DERIVATIVE CLASSIFICATION TRAINING/IMPLEMENTATION AND OVERVIEW OF EXECUTIVE ORDERS IMPACTING THE NISP

Size: px
Start display at page:

Download "DERIVATIVE CLASSIFICATION TRAINING/IMPLEMENTATION AND OVERVIEW OF EXECUTIVE ORDERS IMPACTING THE NISP"

Transcription

1 DERIVATIVE CLASSIFICATION TRAINING/IMPLEMENTATION AND OVERVIEW OF EXECUTIVE ORDERS IMPACTING THE NISP Greg Pannoni, Associate Director, Operations and Industrial Security Information Security Oversight Office National Archives and Records Administration

2 ISOO Goals and Functions Overview National Industrial Security Program (NISP) (E.O ) NISP Policy Advisory Committee and its Working Groups Classified National Security Information (E.O ) Derivative Classification Training and Implementation Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information (E.O ) Classified National Security Information Program for State, Local, Tribal, Private Sector Entities (SLTPS) (E.O ) Controlled Unclassified Information (CUI) (E.O ) 2

3 What are ISOO s Goals? Ensure Safeguarding of Classified National Security Information in a Cost-Effective & Efficient Manner Eliminate Redundant, Overlapping, or Unnecessary Requirements that Impede National Security Interests Ensure Government / Industry Partnership in the Protection of Classified Information Hold Classification Activity to the Minimum Necessary to Protect National Security Promote Declassification & Public Access to Information as Soon as National Security Considerations Permit 3

4 How does ISOO Function? Develops, coordinates and issues implementing directives and instructions regarding Executive Orders 13526, 12829, and that are binding on executive branch agencies. Provides oversight and maintains continuous liaison with agency s on all matters relating to the Government-wide security classification program and the NISP. Annually reports relevant data regarding each agency's security classification programs, to include costs, to the President. Recommends policy changes to the President through the National Security Advisor. 4

5 NISP POLICY RELATIONSHIPS E.O CLASSIFIED NATIONAL SECURITY INFORMATION E.O Classified National Security Information Program for State, Local, Tribal, & Private Sector Entities E.O NATIONAL INDUSTRIAL SECURITY PROGRAM E.O STRUCTURAL REFORMS TO IMPROVE THE SECURITY OF CLASSIFIED NETWORKS AND THE RESPONSIBLE SHARING OF CLASSIFIED INFORMATION 5

6 NISP Policy Advisory Committee (NISPPAC) Membership Director ISOO Chairman Representatives of Government agencies (15 members) Nongovernmental (Industry) representatives (8 members) Functions Advise the Chairman: Authority On all matters concerning the policies of the NISP Serves as a forum to discuss policy issues in dispute Executive Order No , National Industrial Security Program Subject to Federal Advisory Committee Act (FACA), The Freedom of Information Act (FOIA), and The Government in the Sunshine Act

7 NISPPAC Government Representatives Members John P. Fitzpatrick, Chair Mary Rose McCaffrey Drew Winneberger Deborah Scholz Patricia Stokes Eric Dorsey Timothy Davis Richard Donovan Agency Information Security Oversight Office Central Intelligence Agency Defense Security Service Department of the Air Force Department of the Army Department of Commerce Department of Defense Department of Energy 7

8 NISPPAC Government Representatives Members Christal Fulton Anna Harrison Stephen Long Kimberly Baugher Peter Ambrose Dennis Hanratty Darlene Fenton Richard Hohman Agency Department of Homeland Security Department of Justice Department of the Navy Department of State National Aeronautics and Space Administration National Security Agency Nuclear Regulatory Commission Office of the Director of National Intelligence 8

9 NISPPAC Industry Members Members Scott Conway* Marshall Sanders* Frederick Riccardi Shawn Daley Rosalind Baybutt Mike Witt Rick Graham Steve Kipp Company Northrop Grumman Cloud Security Strategies ManTech MIT Lincoln Laboratory Pamir Consulting LLC Ball Aerospace Huntington -Ingalls L3 Corporation * Term Ends 1 October

10 NISPPAC Working Groups NISPPAC working groups established to review issues and prepare recommendations for formal NISPPAC decisions. Permanent Certification and Accreditation Working Group Personnel Security Clearance Working Group Ad-Hoc NISPOM Rewrite Working Group Threat Information Working Group Small and Middle-Sized company Issues Working Group Special Access Program Working Group Foreign Ownership, Control and Influence (FOCI) Working Group 10

11 Derivative Classification Guidance found in: Executive Order 13526, Classified National Security Information December 29, C.F.R. Part 2001, Classified National Security Information June 25, 2010 Marking Classified National Security Information January

12 Derivative Classification Derivative Classification is: The incorporating, paraphrasing, restating, or generating in new form information that is already classified, and marking the newly developed material consistent with the classification markings that apply to the source information. Includes the classification of information based on classification guidance. It is not the duplication or reproduction of existing classified information. 12

13 Training Persons who apply derivative classification markings shall receive training in the proper application of the derivative classification principles of the Order, with an emphasis on avoiding over-classification, at least once every 2 years. Derivative classifiers who do not receive such training at least once every two years shall have their authority to apply derivative classification markings suspended until they have received such training. A waiver may be granted by the agency head, the deputy agency head, or the senior agency official if an individual is unable to receive such training due to unavoidable circumstances Whenever a waiver is granted, the individual shall receive such training as soon as practicable. 13

14 Minimum Derivative Classification Training Coverage Observe and respect original classification decisions Classification levels Duration of classification Identification and Markings (carry forward to newly created documents the pertinent classification markings) Classification prohibitions and limitations Sanctions Classification challenges Security Classification Guides Information Sharing **EMPHASIS ON AVOIDING OVER-CLASSIFICATION** 14

15 Classification Standards Information may be originally classified if: An Original Classification Authority (OCA) is classifying the information; The information is owned by, produced by or for, or is under the control of the United States Government; The information falls within one or more of the classification categories; and The OCA determines that the unauthorized disclosure of the information reasonably could be expected to result in damage to national security, to include defense against transnational terrorism, and the OCA is able to identify or describe the damage. 15

16 Classification Levels Top Secret - information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. Secret - information whose unauthorized disclosure could reasonably be expected to cause serious damage to the national security. Confidential - information whose unauthorized disclosure could reasonably be expected to cause damage to the national security. 16

17 Prohibitions and Limitations In no case shall information be classified, continue to be maintained as classified, or fail to be declassified in order to: Conceal violations of law, inefficiency, or administrative error; Prevent embarrassment to a person, organization, or agency; Restrain competition; or Prevent or delay the release of information that does not require protection in the interest of national security. Basic scientific research information not clearly related to the national security shall not be classified. 17

18 Sanctions U.S. Government employees, and its contractors, shall be subject to appropriate sanctions if they knowingly, willfully, or negligently: - disclose to unauthorized persons information properly classified under the Order; - classify or continue the classification of information in violation of the order or any implementing directive; - create or continue a special access program contrary to the requirements of the Order; or - contravene any other provision of the Order or its implementing directive. 18

