DOCID 4292212 National Security Agency Central Security Service PRESIDENTIAL TRANSITION 2009 pproved for Release by NSA on 4 13-2016 FOIA Case 58027 DOCID 42 92212 Introduction Response to Request for Information 'om Director National Intelligence What We DQ Providing and Protecting Vital Information for our Nation Saving Lives 0 000 0 UNC Presidential Transition 2009 Information Book Contents Intelligence Operations with the War ghter Key Advancements in Signals Intelligence Support The Real Time Regional Gateway Contributions to Countering Terrorism Military Intelligence Support Countering Improvised Explosive Devices Protecting US Citizens Abroad Defending Vital Networks 0 0 Comprehensive National Cybersecurity Initiative Maintaining Situational Awareness of Threats to Critical Federal Networks Joint Communications Security COMSEC Monitoring Activity J CMA Support to US Forces Conducting Operations in Harm s Way Discovering Vulnerabilities in Information Systems Infonnation Technology Components Industrial Partnerships - Mitigating Vulnerabilities in US Information Systems Advancing U S Goals Alliances Contributions to Countering Crime Narcotics Expanding Broadening Signals Intelligence Foreign Partnerships Protecting Privacy Rights 0 0 NSA 0 Signals Intelligence Mission and the Protection of Privacy Righ Oversight of A Unique National Asset Workforce Transformation Strategic Plan for Technology National Security Operations Center NSOC Overview The Platform 86-36 Engineering the Future The Research Directorate Nuclear Command and Control NC2 Support Our Strategy for the Future Strategic Plan Transformation 3 0 Overview 0 Comprehensive National Cyber Initiative - Frequently Asked Questions DOCID 4292212 Our Workforce - Workforce Overview October 2008 0 Civilian Employment Plan Our ro ams 0 The Budget Picture Magnitude and Focus NSAJCSS Acquisition Overview Our Worldwide I Footprint I Center Build-out An Administration Transition Overview 0 Georgia Fact Sheets 0 Hawaii Fact Sheets 0 Texas Fact Sheets 0 Colorado Fact Sheets 0 Accesses Through Partnerships 0 NSA Collection Our Org a_nizatign and Leadership 0 Organizational Charts 0 Leadership Biographies DOCID 4292212 uoyanpoJJu DOCID 4292212 National Security Agency Central Security Service tut - fit- wig Defending Our Nation Securing The Future Response to DNI Request for Information 3 November 2008 Introduction world s information and communications increasingly reside in a rapidly changing interconnected technological environment Through a unique ability to Operate in that environment the National Security Agency Central Security Service gathers and shares unique foreign intelligence and it protects the vital information and networks of the United States and its allies Operating within a rigorous 'amework to protect legal and constitutional rights saves lives and advances America s goals and alliances Ul PBUQlCarrying out these missions every day while continuoust preparing for the rture is the work of a large complex enterprise Its scope includes tens of thousands of skilled and dedicated civilian and military personnel an extraordinary technology base sites around the world and customers and partnerships throughout the Intelligence Community the broader federal government and beyond This paper outlines the missions and mctions strategies organizational structure and relationships that enable the work of It provides a starting point and framework for a deeper understanding of this unique national asset Mission Statement mission is to provide a decisive information advantage for the United States and its allies This is accomplished through two inextricably connected missions Signals Intelligence SIGINT and Information Assurance IA which together enable the performance of a third rnction Computer Network Attack CNA operations - Through SIGINT provides foreign intelligence that gives decision-makers and war ghters access to the often-secret communications and information of adversaries and rivals 0 Where SIGINT professionals are the Nation s codebreakers their counterparts in the mission are its codemakers Through IA prevents unauthorized access to US classi ed and national-security-related information and systems while ensuring that this vital information and systemsremain available to decision-makers and war ghters 0 Through enabling CNA working with the Joint Functional Component Command for Network Warfare enables the denial disruption or degradation of our adversaries' information and information systems as authorized by appr0priate US authorities Derived From 1-52 Dated 20070108 Declassify On 20320108 46W DOCID 4292212 U Strategic Intent and Goals Ll-#139999 carries out its missions in an environment of continuous rapid and dramatic change This is true of the target environment for example the difference between large nation-states highly mobile di irse terrorist networks and individual actors and the information environment characterized by the volume velocity and variety of information on the global network Effective operations require great capability adaptability and agility Re ecting these imperatives the Agency s strategic intent is to accomplish its mission every day while continuously preparing for the future modernizing its mission systems and applications its facilities IT and other infrastructure growingand developing its workforce and instituting and employing sound business management practices The Strategic Plan outlines the following four strategic goals NSAJCSS STRATEGIC PLAN Goal Mission Delirer responsive reliable re ective and expert Signals Intelligence and lnfonnation Assurance and enable Nenvorir Wadhre operations for National Security under all circumstances - Effectively apply Signals intelligence and Information Assurance and enable Network Warfare operations to defeat terrorists and their organizations at home and abroad consistent with US laws and the protection of privacy and civil liberties - Provide rn-yptologic Services that enable partners to prevent and counts the spread of weapons of mass destruction - Avoid strategic surprise by achieving and maintaining capability and continuity against dif cult targets - Protect national security systerns against adversary exploitation and cyber- attack - Support the global mission and strengthen joint and combined military network attack operations through the provisioa of required intelligence and technical expertise Goal 2 Transformation Achieve global network dominance through the development and deployment of a new generation of globally distributed active and passive capabilities 0 Deliver maintain and operate network-enabled tools to strengthen analytic expertise methods and practices tap expertise wherever it resides and explore alternative analytic views - DeveIOp an integrated interoperable distributed architecture to optimize the next generation of systems and unify exploit defend and attack capabilities on the common underlying in 'astructure - Develop and deploy a secure robust information technology infrastructure to enable distributed sharing and combined operations - Exploit path-breaking scientific and research advances that will enable us to maintain and extend intelligence advantages against emerging threats Goal 3 People Enhance an expert mrlg'bme to meet global corptologic challenges - Attract and leverage an expert and diverse workforce of mathematicians computer scientists engineers signals intelligence language and staff to support the mission - Educate train and develop our workforce to sustain and sn-engthen our critical skills - institute clear uniform physical and personnel security practices and pol icics that allow us to work together protect our nation's secrets and enable aggressive counter-intelligence activities - Recapitalize physical infrastructure to promote a modern world class work environment that safeguards the health safety and quality of life of our employees Goal 4 Business Practlees Create and integrate e 'ective and e 'icient amine management practices within the enterprise and witlr stakeholders - Integrate budget and performance management to align investment decisions with corporate and national goals - Develop responsive corporate business processes which rapidly allocate and realign investments and programs in an integrated way - Strengthen foreign intelligence relationships and enhance domestic partnerships with government industry and academia to help us meet global challenges DociD 4292212 U Organization and Structure U Organization charts for as a whole and its Chief of Staff where most support functions are located appear below The organizational structure is aligned to the Agency s mission and transformational imperatives The heads of the Agency s mission technology research and business management organizations report to the Agency Director as do the Chief of Staff General Counsel and Inspector General Two other direct reports the Central Security Service CSS and the Joint Functional Component Command for Network Warfare re ect the Agency s status as a combat support agency within and the military civilian synergy that is central to mission success U The organizational structure also re ects the multiple authorities of the Director NSA Chief CSS DIRNSA The DIRNSA serves in four different capacities simultaneously Director of NSA a Combat Support Agency under the Department of Defense Commander Central Security Service overseeing the military system Commander Joint Functional Component Command Network Warfare as a component commander under United States Strategic Command and Director United States Security Service as the federal government s executive agent for information assurance In addition the DIRNSA is senior member of the United States Intelligence Community and is the National SIGINT Manager The-National Securit Agincy - mornm i Mr - John Chris Inglis sarcasm - D'elionh A Bennani um - ChiefCSS Como de nee-rm n - rm Kama Manda USA entrant me sag Gen-Noel r Tom Jones usar 35 - ansnnass MGMT sermon novrsos MP Flock mascron DIRECTOR i - 12st om'acron SIGNALS mummcs momnon WCE I Ammo Drancma 1 assume Dr JI nu- roman muss dunes at Culick omscroa Threat Operations Center moc iim nonlin DIRECTOR usucss Commercial soluaoggceam Dukes 3 DIRECTOR National Sc rarity Operates Cantu- 1430C - RDMI Norm Hayes UV DOCID 4292242 WW nsa BUSINESS minnow cams or STAFF EVALUATION I ma 1 SENIOR LEADERSHIP momma orncs I mam I II mar amuse 93m cm STAFF - sopposr mnaauontanmcam I I comm RESOLWDN omen or PROTOCOL mom anatsrmmm Humansouncizs msrALLAn on some EDUCATION 8 CHCO a co woman mum mmsI AFFAIRS smmorc D Principal Activities and Functions large complex high-technology enterprise with a worldwide presence performs a broad range of mctions and activities mission operations as well as support and governance functions to accomplish its missions and prepare for the future Following is a brief overview of the main categories of activities SIGINT Mission Activities Within the SIGINT mission the principal activities consist of acquiring information understanding and interpreting it and sharing it with partners and customers who can act upon it hm 86-36 0 Acquiring information includes determining how best to obtain information responsive to customers intelligence needs gaining access to that information and capturing it This in turn gaining a mdamental communications paths and technologies - It also involvos developmg and melding systems that capture Signals and data and them into the system 0 Understanding and interpreting information includes rendering raw data intelligible and determining its relevance through techniques such as language analysis and others and then determining its meaning or signi cance by putting it in context combining multiple 4 TWW DOCID 4292212 sources of information determining patterns of activity and other activities that turn signals and data into usable intelligence 0 Sharing SIGINT information includes delivering actionable intelligence information to customers and partners This ranges 'om having embedded personnel give real-time intelligence to troops in harm s way supporting our policymakers diplomats and negotiators passing threat information to our allies or one of many other possible examples The net effect is that provides actionable intelligence where and when it is most needed saving lives and advancing the goals and interests of the United States and its allies IA Mission Activities The mission focuses on protecting classi ed and sensitive information and systems Within the mission NSA determines and responds to customer needs assesses vulnerabilities and develops architectures and solutions that enable secure and assured communications MNetwork Warfare Enabling Mission Activities The Joint Functional Component Command for Network Warfare J FCC-NW focuses on the optimization planning execution and force management for the assigned missions of deterring attacks against the United States its territories possessions and bases and employing appropriate forces should deterrence fail and the associated mission of integrating and coordinating computer network attack CNA and computer network defense CND as directed by Headquarters Integrated Cross-Mission Activities A signi cant portion of the work is performed in four cross-cutting organizations whose activities form an integral part of multiple missions WMission Management The National Security Operations Center N SOC serves as mission management center The NSOC provides worldwide situational awareness of operations and ensur that the system is focused the most important and current targets and challenges tb 1 86-36 0 W Network Threat Awareness The Threat Operations Center NTOC provides a common operating picture of the global network and potential threats supports the protection of classi ed and sensitive networks I Commercial Industrial Partnerships The Commercial Solutions Center NCSC leverages industrial relationshi and works with I partners to address the strategieijreeds of and the national security community 0 WW Foreign Relations has highly productive relationships with counterpart organizations in foreign nations that support the conduct of both the and IA missions The Foreign Affairs Directorate manages these relationships engaging with foreign partners in support of U S intelligence and national security DOCID 4292212 Research and Development Activities NSA must anticipate and keep pace with the rapid changes in technology that de ne and shape its mission environment Accordingly the Agency has extensive activities that support its missions discovering and deve10ping the tools and techniques thatwill prepare the Agency for the future UHF-039 Information Technology Activities would not be able to carry out its mission with the development engineering implementation and maintenance of a resilient and robust IT in 'astructm e to store process and transmit and protect vast amounts of information at extremely high speeds This work is the responsibility of the Technology Directorate which was created within the past two years to spearhead and focus the Agency's program of rapid technology nansfonnation Support and Governance Activities Many other activities are required carry out mission and manage the enterprise that makes that mission possible These include nancial and acquisition management human resources mctions education and training security and counterintelligence facilities and logistics and many others as well as processes to support the effective operation of the senior leadership and governance functions Many of these mctions reside in the NSA Chief of Staff structure and others in the Business Management Integration organization An essential element in the Agency s work is the array of activities from our General Counsel and Inspector General structures through training reporting auditing and other work across the Agency aimed at ensuring strict adherence to all laws regulations policies and other applicable authorities especially those relating the rights of U S persons U Customers Partners Role in the Community U Customers SIGINT and IA missions serve many customers within the US Government customers are listed on the chart below They include numerous organizations and commands within the Department of Defense elements of the Of ce of the Director of National Intelligence and other intelligence agencies and the ll spectrum of civilian agencies and departments Many of these customer organizations also serve as partners in the conduct our SIGINT mission also provides Information Assurance products and services to many of these same customers DOCID 429221 5 e 113 7 pl I - E ruin a s @mtomerss sewsF - hill 41 nIJ-t I'd - 4- 71 I lf lir f Illa as Pillar-sot 831w 13' - Emiiu 91 qt-La u- 5 Jui- I- u r afar siFmEF-szrf' we Lnt- an - 'H aiu'hq my 'g 1 1 i - - -- r-l I liu-ILF-hn U Partners Government maintains robust and productive partnerships These yield mission results beyond what any individual agency could achieve alone Several primary partnerships are with CIA NGA NRO and FBI with major areas as follows 8666 DOCID 4292212 - UHF-699 NSA maintains a strong partnership with FBI for the bene t of both organizations NSA reports foreign intelligence as a result of its SIGINT collection processing and analysis in response to FBI formal requirements which enables FBI to better perform its mission FBI leverages NSA's extensive subject matter expert base and tremendous technical expertise by requesting technical assistance to support 5 law mission In return NSA bene ts I 'om information sharing om FBI activities I 85-36 - Foreign Relations maintains foreign partnerships that Weaden a has an array of relationships with academia that advance its SIGINT and IA missions These arrangements leverage academic expertise against current mission accomplishment strengthen our educational institutions and help build the talent pool in elds such as mathematics computer science advanced engineering and languages vital to the Nation in general and the Intelligence Community in particular 3-9 56-36 U Role in the Community t Un Fe ej-The role of in the Intelligence Community takes multiple forms driven by several factors that make the Agency unique the nature of the particular accesses analytic and technical capabilities of the synergy between the multiple 'missions that is charged with and the combination of authorities delegated to the DIRNSA which in some instances carry beyond the organizational boundaries of and into the broader Intelligence Community at large These factors can be summarized as follows 0 Unique Nature of SIGINT SIGINT is a unique form of intelligence - it has been said that SIGINT is like putting your head in the other team's huddle SIGINT provides information 8 DOCID 4292212 S- FVW ibxa -Ptas-36 available through no other source and at its most success IN tai the secrets at foreign adversaries and rivals are trying hardest to protect a Unique Enterprise The reason can provide SIGINT is because of the remarkable capacities of the Agency a o I'I'he SIGINT mission cannot _be effectively performed without bringing all these factors to be 0 Unique Synergy of Missions In addition the authority and capability to conduct the SIGINT mission the combination of missions SIGINT and 1A military and civilian - are mutually reinforcing Work in each of these areasl strengthens mission performance in the others Expertise and capabilities in both areas is essential in providing security in cyberspace and enabling network warfare 0 Unique Authorities The DIRN SA has authorities that run beyond the organizational boundaries of The authorities extend into the military departments and agencies and as National SIGINT manager across the Intelligence Community This combination of factors makes an effective member of the IC in many ways The Agency is a contributor of intelligence that is valuable in its own right and when fused with other sources a partner enabling other IC agencies to better achieve their mission objectives a major factor in contributing to the success of ODNI-level intelligence production and a force for integration across the IC More broadly participates actively in ODNI-level rnctions and activities from the DIRNSA's membership on the DNI's Executive Committee through alignment with the strategic plans and objectives membership on boards and panels exchange of personnel with other IC agencies participation in the ODNI program and budget process and other work too extensive and varied to detail here U Conclusion is an integral and essential member of the Intelligence and Defense communities and its work contributes greatly to the mission success of its many customers The Agency s work helps save lives advance U S goals and alliances defend vital networks and protect American rights and liberties The men and women of come to work every day to defend the Nation and secure its future - 4292212 ui-H-I DOCID 4292212 in 'u PROVIDING AND PROTECTING VITAL INFORMATION FOR OUR NATION The National Security Agency NSA has served the people of the United States as the Nation s codemakers and codebreakers for over fty yearsf ln thlsifok as the for the Nation the men and women of NSA have helped to secure the Nation s communications while at the same time exploiting the conununications of our foreign adversaries Today the mission of and its military component the Central Security Service CSS has transformed to meet the challenges and opportunities of the information age Codebreaking has evolved into a comprehensive Signals Intelligence system that spans the globe gathering critical foreign intelligence from our adversaries' communications and networks The Signals Intelligence mission provides senior decision-makers and deployed war-fighters in the eld with the information that gives them a decisive edge over our adversaries In a similar manner codemaking has transformed into Information Assurance which not only secures communications in-transit but also provides computer and network security capabilities for information as it is being processed and stored The Information Assurance mission protects critical communications on national security systems from the foxhole to the White House enabling war ghters and decision-makers to communicate securely anywhere in the world in real time Under National Security Directive 42 the Director of NSA is responsible for the protection of national security systems within the federal government The mission is focused on saving lives defending vital networks and advancing U S goals and alliances - while at the same time protecting the privacy rights of US persons is uniquely positioned to accomplish its mission through the exceptional skills of its workforce Here at our teams of math maticians computer scientists language intelligence engineers and a host of others in supporting roles solve some of the most vexing intelligence challenges that face the Nation As the information age continues to transform the world will continue to transform its approach to its mission The men and women of will keep pace with these changes even as the Signals intelligence and information Assurance missions evolve into the realm of Computer Network Operations We will face these challenges as we have for the last half century - with detenninatidn creativity and a singular focus on what has always been the bottom line the safety and security of our Nation I NATIONAL Secunmr AGENCY a CENTRAL Schan' SERVICE - Dejending Our Nation Securing The Future DOCID 4292212 SAVING LIVES Today is world poses a wide range of threats to the safety and security of the United States and our allies Global terrorism puts at risk the lives ofonr citizens at home and abroad as well as the LS and allied arces engaged in con ntering this challenge Other threats stern orn econom ic environmental health and other conditions amend the world that our Nation is committed to help address Working with our partners in the Defense and Intelligence Communities WCSS prouides direct support as our Government works to protect the lites and safety of our citizens and comes to the aid of others Saving Lives - The Foundation of Saving lives has historically been at the heart of the mission During WWII Signals Intelligence helped defeat the German U-boats in the North Atlantic and win the Battle of Midway in the Paci c These successes hastened victory and the end of the con ict was established in response to the lessons learned from WWII Initially focused on meeting the challenges of the Cold War has evolved and continues to transform in the face of an ever-changing global environment Through its dual mission to provide and protect vital national security information today s is committed to protecting the lives of our citizens at home and abroad warning of impending threats to our Nation and its allies supporting our troops in harm's way and protecting our national leaders as t- tl'ltt they travel into hostile regions This commitment keeping our Nation and its allies safe is central to the everyday activities of the men and women of Combating Terrorism in today s ght against terrorism role is vital Instead of large powerful nation-states terrorist adversaries are loose-knit dispersed groups blending readily into civil society Fighting this enemy starts with the challenge of nding him The mission skills and technology of are uniquely suited to this challenge Terrorist groups rely on modern computing technology and the global communications network to recruit plan and act Signals Intelligence collection and analysis can reveal terrorist locations and intentions while Information Assurance helps keep our own and our partners most important communications secure against enemy exploitation - E I - Hl -nn ou-t 1 19-21 - DOCID 4292212 Signals Intelligence has served as an essential tool in nding ghting and capturing terrorists in lraq Afghanistan and elsewhere around the world In one of many exammes was a key contributor to multi- agency e orts leading to the elimination of Al Qaida in Iraq leader Abu Musab al-Zarqawi Recent advances in techmio'gy have made support more irnportaqtgagd more valuable H- thgn ever Information on quick-moving and agile terrorist operations is often highly perishable Fast action is essential When information on a terrorist s location or plans can be relayed quickly to troops on the ground lives can be saved Conversely delay can prove fatal has developed and now employs a technology that allows us to deliver actionable Intelligence to allied troOps within minutes of discovery This new technology has been hailed by our commanders in the eld as an extremely eifective tool that has contributed to a signi cant increase in the effectiveness of combat operations Saving lives has also been the focus of our work to protect against improvised explosive devices iEDs Inexpensive easy to build and deadly these devices can be planted along a roadside or carried by a vehicle or suicide bomber and other community partners are working