Title: Volume FOIA 054

Release Date: 2014-03-20

Text: 17033

Volume 54 of 111
SJAR ROT
FOIA Version

VERBAT IM 1

RECORD OF TRIAL2

(and accompanying papers)

of
(Name: Last, First, Middie initiai) (Sociai Security Number) (Rank)
Headquarters and
Headquarters Company,
United States Army Garrison U-S- Army FCDIJC Ml/er: VA 22211
(Unit/Command Name) (Branch of Service) (Station or Snip)
By
GENERAL COURT-MARTIAL
Convened by Commander

(Titie of Con vening Authority)

UNITED STATES ARMY MILITARY DISTRICT OF WASHINGTON
(Unit/Command of Con vening Authority)

Tried at

Fort. Meade, MD on see below

(Piace or Piaces of Triai) (Date or Dates of Triai-9

Date or Dates of Trial:

23 February 2012, 15-16 March 2012, 24-26 April 2012, 6-8 June 2012, 25 June 2012,

16-19 July 2012, 28-30 August 2012, 2 October 2012, 12 October 2012, 17-18 October 2012,
7-8 November 2012, 27 November - 2 December 2012, 5-7 December 2012, 10-11 December 2012,
8-9 January 2013, 16 January 2013, 26 February - 1 March 2013, 8 March 2013,

10 April 2013, 7-8 May 2013, 21 May 2013, 3-5 June 2013, 10-12 June 2013, 17-18 June 2013,
25-28 June 2013, 1-2 July 2013, 8-10 July 2013, 15 July 2013, 18-19 July 2013,

25-26 July 2013, 28 July - 2 August 2013, 5-9 August 2013, 12-14 August 2013,

16 August 2013, and 19-21 August 2013.

1 insert ?verbatirri or ?surrimarizeo? as appropriate. This form be used by the Army and Navy for verbatim records of triai

2 See inside back co ver for instructions as to preparation and arrangement.

DD FORM 490, MAY 2000 PREWOUS OBSOLETE Front Cover

17034

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2665639 f o r Applicant SSN < M l H H d(b)
(6)

Page 17 o f 29
Generated Copy

Dates of Activity
From (Month/Year): 08/1988 To (Month/Year): 09/2005
Type of Employment
Active military duty stations: { }
National Guard/Reserve: { }
U.S.P.H.S. Commissioned Corps: { }
Other Federal employment: { }
State Government (Non-Federal employment): { }
Self-employment: { }
Unemployment: { x }
Federal Contractor: { }
Other: { }
List the name of the person who can verify your unemployment.
Verifier Name: (b) (6)
Verifier's Street Address
Street: (b) (6)
City:(b) (6)
State: (b) Country: Zip Code: (b) (6)
(6)
Verifier's Telephone Number
Number:(b) (6)
(End of List)

Section 12: People Who Know You Well
List three people who know you well and live in the United States. They should be good friends, peers, colleagues, college
roommates, etc., whose combined association widi you covers as well as possible the last 7 years. Do not list your spouse,
former spouses, or other relatives, and try not to list anyone who is listed elsewhere on this form.

'•

Dates Known
From (Month/Year): 01/1996 To (Month/Year): Present
Name: (b) (6)
Home or Work Address
Street: (b) (6)
City: (b) (6)
State:(b) Country: Zip Code: (b) (6)
(6)
Telephone Number
Number:(b) (6)
Time: Night

2-

Dates Known
From (Month/Year): 09/1993 To (Month/Year): Present
Name:(b) (6)

G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0

00:22:35.226

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

PRIVACY ACT INFORMATION

17035

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2555539 f o r A p p l i c a n t SSN #####^(b)
(6)

Page 18 of 29
Generated Copy

Home or Work Address
Street: (b) (6)
City:(b) (6)
State:(b) Country: Zip Code:(b) (6)
(6)
Telephone Number
Number:(b) (6)
Time: Night
3-

Dates Known
From (Month/Year): 08/1993 To (Month/Year): Present
(b) (6)
Name:
Home or Wor(b) (6)
Stre(b) (6)
4701(b) fee Creek Road (b) (6)
City: Edmond State:(6)
QK Country: Zip Code: 73034
Telephone Number
Number: ((b) (6)
Time: Night
(EndofUst)

Section 13/15: Your Spouse
Mark one item to show your current marital status.
Marital Status
Never Married: { x }
Married: { }
Separated: { }
Legally Separated: { }
Divorced: { }
Widowed: { }
Other: { }
Current Spouse ( Not Applicable: { x } )
(No Entry Provided)
Former Spouse(s) ( Not Applicable: { x } )
(No Entry Provided)

Section 14/15: Your Relatives and Associates
Give the full name, correct code, and other requested information for each of your relatives and associates, living or dead,
specified below.
1.
2.
3.
4.
Generated

Mother
Fadier
Stepmother
Stepfather
on 2 0 0 7 - 1 0 - 1 0

00:22:35.226

PRIVACY ACT

INFORMATION

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

IV

17036

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2665539 f o r A p p l i c a n t SSN ^^1^111^^1(b)

Page 19 o f 29
Generated Copy

(6)
5.
6.
7
8.
9
10.
11.
12
13.
14.
15.
16.
17
18.
19

Foster Parent
Child(Adopted and Foster Child also)
Stepchild
Brother
Sister
Stepbrodier
Stepsister
Halfbrother
Halfsister
Father-inlaw
Mothertnlaw
Guardian
Other Relatives
Associated
Adult Currently Living widiYou

mother Relative-include only foreign national relatives not listed i n l - 1 6 w i d i whom you or your spouse are bound by
affection, obligation,or close and continuing contact Associate-include only foreign national associates with whom you or
your spouse are bound by affection, obligation, or close and continuing contact.

^

Relationship Type: Mother
Full Name
Last:(b)
Deceased

First: Susan Middle: Mary Suffix:

(6)

Yes:^^No:^x^
DateofBirth
Month/Day/Year:
Country of Birth
CountrvUNITEDKINGDOM
Country(ies)of Citizenship
^

Country; UNITED KINGDOM

(^^^^i^^Co^^r^^i^^,)^^Ci^i.^^^s^^^^^^r,)
Provide the following information if this person is living.
Current Address

(b) (6)

Citv: Haverfordwest State: Country: UNITED KINGDOM
Section15: Citizenship o f Y o u r Relatives and Associates
If your mother, 1ather,sister, brother, child, or person with whom you haveaspouse-like relationship isaU.S.citizen
by other than birdi, or an alien residing in the U.S.,provideaProof of Citizenship Status entry below.
Proof of Citizenship Status

G e n e r a t e d on 2007 10 10 00 :22:35 226
Data Hash Code: 8 4 2 0 8 e d e 2 5 b 8 8 1 5 1 2 d 8 f c f 4 a f 8 f f 5 e e e 0 5 d l 9 8 8 a

PRIVACY ACTINFORMATION

17037

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN ^^1^^11111(b)
(6)

Page 20 o f 29
Generated Copy

Provide one or more of die following to identify proof of citizenship status.

Naturalisation Certificate
Certificate Number:
Provide the date issued and the location where the person was naturahzed (Court, City and State).
Date Issued
Month/Dav/Year:^/^/^
Court:
Location
City: State:
Citizenship Certificate
Certificate Number:
Provide the date and location issued (City and State).
Date Issued
Location
Month/Dav/Year:^/^/^
Issued
City: State:
Alien Registration
Registration Number:
Provide the date and place where the person entered theU.S.(City and State).
Date EnteredUS
Month/Dav/Year:-/^/Place EnteredU S
City: State:
Other
Provide an explanation in the space below.
Explanation
Mother is n o t a c i t i z e n o f t h e United States but i s a c i t i z e n o f t h e UK

2^

RelationshipType: Father
Full Name
Last: Manning First: Brian Middle: Edward Suffix:
Deceased

Generatedon 2007 10 10 00:22:35 226
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

PRIVACY A C T I N F O R M A T I O N

^(^

17038

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2665639 f o r Applicant SSN ##### (b) (6)

Page 21 o f 29
Generated Copy

Yes: { } No: { X }
Date of Birth
Month/Day/Year:t
Country of Birth
Country: UNITED STATES
Country(ies) of Citizenship
1

Country: UNITED STATES
(End ot Country(ies) of Citizenship List)

Current Addr
Street (b) (6)
City:(b) (6)

State:(b) Country:
(6)
Section 15: Citizenship of Your Relatives and Associates
Proof of Citizenship Status
(No Entry Provided)

3-

Relationship Type: Sister
Full Name
Last: Major First: Casey Middle: Manning Suffix:
Deceased
Yes: { } No: { X }
Date of Birth
Monlh/Day/Year:J
Country of Birth
Country: UNITED STATES
Country(ies) of Citizenship
1

Country; UNITED STATES
(End of Country(ies) of Citizenship List)

Current Address
Street: (b) (6)
City:(b) (6)

State:(b) Country:
(6)
Section 15: Citizenship of Your Relatives and Associates
Proof of Citizenship Status
(No Entry Provided)
(End of List)

Generated

on 2 0 0 7 - 1 0 - 1 0

00 : 2 2 : 3 5 . 2 2 5

PRIVACY A C T

INFORMATION

Data Hash Code: 8 4 2 0 8 e d e 2 5 b 8 8 1 5 1 2 d 8 f c f 4 a f 8 f f 5 e e e 0 5 d l 9 8 8 a

^7

17039

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN
(b)
(6)

Page 22 o f 29
Generated Copy

Section 16: Your Military History
Answer the following questions.
a. Have you served in the United States military?
Yes: { } No: { X }
b. Have you served in the United States Merchant Marine?
Yes: { } No: { X }
List all of your military service below, including service in Reserve, National Guard, and U.S. Merchant Marine. If you had a
break in service, each separate period should be listed. If your service was with other than the U.S. Armed Forces, identify
the country for which you served.
Military History ( Not Applicable: { x } )
(No Entry Provided)

Section 17: Your Foreign Activities
Answer ihe following questions.
a. Do you have any foreign property, business connections, or financial interests?
Yes: { } No: { X }
b. Are you now or have you ever been employed by or acted as a consultant for a foreign government,
firm or agency?
Yes: { } No: { X }
c. Have you ever had any contact with a foreign government, its establishments (embassies or
consulates), or its representatives, whether inside or outside the U.S., other than on official U.S.
Government business? (Does not include routine visa applications and border crossing contacts.)
Yes: { } No: { X }
d. In the last 7 years, have you had an active passport that was issued by a foreign government?
Yes: { } No: { X }
If you answered " Yes"' to one or more of the questions above, provide a detailed entry for each period of foreign activity.

(No Entry Provided)

Section 18: Foreign Countries You Have Visited
List foreign countries you have visited, except on travel under official Government orders, working back 7 years. ( Travel as a
G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0

00:22:35.226

PRIVACY ACT INFORMATION

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

20

17040

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2665539 f o r A p p l i c a n t SSN MMMV^9(b)
(6)

Page 23 o f 29
Generated Copy

dependent or contractor must be listed.)Include short trips to Canada or Mexico. If you lived nearaborder and have made
short(one day or less) trips to the neighboring country, you do not need to list each trip. Do not repeat travel covered in
sections 9,10, o r l l .
Foreign Travels ( Not Applicable: { } )
1•

Indicate the purpose of your visit. If you lived near a border and have made short (one day or less) trips to the
neighboring country, provide the time period, purpose, country and check the " Many Short Trips" box.
Dates of Activity
From (Month/Year): 03/2006 To (Month/Year): 03/2006
Purpose of Visit
Business: { } Pleasure: { x } Education: { } Other: { }
Countries Visited
1

Country: UNITED KINGDOM
(End of Countries Visited List)

Many Short Trips: { }
^

Dates of Activity
From (Month/Year): 11/2001 To (Month/Year): 09/2005
Purpose of Visit
Business: { } Pleasure: { } Education: { } Other: { x }
Countries Visited
Country: UNITED KINGDOM
(End ol Countries Visited List)

Many Short Trips: { }
3

Dates of Activity
From (Month/Year): 10/2004 To (Month/Year): 10/2004
Purpose of Visit
Business: { } Pleasure: { x } Education: { } Other: { }
Countries Visited
1-

Country: JAPAN
(End of Countries Visited List)

Generated

on

2007-10-10

00 : 2 2 : 3 5 . 2 2 6

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

PRIVACY A C T

INFORMATION

17041

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN #MMN#(b) (6)

Page 24 of 29
Generated Copy

Many Short Trips: { }
(EndofUst)

Section 19: Your Military Record
Answer the following question.
Have you ever received other than an honorable discharge from the military?
Yes: { } No: { X }
If "Yes," provide the date of discharge and type of discharge below.

Date Of Discharge
Month/Year: - 1 ~
Type of Discharge:

Section 20: Your Selective Service Record
Answer the foltowing question.
a. Are you a male born after December 31,1959?
Yes: { X } No: { }

If you answered "Yes" to question a, answer the following question.
b. Have you registered with the Selective Service System?
Yes: { X } No: { }
If you answered "Yes"" to question b, provide your registration number. If "No," show the reason for your legal exemption.

Registration Number: (b) (6)
Legal Exemption Explanation ( I Do Not Know: { } )

Section 21: Your Medical Record
Answer the following question.
In the last 7 years, have you consulted with a mental health professional (psychiatrist, psychologist.

G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0

Data Hash Code:

00:22:35.226

PRIVACY ACT INFORMATION

84208ede25b881512d8fcf4af8ff5eee05dl988a

30

17042

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN^1^111^11^^(b) (6)

Page 25 o f 29
Generated Copy

counselor,etc.)or have you consulted with another health care provider aboutamental health related
condition?
Yes:^^No:^x^
If you answered''Yes,"provide an entry for each treatment to report,unless the consultation(s)invoIved only maritaL family,
or grief counseling, not related to violence by you.
(^/Vo^^t^P^oiB/ded)

Section 22: Your Employment Record
Answerthefollowingquestion
Has anyofthe following happened to you in the Iast7years?
t.
2.
3.
4
5

Fired fromajob.
Ouitajob after being told you'd be fired
Leftajob by mutual agreement following allegations of misconducL
Leftajob by mutual agreement following allegations of unsatisfactory performance
Leftajob for other reasons under unfavorable circumstances

Yes:^^No:^x^
If you answered "Yes,"provideadetailed entry for each occurrence to report.

(^/Vo^nfry/^r^ov/c(ed)

Section 23: Your Police Record
For this item, report information regardless of whether the record in your case has been''sealed"or otherwise stricken from
the court record. The single exception to this requirement is for certain convictions under the Federal Controlled Substances
Act for which the couri issued an expungement orderunderthe authority of21 U.S.C. 844 or 18 u s e . 3607.
Answerthefollowingquestions
a. Have you ever been charged with or convicted of any felony offense? (Include those unCer Uniform
Code of Military Justice)
Yes:^^No:^x^
b Have you ever been charged with or convicted ofafirearms or explosives offense?
Yes:^^No:^x^
c Are there currently any Charges pending against you for any criminal offense?
Yes:^^No:^x^
d. Have you ever been charged with or convicted of any offense(s) related to alcohol or drugs?
Yes:^^No:^x^
Generated on 2007-10-10 00:22: 35.226
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

PRIVACY A C T I N F O R M A T I O N

^

17043

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2665639 f o r Applicant SSN^il1l^11^l1111ll(b)
(6)

Page 26 o f 29
Generated Copy

e. In the Iast7years,have you been subjectto court martial or other disciplinary proceedings underthe
Uniform Code of Military Justice? (Include non judicial. Captain's mast, etc.)
Yes:^^No:^x^
f In the Iast7years, have you been arrested for,charged with,or convictedof any offense(s) not listed in
response to a, b,c,d,oreaboye? (Leave out traffic fines of less than ^150 unless the violation was
alcohol or drug related )

Yes:^^No:^x^
If you answered "Yes"to a, b,c,d,e,orfabove, provide an entry for each occurrence to report.
(^O^B^^^^FOiB/ded)

Section 24: Your ^se of Illegal Orugs and Orug Activity
The following questions pertain to the illegal use of drugs or drug activity. You are required to answer the questions fully and
truthfully, and your failure to do so could be grounds for an adverse employment decision or action against you, but neither
your truthful responses nor information derived from your responses will be used as evidence against you in any subsequent
criminal proceeding.
Answerthefollowingquestions
a. Since the age o f t ^ o r in the Iast7years.whichever is shorter.have you illegally used any controlled
substance, for example, marijuana, cocaine, crack cocaine, hashish, narcotics (opium, morphine,
codeine, heroin, etc ), amphetamines, depressants (barbiturates, methaqualone, tranquilizers, etc ),
hallucinogenics (LSD, PCP, etc), orprescription drugs?
Yes:^^No:^x^
b Have you ^ y ^ illegally usedacontrolled substance while employed asalaw enforcement officer,
prosecutor,or courtroom official: while possessingasecurity clearance: or while inaposition directly and
immediately affecting the public safety?
Yes:^^No:^x^
c. In the Iast7years,have you been involved in the illegal purchase,manufacture,trafficking, production,
transfer,shipping,receiving, or sale of any narcotic, depressant, stimulanL hallucinogen,or cannabis for
your own intended profit or that of another?
Yes:^^No:^x^

If you answered "Yes"toaorbabove, provide an entry for each controlled substance orprescription drug used.

^^oE^r^fr^^rov^ded)

Section 25: Your l^se of Alcohol
Answerthefollowingquestion
Generatedon 2007 10 10 00 :22 35.226
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

PRIVACY A C T I N F O R M A T I O N

^2

17044

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN 4HMHI-(b)
(6)

Page 27 of 29
Generated Copy

In the last 7 years, has your use of alcoholic beverages (such as liquor, beer, wine) resulted in any
alcohol-related treatment or counseling (such as for alcohol abuse or alcoholism)?
Yes: { } No: { X }
If you answered "Yes," provide an entry for each Ureatment to report. Do not repeat information reported in response to
section 21.
(No Entry Provided)

Section 2^: Your Investigations Record
Answerthefollowingquestion.
a.Has the United States Government ever investigated your background and/or granted youasecurity
clearance? If your response is "NoB'or you don't know or can't recall if you were investigated and
cleared, check the'^No^^ box.
Yes:^^No:^x^
If you answered "Yes," provide the requested information below.
(No Entry Provided)
Answer the following question.
b. To your knowledge, have you ever had a clearance or access authorization denied, suspended, or
revoked, or have you ever been debarred from government employment? (An administrative downgrade
or termination of a security clearance is not a revocation.)
Yes: { } No: { X }
If you answered "Yes," provide the requested information below.

(No Entry Provided)

Section 27: Your Financial Record
Answer the following questions.
a. In the last 7 years, have you filed a petition under any chapter of the bankruptcy code (to include
Chapter 13)?

Yes: { } No: { X }
b. In the last 7 years, have you had your wages garnished or had any property repossessed for any
reason?

Yes: { } No: { X }
Generated on 2007-10-10 00:22:35.226
Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

PRIVACY ACT INFORMATION

17045

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2665639 f o r A p p l i c a n t SSN ^1^ilill1^^1(b)
(6)

Page 28 of 29
Generated Copy

c. In the Iast7years,have you hadalien placed against your propertyforfailing to pay taxes or other
debts?
Yes:^^No:^x^
d In the Iasl7years,have you had any judgments against you that have not been paid?
Yes:^^No:^x^
If you answered "Yes" to a, b,c, or d, provide an entry for each occurrence to report.
(^^o^^tr^P^oiB/dec^

Section 28: Your Financial Oelinguencies
Answerthefollowingquestions
a. In the Iast7years,have you been over 180 days delinquent on any debt(s)?
Yes:^^No:^x^
b Are you currently over90 days delinquent on any debt(s)?
Yes:^^No:^X^
If you answered "Yes" toaorb, provide an entry for each occurrence to report.

(/VoE/7tr^^^oi^^dec^

Section 29: Pul^lic Record Civil Court Actions
Answerthefollowingquestion
In the Iast7years,have you beenaparty to any public record civil court actions not listed elsewhere on
this form?
Yes:^^No:^x^
If you answered "Yes,"provide the information about each public record civil court action.

(^oE^r^f^^^oiB^ded)

Section 30: Your Association Record
Answerthefollowingquestions.
a Have you ever been an officer oramember or madeacontribution to an organization dedicated to the
Generatedon

2007

10 10 00 : 2 2 : 3 5 . 2 2 6

Data Hash Code: 84208ede25b881512d8fcf4af8ff5eee05dl988a

PRIVACY ACT INFORMATION

17046

E l e c t r o n i c Questionnaires f o r I n v e s t i g a t i o n s Processing (e-QIP)
I n v e s t i g a t i o n Request #2655539 f o r A p p l i c a n t SSN #####-9(b)

Page 29 o f 29
Generated Copy

(6)
violent overthrow of the United States Government and which engages in illegal activities to that end,
knowing that the organization engages in such activities with the specific intent to further such activities?
Yes:^^No:^x^
b. Have you ever knowingly engaged in any acts or activities designed to overthrow the United States
Government by force?
Yes:^^No:^x^

Ifyouanswered "Yes" toaorb, explain in the space below.

Explanation

Additional Comments
Use the space below to continue answers to all otheritems and any information you would like to add.
Additional Comments

CertificatioiT^lTat^My^Answers^ATe^True
My statements on this form, and any attachments to it, are true, complete, and correct to die best of my knowledge and belief
and are made in good faith.Iunderstandthataknowing and willful false statement on this form can be punished by fine or
imprisonment or bodi. (See section 1001 of title 18, United States Code).
Signature (^^^^n^^^r^^^

Date

(Signature on file-see investigation Request ^ 6 6 5 6 3 9 Signature Forms)

Expected attachments
If you need to submit additional documents with your request, giveabrief title or description of each attachment you plan to
provide(eg.,map with directions to residence).Providing this list is optional; however, doing so may assist the processing
offices in accounting for all attachments.Include each attachmcntspage count.(One sheet widi content on front and back is
two pages.)
Write your social security number and Ihe Investigation Request number on the margin of each attachment you submit.
Expected Attachments
^^c^^t^^^ci^^d^d)

G e n e r a t e d on 2 0 0 7 - 1 0 - 1 0

00 : 2 2 : 3 5 . 2 2 6

PRIVACY ACT INFORMATION

Data Hash Code: 8 4 2 0 8 e d e 2 5 b 8 8 1 5 1 2 d 8 f c f 4 a f 8 f f 5 e e e 0 5 d l 9 8 8 a

3s'

17047

Form approved:
O.M.B. No. 3206-0005
NSN 7540-00-634-4036
86-111

standard Form 86 Format
Revised September 1995
U.S. Office of Personnel Management
5 CFR Part 731, 732, and 736

UNITED STATES OF AMERICA
After completing Parts 1 and 2 of this form and any attachments, you should review your answers to all questions to make sure the f o r m is
complete and accurate, and then sign and date the f o l l o w i n g certification and sign and date the release o n Page 10.

Certification That My Answers Are True
My Statements on this form, and any attachments to it, are tme, complete, and correct to the best of my knowledge and
belief and are made in good faith. I understand that a knowing and willful false statement on this form can be punished
by fine or imprisonment or txith. (See Section 1001 of title 18, United States Code).
Signature (Sign in ink)

jO

Full Name (Type or Print Legibly)
Manning, Bradley E

Date Signed

20070926

Social Security Number

MHI-9(b)
(6)

30

17048

Standard Form 86 Format
Revised September 1995
U.S. Office of Personnel Management
5 CFR Pan 731, 732, and 736

Ii

Form approved:
O.M.B. No. 3206-0005
NSN 754040-634-4036
86-111

08F18704

UNITED STATES OF AMERICA
AUTHORIZATION FOR RELEASE OF INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink.
I Authorize any investigator, special agent, or other duly accredited representative of the authorized Federal agency
conducting my background investigation, to obtain any information relating to my activities from individuals, schools,
residential management agents, employers, criminal justice agencies, credit bureaus, consumer reporting agencies,
collection agencies, retail business establishments, or other sources of information. This information may include, but
is not limited to, my academic, residential, achievement, performance, attendance, disciplinary, employment history,
criminal history record information, and financial and credit information. I authorize the Federal agency conducting my
investigation to disclose the record of my background investigation to the requesting agency for the purpose of making
a determination of suitability or eligibility for a security clearance.
I Understand that, for financial or lending institutions, medical institutions, hospitals, health care professionals, and
other sources of information, a separate specific release will be needed, and I may be contacted for such a release at a
later date. Where a separate release is requested for information relating to mental health treatment or counseling, the
release will contain a list of the specific questions, relevant to the job description, which the doctor or therapist will tie
asked.
I Further Authorize any investigator, special agent, or other duly accredited representative of the U.S. Office of
Personnel Management, the Federal Bureau of Investigation, the Department of Defense, the Defense Investigative
-Service, and any other authorized fedeial aguncy, to request cnminai record information atxxit me from criminal justice
agencies for the purpose of determining my eligibility for access to classified information and/or for assignment to, or
retentton in, a sensitive National Security position, in accordance with 5 U.S.C. 9101. I understand that I may request a
copy of such records as may be available to me under the law.
I Authorize custodians of records and sources of information pertaining to me to release such information upon request
of the investigator, special agent, or other duly accredited representative of any Federal agency authorized atx3ve
regardless of any previous agreertient to the contrary.
I Understand that the information released by records custodians and sources of information is for official use by the
Federal Government only for the purposes provided in this Standard Form 86, and that it may be redisclosed by the
Government only as authorized by law.
Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization
is valid for five (5) years from the date signed or upon termination of my affiliation with the Federal Government,
whichever is sooner. Read, sign and date the release on the next page if you answered "Yes" to question 21.

Signature (Sign in ink)

Full Name (Type or Print Legibly)

Date Signed
20070926

Manning, Bradley E
other Names Used

Social Security Number

4Nky(b)
(6)
Current Address (Street, City)

(b) (6)

State

(b) (6)

ZIP Code

(b)
(6)

Home Telephone Number
(Include Area Code)

(b) (6)

T ' r\
"7 T T n
ir L_ !v 'V L i- v ^

^7

17049
Slandanj Form 36 Format
Revised Septemtier 1995
U.S. Office of Personnel Management
5 CFR Part 731, 732, and 736

Form approved:
O.M.B. No. 3206-0005
NSN 7540-00-634-4036
86-111

UNITED STATES OF AMERICA
AUTHORIZATION FOR RELEASE OF INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink.
I Authorize any investigator, special agent, or other duly accredited representative of the authorized Federal agency
conducting my background investigation, to obtain any information relating to my activities from individuals, schools,
residential management agents, employers, criminal justice agencies, credit bureaus, consumer reporting agencies,
collection agencies, retail business establishments, or other sources of information. This information may include, but
is not limited to, my academic, residential, achievement, performance, attendance, disciplinary, employment history,
criminal history record information, and financial and credit information. I authorize the Federal agency conducting my
investigation to disclose the record of my background investigation to the requesting agency for the purpose of making
a determination of suitability or eligibility for a security clearance.
1 Understand that, for financial or lending institutions, medical institutions, hospitals, health care professionals, and
other sources of information, a separate specific release will be needed, and I may be contacted for such a release at a
later date. Where a separate release is requested for information relating to mental health treatment or counseling, the
release will contain a list of the specific questions, relevant to the job description, which the doctor or therapist will be
asked.
1 Further Authorize any investigator, special agent, or other duly accredited representative of the U.S. Office of
Personnel Management, the Federal Bureau of Investigation, the Department of Defense, the Defense Investigative
Service, and any other authorized Federal agency, to request criminal record information about me from criminal justice
agencies for the purpose of determining my eligibility for access to classified infomiation and/or for assignment to, or
retention in, a sensitive National Security position, in accordance with 5 U.S.C. 9101. I understand that I may request a
copy of such records as may be available to me under the law.
1 Authorize custodians of records and sources of information pertaining to me to release such information upon request
of the investigator, special agent, or other duly accredited representative of any Federal agency authorized above
regardless of any previous agreement to the contrary.
I Understand that the information released by records custodians and sources of information is for official use by the
Federal Government only for the purposes provided in this Standard Form 86, and that it may be redisclosed by the
Government only as authorized by law.
Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization
is valid for five (5) years from the date signed or upon termination of my affiliation with the Federal Government,
whichever is sooner. Read, sign and date the release on the next page if you answered "Yes" to question 21.

Signature (Sign in ink)

»/:^^==^--^s^

Full Name (Type or Print Legibly)

Date Signed
20070926

Manning, Bradley E

other Names Used

Social Security Number

(b) (6)
Current Address (Street, City)

(b) (6)

State

(b)
(6)

ZIP Code

Home Telephone Number
(Include Area Code)

(b)
(6)

(b) (6)

30

17050
Standard Form 86 Format
Revised September 1995
U.S. Office of Personnel Management
5 CFR Parts 731, 732. and 736

Form approved:
O.M.B. No. 3206-0005
NSN 7540-00-634-4036
86-111

08F18704

UNITED STATES OF AMERICA
AUTHORIZATION FOR RELEASE OF MEDICAL INFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink.
Instructions for Completing this Release
This is a release for the investigator to ask your health practitioner(s) the three questions below conceming your mental
health consultations. Your signature will allow the practitioner(s) to answer only these questions.
I am seeking assignment to or retentbn in a position with the Federal government which requires access to classified
national security information or special nuclear information or material. As part of the clearance process, I hereby
authorize the Investigator, special agent, or duly accredited representative of the authorized Federal agency conducting
my background investigation, to obtain the following information relating to my mental health consultations:

Does the person under investigation have a condition or treatment that could impair his/her judgement or
reliability, particulady in the context of safeguarding classified national security information or special
nuclear information or material?

If so, please describe the nature of the condition and the extent and duration of the impairment or
treatment.
What is the prognosis?

I understand the information released pursuant to this release is for use by the Federal Government only for purposes
provided in the Standard Form 86 and that it may be redisclosed by the Government only as authorized by law.
Copies of this authorization that show my signature are as valid as the original release signed by me. This
authorization is valid for 1 year from the date signed or upon termination of my affiliation with the Federal Government,
whichever is sooner.
Signature (Sign in ink)

^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^

^ ^ ^ ^

Full Name (Type or Print Legibly)

Dale Signed

Manning, BradioyE

20070926

other Names Used

Social Security Number
# # # . 9 (b)

(6)
CurrentAddress (Street,City)

(b) (6)

State

(b
)
(6)

ZIP Code

(b)
(6)

Home Telephone Number
(Include Area Code)

(b) (6)

I T > r\ r\ -r T T r^, T
•' L y L ' < j ' < j " » v "

e#

17051
standard Form 86 Format
Revised September 1995
U.S. Office of Personnel Management
5 CFR Parts 731, 732, and 736

Form approved:
O.M.B. No. 3206-0005
NSN 7540-00-634-4036
86-111

UNITEDSTATESOF AMERICA
AUTHORIZATION FORRELEASEOFMEOICALINFORMATION
Carefully read this authorization to release information about you, then sign and date it in ink.
lnstrut:^tions for Completing t h i ^ release
This isarelease for the investigator to ask your health practitioner(s)the three questions below concerning your mental
health consultations. YoLir signature will allow the practitioner^s)to answer onlythese questions.
l a m seeking assignmentto or retention inaposition with the Federal govemmentwhich requires access to classified
nationalsecurityinformationor special nuclear information or material. As partof theclearanceprocess, Iherel^^
aut1^orizetheinvestigator,specialagent,ordulyaccreditedrepresentativeoftheauthorizedFederalagencyconducting
mybackground investigation, toobtainthefollowing infomnation relatingtomymentalhealthconsultations:

Doesthe person under investigation haveaconditionortreatmentthat could impairhis/herjudgementor
reliability, particularly in the context of safeguarding classified national security information or special
nuclear information or material?


If so, please describe the nature of the condition and the extent and duration of the impairment or
treatment.

Whatistheprognosis?

lunderstand the information released pursuant to this release is for use by the Federal Government only for purposes
provided in the Standard Fonn 86 and that it may be redisclosed by the Government only as authorized by law.
Copies of this authorization that show my signature are as valid as the original release signed by me. This
authorization is valid f o r l y e a r from the date signed or upon termination of my affiliation with the Federal Government,
whichever is sooner.
Signature (Sign in ink)

Full Name (Type or Print Legibly)

Date Signed

Manning, Bradley E

20070926

^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^
other Names Used

Social Security Number

# # # 9 (b)

(6)

Cun-ent Address (Street, City)

(b) (6)

State

(b)
(6)

ZlPCode

(b)
(6)

Home Telephone Number
(Include Area Code)

(b) (6)

^

17052

NAME MANNING, BRADLEY EDWARD

jCASE # 08F18704

IPAGE 1

DATES OF INVESTIGATION 10/16/07 - 10/25/07 j SID N075 | ORG ID C39 j REPORT # 01

TESTIMONIES

ITEM: 018
SOURCE: 001
NAME PERSONNEL TRAINEE DIVISION, BUILDING 470, FT.LEONARD WOOT, MO 65473
PERSONNEL RECORD
PROVIDER TCM BEREN, B-T ASSIQIMENT CLERK
ACCEPTABLE
NAME VERIFIED
SSN VERIFIED
DOB VERIFIED
POB VERIFIED
EMPLOYMENT DATES 10/07 - 10/07
STATUS FULL TIME
WORKSITE ADDRESS CO-C- 82 BARRACKS, FT.LEONARD WOOD, MO 65473
POSITION TRAINEE
REHIRE STATUS NOT SHOWN
EMPLOYMENT STATUS CHANGE NOT APPLICABLE

ITEM: 019
SOURCE: 002
NAME BARRACKS MANAGEMENT, COMMUNITY SERVICE CENTER, BUILDING 470,
FT.LEONARD WOO), MO 65473
RENTAL RECORD
PROVIDER JUANITA LACK, LEAD INSPECTOR
NO RECORD
TRAINEES ARE REQUIRED TO LIVE IN THE BARRACKS, NO RESIDENCE RECORDS
ARE MAINTAINED.
ITEM: 019

INVESTIGATOR'S NOTE

SOURCE: 003

TRAINEES ARE REQUIRED TO LIVE IN THE BARRACKS WHILE IN BASIC TRAINING.
THIS IS ALSO THE SAME LOCATION AS THE TRAINEES EMPLOYMENT. THE
TRAINEES EMPLOYMENT RECORD LOCATION IS UNDERSTOOD TO BE THE SAME AS
THE TRAINEES RESIDENTIAL LOCATIW.

ITEM: 020
SOURCE: 004
NAME MILITARY PERSONNEL DIVISION, BUILDING 470, FT.LEONARD WOOD, MO 65473
MILITARY RECORD
OBTAINED BY INVESTIGATOR
ACCEPTABLE
NAME VERIFIED

SSN VERIFIED

DOB VERIFIED

POB VERIFIED

BRANCH OF SERVICE USA
DATE ENTERED SERVICE 10/07
REPORT OF INVESTIGATION
PROPERTY OF U.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900 E ST, NW, WASHINGTON, D.C. 20415-4000

^

17053

NAME MANNING, BRADLEY EDWARD

|CASE # 08F18704

IPAGE 2

DATES OF INVESTIGATION 10/16/07 - 10/25/07 j SID N075 | ORG ID C39 | REPORT # 1

DUTY STATUS ACTIVE

GRADE El

**** END OF REPORT •**•
TRANSMITTED: 10/25/07

PRINTED: 01/16/08

%

17054

NAME MANNING, BRADLEY

ICASEII08F18704

^PAGE 1

DATES OF INVESTIGATION 01/04/08-01/09/08 | SIDQ394 IORGIDC48 | REPORTHOl

TESTIMONIES
ITEM: 030

INVESTIGATOR'S NOTE

SOURCE: 001

ATTEMPTS TO CONTACT PADEN RADFORD, IN PERSON, AND VIA TELEPHONE,MET
WITH NEGATIVE RESULTS.

ITEM: 033
NAME BRIAN E.MANNING, PROGRAM MANAGER(b) (6), (b) (7)(C)

SOURCE: 002
OK

(b)
TELEP(6),
HONE TESTIMONY

(b)

ISSUE(S) 11
PRIMA(7)
RY ASSOCIATION FATHER
AVERA(C)
GE EKTENT OF CONTACT REGULAR
SPAN OF CONTACT 12/17/1987 TO PRESENT
RECO^NDS
BRIAN MANNING INDICATED HIS SON, BRADLEY MANNING, LIVED WITH HIM FRCt^
BIRTH UNTIL 2000, E^CT DATE NOT RECALLED. BRIAN MANNING INDICATED HE
AND BRADLEY'S MOTHER WERE DIVORCED AND HIS E^-WIFE WAS FRC^ WALES.
WHEN THEY DIVORCED,BRADLEY MANNING MOVED TO WALES WITH HIS I^THER IN
2000,WHERE HE LIVED UNTIL 2005, EKACT DATE NOT RECALLED. BRIAN
MANNING INDICATED BRADLEY MANNING LIVED WITH HIM FRC^ THE TIME BRADLEY
MOVED BACK TO THE UNITED STATES UNTIL 04/2006,WHEN BRADLEY MOVED TO
TULSA, OKLAHOMA, WHERE BRADLEY WORKED FOR INCREDIBLE P I ^ ^ . BRIAN
MANNING INDICATED BRADLEY MOVED TO MARYLANDIN 2006,EKACT DATES NOT
RECALLED, TO LIVE WITH HIS AUNT, DEBORAH MANNING-VANALSTYNE. MANNING
INDICATED BRADLEY ATTENDEDA^IOR COLLEGE IN MARYLAND, EKACT NAME OF
INSTITUTION NOT RECALLED. BRADLEY MANNING WAS UNEMPLOYED DURING THIS
PERIOD, ASHE WASAFULLTIME STUDENT, UNTIL HE COINED THE MILITARY,
E^CT DATE NOT RECALLED. BRIAN MANNING INDICATED HE MAINTAINS
COMMUNICATIONS WITH BRADLEY, VIA TELEPHONE, EVERY TWO WEEKS ON
AVERAGE.
8^IANMANNINCINDICAT^t^BRA0t,EYMANNINCCRADt^ATE0FRCM HIGH SCHOOL IN
WALES,UNITED KIN^^X^, 2005. MANNING ALSO TRAVELED TO CHINA, EKACT
DATES NOT RECALLED,WITH HIS CLASS, WHILE GOING TO SCHOOL IN WALES.
NO OTHER DETAILS PROVIDED.
BRADLEY MANNING IS CURRENTLY IN BOOT CAMP, EKACT LOCATION UNKNOWN.
BRADLEY MANNING GRADUATED FROM HIGH SCHOOL IN WALES,UNITED KIN^^X^M.
BRADLEY MANNING'S INTEREST INCLUDE MUSIC AND C^^tPUTERS.
BRIAN MANNING INDICATED BRADLEY MANNING DOES NOT GET ALONG WITH HIS
REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000

^

17055

NAME MANNING, BRADLEY

|CASElt08F18704

^PAGE 2

DATES OF INVESTIGATION 01/04/08-01/09/08 | SIDQ394 1 ORG ID 048 | REPORTS 1
STEP-MOTHER,AND THE FEELH^GS ARE MUTUAL. NO OTHER DETAILS PROVIDED.
8RIAN MANNING IS NOT AWARE OF ANYTHING IN BRADLEY MANNING'S CHARACTER
OR BACKGROUND WHICH COULD SERVE AS THE BASIS FOR BLACKMAIL OR
COERCION.
1T^: 033

INSTIGATOR'S NOTE

SOURCE: 003

01/09/2008,BRIAN MANNING WAS INTERVIEWED VIA TELEPHONE, AS PER HIS
REQUEST,DUE TO HIS SCHEDULE.
ITEM: 033

INVESTIGATOR'SNOTE

SOURCE: 004

BRIAN MANNING IS St^^CT, BRADLEY MANNING'S FATHER. FATHER WAS
INTERVIEWED, AS FATHER WAS LISTED VERIFIER FOR LISTED PERIOD OF
UNEMPLOYMENT.

ITEM: 034
NAME(b) (6)

, WAL-MART ASSOCIATE,(b) (6)

SOURCE: 005
,

(b) (6)
ISSUE(S) 11
PRIMARY ASSOCIATION FRIEND
AVERAGE E^tTENT OF CONTACT REGULAR
SPAN OF CONTACT 1992 TO PRESENT
RECOI^NDS

(b) (6)

MET BRADLEY MANNING IN KINDERGARTEN, 1992. (b)
ANt^
MANNING ATTENDED SCHOOL THROUGH THE EIGHTH GRADEIN CRES
CENT,
(6)
OKLAHC^. (b)
INDICATED MANNING MOVED TO WALES, UNITED KIN^OM,DUE
TO HIS PARE(6)
NTS DIVORCE, ANO HIS MOTHER BEING FR^ WALES(b) (6)
MAINTAINEDINFREQUENT CONTACT WITH MANNING,VIA E-MAIL,WHILE MANNING
LIVEDIN WALES, EXACT NUMBEROFE-MAILS NOT RECALLED. MANNING MOVED
BACKTOOKLAHC^, 11/2005, ANDLIVEO WITH HIS FATHER. (b) INDICATED
FREQUENCY OF CONTACT ONE TIME PER WEEK, UNTIL MANNIN(6)
G MOVED TO TULSA,
OKLAHO^. (b) SINDICATED MANNING MOVEDIN WITH(b)
FOR
APPROXIMATELY
T
H
R
E
E
T
O
F
O
U
R
W
E
E
K
S
B
E
T
W
E
E
N
LIVING
WITH
HIS FATHER AND
(6)
(6)
MOVING TO TULSA, AND FREQUENCY OF CONTACT INCREASED TO DAILY CONTACT
DURING THEPERIOD. (b) S INDICATEDHE WAS LIVINGINTLILSA AT THETIME
AND MANNING LIVED WITH
(6) HIM UNTIL HE COULD FIND HIS OWN PLACE TO LIVE.
MANNING AND(b)
WORKED AT INCREDIBLE P I ^ ^ FOR APPROXIMATELY TWO
MONTHS. (b) (6)
S INDICATED MANNING LEFT INCREDIBLE PI^^A AND TOOKA^OB
WITH FYE,(6)
06/2006. SOCIAL C^ACT CONSISTED OF EATING DINNER AND
WATCHING TELEVISION, THREE TO FOUR TIMES PER WEEK. MANNING ^^OINED THE
MILITARY 11/2007, AND CONTACT HAS BEEN LIMITED,DUE TO MANNING BEING
IN BOOT CAMP.

(b)
(6)

INDICATED MANNING LIVED IN WALES,UNITED KINGDOM, AND TRAVELED
REPORT OF INVESTIGATION
PROPERTY OF U.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,DC. 20415-4000

17056

NAME MANNING, BRADLEY

|CASE||08F18704

IPAGE 3

DATES OF INVESTIGATION 01/04/08-01/09/08 1 SIDQ394 IORGIDC48 | REPORTS 1
THROUGHOUT THE UNITED KIN^OM AS WELL AS EUROPE, TO INCLUDE FRANCE.
MANNING HAS ALSO TRAVELED TO TOKYO, ^APAN.
MANNING IS CURRENTLY SERVING IN THE UNITED STATES ARMY.
MANNING'S INTEREST INCLUDE MUSIC AND C^^^tPUTERS.

(b) IS NOT AWARE OF ANYTHINGIN MANNING'S CHARACTER OR BACKGROU^
WHICH COULD SERVE AS THE BASIS FOR BLACKMAIL OR COERCION.
(6)
^^^^ END OF REPORT ^^^^
TRANSMITTED: 01/09/08

PRINTED: 01/16/08

^

17057

NAME MANNING, BRADLEY EDWARD

1CASEII08F18704

IPAGE 1

DATES OF INVESTIGATION 10/22/07 - 11/29/07 | SIDT393 IORGIDW30 | REPORT 1103

TESTIMONIES

ITEM: 002
NAME(b) (6), (b) (7) ,REALTOR(b) (6), (b) (7)(C)
INTERVIEWED
AT 7821 TUCKERMAN LANE, POT^C,MD 20854
(C)

SOURCE: 001

ACCEPTABLE
PRIMARY ASSOCIATION NEIGHBOR
AVERAGE EXTENT OF C^ACT REGULAR
SPAN OF CONTACT APPROX. 2006 TO PRESENT
RECOt^NDS

(b) (6), FIRST MET "BRADLEY" APPROXIMATELY IN 2006 WHEN THE SUB^CT
(b)MOVEDINTO
(7)(C) HIS AUNT'S HOt^SE, WHICH IS LOCATED NEXT DOOR TO THE
SOURCE'S HOME, THE SOURCE AND THE SUB^CT HAVE NEIGHBORLY TYPE OF
CONTACT, THE SOURCE SEES THE SUB^CT^ADAILY BASIS, AND ONCEAWEEK
HAVE SMALL C^^^RSATIONS WITH THE SUB^CT. THE SOURCE AND THE SUB^CT
HAVE HAD NO SOCIAL CONTACT WITH EACH OTHER. THERE HAVE BEEN NO BREAKS
INTHECONTACTBETWEENTHE SOt^RCE ANDTHE SUB^CT.
THE SUB^CT RESIDES AT (b) (6), (b) (7)(C)
. THE
SUB^CT ATTENDED MONTGC^RY COLLEGE, AND DID NOT GRADUATE FRO^ THERE.
THE SUB^CT WAS EMPLOYED AT ABACROMBIE AND FITCH (DISCREPANT)AND
STARBUCKS . THE SUB^CT MAY HAVE COINED THE ARMY. THE SOURCE THINKS
THAT THE SUB^CTEN^YS WORKING ON COMPUTERS AND LISTENING TO MUSIC IN
HIS FREE TIME. THE SOURCE HAS NO KNOWLEDGE OF THE SUB^CT'SFOREI^
TRAVEL ACTIVITIES. THEREIS NOTHING IN THE SUB^CT'S BACKGROUND THAT
WOt^ LEAVE HIM SUSCEPTIBLE TO BLACKMAIL OR COERCION.

ITEM: 002
NAME(b) (6), (b) (7)

SOURCE: 002
GENERAL CONTRACTOR/ H ^ IMPROVEMENTS(b) (6), (b) (7)

(b) (6), (b) (7)(C)
(C)

(C)

ACCEPTABLE
PRIMARY ASSOCIATION NEIGHBOR
AVERAGE EXTENT OF CONTACT MODERATE
SPAN OF CONTACT SPRING OF 2006 TO OCTOBER 20O7
DOES NOT KNOW WELL ENOUGH TO RECO^ND

(b) (6), FIRST MET "BRADLEY"IN APPROXIMATELY THE SPRING OF 2006 WHEN
SUB^CTMOVEDINTO THE HOUSE NEXT DOOR TO THE SOURCE'S HOME. THE
(b)THE
(7)(C)
SUB^CT IS THE NEPHEW OF THE SOURCE'S NEXT DOOR NEIGHBOR. THE SOURCE
AND THE SUB^CT HAVE HAD NEIGHBORLY TYPE OF CONTACT, SAYING HELLO TO
EACH OTHER IN PASSING. THE SOURCE SAW THE SUB^CTONADAILY BASIS,
BUT REALLY ONLY HAD CONVERSATIONS WITH THE SU^^CT ON AVERAGE ONCEA
REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000

^

17058

NAME MANNING, BRADLEY EDWARD

|CASEi108F18704

|PAGE 2

DATES OF INVESTIGATION 10/22/07-11/29/07 | SIDT393 1 ORGIDW30 | REPORTS 3
MONTH. THE SUB^CT ASKED THE SOURCE FOR HELP WHEN HIS ELDERLY RELATIVE
FELL IN THE HOUSE AND THE SUB^CT COULD NOT LIFT HER LIP. THIS EVENT
HAPPENEDIN SEPTEMBER OF 2007. THE SOURCE AND THE SUB^CT HAVE HAD NO
SOCIAL CONTACT WITH EACH OTHER. THERE HAS BEEN BREAKS IN THE CONTACT
BETWEEN THE SOURCE AND THE SUB^CT. THE LAST CONTACT THE SOURCE HAD
WITH THE SUB^CT WAS AT THE END OF SEPTEMBER OR THE BEGINNING OF
OCTOBER 2007.
THE SUB^CT RESIDED IN THE HOt^SE NEXT DOOR(IF FACING THE SOURCE'S HOME
THE HOUSE ON THE LEFT) TOTHESUB^CT'SHOME. THE SUB^CT WORKED AT
STARBUCKS, THE SOURCE HAS NO KNOWLEDGE OF WHAT THE SUB^CT ENJOYED
DOING IN HIS FREE TIME. THE SOURCE HAD NO KNOWLEDGE OF THE SUB^CT'S
FOREI^ TRAVEL ACTIVITIES. THE SOURCE HAD NO KNOWLEDGE OF ANYTHING IN
THE SUB^CT'S BACKGROUND THAT WOULD LEAVE HIM SUSCEPTIBLE TO BLACKMAIL
OR COERCION.

ITEM: 005
SOURCE: 003
NAME MONTG^RYCOLLE, 51 MANNAKEE STREET, SV-114, ROCKVILLE, MD 20850
EDUCATI^ RECORD
PROVIDER ALICE SUMMERS, TRANSCRIPT EVALUATOR
SF RELEASE
ACCEPTABLE
NAME VERIFIED

SSN VERIFIED

DOB VERIFIED

DATES OF ATTENDANCE
NOT SHOWN
CAMPUS LOCATION SAME AS ABOVE
MA^OR(S) SCIENCE-PHYSICS
DEGREE(S) AWARDED^DATE NOT APPLICABLE

POB NOT SHOWN

(PART TIME)

THE ^ Y DATE INDICATED ON THE SUB^CT'S TRANSCRIPT WAS SPRING 2007.

ITEM: 005
SOURCE: 004
NAME MONTGOMERY COLLEGE, 51 MANNAKEE STREET,MT6TH FLOOR, ROCKVILLE,MD
20850
OISCIPLINA^yR^CORO
PROVIDER MARLENE PHILLIPS, SR. ADMIN. AIDE
SF RELEASE.
NO RECORD
ITEM: 005

INVESTIGATOR'SNOTE

SOURCE: 005

THE SUB^^CTWASAPARTTIME STUDENT FOR THE SPRING 2007 SEMESTER AT
MONTGOMERY COLLEGE IN ROCKVILLE,MARYLAND.
ITEM:005

INVESTIGATOR'SNOTE

SOURCE: 006

REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON, DC 20415-4000

^7

17059

NAME MANNING, BRADLEY EDWARD

ICASEII08F18704

|PAGE 3

DATES OF INVESTIGATION 10/22/07 - 11/29/07 | SIDT393 | ORGIDW30 | REPORT 1103

THE RECORD PROVIDER INDICATED THAT THE 2007 SPRING SEMESTER FOR
MONTGOMERY COLLEGE, ROCKVILLE CAMPUS, RAN FROM ^^ANUARY 2007 TO MAY OF
2007.
ITEM: 006

INVESTIGATOR'SNOTE

SOURCE:007

NO LOCAL EMPLOYMENT RECORDS ARE MAINTAINED. THE COMPANY USES AN
AUT^TED SYSTEM FOR EMPLOYMENT VERIFICATION.

SOURCE: 008
ITEM: 006
NAME(b) (6), (b) (7) , STORE MANAGER, 5438 WESTBARD AVENUE,BETHESDA,MD
20816
(C)
ACCEPTABLE
PRIMARY ASSOCIATION SI^ERVISOR
AVERAGE EXTENT OF CONTACT REGULAR
SPAN OF CONTACT JANUARY 2007 TO SEPTEMBER 2007
RECO^NDS

(b) (6), FIRST MET BRAD MANNING IN ^^tANUARY 2007 WHEN THE SUB^CT APPLIED
FORA^OB AT STARBUCKS. THE SOURCE BECAME THE SUB^CT'S SUPERVISOR.
(b) (7)(C)
THE SOURCE AND THE SU^CT HAD WORK RELATED CONTACT TWO TO FOUR TIMES
AWEEK, AS BOTH THE SOURCE AND THE SUB^CT WORKED DIFFERENT SHIFTS,
SOME OF THE SHIFTS WOt^ OVERLAP AND THAT IS WHEN THE SOURCE AND THE
SUB^CT HAD WORK RELATED CONTACT. THE SUB^CT WORKED ASABARISTA AND
THE SOURCE WAS THE STORE MANAGER. THE SOURCE AND THE SUB^CT HAD NO
SOCIAL CONTACT OUTSIDE OF WORK. THERE WERE NO BREAK8IN THE CONTACT
BETWEEN THE SOURCE AND THE SUB4IECT AT STARBUCKS. THE SOURCE'S LAST
CONTACT WITH THE SUB^CT WAS AT THE END OF SEPTEMBER 2007.
THE SUB^CT ATTENDED MONTGt^RY COLLEGE. THE SUB^CT WAS PREVIOUSLY
^:M^L0Y^0A'^AaAO^C^^^ANt^^:^TCH(DISCREPANT) ANDAMUSICS'^RE BEFORE
STARBUCKS. THE SOURCEHAS NO KNOWLEDGE OF WHAt^THESUB^CT ENVOYS
DOINGINHISFREETIME. THE SOURCE HAD NO I^NOWLEDGE OF THE SUB^CT'S
FOREIGN TRAVEL ACTIVITIES. THERE IS NOTHING IN THE SUB^CT'S
BACKGROUND THAT WOULD LEAVE HIM SUSCEPTIBLE TO BLACKMAIL OR COERCION.

ITEM: 006
NAME(b) (6), (b) (7)
20854
(C)

SOURCE: 009
STORE MANAGER, 7911TUCKERMANLANE, POTOMAC,MD

ACCEPTABLE
PRIMARY ASSOCIATION St^ERVISOR
AVERAGE EXTENT OF CONTACT REGULAR
SPAN OF CONTACT JANUARY 2007 TO SEPTEMBER 2007
DOES NOT KNOW WELL ENOUGH TO RECOMMEND
REPORT OF INVESTIGATION
PROPERTY OFU.S.OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000

^

17060

NAME MANNING, BRADLEY EDWARD

iCASEii08F18704

|PAGE 4

DATES OF INVESTIGATION 10/22/07 - 11/29/07 1 SIDT393 |ORGIDW30 | REPORTS 3

(b) (6),
FIRST MET BRADLEY OR"BRAD" IN4rANUARY 2007 WHE^THESUBi^CT
TARTED WORKATSTARBUCKS. THE SOURCE AND THE SUBilECT HAD DAILY WORK
(b) S
(7)(C)
RELATED CONTACT. THE SOURCE AND THE SUB^CT HAD NO SOCIAL CONTACT
OUTSIDE OF WORK. THERE WERE NO BREAKSIN THE CONTACT BETWEEN THE
SOURCE AND THE SUB^CT. THE SUB^CT LEFT STARBUCKS AT THE END OF
SEPTEMBER TO ^OIN THE UNITED STATES ARMY.
THE SUB^CT ATTENDED MONTG^RY COLLEGE BUT DID NOT GRADUATE. THE
SUB^CT WAS EMPLOYED AT STARBUCKS. THE SUB^CTISIN THE UNITED STATES
ARMY. THE SUB^CT ENVOYS WORKING ON C^^^IPUTERS AND MUSIC IN HIS FREE
TIME. THE SOURCE HAD NO I^NOWLEDGE OF THE SUB^CT'S FOREIGN TRAVEL
ACTIVITIES. THERE IS NOTHING IN THE SUB^CT'S BACKGROUND THAT WOULD
LEAVE HIM SUSCEPTIBLE TO BLACKMAIL OR COERCI^.

ITEM: 022
SOURCE: 010
NAME MONTGOMERY COLLEGE, 51 MANNAKEE STREET,ROCKVILLE,MD 20850
LAW ENFORCEMENT-OTHER
PROVIDER (b) (6), (b) (7) , SECURITY OFFICER
SF RELEAS
E
(C)
NO RECORD

^^^^ END OF REPORT ^^^^
TRANSMITTED: 11/29/07

PRINTED: 01/16/08

^

17061

NAME MANNING, BRADLEY EDWARD

1CASEII08F18704

IPAGE 1

DATES OF INVESTIGATION 12/06/07^12/07/07 | SID 0414 |ORGIDC39 | REPORTHOl

TESTIMONIES

ITEM: 001
PERSONAL SUB^CT INTERVIEW
SOURCE: 001
INTERVIEW CONDUCTED UNDER UNSWORN DECLARATION ON 12/06/07 RHU BARRACKS,FIRST
FLOOR MEETING ROOM, FORT LEONARD WOOD,MO 65473
ISSUE CODE(S) 11 12
SINCE HE HAD 4^INED THE ARMY HE HAS BEEN DIAGNOSED WITHANERVE
DISORDER THAT PROHIBITS HIM FROM PROPERLY PHYSICALLY PERFORMING HIS
DUTIES IN THE U.S. ARMY. FOR THIS REASON HE WILL BE DISCHARGED FROM
THEARMYSOON. HEHASNOTBEENGIVENADATETHATHEWILLBE
DISCHARGED. HE HAS NOT HAD ANY DISCIPLINARY PROBLEMS SINCE HE HAS
BEEN IN THE ARMY. HIS PHYSICAL INABILITY TO PERFORM HIS DUTIES ASA
SOLDIER IS C^^^IMON KNOWLEDGE TO EVERYONE IN HIS UNIT AND HIS FAMILY.
INFORMATION CONCERNING THIS COUI^ NOT BE USED AGAINST HIM AS BLACKMAIL
OR COERCION,
HIS STEP-I^^OTHER,(b) (6), (b) (7)(C)
DID NOT GET ALONG WITH HIM WHILE
HE LIVED WITH HER AND HIS FATHER,BRIAN MANNING AT 8020 NW119TH
STREET IN OKLAHC^ CITY, OKLAHO^. (b) (6), (b) (7)(C) DID NOT LIKE
HIM BECAUSE HE WAS THE SON HIS FATHER, AND HER ESTRANGED HUSBAND,
(b) (6), (b) . (b) (6), (b) (7)(C) AND(b) (6), (b) WERE HAVING
MARITAL PROBLEMS,AND (b) (6), (b) (7)(C)(7)(C)
RESENTED HIM STRICTLY FOR
(7)(C)
THAT REASON. ONE DAY IN 4/06, (b) (6), (b) (7)(C) CALLED THE OKLAHOMA
CITY POLICE DEPARTMENT,UNBEKNCWST TO HIM. WHEN THE OKLAHOMA CITY
POLICE DEPARt^^ENT ARRIVED SHE ALLEGED THAT HE HAD THREATENED(b)
EATENED
(b) (6), (b) . HE DOES NOT KNOW HOW SHE ALLEGED THAT HE THR(6),
H
E
R
.
H
E
W
A
S
N
O
T
IN
T
H
E
R
O
O
M
W
H
E
N
S
H
E
M
A
D
E
T
H
E
S
E
ALLEGATIONS
TO THE
(7)(C)
(b)
POLICE. SHE REQUESTED TO THE POLICE THAT HE BE MADE TO LEAVE THE
RESIDENCE PERMANENTLY. THE POLICE DID ASK HIM TO LEAVE AND H(7)
E DID NOT
OB^CT. HE GATHERED HIS BELONGINGS AND LEFT TO HIS SISTER'S (C)
HOUSE.
HE STAYED WITH HISSISTER, CASEY MANNING MA^ORFORAFEW DAYS BEFORE
HE MOVEDTO MARYLAND. HEDOES NOT RECALL HISSISTER'S PHONE NUMBER.
HE DID NOT MAKE ANY THREATS AGAINST(b) (6), (b) (7)(C) . HE DOES NOT
KNOW IF ANY POLICE REPORTS WERE MADE AGAINST HIM OR NOT. HE NEVER
HEARD ANYTHING FURTHER FROM THE POLICE OR ANY COURT. HE DOES NOT
BELIEVE HE WAS EVER CHARGED W1THACRIME. HE NEVER HAD ANY PROBLEMS
WITH THE POLICE PRIOR TO THIS INCIDENT. HE DID NOT HAVE ANY OTHER
PROBLEMS WHILE HE LIVED THERE. HIS PARENTS, HIS SISTER AND
BROTHER-IN-LAW ARE AWARE OF THIS INCIDENT. INFORMATION CONCERNING HIS
STEP-MOTHER'S DISLIKE OF HIM AND ACCUSATION OF THREATS COULD NOT BE
USED AGAINST HIM IN ANY WAY AS BLACKMAIL OR COERCION.
HE LIVED AT(b) (6), (b) (7)(C)
^ FROM
11/01TO9/05. HE DID NOT LIVE AT THIS RESIDENCE TO HELP WITH
CITIZENSHIP REQUIREMENTS OF ANY FOREIGN COUNTRY. HE MOVED TO THIS
RESIDENCE IN 11/01 BECAUSE HIS MOTHER,(b) (6),
MOVED THERE AFTER

(b) (7)(C)

REPORT OF INVESTIGATION
PROPERTY OF U.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON, D.C. 20415-4000

^

17062

NAME MANNING, BRADLEY EDWARD

^CASEll08F18704

^PAGE 2

DATES OF INVESTIGATION 12/06/07-12/07/07 | SID 0414 | ORGIDC39 | REPORTS 1
SHE DIVORCED HIS FATHER IN 2001. HE DOES NOT RECALL MORE PRECISELY
WHEN SHE MOVED BACK TO THE UNITED KIN^^X^. HEWASAMINORCHILDAT
THIS TIME AND HIS MOTHER HAD CUSTODY OF HIM. HE HAS NO CONTINUED
CONTACTS WITH FOREIGN NATIONALS DUE TO HIS RESIDENCE IN ENGLAND.
HIS MOTHER,(b) (6), (b) (7) ,WAS ORIGINALLY BORN IN THE UNITED KINGDOM
ON H^l^H^ANDACITI^EN
OF THE UNITED KINGDt^. HISI^^^^THER,(b)
(C)
(b) MET HIS FATHER, BRIAN MANNING, WHILE HE WAS STATIONEDIN
(6), THE
UNITED
KIN^^^
WITH
T
H
E
U
.
S
.
N
A
V
Y
,
LIVEDIN
T
H
E
UNITED
(b)
(6),
(6),
(b) (7)
STATES FOR ABOUT TWENTY YEARS WITH(b)
HIS(7)
FATHER, ONAGREENCARD, BUT
(b)
(C)KINGDI^
NEVER BECAMEAU.S. CITIZEN. (b) (6), RETURNED TO THE UNITED
(C)
(7)
IN 11/01. (b) (6)
HAS NOT O(b)
CCUP(7)
ATION OR EMPLOYER. (b) (6)
IS
(C)
UNEMPLOYED DUE TOADISABILITY.(b) (6), (b) HAS NO AFFILIATION WITH ANY
(C)
FOREII^ GOVERNMENT. HE DOES NO(7)(C)
T HAVE ANY FURTHER ASSOCIATION WITH
FOREI^ NATIONALS ASARESULT OF HIS ASSOCIATION WITH HIS MOTHER. HE
SAW HIS MOTHER ONADAILY BASIS IN THE U.S FROM HIS BIRTH IN 1987
UNTIL 11/01. HE SAW HIS MOTHER ONADAILY BASIS STILL AFTER THEIR
MOVE TO THE UNITED KINGD^FR^ll/OlUNTIL HE LEFT THE UNITED KIN^OM
TO LIVE WITH HIS FATHER IN 9/05. SINCE 9/05 HE HAS KEPT IN TOUCH WITH
HIS MOTHER,(b) (6),
BY TELEPHONE ONCEAWEEK. HE ALSO VISITED HER
ONCE FORAWEEK
IN 3/06, THIS TRIP WAS FINANCED BY HIS FATHER. HE
(b) (7)(C)
AND HIS SISTER,CASEY MANNING MA^OR WENT THERE TO VISIT HIS MOTHER AND
HELP HER WHILE SHE WAS ILL. HIS MOTHER,(b) (6),
STILL LIVES A(b 31
X IS N)OT
(b) (6), (b) (7)(C)
(b) (7)
AWARE THAT HE IS UNDERGOING CONSIDERATION FORANATIONAL SECURITY
(C)
(6
CLEARANCE. (b) (6), HAS NEVER SOLICITED HIM FOR ANY ACCESS TO
),
CLASSIFIEDINFORMATION.
H
E
H
A
S
N
O
T
D
E
V
E
L
O
P
E
D
A
N
Y
SYMPATHIES,
(b) (7)
(b
PREFERENCES OR ALLIANCES FOR ANY FOREI^ COUNTRY AS RESULT OF HIS
(C)
ASSOCIATI^ WITH HIS MOTHER.
)

(7
HE ATTENDED TASKER MILWARD VC (SCHOOL) FROM 12/OlTO 6/05. HE DOE)S
NOT HAVE ANY LASTING CONTACT WITH ANY FOREIGN NATIONS FROM THIS
(C
SCHOOL.

