Protecting Classified Information Overview A security clearance is a privilege, not a right. When you accept the privilege of access to classified information, you are also accepting the responsibilities that accompany this privilege. This guide informs you of your responsibilities and provides information to help you fulfill them. Your responsibility to protect the classified information that you learn about is a LIFELONG obligation. It continues even after you no longer have an active security clearance. The Nondisclosure Agreement you signed when accepting your clearance is a legally binding agreement between you and the U.S. Government in which you agreed to comply with procedures for safeguarding classified information and acknowledged that there are legal sanctions for violating this agreement. Deliberate violation for profit may be prosecuted. This agreement assigned to the U.S. Government the legal right to any payments, royalties or other benefits you might receive as a result of unauthorized disclosure of classified information. Your signed Nondisclosure Agreement is the only form held on file long after you retire (50 years!). The various topics in this module of the Security Guide discuss procedures for handling, marking, safeguarding, and communicating classified information. The regulatory basis for these procedures is Executive Order 12985, Classified National Security Information, dated October 13, 1995, as amended March 28, 2003. National guidance for implementing this order is in the Information Security Oversight Office (ISOO) Classified National Security Information Directive No. 1, September 22, 2003. Many individual departments, agencies, and offices also have their own implementing regulations, for example, Department of Defense Regulation 5200.1, Information Security Program. Failure to comply with these procedures may result in adverse administration action including revocation of your security clearance. When we study the history of foreign intelligence activities against the United States, one thing becomes very clear. When our adversaries or competitors are successful in obtaining classified or other sensitive information, it is usually due to negligence, willful disregard for security, or betrayal of trust by our own personnel. 1 The Bottom Line Pogo, a popular cartoon character from the 1960s, coined an oft-quoted phrase: "We have met the enemy, and he is us." That sums it up. We – not our foreign adversaries or competitors – are the principal source of the problem, but we can also become the solution. You and I and all others who hold a security clearance are the first line of defense against espionage and other loss of sensitive information. Together, if we fulfill our responsibilities, we have the power to protect our national security and economic interests. Need-to-Know Your security clearance does not give you approved access to all classified information. It gives you access only to: Information at the same or lower level of classification as the level of the clearance granted; AND that you have a "need-to-know" in order to perform your work. Need-to-know is one of the most fundamental security principles. The practice of need-to-know limits the damage that can be done by a trusted insider who goes bad. Failures in implementing the need-to-know principle have contributed greatly to the damage caused by a number of recent espionage cases. Need-to-know imposes a dual responsibility on you and all other authorized holders of classified information: When doing your job, you are expected to limit your requests for information to that which you have a genuine need-to-know. Under some circumstances, you may be expected to explain and justify your need-toknow when asking others for information. Conversely, you are expected to ensure that anyone to whom you give classified information has a legitimate need to know that information. You are obliged to ask the other person for sufficient information to enable you to make an informed decision about their need-to-know, and the other person is obliged to justify their need-to-know. You are expected to refrain from discussing classified information in hallways, cafeterias, elevators, rest rooms or smoking areas where the discussion may be overheard by persons who do not have a need-to-know the subject of conversation. 2 You are also obliged to report to your security office any co-worker who repeatedly violates the need-to-know principle. Need-to-know is difficult to implement as it conflicts with our natural desire to be friendly and helpful. It also requires a level of personal responsibility that many of us find difficult to accept. The importance of limiting sensitive information to those who have a need to know is underscored, however, every time a trusted insider is found to have betrayed that trust. Here are some specific circumstances when you need to be particularly careful: An individual from another organization may contact you and ask for information about your classified project. Even though you have reason to believe this person has the appropriate clearance, you are also obliged to confirm the individual’s need-to-know before providing information. If you have any doubt, consult your supervisor or security officer. Difficult situations sometimes arise when talking with friends who used to be assigned to the same classified program where you are now working. The fact that a colleague formerly had a need-to-know about this program does not mean he or she may have access to the information. There is no "need" to keep up to date on sensitive developments after being transferred to a different assignment. The need-to-know principle also applies to placing classified information on computer networks. Before doing so, make sure it is appropriate for this information to be seen by all persons with access to the system. Although every individual gaining access to a particular computer network is cleared for the clearance level of that system, they may not have a need to know all of the information posted on the system. Classification Procedures 3 Original and Derivative Classification Executive Order 12958, as amended March 25, 2003, sets U.S. Government policy for classifying national security information that must be protected from unauthorized disclosure. Information is classified in one of two ways -- originally or derivatively. Original classification is the initial determination that information requires protection. Only U.S. Government officials to whom this authority has been delegated in writing and who have been trained in classification requirements have the authority for original classification. Original classification authorities issue security classification guides that others use in making derivative classification decisions. Most government employees and contractors make derivative classification decisions. Derivative classification is the act of classifying a specific item of information or material on the basis of an original classification decision already made by an authorized original classification authority. The source of authority for derivative classification ordinarily consists of a previously classified document or a classification guide issued by an original classification authority. For example, Defense contractors make derivative classification decisions based on the Contract Security Classification Specification that is issued with each classified contract. If a contractor develops an unsolicited proposal or originates information not in the performance of a classified contract, the following rules apply. If the information was previously identified as classified, it should be classified derivatively. If the information was not previously classified, but the contractor believes the information may be or should be classified, the contractor should protect the information as though classified at the appropriate level and submit it to the agency that has an interest in the subject matter for a classification determination. In such a case, the material should be marked CLASSIFICATION DETERMINATION PENDING. Protect as though classified (TOP SECRET, SECRET, or CONFIDENTIAL). The full text of Executive Order 12958 is available at DSS website at www.dss.mil/seclib/index.htm. Classification guidelines for defense contractors are in Chapter 4 of the National Industrial Security Program Operating Manual. Full text of the NISPOM is also available on the Defense Security Service Internet site at, www.dss.mil/seclib/index.htm. Classification Levels Information that must be controlled to protect the national security is assigned one of three levels of classification, as follows: 4 TOP SECRET information is information which, if disclosed without authorization, could reasonably be expected to cause exceptionally grave damage to the national security. SECRET information is information which, if disclosed without authorization, could reasonably be expected to cause serious damage to the national security. CONFIDENTIAL information is information which, if disclosed without authorization, could reasonably be expected to cause damage to the national security. Atomic energy information is classified under the Atomic Energy Act of 1954, and the procedures differ from those prescribed for national security information. Atomic energy information is automatically classified and remains classified until a positive action is taken to declassify it. It may be declassified only by the Department of Energy. Consult your security officer for information on marking and handling atomic energy information. There are two types: RESTRICTED DATA covers "all data concerning (1) design, manufacture, or utilization of atomic weapons; (2) the production of special nuclear material; or (3) the use of special nuclear material in the production of energy," except for data that has been declassified or removed from the Restricted Data category. FORMERLY RESTRICTED DATA is information which has been removed from the Restricted Data category after Department of Energy and Department of Defense have jointly determined that the information relates primarily to the military utilization of atomic weapons and can be adequately safeguarded as National Security Information. The word "formerly" only means that such information is no longer subject to controls under the Atomic Energy Act. Formerly Restricted Data remains classified and subject to controls on national security information. Such data may not be given to any other nation except under specially approved agreements. It is identified and handled as RESTRICTED DATA when sent outside the United States. RESTRICTED DATA and FORMERLY RESTRICTED DATA should also be marked with one of the three classification levels -- TOP SECRET, SECRET, or CONFIDENTIAL. Markings for the "Classified by," "Derived from," and "Declassify on" Lines All classified information shall be marked to reflect the source of the classification, reason for the classification, and instructions for declassification or downgrading. The markings used to show this information must appear toward the bottom on the cover, first page, title page, or in another prominent position. 