Classified information in the United States
Encyclopedia
The United States government classification system is currently established under Executive Order 13526, the latest in a long series of executive orders on the topic. Issued by President
Barack Obama
in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security
information generated by the U.S. government and its employees and contractors, as well as information received from other governments.
The desired degree of secrecy about such information is known as its sensitivity
. Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret. Each level of classification indicates an increasing degree of sensitivity. Thus, if one holds a Top Secret security clearance
, one is allowed to handle information up to the level of Top Secret, including Secret and Confidential information. If one holds a Secret clearance, one may not then handle Top Secret information, but may handle Secret and Confidential classified information.
In the United States, a nation without a British-style Official Secrets Act
, the disclosure of classified information is not, in general, illegal, and Congress has repeatedly resisted or failed to pass a law that generally outlaws disclosing classified information. Instead, a 'patchwork' of different laws criminalize only certain types of classified information, and then only under certain circumstances. Most of Espionage Law only criminalizes national defense information; only a jury can decide if a given document meets that criteria, and judges have repeatedly said that being 'classified' doesn't necessarily make information become related to the 'national defense'. Furthermore, by law, information may not be classified merely because it would be embarrassing or to cover illegal activity; information may only be classified to protect national-security objectives. http://scholar.google.com/scholar_case?case=17571244799664973711&q=pentagon+papers&hl=en&as_sdt=2,9
(SBU), Sensitive Security Information
(SSI), Critical Program Information (CPI), For Official Use Only (FOUO), Limited Distribution (LIMDIS), or Law Enforcement Sensitive (LES) to refer to information that is not Confidential, Secret, or Top Secret, but whose dissemination is still restricted. Reasons for such restrictions can include export controls
, privacy
regulations, court orders, and ongoing criminal investigations, as well as national security. Information that was never classified is sometimes referred to as "open source" by those who work in classified activities. Public Safety Sensitive (PSS) refers to information that is similar to Law Enforcement Sensitive but could be shared between the various public safety disciplines (Law Enforcement, Fire, and Emergency Medical Services). Peter Louis Galison
,
a historian and Director in the Science Dept. at Harvard University, claims that the U.S. Government produces more classified information than unclassified information.
the information. For example, all US military pilots are required to obtain at least a Secret clearance, but they may only access documents directly related to their orders. Secret information might have additional access controls that could prevent someone with a Top Secret clearance from seeing it. For example, a document marked "SECRET//COMINT " (S-SI) would require that the potential reader have a clearance of Secret or higher, but also have access to COMINT, an SCI
control system..
.
raises the U.S. terror threat level are usually classified as "U//LES ", or "Unclassified - Law Enforcement Sensitive". This information is only supposed to be released to law enforcement groups (sheriff, police, etc.), but, because the information is unclassified, it is sometimes released to the public as well. Information that is unclassified but which the government does not believe should be subject to Freedom of Information Act
requests is often classified asU//FOUO —"Unclassified—For Official Use Only". In addition to FOUO information, information can be categorized according to its availability to be distributed (e.g., Distribution D may only be released to approved Department of Defense and U.S. Department of Defense contractor personnel). Also, the statement of NOFORN (meaning "no foreign national
s") is applied to any information that may not be released to any non-U.S. citizen. NOFORN and distribution statements are often used in conjunction with classified information or alone on SBU information. Documents subject to export controls have a specific warning to that effect.
Finally, information at one level of classification may be "upgraded by aggregation" to a higher level. For example, a specific technical capability of a weapon system might be classified Secret, but the aggregation of all technical capabilities of the system into a single document could be deemed top secret.
Use of information restrictions outside the classification system is growing in the U.S. government. In September 2005 J. William Leonard, director of the U.S. National Archives
Information Security Oversight Office
, was quoted in the press as saying, "No one individual in government can identify all the controlled, unclassified [categories], let alone describe their rules."
findings was that "the government keeps too many secrets. To address this problem, the Commission recommended that '[t]he culture of agencies feeling they own the information they gathered at taxpayer expense must be replaced by a culture in which the agencies instead feel they have a duty . . . to repay the taxpayers' investment by making that information available.'"
Due to over 100 designations in use by the U.S. government for unclassified information at the time, President Bush issued a Presidential memorandum on May 9, 2008, in an attempt to consolidate the various designations in use into a new category known as Controlled Unclassified Information
(CUI). The CUI categories and subcategories were hoped to serve as the exclusive designations for identifying unclassified information throughout the executive branch not covered by Executive Order 12958
or the Atomic Energy Act of 1954
(as amended) but still required safeguarding or dissemination controls, pursuant to and consistent with any applicable laws, regulations, and government-wide policies in place at the time. CUI would replace categories such as For Official Use Only
(FOUO), Sensitive But Unclassified
(SBU) and Law Enforcement Sensitive (LES).
The Presidential memorandum
also designated the National Archives
as responsible for overseeing and managing the implementation of the new CUI framework.
This memorandum has since been rescinded by Executive Order 13556 of November 4, 2010 and the guidelines previously outlined within the memo were expanded upon in a further attempt to improve the management of information across all federal agencies as well as establish a more standard, government-wide program regarding the controlled unclassification designation process itself.
The U.S. Congress has also taken steps to address this still evolving issue. The U.S. House of Representatives passed the Reducing Information Control Designations Act on March 17, 2009. The bill is now pending before the U.S. Senate.
, the U.S. had a category of classified information called Restricted, which was below confidential. The U.S. no longer has a Restricted classification, but many other nations and NATO do. The U.S. treats Restricted information it receives from other governments as Confidential. The U.S. does use the term restricted data in a completely different way to refer to nuclear secrets, as described below.
s that further restricted access to a small number of individuals and permit additional security measures (Sec. 4.3). It may be useful to understand this as physical realization of multilevel security
and role-based access control
(or vice versa). U.S. law also has special provisions for information related to cryptography
(18 USC 798) and atomic energy (see #Controls on Atomic Energy Information).
The former decision is original classification. A great majority of classified documents are created by derivative classification. For example, if one piece of information, taken from a secret document, is put into a document along with 100 pages of unclassified information, the document, as a whole, will be secret. Proper (but often ignored) rules stipulate that every paragraph will bear a classification marking of (U) for Unclassified, (C) for Confidential, (S) for Secret, and (TS) for Top Secret. Therefore, in this example, only one paragraph will have the (S) marking. If the page containing that paragraph is double-sided, the page should be marked SECRET on top and bottom of both sides.
An official authorized to do original classification, or an individual following rules in a classification guide, might legitimately, if confusingly, classify a collection of unclassified facts. Assuming that it was known that alien spaceships only appeared as blue-green-blue lights, that knowledge itself would presumably be Top Secret, with additional restrictions. If someone aware of that information then collected a set of news articles that only spoke of blue-green-blue light reports, the collection could be classified at the level of the most sensitive information, if the document were titled "Soviet Spy Sightings". That title itself would be classified, and, if the knowledge were top secret with the REDMEN codeword, there would probably be an unclassified title written (U)Project X(TS-codeword), while the actual title would be written (TS-REDMEN)Accurate Alien Sightings(TS-REDMEN), indicating the title and contents were classified at that level. Note that the unclassified reference only said TS-codeword without revealing the codeword itself, codewords themselves being classified.
A review of classification policies by the Office of the Director of National Intelligence aimed at developing a uniform classification policy and a single classification guide that could be used by the entire U.S. intelligence community found significant interagency differences that impaired cooperation and performance. The initial ODNI review, completed in January 2008, said in part, "The definitions of 'national security' and what constitutes 'intelligence' — and thus what must be classified — are unclear. ... Many interpretations exist concerning what constitutes harm or the degree of harm that might result from improper disclosure of the information, often leading to inconsistent or contradictory guidelines from different agencies. ... There appears to be no common understanding of classification levels among the classification guides reviewed by the team, nor any consistent guidance as to what constitutes 'damage,' 'serious damage,' or 'exceptionally grave damage' to national security. ... There is wide variance in application of classification levels."
The review recommended that original classification authorities should specify clearly the basis for classifying information, for example, whether the sensitivity derives from the actual content of the information, the source, the method by which it was analyzed, or the date or location of its acquisition. Current policy requires that the classifier be "able" to describe the basis for classification but not that he or she in fact do so.