towards countering these weapons Hundreds of our personnel literally serve side-by-side with our troops in combat risking their lives and safety to protect our freedoms A somber deeply a ecting tribute to their work is the Memorial Wall at Headquarters at Fort Meade Maryland Bearing the phrase They Served In Silence it commemorates the sacri ces of those CSS personnel who have given their lives for our Nation Protection at Home and Abroad The past several years have seen the United States take the ght to the enemy by actively combating terrorism abroad At the same time works with our partners and counterparts to discover and warn of threats stemming from overseas that would strike here at home We provide inforrnatlon gleaned from foreign intelligence collection to the FBI and intelligence information and Information Assurance support to the Department of Homeland Security and other agencies that are responsible for ensuring domestic safety NATIONAL SECURITY AGENCY '55 On many occasions information has assisted partners in investigating extremist threats making and successftu prosecuting those wishing to do harm to Americans at home also provides indications and warning of impending terrorist attacks or operational planning abroad Working as part of the Intelligence Community we provide timely and vital information to senior decision- makers enabling them to take appropriate actions to protect us personnel and interests overseas As a special focus personnel support foreign travel by high-level US Government ol cials ensuring that the appropriate US agencies are aware of any real or Supporting Humanitarian and Peacekeeping Efforts also provides relief operations in hostile areas with intelligence communications networks and communications security support US and intematlonai peacekeeping forces receive real-time updates enabling them to preetnpt and defuse potential problems reSulting in lives being saved and the promotion of peace I Secunrrv Service Defending Our Nation Securing The Future DOCID 42922 12 Sec un ring The Future Saving Lives 'b - Key Advancements in Signals Intelhgence Support I X3 8535 - The Real Time Regional Gateway has implemented a right people right methods and right capabilities approach 1 especially in Iraq and Afghanistan USC 30240 USC 798 86-36 Derived From 1-52 Dated 20070108 Declassify On 20320108 49W DOCID 4292212 FEERHHESP mung 5128 HS hallmark of this approach is the high degree of collaboration between and our IC customers and partners including the Services Wmme are using the Real Time Regional Gateway RT-KG a revolutionary Signals Intelligence architecture I The RT-RG program is bringing the full Signals Intelligence analysis processing and exploitation power of to deployed US and government agencies and military forces along with our and 3rd party partners in Theater through special agreements prowdes Signals Intelligence near real-time access to WW DOCID 4292212 - WW usc 30240 use 796 86-36 DOCID r WW bxam use 798 DOCID 4292212 - fin - The Futurethem 1 t u' Saving Lives SILENT to Countering Terrorism applies unmatched capability against a multitude of terrorist communications Our success enables e 'ective operations and decision making by U S and foreign military law enforcement and intelligence services to locate and neutralize threats to the Nation at home and abroad in support of the Global War on Terrorism The Challenge Facing the Nation 0 a range of security inspection Image Terrorists threaten US and interdiction and disruption activities at foreign partner interests at home and abroad or before the borders and using violence to in uence political bOth defenSiVe 311d targeted Offenswe nancial and military decisions Sunni military action- Islamic extremists especially visible since How NSAJCSS Contributes $231333 the 9 11 attacks also seek to in uence 3633 cultural and religious outcomes Terrorists - kill people and destroy infrastructure ideally with maximum publicity primarily by attacking so targets in government transportation and commercial sectors Military police and security personnel in non-hardened situations are also attractive targets Weapons of choice include suicide bombers and improvised explosive devices The Nation s Strategy U1113666 The U S Government U 86 ccunterterrorism response must include a mixture of soft and hard as well as offensive and defensive initiatives such as extensive intelligence gathering and effective sharing both within USG circles and with our foreign partners a disruption of terrorist command and control communications recruiting training facilitation nance travel and operational planning capabilities Derived From 1-52 Dated 20070108 Declassify On 20320 08 Tm WU usc 30240 mm-13 usc 1'95 36-36 DOCID 4292212 In I hick-Ball rt vutum 5 rum r 3 I tilde - b 3 -50 USC 302 Whitney intelligence gupport use 7934 tuna-P L- 86-36 WMeeting tlre eniand for global timely and actionable ma intelligence requires a strong partnership between and the US Military Services This partnership allows seamless collaborative execution of the ll spectrum The Challenge Facing faces a number of challenges in sustaining its mission in the 21st Century The target access and exploitation environment is vastly more complicated than it was a decade ago The volume of data in the global information environment grows daily making it more dif cult to isolate the information that our customers need The rapid changes in technologies and ever-increasing variety of communications challenge our ability to keep pace with the target environment Increased commercial availability of and other security methods make it dif cult to quickly access the intelligence value To meet these challenges has developed new business practices to extract information manage data correlate information derived from multiple sources and provide the resulting intelligence to the customer community Strategy This re-ali'gnment is the result of a joint US Under-Secretary of Defense for Intelligence Derived From l-52 Dated 20070108 Declassify On 20320108 55mm DOCID 42 92212 and effort to best capture the joint nature of operations How Contributes W technical and doctrinal barriers that hinder effective operations across the Service and Intelligence Communities successes in current Operations the Global War on Terrorism Operations ENDURING FREEDOM and IRAQI FREEDOM continue to guide our e 'orts toward providing vital intelligence at all levels of command At the tactical level the sharing of SIGINT data enriched with SIGINT- related IMINT HUMINT MASINT and open source data is facilitated with stronger analytic tools and regionally relevant data repositories providing a comprehensive and readily accessible view of the battlespace in order to facilitate the streaming of comp ete cohesive timely and actionable intelligence into the tactical commander s decision space At the operational level the Joint Intelligence Operations Centers and increasingly integrated tactical assets within the Centers will build and strengthen the role of the COCQMs within the Enterprise and eliminate the use 3024a usc rsa 86-38 DOCID 42 92212 I a a i I Eileen zit - Ming Our iN Countering improvised Explosive Devices meprovised Explosive Devices curr ntly represent the greatest threat to Coalition forces and by extension to US and Allied forces around the globe These devices can be planted along a roadside or carried by a vehicle or suicide bomber and other Intelligence Community partners have undertaken a broad array of 'v in ns'v rrorist wea on which is so eas to construct and de lo I so The Challenge Facing the Nation Wow every day in the news there are stories about explosions that injured or killed Coalition troops or Iraqi civilians These IEDs have had a devastating effect not only on the morale of Coalition troops but also on that of the Iraqi pepulation most of whom are innocent victims of this weapon M0 The Nation s Strategy 8536 i ii i-so usc 30240 86-36 Derived From 1-52 Dated 20070103 Declassify On 20320108 DOCID 4292212 Hm usc 3024 i usc 798 66-36 DOCID 429221 hm ham-so use 3024a Saving Lives exam use 793 - Protecting ILLS Citizens Abroad new was The Nation has no higher duo than protecting the lives of its citizens against foreign threats Our people rce dangers and risks when they are abroad uses all its resources in support of national e brts to ensure their safety L'i'he Challenge Facing the Nation How Contributes As described in the Intelligence Reform and Terrorism has signi cantly improved close secure Prevention Act of 2004 IRTPA U S collaboration among US Government and responsibilities to protect the lives of its intelligence community IC partners in line citizens does not end at the border For with IRA to protect us lives and example interests In each situation the US evaluates speci c criteria to assess the potential threat and design an security and intelligence support structure in response The Nation s Strategy ll MI I hum-RI 65-36 Also when high- ranking US of cials travel abroad primary responsibility for their well being falls in the hands of the US Secret Service Derived From 1-52 - Dated 20070108 Declassify On 20320108 WW8 bum-so use 30240 USC 798 86-36 DOCID 42 92212 DEFENDING VITAL NETWORKS Vital national security as well as the networks and systems on which it resides are under near- constant exploitation by adaersaries from around the world has the expertise and technology uniqueb suited to address this problem and a long history of providing security national security systems Insights and in mnation gained 'om the Signals Intelligence mission combined with the mortise and o 'ered hy the In tmtion Assurance mission make a key pkg er in defending vital networks against the threats of the Internet age The Threat Cyberspace - the equipment communications htfrasuucture and software that today s global htlormation network - has become the virtual central nervous system of the world's commercial economic sociaL governmental and military activity The us has reaped the bene ts of cyberspace - and depends upon cyberspace as fully as any other nation if not more so Yet for all its bene ts cyberspace is fraught with risk Modern networks and applications are often convenient and easy to use but vulnerable to intrusion and attack As a result foreign adversaries and criminals at home and abroad can readily steal change or destroy information or control damage or shut down networked systems that are essential to the economy government at all levels and military operations Threats to national security systems can leopardlze the Government's ability to defend the Nation and perform other fundamental functions By Presidential Directive the Director of NSA is designated as the National Manager for the security of national security systems across the federal government The Elements of Defense What does it take to defend against this growing threat Security in this arena means understanding what is being attacked understanding the foreign threats and understanding the tools and practices that can strengthen network security brings all these to the table Situational Awareness Through its Threat Operations Center monitors DOCID 4292212 potential threats to Defense Department systems This center is staffed by engineers and computer scientists drawn from across the federal government Using the best commercial and government-developed tools and drawing on Signals Intelligence expertise from and its allies and partners across the Government these experts track threats to the security ofDo networks The expertise of our workforce - math cs and computer science is instrumental in addressing the expanding challenges of cyberspace Discovering Vulnerabilities improves the security of our Nation's critical national security information by helping our customers identify and correct vulnerabilities in technology and operations that could be used to compromise the security of the information We lead the Nation in providing evaluation and guidance in the security disciplines that identify and mitigate these vulnerabilities This guidance is provided directly to our customers including the departments of Defense State Treasury Justice and Homeland Security enhancing the security posture of their critical networks Solutions the U S Government s sole provider of technology for the protection of highly classi ed information We accomplish this through a unique combination of mathematics and engineering disciplines develops algorithms certi es their implementation into national security systems and evaluates their performance over their lifecycle This ensures that the critical information required by our Nation's decision-makers is protected from exploitation by adversaries Not only does NSAICSS provide strong to the U S Government it also provides a state-of- the-art national security infrastructure to support these products NSAICSS is developing an automated system for delivering and updating security capabilities that will be far faster more efficient and more comprehensive than current methods Secunrrv AGENCY 5 lint CENTRAL SECURITY 5mm I Technical Expertise We also assist other federal agencies in keeping their information systems secure helps develop design security standards for information technology products Industrial vendors of information systems design their products to meet these standards and then submit them to accredited test labs for validation that the standards are met also provides keycuskimets with engineering include the securityfeaturm Looking Ahead We will continue to pursue these critical capabilities is a partner in the Comprehensive National Cybersecurity Initiative along with the Department of Homeland Security and over twenty other federal deparunents and agendas We are providing technical expertise and technology to support the successful implementation of a frontline defense for critical federal information systems As the issue of cyber-security intensi es in importance across the federal government and the capabilities of our adversaries continue to advance will continue to play a leadership role in defending the Nation's vital networks I 5 11 Defending Our Nation Securing The Future DOCID 4292212 - been 1 lb Julng Utn' 'rr'tigg 'ntjigfut Tilt l'nt'm rf i I I I gut uh Defending Vital Networks Comprehensive National Cybersecurlty Initiativ - - CNCI - is often said that the best defense is a good o ense The CNCI applies that strategy to the cyber domain The CNCI seeks to address current abet-security threats and anticipate tture threats and technologies in order to prevent deter and protect the U S Federal government gov domain against gtber intmsions The strategy includes establishing shared situational awareness across the federal government The Challenge Facing the Nation The explosive growth of the Intemet has sparked tremendous growth in information exchange and e iciency in only a generation and changed the way the world communicates and does business The effect of the Internet on everyday life is unmistakable Modern communications and information systems have become the virtual nervous system of society at large Increasingly these critical systems are vulnerable to intrusion theft destruction and corruption This threat to society goes to the core in 'astructure of the nation The Nation s Strategy UHF-669 On January 8 2008 the President signed an order establishing a plan to increase U S security in cyberspace That plan included greatly improving the security of governmental systems creating a clear picture of threatening or malicious activity and describing and assigning responsibilities to various organizations throughout the federal government How Contributes capabilities that brings to the CNCI will not only help provide an integrated defense against 56'36 foreign computer network operations against the U S but will also provide decision- makers with options for how to mitigate those threats JThe CNCI seeks to detect and deter cyber attacks against I government systems We will contribute our capabilities and expertise to 0 Provide advanced indications and warnings of foreign-based malicious cyber attacks against the U S mm 85-36 Derived From 1-52 Dated 20070108 Declassify On 20320108 DOCID 4292212 mm Ul Fe e will also provide authorized technical assistance to the Departments of Homeland Security and Defense as well as the Law Enforcement community to help their domestic cybersecurity efforts Such collaboration within existing authorities will ensure that the government is poised to effectively efficiently and transparently take advantage of the expertise throughout the community to address the threat to cyberspace security 1 Examples Stories ibiiai-Pt seas to the unprecedented unity of effort assembled across the broad federal coalition of participating departments and agencies the National Cyber Study Group NCSG with participation has successfully accomplished several major activities 0 U Completed a human resource strategy for hiring training and retaining robust cybersecurity workforce above activities have provided a foundation for NSAJCSS to gain momentum for long-term success 88-36 DOCID 4292212 II- poll-b1 22 31Horrors M 3 31V- Defending Vital Networks Maintaining Situational Awareness of Threats to Critical Federal Networks Our national security and economic well-being depend on our Nation '3 ability to success dly move information over protected networked information systems stands ready to detect and deter cyber threats and to defend critical national information neMor ts The Challenge Facing the Nation U The networks and systems that currently comprise our nation s cyber nervous system are based on a commercial architecture developed with an to interoperability and growth rather than security Over the past fteen years as these systems became an essential part of day-to- day government military and economic activity the abilities of hostile actors to compromise and exploit these vital networks have outpaced our ability to defend them WWhen a network is compromised information can be stolen changed or destroyed Worse the systems themselves can be congg ed damaged or even shut down Kb beaypt ease The Nation s Strategy WW Since May 2007 20 departments and agencies have participated in formulating a new national strategy to defend our networks the Comprehensive National Cybersecurity Initiative CNCI approved by the President on 8 January 2008 summarized in its own issue paper The CNCI harnesses the power of intelligence collection and analysis across all federal agencies to provide awareness understanding and early warning of cyber threats to our critical networks How NSA Contributes As the U S government s largest repository of expertise Derived From 1-52 Dated 20070108 Dcclassify On 20320108 DOCID 4292212 - I in exploiting and protecting networks is uniquely positioned to support the national strategy We are the Intelligence Community s leading provider of cyber threat information we make daily strides in our abilities to detect and mitigate cyber intrusions and engage in a number of analytic activities 0 Threat analysis provides a comprehensive understanding of the intentions capabilities and activities of the adversary It also uncovers current and emerging technologies capabilities and systems that could be used to attack or exploit systems owned by or of interest to the U S and its allies I Activity analysis allows for the discovery of unknown signi cant intrusion activity in-depth analysis of known intrusion sets and trend analysis 0 Network analysis and cyber target development eforts monitor characterize and report on foreign digital networks organizations and personas in cyberspace and target development to gain actionable intelligence on cyber adversaries To help us achieve success has placed a strong emphasis on building cyber partnerships throughout the U S government and with private industry and our allies Government partners include the Federal Bureau of Investigation Department of Justice National Cyber Investigative Joint Task Force and Department of Homeland Security U S Computer Emergency Readiness Team Industry partners include the Defense Industrial Base a group of selected cleared defense contractors 86-36 W 66-36 DOCID 4292212 HaitiUHF I' 'araulgr r urina- Nut Frame311' rn' 1137 JJl-v cb 4 751 if I -- taunti- Magi-rt I - I a SeenDefendi Joint Communications Security COMSEC Monitoring Activity JCMA Support to U S Forces Conducting Operations in Harm s Way JCMA ajoint-service Joint Sta -sponsored activity Information I Assurance Directorate is composed ofa Headquarters Operations Center located at Headquarters and six Regional COMSEC Monitoring Centers located throughout the world The Challenge Facing the Nation deersa al knowledge of military operations could put missions and lives at risk For this reason US government entities request that CMA monitor their unclassi ed communications to identify information that adversaries could exploit CMA also provides advice to mitigate risks Results of COMSEC monitoring assist in force protection and also provide indications of what an adversary could learn about US Operations JCMA is currently providing operational force protection supportl How SA Contributes JCMA hm currently monitors the unclassi ed 86-36 communications sent via the following methods l International The Nation s Strategr seas Who Information Assurance Directorate s core mission is to improve the security of critical operations and information by providing know-how and technology to its customers when they need it customers are helping to keep our nation safe by having their security posture evaluated and taking decisive action when they receive results As each command addresses vulnerabilities in their COMSEC it makes the enemy s job that much harder and helps make the country more secure Mantime Satellite cel ular telephone and radio frequency Collected communications are routed across the CMA enterprise to at Regional COMSEC Monitoring Centers at CMA Headquarters Menwith Hill Static Stuttgart Gennanyl Jc3mp Smith m and Fort Gor on GA Upon receipt communications are analyzed to determine if critical information has been disclosed or if other vulnerabilities exist - Critical information disclosures are reported to Operational Security points of contact at the a ro 'ate commandl Derived From -52 Dated 20070108 Declassify 0n 20320108 DOCID 4292212 In- hm L 86-36 DOCID 4292212 I - a H- 1 3 - hr 1 2 5 'sfl-i'lfi-a I usage -- an this J Defending Vital Networks Discovering Vulnerabilities in Information - Systems Information Technology Components echnology turnover has forced the globalization of information technology ID systems and has expanded the use of Commercial 01 the Shelf COT S products across the and the U S government This has greatly increased the challenge ofdiscovering and mitigating vulnerabilities within U S IT systems strives to take a global approach to mitigating vulnerabilities by encouraging the IT industry to reduce vulnerabilities by working with policymakers to improve policies and by analyzing networks for'vulnerabilities The Challenge aging the Nation conduct activities such as Communications m - Security Monitoring COMSEC and Red U apld advancement Md Teaming to nd vulnerabilities in the turnover in IT systems and products have caused consumers including the U S government and the to turn to COTS products to enable communications storage and use of data As the demand for these goods has increased the IT market has looked to a global model to support its products 'om design to production to follow-on support This globalization of IT goods and services has injected many foreign-made and -supported goods into the U S infrastructure As the market for and supply of these COTS products has become so expansive U S systems have grown in size and complexity with an in nite number of con gurations products and security procedures The challenge for the Nation is to determine how to nd and mitigate vulnerabilities on multiple levels across these disparate systems How Contributes UHF-GHQ Our Vulnerability Analysis and Operations Group discovers and analyzes vulnerabilities in emerging technologies as well as the core concepts underpinning these technologies We also operational environment We translate vulnerability knowledge into summaries trends and root causes We lead the community in improving security practices and we provide guidance training L 86-36 education and standards development DOCID 4292212 86-36 1 4 It also seeks out vulnerability nding partners om across the government private sector and the international community to share information and in uence security practices guidance training and standards development An example ofthisw-n community leadership is the Cyber Defense Exercise which helps train the Service academies West Point Naval Academy Coast Guard Academy and Air Force Academy The Red Computer Network Attack and Blue Computer Network Defense Teams lead the community by developing standards and certifying all Service Red and Blue Teams Additionally leads the Red Blue REBL symposium which gathers all Red and Blue Teams from across the US government and the also lead the Technical Security Countermeasures T SCM community which searches for physical was vulnerabilities in information systems and we administer most US government TSCM technical projects Lastly works withl DOCID 4292212 - ssa - - - efenilmg Unr I I I 33 atrium can The l' iti'ltt'it - I Si Industrial Partnerships - Mitigating Vulnerabilities in U S Information Systems U1913669 Keeping pace with the rapidly changing and globalized nature of Technology IT systems requires the U S government to use a wide variety of Commercial O the-Shel COTS products Use of COTS products is necessary and bene cial but it also comes with inherent risks One way in which mitigates these risks is to partner with a select group of cleared defense contractors through a program called the Defense Industrial Base DIB The Challenge Facing the Nation Wme U S Government is very dependent on its complex dynamic and interconnected IT infrastructure to process store and share vital information of all kinds Because the federal government s systems are necessarily connected to the world s communications infrastructure they are vulnerable to exploitation Although greater security surrounds classi ed networks they too must be constantly guarded and upgraded against increasingly sephistica'ted threats Vital information and systems are at risk of theft tampering alteration and damage or destruction 86-36 The Nation s Strategy Nation s strategy for addressing these risks has multiple parts covering different sectors of government-run systems andnetworks and uses a variety of approaches One essential element of this strategy is to ensure that Commercial Off- the-Shelf COTS products are designed and built to be as secure as possible This can only be achieved through close cooperation between government and private industry plays a key role in this