- l
as <
II
ID 3
3 TO
9: f
X rt,
sP
S n>
o ^
t -
g p
SR o"
Nl 3
-Sf
as <
o
o
f l
c
3
fD
3
>
n
Q rt
s ^
n
3
N l
o
t u
fD
I s
| 3
CD 5'
3 ^
e^ ?
fD QJ
as 9:
NJ fD
o <
>
3
fll_
-<
i n
-CT
3.
3
QJ
3
3
3 '
TO
-<
SR
NJ
O
D
3
n
c
3
tD
O
3
g
3 _
3
QJ
3 .
tu
CT
>
ro
Nl
o
>
CT
CT
tD
3
3 .
X
SR
NJ
o >
i - C ;
%c
s g
l i
3
OJ
3
3
3 '
TO
I
t D"
SR
NJ
o
P tD
as <
CT- <
tu
3 .
fD
3.
fD
3
^
ISJ
O
n
SS
N l m
' ~' 3
3 .
SR
NJ
O
NJ o n
0 tD
1 5'
-E' %
CT ^
& ^
If
QJ OJ
TO 3
m_ 3
"E. ^
-<
SS
ISJ
o
CD
o
f l
c
3
tD
3
CD
3
g
3_
3
QJ
3.
OJ
CT
5
ro
NJ
o
>
3
CT
fD
3
3
IU
3
3
3 '
TO
9: I
X - h
sp
K
CJ
a S
l i
I I
a s
Nl
TO
fD
SS
ISJ
o
01
3
3.
SS
NJ
O
i n
t o
9 3.
o. %
3. \
fD CT
1 |
-a ro
3. <
t u
3
3
3 '
TO
-<
^
ISJ
O
CD
3
f l
c
3
fD
3
CD
O
g
3_
o
01
3 .
01
CT
5
ro
^
NJ
O
CD
^
NJ
o
>
3
CT
fD
CT <
3 E
I I
3
QJ
3
CT- <
3 TO
9: f
tD
^ ^
NJ
cn
il
3 . 3
as cr
S g
> o
^ ' OJ
i l
L n NJ
?. S
^ %
B#
o
o
<
fD
OJ
C L
fD
<
1 3
D QI
9; I .
3
TO
<
^
Nl
o
o
3
n
c
3 fD 3
o
3
g
3 _
3
01
3.
01
CT
5
ro
s g. a
5?^
II
3 ^
9: f
X rt,
Sp =
K f=
^ {2
NJ
o
CD
3
f l
c
3
fD
3
t n
SS
E
t-* 3
sP 3.
OS vp
NJ ds
ISJ
O
on
rt
3 '
TO
O
QJ
3
3.
SR
NJ
O
0 0 . i n^
00 3
as 3.
S ^
E
g i.
O 3
9&
I I
^
8i
f i
3 . 3
o
0
g
3_
o
eu
3.
QJ
CT
>
ro
NJ
4^
LU
NJ
O
L n
I D
NJ
on
C)
+
0 0
NJ 3
-SS
as <
s E
3
3
CT <
>
-CT
CT
tD 3
3 TO
9: f
X rt.
tD
SS
NJ
o c-
Lo < ;
SR c-l
NJ < ,
3 o
2? S
II
I'i
O
3
f l
rt
5'
3
3.
SS
ISJ
o
L n
fD
3
TO
3 ^
3 . CT
OJ
^
fD
<
3
OJ
3
3
3 '
TO
<
SR
NJ
O
CD
0
f l
c 3 fD 3
o
3
g
3 _
3
01
3.
CU
CT
5
ro
SR o"
01
Q.
fD
<
as
N l
o
>
CT
CT
tD
9: f
X
3
QJ
3
3 ^
3 '
TO
tD
TO
fD
3.
SR
N l
O
n
<
9
fD
P
^
3
f l
c
3
fD
3
%
NJ
O
01
3
3.
SS
on rsj
O
L n
fD
3
3.
3
TO
01
^
fD
<
3
OJ
3
3
3 '
TO
1
<
SR
N l
O
CD
0
f l
c
3
to
3
CD
3
g
3 _
3
01
3.
01
CT
' a.
5
ro
SS
NJ
o
CD
SS
NJ
o
>
s .
3
TO
cr <
3 E
I I
3
QJ
3
3
tD
9: f
tD
SR
NJ ^
o Z>
NJ
#c
s g
o 2
< 3
i l
l i
tu tu
" g.
B 9.
9 era
SS -iC.
N l CT
2 3
o
n
>
b
3.
fD
OJ
3
TO
<
SS
N l
o
CD
O
f l
c
3
fD
3
o
3
g
3 _
3
OJ
3.
OJ
CT
5
ro
CT <
OJ
3.
. tD
as < N l
O
>
CT
CT
fD
3
3
eu
3
3 ^
3 '
TO
9: f
X rt,
SP
K m
o i >
N l - <
SR n
N l < ,
3 o
? 2
tD
3
%
NJ
O
OJ
3
3.
SS
NJ
O
L n
fD
3
TO
QJ
^
tD
<
3
Ol
3
3
3 '
TO
-<
SR
ISJ
O
CD
0
n
c
3
tD
3
o
0
g
3 _
3
QJ
3.
OJ
CT
W
5
ro
SS
N l
o
CD
SS
N l
O
>
CT
CT
fD
fD
3 .
X rt
s P
d s f t ,
CT- <
3 m
3 .
tD
-<
3
01
3
3
3 '
TO
f
N l
3 O
N l
o
ro
O
z
m
SS
N l
o
N l ISJ
o
3
f l
c
3
tD
3
%
o
OJ
3
3.
as %
N l
^
NJ
O
O
L n
rt rt
5'
fD TO
SR
s ^
l_k OJ
9:
CT fD
' 1
QJ
3
3
3 '
TO
<
^
NJ
O
O
O
f l
c
3
tD
3
o
3
g
3 _
3
tu
3.
OJ
CT
>
ro
SR o"
NJ 3
as <
l i
tD 3
3 TO
9: f
X rt,
s P =
S
<3 Z>
t-* "C;
as n
ISJ
D
3
n
c
3
fD
3
3 . ^
Sg
^ K
a g
C O
S
l l
OJ
^
fD
<
3
QJ
3
3
3 '
TO
<
SS
NJ
o
o
0
f l
c
3
fD
3
o
3
g
3 _
3
01
3 .
01
CT
>
ro
as
NJ
o
CD
SS
ISJ
o
>
T3
CT
fD
CT <
eu
a.
tD
<
3
QJ
3
3 ^
3 '
- TO
9: f
X rt,
s P
^ n
13 Z>
C l \
SR n
o
o
n
c
3
fD
3
s ^
P SS
73 NJ
S g
NJ 3
O 3 .
8 g
z o
o
3 S
-b 3'
3. TO
QJ
3 .
tD
<
tu
3
3
3 '
TO
-<
SS
NJ
o
CD
o
f l
c
3
fD
3
CD
O
g
3 _
0
eu
3.
OJ
CT
I
3.
5
ro
SS
NJ
o
CD
k
NJ
O
>
CT
CT
fD
CT <
3 E
3. rt
fD
<
3
tu
3
3
3 '
w TO
9: f
fD
0 0
as
NJ ^
o Z>
ssl \
SS n
NJ
o
3
f l
c
. 3
SR n>
s ^
3 SR
rt ISJ
K g
i l
L n
n
SR ..
ISJ rt
O 3.
L n 3
~ 0 0
tD 1 ^
TJ 01
3 . Q .
^ fD
<
3
tu
3
3
3 '
TO
-<
SR
N l
o
CD
O
f l
c
3
fD
3
o
3
g
3 _
o
tu
3.
OJ
CT
3.
5
ro
SS CT
NJ 3
p f
as <
II
tD 3
3 TO
9: f
X rt.
tD
CT
3.
SS
NJ
O
p> <:
SR n
N l
o
o
o
f l
c
3
fD
3
S
ISJ
O
01
3
CL
SS
N l
O
L n
fD
3
TO
01
^
tD
<
OJ
3
3
3 '
TO
-<
SR
N l
o
CD
0
f l
c
3
fD
3
o
3
g
3 _
3
tu
3.
01
'Z
5
ro
N l
LO
LO
NJ
O
O
41^
on
0 0
cn
LU
O
NJ 3
3.
QJ
3
3
3 '
TO
fD
3.
^ CT <
O
CD
as
N l
o
>
CT
CT
fD
3
9: f
X rt,
SP
K
o Z>
on <;
as f-l
NJ
CD
O
f l
c
3
fD
SI
73 ISJ
^ g
NJ
O
3
_ 3 .
n SS
N l
O
i n
fD
CT 3
3. TO
01
^
tD
<
3
QJ
3
3
3 '
TO
<
^
ISJ
O
O
3
f l
c
3
fD
3
o
3
g
3 _
3
tu
3.
OJ
CT
SS
NJ
O
o
^
NJ
o
>
3
3
fD
3
3 .
X
SS
ISJ
o
N l
Ln
SR
N l
o
01
3.
3
g
SS
NJ
o
T l
3
S
N l
o
3
3
as
N l
O
3
CT <
3 i n'
I I
3
tu
3
3 ^
3 '
TO
f
P
^
3
f l
c
3
fD
3
^
NJ
O
01
3
3 .
^
NJ
O
L n
fD
3
TO
SR
N l
o
73
CO
CT
3
CT
3.
01
^
tD
<
3
QJ
3
3
3 '
TO
5
ro
<
^
NJ
o
o
o
n
c
3
fD
3
CD
0
g
3 _
o
tu
3.
OJ
CT
5
ro
ISJ
f
_ v j _
NJ
O
O
O
on
b
v j
"5
+
LO
fD
3.
CT- <
3 i n'
3.
tD
<
3
tu
3
3
3 '
TO
f
p
O
3
n
c
3
tD
3
^
NJ
O
01
3
3 .
SR
NJ
o
on
fD
3
TO
01
^
tD
<
t u
3
3
3 '
TO
<
as
Nl O o 3 n c 3 fD 3
CD
3
g
3 _
3
01
3.
QJ
CT
cn
OJ
3
3
3 '
TO
SR ^
NJ 3
.S
as <
S 3
>
3
3
fD
9: <
X rt,
sP
5 !R
o Z>
I D - v ;
as o
ISJ
3 o
l i
fD fD
< =
as %
CT <
fD
3.
ISJ
^
ISJ
SS
ISJ
O
OJ
i l
NJ fD
> TO
- < ^ n
SR CT
s l
O ID
i i
d
c-l 3
l l
NJ ISJ
O O
11
X 3
g cr
s |
Nl %
O 3_
i l
^
>
ro
fD
NJ
4
Nl
O
O
4a,
on
I D
OJ
00
+
0 0
SR ^
NJ 3
. 8^
as <
NJ
o
>
3
CT
fD
3
CT <
fD
3.
3
OJ
3
3
3 '
TO
9: f
X rt,
sP
K m
C3 Z>
NJ Cr
;c
s g
f l
c
r 3
L n fD
3
SS
as NJ
NJ
O
O
tu
3
3.
^
NJ
O
^
3
TO
Nl
g
3
OJ
% ^
- 1 - I
. < OJ
"r- 3 .
3
QJ
3
3
3 '
TO
<
SS
ISJ
o
13
0
f l c 3 fD 3
o
3
g
3 _
3
tu
3.
OJ
CT
5
ro
SR
NJ
o
CD
SS
NJ
o
>
CT
CT
fD
3
3 .
X
^
ISJ
O
0 0
SS
NJ
O
cn
OJ
^
Oj '
CT
tu
3.
^
ISJ
n
SR
NJ
O
3
SS
Nl
o
73
fD
s
3
S
NJ
O
SR
NJ
O
cn
SS
ISJ
O
^
tu
<
SR
NJ
O
O
LD
b
CL
tD
3 .
CT <
3
^
tD
<
3
01
3
3
3 '
TO
f
p
o
o
f l
c
3
fD
3
%
ISJ
O
QJ
3
3.
^
ISJ
O
on
tD
QJ
^
fD
-<
3
QJ
3
3
3 '
TO
<
^
NJ
O
13
3
f l
c
3
fD
3
o
3
g
3 _
o
t u
3 .
eu
CT
>
ro
o
>
T3
cn
ID
n.
S[
.1
P
3
8
3
I
01
CT
+
^
ro
on
a
CT
O
cn
OJ
3;
n
fD
3
8
3
I
ID
TO
OJ
TO
rt
6
3
+
^
ro
L n
o
>
o
cn
o
3
+
H
>
ro
L n
00
cn cn
o
3
+
H
>
ro
Ln
T3
zr
o
cn
n
fD
3
n
O
3
I
fD
TO
TO
rt
5'
3
i
ro
i n
cn
o
3
i n
-o
to
01
=t
n
fD
3
f l
o
ID
TO
OJ
3
<
ID
TO
01
o
3
>
Q.
3.
3 '
<
fD
+
^
QJ
m
5]
H
O
t - 1
+
^
+
^
ro
L n
+
ro
o
>
D
3
C3.
fD
X
b.
o
cn
TO
QJ
3
o
3
o
fD
OJ
3;
n
fD
3
n
O
3
1
ID
TO
Ol
3
<
fD
TO
QI
o
3
>
CL
3
5'
<
fD
+
3
<
ID
O
3
+
H
o
e-l
+
cn
OJ
=t
n
tD
3
n
O
3
1
fD
TO
01
>
3.
3
OJ
CT
ID_
Q.
O
n
O
>
o
i-
o
M
NJ
4^
cn
LU
00
NJ
o
4^
v j
in
N l ^
f ??
> %
I 3
t 5'
i l
CT 3
? ^
I 8.
O OJ
i n (/,
o
>
Ln
00
N l
Ln
NJ
o
^
v J
cn
01
=t
f - l
fD
3
fD
TO
01
3
<
fD
o
3
OJ
as
3
<
fD
TO
rt
5'
3
+
^
ro
L n
>
ro
+
ro
"H
>
ro
+
03
~+
>
" C
a
fD
3
3.
CT
fD
+
n
<'
+
(~i
c
Ol
-o
fD
n
Ol '
+
ro
01
c
+
>
m
+
+
c
+
+
o
c
o
+
c
3
CT
ns
o
01
3
ID
1/1
ID
<
ID
cn J>
n
6
3
01
=fi
f l
fD
3
m
O
3
fD
TO
o
3
QJ
CT
+
+
m
3
OJ
5'
TO
+
+_
3
<
ID
TO
rt
5'
3
+
O
?
D
O
z
c
3
CT
f D
N l N J N J l - > l - > i - > M l - M l -
N l M O L O 0 0 v j
en
Ln f OO N J
O
-
M l - > l - > | r t M M
(->
l - M l - >
o
O
o
0
o o o
0
o
O O
I D
> > > > > > > > > > >
H
a
o
T 3
o o
TJ 3 T3 D
o
3
g
t ;
M l - l - > M M l - | r t I - * M l - > ro
o
O O 0 O O O 0 O O O
M l - l - > l - > l - > l - > l - > l - > I - i t - i t -
Nl
I SJ I SJ I SJ I SJ N J I SJ I SJ N J I SJ I SJ
Ul i n
in
Ln
Ln Ln Ln Ln
Ln
Ln Ln
;vl
V I
en t n un Ln 4^ 4^ 4^ 4^ 4^
oil t-.> 4^ M
in Ln Ln Ln
L O isJ
4 i O 4^ Ln L O M 0 0 4 i - > I D
on
l - > i - > I - " i - M M M M M i - > t - * on
L U L O U J L U L O OO L U L O OO OU L O
to
M M M y-^ [- l - M
- (->
y-^ i - >
2
Nl I SJ N J N J N J N J N l N l N l t SJ N J to
6
4
4 1 4 1 .
4& -p. 4^
o
O O 0 O O
o
0 O O O
f 4 4^ 4 i 4^ 4^ 4^ 4a. 4^ D
v j v j v j v j v j
^
v J v j v J
^
v j
in in
cn
in
en
in
en en
cn
cn en
> s
1^ ^ '> S
cn
> g ^ m
>
> ^
J>
f? H S' H ^ H g H H
1 " i ^
5 "
: H
E " 1 ^
rt
t n i n
O
>
~v
i n
3
O C 3 3 3
o
3 3 C 3
TO
TO TO
TO TO TO TO TO TO TO
0 1 01 OJ 01 OJ 01 01 01 OJ Ol
3 3 3 3 3 3 3 ^ 3 3 3 3
FI'
FJ'
0 1 01 01 01 OJ 01 01 01 OJ OJ
rt
5 5'
3
5' 6' 5' 5' 5' 5' 6'
3 3 3 3 3
> U l " ^ In"
rt
"in"
3 ^
^
_ 3 ^ 3 ^
^
o
3
o
3
c'
o
o
3 3
o o
n>
f D t D f D 3 f D I D I D I D I D I D
n n m n n n n n
O f l
S[
Ol ' Ol ' t u
T3
OJ fll' Ol ' Oj ' oi' Oj '
i n f D
0 1 OJ t u OJ 01 OJ t u OJ OJ OJ
^
^
,5 .5
OJ
.5 .5 .5 .5 3 .5
^
.> .> >
QJ
.> > >^ > >
r?
n n n f - l n n f - l n "n
10 I D I D f D f D I D I D f D f D I D
3 3 3 3
,>
3 3 3 3 3 3
rt
1-1
n m
0 f l 1-1 f l
n
f l
n
f l O
O O 3 3 f D
o
C 3 O 3 3
3 3 3 3
3
3 3 3 3 3 3
r-
1 I
(
1 i i
fO
f D f D f D
o
f D f D f D f D f D f D
TO TO TO TO TO TO TO TO TO TO
01 OJ OJ OJ
3
01 OJ 01 OJ OJ 01
\
r^
V j
to"
V j
r^
\ \
3 3 3 3 TO 3 3 3 3 3 3
< < < <
01
< < < < < <
to fD I D I D I D I D f D f D I D t D
rt
3
TO cio' TO' ero'
<
ciq'
cio'
era' ero' cio' era'
0 1 01 01 01 t D 01 01 OJ 01 OJ OJ
rt
5" 6 5' 5' 5' 5'
0 '
5' 5' 6'
3 3 3 3 3 3 3 3 3 3
t n
-n -n -n -n 3 -n -n -n -n -n -n
01 OJ OJ OJ QI 01 OJ OJ OJ OJ
01 OJ 01 OJ 01 OJ 01 QJ OJ OJ
CT CT CT CT
-n
CT CT CT CT CT CT
01
3
5"
3 " 3 "
5
3 " 3 "
5" 5" 5
< < < < < < < < < <
10
I D f D
fD f D I D fD fD f D f D
i n
rt 3
TO' cio' TO' TO'
<
i>5' cio' lio' eiq' tio' eiS'
01
01 OJ 01 I D OJ 01 OJ OJ OJ OJ
rt
o
3
5' 5' 5' 5'
0 '
5' 5' 5'
3 3 3 3 3 3 3 3 3 3
+
+ + + + + + + + +
H H H H H H H H H H
> > > > > > > > > >
ro ro
ro ro ro ro ro ro ro ro
on
O l Ln on
i
Ln Ln Ln on Ln Ln
d
-o -a
T3 - 0
>
T 3 T )
-a -o
a
T3
CT CT CT CT
ro
CT ZT CT CT CT CT
o
3 3 3 Ln 3 0 3 3 C 3
rt
o
o
3 3 3
o
3 0 3 3
o
C
j n
CT
o
1 ^
l - > | r t l - M l - M l - t - | r t
O O 0 0 3 O 0 0 O
o o
, o
O 0
1
| 0 , 0 0
o
1
| 0
' o O 0 0 o ' 0 0 o o o
o
O 0 0
o
0 0
o o o
NJ I SJ N J N J N J I s J N J | r t M M
I D 0 0 ; v l
m Ln [-> 0 L O 0 0 v J
o
3 3 3 -o T l 3 T 3 T 3
a
TO TO TO TO
cn
TO TO TO TO TO TO
o
z
C
3
CT
10
LU LU LU OO NJ N l NJ NJ ISJ NJ ISJ
LU I SI l->
o
I D 00 v j
cn on
LO
0
01
l- K-" l-> l-> l- l-> M l-> i-> l- l->
O o
O
o o o
O
o O 0 0 t o
> > > > > > > > > > >
H
o
T3 T3
3
13 T3
3 3 3 13 13
g
l-> M l-> t- M l- l-> h- l- l-
ID
o o
O
o O o
O
o 0 0 0
M
l- l-> M
!-.
M l- l- l- l-> l->
LU LU LU LU LU N l N l N l N l ISJ NJ
b b b b b Ln Ln Ln Ln Ln Ln
t-^
o o o
t o I D 00 00 v j v J
Ln
ISJ
Ln
oi l
b iu y^ 4^ ISJ
Ln Lo
4^ cn cn
1-^
on
00 Ln LO
cn
v j v j
i-> i- i-> 1- * | r t M M l-> t-> t- l-> U l
LU LO U l
oo
oo LU LU U l 00 00 LU t o
y-^ i-> j - >
f- [-
j - " [- M
(-.>
y-'
2
N ) NJ i s i NJ N l NJ f s l i s i NJ tSJ i s j ID
6 4 4 4 f x 4 4 ^ f 4 4^
o O
C3
o o o
O
o
0
0 0
4& 4 4& 4^ 4^ 4 f i * 4 4 0
v J v j v j v J v j v j v J v j
^
v j v J
i n i n i n cn in en i n in cn cn in
>
^ > 2 ^ ^
s
> "J^ S
> >
>
f? H S H ? H S H
i "
5 ^ 5 "
1 "
5 "
1 " 1 "
5
t n
0
" v . 3
O 3
3 3
3
3 3 3 3 3 3
TO TO
TO TO TO TO TO TO TO TO TO
01 OJ OJ OJ OJ OJ OJ 01 OJ OJ 01
3 3 3 3 3 3 3 3 3 3 3
N' N'
01 01 OJ OJ OJ 01 OJ 01 OJ OJ OJ
rt
o 5' 6 3 3 5' 5' 5' 5' 6' 0'
3 3 3 3 3 3 3 3 3 3 3
V v
\
t n i n i n
T3
TJ
3
T l 13 T3 T I 13 13 13 13
10
fD ID tD ID ID ID fD fD ID ID
n.
f l n n o n n n n 0 0
m' s
Ol ' OJ OJ OJ 01 Ol ' as'
S'
fll'
i n
rt
01 01 01 01 Ol OJ OJ OJ as OJ OJ
^
g
^
3 .5
3
^
^
.5
^
^
> . > ^ > > > , > > > >
r? n f l n f l n n f l f l f - l f l
10 fD fD fD fD fD ID fD fD tD fD
3 3 3 3 3 3 3 3 3 3 3
rt
f l f l n f l n f l n f l f l f l f l
o
3 3 3 3 3 3 3 3 3 0
3 3 3 3 3 3 3 3 3 3 3
r
r - I r - i i I r - i r -
10 ID ID fD fD ID fD ID fD fD tD
TO TO TO TO TO TO TO TO TO TO TO
01 OJ 01 01 OJ OJ OJ 01 OJ 01 t u
, '. \ \ \ \ ' \ - \
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
ID
fD fD fD fD fD ID ID fD ID ID
i n
rt
do' cio' era'
( j o'
cio' eio' ero' eio' eio' do' da'
01 OJ OJ OJ QJ OJ 01 OJ OJ 01 01
rt
5' 6' 5' 5' 5' 6' 5' 6' 5' 5' 5'
3 3 3 3 3 3 3 3 3 3 3
i n
.
n
- n - n
n
- n - n - n - n - n - n - n
Ol OJ OJ OJ OJ QJ OJ OJ OJ OJ 01
01 OJ 01 OJ OJ OJ OJ OJ QJ OJ 01
CT CT CT CT CT CT CT CT CT CT CT
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
n
ID fD fD fD fD ID fD t o fD fD
M
rt
TO cio' eio' do' cio' do' cio' cio' cio' do' do'
01 01 01 cu t u OJ t u OJ t u OJ t u
rt
O 3 5 3 3 5' 5' 3 3 5' 5'
3 3 3 3 3 3 3 3 3 3 3
+ + + + + + + + + + +
H H H H H H H H H H H
> > > > > > > > > > >
ro ro ro ro ro ro ro ro ro ro ro
j / i Ln Ln L n j / i
iC
U l Ln o n Ln Ln
-0 -o T3 -e3 T3 T3 T3 -o 13 - 0 - 0
CT CT CT CT CT CT CT CT CT CT CT
o o o o
3
3 o 3 3 0 0
rt
O 3
3
3
O
3 3 3 3 3 0
M
j n ^
l- M M M I -l l-> l-> l-> t- M M
o
O
o
O O O
O
O
0 0 0
1 1 1 1 1 1
| 0
1
| 0
| 0 | 0
' o ' o o ' o O ' o o o 0 0 0
o o o o o o o o 0
0 0
LU LU LU LU LU LU LU LU 00 LO NJ
I D 00 v i
en
on
4^
UJ N l M 0
on
o
o
T3 T3
o o
T3 T3 13
0 3
TO
TO TO TO TO TO TO TO TO TO 3
<
Z
c
3
CT
ID
t
4 i UJ LU LU LU 00 LO
t
U l NJ I - ' O LO 00 V I
cn
Ln
0
01
M | r t M M M M M M M M l->
o o o o o o o
O O O O tD
> > > > > > > >
>
> >
H
13
13
a
13 TJ 13 T3 T3
c
13 T3 3"
10
3"
10
H" l- i- l-> | r t l- l- l- | r t l- l-
3"
10
o o o
O
o O
O
O o O
O
M l-> l-> M M M l- M M i-^ l->
LU LU LU OO UJ LU LU LU LU LU LO
b b b b b b b b b b b
v J
en on
Ln Ln
4^ 4^
LU LU oo ISI
b NJ Ln 4^ t si
Ln
NJ
Ln
oi j
b
f sl
t- v J
4^
00 O
.>
cn
I D f oo l->
i- l-> i-> i-> l-> i-> I - " l-> l->
!-.
l-> U l
LU LU LU oo LO 00 LU LU U l LU LU ID
l - M [ -' y-^ M j - " M
[->
M j - " l->
<
10
N) i s j i s i i s j N l i s j f sl k l N l i s i ISJ
<
10
4& t
4 ^ 41^
4=* 4
O
4&
o o o O o
O
O
O
o O O
4&
f f x 4^ 4=. 4^ 4 ^ i> f
^
4^
"O
v J v j v l s J v l v j s J v j v j v j v J
in i n i n i n i n cn in in i n i n in
>
8
+
J
u
1^
cn
^
Z?" 2
"i^ "i^ ^ "l^
>
S H S H
8
+
J
u
f?
H
^ ' H
H g H ff H ff H ff H ff H ff H
a
ID
3
3 8
ID
3 3 C
3 8 8 8 8 3
TO TO
TO TO TO TO TO TO TO TO TO
01 01 OJ OJ OJ 01 OJ OJ OJ t u 01
3_ 3 ^ 3 3 3 3 3 3 3 3 3
H'
OJ OJ OJ OJ OJ QJ 01 OJ t u t u
rt
O
5'
3 3
5' 6'
8
5' 5' c' a'
3 3 3 3 3 3 3 3 3 3 3
\ i n
o
- D
3
T3 13 13 13 13 13 TJ T3
ID ID fD fD fD fD fD ID ID ID fD
f l f l n f l n n O o f l f l n
S'
Oj ' Oj ' Oj ' Ol ' m' OJ 01 Qj ' Oj ' Oj '
rt
01 OJ OJ OJ OJ OJ OJ 01 01 OJ OJ
^
^ ^ 3
.5
^
.5
3
3 .5
> ,> .> >
>
>
> ,> .>
> > > > >
>
>
r? n n f - l n r i n n n n C-l
10 fD fD fD ID ID fD ID fD fD ID
3 3 3 3 3 3 3 3 3 3 3
m m
f l f l n f l f l f l f l f l 0
o 3
3 3 O 8
8
8
8 a a
3
3 3 3 3 3 3 3 3 3 3
I f - 1 I 1 r 1 r - I i
10 ID fD ID ID fD ID ID fD fD fD
TO TO TO TO TO TO TO TO TO TO TO
01 OJ OJ OJ OJ 01 OJ OJ OJ OJ 01
- v ^
\ \ . \ , \ .
Vj .
\
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < < 10 ID fD fD ID fD ID ID fD fD fD
t n
rt rt rt
do' do' do' do' do' do' do' da' do' do' do'
01 OJ 01 OJ t u OJ 01 OJ OJ 01 01
rt
o" 5' 5' 5'
C 8
5'
8
6 5'
8
3 3 3 3 3 3 3 3 3 3 3
j n ^
n - n - n - n - n n - n - n - n
01 OJ OJ OJ OJ OJ OJ 01 OJ OJ OJ
01 OJ QJ OJ OJ t u OJ OJ 01 OJ t u
CT
^
CT CT CT CT
^
_CT
^
= r CT
5" 5" ro 5 5" 5" 5" 5" 5" 5" 5"
< < < < < < < < < <
n
fD fD fD ID fD fD fD fD ID
tn
rt
U l
era' do'
U l
do' do' do' do' do' do' do' do'
01 01
ro
OJ QJ OJ OJ 01 QJ OJ OJ
rt
5"
6'
ID'
5' 5' a' 5'
8 8 8
5'
3 3
?
^
3 3 3 3 3 3 3 3
+
+
?
^ +
+ +
+ +
+ + +
H H
?
^ H H H H H H H H
> > > > > > > > > >
ro ro
Ct
ro ro ro ro ro ro ro ro
U l i n
Ct
L n L n U l L n Ln U l Ln Ln
m
o
-a Z
T3
-o -o
13 13 T3 -e3 - 0
CT CT
+
CT CT CT CT CT CT CT CT
8
o
3 C 8 8 8 8
a a
3
3 3 3 O 8 8 8
a a
3
| r t
-
3 .
I - * l-> l-> l-> l-> l-> M M
O
O
3 .
O O O
O o
O
o
0
, o
| 0 3
TO
O
o o o
1 1 1
| 0
' o o
3
TO
O o o o ' o ' o ' o 0
o o oi o o o o o o o
0
4 4^
oi
4^ 4^ 4& 4^
4 ^
4 4
I D 00
C3.
v j
en
Ln
5
LU ISI l-
0 C3.
-a
13 13
D
TJ 13 13
o
13 13
TO TO
ID
f l
TO TO TO TO TO TO TO TO
ID
f l
+
z
C
3
CT
ID
Ul Ln Ln Ln Ln Ln Ji * 4 4 4^ f
on 4> oo NJ t- O LO 00
^ cn on
D
a
t
M l-> l-> l- M M l-> l- l-> M M
D
a
t
o
O
o
0 O O 0 0 O 0 0 tD
> > > > > > > > > > >
H
o
13 13 13
o
13 13 T3
3
13 TJ
3' 3'
M l- l- l- l- M l- l-> I - * M l-> to
o
O O 0
o
O 0 0 0 0 0
M l-> l-> l- M l- l-> M l-> M
(->
Ul 00 LO 00 OO LU LU LU 00 LU LU
y^ i-j
b b b b b
Jf
i-> i- 0 O
o
LO LO 00 00 v J
M
l-j b Ln
LU y^ 4). y^ 4i> l - j
Ln
on 4^ cn
Ln 00 41. I D Ln
en
l- i-> M i-> i- i-> M l-> i-> l-> t - * U l
oo
LO LO 10 oo oo LU LU 00 00 LU tD
[- j- t- M [- i- [-
-
M y-^ l-
2
M i sj fsJ i sj i sj N l i si NJ fsl i sj ISJ
m
6
4^ 4^
e
4^ 4 4 i 4
t.
4> 4^1
o
O O 0 O
o
0 0 0 0 0
^
t&
4 4^
^
4^ 4 i 4 1 4^ f x
^ ^
^
v j v j v j vl v j v j v j ; vi v j
^
v j
in in in in in in en i n in in i n
> ^ ^
'Dr c c
>
"Dr 2
>
ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H
5'
i n i n
5'
.
~v
\
3
a
8
a a a a
8 8 8
a a
il3 il3 TO TO TO TO TO TO TO TO TO TO
01 01 OJ 01 OJ OJ QJ OJ 01 01 OJ
3_ 3 3 3 3 3 3 3 3 3 3
f3' N'
01 01 OJ 01 OJ OJ 01 t u t u 01 OJ
rt
5" a' a'
8
a' 8 a' a' a' 5'
8
3 3 3 3 3 3 3 3 3 3 3
>
t n i n t n
-o
13 13 TJ 13 13
3 3
13 13
o
10 fD fD fD fD fD fD fD tD fD ID
m
f l n f l n n n n n n n
Ol ' Oj ' t u Oj ' 01 01 OJ Ol ' Dl ' 01' 01'
CT
rt
01 01 OJ OJ 01 OJ QJ OJ 01 01 01
3 3 .5
^
3 .5 3 3 .5 .5 .5
^
^
.> .> .> 5 5 >
^ > ^ > >
.> .> .> 5 5 >
n f l n (-1 n n n n f l f - l f l
to fD fD fD fD fD fD fD fD fD fD
3 3 3 3 3 3 3 3 3 3 3
rt
f l f l f l f l f l f l f l f l f l f l f l
o a a a a a
8 8 8
a a
3 3 3 3 3 3 3 3 3 3 3
1 i t i I i f r - r -
to ID ID fD fD fD fD fD ID ID ID
TO TO TO TO TO TO TO TO TO TO TO
01 01 QJ 01 01 OJ 01 01 OJ 01 01
V v
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
10 ID ID fD fD ID fD fD fD ID fD
t n
rt
do' do' do' da' do' do' do' do' do' do' do'
01 01 OJ 01 01 OJ 01 01 01 01 OJ
rt
5' a' a 5' 5' a' 5'
8 8
a' a
3 3 3 3 3 3 3 3 3 3 3
<
-n - n - n - n - n - n - n - n - n - n
01 01 01 OJ 01 QJ 01 01 01 01 OJ
01 OJ OJ OJ OJ QJ 01 OJ OJ 01 OJ
CT CT CT CT CT CT CT CT CT CT CT
~ v
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
10 ID fD fD fD fD fD ID ID ID fD
rt
do' do' do' do' do' do' do' da' era' do' do'
01 QJ OJ OJ QJ OJ 01 OJ 01 OJ OJ
a' 5' a'
8
a' a'
8
a a' 5' 5'
3 3 3 3 3 3 3 3 3 3 3
+ + + + + + + + + + +
H H H H H H H H H H H
> > > > > > > > > > >
ro ro ro ro ro ro ro ro ro ro ro
Ln U l on L n Ln on Ln Ln Ln Ln
a
TS TS - 0 T3 TJ D - 0 -D 13 - 0
CT CT CT CT
zr
CT CT CT CT CT CT
O
a a a a a a
8
a a
8
rt
o a a
8 8
a a a a a
8
iC, JC, V ,
!C,
JC, JC.
l-> i-> i- i- | r t t-> i- i-> M l->
o o
0 0 O 0 0 0 0 0 0
1 1 1 1
o
1
0
1
| 0 | 0 | 0
o o 0 0 o ' 0 ' 0 ' 0 0 0 0
o o
0 0
o
0 0 0 0 0 0
Ln Ln Ln Ln U l
on
Ln
on
Ln U l Ln
00 U l v j U l
cn
Ln f x LU N l l-> 0
s
13 13 13 13 0 13 13 T3 13 - 3
TO TO TO TO TO TO TO TO TO TO TO
z
c
3
CT
tD
CTI
en
t n Ol
en
t n
cn
U l Ln Ln U l
CTI
on *>
LU NJ t->
o
I D 00 v J
cn
o
01
l- I - * M M M M t- M M M M
O
o o
O
o o o
O O
o o
ID
> > > > > > > > > > >
H
D
13
o
D 13 3 T3
a
T3 13
a
1" 1"
M
l-> l-> l-> I - * | r t l-> h-> M l-> i->
t o
o
O
o
O O
o
O
o
O
o o
M l- M M M l-> t-> l- t- I - i
(->
LU LU LU UJ LU oo LU LU LU LU LU
M M y^ y^ y^ M i-j y^ y^ y^ 'y-^
N l M NJ N l M t f | r t t- i- i->
M i-j b b Ln Ln 4i Lu oi l f sl ISJ
LU LU v j l-
cn
LU NJ
on
NJ v j U l
y^ y^ t - " t r t | r t M l-> M M M 1- " LA
oo
LU LU LU LU LU 00 LU LU 00 LU 10
H l-> j - > y^ M j -
!-
l- l- t->
NJ i s j fsJ i s j i s j f sl fsJ f sl f s l i sj fsJ ID
6
4 4 4^ 4 f x 4 ^ 4* 4 ^
5
O O
o o o
O O
o
O
o
4 4^ *> 4& 4 4 4 i 4^ 4^
v J v J v J v j v j v J v J v j v j v j VJ
in in cn in in i n i n in in in in
^
c
^
f
:
c
T
s
i
c
1
/
s
i
t
e
C)
1%" 2 "Dr c
> > >
>
ff H ff H ff H
f
:
c
T
s
i
c
1
/
s
i
t
e
ff H ff H ff H ff H ff H ff H ff H
5
5' j n
5
5'
3
O
a a a a
8
a
8
a a
8
TO TO TO TO TO TO TO TO TO TO TO
01 01 OJ OJ QJ OJ 01 01 01 01 OJ
3 3 ^ 3 3 3 3 3 3 3 3 3
N' N l '
01 01 OJ QJ OJ OJ 01 OJ 01 01 QJ
5' 5' a' 8 a' a' 8 a' a' a' a'
3 3 3 3 3 3 3 3 3 3 3
,
i n i n
13
B
13 13 - 3 13 13 T3 13 13 13
10 tD fD fD fD ID fD ID ID ID ID
n n n
f l
n n n
n n n n
S'
o j ' o j ' Oj ' o j ' Ol ' Ol ' Ol ' Ol ' cu' Oj '
01 OJ OJ QJ OJ OJ 01 OJ 01 01 OJ
5?
3 3 3 3 .5 3 .5 .5 3 3
f
i
A
l
C
^
. > >
f
i
A
l
C
> ^ > > > . > >
. >
>
>
f
i
A
l
C
f l n n l~i n n f ) f l n f l
fD fD fD fD fD fD fD fD fD fD fD
3 3 3 3 3 3 3 3 3 3 3
rt
f l f l f l f l f l f l f l n f l f l f l
o a a a a a
8
a a a a
3 3 3 3 3 3 3 3 3 3 3
t i i i r 1 i i i
eo
ID fD ID ID ID ID ID fD ID ID
TO TO TO TO TO TO TO TO TO TO TO
01 01 QJ 01 OJ OJ 01 OJ OJ 01 QJ
V,
' ^ ^
V v
V y v
V y
^
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
ID ID ID fD ID fD tD ID fD ID ID
i n
rt
do' do' do' do' do' do' do' do' do' do' do'
01 01 OJ OJ OJ OJ 01 OJ OJ OJ 01
rt
O a'
8 8
e' a' 5' a' a'
8
a'
3 3 3 3 3 3 3 3 3 3 3
i n
-n
- n - n - n - n - n - n - n - n - n - n
01 01 01 01 OJ 01 01 OJ 01 t u 01
01 01 OJ OJ t u 01 OJ QJ QJ OJ OJ
CT CT CT CT CT CT CT CT CT CT CT
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
ID ID ID fD fD fD ID fD fD ID fD
rt
TO'
do' do' do' do' do' do' do' do' do' do'
01 01 t u OJ OJ 01 01 OJ 01 QJ OJ
5' a' a a a'
8
a'
8
a' 5' 5'
3 3 3 3 3 3 3 3 3 3 3
+ + + + + + + + + + +
H H H H H H H H H H H
> > > > > > > > > > >
ro ro ro ro ro ro ro ro ro ro ro
L n Ln U l U l L n U l U l L n U l U l L n U l U l
- q
-o
T3
-o
- Q
-o
T3 T3 - 0 TS 13
CT CT CT CT CT CT CT CT CT ZT CT
o a
8 8
a a a a a
8 8
rt
o
8 8 8 8
a a a a a a
vl. JC, \ \ JC, V, JC, JC, JC, JC, JC,
y^ i- l- M M M M i- 1- " l-> i-
o o
O O O
o
O
o
0
o o
| 0
o
| 0 O
o o o o
0
1 1
' o o o ' o o o ' o o 0 o o
o o o o o o o o
0
o o
en cn cn cn m
U l t n Ln Ln
on
U l
i- LU N l
o
i-> I D
o
I D 00
o
v j
o
o
13 TJ 13 13 13 13 0 3 13
TO TO TO TO TO TO TO TO TO TO TO
Z
c
3
CT
ID
v J
>i
s J VJ VJ v j v j v J
en cn cn
VJ
en
U l
4^ oo
NJ I -i 0 LO 00 v J
o
01
M M t - i I-i I-i 1-i i-> I-i I-i I -i I-i
o o o
0
o
O
o
0
o
0
o
fD
> > > > > > > > > > > H
13
a
TJ 13
D
T3
o 0
TD TJ 13
g
M M I -i t - i t - i I-i I - " t - i t - i I-i t - i ID
O o o
0 O O
o
0 O 0
o
M M I-i t - i t - i t - i I -i I -i I -i I-i I -i
LU LU LU LU LO U l LU LU LU 00 LU
M M y^ i r t i-:i i-j i-^i t-:* i-^ M i-^
LU N l NJ ISJ NJ I sl NJ ISJ ISJ NJ ISJ
b
U l
Ln Ln 4i oil LU iiil Lu Lo fsJ
v j I D LU 1-i I -i VJ
^
NJ ISJ NJ I-i
1-i 1-i I -i t - i I -i M I -i t - i I -i I-i I-i U l
LU LU LU 00 LU LU LU LU 00 LO LO ID
M M t - i t - i I -i t - i t - i t - i t - i t - i t - i
3
N l
isJ
i s j ISJ tsJ isl isJ NJ i s j NJ isJ 10
6
6 4 4^
f x 4 i f x 4^ f
o
o
O 0 O O
o
0
o
0 O
4& f ^ 4 4 4^ f 4^ f x f x
T3
v J v j v j v j v j v J v j v j v j V I VJ
i n in in i n in in i n in i n i n in
z?- 2
^ ^
^ ^
"i^
> ^
3
J^r cn
^
>
ff H ff H ff H ff H ff H ff H ff H ff H
X
ff
H
ff H ff H
rt
j n i n 8
~ v . 3
O
a a a
8 8
a a a ^
3*
TO TO TO TO TO TO TO TO TO TO TO
01 01 OJ 01 OJ OJ 01 01 01 01 01
3 3 3 3 3 3 3 3 3 3 3
R'
Nl '
01 01 QJ OJ OJ OJ 01 t u QJ OJ OJ
rt
o a' a' a'
8
a' a' a' a' a' a'
3 3 3 3 3 3 3 3 3 3 3
i n
D -o
13 3
3 13 T3 13 13 TJ
o
ID tD fD fD fD fD ID fD fD ID ID
n n o n
O O
n n
f l f l f l
S' 5'
Ol '
oi'
Ol ' Oj ' Ol ' 01' 01' Ql ' Qj '
i n t n
01 01 Ol OJ OJ OJ 01 OJ OJ 01 QJ
^
3 3 3 3 3 3
3 3 3
^ . > . > >^ > > > > > > . >
r?
f l
n n n
f )
n In
f l f - l
ID ID ID ID fD fD tD fD fD fD fD
3 3 3 3 3 3 3 3 3 3 3
rt
Q
f l f l f l f l f l f l f l f l f l
n
O a
8 8 8
a a a a a a
3 3 3 3 3 3 3 3 3 3 3
I f - i t i i t I
r-
r
ID fD fD fD fD ID fD ID tD fD ID
TO TO TO TO TO TO TO TO TO TO TO
Si
OJ 01 OJ 01 01 01 QJ OJ OJ 01
5" 3 3 " 3 3 5" 3 3 " 5" 5 5"
< < < < < < < < < < <
10 10 fD fD tD tD fD fD ID fD fD
rt rt
1%' do' do' do' do' do' do' da' do' do' do'
01 OJ 01 QJ 01 QJ 01 OJ cu OJ 01
o 5' 5'
8
a' a' 8 a 8 a' a'
3 3 3 3 3 3 3 3 3 3 3
t n
v
-n
- r i
-n -n -n -n -n
- n
-n -n
01 OJ 01 QJ OJ OJ 01 OJ OJ t u 01
01 t u OJ 01 OJ 01 OJ OJ
cu
OJ cu
CT CT CT CT CT CT CT CT CT CT CT
V,
ro
3 3
5" 5" 5" 5"
3 " 3 "
ro
5" 5"
< < < < < < < < < <
m
ID fD fD ID fD ID ID ID fD
I n i n
rt
do' do' do' do' do' do' do' do' da' do'
01 01 cu cu 01 OJ QJ 01
-n
DJ
rt OJ rt
o' 5' 8 3 ' a' a' 5' a' a' a'
3 3 3 3 3 3 3 3 3 3
+
+ + + + + + + + +
H H H H H H H H H -i
>
> > > > > > > > >
m
ro ro ro ro ro ro ro ro ro
on
L n U l U l U l Ln U l Ln Ln Ln
~ v
T
u
-CT 13 -CT -CT -CT -CT -CT - 0 - D
CT CT CT CT CT CT CT CT CT CT
O 8
a a a
8
a
8 Z a
8
>
o
a a a
8 8
a
8
a a
<
t n
JC, JC, JC, JC, JC, JC, +" JC, JC.
M t - i t - i t - i t - i t-> t - i I -i M I -i
Q O 0 0
o o
0 0 0
o
| 0
1 1
| 0
o
1
0
1
NJ
0
o
' o
o 0 0 o o 0 ' 0
NJ
0 ' o
5 o
0 0
o o
0 0 0
o
0^ t n en en cn cn cn en
s
cn cn
v j 00
en
v j L n
en
4 i NJ 01 LU 4^
<
s
3 13 CT 13 13 13 13
+
13
-o
do
TO TO TO TO TO TO TO 0 TO TO
I D
-b
z
C
3
CT
t o
0 0 00 00 00 00 00 00 00 00 v J v J
00 VJ
cn
U l
4^
LU NJ l-x
o
LO 00
o
l -x t- t-x I -i I -i t - i t - i l-x l-x t-x l-x
o o o
O
o
O 0 0
o
O
o
ID
> > > > > > > > > > >
H
D 13
o
13
o
13 13
3
13 13 CT
g
M l-x t - i I -i l-x l-x l-x t-x l-x l-x l->
t o
O
O
o o o o
0 0
o
O O
!->
t - i l-x I -i t -x l-x l-x t-x l -x t - i t-x
LU LU OO
oo
U l OO 00 LU U l OO 00
Ijf
y-' t.:x M
i-:x i-:x i-^x Hi i-^x
f x LU
oo
LU LU UJ U l LU U l OO LU
b Ln Ln 4^ 4 ^ 4L LU fsJ f sl i-^x i.:x
N l
tn 4^
00 L n N l v j I D N l
on
t-x
l-x l-x M I-i l-x l-x l-x t-x t-x l-x l-x m
LU LU LU LU LU LO LU LU LU LO LU
m
l -x t-x t-x t - i t-x t-x l-x t-x t-x t-x t-x
5
N l f sl f s l
fo
f sl fsJ f sl i s l i s l f sl fsJ t o
6
f x f x f x f x f x 4 ^ 4 ^ f x 4 ^ f x
o o o o
O 0 0 0
o
O
o
4&
f x f x f x f x f x 4 ^ f x f x 4 ^ 4^
; vl v J v j v j v J V j ; vl
^
VJ v j
^
in en in in in in in in in i n in
k 2
'> ^
C
> ^ > ^ >
>
ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H
rt
i n t n i n
\
3
O
8
a a a a
8
a a a
3
T
era
TO TO TO TO TO TO TO TO TO TO
01 OJ OJ QJ 01 OJ 01 OJ OJ t u 01
3 3 3 3 3 3 3 3 3 3 3
N' Nl '
01 QJ 01 01 OJ QJ 01 OJ OJ 01 01
5 a' a'
8
a' a' 5'
8 a' 8 a
3 3 3 3 3 3 3 3 3 3 3
>
^ t n t n
"2
- 3 13 13 13
0
T3 TJ 13 TJ T3
ID ID fD ID fD ID fD fD fD ID ID
f l f l n n n
n n
n n n f l
u' 5'
Ol ' OJ o j ' t u OJ Ol ' QJ' Ol ' Ol '
r*
m
OJ OJ t u Ol 01 OJ OJ t u 01 OJ
^
3 3 3 3 3
3!
