Jump to content

Classified information in the United States

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 208.106.105.54 (talk) at 01:45, 18 February 2008 (Levels of classification used by the U.S. Government). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

An example of a U.S. classified document; page 13 of a United States National Security Agency report[1] on the USS Liberty incident, partially declassified and released to the public in July 2003. The original overall classification of the page, "top secret" code word UMBRA, is shown at top and bottom. The classification of individual paragraphs and reference titles is shown in parentheses - there are six different levels on this page alone. Notations with leader lines at top and bottom cite statutory authority for not declassifying certain sections.

The United States government classification system is established under Executive Order 13292, the latest in a long series of executive orders on the topic. Issued by President George W. Bush in 2003, Executive Order 13292 replaces earlier executive orders on the topic and lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.

The desired degree of secrecy about such information is known as its sensitivity. Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: confidential, secret, and top secret. Each level of classification indicates an increasing degree of sensitivity. Thus if one holds a top-secret security clearance, one is allowed to handle information up to the level of top-secret including secret and confidential information. If one holds a secret clearance, one may not then handle top-secret information, but may handle secret and confidential classified information.

In the United States, information may not, by law, be classified merely because it would be embarrassing or to cover illegal activity; information may only be classified to protect national security objectives of the nation. Not all classification, however, meets these ideals.


Accessing classified information

Regardless of sensitivity level, information that is classified is restricted in its dissemination according to the "need to know" the information. Having a "top-secret" clearance does not give one access to all documents classified at that level. Rather, information is disseminated according to sensitivity level and the need to know. In addition, dissemination of information is often compartmentalized, requiring special additional clearance requirements. Individuals with access to one type of compartmentalized information may, for that reason alone, be denied access to other compartmentalized information. Individuals who need access to the most sensitive intelligence information hold a "TS/SCI" (Top-Secret/Sensitive Compartmented Information) clearance. In addition, there are Special Access Programs or "SAPs" that restrict access to all information relating to that program or project to a limited number of pre-approved people.

Classified vs. unclassified information

In the U.S. information is called "classified" if it has been assigned one of the three levels: Confidential, Secret, or Top Secret. Information that is not so labeled is called unclassified information. The term declassified is used for information which has had its classification removed, and downgraded refers to information that has been assigned a lower classification level, but is still classified. Many documents are automatically downgraded and then declassified after some number of years. The U.S. government uses the term sensitive but unclassified (SBU), or Critical Program Information (CPI), or For Official Use Only (FOUO) or Law Enforcement Sensitive (LES) to refer to information that is not confidential, secret, or top secret, but whose dissemination is still restricted. Reasons for such restrictions can include export controls, privacy regulations, court orders, and ongoing criminal investigations, as well as national security. Information that was never classified is sometimes referred to as "open source" by those who work in classified activities.

Levels of classification used by the U.S. Government

The United States Government classifies information according to the degree which the unauthorized disclosure would damage national security. There is a misconception that having Top Secret Clearance allows the viewing of all Top Secret documents; however, this is not true. The user of the information must possess (1) the clearance necessary for the sensitivity of the information, as well as (2) a "need to know" the information. For example, all US military pilots are required to obtain a Top Secret Clearance, but they may only access documents directly related to their orders. Secret information might have additional access controls that could prevent someone with a Top Secret classification from seeing it. For example, a document marked "Secret Handle through Comint Channels Only (S-CCO)) would require that the potential reader have a clearance of Secret or higher, but also allowed access to communications intelligence, a subset of SIGINT.

Top secret

This is the highest security level (Level 3) that is publicly disclosed, and is defined as information that would cause "exceptionally grave damage" to national security if disclosed to the public. Despite the public mystique, little information is classified at "Top Secret" when compared to the other levels of classification. Only that which is exceptionally sensitive (weapon design, presidential-security information, nuclear-related projects, various intelligence information) is classified at the Top Secret level. In other cases, the nature of the gathering method used to obtain the information is what causes the information to be classified "Top Secret", though the information itself may be mundane and unimportant. An example might be a routine message obtained through cryptanalysis whose possession might reveal that the code or cipher had been broken.