5 Nondocumentary material should show the required information on the material itself or, if not practical, in related or accompanying documentation. "Classified by" Line: The "Classified by" line is used only on originally classified documents. It identifies the original classification authority by name or personal identifier and position and cites justification for the classification. This is followed by a "Reasons" line that cites by name or number one of the seven approved classification categories specified in Executive Order 12958. Example of original classification "Derived from" Line: Any appropriately cleared employee has the authority to derivatively classify a document. The "Derived from" line cites the source document or classification guide which allowed you to determine that the information in your document is classified. The date of the source document or classification guide is to be included. If more than one source document, classification guide, or combination of these provided the derivative classification guidance, write "Multiple Sources" on the "Derived from" line. A record of these multiple sources must be maintained on or with the file copy of the document. 6 Example of derivative classification "Declassify on" Line: The classified by or derived from lines should be followed by a line that identifies when the classified information is to be declassified. This information is obtained from the "Declassify on _____" line of the source document or from a classification guide. If your document classification is derived from "Multiple Sources" and different declassification instructions apply, you must use the most restrictive declassification instruction that applies. Declassification The Original Classification Authority has the following options for declassification instructions for documents that were originally classified under Executive Order 12958. Whenever possible, the declassification date should be specified as a date or event that corresponds to the lapse of the information's national security sensitivity. However, the date or event must not exceed 25 years from the date of the original classification. If information should remain classified beyond 25 years, there are a number of exemptions that may apply. This may be appropriate, for example, if the information would reveal the identity of a confidential human source, or a human intelligence source, or reveal information about the application of an intelligence source or method. 7 Many older documents classified prior to Executive Order 12958 still carry the declassification designation OADR -- Originating Agency's Determination Required. When one of these documents is the source document for derivative classification, the Declassify on line should read: Source document marked "OADR" Date of source (insert date). No U.S. document shall be downgraded below the highest level of foreign government information contained in the document, nor shall it be declassified without the written approval of the foreign government that originated the information. Classified Information Appearing in Public Media: The fact that classified information has been made public does not mean it is automatically declassified. Information remains classified unless and until it is formally declassified. If you become aware of classified or other sensitive information appearing in the public media, bring it to the attention of your security office. Downgrading or Declassifying Classified Information: Information is downgraded or declassified based on the loss of sensitivity of the information due to the passage of time or on occurrence of a specific event. Declassification is not automatically an approval for public disclosure. Marking Downgraded or Declassified Material: Classified information that is downgraded or declassified should be promptly and conspicuously marked to indicate the change. Classification Pending: Material that you generate, and that you believe may be classified and for which no classification guidance is available, must be protected and handled as though classified at the appropriate level until a classification determination is obtained from the appropriate government organization. This material should be marked as follows: CLASSIFICATION DETERMINATION PENDING PROTECT AS (APPROPRIATE CLASSIFICATION LEVEL) The derivative and warning notice markings need not be applied in this situation. Reproduction should be held to an absolute minimum until a classification determination is received. Challenging a Classification Any approved holder of classified information who believes the information is classified improperly or unnecessarily, or that current security considerations justify downgrading to a lower classification or upgrading to a higher classification, or that security classification guidance is improper or inadequate, is encouraged and expected to challenge the classification status. 8 Government employees should pursue such actions through established agency procedures that protect individuals from retribution for bringing such actions, provide an opportunity for review by an impartial official or panel, and provide a right of appeal to the Interagency Security Classification Appeals Panel. Contractors should appeal such issues through their pertinent government contracting authority. Marking Classified Information Physically marking classified information with appropriate classification and control markings serves to warn and inform holders of the degree of protection required. Other notations aid in derivative classification actions and facilitate downgrading or declassification. It is important that all classified information and material be marked to clearly convey the level of classification assigned, the portions that contain or reveal classified information, the period of time protection is required, and any other notations required for protection of the information or material. The following is a summary of the most commonly used document control markings. More detailed information is available via the Internet from a variety of sources. Overall Classification Markings The overall (i.e., highest) classification of a document is marked at the top and bottom of the outside cover (if there is one), the title page (if there is one), the first page, and the outside of the back cover (if there is one) or back side of the last page. Each interior page containing classified information is marked top and bottom with the overall (i.e., highest) classification of the page. Each unclassified interior page is marked 'Unclassified" at the top and bottom. Interior pages that are For Official Use Only need to be marked only at the bottom. Blank pages require no markings. Attachments and annexes may become separated from the basic document. They should be marked as if they were separate documents. Additionally, every classified document must show, on the face of the document, the agency and office that created it and date of creation. This information must be clear enough to allow someone receiving the document to contact the preparing office if questions or problems about classification arise. U.S. documents that contain foreign government information shall be marked on the front, "THIS DOCUMENT CONTAINS FOREIGN GOVERNMENT (indicate level) INFORMATION." 9 Computer files must be marked with appropriate headers and footers to ensure that anything that is transmitted or printed will have the applicable classification and associated markings. All removable storage media and devices such as diskettes, CD-ROMs, cassettes, magnet tape reels, etc. must have an outer label with the appropriate markings. Each slide must be marked on the slide itself or slide cover, as well as on the image that is projected. Automated Information Processing Requirements Use of automated information systems to route and control access to information is forcing changes in how documents are marked. Within the Intelligence Community, classification and control markings must now follow a specified format that enables automated systems to recognize the markings. The following formats apply only within the Intelligence Community.2 However, similar rules are under consideration in the Defense Department and other government organizations. Any classified document, either in hard copy or automated, must contain a header and footer with the classification, any control markings, and declassification date or designation. These three elements -- classification, control marking(s), and declassification date -- must be separated by two forward slashes and no spaces. If multiple dissemination control markings are used, they are separated by a comma and no spaces, except that multiple SCI controls are separated by a single forward slash and no spaces. Declassification date must be marked by an eight-digit number (year, month, day), exemption category (such as X1), or as Manual Review (MR). This is illustrated by the following examples: SECRET//SI/TK//NOFORN//X1 SECRET//ORCON,PROPIN//20091231 A control marking such as FOR OFFICIAL USE ONLY cannot stand alone. It must be preceded by a classification as in: UNCLASSIFIED//FOR OFFICIAL USE ONLY When marking foreign government classified information, the classification is preceded by two forward slashes and countries are identified by an approved three-letter designator, as in //NATO SECRET or //DEU SECRET for Germany. 10 Portion Marking The title or subject of a classified document is marked with the appropriate classification abbreviation in parentheses -- (TS), (S), (C), or (U) immediately following and to the right of the title or subject. Each section, part, paragraph, or similar portion of a classified document is to be marked with the appropriate classification abbreviation in parentheses immediately before the beginning of the portion. If the portion is numbered or lettered, place the abbreviation in parentheses between the letter or number and the start of the text. Portions of U.S. documents containing foreign government information are marked to reflect the foreign country of origin as well as the appropriate classification, for example, (U.K.