1.4(a) military plans, weapons systems, or operations;
1.4(b) foreign government information;
1.4(c) intelligence activities, sources, or methods, or cryptology;
1.4(d) foreign relations or foreign activities of the United States, including confidential sources;
1.4(e) scientific, technological or economic matters relating to national security; which includes defense against transnational terrorism;
1.4(f) USG programs for safeguarding nuclear materials or facilities;
1.4(g) vulnerabilities or capabilities of systems, installations, infrastructures, projects or plans, or protection services relating to the national security, which includes defense against transnational terrorism; and
1.4(h) weapons of mass destruction.
standards generally suffice for lower levels of classification; at the highest levels, people sometimes have to work in rooms designed like bank vault
s (see Sensitive Compartmented Information Facility
- SCIF). The U.S. Congress has such facilities inside the Capitol Building
, among other Congressional handling procedures for protecting confidentiality. The U.S. General Services Administration
sets standards for locks and containers used for storage of classified material. The most ubiquitous approved security containers look like heavy-duty file cabinets with a combination lock
in the middle of one drawer. Advances in methods for defeating mechanical combination locks have led the U.S. government to switch to electro-mechanical locks that limit the rate at which combinations can be tried out. After a certain number of failed attempts, these locks will permanently lock, requiring a locksmith to reset them.
Classified U.S. government documents are typically required to be stamped with their classification on the cover and at the top and bottom of each page. It is often a requirement that each paragraph, title and caption in a document be marked with the highest level of information it contains, usually by placing appropriate initials in parentheses at the beginning of the paragraph, title, or caption. It is common to require that a brightly colored cover sheet be affixed to the cover of each classified document to prevent observation of a possibly classified title by someone unauthorized (shoulder surfing
) and to remind users to lock up the document when it is unattended. The most sensitive material requires two-person integrity
, where two cleared individuals are responsible for the material at all times. Approved containers for such material have two separate combination locks, both of which must be opened to access the contents.
There are restrictions on how classified documents can be shipped. Top Secret material must go by special courier. Secret material can be sent within the U.S. via registered mail
, and Confidential material by certified mail
. Electronic transmission of classified information largely requires the use of National Security Agency approved/certified "Type 1" encryption systems utilizing NSA's unpublished and classified Suite A algorithms. The classification of the Suite A algorithms categorizes the hardware that store them as a Controlled Cryptographic Item
(CCI). CCI equipment must be controlled and stored with elevated physical security, even when the device is not processing classified information or contain a cryptographic key. NSA is currently moving towards implementing what it's calling Suite B which is a group of commercial algorithms such as Advanced Encryption Standard (AES)
, Secure Hash Algorithm (SHA)
, Elliptic Curve Digital Signature Algorithm (ECDSA) and Elliptic curve Diffie–Hellman (ECDH). Suite B provides protection for data up to Top Secret on non-CCI devices. This is especially useful in high risk environments or operations needed to prevent Suite A compromise. These less stringent hardware requirements stem from the device not having to "protect" classified Suite A algorithms..
Specialized computer operating system
s known as trusted operating system
s are available for processing classified information. These enforce the classification and labeling rules described above in software. However, as of 2005, they are not considered secure enough to allow uncleared users to share computers with classified activities. So if one creates an unclassified document on a secret device, the resultant data is classified secret until it can be manually reviewed.
Computer networks for sharing classified information are segregated by the highest sensitivity level they are allowed to transmit, for example, SIPRNet
(Secret) and JWICS (Top Secret-SCI).
The destruction of certain types of classified documents requires burning, shredding
, pulping or pulverizing using approved procedures and must be witnessed and logged. Classified computer data presents special problems. See Data remanence
.
is an administrative process that accomplishes two main goals: it creates a formal record that the individual no longer has access to the classified information for that program; and it reminds the individual of their lifetime commitment to protect that information. Typically, the individual is asked to sign another non-disclosure agreement
(NDA), similar to that which they signed when initially briefed, and this document serves as the formal record. The debriefed individual does not lose their security clearance
; they have only surrendered the need to know for information related to that particular job.
Q clearance
. Agencies are now supposed to honor background investigations by other agencies if they are still current. Because most security clearances only apply inside the agency where the holder works, if one needs to meet with another agency to discuss classified matters, it is possible and necessary to pass one's clearance to the other agency. For example, officials visiting at the White House from other government agencies would pass their clearances to the Executive Office of the President (EOP).
The Department of Energy security clearance required to access Top Secret Restricted Data, Formerly Restricted Data, and National Security Information, as well as Secret Restricted Data, is a Q clearance
. The lower-level L clearance
is sufficient for access to Secret Formerly Restricted Data and National Security Information, as well as Confidential Restricted Data, Formerly Restricted Data, and National Security Information. In practice, access to Restricted Data is granted, on a need-to-know basis, to personnel with appropriate clearances. At one time, a person might hold both a TS and a Q clearance, but that duplication and cost is no longer required. For all practical purposes, TS=Q and S=L.
Contrary to popular lore, the Yankee White
clearance given to personnel who work directly with the President is not a classification. The Yankee White clearance includes a requirement for absolute absence of any foreign influence on the individual. Individuals having Yankee White clearances undergo extensive background investigations. The criteria include U.S. citizenship, unquestionable loyalty, and an absolute absence of any foreign influence over the individual, his family, or "persons to whom the individual is closely linked." Also, they must not have traveled (save while in government employ and at the instructions of the United States) to countries that are considered to be unfriendly to the United States. Yankee White cleared personnel are granted access to any information for which they have a need to know, regardless of which organization classified it or at what level.
See also the Single Scope Background Investigation below, along with explicit compartmented access indoctrination. Some compartments, especially intelligence-related, may require a polygraph
examination, although the reliability of the polygraph is controversial. The NSA uses the polygraph early in the clearance process while the CIA uses it at the end, which may suggest divergent opinions on the proper use of the polygraph.
s which pertain to specific projects and are used to more easily manage which individuals require certain information. Code words are not levels of classification themselves, but a person working on a project may have the code word for that project added to his file, and then will be given access to the relevant documents. Code words may also label the sources of various documents; for example, there are code words used to indicate that a document may break the cover of intelligence operatives if its content becomes known. The WWII
code word Ultra identified information found by decrypting German ciphers, such as the Enigma machine
, and which — regardless of its own significance — might inform the Germans that Enigma was broken if they became aware that it was known.
" (SCI) and "Special Access Program
" (SAP) are widely misunderstood as classification levels or specific clearances.
In fact, the terms refer to methods of handling certain types of classified information that relate to specific national-security topics or programs whose existence may not be publicly acknowledged, or the sensitive nature of which requires special handling.
The paradigms for these two categories, SCI originating in the intelligence community and SAP in the Department of Defense, addresses two key logistical issues encountered in the day-to-day control of classified information:
SAP and SCI implementation are roughly equivalent, and it is reasonable to discuss their implementation as one topic. For example, SAP material needs to be stored and used in a facility much like the SCIF described below.
Department of Energy information, especially the more sensitive SIGMA categories, may be treated as SAP or SCI.
), which are physically and logically separated not only from the unclassified world, but from general Department of Defense classified channels as well. Thus established, all information generated within the compartment is classified according to the general rules above. However, to emphasize that the information is compartmented, all documents are marked with both the classification level and the codeword (and the caveat "Handle via Channels Only.", or "Handle via Jointly" if the document contains material from multiple programs).
A person is granted access to a specific compartment after the individual has: a) had a Single Scope Background Investigation
similar to that required for a collateral Top Secret clearance; b) been "read into" or briefed on the nature and sensitivity of the compartment; and c) signed a non-disclosure agreement
(NDA).
The individual then has access to all information in the compartment, regardless of its classification (and assuming a need to know). However, access does not extend to any other compartment; i.e., there is no single "SCI clearance" analogous to DoD collateral Top Secret. The requirements for DCID 6/4 eligibility (a determination that an individual is eligible for access to SCI), subsumes the requirements for a TS collateral clearance. Being granted DCID 6/4 eligibility includes the simultaneous granting of a TS collateral clearance, as adjudicators are required to adjudicate to the highest level that the investigation (SSBI) supports.
members of Congress are briefed on certain intelligence activities, it may be assumed that similar rules apply for SCI. The groups are
Examples of SCI topics are human intelligence, communications intelligence, and intelligence collected by satellites. One or more compartments may be created for each area, and each of these compartments may contain multiple subcompartments (e.g., a specific HUMINT operation), themselves with their own code names.
Specific compartmented programs will have their own specific rules. For example, it is standard that no person is allowed unaccompanied access to a nuclear weapon or to command-and-control systems for nuclear weapons. Personnel with nuclear-weapons access are under the Personnel Reliability Program
.
Some highly sensitive SAP or SCI programs may also use the "no lone zone" method (that is, a physical location into which no one is allowed to enter unaccompanied) described for nuclear weapons.
s that can be added to a document: these are constantly changing, but can include (in abbreviated form) a requirement that the document not be shared with a civilian contractor or not leave a specific room. These restrictions are not classifications in and of themselves; rather, they restrict the dissemination of information within those who have the appropriate clearance level and possibly the need to know the information. Remarks such as "Eyes Only" also limit the restriction. One violating these directives might be guilty of violating a lawful order or mishandling classified information.