19 Classification Challenges Authorized holders of information, including authorized holders outside the classifying agency, are encouraged and expected to challenge the classification of information they believe is improperly classified. Agencies must ensure individuals are not subject to retribution. Informal versus Formal Challenges - Review by an impartial official or panel - System for processing, tracking and recording formal challenges - Written response within 60 days. (Affirmative response must identify or describe damage). 90 day non-response/120 day response - Right to appeal agency decisions to the Interagency Security Classification Appeals Panel (120 days) - 19

20 Use of a Classified Addendum Derivative classifiers shall, whenever practicable, use a classified addendum whenever classified information constitutes a small portion of an otherwise unclassified document or prepare a product to allow for dissemination at the lowest level of classification possible or in unclassified form. 20

21 Security Classification Guides (a) Agencies with original classification authority shall prepare classification guides to facilitate the proper and uniform derivative classification of information. These guides shall conform to standards contained in directives issued under E.O (b) Each guide shall be approved personally and in writing by an official who: (1) Has program or supervisory responsibility over the information or is the senior agency official; and (2) Is authorized to classify information originally at the highest level of classification prescribed in the guide. (c) Agencies shall establish procedures to ensure that classification guides are reviewed and updated as provided in directives issued under E.O

22 Security Classification Guides (cont d) (f) Makes clear that classification guides are not to be used to classify information for more than 25 years except for confidential human source, human intelligence source, or weapons of mass destruction information. The duration of classification of a document classified by a derivative classifier using a classification guide shall not exceed 25 years from the date of the document, except for: (1) Information that should clearly and demonstrably be expected to reveal the identity of a confidential human source or a human intelligence source or key design concepts of weapons of mass destruction; and (2) Specific information incorporated into classification guides in accordance with section 2.2(e) of E.O

23 Classification by Compilation A determination that information is classified through the compilation of unclassified is a derivative classification action based upon existing original classification guidance. If the compilation of unclassified information reveals a new aspect of information that meets the standards for classification, it shall be referred to an original classification authority with jurisdiction over the information to make an original classification decision. 23

24 Derivative Classification Markings Overall classification marking: Indicates the highest level of classification of any one portion of the document SECRET Department of Good Works Washington, D.C July 15, 2010 MEMORANDUM FOR AGENCY OFFICIALS From: Joe Carver, Director Subject: (U) Examples 1. (S) Paragraph 1 contains information from Paragraph 2 in the source document and is therefore marked (S). 2. (U) Paragraph 2 contains Unclassified information. Therefore, this portion will be marked with the designation U in parentheses preceding the portion. SECRET 24

25 Derivative Classification Markings SECRET Department of Good Works Washington, D.C July 15, 2010 MEMORANDUM FOR AGENCY OFFICIALS Classification authority block: Classified By: Identity of derivative classifier by name and position or by personal identifier. Derived From: Source information Declassify On: Declassification instructions From: Joe Carver, Director Subject: (U) Examples 1. (S) Paragraph 1 contains information from Paragraph 2 in the source document and is therefore marked (S). 2. (U) Paragraph 2 contains Unclassified information. Therefore, this portion will be marked with the designation U in parentheses preceding the portion. Classified By: Stan Smith, Program Analyst Derived From: Miscellaneous SCG, Dated January 5, 2009 Declassify On: SECRET 25

26 Derivative Classification Markings Source information (Derived From): Concisely identify the source document or the classification guide on the Derived From line, including the agency, and where available, the office of origin, and the date of the source or guide. When using multiple source documents, the Derived From line shall appear as: Derived From: Multiple Sources The derivative classifier shall include a listing of the source materials on, or attached to, each derivatively classified document. Example: (U) Sources: 1. (U) Dept of Good Works Memorandum dated June 27, 2010, Subj: Examples 2. (U) Dept of Good Works Memorandum dated May 20, 2009, Subj: Examples 3. (U) Radar SCG dated February 2,

27 Derivative Classification Markings Declassification Instructions: Source document In most cases, the declassification date will be carried over from the source document. Classified By: John E. Doe, Chief Division 5 Reason: 1.4(a) Declassify On: Derivative Classified By: Joe Carver, document Director Derived From: Department of Good Works Memorandum dated June 27, 2010, Subj: (U) Examples Declassify On: When there are multiple sources, the declassification instruction will be the most restrictive date Source Document 1 - Declassify On: Source Document 2 - Declassify On: Source Document 3 - Declassify On: Derivative Document - Declassify On:

28 Derivative Classification Markings Source document Portion marking: Portion markings will be carried over from the source document to the derivatively classified document. All other portions will be appropriately marked. Department of Good Works Washington, D.C Derivative document July 15, 2010 Department of Good Works Washington, D.C MEMORANDUM FOR AGENCY OFFICIALS July 15, 2010 From: Joe Carver, Director MEMORANDUM FOR AGENCY OFFICIALS Subject: (U) Examples From: Joe Carver, Director 1. (S) Paragraph 1 contains information that is classified SECRET and is therefore marked (S). Subject: (U) Examples 2. (U) Paragraph 2 contains Unclassified 1. (S) Paragraph 1 contains information from information. Therefore, this portion will Paragraph be marked 1 in the source document and is with the designation U in parentheses preceding therefore marked (S). the portion. 2. (U) Paragraph 2 contains Unclassified information. Therefore, this portion will be marked with the designation U in parentheses preceding the portion. 28

29 Derivative Classification Markings Declassification Instructions Use of Exemptions from Automatic Declassification (25X1-25X9): The 25X exemptions may only be used on the Declassify On line if an agency has identified permanently valuable information that needs to be exempted from automatic declassification at 25 years and has received approval from the Interagency Security Classification Appeals Panel (ISCAP) to exempt the information and to incorporate the exemption into a classification guide. (See 32 C.F.R. Part ) When using an approved exemption, a date or event that has been approved by the ISCAP must be included with the marking and shall not exceed 50 years from the date of the document. Classified By: John E. Doe, Chief Division 5 Derived From: SCG title and date Declassify On: 25X3,

30 Derivative Classification Markings Specific information, the release of which should clearly and demonstrably be expected to: 25X1 - reveal the identify of a confidential human source, a human intelligence source, a relationship with an intelligence or security service of a foreign government or international organization, or a non-human intelligence source; or impair the effectiveness of an intelligence method currently in use, available for use, or under development 25X2 - reveal information that would assist in the development, production, or use of weapons of mass destruction 25X3 - reveal information that would impair U.S. cryptologic systems or activities 25X4 - reveal information that would impair the application of state-of-the-art technology within a U.S. weapon system 30

31 Derivative Classification Markings 25X5 reveal formally named or numbered U.S. military war plans that remain in effect, or reveal operational or tactical elements of prior plans that are contained in such active plans 25X6 - reveal information, including foreign government information, that would cause serious harm to relations between the United States and a foreign government, or to ongoing diplomatic activities of the United States 25X7 - reveal information that would impair the current ability of United States Government officials to protect the President, Vice President, and other protectees for whom protection services, in the interest of the national security, are authorized 25X8 - reveal information that would seriously impair current national security emergency preparedness plans or reveal current vulnerabilities of systems, installations, or infrastructures relating to the national security 25X9 - violate a statute, treaty, or international agreement that does not permit the automatic or unilateral declassification of information at 25 years. 31

