Jump to content

Classified information in the United States: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Monkbot (talk | contribs)
m Task 16: replaced (8×) / removed (0×) deprecated |dead-url= and |deadurl= with |url-status=;
 
(176 intermediate revisions by more than 100 users not shown)
Line 1: Line 1:
{{Short description|U.S. government classification system}}
{{For|information on practices in other countries|Classified information}}
{{For|information on practices in other countries|Classified information}}
{{more footnotes|date=March 2013}}
{{use mdy dates|date=January 2021}}
{{use mdy dates|date=June 2017}}


The '''United States government classification system''' is established under [[s:Executive Order 13526|Executive Order 13526]], the latest in a long series of [[Executive order (United States)|executive orders]] on the topic.<ref>{{cite web |url=https://www.archives.gov/isoo/policy-documents/ |title=Executive Order 13526 - Classified National Security Information |publisher=[[Information Security Oversight Office]] of [[National Archives and Records Administration|The National Archives]] |accessdate=2010-01-05}}</ref> Issued by [[President of the United States|President]] [[Barack Obama]] in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of [[national security]] information generated by the U.S. government and its employees and contractors, as well as information received from other governments.<ref>{{cite web |url=https://www.archives.gov/federal-register/executive-orders/2009-obama.html#13526 |title=Executive Order 13526 of December 29, 2009, ''Classified National Security Information'' |publisher=[[National Archives and Records Administration|The National Archives]] |accessdate=2010-01-05}}</ref>
The '''United States government classification system''' is established under [[s:Executive Order 13526|Executive Order 13526]], the latest in a long series of [[Executive order (United States)|executive orders]] on the topic of classified information beginning in 1951.<ref>{{cite web |url=https://www.archives.gov/isoo/policy-documents/ |title=Executive Order 13526 Classified National Security Information |publisher=[[Information Security Oversight Office]] of [[National Archives and Records Administration|The National Archives]] |access-date=2010-01-05 |archive-date=July 19, 2017 |archive-url=https://web.archive.org/web/20170719183452/https://www.archives.gov/isoo/policy-documents |url-status=live }}</ref> Issued by President [[Barack Obama]] in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of [[Classified information|classification]], [[declassification]], and handling of [[national security]] information generated by the U.S. government and its employees and contractors, as well as information received from other governments.<ref>{{cite web |url=https://www.archives.gov/federal-register/executive-orders/2009-obama.html#13526 |title=Executive Order 13526 of December 29, 2009, ''Classified National Security Information'' |publisher=[[National Archives and Records Administration|The National Archives]] |access-date=2010-01-05 |archive-date=September 28, 2012 |archive-url=https://web.archive.org/web/20120928075528/http://www.archives.gov/federal-register/executive-orders/2009-obama.html#13526 |url-status=live }}</ref>


The desired degree of secrecy about such information is known as its [[Information sensitivity|sensitivity]]. Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret. Each level of classification indicates an increasing degree of sensitivity. Thus, if one holds a Top Secret [[security clearance]], one is allowed to handle information up to the level of Top Secret, including Secret and Confidential information. If one holds a Secret clearance, one may not then handle Top Secret information, but may handle Secret and Confidential classified information.
The desired degree of secrecy about such information is known as its [[Information sensitivity|sensitivity]]. Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret. Each level of classification indicates an increasing degree of sensitivity. Thus, if one holds a Top Secret [[security clearance]], one is allowed to handle information up to the level of Top Secret, including Secret and Confidential information. If one holds a Secret clearance, one may not then handle Top Secret information, but may handle Secret and Confidential classified information.


The United States does not have a British-style [[Official Secrets Act]]; instead, several laws protect classified information, including the [[Espionage Act of 1917]], the [[Atomic Energy Act of 1954]] and the [[Intelligence Identities Protection Act]] of 1982.
The United States does not have a British-style [[Official Secrets Act]]. Instead, several laws protect classified information, including the [[Espionage Act of 1917]], the [[Invention Secrecy Act]] of 1951, the [[Atomic Energy Act of 1954]] and the [[Intelligence Identities Protection Act]] of 1982.
A 2013 report to Congress noted that the relevant laws have been mostly used to prosecute foreign agents, or those passing classified information to them, and that leaks to the press have rarely been prosecuted.<ref name=elsea/> The legislative and executive branches of government, including US presidents, have frequently leaked classified information to journalists.<ref>Stansfield Turner, ''Burn Before Reading'', 2006</ref>{{page needed|date=June 2017}}<ref>The Deadly Bet, Walter LaFaber</ref><ref>Seeds of Terror, Gretchen Peters</ref><ref>[http://stephenkim.org/2011/09/03/classified-information-in-woodwards-obamas-wars/ Classified Information in "Obama's Wars"], September 29, 2010, Jack Goldsmith, Lawfare, via stephenkim.org</ref> Congress has repeatedly resisted or failed to pass a law that generally outlaws disclosing classified information. Most espionage law only criminalizes national defense information; only a jury can decide if a given document meets that criterion, and judges have repeatedly said that being "classified" does not necessarily make information become related to the "national defense".<ref name=edgsch/><ref>[https://fas.org/sgp/jud/aipac/franklin061109.html Judge T.S. Ellis III], reduction of Franklin sentence hearing, 2009</ref> Furthermore, by law, information may not be classified merely because it would be embarrassing or to cover illegal activity; information may only be classified to protect national security objectives.<ref>{{cite web|url=https://scholar.google.com/scholar_case?case=17571244799664973711&q=pentagon+papers&as_sdt=2,9 |title=Google Scholar |publisher=Scholar.google.com |accessdate=2013-07-04}}</ref>
A 2013 report to Congress noted that the relevant laws have been mostly used to prosecute foreign agents, or those passing classified information to them, and that leaks to the press have rarely been prosecuted.<ref name=elsea/> The legislative and executive branches of government, including US presidents, have frequently leaked classified information to journalists.<ref>{{cite book |first=Stansfield |last=Turner |title=Burn Before Reading |date=2005 |publisher=Hachette Books |isbn=9781401383466}}</ref>{{page needed|date=June 2017}}<ref>{{cite book |title=The Deadly Bet: LBJ, Vietnam, and the 1968 Election |first=Walter |last=LaFaber |date=2005 |publisher=Rowman & Littlefield Publishers |isbn=9780742543928}}</ref><ref>{{cite book |title=Seeds of Terror: How Heroin Is Bankrolling the Taliban and Al Qaeda |first=Gretchen |last=Peters |date=2009 |publisher=St. Martin's Press |isbn=9780312379278}}</ref><ref>[http://stephenkim.org/2011/09/03/classified-information-in-woodwards-obamas-wars/ Classified Information in "Obama's Wars"] {{Webarchive|url=https://web.archive.org/web/20180628153030/http://stephenkim.org/2011/09/03/classified-information-in-woodwards-obamas-wars/ |date=June 28, 2018 }}, September 29, 2010, Jack Goldsmith, Lawfare, via stephenkim.org</ref> Congress has repeatedly resisted or failed to pass a law that generally outlaws disclosing classified information. Most espionage law criminalizes only national defense information; only a jury can decide if a given document meets that criterion, and judges have repeatedly said that being "classified" does not necessarily make information become related to the "national defense".<ref name=edgsch/><ref>[https://fas.org/sgp/jud/aipac/franklin061109.html Judge T.S. Ellis III] {{Webarchive|url=https://web.archive.org/web/20170519091748/https://fas.org/sgp/jud/aipac/franklin061109.html |date=May 19, 2017 }}, reduction of Franklin sentence hearing, 2009</ref> Furthermore, by law, information may not be classified merely because it would be embarrassing or to cover illegal activity; information may be classified only to protect national security objectives.<ref>{{cite web |url=https://scholar.google.com/scholar_case?case=17571244799664973711&q=pentagon+papers&as_sdt=2,9 |title=Google Scholar |access-date=2013-07-04 |archive-date=April 2, 2019 |archive-url=https://web.archive.org/web/20190402145547/https://scholar.google.com/scholar_case?case=17571244799664973711 |url-status=live }}</ref>


The United States over the past decades under the [[Barack Obama|Obama]] and [[Bill Clinton|Clinton]] administrations has released classified information to foreign governments for diplomatic goodwill, known as declassification diplomacy. Examples include information on [[Augusto Pinochet]] to the government of [[Chile]]. In October 2015, US Secretary of State [[John Kerry]] provided [[Michelle Bachelet]], Chile's president, with a [[USB flash drive|pen drive]] containing hundreds of newly declassified documents.<ref>{{Cite news|url=https://www.economist.com/news/americas/21707587-united-states-tries-win-friends-revealing-past-misdeeds-sunlight-diplomacy|title=Sunlight diplomacy|date=2016-09-24|newspaper=The Economist|issn=0013-0613|accessdate=2016-09-30}}</ref>
The United States over the past decades under the [[Barack Obama|Obama]] and [[Bill Clinton|Clinton]] administrations has released classified information to foreign governments for diplomatic goodwill, known as declassification diplomacy. Examples include information on [[Augusto Pinochet]] to the government of [[Chile]]. In October 2015, US Secretary of State [[John Kerry]] provided [[Michelle Bachelet]], Chile's president, with a [[USB flash drive|pen drive]] containing hundreds of newly declassified documents.<ref>{{Cite news |url=https://www.economist.com/the-americas/2016/09/24/sunlight-diplomacy |title=Sunlight diplomacy |date=2016-09-24 |newspaper=The Economist |issn=0013-0613 |access-date=2016-09-30 |archive-date=June 3, 2017 |archive-url=https://web.archive.org/web/20170603150341/http://www.economist.com/news/americas/21707587-united-states-tries-win-friends-revealing-past-misdeeds-sunlight-diplomacy |url-status=live }}</ref>

A 2007 research report by Harvard history professor [[Peter Galison]], published by the [[Federation of American Scientists]], claimed that the classified universe in the US "is certainly not smaller and very probably is much larger than this unclassified one. ... [And] secrecy ... is a threat to democracy.<ref><!-- Peter Galison (2004) Removing knowledge-->{{cite Q|Q116287295}}</ref>


==Terminology==
==Terminology==
[[File:Information Security Oversight Office (ISOO) 2011 Annual Report to the President.pdf|thumb|page=12|Derivative classification activity 1996–2011]]
[[File:Information Security Oversight Office (ISOO) 2011 Annual Report to the President.pdf|thumb|page=12|Derivative classification activity 1996–2011]]
In the U.S., information is called "classified" if it has been assigned one of the three levels: Confidential, Secret, or Top Secret. Information that is not so labeled is called "Unclassified information". The term ''declassified'' is used for information that has had its classification removed, and ''downgraded'' refers to information that has been assigned a lower classification level but is still classified. Many documents are automatically downgraded and then declassified after some number of years.{{citation needed|date=August 2011}} The U.S. government uses the terms ''[[Sensitive but unclassified|Sensitive But Unclassified]]'' (SBU), ''[[Sensitive Security Information]]'' (SSI), ''Critical Program Information'' (CPI), ''For Official Use Only'' (FOUO), or ''Law Enforcement Sensitive'' (LES) to refer to information that is not Confidential, Secret, or Top Secret, but whose dissemination is still restricted. Reasons for such restrictions can include [[Wassenaar Arrangement|export controls]], [[privacy]] regulations, court orders, and ongoing criminal investigations, as well as national security. Information that was never classified is sometimes referred to as "open source" by those who work in classified activities. ''Public Safety Sensitive'' (PSS) refers to information that is similar to Law Enforcement Sensitive but could be shared between the various public safety disciplines (Law Enforcement, Fire, and Emergency Medical Services). [[Peter Galison|Peter Louis Galison]], a historian and Director<ref>{{cite web |url=http://www.fas.harvard.edu/~hsdept/bios/galison.html |title=People – The Department of the History of Science, Harvard University |publisher=Fas.harvard.edu |date=2003-06-24 |accessdate=2013-07-04 |url-status=dead |archiveurl=https://web.archive.org/web/20130701170714/http://www.fas.harvard.edu/~hsdept/bios/galison.html |archivedate=July 1, 2013 |df=mdy-all }}</ref> in the History of Science Dept. at Harvard University, claims that the U.S. Government produces more classified information than unclassified information.<ref>[http://www.fas.harvard.edu/~hsdept/bios/docs/Removing%20Knowledge.pdf Department of the History of Science, Harvard University<!-- Bot generated title -->] {{webarchive|url=https://web.archive.org/web/20140719214912/http://www.fas.harvard.edu/~hsdept/bios/docs/Removing%20Knowledge.pdf |date=July 19, 2014 }}</ref>
The U.S. government uses the term [[Controlled Unclassified Information]] to refer to information that is not Confidential, Secret, or Top Secret, but whose dissemination is still restricted.<ref name="Wayback Machine">[http://www.fas.harvard.edu/~hsdept/bios/docs/Removing%20Knowledge.pdf Department of the History of Science, Harvard University<!-- Bot generated title -->] {{webarchive |url=https://web.archive.org/web/20140719214912/http://www.fas.harvard.edu/~hsdept/bios/docs/Removing%20Knowledge.pdf |date=July 19, 2014 }}</ref>


Reasons for such restrictions can include [[Wassenaar Arrangement|export controls]], [[privacy]] regulations, court orders, and ongoing criminal investigations, as well as national security. Information that was never classified is sometimes referred to as "[[open source]]" by those who work in classified activities. ''Public Safety Sensitive'' (PSS) refers to information that is similar to Law Enforcement Sensitive but could be shared between the various public safety disciplines (Law Enforcement, Fire, and Emergency Medical Services).
==Levels of classification used by the U.S. government==
The United States government classifies information according to the degree which the unauthorized disclosure would damage national security. Having Top Secret clearance does not allow one to view all Top Secret documents. The user of the information must possess the clearance necessary for the sensitivity of the information, as well as a [[need to know|legitimate need]] to obtain the information. For example, all US military pilots are required to obtain at least a Secret clearance, but they may only access documents directly related to their orders. Secret information might have additional access controls that could prevent someone with a Top Secret clearance from seeing it.{{citation needed lead|date=October 2014}}


[[Peter Galison|Peter Louis Galison]], a historian and Director<ref>{{cite web |url=http://www.fas.harvard.edu/~hsdept/bios/galison.html |title=People – The Department of the History of Science, Harvard University |publisher=Fas.harvard.edu |date=2003-06-24 |access-date=2013-07-04 |url-status=dead |archive-url=https://web.archive.org/web/20130701170714/http://www.fas.harvard.edu/~hsdept/bios/galison.html |archive-date=July 1, 2013 |df=mdy-all}}</ref> in the [[History of Science]] department at Harvard University, claims that the U.S. Government produces more classified information than unclassified information.<ref name="Wayback Machine" />
Since all federal departments are part of the Executive Branch, the classification system is governed by Executive Order rather than by law. Typically each president will issue a new executive order, either tightening classification or loosening it. The Clinton administration made a major change in the classification system by issuing an executive order that for the first time required all classified documents to be declassified after 25 years unless they were reviewed by the agency that created the information and determined to require continuing classification.<ref>EXECUTIVE ORDER 12958 https://fas.org/sgp/clinton/eo12958.html</ref>


==Levels and categories of classification==
===Restricted Data/Formerly Restricted Data===
The United States government classifies sensitive information according to the degree which the unauthorized disclosure would damage national security. The three primary levels of classification (from least to greatest) are Confidential, Secret, and Top Secret.<ref name="I.C.Senate">{{cite web |title=Legal Resources {{!}} Intelligence Committee |url=https://www.intelligence.senate.gov/laws/national-security-information |website=U.S. Senate Select Committee on Intelligence |publisher=U.S. Senate |access-date=October 17, 2021 |archive-date=October 17, 2021 |archive-url=https://web.archive.org/web/20211017232212/https://www.intelligence.senate.gov/laws/national-security-information |url-status=live }}</ref><ref name="state.gov">{{cite web |title=Security Clearances |url=https://www.state.gov/security-clearances |website=United States Department of State |access-date=October 17, 2021 |archive-date=October 17, 2021 |archive-url=https://web.archive.org/web/20211017230659/https://www.state.gov/security-clearances |url-status=live }}</ref><ref name=sgp.fas>{{cite web |title=Security Classification of Information, volume 2 (Quist), Chapter Seven |url=https://sgp.fas.org/library/quist2/chap_7.html |website=Project on Government Secrecy |publisher=Federation of American Scientists. |access-date=October 17, 2021 |archive-date=September 17, 2021 |archive-url=https://web.archive.org/web/20210917030628/https://sgp.fas.org/library/quist2/chap_7.html |url-status=live }}</ref><ref name="TTS">{{cite web |title=Top Secret / Sensitive Compartmented Information (TS/SCI) Clearance {{!}} TTS Handbook |url=https://handbook.tts.gsa.gov/general-information-and-resources/business-and-ops-policies/top-secret/ |website=handbook.tts.gsa.gov |access-date=October 17, 2021 |archive-date=August 14, 2022 |archive-url=https://web.archive.org/web/20220814063841/https://handbook.tts.gsa.gov/general-information-and-resources/business-and-ops-policies/top-secret/ |url-status=live }}</ref>


However, even Top Secret clearance does not allow one to access all information at, or below, Top Secret level. Access requires the clearance necessary for the sensitivity of the information, as well as a [[need to know|legitimate need]] to obtain the information.<ref>{{cite web |title=How to Receive and Maintain Your Security Clearance |url=https://www.dami.army.pentagon.mil/site/persec/docs/How%20to%20Receive%20and%20Maintain%20Your%20Security%20Clearance.pdf |website=dami.army.pentagon.mil |publisher=Defense Security Service |access-date=October 17, 2021 |archive-date=October 17, 2021 |archive-url=https://web.archive.org/web/20211017230702/https://www.dami.army.pentagon.mil/site/persec/docs/How%20to%20Receive%20and%20Maintain%20Your%20Security%20Clearance.pdf |url-status=live }}</ref> For example, all US military pilots are required to obtain at least a Secret clearance, but they may only access documents directly related to their orders.
Restricted Data and Formerly Restricted Data are classification markings that concern nuclear information. These are the only two classifications that are established by federal law, being defined by the Atomic Energy Act of 1954. Nuclear information is not automatically declassified after 25 years. Documents with nuclear information covered under the Atomic Energy Act will be marked with a classification level (confidential, secret or top secret) and a restricted data or formerly restricted data marking. Nuclear information as specified in the act may inadvertently appear in unclassified documents and must be reclassified when discovered. Even documents created by private individuals have been seized for containing nuclear information and classified. Only the Department of Energy may declassify nuclear information.<ref>CLASSIFICATION OF NUCLEAR WEAPONS-RELATED INFORMATION, http://energy.gov/sites/prod/files/hss/Classification/docs/CTI-Training-RD-FRD-Briefing.pdf</ref>


To ensure that only those with a legitimate [[need to know]] can access information, classified information may have additional categorizations/markings and access controls that could prevent even someone with a sufficient level of clearance from seeing it. Examples of this include: [[Special Access Program]] (SAP), [[Sensitive Compartmented Information]] (SCI), [[Restricted Data]] (RD), and Alternative or Compensatory Control Measures (ACCM).<ref name="Wayback Machine2">{{cite web |title=DCMA Manual 3301-08: Information Security |url=https://www.dcma.mil/Portals/31/Documents/Policy/DCMA-MAN-3301-08.pdf |website=Defense Contract Management Agency |publisher=Department of Defense |access-date=October 17, 2021 |archive-date=October 17, 2021 |archive-url=https://web.archive.org/web/20211017101313/https://www.dcma.mil/Portals/31/Documents/Policy/DCMA-MAN-3301-08.pdf |url-status=live }}</ref><ref>{{cite web |title=Department of Defense Manual |url=https://www.dodig.mil/Portals/48/Documents/Policy/520001_vol3.pdf |date=2013 |access-date=October 17, 2021 |archive-date=October 15, 2021 |archive-url=https://web.archive.org/web/20211015195812/https://www.dodig.mil/Portals/48/Documents/Policy/520001_vol3.pdf |url-status=live }}</ref><ref name="NOAA">*{{cite web |title=Handling Classified Information |url=https://www.wrc.noaa.gov/wrso/security_guide/handling.htm |website=www.wrc.noaa.gov |access-date=October 17, 2021 |archive-date=May 27, 2010 |archive-url=https://web.archive.org/web/20100527222356/https://www.wrc.noaa.gov/wrso/security_guide/handling.htm |url-status=live }}
===Code Word classifications===
* {{cite web |title=Classification & Distribution Controls |url=https://www.wrc.noaa.gov/wrso/security_guide/classif.htm |website=www.wrc.noaa.gov |access-date=October 17, 2021 |archive-date=May 27, 2010 |archive-url=https://web.archive.org/web/20100527222225/https://www.wrc.noaa.gov/wrso/security_guide/classif.htm |url-status=live }}</ref><ref>{{cite web |title=PART 117 – National Industrial Security Program Operating Manual |url=https://www.ecfr.gov/current/title-32/subtitle-A/chapter-I/subchapter-D/part-117 |access-date=October 17, 2021 |archive-date=August 14, 2022 |archive-url=https://web.archive.org/web/20220814063947/https://www.ecfr.gov/current/title-32/subtitle-A/chapter-I/subchapter-D/part-117 |url-status=live }}</ref><ref name="Cornell">*{{cite web |title=32 CFR § 117.23 – Supplement to this rule: Security Requirements for Alternative Compensatory Control Measures (ACCM), Special Access Programs (SAPs), Sensitive Compartmented Information (SCI), Restricted Data (RD), Formerly Restricted Data (FRD), Transclassified Foreign Nuclear Information (TFNI), and Naval Nuclear Propulsion Information (NNPI). |url=https://www.law.cornell.edu/cfr/text/32/117.23 |website=LII / Legal Information Institute |publisher=Cornell University |access-date=October 17, 2021 |archive-date=August 14, 2022 |archive-url=https://web.archive.org/web/20220814063837/https://www.law.cornell.edu/cfr/text/32/117.23 |url-status=live }}
Top Secret is the highest level of classification. However some information is compartmentalized by adding a code word so that only those who have been cleared for each code word can see it. This information is also known as "[[Sensitive Compartmented Information]]" (SCI). A document marked SECRET (CODE WORD) could only be viewed by a person with a secret or top secret clearance and that specific code word clearance. Each code word deals with a different kind of information. The CIA administers code word clearances.<ref>
* {{cite web |title=32 CFR § 117.3 – Acronyms and Definitions. |url=https://www.law.cornell.edu/cfr/text/32/117.3 |website=LII / Legal Information Institute |publisher=Cornell University |access-date=October 17, 2021 |archive-date=October 17, 2021 |archive-url=https://web.archive.org/web/20211017101306/https://www.law.cornell.edu/cfr/text/32/117.3 |url-status=live }}</ref><ref>{{cite web |title=Glossary of Security Clearance Terms |url=https://www.military.com/veteran-jobs/security-clearance-jobs/glossary-of-security-clearance-terms.html |website=Military.com |date=13 March 2019 |access-date=October 17, 2021 |archive-date=October 17, 2021 |archive-url=https://web.archive.org/web/20211017230700/https://www.military.com/veteran-jobs/security-clearance-jobs/glossary-of-security-clearance-terms.html |url-status=live }}</ref>
IRoss Anderson. "Security Engineering: A Guide to Building Dependable Distributed Systems, First Edition, Chapter 8.2: Compartmentation, the Chinese Wall, and the BMA Model" www.cl.cam.ac.uk/~rja14/Papers/SE-08.pdf</ref>


The classification system is governed by Executive Order rather than by law. An exception is information on nuclear weapons, materials and power, where levels of protection are specified in the [[Atomic Energy Act of 1954]], ''see [[restricted data]].'' Typically each president will issue a new executive order, either tightening classification or loosening it. The Clinton administration made a major change in the classification system by issuing an executive order that for the first time required all classified documents to be declassified after 25 years unless they were reviewed by the agency that created the information and determined to require continuing classification.<ref>{{cite web |title=Executive Order 12958 on Classified National Security Information |url=https://fas.org/sgp/clinton/eo12958.html |website=sgp.fas.org |access-date=May 14, 2016 |archive-date=July 5, 2021 |archive-url=https://web.archive.org/web/20210705125915/https://fas.org/sgp/clinton/eo12958.html |url-status=live }}</ref> [[Executive Order 13292]], issued by President George W. Bush in 2003 relaxed some declassification requirements.
===Top Secret===
[[Image:NSALibertyReport.p13.jpg|thumb|300px|An example of a U.S. classified document; page 13 of a [[United States]] [[National Security Agency]] report<ref>William D. Gerhard and Henry W. Millington, [http://www.nsa.gov/liberty/liber00010.pdf "Attack on a Sigint Collector, the U.S.S. Liberty"] {{Webarchive|url=https://web.archive.org/web/20040313000704/http://www.nsa.gov/liberty/liber00010.pdf |date=March 13, 2004 }}, 1981</ref> on the [[USS Liberty incident|USS ''Liberty'' incident]], partially [[Declassification|declassified]] and released to the public in July 2003. The original overall classification of the page, "Top Secret" [[code word]] UMBRA, is shown at top and bottom. The classification of individual paragraphs and reference titles is shown in parentheses—there are six different levels on this page alone. Notations with leader lines at top and bottom cite statutory authority for not declassifying certain sections.]]