-C). Portions of U.S. documents containing extracts from NATO documents are marked to reflect "NATO" or "COSMIC" as well as the appropriate classification, for example, (NATO-S) or (COSMIC-TS). Further information is available at Foreign Government Classified Information. Release to Foreign Countries/Organizations In support of homeland security and coalition warfare, the U.S. Government has an increased need to share data with foreign countries, international organizations, and multinational forces. This has led to recent changes in the use of the "Released to..." (REL TO) control marking. This marking was previously only for use on intelligence information, but it is now authorized for use on all classified defense information. Following the REL TO marking is a list of countries to which the information may be released through proper disclosure channels to specified foreign governments or international organizations. This list starts with USA and is followed by other countries listed alphabetically by the approved country code(s), international organization, or coalition force. Example: TOP SECRET//REL TO USA, EGY and ISR This format with // after the classification, a comma and space between each country, and with a lower case "and" with no comma before the last country code must be followed exactly to facilitate machine reading and sorting of the document. The approved three-letter country codes are available on the Internet at ftp.ripe.net/iso3166-countrycodes.txt. This marking shall appear at the top and bottom of the front cover (if there is one), the title page (if there is one), the first page and the outside of the back cover (if there is one). Each interior page containing classified information is marked top and bottom with the overall (i.e., highest) classification of the page. 11 When portion marking individual titles or paragraphs, the countries do not need to be listed unless they are different from the countries listed in the REL TO at the top and bottom of the page. For example: (TS:REL). If information is releasable to different countries than those listed in the overall REL TO marking, all the countries and organizations should be listed in the portion marking. For example: (S//REL TO USA, AUS, NZL and NATO). The marking "Not Releasable to Foreign Nationals" (NOFORN) is still only authorized for use on intelligence that requires originator approval before being disclosed (see below). Other Distribution Controls In addition to its classification, intelligence information and certain scientific or technical information may also be subject to other controls on its distribution and handling. It is your responsibility to understand and comply with the control markings on classified information. If you are not sure, contact your security office. These control markings include: Dissemination and Extraction of Information Controlled by Originator (ORCON) or (OC) means that any additional distribution or inclusion in another document must be approved by the originator of the document. It is used on intelligence information that could permit identification of a sensitive intelligence source or method. Not Releasable to Contractors/Consultants (NOCONTRACT) has been discontinued but is still seen on older documents. Check with the originator of the document regarding any ongoing controls on the use of such a document. This caveat was used on intelligence information that is provided by a source on the express or implied condition that it not be made available to contractors; or that, if disclosed to a contractor, would actually or potentially give him/her a competitive advantage or cause a conflict of interest with his/her obligation to protect the information. Caution - Proprietary Information Involved (PROPIN) or (PR) is used with or without a security classification to identify information provided by a commercial firm or private source under an express or implied understanding that the information will be protected as a trade secret or proprietary data with actual value. NOFORN is for intelligence information that may not be passed to foreign nationals. Authorized for Release to ____ (REL TO) signifies intelligence information that is releasable to or has been released through proper disclosure channels to the named foreign government or international organization. See more specific guidance in previous section. Sensitive Compartmented Information (SCI) applies to certain intelligence sources, methods, or analytical processes that are subject to a 12 formal access control system established by the Director of Central Intelligence. Special approval is required for access to SCI. Communications Security (COMSEC) is the protection of all elements of telecommunications -- encryption, transmission, emissions, and the physical security of equipment and materials. Cryptographic Material (CRYPTO) identifies information or materials that must be handled through special cryptographic channels. Warning Notice - Intelligence Sources or Methods Involved (WNINTEL) has been discontinued but is still seen on older documents. It was used on intelligence information that identifies or would reasonably permit identification of an intelligence source or method that is susceptible to countermeasures that could nullify or reduce its effectiveness. Critical Nuclear Weapons Design Information (CNWDI) or (N) applies to information that reveals the theory of operation or design of the components of a thermonuclear or fission bomb, warhead, demolition munition, or test device. Special handling procedures are required. Department of Defense also uses the marking Alternative or Compensatory Control Measures (ACCM) for classified information that requires special security measures to safeguard classified intelligence or operations and support information when normal measures are insufficient to achieve strict need-to-know controls and where special access program (SAP) controls are not required. ACCM measures are defined as the maintenance of lists of personnel to whom the specific classified information has been or may be provided together with the use of an unclassified project nickname. The ACCM designation is used in conjunction with the security classification to identify the portion, page, or document containing ACCM information. Handling Classified Information As an approved custodian or user of classified information, you are personally responsible for the protection and control of this information. You must safeguard this information at all times to prevent loss or compromise and unauthorized disclosure, dissemination, or duplication. Unauthorized disclosure of classified material is punishable under the Federal Criminal Statutes or organizational policies. Your security officer or supervisor will brief you on the specific rules for handling classified information that apply to your organization. Here are some standard procedures that apply to everyone. Classified information that is not safeguarded in an approved security container shall be constantly under the control of a person having the proper security clearance and need-to-know. An end-of-day security check should ensure that all classified material is properly secured before closing for the night. 13 If you find classified material left unattended (for example, in a rest room, or on a desk), it is your responsibility to ensure that the material is properly protected. Stay with the classified material and notify the security office. If this is not possible, take the documents or other material to the security office, a supervisor, or another person authorized access to that information, or, if necessary, lock the material in your own safe overnight. Classified material shall not be taken home, and you must not work on classified material at home. Classified information shall not be disposed of in the waste basket. It must be placed in a designated container for an approved method of destruction such as shredding or burning. E-mail and the Internet create many opportunities for inadvertent disclosure of classified information. Before sending an e-mail, posting to a bulletin board, publishing anything on the Internet, or adding to an existing Web page, you must be absolutely certain none of the information is classified or sensitive unclassified information. Be familiar with your organization's policy for use of the Internet. Many organizations require prior review of ANY information put on the Internet. Classified working papers such as notes and rough drafts should be dated when created, marked with the overall classification and with the annotation "Working Papers," and disposed of with other classified waste when no longer needed. Computer diskettes, magnetic tape, CDs, carbon paper, and used typewriter ribbons may pose a problem when doing a security check, as visual examination does not readily reveal whether the items contain classified information. To reduce the possibility of error, some offices treat all such items as classified even though they may not necessarily contain classified information. Foreign government material shall be stored and access controlled generally in the same manner as U.S. classified material of an equivalent classification, with one exception. See Foreign Government Classified Information. Top Secret information is subject to continuing accountability. Top Secret control officials are designated to receive, transmit, and maintain access and accountability records for Top Secret information. When information is transmitted from one Top Secret control official to another, the receipt is recorded and a receipt is returned to the sending official. Each item of Top Secret material is numbered in series, and each copy is also numbered. 14 Some classified Department of Defense information is subject to special controls called Alternative or Compensatory Control Measures (ACCM). ACCM are security measures used to safeguard classified intelligence or operations and support information when normal measures are insufficient to achieve strict need-to-know controls and where special access program (SAP) controls are not required. ACCM measures include the maintenance of lists of personnel to whom the specific classified information has been or may be provided, together with the use of an unclassified nickname and ACCM designation used in conjunction with the security classification to identify the portion, page, and document containing such specific classified information. Sensitive Controlled Information (SCI) is subject to special handling procedures not discussed here. Mailing and Carrying Classified Materials The following procedures apply to mailing or carrying classified materials. These procedures cover the most common circumstances but do not cover the shipment of bulky materials. It is intended as general guidance only and is not a substitute for review of the official regulations. TOP SECRET material may not be sent through the mail under any circumstances. It must be transmitted by cleared courier or approved electronic means. SECRET material may be transmitted by U.S. Postal Service registered mail or express mail within and between the United States and its territories. However, the "Waiver of Signature and Indemnity" block on the Express Mail Label 11-B may not be executed, and the use of external (street side) express mail collection boxes is prohibited. SECRET material may be sent through U.S. Postal Service registered mail through Army, Navy, or Air Force Postal Service facilities outside the United States, provided that the information does not at any time pass out of U.S. citizen control and does not pass through a foreign postal system or any foreign inspection. Federal Express may also be used for SECRET material for urgent, overnight delivery only, but contractors must receive approval from their government contracting authority to use this method. CONFIDENTIAL material is subject to the same mailing procedures as Secret material, with the following exceptions: 1) CONFIDENTIAL material may be sent by U.S. Certified mail rather than by U.S. Registered mail. 2) Government agencies (but not contractors) may also send CONFIDENTIAL material by First Class mail between and among government agencies only. It cannot be sent to contractors via First Class mail. Under all circumstances, the outer envelope should be marked "Do Not Forward. Return to Sender." Under no circumstances shall the USPS Express Mail label 11-B "Waiver of Signature and Indemnity" be used. 15 Classified material must be mailed at the post office. Use of street mail collection boxes is prohibited. Wrapping All classified material must be double-wrapped with opaque inner and outer covers. It shall be marked as follows: Mark the inner envelope top and bottom on both sides, preferably in red, with