cooperative effort How Contributes It is essential to the security of government information that the information products and services supplied to be as secure as possible The Defense Industrial Base DIB program brings together a group of defense Entragtors to suppog this objective i -P L 86-31 WWorking with the DIB shares threat Indications and Warning information at the unclassi ed and SECRET classi cation levels When they get information regarding potential tlueats members are able to block and recover from intrusions x Derived From 1-52 Dated 20070108 Declassify On 20320108 DOCID 4292212 existing products and ensure the design of nite products are less vulnerable to these threats and intrusions When we share threat information we hope to motivate DIB members to increase the security of their products prior to their implementation within networks has partnered with the DB with a goal of fostering more secure communication and information processing technologies We have contributed in a number of areas I Standards We contribute to the creation and maintenance of standards managed under the auspices of numerous private- sector standard-setting bodies We also provide input to the National Institute of Standards and Technology NIST and the Defense Information Systems Agency DISA in the deveIOpment of some of their standards and guidance documents WW 86-36 DOCID 42 92212 ADVANCING U S GOALS 8 ALLIANCES The U S and our allies and partners face serious national security challenges These challenges enter a wide range that includes threats posed in power d traditional and ascendant states proliferation of ueapons of mass destruction the actions of extremists and unpredictable natural disasters Working in concert with a multitude of glohal partners enables the U S Comment to meet these challenges Threats to our- NatiOn -- The U S faces serious challenges from abroad on many fronts Leadership in responding to these challenges is tlne responsibility of a wide range of customers including Cabinet-level departnnents such as Defense State Energy and Treasury as well as law enforcement agencies supports these customers and many more providing essential foreign intelligence that helps them carry out their missions Support to Negotiations and Con ict Resolution In international relations - whether hammering out the language of resolutions in international bodies negotiating bilateral or multilateral agreements ranging from trade to diplomatic or resolving difficult or dangerous situations the better our representatives understand the relevant facts the better they can advance U S goals and interests provides invaluable information supporting decision-makers and negotiators Our customers at many levels report NSAICSS-provided intelligence makes a decisive difference in their ability to negotiate effectively Countering Foreign Intelligence Threats posed by hostile foreign intelligence elements have long been a concern and this continues to the present day helps the Nation address these threats by penetrating the communications of adversary intelligence services This support enables our customers to disrupt espionage and intelligence operations aimed at the U S and its allies Compliance Monitoring provides intelligence critical to monitoring compliance with international agreements Signals Intelligence can provide the rst indication of a country s intent to breach an agreement providing decision-makers waming that an area merits attention Nuclear compliance information provided to national-level political customers ranging from the White House to technical experts enables them to monitor this tlnreat and other nations adherence to international agreements provides actionable intelligence to military customers which assists in the interdiction of suspect shipments that violate UN - imposed sanctions We also work with other intelligence Community members to monitor time-sensitive technical data that can support or refute compliance on a range of national internals Countering Crime and Narcotics Our Nation is engaged in ongoing elforts to combat international criminal activity This includes narcotics tra iclting alien smuggling piracy weapons proliferation and money laundering The requirements of law enforcement customers have expanded and broadened as DOCID 4292212 terrorists use the drug trade to nance their operations and traditional criminal elements branch into activities with national security implications We support U S and international law enforcement in identifying tracking and neutralizing these rogue elements abroad Strengthening U S Ties Abroad has established foreign partnerships to advance its Signals Intelligence and Information Assurance missions Increasingly we work not only with traditional allies but with new partners to exchange vital information that can secure our Nation Information Assurance partnerships began principally as support to NATO allies and military operations and continue today albeit with an expanded cadre of partners Signals intelligence partnerships allow us to extend our reach to provide critical terrorist threat information to our military forces embassies and interests abroad and the Department of Homeland Security These alliances show America in its best light using its technical advantage to improve collective security worldwide in advancing our conunon interests Promoting U S Economic Interests The Departments of State Commerce Treasury and Energy drive policies to support U S economic interests These departments rely on the foreign I Defending Our Nation intelligence information provides Foreign economic energy and trade issues all have signi cant implications for the U S economy provides key information to U S policymakers and negotiators on the plans and intentions of foreign actors We monitor countries that are securing or monopolizing energy in a tight market offer insight into global positions for key trade negotiations or summits and provide reactions to U S economic policies and actions to policymakers Supporting Military Operations As a component of the Defense Departinent provides time-sensitive intelligence support to military operations This support is provided from our sites around the world and by personnel integrated into forward deployed forces tailors its support to each military command and has the ability to change direction as crises evolve Tracking Global Environmental and Health Threats America's security interests are affected by pandemic outbreaks environmental catastrOphes and unforeseen natural disasters responds to a variety of customers with different products and services to support U S eft'orts to address these issues I par - I Jury DOCID 4292212 - l ni'hecuns L trig trig in l attiresis-w SIGINT Contributions to Countering Crime Narcotics rehab um Advancing U S Goals 82 Alliances haunt it In today '3 world the crime narcotics terrorism nexus is of growing importance to U S national security because of the obvious dangers it presents to U S and Coalition interests as well as implications for the Global War on Terrorism produces vital intelligence on link between criminal activity and terrorism giving decision-makers and law enforcement the crucial insight they need to deal with the problem efectively The Challenge Facing the Nation The U S Government is faced with the great challenge of identifying and disrupting the convergence of terrorism with criminal forces Disparate bits of information collected or owned by one agency or another often times is not very use ll when standing on its own In order to be effective the Intelligence Community has recognized we must merge all of the intelligence produced throughout the community on a given issue Long-standing barriers related to information sharing and ownership'must be overcome in order to be successful The Nation s Strategy strides have been made in policy and practice to improve information sharing with law enforcement and other intelligence agencies working to expose and disrupt the growing criminal terrorism nexus Successful prosecution of these targets requires strategic analysis that tracks the increasing danger 'om the nexus while highlighting areas of vulnerability ultimate goals are to Ihe Intelligence Community must continue to work together to seamlessly share information at the lowest possible classi cation to ensure maximum utility for law enforcement How NSAJCSS Contributes partners with a variety of customers including policy- makers at the White House the Department of Homeland Security State Department and the Department of Justice Law Derived From 1-52 Dated 20070108 Declassify On 20320108 - am If II aa-aa FL g DOCID 4292212 Enforcement and Intelligence Community Success Stories i hm - USC 30240 WW-LBW $383322 DOCID 4292212 WW - I urn beam 3 I wing Advancing U S Goals Alliances Expanding Broadening Signals Intelligence '2 Foreign Partnerships Our partners include Second Parties Australia CanadENe w Zealand and the rater with The Challenge Facing the Nation It takes years to deve10p build and maintain the trust needed for a rst-class partnership between nations Such partnerships represent prudent investments now that will yield bene ts in the xture Ongoing information exchanges How Contributes and technology sharing with foreign SIGINT partners enables to The a on s Strategy 3g 50 use 3024 i Derived From 1-52 mm use 793 Dated 20070103 86-35 Declassify On 20320108 DOCID 4292212 I - W continues to strengthen partnerships by providing formal and informal analytic training aime at imnrovinlz the WW I - Ia in provides SIGINT Liaison Of cers SLOs or in-country representatives who are vital to the success of foreign affairs mgraml Wm addition to bilateral partnerships continues to support a limited number of multilateral relationships such as SIGINT Seniors Europe SSEUR and SIGINT Seniors Paci c SSPAC use 30240 mm-13 use 798 49mm 86-35 DOCID 4292212 PROTECTING PRIVACY RIGHTS A complete understanding of mass includes not only bore the Agency belps defend the Nation but bow it protects privacy rights as an integral part of its day-to-dqy work ora the commitment of its people through the procedures laws and rules that govern its operations missions are conducted within a iegol amework that protects privacy rights This is cteariy de ned communicated to the workforce and reinforced by extension internal and extemai oversight processes As it provides and protects vital information r the Nation Mitt 6'83 scrupulousb' obsenes the privacy rights guaranteed by our Constitution and laws Signals Intelligence NSA conducts the Signals Intelligence mission within a framework of laws rules and procedures that are consistent with and expand upon the US Constitution's Fourth Amendment requirement for the protection of individuals' privacy rights Our personnel are trained rigorously to ensure that all these requirements and restrictions are observed Whenever there is any indication or allegation of wrongdoing in this critical area it is investigated reported and acted upon and thoroughly Our compliance processes are part of a broader oversight structure in which all three branches of the Government play key roles - Executive Branch A broad range of Executive Branch entities provides oversight of the conduct of the Signals Intelligence mission These include the President s Intelligence Oversight Board the Department of Defense the Office of the Director of National Intelligence and the Department of Justice Internally applies rigorous training compllance oversight and auditing - to include active participation by its O ce of are Val DOCID 4292212 General Counsel and Of ce of Inspector General persons is protected The FISA Amendments to its Signals Intelligence activities Act of 2008 modernized the FISA to embrace 21st century technologies and further protect - Legislative Branch In Congress the House and individuals privacy rights Senate intelligence and mod services committees authorize the funding of activities and Information Assurance provide congressional oversight of the Agency's conducts its Information Assurance mission work as well as of the broader Intelligence under a strict legal and regulatory framowork Where Community The House and Senate appropriations U S person information may be involved procedures committees appropriate funds and also provide approved by the Attorney General are scrupulously oversight of cials regularly appear before followed In order to protect civil liberties and these committees and work with their staffs to information privacy A good example is the monitoring answer questions and provide insights into all of of cial US Government telecommunications for aspects of our operations communications security purposes which is a service we provide to military commanders and others The Attorney - Judicial Branch Where required by law General-approved procedures and Federal law permit work is subject to review and approval monitoring with consent and ensures that by the federal courts The Foreign Intelligence personnel are noti ed of the possibility of monitoring Surveillance Act PISA of 1978 created a special and that all required consents have been obtained before court to help ensure that foreign intelligence such monitoring can begin in this way respects collection within the us is restricted to foreign the civil liberties and privacy of us persons and fully intelligence targets and that the privacy of US complies with the lawNATIONAL f Secumrv Defending Our Nation Securing The Future Doers 4292212 UNCLASSIFIED Er i 3 in Dar 31 s Protecting Privacy Rights Signals Intelligence Mission and am vet-r muse- 1 Protection bf P bacy Rights U In accordance with Executive Order 12333 is authorized to collect process analyze produce and disseminate Signals Intelligence SIGINI for foreign intelligence purposes to support national and departmental purposes Because of its potential intrusiveness and the implications for the privacy of U S persons such surveillance is subject to strict regulation by statute and Executive Order The applicable legal standards for the collection retention or dissemination concerning U S persons reflect a careful balancing between the needs of the government for such intelligence and the protection of the rights of U S persons consistent with the reasonableness standard of the Fourth Amendment U In the Foreign Intelligence Surveillance Act and Executive Order 510 12333 Congress and the Executive have codi ed that balancing Both re ect deference to U S persons rights by closely regulating the conduct of electronic surveillance collection activities that either target a U S person or may result in the acquisition of information to from or about U S persons In order to target a U S person FISA requires a court order 'om the Foreign Intelligence Surveillance Court FISC urthennore even if a U S person is not the target s SIGINT collection activities must be conducted in a manner that minimizes the acquisition retention and dissemination of information about unconsenting U S persons FISA Statutory Requirements U FISA is the statutory regime governing electronic surveillance for foreign intelligence purposes within the United States and targeting U S persons regardless of location The Act mandates the ling of an application approved by the Attorney General setting forth probable cause to believe that the target of foreign intelligence collection is either a foreign power an agent of a foreign power or with respect to U S persons overseas - an of cer or employee of a foreign power The purpose of the surveillance must be to gather foreign intelligence information and a certi cation to that effect by a senior executive branch of cial must accompany every application U In addition FISA requires the government to minimize the amount of information acquired or retained and prohibits with limited exception the dissemination of nonpublic information about non-consenting U S persons consistent with the government's foreign intelligence needs Further Speci c procedures designed to effectuate the statutory minimization procedures must be adopted U PISA was recently amended to provide for the targeting of persons reasonany believed to be located outside the United States to acquire foreign intelligence information Under the Act as an alternative to obtaining an individualized court order the Attorney General and the Director of National Intelligence may submit a certi cation to the FISC authorizing subject to the approval of the FISC targeting of non U S persons who are reasonably believed to be outside the United States Minimization procedures subject to the approval of the FISC must also be adopted UNCLASSIFIED DOCID 4292212 UNCLASSIFIED Executive Order 12333 U While FISA provides the statutory basis for conducting electronic surveillance for foreign intelligence purposes within the United States and targeting U S persons regardless of location E O 12333 establishes the overall framework for the conduct of intelligence activities by U S intelligence agencies 13 0 12333 prphibit c lgction retention or dissemination of information concerning U S persons except pursuant to procedures established by the head of the agency and approved by the Attorney General Each of the intelligence agencies has promulgated such procedures is governed by Department of Defense Directive 5240 1-R Activities that May Affect U S Persons including a classi ed appendix particularized fer NSAJCS S The procedures are irther enunciated within NSAJCSS through an internal directive U S Signals Intelligence Directive SPOOIS The procedures are designed to ensure that collection is conducted in a reasonable manner such that a minimum amount of information about U S persons who are not authorized targets will be acquired and that no information concerning U S persons will be disseminated in the absence of an af rmative decision that such information is foreign intelligence information eris -- - necessary to understand foreign intelligence or to assess its signi cance U Any changes to the procedures implemented pursuant to the Executive Order require Attomey General approval and such changes are also brought to the attention of the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence as well as the Intelligence Oversight Board of the President's Intelligence Advisory Board UNCLASSIFIED DOCID 4292212 testifies Unr- Oversight of 7U conducts its Signals Intelligence SIGIND and Information Assurance missions within a framework of laws rules and procedures that are consistent with and expand upon the U S Constitution '5 fourth amendment requirements for the protection of individuals privacy rights This legal -amework assigns roles to all three branches of the U S Government to accomplish both external and internal oversight of activities External Oversight Judicial Branch portion of work requires the approval of the Federal courts Speci cally the Foreign Intelligence Surveillance Act F ISA of 1978 created a Special court to regulate most foreign intelligence collection conducted within the - United States and imposed on such collection requirements designed to protect the privacy of U S persons The FISA Amendments Act of 2008 modernized the FISA to embrace 21 century technologies and required some collection formerly done under authorization from the Attorney General to be authorized by the FISC The Court also reviews new collection certi cations authorized by the FISA Amendments Act and approved by the Attorney General and Director of National Intelligence DNI For some sensitive counterterrorism targets the Foreign Intelligence Surveillance Court FISC requires periodic reports regarding compliance with the applicable minimization procedures Legislative Branch Congress the House and Senate intelligence committees authorize the funding of intelligence activities and provide congressional oversight of the Agency' 3 intelligence work as well as that of the broader Intelligence Community of cials regularly appear before these committees and work with their staffs to answer questions and provide insights into all aspects of operations In addition the FISA Ammdments Act of 2008 requires that a retrospective review of the President s Terrorist Surveillance Program be conducted by_ the Inspectors General of agencies involved work on that review along with that of other agencies must be submitted to the House and Senate Judiciary Committees as well as the intelligence committees Finally the House and Senate armed services committees have additional oversight and funding responsibilities with respect to Information Assurance activities Executive Branch U IFQUQ-Multiple Executive Branch entities provide oversight of These include the President s Intelligence Oversight Board the Department of Defense Of ce of InSpector General and Assistant to the Secretary of Defense for Intelligence Oversight the Of ce of the Director of National Intelligence ODNI Of ce of Inspector General and Civil Liberties Protection Of cer and the Department of Justice For example under the FISA Amendments Act of 2008 the ODNI and Department of Justice conduct periodic DOCID 4292212 oversight of intelligence collection done under joint certi cations of the DN1 and Attorney General Internal oversight In General - O ce 9f Inspector gmergl Ed Qf ce Internally has rigorous oversight of its SIGINT and'lnfonnation Assurance activities conducted by the Of ces of Inspector General 016 and General Counsel OGC and for SIGINT the SIGINT Directorate s Of ce of Oversight and Compliance Together these of ces conduct oversight to prevent and detect violations of authorities and report on questionable activities to external oversight bodies speci cally to the President's Intelligence Oversight Board and the Assistant to the Secretary of Defense for Intelligence Oversight In addition OGC provides legal advice guidance and assistance to all elements on compliance with authorities and restrictions The 016 conducts a variety of reviews audits and investigations to promote economy effectiveness ef ciency and accountability within the Agency ensure compliance with laws and regulations and assist in detecting and preventing fraud waste and mismanagement in programs and operations I NSAJC Managers of components maintain training programs and compliance mechanisms to implement effective internal control to achieve missions and goals and provide accountability for operations The SIGINT Misslon The nation's mission must be conducted in a way that properly balances the Government s II II requirement for critical foreign intelligence against its requirement to' protect the privacy of U S persons has a longstanding record of strong oversight to ensure that collection processing retention and dissemination activities remain compliant with the laws and regulations that govern SIGINT activities Wm To ensure this proper balance is maintained has implemented a rigorous system of internal oversight procedures to ensure compliance with the laws executive orders regulations and policies that mandate how must conduct SIGINT activities These procedures cover all phases of SIGINT production 'om initial collection of information through the retention and dissemination of the resulting intercept oversight activities consist of ve key activities I Establishment of rules The authority and rules that govern each SIGINT activity are established before the activity begins These include the core executive orders laws regulations directives and policies that apply to all NSAJCSS SIGINT activities The core rules include Executive Order 12333 FISA Regulation Policy 1-23 and United States Signals Intelligence Directive U SSID SPOOI 8 an the rules All individuals involved in SIGINT activities including those who conduct manage or oversee them are required to know the rules that govern those activities Policy 1-23 requires all SIGINT personnel to read the core SIGINT documents every year and newly assigned personnel must read them within 30 days of assignment Individuals who work directly with SIGINT data and those involved in activities under special legal authorities such as FISA and FAA also must take advanced training on the DOCID 4292212 restrictions and data handling requirements associated with those authorities This training which must be repeated on a predetermined basis includes instruction by legal and oversight personnel associated authorities related readings and a competency test that an individual must pass before the individual is permitted to participate in the activity U Wompliance measures NSAICSS implements a combination of technical physical and managerial measures to ensure that activities remain compliant with the rules that govern those activities Technological measures make it dif cult for non- compliant activities to occur Examples of levels of review prior to implementation of collection and mandatory review of audits to verify compliance Ill 1 999 Incident reporting All con rmed or su5pected incidents of non- compliance with the laws directives or policies that govern SIGINT activities are thoroughly investigated and documented with internal overseers including the Of ce of Oversight and Compliance in the Signals Intelligence Directorate the OIG and the OGC personnel are trained and directed to report potential incidents to these overseers immediately upon recognition in order to seek advice on and subsequently carry out the necessary corrective actions to remedy the problematic situation In addition to the initial incident report SIGINT elements submit a quarterly summary of all incidents that occurred during the quarter along with in-depth descriptions of the causes for the incident its impacts and the resolution This quarterly report also includes for tracking purposes details on U FFGUGWanagerial controls consist of policies and procedures that are put in place to irther limit the chances of non- compliant activities Examples include identi cation of responsible Intelligence Oversight Of cers to monitor compliance at each location where SIG INT activity takes place the requirement for multiple 35-36 Information 'om these reports is included in reports that OGC and OIG submit to external overseers such as the Assistant to the Secretary of Defense for Intelligence Oversight Wommitment to remedy non- compliant situations ensures that the causes and impacts of individual non-compliant situations are resolved and takes steps to identify and resolve systemic problems that may have been the underlying causes By focusing on these causes can prevent recurrence of incidents in the iture Underlying causes can be addressed in many ways ranging 'om enhanced training and DOCID 4292212 process improvements through technical xes in collection and database Culture of Compliance successful compliance with the laws and regulations that govern its SIGINT activities is a direct result of its recognition of the importance and continued development of compliance as an integral part of the conduct of SIGINT activitiEs know the rules i that govern