Against All Enemies Foreign and DomesticMy Security Clearance |
|
I held a Top Secret (SBI) Security Clearance from 1985-1994 with many access codes some listed are:
(SCI), (SI), (SIGNIT, (UMBRA), (SPOKE), (MORAY), (COMINT), (DELTA), (GAMA), (VRK), (ECI), (CJ), (SIOP), (RSIOP),(500), (510), (908), (TK), (RUFF), (ZARF), (CHESS), (SI-TK), (YW), roughly 50 additional Top Secret Code Word Special Access Programs. I also had access to multiple other allies Top Secret Code Word programs as well as NATO Top Secret Information.
1.0 CLEARANCES A Security Clearance is a determination that a person is eligible for access to classified information. Need-to-Know is a determination made by a possessor of classified information that a prospective recipient, in the interest of national security, has a requirement for access to, or knowledge, or possession of the classified information in order to accomplish lawful and authorized government purposes. Anyone being considered for access to Confidential or Secret clearance must submit to a Background Investigation (BI) by the Defense Security Service (DSS). Those who are candidates for Top Secret or SCI clearance must submit to a Single Scope Background Investigation (SBI). Being read into SCI/SAP programs often involves polygraph testing and additional background checks. Contractors and consultants typically have their background investigation conducted by the General Services Administration (GSA). Once the investigation is completed the information is forwarded to the Central Clearance Facility (CCF) for final security determination. Any derogatory reports and additional investigations are also reviewed by the CCF to determine clearance maintenance. All clearances require review and reinvestigation every five years for Top Secret clearances and 10 years for Secret/Confidential clearances. Contractors must have their clearances reviewed every three years. 1.1 INVESTIGATIONS National Agency Check (NAC) Background Investigation (BI)
Single Scope Background Investigation (SBI)
A personnel security investigation consisting of a NAC, independent certification of date and place of birth directly from appropriate registration authority, credit search, personal interviews of subject and sources, written inquiries, and record searches, which cover specific areas of subject's background during the past 15 years. In order to receive Presidential access (YW) a complete life style background check is conducted as well. An individual must be able to account for his whereabouts for the complete 15 years and give the name and address of at least one person that can verify the information. No more than a 2 week time frame can be unaccounted for and be granted a SBI clearance. For each name given the investigators will interview that individual and get 5 more names from the first individual to interview. A SBI clearance can take up to a year to grant due to the dozens of interviews and officers required around the world. The cost of the background check is about $80,000 now. A NAC will be conducted on the subject's spouse or cohabitant. Additionally, a NAC will be conducted on other individuals bound to the subject by affection or obligation who may be subject to duress by a foreign power. No one ever assumed that local US police forces would be a major source of duress. I for one have learned that many US police forces will go to any lengths to protect their own and their image in the community including arresting my children and daily harassment and pressures beyond any legal means. Foreign born immediate family members will be subjected to an Immigration and Naturalization Service check2.0 CLASSIFICATIONS
Simply having a classification does not automatically give access to information. Access is purely determined by the necessities of performing their assigned task. The authority for a consumer’s actual access to classified materials rests with the organizations chief security manager, typically referred to as the Special Security Officer (SSO). SSOs can confirm or deny a consumers access to specific information. This is to prevent abuse of the clearance system. A consumer with Top Secret access who works in communications cannot expect to walk into a nuclear weapons lab by virtue of his clearance alone. 2.1 CLASSIFICATION LEVELS 2.1.1 TOP SECRET Examples of exceptionally grave damage include armed hostilities; disruption of foreign relations vitally affecting the national securely; the compromise of vital national defense plans or complex cryptology and communications intelligence systems; the revelation of sensitive intelligence operations, and the disclosure of scientific or technological developments vital to national security. 2.1.2 SECRET Examples of serious damage include disruption of foreign relations significantly affecting the national security; significant impairment of a program or policy directly related to the national security; revelation of significant military plans or intelligence operations: compromise of significant military plans or intelligence operations; and compromise of significant scientific or technological developments relating to national security. 2.1.3 CONFIDENTIAL Examples of damage include the compromise of information that indicates strength of ground, air, and naval forces; disclosure of technical information used for training, maintenance, and inspection of classified munitions of war; revelation of performance characteristics, test data, design. and production data on munitions of war. 2.1.4 UNCLASSIFIED There are other types of information that require application of controls and protective measures for a variety of reasons. This information is known as "unclassified controlled information." This includes "For Official Use Only" information, "Sensitive But Unclassified" (formerly "Limited Official Use") information, "DEA Sensitive Information," and "DOD Unclassified Controlled Nuclear Information." 2.1.4.1 "For Official Use Only (FOUO)" is a designation that is applied to unclassified information that *may* be exempt from mandatory release to the public under the Freedom of Information Act (FOIA) if it meets a variety of stringent requirements. By definition, information must be unclassified in order to be designated FOUO. If an item of information is declassified, it can be designated FOUO if it qualifies under one of the restriction categories. This means that (1) information cannot be classified and FOUO at the same time, and (2) information that is declassified may be designated FOUO, but only if it fits into one of the listed exemption categories. 