the classification in capital letters. A box with classified material should be marked with the classification on all surfaces of the inner wrapping. Write the complete mailing address and complete return address on the inner envelope. The address on the inner envelope should have the name of an appropriately cleared individual. On the outer envelope, write the complete mailing address and return address. Do not indicate on the outer envelope that it contains classified information. Classified mail or shipments should be addressed to the Commander or other head of the organization by title, not by name, or to an approved classified mailing address of a federal activity or to a cleared contractor using the name and classified mailing address of the facility. An individual's name should not appear on the outer envelope. Instead of a person's name, use office code letters, numbers, or phrases in an attention line to aid in internal routing. When necessary to direct material to the attention of a particular individual, put the individual's name on an attention line in the letter of transmittal or on the inner container or wrapper. For Official Use Only is a document control designation, not a classification. Such material may be mailed in a single envelope. Receipts A receipt identifying the sender, the addressee, and the document should be attached to or enclosed in the inner envelope as noted below. The receipt shall contain no classified information. It should be signed and returned to the sender. Top Secret material must be transmitted under a continuous chain of receipts covering each individual who obtains custody. For Secret material, a classified material receipt must be included with all material transmitted outside the facility. 16 For Confidential material, a receipt must be included only if the sender deems it necessary, or if the information is being transmitted to a foreign government. Hand-Carrying Classified Material For hand-carrying classified material, different procedures apply for surface transportation, commercial air, government air, and for transportation outside the continental U.S. If you personally transport classified material by car or foot to another location, you must provide reasonable protection for the information under all foreseeable contingencies that might occur while in transit. Automobile accident, theft and sudden illness are all foreseeable contingencies. This means the classified information must be double wrapped or packaged as though it were being sent by mail, kept under your constant control (i.e., not left in the trunk of your car while you run another errand), and delivered only to an authorized person. A briefcase may serve as the outer wrapper only if it is locked and approved for carrying classified material. Prepare an inventory of the material and leave one copy in your office and another copy with a security officer or other responsible person. Carrying classified material on trips that involve an overnight stopover is not permitted without advance arrangements for overnight storage in a U.S. Government office or a cleared contractor facility. For air travel, a written letter of authorization from your security office is required. Your security officer will advise you of appropriate procedures. Stricter procedures are required for air travel outside the United States. For air travel, a locked briefcase may not serve as the outer wrapper. Appropriate Use Of Computer Systems Misuse of an automated information system is sometimes illegal, often unethical, and always reflects poor judgment or lack of care in following security rules and regulations. Misuse may, unintentionally, create security vulnerabilities or cause damage to important information. A pattern of inability or unwillingness to follow rules for the operation of computer systems raises serious concerns about an individual's reliability and trustworthiness. 17 As we store more and more information in computer data bases, and as these data bases become more closely linked in networks, more people have broader access to more information than ever before. Computer technology has magnified many times the ability of a careless or disaffected employee to cause severe damage. This topic discusses rules for using your computer. You should also read Computer Vulnerabilities, which describes in nontechnical language the security and other vulnerabilities of computer networks that make some of these rules necessary. Owing to the magnitude of problems that can be caused by misuse of computer systems, Misuse of Technical Information Systems is now one of the 13 criteria used in adjudicating approval and revocation of security clearances for access to classified information. Many aspects of computer use are governed by your organization's policy rather than by federal government regulation. Many government agencies and defense contractors specify the security procedures and prohibited or inappropriate activities discussed below. Security Rules The following are basic rules for secure use of the computer. Do not enter into any computer system without authorization. Unauthorized entry into a protected or compartmented computer file is a serious security violation and is probably illegal. It can be a basis for revocation of your security clearance. Whether motivated by the challenge of penetrating the system or by simple curiosity to see what is there, unauthorized entry is a deliberate disregard for rules and regulations. It can cause you to be suspected of espionage. At a minimum, it violates the need-to-know principle and in some cases is an invasion of privacy. Do not store or process classified information on any system not explicitly approved for classified processing. See Security of Hard Drives. Do not attempt to circumvent or defeat security or auditing systems without prior authorization from the system administrator, other than as part of a system test or security research authorized in advance. Do not install any software on your computer without the approval of your system administrator. Do not use another individual’s userid, password, or identity. 18 Do not permit an unauthorized individual (including spouse, relative or friend) access to any sensitive computer network. Do not leave sensitive but unclassified work materials on a home computer to which other persons have access. Do not reveal your password to anyone -- not even your computer system administrator. See Passwords Do not respond to any telephone call from anyone whom you do not personally know who asks questions about your computer, how you use your computer, or about your userid or password. See "Social Engineering." If you are the inadvertent recipient of classified material sent via e-mail or become aware of classified material on an open bulletin board or web site, you must report this to the security office. Do not modify or alter the operating system or configuration of any system without first obtaining permission from the owner or administrator of that system. Do not use your office computer system to gain unauthorized access to any other computer system. Inappropriate Use Many offices permit some, minimal personal use of office equipment when such personal use involves minimal expense to the organization, is performed on your personal non-work time, does not interfere with the office's mission, and does not violate standards of ethical conduct. The following activities are considered to be misuse of office equipment: The creation, download, viewing, storage, copying, or transmission of sexually explicit or sexually oriented materials can cause you to be fired from your job. See discussion under E-Mail. Annoying or harassing another individual, for example through uninvited email of a personal nature or using lewd or offensive language can cause you to be fired from your job. See discussion under E-Mail. Using the computer for commercial purposes or in support of "for-profit" activities or in support of other outside employment, business activity (e.g., consulting for pay, sales or administration of business transactions, sale of goods or services), or gambling. Engaging in any outside fund-raising activity, endorsing any product or service, participating in any lobbying activity, or engaging in any prohibited partisan political activity. The creation, copying, transmission, or retransmission of chain letters or other unauthorized mass mailings. Any activities that are illegal, inappropriate, or offensive to fellow employees or the public. Such activities include hate speech or material 19 that ridicules others on the basis of race, creed, religion, color, sex, disability, national origin, or sexual orientation. Use for posting office information to any external newsgroup, chat room, bulletin board, or other public forum without prior approval. Any personal use that could cause congestion, delay, or disruption of service to any office equipment. This includes sending pictures, video, or sound files or other large file attachments that can degrade computer network performance. The unauthorized acquisition, use, reproduction, transmission, or distribution of any controlled information. This includes copyrighted computer software; other copyrighted or trademarked material or material with intellectual property rights (beyond fair use); privacy information; and proprietary data or export-controlled data or software. E-Mail There are two big problems with e-mail. One is increased risk of accidental security compromise. The other is sending inappropriate materials by e-mail, which has caused many people to be fired from their jobs. Security Risks with E-Mail As a result of the Internet and e-mail, there has been a sharp increase in security incidents involving the accidental disclosure of classified and other sensitive information. One common problem occurs when individuals download a seemingly unclassified file from a classified system, and then fail to carefully review this file before sending it as an attachment to an e-mail message. Too often, the seemingly unclassified file actually has some classified material or classification markings that are not readily apparent when the file is viewed on line. Sending such material by e-mail is a security violation even if the recipient has an appropriate security clearance, as e-mail can easily be monitored by unauthorized persons. See E-Mail Pitfalls in Computer Vulnerabilities. More important, even if the downloaded file really is unclassified, the electronic version of that file may have recoverable traces of classified information. This happens because data is stored in "blocks." If a file does not take up an entire block, the remainder of that block may have recoverable traces of data from other files. (See Security of Hard Drives for further explanation of this problem.) Your system administrator must follow an approved technical procedure for removing these traces before the file is treated as unclassified. Some organizations have found it necessary to lock their computer drives to prevent any downloading of files from the classified system. If an individual wishes to download and retransmit an unclassified file from a classified system, the file must be downloaded and processed by the system administrator to remove electronic traces of other files before it is retransmitted. 