For ease of use, caveats and abbreviations have been adopted that can be included in the summary classification marking (header/footer) to enable the restrictions to be identified at a glance. They are sometimes known as Dissemination Control Abbreviations. Some of these caveats are (or were):
Classification level and caveats are typically separated by "//" in the summary classification marking. For example, the final summary marking of a document might be:
sets requirements for protection of information about nuclear weapon
s and special nuclear material
s. Such information is "classified from birth
", unlike all other sensitive information, which must be classified by some authorized individual. However, authorized classifiers still must determine whether documents or material are classified or restricted.
The U.S. Department of Energy recognizes two types of Restricted Data:
Documents containing such information must be marked "RESTRICTED DATA" (RD) or "FORMERLY RESTRICTED DATA" (FRD) in addition to any other classification marking. Restricted Data and Formerly Restricted Data are further categorized as Top Secret, Secret, or Confidential.
Critical Nuclear Weapon Design Information
(CNWDI, colloquially pronounced "Sin-Widdy") reveals the theory of operation or design of the components of a nuclear weapon. As such, it would be SIGMA 1 or SIGMA 2 material, assuming laser fusion is not involved in the information.
Access to CNWDI is supposed to be kept to the minimum number of individuals needed. In written documents, paragraphs containing the material, assuming it is Top Secret, would be marked (TS//RD-CNWDI). SIGMA information of special sensitivity may be handled much like SAP or SCI material (q.v.)
is sensitive, it may or may not be classified. The desired power densities of naval reactors make their design peculiar to military use, specifically high-displacement, high-speed vessels. The proliferation of quieter- or higher-performance marine propulsion systems presents a national-security threat to the United States. Due to this fact, all but the most basic information concerning NNPI is classified. The United States Navy
recognizes that the public has an interest in environmental, safety, and health information, and that the basic research the Navy carries out can be useful to industry.
For example, if the U.S. wanted to release classified information to the government of Canada
, it would mark the document "REL TO USA, CAN". There are also group releases, such as NATO or UKUSA. Those countries would have to maintain the classification of the document at the level originally classified (Top Secret, Secret, etc.).
:
While the classification of information by the government is not supposed to be used to prevent information from being made public that would be simply embarrassing or reveal criminal acts, it has been alleged that the government routinely misuses the classification system to cover up criminal activity and the potentially embarrassing.
Steven Aftergood
, director of the Project on Government Secrecy at the Federation of American Scientists
and an expert on classified information, notes that
In the The Pentagon Papers case, a classified study was published revealing that four administrations had misled the American public about their intentions in the Vietnam War
, increasing the credibility gap
. Russo and Ellsberg were prosecuted under Espionage Law. The case prompted Harold Edgar & Benno C. Schmidt, Jr. to write a review of Espionage law in the 1973 Columbia Law Review. Their article was entitled "The Espionage Statutes and Publication of Defense Information". In it, they point out that Espionage law does not criminalize classified information, only national defense information. They point out that Congress has repeatedly resisted or failed to make the disclosing of classified information illegal, in and of itself. Instead, Congress has strictly limited which sort of classified information is illegal, and under which specific circumstances it is illegal. i.e. in congress specifically criminalized leaking cryptographic information that is classified, but when it passed the law it specifically stated the law didn't criminalize disclosing other types of classified information. Another article that discusses the issue is by Jennifer Elsea of the Congressional Research Service.
Many conspiracy theories such as the JFK assassination theories suggest that the government has classified information as Top Secret that reveals the involvement of agencies such as the CIA
.
Various UFO
conspiracies mention a level "Above Top Secret" used for UFO design information and related data. They suggest such a classification is intended to apply to information relating to things whose possible existence is to be denied, such as aliens, as opposed to things whose potential existence may be recognized, but for which access to information regarding specific programs would be denied as classified. The British government, for example, denied for several decades that they were either involved or interested in UFO sightings. However, in 2008, the government revealed they have monitored UFO activity for at least the past 30 years. The existence of an "Above Top Secret" classification is considered by some as unnecessary to keep the existence of aliens a secret, as they say information at the Top Secret level, or any level for that matter, can be restricted on the basis of need to know
. Thus, the U.S. government could conceal an alien project without having to resort to another level of clearance, as need to know would limit the ability to have access to the information. Some suggest that claims of the existence of such a classification level may be based on the unsubstantiated belief that the levels of classification are themselves classified. As such, they feel that books claiming to contain "Above Top Secret" information on UFOs or remote viewing
should arguably be taken with a grain of salt
.
Without making a judgment on if such classifications have been used for space aliens, it is a reality that even the names of some compartments were classified, and certainly the meaning of the code names. In the cited document, an (S) means the material it precedes is Secret and (TS) means Top Secret. According to the Department of Defense directive, "the fact of" the existence of NRO
was at the secret level for many years, as well as the fact of and the actual phrase "National Reconnaissance Program" (see Paragraph II). Paragraph V(a) is largely redacted, but the introduction
to the documents clarifies (see Document 19) that it refers to the now-cancelled BYEMAN code word and control channel for NRO activities. BYEMAN, the main NRO compartment, was classified as a full word, although the special security offices could refer, in an unclassified way, to "B policy".
President of the United States
The President of the United States of America is the head of state and head of government of the United States. The president leads the executive branch of the federal government and is the commander-in-chief of the United States Armed Forces....
Barack Obama
Barack Obama
Barack Hussein Obama II is the 44th and current President of the United States. He is the first African American to hold the office. Obama previously served as a United States Senator from Illinois, from January 2005 until he resigned following his victory in the 2008 presidential election.Born in...
in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security
National security
National security is the requirement to maintain the survival of the state through the use of economic, diplomacy, power projection and political power. The concept developed mostly in the United States of America after World War II...
information generated by the U.S. government and its employees and contractors, as well as information received from other governments.
The desired degree of secrecy about such information is known as its sensitivity
Information sensitivity
Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others who might have low or unknown trustability or undesirable intentions....
. Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret. Each level of classification indicates an increasing degree of sensitivity. Thus, if one holds a Top Secret security clearance
Security clearance
A security clearance is a status granted to individuals allowing them access to classified information, i.e., state secrets, or to restricted areas after completion of a thorough background check. The term "security clearance" is also sometimes used in private organizations that have a formal...
, one is allowed to handle information up to the level of Top Secret, including Secret and Confidential information. If one holds a Secret clearance, one may not then handle Top Secret information, but may handle Secret and Confidential classified information.
In the United States, a nation without a British-style Official Secrets Act
Official Secrets Act
The Official Secrets Act is a stock short title used in the United Kingdom, Ireland, India and Malaysia and formerly in New Zealand for legislation that provides for the protection of state secrets and official information, mainly related to national security.-United Kingdom:*The Official Secrets...
, the disclosure of classified information is not, in general, illegal, and Congress has repeatedly resisted or failed to pass a law that generally outlaws disclosing classified information. Instead, a 'patchwork' of different laws criminalize only certain types of classified information, and then only under certain circumstances. Most of Espionage Law only criminalizes national defense information; only a jury can decide if a given document meets that criteria, and judges have repeatedly said that being 'classified' doesn't necessarily make information become related to the 'national defense'. Furthermore, by law, information may not be classified merely because it would be embarrassing or to cover illegal activity; information may only be classified to protect national-security objectives. http://scholar.google.com/scholar_case?case=17571244799664973711&q=pentagon+papers&hl=en&as_sdt=2,9
Classified vs. unclassified information
In the U.S., information is called "classified" if it has been assigned one of the three levels: Confidential, Secret, or Top Secret. Information that is not so labeled is called "Unclassified information". The term declassified is used for information that has had its classification removed, and downgraded refers to information that has been assigned a lower classification level but is still classified. Many documents are automatically downgraded and then declassified after some number of years. The U.S. government uses the terms Sensitive But UnclassifiedSensitive but unclassified
Sensitive But Unclassified is a designation of information in the United States federal government that, though unclassified, often requires strict controls over its distribution...
(SBU), Sensitive Security Information
Sensitive Security Information
Sensitive Security Information is a category of sensitive but unclassified information under the United States government's information sharing and control rules...
(SSI), Critical Program Information (CPI), For Official Use Only (FOUO), Limited Distribution (LIMDIS), or Law Enforcement Sensitive (LES) to refer to information that is not Confidential, Secret, or Top Secret, but whose dissemination is still restricted. Reasons for such restrictions can include export controls
Wassenaar Arrangement
The Wassenaar Arrangement is a multilateral export control regime with 40 participating states including many former COMECON countries.It is the successor to the Cold war-era Coordinating Committee for Multilateral Export Controls , and was...