their activities know how to conduct the activity in a manner and know that each and every one of them is responsible for the compliance of the group This environment is self-reinforcing advocated and maintained by both managers and individuals and results from ongoing systems training and guidance on proper conduct of SIGINT activities and SIGINT data handling procedures ongoing enforcement of solid oversight practices and managerial demonstration and positive reinforcement of compliant behaviors It also results nal a lack of tolerance for compliance lapses through implementation of active measures to remedy compliance problems thorough documentation of procedures and practices and establishment and maintenance of a workforce that is stable enough to ensure that new personnel bene t from the positive practices of the experienced DOCID 4292212 SA A UNIQUE NATIONAL ASSET Ibo contribution makes to our national security and protecting vital infonnatton is made possible by a large and complex enterprise It brings togetber a diverse skilled and dedicated wot-Marco and leading-edge tecbnology Operating rm sites in tbe and abroad the men and women collaborate and sbare lufbnnatlon in a netzvorlz of partnerships across tbe 1 5 Intelligence Comanlgr tbe broader federal govemmeat its counterparts in allied nations and tbe private sector The Workforce employs more than 50 000 people worldwide roughly hall of them civilian and the others active-duty military If the were considered a corporation in terms of dollars spent oor space occupied and personnel employed it would rank in the top 10 percent of the Fortune 500 companies sifts through mountains of data to locate the vital information that can identify threats shorten wars save lives and prevent con lms This is made possible by remarkable people with remarkable skills Our workforce represents a unique combination of specialties that includes intelligence engineers physicists mathematicians language computer scientists and researchers We recruit and hire exceptional individuals with a wide range of backgrounds and areas of expertise We then develop and mentor them in the highly specialized skills necessary to meet the critical challenges of the mission Leveraging Technology Expanding global networks increasing volumes of data and rapidly changing technologies are challenges we face daily in nding solutions we frequently create new technology is a leader in the Intelligence Community in the number of patents awarded for new innovative technological advances Our innovative workforce has played a major role in creating new technologies in many elds such as supercomputers and biometrics The application of these cutting-edge technologies facilitates our ability to meet national intelligence priorities _ll 3 ll DOCID 4292212 Our use of exclusive technology has extended reach and global presence to levels unimaginable in the past Today our workforce is able to share information instantly with colleagues around the world fostering collaboration These colleagues include personnel at other sites as wall as our partners Partnerships and Alliances Collaboration with others is a hallmark of mission accomplishment We share information with other Intelligence Community agencies to get results that no single agency could achieve alone Sharing intelligence we have collected with trained across the community affords them the first- hand opportunity to find data they need to support their operational planning and execution in real-time This collaboration for the good of the Nation goes further however provides technical and I I i - - NATIONAL Secunrrv AGENCY I czar - Defending Our Nation intelligence support to law enforcement and we cooperate across international lines to protect networks and share intelligence that help keep the United States and its allies safe We also maintain robust and productive relationships with industry and academia accessing expertise and technology that can prove invaluable in accomplishing our mission Worldwide Footprint With headquarters at Fort Meade Maryland our largest presence is in the Washington area Driven by continuity of operations concerns has chosen to place portions of its operations in other stateside locations based on proximity to key customers access to power necessary for operating the high-technology mission and other reasons In addition operates collection locations data centers and mission activities worldwide CENTRAL Secunrrv Seance Securing The Future DOCID 4292212 31his i he Workforce wines rem Nearly 3 7 000 people make up the nsi Csis wohlg orce 'with a i NSA - A Unique National Asset WW retirnl I civilian military ratio of 52% to 48% We recruit a diverse set of exceptional individuals from across our Nation Working at locations across the country and the globe they represent a truly unique combination oftalent including intelligence language mathematicians engineers physicists computer scientists researchers and a host of supporting specialists The Challenge Facing the Nation events of September 11 2001 brought to the forefront many new challenges to the security of our Nation new technologies new languages new global hot-spots Our response to these and other events in the Global War on Terrorism requires highly skilled dedicated people to collect information detect and analyze threats and provide the intelligence to keep our peOple and our in nstructure safe Our Strategy has aligned with the Of ce of the Director of National Intelligence ODNI to emphasize diversity as a strategic mission imperative Central to our strategy is ensuring that a focus on diversity is an integral part of all workforce planning activities and other Human Capital initiatives the commitrnent of our Senior Leaders we have set our direction and will engage in continuous review of our progress on key performance measures such as increased diversity representation in core mission areas higher pay grades and assignments to senior positions We will lrther establish as a model employer for persons with disabilities by broadening our strategies to secure much needed talent through increased recruitment efforts and more creative enabling workspace solutions Education Level Bachelor's Degree or higher 68 8% Doctorate Professional or Post- Doctorate Degrees 3 9% W After September 11 2001 aggressively implemented a workforce strategy to strengthen transformation Congress has increased our authorized strength both NSA civilian and Service military civilian by 3 9% to our current authorization of 36 371 18 849 NSA civilian and 17 522 Service military civilian Our strategy has not focused on growth for growth s sake but on a measured effort to increase our capabilities Who we are Women 40 7% Minorities I 7 7% Persons with disabilities U mOn the NSA civilian side of the house we signi cantly increased our Derived From 1-52 Dated 20070108 Declassify 011 20320108 DOCID 4292212 Wea population of language and intelligence computer scientists engineers and mathematicians In addition we have worked to staff all of our major organizations at or close to their authorized strength levels while trying to maintain balance between mission enabler and staff mctions Where we work at Fort Meade proper Wrer CONUS D thejbur Centers OCONUS locations the service military civilian side we have been no less aggressive in addressing workforce and staf ng issues We work closely with the services to notify them of our expected military manpower needs and allow them to program recruiting accessions training and assignment actions appropriately Further we are actively working with the services on their respective human capital strategies Where the services are de- emphasizing certain skills sets such as IT systems administration and logistics we are developing strategies to transition the tasks to other portions of the overall workforce civilian and contractors at the same time we seek to complement and capitalize on the skills that the services are emphasizing such as tactical level analysis Where Agency civilians are in their careers Average age of civilian worlg brce 43 6 years Average length of service 16 3 years Hired since 1 200 35 4 Eligible to retire I 0 9% LE ll-ll I Workforce Preparation and Development W669 ensures the technical health of the workforce both military and civilian by aligning them with one of twenty-three Skill Communities that represent occupational groups with similar knowledge skills and abilities The Skill Communities provide broad-based mentoring and career guidance through learning and development roadrnaps They also partner with our Associate Directorate for Education and Training to guide training and development opportunities that prepare our people to meet the challenges of current and iture mission requirements 1 if 0 Technical and collection skill communities Analytic skiil communities Organizational leadership 8 management Acquisition business management Security Enabling activities support services iegal education and training logistics facilities human resources etc 86-36 DOCID3 53 5m lm an at an nibomuhin Isatlitjg Hm i'mm'o - -- fa w Pir -- r' -- mum - tnUnique National Asset T3 0 Transformation Strategic Plan for Technology vision of Transformation 3 07310 is tci distribute our processing capabilities throughout the global enterprise and to uni our missions o achieve these cats we are creatin a coo erative and concerted real-time eaploit attack-defend capability connects mission partners warp-L 55'3 clients sensors systems and information on a global scale through a robust secure and distributed network The Challenge Facing the Nation WUS citizens use the Internet to conduct e- commerce transactions access public services socialize and learn This same cyberSpace is also the combat Space for our adversaries providing anonymity to our targets Over 100 countries are known or suspected of conducting or developing Computer Network Exploitation CNE capabilitiesl WSW Here at home our Technology Directorate is designing and implementing an operational mission environment focused on enhancing mission performance and reducing information technology costs We address these challenges on many fronts we capitalize on existing capabilities modernize the information technology and mission in 'astrucmre and integrate the exploit- attack-defend mission areas To meet the challenges and manage the complexities of today s environment we must be able to operate on the cyber playing eld and get ahead of our targets capabilities How NSAJCSS Contributes Cooperation with other government agencies and foreigg partners is a key element of our su'ategyl use 3024a mm-13 use 793 L 86-38 Derived From 1-52 Dated 20070108 Dcelassify 0n 20320108 DOCID 42 92 212 Tm Fe USC 30240 mm-18 use 798 86-36 DOCID 4292212 - - ht I Ih rFregal Ilts ill-Scum ' fj lluiifUnique National Asset National Security Operations Center NSOC 35 33 Overview in 1972 in the wake of the shootdown of an American reconnaissance aircra over the Sea of Japan NSOC as the Mission Management Center provides total situational awareness of the end-to-end enterprise national security information needs and unfolding world events in order to optimize the worldwide system Agility and adaptability are keys to NSOC s success Over the past two years NSOC has been focused on taking a much more proactive approach to anticipating world events and customer requirements while acting to ensure the enterprise-wide is positioned to proactively reSpond Some examples include executive protection expeditionary and personnel recovery Executive Protection WThe National Security Operations Center N SOC Executive Protection EP Staff is the Intelligence Community s focal point for Expeditionary Support Wme b 1 - bggagm use 3024 Denved From 1-52 use we Dated 20070108 L- 5'35 Declassify On 20320103 WW oocro 42 9221_2 a WW Examples Stories Personnel Recovery WMen a U S or allied citizen is stranded in hostile territory we initiate a Personnel Recovery PR effort bringing together military civil and diplomatic resources to bear to retum these isolated persons IP to friendly control Inter-agency of cials and military commanders have a range of tools and authorities at their disposal to help them develop counter-measures to the hostage taking threat when the worst happens they have access to the vital resources re uired to achieve a success il resolution supports PR across the full spectrum of its de nition in mm-P L 66-36 mm mm USC 3024 i USC 798 66-36 DOCID 4292212 o-g-wit - I latit- inn- real-F - - just atrulsbecun f3 1 14 pl - Hr trifling Hm rumpAri 7' - 1 Jag I NSA - A Unique-National Asset I - - The Platform Our adversaries Operations using complex newer-Iced systems that span the globe I As telecom nebvorks become more integrated and complexI the US SIGINI 'svstem must respond accordingly The Network of Networks Wme world communicates via an increasingly dense set of telecommunications networks supporting an expanding set of i communication methods What was once a relatively simple network of telephone and i radio communications has developed into a robust set of meshed networks 5 simultaneously mixing different media and supporting ubiquitous mobility The computer and the telephone have merged into a single communication device providing the user with direct access to global commerce and large information repositories supported by the Internet as i well as the ability to co unicate with anyone around the world i Denved From 1-52 DH 1 Dated 20070108 3 -so use 3024 ibiiaids use 793 I Declassify 0n 20320108 36-35 DOCID 42 92212 MU use 30240 use 793 86-36 DOCID 4292212 n-c 0rni Semn' Huh- - - I 013mg Hm' 3 er m f rumUnique National Asset J- Derived From 1 52 1 8850 U50 3024 _D_ated 20070108 mm-10 use 790 Declas51fy On 20320108 35-35 9 DOCID 4292212 use 30240 I 1 meme use 793 warm 86-36 DOCID 42 92212 Mn I litii hl Securty i - I 1- The future A 411- 22 a I I Egg-gtfaruo' a I j a - Jinnah rm- u A Unique National Asset Engineering the Future The Research Directorate UMFQUG S'cienti c advances and research breakthroughs have a signi cant impact on our missions Through its Research Directorate leads and manages a research and technology development program to build new capabilities that keep pace with targets and technology We provide technology solutions that are responsive to mission needs for Infomation Assurance Signals Intelligence and other intelligence requirements The Challenge Facing the Nation changes have remade our world from the advent of the personal computer in the 19805 right through to today s reliance on cellular and satellite services Fibers are connecting everything from neighbors to nations Computers are in everything from credit cards to car radios On one hand all this makes the reach and promise of greater than ever 0n the other hand it can be very hard to nd the most signi cant pieces of information due to a blazineg fast astonishingly big and inexpressibly complex set of data U The Nation is faced with a breadth and explosion of new technologies that makes it dif cult to ensure that the products we use are safe from exploitation The Nation must continue to research develop and deploy new technologies to keep pace with our adversaries How Contributes WE-999 Our customers depend on timely intelligence that gives them the competitive edge To meet customer needs we must continue to transform both rapidly and broadly enough to keep pace with the constantly changing target and technology environments The NSA Research Directorate plays a key role in this transformation maintaining close working relationships with mission customers to understand mission needs and provide solutions to current and long-term Signal Intelligence SIGINT Information Assurance IA Network Warfare NW and Intelligence Community customer needs Research Directorate maintains an in-house research capability that truly understands the unique customer requirements of our mission areas and allows us to react quickly to satisfy urgent mission needs For example we are the largest employer of mathematicians in the country and are recognized as a center of mathematical excellence We conduct research to develop solutions that are not available from any other source commercial or government To ensure that our program is responsive to the highest priority mission needs and avoid duplication with the commercial and academic sector the Research Directorate has robust outreach efforts to national laboratories industry academic institutions and other government research organizations within the Derived From 1-52 Dated 20070108 Declassify On 20320108 DOCID 4292212 Department of Defense and the Intelligence Community IC Employees within the NSA Research Directorate serve on national and international standards committees conduct technical exchanges with industry and host or participate in technical conferences symposia across the globe Front Entrance of Laboratory of Physical Science Building W e Research Directorate follows a long- standing tradition in beginning with its roots in code making and code- breaking we gain advantage by doing the apparently impossible By taking advantage of the digital revolution we have made great strides in meeting the daunting daily challenges but there is much more to do To keep pace with our targets and their technology must W- Since 2003 the NSA Research Program has been structured around four important mission thrusts which drive our advanced research efforts Owning the Net This denotes our goal to dominate the global computing and communications network Research will develop tools and techniques to access at will any networked device for offensive or defensive purposes Coping with Information Overload We must tum the massive amount of information on the global network into a strategic asset rather than an obstacle Under this thrust Research will develop capabilities to present the most valuable information organized to make sense to so that they can perform their tasks in a more ef cient and effective manner Ubiquitous Secure Collaboration The focus here is to provide the techniques and technology to allow diverse users within the government and with our industrial and international partners - to work collaboratively and securely across multiple domains and different environments Penetrate Hard Targets Penetrating hard targets provides the technological solutions to enable new access collection and exploitation methodologies against the nation s toughest intelligence targets The Research Directorate provides foundational and advanced mathematics that contribute innovative solutions to all of the above mission thrusts USC 30240 L 56-36 DOCID 4292212 mama-W I hm usc 30240 use 798 86-36 DOCID 4292212 usc 30240 use 793 bx3 -P L 86-36 -onit - m scann- I riff Um' Mama Snoring The Future - - - - I If394'I'h I NSA - A Unique National Asset U S Nuclear Command and Control N02 WSW-L- 5536 Support W0 The Director ofthe National Security Agency provides products and NC2 use control code materials I In addition provides nuclear weapon use control systems security design guidance and erpertisel The Challenge Facing the Nation cannot be used intentionally or accidentally without Presidential authorization In i 9 5 nuclear addition produces all materials the threat of terrorists obtaining or attempting to obtain nuclear weapons increases the security of our nuclear weapons remains as critical as during the Cold War The nation relies on the Departrnent of Energy s National Nuclear Security Administration NNSA and the Department of Defense to ensure that nuclear weapons remain secure and can be used only when authorized by the President I The Nation s Strategy President holds authority over cur nuclear stockpile The policy of the United States is to achieve a credible deterrent consistent with our current and iture security requirements and those used to authorize Presidential release of these weapons to meet the national strategy evaluates in conjunction with the military departments and the NNSA the communications security for U S nuclear weapon use control systems including the and of om- auiesgd The NNSA and DOD have positive control aspects of the weapon plans and procedures in place to meet this SYSte'ns' direction How Contributes provides all materials to ensure that nuclear weapons are secure in their day-to-day environments and 'National Security Presidential Directive 28 28 United States Nuclear Weapons Command and Control Safety and Security issued June 2003 DOCID 42 92212 86-36 $0113 - 242 92212 - l I - '5 - 4292212 Strategic Plan June 2006 Our Vision Global Dominance through National Network Advantage We will 0 Dominate global will maintain its sustained competitive advantage in both technol-ogy and intellectual talent to make and break codes and to tackle the Nation s most difficult lnfonnatlon challenges We will deliver and maintain a national network advantage over all who would do harm to America or her allies 0 Secure national secuer systems Our national security systems will be secure regardless of where they are physically located 0 Connect people sensors systems and information on a global scale All appropriate sensors mission partners and clients will be connected through a robust secure distributed network Emphasis will be on speed automation granularity transparency and optimization adding value and pushing knowledge to the edge of the entire enterprise - Leverage our unique with government Industry academia and forelgn partners Our partnerships will enable our strategic advantage Innovation from industry and from within at the speed of technology will fuel our success We will acquire what is available build what Isn't and rapidly decommisslon capabilities that are no longer operationally relevant Our Mission leads the community in delivering responsive reliable effective and expert Signals Intelligence and Information Assurance products and services and enables Network Warfare operations to gain a decisive Information advantage for the Nation and our allies under all circumstances DOC ID 4292212 - rare Goal 1 Mission Deliver responsive reliable effective and expert Signals Intelligence and Information Assurance and enable Network Warfare operations for National Security under all circumstances - Effectively apply Signals Intelligence and lnfon'nation Assurance and enable Network Warfare operations to defeat terrorists and their organizations at home and abroad consistent with US laws and the protection of privacy and civil liberties - Provide services that enable partners to prevent and counter the spread of weapons of mass destruction - Avoid strategic surprise by achieving and maintaining capability and continuity against difficult targets - Protect national security systems against adversary exploitation and cyber attack 3 Support the global mission and strengthen Joint and combined military network attack_operations through the provision of required intelligence and technical expertise Goal 2 Transformation Achieve global network dominance through the development and deployment of a new generation of globally distributed active and passive capabilities - - Deliver maintain and operate network-enabled tools to strengthen analytic expertise methods and practices tap expertise wherever it resides and explore alternative analytic views 0 Develop an integrated interoperable distributed architecture to optimize the next generation of systems and unify exploit defend and attack capabilities onxthe common underlying Infrastructure - Devel0p and depiby a secure robust information technology infrastructure to enable distributed sharing and combined Operations - Exploit path-breaking scientific and research advances that will enable us to maintain and extend intelligence advantages against emerging threats DOCID 4292212 Goal 3 PeOple Enhance an expert workforce to meet global challenges - Attract and leverage an expert and diverse workforce of mathematicians computer i scientists engineers signals intelligence language and staff to support the mlssion - Educate train and develop our workforce to sustain and strengthen our critlcal - Institute clear uniform physical and personnel security practices and pollcies that allow us to work together protect our nation's secrets and enable aggressive activities - Recapitalize physical infrastructure to promote a modern world class work envlronment that safeguards the health safety and quality of life of our employees Goal 4 Business Practices Create and integrate effective and efficient business management practices within the enterprise and with stakeholders - Integrate budget and performance management to align investment decisions with corporate and national goals - Devel0p responsive corporate business processes rapidly allocate and realign investments and programs in an Integrated way - Strengthen foreign intelligence and enhance domestic with government industry and academia to help us meet global challenges DOCID 4292212 4 0 Core Values We will protect national security interests by adhering to the highest standards of behavior u a - Lawfulness We will adhere to the spirit and the letter of the Constitution arid the laws and regulations of the United States - Honesty We will be truthful with each other and honor the public's need for openness balanced against national security interests - Integrity We will behave honorably and apply good judgment in all our efforts so as to avoid even the appearance of Im propriety - Fairness We will ensure equal opportunity and falmess in Agency policies programs and practices - Accountability We will be accountable for our actions and take responsibility for our decisions practicing wise stewardship of public resources and placing prudent judgment over expedlency - Loyalty We will be loyal to the Nation the mission and each other weighing Ideas solely on the merits and ensuring that decisions enjoy vigorous debate while being made followed by unified implementation - Collaboration We will cooperate with others in a respectful and Open-minded manner to our mutual success 0 Innovation We will seek new ways to accomplish our mission planning for the future based on what we've learned from the past and thinking ahead to the best of our to avoid unintended consequences - Learning We will acquire and transfer knowledge provide the resources and training necessary for our people to remain at the forefront of technology and Individually pursue continuous leamlng DOCID 4292212 T3 0 Overview This Brief is classi ed 4W lion 3 0 Overview DOCID 4292212- 45W J WCLASSIFIW T3 0 Tenninolog - How T10 is describedjs dependent upon one s perspective I we are doing - We are doing it Outcome we are pursuing we are accomplishing it the audience is we are speaking to '5 Juana- u i Externally there has been considerable as to what constitutes T3 0 In part this confusion is the result pf the fact that how T3 0 is described is dependent upon one s perspective What 86-36 Why Outcome desired How And just as important the intended