3 3 3 3
^ \
^ > > > > .> > > > > .>
n n f l n f l 0 n f l n n
ID fD fD fD fD ID fD ID fD fD fD
3 3 3 3 3 3 3 3 3 3 3
rt
f l f l f l n
n n n
f l f l f l f l
o a a a a
8
a
8
a a a
3 3 3 3 3 3 3 3 3 3 3
c
r - i 1 1 r 1 1 i i I
10 fD fD fD fD tD ID fD ID fD
ro
TO TO TO TO TO TO TO TO TO TO TO
01 OJ 01 OJ 01 OJ OJ 01 OJ OJ OJ
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
10 ID fD ID fD fD ID fD fD ID ID
i n i n
rt rt
do'
TO'
do' do' do' do' do' do' do' do' do'
01 OJ OJ QJ 01 OJ 01 OJ OJ 01 01
rt
o 5' a a 5' a' a' a' a' a' a'
a
3 3 3 3 3 3 3 3 3 3
i n
JC, - V , JC,
n
- n - n
-n
T l - n - n
-n
- n - n Tn
01 01 OJ OJ OJ QJ OJ QJ QJ t u 01
01 01 OJ OJ OJ 01 01 01 QJ 01 OJ
CT CT CT CT CT CT CT CT CT CT CT
- V .
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
ID fD ID ID fD tD ID ID fD ID ID
i n
rt
do' do' da' da' da' do' do' do' do' do' da'
01 OJ OJ OJ OJ OJ OJ OJ 01 01 IU
rt
5' a' a' a' 5' a' 8
5' 5'
8 a'
3 3 3 3 3 3 3 3 3 3 3
+
+ + + + + + + + + +
H H H H H H H H H H H
> > > > > > > > > > >
ro ro ro ro ro ro ro ro ro ro ro
L n U l Ln U l U l U l U l U l U l Ln U l
"CT -CT -CT -CT -CT 0 -CT -CT -CT 13 TJ
CT CT CT CT CT CT CT CT CT CT CT
o a a a a
8
a a a a a
rt
o a a a
8
a a
8
a a a
l-x l-x I -i t-> l-x t - i l-x 1-i t-x l-x
o o o o
O 0 0 0
o o o
, o
1 1 1 1 1 1 1
, o
1
o
' o o o ' o ' o ' 0 0 0 ' o ' o o
q o o o o
0 0 0
o o o
> j VJ vl
^
VJ
tn en
s J v j
cn
t n
N l f x
p
LU l-x U l I D l-x
o
00 I D
2
13 13 13 13 13 TJ 13 13 13 T3
TO TO TO TO TO TO TO TO TO TO TO
z
c
3
CT
I D
CO L O L O I D L O L O L O U 3 L O l O 0 0
I D 0 0 v j
en
U l 4^ OO I SJ l - x O L O
o
QJ
l - x t - x l - x t - x t - x l - x l - x t - x l - x l - > t - i
o
QJ
O
o
O
o o
O
o
O
o
O O to
> > > > > > > > > > >
H
73 1 3 T 3 1 3 1 3 3 3 - D CT 3 1 3
3' 3'
l - x l - x t - x t - x t - x l - x l - x l - x l - x t - x l - x
I D
O O
o o
O O
o
O O O O
M M t - x l - x t - x l - x l - x M l - x t - i t - x
L U L U L U L U U l L U L U U l 0 0 L U L U
Hf i-j
i-^
t-^x t.:x M H x M i-:x i-:x Ux
^
f . 4^ f x 4^
f x
4^ 4 f x f x
Ln Ln Ln 4^ f x 4i
i sj fsl k^x i-^x
b
L O I D O v J
o
O t n
en
L U
o
0 0
t - x t - x t - x l - x I - i t - i l - x t - x M I - i l - x Ln
L U L U L U
oo oo
L U L U L U L O L U oo I D
l - x l - x l - x t - x l - x t - x l - x t - x t - x t - x t - x
2
N l i sl i s j fsl fsl N J i sj fsl fsJ fsJ i sl to
A f x f f x f x 4 f x 4^ f x f x f x
O
o o o
O O O O
o o o
^
4k 4^ f 4 f l 4^ f x
^
4 1 f l
^
^
v J v j v j v j v j v J v j v l v j V J V J
i n en i n en in i n en i n in en i n
^ ^ > ^ ^
^ >
"i^ "J^
> Q
A
c
t
i
i
ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H
A
c
t
i
i
i n j n t n
u
^
3
O
a
8
a a
8
a
8
a
8
a
TO TO TO TO TO TO TO TO TO TO TO
0 1 0 1 Ol 01 OJ 01 OJ QJ QJ OJ OJ
3 3 3 3 3 3 3 3 ^ 3 3 3
N'
0 1 01 01 OJ QJ OJ 01 OJ QJ QJ OJ
rt
5'
a' a' 5' 5' a' a' a' a' a' a
3 3 3 3 3 3 3 3 3 3 3
* v
In" U l
a
3 T J 1 3 1 3
n
T 3 1 3 T 3
-o
T 3
10 f D f D f D I D I D f D I D I D f D I D
n
n n o n n n n
f l
n
O
2'
Ol ' Ol ' Oj ' o j ' Ol ' t u ' Ol ' Oj '
S'
Ol '
t n
rt
0 1 OJ 01 OJ OJ Ol 01 01 OJ t u OJ
a
3 3 3
3
3 3 3 3 3 3
.> .> .> ,> .> > .>
^ >
.>
> >
.> .> ,> .> > .>
r? f l n n t - 1 f l f l n n n t - 1
I D I D t D t D I D I D f D f D f D f D I D
3 3 3 3 3 3 3 3 3 3 3
rt
f l f l f l f l f l f l
n
f l f l f l O
o
8 8 8 8 8 8 8
a a a
3
3 3
3 3 3 3
3
3 3
3
I f - 1 f - f - I f I i i i
(0 f D f D f D f D f D f D t D f D f D f D
TO TO TO TO TO TO TO TO TO TO TO
0 1 OJ 01 OJ OJ 01 01 01 01 OJ OJ
',
V v
\
v . .
- \ \
\
3 3 3 3 3 3 =1 3 3 3 3
< < < < < < < < < < <
10 10 I D t D f D f D I D f D f D f D I D
i n t n
rt
do' do' do' do' do' da' do' do' do' do' do'
0 1 OJ 01 OJ 01 01 01 01 01 OJ QJ
rt
o 5'
8 8
a' a' a' a' a a' a'
3 3 3 3 3 3 3 3 3 3 3
i n
T l
- n - n - n
T l
- n - n
- f l T l
- n - n
0 1 01 OJ OJ OJ 01 OJ 01 01 OJ t u
0 1 OJ 0 1 OJ 01 OJ OJ 01 01 OJ OJ
CT CT CT CT CT CT CT CT CT CT CT
~^ \
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < < 10 10 f D f D f D f D I D f D f D f D I D
rt rt
do' do' do' do' da' da' do' da' do' do' do'
0 1 01 01 01 01
cu
OJ 01 OJ 01 OJ
5'
a' a' 5' 5'
8
a' a a 8 8
a
3 3 3 3 3 3 3 3 3 3
+ + + + +
+
+ + + + +
H H H
H
H H H H H H H
> > > > > > > > > > >
ro ro ro ro ro ro ro ro ro ro ro
U l Ln on U l
on
Ln
U l U l
Ln
U l U l
CT -CT -CT -CT -CT -CT -CT -CT -CT T3 -CT
CT CT CT CT CT CT CT CT CT CT CT
o a a a
8
a a a a a a
rt
o a a a
8
a a a a a a
i n
j n^
JC, JC, JC, JC, JC, JC, JC, JC,
l - x t - x t - i l - x M t - x l - x t - x t - x l - x l - x
O O
o o
O
o o o o o o
1 1 1 1 1 1 1
o
| 0 | 0
1
' o ' o ' o ' o ' o ' o ' o o o ' o
o o o o o o o o o o
v J s J v j v j v j v J v j v l v l V J
o
0 0 L O I s l 0 0
en
CTI U l f x L U U l
-a
CT 1 3 -CT 1 3 1 3 1 3 1 3 T3 1 3 1 3
TO TO TO TO TO TO TO TO TO TO TO
z
c
3
CT
l-x t-x l-x l-x l-x t-x l-x t-x l-x t-x l-x to
t-x
o o
O
o
O O O
o
O O
o
LO 00 v j
cn
Ln 4k LU NJ t-x O
O
DJ
t-x l-x t-x l-x l-x l-x t-x t-x l-x l-x l-x
o
O
o
O
o
O O
o o o o
fD
> > > > > > > > > > >
H
o
13 TJ 13 13 T3 13 13 13 13 D
i" i"
l-x l-x l-x l-x l-x l-x l-x t-x t-x l-x t-x
o o
O
o o o
O O
o
3
o
t-x l-x l-x l -x l -x l-x M l-x t-x l-x l-x
LU LU LU LU U l U l U l U l 00 LU LU
i.:x
y^ i-j i-:x Hx i-j M t-:x i-^x i-^x i-^
U l
on
U l
on on i n U l U l U l U l
on
Ln f x f x oil fsJ fo
M t-x b b b
U l
en
LO I D LU t-x
cn
U l 00 VJ t-x
t-x t-x M l-x l-x t-x t-x t-x l-x l-x l-x i n
OO LU LU 00 00 U i LU LU 00 LU U l
to
t-x t-x t-x t-x t-x t-x t-x t-x t-x t-x t-x
2
fsl fsJ fsl fsl isl fo
fsJ fsl fsl fsl fsl to
f x
->
f l f x f x f l f l 4k f l f l
.>
o o
O O
o o o
O
o o o
^
f x f l f l 4k f l f l f l f l 4 1 f l f l
^
v j v j v j v j v J ; vi v j v J v J v j v j
in i n i n i n in i n i n i n in in i n
^
1%"
> ^
"i^
'^
A
c
t
i
i
ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H
A
c
t
i
i
u
3
a a a
8
a a a a a a
8 *
TO TO TO TO TO TO TO TO TO TO TO
01 01 01 01 OJ 01 01 01 01 QJ OJ
3 3 3 3 3 3 3 3 3 3 3
OJ OJ OJ OJ OJ Ol 01 OJ 01 OJ OJ
a' a' a' 5' a' 8 a' a' a' a' a'
3 3 3 3 3 3 3 3 3 3 3
i n
- 3 13 13 13
D 3 TJ 13 CT CT 13
fD ID ID ID ID fD fD fD fD fD fD
f l
n n n
O n n n n
as' 01 01 Ol ' Ol ' as' Ol ' Oj ' Ol ' S' oi'
OJ OJ 01 OJ OJ QJ t u 01 01 t u 01
3 3 3 3 3 3 3 3 3 3
> ^ . > . > . > , > > . > , > > ^ . > > > . > . > , > > . > , >
f ) n n f ) C-l n f - l n f - l o
fD tD fD ID ID fD fD fD ID ID fD
3 3 3 3 3 3 3 3 3 3 3
f l f l f l f l f l f l f l f l f l f l f l
a a a
8 8 8
a
3 8
a a
3 3 3 3 3 3 3 3 3 3 3
I
r-
1 i i 1 1
fD ID ID ID ID fD fD tD tD fD fD
TO TO TO TO TO TO TO TO TO TO TO
OJ 01 01 OJ OJ 01 OJ 01 01 OJ 01
v . V , .
- \ ' ', \ \ \ \
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
ID fD fD fD ID fD ID fD ID ID fD
rt
do' do' do' do' do' do' do' do' do' do' do'
01 OJ 01 QJ 01 t u t u 01 OJ cu QJ
5'
8
5' 5' a' 5' a' a' a' 5' 5'
3 3 3 3 3 3 3 3 3 3 3
JC, JC, JC, JC, JC, JC. JC, JC, JC, JC, JC,
-n -n -n -n -n -n
TT
OJ 01 OJ OJ OJ QJ OJ 01 OJ Ol 01
QJ OJ OJ t u t u 01 OJ 01 OJ OJ OJ
CT CT CT CT CT CT CT CT
\
CT CT CT
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
ID ID fD fD fD fD tD fD ID ID fD
i n
rt
do' do' do' do' do' do' do' do' do' do' do'
01 01 Ol 01 01 01 01 OJ QJ QJ OJ
a' a' a' a' 5' a' a' a 8 a' a'
3 3 3 3 3 3 3 3 3 3 3
+, +, +, + + + + + + + +
H H H H H H H H H H H
> > > > > > > > > > >
ro ro ro ro ro ro ro ro ro ro ro
U l Ln Ln on
U l
JC
i n U l Ln Ln U l
-CT CT CT -CT -CT -CT -CT -CT -CT o -CT
CT CT CT CT CT CT CT CT CT CT CT
8
a a a a a a a
8
a a
a a a a a a a a
8
a a
JC. JC, JC, JC, JC, JC, JC, JC, JC, JC, JC,
l-x l-x t-x l-x l-x l-x t-x t-x l-x t-x t-x
o o o o o o o o
O
o o
o o o o P , o
| 0
, o
1
| 0
, o
' o o o ' o ' o ' o ' o ' o ' o o ' o
o o o o o o o o o o o
v i 00 00 00 00 00 00 00 00 s J
^
v j f l I SJ LU l-x 00
o
ISJ l-x I D
^
$
13 3 13 13 13 13 13 13 13 13
$ TO TO TO TO TO TO TO TO TO TO
z
c
3
CT
M M l-x t-x t-x l-x t-x l-x l-x M l-x ID
NJ ISJ t-x l-x l-x l-x l-x t-x t-x t-x l-x
l-x O I D 00 vl
en on f l LO ISJ l-x
o
fij
l -x l-x t-x t-x t - i l-x t-x t-x l-x t-x l-x
o
O O
o o
3 t 3
o
O O
o
fD
> > > > > > > > > > >
H
a
CT 13 13 13 CT 13 13 TJ CT CT
g
l -x l-x 1-i l-x l-x l-x l-x t-x l-x l-x l-x ID
o
O
o
O
o
O O
o o
O O
l-x l-x l-x t-x t-x l-x M t-x t-x l-x l-x
LU LU LU LU LU
oo
LU LU LU
oo
LO
i-^ i-^
i-:x t-^x i-^x i-j y^ y^ i-^x l-x
~U v i v i v i v j
^ en cn en t n t n
oil Lu Lu
t-^x M M
on Ln 4i oil i-^x
LO 00 LU LO
en
l-x t o 00 NJ
en
00
l-x l-x t-x t-x t-x l-x l-x l-x t-x t-x l-x U l
00 LU LU LU LU LO LU LU LU LU LU ID
H t-x t -x t-x l-x t-x t-x t-x t-x t-x t-x
2
Nl fsl fsl fsl fsl fsl fsJ fsl fsl fsJ isJ ID
6
f x f l f l f x 4k 4k f x f x f x
8 o
O O
o
O O O
o o o
4k f l f l f l f x f l f x 4k f l f l f l
vJ v J ; vl v J v j v j v j ;vl v J v i VJ
in en in en i n in cn in en en in
"I^ 1> 2
^ ^
"i^ 2 ^
c
^
>
ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H
A
t n
V,
'.
3
O a a a
8
a a a a a a
TO TO TO TO TO TO TO TO TO TO TO
01 01 01 01 01 OJ 01 QJ t u 01 OJ
3 3 3 3 3 3 3 3 3 3 3
N'
01 01 01 OJ 01 01 01 OJ 01 OJ OJ
5' a' a' a a' 5' a'
8
5'
8 a'
3 3 3 3 3 3 3 3 3 3 3
i n t n
T3
o
T3 T3
B 13 13 13 13 13 13
ID fD fD fD ID fD tD tD fD ID ID
f l
n n n n
f l
n n n n n
2)
Ol ' Oj '
QJ'
Ql ' Ol ' 01 Oj ' Ol ' cu' Ql '
i n
rt
01 OJ 01 01 01 OJ 01 OJ OJ OJ t u
^ ^
3 3 3 3 3 3 3 3 3
a
^ > .> > .> ^ ^ >^ ,> > >
R
f - l f l e-l f l f l f l n f - l n n
10 ID ID ID ID ID fD fD fD fD fD
a
3 3 3 3 3 3 3 3 3 3
rt
n
f l f l O f l f l
n
f l f l f l f l
o o a a a a
3
a a a a
3 3 3 3 3 3 3 3 3 3 3
I I D- i i i i l 1 1 1 1
10 ID fD fD tD tD fD tD
ro
fD ID
TO TO TO TO TO TO TO TO TO TO TO
SL
OJ 01 01 01 OJ 01 OJ OJ OJ 01
a 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
10 fD fD fD ID ID fD tD ID fD ID
t n
rt
do' do' do' do' do' do' do' do' do' do' do'
01 OJ OJ 01 01 OJ 01 Ol 01 01 01
rt
5' a' a' a' a a a' 5' a' a' a'
a
3 3 3 3 3 3 3 3 3 3
t n
TT -n -n TT TT TT TT TT -n TT
01 OJ QJ 01 01 01 01 OJ OJ 01 01
01 QJ OJ 01 01 OJ 01 OJ OJ OJ 01
CT CT CT CT CT CT CT CT CT CT CT
a
3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
ID ID fD fD ID fD fD ID ID fD fD
i n
rt rt
era' do' do' do' do' do' do' do' do' da' da'
01 OJ OJ OJ 01 OJ Ql 01 01 01 01
rt
o
8
a' a' 5' a' 8 a' a' a' a'
a
3 3 3 3 3 3 3 3 3 3
+
+ + + + + + + + + +
H H H H H H H H H H H
> > > > > > > > > > >
ro ro ro ro ro ro ro ro ro ro ro
on
U l U l U l Ln U l Ln Ln U l U l Ln
V,
CT -CT -CT -CT -CT CT CT CT CT CT -CT
CT CT CT CT CT CT CT CT CT CT CT
o a
8
a a a a
8
a a a
rt
O a a a a a a a a a a
i n i n
~ v .
\ l-x l-x l-x M l-x l-x t-x l-x t-x t-x l-x
o o o
O
o o o
O
o o o
| 0
1 1 1 1 1 1
, o
1
| 0
, o
o o o ' o ' o ' o ' o o ' o ' o
o o o
3
o o o o
C3
o
00 I D 00 00 00 00 00 00 00 00
h* 00 O LD v J 00
cn
v j
cn Ln
U l
13 3
13
n
3 13 TJ -CT 13 13 3
TO TO TO TO TO TO TO TO TO TO TO
z
c
3
CT
M t-x l-x M l-x t-x l-x l-x t-x I-.X l-x to
LU
N l
LU LU ISI ISI ISJ N l ISJ NJ NJ ISJ LU
N l l-x 0 I D 00 v J
en
Ln -Ik LU ISJ
o
l -x t-x l-x t-x l-x t-x l-x t-x l-x l-x M
O 0
0 0
o
o
o O o 0 o
ID
> > > > > > > > > > >
H
D
CT
13 13
CT 3
TJ 13
CT 13 -CT 3
a
K
l -x l-x M t-x t-x t-x t-x l-x t-x t-x
ID
o
0
0 0
o o
o
o
o
0 O
t- M l-x l-x t-x l-x t-x l-x l-x l-x l-x
LU U l LU LU
oo
LO LU LU U l 00
oo
M i-j y^ i-:x t-^x i-^x i-j i-j M i-j t-^x
PP
00 00 00 00 00 00 00 00 v i V I
U l Lfi f sl f sl l-x ^:x t-x i-j
b
Ln 4k
l-x 0 I D 00 00
on
l-x t-x LO 4k O
t-x t-x t-x t-x l-x t-x l-x l-x l-x l-x t-x l / l
U l 00 LU 00 LU LU LU LU
oo
00
oo to
l -x t-x t-x t-x l-x t-x t-x t-x t-x t-x t-x
2
NJ isl i s j i s j isl NJ isl fo fsJ fsl fo ID
6
f x f l f x 4k 4k f x f x 4k 4 1 4k
8
0 0 0
o
3
o O O 0 o
4k 4k f l f l 4k 4 1 f l f x 4k f x f l "CT
v J v j vl VJ v J v J v j v j v j v i v i
in in in in in in
i n i n cn
in
i n
^
"i^
1%" Cl
^
1> c
" i ^ ^ >
> <^ > <^ >
ff H ff H ff H ff ^ ff ^ ff ^ ff H ff H ff H ff ^ ff ^
a
i n j n j n
8
~ v
3
8
a
3
a
a
a
a
a
a
a a
2
era
TO TO TO TO TO TO TO
eio
era era
01 OJ 01 01 01 01 Ol 01 OJ 01 QJ
a
3 3 3 3 3 3 3 3 3 3
FI'
Nl
01 01 01 01 OJ OJ OJ
rt rt rt rt rt
8
5'
a' a
5' a' a' 5' a
a' a'
a
3 3 3 3 3 3 3 3 3 3
>. i n
a
TJ TJ T3 13 13 13 CT CT -CT CT
ID tD fD fD fD ID fD fD fD ID fD
m n
0 0 f l
n n n n n
f l
2[
Ol ' 01' Ql ' Oj ' 01 o j ' Ql ' OJ Oj ' flj'
t n t n
01 OJ 01 OJ OJ 01 OJ 01 QJ 01 OJ
.5
3 3 3
3 3 3 3 3 3 3
^ ,> ,> > .> > ,> .> > > .>
D
f - l f l
"n
1-1
n f l f l n n rs
10 ID ID fD fD fD fD fD fD ID
ro
a
3 3 3 3 3 3 3 3 3 3
rt
Q
f l f l f l
n
fT f l f l f l 0
n
0
8
a a
3
a
a
a a a a
3 3 3 3 3 3 3 3 3 3 3
r c
i l 1 i f -
ID to
ID ID tD ID fD fD ID ID fD
era
TO TO TO TO TO TO TO TO TO TO
Si
OJ 01 OJ t u 01 OJ 01 OJ 01 OJ
a 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
ID 10
ID fD fD ID fD fD ID fD tD
i n i n
TO do' do' do' do' dq' do' do' do' do' do'
01 OJ 01 OJ OJ 01 OJ 01 OJ OJ
rt rt
8
5'
a'
a' a' 5' a' 5' a' a'
a'
a
3 3 3 3 3 3 3 3 3 3
JC
T l TT TT TT TT - f l TT
^
TT T l
01 OJ OJ 01 OJ OJ 01 Ol QJ 01 OJ
01 OJ OJ OJ QJ OJ QJ OJ QJ OJ OJ
CT CT CT CT CT CT 3 " ,CT CT CT CT
V ,
a 3 "
5"
3 "
5" 5"
3 "
5"
3 "
5" 5"
< < < < < < < < < < <
10
ID ID fD ID ID fD fD ID ID fD
t n
rt
do' do' do' do' do' do' da' do' do' dq'
01 01 OJ 01 OJ OJ QJ OJ 01 QJ
rt
a' a'
8
5'
a' a'
5'
a a'
5'
a'
a
3 3 3 3 3 3 3 3 3 3
+, + +, + + + + + + + +
d
- 1 H -H H H H H H H H
> > > > > > > > > > >
ro
ro ro ro ro ro ro ro ro ro ro
-SC
U l Ln U l L n Ln
on
U l
on
U l U l
TS -CT CT -CT -CT -CT -CT T3 -CT -CT T3
CT CT CT CT CT CT CT CT CT CT CT
a a
a a a a a a
a
a a
rt
P a
a a a a a a
a
a a
j n
~ v .
M l-x l-x t-x l-x t-x l-x l-x l-x KX l-x
0 0 0 0
o o
0
o
0 0 o
p
1 1 1
| 0
1 1 1
P
0
| 0
' 0 0 ' 0 ' 0 o ' o 0 o ' 0 0 o
0
0
0
0
o o
0
o 0 0 o
(0
t o I D LO I D I D I D I D I D LO 00
00
4 1
cn
Ln LU ISJ l-x
0 UJ I D
S 2
13 CT TJ CT CT
a
CT CT T l
do
TO
TO TO TO TO TO TO TO TO TO
z
c
3
CT
::
l-x l-x l-x t-x t-x l-x l-x l-x t-x t-x ID
.>
4k f l 4k LU LU 00 LU oo 00 LU
U l ISJ l-x O LO 00 v J
en
U l f l LU
O
M
l-x t-x t-x l-x t-x t-x M t-x t-x l-x
o
3
o
O 3
o o
O
o o
O ID
> > > > > > > > > > >
H
o
13 13 CT 13 13 CT T3 13 13 13
g
l -x t-x t-x l-x l-x t-x l-x l-x t-x l-x t-x
ID
o
O
o
O
o
3 O O
o
O O
M t-x t-x t-x l-x t-x l-x l-x l-x l-x t-x
U l LU LU LU 00 LU UJ LU LU oo LU
i-^
t-:x
i-^x
M
i-^x i-^x
h^x
Ux i-^x
i-^x
CD LO LO I D I D LO I D LO LO 00 00
4k f x fsl isJ isJ isJ i-j
t.:x
b Ln Ln
NJ O I D 00 U l f x Ul N l
o
00 00
t-x l-x l-x t-x l-x t-x t-x t-x t-x l-x l-x m
LU 00 LU oo LU LU LU LU LU LU LU ID
j- t-x l-x I-.X t-x l-x l -x t-x t-x t-x t-x
2
Nl
fo
i sl fsl fsJ N l fsl
fo
fsl
fo
i sj ID
6
f x f x f l f l f l 4k f x f l 4k f x
8 o o o o
3 O
o
O O
o
* i
4k f l f l ^ f l f l ^ f x f l
vJ v j v j VJ v j v J v J ; vl v i VJ VJ
in i n i n i n en i n in in in in in
^
> 2
"Dr 2
1^
^
" i ^ ^ 1^ " i ^ > 2
>
>
ff H ff H ff H ff H ff H ff ^ ff H ff H ff H ff ^ ff ^
a
j n 8
" V , 3
O
a a a a a a a a a a
qp
TO TO TO TO TO TO TO TO
eio eiq
01 01 01 t u OJ QJ t u OJ QJ t u t u
3 3 3 3 3 3 3 3 3 3 3
Fi'
01 01 01 t u OJ 01 01 01 QJ OJ OJ
8
a' a a' a' 8 a' 5' 5' a' a
a
3 3 3 3 3 3 3 3 3 3
s ^
i n
o
T3 T3 13 13 -CT TJ CT -CT CT CT
to fD fD fD ID fD ID ID ID fD fD
n
n f l n n n O n O n
2[
o j ' Ol ' t u' o j ' OJ 01 o j ' Ol ' QJ'
5'
^
c
SL
OJ OJ 01 01 OJ Ql t u 01 QJ QJ
3 3
3 3
3
3
=ft
3 3 3 3
^
v ^
'.
^ , > ^ ^ > > > . > , > > >
D
f? n f l f l f ) n o n n f l
ID tD ID fD ID fD fD ID ID fD ID
3 3 3 3 3 3 3 3 3 3 3
rt
Q
fT f l m n n f l n
n
O n
8 8 8
a a
8
a a
8
a a
3 3 3 3 3 3 3 3 3 3 3
r - I r - 1 i 1 f f - i i I
10 fD fD ID fD fD fD ID fD fD fD
era
TO TO TO TO TO TO TO TO TO TO
Si
OJ 01 tu 01 01 01 01 01 DJ QJ
a a 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
ID ID fD fD ID fD ID fD fD ID fD
i n t n
era' do' da do' do' do' do' do' da' do' do'
01 01 01 01 01 01 01 OJ Ol 01 OJ
8 8
a' 5' 5' a' 5' a' a a' 5'
a
3 3 3 3 3 3 3 3 3 3
i n i n
T l TT TT TT TT TT ^ TT TT
01 OJ 01 01 01 OJ OJ QJ OJ OJ OJ
01 01 01 01 OJ QJ tu QJ QJ OJ tu
^
CT CT CT CT CT CT CT CT CT CT
a 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
10 to ID fD ID ID fD fD tD ID fD
!4
i n
do' do' do' do' do' do' do' do' do' da' do'
01 01 01 OJ OJ 01 OJ QJ DJ
rt rt rt
5" 5' a' a a' a' a' a' a' a' a'
a
3 3 3 3 3 3 3 3 3 3
+ + + + + + + + + + +
d H
H H H H H H H H -H
> > > > > > > > > > >
ro ro ro ro ro ro ro ro ro ro ro
on on on on
Ln Ln U l U l U l Ln
^
Ln
Vv
Ln
^
Ln
CT -CT CT CT -CT CT T3 CT -CT T3 -CT
CT CT CT CT CT CT CT CT CT CT CT
8
a a a a a a a a a a
rt
8
a a a a a a a a a a
^
t-x t-x t-x t-x l-x t-x l-x l-x t-x l-x l-x
O
o o o o
3
o o o o o
P
1 1 1 1
P P P
| 0 3
P
' o ' o ' o ' o o ' o ' o ' o o o ' o
l -x l-x
o o
3 t-x
o
l-x
o o o
O
o
I D LD LO
o
I D
o
LO I D I D
o
4k v J NJ I D ISJ 00 C3 I D t n U l
o
CT 13 13 T J
o
CT
-o
13 CT TJ
TO TO TO TO TO TO TO TO TO TO TO
z
c
3
CT
M l-x l-x t-x t-x l-x l-x t-x l-x t-x l-x ID
Ul U l Ln U l U l f l f x f x J k f l 4k
4k LU NJ l-x
o
I D 00 v J
cn on
f l
O
l-x M t - i t-x l-x t-x t-x l-x l-x t-x M
O 3 O
o o
O
o o o o o
tD
> > > > > > > > > > >
H
a
CT T3 CT 13
-o
CT 13 13 13 CT
g
M t-x t-x l-x l-x t-x l-x l-x l-x t-x l-x
ID
O O O O O
o o o
O
o
O
M l-x l-x t-x l-x l-x t-x l -x l-x I-.X l-x
Ul LU LU 00 00 LU LU U l OO LO LU
Nl
fo fo
fsJ i sj KX t-^x M i-j i-i i-j
p o o
O
o
LO I D LO I D LO I D
M
b b b b Ln Ln Ln Ln f x 4k
O v J v j
o o
00 NJ O O I D U l
t-x l-x l-x l-x l-x t-x l-x t-x l-x l-x l-x l / l
LU
oo
LU 00 LU LU LU LU LU LU 00 ID
l -x t-x t-x l-x t-x t-x l-x t-x t -x t-x t-x
2
W i sj i sj IsJ
fo isl io fsl fsl fsJ fsJ to
6
4 1 f l 4k 4k f l f l f x f x f x 4 1
8 o
3 O O O O
o o
O O
f l 4k f l f x f x f l f x f l f l f . 4 1
vJ s J v j v J v j v i v J ; vl v J v j v i
in i n in i n i n i n in in in in i n
^ >
Dr 2
Dr c)
Dr ^ Dr m
Dr S
Dr c Dr c Dr c Dr Cl >
ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H
a
j n 8
3
8
a a a a a a a a a a
TO TO TO TO TO TO TO TO
eio ciq ciq
01 01 01 OJ OJ DJ OJ 01 DJ OJ Ol
3 3 3 3 3 3 3 3 3 3 3
R'
Nl '
01 OJ OJ OJ OJ 01 OJ 01 OJ OJ OJ
rt
5" 5' a a a' a' a' a' a a' 8
3 3 3 3 3 3 3 3 3 3 3
i n
2
TJ TJ T3 T3 13 13 13 CT
o
CT
ID fD ID ID ID fD ID ID ID fD fD
O n n o n
O
n n O
n
2'
o j ' o j ' QJ' QJ' t u' QJ' o j ' Ol ' DJ oi
i n i n
rt
01 01 OJ QJ QJ DJ 01 OJ OJ OJ OJ
3 3 3 3 3 3
^
g
3 3
^ , > . > . > . > > > > > . > . >
f l f~i e-l f l f - l n n e-l n f l
10 ID fD fD fD ID ID ID ID ID ID
a
3 3 3 3 3 3 3 3 3 3
m n
fT fT f T O f l f l
n n n
8 8 8
a a a a a a a a
3
3 3 3 3 3 3 3 3 3 3
c
i I r 1 r 1 I i i
ID ID fD ID fD fD ID fD ID fD ID
TO TO TO TO TO TO TO TO TO TO TO
Si
01 OJ QJ QJ DJ 01 OJ OJ DJ QJ
a 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
10 ID ID fD fD ID fD fD fD tD fD
i n i n
do' do' do' da' do' do' do' do' da' do' dq'
01 OJ OJ OJ OJ OJ 01 01 OJ
rt rt rt
8 a'
8
a' a' 8 a' 8 a' a' a
a
3 3 3 3 3 3 3 3 3 3
JC.
T l TT - n T l TT TT TT TT TT TT TT
01 OJ OJ OJ OJ 01 OJ OJ 01 01 tu
- 1
01 01 OJ QJ QJ OJ 01 OJ 01 DJ OJ
CT CT CT CT CT CT CT CT CT CT CT
' ^ ^
3 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
10 ID ID ID tD ID ID ID fD fD ID
i n i n
iS' do' do' do' do' do' do' do' dq' dq' dq'
01 01 01 OJ OJ DJ 01 OJ OJ 01 01
rt
5" a'
8
a' a' a' a' a' a a' a'
a
3 3 3 3 3 3 3 3 3 3
+.
+ + + + + + + + + +
H
H H H H H H H H H H
> > > > > > > > > > >
ro ro ro ro ro ro ro ro ro ro ro
U l U l U l
on Ln Ln U l U l U l
or
U l
CT -CT T3 -CT TS -CT -CT -CT -CT -CT -CT
CT CT CT CT ZT CT CT CT CT CT CT
8
a a a a a a a a a a
rt
8
a a a a a a a
3
a a
j n
^ JC, JC,
^
^ JC, JC,
l-x t-x t-x t-x t-x l-x l-x l-x l-x l-x M
O
o o o o o o o o o o
P
o
1
o
1
P P
| 0 | 0
o
| 0
' o o o o o ' o ' o o o ' o o
M l-x l-x
o
t-x l-x t-x l-x l-x t-x t-x
P
3
o
LD
o o o o o o o
00 Ln t-x v J VJ f l NJ
en
U l LU l-x
13 13 "CT CT 13
D
T3 13 13 13 CT
TO TO TO TO TO TO TO TO TO TO TO
z
c
3
CT
l- l-x l-x t-x l-x l-x t-x t -x I -i l-x l-x 10
cn cn
CTI
m cn cn
U l
on on
U l
on
UT 4 1 LU NJ t-x
o
I D 00 v J
en
Ln
O
01
l-x l-x l-x l-x l-x l-x M t-x t-x l-x t-x
o o
O
o
3
o o o o o
O to
> > > > > > > > > > >
H
13 13 -CT 13 13 CT -CT TJ CT CT TJ
g
I f l-x l-x l-x l-x l-x t-x l-x l-x l-x l-x to
O o
O
o o o o o
O O O
l -x l-x l-x l-x t-x l-x l-x l-x l-x l-x l-x
Ul OO LU LU LU LU LU U l LU OO LU
isj
fsJ
io
fsl fsl fsl fsJ fvil fsJ fo fo
i- l-x t-x
o p
O
p P p o P
b b b
on Ln
4k UJ oil fo fsJ i-^x
00
on
NJ
cn
O NJ LU t-x LU
o
00
l-x M M t-x l-x l-x t-x t-x l-x l-x t-x U l
LU LU LU LU LU 00 LU LU LU oo LU ID
l-x t-x t-x I-.X l-x t-x t-x t-x t-x I-.X t-x
2
Nl fsl
io io
i sl
io
i sl isl fsl fsJ fsj ID
6
4k f x f x f l f l f l 4 1 f l f l
8
O
o o o o
O
o o
O O
i ^ f x 4k f x f l f l f l f x f l f l f l
T3
s J v j v j ; vl v J v j v J v J v J v J s J
in i n i n i n in i n in i n in in i n
>
Dr 2
> ^
Dr c
Dr 2
^
Dr ^ Dr Dr c Dr c >
ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H ff H
a
l n 8
3
8
a a a a a a a a a a
qp
TO TO TO TO TO TO TO TO TO TO
01 OJ OJ OJ OJ OJ DJ OJ 01 OJ DJ
a
3 3 3 3 3 3 3 3 3 3
N'
Nl N
01 01 01 OJ QJ OJ 01 01 01 QJ QJ
rt
8
a' a' a' a' a' a' a' a' a 5'
a
3 3 3 3 3 3 3 3 3 3
>.
v
\
i n
a
-CT 13 D
CT 13 13 13 13 CT CT
ID fD fD ID ID ID ID ID fD ID ID
m n
f l
n o n n n f l n
2'
o j ' Ol ' Oj ' 01 cu Dl ' as' Oj ' oi' DJ
t n
rt
01 QJ 01 OJ OJ 01 01 01 01 QJ DJ
3
g
3 3 3 3 3 3 3 3 3
^ .> .> > .> .> > > > > ^
r
f - l f l f l f l
n
1-1
n n
f l n
10 ID fD ID tD fD ID fD fD fD fD
a
3 3 3 3 3 3 3 3 3 3
f l
m o f l f l
n n
O f l f l f l
8 8
a a a a a a a a a
3 3 3 3 3 3 3 3 3 3 3
r*
f 1 1 I 1 r - 1
eo
tD fD ID tD ID fD tD ID fD fD
TO TO TO TO TO TO TO TO TO TO TO
Si
OJ 01 OJ t u 01 01 01 01 OJ OJ
a 3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
ID ID fD fD ID fD ID ID ID ID ID
tn
rt
do' do' do' do' da' do' do' do' dq' do'
01 01 OJ DJ 01 OJ 01 01 01
rt rt rt
5' a'
8
a a a' 8 a' a' a' a'
a
3 3 3 3 3 3 3 3 3 3
i n
T l TT TT TT TT TT TT TT TT - n TT
01 OJ OJ DJ OJ DJ 01 01 QJ tu OJ
01 01 QJ OJ OJ QJ 01 Ol QJ OJ OJ
CT CT CT CT CT CT CT CT CT CT CT
' .
a
3 3 3 3 3 3 3 3 3 3
< < < < < < < < < < <
ID ID ID fD ID ID ID fD ID ID fD
t n
do' do' do' do' do' da' do' do'
dq' dq'
da'
01 OJ OJ QJ OJ OJ 01 OJ OJ 01 OJ
rt
a' a' a' a' a a' 5' a' a' 8 a
a
3 3 3 3 3 3 3 3 3 3
f + + + + + + + + + +
H H H H H H H H H H H
> > > > > > > > > > >
ro ro ro ro ro ro ro ro ro ro ro
^C
U l U l U l Ln UT Ln U l
on
U l U l
on
U l U l
CT T3 -CT T3 CT T3 -CT -CT CT -CT -CT
CT CT CT CT CT CT CT CT CT CT CT
a a a a a a a
3
a a a
rt
8
a a a a a a
8
a a a
i n
l-x l-x t-x t-x t-x l-x t-x l-x H i " t ^ "M
Q
o o o o o o
O
o o o
P 1 1 1 1
P
1
| 0 | 0
o
| 0
' o o o o ' o ' o ' o o o ' o o
l-x l-x l-x l-x l-x t-x t-x I-i l-x t-x t-x
l-x t-x l-x l-x t-x t-x l-x l-x
o o
IDX LU
p
NJ t-x C3 I D LO I D UJ t o
D
CT 13 13 -CT CT CT 13 13 13 13
TO TO TO TO TO TO TO TO TO TO TO
vl
Ol
o
>
s
IDX
Ul
Ul
v l
M
Nl
g
f k
sJ
in
NJ
+, $
7 a-
! ! lis
3 I
3 M
QJ Ol
cn
3
<
ID
13
ID
rt n
TO' OJ'
a 51
3 3
+ t:^
^ ^
l l
73 a
?!
11
TO
OJ
a
3
01
01
3
<
fD
TO
rt
a'
3
+
^
ro
on
>
ro
+
>
^
ro
+
>
"+
>
TJ
T3
fD
3
Q.
O
+^
c
Ln
TT
O
73
>
+
cn
TO
t u
3
5 1
8%
i
i i
+ >
+ i
n
<
9
Ln
+
CT
30
O
f l
fD
3
n
a
3
I
ID
S |
o ^
i l
CT TO
Q. t u
- h rt
a
3
3
<
ID
TO
rt
a'
3
+
^
ro
Ul
>
ro
+
.>
H
>
ro
+
>
TJ
-CT
ID
3
3 .
1 ff'
G <.
on a
2 ei S
T I
01
cn
73
>
cn
o
6 ^
Nl 2
+ 0.
01
+
O .,
3 ^
^ >
11
> 5L
z
n 3
m <
ID
a.
a
3
3
<
ID
TO
OJ
a'
3
+
H
>
ro
Ul
^
ro
+
>
5
ro
+
>
+
>
13
13
ID
3
a.
o
>
13
TO
01
3
cn
n
fD
3
I - D
O TO
J > 01
z
n 3
m <
z s.
"S. 0=
- h rt
a'
3
3
<
ID
TO
rt
a
3
+
^
ro
Ul
^
>
ro
+
>
B
ro
+
>
*+
>
TJ
3
fD
3
3 .
x'
t-x l-x l-x l-x l-x
v J
vl
vl
en en
NJ l-x O LD 00
t-x l-x l-x t-x l-x
O
o o o o
> > > > >
13
-o
TJ CT -CT
t-x l-x l-x l-x l-x
O
o
O
o o
t-x t-x l-x t -x l-x
LU
oo
LU U l LU
isi io isJ io IsJ
NJ t-x
I f t f
t-x
b
Ln oil fsl i-:x
oo
v j
cn
s J 00
l-x t-x l-x l-x t-x
LU LU LU LU
oo
t-x t-x l-x t-x t-x
io isl i s j fsl fsJ
f l f l f l f l f l
o o o o o
4k f l f x f x f k
v i v j v j VJ v j
i n i n in
in
i n
^
Dr c
Dr S
Dr c
^r
ff H ff H ff H ff H
ff
3
a a
3
a
TO TO TO TO TO
01 OJ OJ 01 01
3 3 3 3 3
OJ 01 01 01 01
a' a' a'
8
a'
3 3 3 3 3
13 13 CT 13 CT
fD ID ID ID ID
n n n
f l
n
o j '
QJ'
Dl ' Oj ' Ql '
01 OJ 01 t u 01
3 3 3 3 3
> .> > > >
- v .
n
f l f l
n n fD fD ID fD fD
3 3 3 3 3
n
f l f l
n
f l
a a a
8
a
3 3 3 3 3
i r - i r
fD ID fD fD fD
TO TO TO TO TO
OJ QJ 01 01 01
V j . V j V j
r^
3 3 3 3 3
< < < < < fD ID ID ID ID
da' do' do' da' do'
DJ QJ 01 OJ OJ
a' a' a a 8
3 3 3 3 3
TT TT TT TT TT
QJ OJ 01 OJ OJ
OJ OJ Ol DJ OJ
CT CT CT CT CT
3 3 3 3 3
< < < < < ID ID fD ID fD
do' do' da' do' do'
OJ 01 01 QJ DJ
a' a'
5'
8 a'
3 3 3 3 3
+ + + + +
H H H H H
> > > > >
ro ro ro ro ro
U l U l Ln U l
on on
CT T3 -CT CT CT
CT CT CT CT CT
a a a a a
a a a a a
t-x l-x I-.X t-x l-x
o o o o o
1 1
o
1
| 0
o o o ' o o
l-x l-x l-x l-x l-x
l-x t-x t-x t-x l-x
v i CTI f x LU U l
13 CT 13 CT 13
TO TO TO TO TO
cn
CTI
vl
o
>
CT
oo
io
NJ
O
f l
v j
in
cn
a
TO
OJ
3
a
3
CT
ID
n
ID
3
f l
a
3
i
fD
TO
DJ
3
<
fD
TO
QJ
a
3
01
CT
\ .
3
<
ID
TO
tu
+
^
ro
Ln
o
o
CT
TO
OT
cn
o
>
LU
id
ISJ
f l
o
^
v i
a
eio
OJ
3
-CT
fD
C
3
CT
ID
CD
as
3
ID
Ul
ID
<
fD
cn
8
3
n
fD
3
n
a
3
f -
fD
TO
OJ
3
<
ID
TO
DJ
a
3
3
<
ID
TO
OJ
a'
3
+
^
ro
Ln
C3
o
T3
TO
S3
o
?
LU
Ul
vl
4k
NJ
Nl
s
^
en
iti ^
+. ff
I i n
i l
o ^
+ 2.
iS S
M
00 13
A S
O 01
> n
f l fD
g ff
T3 I
3. ID
rt, TO
tu
3
<
fD
a
3
01
3
3
<
ID
TO
01
>
ro
Ln
5
ro
+
>
5
ro
+
>
"+
>
TJ
13
fD
3
Q.
X
cn
o
>
TJ
NJ
f x
v j
in
M #'
I I
i I
fD
01
c
+
-I-
Z
"CT
73
+
-I-
NJ
I D
+
cn
OJ
3
OJ fD
%g
11
CT TO
Q. QJ_
5"
<
ID
a
3
OJ
DJ
3
<
fD
TO
rt
a
3
+
H
>
ro
Ul
>
ro
+
I
ro
+
>
"+
>
-CT
CT
tD
3
a.
x'
i 5
l l
^ S
X S
ro 3.
3 a
ID 3 ^
I i
X 0.
a 01
+ UC
cn
f l
ID
3
m
a
m 3
I t
l i
a
3
01
01
3
<
fD
TO
rt
a'
3
+
H
>
ro
Ul
$
ro
+
>
>
ro
+
>
*+
>
CT
T3
ID
3
3.
f ff
cn
a a
X
3D
f l
TO
ff %
? I,
3D t n
fD CT
I I
fD UT 01
3
f
3.
ISI f l
o a
8 ^
^ ID
TJ TO
3. OJ
3
<
ID
TO
01
a
3
01
3 r
5"
<
fD
TO
rt
8
3
+
H
>
ro
U l
>
ro
+
>
" H
>
ro
+
>
V
>
TJ
-CT
ID
3
3.
cn
s l
3
Dl
? 5'
ID 3 ^
f i
X Q.
a 01
+ VC
11
t >
-f-
- f
NJ
U l
+
f l
ID
3
O
a
3
3 00
^ 3
rt, fD
TO
t u
a
3
01
3
3
<
ID
TO
rt
5'
3
+
^
ro
L n
>
ro
+
>
^
>
ro
+
>
"+
>
13
CT
fD
3
3.
Nl
f l
3
f k
v J
in
S ^
g l
a s
2 s'
? 5'
ID 3
3 CT
TO ID
+ Q.
a Si
t ff
^ -5
ro cr
A ^
m ?
ff
fD o
! l
t-x 21
00 ^
r 3
13 <
2; %
TO
rt
8
3
OJ
OJ
3
<
ID
TO
rt
a'
3
+
^
ro
t n
>
ro
+
>
^
ro
+
>
+
>
TJ
-CT
fD
3
3.
cn
00
cn
o X
13
fD
cn sr
m 3
f t
fD
3
n
a
3
f
ID
TO
OJ
TO
01
a
3
01
QJ
3
<
fD
TO
rt
a'
3
+
^
ro
Ul
>
ro
>
ro
+
>
"+
>
-CT
CT
tD
3
3.
cn
o X
ID
O .