Secret

The second highest classification (Level 2). Information is classified secret when its release would cause "serious damage" to national security. Most information that is classified is held at the secret sensitivity.

Confidential

The lowest classification level (Level 1). It is defined as information which would "damage" national security if disclosed.

Unclassified

Unclassified is not technically a "classification"; this is the default, and refers to information that can be released to individuals without a clearance (Level 0). Information that is unclassified is sometimes restricted in its dissemination as SBU or FOUO. For example, the "law enforcement bulletins" often reported by the U.S. media when United States Department of Homeland Security raises the U.S. terror threat level are usually classified as "U//LES" or "Unclassified - Law Enforcement Sensitive." This information is only supposed to be released to Law Enforcement groups (Sheriff, Police, etc.) Because the information is unclassified, however, it is sometimes released to the public as well. Information that is unclassified, but which the government does not believe should be subject to Freedom of Information Act requests is often classified as U//FOUO—"Unclassified—For Official Use Only". In addition to FOUO information, information can be categorized according to its availability to be distributed (Distribution D may only be released to approved Department of Defense and Government Contractor personnel). Also, the statement of NOFORN (meaning No Foreign Nationals) is applied to any information that may not be released to any non-US Citizen. NOFORN and Distribution statements are often used in conjunction with classified information or alone on SBU information. Documents subject to export controls have a specific warning to that effect.

The Restriction of NOFORN no longer applies to Australia or Britain when the matter concerns either a) military operations (including training) in which they are participating or b) the broader war on terror. It was reported that this change took place in July 2004 when President Bush signed a presidential decree changing US national disclosure policy.[citation needed][dubiousdiscuss]

Finally, information at one level of classification may be "upgraded by aggregation" to a higher level. For example, a specific technical capability of a weapon system might be classified Secret, but the aggregation of all technical capabilities of the system into a single document could be deemed Top Secret.

Use of information restrictions outside the classification system is growing in the U.S. government. In September 2005, J. William Leonard, director of the U.S. National Archives Information Security Oversight Office was quoted in the press as saying "No one individual in government can identify all the controlled, unclassified [categories], let alone describe their rules."[2]

Restricted

During and before World War II, the U.S. had a category of classified information called restricted, which was below confidential. The U.S. no longer has a restricted classification, but many other nations and NATO do. The U.S. treats "restricted" information it receives from other governments as confidential. The U.S. does use the term restricted data in a completely different way to refer to nuclear secrets, as described below.

Above top secret?

A common question about U.S. classified information is whether a level above Top Secret exists. Looked at one way, the answer is almost certainly no. Executive Order 13292 clearly states that Top Secret is the highest level of classification (Sec. 1.2). If there were some secret Executive Order that created a still higher level, there could be questions of adequate legal notice if someone mishandling that information were to be prosecuted. On the other hand, if a U.S. government agency wants to create a program so secret that the program's name itself is known to only a short list of hand picked individuals who have been recently subjected to the most thorough and intrusive vetting process imaginable, they can do so under the code-word and special-access program provisions of Executive Order 13292 (Sec. 4.3). Stringent additional security measures beyond those prescribed for ordinary Top Secret can also be required for the program, which would nevertheless still be classified at the Top Secret level, but with a code name and other markings added. As a practical matter the distinction is mostly semantic.

See, however, the discussion below of compartmented control systems.

Another view on the issue can also be argued. Section 1.2 of EO 13292 states that"[i]nformation may be classified at one of the following three levels:" namely, top secret, secret, and confidential (in descending order of sensitivity). If you go by the exact wordings of the directive, it implies that the three-level classification does not in any way prohibit the addition of a more sensitive classification. Adding another tier of information sensitivity, especially for the government, does not automatically entail violating the intent of the executive order.

