may-.1 0 use use USC 424, U50 3024(1) (U) Table of Contents (UIIFOUO) Executive Summary ..3 (UIIFOUO) Background .. 6 Impact Assessment .. 9 (UIIFOUO) Annex A: Terms of Reference .. 19 . -22 Annex 11 I use Annex C: .24 (UHFOUO) Annex D. (UIIFOUO) Annex E: (UJIFOUO) Annex F: Annex G: Distribu?on ..39 oi use 2 use 424, use 30240) "pagg:s?4 ?n?l we in full and not included. A: ?wage? -we Pages and 8 are withheld in full and not included. (bl(3li 10 USC (3)250 . . gli BACKGROUND. 302 4% 1_ 4 la fomier NSA contractor compromised] Ifrom NSA Net and the Joint Worldwide Intelligence Communications System (JWICS). On 6 June 2013, media groups published the first stories based on this material, and on 9 June 2013 they identi?ed the source as an NSA contractor who had worked in Hawaii. (3):1c use use 3024 I (Ufz?F6U6j On I 1 July 2013, LTG directed establishment of the Information Review Task Force 2 (IRTF-2) to acquire, triage, analyze, and assess all DIA and compromised information. Since 11 July 2013, IRTF-2 has led a coordinated DOD effort to discover, triage, and assess the impact of non-NSA Defense material from NSA holdings of compromised data. of 18 December 2013, the federated IRTF-2 assessment community includes: re use use 3024[i). - 424, USO 30240) Pages 10 and 11 are withheld in USO 424,(b) full and not included. USC use (U) IMPACT ASSESSMENT USO -USC USC I a 424.(b) USC 3024(1) Pages 13 thru 18 are U30 use withheld in full and not 0 Included. 424 . use 3024 {$131110 Intelligence Capability Eiaig??ilyai The scope of the compromised knowledge related to US. intelligence U30 capabilities is staggering. I (3)10 use 424, (b)(3)I50 use -3924 .. (Q) USC . . . . . . .51., 1 - 9- - - [sages 21 thru 26 are withheld in full and not included. (bll3}1'l0 U59. (3)250 USC (U) As speci?ed in E0 12953, as amended, information may be classi?ed at one of the following three levels: 0 Top Secret shall be applied to information., the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to national security. 1 Secret shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to national security. I Con?dential shall be applied to information, the unauthorized disclosure of which reasonably could he expected to cause damage to national security. (U) By CI Damage De?nitions?? (U) Responsibility for national assessments was assigned to by the Countezintelligence Enhancement Act of 2002 and reaffirmed by the Intelligence Reform and Terrorism Prevention Act of 2004 (U) Four Major Categories I - I I 3 Per 0NcIx; . (3)150 USO (31:50 use 30240) 49 Annex Pages 28 thru 31 are withheld In full and not included. (3)150 USC 3024(1) USEC 424,63} (3)150 USC 302-4(i} 2? Pages 33 lhru 35 are withheld in full and not included. Annex Ugo (3)50 use? 30240} USC 424,03) USC $02-4[i) 32 Pages 3? and 38 are withheld in full and not included. Annex L33f(:3 (3)250 USC 424,03) (3)150 USO 3_024(i} 36 Annex G: Distribution use 42-my Chart Classi?ed: W50 U53 30240} Deputy Under Secretary of Defense for Intelligence and Security Director for Intelligence, 12, Joint Staff ibl(3.335O Department of the Army? use 3e24m I-Ieadquarters, U-S. Marine Corps l?epartment of the Navy Depamnent of the Navy l-Ieadquarters, Air Force Headquarters, U.S. Air Force Coast Guard U.S. Africa Command .U.S.Cen1:raJ Command Cyher Command U.S. European U.S. Northern Command U.S. Paci?c Command U.S. Strategic Command U.S. Transportation Command US. Southern Command US. Special Operations Command O?iee of Director of National Intelligence USC 424,{b) (3)150 USC 3}Q24{i} 39