3 '
TO
+
a
+
>
TJ
fD
OJ
3
ro
+
ITI
TT
ro
3
CT
tD
2
+
n
fD
3
o
a
3
i
ID
TO
OJ
TO
DJ
a
3
OJ
as
3
<
ID
TO
OJ
a
3
+
^
ro
i n
>
ro
+
>
^
>
ro
+
>
"+
>
13
13
fD
3
a.
Nl
4k
^
in
M ^
f
5
TT TO
O DJ
3D 2.
ol
^1
8%
+ n
8 E
LU 3
t >
i f f
n 3
I I
? J r
o ^
CZ 3
3D
cn
<
ID
n era
a
3
01
OJ
3
<
fD
TO
QJ
a
3
+
5!
ro
U l
>
ro
+
>
5
ro
+
>
"+
>
CT
TJ
ID
3
Q.
R
s l
> DJ
X 3
+ N
- O 01
30 3 .
3
>
CT
cn
01
3
i . ^
l i
3 n
fD a
^ ^
Q. fD
- t , TO
OJ
3
<
fD
TO
t u
a
3
01
01
3
<
fD
TO
rt
a
3
+
^
ro
U l
>
ro
+
>
s
ro
+
>
*+
>
CT
13
fD
3
a.
S #'
m TO
+ DJ
n 3
a N
3 01
a 5'
3
c
3
CT
ID
o
01
3
ID
L n
10
<
ID
cn
CL
t u
sr CT
S. S
Ul 2i.
I I
8 >
I?
o ff
o a
11
+ 01
il
b t
^ 5'
3
01
QJ
3
<
fD
a
3
+
^
ro
i n
s
ro
+
>
B
ro
+
>
>
13
TJ
ID
3
3 .
UJ
00
o
>
Ul
Ul
00
isl
o
N l
in
iti ^?
a 8
eio
OJ
3
cn
ID OJ
+
3D
ID_
fD
OJ
fD
- I -
-i-
ID
-<
+
NJ
3
O
LD
CT
3.
a
^
CT
ID
n
Oj '
DJ
3
f l
ID
3
<
fD
TO
01
a
3
01
3
3
<
fD
TO
01
a
3
>
ro
i n
5
ro
+
>
>
ro
+
>
~+
>
TJ
13
fD
3
3.
ISJ
f l
3
41
v j
in
00 ^
X ff
Ln tn
S a-
gs
> i'
Sl
13
a.
f l
fD
3
f l
a
3
ID
TO
3
<
ID
TO
QJ
8
3
QJ
as
3
<
ID
TO
rt
a'
3
+
^
ro
Ul
>
ro
+
>
^
>
ro
+
>
*+
>
-CT
CT
ID
3
C3.
cn
a
3
CT
ID
n
QJ'
+
>
n
Ul fD
1 |
fD
TO
3
<
ID
a
3
QJ
as
3
<
ID
TO
rt
8
3
+
^
ro
Ul
5
ro
+
>
>
ro
+
>
~+
>
TJ
-CT
fD
3
3.
cn
fD
^ TO
> 01
X 3
+ Ni '
-CT
30
a
3
13
fD
n
01
3
I s
I s
CT I
C3. ID
rt, OQ
01
3
<
ID
a
3
Ol
01
3
<
fD
TO
rt
8
3
+
^
ro
o n
>
ro
>
ro
+
>
+
>
13
13
ID
3
3.
00 ^
1 ff
L n t n
g-g
7 2.
T> S
cn
II
3.
OJ
3
n
fD
3
n
a
3
i
fD
TO
3
<
ID
a
3
OJ
OJ
3
<
ID
TO
OJ
a
3
+
^
ro
Ul
>
ro
+
>
5
ro
+
>
>
CT
CT
ID
3
3.
cn
? ^
h%
as as
13 3 .
CT a
i r ' 3
+ Dr
= TJ
C fD
ff S'
3. 5
a QJ
3 3
&g
n
fD
3
n
a
3
I
fD
TO
OJ
3
<
fD
TO
01
8
3
OJ
CT
3
<
fD
TO
DJ
a'
3
5
ro
L n
>
ro
+
^
^
>
ro
+
>
*+
>
CT
13
ID
3
a.
Ul ^
i ff
f
m TO
? 2.
f l N
i |
13
ID
cn
QJ
3
3 . >
fD f l
+ fD
H
3
+ IT
t > ID
a%
+ 3
13 <
3. fD
TO
OJ
a
3
QJ
CT
<
ID
TO
OJ
5'
3
+
H
>
ro
Ul
>
ro
+
>
5
ro
+
>
V
>
TJ
CT
ID
3
3.
1 >
cn
g
?1.
II
f l i n
m TJ
Z fD
H 0.
f l OJ
O uT
^ ff
2, >
<
+
OJ
3 .
a
"S 3
n
ID
3
f l
8
^ cS
Z. OJ
Ul
> 5
13 <
CL ID
TO
01
8
3
3
<
ID
a
3
+
^
ro
ro
+
>
^
ro
+
>
'+
>
13
-CT
fD
3
a.
UJ ! n
cn
fD
c JC
s l
73 01
^ i'
- n rt
if
UT DJ
T ^
i f
CT 3
f rt
i l
I s
A 3
CL rt
a
3
OJ
3
3
<
fD
a
3
+
^
ro
Ul
$
ro
+
>
H
>
ro
+
>
"+
>
13
-CT
fD
3
3.
Ul ^
i ff
rz. JC
Sl
30 01
f l
cn
i n gj
T ^
11
T3 3
I rt
l l
r n fD
I t
A $
g
a . rt
a
3
QJ
3 -
5"
<
ID
a
3
>
ro
on
s
ro
+
>
5
ro
+
>
"+
>
13
CT
fD
3
C3.
>
CT
NJ
O
f l
v j
in
iti ^
X ff
Cl eiq
O ^
+ 2.
NJ OJ
i l
00 13
A :
O OJ
> n
n ID
^ n
13 I
3. ID
- h TO
CU
3
<
fD
TO
OJ
a
3
OJ
3
3
<
ID
a
3
s
ro
L n
5
ro
+
>
>
ro
+
>
~+
>
CT
CT
ID
3
3.
3
CT
ID
o
01
3
CD
Ul
ID
<
ID
cn
8
3
N l
s
O
?
LU
l O
id
f l
g
NJ :*'
L n 3
eiq
3.
f s
8f
cn
+ i n
ff -
13 I
9; >
f l
ID
3
f l
a
3
I
ID
TO
OJ
3
<
fD
TO
QJ
a
3
OJ
3
3
<
ID
TO
rt
a
3
+
^
ro
Ul
>
ro
+
ro
9
ro
+
ro
*+
>
T3
TJ
fD
3
a.
o
g
l l
I 3
t 5'
+ OJ
30
ID
f j
1
tn
a
3
n
m[
ff
3
3 ^
ID J >
f l
ID
3
f l
a
3
.2 era
QJ_
13 ^
9; ?
fD
TO
OJ
a
3
01
OJ
3
<
ID
TO
rt
a'
3
+
^
ro
Ul
5
ro
+
ro
s
ro
+
ro
"+
>
13
13
fD
3
3.
+ ff'
? ^
OJ - 1
11.
I s
a
3
cn
TJ
ID
n
QJ'
ID
<
f D'
g
+
Z x 3
a >
OJ
3
e-l
ID
3
f l
a
3
+
OJ
3
CL
+
30
fD ra
a %
3 .
i f
TO
tu
8
3
t u
3
3
<
ID
TO
rt
a
3
3
ro
Ul
5
OT
+
ro
3
ro
+
ro
"+
>
13
13
fD
3
3.
> "2
r - 3
II
cn
ID
n
si
ff
3 TO
rt >
e-l
fD
3
O
a
3
OJ
-T I
01 ID
CT TO
+ 01
n
< 3
% I
do'
rt
a
3
OJ
3 -
5"
<
ID
TO
rt
a
3
+
^
ro
on
5
ro
+
ro
?
ro
+
ro
"+
>
TJ
"CT
fD
3
3 .
00
? 5
r
01 TO
5 ^
a 3.
+
-CT
fD
O
Ol '
01
3
l~l
ID
3
fD
TO
01
13
ro
do'
rt
5'
3
3
<
ID
TO
rt
8
3
+
^
ro
on
>
ro
+
ro
s
ro
+
ro
' +
>
CT
13
fD
3
CL
00
?1.
X N
g ^.
TJ a
rt 3 ^
CT
ID
n
Ol '
cn
Ol
3
+
01
3
a.
+
-CT
30
^
? >
u
f l n
3. a
3 3
ID
TO
01
^ <
TO
01
a
3
3
<
ID
TO
rt
6
3
+
^
ro
on
9
ro
+
ro
5
ro
+
ro
*+
>
13
CT
ID
3
3 .
+
t-x
1 5
So
Z TO
J I
cn
a
3
Dr
T3
ID
n
Ol '
01
3
CT
30
- I -
-i-
NJ ^
f >
S n
Ol fD
? =
NJ
O
o
ID
o
a
3
i
ID
TO
3
<
ID
TO
01
a
3
3
<
ID
TO
rt
8
3
+
H
>
ro
Ul
>
ro
+
. >
H
>
ro
+
>
~+
>
13
13
fD
3
3.
cn
-CT
ID
n
01
+
>
fl
IS
Ul ID
i |
|
fD
TO
OJ
3
<
fD
TO
OJ
a
3
3
<
fD
TO
OJ
a
3
+
H
>
ro
Ul
>
ro
+
>
5
ro
+
>
*+
>
CT
13
tD
3
C3.
f l M
- < CU
^ I
t
l-x f l
1
CT DJ
5 3
cn
l!
01
3
<
tD
TO
Ol
a
3
3
<
fD
TO
rt
a'
3
+
^
ro
Ul
s
ro
+
>
?
ro
+
>
+
>
CT
13
ID
3
3.
a
3 ^
CT
tD
n
OJ
ff
3
i ^
i l
^ ^ >
i ff
5 ^
+
-CT
2. 3,
< as
5t
ep j r
i> %
I :
13
13
ID
3
3.
3
<
ID
TO
01
a
3
3
<
ID
TO
rt
5'
3
+
^
ro
Ul
>
ro
+
>
^
ro
+
>
+
>
CT
CT
fD
3
3.
C
3
CT
ID
o
01
3
ID
l / l
tD
cn >
a
8
3
TO
OJ
QJ
3
X ' >
+
en
+
f l
fD
3
f l
a
3
i
fD
TO
13 3
3. <
rt, fD
TO
01
a
3
01
01
3
<
ID
TO
rt
5'
3
+
^
ro
or
5
ro
+
I
ro
+
>
+
>
CT
13
fD
3
a.
x'
Nl
Nl
O
O
>
io
Ul
Nl
g
^
in
iti ^
? (5
TO
01
rt 3
i f
+ a
ro 3
I !
cn
+
3
a
T3
3.
01
3
1-1
ID
a
3
i
ID
TO
01
3
<
fD
a
3
OJ
CT
3 "
<
fD
a
3
+
^
ro
Ul
B
ro
+
ro
5
ro
+
ro
~+
>
13
13
fD
3
3.
iti ^
Z TO
3 DJ
fD 3
3. N '
S' 3.
A i
cn
T3
fD
OJ
3
C a
JZ 3
CT n
a. TO
3
<
ID
a
3
OJ
t u
3
<
fD
a
3
+
^
ro
Ul
s
ro
+
ro
B
ro
+
ro
"+
>
13
CT
fD
3
3.
cn
TO
QJ
5' %
3 S
a
3
OJ
=1;
f - l
ID
3
m
a
3
leS
CD as
C
^ f
CT ID
S; %
TO
01
QJ
OJ
3
<
ID
a
3
+
^
ro
Ul
$
ro
+
ro
B
ro
+
ro
' +
>
13
13
ID
3
3.
cn
TO
01
3 fD
a.
S 3.
A
ff m
11 + ff
s ^
l>
+
f l
fD
3
f l
a
> r
CD ro
+ TO
UT 01
X ^
^ I
- r " tD
a'
3
OJ
3
3
<
fD
TO
OJ
a'
3
+
^
ro
L n
$
ro
+
ro
^
>
ro
+
ro
*+
>
CT
13
fD
3
3.
cn
TO
OJ
3
%
a
3
ID i n
OJ CT
11
OJ
3
fD
n
^ >
+
- f
ro
n
fD
3
n
a
ro
^ ID
> TO
Z OJ
O S
Ul 3
TJ <
9; $
do'
OJ
a
3
3
<
fD
TO
OJ
a'
3
+
^
ro
Ul
B
ro
+
ro
^
>
ro
+
ro
"+
>
CT
3
tD
3
3 .
x'
i l
1 2.
QJ
cn
+
3D
ID
. 3
H
a
3
n
0 /
ff
3
f l
ID
3
f l
8
3
ID
2
+
3
01
TO
^
3 . QJ_
b ~v
' I
do'
QJ
a
3
3
<
fD
TO
rt
a'
3
+
^
ro
Ul
5
ro
+
ro
>
ro
+
ro
*+
>
13
13
fD
3
a.
x'
cn
a
TO
a
3
fD
n
o j '
X ff
s ^
>
f - l
fD
3
3D a
iTi 3
X f -
$i
b ^
a . 3
<
m
do'
rt
5'
3
3
<
ID
TO
rt
a'
3
+
^
ro
on
>
ro
+
ro
B
ro
+
ro
*+
>
CT
CT
fD
3
3.
v j
M
+ DJ
m 3
ff s
cn
ID
E. "S
OJ
3
f l
ID
3
n
8
3
I
fD
TO
OJ
3
<
ID
TO
QJ
8
3
01
as
3
<
ID
TO
rt
a'
3
+
^
ro
Ul
5
ro
+
ro
$
ro
+
ro
'+
>
CT
CT
ID
3
3.
3
>
13
cn
? ff'
~ t n
>
a.
c'
% 5
TO
QJ
rt
a'
3
ff ff
- 3
I f f
i n 3
f l
8
3
ID
3
<
fD
a
3
01
01
3
<
ID
TO
rt
a'
3
i
ro
UT
^
>
ro
+
ro
^
>
ro
+
ro
V
>
CT
TJ
ID
3
3.
cn
a
3
f l
tD
3
fT
8
3
f
fD
TO
t u
3
<
fD
DJ
CT
5"
<
fD
TO
rt
6'
3
+
^
ro
Ul
>
ro
+
ro
5
ro
+
ro
*+
>
-CT
T3
fD
3
3.
C
3
CT
ID
o
01
3
tD
cn
i $
G a-
Ul JT
o "3
;1 2.
i , s
+ 3.
E
Ln
fD
<
ID
>
a
8
3
fD
n
01
ff
3
n
fD
3
n
a
3
P cfS
TJ 01
3.
3
<
fD
TO
OJ
a
3
t u
OJ
3
<
tD
TO
DJ
a'
3
+
^
ro
i n
>
ro
+
ro
?
ro
+
ro
' +
>
13
13
fD
3
3.
Nl
Ul
O
?
LU
%
&
f k
v J
U l ^
+ g-
P S
+ a
9, -5,
T in
NJ " D
Ln ID
+ Q.
01
TO
3
fD
a.
cn
c
3
fD
3 .
01
3
e~i
ID
3
n
a
3
fD
TO
3.
3
<
ID
TO
01
a
3
01
01
3
<
fD
TO
rt
5'
3
+
^
ro
on
>
ro
+
ro
?
ro
+
ro
+
>
13
CT
ID
3
3.
NJ
f l
v i
in
iti ^
H OJ
I 3
i l
CT 3
i ^
% 8.
a u
i n I / ,
cn
t u
3
n
fD
3
f l
a
fD
TO
QJ
3
<
fD
TO
01
a
3
OJ
OJ
3
<
ID
TO
rt
a'
3
+
5!
ro
Ln
3
ro
+
ro
>
ro
+
ro
+
>
13
T3
fD
3
3 .
x'
ISJ
4k
O
f x
v j
in
iti ^
? i
cn
+
<
oT
TO
ID
+
U l
a
3
\
13
tD
n
QJ'
I ff
i ^
3 TV
1-1
- S
n
a
ID
TO
3
<
ID
TO
01
a
3
OJ
3 -
5"
<
tD
TO
rt
a'
3
+
^
ro
U l
>
ro
+
ro
5
ro
+
ro
"+
>
T3
13
fD
3
3.
ISJ
f l
3
f x
v j
in
io ^
y ff
> S
I 3
11
CT a
+ 3
P Dr
S
% S
a' ^
3
+
OJ
3
t a.
cn
ff
3
c n
i l
II
I I
CT TO'
CL OJ
8
3
01
3 -
3"
<
fD
TO
rt
a
3
+
^
ro
U l
>
ro
+
ro
$
ro
+
ro
*+
>
13
13
fD
3
a.
o
>
-CT
ISJ S^.
^ m
> S
cn
OJ
01
a
9- ^
4 %
o.
e-l o j '
30 ^
J |
I I
CT
3 .
f l
tD
3
n
a
3
ID
TO
3
<
ID
a
3
OJ
OJ
3
<
ID
8
3
+
^
ro
on
^
>
ro
+
ro
?
ro
+
ro
"+
>
-CT
13
ID
3
3.
> "2
II
& ^
13
fD
O
S|
ff
3
TO
+
n
<
5
U l
cn
13
3.
f l
fD
3
f l
a
3
i
ID
TO
QJ
3
<
ID
TO
01
8
3
01
CT
3
<
fD
a
3
>
ro
U l
5
ro
+
ro
^
>
ro
+
ro
"+
>
13
CT
ID
3
3 .
cn
TO
QJ
3
a
3
i n
13
fD
n
OJ
OJ
3
+ f - l
I
I <S
73 ^
I I
TO
OJ
a
3
OJ
OJ
3
<
ID
a
3
+
^
ro
U l
>
ro
+
ro
?
ro
+
ro
' +
>
13
13
fD
3
3.
fD
3.
cn
!n 5
a
_3^
CT
ID
n
53'
ID
01
3
ID
3
+ it
as
3
I - l
fD
3
o
a
3
o "S
TJ
3.
TO
01
a
3
OJ
3
3
<
fD
TO
OJ
5'
3
+
H
>
ro
Ln
>
ro
+
ro
^
>
ro
+
ro
"+
>
13
CT
ID
3
3 .
t m
CT 'S
cn
a
3
01
3
+
01
3
3.
+
T3
3D
^
" >
l i
a s
3 3
+ 01
11
a
3
01
3
3
<
ID
TO
rt
8
3
+
^
ro
U l
>
ro
+
ro
?
ro
+
ro
"+
>
-CT
13
fD
3
a.
3
>
13
+
ISJ
1 ff
Ul -%L
TO
3 01
fD 3
CL N '
2 3.
A
fD t n
DJ CT
I I
cn
QJ
3
ID
n
>
+ f l
i l
i l
t
U l - v :
F 5
13 <
a . fD
a
3
OJ
OJ
3
<
ID
TO
rt
a'
3
+
^
ro
on
>
ro
+
ro
5
ro
+
ro
*+
>
-CT
T3
ID
3
3.
ISJ
O
f l
v j
in
iti ^
I %
n a~
30
f l
+
c
3
CT
ID
O
01
3
CD
U l
fD
3
ID
cn
K
8
3
TO
OJ
3
a
3
T3
fD
OJ
3
n
fD
3
f l
a
fD
TO
3
<
fD
TO
QJ
a
3
QJ
3
3
<
fD
TO
rt
a'
3
+
^
ro
U l
>
ro
+
ro
?
ro
+
ro
*+
>
13
13
ID
3
3.
g
o
>
o
IDX
LU
4k
M
Lii
f k
Nl
ifr
v j
Ul ^
X ff
Ul in
ID TO
i 2.
a s
+ 3.
7 =
f l t n
> 13
D ID
^ S'
cn
3
+
01
3
f - l
fD
3
3
<
fD
a
3
01
3
3
<
ID
TO
01
>
ro
Ln
5
ro
+
ro
B
ro
+
ro
"+
>
13
13
fD
3
C3.
o
?
+ ^
on TO
rt QJ
1 i'
^ 5-
2 ^
s%
+_ n
OJ
cn
n
ID
3
f l
a
3
I
fD
TO
DJ
3
<
ID
a
3
OJ
3
3
<
fD
TO
rt
a
3
+
^
ro
i n
s
ro
+
ro
5
ro
+
ro
"+
>
13
-CT
fD
3
3.
cn
^ 9
TO
OJ
3
a
^
CT
fD
n
t u
2 21
OJ
3
f - l
ID
3
fT
8
ID
TO
DJ
3
<
fD
a
3
DJ
CT
^
3
<
fD
TO
OJ
a'
3
+
^
ro
Ul
?
ro
+
ro
^
>
ro
+
ro
~+
>
13
-CT
fD
3
3.
era "2
a
3
cn
CT
fD
=R
^ >
* n
ID
3
n
a
tD
TO
01
3
<
fD
TO
01
8
3
01
CT
3
<
fD
TO
rt
8
3
g
ro
on
>
ro
+
ro
5
ro
+
ro
~+
>
13
T3
fD
3
3 .
^ ci3
A ^
SI
cn
CT
ID
1 . in
OJ
3
f l
fD
It
? era
3 2i
TJ ^
9; ?
m
dq'
rt
a'
3
OJ
OJ
3
<
fD
TO
rt
a
3
+
^
ro
UT
?
ro
+
ro
>
ro
+
ro
"+
>
13
- 3
fD
Nl
f x
o
f l
v J
en
iti ^
t m
^1
O t u
LU
cn
a
3 ^
CT
fD
n
01
ff
3
to
X ro
O n
H ~
? 5
t - 1
ll
a
3
01
CT
V ,
3
<
ID
TO
rt
a'
3
+
^
ro
Ln
s
ro
+
ro >
ro
+
ro
%
>
CT
-CT
fD
3
3 .
cn
UJ Q
TO
OJ
3
I I
9, -5,
"+ m
l-x -CT
4: . fD
3 0 .
+ 0J_
l l
s >
Is
13
3.
f l
a
3
i
ID
TO
01
3
<
fD
8
3
3
<
fD
TO
rt
8
3
+
H
>
ro
UT
>
ro
>
ro
+
ro
"+
>
13
13
fD
3
Q.
NJ
4 1
O
4k
v j
in
iu ^
t ff
+ j n
g's
I
9, -5,
T tn
t-x 13
f l fD
0 D,
X L
1 &
^ >
cn
01
f l
tD
3
n
a
3
rt I
fD fD
a. TO
tu
-CT
ID
OJ
DJ
3
<
ID
TO
rt
a'
3
+
H
>
ro
Ln
>
ro
+
ro
?
ro
+
ro
*+
>
13
-CT
ID
3
3 .
>
TJ
ISJ
f l
O
i ^
v j
in
- I - ^
NJ ! .
LU rt
X 5
n
I N
O OJ
LU rt
11
-1- CT
cn
QJ
3
f x
o
^ 5
n
i ^
8%
ll
a
3
OJ
3
3
<
fD
TO
rt
a'
3
+
H
>
ro
Ul
>
ro
+
ro
s
ro
+
ro
"+
>
13
13
fD
3
3 .
>
13
Ul ^
t ff
+ J?
^
I g'
+ a
9, ^
+ m
t-x 13
4k ID
O 0 ,
+ 01_
>
+
01
cn
01
3
3 <T
CL >
NJ f l
U l ID
il
m
3
TO
fD
TO
01
a
3
01
t u
3
<
fD
TO
rt
a'
3
+
^
ro
Ul
5
ro
+
ro
>
ro
+
ro
"+
>
CT
TJ
fD
3
3.
ISJ
f l
O
f l
v j
i n
i tj ^
o
+
Z
c
3
CT
ID
o
01
3
ID
Ul
ID
<
to
cn
ID
8 a"
3' eio
rt ni
^ 2.
+
3D
fD_
fD
OJ
fD
+
+
LD
+
S
QJ
<
+
N l
3
O
LO
a
, 3 ^
CT
fD
n
Qj '
u
01
3
<
fD
>
a
5
3
OJ
3
TO
OJ
a
3
QJ
t u
3
<
fD
TO
rt
a'
3
+
^
ro
Ul
>
ro
+
>
>
ro
+
>
*+
>
TJ
13
ID
3
13.
K
Ul
o
>
a
LU
%
NJ
Ln
Ul
g
f k
v j
4k
+
01 TO
Ol
+ 3
a
l l
i l
^
cn
3
+
<
f l
ID
3
n
a
3
+ fD
4- "2
3
<
0J_ S
o do'
i n 01
f l 3.
11
LO ^
^ J
13
TO
DJ
3
<
fD
TO
rt
5'
3
+
H
>
ro
Ln
^
>
ro
+
ro
3
ro
+
ro
*+
>
13
13
ID
3
a.
x'
K
Nl
O
>
-o
01 TO
CT 01
+ 3
g" a'
cn
f l
fD
3
n
8
3
+ fD
' TO
+ 01
+ 3
E 5
f
n 3.
i i
I D "-V
9" J
i-
3
<
ID
TO
rt
a'
3
+
H
>
ro
o r
^
>
ro
+
ro
^
>
ro
+
ro
"+
>
CT
13
ID
3
3.
X
+
v j
H
cp
U l
cn
5 2.
CJ OJ
LU rt
s l
m i n
i s
i l
3
I -l
ID
3
m
a
3
r
fD
TO
t u
3
<
ID
a
3
01
OJ
3
<
ID
TO
rt
a'
3
+
H
>
ro
Ln
>
ro
+
ro
S
ro
+
ro
NJ
+
>
13
TJ
ID
3
3.
? >
00 rt
X 5
if
O ISI
5 %
a
3
cn
CT
fD
l l
o a
iB 3
1
^ fD
a . TO
3
<
ID
a
3
01
DJ
3
<
ID
TO
rt
a
3
+
^
ro
L n
>
ro
+
ro
5
ro
+
ro
NJ
"+
>
CT
13
ID
3
3.
cn
a
3
- ^
n
fD
3
O
a
3
+ tD
1 TO
+ DJ
+ 3
i $
f
O 3.
a
3
3
f l _
ID
^ 3*
i-
3
<
ID
TO
rt
5'
3
+
^
ro
Ul
>
ro
+
ro
?
ro
+
ro
*+
>
CT
CT
ID
3
1.
cn
2 a
? 3
f l
ID
3
n
a
3
I t
5
CT <
Q. fD
TO
01
tu
as
3
<
ID
a
3
+
^
ro
ro
+
ro
^
>
ro
+
ro
NJ
"+
>
CT
TJ
fD
3
3.
X 5
I 9
ID TO
a DJ
cn
a
a
fD in
+ TJ
> fD
3 n
0J_ o i '
s %
i n' gJ
f i
n rr
CT fD
I I
a, 3
b ID
a. era
3
<
fD
TO
OJ
a
3
t u
OJ
3
<
fD
TO
rt
a'
3
+
^
ro
Ln
5
ro
+
ro
5
ro
+
ro
NJ
"+
>
-CT
13
ID
3
3.
X
+
cn
Ul
TJ
a
cn
DJ
+
3D
fD
T3
a ZJ.
? I.
I I
S K
? ff
>
^ ^
8 ff
+ 3
: ff
ff 9
a
3
DJ
QJ
3
<
ID
TO
rt
a
3
+
H
>
ro
Ln
S
ro
>
ro
+
ro
NJ
>
-CT
13
ID
3
3.
cn
X a
+ T3
S" S.
Ii
8 >
ID f - l
ID
3
+
fD
3
= 3
l i
3
<
fD
a
3
tu
DJ
3
<
fD
TO
rt
3
3
+
H
>
ro
Ul
^
>
ro
+
ro
"H
>
ro
+
ro
NJ
"+
>
13
T3
fD
LO
4 ^
n
3D
n
+
13
a
3
% s
X
01
3
f l
tD
3
f l
a
3
I
fD
TO
01
3
<
fD
8
3
01
OJ
<
ID
TO
QJ
8
3
+
^
ro
L n
?
ro
+
ro
5
ro
+
ro
*+
>
13
T3
fD
3
a.
x'
NJ
f l
3
f l
v j
in
CTl ^
X ff
Ln t n
fD TO
^ 2.
3 5
c
3
CT
t o
o
01
3
t o
Ul
ID
cn >
f l
U
^ K
3 i n
11
f l
fD
3
CT ID
Q_ TO
- h QJ
3
<
fD
a
3
Ol
OJ
3
<
fD
TO
OJ
a'
3
+
^
ro
i n
>
ro
+
ro
?
ro
+
ro
V
>
13
T3
fD
3
a.
x'
Nl
2
o
>
o
UJ
6
g
:^
v J
in
S
+
cn
ID
Qj a
QJ TO
a OJ
t I
NJ
83
o
>
a
:
13
ID
OJ
3
QJ
3
3.
+
T3
3D
^
ro
- ^
I s
ff
a
3
I
ID
TO
3
<
fD
TO
OJ
cn 3.
8
3
S
13
TO
3
<
fD
TO
rt
5'
3
+
^
ro
Ln
s
ro
+
ro
?
ro
+
ro
'+
>
13
13
fD
3
a .
x '
cn
OJ a
as ( i q
I I
I !
+ eu
-CT
3D
QJ
3
f l
fD
3
fT
8
3
I
fD
TO
OJ
3
<
ID
TO
OJ
cn 3.
I a
l-x 3
I I
CT QJ
TO CT
3
<
fD
TO
rt
5'
3
+
^
ro
Ul
>
ro
+
ro
5
ro
+
ro
'+
>
-CT
CT
tD
3
3.
01 TO
CT QJ
+ 3
a
3
cn
CT
ID
01
3
f l
ID
3
n
a
3
i
fD
TO
OJ
+ 3
I I
^ '2
cn 3.
I a
l-x 3
n
ID
QJ
QJ
3
<
fD
TO
OJ
5'
3
+
^
ro
Ul
5
ro
>
ro
+
ro
+
>
13
CT
ID
3
3.
h-x i 2.
t s
01 TO
CT 01
+ 3
cn
a
3
01
3
n
fD
3
f l
a
3
i
fD
TO
CU
? S
s %
cn 3.
a
ID 5
<
fD
TO
rt
a
3
+
^
ro
Ul
>
ro
+
ro
^
>
ro
+
ro
*+
>
CT
CT
fD
3
a.
NJ
f k
3
f x
; vl
in
u
01 a
ff ciq
CT 01
+ 3
cn
01
3
Ql_
+
01
3
a.
+
-CT
30
H
+
ro
- ^
: g
o: ff
3. a
3 3
t n I
+ ID
+ <2
+ 3
5%
n 3.
1 =
CJ ' t ^
NJ
01
3
<
ID
TO
rt
a'
3
+
^
ro
Ul
>
ro
+
ro
?
ro
+
ro
V
>
CT
CT
fD
3
3 .
I -i
O
>
13
01 TO
CT 01
+ 3
cn
QJ
3
f - l
fD
3
f l
a
3
+ ID
1 TO
+ Ol
+ 3
I
~ v rt
CD d q '
i n OJ
f t 3 .
l i
r ?
TO ^
3
<
fD
TO
01
a'
3
+
^
ro
Ul
>
ro
+
ro
5
ro
+
ro
"+
>
13
13
fD
3
C3.
01 TO
CT OJ
+ 3
i i . a
ff =,
1!
+ 21
? |
ro Zz-
5 >
I s
a
3
fD
TO
DJ
cn
+ 3
( I
CD TO'
Ln OJ
n 3.
i i
; g
TO '
<
fD
TO
OJ
a
3
+
^
ro
Ul
>
ro
+
ro
S
ro
+
ro
"+
>
CT
13
ID
3
C3.
cn
TO
OJ
3
8
3
QJ
3
f l
ID
3
f l
a
3
r
fD
TO
o n 01
X < ^
^ I
T - ID
^1
a'
3
QJ
ff
3
<
ID
TO
DJ
8
3
+
^
ro
Ul
>
ro
+
ro
?
ro
+
ro
'+
>
-CT
13
ID
3
3.
N l
f l
O
f l
v J
in
LO ^
i ff
> s ^
^ TO
J> DJ
g I
I t
+ OJ
II
i ff
cn
01
fD
=<
TO
01
a
3
01
01
3
<
ID
TO
CU
a
3
>
ro
Ul
>
ro
+
ro
^
>
ro
+
ro
"+
>
13
TJ
ID
3
3.
fD
NJ
f l
3
f l
; vl
in
s
- i .
oT a"
01 TO
CT OJ
+ 3
g" S'
in rt
"5. a'
ff =^
i t
+ 21
? |
OT ^
5 >
I s
Q. ff
3. a
3 3
i n I
+ fD
< TO
+ 01
+ 3
E $
sf
cn
00 i n
LO '
3
<
fD
TO
01
>
OT
Ul
^
>
OT
+
ro
?
ro
+
ro
' +
>
CT
CT
fD
3
C3.
01
c
3
CT
t o
O
01
3
tD
4- -Jv.
!^ ~'
+
cn
ID
a
3
Ul
ID
<
ID
>
a
5
3
DJ
3
I s
a
3
I
tD
TO
01
<
ID
5 %'
n rt
i i
ID
v j TT
CT
TO
3
<
fD
TO
m
a'
3
+
^
ro
Ln
>
ro
+
ro
?
ro
+
ro
*+
>
TJ
T3
ID
3
C3.
s
o
?
LU
Ul
Nl
id
N l
6
t
t I
}> >
cn
%
? I
CL a
+ 3
1!
Z o /
TJ
9; >
f l
fD
3
8
3
I
fD
TO
01
3
<
ID
TO
OJ
a
3
OJ
01
3
<
fD
>
ro
Ul
$
ro
+
f - l
>
ro
+
n
"+
>
CT
13
fD
3
3.
cn
i ^
_ . QJ
01 rt
a
I I
ff 21
t l
X >
f l
fD
3
n
a
3
f l
+_
a
fD
+ fD
ro TO
fD 0J_
eiq
ID 3
r <
*l
QJ
a
3
QJ
CT
5"
<
fD
TO
rt
a'
3
+
^
ro
Ln
"H
>
ro
+
f - t
^
>
ro
+
f t
'+
>
TJ
-CT
fD
3
a.
00
cn
^ %
+ 3
I
a
3
Is.
-S
OJ
3
- a
f l
a
3 a
ID
+ ID
ro TO
ID flJ_
eio
tD 3
r <
01
QJ
CT
CTT
<
fD
TO
QJ
a
3
+
^
ro
Ul
>
ro
+
n
^
>
ro
+
f t
*+
>
TJ
CT
ID
3
a.
cn
t m
01 TO
CT QJ
+ 3
8
3 ^
CT
fD
n
QJ'
QJ
3
+
OJ
3
3.
+
CT
3D
ro
- ^
I s
5: ff
3. a
3 3
t n r -
+ ID
' TO
+ OJ
+ 3
CD TO'
U l 01
f l rt
i i
LO " - v
N 3?
S I
3
<
fD
TO
rt
a
3
+
^
ro
Ul
^
>
ro
+
ro
>
ro
+
ro
~+
>
13
T3
tD
3
a.
cn
M
01 a
ff eiq
CT 01
+ 3
a
3
01
3
- ^
I s
0. ff
3. a
3 3
t n I
+ fD
' TO
+ 01
+ 3
f I
^ '2
cn 3.
I a
CT
ro 3^
CT 01
TO CT
5"
<
fD
TO
rt
8
3
+
^
ro
on
>
ro
+
ro
$
ro
+
ro
*+
>
TJ
CT
fD
3
a.
NJ
4k
3
4k
v j
in
M
01 a
ff eiq
CT 01
+ 3
a
3
cn
fD
n
si
ff
3
+
OJ
3
a.
+
-CT
3D
^
ro
- ^
I s
Q. ff
3. a
3 3
tn I
+ ID
I TO
+ OJ
3
<
ID
S "2
cn 3.
a
l-x 3
SI
3
<
tD
TO
rt
a'
3
+
^
ro
on
>
ro
+
ro
^
>
ro
+
ro
~+
>
TJ
13
ID
3
a.
cn
t (5
QJ TO
CT QJ
+ 3
01
a
3 ^
a ?
3
a.
ID
n
o /
ff
3
+
T3
30
^
ro
II
Q. ff
3. a
3 3
i n r -
+ ID
' TO
+ OJ
+ 3
E 3
f
f l rt
z a
O 3
N1 3?
CT 01
TO CT
5"
<
ID
TO
rt
8
3
3
ro
on
>
ro
+
ro
?
ro
+
ro
*+
>
CT
CT
ID
3
3.
01 TO
CT OJ
+ 3
a
3
cn
ID
n
o /
ff
3
I s
E ff
3. a
3 3
i n |
+ fD
I TO
+ OJ
+ 3
I s
V v rt
5 %'
f - | rt
3
<
fD
TO
rt
a
3
+
^
ro
Ul
>
ro
+
ro
5
ro
+
ro
+
>
TJ
13
ID
3
3.
M
OJ a
01 eiq
CT OJ
+ 3
S" ff-
i n rt
l l
4
3
3.
cn
fD
O
21
ff
3
9 >
f t
ID
3
n
a
3 3
i n I
+ fD
I TO
+ 01
+ 3
I I
S '2
cn 3.
I a
E CT
g 3^
T3 01
3
<
fD
TO
U
a
3
+
^
ro
U l
>
ro
+
ro
5
ro
+
ro
*+
>
13
"CT
ID
3
CL
t m
01 TO
CT OJ
+ 3
a
3
cn
QJ
3
f l
ID
3
n
a
3
I
fD
TO
OJ
3
<
ID
S %
cn 3.
I a
l-x 3
3#
CT QJ
TO CT
5"
<
ID
TO
QJ
a
3
+
^
ro
Ln
>
ro
+
ro
5
ro
+
ro
*+
>
13
T3
fD
3
a.
>
TJ
OJ TO
CT OJ
+ 3
a
3
C
3
CT
ID
O
01
3
ID
cn
9 >
Ul
ID
<
t o
>
a
8
3
OJ
3
f l
fD
3
n
a
3
i
fD
TO
01
+ 3
E I
^ %
cn 3.
I a
l-x 3
^ #
DJ
3
<
ID
TO
OJ
a
3
+
^
ro
OT
?
ro
+
ro
>
ro
+
ro
*+
>
T3
CT
ID
3
3 .
N
O l
o
^
LU
i n
Nl
Ln
3
NJ
6
in
T
K
Ln
on 8
O g'
01
c ^.
OJ a
+ CT
fD
f l
ro ^
ff
13 3
3. cr
>
n
ID
3
f l
a
3
I
fD
TO
OJ 3
<
fD
TO
OJ
a
3
QJ
as
3
<
fD
TO
rt
a'
3
+
H
>
ro
Ul
>
ro
+
f - l
^
>
ro
+
P
+
>
13
TJ
fD
3
a.
cn
iti ^
X ff
L n t n
ID
era
f l
_
3
fp_
+
CT
f o'
?
-1-
t-x
3
+
^
OJ
<
+
3
I D
b
C3.
TO
OJ
3
m
a
01
3
f l
fD
3
n
a
3
I
fD
TO
01
3
<
fD
TO
01
a
3
3
<
fD
TO
rt
5'
3
+
^
ro
Ul
>
ro
+
f t
^
>
ro
+
f l
' +
>
CT
TJ
fD
3
a.
cn
30 TO
n w
f - l Nl '
a
^
CT
fD
n
Ql '
QJ
3
f l
fD
3
f l
a
3
I
ID
TO
OJ
<
fD
TO
01
a
3
01
CT
5"
<
ID
TO
OJ
e'
3
+
^
ro
Ul
5
ro
+
f t
5
ro
+
r>
+
>
13
T3
fD
3
3.
h
0 9
DJ TO
? :
I I
It
+ 0.
cn 01
ff 5
CT OJ
3 3
^
n
ID
3
f l
a
3
I
ID
TO
OJ
3
<
tD
TO
OJ
a
3
3
<
ID
TO
rt
a
3
+
H
>
ro
Ln
?
ro
+
f t
5
ro
+
f t
+
>
13
13
fD
3
a.
x'
cn
LU
I
cn
fD
^
I 01
O 2.
z
ISI
OJ
ISJ i n
4 1 13
+ fD
1 B'
^ 5
m OJ
7 ^
2 >
it
$ e%
+ SL
o \
i B 3
13 fD
rt. rt
dq'
rt
a'
3
3
<
ID
TO
rt
5'
3
+
^
ro
L n
>
ro
+
f t
3
ro
+
f l
~+
>
13
13
fD
3
a.
x'
NJ
f l
v j
in
X I '
n JC
?l
n OJ
fl
i l
3 ff
b ^
3. cr
- h ^
t - 1
ID
3
a
3
I
ID
TO
OJ
3
<
fD
TO
OJ
a
3
OJ
as
3
<
ID
TO
rt
a'
3
+
^
ro
Ln
?
ro
+
f - t
5
OT
+
f l
~+
>
13
CT
ID
3
a.
x'
cn
y ff'
X . t n
K 3-
S i '
? l
cn
ID
n
01
ff
3
n
ID
3
fT
a
3
f -
fD
TO
t u
3
<
fD
a
3
QJ
ff
3
<
fD
TO
OJ
8
3
+
H
>
ro
Ul
$
ro
+
f - l
5
ro
+
f t
' +
>
T3
CT
ID
3
3.
11
9
-n TO
+ 01
Ul 3
^ s'
TJ rt
S S
H
CT QJ
I I
^
^ n
ID
3
f l
a
3
I
fD
TO
OJ
3
<
ID
a
3
OJ
ff
3
<
ID
TO
rt
a'
3
+
H
>
ro
i n
>
ro
+
f t
s
ro
+
n
' +
>
CT
TJ
ID
3
a.
cn
00 rt
+. $
1
- H DJ
i l
r l
NJ i n
I SJ T3
+ ID
1 S'
^ %
m 01
7 ^
? ^
S 5
31
i l
> TO
I
-b 5
3. 3 .
- t , TO
a
3
OJ
DJ
3
<
ID
TO
rt
a
3
+
^
ro
Ul
\
^
ro
+
n
s
ro
+
f t
*+
>
TJ
CT
fD
3
3 .
cn Kx ^ cn
+ era
m %
a. a
+ 3
i t
Z 0 /
F ff
3
CT
3.
f l
fD
3
f l
a
3
I
ID
TO
01
3
<
ID
8
3
01
01
3
<
ID
TO
rt
a'
3
+
H
>
ro
on
5
ro
+
n
^
>
ro
+
f l
"+
>
CT
CT
fD
3
3.
C
3
CT
ID
o
01
3
ID
cn
Ul
ID
<
ID
>
n
CT 3
TO
01
3
a
3
13
fD
n
01
DJ
3
TO
fD
+
-CT f t
fD
3
f l
a
3
I
ID
TO
QJ
O TO
SI
O 3
TO S
CT
3
<
fD
TO
rt
8
3
+
H
>
ro
Ul
>
ro
>
ro
+
ro
NJ
"+
>
TJ
13
fD
3
3 .
N l
I O
v j
O
>
TJ
Ul
U l
LU
4k
O
g
t
in
o
>
u
3
>
TJ
C
3
CT
ID
o
01
3
ID
i n
ID
<
tD
+
NJ
I D
+
cn
TO
01
3
%
+
"CT
ff %
s
> ID
I n
^ E
Cl 5
X 01
3 ^
b >
^ ff
n
a
3
f -
ID
TO
01
3
<
fD
TO
01
a
3
3
<
ID
TO
rt
a'
3
+
^
ro
Ul
>
ro
+
f l
"H
>
ro
+
n
+
>
13
13
ID
3
3.
4- ~ v
NJ i 2.
? ff
t n
: l
? ff
cn
a
3
A ^
O m
11
3
+
ff
3
S ff
? =
n
a
TO
01
TO
01
OJ
OJ
3
<
fD
TO
Si
a
3
+
^
ro
Ln
>
ro
+
f - l
^
>
ro
+
P
+
>
-CT
T3
ID
3
a.
Ln JT
? %
II
l / l t n
i l
^ E
O jn
cn
Ul
OJ
3
13
a.
n
fD
3
f l
a
3
i
ID
TO
01
3
<
ID
TO
OJ
a
3
OJ
ff
3
<
ID
TO
m
a'
3
+
^
ro
Ln
>
ro
+
f l
s
ro
+
f t
"+
>
TJ
T3
ID
3
3.
iti ^
? ff
- i . i n
i n ^
U l a
'^'g
hi. a
% ^
+ i n
7 ; 13
O g
OJ
cn
c ^
II
Ul f t
fD
TO
QJ
3
<
tD
a
3
OJ
OJ
3
<
fD
TO
QJ
a'
3
+
^
ro
5
ro
+
n
>
ro
+
f t
"+
>
13
TJ
fD
3
a.
+
ISJ
v j
+^
OT
Ul
TO
+
3D
cn
$ Q
T3
3.
OJ
3
f l
ID
3
n
8
3
I
ID
TO
3
<
tD
TO
OJ
a
3
OJ
OJ
3
<
fD
a
3
>
ro
on
5
ro
+
f - i
H
>
ro
+
f t
"+
>
T3
CT
fD
3
3.
iti ^
LU rt
X
H dq
t ^ ^
I S
?
cn cn
TJ
ID
o
73
2
-b
3.
OJ
3
f t
ID
3
fT
a
ID
TO
3
<
fD
TO
QJ
a
3
OJ
CT
5"
<
ID
TO
rt
a'
3
+
5!
ro
Ln
^
>
OT
+
f t
>
ro
+
f t
+
>
13
-CT
tD
3
a.
Ln CT
Ln fD
DJ
3
rs
fD
3
f l
8
3
r
ID
TO
01
13
C3. 3
rt, <
ro
dq'
rt
5'
3
01
OJ
3
<
fD
TO
QJ
a'
3
+
H
>
ro
U l
5
ro
+
c-l
?
ro
+
f l
~+
>
CT
TJ
ID
3
3.
io ^
X ff
on i n
rt \
ff 9
g s
cn
+
CT
n
f
-I-
l-x
o
+
S
OJ
-<
+
o
ID
01
3
11
fD
TO
01
3
<
ID
TO
01
01
CT
3
<
ID
TO
rt
a'
3
+
^
ro
i n
>
ro
+
1-1
>
ro
+
f t
"+
>
13
CT
fD
3
3.
io ^
X 5
o %
i l
t a
+ 3
Ln ID
H f l
O Ql '
cn
+ 01
g ^
? ^
ff
fD
TO
3
<
ID
a
3
OJ
OJ
3
<
ID
TO
rt
a'
3
s
ro
Ul
>
ro
+
f t
?
ro
+
n
*+
>
T3
13
fD
3
3.
io ^
cn
+ d.
ISJ Nl
ISJ OJ
+ 3.
i i
Ln
3D
m
-CT
+
O
f l
+
N l
LU
t-x
U l
y
^
>
f
3
I D
fD
13 TO
a . OJ
3
<
fD
cn
QJ
3
f t
tD
3
n
a
TO
OJ
a
3
QJ
ff
3
<
fD
8
3
+
^
ro
Ul
5
ro
+
e-l
5
ro
+
f t
'+
>
13
CT
fD
3
Q.
x'
i l
I i
UT fD
H f l
O o j '
7 S
S ^
i l >
TO f l
fD
3
f l
8
^ " 5
3
<
fD
TO
tu
a
3
DJ
01
3
<
fD
TO
rt
a
3
s
ro
Ln
H
>
ro
+
f l
"H
>
ro
+
f t
"+
>
CT
CT
fD
3
a.
>
a
8
3
LU
O
OO
o
?
Ul
on
cn
s
Nl
^
en
+ sr
cn
m
H
s I
l l
c-l
>
Ul
+
3D
fD
TJ
a
CT
3.