32 Derivative Classification Markings Section 3.3(h), E.O Records that contain information, the release of which should clearly and demonstrably be expected to reveal the following are exempt from automatic declassification at 50 years: 50X1-HUM the identity of a confidential human source or a human intelligence source 50X2-WMD key design concepts of weapons of mass destruction 50X - in extraordinary cases, additional specific information formally approved by the ISCAP (50X1-50X9 match the same categories as the 25X1-25X9 categories) Section 3.3(h)(3), E.O X - specific information may be exempted from automatic declassification at 75 years if formally approved by the ISCAP. 32

33 from automatic declassification Identity of confidential human source or human intelligence source Key design concepts of weapons of mass destruction 50X1-HUM (no date or event required) E.O section 3.3(h)(1)(A) 50X2-WMD (no date or event required) E.O section 3.3(h)(1)(B) Information that meets the standards of E.O section 3.3(b) 25X with a date or event E.O section 3.3(b) 50X with a date or event E.O section 3.3(h)(2) All other information 25 years 25X 50 years 50X 75 years 75X

34 Derivative Classification Markings Declassification Instructions: The following declassification instructions are no longer valid and, if annotated on the source document, will not be carried over to the derivative document. X1, X2, X3, X4, X5, X6, X7, X8 OADR MR (never a valid declassification instruction) Subject to Treaty or International Agreement The derivative classifier shall calculate a date that is 25 years from the date of the source document when determining the declassification instruction for the derivative document. 34

35 Derivative Classification Markings Declassification Instructions: Source document SECRET Department of Good Works Washington, D.C July 15, 2010 MEMORANDUM FOR AGENCY OFFICIALS From: Joe Carver, Director Subject: (U) Examples Derivative document SECRET Department of Good Works Washington, D.C January 21, 2011 MEMORANDUM FOR AGENCY OFFICIALS From: Joe Carver, Director Subject: (U) Examples The same rules apply when the source document contains any invalid markings (X1-X8; OADR; MR; Subject to treaty or international agreement) 1. (S) Paragraph (U) Paragraph (S) Paragraph 1 contains information from Paragraph 1 in the source document and is therefore marked (S). Classified By: OCA name and position 2. (U) Paragraph 2 is unclassified. Reason: 1.4(a) Declassify On: OADR Classified By: Derivative classifier s name SECRET Derived From: Dept of Good Works Memo, dtd July 15, 2010 Do not carry over OADR Declassify On: July 15, 2035 SECRET Calculate a date that is 25 years from the date of the source document. 35

36 Derivative Classification Markings Declassification Instructions: DNI Only or DCI Only are also no longer valid and, if annotated on the source document, will not be carried over to the derivative document. If the document contains imagery, as described in E.O , the derivative classifier will mark the derivative document in the following manner: Declassify on: 25X1, E.O If the document does not contain imagery, as described in E.O , the derivative classifier will calculate a declassification date that is 25 years from the date of the source document. 36

37 Derivative Classification Markings (Cont d) Declassification Instructions: Source document SECRET Department of Good Works Washington, D.C July 15, 2010 Derivative document SECRET Department of Good Works Washington, D.C January 21, 2011 MEMORANDUM FOR AGENCY OFFICIALS If the source document contains DNI Only or DCI Only as a declassification instruction, and there is no imagery in the document, a declassification date will be calculated 25 years from the date of the source document. MEMORANDUM FOR AGENCY OFFICIALS From: Joe Carver, Director Subject: (U) Examples 1. (S) Paragraph 1. From: Joe Carver, Director Subject: (U) Examples 1. (S) Paragraph 1 contains information from Paragraph 1 in the source document and is therefore marked (S). 2. (U) Paragraph 2 is unclassified. 2. (U) Paragraph 2. Classified By: Derivative classifier s name Classified By: OCA name and position Derived From: Dept of Good Works Memo, Reason: 1.4(a) dtd July 15, 2010 Declassify On: DNI Only Declassify On: SECRET SECRET Do not carry over DNI Only Calculate a date that is 25 years from the date of the source document. 37

38 Derivative Classification Markings Declassification Instructions: If the source document contains DNI Only or DCI Only as a declassification instruction, and contains imagery, the new declassification instruction will read: Declassify on: 25X1, E.O Do not carry over DCI Only Source document SECRET Department of Good Works Washington, D.C Xxxxxxxxxxxxxxxxxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Secre t Derivative document SECRET Department of Good Works Washington, D.C Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxx.xxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxx. Secre t Classified By: Derivative classifier s name Derived From: Dept of Good Works Memo, Classified By: OCA name and position dtd July 15, 2010 Reason: 1.4(a) Declassify On: 25X1, E.O Declassify On: DCI Only SECRET SECRET The declassification instruction on the derivatively classified document will read: Declassify on: 25X1, E.O

39 Reminders Only individuals specifically authorized in writing may classify documents originally. Only individuals with the appropriate security clearance, who are required by their work to restate classified source information, may derivatively classify information. The terms Top Secret, Secret, and Confidential are not to be used to mark executive branch information that has not been properly designated as classified national security information under E.O Information shall not be classified for any reason unrelated to the protection of the national security. Classifiers and authorized holders are responsible for ensuring that information is appropriately classified and properly marked. 39

40 Reminders (continued) Individuals who believe that information in their possession is inappropriately classified, or inappropriately unclassified, are expected to bring their concerns to the attention of responsible officials. The following markings are not authorized in the Declassify On line: Originating Agency s Determination Required or OADR for documents created after 10/14/95; X1, X2, X3, X4, X5, X6, X7, or X8 for documents created after 9/22/2003; Manual Review or MR; DNI Only or DCI Only; Subject to treaty or international agreement; and 25X1-human. 40

41 E.O Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information Reinforce the importance of responsible information sharing Ensure that policies, processes, technical security solutions, oversight, and organizational cultures match information sharing & safeguarding requirements Emphasize consistent guidance and implementation across the entire Federal government Recognize the importance of shared risk and shared responsibility 41

42 E.O Governance Structure A Senior Information Sharing and Safeguarding Steering Committee to coordinate interagency efforts and ensuring that Departments and Agencies are held accountable for implementation of information sharing and safeguarding policy and standards. A Classified Information Sharing and Safeguarding to provide sustained, full-time focus on sharing and safeguarding of classified national security information. Senior representatives of the Department of Defense and the National Security Agency jointly act as the Executive Agent for Safeguarding Classified Information on Computer Networks to develop technical safeguarding policies and standards and conduct assessments of compliance. An Insider Threat Task Force to develop a government-wide program for insider threat detection and prevention to improve protection and reduce potential vulnerabilities of classified information from exploitation, compromise or other unauthorized disclosure.