)

HE TRAVELED TO ^APAN FOR TWO WEEKSIN 10/04. HE TOOK THIS TRIP WITH
TWENTY OTHER STUDENTS AND SPONSORS FR^ TASKER MILWARD VC. THIS TRIP
WAS EDUCATIONAL SIGHTSEEING TRIP OF^APAN. HE AND THE GROUP VISITED
TOKYO,^APAN. THIS TRIP WAS FINANCED BY HIS MOTHER.
DURING ANY OF HIS FOREIGN TRAVEL: TO ENGLAND FRI^ll/OlTO 9/05,- TO
ENGLAND FOR ONE WEEK IN 3/06,- AND TO ^APAN FOR TWO WEEKS IN 10/04. HE
HAS NOT HAD ANY PROBLEMS TOINCLUDE: HE DID NOT HAVE ANY PROBLEMS
WITH FOREI^ GOVERNMENT OFFICIALS, LAW ENFORCEMENT,OR CUSTOMS. HE
DID NOT MAKE ANY LASTING CONTACT WITH ANY FOREIGN NATIONALS. HE DID
NOT NOTICE ANY EVIDENCE OF ANY MONITORING BYAFOREIGN GOVERNMENT. HE
DID NOT VISIT ANY EMBASSIES OR CONSULATES. HE WAS NOT DETAINED OR
ARRESTED BY ANY FOREIGN LAW ENFORCEMENT. HE DID NOT COMMIT ANY
ILLEGAL OR CI^ROMISING BEHAVIOR WHILE INAFOREI^ COUNTRY. HE DID
NOT STRAY FROM ANY OFFICIAL TOURS OR VISIT ANY RESTRICTED AREAS. HE
DID NOT HAVE HIS PASSPORT CONFISCATED OR LOST. HE DID NOT HAVE ANY
REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000

^

17063

NAME MANNING, BRADLEY EDWARD

1CASEII08F18704

IPAGE 3

DATES OF INVESTIGATION 12/06/07-12/07/07 | SID 0414 |ORGIDC39 IREPORT^ 1
PROPERTY CONFISCATED. HE DID NOT HAVE ANY SEEMINGLY ACCIDENTAL
MEETINGS WITH ANY FOREIGNERS. HE WAS NOT APPROACHED BY ANY FOREI^RS
TO DEVELOPAFRIENDSHIP FOR NO APPARENT REASON.
HE WAS FIRED FROM FYEIN 6/06 FOR NOT MEETING HIS SALES GOALS.
(DISCREPANT) HE FAILED TO LIST THIS FIRING FROM FYE ON HIS SF 86 AS
AN OVERSIGHT. HE WAS GIVENAVERBALWARNING,WRITTEN WARNING AND THEN
FIRED FOR NOT MEETING HIS SALES EXPECTATIONS. HE COULD NOT ESTIMATE
MORE PRECISE DATES THAT THESE THINGS HAPPENED. HE WAS FIRED,VERBALLY
WARNING AND WRITTEN UP ALL BY RODNEY STEWART. HE DID NOT HAVE ANY
OTHER PROBLEMS AT THIS EMPLOYMENT. HE DOES NOT RECALL ANYt^ ELSE
THAT WOULD BE AWARE OF THIS. INFORMATION CONCERNING THIS FIRING COULD
NOT BE USED AGAINST HIM AS BLACKMAIL OR COERCION. HE DOES NOT THINK
THAT HE WOULD BE ELIGIBLE FOR REHIRE.
HE HADADIFFERENCE IN PROFESSIONAL OPINION AND STYLE THAN HIS
SUPERVISOR,(b) (6), (b) (7) , AT ^OTOI^C. HE ULTIMATELY LEFT ^OTO FOR
THIS REASON(C)
. HE AND (b) (6), HAD DIFFERENCES IN OPINIO WHEN IT CAME
TO STYLES IN WRITING (b)
SOFT
WARE. HE DID NOT LIKE(b) (6), (b) STYLE,BUT
(7)
HE ULTIMATELY DID IT HIS WAY BECAUSE HE WAS THE(7)(C)
BOSS AND CEO OF THE
(C)
CI^ANY. THIS DIFFERENCE IN STYLES DID NOT RESULT IN ANY DISCIPLINARY
ACTIONS OR POOR WORK EVALUATI^S. HE (b) (6), (b) CAME TOAMUTUAL
AGREEMENT THAT IT WOULD BE BEST IF HE (7)(C)
PURSUED ANOTHER ^OB. HE WAS NOT
FIRED. HE LEFT I^OTO VOLUNTARILY. HE WAS NOT TOLD TO QUIT. HE DOES
NOT THINK THAT HE WOULD BE ELIGIBLE FOR REHIRE DUE TO HIS DIFFERENCE
IN STYLE WITH THE CEO OF THE COMPANY. THERE ARE NO HARD FEELINGS
BETWEEN HIM AND(b) (6), . ANYONE THAT WAS AT THE COMPANY AT THAT TIME
(SMALL COMPANY (b)
0F8PE0PLE)W0ULD
BE AWARE OF THEIR DIFFERENCE IN
(7)
STYLES AND THE REASON FOR HIS DEPARTURE. INFORMATION CONCERNING THIS
(C)
COULD NOT BE USED AGAINST HIM IN ANY WAY AS BLACKMAIL OR COERCION.
ALL OF THE INFORMATION INCLUDED ON HIS SF 86 AND PROVIDED DURING HIS
PERSONAL SUB^CT INTERVIEW IS TRUE AND C^LETE WITH THE FOLLOWING
EXCEPTIONS:
HIS WORK PHONE NUMBER IS (301)765-0556. (DISCREPANT) HE DOES NOT
KNOWWHY HIS SF 86 DID NOT SHOWAWORK PHONE NUMBER.
SINCE HE FILLED OUT HIS SF 86 HE HAS BEEN ACTIVE DUTY ENLISTEDIN THE
U.S. ARMY SINCE 10/07. (DISCREPANT) SINCE 10/07, HE HAS BEEN
STATIONED AT FORT LEONARD WOOD,MISSOURI FOR BASIC TRAINING. HEDGES
NOT KNOW AN ADDRESS OR PHONE NUMBER OF HIS EMPLOYER AT FORT LEONARD
WOOD. HEISAPRIVATE,E01, INTELLIGENCE ANALYST. HIS SUPERVISOR IS
DRILL SERGEANT ROBINSON. HE DOES NOT I^NOW AN ADDRESS, PHONE NUMBER OR
FIRST NAME OF DRILL SERGEANT ROBINSON. HE HAS ALSO LIVEDIN THE
BARRACKS AT FORT LEONARD WOOD,MISSOURI SINCE HE ARRIVED FOR BASIC
TRAINING IN 10/07. (DISCREPANT) HE DOES NOT KNOW AN ADDRESS OF THE
BARRACKS THAT HE HAS STAYEDIN. HIS BATTLE BUDDY, PRIVATE ANDREW
DUFFEY CAN VERIFY HIS CONDUCT AND ACTIVITIES SINCE HE HAS LIVED IN THE
BARRACKS AT FORT LEONARD WOOD. HE DOES NOT KNOW AN ADDRESS,OR PHONE
REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000

^

17064

NAME MANNING, BRADLEY EDWARD

1CASEII08F18704

IPAGE 4

DATES OF INVESTIGATION 12/06/07-12/07/07 | SID 0414 1ORGID039 | REPORTS 1
NUMBER FOR PRIVATE DUFFEY.
HE LIVED AT 5607 71ST PLACE EAST, APARIMENT 1005, IN TULSA, OKLAH^
FROM 4/06 TO 7/06. HE DOES NOT RECALL ANY NEIGHBORS AT THIS
RESIDENCE. HE DOES NOT THINK THAT ANY NEIGHBORS WOULD RECALL HIM AT
THIS RESIDENCE,BECAUSE THIS APARTMENT COMPLEX WAS VERY TRANSIENT.
THE ONLY PERSON THAT HE COULD RECALL THAT VISITED HIM THERE WAS HIS
FRIEND, (b) (6), (b) .(b) (6), (b) S LIVES AT (b) (6), (b) (7)(C)
.(b) (6)
CAN BE REACHED ON
(b) (6), (7)(C)
(b) (7)(C) (7)(C)
HIS CELL PHONE NUMBER AT(b) (6), (b) .

(7)(C)
HE LIVED WITH HIS FATHER AND STEP-MOTHER AT(b) (6), (b) (7)(C)
FROM 9/05 TO 4/06. HE DOES NOT RECALL ANY
(b) (6), (b) (7)(C)
NEIGHBORS AT THIS RESIDENCE. HE DOES NOT KNOW IF ANY OF THE NEIGHBORS
WOULD KNOW OF HIM LIVING THERE OR NOT. HE DID NOT HAVE ANY VISITORS
AT THIS RESIDENCE. THE ONLY PEOPLE THAT CAN VERIFY THIS RESIDENCE ARE
HIS FATHER AND STEP-MOTHER WHO STILL LIVE THERE. HIS FATHER(b) (6),
CAN BE REACHED ON HIS CELL PHONE AT(b) (6), (b) . (b)
D
(b)
(b) (7)
LIVES
AT
.
(b)
(6)
(b)
(6),
(b)
(7)(C)
(6),
(7)(C)
(6)
(C)
CAN BE REACHED BY TELEPHONE AT (b) (6), (b) . HE
(b)
(6),
(b)
(7)
(b)
DOES NOT KNOW ANY OTHER CONTACT INFORMATION (b) (6),
(b) (7)(C) .
(C)
(7)(C)

(7)(C)

HE LIVED AT(b) (6), (b) (7)(C)
^ FROM
11/01 TO 9/05. (DISCREPANT) HE DOES NOT KNOW WHY HIS SF 86 SAYS THAT
HE LIVED IN HAVERFORD, UNITED KIN^^X^ INSTEAD OF HAVERFORD WEST,
UNITED KINGD^.
HE LIVED AT(b) (6), (b) (7)(C)
FROM 11/00 TO
11/01. (DISCREPANT) HE DOES NOT I^NOW WHY HIS SF 86 HAS THE WRONG
STARTING DATE FOR THIS RESIDENCE.
FROM 1/92 UNTIL ll/OO HE LIVED AT(b) (6), (b) (7)(C)
(b) . (DISCREPANT) HE DOES NOT I^NOW WHY THIS RESIDENCE WAS
CI^LETELYLEFTOFFHISSF86. HE DOES NOT KNOWAMORE PRECISE
(6),
ADDRESS FOR THIS RESIDENCE. HE DOES NOT KNOW IF THIS ADDRESS ISA
(b)
PHYSICAL ADDRESS OR NOT.
(7)
(C)
HE ATTE^ED TASKER MILWARD VCFR^12/01TO 6/05. (DISCREPANT) AS AN
OVERSIGHT, H E E ^ R ^ T ^ WRONG STA^TINCDAT^^HISSF82FO^^^IS
EDUCATION.
HE DID NOT EARNADEGREEFR^MONTG^RY COLLEGE OF ROCKVILLE.
(DISCREPANT) HE DID NOT I^NOW THAT HE WAS REQUIRED TO ENTER"N/A"FOR
NOT APPLICABLE FOR ANY QUESTION ON HIS SF 86 THAT DID NOT APPLY TO
HIM. THEREFORE,MONTH/YEAR DEGREE AWARDED ON HIS SF 86 ALSO DOES NOT
APPLY. (DISCREPANT) HE WORKED PART TIME AT STARBUCKS FR^ 1/07 TO
5/07 WHILE ALSO GOING TO SCHOOL FULL TIME AT MONTGOMERY COLLEGE OF
ROCKVILLE.
HE WAS UNEMPLOYED FROM 6/06 TO 1/07.

HE SPENT HIS TIME LOOKING FORA

REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000

^

17065

NAME MANNING, BRADLEY EDWARD

1CA8Eil08F18704

|PAGE 5

DATES OF INVESTIGATION 12/06/07-12/07/07 | SID 0414 | ORG ID 039 1 REPORTS 1
^OB AND LOOKING AT COLLEGES TO ATTEND. HE ALSO SPENT HIS TIME PLAYING
ONHISCt^^lPUTER. HE WAS SUPPORTED FINANCIALLY BY HIS AUNT,(b) (6),
CAN VERIFY HIS ACTIVITIES A(b)
ND (7)
(b) (6), (b) (7)(C)
FINANCIAL SUPPORT DURING THIS PERI^ OF UNEMPLOYMENT.(b) (6), (b)
(C)
(b) N LIVES AT (b) (6), (b) (7)(C)
(7)(C)
C
A
N
BE
R
E
A
C
H
E
D
B
Y
T
E
L
E
P
H
O
N
E
AT
(b)
(b) (6), (b)
(6),(6),

(b) (7)(C)
(7)(C)
HE WORKED AT INCREDIBLE P I ^ ^ CO FRO^ 5/06 TO 7/06, (DISCREPANT) HE
(7)
DOES NOT I^NOW WHY HIS SF 86 SAYS THAT HE WORKED AT THIS EMPLOYMEI^
(C)
FROM 9/05 TO 2/06. THISIS INCORRECT. HE DID NOT ENTER THESE DATES
FOR THIS EMPLOYMENT. HE WORKED AT INCREDIBLE PI^:^ CO WHILE ALSO
WORKING PART TIME AT FYE FROM 5/06 TO 6/06. HE DOES NOT RECALL ANYONE
OTHER THAN THE LISTED VERIFIERS FOR HIS EMPLOYMENTS AT ^OTO, FYE AND
INCREDIBLE P1^^ CO.
THEREFORE HE WAS UNEMPLOYED FROM 8/88 TO 2/06. HE SPENT HIS TIME
GOING TO SCHOOL FULL TIME, LOOKING FORA^B ONCE HE GOT OUT OF H I ^
SCHOOL, AND WATCHING TELEVISION. HE WAS SUPPORTED FINANCIALLY BY HIS
PARENTS. HIS FATHER(b) (6), (b) (7) CAN VERIFY HIS ACTIVITIES AND
FINANCIAL SUPPORT WHILE
(C) HE WAS UNEMPLOYED DURING THIS TIME.(b)
LIVES AT(b) (6), (b) (7)(C)
(b)
(6),
.
(b) . HIS FATHER CAN BE REACHED BY TELEPHONE AT((b) (6)
(6)

(b) (7)
HE DOES NOT KNOW WHY THE QUESTION PERTAINING TO CITIZENSHIP(C)
OF HIS

(6)

RELATIVES (ill5)0N HIS SF 86 WAS NOT ANSWERED. NONE OF HIS RELATIVES
ARE U.S. CITIZENS BY OTHER THAN BIRTH,OR ALIENS RESIDING WITHIN THE
U.S. (DISCREPANT) HIS MOTHER USED TO BE AN ALIEN RESIDING IN THE
U.S. UP UNTIL THEY MOVED TO THE UNITED KINGDOM IN 11/01. WHILE SHE
LIVED in THE U.S. SHE HADAGREEN CARD. HE DOES NOT I^NOW ANY FURTHER
INFORMATION CONCERNING HER GREEN CARD PRIOR TO 11/01.
THE ONLY PEOPLE THAT HE SOCIALI^S WITH IN HIS SPARE TIME ARE (b) N
(b) (THIRD LISTED REFERENCE^HISSF 86),(b) (6) (GOES BY(b)
(6)(6))
HE
(b) (6), (FIRST LISTED REFERENCE ON HIS SF 86),AND (b) (6)
(6)
OOES
(b)
(7)NOT ^^NOW AN ADDRESS ORPHIC NUMBER FO(b) (6), (b) . HIS SECOND
LISTEOR^FERENCEONHISSF86, (b) (6), (b) (7)
RDISTHE FATHER OF HIS
(7)(C)
(C)
FIRST LISTED REFERENCE,(b) (6),(C)
(b) (7) HE DOES NOT I^(b) (6), (b) (7)
AS WELL AS (b) (6), (b) (C)
(b) (6), (b) (b) (6), (b) (7) .(C)
(7)(C)
(7)(C)
(C)
AS AN OVERSIGHT HE FORGOT TO INCLUDE HIS STEP-MOTHER,(b) (6), (b)
(b) (6), ON HIS SF 86 UNDER THE RELATIVES SECTION. (DISCREPANT)
(b)
(7)(C)
(6), (b) NGISAU.S. CITIZEN. HE DOES NOT KNOW(b) (6), (b) (6),
(b) (7)
(b)
(6) DATE OF BIRTH OR COUNTRY OF BIRTH. (b) (6),
(b) (7)(C) (b)
(7)(C)
(7)(C)
(C)
LIVES WITH HIS FATHER,(b) (6), (b)
AT (b) (6), (b) (7)(C)
(7)
(b) (6), (b) (7)(C)
(7)(C) .
(C)
THERE IS NOTHING IN HIS BACKGROUND THAT COULD BE USED AGAINST HIM AS
BLACI^IL OR COERCION.

ITEM: 029

SOURCE: 002
REPORT OF INVESTIGATION
PROPERTY OF U.S.OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000

17066

NAME MANNING, BRADLEY EDWARD

^CASEli08F18704

|PAGE 6

DATES OF INVESTIGATION 12/06/07-12/07/07 | SID 0414 | ORG ID 039 | REPORTS 1
NAME ANDREW ^.DUFFEY,CANNON CREW MEMBER(b) (6), (b) (7)(C)

CA

(b)
INTERVIEWED
(6), AT RHU BARRACKS, FIRST FLOOR MEETING ROOM, FORT LEONARD WOOD,
MD 65473
(b)
(7) 12
ISSUE(S)
PRIMA(C)
RY ASSOCIATION COWORKER
AVERAGE EXTENT OF CONTACT REGULAR
SPAN OF CONTACT 10/07-PRESENT
REOO^NDS
ANDREW DUFFEY MET BRADLEY MANNING WHEN THEY STARTED BASIC TRAINING IN
THE ARMY AT FORT LEONARD WOOD, MISSOURI. DUFFEY HAS SEEN HIM ONA
DAILY BASISIN TRAINING ANDIN THE BARRACKS. THIS CONTACT CONTINUES
UNTIL THE PRESENT,
HE WILL BE DISCHARGEDFRCM THE ARMY FOR MEDICAL REASONS. DUFFEY DOES
NOT I^NOW WHEN HE WILL BE DISCHARGED. DUFFEY IS NOT SURE WHO KNOWS
ABOUT HIS PROBABLE MEDICAL DISCHARGE FROM THE ARMY. DUFFEY DOES NOT
THINK THAT THIS INFORMATION COULD BE USED AGAINST HIM IN ANY WAY AS
BLACI^IL.
HE HAS BEE^ IN THE ARMY SINCE 10/07. HE HAS NOT HAD ANY DISCIPLINARY
PROBLEMS WHILE HE HAS BEEN IN THE ARMY. DUFFEY HAS NO RESERVATIONS
ABOUT CO^INUING TO WORK WITH HIM IN THE FUTURE.
DUFFEYIS NOT AWARE OF ANYTHING IN HIS BACKGROUND THAT COULD BE USED
AGAINST HIM AS BLAC^IL OR COERCION.

^^^^ END OF REPORT ^^^^
REVISED: 01/11/08

PRINTED: 01/16/08

^

17067

NAME MANNING, BRADLEY EDWARD

|CASEll08F18704

IPAGE 1

DATES OF INVESTIGATION 10/12/07-10/18/07 ISID0721 IORGIDC48 IREPORTHOl

TESTIMONIES
ITEM: 003

INVESTIGATOR'SNOTE

SOURCE: 001

DUE TO THE TRANSIENCE OF THE NEIGHBORHO^, ALL ATTEMPTS TO OBTAIN
KNOWLEDGEABLE PERSONAL SOURCES MET WITH NEGATTIVE RESULTS. FOUR
NEIGHBORS WERE CONTACTED AT 8016 ( 1ST HOUSE EAST-SAME STREETSIDE),
8100 (2ND HOUSE WEST-SAME STREETSIDE), 8017 (1ST HOUSE NORTHDIRECTLY ACROSS STREET),AND AT 8021 (2ND HOUSE NW-ACROSS STREET)
NW119THST,0KLAH^CITY,0KLAH^, ALL WITH NEGATIVE RESULTS. ALL
FOUR OF THE NEIGHBORS CONTACTED MOVEDINTO THEIR H^S AFTER 9/06.
NONE OF THE PEOPLE CONTACTED HAVE KNOWLEDGE OF SUB^CT AND WERE UNABLE
TO PROVIDE ANY INFORMATION. TWO HOUSES AT 8024 (1ST HOUSE WEST-SAME
STREETSIDE) AND AT 8025 (3RD HOUSE NW-ACROSS STREET) ARE BOTH
VACANT. ATTEMPTS TO CONTACT LISTED SOURCE IN TULSA,OKLAH0MA,BY
TELEPHONE MET WITH NEGATIVE RESULTS. ATTEMPTS WERE MADE ON 10/12
(FRI), 10/13 (SAT),10/14 (MON) AND ON 10/17/07 (WED),ALL WITH NO
ANSWER.NO FURTHER INFORMATION IS AVAILABLE.
ITEM:008

INVESTIGATOR'SNOTE

SOURCE: 002

ATTEMPTS TO OBTAIN SUB^CT'S RECORD INFORMATION MET WITH NEGATIVE
RESULTS. THE TWO PERSONNEL IN THE OFFICE PROVIDED INFORMATION THAT
RECORD INFORMATI^ IS NOT MAINTAINED AT THE 2-PERS^ OFFICE IN
OKLAHOMA CITY,OKLAHOMA,AND BOTH WERE UNABLE TO PROVIDE ANY
ADDITIONAL INFORMATION. THE LISTED SOURCE TRANSFERRED TO SAN
FRANCISCO, CALIFORNIA IN 8/07. ATTEMPTS TO CONTACT SOURCE BY TELEPHt^
MET WITH NEGATIVE RESULTS. MESSA^S WERE LEFT AT SOURCE'S TELEPH^
NUMBER ON 10/12 (FRI), 10/15(MON), 10/16 (TUE),AND ON 10/18/07 (
THU) ALL WITH NO RESPONSE.NO FURTHER INFORMATI^ IS AVAILABLE.

ITEM: 013
SOURCE: 003
NAME(b) (6), (b) (7) , DESIGNER, ^OTO, INCORPORATED, 123 SOt^ HUDSON
STREET,OKLAHOMA CITY, OK 73102
(C)
ACCEPTABLE
PRIMARY ASSOCIATION COWORKER
AVERAGE EXTENT OF CONTACT REGULAR
SPAN OF CONTACT 11/05-4/06
RECO^NDS

(b) (6), MET BRADLEY MANNING IN 11/05 (DISCREPANT),WHEN BARRETT BEGAN
EMPL
OYMENT AT ^OTO, INCORPORATED, OKLAHI^ CITY, OKLAH^, WHERE
(b)
(7)
MANNING WAS EMPLOYED ASAFULL TIME PROGRAMMER /DEVELOPER(b) (6),
(C)
WORKED I ^ THE SAME 2-PERSON OFFICE WITH MANNING AND HAD DAILY
WORK
(b) (7)(C)
CONTACT WITH MANNING FROM 11/05-4/06.MANNING ENDED HIS EMPLOYMENT
IN 4/06 AND(b) (6), HAS NOT HAD CONTACT WITH MANNING SINCE 4/06.

(b) (7)
(C)

REPORT OF INVESTIGATI^
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,D.C. 20415-4000

^

17068

NAME MANNING, BRADLEY EDWARD

1CASEII08F18704

IPAGE 2

DATES OF INVESTIGATION 10/12/07-10/18/07 | SID 0721 10RGIDC48 IREPORT^ 1
BARRETT DID NOT HAVE SOCIAL CONTACT WITH MANNING.
SUB^CTISAFRIENDLY, EASY GOING, AND PLEASANT PERSON TO WORK WITH.
HEIS THOROUGH, DETAIL ORIENTED, AND CONSCIENTIOUS. SUB^CTISATEAM
PLAYER AND WORKED WELL WITH SOURCE. HEIS HONEST, TRUSTWORTHYAND
STRAIGHTFORWARD. SUB^CT IS POLITE, COURTEOUS, AND RESPECTFUL. HE IS
EVEN TEMPERED AND SOURCE EN^YED WORKING WITH SUB^CT. SOURCE HAS NO
KNOWLEDGE OF SUB^CT'S OUTSIDE INTERESTS OR LEISURE TIME ACTIVITIES.
SOURCE IS NOT AWARE OF ANYTHING IN SUB^CT'S BACKGROUND THAT COULD BE
USED AGAINST SUB^CT FOR COERCION OR BLAC^IL.

^^^^ END OF REPORT ^^^^
TRANSMITTED:10/18/07

PRINTED: 01/16/08

^^^^

17069

NAME MANNING, BRADLEY EDWARD

1CASEII08F18704

IPAGE 1

DATES OF INVESTIGATION 10/29/07-11/12/07 | SID 2994 1 ORG ID 039 | REPORTHOl

TESTIMONIES

ITEM: 024
SOURCE: 001
NAME PERSONNEL TRAINEE DIVISION, BUILDING 470, FT. LEONARD WOOD,MO 65473
PERSONNEL RECORD
PROVIDER TOM BERENS,B. T.ASSI^^NT CLERK
ACCEPTABLE
NAME VERIFIED
SSN NOT SHOWN
DOB NOT SHOWN
EMPLOYMENT DATES 10/07-PRESENT
STATUS FULL TIME
WORKSITE ADDRESS NOT SHOWN
POSITION TRAOtEEPVl
EMPLOYMENT STATUS CHANGE NOT APPLICABLE

POB NOT SHOWN

ITEM: 025
SOURCE: 002
NAME PERSONNEL TRAINEE DIVISION,BUILDING 470, FT. LEONARD WOOD,MO 65473
MILITARY RECORD
OBTAINED BY O^STIGATOR
ACCEPTABLE
NAME VERIFIED

SSN VERIFIED

DOB VERIFIED

POB VERIFIED

BRANCH OF SERVICE USA
DATE ENTERED SERVICElO/07
DUTY STATUS ACTIVE

GRADE PVl

ITEM: 026
SOURCE: 003
NAME BARRACKS MANAGEMENT,BUILDING 470, FT. LEONARD WOOD,MO 65473
RENTAL RECORD
PROVIDER HANITA LACK, LEADINSPECTOR
NO RECORD
TRAINEES ARE REQUIRED TO LIVEIN BARRACKS. NO RESIDENTIAL RECORDS ARE
MAINTAINED.
ITEM: 026

INVESTIGATOR'SNOTE

SOURCE: 004

TRAINEES ARE REQUIRED TO LIVE IN BARRACKS WHILE IN BASIC TRAINING.
THIS IS ALSO THE SAME LOCATI^ AS THE TRAINEES' EMPLOYMENT. THE
TRAINEES' EMPLOYMENT RECORD LOCATION IS UNDERSTOOD TO BE THE SAME AS
THE TRAINEES' RESIDENTIAL LOCATION.

REPORT OF INVESTIGATION
PROPERTY OF U.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASH1NGTON,DC 20415-4000

^

17070

NAME MANNING, BRADLEY EDWARD

jCASE # 08F18704

|PAGE 2

DATES OF INVESTIGATION 10/29/07 - 11/12/07 | SID 2994 | ORG ID C39 | REPORT # 01

**** END OF REPORT *••*
TRANSMITTED: 11/12/07

PRINTED: 01/16/08

^

17071

NAME MANNING, BRADLEY EDWARD

^CASEll08F18704

IPAGE 1

DATES OF INVESTIGATION 12/18/07-12/27/07 | SID 4737 | ORGIDW30 1 REPORTHOl

TESTIMONIES

ITEM: 031
NAME (b) (6), (b) (7) , (b) (6), (b) (7)(C)

SOURCE: 001

(C)

ISSUE(S) 11
PRIMARY ASSOCIATION RELATIVE
AVERAGE EXTENT OF CONTACT REGULAR
SPAN OF CONTACT 12/1987 TO PRESENT
REC^^NDS
IS
(b) (6), MET BRADLEY MANNING WHEN THE SUB^CT WAS BORN (b) (6),
MANN(7)
ING'S AUNT. MANNING LIVEDIN OKLAH^ FROM 12/1987 (b)
TO (7)(C)
12/2001
(b)
WHEN HIS PARENTS DIVORCED.(b) (6), SAW MANNING ^CEAYEAR DURING
(C)
THAT PERIOD. MANNING LIVED(b)
IN (7)
ENGLAND WITH HIS MOTHER FROM 12/2001
TILL APPROXIMATELY 10/2005.
(C)

(b) (6), HAD NO C^ACT WITH MANNING FROM 12/2001 TO APPROXIMATELY 2004
WHEN
(b)
(7)THEY ATTENDED THE SUB^CT'S SISTER'S WEDDING. MANNING COMPLETED
HIGH SCHOOL IN ENGLANDIN 07/2005 AND MOVEDIN WITH HIS FATHER IN
(C)
OKLAHOMA IN APPROXIMATELY 10/2005. MANNING LIVED WITH HIS FATHER AND
STEPMOTHER TILL APPROXIMATELY 07/2006 WHEN HE MOVED IN WITH THE
SOURCE. ALSTYNE SPOKE WITH MANNING ONE TIME WHILE HE LIVED WITH HIS
FATHER, BUT SAW MANNING DAILY WHILE HE LIVED WITH THE SOURCE.
MANNING LIVED WITH (b) (6), TILL 10/2007 WHEN HE COINED THE US ARMY.
MAN(7)
NING ^CEAWEEKSOtCE 10/2007.
(b) (6), SPEAKS WITH(b)
(b) (7)
(C)
MANNING LIVED IN ENGLAND FR^ 12/2001 TO APPROXIMATELY 10/2005. THE
(C)

SOURCE IS UNAWARE OF ANY PROBLEMS WITH FOREI^ OFFICIALS ASARESULT
OF THIS TIME
ENGLAND. MANNING STILL HAS CONTACT WITH HIS MOTHER
AND At^S(b)
, 80^^CITI^^NS0F^^ tlN:t^OK^NC^OM, EVERY3-4W^EKS
BY TELEP(6),
HONE.

(b)

MANNING ALSO TOOKASCHOOLTRIP TO ^AN IN APPROXIMATELY 2004 F0R2
(7)(C) NO PROBLEMS ANDHAS NO CONTINUING CONTACT WITH ANY
WEEKS. HEHAD
FOREIGN NATIONALS FROM THIS VISIT.
MANNING WAS UNEMPLOYED WHILE LIVING WITH THESOURCE FROM 07/2006 TO
12/2006. HE SPENT HIS TIME RESEARCHING COLLEGES AND WAS SUPPORTED
FINANCIALLY BY THE SOURCE. HE WORKED FOR STARBUCKS FR^ 12/2006 TO
10/2007. MANNING ALSO TOOK 3-4 CLASSES AT MONTGOMERY COLLEGE FROM
01/2007 TO 06/2007.
MANNING ENVOYS COMPUTERS,READING AND M^SIC.
ITEM: 031

INVESTIGATOR'SNOTE

SOURCE: 002

REPORT OF INVESTIGATION
PROPERTY OF U.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,DC 20415-4000

17072

NAME MANNING, BRADLEY EDWARD

|CASEliO8F18704

IPAGE 2

DATES OF INVESTIGATION 12/18/07 - 12/27/07 1 SID 4737 IORGIDW30 IREPORTHOl

SOURCE WASINTERVIEWED DUE TO LACK OF RESIDENTIAL AND UNEMPLOYMENT
COVERAGE.

ITEM: 032
NAME (b) (6), (b)
20854
(7)(C)

SOURCE: 003
BARISTA, STARBUCKS, 7911TUCKERMANLANE, POT^C,MD

ACCEPTABLE
PRIMARY ASSOCIATION SUPERVISOR
AVERAGE EXTENT OF CONTACT REGULAR
SPAN OF CONTACT APPROX 02/2007 TO APPROX 09/2007
NO REASON NOT TO RECOMMEND

(b) T MET BRAD MANNING WHEN MANNING BEGAN WORKING WIT(b) T AT
STARBUCKS, (b)
WAS THE SUB^CT'S TRAINER AND SUPERVI
SOR AND SAW
(6),
(6),
MANNING 3-4 (6),
DAYSAWEEK AT WORK UNTIL MANNING LEFT IN APPROXIMATELY
(b)
(b)
09/2007. THEY ALSO LIVEDIN THE SAME NEIGHBORHO^ AND SAW EACH OTHER
(b)
(7)
ONCEAWEEK AND SPOKE IN THE NEIGHBORHOOD ON THOSE OCCA(7)
SIONS, THERE
(C)
WERE NO GAP(7)
S IN CONTACT (b) (6), T HAS HAD NO CONTACT(C)
WITH MANNING
SINCE APPROX(C)
IMATELY 09/2007.
(b) (7)
(C)
MANNING LIVED WITH HIS AUNT OFF OF FALLS ROAD IN POTOMAC,MD. HE
COINED THE US ARMY IN APPROXIMATELY 09/2007. MANNING ATTENDED HIGH
SCHOOL IN ENGLAND. THE SOURCEIS UNAWARE OF THE REASON FOR THE
EDUCATION OUT OF THE U.S.OR ANY DETAILS REGARDING THAT TIME PERIOD.

MANNING ENVOYS MATH, SCIENCE AND MUSIC.

^^^^ END OF REPORT ^^^^
TRANSMITTED: 12/27/07

PRINTED: 01/16/08

17073

NAME MANNING, BRADLEY EDWARD

1CASEII08FI8704

IPAGE 1

DATES OF INVESTIGATION 10/16/07 - 11/28/07 1 SID 6885 IORGIDC49 | REPORT 1102

TESTIMONIES

ITEM: 004
NAME OOOPERMILL APARTMENTS, 5607 71ST PLACE E., TULSA,OK
RENTAL RECORD
PROVIDER (b) (6), (b) BOOKKEEPER
SF RELEAS(7)(C)
E

SOURCE: 001

ISSUE(S) 03A
NAME VERIFIED

SSN NOT SHOWN

RENT DATES 04/06-07/06
RENTERS BRADLEY MANNING

DOB NOT SHOWN

POB NOT SHOWN

RENTPAYME^SEEISSUES

UNIT 5607 71ST PLACE E., APARTMENT 1005, TULSA,OK
FORWARDING ADDRESS NOT SHOWN
OCCUPANT(S) SAME AS RENTERS
RECORDS INDICATE SUB^OT MOVED INTO APARTMENT ALONE t ^ 4/18/06 AND
SKIPPED^7/12/06.
4/15/06 PAID ^155
5/1/06 PAID^TIME ^349.00
6/12/06 PAID ^349 PLUS LATE FEES ^50
7/12/06 BOOKKEEPER (b) (6), (b) DISCOVERED APAI^TMENT WAS EMPTY WITH
KEYS ON COUNTER.EXACT
DATE OF DEPARTURE NOT KNOWN.
(7)(C)
CURRENT AMOUNT OWED: ^1,472.51 FOR PAST RENT, CLEANING,DAMAGES, AND
TERMINATION FEE.
NO OTHER DEROGATORY It^RMATION IN FILE.
ITEM: 004

INVESTIGATOR'SNOTE

SOURCE: 002

NOPERSONALTESTIMONY POSSIBLE AS PER BOOKKEEPER ^OLINE ABBEY OF
COOPERMILL APARTMENTS WHO INFORMED INVESTIGATOR THAT ALL CURRENT
RESIDENCES IN THE VICINITY OF THE APARTMENT MOVEDIN AFTER SUB^CT
MOVED OUT OF THE APARTMENT,
ITEM: 007

INVESTIGATOR'SNOTE

SOURCE: 003

FYE DOES NOT MAINTAIN EMPLOYMENT RECORDS. ALL EMPLOYMENT RECORDS MUST
BE OBTAINED THROUGH TRANSWORLD ENTERTAINMENT. ITEM FOR TRANSWORLD
ENTERTAINMENT WAS OBTAINED AND REPORTED.
ITEM: 009

INVESTIGATOR'SNOTE

SOURCE: 004

REPORT OF INVESTIGATION
PROPERTY OFU.S. OFFICE OF PERSONNEL MANAGEMENT (IS)
1900EST,NW,WASHINGTON,DC 20415-4000

17074

NAME MANNING, BRADLEY EDWARD

|CASEll08F18704

|PAGE 2

DATES OF INVESTIGATION 10/16/07-11/28/07 1 SID 6885 1 ORG ID 049 | REPORT^02

INVESTIGATOR WAS UNA8LE TO OBTAIN EMPLOYMENT RECORD DUE TO CONFLICT OF
INFORMATION.
SOURCE UNIT DIRECTOR,(b) (6), (b)
INFORMED INVESTIGATOR THAT RECORDS
ARE NO PERSO^L RECORD
S
F
O
R
PREVIOUS
EMPLOYEES AND THAT ALL RECORDS
(7)(C)
ARE KEPT AT THE CORPORATE OFFICE.(b) (6), PROVIDEDINVESTIGATOR WITH
PHONE NUMBER OF CORPORATE OFFICE.
(b) (7)

(C)
ALSO INFORMEDINVESTIGATOR THAT THERE ARE CURRENTLY NO
(b)
EMPLOYEES WORKING AT INCREDIBLE PI^^A WHO WOULD HAVE WORKED WITH
(6),
SUB^OT.
(b)
(7)(C)
INVESTIGATOR MADE PHONE CONTACT WITH THE CORPORATE OFFICE,NAME OF
PERSON NOT OBTAINED, INFORMEDINVESTIGATOR THAT EACH STORE KEEPS THEIR
OWN RECORDS.
INVESTIGATOR MADE PH^ CONTACT WITH LISTED SUPERVISO(b) (6), (b)
(b) ,KNOWN AS (b) (6), (b) (7)(C) INFORMED INVESTIGATOR
(7)(C)THAT HE
DID NOT RECALL SUB^CT DUE TO HAVING SEVERAL EMPLOYEES, BOTH PAST AND
(6),
PRESENT.
(b)
(7)
(C) 021
ITEM:
SOURCE: 005
NAME TRANSWORLD ENTERTAI^NT, 38 CORPORATE CIRCLE, ALBANY, NY 12203
PERS^^L RECORD
PROVIDER (b) (6), (b) HR
SF RELEAS
E
(7)(C)
TELEPHONE TESTIM^
ACCEPTABLE
NAME VERIFIED

SSN VERIFIED

DOB NOT SHOWN

POB NOT SHOWN

EMPLOYMENT DATES 05/06-06/06
STATUS FULL TO^
WORKSITE ADDRESS WOODLAND HILLS MALL, TULSA,OK
POSITION LEAD ASSOCIATE/MANAGEMENT
^ 1 ^ 1 ^ S^ATt^SNO^S^CWN

EMPLOYMENT STATUS CHANGE NOT SHOWN
EMPLOYMENT DATES 5/24/06 TO 6/10/06
NO OTHER INFORMATION AVAILABLE DUETOPOLICY AND PROCEDURE.
ITEM: 021

INVESTIGATOR'SNOTE

SOURCE: 006

INFORMATION WAS OBTAINED BY TELEPHONE WITH INVESTIGATOR CALLED TO
OBTAIN PROCEDURE POLICY FOR OBTAINING EMPLOYMENT RECORDS.

REPORT OF INVESTIGATION
PROPERTY OFU.S, OFFIOE OF PERSONNEL MANAGEMENT (IS)
1900EST, NW,WASHINGTON, DC 20415-4000

^

17075

NAME MANNING, BRADLEY EDWARD

ICASE # 08F18704

jPAGE 3

DATES OF INVESTIGATION 10/16/07 - 11/28/07 | SID 6885 | ORG ID C49 | REPORT # 02

***• END OF REPORT ****
TRANSMITTED: 11/28/07

PRINTED: 01/16/08

09

17076

NAME MANNING, BRADLEY EDWARD

ICASE 1108F18704

|PAGE 1

DATES OF INVESTIGATION 11/02/07 - 11/09/071 SID 7296 IORGIDA06 IREPORTHOl

TESTIMONIES

ITEM: 023
SOURCE: 001
NAME THE WORK NUMBER, STARBUCKS COFFEE COMPANY,WWW.THEW0RKNUMBER.COM,
PERSONNEL RECORD
OBTAINED BY INVESTIGATOR
TELEPHONE TESTIMONY
ACCEPTABLE
NAME VERIFIED

SSN VERIFIED

DOB NOT SHOWN

POB NOT SHOWN

EMPLOYMENT DATES 01/07-10/07
STATUS NOT SHOWN
WORKSITE ADDRESS NOT SHOWN
POSITION BARISTA
REHIRE STATUS NOT SHOWN
EMPLOYMENT STATUS CHAIilGE NOT SHOWN
ITEM: 023

INVESTIGATOR'SNOTE

SOURCE: 002

RECORD INFORMATII^ OBTAINED FR^ THE WORK NUMBER VIA THEINTERNET.

^^^^ END OF REPORT ^^^^
TRANSMITTED:ll/09/07

PRINTED: 01/16/08

17077

DATE: 02/02/12

REQUESTOR ID: FOV K115
PAGE:
1
UNITED STATES OEEICE OF PERSONNEL MANAGEMENT
INVESTIGATIONS SERVICE

*************************

CASE CLOSING TRANSMITTAL

************************

CLOSED: 10/02/2007
CASE #: 70696500
TYPE/SERVICE: ENTNAC - PRT
EXTRA COVERAGE:
NAME: MANNING, BRADLEY EDWARD
SSN: M m i - 9 (b)
DOB: # # # # 1 9 8 7 POSITION:
(6),

SON: A02M
(b)
COMMANDER (7)(C)
BALTIMORE MEPS
850 CHISHOLM AVENUE, STOP 2995
FT MEADE, MD 20755

SOI: DD70
DEPARTMENT OF DEFENSE
HQ USMEPCOM
ATTN: MOP-AD
2834 GREEN BAY ROAD
NORTH CHICAGO, I L 60064

AGENCY DATA:
OPM ADJUDICATION: F - NO ISSUES - REVIEW LEVEL 1
THE ITEM INFORMATION SUMMARIZED BELOW, AND ANY REPORTS OF
INVESTIGATION, INQUIRY FORMS AND/OR OTHER ATTACHMENTS WITH THIS
TRANSMITTAL, COMPLETE THE INVESTIGATION REQUESTED ON THE PERSON
IDENTIFIED ABOVE.
THIS CASE HAS BEEN ELECTRONICALLY TRANSMITTED TO THE AGENCY
******************************

ITEM INFORMATION

******************************

ITM

TYPE ITEM IDENTIFICATION/LOCATION

***

**** * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

**

AOl
BOl
COl
DOI

SII
FBIF
FBIN
DCII

L
L
L
L

***********************

END CASE CLOSING TRANSMITTAL

CM RESULTS
***********************

NO
NO
NO
NO

RECORD
RECORD
PERTINENT
RECORD

***********************

17078

PRINTED: 02/02/201^
REQLIE^STOR ID: E07 ^115
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT
INVESTIGATIONS SERVICE
WASHINGTON, DC 20415
Cei^t^i^lc^t^^on

In^e^t^i^^^t^^^cm

CLOSED: 10/02/2007
SUBMITTING OFFICE: SON - A02M

SECURITY^ OFFICE: SOI - DD70

DEPARTMENT OF DEFENSE
HQ U8MEPC0M
ATTN: MOP-AD
283^ GREEN BAY ROAD
NORTH CHICAGO, I L 60064-3094
NAME: MANNING, BRADLEY EDWARD
SSN: 4##1#11(b) (6)
CASE TY^PE: ENTNAC
EXTRA COVERAGE:
POSITION CODE : /

DOB: ##1^/1987

POSITION:

^

OPM CASE ^: 70696500

SCHEDULED DATE: 09/26/2007
INVESTK^ATION CONDUCTED FROM: 7
THIS CERTIFIES THAT A BACKGROUND INVESTIGATION ON THE PERSON IDENTIFIED ABOVE
HAS BEEN COMPLETED. THE RESULTS OF THIS INVESTIGATION WERE SENT TO THE SECURITY
OFFICE FOR A SECURITY/SUITABILITY DETERMINATION.
*******************************************************************************

AGENCY C^ERTIFICATION: THE RESULTS OF THIS INVESTIGATION HAVE BEEN REVIEWED, AND
A FINAL DETERMINATION HAS BEEN MADE.
AGENCY CERTIFYING OFFICIAL

. DATE

FILE THIS CERTIFICATE ON THE PERMANENT SIDE OF THE PERSON^S OFFICIAL PERSONNEL
FOLDER AFTER THE FINAL AGENCY DETERMINATION I S MADE.

UNITED STATES OF AMERICA
v.

Manning, Bradley E.

PFC, U.S. Army,

HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211



0 17079

Prosecution Motion
for Preliminary Ruling on
Admissibility of Evidence

(Business Records)

Enclosure 4

22 June 2012

39%

EXHIBIT L1 ca??nr
AGE OFFER ED: PAGE AD 59;?



PAGE or





AHESTATION CERTIFICAR

This document is intended to meet the requirements set forth in Military Rules of Evidence Rule
902(11), addressing certified records of regularly conducted activity.

I swear or af?rm that each of the following is true regarding the attached records, to the best of
my knowledge and belief:

I am the custodian of these records, or I am an employee familiar with the manner and
process in which these records are created and maintained, by virtue of my duties and
responsibilities;

1.

The records were made at or near the time of the occurrences of the matters set forth by
or from information transmitted by, people with knowledge of these matters;

The records were kept in the course of regularly conducted business activity;
It was the regular practice of the business activity to make the records; and

The records are a true, accurate, and complete copy of the original documents.

17080

List of attached records:
tooa-ma. /3 STUIWT

Emails?,

Z, 151? Tzewt-.2 Mpmiumrs

Organization 203,0-
.9/4 ?rl. 0300
Signat Dvate
374,0: 70/ 2/
Prin or Type Name K) Title
iCl
Business Tele hone I Business Address
As A4s
Subscribed and sworn to before a notary public, this day of 20 .

My commission expires on:

Notary Public

Para /0 /0 WM

1
I


. ATRRS Portals - RS



Page 1 of 2

17081

"The! Link

Army ?Inning Reouvemerzahnd Renaurcoe Sydem

Logona. Lo_gof__f - H_e_lp_Desl_< FAQs - - Por_IaI__I;l_e_Ip - ATRRS_H0rnepage- Renew Passw0rd~ Channels -Logon

Assistance Reports Gegeratot



?w?m_M9ma




Portal -
Reservations

Anothe P0 I
By Student ump 0 rta

And Ready Force"

Fungion
(RS)

Where Applicable, Double-Click on Textbox for List of Valid Veri?cation Table Values

Original

Correct SSN: Cor,feCtio_ns_ ONLY

NBITIEI

Address:

Duty Position: .

MANNING BRADLEY

E-Mail: BRADLEYMANNINGQUSARMY.MIL

Security Clearance:

Handicapped: <1 Yes 59' No

Payplan:
DLPT (LRS): 00
ASI: SOI:

00

Pay Grade; E2 Gender: MALE DLAB: 000
City: State: ZIP:
MOS: ..

Branch: Functional Area: Civilian Series: 0 -
Career Program: Unit ID Code: Rank: mum?
Grade/Pay Band:

00 -

YY MEL: MES: 9

Sub-Courses Report: Save to Excg_I, View in Browser. Text

NOTE: The Sub-Courses Report does NOT pull the entire RS Function. It only pulls AIPD Correspondence Courses for the student.

Student Reservations
Expand All Records: 2' Yes 19' No
1
Clearoelete: wow: 39? 1
Delete AII Student lnfonnatlon
Del Preq FY School Course Ph Class Remark Shipstat

2012 562 SMARTFORCE 00A ea 7EA
,3 2011 562 SMARTFORCE 0oA I gs 7EA
2010 562 SMARTFORCE 00A I 7EA
2009 562 SMARTFORCE OOA ea 7EA
2008 562 SMARTFORCE 012 I as 7EA
2008 301 027 I WJ ANM

Class Location: FT HUACHUCA. AZ85613-6000 CourseTi1Je: INTELLIGENCE ANALYST

Ship Status:

Report Date: 20o&04?11 Start Date: 2o0e04?14 End Date: 2008-08-14

Original Source: TA Original Date: 2008-01-23 On'ginal Logonid: REL3D

Last Source: RG Last Date: 2008-08-14 Last Logonid: CKB05

AATAS ID: Current Level: Next Level Access:

!.Applicati0nP0inter: Action Of?oer ID:
2008 807 750-BT 015 0 WJ ANM
='CIass Location: FT LEONARD MO es473-500o Course Title BASIC COMBAT TRAINING
Ship Status:




. ATRRS Portals - RS

Report Date:

Original Source: TA
Last Source: Ho

AATAS ID:
Application Pointer:




2008 807

2008 807

2008-01-21 Start Date:

Page 2 of 2
17082

2008-01-25 End Date: 2008-04-03

Original Date: 2008-01-23

Last Date: 2008-04-07

Current Level:
Action Of?cer ID:

750-BT

RECBN

Original Logonid: REL3D
Last Logonid: COA01

Next Level Access:

VJLJ ANM

WA ANM



9 Total Reservations

Page 1

of1

For Official Use Only

The information presented on this web site can not be reused, copied, duplicated, or distributed for purposes without written permission from Military Personnel
Management (DAPE-MPT), HQDA Army G-1, US. Army. This page was generated on June 11, 2012 at 12:21 :29 ET from data provided by Army Training Reguirernents and

Resources stern ATRRS.





asp};

6'1

Portals?TA

Page I of 1
17083

'77w Link 72? A







if [:71 ?ans I24-145610 -r-mxsr F: I
1- :11 .1
U2 Grad dale must be today to schedule new Iraining

Fhuavunaaoa

Couuzauasno Pun: Chas-ow

Rayon Duh; awe-on-11 Sun Duo: End Duh: anon-nu

L?wt??

Mum: ?wuueamasve ssu; Enmnmem; Vii]

OS: Wu Am Ootmonml:

kunstnut I ouwasuu Ia cl

Ivan!-Ionian: 0mwIRouon:I -I

Onmulnnonbz Payy-nan: IF: -rl cloumooz

008: Ejlsuv-12.17 Gender: 6 gm, r? Hoomt 5

Ih??n: VI VI

mummy. lrumsaonu 3 Fumes; Ema

PSI: A DubPSII:aoo7-no-25 Psac;x DahPSIc:2noo-was

3&


I12: I13 Im I123 I121 I1: I13 ha fizz I12: ET

l%IhK)8: vl mnnpuc: I -I vl

nunouuyAcouos:| -I _vJ| animus:-. vl Enluodsotl -I

Cull?ltll?st I571 0' DLFNUIS): IN -Hm 0| AITLoc|?on: I 9' Pn(hVoralon:F

3| 3 T-mEnBt|? ASCGI _"Jl 1? :Jl

6y..Fu. COMP: IWL vI| v? v]

U??llbi?t ORSAP: IGII OI IKS VII 9'

almunm

emu: Pnovsorvluo:

No

Bum; Tum (BTAP) Name: BTAP

sou

Ramon. I I


enuomnuyounn; 1%

Asian-moan:

Dbdumobmt Dischuunnononz I OI

&>Tohhxl$$: I

I




6/1 l/2012

UNITED STATES OF AMERICA
v.

Manning, Bradley E.

PFC, U.S. Army,

HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211



Prosecution Motion

for Preliminary Ruling on
Admissibility of Evidence
(Business Records)

Enclosure 5

22 June 2012

PROSECUTION fa-ri
PAGE OFFERED:
PAGE OF PAGES






17084

pl,

ATTESTATION CERTIFICATE

17085

This document is intended to meet the requirements set forth in Military Rules of Evidence Rule
902(11), addressing certi?ed records of regularly conducted activity.

I swear or af?rm that each of the following is true regarding the attached records, to the best of
my knowledge and belief:



1. I am the custodian of these records, or I am an employee familiar with the manner and
process in which these records are created and maintained, by virtue of my duties and
responsibilities;

The records were made at or near the time of the occurrences of the matters set forth by
or from infonnation transmitted by, people with knowledge of these matters;

The records were kept in the course of regularly conducted business activity;
it was the regular practice of the business activity to make the records; and

The records are a true. accurate. and complete copy of the original documents.

List of attached records:

Two RTF
943-35 Flo To:

Le55aoPlons,

Organization
543 305711 Ml i6/V
Si ature Date
/3 Q3 olo/.1
Title

Qya?ype Name
3i?FlO Cammi?ee

K42/ut77

Business Address

FT A7



by Sc
The attached record consists of pages"( ?les).



Subscribed and sworn to before a notary public, this

ER 5v?l~?Notary?y 1
- snares
?i in ARMY



10*?

17086

Prosecution Exhibit 5
(Attachments)
have been entered into
the record as a
and will be maintained

with the original
Record of Trial

UNITED STATES OF AMERICA
v.

Manning, Bradley E.

PFC, U.S. Army,

HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211



0 17087

Prosecution Motion
for Preliminary Ruling on
Admissibility of Evidence

(Business Records)

Enclosure 6

22 June 2012



p_vumIT Fnr'



PROSECUTION
OFFEREU.
PAGE OF





ATTESTATION CERTIFICATE

This document is intended to meet the requirements set forth in Military Rules of Evidence Rule
902(11), addressing certified records of regularly conducted activity.

I swear or af?rm that each of the following is true regarding the attached records, to the best of
my knowledge and belief:

I am the custodian of these records, or am an employee familiar with the manner and
process in which these records are created and maintained, by virtue of my duties and
responsibilities;

1.

The records were made at or near the time of the occurrences of the matters set forth by
or from information transmitted by, people with knowledge of these matters;

The records were kept in the course of regularly conducted business activity;
It was the regular practice of the business activity to make the records; and

The records are a true, accurate, and complete copy of the original documents.

List of attached records:

l_ 3SFio smoeiur

2' MCMO in Cl-?r-55?



Foo/'v\
3- QUASS
mOrganization
93' 309?: QM
Sign/attire Date

:5 (?13
Title

Pri t/orTI Name
n+Lum.,

CHIEF 35!:

Business Address




Business Teleihorle

FT A

pagesl ?les).



The attached record consists of

Subscribed and sworn to before a notary public, this day of



My commission expires on: JUDGE
UNITE STATES
ARMY






17088







35F 10 SEP

COURSE:
COURSE TITLE:
APPROVAL DATE:

IMPLEMENTATION DATE:

APPROVAL AUTHORITY:

SUPERSESSION INFO:
PROPONENT SCHOOL:

. 17089

Deoembet 2007



STUDENT EVALUATTON PLAN (SEP)

243-35F10 (V10)

Intelligence Anaiyst course

01 December 2007

01 December 2007

Commander. 305'? Ml Battalion

111'? Ml Bdgade

Fon Huachuca. A?zona 85613-7002

This SEP Stpersedee All Previous Versions

US Army Intelligence Center 8- Fan Huachuca
Fort Huachuca. AZ 85613-7002



. . 17090
35F1O SEP December 2007
1. Puggoses and Scoge.

a. This SEP establishes student responsibilities and course requirements for the 243-35F10,
Intelligence Analyst Course.

b. This SEP identi?es the requirements for course tests and performance standards, general
standards (AR 350-1, etc.), counseling, retraining, re-testing, relief from course, academic performance
ratings. grievances. and redress procedures.

c. The purpose of this course is to train, evaluate and certify Soldiers in selected skill level one MOS
related tasks.

d. Cochise Community College. Sierra Vista. Arizona will award college semester credit hours at
completion of this course. The American Council on Education (ACE) recognizes college credits earned,
for the completion of this course. in degree completion programs at other colleges.

e. This SEP is punitive. Violations of this SEP may be punished under Art 92, UCMJ as a violation of
a lawful regulation.

2. Individual Course Examinations Perfomance Objectives. Student evaluations are
performance?based. A detailed rating explanation of the DA 1059. Academic Evaluation Report (AER) is
found in Paragraph 5 of this SEP. Each academic evaluation is Outlined below showing the Performance
Objectives which are tested. and the minimum test standards required to pass. There are no pre~testing
procedures in the 35F1O course.

Module Instruction Critical Task Trained Performance Exam DA 1059
Lesson Plan Objective Standard Block
Module A Information 1004 A. Annotate 12115 Item 12E
(Basic Skiils) Security Classi?cation Markings

to Documentsluedia
35F1A02L
B. Apply Procedures
for Protecting l2}! 5
Classi?ed lnfonnation
80%
standard
Module A Research. 110-4.1105.1457 A. Present lnteltigence G0 I NO Item
Writing. and GO A
35F1A03L Rhetoric (R3)
100%
standard
Module A Map Reading and 1000, 1002. 1404, 1160 A. Perform Military 19I25 item 12A
Symbology Map Reading
35F1A04L Functions
B. Maintain a SITMAP 6/8
c. Maintain an 517
Incident Oveday
74%
standard

17091

35F 1 0 SEP December 2007
anreiagenoe 115041515152 A. Create a Modi?ed 415 Item 12A
Module Preparation of the Combined Obstacle
(IPB Skills) Battle?eld (Step Overlay (MCOO) for
2) Phase Operations
35F 1B02L
B. Create a Modi?ed 10113
Combined Obstacle
Overlay (MCOO) for
Phase IV Operations
C. Determine Weather and
Effects on Operations
79%
standard
Module 8 intelligence 1158. 1202, 1456 A Build a Threat 8110 Item 12A
Preparation of the Model for Phase in
35F 1 BOSL Battle?eld (Step Operations
3)
8. Build a Threat 12115
Model for Phase iv
Operations 80%
standard
Module Intelligence 1153, 1154, 1458 A. Determine Most 8111 Item 12A
Preparation of the Probable Threat
35F 1B04L Battle?eld (Step Course of Action for
4) Phase Operations
9. Determine Most 415
Probable Threat
Course of Action for
Phase IV Operations 76%
standard
Module Intelligence. 1050. 1057, 1501 A. Draft an Plan 43154 item 12E
use Targeting Surveillance, and for Phase in
Skills) Reconnaissance Operations
(ISR)
35F1C01 B. Draft an ISR Plan 43154
for Phase IV
Operations
80%
standard
Module Targeting 1005. 1204 A. Identify Elements of 8110 Item 12E
the Targeting Process
35F 1C02L
5. Conduct Targeting 2433
in a Phase Ill
Operation
2025
C. Conduct Targeting
in a Phase
Operation
77%
standard
Module Automated 1053. 1101. 1102, 1601 A. Determine best 314
(Capstone) intelligence multiple choice
Systems (AIS) question correctly
35F1D01 ltem
3. Create a visual tool GO-NO-GO
in Path?nder
C. Conduct Map 5/7
Operations
D. Display the Current
Situation 2/3
Module FTX 1004. 1454 A. Produce an GO-N0-GO Item
intelligence Summary 12A.B.C.D



35F1O SEP December 2007

35F1DO2L 3. Conduct a Military GO-N0-GO
Brie?ng

C. Develop an Incident G0-N0-G0
Overtay and HVT list

D. Perform Collection GONG-G0
Management Ops

1 00%
standard

3. Stagdards.

a. Standards of conduct. Students will conduct themseives in the manner expected of any military
professional. This includes demonstrating law?abiding personal conduct and behavior, both on and off
duty. The Commanding General of the US Army intelligence School and Center, the 111th Mi Bde
Commander, or the 305th Ml Bn Commander may relieve students from the course for any conduct or
behavior that violates any local, state, or federal law (including the Uniform Code of Military Justice), or for
any conduct or behavior, that violates any Department of Defense Department of the Army, or
local, regulation or policy. This includes integrity and fratemization issues
senionsubordinate or student?cadre). See Paragraph for more information concerning relief actions.

b. Army Physical Fitness Test Weight Control.