2.1.4.2 Sensitive But Unclassified (SBU) information is information originated within the Department of State that warrants a degree of protection and administrative control and meets the criteria for exemption from mandatory public disclosure under the Freedom of Information Act. Before 26 May 1995, this information was designated and marked "Limited Official Use (LOU)." The LOU designation will no longer be used. 2.1.4.3 DEA Sensitive information is unclassified information that is originated by the Drug Enforcement Administration and requires protection against unauthorized disclosure to protect sources and methods of investigative activity, evidence, and the integrity of pretrial investigative reports. The Administrator and certain other officials of the DEA have been authorized to designate information as DEA Sensitive; the Department of Defense has agreed to implement protective measures for DEA Sensitive information in its possession. 2.1.4.4 DOD Unclassified Controlled Nuclear Information (DOD UCNI) is unclassified information on security measures (including security plans, procedures and equipment) for the physical protection of DOD Special Nuclear Material (SNM), equipment, or facilities. Information is Designated DOD UCNI only when it is determined that its unauthorized disclosure could reasonably be expected to have a significant adverse effect on the health and safety of the public or the common defense and security by increasing significantly the likelihood of the illegal production of nuclear weapons or the theft, diversion, or sabotage of DOD SNM, equipment, or facilities. Information may be designated DOD UCNI by the Heads of the DOD Components and individuals to whom they have delegated the authority. 3.0 MARKING AND DISSEMINATION CONTROLS These are warning notices that further restrict access to information or its dissemination beyond its classification level. Typically only one of the three levels of classification will bear these markings. Such documents are marked by the primary classification then any additional handling instructions, such as "SECRET/NOFORN/ORCON/PROPIN" or "CONFIDENTIAL/NOCONTRACT". NOFORN (Special Handling Required - Not Releasable to Foreign
Nationals) Intelligence, even if it bears no restrictive control markings, may only be released in its original form to foreign governments with the permission of the originator and in accordance with existing nation security directives. ORCON (Dissemination and Extraction of Information of Information
Controlled This control is typically only applied to Secret and Top Secret material. It is the most restrictive special handling instruction and is only applied when other controls would be inadequate. PROPIN (Caution - Proprietary Information Involved) REL<NATION/ORGANIZATION INITIALS> (Authorized for Release To) Examples include RELUK (United Kingdom), RELROK (Republic of Korea), RELUKCANUKAUS (Canada, UK, and Australia), RELUNPROFOR (UN Protection Force) and UNNATO (North Atlantic Treaty Organization). Can also be noted as "REL TO" 3.1 OUTDATED MARKINGS The following special control markings are no longer used. WNINTEL (Warning Notice - Intelligence Sources or Methods Involved) 4.0 SENSITIVE
COMPARTMENTALIZED INTELLIGENCE (SCI) Background investigations for SCI clearance are very stringent, beyond even that required for a TS clearance. No risk is acceptable for an SCI clearance and it is possible to hold a TS clearance and be denied SCI access. Physical security measures for SCI material are also more extreme then for TS material, requiring that material remain in vaults or SCIFs (SCI Facilities). Even a Secret SCI document is protected with greater physical security then a plain TS one. 4.1 SPECIAL
INTELLIGENCE For example, a document page containing UMBRA SCI information would have been stamped TOP SECRET UMBRA and SPOKE SCI would be stamped SECRET SPOKE. This should not imply that having a Secret or Top Secret clearance would give access to SECRET SPOKE documents however. The consumer must possess the appropriate SCI clearance and be a part of the appropriate Special Access Program in order to access the information. It should be noted that UMBRA information was always Top Secret and SPOKE and MORAY always at least Secret, with SPOKE being "more secret" then MORAY. This has recently changed however, and UMBRA, SPOKE, and MORAY are no longer authorized for use. Instead such documents are classified as SECRET COMINT or TOP SECRET COMINT. 4.1.1 COMINT GAMMA was originally applied to intercepts of Soviet communications, and later, US antiwar leaders. Some subcategories of GAMMA included GABE, GANT, GILT, GOAT, GUPY, GYRO and GOUT. GAMMA GUPY referred to interception of radiotelephone calls by Soviet officials as they were driven around Moscow and GAMMA GOUT referred to interception of South Vietnamese government communications. Thus an older document may bear the classification TOP SECRET UMBRA GAMMA GILT. DELTA referred to intercepts of Soviet military operation information, such as the location of submarines and aircraft operations. Categories under DELTA included DACE, DICE, and DENT. Other COMINT designators are VRK and ECI. 4.1.2 SOURCE IDENTIFIER Other designations can indicate the specific nations involved: ISHTAR (Japan), SETEE (Korea), DYNAMO (Denmark), RICHTER (Germany), and DIKTER (Norway). 4.2 TALENT-KEYHOLE
(TK) Compartments of TK include RUFF and CHESS. ZARF is no longer a Codeword in use, TOP SECRET TALENT KEYHOLE ZARF documents are now just TOP SECRET TALENT KEYHOLE. RUFF pertains to information produced by imaging satellites. ZARF indicates SIGINT obtained by satellite. CHESS is imagery obtained from reconnaissance aircraft. A typical classification may be TOP SECRET TALENT KEYHOLE or TOP SECRET ZARF UMBRA for older documents. 4.2.1 SI-TK CLEARANCE Information about the type of system, location, orbit, or capabilities is not available simply because the consumer has a SI-TK clearance. Clearances for such information is granted on a system-by-system basis in what is called the BYEMAN classification. 4.2.1.1 BYEMAN 4.3 OTHER SCI
CATEGORIES 5.0 SPECIAL ACCESS
PROGRAMS Material from SAPs are often given caveats that are even more restrictive then ORCON. A TOP SECRET/ECHO MIRAGE/ORCON document may have restrictions above and beyond even normal ORCON control. Use of deadly force is absolute in the protection of many SAP’s. The damage to the country’s security would be extreme in the release of such material. So yes Virginia the saying “If I told you, I’d have to kill you!” is for real and did not originate in Hollywood. REFERENCES
|
This site was last updated 05/12/05