43 Areas of Focus & Ongoing Improvement Enhancing control of removable media Identity Management; including reducing user anonymity and increasing user attribution Building a more robust insider threat program Enhancing access controls Improving enterprise audit capabilities

44 Removable Media Initial Operating Capability (IOC) Definition: IOC is reached when write privileges are disabled and/or controlled using a hardware or software solution Final Operating Capability (FOC) Definition: FOC includes IOC, and is achieved when a monitoring and alerting function is implemented for all successful / unsuccessful write attempts to removable media devices. 44

45 Reducing Anonymity Initial Operating Capability (IOC) Definition: IOC is reached when the PKI is established such that: Certificates are issued (or a comparable solution) for identification for a minimum of 10 percent of users on classified networks (Secret and Top Secret) and PKI tokens are used for authentication to high-sensitivity applications (software tokens are sufficient pursuant to Intelligence Community policy and with coordination with the Steering Committee). Final Operating Capability (FOC) Definition: FOC includes IOC, and is achieved when: 90 percent of users have PKI certificates for identification (or a comparable solution) on classified networks (Secret and Top Secret); and Hardware tokens are used for authentication to enable access to high and medium-sensitivity applications (software tokens are sufficient pursuant to Intelligence Community policy and with coordination with the Steering Committee).

46 Insider Threat Program Initial Operating Capability (IOC) Definition: IOC is reached when an agency has policies, procedures, and an organizational structure that identifies an accountable official(s) for the insider threat program, provides regular insider threat awareness training to agency personnel, and includes an integrated approach to gathering (electronically and/or manually) relevant sources of insider threat information for analysis and response. 46

47 Insider Threat Program Final Operating Capability (FOC) Definition: FOC includes IOC, and is achieved when an agency has implemented the capabilities for: Monitoring user network activities on all agency networks; Inclusion of counterintelligence triggers for user-monitoring tailored to the agency environment; Establishing an integrated capability to monitor, audit, gather, and analyze information relevant to insider threat analysis from across the agency; and There is a capability for integrated insider threat analysis of current data on user actions collected from automated and/or manual information sources such as audit data, foreign travel and contact reporting, financial disclosure, facility, access, phone records, and external databases. 47

48 Access Control Initial Operating Capability (IOC) Definition: IOC is reached when an interoperable infrastructure for integrated access-control capability (hard-token PKI plus attribute-based authorization) is operational (Secret and Top Secret) in accordance with the Federal Identity, Credential, and Access Management (FICAM) framework or equivalent guidance appropriate for the subject network fabric. Scope: Establishes capability for user attribute provisioning to support attribute-based authorization on classified networks. Requires this capability to be integrated with the PKI authentication capability. Minimum of 10 percent of users on classified networks are provisioned with attributes for authorization-related access-control decisions. Minimum of 25 percent of classified data repositories designated as highest sensitivity (as defined in NIST SP , CNSSI 1253, ICD 503 or equivalent guidance appropriate for the subject network fabric) are integrated to use the interoperable access-control infrastructure facilities (PKI integrated with attributebased access control). 48

49 Access Control Final Operating Capability (FOC) Definition: FOC includes IOC, and is achieved when an agency has implemented the capabilities for: Scope: Federation (exchange) of standardized user authorization attributes on classified networks across organizations; Consistent application of fabric-wide access control policy, with timely promulgation of policy changes; and Tagging of information resources with access-relevant attributes on ingest, creation, or modification; as applicable. All users of classified networks. All high and medium-sensitivity classified network applications. 49

50 Enterprise Audit Initial Operating Capability (IOC) Definition: IOC is reached when an agency has the ability to: Monitor user-attributable activities (defined as Auditable Events in ICS ) on at least one community-shared information resource on at least one of the agency s classified networks; Analyze identified anomalies (which includes correlating such anomalies with other data sources); Report and respond to potential security incidents through collaboration with the appropriate CI, security, law enforcement, or Information Security (INFOSEC) offices; Provide automated notifications of security incidents from a community-shared information resource on at least one of the agency s classified networks to the appropriate offices; Deliver an automated flow of audit data from a community-shared information resource on at least one of the agency s classified networks into an agency-specific audit capability; and Provide audit data to other affected organizations. 50

51 Enterprise Audit Final Operating Capability (FOC) Definition: FOC includes IOC applied to all classified networks, and is achieved when an agency has implemented the ability to: Share user-attributable audit information in a common format collected from high and medium-sensitivity information resources (both internal and community-shared) for users; Analyze identified anomalies; and Enable a timely response to incidents. 51

52 E.O Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities (SLTPS) Establishes a program to safeguard and govern access to classified information shared by the Federal Government with SLTPS entities. Ensures that security standards for classified information are applied in accordance with national policy. Private sector facilities where classified information is or will be used or stored as well as contractors of SLT entities shall be inspected, accredited, and monitored for compliance with the standards established pursuant to the NISP by DoD or another responsible Cognizant Security Agency. SLTPS-Policy Advisory Committee created to discuss policy disputes and facilitate or recommend changes to remove undue impediment to information sharing 52

53 Key Elements of the E.O (CUI) Establishes an open and uniform program. Manages all unclassified information within the executive branch that requires safeguarding and dissemination controls. The control of this information is pursuant to and consistent with law, regulation, and Government-wide policy. Freedom of Information Act (FOIA): The mere fact that information is designated as CUI shall not have a bearing on determinations pursuant to any law requiring the disclosure of information or permitting disclosure as a matter of discretion, including disclosures to the legislative or judicial branches. Section 2(b) 53

54 Overview of the CUI Program Dissemination Policy One uniform and consistent policy applied to a defined and organized body of information Marking Policy Registry Decontrol Policy Safeguarding Policy 54

55 Approved CUI Categories 1. Agriculture 2. Copyright 3. Critical Infrastructure 4. Emergency Management 5. Export Control 6. Financial 7. Immigration 8. Intelligence 9. Law Enforcement 10. Transportation 11. Nuclear 12. Patent 13. Privacy 14. Proprietary 15. Statistical 16. Tax 17. Legal 55

56 Five Programmatic Areas of the Compliance Plan Governance Roles and responsibilities established to guide and direct the program and its requirements Processes and procedures of continuous monitoring to ensure compliance with the EO and Notice Self - Inspection Controlled Unclassified Information Compliance Plan Policy and Guidance Development, implementation and revision of properly documented policies that are readily available to all affected personnel Identify and assess requirements of IT systems and toolsets for program implementation Technology Training Education of affected personnel on the appropriate handling of information including responsibilities and ongoing maintenance 56

57 CUI Executive Agent Current Efforts Development of CUI Supplemental Guidance & Consultation Interagency Representatives of the public State, Local, Tribal Private Sector Approval of Additional CUI Categories & Subcategories CUI Registry Updates Continuing Agency Submissions Approval of Compliance Plans Target Date Updates Continuing Agency Submissions 57

58 Contact Information Information Security Oversight Office National Archives and Records Administration 700 Pennsylvania Avenue, N.W., Room 100 Washington, DC (202) (202) (fax) 58

59 QUESTIONS? 59

This page left blank.