Greater levels of secrecy, as discussed in the paragraphs above, could appear to be almost entirely academic. It is very plausible to consider a piece of classified information's secrecy or relative importance not by the level of classification, but instead through how widely a piece of information is distributed. Consider that an item with a classification of Top Secret is widely disseminated through channels easily accessible through JWICS, while an item of Secret classification is kept in much stricter confidence without distribution to the intelligence community "public" at large. As an example, this could be because (in the example of a defense initiative) the Secret item is, operationally, extremely sensitive but not necessarily to overall national security, for one reason or another.

Proper procedure for classifying U.S. government documents

To be properly classified, a classification authority (an individual charged by the U.S. Government with the right and responsibility to properly determine the level of classification and the reason for classification) must determine the appropriate classification level, as well as the reason information is to be classified. A determination must be made as to how and when the document will be declassified and the document marked accordingly. Executive Order 13292 describes the reasons and requirements for information to be classified and declassified. Individual agencies within the government develop guidelines for what information is classified and at what level.

The former decision is "original" classification. A great majority of classified documents are created by "derivative" classification. For example, if one piece of information, taken from a SECRET document, is put into a document along with 100 pages of unclassified information, the document, as a whole, will be SECRET. Proper (but often ignored) rules stipulate that every paragraph will bear a classification marking of (U) for UNCLASSIFIED, (C) for CONFIDENTIAL, (S) for SECRET, and (TS) for TOP SECRET. Therefore, in this example, only one paragraph will have the (S) marking. If the page containing that paragraph is double-sided, the page should be marked SECRET on top and bottom of both sides.

An official authorized to do original classification, or an individual following rules in a classification guide, might legitimately, if confusingly, classify a collection of unclassified facts. Assuming that it was known that alien spaceships only appeared as blue-green-blue lights, that knowledge itself would presumably be TOP SECRET, with additional restrictions. If someone aware of that information then collected a set of news articles that only spoke of blue-green-blue light reports, the collection could be classified at the level of the most sensitive information, if the document were titled "Accurate Alien Sightings". That title itself would be classified, and, if the knowledge were TOP SECRET with the GREENMEN codeword, there would probably be an unclassified title written (U)Project X(TS-codeword), while the actual title would be written (TS-GREENMEN)Accurate Alien Sightings(TS-GREENMEN), indicating the title and contents were classified at that level. Note that the unclassified reference only said TS-codeword without revealing the codeword itself, codewords themselves being classified.

Protecting classified information

GSA approved security container.
File:US CLASSIFIED COVERSHEETS.GIF
Classified cover sheets. Whenever a classified or protected document is being transmitted, or is in use, it will have a red back sheet and a colored cover sheet:
 -1 UNCLASSIFIED
 0 FOR OFFICIAL USE ONLY
(green)
 1 RESTRICTED
(light blue)
CONFIDENTIAL
(blue)
 2 SECRET
(red)
 3 TOP SECRET
(orange)
 4 SCI
(yellow)

Facilities and Handling

One of the reasons for classifying state secrets into sensitivity levels is to allow the level of protection to be tailored to risk. The U.S. government specifies in some detail the procedures for protecting classified information. The rooms or buildings where classified material is stored or handled must have a facility clearance at the same level as the most sensitive material to be handled. Good quality commercial physical security standards generally suffice for lower levels of classification; at the highest levels, people sometimes have to work in rooms designed like bank vaults (see SCIF). The U.S. General Services Administration sets standards for locks and containers used for storage of classified material. The most ubiquitous approved security containers look like heavy duty file cabinets with a combination lock in the middle of one drawer. Advances in methods for defeating mechanical combination locks have led the U.S. government to switch to electro-mechanical locks that limit the rate at which combinations can be tried out. After so many failed attempts these locks will permanently lock, requiring a locksmith to reset them.