(1) Body Cgmposition standards: IAW TRADOC Regulation 350-6, accessions standards for body
composition as stated in AR 40-501, paragraph 2-21b, apply alter the ?rst year of Soldiers
active duty service. The standards of AR 600-9, table 2, are appiicabie after the initial year of
service. Soidier?s that exceed one year of service and fail to meet the body composition standards
IAW AR 600-9, table 2, will ship to gaining unit with documentation forwarded to include the ?ag
(transferabie). Military Occupational Specialty Transition Soldiers must meet the
requirements of AR 600-9, table 1 IAW TRADOC Regulation 350-6 paragraph 3?40f. MOS-T with
temporary pro?les which prevent completion of in a MOS producing course will not be
enrolled. Soldiers in temporary duty (TDY) and return status that do not meet body composition
standards prescribed in AR 600-9 will not attend a MOS producing course and will be returned to
their home station. Soldiers in TDY en route or pennanent change of station not meeting the
prescribed body composition standards in AR 600-9, table 2, will not be allowed to attend a MOS
producing course. These Soldiers will be attached to TRADOC subordinate commands, pending
ciari?cation of assignment instructions for follow-on training.

(2) Army Test (APFT): TRADOC Regulation 350-6, paragraph 4-3c (3), A
diagnostic APFT is administered at least once a month through the 20th week of training. Phase
Soldiers that have met the APFT standards for graduation will take the APFT IAWAR 350-1,
paragraph 1-24. A record APFT is administered no later than the last 2 weeks of training, to
detennine if the Soldier has achieved the APFT standards for graduation (60 points per event; 180
minimum total points). Phase lV, V, and Soldiers with permanent pro?les wili take the APFT
within the limits of their pro?le. TRADOC Regulation 3506, paragraph 4-3c (4), MOS-T
Soldiers must pass the APFT as a graduation requirement for a MOS producing school. The
Soldier's Company Commander may direct any Soldier to weigh-in at any time during the course,
IAW AR 600-9.

(3) Soldiers who meet academic course requirements, but fail to meet the physical ?tness and
standards wiil not be removed from the course, nor will they be required to re-attend
the course if all other course requirements are met. instead, soldiers will complete training and
their DA form 1059 wiil be annotated to reflect their perfonnanoe.



35F10 SEP December 2007

i) Soldiers who fail to meet the APFT standards will be considered an academic course
graduate, but item 11.c of their DA form 1059 will be marked failed to achieve course standards
and item 14 will be marked failed to meet APFT standards.

ii) Soldiers who fail to meet the body fat composition standards of AR 600-9 will be considered
an academic course graduate, but item 11.c. of their DA fonn 1059 be marked marginally
achieved course standards and item 14 will be marked failed to meet body fat composition
standards.

Soldiers who fail to meet the Army standards for both the and body fat composition will
be considered an academic course graduate, but item 11.c of their DA form 1059 will be marked
marginally achieved course standards and item 14 will be marked failed to meet APFT standards
and failed to meet body fat composition standards.

c. Soldiers who fail to meet the and weight control Standards, their DA form 1059 and
graduation certi?cate will not be held at the institution. Previously held DA form 1059s and graduation
certi?cates will be released to the soldier's unit IAW this message. Unit Commanderslcommand
Sergeants Major are expected to counsel soldiers and take appropriate actions to correct de?ciencies for
all soldiers failing the APFT andlor standards at institutional training. This policy does not
apply to Initial Military Training Soldiers (IMT). Rules governing APFT and Weight Control
requirements are contained in TRADOC Regulation 350-6.

d. Standards of Responsibility and Accountability.

(1) Students will properly maintain and secure all government issued equipment. Loss or damage
to any government issued equipment may result in a Financial Liability investigation of Property Loss. if
the student is found to be at fault, the actions could result in a statement of charges, UCMJ action, and
possible relief from the course.

(2) Students will properly maintain and secure all classi?ed information and material. if a student
fails to properly maintain or secure classified information or materials. the security violation will be
reported to proper investigative command and will be handled accordingly IAW AR 380-5.

(3) if the student obtains a physical pro?le that interferes with hisiher completion of the course,
academically or physically, the student may be recycled, or may be medically removed from the course
entirely. The student may apply for readmission to the 35F10 course at a later date.

e. Required Attendance. All instruction is considered critical. Absence from any training will have a
negative effect on the student's ability to achieve the training objectives. Approval to miss any portion of
the course for any length of time must be coordinated and approved by the Course Manager or hislher
designee. The student is responsible for obtaining notes on all missed course material. A Soldier may be
considered for administrative recycle if they miss 7 consecutive or 15 cumulative academic hours. The
35F1O Course OIC will consider, on a case-by-case basis, any recycle action(s) for Soldiers who miss
academic hours.

f. Remedial Training and Retesting. An initial test failure will result in retraining within 24 hours and
one reexamination. As an exception to policy, the 35F1O Committee may, when extraordinary
circumstances are present, allow a Soldier a second retest. Such extraordinary circumstances must
cleariy demonstrate that the Soldier's failure was through no fault of hislher own. The burden of proof
falls upon the Soldier. The 35F10 Course NCOIC will coordinate the reexamination dates and schedules
for all reexaminations.

g. Grade Adjustment Procedures: Student grades may be adjusted on a case-by-case basis when it
is found that it was no fault of the student. The Committee OIC will be the ultimate authority for grade
adjustment.

17094

35F1O SEP December 2007

h. Academic Probation.

(1) IAW Company and Company Standard Operating Procedures (SOP), Soldiers that fail
an exam will be placed on Academic Probation until they pass the next initial examination. Soldiers who
are recycled per a retest failure will remain on Academic Probation until they pass the next examination,
which caused them to recycle. IAW paragraph 4c of this SEP, instructors will counsel all Soldiers who fail
an exam and inform them of Academic Probation, mandatory remedial training and study hail
requirements. The counseling session will outline, speci?cally, the appropriate actions to follow.

1. Recycle Actions. This refers to being removed from the current class and being placed in the next
available class in the instruction cycle.

(1) The Battalion Commander is the approval authority for a student's initial recycle.

(2) An academic recycle will occur if a Soldier fails a retest IAW TR 350-18.

(3) An administrative recycle may occur for reasons other than academic reasons medical,
discipline, etc.)

(4) As stated earlier, a Soldier may be considered for administrative recycle if they miss 7
consecutive or 15 cumulative hours of academic time. The 35F Course OIC will consider. on a case-by-
case basis, any recycle action(s) for Soldiers who miss more than 7/15 academic hours.

(5) The 35F Course or designated representative will make the determination as to which
phase of instruction the Soldier will be recycled into. Students are responsible for all course material in
the new (recycled) class.

j. Relief Actions. Students must attend all class sessions, complete all assignments, and conduct
themselves in a manner expected of a Soldier or Noncommissioned Officer. The 305" Ml Bn
Commander will review the recommendation of the Instructor, the 35F Course OECINCOIC, and the
student's Chain of Command. Only the 305th Ml Bn Commander may relieve Soldiers from the course
for failing to meet academic standards or administrative reasons, which include misconduct

(1) Academic Relief. Academic relief occurs when the Soldier fails to meet the academic
standards set forth in this SEP.

(2) Administrative Relief. Administrative relief occurs under circumstances, which do not merit
academic relief, but which. otherwise support one or more of the following conclusions:

The Soldier?s personal conduct is such that the Soldier's continuation in the course is not
justi?ed.

The Soldier's continuation in the course will be counter productive to the interests of other
Soldiers in the class.

it is extremely unlikely that the Soldier can successfully meet the standards established
for graduation. Examples of circumstances that may serve as a basis for administrative relief include. but
are not limited to, the following:

1) Misconduct. Relief for misconduct occurs when the Soldier engages in conduct or
behavior that violates law, regulation, or policy (see paragraph 4a of this SEP). No formal adjudication of
guilt by a military or civilian court or by a commander under Article 15, UCMJ is necessary to support
relief under this paragraph.

2) Exceeding the body fat standards of AR 600-9, or fails to pass APFT IAWAR 350-1.

-5-



35F1O SEP December 2007

Based upon the circumstances of the case, the 305th Battalion Commander may direct
several personnel actions to include:

1) Reassignment for speci?c Ml MOS training.

2) Reassignment for training in another Ml MOS of the Soldiers choosing (based on
Soldier's quali?cations and the needs of the Army).

3) Reassignment for training in a speci?c non-Ml MOS or CMF.

4). Reassignment for training in another M08 and CMF of the Soldier's choosing (based
on Soldier's quali?cations and the needs of the Army).

5) Return to parent unit (if TDY and return) or follow?on assignment IAW the needs of the
Army (if TDY en route).

6) Separation from active duty; termination of active duty training, or other action as
appropriate.

Returning Students. Soldiers returning to the course after an administrative break in
training of six months or less may be readmitted IAW TRADOC priority ?ll standards at the same point in
the course they achieved previously. Soldiers with a break greater than six months will be evaluated for
MOS pro?ciency through testing and may be admitted to the course IAW TRADOC priority ?ll standards
at a point detemiined by the results of testing.

(3) Processing Relief Actions and Appeals. The 35F NCOIC will initiate all relief actions and
process them through the appropriate Company to 305"? Ml Bn according to the standards found in AR
350-1. TRADOC Regulation 350-18 and Fort Huachuca Memorandum 600-8. Soldiers awaiting a
decision on a relief action will remain in the class and participate fully in all training events except tgts. if
a Soldier's conduct or demeanor is disruptive to the other Soldiers, immediate removal is permissible.
That decision rests with the 35F Course OIC and the appropriate Company Commander.

4. Counseling. Instructors will conduct periodic formal counseling sessions with Soldiers throughout the
course to review academic progress and discuss professional development. Additionally, instructors will
complete a counseling form, DA Fonn for every Soldier with sustained poor performance. For
the purposes of this SEP the term ?negative? counseling relates to counseling due to unacceptable
behavior or conduct, and not academic issues such as test failures.

a. instructors will formally counsel Soldiers who fail to meet academic standards or if they fail to
comply with the Department of Defense Directive 5500.7, Standards of Conduct.

b. Instructors will fomnally counsel Soldiers who fail to be at their appointed place of duty on time.
Soldiers who show a pattern of lateness may be subject to UCMJ or other Administrative action or
considered for relief by the Battalion commander.

c. Instructors will formally counsel Soldiers who fail a section or module of a performance based
evaluation or a performance evaluation. The Soldier must attend all mandatory remedial training, and will
be given only one retest for a failed evaluation (see Paragraph 3f of this SEP).

d. Students will be counseled not to acquire or provide unauthorized test assistance before, during. or
alter any test, except as instructed. Students will report any unauthorized test assistance (before, during,
or alter test administration) of which they are knowledgeable to their course instructors or the next leader
in their chain of command.

0 17096

35F1O SEP December 2007

5. Academic Reports (AER). All MOS-T Soldiers will receive a DA 1059, Academic
Evaluation Report (AER), IAW AR 623-3, paragraph 3-52 and TRADOC Regulation 350-6. paragraph 3-9,
3-26, Appendix F. The instructor will evaluate the Soldier's academic performance and record it on a
counseling statement and on the Academic Evaluation Report (AER). All duties and responsibilities at
the Company and in the classroom may be used to create bullets on the AER. Evaluation ratings are
earned according to the following:

a. Pertonhance Summary, AER Block 11.
(1) ?Exceeded Course Standards." Soldiers whose overall course achievement is signi?cantly
above the standards of the course. This is limited to the top 20% of the class IAW DA Pam 623-3. To
exceed course standards, at a minimum a Soldier must:

Earn 4 ratings, and no ratings in block 12 of the AER.

Receive no negative counseling statements.
Meet height and weight standards IAW AR 600-9.
Meet APFT standards IAW AR 350-1 and FM 21-20.

(2) ?Achieved Course Standards.? Soldiers who achieve overall acceptable course standards.
To achieve course standards, the Soldier must:

Earn at least a rating in each rated item listed in Block 12 of the AER.
Receive no more than two negative counseling statements.

Meet height and weight standards IAW AR 600-9.

Meet APFT standards IAW AR 350-1 and FM 21-20.

(3) "Marginally Achieved Course Standards." Soldiers who achieve with dif?culty, the
minimum acceptable course standards. A Soldier will marginally achieve course standards if any of the
following apply:

Receive no more than four negative counseling statements.
Meet height and weight standards IAW AR 600-9.
Meet APFT standards IAW AR 350-1 and FM 21-20.

(4) ?Failed to Achieve Course Standards." A Soldier will fail to achieve course standards if any

of the following apply:

Earns a ?nal rating in any rated area listed in block 12 of the AER.
if a Soldier falls into this category, a recommendation for academic relief will be forwarded
thru the appropriate Company Commander, to the 305th Ml Bn Commander for relief
consideration.

Receive ?ve or more negative counseling statements.

Fail to meet height and weight standards IAW AR 600-9, paragraph 3-40f.

-3-





35F1O SEP December 2007

Fail to meet APFT standards IAW AR 350-1 and FM 21-20 (reference TRADOC Reg.
350-6 paragraph 4-3

b. Demonstrated Abilities, AER Block 12:
(1) Item 12a - Written Communication:

SUPERIOR a Soidier may receive a rating if helshe earns a minimum
passing score of 20% above the minimum passing requirement on all initial evaluations IAW the
evaluation sheets used to evaluate written communication skills, as outlined in paragraph 2, individual
Course Examinations Obiectives, of this SEP.

SATISFACTORY - a Soldier may receive a rating if helshe earns at
least a ?nal minimum passing score the evaluation sheets, used to evaluate written communication
skills, as outlined in paragraph 2, individual Course Examinations Performance Obiectives, of this SEP.

UNSATISFACTORY a Soldier may receive an rating and be
recommended for relief from the course if helshe fails to meet the minimum passing score lAwthe
evaluation sheets, used to evaluate written communication skills, as outlined in paragraph 2, individual

Course Examinations Performance of this SEP.

(2) item 12b - Oral Communication:

SUPERIOR a Soldier may receive a rating if helshe earns a minimum
passing score of 20% above the minimum passing requirement on all initial evaluations IAW the
evaluation sheets used to evaluate oral communication skills. as outlined in paragraph 2, Individual
Course Examinations Performa_nce Obiectives, of this SEP.

SATISFACTORY a Soldier may receive a rating if helshe earns at
least a ?nal minimum passing score IAW the evaluation sheets, used to evaiuate orai communication
skills, as outlined in paragraph 2, individual our Ex mi ti ns Perfonnance Obiectives. of this SEP.

UNSATISFACTORY - a Soldier may receive an rating and be
recommended for relief from the course if helshe fails to meet the minimum passing score IAW the
evaluation sheets, used to evaluate oral communication skills, as outlined in paragraph 2, Individual
Course Examinations Perfonnance Obiectives. of this SEP.

(3) item 12? - Leadership Ability:

SUPERIOR A Soldier may earn a rating if while participating in the day-to-
day activities as a student and/or while sewing in an assigned student leadership position demonstrates
"Superior' Army leadership abilities and characteristics. Ali MOS-T Soldiers wiil be counseled on the
minimum standards required to earn on their DA 1059 (AER) for Leadership. Other such
abilities and characteristics are those outlined in FM 7-22.7, The Arrny Noncommissioned Ofticer Guide.
Ch. 3, Leadership, 3-6 - 3-21, and FM 6-22, Arrny Leadership, Appendix A, Leader Attributes 8. Core
Leader Competencies, in the categories of Values, Attributes, Skilis, and Actions (Be, Know, Do).
Additionally, the soldier may receive no written counseling statements for failure to practice the Be, Know,
Do principles of Army Leadership to be eligible for a rating.

SATISFACTORY - A Soldier may earn a rating if while participating in
the day?to-day activities as a student and/or while serving in an assigned student leadership position
demonstrates adequate Army leadership abilities and characteristics. Such abilities and characteristics
are those outlined in FM 7-22], The Army Noncommissioned Ol?cer Guide, Ch. 3, Leadership, 3-6 3-
21, and FM 6-22, Army Leadership, Appendix A, Leader Attributes Core Leader Competencies, in the
categories of Values, Attributes, Skills. and Actions (Be, Know, Do). Additionaily, the Soldier may receive

-9-



35F1O SEP December 2007

no more than one written counseling statement for failure to practice the Be, Know, Do principles of Army
Leadership.

UNSATISFACTORY A Soldier may earn an rating and be
recommended for relief from the course if while participating in the day-to-day activities as a student
andlor while serving in an assigned student leadership position fails to demonstrate adequate Army
leadership abilities and characteristics. Such abilities and characteristics are those outlined in FM 7-22.7,
The Army Noncommissioned Officer Guide, Ch. 3, Leadership, 3-6 3-21. and FM 6-22, Army
Leadership, Appendix A, Leader Attributes Core Leader Competencies, in the categories of Values,
Attributes, Skills, and Actions (Be, Know, Do). In the event that a Soidier receives a second written
counseling statement for failure to practice the Be, Know, Do principles helshe will be deemed to be an
nsatisfactory" performer for Leadership Ability.

(4) Item 12d - Contribution to Group Work:

SUPERIOR - A Soldier may earn a rating if while participating in the day-to-
day activities as a student and/or while serving in an assigned student leadership position demonstrates
"Superior" efforts to their team accomplishing assigned group work IAW the standards provided by the
respective instructor. Other such efforts, abilities and characteristics are those outlined in FM 7?22.7. The
Army Noncommissioned Officer Guide, Ch. 3, Leadership, and FM 622, Army Leadership, Appendix A,
Leader Attributes Core Leader Competencies, in the categories of Values. Attributes, Skills, and
Actions (Be, Know, Do). Additionally, the soldier may receive no written counseling statements for failure
to contribute to group work or the dynamic of group efforts to be eligible for a rating.

SATISFACTORY A Soldier may earn a rating if while participating in
the day?to-day activities as a student and/or while serving in an assigned student leadership position
demonstrates adequate efforts to their team accomplishing assigned group work IAW the standards
provided by the respective instructor. Such efforts, abilities and characteristics are those outlined in FM
7-22.7, The Army Noncommissioned Officer Guide, Ch. 3, Leadership, and FM 6-22, Army Leadership,
Appendix A, Leader Attributes Core Leader Competencies, in the categories of Values. Attributes.
Skills, and Actions (Be, Know, Do). Additionally, the Soldier may receive no more than one written
counseling statement for failure to contribute to group work or the dynamic of group efforts.

UNSATISFACTORY - A Soldier may earn an rating and be
recommended for relief from the oourse if while participating in the day-to-day activities as a student
andlor while serving in an assigned student leadership position fails to demonstrate accomplishment of
assigned group work or fail to participate towards the completion of assigned tasks. Such abilities and
characteristics are those outlined in FM 7-22.7, The Army Noncommissioned Oflicer Guide, Ch. 3,
Leadership, and FM 6-22, Army Leadership, Appendix A, Leader Attributes Core Leader
Competencies, in the categories of Values, Attributes, Skills, and Actions (Be, Know, Do). In the event
that a Soldier receives a second written counseling statement for failure to contribute to group work or the
dynamic of group efforts, he/she will be deemed to be an "Unsatisfactory" performer for Contribution to
Group.

(5) item 12e - Research Ability:

SUPERIOR - a Soldier may receive a rating if helshe earns a minimum
passing score of 20% above the minimum passing requirement on all initial evaluations IAW the
evaluation sheets used to evaluate research ability, as outlined in paragraph 2, lndividuai Course
?_xa_minations 8. Performance Obiectives. of this SEP.

a Soldier may receive a rating if helshe earns at

least a ?nal minimum passing score IAW the evaluation sheets, used to evaluate research ability skills, as
outlined in paragraph 2, Individual Course Examinations 8. Performance Objectives, of this SEP.

-10-



35F1O SEP December 2007

UNSATISFACTORY -a Soldier may receive an rating and be
recommended for relief from the course if helshe fails to meet the minimum passing score IAW the
evaluation sheets, used to evaluate research ability skills, as outlined in paragraph 2, Individual Course

Examinations Performance Objectives, of this SEP.

8. Student Grievances and Redress. The following policies and procedures have been established to
protect Soldiers? rights and to rectify inconsistencies in the evaluation of Soldier performance.

a. Grievances that are purely academic in nature must ?rst be discussed with the Senior Faculty
Advisor, then the 35F1O Course NCOIC whose decision is normally ?nal. in cases where discrimination
or violation of policy may be involved, the Soldier should use the chain of command up to the 305th Ml Bn
Commander to seek resolution of any. and all. issues.

b. All student rebuttals will be in writing, and must be submitted to the 35F 10 Course NCOIC within
48 hours of the initial recyclelrelief noti?cation IAW FH Memorandum 600-8.

c. A Soldier may seek the assistance of the Inspector General (IG), Judge Advocate General (JAG)
and Unit Chaplain at any time. The Soldier will inform their chain of command if they desire to see any of
these agencies during duty time.

7. Student Academic and Incentive Awards
a. ?Skill, Tough. Ready Around the Clock" (STRAC) Program.

1. Purpose: STRAC is a program designed to recognize students who excel in the TOTAL
SOLDIER concept by exceeding course standards and military standards. The STRAC pr ram is jointly
administered by the 35F 10 OIC and the respective training company commander 305 Ml Battalion
Poligw Soldiers completing all three requirements of the STRAC award will be recommended by their
Platoon Sergeant or Drill Sergeant for an Army Achievement Medal (AAM).

2. Components of the STRAC Award:

a. Skill
i. is achieved by Soldiers who attain academic excellence in their course
of instruction. Their ?nal grade point average (GPA) has placed them in the top 10 percent of all
graduates in their respective classes. A 35F1O soldier requires a minimum GPA of 94% to be eligible for
the portion of the STRAC award.

ii. A Soldier that attains the necessary GPA to qualify for the Portion is
recommended for a Battalion Certi?cate of Achievement, unless that Soldier completes all three portions
of the STRAC criteria thereby being recommended for an AAM.

b. Tough
i. is achieved by Soldiers who attain at least 90 points or higher in each
event on the Army Physical Fitness Test (APFT). An extended score is not used for this evaluation.
ii. Soldiers who meet criteria for the portion will be awarded the Anny
Physical Fitness Badge.

c. Ready Around the Clock
i. is awarded to those Soldiers who appear before a board of NCOs

and demonstrate high standards of military bearing, appearance and exceptional knowledge of military
subjects and current events.

ii. The RAC Board will select Soldiers for recognition under the STRAC
program. Candidates must meet the following quali?cations prior to appearing before the board.

1. Maintain an academic GPA of 94% or higher

-11-



35r=1o see December 2007

2. Scored at least 270 points on their most current APFT

3. Demonstrate exceptional individual achievement of non-academic
IET standards such as: basic Soldiering, warrior tasks and drills, and volunteer efforts.

4. Have no record of disciplinary actions while assigned to the 305" Ml
BN as veri?ed by their chain of command (PSG. Drill Sergeant, 1SG).

Soldiers who are recommended by the RAC Board will be awarded a
Company Certi?cate of Achievement.

8. Challenging Training. There is no test-out policy within the 35F10. Intelligence Analyst Course.

9. Ability Based Training Program (ABTP). The ABTP is an optional accelerated training program
designed to reduce training Time on Station (T 08) for experienced student NCOs and Warrant Of?oers
(W0). The ABTP reilects an intensive. compressed training schedule employing low Instructor to Student
ratios. The ABTP is offered subject to the availability of required resources.

a. Students who meet the following criteria are eligible to participate:

Volunteer

Rank: SSG or above

Military Education: BNCOC. Battle Staff. or above and W0 equivalent.
Recommendation of the 35F 1 0 Course NCOIC

Approval of the 35F1O Course



b. Participants are subject to the same academic and administrative provisions speci?ed in this SEP.
-lMth the exception of students recycled from ABTP.

10. POC: 35F 10 Committee Chief. CW3 Hess. James, Phone

.



PEFRENKO
LTC. Av
Commanding

-12-



35F1O SEP December 2007
STUDENT ACKNOWLEDGMENT and CONSENT TO RELEASE

I have received a copy of this Student Evaluation Plan for the (V10) Tactical Intelligence
Analyst Course 35F1O and I understand the content and requirements to graduate from this course. I
understand that my performance at the 35F1O course may affect my future assignments.

Date:

Student Signature:
Printed Name:
Class number:

Signature of the Instructor:

(Note: This acknowledgment must be completed by the student and instructor and ultimately filed in the
student?s academic ?le)

-13-

17102



UNITED STATES OF AMERICA Prosecution Motion

v. for Preliminary Ruling on
Admissibility of Evidence
Manning, Bradley E. (Business Records)

PFC, U.S. Army,

HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211

Enclosure 7



22 June 2012

01

PROSECUTION EXHIBIT 7 fori
PAGE OFFERED: PAGE AD TTEI).



PAGE 01-? PAGES



17103

CERTIFICATE OF AUTHENTICITY OF DOMESTIC BUSINESS RECORDS

I, _Theresa Robinson attest that I am employed by Information Systems Agency
(DISA), Chambersburg, PA 17201 and that my official title is _Management Analyst. I am a
custodian of records for Field Security Operations (FSO), Chambersburg, PA 17201. I
certify that the attached records are the originals or true and accurate copies of the originals. I
am the custodian of the attached records consisting of I have provided the
following:

0 IA Awareness version 7 (dated October 2008)

0 IA Awareness version 8 (dated October 2009)

Furthermore, the attached documents were made by, or from, information transmitted by a
person with knowledge of the events recorded, were made at or near the time of the events
recorded. We create and maintain these documents in the regular course of business as a regular

practice.

This certification is intended to satisfy Military Rule of Evidence 902(11).


(Signature)

_Theresa Robinson
(Printed Name)

_13 July 201 1
(Date)

(Address)

(Phone)

ManningB_00-109678

Computer?based information assurance

training program. Not a document.

Prosecution Exhibit 7
(Attachments)
have been entered into
the record as
and will be maintained

with the original
Record of Trial

UNITED STATES OF AMERICA
v.

Manning, Bradley E.

PFC, U.S. Army,

HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211



17105

Prosecution Motion
for Preliminary Ruling on
Admissibility of Evidence

(Business Records)

Enclosure 14

22 June 2012



PROSECUTION EXHIBIT 5 cation


PAGE OFFERED: PAGE AD D:
1 PAGE 0 PAGES

.F,

17106

ATTESTATION CERTIFICATE

This document is intended to meet the requirements set forth in Military Rules of Evidence Rule
902(11), addressing certi?ed records of regularly conducted activity.

I swear or affirm that each of the following is true regarding the attached records, to the best of
my knowledge and belief:

1. I am the custodian of these records, or I am an employee familiar with the manner and
process in which these records are created and maintained, by virtue of my duties and
responsibilities;

2. The records were made at or near the time of the occurrences of the matters set forth by
or from information transmitted by, people with knowledge of these matters;

3. The records were kept in the course of regularly conducted business activity;
4. It was the regular practice of the business activity to make the records; and

5. The records are a true, accurate, and complete copy of the original documents.

List of attached records:

INDOC - COMINT - 29 Jan 10.pdf (1 Page)
JCAVS Report - 26 May 201 O.pdf (2 Pages)
SCI Packet - Jan 2009.pdf (22 Pages)

Organization
biuisiou (L1)

Sig Date

?$93 mg Egg mm

nt or Type Y?lflef Title

inn Pilocamm Mmmseg
Business Telephone Business Address
P- low mu bw Dr;
emwm mm 010380
Subscribed and sivorn to before a notary public. this (6 (lay of ,20 .
Notary Public My commission expires on:
A .-"Leg ,1 - is

9- at/Ztrx


17107
0028-10-CID221-10117



3957.50

32.. U_


wzumam
Ozmim?ma


mmo oz:



mmo
ma Umqmo::m_
Oo?uxmma Uooc3m:Hm






3

mmo 292.8 Alvm
mmo zmmama

{a

mo_ zo3_:m:o: roam.

_u13oE Hmamms
_.oom_ mmooam Osmox
mmogdm Ojmox
Oozmozos _
_O?mam
U8-mxmoS_o:
m?m?mama Egg
2%

_umqmo:m_
_:o_oo3:m:o:
Om33m _uo3.

Iom no.3

FOR OFFICIAL USE ONLY
Law Enforcement Sensitive



17108

- -
MEDICAL

For use of this lorm, see AR 40-66; the proponent agency is the OTSG 20090122

3. Medical Treatment Facility (Name and Location)
Connor Troop Medical Clinic

2. Patient?: Name and SSN
Bradley E. Manning

4. Reason for Request.
In accordance with AR380-67, paragraph 2-200, the individual listed above requires a medical records review.

5- Private Medical Information Sought (Specify dates of hospitalization or clinic visits and diagnosis, if known)
Copies of health record documents, or complete summaries, including dates and details, which may have a bearing on the individual's
suitability to hold a security clearance. The review of medical records should include, but not be limited to:

l. Habitual or excessive use of intoxicants.

2. Drug abuse.

3. Sexual perversion.

4. Any illness, metal condition, instability, nervous condition or history of fainting, seizure, or loss of consciousness which. with due regard to
the transient or continuous effort of the condition, may in the opinion of competent medical authority cause signi?cant defect in the judgment
or reliability of the individual

5. History of treatment, rehabilitation or recuperation from those conditions previously indicated.

A MEDICAL OPINION CONCERNING THE INDIVIDUAIJS SUITABILITY TO HOLD A SECURITY CLEARANCE IS NEITHER
SOLICITED NOR DESIRED. THAT DETERMINATION WILL BE MADE BY U.S. ARMY SECURITY ADIUDICATORS BASED
UPON ALL AVAILABLE INFORMATION.

6. Requestor's Name. Title. Organization and SSN.
Kyle J. Balonek, Brigade Security Manager



FOR USE OF MEDICAL TREATMENT FACILITY ONLY.

7. Check applicable box.

[3 Approved Disapnroved (State reason for disapproval)

8. Summary of Private Medical Information Released.
CHECK AS APPROPRIATE:
No adverse medical information found.
Copies of adverse medical information is attached.

A summary of adverse medical information follows (continue on attached sheet if necessary).



10. Date

3??l0; au



\l

91, IS OBSOLETE. P5

?1,-gal

17109

0023-10-CID221-10117

SCI PRE-INDOCTRINATION SCREENING INTERVIEW

1.

The following questions will be answered by the nominee. Responses to these
questions should cover the period of time from the date you last had a screening
interview, special background investigation or single scope background
investigation

21. Has there been any change in your marital status?!
b. Has there been any change in the citizenship of your spouse? MO

I c. Have you had any involvement with either civilian or military law
enforcement agencies? traf?c tickets, article l5?s, letter of
reprirnands, etc.]?

d. Have you had any treatment or experiences involving stress, nervous IQO
disorders or counseling?

e. Have you experimented with or otherwise used any controlled substances HO
marijuana, cocaine, crack, etc.]?

f. Have you had any alcohol related incidences drunk in
public, etc]?

g. Have you experienced any ?nancial problems bankruptcy, accounts in NO
. collections, bounced checks, etc.]?

h. Have you formed any close associations with people or organizations of
foreign nationality or of questionable loyalty to the US or its allies?

MU

i. Are there any incidents which might make you subject to blackmail
fraud, extra-marital affairs, etc.]?

I certify that since my last screening interview that the answers to the above questions
are true to the best of my knowledge. I have not intentionally provided incorrect and
misleading information. If any of the above questions change at any time, I will
notify the SSO immediately.

mnwridc,

Name:
Signature: Date: 395-? a

FOR OFFICIAL use ONLY

Law Enforcement Sensitive

17110
0028-10-CID221-10117
DEPARTMENT OF THE ARMY

HEADQUARTERS, IOTH MOUNTAIN DIVISION (LIGHT INFANTRY) AND FORT DRUM
FORT DRUM. NEW YORK 13602-5000



REPLY To
ATTENTION OF .
DATE 3; 09

MEMORANDUM FOR 10"? MTN Special Security Office [sso]
SUBJECT: SCI Security Awareness and Defense Travel Brie?ng.
1. References:

a. DOD SCI Admin Security Manual, AUG 98
b. AR 380-28, DA Special Security System, AUG 97

2. IAW references above, I have read the SSO 10?? MTN ?security awareness
brie?ng? and understand the policy and procedures for the use and protection
of Sensitive Compartmented Information Facility Any speci?c
questions concerning the use of protection of SCI not outlined in the brie?ng
will be directed to the SSO for clari?cation.

3. I have also reviewed the Defense Travel Security Brie?ng and understand my
responsibility to report all official or unof?cial foreign travel to my security
manager or the special security of?ce.

4. As outlined in reference A above, my review of these documents meets the
annual requirement for security Awareness and Defense Travel Brie?ng for
SCI?Indoctrinated personnel.

5. A copy of this memorandum -will be maintained in the SSO for two years after
the date of my SCI debrief or departure from this organization.

6. POC for this action is the 10?? MTN sso at DSN 772-8084

Name: eouontao

SignatureFOR OFFICIAL use ONLY

(U 3 Law Enforcement Sensitive

17111

0028-10-CID221-10117



M. Employee Outside Activities. Potential con?icts with an individual?s
responsibility to protect SCI material may arise from outside employment or
other outside activity from contact or association with foreign nationals. In cases
where such employment or association has resulted in a suspected or established
compromise of SCI, the local SCI security of?cial and supporting Counter-
Intelligence activity must be advised immediately. Involvement in non-U.S.
government employment or activities that rise potential con?icts with an
individual?s responsibility to protect classi?ed information is of security concern
and must be evaluated by an ASI security official to determine whether the
con?ict is of such a nature that SCI access should be denied or revoked.
Individuals who hold or are being considered for SCI access approval must report
in writing to the local SCI security official any existing or contemplated outside
employment or activity that appears to meet the criteria listed below. In addition,
initial or updated personal history statements must include details of outside
employment or activities.

1. Employments that must be reported includes compensated or volunteer service
with any foreign national; with a representative of any foreign interest; or with
any foreign, domestic or international organization or person engaged in analysis,
discussion, pr publication of material on intelligence, defense, or foreign affairs.

2. Continuing association with foreign nationals must be reported.

3. When an individual?s outside employment or activity raises doubt as to an
individual?s willingness or ability to safeguard classi?ed information, he or she
will be advised that continuing that employment or activity may result in
withdrawal of SCI access and be given an opportunity to discontinue. If the
individual terminates the outside employment or activity of security concern, his
or her SCI access approval may be continued provided this is otherwise consistent
with national security requirements.

4. DOD SCI-indoctrinated individuals will have paragraph made available to them
for reading during SCI Indoctrination. Annual security education will advise
individuals to report in writing to their local SCI security officer any existing or
contemplated outside employment or activity that appears to meet the above
criteria. Written reports must be submitted before accepting outside employment
or activity.

Name:

Signature: l?


Date: 313 TQN 0?

FOR OFFICIAL USE ONLY

Law Enforcement Sensitive


9N
Q1223



17112

0028-10-CID221?l0ll7

Lg
PRE NONDIS CLOSURE EXECUTION BRIEFING

Sensitive Compartmented Infomtation is data about sophisticated technical systems
for collecting intelligence and information collected by those systems. SCI systems
require a large number of people to research, develop, build, and operate the collection
systems. The products of these systems are analyzed and produce accurate, detailed
intelligence by senior planners and policy makers.

Communications Intelligence as de?ned by 18 U.S.C. 798, is the classic
example of SCI, and normally is derived from intercepted communications. The
unauthorized disclosure of COMINT can revel to the target countries which of its
messages are being intercepted and which ones are being read. If the targeted country
implements countermeasures, no further intelligence can be expected from that source
and by that method. More devastating than countermeasures are deception operations
which provide misleading or false data that can result in us U.S. foreign and defense
policies based on misleading data. The cost to replace such systems is enormous.

SCI systems encompass activities and information of extraordinary sensitivity and
fragility requiring extensive security. Security for SCI is based on restricting access to
person who has a clearly established official need for hat information, and who meet
rigorous and stringent personnel security criteria. Persons cleared for confidential, secret,
or even top secret information are not eligible by virtue of those clearances for access to
SCI. Furthermore, a person does now have access to SCI because of rank or position.

The security of SCI depends on distinctive security markings, restricted handling and
dissemination controls, segregating information and programs to further restrict access,
and maintaining SCI material found in ?Control Facilities? which have a stringent
physical and procedural barrier and secure means of transmitting SCI.

Persons indoctrinated for SCI accept certain responsibilities and restrictions in a most
explicit way. As a condition of access, and individual signs a nondisclosure agreement
which is contractual agreement between the government and the individual. This
agreement should be read carefully before singing because it states obligations imposed
on the individual and the government. Also, because of an individual?s knowledge and
access to SCI and individual may be denied travel to activities which are deemed
Hazardous. Willful disclosure of SCI to unauthorized individuals, compromise or
security violations constitute criminal or administrative offenses that may result in
prosecution or administrative action. Once indoctrinated it is individual?s responsibility
to become knowledgeable of the security procedures and practices for SCI.

Name:

Signature: 79/


959. 051

Date:

FOR OFFICIAL USE ONLY

Law Enforcement Sensitive



17113





SENSITIVE COMPARTMENTED INFORMATION NONDISCLOSURE STATEMENT

AUTHORITY:
PRINCIPAL

PRIVACY ACT STATEMENT
E0 9397, November 1943 (SSN).

The information contained herein will be used to precisely identify individuals when it
is necessary to certify their access to sensitive compartmenteci Information.

Blanket routine uses, as published by Defense Intelligence Agency in the Federal

ROUTINE
Register.
DISCLOSURE: Voluntary: however, failure to provide requested information may result in delaying
the processing of -your certi?cation. I
SECTION A
An Agreement Between C7 ., RRPUIEQ and the United SW65-

(Prinred or i'_'yped Name)

1. Intending to be legally bound. I hereby accept the obligations
contained in this Agreement in consideration of my being granted
access to_ information or material protected within Special Access
Programs, hereinafter referred to in th.is Agreement as Sensitive
Compartmented Information (SCI). I have been advised that SCI
involves or derives from intelligence sources or methods and is
classi?ed or in the process of a classi?cation determination under the
standards of Executive Order 12356 or other Executive order or
statute. I understand and accept that by being granted access to SCI,
special confidence and trust shall be placed in me by the United States

Government. 5

2. I hereby acknowledge that I have received a security
indoctrination concerning the nature and protection of SCI, including
the procedures to be followed in ascertaining whether other persons to
whom I contemplate disclosing this information have been approved
for access to it, and I understand ihse procedures. I understand that I
may be required to sign subsequent agreements upon being granted
access to different categories of SCI. I further understand that all my
obligations under this Agreement continue to exist whether or not I
am required to sign such subsequent agreements.

3. I have been advised that unauthorized disclosure, unauthorized
retention, or negligent handling of SCI by me could cause irreparable
injruy to the United States or be used to advantage by a foreign
nation. I hereby agree that I will never divulge anything marked as
SCI or that I know to be SCI to anyone who is not authorized to
receive it without prior written authorization from the United States
Government department or agency (hereinafter Department or

Agency] that last authorized my access to SCI. I understand that it is

my responsibility to consult with appropriate management authorities
in the Department or Agency that last authorized my access to SCI,
whether or not I am still employed by or associated with that
Department or Agency or a contractor thereof, in order to ensure that
I know whether information or material within my knowledge or
control that I have reason to believe might be SCI. or related to or
derived from SCI, is considered by such Department or Agency to be
SCI. I further understand that I am also obligated by law and

- regulation not to disclose any classi?ed information or material in an

unauthorized fashion. 36!?
4. In consideration of being granted access to SCI and of being
assigned or retained in a position of special con?dence and trust
requiring access to SCI, I hereby agree to submit for security review
by the Department or Agency that last authorized my access to such
information or material, any writing or other preparation in any form.
including a work of ?ction, that contains or purports to contain any
SCI or description of activities that produce or relate to SCI or that I

Sim

4. (Continued? have reason to believe are derived from SCI,
that I contemplate disclosing to any person not authorized to have
access to SCI or that I have ?prepared for public disclosure. I
understand and agree that my obligation to submit such preparations
for review applies during the course of my access to SCI and
thereafter, and I agree to make any required submissions pt'lor to
discussing the preparation with, or showing it to. anyone who is not
authorized to have access to SCI. 1 further agree that I will not
disclose the contents of such preparation to any person. not
authorized to have access to SCI until I have received written
authorization from the Department or Agency that last authorized
my access to SCI that such disclosure is permitted. .

5. I understand that the purpose of the review described in
paragraph 4 is to give the United States a reasonable opportunity to
determine whether the preparation submitted pursuant to paragraph
4 set forth any SCI. I further understand that the Department or
Agency to which I have made a submission will act upon them.
coordinating within the Intelligence Community when appropriate.
and make a response to me within a reasonable time. not to exceed

30 working days from date of receipt.

6. I have been advised that any breach of this Agreement may
result in the termination of my access to and removal from a
position of special confidence and trust requiring such access. as
well as the termination of my employment or other relationships
with any Department or Agency that provides me with access to
SCI. In addition, I have been advised that any unauthorized
disclosure of SCI by Inc may constitute violations of United States
criminal laws. including the provisions of Sections 793, 794. 798.
and 952, Title 13. United States Code, and of Section 783(bl, Title
50, United States Code. Nothing in this Agreement constitutes a
waiver by the United States of the right to prosecute me for any

statutory violation. ?05

7. understand that the United States Government may seek
any remedy available to it to enforce this Agreement. including. but
not limited to. application for a court order prohibiting disclosure of
infonnation in breach of this Agreement. I have been advised that
the action can be brought against me in any of the several
appropriate United States District Courts where the United States
Government may elect to ?le the action. Court costs and reasonable
attomeys' fees incurred by the United States Government may be

assessed against me if I lose such action.

8. I understand that all information to which I may obtain
access by signing this Agreement is now and will remain the
property of the United States Government unlus and until otherwise

determined by an appropriate official or ?nal ruling of a



no FORM 1847-1, DEC 91 (E6)

PREVIOUS EDITIONS ARE OBSOLETE.

Designed using Perform Pro. WHSIOIOR. Jun 94

FOR OFFICIAL USE ONLY

Law Enforcement Sensitive



17114



8. (Continued) court of law. Subject to such determination. I
do not now. nor will I ever. possess any right. interest. title or
claim whatsoever to such information. I agree that I shall return all
materials that may have come into my possmion or for which I am
responsible because of such accss, upon demand by an authorized
representative of the United States Government or upon the
conclusion of my ernploymutt or other relationship with the United
States Government entity providing me access to such materials. If
I do not retiun such materials on est. I understand this may
he a violation ofSection 793. Ti 18. nited States Code.

ll. (Cannhuet? (governing disclosures of illegality. wste. fraud.
abuse or public health or safety threats); the Intelligence Identities
Protection Act of 1982 (50 USC 421 et seq.) (governing disclosures
that could con?dential Government agents), and the statutes
which protect against disclosure that may compromise the national
security, in Section 641. 793. 794. 798. and 952 of Title 18.
United States Code. and Section 4(b) of the Subversive Activities Act
of 1950 (50 USC Section 783(b)). The de?nitions. uirements.
obligations. rights. sanctions and liabilities created by sai Executive
Order and listed statutes are incorporated into this agreement and are

controlling.

12. I have read this Agreement mrefully and my questions. ifany.
have been answered to my satbfaction. I acknowledge that the
brie?ng officer has made available Sections 793. 794. 798. and 952 of
Title 18. United States Code. and Section 7830:) of Title 50. United
States Code, and Executive Order 12356. as amended. so that I may


13. I hereby assign to the United States Government all rights. title
and interest. and all royalties, rernunerations. and emoluments that

9. al?vnlessfagld tgttil I am released in writingltaiytan authorized
reresent ea epartmentor that videdm
ob? piomccess to I Ai?acilcyall the Ed

ga im upon me is reernent a .
time I am access to SCI.)and times therlzger.

10. Each provision of this Agreement is severable. lfa court
should ?nd any provision of this Agreement to be unenforceable. all
other provisions of this shall remain in full force and
eifect. This Agreement concerns SCI and does not set forth sud!
other conditions and obligations not related to SCI as in now or

herea?er to my employment by or asignment or tioiship
?mi

11. These restrictions are consistent with and do no1.5upersede REM
cog?ict with or Olgi?igxbc alter the employee obligations, riglt1_tsI,_ 3;
liailitiescreated ecutiveOrder1Z56:Section72l1o i . . .
5. United States Code ovemin disclosures to Congress): Section 14' Tm? ?hm 1? mmpmed and In ??nf?mmc?
1034 of Title 10. Unit States e. as amended by the Military with the laws 0f the Sm?
Whistieblower Protection Act (governin disclosure to Congress by I
manners of the military): Section 23 of Title 5. United 15. I make this Agreement without any mental reservation or
States Code. as amended by the Whistleblower Protection Act purpose of evasion. yam

19. BILLET No. (Optional)




16. TYPED OR PRINTED NAME (Last, First, Middle Initial} 17. NKISVC
mowmg Bnmwe 2 7APt'c 1

20. ORGANIZATTON 21 . SIGNATURE .

C) 5; 1?cT IOTH DIV

FOR USE BY MILITARY AND GOVERNMENT CIVILIAN PERSONNEL



22. DATE SIGNED


mqoi?la



SECTION

The execution of this Agreement was witnessed by the undersigned. who accepted it on behalf of the United States
Government as a prior condition of access to Sensitive Compartmented Information.

st, First, Middle Initial) 24. ORGANIZATTON

id-C ion MTA) bit} (Lib
as, storm as 26. DATE
04m to

FOR USE BY PERSONNEL

SECTION

The execution of this was witnessed by the undersigned.
27. TYPED OR PRINTED NAME (use First, Middle Initial) Z8.

30 . DATE SIGNED

29. SIGNATURE
(vvuuoo)

SECTION

This Agreement was accepted by the undersigned on behalf of the United States Government as a prior condition of access
to Sensitive Compartrnented Information.

31. TYPED OR PRINTED NAME (Last, First, Middle Initial)

32. ORGANIZATION

34. DATE SIGNED

33. SIGNATURE


50' :1 347.1, DEC 91 (BACK)
5 es?

FOR OFFICIAL USE ONLY
Law Enforcement Sensitive

"1







17115

2" .


-
10. These restrictions are consistent with and do not supersede. conflict with or otherwise alter the employee obligations,
rights orliabilities created by Executive Order 12356; Section 7211 of Title 5. United States Code (governing disclosures to
Congress); Section 1034 of Title 10. United States Code, as amended by the Military Whistleblower Protection Act (governing
disclosure to Congress by members of the miliiafY): Section 2302(b)(8) of Title 5. United States Code. asamended by the
whistieblower Protection Act (governing disclosures of illegality. waste. fraud. abuse or public health or safety threats); the
intelligence identities Protection Act of 1982 (50 U.S.C. 421 et seq.) (governing disclosures that could expose con?dential
Government agents). and the statutes which protect against disclosure that may compromise the national security, including
Sections 641, 793. 794, 798. 952 and 1924 of Title 18, United States Code, and Section 4(b) of the Subversive Activities
Act of 1950 (50 U.S.C. Section 783(b))_ The de?nitions. requirements. obligations. rights. sanctions and liabilities created by
said Executive Order and listed statutes are incorporated into this Agreement and are controlling.

11. I have read this Agreement carefully and my questions, if any. have been answered. I acknowledge that the briefing
of?cer has made available to me the Executive Order and statutes referenced in this Agreement and its implementing
regulation (32 CFR Section 2003.20) so that I may read them at this time, so choose.



DATE SOCIAL EECURITY NUMBER
r?l SEP 05?

ORGANIZATION (IF CONTEIACTOR, LICENSEE. GRANTEE ORAGENT, NAME. ADDRESS, AND, IF APPLICABLE. FEDERAL SUPPLY OD
(Type OIPIMU
. 8vo.3.\ gt
M. Riva.
V37 rum?

WITNESS ACCEPTANCE

THE UNDERSIGNED ACCEPTED THIS AGREEMENT ON

THE EXECUTION OF THIS AGREEMENT WAS WITNESSED BY
BEHALF OF THE UNITED STATES GOVERNMENT.

THE UNDERSIGNED.

DATE

DATE SIGNATURE

I7 5:908

SIGNATURE

orpnm) warns AND ADDRESS (Type or pant)

Bslonck. Kyle!
N. Riva Ridge Loop
FT. Drum. NY

10100 N. Riva Ridge Loop
FT. Drum. NY 13601

SECURITY DEBRIEFING ACKNOWLEDGMENT

neaf?rm that the provisions of the espionage laws. other federal criminal laws and executive orders applicable to the safeguarding oi ctassi?ed
Information have been made available to me; that I have returned all classi?ed information in my custody; that I will not communicate or

- classified Information to any unauthorized person or organization; that I will report to the Federal Bureau of Investigation any

attempt by an unauthorized person to solicit classi?ed Information, and that I (have) (have not) (strike out inappropriate word or words)
received a security debrie?ng.

SIGNATURE or EMPLOYEE om;

NAME OF WFTNESS (Type SIGNATURE or wrmess

'3

NOTICE: The Privacy Act. 5 U.S.C. 5523. requires that federal agendas inform individuals. at the time information is solicited from them, whether the
disclosure IS mandatory or voluntary, by what authority such information is solicited, and what use: will be made of the information. You are hereby
advised that authority for soliciting your social Security Account Number (SSN) ls Executive Order 9387. Your SSN will be used to identify you
precisely when it Is necessary to 1) certify that you have access to the information indicated above or 2) determine that your access to the
information indicated has termlnaad. Although diadosura of your SSN is not mandatory. your failure to do so may impede the processing of

such certi?cations or determinations. or possibly result In the dmial of your being granted access to classified information. .

NOT APPLICABLE TO NON-GOVERNMENT PERSONNEL SIGNING THIS AGREEMENT.
STANDARD 312 BACK (REV. 1-00)
APO PE v1.oo

FOR OFFICIAL USE ONLY
Laweniommom Sensitive

17116



DEPARTMENT OF THE ARMY
HEADQUARTERS, 10TH MOUNTAIN DIVISION (LIGHT INFANTRY) AND FORT DRUM
FORT DRUM. NEW YORK 13602-5000



REPLY TO
ATTENTION OF

DATE 2} M1

MEMORANDUM FOR 10?? MTN Special Security Of?ce [sso]
SUBJECT: Personal Attestation upon the Granting of Se_curity Access.

1. I, MRNNIH accept the
responsibilities associated with being granted access to Classi?ed National
Security Information. I am aware of my obligation to protect classi?ed
national security information through proper safeguarding and limiting access
to individuals with the proper security clearance and the need to know. I
further understand that, in being granted access to classi?ed information, a
special con?dence and trust has been placed in me by the United States
Government.

2. This form will be placed in the individuals security folder and maintained
IAW AR 380-67

Name: lY1Pn-lv-llvb 3 EDWQED
Signature:


.
Name: Stark, Loren J. 2

Signature:

?fl

am?
a, J35 qf

FOR OFFICIAL use ONLY
Law Enforcement Sensitive

ti on

A as at



AFZS-IN-ACOSG2

17117





DEPARTMENT OF THE ARMY

HEADQUARTERS, IOTH MOUNTAIN DIVISION (LIGHT INFANTRY) AND FORT DRUM

FORT DRUM. NEW YORK 13602-5000

REPLY TO
ATTENTION OF

DATE TQM

MEMORANDUM FOR 10m MTN Special Security Office

SUBJECT: Personal Attestation of Receiving Access Card and/or Picture Badge".

1. I, ,have been issued

A 10"? Mountain Division SCIF Access Card with personalized PIN
Code. I understand that this card and pin code are accountable items and can not
be given to, or shared with, any other person. I understand all transactions
involving this SCIF Access Card are to go through the SSO directly, and
immediately. I understand that returning the SCIF Access Card to the SSO is part
of the mandatory out-processing requirements.

A 10?? Mountain Division Picture Badge. I understand that this
Badge is to be displayed in SCIF areas only, or T-SCIF areas during exercises. I
understand that the Picture Badge is only a re?ection of the Access Roster
maintained returned to the SSO as part of the mandatory

out-processing requirements.

2. I understand failure to comply will delay in-processing gaining unit and may
complicate obtaining accesses through gaining unit.

3. This form will be placed in the individuals security folder and maintained
IAW AR 380-67

Name; MQMUINGI BRADLEY


Signature:

2"

FOR OFFICIAL USE ONLY

Law Enforcement Sensitive



17118

I028-10-CID221-10117




DEPARTMENT OF THE ARMY
HEADQUARTERS, IOTH MOUNTAIN DIVISION (LIGHT INFANTRY) AND FORT DRUM
FORT DRUM. NEW YORK 13602-5000

REPLY TO
ATTENTION OF

DATE 33 39? 0'1

MEMORANDUM FOR 10?? MTN Special Security office [sso]
SUBJECT: Special Intelligence and Talent Keyhole Brie?ngs

l. I, RQQUIV M9-N acknowledge that the
10? MTN DIV SSO has made available to me: The Special Intelligence
and Talent Keyhole brie?ngs during my Sensitive Compartmented
Information Indoctrination Brie?ng.

2. This form will be placed in the individuals security folder and maintained



IAW AR 380-67

Name: mgxd? SRQDI-54 Du/Rm?
Signature:


Witness:
Name:
Signature:

FOR OFFICIAL USE ONLY

Law Enforcement Saruihvo

17119


\4

SENSITIVE COMPARTMENTED INFORMATION
INDOCTRINATION MEMORANDUM

This memorandum records the fact that I was briefed on this date on the following Sensitive Compartmented Information
(SCI) Special Program(s) (Use Unclassi?ed Indicatus Qtly):

Secfei: S5:

Authority (optimal):

The need for special protection of this material was made known to me, and was reminded that my access to this material
is governed by the terms of the SCI Nondisclosure Agreement that I signed.

1
?7
Signazui-:7

mtwadruc,

Printed/Typed Name (Last, First, Middle Initial)

?/53

Rank/Grade
(VY. MM DD)

HHQ Sltecr DIV
Organization



SSN (See Notice Below)

Billet Number





by me was in accordance with relevant SCI procedures.


@972 20f

Date of Brie?ng (YY, MM, DD)



3

Name (Last, Initial)

Notice: The Privacy Act, 5 U.S.C. 552a, requires that federal agencies inform individuals, at the time information is
solicited from them, whether the disclosure is mandatory or voluntary, by what authority such information is solicited, and
what uses will be made of the information. You are hereby advised that authority for soliciting your Social Security
Account Number (SSN) is Executive Order 9397. Your SSN will be used to identify you precisely when it is necessary to
certify that you have access to the information indicated above. Although disclosure of your SSN is not mandatory, your
failure to do so may delay the processing of such certification.

DD FORM 1847, JAN 83 (EG) Previous Editions Obsolete Designed using Perform Pro, Jun 94

FOR OFFICIAL USE ONLY
Law Enloreomont Sensitive



ns??

17120

3023-10-CIDZZI-10117


ADDENDUM
DD Form 1847-1]

Pursuant to Treasury, Postal Service, and General Government Appropriations Act of
1991; the following language shall be incorporated into and considered part of the
attached Non-Disclosure-Agreement:

?These restrictions are consistent with and do not supersede, con?ict with, or otherwise
alter the employee obligations, rights, or liabilities created by Executive Order 12356,
section 7211 of title 5, United States Code, [Governing disclosures to congress] Section
1034 of Title 10, United States Code, as amended by the Military Whistleblower
Protection Act [governing disclosure to congress by members of the military]; section
2303 of title 5, United States Code, as amended by the Whistleblower Protection
Act [governing disclosures of illegality, waste, fraud, abuse of public health or safety
threats]; the intelligence identities protection act of 1982 [50 USC 421 et seq.] [governing
disclosures that could expose con?dential government agents], and the statues which
protect against disclosure that may compromise the national security, including section
64l,793,794,798 and 952 of Title 18, USC, and section the de?nitions,
requirements, obligations, rights, sanctions and liabilities crated by said Executive Order
and listed statues are incorporated into this agreement and are controlling.?

Nam mmJuJ::xd(7, Eowmto

Signature:

Q3 JRN 09

Date:

FOR OFFICIAL USE ONLY

Law Entorcoment Sensitive

- in-. asoer?tamm' other page? ns totwl-1orn'I' contempt? iate d_ise_losing_ this or

iuntil_j_I have" rc?eivcd

17121

SENSITIVE RTMENTED. .

and "the United Stat?si

cpwoao M-Sim rid Cr
I (Name 4 Printed or Typed)

I. Intending to by. legally bound, -Ixhereby -accept~-the obligations ?t':oiittdned- in this Agreements? in consideiation or my ?"3133 3?
information or material protected within Special Access Programs, hereinafter referred togirfthe Agreement 35 (SC
r- it-avemftaen ad-vised involves at derives tiom intei1igt:dce'sou'met or met?lodhi?d tiissi?ddfor it ?in br?vcesi of 8
the Order 1295-3 or Order? or .1 und?rsiand and-accept that by l_3ciIig_ granted to SCI.
. and plAa'c_e'd mine by the United States GovernmentAgreement Between

1 lion conee?nizit are tutti: ariir.iitotoc.rio'n inciuidint? the
?hare ?been
- th?sc procedures. I.undet-stand that 1 may be requiredto sign agreements 80?65?

to sign sued subsequcnf agtwnents

2.. -r ?a security ind

further understand that all my obligations under this agrieernent ctir?zinue io -exist or not

3. I have been advised that the unauthorized.disciUsLrre, uhau?roiized n-.t-cntidn, or by me could cause ?sn??Pai'abI? miur.
the United States or be used to advantage by a foreign nation. I hereby agree that I will never divulge rnark?d I .b1?_W 5? $5
anyone who is not authorized to receive it without prior written arr?aotiza?bn from the Stat?s Gover?rnerrt 39110)?
Department or Agency) that authorized my access to SCI. I understand that it is my responsibility to consult with appropriate management ?u?lo??cs 111
Dcpattnrent or Ase-ncy that last authorized my access to. SCI, 9r.nat I am still employed by or associmd
contractor to ensure? that'I ?know whether oi within my knowledge or control that I have reason to believe E11351 5'3 51

I understand that I am obligated by law and regulation not to disclose any classi?ed information or material in an unauthorized fashtorn

4. In consideration at being granted access to SCI and at or

SCI, I hereby agree to be submitted for security review by or Agency that last authorized my access to such urfotmetron or matctlal. 3
writing Or other preparation in any form, including a work of ?ction, that qr. purports to contain any SCI or
relate or reason to believe are to any person I10_t- authorized t? SCI 51?
have prepared for phbiic disclosure. I understand and niy_gbiigation__t0 Sub?lif?s?ch ?he ?f my
to SCI and therca?er, and I agree to make any required submissions prior to discussing-the preparation with, or showing it to. 3?)??f1F ?"110 15 n?_t 3u*h?nZ
*0 hm. 1? I ism 99? the, contents of_ or.

last authorized ply SCI ?.1131 Sud!

4
I .

5. I unclerstt-std that the purpose of the review described in is to give the United States a reasonable opportunity to
preparation submitted pursuant to paragraph 4 sets forth any I tb,_atthe Department or. Agency to. which Ihave
upon? it, taoordiriating within the Intelligence Community when appropriate, and make a response to me within a reasonable tune. not I0 cI6?1_5d3
days ?iom date of receipt. . - -I .

6. have been advised that any breach of this .of.my access to SCI. and removal from a P051503 0f
and trust such access, as well as the termination" or other relationships With an)? D?P311m??t A?mcy that
me to In addition; wave been advised that- any u_1_1authori_z_etd_ me. may constitute violations cf-United
793-, -794, 798, and 95 '-i585,-Wnited Stii?s-Code, and of Section 783(b), Title 50, United States Code Nothing :1
this ?csiecmertt constitutes. rt waiver by the United States of the right to _prosecute for any statutory_.vi9_l_ation. . . - .2 A

7., Ipnderstand that the United States rnnedyi available to it to enforce this including. but _no_t lig?ied ?to:
a courtorder ofiuforma??n in br?iacin ?-Phavc advised tliatthe ac1_iCt!1 mi
in 311)? 0531? SWCTEI United -"States may elect to ?le the action. Court costs and reasonable
attorneys incurred by the-Udi?ted- G01r?I'n'nIhe'nt may action.

. 8: . I understand that all information to which I may obtain acpess. mm is now and will remain the property of the United States
by an approp?atje d?tnci?;t or ?nal tniing art. I c_Io
101? I any
mssession or for which I am responsible because-of such .a_eces_s,' -upon dernandby an au_thor-izi? of the -United ?Sfaitc's'iGoVcrn1n'cnt or the
Of my employment or other relationship with" the United States Government entity providing mi: access to such m_ateria1s- 3150 30* T?tufll 50071
naterials upon request, I understand that this may be a violation of Title l8,'United- -

at

Ll

Unless and until in writing-by -an authorized of the Department or Agency that 1851? Pf?Vid?d m? E5 Sci: I
Iderstand that all conditions and obligations imposed on me by this apply during the time I am granted access to SCI, and at all thereafter.

10. Each provision of Ajgfeementiis sevcrable If a this ?if
E. 1? sci forth su?e-it otiict not Arelatedj-to
or hcrea?er=pcrtain tomy -cn1ployment.h-y.or or relaiionship with the Bepartment or i ,5

'44; 1 ratezorz
-5, 4- (EF) vrunotbe used: FOR OFFICIAL use ONLY -
- . Law Enfornemenl Sensitive

-

-





17122

1 1. I have read-urio..Agrr it-car 'aia?d my questions ?at. so ti:
made available Sections 793, a}ru?J52 of Title 18, United States Code, and Ercfuon 733(1)) of Title 50, United sures code. and Executive 0
12953. 85 _amended. so that {nay read them at this time, if! so choose.

I2. I hereby assign to the United States Government all riglztis, tide and and all royalties, rcmuncrations, and that have resu!

?will result! or Ingy result from gny or tiic? team of?ais Agmexnent.

.I .- ?lth not wills ?Sr ouzcrwi?c Sitar ihc
Qrder? '72 ofT' ?c united disclosures socrgoo. 1034: of Ti?e tor Unncd
of the Militant); of

amended by the Military" whssaebnowcrs Protection Act disclosures to Congress. by members
United States Code, as amended by the Whistleblowcr Protection Act" (governing disclosure ofilleplity, wastc, fraud. abuse. orpubhc health or set
prococuon-Aer or 1932. (so us_.c: 4.21 disclosusgls that =89
emf a-sent disdo,?urc. whid: section 541, me, .794. Hm
. ?seaion ms) or" the? Subversive Ab?viti?s.l?d; Inc de?nitions, s4n9t=??hs=
by Sid listed - -

lg, shall be intqputd under and in with th_c,law ofthp United States.