, privacy
Privacy
Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively...
regulations, court orders, and ongoing criminal investigations, as well as national security. Information that was never classified is sometimes referred to as "open source" by those who work in classified activities. Public Safety Sensitive (PSS) refers to information that is similar to Law Enforcement Sensitive but could be shared between the various public safety disciplines (Law Enforcement, Fire, and Emergency Medical Services). Peter Louis Galison
Peter Galison
Peter Louis Galison is the Pellegrino University Professor in History of Science and Physics at Harvard University.Galison received his Ph.D. from Harvard University in both Physics and the History of Science in 1983. His publications include Image and Logic: A Material Culture of Microphysics ...
,
a historian and Director in the Science Dept. at Harvard University, claims that the U.S. Government produces more classified information than unclassified information.
Levels of classification used by the U.S. government
The United States government classifies information according to the degree which the unauthorized disclosure would damage national security. Having Top Secret clearance does not allow one to view all Top Secret documents. The user of the information must possess the clearance necessary for the sensitivity of the information, as well as a need to knowNeed to know
The term "need to know", when used by government and other organizations , describes the restriction of data which is considered very sensitive...
the information. For example, all US military pilots are required to obtain at least a Secret clearance, but they may only access documents directly related to their orders. Secret information might have additional access controls that could prevent someone with a Top Secret clearance from seeing it. For example, a document marked "
Sensitive Compartmented Information
Sensitive compartmented information is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence...
control system..
Top secret
This is the highest security level that if publicly disclosed, would compromise national securityNational security
National security is the requirement to maintain the survival of the state through the use of economic, diplomacy, power projection and political power. The concept developed mostly in the United States of America after World War II...
.
Secret
This is the second-highest classification. Information is classified Secret when its release would cause "serious damage" to national security. Most information that is classified is held at the secret sensitivity.Confidential
This is the lowest classification level of information obtained by the government. It is defined as information that would "damage" national security if disclosed to the public.Unclassified
Unclassified is not technically a classification; this is the default and refers to information that can be released to individuals without a clearance. Information that is unclassified is sometimes restricted in its dissemination as Sensitive But Unclassified (SBU) or For Official Use Only (FOUO). For example, the law enforcement bulletins often reported by the U.S. media when the United States Department of Homeland SecurityUnited States Department of Homeland Security
The United States Department of Homeland Security is a cabinet department of the United States federal government, created in response to the September 11 attacks, and with the primary responsibilities of protecting the territory of the United States and protectorates from and responding to...
raises the U.S. terror threat level are usually classified as "
Freedom of Information Act (United States)
The Freedom of Information Act is a federal freedom of information law that allows for the full or partial disclosure of previously unreleased information and documents controlled by the United States government. The Act defines agency records subject to disclosure, outlines mandatory disclosure...
requests is often classified as
Foreign national
Foreign national is a term used to describe a person who is not a citizen of the host country in which he or she is residing or temporarily sojourning. In Canada, a foreign national is defined as someone who is not a Canadian citizen nor a permanent resident of Canada...
s") is applied to any information that may not be released to any non-U.S. citizen. NOFORN and distribution statements are often used in conjunction with classified information or alone on SBU information. Documents subject to export controls have a specific warning to that effect.
Finally, information at one level of classification may be "upgraded by aggregation" to a higher level. For example, a specific technical capability of a weapon system might be classified Secret, but the aggregation of all technical capabilities of the system into a single document could be deemed top secret.
Use of information restrictions outside the classification system is growing in the U.S. government. In September 2005 J. William Leonard, director of the U.S. National Archives
National Archives and Records Administration
The National Archives and Records Administration is an independent agency of the United States government charged with preserving and documenting government and historical records and with increasing public access to those documents, which comprise the National Archives...
Information Security Oversight Office
Information Security Oversight Office
The Information Security Oversight Office is responsible to the President for policy and oversight of the government-wide security classification system and the National Industrial Security Program...
, was quoted in the press as saying, "No one individual in government can identify all the controlled, unclassified [categories], let alone describe their rules."
Controlled Unclassified Information (CUI)
One of the 9/11 Commission9/11 Commission
The National Commission on Terrorist Attacks Upon the United States, also known as the 9/11 Commission, was set up on November 27, 2002, "to prepare a full and complete account of the circumstances surrounding the September 11, 2001 attacks", including preparedness for and the immediate response to...
findings was that "the government keeps too many secrets. To address this problem, the Commission recommended that '[t]he culture of agencies feeling they own the information they gathered at taxpayer expense must be replaced by a culture in which the agencies instead feel they have a duty . . . to repay the taxpayers' investment by making that information available.'"
Due to over 100 designations in use by the U.S. government for unclassified information at the time, President Bush issued a Presidential memorandum on May 9, 2008, in an attempt to consolidate the various designations in use into a new category known as Controlled Unclassified Information
Controlled Unclassified Information
Controlled Unclassified Information is a new category of unclassified categories issued in a directive on May 9, 2008, by President George W. Bush...
(CUI). The CUI categories and subcategories were hoped to serve as the exclusive designations for identifying unclassified information throughout the executive branch not covered by Executive Order 12958
Executive Order 12958
Executive Order 12958 created new standards for the process of identifying and protecting classified information, and led to an unprecedented effort to declassify millions of pages from the U.S. diplomatic and national security history. In 1995, United States President William J. Clinton signed...
or the Atomic Energy Act of 1954
Atomic Energy Act of 1954
The Atomic Energy Act of 1954, 42 U.S.C. § 2011 et seq., is a United States federal law that is, according to the Nuclear Regulatory Commission, "the fundamental U.S...
(as amended) but still required safeguarding or dissemination controls, pursuant to and consistent with any applicable laws, regulations, and government-wide policies in place at the time. CUI would replace categories such as For Official Use Only
Sensitive but unclassified
Sensitive But Unclassified is a designation of information in the United States federal government that, though unclassified, often requires strict controls over its distribution...
(FOUO), Sensitive But Unclassified
Sensitive but unclassified
Sensitive But Unclassified is a designation of information in the United States federal government that, though unclassified, often requires strict controls over its distribution...
(SBU) and Law Enforcement Sensitive (LES).
The Presidential memorandum
Presidential memorandum
A presidential memorandum is a type of presidential order issued by the President of the United States to the executive branch of the United States government. Presidential memoranda do not have an established process for issuance or publication...
also designated the National Archives
National Archives and Records Administration
The National Archives and Records Administration is an independent agency of the United States government charged with preserving and documenting government and historical records and with increasing public access to those documents, which comprise the National Archives...
as responsible for overseeing and managing the implementation of the new CUI framework.
This memorandum has since been rescinded by Executive Order 13556 of November 4, 2010 and the guidelines previously outlined within the memo were expanded upon in a further attempt to improve the management of information across all federal agencies as well as establish a more standard, government-wide program regarding the controlled unclassification designation process itself.
The U.S. Congress has also taken steps to address this still evolving issue. The U.S. House of Representatives passed the Reducing Information Control Designations Act on March 17, 2009. The bill is now pending before the U.S. Senate.
Restricted
During and before World War IIWorld War II
World War II, or the Second World War , was a global conflict lasting from 1939 to 1945, involving most of the world's nations—including all of the great powers—eventually forming two opposing military alliances: the Allies and the Axis...
, the U.S. had a category of classified information called Restricted, which was below confidential. The U.S. no longer has a Restricted classification, but many other nations and NATO do. The U.S. treats Restricted information it receives from other governments as Confidential. The U.S. does use the term restricted data in a completely different way to refer to nuclear secrets, as described below.
Classified classifications
Executive Order 13526, which forms the legal basis for the U.S. classification system, states that "information may be classified at one of the following three levels", with Top Secret as the highest level (Sec. 1.2). However, this executive order provides for special access programSpecial access program
Special access programs in the Federal Government of the United States of America are security protocols that provides highly classified information with safeguards and access restrictions that exceed those for regular classified information...
s that further restricted access to a small number of individuals and permit additional security measures (Sec. 4.3). It may be useful to understand this as physical realization of multilevel security
Multilevel security
Multilevel security or Multiple Levels of Security is the application of a computer system to process information with different sensitivities , permit simultaneous access by users with different security clearances and needs-to-know, and prevent users from obtaining access to information for...
and role-based access control
Role-Based Access Control
In computer systems security, role-based access control is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can be implemented via mandatory access control or discretionary access control...
(or vice versa). U.S. law also has special provisions for information related to cryptography
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...
(18 USC 798) and atomic energy (see #Controls on Atomic Energy Information).
Proper procedure for classifying U.S. government documents
To be properly classified, a classification authority (an individual charged by the U.S. government with the right and responsibility to properly determine the level of classification and the reason for classification) must determine the appropriate classification level, as well as the reason information is to be classified. A determination must be made as to how and when the document will be declassified, and the document marked accordingly. Executive Order 13526 describes the reasons and requirements for information to be classified and declassified (Part 1). Individual agencies within the government develop guidelines for what information is classified and at what level.The former decision is original classification. A great majority of classified documents are created by derivative classification. For example, if one piece of information, taken from a secret document, is put into a document along with 100 pages of unclassified information, the document, as a whole, will be secret. Proper (but often ignored) rules stipulate that every paragraph will bear a classification marking of (U) for Unclassified, (C) for Confidential, (S) for Secret, and (TS) for Top Secret. Therefore, in this example, only one paragraph will have the (S) marking. If the page containing that paragraph is double-sided, the page should be marked SECRET on top and bottom of both sides.