Classified U.S. government documents are typically required to be stamped with their classification on the cover and at the top and bottom of each page. It is often a requirement that each paragraph, title and caption in a document be marked with the highest level of information it contains, usually by placing appropriate initials in parentheses at the beginning (or sometimes end) of the paragraph. It is common to require that a brightly-colored cover sheet be affixed to the cover of each classified document, to prevent observation of a possibly classified title by someone unauthorized (shoulder surfing) and to remind users to lock up the document when it is unattended. The most sensitive material requires two person integrity, where two cleared individuals are responsible for the material at all times. Approved containers for such material have two separate combination locks, both of which must be opened to access the contents.

There are restrictions on how classified documents can be shipped. Top secret material must go by special courier. Secret material can be sent within the U.S. via registered mail, and confidential material by certified mail. Electronic transmission of U.S. classified information requires the use of National Security Agency "Type 1" approved encryption systems.

Specialized computer operating systems known as trusted operating systems are available for processing classified information. These enforce the classification and labeling rules described above in software. However, as of 2005 they are not considered secure enough to allow uncleared users to share computers with classified activities. So if one creates an unclassified document on a Secret device, the resultant data is classified Secret, until it can be manually reviewed. Computer networks for sharing classified information are segregated by the highest sensitivity level they are allowed to transmit, for example, SIPRNet (Secret) and JWICS (Top Secret-SCI).

The destruction of classified documents requires burning, shredding, pulping or pulverizing using approved procedures and must be witnessed and logged. Classified computer data presents special problems. See Data remanence.

Lifetime Commitment

When a cleared individual leaves the job or employer for which they were granted access to classified information, they are formally "debriefed" from the program. Debriefing is an administrative process that accomplishes two main goals: it creates a formal record that the individual no longer has access to the classified information for that program; and it reminds the individual of their "lifetime commitment" to protect that information. Typically the individual is asked to sign another NDA, similar to that which they signed when initially briefed, and this document serves as the formal record. Note that the debriefed individual does not lose their security clearance; they have only surrendered the "need to know" for information related to that particular job.

Classifications and clearances between U.S. government agencies

In the past, clearances did not necessarily transfer between various U.S. government agencies. For example, an individual cleared for Department of Defense Top Secret had to undergo another investigation before being granted a Department of Energy Q clearance. Agencies are now supposed to honor background investigations by other agencies, if they are still current. Because most security clearances only apply inside the agency where the holder works, if one needs to meet with another agency to discuss classified matters, it is possible and necessary to "pass" one's clearance to the other agency. For example, officials visiting at the White House from other government agencies would pass their clearances to the Executive Office of the President (EOP).

The Department of Energy security clearance required to access Top Secret Restricted Data, Formerly Restricted Data, and National Security Information, as well as Secret Restricted Data, is a Q clearance. The lower-level L clearance is sufficient for access to Secret Formerly Restricted Data and National Security Information, as well as Confidential Restricted Data, Formerly Restricted Data, and National Security Information.[3] In practice, access to Restricted Data is granted, on a need-to-know basis, to personnel with appropriate clearances. At one time, a person might hold both a TS and a Q clearance, but that duplication and cost is no longer required. For all practical purposes, TS=Q and S=L.

Contrary to popular lore, the Yankee White clearance given to personnel who work directly with the President is not a classification. Individuals having Yankee White clearances undergo extensive background investigation. Yankee White cleared personnel are granted access to any information for which they have a need-to-know, regardless of which organization classified it or at what level. The Yankee White clearance includes a requirement for absolute absence of any foreign influence on the individual. This means they must be a natural-born citizen of the United States, not be or have been married to a person of foreign descent, or have traveled (save while in government employ and at the instructions of the United States) to countries that are considered to be unfriendly to the United States .[4]

See also the Single Scope Background Investigation below, along with explicit compartmented access indoctrination. Some compartments, especially intelligence-related, may require a polygraph examination, although the reliability of the polygraph is controversial. That the NSA uses it early in the clearance process while the CIA uses it at the end suggests how little agreement there is on the proper use, if any, of the polygraph.