This page left blank. This page left blank. Introduction 2 Reminders 2 SECTION 1 Originally Classified Documents 3 Portion Marking 5 Overall Classification Marking 6 Classification Authority Block Classified By line 7 Reason

More information

Defense Security Service Academy OCA Desk Reference Guide

Defense Security Service Academy OCA Desk Reference Guide Defense Security Service Academy OCA Desk Reference Guide May 007 Final Page OCA Decision Aid The safety and security of the United States depend upon the protection of sensitive information. Classification

More information

Student Guide Course: Original Classification

Student Guide Course: Original Classification Course: Original Classification Lesson: Course Introduction Course Information Purpose Audience Pass/Fail % Estimated completion time Define original classification and identify the process for determining

More information

Derivative Classifier Training

Derivative Classifier Training As a cleared contractor employee that creates classified materials you are considered a derivative classifier as outlined in the presidents Executive Order (E.O.) 13526. Page 1 of 21 Derivative classifiers

More information

Greg Pannoni April 2016

Greg Pannoni April 2016 Greg Pannoni April 2016 National Industrial Security Program (NISP) single, integrated, cohesive industrial security program Goal: eliminate redundant, overlapping, or unnecessary requirements that impeded

More information

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information Department of Defense INSTRUCTION NUMBER 5200.01 October 9, 2008 SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information References: See Enclosure 1 USD(I) 1. PURPOSE.

More information

SUMMARY FOR CONFORMING CHANGE #1 TO DoDM , National Industrial Security Program Operating Manual (NISPOM)

SUMMARY FOR CONFORMING CHANGE #1 TO DoDM , National Industrial Security Program Operating Manual (NISPOM) Cover Page annotated as Incorporating Change 1, noting date of the change Table of Contents has been updated throughout document to reflect current page alignment (Page 2-12) References have been updated

More information

Protection of Classified National Intelligence, Including Sensitive Compartmented Information

Protection of Classified National Intelligence, Including Sensitive Compartmented Information Protection of Classified National Intelligence, Including Sensitive Compartmented Information 703 A. AUTHORITY 1. The National Security Act of 1947, as amended; Executive Order (EO) 12333, as amended;

More information

SUMMARY: The Department of Homeland Security (DHS) is revising its procedures

SUMMARY: The Department of Homeland Security (DHS) is revising its procedures This document is scheduled to be published in the Federal Register on 07/30/2014 and available online at http://federalregister.gov/a/2014-17836, and on FDsys.gov 9110-9B DEPARTMENT OF HOMELAND SECURITY

More information

9/2/2015. The National Security Exemption. Exemption 1. Exemption 1

9/2/2015. The National Security Exemption. Exemption 1. Exemption 1 The National Security Exemption ASAP 2015 FOIA-Privacy Act Training Workshop Threshold language:[records] (A) specifically authorized under criteria established by an Executive order to be kept secret

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER O-5205.13 April 26, 2012 DoD CIO SUBJECT: Defense Industrial Base (DIB) Cyber Security and Information Assurance (CS/IA) Program Security Classification Manual (SCM)

More information

Security Classification Guidance v3

Security Classification Guidance v3 Security Classification Guidance v3 September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Course Overview Welcome to the Security Classification Guidance Course. The

More information

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES (Federal Register Vol. 40, No. 235 (December 8, 1981), amended by EO 13284 (2003), EO 13355 (2004), and EO 13470 (2008)) PREAMBLE Timely, accurate,

More information

Declassification Options and Requirements

Declassification Options and Requirements Options and Requirements Information Security Webinar Marc Brandsness Security Asset Protection Professional Certification (SAPPC) Retired US Air Force-Security Forces with over 25 years of Law Enforcement

More information

REPORT to the PRESIDENT. NATIONAL ARCHIVES and RECORDS ADMINISTRATION

REPORT to the PRESIDENT. NATIONAL ARCHIVES and RECORDS ADMINISTRATION 214 REPORT to the PRESIDENT NATIONAL ARCHIVES and RECORDS ADMINISTRATION AUTHORIT Y Executive Order (E.O.) 13526, Classified National Security Information E.O. 12829, as amended, National Industrial Security

More information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information GAO United States General Accounting Office Report to the Committee on Armed Services, U.S. Senate March 2004 INDUSTRIAL SECURITY DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection

More information

For Immediate Release October 7, 2011 EXECUTIVE ORDER

For Immediate Release October 7, 2011 EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary For Immediate Release October 7, 2011 EXECUTIVE ORDER - - - - - - - STRUCTURAL REFORMS TO IMPROVE THE SECURITY OF CLASSIFIED NETWORKS AND THE RESPONSIBLE SHARING

More information

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005 REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005 BACKGROUND AND METHODOLOGY As part of its responsibilities to oversee agency actions to ensure compliance with Executive Order 12958,

More information

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544

More information

August Initial Security Briefing Job Aid

August Initial Security Briefing Job Aid August 2015 Initial Security Briefing Job Aid A NOTE FOR SECURITY PERSONNEL: This initial briefing contains the basic security information personnel need to know when they first report for duty. This briefing

More information

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT) SAPPC Knowledge Checkup Please note: Cyber items are indicated with a ** at the end of the practice test questions. Question Answer Linked 1. What is the security professionals role in pursuing and meeting

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: Law Enforcement Defense Data Exchange (LE D-DEx) References: See Enclosure 1 NUMBER 5525.16 August 29, 2013 Incorporating Change 1, Effective June 29, 2018 USD(P&R)USD(I)

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5200.45 April 2, 2013 Incorporating Change 1, Effective April 6, 2018 USD(I) SUBJECT: Instructions for Developing Security Classification Guides References: See Enclosure

More information

JOB AID. Marking Classified Information U N I T E D A M E R I C A S TAT E S O F. Downloadable Supplement to elearning Course

JOB AID. Marking Classified Information U N I T E D A M E R I C A S TAT E S O F. Downloadable Supplement to elearning Course Center for Development of Security Excellence Learn. Perform. Protect. www.cdse.edu DEFENSE SECURITY SERVICE U N I T E D S TAT E S O F A M E R I C A April 28 2014 Center for Development of Security Excellence

More information

Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005

Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005 Description of document: Requested date: Released date: Posted date: Source of document: Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005 07-June-2011

More information

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 304

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 304 INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 304 HUMAN INTELLIGENCE A. PURPOSE 1. Pursuant to Intelligence Community Directive (ICD) 101, Section G.1.b.(3), ICD 304 Human Intelligence is hereby amended. 2.

More information

Student Guide: Controlled Unclassified Information

Student Guide: Controlled Unclassified Information Length Two (2) hours Description This course covers the Department of Defense policies on the disclosure of official information. In addition, the nine exemption categories of the Freedom of Information

More information

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 501

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 501 INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 501 DISCOVERY AND DISSEMINATION OR RETRIEVAL OF INFORMATION WITHIN THE INTELLIGENCE COMMUNITY (EFFECTIVE: 21 JANUARY 2009) A. AUTHORITY: The National Security Act

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 Incorporating Change 2, August 28, 2017 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5200.39 September 10, 1997 SUBJECT: Security, Intelligence, and Counterintelligence Support to Acquisition Program Protection ASD(C3I) References: (a) DoD Directive

More information

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, D.C

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, D.C DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, D.C. 20301-1010 May 10, 2010 Incorporating Change 1, September 29, 2010 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF

More information

DODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM

DODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM DODEA ADMINISTRATIVE INSTRUCTION 5210.03, VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM Originating Component: Security Management Division Effective: March 23, 2018 Releasability: Cleared

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014 THE WHITE HOUSE Office of the Press Secretary For Immediate Release January 17, 2014 January 17, 2014 PRESIDENTIAL POLICY DIRECTIVE/PPD-28 SUBJECT: Signals Intelligence Activities The United States, like

More information

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview FSO Role in the NISP Lesson 1: Course Introduction Course Information Purpose Audience Pass/Fail % Estimated completion time Provide an overview of the Facility Security Officer s (FSO) primary roles in

More information

APPENDIX N. GENERIC DOCUMENT TEMPLATE, DISTRIBUTION STATEMENTS AND DOCUMENT DATA SHEET and THE IMPORTANCE OF MARKING DOCUMENTS

APPENDIX N. GENERIC DOCUMENT TEMPLATE, DISTRIBUTION STATEMENTS AND DOCUMENT DATA SHEET and THE IMPORTANCE OF MARKING DOCUMENTS APPENDIX N GENERIC DOCUMENT TEMPLATE, DISTRIBUTION STATEMENTS AND DOCUMENT DATA SHEET and THE IMPORTANCE OF MARKING DOCUMENTS This Appendix describes requirements for using a standardized document template,

More information

DOE B, SAFEGUARDS AGREEMENT WITH THE INTERNATIONAL ATOMIC SYMBOL, AND OTHER CHANGES HAVE BEEN BY THE REVISIONS,

DOE B, SAFEGUARDS AGREEMENT WITH THE INTERNATIONAL ATOMIC SYMBOL, AND OTHER CHANGES HAVE BEEN BY THE REVISIONS, DOE 1270.2B THIS WITH PAGE MUST BE KEPT THE INTERNATIONAL WITH DOE 1270.2B, SAFEGUARDS AGREEMENT ATOMIC ENERGY AGENCY. DOE 1270.2B, SAFEGUARDS AGREEMENT WITH THE INTERNATIONAL ATOMIC ENERGY AGENCY, HAS

More information

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350-1000 SECNAVINST 5510.36A N09N2 SECNAV INSTRUCTION 5510.36A From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.21 February 18, 1997 DA&M SUBJECT: Defense Intelligence Agency (DIA) References: (a) Title 10, United States Code (b) DoD Directive 5105.21, "Defense Intelligence

More information

This publication is available digitally on the AFDPO WWW site at:

This publication is available digitally on the AFDPO WWW site at: BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 31-401 1 NOVEMBER 2005 Security INFORMATION SECURITY PROGRAM MANAGEMENT COMPLIANCE WITH THIS PUBLICATION IS MANDATORY NOTICE: This publication

More information

2005 REPORT to THE PRESIDENT INFORMATION SECURITY OVERSIGHT OFFICE

2005 REPORT to THE PRESIDENT INFORMATION SECURITY OVERSIGHT OFFICE 2005 REPORT to THE PRESIDENT INFORMATION SECURITY OVERSIGHT OFFICE Authority Executive Order 12958, as amended, Classified National Security Information, and Executive Order 12829, as amended, National

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.8 February 20, 1991 Certified Current as of February 20, 2004 SUBJECT: Access to Classified Cryptographic Information ASD(C3I) References: (a) National Telecommunications

More information

Department of Defense

Department of Defense Department of Defense DIRECTIVE SUBJECT: Under Secretary of Defense for Intelligence (USD(I)) NUMBER 5143.01 November 23, 2005 References: (a) Title 10, United States Code (b) Title 50, United States Code

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5230.24 March 18, 1987 USD(A) SUBJECT: Distribution Statements on Technical Documents References: (a) DoD Directive 5230.24, subject as above, November 20, 1984 (hereby

More information

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE SECNAV INSTRUCTION 3850.2E DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1 000 NAVY PENTAGON WASHINGTON DC 20350 1000 SECNAVINST 3850.2E DUSN (P) January 3, 2017 From: Subj: Secretary of the Navy DEPARTMENT

More information

CONFERENCE MATERIAL DAY ONE 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW

CONFERENCE MATERIAL DAY ONE 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW CONFERENCE MATERIAL DAY ONE SPONSORED BY: AMERICAN BAR ASSOCIATION STANDING COMMITTEE ON LAW AND NATIONAL SECURITY CENTER FOR NATIONAL SECURITY

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5205.08 November 8, 2007 USD(I) SUBJECT: Access to Classified Cryptographic Information References: (a) DoD Directive 5205.8, subject as above, February 20, 1991

More information

Department of Defense DIRECTIVE. SUBJECT: Release of Official Information in Litigation and Testimony by DoD Personnel as Witnesses

Department of Defense DIRECTIVE. SUBJECT: Release of Official Information in Litigation and Testimony by DoD Personnel as Witnesses Department of Defense DIRECTIVE NUMBER 5405.2 July 23, 1985 Certified Current as of November 21, 2003 SUBJECT: Release of Official Information in Litigation and Testimony by DoD Personnel as Witnesses

More information

DoD Update Insider Threat and the NISP

DoD Update Insider Threat and the NISP UNCLASSIFIED OFFICE OF THE UNDER SECRETARY OF DEFENSE DoD Update Insider Threat and the NISP Steve Lewis Valerie Heil May 19, 2015 UNCLASSIFIED Continuous Evaluation IMESA Insider Threat NISPOM Change

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8521.01E January 13, 2016 Incorporating Change 1, August 15, 2017 USD(AT&L) SUBJECT: DoD Biometrics References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues

More information

OFFICE OF THE DIRECTOR OF NATION At INTELLIGENCE WASHINGTON, DC 20511

OFFICE OF THE DIRECTOR OF NATION At INTELLIGENCE WASHINGTON, DC 20511 OFFICE OF THE DIRECTOR OF NATION At INTELLIGENCE WASHINGTON, DC 20511 Steven Aftergood Federation of American Scientists 1725 DeSales Street NW, Suite 600 Washington, DC 20036 ~ov 2 5 2015 Reference: ODNI

More information

DEPARTMENT OF THE ARMY OFFICE OF THE DEPUTY CHIEF OF STAFF, G ARMY PENTAGON WASHINGTON, DC

DEPARTMENT OF THE ARMY OFFICE OF THE DEPUTY CHIEF OF STAFF, G ARMY PENTAGON WASHINGTON, DC DEPARTMENT OF THE ARMY OFFICE OF THE DEPUTY CHIEF OF STAFF, G-2 1000 ARMY PENTAGON WASHINGTON, DC 20310-1000 DAMI-CD 26 July 2007 MEMORANDUM FOR SEE DISTRIBUTION LIST SUBJECT: Army Security Notice 1-07:

More information

General Security. Question Answer Policy Resource

General Security. Question Answer Policy Resource General Security Briefly define a Special Access Program. A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally

More information

Department of Defense INSTRUCTION. Access to and Dissemination of Restricted Data and Formerly Restricted Data

Department of Defense INSTRUCTION. Access to and Dissemination of Restricted Data and Formerly Restricted Data Department of Defense INSTRUCTION NUMBER 5210.02 June 3, 2011 Incorporating Change 1, October 25, 2017 USD(I) SUBJECT: Access to and Dissemination of Restricted Data and Formerly Restricted Data References:

More information

NG-J2 CNGBI A CH 1 DISTRIBUTION: A 07 November 2013

NG-J2 CNGBI A CH 1 DISTRIBUTION: A 07 November 2013 CHIEF NATIONAL GUARD BUREAU INSTRUCTION NG-J2 CNGBI 2400.00A CH 1 DISTRIBUTION: A ACQUISITION AND STORAGE OF INFORMATION CONCERNING PERSONS AND ORGANIZATIONS NOT AFFILIATED WITH THE DEPARTMENT OF DEFENSE

More information

Department of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public

Department of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public Department of Defense DIRECTIVE NUMBER 5210.50 July 22, 2005 USD(I) SUBJECT: Unauthorized Disclosure of Classified Information to the Public References: (a) DoD Directive 5210.50, subject as above, February

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5230.27 November 18, 2016 Incorporating Change 1, September 15, 2017 USD(AT&L) SUBJECT: Presentation of DoD-Related Scientific and Technical Papers at Meetings

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.6 July 16, 1996 SUBJECT: Counterintelligence (CI) Awareness and Briefing Program ASD(C3I) References: (a) DoD Directive 5240.6, subject as above, February

More information

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE Lockheed Martin Security TABLE OF CONTENTS Congratulations 2 Introduction 3 Reporting Requirements 4 Procedures and Duties 5 Safeguarding 6 Reproduction

More information

Department of Defense DIRECTIVE. SUBJECT: Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L))

Department of Defense DIRECTIVE. SUBJECT: Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) Department of Defense DIRECTIVE NUMBER 5134.1 April 21, 2000 SUBJECT: Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) DA&M References: (a) Title 10, United States Code

More information

Derivative Classification Requirements

Derivative Classification Requirements MARFORPAC SECURITY Derivative Classification Requirements 2009 (original thought not required) UNCLASSIFIED Sources of Requirements President Issues Executive Orders NSC National Security Council Sets

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.02 March 17, 2015 USD(I) SUBJECT: Counterintelligence (CI) References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) O-5240.02

More information

Identification and Protection of Unclassified Controlled Nuclear Information

Identification and Protection of Unclassified Controlled Nuclear Information ORDER DOE O 471.1B Approved: Identification and Protection of Unclassified Controlled Nuclear Information U.S. DEPARTMENT OF ENERGY Office of Health, Safety and Security DOE O 471.1B 1 IDENTIFICATION

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.02E June 20, 2012 Incorporating Change 1, Effective May 11, 2018 USD(I) SUBJECT: DoD Operations Security (OPSEC) Program References: See Enclosure 1 1. PURPOSE.

More information

SECURITY EXECUTIVE AGENT DIRECTIVE 1

SECURITY EXECUTIVE AGENT DIRECTIVE 1 SECURITY EXECUTIVE AGENT DIRECTIVE 1 SECURITY EXECUTIVE AGENT AUTHORITIES AND RESPONSIBILITIES (EFFECTIVE: 13 MARCH 2012) A. AUTHORITY: The National Security Act of 1947 (NSA of 1947), as amended; Executive

More information

Department of Defense INSTRUCTION. SUBJECT: Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)

Department of Defense INSTRUCTION. SUBJECT: Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB) Department of Defense INSTRUCTION NUMBER 5200.08 December 10, 2005 Incorporating Change 3, Effective November 20, 2015 USD(I) SUBJECT: Security of DoD Installations and Resources and the DoD Physical Security

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 Incorporating Change 1, November 17, 2017 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within

More information

il~l IL 20 I I11 AD-A February 20, DIRECTIVE Department of Defense

il~l IL 20 I I11 AD-A February 20, DIRECTIVE Department of Defense Department of Defense DIRECTIVE AD-A272 551 February 20, 1991 Il~~ I~~IlNUMBER ll l IIl ~l~ ~IiIll 5205.8 ASD(C31) SUBJECT: Access to Classified Cryptographic Information References: (a) National Telecommunications

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5230.27 October 6, 1987 USD(A) SUBJECT: Presentation of DoD-Related Scientific and Technical Papers at Meetings References: (a) DoD Directive 3200.12, "DoD Scientific

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5230.24 August 23, 2012 Incorporating Change 2, Effective November 1, 2017 USD(AT&L) SUBJECT: Distribution Statements on Technical Documents References: See Enclosure

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5400.16 July 14, 2015 Incorporating Change 1, August 11, 2017 DoD CIO SUBJECT: DoD Privacy Impact Assessment (PIA) Guidance References: See Enclosure 1 1. PURPOSE.

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.72 April 26, 2016 DCMO SUBJECT: Defense Technology Security Administration (DTSA) References: See Enclosure 1 1. PURPOSE. This directive reissues DoD Directive

More information

Department of Defense DIRECTIVE. SUBJECT: Disclosure of Classified Military Information to Foreign Governments and International Organizations

Department of Defense DIRECTIVE. SUBJECT: Disclosure of Classified Military Information to Foreign Governments and International Organizations Department of Defense DIRECTIVE NUMBER 5230.11 June 16, 1992 SUBJECT: Disclosure of Classified Military Information to Foreign Governments and International Organizations USD(P) References: (a) DoD Directive

More information

DOD DIRECTIVE ASSISTANT TO THE SECRETARY OF DEFENSE FOR PUBLIC AFFAIRS (ATSD(PA))

DOD DIRECTIVE ASSISTANT TO THE SECRETARY OF DEFENSE FOR PUBLIC AFFAIRS (ATSD(PA)) DOD DIRECTIVE 5122.05 ASSISTANT TO THE SECRETARY OF DEFENSE FOR PUBLIC AFFAIRS (ATSD(PA)) Originating Component: Office of the Deputy Chief Management Officer of the Department of Defense Effective: August

More information

Department of the Army TRADOC Memorandum Headquarters, United States Army Training and Doctrine Command Fort Eustis, Virginia

Department of the Army TRADOC Memorandum Headquarters, United States Army Training and Doctrine Command Fort Eustis, Virginia Department of the Army TRADOC Memorandum 380-5 Headquarters, United States Army Training and Doctrine Command Fort Eustis, Virginia 23604-5700 22 August 2016 Administration-General INFORMATION SECURITY

More information

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC 20301-1010 June 21, 2017 MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Directive-Type Memorandum (DTM) 17-007 Interim Policy and Guidance for

More information

Department of Defense DIRECTIVE. Inspector General of the Department of Defense (IG DoD)

Department of Defense DIRECTIVE. Inspector General of the Department of Defense (IG DoD) Department of Defense DIRECTIVE NUMBER 5106.01 April 20, 2012 DA&M SUBJECT: Inspector General of the Department of Defense (IG DoD) References: See Enclosure 1 1. PURPOSE. This Directive reissues DoD Directive

More information

Report No. D May 14, Selected Controls for Information Assurance at the Defense Threat Reduction Agency

Report No. D May 14, Selected Controls for Information Assurance at the Defense Threat Reduction Agency Report No. D-2010-058 May 14, 2010 Selected Controls for Information Assurance at the Defense Threat Reduction Agency Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for

More information

Supply Chain Risk Management

Supply Chain Risk Management Supply Chain Risk Management 731 07 December 2013 A. AUTHORITY: The National Security Act of 1947, as amended; 50 USC 3329, note (formerly 50 USC 403-2, note); the Counterintelligence Enhancement Act of

More information

Director of Central Intelligence Directive 1/7 (1) Security Controls on the Dissemination of Intelligence Information

Director of Central Intelligence Directive 1/7 (1) Security Controls on the Dissemination of Intelligence Information Director of Central Intelligence Directive 1/7 (1) Security Controls on the Dissemination of Intelligence Information Introduction (Effective 30 June 1998) Pursuant to the provisions of the National Security

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3305.12 October 14, 2016 Incorporating Change 1, Effective February 26, 2018 USD (I) SUBJECT: Intelligence and Counterintelligence (I&CI) Training of Non-U.S. Persons

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5030.59 March 10, 2015 Incorporating Change 1, Effective May 8, 2018 USD(I) SUBJECT: National Geospatial-Intelligence Agency (NGA) LIMITED DISTRIBUTION Geospatial

More information

DoD R, December 1982

DoD R, December 1982 1 2 FOREWORD TABLE OF CONTENTS Page FOREWORD 2 TABLE OF CONTENTS 3 REFERENCES 6 DEFINITIONS 7 CHAPTER 1 - PROCEDURE 1. GENERAL PROVISIONS 13 C1.1. APPLICABILITY AND SCOPE 13 C1.2. SCOPE 13 C1.3. INTERPRETATION

More information

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5510.165A DNS OPNAV INSTRUCTION 5510.165A From: Chief of Naval Operations Subj: NAVY

More information

DOD INSTRUCTION REGISTERED SEX OFFENDER (RSO) MANAGEMENT IN DOD

DOD INSTRUCTION REGISTERED SEX OFFENDER (RSO) MANAGEMENT IN DOD DOD INSTRUCTION 5525.20 REGISTERED SEX OFFENDER (RSO) MANAGEMENT IN DOD Originating Component: Office of the Under Secretary of Defense for Personnel and Readiness Effective: November 14, 2016 Releasability:

More information

SECURITY OF CLASSIFIED MATERIALS B STUDENT HANDOUT

SECURITY OF CLASSIFIED MATERIALS B STUDENT HANDOUT UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 SECURITY OF CLASSIFIED MATERIALS B141176 STUDENT HANDOUT Basic Officer Course Introduction Importance

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the Security Forces Management Information System (SFMIS) U. S. Air Force SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.01 August 27, 2007 Incorporating Change 1 and Certified Current Through August 27, 2014 USD(I) SUBJECT: DoD Intelligence Activities References: (a) DoD Directive

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.04 February 2, 2009 USD(I) SUBJECT: Counterintelligence (CI) Investigations References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350 1 000 SECNAVINST 5510.37 DUSN PPOI AUG - 8 2013 SECNAV INSTRUCTION 5510.37 From: Subj: Ref: Encl: Secretary of the

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5220.22 March 18, 2011 USD(I) SUBJECT: National Industrial Security Program (NISP) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Directive

More information

Department of Defense MANUAL. DoD Information Security Program: Controlled Unclassified Information (CUI)

Department of Defense MANUAL. DoD Information Security Program: Controlled Unclassified Information (CUI) Department of Defense MANUAL NUMBER 5200.01, Volume 4 February 24, 2012 Incorporating Change 1, Effective May 9, 2018 USD(I) SUBJECT: DoD Information Security Program: Controlled Unclassified Information

More information

v. : 18 U.S.C. 371, 951 & 2 MICHAEL RAY AQUINO, : I N D I C T M E N T a/k/a "Ninoy" The Grand Jury in and for the District of New Jersey,

v. : 18 U.S.C. 371, 951 & 2 MICHAEL RAY AQUINO, : I N D I C T M E N T a/k/a Ninoy The Grand Jury in and for the District of New Jersey, 2005R00881/SJR/KHB UNITED STATES DISTRICT COURT DISTRICT OF NEW JERSEY UNITED STATES OF AMERICA : Criminal No. 05- v. : 18 U.S.C. 371, 951 & 2 MICHAEL RAY AQUINO, : I N D I C T M E N T a/k/a "Ninoy" The

More information

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 Incorporating Change 1, July 27, 2017 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See

More information

Encl: (1) References (2) Department of the Navy Security Enterprise Governance (3) Senior Director for Security (4) Definitions (5) Responsibilities

Encl: (1) References (2) Department of the Navy Security Enterprise Governance (3) Senior Director for Security (4) Definitions (5) Responsibilities SECNAV INSTRUCTION 5500.36 From: Secretary of the Navy D E PA R T M E N T O F THE N AV Y OF FICE OF THE SECRETARY 1000 N AVY PENTAGON WASHING TON DC 20350-1000 SECNAVINST 5500.36 DUSN (P) Subj: DEPARTMENT

More information

Acquisitions and Contracting Basics in the National Industrial Security Program (NISP)

Acquisitions and Contracting Basics in the National Industrial Security Program (NISP) Acquisitions and Contracting Basics in the National Industrial Security Program (NISP) Lesson 1: Course Introduction Contents Introduction... 2 Opening... 2 Objectives... 2 September 2015 Center for Development

More information

NATO SECURITY INDOCTRINATION

NATO SECURITY INDOCTRINATION NATO SECURITY INDOCTRINATION This security briefing contains the minimum elements of information that must be provided to individuals upon initial indoctrination for access to NATO classified information.

More information

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT Warrant Officer Basic Course Introduction

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5210.48 December 24, 1984 USD(P) SUBJECT: DoD Polygraph Program References: (a) DoD Directive 5210.48, "Polygraph Examinations and Examiners," October 6, 1975 (hereby

More information

Department of the Navy. Information Security Program

Department of the Navy. Information Security Program THE SECRETARY OF THE NAVY SECNAV M-5510.36 Department of the Navy Information Security Program Published By Chief of Naval Operations (N09N) Special Assistant for Naval Investigative Matters and Security

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: Counterintelligence (CI) Analysis and Production References: See Enclosure 1 NUMBER 5240.18 November 17, 2009 Incorporating Change 2, Effective April 25, 2018

More information