1 this mental or .01? cugion.
The cxdcutian cf this Agreement was witnessed lay "egi it,cr1bchg1f_ States 8.-9.8. prior
-canditionnoliaouscto --







r-#L 1' .-

SECURITY /oAn=_- A 2 lIf5?l3R93F 3? A
'7 .oorheabovese?hfamecss Prr?arm?lslz

'?aend?s lnrorm ina'wlau?3ts; 5.
dlsdosura is mandatory or voluntary. by. ls oollcited. will"b.a made of You ah-lrufetlrad

that authority ror soracitlng your Socialsecu?ty Acoouht Number 9397. Your SSN will be used to identify you precisely when is
necessary to 1) certify that you have access to the Information aboye. 2) that your access to the information has terminated. orzlcedifs
that ?you have witnessed a brie?ng or debrie?ng. Although disdosurgdf your SSN is-?not mandatory. your failure to do so-may 90?? Oef??wbons, 0,3

detegrruinations.

FOR OFFICIALHUSEVONLY
FORM ET?~m?mm?3 Page 2 aj:2
I .: .

17123


-
CLASSIFIEUINFORMATION NONDISCLOSURE AGREEMENT

AN AGREEMENT BETWEEN kl AND THE UNITED STATES
?(Name of individual - Printed or typeti)

1. Intending to_ be-_ legally bound, I hereby accept the obligations contained in this Agreement in consideration of my being
granted access to classified information. As used in this Agreement, classified informat_ion is marked or unmarked classified
Information, including oral communications, that is classi?ed under the standards of Executive Order 12958, or under any
other Executive order or statute that prohibits the unauthorized disclosure of information in the interest of national security;
and unclassifledinformation that meets the standards for classi?cation and is in the process of a classi?cation determination
as provided in Sections 1.2, 1.3, and _14(e) of Executive Order 12958. or under any other Executive order or statute that
requires protection for such information in the interest of national security. i understand and accept that by being granted
access to classified information, special confidence and trust shall be placed in me by the United States Government.

2. I hereby acknowledge that I have received a security indoctrination concerning the nature and protection of classified
information, including the procedures to be followed In ascertaining whether other persons to whom I contemplate disclosing
this information have been approved for access to it, and that I understand these procedures.

3. I have been advised that the unauthorized disclosure, unauthorized retention, or negligent handling of classified
information by me could cause damage or irreparable injury to the United States or could be used to advantage by a foreign
nation- I hereby agree that I will never divulge classified information to anyone unless: I have officially verified that?the
recipient has been properly authorized by the United States Government to receive It; or I have been given prior written
notice of authorization from the United States Government Department or Agency (hereinafter Department or Agency)
responsible for the classification of the information or last granting me a security clearance that such disclosure is permitted. I
understand that if I am uncertain about the classification status of information, I am requ_lred to con?rm from an authorized

official that the information is unclassified before I may disclose it. except to a person as provided in or above. I
further understand that I am obligated to comply with laws and regulations that prohibit the unauthorized disclosure of

classified Information.

4. I have been advised that any breach of this Agreement may result in the termination of any security clearances I hold;
removal from any position of special con?dence and trust requiring such clearances; or the termination of my employment or
other relationships with the Departments or Agencies that granted my security clearance or clearances: In addition. I have
been advised that any unauthorized disclosure of classified information by me may constitute a violation, or violations, of
United States criminal laws, including the provisions of Sections 641, 793, 794, 798. ?"952 and 1924, Title 18, United
States Code, the provisions of Section 783(b), Title 50. United States Code, and the provisions of the Intelligence Identities
Protection Act of 1982. I recognize that nothing in this Agreement constitutes a waiver by the United States of the right to

prosecute me for any statutory violation.

5. I hereby assign to the United States Government all royalties, remunerations, and emoluments that have resulted, will
result or may result from any disclosure, publication, or revelation of classi?ed information not consistent with the terms of

this Agreement.

6. I understand that the United States Government may seek any remedy available to it to enforce this Agreement including,
but not limited to, application for a court order prohibiting disclosure of information in breach of this Agreement.

7 i understand that all classified information to which I have access or may obtain access by signing this Agreement is now

and will remain the property of. or under the control of the United States Government unless and until otherwise determined

by an authorized official or final ruling of a court of law. I agree that I shall return all classi?ed materials which have, or may
come into my possession or for which I am. responsible because of such access: upon demand by an authorized
representative of the United States Government; upon the conclusion of my employment or other relationship with the
Department or Agency that last granted me a security clearance or that provided me access to classi?ed information; or
upon the conclusion of my employment or other relationship that requires access to classified information. If I do not return
such materials upon request, I understand that this may be a violation of Section 793 and/or 1924, Title 16, United States

Code, a United States criminal-law.

Unless and until I am released in writing by an authorized representative of the United States Government. i understand
that all conditions and obligations imposed upon me by this Agreement apply during the time I am granted access to classi?ed.

information, and at all times thereafter.

9. Each provision of this Agreement'is severable. If a court should find any provision of this Agreement to be unenforceable,
all other provisions of this Agreement shall remain In full force and effect.

Continue on reverse.
sranmao (REV. 1-on)

7540-01-280-6499
Pneviousledltlon not usable. by
32 2005. E0. 12958
APD PE V1.00



Law Enforcement

Fm? Ollittiul U50 (July
Sensitive



to. These restrictions are consistent with?-?tddo not supersede. conflict with or otherwise obligations;
rights orliabilities created by Executive Order 12356; Section 7211 of Title 5. United States Code (governing disclosures to
Congress); Section 1034 of Title 10, United States Code. as amended by the Military Whistleblower Protection Act (governing
disclosure to Congress by members of the military); Section 2302(b)(8) of Title 5. United States Code, as amended by the
Protection Act (govemlng disclosures of illegality. waste. fraud. abuse or public health or safety threats); the
intelligence Identities Protection Act of 1982 (50 U.S.C. 421 et seq.) (governing disclosures that could expose confidential

Government agents). and the statutes which protect against disclosure that may compromise the national security. including

Sections 641, 793. 794, 798. 952 and 1924 of Title 18. United States Code. and Section 4(b) of the Subversive Activities
Act of 1950? (50 U.S.C. Section 783(b)). The definitions. requirements. obligations, rights. sanctions and liabilities created by
said Executive Order and listed statutes are incorporated into this Agreement and are controlling.

11. have read this Agreement carefully and my questions. if any, have been answered. I acknowledge that the bne?ng
officer has made available to me the Executive Order and statutes referenced in this Agreement and its implementing
regulation (32 CFR Section 2003.20) so that i may read them at this time. if! so choose.

SIGNATUREK DATE SOCIAL secuemr NUMBER
Set?
ORGANIZATION as counincron, LICENSEE. GRANTEE OR AGENT. NAME. ADDRESS, AND. IF APPLICABLE. FEDERAL SUPPLY cope NUMBER)
(Type orPm!)
.

FT \1?uvv-t. MY

WITNESS . ACCEPTANCE

EXECUTION OF THIS AGREEMENT WAS BY THE UNDERSIGNED ACCEPTED THIS AGREEMENT ON
THE UNDERSIGNED. . BEHALF OF THE UNITED STATES GOVERNMENT.

SIGNATURE DATE SIGNATURE DATE
ii?! Se? 08
NAME orprirri) NAME AND ADDRESS (Type or print)
Balonck. Kyle

10100 N. Riva Ridge Loop

10100-N. Riva Ridge Loop
FT. Drum, NY [3601

FT. Drurn, 13501

SECURITY DEBRIEFING ACKNOWLEDGMENT

I reaf?rm that the provisions of the espionage laws. other federal criminal laws and executive order: applicable to the safeguarding of classi?ed
information have been made available to me: that have returned all classified information in my custody; that I will not communicate or
transmit classified information to.any unauthorized person or organization: that I will report to the Federal Bureau of Investigation any
attempt by an unauthorized person to solicit classi?ed information, and that (have)' (have not) (strike out inappropriate word or words)
received a security debriefing.

SIGNATURE OF EMPLOYEE

NAME OF WITNESS (Type orprin!) SIGNATURE OF WITNESS

NOTICE: The Privacy Act. 5 U.S.C. 5521:. requires that federal agencies inform individuals. at the time lnforrnatlon is solicited from them. whether the
disclosure is mandatory or voluntary. by whet authority such information is sollcled, and what uses will be made of the information. You are hereby
advised that authority for soliciting your Social Security Account Number (SSN) is Executive Order 9397. Your SSN will be used to identify you
precisely when it is necessary to 1) certify that you? have access to the information Indicated above or 2) determine that your access to the
information indicated has Although disclosure of your SSN is not mandatory. your failure to do so may impede the processing of

such certi?cations or or poulbly result in the denial of your being granted access to classified information. 7 - .

NOT APPLICABLE TO NON-GOVERNMENT PERSONNEL SIGNING THIS AGREEMENT.

STANDARD 312 BACK (REV. 1-00)"

APD PE 1.00
Uni)?
aw Enforcement
Sensitive
'1

. 9.9/1.0!



17125



AFDR-BBA-IN 22 January 2009

MEMORANDUM TO Division Provost Marshal
SUBJECT: Request for Local Provost Marshal Records Check

1. Reference: AR380-67, Personnel Security Program, 9 Sep 88
2. In accordance with AR380-67. the individual listed below requires a local law enforcement
records check. This check is to determine if the individual has a record of any derogatory

information. This information will become a part of the individual's application for a personnel
security clearance.

3. Request your office conduct this check and indicate below if there is a record of any
derogatory information.

4. Individual Information:

NAME: Bradley E. Manning

RANK: PFC
UNIT: HHC ZBCT
SSN:

Kyle J.\Bal6nekQ
2BCT Personal Security Manager
31 5-772-7346

FOR PROVOST MARSHAL USE ONLY

TO WHOM IT MAY CONCERN




1. The above named individual doesl (circle one) have derogatory information.

2. The list of positive results is listed here.

NAME OFFENSE DATE MPR-NO
PMO APPROVING AUTHORITY
. 0333-21. 2. um

23 0?

it -moo
7) FOR OFFICIAL use ONLY

Law Enloroomenl Sonsiivo

5 rerson summary A as? #13125



Person Summary

MANNING, BRADLEY EDWARD
Person Category Active Duty - Enlisted (USA) I



SSN: Date of Birth: 1987 12 17
Open Investigation: Marital Status:
PSQ Sent Date: Place of Birth: Oklahoma
Attestation Date: Citizenship: U.S. Citizen
Incident Report: Signed:Yes
SF 713 Fin Consent Date: Signed: No
SF 714 Fin Disclosure
Date:

Polygraph:

Foreign Relation: 1, Mother, United Kingdom

Reguest tg Researcmupggadg

w?mm
Histom

Accesses

Category US Access PSP 5 Available Actions
Active Duty - Top Secret No IL 3 Non-
Enlisted (USA)

Public Trust:


Child Care:

Person Category Information

Category Classi?cation:
0010 IN HHC O2 HHC BDE LID, FT DRUM, NY, 13602
Organization Status:
Occupation Code: Separation Date:
SCI SMO:

sMo: 2ND ecr, SID, Level 5, ?@us.army.mi|

Servicing SMO: Yes

Office Grade: E3
Position Code:
Arrival Date:
Office Phone Comm; . Eice Pbgne Q?u:
Separation Status: 09 26
Interim: Proj. Departure Date:
Proj. UICIRUCIPASCODE:
Regrt Incident InIOut Process
Remarks
Susmnse Data
6?
v5 -
Investigation Summary nv ti ?s
IC
"0
'5 FOR OFFICIAL use ONLY
Law Enroroomont Senniuvg

1/22/2009

'5 ?lg

?cl

rage 216122
0028-10-CID221-10117

JLJA 5 Person summary



SSBI from OPM, Opened: 2007 10 10 Closed 2008 01 15

ENAC from OPM, Opened: 2007 09 26 Closed 2007 10 02

Adjudication Summary m$mx
PSI Adjudication of SSBI OPM, Opened 2007 10, Closed 2008 01 15, determined
Eligibility of SCI - DCID 6/4 on 2008 10 06

interim SCI Adjudication of ENAC OPM, Opened 2007 O9 26, Closed 2007 10 02,
determined Eligibility of interim SCI on 2007 10 17

External Interfaces

Perform Search II

Notice: Under the Privacy Act of 1974. you must safeguard personnel information retrieved through this
system. Disclosure of information is governed by Title 5, United States Code. Section 552a Public Law 93-579,
DODD 5400.11, DODR 5400.11-R and the applicable service directives.

FOR OFFICIAL USE ONLY

Law Enforcement Sensiliv



1/22/2009



oi
Qi 75.71



17128

DEPARTMENT OF THE ARRN,
HEADQUARTERS, 2o INFANTRY BRIGADE COMBAT TEAM
10TH MOUNTAIN DIVISION (LIGHT INFANTRY)

FORT DRUM, NEW YORK 13602

AFZS-LF-I

22 January 2009

MEMORANDUM FOR SSO, 10th MTN Division

SUBJECT: Nomination for SCI Access

1. The following Individual requires access to SCI material:

NAME AND RANK: Ma_nr_1ing, Bradley E.

SSN, DOB, POB: 17 December 1987, San Diego, CA
POSITION: Igence Analyst

ORGANIZATION: HHC, ZBCT 10th Mountain Division

EMAIL Address bradley.manning@us.army.mil

2. Justi?cation. PFC Manning is an Intelligence Analyst assigned to the S2 section
2BCT, 10th Mountain Division He requires a TS Clearance with access to SCI


3. PFC Manning's requirement for is validated by the unit Security Manager
and certi?ed there are no known reasons why this individual should be denied access to

SCI. Additionally, should any such information be discovered, it will be reported to the
10th MTN Division SSO immediately.

4. The point of contact for this memorandum is the undersigned at?



Brigade Security Manager

FOR OFFICIAL USE ONLY
Law Enforcement Senwve

17129



Ns/x Classification
A Love 0FF(crm_ neg 0,-gay


I. 1

RWEOCTRINATION FOR SENSITIVE SERIES COMINT


(6) Certain communications intelligence, due to its unique or highly sensitive

11311116, is Published in series reports and requires more restrictive handling
than normal TOP SECRET Codewond Product. .

(W/Faun) .
2. (G) In accordance with the comngunity-wide criteria set forth in the Signals
Intelligence Security Regulations (SISR), COMINT is placed in the GAMMA SBITCS by

the Director, NSA based on one or more of the following factors:

a. Collection methods, when the dissemination of the information could reveal an
unusually sensitive method or location. .

b. Analytic techniques, when the ?dissemina-tion of the information could revealan
unusually sophisticated SIGINT technique.

c. Security provisos, when a providing Agency (other than NSA) determines that
restrictedprotection is necessary to protect a sensitive means of collection or when
the cxistenceor contents of the report could reveal the means of collection.

cl. Sensitive substantive content

c, A sensitive target

3. Access to GAMMA COMINT requires speciaiiclenrance.
tot} -

4. (G) If used in any mariner in other publication, memos; cables or brie?ngs,
GAMMA information must._b_c identi?ed by the caveat Controlled Item" and
aims to such materials may only be afforded to persons having the GAMMA
clearance. GAMMA material is never used in normal COMINT series reports outside the
System.

(U/(Faun) 1

5. (G) sensitive series produced by US. or second party
activities is easily recognized by the useof the appropriate GAMMA COHUU1
caveat items are identi?ed in the COMINT serial.

EXAIVEPLE:

I have read understand (Iris memo

Date: 30?: gal
Signature: -

Print: senator

.,


ea; -
or;/exec nag omy
CL I FOR OFFICIAL USE ONLY


JCAVS Person Summary

Person Summary

Page 1 071130

MANNING, BRADLEY EDWARD
Person Category Active Duty - Enlisted (USA) -

Date of 12 17
Eligibility: 2?03 1? 06' Place of Birth: Oklahoma

Investigation: SSBI, 2008 01 15. OPM

Accesses
Category US Access SCI
Active Duty - Enlisted Top Secret IT: 3 SI
(USA)
Public Trust: TK
Child Care: 6
HCS
Access Number:

Person Category Information

Category Classification:
0010 IN HHC 02 HHC BDE LID, . FT DRUM, NY, 13602
Organization Status:

Grade: E4 Interim:

External Interfaces


Notice: Under the Privacy Act of 1974, you must safeguard personnel information retrieved through this
system. Disclosure of information is governed by Title 5, United States Code, Section 552a Public Law 93-579.
5400.11, 5400.11-R and the applicable service directives.

5/26/2010

. - Ts]

JCAVS Person Summary Page 1 017131

Person Summary
MANNING, BRADLEY EDWARD

Person Category Active Duty - Enlisted (USA) -
Date of Birth: 1987 12 17
Eligibility: 2?03 10 Place of Birth: Oklahoma

Investigation: 2008 01 15. OPM

Accesses

Category US Access SCI
Active Duty - Enlisted Top Secret IT: 3 Yes
(USA)

Public Trust:

Child Care:

Person Category Information

Category Classi?cation:
0010 IN HHC 02 HHC BDE LID, FT DRUM, NY, 13602
Organization Status:

Grade: E4 interim:

External Interfaces


Notice: Under the Privacy Act of 1974. you must safeguard personnel information retrieved through this
system. Disclosure of information is governed by Title 5. United States Code. Section 552a Public Law 93-579,
5400.11, DODR 5400.11-R and the applicable service directives.

5/26/20 I 0



. . 17132



UNITED STATES OF AMERICA Prosecution Motion

for Preliminary Ruling on
Admissibility of Evidence
(Business Records)

V.

Manning, Bradley E.

PFC, U.S. Army,

HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211

Enclosure 15



22 June 2012

PROSECUTION EXHIBIT
PAGE OFFERED: PAGE A

1

17133

AEESTATION

This document is intended to meet the requirements set forth in Military Rules of Evidence Rule
902(11), addressing certified records of regularly conducted activity.

I swear or af?rm that each of the following is true regarding the attached records, to the best of
my knowledge and belief:

1. I am the custodian of these records, or I am an employee familiar with the manner and
process in which these records are created and maintained, by virtue of my duties and
responsibilities;

2. The records were made at or near the time of the occurrences of the matters set forth by
or from information transmitted by, people with knowledge of these matters;

3. The records were kept in the course of regularly conducted business activity;
4. It was the regular practice of the business activity to make the records; and

5. The records are a true, accurate, and complete copy of the original documents.

List of attached records:
(14 pages)
--Nothing Fol|ows--



Organization

5 FM: -IEW- Dag PM DQQ5 -4
Signature Date



Print or Type Name Title

BA Va Line PM Dc.(.sn Hetrr
Business Telephone gusiness Address

1.136 6000 Drfye?
Aberdam Prov.? 5. .;il.005



and sworn to bef re a notary public, this commis n:
mlNsI5WLel3?E?l?







. . 17134



Version Description Document (VDD)
For

Basic Analyst Laptop
(BAL)

Distributed Common Ground Systems Army
Software Version 3.1 Patch 3
(DCGS-A V3.1 P3)

1 October 2009



DCN: 149015, Rev1



Version 3.1 P3
Basic Analyst Laptop - Collateral

0 17135

DCN: 149015, Rev 1


1 October 2009

Revision History

Description of Change

Revision Date Page(s) Para.
Original February 17, 2009 Initial release
1 October 1, 2009 Release of new Image with Re partition of
Drives, with SQL. Data Base hardening and
configuration changes







. . 17136
DCGS-A Version 3.1 P3 UNCLASSIFIEDIIFOUO DCN: 149015, Rev 1
Basic Analyst Laptop - Collateral 1 October 2009
1. Scope .. 1
1.1 Identification .. 1
1.2 System Overview .. 1
1.3 Document Overview .. 1
2. Referenced Documents .. 1
3. Version Description .. 1
3.1 Inventory of Materials Released .. 1
3.2 BAL Media Listing .. 2
3.3 Software Description .. 2
3.4 Possible Problems and Known Errors .. 6
3.5 Adaptation data .. 7
3.6 Related Documents .. 7
3.6.1 Post Clone Procedures .. 7
3.6.2|nstal|ation Procedures .. 7
3.6.3Technica| Bulletins .. 7
3.6.40verwatch MFWS Release 6.2 .. 9
3.7 COTS Software Sites .. 10
3.8 Hardware Description .. 10





17DCGS-A Version 3.1 P3 DCN: 149015. Rev 1
Basic Analyst Laptop - Collateral 1 October 2009
1. Scope

1.1 Identification

This Version Description Document (VDD) describes software release V3.1 P3 being developed at the
direction of the Project Manager DCGS-A for use in the DCGS-A V3.1 P3 Basic Analyst Laptops (BALs),
which include Dell M90, M6300, and the Alienware (A51M). Two other Client platforms are the Dell M490
Workstation, T5400 Desktop. The BALs. Workstation and Desktop software version will be authorized to
process up to Secret Collateral information and connect to the Secret Internet Protocol Router Network
(SIPRNET) in accordance with AR 25-2 Information Assurance and Department of Defense
Instruction 8500.2 Information Assurance (IA) Implementation.

1.2 System Overview

The A51M, M90 andlor M6300 are high-end laptop computers with a 17" monitor capable of displaying
high-resolution graphics. The Dell 490 Workstation and T5400 Desktop with the V3.1P3 SW is used
within the DCGS-A fixed site baseline. Microsoft Windows XP Professional (Service Pack3) utilized as
the operating system. The A51M, M90, M6300, Dell 490 and T5400 provide the Army a client
workstation for use by DCGS-A

Note: The A51M, M90, M6300, Dell 490 and T5400 is classified because of a file change within the
Query Tree Multi Functional Work Station (MFWS) Plug?ln and the change to the high water marking.

1.3 Document Overview

This VDD documents the release tested and type-accredited with the DCGS-A V3.1 P3 Collateral
components in the DCGS-A laboratory environment at Fort Monmouth, NJ, released to the Central
Technical Support Facility (CTSF), Fort Hood, and then released to operational users for site
accreditation.

2. Referenced Documents

Field Service Engineer (FSE) Training Guide. Part 3.1.03.1002.C, dated 1 October 2009 prepared by
Fort Monmouth NJ.

Note: All referenced documents are resident in the Software Engineering Center (SEC) Software Control
and Reference Office (SCRO).

3. Version Description

3.1 Inventory of Materials Released

Software for the DCGS-A V3.1 P3 BAL is installed at the Software Integration Lab (SIL) onto the |aptop?s
hard drive. Consequently. no media will be delivered with the DCGS-A V3.1 P3 BAL. All updates are
provided through download from digital media.

25 Hard Drives and 3 DVDs containing software and documentation for DCGS-A Version 3.1 P3 is

resident in the Software Engineering Center (SEC) Software Control and Reference Office (SCRO)
reference on paragraph 3.2. BAL Media Listing.

1

. . 17138

17DCGS-A Version 3.1 P3 DCN: 149015. Rev 1
Basic Analyst Laptop - Collateral 1 October 2009

3.2 BAL Media Listing





CMC I i ?Bel or_? I Created . Med?
scno cmcooe Toestlnation Contents Tm'?
m?

M90 andlor M6300:

SEC IFSI SEC Alienware Dell 490

WA scao SCIF Workstation and T5400 mo

. Desktop CIientimageDCGS-AV3.1P3-APP1,
.occso31s NIA 7 1-Oct-3.3 Software Description
The following is a list of DCGS-A V3.1 P3 Client SW detailed software information:

NOTE: The Client SW listed can be loaded on the ?ve platforms that include Dell M90, M6300. A51M,
Dell M490 Workstation and the Dell T5400 Desktop. Once the SW is loaded onto the platform. the
appropriate drives are loaded. The i2 Analysis Notebook (ANB) is loaded on the system without an
active software license. if the user chooses to use the user will procure the license. The Axis Pro
capabilities are in the DCGS-A MFWS V3.1.

BAL Software Version Vendor Functlonlcomponont
Acrobat Reader 9 9.1.2 Adobe PDF ?le reader
Adobe Flash is the authoring
. environment and Flash
Adobe Flash Player Plug-ln 10.0.32.18 Adobe may? is the vmud machine
used to run the Flash files
Has? 1? 10 22 87 Adobe Flash Player
. . .
Alert Services Client Runtime . . . .
4.53.5 Future Skies Alert Service Application
Geospatial data
Desktop 9.2.1500 ESRI management and
presentation
Geospatial data
ArcMap 9.2 ESRI management and
presentation
. . Geospatial data
(Military Analyst 9.2 SP2) 3
Military Overlay Editor 9 2 0 430 ESRI
9'2 (SP1) . I I presentation
CECOM_MapShapes 1.00.0000 Overwatch
Chart Scrapper 7.2.0.1 xgg??a?on Data Movement tool

2



17DCGS-A Version 3.1 P3 DCN: 149015, Rev 1
Basic Analyst Laptop - Collateral 1 October 2009

BM. Software Version Vendor Functlonlcomponont
C2R 4.70.9 GOTSIPD CS Address Book Services
C2R Planner 1.00.0000 GOTSIPD CS Address Book Services
CMP 4.7.0.6 GOTSIPD cs

DB importer 7.1.0 Novel App Inc. DB Importer

DCGS-A Con?guration 1.3.0 .

Assistant 20090504 I2WD fast clone assistant

Multifunction Workstation
DCGS-A MFWS v3.1 6.2.6.1077 Overwatch APP
1.7.13

6.2.0.1035 Overwatch Muiti function Workstation
DCGS-A Multimedia Plugin 1.0.0 BAH

DCGS-A Web Folder Plugin 2.0.0 BAH

DCI (DOS Client Interface) 5.1.5.0 Future Skies

DCGS-A Weather

IW EDA Client 6.4.2.8 Research Weather effect decision aid
Tri-Service IWEDA -20061129

. id riti I, t? .

Northrop df:itaI"an:oy
Systems (DTSS) 9'0 9'0 Grumman hardcopy geospatial

6 Rendering Package information

. Installer for the Viper DIB
DIB Client Adapter 1.3 CSP Tech Client Adapter
Geospatial software product
GeoRover for 3.10.0000 SAIC extensions or "plugins" to
ArcMap

GeoRover Coordinate Viewer Geospatial

Extension 1'02 SNC

GeoRover Digital Data Tracker Geospatial

Extension 3'25 SNC

GeoRover License Manager 1.1.0 SAIC Geospatw

.

3.2.4 SAIC Geospatial

GeoRover Zoom Tools .

Extension 3.2.4 SAIC Geospatial

Ground Tactical

Communication (GTCS) 4.7.0.9 GOTSIPD CS Message Transport Protocol

17139



17DCGS-A Version 3.1 P3 UNCLASSIFIEDIIFOUO DCN: 149015, Rev 1
Basic Analyst Laptop - Collateral 1 October 2009
BAL Software Version Vendor Functlonlcomponont
Virtual globe, map and
Google Earth EC 4.2.205.5730 Google g?graphic information
Grid Extractor 1.2
. . Link Timeline Analysis tool
i2 Analyst Notebook 6 6.055.1022 i2 W, graphic? representation
i2 Online iLink is a feature of
Analyst's Notebook 6 that
. . . . optimizes online data
'2 Omme 6 6 '2 research and analysis. It
enables real-time access to
online data providers.
i2 Chart Reader 6 6 i2 Charts Reader
i2 Chart Reader 7 7.0.7 i2 Charts Reader
i2 Image Files 6 i2 Image Editors
. . . Visualization software,
'2 V's"a' Notebook 6 '2 streamlines investigations
i2 Spelling Checker 6 i2 Image Editors
URL Scan Tool 2.0
IME Pass Client
IME WWF Client
. la ?le
JAVA 6 Update 1.6.0.60 Sun Micro
Live Update 3.2 3.2.0.68 Syrnantec Software Update Tool
Environment for building,
Microsoft .NET Framework 3.0 . deploying. and running web
SP1 3121022 Mmoso? services and other
applications
Environment for building,
Microsoft .NET Framework 2.0 . deploying. and running web
SP1 2.121022 Microsoft services and other
applications
Environment for building,
Microsoft .NET Framework 1.1 1.1.4322 Microsoft web
applications
Microsoft Compressive .
C|ient1.0 for Window xp
Microsoft Office Professional 12.0.6215.10 . .
Plus Edition 2007 00 Microsoft Electronic office tools
Microsoft Office 2003 Web . Allows embedding and
components 11'0?6558'? Mmoso? linking to documents
Microso? Office XP Web . Allows embedding and
components 10'0'6619'0 linking to documents

17140

17141



17DCGS-A Version 3.1 P3 DCN: 149015. Rev 1
Basic Analyst Laptop - Collateral 1 October 2009

BAL software Version Vendor Func?onlcomponent
Mozilla Firefox 3.0.5 Mozilla Web Browser

MS SQL Server 2005 9.2.3042.00 Microsoft Database

MS SQL Server 2005 .

Backward Compatibility 8.05.2004 Microsoft Database

MS SQL Server 2005 Books .

0n_Line (English) 9.00.1399.06 Microsoft Database

MS SQL Server Native Client 9.00.3042.00 Microsoft Database

9.00.40.35.00 Microsoft Database

MS SQL Server VSS Writer 9.00.4035.00 Microsoft Database
1 0 1.0 Microsoft Build #5716

6.0 Parser 6.10.1129.0 Microsoft Text parser

Text parser
4 SP2 4.20.9818.0 Microsoft
Text parser
4 SP2 4.20.9870.0 Microsoft
Text parser
4 SP2 4.20.9848.0 Microsoft
. . 02 Micro
02 Smartcard Driver 2.26.0000 Bectronics. Inc.
02 Micro

OZTI6 SCR CardBus 1.1.4.2 Ebwonics. me.

Psi .12 GNU Collaboration Tool
Python 2.4.1 Open Source U3 6
QuickTime 7.64.17.73 Apple Audio and video file player
Query Tree MFWS Plugin 1.3.8 MFWS Plugin

Roxio Activation Module 1.0 Roxio Digital Media So?ware
Roxio Creator Audio 3.5.0 Roxio Dig?al Media Software

17142

3.4 Possible Problems and Known Errors



17DCGS-A Version 3.1 P3 DCN: 149015. Rev 1
Basic Analyst Laptop - Collateral 1 October 2009

BAL Software Version Vendor Functionlcomponent

Digital Media Software
Roxio Creator Copy 3.5.0 Roxio
Roxio Creator Data 3 5 0 Roxio D'9"a' Media
Roxio Creator DE 3.5.0 Roxio Digital Media Software
Roxio Creator Tools 3.5.0 Roxio Digital Media Software
Roxio Drag-to-Disc 9.1 Roxio Digital Media Software
Roxio Express Labeler 3 3.2.1 Roxio Digitai Media Software
Roxio Update Manager 6.0.0 Roxio Digital Media Software
Shared Add-in Extensibility
update for Framework 1.0.0 Microsoft
2.0
Shared Add-in Support Update .
for Framework 2.0 1'00 Mlcroso?
Sigma Tel Audio 5.10.5210.0 SigmaTe| Digital audio processing
Smart Link 56k Voice modem Voice modem
:22? Cine Player Decoder 4.2.0 Sonic Solutions
Symantec Antivirus 10.1 .8000.8 Symantec Virus detection
4 9.00.4035.00 Microsoft
Synaptics Pointing Device 7.13.2.0 Synaptics Pointing device
Threat Mapper 1.1 for 1 1
Desktop

. . . Media Player CD. DVD,
Windows Media Player 11 11.0 Microsoft streaming audio Video
Mama Format 11 11.0 Microsoft Media Player
Windows XP SP3 ?gg?'0414'03 Microsoft
WinZip 10.0 (6685) LP File compression
Xalan Endorsed 1.00.0000 Ovenivatch XML processing package

See ReadMe document for DCGS-A V3.1 .0P3 Multi-Function Work Station (MFWS) and Interoperability
(IOP) Server, dated 17 February 2009, SIL.

17DCGS-A Version 3.1 P3
Basic Analyst Laptop - Collateral

3.5 Adaptation data

Not applicable

3.6 Related Documents

3.6.1 Post Clone Procedures



17143

DCN: 149015, Rev 1

1 October 2009

Refer FSE Training Guide in Section 2. Referenced Documents

3.6.2 Installation Procedures

DCGS-A V3.1 .0P3 Multi-Function Work Station (MFWS) and interoperability Server ReadMe.doc,
dated 17 February 2009, SIL

DCGS-A V3.1P3. Update Image Restore ReadMe.doc. dated 1 October 2009. SIL

3.6.3 Technical Bulletins
TB-DCGS 09-10087 re: Workstation vulnerabilities ?xes. 17 February 2009

TB-DCGS 09-10097 re: DISA data, 17 February 2009

NOTE: TB-DCGS 09-10087 and TB-DCGS 09-10097 were implemented in the software baseline
delivered to CTSF on 17 February 2009. and are under Application 2 sewer.

The following Technical Bulletins applies to the V3.1P3 SW baseline after 17 February 2009 delivery to

CTSF:
Con?gun?qn PM DCGS-A
TB Number TltloIToplc Approved
Undeployment of D18 brain Adapter and Ior PW update to
DCGS 09-10094 MDC xpipeline account; also adds DIB and portal versioning 11-May-09
DCGS 09-10095 IOP IOP ot?ce 2007 11-May-09
MSMQ service Fixes problem sending USMTF and PASS messages
DCGS 09-10099 on BALs from BAL in standalone mode. (4 March 2009) 14-May-09
Fixes APP1 homepage I baseline map problems (6 March
DCGS 09-10100 APP1 2009) 11-May-09
DCGS 09-Q10101 APP1 Fixes publishing Graphics to DIB problem (4 March 2009) 11-May-09
DCGS 09-10104 BAL Adds Ft. Hood Maps to BAL (23 March 2009) 7-May-09
DCGS 09-10106 BAL Fixes problem with SWB1 IWEDA Client (31 March 2009) 11-May-09
QT plugin ver1.3.8.1 update - allows working with BOTH
DCGS 09-10107A BAL OIF and OEF data (09 April 2009) 12-May-09
Adds Ft. Huachuca Mini brain link to MDC portal (17 April
DCGS 09-10108 MDC 2009) 1 1-May-09
Fixes problem clearing the TED DB after a training event
DCGS 09-1011 1 IOP (20 April 2009) 7-May-09
APP1, APP2,
MDC, IOP,
DCGS 09-10112A BAL Con?guration Assistant Update to v1.3.0 (5 May 09) 14-May-09
DCGS 09-10113 APP1 NAI fix for irefox 11-May-09



17144
17DCGS-A Version 3.1 P3 DCN: 149015. Rev 1
Basic Analyst Laptop - Collateral 1 October 2009
Configuration PM DCGS-A

TB Number systems TltleIToplc Approved

DCGS 09-10115A BAL Fix for sending TED entities to Google Earth 18-May-09

DCGS 09-10116 BAL Changing pennission settings for DCGS-A User folder 7-May-09
Allow the operator to enter a full non-westem name in
QuickForms and/or the Properties plugin without

DCGS 09-10120 MFWS incorrectly mapping them to middle and last name fields 28-May-09
Applies to all v3.1 P3 DCGS-A DCGS IOP sewers and
BALs systems. It edits registry values to allow for the
workflow between Google Earth and MFWS to be

DCGS 09-10122 IOP, BAL successful 3-Jun-O9
Provides corrections to the DIB plug-in of the BAL MFWS.
The TB corrects issues with the DIB usage found in the

DCGS 09-10123 BAL SIL Bug Tracker 15-Jun-09
Sewer Vulnerability Fixes. Hides D18 8. Query Tree data

DCGS 09-10126 IOP. BAL drivers from the users display within Earth 3-A -09
Server Vulnerability Fixes. Users are unable to convert

DCGS O9-10128 APP2 ANB7 charts to ANB6 charts

DCGS 09-10129 Python 2.4 win32 extensions install 3-Aug-09
Server Vulnerability Fixes 0.7.5) for P3 P5

DCGS 09-101318 MSG, SDE systems (Red Hat 5/ 32 BIT) 21-Aug-09

DCGS 09-10132 BAL Add chat to BAL baseline 24-Aug-09
Add correct ESRI Arc Desktop 9.2 License to Baseline for

DCGS 09-10133 BAL use of Tracking Analyst 2-Sep-09

DCGS 09-10134 BAL Firefox Flash installation 2-Sep-09

DCGS 09-10137A APP1 JBOSS windows service ?x 10-Sep-09

APP1, APP2.
MDC. IOP, Microsoft Windows Server I Workstation Vulnerability

DCGS 09-10147 BAL Fixes - SAT v1.2.1b 23-Sep-09
MFWS Merge Relationships, Deleted Entity Manager

DCGS 09-10148 BAL, IOP Updates 9-Oct-O9
JBOSS windows service ?x (startD|Boss.cmd I

DCGS 09-10149A MDC wrappendll) 27-Oct-09
Removal of duplicate IIS Web folders from

DCGS 09-10152 BAL, IOP directory 16-Oct-09
Issues Discovered in OIF and Feb 09

DCGS 09-10153 BAL, IOP Image 23-Oct-09
Server Vulnerability Fixes - v0.7.7 (RHEL5 I

DCGS 09-10155 MSG, SDE 32 B1) i386 27-Oct-09

APP1, APP2.
IOP, MDC, Microsoft Windows Server I Workstation

DCGS 09-10157 BAL Vulnerability Fixes - SAT v1.2.1 3-Nov-09
Issues discovered in OIF and OEF

DCGS 09-10159 BAL, IOP This TB supersedes TB 10153 6-Nov-09



. . 17145

17DCGS-A Version 3.1 P3 DCN: 149015, Rev 1
Basic Analyst Laptop - Collateral 1 October 2009

3.6.4 Oven-/arch MFWS Release 6.2

DCGS-A V3.1, MFWS release 6.2, Document number: 102168, dated 15 January 2009, Ovenvatch
Textron Systems

9

17DCGS-A Version 3.1 P3
Basic Analyst Laptop - Collateral

3.7 COTS Software Sites

3D analyst (ArcGlobe)

DCN: 149015. Rev 1

1 October 2009



Acrobat Reader


om

Analyst Notebook



0 Java
0
0 Microsoft

:Il' va.sun.comI



Netscape

Roxlo

httg:Ilroxlo.com
Symantec

ca

e. mi



Winzip







3.8 Hardware Description
The following is a list of DCGS-A V3.1 P3 BALs hardware information:

component

Description

Alienware Laptop - Model
A51M

3.8 2GB RAM memory, 17? display with high resolution
graphics.

Dell Laptop - Model M90

2.33 Intel Dual Processor Core, 3.2568 RAM memory,
93.1 GB hard drive, with NVIDIA graphics card,
Optical Drive, Network Interface Card and a 17 inch display
with high resolution graphics.

Laptop - Model Dell M6300

2.5 Intel Core 2 Duo T9300, 4GB DDR2-667 SDRAM (2
DIMM), NVIDIA Quadro 512 MB, 160 GB 7200RPM
Hard Drive, Touchpad, 8x 8. Roxio Creator and
a 17? wide screen WUXGA LCD.

Dell Precision 490 Workstation

1st Processor: Intel XEON DUAL CORE Processor
2MB L2 Cache; 2nd Processor: Intel XEON DUAL CORE
Processor 2MB L2 Cache; 4GB, DDR2 ECC
SDRAM Memory, NVIDIA Fx 4500 512MB 2 DUI OR
GA 1st Hard Drive: 8068 Serial ATA 7200RPM Hard
Drive wloataburst Cache, Non-Raid, Precision 470/670; 2nd

Hard Drive: 8068 Serial ATA 7200RPM Hard Drive with

10

17146

17147

17DCGS-A Version 3.1 P3 DCN: 149015, Rev 1
Basic Analyst Laptop - Collateral 1 October 2009
component Description

Databurst Cache Raid; Floppy Drive: 3.5, 48XI32X
CD-RWIDVD Combo.

Dell Precision T5400 Desk
Top

1st Processor: Quad Core Xeon Proc X5450, 2X
6MB L2 Cache,1333Ml-Iz; 2nd Processor: Quad Core Xeon
Proc X5450. 2X6MB L2 Cache,1333MHz, 4GB,
DDR2 ECC SDRAM Memory NVIDIA
Quadro FX3700 512MB dual DVI Graphics Card; 160GB
SATA. 10K RPM Hard Drive with 16MB Dataaurst Cache;
CD-ROM or DVD-ROM Drive: 16X

UNCLASSIFIEDIIFOUO 11

17148

IKg
VO*-^

,n
Seagate

Barracuda 7200.11
1500 Gbytes

S/N: 9VS25G5M

lllllllllllllllllllllllllllllilllllllllllllllll
ST31500341AS

lllllllllllillllllillllllillllllllllllllllllllllHIIIIIIIIIIIIII

+ 5V0.72A
+ 12V 0.52A

P/N: 9JU138-302

iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
Firmware: CC1H

w a s

Product ol Thailand

S,.0.«:T«

Caution. Product warranty is void il any seal
or label is removed, or il the drive experiences
STX-720011 (B)
shock in excess ol 350 Gs.
Need Support? Visit www.Seagale.com.

Installation Summary

!

#

#

#

#

!

!

„» Disk Utililv in me uiilitiMl2^

:


This medium is Classified

SECRET
U.S. Government Property
Protect it from unauthorized
disclosure in compliance with
apoiicable executive orders,
statutes, and regulations.
\

i •• '
This medium is

UNCLASSIFIED
U.S. Government Property
SF 710 (1-87)

. s- -^

.

.

,

Substitute for
Prosecution Exhibit 11

17149

0 ^
PAGE OFFERED: PAGE ADMITTED:
PAGE OF PAGES

riii

Ttiis medium IS classified

E#

10^..

1

11

ODI

1•

SECRET j
u s. Government Properly

1•
xH Il

;

Protect It from unauthorized \
disclosure in compliance with;
applicable executive orders. \
statutes, and regulations.
\

^1]
0
ml
.VJB

S CO n

o

X)|I
H

Substitute for
Prosecution Exhibit 12

17150

EVIDENCE/PROPERTY TAG
For use of this forni, see AR 95-5,
the proponent agency is DCb,G-i

I*X

ITEM slUMBER

"

"

«'

Q : — ^ ^ ^ h

OF

f

0%

pspe

\

FKL-HHY2120BH
FuJllM

OtM g i g a k r t « ( O B )
BOM b i l l i o n b y t e a .
acc«**itl# B«p«clty
" i l l b*
«nd actiMl
c a p a c i t y d a p « i u U on
th* cp#r*tlng anvlronMnl
and f o n a t t i n q

INITIALS

[2JvlX> Kb

8

5>I» n u U
Sfll/U. DAT«
CAUTION PtEASE ATTACH ALL CAKES
SECUHLV FM PKMR c o K a r m

ITEM

DATE

REMARKS

2 3 4 ; « ,

•IIMIIIIIIIII

I

OiOO

KVNO

i™iiiiI!i.J5SJISli2JS,JflL™'-°'-°9 '"^'i • ooKxmoi
RoHS compiiance

6Ogg~)6-Cr022.Mblf7
TIME

IM.ILWO

"

MPR/CID CONTROL NUMBER

I

IN

Utm

lU.

#

I'S0OO0OC04|-':GS4C

•iimiiiiiiiiiiiiiiiiiiii

M.f^. f ^ c { ( z j , n ^ A ^ L^oy^cf
l - W ^ O i ' s K Dr^me
S^SZ'iiPiL K^V/S-WVu

^ M n r z i QOIQ

k^o^T^lS^F^O

This medium is classltied

ll

DA FORM 4002, JUL 92
Replaces DA Form 4002,1 JUL 76 which is obsolete.

^^OSEcTTT^

HggewTBH

SECRET
U.S. Government Property
Protect it from unauthorized
disclosure in compliance with
applicable executive orders,
statutes, and regulations.



Substitute for
Prosecution Exhibit 13

17151

^i^j^^
/

4

PROSECUTION EXHIBIT/^for id«Acation
PAGE OFFERED: PAGE ADNpfrED
PAGE_OF_PAGES

EVIDENCE/PROPERTY TAG
For use of this form, see AR 195-5,
the proponent agency is DCS, G-3

MPR/CID CONTROL NUMBER

Q^?-fc:^-
II

ITEM NUMBER

i

OF

TIME

DATE

DZoS

I ^ Ju^lD

REMARKS

/Y\R.- AcirtiV^
Ly>^}^^

A,LcjAvCS
Cai^ip^x^i

l\f ihi^x k>i2i,r^\
pc»oeie
$-t.^pl

UNCLASSIFIED
U.S. Government Property
SF 710 (1-

w/

Substitution for
Prosecution Exhibit 14

17152

Prosecution Exhibit 15
has been entered into
the record as a CD/DVD
and will be maintained
with the original
Record of Trial

smcoum



mxEw_CH.o1._ mm.

swam E.
w>mm|owiw>omm

17154


^

For Official Use Only Law Enforcement Sensitive

0028-10-CID221-10117
0160-10-CID899-14463
12

1
3
O"
"O

CO
CD

il

as 0)
^^ g%

c
o> 13
.P _O)
OJ a> CO
*
•E
CO
to
D
O

Ii

o
o

o
CD

K
tf)
o
O

i

Q.
O)

c
43

O
Q.
0)

o

CO

o
o

0^

(fi

lu

ill iii
0)

Ul
_l

LL

8
(0
z 2
S

Q
LU
GO
tf)

b

c
m
Ho

£
3
Q.

E

i

o
u
c
o

«

= i

II
SP
c
c
o

Ii

E

0)

a
<
<

For Official Use Only Law Enforcement Sensitive

u
ro

I

"3
ro
in
ro

•a

8

a> c
c c
o •o
.c c

c

8 o
Q.
Q
Q-

m

3
O
TJ

m
z
.a>

3
CL

m

ManningB_00000285

c
o
H

H eo >

o

o

O

o

-t >

JC
*•»
0)
CO
O)
3

OC

CVJ

UJ Q m

LL IU

o
i xog gnf I

<

oo

S- i l l
|5 <
IP
i l u.oi

_i

CO
HI

u.

2

O o p

b
z

o

X <
m CO
X

cr

OJ
a

iS

I

c
c

JC
O)

Q.

a>
(U

ro
_3

£3

u>
Q

Q.

S

-D

-2
n

X

>

Q

x:

X

I
X

o

XI

I

t

53
o "(J
O) UJ
LU
.5
od o Q uj

c

o
o

u.

s=
^
c
o
5
0)

E

ro
O

O

Exhibit c2(g>

PROSECUTION hXMmiT U J(>r :6gfPAGKOFFER^iD:
PAG^AbivarTED:
PAGE
OF
PAGES

/5<2^
^

17155

9|:90:SI eo-90-£IOc

0028-10-CID221-10117
0160.10-CIO8M-14483

For Official Urn* Only Law Enforcement Sensitive

o
o
it

m

bz
z
z

2
Q.
O*

c

u
^
-a
> > 3
0 o Q

rm
1 5c

2
CO

a

g

O m r~i
Xd
TI
?q
Xo
>

o
m

CO

o a ui u. O

Q
>

ff^
0

31
rn &
O a

I* • o
M

o
3

For Official Use Only Law Enforcement Sensitive
r U I )
Mannlni
nlrggjpOOl10285

I'Aul III i I
.
i M
l'.\UL

i

r I'M ' t 4

Exhibit. W
L/nHt-aiinm / I ^ L - ^
m D:

17156

For Official Use O ^ y

Enforcement Sensitive

0028-10-CID221-10117
0160-10-CID899-14463
g
#

«D

3
CT
Ti

il
CO

CD

5
dl

ro (u

E%
O O)

"S tc-

O) C

2

0 J5
6 U
T o

is

12

0
C
Q)
O
CO

O

ro (/)

-"9- cr

95

in
O
O
ut

lo

ID

§^

il
p u- o

P

o

E
c
o

If

Ui

go

X
X
LU

<

W)

>

CD
UJ

CO

o
Ul

\il

UJ OC
UJ
(O >

UJ

>
>-1
z z

IU
_l

-1 M

4-*

o

O UJ
UJ w

o

W)

c

<

2

a
o
Q

SI
u.

0)
^
CO

Q:

&2

IfrJ l I

O)
3

o
QE:
3
CL

UJ

ManningB_00000273

)r.
0)
3~

OL

E
o
o

E

cc

8 o

CL
U)

m
O

<3
Q-

E
o

I I
U)
c
o

cz

g

8

s

o

o

o

<

ffi

O

s

For Official Use Only Law Enforcement Sensitive

Exhibit

-3

mxwEw_iMb.2 .

E/om >0


17158

rMOOOOC 86uiuue/\j

,:,j«ai#w#
y)-^
PROSECU
PAGE o r r
PAGE
Or

f';;;-J^ntHlcalion

;. .Cinu)r-irrTED:
rAGnb

2013-06-03 14:58:43

17159

rnOCiOOu atrtuijue^^

PROSECUTION EXHIBIT J ^ f o r i d e n ^ a t L
PAGE OFFERED:
PAGE ADMIT^D'
PAGE
OF
PAGES

2013-06-03 15:02:13

mxEw:PT.2
?Sam oEumwmuHfI_u>om


17161

8C:8C:tl [0-90-ElOC

•n
^'3

C)

o
:'i

("-•
"1

c

CO

r.

H

Ufi)

•s>

'

^l*^
o
3

M a n n i n a B '')0'

awe:

_u>mm EU I
w>mml1omlw>omm

17163

gbjiuuB^

PROSECUTION EXHIBIT ^Oo^fbr id ,
^GE ADMIl mcation
PAGE OFFERED:
PAGE
OF
PAGES

2013-06-03 14:41:17

. 17164

UNITED STATES OF AMERICA
STIPULATION OF
v. EXPECTED TESTIMONY

Manning, Bradley E. SGT Mary Amiatu
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall DATED: May 2013
Fort Myer, Virginia 22211

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if SGT Mary
Amiatu were present to testify during the merits and pre-sentencing phases of this court-martial, she
would testify substantially as follows. -

l. I am currently the 8-1 NCO for the 6th Engineer Battalion at Fort Richardson, Alaska. I have held
this position for two months. Previously, I was the Strength Accounting Clerk for U.S. Army Central
Command G-l at Camp Ari?an, Kuwait. I held that position from October of 201] until October of
2012. In that position, I helped account for personnel coming in and out of theater, moving from place to
place within theater, and changing duty status. I provided battle management update briefs and worked
with the Deployed Theater Accounting System (DTAS). I also worked with the Joint Asset Movement
Management System (JAMMS).

2. With regard to this particular investigation, I provided investigators from the Army Criminal
Investigation Command (CID) a print-out from JAMMS on PFC Bradley Manning. JAMMS is a system
that captures movement and location information about operating forces, govemment civil servants, and
government contractors through data collection points established in specified operational theaters. These
collection points are, for example, dining facilities, ports of debarkation, and fuel points. Operational
theaters include Kuwait, Afghanistan, and Iraq. As such, JAMMS would capture the dates on which
Manning scanned himself in and out of Department of Defense (DOD) facilities using his CAC card, such
as dining facilities (DFACs) and points of debarkation into and out of Iraq When
providing this report, I also signed and had notarized an attestation certi?cate (identified at BATES
Number 00412522) regarding the authenticity of the information.

3. As a fonner Strength Accounting_Clerk, I am familiar with AMMS reports. I have read them before.

I I, therefore, understand this JAMMS report I provided (identified at BATES Numbers 00412523 -

00412532) to show that the Service Member named ?Manning, Bradley?, whose last four social security
number digits are I came into and out of Iraq several times. For example, on page 9 of this
document, it shows that on 26 October 2010, PFC Manning signed into the DFAC on Camp Buehring in
Kuwait, but by 28 October 2010, was using the DFAC in Iraq. Page 8 shows Bradley Manning departed
Iraq on 22 January 2010 and then entered again, via Kuwait, on 11 February 2010. Gaps like this are
normal when a soldier leaves a deployed environment, such as for mid-tour leave. Page 8 further shows
that PFC Manning was using the FOB Hammer DFAC by I4 Febniary 2010. Lastly, Page 1 shows that
PFC Manning boarded an outbound flight from Iraq on 30 May 2010.

(ow/WK
AS .HURLEY

ANGEL M. ERGAARD THOM BRADLEY rs. MANNING
cpr, IA MAJ, JA PFC, USA
Assistant Trial Counsel Defense Counsel Accused

.
ation
. I .
PAGE



ATTESTATION CERTIFICATE

This document is intended to meet the requirements set forth in Military Rules of Evidence Rule
902(11), addressing certi?ed records of regularly conducted

I istrueregardingtheattaohed records, tothebestof
my knowledge and belief:
1. I am the custodian of these records. or I am an employee familiar with the manner and
prooessinwhichtheserecords are created and maintained. byvirtueofmy dutiesand
responsibilities;

2.
orfrom information transmitted by. people with knowledgeofthese matters:

3. lherecordswereltept inthecourseofregulany conducted businessactivity:
4. It was the regular pradioe of the business adivity to make the records; and

5. The records are a true, accurate, and complete copy of the original documents.

Listotattachedrecords:
+Jc.ic\l1' r\?TC\??MerOrganization
M5 cu cmw) Q1171: N1 gamma 910:? MN M2 003

Signature 1 Date W. om?,
I 3 53
Pririt-o'rType Name {Title 7' 1 Vi:

me/N /

The attached record consists of pages 1 files).

.20

ta Publ?

My commission expires on:

09. 86F EHL 10 use town A 2

A ?ll . 0
PROSECUTION 22. rm idengo?tion
Mannin9B_00412522 PAGE ADMITT D:

PAGE. OF PAGES








:5 55/
i
ms 003% CCFL

17166

on 3 on?;
uuouxauxu 65.3 E25?E?u o8~\Z\m .9_Ec?z


nE?u u?o up: .c3c? 65.2?:
. . 6 . .

aE?u U55 083:? 65cc?:
. . oi? . . GUNEU

qE?o u?o .os.E?E?u u?o 63cc935 xx?c. .os.E?z
. . oi? . .

?E?u 65.5?:
. . . .1. Jnm??u

?E?u o8~\m~\m xx?c. .955?:
. . . . .

?E?u u?o xxacs.
. - . . a

?E?u .tB_=z .uc_ccCEO

?E?u u?o oS~k~\m
.

aE?u u?o .ocEc?:
. . - 0.7.0 .

?E?u 93.0 .o5..E?z
. . sin .1. duW_E

nE?o xxasc. .m.3 .oc_cc?z
. . . 94 .J

?E?u u?o o8~\m~\m :35: .m.3 .asE?:
E22859 .. . . cuuz?

Kama: o8~\om\m 57.8.

. ..

soaul? cosnu? 22?. rsuzou .6 tan 3 .1333:

235090! 0:32 80383 anon coon 30? econ u. :oI_.On 8.2! 08:8



Von uu..ouo.. .nuo.p

.520 manteams. mZ2
>420 um: JGHUHIO I05

ManningB_00412523

17167

3 3 a























cwN_u_U

aE?u 920 cc:
iaqq?um cu?u

9:3 05.0 .C2_=z .953?:
aaqa?um cuNn_U

nE?u 93.0 So?im .ucEc?z
cm~Z_U

nEoU co: o8~\m\m .C8_=z .m.D >o.vo._m .uc_ccoZ
Juaaq?uu. cuuza

QEMU co: Sowsxm .m.3 .953?:
cmNz_U

nE?u u?o Sodom .952?:
aaqa?uq cu~_u_U

aE?u uamo .ucEc?z
aaqa?uu cuN?_u_U

9:8


._uEEo:_ nEnU uEaquuq auuza

u?o
aqaa?um. JHMNEU

aE?u u?aaq?uu QMMEU

nE?u uQm
aqqa?uu

aE?u .668? .955?:
cuN_u_U

?E?u u?o o8~\~2m
aqaa?um :uNu=U

aE?u o8~\m2m .as.E?z
icca?um cu~EU

aE?u .953?:
Ecca?um :u~Eu


CNNEU

u?o .ms.E?z
cwN_u_U

nE?u xx .955?:


n_E?u U

nE?u u?o
aada?um cugu

?E?u u?o o8~\8\m
?nau?um

aE?o u?o o8~\S\m .oc:E?z



ManningB_00412524

17168

on 3 000..
uuouxnnxu











aEnU Ucco an: ouowxomxv 2 xx .m.3 >o_um._m


U55 am: .m.3
:m~z_u

aEnU 05.0 on: >o_um._m .oc_ccoz
EEC

nEoU Uo_uu._m .mc_ccmz
:u~z_u

nEnU U55 am: 2 xx .mc_ccmz


nEmU cm: 2 xx >m_um._m .ac_..Eo_z


nrcou Ucu~n_u

nEmU U

nrcou cm: 2 .m.3 .mcEcoz
cmu=_u

cm: 2 >o_uEm .mc_ccoz


5822.. 9:5 uamo ES 2 xozu?m


._wEEm: 9:3 cm: 2 .oc_c.._nz


aenu u?o om: oHo~\m~\v 2 .m.3 >m_um._n
:u~z_u

nEmU cm: o8Qm~>. 2 .m 3 >w_oEn .oc_E_~z
|nu~z_u

nEmU cu: .m.3 >m_um._m .oc_c:mz
_uaad?uM

cm: oaomxomxv .m.3 >m_um.m .oc_c:mz
duw_u_U

asou U55 3: >m_uEo .mc_Eoz
:u~z_U

u?o co: Ease .oc_.Emz


aEcU cm: osdmw? >o_um..m
sauna

aEmU U55 cm: Sodom? .uc_ccmz
GUNEU

nEmU 035 um: Sodim .uc_ccmz
isa?um auuzu

Essa: co: o8~\2m >o_no._m .oc_S_nz


Seen: 9:8 3.: >o_no._m .oc_cc~z



Manning 2525

17169

on v0 9 Cult

2:22 xu :25:

EEC

555:: 9:8 co:


9:8 Uo_vo._m
J_u~z_u

9:8 U55 co: >u_vo._m .mc_ccoz
lquuau

9:8 cm: ouo?m? .?uEm
:u~n_u

Been: 9:8 am: Even
EEG

386:: 2:8 an:
cuuau

Etmu Uo_uo._m .oc_c:oz
aunau

2:8 on: o?owk? .3_oEm
EEG

seem: 9:8 oi: as: Sodtc >u_uEm
c.k:C

2:8 co: .m.3


2:8 935 S: .m.3 .?uEm
JHNEU

Seen: 9:8 855 8: Ease
aaqa?uu auuza

been: 9:8 855 um: oao?m? >o_uo._m
aaqa?um. quna?v

been: 9:8 835 am: o8~\oQ? >o_uEm


3582.. 3:8 S: So?oiv xx-?x >u_uEm
?aaq?uu :uNz_U

seen: 9:8 uJ_u~z_u

ass?: 9:8 855 8: Euem


358:: 9:8 cu: Even


9:8 9:0 um: So?viv Even
EEG

ass?: 9:8 855 um: Somx?? 2 >o_uSm
:u~a_u

Bees: 9:8 856 cu: o8~\mQv Even


been: 9:8 Bio um: oSQm?.. 2 >o_u2m


Bees: 9:8 u?o cm: >o_uEm



ManningB_0O412526

17170



























3 no COIL

uuouxnin Etna

























adaq?um duN=_U

.oEEo: 3: o8~\o~\m >o_u2m .uc_.Eoz
zuaaq?uq cu~_u_U

.aEEo: ..E8 u?o 3: o3~\o~\m 538. >o_u2m .9._.Eoz
auqq?um

2:8 co: o8~\o~\m 2 xxacc. >m_u2m .oc=Emz


aEmu co: >o_um._m .uc_cca2
Eaquum cmuzu

.oEEo: 9:8 u?o 3: xx-x? >o_uSm .9__Eaz
ddaa?um c?au

nemu U55 3: 53cc. >o_uEm .953?:
l?qaa?uq cmN_u_U

93.0 cm: .?uEm .9__.Eoz
cu~a_u

aEmu u?o am: o8~\m~\m .oc_.Eoz
aqaa?um. cuNa_U

u?o am: o8~\m~\m .m.o >u_uEm .9._.Eoz
?qaquum. quuau

EEG 9:0 as: >o_uo._m .9.=Eoz
?qaq?um. :u~a_u

9:3 u?o ca: xxacc. $_u2m .aEEnz
Juunau

9:8 055 cm: o8~\o~\m . . xx-x? .6_u8m .9._.Enz


E8 u?o um: o8~\o~\m xx-x? .m.3 .9__.Eoz


nemo 9:5 3: 53:3. >u_uEm
_mcca.?uM. .a~u_u

.oEEmz aemu u?o co: o8~\R\m .3333. .$_uSm .9._.Eoz


aemu am: So~\m~\m xx-x? >o_u8m ?zccoz
aqaa?um. :u~n_u

._oEEo: 9:8 9:0 as: oS~B~\m Euem as?oz
_uc:Q..uud. :u~n_U

.oEEo: aE8 93.0 on: oS~\m~\m 5339 .6_uSm
. cuuna

aEmu u?o co: o8~\m~\m 53cc. >m_uEm .9.Ecoz


aE8 u?o am: o8~\m~\m >m_u2m .oE.Eoz


._uEEm: aEmU Uw_uSm


._oEEm: 9:00 Um_um._m .ac_ccm2


neau u?o am: >m_uSm .oc__Em_z



ManningB_00412527

17171

Juadq?um.
?E?u U55 .m.3
Sqqa?um.
aE?u u?o So?oim 2 E352
_udqa..auM
aE?u oS~\oQm
aaua?um.
.c?s_z
1
u?o .cB=_z

u
aE?u u?o Somhim
?qaa?um
USE So?mim
?aqa?uu
aE?u USE oS~\mQm .m.3

u_uE.a?um.
oS~\mQm
aaqa?um
o8~?Qm
Scca?um
93.0 .m.3
. _wcca.?.um.
So?mdm .m.3
_uccow._u
USE o8~\mQm

Somaim
_ucca..a.uQ
u?o o8~\3\m

?E?u uamo cm: Sowkim 2
_uqa.a.?um.
?E?u u?o Sowkim
Scca?um.
?E?u 93.0 Somkim
_u::cEum
?E?o u?o
auad?um.
aE?u u?o o?omaim
Saaq?um.
qE?u uamo So?a!?

3 3 0 can;

auouxmuxu



.uc_:cnz
ma?a

.oc_:cnz
:uNn_u

>o_uo._m .oc_ccnz


.mc_ccuz
auun?

