may- 1 0 use use USC 424 U50 3024 1 U Table of Contents UIIFOUO Executive Summary 3 UIIFOUO Background 6 Impact Assessment 9 UIIFOUO Annex A Terms of Reference 19 -22 Annex 11 I use Annex C 24 UHFOUO Annex D UIIFOUO Annex E UJIFOUO Annex F Annex G Distribu on 39 oi use 2 use 424 use 30240 pagg s 4 n l we in full and not included A wage -we Pages and 8 are withheld in full and not included bl 3li 10 USC 3 250 gli BACKGROUND 302 4% 1_ 4 la fomier NSA contractor compromised Ifrom NSA Net and the Joint Worldwide Intelligence Communications System JWICS On 6 June 2013 media groups published the first stories based on this material and on 9 June 2013 they identi ed the source as an NSA contractor who had worked in Hawaii 3 1c use use 3024 I Ufz F6U6j On I 1 July 2013 LTG directed establishment of the Information Review Task Force 2 IRTF-2 to acquire triage analyze and assess all DIA and compromised information Since 11 July 2013 IRTF-2 has led a coordinated DOD effort to discover triage and assess the impact of non-NSA Defense material from NSA holdings of compromised data of 18 December 2013 the federated IRTF-2 assessment community includes re use use 3024 i - 424 USO 30240 Pages 10 and 11 are withheld in USO 424 b full and not included USC use U IMPACT ASSESSMENT USO -USC USC I a 424 b USC 3024 1 Pages 13 thru 18 are U30 use withheld in full and not 0 Included 424 use 3024 $131110 Intelligence Capability Eiaig ilyai The scope of the compromised knowledge related to US intelligence U30 capabilities is staggering I 3 10 use 424 b 3 I50 use -3924 Q USC 51 1 - 9- - - sages 21 thru 26 are withheld in full and not included bll3 1'l0 U59 3 250 USC U As speci ed in E0 12953 as amended information may be classi ed at one of the following three levels 0 Top Secret shall be applied to information the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to national security 1 Secret shall be applied to information the unauthorized disclosure of which reasonably could be expected to cause serious damage to national security I Con dential shall be applied to information the unauthorized disclosure of which reasonably could he expected to cause damage to national security U By CI Damage De nitions U Responsibility for national assessments was assigned to by the Countezintelligence Enhancement Act of 2002 and reaffirmed by the Intelligence Reform and Terrorism Prevention Act of 2004 U Four Major Categories I - I I 3 Per 0NcIx 3 150 USO 31 50 use 30240 49 Annex Pages 28 thru 31 are withheld In full and not included 3 150 USC 3024 1 USEC 424 63 3 150 USC 302-4 i 2 Pages 33 lhru 35 are withheld in full and not included Annex Ugo 3 50 use 30240 USC 424 03 USC $02-4 i 32 Pages 3 and 38 are withheld in full and not included Annex L33f 3 3 250 USC 424 03 3 150 USO 3_024 i 36 Annex G Distribution use 42-my Chart Classi ed W50 U53 30240 Deputy Under Secretary of Defense for Intelligence and Security Director for Intelligence 12 Joint Staff ibl 3 335O Department of the Army use 3e24m I-Ieadquarters U-S Marine Corps l epartment of the Navy Depamnent of the Navy l-Ieadquarters Air Force Headquarters U S Air Force Coast Guard U S Africa Command U S Cen1 raJ Command Cyher Command U S European U S Northern Command U S Paci c Command U S Strategic Command U S Transportation Command US Southern Command US Special Operations Command O iee of Director of National Intelligence USC 424 b 3 150 USC 3 Q24 i 39
OCR of the Document
View the Document >>