01
ff
3
I -)
fD
3
f l
a
3
I
fD
TO
3
<
fD
TO
01
8
3
01
ff
3
<
fD
TO
rt
5'
3
+
^
ro
Ul
>
ro
+
f t
$
ro
+
P
+
>
13
13
ID
3
3.
3
>
CT
CTI !.
X ff
f l i n
JT TO
ZL Ql
a 3
CT iq-
3 Ol
+ 3.
f-t a
it
1 OJ
cn
? 3
^
+
o
LO
b
3.
f l
ID
3
f l
a
3
I
ID
TO
3
<
fD
a
3
tu
OJ
3
<
fD
TO
rt
a'
3
+
^
ro
Ln
>
ro
+
f - l
^
>
ro
+
f l
*+
>
CT
CT
fD
3
3.
cn
fD
1
+
on
c
T3
13
s s
I I
cu f t
? ^
^
"g. >
^ n
ID
3
a
3
i
ID
TO
3
<
ID
QJ
ff
3
<
ID
TO
rt
a'
3
+
^
ro
Ul
>
ro
+
f l
H
>
ro
+
f l
'+
>
TJ
T3
fD
3
a.
x'
00 ^
1^
$ 2 .
3 S
i f
kl
ro 21
cn
OJ
3
H >
f l
ID
3
% o
. 3 3
-b JD"
a. era
3
<
ID
TO
01
a
3
01
ff
3
<
fD
TO
OJ
a'
3
+
^
ro
Ul
>
ro
+
n
^
>
ro
+
f t
' +
>
CT
13
fD
3
3.
^ cro
S 01
> 2.
+ N
X 2i
c
cn
a
3
01
3
' 1 >
n
ID fD
13 3
II
l i
i.S
rt, 01
8
3
OJ
CT
3
<
fD
TO
QJ
a'
3
+
^
ro
Ul
>
ro
+
f t
?
ro
+
f t
*+
>
13
13
fD
3
3.
cn
X ff'
^3-
}!
u
Z D.
tu
i
It
as 3
3 rt
i i
1
^ fD
a . TO
3
<
ID
TO
01
a
3
01
01
3
<
tD
a
3
+
^
ro
OT
3
ro
+
f t
>
ro
+
f l
' +
>
13
13
tD
3
3.
cn
a
TO
+
-1-
U l
+
TO
OJ
3
13
fD
t u
3
f l
fD
3
ID
TO
DJ
3
<
ID
TO
01
a
3
OJ
ff
3
<
ID
8
3
+
5i
ro
Ln
^
>
ro
+
f-l
"H
>
ro
+
f t
"+
>
TJ
13
fD
3
C3.
NJ ^ .
i $
ff 9
TO
cn
01
13
+_
a 5
CT OJ
3 3.
A
II
LU 3!
f l
+ 3
13
3.
3
<
fD
TO
DJ
8
3
OJ
3 -
5"
<
fD
TO
rt
a'
3
+
^
ro
Ln
>
ro
+
n
3
ro
+
f t
' +
>
13
13
tD
3
3.
iu ^
cn
ID
a"
eio
o
^
on
Ul
%
+
f l
3 01
i l
CT in
ID
+
X
>
3D
g
Ul
tD
OJ
iTi 3
CT
3.
f t
ID
3
f l
a
3
I
fD
TO
01
3
<
tD
a
3
Ol
OJ
3
<
fD
TO
rt
a
3
+
^
ro
on
?
ro
+
n
^
QJ
CT
+
n
~+
>
CT
13
ID
3
a.
x '
73 TO
n 01
+ 3
f - l N '
CT QJ
^ 5'
E. '>
rt, -S
fD
n
Ql '
OJ
3
f l
ID
3
fT
a
3
f -
tD
TO
3
<
ID
TO
OJ
a
3
QJ
QJ
3
<
m
do'
rt
a
3
+
^
ro
Ul
$
ro
+
f t
5
ro
+
n
~+
>
CT
CT
ID
3
3.
cn
NJ
f l
O
f x
v j
in
Ul ^
X ff
f l SJ
a.
c
3
CT
to
o
01
3
ID
Ul
ID
<
to
cn
n
+
ro
c
a.
ID
3
b
3.
>
a
5'
3
n
ID
3
a
3
ID
TO
OJ
3
<
ID
TO
OJ
a
3
3
<
ID
TO
rt
a'
3
+
^
ro
or
>
ro
+
1-1
5
ro
+
f l
"+
>
CT
13
tD
3
3.
Ul
M
IO
o
>
a
s
l -x
LU
U l
0 0
Nl
6
i ^
sJ
cn
5? ff
X . m
i
NJ N
ISJ 01
+ 3.
i |
n
TT
ID
UJ E
TJ
C3.
t u
3
1-1
fD
3
f l
a
3
i
fD
TO
QJ
3
<
tD
TO
QJ
a
3
3
<
fD
TO
rt
5'
3
+
^
ro
Ul
5
ro
+
o
5
ro
+
p
~+
>
T3
CT
fD
3
3.
o
?
3 9
ll
H %
CT 5
a. 3
CT
fD
n
Dj '
QJ
3
f l
fD
3
f t
a
3
fD
TO
3
<
ID
TO
OJ
a
3
01
OJ
3
<
fD
TO
rt
a
3
+
^
ro
i n
$
ro
+
CD
5
ro
+
p
"+
>
13
13
fD
3
a.
cn
? I
e% <2
I I
a
3
cn
+
o
+ -CT
~ ID
n
si
ff
3
f t
ID
3
n
a
3
f -
ID
TO
^ 7
13 rt
9: era'
Si
5'
3
3
<
ID
a
3
+
-i
>
ro
U l
$
ro
+
CD
5
ro
+
p
'+
>
-CT
CT
ID
3
3.
NJ
4k
3
:^
v j
in
y I
^1
2 %
f x 2.
l-x N
+ 01
i l
I t
-<
+
6
CT
+
N l
3
O
LO
- I -
- I -
L n
on
%
+
rsi
g
QJ
C
n
E
ff
3
f l
fD
3
n
a
3
r
fD
TO
01
11
a
3
OJ
01
3
<
fD
a
3
+
H
>
ro
U l
"H
>
ro
+
o
5
ro
+
p
"+
>
T3
CT
ID
3
3.
I ^
SI
n 01
f t 3
A ff
a rt
f I
ff ^
fl
TO 3!
+
I ff
- ^
21 a
b 3
01
cn
3
<
fD
8
3
3
<
ID
TO
Si
a'
3
+
^
ro
on
$
ro
+
o
3
OT
+
P
"+
>
CT
CT
ID
3
a.
5#
9
- n TO
+ 01
! l
?i
cn tn
01 CT
3 fD
' 5' D.
CT 21
01 i n
13.
+
<
Cl
as
3
n
fD
3
f l
a
3
I
fD
TO
01
<
ID
a
3
01
OJ
3
<
ID
TO
QJ
>
OT
OT
5
ro
+
o
>
ro
+
p
"+
>
-CT
CT
ID
3
a.
1 I
9
3 TO
I 1'
a. %
+
<
cn
OJ
TO
fD
+
3
m
d
ID
3
13
a.
OJ
3
a
3
i
ID
TO
OJ
3
<
fD
OJ
DJ
3
<
fD
TO
OJ
a
3
+
^
ro
Ul
>
ro
+
o
-
^
ro
+
p
'+
>
-CT
CT
ID
3
3.
I ^
i t
T =.
NJ N
N l OJ
+ 3.
cn
-CT
m S
y^ SL
l l
n
fD
3
f l
8
3
i
ID
TO
QJ
3
<
ID
TO
OJ
a
3
t u
ff
3
<
ID
TO
01
+
^
ro
on
^
ro
+
o
5
ro
+
p
*+
>
TJ
T3
ID
3
a.
ft
i> ff'
7 5'
^
3 . i n
TT CT
ID fD
I I
cn
ID
f l
fD
8
3
i
fD
TO
t u
3
<
ID
TO
01
a
3
01
ff
3
<
ID
TO
01
a'
3
+
^
ro
UT
>
ro
+
o
5
ro
+
o
'+
>
13
CT
ID
3
a.
+ ff'
f t j n
f l
3 QJ
QJ 3
g.
+ 3
Ln n
CT
fD
13 tn
CL sr
f t
fD
3
f l
8
3
f
fD
TO
OJ
3
<
ID
TO
OJ
a
3
QJ
QJ
3
<
ID
TO
DJ
8
3
+
H
>
ro
on
5
ro
+
o
>
ro
+
p
~+
>
T3
13
ID
3
a.
z
c
3
CT
ID
o
01
3
to
cn
i n
ID
3
ID
>
a
8
3
i
11
00
ISJ
l-x
LU
+
P
3D
01
m >
f t
fD
3
m
a
3
+
f l
-n
s
t - 1
2^
01
b v^
^ I
ID
TO
01
a
3
QJ
ff
3
<
fD
TO
Si
a
3
+
H
>
ro
Ul
>
ro
+
o
>
ro
+
p
~+
>
-CT
CT
ID
3
3.
Ul
LU
o
o
>
13
UJ
%
i d
^
NJ
i ^
v j
+
ISJ
4k
n
<
5
i n
+
TT
QJ
CT
cn
3 ?
I |
QJ
o 3
n t ^
> ^
f t
-CT fD
a . 3
' f l
fD
TO
OJ
3
<
fD
a
3
OJ
t u
3
<
fD
TO
QJ
8
3
+
^
ro
Ln
>
ro
+
o
3
ro
+
p
>
TJ
T3
fD
3
a.
or
9
z era
T 2.
ISJ ISI
cn
fD
ISJ QJ
+ 3.
', a
3
on
13
ID
n
QJ'
X ^
f l
fD
3
fT
a
3
1
fD
TO
OJ
3
<
fD
a
3
OJ
CT
3 "
<
fD
TO
Si
a'
3
+
^
ro
Ln
>
ro
+
o
.
^ ro + p "+ > TJ "CT fD 3 a.
v i !.
cn
TO
OJ
3
ff
a
3
f t Dr
^ 2
CJI ~
fD
13
a.
2L
ff
3
t - i
tD
3
f l
a
3
tD
TO
OJ
3
<
ID
TO
OJ
a
3
Ol
01
<
ID
TO
OJ
5'
3
+
^
ro
UT
>
ro
+
CD
5
ro
+
p
~+
>
-CT
13
ID
3
a.
t l
cn
TO
01
a
3
T J
ID
O
t u
DJ
3
f l
ID
3
f l
a
3
i
fD
TO
01
<
ID
TO
01
a
3
OJ
^
3 "
<
fD
a
3
i
ro
on
3
ro
+
D
?
ro
+
p
*+
>
CT
-CT
fD
3
DL
NJ
f x
3
f x
v j
in
'+ ~
Ul !.
cn
00 j n^
^ TO
P ^
73 hj '
- n OJ
+ rt
8 i
CT ID
n
TJ 01'
% 5
01
3
f-t
fD
3
ID
TO
01
3
<
fD
TO
01
a
3
3
<
fD
TO
DJ
a'
3
+
^
ro
i n
$
ro
+
o
^
>
ro
+
o
"+
>
13
13
fD
3
3.
TO
01
3
rt
a'
3
6^
- O fD
T -
CT Ol '
9 : i n
X ff'
00 in
^
LU
+
JO
30
TT
+
f -t
cn
01
3
f - l
fD
3
f l
a
3
I
fD
TO
OJ
3
<
ID
TO
01
a
3
3
<
fD
TO
OJ
a'
3
+
^
ro
or
5
ro
>
ro
+
p
'+
>
CT
CT
fD
3
3.
ISJ
4k
O
f l
v j
en
iu ^
X ff
T l t n
I I
+ 2i
cn
Si ^
K m
11
f - l
fD
3
n
a
ID
TO
3
<
ID
TO
01
a
3
3
<
ID
TO
DJ
a'
3
+
^
ro
Ul
^
>
ro
+
o
?
ro
+
p
*+
>
CT
13
ID
3
a.
x'
cn
g a
13
fD
f .>
f -t
fD
3
n
a
3
i
fD
TO
OJ
3
<
ID
TO
01
a
3
OJ
ff
3
<
ID
TO
Si
a'
3
+
^
ro
Ul
>
ro
+
o
^
>
ro
+
p
"+
>
-CT
13
fD
3
a.
iti ^
t ff
f l
^ I'
OJ
cn
a
3
fD
+
OJ
l l
? E
Ul in
^ s
>
n
fD
3
n
a
3
r -
fD
TO
OJ
3
<
fD
a
3
01
01
3
<
fD
TO
01
a
3
+
^
ro
or
>
ro
+
CD
B
ro
+
p
+
>
13
CT
ID
3
3.
ISJ
f l
O
4k
v J
in
iti ^
LU rt
X 5
TT ' t >
01 a
-1 jjT
? 2.
rt S
^ ~
ID
g#
fD
cn
a
3
OJ
3
3
Ol
^ ff
3
13
a.
f t
fD
3
f l
a
3
I
fD
TO
01
3
<
fD
a
3
OJ
ff
3
<
fD
+
^
ro
Ln
5
ro
+
o
5
ro
+
p
'+
>
CT
CT
fD
3
3.
t-x
o
>
CT
C
3
CT
ID
o
01
3
ID
Ul
ID
<
ID
cn
^
9
Z TO
T 2.
NJ N
ISJ OJ
+ 3.
it
Kl SL
1.1
f l
fD
3
>
a
a'
3
8
3
f -
fD
TO
01
3
<
ID
TO
01
8
3
3
<
ID
TO
QJ
a'
3
i
ro
Ul
>
ro
+
o
s
ro
+
p
"+
>
-CT
13
ID
3
ea.
LU
LU
f x
3
>
LU
Ul
IO
4k
I D
LU
H>
isl
' >
v J
in
X , fD
cn JC
3 9
OJ 2 .
+ a
c
3
CT
ID
o
01
3
ID
Ln
to
3
ID
+
l O
TO
ID
-<
+
a
cn
OJ
8
3
7
o
f l _
+ i >^
13
11
I I
+ Zr
d >
t ff
n
I eS
I &
t 3
^ I
3. rt
TO
OJ
a
3
QJ
ff
3
<
to
TO
OJ
a'
3
+
^
ro
UT
>
ro
+
o
5
ro
+
p
'+
>
CT
3
fD
3
3.
Ul '2
3 3
cn
i l
3 SL
^ S
Q
^ ^
% ff
3
f l
8
3
ID
TO
01
3
<
tD
TO
01
a
3
3
<
ID
a
3
+
^
ro
L n
$
ro
+
o
5
ro
+
CD
+
>
CT
13
fD
3
a.
a
+
3D
fD
TJ
a
3
+
-I-
en
+
^
01
-<
+
o
_LD
CT
3.
8
3
-CT
fD
f l
01
3
f l
fD
3
o
a
3
fD
TO
01
3
<
fD
OJ
OJ
3
<
ID
8
3
+
^
ro
Ul
5
ro
+
o
^
>
OT
+
P
>
T3
T3
fD
3
a.
TO
l l
cn
>
a
8
-iLi TJ
i |
01
3
f l
tD
3
f l
a
3
ID
TO
01
3
<
fD
a
3
OJ
ff
3
<
fD
TO
01
a'
3
+
^
OT
L n
>
ro
+
CD
>
ro
+
p
*+
>
13
13
fD
3
3.
o o o
,m tn w
O
1 o
O
o
O
1 d h- O h-
1 o O m O
1-
O Cn N
1 o
o
O
o o o
O
1 o o vJ o
. H I - - M
o
i O H O o
i O
o
O
o
1 O B^ O o
1 H ID t -
o
1 O T l O o
O
>'
O
o
1 O W Tj o
t -
W
Tj tn
1 o Tl TJ to
1 o Bx TJ
cs
1 Tl B^ Tl o
1 00 h- TJ
o
1 Tl t> TJ o
1 hct
(n
TJ
o
1 Tl W TJ o
1 Tj Bx. Tj
o
1 Tl Tl Tj IS)
1 Tl
ro
TJ
o
1 H
w
TJ o
O
o
Tj
ro
1 N) Bx Tj o
1 O
o
Tj
o
' O o
Tj o
1 O Cn Tj
o
1 O 03 u OT
1 O
en
Tj
or
1 TI 1- Tl o
1 O
o
Tj
o
1 TJ o Tj -o
1 TJ 1- TJ f .
1 TJ o Tj o
1 TJ
o
Tj
o
1 TJ o Tj v]
1 Tj TJ
o
1 W o TJ o
i 00
o
TJ
o
'<!
x^:
C
H
H,
j :
w
^; ID
V -vx M
Cl C>
A
- M,
X
' ft
ej!
V ' 13
g
w
ID
9 li
C3_
CU
s
CQ
3
CD
cn cn cn
C3
CD
CO
T3
O
M
tf>
3
-o
Q.
CU
s
CQ
3
CD
C3_
CU
s
CQ
3
CD
O
!zr
o
CL
<
o
CT
O
Q.
<
t o
o
o
OJ
cn
CO
CD
icD
CO
CD
cn
GO
K
C/J
CD
CU
CL
r r
CD
X
C3_
C
3
TJ
f j )
>
s
CD"
CL
CU
s
CQ
3
CD
O
CT
O
CL
<
Q.
CU
s
CQ
3
CD
O
3 "
O
CL
' <
CD
CT
CT
CD
in
n
n
13.
CD
3 -
CL)
3
CD
CU
3
TT
NJ
CD
CD
C3
CO
CD
CO
9?
CD
CO
CD
e/) CT
o c
=r o
c/)
^ g
3 ^
2 o
- o
3-
t/l'
CU
3-
3 '
CQ
3
CO
!=t
CD
CD
cr
CT
CD
n
n
n
a_
CD
CO
cr
CT
CD
in
n
n
'CL
CD
CO
!=r
err
CD
h
n
n
!3_
CD
cu
5
cu
zr
CO
3
CD
O
cr
o
CL
<
CU
3
TT
CD
3
TT
NO
CD
NO
CD
KJ
CD
C3
a
t o
CD
CO
CD
CO
CD
CD
CD
CJJ
CD
00
CD
CD
i x
f ^
CD
CD
NO
CO
LJl
UT
k j
CO
3
CQ
5'
o
a_
CD
C3_
o
3
CO
o
3
US
3
o
tn
Z
<
CD
00
CO
3
<
CQ
O
O
CL
CO
3 -
cu
00
3 "
n
CO
n
g-
3
CQ
-O
UNITED STATES OF AMERICA
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
Mr. Jeffrey Motes
ilfi June 2013
It is hereby agreeij by the Accused, Defense Counsel, aneJ Trial Counsel, that i fMr.
Jeffrey Motes were present to testify during the merits phase of this court-martial, he would
testify substantially as follows:
1. I am a senior counter-terrorism analyst in the strategic fusion cell of the J-2 section at Joint
Task Force - Guantanamo Bay (JTF-GTMO), a subcomponent of the United States Southern
Command (USSOUTHCOM). In this position, my responsibilities include training, and
reviewing the work product of, senior and junior intelligence analysts and producing material
responsive to Requests for Information (RFI), such as threat assessments on current detainees. I
have worked at JTF-GTMO since 2003. Prior to joining JTF-GTMO, I served on active duty in
the United States Navy as a Cryptologic Technician Interpretive and Arabic linguist. I have been
in the intelligence field for more than twenty-five years, and I have been an intelligence analyst
for more than ten years.
2. Around January 2004, JTF-GTMO established the Detainee Assessment Branch in response
to a request from the Office for the Administrative Review of the Detention of Enemy
Combatants (OARDEC) for information to determine the enemy combatant status of particular
detainees. The Detainee Assessment Branch was a J-2 element tasked with providing threat
intelligence analysis on the detainees at JTF-GTMO. The threat intelligence analysis included
the detainee's threat to the United States and any potential intelligence value of the detainee.
3. OARDEC established two types of reviews for detainees at JTF-GTMO: (1) a Combatant
Status Review Tribunal (CSRT) which conducted an initial review of the status of detainees to
determine, among other things, whether the detainee was an enemy combatant: and (2) an
Annual Review Board (ARB) which conducted annual reviews of the status of select detainees to
determine, among other things, whether the detainee should remain at JTF-GTMO. The
Detainee Assessment Branch provided initial assessments of detainees in support of the CSRT
and updated assessments of detainees in support of the ARB.
4. In March 2004,1 began working in the Detainee Assessment Branch as a producing
intelligence analyst. In 2005,1 became the team leader of the Detainee Assessment Branch. The
Detainee Assessment Branch consisted of up to twenty senior and junior intelligence analysts,
both military and civilian. My responsibilities as team leader included training the team
responsible for preparing assessments on detainees, preparing assessments on detainees, and
coordinating between the intelligence analysts assigned to the Detainee Assessment Branch and
the United States Govemment. I worked in the Detainee Assessment Branch as the team leader
until 2012, with the exception of one year from 2009-2010 when I worked at USSOUTHCOM as
B^:ms^^
aSubject Matter Expert (SME) on Sunni extremism ^ r South America. Before joining the
Detainee Assessment Branch,Iwasasenior intelligence analyst onatiger team responsible for
preparing detainee assessments and debriefing detainees upon arrival at JTF-GTMO.
5. The detainee assessments werearecommendation to USSOUTHCOM for the disposition of
detainees,which included the detainee'sthreat level and intelligence value to the United States
and its allies. lam very familiar with the detainee assessments prepared by JTF-GTMO. lam
familiar with the format, letterhead, and structure ofthe detainee assessments.
^. lam very familiar with how detainee assessments were produced becauselcreated, and
trained others how to create, detainee assessments. lam also very familiar with the process
necessary to create the detainee assessments becauseleither was responsible lor many steps of
this process orltracked the status of this process. lhave been responsible for the first four steps
ofthe below process during my tenure at JTF-GTMO.
^. The process to createadetainee assessment was as f:^llows:
a. First,asenior or junior intelligence analyst reviewed any previously written
intelligence memoranda and any additional intelligence relating to the detainee that was stored in
the Joint Detainee Information ManagementSystem(JDIMS),the classified database at JTF-
GTMO that stored intelligence relating to detainees. JDIMS was available on SIPRNET:
however,auser could not access JDIMS without being grantedaseparate account. Further, even
withaJDIMS account, the user did not have full access to all ofthe intelligence stored in
JDIMS. The senior orjunior intelligence analyst also conducted additional research in multiple
intelligence databases located on classified networks, outside ofJDIMS, on the particular
detainee.
b. Second, the senior orjunior intelligence analyst drafied the detainee assessment,
which included the analysis as to the detainee'sthreat level and intelligence value to the United
States and its allies.
c. Third, the drafi detainee assessment was submitted to another senior orjunior
intelligence analyst for peer review. The intelligence analyst reviewed the drafi detainee
assessment, conducted individual research and analysis on the detainee, and provided edits
and^or comments.
d. Fourth, the drafi detainee assessment was submitted toasenior intelligence analyst for
duality Assurance duality Control(^A^C) who conducted further research and analysis on the
detainee to collect any additional intelligence and to verify the logic ofthe analysis on the
detainee. The senior intelligence analyst provided edits and^or comments.
e. Fifih, the drafi detainee assessment was submitted to the Officer-in-Charge(OIC)of
the Detainee Assessment Branch who conducted further research and analysis on the detainee to
collect any additional intelligence from the classified network and to verify the logic ofthe
analysis on the detainee. The OIC provided edits and^or comments.
f Sixth, the drafi detainee assessment was submitted to the Officeofthe Staff Judge
Advocate(OSJA) for legal review. The OSJAreviewed the drafi detainee assessment and
provided any edits and^or comments.
g. Seventh, the drafi detainee assessment was submitted to the Joint Intelligence Group
(JIG)orJ-2Director. The JIG or J-2Director reviewed the drafi detainee assessment and
provided any edits and^or comments.
h. Eighth, the drafi detainee assessment was submitted to the Deputy Commander,JTF-
GTMO. The Deputy Commander,JTF-GTMO,reviewed the drafi detainee assessment and
provided any edits and^or comments.
i . Ninth, the drafi detainee assessment was submitted to the Commander, JTF-GTMO.
The Commander, JTFGTMO,reviewed the drafi detainee assessment and provided any edits
andi^or comments. Once all changes were made, the Commander, JTF-GTMO, signed the
detainee assessment.
j . Tenth, the signed detainee assessment was submitted toOARDEC through
USSOUTHCOM
^. lam very familiar with how long the above process took to complete one detainee
assessment. The first two steps of this process, having the initial intelligence analyst createa
drafi detainee assessment, took no less than one week, including overtime, to complete. Tothe
best of my memory,completing one drafi detainee assessment took, on average, 5055 working
hours. The third step ofthis process, having another intelligence analyst conduct peer review of
the drafi detainee assessment, took, on average,2working hours per assessment. The fourth step
of this process, havingasenior intelligence analyst conduct^A^C of the drafi detainee
assessment, took, on average,l^working hours per assessment. Each remaining step necessary
to complete one detainee assessment took betweenalcw hours to one week to complete. In
total, the entire process to create one detainee assessment took approximately one month and
consisted of, on average, ^0-90 working hours. The most detainee assessments created in one
fiscal year was approximately 520.
9. Both Servicemembers and civilian contractors were involved in the above process to create
one detainee assessment. The lowest ranking Servicemember involved in this process wasE-4,
Specialist. The lowest ranking civilian contractor involved in this process was equivalent toa
GS-I2employee. My rank whenlwas involved in creating detainee assessments was equivalent
toaGS-I3employee,and my lowest salary during this time was approximately ^^0,000 per
year.
10 lam veryfamiliarwithwhattypeofintelligence was included in detaineeassessments
Detainee assessments include, among other things, background information on the detainee,
details of the detainee'scapture, the detainee'saffiliation with terrorist organisations, the
detainee'srecruitment and travel,the reasons for the detainee'stransfer to JTFGTMO,
indicators of the detainee^sthreat level and intelligence value to the United States and its allies,
and the analysis of the detainee'sthreat level and intelligence value to the United States and its
allies. Prosecution E^l^il^it(PE)^forIdentifieation is the classified list ofthe diflerent
sources of classified intelligence reporting from whichland the other analysts derived the
inlormation used in the assessments.
a. The background information on the detainee included, among other things, the
detainee'sbiographical data, picture, health information, employment, religion, and family
members or relatives with extremist links. This information was obtained fromavariety of
intelligence sources and was included in the detainee assessments as part ofthe intelligence
analysis to determine the detainee'scommitment to terrorist organi^ations,which were important
actors in determining the detainee'sthreat level and intelligence value to the United States and
its allies. lunderstand that all ofthis data would be known to the detainee and may be known by
his associates listed. However, since we usually do not leam all ofthis information fi-om the
detainee himself, the detainee may not understand the extent ofwhat the United States knows
about his background information.
b. The details ofthe detainee'scapture included, among other things, how the detainee
became involved in activities that led to capture,where,how,and with whom the detainee was
captured,what the detainee was doing when captured, events such as engagements with United
States military forces that led to the detainee'scapture,and the date of transfer to JTF-GTMO.
This information was obtained fiomavariety ofintelligence sources and was included in the
detainee assessments as part ofthe analysis to determine the detainee'saffiliation and
commitment to terrorist organi^ations,which were important factors in determining the
detainee'sthreat level and intelligence value to the United States and its allies. lunderstand that
most, ifnot all,ofthis data would be knov^ to the detainee or may be knov^ by his associates.
However, since we usually do not leam all ofthis information fi-om the detainee himself, the
detainee may not understand the extent of what the United States knows about the detailsofhis
capture.
c. The detainee'safiiliation with terrorist organisations included individuals the detainee
associated with at the terrorist organisations and the detainee'smovements within the terrorist
organi:^ations. This information was obtained fromavariety ofintelligence sources and was
included in the detainee assessments as part of the analysis to determine the detainee'saffiliation
and commitment to terrorist organi^ations,which were important factors in determining the
detainee'sthreat level and intelligence value to the United States and its allies. lunderstand that
all ofthis information would be known to the detainee and may be known by his associates
listed. However, since we usually do not leam all ofthis information fiom the detainee himself,
the detainee may not understand the extent ofwhat the United States knows about his affiliation
with terrorist organi:^ations.
I I . PE^ f o r ID includes serialised intelligence reports published to the Intelligence
Community (IC) and intelligence information. The serialised intelligence reports published to
the IC include Items5,15-19,30,31,34,and35 in PE^ f o r ID. Intelligence information is
included in all of the sources in PE^ f o r ID, except for Items I,20, 2^,and 2^. Information
can be derived from all sources in PE^ f o r ID and included in serialised intelligence reports
published to the IC.
12. lam very familiar with where detainee assessments are stored. Detainee assessments are
stored in three locations: (l)on the shared drive at JTF-GTMO which is located on the Secure
Intemet Protocol Router Network (SIPRNET): (2) afiersigned bythe Commander, JTFGTMO,
on JDIMS which is located on the SIPRNET:and(3)inadatabase accessible through the JTF-
GTMO Detainee Assessment Branch website on Intellipedia which is located on the SIPRNET.
Intellipedia,which is analogous to^ikipedia,isawebsite on the SIPRNET that allows for the
sharing ofintelligence in the IC and to analysts on SIPRNET and J^ICS.
13. In March 2009 and in response toatasking from J-2atJTF-GTM0,Icreated the database
accessible through the JTF GTMO Detainee Assessment Branch website on Intellipedia. It took
me approximately ^3 working hours to create this database, which included time to research the
structureofthe write-up language, find and update all source documents, and link each file to the
correct detainee. This database stored all detainee assessments,which totaled more than ^00. I
have spent approximately 50 additional hours updating and otherwise maintaining this database.
14. The filename for each detainee assessment in this database included the Internment Serial
Number (ISN) for the particular detainee, the recommendation for the detainee, and the date of
the detainee assessment. The format ofthis filename was as follows:
^^ISN recommendation date.'' The filename was linked toaunique, sequential document
identification number (Document ID),which was the particular detainee assessment. Ifauser
who accessed the database through the JTF GTMO Detainee Assessment Branch website
scrolled over the filename with his^er mouse, the document number would appear.
15. In my capacity as the team leader of the Detainee Assessment Branch,Ireviewed five
detainee assessments pertaining to United Statesv.Private First Class Bradley Manning.which
the prosecution provided to JTF-GTMO. These detainee assessments are located in A^^ellate
E^l^il^it(AE)^01 andhave the BATES numbers 0037^123 0037^140 PE^forlDcontains
these five detainee assessments. lam able to identily these documents as detainee assessments
based on the lormat, letterhead and content ofthe documents.
1^. The five detainee assessments within PE^ f o r ID are all marked, at the top and bottom of
eachpage,^^SECRET." None ofthe five detainee assessments within PE^ f o r ID has been
made publicly available by the United States Govemment.
17. The five detainee assessments within PE^ f o r ID identify activities related to national
preparedness. These documents include the following matters: (l)United States intelligence
relating to identified associates ofterrorist organisations,to include names, affiliations, and
whereabouts: (2) United States intelligence relating to training activities ofthose terrorist
organisations, to include the substance ofsuch training: (3) United States intelligence relating to
theTactics,Techniques,and Procedures (TTPs)ofthose terrorist organisations, to include
details relating to enemy movement, housing networks, and recruiting activities:(4) United
States intelligence relating to enemy engagement with United States military Icirces:(5) our
intelligence analysis of the detainee'scooperation and credibility,which, i f released, could affect
the subsequent recruitment ofthe detainee and the willingness ofcountries to accept the
departing detainee:(^) United States analysis of the intelligence value ofthe detainee, to include
any intelligence gaps ofthe United States relating to members ofterroristorgani:^ations.
terrorist'srecruiting activities,and future operations: and (7) United States intelligence relating
to the detainee'sthreat level to the United States and its allies. lunderstand that there are
portions ofthis material that would already be known to the detainee or his associates. However,
neither the detainee nor his associate would know our analysis relating to the detainee. Further,
neither the detainee nor his associate may understand the extent ofwhat the United States knows
about the detainee. lunderstand that the detainee,if released, could share the information known
by the detainee with anyone. Of that information which we learned fiom the detainee,Iam not
aware ofany detainee who has shared all ofthat information. lalso understand that the
associates ofthe detainee could share information relating to the detainee known by the associate
with whomever they pleased, Ofthat information relating to the detainee which we leamed from
an associate,Iam not aware of any associate who has shared all ofthat information relating to
the detainee.
1^. lam aware that there is some inlormation pertinent to these documents available in open
source material. lam also aware of the extensive litigation that happens for these detainees in
federal court and the military commissions. Idid not consider those things whenlidentified
the sources ofintelligence fi^r the above detainee assessments,which was the only rolelplayed
during the classification review.
19. In October of2007,lam aware that the Department ofDefense released in the FOIA reading
room the Combatant Status ReviewTribunals(CSRT) and the Administrative Review Boards
(ARB)documents held between July2004 and July2007. The CSRTswereaset of tribunals for
confirming whether detainees held by the United States at Guantanamo had been correctly
designated as ^^enemy combatants." The ARBs were used to conduct an annual review ofthe
detainees to review whether they still representathreat or not to the United States. The released
inlormation identified each detainee by name and their general background information for those
individuals still held atJTFGTMO at that time.
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
JBI^U^ER^H^TE THOMASFHURE^ BRADEE^E.MA^
CPT,JA MAJ,JA PFC, USA
AssistantTrial Counsel Defense Counsel Accused
UNITEDSTATESOF AMERICA
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
RDML David B. Woods
June 2013
It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel,that ifRear
Admiral (EowerHalf^ David B.^oods were present to testity during the merits and pre-
sentencing phases ofthis court-martial,he would testily substantially as fi^llows:
1. lamaRear Admiral (Eower Halt) in the United States Navy with 32 years of active service. My
current position is Commander, Strike ForccTraining Pacific, San Diego,CA. Iwas previoi^sly the
^ommander,JointTask Force Guantanamo(JTFGTMO),at Guantanamo Bay,^uba. Iheld this
position from24 August 2011through 25 June 2012, and reported during that time to General
Douglas Fraser, Commander, United States Southern Command (USSOUTHCOM). My time as
^ommander,JTF-GTMO was my fifih command tour as an Original Classification Authority(O^A).
Igraduated fiom theU.S.Naval Academy i nl 9^1 and was designated asanaval fiight ofi^cer in
19^3. lalso receivedamaster'sdegree in National Security and Strategic Studies from the Naval
^arOollegeinl997
2. AsaUS Navy Oaptain,Iserved as the commander ofOarrier Air ^i ng( 0V^) 11, and deployed
twice in support of Operations Enduring Freedom and IraqiFreedom aboard the USS Nimitz.
Additionally,as part ofajointassignment,1was the Oommander of Joint Crew composite Squadron
One. Our squadron was responsible for the Multi-NationalOorps^lraq electronic warfare fight
against improvised explosive devices. Afier my promotion,Iserved as the Director,Strategy and
Policy Division, OhiefofNaval Operations for Operations, Plans and Strategy (N3^5) before taking
command ofJTF-GTMO
3. AsCommander,JTF-GTMO,1wasanO0A. My responsibilities in that position included the
review ofJTF-GTMO information for classification purposes pursuant to Executive Order (EO)
1352^ (^^Olassified National Security Information^^), and its predecessor orders. Prior to this position,
Iwas an OOA while serving in the following positions: (1)05 Squadron Commander (VA0131)
(199^ 2000): (2)Training Squadron OommandingOfficer(VA0 129) (2002 2004): ( 3) Ai r ^i ng
Oommander(CV^ll)(USSNimit^)(2005-2007):and(4)OommanderofJointOrew composite
Squadron One in Iraq (2007 200^). At all timeslser^ed as an 0CA,1received annual training
consistent with E01352^ or previous guidance.
4. Information that requires protection in the interest ofnational security ofthe United States is
designated classified national security information under Executive Order (EO)1352^, Classified
National Security Information, signed by President Obama on December 29, 2009. Information is
classified in levels commensurate withthe assessment that its unauthorised disclosure reasonably
could be expected to cause the following damage to national security: Top Secret information is
PROSECUTION FX
PAGE OFrJi
PAGE O,
IJL__ kj^tification
..- ADi'v4rfTED:
PACES
information that could cause exceptionally grave damage to national security: Secret information is
information that could cause serious damage to national security: and Confidential information is
information that could cause damage to national security.
5. Unclassified information does not requireasecurity clearance for access, but nonetheless may be
ofasensitive nature. The current basis for classification ofnational security information is tound in
E01352^.SectionI.3 ofE01352^ authorises an OOA, such as me whenlwas Commander,JTF
GTMO, to classify information owned,produced, or controlled by the United States government i f i t
falls within certain classification categories. One such category,found at Section1.4(c)ofEO
1352^, concerns information that pertains to an intelligence activity (including special activities),
intelligence sources or methods, or cryptology.
^. Ireviewed the five charged documents fiom the United States Southern Oommand and JTF-
GTMO database (BATES numbers 0037^123^0037^140)containedwithinA^^ellateE^il^it^01,
and made the below determinations with respect to those documents.
7. First, all five documents were properly marked at the ^^SEORET" classification level.
^. Second, disclosure ofthe information identified in the five documents reasonably could be
expected to cause serious damage to the national security ofthe United States. In making this
statement regarding the classification ofinformation in this case,1relied upon my personal
knowledge and experience, the information made available to me in my official capacity,the advicel
received from my staffand their conclusions reached.
9. Third, in the first half of2010and at the time of the disclosures, the five documents were
classified pursuant to Sectionl.4(c)ofE01352^,because they contained information concerning
intelligence sources and methods, and information that, ifreleased, could cause serious damage to
nationalsecurity. This information was classified at the Secret level.
10. Fourth, the five documents contained intelligence data compiled about detainees or summaries of
such data. Intelligence data included descriptions ofthe detainee^s biographical inlormation,the
circumstancesofhis capture,what he had in his possession when he was captured,the circumstances
and date ofhis transferto Guantanamo, his travel,his affiliations with individuals and organisations
ofintelligence interest, and his activities in support ofthose organisations. All ofthis information
would be known to the individual detainee. The intelligence data also included information about
other persons and organi^tions. Idetermined that the intelligence data contained in the documents
reveal details about intelligence we have gleaned regarding individuals and organisations of
intelligence interest. Additionally,this information revealed the sources of our intelligence,as well
as methods and approaches for collecting intelligence. At the time oftheir creation,the documents
and the intelligence data contained in them ^ere classified at the Secret level through the action of
the Commander,JTF-GTMO,and remained classified at the Secret level in the first half of2010and
at the time oftheir disclosure.
11. Fifth,Idetermined that the documents and information remained properly classified afier their
creation, and that their release reasonably could be expected to cause serious damage to the national
security because it would reveal information concerning intelligence sources, the specific
information obtained from such sources, or both. Accordingly,this information was properly
classified at the Secret level, pursuant to Section 1.4(c)ofE0 1352^.
12. lam aware that there may have been some information pertinent to these documents available in
open source material. Idid not use this material or its publicly available status in making
classification determinations. Ifthere was information that had been previously released under the
authority ofthe United States government,1would consider the authorised release ofinformation by
the United States government as part ofmy review ofthe classification ofthe entire document. 1am
aware ofthe extensive litigation that happens for these detainees in federal court and the military
commissions. Those cases did not affect the classification review for these documents.
13. In October of2007, l am aware that the Department ofDe^nse released in the FOIA reading
room the Combatant Status ReviewTribunals(CSRT) and the Administrative Review Boards
(ARB)documents held between July 2004 and July 2007. The CSRTswereaset oftribunalsfi^r
confirming whether detainees held by the United States at Guantanamo had been correctly
designated as ^^enemy combatants." The ARBs were used to conduct an annual review ofthe
detainees to review whether they still representathreat or not to the United States. The released
information identified each detainee by name and their general background information for those
individuals still held at JTF GTMO at that time.
14. Prosecution E ^ i l ^ i t ^ f o r Identification are those five documentsldescribed above.
^^^^^^^ ^^^^. ^x^ ^ ^ ^ ^ ^
ASHDENFEIN T HOMAS F HURE ^ B
MAJ,JA MAJ,JA PFC, USA
Trial Counsel Delense Counsel Accused
UNCLASSIFIED
(U) DECLARATION
(U) I , Mr. Louis S. Travieso declare and state: I am the subject matter expert for the Directorate ofOperations (J2)
for classifications reviews. In this capacity, I reviewed documents pertaining to United States v. Private First Class
Bradley Manning, which the Manning trial team provided to USCENTCOM. I found one document that contained
J2 equities, and defer to other USCENTCOM Directorates in regard to the classification of the remaining
documents.
(U) The one document that ] found that contained J2 equities was the following: l-he Strntegic Intelligence Brief,
"Farah INS Probably Deliberately Instigated 4 May CIVCAS Incident" 10 May 2009. (Hereinafter the
"Document".)
(U) My recommendations to the Original Classification Authority (OCA) in regard to the proper classification of
the Document is as follows: The Document contains intelligence activities (including covert action), intelligence
sources or methods, or cryptology. The basis for its original classification was proper based on Executive Order
12958 as amended. Section 1.4(c). It should continue to be classified based on EO 135:?6, Section 1.4(c).
(U) Pursuant to 28 L.S.C. I ''46,1 declare under penalty of perjury that the information provided herein is true and
correct to the best ofmy knowledge.
Dated: 2.^ October 2011
T
JIS S. TF
nformation Release Specialist
(U) I, Mr. George J. Lemire, CCJ2-EI, reviewed these documents along with Mr Louis S. Travieso. I concur with
Mr. Travieso's conclusions and recommendations.
(U) Pursuant to 28 U.S.C. 1746,1 declare under penalty of perjury that the information provided herein is true and
correct to the best of my knowledge.
Dated:2.* October 2011
GEORGE J'LEMIRE
CCJ2-EI, USCENTCOM
UNCLASSIFIED
ManningB_00527398
A ? ^
PROSECUTION r y - ' U i fbr icVntjffcation
PAGE OFFERED. IiZ ADMITTED; ^
PAGE OF PAG'io
UNITED STATES OF AMERICA
Manning, Bradley E^
PFCUSAr my,
HHC, U S Army Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 222II
STIPULATION OF
EXPECTEDTESTIMONY
Viee Admiral Rol^ertS Harvard
June20I3
It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifVice
Admiral Robert S.Harward, Jr., were present to testis during the merits and pre-sentencing
phases ofthis court-martial, he would testis substantially as fi^llows.
1. lamaVice Admiral in the United States Navy with 32 years of active service. Icurrently
serve as Deputy Commander, United States Central Command (USCENTCOM) at MacDill Air
Force Base.
2. Ibegan my career asasurface warfare officer aboard the destroyer USS i^^c^^^ (DDG 995),
and then transferred to the Naval Special^arfarecommunity.Iwas the ^^Honor Man" ofBasic
Underwater Demolition (BUD)^Sea, Air, Land (SEAE)class 12^,andlhave served in both East
and^est coast SEAL teams.
3. My tot^s in the Naval Special ^ar ^e community include: commander,SEALTeam Three:
AssaultTeam leader and operations officer at Naval Special^ar^re Development Group:
SEAL plans officer for Commander,AmphibiousForceU.S.7th Fleets executive officer, Naval
Special^arfare Unit One: aide-de-camp to Commander, U.S.Special Operations Command:
Combined Joint Special Operations Task Force(CJSOTF) deputy commander in Bosnian deputy
commander Special Operations Command, Pacific^ commander, Naval Special warfare Group
One: and, deputy commanding general, Joint Special Operations Conm^and.
4. My additional assignments includeatour in the Executive Office of the President at the ^ i t e
House, wherelserved on the National Security Council as the directorofStrategy and Policy for
the officeofCombatingTerrorism. My first fiagassigrm^ent was chairman of the Joint Chiefs of
Staff representative to the National Counterterrorism Center (NCTC),asamember of the Senior
Interagency StrategyTeam.AdditionaIIy,Iserved as deputy commander, U.S.Joint Forces
Command, and most recentlylserved as commander of Combined Joint InteragencyTask Force
(CJIATF)435fi^om2009to2011inAfghanistan,CJIATFisthetaskforcededicatedtodetainee
operations in A^hanistan. lhave commanded troops in Afghanistan and Iraq over six years
since Sept.ll,2001.
5. lhave been the Deputy Conm^ander, USCENTCOM, sincellJuIy 2011. My responsibilities
include exercising TOP SECRET and below original classification authority, which includes
renderingadetermination of CENTCOM generated infi^rmation fbr classification purposes
pursuant toawritten delegation from the Deputy Secretary ofDefense and under the authority
ofExecutive Order (EO) 1352^. Per EO 1352^, Section1.3,the authority to classic information
PROSECUTION EXHIPTT U^f or idj^ii^ation
PAGE 0FFER3D G:^ ADMITTED:
PAGE OF PAGES
originally may be exercised only by an OCA, and must be delegated by the President, the Vice
President, or an agency head or designated official.
^. Infiormation which requires protection in the interest ofthe national security ofthe United
States is designated classified national security information per E0 1352^, Classified National
Security Information, signed by President BarackH.Obama on 29 December 2009,and for
information classified prior to June 27,2010, according to EO 1295^ signed by President
^illiamJ.Clinton on April 17,1995,as amended by President Georges.Bush on March 25,
2003. Information is classified in levels commensurate with the assessment that unauthori:^ed
disclosure could cause the following expected damage to national security: for exceptionally
grave damage to national security^Top Secret: for serious damage to national security^
Secret: and for damage to national security Confidential.
7. within USCENTCOM, classified inlbrmation is handled and protected in accordance with
E0 1352^(and predecessor orders)on Classified National Security Information.
^. In total, four categories of classified information, as identified in E0 1352^ and its
predecessor EOs,were included in the documentslreviewed. Because the mission of
USCENTCOM encompasses the conduct ofmilitary operations, USCENTCOM relies primarily
upon two classification categories when protecting national security infiormation,which are
identified in Section1.4ofE0 1352^ asi.4(a)(militaryplans,weapons systems,or operations)
and1.4(c)(intelligence activities (including covert action), intelligence sources or methods,or
cryptology).
9. Classified information should be handled and examined only under such conditions as are
adequate to prevent unauthorised persons fi-om gaining access. Classified material may not be
removed from designated work areas or moved from inlormation systems, e.g., classified
databases, computer networks, servers, or computers, except in the performance of official
duties and under special conditions which provide protection for the classified material.
10. lhave reviewed the104 charged USCENTCOM documents related to this case. The
charged documents are categorized as fiollows:
a. Over 3^0,000 documents were taken from the Combined Information DataNetwork
Exchange(CIDNE)Iraq database. Ireviewed the 53 charged documents fi-om the CIDNEIraq
database contained in Appellate E^l^il^it(AE) ^01 and Prosecution E^liiil^it(PE)^^.
b. Over 90,000 documents were taken fiom CIDNE-Afghanistan database. Ireviewed
the 37 charged documents fi-om the CIDNE-Afghanistan database contained in AE ^01 and PE
c. Ireviewed the 14charged documents related to the Farah investigation contained in
AE^OlandPE^O
d. Ireviewed the charged file named ^^BE22PAX.^ip" containing the video named
^^BE22PAXwmv"(Gharanivideo)containedinPE^^
This material was staffed through the following USCENTCOM Directorates: Intelligence(J2),
Operations (J3), and the Strategy,Plans, and Policy (J5). The results ofthis staffing are PE^^,
PE ^7, and PE^ f o r ID, and these documents were provided to me and consolidated. In
consultation with the subject matter experts identified above,as an OCA,Idetermine the
following for each category:
11. For each of the 53 CIDNE-Iraq documents in PE^^,Ifound the following:
a. First, all 53 documents were properly marked at the SECRET level and based on
actual events.
b. Second, disclosure ofthe information identified in the 53 documents reasonably
could be expected to cause serious damage to the national security ofthe United States. In
making this determination regarding the classification ofinformation in this case,Ire1y
upon my personal knowledge and experience, the information made available to me in my
official capacity, and the advice and recommendations received from the subject matter
experts who also reviewed the documents, lam aware that there may have been some
information pertinent to some ofthese documents available in open source material. Idid not use
this material or its publicly available status in making classification determinations. Iflhad been
aware ofinformation that had been previously released under the authority ofthe United States
government,1would have considered the authorised release ofinformation by the United States
government as partofmy review ofthe classification of that information,
c. Third, the 53 documents and the information contained in them were classified at
the SECRET level at the time oftheir creation, and remained classified at the SECRET level
in the first half of2010and at the time oftheir disclosure. These documents were properly
classified at the time they were generated and remained classified in the first half of2010
pursuant to SectionI.4(a)and(c)ofE0 1352^, or its predecessor EOs,because they
contained information that, ifreleased, could cause serious damage to national security.