An official authorized to do original classification, or an individual following rules in a classification guide, might legitimately, if confusingly, classify a collection of unclassified facts. Assuming that it was known that alien spaceships only appeared as blue-green-blue lights, that knowledge itself would presumably be Top Secret, with additional restrictions. If someone aware of that information then collected a set of news articles that only spoke of blue-green-blue light reports, the collection could be classified at the level of the most sensitive information, if the document were titled "Soviet Spy Sightings". That title itself would be classified, and, if the knowledge were top secret with the REDMEN codeword, there would probably be an unclassified title written (U)Project X(TS-codeword), while the actual title would be written (TS-REDMEN)Accurate Alien Sightings(TS-REDMEN), indicating the title and contents were classified at that level. Note that the unclassified reference only said TS-codeword without revealing the codeword itself, codewords themselves being classified.
A review of classification policies by the Office of the Director of National Intelligence aimed at developing a uniform classification policy and a single classification guide that could be used by the entire U.S. intelligence community found significant interagency differences that impaired cooperation and performance. The initial ODNI review, completed in January 2008, said in part, "The definitions of 'national security' and what constitutes 'intelligence' — and thus what must be classified — are unclear. ... Many interpretations exist concerning what constitutes harm or the degree of harm that might result from improper disclosure of the information, often leading to inconsistent or contradictory guidelines from different agencies. ... There appears to be no common understanding of classification levels among the classification guides reviewed by the team, nor any consistent guidance as to what constitutes 'damage,' 'serious damage,' or 'exceptionally grave damage' to national security. ... There is wide variance in application of classification levels."
The review recommended that original classification authorities should specify clearly the basis for classifying information, for example, whether the sensitivity derives from the actual content of the information, the source, the method by which it was analyzed, or the date or location of its acquisition. Current policy requires that the classifier be "able" to describe the basis for classification but not that he or she in fact do so.
Classification categories
Step 3 in the classification process is to assign a reason for the classification. Classification categories are marked by the number "1.4" followed by one or more letters (a) to (h):1.4(a) military plans, weapons systems, or operations;
1.4(b) foreign government information;
1.4(c) intelligence activities, sources, or methods, or cryptology;
1.4(d) foreign relations or foreign activities of the United States, including confidential sources;
1.4(e) scientific, technological or economic matters relating to national security; which includes defense against transnational terrorism;
1.4(f) USG programs for safeguarding nuclear materials or facilities;
1.4(g) vulnerabilities or capabilities of systems, installations, infrastructures, projects or plans, or protection services relating to the national security, which includes defense against transnational terrorism; and
1.4(h) weapons of mass destruction.
Protecting classified information
Facilities and handling
One of the reasons for classifying state secrets into sensitivity levels is to allow the level of protection to be tailored to risk. The U.S. government specifies in some detail the procedures for protecting classified information. The rooms or buildings where classified material is stored or handled must have a facility clearance at the same level as the most sensitive material to be handled. Good quality commercial physical securityPhysical security
Physical security describes measures that are designed to deny access to unauthorized personnel from physically accessing a building, facility, resource, or stored information; and guidance on how to design structures to resist potentially hostile acts...
standards generally suffice for lower levels of classification; at the highest levels, people sometimes have to work in rooms designed like bank vault
Bank vault
A bank vault is a secure space where money, valuables, records, and documents can be stored. It is intended to protect their contents from theft, unauthorized use, fire, natural disasters, and other threats, just like a safe...
s (see Sensitive Compartmented Information Facility
Sensitive Compartmented Information Facility
In United States security and intelligence parlance, a Sensitive Compartmented Information Facility is an enclosed area within a building that is used to process Sensitive Compartmented Information level classified information...
- SCIF). The U.S. Congress has such facilities inside the Capitol Building
United States Capitol
The United States Capitol is the meeting place of the United States Congress, the legislature of the federal government of the United States. Located in Washington, D.C., it sits atop Capitol Hill at the eastern end of the National Mall...
, among other Congressional handling procedures for protecting confidentiality. The U.S. General Services Administration
General Services Administration
The General Services Administration is an independent agency of the United States government, established in 1949 to help manage and support the basic functioning of federal agencies. The GSA supplies products and communications for U.S...
sets standards for locks and containers used for storage of classified material. The most ubiquitous approved security containers look like heavy-duty file cabinets with a combination lock
Combination lock
A combination lock is a type of lock in which a sequence of numbers or symbols is used to open the lock. The sequence may be entered using a single rotating dial which interacts with several discs or cams, by using a set of several rotating discs with inscribed numerals which directly interact with...
in the middle of one drawer. Advances in methods for defeating mechanical combination locks have led the U.S. government to switch to electro-mechanical locks that limit the rate at which combinations can be tried out. After a certain number of failed attempts, these locks will permanently lock, requiring a locksmith to reset them.
Classified U.S. government documents are typically required to be stamped with their classification on the cover and at the top and bottom of each page. It is often a requirement that each paragraph, title and caption in a document be marked with the highest level of information it contains, usually by placing appropriate initials in parentheses at the beginning of the paragraph, title, or caption. It is common to require that a brightly colored cover sheet be affixed to the cover of each classified document to prevent observation of a possibly classified title by someone unauthorized (shoulder surfing
Shoulder surfing (computer security)
In computer security, shoulder surfing refers to using direct observation techniques, such as looking over someone's shoulder, to get information...
) and to remind users to lock up the document when it is unattended. The most sensitive material requires two-person integrity
Two-man rule
The two-man rule is a control mechanism designed to achieve a high level of security for especially critical material or operations. Under this rule all access and actions requires the presence of two authorized people at all times.-Nuclear weapons:...
, where two cleared individuals are responsible for the material at all times. Approved containers for such material have two separate combination locks, both of which must be opened to access the contents.
There are restrictions on how classified documents can be shipped. Top Secret material must go by special courier. Secret material can be sent within the U.S. via registered mail
Registered mail
Registered mail describes letters, packets or other postal documents considered valuable and need a chain of custody that provides more control than regular mail. The posted item has its details recorded in a register to enable its location to be tracked, sometimes with added insurance to cover loss...
, and Confidential material by certified mail
Certified Mail
Certified Mail is a type of Special Service mail offered by the United States Postal Service and other postal services that allows the sender proof of mailing, as well as proof of delivery. Certified Mail also provides the sender with a copy of the recipient's signature, which is obtained at the...
. Electronic transmission of classified information largely requires the use of National Security Agency approved/certified "Type 1" encryption systems utilizing NSA's unpublished and classified Suite A algorithms. The classification of the Suite A algorithms categorizes the hardware that store them as a Controlled Cryptographic Item
Controlled Cryptographic Item
A Controlled Cryptographic Item is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical COMSEC function. Items so designated may be unclassified but are subject to...
(CCI). CCI equipment must be controlled and stored with elevated physical security, even when the device is not processing classified information or contain a cryptographic key. NSA is currently moving towards implementing what it's calling Suite B which is a group of commercial algorithms such as Advanced Encryption Standard (AES)
Advanced Encryption Standard
Advanced Encryption Standard is a specification for the encryption of electronic data. It has been adopted by the U.S. government and is now used worldwide. It supersedes DES...
, Secure Hash Algorithm (SHA)
Secure Hash Algorithm
The Secure Hash Algorithm is one of a number of cryptographic hash functions published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard :...
, Elliptic Curve Digital Signature Algorithm (ECDSA) and Elliptic curve Diffie–Hellman (ECDH). Suite B provides protection for data up to Top Secret on non-CCI devices. This is especially useful in high risk environments or operations needed to prevent Suite A compromise. These less stringent hardware requirements stem from the device not having to "protect" classified Suite A algorithms..
Specialized computer operating system
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...
s known as trusted operating system
Trusted operating system
Trusted Operating System generally refers to an operating system that provides sufficient support for multilevel security and evidence of correctness to meet a particular set of government requirements....
s are available for processing classified information. These enforce the classification and labeling rules described above in software. However, as of 2005, they are not considered secure enough to allow uncleared users to share computers with classified activities. So if one creates an unclassified document on a secret device, the resultant data is classified secret until it can be manually reviewed.
Computer networks for sharing classified information are segregated by the highest sensitivity level they are allowed to transmit, for example, SIPRNet
SIPRNet
The Secret Internet Protocol Router Network is "a system of interconnected computer networks used by the United States Department of Defense and the U.S. Department of State to transmit classified information by packet switching over the TCP/IP protocols in a 'completely secure' environment"...
