To go back to 2010 and the analysis we did, we looked at our requirements. We looked at the type of technology that would be required for us to be agile enough to deal with future threats. The analysis led us to a set of requirements.
On May 3rd, 2012. See this statement in context.