12. For each of the37 CIDNE-Afghanistan documents in PE^9,Ifound the following:
a. First, all 37 documents were properly marked at the SECRET level and based on
actual events.
b. Second, disclosureofthe information identified in the 37documents reasonably
could be expected to cause serious damage to the national security ofthe United States. In
making this determination regarding the classification ofinformation in this case,Irely
upon my personal knowledge and experience, the information made available to me in my
official capacity,and the advice and recommendations received fi-om the subject matter
experts who also reviewed the documents. 1am aware that there may have been some
intbrmation pertinent to some ofthese documents available in open sottrce material. Idid not use
this material or its publicly available status in making classification determinations. Iflhad been
aware ofinformation that had been previously released under the authority ofthe United States
government,1^ould have considered the authorised release ofinformation by the United States
government as part of my review of the classification of that information.
c. Third, the 37 documents and the information contained in them were classified at
the SECRET level at the time oftheir creation, and remained classified at the SECRET level
in the first half of2010and at the time oftheir disclosure. These documents were properly
classified at the time they were generated and remained classified in the first half of2010
pursuant to SectionI.4(a)and(c)ofE0 1352^, or its predecessor EOs,because they
contained information that, ifreleased, could cause serious damage to national security,
13. For each ofthe14Farah investigation documents in PE90,Ifound the following:
a. First, all14documents were properly marked at the SECRET level and based on
actual events.
b. Second, disclosure of the information identified in the14documents reasonably
could be expected to cause serious damage to the national security ofthe United States. In
making this statement regarding the classification ofinformation in this case,Irely upon my
personal knowledge and experience, the information made available to me in my official
capacity, and the advice and recommendations received fi-om the subject matter experts who
also reviewed the documents.lam a^are that there may have been some information pertinent to
some ofthese documents available in open source material. Idid not use this material or its publicly
available status in making classification determinations. Iflhad been aware ofinformation that had
been previously released under the authority of the United States government,lwould have
considered the authorised release ofinformation by the United States government as part ofmy
review ofthe classification ofthat information.
c. Third, the14documents and the information contained in them were classified at
the SECRET level at the time oftheir creation, and remained classified at the SECRET level
in the first half of2010and at the time oftheir disclosure. These documents were classified
pursuant to Section1.4(a)and(c)ofE0 1352^, or its predecessor EOs, because they
contained information that, ifreleased, could cause serious damage to national security.
14. For the Gharani video in PE^^,Ifound the following:
a. First, the Gharani video was only located on the SIPRNET because it was classified at
theSECRETlevel
b. Second, disclosure ofthe information identified in the video reasonably could be
expected to cause serious damage to the national security ofthe United States. In making
this statement regarding the classification ofinformation in this case,Irely upon my
personal knowledge and experience, the information made available to me in my official
capacity,and the advice and recommendations received fi-om the subject matter experts who
also reviewed the video. lam aware that there may have been some inlormation pertinent to this
video available in open source material. Idid not use this material or its publicly available status in
making classification determinations. Iflhad been aware ofinformation that had been previously
released under the authority ofthe Ignited States government,lwould have considered the authorised
release ofinformation by the United States government as part ofmy review ofthe classification of
the video.
c. Third, the video and the information contained within was classified at the
SECRET level at the time ofits creation, and remained classified at the SECRET level in
the first half of2010and at the time ofits disclosure. This video was classified pursuant to
Section 1.4(a)and(c)ofE0 1352^, or its predecessor EOs, because it contained information
that, ifreleased, could cause serious damage to national security.
j)r A ^ h -
A'LEXANDER vON ELTEN
CPT, JA
Assistant Trial Counsel
^U*y^ 3-,
THOMAS F. HURLEY^
MAJ, JA
Military Defense Counsel
BRADL
PFC, USA
Accused
Prosecution Exhibit 135b
6 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
Prosecution Exhibit 136
1 CD
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
FOR OFFICIAL USE ONLY
UNITEDSTATESOF AMERICA
Manning, Bradley E^
PFCUSAr my,
HHC, U S Army Garrison,
JointBaseMyerHendersonHall
Fort Myer, Virginia 222II
STIPULATION OF
EXPECTEDTESTIMONY
Mr Maxwell Allen
^^June20I3
It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel,that i fMr,
Maxwell Allen were present to testis during the merits and pre-sentencing phases ofthis court-
martial,he would testily substantially as Ibllows:
1, lam currently employed with the Central Intelligence Agency(CIA)and have worked there
fior six years. Before that,Iwasacontractor with Oracle fior ten years. Oracle is the largest
database company in the world and is the platfiorm for the Open Source Center(OSC) database,
Iwork on the contract for the OSC, lam the lead database engineer and database administrator
fiortheOSC, lhave been the lead database administrator and engineer Ibr two years, Asa
database engineer,lbuild and develop databases to efficiently store and retrieve data and asa
database administratorlmaintain the databases. As the lead,Iam in charge of the database
engineers and administrators,
2, The OSC isawebsite controlled by the Central Intelligence Agency(CIA), which requiresa
userto have ariose account to access infbrmation,The website is located on the unclassified
system, SIPRNET,andJ^ICS and allowsauser, once authenticated, to conduct searches of
various files created by the CIA and other organisations. The OSC contains reports and
translations fi'om thousands ofunclassified publications, television and radio programs, and
Intemet sources around the world.
^
3, The OSC carmotcompletearequestbyauser without logging the request in the audit logs. In
other words, ifthe OSC cannot log its actions, it will stop working and users will not be able to
retrieve their requests and view pages on the website, ^econductamonthly check of the logs
to ensttre the system is fitnctioningproperly,and we always keep the database up to date by
installing all updates, Typica11y,the purpose of checking the audit logs is to see i f there are any
errors in the automated process,
4, The OSC database creates three separate types oflogs: application logs, server logs, and
firewall logs. In this case,Ipulled the application logs. The other logs would refiect the same
basic information inadiflerentlbrmaL The logs are created every time an event occurs, Inthis
case, we were asked to pull any user information for "Bradley Manning,"as well as audit logs
associated with the user names on any "Bradley Marming" accounts,
5, Aslstated, an OSC account is required to access the OSC, ToapplyfioranOSCaccount,a
user has to enter their personal information in the application, ^hen applying for an account on
SIPRNET,the account is automatically approved upon application and confirmation of the
SIPRNETemail address. Having an OSC account allows you to access the OSC website through
FOR OFFICIAL USE ONLY
PROSECUTION EXHIBIT /35?fori
PAGE OFFERED:
PAGE OF PAGES
yfl-
brjiaemfn
, ^
fication
PAGE ADfvflTTED:
FOR OFFICIAL USEONLY
SIPRNET. Ifauser wants to access sites not within OSC,the user has to log on to those sites
separately even i f the user clicks onalir^fi^om within the OSC website,
^, Isearched the database for any combination ofBradley and Manning, Afier looking at the
first and last names on the accounts,ldetermined that there were two accounts with the first
name Bradley and the last name Marming, Both the accounts were on the SIPRNET, lopened
the account information for those accounts and took screenshots ofthe account information by
pressing control and enter to tak^eascreenshot,
a. The first account hadauser name of"Bmanning." The name entered by the individual
creating the account was Bradley Edward Marming. The phone number was (240) 7^4-0431.
The secret level email given was Bradley.manning^2bct10mtn. The security question was
"^atcity/towndidyougrowupin7"Theanswergivenbytheaccountuserwas"Crescent.^^
The account was opened on^November 2009 and the last login was6November 2010.
Prosecution E^l^iI^it(PE^^^for Identification is the account screenshot with BATES number:
00374393.
b. The second account hadauser name "bradass^7," The name entered by the individual
creating the account was Bradley Edward Manning, The phone number was (312) ^48-8722,
The secret level email given was bradley,manning^us,army,smil,mil. The security question was
"^Vhatcity/tov^didyougrowupin7" The answer given by the account user was "Crescent,"
That accotmt was opened on 20 February 20IOand the last login wa^17ApriI 2010, PEl ^f or
ID is the second accotmtscreenshot with BATES number: 00374394,
7. Topull the logs associated with the accounts with the user names "bmanning" and
"bradass^7,"lv^oteasqI query and entered it into the database. Inthequery,laskedthe
database to pull all the audit events by the users "bmanning" and "bradass^7." Sql isastructural
query language fbr extracting and inserting inadatabase. It isastandard computer language to
interact with databases. In other words, sql isatool used to perform inquires and pull data fi'om
adatabase. The sql query pulled the logs and put them intoareadableformaL In order to
accomplish the sql query,lwent to the black command prompt screen, typed in the query,hit
enter, and the computer generated the logs. Ithen saved the logs as well as the sql querylused
to pull those logs. Acomputer-generated process pulls the logs, andldid not format them as sql
does it automatically. Ithen saved the logs.
^. I wi l l explain the logs by column and using following line pulled from the
"bradass^7 distinct export withclassifications.xls":
AUDIT EVENT ID DATE TIME ACTOR AUDIT ACTION TARGET DATA NAME DATA VALUE
36135654 20-FEB-lO
04.45.52.000000000
AM
bradass87 Viewed Holding 11943026 TITLE Daily Tells UK,
Dutch To Stop
'Bullying',
Accept Iceland's
Compensation
Offer (U)
a. Colimm 1 is the audit event identification, which is the system generated number assigned
numerically to events. An event is data received, like looking at a document. Each different
FOR OFFICIAL USE ONLY
FOR OFFICIAL USEONLY
event hasadiflerent line on the audit data^ however, each action has the same audit event
identification. Therefore, there may be several lines to describe one action,which all have the
same audit event identification. In the above example line, the audit event id is 36135^54,
b, CoIumn2is the Date/Time Group logs the date and time of the evenL In the above
example line, thedate/timegroup is20 Feb10at04:45:52,000000000 AM,
c, Co1umn3is the actor. It is the user account that is creating the event. In the above
example line, the actor is "bradass87," That was the user account name foraSIPRNET OSC
account with the name "Bradley Manning,"
d, Co1umn4is the audit action, which tells you what the user did on the OSC website, Inthe
above example line, the audit action is "viewed holding," This means the document whose title
appears in the data value column was opened by the "bradass^7" user accounL
e, CoIutrm5is the target. The target identifies what the user was accessing on the OSC
website. In the logs that we pulled forthis case, the targets were most ofien numbers that
identified specific documents or other areas of the website the user clicked on, such asTopic
Cotmtries, In the above example line, the target is 11945572,which isadocumenL
f, CoIumn6contains the data name,which further describes the target as well as the next
column, the data value column. In the above example, the data name is title. That means that
the target was the document and the data value in the following column is the title ofthe
documenL
g, Column7is the data value, which is what the data actually is. In the above example line,
the data value is the title "DailyTellsUI^,DutchToStop ^Bullying',Accept Iceland's
Compensation Officer (U),"
h, Tosummari:^e, the above example means that the user "bradass^7" clicked on the page
with the document entitled "DailyTeIIsU^,DutchToStop ^Bullying',Accept Iceland's
Compensation Officer (U)" on 20 February 2010, Iknow the page opened and the document
displayed; otherwise, the action would not have logged,
9, In this case,IaIsoconductedasql search of the database for all the document titles that were
viewed by the user account "bradass^7," lsavedthemas"bradass^7 sum export with
classifications," Idid this as it was an easier format to view what document titles were viewed
by the user, Usingtheaboveexamp1eand"bradass^7 sum export with classifications" you can
match the target, which contains the holding identification with the document title. In the above
example, the target(and holding identification) is 11945572, which again, matches with the title
"Dai1yTellsU^,DutchToStop ^Bullying',Accept Iceland'sCompensation Officer,"
10, Based upon the review ofthe audit logs, it appears that "bmanning" began using his account
on 2^ November 2009 and looked at Homeland Sect^ity information. He did not conduct any
activity on his account afier that date. The subsequent two dates are automatic entries to track
the lapsing and expiration ofthe accounts, PE^ f o r ID are the OSC logs for the user account
"bmanning,"
3 ^
FOR OFFICIAL USE ONLY
FOR OFFICIAL USEONLY
11, Based upon the review ofthe audit logs, it appears that "bradass^7" began using the OSC on
20 February 2010and looked atavariety of documents associated with wikileaks and Iceland,
The "bradass^7"accountwaslastusedonl7April2010.PE^for ID are theOSC logs forthe
user account "bradass^7,"
12, The informationlprovided is computer generated and only limited people have access to the
information, lhave no reason to believe that the informationlprovided was not accurate. On 29
Jtme2012,lattested to the authenticity of the OSC log files, containing the following logs, with
the following date ranges: "bmanning distinct export with classification,xls"(date ranged
November2009to9November2010);"bradass^7 distinct export withcIassification,xls"(date
range20February2010to17April2010);"bradass^7 sum export withclassification,xls"(no
date range). The logs thatlattested to in this case were in the excel formaL Althoughl
originally pulled the logs inadifferent format, the content was identical to the logs thatlpulled.
In the same 29 June 20l2attestation,Iattested to the authenticity of the OSC user information
files entitled Opensource.gov-bmanning,pdf and Opensource,gov-bradass^7,pdf. This attestation
isBATESnumber005051^4.
^ ^ ^ ^ ^ ^ ^ ^ ^ ^^^^^^^^^B^^^^^^^
ANGELM^VERGAARD THOMAS HURLEYS BRADLEYEMANNING
CPT,JA MAJ,JA PFC, USA
AssistantTrial Counsel De^nse Counsel Accused
^
FOROFFICIAL USEONLY
5
b
<
i
^ i n m m m i n u i m ' P
. ' O O O O O O O 3
r - < A ( A ( A < A ( A ( A ( / ) r i
O 0 . 0 . 0 . 0 . 0 . 0 . 0 - 0
D- CO O . O . O . O . O . O . O . 0
? a : 0 ^ ? ? ? ? ? ? ? ' ^
O r J "ffi
e s aus 'e 'a 'e 'e a e s ^ I
z
C5
UJ
< - I
ssl
y
> - u j Q Q D D Q Q Q " "
^ ^ - ' - ' - ' - ' - i ^ V' SS
i um( / 3( nc/ 5( / >cn</ ) </ ) - K- 3.
e SDOOOOOo o o o
< U 5 I X I I X X I Q : I I :
E
i 2-
I
^ S| 8 | 8
01
a
H
a
5
I
i
o
S
rl
ti
a
1
%
s
1 1
tn tn tn 01 tn
5 3 5 5 ,
Q ) 0 > 0 ) 0 ) Q ) 0 ) 0 ) 0 ) C T O Q ) Q ) 0 )
r K 5 5 5 5 E 5 5 5 5 5 E E 5
c c "c c c c c c c c c c 'c
U c c c c c c c c c c c c c
r~(Q(Qron)(Qnin)nin]ninini(0
O E E E E E E E E E E E E E
<.a.a.a.a.Q.Q.o.i3.Q.n.Qi3^
< < < < < <
5 5 5 5 5 5
< < < < < <
o o o o o o
o o o o o o
o o o o o o
o o o o o o
o o o o o o
d "t
1 - , ^
1^
i
1 M CN CO CO o U)
i CN CN r \ j CN r rsi
o o o o o ^
g g g g o o
:>:>:>:> :>
o o o o o o
z z z z o z
<h to fh th to
O O O O CM O
. r ^ f v , ( ^ ( v . < D a > o - c N c o m u 7
i m m m i n i n i n i D i D i D i D T r " ^
l O U 3 l O t O ( D t O ( O t O ( D ( O G ) V
I C N C N C N C N C N C N f M C M C g C N i n t n
O O O O O O O O O O O O O O
i C O n c o c o c O c o c o c o r o r j t N C N
( O C O C O C O C O C O C O C I O C O I O I O
> >
o o
z z
> >
o o
z z
> >
o o
z z
Manni ngB_00374397
PROSECUTION n
PAGEOFFERED:
PAGE Or
, V
" [Ho for idptiSicaUon
ADMITTED:
P.AGES
Prosecution Exhibitl^l
pages
classified
"CO^EIDE^TIAE"
ordered sealed for Reason3
Military Judge's Seal Order
dated20August2013
stored in the classilied
supplementto the original
Record ofTrial
UNITEDSTATESOF AMERICA
Manning, Bradley E.
PFCU.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer,Vir^inia 22211
STIPULATION OF
EXPECTEDTESTIMONY
SSG Peter Bi^elow
June 2013
It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that ifSSG
Peter Bigelow were present to testity during the merits and pre-sentencing phases ofthis court-
martial, he would testily substantially as follows:
1, lam currently the Battalion S4 NCOIC for the 7^2d Brigade Support Battalion, ^2d Airborne
Division, Fort Bragg, North Carolina, Irecentlylefi my position as the Supply Sergeant for the
2d NATO Signal Battalion in Italy, IhavebeenactivedutyArmy since 2004. Prior to that,1
served in the Army National Guard fi-om 1999 to 2000 and the Marine Corps fi-om19^9to1993
and again from199^to 1999.
2, Iknow PFC Marming because he came to work for me in the supply shop afier leaving the S2
shop during our deployment to Contingency Operating Base(COB)Hammer, Iraq. Helefithe
S2 shop on approximate1y^May2010and joined the supply room the following day,on
approximately9May2010. At that time,Iwas the Headquarters and Headquarters Company
(HHC), 2d Brigade (BDE),10th Mountain Division Supply SergeanL Inthisposition,Iwas
responsible for supporting the Brigade and also handling the logistical needs for the Brigade
Headquarters Company and Staffconsisting ofmy Company Commander; Executive Officer;
and the arms, supply,and orderly room persormel. In the supply room, PFC Marming would
help out with tasks, such as moving supplies, photocopying, or running messages or paperwork
to other sections, Idid not always have things for PFC Manning to do, so he typically had
several hoursaday during his shifi where he did nothing but readabook or surf the intemeL
3, Ifirst became awareofthe investigation and misconduct at issue in these proceedings afier
getting back fi-omasupply run toVictory Base Complex in Iraq on 27 May2010, Upon my
retum,Iwas told to get PFC Manning because CID was en route to question him. That
instruction came from CPT Lim, the 2dBDES2. He asked me to stay with PFC Manning until
CID arrived. Afierldropped my gear,Iwent immediately to the Supply Office, got PFC
Marming, and requested myArmor Sergeant watch him until otherwise instructed,
4, CID arrived that evening. They interviewed me regarding leaked material andPFC
Manning'scomputer usage. ladvised the investigating agents thatPFC Marming had had access
to my NIPR and personal computer, and that,whileldid not know ifPFC Manning had used my
SIPRmachine,lhad seen him sitting behind iL IconsentedtoaCID agent taking my personal
laptop. The CID agent also collected my GovemmentNIPRandSIPRhard drives. laskedthat
the agent to take only the hard drives from the Govemment computers, because, afier CID's
investigation ofthe S2shop,we were running out of computer terminals. Isigned my personal
PROSECUTION n y f x - y r - n n n c a t i o n
PAGE OFFERED: . . .DivflTTED:
PAGE OF
computer and the supply room NIPR and SIPRhard drives over to the agent on an evidence
custody form that she supplied.
5. PFC Manning used my personal computer and my NIPR computer. Ilet him use my personal
computer afierlnoticed that he was checking his personal email and surfing the web on the
goverrm^ent computer. At no point didlever log into any ofPFCManning'spersonal accounts,
such as Gmail, Amazon or Charles Schwab. lalso did not conduct any searches on cross-
dressing and did not purchaseabook on Amazon called "Facial Femini:^ation Surgery AGuide
fortheTransgendered^oman." Idid not know what the Global Address List(GAL)was. I
never searched for any information related to it, nor didlever download or take any actions to
otherwise extract it or information related to iL lalso never searched for information relating to
"Julian Assange,""^ikileaks,"or"vba outlook write text file." lalso have never nameda
folder or file with the word "blah,"particularly not one on my Govemment NIPR computer.
^
ERGAARD ANGEL
CPT, JA
Assistant Trial Counsel
^Wx^-^^-'^CA^ ^ ^ / y ^ v i ^
THOMAS F. HURLEY ^ BRADI^gY^ MANNING
MAJ, JA PFC, USA
Military Defense Counsel Accused
UNITEDSTATESOF AMERICA
Manning, Bradley E^
PFCU.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
SA Alfred Williamson
June2013
It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that ifSA
Alfred Williamson were present to testify during the merits and pre sentencing phases of this
court-martial, he would testify substantially as follows:
1. Ibegan working for the Computer Crimes Investigation Unit(CCIU)oftheU.S.Army
Criminal Investigation Command(CID)in 2006. lam currentlyacriminal investigator Special
Agent (SA). In 2010and 2011,Iwasadigital forensic examiner and SA,working in the Digital
Forensics and Research Branch of CCIU. SA David Shaver was my supervisor. Priorto
working for CCIU,Iworkedasacomputer forensic Special Agent for the Department of
Homeland Security fi'om 2002 to 2006. From 1992 to 2002,Iserved asapolice officer inTexas.
2. lhave attended and received training in multiple areas related computer forensic examination.
This training includesTreasury Department computer forensic courses through the Federal Law
EnforcementTraining Center, nine weeks ofintermittent training inAPlus,pre-computer
evidence response, and basic computer evidence response techniques. For my work with CIIU,I
have attended additional training on digital media collection and forensic examination, as well as
computer crime scene investigation, fiom the Defense Cyber InvestigationsTraining Academy
(DCITA), under the Detense Cyber Crime Center (DC3). lhave industry certifications from
CompTIAinAPIus, Network Plus, and Security Plus. Further,IamaMicrosofi certified
specialist in^indows Vista andacertified Ethical Hacker. lhave obtained all three
Department ofDefense forensic examination certifications in digital media collection, digital
examination, and computer crimes investigations. lam alsoacertified EnCase Examiner
through Guidance Sofiware, the makers ofthe EnCase forensic tool. Fina11y,IhaveGIAC
certifications in forensic examination and analysis, as well as security.
3. As part ofthis case,Iconductedaforensic examination ofProsecution Exhibit (PE) I I , a
U.S.goverrm^entNIPR^ETcomputer collected from the supply armex on FOB Harrm^er, Iraq.
The IP addressofthis computer was 144.107.17.19. Specifically,Iexaminedtheverified-by-
hash forensic image obtained by SA Calder Robertson fi-om the hard drive ofthis computer. The
original forensic laboratory examination request came fi:om one ofthe CID agents in Iraq, SA
Toni Graham. Initial examination ofthe forensic image revealed that it contained the windows
XP operating system and the computer was set to Baghdad time(GMT^3:00). Before
begirming my examination of the forensic image,Iperformedastandard virus scan on this
computer and confirmed that it had no malicious files.
PROSECUTION nxr ; - ?r
PAGEOFFERED: :
PAGE OF PAGES
iHS %
. ^ ^
rstiiicauon
i l ED:
4. lused the EnCase forensic sofiware tool to conduct my examination. This sofiware is
commonly used by forensic examiners. It verifies the hash value ofthe evidence being examined
so that the examiner can be sure he is analysing an exact duplicate ofthe originally collected
evidence. Ahash value isaunique identifier tbrapiece of electronic information that is made
up ofaseriesofnumbers and letters. lhave used EnCase sofiware extensively. lencountered
no errors during my examination. Overall, my forensic examination identified four main things
of note. I wi l l address each finding in tum.
5. The supply armexNIPRNETcomputer was not configured for Common Access Card(CAC)
login, as the "scforceoption" value was not presenL Instead,ausemame and password were
required to logon. On login to the computer byauser, the computer was set to displaya
Department ofDe^nse waming banner and legal notice. The notice read:
^^ATTENTIONl^^ This is a DOD computer system. Before
processing classified information, check the security accreditation
level ofthis system. Do not process, store, or transmit information
classified above the accreditation level of this system. This
computer system, includingall related equipment, networks and
networkdevices(includesIntemetaccess)areprovidedonIy for
authorised U.S, Govemment use. DOD computer systems may be
monitored for all lawful purposes, including ensuring that use
authorised, for management of the system, tofacilitate protection
against unauthorised access and to verify security procedures,
survivabi1ity,and operational security. Monitoring includes, but is
not limited to, active attacks by authorised DOD entities to test or
verify the security ofthis system. During monitoring, information
may be examined, recorded, copied, and used for authorised
purposes. All information, including personal information, placed
on or sent over this system may be monitored. Use of this DOD
computer system, authori:^ed or unauthori^ed,constitutes consent
tomonitoring, Unauthori^eduse of thisDOD computer system
may subject you to criminal prosecution. Evidence of
unauthorised use collected during monitoring may be used for
administrative, criminal, or other adverseaction, ^^Use ofthis
system constitutes consent to monitoring for all lawful purposes,^^
The DoD waming banner and legal notice did not explicitly prohibit the dov^loading of email
addresses, lam not aware of any restriction or guidance that precludes one from downloading
email addresses from Outlook,
6. The supply annex NIPRNETcomputerhada"bradley,manning" user accounL This account
was not created untiI21May2010, My examination revealed that the user ofthe
bradley,marming user account visited the website http://news,google,com and searched for
"wikileaks" on21May2010. The bradley.manning user account visited websites related to non-
judicial punishment under Artic1e15on21May2010, The bradley.marming user account also
visited several websites owned by Google in order to gain access toaGmail email account, also
on21 May 2010. lalso looked at the Microsofi Outlook nickname file under the
bradley.marming user accounL The nickname list or file is automatically generated whenauser
sends an email with Microsofi Outlook. This nickname file revealed two email addresses
associated with Mr. Adrian Lamo. ^henlexamined the Recycle Bin ofthe bradley.marming
user account,Ifoundatext file that contained the contents ofaPGP-encrypted email
communication between PFC Manning and Mr, Adrian Lamo. The text file was named "Second
Attempt". This "Second Attempt" text file was initially located under "My Documents",but was
later moved by the user to the Recycle Bin,
7, Other than the items just described,1initial1y found very little ofinvestigative interest under
the brad1ey,manning user accounL Ilater went back and examined the entire computer,
including the other user accounts present on the computer,when Mr, Mark Johnson found
re^rences to the United States Forceslraq Global Address List(GAL)during his examination of
PFC Marming'spersonal computer, including extracts ofwhat appeared to beaMicrosofi
Exchange GAL with thousands of email addresses. Accordingly,Iwent back and examined the
entire computer, including the "peter.bigelow" user accounL
^. ^Vhenllooked at the supply armex NIPRNET again, it appeared to me that PFC Marming or
someone with access to his personal accounts was operating the computer under the user account
peter.bigelow, Isay this for several reasons.
9, First, examination ofthe "My Documents" folder underthe peter.bigelow user account
revealedalarge text file that appeared to be an extract ofaMicrosofi Exchange GAL. The text
file was named "blah.txt". "Blah" isanaming convention that was used by PFC Manning for
files on his personal computer and his SIPRNETcomputer,
10, Second,Ifound five files related to the GAL in the Recycle Bin ofthe peter.bigelow user
account^two text files named "blah.txt",two".^ip" archives named "blah,^ip"(each containing
atext file named "blah,txt"),andatext file named "tmp,txt". All ofthese files found in the
Recycle Bin appeared to have been created and deleted on 13 May 2010, and in between creating
and deleting these files, the user ofthe peter,bige1ow account also viewed the bradley.e.marming
Gmail account inbox. All ofthese files, text files and ,^ip archives, contained extracts ofwhat
appeared to beaMicrosofiExchange GAL similar to the content of the text file found under the
"My Documents" folder. Iwas not surprised to find various files, because given the huge
amount of dataaGlobal Address List contains, it would be easier to manage fragments rather
thanawhole intact file.
11, As stated before,Ifound two large text files named "blah,txt" contained within the",:^ip"
archives in the Recycle Bin ofthe peter,bige1ow user accounL The two text files are dif^renL
One contains approximate1y74,000 Exchange-formatted email addresses(emails text file), and
the other contains the units, rarrks, and sections of personnel that correspond with the email
addresses (names text file), PE 47 for ID isaCD containing the names text file. If fully
printed, this text file would be 1,3^6 pages, PE^ f o r ID isatwenty-page excerpt fi-om the
names text file. PE 4^ for ID isaCD containing the emails text file. Iffi^IIy printed, this text
file would also be 1,386 pages. PE^ f o r ID isatwenty-page excerpt fi'om the emails text file.
Idid not contact any individual who could have given me the actual Iraq GAL, nor didlcompare
the data in the files recovered from the above files with the actual Iraq GAL. Idid not attempt to
communicate with any ofthe email addresses located in the above files and am unaware whether
the listed emails were fi^nctioning.
12. Third, someone using the peter,bigelow account also searched for "wikileaks" and "julian
assange",
13. Fourth, the Recycle Bin of the peter.bigelow user account containedaPDF of military
documents pertaining to PFC Marming named "tmp.pdF'.
14. Fina11y,the Intemet history for the peter.bigelow user account contained web pages
displaying the logged-in user as PFC Manning. Specifica11y,in the "index.dat" fi1e,Iobserved
logins to PFC Marming'sArmy Knowledge Online (A^O)email account, as well as logins to the
bradley.e.manning Gmail accounL "Index.dat" isafile used by windows to record website and
local files accessed byauser to help speed up the loading of pages in Microsofi Intemet Explorer
and windows Explorer, lalso found several temporary intemet files that were Amazon.com
webpages. One of the pages displayed PFC Marming'sname and address in the "Shipping to"
and "Billing" sections. There was no evidence in the "index.dat" file thatauser of the
peter.bigelow account visited theTwitter or WikiLeaks websites, nor di dl fi nd any evidence that
the user visited anti-American or extremist websites. My forensic examinations produced no
evidence ofa^ikileaks Most wanted list or any suspicious financial transactions. Ifound no
references to Jason I^at^ during my investigation.
15. ^i t h regards to the Global Address List information,Ia1so found evidence that the user of
the peter.bigelow user account had searched for information on the intemet relating to the global
address lisL Specifically,in the temporary intemet fi1es,IfoundaGoogIe search page with
results for searching "global address list Microsofi excel macro". This search occurred o n l l
May2010, AMicrosofi Excel macro isacomputer program used within Microsofi Excel to
automate common procedures within Microsofi Excel, PE^forl Di sapri nt out of the search
page from this computer showing the Google results thatlwas able to recover from the computer
in the temporary internet files. PE^ f o r ID isasearch page showing Google results fora
search for"globa1 address list macro outlook". This search also occurred on11May2010and
this webpage was recovered from the temporary intemet files as welL AMicrosofi Outlook
Macro is similar to the description above foraMicrosofi Excel Macro, but for Microsofi Office,
PE^ f o r ID isaGoogle search page with results fi'omasearch for "vba outlook v^ite text file".
This search occurred on 13 May 2010. "VBA"is short for "Visual Basic for App1ications."This
Google search provided links to instructions on how to computer program inVisua1Basic,a
common programming language for Microsofi Office products, that can be used to export
information fi'om Outlook toa",txt" file, although emails can also be saved by clicking on "save
as" in Outlook and se1ecting",txt" file type. Temporary internet files isafolder in the windows
operating system used to cache or store websites visited by the user through Intemet Explorer or
other web browsers. The storing or caching ofthese webpages allows these websites to load
more quickly the next time they are visited by the user. They are also used typically by forensic
examiners to determine what webpagesauser previously accessed.
/^^Ef^f NZRROW^
CPT, JA
Assistant Trial Counsel
JiiArmA^^. ^iLJUy^
THOMAS HURLEY ^
MAJ, JA
Defense Counsel
BRAD
PFC, USA
Accused
AppeneJix L FOUO//LES
AVeb Images Videos Maps News Shopping Gmail more
ROl 0028-10-CID221-10117
CAF 0028-10-C1D361
Web History | Search settings | Sign in
Google
global address list microsoft excel macro Search
SafeSearch strict T
About 153,000 results (0.28 seconds) Advanced search
Everyt hi ng
More
Show search tools
Looking Up Names In A Gl obal Addr ess Book - Excel Help & Ex c el . . .
14 May 2008 ... GIVE YOURSELF OR YOUR COMPANY FREE 24/7 MICROSOFT
EXCEL SUPPORT & QUESTIONS FOR LIFE ... AddressListsf Gl obal Addr ess Li st ")
Set M = olApp. ...
www.ozgrid.com > > HELP FORUMS > Excel and/or Email Help - Cached
Gl obal Addr ess Li st Lookup From Within Workbook - Mi cr osof t Excel ... - 8 Sep
2007
outlook gl obal addr ess l i st in listbox - Excel Help & Excel Macr o Help - 20 Apr
2006
Open Outlook & Gl obal Addr ess Book - Mi cr osof t Excel Training ... - 1 Sep 2005
Addr ess Book in a List/Combobox - Mi cr osof t Excel Training. Excel ... - 3 Aug
2004
More results from ozgrid.com
VBA Express : Excel - Extract Email Data From Outlook Gl obal . . .
Dumping the GAL to Excel provides an list in a form that can be easily searched or . . .
While in the VBE, choose Tools - References and put a check in Mi cr osof t CDO ... Run
the macr o by going to Tools Macr o Macr os and double-click GetGAL ...
www.vbaexpress.com/kb/getarticle.php?kbJd=222 - Cached - Similar
Free excel macr o pull gl obal addr ess book Download - excel
macr o ...
l\/lanningB_00210983
Report of Supply Annex NIPR
Related searches: download gl obal addr ess book excel macr o ping ip addr ess ....
ExcelReport is a report generator for Mi cr osof t excel that uses Microsoft...
software.informer.com/getfree-excel-macro-pull-global-address-book/ - Cached
How to record a macr o using relative cell references in Excel
In Macr o Name l i st , click the name of the macr o that you recorded, ... For more
information about recording macr os, click Mi cr osof t Excel Help on the Help ...
support.microsoft.com/kb/213740 - Cached - Similar
Converting Addresses
cc:Mail distribution lists, Mi cr osof t Exchange Server GAL, Excel Macr o for Migration of
ccMail Distribution Lists. cc:Mail directory and address lists ...
www.slipstick.com/config/convaddr htm - Cached - Similar
Answer Box: Send e-mail messages to a group using mail merge in ...
You definitely can use your Mi cr osof t Outlook Express Addr ess Book as ... Workaround
To solve this problem by using macr os, see WD2002: Text Form .... merged e-mail
messages to recipients in your Outlook Gl obal Addr ess Book ... Use an existing l i st
Click this option if you already have a data file, such as an Excel ...
office.microsoft.com > ... > Answer Box - Cached - Similar
Mi cr osof t Excel : Extracting Gl obal Addr ess Li st (GAL) - excel ...
Mi cr osof t Excel : Extracting Gl obal Addr ess Li st (GAL) ... cols in order: a,c,d,b,e,f It
does need to be a macr o, as opposed to manually doing a custom list. ...
excel .i tags.org/mi crosoft-excel /169389/ - Cached
Thread VBA Code Needed for Extracting Contacts list in Gl obal . . .
9 posts - 4 authors
Hi, Can Anyone help me to extract the contact list from gl obal addr ess l i st of the ... such
Information through VBA code which can be written in Mi cr osof t outlook. ... This macr o
will export the contents of all items in the GAL with the ...
boardreader.com/.../VBA_Code_Needed_for_Extracting_ContactsJqtaXe66j.html -
I ^ J D ^
PROSECUTION EXMFIT HH fo/taentificat.v:vi
PAGE OFFERED:
PAGE OF PAGES
F0U0//LES
PAGE ADMITTED:
Appendix L F0U0//LES
ROl 0028-10-GID221-10117
CAF 0028-10-CID361
Cached - Similar
[SOLVED] Read details from Gl obal Addr ess Book in Outlook into ...
6 posts - 2 authors
MS Office Versi on:Mi crosoft Office Excel 2003. Posts: 130 ... AddressLists("Global
Addr ess Li st ") For Each AddressEntries In myAddressList.AddressEntries i = i -H 1 Debug.
... If I run my macr o will it only list names, nothing more. ...
www.exceiforum.com/excel.../715057-read-details-from-global-address-book-in-
outlook-into-excel.html - Cached
Mi cr osof t Access tutorials - Export Exchange Gl obal Addr ess Li st
Export Exchange Gl obal Addr ess Li st to Access ... For example, it can enclose a
macr o to a command button in a form, so the macr o is executed when clicking in ....
Mi cr osof t Excel (113) Microsoft Word(86) Microsoft Power Point(110)...
tutorial-index.com > ... > Importing and Exporting - Cached - Similar
Searches related to gl obal addr ess l i st mi cr osof t excel macr o
vba global address list
modify global address list
1 2 3 4 5 6 7 8 9 10 Next
global address list microsoft excel macro Search
Search within results Search Help
Give us feedback
Google Home Advertising Programs Business Solutions Privacy About Google
ManningB_00210984
Report of Supply Annex NIPR F0U0//LES
Appendix L FOUO//LES
Web imaaea videos Macs News Shopping Gmail more
ROl 0028-10-CID221-10117
CAF 0028-10-CID361
Web History j Search settings j Sign in
Google
global address list macro outlook Search! satesearchstrict T
About 174,000 results (0.32 seconds) Advanced search
Everyt hi ng
More
Show search tools
VBA Express : Excel - Extract Email Data From Out l ook Gl obal . . .
Extract Email Data From Out l ook Gl obal Addr ess Li st - GAL Extracts the detailed ...
Run the macr o by going to Tools Macr o Macr os and double-click GetGAL ...
www vbaexpress.com/kb/getarticle.php?kbjd=222 - Cached - Similar
[SOLVED] Read details from Gl obal Addr ess Book in Out l ook into ...
6 posts - 2 authors
Addr essLi st Set outApp = CreateObject("Outlook.Application") Set outNS = outApp.
GetNamespaceC'MAPI") Set myAddressList = outNS.Session.AddressLists("Global ...
www.excelforum.com/. ./715057-read-details-from-global-address-book-in-outlook-into-
excel.html - Cached
Out l ook Macr o to get Exchange Info from Mail, help. FAQ, forums ...
13 Apr 2010 ... Hi, I'm working on a macr o in Out l ook 2003 SP3 that, when started, ...
You can get the Exchange Gl obal Addr ess Li st as a member of the ...
us.generation-nt.com/outlook-macro-get-exchange-info-mail-help-197240591.html
Out l ook - New Message with Completed From Field | Amset.info
Creating Macr os in Out l ook is very easy. Choose Tools, Macr o, Macr os, ..
in the Gl obal Addr ess Li st OR is in the user's personal contacts. ...
vww.amset info/outlook/newmessagemacro.asp - Similar
is visible
out l ook gl obal addr ess l i st in listbox - Excel Help & Excel Macr o Help
20 Apr 2006 ... I'm looking to import names from my out l ook gl obal addr ess l i st into a
list or . . . ALWAYS run an up-to-date virus scan ancj disable macr os. ...
www.ozgrid.cxim > ... i Excel and/or Email Help - Cached - Similar
Looking Up Names In A Gl obal Addr ess Book - 14 May 2008
Opening Outlook Address Book - is Aug 2006
Open Out l ook & Gl obal Addr ess Book - Microsoft Excel Training ... - 1 Sep 2005
import out l ook contact objects from gloabal addr ess l i st to ... - 16 May 2005
More results from ozgrid com
Converting Addresses
Netscape 4/6/7; Thunderbird; Exchange GAL; Out l ook contacts; ....
lists, Microsoft Exchange Server GAL, Excel Macr o for Migration of
www.slipstick com/config/convaddr.htm - Cached - Similar
cc:Mail distribution
Accessing Gl obal Addr ess Li st details with VBA - The Code Cage
Forums
11 Feb 2010 ... Out l ook Macr o' s & VBA>Accessing Gl obal Addr ess Li st details with
VBA ... name in the Gl obal Addr ess Li st . The purpose is to retrieve a few ...
www.thecodec%ige.com/.. out l ook macr os ./178691 accessing gl obal addr ess l i st
details-visual-basic-applications.html - Cached - Similar
MS Outlook How-to Articles
OL2000 How to Assign a Macr o to a Shortcut Key (0252427) XCLN How to Use the
Out l ook LDAP Service to View the Gl obal Addr ess Li st (Q245830) ...
www.kayodeok.btinternet.co uk/ /kbofficeoutlookhowto.htm - Cached - Similar
HELP !! Need to create an Out l ook Reply Macr o - MrExcel Message
Board
3 posts - 3 authors - Last post: 15 Jul 2003
HELP II Need to create an Out l ook Reply Macr o Excel Questions. ... AddressLists(
"Gl obal Addr ess Li st ") Application. ...
ManningB_00210985
Report of Supply Annex NIPR
F0U0//LES PROSECUTION EXH1I:: i
PAGE OFFERED: P A^
PAGE OF PAGES
ntiiication
FTED:
ROI0028 10 CIO22110117
Appendix 1^ FOUO^^I^ES CAF 0028 10 0103^1
wwwmrexcel com^ .^Question Forums^Excel Questions-Cached Similar
VBA/CDO Access querying the Out l ook Addr ess Book VBForums
4post s- 2aut hor s- Last post : 13Nov 2009
My solution was for Access to tap into the Out l ook GAL (Gl obal Addr ess Li st ) . . . i t
would almost be the same as writing an Out l ook mac r o. . . .
www.vbforums.com/showthread.php'^t^591367 Cached
Searches related to gl obal addr ess l i st macr o out l ook
global adc:lress list expor t global address list outlook
global address list excel updat e global address list outlook
global address list I da^ outlook global address list def aul t
i mpor t global address list outlook ^ r i ^ t global address list outlook
1 2 3 4 5 6 7 8 9 10 l ^ext
global address list macro outlook Search
Search within results Search Help
Give us feedback
Google Home Advertising Programs Business Solutions Privacy About Google
ManningB^002^098^
Report ofSupply Annex NIPR FOIJC^^^I^ES
' Appendix L FOUO//LES
Web Images videos Maps News Shopping Gmail more
ROl 0028-10-CID221-10117
CAF 0028-10-CID361
Web History | Search settings | Sign in
Google
E v e r y t h i n g
More
Al l r esul t s
Page previews
More search tools
vba outlook write text file Search
SafeSearch strict
About 231,000 results (0.26 seconds) Advanced search
VBA create t x t f i l e and field lengths - Excel Help & Excel Macro Help
26 Apr 2006 ... Count' Wr i t e current cell's t ext to f i l e with quotation marks. ... Out l ook
RSS Feed Discussions, Optimizing VBA Code, PowerPoint RSS Feed ...
www.ozgrid.com > ... > HELP FORUMS > EXCEL HELP - Cached - Similar
Write Array To Text File On Single Line -14 Apr 2008
Manipulate t ex t f i l e using VBA - 15 Jul 2006
[Solved] VBA: wr i t e a line from Excel to a t ex t f i l e - 6 Oct 2003
VBA: Writing to disk - 3 Aug 2003
More results from ozgrid.com
Writing email messages to flat f i l es in Out l ook with VBA - Stack ...
OpenTextFile("C:\Outputfile.txt", ForAppending, True) ts.Write(objMail. ... Browse other
questions tagged out l ook vba flat-file email or ask your own ...
stackoverflow com/., /writing-email-messages-to-flat-files-in-outlook-with-vba -
Cached - Similar
Writing VBA code for Microsoft Out l ook
Among the useful procedures that you can wr i t e with Out l ook VBA are:
manipulation; How to Send a Range of Cells Using VBA - using the ...
www.outlookcode.com/article.aspx?ID=40 - Cached
for t ext f i l e
Code Samples
59, VBS, VBA, Importing Contacts from a Text Fi l e into Out l ook. Updated ... The
TypeText method is used to wr i t e data to the letters. ...
www.helenfeddema.com/CodeSamples.htm - Cached - Similar
Out l ook Tips: Using VBA to Manage Your Out l ook Email Attachments
Out l ook VBA code can be distributed using COM Add-ins but this is beyond the You
can download a t ex t f i l e that can be imported into your host program ...
www.fontstuff.com/outlook/oltut01.htm - Cached - Similar
Out l ook VBA brings up addin error, help. FAQ, forums, question ...
7 May 2010 ... Out l ook VBA brings up addin error : I know that it is bad form to post a
question ... TXT f i l e on the desktop. It runs OK on my Out l ook 2003, but when run on
my ... ' wr i t e the unsubs to t ex t f i l e ObjFile.WriteLine obj. ...
us.generation-nt com/outlook-vba-brings-up-addin-error-help-51868212.html
All projects - out l ook vba mailitem t ex t f i l e body - Freelancer.com
See more: out l ook vba extract text, vba merge t ext f i l e, read email body out l ook
vba, .... Minor change to wr i t e t ext f i l e (asp or other), 2, $30 . ...
www.freelancer.com/.. /outl ook-vba-mai l i tem-text-fi i e-body.html - Cached
Saving Out l ook Email As Text Fi l e Extract in Programming-VBA
3 posts - 2 authors - Last post: 6 May
Does anyone know how to configure Out l ook (VBA approach would be fine) ... be
extracted to a directory as a t ex t f i l e and then the Out l ook ...
www.microsoft.com/. ./default aspx?...outl ook...vba... - Cached
Visual Basic :: MS OUTLOOK VB/VBA >:<: Pull A Person's ...
We need some VBA work that will interface with Out l ook or MS Exchange server and pull
a person's calendar and wr i t e in a t ex t f i l e. ...
www.bigresource.com/VB-MS-OUTLOOK-VB-VBA-gt-lt-pull-a-person-039-s-calendar-
and-wri te-i n-a-text-fi l e--BZChABTzzn.html - Cached - Similar
Solved: Out l ook Body Text to Text Fi l e. Scripting and Guard Issues ...
ManningB_00210987
Report of Supply Annex NIPR F0U0//LES P R O S E C U T I O N E X H I H ^ T j H 6 f o r i dj j r f t i n c a t i o n
PAGE OFFERED: PAGE ADMITTED: ^
PAGE OF PAGES
Appendix L FOUO//LES
ROl 0028-10-CID221-10117
CAF 0028-10-CID361
25 May 2007 ... Solved: Out l ook Body Text to Text Fi l e, Scripting and Guard Issues .
As for the 'need to approve the saveas/ file wr i t e to have access to ...
www.vbaexpress.com/forum/showthread.php?t=13006 - Cached
Searches related to vba out l ook wr i t e t ex t f i l e
vba outlook mai l i t em
vba macr o outlook
vba excel outlook
vba outlook f ol der
vba outlook at t achment s
vba outlook Inbox
outlook automation vba
outlook vba scr i pt
1 2 3 4 5 6 7 8 9 10 Next
vba outlook write text file Search
^' r mmf r mw
Search within results Search Help
Give us feedback
Google Home Advertising Programs Business Solutions Privacy About Google
ManningB_00210988
Report of Supply Annex NIPR FOUO//LES
UNITED STATES OF AMERICA
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
Mr. James Downey
June 2013
It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that i fMr.
James Downey were present to testify during the merits and pre-sentencing phases of this court-
martial, he would testify substantially as follows.
1. I work at Defense Information Systems Agency (DISA), Fort Meade, Maryland. Specifically,
I am a part of the Program Executive Office for Mission Assurance (PEO-MA) and Network
Operations. I am the program manager for attack analysis. I have held this position since 2007.
I hold the Global Information Assurance Certification (GIAC) security leadership certification
(GSLC), and I am a certified ethical hacker.