20 Inappropriate Materials Sending e-mail is like sending a postcard through the mail. Just as the mailman and others have an opportunity to read a postcard, network eavesdroppers can read your e-mail as it passes through the Internet from computer to computer. Email is not like a telephone call, where your privacy rights are protected by law. The courts have repeatedly sided with employers who monitor their employees' e-mail or Internet use. A 2005 survey found that 63% of corporations with 1,000 or more employees either employ or plan to employ staff to read or otherwise analyze outbound email. 27% of the companies reported terminating an employee due to email misuse during the previous year. 35% investigated a suspected email leak of confidential information during the past year. In addition to protection of their intellectual property, companies were concerned about compliance with financial disclosure regulations.4 Organizations also monitor email to protect themselves against lawsuits, as the organization can be held liable for abusive, harassing, or otherwise inappropriate messages sent over its computer network. In the past couple years, The New York Times fired 23 employees for exchanging off-color e-mail. Xerox fired 40 people for inappropriate Internet use. Dow Chemical fired 24 employees and disciplined another 230 for sending or storing pornographic or violent material by e-mail. 1 Several years ago, Chevron Corp. had to pay $2.2 million to plaintiffs who successfully brought a suit of sexual harassment, in part because an employee sent an e-mail to coworkers listing the reasons why beer is better than women. 2 Security of Hard Drives Secrets in the computer require the same protection as secrets on paper. This is because information can be recovered from a computer hard drive even after the file has been deleted or erased by the computer user. It is estimated that about a third of the average hard drive contains information that has been "deleted" but is still recoverable. 3 When you delete a file, most computer operating systems delete only the "pointer" which allows the computer to find the file on your hard drive. The file itself is not deleted until it is overwritten by another file. This is comparable to deleting a chapter heading from the table of contents of a book, but not removing the pages on which the chapter is written. Some networks may be configured to "wipe" or purge the hard drive when information is deleted, but most are not. Computers on which classified information is prepared must be kept in facilities that meet specified physical security requirements for processing classified information. If necessary to prepare classified information on a computer in a 21 non-secure environment, use a removable hard drive or laptop that is secured in an approved safe when not in use. Alternatively, use a typewriter. Check with your security office concerning rules for traveling with a laptop on which classified or other sensitive information has been prepared. Laptop computers are a particular concern owing to their vulnerability to theft. Computer Passwords Passwords are used to authenticate an individual’s right to have access to certain information. Your password is for your use only. Lending it to someone else is a security violation and may result in disciplinary action against both parties. Never disclose your password to anyone. Memorize it – do not put it in writing. If you leave your terminal unattended for any reason, log off or use a screen lock. Otherwise, someone else could use your computer to access information they are not authorized to have. You will be held responsible if someone else uses your password in connection with a system transaction. As hackers and scammers develop more clever ways to steal passwords, it becomes more important that passwords be changed regularly. Use a password with at least six and preferably eight characters and consisting of a mix of upper and lower case letters, numbers, and special characters such as punctuation marks This mix of various types of characters makes it more difficult for a hacker to use an automated tool called a "password cracker" to discover your password. Cracking passwords is a common means by which hackers gain unauthorized access to protected systems. For additional information on selecting a strong password and why this is so important, see Passwords and the case studies in Computer Vulnerabilities. "Social Engineering" "Social engineering" is hacker-speak for conning legitimate computer users into providing useful information that helps the hacker gain unauthorized access to their computer system. The hacker using social engineering usually poses as a legitimate person in the organization (maintenance technician, security officer, inexperienced computer user, VIP, etc.) and employs a plausible cover story to trick computer users into giving useful information. This is usually done by telephone, but it may also be done by forged e-mail messages or even in-person visits. Most people have an incorrect impression of computer break-ins. They think they are purely technical, the result of technical flaws in computer systems which the intruders are able to exploit. The truth is, however, that social engineering often plays a big part in helping an attacker slip through security barriers. Lack of 22 security awareness or gullibility of computer users often provides an easy stepping stone into the protected system if the attacker has no authorized access to the system at all. For additional information see "Social Engineering" and the two case studies in Computer Vulnerabilities. Protecting Your Home Computer If you access your office network from home or do work at home that is then emailed to the office or brought to the office on any removable storage media, this can affect the security of the office network. You have an obligation to take standard procedures for protecting your home computer against viruses and other problems that might be transmitted to your office network. These include installing a virus checker with automatic updates, installing a personal firewall, turning off or uninstalling any options that significantly increase security risk, and keeping your computer's operating system up-to-date with security fixes as they become available. Glossary of Definitions Most of the following definitions of security-related terms are from the National Industrial Security Program Operating Manual (NISPOM), Appendix C. Some are from other sources. A---B---C---D---E---F---G---H---I---J---K---L---M N---O---P---Q---R---S---T---U---V---W---X---Y---Z Access. The ability and opportunity to obtain knowledge of classified information. Access Authorization (Security Clearance). Authority permitting an employee performing on government work and having need-to-know to have access to classified information at a stipulated level of classification. Authorization for access at one level of classified information automatically authorizes an individual for lower levels. Access List. A listing of names used to designate those persons authorized to enter a controlled area or to have access to a particular classified document. Accountability. Obligation for keeping an accurate record of custodians, documents, and material, not necessarily vested in the person having possession of the items. 23 Adverse Information. Any information that adversely reflects on the integrity or character of a cleared employee, that suggests that his or her ability to safeguard classified information may be impaired, or that his or her access to classified information clearly may not be in the interest of national security. Affiliate. Any entity effectively owned or controlled by another entity. AIS Access. The ability and the means to approach, communicate with (input to or receive output from), or otherwise make use of any material or component in an Automated Information System. Alien. Any person not a citizen or national of the United States. An immigrant alien is a person lawfully admitted into the United States under an immigration visa for permanent residence. See Foreign National. Alternative or Compensatory Control Measures (ACCM). ACCM are security measures used to safeguard classified intelligence or operations and support information when normal measures are insufficient to achieve strict need-to-know controls and where special access program (SAP) controls are not required. ACCM measures are defined as the maintenance of lists of personnel to whom the specific classified information has been or may be provided together with the use of an unclassified nickname, and "ACCM" used in conjunction with the security classification to identify the portion, page, and document containing such specific classified information. Approved Access Control Device. An access control device that meets the requirements of this Manual as approved by the FSO. Approved Built-in Combination Lock. A combination lock, equipped with a topreading dial that conforms to Underwriters' Laboratories, Inc. Standard Number, UL 768, Group 1R. Approved Combination Padlock. A three-position dial-type changeable combination padlock listed on the GSA Qualified Products List as meeting the requirements of Federal Specification FF-P-110. Approved Electronic, Mechanical, or Electro-Mechanical Device. An electronic, mechanical, or electro-mechanical device that meets the requirements of this Manual as approved by the FSO. Approved Key-Operated Padlock. A padlock, which meets the requirements of MIL-SPEC-P-43607 (shrouded shackle), National Stock Number 5340-00-7998248, or MIL-SPEC-P-43951 (regular shackle), National Stock Number 5340-00799-8016. 24 Approved Security Container. A security file container, originally procured from a Federal Supply Schedule supplier that conforms to federal specifications and bears a "Test Certification Label" on the locking drawer attesting to the security capabilities of the container and lock. Such containers will be labeled "General Services Administration Approved Security Container" on the face of the top drawer. Acceptable tests of these containers can be performed only by a testing facility specifically approved by GSA. Approved Vault. A vault that has been constructed in accordance with this Manual and approved by the CSA. Approved Vault Door. A vault door and frame unit originally procured from the Federal Supply Schedule (FSC Group 71, Part III, Section E, FSC Class 7110), that meets Federal Specification AA-D-600. Authorized Person. A person who has a need-to-know for classified information in the performance of official duties and who has been granted a personnel clearance at the required level. Automated Information System. An assembly of computer hardware, software, and firmware configured for the purpose of automating the functions of calculating, computing, sequencing, storing, retrieving, displaying, communicating, or otherwise manipulating data, information and textual material. Automated Information System Security. All security safeguards needed to provide an acceptable level of protection for Automated Information Systems and the classified data processed. Cipher Lock. An electronic security device that releases an electric door latch when buttons are pressed in a correct sequence. Classification Authority. The authority that is vested in a government official to make an initial determination that information requires protection against unauthorized disclosure in the interest of national security. Classified Contract. Any contract that requires or will require access to classified information by a contractor or his or her employees in the performance of the contract. (A contract may be a classified contract even though the contract document is not classified.) The requirements prescribed for a "classified contract" also are applicable to all phases of precontract activity, including solicitations (bids, quotations, and proposals), precontract negotiations, postcontract activity, or other GCA program or project which requires access to classified information by a contractor. Classification Guide. A document issued by an authorized original classifier that prescribes the level of classification and appropriate declassification instructions 25 for specific information to be classified on a derivative basis. (Classification guides are provided to contractors by the Contract Security Classification Specification.) Classified Information. The term includes National Security Information, Restricted Data, and Formerly Restricted Data. Classified Information Procedures Act. A law that provides a mechanism for the courts to determine what classified information the defense counsel may access. Classification Markings. Plain and conspicuous stamps or printing affixed to an element of a page, document, or item to indicate level of classification thereof. Such markings must be larger than the text type, except for paragraph classification, which may be the same as text type. Classified Visit. A visit during which the visitor will require, or is expected to require, access to classified information. Classifier. Any person who makes a classification determination and applies a classification category to information or material. The determination may be an original classification action or it may be a derivative classification action. Contractors make derivative classification determinations based on classified source material, a security classification guide, or a Contract Security Classification Specification. Cleared Commercial Carrier. A carrier that is authorized by law, regulatory body, or regulation to transport SECRET material and has been granted a SECRET facility clearance. Cleared Employees. All contractor employees granted a personnel security clearance (PCL) and all employees in-process for a PCL. Closed Area. An area that meets the requirements of this Manual, as approved by the CSA, for the purpose of safeguarding classified material that, because of its size or nature, or operational necessity, cannot be adequately protected by the normal safeguards or stored during nonworking hours in approved containers. Cognizant Security Agency (CSA). Agencies of the Executive Branch that have been authorized by E.O. 12829 to establish an industrial security program for the purpose of safeguarding classified information under the jurisdiction of those agencies when disclosed or released to U.S. Industry. These agencies are: The Department of Defense, the Department of Energy, the Central Intelligence Agency, and the Nuclear Regulatory Commission. The Secretary of Defense (SECDEF) has been designated as Executive Agent for the NISP. Heads of the 26 Executive Branches are required to enter into agreements with the SECDEF that establish the terms of the SECDEF's responsibilities on behalf of these agency heads for administration of industrial security on their behalf. Cognizant Security Office (CSO). The office or offices delegated by the Head of a CSA to administer industrial security in a contractor's facility on behalf of the CSA. Colleges and Universities. All educational institutions that award academic degrees, and related research activities directly associated with a college or university through organization or by articles of incorporation. Communications Intelligence. Technical and intelligence information derived from foreign communications by other than the intended recipient. Communications Security. Protective measures taken to deny unauthorized persons information derived from telecommunications of the U.S. Government relating to national security and to ensure the authenticity of such communications. Company. A generic and comprehensive term which may include sole proprietorships, individuals, partnerships, corporations, societies, associations, and organizations usually established and operating to commonly prosecute a commercial, industrial or other legitimate business, enterprise, or undertaking. Compromise. The disclosure of classified information to an unauthorized person. CONFIDENTIAL. The designation that shall be applied to information or material the unauthorized disclosure of which could be reasonably expected to cause damage to the national security that the original classification authority is able to identify or describe. Consignee. A person, firm, or government activity named as the receiver of a shipment; one to whom a shipment is consigned. Consignor. A person, firm, or government activity by whom articles are shipped. The consignor is usually the shipper. Constant Surveillance Service. A transportation protective service provided by a commercial carrier qualified by MTMC to transport CONFIDENTIAL shipments. The service requires constant surveillance of the shipment at all times by a qualified carrier representative, however, a facility clearance is not required for the carrier. The carrier providing the service must maintain a signature and tally record for the shipment. 27 Continental Limits of the United States. U.S. territory, including the adjacent territorial waters located within the North American continent between Canada and Mexico. Contract Security Classification Specification (Form DD 254). Provides the security classification requirements to be applied to information. This is issued by the User Agency, or prime contractor, which furnishes an RFP or a classified contract. When work is subcontracted to a supplier/vendor who requires access to or generation of classified material, a DD Form 254 will be provided to the supplier and cognizant security offices. Contracting Officer. A government official who, in accordance with departmental or agency procedures, currently is designated as a contracting officer with the authority to enter into and administer contracts, and make determinations and findings with respect thereto, or any part of such authority. The term also includes the designated representative of the contracting officer acting within the limits of his or her authority. Contracting Officer/Contracting Officers Representative (CO/COR). An officer or civilian employee of any User Agency who is designated a contracting officer (and whose designation has not been terminated or revoked), with the authority to enter into and administer contracts and make determinations and findings with respect to such contracts. Contractor. Any industrial, educational, commercial, or other entity that has been granted an FCL by a CSA. Courier. A cleared employee, designated by the contractor, whose principal duty is to transmit classified material to its destination. The classified material remains in the personal possession of the courier except for authorized overnight storage. Conversion Rights. The right inherent in the ownership or holding of particular securities to exchange such securities for voting securities. Critical Nuclear Weapon Design Information. A DoD category of weapon data designating TOP SECRET Restricted Data or SECRET Restricted Data revealing the theory of operation or design of the components of a thermonuclear or implosion-type fission bomb, warhead, demolition munitions, or test device. Crypto. A designation or marking which identifies classified operational keying material, and which indicates that this material requires special consideration with respect to access, storage, and handling. Cryptographic. Of or pertaining to the various means and methods of rendering plain text unintelligible and reconverting cipher text into intelligible form. 28 Custodian. An individual who has possession of, or is otherwise charged with, the responsibility for safeguarding classified information. DD Form 254. The completed DD Form 254 is the basic document conveying to a contractor the contract security classification specifications and guidelines for the classification, regrading, and downgrading of documents used in the performance of a classified contract. Declassification. The determination that classified information no longer requires, in the interest of national security, any degree of protection against unauthorized disclosure, together with removal or cancellation of the classification designation. Declassification Event. An event that eliminates the need for continued classification of information. Defense Transportation System. Military controlled terminal facilities, Military Airlift Command controlled aircraft, Military Sealift Command controlled or arranged sealift and Government controlled air or land transportation. Department of Defense. The Office of the Secretary of Defense (OSD) (including all boards, councils, staffs, and commands), DoD agencies, and the Departments of Army, Navy, and Air Force (including all of their activities). Derivative Classification. A determination that information is in substance the same as information currently classified and the application of the same classification markings. Persons who only reproduce, extract, or summarize classified information, or who only apply classification markings derived from source material or as directed by a classification guide, need not possess original classification authority. Persons who apply derivative classification markings shall observe and respect original classification decisions and carry forward to any newly created documents any assigned authorized markings. Destruction. Disposal of classified material by prescribed procedures. Document. Any recorded information, regardless of its physical form or characteristics, including, without limitation, written or printed matter, tapes, charts, maps, paintings, drawing, engravings, sketches, working notes and papers; reproductions of such things by any means or process; and sound, voice, magnetic, or electronic recordings in any form. Document Control. A system of records and regulations whereby control is maintained over the origination, reproduction, transmission, receipt, and destruction of classified documents. Double Wrap. To enclose material in an inner container and an outer container. 