(Secret) and JWICS (Top Secret-SCI).
The destruction of certain types of classified documents requires burning, shredding
Paper shredder
A paper shredder is a mechanical device used to cut paper into chad, typically either strips or fine particles. Government organizations, businesses, and private individuals use shredders to destroy private, confidential, or otherwise sensitive documents...
, pulping or pulverizing using approved procedures and must be witnessed and logged. Classified computer data presents special problems. See Data remanence
Data remanence
Data remanence is the residual representation of data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that does not remove data previously written...
.
Lifetime commitment
When a cleared individual leaves the job or employer for which they were granted access to classified information, they are formally debriefed from the program. DebriefingDebriefing
-Military debriefing:Debriefings originated in the military. This type of debriefing is used to receive information from a pilot or soldier after a mission, and to instruct the individual as to what information can be released to the public and what information is restricted...
is an administrative process that accomplishes two main goals: it creates a formal record that the individual no longer has access to the classified information for that program; and it reminds the individual of their lifetime commitment to protect that information. Typically, the individual is asked to sign another non-disclosure agreement
Non-disclosure agreement
A non-disclosure agreement , also known as a confidentiality agreement , confidential disclosure agreement , proprietary information agreement , or secrecy agreement, is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties...
(NDA), similar to that which they signed when initially briefed, and this document serves as the formal record. The debriefed individual does not lose their security clearance
Security clearance
A security clearance is a status granted to individuals allowing them access to classified information, i.e., state secrets, or to restricted areas after completion of a thorough background check. The term "security clearance" is also sometimes used in private organizations that have a formal...
; they have only surrendered the need to know for information related to that particular job.
Classifications and clearances between U.S. government agencies
In the past, clearances did not necessarily transfer between various U.S. government agencies. For example, an individual cleared for Department of Defense Top Secret had to undergo another investigation before being granted a Department of EnergyUnited States Department of Energy
The United States Department of Energy is a Cabinet-level department of the United States government concerned with the United States' policies regarding energy and safety in handling nuclear material...
Q clearance
Q clearance
Q clearance is a United States Department of Energy security clearance equivalent to a United States Department of Defense Top Secret clearance and Critical Nuclear Weapon Design Information . DOE clearances apply for access specifically relating to atomic or nuclear related materials...
. Agencies are now supposed to honor background investigations by other agencies if they are still current. Because most security clearances only apply inside the agency where the holder works, if one needs to meet with another agency to discuss classified matters, it is possible and necessary to pass one's clearance to the other agency. For example, officials visiting at the White House from other government agencies would pass their clearances to the Executive Office of the President (EOP).
The Department of Energy security clearance required to access Top Secret Restricted Data, Formerly Restricted Data, and National Security Information, as well as Secret Restricted Data, is a Q clearance
Q clearance
Q clearance is a United States Department of Energy security clearance equivalent to a United States Department of Defense Top Secret clearance and Critical Nuclear Weapon Design Information . DOE clearances apply for access specifically relating to atomic or nuclear related materials...
. The lower-level L clearance
L clearance
An L clearance is a security clearance used by the United States Department of Energy and Nuclear Regulatory Commission for civilian access relating to nuclear materials and information under the Atomic Energy Act of 1954. It is equivalent to a United States Department of Defense Secret...
is sufficient for access to Secret Formerly Restricted Data and National Security Information, as well as Confidential Restricted Data, Formerly Restricted Data, and National Security Information. In practice, access to Restricted Data is granted, on a need-to-know basis, to personnel with appropriate clearances. At one time, a person might hold both a TS and a Q clearance, but that duplication and cost is no longer required. For all practical purposes, TS=Q and S=L.
Contrary to popular lore, the Yankee White
Yankee White
Yankee White is an administrative nickname for a background check given in the United States for Department of Defense personnel and contractor employees working with the President and Vice President. Obtaining such clearance requires, in part, a Single Scope Background Investigation which is...
clearance given to personnel who work directly with the President is not a classification. The Yankee White clearance includes a requirement for absolute absence of any foreign influence on the individual. Individuals having Yankee White clearances undergo extensive background investigations. The criteria include U.S. citizenship, unquestionable loyalty, and an absolute absence of any foreign influence over the individual, his family, or "persons to whom the individual is closely linked." Also, they must not have traveled (save while in government employ and at the instructions of the United States) to countries that are considered to be unfriendly to the United States. Yankee White cleared personnel are granted access to any information for which they have a need to know, regardless of which organization classified it or at what level.
See also the Single Scope Background Investigation below, along with explicit compartmented access indoctrination. Some compartments, especially intelligence-related, may require a polygraph
Polygraph
A polygraph measures and records several physiological indices such as blood pressure, pulse, respiration, and skin conductivity while the subject is asked and answers a series of questions...
examination, although the reliability of the polygraph is controversial. The NSA uses the polygraph early in the clearance process while the CIA uses it at the end, which may suggest divergent opinions on the proper use of the polygraph.
Categories that are not classifications
There are also compartments, using code wordCode name
A code name or cryptonym is a word or name used clandestinely to refer to another name or word. Code names are often used for military purposes, or in espionage...
s which pertain to specific projects and are used to more easily manage which individuals require certain information. Code words are not levels of classification themselves, but a person working on a project may have the code word for that project added to his file, and then will be given access to the relevant documents. Code words may also label the sources of various documents; for example, there are code words used to indicate that a document may break the cover of intelligence operatives if its content becomes known. The WWII
World War II
World War II, or the Second World War , was a global conflict lasting from 1939 to 1945, involving most of the world's nations—including all of the great powers—eventually forming two opposing military alliances: the Allies and the Axis...
code word Ultra identified information found by decrypting German ciphers, such as the Enigma machine
Enigma machine
An Enigma machine is any of a family of related electro-mechanical rotor cipher machines used for the encryption and decryption of secret messages. Enigma was invented by German engineer Arthur Scherbius at the end of World War I...
, and which — regardless of its own significance — might inform the Germans that Enigma was broken if they became aware that it was known.
Sensitive Compartmented Information (SCI) and Special Access Programs (SAP)
The terms "Sensitive Compartmented InformationSensitive Compartmented Information
Sensitive compartmented information is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence...
" (SCI) and "Special Access Program
Special access program
Special access programs in the Federal Government of the United States of America are security protocols that provides highly classified information with safeguards and access restrictions that exceed those for regular classified information...
" (SAP) are widely misunderstood as classification levels or specific clearances.
In fact, the terms refer to methods of handling certain types of classified information that relate to specific national-security topics or programs whose existence may not be publicly acknowledged, or the sensitive nature of which requires special handling.
The paradigms for these two categories, SCI originating in the intelligence community and SAP in the Department of Defense, addresses two key logistical issues encountered in the day-to-day control of classified information:
- Individuals with a legitimate need to know may not be able to function effectively without knowing certain Top Secret facts about their work. However, granting all such individuals a blanket DoD clearance (often known as a "collateral" clearance) at the Top Secret level would be undesirable, not to mention prohibitively expensive.
- The government may wish to limit certain types of sensitive information only to those who work directly on related programs, regardless of the collateral clearance they hold. Thus, even someone with a collateral DoD Top Secret clearance cannot gain access unless it is specifically granted.
SAP and SCI implementation are roughly equivalent, and it is reasonable to discuss their implementation as one topic. For example, SAP material needs to be stored and used in a facility much like the SCIF described below.
Department of Energy information, especially the more sensitive SIGMA categories, may be treated as SAP or SCI.
Access to compartmented information
Personnel who require knowledge of SCI or SAP information fall into two general categories. There are individuals with need to know and individuals with actual access. Access to classified information is not authorized by a favorable conclusion of a clearance eligibility status. Access is only permitted to individuals after determining the individual has a need to know. Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties. To achieve selective separation of program information while still allowing full access to those working on the program, a separate compartment, identified by a unique codeword, is created for the information. This entails establishing communication channels, data storage, and work locations (SCIF — Sensitive Compartmented Information FacilitySensitive Compartmented Information Facility
In United States security and intelligence parlance, a Sensitive Compartmented Information Facility is an enclosed area within a building that is used to process Sensitive Compartmented Information level classified information...
), which are physically and logically separated not only from the unclassified world, but from general Department of Defense classified channels as well. Thus established, all information generated within the compartment is classified according to the general rules above. However, to emphasize that the information is compartmented, all documents are marked with both the classification level and the codeword (and the caveat "Handle via
A person is granted access to a specific compartment after the individual has: a) had a Single Scope Background Investigation
Single Scope Background Investigation
A Single Scope Background Investigation is a type of United States security clearance investigation required for Top Secret, SCI and Q access, and involves agents contacting employers, coworkers and other individuals...
similar to that required for a collateral Top Secret clearance; b) been "read into" or briefed on the nature and sensitivity of the compartment; and c) signed a non-disclosure agreement
Non-disclosure agreement
A non-disclosure agreement , also known as a confidentiality agreement , confidential disclosure agreement , proprietary information agreement , or secrecy agreement, is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties...