2. The PEO-MA department, where I currently work, provides program management for various
programs that help secure the IT information within the Department ofDefense (DoD). Within
PEO-MA, I work for the Community Data Center (CDC). The CDC hosts a set of tools used by
people who secure DoD networks. We host enterprise level Information Assurance (IA) tools
and net defense tools, which enable analysts to basically ensure the availability and integrity of
the networks that DISA provides for DoD. "Enterprise tools" are those which are capable of
handling the amount of data we deal with and the large and complicated networks with which we
work. Since DISA is like an intemet server provider for DoD, we operate on a scale which is
much larger than what the commercially available tools are designed to handle. A "tool" is just
what it sounds like - something that allows us to do our network management job. Usually, it is
information or a way of processing or gathering information.
3. The tool relevant to this case is the data we use called Netflow data. This is a type of data
which was developed by Cisco, but which is now industry standard. With it, we can capture the
Intemet Protocol (IP) addresses of two computers communicating across the system, as well as
the volume of traffic which flows between them. We use YAF to collect this data. YAF stands
for "yet another flow meter". This tool was developed by Carnegie Mellon and is the industry
standard. Just like any meter, it measures and then creates a data record of the flow past a data
collection point. A point of collection is any of the various monitoring points we have stationed
at key perimeter locations throughout the network; for example, where a DoD network crosses or
cormects to the commercial world. These points monitor all traffic, or computer to computer
communication, crossing from one side of the router to another. Our system would "see" when
someone is on a work computer browsing internet websites like yahoo while on NIPRNET or the
United States Central Command Server from a computer in Iraq while on SIPRNET. The system
detects the capacity being used during that communication and at that location. This information
can communicate whether something is being downloaded onto that computer. We collect
PROSECUTION EXlir'T JHiJc
PAGE OFFERED: _ _ r \pL /^D
PAGE Or VUCES
Netflow data on NIPRNETand SIPRNET. There are relatively few routers collecting Netflow
data throughout the entire SIPRNET. Because this system only collects information passing
from one side ofthe router to another, it does not collect Netflow data passing withinanetwork
that does not cross throughacollecting router. Forexample, ifacomputer is communicating
withaserver or another computer within the Iraq SIPRNETdomain, that activity would not be
captured in Netflow data, because the connection and data does not cross through the Iraq
SIPRNETdomain router, but rather stays within the Iraq SIPRNETdomain network.
^, Wecollect this Netflow data for several reasons, First,weusethe data to conduct traffic
analysis. It allows our analysts to see where they need to deploy additional capacity in the DoD
network. For example, ifone segment ofthe system is getting more traffic than another, it may
needalarger router. This type ofwork falls within the purview ofthc:^se CDC analysts working
on network operations and maintenance. These analysts focus on maintaining the availability,
robustness, and proper ftinctioning ofthe Netflow data. They ensure that the system is collecting
data correctly,that it is securely transported and stored, and that the system used to access the
information is on line and fi^nctioning properly. Another section however uses the Netflow data
to defend the DoD network fiom threats. For example, ifaregular DoD user hasavirus on
his/her computer that tries to connect toamalicious computer outside the network, our tools
enable our analysts to detect that and take the offending computer offline. This section can
investigate suspicious activity. Iwork in the section that manages the delivery of CDC
capabilities. Finally,we also haveagroup using the Netflow data to do research and
developmenL The Research and Development grc:^up analyses the data to try and find pattems
which might help them identify behavior going on that we do not currently haveameans of
detecting. For example,with older viruses it^seasy to know when something has been infected,
but newer ones can be more cautious in how they operate. By looking at pattems over time, our
analysts might be able to see something that helps them find compromised computers in the
network before the virus infects others.
^. CENTAUR is what we call the system we use to track the Netfiowdataljust described. It is
one of the systems with whichlwork in the PEOMA. ACENTAUR log is the data output from
our Netflow data system. Ibecame involved in this case after DISA launched an audit initiative
focused on integrating and analy;^ing multiple data sources to identify and track potential insider
threats on SIPRNET. Because of my job,lam familiar with the Netflow data CENTAUR
generates fbr SIPRNET. Ireceivedarequest to pull the CENTAUR logs showing
communication between three SIPRNET IPs and foraspecific period oftime. The date range of
interest was October 200^ to May2010. Investigators were interested in the following IP
addresses: 2222^2^1^^,2222^B1122,and2222^BUB10
^. Tolook at the CENTAUR data fiom SIPRNET,analystsuseatool developed by Camegie
Melon, called SIE^^System for Intemet Eevell^nowledge. Once gathered, the CENTAUR log
can show certain pieces ofinformation. I wi l l explain how to read the CENTAUR logs by way
ofexample with the following log:
sIP dip sPort dPort pro packets bytes flags sTime dur eTime sensor
204.37.126.39 22.225.41.40 80 2641 6 1379 1305267 FS
PA
2009/12/19101:41:43.633 112.650 2009/12/19101:43:36.283 SPE-
SMEC
a. The "sIP" is the source IP. It is the Intemet Protocol (IP) address ofthe computer that
initiated the conversation that log line is tracking. A"conversation"isaset of transactions that
has in common the same source and destination IPs and ports and which occurs within the same ^
timefiame. In the above example, 22.22^.^1.^0(the destination IP addressed) received ^ ^ ^ ^ ^
inlormation fiom the sending IP address,which is 20^.37.12^.3^. Proseeution Exhibit ( PE) ^^
for Identifieation isalist of many of the organisations who are associated with or own the IP
addresses searched bythe 22.22^.2^1^^,22.22^.^1.22, and22.22^.^1.^0 IP addresses
b. The "dIP" or destination IP is the IP address for the computer that received the data fi^om
thesIP ThedIPintheaboveexampleis2222^B11B10
c. The "sPort" is the port that the sIP was using to communicate. Aportitselfisawaythe
computer can carry on multiple conversations onanetwork at the same time. You can think ofi t
likeamail slot oraparticular channel thatacomputer uses to holdaconversation. ThesPortin
the above example is ^0. sPort code ^0 indicates all intemet web traffic, including browsing on
the web.
d. The "dPort" is the destination port. This is the port the dIP was using to communicate.
Essentially it is the computer which received the conversation. The dPort in the above example
is2^^E
e. The log item "pro" stands fi^r protocol. The protocol is the convention, or language,
which the two computers were using to talk to one another. The number"^" is theTransmission
Control Protocol (TCP). TCPisalanguage, TCP is the dominant protocol, l owi ng the
protocol is important because it tells you the kind ofconversation the two logged IP addresses
were having. For example, another protocol is the number"1"forICMP. Protocols likeTCP
are generally used by users to generate and receive data. Protocols like ICMP are used by
computer systems to report back on status or to support other protocols.
f "Packets" are the chunksacomputer breaks information up into in order to transmit it
across the network. The ratio ofpackets to bytes for example can tell analysts about the nature
of the conversation occurring: essentially,packets communicate complexity. Abyteissimplya
unit ofmeasuring the si^e ofdata or seeing volume. Alarge number ofbytes relative to the
packets meansalarge file is getting downloaded. Asmall byte count meansalower level form
of communication. The packets in the above example is 137^.
g. Abyte itselfis simplyaunit of measuring the sideof data or seeing volume. Beyond its
relationship toapacket, in raw form, the byte tells exactly howmuch information was
exchanged inagiven conversation. ^^Bytes^^provideastraight forward measurement ofhow
much data was transmitted,where the packets can tell you how that data was transmitted. The
bytes in the above example is 130^2^7.
h. "sTime" is the time the communication between IPs started. In the above example the
particular communication between 20^.37,12^.3^ and 22.22^.^1,^0 started at
200^^12^1^T01:^1:^3^33
i . The column labeled "dur" is its duration. The duration is given in seconds. I^owingthis
information is important because different durations are characteristic ofdifterent kinds of
conversations. This information helps analysts like me guide our inferences about the data by
providing context for the communication we are seeking to understand. Theabove
communication took112.^^0 seconds to complete.
j . "eTime" is the timeacommunication ends. The above communication between
20^3712^3^and2222^.^1.^0endedat200^^12^1^T01:^3:3^.2^3,whichshou1dbe112.^^0
seconds afier thesTime.
k. "Sensor" means the collection point used to collect the data being communicated in the
log line. It identifies the router or the sensor generating the record and basically tells us where
on the network the traffic the log line describes occurred. The sensor in the above example is
SPESMEC
1. Together, this information allows analysts to see the IP address ofan individual computer
using the system and the complexity and volume c^finformation being communicated as well as
the length oftime the computer is conducting its activity.The above log tells me that the IP
address2222^B^1B10received130^2^7bytesofdatafromIPaddress20^3712^3^on1^
December 200^
7. Aslindicated earlier, the CENTAUR log data is very useful in detecting suspicious activity.
While it will not automatically alert analysts in the security section of suspicious activity,part of
theirjob is to schedule scripts which look for activity. DISA also deploys detection tools at
multiple locations through the network with unique signatures. These look foraparticular type
ofsuspicious user activity. For example, going to known blocked websites or known malware
servers is sc^mething we can detect, Whenauser takes the action that fits the signature activity,
this action triggers an alert to an analyst in something close to real time. Security analysts also
work off oftips. These tips can come fiom digital alerts like the onesl^ust described or fiom
sources such as Information Assurance groups within DoD organisations which are responsible
for their own local security. Altematively,law enforcement can request information fic^^m our
system^as occurred in this case.
^. The format in which the system returns results to our queries varies depending on the query.
All of these tools run fiomacommand line using text command. The answer to the query comes
back inanative binary file. But then another tool translates that automatically intoaregular text
file so that it is readable byahuman. The analyst then defines which information they want to
see and in what order. By "information,"lamre^rring to the termsldefined earlier, such as
"sIP"and"dur." An analyst then makes the report using this data. The report includes the data
and may also include the analyst^sinterpretation of what that data means,whyit^simportant, and
what the context is.
^. The latter occurred in this case.When asked foracertain date range of data tied to the
relevant IP addresses in this case,we pulled the data. Wefound communications for the IP
addressesldiscussed earlier between November of200^ and May of2010. lam not aware of
any irregularities occurring, and we did some tests to ensure the data was accurate.
10. Drastic changes in the history ofalog tell me one oftwo things. Whenalogisnot
consistet^t with previous behavior overalarge period oftime, it would indicate to me that either
asensor was down or the relevant computer was tumed completely off. There should always be
some baseline level of activity foracomputer connected toanetwork.
11. Afier collecting the data,Isavedfilesofthe log data which were then bumedtoaCD for the
investigators TheCDwasmarked "^^1^^2012, UNCEASSIFIED,hub^out^dipcsv:
hub out sip.csv:spe out dip.csv:spe out sip.csv." These .csv file names represent the
diflerent log data that was pulled. They show activity ofthe 22.22^.2^.1^^,22.22^.^1.^0, and
22.22^.^1.22 IP addresses as the source and destination IPs. The information was sent via
tracked FedEx package to Special Agent David Shaver. The tracking number was
^7^027^^1^20.PEl^for ID istheCDcontainingthe log datalcollected.lrecogni^e thedata
on the CD becauselcollected it, andlrecogni^e the logs based on the column identifiers and
Familiarity with CENTAUR logs,whichIdescribed earlier. Arecords custodian attested to their
authenticity on 1^June2012atBATES number: 00^^^^^3
12. At no point during my collection or transport ofthese logs didlalter them in any way, I
have no reason to believe any ofmy colleagues altered the data or experienced anything out of
the ordinary in collecting it. And,Ihave no reason to believe the data provided or the device on
which it was stored was damaged or contaminated in any way. Finally,Iam not aware of any
issue in the collection, storage, or transport ofthis information which would cause it to have been
incorrectly preserved.
RGAARD ANGEL M.
CPT, JA
Assistant Trial Counsel
J ^ i V H t ^ ^ .
THOMAS F. HURLEY U
MAJ, JA
Military Defense Counsel
BRA
PFC, USA
Accused
UNITED STATES OF AMERICA
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
Ms. Tasha M. Thian
l(p June 2013
It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that i f Ms.
Tasha M. Thian were present to testify during the merits and pre-sentencing phases of this court-
martial, she would testify substantially as follows:
1. I am the Agency Records Officer, Office of Informafion Programs and Services, U.S.
Department of State, In this position, I set policy and procedures for the management of records
within the Department. I am the Department Official responsible for Department of State
records. I am the head of a division of twenty-five employees. The duties of these employees
include records analysis, website management, records scheduling activities, and records review.
I am a certified records manager with thirty-one years of service with the Federal Govemment. I
am responsible for the Foreign Affairs Manual and Handbook sections on records management.
I have been the Agency Records Officer since August 2007.
2. A cable is an official message of the Department of State. Cables can be sent between posts
or between posts and State Department headquarters. When a cable is sent, a record copy of the
cable is automatically captured in the State Archiving System (SAS). The SAS contains
classified cables at the Secret level and below since 1973. There are approximately 400,000 new
Department cables stored in the SAS annually.
3. Cables are identified by the Message Record Number (MRN) assigned to each cable. An
MRN has three parts. The first part of the MRN is the two-digit year the cable was created. The
second part is the name of the post that created the cable. The third part is the sequence number
of the cable. For example, 05Algiersl836 would be the 1,836th cable sent by Embassy Algiers
in 2005.
4. I reviewed and printed directly from the SAS the cables (BATES numbers: 00505328-
00505808) listed in Prosecution Exhibit (PE)t^ for Identification. On 6 December 2012,1
also attested to the authenticity of these cables in a document with the BATES numbers:
00527342-00527346. This authentication memorandum was written on Department of State
letterhead and accompanied by the Department seal and the Secretary's signature verifying my
authority. With this memorandum, I attested that each of the listed records was made at or near
the time of the occurrences of the matters set forth therein. Each record was made by, or from
information transmitted by, people with knowledge of those matters. The records were kept in
the course of the Department's regularly conducted business activities, and it was the regular
practice of such business activities to make these records, I also certified that the records listed
in PE lS\ifor ID are true copies of the original records contained within the files of the
Department of State,
PROSECUTION EXU
PAGEOFFERED:
PAGE OF PAGES
P
/l^
ISO for icKrat'tlcation
,(JE /'lOIvnYl"ED:
5, PE^ f o r ID contains the Net Centric Diplomacy version of the above referenced cables and
the same cables in Appellate Exhibit (AE) ^01. The formatting ofthe cables listed in P E ^ for
ID and AE ^01 is diflerent than the cables in SAS, but the text and content are the same.
^(WM^^-1{-J^
THOMAS HURLEY^
MAJ, JA
Defense Counsel
- c ^
ANGEL MXOVERGAARD
CPT, J A U
Assistant Trial Counsel
BRADLEY E, MANNI
PFC, USA
Accused
SENSITIVE BUT UNCLASSIFIED
UNITED STATES OF AMERICA
V.
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
Charged Department of State
Cables by Message Record Number
June 2013
05 Algiers 1836
06 Algiers 1961
06 Baghdad 2646
06 Baghdad 4205
06 Beirut 3603
06 Beirut 3604
06 Beirut 3703
06 Belgrade 1681
06 Colombo 1889
06 Kabul 5420
06 Kabul5421
06 Kabul 5435
06 Kathmandu 3023 .
06 Kathmandu 3024
06 Kuwait 4430
06 Kuwait 4438
06 Madrid 2955
06 Madrid 2956
06 Pristina 947
06 Pristina 948
06 Riyadh 8811
06 Seoul 3882
06 Seoul 3885
06 Suva 489
06 Taipei 3830
06 Tripoli 645
06 Tripoli 648
07 Addis Ababa 2197
07 Ankara 23
07 Ankara 2468
07 Ashgabat 1359
07 Baghdad 35
07 Baghdad 36
07 Baghdad 37
07 Baghdad 42
07 Baghdad 53
07 Baghdad 56
07 Baghdad 63
07 Baghdad 64
07 Baghdad 70
07 Bangkok 111
07 Basrah 3
07 Beijing 152
07 Beirut 1958
07 Bogota 101
07 Bogota 5118
07 Bratislava 665
07 Bridgetown 23
07 Buenos Aires 1341
07 Caracas 2346
07 Caracas 35
07 Dhaka 24
07 Kabul 68
07 Kingston 25
07 Kuala Lumpur 40
07 La Paz 1949
07 Lagos 719
07 Lima 2400
07 Minsk 1024
07 Moscow 5824
07 Moscow 5825
07 New Delhi 80
07 Panama 1197
07 Panama 1198
07 Paris 4722
07 Paris 4723
07 Rangoon 22
07 Reykjavik 203
07 Riyadh 21
07 Riyadh 22
07 Riyadh 23
07 San Salvador 1375
07 Santo Domingo 28
07 Suva 18
07 Tunis 47
07 USUN New York 573
07 USUN New York 575
07 USUN New York 578
07 Vientiane 12
07 Vilnius 13
08 Amman 535
08 Cairo 569
08 Dar Es Salaam 206
08 Khartoum 246
SENSITIVE BUT UNCLASSIFIED
PROSECUTION EXHIBIT
PAGE OFFERED: PAGE AD
PAGE OF PAGES
08 Khartoum 428
09 Addis Ababa 1063
09 Baghdad 2390
09 Bamako 85
09 Bogota 2873
09 Brasilia 1112
09 Brasilia 1113
10 Brussels 382
09 Caracas 1168
10 Geneva 347
09 Lima 1309
10 Lima 333
09 Mexico 2658
09 New Delhi 267
09 Paris 217
09 Prague 88
09 Pristina 58
09 Riyadh 1156
09 Santiago 831
09 Santiago 833
09 Santiago 835
09 Santo Domingo 1017
09 State 92632
09 State 92641
09 State 92655
09 State 92657
09 Tegucigalpa 891
09 Tegucigalpa 892
10 Pretoria 636
10 Rabat 294
10 Reykjavik 13
10 Tokyo 627
99 Islamabad 495
Prosecution Exhibit 152
has been entered into
the record as a CD/DVD
and w^ill be maintained
with the original
Record of Trial
Prosecution Exhibit 153b
2 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
Prosecution Exhibit 15^
Ipage
classified
"SECRET"
ordered sealedfDrReason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplementto the original
Record ofTrial
Dot 22
US DEPARTMENT OF DEFENSE WARNING STATEMENT
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized
use only. By using this IS (which includes any device attached to this IS, you consent to the following
conditions: The USG routinely intercepts and monitors communications on this IS for purposes
including, but not limited to, penetration testing, COMSEC, monitoring, network operations and
defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (Cl) investigations.
At any time, the USG may inspect and seize data stored on this IS. Communications using, or data
stored on, this IS are not private, are subject to routine monitoring, interception and search, and may be
disclosed or used for any USG authorized purpose. This IS includes security measures (e.g.,
authentication and access controls) to protect USG interests-not for your personal benefit or privacy.
Notwithstanding the above, using this IS does not constitute consent to PM, LE, or Cl investigative
searching or monitoring of the contect of priviledged communications, or work product, related to
personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such
communications and work product are private and confidential. See User Agreement or details.
/O^
PROSECUTION EXH!C'T JOT idcyiiUcation
PAGE OFFERED: V /iDMlTTED:^
PAGE OF PAGES
Dot 139
DOD Security Banner
'^'^ATTENTIONI'^'^ This isaDOD computer system.Before processing classified information, check the
security accreditation level of this system. Do not process, store, or transmit information classified
above the accreditation level ofthis system.This computer system, including all related equipment,
networks and network devices (includes Internet access)are provided only forauthorized U.S,
Government use. DOD computer systems may be monitored for all lawful purposes, including ensuring
that use authorized, for management ofthe system, to facilitate protection against unauthorized
accessand to verify security procedures, survivability,and operational security,Monitoring includes,
but is not limited to, active attacks by authorized DOD entities to test orverify the security of this
system. During monitoring, information may be examined, recorded, copied, and used for authorized
purposes. All information, including personal information, placed on or sent overthis system may be
monitored. Use of this DOD computer system, authorized or unauthorized, constitutes consent to
monitoring. Unauthorized use of this DOD computer system may subject you to criminal prosecution.
Evidence of unauthorized use collected during monitoring may be used for administrative, criminal, or
other adverse action.'^'^Use of this system constitutes consent to monitoring for all lawful purposes.'^'^
PROS^^^^T:0^^^^^^^^^^^^
PAGEOFFERED: P/B^EADMI^TED:
P^GE OF PAGES
M
O
O
( JI
O
0 0
LD
Ln
ISJ
CJJ
'ci
NJ
O
l -
O
o
( JI
o
CjJ
M
O
l->
o
o
Ln
O
f&
M
O
O
( JI
O
CJJ
CD
( JI
P
Kl)
NJ
m
Ql
^
CD
<
3
OJ
3
3
3 '
era
3 "
as
Q.
ro
<
3
as
3
3
3 '
CPO
f@
ec
c
era
CD
3
b"
4
cr
a
c
-<
o
fD
era
fD
ora
fD
CD
X
fD
NJ
O
O
CJl
o
(JJ
9?
Ln
M
CJJ
O
NJ
O
M
8
Ln
O
(JJ
NJ
O
y-^
O
O
Ln
2
I
s
era
o
o
Qra_
fD
h
o
_3
tn
as
as
n
3r
" O
^
11
CD
3
20
t n
O
C
m
CD
11
3 "
T3
TP
S3
II
s
era
CD
^
as
n
II
eS
eu
a
l l '
eo
eu
. Q_
11
20
o
S
11
20
era
r
3^
NJ
O
o
CJl
o
CJJ
9?
Ln
l -
o
o
NJ
o
o
L n
o
LU
cn
Ln
o
vo
O
fD
a.
as
^
fD
<
3
eu
3
3
3 '
era
zr
CD
Q .
as
Q .
CD
<
3
cu
3
3
5'
era
f
ZT
as
Q .
NJ
o
o
Ln
o
CJJ
cn
Ln
p
Isj
NJ
'ci
<
E.
fD
Q .
01
Q .
CD
-<
3
OJ
3
3
3 '
era
c
era
CD
3
cr
4
cr
a
c
<
D
fD
era
fD
era
fD
CD
X
fD
c
era
fD
3
cr
fD
--^
?
cr
a
c
-<
D
fD
n
era
g-
3 '
n
3 "
" V j
^
11
g
era
m
<
g
era
fD
CD
X
fD
OJ
Q .
ID
<
3
OJ
3
3
3 '
era
f
c
ora
CD
3
ix
CD
2
cr
T3
c
<
o
fD
era
fD
g
S
era
o
o
ora
" O
^
11
CD
3
20
t n
O
C
m
fD
11
3 "
a
20
J 3
11
s
ora
CD
20
OJ
a
11
20
OJ
.o
l l '
20
OJ
. Q_
II
20
o
. Q
II
20
era
^
LD
ISJ
O
O
OJ
NJ
^
LD
b
4^
NJ
CTl
'ci
s
NJ
O
l -
o
o
LU
NJ
ISJ
NJ
O
M
O
O
CJJ
ISJ
U3
CU
Q .
fD
<
3
OJ
3
3 ^
3 '
era
f)
3 "
C
l /l
fD
c
ora
fD
3
cr
fO
>
cr
D
c
<
o
fD
\
g
era
fD
I
fD
CD
X
CD
0 0
ISJ
O
o
LU
NJ
VJ
M
CO
b
LU
Ln
cn
C)
S
OJ
Q L
CD
<
3
OJ
3
3
3 '
era
f
3 "
fD
OJ
m
3 "
" O
. D
II
g
era
fD
+
fD
X
fD
20
^
II
fD
3
20
fD
II
OJ
o
<'
fD
20
tn
OJ
II
NJ
O
20
i n
OJ
II
NJ
O
O
LU
NJ
^
LD
b
LU
71
NJ
O
M
O
O
(JJ
NJ
NJ
NJ
O
l->
O
o
LU
ISJ
CO
QJ
^
CD
<
3
QJ
3
3^
Z3
era
f)
3J
^
cn
NJ
o
NJ
o
M
8
LU
ISJ
NJ
NJ
O
l->
O
O
CJJ
NJ
CO
g
I
era
o
o
qra_
CD
h
o
3
CD
OJ
" O
S3
II
g
era
fD
+
m
X
fD
20
^
II
fD
3
20
CO
eu
f?
II
OJ
n
<
fD
20
Ln
as
71
II
i-
o
20
i n
CU
II
eu
^
fD
-c
3
OJ
3
3
3 '
ora
^
c
era
CD
3
CT
fD
2
cr
T3
c
<
7 3
CD
g"
ora
fD
o
LU
NJ
^
eo
b
LU
cn
% ?
? ^
% ^
i 1
M ^
1 f)
cr ZT
I ?
II
0 0
NJ fD
h
o
? 3
O
g
m
c
5
0 0
NJ
O
l -
o
o
LU
NJ
NJ
NJ
O
M
8
LU
NJ
eo
20
fD
Ti
-73 C
< 2L
t
L n QJ
LO II
20
i n
O
c
o
fD
II
g
fD
cr
20
n
eo
t n
20
n
ca.
II
Ln
O
g
20
c
l / l
ora
II
>
T\ 20
I I
m o
,3 S
20
c
r- i L
11
- > NJ
-n
^
NJ
ISJ
O
I - '
O
o
CJJ
NJ
>l
l->
1 ^
b
LU
o
s
o
o
CJJ
^ %
f
I
g
era
o
o
92.
as
h
o
3^
i n
CD
CU
II
CD
3
20
t n
O
c
n
fD
II
3 "
T3
20
X I
II
g
era
fD
+
CD
X
CD
20
OJ
3
II
25
OJ
.o
l l '
20
IU
.o_
II
20
o
. Q
II
20
era
^
o
CJJ
NJ
^
o
LU
:
71
% ^ ^
as
^
CD
<
fD
O.
M
1 f
cr 3-
l
" O > ~
fit
s f
l l
02.
NJ fD 20
f D.
l l '
73
^
c
n
O
3
" U
l /l
OJ
CO II
20
</>
o
c
n
CD
II
g
73 CD
1
CD
i n
20
n
Q .
II
i l
m o
,3 S
If
Bk
o -g
s?
(7) CJJ
>
S?
NJ
-n
ISJ
ISJ
O
O
LU
^
^
O
LU
Lu
P
Ln
.>
"B
2
as
Q.
NJ
O
O
CJJ
o
o
LU
y^
CTl
Ln
o
^
+
OJ
3
a
OJ
a.
fD
<
3
HI
3
3 .
3 '
era
%
p
g^
I
3
eu
<
fD
h
O
3
\
g
era
ID
<
t n
c
3
Ut
CD
b.
Ln
era
o
cn
Ln
Ln
V I
c
3
er
(D
o
cu
cr <
OJ
a.
fD
<
c
yo
CD
a.
as
3
3 .
3 '
era
f
3 "
g
g
g
era
o
o
02.
fD
(-)
o
3^
Ln
fD
CU
n
zr
" O
3 ;
II
CD
3
20
i n
O
c
n
fD
II
3-
a
20
. Q
II
g
era
CD
+
cu
3
T3
fD
in
QJ
3
Q .
20
OJ
. Q
II
O
20
OJ
. Q
11'
era
i -
20
OJ
.a_
II
20
o
. 0
11
g
ora
fD
Prosecution Exhibit 15^
Ipage
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial
Source IP Date Number of Log Entries
22.225.41.22 07-Mar-lO 145
22.225.41.22 08-Mar-10 30
22.225.41.22 09-Mar-lO 1006
22.225.41.22 10-Mar-lO 188
22.225.41.22 11-Mar-lO 207
22.225.41.22 12-Mar-10 32
22.225.41.22 17-Mar-lO 56
Source IP Date Number of Log Entries
22.225.41.22 18-Mar-lO 6
22.225.41.40 13-NOV-09 1
22.225.41.22 20-Mar-lO 42
22.225.41.40 14-NOV-09 6
22.225.41.22 21-Mar-lO 56
22.225.41.40 15-NOV-09 6
: 22.225.41.22 22-Mar-10 66
22.225.41,40 29-NOV-09 6
22.225.41.22 26-Mar-lO _ _ 36
22.225.41.40 12-Dec-09 6
22.225.41.22 27-Mar-lO 219
22.225.41.40 3-Jan-lO 2
22.225.41.22 28-Mar-lO 52135
22.225.41.40 9-Jan-lO 27
22.225.41.22 29-Mar-10 71494
22.225.41,40 12-Jan-lO 26
22.225.41.22 30-Mar-lO 149406
22,225,41,40 13-Jan-lO 18
22.225.41.22 31-Mar-lO 77573
22,225,41.40 14-Feb-lO 76
22.225.41.22 01-Apr-lO 57274
22.225,41.40 15-Feb-lO 20
22.225.41.22 02-Apr-lO 26156
22.225.41.40 19-Feb-lO 98
22.225.41.22 03-Apr-lO 35855
22.225.41.40 20-Feb-lO 96
22.225.41.22 05-Apr-lO 78738
22,225,41,40 21-Feb-lO 14
22.225.41.22 06-Apr-lO 21815
22.225.41.40 23-Feb-lO 30
22.225.41.22 07-Apr-lO 26
22.225.41.40 24-Feb-lO 22
22.225.41.22 08-Apr-lO 73091
22.225.41.40 12-Mar-lO 4
22.225.41.22 09-Apr-lO 95057
22,225.41,40 13-Mar-lO 8
22.225.41.22 03-May-lO 53440
idecrdfi^imn
PROSECUTION EXHIBIT l3_for ide^ifibtition
PAGE OFFERED:_ ^/ Gi: ADMITTED:.
PAGE OF PAGES
ora
<
i n
3 "
O
3
fD
3
ora
OJ
LO
3
<
in
3
00
ora
<
i n
era
o
o
qra_
CD
cro_
o
cr
fD
3
era
OJ
en
g
CD
cr
fD
3
OJ
p
b
.3
3
^
'tn
ora
o
<
era
o
<
3'
o
era
ID
o
3
era
OJ
in
3
n
o
z
m
">
- n
era
<
tn
era
o
o
cra_
CD
CfQ_
o
cr
CD
3
era
cu
3
^
in
era
o
<
era
o
<
CD
as
TJ
OJ
a
3
CD
3
C
3
o-
m
O
s
3
CD
^
z
u
3
n
cn
as
Z
c
3
o-
(C
o
o
3
(D
eo
CD
O
00
Ln
eo
O
cn
NJ
NJ
O
cn
I D
o
l O
o
o
Ln
Ln
NJ
O
t-
en
Vj
v l
O
NJ
NJ
00
00
NJ
NJ
v l
O
LU
Ln
cn
o
o
NJ
CJJ
VI
NJ
Ln
en
v l
Ol
00
NJ
NJ
Ln
cn
00
NJ
v l
cn
OJ
00
00
o
o
OJ
v l
I D
Ln
o
cn
v l
LO
l O
eo
NJ
I-i
en
00
o
I-*
en
en
00
^
e/i
eo
b
LO
NJ
o
en
eo
on
NJ
vJ
o
ISJ
00
00 o
*
Lu
cn
NJ
Ln
cn
v l
cn
NJ
V j
cn
Lu
00
00
cn
VI
bo
NJ
LD
CO
ISJ
cn
00
2
CO
PROSEC^JTiON E^ir r:
PAGEOFFERED:
PAGE OF PAGi
l(o for
Number Dates Present Dates Missing
1 19-NOV-09 20-NOV-09
2 l-Dec-09 21-NOV-09
3 3-Dec-09 22-NOV-09
4 4-Dec-09 23-NOV-09
5 5-Dec-09 24-NOV-09
6 19-Dec-09 25-NOV-09
7 1-Jan-lO 26-NOV-09
8 2-Jan-lO 27-NOV-09
9 3-Jan-lO 28-NOV-09
10 4-Jan-lO 29-NOV-09
11 5-Jan-lO 30-NOV-09
12 6-Jan-lO 2-Dec-09
13 7-Jan-lO 6-Dec-09
14 8-Jan-lO 7-Dec-09
15 9-Jan-lO 8-Dec-09
16 11-Jan-lO 9-Dec-09
17 12-Jan-lO 10-Dec-09
18 13-Jan-lO ll-Dec-09
19 14-Jan-lO 12-Dec-09
20 16-Jan-lO 13-Dec-09
21 17-Jan-lO 14-Dec-09
22 18-Jan-lO 15-Dec-09
23 19-Jan-lO 16-Dec-09
24 20-Jan-10 17-Dec-09
25 21-Jan-lO 18-Dec-09
26 22-Jan-lO 20-Dec-09
27 23-Jan-lO 21-Dec-09
28 24-Jan-lO 22-Dec-09
29 25-Jan-lO 23-Dec-09
30 26-Jan-lO 24-Dec-09
31 27-Jan-lO 25-Dec-09
32 28-Jan-lO 26-Dec-09
33 29-Jan-lO 27-Dec-09
34 30-Jan-10 28-Dec-09
35 31-Jan-lO 29-Dec-09
36 1-Feb-lO 30-Dec-09
37 2-Feb-lO 31-Dec-09
38 3-Feb-lO 10-Jan-lO
39 4-Feb-lO 15-Jan-lO
40 5-Feb-lO 2-Apr-lO
41 6-Feb-lO 3-Apr-lO
42 7-Feb-lO 4-Apr-lO
43 8-Feb-lO 5-Apr-lO
44 9-Feb-lO 6-Apr-lO
45 lO-Feb-lO 8-Apr-lO
46 11-Feb-lO 9-Apr-lO
PROSECUTION EXinn;T
PAGEOFFERED:
PAGE OF PAGES
, / ^ ^
/4(_for idemsfication
KT/ JDMITTED:
Number Dates Present Dates Missing
47 12-Feb-lO lO-Apr-10
48 13-Feb-lO 11-Apr-lO
49 14-Feb-lO 12-Apr-lO
50 15-Feb-lO 13-Apr-lO
51 16-Feb-lO 14-Apr-lO
52 17-Feb-lO 16-Apr-lO
53 18-Feb-lO 17-Apr-lO
54 19-Feb-lO 18-Apr-lO
55 20-Feb-10 19-Apr-lO
56 21-Feb-lO 20-Apr-lO
57 22-Feb-lO 21-Apr-lO
58 23-Feb-lO 23-Apr-lO
59 24-Feb-lO 24-Apr-lO
60 25-Feb-lO 25-Apr-lO
61 26-Feb-lO 26-Apr-lO
62 27-Feb-lO 27-Apr-lO
63 28-Feb-lO 28-Apr-lO
64 1-Mar-lO 29-Apr-lO
65 2-Mar-lO 1-May-lO
66 3-Mar-lO 3-May-lO
67 4-Mar-lO 5-May-lO
68 5-Mar-lO 18-May-lO
69 6-Mar-lO 20-May-10
70 7-Mar-lO 22-May-lO
71 8-Mar-lO 24-May-lO
72 9-Mar-lO 26-May-lO
73 lO-Mar-lO 28-May-lO
74 11-Mar-lO
75 12-Mar-lO
76 13-Mar-lO
77 14-Mar-lO
78 15-Mar-lO
79 16-Mar-lO
80 17-Mar-lO
81 18-Mar-lO
82 19-Mar-lO
83 20-Mar-10
84 21-Mar-lO
85 22-Mar-lO
86 23-Mar-lO
87 24-Mar-lO
88 25-Mar-lO
89 26-Mar-lO
90 27-Mar-lO
91 28-Mar-lO
92 29-Mar-lO
Number Dates Present Dates Missing
93 30MarlO
94 31MarlO
95 l Apr l O
96 7AprlO
97 ISAprlO
98 22AprlO
99 30AprlO
100 2MaylO
101 4MaylO
102 6MaylO
103 7MaylO
104 8MaylO
105 9MaylO
106 lOMaylO
107 l l Ma y l O
108 12MaylO
109 13MaylO
110 14MaylO
111 ISMaylO
112 16MaylO
113 17MaylO
114 19MaylO
115 21MaylO
116 23MaylO
117 25MaylO
118 27MaylO
119 29MaylO
Prosecution Exhibitl^2b
^pages
classified
"SECRET"
ordered sealed fDrReason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplementto the original
Record ofTrial
Prosecution Exhibitl^3b
^pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplementto the original
Record ofTrial
Prosecution Exhibitl^^
Ipage
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplementto the original
Record ofTrial
#
Name
File
Created
Q osc_youtube-cnn. wmv Zone. Identifier
12 JUL 07 CZ ENGAGEMENT ZONE 30 GC Anyone. avi 06 Apr 10 18:24:16
Q osc_youtube-cm. wmv 12 Apr 10 16:06:06
PRC'
!'/ C
PAGE
!\^(f%a!0^
r^^i<AliTED:
GF i Aui
Prosecution Exhibitl^^
3pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl^^
^pages
classified
"CO^EIT^E^TJ^E"
ordered sealed forReason3
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibit 168
have been entered into
the record as a CD/DVD
and will be maintained
with the original
Record of Trial
Prosecution Exhibitl6^b
26 pages
classified
"CO^EJE^E^TJ^E"
ordered sealed fDrReason3
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl6^c
126 pages
classified
"CO^EIE^E^TI^E"
ordered sealed for Reason3
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplementto the original
Record ofTrial
Prosecution Exhibitl^Ob
lOpages
classified
"COl^EJE^E^TJ^E"
ordered sealed for Reason3
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplementto theoriginal
Record ofTrial
ProsecutionExhibitl^Oc
LOpages
classified
"CO^EJE^E^TJ^E"
ordered sealed for Reason3
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplementto the original
Record ofTrial
Prosecution Exhibitl^lb
8pages
classified
"SECRET"
ordered sealed fDrReason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl^lc
26 pages
classified
"SECRET"
ordered sealed fDrReason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl^2b
5pages
classified
"CO^EJE^E^TJ^E"
ordered sealedfDrReason3
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplementto the original
Record ofTrial
Prosecution Exhibitl^2c
13 pages
classified
"CO^EJE^E^TJ^E"
ordered sealed for Reason3
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplementto the original
Record ofTrial
Prosecution Exhibitl^3b
31pages
classified
"SECRET"
ordered sealedfDrReason3
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl^3c
l^^pages
classified
"SECRET"
ordered sealed forReason3
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl^^b
3pages
classified
"SECRET"
ordered sealed fDrReason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl^^c
36 pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
UNITED STATES OF AMERICA
v.
)
)
)
)
Manning, Bradley E. )
PFC, U.S. Army, )
HHC, U.S. Army Garrison, )
STIPULATION OF
EXPECTED TESTIMONY
llnehtlrqed t!t1blt5
AMB Stephen Seche
Joint Base Myer-Henderson Hall )
Fort .Myer, Virginia 22211 ) DATED: 4 June 2013
(U) It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if
Ambassador (AMB) Stephen Seche were present to testify during the merits and pre-sentencing
phases of this comi-mmiial, he would testify substantially as follows:
!. (SBU) Although not within PEIJsKfor ID or AE 501, I also reviewed the following cables.
2. (SBU) The next cable is 09 State 15113.
1
PROSECUTION EXHTPlT _l]l\Q_for identification
PAGE OFFERED: __ Fi\Cil\ ADMITTED: __
PAGE __ m __ I'AGm;
6. (SBU) The next cable is 09 Doha 214.
2
//ORIGINAL SIGNED//
ANGEL M. OVERGAARD
CPT,JA
Assistant Trial Counsel
//ORIGINAL SIGNED// //ORIGINAL SIGNED//
THOMAS F. HURLEY BRADLEY E. lviANNING
MAJ, JA PFC, USA
Militmy Defense Counsel Accused
3
Prosecution Exhibitl^5b
13 pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl^5c
^6 pages
classified
"SECRET"
ordered sealed f^rReason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl^6b
2^pages
classified
"SECRET"
ordered sealed fDrReason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl^6c
pages
classified
"SECRET"
ordered sealed fDrReason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
UNITED STATES OF AMERICA
v.
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
AMB Marie Y ovanovitch
J7 June2013
(U) It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if
Ambassador (AMB) Marie Yovanovitch were present to testify during the merits and pre-
sentencing phases of this court-martial, she would testify substantially as follows.
I. (U) The United States Department of State (DoS) is led by the Secretary of State. There are
six Under Secretary Offices that work for the Secretary of State. One of those Under Secretaries
is for Political Affairs. The Under Secretary of Political Affairs serves as the day-to-day
manager of overall regional and bilateral policy issues. The Under Secretary of Political Affairs
oversees seven bureaus which are headed by Assistant Secretaries. Those bureaus are African
Affairs, European and Eurasian Affairs, East Asian and Pacific Affairs, Near Eastern Affairs,
South and Central Asian Affairs, Western Hemisphere Affairs, and International Organizations.
The Assistant Secretaries of the geographic bureaus and offices advise the Under Secretary and
guide the operation of the U.S. diplomatic missions within their regional jurisdiction. They also
determine and implement policy. Each bureau has a Principal Deputy Assistant Secretary
(PDAS) and several Deputy Assistant Secretaries (DAS). The PDAS is the lead DAS, all of
whom assist theA/Sin the development and management of U.S. policy concerning the Bureau.
The DAS's review all paperwork, background information, disciplinary issues, and policy
directives.
2. (U) I am the Acting Assistant Secretary (AA/S) and the PDAS of the Bureau of European and
Eurasian Affairs. I have been the AA/S for European and Eurasian Affairs since March 2013. I
have been the PDAS for European and Eurasian Affairs since September 2012. Before that, I
served as the Bureau's DAS responsible for issues related to the Nordic, Baltic, and Central
European countries from June 2011 to September 2012. From 2008 to 2011, I was the
Ambassador to the Republic of Armenia. An Ambassador is the President's representative that
manages employees and relations with that country. From 2005 to 2008, I was the U.S.
Ambassador to Kyrgyzstan. Before that, I was the Executive Assistant for U.S. Political Affairs
from 2004 to 2005. From 2001 to 2004, I was the Deputy ChiefofMission (DCM) of the U.S.
Embassy in Kyiv, Ukraine. In 2000, I attended the Navy War College (NWC). From 1998 to
2000, I was Deputy Director of the Russia desk. From 1996 to 1998, I worked in Ottawa at the
U.S. Embassy. From 1993 to 1996, I worked at U.S. Embassy Moscow. From 1992 to I993, I
studied Russian at the Foreign Service Institute (FSI). From 1991 to 1992, I worked at the
Office of European Security Affairs. From 1990 to 199I, I worked in the Operations Center,
which is the nerve center ofDoS. From 1988 to 1990, I worked at the U.S. Embassy in London.
From 1986 to 1988, I worked at U.S. Embassy Mogadishu. I have been with DoS since 1986. I
have a Master's of Science from the NWC. 1 am also a graduate of Princeton University where I
earned a Bachelor's of Arts in History and Russian studies. I have briefed Congress on
PROSECUTION EX!!lrliT ll"'for identification
PAGE OFFERr\D:
PAGE __ OF _____ i;\(3ES
(b) (1) (B)
(b) (1) (B)
European and Eurasian Affairs because of my expe1tise on European and Eurasian Affairs. I also
speak Russian.
3. (U) The Bureau of European and Eurasian Affairs develops and implements U.S. foreign
policy in Europe and Eurasia. The Bureau promotes U.S. interests in the region on issues such as
international security, NATO, coordination with the European Union and other regional
organizations, support for democracy, human rights, civil society, economic prosperity,
counterterrorism, and nonproliferation. The countries are our oldest allies and they are platforms
for handling issues all over the world.
4. (U) The embassies communicate what is occurring in the host nations through many different
means. Issuing a cable is an official communication by the Embassy or organization. Typically,
the Ambassador or Deputy Chief of Mission (DCM) sign off as the originator on the cables
because they are in charge of the embassy or organization. Generally, cables are issued to
summarize meetings and note significant events in the host country, and often contain the
analysis and comment of the author. The cables are issued with distribution captions that, to
varying degrees, limit who can see them. One of those captions was SJPDIS. The SIPDIS
caption indicated that a cable was approved for SIPRNET distribution for access by
appropriately cleared individuals U.S. Originators can limit distribution through other captions
such as STADIS, which would limit distribution to DoS personnel only, or limit distribution to
the addressee of the document with a NO DIS caption.
5. (SBU) The first cable is 10 Reykjavik 13.
2
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
9. (SBU) The next cable is 06 Belgrade 1681.
3
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1)
(B)
13. (SBU) The next cable is 06 Madrid 2955.
(b) (1)
(B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
17. (SBU) The next cable is 06 Madl'id 2956.
5
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
21. (SBU) The next cable is 06 Pristina 947.
6
(b) (1)
(B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
25. (SBU) The next cable is 06 Pristina 948.
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
29. (SBU) The next cable is 07 Ankara 23.
8
(b) (1)
(B)
(b) (1)
(B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
33. (SBU) The next cable is 07 Ankara 2468.
9
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
37. (SBU) The next cable is 07 Bratislava 665.
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1)
(B)
(b) (1) (B)
41. (SBU) The next cable is 07 Minsk 1024.
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b)
(1)
(B)
(b) (1) (B)
45. (SBU) The next cable is 07 Moscow 5824.
12
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
49. (SBU) The next cable is 07 Moscow 5825.
(b) (1)
(B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b)
(1)
(B)
53. (SBU) The next cable is 07 Paris 4722.
14
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1)
(B)
57. (SBU) The next cable is 07 Paris 4723.
61. (SBU) The next cable is 07 Reykjavik 203.
15
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
65. (SBU) The next cable is 07 Vilnius 13.
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
69. (SBU) The next cable is 09 Paris 217.
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
73. (SBU) The next cable is 09 Prague 88.
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1)
(B)
(b) (1) (B)
77. (SBU) The next cable is 09 Pristina 58.
19
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1)
(B)
(b) (1) (B)
81. (SBU) The next cable is 09 State 92632.
20
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
85. (SBU) The next cable is 09 State 92657.
21
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
89. (SBU) The next cable is 10 Brussels 382
22
(b) (1) (B)
(b) (2)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1)
(B)
93. (SBU) The next cable is 10 Geneva 347.
23
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
//ORIGINAL SIGNED//
ANGEL M. OVERGAARD
CPT, JA
Assistant Trial Counsel
//ORIGINAL SIGNED//
THOMAS F. HURLEY
MAJ, JA
Military Defense Counsel
24
//ORIGINAL SIGNED//
BRADLEY E. MANNING
PFC,USA
Accused
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
(b) (1) (B)
Prosecution Exhibitl^^b
13 pages
classified
"SECRET"
ordered sealed fDrReason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl^^c
^8 pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
UNITEDSTATESOF AMEIHCA
Manning, Bradley E.
PFCUSArmy,
HHC,USArmyGarrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
Mr.NieholasM. Murphy
^June2013
^
It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifSenior
Advisor fbr the Office ofinformation Programs and Services Mr.NieholasM. Murphy were
present to testify during the merits and pre-sentencing phases ofthis court-martial, he would
testify substantially as follows.
1. lam currentlyaSenior Advisor with the Office ofinformation Programs and Services
(IPS), Bureau of Administration, Department ofState (DoS).In this capacity,Iadviseor^
infornnation access with focused on the classification and declassification of i nf o
Since 1996,Ihavo served as the DoS Liaison to the Interagency Security Classification
Appeals Panel (ISCAP) and, since 2005,lhave served as the altemate Department ofState
Representative to the ISCAP. The ISCAP is the panel established by Executive Order 12958 to,
among other fimctions, adjudicate the denial ofaccess to classified information requested under
the mandatory review provisions ofthe E.O. Prior to this,IservedasaForei^n Service
Officer with service inTurkey,Lebanon, Saudi Arabia, France, and Senegal, as wallas
multiple postings inWashin^ton,D.C lhave been an employee oflPS or its predecessor
organizations fbr twenty-four years, and have over forty-five years of experience in management
of access to national security information, security,and intelligence, including serving as the
State Department representative on the drafting committees forthe Executive Orders (E.O.)on
classified national security information (E.O.12958 and E.O.13526), and their implementing
directives. lhave been involved in the implementation ofthe Freedom ofinformation Act
policies in the Department and have been working with classification and declassification issues
since 1990.