audience we are speaking to technical pro gammatic budgetary all want different aspects covered An example of this con Jsion is apparent just by looking at and re uest The T3 0 Master Plan conveys a consistent framework from which all of the above discussions What Why Outcome How can be derived and communicated in a consistent fashion WW DOCID 4292212 I However the bottom line is pretty clear T3 0 is focused on the inte tion and automation I 'th dEanuc dEtense across a networlq - The intention is to create cooperative interoperable real-time I Exploitation Defense and attack-enabling capabilities 203 86-36 uf ciently explaining The What for any effort usually rgguirgs a discussion of what some would consider to be technical iarggn what is required what is being developed what will be delivered Is an ability to ensure the nation that the networks on which both we and our adversaries operate will serve our needs in our best interest not the interest of the adversary mm L 35-35 - Things like -In effect guarantying our national authorities the vital high round of the 21st century 86-36 DOCID 4292212 - I r DOCID 4292212 The most compelling rationale for advocating any new initiative is conveying the bene ts that will be delivered - but that is only part of the stogg 66-36 The other part are the drivers which themselves are compelling us to transform the Volume Velocity Variety of emerging network traf c bene ts are often the most visible and most compelling when discussed in the technical realm Are all compelling rationales that can be appreciated and understood even by an external audience that is not technically pro cient DOCID 4292212 mm L 36-38 - T3 0 is a comprehensive constellation of NSA mission and support activities that together will establish a collaborative real-time system of 'people processes and technologies for achieving 0f WW5 Required for Success global dominance - r51 mamm- DOCID 4292212 T3 0 The How 13 0 is comprised of 3 major modernization initiatives Mission Modernization - Modernization - Improvements in Power Space Cooling lnformation Technology Modernization efforts Workforce Modernization - Human Capital Strategy - Workforce Strategy 3 0 L- 55-36 From an external perspective The How is the meat of the story It is this aspect of T3 0 that generates the most Questions from our external audience - and it is this area of discussion that according to our external overseers - we fail articulate a clear con istent sto as to what constitutes T3 0 They continually ask us Concepts such as - How are we assuring suf cient scal discipline - Ensuring time constgined delivery of - Effective Suitable capabilities linked to national corporate strategy -as demonstrated by suf cient measures of performance The remainder of this brie ng - and indeed the majority of the T3 0 Master Plan - is focused on this very subject DOCIDmy T3 0 The ConstructMission Inn-at Infrastructure Mus-r Workforce ll I 58-36 UNCLASSIFIEW T10 is an initiative that allows for the integration of various Exploit Defend and enable Attack capabilities across the U08 DOCID 4292212 T3 0 Components I - 3 Fundamental Capabilities x 1 86-36 World Class Skills 10 Fundamental Components 5X1 Common IT in nstructme Consistent with the recently matured Cascading 3 0 brie ng series located on the Directorate Services Communications web site The T30 Mastg Plan three fundamental capabili eg mat mt he realized by the T3 Q initiative and -World Class Skills It conveys that these capabilities are dependent upon 10 fundamental Components many of these you may be familiar with Common IT DOCID 4292212 M13510n Modemlzanon Consmtelm T31 Roadmap TM IWWMH Mission Infrastructure Workforce L 88-36 rras l ruuln More Mum or 3mm WW 10 th drum ran-Mr an d h wr mde Mission Modernization involves The key components of the Mission Modernization initiative include hm 66-36 10 DOCID 4292212 '40- Infrastructure Modernization FIT Master Plan Faculties Strategic Pl T10 W'lm I Mission Mum-Id 5 Infrastructure Workforce Praia-l Aul ly Ir 5min 11 r'u' min-Mm Mutant I am at tit-turn ukumt rl 't whiter -Power Space Cooling is one part of a broader NSA effort to address de ciencies in NSA's mission and support infrastructure - As conveyed by the Management Roadmap and the Facilities Strategic Plan -The other part is Information Technology Modernization - As conveyed by the IT Services Initiatives Roadmap and the Enterprise IT Master Plan BIT mm 86-36 11 DOCID 4292212 r 86-35 Workforce Modernization liiuman Capital Strata Workforce Strategy 3 0% 35 T31 i l' I Arm-l Mission Infrastructure Liam Plus - Frill-In I ltd nut-hr or Stu-Her r I 11 MW li'It-Ill'l m rHu-n aim In Hiwr a drer din a minim As NSA transforms changes in the way we Operate collaborate and meet emerging mission requirements demand that we better understand the in uence of transformation on the total workforce The key components of Workforce modernization include oHuman Capital Strategy HCS - A blueprint for creating a skilled workforce that meets the Agency s goals objectives as it aligps people leadership and performance with the mission -Workforce Strategy 3 0 Describes the ltnre mission essential skill sets the NSA workforce must ll in terms of eight broad areas or Key Transformation 3 0 Workforce Imperatives -These strategies are now in the process of being made actionable by the Human Capital Implementation Plan HCIP recently drafted DOCID 4292212 - mg Deliverables Capabilities and Resources Required nu - -- Major deliverable min a and the associated time phased resources required to attain - those capabilities are in the-13 0 Master Plan hum-Pl 83-36 - discussions of T10 capabilities are presented the requirents documents plans and strategies referenced and integrated within the T10 Master Plan I EI'I Master Plan Facilities Strategic Plan Human Capital Implementation Plan 13 Both 0m and ODNI requested to see Major delivmbles capabilities and the associated time phased resouiges mg to attain those capabilities are summarized in the Master Plan -IT and summarized and derived from their stand alone plans 'Workforce consistent with the emerging HCIP - Currently locks resource allocation The T3 0 Master Plan ngtes that detailed discussions of T3 0 capabilities are prgented within in the various reguirements documents plans and strategies referenced by and intemted within me Ma_sjer PIQ 13 DOCID 4292212 Implementation Strategy Development and Integration m I Management Process Integrates and DOD I guidance Into our vision strategies and Implementation plans 86-36 0 External Guidance I Strategic Plan 86-36 In building the FY92 Prom The Strategic Management Process integatg QDNI and gpidance into our vision strategies and implementation plans This guidance in uenced our decisions across the enterprise t_o mitigate mat and emerg'ng political and technological threats The planning proglgamming and integ'gap'on pf initiatives presented in the FY09-13 progr spanned several months -External Guidance Strategic Plan 14 DOCID 4292212 Measures of Success Strategic Tactical Programmatic u The PIan conveys t approach by which mg will roll-up numerous measures to support meaningful and decisions at the corporate level mm - Strategic Performance management of the 13 0 Initiative is focused on the 10 fundamental components of the T3 0 Initiative - Tactical goals measures are focused on - Mission Mod Initiatives In 'asnucture Mod Initiatives - Workforce Mod Initiatives - Programmatic goals measures which support the modernization initiatives are identi ed and retained at the PPAS element level The T3 0 Plan conveys the approach by which SS rolls-up numerous measures to support meaningful discussion and decisions at the corporate level - as it executes oversight of the larger combined effort of delivering the intent of the T3 0 vision Strategic Performance management of the T3 0 Initiative is focused on the 10 tndamental components of the T3 0 Initiative Tactical goals measures are focused on Mission Mod Initiatives Infrastructure Mod Initiatives Mod Initiatives Programmatic goals measures which support the modernization initiatives are identi ed and retained at the PPAS element level DOCID 4292212 - unis- 1 - Transformation 3 0 emphasizes the integration Iinto every facet of NSA operations - Signi cant bene ts arise from integrating and exchanging information man-long the UCS exploitation defense an ar attac systems - The emerging challenges of the information age demand we Continue transfonnation of our mission capabilities in the very process of acquisition and elding - Build adequate capacity to absorb and support those transformational capabilities and bill L 86-36 Employ a workforce that leads the pack in the information age mae '5 In a prommatic sense T3 0 can be characterized as the convergence of three major foundational initiatives to modernize and dramatically improve capabilities across the enterprise -These initiatives are focused in mission infrastructure and workforce -All structured and managed to provide a seamless integration of -Operating integrating mission capabilities brovides tremendous advantages but 16 DOCID 4292212 WW Comprehensive National Cybersecurity Initiative Frequently Asked Questions 1 What is the Cyber Initiative SW The term Cyber Initiative is shorthand for the Comprehensive National Cybersecurity Initiative CNCI an initiative described in a Presidential Directive aimed at increasing our Nation s security in cyberspace and particularly providing substantially improved security for our federal networks and information systems The initiative developed by a cross-governmental group of more than 22 Federal departments and agencies provides an enduring and comprehensive national approach to cyber security in which NSA plays a key role 2 What is the problem that resulted in the creation of the U1715039 The us information in astructure - including telecommunications and computer networks and systems and the data that reside on them - is critical to virtually every aSpect of modern life Unfortunately the interconnection of telecommunications and information networks that underlies our way of life creates vulnerabilities that hostile actors are exploiting every day Systems that once operated only in isolation new function as part of global information networks while consumers continually demand more capabilities in fewer smaller and more portable devices At the same time much of the design manufacture and service of information technology has moved overseas As government private sector and personal activities continue to move to networked operations as our digital systems add ever more capabilities and as wireless systems become even more ubiquitous our vulnerabilities will only continue to grow UHF-BUG While the United States has not been physically attacked on our homeland since 9 1 1 US Government information systems face virtually constant intrusion attempts Our information infrastructure - including the Internet telecommunications networks computer systems and embedded processors and controllers in critical industries increasingly is being targeted for exploitation disruption and destruction by a growing array of state and non-state adversaries 3 How does the CNCI address this threat Wne CNCI addresses this threat through an interagency effort to develop and implement 12 interdependent initiatives see Figure 1 and seven enabling strategic activities see Figure 2 The initiatives will close identi ed cybersecurity gaps Strategic enablers are critical to providing the foundational capabilities to support these initiatives The Director of National Intelligence DNI has the responsibility of ensuring that Departments and agencies implement these initiatives and enablers as planned Derived From 1-52 Dated 20070108 Declassify 0n 20320108 DOCID 4292212 I 12 lnterdependent Cybeisectirity Initiatives f j lngaad Deploypagu PlumeDeployme Ac vaSmm 12 319-3 51 417-11se't ifora m gi Cri cal 1mm rs_nIl In I r_ r 45 1 153 0 22' DavelopMulli-Prmgad gr De ne IaFedaml t ack'rgm 3 HolalorExmm if V35- 3 53 Cybersacuntyitto - or' Ju l 95 1 33291% EvaFigure I The 12 Int rdependent Cybersecurity Initiatives U DOCID 4292212 U Feliel-The 7 lnterdependent Strategic Enablers The Cdmp henslve Natlonal Cybersecurity Inltlative Includes seven priority areas for Investment that are essential to enable the activities to defend u s networks 3'53351 1 t femwag 35$531 - New aunt1 31 3 I i II F-iitk if tfg ' - 13 cage 31MaggyEgg-hit 31m The comprehensive Natlonal Cybersecurlty ls pulling together a lull spectrumylew from acrossall the U56 mission areas to Include law enforcement intelligence military diplomatic and homeland security mm Figure 2 The 7 Interdependent Strategic Enablers U a- DOCID 4292212 WW has multiple deliverables associated with the CNCI 0f the 12 initiatives and seven enablers pictured above NSA participationl W607 CI Initiative 3 Deploy Intrusion Prevention System Active Sensors II stems Enter rise U2943090 CI Initiative 8 Expand Cyber Education already partners extensively with the Services to ensure the workforce has the skills to meet current and lture CNO challenges I MU DOCID 42 92212 mum-P L56 WU usc 30240 86-36 86-36 rml mbler E I hm usc 30240 35-35 DOCID 4292212 WEnabler F 35-36 4 Are all the initiatives enablers equally important I E3850 use 3024 blial-PJ 86-36 5 What role did play in helping formulate the Wme was developed over many months at the direction of the President in a process led by the Director of National Intelligence and overseen by his Homeland and National Security Advisors Important contributions were made by 22 Intelligence Agencies in what has become the largt cross-government effort in recent history 6 How will the missions or work of change under the During the development of the CNCI it became clear to all participants that the system forms much of the technical foundation of an effective strategy to secure cyberspace All of our responsibilities under the are within our existing authorities and missions SIGINT Information Assurance enabling network warfare under IFCC-NW and providing technical assistance to other federal agencies The vast majority of our work und CN I I doing under our Transformation 3 0 bllil 3 -50 USC 3024 TOP i ll I 86-36 DOCID 4292212 momma our existing authorities as part of and the Intelligence Community east Will make contributions to the Nation's cybersecunty in ways that no one else can 0 Information Assurance - We know the vulnerabiliti and will accelerate and expand our efforts to secure National Security Systems and will continue to make our expertise available to other agencies in the federal government as appropriate I Technical Assistance and Support - Each day we provide technical assistance and support to other federal agencies and this initiative will be no different We'll 7 Will we get additional funding or personnel under the WW Yes if Congress approves the President's budget NSA will receive additional mding and personnel to execute our roles in this initiative While this speci c information cannot be posted on the website you can obtain these details as appropriate through your organization's leadership 8 Is what we ve heard about the Cyber Initiative in the press accurate DOCID 4292212 MW 9 What is the way ahead for NSA in the hm 86-38 nit 4292212 DOCI-D 4292212 33 HR State of the Workforce October 2008 Doom 4292212 Civilian Workforce Strategy in Context All Program Clvman Strength moon 13000 10000 - wsa cucn 2 OV'erall Authorized vs Maigribd FYM-FYDQ i i -migned L L-Mhorlzed 3 20000 mmo - lliil I ll' ll l l l I Fm as - Fm lelnl Pin-Inns marlin-nun r1 DOCID 4292212 F000 6000 5000 i000 3000 2000 1000 Education Levels Start FY02 Start FY09 1-4 HS Gad-at Inn --542anuonqp Echelon 6915 trauma-u 5 18 21 mum I 330 4444 muM-m- __2591 1k - 530 737 FY02 FY03 FY04 FY05 FY06 FY07 FY03 FY09 Start FY02 Population 16124 - Hire Types Analytic and Technical Security Acq a Business and Support All Other bi-Ill lial-P 86-36 Start FY09 Population 18569 - Hire Types Analytic and Technical Security Acq Business and Support All Other 5 DOCID 3293212 0 National Security Agency Central Security Service 6 Civilian Employment Plan FY 2008 19 October 2007 Derived From 1-52 Dated 20070108 Declassify 0n 20320108 DOCID 4292212 - Table of Contents This Table of Contents is Unclassi ed 1 Introduction Mission and Vision Organization Overview Historical Perspectives The Planning Environment IT Linkage Facilities as a Key Enabler Transformation 3 0 FY 2009-FY 2013 Program Build assess 2 What It All Means I A Focus Areas l The Nation Expects a High Level of Competence 2 Collaboration Produces the Best Results 3 Agile and Responsive to Dynamic Needs B Identifying Requisite Competencies C Implementation Workforce Development Staf ng Succession Planning Retention and Attrition Management Workforce Performance Management Recruiting and Hiring Occupational Health Environment and Safety 3 Civilian Workforce Pro les DOCID 4292212 1 U Introduction - Civilian Employment Plan for the National Security Agency U This Civilian Employment Plan CEP provides an overview of the dynamics and imperatives shaping and driving the NSA workforce It explains who we are and what we do describes changes in staffing levels and skills mix in response to changes in agency and national intelligence missions and provides plans for hiring develoPment and retention to accommodate changes in mission duties and jobs ll vacancies and replace losses In synergistic harmony with our Workforce Strategy 3 0 Building the Future Workforce our Human CapitaLImplementation Plan our Facilities Strategic Plan and our Enterprise Information Technology Master Plan it rounds out a full suite of deliberate planning and the concomitant documentation designed to assist the Agency in optimizing and leveraging its uniquely talented workforce to meet mission ends A U Mission and Vision U mission is to deliver responsive reliable effective and expert Signals Intelligence SIGINT and Information Assurance IA products and services and enable Network Warfare operations to gain a decisive information advantage for the Nation and our allies under all circumstances Our Vision is Global Dominance through National Network Advantage To achieve this Vision will Dominate global Secure national security systems Connect people sensors systems and information on a global scale And leverage our unique relationships with government industry academia and foreign partners U The National Security Agency exists to provide our nation the information superiority it requires U Intelligence and information systems security have always complemented each other Intelligence gives us an information advantage over our adversaries and competitors and information systems security prevents others from gaining a comparable advantage over us In today's environment the two functions serve as the offensive and defensive squads of a team dedicated to a single goal - information superiority for America and its Allies WW 3 Doors 42 92212 L 66-36 U In order to fulfill multiple roles across the globe NSA relies heavily on the five uniformed services for support These Service Elements SCEs make up what is known as the Central Security Service CSS with DIRNSA as its chief U 5656 - The National Security Agency Central Security Service conducts the two core missions of the United States System USCS SIGINT and IA NSA eXploits the signals of foreign targets around the globe for the purposes of providing foreign intelligence and counterintelligence information as well a su milit erations The tolo 'c effort comes full circle as I to help secure classi ed national security and sensitive US government information systems U Today we operate within a complex information technology IT environment characterized by expanding global networks increasing volumes of data and rapidly changing technologies placing greater challenges and demands on our SIGINT and IA missions Moreover the Internet and e-commerce arenas are facilitating the use of conunercial off the-shelf COTS appliCations and increasing the need for both 1T expertise and systems security U All of the people and the resources of the National Security Agency are focused on providing Information Superiority for our nation and its allies Information superiority assures that the United States will be able to store process and disseminate an Lminterrupted flow of information while denying an adversary the ability to do the same B U Organization U Understanding organization is key to understanding the approach we are taking to our workforce strategy NSA is organized around ve line directorates which include Signals Intelligence Information Assurance Technology Research and Foreign Affairs Additionally NSA has two major mission areas that are aligned under the DIRNSA the Central Security Service and Joint Functional Component Command Network Warfare These line organizations are supported by staff offices and enabler organizations as shown in Chart 1 Additionally the DIRNSA wears three hats on a daily basis first he is the Director of NSA a Combat Support Agency under the Department of Defense second he is the Commander Central Security Service Joint Functional Component Command Network Warfare as a component commander under United States Strategic Command and third he is the Director United States Security Service as the federal government s executive agent for information assurance DIRNSA fulfills all these duties simultaneously while also serving as one of the senior members of the United States Intelligence Community 4 DOCID 4292212 - I Naii ingl- Sho rify AIQ rhdy_ a Mllde L l lL DIHNSA '1 CEPUTY cs Cr-m CU-UML Lcunsu '3 3 LTG Kellh Me lander USA EEO Deputy Director Mr Jul-11 mm mlr ir Stu-me Mum 'nmrq Ilmvm DIRECTOR JICC NW II I R'urnm DEM Jr Lu Una-nun Saw P r1amlu DIRECTOR FOREIGN AH Amt 6th hranln UMECHJH rm Ont-rations Cantu - Fl 5 El rr-111 CH1 Ionm Strum-Ir 0 5 Taan L'Snr g - 1 on-Iy Amen-an U also has a worldwide mission with over 86-36 DOCID 4292212 0- C U Overview In the performance of its multiple missions over the years we have excelled for many reasons not the least of which has been a continuing corrunilment to acquiring and building a workforce of tremendous skill and dedication As the Information Age continues to unfold however we find it increasingly unmanageable to keep up with the volume velocity and variety of information handled by modern communications systems WU 3 -P L 86-36 Cyberspace has emerged as a malor theater of con ict -I 86-36 U Data and functions that are critical to the nation's security are increasingly consigned to systems that are too complex and uid for all vulnerabilities to be found much less eliminated Commercial technologies often built by unvetted sources to uncertain national security standards play a growing role in these systems They reside across networks our Nation and our military depend upon expanding the number of points where a breach can occur and the number of points that a breach can compromise U This fusion of commonality dependence and technological advance presents difficult and unprecedented challenges We must keep pace with dynamic changes in global telecommunications while simultaneously defeating daily attacks launched on a global scale though the uncontrolled media of global networks We must also do this while conducting high tempo Operations which surged after 9 11 and show no signs of abating Our workforce faces an immense challenge to master the enabling technologies of the Information Age while operating within an environment of intense and constant change Our answer Transformation 3 0 to this complex and dif cult situation involves our transforming establishing a collaborative real-time system of people processes and technologies to achieve vision of global dominance U Moore s Law continues to hold with processors doubling in speed every 12-24 months as they have since 1965 Nanotech manufacturing techniques are the latest 6 DOCID 4292212 surge in the global semiconductor industry driving annual revenues towards a quarter of a trillion dollars The Internet is also surging Users have tripled in the past seven years 1 1 billion accounts now send almost 100 billion emails a day These users are evolving the Internet into a grid with practically all transmissions using some part' a 01 its infrastructure A greater percentage of these transmissions are mobile involving wireless nodes and the two billion and climbing cellular phones in use Over all global networks now carry petabytes 1015 of information every day - data equivalent to the total printed output of humankind since the birth of history Despite occasional financial shocks these technologies continue to advance at remarkable speeds In fact their pace of change may be accelerating as they feed upon each other to drive even shorter development cycles 36 36 DOCID 4292212 - Threat Enwronment Rapidly expanding national security and global information systems Virtually every form of human communication ls now accomplished across a use 3024 5 continuously flourishing global network L 86-36 a Understandably these unique dynamic and rapidly evolving conditions place unprecedented and unmatched demands on our workforce The deliberate and dedicated workforce strategies that NSA has developed pursue long-term and comprehensive solutions to complex challenges through develoPment nurturing and sustainrnent of a world-class employee base Further our strategies recognize that the traditional one-dimensional workforce of the past is now gone Our talented workforce of the future will be more diverse more exible more uid and will be a mix of the three components civilian military and contractor harmonized to optimize the distinct attributes of all employees D U Historical Perspectives UHFG-Hea-These serious threats and the ever increasing pace of technological change present Lmique challenges to our current leadership but one fact remains certain - our people are our greatest asset for meeting these challenges For years our strategic planning documents have been filled with recognition of that fact From the 1993 Workforce in Transition Task Force Report prepared in the midst of a decade of downsizing that stated must change the management of its most critical the work to the post-9 11 Work Force Strategy formed at the beginning of the Agency's latest growth cycle which recognized that People and the knowledge they possess are the heart of the Agency leaders have asserted that it is the highly-skilled dedicated men and women of our workforce who ensure our success More than a decade ago NSA recognized the need to develop far-sighted and comprehensive management of its workforce in light of what was then termed challenges which are without precedent As a result Agency leadership developed 3 DOCID 4292212 1- MU 36-36 and endorsed a series of future-focused work force plans that guided downsizing through the 1990's and governed growth starting in FY2003 These efforts bore significant bene ts to the national intelligence community over the past fteen years as they resulted in the identification of the critical skills needed for current and future success In addition they helped the Agency shape programs to protect the key areas that provided a platform to build on after the 9 11 attacks As a result we have been able to provide support across many fronts push more Expeditionary to the front lines of the war on terror and have a direct hand in some E U The Planning Environment 86-36 U To assure our work force planning efforts are not conducted in a vacuum NSA has intentionally and deliberately included workforce strategy and issues as key components of the overall agency and program strategy To that end we built and are constantly re ning a Human Capital HC management system structure that is designed to attract retain develoP enable and deploy a mission-ready global workforce inspired and guided by leaders at all levels to deliver extraordinary results strongly believes that HC initiatives can and do play a key role in transfong organizational ethos and can have a dramatic positive effect on the Agency s ability to achieve its critical national security mission goals and objectives The Agency's Human Capital Strategy is aligned with overarching strategic planning initiatives of the Department of Defense DOD and the Of ce of the Director of National Intelligence ODNI is in consonance with the other strategic initiatives underway in the Agency and provides our blueprint for ensuring the diverse highly skilled workforce needed to accomplish the Agency's mission It outlines a comprehensive approach for achieving proper skills aligrunent developing employee competencies to optimize their ability to contribute to the mission honing leadership skills and instilling implementing a performance-based culture The HC Strategy supports all four of the Strategic Plan goals Mission Transformation People and Business Practices DOCID 4292212 Tnoutwaumaymm will - hummus-Wm - I h Hoar-mm mmummumnm mmnmuumm mm mammal-uranium Pm WWIED U Workforce Strategy 3 0 attempts to answer What skills will emphasize in our workforce recruiting retention and development programs This answer will guide our workforce planning decisions over the next three years FY08-10 It will take into account our constantly changing operating environment and the resulting imperative for a responsive collaborative and highly competent workforce In building the future workforce we speci cally focus on improving our capabilities to forecast and assess staf ng skill and competency needs attract hire reward develop and deploy our employees to ensure the agility and readiness the mission demands and design and institutionalize Human Capital programs that facilitate enhance teaming and collaboration as well as sharing across the Intelligence Community IC U The Human Capital Implementation Plan is based on both the Human Capital Strategy and Workforce Strategy 3 0 It provides specific Agency-level guidance by Human Capital functional area Senior leadership will use this Implementation Plan to approve both the FY08 Hiring Plan and the FY08 Promotion Program Each designated Human Capital area lead will work with mission elements and Skill Community staffs to identify sub-activities and individual milestones develop schedules and performance measures and document and track progress DOCID wr 4292212 f Workforce Strategy 2003-201 1_ I I Worldom Strategy 1 0 Worldom Strategy 2 0 Workforce amt-9y 3 0 - 1101 Pros-m mW W-Wll Chi-1M In FYM-FYII W1 010 3 - - maniacer - Siam part a strategy was to allow for Increased manner at new employees In my ski areas to perform allitll mission and address demographic concerns - Changes in muss-on focus may mustan I maucuon In grown-I but kill and ammonium issues main U To further reinforce the critical nature of workforce plarming activities and to ensure they are coordinated and integrated with other Agency plans and processes the Senior Leadership Team SLT recently approved the stand up of the Workforce Planning Council War-krona 55' my 2mm - My 313 until cum Rum Amer-Honing Pu AEEIFIEE 4 9 3 I DOCID 4292212 TUP SEUHE WNW This body chaired by the Chief of Staff will work with the SLT the Senior Analysis and Integration Team SAIT Business Management Integration the Chief Technology Of cer and the Enterprise Architecture Council within an integrated management framework to apportion balance and align resources to maximum effect Within this deliberate planning context we are pleased to offer that this Civilian Employment Plan effort is a continuation of on-going workforce strategic pla'rming efforts and we are also pleased to be able to tanginy contribute to an overall effort on behalf of the entire Intelligence Community F U IT Linkage SHSB-Understandably in a globally engaged cutting edge activity like we have to leverage and optimize technology at every opportunity - both-to our advantage and to disadvantage those who would do our nation harm In two venues in corporate IT and in the platforms and facilities in which our workforce operates clearly recognizes that these become the very tools of the trade for our uniquely talented workforce As a result in regards to the rst venue we seek to leverage technology especially the IT Spectrum as the Agency's Strategic Mission Advantage We expect that modernizing Enterprise Information Technology EIT has a ripple effect that coupled with the success of Transformation 3 0 Workforce Strategy 3 0 and other mission applications will ultimately lead to the United States' US information dominance Through the modernization of our EIT we will supply our mission elements and equip our people with the speed agility interoperability convergence reliability and availability they need to be successful A modernized IT Infrastructure ITI enables 86-36 - H DOCID 4292212 -J Strategic Mission Advantage W1 86-36 C U Facilities as a Key Enabler as being done in the IT arena to better enhance Agency capabilities and enable the workforce has taken a similar deliberate approach to its facilities as key platforms for effective operations To this end complements its other deliberate planning documents with a Facilities Strategic Plan which represents the Agency's strategic vision goals and plans for its facilities infrastructure in support of mission and Information Technology IT systems This vision began with the construction of the Agency's Centers and is intended to outline the requirements and planning necessary to improve the existing infrastructure and provide for future mission and IT growth As stated in an October 2006 business case the phrase Power Space and Cooling is an overarching label for the basic ingredients needed to operate the IT and mission assets at the National Security Agency NSA including the ability to optimize a uniquely talented workforce with the best and latest tools Power Space and Cooling PSC supports mission modernization and IT Modernization at NSAW and across the extended enterprise by increasing both the power capacity and reliability while sustaining the existing infrastructure and reducing the backlog of maintenance and repair Again this plan is developed and implemented as a key part of an overall strategic resourcing approach to the Agency s challenges order to successfully deliver the PSC solution and to ensure that Transformation 3 0 is fully supported and realized recognizes it must have the ability to increase its workforce in key functions such as power engineers and project managers to help manage the PSC program To accomplish this personnel with 13 DOCID $232233 technical planning and integration skills will have to be acquired to complement the already knowledgeable workforce in the Installations and Logistics arena H U Transformation 3 0 U As discussion of warkforce issues in NBA could not take place without framing it in the context of our Agency wide Transformation initiative In developing this sweeping initiative theL Agency recognized that at key attribute must be a major rethinking about how we employ and leverage our infinitely talented and valuable workforce As Transformation has been approached in its progression within spans three discrete stages 0 U T1 0 - Modernization - Following the cold war T1 0 improved corporate business processes shaped the workforce modernized technology and updated operations - better positioning the Agency to grapple with varied threats and emerging technology 0 U T2 0 Collaboration - Following 9 11 2001 T2 0 began to move from a paradigm of need to know to need to share both within NSA and with our clients and partners T2 0 began to merge the Signals Intelligence and Information Assurance missions together as one providing on-site support and tailored services which enabled to fashion new relationships for the new world order redrawing distinctions between national and tactical producer and consumer collector and operator Today is focused on the The intention is to create cooperative interoperable real-time 811 1501 capabilities L 86-36 U has no CNA or network warfare mission that mission has been assigned to JFCC-NW However many of the capabilities NSA is developing to perform CNE can also be used to enable CNA For ease of reading this constellation of capabilities is therefore referred to as Exploitation Defense attack enabling or 2 U That degree of dominance of one force over another in the domain of CNO that permits the conduct of Operations by the former and its related comprehensive network capabilities at a given time and place without prohibitive interference by the opposing force 14 DOCID 4292212 'rr- bX1 86-36 U is a comprehensive constellation of NBA mission and support activities that will establish a collaborative real-time system of people processes and technologies for achieving vision of global dominance through development and delivery of a National Network Advantage I I DOCID 4292212 hm 66-36 is comprised of 3 major initiatives 1 Mission Modernization 2 Infrastructure Modernization comprising signi cant improvements in Power Space and Cooling P880 and Information Technology IT Modernization e orts both described earlier and 3 Workforce Modernization Wk ssion Modernization is one leg of a comprehensive three-legged strategy for pursuing Transformation 3 0 I U The T10 Roadmap the Services Initiatives Roadmap and the Power Space and Cooling Management Roadmap are 36 48 plotter printouts are updated quarterly and are best viewed at that size Mal-Pt 3636 WW I I I Doom 4292212 L 86-36 Infrastructure Modernization - Modernization of Power Space and Cooling 1 - is one part of a broader NSA effort to address de ciencies in mission and support infrastructure as conveyed by the Management Roadrnap the other part is Information Technology IT Modernization as conveyed by the IT services initiatives Roadmap _ Infrastructure Modernization is an intrinsic enabler to Mission and Workforce Modernization Therefore they must all be addressed in a collective and integrated fashion to effectively enable transformation to go forward U-H-FOUQ Work Force Modernization - As NSA transforms changes in the way we Operate collaborate and meet emerging mission requirements demand that we better understand the influence of transformation on the NSA workforce This is the central tenet of our Workforce 3 0 Strategy The revolution in telecommunications coupled with the changing threat environment necessitate a transformed workforce that is more mobile more highly educated more outward looking and more experienced Ultimately this could mean that workforce costs will increase commensurater with the expanded skills required to meet the threat is currently working to better understand what impact T3 0 will have on the pay account and overall workforce dynamics but early analysis points to the fact that the workforce being created and the collaborative behaviors we are trying to elicit will continue the upward pressure we have seen on pay and competition for the most higth talented people The graph below shows that the average hiring salary a key imperative if we're to sustain the workforce to meet emerging threats and challenges continues an inexorable rise 17 DOCID 'Gap Closing - Average Salary 0 Attrition VI Hires Non-Wage Permanent Employees 5100 000 - 1r Liaising 71 I - 1 rhl'rkdlifr' I -- Iii - I 390 000 - 50's 1 Hialh500 000 00% I i 570 000 4m ii 500 000 20% t 550 000 010 FY2001 FY2002 FY2000 FY2004 FY2005 FY2000 FY2007 A lla'l 51m _Avn lei Eda Hold Further besides the pay comparability issues we face in hiring we are also having to adjust our hiring pro les in terms of grades to assure we attract the best and brightest in this volatile mid-Atlantic market The graph below shows the gradual climb in hiring grades driving outyear adjustments in everything from training to pay considerations to career progression options an - atL t'n- i Labor Market DOCID 4292212 I U FY 2009-131' 2013 Program Build U 1-169th order to build on the successes that has demonstrated over the last several years ensure that continues to provide the actionable SIGINT needed to give warfighters and policy-makers a decisive advantage over our adversaries and facilitate Transformation 3 0 NSA deveIOped three integrated strategic themes td serve as the framework for the FY 2009 FY 2013 program The third theme speci cally vectoring in on the workforce complementing a like theme in T3 0 cites that NSA must maintain a world-class workforce and provide them with the tools to assess and defeat the and complex protocols employed by our adversaries This will require intensive efforts to compete for hire and retain top of the class individuals in mathematics computer science and related skills while also providing the specialized processing and computational power needed to address the most intractable challenges has worked to leverage its assets to fully support the National Intelligence Strategy since its release in October 2005 Further fully supports the DNI's efforts to realize these goals through the 100 and Plans and our program includes funding for a number of initiatives that closely align with the DNI's priorities We also worked to integrate performance management into our process as is documented in the performance measures and targets included in our budget submission to include the requisite human capital related measures As stated earlier has specifically identified human capital and workforce as focus areas in these program years U Mme workforce modernization focus in this year s'budget submission seeks to understand and accommodate the in uence that transformation will have on the workforce by adapting the current workforce to emerging missions and technologies through workforce development and succession planning by hiring in a targeted fashion to fill critical skill gaps and by building a workforce that is competent in the areas of expertise required to perform the missions is able to work collaboratively and is agile and able to re5pond quickly when new threats technologies and missions emerge 2 CU What It All Means A U Focus Areas U As we assess the present and project the future workforce many of our skill requirements will stay the same We still depend on world-class computer scientists mathematicians etc We still need excellent project managers contracting 19 DOCID 4292212 - a mai SE officers nancial professionals and security of cers along with skilled professionals in other support areas U Due to the dynamic nature of our ou' environment our workforce must often combine - NSA needs multiple skill sets The vast majority of the people who' workforce we recruit reward and retain will demonstrate diverse excellence beyond a single i specialty We need people who are competent in an area of expertise collection network warfare mathematics or contracting able to work collaboratively in multiple teams and highly responsive when new enemies technologies and missions emerge 1 U The Nation Expects a High-Level of Competence U There is no substitute for competence We maintain the required expertise across the breadth of our disciplines especially in advanced information technologies and ensure no diminution inour hard-earned reputation for technical excellence across-the board This imperative places a premium on mathematicians computer and information scientists especially those with a knowledge of global networks engineers physical scientists and who are language proficient and knowledgeable across a wide variety of world cultures U While deep competency in distinct elds of study interest is important so is multidisciplinary expertise Intelligence for example may be called upon to fuse target knowledge subject matter expertise familiarity with customers operational needs practices offensive defensive options systems engineering and the tradeoffs between security and operations This breadth of expertise often takes years to accumulate and will continue to recognize its extraordinary value through providing necessary developmental opportunities and through supportive Human Capital programs and initiatives U In addition to skills we need people with proven ability in key areas such as security acquisition training human resources resources management logistics information technology and other enterprise management skills Such professionals must be knowledgeable of current processes practices along with emerging trends within their respective career elds in order to keep pace with the changing needs of Agency leadership and employee customers and serve as value added enablers for the operations professionals U7411099 To help deal with emerging mission sets new threats and drivers and to support and facilitate the imperative of change outlined in Transformation 3 0 NSA W20 DOCID 4292212 1 nun _ -Iln developed a comprehensive suite of Focus Areas to help our workforce succeed and contribute in tangible ways 2 U Collaboration Produces the Best Results U We believe that empowered and enabled teams produce the most valuable products and services for our customers partners and stakeholders This teaming requires our professionals to maintain a range of collaborative skills - U The teams they lead or support may be diverse matrixed virtual multi- disciplinary multi-service civilian contractor We help our workforce acquire and develop these skills Our help includes developing leadership and managerial capacity invigorating managerial and leadership development providing professional career road maps building assessment tools for identifying and assessing the cognitive emotional and social readiness of individuals to take on leadership roles and expanding the use of 360 degree leadership assessments We also provide the latest tools to enhance collaboration and then position our pe0ple to exploit these tools and other collaborative technologies across the enterprise U The responsibility to share is also why we are placing more of our in customer and partner spaces even virtually Embracing the underlying theme to the Civilian Joint Duty program we understand physical proximity conveys the greatest feel by our into the enterprise's changing needs This emphasis on physical and virtual presence will facilitate the ow of to our customers and partners as-as DOCID 4292212 86-36 The integration has allowed collaboration leading to multiple analytic successes over the years It has also increased our internal diversity in knowledge experience expertise and perspective While there are many social justi cations for embracing a diverse workforce clearly has a strong mission imperative To accomplish our ever-changing mission our people must be able to inunediately recognize nuances and complexities across cultures ethnic groups and social strata By hiring pe0ple with diverse backgrounds experience education and ethnicity and ensuring that we develop and retain them we reduce the risk of group think and expand our ability to respond and innovate advancing our mission performance 86-36 U Within NSA we continue to promote To combat Increaslngiy complex threats to - our nation the 10 must employ deveIOp and i greater teamg' we our retaIn a dynamic agile workforce that 1 workforce to partner across our common re ects In its broadest context- network to recognize new threats devise glerl cg yhggingelgder' new solutions and exchange lessons learned workforce that looks like America and can Regular collaboration with co-workers other operate In aglobal threat environment We directorates partners and customers is a must be relentless In pursulng that goal Director McConnell reqmrement for today 5 NSA U NSA believes in preparing our workforce for success A host of enablers underpin both job assignments and operations First among these is a forward-looking human resources approach our workforce strategy mentioned earlier that obtains and sustains an able and motivated workforce with the right skills at the right geographical locations Properly sited provisioned and secured facilities are also indispensable as are enterprise IT infrastructure and services that are comparably modem to but segregated from less forgiving mission infrastructure and services Beyond these are other administrative and support specialties such as nance acquisition and security 3 U Agile and ReSponsive to Dynamic Needs U Today's national security environment is as diverse as global society The multiple threats and customers serviced by pose requirements that differ in scale scope and timeliness compared to those of the past that was originally formed to combat As a result we are realigning our workforce to cover a larger number and wider diversity of enemies threats be able to support a greater number of missions and meet increasing numbers of short-notice high-priority demands 22 DOCID 4292212 t We foster a Lean Six Sigma culture that independently proactively and centrally evaluates and improves our processes and activities in our areas of responsibility B U Identifying Requisite Competencies hm 86-36 U CSS acknowledges that the identification and careful management of key attributes needed for the future are vital to transformation in the Human Capital element To aid this effort has identi ed eight areas and their associated competencies that are described in detail in Workforce Strategy 3 0 Building the Future Workforce 23 DOCID 4292212 I-r-1 s It sew-n Areas Critical Future Workforce Competencies Protect Hamilton Assumes Collectlon Operalions Processing 3 Expioltatlon Analysis 3 Production Mission Management Enterprise IT Investment Enterprise Management Research le C U Implementation blm'P-L- 35-35 WWTO operationalize our strategy and support Transformation 3 0 we developed an implementation plan laying out discrete goals and objectives focusing on six human capital areas Further detail can be found in the Implementation Plan itself but an outline is provided below U is focusing our human capital programs on the following capabilities essential to transformation in order of priority Converged Networks - Computer Science Engineering and Mathematics GWOT Less Commonly Taught Languages Intelligence Analysis Acquisition and Business Management Leadership DOCID 4292212 - ll U To improve on these capabilities we are further focusing our resources and efforts in the following human capital areas Lead Lead Human Capltal Areas ems and MW mama Support 1 Workforce Mission Elements and Development ABET ADSLM Skill Communities 2 Staffing Succession 5 I I Mission Elements and Plantiing I rv- ADHR A Skill Communities 3 Retention and Attrition ADI-IR ADSLM ism Elem and Skill Communities Management 4 Workforce Performance ADHR ADSLM Miss Elemef is and Skill Communities Management Mission Elements and 5 Recruiting and Hiring ADSLM Skin Communities 6 Occupational Health Environment and CHESS Missmn Elements and Skill Communities Safety 1 U Workforce Development Workforce development is a key element to the 'productive capacity' of any enterprise invests heavily in the education training and professional development of our workforce The Agency's unique mission as America s premier Signals Intelligence 51 and Information Assurance IA Agency requires that our workforce stay at the leading edge of knowledge skills and abilities associated with these disciplines To meet this mission imperative we deve10p and deliver learning activities that tie directly to the desired outcomes of our mission We invest in on-the- job training educational Opportunities formal training programs and other workplace learning activities As faces greater scrutiny from Congress 00M and OMB to justify levels of investment our education training and professional development programs must show bottom line' contributions to mission success Moreover the accelerating pace of technology and its use by both the' United States and our adversaries demand innovative training and education approaches Additionally there is greater emphasis on standardization of business systems and processes at all levels of the federal government For this standardization improves ef ciency while enabling better collaboration both intemally and with other and DOD organizations However it imposes up-front costs in terms of retraining our workforce to use these standardized business systems and processes UW order to deliver the workforce development solutions required for these transformational efforts more effectively and ef ciently and to help the enterprise transform NSA implemented the Enterprise Workforce Development MW 25 DOCID 4292212 - a Na nr nnlt Capability EWDC initiative The EWDC is a comprehensive solution that encompasses organizational and pro'cess changes along with implementing new technologies Associated with this effort is the plan to have all of the NSA Skill Communities establish career roadmaps that clearly identify workforce competency needs relative to mission requirements U In addition to the EWDC implementation is also focusing on developing a workforce of leaders - both managers and technical leaders Managers must be capable of dealing with the complexities of diverse matrixed virtual multi- disciplinary multi-service civilian contractor teams in a period of dynamic change Our people will acquire general business skills such as communications project management strategic and business planning decision-makin business management and resource planning and management We are developing a diverse leadership bench ready to assume positions as managers and technical leaders retire a process that is running in consonance with on-going efforts in Leadership Competencies development and the Joint Leadership Development Program 2 U Staffing Succession Flaming U like our partners throughout the intelligence community is facing critical shortfalls of experienced mid-career professionals We have a disproportionate number of relatively new hires those hired post-9 11 on one hand and retirement- eligible professionals on the other After a decade of tight budgets and constrained hiring in the 1990's we face a significant challenge in