.ac_ccoz
:u~n_u

>m_n2m .oc_ccnz





.uc_ccmz


>m_uu._m .a:_ccoz


.m.2 .o:_:coz


.m.3
EEC

.oc_cc?z
c?nEU

.uc_ccnE
.S~n_u

.m.D >o_uEm .o:_ccmz
c%:C

.m.3
gamma

.m.3
cu~Eu

.m.3 .oc_ccmz
cm~Eu

.uc_cc?z


.ucEcmz


.uc_cc?z
:u~Eu

.m.3 .o:Ecmz


.oc_cc?z




ManningB_00412528

17172

3 .8 0001

uuo?nuxu Flat































































. . . 0 . .

9:8 u?o co: Even .osccaz
.. . .

Been: 9:8 U55 um: o8~\mQ~ r3__.z 3.35 .asE:..z


._oEEa: 9:5 USE um: .?uEm .ac_ccoz
cunzC

been: 9:8 U55 8.: Even .a:_ccoz
. . o.6 . . nag

acau u?o co: oS~\oQ~ 53cc. Even .9__ccoz
cw?_u

been: u?o 8: xxixx Enos .o:_ccoz


seem: 92.0 u?o um: Even


been: 9:8 u?o um: 53cc. .$_uEm .ac.cSz
.

9:8 u?o cm: xx?o. Even .ac_ccoz
.. . cuumsu

been: 9:8 USE co: oS~\wQ~ 53cc. .$_uEm .9__ccoz
5:26

9:8 u?o So?im .$.u8m .oc_ccmz
.. . . AGNEU

2:8 u?o am: o8~\Qm vice.


aenu USE um: o8~\Qm .?n9_m .oc_cc~_z


been: 9:8 935 am: o8~\Qm Euem .oc_ccmz


950 USE um: o8~\v\m >m_uo._m .oc_ccaz


Been: 9.30 U55 am: o8~\m\m Even .u:_c:mz


been: 95.0 U55 23 o3~\m\m xx-.sc. .$_u8m
cm~z_u

been: 9:3 0,35 ca: o8~\o\m Even .uc_cc~z
. . - 4 .

been: 9.50 ucu~a_u

88:5: 9:8 um: oS~\o\m 5.35


been: 9:8 U55 um: o8~\m\m .ac_ccmz
c.:zC

been: 9:8 USE cm: o8~\o\m >o_uEm .oc_ccmz
CQNEU

Loses: asau u?o ES o8~\m\m Even _oc_ccmz



ManningB_00412529

17173

3 32.
2:23 xn ?33









































































:u~u_u

Pstauo od: use co: Even
UCSOQHJO .Eatmaoo Em? ?23. con? :33. 5 2 53cc. .?u2m


odz .23 no.2 ca: .m.3 53cc. >u_u9_m
- . 4 . .

coxtum Pa: am: >o_uEm
- . . .

3552.. 9:8 om:
C?hzru

9:8 an: xxasc. >o_uo._m
C?hzru

9:8 u?o om: .m.a xx-x? Even


._oEEm: QENU co: oaomxoim ESE: .m.D .m.3 >o_un._m .mc_cco_z
. . . . 4 . .

358:: 9:8 u?o an: >o_nEm


._wF.Eo: 9:8 uu_uo._m
. . 4 . .

9:8 ufo cm: xxacc. Even
CMNEU

been: 9:8 an: .?uem
. . . . . .a~a_u

9:8 855 cu: 2 E35: xx-x? >u_uEm


been: 9:8 um: 53cc.
cuuau

been: 9:8 name an: Even


358?: 9:8 855 on: .6_oEm


858:: 9:8 u?o um: xx?5682.. 9:8 856 am: >o_u2m
. . . . . .

besnx 9:8 ofo cm: >o_uo._m


been: 9:8 855 cu: 2 :85: 53:3. >o_um._m
. . . . .

been: 9:8 U55 cw: xx?c.
- .

seen: 9:8 855 cm: 2 E252 >o_ua._m .9__E_nz


9:8 u?o ca: xx-x? Even



ManningB_0O412530

17174







?Sn \n.n\N





















. cuuzu

uzaxmam 9:0 .323. moo~\3\8 >o_uo._m .m:__Euz
cuuzu

0:5 gaze. .m.a 585 .9._ccnz
JHNEU

0:5 u?o .323. moo~\Z\3 zosem .mc_..Eoz
cunau

3:5 ozaxmpm .323. .?u2m
556

CE: oz?xmam H523. >o_un._m .uc_S.oz
auuzu

0:3 wz?zmam ?23. Ewen .9__ccoz
cuM:_U

3:5 oz?zmam uamo H323. moo~\2\S >o_um._m .mc_ccmZ
:u~z_u

CE: ozazmam u_._u1Nn_U

OE: ozvimam U55 gaze. Ease .uc_ccoz
Jauzu

OE: ozaxmam u?o .323. >o=.Em .mc_ccuz
auuzu

CE: uzazmam 5.25 9:9 .323. >o_no._m .uc_ccnZ
Jauau

0:3 ozazmnm u?o 2023. moo~\v~\8 Eusm _mc_ccnz
q?au

OE: ozaxmam .25 USS .323. >w_uo._m .oc_ccoZ
a.uN:.U

0:5 ozaxmsm $23. 538. .oc_ccoz


0:5 ozaxmam .25 USS moo~\m~\8 xx-.ce. Euem .oc_.Eoz
cuuzu

CE: ozaxmam u?o .533. moo~\o~\S 53cc. Eusm
auuzu

o._mx ooa< on: moo~\w~\8 .6_ua._m
lquuau

35% .638 U56 am: moo~\w~\S >o_uSm .oc_.Emz


ooa< cm: moo~\m~\S 53cc. .$_u8m .oc_ccmz
iccq?uu.

2.833. Ea: u?a co: >o_uo._m .ac_.Emz
_uc:a?umL quuzu

od: .28 no.2 as: Euem .ac_.Eaz
Eccq?um. JENEU

3< .2so._ u?o ca: >u_uo._m .acEcnz
aquq?um GHNEU

.258 USE ca: >u_um._m .oc__Enz



ManningB_OO412531

17175

on 3 3
uuouxmuxu ?33

0:3 .25 via .323. Even .oc_ccuz
3:3 uzzxmam azao .523. moo?mio? .oc_ccoz
0:3 uzzxmom Q25 U35 2253. Sodmto? >o_u2m .oc_ccmz
6:3 uzzxmom USE gaze. moodvio? .$_uem .oc_ccaz



ManningB_00412532

17176

UNITED STATES OF AMERICA
STIPULATION OF
EXPECTED TESTIMONY

V.

Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211

SA Calder Robertson
DATED: "5 June 2013

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if Special
Agent Calder Robertson were present to testify during the merits and pre-sentencing phases of
this court martial, he would testify substantially as follows:
1. I am a Special Agent (SA) for the Computer Crime Investigative Unit (CCIU) of the U.S.
Army Criminal Investigation Command (CID). I have been with CCIU since March 2006. In
February 2010,1 became the Special Agent-in-Charge (SAC) of the Europe Branch Office of
CCIU. In my current capacity, I am responsible for conducting and overseeing the conduct of
large-scale complex criminal investigations associated with high technology, including insider
threat and computer intrusions into the critical information architecture of the U.S. Army.
Among other things, this work includes: conducting interviews, executing search warrants,
processing crime scenes, collecting and handling physical evidence, obtaining forensic images of
digital evidence, conducting forensic examinations, and preparing comprehensive reports for
supported officials and prosecutors. I have testified several times injudicial proceedings.
Because I am in charge of the Europe Branch Office of CCIU, I have responsibility for
investigating cyber crime incidents in Europe and Africa, as well as providing rapid response to
Southwest Asia (Iraq and Afghanistan). Additionally, I was recently selected to establish the
Pacific Branch Office of CCIU, with responsibility for investigating U.S. Army cyber crime
incidents in the Pacific area of operations. From April 1998 to November 2003,1 held a variety
of other positions within CID and was responsible for investigating criminal offenses with an
Army nexus.
2. I received a B S. in Psychology in 2006 and have been a Certified Computer Crime
Investigator through the Defense Cyber Crime Center (DCS) since 2007. In 2010,1 was awarded
the U.S. Army Achievement Medal for Distinguished Civilian Service as a civilian Special
Agent for Army CID. I have received numerous other awards in my civilian and military
capacities.
3. I have received extensive training from the Defense Cyber Investigations Training Academy
(DCITA), which is part of DC3. Through DCITA, I have attended the following courses
relevant to my current work: Live Network Investigations (2009), Mobile Electronics Forensics
Training (2008), Advanced Log Analysis (2008), Forensics and Intrusions in a Windows
Environment (2007), Macintosh Forensic Examinations (2007), Wireless Technology (2007),
Windows Forensic Examinations with EnCase (2007), Introduction to Networks and Computer
Hardware (2006), and Introduction to Computer Search and Seizure (1999). Additionally, I
attended Computer Forensics II with EnCase in 2009, a course put on by Guidance Software, the

' ySX

1

PROSECUTION EXHIBIT
for idepfification
PAGE OFFERED:
PAGE ADMITTED:
PAGE
OF
PAGES

17177

makers ofEnCase. In 2011,lalso attended DCITA^sLarge Data Set Acquisition course as well
as the Army Criminal Investigation Laboratory^sEvidence Management Certification Course.
These courses focused on the collection and handling ofphysical and digital evidence.
^. On 27 May 2010,Ibecame involved with the investigation ofPFC Bradley Manning after
receiving preliminary information on misconduct that required downrange investigation. As the
SACofthe Europe Branch Office ofCCIU and the closest CCIU agent to Iraq,Iwas tasked by
CCIU Headquarters, then at Fort Belvoir,Virginia, to provide support to the Camp Liberty CID
office. Itraveled to Camp Liberty in Baghdad and stayed there for three days at the end ofMay
2010. Istayed at Camp Liberty because, at that time, it was too dangerous to travel to FOB
Hammer. Additionally,the evidence collection team already at the crime scene on FOB
Hammer had sufficient personnel to complete their mission such that my physical presence was
unnecessary. My role in the investigation was to assess and provide expert assistance with the
collection, preservation, and imaging of computer evidence as well as to perform preliminary
analysis ofthe digital evidence. Apreliminary forensic examination isabrief review taking no
more thanacoupleofhours,whereasaftill forensic examination may take anywhere from an
entire day to several weeks, depending on the amount ofrecoverable information. Iconducted
preliminary forensic examinations onanumberofitems of evidence seized in this case.
Evidence collected from FOB Hammer and delivered to me at Camp Liberty included: two
Supply Annex computers,arewriteableCD,an Apple brand personal laptop, an external hard
disk drive, and three Sensitive Compartmented InformationFacility(SCIF) computers.
^. Ifollow several general procedures when handling evidence. Ireview the custody document
and always ensure the description ofthe evidence matches the evidence attached. Icheck,for
example, that recorded serial numbers, markings for identification, and condition description
match the associated evidence. lensure that the necessary information, such as date and time,
are properly and accurately recorded. Lastly,Imaintain secure custody ofthe evidence prior to
transferring it to another individual. In addition to following these procedures,when transferring
to or receiving evidence from another person,Iam also sure to properly sign, date, and note the
reason forthe transfer.
6. With regard to each item ofphysicalevidencelreceived in this case,Ifollowed these same
procedures. When receiving whole computers,IaIso checked to ensure they did not contain any
suspicioushardwareorremovable data storage devices such as SD cards and thumb drives. Prior
to powering on or accessing the contents of any device,Iimaged each item ofphysical evidence
Ireceived in order to preserve the contents ofthe data on the item. Aforensic image of an item
of digital media is an exact, bitforbit copy ofthe data on the digital media. limaged these
items ofevidence so that the data on the device can be forensically examined without
manipulating the data contained on the original evidence. This is standard practice by digital
forensic examiners. The software forensic examiners use to image the digital evidence has built
in procedures to verify that the item has been successfully duplicated. For example, the program
will note the MD^ Hash or Secure Hash Algorithml(SHAl)hash value of an item of digital
evidence before imaging(acquisition hash value)and after imaging the item(verification hash
value). Ifthe two hash values match, the item has been successfully duplicated bit-for-bit. The
hash value is determined by mathematical algorithm and is displayed asanumber^letter identifier
unique to every item ofelectronically stored information. It is similartoadigital fingerprint,

17178

although more unique. When the hash value is generated, the entire hard drive will haveahash
value, as well as each individual file on the hard drive. Ifthere is any alteration to the hard drive
or to any file on the hard drive, the acquisition and verification hash values will not match. The
alteration can beasmall as addingasingle space intoatext document or savingafileina
different format (i.e. savinga^^.doc^^asa^^.pdf^). In this case,Iused EnCase forensic software
to complete this imaging process. EnCase forensic sofl^are is widely used by digital forensic
examiners. Aslstatedearlier,lhave received training on EnCase forensic software and have
used it in my other cases involving digital forensic examinations. lencountered no errors while
conducting the imaging ofthe evidence at issue in this case.
7. Between 30 May 2010andl.Iune2010,Iprocessed the following itemsofphysical evidence:
a. IprocessedaHitachi brand laptop computer,with the serial number
070817DP0C10DSG2JlDP,which was collected from the SupplyOfficeor Annex, 2ndBrigade
CombatTeam,10th Mountain Division, FOB Hammer, Iraq. This computer was marked
^^UNCLASSIFIED^^ and was seized because PFC Manning had temporarily worked in the Supply
Office in May 2010and used this computer. Ireceived this evidence from SA Thomas Smith. I
followed proper evidence handling procedures to receive and handle this evidence, and made
sure the evidence matched its noted description before beginning work. Upon taking possession,
lunsealed this computer and obtained an EnCase forensic image ofthe hard drive contained
within this computer. The resulting forensic image, with the SHAI hash value of
309df^9f068ft^a2e81aae03dla93d471cde90bf0, was verified to bean exact, bitforbitcopy of
the hard drive throughacomparison ofthe acquisition and verification hash values. Ididnot
examine this image further. IreviewedDN073-10in preparation forthis case. Thisitem^s
forensic image is located on I t e m l o f D N 073 10. Iknowthisbecauselcollectedltemlas
evidence.
b. ^processedaSeagate brand computer hard drive, with the serial number CN0MN922 21232 793 002L, which wascollected from the SupplyOffice^Annex,2ndBrigade
CombatTeam,10thMountain Division, FOB Hammer, Iraq. This computer was connected to
the SIPRNET and the hard drive was seized because PFC Manning had temporarily worked in
the Supply Office in May 2010and used this computer. Ireceived this evidence from SA Smith.
Ifi;^llowed proper evidence handling procedures to receive and handle this evidence, anLl made
sure the evidence matched its noted description before beginning work. Upon taking possession,
lunsealed this hard drive and obtained an EnCase fc^rensic image ofthe hard drive. The
resulting forensic image,with the SHAI hash value of cf6d703f0023773e
b9e30eeb318660ac0dl8f40^,was verified to be an exact, bit-for-bit copy ofthe hard drive
throughacomparison ofthe acquisition and verification hash values. Ididnot examine this
image fiirther. IreviewedDN073-10in preparation for this case. This item^sforensic image is
located on Item2ofDN 073 10. IknowthisbecauseIcollectedItem2as evidence.
c. Iprocessedarewriteable compact disc(CD-RW), with the serial number
LD623M^0^18^038B16, which wascollected from thequartersofPFCManning,Room^C93,
LSA Dragon, FOB Hammer, Iraq. ACDRWis differentfromacommerciallyproducedCD
with content already loaded onto it (i.e. fromamusic store), becauseaCDRW allows the userto
v^ite content to the CD,along with edit or delete information on the CD. ThisCDRWhada

17179

^^SECRET^stickeronitandwaslabeled^^I2.Iul07C^ENGAGEMENT^ONE30GC^^ This
CD-RWwas collected with three Arabic language CDs inamultidisc case. Ireceived this
evidence from SA Smith. Ifollowed proper evidence handling procedures to receive and handle
this evidence, and made sure the evidence matched its noted description before beginning work.
Upon taking possession,Iunsealed the multidisc case and obtained an EnCase forensic image of
the aforementioned CDRW. The resulting forensic image,with the MD^ hash valueof
^c993ee62Ib036^82bael3^3f844322f,wasverifiedto bean exact, bitforbitcopyoftheCD
RWthroughacomparison ofthe acquisition and verification hash values. After imaging this
CDRW,Iconductedapreliminary forensic examination ofthis image. TheCDRWcontained
two files with identical names. One file contained no data and the other file,^^I2 Jul 07 C^
ENGAGEMENT ^ONE 30 GC,^^containedavideo. The video appeared to have been burned to
the disc on 27April20I0using Macintosh disc creation software. IreviewedDN073^I0in
preparation for this case. This item^sf^rensic image is located on Item2ofDN 073 10. Iknow
this becauseIcoIlectedItem2as evidence.
d. Iprocessed an Apple brand laptop computer,with the serial number W8939A^066E,
which was collected from the quarters ofPFC Manning, Room 4C93,LSA Dragon, FOB
Hammer, Iraq. Ireceived this evidence from SA Smith. Ifollowed proper evidence handling
procedures to receive and handle this evidence, and made sure the evidence matched its noted
description before beginning work. Upon taking possession,Iunsealed the Macintosh computer,
removedaFu^itsu brand hard drive from the laptop, and obtained an EnCase forensic image of
the hard drive. The serial number ofthe hard drive was ^9^DT9829WPY. The resulting
forensic image ofthe hard drivelobtained from this computer, with the SHAI hash value of
3cfl07db8b386^a^e3ebfce^00baelda9691ft^^9, was verified to bean exact, bitforbitcopy of
the hard drive throughacomparison ofthe acquisition and verification hash values. Thereafter,!
conductedapreliminary forensic examination ofthis image. Idetermined that the hard drive had
aMacintosh operating system installed and hadauser account resembling PFC Manning^sname,
althoughldidnotnotethemachine^susemameinmyAgent^sInvestigationReport(AIR). A
review ofthe device logs contained on the hard drive revealed some form ofoptical disc (i.e.
CD-RW drive)activity occurred, like deleting or burning CDRWs, on or around 27April 2010.
lalso reviewed the ^^user^^filesassociated with the account resembling PFC Manning^sname and
located several files containing text that was specifically referenced in the chat logs received by
U.S.Army CID during the initial phases ofthe investigation, thoughldid not specifically note
which text was referenced in the chat logs in my AIR. Ireviewed DN 073 lOin preparation for
this case. This item^sforensie image is located on I t e m l o f D N 073-10. Iknow this becausel
collected Itemlas evidence.
e. !processedaSeagate brand external hard disk drive (HDD),with the serial number
2GEWJ^J,which was collected from the quarters ofPFC Manning, Room 4C93,LSA Dragon,
FOB Hammer, Iraq. Ireceived this evidence from SA Smith. Ifollowed proper evidence
handling procedures to receive and handle this evidence, and made sure the evidence matched its
noted description before beginning work. Upon taking possession,Iunsealed the external HDD
case and ftirther removed the internal HDD,also Seagate brand(serialnumber9VSlS2T^),
becauseldid not haveapower adapter that could safely and reliably power the Seagate brand
external HDD. Ithen obtained an Encase forensic image ofthe internal Seagate HDD with the
SHAI hash valueofl^ll83^63c^b^8^1a811^627bf^le8d9e7^abb^8Theresultingforensic
4

17180

image was verified to be an exact, bitforbit copy ofthe Seagate HDD throughacomparison of
the acquisition and verification hash values. After imaging the Seagate HDD,Iconducteda
preliminary forensic examination ofthis image. Ifoundafile containing the contact information
ofamemberoftheWikiLeaksteam,Mr.JulianAssange. This contact information appeared to
have been produced and released by the WikiLeaks team and did not appear to be ofapersonal
nature. Ireviewed DN 073 lOin preparation forthis case. This item^sforensic image is located
on I t e m l o f D N 073-10. Iknow this becauselcollected Itemlas evidence.
f Iprocessed an Alienware brand laptop computer,with the serial number
N^^900TA6D0066I, which was collected from the Sensitive Compartmented Information
Facility (SCIF) ofthe 2nd Brigade CombatTeam,10th Mountain Division, FOB Hammer, Iraq.
This computerwas connected to the SIPRNET and the hard drive was seized because PFC
Manning had worked in the SCIF in November 2009 to May 2010and used this computer.!
received this evidence from SA Smith. Ifollowed proper evidence handling procedures to
receive and handle this evidence, and made sure the evidence matched its noted description
before beginning work. Upon taking possession,IunseaIed the Alienware laptop computer,
removed the Seagate brand hard drive from the laptop, and obtained an EnCase fc^rensic image of
the hard drive. The serial number ofthe hard drive was 3MH036M1. The resulting forensic
image ofthe hard drivelobtained from this computer,with the SHAI hash value of
C7^00fbed0b4db68a^82a^8^eeaa3^abla62cd64, was verified to be an exact, bit for bit copy of
the hard drive throughacomparison ofthe acquisition and verification hash values. Thereafter,!
conductedapreliminary forensic examination ofthis image. Idetermined that PFC Manning
hadauser account on this laptop computer. Ifound several items ofinterest to this investigation,
including copies ofthe Apache video made publically available by WikiLeaks and called
^^CollateralMurder.^^ lalso found an archive file that contained approximatelyll,000 sensitive
and classified documents, downloaded in HyperText Markup Language (HTML)format, though
Ididnot note the exact number. Ireviewed DN 073 lOin preparation forthis case. Thisitem^s
forensic image is located on Item2ofDN 073 10. Iknow this becauselcollected Item2as
evidence.
g. IprocessedaDell brand laptop computer,with the serial number HLVJ(^FI,which
was collected from the Sensitive Compartmented InformationFacility (SCIF) ofthe 2nd Brigade
CombatTeam, 10th Mountain Division, FOB Hammer, Iraq. This computer was connected to
the SIPRNET and the hard drive was seized because PFC Manning had worked in the SCIF in
November 2009 to May 2010and used this computer.Ireceived this evidence from SA Smith.
Ifollowed proper evidence handling procedures to receive and handle this evidence, and made
sure the evidence matched its noted description before beginning work. Upon taking possession,
lunsealed the Dell laptop computer, removed an unknown brand hard drive from the laptop, and
obtained an EnCase forensic imageofthe hard drive. The serial number ofthe hard drive was
^MHOHWI^N. The resulting forensic image ofthe hard drivelobtained from this computer,
withtheSHAl hashvalueofc3^73c3dfldI31e0022f^c^6bfc^6087e9d^l^0f,wasverifiedtobe
an exact, bit-for-bit copy ofthe hard drive throughacomparison ofthe acquisition and
verification hash values. Thereafter,Iconductedapreliminary forensic examination ofthis
image. Idetermined that PFC Manning hadauser account on this laptop computer. Ireviewed
DN 073-lOin preparation for this case. This item^sforensic image is located on Item2ofDN
073 10. Iknow this becauselcollected Item2as evidence.

17181

h. IprocessedaDell brand laptop computer,with the serial number 93H^(^D1,which
was collected from the Sensitive Compartmented InformationFacilify (SCIF) ofthe 2nd Brigade
CombatTeam,10th Mountain Division, FOB Hammer, Iraq. This NIPRNET laptop had been
located near the work area ofPFC Manning. Ireceived this evidence from SA Smith. Ifollowed
proper evidence handling procedures to receive and handle this evidence, and made sure the
evidence matched its noted description before beginning work. Upon taking possession,!
unsealed the Dell laptop computer, removed an unknown brand hard drive from the laptop, and
obtained an EnCase forensic image ofthe hard drive. The serial number ofthe hard drive was
^MH0TB78. The resulting forensic image ofthe hard drivelobtained from this computer, with
the SHAI hash Valueofe2b49bd3ed0e2f^d798ab4^febaac3bl^d0070be,wasverifiedto bean
exact, bitforbit copy ofthe hard drive throughacomparison ofthe acquisition and verification
hash values. Ididnot examine this image fiirther. IreviewedDN 073 lOin preparation for this
case. This item^sforensic image is located on I t e m l o f D N 073 10. Iknow this becausel
collected Itemlas evidence.
8. As!statedearlier,Iused the EnCase forensic software to obtain the images of each item of
evidencelprocessed. In this case,Iattached each device(except the CDRW) toawrite
blocker, and then aftached the writeblocker to my laptop computer,which had the EnCase
forensic software loaded. Av^ite-blockerisadevice that allows you to acquire information on
an item ofdigital media without accidentally damaging or altering the contents ofthe original
item of digital media. In short, the write-blocker ensures that noneofthe original data on the
item ofevidence is manipulated in any way. Ididnot use the writeblocker when processing the
CRRW,as that device was not at risk of alteration. Computers do not alter data on CDRWs
without specific instructions to do so. Aslneither intended nor actually issued such instructions,
there was no need to useawrite-blocker with regards to the CD-RW. After securing the v^ite
blocker as appropriate,!then used EnCase to createaforensic image of each item. Aslstated
earlier,EnCase creates an acquisition hash value that is later compared to the verification hash
value once the image has been created. Isaved the forensic images of each devicelprocessed
onto sterile hard drives. Ilater transferred these forensic images to the hard drives recorded as
ItemsIand2onDN073 10. The forensic image is not altered by being transferred between
storage devices. When you open the forensic image in EnCase, EnCase itselfverifies that the
forensic image isatrue copy.
9. I t e m l o f D N 073 10, serial number 9VS2^G^M,isaSeagate brand hard disk drive
containing the individual forensic images ofthe devices listed above that were initially
determinedtobe^^UNCLASSIFIEDBItem2ofDN073 10,serialnumber^VGI826C,isa
Seagate brand hard disk drive containing the individual forensic images ofthe devices listed
above that were initially determined to be classified ^^SECRET.^^ On^June2010,IcoIIected
Itemsland2as evidence becauselhad previously transferred the forensic images ofthe various
deviceslprocessed to these two hard disk drives. Icollected this evidence at the CID office on
Camp Liberty. Idid this to consolidate the evidencelprocessed for ease ofreview by
subsequent forensic examiners. This process is consistent with best computer forensic practices.
In the forensic community,it is common for investigators to consolidate the forensic images of
multiple devices on one hard drive and then collect the resulting hard drive as evidence. Afterl
collected Itemsland2asevidence,Itransferred custody ofthis evidence to SA Jeremy Drews.

17182

10. During the above forensic examinations,Irecorded my notes, including descriptions ofthe
evidence and their associated hash values on an AIR, dated^June 2010, and marked for this
courtmartial with bates numbers: 0002167^ 00021683. This AIR accompanied the evidencel
transferred to SA Drews.
11. Prosecution Exhibitllfor Identification is the Seagate brand hard disk drive with serial
number9VS2^G^M ( I t e m l o f D N 073 10). ProsecutionExhibit 12 for Identificationis the
Seagate brandhard disk drive with serialnumber^VG1826C(Item2ofDN 073 10).

JEAN

MORROW

:PT, J A

Assistant Trial Counsel

.^U,THOMAS F. HURLEY
MAJ, JA
Defense Counsel

ING
PFC, USA
Accused

17183

You can currently contact our investigations editor directly in Iceland -1-354 862
3481 ; 24 hour service; ask for "Julian Assange".

i)"^
ManningB_00125284

PROSECUTION EXHIBIT 2 4 for W6ntificat:on
PAGE OFFERED:
TAGE ADfVfiTTED:
PAGE
OF
PAGES

17184

C>
UJ
CO

(L

2,
^

C
^

o
D Q

0)
CO

> >

03

•D

u
z
3

Q

PROSECUTION EXHIBIT 25"for KWntid%%on
PAGE OFFERED:
PAGE ADMrFTED:
PAGE
OF PAGES




co_m:_o:oo

E0:
mco:m_o_> ommao
om_mn_O .5
om_mn_o .6 co_E_.5o






m

17186

o

UJ
CO
d

o
o
LU

0)
C

CO . .

Q)

Q

ol
* ia B ^
C



0

(/)

1.^

igf §

C/)

M_ CD

qj o (/)

o o

i i ^1

2g

B § E .2

si

4—

=

O



^

CD 03 CD

IS DL LL Z
I

I

I

I

3

O

17187

O .2
3 ro

O E
tf)
Q)

g

_c

62

g Isl
^

O

(/) CU

^

I, l i i j i
o I- _j z y 2 u
. I l l

I .9

I

I




m..m.Eo_q_Q .
wcm_oE_on_ .

.
pooz .
m_m_o_tO
Bo?mzcoo .
mmc?mo .5 EmE_.._m.amn_ .
.
.
m9m._

mEm>m_ .

mmE.:. UCM m3mQ







mxomtmm
wco:moo._
EmEq_:Um_ new mcoqmm>>
Qsomw I
.
..
-
.









m_mgEm_>_

5.90 I
m_mgE:z _m_oom

.E_m .6 8:8
mmEmZ ..

_m.cow_mn_ .









co:mE_ouE_ _mo_E0



mm_oEm>



EmEn__:_um_

mccm?mo I







17192

tf)

•2
(TJ

S2
O

2

u
z

3 Q

z

3 O

%3
<

xmi
.iillil

cr LJJ CI O CL h. . o . . .

B ^

(/) 0

•Io o
ro
<

X

17193

^

(TJ
^
^

^

UJ
^

C^
C^

^

^

c^
z
3 ^

E^

^

^

0

^

CO
0

^

^

^

^

^
^

^

^

3
^

I

^

^

03

^

0
^

^

^ ^ ^ ^ ^

0 Z C ^
1

0

^^5cn

^ ^ ^ ^
03 0

0

I ^

I

I

I

I

17194

(f>
^

-1

O

z

^s
^
0

3

CD
^

0
^
C ^ ^ 0

c^ — ^

m

^

^

^ ^ ^ u ^
^

^

^

^

^

^

^

^

^

^
^

g i

(/)

c

0

0

#o
C

"D

ii
I

I

O







17196

UNITED STATES OF AMERICA
STIPULATION OF
EXPECTED TESTIMONY
Manning, Bradley E.
PFC, U.S. Army,
HHC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall
Fort Myer, Virginia 22211

SA Antonio Edwards

DATED: 3 June 2013

It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if Special Agent (SA)
Antonio Edwards were present to testify during the merits and pre-sentencing phases of this court-martial,
he would testify substantially as follows.
1. Since March of 2012,1 have been employed as a Special Agent ("SA") of Homeland Security
Investigations ("HSI"), Department of Homeland Security ("DHS") in the Atlanta Field Office, empowered
by law to investigate and to make arrests for offenses involving the unlawful export of goods and
technology to destinations outside the United States. Prior to working for HSI, fi-om March 2008 to March
2012,1 was employed as an SA with the United States Army Criminal Investigation Command
("USACIDC"), Computer Crime Investigative Unit ("CCIU") at Fort Belvoir, Virginia. In this capacity, I
was responsible for the investigation of violations pertaining to computer intrusions and to other types of
malicious computer activity directed against the U.S. Army (18 U.S.C. § 1030). As a USACIDC SA, 1 was
also authorized to investigate crimes involving all violations of the Uniform Code of Military Justice and
other applicable federal and state laws where there is a U.S. Army or Department of Defense (DoD)
interest. I have participated in and conducted investigations of violations of United States laws and
regulations pertaining to computer intrusions and I have participated in the execution of search warrants on
individuals and companies.
2. Before working for USACIDC, from November 2007 to November 2008,1 was employed as an SA
with the Bureau of Industry and Security (BIS), Office of Export Enforcement. And, from May 2003 to
October 2006,1 was a Deputy Prosecutor for Morgan County, Indiana. From August 2000 to August 2005,
1 served in the Monroe County, Indiana Reserve Deputy Sheriffs Department as a Deputy Sheriff, where I
received training in evidence collection. Further, I am a graduate of the Federal Law Enforcement Training
Center's Criminal Investigator Training Program, where 1 also received training in evidence collection. In
addition to being employed as a Special Agent, I currently serve in the Inactive Ready Reserves (IRR) as a
Judge Advocate in the United States Army National Guard, District of Columbia.
3. In 2003,1 received a Juris Doctorate from Indiana University and was subsequently admitted to the
Indiana bar. 1 have a Bachelor of Arts in Psychology from the University of North Florida, and a Doctorate
of Jurisprudence from Indiana University - Bloomington School of Law. I am currently licensed to
practice law in Indiana.
4. My experience as a State Law Enforcement Officer, a State Prosecutor, and a Special Agent has
included the investigation of cases involving violent and non-violent crimes as well as the use of
computers. I have also received training and gained experience in: interviewing and interrogation
techniques, arrest procedure, crime scene examination, evidence collection, search warrant applications, the
execution of searches and seizures, and other criminal laws and procedures. Further, I have completed the
Department of Defense Cyber Investigations Training Academy courses: "Introduction to Computer
Hardware", "Computer Incident Responders Course", and "Windows Forensic Examinations - EnCase".
PROSECUTION

^

EXHIBIT

16 for

x ^ ) ^
lO^Ucauon

PAGE OFFERED:
PAGE ADMITTED:
PAGE
OF
PAGES

17197

^

Together, this afforded me certification asaDepartmentofDefense "Certified Digital Media Collector"
and "Certified DigitalForensic Examiner".
5. Ifollow several general procedures when handling evidence. Ireview the custody document and
always ensure the description ofthe evidence matches the evidence attached. Icheck, for example, that
recorded serial numbers, markings for identification, and condition description match the associated
evidence, lensure that the proper information, such as date and time, are properly and accurately recorded.
Lastly,lmaintain secure custody of the evidence prior to transferring it to another individual.
6. In this particular investigation,lassisted with witness interviews and the handling of evidence. In so
doing,lworked with SA Charles Clapper and Mr. GaronYoung. On 12June2010,lreceived several
pieces of electronic evidence related to this investigation from the hands ofMr.AdrianLamo and with his
consent. On 12June 2010, Mr. Adrian Lamo also gave signed consent to law enforcement personnel on
two separate CID Forms 87REto search his electronic devices for "^alll information in any form,
pertaining to communications which may be in the form: ofemails, instant messaging chats, documents,
data, computer code, log files, drawings, photographs, or any other data; in encrypted, plain text, or any
other format; relating to PFC Bradley E. MANNING and^or the disclosure of classified information or
information which is the property of theU.S.Govemment." The first piece ofevidence collected and
further handled wasaLenovo Laptop computer withaFuiitsu computer hard drive(serial number:
K404T812MF4D)recorded as ltemlonaDAForm4137 marked as document number (DN) 7610, and
known as "Lamo Ubuntu Hard Drive". It was collected from Mr.Adrian Lamo in Sacramento, California
onl2June2010. The second piece ofevidence collected and hirther handled was an HP Mini Brand
computer(computer serial number: CNU90513VT)withaSeagate computer hard drive (hard drive serial
number: 5RE2C1(^K) recorded as ltemlonaDAForm4137 marked as document number (DN) 77-10,
and known as "Lamo HP Hard Drive". It was collected from Mr.Adrian Lamo in Carmichael,Califomia
on 12 June 2010
7. Using the DAForm4137,Iproperly released these pieces of evidence to SA Clapper. Onl4June2010,
Iproperly regained possession from SA Clapper before properly releasing them to the Evidence Custodian,
Mr. GaronYoung, on 15 June 2010, which is documented onaDAForm4137. While in possession of
these items,lmaintained control over them, stored them properly,and allowed no one else access to them.
Idid not alter the evidence in any way. lhave no reason to believe this evidence was damaged or
contaminated in any way. After releasing the evidence to Mr.Young,lhad no fiirther interaction with the
evidence.
8. I^rosecution Exhibit 13 for Identification is the Lamo Ubuntu Hard Drive ( I t e m l o f D N 76-10).
Prosecution Exhibitl4for Identification is the Lamo HP Hard Drive ( I t e m l o f D N 77-10).

^

ASHDENFEIN
MAJ,JA
Trial Counsel

^^^^^^^^^^^^^^^^^^^^^^

THOMASF.HURLEY
MAJ,JA
Defense Counsel

^

BRAD^^EMANN^
PFC, USA
Accused

17198

UNITED STATESOF AMERICA
STIPULATION OF
EXPECTEDTESTIMONY
Manning, Bradley E.
PFC,U.S.Arn^y,
HHC, U.S. Arn^y Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22^11

SACi^^^IesCIa^^er
DATED: ^ J u n e 2(^13

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel,that ifSpecial
Agent(SA)Charles Clapper were present to testify during the merits and presentencing phases of
this court-martial, he would testify substantially as follows.
1. lamaSpecial Agent (SA)fortheU.S.Army Criminal Investigation Division(CID).
Specifically,Iwork forthe CID, Computer Crimes Investigation Unit(CCIU). My current job
title is Special Agent in Charge (SAC) ofthe Arizona Branch Office located atFort Huachuca,
Arizona. As the SAC,Irunatwoman office that handles exclusively computer crimes. My job
also entails serving as CID'sliaison officer for NETCOM. Additionally,Iam the liaison officer
to the Regional Computer Emergency ResponseTeam(RCERT CONUS) and to theTheater
Network Operations and Security Center (TNOSC). lhave served in Arizona as an SA for five
years andlhave been the SACforthreeofthefiveyears.
2. Froml986 1999,Iwas an enlisted Military Police oflicer (MP). Iserved as an Evidence
Custodian forthe Investigation Section at Fort Lewis,Washington from 1993-1994. After
becomingaCID agent in 1999,from 1999-2002,Iserved as the Computer Crimes Coordinator for
the ^th MP Baftalion in !^aiserslaughtem, Germany. Iwas also the Evidence Custodian for the
!^aiserslaughtem CID Office from 2001 2002. Iserved as the Detachment Sergeant and as an
Evidence Custodian from 200^-2006 at CCIU on Fort Belvoir,Virginia. In2007,Iwasan
INSCOM contractor performing forensics for the Army'sComputer Emergency ResponseTeam
(Army CERT) in the Forensics and Malware Analysis department. Ibecameacivilian Special
Agent in Arizona in 2008, and currently serve in this capacify.
3. IreceivedaB^chelorofScience degree in Liberal Arts from Regents College located in New
York. lhave had extensive training in evidence collection and handling.This includes having
attended thel7week Apprentice Special Agents Course. lhave also aftended the Advanced
Crime Scene Investigation class atFort LeonardWood and the SALTSpecial Agent Course at the
Army Crime Lab located atFort Gillem, Georgia. In terms of computer and forensic fraining,!
have taken numerous courses at the Defense Cyber InvestigativeTraining Academy in Linthicum,
Maryland. Itook these courses between the years 2000 and 2008. They coveredafull range of
computer forensics and digital media collection issues. Between 2003 and 2006,Iattended two
courses at Guidance Software in Reston,Virginia. This company manufactures the forensic
imaging software EnCase. In 2012,Iattended the Federal Law Enforcement Training Center
Computer Network Intrusion Training program in Glynco, Georgia. These courses all discussed
the collection and handling of digital evidence.
^. IhaveaDepartmentofDefense Cyber Crime Investigation Certificate from the Department of
Defense Cyber Crime Center,which is the highest certification that one can receive in the field.
PROSECUTION E X I ^ ^ ^ i T ^ ^ l ^ r i d ^ n t ^ c ^ ^ ^
^
PAGEOFFEREO^
^PAGEAO^^T^^^^^
PAG^
OP
PAGE^

17199

The certification must be renewed every two years. Ireceived my first certification in 2006 and
last renewed it in October of2012. In addition to my training and certifications,Ihave worked
more thanlOO cases in my current duty position and somewhere betweenlOO-200 cases in my
previous capacities.
^. Ifollow several general procedures when handling evidence. Ireview the custody document
and always ensure the description ofthe evidence matches the evidence aftached. Icheck, for
example, that recorded serial numbers, markings for identification, and condition description
match the associated evidence. lensure that the appropriate information, such as date and time,
are properly and accurately recorded. Lastly,Imaintain secure custody ofthe evidence prior to
transferring it to another individual.
6. In this particular investigation,Iworked with SAAntonio Edwards and assisted with witness
interviews and the handling ofevidence. On 12 June 2010,Ireceived evidence related to this
investigation from SA Edwards. lalso received two Consent to Search forms(CID Forms 87RE), signed by Mr.Adrian Lamo on 12 June 2010,which gave signed consent to law enforcement
personnel to search his electronic devices for "l^ajll information in any form, pertaining to
communications which may be in the form: ofemails, instant messaging chats, documents, data,
computer code, log files, drawings, photographs, or any other data-in encrypted, plain text, or any
other format-relating to PFC Bradley E.MANNING and^or the disclosureof classified
information or information which is the property oftheU.S.Govemment." The first piece of
evidence collected and further handled wasaLenovo Laptop computer withaFti^itsu computer
hard drive(serial number: ^^0^T812MF4D)recordedasItemlonaDAForm4137,markedas
document number (DN) 76-10, and known as "Lamo Ubuntu Hard Drive". It was collected from
Mr.Adrian Lamo in Sacramento, California on 12 June 2010. The second piece ofevidence
collected and further handled was an HP Mini Brand computer(computer serial number:
CNU90^13VT)withaSeagate computer hard drive(serial number: ^RE2C1(^!^) recorded as
ItemlonaDAForm4I37,marked as document number (DN) 7710, and known as ^Tamo HP
Hard Drive". It was collected from Mr. Adrian Lamo in Carmichael, California on 12 June 2010.
7. limaged both pieces of evidence using standard forensic imaging sofl^are,which does not
alterthe original evidence in any way. Aforensic image isabit-for-bit or exact copy ofthe
original information on the hard drive. Using theDAForm4137,Iproperly released the original
evidence back to SA Edwards on l^June 2010. While in possession of these items,Imaintained
control over them. Iretumed the items in the same condition thatlreceived them and have no
reason to believe that the evidence was damaged or contaminated in any way. After releasing the
evidence to SAEdwards,Ihad no fiirther interaction with the evidence.

^

ANGELM^VERGAARO
CPT,JA
Assistant Trial Counsel

.^^^^^^^^^^^^^^^^^^.^.^^.^

THOMASFHURLEY
MAJ,JA
Defense Counsel

BRADL^YEMANNlNG
PFC, USA
Accused

17200

UNITEDSTATESOF AMERICA

Manning, Bradley E.
PFC,U.S.Arniiy,
HHC, U.S. Arn^y Garrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211

STIPULATION OF
EXPECTEDTESTIMONY
Mr.GaronYoung
DATED: ^June2013

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifMr.
GaronYoung were present to testify during the merits and pre-sentencing phases ofthis courtmartial, he would testify substantially as follows:
1. lam currently the Criminal Intelligence Program Manager for theU.S.Army Computer
Crime Investigative Unit(CCIU) ofthe Criminal Investigative Division(CID). lhave been with
CCIU for lOyears. This position primarily entails reviewing cases for intelligence data and
entering them into our database. Additionally,Ireview reports, serve as the security manager,
and act as alternate evidence custodian. lhave held this position for lOyears.
2. lhave an Associate'sdegree from CentralTexas College and began my law enforcement
career in 1980 asaMilitary Policeman. In 1987IbecameaMilitary Police Investigator. From
1989 tol992,Iwas the Chief oflnvestigationsinWuerzburg, Germany. During this time(1989
^1991),Iwas also the evidence custodian. Ijoined CID in 1993 and from 1994 tol995 was the
alternate evidence custodian while stationed in !^orea. From 1995 to 1998,Iwas the detachment
sergeant atFort LeonardWood. In this capacity,Iwas the senior enlisted advisor and primary
evidence custodian. From 1998 untillretired in 2000,Iworked at CID Headquarters on Fort
Belvoir. After3yearsofworking for the Florida Department ofRevenue, in 2003,Iretumed to
criminal investigations by joining CCIU. lhave worked in my current position since then^
serving from 2003 to 2006 as the altemate and occasionally primary evidence custodian at
various times. Throughout my years in law enforcement,Ihave worked more than 800 cases.
3. In 1996,Itook the Medical Legal Death InvestigationsTraining by the Armed Forces
Institute ofPathoIogy held at Fort Lewis. In 2005,laftended the Evidence Management Course
at the United States Army Crime Lab inFortGiIIem,GA. And in 2007,Iretumed to Fort Gillem
for the Army Crime Lab'sSpecial Agent LaboratoryTraining. These courses do cover physical
and digital evidence collection and handling.
4. Ifollow several general procedures when handling evidence as evidence custodian. The first
timelreceiveapiece of evidencelcheck the accompanyingDAForm4137 evidence custody
document to make sure the evidence matches the description and that the marked-foridentification number on the evidence matches what is recorded on the form. lalso check to
make sure the form has been appropriately filled out. Whenlsign the evidence into the evidence
room,Isign in the ^^received" column. Ithen log it in the evidence book and the database before
placing it in the evidence room. When someone asks to receiveastored piece of evidence,lpull
the voucher number and locate the evidence in its appropriate location. Icheck to make sure the
evidencelam handing over matches the description on the form and thenlrelease it to the

^

PROSECUTIONEXHIBIT^^forid^ification
PAGEOFFERED:
^PAGEADMi^ED:
PAGE
OF
PAGES

17201

Special Agent or Forensic Examiner who has requested it. Isign thatlhave released it and the
individual receiving it signs that(s)he has received it. Each timelrelinquish or assume custody
of evidence,Icheck the description to make sure the evidence being transferred matches the
forms used to transfer it.
5. In my capacity as evidence custodianlhave worked with SA^irk Ellis, SAAntonio
Edwards, and Ms.TamaraMairena. When Ms.Mairena came on board as the primary evidence
custodian,Itrainedher. She works as the primary andlas the altemate evidence custodian. It is
normal for her to sign evidence out ofthe evidence room and for me to sign it back in(or vice
versa).
6. lam involved in the present case because ofmyrole in assisting the investigation team with
the secure storage ofthe evidence they collect. lhave received evidence from both SA Edwards
andSAEllis
7. On 15 June 2010,Ireceived evidence related to this investigation from SA Edwards. Itook
custody ofaLenovo Laptop computerwithaFti^itsu computer hard drive(serial number:
1^404T812MF4D), collectedfromMr.AdrianLamo while in Sacramento, CA on 12June 2010,
recorded as Item1onaDAForm4137 marked as document number (DN) 7610, and knov^ as:
"Lamo Ubuntu Harddrive". lalso took custody of an HP Mini Brand computer(computer serial
number: CNU90513VT)withaSeagate computer hard drive (hard drive serial number:
5RE2C1(^!^), collected from Mr. Adrian Lamo in Carmichael, CA on 12 June 2010, recorded as
ItemlonaDAForm4137 marked as DN 77-10, and known as "Lamo HP Harddrive". Upon
taking possession ofthis evidencellogged it in to the evidence room using the proper
proceduresljust described. Inever logged it back out.
8. On 15 June 2010,Ialso received evidence related to this investigation from SA Ellis. Itook
custody ofaDVD(Marked"0028 I0cid22II0117DeptofStateServerLogs, 199 56 188.73"),
seized from the Department ofState on 15 June 2010, recorded as ItemlonaDAForm4137
marked as DN 78 10, and knov^ as ^^DoS Server Logs". Upon taking possession ofthis
evidence,Ilogged it into the evidence room using the properproceduresldescribed earlier. I
never logged it back out.

^^^^^^^^^

ASHDENFEIN
MAJ,JA
Trial Counsel

^^^^^^^^

THOMASFHURLEY
MAJ,JA
Defense Counsel

BRA
PFC, USA
Accused

17202

UNITED STATESOF AMERICA
STIPULATION OF
EXPECTEDTESTIMONY
Manning, Bradley E.
PFC,U.S.Arn^y,
HHC, U.S. Arn^y Garrison,
JointBaseMyerHendersonHall
Fort Myer, Virginia 22211

Ms. Tan^ara Mairena
DATED: ^ June2013

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifMs.
Tamara Mairena were present to testify during the merits and pre-sentencing phases ofthis court
martial, he would testify substantially as follows:
1. lam the primary evidence custodian at the Computer Crimes Investigative Unit(CCIU) of the
U.S.Army Criminal Investigation Command(CID)in^uantico,Virginia. lhave held this
position since 2006. In this position,Itrack and catalog evidence maintained by our CCIU
office.
2. lhave beenaCertified Evidence Custodian since January of2006. Ireceived this
certification from theU.S.Army Criminal Investigation Laboratory. Since January 2010,Ihav^e
also beenaDepartmentofDefense(DOD)CyberInvestigationsTrainingAcademy certified
digital media collector.
3. Ifollow several general procedures when handling evidence as evidence custodian. The first
timelreceiveapiece of evidence,Icheck the accompanyingDAForm4137 evidence custody
document to make sure the evidence matches the description and that the marked-foridentification number on the evidence matches what is recorded on the form. lalso check to
make sure the form has been appropriately filled out. Whenlsign the evidence into the evidence
room,Isign in the "received" column. Ithen log it in the evidence book and the database before
placing it in the evidence room. When someone asks to receiveastored piece of evidence,Ipull
the voucher number and locate the evidence in its appropriate location. Icheck to make sure the
evidencelam handing over matches the description on the form and thenlrelease it to the
Special Agent or Forensic Examiner who has requested it. Isign thatlhave released it and the
individual receiving it signs that(s)he has received it. Each timelrelinquish or assume custody
of evidence,Icheck the description to make sure the evidence being transferred matches the
forms used to transfer it.
4. Ifirst became involved in the present case because ofmyrole in assisting the investigation
team with the secure storage ofevidence they collect. Isigned several pieces of evidence from
the investigating agents and forensic examiners into the evidence room and would release
evidence back to them when they needed it fortheir investigation or examinations. In my role as
evidence custodian,Ihave worked with and received evidence from Special Agent ^irk Ellis,
Special Agent Antonio Edwards, Special Agent David Shaver, Special Agent Calder Robertson,
Special Agent JohnWilbur, and Special Agent Mark Mander. lalso know Mr. GaronYoung.
He used to be the primary evidence custodian and trained me whenlbegan working for Army
PROSECUTION EXHIBIT 2.1 for idegRfication
PAGE OFFERED:
PAGE ADMITTED:

PAGE

OF

PAGES

17203

CCIU. Mr.Young currently serves as the altemate evidence custodian. As such, it is normal for
him to sign something out ofthe evidence room and for me to sign it back in(or vice versa).
5. OnI8June2010,IsignedaLenovo laptop computer with Fujitsu computer hard drive(serial
number: ^404T812MF4D), collected from Mr.Adrian Lamo in Sacramento, Califomia on 12
June 2010, recorded as ItemlonaDAForm4137 marked as document number (DN) 7610,
and knov^ as "Lamo Ubuntu Harddrive" out ofthe evidence room to SA Dave Shaver for
forensic examination. lalso signed out an HP Mini Brand computer(computer serial number:
CNU905I3VT)withSeagateharddrive(serialnumber:5RE2CI(^I^),collectedfromMr
Adrian Lamo in Carmichael, California on 12 June 2010, recorded as ItemlonaDAForm
4137,marked as DN 77-10, and known as "Lamo HP Harddrive" to SA Shaver forthe same
reason. He retumed these items later that same day. Ireceived and released this evidence
according to the proper proceduresljust described. Idid not alter this evidence in any way.
6. On18October2010,Ireceived evidence related to this investigation from SAWilbur,
recorded as ItemlonaDAForm4137 marked as DN 151-10. Itook custody ofaCD(marked
"WikileaksDoS Firewall Logsl30ctlO") collected from the Department ofState on 15
October 2010, and known as "DoS Firewall Logs". Upon receiving this evidence,Iproperly
logged it into the evidence room using the same procedures described earlier. OnlNovember
2010,Iproperly released it to SA Shaver for examination. He retumed it later that same day. I
received and released this evidence according to the properproceduresldescribed earlier. Idid
not alter this evidence in any way.
7. On3November2010,Ireceived nineteen pieces of evidence from SA Mander, collected
from the home ofMs.DebraVanAlystne in Potomac, Maryland on2November 2010, recorded
asltemsl 19onaDAForm4137 marked as DN 162 10. Item2onthisDAForm4137wasan
SDmemory card(seriaInumber:BE0915514353G), known as "SDCard"On10December
2010,Iproper1y released the "SD Card" to SA Shaver for examination. He retumed it laterthat
same day. Iproperly received the evidence back in to the evidence room according to the proper
proceduresldescribed earlier. Idid not alter this evidence in any way.

ANGEL M./UVERGAARD
CPT, JA
Assistant Trial Counsel

THOMAS F. HURLEY
MAJ, JA
Defense Counsel

BRADlMY E. MAI
PFC, USA
Accused

17204

Prosecution Exhibit 30
50 pages
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial

IN

17205

J i r»

^1!

f

a

a

!! (

Vl

2

js »!

^a;:

M

ii n,
_w
O

DO

8
0051: 7869


hi

m
mi
III!
i -•
1 ?i

/ ^ ^

PROSECUTION EXHIBIT J i for idcimfication
PAGE OFFERED:
PAGE ADMITTED:
PAGE
OF
PAGES

Ea mamas. msqzo a





of . .
0

9.3..

abs

3

Eoh main?. hca mn_E rcon



.3: 3. 3.95. .1 Eaiuz Ea: Iv

Hanna .8
55:8 0235 .oE_mwo?_ ma wemwoavuu

ma3235917207

^

^
^
^
f^
^
^
^

L^
;:::;i

^
^
^
^

iB:i

^

1^

..^^^^i^^i^i^^

^
^
^

^^^^^^n^im^
^^^^^
^

^

8

^
^
^
^
^

^
^
^

ManningB_00504479

^^^^I^B

fPO-^'^'"'''
Pr : C:\

PAGE

.. 5.tau?ic 3.8.4

no-cl



Sam 43:5 E6 9 mm? :55? BE
mm Enema
on

?dmnsoa $53.2! Eozoa

mx .. QEEIPVIIH




3.3 ivngoa
.. .. man S45. I:5m..Loa??. mime ME

r?ah

Ev - .
_13,m.U?

Show om 35mm



17209

• ;

CL

^
o
bO

ro

S
iS"

B
«l
§3 I
I aI
i E i

S ||

:% f 2;

3 2 -

11! Si-"
ill ill
e i!

I*

#i!
M
4J

00527871

.

is'i 8
Nf;
i*e
SRS

ill
iii
^JS

s «j

II
! *

lit
ill
:IS

^i:

Ill I i
m$ I
i* %
I
E

8gR;

IS

#1

!i



#i3
° *i
ggU
; *!

iii;

J.t

PROSECUTION EXHIBIT 31-for id^
PAGE OFFERED:
PAGE ADMI5
PAGE
OF
PAGES
ED:

28





?n?alm?



..

ta 5:

>5 ?m_E rcon




u?ulnmna I .2. .2.
.2Z?m.nu.

o?m Busn?oo Sham

way: 95 mna?zu no
menu? AER. ma .8 moot? 95:



.. cam Euznoum cm mam^
17211

^
^^^^^^^^i^^^^^^-^in^^^^^^^

w*'
'mm

m
w

'4%

ID
LD
M
00

O
m

Ul
M
3
4_»

ro
+-'
LO

Jad!

ro
(U

%

3
o
U
(U

'HitM^i
CI
4_(

MannlngB_00504480

!L*Ai' ' '

PRO'^^'"~'"
PAGEGry-;iHGPAGE
OF

.-- - .-

E.

._sin_3_..uq

9 K. mo.-at



388 253.5. ?maom am am won?
on $5
mawma oo?van?. 35?

Arman: t??oaa -3.[El
005.. 33m 2.: 5.9.5.. __35
.893. man 5.3..

:35? mag132wimm?mom?mon


.

From on Wu.







0 17213



HI-IC, U.S. Army Garrison,
Joint Base Myer-Henderson Hall

May 2013
Fort Myer, Virginia 22211

UNITED STATES OF AMERICA

STIPULATION OF
v. EXPECTED TESTIMONY



Manning, Bradley E.

PFC, U.S. Army,




It is hereby agreed by the Accused, Defense Counsel, and Trial Counsel, that if
were present to testify during the merits and pre-sentencing phases of this court-martial, she
would testify substantially as follows.

1. I, previously of the surname 2, am the Officer-in-Charge (OIC) of the S-2
section at the 305th Military Intelligence Battalion, Fort Huachuca, Arizona. I have held this
position since 2009. As the OIC, I am responsible for security oversight, including those security
measures necessary for the in- and out-processing of Advanced Individual Training (AIT) students
at the United States Army Intelligence Center and School.

2. Before becoming the OIC of the S-2 section, I was a security specialist in the S-2 section for
nearly 15 years. I was the lead for the enlisted section of AIT students and was responsible for
processing clearance paperwork, tracking the status of security clearances, and providing the
security brief to incoming and outgoing AIT students.

3. All AIT students were required to have a SECRET security clearance to attend AIT. I was
responsible for confirming that the AIT students possess the necessary security clearance through
the Joint Personnel Adjudication System (JPAS). If any student did not possess a SECRET
security clearance, I would process the security clearance, which would include having the student
complete a Standard Form (SF) 86. Some Military Occupational Specialties (MOS) required that
the student possess a TOP SECRET security clearance in order to graduate AIT, and I would assist
those students with processing their TOP SECRET security clearances. PFC Bradley Manning is
a 35F (previously 96B) (All-Source Intelligence Analyst), an MOS that required PFC Bradley
Manning to possess a TOP SECRET security clearance in order to graduate from AIT.

4. PFC Bradley Manning attended AIT from 4 April 2008 until 14 August 2008, during which
time I was a security specialist in the G-2 section. At 0800 on Monday, 7 April 2008, I gave all
students, including PFC Manning, a security brief which lasted approximately forty-?ve minutes.
I briefed the class, including PFC Manning, on Operational Security (OPSEC) and Information
Systems Security (INFOSEC). Speci?cally, I briefed that OPSEC is the process of denying
adversaries information about friendly capabilities and intentions by identifying, controlling, and
protecting indicators associated with the planning and conducting of military operations and other
activities. Specifically, I briefed that IN FOSEC is the system of policies, procedures, and
requirements established under the authority of Executive Order 13526 to protect information that,
if subjected to unauthorized disclosure, could reasonably be expected to cause damage to the
national security. I briefed the class, including PFC Manning, about the dangers to national



I 35?







0 0 17214

security of allowing U.S. Army and government classi?ed information on the Internet. I
explained to the class, including PFC Manning, that putting information on the Internet not only
exposes information relating to our national security, but also puts each Soldier at-risk of
blackmail by our adversaries given his position of trust to safeguard classi?ed information.
During my brief, I discussed previous cases of treason, to include John Walker Lindh and Aldrich
Hazen Ames, to teach PFC Manning and the rest of the class the consequences of violating this
position of trust and betraying his country.

5. At the conclusion of my security brief, I explained to the class and PFC Manning the purpose
and contents of the Standard Form (SF) 312 - Nondisclosure Agreement (NDA). I then asked the
class and PFC Manning if they wanted to voluntarily sign the NDA. PFC Manning volunteered to
sign the NDA. I then instructed PFC Manning and those others who signed the NDA to stand up,
raise their right hand, and state that they accepted the responsibilities contained within the NDA
and voluntarily agreed to be bound to the terms within the NDA. Afterwards, PFC Manning
completed and voluntarily signed the NDA, for which I co?signed as a witness to PFC Manning?s
signature.

6. The NDA with BATES is the NDA which PFC Manning executed on 7
April 2008. The same document is the NDA which I then witnessed PFC Manning sign. I
recognize my signature on that specific NDA and I, along with each student for which I co?signed
as a witness, followed the above described procedures each time the student executed a NDA.

I
7
THOMAS F. HURLEY BRAD E. MANNING

opr, JA MAJ, JA PFC, USA
Assistant Trial Counsel Military Defense Counsel Accused

17215

UI^IT^DSTAT^SOF AMERICA

^
^
^

STIPULATION OF
^XP^CT^DT^STIMONY

^

Ma^mn^, Bradley^.
PFCU.SArmy,
HHCU^SArmyOarrison,
JointBaseMyerHendersonHall
FortMyer,Virginia 22211

^
^
^
^
^

SSOAIe^a^droMari^
DAT^D:

May 2013

It is hereby agreed by the Accused, Defense Counsel, andTrial Counsel, that ifSSO Alejandro
Marin were present to testify duringthe merits and pre-sentencing phases of this courts martial, he
would testify substantially as follows.
1. I, SSO Alejandro Marin, am currently deployed to Afghanistan asaCounterintelligence
Analyst in the 0-2(Inte11igence)section forthe 333d Military Police Brigade. My Military
Occupation Specialty (MOS) is 35L, Counterintelligence Agent. My responsibilities in this
position include gathering tactical intelligence in our Area of Operation.
2. From 2002-^2006,Iwas enlisted in the United States Marine Corps with an MOS oflnfantry.
In July 2007,Ienlisted in the United States Army Reserve with an MOS o f l l B , Infantry. In early
2008,lreclassified with anMOSof35F,All-Source Intelligence Analyst. From April 2008 until
August 2008,Iattended the Intelligence Analyst Course at Advanced IndividualTraining (AIT) in
Fort I^uachuca, Arizona. Iwas assigned to the 305th Military Intelligence Battalion.
3. PFC Bradley Manning andlattended AIT together. PFC Manning andlwereinall of the
same classes together atAIT and received the same instruction. The class consisted of
approximately 20-25 students, two ofwhom were PFC Manning and me. linteracted with PFC
Manning onadaily basis. Troy Moul was our AITinstructor.
4. AtAIT,Iwas trained on pattern analysis, which is the study ofthe enemy^s Tactics,
Techniques, and Procedures (TPPs)to determine any patterns in enemy activity. Iwas also
trained on how to collectintelligence products and howto map enemy activity as part of pattern
analysis. Iwas also trained extensively on the use ofSignificantActivities(SIOACTs), which are
stored in the Combined Information Data Network F^xchange(CIDNF^) database on the Secure
Internet Protocol Router Network (SIPRNF^T),aclassified network. Iwas also trained that
SIOACTsconsistoftroop location. Improvised F^xplosive Device (IBD)attacks, and
assassinations. Additionally,Iwas trained on how to research, review, and pull SIOACTsand
plot them onamap for pattern analysis.
5. AtAITIwas trained on the targeting process. Iwas also trained on howto collect information
on I^ighValueTargets(l^VTs), to include which databases to use and what type ofinformation is
helpful to the targetingprocess. Iwas also trained that the intelligence we provided on these
I^Ts may be employed to carry out military operations to capture these persons. During this
instruction,Iwas also trained on howto use Intelink,asearch engine on the SIPRNET similar to
Ooogle.