29 Downgrade. A determination that classified information requires, in the interest of national security, a lower degree of protection against unauthorized disclosure than currently provided, together with a changing of the classification designation to reflect a lower degree of protection. Effectively Owned or Controlled. A foreign government or any entity controlled by a foreign government has the power, either directly or indirectly, whether exercised or exercisable, to control the election, appointment or tenure of the Offers officers, or a majority of the Offers board of directors by any means; e.g., ownership, contract, or operation of law (or equivalent power for unincorporated organizations). Embedded System. An AIS that performs or controls a function, either in whole or in part, as an integral element of a larger system or subsystem such as, ground support equipment, flight simulators, engine test stands, or fire control systems. Entity. Any U.S. or foreign person. Escort. A cleared employee, designated by the contractor, who accompanies a shipment of classified material to its destination. The classified material does not remain in the personal possession of the escort but the conveyance in which the material is transported remains under the constant observation and control of the escort. Evaluated Products List. A documented inventory of equipment, hardware software, and/or firmware that have been evaluated against the evaluation criteria found in DoD 5200.28-STD. Facility. A plant, laboratory, office, college, university, or commercial structure with associated warehouses, storage areas, utilities, and components, that, when related by function and location, form an operating entity. (A business or educational organization may consist of one or more facilities as defined herein.) For purposes of industrial security, the term does not include Government installations. Facility (Security) Clearance. An administrative determination that, from a security viewpoint, a facility is eligible for access to classified information of a certain category (and all lower categories). Firmware. A method of organizing control of an AIS in a microprogrammed structure in addition to, or rather than, software or hardware. Microprograms are composed of microinstructions, normally resident in read-only memory, to control the sequencing of computer circuits directly at the detailed level of the single machine instruction. 30 Foreign Government. Any national governing body organized and existing under the laws of any country other than the United States and its possessions and trust territories and any agent or instrumentality of that government. Foreign Government Information. Information that is: a. Provided to the U.S. by a foreign government or governments, an international organization of governments, or any element thereof with the expectation, expressed or implied, that the information, the source of the information, or both, are to be held in confidence; or b. Produced by the U.S. pursuant to, or as a result of, a joint arrangement with a foreign government or governments, an international organization of governments or any element thereof, requiring that the information, the arrangement, or both are to be held in confidence. Foreign Interest. Any foreign government, agency of a foreign government, or representative of a foreign government; any form of business enterprise or legal entity organized, chartered or incorporated under the laws of any country other than the U.S. or its possessions and trust territories, and any person who is not a citizen or national of the United States. Foreign Nationals. Any person who is not a citizen or national of the United States. Foreign Person. Any foreign interest and any U.S. person effectively owned or controlled by a foreign interest. Foreign Recipient. A foreign government or international organization, to whom the U.S. is providing classified material. Foreign Representatives. Citizens or nationals of the United States or immigrant aliens who are acting as representatives, officials, or employees of a foreign government, firm, corporation, or person. Formerly Restricted Data. Classified information jointly determined by the DOE and its predecessors and the DOD to be related primarily to the military utilization of atomic weapons and removed by the DOE from the Restricted Data category pursuant to section 142(d) of the Atomic Energy Act of 1954, as amended, and safeguarded as National Security Information, subject to the restrictions on transmission to other countries and regional defense organizations that apply to Restricted Data. Freight Forwarder (Transportation Agent). Any agent or facility designated to receive, process, and transship U.S. material to foreign recipients. In the context of this Manual, an agent or facility cleared specifically to perform these functions for the transfer of U.S. classified material to foreign recipients. 31 Government-To-Government Channels. Transfers by government officials through official channels or through other channels specified by the governments involved. Government Contracting Activity. An element of an agency designated by the agency head and delegated broad authority regarding acquisition functions. Guarded Perimeter. Outer-boundary enclosure which deters entry to a structure or area except at entrances which are locked or guarded. Handcarrier. A cleared employee, designated by the contractor, who occasionally handcarries classified material to its destination in connection with a classified visit or meeting. The classified material remains in the personal possession of the handcarrier except for authorized overnight storage. Home Office Facility. The headquarters facility of a multiple facility organization. Immigrant Alien. See Alien. Independent Research and Development. A contractor funded research and development effort that is not sponsored by, or required in performance of, a contract or grant that consists of projects falling with the areas of basic research; applied research; development; and systems, and other concept formulation studies. Indoctrination. The initial security instructions/briefing given a person prior to granting access to classified information. Industrial Security. That portion of information security which is concerned with the protection of classified information in the custody of U.S. industry. Information. Any information or material, regardless of its physical form or characteristics. Information Security. The result of any system of administrative policies and procedures for identifying, controlling, and protecting from unauthorized disclosure, information the protection of which is authorized by executive order. Information Systems Security Representative. The contractor employee responsible for the implementation of Automated Information Systems security, and operational compliance with the documented security measures and controls, at the contractor facility. Intelligence. Intelligence is the product resulting from the collection, evaluation, analysis, integration, and interpretation of all available information, that concerns 32 one or more aspects of foreign nations or of areas of foreign operations, and that is immediately or potentially significant to military planning and operations. Intelligence Information. Information that is under the jurisdiction and control of the Director of Central Intelligence or a member of the Intelligence Community. Intelligent Terminal. An AIS term that means a terminal that is programmable, able to accept peripheral devices, able to connect with other terminals or computers, able to accept additional memory, or which may be modified to have these characteristics. Interim Access Authorization. Authority to permit an employee access to classified information at a stipulated level of classification while the required investigation is completed. Normally, only granted to avoid crucial delay in contract performance. Not valid for access to RESTRICTED DATA or COMSEC information unless such access is specifically authorized by the government. Letter of Consent. The form used by the CSA to notify a contractor that a PCL or a Limited Access Authorization has been granted to an employee. Letter of Offer and Acceptance (LOA). United States Department of Defense Offer and Acceptance that, when executed, provides that the U.S. offers to sell, subject to terms and conditions contained therein, defense material to a foreign government, and the foreign government accepts the offer, subject to those terms and conditions. Limited Access Authorization. Security access authorization to CONFIDENTIAL or SECRET information granted to non-U.S. citizens requiring such limited access in the course of their regular duties. Marking. Stamping, printing, or tagging security classification designations on documents or material according to prescribed procedures. Material. Any product or substance on, or in which, information is embodied. Military Export Sales. Military Export Sales may by divided into Foreign Military Sales (FMS) under the AECA, sales under Section 607 of the Foreign Assistance Act (FAA) and Direct Commercial Sales. FMS and FAA are government-togovernment transactions. For these sales, the DoD purchases articles and services from U.S. firms, takes title to the equipment, or has title to the articles to be sold from U.S. stocks, and sells the articles or services to the foreign buyer. For direct commercial sales, the U.S. firm sells directly to the foreign government or international organization. Multiple Facility Organization. A legal entity (single proprietorship, partnership, association, trust, or corporation) that is composed of two or more facilities. 33 National of the United States. A national of the United States is: a. A citizen of the United States, or, b. A person who, though not a citizen of the United States, owes permanent allegiance to the United States. NOTE:8 U.S.C. 1101(a) (22). 8 U.S.C. 1401, subsection (a) lists in paragraphs (1) through (7) categories of persons born in and outside the United States or its possessions who may qualify as nationals of the United States. This subsection should be consulted when doubt exists as to whether or not a person can qualify as a national of the United States. National Security. The national defense and foreign relations of the United States. National Security Information. Any information that has been determined pursuant to E.O. 12958 or any predecessor order to require protection against unauthorized disclosure and is so designated. The classifications TOP SECRET, SECRET, and CONFIDENTIAL are used to designate such information and it is referred to as "classified information." NATO Information. Information bearing NATO markings, indicating the information is the property of NATO, access to which is limited to representatives of NATO and its member nations unless proper NATO authority has been obtained to release outside of NATO. Need-to-Know. A determination made by the possessor of classified information that a prospective recipient has a requirement for access to, knowledge of, or possession of the classified information to perform tasks or services essential to the fulfillment of a classified contract or program. Network. An AIS term meaning a network composed of a communications medium and all components attached to that medium whose responsibility is the transference of information. Such components may include AISs, packet switches, telecommunications controllers, key distribution centers, and technical control devices. Nondisclosure Agreement (NDA). An agreement between the individual being granted access and the U.S. government legally binding the individual to properly safeguard, store, handle, transport or destroy classified material. Official Information. Information which is owned by, produced for or by, or is subject to the control of the United States Government. All classified information is considered official information. Original Classification. An initial determination that information requires, in the interest of national security, protection against unauthorized disclosure, together with a classification designation signifying the level of protection required. (Only government officials, who have been designated in writing, may apply an original classification to information.) 34 Parent Corporation. A corporation that owns at least a majority of another corporation's voting securities. Perimeter, Guarded. See Guarded Perimeter. Personnel (Security) Clearance. An administrative determination that an individual is eligible, from a security point of view, for access to classified information of the same or lower category as the level of the personnel clearance being granted. Personnel Security Questionnaire (PSQ). Refers to related information forms used for the processing of an individual for access to classified information. Possessions. U.S. possessions are the U.S. Virgin Islands, Guam, American Samoa, Swain's Island, Howland Island, Baker Island, Jarvis Island, Midway Islands (this consists of Sand Island and Eastern Island), Kingman Reef, Johnston Atoll, Navassa Island, Swan Island, Wake Island, and Palmyra Island. Prime Contract. A contract let by a GCA to a contractor for a legitimate government purpose. Prime Contractor. The contractor who receives a prime contract from a GCA. Proscribed Information. a. Top Secret information; b. Communications Security (COMSEC) information, except classified keys used to operate secure telephone units (STU IIIs); c. Restricted Data as defined in the U.S. Atomic Energy Act of 1954, as amended; d. Special Access Program (SAP) information; or e. Sensitive Compartmented Information Protective Security Service. A transportation protective service provided by a cleared commercial carrier qualified by the Military Traffic Management Command (MTMC) to transport SECRET shipments. Public. Any contractor, subcontractor, Government official, or other individual who does not require access to information (classified or unclassified) in furtherance of the performance of the classified contract under which the information was provided to the contractor. 35 Public Disclosure. The passing of information and/or material pertaining to a classified contract to the public, or any member of the public, by any means of communication. Reference Material. Documentary material over which the GCA, who lets the classified contract, does not have classification jurisdiction, and did not have classification jurisdiction at the time the material was originated. Most material made available to contractors by the Defense Technical Information Center and other secondary distribution agencies is reference material as thus defined. Regrade. To assign a higher or lower security classification to an item of classified material. Remote Terminal. A device for communication with an automated information system from a location, that is not within the central computer facility. Representative of a Foreign Interest (RFI). A citizen or national of the United States, who is acting as a representative of a foreign interest. (See "Foreign Interest.") Reproduction. Act or process of producing copies by any means. Restricted Area. A controlled access area established to safeguard classified material, that because of its size or nature, cannot be adequately protected during working hours by the usual safeguards, but that is capable of being stored during non-working hours in an approved repository or secured by other methods approved by the CSA. Restricted Data. All data concerning the design, manufacture, or utilization of atomic weapons; the production of special nuclear material; or the use of special nuclear material in the production of energy, but shall not include data declassified or removed from the RD category pursuant to section 142 of the Atomic Energy Act of 1954, as amended. SECRET. The designation that shall be applied only to information or material the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security that the original classification authority is able to identify or describe. Security Clearance. See Access or Personnel (Security) Clearance. Security Cognizance. The Government office assigned the responsibility for acting for CSAs in the discharge of industrial security responsibilities. 36 Security in Depth. A determination made by the CSA that a contractor's security program consists of layered and complementary security controls sufficient to deter and detect unauthorized entry and movement within the facility. Security Violation. Failure to comply with the policy and procedures in a manner that reasonably could result in the loss or compromise of classified information. Sensitive Compartmented Information. All Intelligence Information and material that requires special controls for restricted handling within compartmented channels and for which compartmentation is established. Shipper. One who releases custody of material to a carrier for transportation to a consignee. (See "Consignor.") Short Title. An identifying combination of letters and numbers assigned to a document or equipment for purposes of brevity. Source Document. A classified document, other than a classification guide, from which information is extracted for inclusion in another document. Special Access Program. Any program that is established to control access, distribution, and to provide protection for particularly sensitive classified information beyond that normally required for TOP SECRET, SECRET, or CONFIDENTIAL information. A Special Access Program can be created or continued only as authorized by a senior agency official delegated such authority pursuant to E.O. 12958. Standard Practice Procedures. A document(s) prepared by a contractor that implements the applicable requirements of the NISPOM for the contractor's operations and involvement with classified information at the contractor's facility. Subcontract. Any contract entered into by a contractor to furnish supplies or services for performance of a prime contract or a subcontract. For purposes of the NISPOM, a subcontract is any contract, subcontract, purchase order, lease agreement, service agreement, request for quotation (RFQ), request for proposal (RFP), invitation for bid (IFB), or other agreement or procurement action between contractors that requires or will require access to classified information to fulfill the performance requirements of a prime contract. Subcontractor. A supplier, distributor, vendor, or firm that furnishes supplies or services to or for a prime contractor or another subcontractor, who enters into a contract with a prime contractor. For purposes of this Manual, each subcontractor shall be considered as a prime contractor in relation to its subcontractors. Subsidiary Corporation. A corporation in which another corporation owns at least a majority of its voting securities. 37 System Software. Computer programs that control, monitor, or facilitate use of the AIS; for example, operating systems, programming languages, communication, input-output control, sorts, security packages and other utilitytype programs. Considered to also include off-the-shelf application packages obtained from manufacturers and commercial vendors, such as for word processing, spreadsheets, data base management, graphics, and computeraided design. Technical Data. Information governed by the International Traffic in Arms Regulation (ITAR) and the Export Administration Regulation (EAR). The export of technical data that is inherently military in character is controlled by the ITAR, 22 CFR 120.1-130.17 (1987). The export of technical data that has both military and civilian uses is controlled by the EAR, 15 CFR 368.1-399.2 (1987). TOP SECRET. The designation that shall be applied only to information or material the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security that the original classification authority is able to identify or describe. Transclassification. When information has been removed from the RD category by a joint determination of DOE and DOD and placed in the FRD category in accordance with section 142d of the Atomic Energy Act. Transmission. The sending of information from one place to another by radio, microwave, laser, or other nonconnective methods, as well as by cable, wire, or other connective medium. Transmission also includes movement involving the actual transfer of custody and responsibility for a document or other classified material from one authorized addressee to another. Transshipping Activity. A government activity to which a carrier transfers custody of freight for reshipment by another carrier to the consignee. Two-Person Rule. A requirement that the contractor have at least two properly cleared and briefed persons present whenever certain classified material is not secured in an approved storage container. Unclassified Visitor. See Visitor. United States and Its Territorial Areas. The 50 states, the District of Columbia, the Commonwealth of Puerto Rico, Guam, American Samoa, the Virgin Islands, the Trust Territory of the Pacific Islands (also called Micronesia), Midway Island, Wake Island, Johnston Atoll, Kingman Reef, Swain's Island, and Palmyra Island. Unauthorized Person. A person not authorized to have access to specific classified information. 38 United States. The 50 states and the District of Columbia. United States Citizen (Native Born). A person born in one of the following locations is considered to be a U.S. citizen for industrial security purposes: the 50 United States; District of Columbia; Puerto Rico; Guam; American Samoa; Northern Mariana Islands; U.S. Virgin Islands; Panama Canal Zone (if the father or mother (or both) was, or is, a citizen of the U.S.); the Federated States of Micronesia; and the Republic of the Marshall Islands. U.S. Person. Any form of business enterprise or entity organized, chartered or incorporated under the laws of the United States or its possessions and trust territories and any person who is a citizen or national of the United States. Upgrade. A determination that certain classified information, in the interest of national security, requires a higher degree of protection against unauthorized disclosure than currently provided, coupled with a changing of the classification designation to reflect such a higher degree. Visitor. Any person entering a cleared facility who is not an employee of that facility is a visitor. A classified visitor is one who, in the national interest and in the performance of a classified contract or other approved program, requires access to classified information. An unclassified visitor is one who has no access authorization status and/or need-to-know, but has a legitimate need to enter a facility. Voting Securities. Any securities that presently entitle the owner or holder thereof to vote for the election of directors of the issuer or, with respect to unincorporated entities, individuals exercising similar functions. Working Hours. The period of time when: a. There is present in the specific area where classified material is located, a work force on a regularly scheduled shift, as contrasted with employees working within an area on an overtime basis outside of the scheduled workshift; and b. The number of employees in the scheduled work force is sufficient in number and so positioned to be able to detect and challenge the presence of unauthorized personnel. This would, therefore, exclude janitors, maintenance personnel, and other individuals whose duties require movement throughout the facility. 39