(NDA).
The individual then has access to all information in the compartment, regardless of its classification (and assuming a need to know). However, access does not extend to any other compartment; i.e., there is no single "SCI clearance" analogous to DoD collateral Top Secret. The requirements for DCID 6/4 eligibility (a determination that an individual is eligible for access to SCI), subsumes the requirements for a TS collateral clearance. Being granted DCID 6/4 eligibility includes the simultaneous granting of a TS collateral clearance, as adjudicators are required to adjudicate to the highest level that the investigation (SSBI) supports.
Groups of compartmented information
SAPs are subdivided into three further groups. There is no public reference to whether SCI is divided in the same manner, but news reports reflecting that only the Gang of EightGang of Eight
The Gang of Eight is a common colloquial term for a set of eight leaders within the United States Congress. Specifically, the Gang of Eight includes the leaders of each of the two parties from both the Senate and House of Representatives, and the chairs and ranking minority members of both the...
members of Congress are briefed on certain intelligence activities, it may be assumed that similar rules apply for SCI. The groups are
- Acknowledged: appears as a line item as "classified project" or the equivalent in the US budget, although details of its content are not revealed. The budget element will associate the SAP with an organization or major command, such as the Navy or Strategic Command.
- Unacknowledged: no reference in the published budget; its funding is hidden in another entry, often called the "black budget". The appropriate Congressional committees, however, are briefed on the nature of the SAP and approve it.
- Waived: no mention in the budget and briefed only to the "Big 8" members of Congress: Speaker of the House, House Minority Leader, Senate Majority and Minority Leaders, and the Chairman and Ranking Minority Members of the appropriate committees.
Examples of SCI topics are human intelligence, communications intelligence, and intelligence collected by satellites. One or more compartments may be created for each area, and each of these compartments may contain multiple subcompartments (e.g., a specific HUMINT operation), themselves with their own code names.
Specific compartmented programs will have their own specific rules. For example, it is standard that no person is allowed unaccompanied access to a nuclear weapon or to command-and-control systems for nuclear weapons. Personnel with nuclear-weapons access are under the Personnel Reliability Program
Personnel Reliability Program
Personnel Reliability Program is a United States Department of Defense psychological evaluation program, designed to permit only the most trustworthy individuals to have access to nuclear weapons, chemcial weapons, biological weapons....
.
Some highly sensitive SAP or SCI programs may also use the "no lone zone" method (that is, a physical location into which no one is allowed to enter unaccompanied) described for nuclear weapons.
Handling caveats
The United States also has a system of restrictive caveatCaveat
Caveat , the third-person singular present subjunctive of the Latin cavere, means "warning" ; it can be shorthand for Latin phrases such as:...
s that can be added to a document: these are constantly changing, but can include (in abbreviated form) a requirement that the document not be shared with a civilian contractor or not leave a specific room. These restrictions are not classifications in and of themselves; rather, they restrict the dissemination of information within those who have the appropriate clearance level and possibly the need to know the information. Remarks such as "Eyes Only" also limit the restriction. One violating these directives might be guilty of violating a lawful order or mishandling classified information.
For ease of use, caveats and abbreviations have been adopted that can be included in the summary classification marking (header/footer) to enable the restrictions to be identified at a glance. They are sometimes known as Dissemination Control Abbreviations. Some of these caveats are (or were):
- NOFORN — Distribution to non-US citizens is prohibited, regardless of their clearance or access permissions (NO FOReigN access allowed).
- RESTRICTED — Distribution to non-US citizens or those holding an interim clearance is prohibited; certain other special handling procedures apply.
- NOCONTRACTOR — Distribution to contractor personnel (non-US-government employees) is prohibited, regardless of their clearance or access permissions.
- REL
— Distribution to citizens of the countries listed is permitted, providing they have appropriate accesses and need to know. Example: "REL TO USA, AUS, GBR, CAN, NZ" indicates that the information may be shared with appropriate personnel from Australia, the United Kingdom, Canada, and New Zealand. X — Information is exempt from automatic declassification (after the statutory default of 25 years) for exemption reason , and declassification review shall not be permitted for years (as determined by law or the Interagency Security Classification Appeals Panel). For the most part, the exemption reasoning and caveats are outlined in paragraphs (b)–(d) and (g)–(i) of Sec. 3.3 of Executive Order 13526, but paragraph (b) is typically the one being referenced as the exemption reason value .
-
- Example: "50X1" indicates the information must remain classified for 50 years, since it pertains to intelligence activities, sources, or methods (reason (1) of Section 3.3, paragraph (b)).
- ORCON — Originator controls dissemination and/or release of the document.
- PROPIN - Caution - Proprietary Information Involved
- NFIBONLY - National Foreign Intelligence Board Departments Only
- Example: "50X1" indicates the information must remain classified for 50 years, since it pertains to intelligence activities, sources, or methods (reason (1) of Section 3.3, paragraph (b)).
Classification level and caveats are typically separated by "//" in the summary classification marking. For example, the final summary marking of a document might be:
SECRET////ORCON//NOFORN
Controls on atomic-energy information
The Atomic Energy Act of 1954Atomic Energy Act of 1954
The Atomic Energy Act of 1954, 42 U.S.C. § 2011 et seq., is a United States federal law that is, according to the Nuclear Regulatory Commission, "the fundamental U.S...
sets requirements for protection of information about nuclear weapon
Nuclear weapon
A nuclear weapon is an explosive device that derives its destructive force from nuclear reactions, either fission or a combination of fission and fusion. Both reactions release vast quantities of energy from relatively small amounts of matter. The first fission bomb test released the same amount...
s and special nuclear material
Special nuclear material
Special nuclear material is a term used by the Nuclear Regulatory Commission of the United States to classify fissile materials. The NRC divides special nuclear material into three main categories, according to the risk and potential for its direct use in a clandestine nuclear weapon or for its...
s. Such information is "classified from birth
Born secret
"Born secret" and "born classified" are both terms which refer to a policy of information being classified from the moment of its inception, usually regardless of where it was being created, usually in reference to specific laws in the United States that are related to information that describes...
", unlike all other sensitive information, which must be classified by some authorized individual. However, authorized classifiers still must determine whether documents or material are classified or restricted.
The U.S. Department of Energy recognizes two types of Restricted Data:
- Restricted Data. Data concerning the design, manufacture, or utilization of atomic weapons; production of special nuclear material; or use of special nuclear material in the production of energy.
- Formerly Restricted Data. Classified information jointly determined by the DOE and the Department of Defense to be related primarily to the military utilization of atomic weapons and removed from the Restricted Data category.
Documents containing such information must be marked "RESTRICTED DATA" (RD) or "FORMERLY RESTRICTED DATA" (FRD) in addition to any other classification marking. Restricted Data and Formerly Restricted Data are further categorized as Top Secret, Secret, or Confidential.
SIGMA categories and Critical Nuclear Weapon Design Information
RESTRICTED DATA contains further compartments. The Department of Energy establishes a list of SIGMA Categories for more fine-grained control than RESTRICTED DATA.Critical Nuclear Weapon Design Information
Critical Nuclear Weapon Design Information
Critical Nuclear Weapon Design Information is a U.S. Department of Defense category of Top Secret Restricted Data or Secret Restricted Data that reveals the theory of operation or design of the components of a thermonuclear or fission bomb, warhead, demolition munition, or test device...
(CNWDI, colloquially pronounced "Sin-Widdy") reveals the theory of operation or design of the components of a nuclear weapon. As such, it would be SIGMA 1 or SIGMA 2 material, assuming laser fusion is not involved in the information.
Access to CNWDI is supposed to be kept to the minimum number of individuals needed. In written documents, paragraphs containing the material, assuming it is Top Secret, would be marked (TS//RD-CNWDI). SIGMA information of special sensitivity may be handled much like SAP or SCI material (q.v.)
Naval Nuclear Propulsion Information
While most Naval Nuclear Propulsion InformationNaval Nuclear Propulsion Information
Naval Nuclear Propulsion Information is a category of intellectual capital defined by the United States Navy to be "that information and/or hardware concerning the design, arrangement, development, manufacturing, testing, operation, administration, training, maintenance, and repair of the...
is sensitive, it may or may not be classified. The desired power densities of naval reactors make their design peculiar to military use, specifically high-displacement, high-speed vessels. The proliferation of quieter- or higher-performance marine propulsion systems presents a national-security threat to the United States. Due to this fact, all but the most basic information concerning NNPI is classified. The United States Navy
United States Navy
The United States Navy is the naval warfare service branch of the United States Armed Forces and one of the seven uniformed services of the United States. The U.S. Navy is the largest in the world; its battle fleet tonnage is greater than that of the next 13 largest navies combined. The U.S...
recognizes that the public has an interest in environmental, safety, and health information, and that the basic research the Navy carries out can be useful to industry.