PROSECUTION EXHIBIT for iMitificatioif
PAGEOFFERED: _ P; UlTADMITTED:
^
PAGE
OF
PAGES

17216

6. At AITIwastt^ained on Information Security (INFOSEC). Iwas also trained on the meaning
ofclassification, to include the difterent levels of classification. Specifica1ly,Iwas trained that the
unauthorized disclosure ofinformation classified at the SECRET level reasonably could be
expected to cause serious damage to the national security and that the unauthorized disclosure of
information classified at the CONFIDENTIAL level reasonably could be expected to cause
damage to the national security. Iwas also trained on the meaning ofinformation marked For
OfficialUseOnly(FOUO) Iwasalsotrainedtoproperlymarl^notonlyclassifieddocumentsat
the top and bottom ofeach document, but also classified media devices with the approved label. I
wasfiirthertrainedthat we hadapersonal responsibility to safeguard classified information. Iwas
also trained that access to classified information is limited to those persons with the proper
security clearance, signed NonDisclosure Agreement, andaneed-to^know. Iwas also trained
how to store, transmit, and otherwise handle classified information consistent with Army
Regulation 380 5.
7. At AIT,Iwas trained on Operational Security(OPSEC). Iwas trained not to publicly disclose
anything that could be useful to our adversaries, both foreign and domestic. Iwasalso trained on
the dangers ofputting information on the Intemet, to include social media websites. Iwasalso
trained on how the enemies ofthe United States, including AlO^^da, use the Internet by
searching websites for many purposes, such as to collect intelligence on the United States and for
use as propaganda and asarecruiting tool. Iwas trained that OPSEC applies to unclassified
information, such as information relating to training schedules and unit morale. AtAIT,Iwas
aware that PFC Manning had to giveafive minute brief on OPSEC.
8. WithregardstoBATESnumbers0000735I^00007426, 00007450 00007586, 00007629^
00007789,00007983 00008087,00008152 00008288,00008331 00008522,00008853^00009046,
00009802-000I0037,and000I0722^00010843,Ihavereviewedalloftheseslides.The formatting
ofthe slides is very recognizable to me. Aslreviewed the slides, my memory makes me believe
that these were the slides that were given to us at AIT The slides were multiple classes in one
presentation. Tothe best of my knowledge, these slides appear to be the ones used for our classes
becauseofthe formatting and content contained in the slideshow. Iremember being trained on the
content of these slides at AIT,such as memorizing the ^^CARVERSUP^^ mnemonic device at
BATES number000I0767. Ilowever,Icannot say for certain that these are the actual slides orthe
actual infortr^ation from the slides ^ivet^ to us due to the length oftime that has ^one by. It has
beenfive years sincelhave seen theslides.Ialsocannotsayfbrcertain that these aretheslides
because not all of the slides were used in all the classes due to time constraints oraclass being
shortened. Ataminimum, these slides are very similarto the slidesIreceivedduringAIT.
9. AtAIT,PFCManningparticipatedinaFie1dTrainingExercise(FTX),duringwhichPFC
Manning created various intelligence products, such as targeting packets on HVTs. Iwasateam
leader duringthis FTX and had the opportunity to review PFC Manning^swork product. PFC
Manning^s strengths included computer-related tasks, such as pulling data from databases
containingintelligence products.

17217

10. Iwas an All^Source Intelligence Analyst for approximately fburyears. In2012,Ireclassified
with anMOSof35L, Counterintelligence Agent.

jTMywi-iLHYTE

CPT, JA
Assistant Trial Counsel

xihX

THOMAS F. HURLEY
Military Defense Counsel

BRADLEY E. MANNING
PFC, USA
Accused

17218

¥
%

ManningB_00199454

PROSECUTION EXHIBIT for ideptificaf^n
PAGE OFFERED:
PAGE ADMITTED:
PAGE OF PAGES



Re: H3110 Again . . 17219

Subject: Re: Hello Again
From:
Date: Th 20 May 2010 01:51 :20 +0300
maiz?







You're absolutely right, and I totally agree with you. Though overall,
I'm glad it was released, and glad it made an impact. Assange learned a
lot from that, and I criticized him.

Though, none of the actual written text in the video is inaccurate.
Assange has more material on the topic, which due to source protection
paranoia was not released. Some other material is wedged inside of the
entire database of events for the Iraq War from 01 JAN 2004 to 31 DEC
2009. Approximately 500,000 incident reports.

He also has 260,000 State Department cables. He's got dirt on every
diplomat and head-of-state on the planet from the mid-90s to MAY 1, 2010. I

On 5/20/10 1:35 AM, Eric Schmiedl wrote:

Huh. My objection to "Collateral Murder" is that murder is such a strong
word that it overshadows the meaning of a "squishy" word like
so that my reading of the phrase is something like
"collateral damage is accidental killing of civilians. This is outright
MURDER of civilians." That's a pretty strong accusation to make with no
clear evidence that it was intentional (the definition of murder), so in
my mind the "collateral murder" tagline reduces the overall credibility.

Basically: right at the beginning, you're making unsupported
how am I supposed to believe the rest?

In comparison, releasing the video without embellishment, and a mere
listing of known facts (no firefights in the area, Reuters reporter
among the group, etc) lets people put their own interpretation on it.
Often, what people imagine is far more shocking than the truth, as
horror film directors know all too and when you add political
blogs to the mix, who knows?


Good question.

There's a few answers I have to various other questions as well:

1. (Had a
written description.)

2. I "saw" an RPG and many, many more weapons the first time I saw the
video. I was numb. I explored it further, and found out what actually
happened later. I wanted the video to challenge that cognitive bias that
every young Iraqi male is an insurgent.

3. I instructed there to be an Orwell quote, description of the
s_ome general context.
It literally means "unintentional murder."
4. Public Relations is an area Wikibeaks needed some desperate help in,
since the only people who had heard of them before were people in the
hacker, journalist, and intelligence communities.

5. Video personally pissed off Assange, and he wanted to "get out of

exhile."
PROSECUTION EXHIBIT LU foriden' canon 6/22/2010 9:44 PM
PAGE OFFERED: PAGE ADM .
ManningB_00000409 IJAGB OF PAGES





Re: Hello Again . . 17220



On 5/20/10 1:02 AM, Eric Schmiedl wrote:
Cool. Why all the PR spin over "collateral murder," when releasing it
straight like previous leaks might have ended up winning more controversy?



On 5/20/10 12:46 AM, Eric Schmiedl wrote:
Yeah, I am.

On 5/19/10 5:46 PM, Bradley Manning wrote:
Are you familiar with WikiLeaks?

v/r

Manning, Bradley E.

On 5/20/10 12:41 AM, Eric Schmiedl wrote:
pass

On 5/19/10 5:41 PM, Bradley Manning wrote:
Test

On 5/20/10 12:37 AM, Eric Schmiedl wrote:
Here you go. Enjoy!

On 5/19/10 5:36 PM, Bradley Manning wrote:

Hey Eric,

It's been a little while since we last spoke. I was hoping I
could get

your info If you use it.

v/r

Manning, Bradley E.



v/r

Manning, Bradley E.

v/r

Manning, Bradley E.



v/r

Manning, Bradley E.

2 013 6/22/2010 9:44 PM

ManningB_00000410

Re: Hcqlo Again

17221





6/22/2010 9:44 PM.



110922\MANNING.SDCard\E1\AttC\yada.tar.b22.nc
17222

Items of Historical Significance for Two Wars:
Iraq and Afghanistan Significant Activities (SIGACTs) between 0000 on 01 JAN 2004 and
2359 on 31 DEC 2009 (Iraq local time, and Afghanistan local time)
CSV extracts are from the Department of Defense (DoD) Combined Information and Data
Exchange (CIDNE) Database.
It's already been sanitized ofany source identifying information.
You might need to sit on this infonnation, perhaps 90-180 days, to figure out how best to
release such a large amount of data, and to protect source.
This is possibly one of the more significant documents of our time, removing the fog of war,
and revealing the true nature of 21st century asymmetric warfare.
Have a good day.

pManningB.00199473

r/\uii

_OP____PAGES'

README.txt

17223

SECRET//>J0F0RN
UNCLASSIFIED//FOR OFFICIAL USE ONLY
07 Jan 2010
(U) MARFOREUR G-2 TRIP REPORT'
(U) Traveler: Staff Sergeant Matthew Hosburgh
(U) Purpose: Chaos Communication Congress 26C3 Here Be Dragons Conference
(U) Dates:

26-30 December 2009

(U) Location: Berlin, Germany
(U) Executive Summary. The Chaos Communication Congress conference is an annual
event that attracts hackers, security researchers, computer hobbyists and malicious
computer users. This yeafs conference marked the 26* year anniversary of the congress.
The conference title was Here Be Dragons which is a reference to medieval times where
explorers would put dragons or other serpents to mark dangerous or uncharted territories-an attempt to explain the conference's purpose in exposing"uncharted territories in
computer, phone, and other systems. The conference began on 27 December 2009 and
lastW until 30 December 2009. There were some good talks about security and some
rather alarming developments in the"uncharted territory!' A majority of the security
discussions were in German which prevented attendance because of the language barrier;
however, a large amount of the discussions were in English and catered to the
international audience. I personally attended the following talks: Lightning Talks-Day 1;
Why Net Neutrality Matters?; WikiLeaks Release 1.0; Exposing Crypto Bugs through
reverse engineering; Tor and censorship: lessons learned; SCCP hacking, attacking the
SS7 & SIGTRAN applications on step further and mapping the phone system; DDoS /
botnet mitigation & hosting online communities; Using OpenBSC for fuzzing of GSM
handsets;'Yes We Can't!'-on kleptography and cryptovirology; Black Ops of PKI.. A
detailed explanation, assessment and countermeasure (if applicable) can be found below.
1. (U) Lightning Talks - Day 1. Lightning Talks were a two hour forum where
basically members of the hacking community could present a topic or announce
an event for approximately four minutes. During this talk, there were
MARFOREUR AC/S G-2 Comment: This paper has been declassified on 05 March 2012 in
accordance with the procedures set forth in DoD Instruction 5200.1-R (Infonnation Security Program;
January 1997). Prior to declassification, this paper was reviewed by the MARFOREUR AC/S G-2 (Senior
Intelligence Officer), MARFOREUR AC/S G-6 (Senior Communications Officer/Chief Information
Officer), USEUCOM J2 (Cyber Intelligence Division), USEUCOM Foreign Disclosure Officer, and
USEUCOM SSO (INFOSEC Branch), all of whom concurred that the information contained herein does
not exceed a level of UNCLASSIFIED//FOR OFFICIAL USE ONLY. The paper's author, SSgt Matthew
Hosburgh, was dischared from the United States Marine Corps in June 2010 and therefore was not
available to participate in this declassification review.

SECRET//N0F0RN
UNCLASSIFIED//FOR OFFICIAL USE ONLY

I^-

Man
„ie
.o
.o4e
.

_^
ification
PROSECUTION EXHIBIT MC> for id/htificatioi

;^:g:5A(!'^'''''''''°'
A rw/narTRn-

17224

^ECRET/ZNOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
presentations onT^-Be-Gone(auniversaI remote that can tum offtelevisionsets
^omadistance),andafewotherprcjectsthatwerenotofmuchsigni^cance.
a. (II) Analysis: This forum seemed varyinert. There was alsoalack of
speakers fi:^r dayoneasthe Intemet ^rthe conference centerwas down
andalotofthepresentations were stored onawebsiteon the Intemet.
b. (^^Countermeasure: N/A
2. (ll)^hyNetNeutralityl^atters7Netneutralityisfastbecomingahottopicin
theintormationtechnologyworld. Essentially,this talk presented what it isaway
^ r an ISP companies to more tightlyregulate levels ofservice to the user. This
could be in the form ofmakingusers pay for exactly what they need on the
Intemet. For example, an ISP could provideacustomerwith three packages to
choose 8^om,sayl-3. Packagelcould cost ^30 per month and only allow
access to Google searching and news websites. Package2could allow more
access fi:^r^Opermonth including email, web browsing, and access to banking
sites. Pa^age3couId be the ^^pr^ium package''as it would allow access to
music,YouTube and othermedia sites (to include packagesl-2). The ISPs
would be able to regulate the intemet content and not just bandwidth. This is the
core issue: limiting access to content and not bandwidth. The talk made the case
the Intemet should be kept open and ^ee. Jeremie2^immermanwasthepresenter
(aPrench citizen) and he said his organization had been lobbyingthe French
politicians to keep the Intemet open. Hispleatoeveryoneattheconfi^rencewas
to lobbyinourrespective countries to keep the Intemetthe way it is today.
a. ^(S^/NF)(ll//FOLIO) Analysis: I^eepingthelntemetneutralhas its
benefits. It allows the ^eeexchangeofideas which promotes global
communications. Basically,the Intemet is the same no matterwhereone
is in the worId(relativeIy speaking). Taking the openness out ofthe
Intemet would hinder global communications and business. On the
flipside, the Intemet, as it stands today,isaplaygroundfi:^r malicious users
(creating viruses, cyber ^aud, child pomography,and other crimes).
Further, the Intemet is an essential communication tool fi:^r terrorists.
Terrorists cells can use the Intemet toobscuretheirtraflic, as well as,
other tools to enerypt, hide and send messages. By filtering the Intemet,
this problem may be minimised, but atthe cost oflostrevenueand
8^eedom of speech.
b. (1^ Countermeasure: N/A
3. (11^) WikiLeaks l^eleasel.^. Wikileaks.org, isapublicly accessible Intemet
Website where individuals can contact with leaked information and have it
publishedtothepublicanonymouslywithout fear ofbeing held legally liable.
The infi:^rmation that can be leaked includes, but is not limited to, classified
infom:iation,tradesecrets, corporate information, personally identifiable
information, and even operational data. The goal is to promote ^^open-ness" and
OECRET^^NOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY

l^afioifigB_0041^547

17225

SECRET//NOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
toensurethepublicis^^wellinfdmied" to what'sreaIlygoingon.The founders of
WikiLeaks claim that they have not had any oftheir sources compromised or
uncovered. Oneofthe most alarming pieces ofthe talk was that WikiLeaks was
se^ingto obtain^^off shore" storage and dataprocessingoftheir site so that they
wouldnot be bound toU.S. law. This concept is similarto that oftheprovei:biaI
^^Swiss bank account."
a. (l^^i^P) (11//F0110) Analysis.WikiLeaksrepresentsapotentiaIfi:^rce
protection, counterintelligence, operational security(OPSEC), and
infomiationsecurity(INFOSEC)threattoMARFOREUR/AF.The
intentional orunintentional leaking and posting ofUS Marine Corps
sensitive or classified infi:^i:mation to Wikileaks.org posesalargethreatnot
only ^om the external disclosure, but 8^om the insider. Theinsiderwould
be able to easily leak information without fear of any direct, individual,
repercussions. Further, when the off-shore storage is implemented,
WikiLeaks will have more latitude to distributeand publish leaked
information as it will not be bound byU.S. law.
b.
(F0110)C^untermeasure:ForMARFOREUR/AF,ensurethat
employees aregiven annual securitytraining. Remind cleared individuals
oftheir agreement to safeguard 9nd not disclose classified orsensitive
infi:^rmation. Enfi:^rce document accountability. Ensure that classified
infi:^rmation that is no longerneeded is properly disposed of Recommend
implementingacontrol to ensurethatwhoeverprints, the document and
userisIoggedfbralIsystems(unclass-SCI).Enforcethesecureprint
feature fbrtheprinters in the hallway,that is, where uncleared individuals
maybe in contactwiththeprinters.
(11) Exposing Crypto Bugsthroughreverseenglneerlng^This talk was given
by Philippe OechslinofObjectifSecurite. HeisalsoaFrench citizen. His talk
was aimed at explaining how poorcodingofprograms could beawaytoattacka
system vice tryingto break theencryption algorithm. Essentially, exploiting bugs
tobreak-in/manipulateadeviceorsystemvicetryingtoexploittheencryption
algorithm, such as AES or 3DES.T^e devices he demo'dwere the MXI Stealth
(aFIPSI42-3IeveI2certified USB flash drive), the EISSTE-Capsule(an
electronic safe for data), and the Data BeekerI^rivate^afe(anothereleetronie
safe). Duringhis demo, he showed how he could break^in to the devices, by
reverse engineering the code using publically available Hex Editors and
commercial tools. He used the poorly written code to obtain access to the
devices.
a. ^i^F)(l^//F01^0) Analysis. Based on thedemonstration, standard
crypto algorithms, such as, AESand3DES are very secure ifimplemented
correctly. Theywill thwart any currenttypeofbrute force attack.
However,iftheprogrammer does not implement the crypto correctly,the
deviceorprogram can beexploited or access can beobtained. The crypto
SECRET//NOFORN—
UNCLASSIFIED//FOROFFICIALUSEONLY

l^aofiifigB_0041^54^

17226

5ECRET//N0F0RN
UNCLASSIFIED//FOROFFICIALUSEONLY
will remain unbroken, but the device or software can be broken because of
poorimpl^entation and reverse engineering,
b. (^//NF)(1^//F01^0) Countermeasure. EnsurethatUSB devices, that
are relied on to provideadegreeofsecurityusing crypto, are certified by
the NSA or other agencytoensurethatthey are indeed secure and ^ee
^mbeingreverseengineered. Simplybuyinga^^secureUSB"device
^ m the PX is not an option ifit not approved. Guard the keys to decrypt
the device likeapassword and do not write them down. Use complex
passphrases to secure the device andnot an easily guessable word or
phrase.
(1^) T^ran^eens^rshi^: lessons leame^.Toris an acronym forthe The Onion
Router." It isanetwork spread across theglobe and its aim is to provide
anonymity and obscurityto its users. There are seven ^^oot" servers that are
maintained by staffmembersoftor and otherrelaynetworks hubs that users can
setup to host an instance ofTor at their location. Toris becoming ^uite popular
today among many censored users, for example: China and Iran. Because China
and Iran block and filter content,Tor is used to circumventtheserestrictions.Tor
isfurtherbecomingmoreofahard-to-pin-downanonymizer. RogerDingledine
was the speaker. He gave the current state ofTor in the world and how it was
being utilized. Even af^er China attempted to blockTor, the network evolved as
is still able to function despite the blockage. An alarming statement made by one
ofhis colleagues was that ^^e"^^shouIdgetjobs at Cisco, Symantec and other
securitycompaniestofindoutwhattheirintentionsareforbuildingthesesecurity
appliances(firewalls, IDS, etc) and leak them to WikiLeaks." His colleague
blamed the securityvendorsfi:^rmaking it easy fi:^r governments to censorits
people and thus the need to find out why and how theyweregoingto develop the
next device to make filtering easier for an organization. Hefi^erw^tontosay
that knowing why and how they are filtering will allow ^^the community" to
respond by catering securityappliances toward organizations (businesses)and not
governments fi:^r censorship.
a. ^^(l^i^i^^^(I^/^01^0) Analysis.TorisanefIectivetoolthatp^^^
browser anonymity and obscurity on the Intemet. It is 8^ee software
available to the world. The threat it poses is that it makes itverydif^cult
to know wherecertain traffic is coming 8^om. ForexampIe,amalicious
attacker could useitto obscure his or her IP address.
MARFOREUR/AF's systems could be attacked by China and we would
not know where they are coming ^om. The threat posed by this is not
necessarily and insider one, it is primarily an outside threat. It would
make it very difficult to monitor traflic of an individual/organization
utilizingTor.
b. ^(^(ll//FOUO)C^untermeasure. Atthis point, there is notmuch in
the way of defenseas the ^^standard" filtering ofTortrafl^ccan be
circumvented by way of usingarelaycircuitwithintheTornetwoi^.
^ECRETZ/NOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY

^aofiifigB^0041^54^

17227

^^ECRET/ZNOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
Educate the users and the IA personnel on the power ofTorto hide where
attacks may be coming ^om.
(U^SCCPhaeking^attackingtheSS7^SlGTl^ applications ousted
further an^ mapping the ^h^ne system. In this talk, Philippe Langolis
discussed the current state ofthe phone system. Hesaid,^^SS7 is like TCP/IP in
thel990s.Itused to be i^uiteasecure network because nobody outside the
organizations (here, the mobile operators and telecom companies) were connected
to it. Now it^s getting interconnected to new actors which are not that trustworthy.
He fi^erwent on to saythat the Blue Box (used togenerate tones which can
access the ^^supervisory" function ofthephonesystem. From there, additional
tonescanbeused to generate desired eflects) is makingacome back. There^sa
world beyond pure SS7: the phone system applications themselves and most
notably what transforms phonenumbers into telecom addresses(also known as
Point Codes, DPCs and OPCs; Subsystem Numbers, SSNs and othervarious
fun.), and that^s called Global Title Translation. Few peopleactuallyrealize that
thenumbers they arepunching on theirphoneareactuallythe same digits that are
used fi:^rthis critical translation fiinction, and translate these into themythical
DPCs, SSNs and IMSIs.Moreandmoredatais now goingthrough the phone
netwo^, creatingmore entry point forregular attars to happen: injections,
overflow,DoS by overloading capacities. The mobile part is openingup, thanks
to involuntary support 8^om Motorola, Apple and Android."
a. (U^Analysis.Theattack surface for GSM is increasing daily. With more
entry points, the technology is at the tip ofthe security nightmare iceberg.
More securityproblems will ensue in the next few years.
b. (1^ Countermeasure. N/A.
7. (l^)DD^S/b^tnetmitigation^hostingonlineeommunities.ThistaIk
discussed the ^^business" of running an online community,suchas,asocial
network, newsgroup, etc. The discuss honed in on what needs to happen while
experiencingaDenialofService (DoS) attack. Essentially,the speaker stressed
the need to haveagood relationship with the ISP orwebhosting service incase
something out ofthe ordinary should happen.
a. (^Analysis.This discussion was relatively inert; however, it does go to
show that the sophistication ofsome ofthe ^^derground" online
communities are looking at hosting as more ofabusiness—in such to keep
their communities up incaseofadisaster or attack.
b. (1^ Countermeasure. N/A.
^. ( f u s i n g OpenBSCforfu:^ng of GSM^han^sets. More tools are available to
attackers looking to exploitingtheGSM netwoi^.Thisdiscussionpainted the
picture as to the current state ofthe GSM attack surface. The GSM protocol stack
^^ECRETZ/NOFORN—
UNCLASSIFIED//FOROFFICIALUSEONLY

l^aiifiifigB^00412550

17228

5ECRET//N0F0RN
UNCLASSIFIED//FOROFFICIALUSEONLY
isacommunications protocol stack like any other. There are many layers of
protocols, headers, TL^^s, length fields that can ^^accidentally^^ be longer or
shorterthan the actual content. There are timers and statemachines.Wrong
messages can triggerinvalid state transitions. This protocol stack inside the
telephoneis implemented inCIanguageon the baseband processoronareal-time
operating system without anymemoryprotection. This flaw means that the attack
surface is increased; especiaIIy,becauseofOpenBSC. OpenBSC isatool that is
^eelyavailable that can be used for GSM protocolhacking.
a. ^^^(8i^i^^(l^//F01^0)Analysis.GSMnetworkshave,forthemos^
been offlimits for attackers(phreakers)historicalIy speaking. With the
release ofthese^eelyavailableGSM protocol tooIs(OpenBSC), the
avenues for attacking GSM hasgreatlyincreased. This could bea
precursor forasecurity nightmare on the GSM network. Expecttosee
moreattacks on the GSM network in the nearfuture.
b. ^(S//NF)(ll//F01^0)Countermeasure.Enfi:^rcingOPSECand
INFOSEC training isamust. As the GSM network can be attacked by
anyone not only fi:^reavesdropping, but for denying service. Consider
using secure Iridium phones whenever practical.
9 (II) ^^Yes^eCan^tl^-onldleptographyan^ cryptovirology. What is
kleptogr^hpy and cryptovirology? IGeptography(the art of employing public key
cryptographymaliciouslyaspartofamalwareatta^,suchasinransomware)and
thereIatedcryptoviroIogy(the art of embedding cryptographic Trojans inside
tamper-proof cryptosystems). Duringthis talk Dr. MotiYung discussed some of
therealitiesofthese threats. Hedidn't go into detail ofhow to employ the two,
but he did underscorethesecuritythreatthatthe two malicious attacks can
present.Thisisaninstancewheresomethingthatwasdevelopedtobringsecurity
and peaceofmindhasbeenmanipulated into somethingthat an attacker can use
to blackmail and/or attack withoutmuchefldrt.
c. (l^)Analysis.These two attacks are veryserious and can be difficult to
attack and remedy. Traditional virus signatures will haveahard time
recognizing cryptovirology. Phishing attacks, especially brought on by
poorOP^ECandPII practices,
make this attaekeasierto be
conducted.
d. ^(^(l^//F01^0) Countermeasure. Ensure that users are briefed about
phishing and spearfishing attacks. I^eep virus definitions up-to-date and
ensure that email signatures are being utilized within MARFOREUR/AF.
At home, do not open email that you do not know the sender. Beweary,if
adeal sounds toogood to be true, it most likely is.
10. (11) Black Ops ofPl^.This talk wasgiven by Dan l^^aminsky. He isa
penetration tester ^rasecurity company in the US. He made the case fi:^r the
insecurity ofPI^I on the Intemet. Mainly, because ofthe lack oftrusted
SECRET//NOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY

l^afifiifigB_0041^551

17229

^ECRETZ/NOFORN
UNCLASSIFIED//FOROFFICIALUSEONLY
certificateauthorities—it is fartooeasytoobtaina^^alid" certificate. Further, he
explained some ofthe common ways tomas^ueradeasavalidcertificatein
several different web browsers (IntemetExpIorer being one). He went on to
praisetheDoD for havingaworkingPI^I system. Fortheopen Intemet, he said
he had hope in Secure DNS inhopefuIIycu:ibingthenumberof
invalid/unauthorized certificateauthorities.BasicaIIy,makingitharderto obtain
acertificateand makingP^I more secure.
a. (1^ Analysis. Secure DNS will help with the issueofcertif^cateauthority
on the Intemet. It is scheduled to be released within about six months.
The current state is that Pinion the Intemet should not be considereda
means to identify an entity oruser is who they saytheyare.The DoD
should continueto implement and secure the PI^ICAs to ensure the
in^astructure validity.
b. (11^ Countermeasure. Ensure thatusers at MARFOREUR/AFareaware
that the Pinion the Intemet is notthesameasPI^I within the DoD. It is
notsecure,so do not trust it like you wouldatwork. Not to say it cannot
be trusted, it justneeds to be scrutinized more.
(l^Conelusion.The Chaos Communication Congress 26C3 Here Be Dragons
conferencewasagood security conference to attend. It explored the ^^out-of-band"
securityissues faced bysystems currently employed bythe world and specifically, the
DoD(MARFOEUR/AF). Theconfi^renceprovidedagood means to observe the hacker
communityinEurope. Thetalksprovidedinterestingandthoughtprovokingsecurity
discussions which can be used to provide awareness at MARFOREUR/AF. FromwhatI
gathered, there were no impending direct attacks (hacks)on US Persons or
MARFOREURattheconference.

M. J. HOSBURGH

• SECRET//NOFORN
UNCLASSIFIED//FOR OFFICIAL USE ONLY

ManningB_00412552

. . 17230

INSCOM Review 000002

F6RN-
(UNCIASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)



ACIC Home

(U) Online Reference to Foreign
Intelligence Services, Insurgents, or Terrorist Groups?

NGIC-2381-0617-08

Information Cuto? Date 28 Februmy 2008
Publication Date: 18 March 2008

National Security Information
Unauthorized Disclosure Subject to Criminal Sanctions

Derived ?om: Multiple sources
on: Source documents marked 25X 1
Date of source: 20060 725

This Cotmterintelligence Analysis Report is published under the auspices of the Department of
Defense Intelligence Analysis Program (DIAP).

Prepared by:

Michael D. Howath

Cyber Counteiintelligence Assessments Branch

Army Counterintelligence Center

External Coordination: National Ground Intelligence Center?j

This product responds to HQ, Department of Army, production requirement
ACIC Product Identification Number is RBO8-0617.

|?ack to Ta_ble of Contents]
(U) Purpose

(U) This special report assesses the countenntelligence threat posed to the US Army by the
Wikileaksorg Web site.

to Table gf




.
UPON REMOVAL OF 1 0f32 0
PROSECUTION EXHIBIT 33

ManningB_00378091

. . 17231

INSCOM Classi?cation Review 000003


(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

(U) Executive Summary

(-SHHF-) Wikileaks.org, a publicly accessible lntemet Web site, represents a potential force
protection, counterintelligence, operational security (OPSEC), and information security
(INFOSEC) threat to the US Army. The intentional or unintentional leaking and posting of US
Army sensitive or classi?ed information to Wikileaks.org could result in increased threats to
personnel, equipment, facilities, or installations. The leakage of sensitive and classified
information also calls attention to the insider threat, when a person or persons motivated by
a particular cause or issue wittingly provides information to domestic or foreign personnel or
organizations to be published by the news media or on the Internet. Such information could be of
value to foreign intelligence and security services (F ISS), foreign military forces, foreign
insurgents, and foreign terrorist groups for collecting information or for planning attacks against
US force, both within the United States and abroad.

The possibility that a current employee or mole within or elsewhere in the US
government is providing sensitive information or classified information to Wikileaks.org cannot
be ruled out. Wikileaks.org claims that the ?leakers? or ?whistleblowers? of sensitive or
classi?ed documents are former US government employees. These claims are highly
suspect, however, since Wikileaks.org states that the anonymity and protection of the leakers or
whistleblowers is one of its primary goals. Referencing of leakers using codenames and
providing incorrect employment information, employment status, and other contradictory
information by Wikileaks.org are most likely rudimentary OPSEC measures designed to protect
the identity of the current or former insiders who leaked the information. On the other hand, one
cannot rule out the possibility that some of the contradictions in describing leakers could be
inadvertent OPSEC errors by the authors, contributors, or Wikileaksorg staff personnel with
limited experience in protecting the identity of their sources.

(U) The stated intent of the Wikileaksorg Web site is to expose unethical practices, illegal
behavior, and wrongdoing within corrupt corporations and oppressive regimes in Asia, the
former Soviet bloc, Sub-Saharan Africa, and the Middle East. To do so, the developers of the
Wikileaks.org Web site want to provide a secure forum to where leakers, contributors, or
whistleblowers from any country can anonymously post or send documentation and other
infonnation that exposes corruption or wrongdoing by governments or corporations. The
developers believe that the disclosure of sensitive or classi?ed information involving a foreign
government or corporation will eventually result in the increased accountability of a democratic,
oppressive, or corrupt the government to its

Anyone can post information to the Wikileaks.org Web site, and there is no editorial
review or oversight to verify the accuracy of any information posted to the Web site. Persons
accessing the Web site can form their own opinions regarding the accuracy of the information
posted, and they are allowed to post comments. This raises the possibility that the Wikileaks.org
Web site could be used to post fabricated information; to post misinformation, disinformation,
and propaganda; or to conduct perception management and influence operations designed to
convey a negative message to those who view or retrieve information from the Web


(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 2 of 32

ManningB__00378092

. . 17232

mscou Classi?cation Review
SEC
(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

(U) Diverse views exist among private persons, legal experts, advocates for open government
and accountability, law enforcement, and government o?icials in the United States and other
countries on the stated goals of Wikileaks.org. Some contend that the leaking and posting of
information on Wikileaks.org is constitutionally protected free speech, supports open society and
open government initiatives, and serves the greater public good in such a manner that outweighs
any illegal acts that arise from the posting of sensitive or classi?ed government or business
information. Others believe that the Web site or persons associated with Wikileaks. org will face
legal challenges in some countries over privacy issues, revealing sensitive or classi?ed
government infonnation, or civil lawsuits for posting information that is wrong, false,
slanderous, libelous, or malicious in nature. For example, the Wikileaks.org Web site in the
United States was shutdown on 14 February 2008 for 2 weeks by court order over the publishing
of sensitive documents in a case involving charges of money laundering, grand larceny, and tax
evasion by the Julius Bare Bank in the Cayman Islands and Switzerland. The court case against
Wikileaks.org was dropped by Julius Bare Bank, the US court order was lifted and the Web site
was restored in the United States. Efforts by some domestic and foreign personnel and
organizations to discredit the Wikileaks.org Web site include allegations that it wittingly allows
the posting of uncorroborated information, serves as an instrument of propaganda, and is a front
organization of the US Central Intelligence Agency

The governments of China, Israel, North Korea, Russia, Thailand, Zimbabwe, and
several other countries have blocked access to Wikileaks.org-type Web sites, claimed they have
the right to investigate and prosecute Wikileaks.org and associated whistleblowers, or insisted
they remove false, sensitive, or classi?ed government information, propaganda, or malicious
content from the Internet. The governments of China, Israel, and Russia claim the right to
remove objectionable content from, block access to, and investigate crimes related to the posting
of documents or comments to Web sites such as Wikileaks.org. The governments of these
countries most likely have the technical skills to take such action should they choose to do

Wikileaks.org uses trust as a center of gravity by assuring insiders, leakers, and
whistleblowers who pass information to Wikileaks.org personnel or who post information to the
Web site that they will remain anonymous. The identification, exposure, or termination of
employment of or legal actions against current or former insiders, leakers, or whistleblowers
could damage or destroy this center of gravity and deter others from using Wikileaks.org to make
such information public.

|Back to Table of Contentsl

(U) Key Judgments

Wikileaks.org represents a potential force protection, counterintelligence,
OPSEC, and INFOSEC threat to the US Army.

a Recent unauthorized release of sensitive and classi?ed documents provide
FISS, foreign terrorist groups, insurgents, and other foreign adversaries with potentially
actionable information for targeting US forces.

The possibility that current employees or moles within or elsewhere in the
US government are providing sensitive or classi?ed information to Wikileaks.org cannot

SEHETIHVUFUE1
(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 3 of 32

ManningB_00378093

. . 17233

mscou Classification Review

(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

be ruled out. The claim made by Wikileaksorg that former US government employees
leaked sensitive and classi?ed information is highly suspect, however, since
Wikileaks.org states that the anonymity of the whistleblowers or leakers is one of its
primary goals.

The Wikileaksorg Web site could be used to post fabricated information,
misinformation, disinformation, or propaganda and could be used in perception
management and in?uence operations to convey a positive or negative message to
specific target audiences that view or retrieve information from the Web site.

Several countries have blocked access to the Wiki|eaks.org Web site and
claim the right to investigate and prosecute Wikileaksorg members and whistleblowers
or to block access to or remove false, sensitive, or classified government information,
propaganda, or other malicious content from the Internet.

WikiIeaks.org most likely has other sensitive and classi?ed information
in its possession and will continue to post the infonnation to the Wikileaksorg Web site.

Web sites such as Wikileaks.org use trust as a center of gravity by protecting
the anonymity and identity of the insiders, leakers, or whistleblowers. The identification,
exposure, termination of employment, criminal prosecution, legal action against current
or former insiders, leakers, or whistleblowers could potentially damage or destroy this
center of gravity and deter others considering similar actions from using the
Wikileaksorg Web site.

(U) Table of Contents

Pu ose
(U) Executive Summary

(U) Key Judgments
ll) Backggound
Dis sion

(U) Intelligence Gaps
U) Conclusions

(U) Point of Contact

Referenees

Appendix A: Gloss_a_r;y
(U) Appendix B: Methodology Used by Authors for Analysis of Leaked Tables of

Equipment for US Forces in Iraq and

(U) Tables

(U) Tgble l. Abbreviated Listing of the Iraq Transition Team (UIC - M94216) Table of
Quipment (TOE)

UT l2.D "v En FileandHwiiC bWikil
the NGIC Report Entitled Complex Environments: Battle of Falluiah I, April 2004?
posted on its Web _s_i_t_e


(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 4 of 32

ManningB_00378094

. . 17234

INSCOM Classi?cation Review 000006


(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)
(U) Figures

(U) Firmre 1. M33A1 Bulk CS Chemical Dispenser
0 Figure 2. Map from Page 4 of NGIC Report Entitled Complex
Environment Battl of allu'ah A ril 2004? As Published in a Wikileaks.or Ar1ic| .



[l_3_agk to Table of Contentsl

(U) Background

Wikileaksorg was founded by Chinese dissidents, journalists, mathematicians, and
technologists from the United States, China, Taiwan, Europe, Australia, and South Africa. Its
Web site became operational in early 2007. The advisory board for Wikileaks.org includes
journalists, a ?former US intelligence analyst,? and expatriates from Chinese,
Russian, and Tibetan refugee communities. The ACIC does not have any information to
associate or link the ?former US intelligence analyst? on the Wikileaks.org advisory board with
the leakage of sensitive or classi?ed documents posted to the Web

(U) Wikileaks.org claims to have developed an uncensorable version of the publicly available
Wikipedia interface that is intended for mass leakage of sensitive documents that expose
wrongdoing and for allowing users to comment on the documents posted to the Web site.
Through its Web site, Wikileaks.org encourages large-scale anonymous leaking and posting of
sensitive and con?dential govemment and business documents on the Internet. Wikileaks.org
claims to have received more than 1.2 million documents from dissident communities and
anonymous sources throughout the world. If true, additional articles involving sensitive or
classified will most likely be posted to the Wikjleaks.org Web site in the

Wikileaks.org uses its own coded software combined with Wiki, MediaWiki,
reeNet, TOR, and PGP to make it difficult for foreign governments, FISS, law enforcement
agencies, and foreign businesses to detennine where a leaked document originated from and who
was responsible for leaking the document. The goal of Wikileaks.org is to ensure that leaked
information is distributed across many jurisdictions, organizations, and individual users because
once a leaked document is placed on the Internet it is extremely difficult to remove the document


The obscuri?ca?on technology[_S? used by Wikileaks.org has exploitable vulnerabilities.
Organizations with properly trained cyber technicians, the proper equipment, and the proper
technical software could most likely conduct computer network exploitation (CNE) operations or
use cyber tradecraft to obtain access to Wikileaks.org?s Web site, information systems, or
networks that may assist in identifying those persons supplying the data and the means by which
they transmitted the data to Wikileaks.org. Forensic analysis of unclassi?ed and classi?ed
networks may reveal the location of the information systems used to download the leaked
documents. The metadata, MD5 hash marks, and other unique identifying information within
digital documents may assist in identifying the parties responsible for leaking the information. In


(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 5 of 32

Mann'ngB_00378095

. . 17235

INSCOM Classi?cation Review

UPON REMOVAL OF REFERENCES)

addition, patterns involving the types of leaked information, classi?cation levels of the leaked
information, development of pro?les, and inadvertent attribution of an insider
through poor OPSEC could also assist in the identification of insiders.

(U) Wikileaksorg supports the US Supreme Court ruling regarding the unauthorized release of
the Pentagon Papers by Daniel Ellsberg, which stated that ?only a free and unrestrained press can
effectively expose deception in govemment.? The Wikileaks.org Web site further states the
following:

?We aim for maximum political impact. We believe that transparency in
government activities leads to reduced corruption, better government, and
stronger democracies. All governments can benefit from increased scrutiny by the
world community, as well as their own people. We believe this scrutiny requires
information. Historically that information has been costly?in terms of human life
and human rights. But with technological advances?the Internet, and
risks of conveying important information can be

(U) The OPSEC measures used in the submission of leaked information to Wikileaks using the
lntemet are designed to protect the identity and personal security of the persons or entities
sending or posting information to the Web site. Wikileaks.org claims that any attempt at trace
routing of IP addresses, MAC addresses, and other identifying information of a home computer
submissions (as opposed to cyber caf? submissions) through Wikileaks.org?s Internet submission
system would require a knowledge of information available only to Wikileaksorg programmers
and to a rights organization serving the electronic community, or would require specialized
ubiquitous traffic analysis of Intemet messages and routing systems. Nevertheless, it remains
technically feasible for FISS, law enforcement organizations, and foreign businesses that have
the motivation, intentions, capability, and opportunity to gain online access or physical access to
Wikileaks.org information systems to identify and trace whistleblowers through cyber
investigations, advanced cyber tools, and forensics.[Q]

(U) Another method of posting leaked information to the Web site anonymously is for leakers to
use postal mail to send the information to volunteers in various countries who have agreed to
receive CDs and DVDs from leakers. These volunteers then forward the information
to designated personnel, who then upload the data on the CDs and DVDs to the Wikileaksorg
Web servers. To protect or mask the sender, leakers can take OPSEC measures such as using
Wikileaks.org protocols when writing CDs and using gloves while wrapping,
taping, handling, and mailing packages; and not including a retum address or including a fake
return address on packages containing leaked information. Such measures are designed to protect
the identity of the leakers and prevent ISS, law enforcement, and postal inspectors from
intercepting the mail and decoding the information on the data storage devices in transit.
Wikileaks.org also claims that it is developing easy-to-use software to the CDs and
DVDs. Use of such methods also protects facilitators or intermediaries from harm because they
would not know the content of the submissions. L111

(U) A Wikileaksorg spokesperson stated in early January 2007 that about 22 persons are
involved in the Open Society Initiative to make governments and corporations more accountable


(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 6 of 32

ManningB_00378096

. . 17236

INSCOM Classi?cation Review
-S??lli??ili?it?-GRIN-
(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

to the citizens of the world. Wikileaks intends to seek funding from individual persons and
groups such as humanitarian organizations that fund sociopolitical activity intended to promote
democracy and human rights around the world through open access to government and business
information.L1_3_]

Several foreign countries including China, Israel, North Korea, Russia, Vietnam, and
Zimbabwe have denounced or blocked access to the Wikileaks.org Web site to prevent citizens
or adversaries from accessing sensitive information, embarrassing information, or alleged
propaganda. The governments of China, Israel, and Russia have asserted that they have a right to
remove from the Internet protected government information, disinformation, and propaganda that
is intended to embarrass or make false allegations against their governments. China, Israel, North
Korea, and Russia are assessed to have state-sponsored CNE, computer network attack (CNA),
and cyber forensics capabilities that would most likely allow penetration or disrupt viewing of
the Wikileaks.org Web site. China, Israel, and Russia have used or are suspected of having used
CNA to target terrorist or dissident Web sites that have posted objectionable material intended to
embarrass, harm, or encourage terrorism or opposition to the

lBac_l? to Table of Contents]

(U) Discussion

An insider could present a potential force protection, counterintelligence, OPSEC, or
INF OSEC threat to the US Army through deliberate unauthorized release of official
documents and posting of sensitive or classified information to the Internet. Several recent
postings to the Wikileaksorg Web site in November 2007 of sensitive US Army information
marked OFFICIAL USE ONLY and in December 2007 of US Army
information classi?ed highlight the insider threat to The actual
perpetrators responsible for the unauthorized released of such documents could be subject to
administrative action, nonjudicial punishment, or criminal charges and prosecution if they are
identi?ed.

(U) Wikileaks.org Analysis of US Army Tables of Equipment in Iraq and
Afghanistan from April 2007

(U) Wikileaks.org speci?cally cited 2,000 pages of leaked US Army documents with information
on the Tables of Equipment (TOEs) for US and Coalition forces in Iraq and Afghanistan as a
perfect example of the sort of infonnation that would bene?t from a global analysis. These
documents provided information on the US forces, a description of equipment and total number
of equipment that were assigned to actual military units assigned to US Central Command in
April 2007. Wikileaks.org staff members and various authors and contributors have written
numerous news articles and posted the raw data in spreadsheets or Structured Query Language
(SQL) data base so anyone can examine the information, conduct research, comment upon,
discuss the various units, see the items of equipment, see what they do, and draw their own
conclusions about the strategic, political, military, and human rights significance of the



(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 7 of 32

ManningB_00378097

. . 17237

INSCOM Classi?cation Review 000009




(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

Table 1 below is an abbreviated sample of information contained in a leaked digital
database document or spreadsheets available on the Wikileaksorg Web site:

[Back to Table of Contents]

(U) Table 1. Abbreviated Listing of the Iraq Transition Team (UIC - M94216)
Table of Equipment (TOE). j?l



15
5 1* AI

RED, 2

. . . COMM

?M94216?72113z ?581oo1X111126 WARLOCK RED, ECM: RED ,v TPE 13
EDO COMM
. in 9
COMPAS MAGNETIC UNMTD VTPE 3

;5.8550lE+12 HP ITPEAN 6

INSERTSENHANCED SM @4111
;s.47oo2E+12 SM JPE ?49
?M94216?J8s7o5 ?s.47oo2E+12 SM 58
?s.47o02E+12 SM 49
?1.o05E+12 3
?1.oo5o1E+12 MACH GUN TPE 2
?M94216;Mo9oo9; MACH GUN S.56MM M249 TPE 3
?1.o1oo1E+12 MACH GUN MK64 MOD9 TPE 1
TPD MG CAL .50 M3 ETPE 1
MACH M24013 TPE 2
II 1.
533942161: New II 1 .N.. 1 18 II
?i49421?lT924?i6b?2?32001E+12 11 II
TPE ;3
11111111111 A 11111111111 1 1
11111111



(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 8 of32

ManningB__00378098



. . 17238

INSCOM Classi?cation Review 000010

1.1111.?


UPON REMOVAL OF REFERENCES)

Unit Identi?cation Code, a six-character, alphanumeric code that uniquely identi?es each
?Active, Reserve, and National Guard unit of the US Armed Forces.

Line Item Number for equipment.

NATO Stock Number, a standardized stack identi?cation number for supplies and
gequipment within the North Atlantic Treaty Organization).

iltem Name - Brief description of the equipment.

Property Book Identi?cation Code, which categorizes the type of property listed into one
fof 10 categories.

?Type (of equipment):

TPE Theater Provided Equipment; speci?c equipment that is provided by the
Theater of Operations such as CENTCOM to perform the mission based on the
unique operating environment

LTT Long Term Training; equipment need for long term training or
deployment.

APS Army Prepositioned Stock; equipment drawn by a unit that is already
prepositioned in the Theater of Operations.

DND Do Not Deploy; this ?eld is a Yes/No column that lists equipment that remains at the
ghome station and is not deployed with the unit when sent overseas.

Qty On-hand Quantity is the number of item of equipment that is currently available to the
gunit; it does not necessarily represent the actual required number needed by the unit to be ?rlly
?mission capable







The foreign staff writer for Wikileaks.org, Julian Assange, wrote several news articles,
coauthored other articles, and developed an interactive data base for the leaked documents. In
addition, other Wikileaks.org writers and various writers for other media publications wrote
separate news articles based on the leaked infonnation posted to the Web site. Assange and his
coauthors claim that the 2,000 pages of leaked US military infonnation provides unit names,
organizational structure, and tables of equipment (TOEs) for the US Army in Iraq and
Afghanistan. They also claimed that unidenti?ed persons within the US government leaked the
information to facilitate action by the US Congress to force the withdrawal of US troops by
cutting off funding for the warl?l

Assange and other Wikileaks.org writers purport that the leaked sensitive TOE
information reveals the following:



(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 9 of 32

ManningB_00378099

. . 17239

Classi?cation Review 000011



(uNcLAssII=IEDm=oii5"uPoN REMOVAL OF REFERENCES)

- Secretive US document exploitation centers.

- Detainee operations and alleged human rights violations.

0 Information on the US State Department, US Air Force, US Navy and US Marines units,
Iraqi police and coalition forces from Poland, Denmark, Ukraine, Latvia, Slovakia,
Romania, Armenia, Kazakhstan, and El Salvador serving in Iraq and Afghanistan.

Nearly the entire order of battle for US forces in Iraq and Afghanistan as of April 2007.

Alleged revelations that the US government violated the Chemical Weapons Convention
in Iraq and Afghanistanl?]

Wikileaks.org encouraged persons to comment on the leaked Army documents and
explained how the catalogued information and cross-referenced databases could be used by other
researchers or journalists to prepare reports or assessments. According to Wikileaks.org, the
information posted can be used to prepare objective new reports. Conversely, this same
information could be manipulated to prepare biased news reports or be used for conducting
propaganda, disinformation, misinformation, perception management, or in?uence operations
against the US Army by a variety of domestic and foreign actors.

(U) Assange and other Wikileaks.org writers developed and applied a speci?c methodology for
examining and analyzing the leaked TOE information, a methodology they then placed online to
assist others in conducting their own research. See Appendix B. They also provided links to
associated online reference material. The methodology used by Assange and other authors for the
analysis of leaked tables of equipment for US Forces in Iraq and Afghanistan both a SQLite
database is described in Appendix B.

The TOEs for US Army units deployed to Afghanistan and Iraq in April 2007 provide a
wealth of information that could be used by FISS, foreign terrorist groups, and Iraqi insurgents to
identify unit capabilities and vulnerabilities that could assist in conducting attacks against camps,
convoys, and other targets. The information can also be compared with other publicly available
databases to develop extensive order of battle ?les of vehicle types, communications and
jamming equipment, information systems, and weapons systems, ?les that could be used to
determine the capabilities, limitations, and vulnerabilities of the organic equipment assigned to
military units. Such information could aid enemy forces in planning terrorist attacks, selecting
the most effective type and emplacement of improvised explosive devices (IEDs), building
triggering devices to defeat countermeasures organic to friendly units, and selecting the most
effective direct and indirect weapons systems for conducting physical attacks against targets such
as military units, convoys, and base camps.

(U) One Wikileaks.org news article also discusses the use of IEDs by foreign terrorists and
insurgent groups and claims that the IED threat has resulted in a shift in ?inding priorities,
similar to the Manhattan Project to develop atomic weapons in World War II, for current
research, development and ?elding of IED countermeasures through the Joint IED Defeat
Organization. In addition, the author of the article attempts to provide a cost-to-bene?t analysis
of these IED tactics and countermeasures. The author claims that the leaked information reveals
that 12,097 Warlock, Counter RCIED (Remote-controlled Improvised Explosive Device)
Electronic Warfare (CREW), systems are in Iraq and that the purpose of the Warlock is to jam
radio signals from devices such as mobile phones to prevent such signals from detonating IEDs.


1 1' I11

(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 10 of 32

ManningB_0O378100

. . 17240

INSCOM Classi?cation Review 000012

Jill?

(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

The author claimed that 7,530 systems used in Iraq were purchased at a cost of $1.1 billion. No
claim was made regarding the cost of remaining 4,567 systems.

The author of the above-mentioned article incorrectly interprets the leaked data
regarding the components and ?elding of the Warlock system, resulting in unsupportable and
faulty conclusions to allege war pro?teering, price gouging and increased revenues by
contractors involved in counter-[ED development efforts. This article provides an example of
how the leaked TOE information can be manipulated and misinterpreted to produce inaccurate
information for a news article.

(SANF-) The author of the article then argues that the US Army receives a poor return on its
investment in counter-IEDs. The following excerpt from the article could be used by adversaries
in potential propaganda or in?uence operations:

If we view IEDs as a rebel investment, to which the United States must pay
dividends in defensive equipment costs, then every insurgent dollar spent has a
return on investment of somewhere around a thousand fold. Signi?cant price
gouging by counter?IED defense contractors is evident. For comparison, each
briefcase-sized ?Warlock? IED jammer, of which is there is on average more than
one per vehicle, is worth $150,000; however, as can be seen by this analysis that
is more costly than nearly every vehicle it was designed to protect. The
?Warlock? producer, a defense contractor [name redacted], predicts
?nancial year 2007 will see a 400 percent total revenue increase over its 2003
levels.[g?

Intelligence indicates that insurgents in Afghanistan have recovered several Warlock
systems.| 22| It is possible that Warlock systems captured in Afghanistan were sent to Iran for
reverse engineering and for use in developing countermeasures to Warlock.

Were a Warlock system successfully reversed engineered or countermeasures
successfully developed by foreign terrorists, insurgents, or the Iranian government, US and
Coalition forces would be at greater risk of RCIED attacks, especially those units equipped with
Warlock systems similar to those that had been captured and exploited. It is also possible that
any countermeasures developed to defeat the Warlock system would be provided to the aysh al-
Mahdi (JAM) and other anti-US insurgent or terrorist groups operating in Iraq and Afghanistan.
The TOEs could be used to identify and target speci?c units equipped with the same type of
Warlock systems for which countermeasures had been developed.

(U) The Wikileaks.org authors believe that the leaked documents list Army equipment held by
the US Army, Marines, Air Force, Coalition, and possibly CIA units in Iraq and Afghanistan as
of April 2007. The authors stated that the data only includes items registered with battle planning
systems for logistics and appears to cover most valuable major end items of equipment. The data,
according to the authors, does not include soldiers? combat pay, transportation, research and
development, and home station costs of the soldiers, nor does it include most supplies,
ammunition, and other disposable equipment and consumable



(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 11 of 32

ManningB_00378101

17241

INSCOM Classi?cation Review 000013

.1 Iii? \Jl\.l.V

(UNCLASSIFIEDIIFOGO UPON REMOVAL OF REFERENCES)

a1) Wikileaks.org staff personnel allegedly wrote a script or computer program to cross
reference each item in the leaked document with NSNS gleaned from public US logistics
equipment price catalogs from the Defense Logistics Agency GJLA). The authors claim that
$1.112 billion worth of US Army?managed military equipment in Afghanistan is listed in the
leaked documents. The author believed the actual total value of the equipment to be several times

hi

(U) The spreadsheets and list contains codes to identify military units, supply item codes, and
other logistics data. The authors believed that the most useful data ?eld for investigatory
purposes was the NSN. The authors found several Internet sites that allow public searches of the
NSNs, and this information was merged with the TOE into the SQL-generated database on the
Web site. For example, the author speci?cally mentioned NSN catalogues that are publicly
available on the Internet from the DLALE The DLA Web site identi?es many items on the
spreadsheets and includes prices that were merged into the database and used to generate the
estimate for the total value of the

Julian Assange also stated in his news articles involving the TOE information that
persons were welcome to assist in the following future actions and areas of research involving
the equipment listings:

A computer program would be written to expand the military unit abbreviations (for
example, I-II-IC?Headquarters and Headquarters Company) to make is easier for users to
visually analyze entries in the database.

0 Make further comments on military units in the list and their signi?cance. The entries
would be cross linked with available news sources.

0 Make further comments on equipment items in the list and their signi?cance.

0 Expand and improve links and other information for US war-funding legislation and bills.

Attempt to answer questions on speci?c issues with NSN codes. The authors stated that
the NSNs are a 13-digit code. Of those 13 digits, 12 are numeric. The seventh is
alphanumeric, and the publicly searchable NSN database seems to be able to locate items
if they have a number in the seventh place, but, not if there is a letter in the seventh place.
They ask the following questions: 1) What is the signi?cance for this alphanumeric
character in the seventh position? 2) What does a letter as opposed to a number signify?
3) Is there a more complete public database for NSN codes than the one given? 4) Are
these alphanumeric NSNS Management Control Numbers as speculated?

Create an interactive database browser.[21]

(U) Julian Assange and other Wikileaks.org authors continually encourage other persons with an
interest in the information to comment on their work or conduct their own research and publish
the results on Wikileaks.org.

(U) Alleged Violations of the Chemical Warfare Convention Treaty by US
Military in Iraq and Afghanistan

(U) On 9 November 2007, Wikileaks.org published an exclusive investigative report claiming
that the United States ?had almost certainly violated the Chemical Weapons Convention?


1 I'll? ?Jr \Jl.\.lV

(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 12 of 32

ManningB_00378102

0 0 17242

INSCOM Classi?cation Review 000014




(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

(CWC), as originally drafted by the United Kingdom in 1997. The author, Julian Assange,
claimed the deployment of CS (2-chlorobenzalmalononitrile also called Chlorobenzylidene
Malononitrile) munitions and dispensing equipment and weapons capable of ?ring CS gas by the
United States was a violation of the CWC. The author also claimed the United States had at least
2,386 low-grade chemical weapons deployed in Iraq and Afghanistan. These items also appeared
in the 2,000-page listing of nearly one million items of US military equipment deployed in Iraq
and leaked to Wikileaksorg. The items are labeled under the military?s own NATO supply
classi?cation for chemical weapons and equipmentl?]

(U) Prior to the invasion of Iraq in 2003, the Defense Department released an official statement
that President Bush had authorized US military forces to use riot control agents (RCAs) such as
tear gas or CS gas. See Figure 1. The Defense Department stated that tear gas or CS gas, which
was issued to US troops, would be used only to save civilian lives and in accordance with the
CWC, as amended and rati?ed by the United States. Some chemical weapons experts in the
United States and other countries expressed the belief that this 2003 authorization might violate
the CWC treaty. These domestic and foreign critics expressed the belief that any battle?eld use
of tear gas would violate the offend crucial allies, including the United Kingdom and
Australia. In addition, the critics claimed that the usage of CS would provide the Iraqi leader,
Saddam Hussein, a pretext for using chemical weapons against the United States and coalition


UNCLASSIFIED



(U) Figure 1. Bulk CS Chemical Dispenser.

lBack to Table of Contentsl

In the report published on Wikileaksorg, the author claimed that any use of
chemical weapons such as CS gas for military operations is illegal. The Chemical Weapons
Convention of 1997, drafted by the United Kingdom declares ?Each State Party undertakes not
to use riot control agents as a method of warfare.? It only grants permissible use to ?law

I

(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 13 0132

ManningB_OO3781 O3

. . 17243

INSCOM Classi?cation Review 000015

I.

(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

enforcement including domestic riot contro The authors used this interpretation of the CWC
drafted by the United Kingdom to make the allegation that the United States had violated the

treaty. [19]

It must be noted, that US policy as stated in Executive Order No. 11850, 8 April
1975, Renunciation of Certain Uses in War of Chemical Herbicides and Riot Control Agents,
renounced ?rst use of herbicides in war (except for speci?ed defensive uses) and ?rst use of
RCAs in war except for defensive military modes to save lives. In ratifying the CWC, the US
Senate wrote an amendment into its resolution approving the CWC that stated United States?
interpretation of how RCAs might be used for speci?c defensive purposes, as speci?ed by the
1975 Executive Order?l]

(U) Such varying interpretations re?ect a deliberate ambiguity in the CWC, which states that
?riot-control agents may not be used as a method of warfare.? The original CWC and modi?ed
CWC approved by the US Senate, however, does not de?ne this phrase ?method of warfare.?
The actual version of the CWC passed by the US Senate was not considered by the authors of the
report. The CWC rati?ed by the US Senate list exceptions in the usage of RCAs for US military
forces that are not considered by the US government to be in violation of the

(U) In the same report, the authors claimed that the use of white phosphorus by the US military
during the 2004 assault on Fallujah, Iraq, should also be considered a violation of the CWC. The
authors noted, however, that the US Army claimed usage of white phosphorous as ?a smoke
screen? and ?an incendiary? in the Fallujah operation, and that this usage is not technically
covered by the CWC.

(U) Alleged Human Rights Violations Related to Joint Task Force?Guantanamo
Standard Operating Procedures

Another example of leaked information posted to the Wikileaksorg Web site on or
about 7 November 2007 is an outdated copy of the Joint Task Force?Guantanamo, Camp Delta
Standard Operating Procedures (SOP) marked as signed by MG
Miller and dated 28 March 2003. A news article written by Wikileaksorg staff writers, also
posted on 7 November 2007, claims the SOP exposes systematic methods for preventing illegal
combatants and detained prisoners incarcerated at Joint Task Force?Guantanamo facilities at
Camp Delta from meeting with the International Red Cross, as well as the use of extreme
stress as a means of torture against detainees. The unauthorized release of the SOP
has prompted authors posting to the Wikileaks.org Web site to claim that the document proves
the US Army was torturing and violating the human rights of detainees held at Guantanamo Bay.
This SOP was also the subj ect of a lawsuit by international human rights groups and a domestic
civil rights organization requesting the release of the document under the US Freedom of
Information

(U) The author claimed that subsequent US military statements including a spokesperson,
to Reuters News Service and the Miami Herald con?nn the veracity of the JTF SOP document.
On Wednesday, 14 November 2007, a week after the SOP was posted to Web site, Wikileaks.org
claimed that it received an e-mail message from the ?Pentagon? demanding that the



(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 14 of 32

ManningB_00378104

. . 17244

INSCOM Classi?cation Review 000016
(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

documents posted to the Web site be censored and removed from the Web site. The actual
wording of the e-mail message sent to Wikileaks.org requested that the document be
removed from the Web site and that the procedures under the Freedom of Information Act be
used to request release of the SOP.

(U) Leakage of Classi?ed Information to Wikileaks.org

Wikileaks.org also posted a report by the National Ground Intelligence Center (NGIC),
classi?ed entitled (U) Complex Environments: Battle of Fallujah 1, April
2004, (NGIC-1127-7138-06). The NGIC report was the second in a series of reports that
analyzed recent warfare in complex environments such as urban environments. See Figure 2.
The NGIC report discusses enemy use of asymmetric tactics, techniques, and procedures (TTP)
during the Battle of Fallujah in April 2004 and offers many useful lessons learned regarding how
a relatively weak adversary can prevent the United States from accomplishing its military
objectives. Wikileaks.org claims the document was leaked by a source it refers to as ?Peryton,?
who is described as a former employee of NGIC. Both a copy of the actual NGIC classi?ed
report (in PDF) and the Wikileaks.org news article were posted on the Wikileaks.org Web site. A
variety of newspapers, wire services, and other news and media organizations wrote numerous
articles based on the original Wikileaks.org news article and actual classi?ed document posted to
their Web

The possibility that a current employee or mole may exist within or elsewhere in
the US government who is actively providing sensitive or classi?ed information to Wikileaks.org
cannot be ruled out. Nevertheless, the claim that the leaker is a former NGIC employee is highly
suspect, since Wikileaks.org claims that the protection of the anonymity of the ?whistleblower?
or ?leaker? is one of its primary concerns. In addition, this claim could simply be a crude attempt
to mislead investigations into who leaked the document. Use of a code name, incorrect
employment information, or incorrect status are most likely rudimentary OPSEC measures
designed to protect the identity of the current or former ?insider? who leaked the information. In
addition, usage of present and past verb tenses and other contradictions in referencing ?Peryton?
by the Wikileaks author and staff personnel are most likely part of a deliberate deception, but
one cannot completely rule out the possibility that some of these contradictions could be
inadvertent OPSEC errors made by authors lacking experience in protecting their methods or
sources.