Categories that are not classifications

There are also compartments, or "code words", which pertain to specific projects, and are used to more easily manage which individuals require certain information. Code words are not levels of classification themselves, but a person working on a project may have the code word for that project added to his file, and then will be given access to the relevant documents. Code words may also label the sources of various documents; for example, there are code words used to indicate that a document may break the cover of intelligence operatives if its content becomes known. The WWII code word ULTRA identified information found by decrypting German ciphers, such as the Enigma machine, and which — regardless of its own significance — might inform the Germans that Enigma was broken if they became aware that it was known.

Sensitive Compartmented Information (SCI) and Special Access Programs (SAP)

Widely misunderstood as classification levels or specific clearances are the terms "Sensitive Compartmented Information" (SCI)[5] and "Special Access Program" (SAP).[6]

In fact the terms refer to methods of handling certain types of classified information that relate to specific national-security topics or programs whose existence may not be publicly acknowledged, or the sensitive nature of which requires special handling.

The paradigms for these two categories, SCI originating in the intelligence community and SAP in the Department of Defense, addresses two key logistical issues encountered in the day-to-day control of classified information:

  • Individuals with a legitimate need-to-know may not be able to function effectively without knowing certain Top Secret facts about their work. However, granting all such individuals a blanket DoD clearance (often known as a "collateral" clearance) at the Top Secret level would be undesirable, not to mention prohibitively expensive.
  • The government may wish to limit certain types of sensitive information only to those who work directly on related programs, regardless of the collateral clearance they hold. Thus, even someone with a collateral DoD Top Secret clearance cannot gain access unless it is specifically granted.

SAP and SCI implementation are roughly equivalent, and it is reasonable to discuss their implementation as one topic. For example, SAP material needs to be stored and used in a facility much like the SCIF described below.

Department of Energy information, especially the more sensitive SIGMA categories, may be treated as SAP or SCI.

Access to Compartmented Information

To achieve selective separation of program information while still allowing full access to those working on the program, a separate "compartment," identified by a unique codeword (itself sometimes classified), is created for the information. This entails establishing communication channels, data storage, and work locations (SCIF—Sensitive Compartmented Information Facility), which are physically and logically separated not only from the unclassified world, but from general Department of Defense classified channels as well. Thus established, all information generated within the compartment is classified according to the general rules above. However, to emphasize that the information is compartmented, all documents are marked with both the classification level and the codeword (or sometimes the caveat "Handle via <compartment name> Channels Only").

A person is granted access to a specific compartment after the individual has: a) had a Single Scope Background Investigation similar to that required for a DoD Top Secret clearance; b) been indoctrinated (also called "read" or "briefed") into the nature and sensitivity of the compartment; and c) signed a non-disclosure agreement (NDA).

The individual now has access to all compartmented information, regardless of its classification (assuming a need-to-know). However, access does not extend to any other compartment; i.e., there is no single "SCI clearance" analogous to a Top Secret clearance. In fact, the individual may or may not hold a collateral DoD Top Secret or even a Secret clearance; a separate process must be initiated to obtain those. In practice, having been granted SCI access, an individual would certainly qualify for a Secret clearance, and probably a Top Secret clearance; obtaining these, however, represents additional cost to the individual's employer, and so it is not always pursued.

Groups of compartmented information

SAPs are subdivided into three further groups [1]. There is no public reference to whether SCI is divided in the same manner, but news reports reflecting that only the "Big 8" members of Congress are briefed on certain intelligence activities, it may be assumed that similar rules apply for SCI. The groups are

  • Acknowledged: appears as a line item as "classified project" or the equivalent in the US budget, although details of its content are not revealed. The budget element will associate the SAP with an organization or major command, such as the Navy or Strategic Command
  • Unacknowledged: no reference in the published budget; its funding is hidden in another entry, often called the "black budget". The appropriate Congressional committees, however, are briefed on the nature of the SAP and approve it.
  • Waived: no mention in the budget, and briefed only to the "Big 8" members of Congress: Speaker of the House, House Minority Leader, Senate Majority and Minority Leaders, and the Chairman and Ranking Minority Members of the appropriate committees.