Sharing of classified information with other countries
In cases where the United States wishes to share classified information bilaterally (or multilaterally) with a country that has a sharing agreement, the information is marked with "REL TO USA," (release) and the three-letter country code.For example, if the U.S. wanted to release classified information to the government of Canada
Canada
Canada is a North American country consisting of ten provinces and three territories. Located in the northern part of the continent, it extends from the Atlantic Ocean in the east to the Pacific Ocean in the west, and northward into the Arctic Ocean...
, it would mark the document "REL TO USA, CAN". There are also group releases, such as NATO or UKUSA. Those countries would have to maintain the classification of the document at the level originally classified (Top Secret, Secret, etc.).
Claims of U.S. government misuse of the classification system
Max WeberMax Weber
Karl Emil Maximilian "Max" Weber was a German sociologist and political economist who profoundly influenced social theory, social research, and the discipline of sociology itself...
:
Every bureaucracy strives to increase the superiority of its position by keeping its knowledge and intentions secret. Bureaucratic administration always seeks to evade the light of the public as best it can, because in so doing it shields its knowledge and conduct from criticism...
While the classification of information by the government is not supposed to be used to prevent information from being made public that would be simply embarrassing or reveal criminal acts, it has been alleged that the government routinely misuses the classification system to cover up criminal activity and the potentially embarrassing.
Steven Aftergood
Steven Aftergood
Steven Aftergood is a critic of U.S. government secrecy policy. He directs the Federation of American Scientists Project on Government Secrecy and is the author of the Federation newsletter Secrecy News. In 1991, Aftergood exposed the highly classifed Timber Wind program, an unacknowledged...
, director of the Project on Government Secrecy at the Federation of American Scientists
Federation of American Scientists
The Federation of American Scientists is a nonpartisan, 501 organization intent on using science and scientific analysis to attempt make the world more secure. FAS was founded in 1945 by scientists who worked on the Manhattan Project to develop the first atomic bombs...
and an expert on classified information, notes that
... inquiring into classified government information and disclosing it is something that many national security reporters and policy analysts do, or try to do, every day. And with a few narrow exceptions — for particularly sensitive types of information — courts have determined that this is not a crime." Aftergood notes, "The universe of classified information includes not only genuine national security secrets, such as confidential intelligence sources or advanced military technologies, but an endless supply of mundane bureaucratic trivia, such as 50-year-old intelligence budget figures, as well as the occasional crime or cover-up.
In the The Pentagon Papers case, a classified study was published revealing that four administrations had misled the American public about their intentions in the Vietnam War
Vietnam War
The Vietnam War was a Cold War-era military conflict that occurred in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. This war followed the First Indochina War and was fought between North Vietnam, supported by its communist allies, and the government of...
, increasing the credibility gap
Credibility gap
Credibility gap is a political term that came into wide use during the 1960s and 1970s. At the time, it was most frequently used to describe public skepticism about the Lyndon B. Johnson administration's statements and policies on the Vietnam War...
. Russo and Ellsberg were prosecuted under Espionage Law. The case prompted Harold Edgar & Benno C. Schmidt, Jr. to write a review of Espionage law in the 1973 Columbia Law Review. Their article was entitled "The Espionage Statutes and Publication of Defense Information". In it, they point out that Espionage law does not criminalize classified information, only national defense information. They point out that Congress has repeatedly resisted or failed to make the disclosing of classified information illegal, in and of itself. Instead, Congress has strictly limited which sort of classified information is illegal, and under which specific circumstances it is illegal. i.e. in congress specifically criminalized leaking cryptographic information that is classified, but when it passed the law it specifically stated the law didn't criminalize disclosing other types of classified information. Another article that discusses the issue is by Jennifer Elsea of the Congressional Research Service.
Many conspiracy theories such as the JFK assassination theories suggest that the government has classified information as Top Secret that reveals the involvement of agencies such as the CIA
Central Intelligence Agency
The Central Intelligence Agency is a civilian intelligence agency of the United States government. It is an executive agency and reports directly to the Director of National Intelligence, responsible for providing national security intelligence assessment to senior United States policymakers...
.
Various UFO
Unidentified flying object
A term originally coined by the military, an unidentified flying object is an unusual apparent anomaly in the sky that is not readily identifiable to the observer as any known object...
conspiracies mention a level "Above Top Secret" used for UFO design information and related data. They suggest such a classification is intended to apply to information relating to things whose possible existence is to be denied, such as aliens, as opposed to things whose potential existence may be recognized, but for which access to information regarding specific programs would be denied as classified. The British government, for example, denied for several decades that they were either involved or interested in UFO sightings. However, in 2008, the government revealed they have monitored UFO activity for at least the past 30 years. The existence of an "Above Top Secret" classification is considered by some as unnecessary to keep the existence of aliens a secret, as they say information at the Top Secret level, or any level for that matter, can be restricted on the basis of need to know
Need to know
The term "need to know", when used by government and other organizations , describes the restriction of data which is considered very sensitive...
. Thus, the U.S. government could conceal an alien project without having to resort to another level of clearance, as need to know would limit the ability to have access to the information. Some suggest that claims of the existence of such a classification level may be based on the unsubstantiated belief that the levels of classification are themselves classified. As such, they feel that books claiming to contain "Above Top Secret" information on UFOs or remote viewing
Remote viewing
Remote viewing is the practice of seeking impressions about a distant or unseen target using paranormal means, in particular, extra-sensory perception or "sensing with mind"...
should arguably be taken with a grain of salt
Grain of salt
a grain of salt, in modern English, is an idiom which means to view something with skepticism, or to not take it literally. It derives from the Latin phrase, grano salis....
.
Without making a judgment on if such classifications have been used for space aliens, it is a reality that even the names of some compartments were classified, and certainly the meaning of the code names. In the cited document, an (S) means the material it precedes is Secret and (TS) means Top Secret. According to the Department of Defense directive, "the fact of" the existence of NRO
National Reconnaissance Office
The National Reconnaissance Office , located in Chantilly, Virginia, is one of the 16 U.S. intelligence agencies. It designs, builds, and operates the spy satellites of the United States government.-Mission:...
was at the secret level for many years, as well as the fact of and the actual phrase "National Reconnaissance Program" (see Paragraph II). Paragraph V(a) is largely redacted, but the introduction
to the documents clarifies (see Document 19) that it refers to the now-cancelled BYEMAN code word and control channel for NRO activities. BYEMAN, the main NRO compartment, was classified as a full word, although the special security offices could refer, in an unclassified way, to "B policy".
See also
- Controlled Cryptographic ItemControlled Cryptographic ItemA Controlled Cryptographic Item is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical COMSEC function. Items so designated may be unclassified but are subject to...
- Copyright status of work by the U.S. government
- Espionage Act of 1917Espionage Act of 1917The Espionage Act of 1917 is a United States federal law passed on June 15, 1917, shortly after the U.S. entry into World War I. It has been amended numerous times over the years. It was originally found in Title 50 of the U.S. Code but is now found under Title 18, Crime...
- FAA 1600.2FAA 1600.2FAA 1600.2 is a United States government standard entitled Safeguarding Controls and Procedures for Classified National Security Information and Sensitive Unclassified Information. It was introduced for use by the Federal Aviation Administration ....
- Invention Secrecy ActInvention Secrecy ActThe Invention Secrecy Act of 1951, codified at , is a body of United States federal law designed to prevent disclosure of new inventions and technologies that, in the opinion of selected federal agencies, present a possible threat to the national security of the United States.The U.S...
- List of U.S. security clearance terms
- McCollum memoMcCollum memoThe McCollum memo, also known as the Eight Action Memo was a memorandum, dated October 7, 1940 The McCollum memo, also known as the Eight Action Memo was a memorandum, dated October 7, 1940 The McCollum memo, also known as the Eight Action Memo was a memorandum, dated October 7, 1940 (more than a...
- Secrecy News, a newsletter that covers U.S. classification policy
- United States v. ReynoldsUnited States v. ReynoldsUnited States v. Reynolds, , is a landmark legal case in 1953 that saw the formal recognition of State Secrets Privilege, a judicially recognized extension of presidential power.- Overview :...
- United States diplomatic cables leakUnited States diplomatic cables leakThe United States diplomatic cables leak, widely known as Cablegate, began in February 2010 when WikiLeaks—a non-profit organization that publishes submissions from anonymous whistleblowers—began releasing classified cables that had been sent to the U.S. State Department by 274 of its consulates,...