Unclassi?ed e?mail addresses and work telephone numbers of the authors and other
persons referenced in the NGIC report were listed in the NGIC document, thus making them
available to members of the news media attempting to verify the leaked information.
Wikileaks.org and some other news organizations did attempt to contact the NGIC personnel by
e?mail or telephone to verify the information. Such efforts by Wikileaksorg to verify the
information are in contravention to its stated policy not to attempt to verify the information it
receives from its sources. Wikileaks.org went forward with publishing their news article based
on the classi?ed NGIC report although they did not receive a response to their inquiry. This is of
interest because some journalists exploit the lack of a response to their inquiries by implying that
a re?1sa.l to respond, failure to respond to a FOIA request, or failure to verify or receive other
information presumes that those failing to respond have something to hide. This further weakens

nJn41.J.J.?.l.d J. LILIL -gags;

(UNCIJ-XSSIFIEDIIFOUO REMOVAL OF of 32

ManningB_003781 05

. . 17245

INSCOM Review OWOI7


(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

the claim that an alleged former NGIC employee leaked the information and strengthens other
possibilities. A former NGIC employee would be regarded by many as a highly credible source
and either taken at his or her word or asked to provide other bona fides to verify the employment
claim. Given the high visibility and publicity associated with publishing this classi?ed report by
Wikileaksorg, however, attempts to verify the information were prudent and show journalist
responsibility to the newsworthiness or fair use of the classi?ed document if they are
investigated or challenged in courtl?l




-hw







The following is a description of themap andiexplanatioin of classi?cation markings

iprovided in the Wikileaksorg article: ?Map from page four of the leaked report on the failed 2004
-
(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 16 of 32



0 17246

INSCOM Classi?cation Review 000018



(UNCLASSIFIEDIIFOLTO UPON REMOVAL OF REFERENCES)

gassault on the Iraqi town of Fallujah, which is situated 40 miles from Baghdad. The report is
iclassi?ed NOFORN means do not share with US allies such as the UK,
?Australia, and Canada. 20310603 is date after which 25 years have elapsed and the document would
inormally be declassi?ed. X1 speci?es that the document is exempt from declassi?cation.?

(-SHN-F-) Figure 2. Map from Page 4 of NGIC Report Entitled U) Complex
Environments: Battle of allujah I, April 2004" As Published in a Wikileaks.org
Article.

|Back to Table of Contentsl

The author on the Wikileaksorg staff published the article using selected excerpts and
used information that was out of context from the actual NGIC report. The article intertwined
classi?ed information from the NGIC report and information gleaned from other news articles in
the open media to strengthen its portrayal of the coalition offensive operations in Fallujah in
2004 as a military and political defeat for the United States. The leakage of this NGIC report
could allow anti-Coalition forces to portray themselves as victors because they success?rlly
manipulated the media coverage in the April 2004 battle to divide the coalition forces politically
and force a halt to the offensive operations. The leaked report could also provide foreign
governments, terrorists, and insurgents with insight into successful asymmetric warfare tactics,
techniques, and procedures that could be used when engaging US or Coalition forces and provide
insight into effective media, information, or in?uence operations that could be used to defeat a
superior enemy.LI?]

(U) The catalogue, indexing and ?ling entry on the Wikileaksorg Web site for the leaked NGIC
document is in Table 2, below. This is the information as posted on the Wiki1eaks.org Web site.

|Back to Table of Contents|

Table 2. Descriptive Entry of the File and How it is Catalogued by
Wikileaks.org for the NGIC Report Entitled U) Complex Environments: Battle
of Fallujah I, April 2004? as Posted on its Web


?Analysis Al Jazeera and Abu Ghraib scuttled US war in Fallujah

:?Summary Classi?ed 2006 report by the US Army National Ground
Intelligence Center. ?Enemy employment of asymmetric tactics, techniques,
and procedures (TTP) during the Battle of Fallujah in April 2004 offers many
use?rl lessons learned in how a relatively weak adversary can prevent the


.1111? ?.113

(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 17 of32

ManningB_00378107

0 17247

INSCOM Classi?cation Review 000019

(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

{File Size 280l44K
ile Info PDF document, version 1.4

?File Identity SHA256
28d7b0dT2T7805749db32f3
-

?Country United States
?Organization US Army National Ground Intelligence Center

4-.-

iorganizalion Military or intelligence (ruling)
319?

lirenryton comment: this is theucode name Wikileaksorg to the
;leaker(s) of the information.]



(U) Technical Skills and Abilities

Wikileaksorg developers and technical personnel appear to demonstrate a high level of
sophistication in their efforts to provide a secure operating environment for whistleblowers
desiring to post information to the Web site. They currently use a variety of indigenously
modi?ed free software to build the Web site and route and secure the transmission of data to
Wikileaks.org.

The construction of a SQL database, the merging of leaked documents, and use of
publicly available tools to glean information from the Web sites of various and private
organizations such as globalsecurityorg and then make the information available in a searchable
format, allowing access to and manipulation of the data and information for research purposes by
users of Wikileaks.org, demonstrate a high level of technical capability and resourcefulness.

The current and future intent of the Wikileaks.org staff and writers is to continue
development of enhanced tools for the manipulation of the 2,000 pages of information on US
forces by visitors to the Web site. Future efforts may include expanding the use of
operational cyber tradecraft, and physical tradecraft in the delivery and transmission of leaked
information for posting to the Wikileaks.org Web site. It is highly likely that transmission
security will improve as new technology, the technical skills of current members, or new funding
sources allow. The purchase of more secure equipment, transmission means, and
protocols is possible if additional financial resources are made available to the organization.

(U) Is it Free Speech or Illegal Speech?

Wikileaksorg allows anonymous publication of information and records without
oversight or accountability; anyone can post information to the Web site, and there is no editorial
review, fact checking, or oversight of the posted information. Persons accessing the Web site are
encouraged to form their own opinions regarding the accuracy of the information and are

I I

(UNCLASSIFIEDIIFOUO UPON REMOVAL OF of 32

ManningB_00378108



INSCOM Classi?cation Review 000020

1 Ill?

(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

allowed to post their own comments. This open policy of posting information and providing
commentary could create multiple legal issues for Wikileaks.org that could subject members to
legal prosecution or civil issues by foreign governments, businesses, and individual
complainants. In addition, some governments may contend that accessing the Web site itself is a
crime, and that shutting down or blocking access to the Web site is a reasonable countermeasure
to prevent viewing or downloading of objectionable content. This situation raises the possibility
that the Wikileaks.org Web site could be deliberately used to post fabricated information; to post
misinformation, disinformation, or propaganda; or to conduct perception management and
in?uence operations designed to convey a negative message to specific audiences.

(U) Diverse views exist within the United States and other countries regarding the stated goals of
Wikileaks.org. Some believe that the leaking and posting of information is constitutionally
protected free speech and supports freedom of the press, open-society initiatives, and
government accountability, and that leaking the information serves the greater good versus any
illegal acts that arise from the posting of sensitive or classi?ed government or business
information. Others believe that Wikileaksorg or individual persons associated with
Wikileaksorg will face legal challenges in some countries regarding the privacy of individuals
and businesses, the revelation of sensitive or classi?ed government information, or the posting of
information that is allegedly wrong, false, slanderous, or libelous. Several foreign companies
have already ?led civil lawsuits in the United States and the United Kingdom for data theft, libel,
and damage to their business reputation for the posting of internal and proprietary company
information to the Wikileaks.org Web site. The Wikileaks.org Web site was temporarily
shutdown in late February 2008 for 2 weeks in the United States by court order over the
publication of sensitive documents in a case involving a potential money laundering, grand
larceny, and tax evasion charges by the Julius Bare Bank in the Cayman Islands and Switzerland.
Julius Bare Bank decided to drop the court case against Wikileaks.org in US courts. The US
court order was li?ed and the Web site was restored in the United States.

(U) In addition, several prominent bloggers have questioned the usage and reliability of the
security of the software used to develop the Web site and to protect communications and
identities of leakers. The motives and methods of the Wikileaksorg developers and members
have been questioned, and several bloggers believe that other Internet forums exist that served
the same ?mction in a more ethical manner. Efforts by some domestic and foreign personnel to
discredit the Wikileaksorg Web site include allegations that it allows uncorroborated
information to be posted, serves as an instrument of propaganda, and is a front organization for
the Central Intelligence Agency (CIA). Wikileaksorg denies these accusations, and no evidence
has been presented to support such

Questions and concerns have been raised by media consultants, ethics experts, and
other journalists regarding the status of Wikileaksorg as a news organization and of its staff
writers as journalists. The contention by some is that Wikileaksorg does not qualify as a news
organization and thus its staff writers are not journalists. Wikileaks.org?s desire to expose alleged
wrongdoing by revealing sensitive or classi?ed government or business information, in effect,
encourages the theft of sensitive or classi?ed proprietary information or intellectual property. In
doing so, some argue, Wikileaksorg is knowingly encouraging criminal activities such as the
theft of data, documents, proprietary information, and intellectual property, possible violation of



(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 19 of32

ManningB_00378109

0 0 17249

INSCOM Classi?cation Review 000021
(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

national security laws regarding sedition and espionage, and possible violation of civil laws.
Within the United States and foreign countries the alleged ?whistleblowers? are, in effect,
wittingly violating laws and conditions of employment and thus may not qualify as
?whistleblowers? protected from disciplinary action or retaliation for reporting wrongdoing in
countries that have such laws. Also, the encouragement and receipt of stolen infonnation or data
is not considered to be an ethical journalistic practice. In addition, the sources of Wikileaks.org
staff writers are not veri?ed, nor are its news articles fact-checked or con?rmed by additional
sources, as customary in news organizations. Moreover, there is no editorial review of the
articles prior to publication. Finally, some critics contend that the staff writers are biased and
have made unsupportable claims to support political agendas to effect change in government or
business policyl?l

CU) Several countries have complained publicly or blocked access to Wikileaks.org and similar
Web sites and have asserted claims that they have the right to investigate and prosecute
Wikileaks.org members and whistleblowers. In addition, several countries also claim the right to
remove false infonnation, sensitive or classi?ed government information, propaganda, or other
malicious content from the Internet. As a result, Wikileaks.org members have already posted
information in China on how to circumvent blocks to the Web site imposed by the Chinese
government for having objectionable content related to the participation of Chinese dissents in
Wkileaks.org and to pro-democracy issues.

[Back to Table of Contents]

(U) Intelligence Gaps

What individual persons or entities are leaking sensitive or classi?ed
information to Wikileaks.org, and are they working on behalf of a foreign agent or
power? What are the reasons, intentions, and motivations of the current or former
insider?

- Is the potential insider leaking the information to Wikileaks.org a former
employee of the US government or a mole still working for the US government? How is
the insider sending digital information to Wikileaks.org? What cyber or other tradecraft is
the perpetrator using?

- (S1939 Will the Wikileaks.org Web site be used by FISS, foreign military services,
foreign insurgents, or terrorist groups to collect sensitive or classi?ed US Army
information posted to the Wikileaks.org Web site?

Will the Wikileaks.org Web site be used by FISS, foreign military services, or
foreign terrorist groups to spread propaganda, misinformation, or disinformation or to
conduct perception or in?uence operations to discredit the US Army?

(Sail-NF-) Will the Wikileaks.org Web site be used for operational or cyber tradecraft to
pass information to or from foreign entities?

the Wikileaks.org Web site developers obtain new software for Web site
development, management, security, of messages or ?les, or posting
anonymous information to the Web site?

0 From what foreign personnel or groups does Wikileaks.org receive funding or
collaborate with for sharing information or development of new software?

1.1 vurgma. I

(UNCLASSIFIEDIIFOUO REMOVAL OF 20 of 32

ManningB_00378110

0 0 17250

INSCOM Classi?cation Review 000022




(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

- Will foreign entities attempt to conduct CNE or CNA to obtain information on
the posters of information or block content on the Wikileaks.org Web site?

(-SM-IF-) What software, tactics, techniques, and procedures would be used by a foreign
actor to conduct CNE or CNA against the Web site?

a (-SHNF-) Will foreign persons, businesses, or countries attempt civil lawsuits or criminally
prosecute whistleblowers, Wikileaks.org staff, and members who posted comments on
the Web site?

0 Will Wikileaksorg and various users expand the data ?elds in the TOE SQL
database to include equipment capabilities, equipment limitations and vulnerabilities,
known unit locations, links to geospatial information services, or known unit personnel to
develop ?battle books? for targeting packages?

ESHNF-) What other leaked sensitive or classi?ed information has been obtained by
Wikileaksorg?

- Will foreign organizations such as ISS, foreign military services, foreign
insurgents, or terrorist groups provide funding or material support to Wikileaks.org?

[Back to Table of Contentsl

(U) Conclusions

ESHNF-) Web sites such as Wikileaks.org have trust as their most important center of gravity by
protecting the anonymity and identity of the insider, leaker, or whistleblower. Successful
identi?cation, prosecution, termination of employment, and exposure of persons leaking the
information by the governments and businesses affected by information posted to Wikileaks.org
would damage and potentially destroy this center of gravity and deter others from taking similar
actions.

The unauthorized release of information to Wikileaksorg highlights the need
for strong counteii ntelligence, antiterrorism, force protection, information assurance, INFO SEC,
and OPSEC programs to train Army personnel on the proper procedures for protecting sensitive
or classified information, to understand the insider threat, and to report suspicious activities. In
addition, personnel need to know proper procedures for reporting the loss, theft, or comprise of
hard or soft copy documents with sensitive information or classi?ed information to the
appropriate unit, law enforcement, or counterintelligence personnel. Unfortunately, such
programs will not deter insiders from following what they believe is their obligation to expose
alleged wrongdoing within through inappropriate venues. Persons engaged in such activity
already know how to properly handle and secure sensitive or classi?ed information from these
various security and education programs and has chosen to ?out them.

It must be presumed that Wikileaks.org has or will receive sensitive or classi?ed
documents in the future. This information will be published and analyzed over time by a variety
of personnel and organizations with the goal of in?uencing US policy. In addition, it must also
be presumed that foreign adversaries will review and assess any sensitive or classi?ed
information posted to the Wikileaks.org Web site. Web sites similar to Wikileaks.org will
continue to proliferate and will continue to represent a potential force protection,
counterintelligence, OPSEC, and INFOSEC threat to the US Army for the foreseeable ?iture.

lL1\J.l. \Il_I?l

(UNCLASSIFIEDIIFOUO REMOVAL OF 21 of 32

ManningB_00378111



INSCOM Classi?cation Review 000023


(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)



Sensitive or classi?ed information posted to Wikileaks.org could potentially reveal the
capabilities and vulnerabilities of US forces, whether stationed in CONUS or deployed overseas.

The proliferation of access to Internet, computer, and information technology technical
skills, software, tools, and databases will allow the rapid development, merging, integration, and
manipulation of diverse documents, spreadsheets, multiple databases, and other publicly
available or leaked information. Possible enhancements could increase the risk to US forces and
could potentially provide potential attackers with sufficient information to plan conventional or
terrorist attacks in locations such as Iraq or Afghanistan.

The various open or freeware applications used in the development and management of
Wikileaks.org continue to improve with time. Several Internet software development companies,
foundations, electronic privacy organizations, database management services,
developers, and anonymous e-mail services can generate sufficient income, accept donations,
and use volunteers to continue to develop and improve the software. Improvements in these
software applications will provide greater privacy and anonymity of persons who leak
infonnation to Wikileaks.org.

The possibility that various computer experts, researchers, and users could expand the
data fields in the TOE SQL database to include pictures; equipment capabilities, limitations and
vulnerabilities; known unit locations; links to geospatial information; and known unit personnel
cannot be ruled out. The continued development of new technologies for merging and integrating
various geographic or other information services into easy-to-use databases could allow rapid
compilation of unit profiles that could be used for developing actionable infonnation for use by
FISS, foreign terrorist organizations, and other potential adversaries for intelligence collection,
planning, or targeting purposes?l

ackt nents

(U) Point of Contact

(U) This special report was produced by the Army Counterintelligence Center (ACIC). ACIC
POC is Michael D. Horvath, Senior Analyst, Cyber Cl Assessments Branch, commercial, -



I |?ack to Table of Contents]

(U) Appendix A: Glossary

(U) FreeNet (or Freenet). Freenet is a decentralized and censorship-resistant distributed data
storage system. reenet aims to provide freedom of speech through a peer-to-peer network with
strong protection of anonymity. Freenet pools contributed bandwidth and storage space of
member computers in the network to allow users to anonymously publish or retrieve various


(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 22 or 32

ManningB_00378112

0 . 17252

INSCOM Classi?cation Review 000024
(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

kinds of data or information. The storage space is distributed among all connected nodes on
Freenet.| 43

(U) Google Earth. Google Earth is a geographic information system (GIS) using the Google
search engine that permits interactive viewing of digital satellite imagery, maps, terrain, and 3D
buildings??

(U) Mediawiki. Wikipedia runs on its own in-house-created software, known as MediaWiki, a
powerful, open-source wikj system written in PHP and built upon As well as allowing
articles to be written, it includes a basic internal macro language, variables, transcluded
templating system for page enhancement, and features such as

(U) The Project is a collaborative effort to develop an easy-to-use Open
Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols
with The project is managed by a worldwide community of volunteers that use the
Internet to communicate, plan, and develop the OpenS SL toolkit and its related documentation.
The toolkit is licensed in a manner that allows free usage for commercial and
noncommercial purposes subject to some simple license conditions.

(U) PGP. PGP (Pretty Good Privacy) is an application and protocol for secure e-mail and ?le
developed by Phil Zimmerman. PGP was originally published as freeware, and the
source code has always been available for public use and adaptation. PGP uses a variety of
algorithms, such as IDEA, RSA, DSA, MD5, and SHA-1 for providing
authentication, message integrity, and private and public-key management. PGP is based on the
?Web?of?Trust? model and is the most popular system used by individual personnel,
businesses, and governmental entities throughout the world to protect or hide content on the
Internet. [?ll

(U) SQL. SQL (Structured Query Language) is also known as Database Language SQL (S-Q-L),
is a computer language designed for the retrieval and management of data in a relational
database management system, database schema creation and modi?cation, and database object
access control management. SQL is a standard interactive and programming language for getting
information from and to update a database. Queries take the form of a command language that
lets you select, insert, update, ?nd out the location of data, and so forth.

(U) SQLite. SQLite is a public domain software library that implements a self-contained,
serverless, zero-con?guration application that does not require setup or administration, cross
platform, transactional SQL database engine that can support terabyte?sized databases and
gigabyte-sized strings and blobs. SQLite is the most widely deployed SQL database engine in the
world. The software application is used in countless desktop computer applications as well as
consumer electronic devices including cellular phones, Personal Digital Assistants, and MP3
players. The source code for SQLite is in the public domain. SQLite is a popular choice as the
database to back small-to-medium-sized Web sites because it requires no or little con?guration
and stores information in ordered disk ?les that are easy to access and will preserve transactions
after system crashes or power outages. SQLite is a completely self contained application that has



(UNCLASSIFIEDIIFOUO REMOVAL OF 23 of 32

ManningB_00378113

0 0 17253

INSCOM Classi?cation Review 000025




(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

a small code print (250KB size fully con?gured) and is a faster client/server for common
operations. [52]

(U) TOR (or Tor). Tor (The Onion Router) is a network of virtual tunnels that allows people or
various groups to improve their privacy and security on the Internet. It also enables software
developers to create new communication tools with built-in privacy features. Tor provides the
foundation for a range of applications that allow organizations and individuals to share
information over public networks without compromising their privacy. Using Tor protects you
against a common form of Internet surveillance known as ?traffic analysis.?

(U) Traffic analysis. Traffic analysis is a form of pattern and usage analysis that can be used to
infer who sending or receiving e-mail and data exchanges on a private network, public network,
or the Internet. Knowing the source and destination of Internet traf?c allows individual s,
criminals, law enforcement, and intelligence and security services to track the activities,
behavior, and interests of the sender or receiver. This form of pattern analysis can be used to
identify persons and possibly threaten a person?s employment and physical safety by revealing
who and where they are located.

(U) Web servers. Web servers are computer hardware that stores HTML documents, images,
text ?les, scripts, and other Web-related data, collectively known as content, and distributes this
content to other clients on the network upon request.

(U) Wiki. A wiki is a type of Web site that allows users to easily add, remove, or otherwise edit
and change some available content, sometimes without the need for registration. This ease of
interaction and operation makes a wiki an effective tool for collaborative authoring. The term
wiki can also refer to the collaborative software itself (wiki engine) that facilitates the operation
of such a Web site or to certain speci?c wiki sites and the online such as
Wikipedia. Wikj was created in 1994 and installed on the Web in 1995 by Ward Cunningham.



(U) Wikipedia. Wikipedia is a blend of the words wiki and Wikipedia is a
multilingual, Web-based free content project operated by the nonpro?t Wikimedia
Foundation. Wikipedia is written collaboratively by volunteers, allowing most articles to be
changed by almost anyone with access to the Web site. Wikipedia?s main Web servers are in
Tampa, FL, with additional Web servers in Amsterdam and

[Back to Table of Contentsl

4:

(UNCLASSIFIEDIIFOUO REMOVAL OF 24 of 32

ManningB_00378114

. . 17254

INSCOM Classi?cation Review 000026

(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

(U) Appendix B: Methodology Used by Authors for Analysis
of Leaked Tables of Equipment for US Forces in Iraq and
Afghanistan

(U) A Wikileaksorg staff writer, Julian Assange, with assistance from several other persons
developed a SQL data base to store the 2,000 pages of leaked TOE information and merged
information from other sources into a usable data base for research purposes. The entire SQL
database developed by the authors for the TOEs was posted on the Wikileaks Web site for
anyone to use. The following is a list of steps purportedly used to make the data easy to use and
accessible for persons wanting to conduct their research.

1. Julian Assange and other persons that assisted him used publicly available open-source
information to learn and understand the abbreviations, acronyms, numbers, and other
nomenclatures in the leaked information, speci?cally NSN (NATO Stock Number), LIN (Line
Item Number), and UIC (Unit Identi?cation Code). The authors compiled their results and
documented the information on US military logistics in a separate document on the Web site.

2. They then found various public NSN catalogues on the Internet, which were used to con?rm
the validity of random samples of the leaked information using these databases and other
deployment references.

3. By hand, they created tallies for a select list of interesting items through their observations of
the reviewed information within the database. They wrote a draft report based on their research
and analysis of the database and other publicly available information.

4. They then used software and software applications such as VIM macros, PERL scripts, and
several Python programs to organize the material into a more presentable spreadsheet format
(such as Afghanistan OEF Property List and Afghanistan OEF Property List.html).

5. They wrote additional software code to merge data from several NATO Logistics
spreadsheets, which allowed the NSNs to be organized into subcategories to identify the NATO
Supply Group and NATO Supply Classi?cation for the equipment.

6. They obtained a list of NATO Supply Group and NATO Supply Classi?cation codes from
public US military logistics sources available on the Internet that was merged with other
spreadsheets.

7. They used SQL to install a database program.

8. They merged the original leaked data into group and classi?cation code tables using a SQL
database, in this case using SQLite. The authors noted that any SQL database could have been
used to index and catalogue the information.

9. They used SQL to merge NATO Supply Classi?cations with leaked data to provide extra
context and generate Afghanistan OEF Property List?extended.html.

(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 25 of 32

ManningB_003781 1 5

. . 17255

INSCOM Classi?cation Review 000027
(UNCLASSIFIEDIIFOUO UPON REMOVAL OF REFERENCES)

10. Using SQL, they generated several different indexes and tallies for the leaked items, by
NATO Supply Group, NATO Supply Classi?cation, and NSN. This data was then converted into
HTML format and placed into an appendix.

11. Again using SQL, they generated a unique list of NSNs. They wrote a script or software
program to concurrently query the US logistics Web-query NSN search for pricing information
and extract the price for every NSN on the list (except for alphanumeric NSNs, which are not
listed, probably due to being Management Control

12. They merged pricing information into the SQL database.

13. They used SQL to generate a new tally by NSN, merged this with the pricing information for
each NSN, sorted by the total price, converted the data to HTML, and placed it into the
Appendix.

14. They used SQL to calculate the total value of all equipment for which they had cost
information.

15. They examined the data and extracted additional information that was of interest such as
notable units and items of equipment.| 55[



(UNCLASSIFIEDIIFOUO UPON REMOVAL OF 26 of 32

ManningB_00378116

17256

prosecution Exhihit 4^
^2 pages
classified
"SECRET"
ordered sealed for Reason2
military ^udge^s Seal ^rder
dated20August2013
stored in the classified
supplement to the original
Record ofTrial

17257

Withheld pursuant to (b)(6).

prosecution Exhihit 4^
has heen entered into
the record asaCT^^T^^T^
and will he maintained
with the original
Record ofTrial

17258

Withheld pursuant to (b)(6).

prosecution Exhihit 4^
has heen entered into
the record asaCT^^^^T^
and will he maintained
with the original
Record ofTrial

•!
G LOO LOOO aGuiuuei/M
17259

3

3"
^

Oi

o
o
3

_

(D 2
5 3

o

(D

o3"
Q) c

3 S ^!

3

£3^
0) 3 (D
C 3

s- S

ill

0)

(D
^ H l

<

w"
o
^ H l

o

o

w

3
3 o
a (D

M
(D
5r

m

^ H l

w

3

K)


3
O

Q)

K)

<

D)

(D

3

(D O

3
(fi



(D

PROSECUTION EXHIBIT SjLfori^tificatim!
PAGE OFFERED:
PAGE ADI/lTTED'
PAGE
^OF
PAGES

(Q
3

X

^ LOO LOOO aBu!UUB|/\|
17260

(D (D (D

o S QI m
3
o
3
3

(Q

i 3

a. 3
CO %

^Si
& )

(D

-h

o. O
o
Q.
VB

a

(0

m

3
(D

3
< D '

(fi
N>

w

=1 3

II

O

(D

Q. ~
Q CD

CD
O Q)

S i
o" o

9 LOO LOOO a6u!UUB|/M
17261

(D

(D
(D

o H3
F^O

-Ii
fi)
g-oT?

ll
^

0) %

O (D fi)

fi) O fi) U S
3.
C 57Q . 3 fi) O 0)

S"=5

(5 ' o. 5 ' 3 3
3
c q a:
3 o o

Slit
I? (D 3 ff

*< (/) fi)

< 5

fi) S Q.
(O O -

3 )

(D 3"o
3 S-O

2,3

cog
g -"

?
m
3

(5*
o

fi)
(/)

c

O"
(Q
"U
W)
fi)

ro

£

sii:
C

3?
(/)
(/)

(?S5.s:

m
#

o
Q
o
3
o
3
fi)
3
O
3
(D

rt^*<

CD
N>
N>

CD

si
o
3.

3
o o

^Sig

Q.
CD

i " !

CD

5 (?
I's

III
Hi
(D fi)"0
3 —0(QZ3

Sfa
•3 t
^ " O fi)
(^(D

o a

CO o
-h

2, (g
o

M
(3)
CJl

®

9 LOO LOOO aGuiuuei/M
17262

w

I

&)

w

If

It

o ^
S«>

(A


0)

3
<

0)

Li
y
(D

tf)
0) 0)
O <
^
tf)
tf)
^

3
H

y
(D (D

3

(D

3
w'
va

tf)

"D
m (D

3
(D

3
o

tf)

O
(D

ru

CD

3-3
CQ "D

§ I
9L o
O

&i
m 6'

g's

LOO LOOO sGuiuuBi/M
17263

i>
57 Q)

W
(D
0)
C
"O
"O

o
5

z

(D

^

(D
1

<
<

3 o

pu!

(g

$
Q.

(O 3 "
O

c
"O
0)

3

fi)
3
<

O)

(n r
(D o

q o

(D

is

(5'

<

CO

fi) ?
(D 9

?s
fi)

Q.

O


^

^

S5
N3

(D

I CD

^•11

o
c

(0 rn
fiT a
3 0

3

(D
(/)

(/)

o
(D
fi)
3
O
(D

^

fi)
fi)
O"

o CL
(B Q)
m
3

^LOOLOOOa^^^^^^l^
17264

^ ^ ^ ^

.

a,

s

c^

s^
^

N

II

z

n
ro
->j

^

(D

^
^

o
co^

$ ai^mm

o
9L
D
I

fi)

o

a

(D

CO

fi)

c

90

l ^ H I

^

5 ^

CJ

(D
o.
o

^

2» 5-



3
3
CO CO

3
fi)

r

I

^

^

^

Oa

fi)

O

3

3

^

^

^
^
^

^
^

o

^

^

CO

o
o
^

^
^
^
^

^

6 LOO LOOO aGuiuuei/M
17265

>-o

ll

I"

Q) CD
g CO

co" ^

0)
3 CD CD CO
O ^ C.D
O
0)

8=* " I
§s

0)

:^
O
0)

Sg^m
•E. CD co_ q

^^i^
3 -o

M

"ill
^(o':<
—5

CD
>
CO Q)_ ^
0) ' CO

5

Q)

wS g

^sl

i . g o'
o

_ j CD

m
CO 3

m

>

CD
CD
0)
3

CO

>i

w
N>
CO

0300 LOOO g6u!UUB|/\|

o

17266

•o

CD

3

>

j>^i-l
o S fi)
fl) 0
CD O .
Q- ^

T
^
^

go

m

m Q_
_ . fl)

fl) O g
5' o- 3.

fl)
_ (D3
-Q CD

it

fl)
_Q

s=

D ^•
^ m

•n -0

O

CD
CO

I

O fi)
= : CO

8 2.
cog
W fi)

CD a
O

c
3.

Q)

o
^

ii

(D
CO

O
C

O

3
fi)
"O
O "O,
CO
CO
fi)

SI L
O
fi)

CD

Q) CD
Q- Q)
=7 fl)
fl) CD
-Q Q_
fl)

o.

CD

fi)

o

-1

If

<

CO

^

m
aO

H flT
Q)

Q.

CL 73
^

CD

co'

3

fi)

%

c_
5:
fl)

^
3

CL

D

>

DD

D J)

X3

I\)

fl)

>

Q.
CD

o

3-

^

N

o
<

"

"





.
Ono Ema 2.2.0: 8. BE

eaOOLOOO a6u!UUB|/M
17268

— (fi
fi) fi)

•S. 3

8S
X
O
Z 3
O (fi
a o3 )
(fi
(fi 5. (D
(D
X
(D "O

g o
fi) 5 :
3 3'
— (Q
l\)
hJ

CO
<
^300 LOOO a6u!UUB|/\|
17270

3
CO

^. o

CO c <
CD
3
O "O
CD 3 "
<
Oa CD
CO

3 ?

? 5"
O CO

"D
(A
3 " fi)
O <

•O *

? 3


<

3

&

I!

ll
D)

TT
(fi

?>

CD i
w c^

o

CJ

fi) -» o

CO z j t
g CD 3^
CQ

Ill

c

8 fw
3
«<

CD
O

%

H?

#

7]

3"
fi)

w

3
CO

9200 LOOO a6u!UUB|/\|
17271

I I I
O 7J
<

CD

O

CQ

5

=

CD o ' CQ
~
Q)

(/)

m O
3

C

CD * <
CD

"D
Q}

3

CD

o
(/)

CD

a

o
o
3

"U
(D
X

m
3

CO

m
CD

9300 LOOO a6u!UUB|/\|

O

Q)

C

T-i

CQ

CD
CO

o

S" 3

§ IW
k33

CD Q) CD

5 3.
o
o
0)

m
CD

o
o

^
tfj. CD CD
CD Q) CQ

II

3'

CD
CO

_

9

17272

i s

CO CD

CQ
CD m
C/)
(3.
Q . CD CO CD CO
0)
CO
CD CD
CD

B

3

3-g 3

0

w (fi

3 CD CO
O
=
CD
3
CD 3
CQ
CO
3 . CD CQ
0) 3 '
H CO
3
^
CO g :
CD
Oi
O CD T
CQ
Oi
CO



3

0)
(D
Q.

rel
Mm
>

3
73

E2
Oi

-t

3 SL
I

(fi
Oi

K)
K)
Ul

m
CO

B

CD

2300 LOOO a6u!UUB|/\|
17273

(Q

ST 3

a?

3
O

i
?


M S
»

ill
c o 3

ii|
h

CO

^

C

III
|i§
•3- s; ^
w' "••

ill

Ifl
(D
A)

•'ii

;^

(fi-

5" (D
O

C
0)
(Q
3- O
^
(D

(D

I
a

i^-

& )

(fi

=

3(D

o
35

g Q)
(%"

m

a

3

(fi

n

I

m
CO

B

CD

8300 LOOO aBu!UUB|/\|
17274

o

o ^

m

§• w

CO

O
0)

•o

>
•!
M
N)

>

CO

CD

a

_

Q)

fi)

cp|
3
>
3 fi)
fi)
(fi fi)

Z D

(D
$

&

gS. § «
3 fi)
• O
c
"O
( / )

o

17275

> >

o
(Q

0) i n

CQ

CO d)

m

E

c 00
O CO
(0 C^
<

CO

^)

ManningB_00007351

PROSECUTION EXHIBIT 5% fbr idcjXmcation
PAGE OFFERED:
PAGE ADiVdiyTEDPAGE
OF
PAGES

1^

17276

CM

^^U^^

•o
CD
CO
CO
CO

<

I ^ H

mI
o

U)

c
o

I ^ H

o
U)

^.s

.S> a:

•s "o 0
o @

<

CO "O

2

aJS C

Q.S

O CO

o . CO

TJ .2

•5?

0) "O

CO CO

11

o 0
.E 0

o

ss
5 ^
O CO

c —

'C

(0

11
^ E
0)

2 I

E .2

=1
«ts
.>

d)

O 0
(/> o

il

u il
Z cs

ManningB_00007352

00
T3 CO

^

0

.I"!

O £

H
-N

^

C

s= o
0

0

G)

O
0

o

00
O)

- S E Ec
>

0

si %.2

u

>

0

aO

C

CO
CO O E
0 00 X0
OO o CO 0
C

17277

4^

CO

LU
Z

o

3
%

Q

z
LU
Z

o

UJ

UJ

^ I

o

00

m _

E

CO
0) (D X
LU

o

UJ

9

tf)

z

o
o

tf)
tf)
UJ
tf)
tf)

g:

tf)
O
<
u.
UJ
^I zS
DC

II

O
CD

CO

CD CO
"O
r O
3 CO
CO

m ^

S

JJ

LU

<

o

^

DC

(g

>

0^

MannlngB_00007353

^



••
>

<

CO

3 CO
i;;
^

O
UJ

"D

m

z
tf)
UJ
z
O

o

£

oO ^

LU CO
CO

o

CD CO

5

o

CO

I U Q_

(0

^

^

TD O

c

o

CO CO

17278

ID
0)
CO
CO

CO

o

_cg
U

CO
D)

D)

c

J^
CO

O
0)
O

DI
CO

CD
O)
<

CO
CD

o
CO
CO

g

2
0
Q_

O
O JD
^
CD
CO
O
CO

E

u

ID
CD
O
O

CD

QI

CD

o_

•g
>
o

_co
-I—»

-2
o

Q<

CD
<

o

E

o
—I o
LU O

ManningB_00007354

0)

;g
o
CD

CO

QQ CO

6 S

si

g 3

Lll S

—!

0)

LU CO

17279

CO
D)

c
t

3
GO

CO
^

c

CD


M H H I ^

X5

o
D)

O

^1

O
I

CD
Q . CO

CD
f—

CO

o ^
io 0)

CO
CO
CO

QI

O)

E .

o
m
o
M—

o

c
0
E
3
o

g
o

\ %

o

lO

CO

T3
CD
^
i_

o

0) "O
c~
C
O
o
f~
(O

o

c

. CD

^ E
O
3
00
o
CO _o

>^
t5
0)
b
o •

O O lO
"O CO O
CO
"D
C
D
CD
CO
CO

^ or:

% CO
O ID

TD T"
CD
D
o C
m CN >
3 ^
o

E

O).^
C JD

CO
0)

>
g o
CD

O


s

Sw

-Q
CO
Q TD
DC CD

o c

•••
s
An

c

CD

E

<

ManningB_00007355

ILU
cC
QQ

z

CO -o
Z G)

Do

CTI

o

3
O

7. ^

o

o

<

Q

CO CO

E

z o

O i5

8 m

<

E

I

CD
Q.

CD
>

O)

gEc
CO CO O

17280

CD

CO
D)
C
CO

0

CO
TD
CD
O)
<

O
LU

E
(0

II
(0

^

o 5
c) E

S3

II

o o
a

a

<

o
UJ

ManningB_00007356

o
o

c
o

0
I ^ H

0

U
C

• ^B

o

0

• ^•i

o
'u>

0

I ^ H

#

0

O

0
CO
U)

c

-Sf
0

c
0

o

E

• ^H

3
O

"co
CO
0

U

o
o

O)
O

c
o

0
O

CO
CO
0

o
0

o

••

17281

^

^ ^ ^ ^
^ ^ ^ ^ ^

s
2

^

C^
CO

^

Q)

0
Oa

^

tf)

c^
0

C^

^

0
O^
a^

^

^

^

00
CO

0^
^

CJ

01

Q)

CD

(0

c
.o

(0

s

5

(Q

(5

Q

0)
(Q

O

w

Q

tf)
3

.2
c

Q>
CO
Q)
tf)
3
(0

O

2
b

Q)
(0

ManningB_00007357

O
•o
•o
c0)
^H


O
Q)

Qj
Q)
O

CO

a

c
o

15

0)
tf)
3
(0

O

0)

(0

Q)

o OJ

&S

17282

00

0

o5
E
o =
o
eg
(^3
^ 0

NI
CM
0
0
O.


o>

0
O)
0
O.

>

"O
0

a

2
0

0
O

o

"5)

c

• ^B

0
0

(0
0

If
m (/)

g (0
.E 0

maaa

c
o

u^m

0

0

E

E

o)^ a

O

0

O.E

a

0

c

_

* - O)

oo
(0 c

•50

0 r--^

«.2
O)0
c E

'ia
E.E

c

B^H

2o
E'B
hr 0

•il

• aB

I

2 c

0
0

U CD

0
3

La

II
0 00
3
0
"U O
0

C * ^ "0
OTJ
C 0
(0 0 N

.62 c o

i t o-c

N

0-^ 3
0 o 0
C
3
0 CO

0"0
-C 0
0 %

E
o

0 d)

CD _0

£ 0 •o
0
o-d
0 0
oS

0 JS

0) CJ

0

©E

^

O c
. 0
0 $

o

o$
xiJS

i!
a'^

k

0 JS

•2
0

0

0(0

0 = o
Q 0

0

o

^"U

.i§
i « 15

O

0 g>

2c o
(0.S2

0

0

o

0

—o o

o *ManningB_00007358

0
C

c
C (0
o oc

o

It
0

0

go
o ^
"OO

ii

o ^
0

o

K 0

17283

CJ)

^

1^

0

•B 0
%
0
0 G) (/)
^ 0 3
"D ^ CO
^ 0 O

tf)
tf)
0)

o o£ 2

b^2i
o 0 0 ^
g>-Q 0 Q)

N

I

ed]

Pr

o
o

CM
CO
CO

sill

85

li
0

si
si

O
CB

c E
.2 o

•§1
0 Q)
"D £
C ^


>
«

3
C

c
o
a
re C o>
u o
u 0

•N

(0
tf)
(0

O

Ui
0

Oa

liii

1 «•§

Q) 0 C N

lo^l
Q,"D 0

£

2|||

2 i I o)

5 »m g
o "55 E «

ManningB_00007359

© ) o "O
«M

C D i S * t 15-

co
0 o .= o

.gc
0 0

X !=

.2 0 c
0 5.2

.2 0o

©

5rt21 ^S?
3 O C
0 ^ 0

^ Elo
^

0

3

C

gs:
.115

.11

Ill

^

0)
c0 u>
C S

I

O "D (0

3
0 o g.
0® U Q.
0 C 0)

p o
O) o 2

17284

0
C

CO
OT
O
^

c
O
• ^H
(/)

2

•D
O

0

KM
CO

0

Ei^
o O
o

B\

IG)
0
U)
0
Oa

li»
^

0

0
3
O)

E
^
^
^
^

^

C^^^
^

c^ ^

^.il

> E
w o ~. O O)
oo
^

O

^

^

,0

CO

O

CO

c

c

a c .12
0

0) """

K
1 OE

>

^ E %)
(A

O

<

= §8
C

O

^ §) .§>

I= O£ ^

_

o
1

=

o
0

• ^H

0
C
CO o

E

0

5.1

0
CO

CO 0

o $

o I;

il

2a S

CO c
0
OT = 0
= 5 Oa

0 O
O CD

?
2o O
CO Q-

Q. jfi

OT

c .2

0)^

0
o
Q£ o^""

11
jO

£ Is.

O)

*2

<0 Ui .

£ 0

A A A A
0 A
0
ManningB_00007360

^

(/)

^

Oa

O)

^

o.
O
bo
I I

tf)

o

1111.
H B H

0

C

«

.

3

1.1$
H
A

A

CO 3

17285

o
Ui

lie

0

0

CO ka

§g

0

^

8.J2
c.|

A re

c
o

E

CO
C
0O

B ^ H

m

B ^ H

L_

'W'

0

c
c
O

BO

0.

>

c
o

O)

o

A o

Oa

o

#m

OT

DC
A

"O
0
f-

f the US

O

o

ontr

aO

^

II
ManningB_00007361

>

OWI

as

as

(0 CO o
o 0 0r*
^
+^
B ^ H

BBIH

3

wation t

0
Ui
0

c

c

0

B ^ H

o
o>

o

only be ap
WV
UC

c

Oa

ca

*0

rair

o.

o
B ^ H

anizati

CM
CO
CO

B ^ H

rev ent em

CM
as
00
I

0

O
T3 Ui
O

ion

0

^

S r lassi

I

"O
Q. 0

as

Persor

lO

o
c

k
_o c
>>

"D

<

>

lent

ncy

O O

a

un der

o

O

E OT
o ^
o
c
B ^ H

B ^ B

17286

c^

C

o
re

^

^

^

^

I ^ B

E

^

o o^ ^
^

^

^

U)

c

.2 C"S
D

• ^H
^

re
o E

0
Ui
0
O.

•o
3
O

c^
CO

Ui

ManningB_00007362

a a

£

c

>

re
O

o

o

0
O

0
O

3
O

B ^ H

> l

> "O
tn
^
0 0
"O
as
C
0^
^ . ^ OT
O mwmm
^
^
^C
^
CO 0

.s>8
0

^

c
B ^ M

a a

C

OS

^

f0 c

c
c
0

0
0

C^

lassi

as

CO
CM

0

lassi

o.

0 ^
O 0

ea

CO
CO

o
0)
Q

CO

o
0
0

o

17287

CO

c

•o
=
"5
c t; 0
0

0
Oa ^

N
0

0)

•o

c .
re tf)

0)
111I I

^
I

%f
CO
0
O.
as

CM
CM
0
Ui
0

o.

C
0

O CO
CO

fll
$

CO 0
CO >

0 aS 0

E

II

Ma>

O
, ,

S.O
re

-o Q. o

0 CO -S

Q) 5
S "O

^CO Q)
r0

0

Q.^
^o

0
Ui
u
0
Oa
0

.fi

o O

l^ '|i i

ll

E
0 c
O
^ c •o
o
_3
^
c

ManningB_00007363

Q

iu

< i±j

iiil
X UJ E J

o^zo
P o o

17288

.1.

ammumm

no ?an.

82 .8 .62 E0 e_$a_oon_
.0. m? Eomuom W20
zm< in 4/


.m..m>OU EZOMM ?mp .8309 .92

:32 md
ummnum HS
mm>oo mo

omd Momm




Howuwuca




ManningB_00007364



17289

lO

CO
C

6
CO

o

CD
I

^

CO

0
Oa
as

CM
CM

0
Ui
0
Q.

CO
0

0
CO CD
"5
0
C
c
0
^ 0
CO o
0

II

2 ^
0
O.

Oa

C
O
ti^m

0
^ IO
^ a™
CO
CO
0
CO
O)
.£ "U
0

o
I
Ui
C

c
c

5) 0

<

g
CO

O

<

ManningB_00007365

^

0 CO

O

(0 o

5o
z

^

CO
I
J
o
EE
a; O^
= aO
g)^
aO
aO

Of
0

IU CO
CO

®
tf)

«2
o

•£

17290

*

(9
0)

CO

Ui

c

0

S
c
o
CO
I

^

CO
0

B ^ H

t

0
Ui

CO

o.

0

c
o
0

z
c

Ui
0

o

o
CL
"U

c

CO
CM

i2
22

0

0

o.

b

CO

0

Ui
CO
0

CO

CL

O

I

O

>

0

0

aO

0
CO
0
0
0
as

0

|i
fi.

o

CO

£"2
O
O

0
0

CO 5
o.

O

UJ

c
m

&'i

I

5

"O

0) c

|2
2"
CO

(D
UJ

m
o
'm
(fi
jO

O
m

m
m
0)
.Q
(fi

JS
(fi
0)
D)

c
'(fi

o
o
o

^

tf)

ManningB_00007366

m
.fi
re

I

z

CO
0

m
o

tf)

*

•x


17291

Q

UJ

Oa

U_

O

tf)
Ui tf)

0

B ^ M

^
>

cC
're

rtr

B ^ H

O
0.

<

J

o
z

o 30

as

"O
0

b%
12

o
0

* ^

"O 0
0 >
CO 0
3
CO ^
Ui
0 c
JC ^
B ^ H

B ^ H

"co

O

B ^ H

re
ed

E
B ^ H

rke

CO
0) T3
0

E
>

CO la.
CO 0
0 0
O O
c .O0
3
ManningB_00007367

0

iSsl

aO

tf) -J

^ CD

II
« o
re re

toi

O

Q_ UJ
Q. tf)

Q
UJ

o

tf)
tf)
<

(D o

_

.2 E

O

Q.2

z o

2o
a-fi

^1
c
<

«

o
3
<

O

o

17292

00

75
re Q)

• i 0 if

11

l°1

§s

C


O "O
CO)

c

^

:^ I

. =

V/

"5 -o
re =
•Q
P 7s

"Si
o
E
re

• ^H

0~

re

re o •D

"Z Q)

• ^H

re 3 O)
tf)
ManningB_00007368

>%

Q. ;e

C (0
O tf)

re

gU
c

® :

§ I"

ll


re
o %
re

$2

U(0 a
Q.
>

17293

O X LU O

O)

^

Q.

CO

CO
L_

O)

C
O
1_

CD
C


O
CD
3
CO

•D
0
CO
CO

m
u
c
o
0)
Q.

E
CO

•I
CO
Q_

o
o

Q.

2 CO

S^-o
g

CD

§1
Ri
Q_

=

4—;

C

CO

CO
^

CO

a

CO

CO

Q

^

CQ

in

<
'

o

o

o

L_

CO
CO
CD

=

'il

C
Oo

.
CN

C

r-

O
O

CD
Q.

G>
^ C3)
Csl C3)
O
^
CM r-

CO

S
>Os
O

CD
CD

>

S o:

c

o

CO

o

CO E

o

ManningB_00007369

E

L_

O) g

. _

r £

CO

Ui

o

4—»
0)

I -

CO
CO
0 "D ^
CO C C
'O
O CO

c E

o)

O

CO

Bw

«

i_

o
o

.« E
£ $

TD

| £

Q-

CO

o

O)

CO c

S5

O LU

CO

2
CO

17294

o
CM

0

0

o
0

15"

UJ

OC

o

CO
•D
0
CO
CO

tc

+j

_c _o
o_ ^

O)

^

CO CO

o. —

11

CO

CO —
_CZ

$I

0

o

CO

o

o

Q.
D) 0

E

"E
CO

0

5"
3

CO

C3)
^ CJ)
Csl C3)

»
CO

5 i

E

CO
^

o g

0 .5
CO "E

CO

CO
o

^ j .

Q. •
o

UJ
(0
Q.

0
Q.

L_

CO l l

7ii

o

o

<

CNI _c

"GO

_c u
o CO

o

6=

Q. J >S o

P

:s2E
2 § 8
"z: u o

£ ^5

;78g

^

"0
0
0
0
j0w

U

^

CO
CD
CD CN
CN

csT

L_

o-p ^
Manning B_00007370

CD

..

CO
c
LO O

^
..

c
o
0
0

0

0

o
3

t!

II
0

0

o o

UJ
Q :

o

UJ
(0
Q.

o

17295

eo - al
CD

"U

Csl

—0 £

si 3
CO £ -D
"O 0 C
0
0 ^
O "O "O

2> o 5

CO
CO

0

o.
0
Ui
0

a

1.1
2 g

<

^

^

0

0

CO

c
o

I ^ H

0
O

I ^ H

0
CO

•SSS

II?
c "

0

#Ii
0 _0 : g

ManningB_00007371

>

£

0 o o

5

0

0

>.2

E b.

o

III

CO
CO
0

o
To
c
Ui

0
"O
0
>

o

0
X
LU
0
CL

b

0

O
0

o
B ^ H

0

E

E
oa

"U

0

c

0)

3

0

CO

'C
<

N

CO

>

17296

CM
CM

o
C
CD

(fi
0)

'

E

>

0)

3
O

o

o

"O

•o

Q
UJ

re
o

Q)

Q)

•D
3

CO

• ^H

w
tf)
re
o
c

i
l
l
£ 8,

3
CO C>"

re c

ManningB_00007372

(O
(O

+-

re

2

1


O

CD

0) *- -o

(0 g> £

a o c
o 0) o

H CO O

12rewo
CO
tf)
0)

mm



ManningB_00007373

17298

o
GQ

g

^.co

CO
CO

i s "O

m
U

.5 E

CO CD

0)

o

%

CO

tL

c

in g

6 ^
00

c



ManningB_00007374

SCD
LU

CD
O
O

C 4=
0) CO

0^

QI

_C0 TD

^

3

z ^

Q. Q.

<

E
5

>

CO . | .E CD

Q-

^

<

% g P'o
^

CO -o

O^ i5

g%
o:

O CM CD

a.
CO

CD O

m o <

m S
'a. 2

o

CO I f )

CO
CO

7. (-)

<

O
O

3 "O
O) CD CO
0)
If)

o

CO "2

Ui

g

^

u .2

CO
CD

>
D)

CO
o
CO
TJ +^ -A
O
0

11 Ii

o

O)

O
^

ID

U)

O

CM

CD

o %
CO o

°» ^

DL
<

Q "D
CD
Z CD

8 m g
CO

O
O

2

I 0
E Q-

17299

^^HC^

m

^

CM

0

CO

B ^ ^

0

CO
CO
0

0
O)

CJ

"O

c^
c^
^
o

CL
0

o

0
y=
CO
CO
0

B ^ ^

CO
CO

u^

CJ
<

CO
0

Io i
O

=

c

E
0

& £

CO

"O

c
o
o

<

• I^H

CO

0

<
B a

00
B

O
o
Ui

c

B B B

fi. c
fi. —

ManningB_00007375

5

o

c^
C^

>
B ^ B

0

^

^

0
0

"O

^

^

0
laaa

"co

CD

0

O

0

LU

o

c

"O

c
0
>

B ^ H

Oa

^

0

j)

CO
"O

^

0

CO
"O

C
3

0
0
O)

<

3

o

c

o
o

B ^ H

0
0

0

O

c:
o
o

O
0

CO

c

b

0
"G

0)

17300

CO
CM

0
3
CO
O

0 CO
0

<

1 CL

0

c

0
CD
CO
CO

i
>

CO
CD

"O

0
Ui
0

c

Oa

0
CO

5
0

CO

il

3

o
CO
"O

^

B ^ B

O
c

c
O

re OT
0) >s

U ^

a^g
3 re
o 2o

a:

It

.2 o

"O

0
0

•o

<

.2* CM
CO
tf)
OT
tf)
re
0 c

Q)
C

CO
0

c c
O o
CO

(A (D

B ^ B

^

CO
CO

0

o
o
<

ManningB_00007376

|i
^ CO
0
0

> CL

0

O

a! S

1
5)
I- <

17301

CM

"O

UJ

0

o

>

•O s- 5 OT
L. O T3 E

> -

UJ

O CO Q) CD

c

Q)

c

c c
re o
B

CO

E c
o c
o0) o
_ >

X

0

•o
0)

Q.

O

.fi

B ^ H

_c

•tf)

cCD
CO

o)"5
c o
c (D^
0
o E

BaBH

c

CO
o 0
CJ O
c 3

o
0

0
0
CO

H
Z
UJ

0

<

. mmi

00

~l*J

>

•D

^™

as

O

CO

#

O
OT ±7

g 8 So
O C
0

=

&
B ^ H

o c
o 2

o "S b. ±f

B^™

it

c

si

I'i ,>=5
0

O j : 0
ManningB_00007377

^

C
C 0
0 -C

E

CO

C

re

o
o

O

o

O

tf)
CD
0)

O

17302

00
CM

c

o
o

(0

U)

0 .5
(0

0

(fi
>

CO

O
Q.

0

CD TJ
O CD
0) CO
> "O

±± o
CO j =

0

c
o

o
o
CO

CO

0

E


O

3

CO

CD

0
0

E

0
O

c
0

0)

^ .5>

U

> ,

^ s

LU *5

o
O

"co

•ii
O £
c5 CD
0

_

iu B
B%

O "D 0
I CD o

CO

re ^c
CO
(0

o
o
o

0
U)
CD

0 E
OI w

UJ o

CO
CO

I
<

> -

Ul
^

CO
CO

0 2 c
O Q. 0
•M CD Ul E
S .22 0 •
0
O ^
to
O w

5g

<

>

(0
ManningB_00007378

17303

Oi
Csl

B ^ B

Q

o

O
>

E
<

tf)

c

o
Q.

tf)
0

0
IO

CO
0
Oa

DC
0
Ui
0
Oa

^

c
0

E

B^B.

0)
O

0
O.
0
BS

CO

0

t:

0
3
CT
"D
0
0

E

0

O

% re U

III
C

q)

O -o .S>

£••2 ^0

^PI

si|
0) U

N
0 2

11
CO CC
OO
O ~
X

0

o. E
§§•
c

iS T3 E

*^

£ Q o

>

.ti re

0)

ill
O

>

<

lU
Q)

is

>

O
L.
O

i'i
tf)

r

Q

ManningB_00007379

CO
0

0

<

0
0

>
3

o
c

0

0
Ui

.2% o c
CO

1.1
0 0

i> re OT
.fi £
' IOTOT

|-ES

t f i 8-=^
2 o gog

Q

!

E

17304

c^
CO

^

O
j ;
^
CO
m

^

^ E

tf)

N1

^

^

Od

0^
^
^
^
B ^ ^

CO CD
-

as

^

c^

CD 0^

E
J. E

0)

g CD

3 CO
CO CO

^
jO

CD
C

o

CO ID CD
CO
CD ^

re

w

E
E
o

CO CD

^

C CO

IO
U m

c
g -o
CO CO

O
CO

0

o

CO CO Q-

o-^

0 o
Ui o

£ <

L_

og

ManningB_00007380

E

£ O

O = o
.5 >

as

0
0

CO

CD
TD
C
CO

^

O)

Oa

EEl

^
3
^ - Q

CO t CO
S I CD

2CO
CM
0
Ui
0

>

Bt

CD
1

o
c
o ^

O

E >^

^

tf)
0

(D
o)
CO
c
CD CD

0

TD
o

1—

'4-'

lit
« 2 s

^-1
CD CD CO

if $

11

CD

3
O

£
o
o .
.(g
> T=
CO CJ

tf) -co ^
•o CO
c
re o

E Q . CD
E CD E
o
O ^
0) CO

17305

CO

O

o

BBBH

JD

'm
c

tf) 2
0 0Oa

DC CO

BS

0
Ui
0
Oa

C

— o

11
o o
c c
w "
c)^
^

0 it

aC CO
CO

0

ManningB_00007381

o
re
o

3
0
C

0

^
^

B ^ H

>
>

t

B B H

^

^

0

ot

Q.

O

lead

CO

O

OT
C

an

Oa

o>

B ^ B

B H B

O

0

"3
0
N

2
3
O

o
c re
0

C

£

o +-

il

(A Ui

2 «
= *£

ll

^


0
CO

0
>
B ^ B

"co

en

=

repo

B

^

CO
"D

c
0
fied

>

CO
CO
0
CJ


B

3

=

+S

qj .5

8E

fi.

%

.

£

^

=5 .=
0

17306

CM
00

O

0
0
T3
0

m CD

.55 CJ)

^ 0 g
0

CM

o -o g

2

0
Oa
as

in
0
Ui
0

o.

l0§5^« I

^—•

£
ro
0)O oc
E
C
U
•D


ro D ) "O

0

L_

o

O CO

O o
0

_^

^

0
-f—'

CO CO

£ m

CoO — 0
CO
u>

o
0

CO
CO CO
^

1 If
§
o m (O

2^ E

O

IS
II

II< §1 I i
c

Q.

< o

0

y
0
E
£

11

"O

£ to

CO sJ

^0 °c .9 I
E
C

L_

0

CO
CO

CO

_0co ob E

b
o
£
O o
CO c
0
0

E
o
g) o Og
CO o
^

£

0

LU

9

CO

'0

E (D
TD CO

o
•o

11
If
0

(D a:

ManningB_00007382

0
0

E

0

if J

o

E

CO 0

III

^

o
Q.

0

o

< E

O

^

17307

CO

CO

c^tf)
E
0

w
> »

(0

UJ

O

o

c
0
•D
3

CO

o
o

o

> -

UJ
^

(O
CO

0
0

re
re

1
ManningB_00007383

X

UJ

8g

17308

CO

re

c
£

"U

•D

0

c

CM
I
CD

<

•o
c
• mmm
^

ed

ity

w

re

Oa

uo

CO
N

re
c (L

3
O
<

o
o

as

0
Ui
0
Oa

c
O
B ^ H

0

E

CO
3

E

0

CO

>

0 I—

^- ^2
= o

3
C

b

1*

c

CJ ~

b
0

CO
Oa

O

i!
^ y
• re

0

o

o

11

.0

OT o

o

o J2

;g OT
0)
O .0

to °-

"Sl
"C re

O
O

o

o w
c o

0
0

>

aO

o

^aa

B^=

£ _^ 2

11

0
'C
0

0
0
>

0 *5

ll

Ui
£I Oa
"
c
o0
-

tf) 2

O

0

CO g
.

"3

0)



13
0

0 £

O

0

ManningB_00007384

"0

CO m

c
O
o

«
o.

0
0

^

tf)
0
2
3 0

CO

0)

^

II
=

o-

ii
2%
0 aO
re

0 2^

E re
tf) 3

17309

lO
CO

"U
0

5 |
$ o
3 .5

"D tf)
C 0

U
=

CM
CM
I
CD

20

E

o.
as

^

0
B ^ B

0 N

II

0

0
Ui
0
Oa

c
0

"3

c

O

u

•u
c
0
0

b
0

CO
MannlngB_00007385

S c c3
O

ii

o
o

"O —

"C re 0

(D re

to E

O

0

c

II
.Q U

S TJ

1^ hi

C
r O 00 IT)
" 3 CO ( 3
c — 00
0 CO «

?fi

% £ "30

I£«

0

C
_r C O
^
0
aO

11

3
O C
O
CO o "3

0

0
"3 CO

0 s

O

Oa

Ifi

17310

^^^^^

CO
CO

O
"U CO

^

0

II

il
^

^
^

tf)
0

CM
I

CD

2

0

Oa
^

^

II

8^
(0
c
0) u
w 2o
.5
n "O
=
«
E -o
0 0

as

N

0
Ui
0
Oa

(0

II

0

o

0

!E

c

O
(0

4_

0

0
CL
0

0

CL

o

g
E
£c
"D

CO
CO

o
0

o

c

5>
^

I

re
0 "O
-g o
o ^

II

t

(0

"O

C

0

o

o k
CO o .

0. c

CO i2

&g
S. '

11
^O 60

0
0

"U

0

0

c

o

Ui
0
0

^

CO

0
0
0

^

0

Ii

0
C

I
i
l
o

a

5
0

0
0

c

O)

0

"D
0
"D
0
0

0
0

0

0 "o
O) 0

0

o o

o

g#
C O

BS

8 §
0 2 re I
(0 0
o. £ "o

ManningB_00007386

^ =
I
E
0

0

0

^

l« 1-2

^1

i | . E0
•O
. "D
E "5
t) 2 i
0) 0) 0)
^
£
O) 2^
Jres is
™reJs£ a 6 O
^

o 0
0

o
o

Q <

a

0
"3
O
%

0
>

0
0
3

0^
>%

0

Q
o
00

17311



new

Manning

17312

00
CO

0

0
N

0

"2

»- a

0

1 L
0

o lo
» E

O

S
|
i
o g 3

CO
I

N

11
0

2

0

o.
as

00
N

0
Ui
0
Oa

0
0

03 8

0
^

o
0

?1

11

0 E 0

0) u

m^m

o c .c
'= o

3 (0
CO CO
CO

.2 I t

O ii_

p ^

•> o


•i 5 «»

0

E

^ 3 - 0

.2 0
0 o

E5

al
c 0)
o o
c
— o _:
0)

IM

Ifl
ManningB_00007388

= .5-3

i^i

(0
0

5
tf) £

re

— CO o
o
=0 ;p
^re
0
c0 -Q
iS0 •»
Js
Q.

C9 0

0

(0

o
o

0

Q~

O

0

O

0B
0

CO

E
0
<

•tl
82

% °-

ll
.2 0
O
O

O)
0

<

0

« o

17313

O)
CO

^

(0
3
(0

"3
0

0

>

O
Q.

o

o

I

CO

•D
C

re

Oa

0

as

00
N

0
Ui
0

0 o.
Ui

re

0

3
O

c
0
E
0

$
^

0^
c
0
<
CO C
O• OO

a0

0

*22 2 0 a0
re CO b
N

Z3

*i

ec

0

^

^

o
c
o
o

Q.
Q.

3
0
CO

CO
0

c

0

a
0
0

±f A

g

0

c

o

ii

kg
0

(0

m

E

'I

0

0

3
0
C

£

<

II

tn oc

o

o
0

Q. c

o.

I^
&

0

(0
3
O

o

a
0
Q

II l l

3
; 2 "2tS
re 0)
0) Q.
.2 ^ O
g
I .5

a8


g i
_

Q.

n 1.1
C "3
0

(0 c
CD CO

0 0

II

ManningB_00007389

o
0 c
_ o
c
o 0

=• E

i

i I

17314

o

"4-

2 >
3 C
CO o

0

"3

CO

Z ^

I?

ll
I

CD

20

Oa
as

N
CD

0
Ui
0
Oa

o
0

O

DC

p a- S S

Iii

0re -n
CO

a.