Examples of SCI topics are sensitive intelligence activities, nuclear secrets, and stealth technology. One or more compartments may be created for each area, and each of these compartments may contain multiple programs or projects (e.g., a specific reconnaissance satellite, ICBM, or stealth aircraft), themselves with their own codenames.

Specific compartmented programs will have their own specific rules. For example, it is standard that no single person is allowed access to a nuclear weapon, or to command & control systems for nuclear weapons. Personnel with nuclear-weapons access are under the Personnel Reliability Program.

Some highly sensitive SAP or SCI programs may also use the "no lone zone" method described for nuclear weapons.

Handling Caveats

The United States also has a system of restrictive caveats that can be added to a document: these are constantly changing, but can include (in abbreviated form) a requirement that the document not be shared with civilian contractor or not leave a specific room. Some of these include

  • NOCONTRACTOR, meaning no distribution to contract personnel
  • CRYPTO, meaning operational procedures involved in encrypting communications between government agencies
  • ORCON, meaning the originator controls declassifiation

Another category similar to CRYPTO is CCI (Controlled Cryptographic Items): these items are limited in access and distribution but do not contain classified keys and alone are not classified. They do however require to be accounted for routinely

These restrictions are not classifications in and of themselves; rather, they restrict the dissemination of information within those who have the appropriate clearance level and possibly the "need to know" the information. Remarks such as "eyes only" also limit the restriction. One violating these directives might be guilty of violating a lawful order or mishandling classified information.

Controls on Atomic Energy Information

The Atomic Energy Act of 1954 sets requirements for protection of information about nuclear weapons and special nuclear materials. Such information is "classified from birth," unlike all other sensitive information, which must be classified by some authorized individual. However, authorized classifiers still must determine whether documents or material are classified or restricted.

The U.S. Department of Energy recognizes two types of Restricted Data:[7]

  • Restricted Data. Data concerning the design, manufacture, or utilization of atomic weapons; production of special nuclear material; or use of special nuclear material in the production of energy.
  • Formerly Restricted Data. Classified information jointly determined by the DOE and the Department of Defense to be related primarily to the military utilization of atomic weapons, and removed from the Restricted Data category.

Documents containing such information must be marked "RESTRICTED DATA" (RD) or "FORMERLY RESTRICTED DATA" (FRD) in addition to any other classification marking. Restricted Data and Formerly Restricted Data are further categorized as Top Secret, Secret, or Confidential.

Sigma Categories and Critical Nuclear Weapon Design Information

RESTRICTED DATA contains further compartments. The Department of Energy establishes a list of "SIGMA Categories"[8] for more fine-grained control than RESTRICTED DATA. Critical Nuclear Weapon Design Information (CNWDI) reveals the theory of operation or design of the components of a nuclear weapon. As such, it would be SIGMA 1 or SIGMA 2 (sigmas) material, assuming laser fusion is not involved in the information.

Access to CNWDI is supposed to be kept to the minimum number of individuals needed. In written documents, paragraphs containing the material, assuming it is TOP SECRET, would be marked (TS)(RD)(N), where (N) is a shorter way of writing CNWDI. SIGMA information of especial sensitivity may be handled much like SAP or SCI material (q.v.)

While most Naval Nuclear Propulsion Information is sensitive, it may or may not be classified. Since naval reactors normally run with highly enriched fuel and, as opposed to most other reactors, possibly could be driven into an uncontrolled fission reaction, however, design details will almost certainly be classified. The United States Navy recognizes that the public has an interest in environmental, safety, and health information, and that the basic research the Navy carries out can be useful to industry.