2. lam also an Original Classification Authority(OCA) and have been an OCA fbr
approximately twenty-three years. My responsibilities in that position include the review of
Department State information fbr classification purposes pursuant to E.O.13526. Per E.O.
13526, Section1.3, the authority to classify information originally may be exercised only by an
OCA, and must be delegated by the President, theVice President, or an agency head or
designated official.
3. Information which requires protection in the interest ofthe national security ofthe United
States is designated classified national security information per E.O.13526, Classified National
Security Information, signed by President Obama on 29 December 2009,and fbr infi^rmafion
classified prior to June 27,2010, according to E.O.12958 signed by President Clinton onApril
17,1995,as amended by President GeorgeW.Bush on March 25,2003. Information is
classified in levels commensurate with the assessment that unauthorised disclosure could cause
the following expected damage to national security: fbr exceptionally grave damage to national ^
PROSECUTIONEXHIBIT^7^foridon^catiott
PAGEOFFERED: PAGEADMITTED:
^ ^AGE OF PAGl ^
security^Top Secret: fbr serious damage to national security Secret; and fi^r damage to
nationalsecurity Confidential.
4. Within the Department ofState, classified information is handled and protected in accordance
with:
a. E.O.I3526(and predecessor orders)on Classified National Security information;
b. Information Security Oversight Office (ISOO)Implementing Directive, Classified
National Security Infi^rmation, 32 CFRParts 2001 and2003;and
c. The 12th volumeofthe Foreign Affairs Manual (FAM), section 500, titled Information
Security.
5. In total, five categories ofclassified information, as identified in E.O. 13526 and its
predecessor E.O.^s,were included in the documentslreviewed. Because the mission ofthe
Department ofState encompasses the conduct offbreign relations ofthe United States, the
Department relies primarily upon two classification categories when protecting national security
infbrmation,which are identified in Section1.4ofE.O. 13526 as1.4(b)(fbreign govemment
information) and 1.4(d)(fbreign relations or foreign activities ofthe United States, including
confidential sources). AdditionaI1y,asmall number of specific documents described below also
require protection under classification categories1.4(a)(mi1itary plans, weapons systems or
operations), 1.4(e)(scientific, technological or economic mafters)and 1.4(g), (vulnerabilities and
capabilities ofsystems and installations). These classification categories apply to the documents
in cases where the subject of the diplomatic discourse or communication also includeda
discussion ofinformation related to these categories. The reason fbr classification of each cable
is identified below.
6. Classified information should be handled and examined only under such conditions as are
adequate to prevent unauthorized persons fiom gaining access. Classified material may not be
removed fi^om designated work areas or moved fiom information systems, e.g., classified
databases, computer networks, servers, or computers, except in the performance of official duties
and tmder special conditions which provide protection forthe classified material.
7. Ireviewed the117charged Department ofState cables, or telegrams, related to this case.
Specifically,lreviewed all of the cables contained in Appellate Exhihit 501 and with the
BATES numbers: 00376954 00376959,00376964 00377030,00377033 00377044,
00377049 00377098,00377104 00377136,00377141 00377185,00377188 00377365,
00377370 00377391,00377395 00377424, 00377499 00377572, 00377638 00377653,and
00377660 0037767L
ProseeutionExhihit(PE)^^^^^^^7^^^7/^^^7^^,^7^^ /7^c^^^^^^^^7^^
for Identification contains all ofthese documents. In consultation with the subject mafter
experts in each ofthe relevant geographic and functional bureaus, as an OCA,ldetermine the
following for each charged cable:
a. The10REYKJAVIK13 telegram is an official telegram from Embassy Reykjavik, dated
January 13,2010to the Department ofState.This telegram is three pages. The telegram was
properly classified CONFIDENTIAL underEO 13526 underSections14(b)and(d) atthe
time it was generated and remained classified in the first half of2010.
b. The 99ISLAMABAD495 telegram is an official telegram from Embassy Islamabad, dated
January 25,1999 to the Department ofState. This telegram is six pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and portions
of the telegram remained classified CONFIDENTIAL under E.O.13526 under Section 1.4(d) in
thefirstha1fof2010.
c. The 05ALGIERS1836 telegram is an official telegram ftom Embassy Algiers, dated
August 29,2005 to the Department ofState. This telegram is six pages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions
c^fth^telegramremainedclassifiedCONFIDENTIALunderE.O. 13526 under Sections 1.4(b)
and(d) inthe firstha1fof2010
d. The 06ALGIERS1961 telegram is an official telegram ftom Embassy Algiers, dated
November 12, 2006 to the Department ofState. This telegram is six pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Section
14(d) in the firstha1fof2010.
e. The 06 BAGHDAD2646 telegram is an official telegram ftom Embassy Baghdad, dated
July 24, 2006 to the Department ofState. This telegram is three pages. The telegram was
properly classified SECRETunder E.O.12958 at the time it was generated. The telegram
remained classifted SECRET underEO 13526 under Section14(d) in the firsthalfof2010
f The 06BAGITDAD4205 telegram is an official telegram ftom Embassy Baghdad,
dated NovemberlO, 2006 to the Department ofState. This telegram is four pages. The
telegram was properly classified CONFIDENITIAL under E.O.12958 at the time it was
generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under
Section14(d)inthefirsthalfof20I0.
g. The 06BEIR^UT3603 telegram is an official telegram ftom Embassy Beirut, dated c^^^^^^^^
^ovemberll, 2006 to the Department ofState.^His telegram is six pages. The telegram was ^ ^
properly classified SECRETunder E.O.12958 at the time it was generated. The telegram
remained classified SECRETunder E.O.13526 under Sections 1.4(b)and(d) in the first
hal fof2010
h. The 06BEIRUT3604 telegram is an official telegram ftom Embassy Beirut, dated
November 12, 2006 to the Department ofState. This telegram is four pages. The telegram was
properly classified SECRETunder E.O. 12958 at the time it was generated. The telegram
remainedSECRETunderEO 13526underSection14(d)inthefirsthalfof2010.
i . The 06BEIRUT3703 telegram is an official telegram ftom Embassy Beimt, dated
November 27,2006 to the Department ofState. This telegram is fburpages. Portions ofthe
^
telegram were properly classified SECRETunder E.O.12958 at the time it was generated and
portions ofthe telegram remained classified SECRETunder E.O.13526 under Section1.4(d) in
thefirsthalfof2010
j . The 06BELGRADE1681 telegram is an official telegram ftom Embassy Belgrade, dated
Octoberl7,2006 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
inthe firstha1fof2010
k. The 06COLOMB01889 telegram is an official telegram ftom Embassy Colombo, dated
NovemberlO, 2006 to the Department ofState. Thistelegram is fburpages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and portions
ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)
and(d) inthe firstha1fof2010
1. The 06KABUL5420 telegram is an official telegram ftom Embassy Kabul, dated
NovemberlO, 2006 to the Department ofState, This telegram is three pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d) inthe firstha1fof2010
m. The 06KABUL5421 telegram is an official telegram fiom Embassy Kabul, dated
November 10, 2006 to the Department ofState, This telegram is seven pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d)inthefirstha1fof2010
n. The 06KABUL5435 telegram is an official telegram ftom Embassy Kabul, dated
November 12, 2006 to the Department ofState. This telegram is six pages. The telegram was
properly classifted CONFIDENTIAL under E.O.12958 at the time it was generated and portions
ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)
and(d) inthe firstha1fof2010.
o. The 06KATHMANDU3023 telegram is an official telegram ftom Embassy Kathmandu,
dated November 10, 2006 to the Department ofState. This telegram is five pages. The telegram
was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated
and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under
Sections14(b)and(d)inthefirstha1fof2010.
p. The 06KATHMANDU3024 telegram is an official telegram ftom Embassy Kathmandu,
dated NovemberlO, 2006 to the Department ofState. This telegram is seven pages. The
telegram was properly classified CONFIDENTIAL tmder E.O.12958 at the time it was
generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526
under Sections 1.4(b)and(d) in the first half of2010.
q. The 06KUWAIT4430 telegram is an official telegram ftom Embassy Kuwait, dated
NovemberlO, 2006 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d)inthefirstha1fof2010.
r. The 06KUWAIT4438 telegram is an official telegram ftom Embassy Kuwait, dated
November 12, 2006 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section
I4(d)inthefirstha1fof2010
s. The 06MADRJD2955 telegram is an official telegram ftom Embassy Madrid, dated
November 27,2006 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections1.4(b)and
(d) inthe firstha1fof2010
L The 06MADRID2956 telegram is an official telegram ftom Embassy Madrid, dated
November 27,2006 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
inthefirsthalfof2010
u. The 06PRISTfi^A947 telegram is an official telegram ftom US Office Pristina, dated
Novemberll,2006 to the Department ofState. This telegram is six pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
I4(b)and(d)inthefirsthalfof2010.
V. The 06PRISTfNA948 telegram is an official telegram ftom US Office Pristina, dated
Novemberll,2006 to the Department ofState. This telegram is ftve pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and portions
ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)
and(d) inthe firsthalfof2010
w. The 06RlYADHI8811teIegram is an official telegram ftom Embassy Riyadh, dated
NIovemberll,2006 to the Department ofState. This telegram is six pages. The telegram was
properly classified SECRETunder E.O. 12958 at the time it was generated.The telegram
remained classifted SECRETunder E.O. 13526 under Sections1.4(a),(b)and(d) in the first
ha1fof2010
x. The 06SEOUL38S2tele^am is an official telegram ftom Embassy Seoul, dated
I^ovember 10, 2006 tothe Department ofState. This telegram is three pages. The telegram
was properly classified SECRETunder E.O.12958 at the time it was generated and portions
of the telegram remained classified SECRETunder E.O. 13526 under Sections1.4(b)and(d)
inthe firsthalfof2010
y. The 06SEOUL3885 telegram is an official telegram ftom Embassy Seoul, dated November
12, 2006 to the Department ofState. This telegram is five pages. The telegram was properly
classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions ofthe
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections (b)and(d) in
thefirstha1fof2010
^. The 06SUVA489 telegram is an official telegram ftom Embassy Suva, dated November
12, 2006 to the Department ofState. This telegram is six pages. The telegram was properly
classified CONFIDENTIAL in part under E.O. 12958 atthe time it was generated and portions
e^ftfi^ telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)
and(d)inthefirstha1fof20I0
aa. The 06TAIPEI3830 telegram isatelegram ftom the American Institute Taiwan(AIT),
Taipei, dated November 12, 2006 to the Department ofState. This telegram is two pages. The
telegram was properly classified SECRET under E.O. 12958 at the time it was generated and
portions of the telegram remained classified SECRETunder E.O. 13526 under Sections 1.4(b)
and(d)inthefirstha1fof2010
bb. The 06TRIPOLI645 telegram is an official telegram ftom EmbassyTripoli, dated
November 10, 2006 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d)inthefirsthalfof2010.
cc. The 06TRIPOLI648 telegram is an official telegram fiom EmbassyTripoli, dated
NovemberlO, 2006 to the Department ofState. This telegram is fburpages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section
14(d)inthefirstha1fof2010.
dd. The 07ADDISABABA2197 telegram is an official telegram ftom Embassy Addis Ababa,
datedJuIy 13,2007 to the Department ofState. This telegram is seven pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions remained classified CONFIDENTIAL under E.O. 13526 under Section 1.4(d) in the
firstha1fof2010
ee. The 07ANKARA23 telegram is an official telegram ftom Embassy Ankara, dated January
8,2007 to the Department ofState. This telegram is three pages. The telegram was classified
CONFIDENTIAL under E.O. 12958 at the time it was generated andaportion ofthe telegram
remained CONFIDENTIAL under E.0 13526underSection14(d) in the firsthalfof2010in
thefirsthalfof2010
ff. The 07ANKARA2468 telegram is an official telegram ftom Embassy Ankara, dated
October 4,2007 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d)inthefirstha1fof2010
gg. The 07ASHGABAT1359 telegram is an official telegram ftom Embassy Ashgabat, dated
December 14,2007 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and ortions
of the fele^am remained classified CONFIDENTIAL under E.O. 13526 under Sections1.4(b)
and(d) inthe firstha1fof2010
hh. The 07BAGHDAD35 telegram is an official telegram fiom Embassy Baghdad, dated
January 5,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classified SECRETunder E.O.12958 at the time it was generated. The telegram
remained classified SECRET under E.O. 13526 under Section 1.4(d) in the firsthalfof20I0.
i i . The 07BAGHDAD36 telegram is an official telegram ftom Embassy Baghdad, dated
January 5,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classifted SECRETunder E.O. 12958 at the time it was generated. The telegram
remained classified SECRETunder E.O. 13526 under Sections 1.4(b)and(d) in the first half of
2010
j j . The 07BAGHDAD37 telegram is an official telegram ftom Embassy Baghdad, dated
January 5,2007 to the Department ofState. This telegram is seven pages. The telegram was
properly classified SECRETunder E.O. 12958 at the time it was generated. The telegram
remained classified SECRETunder E.O.13526 under Sections 1.4(b)and(d) in the first half of
2010
kk. The 07BAGHDAD42 telegram is an official telegram ftom Embassy Baghdad, dated
January7,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classifted SECRETunder E.O. 12958 at the time it was generated. The telegram
remained classified SECRETunder E.O.13526 under Sections 1.4(b)and(d) in the first half of
2010
11. The 07BAGHDAD53 telegraph is an official telegram ftom Embassy Baghdad, dated
January7,2007 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
inthe firstha1fof2010.
mm. The 07BAGHDAD56 telegraph is an official telegram ftom Embassy Baghdad, dated
January7,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under SectionI.4(d) in the
firsthalfof2010.
nn. The 07BAGHDAD63 telegram is an official telegram ftom Embassy Baghdad, dated
January7,2007 to the Department ofState. This telegram is six pages. The telegram was
properly classified SECRETunder E.O.12958 at the time it was generated. The telegram
remained classified SECRETunder E.O.13526 under Sections1.4(b)and(d) in the first half of
2010
oo. The 07BAGHDAD64 telegram is an official telegram ftom Embassy Baghdad, dated
January7,2007 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and
remained classified in the first half of2010.
pp. 07BAGHDAD70 is an official telegram ftom Embassy Baghdad, dated January 8, 2007
to the Department ofState. This telegram is four pages. The telegram was properly classified
CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained
classified CONFIDENTIAL underE0 13526underSections14(b)and(d) in the firsthalf of
2010
qq. The 07BANGKOK111te1egraph is an official telegram ftom the Embassy in Bangkok,
dated January 8,2007 to the Department ofState. This telegram is three pages. The telegram
was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d)
inthe firsthalf of2010
rr. The 07BASRAH3 telegram is an official telegram ftom Embassy Office Basrah, dated
January 5,2007 to the Department ofState. This telegram is three pages. The telegram was
properly classified SECRET in part under E.O. 12958 at the time it was generated and portions
remained classified SECRETunder E.O. 13526 under Sections 1.4(b)and(d) in the first half of
2010
SS. The 07BE1J1NG152 telegram is an official telegram ftom Embassy Beijing, dated January
8, 2007 to the Department ofState. This telegram is five pages. The telegram was properly
classified CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram
remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the
firsthalf of2010.
tt.07BEIRUT1958 is an official telegram ftomEmbassy Beirut, datedDecember 14, 2007 to
the Department ofState. This telegram is six pages. The telegram was properly classified
CONFIDENTIAL under E.O.12958 at the time it was generated. The telegram remained
classified CONFIDENTIAL underEO. 13526 underSection14(d) in the firsthalf of2010.
UU. The 07BOGOTA101 telegram is an official telegram ftom Embassy Bogota, dated
January 5,2007 to the Department ofState. This telegram is seven pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section
14(d) in the firsthalf of2010
w. The 07BOGOTA5118telegram is an official telegram ftom Embassy Bogota, dated July
13,2007 tothe Department ofState. This telegram is four pages. The telegram was properly
classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions of
the telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and
(d)in the firsthalf of2010
WW. The 07BRATISLAVA665 telegram is an official telegram ftom Embassy Bratislava,
datedDecember 14,2007 to the Department ofState. This telegram is three pages. The telegram
was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL in part under E.O.13526 under
Sections14(b)and(d) in the first half of2010
XX. The 07BRIDGETOWN23 telegram is an official telegram ftom Embassy Bridgetown,
dated January5,2007 to the Department ofState. This telegram is ftve pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
1.4(b)and(d) inthe firsthalf of20I0
yy. The 07BUENOSAIRES1341telegram is an official telegram ftom Embassy Buenos
Aires, dated July 13,2007 to the Department ofState. This telegram is ft^ur pages. The telegram
was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d)
inthe firsthalf of2010
z::^. The 07CARACAS2346 telegram is an official telegram ftom Embassy Caracas, dated
December 14, 2007 to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under Section1.4(d) in the
firsthalf of2010
aaa. The 07CARACAS35 telegram is an official telegram ftom Embassy Caracas, dated
January5,2007 to the Department ofState. This telegram is six pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section
14(d) inthe firsthalf of2010
bbb. The 07DHAKA24teIegram is an official telegram ftom Embassy Dhaka, datedJanuary
7,2007 to the Department ofState. This telegram is four pages. The telegram was properly
classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions ofthe
telegram remained classified CONFIDENTIAL under E.O.13526 under Sections1.4(b)and(d)
inthe firsthalf of2010
ccc. The 07KABUL68 telegram is an official telegram ftom Embassy Kabul, dated January
7,2007. This telegram is four pages. The telegram was properly classified SECRETunder
E.O. 12958 at the time it was generated. The telegram remained classified SECRETunder E.O.
13526 underSections14(b)and(d) in the firsthalf of2010
ddd. The 07KINGSTON25 telegram is an official telegram ftom Embassy Kingston, dated
January5,2007 to the Department c^fSta^te.This telegram is four pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d) in the firsthalf of2010
eee. The 07KUALALUMPUR40 telegram is an official telegram ftom Embassy Kuala
Lumpur, dated January 8,2007 to the Department ofState. This telegram is two pages. The
telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was
generated. The telegram remained classified CONFIDENTIAL under E.O.13526 under
Sections1.4(b)and(d) in the first half of2010
fff. The 07LAGOS719te1egram is an official telegram ftom Embassy Lagos, dated
November 1,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofi t remained classified CONFIDENTIAL under E.O.13526 under Section1.4(d) in
the firsthalf of2010
ggg. The 07LAPA^1949te1egram is an official telegram ftom Embassy La Pa^, dated July
13,2007to the Department ofState. This telegram is three pages. The telegram was properly
classified CONFIDENTIAL under E.O. 12958 at the time it was generated and portions ofthe
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
inthe firsthalf of2010.
hhh. The 07LIMA2400 telegram is an official telegram ftom Embassy Lima, dated July 13,
2007 to the National Security Council and to the Department ofState. This telegram is four
pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the
time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under
E0 13526underSection14(d) in the firsthalf of2010
i i i . The 07M1NSK1024 telegraph is an official telegram ftom Embassy Minsk, dated
December 14,2007 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Section
1.4(d) inthe firsthalf of2010
j j j . The 07MOSCOW5824 telegram is an official telegram ftom Embassy Moscow, dated
December 14,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
inthe firsthalf of2010
kkk. The 07MOSCOW5825 telegram is an official telegram ftom Embassy Moscow,dated
December 14,2007 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under Section1.4(d) in the
firsthalf of210
III. The 07NEWDELHI80 telegram is an official telegram ftom Embassy New Delhi, dated
January 8,2007 to the Department ofState. This telegram is three pages. The telegram was
1^
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section
14(d) in the firsthalf of2010
nnnm. The 07PANAMA1197 telegram is an official telegram ftom Embassy Panama, dated
July 13,2007 to the Department ofState. This telegram is seven pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
1.4(b)and(d) in the firsthalf of2010.
rmn. The 07PANAMA1198 telegram is an official telegram ftom Embassy Panama, dated
July 13,2007 to the Department ofState. This telegram is two pages. The telegram was properly
classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram
remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the
firsthalf of2010
000. The 07PARIS4722 telegram is an official telegram ftom Embassy Paris, dated
December 14, 2007 to the Department ofState. This telegram is fburpages. The telegram was
properly classified SECRET under E.O. 12958 at the time it was generated. The telegram
remained classified SECRET under E.O. 13526 under Sections1.4(b)and(d) in the first half
of2010
ppp. The 07PAR1S4723 telegram is an official telegram ftom Embassy Paris, dated
December 14,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and
(d)(e)in the firsthalf of2010
qqq. The 07RANGOON22 is an official telegram ftom Embassy Rangoon, dated
January 8,2007 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegramremainedclassifiedCONFlDENTlALunderE.O. 13526 under Sections 1.4(b)
and(d) inthe fiirstha1fof20I0.
rrr. The 07REYKJAVIK203 telegram is an official telegram ftom Embassy Reykjavik, dated
July 13,2007 to the Department ofState. This telegram is fburpages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions of the telegram remain CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and
(d) inthe firsthalf of2010.
SSS. The 07RIYADH21 telegram is an official telegram ftom Embassy Riyadh, dated January
8,2007 to the Department ofState. This telegram is two pages. The telegram was properly
classified SECRETunder E.O.12958 at the time it was generated. The telegram remained
classifiedSECRET underEO. 13526 underSections14(b)and(d) in the firsthalf of2010.
ttt. The 07R1YADH22 is an official telegram ftom Embassy Riyadh, dated January 8, 2007
to the Department ofState. This telegram is two pages. The telegram was properly classified
11
CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram remained
classified CONFIDENTIAL underEO 13526 under Sections14(b)and(d) in the firsthalf of
2010
uuu. The 07RIYADH23 telegram is an official telegram ftom Embassy Riyadh, dated
January 8,2007 to the Department ofState. This telegram is two pages. The telegram was
properly classified SECRETunder E.O.12958 at the time it was generated. The telegram
remained classified SECRETunder E.O. 13526 under Sections1.4(b)and(d) in the first half of
2010
vw. The 07SANSALVADOR1375 telegram is an official telegram ftom Embassy San
Salvador, datedJuIy 13,2007 to the Department ofState. This telegram is three pages. The
telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was
generated and portionsofthe telegram remained classified CONFIDENTIAL under E.O. 13526
underSections14(a)(d)(g) in the firsthalf of2010.
v^^v^. The 07SANTODOMFNG028 telegram is an official telegram ftom Embassy Santo
Domingo, dated January 8, 2007 to the Department ofState. This telegram is nine pages. The
telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was
generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526
under Section1.4(d) in the first half of2010.
xxx. The 07SUVA18te1egram is an official telegram ftom Embassy Suva, dated January7,
2007 to the Department ofState. This telegram is seven pages. The telegram was properly
classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and portions of
the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections1.4(b)and
(d) inthe firsthalf of2010
yyy. The 07TUNIS47 telegram is an official telegram ftom EmbassyTunis, dated January5,
2007 to the Department ofState, This telegram is five pages. The telegram was properly
classified SECRET in part under E.O.12958 at the time it was generated and portions remained
classified SECRET underE0 13526 under Sections1.4(b)and(d) in the first half of2010
^^zThe07USUNNEWYORK573 te1egramisan official telegramfrom the UnitedStates
UN Mission, dated Ju1y 13,2007 to the Department ofState. This telegram is four pages. The
telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was
generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526
under Sections 1.4(b)and(d) in the firsthalf of2010.
aaaa. The 07USUNNEWYORK575 telegram is an official telegram ftom the US Mission to
the United Nations, dated July 13,2007 to the Department ofState. This telegram is five pages.
The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it was
generated and portions of the telegram remained classified CONFIDENTIAL under E.O.13526
under Sections 1.4(b)and(d) in the firsthalf of2010.
bbbbThe07USUNNEWYORK578te1egramisan official telegramftom the US Mission
to the United Nations, dated July 13,2007 to the Department ofState. This telegram is four
12
pages. The telegram was properly classifted CONFIDENTIAL in part under E.O. 12958 at the
time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under
E0 13526underSections14(b)and(d) in the firsthalf of2010
cccc. The 07VIENTIANE12 is an official telegram ftom the American Embassy Vientiane,
dated January 8, 2007 to the Department ofState. This telegram is nine pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d)inthe firsthalf of2010
dddd. The 07VILNIUS13 telegram is an official telegram ftom Embassy Vilnius, dated
January 8,2007 to the Department ofState. This telegram is four pages. The telegram was
properly classifted CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d) in the firsthalf of2010
eeee. The 08AMMAN535 telegram is an official telegram ftom Embassy Amman, dated
February 20, 2008 to the Department ofState. This telegram is ten pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d) in the firsthalf of2010
ffff. The 08CA1RO569 telegram is an official telegram ftom Embassy Cairo, dated March
23,2008 to the Department ofState. This telegram is three pages. The telegram was properly
classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions of
the telegram remained classified CONFIDENTIAL under E.O. 13526 under Section 1.4(d) in
the firsthalf of2010
gggg. The 08DARESSALAAM206 telegram is an official telegram ftom Embassy E^^r^s
Salaam, dated April 1,2008 to the Department ofState. This telegram is six pages. The
telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it was
generated and portions remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d) in the firsthalf of2010.
hhhh. The 08KHARTOUM246 telegram is an official telegram ftom Embassy Khartoum,
datedFebruary20, 2008 to the Department ofState. This telegram is four pages. The telegram
was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and
portions ofi t remained CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d) in the
firsthalf of2010
i i i i . The 08KHARTOUM428 telegram is an official telegram ftom Embassy Khartoum,
dated March 23,2008 to the Department ofState. This telegram is nine pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 tmder Sections
1.4(b)and(d) inthe firsthalf of2010
13
j j j j . The 09ADDISABABA1063 telegram is an official telegram ftom Embassy Addis
Ababa, dated May7,2009 to the Department ofState. This telegram is fburpages. The telegram
was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated and
portions ofi t remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and
(d)inthe firsthalf of2010
kkkk. The 09BAGHDAD2390 telegram is an official telegram ftom Embassy Baghdad,
dated September5,2009 to the Department ofState. This telegram is three pages. The telegram
was properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d)
inthe firsthalf of2010
1111. The 09BAMAl^O85 telegram is an official telegram ftom Embassy Bamako, dated
February 12,2009 to the Department ofState. This telegram is seven pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d) in the firsthalf of2010
mmmm. The 09BOGOTA2873 telegram is an official telegram ftom Embassy Bogota, dated
September 4, 2009 to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d) in the firsthalf of2010
rmnn. The 09BRASILIA1112 telegram is an official telegram ftom Embassy Brasilia, dated
September4,2009 to the Department ofState. This telegram is fburpages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remamed classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
inthe firsthalf of2010
OOOO. The 09BRASILIA1I13 telegram is an official telegram ftom Embassy Brasilia, dated
September4,2009 to the Department ofState. This telegram is eight pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 tmder Sections
14(bXd) in the firsthalf of2010
pppp. The 09CARACAS1168 telegram is an official telegram ftom Embassy Caracas, dated
September4,2009 to the Department ofState. This telegram is six pages. The telegram was
properly classified CONFIDENTIAL in part under E.0 12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Section
14(d)inthe firsthalf of2010
qqqq. The 09LIMA1309 telegram is an official telegram ftom Embassy Lima, dated
September 4,2009 to the Department ofState. This telegram is fburpages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 tmder Sections1.4(b)and(d)
in the firsthalf of2010.
14
rrrr. The 09MEX1CO2658 telegram is an official telegram ftom Embassy Mexico City,
dated September4,2009 to the Department ofState. This telegram is two pages. The telegram
was properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated and
portions of the telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
1.4(b)and(d) in the firsthalf of2010
ssss. The 09NEWDELH1267 telegram is an official telegram ftom Embassy New Delhi,
datedFebruary 12, 2009 to the Department ofState. This telegram is six pages. The telegram
was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated
and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under
Sections14(b)and(d) in the firsthalf of2010
tttt. The 09PARIS217te1egram is an official telegram ftom Embassy Paris, dated February
12, 2009 to the Department ofState. This telegram is two pages. The telegram was properly
classified CONFIDENTIA^L under E.O.12958 at the time it was generated and portions of the
telegram remained classified CONFIDENTIAL under E.O.13526 under Sections1.4(b)and(d)
inthe firsthalf of2010.
uuuu. The 09PRAGUE88 telegram is an official telegram ftom Embassy Prague, dated
February 12,2009 to the Department ofState. This telegram is three pages. The telegram was
properly classified CONFIDENTIAL under E.O.12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d)
in the firsthalf of2010
WW. The 09PRISTINA58 telegram is an official telegram ftom Embassy Pristina dated
February 12,2009 to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under Sections
14(b)and(d) in the firsthalf of2010
wwww. The 09RIYADH1156 is an official telegram ftom Embassy Riyadh, dated September
5,2009 to the Department ofState. This telegram is three pages. The telegram was properly
classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The telegram
remained classified CONFIDENTIAL under E.O. 13526 under Sections 1.4(b)and(d) in the
firsthalf of2010
xxxx. The 09SANTIAGO831te1egram is an official telegram ftom Embassy Santiago,
dated September4,2009 to the Department ofState. This telegram is three pages. The telegram
was properly classified CONFIDENTIAL E.O.12958 at the time it was generated. The telegram
remained classified CONFIDENTIAL under E.O.13526 under Sections 1.4(b)and(d) in the
firsthalf of2010
yyyy. The 09SANTIAGO833 telegram is an official telegram ftom Embassy Santiago,
dated September 4, 2009 to the Department ofState. This telegram is seven pages. The telegram
was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated
15
and portions ofthe telegram remained classified CONFIDENTIAL under E.O.13526 under
Sections14(b)and(d) in the firsthalf of2010
z^^zz. The 09SANT1AGO835 telegram is an official telegram ftom Embassy Santiago,
dated September4,2009 to the Department ofState. This telegram is five pages. The telegram
was properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated
and portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under
Section14(b)in the firsthalf of2010.
aaaaa. The 09SANTODOMINGO1017teIegram is an official telegram ftom Embassy
Santo Domingo, dated September 4,2009 to the Department ofState. This telegram is four
pages. The telegram was properly classified CONFIDENTIAL under E.O.12958 at the time it
was generated. The telegram remained classified CONFIDENTIAL under E.O. 13526 under
Sections14(b)and(d) in the firsthalf of2010
bbbbb. The 09STATE92632 telegram is an official telegram ftom the Department, dated
September 4, 2009 to the Embassy in Moscow. This telegram is four pages. The telegram was
properly classified SECRET in part under E.O. 12958 at the time it was generated and portions of
the telegram remained classified SECRETunder E.O.13526 under Section1.4(d) in the first
halfof2010
ccccc. The 09STATE9264I telegram is an official telegram ftom the Department, dated
September 4, 2009 to Embassy Colombo andanumber of other posts. This telegram is six pages.
The telegram was properly classifted CONFIDENTIAL in part under E.O. 12958 at the time it
was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.
13526 underSection1.4(d) in the firsthalf of2010
ddddd. The 09STATE92655 is an official telegram ftom the Department ofState, dated
September4,2009 to EmbassyTegucigalpa This telegram is five pages. The telegram was
properly classified CONFIDENTIAL in part under E.O. 12958 at the time it was generated and
portions c^fthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d) in the firsthalf of2010
eeeee. The 09STATE92657 telegram is an official telegram ftom the Department ofState,
dated September4,2009 to the Embassies in Moscow,Kyiv,andAstana. This telegram is four
pages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at the
time it was generated and portions ofthe telegram remained classified CONFIDENTIAL under
E.O. 13526 underSections14(a)(b)and(d)(e)in the firsthalf of2010
fffff. The 09TEGUCIGALPA891 telegram is an official telegram ftom Embassy
Tegucigalpa, dated September 4, 2009 to the Department ofState. This telegram is ftve pages.
The telegram was properly classified CONFIDENTIAL in part tmder E.O.12958 at the time it
was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.
13526 underSectionsI4(b)and(d) in the firsthalf of2010.
ggggg. The 09TEGUCIGALPA892 telegram is an official telegram ftom Embassy
Tegucigalpa, dated September4,2009 to the Department ofState. This telegram is two pages.
16
The telegram was properly classified CONFIDENTIAL in part under E.O.12958 at the time it
was generated and portions ofthe telegram remained classified CONFIDENTIAL under E.O.
13526 underSection1.4(d) in the firsthalf of2010.
hhhhh. The10BRUSSELS382 telegram is an official telegram ftom the US Mission to the
European Union in Bmssels, dated March 30,2010to the Department ofState. This telegram is
fburpages. The telegram was properly classified CONFIDENTIAL in part under E.O. 12958 at
the time it was generated and portions c^fthe telegram remained classified CONFIDENTIAL
under E.O. 13526 underSections14(b)and(d) in the firsthalf of20I0.
i i i i i . The10GENEVA347 telegram is an official telegram ftom the US Mission in Geneva,
dated March 30, 2010to the Defense Intelligence Agency (DIA) and other addressees. This
telegram is thirteen pages. The telegram was properly classified SECRET in part under E.O.
12958 at the time it was generated and portions c^fthe telegram remained classified SECRET
underE0 13526underSections14(b)and(d) in the firsthalf of2010
j j j j j . The10LIMA333 telegram is an official telegram ftom Embassy Lima, dated March 29,
2010to the Department ofState. This telegram is six pages. The telegram was properly
classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and portions of
the telegram remained classified CONFIDENTIAL under E.O.13526 under Section1.4(d) in
the first year of2010.
kkkkk. The 10PRETORIA636 telegram is an official telegram ftom Embassy Pretoria, dated
March 30, 2010to the Department ofState. This telegram is five pages. The telegram was
properly classified CONFIDENTIAL under E.O. 12958 at the time it was generated. The
telegram remained classified CONFIDENTIAL under E.O.13526 under Section 1.4(d) in the
firsthalf of2010
mil. The10RABAT294 telegram is an official telegram ftom Embassy Rabat, dated March
30,2010to the Department ofState. This telegram is twelve pages. The telegram was properly
classified SECRET in part under E.O.12958 at the time it was generated and portions ^f t f i e
telegram remained classified SECRETunder E.O.13526 under Section 1.4(d) in the first half
of2010.
rmnmmm. The10TOKYO627 telegram is an official telegram ftom EmbassyTokyo, dated
March 29,2010to the Department ofState. This telegram is four pages. The telegram was
properly classified CONFIDENTIAL in part under E.O.12958 at the time it was generated and
portions ofthe telegram remained classified CONFIDENTIAL under E.O. 13526 under Sections
14(b)and(d) in the firsthalf of2010
8. For each ofthose 96 cables listed above and classified as CONFIDENTIAL the following
is true:
a. First, all 96 cables were properly marked at the CONFIDEN^TIAL classification leveL
b. Second, disclosure ofthe information identified in the 96 cables reasonably could be
expected to cause damage to the national security ofthe United States. In making this
statement regarding the classification ofinformation in this case,lrely upon my personal
knowledge and experience, the information made available to me in my official capacity,and
the advice and recommendations received ftom experts within the geographic and functional
bureaus.
c. Third, the 96 cables and the information contained in them were classified at the
CONFIDENTIAL level at the time oftheir creation, and remained classified at the
CONFIDENTL^L levelin the firsthalf of2010andatthetimeoftheir disclosure These
cables were classified pursuant to Section 1.4ofE.O. 13526,or its predecessor E.O.s,
because they contained information that, ifreleased, could cause damage to national security.
9. For each of those21cables listed above and classified as SECRET the following is true:
a. First, all21cables were properly marked at the SECRETcIassification leveL
b. Second, disclosure ofthe information identified in the21cab1es reasonably could be
expected to cause serious damage to the national security ofthe United States. In making
this statement regarding the classification ofinformation in this case,lrelied upon my
personal knowledge and experience, the information made available to me in my official
capacity,and the advice and recommendations received ftom experts within the geographic
and fimctional bureaus.
c. Third, the21cab1es and the information contained in them were classified at the
SECRET level at the time oftheir creation, and remained classified at the SECRET level in
the first half of2010and at the time of their disclosure. These cables were classified
pursuant to Section 1.4ofE.O.13526, or its predecessor E.O.s, because they contained
information that, ifreleased, could cause serious damage to national security.
10. Of the cableslreviewed in the Net Centric Diplomacy database,aportionofthem were
found to be technically deficient in terms of marking. That is, they contained no
declassification date,were missing authority,or improperly cited the E.O.s. However, the
presence oftechnical marking deficiencies does not mean that the cables were not classified.
Moreover,Ifbund that portions of some of the cableslreviewed were no longer sensitive.
^ ^ ^ ^ ^ t ^ ^ ^ ^ ^ ^ ^ ^ B^^^^^^^^^^^^^^^^
ANGELMOV^GAARD THOMASFHURLEY B R A D ^ ^ E M^ ^ ^ ^ G
CPT,JA MAJ,JA PFC, USA
Assistant Trial Counsel Military Defense Cotmsel Accused
18
Prosecution Exhibitl^^
ICJ^
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplementto the original
Record ofTrial
Prosecution Exhibitl^Oa
6pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl81a
^pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
UNITED STATESOF AMERICA
Manning, Bradley E.
PFCU.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211
STIPULATION OFFACT
AdamGadahn
^^June2013
The United States and the Defense,with the express consent of the accused,stipulate that
the following facts are true, susceptible ofproof, and admissible in evidence. These facts may be
considered by the finder offact to establish the elements ofall charges and their specifications.
They may be considered by the sentencing authority and on appeal in determining an appropriate
sentence, even ifthe evidence ofsuch facts is deemed otherwise inadmissible. The accused
expressly waives any objections he may have to the admission ofthis evidence at trial under the
Military Rules ofEvidence, the Rules for Courts-Martial,theU,S,Constitution, or applicable
case law,
1. Adam Gadahnisasenior leader of alQaeda (hereinafter ^^A(^"), the terrorist organization
responsible for the attacks against the United States at theWorldTrade Center and Pentagon on
11September2001, AdamGadahn has beenamemberofAQsince 2004,
2, AsSahabisamedia organization operated byAQ. Onorabout3June2011,As-Sahab
media releasedavideotitled,^^Thou Art Held Responsible Only fbrThyself (hereinafter
^^Gadahn video"). The Gadahn video was released simultaneously in two separate parts
(referenced herein as ^^Part I " and ^^Part I I " respectively). The Gadahn video features Adam
Gadahn and other AQleaders as speakers. The Gadahn video serves asapropaganda and
recruitment tool for AQ.
3, As-Sahab and Adam Gadahn obtained material ftomWikiLeaks and used the material ftom
WikiLeaks in the Gadahn video. The Gadahn video contained excerpts ftom the WikiLeaks'
editedversionofthevideofilenamed^^12JUL07CZENGAGEMENTZ^ONE30GC
Anyone.avi" (hereinafter"Apache video") contained in Prosecution Exhibit ( PE) ^f or
Identification. PE^ f o r ID is theWikiLeaks edited version of the Apache video that appears
on the WikiLeaks web site. The Gadahn video shows the WikiLeaks web site. Between the time
stamps 03:23 and 04:40 in PartLfl^^ Gadahn video shows the Apache video (PE^^^forlD)on
the WikiLeaks web site,
4. PEl^^or ID is the Department ofState information in the Gadahn video obtained from
WikiLeaks, In Partlof the Gadahn video ftom time stamps 43:28 until 44:38,Adam Gadahn,
speaking in English, recommends using the Intemet to make ^^use of all means possible to do
damage to the enemy," Referencing the Department'sinfbrmation during the same time stamps
in Part I , Adam Gadahn states,^^But, by the grace of God, the enemy'sinterests are today spread
all over the place and easily accessibly as the leak of America'sState Department cable on
critical fbreign dependency makes so clear."Adam Gadahn also states during the same time
stamps in PartL^^Andladvise every brother who wants to work fbr this religion not to
= = r - ^ o Mi f c
PAGE
PAGE
OF PAGES
undertake any action before taking advantage ofthe wide range ofresources available today on
the Intemet, particularly the various manuals, encyclopedias,and courses,which deal with the
mujahideen^s operational and electronic security, and security in general."
5. In Part II from the time stamps 05:35 until 06:37, the narrator, citing Department material
obtained ftomWikiLeaks, reports Arab leaders'^^collaboration" with ^^their ruler, America,"
giving President Obama an ^^open door" to ^^wage war on the mujahidin." The narrator in Part II
of the Gadahn video ftom time stamps 06:38 until 09:01,also referencing the contentsofthe
Department'smaterial obtained ftomWikiLeaks, cites reports of the ^^lewd parties put on by the
American consulates in Islamic countries that aim to cormpt the minds, morals, and religion of
the youth." The narrator continues,^^These documents revealed that most of the richesofthe
Islamic world are spent on cortuption and waging war on Islam, while millions ofMuslims live
in abject poverty."
6. Inspire Magazine isamagazine published on the Intemet by alQaeda in the Arabian
Peninsula (hereinafter^AQAP"). AQAPisabranchofAQ. Inspire Magazine serves asa
propaganda and recmitment tool for AQAPandAQ. On or aboutlbJanuary 2011,Inspire
Magazine published issue number4(hereinafter^^Winter2010Inspire Issue") on the Internet,
On pages 44-45of the Winter 2010Inspire Issue, the magazine lists activities one can do to
^^help the mujahidin in within the conftnes ofthe media sector," The Winter 2010Inspire issue
lists that archiving large amountsofinformation is helpful to AQAPandAQ. The Winter 2010
Inspire Issue further lists ^^i^a^nythingusefiil ftomWikiLeaks" is useful for archiving.
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
ASHDENFEIN THOMASFHURLEY BRADI^
MAJ,JA MAJ,JA PFC, USA
Trial Counsel Military Defense Counsel Accused
UNITEDSTATESOF AMERICA
Manning, Bradley E.
PFCU.S.Army,
HHC, U.S. Army Garrison,
JointBaseMyerHendersonHall
FortMyer, Virginia 22211
STIPULATION OF
EXPECTEDTESTIMONY
CDRYoussefAhoul-Enein
June2013
It is hereby agreed by the Accused, Defense Counsel,andTrial Counsel,that i f CDR
YoussefAboul Enein were present to testify during the merits phase of this court-martial, he
would testify substantially as follows:
1. lamaCommander in the United States Navy and an officer in the Medical Service Corps.
Additionally,IamaMiddle East Foreign Area Officer. Since 2006,lhave served asaSenior
CounterTerrorismAdvisor,Waming Officer, and Instructor on Militant Islamist Ideology at the
Joint IntelligenceTaskForce for CombatingTerrorism(JITF-CT)inWashington DC. ladvise
the House Homeland Security Committee onViolent Islamist radicalization. lam also Military
AdjunctFaculty for Middle East CounterTerrorism Analysis at the National Intelligence
University. lam currently assigned to the Defense Intelligence Agency (DIA)at Boiling Air
Force Base, Previously,Iserved as Country Director fbr North Aftica and Egypt, Assistant
Country Director fbr the Arabian Gulf, and Special Advisor on Islamist Militancy at the Office
ofthe Secretary ofDefense for Intemational SecurityAffairs from 2002 2006. While at the
Office ofthe Secretary ofDefense,Ihelped prepare Department ofDefense officials to engage in
ministerial level talks with their counterparts ftom Morocco to the Persian Gulf
2. My education consists ofaB.B.A ftom the University ofMississippi,an M,B,A and Masters
in Health Services Administration ftom the University ofArkansas, an M.S. in Strategic
Intelligence from the National Defense Intelligence College, as well as an M.S. in National
Resource Strategy ftom the Industrial College of the Armed Forces(Classof2009 2010). lam
the author of^^/^^7^^e^^^^,^/e^^^.^^^c^^c^^c^^.L^i^c^^^,^^^^
7^^^^C^^'^B^^'.^^^^^^^/.^^^.^^^^^^'l^^.^C^^^ BI^^^
published by Naval Institute Press. lalso contributed to the counterterrorism portion ofthe May
2012editionof"PerspectivesonTerrorism." lam rated proficient in the Egyptian, Peninsular,
Levantine, Modem Standard (Upper Level) and Iraqi dialects ofArabic by the Defense
Language Institute. My operational tours include Liberia, Bosnia, and the Persian Gulf My
personal awards include the Army Commendation Medal presented by GeneralTommy Franks,
the Joint Service Achievement Medal presented by the Commandant ofthe Joint Forces Staff
College, and the Defense Meritorious Service Medal (DMSM) awarded by the Secretary of
Defense,asecondDMSM awarded by the DIA Directorfor Analysis,
3. lhave spent years studying Al-Qaeda(AQ). From its inception through 2011,AQwasa
militant Islamist organization founded and led by Usama bin Laden (UBL). AQ'sphilosophy
was ofglobal Jihad and strict interpretation ofSharia Law. Jihad isaKoranic principle, but
AQ'sdefinition translated into ^^religious war against the infidels." AQ'sdefinitionof^jihad'
opposed any nation or organization that did not strictly adhere to Sharia Law as ^^infidels." Thus,
PROSECUTION EXHIBIT^^l oi ^i de^cat i on
PAGEOFFERED: PAGEADMI^ED:
PAG^ OF PAGES
ftom its inception through today,AQseeks to attack countries constituting the ^^West,"to include
the United States andWestem Europe. AQalso seeks to attack Arab regimes thatAQconsiders
to be allied with the United States. For the purpose of my testimony,AQwas composed ofits
senior leadership and spokesmen as well as the senior leadership and spokesmen ofits declared
ftanchises, like AlQaeda in the Arabian Peninsula,
4, From its inception,AQwasaterrorist organization that has been attacking the United States
since the original attack on theWorldTrade Center in 1993,which killed six and wounded over
one thousand. AQclaimed responsibility for the following attacks: (1)the 1998 bombing ofUS
embassies in Kenya andTanzania,which killed over 200 people and injured more than 5000
others, (2) the 2000 bombing of the USS Cole,which killed17sailors and injured more than 39
others,and (3)the11September2001 attacks,which killed more than 3000 civilians and injured
more than 5000 others. AQcontinued to claim responsibility for intemational bombings
throughout the 2000s. AQ, or organizations loosely affiliated with it, have claimed responsibility
fbr attacking US forces and their coalition partners working in Iraq and Afghanistan witha
variety of direct action engagements(e.g.direct fire engagements, indirect fire engagements, and
improvised explosive device attacks). AQsees itself as an enemy of the US; the 2001
Authorization for Use ofMilitary Force is read to provide the authorization for US military
actions againstAQand its affiliates.
5, From its inception,AQclaimed that it would attack(and claimed responsibility for attacking)
civilian or military targets with different means and degrees of complexity. The United States
has defended againstAQsincethe 1990s. In 1998,UBL was indicted in federal court fbr
conspiracy to murder, bomb, and maim United States citizens. The United States has employed
forces againstAQworldwide, to include Aftica and the Middle East. AQ, like common
criminals, required secrecy to carry out their direct action missions. As the US developed
methods to respond to the stealthy tactics ofAQ, their tactics evolved in order to continue their
operations. This evolution^orcreativity^compelled the same ftom the West to develop
countermeasures. This cycle occurred ftom the inception ofthe defense againstAQthrough
2010
6, AQ has also become more decentralized in response to the actions ofthe United States. AQ
adoptedaphilosophy of creatinga^^leaderless environment" because it makesAQterrorist cells
harder to detect. This leaderless environment was bom ofnecessity considering the West's
success in capturing and killingAQleadership, From the perspective ofAQ,selfradicalization
aided the development ofa^^leaderless environment." AQsought to create hostility and tum the
population of any given country against its secular leadership to createaleaderless environmenL
Toencourageselfradica1ization,AQimp1ored all Islamists, specifically the younger
generations, to take it upon themselves to fight their enemies, AQdidnothaveacentralized
organizational structure,which helped in facilitating the leaderless environment in which they
operate. Those individuals that responded to the calls for self radicalization would be considered
^^AQ inspired." ^^AQ inspired" are indirectly connected to AQ.