===Primary levels===
The highest security classification. "Top Secret shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause "exceptionally grave damage" to the [[national security]] that the original classification authority is able to identify or describe."<ref name="13526_1.2">Part 1, Sec. 1.2, {{cite web|url=http://www.gpo.gov/fdsys/granule/FR-2010-01-05/E9-31418/content-detail.html|title=Executive Order 13526 of December 29, 2009, "Classified National Security Information" |publisher=Federal Register - U.S. National Archives and Records Administration, Vol. 75, No. 2, p. 707.|date=January 5, 2010 |url-status=live |archive-url=https://web.archive.org/web/20190404041122/https://www.govinfo.gov/content/pkg/FR-2010-01-05/pdf/E9-31418.pdf |archive-date=2019-04-04}}</ref> It is believed that 1.4 million Americans have top secret clearances.<ref>{{cite news|url=https://www.economist.com/news/leaders/21579455-governments-first-job-protect-its-citizens-should-be-based-informed-consent |title=Surveillance: Secrets, lies and America's spies |work=Economist |date=2013-06-15 |accessdate=2013-07-04}}</ref>
====Confidential====
{{for|"C" and "(C)" designations|Joint Electronics Type Designation System#Parenthetical C}}
This is the lowest classification level of information obtained by the government. It is defined as information that would "damage" national security if publicly disclosed, again, without the proper authorization.<ref name="13526_1.2" />


Examples include information related to military strength and weapons.<ref name="FAS.SGP.Intro">{{cite web |title=An Introduction to the Security and Classification System |url=https://sgp.fas.org/classdod.htm |publisher=Federation of American Scientists |access-date=October 17, 2021 |archive-date=October 17, 2021 |archive-url=https://web.archive.org/web/20211017230701/https://sgp.fas.org/classdod.htm |url-status=live }}</ref>
===Secret===<!-- This section is linked from [[Operation Northwoods]] -->
This is the second-highest classification. Information is classified Secret when its unauthorized disclosure would cause "serious damage" to national security.<ref name="13526_1.2" /> Most information that is classified is held at the secret sensitivity.


During and before World War II, the U.S. had a category of classified information called Restricted, which was below confidential. The U.S. no longer has a Restricted classification, but many other countries and [[NATO]] documents do. The U.S. treats Restricted information it receives from other governments as Confidential. The U.S. does use the term ''restricted data'' in a completely different way to refer to [[nuclear secret]]s, as described below.
===Confidential===
This is the lowest classification level of information obtained by the government. It is defined as information that would "damage" national security if publicly disclosed, again, without the proper authorization.<ref name="13526_1.2" />


===Public Trust===
====Secret====
<!-- This section is linked from [[Operation Northwoods]] -->
Despite common misconception, a public trust position is not a security clearance, and is not the same as the confidential clearance. Certain positions which require access to sensitive information, but not information which is classified, must obtain this designation through a background check. Public Trust Positions can either be moderate-risk or high-risk.<ref name=USDA>{{cite web|title=National Security Positions vs. Public Trust Positions|url=http://www.dm.usda.gov/ohsec/pdsd/securityVStrust.htm}}</ref><ref>{{cite web|title=FEDERAL SECURITY/SUITABILITY CLEARANCE CHART|url=http://fedcas.com/wp-content/uploads/2012/05/Federal-Suitability-Security-Clearance-Chart.pdf}}</ref>
{{see also|L clearance}}
This is the second-highest classification. Information is classified Secret when its unauthorized disclosure would cause "serious damage" to national security.<ref name="13526_1.2" /> Most information that is classified is held at the secret sensitivity.<ref name=SGP7>{{cite web |title=Security Classification of Information, volume 2 (Quist), Chapter Seven |url=https://sgp.fas.org/library/quist2/chap_7.html |website=sgp.fas.org |access-date=October 17, 2021 |archive-date=September 17, 2021 |archive-url=https://web.archive.org/web/20210917030628/https://sgp.fas.org/library/quist2/chap_7.html |url-status=live }}</ref><ref>{{cite web |title=What's the Difference Between "Top Secret" and "Confidential"? |url=https://slate.com/news-and-politics/2000/07/what-s-the-difference-between-top-secret-and-confidential.html |website=Slate Magazine |date=6 July 2000 |access-date=October 17, 2021 |archive-date=October 17, 2021 |archive-url=https://web.archive.org/web/20211017230700/https://slate.com/news-and-politics/2000/07/what-s-the-difference-between-top-secret-and-confidential.html |url-status=live }}</ref>

"Examples of serious damage include disruption of foreign relations significantly affecting the national security; significant impairment of a program or policy directly related to the national security; revelation of significant military plans or intelligence operations: compromise of significant military plans or intelligence operations; and compromise of significant scientific or technological developments relating to national security."<ref name="FAS.SGP.Intro"/>

====Top Secret====
[[Image:NSALibertyReport.p13.jpg|thumb|300px|An example of a U.S. classified document; page 13 of a United States [[National Security Agency]] report<ref>William D. Gerhard and Henry W. Millington, [http://www.nsa.gov/liberty/liber00010.pdf "Attack on a Sigint Collector, the U.S.S. Liberty"] {{Webarchive |url=https://web.archive.org/web/20040313000704/http://www.nsa.gov/liberty/liber00010.pdf |date=March 13, 2004 }}, 1981</ref> on the [[USS Liberty incident|USS ''Liberty'' incident]], partially [[Declassification|declassified]] and released to the public in July 2003. The original overall classification of the page, "Top Secret" [[Code word (communication)|code word]] UMBRA, is shown at top and bottom. The classification of individual paragraphs and reference titles is shown in parentheses—there are six different levels on this page alone. Notations with leader lines at top and bottom cite statutory authority for not declassifying certain sections.]]

The highest security classification. "Top Secret shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause 'exceptionally grave damage' to the [[National Security]] that the original classification authority is able to identify or describe."<ref name="13526_1.2">Part 1, Sec. 1.2, {{cite web |url=http://www.gpo.gov/fdsys/granule/FR-2010-01-05/E9-31418/content-detail.html |title=Executive Order 13526 of December 29, 2009, "Classified National Security Information" |publisher=Federal Register – U.S. National Archives and Records Administration, Vol. 75, No. 2, p. 707. |date=January 5, 2010 |url-status=live |archive-url=https://web.archive.org/web/20190404041122/https://www.govinfo.gov/content/pkg/FR-2010-01-05/pdf/E9-31418.pdf |archive-date=2019-04-04}}</ref> As of 2019, around 1.25 million individuals have Top Secret clearance.<ref>{{cite web |title=Fiscal Year 2019 Annual Report on Security Clearance Determinations |url=https://sgp.fas.org/othergov/intel/clear-2019.pdf |publisher=Office of the Director of National Intelligence (ODNI) National Counterintelligence and Security Center (NCSC) |access-date=October 17, 2021 |archive-date=August 14, 2022 |archive-url=https://web.archive.org/web/20220814063839/https://sgp.fas.org/othergov/intel/clear-2019.pdf |url-status=live }}</ref>

"Examples of exceptionally grave damage include armed hostilities against the United States or its allies; disruption of foreign relations vitally affecting the national security; the compromise of vital national defense plans or complex cryptology and communications intelligence systems; the revelation of sensitive intelligence operations, and the disclosure of scientific or technological developments vital to national security."<ref name="FAS.SGP.Intro"/>

===Additional proscribed categories===
Top Secret is the highest level of classification. However some information is further categorized/marked by adding a code word so that only those who have been cleared for each code word can see it. A document marked SECRET (CODE WORD) could be viewed only by a person with a secret or top secret clearance and that specific code word clearance.

====Special Access Program====
{{main|Special Access Program}}
Executive Order 13526, which forms the legal basis for the U.S. classification system, states that "information may be classified at one of the following three levels", with Top Secret as the highest level ([[s:Executive Order 13526#Sec. 1.2|Sec. 1.2]]). However, this executive order provides for [[special access program]]s that further restricted access to a small number of individuals and permit additional security measures ([[s:Executive Order 13526#:~:text=4.3|Sec. 4.3]]).
These practices can be compared with (and may have inspired) the concepts [[multilevel security]] and [[role-based access control]]. U.S. law also has special provisions protecting information related to [[cryptography]] ([https://www.law.cornell.edu/uscode/18/798.html 18 USC 798]), nuclear weapons and atomic energy (''see'' [[#Controls on atomic-energy information|Controls on atomic-energy information]]) and the identity of covert intelligence agents (''see'' [[Intelligence Identities Protection Act]]).

====Sensitive Compartmented Information====
{{main|Sensitive Compartmented Information}}
Classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems established by the [[Director of National Intelligence]].<ref>{{cite web |title=NSA/CSS POLICY MANUAL 1-52: NSA/CSS CLASSIFICATION |url=https://www.nsa.gov/portals/75/documents/news-features/declassified-documents/nsa-css-policies/NSACSS_PM_1-52_20210108.pdf?ver=hR6hDA-pL-fWx8cf72-OCg%3D%3D |website=NSA |access-date=October 17, 2021 |archive-date=October 17, 2021 |archive-url=https://web.archive.org/web/20211017230701/https://www.nsa.gov/portals/75/documents/news-features/declassified-documents/nsa-css-policies/NSACSS_PM_1-52_20210108.pdf?ver=hR6hDA-pL-fWx8cf72-OCg%3D%3D |url-status=live }}</ref><ref>{{cite web |title=Sensitive Compartmented Information (SCI) – Glossary {{!}} CSRC |url=https://csrc.nist.gov/glossary/term/sensitive_compartmented_information |website=Computer Security Resource Center (CSRC) |publisher=National Institute of Standards and Technology (NIST) |access-date=October 17, 2021 |archive-date=October 17, 2021 |archive-url=https://web.archive.org/web/20211017230705/https://csrc.nist.gov/glossary/term/sensitive_compartmented_information |url-status=live }}</ref><ref>{{cite web |title=Controlled Access Programs |url=https://www.dni.gov/files/documents/ICD/ICD906.pdf |publisher=Director of National Intelligence |access-date=October 17, 2021 |archive-date=October 17, 2021 |archive-url=https://web.archive.org/web/20211017230701/https://www.dni.gov/files/documents/ICD/ICD906.pdf |url-status=live }}</ref><ref name="Wayback Machine2" />

====Restricted Data/Formerly Restricted Data====
{{main|Restricted Data}} {{see also|Q clearance|L clearance}}

Restricted Data (RD) and Formerly Restricted Data (FRD) are classification markings that concern nuclear information. These are the only two classifications that are established by federal law, being defined by the Atomic Energy Act of 1954. Nuclear information is not automatically declassified after 25 years. Documents with nuclear information covered under the Atomic Energy Act will be marked with a classification level (confidential, secret or top secret) and a restricted data or formerly restricted data marking.<ref name="Wayback Machine3">CLASSIFICATION OF NUCLEAR WEAPONS-RELATED INFORMATION, http://energy.gov/sites/prod/files/hss/Classification/docs/CTI-Training-RD-FRD-Briefing.pdf {{Webarchive|url=https://web.archive.org/web/20201126125412/https://www.energy.gov/sites/prod/files/hss/Classification/docs/CTI-Training-RD-FRD-Briefing.pdf |date=November 26, 2020 }}</ref>

Nuclear information as specified in the act may inadvertently appear in unclassified documents and must be reclassified when discovered. Even documents created by private individuals have been seized for containing nuclear information and classified. Only the Department of Energy may declassify nuclear information.<ref name="Wayback Machine3" />

Most RD and FRD (as well as most classified information in general) are classified at either the Confidential or Secret levels; however they require extra RD/FRD specific clearances in addition to the clearance level.<ref name=SGP7/>


===Unclassified===
===Unclassified===
''Unclassified'' is not technically a classification; this is the default and refers to information that can be released to individuals without a clearance. Information that is unclassified is sometimes restricted in its dissemination as [[Sensitive But Unclassified]] (SBU) or [[For Official Use Only]] (FOUO). For example, the law enforcement bulletins reported by the U.S. media when the [[United States Department of Homeland Security]] raised the U.S. [[Homeland Security Advisory System|terror threat level]] were usually classified as "<nowiki>U//LES</nowiki>", or "Unclassified – Law Enforcement Sensitive". This information is supposed to be released only to law enforcement agencies (sheriff, police, etc.), but, because the information is unclassified, it is sometimes released to the public as well. Information that is unclassified but which the government does not believe should be subject to [[Freedom of Information Act (United States)|Freedom of Information Act]] requests is often classified as <nowiki>U//FOUO</nowiki>—"Unclassified—For Official Use Only". In addition to FOUO information, information can be categorized according to its availability to be distributed (e.g., Distribution D may only be released to approved Department of Defense and U.S. Department of Defense contractor personnel<ref>U.S. Department of Defense Directive DoDD 5230.24, March 18, 1987</ref>). Also, the statement of NOFORN (meaning "no [[foreign national]]s") is applied to any information that may not be released to any non-U.S. citizen. NOFORN and distribution statements are often used in conjunction with classified information or alone on SBU information. Documents subject to export controls have a specific warning to that effect. Information which is "personally identifiable" is governed by the [[Privacy Act of 1974]] and is also subject to strict controls regardless of its level of classification.
''Unclassified'' is not technically a classification; this is the default and refers to information that can be released to individuals without a clearance. Information that is unclassified is sometimes restricted in its dissemination as [[Controlled Unclassified Information]]. For example, the law enforcement bulletins reported by the U.S. media when the [[United States Department of Homeland Security]] raised the U.S. [[Homeland Security Advisory System|terror threat level]] were usually classified as "<nowiki>U//LES</nowiki>", or "Unclassified – Law Enforcement Sensitive". This information is supposed to be released only to law enforcement agencies (sheriff, police, etc.), but, because the information is unclassified, it is sometimes released to the public as well.
Information that is unclassified but which the government does not believe should be subject to [[Freedom of Information Act (United States)|Freedom of Information Act]] requests is often classified as [[Controlled Unclassified Information]] (CUI). In addition to CUI classification, information can be categorized according to its availability to be distributed, e.g., Distribution D may only be released to approved Department of Defense and U.S. Department of Defense contractor personnel.<ref>U.S. Department of Defense Directive DoDD 5230.24, March 18, 1987</ref>
The statement of NOFORN (meaning "no [[foreign national]]s") is applied to any information that may not be released to any non-U.S. citizen. NOFORN and distribution statements are often used in conjunction with classified information or alone on [[Sensitive but unclassified|Sensitive But Unclassified]] (SBU) information. Documents subject to export controls have a specific warning to that effect. Information which is "personally identifiable" is governed by the [[Privacy Act of 1974]] and is also subject to strict controls regardless of its level of classification.


Finally, information at one level of classification may be "upgraded by aggregation" to a higher level. For example, a specific technical capability of a weapons system might be classified Secret, but the aggregation of all technical capabilities of the system into a single document could be deemed Top Secret.
Finally, information at one level of classification may be "upgraded by aggregation" to a higher level. For example, a specific technical capability of a weapons system might be classified Secret, but the aggregation of all technical capabilities of the system into a single document could be deemed Top Secret.
Line 51: Line 89:


====Controlled Unclassified Information (CUI)====
====Controlled Unclassified Information (CUI)====
{{main|Controlled Unclassified Information}}
One of the [[9/11 Commission]] findings was that "the government keeps too many secrets." To address this problem, the Commission recommended that '[t]he culture of agencies feeling they own the information they gathered at taxpayer expense must be replaced by a culture in which the agencies instead feel they have a duty ... to repay the taxpayers' investment by making that information available.'"<ref>{{cite conference
One of the [[9/11 Commission]] findings was that "the government keeps too many secrets." To address this problem, the Commission recommended that '[t]he culture of agencies feeling they own the information they gathered at taxpayer expense must be replaced by a culture in which the agencies instead feel they have a duty ... to repay the taxpayers' investment by making that information available.'"<ref>{{cite conference |title=House Report 110-810 – REDUCING INFORMATION CONTROL DESIGNATIONS ACT |book-title=BACKGROUND AND NEED FOR LEGISLATION |publisher=[[Congress of the United States]] |date=July 30, 2008 |location=Washington, D.C. |url=http://thomas.loc.gov/cgi-bin/cpquery/T?&report=hr810&dbname=110& |archive-url=https://archive.today/20121212034348/http://thomas.loc.gov/cgi-bin/cpquery/T?&report=hr810&dbname=110& |url-status=dead |archive-date=December 12, 2012 |access-date=October 21, 2008}}</ref>
| title = House Report 110-810 - REDUCING INFORMATION CONTROL DESIGNATIONS ACT
| booktitle = BACKGROUND AND NEED FOR LEGISLATION
| publisher = [[Congress of the United States]]
| date = July 30, 2008
| location = [[Washington, D.C.]]
| url = http://thomas.loc.gov/cgi-bin/cpquery/T?&report=hr810&dbname=110&
| archive-url = https://archive.today/20121212034348/http://thomas.loc.gov/cgi-bin/cpquery/T?&report=hr810&dbname=110&
| url-status = dead
| archive-date = December 12, 2012
| accessdate = October 21, 2008}}</ref>


Due to over 100 designations in use by the U.S. government for unclassified information at the time, President George W. Bush issued a Presidential memorandum on May 9, 2008, in an attempt to consolidate the various designations in use into a new category known as [[Controlled Unclassified Information]] (CUI). The CUI categories and subcategories were hoped to serve as the exclusive designations for identifying unclassified information throughout the executive branch not covered by [[Executive Order 12958]] or the [[Atomic Energy Act of 1954]] (as amended) but still required safeguarding or dissemination controls, pursuant to and consistent with any applicable laws, regulations, and government-wide policies in place at the time. CUI would replace categories such as [[Sensitive but unclassified|For Official Use Only]] (FOUO), [[Sensitive but unclassified|Sensitive But Unclassified]] (SBU) and Law Enforcement Sensitive (LES).<ref>{{cite news
Due to over 100 designations in use by the U.S. government for unclassified information at the time, President George W. Bush issued a Presidential memorandum on May 9, 2008, in an attempt to consolidate the various designations in use into a new category known as [[Controlled Unclassified Information]] (CUI). The CUI categories and subcategories were hoped to serve as the exclusive designations for identifying unclassified information throughout the executive branch not covered by [[Executive Order 12958]] or the [[Atomic Energy Act of 1954]] (as amended, though there is CUI//SP-UCNI now<ref>{{Cite web |title=CUI Markings |url=https://dodcui.com/cui-markings |access-date=2022-08-13 |website=Home |archive-date=March 28, 2022 |archive-url=https://web.archive.org/web/20220328233226/https://dodcui.com/cui-markings |url-status=live }}</ref>) but still required safeguarding or dissemination controls, pursuant to and consistent with any applicable laws, regulations, and government-wide policies in place at the time. CUI would replace categories such as [[For Official Use Only]] (FOUO), Sensitive But Unclassified (SBU) and Law Enforcement Sensitive (LES).<ref>{{cite news |last=Casteli |first=Elise |title=New policy expected soon for sensitive information |newspaper=Federal Times |date=January 22, 2008 |url=http://www.federaltimes.com/index.php?S=3323622 |archive-url=https://archive.today/20130102142248/http://www.federaltimes.com/index.php?S=3323622 |url-status=dead |archive-date=January 2, 2013}}
</ref><ref>{{cite press release |title=Memorandum For The Heads Of Executive Departments And Agencies – Designation and Sharing of Controlled Unclassified Information (CUI) |date=May 9, 2008 |url=https://georgewbush-whitehouse.archives.gov/news/releases/2008/05/20080509-6.html |via=[[NARA|National Archives]] |work=[[whitehouse.gov]] |access-date=October 21, 2008 |archive-date=October 25, 2017 |archive-url=https://web.archive.org/web/20171025051431/https://georgewbush-whitehouse.archives.gov/news/releases/2008/05/20080509-6.html |url-status=live }}</ref>
| last = Casteli
| first = Elise
| title = New policy expected soon for sensitive information
| newspaper = Federal Times
| date = January 22, 2008
| url = http://www.federaltimes.com/index.php?S=3323622
| archive-url = https://archive.today/20130102142248/http://www.federaltimes.com/index.php?S=3323622
| url-status = dead
| archive-date = January 2, 2013
| ref = harv}}</ref>
<ref>{{cite press release
| title = Memorandum For The Heads Of Executive Departments And Agencies - Designation and Sharing of Controlled Unclassified Information (CUI)
| publisher = The Office of the White House
| date = May 9, 2008
| url = https://georgewbush-whitehouse.archives.gov/news/releases/2008/05/20080509-6.html
| accessdate = October 21, 2008}}</ref>


The [[Presidential memorandum]] also designated the [[National Archives and Records Administration|National Archives]] as responsible for overseeing and managing the implementation of the new CUI framework.<ref>{{cite press release
The [[Presidential memorandum]] also designated the [[National Archives and Records Administration|National Archives]] as responsible for overseeing and managing the implementation of the new CUI framework.<ref>{{cite press release |title=Archivist of the United States Establishes "Controlled Unclassified Information Office" |publisher=The National Archives |date=May 22, 2008 |url=https://www.archives.gov/press/press-releases/2008/nr08-107.html |access-date=October 21, 2008 |archive-date=August 4, 2017 |archive-url=https://web.archive.org/web/20170804204803/https://www.archives.gov/press/press-releases/2008/nr08-107.html |url-status=live }}</ref>
| title = Archivist of the United States Establishes "Controlled Unclassified Information Office"
| publisher = The National Archives
| date = May 22, 2008
| url = https://www.archives.gov/press/press-releases/2008/nr08-107.html
| accessdate = October 21, 2008}}
</ref>


This memorandum has since been rescinded by [[s:Executive Order 13556|Executive Order 13556]] of November 4, 2010 and the guidelines previously outlined within the memo were expanded upon in a further attempt to improve the management of information across all federal agencies as well as establish a more standard, government-wide program regarding the controlled unclassification designation process itself.<ref name="eo13556">[http://frwebgate.access.gpo.gov/cgi-bin/getpage.cgi?position=all&page=68675&dbname=2010_register Executive Order 13556 of November 4, 2010, ''Controlled Unclassified Information''], Federal Register - U.S. National Archives and Records Administration, Vol. 75, No. 216, November 9, 2010, p. 68675.</ref>
This memorandum has since been rescinded by [[s:Executive Order 13556|Executive Order 13556]] of November 4, 2010 and the guidelines previously outlined within the memo were expanded upon in a further attempt to improve the management of information across all federal agencies as well as establish a more standard, government-wide program regarding the controlled declassification designation process itself.<ref name="eo13556">[http://frwebgate.access.gpo.gov/cgi-bin/getpage.cgi?position=all&page=68675&dbname=2010_register Executive Order 13556 of November 4, 2010, ''Controlled Unclassified Information''], Federal Register U.S. National Archives and Records Administration, Vol. 75, No. 216, November 9, 2010, p. 68675.</ref>


The U.S. Congress has attempted to take steps to resolve this, but did not succeed. The [[U.S. House of Representatives]] passed the Reducing Information Control Designations Act {{USBill|111|HR|1323}} on March 17, 2009. The bill was referred to the Senate Committee on Homeland Security and Governmental Affairs. Because no action was taken in committee<ref>{{cite web|url=https://www.congress.gov/bill/111th-congress/house-bill/1323/all-actions|title=Actions - H.R.1323 - 111th Congress (2009-2010): Reducing Information Control Designations Act|first=Driehaus,|last=Steve|date=March 18, 2009|website=www.congress.gov|accessdate=April 5, 2018}}</ref> and bills expire at the end of every Congress, there is currently no bill to solve unclassified designations.
The U.S. Congress has attempted to take steps to resolve this, but did not succeed. The [[U.S. House of Representatives]] passed the Reducing Information Control Designations Act {{USBill|111|HR|1323}} on March 17, 2009. The bill was referred to the Senate Committee on Homeland Security and Governmental Affairs. Because no action was taken in committee<ref>{{cite web |url=https://www.congress.gov/bill/111th-congress/house-bill/1323/all-actions |title=Actions - H.R.1323 - 111th Congress (2009-2010): Reducing Information Control Designations Act |first=Driehaus |last=Steve |date=March 18, 2009 |website=www.congress.gov |access-date=April 5, 2018 |archive-date=January 9, 2015 |archive-url=https://web.archive.org/web/20150109022900/https://www.congress.gov/bill/111th-congress/house-bill/1323/all-actions |url-status=live }}</ref> and bills expire at the end of every Congress, there is currently no bill to solve unclassified designations.


====For Official Use Only (FOUO)====
===Restricted===
{{main|For Official Use Only}}
During and before [[World War II]], the U.S. had a category of classified information called Restricted, which was below confidential. The U.S. no longer has a Restricted classification, but many other nations and [[NATO]] do. The U.S. treats Restricted information it receives from other governments as Confidential. The U.S. does use the term ''restricted data'' in a completely different way to refer to [[nuclear secret]]s, as described above.


Among U.S.&nbsp;government information, FOUO was primarily used by the [[U.S.&nbsp;Department of Defense]] as a handling instruction for [[Controlled Unclassified Information]] (CUI) which may be exempt from release under exemptions two to nine of the [[Freedom of Information Act (United States)|Freedom of Information Act]] (FOIA).<ref>{{cite web |url=http://www.dtic.mil/whs/directives/corres/pub1.html |title=DoD Publications |website=DoD Issuances |publisher=US Department of Defense |accessdate=26 March 2012 |url-status=dead |archiveurl=https://web.archive.org/web/20080822052147/http://www.dtic.mil/whs/directives/corres/pub1.html |archivedate=22 August 2008 }}<br />- {{Cite web |title=DOD releases New Controlled Unclassified Information Instruction |url=https://www.ndia.org/policy/recent-posts/2020/3/16/dod-released-new-controlled-unclassified-information-instruction |access-date=14 December 2020 |date=16 March 2020 |publisher=National Defense Industrial Association |archive-date=October 17, 2021 |archive-url=https://web.archive.org/web/20211017230703/https://www.ndia.org/policy/recent-posts/2020/3/16/dod-released-new-controlled-unclassified-information-instruction |url-status=live }}</ref> It is one of the various sub-categorizations for strictly unclassified information which, on 24 February 2012, was officially consolidated as CUI.
===Classified classifications===

Executive Order 13526, which forms the legal basis for the U.S. classification system, states that "information may be classified at one of the following three levels", with Top Secret as the highest level ([[s:Executive Order 13526#Sec. 1.2|Sec. 1.2]]). However, this executive order provides for [[special access program]]s that further restricted access to a small number of individuals and permit additional security measures ([[s:Executive Order 13526#Sec. 4.3|Sec. 4.3]]). These practices can be compared with (and may have inspired) the concepts [[multilevel security]] and [[role-based access control]]. U.S. law also has special provisions protecting information related to [[cryptography]] ([https://www.law.cornell.edu/uscode/18/798.html 18 USC 798]), nuclear weapons and atomic energy (''see'' [[#Controls on atomic-energy information|Controls on atomic-energy information]]) and the identity of covert intelligence agents (''see'' [[Intelligence Identities Protection Act]]).
Other departments continuing the use of this designation include the [[United States Department of Homeland Security|Department of Homeland Security]].<ref>{{cite web |url=https://www.dhs.gov/xlibrary/assets/foia/mgmt_directive_110421_safeguarding_sensitive_but_unclassified_information.pdf |title=SAFEGUARDING SENSITIVE BUT UNCLASSIFIED |publisher=Department of Homeland Security |access-date=8 August 2019 |archive-date=October 25, 2021 |archive-url=https://web.archive.org/web/20211025082444/https://www.dhs.gov/xlibrary/assets/foia/mgmt_directive_110421_safeguarding_sensitive_but_unclassified_information.pdf |url-status=live }}</ref>

====Public Trust====
According to the Department of Defense, Public Trust is a type of position, not clearance level, though [[General Services Administration]] refers to it as clearance level.<ref name="TTS"/> Certain positions which require access to sensitive information, but not information which is classified, must obtain this designation through a background check. Public Trust Positions can either be moderate-risk or high-risk.<ref name="state.gov"/><ref name=USDA>{{cite web |title=National Security Positions vs. Public Trust Positions |url=http://www.dm.usda.gov/ohsec/pdsd/securityVStrust.htm |access-date=March 9, 2014 |archive-date=November 21, 2018 |archive-url=https://web.archive.org/web/20181121234222/https://www.dm.usda.gov/ohsec/pdsd/securityVStrust.htm |url-status=live }}</ref><ref>{{cite web |title=FEDERAL SECURITY/SUITABILITY CLEARANCE CHART |url=http://fedcas.com/wp-content/uploads/2012/05/Federal-Suitability-Security-Clearance-Chart.pdf |access-date=March 9, 2014 |archive-date=May 17, 2017 |archive-url=https://web.archive.org/web/20170517124152/http://fedcas.com/wp-content/uploads/2012/05/Federal-Suitability-Security-Clearance-Chart.pdf |url-status=live }}</ref>


==Proper procedure for classifying U.S. government documents==
==Proper procedure for classifying U.S. government documents==
To be properly classified, a classification authority (an individual charged by the U.S. government with the right and responsibility to properly determine the level of classification and the reason for classification) must determine the appropriate classification level, as well as the reason information is to be classified. A determination must be made as to how and when the document will be declassified, and the document marked accordingly. Executive Order 13526 describes the reasons and requirements for information to be classified and declassified ([[s:Executive Order 13526#Part 1|Part 1]]). Individual agencies within the government develop guidelines for what information is classified and at what level.
To be properly classified, a classification authority (an individual charged by the U.S. government with the right and responsibility to properly determine the level of classification and the reason for classification) must determine the appropriate classification level, as well as the reason information is to be classified. A determination must be made as to how and when the document will be declassified, and the document marked accordingly. Executive Order 13526 describes the reasons and requirements for information to be classified and declassified ([[s:Executive Order 13526#Part 1|Part 1]]). Individual agencies within the government develop guidelines for what information is classified and at what level.


The former decision is original classification. A great majority of classified documents are created by derivative classification. For example, if one piece of information, taken from a secret document, is put into a document along with 100 pages of unclassified information, the document, as a whole, will be secret. Proper rules stipulate that every paragraph will bear a classification marking of (U) for Unclassified, (C) for Confidential, (S) for Secret, and (TS) for Top Secret. Therefore, in this example, only one paragraph will have the (S) marking. If the page containing that paragraph is double-sided, the page should be marked SECRET on top and bottom of both sides.<ref name="5FAH-3H700EO12958">{{cite web| url=https://fam.state.gov/FAM/05FAH03/05FAH030710.html| title=U.S. Department of State Foreign Affairs Handbook Volume 5 Handbook 3 - TAGS/Terms Handbook: 5 FAH-3 H-700 E.O. 12958, AS AMENDED, TELEGRAM CLASSIFICATION MARKING | publisher = U.S. Department of State | date= 14 July 2009 | accessdate= January 12, 2016}}</ref>
The former decision is original classification. A great majority of classified documents are created by derivative classification. For example, if one piece of information, taken from a secret document, is put into a document along with 100 pages of unclassified information, the document, as a whole, will be secret. Proper rules stipulate that every paragraph will bear a classification marking of (U) for Unclassified, (C) for Confidential, (S) for Secret, and (TS) for Top Secret. Therefore, in this example, only one paragraph will have the (S) marking. If the page containing that paragraph is double-sided, the page should be marked SECRET on top and bottom of both sides.<ref name="5FAH-3H700EO12958">{{cite web |url=https://fam.state.gov/FAM/05FAH03/05FAH030710.html |title=U.S. Department of State Foreign Affairs Handbook Volume 5 Handbook 3 - TAGS/Terms Handbook: 5 FAH-3 H-700 E.O. 12958, AS AMENDED, TELEGRAM CLASSIFICATION MARKING |publisher=U.S. Department of State |date=14 July 2009 |access-date=January 12, 2016 |archive-date=January 14, 2016 |archive-url=https://web.archive.org/web/20160114053451/https://fam.state.gov/FAM/05FAH03/05FAH030710.html |url-status=live }}</ref>

A review of classification policies by the [[Office of the Director of National Intelligence]] aimed at developing a uniform classification policy and a single classification guide that could be used by the entire [[U.S. intelligence community]] found significant interagency differences that impaired cooperation and performance. The initial ODNI review, completed in January 2008,{{Citation needed|date=August 2009}} said in part, "The definitions of 'national security' and what constitutes 'intelligence'—and thus what must be classified—are unclear. ... Many interpretations exist concerning what constitutes harm or the degree of harm that might result from improper disclosure of the information, often leading to inconsistent or contradictory guidelines from different agencies. ... There appears to be no common understanding of classification levels among the classification guides reviewed by the team, nor any consistent guidance as to what constitutes 'damage,' 'serious damage,' or 'exceptionally grave damage' to national security. ... There is wide variance in application of classification levels."<ref>{{cite web|author='+relative_time(twitters[i].created_at)+' |url=https://fas.org/blog/secrecy/2008/04/us_intelligence_agencies.html |title=U.S. Intelligence Agencies Rethink Classification Policy &#124; Secrecy NewsSecrecy News |publisher=Fas.org |date=2008-04-10 |accessdate=2013-07-04}}</ref>


A review of classification policies by the [[Office of the Director of National Intelligence]] aimed at developing a uniform classification policy and a single classification guide that could be used by the entire [[U.S. intelligence community]]. Significant interagency differences were found that impaired cooperation and performance. The initial ODNI review, completed in January 2008, found that "There appears to be no common understanding of classification levels among the classification guides reviewed by the team, nor any consistent guidance as to what constitutes 'damage,' 'serious damage,' or 'exceptionally grave damage' to national security."<ref>{{cite web |url=https://fas.org/blog/secrecy/2008/04/us_intelligence_agencies.html |title=U.S. Intelligence Agencies Rethink Classification Policy &#124; Secrecy NewsSecrecy News |publisher=Fas.org |date=2008-04-10 |access-date=2013-07-04 |archive-date=January 30, 2013 |archive-url=https://web.archive.org/web/20130130074422/http://www.fas.org/blog/secrecy/2008/04/us_intelligence_agencies.html |url-status=live }}</ref>
The review recommended that original classification authorities should specify clearly the basis for classifying information, for example, whether the sensitivity derives from the actual content of the information, the source, the method by which it was analyzed, or the date or location of its acquisition. Current policy requires that the classifier be "able" to describe the basis for classification but not that he or she in fact do so.<ref>{{cite web
|url=https://fas.org/sgp/othergov/intel/class.pdf
|format=PDF|title=Intelligence Community Classification Guidance: Findings and Recommendations Report
|publisher=Office of the Director of National Intelligence
|date=January 2008
|accessdate=2008-04-10}}</ref>


===Classification categories===
===Classification categories===
Step 3 in the classification process is to assign a reason for the classification. Classification categories are marked by the number "1.4" followed by one or more letters (a) to (h):<ref name="5FAH-3H700EO12958"/><ref>{{cite web|last1=Obama|first1=Barack|title=Executive Order 13526- Classified National Security Information|url=https://www.whitehouse.gov/the-press-office/executive-order-classified-national-security-information|website=whitehouse.gov|publisher=Office of The Press Secretary|date=December 29, 2009|accessdate=May 4, 2015|url-status=dead|archiveurl=https://web.archive.org/web/20150415175924/https://www.whitehouse.gov/the-press-office/executive-order-classified-national-security-information|archivedate=April 15, 2015|df=mdy-all}}</ref>
Step 3 in the classification process is to assign a reason for the classification. Classification categories are marked by the number "1.4" followed by one or more letters (a) to (h):<ref name="5FAH-3H700EO12958"/><ref>{{cite web |last1=Obama |first1=Barack |title=Executive Order 13526- Classified National Security Information |url=https://obamawhitehouse.archives.gov/the-press-office/executive-order-classified-national-security-information |date=December 29, 2009 |access-date=May 4, 2015 |url-status=live |archive-url=https://web.archive.org/web/20170126193900/https://obamawhitehouse.archives.gov/the-press-office/executive-order-classified-national-security-information |archive-date=January 26, 2017 |via=[[NARA|National Archives]] |work=[[whitehouse.gov]] |df=mdy-all}}</ref>
* 1.4(a) military plans, weapons systems, or operations;
* 1.4(a) military plans, weapons systems, or operations;
* 1.4(b) foreign government information;
* 1.4(b) foreign government information;
Line 129: Line 134:
Whether information related to nuclear weapons can constitutionally be "[[born secret]]" as provided for by the [[Atomic Energy Act of 1954]] has not been tested in the courts.
Whether information related to nuclear weapons can constitutionally be "[[born secret]]" as provided for by the [[Atomic Energy Act of 1954]] has not been tested in the courts.


[[Guantanamo Bay detention camp]] has used a "presumptive classification" system to describe the statements of Guantanamo Bay detainees as classified. When challenged by [[Ammar al-Baluchi]] in the [[Guantanamo military commission]] hearing the [[9/11]] case,<ref>{{cite news|last1=Currier|first1=Cora|title=Classified in Gitmo Trials: Detainees' Every Word|url=https://www.propublica.org/article/classified-in-gitmo-trials-detainees-every-word |date=July 17, 2012 |accessdate=September 5, 2014}}</ref> the prosecution abandoned the practice.<ref>{{cite web|last1=Bennett|first1=Wells|title=October 16 Commission Session #3: Presumptive Classification Debated (Kinda)|url=http://www.lawfareblog.com/2012/10/october-commission-session-3-presumptive-classification-debated-kinda/|website=www.lawfareblog.com|accessdate=September 5, 2014}}</ref> Presumptive classification continues in the cases involving the [[habeas corpus petitions of Guantanamo Bay detainees]].
[[Guantanamo Bay detention camp]] has used a "presumptive classification" system to describe the statements of Guantanamo Bay detainees as classified. When challenged by [[Ammar al-Baluchi]] in the [[Guantanamo military commission]] hearing the [[9/11]] case,<ref>{{cite news |last1=Currier |first1=Cora |title=Classified in Gitmo Trials: Detainees' Every Word |url=https://www.propublica.org/article/classified-in-gitmo-trials-detainees-every-word |date=July 17, 2012 |access-date=September 5, 2014 |archive-date=September 5, 2014 |archive-url=https://web.archive.org/web/20140905112434/http://www.propublica.org/article/classified-in-gitmo-trials-detainees-every-word |url-status=live }}</ref> the prosecution abandoned the practice.<ref>{{cite web |last1=Bennett |first1=Wells |title=October 16 Commission Session #3: Presumptive Classification Debated (Kinda) |url=https://www.lawfaremedia.org/2012/10/october-commission-session-3-presumptive-classification-debated-kinda/ |website=www.lawfaremedia.org |date=October 16, 2012 |access-date=September 5, 2014 |archive-date=May 22, 2013 |archive-url=https://web.archive.org/web/20130522194155/http://www.lawfareblog.com/2012/10/october-commission-session-3-presumptive-classification-debated-kinda/ |url-status=live }}</ref> Presumptive classification continues in the cases involving the [[habeas corpus petitions of Guantanamo Bay detainees]].


==Protecting classified information==
==Protecting classified information==
[[Image:GSAclass6SecurityContainer.jpg|thumb|left|upright|GSA-approved security container]]
[[Image:GSAclass6SecurityContainer.jpg|thumb|upright|A GSA-approved security container]]


===Facilities and handling===
===Facilities and handling===
One of the reasons for classifying state secrets into sensitivity levels is to tailor the risk to the level of protection. The U.S. government specifies in some detail the procedures for protecting classified information. The rooms or buildings for holding and handling classified material must have a facility clearance at the same level as the most sensitive material to be handled. Good quality commercial [[physical security]] standards generally suffice for lower levels of classification; at the highest levels, people sometimes must work in rooms designed like [[bank vault]]s (''see'' [[Sensitive Compartmented Information Facility]] – SCIF). The [[U.S. Congress]] has such facilities inside the [[United States Capitol|Capitol Building]], among other Congressional handling procedures for protecting confidentiality.<ref>{{cite web|url=https://fas.org/sgp/crs/secrecy/RS20748.pdf |format=PDF|title=Protection of Classified Information by Congress: Practices and Proposals |last=Kaiser |first=Frederick M. |publisher=[[Congressional Research Service]] |date=2008-05-27 |accessdate=2008-06-22}}</ref> The U.S. [[General Services Administration]] sets standards for locks and containers used to store classified material. The most commonly-approved security containers resemble heavy-duty [[file cabinet]]s with a [[combination lock]] in the middle of one drawer. In response to advances in methods to defeat mechanical combination locks, the U.S. government switched to electromechanical locks that limit the rate of attempts to unlock them. After a specific number of failed attempts, they will permanently lock, requiring a locksmith to reset them.
One of the reasons for classifying state secrets into sensitivity levels is to tailor the risk to the level of protection. The U.S. government specifies in some detail the procedures for protecting classified information. The rooms or buildings for holding and handling classified material must have a facility clearance at the same level as the most sensitive material to be handled. Good quality commercial [[physical security]] standards generally suffice for lower levels of classification. At the highest levels, people sometimes must work in rooms designed like [[bank vault]]s (''see'' [[Sensitive Compartmented Information Facility]] – SCIF). The [[U.S. Congress]] has such facilities inside the [[United States Capitol|Capitol Building]], among other Congressional handling procedures for protecting confidentiality.<ref>{{cite web |url=https://fas.org/sgp/crs/secrecy/RS20748.pdf |title=Protection of Classified Information by Congress: Practices and Proposals |last=Kaiser |first=Frederick M. |publisher=[[Congressional Research Service]] |date=2008-05-27 |access-date=2008-06-22 |archive-date=March 11, 2015 |archive-url=https://web.archive.org/web/20150311134205/http://fas.org/sgp/crs/secrecy/RS20748.pdf |url-status=live }}</ref>


The U.S. [[General Services Administration]] sets standards for locks and containers used to store classified material. The most commonly-approved security containers resemble heavy-duty [[file cabinet]]s with a [[combination lock]] in the middle of one drawer. In response to advances in methods to defeat mechanical combination locks, the U.S. government switched to electromechanical locks that limit the rate of attempts to unlock them. After a specific number of failed attempts, they will permanently lock, requiring a locksmith to reset them.
Classified U.S. government documents typically must be stamped with their classification on the cover and at the top and bottom of each page. Authors must mark each paragraph, title and caption in a document with the highest level of information it contains, usually by placing appropriate initials in parentheses at the beginning of the paragraph, title, or caption. Commonly, one must affix a brightly colored cover sheet to the cover of each classified document to prevent unauthorized observation of classified material ([[Shoulder surfing (computer security)|shoulder surfing]]) and to remind users to lock up unattended documents. The most sensitive material requires [[Two-man rule|two-person integrity]], where two cleared individuals are responsible for the material at all times. Approved containers for such material have two separate combination locks, both of which must be opened to access the contents.{{Citation needed|date=August 2009}}


The most sensitive material requires [[Two-man rule|two-person integrity]], where two cleared individuals are responsible for the material at all times. Approved containers for such material have two separate combination locks, both of which must be opened to access the contents.{{Citation needed|date=August 2009}}
Restrictions dictate shipment methods for classified documents. Top Secret material must go by special courier; Secret material within the U.S. via [[registered mail]]; and, Confidential material by [[Certified Mail|certified mail]]. Electronic transmission of classified information largely requires the use of National Security Agency approved/certified [[Type 1 product|"Type 1"]] cryptosystems using NSA's unpublished and classified [[NSA Suite A Cryptography|Suite A]] algorithms. The classification of the Suite A algorithms categorizes the hardware that store them as a [[Controlled Cryptographic Item]] (CCI) under the [[International Traffic in Arms Regulations]], or ITAR. CCI equipment and keying material must be controlled and stored with heightened physical security, even when the device is not processing classified information or contains no cryptographic key. NSA is currently implementing what it's calling [[Suite B]] which is a group of commercial algorithms such as [[Advanced Encryption Standard]] (AES), [[Secure Hash Algorithm (disambiguation)|Secure Hash Algorithm (SHA)]], [[Elliptic Curve Digital Signature Algorithm]] (ECDSA) and [[Elliptic curve Diffie–Hellman]] (ECDH). Suite B provides protection for data up to Top Secret on non-CCI devices, which is especially useful in high risk environments or operations needed to prevent Suite A compromise. These less stringent hardware requirements stem from the device not having to "protect" classified Suite A algorithms.<ref>{{cite web|url=http://www.nsa.gov/ia/programs/suiteb_cryptography/ |title=NSA Suite B Cryptography – NSA/CSS |publisher=Nsa.gov |accessdate=2013-07-04}}</ref>


===Marking===
Specialized computer [[operating system]]s known as [[trusted operating system]]s are available for processing classified information. These systems enforce the classification and labeling rules described above in software. Since 2005, however, they are not considered secure enough to allow uncleared users to share computers with classified activities. Thus, if one creates an unclassified document on a secret device, the resultant data is classified secret until it can be manually reviewed. Computer networks for sharing classified information are segregated by the highest sensitivity level they are allowed to transmit, for example, [[SIPRNet]] (Secret) and [[JWICS]] (Top Secret-SCI).
Classified U.S. government documents typically must be stamped with their classification on the cover and at the top and bottom of each page. Authors must mark each paragraph, title and caption in a document with the highest level of information it contains, usually by placing appropriate initials in parentheses at the beginning of the paragraph, title, or caption, for example (C), (S), (TS), (TS-SCI), etc., or (U) for unclassified.


===Cover sheets===
[[File:Classified intelligence material found during search of Mar-a-Lago.jpg|thumb|Classified documents with and without cover sheets found by the Federal Bureau of Investigation during its [[FBI search of Mar-a-Lago|search of Mar-a-Lago in August 2022.]]]]
Commonly, one must affix a brightly colored cover sheet to the cover of each classified document to prevent unauthorized observation of classified material ([[Shoulder surfing (computer security)|shoulder surfing]]) and to remind users to lock up unattended documents. The cover sheets warn viewers of the sensitive nature of the enclosed material, but are themselves unclassified. Typical colors are blue for confidential, red for secret and orange for top secret.<ref>32 CFR 2001.90</ref>

===Transmission===
Restrictions dictate shipment methods for classified documents. Top Secret material must go by special courier, Secret material within the U.S. via [[registered mail]], and Confidential material by [[Certified Mail|certified mail]]. Electronic transmission of classified information largely requires the use of National Security Agency approved/certified [[Type 1 product|"Type 1"]] cryptosystems using NSA's unpublished and classified [[NSA Suite A Cryptography|Suite A]] algorithms. The classification of the Suite A algorithms categorizes the hardware that store them as a [[Controlled Cryptographic Item]] (CCI) under the [[International Traffic in Arms Regulations]], or ITAR.<ref name="NSA Suite B Cryptography – NSA/CSS">{{cite web |url=http://www.nsa.gov/ia/programs/suiteb_cryptography/ |title=NSA Suite B Cryptography – NSA/CSS |publisher=Nsa.gov |access-date=2013-07-04 |archive-date=June 18, 2011 |archive-url=https://web.archive.org/web/20110618134109/http://www.nsa.gov/ia/programs/suiteb%5Fcryptography/ |url-status=live }}</ref>

CCI equipment and keying material must be controlled and stored with heightened physical security, even when the device is not processing classified information or contains no cryptographic key. NSA is currently implementing what it calls [[Suite B]], a group of commercial algorithms such as [[Advanced Encryption Standard]] (AES), [[Secure Hash Algorithm (disambiguation)|Secure Hash Algorithm (SHA)]], [[Elliptic Curve Digital Signature Algorithm]] (ECDSA) and [[Elliptic curve Diffie–Hellman]] (ECDH). Suite B provides protection for data up to Top Secret on non-CCI devices, which is especially useful in high-risk environments or operations needed to prevent Suite A compromise. These less stringent hardware requirements stem from the device not having to "protect" classified Suite A algorithms.<ref name="NSA Suite B Cryptography – NSA/CSS"/>

Specialized computer [[operating system]]s known as [[trusted operating system]]s are available for processing classified information. These systems enforce the classification and labeling rules described above in software. Since 2005 they are not considered secure enough to allow uncleared users to share computers with classified activities. Thus, if one creates an unclassified document on a secret device, the resultant data is classified secret until it can be manually reviewed. Computer networks for sharing classified information are segregated by the highest sensitivity level they are allowed to transmit, for example, [[SIPRNet]] (Secret) and [[JWICS]] (Top Secret-SCI).

===Destruction===
The destruction of certain types of classified documents requires burning, [[paper shredder|shredding]], pulping or pulverizing using approved procedures and must be witnessed and logged.{{citation needed|date=February 2017}} Classified computer data presents special problems. ''See'' [[Data remanence]].
The destruction of certain types of classified documents requires burning, [[paper shredder|shredding]], pulping or pulverizing using approved procedures and must be witnessed and logged.{{citation needed|date=February 2017}} Classified computer data presents special problems. ''See'' [[Data remanence]].


===Lifetime commitment===
===Lifetime commitment===
When a cleared individual leaves the job or employer for which they were granted access to classified information, they are formally debriefed from the program. [[Debriefing]] is an administrative process that accomplishes two main goals: it creates a formal record that the individual no longer has access to the classified information for that program; and it reminds the individual of their lifetime commitment to protect that information. Typically, the individual is asked to sign another [[non-disclosure agreement]] (NDA), similar to that which they signed when initially briefed, and this document serves as the formal record. The debriefed individual does not lose their [[security clearance]]; they have only surrendered the need to know for information related to that particular job.
When a cleared individual leaves the job or employer for which they were granted access to classified information, they are formally debriefed from the program. [[Debriefing]] is an administrative process that accomplishes two main goals: it creates a formal record that the individual no longer has access to the classified information for that program; and it reminds the individual of their lifetime commitment to protect that information.
Typically, the individual is asked to sign another [[non-disclosure agreement]] (NDA), similar to that which they signed when initially briefed, and this document serves as the formal record. The debriefed individual does not lose their [[security clearance]]; they have only surrendered the need to know for information related to that particular job.


==Classifications and clearances between U.S. government agencies==
==Classifications and clearances between U.S. government agencies==
Line 152: Line 172:
[[File:Goldwater casey nyt leak.png|right|thumb|250px|Senator [[Barry Goldwater]] reprimanding CIA director [[William J. Casey]] for Secret info showing up in ''[[The New York Times]]'', but then saying it was over-classified to begin with. 1983]]
[[File:Goldwater casey nyt leak.png|right|thumb|250px|Senator [[Barry Goldwater]] reprimanding CIA director [[William J. Casey]] for Secret info showing up in ''[[The New York Times]]'', but then saying it was over-classified to begin with. 1983]]


In the past, clearances did not necessarily transfer between various U.S. government agencies. For example, an individual cleared for Department of Defense Top Secret had to undergo another investigation before being granted a [[United States Department of Energy|Department of Energy]] [[Q clearance]]. Agencies are now supposed to honor background investigations by other agencies if they are still current. Because most security clearances only apply inside the agency where the holder works, if one needs to meet with another agency to discuss classified matters, it is possible and necessary to pass one's clearance to the other agency. For example, officials visiting at the White House from other government agencies would pass their clearances to the Executive Office of the President (EOP).
In the past, clearances did not necessarily transfer between various U.S. government agencies. For example, an individual cleared for Department of Defense Top Secret had to undergo another investigation before being granted a [[United States Department of Energy|Department of Energy]] [[Q clearance]]. Agencies are now supposed to honor background investigations by other agencies if they are still current.
Because most security clearances only apply inside the agency where the holder works, if one needs to meet with another agency to discuss classified matters, it is possible and necessary to pass one's clearance to the other agency. For example, officials visiting at the White House from other government agencies would pass their clearances to the Executive Office of the President (EOP).

The Department of Energy security clearance required to access Top Secret Restricted Data, Formerly Restricted Data, and National Security Information, as well as Secret Restricted Data, is a [[Q clearance]]. The lower-level [[L clearance]] is sufficient for access to Secret Formerly Restricted Data and National Security Information, as well as Confidential Restricted Data and Formerly Restricted Data.<ref>Los Alamos National Laboratory, [http://www.lanl.gov/security/clearances/index.shtml Clearance Processing] {{webarchive |url=https://web.archive.org/web/20061011093349/http://www.lanl.gov/security/clearances/index.shtml |date=October 11, 2006 }}. Retrieved December 15, 2006.</ref> In practice, access to Restricted Data is granted, on a need-to-know basis, to personnel with appropriate clearances. At one time, a person might hold both a TS and a Q clearance, but that duplication and cost is no longer required. For all practical purposes, Q is equivalent to Top Secret, and L is equivalent to Secret.

Contrary to popular belief, the [[Yankee White]] clearance given to personnel who work directly with the President is not a classification. Individuals having Yankee White clearances undergo extensive background investigations. The criteria include U.S. citizenship, unquestionable loyalty, and an absolute absence of any foreign influence over the individual, their family, or "persons to whom the individual is closely linked".<ref>[http://www.globalsecurity.org/wmd/systems/nuclear-football.htm The Football] {{Webarchive|url=https://web.archive.org/web/20050415200654/http://www.globalsecurity.org/wmd/systems/nuclear-football.htm |date=April 15, 2005 }}, GlobalSecurity.org</ref><ref name="dtic.mil-5210.87">[https://web.archive.org/web/20110322211346/http://www.dtic.mil/whs/directives/corres/pdf/521087p.pdf Selection of DoD Military and Civilian Personnel and Contractor Employees for Assignment to Presidential Support Activities (PSAs)], Department of Defense Instruction No. 5210.87 (November 30, 1998).</ref>


Also, they must not have traveled (save while in government employ and at the instructions of the United States) to countries that are considered to be unfriendly to the United States.{{Citation needed|date=April 2010}} Yankee White cleared personnel are granted access to any information for which they have a need to know, regardless of which organization classified it or at what level.{{Citation needed|date=April 2010}}
The Department of Energy security clearance required to access Top Secret Restricted Data, Formerly Restricted Data, and National Security Information, as well as Secret Restricted Data, is a [[Q clearance]]. The lower-level [[L clearance]] is sufficient for access to Secret Formerly Restricted Data and National Security Information, as well as Confidential Restricted Data and Formerly Restricted Data.<ref>Los Alamos National Laboratory, [http://www.lanl.gov/security/clearances/index.shtml Clearance Processing] {{webarchive|url=https://web.archive.org/web/20061011093349/http://www.lanl.gov/security/clearances/index.shtml |date=October 11, 2006 }}. Retrieved December 15, 2006.</ref> In practice, access to Restricted Data is granted, on a need-to-know basis, to personnel with appropriate clearances. At one time, a person might hold both a TS and a Q clearance, but that duplication and cost is no longer required. For all practical purposes, Q is equivalent to Top Secret, and L is equivalent to Secret.


Access to certain information compartments, especially intelligence-related, may require a [[polygraph]] examination, and though the use of the polygraph is controversial, it is part of the suitability process for some agencies.
Contrary to popular lore, the [[Yankee White]] clearance given to personnel who work directly with the President is not a classification. Individuals having Yankee White clearances undergo extensive background investigations. The criteria include U.S. citizenship, unquestionable loyalty, and an absolute absence of any foreign influence over the individual, his family, or "persons to whom the individual is closely linked".<ref>[http://www.globalsecurity.org/wmd/systems/nuclear-football.htm The Football], GlobalSecurity.org</ref><ref name="dtic.mil-5210.87">[http://www.dtic.mil/whs/directives/corres/pdf/521087p.pdf Selection of DoD Military and Civilian Personnel and Contractor Employees for Assignment to Presidential Support Activities (PSAs)], Department of Defense Instruction No. 5210.87 (November 30, 1998).</ref> Also, they must not have traveled (save while in government employ and at the instructions of the United States) to countries that are considered to be unfriendly to the United States.{{Citation needed|date=April 2010}} Yankee White cleared personnel are granted access to any information for which they have a need to know, regardless of which organization classified it or at what level.{{Citation needed|date=April 2010}}


==Standard form 312==
See also the Single Scope Background Investigation below, along with explicit compartmented access indoctrination. Some compartments, especially intelligence-related, may require a [[polygraph]] examination, although the reliability of the polygraph is controversial. The NSA uses the polygraph early in the clearance process{{Citation needed|date=May 2016}} while the CIA uses it at the end, which may suggest divergent opinions on the proper use of the polygraph.
'''Standard Form 312 (SF 312)''' is a [[non-disclosure agreement]] required under [[Executive Order 13292]] to be signed by employees of the U.S. Federal Government or one of its contractors when they are granted a security clearance for access to [[classified information]]. The form is issued by the [[Information Security Oversight Office]] of the [[National Archives and Records Administration]] and its title is "Classified Information Nondisclosure Agreement." SF 312 prohibits confirming or repeating classified information to unauthorized individuals, even if that information is already leaked. The SF 312 replaces the earlier forms SF 189 or the SF 189-A. Enforcement of SF-312 is limited to civil actions to [[injunction|enjoin]] disclosure or seek monetary damages and administrative sanctions, "including reprimand, suspension, demotion or removal, in addition to the likely loss of the security clearance."<ref>*[https://www.archives.gov/isoo/security-forms/sf312.pdf Standard Form 312] {{Webarchive|url=https://web.archive.org/web/20160610201410/http://www.archives.gov/isoo/security-forms/sf312.pdf |date=June 10, 2016 }}
* [https://www.archives.gov/isoo/training/standard-form-312.html SF 312 briefing booklet] {{Webarchive|url=https://web.archive.org/web/20190110140827/https://www.archives.gov/isoo/training/standard-form-312.html |date=January 10, 2019 }}
* [https://www.archives.gov/isoo/ Information Security Oversight Office (ISOO)] {{Webarchive|url=https://web.archive.org/web/20170823162311/https://www.archives.gov/isoo |date=August 23, 2017 }}</ref>


==Categories that are not classifications==
==Categories that are not classifications==
[[compartmentalization (information security)|Compartments]] also exist, that employ [[code name|code words]] pertaining to specific projects and are used to more easily manage individual access requirements. Code words are not levels of classification themselves, but a person working on a project may have the code word for that project added to his file, and then will be given access to the relevant documents. Code words may also label the sources of various documents; for example, code words are used to indicate that a document may break the cover of intelligence operatives if its content becomes known. The [[World War II|WWII]] code word ''[[Ultra (cryptography)|Ultra]]'' identified information found by decrypting German ciphers, such as the [[Enigma machine]], and which—regardless of its own significance—might inform the Germans that Enigma was broken if they became aware that it was known.
[[compartmentalization (information security)|Compartments]] also exist, that employ [[code name|code words]] pertaining to specific projects and are used to more easily manage individual access requirements. Code words are not levels of classification themselves, but a person working on a project may have the code word for that project added to their file, and then will be given access to the relevant documents. Code words may also label the sources of various documents; for example, code words are used to indicate that a document may break the cover of intelligence operatives if its content becomes known. The World War II code word ''[[Ultra (cryptography)|Ultra]]'' identified information found by decrypting German ciphers, such as the [[Enigma machine]], and which—regardless of its own significance—might inform the Germans that Enigma was broken if they became aware that it was known.


===Sensitive Compartmented Information (SCI) and Special Access Programs (SAP)===
===Sensitive Compartmented Information (SCI) and Special Access Programs (SAP)===
The terms "[[Sensitive Compartmented Information]]" (SCI)<ref>{{cite web |author=Director of Central Intelligence |title=Director of Central Intelligence Directive 1/7: Security Controls on the Dissemination of Intelligence Information |date=June 1998 |url=https://fas.org/irp/offdocs/dcid1-7.html |id=sci |access-date=September 30, 2007 |author-link=Director of Central Intelligence |archive-date=October 21, 2007 |archive-url=https://web.archive.org/web/20071021000357/http://fas.org/irp/offdocs/dcid1-7.html |url-status=live }}</ref><ref name=autogenerated1>{{cite web |url=http://www.dtic.mil/whs/directives/corres/pdf/510521m_vol3.pdf |archive-url=https://web.archive.org/web/20130309104905/http://www.dtic.mil/whs/directives/corres/pdf/510521m_vol3.pdf |url-status=dead |archive-date=March 9, 2013 |title=Directives Division |website=www.dtic.mil |access-date=April 5, 2018}}</ref> and "[[Special Access Program]]" (SAP)<ref>{{cite web |author=United States Department of Defense |title=Department of Defense Overprint to the National Industrial Security Program |date=February 1995 |url=https://fas.org/sgp/library/nispom_dod_overprint.pdf |id=nispom |access-date=April 4, 2015 |archive-date=January 7, 2016 |archive-url=https://web.archive.org/web/20160107170557/http://www.fas.org/sgp/library/nispom_dod_overprint.pdf |url-status=live }}</ref> are widely misunderstood as classification levels or specific clearances.
The terms "[[Sensitive Compartmented Information]]" (SCI)<ref>{{cite web
| author = [[Director of Central Intelligence]]
| title = Director of Central Intelligence Directive 1/7: Security Controls on the Dissemination of Intelligence Information
| date=June 1998
| url = https://fas.org/irp/offdocs/dcid1-7.html
| id = sci
| accessdate = September 30, 2007}}</ref><ref name=autogenerated1>{{cite web|url=http://www.dtic.mil/whs/directives/corres/pdf/510521m_vol3.pdf|title=Directives Division|author=|date=|website=www.dtic.mil|accessdate=April 5, 2018}}</ref> and "[[Special Access Program]]" (SAP)<ref>{{cite web
| author = United States Department of Defense
| title = Department of Defense Overprint to the National Industrial Security Program
| date=February 1995
| url = https://fas.org/sgp/library/nispom_dod_overprint.pdf
| format=PDF| id = nispom
}}</ref> are widely misunderstood as classification levels or specific clearances.


In fact, the terms refer to methods of handling certain types of classified information that relate to specific national-security topics or programs (whose existence may not be publicly acknowledged) or the sensitive nature of which requires special handling, and thereby those accessing it require special approval to access it.
In fact, the terms refer to methods of handling certain types of classified information that relate to specific national-security topics or programs (whose existence may not be publicly acknowledged) or the sensitive nature of which requires special handling, and thereby those accessing it require special approval to access it.
Line 182: Line 199:
The paradigms for these two categories, SCI originating in the intelligence community and SAP in the Department of Defense, formalize 'Need to Know' and addresses two key logistical issues encountered in the day-to-day control of classified information:
The paradigms for these two categories, SCI originating in the intelligence community and SAP in the Department of Defense, formalize 'Need to Know' and addresses two key logistical issues encountered in the day-to-day control of classified information:


:* Individuals with a legitimate need to know may not be able to function effectively without knowing certain facts about their work. However, granting all such individuals a blanket DoD clearance (often known as a "collateral" clearance) at the Top Secret level would be undesirable, not to mention prohibitively expensive.
:*Individuals with a legitimate need to know may not be able to function effectively without knowing certain facts about their work. However, granting all such individuals a blanket DoD clearance (often known as a "collateral" clearance) at the Top Secret level would be undesirable, not to mention prohibitively expensive.


:* The government may wish to limit certain types of sensitive information only to those who work directly on related programs, regardless of the collateral clearance they hold. Thus, even someone with a Top Secret clearance cannot gain access to its Confidential information unless it is specifically granted.
:*The government may wish to limit certain types of sensitive information only to those who work directly on related programs, regardless of the collateral clearance they hold. Thus, even someone with a Top Secret clearance cannot gain access to its Confidential information unless it is specifically granted.


To be clear, "collateral" simply means one lacks special access (e.g. SCI, SAP, COMSEC, NATO, etc.). Confidential, Secret, and Top Secret are all, by themselves, collateral clearances.<ref>{{cite web|url=https://clearedjobs.net/security-clearance-faqs|title=Security Clearance FAQs - ClearedJobs.Net|author=|date=|website=clearedjobs.net|accessdate=April 5, 2018}}</ref><ref name=autogenerated1 />
To be clear, "collateral" (formerly referred to as General Service or GENSER) simply means one lacks special access (e.g. SCI, SAP, COMSEC, NATO, etc.). Confidential, Secret, and Top Secret are all, by themselves, collateral clearance levels.<ref>{{cite web |url=https://clearedjobs.net/security-clearance-faqs |title=Security Clearance FAQs ClearedJobs.Net |website=clearedjobs.net |access-date=April 5, 2018 |archive-date=April 6, 2018 |archive-url=https://web.archive.org/web/20180406102121/https://clearedjobs.net/security-clearance-faqs |url-status=live }}</ref><ref name=autogenerated1 />


SAP and SCI are usually found at the Top Secret classification, but there is no prohibition of applying such segregation to Confidential and Secret information.<ref>http://www.nicoe.capmed.mil/About%20Us/Shared%20Documents/security_clearance_faq.pdf</ref><ref>{{cite web|url=https://www.gsa.gov/portal/directive/d0/content/536733|title=GSA Clearance Verification-Passing Procedures|author=|date=|website=www.gsa.gov|accessdate=April 5, 2018}}</ref>
SAP and SCI are usually found at the Top Secret classification, but there is no prohibition of applying such segregation to Confidential and Secret information.<ref>{{cite web |url=http://www.nicoe.capmed.mil/About%20Us/Shared%20Documents/security_clearance_faq.pdf |title=Security Clearance Frequently Asked Questions |archive-url=https://web.archive.org/web/20170131015703/http://www.nicoe.capmed.mil/About%20Us/Shared%20Documents/security_clearance_faq.pdf |archive-date=January 31, 2017 |url-status=dead }}</ref><ref>{{cite web |url=https://www.gsa.gov/portal/directive/d0/content/536733 |title=GSA Clearance Verification-Passing Procedures |website=www.gsa.gov |access-date=April 5, 2018 |archive-date=March 16, 2017 |archive-url=https://web.archive.org/web/20170316030231/https://www.gsa.gov/portal/directive/d0/content/536733 |url-status=live }}</ref>


SAP and SCI implementation are roughly equivalent, and it is reasonable to discuss their implementation as one topic. For example, SAP material needs to be stored and used in a facility much like the SCIF described below.
SAP and SCI implementation are roughly equivalent, and it is reasonable to discuss their implementation as one topic. For example, SAP material needs to be stored and used in a facility much like the SCIF described below.
Line 195: Line 212:


====Access to compartmented information====
====Access to compartmented information====
{{Refimprove section|date=September 2008}}
{{More citations needed section|date=September 2008}}
Personnel who require knowledge of SCI or SAP information fall into two general categories:
Personnel who require knowledge of SCI or SAP information fall into two general categories:
* Persons with a need to know
* Persons with a need to know
* Persons with actual access
* Persons with actual access


Access to classified information is not authorized based on clearance status. Access is only permitted to individuals after determining they have a need to know. Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties.
Access to classified information is not authorized based on clearance status. Access is only permitted to individuals after determining they have a need to know.<ref>{{cite web |url=https://www.dcsecurityclearanceconsultants.com/sensitive-compartmented-information.php |title=Does possessing a Top Secret security clearance mean you have a TS/SCI security clearance? |publisher=DC Security Clearance Consultants |access-date=2021-04-05 |archive-date=November 21, 2020 |archive-url=https://web.archive.org/web/20201121200047/https://www.dcsecurityclearanceconsultants.com/sensitive-compartmented-information.php |url-status=live }}</ref> Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties.<ref>{{cite web |title=Glossary: Sensitive Compartmented Information Refresher |url=https://www.cdse.edu/documents/glossary/SCI100-glossary.pdf |website=cdse.edu |access-date=5 April 2021 |archive-date=August 22, 2021 |archive-url=https://web.archive.org/web/20210822220131/https://www.cdse.edu/documents/glossary/SCI100-glossary.pdf |url-status=live }}</ref><ref>{{CodeFedReg|5|1312|23}}</ref>


To achieve selective separation of program information while still allowing full access to those working on the program, a separate compartment, identified by a unique codeword, is created for the information. This entails establishing communication channels, data storage, and work locations (SCIF—[[Sensitive Compartmented Information Facility]]), which are physically and logically separated not only from the unclassified world, but from general Department of Defense classified channels as well.
To achieve selective separation of program information while still allowing full access to those working on the program, a separate compartment, identified by a unique codeword, is created for the information. This entails establishing communication channels, data storage, and work locations (SCIF—[[Sensitive Compartmented Information Facility]]), which are physically and logically separated not only from the unclassified world, but from general Department of Defense classified channels as well.
Line 206: Line 223:
Thus established, all information generated within the compartment is classified according to the general rules above. However, to emphasize that the information is compartmented, all documents are marked with both the classification level and the codeword (and the caveat "Handle via <compartment name> Channels Only", or "Handle via <compartment names> Jointly" if the document contains material from multiple programs).
Thus established, all information generated within the compartment is classified according to the general rules above. However, to emphasize that the information is compartmented, all documents are marked with both the classification level and the codeword (and the caveat "Handle via <compartment name> Channels Only", or "Handle via <compartment names> Jointly" if the document contains material from multiple programs).


[[File:BYEMAN Coversheet.jpg|thumb|right|Cover sheet for information protected by the [[Byeman Control System|BYEMAN control system]]]]
[[File:BYEMAN Coversheet.jpg|thumb|right|A cover sheet for information protected by the [[Byeman Control System|BYEMAN control system]]]]
Examples of such SCI control systems are:<ref>Top Level Telecommunications, [http://electrospaces.blogspot.com/2013/09/the-us-classification-system.html The US Classification System]</ref>
* COMINT or Special Intelligence (SI)
* ENDSEAL (EL)
* TALENT KEYHOLE (TK)
* HUMINT Control System (HCS)
* KLONDIKE (KDK)
* RESERVE (RSV)
* [[BYEMAN]] (BYE or B)

The COMINT control system is for sensitive [[signals intelligence]] information and contains several compartments, like:
* Very Restricted Knowledge (VRK)
* Exceptionally Controlled Information (ECI), which is used by NSA and restricted to very few people.<ref>{{cite web | url=https://www.theguardian.com/commentisfree/2013/sep/06/nsa-surveillance-revelations-encryption-expert-chat | title=Explaining the latest NSA revelations – Q&A with internet privacy experts | publisher=The Guardian newspaper | date=September 6, 2013 | author=Ball, James | accessdate=September 7, 2013}}</ref>
* GAMMA

A person is granted access to a specific compartment after the individual has: (a) had a [[Single Scope Background Investigation]] similar to that required for a collateral Top Secret clearance; (b) been "read into" or briefed on the nature and sensitivity of the compartment; and (c) signed a [[non-disclosure agreement]] (NDA).
A person is granted access to a specific compartment after the individual has: (a) had a [[Single Scope Background Investigation]] similar to that required for a collateral Top Secret clearance; (b) been "read into" or briefed on the nature and sensitivity of the compartment; and (c) signed a [[non-disclosure agreement]] (NDA).


The individual then has access to all information in the compartment, regardless of its classification (and assuming a need to know). However, access does not extend to any other compartment; i.e., there is no single "SCI clearance" analogous to DoD collateral Top Secret. The requirements for DCID 6/4 eligibility (a determination that an individual is eligible for access to SCI), subsumes the requirements for a TS collateral clearance. Being granted DCID 6/4 eligibility includes the simultaneous granting of a TS collateral clearance, as adjudicators are required to adjudicate to the highest level that the investigation (SSBI) supports.
Access does not extend to any other compartment; i.e., there is no single "SCI clearance" analogous to DoD collateral Top Secret. The requirements for DCID 6/4 eligibility (a determination that an individual is eligible for access to SCI), subsumes the requirements for a TS collateral clearance. Being granted DCID 6/4 eligibility includes the simultaneous granting of a TS collateral clearance, as adjudicators are required to adjudicate to the highest level that the investigation (SSBI) supports.

=====Examples=====
{{See also|Sensitive Compartmented Information#Control systems}}
Examples of such control systems and subsystems are:<ref>Top Level Telecommunications, [http://electrospaces.blogspot.com/2013/09/the-us-classification-system.html The US Classification System] {{Webarchive|url=https://web.archive.org/web/20140325075245/http://electrospaces.blogspot.com/2013/09/the-us-classification-system.html |date=March 25, 2014 }}</ref>
* SCI – Sensitive Compartmented Information
** [[BYEMAN]] (BYE or B)
** COMINT or Special Intelligence (SI)
*** Very Restricted Knowledge (VRK)
*** Exceptionally Controlled Information (ECI), which was used to group compartments for highly sensitive information, but was deprecated as of 2011.<ref>NRO Review and Redaction Guide, p. 140.</ref><ref>{{cite web |author=Ball, James |date=September 6, 2013 |title=Explaining the latest NSA revelations – Q&A with internet privacy experts |url=https://www.theguardian.com/commentisfree/2013/sep/06/nsa-surveillance-revelations-encryption-expert-chat |access-date=September 7, 2013 |work=The Guardian |archive-date=September 7, 2013 |archive-url=https://web.archive.org/web/20130907010722/http://www.theguardian.com/commentisfree/2013/sep/06/nsa-surveillance-revelations-encryption-expert-chat |url-status=live }}</ref>
*** GAMMA (SI-G)
** ENDSEAL (EL)
** HUMINT Control System (HCS)
** KLONDIKE (KDK)
** RESERVE (RSV)
** TALENT KEYHOLE (TK)
* SAP – Special Access Programs
** [[Copper Green|COPPER GREEN]]


====Groups of compartmented information====
====Groups of compartmented information====
{{Page numbers needed|section|date=September 2008}}
{{Page numbers needed|section|date=September 2008}}
SAPs in the Department of Defense are subdivided into three further groups, as defined in {{UnitedStatesCodeSub|10|119}}.<ref>{{cite web|url=https://fas.org/sgp/library/nispom.htm |title=National Industrial Security Program Operating Manual |publisher=Fas.org |accessdate=2010-12-01}}</ref>
SAPs in the Department of Defense are subdivided into three further groups, as defined in {{UnitedStatesCodeSub|10|119}}.<ref>{{cite web |url=https://fas.org/sgp/library/nispom.htm |title=National Industrial Security Program Operating Manual |publisher=Fas.org |access-date=2010-12-01 |archive-date=March 26, 2015 |archive-url=https://web.archive.org/web/20150326062508/http://fas.org/sgp/library/nispom.htm |url-status=live }}</ref>


There is no public reference to whether SCI is divided in the same manner, but news reports reflecting that only the [[Gang of Eight (intelligence)|Gang of Eight]] members of Congress are briefed on certain intelligence activities, it may be assumed that similar rules apply for SCI or for programs with overlapping SAP and SCI content.
There is no public reference to whether SCI is divided in the same manner, but news reports reflecting that only the [[Gang of Eight (intelligence)|Gang of Eight]] members of Congress are briefed on certain intelligence activities, it may be assumed that similar rules apply for SCI or for programs with overlapping SAP and SCI content.
Line 233: Line 253:
The groups for Department of Defense SAPs are:
The groups for Department of Defense SAPs are:


:* '''Acknowledged''': appears as a line item as "classified project" or the equivalent in the federal budget, although details of its content are not revealed. The budget element will associate the SAP with a Department of Defense component organization, such as a Military Department (e.g. [[Department of the Navy]]), a Combatant Command (e.g. [[U.S. Special Operations Command]]) or a Defense Agency (e.g. [[Defense Information Systems Agency]].)
:*'''Acknowledged''': appears as a line item as "classified project" or the equivalent in the federal budget, although details of its content are not revealed. The budget element will associate the SAP with a Department of Defense component organization, such as a Military Department (e.g. [[United States Department of the Navy|Department of the Navy]]), a Combatant Command (e.g. [[U.S. Special Operations Command]]) or a Defense Agency (e.g. [[Defense Information Systems Agency]].)
:* '''Unacknowledged''': no reference to such SAPs is found in the publicly published federal budget; its funding is hidden in a classified annex, often called the "black budget". The Congressional defense committees, however, are briefed on the specifics of such SAPs.
:*'''Unacknowledged''': no reference to such SAPs is found in the publicly published federal budget; its funding is hidden in a classified annex, often called the "black budget". The Congressional defense committees, however, are briefed on the specifics of such SAPs.
:* '''Waived''': At the sole discretion of the [[United States Secretary of Defense|Secretary of Defense]], on a case-by-case basis in the interest of national security, there is no mention in the budget at all, and only the "Big 6" members of Congress; the Chairman and Ranking Minority Members of the armed services committees, the appropriations committees and the defense appropriations subcommittees; receive notification of such SAPs.
:*'''Waived''': At the sole discretion of the [[United States Secretary of Defense|Secretary of Defense]], on a case-by-case basis in the interest of national security, there is no mention in the budget at all, and only the "Big 6" members of Congress: the chairman and Ranking Minority Members of the armed services committees, the appropriations committees and the defense appropriations subcommittees; receive notification of such SAPs.


Examples of SCI topics are human intelligence, communications intelligence, and intelligence collected by satellites. One or more compartments may be created for each area, and each of these compartments may contain multiple subcompartments (e.g., a specific HUMINT operation), themselves with their own code names.
Examples of SCI topics are human intelligence, communications intelligence, and intelligence collected by satellites. One or more compartments may be created for each area, and each of these compartments may contain multiple subcompartments (e.g., a specific HUMINT operation), themselves with their own code names.
Line 244: Line 264:


===Handling caveats===
===Handling caveats===
The United States also has a system of restrictive [[:wikt:caveat|caveats]] that can be added to a document: these are constantly changing, but can include (in abbreviated form) a requirement that the document not be shared with a civilian contractor or not leave a specific room. These restrictions are not classifications in and of themselves; rather, they restrict the dissemination of information within those who have the appropriate clearance level and possibly the need to know the information. Remarks such as "Eyes Only" also limit the restriction. One violating these directives might be guilty of violating a lawful order or mishandling classified information.
The United States also has a system of restrictive [[:wikt:caveat|caveats]] that can be added to a document: these are constantly changing, but can include (in abbreviated form) a requirement that the document not be shared with a civilian contractor or not leave a specific room. These restrictions are not classifications in and of themselves; rather, they restrict the dissemination of information within those who have the appropriate clearance level and possibly the need to know the information. Remarks such as "EYES ONLY" and "DO NOT COPY<ref>{{Cite web |url=https://trumpwhitehouse.archives.gov/wp-content/uploads/2019/09/Unclassified09.2019.pdf |via=[[NARA|National Archives]] |work=[[whitehouse.gov]] |title=Memorandum of July 25, 2019, telephone conversation between President Donald Trump and Ukraine President Volodymyr Zelensky |access-date=February 28, 2021 |archive-date=January 20, 2021 |archive-url=https://web.archive.org/web/20210120173711/https://trumpwhitehouse.archives.gov/wp-content/uploads/2019/09/Unclassified09.2019.pdf |url-status=live }}</ref>" also limit the restriction. One violating these directives might be guilty of violating a lawful order or mishandling classified information.


For ease of use, caveats and abbreviations have been adopted that can be included in the summary classification marking (header/footer) to enable the restrictions to be identified at a glance. They are sometimes known as Dissemination Control Abbreviations.<ref name="CIA_1977_ag">{{cite web|url=http://www.foia.cia.gov|title=Agriculture-Related Pollution in the USSR |date=November 1977 |publisher=CIA |accessdate=2010-01-18 }}</ref> Some of these caveats are (or were):
For ease of use, caveats and abbreviations have been adopted that can be included in the summary classification marking (header/footer) to enable the restrictions to be identified at a glance. They are sometimes known as Dissemination Control Abbreviations.
<ref name="CIA_1977_ag">{{cite web |url=https://cia.gov/readingroom/document/0000498553 |title=Agriculture-Related Pollution in the USSR |date=November 1977 |publisher=CIA |access-date=2010-01-18 |archive-date=January 3, 2022 |archive-url=https://web.archive.org/web/20220103164212/https://www.cia.gov/readingroom/document/0000498553 |url-status=live }}</ref> Some of these caveats are (or were):
:*CUI: [[Controlled Unclassified Information]] Replaces the labels [[For Official Use Only]] (FOUO), [[Sensitive But Unclassified]] (SBU), and [[Law Enforcement Sensitive]] (LES).
:*FOUO: [[For Official Use Only]]. Used for documents or products which contain material which is exempt from release under the [[Freedom of Information Act (United States)|Freedom of Information Act.]]
:**FOUO: [[For Official Use Only]]. Superseded by CUI and no longer in use with the exception of Department of Homeland Security documents. Used for documents or products which contain material which is exempt from release under the [[Freedom of Information Act (United States)|Freedom of Information Act.]]
:*NFIBONLY: [[National Foreign Intelligence Board]] Departments Only<ref name="CIA_1977_ag"/>
:*NFIBONLY: [[National Foreign Intelligence Board]] Departments Only<ref name="CIA_1977_ag"/>
:*NOFORN: Distribution to non-US citizens is prohibited, regardless of their clearance or access permissions (NO FOReign National access allowed).
:*NOFORN (NF): Distribution to non-US citizens is prohibited, regardless of their clearance or access permissions (NO FOReign National access allowed).
:*NOCONTRACTOR: Distribution to contractor personnel (non-US-government employees) is prohibited, regardless of their clearance or access permissions.
:*NOCONTRACTOR: Distribution to contractor personnel (non-US-government employees) is prohibited, regardless of their clearance or access permissions.
:*ORCON: Originator controls dissemination and/or release of the document.
:*ORCON (OC), ORCON-USGOV (OC-USGOV): Originator controls dissemination and/or release of the document.
:*RSEN (RS): Risk Sensitive Notice.
:*PROPIN: Caution—[[Proprietary information|Proprietary Information]] Involved<ref name="CIA_1977_ag"/>
:*EXDIS (XD): Exclusive distribution
:*REL<country code(s)>: Distribution to citizens of the countries listed is permitted, providing they have appropriate accesses and need to know. Example: "REL TO USA, AUS, GBR, CAN, NZL" indicates that the information may be shared with appropriate personnel from Australia, the United Kingdom, Canada, and New Zealand.
:*RELIDO: Releasable by Information Disclosure Official
:*PROPIN (PR): Caution—[[Proprietary information|Proprietary Information]] Involved<ref name="CIA_1977_ag" />
:*REL<country code(s)>: Distribution to citizens of the countries listed is permitted, providing they have appropriate accesses and need to know. Example: "REL TO USA, AUS, CAN, GBR, NZL" indicates that the information may be shared with appropriate personnel from Australia, the United Kingdom, Canada, and New Zealand.
:::*FVEY is the country code used as shorthand for the [[Five Eyes]].
:::*FVEY is the country code used as shorthand for the [[Five Eyes]].
:*<nn>X<m>: Information is exempt from automatic declassification (after the statutory default of 25 years) for exemption reason <m>, and declassification review shall not be permitted for <nn> years (as determined by law or the Interagency Security Classification Appeals Panel). For the most part, the exemption reasoning and caveats are outlined in paragraphs (b)–(d) and (g)–(i) of [[s:Executive Order 13526#Sec. 3.3|Sec. 3.3 of Executive Order 13526]], but paragraph (b) is typically the one being referenced as the exemption reason value <m>.
:*<nn>X<m>: Information is exempt from automatic declassification (after the statutory default of 25 years) for exemption reason <m>, and declassification review shall not be permitted for <nn> years (as determined by law or the Interagency Security Classification Appeals Panel). For the most part, the exemption reasoning and caveats are outlined in paragraphs (b)–(d) and (g)–(i) of [[s:Executive Order 13526#Sec. 3.3|Sec. 3.3 of Executive Order 13526]], but paragraph (b) is typically the one being referenced as the exemption reason value <m>.
::''Example'': "50X1" indicates the information must remain classified for 50 years, since it pertains to intelligence activities, sources, or methods (reason (1) of Section 3.3, paragraph (b)).
::''Example'': "50X1" indicates the information must remain classified for 50 years, since it pertains to intelligence activities, sources, or methods (reason (1) of Section 3.3, paragraph (b)).
:*RESTRICTED: Distribution to non-US citizens or those holding an interim clearance is prohibited; certain other special handling procedures apply.
:*RESTRICTED: Distribution to non-US citizens or those holding an interim clearance is prohibited; certain other special handling procedures apply.
:*[[Foreign Intelligence Surveillance Act|FISA]]: is used in [[FISC]]<ref>{{cite web |title=United States Senate Committee on the Judiciary |url=https://www.judiciary.senate.gov/download/fisa-warrant-application-for-carter-page-renewal-one |website=www.judiciary.senate.gov |access-date=19 April 2020 |archive-date=June 24, 2020 |archive-url=https://web.archive.org/web/20200624204601/https://www.judiciary.senate.gov/download/fisa-warrant-application-for-carter-page-renewal-one |url-status=live }}</ref> and probably in [[FISCR]] since at least 2017.<ref>{{cite web |title=The Office of the Director of National Intelligence Classification Guide |url=https://www.dni.gov/files/documents/FOIA/DF-2015-00044%20(Doc1).pdf |website=www.dni.gov |access-date=20 April 2020 |quote=When used, the "FISA" control marking shall be included in the banner. |archive-date=May 16, 2020 |archive-url=https://web.archive.org/web/20200516072713/https://www.dni.gov/files/documents/FOIA/DF-2015-00044%20(Doc1).pdf |url-status=live }}</ref>


Classification level and caveats are typically separated by "//" in the summary classification marking. For example, the final summary marking of a document might be:
Classification level and caveats are typically separated by "//" in the summary classification marking. For example, the final summary marking of a document might be:
Line 263: Line 289:
<blockquote>
<blockquote>
SECRET//<compartment name>//ORCON/NOFORN
SECRET//<compartment name>//ORCON/NOFORN
</blockquote> or
<blockquote>
TOP SECRET//NOFORN/FISA<ref>{{cite web |title=Semiannual Assessment of Compliance with Procedures and Guidelines Issued Pursuant to Section 702 of the Foreign Intelligence Surveillance Act, Submitted by the Attorney General and the Director of National Intelligence |url=https://www.dni.gov/files/icotr/18th_Joint_Assessment.pdf |access-date=20 April 2020 |archive-date=June 24, 2020 |archive-url=https://web.archive.org/web/20200624204604/https://www.dni.gov/files/icotr/18th_Joint_Assessment.pdf |url-status=live }}</ref>
</blockquote>
</blockquote>


Line 269: Line 298:


The [[U.S. Department of Energy]] recognizes two types of Restricted Data:<ref>Los Alamos National Laboratory, [http://www.hr.lanl.gov/SCourses/All/PortionMarking/define.htm ''Guide to Portion Marking Documents and Material'', Appendix B, Definitions] {{webarchive |url=https://web.archive.org/web/20061011093350/http://www.hr.lanl.gov/SCourses/All/PortionMarking/define.htm |date=October 11, 2006 }}. Retrieved December 15, 2006.</ref>
The [[U.S. Department of Energy]] recognizes two types of Restricted Data:<ref>Los Alamos National Laboratory, [http://www.hr.lanl.gov/SCourses/All/PortionMarking/define.htm ''Guide to Portion Marking Documents and Material'', Appendix B, Definitions] {{webarchive |url=https://web.archive.org/web/20061011093350/http://www.hr.lanl.gov/SCourses/All/PortionMarking/define.htm |date=October 11, 2006 }}. Retrieved December 15, 2006.</ref>
* '''Restricted Data.''' Data concerning the design, manufacture, or utilization of atomic weapons; production of special nuclear material; or use of special nuclear material in the production of energy.
* '''Restricted Data.''' Data concerning the design, manufacture, or utilization of atomic weapons; production of special nuclear material; or use of special nuclear material in the production of energy. RD-SIGMA-#, # represents the SIGMA number which may be 14, 15, 18, or 20.
* '''Formerly Restricted Data.''' Classified information jointly determined by the DOE and the Department of Defense to be related primarily to the military utilization of atomic weapons and removed from the Restricted Data category.
* '''Formerly Restricted Data.''' Classified information jointly determined by the DOE and the Department of Defense to be related primarily to the military utilization of atomic weapons and removed from the Restricted Data category. FRD-SIGMA-#, # represents the SIGMA number which may be 14, 15, 18, or 20.


Documents containing such information must be marked "RESTRICTED DATA" (RD) or "FORMERLY RESTRICTED DATA" (FRD) in addition to any other classification marking. Restricted Data and Formerly Restricted Data are further categorized as Top Secret, Secret, or Confidential.
Documents containing such information must be marked "RESTRICTED DATA" (RD) or "FORMERLY RESTRICTED DATA" (FRD) in addition to any other classification marking. Restricted Data and Formerly Restricted Data are further categorized as Top Secret, Secret, or Confidential.


====SIGMA categories and Critical Nuclear Weapon Design Information====
====SIGMA categories and Critical Nuclear Weapon Design Information====
RESTRICTED DATA contains further compartments. The Department of Energy establishes a list of SIGMA Categories<ref>{{cite web
RESTRICTED DATA contains further compartments. The Department of Energy establishes a list of SIGMA Categories<ref>{{cite web |title=[no title, apparent extract from University of California laboratory security briefing] |publisher=University of California |date=n.d. |url=http://labs.ucop.edu/internet/security/brief04/docs/sigmas.pdf |id=sigmas |access-date=2007-09-30 |archive-url=https://web.archive.org/web/20060908141749/http://labs.ucop.edu/internet/security/brief04/docs/sigmas.pdf |archive-date=2006-09-08}}</ref> for more fine-grained control than RESTRICTED DATA.
[[Critical Nuclear Weapon Design Information]] (CNWDI, colloquially pronounced ''"Sin-Widdy"'') reveals the theory of operation or design of the components of a nuclear weapon. As such, it would be SIGMA 1 or SIGMA 2 material, assuming [[laser fusion]] is not involved in the information.
| title = [no title, apparent extract from University of California laboratory security briefing]
| work =
| publisher = University of California
| date = n.d.
| url = http://labs.ucop.edu/internet/security/brief04/docs/sigmas.pdf
|format=PDF| id = sigmas
| accessdate = 2007-09-30 |archiveurl = https://web.archive.org/web/20060908141749/http://labs.ucop.edu/internet/security/brief04/docs/sigmas.pdf |archivedate = 2006-09-08}}</ref> for more fine-grained control than RESTRICTED DATA.
[[Critical Nuclear Weapon Design Information]] (CNWDI, colloquially pronounced ''"Sin-Widdy"'') reveals the theory of operation or design of the components of a nuclear weapon. As such, it would be SIGMA 1 or SIGMA 2 {{Harv | sigmas}} material, assuming [[laser fusion]] is not involved in the information.


Access to CNWDI is supposed to be kept to the minimum number of individuals needed. In written documents, paragraphs containing the material, assuming it is Top Secret, would be marked (TS//RD-CNWDI). SIGMA information of special sensitivity may be handled much like SAP or SCI material (q.v.)
Access to CNWDI is supposed to be kept to the minimum number of individuals needed. In written documents, paragraphs containing the material, assuming it is Top Secret, would be marked (TS//RD-CNWDI). SIGMA information of special sensitivity may be handled much like SAP or SCI material (q.v.)


====Naval Nuclear Propulsion Information====
====Naval Nuclear Propulsion Information====
While most [[Naval Nuclear Propulsion Information]] is sensitive, it may or may not be classified. The desired power densities of naval reactors make their design peculiar to military use, specifically high-displacement, high-speed vessels. The proliferation of quieter- or higher-performance marine propulsion systems presents a national-security threat to the United States. Due to this fact, all but the most basic information concerning NNPI is classified. The [[United States Navy]] recognizes that the public has an interest in environmental, safety, and health information, and that the basic research the Navy carries out can be useful to industry.{{Citation needed|date=March 2009}}
While most Naval Nuclear Propulsion Information is sensitive, it may or may not be classified. The desired power densities of naval reactors make their design peculiar to military use, specifically high-displacement, high-speed vessels. The proliferation of quieter- or higher-performance marine propulsion systems presents a national-security threat to the United States. Due to this fact, all but the most basic information concerning NNPI is classified. The United States Navy recognizes that the public has an interest in environmental, safety, and health information, and that the basic research the Navy carries out can be useful to industry.{{Citation needed|date=March 2009}}


==Sharing of classified information with other countries==
==Sharing of classified information with other countries==
In cases where the United States wishes to share classified information bilaterally (or multilaterally) with a country that has a sharing agreement, the information is marked with "REL TO USA", (release) and the three-letter country code.<ref>See the WATERWITCH document at right for an example of a document marked REL TO USA, FVEY</ref> For example, if the U.S. wanted to release classified information to the government of [[Canada]], it would mark the document "REL TO USA, CAN". There are also group releases, such as [[NATO]], [[Five Eyes|FVEY]] or [[UKUSA Agreement|UKUSA]]. Those countries would have to maintain the classification of the document at the level originally classified (Top Secret, Secret, etc.).{{citation needed|date=August 2017}}
In cases where the United States wishes to share classified information bilaterally (or multilaterally) with a country that has a sharing agreement, the information is marked with "REL TO USA", (release) and the three-letter country code.<ref>See the WATERWITCH document at right for an example of a document marked REL TO USA, FVEY</ref> For example, if the U.S. wanted to release classified information to the government of Canada, it would mark the document "REL TO USA, CAN". There are also group releases, such as [[NATO]], [[Five Eyes|FVEY]] or [[UKUSA Agreement|UKUSA]]. Those countries would have to maintain the classification of the document at the level originally classified (Top Secret, Secret, etc.).{{citation needed|date=August 2017}}


==Claims of U.S. government misuse of the classification system==
==Claims of U.S. government misuse of the classification system==


{{quote box|quote=It is desired that no document be released which refers to [[Unethical human experimentation in the United States|experiments with humans]] and might have adverse effect on public opinion or result in legal suits. Documents covering such work field should be [[classified information|classified]] 'secret'.|source= —April 17, 1947 Atomic Energy Commission memo from Colonel O. G. Haywood, Jr. to Dr. Fidler at the Oak Ridge Laboratory in Tennessee<ref>[https://www.gwu.edu/~nsarchiv/radiation/dir/mstreet/commeet/meet9/brief9/tab_i/br9i2.txt Atomic Energy Commission's Declassification Review of Reports on Human Experiments and the Public Relations and Legal Liability Consequences] {{webarchive|url=https://web.archive.org/web/20130606120441/https://www.gwu.edu/~nsarchiv/radiation/dir/mstreet/commeet/meet9/brief9/tab_i/br9i2.txt |date=June 6, 2013 }}, presented as evidence during the 1994 ACHRE hearings.</ref>|width=25%}}
{{quote box|quote=It is desired that no document be released which refers to [[Unethical human experimentation in the United States|experiments with humans]] and might have adverse effect on public opinion or result in legal suits. Documents covering such work field should be [[classified information|classified]] 'secret'.|source=—April 17, 1947 Atomic Energy Commission memo from Colonel O. G. Haywood Jr. to Dr. Fidler at the Oak Ridge Laboratory in Tennessee<ref>[https://www.gwu.edu/~nsarchiv/radiation/dir/mstreet/commeet/meet9/brief9/tab_i/br9i2.txt Atomic Energy Commission's Declassification Review of Reports on Human Experiments and the Public Relations and Legal Liability Consequences] {{webarchive |url=https://web.archive.org/web/20130606120441/https://www.gwu.edu/~nsarchiv/radiation/dir/mstreet/commeet/meet9/brief9/tab_i/br9i2.txt |date=June 6, 2013 }}, presented as evidence during the 1994 ACHRE hearings.</ref>|width=25%}}

{{See also| Moynihan Commission on Government Secrecy }}
[[Max Weber]]:


{{See also|Moynihan Commission on Government Secrecy }}
<blockquote>Every bureaucracy strives to increase the superiority of its position by keeping its knowledge and intentions secret. Bureaucratic administration always seeks to evade the light of the public as best it can, because in so doing it shields its knowledge and conduct from criticism ...<ref>[http://www.harpers.org/archive/2009/07/hbc-90005393 "Weber—‘Official Secrets’ and Bureaucratic Warfare"], ''Harper's'', July 18, 2009</ref></blockquote>


===Excessive secrecy===
While the classification of information by the government is not supposed to be used to prevent information from being made public that would be simply embarrassing or reveal criminal acts, it has been alleged that the government routinely misuses the classification system to cover up criminal activity and the potentially embarrassing.
While the classification of information by the government is not supposed to be used to prevent information from being made public that would be simply embarrassing or reveal criminal acts, it has been alleged that the government routinely misuses the classification system to cover up criminal activity and potentially embarrassing discoveries.


[[Steven Aftergood]], director of the Project on Government Secrecy at the [[Federation of American Scientists]] notes that
[[Steven Aftergood]], director of the Project on Government Secrecy at the [[Federation of American Scientists]] notes that


<blockquote>... inquiring into classified government information and disclosing it is something that many national security reporters and policy analysts do, or try to do, every day. And with a few narrow exceptions—for particularly sensitive types of information—courts have determined that this is not a crime." Aftergood notes, "The universe of classified information includes not only genuine national security secrets, such as confidential intelligence sources or advanced military technologies, but an endless supply of mundane bureaucratic trivia, such as 50-year-old intelligence budget figures, as well as the occasional crime or cover-up.<ref>{{cite web
<blockquote>... inquiring into classified government information and disclosing it is something that many national security reporters and policy analysts do, or try to do, every day. And with a few narrow exceptions—for particularly sensitive types of information—courts have determined that this is not a crime." Aftergood notes, "The universe of classified information includes not only genuine national security secrets, such as confidential intelligence sources or advanced military technologies, but an endless supply of mundane bureaucratic trivia, such as 50-year-old intelligence budget figures, as well as the occasional crime or cover-up.<ref>{{cite web |url=http://niemanreports.org/articles/classified-documents-secrecy-vs-citizenship/ |title=Classified Documents: Secrecy vs. Citizenship |first=Steven |last=Aftergood |publisher=Nieman Foundation for Journalism at [[Harvard University]] |date=Spring 2008 |access-date=2008-04-16 |archive-url=https://web.archive.org/web/20181009043840/https://niemanreports.org/articles/classified-documents-secrecy-vs-citizenship/ |archive-date=October 9, 2018}}</ref></blockquote>
|url=http://niemanreports.org/articles/classified-documents-secrecy-vs-citizenship/
|title=Classified Documents: Secrecy vs. Citizenship
|first=Steven
|last=Aftergood
|publisher=Nieman Foundation for Journalism at [[Harvard University]]
|date=Spring 2008
|accessdate=2008-04-16
|archiveurl=https://web.archive.org/web/20181009043840/https://niemanreports.org/articles/classified-documents-secrecy-vs-citizenship/
|archivedate=October 9, 2018
}}</ref></blockquote>


The [[National Security Archive]] has collected a number of examples of overclassification and government censors blacking out documents that have already been released in full, or redacting entirely different parts of the same document at different times.
As early as 1956, the U.S. Department of Defense estimated that 90% of its classified documents could be publicly disclosed with no harm to national security.<ref>Monte Reel, "A Brotherhood of Spies: The U2 and the CIA's Secret War", (New York: Anchor Books, 2019), p. 71</ref> The [[National Security Archive]] has collected a number of examples of overclassification and government censors blacking out documents that have already been released in full, or redacting entirely different parts of the same document at different times.
<ref>{{cite web |url=https://nsarchive.gwu.edu/briefing-book/foia/2019-04-18/redactions-declassified-file |title=Redactions: The Declassified File |author=Byrne, Malcolm |date=2019-04-18 |df=mdy-all |access-date=April 18, 2019 |archive-date=April 18, 2019 |archive-url=https://web.archive.org/web/20190418143352/https://nsarchive.gwu.edu/briefing-book/foia/2019-04-18/redactions-declassified-file |url-status=live }}</ref> In a similar vein, an official named William G. Florence, who for decades had a major role in writing the secrecy regulations and classification system for the Pentagon, in 1971 testified to Congress that at most 5% of information labeled classified, confidential, secret, or top secret really merited such designation at the time it was so designated, and that 3–4 years later only a tenth of that 5% still deserved such designation, according to an account of the testimony by Pentagon [[whistleblower]] [[Daniel Ellsberg]].<ref>Past@Present blog of University of Massachusetts, Department of History, 28 Oct. 2019 [https://umasshistory.wordpress.com/2019/10/28/my-papers-at-umass-show-how-much-is-concealed-from-the-public-scholars-and-congress/ "My Papers at UMass Show How Much Is Concealed From the Public, Scholars, and Congress"]</ref>
<ref>{{cite web
| url = https://nsarchive.gwu.edu/briefing-book/foia/2019-04-18/redactions-declassified-file
| title = Redactions: The Declassified File
| author = Byrne, Malcolm
| date = 2019-04-18
| df = mdy-all
}}</ref>


===Prosecution for disclosing classified information===
In [[The Pentagon Papers]] case, a classified study was published revealing that four administrations had misled the American public about their intentions in the [[Vietnam War]], increasing the [[credibility gap]]. Russo and Ellsberg were prosecuted under Espionage Law. The case prompted Harold Edgar & Benno C. Schmidt, Jr. to write a review of Espionage law in the 1973 ''Columbia Law Review''. Their article was entitled "The Espionage Statutes and Publication of Defense Information". In it, they point out that Espionage law '''does not criminalize classified information''', only '''national defense''' information. They point out that Congress has repeatedly resisted or failed to make the disclosing of classified information illegal, in and of itself. Instead, Congress has strictly limited which sort of classified information is illegal, and under which specific circumstances it is illegal. i.e. in {{uscsub|18|798}} Congress specifically criminalized leaking cryptographic information that is classified, but when it passed the law it specifically stated the law didn't criminalize disclosing other types of classified information.<ref name=edgsch>The Edgar & Schmidt 1973 ''Columbia Law Review'', "The Espionage Statutes and Publication of Defense Information". The article is available online at https://fas.org/sgp/library/</ref> Another article that discusses the issue is by Jennifer Elsea of the Congressional Research Service.<ref name=elsea>[https://fas.org/sgp/crs/secrecy/R41404.pdf Jennifer Elsea], January 2013, "Criminal Prohibitions on the Publication of Classified Defense Information"</ref>
In the [[Pentagon Papers]] case, a classified study was published revealing that four administrations had misled the American public about their intentions in the [[Vietnam War]], increasing the [[credibility gap]]. [[Tony Russo (whistleblower)|Tony Russo]] and [[Daniel Ellsberg]] were prosecuted under espionage law. The case prompted Harold Edgar & [[Benno C. Schmidt Jr.]] to write a review of espionage law in the 1973 ''Columbia Law Review''. Their article was entitled "The Espionage Statutes and Publication of Defense Information". In it, they point out that espionage law does not criminalize classified information, only national defense information. They point out that Congress has repeatedly resisted or failed to make the disclosing of classified information illegal, in and of itself. Instead, Congress has strictly limited which sort of classified information is illegal, and under which specific circumstances it is illegal. i.e. in {{uscsub|18|798}} Congress specifically criminalized leaking cryptographic information that is classified, but when it passed the law it specifically stated the law did not criminalize disclosing other types of classified information.<ref name=edgsch>The Edgar & Schmidt 1973 ''Columbia Law Review'', "The Espionage Statutes and Publication of Defense Information". The article is available online at https://fas.org/sgp/library/ {{Webarchive|url=https://web.archive.org/web/20210125223729/https://fas.org/sgp/library/ |date=January 25, 2021 }}</ref> Another article that discusses the issue is by Jennifer Elsea of the Congressional Research Service.<ref name=elsea>[https://fas.org/sgp/crs/secrecy/R41404.pdf Jennifer Elsea] {{Webarchive|url=https://web.archive.org/web/20190928085324/https://fas.org/sgp/crs/secrecy/R41404.pdf |date=September 28, 2019 }}, January 2013, "Criminal Prohibitions on the Publication of Classified Defense Information"</ref>

Various [[UFO conspiracy theory|UFO conspiracies]] mention a level "Above Top Secret" used for UFO design information and related data. They suggest such a classification is intended to apply to information relating to things whose possible existence is to be denied, such as aliens, as opposed to things whose potential existence may be recognized, but for which access to information regarding specific programs would be denied as classified. The British government, for example, denied for several decades that they were either involved or interested in UFO sightings. However, in 2008, the government revealed they have monitored UFO activity for at least the past 30 years.<ref>{{cite web
|url=http://www.nationalarchives.gov.uk/ufos/
|title=UFOs - The National Archives
|url-status=dead
|archiveurl=https://web.archive.org/web/20181009043543/http://www.nationalarchives.gov.uk/ufos/
|archivedate=October 9, 2018
}}</ref> The existence of an "Above Top Secret" classification is considered by some as unnecessary to keep the existence of aliens a secret, as they say information at the Top Secret level, or any level for that matter, can be restricted on the basis of [[need to know]]. Thus, the U.S. government could conceal an alien project without having to resort to another level of clearance, as need to know would limit the ability to have access to the information. Some suggest that claims of the existence of such a classification level may be based on the unsubstantiated belief that the levels of classification are themselves classified. As such, they feel that books claiming to contain "Above Top Secret" information on UFOs or [[remote viewing]] should arguably be taken with a [[grain of salt]].<ref>{{cite web
|url=http://www.topsecretwriters.com/2009/11/above-top-secret/
|title=Above Top Secret
|first=Ryan
|last=Dube
|publisher=Top Secret Writers
|date=November 2009}}</ref>

Without making a judgment on if such classifications have been used for space aliens, it is a reality that even the names of some compartments were classified, and certainly the meaning of the code names. In the cited document, an (S) means the material it precedes is Secret and (TS) means Top Secret. According to the Department of Defense directive,<ref>{{cite web
| url = https://nsarchive2.gwu.edu/NSAEBB/NSAEBB35/08-01.htm
| title = DoD Directive TS-5105.23 [title originally classified] (S) National Reconnaissance Office
| date = 1964-03-27
| url-status = live
| archiveurl = https://web.archive.org/web/20181009043242/https://nsarchive2.gwu.edu/NSAEBB/NSAEBB35/08-01.htm
| archivedate = October 9, 2018
| df = mdy-all
}}</ref> "the fact of" the existence of [[National Reconnaissance Office|NRO]] was at the secret level for many years, as well as the fact of and the actual phrase "National Reconnaissance Program" (see Paragraph II). Paragraph V(a) is largely redacted, but the introduction<ref>{{cite web
| url = https://nsarchive2.gwu.edu/NSAEBB/NSAEBB35/index.html
| title = The NRO Declassified
| author = Richelson, Jeffrey T.
| date = 2000-09-27
| url-status = live
| archiveurl = https://web.archive.org/web/20181009043330/https://nsarchive2.gwu.edu/NSAEBB/NSAEBB35/index.html
| archivedate = October 9, 2018
| df = mdy-all
}}</ref>
to the documents clarifies (see Document 19) that it refers to the now-cancelled BYEMAN code word and control channel for NRO activities. BYEMAN, the main NRO compartment, was classified as a full word, although the special security offices could refer, in an unclassified way, to "B policy".


==Responsible agencies==
==Responsible agencies==


Any agency designated by the President can originate classified information if it meets the content criteria; each agency is responsible for safeguarding and declassifying its own documents. The [[National Archives and Records Administration]] (NARA) has custody of classified documents from defunct agencies, and also houses the National Declassification Center (since 2010) and [[Information Security Oversight Office]]. The [[Interagency Security Classification Appeals Panel]] has representatives from the Departments of State, Defense, and Justice; the National Archives, the Office of the Director of National Intelligence; the National Security Advisor; the Central Intelligence Agency; and Information Security Oversight Office.<ref>[[Executive Order 13526]], Sec. 5.3.</ref>
Any agency designated by the President can originate classified information if it meets the content criteria. Each agency is responsible for safeguarding and declassifying its own documents. The [[National Archives and Records Administration]] (NARA) has custody of classified documents from defunct agencies, and also houses the National Declassification Center (since 2010) and [[Information Security Oversight Office]]. The [[Interagency Security Classification Appeals Panel]] has representatives from the [[United States Department of State]], United States Department of Justice; the National Archives, the Office of the Director of National Intelligence (DNI); the National Security Advisor (NSA); the Central Intelligence Agency (CIA); and Information Security Oversight Office.<ref>[[Executive Order 13526]], Sec. 5.3.</ref>


==Declassification==
==Declassification==
Line 372: Line 343:


===Automatic declassification===
===Automatic declassification===
In accordance with [[Executive Order 13526]], published January 5, 2010 (which superseded [[Executive Order 12958]], as amended), an executive agency must declassify its documents after 25 years unless they fall under one of the nine narrow exemptions outlined by section 3.3 of the order. Classified documents 25 years or older must be reviewed by any and all agencies that possess an interest in the sensitive information found in the document. Documents classified for longer than 50 years must concern human intelligence sources or weapons of mass destruction, or get special permission.<ref>[[Executive Order 12958]], Section 3.3 (h)</ref> All documents older than 75 years must have special permission.<ref>[[Executive Order 12958]], Section 3.3 (h)(3)</ref>
In accordance with [[Executive Order 13526]], published January 5, 2010 (which superseded [[Executive Order 12958]], as amended), an executive agency must declassify its documents after 25 years unless they fall under one of the nine narrow exemptions outlined by section 3.3 of the order. Classified documents 25 years or older must be reviewed by any and all agencies that possess an interest in the sensitive information found in the document. Documents classified for longer than 50 years must concern human intelligence sources or [[weapons of mass destruction]], or get special permission.<ref>[[Executive Order 12958]], Section 3.3 (h)</ref> All documents older than 75 years must have special permission.<ref>[[Executive Order 12958]], Section 3.3 (h)(3)</ref>

===Systematic declassification===
The Order also requires that agencies establish and conduct a program for systematic declassification review, based on the new and narrower criteria. This only applies to records that are of permanent historical value and less than 25 years old. Section 3.4 of Order 13526, directs agencies to prioritize the systematic review of records based upon the degree of researcher interest and the likelihood of declassification upon review.

=== Mandatory Declassification Review ===
A Mandatory Declassification Review, or MDR, is requested by an individual in an attempt to declassify a document for release to the public. These challenges are presented to the agency whose equity, or "ownership", is invested in the document. Once an MDR request has been submitted to an agency for the review of a particular document, the agency must respond either with an approval, a denial, or the inability to confirm or deny the existence or nonexistence of the requested document. After the initial request, an appeal can be filed with the agency by the requester. If the agency refuses to declassify that document, then a decision from a higher authority can be provided by the appellate panel, the [[Interagency Security Classification Appeals Panel]] (ISCAP).

===Freedom of Information Act===

The U.S. [[Freedom of Information Act (United States)|Freedom of Information Act]] (FOIA) was signed into law by President [[Lyndon B. Johnson]] on July 4, 1966, took effect the following year, and was amended in 1974, 1976, 1986, 1996 and 2002 (in 1974 over President Ford's veto). This act allows for the full or partial disclosure of previously unreleased information and documents controlled by the U.S. government. Any member of the public may ask for a classified document to be declassified and made available for any reason. The requestor is required to specify with reasonable certainty the documents of interest. If the agency refuses to declassify, the decision can be taken to the courts for a review. The FOIA does not guarantee that requested documents will be released; refusals usually fall under one of the nine of the declassification exemptions that protect highly sensitive information.{{Citation needed|date=March 2013}}

===History of National Archives and Records Administration role===

After declassification, the documents from many agencies are accessioned at the [[National Archives and Records Administration]] and put on the open shelves for the public. NARA also reviews documents for declassification.

NARA first established a formal declassification program for records in 1972, and between 1973 and 1996 reviewed nearly 650 million pages of historically valuable federal records related to World War II, the Korean War, and American foreign policy in the 1950s as part of its systematic declassification review program. From 1996 to 2006, NARA had processed and released close to 460 million pages of federal records, working in partnership with the agencies that originated the records. Over the years, NARA has processed more than 1.1 billion pages of national security classified federal records, resulting in the declassification and release of ninety-one percent of the records.{{Citation needed|date=March 2013}}

NARA has also provided significant support to several special projects to review and release federal records on topics of extraordinary public interest such as [[Prisoner of war|POW]]/[[Missing in action|MIAs]] or [[Nazi war crime]]s. Additionally, NARA works closely with reference archivists to ensure that the federal records most in demand by researchers receive priority for declassification review and performs review on demand for individuals who need records that do not fall into a priority category. NARA has improved or developed electronic systems to support declassification, automating some processes and thus ensuring a more complete record of declassification actions. With assistance from the Air Force, NARA established{{when|date=March 2013}} the Interagency Referral Center (IRC) in order to support agencies as they seek access to their equities in federal records at the National Archives at College Park and to ensure that high-demand records are processed first.

In 2009, [[Executive Order 13526]] created the [[National Declassification Center]] at NARA, which also houses the [[Information Security Oversight Office]].

==== Presidential libraries ====

[[Presidential libraries]] hold in excess of 30 million classified pages, including approximately 8 million pages from the administrations of Presidents Hoover through Carter, that were subject to automatic declassification on December 31, 2006. The foreign policy materials in Presidential collections are among the highest-level foreign policy documents in the Federal government and are of significant historical value.

From 1995 to 2006, the national [[Presidential Library]] system reviewed, declassified, and released 1,603,429 pages of presidential materials using systematic guidelines delegated to the Archivist of the United States. NARA has also hosted on-site agency review teams at the Eisenhower, Kennedy, and Ford Presidential Libraries to manage classified equities and all presidential libraries have robust mandatory declassification review programs to support requests of individual researchers.


==See also==
==See also==
* [[Controlled Cryptographic Item]]
* [[Controlled Cryptographic Item]]
* [[Copyright status of work by the U.S. government]]
* [[Copyright status of works by the federal government of the United States]]
* [[Espionage Act of 1917]]
* [[Espionage Act of 1917]]
* [[FAA 1600.2]]
* [[Invention Secrecy Act]]
* [[Invention Secrecy Act]]
* [[List of U.S. security clearance terms]]
* [[List of U.S. security clearance terms]]
* [[McCollum memo]]
* [[McCollum memo]]
* [[Q clearance]]
* ''[[Secrecy News]]'', a newsletter that covers U.S. classification policy
* ''[[Secrecy News]]'', a newsletter that covers U.S. classification policy
* [[Sensitive Compartmented Information]]
* [[Sensitive Security Information]], generally transportation security information such as airport passenger screening or commercial aircraft security
* [[United States diplomatic cables leak]], the leak by [[Chelsea Manning]] via [[WikiLeaks]]
* ''[[United States v. Reynolds]]''
* ''[[United States v. Reynolds]]''
* [[United States diplomatic cables leak]]: This refers to the leak by [[Chelsea Manning]] via [[WikiLeaks]] of thousands of classified documents with many of the markings discussed herein.


== References ==
== References ==
<ref>{{cite web |date=January 2008 |title=Intelligence Community Classification Guidance: Findings and Recommendations Report |url=https://fas.org/sgp/othergov/intel/class.pdf |url-status=live |archive-url=https://web.archive.org/web/20150626161933/http://www.fas.org/sgp/othergov/intel/class.pdf |archive-date=June 26, 2015 |access-date=2008-04-10 |publisher=Office of the Director of National Intelligence}}</ref>


=== Citations ===
=== Citations ===
{{Reflist|colwidth=30em}}
{{Reflist}}


=== Sources ===
=== General and cited sources ===
* [https://www.archives.gov/isoo/ Information Security Oversight Office (ISOO)], a component of the National Archives and Records Administration (NARA)
* [https://www.archives.gov/isoo/ Information Security Oversight Office (ISOO)], a component of the National Archives and Records Administration (NARA)
* [https://www.archives.gov/isoo/policy-documents/ Policy Docs at ISOO], includes [[s:Executive Order 13526|Executive Order 13526]] - Classified National Security Information
* [https://www.archives.gov/isoo/policy-documents/ Policy Docs at ISOO], includes [[s:Executive Order 13526|Executive Order 13526]] Classified National Security Information
* Memorandum of December 29, 2009 - Implementation of Executive Order 13526, ({{USFR|75|733}})
* Memorandum of December 29, 2009 Implementation of Executive Order 13526, ({{USFR|75|733}})
* [[s:Order of December 29, 2009|Order of December 29, 2009]] - Original Classification Authority, ({{USFR|75|735}})
* [[s:Order of December 29, 2009|Order of December 29, 2009]] Original Classification Authority ({{USFR|75|735}})
* Implementing Directive; Final Rule ( 32 C.F.R. Part 2001, {{USFR|75|37254}} ) '''←''' ''rest of E.O. 13526 came into full effect June 25, 2010''
* Implementing Directive; Final Rule ( 32 C.F.R. Part 2001, {{USFR|75|37254}} ) '''←''' ''rest of E.O. 13526 came into full effect June 25, 2010''
* [[Executive Order 12333]], text at [[s:Executive Order 12333|WikiSource]]
* [[Executive Order 12333]], text at [[s:Executive Order 12333|WikiSource]]
Line 428: Line 376:
* [https://web.archive.org/web/20070212054900/http://www.dss.mil/isec/nispom.htm DoD 5220.22-M] [[National Industrial Security Program]] Operating Manual (NISPOM)
* [https://web.archive.org/web/20070212054900/http://www.dss.mil/isec/nispom.htm DoD 5220.22-M] [[National Industrial Security Program]] Operating Manual (NISPOM)
* [https://web.archive.org/web/20040129160954/http://directives.doe.gov/cgi-bin/explcgi?4%3F%3F+%3Cin%3E+series%3Bmaxdocs=300%3BAPP%3Donixdoe%3Bcollection%3Dneword%2Cnewguide%2Cnewmanual%2Cnewpolicy%2Cnewnotice%3BUP%3Dcurrent.html%3BINTERFACE%3D1WINDOW 400 Series DOE Directives by Number] The 400 series of directives is where DOE keeps most security and classification-related items.
* [https://web.archive.org/web/20040129160954/http://directives.doe.gov/cgi-bin/explcgi?4%3F%3F+%3Cin%3E+series%3Bmaxdocs=300%3BAPP%3Donixdoe%3Bcollection%3Dneword%2Cnewguide%2Cnewmanual%2Cnewpolicy%2Cnewnotice%3BUP%3Dcurrent.html%3BINTERFACE%3D1WINDOW 400 Series DOE Directives by Number] The 400 series of directives is where DOE keeps most security and classification-related items.
* [[Atomic Energy Act of 1954]] 42 USC 2168 [https://www.nrc.gov/reading-rm/doc-collections/nuregs/staff/sr0980/ml022200075-vol1.pdf#pagemode=bookmarks&page=14 - The Atomic Energy Act of 1954] pdf at the US Nuclear Regulatory Commission or [http://assembler.law.cornell.edu/uscode/ United States Code] at Cornell University
* [[Atomic Energy Act of 1954]] 42 USC 2168 [https://www.nrc.gov/reading-rm/doc-collections/nuregs/staff/sr0980/ml022200075-vol1.pdf#pagemode=bookmarks&page=14 The Atomic Energy Act of 1954] at the US Nuclear Regulatory Commission
* [[Espionage Act]] 18 USC 793, 794, 798
* [https://fas.org/sgp/bush/cui.html Designation and Sharing of Controlled Unclassified Information (CUI)] – Presidential Memo of May 7, 2008
* [[Espionage Act]] 18 USC 793, 794, 798 - [http://assembler.law.cornell.edu/uscode/ United States Code] at Cornell University
* [https://fas.org/sgp/bush/cui.html Designation and Sharing of Controlled Unclassified Information (CUI)], Presidential Memo of May 7, 2008
* [https://www.archives.gov/declassification/ National Declassification Center]
* [https://www.archives.gov/declassification/ National Declassification Center]

== Further reading ==
* {{Cite book |last=Connelly |first=Matthew |year=2023 |title=The Declassification Engine: What History Reveals About America's Top Secrets |location=New York |publisher=Pantheon Books |isbn=9781101871577 |oclc=1338303992}}


==External links==
==External links==
* [http://electrospaces.blogspot.com/2013/09/the-us-classification-system.html Explanation of the US Classification System]
* [https://www.electrospaces.net/2013/09/the-us-classification-system.html Explanation of the US Classification System]
* [https://www.archives.gov/declassification/pidb Public Interest Declassification Board]
* [https://www.archives.gov/declassification/pidb Public Interest Declassification Board]
* [http://www.usdoj.gov/oip/index.html Department of Justice - Freedom of Information Act]
* [http://www.usdoj.gov/oip/index.html Department of Justice - Freedom of Information Act]
* [https://web.archive.org/web/20070309170625/http://www.defenselink.mil/Pubs/foi/ US Department of Defense - Freedom of Information Act]
* [https://web.archive.org/web/20070309170625/http://www.defenselink.mil/Pubs/foi/ US Department of Defense - Freedom of Information Act]
* [https://nsarchive.gwu.edu/ The National Security Archive]
* [https://nsarchive.gwu.edu/ The National Security Archive]
* [http://www.openthegovernment.org/ Open the Government.org]
* [https://www.openthegovernment.org/ Open the Government.org]
* [https://web.archive.org/web/20080208075325/http://www.fas.org/main/home.jsp Federation of American Scientists]
* [https://web.archive.org/web/20080208075325/http://www.fas.org/main/home.jsp Federation of American Scientists]
* [https://web.archive.org/web/20130109024207/http://ucblibraries.colorado.edu/govpubs/us/declassified.htm Declassified Documents] from ''UCB Libraries GovPubs''
* [https://web.archive.org/web/20130109024207/http://ucblibraries.colorado.edu/govpubs/us/declassified.htm Declassified Documents] from UCB Libraries GovPubs
* [https://fas.org/sgp/crs/secrecy/R41404.pdf Criminal Prohibitions on Leaks and Other Disclosures of Classified Defense Information], Stephen P. Mulligan and Jennifer K. Elsea, [[Congressional Research Service]], March 7, 2017.
* [https://fas.org/sgp/crs/secrecy/R41404.pdf Criminal Prohibitions on Leaks and Other Disclosures of Classified Defense Information], Stephen P. Mulligan and Jennifer K. Elsea, [[Congressional Research Service]], March 7, 2017.
* [https://fas.org/sgp/crs/secrecy/RS21900.pdf The Protection of Classified Information: The Legal Framework], Jennifer K. Elsea, [[Congressional Research Service]], May 18, 2017.
* [https://fas.org/sgp/crs/secrecy/RS21900.pdf The Protection of Classified Information: The Legal Framework], Jennifer K. Elsea, [[Congressional Research Service]], May 18, 2017.

Latest revision as of 07:54, 18 December 2024

The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic of classified information beginning in 1951.[1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.[2]

The desired degree of secrecy about such information is known as its sensitivity. Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret. Each level of classification indicates an increasing degree of sensitivity. Thus, if one holds a Top Secret security clearance, one is allowed to handle information up to the level of Top Secret, including Secret and Confidential information. If one holds a Secret clearance, one may not then handle Top Secret information, but may handle Secret and Confidential classified information.

The United States does not have a British-style Official Secrets Act. Instead, several laws protect classified information, including the Espionage Act of 1917, the Invention Secrecy Act of 1951, the Atomic Energy Act of 1954 and the Intelligence Identities Protection Act of 1982. A 2013 report to Congress noted that the relevant laws have been mostly used to prosecute foreign agents, or those passing classified information to them, and that leaks to the press have rarely been prosecuted.[3] The legislative and executive branches of government, including US presidents, have frequently leaked classified information to journalists.[4][page needed][5][6][7] Congress has repeatedly resisted or failed to pass a law that generally outlaws disclosing classified information. Most espionage law criminalizes only national defense information; only a jury can decide if a given document meets that criterion, and judges have repeatedly said that being "classified" does not necessarily make information become related to the "national defense".[8][9] Furthermore, by law, information may not be classified merely because it would be embarrassing or to cover illegal activity; information may be classified only to protect national security objectives.[10]

The United States over the past decades under the Obama and Clinton administrations has released classified information to foreign governments for diplomatic goodwill, known as declassification diplomacy. Examples include information on Augusto Pinochet to the government of Chile. In October 2015, US Secretary of State John Kerry provided Michelle Bachelet, Chile's president, with a pen drive containing hundreds of newly declassified documents.[11]

A 2007 research report by Harvard history professor Peter Galison, published by the Federation of American Scientists, claimed that the classified universe in the US "is certainly not smaller and very probably is much larger than this unclassified one. ... [And] secrecy ... is a threat to democracy.[12]

Terminology

[edit]
Derivative classification activity 1996–2011

The U.S. government uses the term Controlled Unclassified Information to refer to information that is not Confidential, Secret, or Top Secret, but whose dissemination is still restricted.[13]

Reasons for such restrictions can include export controls, privacy regulations, court orders, and ongoing criminal investigations, as well as national security. Information that was never classified is sometimes referred to as "open source" by those who work in classified activities. Public Safety Sensitive (PSS) refers to information that is similar to Law Enforcement Sensitive but could be shared between the various public safety disciplines (Law Enforcement, Fire, and Emergency Medical Services).

Peter Louis Galison, a historian and Director[14] in the History of Science department at Harvard University, claims that the U.S. Government produces more classified information than unclassified information.[13]

Levels and categories of classification

[edit]

The United States government classifies sensitive information according to the degree which the unauthorized disclosure would damage national security. The three primary levels of classification (from least to greatest) are Confidential, Secret, and Top Secret.[15][16][17][18]

However, even Top Secret clearance does not allow one to access all information at, or below, Top Secret level. Access requires the clearance necessary for the sensitivity of the information, as well as a legitimate need to obtain the information.[19] For example, all US military pilots are required to obtain at least a Secret clearance, but they may only access documents directly related to their orders.

To ensure that only those with a legitimate need to know can access information, classified information may have additional categorizations/markings and access controls that could prevent even someone with a sufficient level of clearance from seeing it. Examples of this include: Special Access Program (SAP), Sensitive Compartmented Information (SCI), Restricted Data (RD), and Alternative or Compensatory Control Measures (ACCM).[20][21][22][23][24][25]

The classification system is governed by Executive Order rather than by law. An exception is information on nuclear weapons, materials and power, where levels of protection are specified in the Atomic Energy Act of 1954, see restricted data. Typically each president will issue a new executive order, either tightening classification or loosening it. The Clinton administration made a major change in the classification system by issuing an executive order that for the first time required all classified documents to be declassified after 25 years unless they were reviewed by the agency that created the information and determined to require continuing classification.[26] Executive Order 13292, issued by President George W. Bush in 2003 relaxed some declassification requirements.

Primary levels

[edit]

Confidential

[edit]

This is the lowest classification level of information obtained by the government. It is defined as information that would "damage" national security if publicly disclosed, again, without the proper authorization.[27]

Examples include information related to military strength and weapons.[28]

During and before World War II, the U.S. had a category of classified information called Restricted, which was below confidential. The U.S. no longer has a Restricted classification, but many other countries and NATO documents do. The U.S. treats Restricted information it receives from other governments as Confidential. The U.S. does use the term restricted data in a completely different way to refer to nuclear secrets, as described below.

Secret

[edit]

This is the second-highest classification. Information is classified Secret when its unauthorized disclosure would cause "serious damage" to national security.[27] Most information that is classified is held at the secret sensitivity.[29][30]

"Examples of serious damage include disruption of foreign relations significantly affecting the national security; significant impairment of a program or policy directly related to the national security; revelation of significant military plans or intelligence operations: compromise of significant military plans or intelligence operations; and compromise of significant scientific or technological developments relating to national security."[28]

Top Secret

[edit]
An example of a U.S. classified document; page 13 of a United States National Security Agency report[31] on the USS Liberty incident, partially declassified and released to the public in July 2003. The original overall classification of the page, "Top Secret" code word UMBRA, is shown at top and bottom. The classification of individual paragraphs and reference titles is shown in parentheses—there are six different levels on this page alone. Notations with leader lines at top and bottom cite statutory authority for not declassifying certain sections.

The highest security classification. "Top Secret shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause 'exceptionally grave damage' to the National Security that the original classification authority is able to identify or describe."[27] As of 2019, around 1.25 million individuals have Top Secret clearance.[32]

"Examples of exceptionally grave damage include armed hostilities against the United States or its allies; disruption of foreign relations vitally affecting the national security; the compromise of vital national defense plans or complex cryptology and communications intelligence systems; the revelation of sensitive intelligence operations, and the disclosure of scientific or technological developments vital to national security."[28]

Additional proscribed categories

[edit]

Top Secret is the highest level of classification. However some information is further categorized/marked by adding a code word so that only those who have been cleared for each code word can see it. A document marked SECRET (CODE WORD) could be viewed only by a person with a secret or top secret clearance and that specific code word clearance.

Special Access Program

[edit]

Executive Order 13526, which forms the legal basis for the U.S. classification system, states that "information may be classified at one of the following three levels", with Top Secret as the highest level (Sec. 1.2). However, this executive order provides for special access programs that further restricted access to a small number of individuals and permit additional security measures (Sec. 4.3). These practices can be compared with (and may have inspired) the concepts multilevel security and role-based access control. U.S. law also has special provisions protecting information related to cryptography (18 USC 798), nuclear weapons and atomic energy (see Controls on atomic-energy information) and the identity of covert intelligence agents (see Intelligence Identities Protection Act).

Sensitive Compartmented Information

[edit]

Classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence.[33][34][35][20]

Restricted Data/Formerly Restricted Data

[edit]

Restricted Data (RD) and Formerly Restricted Data (FRD) are classification markings that concern nuclear information. These are the only two classifications that are established by federal law, being defined by the Atomic Energy Act of 1954. Nuclear information is not automatically declassified after 25 years. Documents with nuclear information covered under the Atomic Energy Act will be marked with a classification level (confidential, secret or top secret) and a restricted data or formerly restricted data marking.[36]

Nuclear information as specified in the act may inadvertently appear in unclassified documents and must be reclassified when discovered. Even documents created by private individuals have been seized for containing nuclear information and classified. Only the Department of Energy may declassify nuclear information.[36]

Most RD and FRD (as well as most classified information in general) are classified at either the Confidential or Secret levels; however they require extra RD/FRD specific clearances in addition to the clearance level.[29]

Unclassified

[edit]

Unclassified is not technically a classification; this is the default and refers to information that can be released to individuals without a clearance. Information that is unclassified is sometimes restricted in its dissemination as Controlled Unclassified Information. For example, the law enforcement bulletins reported by the U.S. media when the United States Department of Homeland Security raised the U.S. terror threat level were usually classified as "U//LES", or "Unclassified – Law Enforcement Sensitive". This information is supposed to be released only to law enforcement agencies (sheriff, police, etc.), but, because the information is unclassified, it is sometimes released to the public as well.

Information that is unclassified but which the government does not believe should be subject to Freedom of Information Act requests is often classified as Controlled Unclassified Information (CUI). In addition to CUI classification, information can be categorized according to its availability to be distributed, e.g., Distribution D may only be released to approved Department of Defense and U.S. Department of Defense contractor personnel.[37]

The statement of NOFORN (meaning "no foreign nationals") is applied to any information that may not be released to any non-U.S. citizen. NOFORN and distribution statements are often used in conjunction with classified information or alone on Sensitive But Unclassified (SBU) information. Documents subject to export controls have a specific warning to that effect. Information which is "personally identifiable" is governed by the Privacy Act of 1974 and is also subject to strict controls regardless of its level of classification.

Finally, information at one level of classification may be "upgraded by aggregation" to a higher level. For example, a specific technical capability of a weapons system might be classified Secret, but the aggregation of all technical capabilities of the system into a single document could be deemed Top Secret.

Use of information restrictions outside the classification system is growing in the U.S. government. In September 2005 J. William Leonard, director of the U.S. National Archives Information Security Oversight Office, was quoted in the press as saying, "No one individual in government can identify all the controlled, unclassified [categories], let alone describe their rules."[38]

Controlled Unclassified Information (CUI)

[edit]

One of the 9/11 Commission findings was that "the government keeps too many secrets." To address this problem, the Commission recommended that '[t]he culture of agencies feeling they own the information they gathered at taxpayer expense must be replaced by a culture in which the agencies instead feel they have a duty ... to repay the taxpayers' investment by making that information available.'"[39]

Due to over 100 designations in use by the U.S. government for unclassified information at the time, President George W. Bush issued a Presidential memorandum on May 9, 2008, in an attempt to consolidate the various designations in use into a new category known as Controlled Unclassified Information (CUI). The CUI categories and subcategories were hoped to serve as the exclusive designations for identifying unclassified information throughout the executive branch not covered by Executive Order 12958 or the Atomic Energy Act of 1954 (as amended, though there is CUI//SP-UCNI now[40]) but still required safeguarding or dissemination controls, pursuant to and consistent with any applicable laws, regulations, and government-wide policies in place at the time. CUI would replace categories such as For Official Use Only (FOUO), Sensitive But Unclassified (SBU) and Law Enforcement Sensitive (LES).[41][42]

The Presidential memorandum also designated the National Archives as responsible for overseeing and managing the implementation of the new CUI framework.[43]

This memorandum has since been rescinded by Executive Order 13556 of November 4, 2010 and the guidelines previously outlined within the memo were expanded upon in a further attempt to improve the management of information across all federal agencies as well as establish a more standard, government-wide program regarding the controlled declassification designation process itself.[44]

The U.S. Congress has attempted to take steps to resolve this, but did not succeed. The U.S. House of Representatives passed the Reducing Information Control Designations Act H.R. 1323 on March 17, 2009. The bill was referred to the Senate Committee on Homeland Security and Governmental Affairs. Because no action was taken in committee[45] and bills expire at the end of every Congress, there is currently no bill to solve unclassified designations.

For Official Use Only (FOUO)

[edit]

Among U.S. government information, FOUO was primarily used by the U.S. Department of Defense as a handling instruction for Controlled Unclassified Information (CUI) which may be exempt from release under exemptions two to nine of the Freedom of Information Act (FOIA).[46] It is one of the various sub-categorizations for strictly unclassified information which, on 24 February 2012, was officially consolidated as CUI.

Other departments continuing the use of this designation include the Department of Homeland Security.[47]

Public Trust

[edit]

According to the Department of Defense, Public Trust is a type of position, not clearance level, though General Services Administration refers to it as clearance level.[18] Certain positions which require access to sensitive information, but not information which is classified, must obtain this designation through a background check. Public Trust Positions can either be moderate-risk or high-risk.[16][48][49]

Proper procedure for classifying U.S. government documents

[edit]

To be properly classified, a classification authority (an individual charged by the U.S. government with the right and responsibility to properly determine the level of classification and the reason for classification) must determine the appropriate classification level, as well as the reason information is to be classified. A determination must be made as to how and when the document will be declassified, and the document marked accordingly. Executive Order 13526 describes the reasons and requirements for information to be classified and declassified (Part 1). Individual agencies within the government develop guidelines for what information is classified and at what level.

The former decision is original classification. A great majority of classified documents are created by derivative classification. For example, if one piece of information, taken from a secret document, is put into a document along with 100 pages of unclassified information, the document, as a whole, will be secret. Proper rules stipulate that every paragraph will bear a classification marking of (U) for Unclassified, (C) for Confidential, (S) for Secret, and (TS) for Top Secret. Therefore, in this example, only one paragraph will have the (S) marking. If the page containing that paragraph is double-sided, the page should be marked SECRET on top and bottom of both sides.[50]

A review of classification policies by the Office of the Director of National Intelligence aimed at developing a uniform classification policy and a single classification guide that could be used by the entire U.S. intelligence community. Significant interagency differences were found that impaired cooperation and performance. The initial ODNI review, completed in January 2008, found that "There appears to be no common understanding of classification levels among the classification guides reviewed by the team, nor any consistent guidance as to what constitutes 'damage,' 'serious damage,' or 'exceptionally grave damage' to national security."[51]

Classification categories

[edit]

Step 3 in the classification process is to assign a reason for the classification. Classification categories are marked by the number "1.4" followed by one or more letters (a) to (h):[50][52]

  • 1.4(a) military plans, weapons systems, or operations;
  • 1.4(b) foreign government information;
  • 1.4(c) intelligence activities, sources, or methods, or cryptology;
  • 1.4(d) foreign relations or foreign activities of the United States, including confidential sources;
  • 1.4(e) scientific, technological or economic matters relating to national security; which includes defense against transnational terrorism;
  • 1.4(f) United States Government programs for safeguarding nuclear materials or facilities;
  • 1.4(g) vulnerabilities or capabilities of systems, installations, infrastructures, projects or plans, or protection services relating to the national security, which includes defense against transnational terrorism; and/or
  • 1.4(h) the development, production, or use of weapons of mass destruction.

Classifying non-government-generated information

[edit]

The Invention Secrecy Act of 1951 allows the suppression of patents (for a limited time) for inventions that threaten national security.

Whether information related to nuclear weapons can constitutionally be "born secret" as provided for by the Atomic Energy Act of 1954 has not been tested in the courts.

Guantanamo Bay detention camp has used a "presumptive classification" system to describe the statements of Guantanamo Bay detainees as classified. When challenged by Ammar al-Baluchi in the Guantanamo military commission hearing the 9/11 case,[53] the prosecution abandoned the practice.[54] Presumptive classification continues in the cases involving the habeas corpus petitions of Guantanamo Bay detainees.

Protecting classified information

[edit]
A GSA-approved security container

Facilities and handling

[edit]

One of the reasons for classifying state secrets into sensitivity levels is to tailor the risk to the level of protection. The U.S. government specifies in some detail the procedures for protecting classified information. The rooms or buildings for holding and handling classified material must have a facility clearance at the same level as the most sensitive material to be handled. Good quality commercial physical security standards generally suffice for lower levels of classification. At the highest levels, people sometimes must work in rooms designed like bank vaults (see Sensitive Compartmented Information Facility – SCIF). The U.S. Congress has such facilities inside the Capitol Building, among other Congressional handling procedures for protecting confidentiality.[55]

The U.S. General Services Administration sets standards for locks and containers used to store classified material. The most commonly-approved security containers resemble heavy-duty file cabinets with a combination lock in the middle of one drawer. In response to advances in methods to defeat mechanical combination locks, the U.S. government switched to electromechanical locks that limit the rate of attempts to unlock them. After a specific number of failed attempts, they will permanently lock, requiring a locksmith to reset them.

The most sensitive material requires two-person integrity, where two cleared individuals are responsible for the material at all times. Approved containers for such material have two separate combination locks, both of which must be opened to access the contents.[citation needed]

Marking

[edit]

Classified U.S. government documents typically must be stamped with their classification on the cover and at the top and bottom of each page. Authors must mark each paragraph, title and caption in a document with the highest level of information it contains, usually by placing appropriate initials in parentheses at the beginning of the paragraph, title, or caption, for example (C), (S), (TS), (TS-SCI), etc., or (U) for unclassified.

Cover sheets

[edit]
Classified documents with and without cover sheets found by the Federal Bureau of Investigation during its search of Mar-a-Lago in August 2022.

Commonly, one must affix a brightly colored cover sheet to the cover of each classified document to prevent unauthorized observation of classified material (shoulder surfing) and to remind users to lock up unattended documents. The cover sheets warn viewers of the sensitive nature of the enclosed material, but are themselves unclassified. Typical colors are blue for confidential, red for secret and orange for top secret.[56]

Transmission

[edit]

Restrictions dictate shipment methods for classified documents. Top Secret material must go by special courier, Secret material within the U.S. via registered mail, and Confidential material by certified mail. Electronic transmission of classified information largely requires the use of National Security Agency approved/certified "Type 1" cryptosystems using NSA's unpublished and classified Suite A algorithms. The classification of the Suite A algorithms categorizes the hardware that store them as a Controlled Cryptographic Item (CCI) under the International Traffic in Arms Regulations, or ITAR.[57]

CCI equipment and keying material must be controlled and stored with heightened physical security, even when the device is not processing classified information or contains no cryptographic key. NSA is currently implementing what it calls Suite B, a group of commercial algorithms such as Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA), Elliptic Curve Digital Signature Algorithm (ECDSA) and Elliptic curve Diffie–Hellman (ECDH). Suite B provides protection for data up to Top Secret on non-CCI devices, which is especially useful in high-risk environments or operations needed to prevent Suite A compromise. These less stringent hardware requirements stem from the device not having to "protect" classified Suite A algorithms.[57]

Specialized computer operating systems known as trusted operating systems are available for processing classified information. These systems enforce the classification and labeling rules described above in software. Since 2005 they are not considered secure enough to allow uncleared users to share computers with classified activities. Thus, if one creates an unclassified document on a secret device, the resultant data is classified secret until it can be manually reviewed. Computer networks for sharing classified information are segregated by the highest sensitivity level they are allowed to transmit, for example, SIPRNet (Secret) and JWICS (Top Secret-SCI).

Destruction

[edit]

The destruction of certain types of classified documents requires burning, shredding, pulping or pulverizing using approved procedures and must be witnessed and logged.[citation needed] Classified computer data presents special problems. See Data remanence.

Lifetime commitment

[edit]

When a cleared individual leaves the job or employer for which they were granted access to classified information, they are formally debriefed from the program. Debriefing is an administrative process that accomplishes two main goals: it creates a formal record that the individual no longer has access to the classified information for that program; and it reminds the individual of their lifetime commitment to protect that information.

Typically, the individual is asked to sign another non-disclosure agreement (NDA), similar to that which they signed when initially briefed, and this document serves as the formal record. The debriefed individual does not lose their security clearance; they have only surrendered the need to know for information related to that particular job.

Classifications and clearances between U.S. government agencies

[edit]
Senator Barry Goldwater reprimanding CIA director William J. Casey for Secret info showing up in The New York Times, but then saying it was over-classified to begin with. 1983

In the past, clearances did not necessarily transfer between various U.S. government agencies. For example, an individual cleared for Department of Defense Top Secret had to undergo another investigation before being granted a Department of Energy Q clearance. Agencies are now supposed to honor background investigations by other agencies if they are still current.

Because most security clearances only apply inside the agency where the holder works, if one needs to meet with another agency to discuss classified matters, it is possible and necessary to pass one's clearance to the other agency. For example, officials visiting at the White House from other government agencies would pass their clearances to the Executive Office of the President (EOP).

The Department of Energy security clearance required to access Top Secret Restricted Data, Formerly Restricted Data, and National Security Information, as well as Secret Restricted Data, is a Q clearance. The lower-level L clearance is sufficient for access to Secret Formerly Restricted Data and National Security Information, as well as Confidential Restricted Data and Formerly Restricted Data.[58] In practice, access to Restricted Data is granted, on a need-to-know basis, to personnel with appropriate clearances. At one time, a person might hold both a TS and a Q clearance, but that duplication and cost is no longer required. For all practical purposes, Q is equivalent to Top Secret, and L is equivalent to Secret.

Contrary to popular belief, the Yankee White clearance given to personnel who work directly with the President is not a classification. Individuals having Yankee White clearances undergo extensive background investigations. The criteria include U.S. citizenship, unquestionable loyalty, and an absolute absence of any foreign influence over the individual, their family, or "persons to whom the individual is closely linked".[59][60]

Also, they must not have traveled (save while in government employ and at the instructions of the United States) to countries that are considered to be unfriendly to the United States.[citation needed] Yankee White cleared personnel are granted access to any information for which they have a need to know, regardless of which organization classified it or at what level.[citation needed]

Access to certain information compartments, especially intelligence-related, may require a polygraph examination, and though the use of the polygraph is controversial, it is part of the suitability process for some agencies.

Standard form 312

[edit]

Standard Form 312 (SF 312) is a non-disclosure agreement required under Executive Order 13292 to be signed by employees of the U.S. Federal Government or one of its contractors when they are granted a security clearance for access to classified information. The form is issued by the Information Security Oversight Office of the National Archives and Records Administration and its title is "Classified Information Nondisclosure Agreement." SF 312 prohibits confirming or repeating classified information to unauthorized individuals, even if that information is already leaked. The SF 312 replaces the earlier forms SF 189 or the SF 189-A. Enforcement of SF-312 is limited to civil actions to enjoin disclosure or seek monetary damages and administrative sanctions, "including reprimand, suspension, demotion or removal, in addition to the likely loss of the security clearance."[61]

Categories that are not classifications

[edit]

Compartments also exist, that employ code words pertaining to specific projects and are used to more easily manage individual access requirements. Code words are not levels of classification themselves, but a person working on a project may have the code word for that project added to their file, and then will be given access to the relevant documents. Code words may also label the sources of various documents; for example, code words are used to indicate that a document may break the cover of intelligence operatives if its content becomes known. The World War II code word Ultra identified information found by decrypting German ciphers, such as the Enigma machine, and which—regardless of its own significance—might inform the Germans that Enigma was broken if they became aware that it was known.

Sensitive Compartmented Information (SCI) and Special Access Programs (SAP)

[edit]

The terms "Sensitive Compartmented Information" (SCI)[62][63] and "Special Access Program" (SAP)[64] are widely misunderstood as classification levels or specific clearances.

In fact, the terms refer to methods of handling certain types of classified information that relate to specific national-security topics or programs (whose existence may not be publicly acknowledged) or the sensitive nature of which requires special handling, and thereby those accessing it require special approval to access it.

The paradigms for these two categories, SCI originating in the intelligence community and SAP in the Department of Defense, formalize 'Need to Know' and addresses two key logistical issues encountered in the day-to-day control of classified information:

  • Individuals with a legitimate need to know may not be able to function effectively without knowing certain facts about their work. However, granting all such individuals a blanket DoD clearance (often known as a "collateral" clearance) at the Top Secret level would be undesirable, not to mention prohibitively expensive.
  • The government may wish to limit certain types of sensitive information only to those who work directly on related programs, regardless of the collateral clearance they hold. Thus, even someone with a Top Secret clearance cannot gain access to its Confidential information unless it is specifically granted.

To be clear, "collateral" (formerly referred to as General Service or GENSER) simply means one lacks special access (e.g. SCI, SAP, COMSEC, NATO, etc.). Confidential, Secret, and Top Secret are all, by themselves, collateral clearance levels.[65][63]

SAP and SCI are usually found at the Top Secret classification, but there is no prohibition of applying such segregation to Confidential and Secret information.[66][67]

SAP and SCI implementation are roughly equivalent, and it is reasonable to discuss their implementation as one topic. For example, SAP material needs to be stored and used in a facility much like the SCIF described below.

Department of Energy information, especially the more sensitive SIGMA categories, may be treated as SAP or SCI.

Access to compartmented information

[edit]

Personnel who require knowledge of SCI or SAP information fall into two general categories:

  • Persons with a need to know
  • Persons with actual access

Access to classified information is not authorized based on clearance status. Access is only permitted to individuals after determining they have a need to know.[68] Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties.[69][70]

To achieve selective separation of program information while still allowing full access to those working on the program, a separate compartment, identified by a unique codeword, is created for the information. This entails establishing communication channels, data storage, and work locations (SCIF—Sensitive Compartmented Information Facility), which are physically and logically separated not only from the unclassified world, but from general Department of Defense classified channels as well.

Thus established, all information generated within the compartment is classified according to the general rules above. However, to emphasize that the information is compartmented, all documents are marked with both the classification level and the codeword (and the caveat "Handle via <compartment name> Channels Only", or "Handle via <compartment names> Jointly" if the document contains material from multiple programs).

A cover sheet for information protected by the BYEMAN control system

A person is granted access to a specific compartment after the individual has: (a) had a Single Scope Background Investigation similar to that required for a collateral Top Secret clearance; (b) been "read into" or briefed on the nature and sensitivity of the compartment; and (c) signed a non-disclosure agreement (NDA).

Access does not extend to any other compartment; i.e., there is no single "SCI clearance" analogous to DoD collateral Top Secret. The requirements for DCID 6/4 eligibility (a determination that an individual is eligible for access to SCI), subsumes the requirements for a TS collateral clearance. Being granted DCID 6/4 eligibility includes the simultaneous granting of a TS collateral clearance, as adjudicators are required to adjudicate to the highest level that the investigation (SSBI) supports.

Examples
[edit]

Examples of such control systems and subsystems are:[71]

  • SCI – Sensitive Compartmented Information
    • BYEMAN (BYE or B)
    • COMINT or Special Intelligence (SI)
      • Very Restricted Knowledge (VRK)
      • Exceptionally Controlled Information (ECI), which was used to group compartments for highly sensitive information, but was deprecated as of 2011.[72][73]
      • GAMMA (SI-G)
    • ENDSEAL (EL)
    • HUMINT Control System (HCS)
    • KLONDIKE (KDK)
    • RESERVE (RSV)
    • TALENT KEYHOLE (TK)
  • SAP – Special Access Programs

Groups of compartmented information

[edit]

SAPs in the Department of Defense are subdivided into three further groups, as defined in 10 U.S.C. § 119.[74]

There is no public reference to whether SCI is divided in the same manner, but news reports reflecting that only the Gang of Eight members of Congress are briefed on certain intelligence activities, it may be assumed that similar rules apply for SCI or for programs with overlapping SAP and SCI content.

The groups for Department of Defense SAPs are:

  • Acknowledged: appears as a line item as "classified project" or the equivalent in the federal budget, although details of its content are not revealed. The budget element will associate the SAP with a Department of Defense component organization, such as a Military Department (e.g. Department of the Navy), a Combatant Command (e.g. U.S. Special Operations Command) or a Defense Agency (e.g. Defense Information Systems Agency.)
  • Unacknowledged: no reference to such SAPs is found in the publicly published federal budget; its funding is hidden in a classified annex, often called the "black budget". The Congressional defense committees, however, are briefed on the specifics of such SAPs.
  • Waived: At the sole discretion of the Secretary of Defense, on a case-by-case basis in the interest of national security, there is no mention in the budget at all, and only the "Big 6" members of Congress: the chairman and Ranking Minority Members of the armed services committees, the appropriations committees and the defense appropriations subcommittees; receive notification of such SAPs.

Examples of SCI topics are human intelligence, communications intelligence, and intelligence collected by satellites. One or more compartments may be created for each area, and each of these compartments may contain multiple subcompartments (e.g., a specific HUMINT operation), themselves with their own code names.

Specific compartmented programs will have their own specific rules. For example, it is standard that no person is allowed unaccompanied access to a nuclear weapon or to command-and-control systems for nuclear weapons. Personnel with nuclear-weapons access are under the Personnel Reliability Program.

Some highly sensitive SAP or SCI programs may also use the "no lone zone" method (that is, a physical location into which no one is allowed to enter unaccompanied) described for nuclear weapons.

Handling caveats

[edit]

The United States also has a system of restrictive caveats that can be added to a document: these are constantly changing, but can include (in abbreviated form) a requirement that the document not be shared with a civilian contractor or not leave a specific room. These restrictions are not classifications in and of themselves; rather, they restrict the dissemination of information within those who have the appropriate clearance level and possibly the need to know the information. Remarks such as "EYES ONLY" and "DO NOT COPY[75]" also limit the restriction. One violating these directives might be guilty of violating a lawful order or mishandling classified information.

For ease of use, caveats and abbreviations have been adopted that can be included in the summary classification marking (header/footer) to enable the restrictions to be identified at a glance. They are sometimes known as Dissemination Control Abbreviations. [76] Some of these caveats are (or were):

  • CUI: Controlled Unclassified Information Replaces the labels For Official Use Only (FOUO), Sensitive But Unclassified (SBU), and Law Enforcement Sensitive (LES).
    • FOUO: For Official Use Only. Superseded by CUI and no longer in use with the exception of Department of Homeland Security documents. Used for documents or products which contain material which is exempt from release under the Freedom of Information Act.
  • NFIBONLY: National Foreign Intelligence Board Departments Only[76]
  • NOFORN (NF): Distribution to non-US citizens is prohibited, regardless of their clearance or access permissions (NO FOReign National access allowed).
  • NOCONTRACTOR: Distribution to contractor personnel (non-US-government employees) is prohibited, regardless of their clearance or access permissions.
  • ORCON (OC), ORCON-USGOV (OC-USGOV): Originator controls dissemination and/or release of the document.
  • RSEN (RS): Risk Sensitive Notice.
  • EXDIS (XD): Exclusive distribution
  • RELIDO: Releasable by Information Disclosure Official
  • PROPIN (PR): Caution—Proprietary Information Involved[76]
  • REL<country code(s)>: Distribution to citizens of the countries listed is permitted, providing they have appropriate accesses and need to know. Example: "REL TO USA, AUS, CAN, GBR, NZL" indicates that the information may be shared with appropriate personnel from Australia, the United Kingdom, Canada, and New Zealand.
  • FVEY is the country code used as shorthand for the Five Eyes.
  • <nn>X<m>: Information is exempt from automatic declassification (after the statutory default of 25 years) for exemption reason <m>, and declassification review shall not be permitted for <nn> years (as determined by law or the Interagency Security Classification Appeals Panel). For the most part, the exemption reasoning and caveats are outlined in paragraphs (b)–(d) and (g)–(i) of Sec. 3.3 of Executive Order 13526, but paragraph (b) is typically the one being referenced as the exemption reason value <m>.
Example: "50X1" indicates the information must remain classified for 50 years, since it pertains to intelligence activities, sources, or methods (reason (1) of Section 3.3, paragraph (b)).
  • RESTRICTED: Distribution to non-US citizens or those holding an interim clearance is prohibited; certain other special handling procedures apply.
  • FISA: is used in FISC[77] and probably in FISCR since at least 2017.[78]

Classification level and caveats are typically separated by "//" in the summary classification marking. For example, the final summary marking of a document might be:

SECRET//<compartment name>//ORCON/NOFORN

or

TOP SECRET//NOFORN/FISA[79]

Controls on atomic-energy information

[edit]

The Atomic Energy Act of 1954 sets requirements for protection of information about nuclear weapons and special nuclear materials. Such information is "classified from birth", unlike all other sensitive information, which must be classified by some authorized individual. However, authorized classifiers still must determine whether documents or material are classified or restricted.

The U.S. Department of Energy recognizes two types of Restricted Data:[80]

  • Restricted Data. Data concerning the design, manufacture, or utilization of atomic weapons; production of special nuclear material; or use of special nuclear material in the production of energy. RD-SIGMA-#, # represents the SIGMA number which may be 14, 15, 18, or 20.
  • Formerly Restricted Data. Classified information jointly determined by the DOE and the Department of Defense to be related primarily to the military utilization of atomic weapons and removed from the Restricted Data category. FRD-SIGMA-#, # represents the SIGMA number which may be 14, 15, 18, or 20.

Documents containing such information must be marked "RESTRICTED DATA" (RD) or "FORMERLY RESTRICTED DATA" (FRD) in addition to any other classification marking. Restricted Data and Formerly Restricted Data are further categorized as Top Secret, Secret, or Confidential.

SIGMA categories and Critical Nuclear Weapon Design Information

[edit]

RESTRICTED DATA contains further compartments. The Department of Energy establishes a list of SIGMA Categories[81] for more fine-grained control than RESTRICTED DATA. Critical Nuclear Weapon Design Information (CNWDI, colloquially pronounced "Sin-Widdy") reveals the theory of operation or design of the components of a nuclear weapon. As such, it would be SIGMA 1 or SIGMA 2 material, assuming laser fusion is not involved in the information.

Access to CNWDI is supposed to be kept to the minimum number of individuals needed. In written documents, paragraphs containing the material, assuming it is Top Secret, would be marked (TS//RD-CNWDI). SIGMA information of special sensitivity may be handled much like SAP or SCI material (q.v.)

[edit]

While most Naval Nuclear Propulsion Information is sensitive, it may or may not be classified. The desired power densities of naval reactors make their design peculiar to military use, specifically high-displacement, high-speed vessels. The proliferation of quieter- or higher-performance marine propulsion systems presents a national-security threat to the United States. Due to this fact, all but the most basic information concerning NNPI is classified. The United States Navy recognizes that the public has an interest in environmental, safety, and health information, and that the basic research the Navy carries out can be useful to industry.[citation needed]

Sharing of classified information with other countries

[edit]

In cases where the United States wishes to share classified information bilaterally (or multilaterally) with a country that has a sharing agreement, the information is marked with "REL TO USA", (release) and the three-letter country code.[82] For example, if the U.S. wanted to release classified information to the government of Canada, it would mark the document "REL TO USA, CAN". There are also group releases, such as NATO, FVEY or UKUSA. Those countries would have to maintain the classification of the document at the level originally classified (Top Secret, Secret, etc.).[citation needed]

Claims of U.S. government misuse of the classification system

[edit]

It is desired that no document be released which refers to experiments with humans and might have adverse effect on public opinion or result in legal suits. Documents covering such work field should be classified 'secret'.

—April 17, 1947 Atomic Energy Commission memo from Colonel O. G. Haywood Jr. to Dr. Fidler at the Oak Ridge Laboratory in Tennessee[83]

Excessive secrecy

[edit]

While the classification of information by the government is not supposed to be used to prevent information from being made public that would be simply embarrassing or reveal criminal acts, it has been alleged that the government routinely misuses the classification system to cover up criminal activity and potentially embarrassing discoveries.

Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists notes that

... inquiring into classified government information and disclosing it is something that many national security reporters and policy analysts do, or try to do, every day. And with a few narrow exceptions—for particularly sensitive types of information—courts have determined that this is not a crime." Aftergood notes, "The universe of classified information includes not only genuine national security secrets, such as confidential intelligence sources or advanced military technologies, but an endless supply of mundane bureaucratic trivia, such as 50-year-old intelligence budget figures, as well as the occasional crime or cover-up.[84]

As early as 1956, the U.S. Department of Defense estimated that 90% of its classified documents could be publicly disclosed with no harm to national security.[85] The National Security Archive has collected a number of examples of overclassification and government censors blacking out documents that have already been released in full, or redacting entirely different parts of the same document at different times. [86] In a similar vein, an official named William G. Florence, who for decades had a major role in writing the secrecy regulations and classification system for the Pentagon, in 1971 testified to Congress that at most 5% of information labeled classified, confidential, secret, or top secret really merited such designation at the time it was so designated, and that 3–4 years later only a tenth of that 5% still deserved such designation, according to an account of the testimony by Pentagon whistleblower Daniel Ellsberg.[87]

Prosecution for disclosing classified information

[edit]

In the Pentagon Papers case, a classified study was published revealing that four administrations had misled the American public about their intentions in the Vietnam War, increasing the credibility gap. Tony Russo and Daniel Ellsberg were prosecuted under espionage law. The case prompted Harold Edgar & Benno C. Schmidt Jr. to write a review of espionage law in the 1973 Columbia Law Review. Their article was entitled "The Espionage Statutes and Publication of Defense Information". In it, they point out that espionage law does not criminalize classified information, only national defense information. They point out that Congress has repeatedly resisted or failed to make the disclosing of classified information illegal, in and of itself. Instead, Congress has strictly limited which sort of classified information is illegal, and under which specific circumstances it is illegal. i.e. in 18 U.S.C. § 798 Congress specifically criminalized leaking cryptographic information that is classified, but when it passed the law it specifically stated the law did not criminalize disclosing other types of classified information.[8] Another article that discusses the issue is by Jennifer Elsea of the Congressional Research Service.[3]

Responsible agencies

[edit]

Any agency designated by the President can originate classified information if it meets the content criteria. Each agency is responsible for safeguarding and declassifying its own documents. The National Archives and Records Administration (NARA) has custody of classified documents from defunct agencies, and also houses the National Declassification Center (since 2010) and Information Security Oversight Office. The Interagency Security Classification Appeals Panel has representatives from the United States Department of State, United States Department of Justice; the National Archives, the Office of the Director of National Intelligence (DNI); the National Security Advisor (NSA); the Central Intelligence Agency (CIA); and Information Security Oversight Office.[88]

Declassification

[edit]

Declassification is the process of removing the classification of a document and opening it for public inspection.

Automatic declassification

[edit]

In accordance with Executive Order 13526, published January 5, 2010 (which superseded Executive Order 12958, as amended), an executive agency must declassify its documents after 25 years unless they fall under one of the nine narrow exemptions outlined by section 3.3 of the order. Classified documents 25 years or older must be reviewed by any and all agencies that possess an interest in the sensitive information found in the document. Documents classified for longer than 50 years must concern human intelligence sources or weapons of mass destruction, or get special permission.[89] All documents older than 75 years must have special permission.[90]

See also

[edit]

References

[edit]

[91]

Citations

[edit]
  1. ^ "Executive Order 13526 – Classified National Security Information". Information Security Oversight Office of The National Archives. Archived from the original on July 19, 2017. Retrieved January 5, 2010.
  2. ^ "Executive Order 13526 of December 29, 2009, Classified National Security Information". The National Archives. Archived from the original on September 28, 2012. Retrieved January 5, 2010.
  3. ^ a b Jennifer Elsea Archived September 28, 2019, at the Wayback Machine, January 2013, "Criminal Prohibitions on the Publication of Classified Defense Information"
  4. ^ Turner, Stansfield (2005). Burn Before Reading. Hachette Books. ISBN 9781401383466.
  5. ^ LaFaber, Walter (2005). The Deadly Bet: LBJ, Vietnam, and the 1968 Election. Rowman & Littlefield Publishers. ISBN 9780742543928.
  6. ^ Peters, Gretchen (2009). Seeds of Terror: How Heroin Is Bankrolling the Taliban and Al Qaeda. St. Martin's Press. ISBN 9780312379278.
  7. ^ Classified Information in "Obama's Wars" Archived June 28, 2018, at the Wayback Machine, September 29, 2010, Jack Goldsmith, Lawfare, via stephenkim.org
  8. ^ a b The Edgar & Schmidt 1973 Columbia Law Review, "The Espionage Statutes and Publication of Defense Information". The article is available online at https://fas.org/sgp/library/ Archived January 25, 2021, at the Wayback Machine
  9. ^ Judge T.S. Ellis III Archived May 19, 2017, at the Wayback Machine, reduction of Franklin sentence hearing, 2009
  10. ^ "Google Scholar". Archived from the original on April 2, 2019. Retrieved July 4, 2013.
  11. ^ "Sunlight diplomacy". The Economist. September 24, 2016. ISSN 0013-0613. Archived from the original on June 3, 2017. Retrieved September 30, 2016.
  12. ^ Peter Galison (2004), Removing knowledge (PDF), Federation of American Scientists, Wikidata Q116287295
  13. ^ a b Department of the History of Science, Harvard University Archived July 19, 2014, at the Wayback Machine
  14. ^ "People – The Department of the History of Science, Harvard University". Fas.harvard.edu. June 24, 2003. Archived from the original on July 1, 2013. Retrieved July 4, 2013.
  15. ^ "Legal Resources | Intelligence Committee". U.S. Senate Select Committee on Intelligence. U.S. Senate. Archived from the original on October 17, 2021. Retrieved October 17, 2021.
  16. ^ a b "Security Clearances". United States Department of State. Archived from the original on October 17, 2021. Retrieved October 17, 2021.
  17. ^ "Security Classification of Information, volume 2 (Quist), Chapter Seven". Project on Government Secrecy. Federation of American Scientists. Archived from the original on September 17, 2021. Retrieved October 17, 2021.
  18. ^ a b "Top Secret / Sensitive Compartmented Information (TS/SCI) Clearance | TTS Handbook". handbook.tts.gsa.gov. Archived from the original on August 14, 2022. Retrieved October 17, 2021.
  19. ^ "How to Receive and Maintain Your Security Clearance" (PDF). dami.army.pentagon.mil. Defense Security Service. Archived (PDF) from the original on October 17, 2021. Retrieved October 17, 2021.
  20. ^ a b "DCMA Manual 3301-08: Information Security" (PDF). Defense Contract Management Agency. Department of Defense. Archived (PDF) from the original on October 17, 2021. Retrieved October 17, 2021.
  21. ^ "Department of Defense Manual" (PDF). 2013. Archived (PDF) from the original on October 15, 2021. Retrieved October 17, 2021.
  22. ^ *"Handling Classified Information". www.wrc.noaa.gov. Archived from the original on May 27, 2010. Retrieved October 17, 2021.
  23. ^ "PART 117 – National Industrial Security Program Operating Manual". Archived from the original on August 14, 2022. Retrieved October 17, 2021.
  24. ^ *"32 CFR § 117.23 – Supplement to this rule: Security Requirements for Alternative Compensatory Control Measures (ACCM), Special Access Programs (SAPs), Sensitive Compartmented Information (SCI), Restricted Data (RD), Formerly Restricted Data (FRD), Transclassified Foreign Nuclear Information (TFNI), and Naval Nuclear Propulsion Information (NNPI)". LII / Legal Information Institute. Cornell University. Archived from the original on August 14, 2022. Retrieved October 17, 2021.
  25. ^ "Glossary of Security Clearance Terms". Military.com. March 13, 2019. Archived from the original on October 17, 2021. Retrieved October 17, 2021.
  26. ^ "Executive Order 12958 on Classified National Security Information". sgp.fas.org. Archived from the original on July 5, 2021. Retrieved May 14, 2016.
  27. ^ a b c Part 1, Sec. 1.2, "Executive Order 13526 of December 29, 2009, "Classified National Security Information"". Federal Register – U.S. National Archives and Records Administration, Vol. 75, No. 2, p. 707. January 5, 2010. Archived (PDF) from the original on April 4, 2019.
  28. ^ a b c "An Introduction to the Security and Classification System". Federation of American Scientists. Archived from the original on October 17, 2021. Retrieved October 17, 2021.
  29. ^ a b "Security Classification of Information, volume 2 (Quist), Chapter Seven". sgp.fas.org. Archived from the original on September 17, 2021. Retrieved October 17, 2021.
  30. ^ "What's the Difference Between "Top Secret" and "Confidential"?". Slate Magazine. July 6, 2000. Archived from the original on October 17, 2021. Retrieved October 17, 2021.
  31. ^ William D. Gerhard and Henry W. Millington, "Attack on a Sigint Collector, the U.S.S. Liberty" Archived March 13, 2004, at the Wayback Machine, 1981
  32. ^ "Fiscal Year 2019 Annual Report on Security Clearance Determinations" (PDF). Office of the Director of National Intelligence (ODNI) National Counterintelligence and Security Center (NCSC). Archived (PDF) from the original on August 14, 2022. Retrieved October 17, 2021.
  33. ^ "NSA/CSS POLICY MANUAL 1-52: NSA/CSS CLASSIFICATION" (PDF). NSA. Archived (PDF) from the original on October 17, 2021. Retrieved October 17, 2021.
  34. ^ "Sensitive Compartmented Information (SCI) – Glossary | CSRC". Computer Security Resource Center (CSRC). National Institute of Standards and Technology (NIST). Archived from the original on October 17, 2021. Retrieved October 17, 2021.
  35. ^ "Controlled Access Programs" (PDF). Director of National Intelligence. Archived (PDF) from the original on October 17, 2021. Retrieved October 17, 2021.
  36. ^ a b CLASSIFICATION OF NUCLEAR WEAPONS-RELATED INFORMATION, http://energy.gov/sites/prod/files/hss/Classification/docs/CTI-Training-RD-FRD-Briefing.pdf Archived November 26, 2020, at the Wayback Machine
  37. ^ U.S. Department of Defense Directive DoDD 5230.24, March 18, 1987
  38. ^ Michael J. Sniffen, "Report: Gov't Secrecy Grows, Costs More"[permanent dead link], Associated Press, September 5, 2005 . Retrieved December 15, 2006.
  39. ^ "House Report 110-810 – REDUCING INFORMATION CONTROL DESIGNATIONS ACT". BACKGROUND AND NEED FOR LEGISLATION. Washington, D.C.: Congress of the United States. July 30, 2008. Archived from the original on December 12, 2012. Retrieved October 21, 2008.
  40. ^ "CUI Markings". Home. Archived from the original on March 28, 2022. Retrieved August 13, 2022.
  41. ^ Casteli, Elise (January 22, 2008). "New policy expected soon for sensitive information". Federal Times. Archived from the original on January 2, 2013.
  42. ^ "Memorandum For The Heads Of Executive Departments And Agencies – Designation and Sharing of Controlled Unclassified Information (CUI)". whitehouse.gov (Press release). May 9, 2008. Archived from the original on October 25, 2017. Retrieved October 21, 2008 – via National Archives.
  43. ^ "Archivist of the United States Establishes "Controlled Unclassified Information Office"" (Press release). The National Archives. May 22, 2008. Archived from the original on August 4, 2017. Retrieved October 21, 2008.
  44. ^ Executive Order 13556 of November 4, 2010, Controlled Unclassified Information, Federal Register – U.S. National Archives and Records Administration, Vol. 75, No. 216, November 9, 2010, p. 68675.
  45. ^ Steve, Driehaus (March 18, 2009). "Actions - H.R.1323 - 111th Congress (2009-2010): Reducing Information Control Designations Act". www.congress.gov. Archived from the original on January 9, 2015. Retrieved April 5, 2018.
  46. ^ "DoD Publications". DoD Issuances. US Department of Defense. Archived from the original on August 22, 2008. Retrieved March 26, 2012.
    - "DOD releases New Controlled Unclassified Information Instruction". National Defense Industrial Association. March 16, 2020. Archived from the original on October 17, 2021. Retrieved December 14, 2020.
  47. ^ "SAFEGUARDING SENSITIVE BUT UNCLASSIFIED" (PDF). Department of Homeland Security. Archived (PDF) from the original on October 25, 2021. Retrieved August 8, 2019.
  48. ^ "National Security Positions vs. Public Trust Positions". Archived from the original on November 21, 2018. Retrieved March 9, 2014.
  49. ^ "FEDERAL SECURITY/SUITABILITY CLEARANCE CHART" (PDF). Archived (PDF) from the original on May 17, 2017. Retrieved March 9, 2014.
  50. ^ a b "U.S. Department of State Foreign Affairs Handbook Volume 5 Handbook 3 - TAGS/Terms Handbook: 5 FAH-3 H-700 E.O. 12958, AS AMENDED, TELEGRAM CLASSIFICATION MARKING". U.S. Department of State. July 14, 2009. Archived from the original on January 14, 2016. Retrieved January 12, 2016.
  51. ^ "U.S. Intelligence Agencies Rethink Classification Policy | Secrecy NewsSecrecy News". Fas.org. April 10, 2008. Archived from the original on January 30, 2013. Retrieved July 4, 2013.
  52. ^ Obama, Barack (December 29, 2009). "Executive Order 13526- Classified National Security Information". whitehouse.gov. Archived from the original on January 26, 2017. Retrieved May 4, 2015 – via National Archives.
  53. ^ Currier, Cora (July 17, 2012). "Classified in Gitmo Trials: Detainees' Every Word". Archived from the original on September 5, 2014. Retrieved September 5, 2014.
  54. ^ Bennett, Wells (October 16, 2012). "October 16 Commission Session #3: Presumptive Classification Debated (Kinda)". www.lawfaremedia.org. Archived from the original on May 22, 2013. Retrieved September 5, 2014.
  55. ^ Kaiser, Frederick M. (May 27, 2008). "Protection of Classified Information by Congress: Practices and Proposals" (PDF). Congressional Research Service. Archived (PDF) from the original on March 11, 2015. Retrieved June 22, 2008.
  56. ^ 32 CFR 2001.90
  57. ^ a b "NSA Suite B Cryptography – NSA/CSS". Nsa.gov. Archived from the original on June 18, 2011. Retrieved July 4, 2013.
  58. ^ Los Alamos National Laboratory, Clearance Processing Archived October 11, 2006, at the Wayback Machine. Retrieved December 15, 2006.
  59. ^ The Football Archived April 15, 2005, at the Wayback Machine, GlobalSecurity.org
  60. ^ Selection of DoD Military and Civilian Personnel and Contractor Employees for Assignment to Presidential Support Activities (PSAs), Department of Defense Instruction No. 5210.87 (November 30, 1998).
  61. ^ *Standard Form 312 Archived June 10, 2016, at the Wayback Machine
  62. ^ Director of Central Intelligence (June 1998). "Director of Central Intelligence Directive 1/7: Security Controls on the Dissemination of Intelligence Information". sci. Archived from the original on October 21, 2007. Retrieved September 30, 2007.
  63. ^ a b "Directives Division" (PDF). www.dtic.mil. Archived from the original (PDF) on March 9, 2013. Retrieved April 5, 2018.
  64. ^ United States Department of Defense (February 1995). "Department of Defense Overprint to the National Industrial Security Program" (PDF). nispom. Archived (PDF) from the original on January 7, 2016. Retrieved April 4, 2015.
  65. ^ "Security Clearance FAQs – ClearedJobs.Net". clearedjobs.net. Archived from the original on April 6, 2018. Retrieved April 5, 2018.
  66. ^ "Security Clearance Frequently Asked Questions" (PDF). Archived from the original (PDF) on January 31, 2017.
  67. ^ "GSA Clearance Verification-Passing Procedures". www.gsa.gov. Archived from the original on March 16, 2017. Retrieved April 5, 2018.
  68. ^ "Does possessing a Top Secret security clearance mean you have a TS/SCI security clearance?". DC Security Clearance Consultants. Archived from the original on November 21, 2020. Retrieved April 5, 2021.
  69. ^ "Glossary: Sensitive Compartmented Information Refresher" (PDF). cdse.edu. Archived (PDF) from the original on August 22, 2021. Retrieved April 5, 2021.
  70. ^ 5 CFR 1312.23
  71. ^ Top Level Telecommunications, The US Classification System Archived March 25, 2014, at the Wayback Machine
  72. ^ NRO Review and Redaction Guide, p. 140.
  73. ^ Ball, James (September 6, 2013). "Explaining the latest NSA revelations – Q&A with internet privacy experts". The Guardian. Archived from the original on September 7, 2013. Retrieved September 7, 2013.
  74. ^ "National Industrial Security Program Operating Manual". Fas.org. Archived from the original on March 26, 2015. Retrieved December 1, 2010.
  75. ^ "Memorandum of July 25, 2019, telephone conversation between President Donald Trump and Ukraine President Volodymyr Zelensky" (PDF). whitehouse.gov. Archived (PDF) from the original on January 20, 2021. Retrieved February 28, 2021 – via National Archives.
  76. ^ a b c "Agriculture-Related Pollution in the USSR". CIA. November 1977. Archived from the original on January 3, 2022. Retrieved January 18, 2010.
  77. ^ "United States Senate Committee on the Judiciary". www.judiciary.senate.gov. Archived from the original on June 24, 2020. Retrieved April 19, 2020.
  78. ^ "The Office of the Director of National Intelligence Classification Guide" (PDF). www.dni.gov. Archived (PDF) from the original on May 16, 2020. Retrieved April 20, 2020. When used, the "FISA" control marking shall be included in the banner.
  79. ^ "Semiannual Assessment of Compliance with Procedures and Guidelines Issued Pursuant to Section 702 of the Foreign Intelligence Surveillance Act, Submitted by the Attorney General and the Director of National Intelligence" (PDF). Archived (PDF) from the original on June 24, 2020. Retrieved April 20, 2020.
  80. ^ Los Alamos National Laboratory, Guide to Portion Marking Documents and Material, Appendix B, Definitions Archived October 11, 2006, at the Wayback Machine. Retrieved December 15, 2006.
  81. ^ "[no title, apparent extract from University of California laboratory security briefing]" (PDF). University of California. n.d. sigmas. Archived from the original (PDF) on September 8, 2006. Retrieved September 30, 2007.
  82. ^ See the WATERWITCH document at right for an example of a document marked REL TO USA, FVEY
  83. ^ Atomic Energy Commission's Declassification Review of Reports on Human Experiments and the Public Relations and Legal Liability Consequences Archived June 6, 2013, at the Wayback Machine, presented as evidence during the 1994 ACHRE hearings.
  84. ^ Aftergood, Steven (Spring 2008). "Classified Documents: Secrecy vs. Citizenship". Nieman Foundation for Journalism at Harvard University. Archived from the original on October 9, 2018. Retrieved April 16, 2008.
  85. ^ Monte Reel, "A Brotherhood of Spies: The U2 and the CIA's Secret War", (New York: Anchor Books, 2019), p. 71
  86. ^ Byrne, Malcolm (April 18, 2019). "Redactions: The Declassified File". Archived from the original on April 18, 2019. Retrieved April 18, 2019.
  87. ^ Past@Present blog of University of Massachusetts, Department of History, 28 Oct. 2019 "My Papers at UMass Show How Much Is Concealed From the Public, Scholars, and Congress"
  88. ^ Executive Order 13526, Sec. 5.3.
  89. ^ Executive Order 12958, Section 3.3 (h)
  90. ^ Executive Order 12958, Section 3.3 (h)(3)
  91. ^ "Intelligence Community Classification Guidance: Findings and Recommendations Report" (PDF). Office of the Director of National Intelligence. January 2008. Archived (PDF) from the original on June 26, 2015. Retrieved April 10, 2008.

General and cited sources

[edit]

Further reading

[edit]
  • Connelly, Matthew (2023). The Declassification Engine: What History Reveals About America's Top Secrets. New York: Pantheon Books. ISBN 9781101871577. OCLC 1338303992.
[edit]