Sharing of classified information with other countries

In cases where the United States wishes to share classified information bilaterally (or multilaterally) with a country that has a sharing agreement, the information is marked "REL" (release) and the three-letter country code.

For example, if the U.S. wanted to release classified information to the governments of France, UK, and Canada, it would mark the document "REL TO CAN, FRA and GBR." There are also group releases, such as NATO or UKUSA. Those countries would have to maintain the classification of the document at the level originally classified (TOP-SECRET, SECRET, etc.).

In practice, documents may be marked NOFORN EXCEPT (Country or countries).

Claims of U.S. government misuse of the classification system

While the classification of information by the government is not supposed to be used to prevent information from being made public that would be simply embarrassing or reveal criminal acts, it has been alleged that the government routinely misuses the classification system to cover up misdeeds. See, for example, The Pentagon Papers. Many conspiracy theories such as the JFK assassination theories suggest that the government has classified information as top secret that reveals the involvement of agencies such as the CIA.

Various UFO conspiracies mention a level "above top secret" used for UFO design information and related data. They suggest such a classification is intended to apply to information relating to things whose possible existence is to be denied, such as aliens, as opposed to things whose potential existence may be recognized, but for which access to information regarding specific programs would be denied as classified. The existence of an “above top secret” classification is considered by some as unnecessary to keep the existence of aliens a secret, as they say information at the "Top Secret" level, or any level for that matter, can be restricted on the basis of need to know. Thus, the U.S. Government could conceal an alien project without having to resort to another level of clearance, as "need to know" would limit the ability to have access to the information. Some suggest that claims of the existence of such a classification level may be based on the unsubstantiated belief that the ‘’levels’’ of classification are themselves classified: As such they feel that books available claiming to contain "above top secret" information on UFOs or remote viewing should arguably be taken with a grain of salt.

Without making a judgment on if such classifications have been used for space aliens, it is a reality that even the name of some compartments was classified, and certainly the meaning of the code name. In the cited document, a (S) means the material it precedes is SECRET and (TS) means TOP SECRET. According to the Department of Defense directive.[9] "the fact of" the existence of NRO was at the SECRET level for many years, and the fact of and the actual phrase "National Reconnaissance Program" (see Paragraph II). Paragraph V(a) is largely redacted, but the introduction[10] to the documents clarifies [see Document 19] that refers to the now-cancelled BYEMAN code word and control channel for NRO activities. BYEMAN, the main NRO compartment, was classified as a full word, although the special security offices could refer, in an unclassified way, to "B policy".

References

  1. ^ William D. Gerhard and Henry W. Millington, Attack on a Sigint Collector, the U.S.S. Liberty, 1981
  2. ^ Michael J. Sniffen, "Report: Gov't Secrecy Grows, Costs More," Associated Press, September 5, 2005 (accessed December 15, 2006)
  3. ^ Los Alamos National Laboratory, Clearance Processing, accessed December 15, 2006
  4. ^ The Football, GlobalSecurity.org
  5. ^ "Director of Central Intelligence Directive 1/7: Security Controls on the Dissemination of Intelligence Information". June 1998. sci. Retrieved 2000-09-30. {{cite web}}: |first= missing |last= (help); Check date values in: |accessdate= (help)
  6. ^ "Department of Defense Overprint to the National Industrial Security Program" (PDF). February 1995. nispom. {{cite web}}: |first= missing |last= (help)
  7. ^ Los Alamos National Laboratory, Guide to Portion Marking Documents and Material, Appendix B, Definitions, accessed December 15, 2006
  8. ^ "[no title, apparent extract from University of California laboratory security briefing]" (PDF). University of California. n.d. sigmas. Retrieved 2007-09-30.
  9. ^ "DoD Directive TS-5105.23 [title originally classified] (S) National Reconnaissance Office". 1964-03-27.
  10. ^ "The NRO Declassified". September 27, 2000. {{cite web}}: Text "author Richelson, Jeffrey T." ignored (help)

Additional sources

See also