leadership succession and planning U To maximize our investments in people we are ensuring we have a robust knowledge transfer process This process must convey the institutional knowledge of the current workforce to the next generation of Agency employees The retirement ready population of mentors and advisors serves as instructors and on-the-job resources to our less experienced workforce This is a retention program as well as a knowledge transfer program U To prepare for the projected number of retirees over the next several years and to ensure smooth transitions continues to leverage the Selective Employment of Retirees SER and the Standby Active Reserves SAR programs These programs allow us to temporarily hire DOD retirees with specific expertise to fill critical positions and mentor the next generation of Agency employees Currently there are over 100 employees across the Agency making up 1% of the NSA workforce The largest number is in our Signals Intelligence Directorate they serve as mentors coaches advisors and as informal leaders as they work the mission NSA retirees prior to leaving the Agency have the opportunity to express interest in being a member of the Reserve Program CRP Interested retirees register their availability W26 DOCID 4292212 - fr - AH--lln interests skills and experiences NSA also coordinates with ODNI and other agencies in the community to ensure compatibility of the CRP with the community-wide reserve program NIRC and continues to work across the enterprise to determine if the Reserve Program can satisfy requirements anywhere in the IC 3 U Retention and Attrition Management WMost of our Workforce has multiple career choices Twenty percent are eligible to retire before 2010 and the Federal Employees Retirement System covers approximately 80% of our personnel We know building a professional often requires a developmental investment of 3-5 years and at any point that person can leave to apply their talents elsewhere Therefore it is absolutely critical that becomes the competitive employer of choice for both tenured experienced knowledgeable and highly productive professionals and the emerging cohorts of technical and managerial professionals U To ensure we remain competitive for talent is monitoring the compensation market We understand that compensation is but one factor albeit a major one in attracting and retaining top talent Other factors include desirable job location opportunity to travel job security availability of training quality of equipment and facilities and intangibles such as workforce morale desire for public service interesting work etc In the aggregate our extraordle low attrition rate about 4% per year far below private industry norms leads us to believe we are currently well positioned to compete for talent However we also understand that there is no guarantee this position will continue U Since September 11 2001 aggressively implemented a workforce strategy to strengthen transformation through growth skill alignment and knowledge transfer As a result we significantly increased our population of language and intelligence computer scientists engineers and mathematicians In addition to these new hires we also understand that the latest generation of recruits brings a different world-view about work and careers U HR monitors and assesses retention and attrition trends and data and develops solutions when an intervention is in order We continue to use retention bonuses across the enterprise as we transform and build our diverse workforce We use bonuses to retain critical individuals with vital skills In some cases we use bonuses to delay the departure of key individuals allowing for a smoother transition As more and more Generation and employees enter the workforce with a uid career model our refreshment rate may increase We recognize this possibility and are prepared to accept shorter careers and manage to greater workforce turnover when appropriate DOCID 4292212 WW 4 U Workforce Performance Management U NSA is participating in IC efforts to develop and implement a new Human Resources architecture impacting the work structure pay structure pay banding recruitment and staf ng procedures performance management system and awards recognition program We look forward to managing to these new systems which we se'e giving us a- market sensitive compensation system providing pay opportunities that enable exible and effective recruitment management and retention of a high quality diverse high performance workforce with results oriented competencies UH-F999 Through our work and compensation structures and the performance management process we will build a stronger nexus between pay and performance and use our pay budget to our greatest advantage De ning our work appropriately maintaining a market sensitive compensation system and developing a pay for performance evaluation system will provide the foundation for making compensation and recognition decisions 5 U Recruiting Hiring U Hosea-mm CSS is shifting the focus of our recruiting and hiring program as we build our diverse workforce of the future We recruit and hire in a targeted fashion to fill critical gaps that cannot be lled by existing personnel and expand our reach into minority institutions and professional organizations We use a repeatable model for hiring to ensure alignment with mission and enabling needs on an annual basis 6 U Occupational Health Environment and Safety U The Agency's mission success is also dependent on the wellness of our workforce the safety of our workplaces and the protection of the environment Occupational Health Environmental and Safety Services CHESS provides programs to promote and sustain a healthy and safe workplace at locations worldwide Besides our ethical and moral obligations to provide these services they represent a sound business decision uniquely contributing to mission readiness and assurance Our programs consistently result in measurable reduction of injuries illness mission downtime absenteeism and property loss award-winning occupational health environmental and safety services continue to play a vital role in overall force protection and ensuring the success of the Agency's mission DOCID 4292212 - rs 3 U Civilian Workforce Profiles workforce is composed of civilian military and contractor personnel This Civilian Employment Plan focuses on civilian resources but there are sizable contractor and military components to the NSA workforce however those components are not within thescope of this initial plan We are planning to address military workforce requirements and issues in the coming weeks as part of an integrated workforce effort Th ' Deputy Chief CSS the Service the Finance organization and our military HR of ce made this activity possible through a concerted effort to accurately re ect military personnel in our HR database In the future when workforce data compilation methods have more delity and accuracy the agency will develop an overall aggregate workforce employment plan to include contractors and the military components and which will complement this CEP In fact it is envisioned that the future CEPs will become a subset of this overall aggregate agency workforce plan Hat Woodmen Companion - Band on FY2007 mans End Strength and mono Contractor law- ow 86-36 Our civilian strength has not been static since we stopped downsizing in FY2002 In fact our authorized strength has grown by 17% since the end of that fiscal year As shown below the Agency has been extremely successful in meeting its growth targets and has been staffed at 97 8% -99 7% of authorized strength during this growth period However now that NSA is at that level it creates unprecedented challenges in managing the civilian payroll 12222 22 End FY02 - End FY00 Includes NSA Civilians nu m - I up HalLi up5 3 Ell-ElHima4- Sew 43 1man Ada-u mu H- In Mum-d m i mun-ml I Our strategy has not been for growth's sake but a considered effort to increase our capabilities by employing more technical and analytic personnel and to shore up our security and acquisition functions Civilian Population Change Star FY03 - Stan FY08 Includes all NSA momma-nun a In In a 1 86- As a result we have been able to staff all of our major organizations at or very close to their authorized strength levels achieving balance between mission enabler and staff functions Yet achieving this success has not been easy In any given W30 year we have worked continuously to meet our targets by skill and or functional area have exceeded our strength authorization by program or organization due to shortfalls in projected attrition reassignments or reorganizations and have been criticized for putting pressure on pay by hiring at mid career offering incentives for recruitment and retention or awarding high performers sth William WE staf ng by @rsaniaatlon authorised ye Assigned E-rt- It I-1 sits rut - ml Additionally besides the challenges present in on-boarding large numbers of new employees the agency also faces a graying of the workforce Due to large hiring programs in the 1980 s there is a large potential retiree population in approximately 7 to 10 years that must be planned for today This is especially important since it takes 5 to 7 years to grow a seasoned analyst Obviously this means we must hire well in advance of expected seasoned losses to assure that we have the requisite skills on board at all time Also the management challenge is to assure we have the requisite mix of experience to sustain operations during the loss of a significant number of experienced employees Finally plans will have to be made to make significant follow-on hiring simply to replace the losses Ideally this profile could be smoothed to avoid the cyclical hiring spikes shown below blf 1 bll3J-P Civilian Population 2002 vs 2007 As mentioned above NSA has targeted its accessions to meet emerging and anticipated needs As the chart below shows of the agency s hires were in technical and analytic occupations and anothe Were focused on security and procurement-related needs re ecting Agency as well as IC imperatives Hiring Since Stan FY 2003 - Start FY2008 Pennanent Civilian FTE Worktorce thru 25 Sep 07 bii'li as- 6 020 Time Hires FTE in Technical and Analytic Skills Security Acquisition 8 Business ABM Other - 7- mm m wearing ampulm 1m nm my t i wt Tine Attrition 5 020 Time Hires FTE Technical Analytic Security ABM Other lh-m u t l-II-u- DOCID 4292212 86-36 The Agency has been successful in increasing the number of However making significant inroads into the overall percentages of the workforce engaged in these activities has proven extremely dif cult given the size of the plus ups we have been granted Since a percentage of our hiring program every year must be allocated to replace attrition to support on going operations it is difficult to make major shifts in the overall makeup of the workforce Population Change Start FY03 - Start FY08 Includes all NSA Civilians Start FY03 Population - 15 527 Maiytlc and Technical Security Acquisition ii Bushes and Support All Other Start FY08 Population 18 287 0 and Technical Security Acquisition I Bushes own and Support - All Other 86-36 Agency's hiring programs are projected to be approximatelyBOO to 1300 per year depending on future plus ups currently planned at 250 per year through FY11 attrition and the number of vacant positions left at the close of any particular fiscal year In watching our profiles there are some trends that serve as examples of the dynamics that we consider i 33 00cm 1222 212 - Our outyear budget program is targeted to allow us to continue to invest in critical technical and analytic skills but it is limited to essentially maintaining current staf ng levels in key enabler organizations due to the sc0pe Consequently our T3 0 initiatives seek to internally adjust existing resources to best mitigate emerging needs As these efforts take more shape we'll be able to report on them in subsequent CEPs FY99 through FY12 lelng Programs 15 7 FE I-V Lmr uht u Twiril I Ir-Lnt I - 1 up a gins- i J- a a lie- 31 use 1 1 Rena-in mm 45 45 13 35-15mg f5 -J 1' n71 r est-Jar 'r'H-z air it - ifs irr- - I - Lull I an 1 5114'1 J i u-ZI F'i h I at Fm nun HUI F102 FY01 - I I U Conclusion U dedicated integrated Human Capital Strategic Planning process establishes the foundational support and key activities for workforce management at from FY08 - FY10 and beyond This is a dynamic process and will continually be improved as the Agency continues its transformation efforts Further this process is consciously and deliberately embedded as a major tenet of the Agency s overall transformation efforts and is a full partner with complementary efforts in facilities planning IT strategic Visioning resources apportionment and budget and program planning The complex and rapidly changing global environment continues to increase the pressure on us to adjust our workforce to handle any situation anywhere at anytime recognizing that we are dealing with nite and extremely valuable resources Our goal is to meet today s challenges while strategically planning for the future and making the best investment in our greatest asset the people of the uC-hnu u HHC n -n uu at 4292212 DOCID 4292212 The Budget Picture Magnitude and Focus Funding Sources and Purposes UHFGUG is mded through three programs the Consolidated Program CCP an element of the National Intelligence Program NIP administered by the Director of National Intelligence the Military Intelligence Program MIP administered by the Under Secretary of Defense for Intelligence and the Informatibn Systems Security Program administered by the Assistant Secretary of Defense for Network Integration and Information Ba-Our Signals Intelligence SIGINT mission is funded by the CCP and the MIP The SIGINT mission supports all US foreign intelligence customers both military and non-military However we also have certain projects Speci cally directed to support military customers Funding for our SIGINT work is broken down along these lines I With CCP fundsl we carry out the national-level U S Signals Intelligence SIGINT mission 55 35 those aspects of SIGINT mission that bene t all SIGINT customersl - With MIP funds conducts SIGINT-related activities that are specifically designed to bene t Defense Department and military customers Mme Information Assurance IA mission is mded in the In the LA mission helps keep critical national security information systems and networks safe against theft tampering and destruction We provide solutions products and services and fund defensive infonnation Operations to achieve information assurance for information infrastructures critical to US national security interests Funding Levels Eng 86-35 Current and Long-Term Funding Levels Derived From 1-52 Dated 20070108 Declassify On 20320108 TWW DOCID 4292212 - - JThese funds are allocated among the three programs as follows Approgriated CCP MIP ISSP TOTAL jun 000 PL 66-36 Appropriations Types 86 36 The percentages remain relatively constant from year to year Manpower and Payroll has approximately 37 000 positions in total Of these I positions are funded within the IThe 552 has approximately I The MIP has Within the base progam mung shown above the NSA payroll cost is These gures cover only civilian payroll pay tor military personnel IS funded by the respective military services and is not included in the payroll cost shown here Supplemental Funding GyThe previous discussion does not take into account supplemental funding which is approved by Congress on a year-by-year basis and not re ected in our long-term budget pro le Over the past several years has received supplemental funding I ISupplemental funding allows to provide intelligence that we expect our customers will require for the foreseeable future Si-To con 'nu 0 current lev of ance we expect to require approximatelyl above and beyond the amounts DOCID 4292212 WW currently re ected in the base program This gure is consistent with the Administration s supplemental requests for FY-O9 and as follows FY-09 CCP MIP TOTAL ppropriated to date not yet appropriated 1 Investment Areas 85-35 CCP Overview CCP funding that receives is allocated among a variety of budget categories known as Investment Portfolios These categories are the same for all organizations that receive mds from the National Intelligence Program Following are two breakdowns of CCP mding by Investment Portfolio Figure 1 shows total base program mding payroll and non-pay for FY-O9 and while Figure 2 shows a similar breakout excluding payroll costs CCP FY 2009 Base Appropriations Total Funds by Budget Category Dollars In Billions COP FY2010 3m Raquel Total Funds by Budget Cal-gory Dallas to Illtlonal 'n mace-lip I mane a cesium lupnocessm ammo Zumvsa a roommate I ENTERPRSE IT ENTERPHBE I assessor a EMMY i DOCID 4292212 CCP FY 2009 Bus Non-Pay by Budget Category bolt-n In Milena CCP FY 2010 Em Request Non-Ply by Budget Category Donors In Whom a mm momma DANALYSIS I Pm I WEBB IT IWMEMSB IHESEAHJH I rem Figurlz MU those Investment Portfolios the CCP budget addresses four 86-36 interdependent focus areas 1 sustaining current operational activities in the face of a dramatically increased and constantly evolving operations tempo 2 modernizing the aging information technology IT and physical plant in 'asn'uctures to ensure robust support to critical mission activities 3 transforming the enterprise to keep pace with relentless and rapid changes in target behaviors and technological advances and 4 supporting efforts to secure cyberspace via providing information on and responding to cyber threats to the United States as part of the Comprehensive National Cybersecurity Initiative CNCI Ongoing Operations WSW-Regarding the current operations tempo is pursuing three principal mission imperatives ensure effective and actionable SIGINT for a myriad and diverse customer set in support of national interests and operational campaigns exploit hard targets and provide the global intelligencel I analytic tradecra and operational in 'astructure needed to provide information on and to respond to threats to the United States The pace of current Operations is daunting and we must ensure that we continue to sustain our operational capabilities to meet customer requirements for critically needed SIGINT and information assurance Infrastructure Modernization Willi-GHQ - We must also ensure that we have a robust IT in 'astructure and that our facilities - for people and equipment are adequate to today s mission requirements The IT e ort includes modernizing campus area and wide area networks servers desktOps directory services software licensing and information assurance for systems WW-Facilities modernization includes both constructing new state-of-the- art facilities that will enhance mission accomplishment and rehabilitating and improving existing facilities A major focus of this work is to create suf cient power space and cooling capacity to meet the demands of today s information storage and processing DOCID 4292212 equipment The power space and cooling effort addresses both power capacity and reliability as well as the sustainment of existing facilities and the reduction of the backlog of maintenance and repair Mission Transfonnaiion integrated strategic themes serve as the framework for transformation activities em 36 36 First we must possess the global reach necessary to gain access to diverse bum-50 USC 30240 communications and to deve10p and deployl Second we require world-class diagnostic capabilities that will enable us to nd adversaries Third we must maintain a world-class worlg'orce with the tools to assess and defeat and complex communications protocols employed by our adversaries This requires the hiring and retention of top-of-the-class individuals in mathematics computer science and related skills as well as specialized processing and computational power to address the most intractable challenges Additionally we must continue efforts to hire and retain the language analysis and business management expertise required to prosecute the mission Cyber Security WE has become increasing clear how our Nation s critical information systems and infrastructure - including those critical to our national defense and other core governmental functions - are to intrusion theft and damage through cyber-attacks To address this threat the Administration developed the Comprehensive National Cybersecurity Initiative CNCI for which Congress began allocating mds during Fiscal Year 2009 66-36 DOCID 4292212 FY-OO Annmn ated FY-IO 15 CCP MIP TOTAL 'tS N-Fa-The objective of the is to achieve a greatly enhanced understanding of cyber threats and vulnerabilities in order to re ect real-time situational awareness of the cyber environment and to provide robust active cyber defense It seeks to establish a 'ont-line of cyber defense attribute the source of malicious activity block or limit the effectiveness of such activity understand the capabilities and intensions of those who launch such activities and provide the United States with well-informed options for an integrated operational reSponse In short the CN CI demonstrates the resolve to secure US cyberspace and set the conditions necessary for long-term success and to shape the iture cyber environment to secure the US technological advantage MIP Overview Sm-Our troops in harm s way have unique and urgent intelligence needs I The MIP is focused on making sure this occurs programs funded by the MIPI The elements of the armed services that team with us to carry out the mission are called the Service Elements SCEs Within the MIP our goal is to make the SCEs fully capable mobile component of a single global integrated system To accomplish this there are three main foundational thrusts that cut across the budget I Following are two breakdowns of funding by mission capability Figure 3 shows total base program funding payroll and non-pay for FY-09 and FY- 0 while Figure 4 shows a similar breakout excluding payroll costs but new 86- bill as- him as DOCID 4292212 I rg WW hm as-as ISSP Overview Uh F-Gis ei- Ihe ISSP is focused on providing the information assurance solutions services infrastructure and capabilities necessary to enable clients to assure the safe continuity of business and mission operations through the use of automated information systems and information sharing while precluding unauthorized actions that can lead to disclosure of sensitive information modi cation or destruction of data theft of data impersonation or misrepresentation of authorized system users by unauthorized users and denial of service ISSP budget supports traditional information assurance core capabilities such as information assurance guidance and security engineering provides increased vulnerability analysis and operations to mitigate the threat to and vulnerabilities of information systems and to increase knowledge of the adversary I licenses on enterprise 35- security management seeks a balanced mix of 601's and COTs products and DOCID 4292212 41' WW focuses on investments in those activities for which NSA can provide unique information assurance value Wollowing are two breakdowns of ISSP fundng into its major components aligned to information assurance goals Figure 5 shows total base program funding payroll and non-pay for FY-09 and FY -10 while Figure 6 shows a similar breakout excluding payroll costs ISSP 20 Hm Total Fund by BOB IA mullahs Il'l aliens ISSP FY 2009 Bun Appropriation- Total Funds by DOD Goal 0mm In New gumS MU ISSP FY2010 Ben Request Non-Pay by BOB IA Goal Deltas In Milena ISSP FY2009 Bun Appruplla one Non-Pay by DOD mandamus - ln Ill one 56-36 Wme ISSP budget provides the resources to - protect information by safeguarding data as it is being created used modi ed stored moved and destroyed to ensure that all information has an appropriate level of rust - defend systems and networks by recognizing reacting to and responding to threats vulnerabilities and de ciencies ensuring that no access is uncontrolled and systems and networks are capable of self-defense WW I DOCID 4292212 - provide information assurance situational awarenessr - transform and enable information assurance capabilities by 1 I 86-36 - create an empowered workforce that is well equipped to support the information assurance mission L 86-36 CONCLUSION is a valued and increasingly valuable commodity for the Defense and Intelligence communities Only has the combination of global presence operational perspective technology expertise and analytical skills to achieve network superiority for the United States The budget seeks to ensure that remains a vital national asset by funding initiatives that are critical to and provide a signi cant return on investment for the future security of the nation msmon t 1 Jain-$5 n a ga nif f - Sawmill A - _Ggrt'aral Jr 951 pl n u a u-r tip 1 In 3UP unn oocm 4292212- W ice-1r - hk f ihr UNCLASSIFIED Agenda - Acquisition Vision Mission - Acquisition Strategic Objectives - Acquisition Support to NSA - Organization Layout 0 What NSA buys - 2008 Procurement Overview - 2008 Small Business Performance - Tier 1 Program Summary I oocrr 4292212 Acquisition Vision Mission Vision Be a world-class acquisition organization for NSA to enable and sustain superiority by Empowering a knowledgeable skilled and effective workforce Providing acquisition leadership oversight and support - Creatively implementing best practices Applying effective life-cycle management Mission The mission of the Acquisition Organization is to acquire and sustain capabilities systems products and services through a disciplined yet agile process that enables NSA to continually modernize ef ciently and effectively uncussmaomnem 1' DOCIDO 4292212 0 Acquisition Strategic Objectives - DechOp deliver and eld capabilities rapidly that meet our Operational mission needs within cost schedule and performance through diligent execution and well laid out program plans - Streamline and tailor acquisition process from requirements through delivery Provide expert program management and agile acquisition oversight - Assure an agile diverse trained certi ed skilled valued motivated and savvy workforce Inject new ideas and technologies into the transformation architecture and to enable information superiority by nding new ways to tap an expanded industrial base - Continually assess return on investment for all acquisition activities - Provide timely response to all customers in procuring needed materials contracting goods and services and managing acquisition activities that support the mission - Build overseer stakeholder and customer con dence in investment programs program management abilities and oversight UNCLASSIHEDIW 1 DOCILO 4292212 mamma Acquisition PEG Layout I r fan in a I a gaff-q 0v - t 0' a '12 ' m'iaw m J g-c an Hun on iltif I 1 a 9 000113 4292212 - UNCLASSIFIE Acquisition Organization 9 mama ' SAEr- - I 41 pm In aid-1' 1 w pie-HM '5 5'22'33 ma 4 22 O- iCost Apaiyag and EVM 'r Acquisition Lo l tlcs 3M2 I a n1 - hum-PL 86-36 #01 - in At t a 1 -- 1- - u hfr g'p 1-d- urw of mgfg'fw 14 $11 a 52 3 L- I 'a-suRJ- Ham - 141% F - - a I Aola - an a-w-r'h acme d-mxnirQ ma - 33rd 'i 2 - 3 1' 711 - JEW9 91ant- 95 Lao-hr LuzUNCLASSIHEWW 1300129 42 92212 at uncussme What NSA - IT Services - Snow Removal - Hardware - Power from - Middleware - Building lease from Army - Software Corps 1 - Landscaping Services - Electrical Services - Facilities Engineering - System Engineering Management TeSting Services - Business Systems 0 Tools snap-P 56-36 UNCLASSIFIEDW oocrr 4292212 2008 Procurement Overview - 60% Competition Sole source for small business set-asides niche technologies unique capabilities and urgent mission needs - awards with only Iunlimited contracting of cers t- 25% of Budget went to Small Business Prime Contracts mm - Over companies registered in the NSA Acquisition Resource Center s database main repository fOr market surveys Total Actions Awardedl bwards 1 I 3% 1- gag-a5 y g 'qnwr aj tlaV atesewn I n y r' L tm a but Dollars obligated Inst 4 years by Contracting 1 331 5 35 33 mush-sunr 130mm 4292212 0 - 2008 Small Business Performance Prime Contracting FY08 NSA FY08 Actual Category Goal Small Business Overall 26% 25 2% Small Disadvantaged 5% Women Owned 3% HUB Zone 75% Service Disabled Veteran 1% - Did not meet overall small business goals however increased SD VOSB by 500% and surpassed goal of 22 4 - Cited as a Small Business Center of Excellence for the 1 Half of 1 2008 130cm 4292212 -2 I UNCLASSIFIEDIIFW Tier 1 Program s'umm aries' Doom 4292212 UNOLASSIFIEW Financial Accounting and Corporate Tracking System FACTS Program Description WFACT provides with modern secure leading edge business solutions that will comply with external regulaton guidance and audit requirements achieve standardization and integration of business systems and processes and deliver credible business information needed for mission success Increment 1 following functionality was delivered and went operational on the following dates FACTS Release 1 0 Budget Loading and Financial Planning Management Mar 07 Release 1 1 Procurement Requests for initiation and Spend Plans May 07 ReleaSe 1 2 General Ledger Purchasing and Reimbursable Agreements Oct 07 Increment 2 following activities and capabilities are planned Funds Balance with Treasury - Initial Capability Mar 09 Complete Capability 3QFY09 Complete Migration oi l nancials onto FACTS 4QFYIO 3 Program Schedule in 1 10 r an 10c FOC 16 Oct 2001 Mar 09 Program Manager Program Funding Prime Contractods Accenture National Security Services LLC Current Year FY09 Future Years FY1045 T'his funding includes b0 and BITMAP resources uucmssunemon-osmms-omx 13001123 4292212 r UNCLASSIFIE Business IT Modernization Auditability Program BITMAP Program Description BITMAP program is a transformational initiative for the to develop and meet the audit requirement as speci ed by ODNI and directed by the CFO Act In addition this initiative supports the Transformation 3 0 goal b31345 56-36 increment 1 1145986 BITMAP increment l-will deliver key rnctionality in four key areas required for auditability Asset Management AM Supply Chain Management SCM Project Costing PC and Time and Labor T These capabilities must incorporate new and existing business systems and processes to ensure auditability for NSAICSSI Program Schedule Phase A mm Ema I MS a 4QFY09 4QFYIO Program Manager Program Funding Prime Contractor s Accenture National Security Services LLC Current Year FY09 Deloitte Consulting Future Years FY1045 him-P - This funding is includes both FACTS and BITMAP resources UNCLASSIFIEW '1 130cm 4292212 I I - i'i - l' Hal-50 U56 3724 mm 55 33 I3 DOCID 4292212 4 4 MEL-W 452 hm use 3024 SEW bum PL 86-36 I DOCID 4292212 5 - I SECRETIISUIREL USA FVEY E i iso usc m '5 56-38 0091p 4292212 3 USC 3024 mam hum-PL me '6 130cm 4292212 2 - 0 4 5 224 - 5m may 88-36 use 302qu 7 DOCII 4292212 2 but USC 3024 mm-P 38-36 nocxr 4292212 0 In 242 USO 3 0qu 9 1300an 4292212 - - ON a i m hm busyso usc 3024 1 20 threw-um DOCII 4292212 him usc 302w busy-15 usc 2 buayP 36-36 Docnm 4292212 UNCLASSIFIEDHFOFIW UNCLASSIFIEDIWW bum-P L was 00cm 4292212 3150 USC 3024 23 bum-P L 36-36 pour 4292212 2 m1 USC 3024i 58-35 24 noon 4292212 USC 3024 warp 55 35 t 1311 Docrn 4292212 ah - 1 I wa 66-36 2 6 noon- 93 4292212 0 x42 1 DOCID 429 3 5-3- 2 2212 2 22 - UNCLASSIFIEW ram UNCLASSIFIEW 58-36 130an 4292212 A UNCLASSIHEW L 86-35 29 130an 4292212 0 54- L- i UNCLASSIFIEW bum-P 86-36 programs are special access programs and are not included in this brief If information is required properly cleared members may request the data from NSA JD UNCLASSIFIEWW 4292212 c uu 4 casual- 6 Faun-Au uo Footprint I I'lru 1 I Irvmalt- 4 5- 1 mun-mkEntergris Jill USC 302440 2 86-36 12 0019 4292212 -- - -Extended Enterprise Legend Washington WSAHQ Headqunners Fort Meade MD Center NSAC Colorado Denver CO Georgia Augusta GA Hawaii Honolulu HI NSAT Texas San Antonio TX Special U S Liaison O ces Um SUSLOL Special U s Liaison Of ce London Special U S Liaison Of ce Ottawa UWSLOC Special U S Liaison Of ce Canberra Derived From 1-52 Dated 20010108 Declassify On 20320l08 hm lanai-50 use 302qu 49W busy-P L 86-36 13- I omim nml US - - - a - NCR STATE HEREER I - A 1 ch Dish icy u w -44 31 - 3- 7 k1 - - ll l' Ir-r - - u vrq-u- - 5 u he FOMe sfse 5' mill-F 36-30 5 National Security Agency Central Security Service U Center Build-Out An Administration Transition Overview mm usc 3024a 86-33 the early 19905 in response to the changing customer requirements and communications environment following the end of the Cold War established Regional SIGINT Operations Centers RSOC in Georgia Hawaii and Texas They were spokes on the NSA wheel connected to the headquarters facility in Maryland and to each other The workforce in those locations housed on existing military bases and The years following September ll hbrought several important changes to that had a direct bearing on the RSOCs and how they were used Speci cally NSA gained a heightened awareness of the need for mission assurance and continuity of Operations planning Center CC build-out was one avenue to address these many changes Derived From 1-52 Dated 20070108 - Declassify On 20320108 DOCID 4292212 - The sites were matured -om a tactical military support arm to a ll extension of the a Center The of cial nomenclature became Colorado Georgia Hawaii and Texas 1 519639999- Detaiied descriptions of each Center follow Ebgfagm use 3024 86-36 Georgia COL John T Owens Thais Commander Fort Gordon Georgia Mission U As a leader in the net-centric enterprise Georgia conducts SIGINT operations trains the worktorce and enables global communications all critlcal to our national decision makers Combatant Commands and deployed U S Coalition forces 86-36 5 U Aerial View of NSAG's Current Campus U Derived From 1-52 Dated 20070108 Declassify 011 39480914 SEW 4 - 1 1 0 9 Organizational Chart 11 3 11 9 Jean agraav a iil- inznm 1_ U U Key Missions usc 3024a 36-36 a U Collection Management in support of above targets 0 o'r'm'afTon Sharing and Ing - n 4 4 Aerial View of the Sweet Tea construction site Jul 2008 U Sweet Tea Facility I Size 536 000 SF I Groundbreaking 26 Mar 2007 I Base Occupancy Date BOD Jun 2010 Total Construction Cost I New-space architecture provides a more open work environment that will 0 Allow for greater collaboration within work centers Provide greater flexibility for reconfiguring the workspace 0 U Manpower As of May 2008 U 2008 2 930 - NSA Civilians 366 - Military 2 173 - Service Civilians 42 - Others Foreign Party IC Partners Contractors 347 U 2012 4 319 Projected - NSA Civilians 686 Military 2 997 Service Civilians 46 Others 590 U 2015 4 613 Projected Totalsqueal-r3 - - It n U NSAG Seat Requirements - 2008 1 680 - 2012 2 428 2015 2 545 U Current NSAG I'm Approximate Gross Square Footage GSF 1 agIIgIng as r Back Hall 111 500 MOD 2 72 000 1-5 a Georgia Center for Languages GCL 41 501 i GANNEX 41 501 0 Group Component Headquarters GCHQ 24 100 - Navy Modular 20 000 - NSAG Warehouse 8 000 i - GCHQ Annex 2 000 IIFGUO IT - IT has programmedjor FY10-15 0 Covers the tit-up of 2 665 seats in Sweet Tea I n l'awan I CAPT Jan Tlghe USN Commander Kunia Hawaii our nation and allies to pre'em pt dlsrupt or defeat adversaries and to protect our 3 national interests by conducting relevant signals intelligence information i- I U Haiivali assures a decisive Information advantage for assurance and network warfare operations175 fu ru U Hawaii 5 in U Scho eid Barrack HI i um-over Derived From 1-52 1' Dated 20070103 Declassify 011 20320108 1 -- 11II I Illi'r ll 1 In-nyu 2 U 1391 Approved by Congress September 2006 U - U Contract Awarded 12 April 2007 5318 150 i U Groundbreaking Ceremonies 30 August 2007 U Contract Completion Date 2010 muttering Sizes Operations Building U Wahiewa Notional Seat Count 1145 environment that will E - Allow for greater collaboration within work centers i i U New Open Space Architecture that will provide a more open work Provide greater flexibility for reconfiguring the workspace I I SEGREIHREI lung ns I ng ERR I a means1-2 - an U Conference Rooms 12 U VTC Rooms 11 U Enclaves 21 U Construction as of 29 August 2008 I fzagrg llr - - U Manpower as of 22 August 2008 U 2008 3054 NBA Civilians 224 Service Civilians 121 Military 2582 Other Foreign Partners lC Partners Contractors 127 U 2012 4018 projected NSA Civilians 426 Service Civilians 132 Military 3240 Other 180 - hm mm-P U 2015 4075 projected U Seat Requirements 2008 1550 Kunia 35o 2012 2625 2015 2640 Space Requirementsf - Unclassified 33 740 sq it a Classified 32 560 sq ft Resources MILCON $370 49 IT - 1 i Texas Col John Bansemer Commander 1 Medina Annex San Antonio TX I I Texas conducts Signals Intelligence and Computer Network Operations worldwide in support of National and tactical decision-makers customers partners Applies geographic and functional expertisel Aerial View of current Texas campus at Medina Derived From 1 52 i Dated EUDTDIDB - I Daclassif'y Dn 2032mm U NSAICSS Texas Organizational chart Commander 06 Senior Service Blanca-its Emma Cilicfof_Statf O6 Enabler I Dcnurv Cos - a Tech Director NIOC TX USN 543d 16 USAF I 543d SFTS 0 93d 5 mm 11 a mom information Home Signals Installation Information Education a Assurance We Intelligence a Lop'stica Technony Training Directorate Directorate Directorate Directorate Directorate Directoutc Key - U International Crime and Narcotics 1 86-36 I U Computer Network Operations CNO - U Information Sharing and Reporting 1 x- 1 i 1 FacllitiesBACONHIDGE Front Entrance - - -- - Vleltor Entrance ag-v 2 Site Plan Current Future NSAT Campus BACONRIDGE i I U Leased Facility began Spring FY05 i I U Renovation and Demolition began Fall FY05 - U Building Occupancy Date BOD A April 2010 9 April 2010 i U Vacate Medina Annex Sept 2014 U Total SF - 469 000 0 A Seat Count 1 229 Data Center U New-space architecture provides a more open work environment that will Allow for greater collaboration within work centers 0 Provide greater flexibility for reconfiguring the workspace U Manpower As of May 2008 U 2008 2 136 NSA Civilians 246 I Military 1 689 Service Civilians 56 Others Foreign IC Partners Contractors 145 NSA Civilians 758 Military 2 318 Service Civilians 81 Others 248 U 2012 3 405 I U 2015 3 648 Projected U NSAT Future Seat Requirements I 2012 1 903 I 2015 2 380 U IT U The Data Center is composed of 6 rooms 3 of which belong to Texas Rooms 3 5 and 6 the remaining 3 belong to corporate NSA U Delivered capacities at BOD 7 987 sf mm nter Fioom 6 at 70 watts sf I 9 524 Fioom 5 383 watts sf 16 593 5 room 220 watts sf 23 480 sf room 1 watts sf 15 437 sf room it 2 watts sf 17 105 sf room 4 watts sf 23 480 sf room 1 388 watts st Capacities Post BOD I 15 437 sf room 2 429 watts sf 5 - - uur' - 16 593 sf room 3 440 17 105 sf room 4 427 watts sf I U Funding - Renovatlon and Flt-Up of A I Sustalnment and Lease Costs I - IT Funding for seats hm i a-tq DOCID i 42i 9 Colorado Sara May eld Director Colorado Aurora Colorado 7 November 2008 Mm Colorado is the national headquarters for the Global Technical SIGINT Ent rise GTSE information includes Electronics INTelligence ELINTLI I Radio Frequency RF Communications Externals data associated with radars missrles aircraft space systems weapons systems and selected information and communications systems worldwide Colorado provides leadership for all elements of the SIGINT Community performing collection production and customer relations involving these programs seas Technical SIGINT Enterprise is a globally dispersed federation of collectors producers and consumers of SIGINT product While centrally managed from Colorado the Technical mission is executed globally I WW9 As the sole NSA product line headquarters located outside of Fort Meade Colorado ensures the Global Technical SIGINT Enterprise GTSE is -- mission responsibilities are decon icted all elements are aware of their own and each other's responsibilities and that customer Information Needs are met Vision Partnered to achieve strategic and tactical advantage against our adversaries Derived From 1-52 Dated 20070108 Declassify On 20320108 P3600HUH hwomw igg Ikum 5w wvu raoTau Id L ruby A 23 Ram 1 rt-191' U'r warp 86-36 42 922 COLORADO Discus ORGANIZATION CHART mum Missions 9 - Global ELINTI IRF 86- Communications Externals Analysis and Production Manning hm Manpower of NSA Civilian and multi-service use 30240 Consolidated Program CCP Service Element SCE military 5'35 personnel are augmented by USAF P2 personnel Personnel at Field Station Denver FSD also support NSAC personnel August 2008 Civilians 2'33 0 USA Civilians 1 Military 287 USN Civilians 1 Military 258 USAF Civilians 2 Military 381 0 USMC Military 34 I USCG Military 16 0 Contractors 115 SD TOTAL 1324 usc 3024 1 55 36 08 DOCID 42 92212 Wm w 'zil cumi-t-L - Secur Accesses ough Foreign Partnerships '5 relationships with its foreign partners are unique within the Intelligence Community and existfor one purpose ro irther the goals of the Community and the United State's-i artnershi nable theA em in achi a truly global intelligence posture I 86- Slgnals Intelligence Partnerships Derived From 1 52 use 3024 Dated 20070108 use 793 Declassify On 20320108 DOCID 4292212 n WW usc 30240 use 798 86-36 DOCID 4292212 A Jr 1 Information Assurance Partnerships With regard to Information Assurance LA partnerships the unique bene ts are not Maw obvious I In addition IA 010 1 use 30240 use 793 86-35 relationships enable to ensure secure interoperability for the U S war ghter and the coalition operational environment It is critical to our war ghters that we protect their entire communications the pe0ple doing the communicating and the information being communicated To achieve this objective we must make sure that our foreign partners are employing secure interoperability and in 'astructure standards when engaged in operations with the U S 86-36 ri'E-T g' g' JIU320108 Laid- 1 Err-rm r n- a - - I fall I Ed - WE II li id 'tL n fu m ml Ema n - In ell 'iEn TaCtiCa-uni-F I fimmatrg t Cum'nanders WE I Mega m-ba-s aeigr 2 fr - US Sern tes fit 01 Defense Trca Cum meme I Energy State 85-36 r- 1 irirne Mil-ta r5 m Suppur' --I HE- mt mm Ir-1tc- IliCJE1I Iri- I I I f-um CHINA - - Evin-gm Emma Pam-Her DHII use 3024 busy-P 86-36 5 AI Pl 1 1- F-j - Ihl L 3 I a-Ib-Iw- I II Ii Worm We mm hi Environment Never Stops Accelerating Evolving Expanding _l 1 I I 'l- Ilevi n in d er him USC 32% bull 55-38 - Allies and adversaries live and work on the same netwcilk - Defending and exploiting this shared space is our primary mission mm L was We must go istride for stride with our targets through continued integration and P80 - Uzi If - him busy-so usc 302410 busy-P 56-36 -lu mm busy-so use 3024 busy-P was II a H'mdgg 5' 557-2 U50 3024 88-36 'r '1 1-3 3 an If aet fi mm b lf o USC 3024 i 66-36 - - - bum-P L 06-36 IDHSHO usc 30241 -l iiuu-L- o otqi r - USC 30240 L 36-36 _p - A mn- w - 2 - n-ww - rs 111- - Hug-T lag-5 3 i 11 4 Hwy-V I I I I m- 1 15 tag m m s - 'a 119 El 15m - L up H I I - - - - -- In-uo run qt qjt I I bum-50 use 3024 busy-P 86-36 1 i I a Jn n a a_ I un- - - - Inn-1- guag-muscaow bum-Pusan hm mall-50 USC 3024 5636 - -- 6 - l' IU LnJl'l a L bum-SO use 30240 busy-P 06-36 - L rltUJ' DELID I flui' I - - a 4' Eylin lb DEM-50 USC 3024M L 56-36 Inn-Ioluw-Hnr-I Ul Iffl ll_l_ IF As of 26 August 20% him Will-50 use 3024-3 mm-P 38-36 1 -- I mm-so usc 302m buaw L 66-36 sum - I 1 'r 3 00 0- - a II 9 1 a I DPCIQQTAJ 173537 hm usc 30240 mm-P I 66-I - USC 3024 L 56-38 II mm-so use 302qu busy-P L 36-38 ii ES 37 I i 1 01 1 unapso use 3024 busy-P 88- J1 nud - nu 'Itn x- bum-so use 302qu I 86-36 9 2212 The-Nati' 1 1 Debunh A- Bunmmi lu- Ina- rliDEPUTY nil pm Mr John Chas Inglis A 'irlr i L- mam- at it 4 I -- i wu 57Dr 1th - I I I I gr Ilul - - tum-r - - 11 2 - 7 u - aw wwd1 -- -- - - in 55 Hits-$2 - - 22- - - - - emf 511 3 'EIr 'f- furl-5 I I I Iq- Inna-ll - nomaQ4292212 has-ADEPUTY CHIEF OF I STAFF 1 1 I 'r '13 h- I II Inga - I 03- I I IIcan FLICT RESOLUTION 1 a I I a'url mam5 51 154350 National Level custngugrs arr g jnt f u - In111 1 - -- - - - Hum- - - - Dawn - Agg'culm -1 - rt-MK 11 vii- i'lu 'a' 1'43' I I mm WRWE - I- I I 473 3 515 5 I-I a - DOCID 4292212 Leadership Biographies Director Chief Commander JFCC-NW Deputy Director NSA Chief of Staff Information Assurance Director Signals Intelligence Director Deputy Commander JFCC-NW Deputy Chief CSS General Counsel InSpector General Director s Science Advisor Director Equal Employment Opportunity and Diversity Director Business Management Integration Associate Director Global Integration Of ce Associate Director Strategic Communications Associate Director Community Integration Policy and Records Associate Director Senior Leadership Management Deputy Chief of Staff Strategic Issues Director National Security Operations Center Director Threat Operations Center Director Commercial Solutions Center Director of Technology Chief Technology Of cer Chief Information Of cer Director for Research Deputy Director for Resources Management Chief Financial Manager Deputy Chief Financial Manager Comptroller Senior Acquisition Executive Director Foreign Affairs Associate Director Human Resources Associate Director Installation and Logistics Associate Director Legislative Affairs Associate Director Education and Training Associate Director Security and Counter-intelligence Director Program Analysis and Evaluation DOCID 4292212 UNCLASSIFIED LTG Keith B Alexander United States Army Lieutenant General Keith B Alexander USA is the Director I National Security Agency Chief Central Security Service and Commander Joint Functional Component Command - Network Warfare JFCC-NW Fort George G Meade MD As the Director of NSA and Chief of CSS he is responsible for a Department of Defense agency with national foreign intelligence and combat support responsibilities NSA's civilian and military personnel are stationed worldwide As Commander JFCC-NW he is responsible to plan execute and manage forces for coordinating computer network Attack CNA and computer network defense CND as directed by USSTRATCOM He was born in SyracuSe NY and entered active duty at the US Military Academy at West Point Previous assignments include the Deputy Chief of Staff DCS G-2 Headquarters Department of the Army Washington Commanding General of the US Army Intelligence and Security Command at Fort Belvoir Director of Intelligence United States Central Command MacDill Air Force Base and Deputy Director for Requirements Capabilities Assessments and Doctrine J-2 for the Joint Chiefs of Staff LTG Alexander has served in a variety of command assignments in Germany and the United States These include tours as Commander of Border Field Of ce 511th MI Battalion 66th MI Group 336th Army Security Agency Company 525th MI Group 204th MI Battalion and 525th MI Brigade Additionally LTG Alexander held key staff assignments as Deputy Director and Operations Of cer Army Intelligence Master Plan for the Deputy Chief of Staff for Intelligence S-3 and Executive Of cer 522nd MI Battalion 2nd Armored Division 0-2 for the st Armored Division both in Germany and Operation DESERT STORM in Saudi Arabia LTG Alexander holds a BacheIOr of Science degree from the US Military Academy and a Master of Science degree in Business Administration from Boston University He holds a Master of Science degree in Systems Technology Electronic Warfare and a Master of Science degree in Physics from the naval Post Graduate School He also holds a Master of Science degree in National Security Strategy from the National Defense University His military education includes the Armor Of cer Basic Course the Military Intelligence Officer Advanced Course the US Army Command and General Staff College and the National War College His badges include the Senior Parachutist Badge the Army Staff Identi cation Badge and the Joint Chief of Staff Identi cation Badge UNCLASSIFIED DOCID 4292212 7' UNCLASSIFIED Mr John C Chris Inglis Deputy Director for the National Security Agency Current Posltlon Mr took the positlon of Deputy Director of the Natlonal Security Agency in August 2006 As the senior civilian at NSA he acts as the Agency s chief operating of cer gulding and directing strategies and policy and serves as the principal adviser to the Director - 2003-2006 2001 -2003 1999-2001 1998-1999 1997 1996-1997 1995-1996 1992-1995 1991 -1 992 1986-1991 1976-1985 1985-2006 Past President Major and DateslSummary of Earlier Experience Special United States Liaison Of cer London Signals Deputy Dlrector for Analysis and Production Chief Office of China and Korea Operations Directorate Deputy Chief Of ce of Chlna and Korea Operations Directorate Promoted to the Senlor Executive Service Senlor Operations Officer National Security Operations Center Deputy Chief withln the Of ce of Policy Participant In Senior Executive Development Program Management and Staff tours in the Dlrectorates of Operations Production Information Systems Security and Plans and Programs Visiting Professor Department of Computer Sclence and Electrical Engineering US Military Academy West Point NY Information Security Analyst and Manager up through division level within NSA's Information Systems Security Directorate US Air Force Of cer and Pilot Brigadier General in the Air Natlonal Guard and quali ed as a command pilot Has commanded at Flight Squadron Group and Joint Force Headquarters NSA lntemational Affairs Institute Human Resources Management Association DOCID 4292212 HI '1 UNCLASSIFHIED Education 1976 Graduated U S Alr Force Academy 3 8 in Engineering Mechanics Distinguished Graduate - 1977 Graduated Columbia MS in Mechanical Engineering Guggenheim Fellow - 1984 Graduated Johns Hopkins University MS in Computer Science 1990 Graduated George Washington University Professlonal Degree in Computer Science a 1996 Graduate of Air War College USAF Squadron Of cers School Alr Command and Staff College Seminar Signl cant Awards - 1984 Clement's Award as the US Naval Academy s Outstanding Mllitary Faculty Member - 1992 Department of Army Outstanding Civilian Servlce Award - 1996 Deputy Dlrector of Operations Special Recognition Award a 2000 Presidential Rank Award for Meritorlous Servlce - 2001 Deputy Dlrector of Operations Special Recognition Award 2002 Exceptional Civilian Service Award - 2004 Presidential Rank Award for Distinguished Service Personal Data bi UNCLASSIFIED DOCID 4292212 9 Sii rI'ln writ - sigma 23 1 4i CURRENT POSITION In February 2006 Ms Deborah A Bonanni was selected as the Chief of Staff at the National Security Agency Department of Defense Fort Meade Maryland The Chief of Staff organization Is a corporate staff that exercises operational control over the corporate functions of Policy Strategic Planning and Performance External Relations and Communications Fleid Advocacy the Counterintelligence Center and Corporate Management Services The Chief of Staff also provides administrative support for the General Counsel EEO IG and the NSA Principal Directors EDUCATION Ms Bonanni received her Bachelor of Arts Degree Summa Cum Laude from Hood College in 1978 with a double major In History and Political Science She received her Juris Doctorate from the Columbus School of Law at the Catholic University of America in 1982 She is a member of the Bars of both Maryland and District of Columbia PRIOR POSITIONS Ms Bonanni began her public service career as an attomey within the NSA Of ce of General Counsel OGC For the rst ten years of her career she served in positions of Increasing responsibility within the OGC in the mid-1990's she embarked on a series of managerial positions outside the legal domain and earned high marks for her ability to motivate and recruit highly talented people and to create organizations focused on customers Innovation and performance As the Chief Human Resources Services from 1996-2000 she led a series of new initiatives aligned with the strategic vision of the Director NSA designed to transform recruitment retention and recognition of the Agency's workforce in 2001 she attended the Foreign Service lnstitute s Senior Seminar a prestigious Department of State leadership program attended by top senior executives from the federal foreign affairs community From 2002 until February 2006 she served as the Associate Director Education and Training the Training Director National Security Agency Central Security Service and the Commandant of the National School As the Associate Director Ms Bonanni had responsibility for the strategic direction leadership and oversight of all education training and professional development affecting the military and civilian members of the workforce Her primary goal was to ensure the delivery of exemplary mission-relevant Ieaming that vield the oreatest return on investment for the DOCID 4292212 enterprise and its key partners As the Commandant she was responsible for the daily operation of the National School a nationally recognized academic institution providing tailored training and professional deveIOpment services at NSA Headquarters and throughout the enterprise PROFESSIONAL BACKGROUND Ms Bonanni became a member of the Defense Intelligencesenior Executlve Service In 1997 and was recognized with the Presidential Rank Award Meritorious Executlve in 2000 and again in 2006 She is the reclplent of the Exceptlonal Civilian Service Award highest honorary award for exceptional In June 2001 she completed the Foreign Service lnstitute's Senior Seminar a Department of State leadership program attended by top senlor executives from the federal foreign affalrs oommunlty him-P 36- 030 5 DOCID 4292212 2 9 0 86-3 DOCID 4292212 2 g 56-3 DOCID 4292212 2 #0 5 DOCID 22222 12 L I 5 L 36- 6 DOCID 4292212 a c o L 5 L 6 a 6 L 5 DOCID 4292212 2 $90 L 3 5 5 L 5 DOCID 22222 12 5 DOCID 22222 12 L 8 DOCID 4292212 2 e as 5 L 5 DOCID 22222 12 86- 3 DOCID 22222 12 L L 5 g 35 5 DOCID 22222 12 DOCID 4292212 2 090 - 5 L 36 031 5 DOCID 4292212 a o a DOCID 22222 12 6-- 5 L 5 Ex 6 -I- 86 b8
OCR of the Document
View the Document >>