0 ,J2 3)

111
Es
= "55
c — c

"1 i
;

%

D
CO (J C
N

? sCO aC

0
O.

re

sl

E
E
o o o
O re ^
ManningB_00007390

1o

^

3 C BE
CO O " 3
0 = 3

CO _

o>

b

CO

iu

CO
^ CO

W CO

E ^
0 2

1-2^

n-o

CO CD

rs-

^

^

(fi

i
i
j
1-5
0 —
O 0

0

o

^

> ^CO _0

a_

0

C

|2£ 1 g §
2

CO CO

"3

0

0

<

Q. Q.

17315

Ui

c

0

B ^ H

"O 0

3

5 'I
**"

(O
as

o

O

0) c

c

S o "co

I

0

CD

g 2g

O.

fi. o

20

as

N
CD
0
Ui
0
O.

fl)

~

£ °-o
« •§ £

g g |g
c o JS
o £ o
{2 3 O
0
0*^
Q_ C CO

"3 4W

0

C C
3 O
w CJ

lis
is
0

Oa

II I
o
2 OT

s. -°

0

B ^ H

aO

~I

O

0
"D +- C

.2 "5

^S
«.i
y

. 6

"3
C
0
"3
0
0 N
CO

£ >» t

< =2
ManningB_00007391

O

0

o

2 2=
»-

k.—

o ^
.

0

0

3
0
y_

O. O

17316

CM

^

CD

2
0
Oa

re^
0

as

^

CD

0
3)
0

o
^

0

Oa

CO

0

3
CJ CO CJ
0 CO 0
0 CO
O o
>

o
0

o CO
" 3 y_
c o
0
0

0
B ^ ^

E

0

"co

>

0

3 0
CO O a
c O

0

0
CO

>

o n
<

ba

0

ll

=

0

CO

>\

0

=

'5 O

lo

B ^ H

0

O

3
CO "3 O

O CC
OO

0 0
>
CO aO E

MannlngB_00007392

3
O
0

T:

"3
C
0

CO

•o _

J %oo

Q)

u

^ o 2 o

17317

CO

o

^

"3
0
O

>
^

11
0

^

0

CO

— c

CD

2
0

Oa
as

N
CD

0
Ui
0
Oa

0
0

•*i

CO

B c

b

0 CO
0
0
CO *^
0

O

II

>

Bi^m

= 8 s.
ManningB_00007393

81 2
a£S C O

O O "co

? w
CD

tf)

O

O

O

>

[>

o

gj)

o

m
m

%

(oL,
^

II

0
0

I0
Ul

a

0)
>

o

o

o
o

^

tf)

N
LL

o

N

CO

tf) tf)

CO

o

o

17318

q?ezmimzoo

?uEmma_o:= m. ..o>oo

wz?zmzm?a?
>uzmu< Gimnmo E3
muz<9_ouu< 7: an .592 HZHEDUDQ Him. we
nz< zo:.u::om.n..E .mu
QFEZD HO
HIM. HO HEB Zn m.5mo.._umE
EOE Pu PUHHOMA Oh. DHEDUHM

EH4 min

nmE_mm55:5 5500 Ems

q?ezmnizoo

._

.m.D 3 wmsmo
2 uopomaxo on _u_:oo
ummo_om__u :mEs E5
_m_._3mE


32.. m<



n_0 ?mm=so._

me.



ManningB_00007394

17319

u>
o00
1

CO

_J o
N
U.

tn

z

LU

o
s

O O
O

z

LU LU h>
<
LU CO


<
ms

o

1

C4

O _c
u. Q0 .
VM

3)
CO
0

CL
ManningB_00007395

0 CO

0

is
a
• BH

"3
0 0

0
O

LU
OC E o 5 0 "C
c O "3 E o
O o
0 0
LU 2 "3 o 0 0
0 "3 0
CO 0
0
3
E
^

c

I s- g
!

«

re -o

0
0

17320

ow?



?oEamu_oE. m_ ?moan

mzo??aomm
nz< aimnmo FEB
muznz< .mu
.ma.nHIP Summer: HE Zn

EOE Oh. GHEDOHN
mink.


9 2:5

emmumm ACE

Emomm

3
>__m:o_un_mox?
mwzmo 3 u?ooaxm on
2:00 _ummo_om__u 22.:
_m_._3mE .8
Emomm

98? m<



n_O


2: n_w



ManningB_00007396

17321

N
"4-

0

O

"S
as

Q.

E
o
o

CO

O
0

as

Q

CO
CO

0
Ui
0
Oa

2

CO
0
0
3

O.

Ii
51
a o

CO
0
CO

CO 0
c
0

CO

0
c
2 S "c 0 o.
O. CO
CO

_J

0

Q

&

o

CO

o

o

ii

">
o o
_c c
0

B ^ H

B ^ H

^

X
0

CO G)
0 "3
U_ 0
B ^ H

OT

:g {§
Q o

ManningB_00007397

17322

00

IS.

o

N
LL
CO

N
LJ.
CO

CO

"4-

o

o

N
LL

00

CO

N
LL
CO
o

tin)»wis

Iti

g

i fi

lit

ifi

I

CO
I

^

Ui

2
CO

JO
"co

o.

CO

as

CO
CO

0
Ui
0

o.

0

sS
jO

0

0

o

ja



JS 0

ll

% § o•D E
B ^ M

i t "3
CO

0

0)

re

CO o E
O
0
0Q -o^

ManningB_00007398

c

0
0
jO
^

0
0
3
0

o
>

0

0
JD
0

(0
0

_a
CO

O

Q-^S ^

a= < =
cs 0 —I

Q >%0

E
0

0

Csl

N
LL
CO

N
LL
CO

0

17323

CJ>

o

^

B

>s o

CO c

o

g

c

Q . CO -Q

s.

o
CM

c
o

ore

W

0

tf) 3
re tf)
tf) re
0 0

E
re S
^

E
o

o
0
0 C O re
^ .o) a. o

c
o

^

ManningB_00007399

0
Ui
0
Oa

5 w CO o

c
o

fi.
fi.
<

0

1 1 ^0"E
re CO
S I "2

"O

•a
0
d
re
CO

0

E CO
(O
o
o "O ro E o
0 -o
ro
E
I

<

0

0 0 0
}=• ,= ,= o
CO CO ro
CO CO
ro ro E
5 re o o
o Q

|i

c

o
• ^H

re
0
Qi

o

17324

o
UO

tf)

8iS

^

tf)

2 re
CO
^

o
0

o

c
0

•u
3

CO

M

^

o

CO
0
tf) tf)

S g S "S •=c

o

tf) re 3 O OC

o 0
c "co
B

=

O tf)

o re
0

o

> o

0 tf)
£ tf)
*- 0
0) o
2. O

re re

ManningB_00007400

•S « ?2
^ (0 o
> tf) > t
re 3 o

M
S"-"'I
II

Q. O

0

CO L.

it l -s t
I

ore
o

c

0

:

ill
Sll

_

_
0

re co
o
CO (0
0 0
Q.

Q.

E

re
X
0
0

E

>

re

C^tf)
0

Q.

o

tf)

2
re
re

1



ManningB_00OO7401

17326

^^1^^

CM
tf)

CD
U)

c

CD
CO
CO
CD

C

.2



I I
i i
!^
C
g

E
CM

to

00

CO

I

2

8

0

ll

T3
0 o>
4= 0Ui

(0 "tf)
(0 (0

w O
c
re

(J

0

o.
0

N

O

c

E
E

|a i

I

CD
I

Q


0

II

3
CO

^

g

^

^

<

%

I

_g
g_
0)

CD
N
CD "C CD
CO

s

lo

o

b

CO

o

U
g
m

E

O
O
"D

o
U
o
o "D

c

CO CO

3
O

•a o
CD

o

ManningB_00007402

g

CD

0)

o
o

CO

CD

E

tl

CO
Q-

CD

g
^

CD CD

0)

>D CO
C
D
"o C
CD
> >

D g
CO C
>
CD O Q .

O (O U CD CE
D
I

I

17327

CO
tf)

fSi
TD CO

o:g"^ E
-c i2 ~ 0
3 CO to
=
O CO

LU m O
DC
O — Q

re
o
Q.

tf)
C

re

m
( / )

CL

CO
I
CO

O

^ CO
CD

SCD
g m

Oa

TD U) 0
CD 0) sz
>
O CD c

as

O
Oi

0)
Ui

QQL

re

CO
CD

E

.52 DL CO
0)LL
CD

Q:

O
0

CO
ManningB_00007403

(D
C

D)

g O

O O ^••G
^ CD

lCOl= .S^l
g

c

CO o

m^

O —
g C
_ = "O
CO O

111S.

CO o . m
I 3I m Q.

c

00 45 CO

• S5

g)

O) CO

.22 o <

g ;=

CO
CO —

fi.

C

^ 0 —
c m
- 0 - 5 o GO
2 ^ CO o
o_

sl

2

CO

^

O)
CO o
Q.^
^

> ^

C
3 O
CD C CO

17328

"Sf
tf)

0
CO

CO
U)

^ LU

CD Q
CJ) ==
CO LL

S

3

o
I

CO

2
0

og

as

^

0

^
0.

^

tf)
(0

re

0
CL 0

Oa

« Q

11

O
o O
LL od

o>
0
Ui
0

o.

CO

-o to
u
0

0

Q.
O

^

0

^

>

£

0
0

0 c

CO 0

-2

o. I - to
D) . y

ill
CD CL O

ManningB_00007404

fa
0 CO

v.^^

_g
CO 2_
CD 0
CO C
O o

3

^

H
<
Q LU

0

o

^^

£ £o
o

0

"D "D

o #

^

0 CO

ro «

|i
±3 .Q

§S
CO "D
C

0

0

u

5t
c >^

g-G
C

0

S (0
u c

CO CO CO
0
0
D ) CO CO >» Q. CO

0

0

0 C

CO 0

o: U U O 5 a_

17329

8

BE _uo_u_ou_ EwE:oon_ .

38 .8 E2

mozmo?qmez?
JOMHZOD mom
mo wm?mmumm ez


zmomoz?mmumm
wmmon_m:n_





ManningB_00007405

17330

on

.



oz: $5



ManningB_00007406

17331

h~
tf)

0
O.
O

LU
LU
01

>

c
LU
0
3
3"
0
O.

h0_
LU

O
c

CO

0
O

"c

ManningB_00007407

17332

8

mEmw..w .

m_DOn_



ManningB_00007408

17333

mm



mEmom .550 .





ManningB_00007409

17334

o
CO

CO
Ui

0

X

0
CJ
BBai

CO
CL
LU
CO

"co

CO
0

U
"3
C
0
CO
(0
0
"3
"3
<

ManningB_00007410

17335

CO

0
>

g&
c o
2

tf) c

c

0)

^

tf)

c
c
o
o
0

0

tf)

Q.
_

Q
O
UJ

"O

o

0

re O .

o 0^ b

0 O)
± 0^ CO
•o > c o
0 O
tf)
UiQC Z
tf) 0 c
tf)
re
^ o O
tf)
CO
^

=

B^H

^

tf)

O 0
tf) * "
tf)

OT
0

- 2 ^

D)

0

"O -o <

53
A

A

A

I

CO

S 23 5o
^™

ManningB_00007411

•o
o

<

re £

tf)

re c re
fi.

>

•-^
O

as

O)

jO

>

0
CL

•tf) 0 o>
0)

g E
re

ii

O Q) CO

ll

0

CO

o
o
a

B^H

CO
A

SB
sa

sa
VB

3
00
CO

o

B^H

0

Q.

CO

A

17336

CM
CO

0

CJ
0

(L

^

oa a
LU
>

LU
CO
CL
LU
H
CO

^

3

•S-o
0 Oa
O O0
C^
0

Eg
3 LU
0 -D
La,

C

3 CM
0
0

r 5
%o
c c

ManningB_00007412

17337

8

mmo.__o_o< .

o?om nw?

5.3
Q6 Q3





Manning 3

17338

CO

CO

^

J_

o
c
o
m
c
o
_c

^ ™

BS

as

CO B M

E

0
3
"3

"co

Q.

>

Ui C Oa
c 0 LO
0 o>
0
3
Ui
re

"o
0)

rki

as

glo o

0

Oa

•D
T3
<

MannlngB_00007414

0O)

n

tf)
0

0

(D L.
Ui Ou

" O^

i =o
O

0 Q
>
c
O O

O
(D "co
%

0

Oa

i=

Q

"3

2

o 00

"3
0
0
0 CO
"3 CO CO
O 0 0
CJ OC "3
0 - - "3
0
0

L.

«

tf) OT
CO OT
I - 0)

sa

CO O

0

0 ^

O E ^
•Q

c

II

A

al

>

0

-

Are

c

0

CD S

>

k

sas

aO

s<

tf) o

.111


o hi 6 u

I

0

go

"O.Q

o
c S b
CO 0

u^m

^

3

E ^

'C
.2

CO

C

C
0

>

O CO
0 2

3

Ui CO

>

B ^ H

0

CO

^•E > OT I
13
$1
5CO 5 = CO 0 C
B ^ H

• HHi

^

CO

CO
0

^

A

CO

^

17339

tf)
CO

^

CD
G)
CO

^ o

° o.
<

Q

CD
CO
CO

LU

•gi
3 IJ-

g|8
O g Q
Q a; w

§ o> OT

Q_
LU

CO

CO

CD
CO
CO
sis
eg^

Q. O)

a
g
o
m
o

%

CD

S 5)
2^
CD —
O CO

SI

o
CO

0

O

|5
CD

to 2

o
Q

O
0-

o

m (D

CD
W

cog'
z)
o:
^ CD
CD CO
-o
O

CD

CD
O
CD

t~

CD
^

CO

r-

O

ip:

> »

O)

w (0

CO O )
CD >
CO

O
J2
r \

'
CO

.CcD c

gg
^

E o
o
o

•D
ManningB_00007415

17340

4^

CO
CO

c

0
tf)
0

n

c
re
o

0

o

0

C
0

o

•D
3

8^

CO

»l

0

is.

0
CO

^

>

o
0

O

CQ

0

re
.C O)

g 2
ManningB_00007416

•a
c
re

b

17341

4^

h-

co
CO
>%

jO
CO

0

o

:>

o

3

-* c

3
U

£ -Q

0

2=

E

IO

36
8S

o

I

"O

CO

to

>

CB
(fi
C
0

g%

2
0

S5

OB
as

0

CO

E

•o
2

£

0
Ui
0

o.

Q.
*

•JC

^ "JS

3)
C
"3

£ E

"3
0

CO

3)

Ui

c

Ol

c

o
CO
CO

CO
•JC

•K

O


3
Q.

I

" N
B

=

b

0
(J

^

CO

o>

iJ «

E

ii

<

CO
CO o

o

8.=

0

D) Q

.5 O
> * Q)

3

25

CO Ji^
0 (0
Q
0

c n

? c
ManningB_00007417

g
t

CO

>

CL

a

CO

£

B ^ B

0
"3
O
0
0

il

0
0
Ol

E
o

o

8



ManningB_000O7418

17343

c^
CO

CO

c^

c^

g

CD ^

o
o

^

0
^

3

^

to

_c

o
-Q
^

<

-Q
CD

CD
CO "D

E

p
CD
^
^
^

•g
>

o

c^
^

LU

b

2
CO
CO

_co

u

CD

> >

O -c
< CO

^

CO (D

U £
CD { -

^CO §CO
n-

C

o o
g JO

— o

CO • >

-g ^

CD

o g

CD
a m

O

0)

c
>

U §

ManningB_00007419

E
o

o

tf)

z
o

H
Q
Z

o
o

Q_ CO
. . CO

O

c

^< B
to

CD

O m
CO 2 ^

17344

o

h~

^

^

^

0

u

ion

^

LU
CO
CL

O
C
CD
D)
<

O
LU

o
0
CO

0
CO

c
o
ro

CO

g
ro

0

0
d

Q.

O

n

0

LU
ManningB_00007420

E

0

O
B

ro

o
o

^

o

_c

0

o

3
CO

o

CO

o
o

ro

CC

' ~

o
CO
CD
Q_
^

c
0
0

It

b


^

O

o
CO
TD
C

m
>

Q_

^

o

1^

O

CO

^
^

cc
^

Xo _c
9

17345

^^^^^^
^
^

^

o ^

re

o

^

^

E

g

CO

c

0

re ^

CJ
IU
CO
CL

C^

.

^

^

^

fi.

o ^

ii

o
0

^

^

fi^E

3
O

o P

c O)
. .=
c

E^ o
^

^^'a
111

3 0

re ^ o
^ o

^•

ba
"co

^ 0

ManningB_00007421

o?f

0

"3
0

E c

^

^

^

^

i^^

3

o

g

^?OT"iJ
-u
0)

17346

CM
1^

OT

8^
O
^

Oa

O 0
0

^

CO

3)
3)

CO

2^
o
b
y_ 0

CO

(L

o

CO "03

CO CJ
0

"3
0
O

c
o
"co

o ^

^ §

B ^ H

E

c
" i O > 3)
CO i2 i= BE
o. BE O m

b

0

O CO

Q_

0

E |.i"o

c
o

B ^ H

CO

0

o

^

CJ

CO

0

c
c
aC

> >

A A

>

(fi

=

re
c
o

CO

re

CO c

OT
c O

CL
A A A A A

MannlngB_00007422

o

E

I ^ H

I ^ H

£ £

E

!

ssli
lit

11III

CQ

c
o

17347

CO

0

CO
LU

o
0

$

U
3
tf)

O
O

tf)

0
0

<

z
O

^ 3
CO o o
0 > 0
0 C >
> 0 0-

"3
0
0
O 0
£

2
8
LU
CL _

o.

O 0 C O
CO E .2 0
3
CO IJJ 0
0


O >- E

>

Ps
LU
III

ManningB_00007423

o

LU 0 O

O A

A

"3 _ O 0
0 CO CO -o
0
0 CL 0

"3
0

to
E

?o

3 3
0 O
CO
0 Ui
0

It

E

E

to LU

La

a o

c

0

0

5> 0

3

o «

>

o

O

o

0
(0
0

o

^3 i t
0
C 3) o

i

0

0
CJ 0
c
0 Q.
"3 Ui
3
0
o
0
0
0
"3
C
O
tr\

I

CO

c
o
CO

H ^ £I 2

o
o
A

0
3

2 ^

<

CO
Q

o

0

H

0
0
0

^

o

5 =5
<
A 2 A

0
O
0
0
O

E
E

0
0

OC

o
0
0
0

17348

^
1^

0
£

CO
^

o
0

c
0
^

3

CO

0
Ui

ll

c^
o *- re
re JS c
E £ «
o).£
c re
re
c^
> o
^

tf)

0
3
tf)

1^

tf)
3

0
>

O

O

o

tf)

il

UJ o
CO o
CL p

o £

1^
o .S>

••
zs

c

o re E
tf) tf) 0
Z c


ManningB_00007424

o

*- re

Ire

0

2 re
o. E

H

8 re

IX io

u_ o
o

mwmm

CL

17349

tf)

g
CO
_o

>^
o

z^ Io

.5 CoO
CO c
g
to
CD
CO c r
o
in
CO
CO

CO

JO o
O CM
0)

S
o

0)
^

CO
<

CD
<

E
O o
—I

o

LU Q
ManningB_00007425

CO

^

o b

? 8
CO
o

CD

o

T-

g

CD M_

^ o

"D Csl
CD T-

0

O
CO C
CD
0
CL

g
to

CD
3
O
^
lO
CO

O

O JD
-Q
0
CO

to
E
o

CD
"D
^

b

••
O

CD
^

CO

ti

CD

•g
>
o

CD

CO

6 ag g
—I CD

UJ CO

2l

m C5
UJ
O







ManningB_DOO07426

17351

Intelligeoce Aoalyst Course
CourseA/ersion: 243-35F10 / 001
Delivery Group/Phase: A / 0
Status: Commandant Approved as of 2008-10-02
TABLE OF CONTENTS
PAGE
Lesson 1

Section I Administrative Data
Section II Introduction

4
7

Terminal Learning Objective - Identify 35F10 Course Administrative
and Academic policies
Section III Presentation

Lesson 2

Lesson 3

Lesson 4

9

Section IV Summary

10

Section V Student Evaluation

11

Section I Administrative Data
Section II Introduction

12
15

Terminal Learning Objective - Identify principles of protecting classified
information, material and media
Section III Presentation
Section IV Summary
Section V Student Evaluation

15
17
53
54

Section I Administrative Data

55

Section II Introduction

58

Terminal Learning Objective - Present Intelligence Findings
Section III Presentation
Section IV Summary

58
65
461

Section V Student Evaluation

463

Section I Administrative Data

464

Section II Introduction

468

Terminal Learning Objective - Perform Map Analysis and Construct
Proper Military Symbology

Lesson 5

Lesson 6

7

468

Section III Presentation
Section IV Summary
Section V Student Evaluation

470
577
578

Section I Administrative Data

579

Section II Introduction
Terminal Learning Objective - Define the Operational Environment and
Identify U.S. Warfighting Doctrine

582

Section III Presentation

606

Section IV Summary

617

Section V Student Evaluation

618

Section I Administrative Data

619

Section II Introduction

622

592

X
ManningB_00011649

PROSECUT ION EXKi
S ' i for
idcn caMon
jr idcnfpc
PAGE OFFERED: _ PAGEADMI
MilT^:.
PAGE
OF
PAGES

17352

Terminal Learning Objective

Lesson7

Describe the Battlefield Effects

645
657
658

SectionI

659

Administrative Data

Section II Introduction
Terminal Learning Objective

662
EvaluatetheThreat

Section III Presentation

Lesson8

670

SectionV

Student Evaluation

671

SectionI Administrative Data
Section II Introduction

672
675
DetermineThreat Courses of Action
675

Section III Presentation
Section IV Summary

677
692

SectionV

Student Evaluation

693

SectionI

Administrative Data

694

Section II

Introduction

Terminal Learning Objective
Section III Presentation
Section IV Summary
SectionV
LessonIO SectionI

697
Draft anisic Plan

697
698
702

Student Evaluation

703

Administrative Data

704

Section II Introduction

708

Terminal Learning Objective-ConductTargeting in Phase III and
Phase IV Operations

708

Section III Presentation

710

Section IV Summary

791

SectionV

792

Student Evaluation

Lesson11 SectionI Administrative Data
Section II Introduction
Terminal Learning Objective
Section III Presentation
Section IV Summary
SectionV Student Evaluation

Conduct Intelligence Analysis

Lesson 12 SectionI Administrative Data
Section II Introduction
Terminal Learning Objective
Analysis

793
796
796
797
807
808
809
812

Produce the products for the Mission
812

Section III Presentation

814

Section IV Summary

821

SectionV

Student Evaluation

822

Administrative Data

823

Lesson13 SectionI

Manning8^00011650

662
664

Section IV Summary

Terminal Learning Objective
^COA^

Lesson9

632

Section III Presentation
Section IV Summary
SectionV Student Evaluation

17353

Section II Introduction

827

Terminal Learning Objective
Section III Presentation
Section IV Summary
SectionV
Lesson 14 SectionI

Conduct Intelligence Analysis

Student Evaluation

843

Administrative Data

844

Section II Introduction

848

Terminal Learning Objective
and Battle Drills

Oualify Soldiers on Core WarriorTasl^s
848

Section III Presentation

849

Section IV Summary

851

SectionV

852

Student Evaluation

A p p e n d i ^ A V i e ^ g r a p h Masters

^I^^A^

A

Appendi^B

Test^s^andTestSolution^s^

Appendi^C

Practical Exercises and Solutions

Appendi^D

Student Flandouts

Manning8^00011651

827
829
842

^N^A^

^N^A^

D

1
8
^N^A^

1
C

1
1

17354

Prosecution Exhihit55
Ipage
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial

17355

Prosecution Exhibit 5^
Ipage
classified
"SEC^RET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial

17356

Prosecution Exhibit 5^
2pages
classified
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classified
supplement to the original
Record ofTrial

?a IE:
CLASS .NFORMATION NONDISCLOSURE A t_ I - -

Aonuatvtatvr BETWEEN RADLCV 0.1? ANN TN AND THE UNITED

(Name of Individual - Primed or typed)



I. Intending to be legally botmd. I hereby accept the obligations contained in this Agreement in consideration of my being granted
access to classi?ed information. As used in this Agreement, classi?ed information is marked or unmarked classified information,
including oral cornrnurtications, that is classi?ed under the [standards of Executive Order 12356, or under any other Executive order or
statute that prohibits the, unauthorized disclosure ofinforntatlon in the interest of national security; and unclassi?ed information that
meets the standards for classi?cation and is in the process of a classi?cation determination as provided in Sections 1.1 and l.Z(c) of
Executive Order 12356. or under any other Executive order or statute that requires protection for such information in the interest of
national security. I understand and accept that by being granted access to classi?ed information, special con?dence and trust shall be
placed in me by the United States Government.

2. I hereby that I have received a security iruloctrination concerning the nature and protection of classi?ed information,
including the procedures to be followed in ascertaining whether other persons to whom I contemplate disclosing this information have
been approved for access to'it. and that I understand these procedures. .

3. I have been advised that the unauthorized disclosure, unauthorized retention, or negligent handling of classi?ed information by me
could cause damage or irreparable injury to the United States or could be used to advantage by a foreign nation. I hereby agree that I
will never divulge classi?ed information to anyone unless: I have officially veri?ed that the recipient has been properly authorimd
by the United States Government to receive it; or I have been given prior written notice of authorization from the United States
Government Department or Agency (hereinafter Department or Agency) responsible for the classi?cation of the information or last
granting me a security clearance that such disclosure is permitted. that if I am uncertain about the classi?cation status of
information, I am required to con?rm from an authorized official that the information is unclassi?ed before I may disclose it. except
to a person as provided in or above. I further understand that I am obligated to comply with laws and regulations that prohibit
the unauthorized disclosure of classi?ed information.

4. I have been advised that any breach of this Agreement may result in the termination of any security clearances I hold; removal
from any position of special con?dence and trust requiring such clearances; or the termination of my employment or other
relationships with the Departments or Agencies that granted my security clearance or clearances. In addition, I have been advised that
any unauthorized disclosure of classi?ed information by one may constitute a violation, or violations, of United States criminal laws,
including the provisions of Sections 641, 793, 794, 798, and "?952, Title 18, United States Code, ?the provisions of Section 783(b),
Title 50, United States Code, and the provisions of the Intelligence Identities Protection Act of 1982. I recognize that nothing in this
Agreement constitutes a waiver by the United States of the right to prosecute the for any statutory violation.

5. I hereby assign to the United States Government all royalties, remunerations, and emoluments that have resulted, will result or
may result from any disclosure, publication, or revelation of classi?ed information not consistent with the terms of this Agreement.

6. I understand that the United States Government may seek any remedy available to it to enforce this Agreement including, but not
limited to, application for a court order prohibiting disclosure of information in breach of this Agreement.

7. I understand that all classi?ed information to which I have access or may obtain access by signing this Agreement is now and will
remain the property of, or under the control of the United States Government unless and until otherwise determined by an authorized
official or final ruling of a court of law. I agree that I shall return all classi?ed materials which have, or may come into my
possession or for which I am responsible because of such access: (3) upon demand by an authorized representative of the United
States Government; upon the conclusion of my employment or other relationshi with the Department or Agency that last granted
me a security clearance or that provided me access to classi?ed information; or (oi) upon the conclusion of my employment or other
relationship that requires access to classi?ed information. Ifl do not return such materials upon request, I understand that this may be
a violation of Section 793, Title 18, United States Code, a United States criminal law.

8. Unless and until I am released in writing by an authorized representative of the United States Government, I understand that all
conditions and obligations imposed upon me by this Agreement apply during the time I am granted access to classi?ed information,
and at all times thereafter.

9. Each provision of this Agreement is severable. If a court should ?nd any provision of this Agreement to be unenforceable, all
other provisions of this Agreement shall remain in full force and effect.

10. These restrictions are consistent with and do not supersede, con?ict with or otherwise alter the employee obligations, rights or
liabilities created by Executive Order 12356; Section 7211 of Title 5, United States Code (governing disclosures to Congress): Section
1034 of Title 10, United States Code, as amended by the Military Whistleblower Protection Act (governing disclosure to Congress by
members of the military); Section 2302(b)(8) of Title 5. United States Code, as amended by the Whistleblower Protection Act
(governing disclosures of illegality, waste, fraud, abuse or public health or safe threats); the Intelligence Identities Protection Act of
1982 (SO U.S.C. 421 et seq.) (governing disclosures that could expose con dential Government agents), and the statutes which
protect against disclosure that may compromise the national security, including Sections 641, 793, 794. 798, and 952 of Title 18,
United States Code, and Section of the Subversive Activities Act of 1950 (50 U.S.C. Section 783(b)). The de?nitions.
requirements, obligations, rights, sanctions and liabilities created by said Executive Order and listed statutes are incorporated into this
Agreement and are controlling.

(Continue on reverse.

N-SN. STANDARD FORM 312 (REV. '1 -91)
Previotn edition not usable. FOR OFFICIAL USE ONLY by GSHESOO
Law Enforcement Sensitive 32 CFR 2003. E.O. 12356 usm-rc v2.oo



.
ManningB_00022912 ii-?3-?V1437 7 A A
i



. .

ll. 1 have read this Agreement carefully and my questilons, -if any. have been answered. acknowledge that the brie?ng officer has
made available to me the Executive Order and statutes referenced in (His Agreement and its'im[ilcmeming regulation (32 CPR Section
'2003.20) so that I may read them at this time, if! so cl1oose.-

SIGNATURE DATE SOCIAL NUMBER

. 03 (Sim MM

ORGANIZATION (W CONTRACTOR. LICENSEE. ORANTEE OR AGENT. PROVIDE: NAME. ADDRESS, AND. IF APPLICABLE. FEDEKALSUPPLY CODE NUMBER)

t'TYD='orPrim)
Company:
Battalion: 3057? Mr 8? Attestation completedon:

Fort Buachuca, Arizona 85613

WITNESS ACCEPTANCE

THE EXECUTION OF THIS AGREEMENT WAS WITNESSED THE UNDERSIGNED ACCEPTED THIS AGREEMENT ON
BY THE UNDERSIGNED. BEHALF OF THE UNITED STATES GOVERNMENT.
SIGNATURE one om;

Elisa K. Rubin 7 APR mm: Elisa K. Rubin 7 APR mm
NAME we ADDRESS (Me or prim) . NAME AND ADDRESS (mac or prim)

Commander, Commander,

ATPN: ATZS-GI-E ATIN: ATZS-GI-E

Building 22320, Au Avenue Building 3 22320, Augur Avenue

Fort Huachuca, AZ I3-6000 Fort Huachuca, AZ 85613-6000

SECURITY DEBRIEVING ACKNOWLEDGMENT

I reaffirm that the provisions of the espionage laws. other federal criminal laws and executive order: applicable to the safeguarding of classi?ed
information have been made available to me; that I have returned all clssi?ed information in my custody: mail will not communicate or transmit
classi?ed information to any unauthorized person or organization: that I will report to the Federal Bmeau of investigation any aueapl by an
unauthorized person to solicit classi?ed information, and that I (have) (have not) (strike out inappropriate word or words) received a security
debrie?ng.

SIGNATURE OF EMPLOYEE DATE

NAME OF (Type (I prin SIGNATURE OF WITNESS

EQHCEI ugemblolom 'mMduaIa, issolielled from dual.

isExecnrrive0rder93Vl. Zl?ciermmeclnx
your mceswnreixia-motion


r\

NOT APPLICABIE TO NON-GOVERNMENT PERSONNEL SIGNING THIS AGREEMENT.

FOR oFr=|c|A|_ us; ONLY STANDARD FORM 312 BACK (REV. 1-91)

NW Senwve usarrc v2.oo

ManningB_00022913



CLASSIFIED INFORMATION NONDISCLOSURE AGREEMENT

AN AGREEMENT BETWEEN AND THE UNITED STATES
(Name of Individuaf - Printed or typebl)

1. Intending to be legally bound, I hereby accept the obligations contained in this Agreement in consideration of my being
granted access to classified information. As used in this Agreement. classified information is marked or unmarked classified
information, including oral communications, that is ctassified under the standards of Executive Order 12958, or under any
other Executive order or statute that prohibits the unauthorized disclosure of information in the interest of national security;
and unclassified information that meets the standards for classification and is in the process of a ciassification determination
as provided in Sections .1 .2. 1.3, and Mia) of Executive Order 12958, or under any other Executive order or statute that
requires protection for such information in the interest of national security. I understand and accept that by being granted
access to classified information. special confidence and trust shall be ptaced in me by the United States Government,

2. hereby acknowledge that have received a security indoctrination concerning the nature and protection of classified
information. including the proceduresto be fotlowed in ascertaining whether other persons to whom I contemptate disclosing
this information have been approved for access to it. and that i understand these procedures

3. have been advised thatlhe unauthorized disclosure, unauthorized retention, or negligent handling of classified

information by me could cause damage or irreparable injury to the United States or could be used to advantage by a foreign
nalion, hereby agree that i will never divulge classified information to anyone unless: have officially verified lhat'the
recipient has been property authorized by the United States Government to receive it; or have been given prior written
notice of authorization from the United States Government Department or Agency (hereinafter Department or Agency)
responsible for the classification of the information or tast granting me a security ctearance that such disclosure is permitted. 3
understand that ifl am uncertain about the classi?cation status of information. I am required to confirm from an authorized
official that the information is unclassified before may disclose it. except to a person as provided in or above. i

further understand that am obligated to comply with laws and regulations that prohibit the unauthorized disciosure of
classified information.

4. I have been advised that of this Agreement may result in the termination of any security ctearancesl hold;
removal from any position of special confidence and trust requiring such clearances; or the termination of my employment or
other relationships with the Departments or Agencies that granted my security clearance or ciearances. In addition. I have
been advised that any unauthorized disclosure of classi?ed information by me may constitute a violation. or violations. of
United States criminal laws. including the provisions of gections 641. 793. 794. 798. '952 and 1924. Title 18. United

States Code. the provisions of Section 7B3(b), "?lls 50. United States Code, and the provisions ofthe Intelligence Identities

Protection Act of 1982. I recognize that nothing in this Agreement constitutes a waiver by the United States of the right to
3 prosecute me for any statutory violation.

5. I hereby assign to the United States Government all royalties, remunerations, and emoluments that have resulted, wilt
result or may result from any disclosure, publication, or revelation of classified information not consistent with the terms of
this Agreement.

. 6. understand that the United States Government may seek any remedy available to it to enforce this Agreement including,
but not limited to. application for a court order prohibiting disclosure of information in breach of this Agreement

7. I understand that all classi?ed information to which have access or may obtain access by signing this Agreement is now
and wilt remain the property of. or under the controt of the United States Government unless and until otherwise determined
by an authonzed o?icial or ?nal ruling of a court of law. I agree that i shall return all classi?ed materials which have. or may
come into my possession or for which i am responsible because of such access? upon demand by an authorized
representative of the United States Government; to) upon the conclusion of my empioyment or other relationship with the
Department or Agency that last granted me a security clearance or that provided me access to classified information; or
upon the conclusion of my employment or other relationship that requires access to classi?ed information. If! do not return
such materials upon request, I understand that this may he a violation of Section 793 andlor 1924. Title 18. United States
Code, a United States criminal law.

8. Unless and until I am released in writing by an authorized representative ofthe United States Government, I understand
that all conditions and obligations imposed upon me by this Agreement apply during the time i am granted access to classi?ed
information. and at all times thereafter.

9 Each provision of this Agreement is severable. If a court should find any provision ofthis Agreement to be unenforceable,
all other provisions of this Agreement shall remain in full force and effect.


(Continue on reverse.
NSN STANDARD FORM312 (REV L00)
-0 Previous edition not usable by NARAIESOO
- 32 cart 2003. so izesa
fa AF. V1.PAGE rt.





17360

10, These restrictions are consistenlwith and do not supersede. conflict with or otherwise alter the employee obtigations,
rights or liabilities created by Executive Order 12356; Section 7211 of Title 5, United States Code (governing disclosures to
Congress): Section 1034 or Title 10. United States Code. as amended by the Military Whistleblower Protection Act (governing
disclosure to Congress by members ol the military}: Section 2302(b)(a) of Title 5. United States Code. as amended by the
Whistleblower Protection Act (governing disclosures olillegality. waste. fraud, abuse or public health or safety threats); the
Intelligence Identities Protection Act of 1982 (50 C. 421 et seq.) (governing disclosures that could expose confidential
Government agents). and the statutes which protect against disclosure that may compromise the national security, including
Sections 641. 793. 794. 798. 952 and 1924 or Title 18. United States Code. and Section 4(b) of the Subversive Activities

Act ot1,950 (50 U.S.C. Section 783(b)). The definitions. requirements. obligations. rights, sanctions and liabilities created by
said Executive Order and listed statutes are incorporated Into this Agreement and are controlling.

ll. have read this Agreement caretully and my questions, it any, have been answered. I acltnowiedge that the brieling
officer has made available to me the Executive Order and statutes relerenced in this Agreement and its lmplemanting

SOCIAL SECURITY NUMBER


regulation (32 CFR Section 2003.20) so that I may read them at this time. ill so choose
DATE

SIGNATURE
i0 08





ORGANIZATION (IF CONTRACTOR. LICENSEE. GR NTEE PROVIDE: NAME. ADDRESS. AND. I7


Ec3.wo.r?.
icicm lxI.R\\iat ma

ST rm? \?.SL.o?3c

WITNESS ACCEPTANCE

THE UNDERSIGNED ACCEPTED THIS AGREEMENT ON
BEHALF OF THE UNITED STATES GOVERNMENT.

THE EXECUTION OF THIS AGREEMENT WAS WITNESSED BY
THE UNDERSIGNED.

SIGNATURE DATE SIGNATURE DATE
cg 08
NAME NAME AND noon: ss (Type or print)
Batonck. Kyle Stark. ?Loren

10100 N. Riva Ridge Loop
FT. Drum. NY 13601

IOIOD N. Riva Ridge Loop
FT. Drum. NY U601

SECURITY DEBRIEFING ACKNOWLEDGMENT

rearrirm lhalthe provisions or the espionage laws. other lederat criminal laws and executive orders applicable to the safeguarding or classified
intormation have been made avaiable to me: that have returned all classified information in my custody. that I wil not communicate or
transmit classified intomiatlon to any unauthorued person or organization; that I wil report to the Federal Bureau at lnvesbgation any
attempt by an unauthorized person to solicit classi?ed inronnation. and that I (have) (have not) (strike out inappropriate word or words)
received a security debrie?ng

SIGNATURE OF EMPLOYEE DATE

NAME OF WITNESS (Type or print) SIGNATURE or WITNESS

NOTICE: The Privacy Act, 5 u.s.c. 552a, requires that lederal agencies inform althe ime intormation is solicited from them. whether the
dsclosure is mandatory or voluntary, by what authority sucli inlormation is solicited. and what uses will be made ol the intormation. You we hereby
advised that authority for soliciting your Social Security Account Number (SSN) Is Executive Order 9397 Your SSN will be used to ident'Ih' you
precisely when it is necessary to 1) certify that you have access to the intorrnabon ?indicated above or 2) determine that you access to the
htomiation indicated has terminated. Although disclosure or your SSN is not mandatory. your lailure to do so may impede the processing at

such or determinations. or possibly result in the denia; of your being granted access to classi?ed tiitormation.

NOT APPLICABLE TO NON-GOVERNMENT PERSONNEL SIGNING THIS AGREEMENT

STANDARD FORM 312 BACK (REV. 1-00)
APDPEVLCO

17361

Prosecution Exhibit 61
2 CDs
classified
"SECRET"
ordered sealed for Reason 2
Military Judge's Seal Order
dated 20 August 2013
stored in the classified
supplement to the original
Record of Trial

17362

Prosecution Exhibit 62
2pages
classitied
"SECRET"
ordered sealed for Reason2
Military Judge's Seal Order
dated20August2013
stored in the classi^ed
supplement to the original
Record ofTrial

17363
03
3

2
3'
(O

00

00
fl

->l
UJ
fi
00
fi

TO

TO


LO
cn ro
NJ NJ NJ
o
ro Of»
fi '

i\j
NI
Ln
M

t-*

x» i-* Ln

t-*

UJ
Xi

^

UJ
fi

cn

UJ
00

^ UJ
•o

UJ

00

fi
00
NJ
ro O
cn
i-> t - '
fi fi
UJ v j
i-» NJ
^ Ln
fi
un
l-» t-"
U) NJ
Ln NJ

ro i-"
~u f i
O

VI
UU
fi
00
O
fi
t-'
fi
00
l->

ro

NI
UJ
UU
NJ

VJ
Ul
fi
VI
LO
UJ

ro
O
VI
00
fi

vl
UJ
fi
vl
00
00
NI
NJ
NJ
I-"

VI
OJ
fi
vl
00
Ln
NJ

vl
UJ
fi
vl
vl
UJ

g

NJ
ro
I-"
M
LO

Ul

ro

vl
LU
fi
VI
vl
l-»
fo
M
NJ
.C>
Ln

l-> (Tl
i->
i-»
i

00 ro
ro

p i->
v l UJ M
i-> io Ln
^
00
O cn
cn

vl
UJ
fi
VI
vj
O
ro
M

io

vj
UJ
fi
vl
Ln
LO
ro
O
Ln

fi
Ln l->
fi
i-» i-*
I-*
UJ

lo
f->

vj
UJ
fi
Vl
M
M
ro
ro
H"
UJ
fi
fi
NJ
UJ
fi

vj
UJ
fi
vj
I-'
O
to
Nl
t-»
Ln

i->
fi
M
fi
00

vj
UJ

vl

vj
UU
fi
Vl

vl
LU
fi
vl

O
O Oo
LC 00
M

NJ

cn
o
f i vj
Nl
Nl
ro
LO

00
Ln

o

M


to
to

in
I-"

ro
ro

io
>-»

vl
LU
fi

cn
LO
cn
i->
LO
LO
M
NJ
LU

vl
UJ
fi
CTi
to
ro
i->

cn

NJ
to

ro

vl
LU
fi

vl
UJ
fi

cn cn
LO
vl
UJ
NJ M
NJ f i
r o 00
l-» l

l-> rf oi
fi
NJ
M
LU

cn LO
00 O cn
i-» LO
LO
LO o

LU

UJ

ro

vl
LU
fi

vl
LU
fi

cn cn
cn
vl

tn
LO
NJ
to
NJ
M

i-'
fi
i-*
VI
to

ro
to

ro
M
M
to
Nl
I-*
Ln
to

vl
LU
fi

(/)

cn
LU
LO
l-»
LO
LO

o
>

i->
ro

LO
Nl
t->
Ln
00

n

UJ

cn
00
i-" 2
LO
LU n

wt

m
n
o
fD

vj
LU U l
fi fi
CTI
Ln cn
fi
M
00
t o ro
t o Nl
f i NJ
h-'

TJ

ro

TO

>J
UJ

Add

UJ

00
M
fo
UJ

^

IP

LU

in

UJ

.28.24

-xl ^
UJ UJ
f» A
00 00
Ln Ln
M
O
NJ NJ
o NJ
^ NJ
I-'
bo
Ln i


.9.95

•Nj ^ •vl
UU UJ UJ
f&
A
00 00 00
CTI
CTI
Ln
M
O
^
NJ i->
M
Ln O Ln
v j cn >J
M
UJ i ^ j
M
O
M
LO
ivj
UU
Ln
a\
UJ
UJ Ln M
6
Ln
00

iew

ecord

'o
o

00
-vj
•vj
N
O
CD

<

•X

a <

•a

>
a.
a.

CL

C
n
rt71
00

o

UJ

UJ

UJ

UJ

UJ

Ul

UJ

UJ

UJ
-V

00

H"
00

t-"
00

l->
00

I->
00

f-"
00

—.
I-"
00

UJ
I-*
00

UJ

\M

00

UJ
~v
I - * t-"
00 00
UJ

UJ
I-"
00

UJ

UJ

UJ

UJ

UU

UJ

UJ
LU

—.
H-* —.
l-> —.
00

00

•—.•—. •—.

\
o
o o
00 00
00 o
00 o
00 o
00 o
00 o
00
I-' I-" M
->
M

t-^ (
o o o o o o O o
UJ UJ UJ N l r o NJ NJ o
Ln UJ N I 00 v l v l NJ LT
> > > > > > > >

LU

UJ

h-" k-* (
M
-> 00
00 00 00
h-> t-"
OO 00 00
^ •V,
o
o
o
o
o
00 00 00 00 oo "o o o
l-» l-> l-> M
H" 00 oo 00
o o o o o LO LO LO
o o o o o Ln Ln f i
Ln Ln Ln t > LU 00 cn UJ
> > > > > > > >

00




LU

—.
t-*
00
v^

UJ

UJ

LU

UJ

I-"
00

h-" M
00 00

h-"
CO

O
00
LO
IO
00

O
00
LO
to
Ln

o o "o
oo 00 00
LO
fi

LO
UJ
LO

LO
NJ
00

o
> > > > >

S s S S S S S 5 s S s s s 2 2 5 S 2 S 2 5 ^ s S S S S 2 S S 2 S

ro
LU
LU
LU
UJ
to
UJ
l->
LU
00
fi
Ln
fi
LU
vj

H>
LO
Ln
UJ

cn
IO
0^
l->
UJ
00
fi
Ln
fi
LU

cn

NJ
O
OO
Nl
ro
00
h-"
t-'
UJ
00
fi
Ln
fi

h->
LO
Ln
ro
LU
M
O
i-»
UJ
00
fi
Ln
fi
I-*

vj

i->
O

VI
Ul
Ln
O

VI v j
LU UJ
Ln cn
Ln v l
O
LO
un
00 f i NJ
h-" H' h-"
LU LU LU
00 00 V I
f-» i-* i

v l CTI
LU
f i Ln NJ
VI i o f i
fO v l N l
Ln t-^ NJ
ro
o

UJ
00
Ln
00

vj
UJ

LO
M
LU
VI
M

UJ
l-»
LU
vl
M

l-»
LU
cn
io
i


fi
j-» UU
LO
NJ LU
cn Ln

VI
LU
vl

cn
»
-' k-" cn
v l NJ Ln
l->
M
LU
NJ

i-»

00

NJ
Ln
Ln
M
NJ
fi
LU
t-*
UJ
NJ
M
LU
Ln
LO
M
00
to

ro
Ln
Ln
I-"
t-»
fi

O
t-"
UJ
NJ

vj
LU
fi
LO
00
OO
l-»
UJ
NJ

vj
UJ
LO
00
I->
LU
NJ


UU
Nl

ro

Ln
fi

8

O
LU
H"
LU

fo

vl
LU
Ln
h-"
fi

I-*
LO
Ln
Ln
NJ
i-»

cn
t->
UJ
NJ

t-*
LU
ro
M

LU

VI
vj
vl
fi

cn
>-»
(-'
UJ
I-'
NJ
fi

ro
vl
to
Ln
00
Ln
fi
I-*
UJ

VI
LU
vl
fi
fi

ro
I-*
LU
M
Nl
fi

vl
UJ
VI
IO
ro
Ln
I-*
LU

NJ
f>

UJ
fi
fi
ro
LO
vl

t-"
UJ
I-»
NJ

UJ
fi
fi
ro
fi
VI

(-»
I-*
UJ
M

cn
o
vl
LO
I-*
UJ

vl
LU
00
Nl
vj
l->
M
Nl
00

u» f i

»->

m
o
M

O
IU

^

<

(U

fo'

s

t/»

"O
>
n
n
•D
5
a.
c
n
33

<

n
ro

vl
LU

o
ro
ro LO bo
fi fi fi
fi
O
o
UJ UJ UJ
o o
H» N l NJ
P
N l i-" i-" i-> Ln Ln P
UJ
UJ
LU f i
i
»
l
»
O NJ ro l-» UJ UJ V I V l t o LO io O
Ln LO M
LU LU i
I - ' ro (
vl» i-"
VI O
f i cn
UJ
-> v l Ln ri->o f i f i UJ
Ln t-" LU
UJ

i-* i-* i-"

fi
UJ
Ln
LO
M
00

VI
LU
VI
00

< 00
1
Date

M
t-" h-> \
I - * l->
00 00 00 00 oo
\
^
O
o 00
o
CO o
00 o
00 o
00 o
00 o
00 o
00 o
00 o
00 00
I-* I-* (
-> h-" I - * t-* l-» l-> l - * t-* t->
I - ' l-» k-* M
M
k-* l-» l-> I - * o o
UU UJ UJ f\J M
NJ M
l-> o Ln f i
f-» H* O
00 00 00 Ln r o >
-> ^
> > > > > > > > > > >
y-'

UJ

vl
UJ
vl
00
UJ
LO
l->
Nl
00

Ln
Ln
VI
Ln

cn
>->

LD

ro
00

h-"
O
ro
to
VI
fi
to
h->
ro
00

bo bo bo
p p p
i-» i-' M
Ln un Ln
UJ p
vl
l->
cn
t-* i->
l-» ro
O

I-"
VI
UJ
f i vj
Ln t-»
I - " LU
h-* M
l-> l-»

o
UJ

LO
00
00

cn
cn
Ln
M

vl
LU
Ln
UJ
NJ
fi
l-»
NJ
00

ro
00 ro
00 ro
00
bo bo bo bo
o p p p
M
i-* M
M
Ln LU LU LU
l-> VI vJ V I
M
O 00
vl vl
o LU LU
LU

VI

cm
m 00

^
(/)

ss

o
>
n
m

n

TJ
^
O
Q.
C

n

r+

-a

-o

>
Q.

CL

7
00
M
vj
vl

LU
UJ
vl
•V, H»
ro 00

UJ

UJ

Ul

^M
cn

i->
LO

ro
t


ro

\
O
OO
O
O
00
00
M
o
h-* v l NJ t o (-' N l o
M
UJ NJ o
UJ O o
UJ
vl
00 00 U l ro
un LU
•0 > > > -o > -0 > T3 •D >
^ ^ ^ 5 ^ 5
^ ^ S

vj

'—
o
00

s

00
M
M
LU
k-*

P
>O

00 O
l-» 00
f-» LO
o Ln
NJ 00

M
LO
v^

—.
o
o o 00
00 00

i-»

s

LU

l->
Ul

LU



Vj

Ln

ro

00

NJ

UJ



UJ

LU

UJ

LU

UJ

M

^
ro
i


NJ NJ
l-» UJ


ro
fi

to
I-*

o vO^ U l
M
ro LO
LU
cn
o

\
O
o 00 O o o O o O o O O O
00 00 I - " 00 00 00 00 LO 00 00 LO LO 00
LO l-» ro f i N l l-> cn v i t o cn cn cn l-»
M
i-> NJ
o NJ ro f i l-> LU o UJ LD
o UJ
N l f i v j ro o 00 NJ M
i-> t o ro
cn
> •0 "0 •D "0 •o •0 > > > > > T3
^
5 2 5 ^
S S S S 2

^i->

NJ

o


i->
ro

I-"
vl

LO
~v
00

ro
O

LU

UJ

M
00

t-*
00




s

z

O
00
NJ
fi

o
00
00

ro
t-»
LO

LU

Ln

00
LU

cn —N l UJ I - *
to o O
00
—.
o
o
o
o
o
00 00 00 00 00
NJ

O
00
l->

o Nl
cn V I O
> TJ T3

to
UJ
LO

vj
Ln
fi
13

vl

o

LO
T3

VJ
fi
M
-0

00
fi
l-»
D

•a
s S S S S s S 2 5

I

o
m
0)
(/I

10
O

OJ

17364

0)
3
3
3'
(Q
3D

m
n
o
O
CO

^

vl

•vJ
•vJ

vl

vl

UU UJ

LU

vj
LU

VI
LU

Ln Ln Ln Ln Ln
O O O o O
fi
ro ro M I - *
LU M
O cn Ln

l->

t-*

f& f i

00

(
->
ro
fi

00
t-*
NJ
fi

t-*
fi
00
I-*

(
-> M
fi fi
00
I-'

00
M

ro ro ro
f^ f i f i

l-> LO
l-> LO
i-" LO
i-" LO
i->
LU LU UJ UJ
cn
fi
fi
fi fi
fi
o M M (
»
00

vl

vl

VI v l
LU UJ UJ UJ UJ
un Ln Ln f i f i f i
O O LD LO LO
O
I-*
CO 00 00
LU LO I - " 00
LU
ro t-*
l-> h-> l->
to f i f i U l t-" LU
LD 00 00 N l ro
UJ l-> t-* I - " f i LU
M
ro ro f i Ln
LU f i f i LU i - l
LU f i to ro
00
VI
LU

vl

o o

(-'

cn

LO
vl
Ln
Nl

O

fi
p ro
t-*
p
i-» io
LU
P i->
»-» l->
A VI
»-'

Ln o
Ln ro U l p
fi

^
m
•<

VI
LU
fi

o i-"
Ln
fi

•o
>
Q.
Q.

UU LU
UJ

LU

LU

t-"
00

M
00
v_

o
00

O

^M t-* t - i \ t-" ^M t-" M t-*
-> 00 00 00 00 00
00 00 00 (
00
v^
v^
—.
'

.
•v^ —o o
00
o o
o o
00
00 o
00 00
00 o
00 o
00 00

t-*
LU

o
TJ

00
t-"
t->
LO
TJ

UJ

I-*
t-*
LD

UJ

t-» t-*
I-*
00
TJ TJ

(
»M
00 00

TJ TJ

UJ

UJ

Ul

h-* t-"
l-> M
f^ I - *
TJ TJ

Ul

UJ

l-»
00 00

O
oo

00

00

00

00

OJ

00

O

OO

l->

<

o
o
f i ro

m'
S.

ro ro
Ln Ln
00 ro
TJ TJ TJ TJ

l->




SS2 SSSSS2 2 s S

UJ

ro

UJ
NJ
00

UJ

ro v l v l
00 Ln f i
Ln Ln Ln O a\
Ln Ln UJ f i p
00

LU
00
K'
fi
Vl

i-» f i
vl M
l-»
fi fi
vl Vl
NJ ro

UJ
LO
M
fi
VI

^

Ul
I-*
fi
VI

ro NJ N l
v j v l cn v l
LU f i cn t-" cn
cn
fi
UJ un LU
00 LO f i Ln f i
ro l-> cn UJ 00
o f i UJ O NJ
I-» l->
fi
fi
vl vj

ro
ro ro ro ro
un Ln Ln Ln Ln Ln Ln
f i f^ f i f^
fi fi
i-» l-» r-* i-»
I - * l->
f i f i ro
cn cn cn
NJ o
tn p
vl
cn cn
cn (Tl cn Ln Ln i-' v l

P

i-» i-» M

00

00

fi

O

LU

LU

fi

i->
fi

M
fi

t-"
fi

cn
to

tn

cn
LD

00

ro

o
fi
fi
UJ

LO
00
t-*

to
fi

ro

-o
o
a.
c
n
30
03

R S

vl vl vl vl v j v j
f i f i f i LU LU f i
Ln Ln Ln 00 V I ro
f i f i f i LU f i v l
O
ro I - " CTi
cn LU Mro Ln
UJ LD 00 cn
v l cn
Ln
cn
vl
fi
fi

vl
Ln
Ln
ro

l->
fi
t» UJ
vj
LO Ln
UJ Ln
Vl

M
fi

(->

p vl
Ln
»-'
O vl

o
fi
I-"

l-» M
i-»
fi fi fi
UJ LU LU
vl vl v l
Ln Ln Ln

t-» i->
fi fi
LU LU

Ln Ln Ln
Vj

t-"

!^
i-k

fi

00
LU

ki

Ln

ro

LU

LU

M
fi
LU

vl
l->

Ln Ln Ln l->
o p O cn tn



.

v^
UJ
vl VI
ro
f i LU l-»
ro N l
'—
Nl —
Nl
h-» 00 ro
ro ^
f i f» f i UJ
LU un
cn
O
o o O ~Ov
o 00
o 00 i00
o "o
LO
LO LO
00
LO to
^ -»
t-> I - * to LD ro o LO ro LU
Ln ro f i NJ o Ln f i Ln LU
NJ V I
cn LO LO V I v l M 00
T3 •0 > > TJ > > > >

vl

00
I-"

g
n

vl
t-"

vl

I-'
LD

vl vl vl
LU
LU
O
Ln f i cn
Ln Ln Ln
00 00 o t-" I - " O cn
o
o
o N l NJ
o Ln NJ LU
Ln
cn v l cn v l LU ro
LU

h-'
fi fi
LU LU
Ln t-»
vl vl
l-> Ln

M
fi
LU
I-'
vl

i-» I - "
f& f i
UJ
i-> ro
vl

Ln Ln

pv l

cn cn l
-» i-*
» I-*
l-» i
MLO
Ln l
Nl
Lu
»
|
>
fi
vl
»-> Nv ll LU
Ln Ln
LU
00

00 00
LU UJ
i->

l->
fi
I-"

fi
i->

M
00

ro

Ln

vol

M
LO

ro ro
vl vl

UJ

Ln f i
fi
M
fi
t-"
Nl
Nl

ro ro
ro
O O O
^ vl v l

i-» i->

fi

M
Nl
VI

)->
cn cn
LU
UJ

ro
O
Ln
Ln Ln 00
f i UJ O
fi
cn Ln
00 LD
00
I-»

vl

LU

vl

LU

Ln
cn
LU LU
cn
f i cn
cn

M
l-> t-" i->
f i f»
h-* i-> i->
ro N l N l
NJ

VI
LU
fi
LO
00
UJ

»
->
LU
LO
UJ
(Tl

o
o o
vl vl vl

i-i

I-"

cn

i->
Nl

00

ro N l
t-*
tn cn cn f i

I-*
UJ
LO
UJ

i->
LU

to

I-"
vl

i-*
vl

I?
T3

i-»
UJ
00

UJ

f» f i

d\
fi
Ln

5

T3

>

a.
a.

UJ

UJ

LU
LU

UJ

LU

f& UJ UJ LU
O NJ NJ ^
ro
LU 00 \
f i t-> v l
CTI o o
v^
O
o o o o
00 o
00 00
O
o O
LO 00
00 00
OO
^ ^ 00
UJ ro v l
tn LO 00
M
M
(
»
M UJ O LU LU UJ NJ M o
LU v l v j f i f i f i Ln v l v l
> -a -o -D -D TJ > > >

ro
v» ro

I - " t-'
LO LO
ro NJ

CT-i

fi

LU

tn v ^ i-» UJ LU
cn cn
NJ O
I - * 00
VI
ro I - " 00 N l NJ
o M00 ^l-> l-» LU v»
LO
o O ~LOv o LO
o o
o 00
o O O O ^o 00 o o o 00
o o o O
o 00
LU

UJ

M

vj



,

>

00 H"
LO t-" NJ
ro
NJ
fi M
vl

o
> >

00
Nl
M
LU

TJ TJ

2 1 S2 S1 2 2 SSZ SSSZ 2 1 2 2 2 E 2

vl

00 00
00
(
» 00 00 00
cn o cn Ln ro NJ Ln f i
ro o UJ o O Ln Ln O Ln
Ln v l LU Ln Ln f i cn 00 f i to
> > > > > > > •D > >
s SSS2 SS2 5 s
00
LU
LU

00
LU

00
M
UJ

Ln
TJ

S
o
OJ

17365

INSTRUCTIONS FOR PREPARING AND ARRANGING RECORD OF TRIAL
USE OF FORM - Use this form and MCM, 1984,
Appendix 14, will be used by the trial counsel and
the reporter as a guide to the preparation of the
record of trial in general and special court-martial
cases in which a verbatim record is prepared. Air
Force uses this form and departmental
instructions as a guide to the preparation of the
record of trial in general and special court-martial
cases in which a summarized record is authorized.
Army and Navy use DD Form 491 for records of
trial in general and special court-martial cases in
which a summarized record is authorized.
Inapplicable words of the printed text will be
deleted.

8. Matters submitted by the accused pursuant to
Article 60 (MCM, 1984, RCM 1105).

COPIES - See MCM, 1984, RCM 1103(g). The
convening authority may direct the preparation of
additional copies.

12. Advice of staff judge advocate or legal officer,
when prepared pursuant to Article 34 or otherwise.

ARRANGEMENT - When forwarded to the
appropriate Judge Advocate General or for judge
advocate review pursuant to Article 64(a), the
record will be arranged and bound with allied
papers in the sequence indicated below. Trial
counsel is responsible for arranging the record as
indicated, except that items 6, 7, and 15e will be
inserted by the convening or reviewing authority,
as appropriate, and items 10 and 14 will be
inserted by either trial counsel or the convening or
reviewing authority, whichever has custody of
them.

13. Requests by counsel and action of the
convening authority taken thereon (e.g., requests
concerning delay, witnesses and depositions).

1. Front cover and inside front cover (chronology
sheet) of DD Form 490.
2. Judge advocate's review pursuant to Article
64(a), if any.
3. Request of accused for appellate defense
counsel, or waiver/withdrawal of appellate rights,
if applicable.
4. Briefs of counsel submitted after trial, if any
(Article 38(c)).
5. DD Form 494, "Court-Martial Data Sheet."

9. DD Form 458, "Charge Sheet" (unless included
at the point of arraignment in the record).
10. Congressional inquiries and replies, if any.
11. DD Form 457, "Investigating Officer's Report,"
pursuant to Article 32, if such investigation was
conducted, followed by any other papers which
accompanied the charges when referred for trial,
unless included in the record of trial proper.

14. Records of former trials.
15. Record of trial in the following order:
a. Errata sheet, if any.
b. Index sheet with reverse side containing
receipt of accused or defense counsel for copy of
record or certificate in lieu of receipt.
c. Record of proceedings in court, including
Article 39(a) sessions, if any.
d. Authentication sheet, followed by certificate
of correction, if any.
e. Action of convening authority and, if appropriate, action of officer exercising general courtmartial jurisdiction.
f. Exhibits admitted in evidence.

6. Court-martial orders promulgating the result of
trial as to each accused, in 10 copies when the
record is verbatim and in 4 copies when it is
summarized.

g. Exhibits not received in evidence. The page
of the record of trial where each exhibit was
offered and rejected will be noted on the front of
each exhibit.

7. When required, signed recommendation of
staff judge advocate or legal officer, in duplicate,
together with all clemency papers, including
clemency recommendations by court members.

h. Appellate exhibits, such as proposed instructions, written offers of proof or preliminary
evidence (real or documentary), and briefs of
counsel submitted at trial.

DD FORM 490, MAY 2000

Inside of Back Cover

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh