1 / 31

THE SECURITY CLASSIFICATION SYSTEM

THE SECURITY CLASSIFICATION SYSTEM. CONTENTS. Why the Security Classification System How is information classified How is classified information marked Government and contractor responsibilities Test. CONTENTS. How do classified items receive their designations?

Télécharger la présentation

THE SECURITY CLASSIFICATION SYSTEM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. THE SECURITY CLASSIFICATION SYSTEM

  2. CONTENTS • Why the Security Classification System • How is information classified • How is classified information marked • Government and contractor responsibilities • Test

  3. CONTENTS • How do classified items receive their designations? • Who is responsible for assigning classification levels? • What recourse do security managers have after discovering a classification error? • Can anything be assigned a classification level by anyone? • These are questions that come to the minds of many who safeguard or work with classified material. Although there is guidance to demonstrate proper control, accountability, documentation, storage, dissemination and destruction of classified material, many practitioners do not understand the fundamentals. Executive Order 13526 provides the history, disposition and future status of classified information.

  4. WHY ASSIGN CLASSIFICATION SYSTMS For over 18 years John A. Walker, Jr. had sold secrets during and after his career in the Navy. Though entrusted with a security clearance and a “need-to know”, he did not demonstrate the trustworthiness of which his thorough background investigation deemed him worthy. When the opportunity revealed itself, he took advantage of his position and responsibilities to smuggle classified information to his Russian connections. During the investigation into his arrest, authorities discovered a complex spy ring consisting of family members and other recruited operatives. Walker had earned the trust and cooperation of his family to commit one of the most notorious of all cases of espionage. As a result of his crimes, he received a two life terms plus 10 year, his son received 25 years and the damage to the U.S. national security was tremendous. “It has been estimated by some intelligence experts that Mr. Walker provided enough code-data information to alter significantly the balance of power between Russia and the United States” John Oconner, New York Times

  5. NATIONAL INDUSTRIAL SECURITY PROGRAM • NISP is designed Safeguard classified information that has been or may be released to… “current, prospective, or former contractors, licensees, or grantees of United States agencies”. It is also designed to provide for the protection of classified material as outlined in EO 12356 and the Atomic Energy Act of 1954, as amended.

  6. NISPOM • The NISPOM is the primary regulatory reference for performing industrial security • The Department of Defense consults with Secretary of Energy, the Nuclear Regulatory Commission and the Director of Central Intelligence to issue and maintain the NISPOM • It is up to the contractor and each agency work together to meet the NISPOM’s intent The NISPOM provides restrictions, rules, guidelines and procedures for preventing unauthorized disclosure of classified material; it is the primary regulatory reference for performing industrial security.

  7. NISPOM • The Secretary of Energy and the Nuclear Regulatory Commission have the lead in detailing requirements for protecting classified information identified in the Atomic Energy Act of 1954 • The Director of Central Intelligence will provide a section for intelligence sources and methods, to include Sensitive Compartmented Information (SCI) • However, in this coordination each agency maintains its authority • The NISPOM applies to authorized users of classified information and equips those working on classified contracts with critical instruction on how to implement the NISP in their organizations • It is up to the contractor and the oversight agency to work together to provide accurate interpretation of the guidelines to the specific classified contract requirements.

  8. NATIONAL INDUSTRIAL SECURITY PROGRAM (NISPOM) All agencies apply three factors to the concept of Risk Management • Damage to national security • Existing or anticipated threat to disclosure of information. • Short and long term costs of the requirements, restrictions, and other safeguards • The second and third factors aren’t spelled out in the NISPOM, but are recognized as legitimate concerns to prevent the NISP from becoming a burden to industry

  9. NATIONAL INDUSTRIAL SECURITY PROGRAM (NISPOM) • The Secretary of Defense and the other identified agencies apply the concept of Risk Management while implementing the NISPOM • Astute Industrial Security managers develop risk management analysis to better interpret the risk and discover the potential impact. They will also develop solutions to reduce the risk and the predicted damage. The bottom line is to reduce the probability of unauthorized disclosure of classified information

  10. EXECUTIVE ORDER 13526 • Provides Classified National Security Information and delivers a cohesive method for designation classification • The Government has designed stringent policy to ensure that classified material is protected at the level necessary to prevent unauthorized disclosure.

  11. THREE DESINGNATIONS FOR CLASSIFIED • CONFIDENTIAL information could reasonably be expected cause damage • SECRET could reasonably be expected to cause serious damage • TOP SECRET could reasonably be expected to cause exceptionally grave damage to national security Caution: Classified information should not be confused with the proprietary information sometimes referred to as company confidential or secret.

  12. CONDITIONS FOR CLASSIFICATION Classifications are not assigned unless: • An original classification authority (OCR) is applying the classification level • The U.S. Government owns, is producing, or is controlling the information • Information meets one of eight categories • The OCR determines unauthorized disclosure could cause damage to national security to include transnational terrorism and they can identify or describe the damage.

  13. CONDITIONS FOR CLASSIFICATION • According to a report from the Chairman of the House National Security Subcommittee, 10% of secrets should have never been classified and that nearly 90% of classified information has been over-classified • A Defense Security Services report stated in 2003 nearly $6.5 billion was spent to classify information • To prevent such abuse, the Executive Order provides guidance to train and prevent classification authorities from arbitrarily assigned a classification level

  14. WHAT ARE THE EIGHT CATEGORIES • Military plans, weapons systems or operations • The U.S. armed forces not only safeguards, but provides instructions for protecting the specifics of their weapons and plans. If these strategies and operations were released to the wrong hands, the information would damage national security and adversely affect our ability to defend ourselves. • Foreign government information • This knowledge includes what the U.S. Government may already know about other governments. This gives the U.S. the advantage of knowing information that another country thinks is protected.

  15. WHAT ARE THE EIGHT CATEGORIES • Intelligence activities, sources, or methods or cryptology • One can imagine what damage could take place if any intelligence gathering sources, methods or activities were compromised. The suspecting adversary could become aware of the threat and cease their activity or design countermeasures designed to thwart future efforts.

  16. WHAT ARE THE EIGHT CATEGORIES • Foreign relations or activities of the United States including confidential sources • This information is specified U.S. foreign policy activities and sources friendly to U.S. efforts and U.S. organizations. Such is protected to ensure the safety of the relations and success of the activities. Compromise of any of the sources could cause damage to National Security as they are denied further access. • Scientific, technological, or economic matters relating to national security, including defense against transnational terrorism • Unauthorized access to national security-related U.S. scientific, technological, and economic data could compromise plans, production, and strategies and leave certain vulnerabilities.

  17. WHAT ARE THE EIGHT CATEGORIES • U.S. programs for safeguarding nuclear materials or facilities • For nuclear activities, the Department of Energy and the Nuclear Regulation Commission provide specific guidance to ensure the best protection. Vulnerabilities and strengths are assessed to ensure the best possible measures are in place to protect these items. Plans, strategies and programs are only effective if enforced AND access is limited.

  18. WHAT ARE THE EIGHT CATEGORIES • Vulnerabilities of systems, installations, infrastructures, projects, plans or protection services related to national security including terrorism • Security managers assess strengths andto ensure the best possible measures are in place to protect these items. Plans, strategies and programs are only effective if enforced AND access is limited. An adversary could use the programs to gain advantages, steal, damage or destroy systems, installations, infrastructures, projects, plans or protection services. • Weapons of Mass Destruction • Information fitting this category is classified to prevent unauthorized disclosure. Such unauthorized disclosure could make the U.S. vulnerable to adversaries to include transnational terrorists.

  19. CLASSIFICATION MARKINGS • Classified material should always display proper markings at all times • The classified information will have markings displayed in a specific manner based on the type of media (compact disk, cassette, book, map and etc.) • Furthermore, the classification should identify which pages, paragraphs and portions are classified and unclassified.

  20. EXAMPLES OF DOCUMENT MARKINGS Overall Page Markings Portion Marking Classification Information Notice that the document has a top and bottom marking at the highest level of classification on the page and appropriate levels of classification for the information in the paragraph.

  21. LET’S CLASSIFY IT ALL JUST TO BE SURE • Limits to classification • A classification cannot be assigned to hide legal violations, inefficiencies or mistakes • Nor can the classification authorities assigned to prevent embarrassment, prevent or restrict competition or delay the release of information that hasn’t previously required such a level of protection Users of Classified material have an obligation to challenge classification that violate any of the above

  22. CAN’T WE JUST CLASSIFY IT ALL JUST TO BE SURE • Holders of classified information may discover that the classification level may be inappropriate or unnecessary. These holders have a duty to report their beliefs. • Such reports are to be handled with the agency authorities and reviewed for a decision. • The agency heads or senior officials also need to ensure there is no retribution for the report as well as notifying the individuals that they have a right to appeal the agency decisions to the Interagency Security Classification Appeals Panel. Users of Classified material have an obligation to challenge classification that violate any of the above

  23. CLEARANCE AND “NEED TO KNOW” • Anyone desiring access to classified information must possess a security clearance and have “need to know” • Security clearances are issued after a favorable investigation and a determination is made.

  24. WE ARE PROVIDED INSTRUCIONS OF USE • Classified users are trained in proper safeguarding and sanctions imposed on those who fail to protect it from unauthorized disclosure • Each originating agency must provide instructions on the proper protection, use, storage, transmission and destruction of the information

  25. WE ARE PROVIDED INSTRUCIONS OF USE • DON’T BEGIN CLASSIFIED WORK WITHOUT • DDFORM254-Provides instructions on how, when and where to perform on a classified contract • SECURITY CLASSIFICATION GUIDE-Designed to notify what is classified and to what level. A security classification guide is assigned to each classified project.

  26. SUMMARY • The NISP is created to protect classified information • Three factors are considered before implementing the NISPOM: • level of damage to national security • existing or anticipate threat to disclosure • long and short term costs • Presidential Executive Order 13526 delivers a cohesive method for designation classification, protecting and declassifying national security information • Classified material should always be marked with the correct level

  27. REFERENCES • O’Connor, John, “TV View; American Spies In Pursuit Of The American Dream”, New York Times, NY, 1990 http://query.nytimes.com/gst/fullpage.html?res=9C0CE6DA133BF937A35751C0A966958260, Feb 4, 2008 • The President, Executive Order 12829—National Industrial Security Program (Federal Register, Jan 1993) pg. 3-2. • The President, Executive Order 13292, Further Amendment to Executive Order 13526, As Amended, Classified National Security Information—National Industrial Security Program (Federal Register, Mar 2003) Sec. 1-2 • “Too Many Secrets: Overclassification As A Barrier To Critical Information Sharing”, (Hearing Before The Subcommittee On National Security, Emerging Threats And International Relations Of The Committee On Government Reform House Of Representatives One Hundred Eighth Congress Second Session August 24, 2004) Serial No. 108-263, Available Via The World Wide Web: Http://www.Gpo.Gov/Congress/House and Http://www.House.Gov/Reform.“Secrecy Report Card, Quantitative Indicators in Secrecy of the Federal Government”, (http://www.openthegovernment.org/otg/SRC2006.pdf, August 2004) .

  28. TEST • Click on the correct answers

  29. TEST-SELECT THE CORRECT ANSWER • All of the following are classifications except: • TOP SECRET • CONFIDENTIAL • SECRET • FOR OFFICIAL USE ONLY • All of the following are conditions to be met before classifying an item except • Original Classification Authority is involved • U.S. Government owns it • Information could cause damage to national security • Information could cause embarrassment to the President • Anyone with a SECRET clearance can access classified at the CONFIDENTIAL level • True • False • All must be considered before the Government implements NISPOM except • Cost of implementation • Threat to disclosure • Damage to National Security • Buy-in by contractors

  30. TEST-SELECT THE CORRECT ANSWER • Which of the following is described as possible damage for unauthorized disclosure of SECRET • Causes extremely serious damage • Causes damage • Causes extremely grave damage • Causes serious damage • Presidential Executive Order 13526 implemented the National Industrial Security Program • True • False

  31. CERTIFICATE I HAVE RECEIVED TRAINING AND UNDERSTAND THE CONTENTS OF: Classification System ANY QUESTIONS THAT I HAVE RAISED WERE ADDRESSED BY THE FSO: NAME: DATE: FSO Verification:

More Related