7, AlQaeda in the Arabian Pemnsula(AQAP)isaterrorist organization that formed asamerger
betweenAQcells in Saudi Arabia andYemen in 2003. From its inception through the end of
2010,AQAP claimed responsibility for:(1)an attack onWestem expatriates residing on Saudi
soil and (2) launching attacks against oil refineries. AQAP also claimed responsibility for the
failed ^^underwear bomber" attack of2009.AQAP was the most creative ^^ftanchise" ftom its
inception through the charged time period.
8, From its inception,AQused the media to achieve its goals, gain notoriety,and inspire
individuals tojoin in terrorist activities, AQused the media for fimdraising as well. This money
would then be used to fund training, missions, bribes, media creation for propaganda and
recruiting, and traveling. AQused its notoriety to seek facilitators who would launder money,
obtain items not easily located inAQ'sarea of operation, move members ofAQto new
destinations, and smuggle recruits,
9, From its inception, media perception was important to AQ, Any event that placedAQina
positive light or depicts forces adversarial to AQinanegative light would have been seen as
beneficial byAQ. Acknowledgement of successful attacks against enemy forces would have
likely boosted morale and may have led toacorresponding increase in attacks. Events that
undermined cooperation with foreign leaders would have, ftom the perspective ofAQ, increased
antagonism toward those leaders and created an environment in which terrorist ideology excels.
10. Throughout the 1990s and early2000s,AQused media outlets to deliver its recorded
messages toabroader audience. In time,AQdecided to release its messages directly to the
Intemet through its media arm, As-Sahab. AsSahab has been designed to operate likeamedia
outleL The golden As-Sahab logo in Arabic calligraphy was pattemed offthe golden logo of Al-
jazeera, which also features Arabic calligraphy. From its inception through 2010, As Sahab
made videos to recmit and spreadAQpropaganda. Propaganda was thought byAQto be
essential for these missions because it establishedAQ'scredibility as an effective terrorist
organisation.
11. AQhas used the Intemet since the 1990s. AQused the Intemet as means of communication
for its leaders and members. As the Intemet grew to host more information, communication
through cyberspace,such as the Intemet,was the preferred method of communication because
AQdidnothaveacentralized organizational stmcture andAQmembers were constantly moving
in order to avoid being captured or killed by anti-AQforces. AQused the Intemet for research
for potential targets, recruits, and facilitators. AQused the Intemet for research since at least the
early2000s. AsAQdeveloped its ov^ resources such as As-Sahab,AQshiftedmoreofits
attention onto the Intemet, AQused websites with users who were sympathetic to its goals, AQ
also used all publicly available websites. AQused websites that described United States
govemment resources,websites that contained United States govemment information, and
websites that researched United States govemment information to gather intelligence that may
be useful in planning attacks against the United States. AQalso searched fbr information related
to the United States govemment that would have been used fbr propaganda to undermine the
United States or its allies, especially diplomatic information.
\^Y^ih
^ 4<r yvi ^ ^
ALEXANDER voN ELTEN
CPT, JA
Assistant Trial Counsel
'^iL&y^
JREEYL/ THOMAS F. HURI
MAJ, JA
Military Defense Counsel
BRADLEY E. MANNI
PFC, USA
Accused
Prosecution Exhibitl8^
3pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl85
5pages
classified
"CO^EJE^E^Tl^E"
ordered sealedfDrReason3
Military Judge's Seal Order
dated20^ugust2013
stored in the classified
supplement to the original
Record ofTrial
Prosecution Exhibitl86
has been entered into
the record asahardbacl^bool^
and will be maintained
with the original
Record ofTrial
O =:
3 3
^ m
$ ^
m o
D" 3
CO QJ
m ^
3
QJ_
"O
QJ
<
fD
fD O
o-
I R
(TO rD
fD CO
QJ ^ .
3 3
Q_ OQ
CO ^
r +
O fD
- I CO
fD
Q.
Z
>
nq
h- ^N
TD
O
00
CO
LO
O
o
<
CD
O
7\
H
o
jn
i
m
Z
>
^
m
no
O
LO
S3 g
^ 5
50
O
,
o
QJ
%
r-h
-n
QJ
O
FD"
QJ
t/1
fD
L/
m
>
-o
O
PROSECUTION EXUn; ^ fg?fb!/^c,%ncRiion
PAGE OFFERED: * 4 j E AD^^rrrED:
PAGE
OF PAGES
o
m
H
-o
O
m
LO
m
<
m
30
| |
cr r+
V) 5"
fD O
- I Q_
m o
c
CO
QJ
n
n
3 fD
OQ g
^ 3*
OQ OQ
fD
CO
w
O
3
0)
>
^
m
'TJ
O
Y T l
OQ
fD
r +
QJ
r +
<
O CO 3 " <
CO
QJ
fD
h
a
QJ
3
o
^
h
a
<
3
o
I-+
fD ^' ( D" r +
5"
^ 3
O
3 " QJ
s
a
v
fD
^ 3
s
a
v
fD fD fD
"O
O n
o
3
" D
O
3
m
^r+-
m
O
h
QJ
fD
:r*
O
o
3
3
QJj.
CU
c m
{/I X
fD OJ
" 3
D_
fD
O
fD
n
O
3
3
QJ
3
Q-
T5
%
O
3
T3
r +
QJ
m
CO
fD
fD
3
cr
<
fD
y -v "a
> >
G O O
tn rn CO
i i
O m H
" Si
>!
m
;"7
w
5
w
- I >
C,'
X
S
H
o'
" f
s5J
- i _
ro g\
%
y^ O
VI O
5, ^
O CJ
o o
n o
C C
S 2
o
cn
>
T3
O
en
>
73
O
m
>
TJ
o o
o o
n o
C C
m m
Z Z
H H
l / l tn
$ 1
o e3
> on
cn
03
Ln
O
en
o
p
b
cn
>
a
X -
cn
o
w
>
o
o
OJ
>
TS
I-" o
if
p O
t
f
m
21
o
w
>
"O
C3 O
O O
O O
c c
m m
z z
H H
l / l Ul
$ 1
o o
i i
51
if
>
z
cn
o
Ul
>
o
O D
O O
o n
C C
m m
Z Z
^ if
cn
i i
o
i?
cn
>
D
% n
Ln t n
d CJ
> <n
o
U3 _^
O
O Z
8 2
3
5 5
>
-o
e ^ $
:s#
O M O
e ^ $
l / l l / l
' >
5 5
cn
^ q -o
" 2 (g
Z I
u
2, 9-
o
m
c?
n
3 "
g
era
eo
CD
X
ns
o
3
o
o
r *
N
N>
\
wget-help
GNU Wget 1.11.4, a non-interactive network retriever.
Usage: wget [OPTION]... [URL]...
Mandatory arguments to long options are mandatory for short options too.
Startup:
-V, --version
-h, help
-b, background
-e, --execute=COMMAND
display the version of Wget and exit,
print this help,
go to background after startup,
execute a .wgetrc'-style command.
Logging and input f i l e :
-o, --output-fi1e=FlLE
-a, --append-output=FILE
- d , debug
- q , - - q u i e t
- V, - - ver bose
- nv, - - no- ver bose
- i , i n p u t - f i l e =Fl L E
-F, --force-html
-B, --base=URL
log messages to FILE.
append messages to FILE.
print lots of debugging information.
quiet (no output).
be verbose (this is the default).
turn off verboseness, without being quiet.
download URLs found in FILE.
treat input f i l e as HTML.
prepends URL to relative links in -F - i f i l e .
Download:
- t , --tries=NUMBER
--retry-connrefused
-0, --output-document=FiLE
-nc, --no-clobber
-c, --continue
--progress=TYPE
-N, --timestamping
-S, --server-response
--spi der
-T, --timeout=SECONDS
--dns-timeout=SECS
--connect-timeout=SECS
--read-timeout=SECS
-w, --wait=SECONDS
wai tretry=SECONDS
random-wait
--no-proxy
-Q, --quota=NUMBER
--bind-address=ADDRESS
--1i mi t-rate=RATE
--no-dns-cache
--restri ct-fi1e-names=OS
--ignore-case
user=usER
--password=PASS
Di r e c t o r i e s :
- nd, - - n o - d i r e c t o r i e s
- X, - - f o r c e - d i r e c t o r i e s
- nH, - - no- hos t - di r ec t or i es
- - p r o t o c o l - d i r ec t or i es
- P, - - di r ect or y- pr ef i x=PREFl x
- - c u t - d i rs=NUMBER
set number of r e t r i e s t o NUMBER (0 u n l i mi t s ) .
r et r y even i f connect i on i s r ef used.
wr i t e documents t o F I L E .
ski p downloads t hat woul d download t o
ex i s t i ng f i l e s .
resume get t i ng a par t i al l y- downl oaded f i l e ,
sel ect progress gauge t ype,
don' t r e - r e t r i e v e f i l e s unl ess newer t han
l o c a l .
print server response.
don't download anything.
set a l l timeout values to SECONDS.
set the DNS lookup timeout to SECS.
set the connect timeout to SECS.
set the read timeout to SECS.
wait SECONDS between retrievals.
wait 1..SECONDS between retries of a retrieval.
wait from 0...2*WAIT sees between retrievals.
explicitly turn off proxy.
set retrieval quota to NUMBER.
bind to ADDRESS (hostname or IP) on local host,
l i m i t download rate to RATE.
disable caching DNS lookups.
restrict chars in f i l e names to ones OS allows,
ignore case when matching files/directories.
set both ftp and http user to USER.
set both ftp and http password to PASS.
don' t cr eat e d i r e c t o r i e s .
f or ce cr eat i on of d i r e c t o r i e s .
don' t cr eat e host d i r e c t o r i e s .
use pr ot ocol name i n d i r e c t o r i e s ,
save f i l e s t o P R E F I X / . . .
ignore NUMBER remote directory components.
HTTP options:
--http-user=USER
--http-password=PASS
--no-cache
set http user to USER,
set http password to PASS,
disallow server-cached data.
Page 1
^
PROSECUTION EXHIBIT i M for id^ntification\&
PAGEOFFERED:_ PAGE ADIVHTTED: X /
PAGE OF PAGES
^
E, -html-extension
--ignore-length
--header^STRlNC
--max-redirect
- proxy user^USER
proxy-password^PASS
referer^URL
save headers
-U, user-agent^ACENT
--no http keep alive
no cookies
load cookies^FlLE
save cookies^FiLE
keep session cookies
post data^STRiNG
--post-file^FiLE
content disposition
auth-no-challenge
wget-help
save HTML documents with .html' extension,
ignore Content Length' header f i e l d ,
insert STRINC^ among the headers,
maximum redirections allowed per page,
set USER as proxy username.
set PASS as proxy password.
include Referer: URL' header in HTTP request,
save the HTTP headers to f i l e ,
identify as AGENT instead of wgetB^ERSiON.
disable HTTP keep alive (persistent connections)
don't use cookies.
load cookies from FILE before session,
save cookies to FILE after session,
load and save session (non permanent) cookies,
use the POST method: ^^^d STRING as the data,
use the POST method: send contents of FILE,
honor the Content Disposition header when
choosing local f i l e names (EXPERIMENTAL).
Send Basic HTTP authentication information
without f i r s t waiting for the server's
challenge.
HTTPS (SSLBTLS) options:
secure prot ocol ^PR
- - no- check c e r t i f i c a t e
- c e r t i f i c a t e ^ Fl L E
c e r t i f i c a t e type^TyPE
pr i v at e key^Fi LE
pr i v at e key type^TyPE
ca c e r t i f i c a t e ^ Fi L E
ca di r ect or y^Dl R
--random f i l e ^ Fl L E
egd f i l e ^ Fi L E
FTP options:
ftp user^uSER
--ftp-password^PASS
--no-remove l i s t i n g
no glob
no passive ftp
--retr-symlinks
preserve permissions
choose secure protocol, one of auto, SSLv2,
SSLv3, and TLSvl.
don' t v al i dat e t he ser ver ' s c e r t i f i c a t e .
c l i e n t c e r t i f i c a t e f i l e .
c l i e n t c e r t i f i c a t e t ype, PEM or DER.
pr i v at e key f i l e .
pr i v at e key t ype, PEM or DER.
f i l e wi t h t he bundl e of CA' s.
di r ec t or v where hash l i s t of CA' s i s st or ed.
f i l e wi t h random dat a f o r seedi ng t he SSL PRNG.
f i l e naming t he EGD socket wi t h random dat a.
set f t p user t o USER.
set f t p password t o PASS.
don' t remove . l i s t i n g ' f i l e s .
t ur n o f f FTP f i l e name gl obbi ng.
di sabl e t he " passi ve" t r ans f er mode.
when r ecur si ng, get l i nk ed t o f i l e s ( not d i r ) .
pr eser ve remote f i l e per mi ssi ons.
Recursi ve downl oad:
- r , - r ecur si ve
- 1 , level^NUMBER
del et e a f t e r
k, conver t l i n k s
1^, backup conver t ed
-m, - mi r r or
p, page r equi s i t es
- - st r i ct - comment s
Recursive acceptBreject:
specify recursive download.
maximum recursion depth ( i n f or 0 for i n f i n i t e ) ,
delete f i l e s locally after downloading them,
make links in downloaded HTML point to local f i l e s ,
before converting f i l e X, back up as X.orig.
shortcut for -N -r -1 inf no remove-listing,
get a l l images, etc. needed to display HTML page,
turn on s t r i c t (SGML) handling of HTML comments.
^/^^
1^^
0,
accept^LiST
reject^LiST
domains^LlST
exclude domains^LiST
follow-ftp
follow-tags^LlST
ignore tags^LlST
span hosts
comma separated l i
comma-separated l i
comma-separated l i
comma separated l i
follow FTP links f
comma separated l i
comma separated l i
go to foreign host
Page 2
st of accepted extensions,
st of rejected extensions,
st of accepted domains,
st of rejected domains,
rom HTML documents,
st of followed HTML tags,
st of ignored HTML tags,
s when recursive.
^
wget - hel p
L, r e l a t i v e f ol l ow r e l a t i v e l i n k s onl y.
I , i ncl ude di r ect or i es^ Ll ST l i s t of al l owed d i r e c t o r i e s .
X, excl ude di r ect or i es^ Ll ST l i s t of excl uded d i r e c t o r i e s .
np, no par ent don' t ascend t o t he par ent d i r e c t o r y .
Mai l bug r epor t s and suggest i ons t o ^bug wget ^gnu. or g^.
Page 3
^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^^^^^^^^^^^
e^ 1 ^ 1 ^ ^ 1 ^ 1 ^ ^ 11^ ^ ^ ^ ^ i i ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
^ ^ ^ ^ ^ 1^ 11^ 11^ il^ ^ ^ ^ ^ 1^ ^ ^ ^ ^ 1^ 11^ ^ 11^ 11^ 1^ 1^ ^ ^ ^ ^
1^ c^ e^ e^ ^ e^ ^ ^ ^ ^ e^ ^ ^ e^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ic^ e^ ^ ^ ^ ^ ^
w
I I I I I I I I
o
O O O O o o o O
h- H H H H H H H H
O O O O O O
o
O O
tr*
c-l f
m
01
o o
t^ <
a
H VI Ui
o
H
K
M
M
Ej
O
tr>
t - l Ul M
o
5*
ta"
S C
O
o o
H
w
> j
w
w
t- H H
o
H
M H
^ o
CO O
,^
J
t^
CO
^ W
00 CO O 4^ N
t n ( 0 CO Cn N
U) Cn
N CD
m
y y
H H
y
O
CO
y
ct ct
ct
y <
ct
g g
Cf* t f
g y ct y
e
1 - h-
ct
Ct
H
ct
B
ct
H
B B
B
H
B y y
H
y
H H
y ct rt
f t
y ct ct ct
tr
y
ct y ct y ct d TS ct ct
d ct ct ct ts
I
ct ct
1 1
ct TS ct
1 1
^ ^
d
cs
^ u
c ^
^
^
^ ts ts
V V
p
X
^ ^ ts
n n
^
v..
n ^ P n
p.
p.
ts ts
e. 0 n 0
p.
n n
n
p.
n w
Vl
p. p.
m
p. p.
M
ct ct
ct
m
Ct
(D
m
Ul Ul
v>
VI
ct
Ul
P
Ct
ct ct ct
ct ct V> ct
Ct ID ID ID ID
m Vf ct P
ID
ct
Ct
ct
ID
ct
M Ul ID ID
m
ID
ID VI
>Q *Q
'
a
Ul
a
O
o
Ul Ul
o
w ^
M
o < <
<
CQ o
<
o o
O
<
O
H Q
< <
<
< a o
o
'
o
H
o <l <
H
^
<
Q
o <J o o
' --.
B
O
<
O
p B < <
' --.
B
< < B
ID ID
^
'-.
ID
^ &
ID Vl Ul
& g
W
e
ID
g
M Vl Ul ID ID
V\
m
W ID V\ ID ID
Ul Ul
v>
w
W
m
V> >Q >Q
Ul Ul
>a
m
V>
M
<Q
ID ID
V> P
a> to
>^
P
ID
^ ^ ^
^ H
ID
Q
M M ID ID
n
ID ID
n
ID ID
^ ^
m
^
M ID M i M i h | M
M i M ID M M i ID ID ID ID
m m
M i ID ID h | H M i M i
H M l ID M i M ID ID ID ID
(D
m
h! ID ID
ts ts
M h|
P
hi ID M
ts
n n
ID ID
n m 0
ID
n
ID ID
ts ts
m ts n JS
ID V
^
n
n
^
n
ID
n
H ID ID
H ID ID 1 -
o o
" V
O
^ o
o o
1 -
t-" H O H Ul Ui Ul
o o
> o
t-"
o
M t-"
tr>
t^ <
K
d
a w
O
o
O
o
H
o
te
01
a
H Ul W
Sd
w
Ej t-"
o
it^
o H
M
^ k
<n
CO CO O
o H
CO
!ri
M
00
m Cn H H
o
N M
>
CO
M
kD Cn
CO 00 Cn H
N CTl
O CO
>
c
I-+
o
3
QJ
^
3*
OQ
O
CO
fD
n
O
3
n
QJ
r +
fD
3
QJ
r +
fD
Q_
O
O
3
3
QJ
3
Q-
co
O
3
Q_
O
r +
ro
NJ
?
c
c
3
QJ_
o"
n
QJ
f t -
fD
Q .
CO
"O
QJ
n
fD
PROSECUTION EXHIPIT Mo_for W^tificatic
PAGEOFFERED: r AGEADf / 1t . ED: __
PAGE OF ^PAGES
^ ^ ^ f t ^
^ ^ c ^ ^
^. ^^^^
G O O
t n t n ^
^
c^
^
^
c ^
^
^
^
^
^ ^ ^ ^
,o ,o ,o
P
,o ,o ,o
c/3 CO
1
CO
1
00
1
CO
1
CO
1
c/3
1
c/3
N I N N N N N N N
O O
n
O O O O O
e : e
6 6 6 6 6 6
o o o o o o o o
O
n o
O O
o
O
o
g
^ g
B
1
C
6
r j
3
P
Ci ti
3 3 3
fD fD fD
a
fD fD fD fD
S
B
S
o
s
B
S
</} c/> (/) C/) i/S (/) (/) (/)
M
^ s
05 05 05 05 03 05
P 5
B
e
P 5
CS CS
P-
a-
CL CL CL CL
CO CO CO CO CO C/) 00 CO
fD fD fD fD fD fD fD fD
i - t <-+ r-y
B.
<!
r - f (f I - +
5"
OP
5' B'
B
3' 3' 3' 3' 5"
OP
CJQ OP (;p (;p (JP (JQ (K)
Cf> cn_
C/ ) Lfl
(/)_ c^. C/)_
cr
O"
6- ^
05 05 05 05 05 03
3 3
a. & o-
B:
& & Bl &
fT
rT
fT fT fT fT fT
fD
% % ^ %
v:
B 3 3 3 ^ 5 3 3
2
05 05 05
5 S
05 05
1
2
t' t'
3. 3.
1 - ^
o
B
o
ts
o
C3
cs'
3"
(TQ. (fQ CIP
ap
ffp^ (TP^
ap^
f t p
^
2
g
^
St S
^
^
^i
^ ^ ^ ^
o
D O O O
o
O O
o o o o o o o o
O
o o o o o o o
g
C
g
s
g S
g
fD
3
1
3 3
^
3 3
fD fD
1
fD rp fD fD fD
(3
B 0
t5
5
CS Ci
cr rjs C/). cn cr (/), C/5 C/} .
o
' VI
o
o
o
cr
05
o
^ _
6\
o
o
o
cr
05
o
o
hj-J
^
o
o
p
ga
O
o
0 0
o
o
o
cr
05
o
'<b
o
o
o
cr
05
o
o
o
o
o
cr
03
o
^
o
o
cr
03
b
o
O
o
I - t
CA
JO
CS
CL
CO
fD
I - t
I - t
5'
OP
cr
I-t
05
&
f T
^
03
a
o
o
fD
C/)_,
cr
t>
o
^
'
o
<
fD
cr
05
S
o
CO
N
o
o
g
i
- t
c/1
g
CL
CO
fD
cs
OP
C/5_^
O'
3
a.
I '
fD
^
i
C3
OP,
a
o
o
p
fD
^
^
O*
^
3
I
cr
05
cr
o
^
05
ft)
r
v>
r - f
s
1 ^
c/3
N
fD
O : O
e & ;
c/3
O
f
SO
-i
ft
^
n
3
W)
O
M
O eo
zr
a
a
Q.
<"
a .
l / l '
z r
(-)
o
g
g
g
b
(O
4
o
yr
(O
n
O
s
g
g
CO
T3
2
Q.
X
7\
eu
i n
3^
zs'
cm
o
3
T3
O
n
O
eo
3
g
5^
5'
fO
Q.
eu'
b
ciq
s
TS
Q.
<
3
n
O
3
CO
3
o_
CD
NJ
O
O
C/l
l O
>
73
NJ
o
M
o
o
Ul
h-*
eo
o
Ln
cu
OJ
CJO
CD
eu
eu
3
era
CD
a ^
cr "o
l i
CO
n
CO
a.
3
as
era
CO
II
3
3 -
n
O
3
eu
c
o
ZT
o
o
era
as_
CD
3
OJ
5'
3
Ol
z r
eo
eo
eo
Q.
O
3
^
era'
3 "
NJ
O
^-
O
O
CJl
NJ
NJ
-< ZT
o a
c5 V.
as
3 - 3
< CD
i ;
1^= %
i t
n
I , 3 "
, o
i o
$20
n
IT
2
3
CD
ea.
II
c
l/l
20
eu
. a
CL
Tl
Q.
2
eu
c r
II
S3
2
n
TT
flj_
^
3
n
II
CL
<
CX)
T5
as
^
c/i
eu
eo
CT
T3
eu
era
eo
ei
O
3
l/l
b .
c r
en
i-
CJJ I O eo l O Ln LU
PROSECUTION EXHIBIT MZ-ibr idenAfil
PAGE OFFERED: PAGE ADMITTED:
PAGE OF PAGES
i ti on
PROSECUTION EXHIBIT !4 jjbi\k(entific@c|n
PAGE OFFERED: PAGE AqMnTEB
PAGE OF PAGES
?or)deT,
^MfFT
i
k
1
0
0
'==,
4=
0
4
tu
u. c
2 .52
-a ^
III,
m^,
k a o
ea
^'^QSlKyilP^^ EXHIBIT /^i|>f</identifiilt on
PAGE OFFERE
PAGE OF
PAGES
PAGEOFFERED:.
PAGE OF PAGES
g
g;
j p .
m.
H
xn
00
i n
irt.
I
I
w
:
w
3
tr
u
OJ
i
JJ
II
t)
5
r - i
M
s
i
m
E
I
O
l i
Si
38
Q CM
ts (o
eo
!
g%
I!
3
W
A
Ol
H
ID
W
1
O
u
JJ
-w
3
JJ
A
o
u
0
(U
to
a,
JJ
PROSECUTION Exn:^
PAGEOFFERED: PAGE
PAGE OF PAGES
. J V
:!T r i ^f roi MentincatiS:
ADMITTED:
1) Personal_Mac\0043-28May10\1 Customer\Una11ocated Clusters
File Offset 25864790818
http://twitter.com/wikileaks/status/9412020034
PROSuCUTlONEYni^^Tj^^^' '
^ OFFERED:
A_Ljc OF DA.^-,
.ACE^v-.' .
1) Personal_Mac\0043-28May10\1 Customer\Unallocated Clusters
File Offset 25864788892
http://twitter.com/wikileaks/status/10961072669
^
PRORFCUTION EXHIB'T I f f ^f or id^tific^on
PA FERED: rAGE ADMifrEDM J ^
PAGh OF ^PAGES
Prosecution Exhibit 196
1 page
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
Elizabeth L. Dibble
Principal Deputy Assistant Secretary for Near Eastern Affairs
Elizabeth Dibble is Principal Deputy Assistant Secretary in the Bureau ofNear Eastem Affairs.
From 2010 - 2011 she was Deputy Assistant Secretary in the Bureau of European and Eurasian
Affairs, where her portfolio included managing U.S. relations with the European Union and
Westem Europe.
As Deputy Chief ofMission and Charge' d'Affaires at the U.S. Embassy in Rome from 2008 to
2010 Ms. Dibble was the chief operating officer for the 800-person U.S. Mission to Italy. She
was Principal Deputy Assistant Secretary in the Bureau of Economic, Energy and Business
Affairs from 2006 to 2008, with responsibility for day-to-day management of the bureau while
also covering intemational finance, development and investment. Prior to that, she was Deputy
Assistant Secretary in the Bureau ofNear Eastem Affairs, with responsibility for U.S. relations
with Israel, the Palestinian Authority, Egypt, Jordan, Lebanon and Syria. She was a member of
the State Department's Senior Seminar from 2003 to 2004.
Ms. Dibble's other overseas assignments include Damascus, Islamabad, Tunis and London. In
Washington, she served as Director of the Office of Peace Process and Regional Affairs in the
Bureau ofNear Eastem Affairs and as Deputy Director of the Office of Development Finance in
the Economic Bureau. She also worked at the Office of the United States Trade Representative
as Assistant Chief Textile Negotiator from 1986 to 1988.
A New Jersey native, Ms. Dibble is a graduate of Georgetown University.
PROSECUTION EX:-'('"'T fcf ld'?/mficalion
PAGE OFFERED: _ . AiZ .ADMr
PAGE Of PAGES
John D. Feeley
Principal Deputy Assistant Secretary
Western Hemisphere Affairs - State Department
John Feeley is a Senior Foreign Service officer who has focused much ofhis
diplomatic career working on Westem Hemisphere issues both in Washington and
in the region. He assumed his current position as Principal Deputy Assistant
Secretary for Westem Hemisphere Affairs in May 2012, with responsibility for the
daily management of regional policy implementation and the supervision of 50
diplomatic posts in the Americas. Previously he served as the Summit of the
Americas Coordinator, overseeing the substantive preparation for Secretary
Clinton's engagement in the Cartagena Summit. He was DCM in Mexico from
July 2009 to March 2012, managing a 37-agency country team that implemented
the $1.6 billion Merida Initiative. He has also been the Department's Director for
Central American Affairs and Deputy Director for Caribbean Affairs. From 2004
to 2006 John served as a Deputy Executive Secretary in the Office of the Secretary
of State, where he was responsible for managing information flow to Secretaries
Powell and Rice, as well as coordinating their overseas travel.
A 2004 Distinguished Graduate of the National War College, Mr, Feeley's
overseas assignments include Mexico City, Santo Domingo, and Bogota,
Prior to joining the State Department in 1990, Mr. Feeley served on active military
duty as a helicopter pilot in the United States Marine Corps. He is a graduate of
Georgetown University's School of Foreign Service and is married to a fellow
career diplomat, Cherie Feeley. The couple has two sons.
^ ^.y,
prO(^^r;'-AlM EX^4m?7iiiJbr/&nni;cat]on
PAGE OFFERED:_ _ r / _ Z AD^n 1 cO:
PAGE OF ^PAGi 3
U.S. DEPARTMENT OF STATE
i i n i ^ y ^ D I P L O M A C Y I N A C T f O N
Home Under Secretary for Public Diplomacy and Public Affairs Bureau of Public Affairs Bureau of Public Affairs:
Electronic Information and Publications Biographies Biographies Listed Alphabetically by Last Name Swart, Susan
Biography
Sus an Swa r t
Chief Informati on Officer
INFORMATION RESOURCE MANAGEMENT
Term of Appointment: 02/07/2008 to present
Susan H. Swart, a member of t he Senior Foreign Service with the rank of Minister Counselor,
was appointed as the Chief Information Officer for the Department of State in February 2008.
As CIO, she is responsible for the Department's information resources and technology
initiatives and provides core information, knowledge management, and technology (IT)
services to the Department of State and its 260 overseas missions. She is directly responsible
for the Information Resource Management (IRM) Bureau's budget of $310 million, and oversees State's total IT/
knowledge management budget of approximately one billion dollars.
Preceding her assignment as CIO, Ms. Swart was the Deputy Chief Information Officer (DCIO) for Business, Planning and
Customer Service and the Chief Knowledge Officer. She has served in a number of prominent positions in the Department,
including the Dean of the School of Applied Information Technology al the Foreign Service Institute. Prior to her SAIT
assignment she served as Information Management Officer in Cairo, Egypt, Office Director for Customer Service in the
Bureau of IRM, Deputy Executive Director in the Bureau of East Asia and Pacific Affairs (EAP), and Special Assistant in
the Bureau of Administration (A). Her overseas assignments include Cairo, Egypt; Caracas. Venezuela and Lima, Pern.
Ms. Swart joined the Foreign Service in 1989. She holds a Masters degree in National Security Studies from the National
War College, and earned her undergraduate degree from Virginia Commonwealth University.
Qi i h e / > r i h t a I I r t H a t o e
The Office of Electronic Information, Bureau of Public Affairs, manages this site as a portal for information from the U.S. State Departmertt.
External links to other Internet sites should not be construed as an endorsement of the views or privacy policies contained therein.
PROSECUTION EXHIBITZW^fbr/lentificallon
PAGE OFFERED: P AGE ADlVlITTED:
PAGE OF PAG
u n a
U.S. DEPARTMENT OF STATE
D I P L O M A C Y I N A C T I O N
^4
Mi chael G. Kozak
Acting Principal Deputy Assistant Secretary
BUREAU OF DEMOCRACY, HUMAN RIGHTS, AND LABOR
Term of Appointment 10/12/2012 to present
Ambassador Kozak is a charter member of the career Senior Executive Service of the United States Govemment. As such, he has
served in a number of senior positions in the U.S. Executive Branch:
^ ^ m ^ ^ ^ ^ ^ ^ K Sen/or Director on the Natiorial Security Council staff (2005-2009) with responsibility for Democracy, Human Rights, Intemational
Organizations, Religious Freedom, Migration and Detainee issues. In this capacity, he chaired interagency policy coordinating
committees and proposed and coordinated the implementation of events for the President of the United States. He conceived and implemented a system for
achieving interagency agreement on democracy promotion strategies and prioritizing resource allocation to implement them. He authored the first National
Security Presidential Directive on Democracy and Human Rights since the Carter administration.
Principal Deputy Assistant Secretary of State level positions in three bureaus of the Department of State. (Democracy, Human Rights and Labor 2003-2005;
Inter-American Affairs 1988-1991; Legal Adviser 1982-88).
Acting Assistant Secretary of State lor extended periods. (Democracy, Human Rights and Labor 2004-5; Inter-American Affairs January 1989-July 1989.) As
Acting Assistant Secretary for Democracy, Human Rights and Labor, he organized passage of a resolution on human rights in Cuba in the UN Commission on
Human Rights by the largest margin in over a decade. As Acting Assistant Secretary for Inter-American Affairs, he assisted Secretary Baker in negotiating and
implementing the Bipartisan Accord on Central America which was decisive in bringing a democratic end to the conflict in Nicaragua.
/Embassador in Minsk, Belarus (2000-2003) and ChiefofMission in Havana, Cuba (1996-1999).
Other U.S, Government Activities:
U.S, negotiator with Cuba to secure the return of criminals sent to the United States during the Mariel boat crisis. Signed the first migration accord with Cuba
on behalf of the United States and led implementation talks thereafter.
Special Presidential envoy to negotiate the departure of General Noriega (1988). Ambassador Kozak accompanied our forces in Panama to help the new
government establish the core institutions of democracy (1989),
Assistant negotiator for the Panama Canal treaties (1971-1977). Was responsible for negotiating treaty text with the Panamanian negotiators and later for
working with members of Congress for approval ofthe treaties and of implementing legislation (1977-81).
Staff of the Middle East peace negofta/or (1982-83). Helped implement the Camp David accords and negotiate the withdrawal of the PLO from Lebanon.
State Department Superior Honor Award
Younger Federal Lawyer Award
Presidential Ranks of Distinguished and Meritorious Executive
Order of Balboa (presented by the president of Panama)
Education:
* Juris Doctor, University of California at Berkeley, 1971 (Assistant Managing Editor, Law Review)
A.B , Political Science, University of California at Berkeley. 1968
For more information, visit the Bureau of Democracy, Human Rights, and Labor.
i)^
PROSECUTION EXHIBIT 2o| for idenfification
PAGA O/FCRED: PAGE ADMIJ/ED:_
PAGE OF PAGES
PAKISTAN
Administrative Divisions
UZBEKI STAN i DUSHANBE
T URKMENI ST AN
TAJIKISTAN
CHI NA
GILGIT-
^^^^^BALTISTAN
KABUL
AFGHANI STAN
. KHYBER
^ PAKHT UNKHWA, ^ ^ ^ ^ ^
Muzaffarabad^ ^
^Peshawar
J^i y
FEDERALLY
ADMINISTERED
TRIBAL
AREAS*
0 KAiHl/tm ^
* | /^ISLAMABAD
ISLAMABAD ^ ISLAMABAD
CAPITAL
TERRITORY'
NEW DELHI
BALOCHISTAN
I RAN
Arabian Sea
PROSECUTION E X H I B I T ^ for identification
PAGE OFFERED: _ PAGEADMITTED:
PAGE OF PAGES
International boundary
Province-level boundary
National capital
Province-level capital
Pakistan has tour provinces, one territory',
anri one capital territory '*.
The Pakistani-administered portion of the
disputed Jammu and Kashmir region
consists of two administrative entities:
Azad Kashmir and Gilgit-Baltistan.
AZCKS Kashmir and Gilgit-Baltistan ore not
constitutionally part ol Pakistan.
200 KiloniMen
100
Scale 1:10/100,000
200 MIk;
Prosecution Exhibit 203
20 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial
Prosecution Exhibit 20^
2pages
ordered sealed for Reasons
Military Judge's Seal Order
dated20August2013
stored in the original Record
GfTrial
DDDD
DDDD I'd be curious to hear that story about theft from a safe Inside a
DDDD locked unit...
DDDD
DDDD
DDDD
DDDD On 5/19/10 3:29 PM, Danny Clark wrote:
DDDDD Short version:
DDDDD (a) Can anyone recommend a hard-to-pick-but-not-insanely-expensive
DDDDD padlock? Does not need to be resistant to more forceful (drilling etc)
DDDDD techniques. (e,g, it is accepted that it will not actually stop a
DDDDD determined attacker, but it should be obvious if it has been
DDDDD defeated).
DDDDD
DDDDD (b) I f you have strong negative experience with Metropolitan, it would
DDDDD help a lot of people to post a review, for instance at:
DDDDD http://www,Yelp.com/biz/metropolitan-moving-and-storage-corp-cambridge-2
DDDDD
DDDDD Long version:
DDDDD
DDDDD So I off-handedly brought up Metropolitan Storage Warehouse in SIPB
DDDDD office yesterday, and it seems that this is not true:
DDDDD http://imQ227,exs,cx/imQ227/4259/ragewarehouse5ka,jpg - e.g, it is not
DDDDD Ire Proof:-/
DDDDD
DDDDD In quick secession from about a quarter of the small number of people
DDDDD present I got horror stories regarding water damage, theft, theft from
DDDDD safes *inside* locked units, and a general critique of their overall
DDDDD security.
DDDDD
DDDDD However I was unable to find anything remotely like that from the
DDDDD interwebs, specifically only these 2 sites seem to have reviews:
DDDDD
DDDDD http://www.bbb.org/boston/business-reviews/storage-units-household-and-
commercial/metropolltan-movina-storaae-corporation-in-cambridae-ma-3494/
DDDDD (very positive)
DDDDD
DDDDD http://www.yelp.com/biz/metropolitan-moving-and-storage-corp-cambridge-2
DDDDD (mixes, but the negative review has nothing to do with things atxiut
DDDDD the place that are nonobvious).
DDDDD
DDDDD So if you have had a suck experience it would be good to post there /
DDDDD report it (or just reply and I'll post a summary to Yelp!). Feel free
DDDDD to forward this to the original source of the stories, as a lot of
DDDDD what I got was 2nd or 3rd hand I think,
DDDDD
DDDDD Thanks,
DDDDD
DDDDD \ | / Daniel JB Clark j Activist; Owner
DDDDD FREEDOM -+-D INCLUDED ~ http: / / f reedomi nd uded .com
DDDDD / | \ Free Software respecting hardware
DDDD
D
From: electronic ma^
To: Danny Claris
^ ^^^rit2i^lin^iedl^Cl^ri^tian^^Terni^^^^ii:i|^^l^te^Dayidl^^^^^^
Subj ect: Re:^OT^ Metropolitan Storage Warehouse horror stories
Date: Thursday, May 20, 2010 5:22:02 PM
iusethe metropolitan Storage warehouse and from my limited experience With them thus far i've been
happy with them, acolleague of mine storedasomewhat substantial collection of fine art and had no
problems whatsoever,
as for me,ijustneededaconvenient and cheap place to store my vinyl record collection nothing
terribly valuable but quite heavy and fragile and climate sensitive nonetheless, based on the size, price
and overall experience with their managementiwould heartily recommend them over the nearby
alternative UHAUL which, if anything, is gangster central overpriced, unprofessional, and really
crummy woodenwalled holes, the only thingsihave heard from others who use it were positive i've
heard no horror stories ever,
with respect to security whatidid notice is that the warehouse sometimes keeps its loading bay doors
open during operating hours and the building is SO INCREDIBLYhuge that it would be possible for
someone to sneak in and hide out inside, the building is so old that afaict they did not have extensive
surveillance on the inside which is one thing that would make them substantially better,
my2pence,
maxinlondon
On May 20, 2010, at 7:14PM, Danny Clark wrote:
DYes, but there is no power,and no wifi, so it would beabit tricky,
D
DWould probably want to renew my amateur radio license:-)
D
DAlsoFYIIgot police reports forthe last2years for the Site, only one might be due to Metropolitan
negligence so either this isn't reallyaproblem in practice, people are too lazy to file police reports
when their stuft gets stolen, or the person doing the records check made amistake(eg perhaps the
reports were filed under the person's residence address instead of the warehouse address),,.
D
D Forwarded message
DFrom:DiNatale,Francine^fdinatale^cambridgepolice.orgD
DDate: Thu, May 20, 2010 at 12:10 PM
DSubject:RE: Getting all theft reports foracertain address?
DTo: Daniel Clark^dclark^pobox.comD
D
D
DHi Daniel,
D
D
DThere were only21arceny reports from Metro. Moving^Stor, one of the thefts was an actual
aquaintence that the owner left in the unit while she went and rentedatruck (that was in 2009), The
other larceny that took place in March of this year is still under investigation,
D
D
D
D
DFrancineDiNatale
D
DAdministrative Assistant Records Unit
D
D 617 349 3354
D
DFax: 349 3234
D
D
D
D ^1/ Daniel JBClarklActivist; Owner
DFREEDOM^DlNCLUDED~http://freedomincluded.com
D / l ' ^ Free Software respecting hardware
D
D
DOn Wed, May 19, 2010 at 6:15 PM, seph ^seph^miLeduD wrote:
DCan you stickavideo camera into your space?
D
Dseph
D
DEric Schmiedl ^unlocked^MIT.EDUD writes:
D
DDTwo options:
DD
DDo) Use the 8088 in parallel to theexi sti ngpadl ockanddon' ttel l
DDmanagement,
DD
DD
DDo) Get one of these:
DDhttps://securitysnobs,com/AbloyProtecPL321Padlock,html
DD$25f or al ock that nobody will pick any time soon,
DDhttps://securitysnobs,com/AbloyProtec PL 330 Padlock.html
DD$70f or al ock that will put upabi t of af i ght against forced entry,
DD
DDThen put one of these on your unit to keep out insiders:
DDhttps://securitysnobscom/StantonConceptsPrivaSealTamperIndicativeSeals20Pack.html
DD
DD
DD
DD
DD
DDOn 5/19/104:51 PM, Christian J,Ternus wrote:
DDDUnfortunately,Danny misheard me. l owned the "safe" in question
DDDi t was one of these: http://wwwamazoncom/dp/B000I^OX94/ The thief
DDDsi mpl ytooki t,
DDD
DDDl asked the warehouse management to let US use our own locks;
DDDapparently their policy forbids this. Let us know if you have better
DDDluck,
DDD
DDD Ternus
DDD
DDD
DDDChr i st i anJ, Ter nusl MTr MEng' l l | AC3T| ct er nus, net l 617 710 8955
DDD
DDD
DDD
DDD
DDDOn Wed, May 19, 2010 at 4:43 PM,Eric Schmiedl ^unlocked^miLeduD wrote:
DDDDGo on eBay and get an S^G 8088 for $9 and be done with it:
DDDDhttp://shop,ebay,com/i,html?nkw^saroent^oreenleaf^8088
DDDD
DDDDThe lock is designed for precisely this kind of situation,,,very
DDDDdifficult to defeat surreptitiously,not really resistant to forced entry.
DDDD
DDDDi ' d be curious to hear that Story about t hef t f romasaf ei nsi dea
DDDDlockedunit...
DDDD
DDDD
DDDD
DDDDOn 5/19/10 3:29 PM, Danny Clark wrote:
DDDDDShort version:
DDDDD(a)Can anyone recommendahardtopi ckbutnoti nsanel yexpensi ve
DDDDDpadlock? Does not need to be resistant to more forceful (drilling etc)
DDDDDtechniques. (e.g.i t is accepted that it will not actually stopa
DDDDDdeterminedattacker,but it should be obvious if it has been
DDDDDdefeated),
DDDDD
DDDDD(b) I f you have strong negatlveexperiencewith Metropolitan, i twoul d
DDDDDhel pal ot of people to postareview, for instance at:
DDDDDhttp://wwwyel pcom/bi z/metropol i tanmovi ngandstoragecorpcambri dge2
DDDDD
DDDDDLong version:
DDDDD
DDDDDSoI of f handedl y brought up Metropolitan Storage Warehouse in SIPB
DDDDDofficeyesterday,and it seems that this is not true:
DDDDDhttp://img227.exs.cx/img227/4259/ragewarehouse5ka.jpg e. g. i t i snot
DDDDDi re Pr oof : /
DDDDD
DDDDDi n quick secession from aboutaquarter of the small number of people
DDDDDpresentl gothorror stories regardingwater damage, theft, theftfrom
DDDDDsafes^inside^ locked units, andageneral critique of their overall
DDDDDsecurity,
DDDDD
DDDDDHoweverl was unable to find anything remotely like that from the
DDDDDinterwebs, specifically only these2si tes seem to have reviews:
DDDDD
DDDDDhttp://www.bbb,org/boston/businessreviews/storageunitshouseholdand
commercial/metropolitanmovinostoraoecorporationincambridoema 3494/
DDDDD(very positive)
DDDDD
DDDDDhttp://www.yelp,com/biz/metropolitanmovinoandstoraoecorpcambridoe2
DDDDD(mixes, but the negative review has nothing to do with things about
DDDDDthe place that are nonobvious).
DDDDD
DDDDDSo if you have hadasuck experience it would be good to post t here/
DDDDDreport i t (or just reply and I'll postasummarytoYel pl ),Feel free
DDDDDto forward this to the original source of the stories, asal ot of
DDDDDwhat I got was2ndor 3r dhandI t hi nk,
DDDDD
DDDDDThanks,
DDDDD
DDDDD ^1/ Daniel JBClarklActivist; Owner
DDDDDFREEDOM^Dl NCLUDED~http://freedomi ncl udedcom
DDDDD /^^ Free Software respecting hardware
DDDD
D
UNITED STATES OF AMERICA
V.
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211
STIPULATION OF
EXPECTED TESTIMONY
SA David Shaver
16 August 2013
It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that i f SA David
Shaver were present to testify during the presentencing phase of this court-martial, he would
testify substantially as follows:
1. Prosecution Exhibit (PE) 205 is an email that I pulled from the allocated space in the
accused's personal Macintosh computer. The personal Macintosh was previously admitted as PE
11. The email was located in the sent folder of the Thunderbird email client. Thunderbird email
client is the program which hosts emails from the accused's gmail and earthlink email accounts.
The email is entitled "Happy Thanksgiving [Belated]," and the accused sent the email to Mr.
Tyler Watkins on 28 November 2009.
2. PE 206 is a summary I created of numerous emails that I found in the allocated space ofthe
accused's personal Macintosh computer. To locate the emails, I searched for "Daimy Clark" or
"Daniel Clark" in the accused's Thunderbird email client, both in the sent folder and the inbox
folder. The filtered results showed all the emails between the accused and Mr. Clark and showed
information inthe following fields: "To," "From," "Cc," "Subject," "Sent," and "Received." I
then took a screenshot of the search results, which is what you see in PE 206. I discovered that
there were twenty-seven messages in the 23 August 2009 to 20 May 2010 timeframe. In the
"From" and "To" lines, the email recipients are typically listed by name only. The names
"Danny Clark" and "Daniel Clark" correspond to the email addresses "dclark(gmit.edu,"
dclark(^pobox.com," and "[email protected]." Bradley.manning(^earthlink.net,
Bradley Maiming, Brad Manning, and Bradley, are all emails or names that correspond to emails
of the accused.
3. PE 207 is a screenshot of a configuration file showing encryption contacts located in the
allocated space of the personal Macintosh computer. Specifically, the file was located at the
following path: "\Macintosh HD\Users\bmanning\Library\Application SupportVAdium
2.0\Default\otr.fingerprints." Adium is the chat client that the accused used on his personal
Macintosh computer. Off the Record (OTR) is an add-on to that chat client, which is used to
encrypt chat communications while they are in transit. OTR requires both contacts or parties to
share their encryption keys to enable chat communications. To complete this process, one party
requests the initiation of encrypted conversation and the receiving party accepts the invitation.
The parties then exchange unique encryption keys which serve as decoders to enable each
computer receiving a message to translate the encrypted message into readable text. The
screenshot reveals the individuals with whom the accused has shared encryption keys, which
includes "danny(gopensysadmin.com." As previously stated, the email address
"danny(^opensysadmin.com" corresponds to Mr. Danny Clark
1 PROSECUTION EXHIBIT ^f bpAnt i f i c s t i on
FAGE OFFERED: FACE ADMITTED:
PAGE OF PAGES
^. PE 208 isaportionofachatthatllocated and carved out of the unallocated space on the
accused's personal Macintosh computer. Isearched the unallocated space for deleted chats
between Mr. Clark's email address "danny(@opensysadmin.com" and the accused. Ithen
formatted the results, so the inf:^rmation was easierto read. The portion of the chat thatllocated
occurred onI8March2010and was between "[email protected]" ("alias^Bradley
Manning") and"danny(^opensysadmin.com"("alias^Danny Clark").
ANGEFOVERGAARD
CPT,^A
Assistant Trial Counsel
.lOSHUAFTOOMAN
CPT,^A
Military Defense Counsel
BRA
PFC, USA
Accused